caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
106.4s |
104.3s |
105.1s |
102.5s |
58.1s |
58.2s |
59.6s |
60.0s |
57.8s |
59.7s |
58.1s |
58.1s |
test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
4.5s |
4.5s |
4.5s |
4.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.2s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.6s |
2.4s |
2.6s |
2.5s |
2.7s |
2.9s |
3.1s |
2.8s |
2.9s |
3.0s |
3.0s |
2.8s |
test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
4.5s |
4.7s |
4.4s |
4.3s |
4.4s |
4.3s |
5.0s |
4.6s |
4.6s |
4.5s |
4.3s |
4.7s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.2s |
3.4s |
3.4s |
3.3s |
3.6s |
3.9s |
4.7s |
3.9s |
3.7s |
3.5s |
3.6s |
3.4s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.5s |
0.4s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.6s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.6s |
1.6s |
1.5s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.6s |
1.4s |
1.7s |
1.4s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_rtalias::test_fht_info |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.9s |
1.6s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.4s |
2.1s |
2.4s |
2.3s |
1.8s |
1.7s |
1.7s |
1.8s |
1.8s |
1.7s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
0.9s |
1.2s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
test_dice_derivations::test_cold_reset_status_reporting |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.6s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.2s |
0.9s |
1.1s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
test_fake_rom::test_fake_rom_fw_load |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.7s |
0.7s |
0.6s |
0.6s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
test_fake_rom::test_fake_rom_production_enabled |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_fake_rom::test_fake_rom_update_reset |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.9s |
1.0s |
1.1s |
1.2s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
test_fips_hooks::test_fips_hook_exit |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
0.9s |
1.2s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.4s |
1.2s |
1.3s |
1.1s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.3s |
1.4s |
1.4s |
1.5s |
1.0s |
0.9s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_fht_info |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.3s |
1.3s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.1s |
1.3s |
1.0s |
0.9s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.9s |
0.8s |
0.8s |
0.5s |
0.5s |
0.6s |
0.5s |
0.7s |
0.6s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.5s |
1.4s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
1.2s |
1.2s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.6s |
1.5s |
1.6s |
1.6s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.7s |
1.3s |
1.2s |
1.2s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
2.0s |
2.0s |
2.1s |
2.0s |
1.8s |
1.6s |
1.7s |
1.6s |
2.2s |
1.9s |
1.8s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.4s |
1.4s |
1.4s |
1.6s |
1.1s |
1.1s |
1.1s |
1.0s |
1.3s |
1.5s |
1.1s |
1.1s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.6s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.4s |
1.2s |
1.1s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.4s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.7s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.2s |
1.1s |
1.2s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_single_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.2s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_idevid_derivation::test_generate_csr |
2.0s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
1965.2s |
1940.2s |
1961.4s |
1937.2s |
1536.6s |
1512.0s |
1536.4s |
1511.5s |
1536.3s |
1512.0s |
1536.4s |
1511.5s |
926.4s |
895.0s |
904.3s |
874.9s |
886.0s |
859.4s |
889.0s |
857.1s |
891.0s |
857.3s |
897.0s |
857.4s |
test_idevid_derivation::test_idev_subj_key_id_algo |
7.2s |
7.2s |
7.2s |
7.2s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
6.1s |
5.4s |
5.6s |
5.2s |
5.2s |
4.7s |
4.9s |
5.4s |
4.9s |
4.7s |
5.5s |
5.5s |
test_image_validation::cert_test |
2.4s |
3.3s |
2.1s |
2.2s |
1.6s |
1.8s |
1.3s |
1.2s |
1.5s |
1.4s |
1.4s |
1.5s |
1.3s |
1.1s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
test_image_validation::cert_test_with_custom_dates |
2.5s |
2.3s |
2.0s |
1.8s |
1.9s |
1.9s |
2.2s |
1.5s |
1.6s |
1.9s |
1.3s |
1.6s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.2s |
1.1s |
1.5s |
1.2s |
1.1s |
1.5s |
1.4s |
test_image_validation::cert_test_with_ueid |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.3s |
1.1s |
1.1s |
1.1s |
1.4s |
1.0s |
1.1s |
1.2s |
1.1s |
1.0s |
1.4s |
1.2s |
test_image_validation::test_fmc_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.8s |
0.7s |
test_image_validation::test_fmc_entry_point_unaligned |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.9s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.9s |
1.0s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.6s |
1.6s |
1.3s |
1.8s |
1.3s |
1.2s |
1.1s |
1.2s |
1.3s |
1.3s |
test_image_validation::test_fmc_svn_greater_than_32 |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
1.0s |
1.1s |
1.1s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.7s |
0.8s |
0.7s |
0.4s |
0.6s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.7s |
0.8s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.4s |
0.8s |
0.7s |
0.5s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.8s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.4s |
2.4s |
2.0s |
1.9s |
2.2s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
2.3s |
2.3s |
2.3s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.4s |
1.3s |
1.6s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.4s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.4s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.4s |
1.2s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.6s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
1.4s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
3.4s |
3.3s |
3.4s |
3.4s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.8s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
39.0s |
38.6s |
39.2s |
38.8s |
29.9s |
29.5s |
30.2s |
29.7s |
29.9s |
29.5s |
30.2s |
29.7s |
33.1s |
32.3s |
32.9s |
31.7s |
30.7s |
29.3s |
31.1s |
29.8s |
30.7s |
29.7s |
31.0s |
29.8s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
23.4s |
23.1s |
23.7s |
23.4s |
17.4s |
17.0s |
17.7s |
17.3s |
17.4s |
17.0s |
17.7s |
17.3s |
19.1s |
18.2s |
18.9s |
17.9s |
17.5s |
16.5s |
17.7s |
16.6s |
17.6s |
16.5s |
17.7s |
16.7s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
0.9s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.3s |
1.0s |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.2s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.9s |
2.8s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
test_image_validation::test_toc_fmc_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_reserved_pauser |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox_errors::test_unknown_command_is_fatal |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
test_rom_integrity::test_rom_integrity_failure |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_success |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_version::test_version |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.6s |
1.6s |
2.4s |
2.4s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.6s |
0.6s |
1.4s |
1.4s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
1.1s |
1.1s |
1.4s |
1.4s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
2.3s |
2.3s |
1.9s |
1.9s |
2.3s |
2.3s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests_get_idev_csr::test_get_csr |
1.0s |
0.9s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.1s |
2.6s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.7s |
3.7s |
3.6s |
3.6s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
2.5s |
2.4s |
3.1s |
2.5s |
2.5s |
2.3s |
2.4s |
2.3s |
2.5s |
2.6s |
2.4s |
2.4s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.1s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
2.7s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.1s |
2.6s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.7s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
1.8s |
2.1s |
1.8s |
1.8s |
2.0s |
1.8s |
1.8s |
1.9s |
2.0s |
1.8s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.2s |
1.3s |
1.2s |
1.2s |
1.4s |
1.2s |
1.2s |
1.3s |
1.4s |
1.2s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.2s |
1.3s |
1.2s |
1.2s |
1.4s |
1.2s |
1.2s |
1.3s |
1.4s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.2s |
1.3s |
1.2s |
1.2s |
1.5s |
1.2s |
1.2s |
1.3s |
1.4s |
1.2s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.6s |
3.6s |
3.6s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
3.0s |
2.5s |
2.5s |
2.5s |
2.5s |
2.8s |
2.4s |
2.5s |
2.5s |
2.7s |
2.7s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.1s |
2.2s |
2.1s |
2.0s |
2.5s |
2.1s |
2.0s |
2.0s |
2.3s |
2.3s |
2.0s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.5s |
1.3s |
1.2s |
1.3s |
1.4s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.5s |
1.5s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.6s |
1.2s |
1.2s |
1.5s |
1.5s |
test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.3s |
1.1s |
test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.3s |
1.3s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
1.1s |
1.5s |
1.3s |
test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
1.1s |
1.0s |
test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.2s |
1.0s |
1.0s |
1.3s |
1.2s |
test_boot::test_stress_update |
400.3s |
406.9s |
394.5s |
403.2s |
326.9s |
323.2s |
336.0s |
336.0s |
333.9s |
340.5s |
336.0s |
336.1s |
332.1s |
323.8s |
332.0s |
347.0s |
315.3s |
304.1s |
318.5s |
310.0s |
316.1s |
305.1s |
325.7s |
312.2s |
test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
2.3s |
1.9s |
1.8s |
2.1s |
2.2s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.5s |
1.2s |
1.2s |
1.6s |
1.5s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.7s |
4.8s |
5.7s |
5.7s |
4.1s |
3.8s |
3.9s |
3.9s |
3.8s |
3.6s |
4.7s |
3.7s |
3.8s |
3.7s |
3.8s |
3.9s |
test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.5s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.1s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.3s |
3.3s |
3.3s |
2.7s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.7s |
2.2s |
2.4s |
2.5s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.3s |
1.6s |
1.3s |
1.5s |
1.7s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.4s |
4.8s |
4.5s |
5.3s |
5.1s |
4.4s |
4.6s |
4.5s |
5.2s |
4.4s |
4.4s |
4.4s |
test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.2s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_ecdsa::test_ecdsa_verify_cmd |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.3s |
1.1s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.4s |
4.4s |
4.3s |
4.4s |
3.6s |
3.6s |
3.6s |
3.5s |
3.6s |
3.7s |
3.6s |
3.7s |
3.8s |
3.7s |
3.8s |
3.7s |
3.6s |
3.5s |
3.8s |
3.7s |
3.6s |
3.5s |
3.6s |
3.7s |
test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
test_lms::test_lms_verify_failure |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.1s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
2.6s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
1.8s |
1.7s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.4s |
2.3s |
2.3s |
2.3s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.6s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.6s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.5s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.5s |
2.5s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.2s |
4.3s |
3.5s |
3.5s |
3.5s |
3.4s |
3.5s |
3.6s |
3.5s |
3.5s |
3.8s |
3.5s |
3.6s |
3.6s |
3.4s |
3.3s |
3.5s |
3.4s |
3.4s |
3.3s |
3.5s |
3.4s |
test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.0s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
test_update_reset::test_context_tags_validation |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
1.9s |
1.8s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.7s |
2.7s |
2.8s |
2.8s |
2.7s |
2.5s |
2.8s |
2.6s |
2.7s |
2.6s |
2.8s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.7s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
test_update_reset::test_tags_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.8s |
2.6s |
2.8s |
2.7s |
2.7s |
2.5s |
2.7s |
2.7s |
2.7s |
2.6s |
2.7s |
2.5s |
test_warm_reset::test_mbox_busy_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.8s |
1.8s |
2.6s |
2.6s |
1.8s |
1.8s |
2.6s |
2.6s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
2.4s |
2.4s |
2.7s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
jtag_test::gdb_test |
6.4s |
6.5s |
7.2s |
6.5s |
6.0s |
5.9s |
6.0s |
5.9s |
6.0s |
6.0s |
5.9s |
5.9s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
3.3s |
3.2s |
3.2s |
3.2s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.4s |
2.4s |
2.4s |
2.8s |
2.9s |
2.7s |
2.8s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.4s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.3s |
2.8s |
2.3s |
2.2s |
test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.4s |
7.3s |
7.5s |
6.7s |
7.9s |
7.4s |
7.4s |
7.3s |
7.8s |
7.3s |
7.5s |
7.4s |
warm_reset::warm_reset_basic |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.6s |
2.1s |
1.6s |
1.5s |
1.5s |
1.7s |
1.6s |
1.4s |
1.5s |
1.7s |
1.5s |
1.5s |
warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.8s |
0.7s |
0.6s |
0.6s |
0.5s |
0.7s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.7s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.6s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.9s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.6s |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.8s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.8s |
1.0s |
0.6s |
0.7s |
0.8s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.7s |
0.9s |
0.8s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.5s |
fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
1.0s |
0.6s |
0.9s |
0.6s |
0.7s |
0.6s |
1.0s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_error_fmc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.5s |
1.6s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.8s |
1.7s |
2.1s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.5s |
fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.2s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.1s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
1.8s |
1.7s |
1.8s |
1.5s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_header_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
2.0s |
1.4s |
1.4s |
1.4s |
1.8s |
1.5s |
1.5s |
1.4s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
2.2s |
1.7s |
2.0s |
1.5s |
1.6s |
1.5s |
2.1s |
1.6s |
1.7s |
1.5s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.9s |
1.6s |
1.7s |
1.4s |
1.6s |
1.4s |
1.9s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.8s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
2.2s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.7s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.7s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.9s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.3s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
2.2s |
2.2s |
2.1s |
1.6s |
1.6s |
1.7s |
1.6s |
1.8s |
2.0s |
1.7s |
1.6s |
fw_load::fw_load_error_owner_lms_verify_failure |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.5s |
1.6s |
2.0s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.7s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.6s |
1.5s |
1.5s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.7s |
1.9s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
2.0s |
1.9s |
2.2s |
1.8s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
1.9s |
1.9s |
2.3s |
1.8s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
2.0s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.4s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
fw_load::fw_load_error_toc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.9s |
1.6s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.9s |
2.2s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.8s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.8s |
1.8s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
2.8s |
2.9s |
2.8s |
2.8s |
2.6s |
2.9s |
2.8s |
2.7s |
2.7s |
2.7s |
2.6s |
2.7s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
2.9s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
2.8s |
2.7s |
2.6s |
2.8s |
2.5s |
2.5s |
2.6s |
2.5s |
2.6s |
2.6s |
2.5s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.5s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.6s |
2.6s |
2.8s |
2.6s |
2.8s |
2.6s |
2.6s |
2.6s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.4s |
2.6s |
2.5s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.8s |
3.8s |
3.7s |
3.7s |
3.7s |
2.8s |
2.7s |
3.0s |
2.8s |
3.0s |
2.8s |
2.7s |
2.8s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.0s |
1.7s |
1.7s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.8s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
1.9s |
1.8s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.9s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.7s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.4s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.8s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.9s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.6s |
jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.7s |
2.6s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
security_parameters::attempt_ssp_access_fw_load |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.8s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
1.9s |
2.2s |
2.0s |
2.2s |
1.9s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.2s |
2.2s |
2.2s |
2.0s |
2.0s |
2.1s |
2.1s |
2.2s |
2.1s |
2.4s |
2.0s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.2s |
2.0s |
2.0s |
2.2s |
2.0s |
2.2s |
2.1s |
2.3s |
2.0s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.3s |
1.1s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.3s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
self_tests::kat_halt_check_no_output |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
8.4s |
8.6s |
8.9s |
9.5s |
8.6s |
8.8s |
9.4s |
9.9s |
9.4s |
9.5s |
9.7s |
8.7s |
self_tests::kat_hmac384_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
self_tests::kat_hmac384_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.1s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.0s |
2.1s |
2.2s |
2.1s |
2.0s |
2.1s |
2.5s |
2.1s |
2.1s |
2.2s |
2.0s |
self_tests::kat_lms_digest_mismatch_rom |
1.4s |
1.4s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.3s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.3s |
2.2s |
2.0s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.1s |
2.2s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha256_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
0.9s |
self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.1s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.4s |
2.2s |
2.3s |
2.3s |
2.2s |
2.2s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.04s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.04s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 106.37s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.29s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 105.09s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 102.49s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.05s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.18s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.64s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.96s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.82s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.66s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.10s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.09s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.09s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
19,945 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,937 UART: csrng::test_entropy_src_seed...[ok]
439,150 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
19,892 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,728 UART: csrng::test_entropy_src_seed...[ok]
438,996 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
19,651 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,715 UART: csrng::test_entropy_src_seed...[ok]
438,958 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
19,762 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,680 UART: csrng::test_entropy_src_seed...[ok]
438,867 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
19,737 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,653 UART: csrng::test_entropy_src_seed...[ok]
438,897 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
23,488 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,962 UART: csrng::test_entropy_src_seed...[ok]
439,195 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
16,729 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
16,660 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
16,671 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
16,650 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
16,828 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
16,897 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
15,836 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
15,980 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
16,040 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
16,121 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
15,800 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
15,814 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
15,975 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
15,955 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
15,873 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
16,057 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
15,856 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
16,566 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
15,788 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
15,840 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
15,943 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
16,145 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,023 writing to cptra_bootfsm_go
17,638 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,947 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
16,061 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
16,035 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
15,704 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
15,676 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
16,010 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
16,030 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
15,877 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
15,714 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
16,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
15,849 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
15,879 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
15,671 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
16,749 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
16,257 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
15,630 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
15,784 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
15,980 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
15,879 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
15,755 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
15,910 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
15,865 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
16,046 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
15,883 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
15,679 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
15,917 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
15,895 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
15,692 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
16,002 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
15,832 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
16,024 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
16,059 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
15,962 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
15,938 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
16,105 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
16,119 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,806 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
16,003 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
15,900 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
15,902 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
16,098 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
16,210 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
15,802 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
15,801 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
16,006 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
16,138 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
15,968 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
16,042 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
16,024 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
15,928 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
15,884 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
15,881 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
15,999 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
16,090 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
15,963 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
15,902 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
15,789 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,857 writing to cptra_bootfsm_go
16,647 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
15,829 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
16,076 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
15,857 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
16,122 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
15,968 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
15,935 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
15,844 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
15,812 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
15,716 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
16,107 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
15,968 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
15,957 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
16,072 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
15,726 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
15,867 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
21,943 UART: doe::test_decrypt...[ok]
13,221,051 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
21,697 UART: doe::test_decrypt...[ok]
13,245,469 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
21,916 UART: doe::test_decrypt...[ok]
13,459,731 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
21,929 UART: doe::test_decrypt...[ok]
13,458,374 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
21,720 UART: doe::test_decrypt...[ok]
9,943,980 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
21,770 UART: doe::test_decrypt...[ok]
9,950,691 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
21,906 UART: doe::test_decrypt...[ok]
10,197,441 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
21,887 UART: doe::test_decrypt...[ok]
10,189,994 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
21,770 UART: doe::test_decrypt...[ok]
9,933,842 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
21,699 UART: doe::test_decrypt...[ok]
9,937,945 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
22,011 UART: doe::test_decrypt...[ok]
10,194,542 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
21,932 UART: doe::test_decrypt...[ok]
10,192,568 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,393 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,467 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,853 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,963 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,567 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,715 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,553 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,385 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,463 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,927 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,675 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,389 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
22,163 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
22,383 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
22,575 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
22,636 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
22,127 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
22,097 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
22,402 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
22,596 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
22,096 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
22,395 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
22,395 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
22,587 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
29,522 UART: ecc384::test_kat...[ok]
3,329,200 UART: ecc384::test_gen_key_pair...[ok]
6,614,448 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,897,456 UART: ecc384::test_sign...[ok]
12,197,773 UART: ecc384::test_verify...[ok]
15,791,819 UART: ecc384::test_verify_r...[ok]
19,371,692 UART: ecc384::test_verify_failure...[ok]
22,960,379 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,834,130 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,986,489 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
29,501 UART: ecc384::test_kat...[ok]
3,330,635 UART: ecc384::test_gen_key_pair...[ok]
6,616,382 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,899,018 UART: ecc384::test_sign...[ok]
12,195,294 UART: ecc384::test_verify...[ok]
15,793,568 UART: ecc384::test_verify_r...[ok]
19,373,127 UART: ecc384::test_verify_failure...[ok]
22,958,579 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,831,742 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,988,666 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
29,850 UART: ecc384::test_kat...[ok]
3,696,182 UART: ecc384::test_gen_key_pair...[ok]
6,955,428 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,214,412 UART: ecc384::test_sign...[ok]
12,501,786 UART: ecc384::test_verify...[ok]
16,082,566 UART: ecc384::test_verify_r...[ok]
23,837,017 UART: ecc384::test_verify_failure...[ok]
27,418,881 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,253,950 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,343,419 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
29,895 UART: ecc384::test_kat...[ok]
3,696,534 UART: ecc384::test_gen_key_pair...[ok]
6,952,461 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,205,567 UART: ecc384::test_sign...[ok]
12,489,991 UART: ecc384::test_verify...[ok]
16,066,624 UART: ecc384::test_verify_r...[ok]
23,839,268 UART: ecc384::test_verify_failure...[ok]
27,418,570 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,251,677 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,331,864 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
29,492 UART: ecc384::test_kat...[ok]
2,498,279 UART: ecc384::test_gen_key_pair...[ok]
4,952,003 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,536 UART: ecc384::test_sign...[ok]
9,127,133 UART: ecc384::test_verify...[ok]
11,821,595 UART: ecc384::test_verify_r...[ok]
14,505,799 UART: ecc384::test_verify_failure...[ok]
17,196,179 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,337,133 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,934,381 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
29,533 UART: ecc384::test_kat...[ok]
2,496,034 UART: ecc384::test_gen_key_pair...[ok]
4,951,833 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,400,804 UART: ecc384::test_sign...[ok]
9,124,557 UART: ecc384::test_verify...[ok]
11,816,807 UART: ecc384::test_verify_r...[ok]
14,504,614 UART: ecc384::test_verify_failure...[ok]
17,192,058 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,333,568 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,929,962 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
29,885 UART: ecc384::test_kat...[ok]
2,881,560 UART: ecc384::test_gen_key_pair...[ok]
5,324,607 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,763,628 UART: ecc384::test_sign...[ok]
9,477,124 UART: ecc384::test_verify...[ok]
12,156,507 UART: ecc384::test_verify_r...[ok]
14,835,194 UART: ecc384::test_verify_failure...[ok]
22,935,145 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,051,754 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,605,052 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
29,762 UART: ecc384::test_kat...[ok]
2,880,978 UART: ecc384::test_gen_key_pair...[ok]
5,322,924 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,764,325 UART: ecc384::test_sign...[ok]
9,477,759 UART: ecc384::test_verify...[ok]
12,156,830 UART: ecc384::test_verify_r...[ok]
14,834,516 UART: ecc384::test_verify_failure...[ok]
23,002,629 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,121,552 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,673,731 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
29,909 UART: ecc384::test_kat...[ok]
2,500,014 UART: ecc384::test_gen_key_pair...[ok]
4,956,170 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,402,937 UART: ecc384::test_sign...[ok]
9,124,815 UART: ecc384::test_verify...[ok]
11,820,787 UART: ecc384::test_verify_r...[ok]
14,505,774 UART: ecc384::test_verify_failure...[ok]
17,190,965 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,335,644 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,928,024 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
29,501 UART: ecc384::test_kat...[ok]
2,501,828 UART: ecc384::test_gen_key_pair...[ok]
4,954,173 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,405,225 UART: ecc384::test_sign...[ok]
9,128,102 UART: ecc384::test_verify...[ok]
11,821,848 UART: ecc384::test_verify_r...[ok]
14,504,295 UART: ecc384::test_verify_failure...[ok]
17,195,060 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,336,800 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,928,736 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
29,972 UART: ecc384::test_kat...[ok]
2,882,201 UART: ecc384::test_gen_key_pair...[ok]
5,323,667 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,766,833 UART: ecc384::test_sign...[ok]
9,479,825 UART: ecc384::test_verify...[ok]
12,157,843 UART: ecc384::test_verify_r...[ok]
14,836,713 UART: ecc384::test_verify_failure...[ok]
22,939,952 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,058,122 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,612,087 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,754 writing to cptra_bootfsm_go
31,443 UART: ecc384::test_kat...[ok]
2,883,896 UART: ecc384::test_gen_key_pair...[ok]
5,327,788 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,770,633 UART: ecc384::test_sign...[ok]
9,482,233 UART: ecc384::test_verify...[ok]
12,157,236 UART: ecc384::test_verify_r...[ok]
14,832,690 UART: ecc384::test_verify_failure...[ok]
22,941,460 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,061,443 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,617,187 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,471 UART: ecc384::test_gen_key_pair...[ok]
25,703 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,333 UART: ecc384::test_sign...[ok]
43,043 UART: ecc384::test_verify...[ok]
52,023 UART: ecc384::test_verify_r...[ok]
60,390 UART: ecc384::test_verify_failure...[ok]
69,122 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,396 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,809 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,309 UART: ecc384::test_gen_key_pair...[ok]
25,101 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,331 UART: ecc384::test_sign...[ok]
42,155 UART: ecc384::test_verify...[ok]
51,053 UART: ecc384::test_verify_r...[ok]
59,810 UART: ecc384::test_verify_failure...[ok]
68,434 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,010 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,949 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,611 UART: ecc384::test_gen_key_pair...[ok]
25,917 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,353 UART: ecc384::test_sign...[ok]
43,127 UART: ecc384::test_verify...[ok]
52,351 UART: ecc384::test_verify_r...[ok]
60,948 UART: ecc384::test_verify_failure...[ok]
69,792 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,758 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,439 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,075 UART: ecc384::test_gen_key_pair...[ok]
26,377 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,875 UART: ecc384::test_sign...[ok]
43,953 UART: ecc384::test_verify...[ok]
53,415 UART: ecc384::test_verify_r...[ok]
61,924 UART: ecc384::test_verify_failure...[ok]
71,152 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,438 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,415 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,227 UART: ecc384::test_gen_key_pair...[ok]
26,149 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,555 UART: ecc384::test_sign...[ok]
42,855 UART: ecc384::test_verify...[ok]
51,943 UART: ecc384::test_verify_r...[ok]
60,336 UART: ecc384::test_verify_failure...[ok]
69,556 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,634 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,475 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,401 UART: ecc384::test_gen_key_pair...[ok]
25,165 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,527 UART: ecc384::test_sign...[ok]
42,113 UART: ecc384::test_verify...[ok]
51,167 UART: ecc384::test_verify_r...[ok]
59,672 UART: ecc384::test_verify_failure...[ok]
68,596 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,636 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,371 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,841 UART: ecc384::test_gen_key_pair...[ok]
25,989 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,309 UART: ecc384::test_sign...[ok]
43,309 UART: ecc384::test_verify...[ok]
52,379 UART: ecc384::test_verify_r...[ok]
61,046 UART: ecc384::test_verify_failure...[ok]
69,740 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,620 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,905 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,711 UART: ecc384::test_gen_key_pair...[ok]
25,429 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,067 UART: ecc384::test_sign...[ok]
42,797 UART: ecc384::test_verify...[ok]
51,833 UART: ecc384::test_verify_r...[ok]
60,666 UART: ecc384::test_verify_failure...[ok]
69,560 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,974 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,979 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,617 UART: ecc384::test_gen_key_pair...[ok]
25,185 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,541 UART: ecc384::test_sign...[ok]
42,455 UART: ecc384::test_verify...[ok]
51,365 UART: ecc384::test_verify_r...[ok]
59,818 UART: ecc384::test_verify_failure...[ok]
68,264 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,156 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,707 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,171 UART: ecc384::test_gen_key_pair...[ok]
25,363 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,321 UART: ecc384::test_sign...[ok]
42,121 UART: ecc384::test_verify...[ok]
51,163 UART: ecc384::test_verify_r...[ok]
59,554 UART: ecc384::test_verify_failure...[ok]
68,284 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,850 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
113,649 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,379 UART: ecc384::test_gen_key_pair...[ok]
25,523 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,743 UART: ecc384::test_sign...[ok]
42,645 UART: ecc384::test_verify...[ok]
51,713 UART: ecc384::test_verify_r...[ok]
60,392 UART: ecc384::test_verify_failure...[ok]
69,320 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,898 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,871 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,941 UART: ecc384::test_gen_key_pair...[ok]
25,985 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,553 UART: ecc384::test_sign...[ok]
43,247 UART: ecc384::test_verify...[ok]
52,111 UART: ecc384::test_verify_r...[ok]
61,038 UART: ecc384::test_verify_failure...[ok]
69,768 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,936 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,073 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
19,342 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
19,205 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
20,339 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
19,625 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
19,272 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
19,519 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
19,523 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
19,544 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
19,279 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
19,195 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
19,615 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
19,662 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
13,691 UART: error_reporter::test_report_fw_error...[ok]
16,709 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
13,560 UART: error_reporter::test_report_fw_error...[ok]
16,564 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
14,080 UART: error_reporter::test_report_fw_error...[ok]
17,073 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
13,822 UART: error_reporter::test_report_fw_error...[ok]
16,828 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
13,709 UART: error_reporter::test_report_fw_error...[ok]
16,707 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
13,767 UART: error_reporter::test_report_fw_error...[ok]
16,702 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
13,823 UART: error_reporter::test_report_fw_error...[ok]
16,822 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
13,925 UART: error_reporter::test_report_fw_error...[ok]
16,857 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
13,691 UART: error_reporter::test_report_fw_error...[ok]
16,712 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,828 writing to cptra_bootfsm_go
13,621 UART: error_reporter::test_report_fw_error...[ok]
16,606 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
14,215 UART: error_reporter::test_report_fw_error...[ok]
18,617 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
13,934 UART: error_reporter::test_report_fw_error...[ok]
16,865 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
30,672 UART: hmac384::test_kat...[ok]
70,933 UART: hmac384::test_hmac0...[ok]
88,663 UART: hmac384::test_hmac1...[ok]
109,750 UART: hmac384::test_hmac2...[ok]
6,696,496 UART: hmac384::test_hmac3...[ok]
13,289,402 UART: hmac384::test_hmac4...[ok]
19,879,098 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,468,214 UART: hmac384::test_hmac5...[ok]
29,839,494 UART: hmac384::test_kdf0...[ok]
33,168,309 UART: hmac384::test_kdf1...[ok]
36,494,355 UART: hmac384::test_kdf2...[ok]
36,521,043 UART: hmac384::test_hmac_multi_block...[ok]
36,538,761 UART: hmac384::test_hmac_exact_single_block...[ok]
36,560,446 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
31,046 UART: hmac384::test_kat...[ok]
71,107 UART: hmac384::test_hmac0...[ok]
88,431 UART: hmac384::test_hmac1...[ok]
109,949 UART: hmac384::test_hmac2...[ok]
6,677,844 UART: hmac384::test_hmac3...[ok]
13,244,581 UART: hmac384::test_hmac4...[ok]
19,813,360 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,385,388 UART: hmac384::test_hmac5...[ok]
29,735,103 UART: hmac384::test_kdf0...[ok]
33,061,983 UART: hmac384::test_kdf1...[ok]
36,388,023 UART: hmac384::test_kdf2...[ok]
36,416,149 UART: hmac384::test_hmac_multi_block...[ok]
36,434,413 UART: hmac384::test_hmac_exact_single_block...[ok]
36,455,356 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
31,295 UART: hmac384::test_kat...[ok]
454,441 UART: hmac384::test_hmac0...[ok]
654,452 UART: hmac384::test_hmac1...[ok]
859,213 UART: hmac384::test_hmac2...[ok]
7,564,137 UART: hmac384::test_hmac3...[ok]
14,076,658 UART: hmac384::test_hmac4...[ok]
20,590,029 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,102,687 UART: hmac384::test_hmac5...[ok]
30,380,104 UART: hmac384::test_kdf0...[ok]
33,650,243 UART: hmac384::test_kdf1...[ok]
36,920,172 UART: hmac384::test_kdf2...[ok]
36,935,905 UART: hmac384::test_hmac_multi_block...[ok]
40,332,692 UART: hmac384::test_hmac_exact_single_block...[ok]
40,536,509 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
31,059 UART: hmac384::test_kat...[ok]
455,741 UART: hmac384::test_hmac0...[ok]
654,613 UART: hmac384::test_hmac1...[ok]
859,369 UART: hmac384::test_hmac2...[ok]
7,560,749 UART: hmac384::test_hmac3...[ok]
14,068,327 UART: hmac384::test_hmac4...[ok]
20,574,903 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,090,167 UART: hmac384::test_hmac5...[ok]
30,366,182 UART: hmac384::test_kdf0...[ok]
33,632,357 UART: hmac384::test_kdf1...[ok]
36,901,937 UART: hmac384::test_kdf2...[ok]
36,916,283 UART: hmac384::test_hmac_multi_block...[ok]
40,326,867 UART: hmac384::test_hmac_exact_single_block...[ok]
40,532,010 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
31,262 UART: hmac384::test_kat...[ok]
70,228 UART: hmac384::test_hmac0...[ok]
88,438 UART: hmac384::test_hmac1...[ok]
109,873 UART: hmac384::test_hmac2...[ok]
5,033,134 UART: hmac384::test_hmac3...[ok]
9,962,049 UART: hmac384::test_hmac4...[ok]
14,886,348 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,812,513 UART: hmac384::test_hmac5...[ok]
22,350,145 UART: hmac384::test_kdf0...[ok]
24,847,348 UART: hmac384::test_kdf1...[ok]
27,342,603 UART: hmac384::test_kdf2...[ok]
27,369,329 UART: hmac384::test_hmac_multi_block...[ok]
27,387,836 UART: hmac384::test_hmac_exact_single_block...[ok]
27,407,953 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
30,893 UART: hmac384::test_kat...[ok]
70,062 UART: hmac384::test_hmac0...[ok]
87,555 UART: hmac384::test_hmac1...[ok]
108,988 UART: hmac384::test_hmac2...[ok]
5,045,267 UART: hmac384::test_hmac3...[ok]
9,973,806 UART: hmac384::test_hmac4...[ok]
14,901,810 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,825,965 UART: hmac384::test_hmac5...[ok]
22,370,169 UART: hmac384::test_kdf0...[ok]
24,867,714 UART: hmac384::test_kdf1...[ok]
27,363,274 UART: hmac384::test_kdf2...[ok]
27,387,032 UART: hmac384::test_hmac_multi_block...[ok]
27,405,750 UART: hmac384::test_hmac_exact_single_block...[ok]
27,428,394 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
31,066 UART: hmac384::test_kat...[ok]
454,913 UART: hmac384::test_hmac0...[ok]
652,527 UART: hmac384::test_hmac1...[ok]
857,654 UART: hmac384::test_hmac2...[ok]
5,931,841 UART: hmac384::test_hmac3...[ok]
10,808,859 UART: hmac384::test_hmac4...[ok]
15,682,950 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,562,715 UART: hmac384::test_hmac5...[ok]
23,018,213 UART: hmac384::test_kdf0...[ok]
25,478,267 UART: hmac384::test_kdf1...[ok]
27,933,005 UART: hmac384::test_kdf2...[ok]
27,947,824 UART: hmac384::test_hmac_multi_block...[ok]
27,959,148 UART: hmac384::test_hmac_exact_single_block...[ok]
27,971,717 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
30,816 UART: hmac384::test_kat...[ok]
454,222 UART: hmac384::test_hmac0...[ok]
653,692 UART: hmac384::test_hmac1...[ok]
858,326 UART: hmac384::test_hmac2...[ok]
5,926,937 UART: hmac384::test_hmac3...[ok]
10,807,088 UART: hmac384::test_hmac4...[ok]
15,685,761 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,566,634 UART: hmac384::test_hmac5...[ok]
23,027,641 UART: hmac384::test_kdf0...[ok]
25,484,705 UART: hmac384::test_kdf1...[ok]
27,939,889 UART: hmac384::test_kdf2...[ok]
27,953,825 UART: hmac384::test_hmac_multi_block...[ok]
27,964,710 UART: hmac384::test_hmac_exact_single_block...[ok]
27,976,275 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
30,651 UART: hmac384::test_kat...[ok]
71,033 UART: hmac384::test_hmac0...[ok]
87,767 UART: hmac384::test_hmac1...[ok]
109,061 UART: hmac384::test_hmac2...[ok]
5,034,959 UART: hmac384::test_hmac3...[ok]
9,964,730 UART: hmac384::test_hmac4...[ok]
14,889,180 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,816,332 UART: hmac384::test_hmac5...[ok]
22,356,037 UART: hmac384::test_kdf0...[ok]
24,853,365 UART: hmac384::test_kdf1...[ok]
27,346,562 UART: hmac384::test_kdf2...[ok]
27,374,409 UART: hmac384::test_hmac_multi_block...[ok]
27,392,052 UART: hmac384::test_hmac_exact_single_block...[ok]
27,414,296 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
30,601 UART: hmac384::test_kat...[ok]
70,489 UART: hmac384::test_hmac0...[ok]
87,932 UART: hmac384::test_hmac1...[ok]
109,669 UART: hmac384::test_hmac2...[ok]
5,048,008 UART: hmac384::test_hmac3...[ok]
9,973,076 UART: hmac384::test_hmac4...[ok]
14,900,714 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,830,664 UART: hmac384::test_hmac5...[ok]
22,368,004 UART: hmac384::test_kdf0...[ok]
24,863,579 UART: hmac384::test_kdf1...[ok]
27,358,835 UART: hmac384::test_kdf2...[ok]
27,387,855 UART: hmac384::test_hmac_multi_block...[ok]
27,405,519 UART: hmac384::test_hmac_exact_single_block...[ok]
27,426,731 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
30,897 UART: hmac384::test_kat...[ok]
455,724 UART: hmac384::test_hmac0...[ok]
652,602 UART: hmac384::test_hmac1...[ok]
857,371 UART: hmac384::test_hmac2...[ok]
5,926,774 UART: hmac384::test_hmac3...[ok]
10,801,142 UART: hmac384::test_hmac4...[ok]
15,681,990 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,566,443 UART: hmac384::test_hmac5...[ok]
23,022,803 UART: hmac384::test_kdf0...[ok]
25,477,926 UART: hmac384::test_kdf1...[ok]
27,930,305 UART: hmac384::test_kdf2...[ok]
27,945,042 UART: hmac384::test_hmac_multi_block...[ok]
27,957,522 UART: hmac384::test_hmac_exact_single_block...[ok]
27,968,842 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
30,969 UART: hmac384::test_kat...[ok]
454,900 UART: hmac384::test_hmac0...[ok]
652,377 UART: hmac384::test_hmac1...[ok]
858,329 UART: hmac384::test_hmac2...[ok]
5,928,315 UART: hmac384::test_hmac3...[ok]
10,805,696 UART: hmac384::test_hmac4...[ok]
15,686,816 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,565,716 UART: hmac384::test_hmac5...[ok]
23,025,917 UART: hmac384::test_kdf0...[ok]
25,482,263 UART: hmac384::test_kdf1...[ok]
27,933,910 UART: hmac384::test_kdf2...[ok]
27,949,315 UART: hmac384::test_hmac_multi_block...[ok]
27,960,687 UART: hmac384::test_hmac_exact_single_block...[ok]
27,972,490 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,674 UART: hmac384::test_hmac0...[ok]
13,721 UART: hmac384::test_hmac1...[ok]
17,836 UART: hmac384::test_hmac2...[ok]
37,311 UART: hmac384::test_hmac3...[ok]
57,369 UART: hmac384::test_hmac4...[ok]
77,438 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,215 UART: hmac384::test_hmac5...[ok]
120,509 UART: hmac384::test_kdf0...[ok]
136,671 UART: hmac384::test_kdf1...[ok]
151,853 UART: hmac384::test_kdf2...[ok]
157,480 UART: hmac384::test_hmac_multi_block...[ok]
163,319 UART: hmac384::test_hmac_exact_single_block...[ok]
169,217 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,700 UART: hmac384::test_hmac0...[ok]
13,791 UART: hmac384::test_hmac1...[ok]
18,082 UART: hmac384::test_hmac2...[ok]
38,299 UART: hmac384::test_hmac3...[ok]
58,469 UART: hmac384::test_hmac4...[ok]
78,702 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,407 UART: hmac384::test_hmac5...[ok]
121,709 UART: hmac384::test_kdf0...[ok]
138,599 UART: hmac384::test_kdf1...[ok]
154,347 UART: hmac384::test_kdf2...[ok]
159,912 UART: hmac384::test_hmac_multi_block...[ok]
165,763 UART: hmac384::test_hmac_exact_single_block...[ok]
171,903 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,782 UART: hmac384::test_hmac0...[ok]
14,045 UART: hmac384::test_hmac1...[ok]
18,290 UART: hmac384::test_hmac2...[ok]
38,077 UART: hmac384::test_hmac3...[ok]
57,943 UART: hmac384::test_hmac4...[ok]
77,558 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,735 UART: hmac384::test_hmac5...[ok]
121,879 UART: hmac384::test_kdf0...[ok]
139,051 UART: hmac384::test_kdf1...[ok]
155,141 UART: hmac384::test_kdf2...[ok]
160,814 UART: hmac384::test_hmac_multi_block...[ok]
166,823 UART: hmac384::test_hmac_exact_single_block...[ok]
173,039 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,884 UART: hmac384::test_hmac0...[ok]
13,989 UART: hmac384::test_hmac1...[ok]
18,324 UART: hmac384::test_hmac2...[ok]
38,801 UART: hmac384::test_hmac3...[ok]
58,807 UART: hmac384::test_hmac4...[ok]
78,644 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,669 UART: hmac384::test_hmac5...[ok]
122,137 UART: hmac384::test_kdf0...[ok]
138,197 UART: hmac384::test_kdf1...[ok]
153,893 UART: hmac384::test_kdf2...[ok]
159,622 UART: hmac384::test_hmac_multi_block...[ok]
165,667 UART: hmac384::test_hmac_exact_single_block...[ok]
171,583 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,618 UART: hmac384::test_hmac0...[ok]
13,637 UART: hmac384::test_hmac1...[ok]
17,786 UART: hmac384::test_hmac2...[ok]
37,515 UART: hmac384::test_hmac3...[ok]
56,817 UART: hmac384::test_hmac4...[ok]
75,904 UART: hmac384::test_hmac_kv_multiblock...[ok]
99,071 UART: hmac384::test_hmac5...[ok]
119,101 UART: hmac384::test_kdf0...[ok]
135,561 UART: hmac384::test_kdf1...[ok]
151,547 UART: hmac384::test_kdf2...[ok]
157,052 UART: hmac384::test_hmac_multi_block...[ok]
162,815 UART: hmac384::test_hmac_exact_single_block...[ok]
168,679 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,648 UART: hmac384::test_hmac0...[ok]
13,561 UART: hmac384::test_hmac1...[ok]
17,682 UART: hmac384::test_hmac2...[ok]
37,515 UART: hmac384::test_hmac3...[ok]
57,219 UART: hmac384::test_hmac4...[ok]
77,712 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,669 UART: hmac384::test_hmac5...[ok]
121,219 UART: hmac384::test_kdf0...[ok]
137,721 UART: hmac384::test_kdf1...[ok]
153,573 UART: hmac384::test_kdf2...[ok]
159,028 UART: hmac384::test_hmac_multi_block...[ok]
164,959 UART: hmac384::test_hmac_exact_single_block...[ok]
170,809 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,106 UART: hmac384::test_hmac0...[ok]
14,453 UART: hmac384::test_hmac1...[ok]
18,712 UART: hmac384::test_hmac2...[ok]
38,537 UART: hmac384::test_hmac3...[ok]
58,455 UART: hmac384::test_hmac4...[ok]
78,970 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,369 UART: hmac384::test_hmac5...[ok]
123,477 UART: hmac384::test_kdf0...[ok]
140,169 UART: hmac384::test_kdf1...[ok]
156,025 UART: hmac384::test_kdf2...[ok]
161,702 UART: hmac384::test_hmac_multi_block...[ok]
167,563 UART: hmac384::test_hmac_exact_single_block...[ok]
173,497 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,792 UART: hmac384::test_hmac0...[ok]
13,875 UART: hmac384::test_hmac1...[ok]
18,084 UART: hmac384::test_hmac2...[ok]
37,763 UART: hmac384::test_hmac3...[ok]
57,803 UART: hmac384::test_hmac4...[ok]
77,756 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,765 UART: hmac384::test_hmac5...[ok]
121,817 UART: hmac384::test_kdf0...[ok]
138,599 UART: hmac384::test_kdf1...[ok]
154,001 UART: hmac384::test_kdf2...[ok]
159,918 UART: hmac384::test_hmac_multi_block...[ok]
165,923 UART: hmac384::test_hmac_exact_single_block...[ok]
171,955 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,546 UART: hmac384::test_hmac0...[ok]
13,643 UART: hmac384::test_hmac1...[ok]
17,570 UART: hmac384::test_hmac2...[ok]
37,643 UART: hmac384::test_hmac3...[ok]
57,105 UART: hmac384::test_hmac4...[ok]
76,454 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,295 UART: hmac384::test_hmac5...[ok]
120,029 UART: hmac384::test_kdf0...[ok]
136,601 UART: hmac384::test_kdf1...[ok]
151,991 UART: hmac384::test_kdf2...[ok]
157,534 UART: hmac384::test_hmac_multi_block...[ok]
163,469 UART: hmac384::test_hmac_exact_single_block...[ok]
169,333 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,766 UART: hmac384::test_hmac0...[ok]
13,851 UART: hmac384::test_hmac1...[ok]
17,856 UART: hmac384::test_hmac2...[ok]
37,665 UART: hmac384::test_hmac3...[ok]
57,411 UART: hmac384::test_hmac4...[ok]
77,306 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,651 UART: hmac384::test_hmac5...[ok]
121,315 UART: hmac384::test_kdf0...[ok]
138,099 UART: hmac384::test_kdf1...[ok]
153,815 UART: hmac384::test_kdf2...[ok]
159,444 UART: hmac384::test_hmac_multi_block...[ok]
165,367 UART: hmac384::test_hmac_exact_single_block...[ok]
171,303 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,056 UART: hmac384::test_hmac0...[ok]
14,213 UART: hmac384::test_hmac1...[ok]
18,302 UART: hmac384::test_hmac2...[ok]
37,927 UART: hmac384::test_hmac3...[ok]
57,349 UART: hmac384::test_hmac4...[ok]
77,356 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,939 UART: hmac384::test_hmac5...[ok]
122,249 UART: hmac384::test_kdf0...[ok]
138,817 UART: hmac384::test_kdf1...[ok]
155,165 UART: hmac384::test_kdf2...[ok]
161,110 UART: hmac384::test_hmac_multi_block...[ok]
167,197 UART: hmac384::test_hmac_exact_single_block...[ok]
173,219 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,966 UART: hmac384::test_hmac0...[ok]
14,021 UART: hmac384::test_hmac1...[ok]
18,134 UART: hmac384::test_hmac2...[ok]
38,213 UART: hmac384::test_hmac3...[ok]
58,057 UART: hmac384::test_hmac4...[ok]
77,958 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,179 UART: hmac384::test_hmac5...[ok]
122,227 UART: hmac384::test_kdf0...[ok]
138,821 UART: hmac384::test_kdf1...[ok]
154,325 UART: hmac384::test_kdf2...[ok]
159,992 UART: hmac384::test_hmac_multi_block...[ok]
165,997 UART: hmac384::test_hmac_exact_single_block...[ok]
172,029 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
23,698 UART: test_lms_24::test_coefficient...[ok]
26,410 UART: test_lms_24::test_get_lms_parameters...[ok]
29,379 UART: test_lms_24::test_hash_message_24...[ok]
42,098 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
23,541 UART: test_lms_24::test_coefficient...[ok]
26,273 UART: test_lms_24::test_get_lms_parameters...[ok]
29,241 UART: test_lms_24::test_hash_message_24...[ok]
42,028 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
23,895 UART: test_lms_24::test_coefficient...[ok]
27,200 UART: test_lms_24::test_get_lms_parameters...[ok]
29,598 UART: test_lms_24::test_hash_message_24...[ok]
42,367 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
23,864 UART: test_lms_24::test_coefficient...[ok]
26,607 UART: test_lms_24::test_get_lms_parameters...[ok]
29,561 UART: test_lms_24::test_hash_message_24...[ok]
42,324 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
23,654 UART: test_lms_24::test_coefficient...[ok]
26,801 UART: test_lms_24::test_get_lms_parameters...[ok]
30,294 UART: test_lms_24::test_hash_message_24...[ok]
43,647 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
23,949 UART: test_lms_24::test_coefficient...[ok]
27,059 UART: test_lms_24::test_get_lms_parameters...[ok]
30,482 UART: test_lms_24::test_hash_message_24...[ok]
43,932 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
23,982 UART: test_lms_24::test_coefficient...[ok]
27,067 UART: test_lms_24::test_get_lms_parameters...[ok]
30,542 UART: test_lms_24::test_hash_message_24...[ok]
43,943 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
24,197 UART: test_lms_24::test_coefficient...[ok]
27,374 UART: test_lms_24::test_get_lms_parameters...[ok]
31,771 UART: test_lms_24::test_hash_message_24...[ok]
44,190 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
23,665 UART: test_lms_24::test_coefficient...[ok]
26,795 UART: test_lms_24::test_get_lms_parameters...[ok]
30,230 UART: test_lms_24::test_hash_message_24...[ok]
43,694 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
23,694 UART: test_lms_24::test_coefficient...[ok]
26,820 UART: test_lms_24::test_get_lms_parameters...[ok]
30,303 UART: test_lms_24::test_hash_message_24...[ok]
43,730 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
24,043 UART: test_lms_24::test_coefficient...[ok]
27,141 UART: test_lms_24::test_get_lms_parameters...[ok]
30,601 UART: test_lms_24::test_hash_message_24...[ok]
44,031 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
23,995 UART: test_lms_24::test_coefficient...[ok]
27,106 UART: test_lms_24::test_get_lms_parameters...[ok]
30,546 UART: test_lms_24::test_hash_message_24...[ok]
43,936 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
22,638 UART: test_lms_32::test_hash_message_32...[ok]
41,859 UART: test_lms_32::test_ots_32...[ok]
21,830,918 UART: test_lms_32::test_lms_lower_32...[ok]
65,499,965 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
22,534 UART: test_lms_32::test_hash_message_32...[ok]
41,753 UART: test_lms_32::test_ots_32...[ok]
21,830,843 UART: test_lms_32::test_lms_lower_32...[ok]
65,499,885 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
23,051 UART: test_lms_32::test_hash_message_32...[ok]
42,206 UART: test_lms_32::test_ots_32...[ok]
21,831,375 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,494 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
23,039 UART: test_lms_32::test_hash_message_32...[ok]
42,208 UART: test_lms_32::test_ots_32...[ok]
21,831,319 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,352 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
22,856 UART: test_lms_32::test_hash_message_32...[ok]
42,156 UART: test_lms_32::test_ots_32...[ok]
653,152 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,020 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
22,857 UART: test_lms_32::test_hash_message_32...[ok]
42,147 UART: test_lms_32::test_ots_32...[ok]
653,160 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,069 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
23,437 UART: test_lms_32::test_hash_message_32...[ok]
42,661 UART: test_lms_32::test_ots_32...[ok]
653,719 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,589 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
23,343 UART: test_lms_32::test_hash_message_32...[ok]
42,574 UART: test_lms_32::test_ots_32...[ok]
653,614 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,534 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
22,903 UART: test_lms_32::test_hash_message_32...[ok]
42,137 UART: test_lms_32::test_ots_32...[ok]
653,199 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,088 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
23,273 UART: test_lms_32::test_hash_message_32...[ok]
42,559 UART: test_lms_32::test_ots_32...[ok]
653,585 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,453 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
23,075 UART: test_lms_32::test_hash_message_32...[ok]
42,307 UART: test_lms_32::test_ots_32...[ok]
653,377 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,212 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
23,354 UART: test_lms_32::test_hash_message_32...[ok]
42,635 UART: test_lms_32::test_ots_32...[ok]
653,714 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,514 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,340 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,475 UART: cmd: 0x50000000
19,294 UART: dlen: 8
20,364 >>> mbox cmd response: success
20,800 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,688 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,393 UART: cmd: 0x50000000
29,282 UART: dlen: 7
30,352 >>> mbox cmd response: success
30,831 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,788 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,486 UART: cmd: 0x50000000
39,369 UART: dlen: 0
40,366 >>> mbox cmd response: success
40,839 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,120 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,817 UART: cmd: 0x50000001
49,698 UART: dlen: 5
50,746 >>> mbox cmd response: success
51,219 UART: buf: [01, 23, 45, 67, 89]
55,852 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,553 UART: cmd: 0x50000001
58,432 UART: dlen: 6
59,480 >>> mbox cmd response: success
59,973 UART: buf: [01, 23, 45, 67, 89]
64,564 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,272 UART: cmd: 0x50000001
67,187 UART: dlen: 9
68,200 >>> mbox cmd response: success
68,680 UART: buf: [01, 23, 45, 67, 89]
73,291 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,003 UART: cmd: 0x60000000
75,922 UART: dlen: 16
77,414 UART: buf: [67452301, efcdab89]
80,916 UART: buf: [33221100, 77665544]
84,072 >>> mbox cmd response: success
84,340 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,042 UART: cmd: 0x60000000
86,927 UART: dlen: 13
88,406 UART: buf: [67452301, efcdab89]
91,916 UART: buf: [33221100, 00000044]
95,350 >>> mbox cmd response: success
95,615 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,309 UART: cmd: 0x60000000
98,196 UART: dlen: 12
99,676 UART: buf: [67452301, efcdab89]
103,170 UART: buf: [33221100, 00000000]
106,542 >>> mbox cmd response: success
106,802 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,479 UART: cmd: 0x60000000
109,358 UART: dlen: 0
110,406 >>> mbox cmd response: success
110,663 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,344 UART: cmd: 0x70000000
112,936 >>> mbox cmd response: success
113,195 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,920 UART: cmd: 0x60000000
115,804 UART: dlen: 5
117,289 UART: buf: [04050607, 00000003]
120,765 >>> mbox cmd response: success
121,028 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,710 UART: cmd: 0x80000000
123,303 >>> mbox cmd response: failed
123,613 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,299 UART: cmd: 0x60000000
126,180 UART: dlen: 5
127,673 UART: buf: [04050607, 00000003]
131,148 >>> mbox cmd response: success
131,406 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,092 UART: cmd: 0x90000000
133,979 UART: dlen: 8
135,417 UART: buf: [08070605]
137,518 >>> mbox cmd response: success
137,780 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,456 UART: cmd: 0xa0000000
140,019 >>> mbox cmd response data (4 bytes)
140,421 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,117 UART: cmd: 0xb0000000
142,996 UART: dlen: 6
144,477 UART: buf: [0c0d0e0f, 00000a0b]
148,109 >>> mbox cmd response data (2 bytes)
148,508 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,195 UART: cmd: 0xc0000000
150,876 >>> mbox cmd response data (9 bytes)
151,276 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,957 UART: cmd: 0xd0000000
153,522 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,357 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,498 UART: cmd: 0x50000000
19,347 UART: dlen: 8
20,357 >>> mbox cmd response: success
20,848 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,720 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,421 UART: cmd: 0x50000000
29,306 UART: dlen: 7
30,369 >>> mbox cmd response: success
30,841 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,797 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,486 UART: cmd: 0x50000000
39,364 UART: dlen: 0
40,361 >>> mbox cmd response: success
40,834 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,104 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,829 UART: cmd: 0x50000001
49,712 UART: dlen: 5
50,766 >>> mbox cmd response: success
51,238 UART: buf: [01, 23, 45, 67, 89]
55,881 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,582 UART: cmd: 0x50000001
58,465 UART: dlen: 6
59,585 >>> mbox cmd response: success
60,020 UART: buf: [01, 23, 45, 67, 89]
64,642 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,353 UART: cmd: 0x50000001
67,244 UART: dlen: 9
68,300 >>> mbox cmd response: success
68,774 UART: buf: [01, 23, 45, 67, 89]
73,361 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,074 UART: cmd: 0x60000000
75,982 UART: dlen: 16
77,465 UART: buf: [67452301, efcdab89]
81,011 UART: buf: [33221100, 77665544]
84,181 >>> mbox cmd response: success
84,458 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,158 UART: cmd: 0x60000000
87,050 UART: dlen: 13
88,537 UART: buf: [67452301, efcdab89]
92,035 UART: buf: [33221100, 00000044]
95,418 >>> mbox cmd response: success
95,687 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,386 UART: cmd: 0x60000000
98,267 UART: dlen: 12
99,744 UART: buf: [67452301, efcdab89]
103,244 UART: buf: [33221100, 00000000]
106,620 >>> mbox cmd response: success
106,901 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,576 UART: cmd: 0x60000000
109,456 UART: dlen: 0
110,495 >>> mbox cmd response: success
110,763 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,441 UART: cmd: 0x70000000
113,032 >>> mbox cmd response: success
113,297 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,982 UART: cmd: 0x60000000
115,859 UART: dlen: 5
117,342 UART: buf: [04050607, 00000003]
120,829 >>> mbox cmd response: success
121,089 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,771 UART: cmd: 0x80000000
123,362 >>> mbox cmd response: failed
123,671 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,377 UART: cmd: 0x60000000
126,257 UART: dlen: 5
127,747 UART: buf: [04050607, 00000003]
131,227 >>> mbox cmd response: success
131,486 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,171 UART: cmd: 0x90000000
134,043 UART: dlen: 8
135,487 UART: buf: [08070605]
137,571 >>> mbox cmd response: success
137,834 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,510 UART: cmd: 0xa0000000
140,109 >>> mbox cmd response data (4 bytes)
140,536 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,231 UART: cmd: 0xb0000000
143,122 UART: dlen: 6
144,617 UART: buf: [0c0d0e0f, 00000a0b]
148,198 >>> mbox cmd response data (2 bytes)
148,577 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,266 UART: cmd: 0xc0000000
150,938 >>> mbox cmd response data (9 bytes)
151,328 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,009 UART: cmd: 0xd0000000
153,575 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,739 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,909 UART: cmd: 0x50000000
19,702 UART: dlen: 8
20,761 >>> mbox cmd response: success
21,214 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,165 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,897 UART: cmd: 0x50000000
29,753 UART: dlen: 7
30,840 >>> mbox cmd response: success
31,333 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,315 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,018 UART: cmd: 0x50000000
39,885 UART: dlen: 0
40,909 >>> mbox cmd response: success
41,337 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,606 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,312 UART: cmd: 0x50000001
50,192 UART: dlen: 5
51,242 >>> mbox cmd response: success
51,739 UART: buf: [01, 23, 45, 67, 89]
56,326 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,033 UART: cmd: 0x50000001
58,930 UART: dlen: 6
59,978 >>> mbox cmd response: success
60,453 UART: buf: [01, 23, 45, 67, 89]
65,034 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,746 UART: cmd: 0x50000001
67,627 UART: dlen: 9
68,676 >>> mbox cmd response: success
69,155 UART: buf: [01, 23, 45, 67, 89]
73,817 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,545 UART: cmd: 0x60000000
76,439 UART: dlen: 16
77,920 UART: buf: [67452301, efcdab89]
81,482 UART: buf: [33221100, 77665544]
84,654 >>> mbox cmd response: success
84,924 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,630 UART: cmd: 0x60000000
87,512 UART: dlen: 13
88,995 UART: buf: [67452301, efcdab89]
92,542 UART: buf: [33221100, 00000044]
95,919 >>> mbox cmd response: success
96,180 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,878 UART: cmd: 0x60000000
98,759 UART: dlen: 12
100,237 UART: buf: [67452301, efcdab89]
103,736 UART: buf: [33221100, 00000000]
107,107 >>> mbox cmd response: success
107,370 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,051 UART: cmd: 0x60000000
109,934 UART: dlen: 0
110,998 >>> mbox cmd response: success
111,259 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,945 UART: cmd: 0x70000000
113,539 >>> mbox cmd response: success
113,797 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,486 UART: cmd: 0x60000000
116,363 UART: dlen: 5
117,848 UART: buf: [04050607, 00000003]
121,394 >>> mbox cmd response: success
121,661 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,371 UART: cmd: 0x80000000
123,968 >>> mbox cmd response: failed
124,282 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,971 UART: cmd: 0x60000000
126,849 UART: dlen: 5
128,338 UART: buf: [04050607, 00000003]
131,843 >>> mbox cmd response: success
132,104 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,792 UART: cmd: 0x90000000
134,670 UART: dlen: 8
136,106 UART: buf: [08070605]
138,192 >>> mbox cmd response: success
138,452 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,128 UART: cmd: 0xa0000000
140,685 >>> mbox cmd response data (4 bytes)
141,093 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,795 UART: cmd: 0xb0000000
143,676 UART: dlen: 6
145,164 UART: buf: [0c0d0e0f, 00000a0b]
148,719 >>> mbox cmd response data (2 bytes)
149,096 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,785 UART: cmd: 0xc0000000
151,469 >>> mbox cmd response data (9 bytes)
151,864 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,572 UART: cmd: 0xd0000000
154,188 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,739 UART: cmd: 0x50000000
19,548 UART: dlen: 8
20,562 >>> mbox cmd response: success
21,023 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,995 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,741 UART: cmd: 0x50000000
29,626 UART: dlen: 7
30,695 >>> mbox cmd response: success
31,135 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,230 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,960 UART: cmd: 0x50000000
39,846 UART: dlen: 0
40,925 >>> mbox cmd response: success
41,316 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,557 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,260 UART: cmd: 0x50000001
50,147 UART: dlen: 5
51,199 >>> mbox cmd response: success
51,674 UART: buf: [01, 23, 45, 67, 89]
56,324 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,027 UART: cmd: 0x50000001
58,922 UART: dlen: 6
59,982 >>> mbox cmd response: success
60,427 UART: buf: [01, 23, 45, 67, 89]
65,068 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,782 UART: cmd: 0x50000001
67,666 UART: dlen: 9
68,717 >>> mbox cmd response: success
69,191 UART: buf: [01, 23, 45, 67, 89]
73,778 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,495 UART: cmd: 0x60000000
76,380 UART: dlen: 16
77,863 UART: buf: [67452301, efcdab89]
81,418 UART: buf: [33221100, 77665544]
84,576 >>> mbox cmd response: success
84,842 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,548 UART: cmd: 0x60000000
87,434 UART: dlen: 13
88,914 UART: buf: [67452301, efcdab89]
92,425 UART: buf: [33221100, 00000044]
95,843 >>> mbox cmd response: success
96,113 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,813 UART: cmd: 0x60000000
98,704 UART: dlen: 12
100,187 UART: buf: [67452301, efcdab89]
103,688 UART: buf: [33221100, 00000000]
107,066 >>> mbox cmd response: success
107,333 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,013 UART: cmd: 0x60000000
109,898 UART: dlen: 0
110,946 >>> mbox cmd response: success
111,210 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,898 UART: cmd: 0x70000000
113,492 >>> mbox cmd response: success
113,750 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,457 UART: cmd: 0x60000000
116,350 UART: dlen: 5
117,842 UART: buf: [04050607, 00000003]
121,333 >>> mbox cmd response: success
121,598 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,284 UART: cmd: 0x80000000
123,876 >>> mbox cmd response: failed
124,178 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,866 UART: cmd: 0x60000000
126,746 UART: dlen: 5
128,238 UART: buf: [04050607, 00000003]
131,727 >>> mbox cmd response: success
131,988 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,678 UART: cmd: 0x90000000
134,565 UART: dlen: 8
135,999 UART: buf: [08070605]
138,121 >>> mbox cmd response: success
138,385 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,063 UART: cmd: 0xa0000000
140,630 >>> mbox cmd response data (4 bytes)
141,037 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,742 UART: cmd: 0xb0000000
143,628 UART: dlen: 6
145,111 UART: buf: [0c0d0e0f, 00000a0b]
148,680 >>> mbox cmd response data (2 bytes)
149,062 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,755 UART: cmd: 0xc0000000
151,430 >>> mbox cmd response data (9 bytes)
151,825 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,511 UART: cmd: 0xd0000000
154,072 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,138 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,311 UART: cmd: 0x50000000
19,103 UART: dlen: 8
20,171 >>> mbox cmd response: success
20,609 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,614 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,345 UART: cmd: 0x50000000
29,197 UART: dlen: 7
30,266 >>> mbox cmd response: success
30,742 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,769 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,457 UART: cmd: 0x50000000
39,337 UART: dlen: 0
40,352 >>> mbox cmd response: success
40,777 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,063 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,764 UART: cmd: 0x50000001
49,651 UART: dlen: 5
50,699 >>> mbox cmd response: success
51,170 UART: buf: [01, 23, 45, 67, 89]
55,815 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,513 UART: cmd: 0x50000001
58,393 UART: dlen: 6
59,447 >>> mbox cmd response: success
59,921 UART: buf: [01, 23, 45, 67, 89]
64,572 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,276 UART: cmd: 0x50000001
67,163 UART: dlen: 9
68,212 >>> mbox cmd response: success
68,703 UART: buf: [01, 23, 45, 67, 89]
73,289 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,996 UART: cmd: 0x60000000
75,928 UART: dlen: 16
77,403 UART: buf: [67452301, efcdab89]
80,950 UART: buf: [33221100, 77665544]
84,043 >>> mbox cmd response: success
84,310 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,007 UART: cmd: 0x60000000
86,892 UART: dlen: 13
88,369 UART: buf: [67452301, efcdab89]
91,910 UART: buf: [33221100, 00000044]
95,286 >>> mbox cmd response: success
95,549 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,237 UART: cmd: 0x60000000
98,111 UART: dlen: 12
99,608 UART: buf: [67452301, efcdab89]
103,100 UART: buf: [33221100, 00000000]
106,504 >>> mbox cmd response: success
106,770 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,444 UART: cmd: 0x60000000
109,319 UART: dlen: 0
110,368 >>> mbox cmd response: success
110,626 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,300 UART: cmd: 0x70000000
112,886 >>> mbox cmd response: success
113,142 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,824 UART: cmd: 0x60000000
115,694 UART: dlen: 5
117,232 UART: buf: [04050607, 00000003]
120,713 >>> mbox cmd response: success
120,971 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,666 UART: cmd: 0x80000000
123,252 >>> mbox cmd response: failed
123,553 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,231 UART: cmd: 0x60000000
126,107 UART: dlen: 5
127,600 UART: buf: [04050607, 00000003]
131,086 >>> mbox cmd response: success
131,350 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,062 UART: cmd: 0x90000000
133,937 UART: dlen: 8
135,425 UART: buf: [08070605]
137,455 >>> mbox cmd response: success
137,713 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,384 UART: cmd: 0xa0000000
139,994 >>> mbox cmd response data (4 bytes)
140,389 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,096 UART: cmd: 0xb0000000
142,982 UART: dlen: 6
144,462 UART: buf: [0c0d0e0f, 00000a0b]
148,026 >>> mbox cmd response data (2 bytes)
148,401 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,079 UART: cmd: 0xc0000000
150,749 >>> mbox cmd response data (9 bytes)
151,134 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,809 UART: cmd: 0xd0000000
153,362 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,364 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,511 UART: cmd: 0x50000000
19,366 UART: dlen: 8
20,388 >>> mbox cmd response: success
20,875 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,738 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,438 UART: cmd: 0x50000000
29,325 UART: dlen: 7
30,387 >>> mbox cmd response: success
30,862 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,820 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,509 UART: cmd: 0x50000000
39,389 UART: dlen: 0
40,384 >>> mbox cmd response: success
40,855 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,128 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,823 UART: cmd: 0x50000001
49,706 UART: dlen: 5
50,754 >>> mbox cmd response: success
51,227 UART: buf: [01, 23, 45, 67, 89]
55,927 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,659 UART: cmd: 0x50000001
58,546 UART: dlen: 6
59,596 >>> mbox cmd response: success
60,069 UART: buf: [01, 23, 45, 67, 89]
64,703 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,401 UART: cmd: 0x50000001
67,277 UART: dlen: 9
68,322 >>> mbox cmd response: success
68,793 UART: buf: [01, 23, 45, 67, 89]
73,425 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,129 UART: cmd: 0x60000000
76,012 UART: dlen: 16
77,491 UART: buf: [67452301, efcdab89]
81,041 UART: buf: [33221100, 77665544]
84,195 >>> mbox cmd response: success
84,457 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,174 UART: cmd: 0x60000000
87,106 UART: dlen: 13
88,584 UART: buf: [67452301, efcdab89]
92,066 UART: buf: [33221100, 00000044]
95,436 >>> mbox cmd response: success
95,697 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,383 UART: cmd: 0x60000000
98,260 UART: dlen: 12
99,735 UART: buf: [67452301, efcdab89]
103,278 UART: buf: [33221100, 00000000]
106,638 >>> mbox cmd response: success
106,896 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,586 UART: cmd: 0x60000000
109,460 UART: dlen: 0
110,505 >>> mbox cmd response: success
110,764 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,460 UART: cmd: 0x70000000
113,051 >>> mbox cmd response: success
113,308 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,985 UART: cmd: 0x60000000
115,860 UART: dlen: 5
117,343 UART: buf: [04050607, 00000003]
120,876 >>> mbox cmd response: success
121,134 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,807 UART: cmd: 0x80000000
123,392 >>> mbox cmd response: failed
123,691 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,373 UART: cmd: 0x60000000
126,248 UART: dlen: 5
127,739 UART: buf: [04050607, 00000003]
131,232 >>> mbox cmd response: success
131,491 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,191 UART: cmd: 0x90000000
134,067 UART: dlen: 8
135,878 UART: buf: [08070605]
137,644 >>> mbox cmd response: success
137,915 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,587 UART: cmd: 0xa0000000
140,150 >>> mbox cmd response data (4 bytes)
140,559 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,252 UART: cmd: 0xb0000000
143,128 UART: dlen: 6
144,615 UART: buf: [0c0d0e0f, 00000a0b]
148,217 >>> mbox cmd response data (2 bytes)
148,590 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,270 UART: cmd: 0xc0000000
150,939 >>> mbox cmd response data (9 bytes)
151,323 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,018 UART: cmd: 0xd0000000
153,578 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,454 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,595 UART: cmd: 0x50000000
19,431 UART: dlen: 8
20,457 >>> mbox cmd response: success
20,968 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,875 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,593 UART: cmd: 0x50000000
29,487 UART: dlen: 7
30,545 >>> mbox cmd response: success
30,994 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,144 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,869 UART: cmd: 0x50000000
39,772 UART: dlen: 0
40,813 >>> mbox cmd response: success
41,199 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,468 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,162 UART: cmd: 0x50000001
50,042 UART: dlen: 5
51,093 >>> mbox cmd response: success
51,564 UART: buf: [01, 23, 45, 67, 89]
56,207 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,901 UART: cmd: 0x50000001
58,775 UART: dlen: 6
59,819 >>> mbox cmd response: success
60,292 UART: buf: [01, 23, 45, 67, 89]
64,951 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,651 UART: cmd: 0x50000001
67,533 UART: dlen: 9
68,586 >>> mbox cmd response: success
69,058 UART: buf: [01, 23, 45, 67, 89]
73,649 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,354 UART: cmd: 0x60000000
76,234 UART: dlen: 16
77,714 UART: buf: [67452301, efcdab89]
81,308 UART: buf: [33221100, 77665544]
84,399 >>> mbox cmd response: success
84,659 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,351 UART: cmd: 0x60000000
87,280 UART: dlen: 13
88,753 UART: buf: [67452301, efcdab89]
92,245 UART: buf: [33221100, 00000044]
95,640 >>> mbox cmd response: success
95,900 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,588 UART: cmd: 0x60000000
98,464 UART: dlen: 12
99,992 UART: buf: [67452301, efcdab89]
103,477 UART: buf: [33221100, 00000000]
106,846 >>> mbox cmd response: success
107,107 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,773 UART: cmd: 0x60000000
109,642 UART: dlen: 0
110,685 >>> mbox cmd response: success
110,942 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,619 UART: cmd: 0x70000000
113,214 >>> mbox cmd response: success
113,466 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,144 UART: cmd: 0x60000000
116,045 UART: dlen: 5
117,551 UART: buf: [04050607, 00000003]
121,035 >>> mbox cmd response: success
121,300 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,978 UART: cmd: 0x80000000
123,566 >>> mbox cmd response: failed
123,870 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,555 UART: cmd: 0x60000000
126,428 UART: dlen: 5
127,919 UART: buf: [04050607, 00000003]
131,398 >>> mbox cmd response: success
131,648 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,350 UART: cmd: 0x90000000
134,239 UART: dlen: 8
135,673 UART: buf: [08070605]
137,754 >>> mbox cmd response: success
138,028 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,707 UART: cmd: 0xa0000000
140,258 >>> mbox cmd response data (4 bytes)
140,653 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,345 UART: cmd: 0xb0000000
143,229 UART: dlen: 6
144,706 UART: buf: [0c0d0e0f, 00000a0b]
148,310 >>> mbox cmd response data (2 bytes)
148,671 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,347 UART: cmd: 0xc0000000
151,015 >>> mbox cmd response data (9 bytes)
151,404 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,076 UART: cmd: 0xd0000000
153,638 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,586 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,774 UART: cmd: 0x50000000
19,581 UART: dlen: 8
20,618 >>> mbox cmd response: success
21,059 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,009 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,730 UART: cmd: 0x50000000
29,628 UART: dlen: 7
30,693 >>> mbox cmd response: success
31,132 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,263 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,019 UART: cmd: 0x50000000
39,918 UART: dlen: 0
40,990 >>> mbox cmd response: success
41,331 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,640 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,343 UART: cmd: 0x50000001
50,227 UART: dlen: 5
51,332 >>> mbox cmd response: success
51,751 UART: buf: [01, 23, 45, 67, 89]
56,401 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,097 UART: cmd: 0x50000001
58,983 UART: dlen: 6
60,029 >>> mbox cmd response: success
60,501 UART: buf: [01, 23, 45, 67, 89]
65,135 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,834 UART: cmd: 0x50000001
67,731 UART: dlen: 9
68,772 >>> mbox cmd response: success
69,241 UART: buf: [01, 23, 45, 67, 89]
73,819 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,524 UART: cmd: 0x60000000
76,456 UART: dlen: 16
77,931 UART: buf: [67452301, efcdab89]
81,475 UART: buf: [33221100, 77665544]
84,622 >>> mbox cmd response: success
84,879 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,585 UART: cmd: 0x60000000
87,519 UART: dlen: 13
88,994 UART: buf: [67452301, efcdab89]
92,481 UART: buf: [33221100, 00000044]
95,860 >>> mbox cmd response: success
96,125 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,833 UART: cmd: 0x60000000
98,713 UART: dlen: 12
100,191 UART: buf: [67452301, efcdab89]
103,681 UART: buf: [33221100, 00000000]
107,052 >>> mbox cmd response: success
107,314 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,987 UART: cmd: 0x60000000
109,863 UART: dlen: 0
110,961 >>> mbox cmd response: success
111,216 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,308 UART: cmd: 0x70000000
113,912 >>> mbox cmd response: success
114,170 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,853 UART: cmd: 0x60000000
116,736 UART: dlen: 5
118,222 UART: buf: [04050607, 00000003]
121,731 >>> mbox cmd response: success
121,992 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,670 UART: cmd: 0x80000000
124,258 >>> mbox cmd response: failed
124,560 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,243 UART: cmd: 0x60000000
127,116 UART: dlen: 5
128,610 UART: buf: [04050607, 00000003]
132,092 >>> mbox cmd response: success
132,345 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,025 UART: cmd: 0x90000000
134,905 UART: dlen: 8
136,342 UART: buf: [08070605]
138,428 >>> mbox cmd response: success
138,686 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,354 UART: cmd: 0xa0000000
140,930 >>> mbox cmd response data (4 bytes)
141,331 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,022 UART: cmd: 0xb0000000
143,905 UART: dlen: 6
145,387 UART: buf: [0c0d0e0f, 00000a0b]
148,996 >>> mbox cmd response data (2 bytes)
149,363 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,044 UART: cmd: 0xc0000000
151,711 >>> mbox cmd response data (9 bytes)
152,097 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,772 UART: cmd: 0xd0000000
154,323 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,798 writing to cptra_bootfsm_go
3,232 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,390 UART: cmd: 0x50000000
19,238 UART: dlen: 8
20,265 >>> mbox cmd response: success
20,707 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,595 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,299 UART: cmd: 0x50000000
29,186 UART: dlen: 7
30,241 >>> mbox cmd response: success
30,717 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,687 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,375 UART: cmd: 0x50000000
39,254 UART: dlen: 0
40,249 >>> mbox cmd response: success
40,721 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,999 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,717 UART: cmd: 0x50000001
49,601 UART: dlen: 5
50,703 >>> mbox cmd response: success
51,172 UART: buf: [01, 23, 45, 67, 89]
55,758 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,452 UART: cmd: 0x50000001
58,331 UART: dlen: 6
59,378 >>> mbox cmd response: success
59,852 UART: buf: [01, 23, 45, 67, 89]
64,440 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,139 UART: cmd: 0x50000001
67,019 UART: dlen: 9
68,071 >>> mbox cmd response: success
68,546 UART: buf: [01, 23, 45, 67, 89]
73,131 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,836 UART: cmd: 0x60000000
75,737 UART: dlen: 16
77,209 UART: buf: [67452301, efcdab89]
80,756 UART: buf: [33221100, 77665544]
83,906 >>> mbox cmd response: success
84,170 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,866 UART: cmd: 0x60000000
86,800 UART: dlen: 13
88,272 UART: buf: [67452301, efcdab89]
92,368 UART: buf: [33221100, 00000044]
95,174 >>> mbox cmd response: success
95,447 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,143 UART: cmd: 0x60000000
98,022 UART: dlen: 12
99,509 UART: buf: [67452301, efcdab89]
103,007 UART: buf: [33221100, 00000000]
106,388 >>> mbox cmd response: success
106,668 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,345 UART: cmd: 0x60000000
109,223 UART: dlen: 0
110,267 >>> mbox cmd response: success
110,528 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,201 UART: cmd: 0x70000000
112,789 >>> mbox cmd response: success
113,044 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,744 UART: cmd: 0x60000000
115,620 UART: dlen: 5
117,105 UART: buf: [04050607, 00000003]
120,602 >>> mbox cmd response: success
120,860 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,536 UART: cmd: 0x80000000
123,120 >>> mbox cmd response: failed
123,426 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,126 UART: cmd: 0x60000000
126,002 UART: dlen: 5
127,501 UART: buf: [04050607, 00000003]
130,983 >>> mbox cmd response: success
131,243 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,934 UART: cmd: 0x90000000
133,810 UART: dlen: 8
135,298 UART: buf: [08070605]
137,321 >>> mbox cmd response: success
137,579 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,246 UART: cmd: 0xa0000000
139,801 >>> mbox cmd response data (4 bytes)
140,195 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,888 UART: cmd: 0xb0000000
142,771 UART: dlen: 6
144,256 UART: buf: [0c0d0e0f, 00000a0b]
147,830 >>> mbox cmd response data (2 bytes)
148,201 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,883 UART: cmd: 0xc0000000
150,547 >>> mbox cmd response data (9 bytes)
150,931 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,608 UART: cmd: 0xd0000000
153,161 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
3,997 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,284 UART: cmd: 0x50000000
19,104 UART: dlen: 8
20,170 >>> mbox cmd response: success
20,610 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,477 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,177 UART: cmd: 0x50000000
29,072 UART: dlen: 7
30,126 >>> mbox cmd response: success
30,602 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,590 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,277 UART: cmd: 0x50000000
39,165 UART: dlen: 0
40,158 >>> mbox cmd response: success
40,629 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,899 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,597 UART: cmd: 0x50000001
49,490 UART: dlen: 5
50,542 >>> mbox cmd response: success
51,013 UART: buf: [01, 23, 45, 67, 89]
55,662 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,356 UART: cmd: 0x50000001
58,234 UART: dlen: 6
59,279 >>> mbox cmd response: success
59,753 UART: buf: [01, 23, 45, 67, 89]
64,386 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,105 UART: cmd: 0x50000001
66,984 UART: dlen: 9
68,030 >>> mbox cmd response: success
68,505 UART: buf: [01, 23, 45, 67, 89]
73,150 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,859 UART: cmd: 0x60000000
75,740 UART: dlen: 16
77,214 UART: buf: [67452301, efcdab89]
80,811 UART: buf: [33221100, 77665544]
84,710 >>> mbox cmd response: success
85,000 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,709 UART: cmd: 0x60000000
87,650 UART: dlen: 13
89,127 UART: buf: [67452301, efcdab89]
92,627 UART: buf: [33221100, 00000044]
96,003 >>> mbox cmd response: success
96,292 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,986 UART: cmd: 0x60000000
98,867 UART: dlen: 12
100,345 UART: buf: [67452301, efcdab89]
103,891 UART: buf: [33221100, 00000000]
107,258 >>> mbox cmd response: success
107,515 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,183 UART: cmd: 0x60000000
110,060 UART: dlen: 0
111,104 >>> mbox cmd response: success
111,361 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,034 UART: cmd: 0x70000000
113,626 >>> mbox cmd response: success
113,881 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,557 UART: cmd: 0x60000000
116,436 UART: dlen: 5
117,936 UART: buf: [04050607, 00000003]
121,425 >>> mbox cmd response: success
121,680 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,355 UART: cmd: 0x80000000
123,941 >>> mbox cmd response: failed
124,250 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,933 UART: cmd: 0x60000000
126,806 UART: dlen: 5
128,291 UART: buf: [04050607, 00000003]
131,774 >>> mbox cmd response: success
132,029 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,714 UART: cmd: 0x90000000
134,591 UART: dlen: 8
136,075 UART: buf: [08070605]
138,107 >>> mbox cmd response: success
138,364 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,053 UART: cmd: 0xa0000000
140,614 >>> mbox cmd response data (4 bytes)
141,021 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,720 UART: cmd: 0xb0000000
143,595 UART: dlen: 6
145,079 UART: buf: [0c0d0e0f, 00000a0b]
148,640 >>> mbox cmd response data (2 bytes)
149,009 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,693 UART: cmd: 0xc0000000
151,356 >>> mbox cmd response data (9 bytes)
151,742 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,420 UART: cmd: 0xd0000000
153,977 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,544 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,702 UART: cmd: 0x50000000
19,506 UART: dlen: 8
20,571 >>> mbox cmd response: success
21,008 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,965 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,684 UART: cmd: 0x50000000
29,532 UART: dlen: 7
30,618 >>> mbox cmd response: success
31,098 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,118 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,827 UART: cmd: 0x50000000
39,718 UART: dlen: 0
40,759 >>> mbox cmd response: success
41,141 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,417 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,110 UART: cmd: 0x50000001
49,995 UART: dlen: 5
51,048 >>> mbox cmd response: success
51,523 UART: buf: [01, 23, 45, 67, 89]
56,167 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,863 UART: cmd: 0x50000001
58,741 UART: dlen: 6
59,790 >>> mbox cmd response: success
60,261 UART: buf: [01, 23, 45, 67, 89]
64,899 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,599 UART: cmd: 0x50000001
67,477 UART: dlen: 9
68,543 >>> mbox cmd response: success
69,014 UART: buf: [01, 23, 45, 67, 89]
73,603 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,307 UART: cmd: 0x60000000
76,186 UART: dlen: 16
77,676 UART: buf: [67452301, efcdab89]
81,223 UART: buf: [33221100, 77665544]
84,372 >>> mbox cmd response: success
84,632 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,344 UART: cmd: 0x60000000
87,276 UART: dlen: 13
88,754 UART: buf: [67452301, efcdab89]
92,244 UART: buf: [33221100, 00000044]
95,638 >>> mbox cmd response: success
95,913 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,601 UART: cmd: 0x60000000
98,511 UART: dlen: 12
99,990 UART: buf: [67452301, efcdab89]
103,479 UART: buf: [33221100, 00000000]
106,852 >>> mbox cmd response: success
107,110 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,779 UART: cmd: 0x60000000
109,650 UART: dlen: 0
110,690 >>> mbox cmd response: success
110,942 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,614 UART: cmd: 0x70000000
113,201 >>> mbox cmd response: success
113,452 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,133 UART: cmd: 0x60000000
116,007 UART: dlen: 5
117,498 UART: buf: [04050607, 00000003]
121,041 >>> mbox cmd response: success
121,325 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,001 UART: cmd: 0x80000000
123,540 >>> mbox cmd response: failed
123,839 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,518 UART: cmd: 0x60000000
126,394 UART: dlen: 5
127,881 UART: buf: [04050607, 00000003]
131,359 >>> mbox cmd response: success
131,612 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,292 UART: cmd: 0x90000000
134,172 UART: dlen: 8
135,606 UART: buf: [08070605]
137,694 >>> mbox cmd response: success
137,953 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,625 UART: cmd: 0xa0000000
140,185 >>> mbox cmd response data (4 bytes)
140,610 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,303 UART: cmd: 0xb0000000
143,185 UART: dlen: 6
144,669 UART: buf: [0c0d0e0f, 00000a0b]
148,271 >>> mbox cmd response data (2 bytes)
148,638 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,313 UART: cmd: 0xc0000000
150,976 >>> mbox cmd response data (9 bytes)
151,365 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,038 UART: cmd: 0xd0000000
153,594 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,417 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,573 UART: cmd: 0x50000000
19,375 UART: dlen: 8
20,426 >>> mbox cmd response: success
20,916 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,831 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,553 UART: cmd: 0x50000000
29,404 UART: dlen: 7
30,534 >>> mbox cmd response: success
30,965 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,872 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,642 UART: cmd: 0x50000000
40,548 UART: dlen: 0
41,563 >>> mbox cmd response: success
41,944 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,276 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,976 UART: cmd: 0x50000001
50,857 UART: dlen: 5
51,901 >>> mbox cmd response: success
52,423 UART: buf: [01, 23, 45, 67, 89]
57,010 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,712 UART: cmd: 0x50000001
59,589 UART: dlen: 6
60,652 >>> mbox cmd response: success
61,121 UART: buf: [01, 23, 45, 67, 89]
65,709 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,410 UART: cmd: 0x50000001
68,290 UART: dlen: 9
69,331 >>> mbox cmd response: success
69,798 UART: buf: [01, 23, 45, 67, 89]
74,429 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,132 UART: cmd: 0x60000000
77,020 UART: dlen: 16
78,503 UART: buf: [67452301, efcdab89]
82,100 UART: buf: [33221100, 77665544]
85,191 >>> mbox cmd response: success
85,445 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,140 UART: cmd: 0x60000000
88,068 UART: dlen: 13
89,512 UART: buf: [67452301, efcdab89]
93,011 UART: buf: [33221100, 00000044]
96,441 >>> mbox cmd response: success
96,706 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,398 UART: cmd: 0x60000000
99,274 UART: dlen: 12
100,749 UART: buf: [67452301, efcdab89]
104,287 UART: buf: [33221100, 00000000]
107,648 >>> mbox cmd response: success
107,907 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,577 UART: cmd: 0x60000000
110,455 UART: dlen: 0
111,499 >>> mbox cmd response: success
111,757 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,432 UART: cmd: 0x70000000
114,018 >>> mbox cmd response: success
114,292 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,973 UART: cmd: 0x60000000
116,848 UART: dlen: 5
118,378 UART: buf: [04050607, 00000003]
121,882 >>> mbox cmd response: success
122,146 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,818 UART: cmd: 0x80000000
124,413 >>> mbox cmd response: failed
124,709 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,389 UART: cmd: 0x60000000
127,287 UART: dlen: 5
128,717 UART: buf: [04050607, 00000003]
132,202 >>> mbox cmd response: success
132,452 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,134 UART: cmd: 0x90000000
135,007 UART: dlen: 8
136,470 UART: buf: [08070605]
138,553 >>> mbox cmd response: success
138,809 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,481 UART: cmd: 0xa0000000
141,086 >>> mbox cmd response data (4 bytes)
141,488 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,178 UART: cmd: 0xb0000000
144,055 UART: dlen: 6
145,541 UART: buf: [0c0d0e0f, 00000a0b]
149,097 >>> mbox cmd response data (2 bytes)
149,466 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,141 UART: cmd: 0xc0000000
151,808 >>> mbox cmd response data (9 bytes)
152,191 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,866 UART: cmd: 0xd0000000
154,427 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,802 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,784 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
22,251 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
22,031 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
22,474 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
22,450 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
22,546 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
22,412 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
22,761 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
22,700 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
22,305 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
22,453 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
22,852 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
23,086 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
11,602 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,877 UART: pcrbank::test_erase_all_pcrs...[ok]
21,050 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
11,710 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,006 UART: pcrbank::test_erase_all_pcrs...[ok]
21,154 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
11,952 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,285 UART: pcrbank::test_erase_all_pcrs...[ok]
21,385 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
11,853 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,203 UART: pcrbank::test_erase_all_pcrs...[ok]
21,319 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,808 writing to cptra_bootfsm_go
11,556 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,919 UART: pcrbank::test_erase_all_pcrs...[ok]
21,060 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
11,727 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,063 UART: pcrbank::test_erase_all_pcrs...[ok]
21,169 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
11,871 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,204 UART: pcrbank::test_erase_all_pcrs...[ok]
21,282 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
11,931 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,253 UART: pcrbank::test_erase_all_pcrs...[ok]
21,388 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
11,601 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,926 UART: pcrbank::test_erase_all_pcrs...[ok]
21,093 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
11,598 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,936 UART: pcrbank::test_erase_all_pcrs...[ok]
21,101 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
12,006 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,333 UART: pcrbank::test_erase_all_pcrs...[ok]
21,449 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
11,953 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,270 UART: pcrbank::test_erase_all_pcrs...[ok]
22,188 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
13,303 UART: persistent::test_persistent_data_layout...[ok]
16,885 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
11,404 UART: persistent::test_persistent_data_layout...[ok]
14,994 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
11,848 UART: persistent::test_persistent_data_layout...[ok]
15,469 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
11,667 UART: persistent::test_persistent_data_layout...[ok]
15,198 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
11,348 UART: persistent::test_persistent_data_layout...[ok]
14,996 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
11,549 UART: persistent::test_persistent_data_layout...[ok]
15,185 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
11,705 UART: persistent::test_persistent_data_layout...[ok]
15,286 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
11,777 UART: persistent::test_persistent_data_layout...[ok]
15,398 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,802 writing to cptra_bootfsm_go
11,382 UART: persistent::test_persistent_data_layout...[ok]
14,960 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
11,425 UART: persistent::test_persistent_data_layout...[ok]
15,002 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
11,798 UART: persistent::test_persistent_data_layout...[ok]
15,384 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
11,602 UART: persistent::test_persistent_data_layout...[ok]
15,203 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
22,362 UART: sha1::test_kat...[ok]
35,943 UART: sha1::test_digest0...[ok]
49,836 UART: sha1::test_digest1...[ok]
65,105 UART: sha1::test_digest2...[ok]
87,883 UART: sha1::test_digest3...[ok]
109,892 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
22,556 UART: sha1::test_kat...[ok]
35,428 UART: sha1::test_digest0...[ok]
48,947 UART: sha1::test_digest1...[ok]
61,880 UART: sha1::test_digest2...[ok]
85,241 UART: sha1::test_digest3...[ok]
107,726 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
22,803 UART: sha1::test_kat...[ok]
37,913 UART: sha1::test_digest0...[ok]
52,878 UART: sha1::test_digest1...[ok]
66,549 UART: sha1::test_digest2...[ok]
90,363 UART: sha1::test_digest3...[ok]
113,035 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
22,833 UART: sha1::test_kat...[ok]
35,079 UART: sha1::test_digest0...[ok]
48,476 UART: sha1::test_digest1...[ok]
61,741 UART: sha1::test_digest2...[ok]
84,112 UART: sha1::test_digest3...[ok]
106,024 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
22,342 UART: sha1::test_kat...[ok]
35,270 UART: sha1::test_digest0...[ok]
47,571 UART: sha1::test_digest1...[ok]
59,897 UART: sha1::test_digest2...[ok]
82,857 UART: sha1::test_digest3...[ok]
105,943 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
22,577 UART: sha1::test_kat...[ok]
35,869 UART: sha1::test_digest0...[ok]
48,722 UART: sha1::test_digest1...[ok]
62,657 UART: sha1::test_digest2...[ok]
85,076 UART: sha1::test_digest3...[ok]
107,066 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
22,530 UART: sha1::test_kat...[ok]
36,532 UART: sha1::test_digest0...[ok]
51,096 UART: sha1::test_digest1...[ok]
65,232 UART: sha1::test_digest2...[ok]
88,352 UART: sha1::test_digest3...[ok]
109,310 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
22,645 UART: sha1::test_kat...[ok]
35,755 UART: sha1::test_digest0...[ok]
49,245 UART: sha1::test_digest1...[ok]
63,915 UART: sha1::test_digest2...[ok]
85,048 UART: sha1::test_digest3...[ok]
106,835 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
22,319 UART: sha1::test_kat...[ok]
35,588 UART: sha1::test_digest0...[ok]
49,970 UART: sha1::test_digest1...[ok]
63,154 UART: sha1::test_digest2...[ok]
84,133 UART: sha1::test_digest3...[ok]
105,352 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
22,238 UART: sha1::test_kat...[ok]
35,162 UART: sha1::test_digest0...[ok]
47,437 UART: sha1::test_digest1...[ok]
60,115 UART: sha1::test_digest2...[ok]
82,403 UART: sha1::test_digest3...[ok]
103,907 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
22,727 UART: sha1::test_kat...[ok]
35,226 UART: sha1::test_digest0...[ok]
47,949 UART: sha1::test_digest1...[ok]
61,616 UART: sha1::test_digest2...[ok]
82,846 UART: sha1::test_digest3...[ok]
105,737 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
22,853 UART: sha1::test_kat...[ok]
36,303 UART: sha1::test_digest0...[ok]
51,425 UART: sha1::test_digest1...[ok]
67,181 UART: sha1::test_digest2...[ok]
87,391 UART: sha1::test_digest3...[ok]
108,212 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
21,951 UART: sha256::test_kat...[ok]
26,424 UART: sha256::test_digest0...[ok]
30,970 UART: sha256::test_digest1...[ok]
35,434 UART: sha256::test_digest2...[ok]
40,970 UART: sha256::test_digest3...[ok]
46,514 UART: sha256::test_op0...[ok]
51,111 UART: sha256::test_op1...[ok]
55,731 UART: sha256::test_op2...[ok]
60,973 UART: sha256::test_op3...[ok]
69,874 UART: sha256::test_op4...[ok]
81,727 UART: sha256::test_op5...[ok]
65,235,112 UART: sha256::test_op6...[ok]
65,257,686 UART: sha256::test_op7...[ok]
65,273,801 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
21,931 UART: sha256::test_kat...[ok]
26,372 UART: sha256::test_digest0...[ok]
30,893 UART: sha256::test_digest1...[ok]
35,394 UART: sha256::test_digest2...[ok]
40,928 UART: sha256::test_digest3...[ok]
46,457 UART: sha256::test_op0...[ok]
51,059 UART: sha256::test_op1...[ok]
55,681 UART: sha256::test_op2...[ok]
60,921 UART: sha256::test_op3...[ok]
69,821 UART: sha256::test_op4...[ok]
81,694 UART: sha256::test_op5...[ok]
65,235,095 UART: sha256::test_op6...[ok]
65,257,655 UART: sha256::test_op7...[ok]
65,273,784 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
22,564 UART: sha256::test_kat...[ok]
27,047 UART: sha256::test_digest0...[ok]
31,585 UART: sha256::test_digest1...[ok]
36,090 UART: sha256::test_digest2...[ok]
41,661 UART: sha256::test_digest3...[ok]
47,159 UART: sha256::test_op0...[ok]
51,755 UART: sha256::test_op1...[ok]
56,352 UART: sha256::test_op2...[ok]
61,581 UART: sha256::test_op3...[ok]
70,491 UART: sha256::test_op4...[ok]
82,364 UART: sha256::test_op5...[ok]
65,235,602 UART: sha256::test_op6...[ok]
65,258,325 UART: sha256::test_op7...[ok]
65,274,511 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
22,341 UART: sha256::test_kat...[ok]
26,852 UART: sha256::test_digest0...[ok]
31,397 UART: sha256::test_digest1...[ok]
35,856 UART: sha256::test_digest2...[ok]
41,411 UART: sha256::test_digest3...[ok]
46,930 UART: sha256::test_op0...[ok]
51,535 UART: sha256::test_op1...[ok]
56,156 UART: sha256::test_op2...[ok]
61,374 UART: sha256::test_op3...[ok]
70,258 UART: sha256::test_op4...[ok]
82,148 UART: sha256::test_op5...[ok]
65,235,383 UART: sha256::test_op6...[ok]
65,258,105 UART: sha256::test_op7...[ok]
65,274,234 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
21,931 UART: sha256::test_kat...[ok]
26,350 UART: sha256::test_digest0...[ok]
30,806 UART: sha256::test_digest1...[ok]
35,237 UART: sha256::test_digest2...[ok]
40,720 UART: sha256::test_digest3...[ok]
46,131 UART: sha256::test_op0...[ok]
50,683 UART: sha256::test_op1...[ok]
55,244 UART: sha256::test_op2...[ok]
60,431 UART: sha256::test_op3...[ok]
69,265 UART: sha256::test_op4...[ok]
81,069 UART: sha256::test_op5...[ok]
64,968,768 UART: sha256::test_op6...[ok]
64,991,224 UART: sha256::test_op7...[ok]
65,007,170 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
21,911 UART: sha256::test_kat...[ok]
26,330 UART: sha256::test_digest0...[ok]
30,781 UART: sha256::test_digest1...[ok]
35,233 UART: sha256::test_digest2...[ok]
40,693 UART: sha256::test_digest3...[ok]
46,101 UART: sha256::test_op0...[ok]
50,670 UART: sha256::test_op1...[ok]
55,222 UART: sha256::test_op2...[ok]
60,391 UART: sha256::test_op3...[ok]
69,219 UART: sha256::test_op4...[ok]
81,081 UART: sha256::test_op5...[ok]
64,968,711 UART: sha256::test_op6...[ok]
64,991,147 UART: sha256::test_op7...[ok]
65,007,186 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
22,525 UART: sha256::test_kat...[ok]
26,935 UART: sha256::test_digest0...[ok]
31,431 UART: sha256::test_digest1...[ok]
35,901 UART: sha256::test_digest2...[ok]
41,314 UART: sha256::test_digest3...[ok]
46,724 UART: sha256::test_op0...[ok]
51,305 UART: sha256::test_op1...[ok]
55,859 UART: sha256::test_op2...[ok]
61,003 UART: sha256::test_op3...[ok]
70,033 UART: sha256::test_op4...[ok]
81,695 UART: sha256::test_op5...[ok]
64,969,342 UART: sha256::test_op6...[ok]
64,991,791 UART: sha256::test_op7...[ok]
65,007,819 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
22,403 UART: sha256::test_kat...[ok]
26,817 UART: sha256::test_digest0...[ok]
31,278 UART: sha256::test_digest1...[ok]
35,771 UART: sha256::test_digest2...[ok]
41,178 UART: sha256::test_digest3...[ok]
46,582 UART: sha256::test_op0...[ok]
51,145 UART: sha256::test_op1...[ok]
55,693 UART: sha256::test_op2...[ok]
60,847 UART: sha256::test_op3...[ok]
69,676 UART: sha256::test_op4...[ok]
81,500 UART: sha256::test_op5...[ok]
64,969,239 UART: sha256::test_op6...[ok]
64,991,661 UART: sha256::test_op7...[ok]
65,007,667 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
22,254 UART: sha256::test_kat...[ok]
26,679 UART: sha256::test_digest0...[ok]
31,118 UART: sha256::test_digest1...[ok]
35,544 UART: sha256::test_digest2...[ok]
41,036 UART: sha256::test_digest3...[ok]
46,425 UART: sha256::test_op0...[ok]
50,995 UART: sha256::test_op1...[ok]
55,546 UART: sha256::test_op2...[ok]
60,728 UART: sha256::test_op3...[ok]
69,557 UART: sha256::test_op4...[ok]
81,373 UART: sha256::test_op5...[ok]
64,969,011 UART: sha256::test_op6...[ok]
64,991,539 UART: sha256::test_op7...[ok]
65,007,482 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
21,963 UART: sha256::test_kat...[ok]
26,391 UART: sha256::test_digest0...[ok]
30,830 UART: sha256::test_digest1...[ok]
35,256 UART: sha256::test_digest2...[ok]
40,718 UART: sha256::test_digest3...[ok]
46,189 UART: sha256::test_op0...[ok]
50,719 UART: sha256::test_op1...[ok]
55,266 UART: sha256::test_op2...[ok]
60,911 UART: sha256::test_op3...[ok]
69,275 UART: sha256::test_op4...[ok]
81,079 UART: sha256::test_op5...[ok]
64,968,730 UART: sha256::test_op6...[ok]
64,991,222 UART: sha256::test_op7...[ok]
65,007,245 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
22,270 UART: sha256::test_kat...[ok]
26,725 UART: sha256::test_digest0...[ok]
31,191 UART: sha256::test_digest1...[ok]
35,579 UART: sha256::test_digest2...[ok]
41,054 UART: sha256::test_digest3...[ok]
46,477 UART: sha256::test_op0...[ok]
51,028 UART: sha256::test_op1...[ok]
55,587 UART: sha256::test_op2...[ok]
60,769 UART: sha256::test_op3...[ok]
69,602 UART: sha256::test_op4...[ok]
81,431 UART: sha256::test_op5...[ok]
64,969,237 UART: sha256::test_op6...[ok]
64,991,519 UART: sha256::test_op7...[ok]
65,007,559 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
22,086 UART: sha256::test_kat...[ok]
26,507 UART: sha256::test_digest0...[ok]
30,999 UART: sha256::test_digest1...[ok]
35,440 UART: sha256::test_digest2...[ok]
40,897 UART: sha256::test_digest3...[ok]
46,307 UART: sha256::test_op0...[ok]
50,868 UART: sha256::test_op1...[ok]
55,397 UART: sha256::test_op2...[ok]
60,567 UART: sha256::test_op3...[ok]
69,415 UART: sha256::test_op4...[ok]
81,208 UART: sha256::test_op5...[ok]
64,968,819 UART: sha256::test_op6...[ok]
64,991,358 UART: sha256::test_op7...[ok]
65,007,392 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
21,392 UART: sha2_512_384acc::test_kat...[ok]
26,117 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,271 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,095 UART: sha2_512_384acc::test_digest0...[ok]
1,071,376 UART: sha2_512_384acc::test_digest1...[ok]
1,079,291 UART: sha2_512_384acc::test_digest2...[ok]
1,087,335 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
21,404 UART: sha2_512_384acc::test_kat...[ok]
26,170 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,295 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,113 UART: sha2_512_384acc::test_digest0...[ok]
1,071,383 UART: sha2_512_384acc::test_digest1...[ok]
1,079,334 UART: sha2_512_384acc::test_digest2...[ok]
1,087,372 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
21,883 UART: sha2_512_384acc::test_kat...[ok]
26,622 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,744 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,563 UART: sha2_512_384acc::test_digest0...[ok]
1,071,861 UART: sha2_512_384acc::test_digest1...[ok]
1,079,789 UART: sha2_512_384acc::test_digest2...[ok]
1,087,833 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
21,954 UART: sha2_512_384acc::test_kat...[ok]
26,737 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,886 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,669 UART: sha2_512_384acc::test_digest0...[ok]
1,071,943 UART: sha2_512_384acc::test_digest1...[ok]
1,079,861 UART: sha2_512_384acc::test_digest2...[ok]
1,087,913 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
21,452 UART: sha2_512_384acc::test_kat...[ok]
26,162 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,318 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,145 UART: sha2_512_384acc::test_digest0...[ok]
1,071,419 UART: sha2_512_384acc::test_digest1...[ok]
1,079,330 UART: sha2_512_384acc::test_digest2...[ok]
1,087,380 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
21,262 UART: sha2_512_384acc::test_kat...[ok]
26,013 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,179 UART: sha2_512_384acc::test_digest_offset...[ok]
1,063,978 UART: sha2_512_384acc::test_digest0...[ok]
1,071,247 UART: sha2_512_384acc::test_digest1...[ok]
1,079,155 UART: sha2_512_384acc::test_digest2...[ok]
1,087,190 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
21,810 UART: sha2_512_384acc::test_kat...[ok]
26,542 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,681 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,501 UART: sha2_512_384acc::test_digest0...[ok]
1,071,731 UART: sha2_512_384acc::test_digest1...[ok]
1,079,713 UART: sha2_512_384acc::test_digest2...[ok]
1,087,730 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
21,643 UART: sha2_512_384acc::test_kat...[ok]
26,372 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,517 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,296 UART: sha2_512_384acc::test_digest0...[ok]
1,071,570 UART: sha2_512_384acc::test_digest1...[ok]
1,079,515 UART: sha2_512_384acc::test_digest2...[ok]
1,087,552 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
21,341 UART: sha2_512_384acc::test_kat...[ok]
26,067 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,272 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,056 UART: sha2_512_384acc::test_digest0...[ok]
1,071,327 UART: sha2_512_384acc::test_digest1...[ok]
1,079,281 UART: sha2_512_384acc::test_digest2...[ok]
1,087,303 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
22,355 UART: sha2_512_384acc::test_kat...[ok]
27,102 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,057,231 UART: sha2_512_384acc::test_digest_offset...[ok]
1,065,040 UART: sha2_512_384acc::test_digest0...[ok]
1,072,332 UART: sha2_512_384acc::test_digest1...[ok]
1,080,299 UART: sha2_512_384acc::test_digest2...[ok]
1,088,271 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
21,780 UART: sha2_512_384acc::test_kat...[ok]
26,538 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,635 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,451 UART: sha2_512_384acc::test_digest0...[ok]
1,071,745 UART: sha2_512_384acc::test_digest1...[ok]
1,079,676 UART: sha2_512_384acc::test_digest2...[ok]
1,087,724 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
21,633 UART: sha2_512_384acc::test_kat...[ok]
26,400 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,548 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,307 UART: sha2_512_384acc::test_digest0...[ok]
1,071,621 UART: sha2_512_384acc::test_digest1...[ok]
1,079,538 UART: sha2_512_384acc::test_digest2...[ok]
1,087,580 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
24,655 UART: sha384::test_kat...[ok]
32,935 UART: sha384::test_digest0...[ok]
41,982 UART: sha384::test_digest1...[ok]
50,891 UART: sha384::test_digest2...[ok]
60,666 UART: sha384::test_digest3...[ok]
71,255 UART: sha384::test_op0...[ok]
78,152 UART: sha384::test_op1...[ok]
85,112 UART: sha384::test_op2...[ok]
92,901 UART: sha384::test_op3...[ok]
103,676 UART: sha384::test_op4...[ok]
119,746 UART: sha384::test_op5...[ok]
69,347,298 UART: sha384::test_op6...[ok]
69,378,238 UART: sha384::test_op7...[ok]
69,408,854 UART: sha384::test_op8...[ok]
69,438,272 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,612 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,250 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,906 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
24,371 UART: sha384::test_kat...[ok]
32,525 UART: sha384::test_digest0...[ok]
41,822 UART: sha384::test_digest1...[ok]
49,456 UART: sha384::test_digest2...[ok]
58,937 UART: sha384::test_digest3...[ok]
69,498 UART: sha384::test_op0...[ok]
76,402 UART: sha384::test_op1...[ok]
83,296 UART: sha384::test_op2...[ok]
91,088 UART: sha384::test_op3...[ok]
101,921 UART: sha384::test_op4...[ok]
117,927 UART: sha384::test_op5...[ok]
69,345,595 UART: sha384::test_op6...[ok]
69,376,471 UART: sha384::test_op7...[ok]
69,407,062 UART: sha384::test_op8...[ok]
69,436,500 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,829 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,466 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,157 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
24,875 UART: sha384::test_kat...[ok]
33,135 UART: sha384::test_digest0...[ok]
40,912 UART: sha384::test_digest1...[ok]
49,822 UART: sha384::test_digest2...[ok]
59,301 UART: sha384::test_digest3...[ok]
71,181 UART: sha384::test_op0...[ok]
78,076 UART: sha384::test_op1...[ok]
85,229 UART: sha384::test_op2...[ok]
92,767 UART: sha384::test_op3...[ok]
103,611 UART: sha384::test_op4...[ok]
119,621 UART: sha384::test_op5...[ok]
69,347,247 UART: sha384::test_op6...[ok]
69,378,158 UART: sha384::test_op7...[ok]
69,408,801 UART: sha384::test_op8...[ok]
69,438,207 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,547 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,202 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,838 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
24,799 UART: sha384::test_kat...[ok]
34,050 UART: sha384::test_digest0...[ok]
42,433 UART: sha384::test_digest1...[ok]
50,293 UART: sha384::test_digest2...[ok]
59,335 UART: sha384::test_digest3...[ok]
71,285 UART: sha384::test_op0...[ok]
78,182 UART: sha384::test_op1...[ok]
85,089 UART: sha384::test_op2...[ok]
92,869 UART: sha384::test_op3...[ok]
103,716 UART: sha384::test_op4...[ok]
119,747 UART: sha384::test_op5...[ok]
69,347,302 UART: sha384::test_op6...[ok]
69,378,241 UART: sha384::test_op7...[ok]
69,408,897 UART: sha384::test_op8...[ok]
69,438,287 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,668 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,261 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,937 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
24,260 UART: sha384::test_kat...[ok]
33,776 UART: sha384::test_digest0...[ok]
41,163 UART: sha384::test_digest1...[ok]
51,167 UART: sha384::test_digest2...[ok]
60,393 UART: sha384::test_digest3...[ok]
72,201 UART: sha384::test_op0...[ok]
79,068 UART: sha384::test_op1...[ok]
85,969 UART: sha384::test_op2...[ok]
93,753 UART: sha384::test_op3...[ok]
104,603 UART: sha384::test_op4...[ok]
120,614 UART: sha384::test_op5...[ok]
69,348,220 UART: sha384::test_op6...[ok]
69,379,112 UART: sha384::test_op7...[ok]
69,409,758 UART: sha384::test_op8...[ok]
69,439,163 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,545 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,188 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,844 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
24,633 UART: sha384::test_kat...[ok]
33,523 UART: sha384::test_digest0...[ok]
42,015 UART: sha384::test_digest1...[ok]
51,052 UART: sha384::test_digest2...[ok]
59,093 UART: sha384::test_digest3...[ok]
70,985 UART: sha384::test_op0...[ok]
77,882 UART: sha384::test_op1...[ok]
84,809 UART: sha384::test_op2...[ok]
92,599 UART: sha384::test_op3...[ok]
103,414 UART: sha384::test_op4...[ok]
119,410 UART: sha384::test_op5...[ok]
69,346,986 UART: sha384::test_op6...[ok]
69,377,920 UART: sha384::test_op7...[ok]
69,408,583 UART: sha384::test_op8...[ok]
69,437,980 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,343 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,007 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,621 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
24,639 UART: sha384::test_kat...[ok]
34,072 UART: sha384::test_digest0...[ok]
42,851 UART: sha384::test_digest1...[ok]
51,486 UART: sha384::test_digest2...[ok]
59,382 UART: sha384::test_digest3...[ok]
70,864 UART: sha384::test_op0...[ok]
77,732 UART: sha384::test_op1...[ok]
84,627 UART: sha384::test_op2...[ok]
92,414 UART: sha384::test_op3...[ok]
103,247 UART: sha384::test_op4...[ok]
119,244 UART: sha384::test_op5...[ok]
69,346,952 UART: sha384::test_op6...[ok]
69,377,788 UART: sha384::test_op7...[ok]
69,408,433 UART: sha384::test_op8...[ok]
69,437,833 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,158 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,792 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,514 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
24,982 UART: sha384::test_kat...[ok]
32,719 UART: sha384::test_digest0...[ok]
41,237 UART: sha384::test_digest1...[ok]
48,897 UART: sha384::test_digest2...[ok]
57,726 UART: sha384::test_digest3...[ok]
68,927 UART: sha384::test_op0...[ok]
75,932 UART: sha384::test_op1...[ok]
82,716 UART: sha384::test_op2...[ok]
90,517 UART: sha384::test_op3...[ok]
101,339 UART: sha384::test_op4...[ok]
117,345 UART: sha384::test_op5...[ok]
69,344,963 UART: sha384::test_op6...[ok]
69,375,874 UART: sha384::test_op7...[ok]
69,406,520 UART: sha384::test_op8...[ok]
69,435,956 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,285 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,931 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,574 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
24,315 UART: sha384::test_kat...[ok]
32,630 UART: sha384::test_digest0...[ok]
41,408 UART: sha384::test_digest1...[ok]
49,420 UART: sha384::test_digest2...[ok]
59,242 UART: sha384::test_digest3...[ok]
69,971 UART: sha384::test_op0...[ok]
76,863 UART: sha384::test_op1...[ok]
83,824 UART: sha384::test_op2...[ok]
91,567 UART: sha384::test_op3...[ok]
102,407 UART: sha384::test_op4...[ok]
118,405 UART: sha384::test_op5...[ok]
69,345,968 UART: sha384::test_op6...[ok]
69,376,919 UART: sha384::test_op7...[ok]
69,407,550 UART: sha384::test_op8...[ok]
69,437,008 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,330 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,944 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,603 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
24,347 UART: sha384::test_kat...[ok]
32,540 UART: sha384::test_digest0...[ok]
40,253 UART: sha384::test_digest1...[ok]
48,442 UART: sha384::test_digest2...[ok]
57,235 UART: sha384::test_digest3...[ok]
69,553 UART: sha384::test_op0...[ok]
76,444 UART: sha384::test_op1...[ok]
83,411 UART: sha384::test_op2...[ok]
91,151 UART: sha384::test_op3...[ok]
101,948 UART: sha384::test_op4...[ok]
118,024 UART: sha384::test_op5...[ok]
69,345,554 UART: sha384::test_op6...[ok]
69,376,502 UART: sha384::test_op7...[ok]
69,407,156 UART: sha384::test_op8...[ok]
69,436,561 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,889 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,525 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,242 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
24,644 UART: sha384::test_kat...[ok]
32,961 UART: sha384::test_digest0...[ok]
40,344 UART: sha384::test_digest1...[ok]
47,514 UART: sha384::test_digest2...[ok]
55,491 UART: sha384::test_digest3...[ok]
66,745 UART: sha384::test_op0...[ok]
73,630 UART: sha384::test_op1...[ok]
80,503 UART: sha384::test_op2...[ok]
88,298 UART: sha384::test_op3...[ok]
99,119 UART: sha384::test_op4...[ok]
115,165 UART: sha384::test_op5...[ok]
69,342,778 UART: sha384::test_op6...[ok]
69,373,674 UART: sha384::test_op7...[ok]
69,404,315 UART: sha384::test_op8...[ok]
69,433,705 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,452,028 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,467,692 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,483,367 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
24,708 UART: sha384::test_kat...[ok]
32,913 UART: sha384::test_digest0...[ok]
39,891 UART: sha384::test_digest1...[ok]
47,918 UART: sha384::test_digest2...[ok]
57,465 UART: sha384::test_digest3...[ok]
69,016 UART: sha384::test_op0...[ok]
75,939 UART: sha384::test_op1...[ok]
82,830 UART: sha384::test_op2...[ok]
90,609 UART: sha384::test_op3...[ok]
101,416 UART: sha384::test_op4...[ok]
117,423 UART: sha384::test_op5...[ok]
69,345,117 UART: sha384::test_op6...[ok]
69,375,964 UART: sha384::test_op7...[ok]
69,406,568 UART: sha384::test_op8...[ok]
69,436,037 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,364 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,001 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,665 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,823 writing to cptra_bootfsm_go
13,670 UART: status_reporter::test_report_boot_status...[ok]
17,440 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,543 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
13,799 UART: status_reporter::test_report_boot_status...[ok]
17,555 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,672 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
14,140 UART: status_reporter::test_report_boot_status...[ok]
17,973 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,041 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
14,160 UART: status_reporter::test_report_boot_status...[ok]
17,947 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,007 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
14,086 UART: status_reporter::test_report_boot_status...[ok]
17,933 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,970 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
13,719 UART: status_reporter::test_report_boot_status...[ok]
17,593 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,622 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
14,056 UART: status_reporter::test_report_boot_status...[ok]
17,824 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,879 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
13,950 UART: status_reporter::test_report_boot_status...[ok]
17,774 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,818 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
13,763 UART: status_reporter::test_report_boot_status...[ok]
17,598 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,759 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
13,906 UART: status_reporter::test_report_boot_status...[ok]
17,755 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,787 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
14,136 UART: status_reporter::test_report_boot_status...[ok]
17,932 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,963 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
13,996 UART: status_reporter::test_report_boot_status...[ok]
17,862 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,898 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,302 writing to cptra_bootfsm_go
5,632 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,747 >>> mbox cmd response data (48 bytes)
18,417 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,191 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,148 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,986 >>> mbox cmd response data (48 bytes)
18,714 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,385 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,524 writing to cptra_bootfsm_go
3,916 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,161 >>> mbox cmd response data (48 bytes)
17,900 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,620 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,192 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,563 >>> mbox cmd response data (48 bytes)
18,228 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,285 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,242 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
20,133 >>> mbox cmd response data (48 bytes)
20,828 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
41,596 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,358 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
16,552 >>> mbox cmd response data (48 bytes)
17,195 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
37,930 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,728 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,029 >>> mbox cmd response data (48 bytes)
424,769 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,949 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,722 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,133 >>> mbox cmd response data (48 bytes)
424,890 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,077 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,742 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,021 >>> mbox cmd response data (48 bytes)
424,793 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,967 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,624 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,149 >>> mbox cmd response data (48 bytes)
424,922 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,099 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,704 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,858 >>> mbox cmd response data (48 bytes)
424,620 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,789 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,441 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,942 >>> mbox cmd response data (48 bytes)
424,689 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,859 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,573 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,496 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,738 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,696 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,603 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,807 writing to cptra_bootfsm_go
3,291 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,690 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,737 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,485 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,765 writing to cptra_bootfsm_go
3,351 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,729 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,646 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f2230000ed0`,
right: `0x7f2230000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1568000ed0`,
right: `0x7f1568000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f823c000ed0`,
right: `0x7f823c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f03b8000ed0`,
right: `0x7f03b8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f912c000ed0`,
right: `0x7f912c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fae8c000ed0`,
right: `0x7fae8c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fbde4000ed0`,
right: `0x7fbde4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0180000ed0`,
right: `0x7f0180000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1fd8000ed0`,
right: `0x7f1fd8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f826c000ed0`,
right: `0x7f826c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f62f0000ed0`,
right: `0x7f62f0000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f09cc000ed0`,
right: `0x7f09cc000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.34s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.52s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.37s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.47s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.50s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.59s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.46s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.06s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.05s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.19s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.18s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.06s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,082 UART:
192,445 UART: Running Caliptra ROM ...
193,627 UART:
193,772 UART: [state] CFI Enabled
261,328 UART: [state] LifecycleState = Unprovisioned
263,303 UART: [state] DebugLocked = No
265,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,704 UART: [kat] SHA2-256
440,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,892 UART: [kat] ++
451,483 UART: [kat] sha1
462,427 UART: [kat] SHA2-256
465,144 UART: [kat] SHA2-384
471,695 UART: [kat] SHA2-512-ACC
474,013 UART: [kat] ECC-384
2,766,839 UART: [kat] HMAC-384Kdf
2,778,460 UART: [kat] LMS
3,968,814 UART: [kat] --
3,972,394 UART: [cold-reset] ++
3,973,965 UART: [fht] Storing FHT @ 0x50003400
3,985,865 UART: [idev] ++
3,986,514 UART: [idev] CDI.KEYID = 6
3,987,422 UART: [idev] SUBJECT.KEYID = 7
3,988,660 UART: [idev] UDS.KEYID = 0
3,989,716 ready_for_fw is high
3,989,913 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,030,207 UART: [idev] Erasing UDS.KEYID = 0
7,325,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,194 UART: [idev] --
7,350,449 UART: [ldev] ++
7,351,010 UART: [ldev] CDI.KEYID = 6
7,351,966 UART: [ldev] SUBJECT.KEYID = 5
7,353,336 UART: [ldev] AUTHORITY.KEYID = 7
7,354,528 UART: [ldev] FE.KEYID = 1
7,400,954 UART: [ldev] Erasing FE.KEYID = 1
10,734,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,373 UART: [ldev] --
13,093,499 UART: [fwproc] Waiting for Commands...
13,095,105 UART: [fwproc] Received command 0x46574c44
13,097,337 UART: [fwproc] Received Image of size 31676 bytes
16,146,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,221,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,290,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,319,869 >>> mbox cmd response: success
16,323,981 UART: [afmc] ++
16,324,593 UART: [afmc] CDI.KEYID = 6
16,325,501 UART: [afmc] SUBJECT.KEYID = 7
16,326,764 UART: [afmc] AUTHORITY.KEYID = 5
19,686,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,984,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,986,431 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,000,851 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,015,647 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,030,105 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,050,733 UART: [afmc] --
22,053,963 UART: [cold-reset] --
22,057,684 UART: [state] Locking Datavault
22,064,702 UART: [state] Locking PCR0, PCR1 and PCR31
22,066,454 UART: [state] Locking ICCM
22,068,439 UART: [exit] Launching FMC @ 0x40000130
22,076,815 UART:
22,077,114 UART: Running Caliptra FMC ...
22,078,261 UART:
22,078,417 UART: [state] CFI Enabled
22,149,405 UART: [fht] FMC Alias Private Key: 7
24,487,906 UART: [art] Extend RT PCRs Done
24,489,195 UART: [art] Lock RT PCRs Done
24,490,800 UART: [art] Populate DV Done
24,496,139 UART: [fht] FMC Alias Private Key: 7
24,497,716 UART: [art] Derive CDI
24,498,558 UART: [art] Store in in slot 0x4
24,558,958 UART: [art] Derive Key Pair
24,560,032 UART: [art] Store priv key in slot 0x5
27,853,858 UART: [art] Derive Key Pair - Done
27,867,047 UART: [art] Signing Cert with AUTHO
27,868,401 UART: RITY.KEYID = 7
30,155,388 UART: [art] Erasing AUTHORITY.KEYID = 7
30,156,949 UART: [art] PUB.X = 225A7B3CBECFD05BEB690D5181922C0EC1FA16FF28C8576381D3A121FEFC66D3335F5817D758069067460D991C86F944
30,164,166 UART: [art] PUB.Y = 352D9F330E4DBD28A92D3CFAC74922E9B481328DB4A8A5AFFBFD3A740978A6C0165A9D6B121B23BA5281371D39DA32ED
30,171,396 UART: [art] SIG.R = E987159AE74FEFF8D552E08BC7B06573B19AA895F1FC6FB0679BE98E1CE6726FEC55A4A27AB1A0DC85EE6788C73B1A9C
30,178,796 UART: [art] SIG.S = F579C581ADDED9874827CC93CBF123DF307545554A268026B71579F14108E92ACF579812124D1297039C74C2DC62250F
31,483,479 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,807,379 ready_for_fw is high
3,807,771 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,214,326 >>> mbox cmd response: success
21,905,534 UART:
21,905,939 UART: Running Caliptra FMC ...
21,907,044 UART:
21,907,196 UART: [state] CFI Enabled
21,973,753 UART: [fht] FMC Alias Private Key: 7
24,311,611 UART: [art] Extend RT PCRs Done
24,312,877 UART: [art] Lock RT PCRs Done
24,314,625 UART: [art] Populate DV Done
24,320,007 UART: [fht] FMC Alias Private Key: 7
24,321,531 UART: [art] Derive CDI
24,322,318 UART: [art] Store in in slot 0x4
24,382,437 UART: [art] Derive Key Pair
24,383,526 UART: [art] Store priv key in slot 0x5
27,676,157 UART: [art] Derive Key Pair - Done
27,688,803 UART: [art] Signing Cert with AUTHO
27,690,163 UART: RITY.KEYID = 7
29,978,379 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,931 UART: [art] PUB.X = FFC8B86352D738866D6E9D25D5B83B35574857FA08213B872F73547DDFD5B2F1DD96B315433263D0D77818AE70B1BFAF
29,987,201 UART: [art] PUB.Y = 32A804D5EAA18FFE75B450DACED61890411DD4AD378CA7AE31E95FFFB7722494360E98943E5235B47B6971027A71E859
29,994,435 UART: [art] SIG.R = 4ADC6EA9864BD486F82B0C4966FE6310FB1F67E402703DB1887B2C051CFA256103CDB8E3536DABE055CA9ADA7145E168
30,001,750 UART: [art] SIG.S = EDEC68386660262C0DC3D869950C4013971139B845CF12C1A7F20BCFC6A7E6A0A11D4A39A38B944013047BFC4A9CA764
31,306,101 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,402 UART:
192,766 UART: Running Caliptra ROM ...
193,939 UART:
603,719 UART: [state] CFI Enabled
619,016 UART: [state] LifecycleState = Unprovisioned
620,958 UART: [state] DebugLocked = No
623,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,419 UART: [kat] SHA2-256
798,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,713 UART: [kat] ++
809,190 UART: [kat] sha1
820,534 UART: [kat] SHA2-256
823,239 UART: [kat] SHA2-384
829,023 UART: [kat] SHA2-512-ACC
831,393 UART: [kat] ECC-384
3,113,336 UART: [kat] HMAC-384Kdf
3,125,214 UART: [kat] LMS
4,315,333 UART: [kat] --
4,321,509 UART: [cold-reset] ++
4,323,438 UART: [fht] Storing FHT @ 0x50003400
4,335,287 UART: [idev] ++
4,335,906 UART: [idev] CDI.KEYID = 6
4,336,794 UART: [idev] SUBJECT.KEYID = 7
4,338,046 UART: [idev] UDS.KEYID = 0
4,339,131 ready_for_fw is high
4,339,346 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,379,322 UART: [idev] Erasing UDS.KEYID = 0
7,623,572 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,651 UART: [idev] --
7,649,477 UART: [ldev] ++
7,650,041 UART: [ldev] CDI.KEYID = 6
7,651,014 UART: [ldev] SUBJECT.KEYID = 5
7,652,231 UART: [ldev] AUTHORITY.KEYID = 7
7,653,458 UART: [ldev] FE.KEYID = 1
7,664,151 UART: [ldev] Erasing FE.KEYID = 1
10,954,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,107 UART: [ldev] --
13,314,649 UART: [fwproc] Waiting for Commands...
13,316,643 UART: [fwproc] Received command 0x46574c44
13,318,824 UART: [fwproc] Received Image of size 31676 bytes
16,363,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,445,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,514,447 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,543,696 >>> mbox cmd response: success
16,548,061 UART: [afmc] ++
16,548,676 UART: [afmc] CDI.KEYID = 6
16,549,624 UART: [afmc] SUBJECT.KEYID = 7
16,550,895 UART: [afmc] AUTHORITY.KEYID = 5
19,863,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,160,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,162,908 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,177,268 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,192,070 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,206,524 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,229,055 UART: [afmc] --
22,233,056 UART: [cold-reset] --
22,237,398 UART: [state] Locking Datavault
22,243,166 UART: [state] Locking PCR0, PCR1 and PCR31
22,244,917 UART: [state] Locking ICCM
22,247,252 UART: [exit] Launching FMC @ 0x40000130
22,255,626 UART:
22,255,918 UART: Running Caliptra FMC ...
22,257,015 UART:
22,257,173 UART: [state] CFI Enabled
22,265,232 UART: [fht] FMC Alias Private Key: 7
24,595,734 UART: [art] Extend RT PCRs Done
24,597,010 UART: [art] Lock RT PCRs Done
24,598,593 UART: [art] Populate DV Done
24,603,914 UART: [fht] FMC Alias Private Key: 7
24,605,439 UART: [art] Derive CDI
24,606,231 UART: [art] Store in in slot 0x4
24,648,721 UART: [art] Derive Key Pair
24,649,762 UART: [art] Store priv key in slot 0x5
27,891,188 UART: [art] Derive Key Pair - Done
27,904,042 UART: [art] Signing Cert with AUTHO
27,905,384 UART: RITY.KEYID = 7
30,184,929 UART: [art] Erasing AUTHORITY.KEYID = 7
30,186,490 UART: [art] PUB.X = 56098894BA55F6AFA089BEB3EA9BAC67177EA18F94CDEEDC389E59A340CAF4A3A293253A1FC58BE7415722451BDF3777
30,193,718 UART: [art] PUB.Y = 1D98F134D5CCA5A0E74A0F8C1D58ECB9A032F23626811B95B3FD3F1F2741EB08B395F2D2C59E2D9E539CA9EDEB4CFF1E
30,200,959 UART: [art] SIG.R = FD3BC8B5D770B07DFFFD5BDD28A4869A297E117DBB8981D285C8E1497F6C1FCE8D815F864A13B7CEFEF7D91FD0CBB1F9
30,208,376 UART: [art] SIG.S = DF46A51B7CA58CF5CD750476C275E1523A4CEA6F57676589F26C46FF486059749AA92AFC1CC20BB4F185D8E0AF138993
31,513,428 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,121,900 ready_for_fw is high
4,122,349 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,389,890 >>> mbox cmd response: success
22,030,910 UART:
22,031,369 UART: Running Caliptra FMC ...
22,032,489 UART:
22,032,651 UART: [state] CFI Enabled
22,040,120 UART: [fht] FMC Alias Private Key: 7
24,370,648 UART: [art] Extend RT PCRs Done
24,371,915 UART: [art] Lock RT PCRs Done
24,373,800 UART: [art] Populate DV Done
24,379,266 UART: [fht] FMC Alias Private Key: 7
24,381,013 UART: [art] Derive CDI
24,381,872 UART: [art] Store in in slot 0x4
24,424,059 UART: [art] Derive Key Pair
24,425,097 UART: [art] Store priv key in slot 0x5
27,667,033 UART: [art] Derive Key Pair - Done
27,680,243 UART: [art] Signing Cert with AUTHO
27,681,586 UART: RITY.KEYID = 7
29,960,521 UART: [art] Erasing AUTHORITY.KEYID = 7
29,962,084 UART: [art] PUB.X = EF5DE25CC9152D640F08B39A59C706E5BCA8350F2BA28999E9443881A98CDCC5EF0C8899337F7B57132C1CE69C94D82C
29,969,276 UART: [art] PUB.Y = 0092B5D330E5B50FE023B5BC665BF30421DF8FB4375CEF69CE3291308880C257C6348B13BA6491A7CBAC6B9CA4102927
29,976,521 UART: [art] SIG.R = C7BA978DF05BDE716F630532C022DD842B432731F5716D0B739236B414871D1AB1DFED6856454D223468465F02BC01FB
29,983,850 UART: [art] SIG.S = 23B5BDD63D5191096145A7DA9CAF948C743E737DAA519F81359453C21EBAF1ACBA8A3F815F589350CD7977221A68D87C
31,288,811 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,050 UART:
192,419 UART: Running Caliptra ROM ...
193,600 UART:
193,748 UART: [state] CFI Enabled
263,925 UART: [state] LifecycleState = Unprovisioned
265,821 UART: [state] DebugLocked = No
267,567 UART: [state] WD Timer not started. Device not locked for debugging
271,671 UART: [kat] SHA2-256
450,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,387 UART: [kat] ++
462,917 UART: [kat] sha1
474,639 UART: [kat] SHA2-256
477,671 UART: [kat] SHA2-384
483,484 UART: [kat] SHA2-512-ACC
486,426 UART: [kat] ECC-384
2,949,997 UART: [kat] HMAC-384Kdf
2,971,486 UART: [kat] LMS
3,500,939 UART: [kat] --
3,506,635 UART: [cold-reset] ++
3,507,499 UART: [fht] FHT @ 0x50003400
3,518,058 UART: [idev] ++
3,518,659 UART: [idev] CDI.KEYID = 6
3,519,540 UART: [idev] SUBJECT.KEYID = 7
3,520,788 UART: [idev] UDS.KEYID = 0
3,521,684 ready_for_fw is high
3,521,866 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,561,894 UART: [idev] Erasing UDS.KEYID = 0
6,026,095 UART: [idev] Sha1 KeyId Algorithm
6,048,423 UART: [idev] --
6,053,332 UART: [ldev] ++
6,053,904 UART: [ldev] CDI.KEYID = 6
6,054,815 UART: [ldev] SUBJECT.KEYID = 5
6,056,036 UART: [ldev] AUTHORITY.KEYID = 7
6,057,273 UART: [ldev] FE.KEYID = 1
6,099,007 UART: [ldev] Erasing FE.KEYID = 1
8,606,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,522 UART: [ldev] --
10,416,582 UART: [fwproc] Wait for Commands...
10,418,459 UART: [fwproc] Recv command 0x46574c44
10,420,549 UART: [fwproc] Recv'd Img size: 31656 bytes
12,815,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,886,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,955,595 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,984,597 >>> mbox cmd response: success
12,989,034 UART: [afmc] ++
12,989,646 UART: [afmc] CDI.KEYID = 6
12,990,585 UART: [afmc] SUBJECT.KEYID = 7
12,991,743 UART: [afmc] AUTHORITY.KEYID = 5
15,530,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,252,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,254,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,270,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,286,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,302,181 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,325,477 UART: [afmc] --
17,329,608 UART: [cold-reset] --
17,335,056 UART: [state] Locking Datavault
17,341,127 UART: [state] Locking PCR0, PCR1 and PCR31
17,342,798 UART: [state] Locking ICCM
17,345,308 UART: [exit] Launching FMC @ 0x40000130
17,353,761 UART:
17,354,006 UART: Running Caliptra FMC ...
17,355,135 UART:
17,355,288 UART: [state] CFI Enabled
17,412,097 UART: [fht] FMC Alias Private Key: 7
19,175,788 UART: [art] Extend RT PCRs Done
19,177,047 UART: [art] Lock RT PCRs Done
19,178,673 UART: [art] Populate DV Done
19,184,189 UART: [fht] FMC Alias Private Key: 7
19,185,845 UART: [art] Derive CDI
19,186,690 UART: [art] Store in in slot 0x4
19,244,395 UART: [art] Derive Key Pair
19,245,474 UART: [art] Store priv key in slot 0x5
21,708,639 UART: [art] Derive Key Pair - Done
21,721,831 UART: [art] Signing Cert with AUTHO
21,723,194 UART: RITY.KEYID = 7
23,433,847 UART: [art] Erasing AUTHORITY.KEYID = 7
23,435,532 UART: [art] PUB.X = 03F4A1645929AEF001406B45B4FBE8B2477DA371D9FC02D2C53C2C9060FDC0771A9E33E0CC720523B17041509D4D1EC8
23,442,584 UART: [art] PUB.Y = 8822C099DDA2787C5A56B42CA8A27F769E655585A84AB2F311D196BEF2B2D7C34D6CFC89C88AF93B24A8D44511BC7A03
23,449,901 UART: [art] SIG.R = ADF521AD78351497723864AA34F8E8610AB3F18816328C32E100E08210861831A2B50E4F9DC7E67127A9F1388D87B6AF
23,457,244 UART: [art] SIG.S = FF825618C76F7831D394304BDFA14887DCBA0FA85BEFEFC2088ED9AF1CEE31553CA57AD8C9B51B2FB42860198F0A44E9
24,435,975 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,056 writing to cptra_bootfsm_go
3,361,965 ready_for_fw is high
3,362,353 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,746,829 >>> mbox cmd response: success
17,025,887 UART:
17,026,270 UART: Running Caliptra FMC ...
17,027,397 UART:
17,027,546 UART: [state] CFI Enabled
17,092,453 UART: [fht] FMC Alias Private Key: 7
18,856,175 UART: [art] Extend RT PCRs Done
18,857,427 UART: [art] Lock RT PCRs Done
18,859,167 UART: [art] Populate DV Done
18,864,681 UART: [fht] FMC Alias Private Key: 7
18,866,351 UART: [art] Derive CDI
18,867,203 UART: [art] Store in in slot 0x4
18,924,930 UART: [art] Derive Key Pair
18,926,023 UART: [art] Store priv key in slot 0x5
21,389,608 UART: [art] Derive Key Pair - Done
21,403,073 UART: [art] Signing Cert with AUTHO
21,404,417 UART: RITY.KEYID = 7
23,114,897 UART: [art] Erasing AUTHORITY.KEYID = 7
23,116,444 UART: [art] PUB.X = 952A3402906D9B7AB067767B55F8771D4BAD74037C8278A892CE6BB4DA5CD44C2564BCDE2386AD689EE91E0E1392A03F
23,123,739 UART: [art] PUB.Y = 6A93CD7AF95D6156ECFC2C84F8EAD93504989A124BBD5CB8DBEA1974E517ABCEB0EF6A5BBE4343A8F72EC39514195F48
23,130,974 UART: [art] SIG.R = F62CE64BADF6015FEF2D7FA04BB19DF86FC69BCA604422B50B82FD5BE6B3F7C17893397888AD08B57B6E07C98FE66D29
23,138,373 UART: [art] SIG.S = 1455E56FEA7130FF198446B8D7ACEA852E26CD95D42BD482D4EFB4940A27D7C47AFE74D4C1AC2CAFA7F824AA3AF60101
24,116,843 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,399 UART:
192,772 UART: Running Caliptra ROM ...
193,956 UART:
603,621 UART: [state] CFI Enabled
614,531 UART: [state] LifecycleState = Unprovisioned
616,379 UART: [state] DebugLocked = No
618,405 UART: [state] WD Timer not started. Device not locked for debugging
622,226 UART: [kat] SHA2-256
801,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,948 UART: [kat] ++
813,481 UART: [kat] sha1
826,130 UART: [kat] SHA2-256
829,132 UART: [kat] SHA2-384
835,917 UART: [kat] SHA2-512-ACC
838,924 UART: [kat] ECC-384
3,280,260 UART: [kat] HMAC-384Kdf
3,293,068 UART: [kat] LMS
3,822,576 UART: [kat] --
3,826,153 UART: [cold-reset] ++
3,827,903 UART: [fht] FHT @ 0x50003400
3,839,169 UART: [idev] ++
3,839,735 UART: [idev] CDI.KEYID = 6
3,840,638 UART: [idev] SUBJECT.KEYID = 7
3,841,878 UART: [idev] UDS.KEYID = 0
3,842,796 ready_for_fw is high
3,842,985 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,882,896 UART: [idev] Erasing UDS.KEYID = 0
6,317,076 UART: [idev] Sha1 KeyId Algorithm
6,339,227 UART: [idev] --
6,344,097 UART: [ldev] ++
6,344,678 UART: [ldev] CDI.KEYID = 6
6,345,585 UART: [ldev] SUBJECT.KEYID = 5
6,346,797 UART: [ldev] AUTHORITY.KEYID = 7
6,348,023 UART: [ldev] FE.KEYID = 1
6,358,157 UART: [ldev] Erasing FE.KEYID = 1
8,832,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,012 UART: [ldev] --
10,623,379 UART: [fwproc] Wait for Commands...
10,626,173 UART: [fwproc] Recv command 0x46574c44
10,628,277 UART: [fwproc] Recv'd Img size: 31656 bytes
13,021,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,091,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,160,715 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,189,103 >>> mbox cmd response: success
13,194,221 UART: [afmc] ++
13,194,840 UART: [afmc] CDI.KEYID = 6
13,195,755 UART: [afmc] SUBJECT.KEYID = 7
13,196,904 UART: [afmc] AUTHORITY.KEYID = 5
15,697,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,419,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,421,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,437,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,453,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,469,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,492,330 UART: [afmc] --
17,496,453 UART: [cold-reset] --
17,500,587 UART: [state] Locking Datavault
17,506,338 UART: [state] Locking PCR0, PCR1 and PCR31
17,508,049 UART: [state] Locking ICCM
17,510,603 UART: [exit] Launching FMC @ 0x40000130
17,519,057 UART:
17,519,305 UART: Running Caliptra FMC ...
17,520,437 UART:
17,520,595 UART: [state] CFI Enabled
17,529,072 UART: [fht] FMC Alias Private Key: 7
19,285,689 UART: [art] Extend RT PCRs Done
19,286,954 UART: [art] Lock RT PCRs Done
19,288,733 UART: [art] Populate DV Done
19,294,175 UART: [fht] FMC Alias Private Key: 7
19,295,829 UART: [art] Derive CDI
19,296,676 UART: [art] Store in in slot 0x4
19,339,166 UART: [art] Derive Key Pair
19,340,200 UART: [art] Store priv key in slot 0x5
21,767,128 UART: [art] Derive Key Pair - Done
21,780,049 UART: [art] Signing Cert with AUTHO
21,781,393 UART: RITY.KEYID = 7
23,486,857 UART: [art] Erasing AUTHORITY.KEYID = 7
23,488,410 UART: [art] PUB.X = 34EF6292608DCC73006A1A6A386418E6B53D041CCD2FC3E216957F2C3324195B2D337173F41AE547DFC7AB41EEE6E4AA
23,495,620 UART: [art] PUB.Y = 186EDFBDDA9ACE837B18200920CD380B2F416F14309E4E49DD7B0416DFFD34ABEA7D4260E0C3DF6E9E967683A746C237
23,502,936 UART: [art] SIG.R = 8EA359F5AE53D5A68A68A8B43B452DB9E34F4E9BE8AB74380EC98DD185A189D4675BDF939012E8146C439A9BBB497B6A
23,510,393 UART: [art] SIG.S = 7E570D87B7E3F8E2F9E8194E48BFFBE110268C566DF0E933BBAB74F0AA68D04DE6B9517DF7913CBAF65CAE6ECDAA2A72
24,489,452 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,701,192 ready_for_fw is high
3,701,578 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,962,730 >>> mbox cmd response: success
17,212,631 UART:
17,213,014 UART: Running Caliptra FMC ...
17,214,158 UART:
17,214,321 UART: [state] CFI Enabled
17,222,087 UART: [fht] FMC Alias Private Key: 7
18,979,312 UART: [art] Extend RT PCRs Done
18,980,582 UART: [art] Lock RT PCRs Done
18,982,210 UART: [art] Populate DV Done
18,987,598 UART: [fht] FMC Alias Private Key: 7
18,989,118 UART: [art] Derive CDI
18,989,909 UART: [art] Store in in slot 0x4
19,032,540 UART: [art] Derive Key Pair
19,033,621 UART: [art] Store priv key in slot 0x5
21,460,152 UART: [art] Derive Key Pair - Done
21,472,941 UART: [art] Signing Cert with AUTHO
21,474,286 UART: RITY.KEYID = 7
23,179,558 UART: [art] Erasing AUTHORITY.KEYID = 7
23,181,128 UART: [art] PUB.X = F2B7C201F0C206589928BB360CF08822E948EA1D59E2396B472E4ECC5DDF9D62286EBFA4F285CECD04099E55EF91B1DA
23,188,423 UART: [art] PUB.Y = 09F053C25CD3B3AFA64CA78144036BDEE5ABB67568E881D19CA6FF0FB00BDCB19BC5EF6D95F09F073B96CBAA70C933DC
23,195,652 UART: [art] SIG.R = C96C43F5DE99E921E18275EC85F06C6B5F8F79C7CD22FCC01D33E7650F68D570BEDA0F4E3F2E13217A99DB601EE08A47
23,203,050 UART: [art] SIG.S = 6001990B8CBDF97049ADB50D716C4F7CE99421A4EE36F8900812547BC05C8C5C55367C582567E10A0D2E05300966F3BA
24,181,817 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
192,002 UART:
192,369 UART: Running Caliptra ROM ...
193,492 UART:
193,632 UART: [state] CFI Enabled
263,267 UART: [state] LifecycleState = Unprovisioned
265,662 UART: [state] DebugLocked = No
267,320 UART: [state] WD Timer not started. Device not locked for debugging
272,345 UART: [kat] SHA2-256
462,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,023 UART: [kat] ++
473,468 UART: [kat] sha1
483,628 UART: [kat] SHA2-256
486,705 UART: [kat] SHA2-384
491,559 UART: [kat] SHA2-512-ACC
494,132 UART: [kat] ECC-384
2,948,869 UART: [kat] HMAC-384Kdf
2,971,063 UART: [kat] LMS
3,502,815 UART: [kat] --
3,506,971 UART: [cold-reset] ++
3,508,982 UART: [fht] FHT @ 0x50003400
3,519,312 UART: [idev] ++
3,520,014 UART: [idev] CDI.KEYID = 6
3,520,922 UART: [idev] SUBJECT.KEYID = 7
3,522,163 UART: [idev] UDS.KEYID = 0
3,523,056 ready_for_fw is high
3,523,253 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,563,506 UART: [idev] Erasing UDS.KEYID = 0
6,028,480 UART: [idev] Sha1 KeyId Algorithm
6,051,276 UART: [idev] --
6,055,485 UART: [ldev] ++
6,056,161 UART: [ldev] CDI.KEYID = 6
6,057,069 UART: [ldev] SUBJECT.KEYID = 5
6,058,283 UART: [ldev] AUTHORITY.KEYID = 7
6,059,515 UART: [ldev] FE.KEYID = 1
6,099,565 UART: [ldev] Erasing FE.KEYID = 1
8,604,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,279 UART: [ldev] --
10,411,712 UART: [fwproc] Wait for Commands...
10,414,721 UART: [fwproc] Recv command 0x46574c44
10,417,015 UART: [fwproc] Recv'd Img size: 31656 bytes
12,846,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,927,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,044,102 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,090,719 >>> mbox cmd response: success
13,095,267 UART: [afmc] ++
13,095,888 UART: [afmc] CDI.KEYID = 6
13,097,125 UART: [afmc] SUBJECT.KEYID = 7
13,098,542 UART: [afmc] AUTHORITY.KEYID = 5
15,632,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,357,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,359,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,374,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,389,776 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,404,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,429,140 UART: [afmc] --
17,433,551 UART: [cold-reset] --
17,436,623 UART: [state] Locking Datavault
17,442,130 UART: [state] Locking PCR0, PCR1 and PCR31
17,444,329 UART: [state] Locking ICCM
17,446,139 UART: [exit] Launching FMC @ 0x40000130
17,454,809 UART:
17,455,051 UART: Running Caliptra FMC ...
17,456,359 UART:
17,456,535 UART: [state] CFI Enabled
17,515,708 UART: [fht] FMC Alias Private Key: 7
19,280,050 UART: [art] Extend RT PCRs Done
19,281,304 UART: [art] Lock RT PCRs Done
19,283,060 UART: [art] Populate DV Done
19,288,574 UART: [fht] FMC Alias Private Key: 7
19,290,297 UART: [art] Derive CDI
19,291,063 UART: [art] Store in in slot 0x4
19,348,085 UART: [art] Derive Key Pair
19,349,163 UART: [art] Store priv key in slot 0x5
21,812,024 UART: [art] Derive Key Pair - Done
21,825,218 UART: [art] Signing Cert with AUTHO
21,826,552 UART: RITY.KEYID = 7
23,537,161 UART: [art] Erasing AUTHORITY.KEYID = 7
23,538,715 UART: [art] PUB.X = 64FEDABCA40AA1B9FFF55D99669160D12245AA3F8391C343A2078C0316EA05BB30686782DA541FF4FCE39DC6305C8CB7
23,546,043 UART: [art] PUB.Y = 5CB5E3773CC4F2808ADD1AAE6D15B755EE06D6819685C5BAD7DB4695C100EC1D37E438B2989E83E20F67A7E6D75362E6
23,553,281 UART: [art] SIG.R = 3C0F126AF2DAD456D5E23EE79E6F204278B97CAFED554F5CD594A184AD0BA390A91A26B30A50D0F01659E318EDFB7D79
23,560,616 UART: [art] SIG.S = 09BC3DE3A340B1C790653D2088E6EEFB1FC5F8194331B98783BE0174B2CD5F5A83F4C4137ADA14F9D5386F7076894D81
24,539,200 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,438,646 ready_for_fw is high
3,439,042 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,964,388 >>> mbox cmd response: success
17,259,547 UART:
17,259,926 UART: Running Caliptra FMC ...
17,261,041 UART:
17,261,193 UART: [state] CFI Enabled
17,325,884 UART: [fht] FMC Alias Private Key: 7
19,089,421 UART: [art] Extend RT PCRs Done
19,090,683 UART: [art] Lock RT PCRs Done
19,091,840 UART: [art] Populate DV Done
19,097,162 UART: [fht] FMC Alias Private Key: 7
19,098,762 UART: [art] Derive CDI
19,099,740 UART: [art] Store in in slot 0x4
19,158,043 UART: [art] Derive Key Pair
19,159,093 UART: [art] Store priv key in slot 0x5
21,621,782 UART: [art] Derive Key Pair - Done
21,635,044 UART: [art] Signing Cert with AUTHO
21,636,385 UART: RITY.KEYID = 7
23,348,006 UART: [art] Erasing AUTHORITY.KEYID = 7
23,349,570 UART: [art] PUB.X = 1B6D0F8F3D0BDA2BCDA331D2718011967B93F72FF2FC6DA0AB44E1E9C1801A4E6B6E8739456E40C2278007BC7E5658A0
23,356,851 UART: [art] PUB.Y = C37FCB112C2F3C2C5049EA8A45B6CA88558938E10161D6DE5E7931AC0C6EA5A748A5071EE4F4974348C1CA424083DEC6
23,364,076 UART: [art] SIG.R = 92C442C0C53A7EFB07BC4FB5F929527117B4C9CE03240AD362EBE568AA025CAD65D5A68498585635D84F4A66EAB36426
23,371,483 UART: [art] SIG.S = EB5AD50B7A6E5A4FD2F9C65B1B7704184CE82ECA5C08EB8E11383702CACE84AC9B7A9FDF4886D76E6C7B39CDEA7E3962
24,350,372 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,446 UART:
192,800 UART: Running Caliptra ROM ...
193,984 UART:
603,654 UART: [state] CFI Enabled
617,324 UART: [state] LifecycleState = Unprovisioned
619,672 UART: [state] DebugLocked = No
621,909 UART: [state] WD Timer not started. Device not locked for debugging
626,797 UART: [kat] SHA2-256
816,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,452 UART: [kat] ++
828,054 UART: [kat] sha1
840,019 UART: [kat] SHA2-256
843,065 UART: [kat] SHA2-384
849,695 UART: [kat] SHA2-512-ACC
852,269 UART: [kat] ECC-384
3,293,300 UART: [kat] HMAC-384Kdf
3,307,175 UART: [kat] LMS
3,839,009 UART: [kat] --
3,845,184 UART: [cold-reset] ++
3,847,136 UART: [fht] FHT @ 0x50003400
3,858,748 UART: [idev] ++
3,859,377 UART: [idev] CDI.KEYID = 6
3,860,403 UART: [idev] SUBJECT.KEYID = 7
3,861,573 UART: [idev] UDS.KEYID = 0
3,862,498 ready_for_fw is high
3,862,702 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,902,851 UART: [idev] Erasing UDS.KEYID = 0
6,340,189 UART: [idev] Sha1 KeyId Algorithm
6,362,652 UART: [idev] --
6,368,835 UART: [ldev] ++
6,369,521 UART: [ldev] CDI.KEYID = 6
6,370,430 UART: [ldev] SUBJECT.KEYID = 5
6,371,642 UART: [ldev] AUTHORITY.KEYID = 7
6,372,813 UART: [ldev] FE.KEYID = 1
6,384,585 UART: [ldev] Erasing FE.KEYID = 1
8,860,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,516 UART: [ldev] --
10,652,856 UART: [fwproc] Wait for Commands...
10,655,647 UART: [fwproc] Recv command 0x46574c44
10,657,901 UART: [fwproc] Recv'd Img size: 31656 bytes
13,093,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,178,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,294,448 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,340,642 >>> mbox cmd response: success
13,343,990 UART: [afmc] ++
13,344,622 UART: [afmc] CDI.KEYID = 6
13,345,839 UART: [afmc] SUBJECT.KEYID = 7
13,347,354 UART: [afmc] AUTHORITY.KEYID = 5
15,855,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,575,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,577,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,592,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,607,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,622,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,646,907 UART: [afmc] --
17,650,237 UART: [cold-reset] --
17,654,645 UART: [state] Locking Datavault
17,660,284 UART: [state] Locking PCR0, PCR1 and PCR31
17,662,483 UART: [state] Locking ICCM
17,664,071 UART: [exit] Launching FMC @ 0x40000130
17,672,736 UART:
17,672,980 UART: Running Caliptra FMC ...
17,674,109 UART:
17,674,283 UART: [state] CFI Enabled
17,682,393 UART: [fht] FMC Alias Private Key: 7
19,439,311 UART: [art] Extend RT PCRs Done
19,440,554 UART: [art] Lock RT PCRs Done
19,442,330 UART: [art] Populate DV Done
19,447,633 UART: [fht] FMC Alias Private Key: 7
19,449,147 UART: [art] Derive CDI
19,449,936 UART: [art] Store in in slot 0x4
19,492,379 UART: [art] Derive Key Pair
19,493,450 UART: [art] Store priv key in slot 0x5
21,920,053 UART: [art] Derive Key Pair - Done
21,932,971 UART: [art] Signing Cert with AUTHO
21,934,303 UART: RITY.KEYID = 7
23,639,629 UART: [art] Erasing AUTHORITY.KEYID = 7
23,641,184 UART: [art] PUB.X = 484892ADCF69CA9E09EB1EC14B332BCAAE407A0293C84A863C1332D5A97D159798E8A5AD2F3DDBD328D43FE5E94DC338
23,648,409 UART: [art] PUB.Y = FF38E1E82BADC2415DB0C07D25BA4D1DF5ED2FD6A9B8337D9ECF8E19F45071006A5F54C88D58125D5AF40DFAA514E25A
23,655,644 UART: [art] SIG.R = 6CD9B94E66876986559FCC1F82DE42F2B8CA58266C7E631F3BC64D7340BC26871C2575677CE0DDB0F1E1A46244871BF5
23,663,077 UART: [art] SIG.S = 45ECBCFDF828DF05D79AD0D2546C4D040902D0109E166B6411947CF761DB0A96A098C074572E50A6DFEFAF043954315E
24,641,488 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,756,248 ready_for_fw is high
3,756,666 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,185,245 >>> mbox cmd response: success
17,444,551 UART:
17,444,944 UART: Running Caliptra FMC ...
17,446,273 UART:
17,446,440 UART: [state] CFI Enabled
17,454,154 UART: [fht] FMC Alias Private Key: 7
19,210,543 UART: [art] Extend RT PCRs Done
19,211,795 UART: [art] Lock RT PCRs Done
19,213,332 UART: [art] Populate DV Done
19,218,922 UART: [fht] FMC Alias Private Key: 7
19,220,517 UART: [art] Derive CDI
19,221,363 UART: [art] Store in in slot 0x4
19,263,683 UART: [art] Derive Key Pair
19,264,718 UART: [art] Store priv key in slot 0x5
21,691,590 UART: [art] Derive Key Pair - Done
21,704,716 UART: [art] Signing Cert with AUTHO
21,706,058 UART: RITY.KEYID = 7
23,411,264 UART: [art] Erasing AUTHORITY.KEYID = 7
23,412,836 UART: [art] PUB.X = 8B6ECEDFF9A54487776CE0298BA0D73366D95DAAC75991E6E62287AF083D176E975DB28ED3A73C8A96D629F089E6547C
23,420,108 UART: [art] PUB.Y = E6F2BB46D1F6039FCD3D92DFA2C56C203691CDF56F011EF2CF2F492DFFCF02AD1014E9BBBD9C9F6A9CB4A11E498F46F2
23,427,324 UART: [art] SIG.R = 54193751CBB58D34236EC3160DC14C60E6F7BFC7EE24B1A5A91856623D18B69071AD6D5D4AF145D0EE012AA133ACE3B0
23,434,727 UART: [art] SIG.S = D552CDAE9BEF8F64D24C19083B03CEDE8A1CF4A970974265B1ED9458572A5E210FAACE044868B15F8EE67E20DDA94832
24,413,050 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,049 UART: [kat] SHA2-256
881,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,095 UART: [kat] ++
886,247 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,356 UART: [kat] SHA2-512-ACC
897,257 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,688 UART: [kat] LMS
1,475,884 UART: [kat] --
1,476,729 UART: [cold-reset] ++
1,477,287 UART: [fht] Storing FHT @ 0x50003400
1,480,124 UART: [idev] ++
1,480,292 UART: [idev] CDI.KEYID = 6
1,480,652 UART: [idev] SUBJECT.KEYID = 7
1,481,076 UART: [idev] UDS.KEYID = 0
1,481,421 ready_for_fw is high
1,481,421 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,920 UART: [idev] Erasing UDS.KEYID = 0
1,505,544 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,186 UART: [idev] --
1,515,155 UART: [ldev] ++
1,515,323 UART: [ldev] CDI.KEYID = 6
1,515,686 UART: [ldev] SUBJECT.KEYID = 5
1,516,112 UART: [ldev] AUTHORITY.KEYID = 7
1,516,575 UART: [ldev] FE.KEYID = 1
1,521,681 UART: [ldev] Erasing FE.KEYID = 1
1,547,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,272 UART: [ldev] --
1,586,585 UART: [fwproc] Waiting for Commands...
1,587,320 UART: [fwproc] Received command 0x46574c44
1,588,111 UART: [fwproc] Received Image of size 31656 bytes
1,938,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,781 >>> mbox cmd response: success
2,007,867 UART: [afmc] ++
2,008,035 UART: [afmc] CDI.KEYID = 6
2,008,397 UART: [afmc] SUBJECT.KEYID = 7
2,008,822 UART: [afmc] AUTHORITY.KEYID = 5
2,044,213 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,058 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,748 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,693 UART: [afmc] --
2,087,733 UART: [cold-reset] --
2,088,311 UART: [state] Locking Datavault
2,089,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,796 UART: [state] Locking ICCM
2,090,300 UART: [exit] Launching FMC @ 0x40000130
2,095,629 UART:
2,095,645 UART: Running Caliptra FMC ...
2,096,053 UART:
2,096,107 UART: [state] CFI Enabled
2,106,848 UART: [fht] FMC Alias Private Key: 7
2,214,869 UART: [art] Extend RT PCRs Done
2,215,297 UART: [art] Lock RT PCRs Done
2,217,061 UART: [art] Populate DV Done
2,225,322 UART: [fht] FMC Alias Private Key: 7
2,226,402 UART: [art] Derive CDI
2,226,682 UART: [art] Store in in slot 0x4
2,311,649 UART: [art] Derive Key Pair
2,312,009 UART: [art] Store priv key in slot 0x5
2,324,999 UART: [art] Derive Key Pair - Done
2,339,418 UART: [art] Signing Cert with AUTHO
2,339,898 UART: RITY.KEYID = 7
2,355,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,207 UART: [art] PUB.X = F00B96F94448C151DBAB89B590D892D0628452855F786C8D6061A5D673C7D989B688F986B5F7329926195B7A995047C7
2,362,962 UART: [art] PUB.Y = FF1FF58C6F0070CDC396AA5F146DFA63669C76D2B545FAF0189876F86D780321F3EAA68582873EACF3A33C343EE98A60
2,369,897 UART: [art] SIG.R = 5A502C200BD9D9558D6B504BD20D6C6FB32F269E1324E64C7594D993629F29905E44D6B6B2F4D89FF5B66E1C9064F6BF
2,376,665 UART: [art] SIG.S = E33219FBAF1296AEB85EA8D41497B22F4CB48EACCCCF32E5C69D2D8AE8AC4438703246C4160CA3F7D977C0B13D1BA33A
2,399,838 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,641 ready_for_fw is high
1,362,641 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,557 >>> mbox cmd response: success
1,919,743 UART:
1,919,759 UART: Running Caliptra FMC ...
1,920,167 UART:
1,920,221 UART: [state] CFI Enabled
1,930,536 UART: [fht] FMC Alias Private Key: 7
2,038,879 UART: [art] Extend RT PCRs Done
2,039,307 UART: [art] Lock RT PCRs Done
2,040,741 UART: [art] Populate DV Done
2,048,920 UART: [fht] FMC Alias Private Key: 7
2,049,924 UART: [art] Derive CDI
2,050,204 UART: [art] Store in in slot 0x4
2,136,147 UART: [art] Derive Key Pair
2,136,507 UART: [art] Store priv key in slot 0x5
2,149,813 UART: [art] Derive Key Pair - Done
2,164,332 UART: [art] Signing Cert with AUTHO
2,164,812 UART: RITY.KEYID = 7
2,180,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,185 UART: [art] PUB.X = CE0652F406CECC9D123F7F4F1DAB9B195B882218D0F14E5A57F2A83D7F14C5CF9EB78CB2152CB4470DBD72F75AB9D2E3
2,187,966 UART: [art] PUB.Y = D30C2AFFA6717A48476A6535EAE3DD2E3759F22BE5F717FAF88D5756FB4F430953D4CCAEDDEDBD59D2E868FA0BEED4F4
2,194,935 UART: [art] SIG.R = BB879A95DE502AD4F54D235EFD0AAEE2271E287D2A6921FBCF7B5F2E81BB0C17A0EA5F2F25C4874964A33BC5E4DD3B97
2,201,721 UART: [art] SIG.S = 5B6A0A2671B447F222E71118BA47B8464CADD2FAFBBE4CA44BD4557C744BFD6969723F9DAC6C0A61C49F0F924466BD08
2,225,173 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
902,863 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,308 UART: [cold-reset] ++
1,476,810 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
1,480,966 ready_for_fw is high
1,480,966 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,763 UART: [idev] Erasing UDS.KEYID = 0
1,505,211 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,007 UART: [idev] --
1,515,046 UART: [ldev] ++
1,515,214 UART: [ldev] CDI.KEYID = 6
1,515,577 UART: [ldev] SUBJECT.KEYID = 5
1,516,003 UART: [ldev] AUTHORITY.KEYID = 7
1,516,466 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,959 UART: [ldev] --
1,586,434 UART: [fwproc] Waiting for Commands...
1,587,175 UART: [fwproc] Received command 0x46574c44
1,587,966 UART: [fwproc] Received Image of size 31656 bytes
1,938,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,144 >>> mbox cmd response: success
2,008,382 UART: [afmc] ++
2,008,550 UART: [afmc] CDI.KEYID = 6
2,008,912 UART: [afmc] SUBJECT.KEYID = 7
2,009,337 UART: [afmc] AUTHORITY.KEYID = 5
2,045,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,923 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,613 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,524 UART: [afmc] --
2,088,644 UART: [cold-reset] --
2,089,326 UART: [state] Locking Datavault
2,090,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,053 UART: [state] Locking ICCM
2,091,483 UART: [exit] Launching FMC @ 0x40000130
2,096,812 UART:
2,096,828 UART: Running Caliptra FMC ...
2,097,236 UART:
2,097,379 UART: [state] CFI Enabled
2,108,040 UART: [fht] FMC Alias Private Key: 7
2,216,479 UART: [art] Extend RT PCRs Done
2,216,907 UART: [art] Lock RT PCRs Done
2,218,577 UART: [art] Populate DV Done
2,226,638 UART: [fht] FMC Alias Private Key: 7
2,227,566 UART: [art] Derive CDI
2,227,846 UART: [art] Store in in slot 0x4
2,313,393 UART: [art] Derive Key Pair
2,313,753 UART: [art] Store priv key in slot 0x5
2,326,895 UART: [art] Derive Key Pair - Done
2,341,730 UART: [art] Signing Cert with AUTHO
2,342,210 UART: RITY.KEYID = 7
2,357,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,493 UART: [art] PUB.X = 2ED93D29DDD60F2DBDE770F90868F3C0964B2402277A249F7D6DF9D89B27EE86B63EDFBFD4E851BA3730782A2DEEB318
2,365,270 UART: [art] PUB.Y = CC930F9EAAD1763559849A22745BDCCEEB980CA3759FD62B132D8F64C0BFED1A370A10E5E9F20DB75438DEEECCCFA1A0
2,372,234 UART: [art] SIG.R = 976FF6B68C5F4392BCB11B1F48A151059834DF7B172A38F7E0DB2B02F339E501F5C36C3A6A69FF78A7B52CF8B8EA05C4
2,379,004 UART: [art] SIG.S = 808453918A21F6010CA1613E40175DDEEAF24989F0FDF78A483BEE206477D5C7C16E09A18FA9752F411A79B334CACC96
2,402,945 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,428 ready_for_fw is high
1,362,428 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,938 >>> mbox cmd response: success
1,918,542 UART:
1,918,558 UART: Running Caliptra FMC ...
1,918,966 UART:
1,919,109 UART: [state] CFI Enabled
1,929,770 UART: [fht] FMC Alias Private Key: 7
2,037,929 UART: [art] Extend RT PCRs Done
2,038,357 UART: [art] Lock RT PCRs Done
2,040,045 UART: [art] Populate DV Done
2,048,110 UART: [fht] FMC Alias Private Key: 7
2,049,098 UART: [art] Derive CDI
2,049,378 UART: [art] Store in in slot 0x4
2,135,093 UART: [art] Derive Key Pair
2,135,453 UART: [art] Store priv key in slot 0x5
2,148,731 UART: [art] Derive Key Pair - Done
2,163,514 UART: [art] Signing Cert with AUTHO
2,163,994 UART: RITY.KEYID = 7
2,179,526 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,291 UART: [art] PUB.X = 11852A3CA21D6705E6096F4C17D6CF21900ACD730C55ED587A1BC2272BBB991B7A8D87CAEA648568A1537215BF6D240B
2,187,052 UART: [art] PUB.Y = 3C0FB786F2074EF991A49A8055FD98A95195FBBC1462C2C83BC3830C3B1228F60808DF5B69F8BD95D2E7CF171374AC11
2,193,993 UART: [art] SIG.R = 033C4D3BB78038C5FED0982EA1A0E8DA4CF1B6FBA209F2186569038A3D59C3D902B1E16D2ED9AE0B725A55E1F01B906A
2,200,762 UART: [art] SIG.S = 909E0E8E66560747087C8F3CEEC13E146730317EC40DB85EAAA3FC8D92A7B81323B8F81E429965FC3E1678261A2CEDAF
2,224,408 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
893,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,469 UART: [kat] ++
897,621 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,380 UART: [kat] SHA2-512-ACC
908,281 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 ready_for_fw is high
1,176,121 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,690 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,217,071 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,304 UART: [fwproc] Wait for Commands...
1,282,998 UART: [fwproc] Recv command 0x46574c44
1,283,726 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,433 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,262 >>> mbox cmd response: success
1,702,300 UART: [afmc] ++
1,702,468 UART: [afmc] CDI.KEYID = 6
1,702,830 UART: [afmc] SUBJECT.KEYID = 7
1,703,255 UART: [afmc] AUTHORITY.KEYID = 5
1,738,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,687 UART: [afmc] --
1,781,601 UART: [cold-reset] --
1,782,485 UART: [state] Locking Datavault
1,783,482 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,086 UART: [state] Locking ICCM
1,784,706 UART: [exit] Launching FMC @ 0x40000130
1,790,035 UART:
1,790,051 UART: Running Caliptra FMC ...
1,790,459 UART:
1,790,513 UART: [state] CFI Enabled
1,801,186 UART: [fht] FMC Alias Private Key: 7
1,909,565 UART: [art] Extend RT PCRs Done
1,909,993 UART: [art] Lock RT PCRs Done
1,911,689 UART: [art] Populate DV Done
1,920,040 UART: [fht] FMC Alias Private Key: 7
1,921,018 UART: [art] Derive CDI
1,921,298 UART: [art] Store in in slot 0x4
2,006,851 UART: [art] Derive Key Pair
2,007,211 UART: [art] Store priv key in slot 0x5
2,019,543 UART: [art] Derive Key Pair - Done
2,034,391 UART: [art] Signing Cert with AUTHO
2,034,871 UART: RITY.KEYID = 7
2,049,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,682 UART: [art] PUB.X = C352A66CF17BF58957C20DBEBEDCA9D61FC6D275C692A6DAB72478B0C26D1DF57D870504BE9D90ED116FF720F6516950
2,057,457 UART: [art] PUB.Y = BDA4A2C6DE488B0628E2C7441A0D8ED4E245A0224EFD1800F9DA006DAEB759817524E7C71A5FDBA6DD675A0A23514397
2,064,366 UART: [art] SIG.R = D24D5080A69B2D0D39DBCF987DDD6F393C682FF1E6B7622A235345C172ADFA65FB12D778EF68E63840D39EEFE857D469
2,071,145 UART: [art] SIG.S = 16E0FFA0F05BE70D9C480431CDC3077D324A3D052F492C8C4B2CC1DBBB0E5BF23AF3426D2D7B79820A6DAA65F832B8F2
2,095,123 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 ready_for_fw is high
1,060,277 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,487 >>> mbox cmd response: success
1,617,625 UART:
1,617,641 UART: Running Caliptra FMC ...
1,618,049 UART:
1,618,103 UART: [state] CFI Enabled
1,628,752 UART: [fht] FMC Alias Private Key: 7
1,736,861 UART: [art] Extend RT PCRs Done
1,737,289 UART: [art] Lock RT PCRs Done
1,739,205 UART: [art] Populate DV Done
1,747,598 UART: [fht] FMC Alias Private Key: 7
1,748,762 UART: [art] Derive CDI
1,749,042 UART: [art] Store in in slot 0x4
1,834,139 UART: [art] Derive Key Pair
1,834,499 UART: [art] Store priv key in slot 0x5
1,847,799 UART: [art] Derive Key Pair - Done
1,862,891 UART: [art] Signing Cert with AUTHO
1,863,371 UART: RITY.KEYID = 7
1,878,889 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,654 UART: [art] PUB.X = 59237144ED848CD9F96B721F2DEADE23CE1AC72ABC63F60A0CC263ED57643F81FC20339BF55A8085A21E96291D23ED9D
1,886,430 UART: [art] PUB.Y = 81BB86C28D25C8AC6FD14000291911878DE7AEF495E17378B07D237CBCA9248716112ED4E17192776C284B89C5BC4592
1,893,354 UART: [art] SIG.R = BD52E2743E3D9B5956BB5496BF743A92CB059FBFDF2D42030FCA116D9AC455BDF36271B4EE6272818224EE0718D86C84
1,900,120 UART: [art] SIG.S = DC071069B9EC8872170E71AAD6CDC2FB102ED33377420355360F08BD36A1A718A9F4865E8A9BBDA6EB21129E99197DE5
1,923,957 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,869 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,702 UART: [cold-reset] ++
1,173,122 UART: [fht] FHT @ 0x50003400
1,175,965 UART: [idev] ++
1,176,133 UART: [idev] CDI.KEYID = 6
1,176,493 UART: [idev] SUBJECT.KEYID = 7
1,176,917 UART: [idev] UDS.KEYID = 0
1,177,262 ready_for_fw is high
1,177,262 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,185,039 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,200 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,218,030 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,110 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,231 UART: [fwproc] Recv command 0x46574c44
1,284,959 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,210 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,971 >>> mbox cmd response: success
1,705,031 UART: [afmc] ++
1,705,199 UART: [afmc] CDI.KEYID = 6
1,705,561 UART: [afmc] SUBJECT.KEYID = 7
1,705,986 UART: [afmc] AUTHORITY.KEYID = 5
1,741,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,396 UART: [afmc] --
1,784,516 UART: [cold-reset] --
1,785,246 UART: [state] Locking Datavault
1,786,325 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,929 UART: [state] Locking ICCM
1,787,485 UART: [exit] Launching FMC @ 0x40000130
1,792,814 UART:
1,792,830 UART: Running Caliptra FMC ...
1,793,238 UART:
1,793,381 UART: [state] CFI Enabled
1,803,788 UART: [fht] FMC Alias Private Key: 7
1,912,035 UART: [art] Extend RT PCRs Done
1,912,463 UART: [art] Lock RT PCRs Done
1,913,859 UART: [art] Populate DV Done
1,922,152 UART: [fht] FMC Alias Private Key: 7
1,923,096 UART: [art] Derive CDI
1,923,376 UART: [art] Store in in slot 0x4
2,008,927 UART: [art] Derive Key Pair
2,009,287 UART: [art] Store priv key in slot 0x5
2,022,375 UART: [art] Derive Key Pair - Done
2,037,192 UART: [art] Signing Cert with AUTHO
2,037,672 UART: RITY.KEYID = 7
2,053,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,039 UART: [art] PUB.X = 1FEDF36CBE095E96D8B66C2F48715DF26A7BDD162565E0B9464125FE9CB06B5F8F51DEE22D09287248550D8CBADE04D7
2,060,811 UART: [art] PUB.Y = F032B139F137F5D38CA96014C8FF92E126EF87F409CB2FB0644A7E1F5B407C8CC004AC6EF3AC90A11C8D9EB935650841
2,067,762 UART: [art] SIG.R = 9B3F8118825FBC2CD475AC5F401047CFE49D3024587DA5FA8D4FD268FB5880A11C05B41DFBDD706A39BB9268FE8D4DA1
2,074,545 UART: [art] SIG.S = 5D0C0A48D5E0DF85FBEDFBB4E91A92784885103D30C6BEFD21BB79CD7082798DEFBB064BD22563FA13A94EB5C10A9F4D
2,097,889 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,310 ready_for_fw is high
1,060,310 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,194 >>> mbox cmd response: success
1,618,686 UART:
1,618,702 UART: Running Caliptra FMC ...
1,619,110 UART:
1,619,253 UART: [state] CFI Enabled
1,629,838 UART: [fht] FMC Alias Private Key: 7
1,738,573 UART: [art] Extend RT PCRs Done
1,739,001 UART: [art] Lock RT PCRs Done
1,740,533 UART: [art] Populate DV Done
1,748,750 UART: [fht] FMC Alias Private Key: 7
1,749,826 UART: [art] Derive CDI
1,750,106 UART: [art] Store in in slot 0x4
1,835,607 UART: [art] Derive Key Pair
1,835,967 UART: [art] Store priv key in slot 0x5
1,849,125 UART: [art] Derive Key Pair - Done
1,863,942 UART: [art] Signing Cert with AUTHO
1,864,422 UART: RITY.KEYID = 7
1,879,774 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,539 UART: [art] PUB.X = 85C891F13C09500C0E6C0B6A4E0CE40AEA696389612D6279E7AB146E35CCA5D4FFC9B0EFC1AC557AB494EA7B6D47A712
1,887,307 UART: [art] PUB.Y = 18F54113AE4C13C97FF8D345B012BE4FDB1C3EEA11E3A5738E7BE577E2A48B0A6A05DBCDF419DC66F7C275AA5B6E4724
1,894,271 UART: [art] SIG.R = 6741A1BE027A1BE74860F310B0AD6A5688C0B26363FDEF7CB1EFB43B5236A37F47C1445721E23D22BCBF79A257AB722A
1,901,048 UART: [art] SIG.S = BE86BCFB9C6D64DF7AB63A1F0289A4BEF351074F5DAE5CC06267C5BF8EEC9F9E53452A9AF8E7504FA88FAEF7AEE9CAEF
1,925,642 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,529 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 ready_for_fw is high
1,175,013 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,041 UART: [idev] Erasing UDS.KEYID = 0
1,200,061 UART: [idev] Sha1 KeyId Algorithm
1,208,923 UART: [idev] --
1,209,820 UART: [ldev] ++
1,209,988 UART: [ldev] CDI.KEYID = 6
1,210,352 UART: [ldev] SUBJECT.KEYID = 5
1,210,779 UART: [ldev] AUTHORITY.KEYID = 7
1,211,242 UART: [ldev] FE.KEYID = 1
1,216,234 UART: [ldev] Erasing FE.KEYID = 1
1,242,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,156 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,118 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,982 >>> mbox cmd response: success
1,703,131 UART: [afmc] ++
1,703,299 UART: [afmc] CDI.KEYID = 6
1,703,662 UART: [afmc] SUBJECT.KEYID = 7
1,704,088 UART: [afmc] AUTHORITY.KEYID = 5
1,740,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,022 UART: [afmc] --
1,784,138 UART: [cold-reset] --
1,784,962 UART: [state] Locking Datavault
1,786,161 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,765 UART: [state] Locking ICCM
1,787,371 UART: [exit] Launching FMC @ 0x40000130
1,792,700 UART:
1,792,716 UART: Running Caliptra FMC ...
1,793,124 UART:
1,793,178 UART: [state] CFI Enabled
1,803,861 UART: [fht] FMC Alias Private Key: 7
1,911,522 UART: [art] Extend RT PCRs Done
1,911,950 UART: [art] Lock RT PCRs Done
1,913,210 UART: [art] Populate DV Done
1,921,275 UART: [fht] FMC Alias Private Key: 7
1,922,377 UART: [art] Derive CDI
1,922,657 UART: [art] Store in in slot 0x4
2,008,322 UART: [art] Derive Key Pair
2,008,682 UART: [art] Store priv key in slot 0x5
2,021,564 UART: [art] Derive Key Pair - Done
2,036,570 UART: [art] Signing Cert with AUTHO
2,037,050 UART: RITY.KEYID = 7
2,052,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,393 UART: [art] PUB.X = 7BF6BE6C62F43A50CBA6D4644EB43DDB4497B2F1C71398F48F289BDB266465C1A3AA8A0C1F8F3B81087C8D3058F3B3FC
2,060,173 UART: [art] PUB.Y = 33C954E1FE2A78E1FDFDC7DC46218240CDCF7A215414B695D5FAECE46B5C90881EA8E3A4059A174C39C09D3FC070B8D1
2,067,136 UART: [art] SIG.R = B8081D01F7A59FDE25FCEEEC6D4A6BF7090D2F207958B6BAC533C8B11C798C0874012DD60D95E0B3E806C1F8D6D92FBA
2,073,900 UART: [art] SIG.S = 31EE1516566BD5025935ED2FB7C12693438EAE86E910F0C360DE55D96EE7C45FF25B22EEF58BF2185929691A1EA7066D
2,097,294 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,570 >>> mbox cmd response: success
1,610,622 UART:
1,610,638 UART: Running Caliptra FMC ...
1,611,046 UART:
1,611,100 UART: [state] CFI Enabled
1,621,471 UART: [fht] FMC Alias Private Key: 7
1,729,348 UART: [art] Extend RT PCRs Done
1,729,776 UART: [art] Lock RT PCRs Done
1,731,330 UART: [art] Populate DV Done
1,739,553 UART: [fht] FMC Alias Private Key: 7
1,740,571 UART: [art] Derive CDI
1,740,851 UART: [art] Store in in slot 0x4
1,826,470 UART: [art] Derive Key Pair
1,826,830 UART: [art] Store priv key in slot 0x5
1,839,868 UART: [art] Derive Key Pair - Done
1,854,861 UART: [art] Signing Cert with AUTHO
1,855,341 UART: RITY.KEYID = 7
1,870,597 UART: [art] Erasing AUTHORITY.KEYID = 7
1,871,362 UART: [art] PUB.X = BAF0A8E912C129C8C6CB1173D9EF640DCD66CC66F4A357AE543AB3066ED2F2BEB4D646202069B849C107738115F9D192
1,878,131 UART: [art] PUB.Y = 2A68F4C943912EC989ABF5BB7E08ED28D8FB5398E769B6264AC9E3B5F55776A1E016828EC2EE7B33991B51B076CE3A3D
1,885,088 UART: [art] SIG.R = 6CEBCEF3086A2F64BB953DB713DF5E0EEAA755A2782817A77525D29199AF83E1F8CB3A32CF80227E5AF7B8A3FF9071EC
1,891,870 UART: [art] SIG.S = D0FA972935A78B7DD49DE48981436E566341D125DB3328FC9B8EEC580406C20D51323FA4ED24F6806F9DD4B496B662FB
1,915,009 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
891,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,068 UART: [kat] ++
896,220 UART: [kat] sha1
900,502 UART: [kat] SHA2-256
902,442 UART: [kat] SHA2-384
905,223 UART: [kat] SHA2-512-ACC
907,124 UART: [kat] ECC-384
916,891 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 ready_for_fw is high
1,174,816 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,371 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,211 >>> mbox cmd response: success
1,702,274 UART: [afmc] ++
1,702,442 UART: [afmc] CDI.KEYID = 6
1,702,805 UART: [afmc] SUBJECT.KEYID = 7
1,703,231 UART: [afmc] AUTHORITY.KEYID = 5
1,738,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,654 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,357 UART: [afmc] --
1,782,425 UART: [cold-reset] --
1,783,517 UART: [state] Locking Datavault
1,784,838 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,442 UART: [state] Locking ICCM
1,786,070 UART: [exit] Launching FMC @ 0x40000130
1,791,399 UART:
1,791,415 UART: Running Caliptra FMC ...
1,791,823 UART:
1,791,966 UART: [state] CFI Enabled
1,802,589 UART: [fht] FMC Alias Private Key: 7
1,910,492 UART: [art] Extend RT PCRs Done
1,910,920 UART: [art] Lock RT PCRs Done
1,912,570 UART: [art] Populate DV Done
1,920,429 UART: [fht] FMC Alias Private Key: 7
1,921,365 UART: [art] Derive CDI
1,921,645 UART: [art] Store in in slot 0x4
2,006,990 UART: [art] Derive Key Pair
2,007,350 UART: [art] Store priv key in slot 0x5
2,020,368 UART: [art] Derive Key Pair - Done
2,035,062 UART: [art] Signing Cert with AUTHO
2,035,542 UART: RITY.KEYID = 7
2,050,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,649 UART: [art] PUB.X = 0FE71D34092F1800C7DEB623DC09F833E1C6BF2B853E47544CA42378CF1571E6DB8518714727DF4F7EA126A4AE52972B
2,058,392 UART: [art] PUB.Y = 94A65F8325B08DD6BF1BCD7FE7D2E73B202FA8869505BF22362D25D894E89E0BA9D4E6AB0F43D9F10DA8217D34F0764E
2,065,342 UART: [art] SIG.R = 06FC3BCFEFF4A926F459AEF287B2C42D5BE0481F8845D0921FF15EFD5CE3376871B26C14A0CB8F80E4FFCB7BD58005D1
2,072,126 UART: [art] SIG.S = E1A58AE0638C1F6BCB6E23206969DB992EE3DE868BDF206B8668B42FCCBFB70084506B46921613651BE290D6FF713BE3
2,095,642 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,985 ready_for_fw is high
1,055,985 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,565 >>> mbox cmd response: success
1,615,959 UART:
1,615,975 UART: Running Caliptra FMC ...
1,616,383 UART:
1,616,526 UART: [state] CFI Enabled
1,627,361 UART: [fht] FMC Alias Private Key: 7
1,735,778 UART: [art] Extend RT PCRs Done
1,736,206 UART: [art] Lock RT PCRs Done
1,737,730 UART: [art] Populate DV Done
1,745,927 UART: [fht] FMC Alias Private Key: 7
1,747,109 UART: [art] Derive CDI
1,747,389 UART: [art] Store in in slot 0x4
1,833,108 UART: [art] Derive Key Pair
1,833,468 UART: [art] Store priv key in slot 0x5
1,846,580 UART: [art] Derive Key Pair - Done
1,861,333 UART: [art] Signing Cert with AUTHO
1,861,813 UART: RITY.KEYID = 7
1,877,113 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,878 UART: [art] PUB.X = 7EDACCF479D5A7C229099A37EBE9B656DF67B3E421E2F553C3D9993B0BA101F800FE94D31132C9F892DFC8909A51F361
1,884,627 UART: [art] PUB.Y = 124D44EED67932B11A1C3D9A7843C16C3DFFF521D879725F524B3A6381040A024569E5AD11D3394221A84DE740A2CBD1
1,891,568 UART: [art] SIG.R = 0365093369897D1698B0F5B1F0770621B6D8E9298A114547831EE7235E1DCD2D84596E47ADF9978F5C81DA7F6FD4BD2C
1,898,327 UART: [art] SIG.S = 5BEF81658F1C902F744C4056E652BC0AA736C5A8AEE5D20C97394FDCB039D49BA6ED2BA7B86C5F36FBED538569356592
1,922,023 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,977 UART:
192,348 UART: Running Caliptra ROM ...
193,512 UART:
193,664 UART: [state] CFI Enabled
268,280 UART: [state] LifecycleState = Unprovisioned
270,542 UART: [state] DebugLocked = No
271,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,306 UART: [kat] SHA2-256
445,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,486 UART: [kat] ++
456,967 UART: [kat] sha1
468,829 UART: [kat] SHA2-256
471,482 UART: [kat] SHA2-384
476,976 UART: [kat] SHA2-512-ACC
479,341 UART: [kat] ECC-384
2,766,580 UART: [kat] HMAC-384Kdf
2,778,826 UART: [kat] LMS
3,969,111 UART: [kat] --
3,973,420 UART: [cold-reset] ++
3,975,356 UART: [fht] Storing FHT @ 0x50003400
3,986,970 UART: [idev] ++
3,987,543 UART: [idev] CDI.KEYID = 6
3,988,449 UART: [idev] SUBJECT.KEYID = 7
3,989,691 UART: [idev] UDS.KEYID = 0
3,990,768 ready_for_fw is high
3,990,983 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,031,320 UART: [idev] Erasing UDS.KEYID = 0
7,327,177 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,522 UART: [idev] --
7,352,914 UART: [ldev] ++
7,353,476 UART: [ldev] CDI.KEYID = 6
7,354,435 UART: [ldev] SUBJECT.KEYID = 5
7,355,637 UART: [ldev] AUTHORITY.KEYID = 7
7,356,930 UART: [ldev] FE.KEYID = 1
7,402,228 UART: [ldev] Erasing FE.KEYID = 1
10,738,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,820 UART: [ldev] --
13,120,761 UART: [fwproc] Waiting for Commands...
13,123,606 UART: [fwproc] Received command 0x46574c44
13,125,781 UART: [fwproc] Received Image of size 31676 bytes
16,168,096 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,241,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,310,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,338,870 >>> mbox cmd response: success
16,343,710 UART: [afmc] ++
16,344,287 UART: [afmc] CDI.KEYID = 6
16,345,305 UART: [afmc] SUBJECT.KEYID = 7
16,346,462 UART: [afmc] AUTHORITY.KEYID = 5
19,710,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,010,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,013,100 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,027,499 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,042,308 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,056,752 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,077,804 UART: [afmc] --
22,081,076 UART: [cold-reset] --
22,085,694 UART: [state] Locking Datavault
22,091,161 UART: [state] Locking PCR0, PCR1 and PCR31
22,092,915 UART: [state] Locking ICCM
22,094,521 UART: [exit] Launching FMC @ 0x40000130
22,102,917 UART:
22,103,151 UART: Running Caliptra FMC ...
22,104,246 UART:
22,104,397 UART: [state] CFI Enabled
22,171,007 UART: [fht] FMC Alias Private Key: 7
24,509,142 UART: [art] Extend RT PCRs Done
24,510,531 UART: [art] Lock RT PCRs Done
24,512,075 UART: [art] Populate DV Done
24,517,597 UART: [fht] FMC Alias Private Key: 7
24,519,196 UART: [art] Derive CDI
24,520,010 UART: [art] Store in in slot 0x4
24,580,011 UART: [art] Derive Key Pair
24,581,010 UART: [art] Store priv key in slot 0x5
27,873,673 UART: [art] Derive Key Pair - Done
27,886,949 UART: [art] Signing Cert with AUTHO
27,888,250 UART: RITY.KEYID = 7
30,176,004 UART: [art] Erasing AUTHORITY.KEYID = 7
30,177,525 UART: [art] PUB.X = 79BF91C02AEFB7E5B351FE68D848F36AB0FFFB6A087519EF3B470FD3E7F3E4B6E4DE9B2810FDFF4BEF52A526B2ABEE03
30,184,785 UART: [art] PUB.Y = D8918C3723D6F478A7C7F64D2D1D4AE478119C0305D8A6537D6E1FBEB9B1D4B846B031B7E38F7D87F13AF59588EE6431
30,192,014 UART: [art] SIG.R = 30BF323A84EC8CE6EEE2AD7A4ADCA4D0211841CD0484B4BE692F4D2D4F97CED46C427B597CC73CF1583D367721CED067
30,199,418 UART: [art] SIG.S = E98A0F894B03B06B6CACCA838312793CE425C803DF43987C5730018A0394F62E2C1AD803DD0A12B85525419CA95B7A94
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,786,061 ready_for_fw is high
3,786,647 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,178,824 >>> mbox cmd response: success
21,861,801 UART:
21,862,252 UART: Running Caliptra FMC ...
21,863,355 UART:
21,863,510 UART: [state] CFI Enabled
21,932,901 UART: [fht] FMC Alias Private Key: 7
24,270,709 UART: [art] Extend RT PCRs Done
24,271,936 UART: [art] Lock RT PCRs Done
24,273,749 UART: [art] Populate DV Done
24,279,048 UART: [fht] FMC Alias Private Key: 7
24,280,592 UART: [art] Derive CDI
24,281,406 UART: [art] Store in in slot 0x4
24,341,135 UART: [art] Derive Key Pair
24,342,172 UART: [art] Store priv key in slot 0x5
27,635,198 UART: [art] Derive Key Pair - Done
27,648,200 UART: [art] Signing Cert with AUTHO
27,649,510 UART: RITY.KEYID = 7
29,936,529 UART: [art] Erasing AUTHORITY.KEYID = 7
29,938,048 UART: [art] PUB.X = EEFB5AF170F9C39F9954BB592672F45864F7B68B25B5B5AE10F114131EC322193BA01221E41D9F7F66AE10E17E6CF991
29,945,288 UART: [art] PUB.Y = 3C512141F5BB9535CD2EDECEBE6E583B0157F5F54CB5044721C708A3D6423503C08E35A368DA028B5FBF26A3C4356F6D
29,952,530 UART: [art] SIG.R = DE9215045A93CCFCF8B5B3A96828DEB70966DECFDAFF6DD5D3240DC107DB6C118931F10773DAB776C034B020B25923BC
29,959,890 UART: [art] SIG.S = 6C6822E45022859492D2379B64C778F9427ECC61AC3D50DB89EE06FC8DA3926B716BA4C5C5089437B8B03497512376D2
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,796 writing to cptra_bootfsm_go
194,028 UART:
194,403 UART: Running Caliptra ROM ...
195,580 UART:
605,102 UART: [state] CFI Enabled
622,191 UART: [state] LifecycleState = Unprovisioned
624,122 UART: [state] DebugLocked = No
626,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,183 UART: [kat] SHA2-256
800,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,491 UART: [kat] ++
811,969 UART: [kat] sha1
822,281 UART: [kat] SHA2-256
825,015 UART: [kat] SHA2-384
829,805 UART: [kat] SHA2-512-ACC
832,165 UART: [kat] ECC-384
3,116,147 UART: [kat] HMAC-384Kdf
3,126,754 UART: [kat] LMS
4,316,845 UART: [kat] --
4,321,992 UART: [cold-reset] ++
4,323,883 UART: [fht] Storing FHT @ 0x50003400
4,334,939 UART: [idev] ++
4,335,570 UART: [idev] CDI.KEYID = 6
4,336,494 UART: [idev] SUBJECT.KEYID = 7
4,337,741 UART: [idev] UDS.KEYID = 0
4,338,779 ready_for_fw is high
4,338,975 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,378,924 UART: [idev] Erasing UDS.KEYID = 0
7,625,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,870 UART: [idev] --
7,652,349 UART: [ldev] ++
7,652,917 UART: [ldev] CDI.KEYID = 6
7,653,853 UART: [ldev] SUBJECT.KEYID = 5
7,655,116 UART: [ldev] AUTHORITY.KEYID = 7
7,656,341 UART: [ldev] FE.KEYID = 1
7,665,876 UART: [ldev] Erasing FE.KEYID = 1
10,958,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,368 UART: [ldev] --
13,316,274 UART: [fwproc] Waiting for Commands...
13,318,806 UART: [fwproc] Received command 0x46574c44
13,320,986 UART: [fwproc] Received Image of size 31676 bytes
16,372,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,445,838 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,514,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,543,788 >>> mbox cmd response: success
16,547,208 UART: [afmc] ++
16,547,801 UART: [afmc] CDI.KEYID = 6
16,548,683 UART: [afmc] SUBJECT.KEYID = 7
16,549,951 UART: [afmc] AUTHORITY.KEYID = 5
19,866,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,160,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,162,849 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,177,211 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,192,042 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,206,489 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,228,290 UART: [afmc] --
22,232,100 UART: [cold-reset] --
22,235,148 UART: [state] Locking Datavault
22,241,267 UART: [state] Locking PCR0, PCR1 and PCR31
22,243,118 UART: [state] Locking ICCM
22,244,987 UART: [exit] Launching FMC @ 0x40000130
22,253,335 UART:
22,253,585 UART: Running Caliptra FMC ...
22,254,638 UART:
22,254,793 UART: [state] CFI Enabled
22,262,851 UART: [fht] FMC Alias Private Key: 7
24,592,889 UART: [art] Extend RT PCRs Done
24,594,134 UART: [art] Lock RT PCRs Done
24,595,645 UART: [art] Populate DV Done
24,601,098 UART: [fht] FMC Alias Private Key: 7
24,602,590 UART: [art] Derive CDI
24,603,323 UART: [art] Store in in slot 0x4
24,646,122 UART: [art] Derive Key Pair
24,647,161 UART: [art] Store priv key in slot 0x5
27,889,285 UART: [art] Derive Key Pair - Done
27,902,624 UART: [art] Signing Cert with AUTHO
27,903,928 UART: RITY.KEYID = 7
30,183,670 UART: [art] Erasing AUTHORITY.KEYID = 7
30,185,194 UART: [art] PUB.X = 489C7E33BBB8ACB9E125E73BA7CF3A875014563211BF5A8AE086DE5B7EA5952285651AA8662B9AA108F1CBFA30A37408
30,192,430 UART: [art] PUB.Y = C6BEF4804B5456E13D1AD684DD90798E8E02887467AE4D3CB518D59EE60535D0582839F12561B568D043E7B1D671309A
30,199,658 UART: [art] SIG.R = FD7FA9DF68B7CD36667700E131D9AB914F3AF8015A5CC182BBB8491874752C73DEB9247FFAFA800C00064D52CD82BCBE
30,207,045 UART: [art] SIG.S = A03A7C0176786786F402C72D85E5B6DB6159886BC7FBFC316053FA1005C93C379C8DCB5A8361E6069A6DF0CADCF8D178
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,128,314 ready_for_fw is high
4,128,910 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,394,043 >>> mbox cmd response: success
22,036,427 UART:
22,036,819 UART: Running Caliptra FMC ...
22,037,939 UART:
22,038,092 UART: [state] CFI Enabled
22,045,944 UART: [fht] FMC Alias Private Key: 7
24,376,639 UART: [art] Extend RT PCRs Done
24,377,893 UART: [art] Lock RT PCRs Done
24,379,490 UART: [art] Populate DV Done
24,385,224 UART: [fht] FMC Alias Private Key: 7
24,386,766 UART: [art] Derive CDI
24,387,582 UART: [art] Store in in slot 0x4
24,430,235 UART: [art] Derive Key Pair
24,431,280 UART: [art] Store priv key in slot 0x5
27,673,188 UART: [art] Derive Key Pair - Done
27,686,304 UART: [art] Signing Cert with AUTHO
27,687,607 UART: RITY.KEYID = 7
29,966,878 UART: [art] Erasing AUTHORITY.KEYID = 7
29,968,388 UART: [art] PUB.X = 48E0872F6873410BA06DC85B1F879A08EDBB464CB4492C300B5E03CF40D729D18F96ECE6EB8D208301D178169B9755DD
29,975,573 UART: [art] PUB.Y = 63B28FDD49EEC91D004729D93B78EDB7F71CBAB29E9C1DC77F089CB0A7A77157340DDFE5500F14DAD97681D47DAF288D
29,982,832 UART: [art] SIG.R = F9CE17849023496AC61681E859D807866578C36C3C3A09BB81B97FFFE531DEE69193EEBAF17A4285B5A50F6E525E5CA8
29,990,225 UART: [art] SIG.S = 9A4C7EFE8FF0CA617626C16342476A9A143370E78D6B8648306336CC38B3550C2C61D64C62065DA1A8A678BC1CC5AE9D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,078 UART:
192,432 UART: Running Caliptra ROM ...
193,517 UART:
193,657 UART: [state] CFI Enabled
261,000 UART: [state] LifecycleState = Unprovisioned
262,892 UART: [state] DebugLocked = No
265,560 UART: [state] WD Timer not started. Device not locked for debugging
269,969 UART: [kat] SHA2-256
449,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,695 UART: [kat] ++
461,233 UART: [kat] sha1
471,749 UART: [kat] SHA2-256
474,818 UART: [kat] SHA2-384
482,056 UART: [kat] SHA2-512-ACC
484,972 UART: [kat] ECC-384
2,946,751 UART: [kat] HMAC-384Kdf
2,969,363 UART: [kat] LMS
3,498,842 UART: [kat] --
3,502,516 UART: [cold-reset] ++
3,503,744 UART: [fht] FHT @ 0x50003400
3,514,663 UART: [idev] ++
3,515,221 UART: [idev] CDI.KEYID = 6
3,516,167 UART: [idev] SUBJECT.KEYID = 7
3,517,427 UART: [idev] UDS.KEYID = 0
3,518,531 ready_for_fw is high
3,518,723 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,558,762 UART: [idev] Erasing UDS.KEYID = 0
6,022,275 UART: [idev] Sha1 KeyId Algorithm
6,044,903 UART: [idev] --
6,049,754 UART: [ldev] ++
6,050,316 UART: [ldev] CDI.KEYID = 6
6,051,196 UART: [ldev] SUBJECT.KEYID = 5
6,052,412 UART: [ldev] AUTHORITY.KEYID = 7
6,053,697 UART: [ldev] FE.KEYID = 1
6,097,526 UART: [ldev] Erasing FE.KEYID = 1
8,601,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,815 UART: [ldev] --
10,411,952 UART: [fwproc] Wait for Commands...
10,414,905 UART: [fwproc] Recv command 0x46574c44
10,416,993 UART: [fwproc] Recv'd Img size: 31656 bytes
12,810,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,885,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,954,565 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,982,593 >>> mbox cmd response: success
12,987,385 UART: [afmc] ++
12,987,968 UART: [afmc] CDI.KEYID = 6
12,988,873 UART: [afmc] SUBJECT.KEYID = 7
12,990,022 UART: [afmc] AUTHORITY.KEYID = 5
15,527,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,269,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,271,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,287,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,303,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,319,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,340,718 UART: [afmc] --
17,343,931 UART: [cold-reset] --
17,349,086 UART: [state] Locking Datavault
17,353,630 UART: [state] Locking PCR0, PCR1 and PCR31
17,355,272 UART: [state] Locking ICCM
17,357,307 UART: [exit] Launching FMC @ 0x40000130
17,365,745 UART:
17,365,998 UART: Running Caliptra FMC ...
17,367,101 UART:
17,367,256 UART: [state] CFI Enabled
17,429,935 UART: [fht] FMC Alias Private Key: 7
19,193,226 UART: [art] Extend RT PCRs Done
19,194,433 UART: [art] Lock RT PCRs Done
19,196,287 UART: [art] Populate DV Done
19,201,577 UART: [fht] FMC Alias Private Key: 7
19,203,211 UART: [art] Derive CDI
19,204,030 UART: [art] Store in in slot 0x4
19,262,081 UART: [art] Derive Key Pair
19,263,072 UART: [art] Store priv key in slot 0x5
21,725,812 UART: [art] Derive Key Pair - Done
21,738,755 UART: [art] Signing Cert with AUTHO
21,740,053 UART: RITY.KEYID = 7
23,452,476 UART: [art] Erasing AUTHORITY.KEYID = 7
23,453,993 UART: [art] PUB.X = 8A3078971B3C85E459BB151D032523B06BD8FAD21BE07BA9428ACDD5284208A37598C84688E9F112DCB2E2275235409D
23,461,214 UART: [art] PUB.Y = 1E96A39719CA560BCD655997DAF0AA683974BDC13E88F1057AFF2149D5AD6A36E99B39CB3A6ECAEB3A3D5E86C62B323F
23,468,497 UART: [art] SIG.R = 270ACFC1416B7A71520606601AA33D64AC6A7DA6203E3474A1A6C8E74C0B38A1EF17A9766E7A98569F34FFFEF0404139
23,475,872 UART: [art] SIG.S = B2AD7E912E626AC11A0A6339FE68071C4C62B4299C16453B3EF6D60FCC61C8A8B4D24018CC8897981BF6AB2A4B61B4BD
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,361,190 ready_for_fw is high
3,361,620 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,718,704 >>> mbox cmd response: success
16,997,305 UART:
16,997,702 UART: Running Caliptra FMC ...
16,998,900 UART:
16,999,080 UART: [state] CFI Enabled
17,064,003 UART: [fht] FMC Alias Private Key: 7
18,828,149 UART: [art] Extend RT PCRs Done
18,829,367 UART: [art] Lock RT PCRs Done
18,831,052 UART: [art] Populate DV Done
18,836,349 UART: [fht] FMC Alias Private Key: 7
18,837,940 UART: [art] Derive CDI
18,838,756 UART: [art] Store in in slot 0x4
18,896,259 UART: [art] Derive Key Pair
18,897,289 UART: [art] Store priv key in slot 0x5
21,360,776 UART: [art] Derive Key Pair - Done
21,373,942 UART: [art] Signing Cert with AUTHO
21,375,246 UART: RITY.KEYID = 7
23,086,064 UART: [art] Erasing AUTHORITY.KEYID = 7
23,087,632 UART: [art] PUB.X = B6BC82AE20C902E55F1C7814C23101B915B8FA24A6E3647EEEAE5CF86922AD42338CD7C43B587B6B6B38894A2E9D2D7D
23,094,849 UART: [art] PUB.Y = 2696176984D207A453559CD09808A50B419F376908A803EA402DED58FE7086576B9BE300156936EE27AE218268E63FBE
23,102,077 UART: [art] SIG.R = 49694D54E5D00E205E4EA6E37D97B5AC3915598BE8F8F32C2430E74928F209D9C4F128ECB6037D8E150EF85791CC4E84
23,109,437 UART: [art] SIG.S = 15D0133BB82E9F3D15E8F34F30FCC847549566F21DC8E445CC87152D634BB9906CCC580B391C4F8EBFE195A2E1D94A2E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,396 UART:
192,765 UART: Running Caliptra ROM ...
193,857 UART:
603,534 UART: [state] CFI Enabled
616,217 UART: [state] LifecycleState = Unprovisioned
618,071 UART: [state] DebugLocked = No
620,674 UART: [state] WD Timer not started. Device not locked for debugging
624,056 UART: [kat] SHA2-256
803,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,725 UART: [kat] ++
815,170 UART: [kat] sha1
826,107 UART: [kat] SHA2-256
829,190 UART: [kat] SHA2-384
835,534 UART: [kat] SHA2-512-ACC
838,466 UART: [kat] ECC-384
3,280,207 UART: [kat] HMAC-384Kdf
3,292,773 UART: [kat] LMS
3,822,272 UART: [kat] --
3,827,268 UART: [cold-reset] ++
3,828,129 UART: [fht] FHT @ 0x50003400
3,840,170 UART: [idev] ++
3,840,744 UART: [idev] CDI.KEYID = 6
3,841,643 UART: [idev] SUBJECT.KEYID = 7
3,842,813 UART: [idev] UDS.KEYID = 0
3,843,746 ready_for_fw is high
3,843,970 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,884,144 UART: [idev] Erasing UDS.KEYID = 0
6,315,891 UART: [idev] Sha1 KeyId Algorithm
6,337,959 UART: [idev] --
6,341,491 UART: [ldev] ++
6,342,060 UART: [ldev] CDI.KEYID = 6
6,343,167 UART: [ldev] SUBJECT.KEYID = 5
6,344,269 UART: [ldev] AUTHORITY.KEYID = 7
6,345,441 UART: [ldev] FE.KEYID = 1
6,355,699 UART: [ldev] Erasing FE.KEYID = 1
8,828,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,474 UART: [ldev] --
10,619,709 UART: [fwproc] Wait for Commands...
10,621,471 UART: [fwproc] Recv command 0x46574c44
10,623,557 UART: [fwproc] Recv'd Img size: 31656 bytes
13,021,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,093,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,162,440 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,190,994 >>> mbox cmd response: success
13,194,965 UART: [afmc] ++
13,195,548 UART: [afmc] CDI.KEYID = 6
13,196,450 UART: [afmc] SUBJECT.KEYID = 7
13,197,603 UART: [afmc] AUTHORITY.KEYID = 5
15,698,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,420,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,422,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,438,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,454,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,470,030 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,494,023 UART: [afmc] --
17,497,997 UART: [cold-reset] --
17,503,257 UART: [state] Locking Datavault
17,507,636 UART: [state] Locking PCR0, PCR1 and PCR31
17,509,277 UART: [state] Locking ICCM
17,510,773 UART: [exit] Launching FMC @ 0x40000130
17,519,167 UART:
17,519,400 UART: Running Caliptra FMC ...
17,520,495 UART:
17,520,648 UART: [state] CFI Enabled
17,529,063 UART: [fht] FMC Alias Private Key: 7
19,285,995 UART: [art] Extend RT PCRs Done
19,287,227 UART: [art] Lock RT PCRs Done
19,288,763 UART: [art] Populate DV Done
19,294,275 UART: [fht] FMC Alias Private Key: 7
19,295,871 UART: [art] Derive CDI
19,296,603 UART: [art] Store in in slot 0x4
19,339,336 UART: [art] Derive Key Pair
19,340,330 UART: [art] Store priv key in slot 0x5
21,766,686 UART: [art] Derive Key Pair - Done
21,779,362 UART: [art] Signing Cert with AUTHO
21,780,659 UART: RITY.KEYID = 7
23,486,450 UART: [art] Erasing AUTHORITY.KEYID = 7
23,487,952 UART: [art] PUB.X = D6EDF5E7E0780170FD0EFBCBD3B5A587171AB904A7C46460E75213086C8EE2907B932C287E33846AB1A8966C3854C9FE
23,495,223 UART: [art] PUB.Y = 0B7581D4AC43B4F536861275F25E7EDDE28E5F57B460CF41BCB0F8D852177BDDAB135310363AFE8FD2831D71C9C8E5D9
23,502,491 UART: [art] SIG.R = 2F42CE596A33EEB58CBAB618465188BEFEB5827457D6D2C3E8F1A5A8987350402D1645C865AA6EDF5CE75A154AA20742
23,509,864 UART: [art] SIG.S = 2259C46ECE1461089226CE0CF39443DD7AA1B50C6D5AA267032F123689B51F5A3EA17F49D8FDDF8DE956F1DBA4C230DB
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,694,088 ready_for_fw is high
3,694,747 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,975,510 >>> mbox cmd response: success
17,223,809 UART:
17,224,182 UART: Running Caliptra FMC ...
17,225,287 UART:
17,225,434 UART: [state] CFI Enabled
17,233,377 UART: [fht] FMC Alias Private Key: 7
18,990,132 UART: [art] Extend RT PCRs Done
18,991,356 UART: [art] Lock RT PCRs Done
18,992,770 UART: [art] Populate DV Done
18,998,236 UART: [fht] FMC Alias Private Key: 7
18,999,778 UART: [art] Derive CDI
19,000,509 UART: [art] Store in in slot 0x4
19,043,412 UART: [art] Derive Key Pair
19,044,417 UART: [art] Store priv key in slot 0x5
21,470,940 UART: [art] Derive Key Pair - Done
21,484,104 UART: [art] Signing Cert with AUTHO
21,485,405 UART: RITY.KEYID = 7
23,190,984 UART: [art] Erasing AUTHORITY.KEYID = 7
23,192,494 UART: [art] PUB.X = BE2707A46EDE583FCF346CCBE58FDA7BCB8F990E7511434660AFCB48E171A3306F9F01F8DF750777463C2327291CAD1D
23,199,728 UART: [art] PUB.Y = 4732852757275FB267E704FED4E55ED8652874709E6D3DC8720FD5D201FB7FC8CA02B5429B3D9D2AEC042D9884C4CA25
23,207,018 UART: [art] SIG.R = 8120BA372D7D8B450CD94E8DE4BCB073175EB0143A4EA9897802F72516BDB8C5384648D0E262D9D151D9C69FFE980350
23,214,386 UART: [art] SIG.S = CF9331C96AEF52F331FC3156970EB0FC7CC258C5C4736689EBC2686B4745807F27DF1C07FD0BE85DFE2B36F87795065D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
191,984 UART:
192,332 UART: Running Caliptra ROM ...
193,507 UART:
193,654 UART: [state] CFI Enabled
264,676 UART: [state] LifecycleState = Unprovisioned
267,089 UART: [state] DebugLocked = No
268,626 UART: [state] WD Timer not started. Device not locked for debugging
272,306 UART: [kat] SHA2-256
462,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,992 UART: [kat] ++
473,475 UART: [kat] sha1
483,989 UART: [kat] SHA2-256
487,000 UART: [kat] SHA2-384
493,346 UART: [kat] SHA2-512-ACC
495,993 UART: [kat] ECC-384
2,950,393 UART: [kat] HMAC-384Kdf
2,974,787 UART: [kat] LMS
3,506,593 UART: [kat] --
3,510,018 UART: [cold-reset] ++
3,511,730 UART: [fht] FHT @ 0x50003400
3,522,065 UART: [idev] ++
3,522,722 UART: [idev] CDI.KEYID = 6
3,523,753 UART: [idev] SUBJECT.KEYID = 7
3,524,850 UART: [idev] UDS.KEYID = 0
3,525,771 ready_for_fw is high
3,525,975 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,566,648 UART: [idev] Erasing UDS.KEYID = 0
6,031,128 UART: [idev] Sha1 KeyId Algorithm
6,052,235 UART: [idev] --
6,056,844 UART: [ldev] ++
6,057,528 UART: [ldev] CDI.KEYID = 6
6,058,603 UART: [ldev] SUBJECT.KEYID = 5
6,059,706 UART: [ldev] AUTHORITY.KEYID = 7
6,060,878 UART: [ldev] FE.KEYID = 1
6,102,472 UART: [ldev] Erasing FE.KEYID = 1
8,603,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,576 UART: [ldev] --
10,394,355 UART: [fwproc] Wait for Commands...
10,396,176 UART: [fwproc] Recv command 0x46574c44
10,398,489 UART: [fwproc] Recv'd Img size: 31656 bytes
12,825,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,903,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,019,314 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,066,508 >>> mbox cmd response: success
13,070,162 UART: [afmc] ++
13,070,800 UART: [afmc] CDI.KEYID = 6
13,072,038 UART: [afmc] SUBJECT.KEYID = 7
13,073,467 UART: [afmc] AUTHORITY.KEYID = 5
15,618,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,340,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,342,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,357,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,372,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,387,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,410,399 UART: [afmc] --
17,414,485 UART: [cold-reset] --
17,418,296 UART: [state] Locking Datavault
17,424,459 UART: [state] Locking PCR0, PCR1 and PCR31
17,426,647 UART: [state] Locking ICCM
17,428,313 UART: [exit] Launching FMC @ 0x40000130
17,436,984 UART:
17,437,219 UART: Running Caliptra FMC ...
17,438,317 UART:
17,438,472 UART: [state] CFI Enabled
17,498,615 UART: [fht] FMC Alias Private Key: 7
19,262,404 UART: [art] Extend RT PCRs Done
19,263,625 UART: [art] Lock RT PCRs Done
19,265,246 UART: [art] Populate DV Done
19,270,856 UART: [fht] FMC Alias Private Key: 7
19,272,511 UART: [art] Derive CDI
19,273,325 UART: [art] Store in in slot 0x4
19,331,482 UART: [art] Derive Key Pair
19,332,522 UART: [art] Store priv key in slot 0x5
21,795,664 UART: [art] Derive Key Pair - Done
21,808,498 UART: [art] Signing Cert with AUTHO
21,809,836 UART: RITY.KEYID = 7
23,522,291 UART: [art] Erasing AUTHORITY.KEYID = 7
23,523,794 UART: [art] PUB.X = A597AEE552A4DF2EE09AF5603254EC015FDB31925920A2BAA1562B53F410959E6B0CC1D90FE4BDD757425AC4301CD81D
23,531,071 UART: [art] PUB.Y = AAB66AB759D503198E404E84D198453339517C5999F2515364F5221AEAB6F5BE4CC43F39D378CBFA0708C310BECDB59E
23,538,336 UART: [art] SIG.R = F77E820263DED697B2769DD8C44E70CEB9DF1DEC2CF4078F3BF968A650CE1AA6CA9EE393C4C7A4F3A37C6DAC851F255C
23,545,764 UART: [art] SIG.S = 801A101AF2D261E3160CD37EF6700420F26B94B0CF5EB50ADA634832917C9B5E1518F8C6F8053C8938499F3C71A6E49A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,439,742 ready_for_fw is high
3,440,318 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,962,460 >>> mbox cmd response: success
17,257,487 UART:
17,257,857 UART: Running Caliptra FMC ...
17,259,060 UART:
17,259,229 UART: [state] CFI Enabled
17,323,175 UART: [fht] FMC Alias Private Key: 7
19,087,571 UART: [art] Extend RT PCRs Done
19,088,788 UART: [art] Lock RT PCRs Done
19,090,361 UART: [art] Populate DV Done
19,095,779 UART: [fht] FMC Alias Private Key: 7
19,097,429 UART: [art] Derive CDI
19,098,247 UART: [art] Store in in slot 0x4
19,156,046 UART: [art] Derive Key Pair
19,157,087 UART: [art] Store priv key in slot 0x5
21,620,132 UART: [art] Derive Key Pair - Done
21,632,923 UART: [art] Signing Cert with AUTHO
21,634,257 UART: RITY.KEYID = 7
23,346,008 UART: [art] Erasing AUTHORITY.KEYID = 7
23,347,523 UART: [art] PUB.X = BAD35C05BB826395245B6FA1918BB663FD312018C6483685621D4C77EDA90D84DDFEC9EAFA88A6998E84CB92781A4460
23,354,758 UART: [art] PUB.Y = D66EF780F02BDD38DA5206225164007AE8A53507F293C53426154306B49754855CBCC397D88F0E43782BC28C4F1BB0B3
23,361,956 UART: [art] SIG.R = 453BF70E5C0D31ED7FC1C3706B53236ABC8BEDB82ABF1A64008164D90E26B9D927D987F0D5BAC0167A07DEA06EC70BF5
23,369,377 UART: [art] SIG.S = A9D83FDE73473D40A6698721FDCD581E65D4B7E8E9D7B04FA83EB07B52151DCC2516271E981B43FED2FA0EDA6921FC2F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,431 UART:
192,790 UART: Running Caliptra ROM ...
193,961 UART:
603,783 UART: [state] CFI Enabled
618,548 UART: [state] LifecycleState = Unprovisioned
620,899 UART: [state] DebugLocked = No
622,764 UART: [state] WD Timer not started. Device not locked for debugging
628,134 UART: [kat] SHA2-256
818,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,723 UART: [kat] ++
829,238 UART: [kat] sha1
840,604 UART: [kat] SHA2-256
843,687 UART: [kat] SHA2-384
849,605 UART: [kat] SHA2-512-ACC
852,180 UART: [kat] ECC-384
3,294,533 UART: [kat] HMAC-384Kdf
3,306,774 UART: [kat] LMS
3,838,628 UART: [kat] --
3,842,189 UART: [cold-reset] ++
3,843,266 UART: [fht] FHT @ 0x50003400
3,853,973 UART: [idev] ++
3,854,614 UART: [idev] CDI.KEYID = 6
3,855,645 UART: [idev] SUBJECT.KEYID = 7
3,856,816 UART: [idev] UDS.KEYID = 0
3,857,735 ready_for_fw is high
3,857,914 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,897,990 UART: [idev] Erasing UDS.KEYID = 0
6,328,911 UART: [idev] Sha1 KeyId Algorithm
6,351,696 UART: [idev] --
6,356,803 UART: [ldev] ++
6,357,487 UART: [ldev] CDI.KEYID = 6
6,358,406 UART: [ldev] SUBJECT.KEYID = 5
6,359,560 UART: [ldev] AUTHORITY.KEYID = 7
6,360,792 UART: [ldev] FE.KEYID = 1
6,370,166 UART: [ldev] Erasing FE.KEYID = 1
8,846,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,302 UART: [ldev] --
10,639,452 UART: [fwproc] Wait for Commands...
10,642,566 UART: [fwproc] Recv command 0x46574c44
10,644,816 UART: [fwproc] Recv'd Img size: 31656 bytes
13,069,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,146,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,262,613 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,308,489 >>> mbox cmd response: success
13,312,562 UART: [afmc] ++
13,313,207 UART: [afmc] CDI.KEYID = 6
13,314,390 UART: [afmc] SUBJECT.KEYID = 7
13,315,873 UART: [afmc] AUTHORITY.KEYID = 5
15,821,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,542,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,544,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,560,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,575,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,590,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,612,988 UART: [afmc] --
17,615,994 UART: [cold-reset] --
17,618,664 UART: [state] Locking Datavault
17,626,123 UART: [state] Locking PCR0, PCR1 and PCR31
17,628,289 UART: [state] Locking ICCM
17,629,741 UART: [exit] Launching FMC @ 0x40000130
17,638,417 UART:
17,638,649 UART: Running Caliptra FMC ...
17,639,747 UART:
17,639,908 UART: [state] CFI Enabled
17,647,866 UART: [fht] FMC Alias Private Key: 7
19,404,787 UART: [art] Extend RT PCRs Done
19,406,006 UART: [art] Lock RT PCRs Done
19,407,415 UART: [art] Populate DV Done
19,412,538 UART: [fht] FMC Alias Private Key: 7
19,414,245 UART: [art] Derive CDI
19,415,058 UART: [art] Store in in slot 0x4
19,457,474 UART: [art] Derive Key Pair
19,458,472 UART: [art] Store priv key in slot 0x5
21,884,642 UART: [art] Derive Key Pair - Done
21,897,697 UART: [art] Signing Cert with AUTHO
21,899,007 UART: RITY.KEYID = 7
23,603,978 UART: [art] Erasing AUTHORITY.KEYID = 7
23,605,485 UART: [art] PUB.X = AFB5FDDB5269DC8FAF336E5169A1F6206CD1DFAE82A48A5E1A06F81B2D7190750C0E3B0B32537094B56FBB940D48DA57
23,612,777 UART: [art] PUB.Y = 102947335AD86346D2F7ADC5E16CD0727D1FD1FFCB68C843DE48BB592F679130451DC9576720314FAF0311A058BA9D89
23,620,034 UART: [art] SIG.R = 7F2BE0238A28DF5B8E3488BEEB4A266658A976CBC8F7863C3C3891886C542B0A85029089CEF1C9E0F8F380B1EF7A382B
23,627,454 UART: [art] SIG.S = E974FE43E34786CF944830114F629DE6006110301DE5F1B852105D26E2D877E90803EC5E90556E036DCE572A74B86FDB
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,754,298 ready_for_fw is high
3,754,686 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,182,768 >>> mbox cmd response: success
17,436,966 UART:
17,437,350 UART: Running Caliptra FMC ...
17,438,549 UART:
17,438,717 UART: [state] CFI Enabled
17,446,603 UART: [fht] FMC Alias Private Key: 7
19,203,681 UART: [art] Extend RT PCRs Done
19,204,909 UART: [art] Lock RT PCRs Done
19,206,752 UART: [art] Populate DV Done
19,212,088 UART: [fht] FMC Alias Private Key: 7
19,213,593 UART: [art] Derive CDI
19,214,355 UART: [art] Store in in slot 0x4
19,256,825 UART: [art] Derive Key Pair
19,257,826 UART: [art] Store priv key in slot 0x5
21,684,635 UART: [art] Derive Key Pair - Done
21,697,636 UART: [art] Signing Cert with AUTHO
21,698,947 UART: RITY.KEYID = 7
23,404,485 UART: [art] Erasing AUTHORITY.KEYID = 7
23,405,991 UART: [art] PUB.X = 3291E75FDEE9D73F6BB9D5C54AE488CC342FCF44BA7BD4E29254EBD35B8537978D655ACC3921E2FBBF7B0ABBF99A1D23
23,413,263 UART: [art] PUB.Y = BE88DDD7EB4B4B5BFC7A8393B7217A79075CCE035A48FDD76E8EECB5747019997CE6516C814E65B8167CCFFCCD597778
23,420,565 UART: [art] SIG.R = F1EAEF74277AEAEE4A1D4D2E233479A7B6AC14CD327634FDBBFFF737EAEE789848AF7D9D5A7AD86B5D3974537D02E35B
23,427,933 UART: [art] SIG.S = BD7F16850B1EB3B36615A294BBE2F26B8037BE6A40025C526CBE6FD298E1C63CEDA3D357A9A4826DE5D245584684F7D2
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,595 UART: [kat] SHA2-256
882,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,641 UART: [kat] ++
886,793 UART: [kat] sha1
891,099 UART: [kat] SHA2-256
893,037 UART: [kat] SHA2-384
895,712 UART: [kat] SHA2-512-ACC
897,613 UART: [kat] ECC-384
903,072 UART: [kat] HMAC-384Kdf
907,860 UART: [kat] LMS
1,476,056 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,209 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,716 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,518 UART: [idev] --
1,515,637 UART: [ldev] ++
1,515,805 UART: [ldev] CDI.KEYID = 6
1,516,168 UART: [ldev] SUBJECT.KEYID = 5
1,516,594 UART: [ldev] AUTHORITY.KEYID = 7
1,517,057 UART: [ldev] FE.KEYID = 1
1,522,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,978 UART: [ldev] --
1,586,459 UART: [fwproc] Waiting for Commands...
1,587,210 UART: [fwproc] Received command 0x46574c44
1,588,001 UART: [fwproc] Received Image of size 31656 bytes
1,938,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,801 >>> mbox cmd response: success
2,007,849 UART: [afmc] ++
2,008,017 UART: [afmc] CDI.KEYID = 6
2,008,379 UART: [afmc] SUBJECT.KEYID = 7
2,008,804 UART: [afmc] AUTHORITY.KEYID = 5
2,043,983 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,025 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,418 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,108 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,015 UART: [afmc] --
2,087,047 UART: [cold-reset] --
2,088,065 UART: [state] Locking Datavault
2,089,424 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,028 UART: [state] Locking ICCM
2,090,664 UART: [exit] Launching FMC @ 0x40000130
2,095,993 UART:
2,096,009 UART: Running Caliptra FMC ...
2,096,417 UART:
2,096,471 UART: [state] CFI Enabled
2,106,872 UART: [fht] FMC Alias Private Key: 7
2,214,537 UART: [art] Extend RT PCRs Done
2,214,965 UART: [art] Lock RT PCRs Done
2,216,445 UART: [art] Populate DV Done
2,224,594 UART: [fht] FMC Alias Private Key: 7
2,225,768 UART: [art] Derive CDI
2,226,048 UART: [art] Store in in slot 0x4
2,311,871 UART: [art] Derive Key Pair
2,312,231 UART: [art] Store priv key in slot 0x5
2,325,677 UART: [art] Derive Key Pair - Done
2,340,318 UART: [art] Signing Cert with AUTHO
2,340,798 UART: RITY.KEYID = 7
2,355,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,623 UART: [art] PUB.X = B46ED26F8C27B3EA75F69AA82416E2F8B0DABD1357745AB7314A8DEA1C5B82A73497BE542CF2C693371E30E17BB75EAD
2,363,409 UART: [art] PUB.Y = 2B63F6FD447AAC086DDCAE4175359F4B1038828A2CE85FA971AFA4329E898B4140055017D7872ED660CAB3322386CF58
2,370,355 UART: [art] SIG.R = DFDD533A094F9AE2901CCBB65EB414C8043ABF1B9B9D3D8BC279702060EAF4CEC510504A7C16504BBBECE1B95C044155
2,377,134 UART: [art] SIG.S = EF5E72FDD721C123436DC86226FAEC6F6C4DEE338745F1CDB5CBBCE830EEC948CEDEC0DA8C018E5979AA9AC2218E8611
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,827 ready_for_fw is high
1,361,827 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,854,959 >>> mbox cmd response: success
1,916,559 UART:
1,916,575 UART: Running Caliptra FMC ...
1,916,983 UART:
1,917,037 UART: [state] CFI Enabled
1,927,488 UART: [fht] FMC Alias Private Key: 7
2,035,647 UART: [art] Extend RT PCRs Done
2,036,075 UART: [art] Lock RT PCRs Done
2,037,945 UART: [art] Populate DV Done
2,046,080 UART: [fht] FMC Alias Private Key: 7
2,047,156 UART: [art] Derive CDI
2,047,436 UART: [art] Store in in slot 0x4
2,133,211 UART: [art] Derive Key Pair
2,133,571 UART: [art] Store priv key in slot 0x5
2,145,785 UART: [art] Derive Key Pair - Done
2,160,016 UART: [art] Signing Cert with AUTHO
2,160,496 UART: RITY.KEYID = 7
2,175,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,176,053 UART: [art] PUB.X = C4AC9C625E73667179C8FF0AD0EBF3575769F9E7A6EC68AFB3943029369897E16242004BAEBF75D0414AE16E72277A5F
2,182,802 UART: [art] PUB.Y = 8245D8EC8AA4F25659B69C9D67AC4297644D2E4999788E690AF7473AFBBBB97CF390C343CFBAED56854B6379CEA770E2
2,189,759 UART: [art] SIG.R = C4956DEB0B03B8DC23E40207B3F58EFB94C17B4C610DED2A8F5910CE0DDAC43D2444833F8AA584AD7091A322C52A4FEB
2,196,529 UART: [art] SIG.S = 07258B10B58F71031ED6EFE7F88E56F11EC48A282D048D9CE466012F944E22C6E8F24EAA95C98854905D047B396D828C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,540 UART: [kat] SHA2-256
892,478 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,829 UART: [idev] ++
1,479,997 UART: [idev] CDI.KEYID = 6
1,480,357 UART: [idev] SUBJECT.KEYID = 7
1,480,781 UART: [idev] UDS.KEYID = 0
1,481,126 ready_for_fw is high
1,481,126 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,504,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,313 UART: [idev] --
1,514,442 UART: [ldev] ++
1,514,610 UART: [ldev] CDI.KEYID = 6
1,514,973 UART: [ldev] SUBJECT.KEYID = 5
1,515,399 UART: [ldev] AUTHORITY.KEYID = 7
1,515,862 UART: [ldev] FE.KEYID = 1
1,521,202 UART: [ldev] Erasing FE.KEYID = 1
1,546,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,461 UART: [ldev] --
1,585,880 UART: [fwproc] Waiting for Commands...
1,586,645 UART: [fwproc] Received command 0x46574c44
1,587,436 UART: [fwproc] Received Image of size 31656 bytes
1,937,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,005 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,258 >>> mbox cmd response: success
2,007,386 UART: [afmc] ++
2,007,554 UART: [afmc] CDI.KEYID = 6
2,007,916 UART: [afmc] SUBJECT.KEYID = 7
2,008,341 UART: [afmc] AUTHORITY.KEYID = 5
2,043,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,914 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,307 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,997 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,786 UART: [afmc] --
2,086,850 UART: [cold-reset] --
2,087,840 UART: [state] Locking Datavault
2,089,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,787 UART: [state] Locking ICCM
2,090,341 UART: [exit] Launching FMC @ 0x40000130
2,095,670 UART:
2,095,686 UART: Running Caliptra FMC ...
2,096,094 UART:
2,096,237 UART: [state] CFI Enabled
2,106,696 UART: [fht] FMC Alias Private Key: 7
2,215,027 UART: [art] Extend RT PCRs Done
2,215,455 UART: [art] Lock RT PCRs Done
2,217,101 UART: [art] Populate DV Done
2,225,322 UART: [fht] FMC Alias Private Key: 7
2,226,474 UART: [art] Derive CDI
2,226,754 UART: [art] Store in in slot 0x4
2,312,529 UART: [art] Derive Key Pair
2,312,889 UART: [art] Store priv key in slot 0x5
2,326,561 UART: [art] Derive Key Pair - Done
2,341,549 UART: [art] Signing Cert with AUTHO
2,342,029 UART: RITY.KEYID = 7
2,357,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,254 UART: [art] PUB.X = A9D96268E7DA4641322C908D0ACA7B7FEA593A2B2DAF8BFF3BBB48711A251A4F25E20DA80A8D8EE819583BD105FC4195
2,365,028 UART: [art] PUB.Y = 5240024E73FE268AB19F9551EBCB3934924E1E721DD32269645CE1C01D6FA9B8236CE4DDF4E1D0FDE9F89267D55894B9
2,371,981 UART: [art] SIG.R = 173F1355ED923777176C69EB20A4C7CB10A16AD630E46050DBA664A1FFFB3AD0AF0A637ABD216ADE6ED16A7B6BD68478
2,378,764 UART: [art] SIG.S = BFD8A650EDCD273F22367556AA6164099844AD44A13E15D644A49D894905C8B345BC93946E983AA0F642DCDE7F5D0286
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 ready_for_fw is high
1,362,810 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,574 >>> mbox cmd response: success
1,918,270 UART:
1,918,286 UART: Running Caliptra FMC ...
1,918,694 UART:
1,918,837 UART: [state] CFI Enabled
1,929,730 UART: [fht] FMC Alias Private Key: 7
2,037,585 UART: [art] Extend RT PCRs Done
2,038,013 UART: [art] Lock RT PCRs Done
2,039,459 UART: [art] Populate DV Done
2,047,756 UART: [fht] FMC Alias Private Key: 7
2,048,800 UART: [art] Derive CDI
2,049,080 UART: [art] Store in in slot 0x4
2,135,077 UART: [art] Derive Key Pair
2,135,437 UART: [art] Store priv key in slot 0x5
2,148,387 UART: [art] Derive Key Pair - Done
2,162,927 UART: [art] Signing Cert with AUTHO
2,163,407 UART: RITY.KEYID = 7
2,178,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,242 UART: [art] PUB.X = BF647B5462CCF69EA8C043553E98181B4AF0A9CD9F2B9E34210E1F0723E6FCAC046008CE60B4BF9299A9399CB0B40097
2,185,986 UART: [art] PUB.Y = 5F0D17769EB5A93A43A6FC3C5C469E800C5CA6630BE9AE9AB98262CFBD1961066F0C0CDA87B9B7EF5882C91C20A4AE63
2,192,934 UART: [art] SIG.R = 4108D6FD6B40015DFAC3761985A7B2CE67AB156E2A65107F565188B94459F6D552A3AA45BC12CD3DE5EC935335EE465B
2,199,704 UART: [art] SIG.S = F93A8A06AA0094C0AD4C420545331176A5472DD0D64226BC8C832204CFA852C0B76412AE94E8F81C5DD2AC4BAF0C37B5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
893,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,295 UART: [kat] ++
897,447 UART: [kat] sha1
901,733 UART: [kat] SHA2-256
903,673 UART: [kat] SHA2-384
906,320 UART: [kat] SHA2-512-ACC
908,221 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,809 UART: [cold-reset] ++
1,172,163 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 ready_for_fw is high
1,176,061 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,295 UART: [idev] Sha1 KeyId Algorithm
1,208,745 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,158 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,615 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,486 >>> mbox cmd response: success
1,703,636 UART: [afmc] ++
1,703,804 UART: [afmc] CDI.KEYID = 6
1,704,166 UART: [afmc] SUBJECT.KEYID = 7
1,704,591 UART: [afmc] AUTHORITY.KEYID = 5
1,740,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,529 UART: [afmc] --
1,783,579 UART: [cold-reset] --
1,784,681 UART: [state] Locking Datavault
1,785,642 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,246 UART: [state] Locking ICCM
1,786,802 UART: [exit] Launching FMC @ 0x40000130
1,792,131 UART:
1,792,147 UART: Running Caliptra FMC ...
1,792,555 UART:
1,792,609 UART: [state] CFI Enabled
1,803,334 UART: [fht] FMC Alias Private Key: 7
1,911,293 UART: [art] Extend RT PCRs Done
1,911,721 UART: [art] Lock RT PCRs Done
1,913,505 UART: [art] Populate DV Done
1,921,834 UART: [fht] FMC Alias Private Key: 7
1,923,014 UART: [art] Derive CDI
1,923,294 UART: [art] Store in in slot 0x4
2,008,885 UART: [art] Derive Key Pair
2,009,245 UART: [art] Store priv key in slot 0x5
2,021,961 UART: [art] Derive Key Pair - Done
2,036,708 UART: [art] Signing Cert with AUTHO
2,037,188 UART: RITY.KEYID = 7
2,052,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,429 UART: [art] PUB.X = 947C9855633D76516196F98936839BF342346AC00BAF6F019BAD288F6C5B89C2BFC6760D74AA725279AF39DC6E7D5184
2,060,188 UART: [art] PUB.Y = 802E7BAF92C30DA0D24232B9877BD61E773AC82166422B5AB1E049B3DD3D83FDFC27CEB138517E8DDB23AFD76D3FF14B
2,067,153 UART: [art] SIG.R = 8A75D35E6C7E711E32C24A1AF1BB41EC3D4A8674F6509AA642EB4362FC8BC2EBEE39D7C74D79EF558B41A737F607EF2A
2,073,938 UART: [art] SIG.S = 28C0EA8DCFDB801C8538B10B68A6F6E22A0D7B4C3A1A75737429C4DAB4551BBDCBF30D96C61F25C586C06514E6B9F68E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,911 ready_for_fw is high
1,059,911 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,625 >>> mbox cmd response: success
1,616,967 UART:
1,616,983 UART: Running Caliptra FMC ...
1,617,391 UART:
1,617,445 UART: [state] CFI Enabled
1,627,828 UART: [fht] FMC Alias Private Key: 7
1,735,897 UART: [art] Extend RT PCRs Done
1,736,325 UART: [art] Lock RT PCRs Done
1,737,875 UART: [art] Populate DV Done
1,746,246 UART: [fht] FMC Alias Private Key: 7
1,747,358 UART: [art] Derive CDI
1,747,638 UART: [art] Store in in slot 0x4
1,833,497 UART: [art] Derive Key Pair
1,833,857 UART: [art] Store priv key in slot 0x5
1,846,873 UART: [art] Derive Key Pair - Done
1,861,568 UART: [art] Signing Cert with AUTHO
1,862,048 UART: RITY.KEYID = 7
1,876,890 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,655 UART: [art] PUB.X = 71FF4ECB25B3F55AE797CA5BDC84266563EF10E79D8A0A9C9E4D2BE80289718368169A06D8FA29346F88699CCD9A1F22
1,884,424 UART: [art] PUB.Y = A32EFF4437A4F2EACBB6FFDE3AB8E84650214056115190ADBE478FB69E76C1246EDE2EEF802CDB2ED6C2D9CB95B65B69
1,891,398 UART: [art] SIG.R = 31B70FD28391C5D70B13F75A5263401881303C1EED50C98FE19677B45C3A38A31F7C83C22820C3F0CCFE865C60F38D12
1,898,162 UART: [art] SIG.S = B4E33C426F7C8CD0F849E7D14020661519197C987C21D9A6829B6B252DAE1AF0EE14025AF75F3764663DC27A295B58D6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,731 UART: [kat] HMAC-384Kdf
923,357 UART: [kat] LMS
1,171,685 UART: [kat] --
1,172,588 UART: [cold-reset] ++
1,172,946 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 ready_for_fw is high
1,176,874 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,124 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,830 UART: [ldev] ++
1,210,998 UART: [ldev] CDI.KEYID = 6
1,211,361 UART: [ldev] SUBJECT.KEYID = 5
1,211,787 UART: [ldev] AUTHORITY.KEYID = 7
1,212,250 UART: [ldev] FE.KEYID = 1
1,217,392 UART: [ldev] Erasing FE.KEYID = 1
1,243,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,266 UART: [ldev] --
1,282,779 UART: [fwproc] Wait for Commands...
1,283,601 UART: [fwproc] Recv command 0x46574c44
1,284,329 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,777 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,460 >>> mbox cmd response: success
1,704,580 UART: [afmc] ++
1,704,748 UART: [afmc] CDI.KEYID = 6
1,705,110 UART: [afmc] SUBJECT.KEYID = 7
1,705,535 UART: [afmc] AUTHORITY.KEYID = 5
1,740,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,587 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,313 UART: [afmc] --
1,784,331 UART: [cold-reset] --
1,784,959 UART: [state] Locking Datavault
1,786,130 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,734 UART: [state] Locking ICCM
1,787,270 UART: [exit] Launching FMC @ 0x40000130
1,792,599 UART:
1,792,615 UART: Running Caliptra FMC ...
1,793,023 UART:
1,793,166 UART: [state] CFI Enabled
1,803,659 UART: [fht] FMC Alias Private Key: 7
1,911,688 UART: [art] Extend RT PCRs Done
1,912,116 UART: [art] Lock RT PCRs Done
1,913,774 UART: [art] Populate DV Done
1,922,039 UART: [fht] FMC Alias Private Key: 7
1,923,193 UART: [art] Derive CDI
1,923,473 UART: [art] Store in in slot 0x4
2,008,736 UART: [art] Derive Key Pair
2,009,096 UART: [art] Store priv key in slot 0x5
2,022,224 UART: [art] Derive Key Pair - Done
2,036,781 UART: [art] Signing Cert with AUTHO
2,037,261 UART: RITY.KEYID = 7
2,052,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,148 UART: [art] PUB.X = BF92814268405F6C4675DA4A164AC30C7FF4C07E51E2A2DA3BB4752637F6D94DDA6437813EDAD0841B8DD07FFA9B7378
2,059,925 UART: [art] PUB.Y = 1ACA7985FCAE9514ADCB5C6B1DDCF8F0240A049ED8CD9F1FB13362B5320A4BDACF3B9464120544DC28601A389E65ABCB
2,066,885 UART: [art] SIG.R = 3A90FF794B99B2F2A703654F1F7B7247FBDF7C28CDFB6E8BD903E637A4243499C7C9ECE530879A41EB81C4DC7D98E2C0
2,073,663 UART: [art] SIG.S = F275D9E8144D79452DB753EC79A7C5248E94510CCE794141E6C32CC1790F1E7C76FA3D3EF1BB53A2FFBFF855E590AF7A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,492 ready_for_fw is high
1,061,492 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,632 >>> mbox cmd response: success
1,619,050 UART:
1,619,066 UART: Running Caliptra FMC ...
1,619,474 UART:
1,619,617 UART: [state] CFI Enabled
1,630,372 UART: [fht] FMC Alias Private Key: 7
1,738,307 UART: [art] Extend RT PCRs Done
1,738,735 UART: [art] Lock RT PCRs Done
1,740,257 UART: [art] Populate DV Done
1,748,268 UART: [fht] FMC Alias Private Key: 7
1,749,204 UART: [art] Derive CDI
1,749,484 UART: [art] Store in in slot 0x4
1,835,535 UART: [art] Derive Key Pair
1,835,895 UART: [art] Store priv key in slot 0x5
1,849,281 UART: [art] Derive Key Pair - Done
1,864,299 UART: [art] Signing Cert with AUTHO
1,864,779 UART: RITY.KEYID = 7
1,879,871 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,636 UART: [art] PUB.X = B4A93B7C34EF853299C32002F20C54A2E97097C94F8772F2DB2FADB06473D4A6F8BECB8861497078DE283E3B4F648AF6
1,887,406 UART: [art] PUB.Y = 950A93A9CDB0B739CA7BF59B5FD41E6D99E2A3BCC29256B6FD555DC9FAE912266D7BDF3A141B205E88900B53E75A6337
1,894,364 UART: [art] SIG.R = 59904DD4348999F35787E245460D03FEBE503D3947056ACB929A61AC66CA9A3E6DBE04057824C3E8F5E9CD84C56064A7
1,901,119 UART: [art] SIG.S = 02B05C385FAA1F5E8861A7254B4B802317E10837C73F67B23DF468503B8E5349087BBCC60ABD19DDF45F4CD300CB2F7A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,174,009 ready_for_fw is high
1,174,009 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,002 UART: [fwproc] Wait for Commands...
1,280,757 UART: [fwproc] Recv command 0x46574c44
1,281,490 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,070 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,970 >>> mbox cmd response: success
1,702,149 UART: [afmc] ++
1,702,317 UART: [afmc] CDI.KEYID = 6
1,702,680 UART: [afmc] SUBJECT.KEYID = 7
1,703,106 UART: [afmc] AUTHORITY.KEYID = 5
1,738,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,906 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,344 UART: [afmc] --
1,781,430 UART: [cold-reset] --
1,782,276 UART: [state] Locking Datavault
1,783,243 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,847 UART: [state] Locking ICCM
1,784,285 UART: [exit] Launching FMC @ 0x40000130
1,789,614 UART:
1,789,630 UART: Running Caliptra FMC ...
1,790,038 UART:
1,790,092 UART: [state] CFI Enabled
1,800,919 UART: [fht] FMC Alias Private Key: 7
1,909,122 UART: [art] Extend RT PCRs Done
1,909,550 UART: [art] Lock RT PCRs Done
1,911,022 UART: [art] Populate DV Done
1,919,343 UART: [fht] FMC Alias Private Key: 7
1,920,427 UART: [art] Derive CDI
1,920,707 UART: [art] Store in in slot 0x4
2,006,478 UART: [art] Derive Key Pair
2,006,838 UART: [art] Store priv key in slot 0x5
2,019,494 UART: [art] Derive Key Pair - Done
2,034,564 UART: [art] Signing Cert with AUTHO
2,035,044 UART: RITY.KEYID = 7
2,049,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,731 UART: [art] PUB.X = 3A77D97BEE6B611477B43D0750294F247035283A38600385E6AC4F622DF99FC0C50D1BEA52207C00BE459826E95DA3A9
2,057,468 UART: [art] PUB.Y = 679CB491CFAD57457B72EF02C63185380A630FD61AD77D372540EB7B736CB56C6AD0E04EF6B6825B4EB903AA2960C659
2,064,412 UART: [art] SIG.R = 0C1D9F23D1ED191690092229E086D1E5E5C4076B9E80921813E8BD30F29AA62F2C5AF10584C3EC144F41C30F0B5DBD43
2,071,168 UART: [art] SIG.S = 3D4ACA4ACE4B7ECAB77861D61C152F8EE9B60FFA4850424639676AF7CBD105124B2D255D5104DEDDB870877721959BA5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,892 ready_for_fw is high
1,055,892 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,332 >>> mbox cmd response: success
1,612,442 UART:
1,612,458 UART: Running Caliptra FMC ...
1,612,866 UART:
1,612,920 UART: [state] CFI Enabled
1,623,389 UART: [fht] FMC Alias Private Key: 7
1,731,348 UART: [art] Extend RT PCRs Done
1,731,776 UART: [art] Lock RT PCRs Done
1,733,418 UART: [art] Populate DV Done
1,741,797 UART: [fht] FMC Alias Private Key: 7
1,742,727 UART: [art] Derive CDI
1,743,007 UART: [art] Store in in slot 0x4
1,829,120 UART: [art] Derive Key Pair
1,829,480 UART: [art] Store priv key in slot 0x5
1,842,370 UART: [art] Derive Key Pair - Done
1,857,366 UART: [art] Signing Cert with AUTHO
1,857,846 UART: RITY.KEYID = 7
1,872,724 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,489 UART: [art] PUB.X = 655E204B79C65DBCCB81802AA1263EDC2450FC3EFF311A029C32FD55A9C7B9C2EA3DDFA561C9A42B9DB98312E4AD810E
1,880,273 UART: [art] PUB.Y = 6F1A5E7D30C094ED9F2DC05EF118C92E0EED16CA1A6FFBBF7CBD888984CDFA1B9ACD1C2E828E75E704C8EA8E589278EB
1,887,247 UART: [art] SIG.R = 0D8A25EB6460B36A8D98980358525517334B1A8170AB989AFB9347FDAE1B0FF51E3A7AF4B51E16768662CCE503FC41CB
1,894,011 UART: [art] SIG.S = 1D2EF5B98197E9EA1EBE42185B04FAB736C5CABD28FB38AF6DA8A8075B8014A4865B043D58FB6202B149D940D42E630C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,174,978 ready_for_fw is high
1,174,978 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,782 UART: [idev] Sha1 KeyId Algorithm
1,208,570 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,393 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,253 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,051 >>> mbox cmd response: success
1,704,156 UART: [afmc] ++
1,704,324 UART: [afmc] CDI.KEYID = 6
1,704,687 UART: [afmc] SUBJECT.KEYID = 7
1,705,113 UART: [afmc] AUTHORITY.KEYID = 5
1,741,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,885 UART: [afmc] --
1,784,939 UART: [cold-reset] --
1,785,851 UART: [state] Locking Datavault
1,786,992 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,596 UART: [state] Locking ICCM
1,788,094 UART: [exit] Launching FMC @ 0x40000130
1,793,423 UART:
1,793,439 UART: Running Caliptra FMC ...
1,793,847 UART:
1,793,990 UART: [state] CFI Enabled
1,804,761 UART: [fht] FMC Alias Private Key: 7
1,912,910 UART: [art] Extend RT PCRs Done
1,913,338 UART: [art] Lock RT PCRs Done
1,914,574 UART: [art] Populate DV Done
1,922,671 UART: [fht] FMC Alias Private Key: 7
1,923,781 UART: [art] Derive CDI
1,924,061 UART: [art] Store in in slot 0x4
2,009,810 UART: [art] Derive Key Pair
2,010,170 UART: [art] Store priv key in slot 0x5
2,023,240 UART: [art] Derive Key Pair - Done
2,037,908 UART: [art] Signing Cert with AUTHO
2,038,388 UART: RITY.KEYID = 7
2,053,756 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,521 UART: [art] PUB.X = 874FA707E5DDC53EC7C9E4D227B0193390ADA7A272F9FED1A60FE1E3677A3E44E40BE114A5EE960A8E9F2CB6C29B4A85
2,061,297 UART: [art] PUB.Y = 9661DDF0421546F526724CAA0FDBD56D8DA80DEF13FB14A35D9188B7E8D37492DB92511035A95EC895B73692EAE4491C
2,068,247 UART: [art] SIG.R = 30B8DCAD26C301E72114A740B4E329065BB8D06D510569205C206D40181F3BF622EF1682BCEDD75D9E2AC609C90E234F
2,075,006 UART: [art] SIG.S = 942E8364FB541ABE5EBCE3E9E74C3503D5D853A1F8A2D8BE3D0E3E8A6803B68E010F78C6316CB5DB5134F933B5C17E44
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,669 ready_for_fw is high
1,056,669 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,407 >>> mbox cmd response: success
1,614,549 UART:
1,614,565 UART: Running Caliptra FMC ...
1,614,973 UART:
1,615,116 UART: [state] CFI Enabled
1,625,941 UART: [fht] FMC Alias Private Key: 7
1,733,944 UART: [art] Extend RT PCRs Done
1,734,372 UART: [art] Lock RT PCRs Done
1,735,544 UART: [art] Populate DV Done
1,743,781 UART: [fht] FMC Alias Private Key: 7
1,744,961 UART: [art] Derive CDI
1,745,241 UART: [art] Store in in slot 0x4
1,830,896 UART: [art] Derive Key Pair
1,831,256 UART: [art] Store priv key in slot 0x5
1,844,530 UART: [art] Derive Key Pair - Done
1,859,533 UART: [art] Signing Cert with AUTHO
1,860,013 UART: RITY.KEYID = 7
1,874,869 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,634 UART: [art] PUB.X = A704BA012A3C429C490BB71F2211CEEF6B861E37655FFEF469C4E76552E51909FA7912C5DFCEF27E522EC214790FC398
1,882,397 UART: [art] PUB.Y = 954786C9100E70E643F9928FE19353624B82A091827DCEE3E23A91B7ED4B0C453B737B0A915102F897639253EFE7CB26
1,889,329 UART: [art] SIG.R = D66AE69E9A67AF613A1E1F3E2A53C688E9441A90F3AD9D45B681696104B825166ABE88F943730604542771BD210101E5
1,896,078 UART: [art] SIG.S = 2CBCCD8865D3FBBBD835B9413E79DEE1AC22306D59835C996F99A9B00B6D39E0D42E42F6015FE1C9281157849986C440
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,989 UART:
192,357 UART: Running Caliptra ROM ...
193,488 UART:
193,634 UART: [state] CFI Enabled
267,095 UART: [state] LifecycleState = Unprovisioned
269,018 UART: [state] DebugLocked = No
271,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,054 UART: [kat] SHA2-256
445,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,229 UART: [kat] ++
456,773 UART: [kat] sha1
468,281 UART: [kat] SHA2-256
470,997 UART: [kat] SHA2-384
475,771 UART: [kat] SHA2-512-ACC
478,091 UART: [kat] ECC-384
2,769,886 UART: [kat] HMAC-384Kdf
2,800,583 UART: [kat] LMS
3,990,833 UART: [kat] --
3,994,269 UART: [cold-reset] ++
3,995,703 UART: [fht] Storing FHT @ 0x50003400
4,005,843 UART: [idev] ++
4,006,478 UART: [idev] CDI.KEYID = 6
4,007,360 UART: [idev] SUBJECT.KEYID = 7
4,008,602 UART: [idev] UDS.KEYID = 0
4,009,573 ready_for_fw is high
4,009,766 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,104,938 UART: [idev] Erasing UDS.KEYID = 0
7,347,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,754 UART: [idev] --
7,374,109 UART: [ldev] ++
7,374,701 UART: [ldev] CDI.KEYID = 6
7,375,671 UART: [ldev] SUBJECT.KEYID = 5
7,376,827 UART: [ldev] AUTHORITY.KEYID = 7
7,378,155 UART: [ldev] FE.KEYID = 1
7,423,084 UART: [ldev] Erasing FE.KEYID = 1
10,757,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,548 UART: [ldev] --
13,137,449 UART: [fwproc] Waiting for Commands...
13,139,970 UART: [fwproc] Received command 0x46574c44
13,142,131 UART: [fwproc] Received Image of size 75428 bytes
16,725,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,794,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,863,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,045,033 >>> mbox cmd response: success
17,045,449 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,050,047 UART: [afmc] ++
17,050,625 UART: [afmc] CDI.KEYID = 6
17,051,500 UART: [afmc] SUBJECT.KEYID = 7
17,052,816 UART: [afmc] AUTHORITY.KEYID = 5
20,412,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,728,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,731,078 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,745,507 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,760,305 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,774,712 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,796,104 UART: [afmc] --
22,799,099 UART: [cold-reset] --
22,805,331 UART: [state] Locking Datavault
22,812,157 UART: [state] Locking PCR0, PCR1 and PCR31
22,813,915 UART: [state] Locking ICCM
22,815,023 UART: [exit] Launching FMC @ 0x40000130
22,823,426 UART:
22,823,698 UART: Running Caliptra FMC ...
22,824,803 UART:
22,824,966 UART: [state] CFI Enabled
22,890,039 UART: [fht] FMC Alias Private Key: 7
25,227,893 UART: [art] Extend RT PCRs Done
25,229,115 UART: [art] Lock RT PCRs Done
25,230,952 UART: [art] Populate DV Done
25,236,363 UART: [fht] FMC Alias Private Key: 7
25,237,837 UART: [art] Derive CDI
25,238,607 UART: [art] Store in in slot 0x4
25,299,124 UART: [art] Derive Key Pair
25,300,392 UART: [art] Store priv key in slot 0x5
28,592,806 UART: [art] Derive Key Pair - Done
28,606,061 UART: [art] Signing Cert with AUTHO
28,607,356 UART: RITY.KEYID = 7
30,894,625 UART: [art] Erasing AUTHORITY.KEYID = 7
30,896,127 UART: [art] PUB.X = 44B2906CB78C6105141BF41719C5537257B7994B4E65699E1C3C73D297B3A14C1F21DAA6A68F51635352E4F0FD44B9AE
30,903,409 UART: [art] PUB.Y = 4BAEDFC039AB935DA50FCC7C8B6B80B8CCC074CCB37152B8EC706222A886BD3FF48FC10DA2B8CABB41E49A5A0788D7DC
30,910,680 UART: [art] SIG.R = FE28FE1D3FF7167C472AD7DD0DE5E5C84CD6CC6BCF5B9B52A1FF08C9C683F1F96EFA2DA8F57216F4F12BD638021BBA17
30,918,053 UART: [art] SIG.S = 75655BAC2E75F946C2E9398BFF5E9EADCF59D2048204E0845B5BFDC8BD137E7A2696EA95A4721617E0850C0402AB5814
32,222,493 UART: mock_rt_interact::rt_entry...FMC Tester
32,339,611 UART: [rt] Runtime listening for mailbox commands...
32,343,869 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,804,996 ready_for_fw is high
3,805,428 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,060,662 >>> mbox cmd response: success
17,061,670 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,761,516 UART:
22,761,913 UART: Running Caliptra FMC ...
22,763,165 UART:
22,763,324 UART: [state] CFI Enabled
22,830,779 UART: [fht] FMC Alias Private Key: 7
25,169,122 UART: [art] Extend RT PCRs Done
25,170,846 UART: [art] Lock RT PCRs Done
25,172,129 UART: [art] Populate DV Done
25,177,402 UART: [fht] FMC Alias Private Key: 7
25,178,995 UART: [art] Derive CDI
25,179,725 UART: [art] Store in in slot 0x4
25,223,327 UART: [art] Derive Key Pair
25,224,365 UART: [art] Store priv key in slot 0x5
28,517,204 UART: [art] Derive Key Pair - Done
28,530,013 UART: [art] Signing Cert with AUTHO
28,531,324 UART: RITY.KEYID = 7
30,819,907 UART: [art] Erasing AUTHORITY.KEYID = 7
30,821,419 UART: [art] PUB.X = F6341F2AD64ADC3838AE54E254BF4D6C6A160659755B3A27492A5AB18822D58491D1421A5FDAE7784D06FA4650AD7453
30,828,672 UART: [art] PUB.Y = 368741748878ECCD4A699CAE3BE9BEEDEDAF8546F6C913765BBFC0B135BA162E525B6115C9134B31F614083142A602AE
30,835,920 UART: [art] SIG.R = 49A2962D8C15AA71AA5D00E0AB4C7B22E524BF8D9697BC96590607D8A84B26BCD87B595DDD07D4C744AC7EB3A2176EA3
30,843,316 UART: [art] SIG.S = 7118D925D8502D1714642909B94FCAB7CA353102EA9CFD0FE76CD3F569BA09CAA4DD1B9D0CB25385A932A008E8C3D48A
32,147,954 UART: mock_rt_interact::rt_entry...FMC Tester
32,264,464 UART: [rt] Runtime listening for mailbox commands...
32,268,702 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,544 UART:
192,897 UART: Running Caliptra ROM ...
194,080 UART:
603,598 UART: [state] CFI Enabled
617,178 UART: [state] LifecycleState = Unprovisioned
619,130 UART: [state] DebugLocked = No
621,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,222 UART: [kat] SHA2-256
797,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,545 UART: [kat] ++
808,021 UART: [kat] sha1
820,247 UART: [kat] SHA2-256
822,907 UART: [kat] SHA2-384
829,321 UART: [kat] SHA2-512-ACC
831,688 UART: [kat] ECC-384
3,117,124 UART: [kat] HMAC-384Kdf
3,128,791 UART: [kat] LMS
4,318,933 UART: [kat] --
4,322,650 UART: [cold-reset] ++
4,324,718 UART: [fht] Storing FHT @ 0x50003400
4,336,831 UART: [idev] ++
4,337,392 UART: [idev] CDI.KEYID = 6
4,338,349 UART: [idev] SUBJECT.KEYID = 7
4,339,611 UART: [idev] UDS.KEYID = 0
4,340,783 ready_for_fw is high
4,340,999 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,435,811 UART: [idev] Erasing UDS.KEYID = 0
7,629,815 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,181 UART: [idev] --
7,654,451 UART: [ldev] ++
7,655,023 UART: [ldev] CDI.KEYID = 6
7,655,999 UART: [ldev] SUBJECT.KEYID = 5
7,657,210 UART: [ldev] AUTHORITY.KEYID = 7
7,658,440 UART: [ldev] FE.KEYID = 1
7,669,952 UART: [ldev] Erasing FE.KEYID = 1
10,955,835 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,693 UART: [ldev] --
13,316,817 UART: [fwproc] Waiting for Commands...
13,319,455 UART: [fwproc] Received command 0x46574c44
13,321,637 UART: [fwproc] Received Image of size 75428 bytes
16,898,529 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,973,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,042,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,224,205 >>> mbox cmd response: success
17,224,620 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,228,842 UART: [afmc] ++
17,229,418 UART: [afmc] CDI.KEYID = 6
17,230,349 UART: [afmc] SUBJECT.KEYID = 7
17,231,610 UART: [afmc] AUTHORITY.KEYID = 5
20,545,605 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,839,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,841,635 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,856,007 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,870,846 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,885,322 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,906,407 UART: [afmc] --
22,910,056 UART: [cold-reset] --
22,914,885 UART: [state] Locking Datavault
22,919,368 UART: [state] Locking PCR0, PCR1 and PCR31
22,921,113 UART: [state] Locking ICCM
22,923,501 UART: [exit] Launching FMC @ 0x40000130
22,931,887 UART:
22,932,117 UART: Running Caliptra FMC ...
22,933,134 UART:
22,933,277 UART: [state] CFI Enabled
22,941,647 UART: [fht] FMC Alias Private Key: 7
25,271,885 UART: [art] Extend RT PCRs Done
25,273,123 UART: [art] Lock RT PCRs Done
25,274,944 UART: [art] Populate DV Done
25,280,516 UART: [fht] FMC Alias Private Key: 7
25,282,154 UART: [art] Derive CDI
25,282,883 UART: [art] Store in in slot 0x4
25,325,521 UART: [art] Derive Key Pair
25,326,518 UART: [art] Store priv key in slot 0x5
28,568,816 UART: [art] Derive Key Pair - Done
28,582,037 UART: [art] Signing Cert with AUTHO
28,583,344 UART: RITY.KEYID = 7
30,862,900 UART: [art] Erasing AUTHORITY.KEYID = 7
30,864,417 UART: [art] PUB.X = 1E581BE1C8E3AD0E2F8E2BE07095D5FFA17754D776131AD53537631EB414B13FE110828894D2B054C3726CC19BC62B6A
30,871,633 UART: [art] PUB.Y = B5D8486159EA5CFE3D0DEFCE782DB77CF1AD9036E4F565A293A9F5A7E38FE9083997DE0C4AAE897C7558F4F562B80AF4
30,878,915 UART: [art] SIG.R = D42611F40946EB3FF004585594D9F7394993265751FADD3E10406192AD1EC776C9D60C4425C76BF2D8BE5F56108BAD80
30,886,302 UART: [art] SIG.S = 451AB7D23A2A61EC1AEA5495EB040E8542495D135F3A0712E06F296A77209D3F9D1C9E32262D43D1551EB44794FBB3BE
32,191,033 UART: mock_rt_interact::rt_entry...FMC Tester
32,308,205 UART: [rt] Runtime listening for mailbox commands...
32,312,501 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,130,783 ready_for_fw is high
4,131,230 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,289,862 >>> mbox cmd response: success
17,290,376 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,928,536 UART:
22,928,913 UART: Running Caliptra FMC ...
22,930,204 UART:
22,930,365 UART: [state] CFI Enabled
22,937,813 UART: [fht] FMC Alias Private Key: 7
25,268,812 UART: [art] Extend RT PCRs Done
25,270,033 UART: [art] Lock RT PCRs Done
25,271,460 UART: [art] Populate DV Done
25,276,876 UART: [fht] FMC Alias Private Key: 7
25,278,522 UART: [art] Derive CDI
25,279,454 UART: [art] Store in in slot 0x4
25,321,298 UART: [art] Derive Key Pair
25,322,345 UART: [art] Store priv key in slot 0x5
28,564,515 UART: [art] Derive Key Pair - Done
28,577,675 UART: [art] Signing Cert with AUTHO
28,578,971 UART: RITY.KEYID = 7
30,858,243 UART: [art] Erasing AUTHORITY.KEYID = 7
30,859,750 UART: [art] PUB.X = C9B96A9C8AA397DCB13354B8FA08140D6026422D0441EA93C1D98450D98881043FB8FC644A40997C2324FC5AEBB86499
30,867,011 UART: [art] PUB.Y = 364F33CDC78EE94B22B08E8CB765F4AF335362D772A6A85BDA693B52CBAA0F5E8E5209CEE6F7675BACA98C425217D669
30,874,257 UART: [art] SIG.R = F45625886169CFEBDBC48FD6B5D04BA74CFE1E2126D67E1BAAA7B7528FC483791B25E5564A3D6584CA1B3BAB009CAE7C
30,881,658 UART: [art] SIG.S = 191DB4321E3CF0307D76FC439F1C3AE8B91B6D6DBF88B2F01AF5D3E9DBEE0B62B109450562755190E0F8C5810651CA43
32,187,354 UART: mock_rt_interact::rt_entry...FMC Tester
32,305,054 UART: [rt] Runtime listening for mailbox commands...
32,309,308 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
191,976 UART:
192,354 UART: Running Caliptra ROM ...
193,444 UART:
193,578 UART: [state] CFI Enabled
262,866 UART: [state] LifecycleState = Unprovisioned
264,663 UART: [state] DebugLocked = No
266,665 UART: [state] WD Timer not started. Device not locked for debugging
270,363 UART: [kat] SHA2-256
449,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,071 UART: [kat] ++
461,524 UART: [kat] sha1
471,257 UART: [kat] SHA2-256
474,217 UART: [kat] SHA2-384
480,566 UART: [kat] SHA2-512-ACC
483,574 UART: [kat] ECC-384
2,948,255 UART: [kat] HMAC-384Kdf
2,970,797 UART: [kat] LMS
3,500,213 UART: [kat] --
3,504,635 UART: [cold-reset] ++
3,506,428 UART: [fht] FHT @ 0x50003400
3,518,114 UART: [idev] ++
3,518,681 UART: [idev] CDI.KEYID = 6
3,519,711 UART: [idev] SUBJECT.KEYID = 7
3,520,816 UART: [idev] UDS.KEYID = 0
3,521,742 ready_for_fw is high
3,521,951 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,616,953 UART: [idev] Erasing UDS.KEYID = 0
6,027,260 UART: [idev] Sha1 KeyId Algorithm
6,050,833 UART: [idev] --
6,056,296 UART: [ldev] ++
6,056,869 UART: [ldev] CDI.KEYID = 6
6,057,778 UART: [ldev] SUBJECT.KEYID = 5
6,058,939 UART: [ldev] AUTHORITY.KEYID = 7
6,060,225 UART: [ldev] FE.KEYID = 1
6,100,034 UART: [ldev] Erasing FE.KEYID = 1
8,601,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,782 UART: [ldev] --
10,413,090 UART: [fwproc] Wait for Commands...
10,414,695 UART: [fwproc] Recv command 0x46574c44
10,416,788 UART: [fwproc] Recv'd Img size: 75384 bytes
13,343,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,414,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,482,944 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,664,798 >>> mbox cmd response: success
13,665,210 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,669,209 UART: [afmc] ++
13,669,792 UART: [afmc] CDI.KEYID = 6
13,670,704 UART: [afmc] SUBJECT.KEYID = 7
13,671,921 UART: [afmc] AUTHORITY.KEYID = 5
16,206,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,932,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,934,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,950,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,966,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,981,986 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,005,892 UART: [afmc] --
18,009,403 UART: [cold-reset] --
18,012,025 UART: [state] Locking Datavault
18,017,973 UART: [state] Locking PCR0, PCR1 and PCR31
18,019,624 UART: [state] Locking ICCM
18,022,345 UART: [exit] Launching FMC @ 0x40000130
18,030,762 UART:
18,031,040 UART: Running Caliptra FMC ...
18,032,072 UART:
18,032,220 UART: [state] CFI Enabled
18,091,387 UART: [fht] FMC Alias Private Key: 7
19,855,159 UART: [art] Extend RT PCRs Done
19,856,380 UART: [art] Lock RT PCRs Done
19,857,951 UART: [art] Populate DV Done
19,863,470 UART: [fht] FMC Alias Private Key: 7
19,865,016 UART: [art] Derive CDI
19,865,785 UART: [art] Store in in slot 0x4
19,924,016 UART: [art] Derive Key Pair
19,925,028 UART: [art] Store priv key in slot 0x5
22,387,967 UART: [art] Derive Key Pair - Done
22,400,805 UART: [art] Signing Cert with AUTHO
22,402,110 UART: RITY.KEYID = 7
24,114,020 UART: [art] Erasing AUTHORITY.KEYID = 7
24,115,559 UART: [art] PUB.X = 9FFA6800E52FE12FA2A29F3F03D49EF590E8E43E7B4A4AAC621EF579D7A59AD6E7ED12AF137CECF5560558EC8F6F0BFD
24,122,773 UART: [art] PUB.Y = AF7C7CD78D4954263C594F41A7564756D8355821004AFF0A21A35A0CAD49C7084780757ADD7DA09ED137E426EC62B630
24,130,008 UART: [art] SIG.R = 47B2A6C49B5C311A08F595362B7B6B8AEB087F95C3BE6BE5959CBF0B32ABC84DF1AE1FAC2968A21261EF4220B0D366AB
24,137,408 UART: [art] SIG.S = 9B5823BC3AB8C9C223E42BEB6D53C0E9BF31B343091E145805DEAE884AB8EC5FFFCDCB84CC1064A7CC2EAC6F7F231A63
25,116,275 UART: mock_rt_interact::rt_entry...FMC Tester
25,233,057 UART: [rt] Runtime listening for mailbox commands...
25,237,294 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,377,986 ready_for_fw is high
3,378,559 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,425,039 >>> mbox cmd response: success
13,425,796 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,705,681 UART:
17,706,067 UART: Running Caliptra FMC ...
17,707,322 UART:
17,707,486 UART: [state] CFI Enabled
17,773,258 UART: [fht] FMC Alias Private Key: 7
19,536,834 UART: [art] Extend RT PCRs Done
19,538,053 UART: [art] Lock RT PCRs Done
19,539,680 UART: [art] Populate DV Done
19,544,809 UART: [fht] FMC Alias Private Key: 7
19,546,451 UART: [art] Derive CDI
19,547,258 UART: [art] Store in in slot 0x4
19,606,111 UART: [art] Derive Key Pair
19,607,141 UART: [art] Store priv key in slot 0x5
22,070,039 UART: [art] Derive Key Pair - Done
22,083,252 UART: [art] Signing Cert with AUTHO
22,084,552 UART: RITY.KEYID = 7
23,795,973 UART: [art] Erasing AUTHORITY.KEYID = 7
23,797,482 UART: [art] PUB.X = 42DC60DA231B995E6CB4C87C052F6C10081DAD6E2564E685ED20FC41CA71667C4C6B5F5585F5F018AE236E07AAD9E205
23,804,725 UART: [art] PUB.Y = C1F6642FB95D4B0B1862DBB2155A73BA382E6D9D2865701E9D32270157584E2F935433A87B406DBE27A4D7D612842EAB
23,812,007 UART: [art] SIG.R = 6A4E4FE9BD085626A8DF058A0FA4E03F38CBD8151B0334771417608F14D4AFA984A31EBA983B13F686B1A73A416E9123
23,819,403 UART: [art] SIG.S = E19D8C93878CEFD0923A5C72CBE3D2833CB1B1843458992E204C42DBCA38C3F3A3B70C1A53BD4042031F90B914376A8C
24,797,497 UART: mock_rt_interact::rt_entry...FMC Tester
24,913,877 UART: [rt] Runtime listening for mailbox commands...
24,918,118 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,618 writing to cptra_bootfsm_go
193,973 UART:
194,330 UART: Running Caliptra ROM ...
195,417 UART:
604,983 UART: [state] CFI Enabled
618,491 UART: [state] LifecycleState = Unprovisioned
620,364 UART: [state] DebugLocked = No
622,370 UART: [state] WD Timer not started. Device not locked for debugging
626,405 UART: [kat] SHA2-256
805,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,083 UART: [kat] ++
817,532 UART: [kat] sha1
828,539 UART: [kat] SHA2-256
831,540 UART: [kat] SHA2-384
837,959 UART: [kat] SHA2-512-ACC
840,963 UART: [kat] ECC-384
3,284,054 UART: [kat] HMAC-384Kdf
3,296,356 UART: [kat] LMS
3,825,898 UART: [kat] --
3,830,309 UART: [cold-reset] ++
3,832,182 UART: [fht] FHT @ 0x50003400
3,843,594 UART: [idev] ++
3,844,195 UART: [idev] CDI.KEYID = 6
3,845,105 UART: [idev] SUBJECT.KEYID = 7
3,846,280 UART: [idev] UDS.KEYID = 0
3,847,325 ready_for_fw is high
3,847,512 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,942,272 UART: [idev] Erasing UDS.KEYID = 0
6,317,185 UART: [idev] Sha1 KeyId Algorithm
6,340,136 UART: [idev] --
6,344,168 UART: [ldev] ++
6,344,747 UART: [ldev] CDI.KEYID = 6
6,345,671 UART: [ldev] SUBJECT.KEYID = 5
6,346,881 UART: [ldev] AUTHORITY.KEYID = 7
6,348,118 UART: [ldev] FE.KEYID = 1
6,359,190 UART: [ldev] Erasing FE.KEYID = 1
8,833,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,606 UART: [ldev] --
10,625,732 UART: [fwproc] Wait for Commands...
10,628,911 UART: [fwproc] Recv command 0x46574c44
10,631,001 UART: [fwproc] Recv'd Img size: 75384 bytes
13,559,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,633,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,702,594 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,884,978 >>> mbox cmd response: success
13,885,396 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,889,998 UART: [afmc] ++
13,890,577 UART: [afmc] CDI.KEYID = 6
13,891,509 UART: [afmc] SUBJECT.KEYID = 7
13,892,719 UART: [afmc] AUTHORITY.KEYID = 5
16,391,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,112,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,113,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,129,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,145,728 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,161,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,185,259 UART: [afmc] --
18,188,652 UART: [cold-reset] --
18,193,048 UART: [state] Locking Datavault
18,197,266 UART: [state] Locking PCR0, PCR1 and PCR31
18,198,967 UART: [state] Locking ICCM
18,201,009 UART: [exit] Launching FMC @ 0x40000130
18,209,410 UART:
18,209,643 UART: Running Caliptra FMC ...
18,210,760 UART:
18,210,912 UART: [state] CFI Enabled
18,218,656 UART: [fht] FMC Alias Private Key: 7
19,974,886 UART: [art] Extend RT PCRs Done
19,976,104 UART: [art] Lock RT PCRs Done
19,977,884 UART: [art] Populate DV Done
19,983,183 UART: [fht] FMC Alias Private Key: 7
19,984,767 UART: [art] Derive CDI
19,985,578 UART: [art] Store in in slot 0x4
20,028,492 UART: [art] Derive Key Pair
20,029,548 UART: [art] Store priv key in slot 0x5
22,456,103 UART: [art] Derive Key Pair - Done
22,469,329 UART: [art] Signing Cert with AUTHO
22,470,632 UART: RITY.KEYID = 7
24,176,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,177,934 UART: [art] PUB.X = CDC0F0CAF51F30A56F2B20B34A8BC3DD5D974F13F10F6D95C21DBE4F308DC868332F049CF97489F606C7C1D3A2B02E3D
24,185,204 UART: [art] PUB.Y = EFEFF0849321408F5E7FA5BE9949C87EC6EEE9BE10A8B436576692603B66E36329259CEA36EC8468E05CD9F5FC6215F6
24,192,483 UART: [art] SIG.R = CF4488DBDFC391DA6776A3B64801CDB365C53E06E9F7E325E4509E8C329C7326BDC15D14C49428CF668160676269105B
24,199,825 UART: [art] SIG.S = A050F168D085021C8E7F0F95A06025B944BF15CD4F9C662ACA6F25759F2BC3FE4BC1D2B8219B6124178215C5590059FE
25,178,079 UART: mock_rt_interact::rt_entry...FMC Tester
25,295,151 UART: [rt] Runtime listening for mailbox commands...
25,299,383 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,694,850 ready_for_fw is high
3,695,252 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,655,736 >>> mbox cmd response: success
13,656,382 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,906,377 UART:
17,906,743 UART: Running Caliptra FMC ...
17,908,141 UART:
17,908,304 UART: [state] CFI Enabled
17,915,923 UART: [fht] FMC Alias Private Key: 7
19,672,086 UART: [art] Extend RT PCRs Done
19,673,307 UART: [art] Lock RT PCRs Done
19,674,937 UART: [art] Populate DV Done
19,680,390 UART: [fht] FMC Alias Private Key: 7
19,681,875 UART: [art] Derive CDI
19,682,634 UART: [art] Store in in slot 0x4
19,725,060 UART: [art] Derive Key Pair
19,726,063 UART: [art] Store priv key in slot 0x5
22,153,250 UART: [art] Derive Key Pair - Done
22,166,296 UART: [art] Signing Cert with AUTHO
22,167,600 UART: RITY.KEYID = 7
23,873,092 UART: [art] Erasing AUTHORITY.KEYID = 7
23,874,595 UART: [art] PUB.X = EB858BA0FC85A71A5AFE8710ED50843239651BA072EAA4DC87E3335473E9309E8ACD8E97132C1A353BDD725545EF82EC
23,881,841 UART: [art] PUB.Y = B00A4863180BDFBE673D5959EF838EEFF52C893528A60488B187AC704396819D28845F3DB4DD4A23FEED5362CEF1D2AB
23,889,144 UART: [art] SIG.R = 65625D3A3AEC11CFC3354B5CE45F3EC3B772F1F2D122DFCECB348364C824CD73C97D32FBF150D69D296C5C2C8F8DFCBF
23,896,547 UART: [art] SIG.S = 45CBE475EB1BF5D8E426B667B34BC620E1E5EF83FEED0E8FB516363E4AE157157797E6C247C6E8D1B487A456FA280E98
24,875,485 UART: mock_rt_interact::rt_entry...FMC Tester
24,992,626 UART: [rt] Runtime listening for mailbox commands...
24,996,865 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,203 UART:
192,564 UART: Running Caliptra ROM ...
193,655 UART:
193,792 UART: [state] CFI Enabled
267,223 UART: [state] LifecycleState = Unprovisioned
269,632 UART: [state] DebugLocked = No
272,000 UART: [state] WD Timer not started. Device not locked for debugging
276,243 UART: [kat] SHA2-256
466,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,955 UART: [kat] ++
477,399 UART: [kat] sha1
489,190 UART: [kat] SHA2-256
492,197 UART: [kat] SHA2-384
499,035 UART: [kat] SHA2-512-ACC
501,616 UART: [kat] ECC-384
2,947,199 UART: [kat] HMAC-384Kdf
2,971,606 UART: [kat] LMS
3,503,369 UART: [kat] --
3,506,748 UART: [cold-reset] ++
3,508,040 UART: [fht] FHT @ 0x50003400
3,518,663 UART: [idev] ++
3,519,294 UART: [idev] CDI.KEYID = 6
3,520,316 UART: [idev] SUBJECT.KEYID = 7
3,521,486 UART: [idev] UDS.KEYID = 0
3,522,404 ready_for_fw is high
3,522,591 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,617,552 UART: [idev] Erasing UDS.KEYID = 0
6,030,362 UART: [idev] Sha1 KeyId Algorithm
6,052,606 UART: [idev] --
6,056,793 UART: [ldev] ++
6,057,476 UART: [ldev] CDI.KEYID = 6
6,058,393 UART: [ldev] SUBJECT.KEYID = 5
6,059,572 UART: [ldev] AUTHORITY.KEYID = 7
6,060,800 UART: [ldev] FE.KEYID = 1
6,099,577 UART: [ldev] Erasing FE.KEYID = 1
8,607,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,028 UART: [ldev] --
10,414,946 UART: [fwproc] Wait for Commands...
10,417,196 UART: [fwproc] Recv command 0x46574c44
10,419,498 UART: [fwproc] Recv'd Img size: 75384 bytes
13,389,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,466,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,582,694 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,892,112 >>> mbox cmd response: success
13,892,708 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,897,062 UART: [afmc] ++
13,897,765 UART: [afmc] CDI.KEYID = 6
13,898,918 UART: [afmc] SUBJECT.KEYID = 7
13,900,455 UART: [afmc] AUTHORITY.KEYID = 5
16,447,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,188,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,190,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,205,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,220,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,235,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,258,654 UART: [afmc] --
18,262,243 UART: [cold-reset] --
18,266,962 UART: [state] Locking Datavault
18,272,535 UART: [state] Locking PCR0, PCR1 and PCR31
18,274,721 UART: [state] Locking ICCM
18,276,832 UART: [exit] Launching FMC @ 0x40000130
18,285,500 UART:
18,285,732 UART: Running Caliptra FMC ...
18,286,824 UART:
18,286,975 UART: [state] CFI Enabled
18,348,297 UART: [fht] FMC Alias Private Key: 7
20,113,004 UART: [art] Extend RT PCRs Done
20,114,229 UART: [art] Lock RT PCRs Done
20,116,161 UART: [art] Populate DV Done
20,121,677 UART: [fht] FMC Alias Private Key: 7
20,123,265 UART: [art] Derive CDI
20,124,002 UART: [art] Store in in slot 0x4
20,180,712 UART: [art] Derive Key Pair
20,181,750 UART: [art] Store priv key in slot 0x5
22,657,727 UART: [art] Derive Key Pair - Done
22,670,676 UART: [art] Signing Cert with AUTHO
22,671,997 UART: RITY.KEYID = 7
24,383,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,384,609 UART: [art] PUB.X = E45080CC9A2CD1971D51EDA4B33618F78C72E260B075FF27F09A22945FAC120E274677FD30E270C2B6A9F1A059A947D0
24,391,860 UART: [art] PUB.Y = 2E224694AE2E908FB83B2296516DFE5F8A2CBC6301B8301CB42ED25CA67DD3D1BB594C89FD5B53741F6655E0C8FDFF2A
24,399,158 UART: [art] SIG.R = FFBD93BBCFB564F20E1D4FC25118B09AFE11B9F3DFA4349588F33F7BF5E9F2E6FBE989CB416F8944991D28EE90CEF62B
24,406,547 UART: [art] SIG.S = 3CF4D60F5E34405E4F5DE2AF731EC02FDA69AA6FCC47CE9F07E2F17699904E3D6A723F39B8BB5382AFF252B07DBC56A8
25,384,586 UART: mock_rt_interact::rt_entry...FMC Tester
25,501,524 UART: [rt] Runtime listening for mailbox commands...
25,505,756 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,437,067 ready_for_fw is high
3,437,490 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,913,542 >>> mbox cmd response: success
13,914,267 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,193,389 UART:
18,194,175 UART: Running Caliptra FMC ...
18,195,384 UART:
18,195,534 UART: [state] CFI Enabled
18,263,161 UART: [fht] FMC Alias Private Key: 7
20,027,874 UART: [art] Extend RT PCRs Done
20,029,124 UART: [art] Lock RT PCRs Done
20,030,887 UART: [art] Populate DV Done
20,036,303 UART: [fht] FMC Alias Private Key: 7
20,037,846 UART: [art] Derive CDI
20,038,660 UART: [art] Store in in slot 0x4
20,096,262 UART: [art] Derive Key Pair
20,097,314 UART: [art] Store priv key in slot 0x5
22,560,198 UART: [art] Derive Key Pair - Done
22,573,190 UART: [art] Signing Cert with AUTHO
22,574,488 UART: RITY.KEYID = 7
24,285,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,287,461 UART: [art] PUB.X = 6D7CC461B95A446CA56B361A92B1C85EDEE52E927756CC2CBD2C83881F704FED2B62CBC026FA7928069F8C158D6D5495
24,294,751 UART: [art] PUB.Y = B5395C4C1AD2A061BA13475530BEC796C57DC6815D17F95B79E97CC8C93E813C334FDB3C1AE3963E73E6CC5B89B13F79
24,301,995 UART: [art] SIG.R = 2EEF975463EDCBD54DC277A54434088F3C2E74D43810730E10D2BD349CD878264CF0621B3843FFDACD91354775116231
24,309,401 UART: [art] SIG.S = E892F99ECED187657F5E9B49B9F3CA05B1A806F3B53A6403CEC23D18BF84F3C627446CC2F3B16D4EC43AFB9181383E51
25,287,952 UART: mock_rt_interact::rt_entry...FMC Tester
25,404,476 UART: [rt] Runtime listening for mailbox commands...
25,408,769 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
192,447 UART:
192,831 UART: Running Caliptra ROM ...
193,946 UART:
603,764 UART: [state] CFI Enabled
616,889 UART: [state] LifecycleState = Unprovisioned
619,214 UART: [state] DebugLocked = No
621,170 UART: [state] WD Timer not started. Device not locked for debugging
625,135 UART: [kat] SHA2-256
814,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,750 UART: [kat] ++
826,270 UART: [kat] sha1
837,938 UART: [kat] SHA2-256
840,948 UART: [kat] SHA2-384
845,734 UART: [kat] SHA2-512-ACC
848,311 UART: [kat] ECC-384
3,292,124 UART: [kat] HMAC-384Kdf
3,305,240 UART: [kat] LMS
3,837,099 UART: [kat] --
3,841,023 UART: [cold-reset] ++
3,842,241 UART: [fht] FHT @ 0x50003400
3,854,065 UART: [idev] ++
3,854,767 UART: [idev] CDI.KEYID = 6
3,855,678 UART: [idev] SUBJECT.KEYID = 7
3,856,920 UART: [idev] UDS.KEYID = 0
3,857,835 ready_for_fw is high
3,858,016 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,952,948 UART: [idev] Erasing UDS.KEYID = 0
6,329,596 UART: [idev] Sha1 KeyId Algorithm
6,351,160 UART: [idev] --
6,357,125 UART: [ldev] ++
6,357,805 UART: [ldev] CDI.KEYID = 6
6,358,712 UART: [ldev] SUBJECT.KEYID = 5
6,359,810 UART: [ldev] AUTHORITY.KEYID = 7
6,361,094 UART: [ldev] FE.KEYID = 1
6,371,678 UART: [ldev] Erasing FE.KEYID = 1
8,849,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,754 UART: [ldev] --
10,641,468 UART: [fwproc] Wait for Commands...
10,644,469 UART: [fwproc] Recv command 0x46574c44
10,646,786 UART: [fwproc] Recv'd Img size: 75384 bytes
13,617,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,694,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,810,792 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
14,120,366 >>> mbox cmd response: success
14,120,764 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,124,931 UART: [afmc] ++
14,125,618 UART: [afmc] CDI.KEYID = 6
14,126,767 UART: [afmc] SUBJECT.KEYID = 7
14,128,299 UART: [afmc] AUTHORITY.KEYID = 5
16,635,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,357,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,359,725 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,374,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,389,993 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,405,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,429,914 UART: [afmc] --
18,434,422 UART: [cold-reset] --
18,437,267 UART: [state] Locking Datavault
18,444,185 UART: [state] Locking PCR0, PCR1 and PCR31
18,446,321 UART: [state] Locking ICCM
18,448,688 UART: [exit] Launching FMC @ 0x40000130
18,457,353 UART:
18,457,583 UART: Running Caliptra FMC ...
18,458,677 UART:
18,458,831 UART: [state] CFI Enabled
18,467,111 UART: [fht] FMC Alias Private Key: 7
20,224,514 UART: [art] Extend RT PCRs Done
20,225,735 UART: [art] Lock RT PCRs Done
20,227,609 UART: [art] Populate DV Done
20,232,967 UART: [fht] FMC Alias Private Key: 7
20,234,507 UART: [art] Derive CDI
20,235,254 UART: [art] Store in in slot 0x4
20,278,095 UART: [art] Derive Key Pair
20,279,163 UART: [art] Store priv key in slot 0x5
22,705,956 UART: [art] Derive Key Pair - Done
22,718,737 UART: [art] Signing Cert with AUTHO
22,720,032 UART: RITY.KEYID = 7
24,425,074 UART: [art] Erasing AUTHORITY.KEYID = 7
24,426,592 UART: [art] PUB.X = 816962691497D08CF94EA629C6356068A8CC2AC5894554A133EBEE7F432C1FA7AD3F16C05EC5FECA960661F6C3CDB2D7
24,433,901 UART: [art] PUB.Y = 0DDD772A0503C535831E126D8D39EA004276A75DDC547373068322E4260AC9BD6FC29117785E35E1AD76C3DB2527187E
24,441,079 UART: [art] SIG.R = 511D79DE91C90C0218C07760A9159EEB1810B8EA755FEC02724A73D14028C49D97C12EA7679AC5611A021DDAFCA041EC
24,448,472 UART: [art] SIG.S = B52B3861919CC468594CC7CB4B859CE6FE52269A6AA0C41059F0B541C007599B8751DB6EF12C4CE3C14B5AE78B4ABBB7
25,427,053 UART: mock_rt_interact::rt_entry...FMC Tester
25,544,602 UART: [rt] Runtime listening for mailbox commands...
25,548,881 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,753,177 ready_for_fw is high
3,753,845 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,117,318 >>> mbox cmd response: success
14,117,815 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,380,012 UART:
18,380,400 UART: Running Caliptra FMC ...
18,381,677 UART:
18,381,854 UART: [state] CFI Enabled
18,389,896 UART: [fht] FMC Alias Private Key: 7
20,145,868 UART: [art] Extend RT PCRs Done
20,147,076 UART: [art] Lock RT PCRs Done
20,148,809 UART: [art] Populate DV Done
20,154,264 UART: [fht] FMC Alias Private Key: 7
20,155,968 UART: [art] Derive CDI
20,156,800 UART: [art] Store in in slot 0x4
20,200,105 UART: [art] Derive Key Pair
20,201,142 UART: [art] Store priv key in slot 0x5
22,628,108 UART: [art] Derive Key Pair - Done
22,641,428 UART: [art] Signing Cert with AUTHO
22,642,725 UART: RITY.KEYID = 7
24,348,228 UART: [art] Erasing AUTHORITY.KEYID = 7
24,349,713 UART: [art] PUB.X = C3723EA2536A77C9BC260618871275827F73DD51F906252E36D476E965109901E65883E186F9B3B8383A4928D2D9A3E1
24,356,979 UART: [art] PUB.Y = 3C6049F10856B253DF2A7533F50593657162A0E061B9693BDF3CC852EC9E47FF84113B6D7385093DAA8C19A3D85BEC1E
24,364,239 UART: [art] SIG.R = DEE9D0C7BD2B4B1460BCB0F67C091FA1C600B68AF18BC4E93248C2058F7F8B32B606383E3231DA89288B5BF0DF81581F
24,371,584 UART: [art] SIG.S = F6BB8E29D20B591781F7F4C59328C493677B8C0C449AA5CB631182E8190EBEA40D33ED4E95408AE0F80C9590CA7E3543
25,349,964 UART: mock_rt_interact::rt_entry...FMC Tester
25,466,579 UART: [rt] Runtime listening for mailbox commands...
25,470,811 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,619 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,725 UART: [ldev] ++
1,514,893 UART: [ldev] CDI.KEYID = 6
1,515,256 UART: [ldev] SUBJECT.KEYID = 5
1,515,682 UART: [ldev] AUTHORITY.KEYID = 7
1,516,145 UART: [ldev] FE.KEYID = 1
1,521,081 UART: [ldev] Erasing FE.KEYID = 1
1,546,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,643 UART: [fwproc] Waiting for Commands...
1,586,348 UART: [fwproc] Received command 0x46574c44
1,587,139 UART: [fwproc] Received Image of size 75384 bytes
2,438,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,465,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,494,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,572,112 >>> mbox cmd response: success
2,572,112 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,573,140 UART: [afmc] ++
2,573,308 UART: [afmc] CDI.KEYID = 6
2,573,670 UART: [afmc] SUBJECT.KEYID = 7
2,574,095 UART: [afmc] AUTHORITY.KEYID = 5
2,608,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,624,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,625,432 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,631,160 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,637,045 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,642,735 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,650,804 UART: [afmc] --
2,651,766 UART: [cold-reset] --
2,652,666 UART: [state] Locking Datavault
2,653,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,654,327 UART: [state] Locking ICCM
2,654,957 UART: [exit] Launching FMC @ 0x40000130
2,660,286 UART:
2,660,302 UART: Running Caliptra FMC ...
2,660,710 UART:
2,660,764 UART: [state] CFI Enabled
2,671,003 UART: [fht] FMC Alias Private Key: 7
2,778,714 UART: [art] Extend RT PCRs Done
2,779,142 UART: [art] Lock RT PCRs Done
2,780,532 UART: [art] Populate DV Done
2,788,879 UART: [fht] FMC Alias Private Key: 7
2,789,811 UART: [art] Derive CDI
2,790,091 UART: [art] Store in in slot 0x4
2,875,794 UART: [art] Derive Key Pair
2,876,154 UART: [art] Store priv key in slot 0x5
2,888,966 UART: [art] Derive Key Pair - Done
2,903,644 UART: [art] Signing Cert with AUTHO
2,904,124 UART: RITY.KEYID = 7
2,919,398 UART: [art] Erasing AUTHORITY.KEYID = 7
2,920,163 UART: [art] PUB.X = 12A266F33C0B6DCAFF194E8D6A895728CEF81B795A5B17E461C6062AD0B8E47655E96FF2999E0BE5791A34DB40B11011
2,926,930 UART: [art] PUB.Y = BF274C96D830C66DAFF06A83BC8133CCE3BEE54D2EB1E179A1A8C119F3243DD3326FBC31B13F1FF13A80C7020D60F3AB
2,933,894 UART: [art] SIG.R = F1808139232C92DDE9679D1A4AA20DD5DBA40D2B70DB299692A9142E180302FC191642AAEC6EC176C05B7EFE600AD71A
2,940,659 UART: [art] SIG.S = C810C80AD34D681C2089C6AD2B38926ADC3DE33206B6A9780D7BEAFA25B6ADEC1A51E5684A78AA5C960CBB604C4ADCF5
2,964,656 UART: mock_rt_interact::rt_entry...FMC Tester
3,071,471 UART: [rt] Runtime listening for mailbox commands...
3,074,861 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 ready_for_fw is high
1,362,491 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,422,624 >>> mbox cmd response: success
2,422,624 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,080 UART:
2,485,096 UART: Running Caliptra FMC ...
2,485,504 UART:
2,485,558 UART: [state] CFI Enabled
2,495,819 UART: [fht] FMC Alias Private Key: 7
2,603,816 UART: [art] Extend RT PCRs Done
2,604,244 UART: [art] Lock RT PCRs Done
2,605,816 UART: [art] Populate DV Done
2,614,339 UART: [fht] FMC Alias Private Key: 7
2,615,391 UART: [art] Derive CDI
2,615,671 UART: [art] Store in in slot 0x4
2,701,280 UART: [art] Derive Key Pair
2,701,640 UART: [art] Store priv key in slot 0x5
2,714,368 UART: [art] Derive Key Pair - Done
2,729,124 UART: [art] Signing Cert with AUTHO
2,729,604 UART: RITY.KEYID = 7
2,744,852 UART: [art] Erasing AUTHORITY.KEYID = 7
2,745,617 UART: [art] PUB.X = 2C334C698D4711BDF10224781E12F9BE73EA69CC4E33B40D8A2486CF424B6189F352B126E37F46164901622B53EDE5B8
2,752,376 UART: [art] PUB.Y = 7771BB6199EA0606F221819BBC30B4D637322F60790EA00673B2A4FD81D718DC7A29F6F0DA406988B3BAA812CE36B278
2,759,316 UART: [art] SIG.R = B45CE10F06D22A27680936230E265F07BB505E84B2D6EA29613E325B25C39F8570BB875AECDC43CB8A06D316447C5FFA
2,766,074 UART: [art] SIG.S = DB5692F9C453749A33D7890683B815A150E49B3383629E1CFB5D554CC17467944ACFC2BB4E9AD5203641A30CF1755919
2,789,325 UART: mock_rt_interact::rt_entry...FMC Tester
2,896,544 UART: [rt] Runtime listening for mailbox commands...
2,899,934 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,413 UART: [kat] HMAC-384Kdf
907,235 UART: [kat] LMS
1,475,431 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,910 UART: [fht] Storing FHT @ 0x50003400
1,479,831 UART: [idev] ++
1,479,999 UART: [idev] CDI.KEYID = 6
1,480,359 UART: [idev] SUBJECT.KEYID = 7
1,480,783 UART: [idev] UDS.KEYID = 0
1,481,128 ready_for_fw is high
1,481,128 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,481 UART: [idev] Erasing UDS.KEYID = 0
1,505,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,855 UART: [idev] --
1,514,914 UART: [ldev] ++
1,515,082 UART: [ldev] CDI.KEYID = 6
1,515,445 UART: [ldev] SUBJECT.KEYID = 5
1,515,871 UART: [ldev] AUTHORITY.KEYID = 7
1,516,334 UART: [ldev] FE.KEYID = 1
1,521,756 UART: [ldev] Erasing FE.KEYID = 1
1,547,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,091 UART: [ldev] --
1,586,468 UART: [fwproc] Waiting for Commands...
1,587,229 UART: [fwproc] Received command 0x46574c44
1,588,020 UART: [fwproc] Received Image of size 75384 bytes
2,440,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,497,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,574,859 >>> mbox cmd response: success
2,574,859 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,575,977 UART: [afmc] ++
2,576,145 UART: [afmc] CDI.KEYID = 6
2,576,507 UART: [afmc] SUBJECT.KEYID = 7
2,576,932 UART: [afmc] AUTHORITY.KEYID = 5
2,611,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,627,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,138 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,645,828 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,653,661 UART: [afmc] --
2,654,657 UART: [cold-reset] --
2,655,465 UART: [state] Locking Datavault
2,656,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,176 UART: [state] Locking ICCM
2,657,800 UART: [exit] Launching FMC @ 0x40000130
2,663,129 UART:
2,663,145 UART: Running Caliptra FMC ...
2,663,553 UART:
2,663,696 UART: [state] CFI Enabled
2,674,233 UART: [fht] FMC Alias Private Key: 7
2,782,432 UART: [art] Extend RT PCRs Done
2,782,860 UART: [art] Lock RT PCRs Done
2,784,662 UART: [art] Populate DV Done
2,792,893 UART: [fht] FMC Alias Private Key: 7
2,793,911 UART: [art] Derive CDI
2,794,191 UART: [art] Store in in slot 0x4
2,879,704 UART: [art] Derive Key Pair
2,880,064 UART: [art] Store priv key in slot 0x5
2,893,350 UART: [art] Derive Key Pair - Done
2,908,101 UART: [art] Signing Cert with AUTHO
2,908,581 UART: RITY.KEYID = 7
2,924,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,914 UART: [art] PUB.X = 523A61A97926F681856874E1B361A9D0045B01F0FB82930E0B50778DF3C4DE199156237C14D4707BD997772DC0FAB779
2,931,664 UART: [art] PUB.Y = 6A34D007FB385C2FB138E6ABACE6035963147D8DBF13FB02ED59A0D91B74AB89F686625DB9392690A2868B83288044C9
2,938,607 UART: [art] SIG.R = 72BA429E92BAD79EA7427DD97521362E2D7DD33678D3745FE2E77E222CD3F89E037132831B753CB35430941644E195DD
2,945,370 UART: [art] SIG.S = 8D245DB4C2F13DB932041B9E9D1CB458554CE3E410E794F30155539B1B11C3BA328696A7D553ACFE9ADFFE25243C2E21
2,969,161 UART: mock_rt_interact::rt_entry...FMC Tester
3,076,811 UART: [rt] Runtime listening for mailbox commands...
3,080,201 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,234 ready_for_fw is high
1,363,234 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,425,321 >>> mbox cmd response: success
2,425,321 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,486,571 UART:
2,486,587 UART: Running Caliptra FMC ...
2,486,995 UART:
2,487,138 UART: [state] CFI Enabled
2,497,931 UART: [fht] FMC Alias Private Key: 7
2,606,270 UART: [art] Extend RT PCRs Done
2,606,698 UART: [art] Lock RT PCRs Done
2,608,230 UART: [art] Populate DV Done
2,616,519 UART: [fht] FMC Alias Private Key: 7
2,617,537 UART: [art] Derive CDI
2,617,817 UART: [art] Store in in slot 0x4
2,703,800 UART: [art] Derive Key Pair
2,704,160 UART: [art] Store priv key in slot 0x5
2,717,394 UART: [art] Derive Key Pair - Done
2,731,880 UART: [art] Signing Cert with AUTHO
2,732,360 UART: RITY.KEYID = 7
2,748,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,748,835 UART: [art] PUB.X = 39D6F48469B549E836719A31DA032D8C3BA45E9E0C3A204BEBB282F54043800E3CF5C487EB7C03C707DBBA7F1EA4B190
2,755,600 UART: [art] PUB.Y = 7C37E872BDD8AE3FFD63D0621153A869436FFE21E35196AF35E35769AF7EF6AF8526E1FE3CEAF5BFADBA1876E0CE27B9
2,762,572 UART: [art] SIG.R = 9F9846787B922B51548BDA2903AE25D196046C42A9055728080CB1AA94CD3F6F7D13EED19968397CF36A082D563DFD06
2,769,319 UART: [art] SIG.S = 14C5FCE46F630962797C0C186BAE4FF7A0122013B46DF9BAB5CEFE1B235B37047541445152C95B8123FE4D4B9B17CCB5
2,793,147 UART: mock_rt_interact::rt_entry...FMC Tester
2,901,083 UART: [rt] Runtime listening for mailbox commands...
2,904,473 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
893,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,749 UART: [kat] ++
897,901 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
917,996 UART: [kat] HMAC-384Kdf
922,526 UART: [kat] LMS
1,170,854 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,387 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 ready_for_fw is high
1,176,367 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,201,273 UART: [idev] Sha1 KeyId Algorithm
1,209,951 UART: [idev] --
1,210,905 UART: [ldev] ++
1,211,073 UART: [ldev] CDI.KEYID = 6
1,211,436 UART: [ldev] SUBJECT.KEYID = 5
1,211,862 UART: [ldev] AUTHORITY.KEYID = 7
1,212,325 UART: [ldev] FE.KEYID = 1
1,217,495 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,521 UART: [ldev] --
1,283,004 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,334 UART: [fwproc] Recv'd Img size: 75384 bytes
2,136,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,764 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,255 >>> mbox cmd response: success
2,271,255 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,365 UART: [afmc] ++
2,272,533 UART: [afmc] CDI.KEYID = 6
2,272,895 UART: [afmc] SUBJECT.KEYID = 7
2,273,320 UART: [afmc] AUTHORITY.KEYID = 5
2,308,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,330,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,757 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,476 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,256 UART: [afmc] --
2,351,340 UART: [cold-reset] --
2,352,352 UART: [state] Locking Datavault
2,353,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,943 UART: [state] Locking ICCM
2,354,419 UART: [exit] Launching FMC @ 0x40000130
2,359,748 UART:
2,359,764 UART: Running Caliptra FMC ...
2,360,172 UART:
2,360,226 UART: [state] CFI Enabled
2,370,841 UART: [fht] FMC Alias Private Key: 7
2,479,044 UART: [art] Extend RT PCRs Done
2,479,472 UART: [art] Lock RT PCRs Done
2,481,024 UART: [art] Populate DV Done
2,489,179 UART: [fht] FMC Alias Private Key: 7
2,490,229 UART: [art] Derive CDI
2,490,509 UART: [art] Store in in slot 0x4
2,576,098 UART: [art] Derive Key Pair
2,576,458 UART: [art] Store priv key in slot 0x5
2,590,016 UART: [art] Derive Key Pair - Done
2,604,812 UART: [art] Signing Cert with AUTHO
2,605,292 UART: RITY.KEYID = 7
2,620,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,621,095 UART: [art] PUB.X = 3EF9B34F140BEF0FBE02D182A1DE561D2814D29348F76B4A4A7F99DD843DAB5074B090D5C02F07EFA593C67F9631A9CD
2,627,867 UART: [art] PUB.Y = C6972A3A9E7500917C41854A4B72FB88BC021E34A98327AC620CCFC92D09F5CC292184DA10959328CC77210C29B31331
2,634,779 UART: [art] SIG.R = 7C933A175C05D5EB9A0B615DD3B580EEB64D2A4804683D2E27E986F6766875271757088DD6EADFED21508BBC7A7734E1
2,641,541 UART: [art] SIG.S = 6C119D67B2D90680D9C92414259235AADBFED2013720E06018FE2BB01C83B461761DFEB5D5D48431F0B353AADCFC0AA7
2,665,361 UART: mock_rt_interact::rt_entry...FMC Tester
2,772,725 UART: [rt] Runtime listening for mailbox commands...
2,776,115 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,831 ready_for_fw is high
1,060,831 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,123,542 >>> mbox cmd response: success
2,123,542 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,185,308 UART:
2,185,324 UART: Running Caliptra FMC ...
2,185,732 UART:
2,185,786 UART: [state] CFI Enabled
2,196,175 UART: [fht] FMC Alias Private Key: 7
2,303,948 UART: [art] Extend RT PCRs Done
2,304,376 UART: [art] Lock RT PCRs Done
2,305,666 UART: [art] Populate DV Done
2,313,899 UART: [fht] FMC Alias Private Key: 7
2,315,069 UART: [art] Derive CDI
2,315,349 UART: [art] Store in in slot 0x4
2,401,324 UART: [art] Derive Key Pair
2,401,684 UART: [art] Store priv key in slot 0x5
2,414,732 UART: [art] Derive Key Pair - Done
2,429,360 UART: [art] Signing Cert with AUTHO
2,429,840 UART: RITY.KEYID = 7
2,445,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,851 UART: [art] PUB.X = 73959E437EDF7D0C38C3C38DDE816999972256F37A0909D5653A765D6A2CCFACEB255272F8DD366E7758059EB04CFBC7
2,452,615 UART: [art] PUB.Y = ED6451780350AE790BBFA2304851BB71D33EB82AC9FDB89AD567648C9323B756C5117A724FA6F69127E161B9AD8ADD5A
2,459,567 UART: [art] SIG.R = ECB5DCDE0788DD5D65FD542D2F58042E3DA4AD244FD3C135D749B67F7AD8446F5AFE475ED9E086331E1FF0A3E687436C
2,466,349 UART: [art] SIG.S = E9A1F0A8850C3D7FFA2388AD144B9DC8233AC1A18612EA92E24841BE42582B366547DBBE0F7249F3552EFC293F837ECC
2,490,050 UART: mock_rt_interact::rt_entry...FMC Tester
2,597,439 UART: [rt] Runtime listening for mailbox commands...
2,600,829 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,125 UART: [kat] LMS
1,171,453 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,409 UART: [idev] ++
1,175,577 UART: [idev] CDI.KEYID = 6
1,175,937 UART: [idev] SUBJECT.KEYID = 7
1,176,361 UART: [idev] UDS.KEYID = 0
1,176,706 ready_for_fw is high
1,176,706 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,890 UART: [idev] Sha1 KeyId Algorithm
1,210,484 UART: [idev] --
1,211,464 UART: [ldev] ++
1,211,632 UART: [ldev] CDI.KEYID = 6
1,211,995 UART: [ldev] SUBJECT.KEYID = 5
1,212,421 UART: [ldev] AUTHORITY.KEYID = 7
1,212,884 UART: [ldev] FE.KEYID = 1
1,218,090 UART: [ldev] Erasing FE.KEYID = 1
1,244,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,758 UART: [ldev] --
1,284,265 UART: [fwproc] Wait for Commands...
1,285,035 UART: [fwproc] Recv command 0x46574c44
1,285,763 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,859 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,200 >>> mbox cmd response: success
2,271,200 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,274 UART: [afmc] ++
2,272,442 UART: [afmc] CDI.KEYID = 6
2,272,804 UART: [afmc] SUBJECT.KEYID = 7
2,273,229 UART: [afmc] AUTHORITY.KEYID = 5
2,309,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,633 UART: [afmc] --
2,352,739 UART: [cold-reset] --
2,353,379 UART: [state] Locking Datavault
2,354,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,355,360 UART: [state] Locking ICCM
2,355,812 UART: [exit] Launching FMC @ 0x40000130
2,361,141 UART:
2,361,157 UART: Running Caliptra FMC ...
2,361,565 UART:
2,361,708 UART: [state] CFI Enabled
2,372,719 UART: [fht] FMC Alias Private Key: 7
2,481,004 UART: [art] Extend RT PCRs Done
2,481,432 UART: [art] Lock RT PCRs Done
2,483,262 UART: [art] Populate DV Done
2,491,489 UART: [fht] FMC Alias Private Key: 7
2,492,477 UART: [art] Derive CDI
2,492,757 UART: [art] Store in in slot 0x4
2,578,380 UART: [art] Derive Key Pair
2,578,740 UART: [art] Store priv key in slot 0x5
2,592,084 UART: [art] Derive Key Pair - Done
2,606,501 UART: [art] Signing Cert with AUTHO
2,606,981 UART: RITY.KEYID = 7
2,622,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,824 UART: [art] PUB.X = 7CCAEA2894C7BA124611BD31AD2A3D0E4C0D1969A4D0A6E3583DAE8C663C4B8156D3C41D6AF37843E35B8FA1C43E79B3
2,629,604 UART: [art] PUB.Y = A1B55096F54EFB3BBDF4FE44BC2B696CC897327AC666958A722E66F4AEB3E7574E1CA1C0CB657306159D204030328DB7
2,636,559 UART: [art] SIG.R = BC70295FBCF5303448F00C5F78837DD31A1E80E25B45378FC3C4F7D84A147AE2B7BFC0AE2529EF01F480472F9A160AB6
2,643,330 UART: [art] SIG.S = C35BFB3053E4B0702AA346F4FD74E6DA17288FE8E8F1DE73CE8A93949409A507204C4B61A7B3FCF244C77B84FFFF7482
2,667,255 UART: mock_rt_interact::rt_entry...FMC Tester
2,775,406 UART: [rt] Runtime listening for mailbox commands...
2,778,796 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 ready_for_fw is high
1,061,178 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,123,391 >>> mbox cmd response: success
2,123,391 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,185,695 UART:
2,185,711 UART: Running Caliptra FMC ...
2,186,119 UART:
2,186,262 UART: [state] CFI Enabled
2,196,745 UART: [fht] FMC Alias Private Key: 7
2,304,838 UART: [art] Extend RT PCRs Done
2,305,266 UART: [art] Lock RT PCRs Done
2,306,880 UART: [art] Populate DV Done
2,315,205 UART: [fht] FMC Alias Private Key: 7
2,316,271 UART: [art] Derive CDI
2,316,551 UART: [art] Store in in slot 0x4
2,402,534 UART: [art] Derive Key Pair
2,402,894 UART: [art] Store priv key in slot 0x5
2,416,340 UART: [art] Derive Key Pair - Done
2,430,786 UART: [art] Signing Cert with AUTHO
2,431,266 UART: RITY.KEYID = 7
2,446,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,447,215 UART: [art] PUB.X = E58077D6022C46C9377BB82505687C40E4651FE7D90038926F9FD05CDE70B6429F99D740A3E25C147469B6F661FF817C
2,453,951 UART: [art] PUB.Y = 0B61DE98891AD05C05A3807F593E2A0268FB8C29B78CD81B2CC7923BC8E78D953534085305F11A71299738A720A529F4
2,460,880 UART: [art] SIG.R = 33E5F5132B9F9A27B94BFD371220BFED5B663BE0E3F077E024BBC2DC7C3B6F73C5502887AE664E86B92526BAE561D638
2,467,660 UART: [art] SIG.S = B480E481BB1EF20352FFA67A14259316A4E0743FB5E50261490B40DC5370DCE4832C99D11F96868B89C4FA5CCB47D34E
2,491,828 UART: mock_rt_interact::rt_entry...FMC Tester
2,599,194 UART: [rt] Runtime listening for mailbox commands...
2,602,584 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 ready_for_fw is high
1,174,313 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,194 UART: [ldev] ++
1,208,362 UART: [ldev] CDI.KEYID = 6
1,208,726 UART: [ldev] SUBJECT.KEYID = 5
1,209,153 UART: [ldev] AUTHORITY.KEYID = 7
1,209,616 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,768 UART: [ldev] --
1,280,138 UART: [fwproc] Wait for Commands...
1,280,757 UART: [fwproc] Recv command 0x46574c44
1,281,490 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,037 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,377 >>> mbox cmd response: success
2,267,377 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,422 UART: [afmc] ++
2,268,590 UART: [afmc] CDI.KEYID = 6
2,268,953 UART: [afmc] SUBJECT.KEYID = 7
2,269,379 UART: [afmc] AUTHORITY.KEYID = 5
2,305,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,347,991 UART: [afmc] --
2,349,115 UART: [cold-reset] --
2,349,769 UART: [state] Locking Datavault
2,350,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,456 UART: [state] Locking ICCM
2,352,006 UART: [exit] Launching FMC @ 0x40000130
2,357,335 UART:
2,357,351 UART: Running Caliptra FMC ...
2,357,759 UART:
2,357,813 UART: [state] CFI Enabled
2,368,488 UART: [fht] FMC Alias Private Key: 7
2,475,909 UART: [art] Extend RT PCRs Done
2,476,337 UART: [art] Lock RT PCRs Done
2,478,079 UART: [art] Populate DV Done
2,486,326 UART: [fht] FMC Alias Private Key: 7
2,487,476 UART: [art] Derive CDI
2,487,756 UART: [art] Store in in slot 0x4
2,573,309 UART: [art] Derive Key Pair
2,573,669 UART: [art] Store priv key in slot 0x5
2,586,799 UART: [art] Derive Key Pair - Done
2,601,593 UART: [art] Signing Cert with AUTHO
2,602,073 UART: RITY.KEYID = 7
2,617,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,432 UART: [art] PUB.X = 1186E2E9BE9D3A50049BAE4291A6F0B6189BC7C5E20396B6E2A9B3BB36236D4E7908C21A52BA73045EBC5D2D47B83951
2,625,196 UART: [art] PUB.Y = F740252040C8178E9D52E538871086E4652062455628877E8F71B300D540ED6C894E91F44DB2C75B606DA3B1F5389532
2,632,108 UART: [art] SIG.R = 02D91DDA4F573B7E6D42C5F2FB1775EFE61F78FA1FE8D56C81A7A15B6531A2ADDE825DB45996EE77F05B1A14BCAE1DD4
2,638,899 UART: [art] SIG.S = DB3D7C865DE3EBC9476E53E759BA31608CA759A7092DFCDD1FE0C2A9B8845FF9AB27BAAF74C6C95E8493A2CE7B5EC7B4
2,662,335 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,919 UART: [rt] Runtime listening for mailbox commands...
2,773,309 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,440 ready_for_fw is high
1,055,440 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,595 >>> mbox cmd response: success
2,116,595 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,981 UART:
2,178,997 UART: Running Caliptra FMC ...
2,179,405 UART:
2,179,459 UART: [state] CFI Enabled
2,190,432 UART: [fht] FMC Alias Private Key: 7
2,298,325 UART: [art] Extend RT PCRs Done
2,298,753 UART: [art] Lock RT PCRs Done
2,300,199 UART: [art] Populate DV Done
2,308,498 UART: [fht] FMC Alias Private Key: 7
2,309,454 UART: [art] Derive CDI
2,309,734 UART: [art] Store in in slot 0x4
2,394,999 UART: [art] Derive Key Pair
2,395,359 UART: [art] Store priv key in slot 0x5
2,408,805 UART: [art] Derive Key Pair - Done
2,423,465 UART: [art] Signing Cert with AUTHO
2,423,945 UART: RITY.KEYID = 7
2,439,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,822 UART: [art] PUB.X = 55D5C0444C09ADD9506D691D0922C0476420BE548490491695A56C694057C2D17610BBD2FAD24B4A24F57B508292F8BB
2,446,580 UART: [art] PUB.Y = 1B19BD71FF0397838CD422714B95047FC540762D82EF85616700C5392EAE82C2C3A853CCF701A0B1B4B04E92A1690FEF
2,453,498 UART: [art] SIG.R = 0BEE66F28B2CB330AA6810E5AE907BD24D2D1C9589C324543337AE43AA1E560155124287783D260CCE7BE612793E4522
2,460,257 UART: [art] SIG.S = 9D37A5E72F0464B4F855396D2968F5C10904CBCC44EE3165936B4C2C808697050C78F5D398017B529553924D9AAF29ED
2,483,660 UART: mock_rt_interact::rt_entry...FMC Tester
2,590,814 UART: [rt] Runtime listening for mailbox commands...
2,594,204 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,755 UART: [kat] SHA2-512-ACC
906,656 UART: [kat] ECC-384
916,831 UART: [kat] HMAC-384Kdf
921,405 UART: [kat] LMS
1,169,717 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,171,102 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,175,102 ready_for_fw is high
1,175,102 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,989 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,288 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,270,636 >>> mbox cmd response: success
2,270,636 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,849 UART: [afmc] ++
2,272,017 UART: [afmc] CDI.KEYID = 6
2,272,380 UART: [afmc] SUBJECT.KEYID = 7
2,272,806 UART: [afmc] AUTHORITY.KEYID = 5
2,308,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,324,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,325,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,350,856 UART: [afmc] --
2,351,800 UART: [cold-reset] --
2,352,690 UART: [state] Locking Datavault
2,353,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,421 UART: [state] Locking ICCM
2,354,989 UART: [exit] Launching FMC @ 0x40000130
2,360,318 UART:
2,360,334 UART: Running Caliptra FMC ...
2,360,742 UART:
2,360,885 UART: [state] CFI Enabled
2,371,666 UART: [fht] FMC Alias Private Key: 7
2,479,405 UART: [art] Extend RT PCRs Done
2,479,833 UART: [art] Lock RT PCRs Done
2,481,411 UART: [art] Populate DV Done
2,489,748 UART: [fht] FMC Alias Private Key: 7
2,490,842 UART: [art] Derive CDI
2,491,122 UART: [art] Store in in slot 0x4
2,577,119 UART: [art] Derive Key Pair
2,577,479 UART: [art] Store priv key in slot 0x5
2,590,977 UART: [art] Derive Key Pair - Done
2,606,006 UART: [art] Signing Cert with AUTHO
2,606,486 UART: RITY.KEYID = 7
2,621,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,427 UART: [art] PUB.X = 1E49562F6AD6AD4496E33E88BEC663F9789873529E22A26BDC6852F625DB60958D7275F65ECD6AAE95407341575A86D6
2,629,195 UART: [art] PUB.Y = B3152B04CB9B213AE36FAAC32586A4A7F32BC05127F8EDA27D0BCD4EC1D8FD906330442462DB1945F2CA923EAF4865DA
2,636,155 UART: [art] SIG.R = EF75A90D6F0AE3D8D3303AA615CD5001B6D2F001693D711DF4D53701402DBE3191337E4F691647BAD636E16A7DCF205B
2,642,916 UART: [art] SIG.S = D9E886C14BED9E83B3AC2386376984144D9A2391F8D77148EE60243AC6C890179A23A72986B67CBF7D847151D15CBC14
2,666,267 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,022 UART: [rt] Runtime listening for mailbox commands...
2,776,412 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,857 ready_for_fw is high
1,056,857 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,948 >>> mbox cmd response: success
2,118,948 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,804 UART:
2,180,820 UART: Running Caliptra FMC ...
2,181,228 UART:
2,181,371 UART: [state] CFI Enabled
2,192,002 UART: [fht] FMC Alias Private Key: 7
2,300,749 UART: [art] Extend RT PCRs Done
2,301,177 UART: [art] Lock RT PCRs Done
2,302,627 UART: [art] Populate DV Done
2,310,986 UART: [fht] FMC Alias Private Key: 7
2,312,102 UART: [art] Derive CDI
2,312,382 UART: [art] Store in in slot 0x4
2,397,829 UART: [art] Derive Key Pair
2,398,189 UART: [art] Store priv key in slot 0x5
2,411,449 UART: [art] Derive Key Pair - Done
2,426,156 UART: [art] Signing Cert with AUTHO
2,426,636 UART: RITY.KEYID = 7
2,441,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,442,491 UART: [art] PUB.X = 99F0C06FC9BDD13AD5B2DD63AF67A5FF99EBCA9A5E5429D7673C47ADD8545BE24B85FAC0CEA3FDAC8F7AB565118D1950
2,449,289 UART: [art] PUB.Y = 70FB326E362D58E03FC2AFD2D21D5C174B6F8C5434164192833507289882AC4F33A80B10CD7E1E46BEDCAF07A0923106
2,456,229 UART: [art] SIG.R = 9810E8348CF2CB51E11BA6270171BFDDF6E108AE6D65CC91B8C270CF19450CBBEC6132BF06897E4323ADB0E9E2A92670
2,462,999 UART: [art] SIG.S = 80EF20B44EDA277F9A5BC80BCA908AA909EE65110EE484E91D3534D98EE4D16C909D0B02C1013A61DC4438AF9FA4074A
2,486,461 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,428 UART: [rt] Runtime listening for mailbox commands...
2,597,818 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,185 UART:
192,547 UART: Running Caliptra ROM ...
193,679 UART:
193,821 UART: [state] CFI Enabled
266,150 UART: [state] LifecycleState = Unprovisioned
268,076 UART: [state] DebugLocked = No
270,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,835 UART: [kat] SHA2-256
444,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,003 UART: [kat] ++
455,480 UART: [kat] sha1
466,133 UART: [kat] SHA2-256
468,855 UART: [kat] SHA2-384
473,774 UART: [kat] SHA2-512-ACC
476,129 UART: [kat] ECC-384
2,766,781 UART: [kat] HMAC-384Kdf
2,779,021 UART: [kat] LMS
3,969,359 UART: [kat] --
3,973,219 UART: [cold-reset] ++
3,974,291 UART: [fht] Storing FHT @ 0x50003400
3,984,983 UART: [idev] ++
3,985,550 UART: [idev] CDI.KEYID = 6
3,986,599 UART: [idev] SUBJECT.KEYID = 7
3,987,767 UART: [idev] UDS.KEYID = 0
3,988,857 ready_for_fw is high
3,989,071 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,084,169 UART: [idev] Erasing UDS.KEYID = 0
7,325,001 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,178 UART: [idev] --
7,352,377 UART: [ldev] ++
7,352,941 UART: [ldev] CDI.KEYID = 6
7,353,872 UART: [ldev] SUBJECT.KEYID = 5
7,355,075 UART: [ldev] AUTHORITY.KEYID = 7
7,356,359 UART: [ldev] FE.KEYID = 1
7,401,434 UART: [ldev] Erasing FE.KEYID = 1
10,737,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,466 UART: [ldev] --
13,116,126 UART: [fwproc] Waiting for Commands...
13,118,477 UART: [fwproc] Received command 0x46574c44
13,120,705 UART: [fwproc] Received Image of size 75428 bytes
16,703,827 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,784,457 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,853,356 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,035,621 >>> mbox cmd response: success
17,036,028 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,039,704 UART: [afmc] ++
17,040,278 UART: [afmc] CDI.KEYID = 6
17,041,295 UART: [afmc] SUBJECT.KEYID = 7
17,042,447 UART: [afmc] AUTHORITY.KEYID = 5
20,405,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,708,280 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,710,534 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,724,903 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,739,746 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,754,260 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,775,619 UART: [afmc] --
22,779,537 UART: [cold-reset] --
22,784,684 UART: [state] Locking Datavault
22,789,705 UART: [state] Locking PCR0, PCR1 and PCR31
22,791,393 UART: [state] Locking ICCM
22,793,538 UART: [exit] Launching FMC @ 0x40000130
22,801,928 UART:
22,802,159 UART: Running Caliptra FMC ...
22,803,254 UART:
22,803,402 UART: [state] CFI Enabled
22,868,585 UART: [fht] FMC Alias Private Key: 7
25,206,410 UART: [art] Extend RT PCRs Done
25,207,627 UART: [art] Lock RT PCRs Done
25,209,326 UART: [art] Populate DV Done
25,214,783 UART: [fht] FMC Alias Private Key: 7
25,216,472 UART: [art] Derive CDI
25,217,201 UART: [art] Store in in slot 0x4
25,277,404 UART: [art] Derive Key Pair
25,278,436 UART: [art] Store priv key in slot 0x5
28,571,176 UART: [art] Derive Key Pair - Done
28,584,166 UART: [art] Signing Cert with AUTHO
28,585,470 UART: RITY.KEYID = 7
30,873,217 UART: [art] Erasing AUTHORITY.KEYID = 7
30,874,725 UART: [art] PUB.X = 52E3DDD0B12E8F112C5D54CE9C5224B17FCEF7A437E604E8E5AC303BC74430200A25DE6942B3305B076A546B6AF6CADA
30,881,944 UART: [art] PUB.Y = B946894782938CF036204021DF4D9CCD7E7336DEC6A1883205B672229AE376B970DC3B4CEC78DEAA1635B49B5AFE5727
30,889,217 UART: [art] SIG.R = EEFAB137900FA8C09D687DB549E5DB81D23BA99DC59ABCA8031F109FB42873AA20D7E83FA7A28CAD85603B3EAB630A25
30,896,636 UART: [art] SIG.S = 316E89114C9020C646BAD2DE9A9FEE22C5905E8F57A2D5521ACAA62B7106B9F05BDA9D588A741A4B3B2AD50063353A26
32,201,023 UART: mock_rt_interact::rt_entry...FMC Tester
32,318,482 UART: [rt] Runtime listening for mailbox commands...
32,322,753 >>> mbox cmd response data (2048 bytes)
32,332,454 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,334,115 >>> mbox cmd response data (336 bytes)
32,337,994 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,353,780 >>> mbox cmd response data (1536 bytes)
34,410,724 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,506,506 UART:
34,506,865 UART: Running Caliptra ROM ...
34,507,993 UART:
34,508,155 UART: [state] CFI Enabled
34,563,926 UART: [state] LifecycleState = Unprovisioned
34,565,903 UART: [state] DebugLocked = No
34,567,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,572,442 UART: [kat] SHA2-256
34,742,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,752,646 UART: [kat] ++
34,753,128 UART: [kat] sha1
34,763,684 UART: [kat] SHA2-256
34,766,379 UART: [kat] SHA2-384
34,772,806 UART: [kat] SHA2-512-ACC
34,775,213 UART: [kat] ECC-384
37,066,439 UART: [kat] HMAC-384Kdf
37,078,517 UART: [kat] LMS
38,268,832 UART: [kat] --
38,273,950 UART: [update-reset] ++
41,929,447 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,933,947 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,180,772 >>> mbox cmd response: success
42,181,271 UART: [update-reset] Copying MAN_2 To MAN_1
42,203,716 UART: [update-reset Success] --
42,209,327 UART: [state] Locking Datavault
42,212,253 UART: [state] Locking PCR0, PCR1 and PCR31
42,214,007 UART: [state] Locking ICCM
42,216,238 UART: [exit] Launching FMC @ 0x40000130
42,224,627 UART:
42,224,851 UART: Running Caliptra FMC ...
42,225,872 UART:
42,226,013 UART: [state] CFI Enabled
42,318,497 UART: [art] Extend RT PCRs Done
42,319,677 UART: [art] Lock RT PCRs Done
42,321,096 UART: [art] Populate DV Done
42,326,713 UART: [fht] FMC Alias Private Key: 7
42,328,374 UART: [art] Derive CDI
42,329,484 UART: [art] Store in in slot 0x4
42,387,090 UART: [art] Derive Key Pair
42,388,147 UART: [art] Store priv key in slot 0x5
45,680,786 UART: [art] Derive Key Pair - Done
45,694,107 UART: [art] Signing Cert with AUTHO
45,695,407 UART: RITY.KEYID = 7
47,982,245 UART: [art] Erasing AUTHORITY.KEYID = 7
47,983,751 UART: [art] PUB.X = 29F5E847E73A6BB42B20669CE4B61141B435C7D9225E72945C73A70D368A76C2E82841F2E6CAFFD28E58DB3456CBC6B5
47,991,005 UART: [art] PUB.Y = EB195FC06365698DBFE2DC219E6AB876EBFA7A8D7677D1CD3AE9A5420796CB5B91873DD5C2B556BCE75C17ED020D442C
47,998,303 UART: [art] SIG.R = 642F89FC7F767BEBA4ED405B006508AA1A3DCBBCEA0CC82AF482028F2DA27F79F72F14A586F010709BBAC0DC09D0DB17
48,005,700 UART: [art] SIG.S = 73A63895AF563CF31635BAFF1F9DF767F29B22179D77252C6F742A7C72EECB73D3F765727067212541ABE23FC501B3F4
49,308,717 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,309,877 UART: mock_rt_interact::rt_entry...FMC Tester
49,599,063 UART: [rt] Runtime listening for mailbox commands...
49,602,012 >>> mbox cmd response data (336 bytes)
49,605,817 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,621,619 >>> mbox cmd response data (1536 bytes)
49,628,930 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,629,521 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,784,237 ready_for_fw is high
3,784,820 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,093,259 >>> mbox cmd response: success
17,093,810 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,777,867 UART:
22,778,262 UART: Running Caliptra FMC ...
22,779,432 UART:
22,779,581 UART: [state] CFI Enabled
22,846,671 UART: [fht] FMC Alias Private Key: 7
25,184,885 UART: [art] Extend RT PCRs Done
25,186,126 UART: [art] Lock RT PCRs Done
25,187,775 UART: [art] Populate DV Done
25,192,963 UART: [fht] FMC Alias Private Key: 7
25,194,561 UART: [art] Derive CDI
25,195,375 UART: [art] Store in in slot 0x4
25,255,357 UART: [art] Derive Key Pair
25,256,396 UART: [art] Store priv key in slot 0x5
28,549,018 UART: [art] Derive Key Pair - Done
28,561,694 UART: [art] Signing Cert with AUTHO
28,562,991 UART: RITY.KEYID = 7
30,851,580 UART: [art] Erasing AUTHORITY.KEYID = 7
30,853,081 UART: [art] PUB.X = E45AFA33F65372F5BB4A44E6576824C19EF19EC4E4ECFCB16B53E366144595590A63D628F67FF246DAAE3317EBB54346
30,860,354 UART: [art] PUB.Y = 0B35D88F6D38B0FA99C44B4F65E933E813A4C6D0477D774BA0B65D8AF107C4F905238E4A93F439DAEBB4E225E86A88BA
30,867,603 UART: [art] SIG.R = E611A150D883498904229A6EEC3184E1553F7C2BBF41ED13F1271AE6C3A96BBB13C993B2D848D0C89C863E4CF6B1B4FB
30,874,989 UART: [art] SIG.S = BB27C64E8D43AEC145FD747DE18D89698EA63DAFD2EAE3A249A251EBFED19B165228108D0F5458F37851B4DD6B202814
32,179,977 UART: mock_rt_interact::rt_entry...FMC Tester
32,297,360 UART: [rt] Runtime listening for mailbox commands...
32,301,646 >>> mbox cmd response data (2048 bytes)
32,311,321 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,312,981 >>> mbox cmd response data (336 bytes)
32,316,722 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,332,528 >>> mbox cmd response data (1536 bytes)
34,391,515 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,250,971 >>> mbox cmd response: success
42,286,266 UART:
42,286,603 UART: Running Caliptra FMC ...
42,287,647 UART:
42,287,808 UART: [state] CFI Enabled
42,381,028 UART: [art] Extend RT PCRs Done
42,382,223 UART: [art] Lock RT PCRs Done
42,383,568 UART: [art] Populate DV Done
42,389,203 UART: [fht] FMC Alias Private Key: 7
42,390,852 UART: [art] Derive CDI
42,391,586 UART: [art] Store in in slot 0x4
42,450,251 UART: [art] Derive Key Pair
42,451,291 UART: [art] Store priv key in slot 0x5
45,743,734 UART: [art] Derive Key Pair - Done
45,756,478 UART: [art] Signing Cert with AUTHO
45,757,781 UART: RITY.KEYID = 7
48,044,932 UART: [art] Erasing AUTHORITY.KEYID = 7
48,046,452 UART: [art] PUB.X = 31BB66E02488509684B15920DFC7EFB6F98CA9EBD95C1333C9F54B5B3E26EEAA2AE595F48C153304D4953128E35E0125
48,053,697 UART: [art] PUB.Y = C5037A49502B760457414B7E0A8DE223AD32F815529EF80BB269704082C5415F7C4C58794824B1071B5EFD69D2CFE5CD
48,060,907 UART: [art] SIG.R = C479BC8D1D072FBB973E904366615E92F07DEA859E1AC44F588FB5400E20215B81A88A3CF1E99912149C0C9ACF2F4037
48,068,292 UART: [art] SIG.S = E2F5748CB82BE669B9480BD158E94F05F3153D9E2843622ADE2CD8F26316E081F1E9D9E0AEAEA6A87BF21335F365E094
49,371,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,372,984 UART: mock_rt_interact::rt_entry...FMC Tester
49,662,491 UART: [rt] Runtime listening for mailbox commands...
49,665,414 >>> mbox cmd response data (336 bytes)
49,669,390 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,685,203 >>> mbox cmd response data (1536 bytes)
49,692,927 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,693,362 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,524 UART:
192,880 UART: Running Caliptra ROM ...
194,184 UART:
603,798 UART: [state] CFI Enabled
614,460 UART: [state] LifecycleState = Unprovisioned
616,349 UART: [state] DebugLocked = No
618,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,857 UART: [kat] SHA2-256
793,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,117 UART: [kat] ++
804,589 UART: [kat] sha1
816,175 UART: [kat] SHA2-256
818,826 UART: [kat] SHA2-384
823,110 UART: [kat] SHA2-512-ACC
825,481 UART: [kat] ECC-384
3,110,387 UART: [kat] HMAC-384Kdf
3,122,336 UART: [kat] LMS
4,312,470 UART: [kat] --
4,317,482 UART: [cold-reset] ++
4,319,059 UART: [fht] Storing FHT @ 0x50003400
4,330,753 UART: [idev] ++
4,331,317 UART: [idev] CDI.KEYID = 6
4,332,349 UART: [idev] SUBJECT.KEYID = 7
4,333,525 UART: [idev] UDS.KEYID = 0
4,334,607 ready_for_fw is high
4,334,811 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,429,803 UART: [idev] Erasing UDS.KEYID = 0
7,622,782 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,478 UART: [idev] --
7,648,109 UART: [ldev] ++
7,648,685 UART: [ldev] CDI.KEYID = 6
7,649,650 UART: [ldev] SUBJECT.KEYID = 5
7,650,866 UART: [ldev] AUTHORITY.KEYID = 7
7,652,095 UART: [ldev] FE.KEYID = 1
7,661,607 UART: [ldev] Erasing FE.KEYID = 1
10,951,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,004 UART: [ldev] --
13,313,716 UART: [fwproc] Waiting for Commands...
13,316,842 UART: [fwproc] Received command 0x46574c44
13,319,077 UART: [fwproc] Received Image of size 75428 bytes
16,891,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,962,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,031,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,212,772 >>> mbox cmd response: success
17,213,159 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,217,480 UART: [afmc] ++
17,218,057 UART: [afmc] CDI.KEYID = 6
17,218,937 UART: [afmc] SUBJECT.KEYID = 7
17,220,204 UART: [afmc] AUTHORITY.KEYID = 5
20,531,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,823,579 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,825,894 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,840,264 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,855,080 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,869,546 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,889,985 UART: [afmc] --
22,893,792 UART: [cold-reset] --
22,897,264 UART: [state] Locking Datavault
22,902,664 UART: [state] Locking PCR0, PCR1 and PCR31
22,904,409 UART: [state] Locking ICCM
22,905,827 UART: [exit] Launching FMC @ 0x40000130
22,914,211 UART:
22,914,481 UART: Running Caliptra FMC ...
22,915,508 UART:
22,915,654 UART: [state] CFI Enabled
22,923,751 UART: [fht] FMC Alias Private Key: 7
25,254,049 UART: [art] Extend RT PCRs Done
25,255,274 UART: [art] Lock RT PCRs Done
25,256,938 UART: [art] Populate DV Done
25,262,569 UART: [fht] FMC Alias Private Key: 7
25,264,101 UART: [art] Derive CDI
25,264,831 UART: [art] Store in in slot 0x4
25,307,909 UART: [art] Derive Key Pair
25,309,109 UART: [art] Store priv key in slot 0x5
28,551,161 UART: [art] Derive Key Pair - Done
28,564,164 UART: [art] Signing Cert with AUTHO
28,565,458 UART: RITY.KEYID = 7
30,844,894 UART: [art] Erasing AUTHORITY.KEYID = 7
30,846,402 UART: [art] PUB.X = 7922BCBB39479D1480BD16C98DAC6DEB771ACD6C6149B07E6187D81D150E96743F3A4AEB8FB4639BE5C6A742FA1D0644
30,853,646 UART: [art] PUB.Y = DC34794DB2255C75DC8FECE48207DAEE96E92437D3EDDBD593A6D35CF5AAA4126C16C472E768AE9CE8590D192A408042
30,860,897 UART: [art] SIG.R = 1EAF7410D25A4FBD15FF8CD8E0C3750E3B2313605DA262A0E965B2729537ED037AF915F68053CBF944467C5BC05ED8F1
30,868,252 UART: [art] SIG.S = 57B2AC984E8754576FF01B4A1CEF71B5AE126DD822C2D2A9B73CD62729921DCFF85A18638B6C581E6F71165B76EB0AA0
32,173,332 UART: mock_rt_interact::rt_entry...FMC Tester
32,290,501 UART: [rt] Runtime listening for mailbox commands...
32,294,749 >>> mbox cmd response data (2048 bytes)
32,304,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,306,169 >>> mbox cmd response data (336 bytes)
32,309,933 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,325,746 >>> mbox cmd response data (1536 bytes)
34,387,617 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,483,421 UART:
34,483,780 UART: Running Caliptra ROM ...
34,484,825 UART:
34,485,083 UART: [state] CFI Enabled
34,502,334 UART: [state] LifecycleState = Unprovisioned
34,504,271 UART: [state] DebugLocked = No
34,507,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,512,849 UART: [kat] SHA2-256
34,682,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,693,098 UART: [kat] ++
34,693,608 UART: [kat] sha1
34,705,246 UART: [kat] SHA2-256
34,707,934 UART: [kat] SHA2-384
34,713,649 UART: [kat] SHA2-512-ACC
34,715,993 UART: [kat] ECC-384
37,000,970 UART: [kat] HMAC-384Kdf
37,012,087 UART: [kat] LMS
38,202,120 UART: [kat] --
38,206,618 UART: [update-reset] ++
41,875,435 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,879,097 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,125,960 >>> mbox cmd response: success
42,126,743 UART: [update-reset] Copying MAN_2 To MAN_1
42,149,183 UART: [update-reset Success] --
42,154,871 UART: [state] Locking Datavault
42,158,440 UART: [state] Locking PCR0, PCR1 and PCR31
42,160,142 UART: [state] Locking ICCM
42,162,319 UART: [exit] Launching FMC @ 0x40000130
42,170,707 UART:
42,170,939 UART: Running Caliptra FMC ...
42,171,962 UART:
42,172,106 UART: [state] CFI Enabled
42,215,740 UART: [art] Extend RT PCRs Done
42,216,920 UART: [art] Lock RT PCRs Done
42,218,233 UART: [art] Populate DV Done
42,223,910 UART: [fht] FMC Alias Private Key: 7
42,225,446 UART: [art] Derive CDI
42,226,509 UART: [art] Store in in slot 0x4
42,268,889 UART: [art] Derive Key Pair
42,269,932 UART: [art] Store priv key in slot 0x5
45,511,564 UART: [art] Derive Key Pair - Done
45,524,513 UART: [art] Signing Cert with AUTHO
45,525,823 UART: RITY.KEYID = 7
47,805,198 UART: [art] Erasing AUTHORITY.KEYID = 7
47,806,696 UART: [art] PUB.X = 5B9F665E69EA70B2449D43AD6A3A42E62004F1DADB6F6FC009E5D996D62EB936A27ABEBD89DB5DBDBF43E18DC9AD916E
47,813,987 UART: [art] PUB.Y = D6F97B4AF9A4C0C7B7797A0402A04F6EB07E4E95EF9A40DFF8B1467918EB44A3F7CE021E7C43868D2FCAB63CE87B8FE6
47,821,252 UART: [art] SIG.R = 219A7487A244CAE2D868887F2FA3D3152F3B18D1DA1826706951AF6F7189ABA94758DEC4894899E225820177813699F7
47,828,566 UART: [art] SIG.S = 18DB94FE10671B633D6EAC1BBF1883A1BCAF9B1B44984FCE4BF68DA932F28A76A6F9C3CD494B80DDD72AD09B07D4D7C5
49,132,189 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,133,309 UART: mock_rt_interact::rt_entry...FMC Tester
49,423,677 UART: [rt] Runtime listening for mailbox commands...
49,426,598 >>> mbox cmd response data (336 bytes)
49,430,455 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,446,267 >>> mbox cmd response data (1536 bytes)
49,453,601 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,453,999 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,129,184 ready_for_fw is high
4,129,607 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,279,311 >>> mbox cmd response: success
17,280,077 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,916,265 UART:
22,916,658 UART: Running Caliptra FMC ...
22,917,890 UART:
22,918,060 UART: [state] CFI Enabled
22,925,886 UART: [fht] FMC Alias Private Key: 7
25,257,103 UART: [art] Extend RT PCRs Done
25,258,349 UART: [art] Lock RT PCRs Done
25,259,923 UART: [art] Populate DV Done
25,265,180 UART: [fht] FMC Alias Private Key: 7
25,266,838 UART: [art] Derive CDI
25,267,657 UART: [art] Store in in slot 0x4
25,310,038 UART: [art] Derive Key Pair
25,311,083 UART: [art] Store priv key in slot 0x5
28,553,642 UART: [art] Derive Key Pair - Done
28,566,666 UART: [art] Signing Cert with AUTHO
28,567,976 UART: RITY.KEYID = 7
30,847,202 UART: [art] Erasing AUTHORITY.KEYID = 7
30,848,712 UART: [art] PUB.X = EA43334092F87D74A1008EBDBC4358263F7B3AD7239B5E131874A4AC3EDE14A34D96298DACB533CB26A524DF0023C516
30,855,904 UART: [art] PUB.Y = 671A95F7ECB1BAB4FB85A19E7DA2932E0A4C15C97A4EF7AB146B3B9A1CD379E8042A48F6A4CCF75B9034B87D529140F3
30,863,208 UART: [art] SIG.R = 09004463BEF3784A72D7D5D202D634172DD60D3025D4420F6EC34A9F5B838C3652DCE0410EABA05DD67916CC8A4FE521
30,870,564 UART: [art] SIG.S = 0926CCECE0F2AEBF3AED30A24C8BB628B4C7A9F12863C74E1572606E092727A327EACEE35D57D7ECDED09070DF088D58
32,175,426 UART: mock_rt_interact::rt_entry...FMC Tester
32,292,652 UART: [rt] Runtime listening for mailbox commands...
32,296,882 >>> mbox cmd response data (2048 bytes)
32,306,550 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,308,214 >>> mbox cmd response data (336 bytes)
32,312,094 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,327,900 >>> mbox cmd response data (1536 bytes)
34,384,096 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,213,829 >>> mbox cmd response: success
42,248,352 UART:
42,248,641 UART: Running Caliptra FMC ...
42,249,925 UART:
42,250,109 UART: [state] CFI Enabled
42,293,458 UART: [art] Extend RT PCRs Done
42,294,609 UART: [art] Lock RT PCRs Done
42,296,097 UART: [art] Populate DV Done
42,301,301 UART: [fht] FMC Alias Private Key: 7
42,302,945 UART: [art] Derive CDI
42,303,767 UART: [art] Store in in slot 0x4
42,346,035 UART: [art] Derive Key Pair
42,347,099 UART: [art] Store priv key in slot 0x5
45,589,084 UART: [art] Derive Key Pair - Done
45,602,095 UART: [art] Signing Cert with AUTHO
45,603,399 UART: RITY.KEYID = 7
47,883,419 UART: [art] Erasing AUTHORITY.KEYID = 7
47,884,936 UART: [art] PUB.X = 9EE430831CF2166C079B2CAC4ED5F6623D5DB9807A5A2F93D84E93CAA1940856279F00A6FFA223BA01E0CA2122D3F5DF
47,892,192 UART: [art] PUB.Y = 50A692D90B15ED1863B059B3899DFB02BD5152E2005A2E78287B0FF2C983DDB3695582F50ABFD6B39C2D00462CDCD429
47,899,409 UART: [art] SIG.R = 0105305807551E11CC697413EA4CCB0AAE8DDD9E6892647CEF4C1E108E50FB511B985AB0A6A4614F85B840981514CA46
47,906,805 UART: [art] SIG.S = B288BA711F2B84467CCD771CDFE628EE5CFBD3E2F3AF6B135398A999A0D8E4186EA4035FFCF3C1305FF4F60B287D1505
49,210,779 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,211,953 UART: mock_rt_interact::rt_entry...FMC Tester
49,503,448 UART: [rt] Runtime listening for mailbox commands...
49,506,374 >>> mbox cmd response data (336 bytes)
49,510,178 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,525,992 >>> mbox cmd response data (1536 bytes)
49,533,780 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,534,235 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,947 writing to cptra_bootfsm_go
193,165 UART:
193,531 UART: Running Caliptra ROM ...
194,621 UART:
194,759 UART: [state] CFI Enabled
263,706 UART: [state] LifecycleState = Unprovisioned
265,619 UART: [state] DebugLocked = No
266,848 UART: [state] WD Timer not started. Device not locked for debugging
269,812 UART: [kat] SHA2-256
448,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,529 UART: [kat] ++
460,971 UART: [kat] sha1
471,053 UART: [kat] SHA2-256
474,065 UART: [kat] SHA2-384
479,985 UART: [kat] SHA2-512-ACC
482,960 UART: [kat] ECC-384
2,927,189 UART: [kat] HMAC-384Kdf
2,949,883 UART: [kat] LMS
3,479,354 UART: [kat] --
3,483,810 UART: [cold-reset] ++
3,485,459 UART: [fht] FHT @ 0x50003400
3,496,500 UART: [idev] ++
3,497,068 UART: [idev] CDI.KEYID = 6
3,497,995 UART: [idev] SUBJECT.KEYID = 7
3,499,105 UART: [idev] UDS.KEYID = 0
3,500,083 ready_for_fw is high
3,500,292 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,595,315 UART: [idev] Erasing UDS.KEYID = 0
6,003,397 UART: [idev] Sha1 KeyId Algorithm
6,026,112 UART: [idev] --
6,030,812 UART: [ldev] ++
6,031,393 UART: [ldev] CDI.KEYID = 6
6,032,302 UART: [ldev] SUBJECT.KEYID = 5
6,033,467 UART: [ldev] AUTHORITY.KEYID = 7
6,034,720 UART: [ldev] FE.KEYID = 1
6,077,711 UART: [ldev] Erasing FE.KEYID = 1
8,577,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,954 UART: [ldev] --
10,371,380 UART: [fwproc] Wait for Commands...
10,374,288 UART: [fwproc] Recv command 0x46574c44
10,376,380 UART: [fwproc] Recv'd Img size: 75384 bytes
13,296,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,372,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,440,968 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,622,214 >>> mbox cmd response: success
13,622,632 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,625,898 UART: [afmc] ++
13,626,475 UART: [afmc] CDI.KEYID = 6
13,627,538 UART: [afmc] SUBJECT.KEYID = 7
13,628,641 UART: [afmc] AUTHORITY.KEYID = 5
16,168,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,893,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,895,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,911,695 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,927,695 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,943,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,967,850 UART: [afmc] --
17,971,448 UART: [cold-reset] --
17,975,575 UART: [state] Locking Datavault
17,980,060 UART: [state] Locking PCR0, PCR1 and PCR31
17,981,704 UART: [state] Locking ICCM
17,983,282 UART: [exit] Launching FMC @ 0x40000130
17,991,693 UART:
17,991,926 UART: Running Caliptra FMC ...
17,992,959 UART:
17,993,105 UART: [state] CFI Enabled
18,049,928 UART: [fht] FMC Alias Private Key: 7
19,813,900 UART: [art] Extend RT PCRs Done
19,815,124 UART: [art] Lock RT PCRs Done
19,816,488 UART: [art] Populate DV Done
19,822,013 UART: [fht] FMC Alias Private Key: 7
19,823,605 UART: [art] Derive CDI
19,824,418 UART: [art] Store in in slot 0x4
19,882,983 UART: [art] Derive Key Pair
19,884,040 UART: [art] Store priv key in slot 0x5
22,346,882 UART: [art] Derive Key Pair - Done
22,359,989 UART: [art] Signing Cert with AUTHO
22,361,285 UART: RITY.KEYID = 7
24,072,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,074,396 UART: [art] PUB.X = 31879CC6BD03264FF48F5AAA4EE28F7B6D65908056C1B59455A9ED29C095A7DE7C052CC73CD899DDE1516BF4C7625584
24,081,673 UART: [art] PUB.Y = 4A7B02F8122D1B6F62E0001A892D330E3E293F5EDE0B724D67D975DFE5EF01A127C83010B37C9B326C0478331E1263EA
24,088,933 UART: [art] SIG.R = F84BC2B3CF5C89015E2FEB216D778754FFE73717F19F8779459A9CDFC27E1AC79AE06E9F34063A6E2A4BBAECD65699C1
24,096,283 UART: [art] SIG.S = 8F150B7D37A7367FBEBFD74465B6A9F5CE9C0C58C0390EE11DB049077E24B2FE023B0184AA5469D3B9BBDB7B539D5FA0
25,074,541 UART: mock_rt_interact::rt_entry...FMC Tester
25,191,199 UART: [rt] Runtime listening for mailbox commands...
25,195,478 >>> mbox cmd response data (2048 bytes)
25,205,368 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,207,063 >>> mbox cmd response data (336 bytes)
25,210,966 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,226,768 >>> mbox cmd response data (1536 bytes)
27,296,885 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,392,564 UART:
27,392,911 UART: Running Caliptra ROM ...
27,394,050 UART:
27,394,230 UART: [state] CFI Enabled
27,463,767 UART: [state] LifecycleState = Unprovisioned
27,465,706 UART: [state] DebugLocked = No
27,467,101 UART: [state] WD Timer not started. Device not locked for debugging
27,471,262 UART: [kat] SHA2-256
27,650,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,661,992 UART: [kat] ++
27,662,448 UART: [kat] sha1
27,673,433 UART: [kat] SHA2-256
27,676,448 UART: [kat] SHA2-384
27,684,172 UART: [kat] SHA2-512-ACC
27,687,096 UART: [kat] ECC-384
30,148,803 UART: [kat] HMAC-384Kdf
30,170,388 UART: [kat] LMS
30,699,859 UART: [kat] --
30,703,940 UART: [update-reset] ++
33,652,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,656,215 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
33,902,833 >>> mbox cmd response: success
33,903,231 UART: [update-reset] Copying MAN_2 To MAN_1
33,925,375 UART: [update-reset Success] --
33,929,591 UART: [state] Locking Datavault
33,933,658 UART: [state] Locking PCR0, PCR1 and PCR31
33,935,360 UART: [state] Locking ICCM
33,936,669 UART: [exit] Launching FMC @ 0x40000130
33,945,114 UART:
33,945,358 UART: Running Caliptra FMC ...
33,946,375 UART:
33,946,537 UART: [state] CFI Enabled
34,043,725 UART: [art] Extend RT PCRs Done
34,044,909 UART: [art] Lock RT PCRs Done
34,046,235 UART: [art] Populate DV Done
34,051,594 UART: [fht] FMC Alias Private Key: 7
34,053,292 UART: [art] Derive CDI
34,054,024 UART: [art] Store in in slot 0x4
34,112,692 UART: [art] Derive Key Pair
34,113,727 UART: [art] Store priv key in slot 0x5
36,576,964 UART: [art] Derive Key Pair - Done
36,589,975 UART: [art] Signing Cert with AUTHO
36,591,298 UART: RITY.KEYID = 7
38,302,321 UART: [art] Erasing AUTHORITY.KEYID = 7
38,303,836 UART: [art] PUB.X = C304BBB7F713A341FCA77CC4715C4CE4652421425E4C6CA7092B52CB49D7F15A887E644738F9FF339FC48D780BA4F534
38,311,068 UART: [art] PUB.Y = FE2EC569CD66F954E35CC3932019F2889E7C749789C5672E355F4CA8DBC1B6E25CA2B8C4951B991CC1EAFFB172DC81F9
38,318,339 UART: [art] SIG.R = 04E2B774713F3A4EDCFC93C886A236CA3378B2B81D49BE76EC0D9015E80CF5585CB7D34271C8952BB6E2B5F13CB0576F
38,325,771 UART: [art] SIG.S = 27CC069E786746CAC46E4860EBBB6D3CF1D4C791FFAF0907AFA86BF7743820A898987815ACE6DBD23C9A913040D918ED
39,302,637 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,303,629 UART: mock_rt_interact::rt_entry...FMC Tester
39,590,758 UART: [rt] Runtime listening for mailbox commands...
39,593,742 >>> mbox cmd response data (336 bytes)
39,597,808 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,613,587 >>> mbox cmd response data (1536 bytes)
39,620,941 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,621,347 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,385,738 ready_for_fw is high
3,386,664 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,467,308 >>> mbox cmd response: success
13,468,070 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,761,269 UART:
17,761,656 UART: Running Caliptra FMC ...
17,762,852 UART:
17,763,002 UART: [state] CFI Enabled
17,833,223 UART: [fht] FMC Alias Private Key: 7
19,597,228 UART: [art] Extend RT PCRs Done
19,598,965 UART: [art] Lock RT PCRs Done
19,600,140 UART: [art] Populate DV Done
19,605,463 UART: [fht] FMC Alias Private Key: 7
19,606,960 UART: [art] Derive CDI
19,607,727 UART: [art] Store in in slot 0x4
19,666,167 UART: [art] Derive Key Pair
19,667,209 UART: [art] Store priv key in slot 0x5
22,130,285 UART: [art] Derive Key Pair - Done
22,143,132 UART: [art] Signing Cert with AUTHO
22,144,445 UART: RITY.KEYID = 7
23,856,286 UART: [art] Erasing AUTHORITY.KEYID = 7
23,857,789 UART: [art] PUB.X = 8435A38D1FE806E349947BD4B07766CEEC88C420C60E785CA40BCD043877D93049540BE7DDB7B983B6D4D9338D8E5E2C
23,865,081 UART: [art] PUB.Y = 642065D1114BED5B43F578B313CE5C74AB38A4CA4DA1F51B2D716B09A4D7D943849880788EFD15677DF5174371638239
23,872,295 UART: [art] SIG.R = 65BF60FFB111C74FB54E14F954AE05E5E99DA141116C3753C7C463A6E11778B5ECABB53B8574C0B01EB35C5F2C9C591B
23,879,669 UART: [art] SIG.S = 2A5A8EE15BA0E250A750E8401BBEC1B1AAE3B0C7E0FE8229643C6BC8BE5D7B3DAF5E481285C11C38CE7548FEB9A86A53
24,858,833 UART: mock_rt_interact::rt_entry...FMC Tester
24,976,718 UART: [rt] Runtime listening for mailbox commands...
24,980,989 >>> mbox cmd response data (2048 bytes)
24,990,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,992,421 >>> mbox cmd response data (336 bytes)
24,996,357 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,012,163 >>> mbox cmd response data (1536 bytes)
27,068,953 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
33,533,875 >>> mbox cmd response: success
33,570,525 UART:
33,570,848 UART: Running Caliptra FMC ...
33,571,976 UART:
33,572,135 UART: [state] CFI Enabled
33,675,914 UART: [art] Extend RT PCRs Done
33,677,107 UART: [art] Lock RT PCRs Done
33,678,274 UART: [art] Populate DV Done
33,683,743 UART: [fht] FMC Alias Private Key: 7
33,685,440 UART: [art] Derive CDI
33,686,259 UART: [art] Store in in slot 0x4
33,744,997 UART: [art] Derive Key Pair
33,746,038 UART: [art] Store priv key in slot 0x5
36,208,704 UART: [art] Derive Key Pair - Done
36,221,927 UART: [art] Signing Cert with AUTHO
36,223,225 UART: RITY.KEYID = 7
37,933,828 UART: [art] Erasing AUTHORITY.KEYID = 7
37,935,336 UART: [art] PUB.X = 7DE5E60B28B24BF4E6074080BEC3740A623EA184C0A2013450BAD9D507B5DB99F3C80DAF78B721316D0161345529FB60
37,942,614 UART: [art] PUB.Y = 64342F0188C23208887AFCF7B70748609BB62C46FE72A1E62D2E8D022B33350C5A037DD0CB7CBDEE120AE011121BBBFA
37,949,871 UART: [art] SIG.R = E61CA1460664A8A2589E7CEB5E1C53C515DD5D2E42F0FF0DB1C0AF3C628B6DE02CDED117DFD644461C1F9D82E0721C5A
37,957,274 UART: [art] SIG.S = AD70AE7BC373C7F605FE0AC24A4D736050F84D25C8DCA4724217981FD3F8BCEB909824CCE638479B7C1B5086F4B2EDE8
38,935,088 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,936,151 UART: mock_rt_interact::rt_entry...FMC Tester
39,215,882 UART: [rt] Runtime listening for mailbox commands...
39,218,851 >>> mbox cmd response data (336 bytes)
39,222,638 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,238,448 >>> mbox cmd response data (1536 bytes)
39,245,763 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,246,161 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,317 UART:
192,673 UART: Running Caliptra ROM ...
193,851 UART:
603,340 UART: [state] CFI Enabled
619,993 UART: [state] LifecycleState = Unprovisioned
621,866 UART: [state] DebugLocked = No
623,681 UART: [state] WD Timer not started. Device not locked for debugging
626,576 UART: [kat] SHA2-256
805,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,253 UART: [kat] ++
817,787 UART: [kat] sha1
829,439 UART: [kat] SHA2-256
832,437 UART: [kat] SHA2-384
838,061 UART: [kat] SHA2-512-ACC
841,079 UART: [kat] ECC-384
3,284,011 UART: [kat] HMAC-384Kdf
3,296,464 UART: [kat] LMS
3,825,944 UART: [kat] --
3,831,522 UART: [cold-reset] ++
3,832,769 UART: [fht] FHT @ 0x50003400
3,844,480 UART: [idev] ++
3,845,043 UART: [idev] CDI.KEYID = 6
3,845,946 UART: [idev] SUBJECT.KEYID = 7
3,847,116 UART: [idev] UDS.KEYID = 0
3,848,156 ready_for_fw is high
3,848,347 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,943,093 UART: [idev] Erasing UDS.KEYID = 0
6,320,205 UART: [idev] Sha1 KeyId Algorithm
6,342,998 UART: [idev] --
6,346,612 UART: [ldev] ++
6,347,177 UART: [ldev] CDI.KEYID = 6
6,348,076 UART: [ldev] SUBJECT.KEYID = 5
6,349,229 UART: [ldev] AUTHORITY.KEYID = 7
6,350,507 UART: [ldev] FE.KEYID = 1
6,361,093 UART: [ldev] Erasing FE.KEYID = 1
8,834,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,587 UART: [ldev] --
10,625,088 UART: [fwproc] Wait for Commands...
10,628,205 UART: [fwproc] Recv command 0x46574c44
10,630,301 UART: [fwproc] Recv'd Img size: 75384 bytes
13,559,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,630,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,699,208 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,880,906 >>> mbox cmd response: success
13,881,337 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,884,750 UART: [afmc] ++
13,885,324 UART: [afmc] CDI.KEYID = 6
13,886,252 UART: [afmc] SUBJECT.KEYID = 7
13,887,413 UART: [afmc] AUTHORITY.KEYID = 5
16,385,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,106,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,108,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,124,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,140,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,155,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,177,056 UART: [afmc] --
18,180,324 UART: [cold-reset] --
18,185,368 UART: [state] Locking Datavault
18,190,392 UART: [state] Locking PCR0, PCR1 and PCR31
18,192,084 UART: [state] Locking ICCM
18,194,553 UART: [exit] Launching FMC @ 0x40000130
18,202,999 UART:
18,203,238 UART: Running Caliptra FMC ...
18,204,359 UART:
18,204,516 UART: [state] CFI Enabled
18,212,619 UART: [fht] FMC Alias Private Key: 7
19,968,844 UART: [art] Extend RT PCRs Done
19,970,060 UART: [art] Lock RT PCRs Done
19,971,682 UART: [art] Populate DV Done
19,977,464 UART: [fht] FMC Alias Private Key: 7
19,978,995 UART: [art] Derive CDI
19,979,749 UART: [art] Store in in slot 0x4
20,022,670 UART: [art] Derive Key Pair
20,023,705 UART: [art] Store priv key in slot 0x5
22,450,213 UART: [art] Derive Key Pair - Done
22,463,421 UART: [art] Signing Cert with AUTHO
22,464,722 UART: RITY.KEYID = 7
24,169,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,171,603 UART: [art] PUB.X = 24495A705C61763FEFDF9645FB56D33E6CF003C98AB80081627E5D7ADD6267323D17FED5E87617651CFF2542AD7D7503
24,178,437 UART: [art] PUB.Y = F1B48A3E5A60AE2E227BBA27F480675F040E494C59E20136F79D5868DB5BF47B710A137134592DA51B1363A42E11C0D3
24,185,620 UART: [art] SIG.R = 0B1CEDF0E76A0F2DFF5A63BB4D22E29EBED77D16B7BC3E8B7ADFE76E9E2FC0A15DA0097A978A66CB183DA4DFC959DCC6
24,193,068 UART: [art] SIG.S = E35326DC17929A2650DD916CAC360E61F3B00F6E0F02AFA5E4DD8B91EBCB7E5CF53092426742878BF611981AD6CD6A6A
25,172,215 UART: mock_rt_interact::rt_entry...FMC Tester
25,289,423 UART: [rt] Runtime listening for mailbox commands...
25,293,650 >>> mbox cmd response data (2048 bytes)
25,303,422 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,305,111 >>> mbox cmd response data (336 bytes)
25,309,031 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,324,855 >>> mbox cmd response data (1536 bytes)
27,387,703 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,483,410 UART:
27,483,799 UART: Running Caliptra ROM ...
27,484,877 UART:
27,485,032 UART: [state] CFI Enabled
27,498,768 UART: [state] LifecycleState = Unprovisioned
27,500,608 UART: [state] DebugLocked = No
27,502,321 UART: [state] WD Timer not started. Device not locked for debugging
27,506,698 UART: [kat] SHA2-256
27,685,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,697,482 UART: [kat] ++
27,698,027 UART: [kat] sha1
27,708,543 UART: [kat] SHA2-256
27,711,548 UART: [kat] SHA2-384
27,716,774 UART: [kat] SHA2-512-ACC
27,719,710 UART: [kat] ECC-384
30,160,107 UART: [kat] HMAC-384Kdf
30,172,524 UART: [kat] LMS
30,702,057 UART: [kat] --
30,705,682 UART: [update-reset] ++
33,652,908 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,656,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
33,903,522 >>> mbox cmd response: success
33,905,427 UART: [update-reset] Copying MAN_2 To MAN_1
33,927,760 UART: [update-reset Success] --
33,932,137 UART: [state] Locking Datavault
33,935,283 UART: [state] Locking PCR0, PCR1 and PCR31
33,936,930 UART: [state] Locking ICCM
33,938,048 UART: [exit] Launching FMC @ 0x40000130
33,946,448 UART:
33,946,684 UART: Running Caliptra FMC ...
33,947,785 UART:
33,947,940 UART: [state] CFI Enabled
33,991,626 UART: [art] Extend RT PCRs Done
33,992,820 UART: [art] Lock RT PCRs Done
33,994,225 UART: [art] Populate DV Done
33,999,525 UART: [fht] FMC Alias Private Key: 7
34,001,110 UART: [art] Derive CDI
34,001,931 UART: [art] Store in in slot 0x4
34,044,311 UART: [art] Derive Key Pair
34,045,310 UART: [art] Store priv key in slot 0x5
36,472,093 UART: [art] Derive Key Pair - Done
36,485,002 UART: [art] Signing Cert with AUTHO
36,486,320 UART: RITY.KEYID = 7
38,191,051 UART: [art] Erasing AUTHORITY.KEYID = 7
38,192,547 UART: [art] PUB.X = 9220F85D61B645D8036D7DAEB56756EFCB0D2611E0FC3A9F7A0F181B167964DA5C802E6AD4441F5DFA31381078EBD04F
38,199,831 UART: [art] PUB.Y = 216294916FF95F7D9A04A6658A8E05900D04867DFB9549446309584F78EFC9E1AA49DA59A4624480033E2F786A310326
38,207,045 UART: [art] SIG.R = 5E937E22C2A04C5B4BF4BE6DFF0B65F8A21964798A6AF3318525E2562F297742909A6133FA5266CE9AAA96F68E77467B
38,214,464 UART: [art] SIG.S = CDC99825212E740A12A21A9E979DCC12A3F0233CDD4CA77DC8A95891C6192065FEEA2DAB97E608005562AEAAD7B32832
39,191,622 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,192,934 UART: mock_rt_interact::rt_entry...FMC Tester
39,483,296 UART: [rt] Runtime listening for mailbox commands...
39,486,279 >>> mbox cmd response data (336 bytes)
39,489,981 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,505,779 >>> mbox cmd response data (1536 bytes)
39,513,277 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,513,708 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,697,062 ready_for_fw is high
3,697,537 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,647,536 >>> mbox cmd response: success
13,648,255 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,899,032 UART:
17,899,430 UART: Running Caliptra FMC ...
17,900,699 UART:
17,900,877 UART: [state] CFI Enabled
17,909,031 UART: [fht] FMC Alias Private Key: 7
19,666,017 UART: [art] Extend RT PCRs Done
19,667,233 UART: [art] Lock RT PCRs Done
19,668,910 UART: [art] Populate DV Done
19,674,476 UART: [fht] FMC Alias Private Key: 7
19,676,175 UART: [art] Derive CDI
19,676,988 UART: [art] Store in in slot 0x4
19,719,204 UART: [art] Derive Key Pair
19,720,196 UART: [art] Store priv key in slot 0x5
22,147,648 UART: [art] Derive Key Pair - Done
22,160,760 UART: [art] Signing Cert with AUTHO
22,162,075 UART: RITY.KEYID = 7
23,867,561 UART: [art] Erasing AUTHORITY.KEYID = 7
23,869,072 UART: [art] PUB.X = B24CF2344C39872C8063581D70570EA19F75ABC0921524AF8C41655761D9BE41A109611384B556FD4FD9529637B38D18
23,876,273 UART: [art] PUB.Y = CC615B61BF17F6188129360CC8EB60F3B5BE672AC449AEE971278816CF9328459C465752439D1811C9F93D39C0C0A64B
23,883,533 UART: [art] SIG.R = 2BC0AF842D7C30E68A3956046B3EAD43431CE0BBD8F2895C7D6E4FC095980AEFEEE42A8A35873DCA486939921B5B3003
23,890,976 UART: [art] SIG.S = D4CB0A42E9228D07668171CCFAB035B2D5C3E64B4B6ACF277FEBE7EC44EFA06671477D2DA6E097C32EFFEA3ED8155622
24,869,531 UART: mock_rt_interact::rt_entry...FMC Tester
24,985,967 UART: [rt] Runtime listening for mailbox commands...
24,990,192 >>> mbox cmd response data (2048 bytes)
24,999,871 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,001,546 >>> mbox cmd response data (336 bytes)
25,005,448 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,021,236 >>> mbox cmd response data (1536 bytes)
27,082,468 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
33,458,510 >>> mbox cmd response: success
33,492,639 UART:
33,492,970 UART: Running Caliptra FMC ...
33,494,103 UART:
33,494,273 UART: [state] CFI Enabled
33,538,134 UART: [art] Extend RT PCRs Done
33,539,279 UART: [art] Lock RT PCRs Done
33,540,757 UART: [art] Populate DV Done
33,545,953 UART: [fht] FMC Alias Private Key: 7
33,547,703 UART: [art] Derive CDI
33,548,516 UART: [art] Store in in slot 0x4
33,591,404 UART: [art] Derive Key Pair
33,592,444 UART: [art] Store priv key in slot 0x5
36,018,888 UART: [art] Derive Key Pair - Done
36,031,637 UART: [art] Signing Cert with AUTHO
36,032,955 UART: RITY.KEYID = 7
37,738,071 UART: [art] Erasing AUTHORITY.KEYID = 7
37,739,585 UART: [art] PUB.X = 3CA296BE21A0D72C6CDF181CF1196DCAA451874906C1357F2C7389492A6092AB039DF73B6E749E11A0E325FB53BCE339
37,746,817 UART: [art] PUB.Y = D0BBB6C8C8E47EB5B0003B129ACF1B77BBEA80D50096166E6B171584A833B8F9FADEADFD6A77E1D7F04A0DEF20B2D063
37,754,076 UART: [art] SIG.R = AEF1001DAD9981357258E7C596353393D727C449643E4D1A2E148A306CFEF10604D5CA2AD2F3AEF3EFA20C28F49D5AB0
37,761,441 UART: [art] SIG.S = 9C91CFC0583F69838C33F0E3209C8029024FE1BA9413A9EF0786BEB5558FFC0D813B845A3814B7A5735160EE2C99EFE7
38,739,358 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,740,436 UART: mock_rt_interact::rt_entry...FMC Tester
39,027,351 UART: [rt] Runtime listening for mailbox commands...
39,030,341 >>> mbox cmd response data (336 bytes)
39,034,001 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,049,811 >>> mbox cmd response data (1536 bytes)
39,057,127 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,057,523 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
191,977 UART:
192,334 UART: Running Caliptra ROM ...
193,520 UART:
193,692 UART: [state] CFI Enabled
264,209 UART: [state] LifecycleState = Unprovisioned
266,548 UART: [state] DebugLocked = No
267,725 UART: [state] WD Timer not started. Device not locked for debugging
272,187 UART: [kat] SHA2-256
462,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,803 UART: [kat] ++
473,287 UART: [kat] sha1
484,153 UART: [kat] SHA2-256
487,152 UART: [kat] SHA2-384
492,994 UART: [kat] SHA2-512-ACC
495,573 UART: [kat] ECC-384
2,949,281 UART: [kat] HMAC-384Kdf
2,971,801 UART: [kat] LMS
3,503,618 UART: [kat] --
3,506,141 UART: [cold-reset] ++
3,507,450 UART: [fht] FHT @ 0x50003400
3,517,928 UART: [idev] ++
3,518,571 UART: [idev] CDI.KEYID = 6
3,519,603 UART: [idev] SUBJECT.KEYID = 7
3,520,777 UART: [idev] UDS.KEYID = 0
3,521,702 ready_for_fw is high
3,521,900 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,616,912 UART: [idev] Erasing UDS.KEYID = 0
6,027,672 UART: [idev] Sha1 KeyId Algorithm
6,049,388 UART: [idev] --
6,054,223 UART: [ldev] ++
6,054,920 UART: [ldev] CDI.KEYID = 6
6,055,999 UART: [ldev] SUBJECT.KEYID = 5
6,057,105 UART: [ldev] AUTHORITY.KEYID = 7
6,058,278 UART: [ldev] FE.KEYID = 1
6,101,109 UART: [ldev] Erasing FE.KEYID = 1
8,610,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,225 UART: [ldev] --
10,413,863 UART: [fwproc] Wait for Commands...
10,416,608 UART: [fwproc] Recv command 0x46574c44
10,418,912 UART: [fwproc] Recv'd Img size: 75384 bytes
13,385,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,464,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,580,697 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,890,169 >>> mbox cmd response: success
13,890,610 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,893,692 UART: [afmc] ++
13,894,386 UART: [afmc] CDI.KEYID = 6
13,895,587 UART: [afmc] SUBJECT.KEYID = 7
13,897,017 UART: [afmc] AUTHORITY.KEYID = 5
16,427,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,167,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,168,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,184,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,199,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,214,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,236,463 UART: [afmc] --
18,240,544 UART: [cold-reset] --
18,246,514 UART: [state] Locking Datavault
18,252,839 UART: [state] Locking PCR0, PCR1 and PCR31
18,255,026 UART: [state] Locking ICCM
18,256,743 UART: [exit] Launching FMC @ 0x40000130
18,265,372 UART:
18,265,607 UART: Running Caliptra FMC ...
18,266,647 UART:
18,266,795 UART: [state] CFI Enabled
18,325,479 UART: [fht] FMC Alias Private Key: 7
20,090,297 UART: [art] Extend RT PCRs Done
20,091,756 UART: [art] Lock RT PCRs Done
20,093,249 UART: [art] Populate DV Done
20,098,529 UART: [fht] FMC Alias Private Key: 7
20,100,067 UART: [art] Derive CDI
20,100,845 UART: [art] Store in in slot 0x4
20,159,444 UART: [art] Derive Key Pair
20,160,510 UART: [art] Store priv key in slot 0x5
22,624,115 UART: [art] Derive Key Pair - Done
22,637,386 UART: [art] Signing Cert with AUTHO
22,638,685 UART: RITY.KEYID = 7
24,349,669 UART: [art] Erasing AUTHORITY.KEYID = 7
24,351,172 UART: [art] PUB.X = 76A2EC93BE8D26D7475F08BF7A163765854B5631B1003C7B91F517C048468C54FB4CEE7943AE27AA53CC07D6086F4622
24,358,395 UART: [art] PUB.Y = 92E01AE9C63AE082788016218A6776578E1CAF56BD2285B34A41C223D01643AF57824127F598FDF00A0D28B1F038ABE4
24,365,681 UART: [art] SIG.R = A20E904EAB51D51AC28193899827E2E87BF6BC50FF625076D0F10EE8621E067A8927358F4F956B44A975A89C5D7B8B4E
24,373,031 UART: [art] SIG.S = 6EF44497BE1D1F3FCD5801038A3ED200F962DF28067A40ACBB29E8A3AA66F2E49B29C72ED1E7FBD32937DE34DA9A7256
25,350,988 UART: mock_rt_interact::rt_entry...FMC Tester
25,468,349 UART: [rt] Runtime listening for mailbox commands...
25,472,631 >>> mbox cmd response data (2048 bytes)
25,482,576 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,484,285 >>> mbox cmd response data (336 bytes)
25,488,132 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,503,941 >>> mbox cmd response data (1536 bytes)
27,560,608 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,656,490 UART:
27,656,884 UART: Running Caliptra ROM ...
27,657,928 UART:
27,658,077 UART: [state] CFI Enabled
27,718,748 UART: [state] LifecycleState = Unprovisioned
27,720,801 UART: [state] DebugLocked = No
27,722,150 UART: [state] WD Timer not started. Device not locked for debugging
27,727,190 UART: [kat] SHA2-256
27,917,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,927,831 UART: [kat] ++
27,928,371 UART: [kat] sha1
27,940,225 UART: [kat] SHA2-256
27,943,235 UART: [kat] SHA2-384
27,949,059 UART: [kat] SHA2-512-ACC
27,951,630 UART: [kat] ECC-384
30,402,075 UART: [kat] HMAC-384Kdf
30,425,324 UART: [kat] LMS
30,956,890 UART: [kat] --
30,962,780 UART: [update-reset] ++
33,944,149 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,947,682 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
34,321,537 >>> mbox cmd response: success
34,323,433 UART: [update-reset] Copying MAN_2 To MAN_1
34,360,994 UART: [update-reset Success] --
34,364,714 UART: [state] Locking Datavault
34,368,521 UART: [state] Locking PCR0, PCR1 and PCR31
34,370,712 UART: [state] Locking ICCM
34,372,537 UART: [exit] Launching FMC @ 0x40000130
34,381,201 UART:
34,381,435 UART: Running Caliptra FMC ...
34,382,533 UART:
34,382,686 UART: [state] CFI Enabled
34,469,536 UART: [art] Extend RT PCRs Done
34,470,730 UART: [art] Lock RT PCRs Done
34,472,207 UART: [art] Populate DV Done
34,477,451 UART: [fht] FMC Alias Private Key: 7
34,478,985 UART: [art] Derive CDI
34,479,713 UART: [art] Store in in slot 0x4
34,538,308 UART: [art] Derive Key Pair
34,539,345 UART: [art] Store priv key in slot 0x5
37,002,627 UART: [art] Derive Key Pair - Done
37,015,625 UART: [art] Signing Cert with AUTHO
37,016,945 UART: RITY.KEYID = 7
38,728,142 UART: [art] Erasing AUTHORITY.KEYID = 7
38,729,644 UART: [art] PUB.X = E5C83A4106D41FEF64BE7F6175D931706AE1F8DDD1C52E3B7A70E419E026325C62834485FF3EABD13105F60C0371A70A
38,736,872 UART: [art] PUB.Y = E01CDEEE03E921D04584F125FB8406904E8C3C0806B1F499EFAC2D332664F7DAB5CB856A3EECC1D1F646EA875519B26B
38,744,182 UART: [art] SIG.R = BFFDA771619E71FAA8214D054731A207471CEFA3CF5619E65D0787DFC25817BAC185CAC82AF080577525E3D9ED50CD90
38,751,545 UART: [art] SIG.S = 703C252EC374E40065B220280FB9A270DF813B933756CD50228AD5778FB4D5D135834DF3BAD5EDACC1A070A28FE8B685
39,728,706 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,729,688 UART: mock_rt_interact::rt_entry...FMC Tester
40,019,307 UART: [rt] Runtime listening for mailbox commands...
40,022,252 >>> mbox cmd response data (336 bytes)
40,025,994 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,041,784 >>> mbox cmd response data (1536 bytes)
40,049,123 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,049,539 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,441,010 ready_for_fw is high
3,441,388 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,898,063 >>> mbox cmd response: success
13,898,664 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,193,032 UART:
18,193,399 UART: Running Caliptra FMC ...
18,194,574 UART:
18,194,725 UART: [state] CFI Enabled
18,262,906 UART: [fht] FMC Alias Private Key: 7
20,026,141 UART: [art] Extend RT PCRs Done
20,027,388 UART: [art] Lock RT PCRs Done
20,028,932 UART: [art] Populate DV Done
20,034,460 UART: [fht] FMC Alias Private Key: 7
20,036,052 UART: [art] Derive CDI
20,036,792 UART: [art] Store in in slot 0x4
20,095,216 UART: [art] Derive Key Pair
20,096,251 UART: [art] Store priv key in slot 0x5
22,558,928 UART: [art] Derive Key Pair - Done
22,571,974 UART: [art] Signing Cert with AUTHO
22,573,268 UART: RITY.KEYID = 7
24,285,522 UART: [art] Erasing AUTHORITY.KEYID = 7
24,287,022 UART: [art] PUB.X = 412CDD82A905C0281C9BE0D1A54EAE710626C0A8119D51FA16739C601521D2772157197BBBBC6D29F067A8EB06715C56
24,294,279 UART: [art] PUB.Y = ACFBC3E78D9847D89704251D5A4F60BACD87E36C0C3686B02A11F413AE07203F2CACEB9E4E4FD01798E8A58B881E9451
24,301,558 UART: [art] SIG.R = D35F417AB5FFEABB97E1E73C6A6219ABCC56397B38DCD5F3E8A3ABA89D7BA045AB3D639D75896B36E10453949C275297
24,308,923 UART: [art] SIG.S = 81D6F8189C1E8E1B44C9A068D1DA709DB3376852C68DAFAFA77B342EFCFFC744081CD87310D518728AC7CE2697857077
25,287,027 UART: mock_rt_interact::rt_entry...FMC Tester
25,403,705 UART: [rt] Runtime listening for mailbox commands...
25,407,931 >>> mbox cmd response data (2048 bytes)
25,417,792 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,419,506 >>> mbox cmd response data (336 bytes)
25,423,439 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,439,244 >>> mbox cmd response data (1536 bytes)
27,496,190 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,423,374 >>> mbox cmd response: success
34,459,358 UART:
34,459,678 UART: Running Caliptra FMC ...
34,460,806 UART:
34,460,979 UART: [state] CFI Enabled
34,554,698 UART: [art] Extend RT PCRs Done
34,555,884 UART: [art] Lock RT PCRs Done
34,557,381 UART: [art] Populate DV Done
34,563,064 UART: [fht] FMC Alias Private Key: 7
34,564,606 UART: [art] Derive CDI
34,565,420 UART: [art] Store in in slot 0x4
34,623,360 UART: [art] Derive Key Pair
34,624,391 UART: [art] Store priv key in slot 0x5
37,087,792 UART: [art] Derive Key Pair - Done
37,100,576 UART: [art] Signing Cert with AUTHO
37,101,914 UART: RITY.KEYID = 7
38,812,799 UART: [art] Erasing AUTHORITY.KEYID = 7
38,814,303 UART: [art] PUB.X = 5CA1B7643B815F04A12E1A501E6A395D49B1EA74635EE6F7DC0C06BB42C814BC7F609E5E0431685BA09C5BF230A12CB0
38,821,589 UART: [art] PUB.Y = 6E56B674C5E3E8593609EF3F7A0781344E0CA0E89C6B783ECC72891449C70C29530233E6ADA56E0EAE567EBFDB976878
38,828,865 UART: [art] SIG.R = B95A72B77A03BE3C9B8CC5D2102CE50FAA685D12AB404EF11CEC32F65A50A208B1D86E46DAFC8BB28866A719EDB1872B
38,836,291 UART: [art] SIG.S = 6007DD1B5F19335C02F91762AC4688F4ACD551E7AA5ED14036288ADFDAF38184D3818200258153DF05295489E4CD00CA
39,813,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,814,668 UART: mock_rt_interact::rt_entry...FMC Tester
40,101,278 UART: [rt] Runtime listening for mailbox commands...
40,104,259 >>> mbox cmd response data (336 bytes)
40,108,055 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,123,860 >>> mbox cmd response data (1536 bytes)
40,131,448 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,131,871 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,461 UART:
192,817 UART: Running Caliptra ROM ...
193,993 UART:
603,765 UART: [state] CFI Enabled
619,047 UART: [state] LifecycleState = Unprovisioned
621,477 UART: [state] DebugLocked = No
623,424 UART: [state] WD Timer not started. Device not locked for debugging
628,735 UART: [kat] SHA2-256
818,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,439 UART: [kat] ++
829,934 UART: [kat] sha1
841,016 UART: [kat] SHA2-256
844,096 UART: [kat] SHA2-384
849,613 UART: [kat] SHA2-512-ACC
852,259 UART: [kat] ECC-384
3,295,259 UART: [kat] HMAC-384Kdf
3,308,807 UART: [kat] LMS
3,840,682 UART: [kat] --
3,844,602 UART: [cold-reset] ++
3,846,317 UART: [fht] FHT @ 0x50003400
3,858,141 UART: [idev] ++
3,858,772 UART: [idev] CDI.KEYID = 6
3,859,796 UART: [idev] SUBJECT.KEYID = 7
3,860,964 UART: [idev] UDS.KEYID = 0
3,861,881 ready_for_fw is high
3,862,087 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,956,916 UART: [idev] Erasing UDS.KEYID = 0
6,341,962 UART: [idev] Sha1 KeyId Algorithm
6,363,944 UART: [idev] --
6,368,553 UART: [ldev] ++
6,369,266 UART: [ldev] CDI.KEYID = 6
6,370,182 UART: [ldev] SUBJECT.KEYID = 5
6,371,361 UART: [ldev] AUTHORITY.KEYID = 7
6,372,535 UART: [ldev] FE.KEYID = 1
6,382,742 UART: [ldev] Erasing FE.KEYID = 1
8,860,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,911 UART: [ldev] --
10,651,086 UART: [fwproc] Wait for Commands...
10,654,041 UART: [fwproc] Recv command 0x46574c44
10,656,342 UART: [fwproc] Recv'd Img size: 75384 bytes
13,631,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,716,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,832,501 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
14,141,892 >>> mbox cmd response: success
14,142,325 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,146,875 UART: [afmc] ++
14,147,566 UART: [afmc] CDI.KEYID = 6
14,148,799 UART: [afmc] SUBJECT.KEYID = 7
14,150,229 UART: [afmc] AUTHORITY.KEYID = 5
16,655,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,377,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,379,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,394,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,410,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,425,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,449,086 UART: [afmc] --
18,452,937 UART: [cold-reset] --
18,455,670 UART: [state] Locking Datavault
18,462,269 UART: [state] Locking PCR0, PCR1 and PCR31
18,464,412 UART: [state] Locking ICCM
18,466,017 UART: [exit] Launching FMC @ 0x40000130
18,474,630 UART:
18,474,859 UART: Running Caliptra FMC ...
18,475,876 UART:
18,476,018 UART: [state] CFI Enabled
18,484,247 UART: [fht] FMC Alias Private Key: 7
20,240,871 UART: [art] Extend RT PCRs Done
20,242,091 UART: [art] Lock RT PCRs Done
20,243,794 UART: [art] Populate DV Done
20,249,193 UART: [fht] FMC Alias Private Key: 7
20,250,785 UART: [art] Derive CDI
20,251,543 UART: [art] Store in in slot 0x4
20,294,405 UART: [art] Derive Key Pair
20,295,443 UART: [art] Store priv key in slot 0x5
22,722,781 UART: [art] Derive Key Pair - Done
22,735,556 UART: [art] Signing Cert with AUTHO
22,736,866 UART: RITY.KEYID = 7
24,442,285 UART: [art] Erasing AUTHORITY.KEYID = 7
24,443,788 UART: [art] PUB.X = 08B7DEA118AE47F91D45C4983FF2C2CBBC323D6F9F1F5E40A726877AEA434242F0E0D3E03267D824CEDE46058AB1EF84
24,451,059 UART: [art] PUB.Y = C3F0FE75C91A4705A34496B43251318F74CAAE9B0DF2086530AC3A885ED8DA95DE2E994525AC1E51CF62BF2CF40BA28A
24,458,308 UART: [art] SIG.R = 0D7A39D4F670CF3B3A4CEE23627E7B687D699CAFC0A5EE5A20692F95D95E29A8505F3D6FF00D5E0E4F9ED3A678B59B86
24,465,755 UART: [art] SIG.S = 199CE6A8A00A6D745F9651CBC4C4F529AC21153F0BA3F831C54FE8805879E19253D4C99B7A7B59AD45C206AD7F043AAB
25,444,016 UART: mock_rt_interact::rt_entry...FMC Tester
25,561,148 UART: [rt] Runtime listening for mailbox commands...
25,565,424 >>> mbox cmd response data (2048 bytes)
25,575,186 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,576,853 >>> mbox cmd response data (336 bytes)
25,580,729 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,596,544 >>> mbox cmd response data (1536 bytes)
27,650,867 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,746,556 UART:
27,746,912 UART: Running Caliptra ROM ...
27,747,965 UART:
27,748,170 UART: [state] CFI Enabled
27,766,227 UART: [state] LifecycleState = Unprovisioned
27,768,119 UART: [state] DebugLocked = No
27,770,061 UART: [state] WD Timer not started. Device not locked for debugging
27,773,795 UART: [kat] SHA2-256
27,963,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,974,234 UART: [kat] ++
27,974,751 UART: [kat] sha1
27,986,923 UART: [kat] SHA2-256
27,989,953 UART: [kat] SHA2-384
27,995,131 UART: [kat] SHA2-512-ACC
27,997,711 UART: [kat] ECC-384
30,441,372 UART: [kat] HMAC-384Kdf
30,454,983 UART: [kat] LMS
30,986,617 UART: [kat] --
30,991,884 UART: [update-reset] ++
33,979,183 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,983,212 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
34,357,107 >>> mbox cmd response: success
34,358,056 UART: [update-reset] Copying MAN_2 To MAN_1
34,395,626 UART: [update-reset Success] --
34,399,194 UART: [state] Locking Datavault
34,401,428 UART: [state] Locking PCR0, PCR1 and PCR31
34,403,624 UART: [state] Locking ICCM
34,405,180 UART: [exit] Launching FMC @ 0x40000130
34,413,847 UART:
34,414,079 UART: Running Caliptra FMC ...
34,415,205 UART:
34,415,361 UART: [state] CFI Enabled
34,459,705 UART: [art] Extend RT PCRs Done
34,460,890 UART: [art] Lock RT PCRs Done
34,462,506 UART: [art] Populate DV Done
34,468,231 UART: [fht] FMC Alias Private Key: 7
34,469,873 UART: [art] Derive CDI
34,470,682 UART: [art] Store in in slot 0x4
34,513,324 UART: [art] Derive Key Pair
34,514,321 UART: [art] Store priv key in slot 0x5
36,940,822 UART: [art] Derive Key Pair - Done
36,953,826 UART: [art] Signing Cert with AUTHO
36,955,127 UART: RITY.KEYID = 7
38,660,498 UART: [art] Erasing AUTHORITY.KEYID = 7
38,662,008 UART: [art] PUB.X = B3DE46D74517854A050B593B7E868AF6D3CDE4BD22605F3FA3EB07CEACF0DF3D106F6EDC12824BC9FEE8965D1D189713
38,669,293 UART: [art] PUB.Y = 70EBC319B780A68458B09D7CE03386303DD5FFA816FCCCA24B02DF22C127595BAAB8BDF6D6F1D7D5FD991136A0855FB1
38,676,577 UART: [art] SIG.R = 8392379C529F070B4ED0EF4F2F57A31DF8079DFB5BA3488DFB9220DFFD0F953DE7D98DD2F9E729BC448AEC249D69924C
38,683,983 UART: [art] SIG.S = 84C39FD13D9071E58DE16F22CEABCE8B0A9D90829A6A90B7A498986F80D1B8641BBAF461136A636451F8564A43E4E4FB
39,661,392 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,662,561 UART: mock_rt_interact::rt_entry...FMC Tester
39,947,514 UART: [rt] Runtime listening for mailbox commands...
39,950,502 >>> mbox cmd response data (336 bytes)
39,954,303 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,970,074 >>> mbox cmd response data (1536 bytes)
39,977,426 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,977,838 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,750,023 ready_for_fw is high
3,750,657 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,112,282 >>> mbox cmd response: success
14,112,817 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,362,625 UART:
18,362,993 UART: Running Caliptra FMC ...
18,364,258 UART:
18,364,433 UART: [state] CFI Enabled
18,371,828 UART: [fht] FMC Alias Private Key: 7
20,128,935 UART: [art] Extend RT PCRs Done
20,130,152 UART: [art] Lock RT PCRs Done
20,131,942 UART: [art] Populate DV Done
20,137,358 UART: [fht] FMC Alias Private Key: 7
20,138,954 UART: [art] Derive CDI
20,139,768 UART: [art] Store in in slot 0x4
20,182,791 UART: [art] Derive Key Pair
20,183,808 UART: [art] Store priv key in slot 0x5
22,611,015 UART: [art] Derive Key Pair - Done
22,623,850 UART: [art] Signing Cert with AUTHO
22,625,162 UART: RITY.KEYID = 7
24,330,755 UART: [art] Erasing AUTHORITY.KEYID = 7
24,332,249 UART: [art] PUB.X = 188A400950E4BBF2844DFF401B905459EEF70D9018025BA507A7B702F2CCB8334BC5BA1118D1891F338588AA5FA0C8AA
24,339,506 UART: [art] PUB.Y = F9427285DBB7BD1BABBD003042EBA7C245D7B918B258B88460BE036991D2D142B225D1CC86FE3C12521EA6D219978F6B
24,346,759 UART: [art] SIG.R = 0100C08B3C6784BA4F5460B56E34D5517F54681C09A124A3829CBDF9411BFC863A3472063C003F7B0859A22A0A6A05A8
24,354,097 UART: [art] SIG.S = 9009AE274AC334D86590A06847B7A6B7227C5E8C598610B5FAF5A7EBE85D4ED7A6380C6DAC759CDF8CE5C9470D6EC70D
25,332,939 UART: mock_rt_interact::rt_entry...FMC Tester
25,450,659 UART: [rt] Runtime listening for mailbox commands...
25,454,935 >>> mbox cmd response data (2048 bytes)
25,464,618 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,466,270 >>> mbox cmd response data (336 bytes)
25,470,143 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,485,948 >>> mbox cmd response data (1536 bytes)
27,545,032 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,398,155 >>> mbox cmd response: success
34,434,438 UART:
34,434,728 UART: Running Caliptra FMC ...
34,435,846 UART:
34,436,005 UART: [state] CFI Enabled
34,480,412 UART: [art] Extend RT PCRs Done
34,481,596 UART: [art] Lock RT PCRs Done
34,483,010 UART: [art] Populate DV Done
34,488,371 UART: [fht] FMC Alias Private Key: 7
34,490,066 UART: [art] Derive CDI
34,490,881 UART: [art] Store in in slot 0x4
34,534,008 UART: [art] Derive Key Pair
34,535,079 UART: [art] Store priv key in slot 0x5
36,961,894 UART: [art] Derive Key Pair - Done
36,974,741 UART: [art] Signing Cert with AUTHO
36,976,047 UART: RITY.KEYID = 7
38,681,751 UART: [art] Erasing AUTHORITY.KEYID = 7
38,683,243 UART: [art] PUB.X = 0C222438462AA9F061D46B3F353F8114BAF46FE9EB320206F0CC7A9D1C3CACE342050FC37440C1B5793B1A55B3BF79FA
38,690,853 UART: [art] PUB.Y = DFE73AB30EE72F6A488A11081886B76DD8D5784DF02F782434D9DBBA70E871A683E5C3233CEACD1E88673537F79E65CC
38,697,813 UART: [art] SIG.R = A2A1F6688B875478780593C99C09501972821A1546217A3416224C7B1CF9B7062B4AA3F46219C73D72A95F10029D5A90
38,705,141 UART: [art] SIG.S = 1F507C17AE9DAC5D0A0BEC68FDEC503512F9251856AEB045AE5F84757D51CAFD00833945E55C74CFDB520D3D8CCF4B99
39,682,298 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,683,393 UART: mock_rt_interact::rt_entry...FMC Tester
39,972,638 UART: [rt] Runtime listening for mailbox commands...
39,975,573 >>> mbox cmd response data (336 bytes)
39,979,640 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,995,449 >>> mbox cmd response data (1536 bytes)
40,003,217 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,003,656 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,714 UART: [state] LifecycleState = Unprovisioned
86,369 UART: [state] DebugLocked = No
86,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
891,023 UART: [kat] SHA2-256
892,961 UART: [kat] SHA2-384
895,698 UART: [kat] SHA2-512-ACC
897,599 UART: [kat] ECC-384
903,158 UART: [kat] HMAC-384Kdf
907,916 UART: [kat] LMS
1,476,112 UART: [kat] --
1,477,049 UART: [cold-reset] ++
1,477,441 UART: [fht] Storing FHT @ 0x50003400
1,480,078 UART: [idev] ++
1,480,246 UART: [idev] CDI.KEYID = 6
1,480,606 UART: [idev] SUBJECT.KEYID = 7
1,481,030 UART: [idev] UDS.KEYID = 0
1,481,375 ready_for_fw is high
1,481,375 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,860 UART: [idev] Erasing UDS.KEYID = 0
1,505,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,531 UART: [ldev] Erasing FE.KEYID = 1
1,546,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,260 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 75384 bytes
2,439,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,466,983 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,496,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,573,854 >>> mbox cmd response: success
2,573,854 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,574,908 UART: [afmc] ++
2,575,076 UART: [afmc] CDI.KEYID = 6
2,575,438 UART: [afmc] SUBJECT.KEYID = 7
2,575,863 UART: [afmc] AUTHORITY.KEYID = 5
2,611,210 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,627,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,633,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,639,725 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,645,415 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,653,546 UART: [afmc] --
2,654,522 UART: [cold-reset] --
2,655,454 UART: [state] Locking Datavault
2,656,795 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,399 UART: [state] Locking ICCM
2,657,927 UART: [exit] Launching FMC @ 0x40000130
2,663,256 UART:
2,663,272 UART: Running Caliptra FMC ...
2,663,680 UART:
2,663,734 UART: [state] CFI Enabled
2,674,167 UART: [fht] FMC Alias Private Key: 7
2,782,124 UART: [art] Extend RT PCRs Done
2,782,552 UART: [art] Lock RT PCRs Done
2,784,242 UART: [art] Populate DV Done
2,792,535 UART: [fht] FMC Alias Private Key: 7
2,793,491 UART: [art] Derive CDI
2,793,771 UART: [art] Store in in slot 0x4
2,879,600 UART: [art] Derive Key Pair
2,879,960 UART: [art] Store priv key in slot 0x5
2,892,998 UART: [art] Derive Key Pair - Done
2,908,012 UART: [art] Signing Cert with AUTHO
2,908,492 UART: RITY.KEYID = 7
2,923,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,273 UART: [art] PUB.X = 5FB65C5AEA9AB0800EF186F8347B8AB61F730FFADE63DB1B8B0F07BCBFE8A300BB893689A455B64D743A7583C0354EFD
2,931,029 UART: [art] PUB.Y = 7C0F4D0D3F61C70EFEA2A2100E6290B8686128012AF7A4C91907B66DB8FCC876753DF67BF33D45A1F355D3C68FFAF411
2,937,971 UART: [art] SIG.R = 41CDE9FD4F8E1ECB5D631672C79D2FD92CE6F9334DEBEB703644161462AB336F1546864AF091036D2C6AE1A066870B86
2,944,741 UART: [art] SIG.S = 6BE6D7806B6AF3ADF859D8C137BFF59AF0F1BA9FFDFEC62AAE3445FE6E96DE72A6CB886777D9B8576AC6211855C74B3E
2,968,214 UART: mock_rt_interact::rt_entry...FMC Tester
3,075,129 UART: [rt] Runtime listening for mailbox commands...
3,078,519 >>> mbox cmd response data (2048 bytes)
3,078,520 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,079,752 >>> mbox cmd response data (336 bytes)
3,079,753 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,092,344 >>> mbox cmd response data (1536 bytes)
3,092,345 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,092,451 UART:
3,092,467 UART: Running Caliptra ROM ...
3,092,875 UART:
3,092,929 UART: [state] CFI Enabled
3,095,931 UART: [state] LifecycleState = Unprovisioned
3,096,586 UART: [state] DebugLocked = No
3,097,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,098,637 UART: [kat] SHA2-256
3,892,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,896,683 UART: [kat] ++
3,896,835 UART: [kat] sha1
3,901,167 UART: [kat] SHA2-256
3,903,105 UART: [kat] SHA2-384
3,905,844 UART: [kat] SHA2-512-ACC
3,907,744 UART: [kat] ECC-384
3,913,447 UART: [kat] HMAC-384Kdf
3,918,181 UART: [kat] LMS
4,486,377 UART: [kat] --
4,487,148 UART: [update-reset] ++
5,376,114 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,377,386 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,468,840 >>> mbox cmd response: success
5,469,021 UART: [update-reset] Copying MAN_2 To MAN_1
5,477,035 UART: [update-reset Success] --
5,478,288 UART: [state] Locking Datavault
5,479,158 UART: [state] Locking PCR0, PCR1 and PCR31
5,479,762 UART: [state] Locking ICCM
5,480,200 UART: [exit] Launching FMC @ 0x40000130
5,485,529 UART:
5,485,545 UART: Running Caliptra FMC ...
5,485,953 UART:
5,486,007 UART: [state] CFI Enabled
5,575,430 UART: [art] Extend RT PCRs Done
5,575,858 UART: [art] Lock RT PCRs Done
5,576,997 UART: [art] Populate DV Done
5,585,214 UART: [fht] FMC Alias Private Key: 7
5,586,174 UART: [art] Derive CDI
5,586,454 UART: [art] Store in in slot 0x4
5,671,729 UART: [art] Derive Key Pair
5,672,089 UART: [art] Store priv key in slot 0x5
5,685,691 UART: [art] Derive Key Pair - Done
5,700,576 UART: [art] Signing Cert with AUTHO
5,701,056 UART: RITY.KEYID = 7
5,716,372 UART: [art] Erasing AUTHORITY.KEYID = 7
5,717,137 UART: [art] PUB.X = 6052B30B9414FF6D6BB7F0421FE37E6254E334B0D30D4EBA55A8DDE4DF9668195BF75EA868CE529A2C7CB33BADDCDA62
5,723,921 UART: [art] PUB.Y = ACA82F6C8D2C98C0B8B04E3CCDB053EBA1C5FD982C6CF747BB3A1D2E4DFE715C0266AA9A8ABE2EDE6E6DD9BE34B29DAA
5,730,908 UART: [art] SIG.R = 89C3FC65EF049D045ACB40141248B57A9959E7DE2E31C62A7184BFE4C30A9481ACB56ACE27984D98BA29F4C1EFA6E6EF
5,737,685 UART: [art] SIG.S = C5C897C885917A7232A4DD4E204508121626AE9A2D2DCC31365DEF838E0389C19C3018B6206DB63FD441C52949D09D02
5,760,654 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,761,925 UART: mock_rt_interact::rt_entry...FMC Tester
6,041,318 UART: [rt] Runtime listening for mailbox commands...
6,043,353 >>> mbox cmd response data (336 bytes)
6,043,354 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,055,945 >>> mbox cmd response data (1536 bytes)
6,055,946 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,055,963 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,455 ready_for_fw is high
1,362,455 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,606 >>> mbox cmd response: success
2,423,606 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,484,504 UART:
2,484,520 UART: Running Caliptra FMC ...
2,484,928 UART:
2,484,982 UART: [state] CFI Enabled
2,495,377 UART: [fht] FMC Alias Private Key: 7
2,603,436 UART: [art] Extend RT PCRs Done
2,603,864 UART: [art] Lock RT PCRs Done
2,605,816 UART: [art] Populate DV Done
2,614,283 UART: [fht] FMC Alias Private Key: 7
2,615,231 UART: [art] Derive CDI
2,615,511 UART: [art] Store in in slot 0x4
2,701,154 UART: [art] Derive Key Pair
2,701,514 UART: [art] Store priv key in slot 0x5
2,714,254 UART: [art] Derive Key Pair - Done
2,728,900 UART: [art] Signing Cert with AUTHO
2,729,380 UART: RITY.KEYID = 7
2,744,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,817 UART: [art] PUB.X = 4D55BDDCC25197491E4162835E2A4A7EDCE630080B32EA45E282EA86797618F2CF3E256ACE457C3017D487793FD1638D
2,751,583 UART: [art] PUB.Y = 3598FA2386C89A26D1829E2CC5C37A8FE264CA3A75A3F6703431EB088AAC296DF0EFBDA409A2B32796612223AC593651
2,758,531 UART: [art] SIG.R = 591CA70B336EC56D1BC3489E4AAAB957B42B83B999F14ED3DC462FDBBFA8C5856DB4F0E5D95E94EA0D671816ACC74932
2,765,313 UART: [art] SIG.S = F094AF94661C55CFA385F629BCA2335D6056B9F52D3B6EE776B1039220C9F58D42F7F786D2C5CDB6DF07D636F68A84B8
2,789,336 UART: mock_rt_interact::rt_entry...FMC Tester
2,896,448 UART: [rt] Runtime listening for mailbox commands...
2,899,838 >>> mbox cmd response data (2048 bytes)
2,899,839 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,901,071 >>> mbox cmd response data (336 bytes)
2,901,072 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,913,663 >>> mbox cmd response data (1536 bytes)
2,913,664 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,171,565 >>> mbox cmd response: success
5,185,058 UART:
5,185,074 UART: Running Caliptra FMC ...
5,185,482 UART:
5,185,536 UART: [state] CFI Enabled
5,274,243 UART: [art] Extend RT PCRs Done
5,274,671 UART: [art] Lock RT PCRs Done
5,275,710 UART: [art] Populate DV Done
5,283,737 UART: [fht] FMC Alias Private Key: 7
5,284,879 UART: [art] Derive CDI
5,285,159 UART: [art] Store in in slot 0x4
5,370,888 UART: [art] Derive Key Pair
5,371,248 UART: [art] Store priv key in slot 0x5
5,384,196 UART: [art] Derive Key Pair - Done
5,398,889 UART: [art] Signing Cert with AUTHO
5,399,369 UART: RITY.KEYID = 7
5,414,545 UART: [art] Erasing AUTHORITY.KEYID = 7
5,415,310 UART: [art] PUB.X = AB0D092F020701AEFD7FF662B3E25A2F03C61F42E2E25FE6F522F110723371996E4E8978ACE6E8B57F6167F8D3456198
5,422,064 UART: [art] PUB.Y = 14A3163700588A225A1699144CF4C695785512E89E038ED1B8632710B0114F0B65191A0FE01BBC0BBD206D17F5EDE571
5,428,974 UART: [art] SIG.R = 736F77D7B1FE5DE7ED38C8D6AEEDDD00C6700FB4A4959F9A83C657B22DDEB2F7F92F61D9B544655758E05450763FD7BC
5,435,735 UART: [art] SIG.S = 3BB0612D132AB1F317180946D9397097F2A447794393540A973614F8CE183B05F922BD378698982FD38387F72FEBDF31
5,458,332 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,459,407 UART: mock_rt_interact::rt_entry...FMC Tester
5,741,276 UART: [rt] Runtime listening for mailbox commands...
5,743,311 >>> mbox cmd response data (336 bytes)
5,743,312 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,755,903 >>> mbox cmd response data (1536 bytes)
5,755,904 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,755,921 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,570 UART: [fht] Storing FHT @ 0x50003400
1,480,527 UART: [idev] ++
1,480,695 UART: [idev] CDI.KEYID = 6
1,481,055 UART: [idev] SUBJECT.KEYID = 7
1,481,479 UART: [idev] UDS.KEYID = 0
1,481,824 ready_for_fw is high
1,481,824 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,839 UART: [idev] Erasing UDS.KEYID = 0
1,506,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,477 UART: [idev] --
1,516,296 UART: [ldev] ++
1,516,464 UART: [ldev] CDI.KEYID = 6
1,516,827 UART: [ldev] SUBJECT.KEYID = 5
1,517,253 UART: [ldev] AUTHORITY.KEYID = 7
1,517,716 UART: [ldev] FE.KEYID = 1
1,523,240 UART: [ldev] Erasing FE.KEYID = 1
1,548,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,057 UART: [ldev] --
1,588,322 UART: [fwproc] Waiting for Commands...
1,589,069 UART: [fwproc] Received command 0x46574c44
1,589,860 UART: [fwproc] Received Image of size 75384 bytes
2,442,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,470,060 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,499,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,576,849 >>> mbox cmd response: success
2,576,849 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,577,951 UART: [afmc] ++
2,578,119 UART: [afmc] CDI.KEYID = 6
2,578,481 UART: [afmc] SUBJECT.KEYID = 7
2,578,906 UART: [afmc] AUTHORITY.KEYID = 5
2,614,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,630,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,631,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,637,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,643,194 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,648,884 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,656,785 UART: [afmc] --
2,657,795 UART: [cold-reset] --
2,658,535 UART: [state] Locking Datavault
2,659,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,660,404 UART: [state] Locking ICCM
2,660,958 UART: [exit] Launching FMC @ 0x40000130
2,666,287 UART:
2,666,303 UART: Running Caliptra FMC ...
2,666,711 UART:
2,666,854 UART: [state] CFI Enabled
2,677,367 UART: [fht] FMC Alias Private Key: 7
2,785,840 UART: [art] Extend RT PCRs Done
2,786,268 UART: [art] Lock RT PCRs Done
2,787,562 UART: [art] Populate DV Done
2,795,973 UART: [fht] FMC Alias Private Key: 7
2,796,999 UART: [art] Derive CDI
2,797,279 UART: [art] Store in in slot 0x4
2,882,738 UART: [art] Derive Key Pair
2,883,098 UART: [art] Store priv key in slot 0x5
2,896,574 UART: [art] Derive Key Pair - Done
2,911,443 UART: [art] Signing Cert with AUTHO
2,911,923 UART: RITY.KEYID = 7
2,926,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,927,760 UART: [art] PUB.X = 7591E48981F48FEDFCB377D4E81F1A8769EDB7C8C56985F72E7FEF2C0104C92FEAB2E6E56029337355DA63BEF3868EF2
2,934,536 UART: [art] PUB.Y = 7C7207556C205F7EEAAB5D4DF78DD465D57E92B34A88F761C0266FFB7BD996DA6C92D32443F15AD31D4D216248AAE33B
2,941,495 UART: [art] SIG.R = D5B47D205CA815A4BF7237018E2112F339DB0B37B4FA15AB7B1F3AC918F5BA4F9DE04EDF720100CE966C8843CDCE7881
2,948,248 UART: [art] SIG.S = 414EA55E8686E7F0A53790F528FD11E4C6972D3EB408520BEB36B622865C9A0EF259BEDF32FD981106D2B1602E8CD3AD
2,971,475 UART: mock_rt_interact::rt_entry...FMC Tester
3,078,525 UART: [rt] Runtime listening for mailbox commands...
3,081,915 >>> mbox cmd response data (2048 bytes)
3,081,916 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,083,148 >>> mbox cmd response data (336 bytes)
3,083,149 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,095,740 >>> mbox cmd response data (1536 bytes)
3,095,741 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,095,847 UART:
3,095,863 UART: Running Caliptra ROM ...
3,096,271 UART:
3,096,412 UART: [state] CFI Enabled
3,099,188 UART: [state] LifecycleState = Unprovisioned
3,099,843 UART: [state] DebugLocked = No
3,100,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,102,198 UART: [kat] SHA2-256
3,896,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,900,244 UART: [kat] ++
3,900,396 UART: [kat] sha1
3,904,554 UART: [kat] SHA2-256
3,906,492 UART: [kat] SHA2-384
3,909,373 UART: [kat] SHA2-512-ACC
3,911,273 UART: [kat] ECC-384
3,917,120 UART: [kat] HMAC-384Kdf
3,921,648 UART: [kat] LMS
4,489,844 UART: [kat] --
4,490,679 UART: [update-reset] ++
5,380,194 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,381,386 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,472,840 >>> mbox cmd response: success
5,473,189 UART: [update-reset] Copying MAN_2 To MAN_1
5,481,203 UART: [update-reset Success] --
5,482,310 UART: [state] Locking Datavault
5,483,196 UART: [state] Locking PCR0, PCR1 and PCR31
5,483,800 UART: [state] Locking ICCM
5,484,426 UART: [exit] Launching FMC @ 0x40000130
5,489,755 UART:
5,489,771 UART: Running Caliptra FMC ...
5,490,179 UART:
5,490,322 UART: [state] CFI Enabled
5,578,979 UART: [art] Extend RT PCRs Done
5,579,407 UART: [art] Lock RT PCRs Done
5,580,886 UART: [art] Populate DV Done
5,588,849 UART: [fht] FMC Alias Private Key: 7
5,589,919 UART: [art] Derive CDI
5,590,199 UART: [art] Store in in slot 0x4
5,675,520 UART: [art] Derive Key Pair
5,675,880 UART: [art] Store priv key in slot 0x5
5,689,280 UART: [art] Derive Key Pair - Done
5,704,197 UART: [art] Signing Cert with AUTHO
5,704,677 UART: RITY.KEYID = 7
5,720,355 UART: [art] Erasing AUTHORITY.KEYID = 7
5,721,120 UART: [art] PUB.X = BCB80982615B64020358DE91A256FB2667D181C545335F7EE7FF57847E63687BB2D44C66304756950A8E7554F8DDB1F9
5,727,872 UART: [art] PUB.Y = 071AFC1BE9E88D13FDA3107A27959798D2D9AD2EFDC9BD1D4906F05993D176217D8C43583EE0034FCD9FB24439959A31
5,734,819 UART: [art] SIG.R = 88BD7D35652CBA9AB63CFCDB0CD0297CC1EBEEE72B23D7D8E89909F166B17D790BAB837B85760EB446CE1FAC46DC21EF
5,741,603 UART: [art] SIG.S = CFB5E81411292B365294C4A2BE199D9F3396FD0541745056A5B8C701BAEEE1CB4A0D51E6C4C782F6EE13436680649297
5,764,234 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,765,175 UART: mock_rt_interact::rt_entry...FMC Tester
6,046,176 UART: [rt] Runtime listening for mailbox commands...
6,048,211 >>> mbox cmd response data (336 bytes)
6,048,212 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,060,803 >>> mbox cmd response data (1536 bytes)
6,060,804 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,060,821 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,882 ready_for_fw is high
1,362,882 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,424,191 >>> mbox cmd response: success
2,424,191 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,425 UART:
2,485,441 UART: Running Caliptra FMC ...
2,485,849 UART:
2,485,992 UART: [state] CFI Enabled
2,496,345 UART: [fht] FMC Alias Private Key: 7
2,604,164 UART: [art] Extend RT PCRs Done
2,604,592 UART: [art] Lock RT PCRs Done
2,605,786 UART: [art] Populate DV Done
2,614,007 UART: [fht] FMC Alias Private Key: 7
2,615,141 UART: [art] Derive CDI
2,615,421 UART: [art] Store in in slot 0x4
2,701,014 UART: [art] Derive Key Pair
2,701,374 UART: [art] Store priv key in slot 0x5
2,714,696 UART: [art] Derive Key Pair - Done
2,729,485 UART: [art] Signing Cert with AUTHO
2,729,965 UART: RITY.KEYID = 7
2,744,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,745,688 UART: [art] PUB.X = 0392AE4E5C0BC5182EFDC36B0A6F9E7176A69CD77D7261E9D841E176A66D5CFB1CEAC9BF7912CACCE4751B31E820B2A7
2,752,469 UART: [art] PUB.Y = 056BF09126EF52D2B5E2D2162BE3BB652CF93B0D1FB5E318099D6D0D7B94456BA535AC90F0A0E0A5F5BCA82D1FF9B34B
2,759,425 UART: [art] SIG.R = 2DE26E5FBFF5074BB6CD6C33E65E4620380FBD230896517DF8AFDCC16D9B40DA08E8AEEBF9DD3A9BA75F925D424E448D
2,766,207 UART: [art] SIG.S = 6071CD7A41FAF088DA7819940D133E78752B63D20C11C5F4405CBDB3B34C4F8FAEDB920835D4419CA3A4ADB0849F59C2
2,790,039 UART: mock_rt_interact::rt_entry...FMC Tester
2,898,466 UART: [rt] Runtime listening for mailbox commands...
2,901,856 >>> mbox cmd response data (2048 bytes)
2,901,857 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,903,089 >>> mbox cmd response data (336 bytes)
2,903,090 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,915,681 >>> mbox cmd response data (1536 bytes)
2,915,682 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,172,500 >>> mbox cmd response: success
5,185,701 UART:
5,185,717 UART: Running Caliptra FMC ...
5,186,125 UART:
5,186,268 UART: [state] CFI Enabled
5,275,263 UART: [art] Extend RT PCRs Done
5,275,691 UART: [art] Lock RT PCRs Done
5,276,778 UART: [art] Populate DV Done
5,284,985 UART: [fht] FMC Alias Private Key: 7
5,286,001 UART: [art] Derive CDI
5,286,281 UART: [art] Store in in slot 0x4
5,371,878 UART: [art] Derive Key Pair
5,372,238 UART: [art] Store priv key in slot 0x5
5,385,204 UART: [art] Derive Key Pair - Done
5,399,690 UART: [art] Signing Cert with AUTHO
5,400,170 UART: RITY.KEYID = 7
5,415,630 UART: [art] Erasing AUTHORITY.KEYID = 7
5,416,395 UART: [art] PUB.X = B8578C8C9A7E5E42F226B90B00B55F627593918DB33B62ABDC5DC50E006F2F7518ADBB4B35B0617FB94E592478B9387C
5,423,121 UART: [art] PUB.Y = DF862A94482ED0BC06EBC1B95FF96DE7DA8DB2C6C0E7D1013E3F68A2DCF7751B80D7FF2165358FFFA0B94B5AA94E7E12
5,430,089 UART: [art] SIG.R = 3855147DE8881F46712DE9ADC64231BAE536341C7E76FC1AC53C021B24ABB3BE0BE697754E4B13C20B41F0E36503DD1B
5,436,855 UART: [art] SIG.S = A76BE697BB43EB2B1AB7E62F27B62B6B33A2511F970B7C1E98631B3890C4B64B0A2E06499EEA45A5D43F115085952537
5,459,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,460,937 UART: mock_rt_interact::rt_entry...FMC Tester
5,742,193 UART: [rt] Runtime listening for mailbox commands...
5,744,228 >>> mbox cmd response data (336 bytes)
5,744,229 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,756,820 >>> mbox cmd response data (1536 bytes)
5,756,821 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,756,838 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,065 UART: [kat] SHA2-256
904,005 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,667 UART: [cold-reset] ++
1,172,083 UART: [fht] FHT @ 0x50003400
1,174,864 UART: [idev] ++
1,175,032 UART: [idev] CDI.KEYID = 6
1,175,392 UART: [idev] SUBJECT.KEYID = 7
1,175,816 UART: [idev] UDS.KEYID = 0
1,176,161 ready_for_fw is high
1,176,161 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,509 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,639 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,458 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,076 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,573 >>> mbox cmd response: success
2,268,573 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,639 UART: [afmc] ++
2,269,807 UART: [afmc] CDI.KEYID = 6
2,270,169 UART: [afmc] SUBJECT.KEYID = 7
2,270,594 UART: [afmc] AUTHORITY.KEYID = 5
2,306,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,171 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,792 UART: [afmc] --
2,349,708 UART: [cold-reset] --
2,350,556 UART: [state] Locking Datavault
2,351,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,359 UART: [state] Locking ICCM
2,352,821 UART: [exit] Launching FMC @ 0x40000130
2,358,150 UART:
2,358,166 UART: Running Caliptra FMC ...
2,358,574 UART:
2,358,628 UART: [state] CFI Enabled
2,369,441 UART: [fht] FMC Alias Private Key: 7
2,477,196 UART: [art] Extend RT PCRs Done
2,477,624 UART: [art] Lock RT PCRs Done
2,479,432 UART: [art] Populate DV Done
2,487,485 UART: [fht] FMC Alias Private Key: 7
2,488,415 UART: [art] Derive CDI
2,488,695 UART: [art] Store in in slot 0x4
2,574,362 UART: [art] Derive Key Pair
2,574,722 UART: [art] Store priv key in slot 0x5
2,588,242 UART: [art] Derive Key Pair - Done
2,602,858 UART: [art] Signing Cert with AUTHO
2,603,338 UART: RITY.KEYID = 7
2,618,602 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,367 UART: [art] PUB.X = F2BE378872BD5ADDEE4E8DBF8A39A39F405F27EF16C8BBF6A118CB4996274D9ABEC03C756C1397CA19F8E50B2F929972
2,626,152 UART: [art] PUB.Y = 633EFA9394AD77CAF2019422C394C9030414F922B6920F53C93972A97957C2E7D4D85E03C783221E52A5557EC06ECE99
2,633,081 UART: [art] SIG.R = AA727AF9D52745BCF376BC9F1AE0ED762C204EABD680A9B792EB0FF50AFA2D7D9CEA6833FD8FF6810C302B5AA25F667F
2,639,868 UART: [art] SIG.S = 3394E3A9792FF6037714364E14B02C9E7E46C8F45D9DA6920D8EF90513817610CC589AA1D1DEE9F80090C4428C366A5A
2,663,066 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,350 UART: [rt] Runtime listening for mailbox commands...
2,772,740 >>> mbox cmd response data (2048 bytes)
2,772,741 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,773,973 >>> mbox cmd response data (336 bytes)
2,773,974 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,786,565 >>> mbox cmd response data (1536 bytes)
2,786,566 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,786,669 UART:
2,786,685 UART: Running Caliptra ROM ...
2,787,093 UART:
2,787,148 UART: [state] CFI Enabled
2,790,182 UART: [state] LifecycleState = Unprovisioned
2,790,837 UART: [state] DebugLocked = No
2,791,405 UART: [state] WD Timer not started. Device not locked for debugging
2,792,713 UART: [kat] SHA2-256
3,598,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,602,488 UART: [kat] ++
3,602,640 UART: [kat] sha1
3,606,816 UART: [kat] SHA2-256
3,608,756 UART: [kat] SHA2-384
3,611,393 UART: [kat] SHA2-512-ACC
3,613,293 UART: [kat] ECC-384
3,622,828 UART: [kat] HMAC-384Kdf
3,627,572 UART: [kat] LMS
3,875,900 UART: [kat] --
3,876,738 UART: [update-reset] ++
4,743,414 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,551 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,835,953 >>> mbox cmd response: success
4,836,248 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,262 UART: [update-reset Success] --
4,845,059 UART: [state] Locking Datavault
4,845,923 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,527 UART: [state] Locking ICCM
4,847,171 UART: [exit] Launching FMC @ 0x40000130
4,852,500 UART:
4,852,516 UART: Running Caliptra FMC ...
4,852,924 UART:
4,852,978 UART: [state] CFI Enabled
4,941,805 UART: [art] Extend RT PCRs Done
4,942,233 UART: [art] Lock RT PCRs Done
4,943,490 UART: [art] Populate DV Done
4,951,803 UART: [fht] FMC Alias Private Key: 7
4,952,863 UART: [art] Derive CDI
4,953,143 UART: [art] Store in in slot 0x4
5,038,468 UART: [art] Derive Key Pair
5,038,828 UART: [art] Store priv key in slot 0x5
5,052,234 UART: [art] Derive Key Pair - Done
5,066,626 UART: [art] Signing Cert with AUTHO
5,067,106 UART: RITY.KEYID = 7
5,082,358 UART: [art] Erasing AUTHORITY.KEYID = 7
5,083,123 UART: [art] PUB.X = 53E740100BB89A238338A590D3669A908D05D33738716F0104DCF308B62AE9B2B5345BAA3764607CCBFC87BAB648E6A2
5,089,878 UART: [art] PUB.Y = C7DCFF56DB1B92F098BEAAD44DAE84F1743B2B40C6A7310365481114CD6D42E57D32E9C850C971A35B606377F1940491
5,096,826 UART: [art] SIG.R = 78A80F00D4CFDEAB306AC3DFACF67C8AF018A7B2A52A396F28F2AAA4065D65F0D7C7786F6B7FB24C620A9BCB649F9063
5,103,587 UART: [art] SIG.S = 01084AAD5123BCF18DA221282208F9CB6E937A127C4C19E2148EF39847FA2B33E4A9CC2A9279935D9A2F17E4DEA42618
5,126,380 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,373 UART: mock_rt_interact::rt_entry...FMC Tester
5,409,273 UART: [rt] Runtime listening for mailbox commands...
5,411,308 >>> mbox cmd response data (336 bytes)
5,411,309 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,423,900 >>> mbox cmd response data (1536 bytes)
5,423,901 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,423,918 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,853 ready_for_fw is high
1,059,853 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,122,558 >>> mbox cmd response: success
2,122,558 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,184,442 UART:
2,184,458 UART: Running Caliptra FMC ...
2,184,866 UART:
2,184,920 UART: [state] CFI Enabled
2,195,755 UART: [fht] FMC Alias Private Key: 7
2,303,396 UART: [art] Extend RT PCRs Done
2,303,824 UART: [art] Lock RT PCRs Done
2,305,610 UART: [art] Populate DV Done
2,313,797 UART: [fht] FMC Alias Private Key: 7
2,314,769 UART: [art] Derive CDI
2,315,049 UART: [art] Store in in slot 0x4
2,400,724 UART: [art] Derive Key Pair
2,401,084 UART: [art] Store priv key in slot 0x5
2,414,084 UART: [art] Derive Key Pair - Done
2,428,997 UART: [art] Signing Cert with AUTHO
2,429,477 UART: RITY.KEYID = 7
2,444,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,310 UART: [art] PUB.X = 1B26D70F4B1104E6FAB7803B01E777AC24AD00A28CDE56AB9A600A763BC8CB8EE9A636837795D74AAACCA46DCDE6FF76
2,452,068 UART: [art] PUB.Y = 9B6A72AEC4179C7AF5CC6A851187A80C7F6D32B44DF24BC4008BDF439D61895BD8746F866D61838F5BC88ECCBF7CB41B
2,459,009 UART: [art] SIG.R = DA1F4E6701472D8343B57ECE114E085B8B2ED60B856CB0836944F2B7E6F1A094CA296AC9DCC07DDC49B62D496DAA08F1
2,465,781 UART: [art] SIG.S = A144F2F619686893FC17DE3B58B7E61771D0AB34EF0E4E696111B6291EF0A4686B0A150FE131B6EEA9335AFF6510DB74
2,488,825 UART: mock_rt_interact::rt_entry...FMC Tester
2,595,494 UART: [rt] Runtime listening for mailbox commands...
2,598,884 >>> mbox cmd response data (2048 bytes)
2,598,885 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,117 >>> mbox cmd response data (336 bytes)
2,600,118 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,612,709 >>> mbox cmd response data (1536 bytes)
2,612,710 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,545,998 >>> mbox cmd response: success
4,559,480 UART:
4,559,496 UART: Running Caliptra FMC ...
4,559,904 UART:
4,559,958 UART: [state] CFI Enabled
4,649,159 UART: [art] Extend RT PCRs Done
4,649,587 UART: [art] Lock RT PCRs Done
4,650,772 UART: [art] Populate DV Done
4,658,991 UART: [fht] FMC Alias Private Key: 7
4,660,013 UART: [art] Derive CDI
4,660,293 UART: [art] Store in in slot 0x4
4,745,926 UART: [art] Derive Key Pair
4,746,286 UART: [art] Store priv key in slot 0x5
4,759,502 UART: [art] Derive Key Pair - Done
4,774,482 UART: [art] Signing Cert with AUTHO
4,774,962 UART: RITY.KEYID = 7
4,790,410 UART: [art] Erasing AUTHORITY.KEYID = 7
4,791,175 UART: [art] PUB.X = D0BBB77073C800CFF13F5BD606CCA6E597A64B0A73E398023331785D908DF74CF820ABCB8C98BF7299922D6672988CFE
4,797,922 UART: [art] PUB.Y = 6B515F3FF9154E222C5DC5C47BC3676BE3799DB3323449BC911DEB1133E419CDA015578BADC4F4C1F7430D6D53F8DFEA
4,804,883 UART: [art] SIG.R = CA21C8F063E63B53C701BC6FA7EDA636E1C2DF47A39A55DF46C28A293F976CC22D14DAB3F9D1278FB76D9372C61F37CB
4,811,668 UART: [art] SIG.S = 947A0755796118FA87A2B73C09BFD6D12FE0CF1138B440B8607A1A970E9D1570E7DD13805650C93C0DBA80B59CD206A0
4,834,039 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,834,986 UART: mock_rt_interact::rt_entry...FMC Tester
5,118,493 UART: [rt] Runtime listening for mailbox commands...
5,120,528 >>> mbox cmd response data (336 bytes)
5,120,529 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,133,120 >>> mbox cmd response data (1536 bytes)
5,133,121 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,133,138 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
902,242 UART: [kat] SHA2-256
904,182 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,443 UART: [idev] ++
1,175,611 UART: [idev] CDI.KEYID = 6
1,175,971 UART: [idev] SUBJECT.KEYID = 7
1,176,395 UART: [idev] UDS.KEYID = 0
1,176,740 ready_for_fw is high
1,176,740 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,202,034 UART: [idev] Sha1 KeyId Algorithm
1,210,594 UART: [idev] --
1,211,802 UART: [ldev] ++
1,211,970 UART: [ldev] CDI.KEYID = 6
1,212,333 UART: [ldev] SUBJECT.KEYID = 5
1,212,759 UART: [ldev] AUTHORITY.KEYID = 7
1,213,222 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,244,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,476 UART: [ldev] --
1,283,861 UART: [fwproc] Wait for Commands...
1,284,615 UART: [fwproc] Recv command 0x46574c44
1,285,343 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,857 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,366 >>> mbox cmd response: success
2,271,366 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,460 UART: [afmc] ++
2,272,628 UART: [afmc] CDI.KEYID = 6
2,272,990 UART: [afmc] SUBJECT.KEYID = 7
2,273,415 UART: [afmc] AUTHORITY.KEYID = 5
2,309,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,835 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,465 UART: [afmc] --
2,352,419 UART: [cold-reset] --
2,353,231 UART: [state] Locking Datavault
2,354,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,798 UART: [state] Locking ICCM
2,355,472 UART: [exit] Launching FMC @ 0x40000130
2,360,801 UART:
2,360,817 UART: Running Caliptra FMC ...
2,361,225 UART:
2,361,368 UART: [state] CFI Enabled
2,371,879 UART: [fht] FMC Alias Private Key: 7
2,480,684 UART: [art] Extend RT PCRs Done
2,481,112 UART: [art] Lock RT PCRs Done
2,482,624 UART: [art] Populate DV Done
2,490,823 UART: [fht] FMC Alias Private Key: 7
2,491,925 UART: [art] Derive CDI
2,492,205 UART: [art] Store in in slot 0x4
2,577,894 UART: [art] Derive Key Pair
2,578,254 UART: [art] Store priv key in slot 0x5
2,591,522 UART: [art] Derive Key Pair - Done
2,606,604 UART: [art] Signing Cert with AUTHO
2,607,084 UART: RITY.KEYID = 7
2,622,014 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,779 UART: [art] PUB.X = B35F018638D37C5A481732452BC0A99B7C6E595A719A459299C216BCDBFAAF151A806113419C2AD6A76C7EC2396621A1
2,629,546 UART: [art] PUB.Y = 020FB651E5F575E3058333380E2EEFCEC2A43C9CAE7DBAF74AEB4470DD55DB451FE1C045697BEA3100EE51B3C6754554
2,636,476 UART: [art] SIG.R = 1233C809A402FA7B42DEA8B3F21F0E04625E1FB8C92FA523B16818581F2E458EE4850F0E285E96FC2F5CE75FE6F230C3
2,643,236 UART: [art] SIG.S = AE24523C79196510CD0C3295FE29CEB5E95565DD27A73D153F856F137041513CC8CF19C42D454AB0E877117FFF7ED9A7
2,666,600 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,162 UART: [rt] Runtime listening for mailbox commands...
2,776,552 >>> mbox cmd response data (2048 bytes)
2,776,553 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,777,785 >>> mbox cmd response data (336 bytes)
2,777,786 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,377 >>> mbox cmd response data (1536 bytes)
2,790,378 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,481 UART:
2,790,497 UART: Running Caliptra ROM ...
2,790,905 UART:
2,791,047 UART: [state] CFI Enabled
2,794,081 UART: [state] LifecycleState = Unprovisioned
2,794,736 UART: [state] DebugLocked = No
2,795,446 UART: [state] WD Timer not started. Device not locked for debugging
2,796,694 UART: [kat] SHA2-256
3,602,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,606,469 UART: [kat] ++
3,606,621 UART: [kat] sha1
3,610,889 UART: [kat] SHA2-256
3,612,829 UART: [kat] SHA2-384
3,615,528 UART: [kat] SHA2-512-ACC
3,617,428 UART: [kat] ECC-384
3,627,103 UART: [kat] HMAC-384Kdf
3,631,857 UART: [kat] LMS
3,880,185 UART: [kat] --
3,880,955 UART: [update-reset] ++
4,748,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,750,136 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,841,538 >>> mbox cmd response: success
4,841,797 UART: [update-reset] Copying MAN_2 To MAN_1
4,849,811 UART: [update-reset Success] --
4,850,688 UART: [state] Locking Datavault
4,851,602 UART: [state] Locking PCR0, PCR1 and PCR31
4,852,206 UART: [state] Locking ICCM
4,852,830 UART: [exit] Launching FMC @ 0x40000130
4,858,159 UART:
4,858,175 UART: Running Caliptra FMC ...
4,858,583 UART:
4,858,726 UART: [state] CFI Enabled
4,948,215 UART: [art] Extend RT PCRs Done
4,948,643 UART: [art] Lock RT PCRs Done
4,949,870 UART: [art] Populate DV Done
4,958,007 UART: [fht] FMC Alias Private Key: 7
4,959,027 UART: [art] Derive CDI
4,959,307 UART: [art] Store in in slot 0x4
5,044,736 UART: [art] Derive Key Pair
5,045,096 UART: [art] Store priv key in slot 0x5
5,058,482 UART: [art] Derive Key Pair - Done
5,073,012 UART: [art] Signing Cert with AUTHO
5,073,492 UART: RITY.KEYID = 7
5,089,130 UART: [art] Erasing AUTHORITY.KEYID = 7
5,089,895 UART: [art] PUB.X = BEC95164394DADF22F4BCF35B9F501DEF8C829962B8501542C89B157DC973935AA6A7C8394D5A81176274E34EBDCE48D
5,096,667 UART: [art] PUB.Y = 4A1E71F7774ED24BA6F5904CD60B855278575FCA7F0464C34D283221A97301655AF3DABBE57A7C28B0FFABAEA242CC15
5,103,620 UART: [art] SIG.R = BF0094B924C113340FC6E46D3F90748ED7CE88A4E3408951C08B042EA60B8A969942B3C7F6E4A6CC60FBB3C0D6E9F593
5,110,367 UART: [art] SIG.S = 1D299E7E2010DA170D3FE891BDB8417CFF76E4D5FECAD201B0EC3D16995E5A797F0A775AFE8BC3B094FA0A5ADCCE2A7F
5,132,977 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,133,968 UART: mock_rt_interact::rt_entry...FMC Tester
5,415,010 UART: [rt] Runtime listening for mailbox commands...
5,417,045 >>> mbox cmd response data (336 bytes)
5,417,046 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,429,637 >>> mbox cmd response data (1536 bytes)
5,429,638 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,429,655 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 ready_for_fw is high
1,060,866 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,124,581 >>> mbox cmd response: success
2,124,581 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,186,863 UART:
2,186,879 UART: Running Caliptra FMC ...
2,187,287 UART:
2,187,430 UART: [state] CFI Enabled
2,198,315 UART: [fht] FMC Alias Private Key: 7
2,305,850 UART: [art] Extend RT PCRs Done
2,306,278 UART: [art] Lock RT PCRs Done
2,307,534 UART: [art] Populate DV Done
2,315,847 UART: [fht] FMC Alias Private Key: 7
2,316,907 UART: [art] Derive CDI
2,317,187 UART: [art] Store in in slot 0x4
2,402,992 UART: [art] Derive Key Pair
2,403,352 UART: [art] Store priv key in slot 0x5
2,416,648 UART: [art] Derive Key Pair - Done
2,431,415 UART: [art] Signing Cert with AUTHO
2,431,895 UART: RITY.KEYID = 7
2,446,603 UART: [art] Erasing AUTHORITY.KEYID = 7
2,447,368 UART: [art] PUB.X = C6FEB878BAE1811F6FA884E4478929EC92A4FCFAF1D15957067AB5388BFF4B4D8F56E8ED9337E6C360BED7B7E41611DE
2,454,153 UART: [art] PUB.Y = B6C48E15F93DD47D92E8FD38AB3A13F3426901F3FA30595456450F16633EA82D8B94AD99295C97D259253DA1397117A0
2,461,093 UART: [art] SIG.R = F754A9FBCB55A216226131A9CADE4D13D224680A6AB340D0899EF5BDC64C0A4A226B104E386CBC3691754550254C0863
2,467,856 UART: [art] SIG.S = 481BC93D3E7326DFE11E4C89521836BCE898189823A56472545A3D6D673E2FEDF5D025343F2D76DCD9615B4DDE193650
2,492,047 UART: mock_rt_interact::rt_entry...FMC Tester
2,599,373 UART: [rt] Runtime listening for mailbox commands...
2,602,763 >>> mbox cmd response data (2048 bytes)
2,602,764 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,603,996 >>> mbox cmd response data (336 bytes)
2,603,997 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,616,588 >>> mbox cmd response data (1536 bytes)
2,616,589 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,550,000 >>> mbox cmd response: success
4,563,502 UART:
4,563,518 UART: Running Caliptra FMC ...
4,563,926 UART:
4,564,069 UART: [state] CFI Enabled
4,653,236 UART: [art] Extend RT PCRs Done
4,653,664 UART: [art] Lock RT PCRs Done
4,654,997 UART: [art] Populate DV Done
4,663,116 UART: [fht] FMC Alias Private Key: 7
4,664,232 UART: [art] Derive CDI
4,664,512 UART: [art] Store in in slot 0x4
4,749,905 UART: [art] Derive Key Pair
4,750,265 UART: [art] Store priv key in slot 0x5
4,764,033 UART: [art] Derive Key Pair - Done
4,778,521 UART: [art] Signing Cert with AUTHO
4,779,001 UART: RITY.KEYID = 7
4,794,395 UART: [art] Erasing AUTHORITY.KEYID = 7
4,795,160 UART: [art] PUB.X = B085EB4A8EFB946D6F96DB99BCC78B1E81F55D981DE71DF5E1E09EBD4CF3918C448CDD2F6F405BC362744793176F855C
4,801,946 UART: [art] PUB.Y = E1D8FF8A296A1323175795082567956ED0D794FCE7864046C9A306530554D20320B2249271920449C0500F412EF79CAC
4,808,862 UART: [art] SIG.R = 7A6DEBDB3F529A5825325931DEB45E2627D9DA442351DA600C2D98FCDC75F8553D2544EB715DCB4F28FDAB125D813C52
4,815,641 UART: [art] SIG.S = C9FB2CE3D5A7B11DF440318E055BD3B03BC11F4C4D354FD70B127D1CB7F100BB7688C132C49367B182F96CDD2195B98B
4,838,311 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,839,396 UART: mock_rt_interact::rt_entry...FMC Tester
5,118,842 UART: [rt] Runtime listening for mailbox commands...
5,120,877 >>> mbox cmd response data (336 bytes)
5,120,878 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,133,469 >>> mbox cmd response data (1536 bytes)
5,133,470 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,133,487 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 ready_for_fw is high
1,173,975 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,186 UART: [ldev] ++
1,209,354 UART: [ldev] CDI.KEYID = 6
1,209,718 UART: [ldev] SUBJECT.KEYID = 5
1,210,145 UART: [ldev] AUTHORITY.KEYID = 7
1,210,608 UART: [ldev] FE.KEYID = 1
1,215,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,148 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,137 UART: [fwproc] Recv command 0x46574c44
1,281,870 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,439 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,266,757 >>> mbox cmd response: success
2,266,757 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,928 UART: [afmc] ++
2,268,096 UART: [afmc] CDI.KEYID = 6
2,268,459 UART: [afmc] SUBJECT.KEYID = 7
2,268,885 UART: [afmc] AUTHORITY.KEYID = 5
2,304,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,320 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,951 UART: [afmc] --
2,347,875 UART: [cold-reset] --
2,348,807 UART: [state] Locking Datavault
2,349,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,460 UART: [state] Locking ICCM
2,350,998 UART: [exit] Launching FMC @ 0x40000130
2,356,327 UART:
2,356,343 UART: Running Caliptra FMC ...
2,356,751 UART:
2,356,805 UART: [state] CFI Enabled
2,366,848 UART: [fht] FMC Alias Private Key: 7
2,475,429 UART: [art] Extend RT PCRs Done
2,475,857 UART: [art] Lock RT PCRs Done
2,477,479 UART: [art] Populate DV Done
2,485,602 UART: [fht] FMC Alias Private Key: 7
2,486,604 UART: [art] Derive CDI
2,486,884 UART: [art] Store in in slot 0x4
2,572,505 UART: [art] Derive Key Pair
2,572,865 UART: [art] Store priv key in slot 0x5
2,586,049 UART: [art] Derive Key Pair - Done
2,600,635 UART: [art] Signing Cert with AUTHO
2,601,115 UART: RITY.KEYID = 7
2,616,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,616,834 UART: [art] PUB.X = AF92F6577041C27AB84F8A0BAB789AA83B899F16CD8E46F31BB51AF12AEB01EB7C8E99B63F8281BD666D3211285BD7AF
2,623,614 UART: [art] PUB.Y = 51874B3799A369E635BA62FCEA5159C73B32EFC4E502C1BB9BAA2097A1E7FEA06BE5FF070576ED29CBBDBE152E4BD73C
2,630,577 UART: [art] SIG.R = 89D696BCB025D360835628F237D6CEC86975F85995BBCE8192A9F14895C4B13FFC46C951AFB19665FB464888A24EF44F
2,637,349 UART: [art] SIG.S = C724A1F142CC85B50E1DB256C7F3CF018BC3906695E9359E9936C5BBDE6E92DDB908482C32846000AE74F3370E37AB80
2,660,652 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,807 UART: [rt] Runtime listening for mailbox commands...
2,771,197 >>> mbox cmd response data (2048 bytes)
2,771,198 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,772,430 >>> mbox cmd response data (336 bytes)
2,772,431 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,785,022 >>> mbox cmd response data (1536 bytes)
2,785,023 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,785,126 UART:
2,785,142 UART: Running Caliptra ROM ...
2,785,550 UART:
2,785,605 UART: [state] CFI Enabled
2,788,833 UART: [state] LifecycleState = Unprovisioned
2,789,488 UART: [state] DebugLocked = No
2,790,026 UART: [state] WD Timer not started. Device not locked for debugging
2,791,226 UART: [kat] SHA2-256
3,594,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,598,905 UART: [kat] ++
3,599,057 UART: [kat] sha1
3,603,273 UART: [kat] SHA2-256
3,605,213 UART: [kat] SHA2-384
3,608,064 UART: [kat] SHA2-512-ACC
3,609,964 UART: [kat] ECC-384
3,620,159 UART: [kat] HMAC-384Kdf
3,624,935 UART: [kat] LMS
3,873,247 UART: [kat] --
3,874,223 UART: [update-reset] ++
4,740,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,741,708 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,833,110 >>> mbox cmd response: success
4,833,407 UART: [update-reset] Copying MAN_2 To MAN_1
4,841,421 UART: [update-reset Success] --
4,842,544 UART: [state] Locking Datavault
4,843,290 UART: [state] Locking PCR0, PCR1 and PCR31
4,843,894 UART: [state] Locking ICCM
4,844,380 UART: [exit] Launching FMC @ 0x40000130
4,849,709 UART:
4,849,725 UART: Running Caliptra FMC ...
4,850,133 UART:
4,850,187 UART: [state] CFI Enabled
4,938,920 UART: [art] Extend RT PCRs Done
4,939,348 UART: [art] Lock RT PCRs Done
4,940,587 UART: [art] Populate DV Done
4,948,918 UART: [fht] FMC Alias Private Key: 7
4,950,072 UART: [art] Derive CDI
4,950,352 UART: [art] Store in in slot 0x4
5,035,821 UART: [art] Derive Key Pair
5,036,181 UART: [art] Store priv key in slot 0x5
5,049,223 UART: [art] Derive Key Pair - Done
5,064,146 UART: [art] Signing Cert with AUTHO
5,064,626 UART: RITY.KEYID = 7
5,079,718 UART: [art] Erasing AUTHORITY.KEYID = 7
5,080,483 UART: [art] PUB.X = BEECC5B17800964549BF5297390D72FE483BBBE9467FB93736A257065EE4ECCDF2575BC82BBCCDB2CE67E19A32E938E3
5,087,241 UART: [art] PUB.Y = 1B6BF2962FB10AA7F212D9C4F40782BCB96E797E286EC2D59D097BAD888E6C4405E90721CBF1AC5E8EAADD6679863B2D
5,094,192 UART: [art] SIG.R = F13949E910A63CB0D8592858BB23FF88FB334366BB64737BB0230377C1390A35F8CED48CEA90CF8E1700C00CD926A7E1
5,100,935 UART: [art] SIG.S = 7C2CFD9F762337B18ADF64A4F007615584EEB8A8B72E9724DF96ED72E599193517F52EFDED67E826F35FF314D6F9339C
5,123,576 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,124,815 UART: mock_rt_interact::rt_entry...FMC Tester
5,404,167 UART: [rt] Runtime listening for mailbox commands...
5,406,202 >>> mbox cmd response data (336 bytes)
5,406,203 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,418,794 >>> mbox cmd response data (1536 bytes)
5,418,795 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,418,812 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,281 >>> mbox cmd response: success
2,116,281 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,073 UART:
2,178,089 UART: Running Caliptra FMC ...
2,178,497 UART:
2,178,551 UART: [state] CFI Enabled
2,188,756 UART: [fht] FMC Alias Private Key: 7
2,297,123 UART: [art] Extend RT PCRs Done
2,297,551 UART: [art] Lock RT PCRs Done
2,299,367 UART: [art] Populate DV Done
2,307,734 UART: [fht] FMC Alias Private Key: 7
2,308,724 UART: [art] Derive CDI
2,309,004 UART: [art] Store in in slot 0x4
2,394,695 UART: [art] Derive Key Pair
2,395,055 UART: [art] Store priv key in slot 0x5
2,407,817 UART: [art] Derive Key Pair - Done
2,422,465 UART: [art] Signing Cert with AUTHO
2,422,945 UART: RITY.KEYID = 7
2,438,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,154 UART: [art] PUB.X = 1C3D7065DE7C2043B3A3C3861F36C45F9DBE329B2E9F57732003944B700B9CB6570EB5DBBB0E532CA3CE8E3EF9CFF1CE
2,445,930 UART: [art] PUB.Y = 2EEBCFDA3100CF9DB8D5BEA3BD08E5B80AEE07EC879DC2FD025F4E2B653614EAC160B230EB6A77B7E7BE36F81284BCCF
2,452,878 UART: [art] SIG.R = EA24EF9A1DE9CB3416D439F56D5D7D447268F1EB7D2D17CF51F3617EB5AC15984222075612252EC208B0E0263518BC43
2,459,644 UART: [art] SIG.S = 70644C76C0F7D038A4703107B15437D8523C9F3EFD0C3B84B6617D6764D7E4A2589CA22E4EFD752767AA45646A6E31F8
2,482,941 UART: mock_rt_interact::rt_entry...FMC Tester
2,590,085 UART: [rt] Runtime listening for mailbox commands...
2,593,475 >>> mbox cmd response data (2048 bytes)
2,593,476 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,594,708 >>> mbox cmd response data (336 bytes)
2,594,709 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,607,300 >>> mbox cmd response data (1536 bytes)
2,607,301 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,534,130 >>> mbox cmd response: success
4,547,398 UART:
4,547,414 UART: Running Caliptra FMC ...
4,547,822 UART:
4,547,876 UART: [state] CFI Enabled
4,637,021 UART: [art] Extend RT PCRs Done
4,637,449 UART: [art] Lock RT PCRs Done
4,638,730 UART: [art] Populate DV Done
4,647,325 UART: [fht] FMC Alias Private Key: 7
4,648,507 UART: [art] Derive CDI
4,648,787 UART: [art] Store in in slot 0x4
4,734,394 UART: [art] Derive Key Pair
4,734,754 UART: [art] Store priv key in slot 0x5
4,748,104 UART: [art] Derive Key Pair - Done
4,762,645 UART: [art] Signing Cert with AUTHO
4,763,125 UART: RITY.KEYID = 7
4,778,519 UART: [art] Erasing AUTHORITY.KEYID = 7
4,779,284 UART: [art] PUB.X = E4584CA73210DD7B1B3D5459C354FA881738F50DE028DF149261531E961C3CF6F50EED8F528FD0B85329C64C77DCC3AE
4,786,056 UART: [art] PUB.Y = B583CBA397A872C33798BDEBE8D4E712E111A88C5E7B0A54A4FB43AF8C67E0920D75310B6EF18A46D5A7F88FFAFB6F75
4,793,015 UART: [art] SIG.R = 915B2F2F2FBA9CB7427540B5C2AA48F38DDBC27FD3B7A01A9B961731EF01F6C473273F8A35849FDF685025C19A7494E7
4,799,790 UART: [art] SIG.S = 9F2DFF4480441DCEB345232A122E1516410C39D8B638FF83623348CC24F4E88572C4871AE65BFCC514176071FCA9819A
4,822,455 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,823,400 UART: mock_rt_interact::rt_entry...FMC Tester
5,104,101 UART: [rt] Runtime listening for mailbox commands...
5,106,136 >>> mbox cmd response data (336 bytes)
5,106,137 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,118,728 >>> mbox cmd response data (1536 bytes)
5,118,729 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,118,746 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,878 UART: [idev] ++
1,173,046 UART: [idev] CDI.KEYID = 6
1,173,407 UART: [idev] SUBJECT.KEYID = 7
1,173,832 UART: [idev] UDS.KEYID = 0
1,174,178 ready_for_fw is high
1,174,178 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,437 UART: [ldev] --
1,281,737 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,324 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,662 >>> mbox cmd response: success
2,268,662 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,689 UART: [afmc] ++
2,269,857 UART: [afmc] CDI.KEYID = 6
2,270,220 UART: [afmc] SUBJECT.KEYID = 7
2,270,646 UART: [afmc] AUTHORITY.KEYID = 5
2,306,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,078 UART: [afmc] --
2,350,182 UART: [cold-reset] --
2,351,144 UART: [state] Locking Datavault
2,352,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,683 UART: [state] Locking ICCM
2,353,325 UART: [exit] Launching FMC @ 0x40000130
2,358,654 UART:
2,358,670 UART: Running Caliptra FMC ...
2,359,078 UART:
2,359,221 UART: [state] CFI Enabled
2,369,578 UART: [fht] FMC Alias Private Key: 7
2,477,587 UART: [art] Extend RT PCRs Done
2,478,015 UART: [art] Lock RT PCRs Done
2,479,901 UART: [art] Populate DV Done
2,488,238 UART: [fht] FMC Alias Private Key: 7
2,489,412 UART: [art] Derive CDI
2,489,692 UART: [art] Store in in slot 0x4
2,575,287 UART: [art] Derive Key Pair
2,575,647 UART: [art] Store priv key in slot 0x5
2,588,829 UART: [art] Derive Key Pair - Done
2,603,721 UART: [art] Signing Cert with AUTHO
2,604,201 UART: RITY.KEYID = 7
2,619,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,394 UART: [art] PUB.X = 02F0BDEB3363232C4F189AEA250A007DCC4FB5812C7A4142BF350121883285EE63FD56632F81DD72F11B6A18C38877F5
2,627,135 UART: [art] PUB.Y = 8E1E04F50D945564AF4A00615D0BE6F0C8156BFACE70BF8ACCFF80C1FDD36753FA6A305F648E7C7B8AE5937EA86C9240
2,634,072 UART: [art] SIG.R = 6D7C1CE192DCA8B15381AE0C29364E544328EF0392ECA5D6B6B00D9C81878CA766ED72D32B6C7C3288472D54C220A1CF
2,640,841 UART: [art] SIG.S = A20F74E0E3DE648987CEC549C780E8D31A02BBA3A327EBE26837CED712E4A508D6466DB6B81446E9EC596297B0A2044A
2,664,762 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,734 UART: [rt] Runtime listening for mailbox commands...
2,774,124 >>> mbox cmd response data (2048 bytes)
2,774,125 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,357 >>> mbox cmd response data (336 bytes)
2,775,358 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,787,949 >>> mbox cmd response data (1536 bytes)
2,787,950 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,053 UART:
2,788,069 UART: Running Caliptra ROM ...
2,788,477 UART:
2,788,619 UART: [state] CFI Enabled
2,791,267 UART: [state] LifecycleState = Unprovisioned
2,791,922 UART: [state] DebugLocked = No
2,792,646 UART: [state] WD Timer not started. Device not locked for debugging
2,793,940 UART: [kat] SHA2-256
3,597,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,601,619 UART: [kat] ++
3,601,771 UART: [kat] sha1
3,606,215 UART: [kat] SHA2-256
3,608,155 UART: [kat] SHA2-384
3,610,840 UART: [kat] SHA2-512-ACC
3,612,740 UART: [kat] ECC-384
3,622,663 UART: [kat] HMAC-384Kdf
3,627,291 UART: [kat] LMS
3,875,603 UART: [kat] --
3,876,327 UART: [update-reset] ++
4,742,523 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,743,516 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,834,918 >>> mbox cmd response: success
4,835,041 UART: [update-reset] Copying MAN_2 To MAN_1
4,843,055 UART: [update-reset Success] --
4,844,046 UART: [state] Locking Datavault
4,844,884 UART: [state] Locking PCR0, PCR1 and PCR31
4,845,488 UART: [state] Locking ICCM
4,846,078 UART: [exit] Launching FMC @ 0x40000130
4,851,407 UART:
4,851,423 UART: Running Caliptra FMC ...
4,851,831 UART:
4,851,974 UART: [state] CFI Enabled
4,940,945 UART: [art] Extend RT PCRs Done
4,941,373 UART: [art] Lock RT PCRs Done
4,942,604 UART: [art] Populate DV Done
4,950,803 UART: [fht] FMC Alias Private Key: 7
4,951,921 UART: [art] Derive CDI
4,952,201 UART: [art] Store in in slot 0x4
5,038,178 UART: [art] Derive Key Pair
5,038,538 UART: [art] Store priv key in slot 0x5
5,051,782 UART: [art] Derive Key Pair - Done
5,066,538 UART: [art] Signing Cert with AUTHO
5,067,018 UART: RITY.KEYID = 7
5,082,254 UART: [art] Erasing AUTHORITY.KEYID = 7
5,083,019 UART: [art] PUB.X = B2C1A38F45D4DEAEA38A8C69B459643D011C6D7EEF58375AE66C12638391C2956321878EC8E19AABEE30E2A01FAB9D9E
5,089,800 UART: [art] PUB.Y = 51490EF149DF51097041B0BD89E78B35D6CDA324BE7DE9EADE327F2DAB8F9A0D08EF8AF5F0A2890561FE67D2F8146C88
5,096,751 UART: [art] SIG.R = 655528F9624F8E0178F11D9BCEEEDCACEF276B76E14A2D1B3C1AFF19B2070896DD11AF772EF4E9293D427D178D316DDD
5,103,528 UART: [art] SIG.S = 2A29494422D282BB21EE806E134461E44A9565697C9D84468C4603971556CA99A0A2CC146DE9291894348D2DFB27F502
5,126,274 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,323 UART: mock_rt_interact::rt_entry...FMC Tester
5,410,285 UART: [rt] Runtime listening for mailbox commands...
5,412,320 >>> mbox cmd response data (336 bytes)
5,412,321 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,424,912 >>> mbox cmd response data (1536 bytes)
5,424,913 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,424,930 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,611 ready_for_fw is high
1,056,611 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,119,826 >>> mbox cmd response: success
2,119,826 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,926 UART:
2,181,942 UART: Running Caliptra FMC ...
2,182,350 UART:
2,182,493 UART: [state] CFI Enabled
2,193,310 UART: [fht] FMC Alias Private Key: 7
2,302,179 UART: [art] Extend RT PCRs Done
2,302,607 UART: [art] Lock RT PCRs Done
2,303,885 UART: [art] Populate DV Done
2,312,096 UART: [fht] FMC Alias Private Key: 7
2,313,112 UART: [art] Derive CDI
2,313,392 UART: [art] Store in in slot 0x4
2,399,343 UART: [art] Derive Key Pair
2,399,703 UART: [art] Store priv key in slot 0x5
2,413,057 UART: [art] Derive Key Pair - Done
2,427,944 UART: [art] Signing Cert with AUTHO
2,428,424 UART: RITY.KEYID = 7
2,443,758 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,523 UART: [art] PUB.X = 09D0D4A675DBE45B676909667B5FD58DD0A4867DBC77730AEF4DC68017F11EB2758B5A260CE77CEAA0AA2ABC41D007E0
2,451,294 UART: [art] PUB.Y = 803EED98E5DA39B3F88E56EF090EE573A38BB1CE6AE5EE8565D9ADEDEE5EB1A4CD9269387E83EFD2C74F8D934D4ABE0E
2,458,265 UART: [art] SIG.R = 34CA1A73844C1825198832F1B4FA84D8AA2208DBBA99A05D24A9556B8A1CCBCE85749878A0401D922A3F10A04E2094BE
2,465,036 UART: [art] SIG.S = E703DCE93550806A2039238C0A3615CA49240B84313AEE718C8CDDA0959DB898294B4BB326E933A097732C65355118F2
2,488,492 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,120 UART: [rt] Runtime listening for mailbox commands...
2,599,510 >>> mbox cmd response data (2048 bytes)
2,599,511 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,743 >>> mbox cmd response data (336 bytes)
2,600,744 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,613,335 >>> mbox cmd response data (1536 bytes)
2,613,336 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,542,180 >>> mbox cmd response: success
4,555,838 UART:
4,555,854 UART: Running Caliptra FMC ...
4,556,262 UART:
4,556,405 UART: [state] CFI Enabled
4,645,402 UART: [art] Extend RT PCRs Done
4,645,830 UART: [art] Lock RT PCRs Done
4,647,435 UART: [art] Populate DV Done
4,655,716 UART: [fht] FMC Alias Private Key: 7
4,656,860 UART: [art] Derive CDI
4,657,140 UART: [art] Store in in slot 0x4
4,742,743 UART: [art] Derive Key Pair
4,743,103 UART: [art] Store priv key in slot 0x5
4,756,389 UART: [art] Derive Key Pair - Done
4,771,367 UART: [art] Signing Cert with AUTHO
4,771,847 UART: RITY.KEYID = 7
4,786,975 UART: [art] Erasing AUTHORITY.KEYID = 7
4,787,740 UART: [art] PUB.X = BD2C6376333DB884435C8D90865DDCA7CBBCD1379B857C2E3FB988753BFF476577F2F390BC4384D664BED6D204535EF4
4,794,515 UART: [art] PUB.Y = FCAC12B2A9CB12EE220F405EB778C575497E67362D4BD42C62F437AA2A337841E29FD6496B560E0557CC77C5F656CC01
4,801,459 UART: [art] SIG.R = FFE75806337772D0875E65052195E2A2EF6E62CF2EE861C5EB40174AF3A38E4916B6E9DF9CEC385DC5BC71117F2B8FCB
4,808,235 UART: [art] SIG.S = 1ECC67182658CD5C9DC27DC58F74DB6F4C6E47E8F2E612B6539BC640F2113494C7C11DA8D95A8AED55DE073E872F1DA5
4,831,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,832,151 UART: mock_rt_interact::rt_entry...FMC Tester
5,111,805 UART: [rt] Runtime listening for mailbox commands...
5,113,840 >>> mbox cmd response data (336 bytes)
5,113,841 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,126,432 >>> mbox cmd response data (1536 bytes)
5,126,433 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,126,450 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,717 writing to cptra_bootfsm_go
3,138 UART: hii* TESTCASE PASSED
Initializing fuses
862 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,254 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
hii* TESTCASE PASSED
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,262 UART: hii* TESTCASE PASSED
Initializing fuses
875 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,813 writing to cptra_bootfsm_go
3,230 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,201 UART: hii* TESTCASE PASSED
Initializing fuses
868 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,164 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
3,117 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
3,234 UART: hii* TESTCASE PASSED
Initializing fuses
862 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,829 writing to cptra_bootfsm_go
3,133 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,245 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
3,237 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
3,134 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,799 writing to cptra_bootfsm_go
3,199 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,201 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,156 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,144 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,154 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,162 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,213 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,155 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,248 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,144 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,190 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
3,205 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,158 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,035 >>> mbox cmd response data (14 bytes)
35,672 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,342 >>> mbox cmd response data (12 bytes)
36,655 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,002 >>> mbox cmd response data (7 bytes)
37,414 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,723 >>> mbox cmd response data (7 bytes)
38,033 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,381 >>> mbox cmd response data (0 bytes)
38,635 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,906 >>> mbox cmd response: success
39,089 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,427 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,406 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,256 >>> mbox cmd response data (14 bytes)
35,751 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,419 >>> mbox cmd response data (12 bytes)
36,833 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,189 >>> mbox cmd response data (7 bytes)
37,484 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,783 >>> mbox cmd response data (7 bytes)
38,066 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,413 >>> mbox cmd response data (0 bytes)
38,671 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,938 >>> mbox cmd response: success
39,118 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,404 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,653 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,496 >>> mbox cmd response data (14 bytes)
36,130 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,856 >>> mbox cmd response data (12 bytes)
37,176 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,533 >>> mbox cmd response data (7 bytes)
37,830 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,132 >>> mbox cmd response data (7 bytes)
38,434 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,789 >>> mbox cmd response data (0 bytes)
39,036 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,320 >>> mbox cmd response: success
39,536 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,887 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,710 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,543 >>> mbox cmd response data (14 bytes)
36,154 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,817 >>> mbox cmd response data (12 bytes)
37,156 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,517 >>> mbox cmd response data (7 bytes)
37,958 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,285 >>> mbox cmd response data (7 bytes)
38,601 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,019 >>> mbox cmd response data (0 bytes)
39,279 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,556 >>> mbox cmd response: success
39,751 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,097 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,350 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,214 >>> mbox cmd response data (14 bytes)
35,763 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,413 >>> mbox cmd response data (12 bytes)
36,723 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,173 >>> mbox cmd response data (7 bytes)
37,471 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,770 >>> mbox cmd response data (7 bytes)
38,110 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,408 >>> mbox cmd response data (0 bytes)
38,646 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,913 >>> mbox cmd response: success
39,093 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,432 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,381 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,235 >>> mbox cmd response data (14 bytes)
35,746 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,393 >>> mbox cmd response data (12 bytes)
36,747 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,149 >>> mbox cmd response data (7 bytes)
37,436 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,788 >>> mbox cmd response data (7 bytes)
38,635 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,135 >>> mbox cmd response data (0 bytes)
39,388 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,659 >>> mbox cmd response: success
39,841 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,122 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,411 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,241 >>> mbox cmd response data (14 bytes)
35,924 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,591 >>> mbox cmd response data (12 bytes)
36,921 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,282 >>> mbox cmd response data (7 bytes)
37,726 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,098 >>> mbox cmd response data (7 bytes)
38,401 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,889 >>> mbox cmd response data (0 bytes)
39,137 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,411 >>> mbox cmd response: success
39,650 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,998 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,584 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,418 >>> mbox cmd response data (14 bytes)
36,086 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,827 >>> mbox cmd response data (12 bytes)
37,236 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,613 >>> mbox cmd response data (7 bytes)
37,914 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,220 >>> mbox cmd response data (7 bytes)
38,520 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,878 >>> mbox cmd response data (0 bytes)
39,123 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,398 >>> mbox cmd response: success
39,591 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,930 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,133 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
34,957 >>> mbox cmd response data (14 bytes)
35,535 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,204 >>> mbox cmd response data (12 bytes)
36,517 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,863 >>> mbox cmd response data (7 bytes)
37,151 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,449 >>> mbox cmd response data (7 bytes)
37,775 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,126 >>> mbox cmd response data (0 bytes)
38,358 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,629 >>> mbox cmd response: success
38,809 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,092 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,206 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
37,734 >>> mbox cmd response data (14 bytes)
38,348 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
39,069 >>> mbox cmd response data (12 bytes)
39,486 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
39,793 >>> mbox cmd response data (7 bytes)
40,077 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
40,433 >>> mbox cmd response data (7 bytes)
40,735 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
41,087 >>> mbox cmd response data (0 bytes)
41,325 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,595 >>> mbox cmd response: success
41,775 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
42,088 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
5,832 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
37,663 >>> mbox cmd response data (14 bytes)
38,350 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
39,026 >>> mbox cmd response data (12 bytes)
39,361 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
39,767 >>> mbox cmd response data (7 bytes)
40,070 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
40,486 >>> mbox cmd response data (7 bytes)
40,868 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
41,234 >>> mbox cmd response data (0 bytes)
41,480 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,752 >>> mbox cmd response: success
41,942 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
42,236 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,375 writing to cptra_bootfsm_go
4,906 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
36,722 >>> mbox cmd response data (14 bytes)
37,312 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
37,993 >>> mbox cmd response data (12 bytes)
38,318 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
38,723 >>> mbox cmd response data (7 bytes)
39,028 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
40,679 >>> mbox cmd response data (7 bytes)
41,016 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
41,385 >>> mbox cmd response data (0 bytes)
41,631 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,964 >>> mbox cmd response: success
42,154 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
42,491 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,507 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,042 >>> mbox cmd response: success
35,527 UART: |dcfeffff48692121| 37,504 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,022 >>> mbox cmd response: success
|dcfeffff 40,211 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
48692121| 41,017 >>> mbox cmd response: success
|dcfeffff48692121| 43,267 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,712 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,268 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,763 >>> mbox cmd response: success
35,313 UART: |dcfeffff48692121| 37,244 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,764 >>> mbox cmd response: success
|dcfeffff48692121| 40,007 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,468 >>> mbox cmd response: success
|dcfeffff48692121| 42,699 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,136 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,590 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,130 >>> mbox cmd response: success
35,660 UART: |dcfeffff48692121| 37,684 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,305 >>> mbox cmd response: success
|dcfeffff48692121| 40,562 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,079 >>> mbox cmd response: success
|dcfeffff48692121| 43,357 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,905 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,601 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,116 >>> mbox cmd response: success
35,789 UART: |dcfeffff48692121| 37,748 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,353 >>> mbox cmd response: success
|dcfeffff48692121| 40,578 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,105 >>> mbox cmd response: success
|dcfeffff48692121| 43,346 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,865 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,321 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,823 >>> mbox cmd response: success
35,394 UART: |dcfeffff48692121| 37,292 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,808 >>> mbox cmd response: success
|dcfeffff48692121| 40,001 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,453 >>> mbox cmd response: success
|dcfeffff48692121| 42,702 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,144 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,237 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,797 >>> mbox cmd response: success
35,373 UART: |dcfeffff48692121| 37,298 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,820 >>> mbox cmd response: success
|dcfeffff48692121| 40,016 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,466 >>> mbox cmd response: success
|dcfeffff48692121| 42,692 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,181 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,692 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,199 >>> mbox cmd response: success
35,765 UART: |dcfeffff48692121| 37,765 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,374 >>> mbox cmd response: success
|dcfeffff48692121| 41,147 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,729 >>> mbox cmd response: success
|dcfeffff48692121| 43,993 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,476 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,639 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,139 >>> mbox cmd response: success
35,793 UART: |dcfeffff48692121| 37,796 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,370 >>> mbox cmd response: success
|dcfeffff48692121| 40,625 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,113 >>> mbox cmd response: success
|dcfeffff48692121| 43,382 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,895 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,261 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,802 >>> mbox cmd response: success
35,326 UART: |dcfeffff48692121| 37,249 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,754 >>> mbox cmd response: success
|dcfeffff48692121| 39,944 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,386 >>> mbox cmd response: success
|dcfeffff48692121| 42,610 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,045 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,279 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,803 >>> mbox cmd response: success
35,273 UART: |dcfeffff48692121| 37,215 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,724 >>> mbox cmd response: success
|dcfeffff48692121| 39,917 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,431 >>> mbox cmd response: success
|dcfeffff48692121| 42,764 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,268 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,697 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,213 >>> mbox cmd response: success
35,764 UART: |dcfeffff48692121| 37,769 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,352 >>> mbox cmd response: success
|dcfeffff48692121| 40,582 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,100 >>> mbox cmd response: success
|dcfeffff48692121| 43,326 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,879 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,450 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,968 >>> mbox cmd response: success
35,627 UART: |dcfeffff48692121| 37,591 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,199 >>> mbox cmd response: success
|dcfeffff48692121| 40,398 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,977 >>> mbox cmd response: success
|dcfeffff48692121| 43,207 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,726 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,389 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
3,133 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,210 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,180 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,185 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
3,172 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
3,255 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,828 writing to cptra_bootfsm_go
3,144 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,732 writing to cptra_bootfsm_go
3,029 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,202 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
3,243 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,163 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,802 writing to cptra_bootfsm_go
3,214 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,405 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,743 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,242 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,635 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,864 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,229 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,582 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,916 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,495 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,893 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,240 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,593 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,986 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,709 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,015 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,250 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,612 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,252 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,643 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
3,994 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,370 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,984 writing to cptra_bootfsm_go
4,648 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,965 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,149 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,646 >>> mbox cmd response: success
35,155 UART: |dcfeffff48692121| 37,080 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,598 >>> mbox cmd response: success
|dcfeffff48692121| 39,793 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,239 >>> mbox cmd response: success
|dcfeffff48692121| 42,471 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,907 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,234 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,741 >>> mbox cmd response: success
35,343 UART: |dcfeffff48692121| 37,219 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,750 >>> mbox cmd response: success
|dcfeffff48692121| 39,941 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,388 >>> mbox cmd response: success
|dcfeffff48692121| 42,638 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,079 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,517 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,047 >>> mbox cmd response: success
35,790 UART: |dcfeffff48692121| 37,742 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,385 >>> mbox cmd response: success
|dcfeffff48692121| 40,632 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,199 >>> mbox cmd response: success
|dcfeffff48692121| 43,477 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,028 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,478 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,991 >>> mbox cmd response: success
35,568 UART: |dcfeffff48692121| 37,592 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,185 >>> mbox cmd response: success
|dcfeffff48692121| 40,406 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,953 >>> mbox cmd response: success
|dcfeffff48692121| 43,210 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,706 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,254 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,787 >>> mbox cmd response: success
35,360 UART: |dcfeffff48692121| 37,251 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,767 >>> mbox cmd response: success
|dcfeffff48692121| 39,962 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,411 >>> mbox cmd response: success
|dcfeffff48692121| 42,642 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,079 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,353 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,875 >>> mbox cmd response: success
35,390 UART: |dcfeffff48692121| 37,259 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,769 >>> mbox cmd response: success
|dcfeffff48692121| 39,966 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,488 >>> mbox cmd response: success
|dcfeffff48692121| 42,717 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,212 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
5,368 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,893 >>> mbox cmd response: success
37,517 UART: |dcfeffff48692121| 39,467 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
40,071 >>> mbox cmd response: success
|dcfeffff48692121| 42,299 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,819 >>> mbox cmd response: success
|dcfeffff48692121| 45,126 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,653 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,434 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,981 >>> mbox cmd response: success
35,599 UART: |dcfeffff48692121| 37,628 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,233 >>> mbox cmd response: success
|dcfeffff48692121| 40,460 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,025 >>> mbox cmd response: success
|dcfeffff48692121| 43,307 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,836 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,313 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,825 >>> mbox cmd response: success
35,302 UART: |dcfeffff48692121| 37,232 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,750 >>> mbox cmd response: success
|dcfeffff48692121| 39,948 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,395 >>> mbox cmd response: success
|dcfeffff48692121| 42,625 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,068 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,155 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,654 >>> mbox cmd response: success
35,183 UART: |dcfeffff48692121| 37,055 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,572 >>> mbox cmd response: success
|dcfeffff48692121| 39,766 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,214 >>> mbox cmd response: success
|dcfeffff48692121| 44,767 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,287 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,518 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,043 >>> mbox cmd response: success
35,704 UART: |dcfeffff48692121| 37,732 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,329 >>> mbox cmd response: success
|dcfeffff48692121| 40,558 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,069 >>> mbox cmd response: success
|dcfeffff48692121| 43,320 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,894 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,651 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,138 >>> mbox cmd response: success
35,808 UART: |dcfeffff48692121| 37,817 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,422 >>> mbox cmd response: success
|dcfeffff48692121| 40,669 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,191 >>> mbox cmd response: success
|dcfeffff48692121| 43,467 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,995 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,716 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,806 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,950 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,829 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,711 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,474 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,377 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.10s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
1,302,236 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
1,301,953 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
1,302,475 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
1,302,474 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
1,302,876 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
1,302,002 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
1,302,623 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
1,302,375 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
1,302,024 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
1,302,041 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
1,302,521 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
1,302,354 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,750 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,012 UART:
192,402 UART: Running Caliptra ROM ...
193,635 UART:
193,797 UART: [state] CFI Enabled
266,635 UART: [state] LifecycleState = Unprovisioned
268,984 UART: [state] DebugLocked = No
270,631 UART: [state] WD Timer not started. Device not locked for debugging
274,899 UART: [kat] SHA2-256
456,844 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,369 UART: [kat] ++
468,815 UART: [kat] sha1
479,207 UART: [kat] SHA2-256
482,214 UART: [kat] SHA2-384
489,271 UART: [kat] SHA2-512-ACC
491,930 UART: [kat] ECC-384
3,777,758 UART: [kat] HMAC-384Kdf
3,802,316 UART: [kat] LMS
4,875,450 UART: [kat] --
4,878,633 UART: [cold-reset] ++
4,880,141 UART: [fht] FHT @ 0x50003400
4,891,282 UART: [idev] ++
4,892,013 UART: [idev] CDI.KEYID = 6
4,893,197 UART: [idev] SUBJECT.KEYID = 7
4,894,362 UART: [idev] UDS.KEYID = 0
4,930,033 UART: [idev] Erasing UDS.KEYID = 0
8,245,166 UART: [idev] Sha1 KeyId Algorithm
8,265,959 UART: [idev] --
8,270,303 UART: [ldev] ++
8,270,878 UART: [ldev] CDI.KEYID = 6
8,272,057 UART: [ldev] SUBJECT.KEYID = 5
8,273,219 UART: [ldev] AUTHORITY.KEYID = 7
8,274,454 UART: [ldev] FE.KEYID = 1
8,317,529 UART: [ldev] Erasing FE.KEYID = 1
11,653,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,666 UART: [ldev] --
14,039,104 UART: [fwproc] Wait for Commands...
14,041,899 UART: [fwproc] Recv command 0x43415053
14,044,974 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,981 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,801,072 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,381 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,589 UART:
192,949 UART: Running Caliptra ROM ...
194,161 UART:
603,678 UART: [state] CFI Enabled
617,850 UART: [state] LifecycleState = Unprovisioned
620,251 UART: [state] DebugLocked = No
623,108 UART: [state] WD Timer not started. Device not locked for debugging
627,869 UART: [kat] SHA2-256
809,882 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,398 UART: [kat] ++
821,897 UART: [kat] sha1
832,391 UART: [kat] SHA2-256
835,396 UART: [kat] SHA2-384
841,375 UART: [kat] SHA2-512-ACC
844,042 UART: [kat] ECC-384
4,100,895 UART: [kat] HMAC-384Kdf
4,113,298 UART: [kat] LMS
5,186,434 UART: [kat] --
5,192,776 UART: [cold-reset] ++
5,193,903 UART: [fht] FHT @ 0x50003400
5,205,419 UART: [idev] ++
5,206,114 UART: [idev] CDI.KEYID = 6
5,207,246 UART: [idev] SUBJECT.KEYID = 7
5,208,733 UART: [idev] UDS.KEYID = 0
5,225,319 UART: [idev] Erasing UDS.KEYID = 0
8,497,754 UART: [idev] Sha1 KeyId Algorithm
8,520,179 UART: [idev] --
8,523,698 UART: [ldev] ++
8,524,262 UART: [ldev] CDI.KEYID = 6
8,525,424 UART: [ldev] SUBJECT.KEYID = 5
8,526,898 UART: [ldev] AUTHORITY.KEYID = 7
8,528,426 UART: [ldev] FE.KEYID = 1
8,538,370 UART: [ldev] Erasing FE.KEYID = 1
11,832,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,834 UART: [ldev] --
14,198,576 UART: [fwproc] Wait for Commands...
14,201,428 UART: [fwproc] Recv command 0x43415053
14,204,509 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,240 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,018,681 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,806 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,246 UART:
192,615 UART: Running Caliptra ROM ...
193,790 UART:
193,946 UART: [state] CFI Enabled
263,793 UART: [state] LifecycleState = Unprovisioned
265,652 UART: [state] DebugLocked = No
266,859 UART: [state] WD Timer not started. Device not locked for debugging
270,908 UART: [kat] SHA2-256
449,993 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,561 UART: [kat] ++
462,154 UART: [kat] sha1
473,308 UART: [kat] SHA2-256
476,368 UART: [kat] SHA2-384
482,771 UART: [kat] SHA2-512-ACC
485,712 UART: [kat] ECC-384
2,949,919 UART: [kat] HMAC-384Kdf
2,972,605 UART: [kat] LMS
3,502,045 UART: [kat] --
3,506,044 UART: [cold-reset] ++
3,507,333 UART: [fht] FHT @ 0x50003400
3,517,342 UART: [idev] ++
3,517,904 UART: [idev] CDI.KEYID = 6
3,518,917 UART: [idev] SUBJECT.KEYID = 7
3,520,019 UART: [idev] UDS.KEYID = 0
3,543,402 UART: [idev] Erasing UDS.KEYID = 0
6,027,375 UART: [idev] Sha1 KeyId Algorithm
6,049,586 UART: [idev] --
6,052,808 UART: [ldev] ++
6,053,392 UART: [ldev] CDI.KEYID = 6
6,054,277 UART: [ldev] SUBJECT.KEYID = 5
6,055,503 UART: [ldev] AUTHORITY.KEYID = 7
6,056,685 UART: [ldev] FE.KEYID = 1
6,099,203 UART: [ldev] Erasing FE.KEYID = 1
8,603,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,241 UART: [ldev] --
10,413,050 UART: [fwproc] Wait for Commands...
10,415,685 UART: [fwproc] Recv command 0x43415053
10,418,441 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,965 writing to cptra_bootfsm_go
4,902 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,205,071 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,268 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,503 UART:
192,884 UART: Running Caliptra ROM ...
194,053 UART:
603,825 UART: [state] CFI Enabled
617,098 UART: [state] LifecycleState = Unprovisioned
618,984 UART: [state] DebugLocked = No
620,845 UART: [state] WD Timer not started. Device not locked for debugging
625,015 UART: [kat] SHA2-256
804,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,737 UART: [kat] ++
816,271 UART: [kat] sha1
826,773 UART: [kat] SHA2-256
829,778 UART: [kat] SHA2-384
837,152 UART: [kat] SHA2-512-ACC
840,132 UART: [kat] ECC-384
3,279,404 UART: [kat] HMAC-384Kdf
3,290,872 UART: [kat] LMS
3,820,365 UART: [kat] --
3,824,106 UART: [cold-reset] ++
3,826,628 UART: [fht] FHT @ 0x50003400
3,837,731 UART: [idev] ++
3,838,290 UART: [idev] CDI.KEYID = 6
3,839,226 UART: [idev] SUBJECT.KEYID = 7
3,840,441 UART: [idev] UDS.KEYID = 0
3,854,401 UART: [idev] Erasing UDS.KEYID = 0
6,309,134 UART: [idev] Sha1 KeyId Algorithm
6,332,322 UART: [idev] --
6,336,175 UART: [ldev] ++
6,336,794 UART: [ldev] CDI.KEYID = 6
6,337,716 UART: [ldev] SUBJECT.KEYID = 5
6,338,881 UART: [ldev] AUTHORITY.KEYID = 7
6,340,111 UART: [ldev] FE.KEYID = 1
6,349,947 UART: [ldev] Erasing FE.KEYID = 1
8,827,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,423 UART: [ldev] --
10,617,225 UART: [fwproc] Wait for Commands...
10,619,532 UART: [fwproc] Recv command 0x43415053
10,622,280 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,256 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,408,814 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
4,664 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,941 UART:
193,328 UART: Running Caliptra ROM ...
194,439 UART:
194,585 UART: [state] CFI Enabled
265,165 UART: [state] LifecycleState = Unprovisioned
267,019 UART: [state] DebugLocked = No
269,544 UART: [state] WD Timer not started. Device not locked for debugging
273,597 UART: [kat] SHA2-256
452,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,261 UART: [kat] ++
464,794 UART: [kat] sha1
475,353 UART: [kat] SHA2-256
478,359 UART: [kat] SHA2-384
485,099 UART: [kat] SHA2-512-ACC
488,077 UART: [kat] ECC-384
2,949,533 UART: [kat] HMAC-384Kdf
2,965,935 UART: [kat] LMS
3,495,352 UART: [kat] --
3,501,016 UART: [cold-reset] ++
3,503,596 UART: [fht] FHT @ 0x50003400
3,514,845 UART: [idev] ++
3,515,417 UART: [idev] CDI.KEYID = 6
3,516,333 UART: [idev] SUBJECT.KEYID = 7
3,517,547 UART: [idev] UDS.KEYID = 0
3,537,514 UART: [idev] Erasing UDS.KEYID = 0
6,021,454 UART: [idev] Sha1 KeyId Algorithm
6,044,804 UART: [idev] --
6,048,638 UART: [ldev] ++
6,049,266 UART: [ldev] CDI.KEYID = 6
6,050,164 UART: [ldev] SUBJECT.KEYID = 5
6,051,268 UART: [ldev] AUTHORITY.KEYID = 7
6,052,563 UART: [ldev] FE.KEYID = 1
6,094,515 UART: [ldev] Erasing FE.KEYID = 1
8,599,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,656 UART: [ldev] --
10,409,491 UART: [fwproc] Wait for Commands...
10,411,848 UART: [fwproc] Recv command 0x43415053
10,414,609 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,876 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,182,342 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,397 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,654 UART:
193,015 UART: Running Caliptra ROM ...
194,186 UART:
603,821 UART: [state] CFI Enabled
616,970 UART: [state] LifecycleState = Unprovisioned
618,840 UART: [state] DebugLocked = No
620,946 UART: [state] WD Timer not started. Device not locked for debugging
625,103 UART: [kat] SHA2-256
804,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,810 UART: [kat] ++
816,256 UART: [kat] sha1
828,369 UART: [kat] SHA2-256
831,389 UART: [kat] SHA2-384
837,203 UART: [kat] SHA2-512-ACC
840,186 UART: [kat] ECC-384
3,282,484 UART: [kat] HMAC-384Kdf
3,296,007 UART: [kat] LMS
3,825,536 UART: [kat] --
3,829,380 UART: [cold-reset] ++
3,831,050 UART: [fht] FHT @ 0x50003400
3,841,930 UART: [idev] ++
3,842,530 UART: [idev] CDI.KEYID = 6
3,843,448 UART: [idev] SUBJECT.KEYID = 7
3,844,610 UART: [idev] UDS.KEYID = 0
3,857,504 UART: [idev] Erasing UDS.KEYID = 0
6,313,781 UART: [idev] Sha1 KeyId Algorithm
6,336,433 UART: [idev] --
6,340,308 UART: [ldev] ++
6,340,893 UART: [ldev] CDI.KEYID = 6
6,341,807 UART: [ldev] SUBJECT.KEYID = 5
6,343,017 UART: [ldev] AUTHORITY.KEYID = 7
6,344,252 UART: [ldev] FE.KEYID = 1
6,354,841 UART: [ldev] Erasing FE.KEYID = 1
8,829,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,524 UART: [ldev] --
10,620,866 UART: [fwproc] Wait for Commands...
10,622,687 UART: [fwproc] Recv command 0x43415053
10,625,446 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,150 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,399,257 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,699 UART: [kat] ++
895,851 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,838 UART: [kat] HMAC-384Kdf
921,538 UART: [kat] LMS
1,169,850 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,145 UART: [fht] FHT @ 0x50003400
1,173,997 UART: [idev] ++
1,174,165 UART: [idev] CDI.KEYID = 6
1,174,526 UART: [idev] SUBJECT.KEYID = 7
1,174,951 UART: [idev] UDS.KEYID = 0
1,182,853 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,265 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,325 UART: [fwproc] Recv command 0x43415053
1,283,320 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,543 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,490 UART: [kat] SHA2-256
901,430 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,102 UART: [idev] ++
1,173,270 UART: [idev] CDI.KEYID = 6
1,173,631 UART: [idev] SUBJECT.KEYID = 7
1,174,056 UART: [idev] UDS.KEYID = 0
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,528 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,631 UART: [fwproc] Wait for Commands...
1,282,392 UART: [fwproc] Recv command 0x43415053
1,283,387 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,950 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,514 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,357 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,300 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x43415053
1,282,414 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,323 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,458 UART: [kat] SHA2-256
901,398 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,181,560 UART: [idev] Erasing UDS.KEYID = 0
1,198,586 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,499 UART: [ldev] ++
1,208,667 UART: [ldev] CDI.KEYID = 6
1,209,031 UART: [ldev] SUBJECT.KEYID = 5
1,209,458 UART: [ldev] AUTHORITY.KEYID = 7
1,209,921 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x43415053
1,283,389 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,226 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,182,535 UART: [idev] Erasing UDS.KEYID = 0
1,199,525 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,467 UART: [ldev] AUTHORITY.KEYID = 7
1,210,930 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,662 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x43415053
1,283,572 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,301 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,028 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,096 UART: [idev] Sha1 KeyId Algorithm
1,208,898 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,339 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x43415053
1,284,089 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,158 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,140 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,860 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,483 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,208 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,084 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,503 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,493 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,984 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
192,056 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,499 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,490 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,973 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,120 UART:
192,495 UART: Running Caliptra ROM ...
193,679 UART:
193,833 UART: [state] CFI Enabled
208,760 UART: [state] LifecycleState = Unprovisioned
211,312 UART: [state] DebugLocked = No
213,156 UART: [state] WD Timer not started. Device not locked for debugging
218,602 UART: [kat] SHA2-256
400,578 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,112 UART: [kat] ++
412,641 UART: [kat] sha1
423,042 UART: [kat] SHA2-256
426,054 UART: [kat] SHA2-384
432,754 UART: [kat] SHA2-512-ACC
435,328 UART: [kat] ECC-384
3,690,471 UART: [kat] HMAC-384Kdf
3,702,011 UART: [kat] LMS
4,775,237 UART: [kat] --
4,781,035 UART: [cold-reset] ++
4,782,762 UART: [fht] FHT @ 0x50003400
4,793,674 UART: [idev] ++
4,794,316 UART: [idev] CDI.KEYID = 6
4,795,559 UART: [idev] SUBJECT.KEYID = 7
4,797,013 UART: [idev] UDS.KEYID = 0
4,798,209 ready_for_fw is high
4,798,404 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
4,932,426 UART: [idev] Erasing UDS.KEYID = 0
8,088,207 UART: [idev] Sha1 KeyId Algorithm
8,110,189 UART: [idev] --
8,113,804 UART: [ldev] ++
8,114,425 UART: [ldev] CDI.KEYID = 6
8,115,599 UART: [ldev] SUBJECT.KEYID = 5
8,116,751 UART: [ldev] AUTHORITY.KEYID = 7
8,117,976 UART: [ldev] FE.KEYID = 1
8,130,528 UART: [ldev] Erasing FE.KEYID = 1
11,422,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,784,980 UART: [ldev] --
13,789,586 UART: [fwproc] Wait for Commands...
13,792,319 UART: [fwproc] Recv command 0x46574c44
13,794,641 UART: [fwproc] Recv'd Img size: 106620 bytes
17,773,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,249 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,896,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,214,108 >>> mbox cmd response: success
18,217,356 UART: [afmc] ++
18,217,966 UART: [afmc] CDI.KEYID = 6
18,219,152 UART: [afmc] SUBJECT.KEYID = 7
18,220,310 UART: [afmc] AUTHORITY.KEYID = 5
21,537,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,835,686 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,851,676 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,867,766 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,883,865 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,278 UART: [afmc] --
23,909,247 UART: [cold-reset] --
23,913,939 UART: [state] Locking Datavault
23,920,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,921,779 UART: [state] Locking ICCM
23,923,825 UART: [exit] Launching FMC @ 0x40000000
23,932,488 UART:
23,932,790 UART: Running Caliptra FMC ...
23,933,889 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
4,693,408 ready_for_fw is high
4,693,810 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,018,188 >>> mbox cmd response: success
23,656,948 UART:
23,657,350 UART: Running Caliptra FMC ...
23,658,621 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
192,596 UART:
192,941 UART: Running Caliptra ROM ...
194,111 UART:
194,255 UART: [state] CFI Enabled
209,253 UART: [state] LifecycleState = Unprovisioned
211,604 UART: [state] DebugLocked = No
213,690 UART: [state] WD Timer not started. Device not locked for debugging
219,122 UART: [kat] SHA2-256
401,066 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,598 UART: [kat] ++
413,071 UART: [kat] sha1
423,588 UART: [kat] SHA2-256
426,585 UART: [kat] SHA2-384
433,204 UART: [kat] SHA2-512-ACC
435,853 UART: [kat] ECC-384
3,690,941 UART: [kat] HMAC-384Kdf
3,702,546 UART: [kat] LMS
4,775,741 UART: [kat] --
4,781,514 UART: [cold-reset] ++
4,783,266 UART: [fht] FHT @ 0x50003400
4,794,177 UART: [idev] ++
4,794,805 UART: [idev] CDI.KEYID = 6
4,795,970 UART: [idev] SUBJECT.KEYID = 7
4,797,483 UART: [idev] UDS.KEYID = 0
4,798,682 ready_for_fw is high
4,798,862 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
4,932,662 UART: [idev] Erasing UDS.KEYID = 0
8,088,699 UART: [idev] Sha1 KeyId Algorithm
8,110,692 UART: [idev] --
8,114,316 UART: [ldev] ++
8,114,882 UART: [ldev] CDI.KEYID = 6
8,116,111 UART: [ldev] SUBJECT.KEYID = 5
8,117,258 UART: [ldev] AUTHORITY.KEYID = 7
8,118,479 UART: [ldev] FE.KEYID = 1
8,131,064 UART: [ldev] Erasing FE.KEYID = 1
11,422,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,733,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,749,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,478 UART: [ldev] --
13,790,091 UART: [fwproc] Wait for Commands...
13,792,827 UART: [fwproc] Recv command 0x46574c44
13,795,126 UART: [fwproc] Recv'd Img size: 106620 bytes
17,774,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,730 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,897,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,214,590 >>> mbox cmd response: success
18,217,870 UART: [afmc] ++
18,218,498 UART: [afmc] CDI.KEYID = 6
18,219,554 UART: [afmc] SUBJECT.KEYID = 7
18,220,766 UART: [afmc] AUTHORITY.KEYID = 5
21,537,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,836,197 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,852,172 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,868,264 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,884,342 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,804 UART: [afmc] --
23,909,765 UART: [cold-reset] --
23,914,449 UART: [state] Locking Datavault
23,920,574 UART: [state] Locking PCR0, PCR1 and PCR31
23,922,227 UART: [state] Locking ICCM
23,924,365 UART: [exit] Launching FMC @ 0x40000000
23,932,933 UART:
23,933,173 UART: Running Caliptra FMC ...
23,934,311 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,693,797 ready_for_fw is high
4,694,453 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,018,564 >>> mbox cmd response: success
23,657,355 UART:
23,657,756 UART: Running Caliptra FMC ...
23,658,976 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,113 UART:
192,482 UART: Running Caliptra ROM ...
193,670 UART:
193,823 UART: [state] CFI Enabled
208,608 UART: [state] LifecycleState = Unprovisioned
210,489 UART: [state] DebugLocked = No
212,540 UART: [state] WD Timer not started. Device not locked for debugging
217,059 UART: [kat] SHA2-256
396,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,790 UART: [kat] ++
408,239 UART: [kat] sha1
419,275 UART: [kat] SHA2-256
422,323 UART: [kat] SHA2-384
429,251 UART: [kat] SHA2-512-ACC
432,212 UART: [kat] ECC-384
2,873,698 UART: [kat] HMAC-384Kdf
2,885,840 UART: [kat] LMS
3,415,311 UART: [kat] --
3,421,020 UART: [cold-reset] ++
3,422,529 UART: [fht] FHT @ 0x50003400
3,433,082 UART: [idev] ++
3,433,657 UART: [idev] CDI.KEYID = 6
3,434,538 UART: [idev] SUBJECT.KEYID = 7
3,435,782 UART: [idev] UDS.KEYID = 0
3,436,874 ready_for_fw is high
3,437,077 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,525 UART: [idev] Erasing UDS.KEYID = 0
5,910,022 UART: [idev] Sha1 KeyId Algorithm
5,933,092 UART: [idev] --
5,936,577 UART: [ldev] ++
5,937,173 UART: [ldev] CDI.KEYID = 6
5,938,102 UART: [ldev] SUBJECT.KEYID = 5
5,939,152 UART: [ldev] AUTHORITY.KEYID = 7
5,940,487 UART: [ldev] FE.KEYID = 1
5,952,751 UART: [ldev] Erasing FE.KEYID = 1
8,426,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,511 UART: [ldev] --
10,219,077 UART: [fwproc] Wait for Commands...
10,221,822 UART: [fwproc] Recv command 0x46574c44
10,223,914 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,468 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,974,677 >>> mbox cmd response: success
13,978,117 UART: [afmc] ++
13,978,727 UART: [afmc] CDI.KEYID = 6
13,979,646 UART: [afmc] SUBJECT.KEYID = 7
13,980,809 UART: [afmc] AUTHORITY.KEYID = 5
16,480,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,222 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,224 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,145 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,112 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,515 UART: [afmc] --
18,277,677 UART: [cold-reset] --
18,282,113 UART: [state] Locking Datavault
18,287,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,515 UART: [state] Locking ICCM
18,291,323 UART: [exit] Launching FMC @ 0x40000000
18,299,729 UART:
18,299,980 UART: Running Caliptra FMC ...
18,301,126 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
3,288,529 ready_for_fw is high
3,288,961 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,119 >>> mbox cmd response: success
18,005,103 UART:
18,005,547 UART: Running Caliptra FMC ...
18,006,832 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,438 UART:
192,800 UART: Running Caliptra ROM ...
193,982 UART:
194,133 UART: [state] CFI Enabled
208,930 UART: [state] LifecycleState = Unprovisioned
210,796 UART: [state] DebugLocked = No
212,884 UART: [state] WD Timer not started. Device not locked for debugging
217,405 UART: [kat] SHA2-256
396,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,099 UART: [kat] ++
408,643 UART: [kat] sha1
419,663 UART: [kat] SHA2-256
422,664 UART: [kat] SHA2-384
429,643 UART: [kat] SHA2-512-ACC
432,583 UART: [kat] ECC-384
2,874,038 UART: [kat] HMAC-384Kdf
2,886,176 UART: [kat] LMS
3,415,686 UART: [kat] --
3,421,337 UART: [cold-reset] ++
3,422,837 UART: [fht] FHT @ 0x50003400
3,433,411 UART: [idev] ++
3,434,013 UART: [idev] CDI.KEYID = 6
3,434,903 UART: [idev] SUBJECT.KEYID = 7
3,436,074 UART: [idev] UDS.KEYID = 0
3,436,994 ready_for_fw is high
3,437,187 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,422 UART: [idev] Erasing UDS.KEYID = 0
5,910,328 UART: [idev] Sha1 KeyId Algorithm
5,933,283 UART: [idev] --
5,936,871 UART: [ldev] ++
5,937,445 UART: [ldev] CDI.KEYID = 6
5,938,355 UART: [ldev] SUBJECT.KEYID = 5
5,939,564 UART: [ldev] AUTHORITY.KEYID = 7
5,940,793 UART: [ldev] FE.KEYID = 1
5,953,054 UART: [ldev] Erasing FE.KEYID = 1
8,427,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,830 UART: [ldev] --
10,219,441 UART: [fwproc] Wait for Commands...
10,222,185 UART: [fwproc] Recv command 0x46574c44
10,224,272 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,825 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,975,038 >>> mbox cmd response: success
13,978,499 UART: [afmc] ++
13,979,108 UART: [afmc] CDI.KEYID = 6
13,979,997 UART: [afmc] SUBJECT.KEYID = 7
13,981,100 UART: [afmc] AUTHORITY.KEYID = 5
16,480,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,577 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,597 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,499 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,478 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,865 UART: [afmc] --
18,278,073 UART: [cold-reset] --
18,282,504 UART: [state] Locking Datavault
18,288,152 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,836 UART: [state] Locking ICCM
18,291,696 UART: [exit] Launching FMC @ 0x40000000
18,300,076 UART:
18,300,334 UART: Running Caliptra FMC ...
18,301,474 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,288,751 ready_for_fw is high
3,289,129 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,217 >>> mbox cmd response: success
18,005,213 UART:
18,005,617 UART: Running Caliptra FMC ...
18,006,817 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,260 UART:
192,623 UART: Running Caliptra ROM ...
193,810 UART:
193,960 UART: [state] CFI Enabled
208,743 UART: [state] LifecycleState = Unprovisioned
210,596 UART: [state] DebugLocked = No
212,685 UART: [state] WD Timer not started. Device not locked for debugging
217,271 UART: [kat] SHA2-256
396,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,953 UART: [kat] ++
408,486 UART: [kat] sha1
419,453 UART: [kat] SHA2-256
422,462 UART: [kat] SHA2-384
429,442 UART: [kat] SHA2-512-ACC
432,384 UART: [kat] ECC-384
2,873,910 UART: [kat] HMAC-384Kdf
2,885,998 UART: [kat] LMS
3,415,481 UART: [kat] --
3,421,179 UART: [cold-reset] ++
3,422,684 UART: [fht] FHT @ 0x50003400
3,433,246 UART: [idev] ++
3,433,850 UART: [idev] CDI.KEYID = 6
3,434,744 UART: [idev] SUBJECT.KEYID = 7
3,435,918 UART: [idev] UDS.KEYID = 0
3,436,895 ready_for_fw is high
3,437,082 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,317 UART: [idev] Erasing UDS.KEYID = 0
5,910,158 UART: [idev] Sha1 KeyId Algorithm
5,933,119 UART: [idev] --
5,936,738 UART: [ldev] ++
5,937,309 UART: [ldev] CDI.KEYID = 6
5,938,236 UART: [ldev] SUBJECT.KEYID = 5
5,939,400 UART: [ldev] AUTHORITY.KEYID = 7
5,940,629 UART: [ldev] FE.KEYID = 1
5,952,867 UART: [ldev] Erasing FE.KEYID = 1
8,427,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,675 UART: [ldev] --
10,219,236 UART: [fwproc] Wait for Commands...
10,221,981 UART: [fwproc] Recv command 0x46574c44
10,224,093 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,602 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,974,833 >>> mbox cmd response: success
13,978,279 UART: [afmc] ++
13,978,889 UART: [afmc] CDI.KEYID = 6
13,979,804 UART: [afmc] SUBJECT.KEYID = 7
13,980,964 UART: [afmc] AUTHORITY.KEYID = 5
16,480,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,403 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,362 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,303 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,253 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,655 UART: [afmc] --
18,277,826 UART: [cold-reset] --
18,282,256 UART: [state] Locking Datavault
18,287,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,675 UART: [state] Locking ICCM
18,291,485 UART: [exit] Launching FMC @ 0x40000000
18,299,869 UART:
18,300,117 UART: Running Caliptra FMC ...
18,301,257 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,288,460 ready_for_fw is high
3,288,844 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,754,932 >>> mbox cmd response: success
18,004,936 UART:
18,005,381 UART: Running Caliptra FMC ...
18,006,648 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,386 UART:
192,749 UART: Running Caliptra ROM ...
193,937 UART:
194,087 UART: [state] CFI Enabled
208,861 UART: [state] LifecycleState = Unprovisioned
210,731 UART: [state] DebugLocked = No
212,758 UART: [state] WD Timer not started. Device not locked for debugging
217,350 UART: [kat] SHA2-256
396,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,022 UART: [kat] ++
408,561 UART: [kat] sha1
419,585 UART: [kat] SHA2-256
422,583 UART: [kat] SHA2-384
429,560 UART: [kat] SHA2-512-ACC
432,494 UART: [kat] ECC-384
2,873,965 UART: [kat] HMAC-384Kdf
2,886,128 UART: [kat] LMS
3,415,557 UART: [kat] --
3,421,253 UART: [cold-reset] ++
3,422,749 UART: [fht] FHT @ 0x50003400
3,433,314 UART: [idev] ++
3,433,918 UART: [idev] CDI.KEYID = 6
3,434,837 UART: [idev] SUBJECT.KEYID = 7
3,436,012 UART: [idev] UDS.KEYID = 0
3,436,937 ready_for_fw is high
3,437,122 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,330 UART: [idev] Erasing UDS.KEYID = 0
5,910,261 UART: [idev] Sha1 KeyId Algorithm
5,933,201 UART: [idev] --
5,936,812 UART: [ldev] ++
5,937,376 UART: [ldev] CDI.KEYID = 6
5,938,307 UART: [ldev] SUBJECT.KEYID = 5
5,939,464 UART: [ldev] AUTHORITY.KEYID = 7
5,940,745 UART: [ldev] FE.KEYID = 1
5,952,952 UART: [ldev] Erasing FE.KEYID = 1
8,427,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,770 UART: [ldev] --
10,219,327 UART: [fwproc] Wait for Commands...
10,222,120 UART: [fwproc] Recv command 0x46574c44
10,224,160 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,685 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,974,931 >>> mbox cmd response: success
13,978,394 UART: [afmc] ++
13,979,009 UART: [afmc] CDI.KEYID = 6
13,979,927 UART: [afmc] SUBJECT.KEYID = 7
13,981,029 UART: [afmc] AUTHORITY.KEYID = 5
16,480,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,465 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,445 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,361 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,298 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,783 UART: [afmc] --
18,277,917 UART: [cold-reset] --
18,282,350 UART: [state] Locking Datavault
18,288,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,717 UART: [state] Locking ICCM
18,291,592 UART: [exit] Launching FMC @ 0x40000000
18,299,967 UART:
18,300,220 UART: Running Caliptra FMC ...
18,301,358 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,288,769 ready_for_fw is high
3,289,372 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,268 >>> mbox cmd response: success
18,005,213 UART:
18,005,617 UART: Running Caliptra FMC ...
18,006,877 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,320 UART:
192,686 UART: Running Caliptra ROM ...
193,887 UART:
194,041 UART: [state] CFI Enabled
265,138 UART: [state] LifecycleState = Unprovisioned
267,512 UART: [state] DebugLocked = No
269,456 UART: [state] WD Timer not started. Device not locked for debugging
273,592 UART: [kat] SHA2-256
455,521 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,078 UART: [kat] ++
467,525 UART: [kat] sha1
479,698 UART: [kat] SHA2-256
482,706 UART: [kat] SHA2-384
488,731 UART: [kat] SHA2-512-ACC
491,343 UART: [kat] ECC-384
3,776,814 UART: [kat] HMAC-384Kdf
3,803,727 UART: [kat] LMS
4,876,902 UART: [kat] --
4,880,649 UART: [cold-reset] ++
4,883,220 UART: [fht] FHT @ 0x50003400
4,894,203 UART: [idev] ++
4,894,876 UART: [idev] CDI.KEYID = 6
4,895,991 UART: [idev] SUBJECT.KEYID = 7
4,897,207 UART: [idev] UDS.KEYID = 0
4,931,411 UART: [idev] Erasing UDS.KEYID = 0
8,243,542 UART: [idev] Sha1 KeyId Algorithm
8,265,355 UART: [idev] --
8,269,113 UART: [ldev] ++
8,269,741 UART: [ldev] CDI.KEYID = 6
8,270,941 UART: [ldev] SUBJECT.KEYID = 5
8,272,113 UART: [ldev] AUTHORITY.KEYID = 7
8,273,230 UART: [ldev] FE.KEYID = 1
8,319,440 UART: [ldev] Erasing FE.KEYID = 1
11,657,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,585 UART: [ldev] --
14,180,657 UART: [fwproc] Wait for Commands...
14,182,065 UART: [fwproc] Recv command 0x46574c44
14,184,082 UART: [fwproc] Recv'd Img size: 114124 bytes
18,258,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,335,505 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,404,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,724,876 UART: [afmc] ++
18,725,510 UART: [afmc] CDI.KEYID = 6
18,726,644 UART: [afmc] SUBJECT.KEYID = 7
18,727,814 UART: [afmc] AUTHORITY.KEYID = 5
22,100,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,396,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,399,092 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,415,246 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,431,285 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,447,249 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,470,562 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,514 UART:
192,910 UART: Running Caliptra ROM ...
194,101 UART:
603,646 UART: [state] CFI Enabled
617,528 UART: [state] LifecycleState = Unprovisioned
619,948 UART: [state] DebugLocked = No
622,136 UART: [state] WD Timer not started. Device not locked for debugging
627,291 UART: [kat] SHA2-256
809,246 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,789 UART: [kat] ++
821,373 UART: [kat] sha1
832,148 UART: [kat] SHA2-256
835,211 UART: [kat] SHA2-384
841,392 UART: [kat] SHA2-512-ACC
844,006 UART: [kat] ECC-384
4,100,553 UART: [kat] HMAC-384Kdf
4,113,288 UART: [kat] LMS
5,186,486 UART: [kat] --
5,191,718 UART: [cold-reset] ++
5,194,523 UART: [fht] FHT @ 0x50003400
5,206,157 UART: [idev] ++
5,206,826 UART: [idev] CDI.KEYID = 6
5,208,059 UART: [idev] SUBJECT.KEYID = 7
5,209,489 UART: [idev] UDS.KEYID = 0
5,224,982 UART: [idev] Erasing UDS.KEYID = 0
8,499,738 UART: [idev] Sha1 KeyId Algorithm
8,521,872 UART: [idev] --
8,526,016 UART: [ldev] ++
8,526,591 UART: [ldev] CDI.KEYID = 6
8,527,770 UART: [ldev] SUBJECT.KEYID = 5
8,529,296 UART: [ldev] AUTHORITY.KEYID = 7
8,530,819 UART: [ldev] FE.KEYID = 1
8,541,088 UART: [ldev] Erasing FE.KEYID = 1
11,834,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,719 UART: [ldev] --
14,341,729 UART: [fwproc] Wait for Commands...
14,343,120 UART: [fwproc] Recv command 0x46574c44
14,345,295 UART: [fwproc] Recv'd Img size: 114124 bytes
18,421,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,498,147 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,566,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,887,320 UART: [afmc] ++
18,887,930 UART: [afmc] CDI.KEYID = 6
18,888,990 UART: [afmc] SUBJECT.KEYID = 7
18,890,205 UART: [afmc] AUTHORITY.KEYID = 5
22,204,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,500,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,502,451 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,518,601 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,534,648 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,550,617 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,573,777 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,146 UART:
192,542 UART: Running Caliptra ROM ...
193,717 UART:
193,866 UART: [state] CFI Enabled
263,684 UART: [state] LifecycleState = Unprovisioned
265,685 UART: [state] DebugLocked = No
266,961 UART: [state] WD Timer not started. Device not locked for debugging
270,540 UART: [kat] SHA2-256
449,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,204 UART: [kat] ++
461,737 UART: [kat] sha1
471,700 UART: [kat] SHA2-256
474,767 UART: [kat] SHA2-384
480,688 UART: [kat] SHA2-512-ACC
483,629 UART: [kat] ECC-384
2,927,699 UART: [kat] HMAC-384Kdf
2,950,566 UART: [kat] LMS
3,480,035 UART: [kat] --
3,483,791 UART: [cold-reset] ++
3,484,803 UART: [fht] FHT @ 0x50003400
3,494,275 UART: [idev] ++
3,494,902 UART: [idev] CDI.KEYID = 6
3,496,014 UART: [idev] SUBJECT.KEYID = 7
3,497,180 UART: [idev] UDS.KEYID = 0
3,523,626 UART: [idev] Erasing UDS.KEYID = 0
6,005,734 UART: [idev] Sha1 KeyId Algorithm
6,030,036 UART: [idev] --
6,032,596 UART: [ldev] ++
6,033,178 UART: [ldev] CDI.KEYID = 6
6,034,066 UART: [ldev] SUBJECT.KEYID = 5
6,035,293 UART: [ldev] AUTHORITY.KEYID = 7
6,036,548 UART: [ldev] FE.KEYID = 1
6,078,869 UART: [ldev] Erasing FE.KEYID = 1
8,583,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,979 UART: [ldev] --
10,534,483 UART: [fwproc] Wait for Commands...
10,535,885 UART: [fwproc] Recv command 0x46574c44
10,537,297 UART: [fwproc] Recv'd Img size: 114448 bytes
13,937,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,402,281 UART: [afmc] ++
14,402,896 UART: [afmc] CDI.KEYID = 6
14,403,810 UART: [afmc] SUBJECT.KEYID = 7
14,404,975 UART: [afmc] AUTHORITY.KEYID = 5
16,931,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,658,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,660,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,676,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,692,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,708,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,730,683 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,364 UART:
192,761 UART: Running Caliptra ROM ...
193,871 UART:
603,389 UART: [state] CFI Enabled
614,845 UART: [state] LifecycleState = Unprovisioned
616,727 UART: [state] DebugLocked = No
619,449 UART: [state] WD Timer not started. Device not locked for debugging
623,779 UART: [kat] SHA2-256
802,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,435 UART: [kat] ++
814,974 UART: [kat] sha1
824,887 UART: [kat] SHA2-256
827,885 UART: [kat] SHA2-384
833,853 UART: [kat] SHA2-512-ACC
836,830 UART: [kat] ECC-384
3,278,191 UART: [kat] HMAC-384Kdf
3,291,201 UART: [kat] LMS
3,820,673 UART: [kat] --
3,825,504 UART: [cold-reset] ++
3,826,789 UART: [fht] FHT @ 0x50003400
3,837,826 UART: [idev] ++
3,838,392 UART: [idev] CDI.KEYID = 6
3,839,300 UART: [idev] SUBJECT.KEYID = 7
3,840,514 UART: [idev] UDS.KEYID = 0
3,856,933 UART: [idev] Erasing UDS.KEYID = 0
6,313,783 UART: [idev] Sha1 KeyId Algorithm
6,336,979 UART: [idev] --
6,339,690 UART: [ldev] ++
6,340,269 UART: [ldev] CDI.KEYID = 6
6,341,184 UART: [ldev] SUBJECT.KEYID = 5
6,342,338 UART: [ldev] AUTHORITY.KEYID = 7
6,343,568 UART: [ldev] FE.KEYID = 1
6,353,518 UART: [ldev] Erasing FE.KEYID = 1
8,828,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,840 UART: [ldev] --
10,760,237 UART: [fwproc] Wait for Commands...
10,761,639 UART: [fwproc] Recv command 0x46574c44
10,763,046 UART: [fwproc] Recv'd Img size: 114448 bytes
14,162,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,623,637 UART: [afmc] ++
14,624,824 UART: [afmc] CDI.KEYID = 6
14,625,716 UART: [afmc] SUBJECT.KEYID = 7
14,626,737 UART: [afmc] AUTHORITY.KEYID = 5
17,122,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,844,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,846,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,862,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,878,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,894,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,918,144 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,114 UART:
192,490 UART: Running Caliptra ROM ...
193,667 UART:
193,821 UART: [state] CFI Enabled
262,317 UART: [state] LifecycleState = Unprovisioned
264,256 UART: [state] DebugLocked = No
266,937 UART: [state] WD Timer not started. Device not locked for debugging
270,988 UART: [kat] SHA2-256
450,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,687 UART: [kat] ++
462,215 UART: [kat] sha1
472,395 UART: [kat] SHA2-256
475,409 UART: [kat] SHA2-384
481,607 UART: [kat] SHA2-512-ACC
484,563 UART: [kat] ECC-384
2,951,590 UART: [kat] HMAC-384Kdf
2,972,361 UART: [kat] LMS
3,501,833 UART: [kat] --
3,507,018 UART: [cold-reset] ++
3,508,574 UART: [fht] FHT @ 0x50003400
3,518,912 UART: [idev] ++
3,519,535 UART: [idev] CDI.KEYID = 6
3,520,457 UART: [idev] SUBJECT.KEYID = 7
3,521,624 UART: [idev] UDS.KEYID = 0
3,544,035 UART: [idev] Erasing UDS.KEYID = 0
6,026,271 UART: [idev] Sha1 KeyId Algorithm
6,048,783 UART: [idev] --
6,052,657 UART: [ldev] ++
6,053,230 UART: [ldev] CDI.KEYID = 6
6,054,139 UART: [ldev] SUBJECT.KEYID = 5
6,055,244 UART: [ldev] AUTHORITY.KEYID = 7
6,056,531 UART: [ldev] FE.KEYID = 1
6,100,260 UART: [ldev] Erasing FE.KEYID = 1
8,603,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,444 UART: [ldev] --
10,555,660 UART: [fwproc] Wait for Commands...
10,557,046 UART: [fwproc] Recv command 0x46574c44
10,559,101 UART: [fwproc] Recv'd Img size: 114448 bytes
13,964,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,037,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,105,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,428,458 UART: [afmc] ++
14,429,079 UART: [afmc] CDI.KEYID = 6
14,429,998 UART: [afmc] SUBJECT.KEYID = 7
14,431,104 UART: [afmc] AUTHORITY.KEYID = 5
16,954,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,678,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,680,358 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,696,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,712,140 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,728,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,751,454 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,292 UART:
192,684 UART: Running Caliptra ROM ...
193,799 UART:
603,607 UART: [state] CFI Enabled
617,279 UART: [state] LifecycleState = Unprovisioned
619,114 UART: [state] DebugLocked = No
620,381 UART: [state] WD Timer not started. Device not locked for debugging
624,320 UART: [kat] SHA2-256
803,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,016 UART: [kat] ++
815,469 UART: [kat] sha1
827,313 UART: [kat] SHA2-256
830,311 UART: [kat] SHA2-384
836,608 UART: [kat] SHA2-512-ACC
839,596 UART: [kat] ECC-384
3,283,518 UART: [kat] HMAC-384Kdf
3,294,885 UART: [kat] LMS
3,824,361 UART: [kat] --
3,829,192 UART: [cold-reset] ++
3,831,698 UART: [fht] FHT @ 0x50003400
3,842,298 UART: [idev] ++
3,842,860 UART: [idev] CDI.KEYID = 6
3,843,821 UART: [idev] SUBJECT.KEYID = 7
3,844,979 UART: [idev] UDS.KEYID = 0
3,859,899 UART: [idev] Erasing UDS.KEYID = 0
6,317,213 UART: [idev] Sha1 KeyId Algorithm
6,339,296 UART: [idev] --
6,342,434 UART: [ldev] ++
6,343,011 UART: [ldev] CDI.KEYID = 6
6,343,929 UART: [ldev] SUBJECT.KEYID = 5
6,345,089 UART: [ldev] AUTHORITY.KEYID = 7
6,346,322 UART: [ldev] FE.KEYID = 1
6,356,593 UART: [ldev] Erasing FE.KEYID = 1
8,827,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,587 UART: [ldev] --
10,761,900 UART: [fwproc] Wait for Commands...
10,763,313 UART: [fwproc] Recv command 0x46574c44
10,764,724 UART: [fwproc] Recv'd Img size: 114448 bytes
14,166,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,631,136 UART: [afmc] ++
14,631,771 UART: [afmc] CDI.KEYID = 6
14,632,665 UART: [afmc] SUBJECT.KEYID = 7
14,633,827 UART: [afmc] AUTHORITY.KEYID = 5
17,128,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,858 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,856 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,817 UART: [fht] FHT @ 0x50003400
1,172,497 UART: [idev] ++
1,172,665 UART: [idev] CDI.KEYID = 6
1,173,026 UART: [idev] SUBJECT.KEYID = 7
1,173,451 UART: [idev] UDS.KEYID = 0
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,101 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,422 UART: [ldev] --
1,280,724 UART: [fwproc] Wait for Commands...
1,281,545 UART: [fwproc] Recv command 0x46574c44
1,282,278 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,411 UART: [afmc] ++
2,774,579 UART: [afmc] CDI.KEYID = 6
2,774,942 UART: [afmc] SUBJECT.KEYID = 7
2,775,368 UART: [afmc] AUTHORITY.KEYID = 5
2,810,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,806 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,456 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,395 UART: [kat] LMS
1,168,707 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,198,704 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,214,925 UART: [ldev] Erasing FE.KEYID = 1
1,241,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,619 UART: [ldev] --
1,280,991 UART: [fwproc] Wait for Commands...
1,281,646 UART: [fwproc] Recv command 0x46574c44
1,282,379 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,546 UART: [afmc] ++
2,775,714 UART: [afmc] CDI.KEYID = 6
2,776,077 UART: [afmc] SUBJECT.KEYID = 7
2,776,503 UART: [afmc] AUTHORITY.KEYID = 5
2,811,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,784 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,723 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,563 UART: [idev] Sha1 KeyId Algorithm
1,208,495 UART: [idev] --
1,209,428 UART: [ldev] ++
1,209,596 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,216,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,492 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,645 UART: [fwproc] Recv command 0x46574c44
1,282,378 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,643 UART: [afmc] ++
2,774,811 UART: [afmc] CDI.KEYID = 6
2,775,174 UART: [afmc] SUBJECT.KEYID = 7
2,775,600 UART: [afmc] AUTHORITY.KEYID = 5
2,811,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,520 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,208,646 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,639 UART: [fwproc] Wait for Commands...
1,283,292 UART: [fwproc] Recv command 0x46574c44
1,284,025 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,900 UART: [afmc] ++
2,777,068 UART: [afmc] CDI.KEYID = 6
2,777,431 UART: [afmc] SUBJECT.KEYID = 7
2,777,857 UART: [afmc] AUTHORITY.KEYID = 5
2,813,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,867 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,521 UART: [cold-reset] ++
1,170,957 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Sha1 KeyId Algorithm
1,208,535 UART: [idev] --
1,209,526 UART: [ldev] ++
1,209,694 UART: [ldev] CDI.KEYID = 6
1,210,058 UART: [ldev] SUBJECT.KEYID = 5
1,210,485 UART: [ldev] AUTHORITY.KEYID = 7
1,210,948 UART: [ldev] FE.KEYID = 1
1,216,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,298 UART: [ldev] --
1,281,796 UART: [fwproc] Wait for Commands...
1,282,585 UART: [fwproc] Recv command 0x46574c44
1,283,318 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,181 UART: [afmc] ++
2,776,349 UART: [afmc] CDI.KEYID = 6
2,776,712 UART: [afmc] SUBJECT.KEYID = 7
2,777,138 UART: [afmc] AUTHORITY.KEYID = 5
2,812,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,030 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,241 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,052 UART: [afmc] ++
2,776,220 UART: [afmc] CDI.KEYID = 6
2,776,583 UART: [afmc] SUBJECT.KEYID = 7
2,777,009 UART: [afmc] AUTHORITY.KEYID = 5
2,812,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,121 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,179 UART:
192,535 UART: Running Caliptra ROM ...
193,707 UART:
193,859 UART: [state] CFI Enabled
260,151 UART: [state] LifecycleState = Unprovisioned
262,512 UART: [state] DebugLocked = No
264,672 UART: [state] WD Timer not started. Device not locked for debugging
269,758 UART: [kat] SHA2-256
451,723 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,237 UART: [kat] ++
463,678 UART: [kat] sha1
472,562 UART: [kat] SHA2-256
475,557 UART: [kat] SHA2-384
480,976 UART: [kat] SHA2-512-ACC
483,622 UART: [kat] ECC-384
3,765,958 UART: [kat] HMAC-384Kdf
3,791,319 UART: [kat] LMS
4,864,429 UART: [kat] --
4,869,275 UART: [cold-reset] ++
4,870,568 UART: [fht] FHT @ 0x50003400
4,882,675 UART: [idev] ++
4,883,406 UART: [idev] CDI.KEYID = 6
4,884,573 UART: [idev] SUBJECT.KEYID = 7
4,885,741 UART: [idev] UDS.KEYID = 0
4,886,686 ready_for_fw is high
4,886,912 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,021,644 UART: [idev] Erasing UDS.KEYID = 0
8,230,342 UART: [idev] Sha1 KeyId Algorithm
8,251,462 UART: [idev] --
8,256,481 UART: [ldev] ++
8,257,055 UART: [ldev] CDI.KEYID = 6
8,258,221 UART: [ldev] SUBJECT.KEYID = 5
8,259,432 UART: [ldev] AUTHORITY.KEYID = 7
8,260,583 UART: [ldev] FE.KEYID = 1
8,307,133 UART: [ldev] Erasing FE.KEYID = 1
11,639,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,952,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,968,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,984,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,000,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,020,413 UART: [ldev] --
14,025,081 UART: [fwproc] Wait for Commands...
14,027,020 UART: [fwproc] Recv command 0x46574c44
14,029,530 UART: [fwproc] Recv'd Img size: 106620 bytes
18,006,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,083,449 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,125,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,443,032 >>> mbox cmd response: success
18,446,462 UART: [afmc] ++
18,447,076 UART: [afmc] CDI.KEYID = 6
18,448,273 UART: [afmc] SUBJECT.KEYID = 7
18,449,372 UART: [afmc] AUTHORITY.KEYID = 5
21,809,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,104,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,106,976 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,122,995 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,139,061 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,155,114 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,177,131 UART: [afmc] --
24,181,409 UART: [cold-reset] --
24,185,401 UART: [state] Locking Datavault
24,190,981 UART: [state] Locking PCR0, PCR1 and PCR31
24,192,653 UART: [state] Locking ICCM
24,194,394 UART: [exit] Launching FMC @ 0x40000000
24,203,060 UART:
24,203,306 UART: Running Caliptra FMC ...
24,204,449 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,799,512 ready_for_fw is high
4,799,928 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,233,032 >>> mbox cmd response: success
23,935,279 UART:
23,935,704 UART: Running Caliptra FMC ...
23,936,884 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,391 UART:
192,763 UART: Running Caliptra ROM ...
193,886 UART:
603,629 UART: [state] CFI Enabled
621,898 UART: [state] LifecycleState = Unprovisioned
624,271 UART: [state] DebugLocked = No
626,920 UART: [state] WD Timer not started. Device not locked for debugging
630,791 UART: [kat] SHA2-256
812,794 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
824,289 UART: [kat] ++
824,807 UART: [kat] sha1
835,268 UART: [kat] SHA2-256
838,266 UART: [kat] SHA2-384
844,460 UART: [kat] SHA2-512-ACC
847,028 UART: [kat] ECC-384
4,105,665 UART: [kat] HMAC-384Kdf
4,116,287 UART: [kat] LMS
5,189,453 UART: [kat] --
5,191,846 UART: [cold-reset] ++
5,193,427 UART: [fht] FHT @ 0x50003400
5,203,411 UART: [idev] ++
5,204,117 UART: [idev] CDI.KEYID = 6
5,205,289 UART: [idev] SUBJECT.KEYID = 7
5,206,740 UART: [idev] UDS.KEYID = 0
5,208,002 ready_for_fw is high
5,208,222 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,342,245 UART: [idev] Erasing UDS.KEYID = 0
8,495,444 UART: [idev] Sha1 KeyId Algorithm
8,516,412 UART: [idev] --
8,520,789 UART: [ldev] ++
8,521,411 UART: [ldev] CDI.KEYID = 6
8,522,511 UART: [ldev] SUBJECT.KEYID = 5
8,524,036 UART: [ldev] AUTHORITY.KEYID = 7
8,525,567 UART: [ldev] FE.KEYID = 1
8,536,419 UART: [ldev] Erasing FE.KEYID = 1
11,823,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,534 UART: [ldev] --
14,187,116 UART: [fwproc] Wait for Commands...
14,189,421 UART: [fwproc] Recv command 0x46574c44
14,191,746 UART: [fwproc] Recv'd Img size: 106620 bytes
18,178,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,252,590 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,295,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,612,748 >>> mbox cmd response: success
18,617,725 UART: [afmc] ++
18,618,332 UART: [afmc] CDI.KEYID = 6
18,619,518 UART: [afmc] SUBJECT.KEYID = 7
18,620,669 UART: [afmc] AUTHORITY.KEYID = 5
21,937,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,232,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,235,222 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,251,263 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,267,331 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,283,415 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,306,765 UART: [afmc] --
24,310,639 UART: [cold-reset] --
24,315,329 UART: [state] Locking Datavault
24,319,933 UART: [state] Locking PCR0, PCR1 and PCR31
24,321,639 UART: [state] Locking ICCM
24,323,403 UART: [exit] Launching FMC @ 0x40000000
24,332,050 UART:
24,332,299 UART: Running Caliptra FMC ...
24,333,367 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
5,102,137 ready_for_fw is high
5,102,510 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,415,769 >>> mbox cmd response: success
24,059,160 UART:
24,059,559 UART: Running Caliptra FMC ...
24,060,748 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,014 UART:
192,389 UART: Running Caliptra ROM ...
193,484 UART:
193,625 UART: [state] CFI Enabled
258,748 UART: [state] LifecycleState = Unprovisioned
260,666 UART: [state] DebugLocked = No
263,333 UART: [state] WD Timer not started. Device not locked for debugging
267,425 UART: [kat] SHA2-256
446,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,089 UART: [kat] ++
458,626 UART: [kat] sha1
468,866 UART: [kat] SHA2-256
471,876 UART: [kat] SHA2-384
479,073 UART: [kat] SHA2-512-ACC
482,013 UART: [kat] ECC-384
2,945,146 UART: [kat] HMAC-384Kdf
2,971,640 UART: [kat] LMS
3,501,076 UART: [kat] --
3,505,655 UART: [cold-reset] ++
3,507,306 UART: [fht] FHT @ 0x50003400
3,517,930 UART: [idev] ++
3,518,500 UART: [idev] CDI.KEYID = 6
3,519,533 UART: [idev] SUBJECT.KEYID = 7
3,520,636 UART: [idev] UDS.KEYID = 0
3,521,585 ready_for_fw is high
3,521,800 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,656,911 UART: [idev] Erasing UDS.KEYID = 0
6,028,267 UART: [idev] Sha1 KeyId Algorithm
6,049,939 UART: [idev] --
6,053,725 UART: [ldev] ++
6,054,305 UART: [ldev] CDI.KEYID = 6
6,055,215 UART: [ldev] SUBJECT.KEYID = 5
6,056,376 UART: [ldev] AUTHORITY.KEYID = 7
6,057,665 UART: [ldev] FE.KEYID = 1
6,100,776 UART: [ldev] Erasing FE.KEYID = 1
8,601,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,463 UART: [ldev] --
10,389,866 UART: [fwproc] Wait for Commands...
10,392,397 UART: [fwproc] Recv command 0x46574c44
10,394,434 UART: [fwproc] Recv'd Img size: 106964 bytes
13,717,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,793,373 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,835,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,154,083 >>> mbox cmd response: success
14,158,967 UART: [afmc] ++
14,159,619 UART: [afmc] CDI.KEYID = 6
14,160,553 UART: [afmc] SUBJECT.KEYID = 7
14,161,593 UART: [afmc] AUTHORITY.KEYID = 5
16,699,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,036 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,976 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,904 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,882 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,769 UART: [afmc] --
18,499,934 UART: [cold-reset] --
18,502,506 UART: [state] Locking Datavault
18,506,650 UART: [state] Locking PCR0, PCR1 and PCR31
18,508,346 UART: [state] Locking ICCM
18,509,641 UART: [exit] Launching FMC @ 0x40000000
18,518,043 UART:
18,518,297 UART: Running Caliptra FMC ...
18,519,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,380,298 ready_for_fw is high
3,380,709 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,941,672 >>> mbox cmd response: success
18,233,012 UART:
18,233,424 UART: Running Caliptra FMC ...
18,234,709 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,434 UART:
192,804 UART: Running Caliptra ROM ...
193,919 UART:
603,475 UART: [state] CFI Enabled
617,064 UART: [state] LifecycleState = Unprovisioned
618,939 UART: [state] DebugLocked = No
620,465 UART: [state] WD Timer not started. Device not locked for debugging
623,938 UART: [kat] SHA2-256
803,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,633 UART: [kat] ++
815,162 UART: [kat] sha1
826,554 UART: [kat] SHA2-256
829,599 UART: [kat] SHA2-384
836,677 UART: [kat] SHA2-512-ACC
839,680 UART: [kat] ECC-384
3,281,760 UART: [kat] HMAC-384Kdf
3,293,986 UART: [kat] LMS
3,823,499 UART: [kat] --
3,825,797 UART: [cold-reset] ++
3,827,818 UART: [fht] FHT @ 0x50003400
3,837,446 UART: [idev] ++
3,838,013 UART: [idev] CDI.KEYID = 6
3,838,927 UART: [idev] SUBJECT.KEYID = 7
3,840,170 UART: [idev] UDS.KEYID = 0
3,841,092 ready_for_fw is high
3,841,282 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,976,047 UART: [idev] Erasing UDS.KEYID = 0
6,312,840 UART: [idev] Sha1 KeyId Algorithm
6,336,992 UART: [idev] --
6,339,978 UART: [ldev] ++
6,340,543 UART: [ldev] CDI.KEYID = 6
6,341,426 UART: [ldev] SUBJECT.KEYID = 5
6,342,637 UART: [ldev] AUTHORITY.KEYID = 7
6,343,840 UART: [ldev] FE.KEYID = 1
6,353,598 UART: [ldev] Erasing FE.KEYID = 1
8,826,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,001 UART: [ldev] --
10,616,159 UART: [fwproc] Wait for Commands...
10,619,119 UART: [fwproc] Recv command 0x46574c44
10,621,210 UART: [fwproc] Recv'd Img size: 106964 bytes
13,929,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,108 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,049,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,367,208 >>> mbox cmd response: success
14,370,628 UART: [afmc] ++
14,371,238 UART: [afmc] CDI.KEYID = 6
14,372,153 UART: [afmc] SUBJECT.KEYID = 7
14,373,255 UART: [afmc] AUTHORITY.KEYID = 5
16,870,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,589,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,591,802 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,607,785 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,623,695 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,639,666 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,662,054 UART: [afmc] --
18,665,570 UART: [cold-reset] --
18,667,698 UART: [state] Locking Datavault
18,672,289 UART: [state] Locking PCR0, PCR1 and PCR31
18,673,978 UART: [state] Locking ICCM
18,676,483 UART: [exit] Launching FMC @ 0x40000000
18,684,894 UART:
18,685,141 UART: Running Caliptra FMC ...
18,686,281 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,691,899 ready_for_fw is high
3,692,289 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,141,262 >>> mbox cmd response: success
18,393,208 UART:
18,393,617 UART: Running Caliptra FMC ...
18,395,027 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,113 UART:
192,484 UART: Running Caliptra ROM ...
193,604 UART:
193,750 UART: [state] CFI Enabled
263,303 UART: [state] LifecycleState = Unprovisioned
265,164 UART: [state] DebugLocked = No
267,967 UART: [state] WD Timer not started. Device not locked for debugging
271,143 UART: [kat] SHA2-256
450,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,841 UART: [kat] ++
462,294 UART: [kat] sha1
472,882 UART: [kat] SHA2-256
475,909 UART: [kat] SHA2-384
483,033 UART: [kat] SHA2-512-ACC
485,983 UART: [kat] ECC-384
2,947,333 UART: [kat] HMAC-384Kdf
2,968,960 UART: [kat] LMS
3,498,394 UART: [kat] --
3,503,389 UART: [cold-reset] ++
3,505,819 UART: [fht] FHT @ 0x50003400
3,515,589 UART: [idev] ++
3,516,152 UART: [idev] CDI.KEYID = 6
3,517,056 UART: [idev] SUBJECT.KEYID = 7
3,518,234 UART: [idev] UDS.KEYID = 0
3,519,134 ready_for_fw is high
3,519,320 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,653,890 UART: [idev] Erasing UDS.KEYID = 0
6,022,736 UART: [idev] Sha1 KeyId Algorithm
6,046,005 UART: [idev] --
6,050,909 UART: [ldev] ++
6,051,551 UART: [ldev] CDI.KEYID = 6
6,052,448 UART: [ldev] SUBJECT.KEYID = 5
6,053,472 UART: [ldev] AUTHORITY.KEYID = 7
6,054,821 UART: [ldev] FE.KEYID = 1
6,096,544 UART: [ldev] Erasing FE.KEYID = 1
8,600,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,817 UART: [ldev] --
10,412,492 UART: [fwproc] Wait for Commands...
10,415,071 UART: [fwproc] Recv command 0x46574c44
10,417,110 UART: [fwproc] Recv'd Img size: 106964 bytes
13,732,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,802,640 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,845,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,164,115 >>> mbox cmd response: success
14,167,569 UART: [afmc] ++
14,168,181 UART: [afmc] CDI.KEYID = 6
14,169,109 UART: [afmc] SUBJECT.KEYID = 7
14,170,266 UART: [afmc] AUTHORITY.KEYID = 5
16,699,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,428,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,430,512 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,446,516 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,462,441 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,478,369 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,500,613 UART: [afmc] --
18,503,598 UART: [cold-reset] --
18,505,495 UART: [state] Locking Datavault
18,510,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,023 UART: [state] Locking ICCM
18,514,592 UART: [exit] Launching FMC @ 0x40000000
18,522,943 UART:
18,523,231 UART: Running Caliptra FMC ...
18,524,388 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,379,884 ready_for_fw is high
3,380,351 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,954,336 >>> mbox cmd response: success
18,240,323 UART:
18,240,755 UART: Running Caliptra FMC ...
18,241,917 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,512 UART:
192,891 UART: Running Caliptra ROM ...
193,969 UART:
603,579 UART: [state] CFI Enabled
618,733 UART: [state] LifecycleState = Unprovisioned
620,615 UART: [state] DebugLocked = No
623,347 UART: [state] WD Timer not started. Device not locked for debugging
627,796 UART: [kat] SHA2-256
806,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,490 UART: [kat] ++
819,015 UART: [kat] sha1
828,765 UART: [kat] SHA2-256
831,771 UART: [kat] SHA2-384
838,678 UART: [kat] SHA2-512-ACC
841,636 UART: [kat] ECC-384
3,278,366 UART: [kat] HMAC-384Kdf
3,292,444 UART: [kat] LMS
3,821,984 UART: [kat] --
3,827,064 UART: [cold-reset] ++
3,827,933 UART: [fht] FHT @ 0x50003400
3,838,902 UART: [idev] ++
3,839,459 UART: [idev] CDI.KEYID = 6
3,840,340 UART: [idev] SUBJECT.KEYID = 7
3,841,577 UART: [idev] UDS.KEYID = 0
3,842,478 ready_for_fw is high
3,842,697 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,977,202 UART: [idev] Erasing UDS.KEYID = 0
6,321,409 UART: [idev] Sha1 KeyId Algorithm
6,344,527 UART: [idev] --
6,349,598 UART: [ldev] ++
6,350,157 UART: [ldev] CDI.KEYID = 6
6,351,117 UART: [ldev] SUBJECT.KEYID = 5
6,352,269 UART: [ldev] AUTHORITY.KEYID = 7
6,353,516 UART: [ldev] FE.KEYID = 1
6,365,351 UART: [ldev] Erasing FE.KEYID = 1
8,840,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,646 UART: [ldev] --
10,627,640 UART: [fwproc] Wait for Commands...
10,630,376 UART: [fwproc] Recv command 0x46574c44
10,632,462 UART: [fwproc] Recv'd Img size: 106964 bytes
13,947,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,528 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,058,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,376,875 >>> mbox cmd response: success
14,381,221 UART: [afmc] ++
14,381,853 UART: [afmc] CDI.KEYID = 6
14,382,773 UART: [afmc] SUBJECT.KEYID = 7
14,383,934 UART: [afmc] AUTHORITY.KEYID = 5
16,882,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,900 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,619,888 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,635,780 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,651,745 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,673,490 UART: [afmc] --
18,677,926 UART: [cold-reset] --
18,681,591 UART: [state] Locking Datavault
18,686,617 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,337 UART: [state] Locking ICCM
18,690,692 UART: [exit] Launching FMC @ 0x40000000
18,699,076 UART:
18,699,343 UART: Running Caliptra FMC ...
18,700,488 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,698,006 ready_for_fw is high
3,698,938 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,149,728 >>> mbox cmd response: success
18,398,731 UART:
18,399,121 UART: Running Caliptra FMC ...
18,400,370 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,287 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,215,132 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,384 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,788 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,971 >>> mbox cmd response: success
2,677,220 UART: [afmc] ++
2,677,388 UART: [afmc] CDI.KEYID = 6
2,677,751 UART: [afmc] SUBJECT.KEYID = 7
2,678,177 UART: [afmc] AUTHORITY.KEYID = 5
2,714,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,878 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,598 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,491 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,184 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,977 UART: [afmc] --
2,757,049 UART: [cold-reset] --
2,757,843 UART: [state] Locking Datavault
2,759,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,610 UART: [state] Locking ICCM
2,760,122 UART: [exit] Launching FMC @ 0x40000000
2,765,419 UART:
2,765,435 UART: Running Caliptra FMC ...
2,765,843 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,002 ready_for_fw is high
1,056,002 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,827 >>> mbox cmd response: success
2,589,248 UART:
2,589,264 UART: Running Caliptra FMC ...
2,589,672 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 ready_for_fw is high
1,174,634 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,357 UART: [ldev] SUBJECT.KEYID = 5
1,209,784 UART: [ldev] AUTHORITY.KEYID = 7
1,210,247 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,481 UART: [ldev] --
1,280,873 UART: [fwproc] Wait for Commands...
1,281,672 UART: [fwproc] Recv command 0x46574c44
1,282,405 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,913 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,996 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,673,972 >>> mbox cmd response: success
2,675,145 UART: [afmc] ++
2,675,313 UART: [afmc] CDI.KEYID = 6
2,675,676 UART: [afmc] SUBJECT.KEYID = 7
2,676,102 UART: [afmc] AUTHORITY.KEYID = 5
2,711,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,875 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,595 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,488 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,181 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,054 UART: [afmc] --
2,755,124 UART: [cold-reset] --
2,755,892 UART: [state] Locking Datavault
2,757,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,807 UART: [state] Locking ICCM
2,758,357 UART: [exit] Launching FMC @ 0x40000000
2,763,654 UART:
2,763,670 UART: Running Caliptra FMC ...
2,764,078 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,518 >>> mbox cmd response: success
2,587,971 UART:
2,587,987 UART: Running Caliptra FMC ...
2,588,395 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,939 UART: [kat] ++
895,091 UART: [kat] sha1
899,181 UART: [kat] SHA2-256
901,121 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,278 UART: [kat] HMAC-384Kdf
919,732 UART: [kat] LMS
1,168,044 UART: [kat] --
1,168,973 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,165 UART: [idev] ++
1,172,333 UART: [idev] CDI.KEYID = 6
1,172,694 UART: [idev] SUBJECT.KEYID = 7
1,173,119 UART: [idev] UDS.KEYID = 0
1,173,465 ready_for_fw is high
1,173,465 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,180,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,077 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,716 UART: [ldev] Erasing FE.KEYID = 1
1,241,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,148 UART: [ldev] --
1,280,626 UART: [fwproc] Wait for Commands...
1,281,223 UART: [fwproc] Recv command 0x46574c44
1,281,956 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,246 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,421 >>> mbox cmd response: success
2,677,522 UART: [afmc] ++
2,677,690 UART: [afmc] CDI.KEYID = 6
2,678,053 UART: [afmc] SUBJECT.KEYID = 7
2,678,479 UART: [afmc] AUTHORITY.KEYID = 5
2,713,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,742 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,462 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,355 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,048 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,931 UART: [afmc] --
2,756,943 UART: [cold-reset] --
2,757,635 UART: [state] Locking Datavault
2,758,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,230 UART: [state] Locking ICCM
2,759,800 UART: [exit] Launching FMC @ 0x40000000
2,765,097 UART:
2,765,113 UART: Running Caliptra FMC ...
2,765,521 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,058 ready_for_fw is high
1,056,058 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,977 >>> mbox cmd response: success
2,587,770 UART:
2,587,786 UART: Running Caliptra FMC ...
2,588,194 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,174,748 ready_for_fw is high
1,174,748 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,640 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,835 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,693 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,798 >>> mbox cmd response: success
2,677,909 UART: [afmc] ++
2,678,077 UART: [afmc] CDI.KEYID = 6
2,678,440 UART: [afmc] SUBJECT.KEYID = 7
2,678,866 UART: [afmc] AUTHORITY.KEYID = 5
2,714,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,113 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,833 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,726 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,419 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,226 UART: [afmc] --
2,758,150 UART: [cold-reset] --
2,758,960 UART: [state] Locking Datavault
2,760,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,721 UART: [state] Locking ICCM
2,761,251 UART: [exit] Launching FMC @ 0x40000000
2,766,548 UART:
2,766,564 UART: Running Caliptra FMC ...
2,766,972 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,305 ready_for_fw is high
1,056,305 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,766 >>> mbox cmd response: success
2,588,841 UART:
2,588,857 UART: Running Caliptra FMC ...
2,589,265 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,835 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
890,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,873 UART: [kat] ++
895,025 UART: [kat] sha1
899,139 UART: [kat] SHA2-256
901,079 UART: [kat] SHA2-384
903,596 UART: [kat] SHA2-512-ACC
905,497 UART: [kat] ECC-384
914,924 UART: [kat] HMAC-384Kdf
919,660 UART: [kat] LMS
1,167,972 UART: [kat] --
1,169,005 UART: [cold-reset] ++
1,169,451 UART: [fht] FHT @ 0x50003400
1,172,133 UART: [idev] ++
1,172,301 UART: [idev] CDI.KEYID = 6
1,172,662 UART: [idev] SUBJECT.KEYID = 7
1,173,087 UART: [idev] UDS.KEYID = 0
1,173,433 ready_for_fw is high
1,173,433 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,057 UART: [idev] Sha1 KeyId Algorithm
1,206,949 UART: [idev] --
1,207,972 UART: [ldev] ++
1,208,140 UART: [ldev] CDI.KEYID = 6
1,208,504 UART: [ldev] SUBJECT.KEYID = 5
1,208,931 UART: [ldev] AUTHORITY.KEYID = 7
1,209,394 UART: [ldev] FE.KEYID = 1
1,214,290 UART: [ldev] Erasing FE.KEYID = 1
1,240,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,226 UART: [ldev] --
1,279,538 UART: [fwproc] Wait for Commands...
1,280,171 UART: [fwproc] Recv command 0x46574c44
1,280,904 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,794 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,807 >>> mbox cmd response: success
2,675,898 UART: [afmc] ++
2,676,066 UART: [afmc] CDI.KEYID = 6
2,676,429 UART: [afmc] SUBJECT.KEYID = 7
2,676,855 UART: [afmc] AUTHORITY.KEYID = 5
2,712,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,052 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,772 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,665 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,358 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,017 UART: [afmc] --
2,755,969 UART: [cold-reset] --
2,757,067 UART: [state] Locking Datavault
2,758,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,772 UART: [state] Locking ICCM
2,759,336 UART: [exit] Launching FMC @ 0x40000000
2,764,633 UART:
2,764,649 UART: Running Caliptra FMC ...
2,765,057 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,736 ready_for_fw is high
1,056,736 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,633 >>> mbox cmd response: success
2,588,354 UART:
2,588,370 UART: Running Caliptra FMC ...
2,588,778 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,855 UART: [kat] HMAC-384Kdf
921,663 UART: [kat] LMS
1,169,975 UART: [kat] --
1,170,964 UART: [cold-reset] ++
1,171,376 UART: [fht] FHT @ 0x50003400
1,174,102 UART: [idev] ++
1,174,270 UART: [idev] CDI.KEYID = 6
1,174,631 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,175,402 ready_for_fw is high
1,175,402 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,608 UART: [idev] Sha1 KeyId Algorithm
1,209,522 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,504 UART: [ldev] AUTHORITY.KEYID = 7
1,211,967 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,143 UART: [ldev] --
1,282,513 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,017 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,703 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,658 >>> mbox cmd response: success
2,676,859 UART: [afmc] ++
2,677,027 UART: [afmc] CDI.KEYID = 6
2,677,390 UART: [afmc] SUBJECT.KEYID = 7
2,677,816 UART: [afmc] AUTHORITY.KEYID = 5
2,713,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,939 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,659 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,552 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,245 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,062 UART: [afmc] --
2,757,150 UART: [cold-reset] --
2,758,100 UART: [state] Locking Datavault
2,759,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,063 UART: [state] Locking ICCM
2,760,687 UART: [exit] Launching FMC @ 0x40000000
2,765,984 UART:
2,766,000 UART: Running Caliptra FMC ...
2,766,408 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,335 ready_for_fw is high
1,056,335 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,748 >>> mbox cmd response: success
2,588,509 UART:
2,588,525 UART: Running Caliptra FMC ...
2,588,933 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,215,352 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,356,659 UART:
2,357,062 UART: Running Caliptra ROM ...
2,358,243 UART:
2,358,416 UART: [state] CFI Enabled
2,359,386 UART: [state] LifecycleState = Unprovisioned
2,361,042 UART: [state] DebugLocked = No
2,362,150 UART: [state] WD Timer not started. Device not locked for debugging
2,364,645 UART: [fake-rom-cold-reset] ++
2,365,750 UART: [fht] FHT @ 0x50003400
2,366,778 UART: [fwproc] Wait for Commands...
2,368,060 UART: [fwproc] Recv command 0x46574c44
2,369,487 UART: [fwproc] Recv'd Img size: 111688 bytes
3,776,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,850,784 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,960,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,546,018 >>> mbox cmd response: success
4,552,096 UART: [fake-rom-cold-reset] --
4,555,903 UART: [state] Locking Datavault
4,561,398 UART: [state] Locking PCR0, PCR1 and PCR31
4,563,589 UART: [state] Locking ICCM
4,565,279 UART: [exit] Launching FMC @ 0x40000000
4,574,105 UART:
4,574,356 UART: Running Caliptra FMC ...
4,575,508 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
2,217,573 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,358,557 UART:
2,358,950 UART: Running Caliptra ROM ...
2,360,031 UART:
2,360,186 UART: [state] CFI Enabled
2,361,533 UART: [state] LifecycleState = Unprovisioned
2,363,117 UART: [state] DebugLocked = No
2,364,145 UART: [state] WD Timer not started. Device not locked for debugging
2,366,625 UART: [fake-rom-cold-reset] ++
2,367,655 UART: [fht] FHT @ 0x50003400
2,368,633 UART: [fwproc] Wait for Commands...
2,369,924 UART: [fwproc] Recv command 0x46574c44
2,371,268 UART: [fwproc] Recv'd Img size: 111688 bytes
3,782,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,849,511 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,959,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,546,088 >>> mbox cmd response: success
4,552,150 UART: [fake-rom-cold-reset] --
4,556,688 UART: [state] Locking Datavault
4,561,589 UART: [state] Locking PCR0, PCR1 and PCR31
4,563,770 UART: [state] Locking ICCM
4,565,247 UART: [exit] Launching FMC @ 0x40000000
4,573,965 UART:
4,574,213 UART: Running Caliptra FMC ...
4,575,268 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,222,309 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,363,416 UART:
2,363,834 UART: Running Caliptra ROM ...
2,365,009 UART:
2,365,189 UART: [state] CFI Enabled
2,366,155 UART: [state] LifecycleState = Unprovisioned
2,368,164 UART: [state] DebugLocked = No
2,369,234 UART: [state] WD Timer not started. Device not locked for debugging
2,371,708 UART: [fake-rom-cold-reset] ++
2,372,815 UART: [fht] FHT @ 0x50003400
2,373,840 UART: [fwproc] Wait for Commands...
2,375,112 UART: [fwproc] Recv command 0x46574c44
2,376,530 UART: [fwproc] Recv'd Img size: 111688 bytes
3,785,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,860,207 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,970,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,555,848 >>> mbox cmd response: success
4,561,899 UART: [fake-rom-cold-reset] --
4,564,940 UART: [state] Locking Datavault
4,570,864 UART: [state] Locking PCR0, PCR1 and PCR31
4,573,055 UART: [state] Locking ICCM
4,575,819 UART: [exit] Launching FMC @ 0x40000000
4,584,610 UART:
4,584,855 UART: Running Caliptra FMC ...
4,585,907 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
2,224,339 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,365,629 UART:
2,366,053 UART: Running Caliptra ROM ...
2,367,225 UART:
2,367,400 UART: [state] CFI Enabled
2,368,376 UART: [state] LifecycleState = Unprovisioned
2,370,025 UART: [state] DebugLocked = No
2,371,130 UART: [state] WD Timer not started. Device not locked for debugging
2,373,599 UART: [fake-rom-cold-reset] ++
2,374,720 UART: [fht] FHT @ 0x50003400
2,375,750 UART: [fwproc] Wait for Commands...
2,377,026 UART: [fwproc] Recv command 0x46574c44
2,378,460 UART: [fwproc] Recv'd Img size: 111688 bytes
3,792,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,865,615 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,975,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,560,961 >>> mbox cmd response: success
4,566,990 UART: [fake-rom-cold-reset] --
4,570,664 UART: [state] Locking Datavault
4,576,835 UART: [state] Locking PCR0, PCR1 and PCR31
4,579,024 UART: [state] Locking ICCM
4,581,089 UART: [exit] Launching FMC @ 0x40000000
4,589,887 UART:
4,590,128 UART: Running Caliptra FMC ...
4,591,180 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,222,880 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,563 UART:
2,364,985 UART: Running Caliptra ROM ...
2,366,148 UART:
2,366,320 UART: [state] CFI Enabled
2,367,284 UART: [state] LifecycleState = Unprovisioned
2,368,948 UART: [state] DebugLocked = No
2,370,058 UART: [state] WD Timer not started. Device not locked for debugging
2,372,536 UART: [fake-rom-cold-reset] ++
2,373,645 UART: [fht] FHT @ 0x50003400
2,374,640 UART: [fwproc] Wait for Commands...
2,375,923 UART: [fwproc] Recv command 0x46574c44
2,377,361 UART: [fwproc] Recv'd Img size: 112032 bytes
3,824,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,901,916 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,961,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,280,880 >>> mbox cmd response: success
4,286,693 UART: [fake-rom-cold-reset] --
4,290,537 UART: [state] Locking Datavault
4,295,738 UART: [state] Locking PCR0, PCR1 and PCR31
4,297,345 UART: [state] Locking ICCM
4,299,379 UART: [exit] Launching FMC @ 0x40000000
4,307,597 UART:
4,307,856 UART: Running Caliptra FMC ...
4,308,996 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,225,828 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,367,599 UART:
2,368,031 UART: Running Caliptra ROM ...
2,369,204 UART:
2,369,383 UART: [state] CFI Enabled
2,370,351 UART: [state] LifecycleState = Unprovisioned
2,372,002 UART: [state] DebugLocked = No
2,373,115 UART: [state] WD Timer not started. Device not locked for debugging
2,375,587 UART: [fake-rom-cold-reset] ++
2,376,695 UART: [fht] FHT @ 0x50003400
2,377,730 UART: [fwproc] Wait for Commands...
2,379,017 UART: [fwproc] Recv command 0x46574c44
2,380,448 UART: [fwproc] Recv'd Img size: 112032 bytes
3,826,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,896,713 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,956,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,275,232 >>> mbox cmd response: success
4,281,070 UART: [fake-rom-cold-reset] --
4,283,048 UART: [state] Locking Datavault
4,289,042 UART: [state] Locking PCR0, PCR1 and PCR31
4,290,647 UART: [state] Locking ICCM
4,292,166 UART: [exit] Launching FMC @ 0x40000000
4,300,434 UART:
4,300,689 UART: Running Caliptra FMC ...
4,301,824 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,223,835 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,771 UART:
2,366,186 UART: Running Caliptra ROM ...
2,367,307 UART:
2,367,478 UART: [state] CFI Enabled
2,368,462 UART: [state] LifecycleState = Unprovisioned
2,370,123 UART: [state] DebugLocked = No
2,371,230 UART: [state] WD Timer not started. Device not locked for debugging
2,373,703 UART: [fake-rom-cold-reset] ++
2,374,806 UART: [fht] FHT @ 0x50003400
2,375,834 UART: [fwproc] Wait for Commands...
2,377,112 UART: [fwproc] Recv command 0x46574c44
2,378,534 UART: [fwproc] Recv'd Img size: 112032 bytes
3,821,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,894,773 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,272,231 >>> mbox cmd response: success
4,278,064 UART: [fake-rom-cold-reset] --
4,281,397 UART: [state] Locking Datavault
4,285,935 UART: [state] Locking PCR0, PCR1 and PCR31
4,287,540 UART: [state] Locking ICCM
4,288,478 UART: [exit] Launching FMC @ 0x40000000
4,296,652 UART:
4,296,900 UART: Running Caliptra FMC ...
4,297,958 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,222,678 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,397 UART:
2,364,826 UART: Running Caliptra ROM ...
2,365,991 UART:
2,366,181 UART: [state] CFI Enabled
2,367,143 UART: [state] LifecycleState = Unprovisioned
2,368,791 UART: [state] DebugLocked = No
2,369,896 UART: [state] WD Timer not started. Device not locked for debugging
2,372,372 UART: [fake-rom-cold-reset] ++
2,373,479 UART: [fht] FHT @ 0x50003400
2,374,467 UART: [fwproc] Wait for Commands...
2,375,745 UART: [fwproc] Recv command 0x46574c44
2,377,171 UART: [fwproc] Recv'd Img size: 112032 bytes
3,820,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,323 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,269,911 >>> mbox cmd response: success
4,275,782 UART: [fake-rom-cold-reset] --
4,279,848 UART: [state] Locking Datavault
4,284,641 UART: [state] Locking PCR0, PCR1 and PCR31
4,286,273 UART: [state] Locking ICCM
4,288,048 UART: [exit] Launching FMC @ 0x40000000
4,296,263 UART:
4,296,519 UART: Running Caliptra FMC ...
4,297,648 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,223,120 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,852 UART:
2,365,275 UART: Running Caliptra ROM ...
2,366,452 UART:
2,366,624 UART: [state] CFI Enabled
2,367,594 UART: [state] LifecycleState = Unprovisioned
2,369,251 UART: [state] DebugLocked = No
2,370,358 UART: [state] WD Timer not started. Device not locked for debugging
2,372,830 UART: [fake-rom-cold-reset] ++
2,373,958 UART: [fht] FHT @ 0x50003400
2,374,993 UART: [fwproc] Wait for Commands...
2,376,280 UART: [fwproc] Recv command 0x46574c44
2,377,708 UART: [fwproc] Recv'd Img size: 112032 bytes
3,821,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,895,309 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,955,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,273,967 >>> mbox cmd response: success
4,279,841 UART: [fake-rom-cold-reset] --
4,283,243 UART: [state] Locking Datavault
4,287,350 UART: [state] Locking PCR0, PCR1 and PCR31
4,288,968 UART: [state] Locking ICCM
4,290,698 UART: [exit] Launching FMC @ 0x40000000
4,298,917 UART:
4,299,181 UART: Running Caliptra FMC ...
4,300,326 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,813 writing to cptra_bootfsm_go
2,224,065 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,780 UART:
2,366,203 UART: Running Caliptra ROM ...
2,367,375 UART:
2,367,549 UART: [state] CFI Enabled
2,368,511 UART: [state] LifecycleState = Unprovisioned
2,370,159 UART: [state] DebugLocked = No
2,371,269 UART: [state] WD Timer not started. Device not locked for debugging
2,373,743 UART: [fake-rom-cold-reset] ++
2,374,868 UART: [fht] FHT @ 0x50003400
2,375,905 UART: [fwproc] Wait for Commands...
2,377,190 UART: [fwproc] Recv command 0x46574c44
2,378,617 UART: [fwproc] Recv'd Img size: 112032 bytes
3,819,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,893,912 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,953,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,271,169 >>> mbox cmd response: success
4,277,039 UART: [fake-rom-cold-reset] --
4,280,369 UART: [state] Locking Datavault
4,287,927 UART: [state] Locking PCR0, PCR1 and PCR31
4,289,538 UART: [state] Locking ICCM
4,290,635 UART: [exit] Launching FMC @ 0x40000000
4,298,856 UART:
4,299,109 UART: Running Caliptra FMC ...
4,300,247 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,222,883 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,635 UART:
2,365,055 UART: Running Caliptra ROM ...
2,366,225 UART:
2,366,397 UART: [state] CFI Enabled
2,367,360 UART: [state] LifecycleState = Unprovisioned
2,369,011 UART: [state] DebugLocked = No
2,370,116 UART: [state] WD Timer not started. Device not locked for debugging
2,372,587 UART: [fake-rom-cold-reset] ++
2,373,655 UART: [fht] FHT @ 0x50003400
2,374,633 UART: [fwproc] Wait for Commands...
2,375,916 UART: [fwproc] Recv command 0x46574c44
2,377,340 UART: [fwproc] Recv'd Img size: 112032 bytes
3,821,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,771 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,269,068 >>> mbox cmd response: success
4,274,950 UART: [fake-rom-cold-reset] --
4,278,567 UART: [state] Locking Datavault
4,282,446 UART: [state] Locking PCR0, PCR1 and PCR31
4,284,043 UART: [state] Locking ICCM
4,285,245 UART: [exit] Launching FMC @ 0x40000000
4,293,451 UART:
4,293,697 UART: Running Caliptra FMC ...
4,294,835 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,227,320 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,370,642 UART:
2,371,101 UART: Running Caliptra ROM ...
2,372,278 UART:
2,372,449 UART: [state] CFI Enabled
2,373,421 UART: [state] LifecycleState = Unprovisioned
2,375,076 UART: [state] DebugLocked = No
2,376,180 UART: [state] WD Timer not started. Device not locked for debugging
2,378,667 UART: [fake-rom-cold-reset] ++
2,379,773 UART: [fht] FHT @ 0x50003400
2,380,754 UART: [fwproc] Wait for Commands...
2,382,035 UART: [fwproc] Recv command 0x46574c44
2,383,467 UART: [fwproc] Recv'd Img size: 112032 bytes
3,836,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,908,433 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,968,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,286,823 >>> mbox cmd response: success
4,292,695 UART: [fake-rom-cold-reset] --
4,295,913 UART: [state] Locking Datavault
4,301,963 UART: [state] Locking PCR0, PCR1 and PCR31
4,303,564 UART: [state] Locking ICCM
4,305,228 UART: [exit] Launching FMC @ 0x40000000
4,313,403 UART:
4,313,694 UART: Running Caliptra FMC ...
4,314,850 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [fake-rom-cold-reset] ++
88,670 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,754 UART: [fht] FHT @ 0x50003400
92,043 UART: [fwproc] Wait for Commands...
92,702 UART: [fwproc] Recv command 0x46574c44
93,430 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,986 >>> mbox cmd response: success
1,549,144 UART: [fake-rom-cold-reset] --
1,550,006 UART: [state] Locking Datavault
1,550,973 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,577 UART: [state] Locking ICCM
1,552,129 UART: [exit] Launching FMC @ 0x40000000
1,557,426 UART:
1,557,442 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [fake-rom-cold-reset] ++
88,858 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,036 UART: [fht] FHT @ 0x50003400
92,409 UART: [fwproc] Wait for Commands...
93,052 UART: [fwproc] Recv command 0x46574c44
93,780 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,482 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,094 >>> mbox cmd response: success
1,549,252 UART: [fake-rom-cold-reset] --
1,549,846 UART: [state] Locking Datavault
1,550,801 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,405 UART: [state] Locking ICCM
1,552,063 UART: [exit] Launching FMC @ 0x40000000
1,557,360 UART:
1,557,376 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [fake-rom-cold-reset] ++
88,841 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,935 UART: [fht] FHT @ 0x50003400
92,162 UART: [fwproc] Wait for Commands...
92,889 UART: [fwproc] Recv command 0x46574c44
93,617 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,649 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,299 >>> mbox cmd response: success
1,549,457 UART: [fake-rom-cold-reset] --
1,550,313 UART: [state] Locking Datavault
1,551,572 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,176 UART: [state] Locking ICCM
1,552,836 UART: [exit] Launching FMC @ 0x40000000
1,558,133 UART:
1,558,149 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [fake-rom-cold-reset] ++
89,095 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,385 UART: [fht] FHT @ 0x50003400
92,658 UART: [fwproc] Wait for Commands...
93,385 UART: [fwproc] Recv command 0x46574c44
94,113 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,913 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,461 >>> mbox cmd response: success
1,549,619 UART: [fake-rom-cold-reset] --
1,550,391 UART: [state] Locking Datavault
1,551,558 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,162 UART: [state] Locking ICCM
1,552,704 UART: [exit] Launching FMC @ 0x40000000
1,558,001 UART:
1,558,017 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [fake-rom-cold-reset] ++
88,682 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,876 UART: [fht] FHT @ 0x50003400
92,325 UART: [fwproc] Wait for Commands...
93,132 UART: [fwproc] Recv command 0x46574c44
93,860 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,518 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,118 >>> mbox cmd response: success
1,550,276 UART: [fake-rom-cold-reset] --
1,551,274 UART: [state] Locking Datavault
1,552,567 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,171 UART: [state] Locking ICCM
1,553,699 UART: [exit] Launching FMC @ 0x40000000
1,558,996 UART:
1,559,012 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
88,186 UART: [fake-rom-cold-reset] ++
89,114 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,404 UART: [fht] FHT @ 0x50003400
92,733 UART: [fwproc] Wait for Commands...
93,522 UART: [fwproc] Recv command 0x46574c44
94,250 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,388,002 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,734 >>> mbox cmd response: success
1,550,892 UART: [fake-rom-cold-reset] --
1,551,532 UART: [state] Locking Datavault
1,552,891 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,495 UART: [state] Locking ICCM
1,553,965 UART: [exit] Launching FMC @ 0x40000000
1,559,262 UART:
1,559,278 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,023 UART: [state] WD Timer not started. Device not locked for debugging
88,505 UART: [fake-rom-cold-reset] ++
89,433 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,519 UART: [fht] FHT @ 0x50003400
92,964 UART: [fwproc] Wait for Commands...
93,787 UART: [fwproc] Recv command 0x46574c44
94,515 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,629 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,301 >>> mbox cmd response: success
1,550,459 UART: [fake-rom-cold-reset] --
1,551,227 UART: [state] Locking Datavault
1,552,538 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,142 UART: [state] Locking ICCM
1,553,626 UART: [exit] Launching FMC @ 0x40000000
1,558,923 UART:
1,558,939 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [fake-rom-cold-reset] ++
88,821 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,147 UART: [fht] FHT @ 0x50003400
92,438 UART: [fwproc] Wait for Commands...
93,211 UART: [fwproc] Recv command 0x46574c44
93,939 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,121 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,867 >>> mbox cmd response: success
1,550,025 UART: [fake-rom-cold-reset] --
1,550,613 UART: [state] Locking Datavault
1,552,134 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,738 UART: [state] Locking ICCM
1,553,344 UART: [exit] Launching FMC @ 0x40000000
1,558,641 UART:
1,558,657 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [fake-rom-cold-reset] ++
88,610 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,778 UART: [fht] FHT @ 0x50003400
92,165 UART: [fwproc] Wait for Commands...
92,848 UART: [fwproc] Recv command 0x46574c44
93,576 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,318 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,996 >>> mbox cmd response: success
1,550,154 UART: [fake-rom-cold-reset] --
1,550,764 UART: [state] Locking Datavault
1,552,001 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,605 UART: [state] Locking ICCM
1,553,169 UART: [exit] Launching FMC @ 0x40000000
1,558,466 UART:
1,558,482 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [fake-rom-cold-reset] ++
88,858 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,022 UART: [fht] FHT @ 0x50003400
92,321 UART: [fwproc] Wait for Commands...
93,000 UART: [fwproc] Recv command 0x46574c44
93,728 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,848 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,560 >>> mbox cmd response: success
1,549,718 UART: [fake-rom-cold-reset] --
1,550,338 UART: [state] Locking Datavault
1,551,383 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,987 UART: [state] Locking ICCM
1,552,469 UART: [exit] Launching FMC @ 0x40000000
1,557,766 UART:
1,557,782 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,409 UART: [fake-rom-cold-reset] ++
88,337 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,521 UART: [fht] FHT @ 0x50003400
91,838 UART: [fwproc] Wait for Commands...
92,547 UART: [fwproc] Recv command 0x46574c44
93,275 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,867 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,639 >>> mbox cmd response: success
1,549,797 UART: [fake-rom-cold-reset] --
1,550,699 UART: [state] Locking Datavault
1,551,626 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,230 UART: [state] Locking ICCM
1,552,872 UART: [exit] Launching FMC @ 0x40000000
1,558,169 UART:
1,558,185 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [fake-rom-cold-reset] ++
88,695 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,953 UART: [fht] FHT @ 0x50003400
92,294 UART: [fwproc] Wait for Commands...
93,139 UART: [fwproc] Recv command 0x46574c44
93,867 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,975 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,567 >>> mbox cmd response: success
1,550,725 UART: [fake-rom-cold-reset] --
1,551,569 UART: [state] Locking Datavault
1,552,756 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,360 UART: [state] Locking ICCM
1,554,028 UART: [exit] Launching FMC @ 0x40000000
1,559,325 UART:
1,559,341 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,260 UART:
192,623 UART: Running Caliptra ROM ...
193,853 UART:
194,001 UART: [state] CFI Enabled
264,084 UART: [state] LifecycleState = Production
266,299 UART: [state] DebugLocked = No
268,055 UART: [state] WD Timer not started. Device not locked for debugging
274,180 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,116 UART:
192,483 UART: Running Caliptra ROM ...
193,734 UART:
193,888 UART: [state] CFI Enabled
265,201 UART: [state] LifecycleState = Production
267,418 UART: [state] DebugLocked = No
270,417 UART: [state] WD Timer not started. Device not locked for debugging
276,180 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,402 UART:
192,782 UART: Running Caliptra ROM ...
193,979 UART:
604,053 UART: [state] CFI Enabled
618,796 UART: [state] LifecycleState = Production
621,030 UART: [state] DebugLocked = No
623,598 UART: [state] WD Timer not started. Device not locked for debugging
630,014 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
192,664 UART:
193,024 UART: Running Caliptra ROM ...
194,265 UART:
604,202 UART: [state] CFI Enabled
617,304 UART: [state] LifecycleState = Production
619,536 UART: [state] DebugLocked = No
622,650 UART: [state] WD Timer not started. Device not locked for debugging
628,313 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,210 UART:
192,586 UART: Running Caliptra ROM ...
193,687 UART:
193,832 UART: [state] CFI Enabled
264,071 UART: [state] LifecycleState = Production
265,750 UART: [state] DebugLocked = No
267,235 UART: [state] WD Timer not started. Device not locked for debugging
271,249 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
192,232 UART:
192,642 UART: Running Caliptra ROM ...
193,766 UART:
193,914 UART: [state] CFI Enabled
264,346 UART: [state] LifecycleState = Production
265,998 UART: [state] DebugLocked = No
267,713 UART: [state] WD Timer not started. Device not locked for debugging
273,682 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,519 UART:
192,961 UART: Running Caliptra ROM ...
194,094 UART:
603,784 UART: [state] CFI Enabled
618,674 UART: [state] LifecycleState = Production
620,260 UART: [state] DebugLocked = No
622,282 UART: [state] WD Timer not started. Device not locked for debugging
626,947 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,378 UART:
192,770 UART: Running Caliptra ROM ...
193,897 UART:
603,572 UART: [state] CFI Enabled
619,179 UART: [state] LifecycleState = Production
620,844 UART: [state] DebugLocked = No
623,406 UART: [state] WD Timer not started. Device not locked for debugging
627,315 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,307 UART:
192,678 UART: Running Caliptra ROM ...
193,817 UART:
193,963 UART: [state] CFI Enabled
261,586 UART: [state] LifecycleState = Production
263,237 UART: [state] DebugLocked = No
265,369 UART: [state] WD Timer not started. Device not locked for debugging
269,546 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,318 UART:
192,672 UART: Running Caliptra ROM ...
193,877 UART:
194,035 UART: [state] CFI Enabled
267,182 UART: [state] LifecycleState = Production
268,801 UART: [state] DebugLocked = No
270,826 UART: [state] WD Timer not started. Device not locked for debugging
275,170 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,491 UART:
192,855 UART: Running Caliptra ROM ...
194,038 UART:
603,745 UART: [state] CFI Enabled
619,883 UART: [state] LifecycleState = Production
621,470 UART: [state] DebugLocked = No
623,535 UART: [state] WD Timer not started. Device not locked for debugging
627,870 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,416 UART:
192,779 UART: Running Caliptra ROM ...
193,904 UART:
603,493 UART: [state] CFI Enabled
616,375 UART: [state] LifecycleState = Production
617,948 UART: [state] DebugLocked = No
619,475 UART: [state] WD Timer not started. Device not locked for debugging
623,486 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Production
85,765 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,922 UART: [state] LifecycleState = Production
86,537 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Production
86,406 UART: [state] DebugLocked = No
87,075 UART: [state] WD Timer not started. Device not locked for debugging
88,598 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Production
86,226 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,276 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Production
85,933 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Production
86,177 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,986 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Production
85,978 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Production
85,273 UART: [state] DebugLocked = No
85,986 UART: [state] WD Timer not started. Device not locked for debugging
87,321 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Production
85,365 UART: [state] DebugLocked = No
85,996 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Production
86,196 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,290 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Production
86,022 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,187 UART:
192,555 UART: Running Caliptra ROM ...
193,789 UART:
193,941 UART: [state] CFI Enabled
265,414 UART: [state] LifecycleState = Production
267,652 UART: Fake ROM in Prod lifecycle disabled
269,646 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
191,970 UART:
192,408 UART: Running Caliptra ROM ...
193,539 UART:
193,685 UART: [state] CFI Enabled
262,743 UART: [state] LifecycleState = Production
264,968 UART: Fake ROM in Prod lifecycle disabled
266,967 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,497 UART:
192,888 UART: Running Caliptra ROM ...
194,075 UART:
604,140 UART: [state] CFI Enabled
618,661 UART: [state] LifecycleState = Production
620,881 UART: Fake ROM in Prod lifecycle disabled
622,880 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,488 UART:
192,887 UART: Running Caliptra ROM ...
194,981 UART:
603,953 UART: [state] CFI Enabled
616,698 UART: [state] LifecycleState = Production
618,952 UART: Fake ROM in Prod lifecycle disabled
620,943 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,191 UART:
192,562 UART: Running Caliptra ROM ...
193,746 UART:
193,899 UART: [state] CFI Enabled
260,119 UART: [state] LifecycleState = Production
261,794 UART: Fake ROM in Prod lifecycle disabled
263,292 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,380 UART:
192,745 UART: Running Caliptra ROM ...
193,938 UART:
194,096 UART: [state] CFI Enabled
261,220 UART: [state] LifecycleState = Production
262,867 UART: Fake ROM in Prod lifecycle disabled
264,373 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,525 UART:
192,909 UART: Running Caliptra ROM ...
194,094 UART:
603,646 UART: [state] CFI Enabled
618,857 UART: [state] LifecycleState = Production
620,474 UART: Fake ROM in Prod lifecycle disabled
621,975 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,306 UART:
192,775 UART: Running Caliptra ROM ...
193,888 UART:
603,299 UART: [state] CFI Enabled
615,185 UART: [state] LifecycleState = Production
616,788 UART: Fake ROM in Prod lifecycle disabled
618,287 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,243 UART:
192,624 UART: Running Caliptra ROM ...
193,810 UART:
193,957 UART: [state] CFI Enabled
263,123 UART: [state] LifecycleState = Production
264,804 UART: Fake ROM in Prod lifecycle disabled
266,329 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,218 UART:
192,588 UART: Running Caliptra ROM ...
193,774 UART:
193,930 UART: [state] CFI Enabled
263,709 UART: [state] LifecycleState = Production
265,384 UART: Fake ROM in Prod lifecycle disabled
266,887 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,497 UART:
192,877 UART: Running Caliptra ROM ...
194,059 UART:
603,374 UART: [state] CFI Enabled
618,424 UART: [state] LifecycleState = Production
620,059 UART: Fake ROM in Prod lifecycle disabled
621,555 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,249 UART:
192,671 UART: Running Caliptra ROM ...
193,820 UART:
603,211 UART: [state] CFI Enabled
618,019 UART: [state] LifecycleState = Production
619,667 UART: Fake ROM in Prod lifecycle disabled
621,084 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Production
85,324 UART: Fake ROM in Prod lifecycle disabled
85,918 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Production
85,732 UART: Fake ROM in Prod lifecycle disabled
86,326 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Production
86,129 UART: Fake ROM in Prod lifecycle disabled
86,723 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Production
86,329 UART: Fake ROM in Prod lifecycle disabled
86,923 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: Fake ROM in Prod lifecycle disabled
86,624 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Production
85,694 UART: Fake ROM in Prod lifecycle disabled
86,288 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Production
85,885 UART: Fake ROM in Prod lifecycle disabled
86,479 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Production
85,549 UART: Fake ROM in Prod lifecycle disabled
86,143 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,530 UART: [state] LifecycleState = Production
85,138 UART: Fake ROM in Prod lifecycle disabled
85,732 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Production
85,746 UART: Fake ROM in Prod lifecycle disabled
86,340 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,853 UART: [state] LifecycleState = Production
85,461 UART: Fake ROM in Prod lifecycle disabled
86,055 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Production
85,623 UART: Fake ROM in Prod lifecycle disabled
86,217 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,350 writing to cptra_bootfsm_go
2,216,379 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,357,702 UART:
2,358,110 UART: Running Caliptra ROM ...
2,359,274 UART:
2,359,442 UART: [state] CFI Enabled
2,360,400 UART: [state] LifecycleState = Unprovisioned
2,362,052 UART: [state] DebugLocked = No
2,363,159 UART: [state] WD Timer not started. Device not locked for debugging
2,365,631 UART: [fake-rom-cold-reset] ++
2,366,735 UART: [fht] FHT @ 0x50003400
2,367,762 UART: [fwproc] Wait for Commands...
2,369,066 UART: [fwproc] Recv command 0x46574c44
2,370,499 UART: [fwproc] Recv'd Img size: 111688 bytes
3,783,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,861,267 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,971,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,557,097 >>> mbox cmd response: success
4,563,185 UART: [fake-rom-cold-reset] --
4,565,664 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,705,899 UART: [state] Locking Datavault
4,707,151 UART: [state] Locking PCR0, PCR1 and PCR31
4,708,702 UART: [state] Locking ICCM
4,709,619 UART: [exit] Launching FMC @ 0x40000000
4,711,047 UART:
4,711,213 UART: Running Caliptra FMC ...
4,712,317 UART:
4,712,476 UART: [fmc] Received command: 0x46574C44
4,713,961 UART:
4,714,117 UART: Running Caliptra ROM ...
4,715,222 UART:
4,715,377 UART: [state] CFI Enabled
4,767,344 UART: [state] LifecycleState = Unprovisioned
4,769,780 UART: [state] DebugLocked = No
4,772,496 UART: [state] WD Timer not started. Device not locked for debugging
4,778,506 UART: [update-reset] ++
6,226,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,230,280 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,874,225 UART: [update-reset] Copying MAN_2 To MAN_1
6,897,122 UART: [update-reset Success] --
6,898,801 >>> mbox cmd response: success
6,899,038 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,900,881 UART: [state] Locking Datavault
6,903,333 UART: [state] Locking PCR0, PCR1 and PCR31
6,905,498 UART: [state] Locking ICCM
6,908,088 UART: [exit] Launching FMC @ 0x40000000
6,916,919 UART:
6,917,151 UART: Running Caliptra FMC ...
6,918,251 UART:
6,918,411 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,920,041 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,215,350 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,356,448 UART:
2,356,855 UART: Running Caliptra ROM ...
2,358,027 UART:
2,358,205 UART: [state] CFI Enabled
2,359,161 UART: [state] LifecycleState = Unprovisioned
2,360,816 UART: [state] DebugLocked = No
2,361,918 UART: [state] WD Timer not started. Device not locked for debugging
2,364,745 UART: [fake-rom-cold-reset] ++
2,365,895 UART: [fht] FHT @ 0x50003400
2,366,937 UART: [fwproc] Wait for Commands...
2,368,227 UART: [fwproc] Recv command 0x46574c44
2,369,655 UART: [fwproc] Recv'd Img size: 111688 bytes
3,782,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,863,786 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,973,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,559,955 >>> mbox cmd response: success
4,565,991 UART: [fake-rom-cold-reset] --
4,568,528 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,708,903 UART: [state] Locking Datavault
4,710,172 UART: [state] Locking PCR0, PCR1 and PCR31
4,711,648 UART: [state] Locking ICCM
4,712,523 UART: [exit] Launching FMC @ 0x40000000
4,713,955 UART:
4,714,113 UART: Running Caliptra FMC ...
4,715,150 UART:
4,715,297 UART: [fmc] Received command: 0x46574C44
4,716,763 UART:
4,716,920 UART: Running Caliptra ROM ...
4,717,934 UART:
4,718,081 UART: [state] CFI Enabled
4,792,599 UART: [state] LifecycleState = Unprovisioned
4,794,973 UART: [state] DebugLocked = No
4,796,829 UART: [state] WD Timer not started. Device not locked for debugging
4,803,012 UART: [update-reset] ++
6,246,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,250,091 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,894,092 UART: [update-reset] Copying MAN_2 To MAN_1
6,917,007 UART: [update-reset Success] --
6,918,668 >>> mbox cmd response: success
6,918,897 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,921,568 UART: [state] Locking Datavault
6,924,773 UART: [state] Locking PCR0, PCR1 and PCR31
6,926,995 UART: [state] Locking ICCM
6,928,511 UART: [exit] Launching FMC @ 0x40000000
6,937,296 UART:
6,937,530 UART: Running Caliptra FMC ...
6,938,630 UART:
6,938,788 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,940,419 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,228,529 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,369,867 UART:
2,370,333 UART: Running Caliptra ROM ...
2,371,417 UART:
2,371,565 UART: [state] CFI Enabled
2,372,430 UART: [state] LifecycleState = Unprovisioned
2,374,116 UART: [state] DebugLocked = No
2,375,226 UART: [state] WD Timer not started. Device not locked for debugging
2,377,702 UART: [fake-rom-cold-reset] ++
2,378,802 UART: [fht] FHT @ 0x50003400
2,379,831 UART: [fwproc] Wait for Commands...
2,381,111 UART: [fwproc] Recv command 0x46574c44
2,382,535 UART: [fwproc] Recv'd Img size: 111688 bytes
3,790,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,867,881 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,977,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,563,849 >>> mbox cmd response: success
4,569,875 UART: [fake-rom-cold-reset] --
4,572,455 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,712,737 UART: [state] Locking Datavault
4,714,001 UART: [state] Locking PCR0, PCR1 and PCR31
4,715,474 UART: [state] Locking ICCM
4,716,364 UART: [exit] Launching FMC @ 0x40000000
4,717,786 UART:
4,717,938 UART: Running Caliptra FMC ...
4,718,943 UART:
4,719,077 UART: [fmc] Received command: 0x46574C44
4,720,541 UART:
4,720,686 UART: Running Caliptra ROM ...
4,721,692 UART:
4,721,827 UART: [state] CFI Enabled
4,729,728 UART: [state] LifecycleState = Unprovisioned
4,732,090 UART: [state] DebugLocked = No
4,735,416 UART: [state] WD Timer not started. Device not locked for debugging
4,741,966 UART: [update-reset] ++
6,189,160 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,192,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,836,689 UART: [update-reset] Copying MAN_2 To MAN_1
6,859,578 UART: [update-reset Success] --
6,861,267 >>> mbox cmd response: success
6,861,483 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,864,007 UART: [state] Locking Datavault
6,867,814 UART: [state] Locking PCR0, PCR1 and PCR31
6,869,951 UART: [state] Locking ICCM
6,872,152 UART: [exit] Launching FMC @ 0x40000000
6,880,984 UART:
6,881,208 UART: Running Caliptra FMC ...
6,882,305 UART:
6,882,454 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,884,073 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,219,285 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,360,751 UART:
2,361,166 UART: Running Caliptra ROM ...
2,362,258 UART:
2,362,412 UART: [state] CFI Enabled
2,363,313 UART: [state] LifecycleState = Unprovisioned
2,364,965 UART: [state] DebugLocked = No
2,365,988 UART: [state] WD Timer not started. Device not locked for debugging
2,368,450 UART: [fake-rom-cold-reset] ++
2,369,475 UART: [fht] FHT @ 0x50003400
2,370,442 UART: [fwproc] Wait for Commands...
2,371,743 UART: [fwproc] Recv command 0x46574c44
2,373,086 UART: [fwproc] Recv'd Img size: 111688 bytes
3,787,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,867,626 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,977,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,563,364 >>> mbox cmd response: success
4,569,447 UART: [fake-rom-cold-reset] --
4,571,927 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,712,283 UART: [state] Locking Datavault
4,713,539 UART: [state] Locking PCR0, PCR1 and PCR31
4,715,096 UART: [state] Locking ICCM
4,716,009 UART: [exit] Launching FMC @ 0x40000000
4,717,435 UART:
4,717,589 UART: Running Caliptra FMC ...
4,718,682 UART:
4,718,835 UART: [fmc] Received command: 0x46574C44
4,720,307 UART:
4,720,460 UART: Running Caliptra ROM ...
4,721,551 UART:
4,721,703 UART: [state] CFI Enabled
4,730,127 UART: [state] LifecycleState = Unprovisioned
4,732,442 UART: [state] DebugLocked = No
4,734,575 UART: [state] WD Timer not started. Device not locked for debugging
4,740,973 UART: [update-reset] ++
6,186,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,190,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,833,392 UART: [update-reset] Copying MAN_2 To MAN_1
6,856,315 UART: [update-reset Success] --
6,857,953 >>> mbox cmd response: success
6,858,180 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,861,740 UART: [state] Locking Datavault
6,865,115 UART: [state] Locking PCR0, PCR1 and PCR31
6,867,277 UART: [state] Locking ICCM
6,869,518 UART: [exit] Launching FMC @ 0x40000000
6,878,295 UART:
6,878,534 UART: Running Caliptra FMC ...
6,879,633 UART:
6,879,786 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,881,406 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,217,161 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,358,806 UART:
2,359,246 UART: Running Caliptra ROM ...
2,360,412 UART:
2,360,583 UART: [state] CFI Enabled
2,361,561 UART: [state] LifecycleState = Unprovisioned
2,363,210 UART: [state] DebugLocked = No
2,364,321 UART: [state] WD Timer not started. Device not locked for debugging
2,366,788 UART: [fake-rom-cold-reset] ++
2,367,900 UART: [fht] FHT @ 0x50003400
2,368,935 UART: [fwproc] Wait for Commands...
2,370,220 UART: [fwproc] Recv command 0x46574c44
2,371,659 UART: [fwproc] Recv'd Img size: 112032 bytes
3,817,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,269,885 >>> mbox cmd response: success
4,275,705 UART: [fake-rom-cold-reset] --
4,277,824 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,418,404 UART: [state] Locking Datavault
4,419,822 UART: [state] Locking PCR0, PCR1 and PCR31
4,421,292 UART: [state] Locking ICCM
4,422,214 UART: [exit] Launching FMC @ 0x40000000
4,423,649 UART:
4,423,806 UART: Running Caliptra FMC ...
4,424,819 UART:
4,424,963 UART: [fmc] Received command: 0x46574C44
4,426,422 UART:
4,426,580 UART: Running Caliptra ROM ...
4,427,680 UART:
4,427,836 UART: [state] CFI Enabled
4,487,972 UART: [state] LifecycleState = Unprovisioned
4,489,706 UART: [state] DebugLocked = No
4,492,056 UART: [state] WD Timer not started. Device not locked for debugging
4,497,364 UART: [update-reset] ++
5,964,264 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,967,508 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,343,035 UART: [update-reset] Copying MAN_2 To MAN_1
6,365,307 UART: [update-reset Success] --
6,366,603 >>> mbox cmd response: success
6,366,831 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,369,050 UART: [state] Locking Datavault
6,372,196 UART: [state] Locking PCR0, PCR1 and PCR31
6,373,739 UART: [state] Locking ICCM
6,374,728 UART: [exit] Launching FMC @ 0x40000000
6,382,960 UART:
6,383,205 UART: Running Caliptra FMC ...
6,384,251 UART:
6,384,401 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,386,031 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,218,713 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,360,492 UART:
2,360,944 UART: Running Caliptra ROM ...
2,362,020 UART:
2,362,204 UART: [state] CFI Enabled
2,363,138 UART: [state] LifecycleState = Unprovisioned
2,364,788 UART: [state] DebugLocked = No
2,365,821 UART: [state] WD Timer not started. Device not locked for debugging
2,368,286 UART: [fake-rom-cold-reset] ++
2,369,313 UART: [fht] FHT @ 0x50003400
2,370,284 UART: [fwproc] Wait for Commands...
2,371,573 UART: [fwproc] Recv command 0x46574c44
2,372,919 UART: [fwproc] Recv'd Img size: 112032 bytes
3,815,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,047 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,265,869 >>> mbox cmd response: success
4,271,691 UART: [fake-rom-cold-reset] --
4,274,051 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,414,662 UART: [state] Locking Datavault
4,415,944 UART: [state] Locking PCR0, PCR1 and PCR31
4,417,500 UART: [state] Locking ICCM
4,418,409 UART: [exit] Launching FMC @ 0x40000000
4,419,836 UART:
4,420,000 UART: Running Caliptra FMC ...
4,421,105 UART:
4,421,262 UART: [fmc] Received command: 0x46574C44
4,422,719 UART:
4,422,876 UART: Running Caliptra ROM ...
4,423,973 UART:
4,424,130 UART: [state] CFI Enabled
4,488,313 UART: [state] LifecycleState = Unprovisioned
4,490,083 UART: [state] DebugLocked = No
4,491,198 UART: [state] WD Timer not started. Device not locked for debugging
4,496,069 UART: [update-reset] ++
5,969,886 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,973,926 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,349,942 UART: [update-reset] Copying MAN_2 To MAN_1
6,372,223 UART: [update-reset Success] --
6,373,523 >>> mbox cmd response: success
6,373,741 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,375,620 UART: [state] Locking Datavault
6,378,070 UART: [state] Locking PCR0, PCR1 and PCR31
6,379,613 UART: [state] Locking ICCM
6,382,142 UART: [exit] Launching FMC @ 0x40000000
6,390,320 UART:
6,390,561 UART: Running Caliptra FMC ...
6,391,664 UART:
6,391,822 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,393,454 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,221,480 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,212 UART:
2,363,636 UART: Running Caliptra ROM ...
2,364,808 UART:
2,364,984 UART: [state] CFI Enabled
2,365,975 UART: [state] LifecycleState = Unprovisioned
2,367,622 UART: [state] DebugLocked = No
2,368,727 UART: [state] WD Timer not started. Device not locked for debugging
2,371,197 UART: [fake-rom-cold-reset] ++
2,372,297 UART: [fht] FHT @ 0x50003400
2,373,326 UART: [fwproc] Wait for Commands...
2,374,603 UART: [fwproc] Recv command 0x46574c44
2,376,026 UART: [fwproc] Recv'd Img size: 112032 bytes
3,822,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,900,068 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,960,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,279,111 >>> mbox cmd response: success
4,284,933 UART: [fake-rom-cold-reset] --
4,286,991 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,427,645 UART: [state] Locking Datavault
4,428,900 UART: [state] Locking PCR0, PCR1 and PCR31
4,430,450 UART: [state] Locking ICCM
4,431,370 UART: [exit] Launching FMC @ 0x40000000
4,432,799 UART:
4,432,957 UART: Running Caliptra FMC ...
4,434,052 UART:
4,434,212 UART: [fmc] Received command: 0x46574C44
4,435,667 UART:
4,435,821 UART: Running Caliptra ROM ...
4,436,917 UART:
4,437,279 UART: [state] CFI Enabled
4,443,688 UART: [state] LifecycleState = Unprovisioned
4,445,435 UART: [state] DebugLocked = No
4,446,761 UART: [state] WD Timer not started. Device not locked for debugging
4,454,984 UART: [update-reset] ++
5,933,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,937,542 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,312,510 UART: [update-reset] Copying MAN_2 To MAN_1
6,334,722 UART: [update-reset Success] --
6,335,993 >>> mbox cmd response: success
6,336,210 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,339,930 UART: [state] Locking Datavault
6,344,159 UART: [state] Locking PCR0, PCR1 and PCR31
6,345,707 UART: [state] Locking ICCM
6,347,052 UART: [exit] Launching FMC @ 0x40000000
6,355,291 UART:
6,355,526 UART: Running Caliptra FMC ...
6,356,627 UART:
6,356,799 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,358,660 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,221,465 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,211 UART:
2,363,613 UART: Running Caliptra ROM ...
2,364,701 UART:
2,364,857 UART: [state] CFI Enabled
2,365,836 UART: [state] LifecycleState = Unprovisioned
2,367,488 UART: [state] DebugLocked = No
2,368,519 UART: [state] WD Timer not started. Device not locked for debugging
2,370,983 UART: [fake-rom-cold-reset] ++
2,372,010 UART: [fht] FHT @ 0x50003400
2,372,988 UART: [fwproc] Wait for Commands...
2,374,266 UART: [fwproc] Recv command 0x46574c44
2,375,614 UART: [fwproc] Recv'd Img size: 112032 bytes
3,820,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,895,742 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,955,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,274,061 >>> mbox cmd response: success
4,279,882 UART: [fake-rom-cold-reset] --
4,282,016 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,422,718 UART: [state] Locking Datavault
4,423,981 UART: [state] Locking PCR0, PCR1 and PCR31
4,425,451 UART: [state] Locking ICCM
4,426,326 UART: [exit] Launching FMC @ 0x40000000
4,427,770 UART:
4,427,931 UART: Running Caliptra FMC ...
4,429,036 UART:
4,429,196 UART: [fmc] Received command: 0x46574C44
4,430,653 UART:
4,430,804 UART: Running Caliptra ROM ...
4,431,839 UART:
4,431,986 UART: [state] CFI Enabled
4,440,955 UART: [state] LifecycleState = Unprovisioned
4,442,666 UART: [state] DebugLocked = No
4,444,880 UART: [state] WD Timer not started. Device not locked for debugging
4,451,308 UART: [update-reset] ++
5,925,249 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,928,573 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,304,061 UART: [update-reset] Copying MAN_2 To MAN_1
6,326,265 UART: [update-reset Success] --
6,327,544 >>> mbox cmd response: success
6,327,758 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,329,807 UART: [state] Locking Datavault
6,332,840 UART: [state] Locking PCR0, PCR1 and PCR31
6,334,575 UART: [state] Locking ICCM
6,336,059 UART: [exit] Launching FMC @ 0x40000000
6,344,257 UART:
6,344,500 UART: Running Caliptra FMC ...
6,345,600 UART:
6,345,753 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,347,375 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,224,556 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,366,915 UART:
2,367,337 UART: Running Caliptra ROM ...
2,368,509 UART:
2,368,696 UART: [state] CFI Enabled
2,369,683 UART: [state] LifecycleState = Unprovisioned
2,371,328 UART: [state] DebugLocked = No
2,372,439 UART: [state] WD Timer not started. Device not locked for debugging
2,374,910 UART: [fake-rom-cold-reset] ++
2,376,020 UART: [fht] FHT @ 0x50003400
2,377,055 UART: [fwproc] Wait for Commands...
2,378,341 UART: [fwproc] Recv command 0x46574c44
2,379,775 UART: [fwproc] Recv'd Img size: 112032 bytes
3,825,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,902,928 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,962,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,281,450 >>> mbox cmd response: success
4,287,330 UART: [fake-rom-cold-reset] --
4,289,463 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,430,639 UART: [state] Locking Datavault
4,431,917 UART: [state] Locking PCR0, PCR1 and PCR31
4,433,391 UART: [state] Locking ICCM
4,434,299 UART: [exit] Launching FMC @ 0x40000000
4,435,640 UART:
4,435,787 UART: Running Caliptra FMC ...
4,436,800 UART:
4,436,943 UART: [fmc] Received command: 0x46574C44
4,438,426 UART:
4,438,579 UART: Running Caliptra ROM ...
4,439,594 UART:
4,439,739 UART: [state] CFI Enabled
4,507,944 UART: [state] LifecycleState = Unprovisioned
4,509,658 UART: [state] DebugLocked = No
4,510,871 UART: [state] WD Timer not started. Device not locked for debugging
4,516,021 UART: [update-reset] ++
5,996,777 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,999,945 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,375,289 UART: [update-reset] Copying MAN_2 To MAN_1
6,397,503 UART: [update-reset Success] --
6,398,784 >>> mbox cmd response: success
6,398,999 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,401,741 UART: [state] Locking Datavault
6,405,807 UART: [state] Locking PCR0, PCR1 and PCR31
6,407,345 UART: [state] Locking ICCM
6,408,711 UART: [exit] Launching FMC @ 0x40000000
6,416,941 UART:
6,417,177 UART: Running Caliptra FMC ...
6,418,204 UART:
6,418,351 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,420,016 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,234,390 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,376,185 UART:
2,376,600 UART: Running Caliptra ROM ...
2,377,775 UART:
2,377,961 UART: [state] CFI Enabled
2,378,946 UART: [state] LifecycleState = Unprovisioned
2,380,593 UART: [state] DebugLocked = No
2,381,701 UART: [state] WD Timer not started. Device not locked for debugging
2,384,176 UART: [fake-rom-cold-reset] ++
2,385,279 UART: [fht] FHT @ 0x50003400
2,386,310 UART: [fwproc] Wait for Commands...
2,387,592 UART: [fwproc] Recv command 0x46574c44
2,389,021 UART: [fwproc] Recv'd Img size: 112032 bytes
3,836,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,908,447 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,968,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,286,913 >>> mbox cmd response: success
4,292,726 UART: [fake-rom-cold-reset] --
4,294,802 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,435,599 UART: [state] Locking Datavault
4,436,874 UART: [state] Locking PCR0, PCR1 and PCR31
4,438,431 UART: [state] Locking ICCM
4,439,355 UART: [exit] Launching FMC @ 0x40000000
4,440,784 UART:
4,440,944 UART: Running Caliptra FMC ...
4,442,042 UART:
4,442,206 UART: [fmc] Received command: 0x46574C44
4,443,676 UART:
4,443,836 UART: Running Caliptra ROM ...
4,444,936 UART:
4,445,093 UART: [state] CFI Enabled
4,509,324 UART: [state] LifecycleState = Unprovisioned
4,511,526 UART: [state] DebugLocked = No
4,513,246 UART: [state] WD Timer not started. Device not locked for debugging
4,518,609 UART: [update-reset] ++
5,993,390 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,995,856 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,371,778 UART: [update-reset] Copying MAN_2 To MAN_1
6,394,047 UART: [update-reset Success] --
6,395,326 >>> mbox cmd response: success
6,395,541 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,398,339 UART: [state] Locking Datavault
6,402,950 UART: [state] Locking PCR0, PCR1 and PCR31
6,404,550 UART: [state] Locking ICCM
6,406,487 UART: [exit] Launching FMC @ 0x40000000
6,414,669 UART:
6,414,905 UART: Running Caliptra FMC ...
6,415,959 UART:
6,416,111 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,417,745 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
2,223,525 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,915 UART:
2,365,304 UART: Running Caliptra ROM ...
2,366,380 UART:
2,366,534 UART: [state] CFI Enabled
2,367,514 UART: [state] LifecycleState = Unprovisioned
2,369,164 UART: [state] DebugLocked = No
2,370,271 UART: [state] WD Timer not started. Device not locked for debugging
2,372,748 UART: [fake-rom-cold-reset] ++
2,373,849 UART: [fht] FHT @ 0x50003400
2,374,896 UART: [fwproc] Wait for Commands...
2,376,176 UART: [fwproc] Recv command 0x46574c44
2,377,605 UART: [fwproc] Recv'd Img size: 112032 bytes
3,825,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,894,147 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,272,693 >>> mbox cmd response: success
4,278,559 UART: [fake-rom-cold-reset] --
4,280,703 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,421,403 UART: [state] Locking Datavault
4,422,660 UART: [state] Locking PCR0, PCR1 and PCR31
4,424,127 UART: [state] Locking ICCM
4,425,000 UART: [exit] Launching FMC @ 0x40000000
4,426,443 UART:
4,426,600 UART: Running Caliptra FMC ...
4,427,696 UART:
4,427,873 UART: [fmc] Received command: 0x46574C44
4,429,332 UART:
4,429,484 UART: Running Caliptra ROM ...
4,430,581 UART:
4,430,733 UART: [state] CFI Enabled
4,438,185 UART: [state] LifecycleState = Unprovisioned
4,439,894 UART: [state] DebugLocked = No
4,441,756 UART: [state] WD Timer not started. Device not locked for debugging
4,448,293 UART: [update-reset] ++
5,920,259 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,922,985 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,299,447 UART: [update-reset] Copying MAN_2 To MAN_1
6,321,726 UART: [update-reset Success] --
6,322,994 >>> mbox cmd response: success
6,323,209 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,324,768 UART: [state] Locking Datavault
6,327,178 UART: [state] Locking PCR0, PCR1 and PCR31
6,328,716 UART: [state] Locking ICCM
6,330,111 UART: [exit] Launching FMC @ 0x40000000
6,338,344 UART:
6,338,585 UART: Running Caliptra FMC ...
6,339,686 UART:
6,339,835 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,341,461 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,258 writing to cptra_bootfsm_go
2,223,900 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,616 UART:
2,366,040 UART: Running Caliptra ROM ...
2,367,223 UART:
2,367,398 UART: [state] CFI Enabled
2,368,381 UART: [state] LifecycleState = Unprovisioned
2,370,034 UART: [state] DebugLocked = No
2,371,164 UART: [state] WD Timer not started. Device not locked for debugging
2,373,639 UART: [fake-rom-cold-reset] ++
2,374,744 UART: [fht] FHT @ 0x50003400
2,375,772 UART: [fwproc] Wait for Commands...
2,377,053 UART: [fwproc] Recv command 0x46574c44
2,378,491 UART: [fwproc] Recv'd Img size: 112032 bytes
3,820,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,899,292 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,959,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,277,522 >>> mbox cmd response: success
4,283,379 UART: [fake-rom-cold-reset] --
4,285,810 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,426,613 UART: [state] Locking Datavault
4,427,892 UART: [state] Locking PCR0, PCR1 and PCR31
4,429,441 UART: [state] Locking ICCM
4,430,370 UART: [exit] Launching FMC @ 0x40000000
4,431,816 UART:
4,431,984 UART: Running Caliptra FMC ...
4,433,090 UART:
4,433,252 UART: [fmc] Received command: 0x46574C44
4,434,707 UART:
4,434,863 UART: Running Caliptra ROM ...
4,435,960 UART:
4,436,115 UART: [state] CFI Enabled
4,444,487 UART: [state] LifecycleState = Unprovisioned
4,446,207 UART: [state] DebugLocked = No
4,448,549 UART: [state] WD Timer not started. Device not locked for debugging
4,453,629 UART: [update-reset] ++
5,934,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,937,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,313,483 UART: [update-reset] Copying MAN_2 To MAN_1
6,335,732 UART: [update-reset Success] --
6,337,066 >>> mbox cmd response: success
6,337,287 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,340,262 UART: [state] Locking Datavault
6,343,359 UART: [state] Locking PCR0, PCR1 and PCR31
6,344,894 UART: [state] Locking ICCM
6,347,014 UART: [exit] Launching FMC @ 0x40000000
6,355,246 UART:
6,355,482 UART: Running Caliptra FMC ...
6,356,504 UART:
6,356,650 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,358,286 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [fake-rom-cold-reset] ++
89,018 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,312 UART: [fht] FHT @ 0x50003400
92,743 UART: [fwproc] Wait for Commands...
93,476 UART: [fwproc] Recv command 0x46574c44
94,204 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,598 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,240 >>> mbox cmd response: success
1,549,398 UART: [fake-rom-cold-reset] --
1,549,793 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,120 UART: [state] Locking Datavault
1,551,171 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,775 UART: [state] Locking ICCM
1,552,419 UART: [exit] Launching FMC @ 0x40000000
1,557,716 UART:
1,557,732 UART: Running Caliptra FMC ...
1,558,140 UART:
1,558,281 UART: [fmc] Received command: 0x46574C44
1,559,105 UART:
1,559,121 UART: Running Caliptra ROM ...
1,559,529 UART:
1,559,584 UART: [state] CFI Enabled
1,562,356 UART: [state] LifecycleState = Unprovisioned
1,563,015 UART: [state] DebugLocked = No
1,563,656 UART: [state] WD Timer not started. Device not locked for debugging
1,565,280 UART: [update-reset] ++
2,845,459 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,994,956 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,970 UART: [update-reset Success] --
3,003,379 >>> mbox cmd response: success
3,003,379 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,022 UART: [state] Locking Datavault
3,004,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,502 UART: [state] Locking ICCM
3,006,060 UART: [exit] Launching FMC @ 0x40000000
3,011,357 UART:
3,011,373 UART: Running Caliptra FMC ...
3,011,781 UART:
3,011,922 UART: [fmc] Received command: 0x1000000C
3,012,657 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [fake-rom-cold-reset] ++
88,722 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,844 UART: [fht] FHT @ 0x50003400
92,275 UART: [fwproc] Wait for Commands...
92,874 UART: [fwproc] Recv command 0x46574c44
93,602 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,006 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,560 >>> mbox cmd response: success
1,549,718 UART: [fake-rom-cold-reset] --
1,550,113 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,448 UART: [state] Locking Datavault
1,551,573 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,177 UART: [state] Locking ICCM
1,552,733 UART: [exit] Launching FMC @ 0x40000000
1,558,030 UART:
1,558,046 UART: Running Caliptra FMC ...
1,558,454 UART:
1,558,595 UART: [fmc] Received command: 0x46574C44
1,559,419 UART:
1,559,435 UART: Running Caliptra ROM ...
1,559,843 UART:
1,559,898 UART: [state] CFI Enabled
1,562,132 UART: [state] LifecycleState = Unprovisioned
1,562,791 UART: [state] DebugLocked = No
1,563,320 UART: [state] WD Timer not started. Device not locked for debugging
1,564,892 UART: [update-reset] ++
2,845,327 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,994,968 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,982 UART: [update-reset Success] --
3,003,391 >>> mbox cmd response: success
3,003,391 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,078 UART: [state] Locking Datavault
3,004,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,384 UART: [state] Locking ICCM
3,005,888 UART: [exit] Launching FMC @ 0x40000000
3,011,185 UART:
3,011,201 UART: Running Caliptra FMC ...
3,011,609 UART:
3,011,750 UART: [fmc] Received command: 0x1000000C
3,012,485 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [fake-rom-cold-reset] ++
88,943 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,203 UART: [fht] FHT @ 0x50003400
92,652 UART: [fwproc] Wait for Commands...
93,385 UART: [fwproc] Recv command 0x46574c44
94,113 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,949 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,625 >>> mbox cmd response: success
1,550,783 UART: [fake-rom-cold-reset] --
1,551,178 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,551,421 UART: [state] Locking Datavault
1,552,340 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,944 UART: [state] Locking ICCM
1,553,610 UART: [exit] Launching FMC @ 0x40000000
1,558,907 UART:
1,558,923 UART: Running Caliptra FMC ...
1,559,331 UART:
1,559,472 UART: [fmc] Received command: 0x46574C44
1,560,296 UART:
1,560,312 UART: Running Caliptra ROM ...
1,560,720 UART:
1,560,862 UART: [state] CFI Enabled
1,563,916 UART: [state] LifecycleState = Unprovisioned
1,564,575 UART: [state] DebugLocked = No
1,565,206 UART: [state] WD Timer not started. Device not locked for debugging
1,566,636 UART: [update-reset] ++
2,848,057 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,849,095 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,542 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,556 UART: [update-reset Success] --
3,005,965 >>> mbox cmd response: success
3,005,965 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,774 UART: [state] Locking Datavault
3,007,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,008,320 UART: [state] Locking ICCM
3,008,952 UART: [exit] Launching FMC @ 0x40000000
3,014,249 UART:
3,014,265 UART: Running Caliptra FMC ...
3,014,673 UART:
3,014,814 UART: [fmc] Received command: 0x1000000C
3,015,549 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [fake-rom-cold-reset] ++
89,185 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,323 UART: [fht] FHT @ 0x50003400
92,760 UART: [fwproc] Wait for Commands...
93,495 UART: [fwproc] Recv command 0x46574c44
94,223 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,043 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,679 >>> mbox cmd response: success
1,549,837 UART: [fake-rom-cold-reset] --
1,550,232 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,407 UART: [state] Locking Datavault
1,551,526 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,130 UART: [state] Locking ICCM
1,552,668 UART: [exit] Launching FMC @ 0x40000000
1,557,965 UART:
1,557,981 UART: Running Caliptra FMC ...
1,558,389 UART:
1,558,530 UART: [fmc] Received command: 0x46574C44
1,559,354 UART:
1,559,370 UART: Running Caliptra ROM ...
1,559,778 UART:
1,559,920 UART: [state] CFI Enabled
1,562,448 UART: [state] LifecycleState = Unprovisioned
1,563,107 UART: [state] DebugLocked = No
1,563,812 UART: [state] WD Timer not started. Device not locked for debugging
1,565,434 UART: [update-reset] ++
2,846,855 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,983 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,430 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,444 UART: [update-reset Success] --
3,004,853 >>> mbox cmd response: success
3,004,853 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,330 UART: [state] Locking Datavault
3,006,128 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,732 UART: [state] Locking ICCM
3,007,384 UART: [exit] Launching FMC @ 0x40000000
3,012,681 UART:
3,012,697 UART: Running Caliptra FMC ...
3,013,105 UART:
3,013,246 UART: [fmc] Received command: 0x1000000C
3,013,981 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [fake-rom-cold-reset] ++
88,802 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,018 UART: [fht] FHT @ 0x50003400
92,269 UART: [fwproc] Wait for Commands...
92,958 UART: [fwproc] Recv command 0x46574c44
93,686 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,796 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,398 >>> mbox cmd response: success
1,549,556 UART: [fake-rom-cold-reset] --
1,549,951 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,342 UART: [state] Locking Datavault
1,551,373 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,977 UART: [state] Locking ICCM
1,552,483 UART: [exit] Launching FMC @ 0x40000000
1,557,780 UART:
1,557,796 UART: Running Caliptra FMC ...
1,558,204 UART:
1,558,345 UART: [fmc] Received command: 0x46574C44
1,559,169 UART:
1,559,185 UART: Running Caliptra ROM ...
1,559,593 UART:
1,559,648 UART: [state] CFI Enabled
1,561,960 UART: [state] LifecycleState = Unprovisioned
1,562,619 UART: [state] DebugLocked = No
1,563,316 UART: [state] WD Timer not started. Device not locked for debugging
1,564,882 UART: [update-reset] ++
2,844,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,647 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,993,938 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,952 UART: [update-reset Success] --
3,002,361 >>> mbox cmd response: success
3,002,361 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,724 UART: [state] Locking Datavault
3,003,518 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,122 UART: [state] Locking ICCM
3,004,648 UART: [exit] Launching FMC @ 0x40000000
3,009,945 UART:
3,009,961 UART: Running Caliptra FMC ...
3,010,369 UART:
3,010,510 UART: [fmc] Received command: 0x1000000C
3,011,245 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
86,120 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [fake-rom-cold-reset] ++
88,552 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,818 UART: [fht] FHT @ 0x50003400
92,179 UART: [fwproc] Wait for Commands...
92,782 UART: [fwproc] Recv command 0x46574c44
93,510 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,882 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,664 >>> mbox cmd response: success
1,550,822 UART: [fake-rom-cold-reset] --
1,551,217 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,551,628 UART: [state] Locking Datavault
1,552,969 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,573 UART: [state] Locking ICCM
1,554,017 UART: [exit] Launching FMC @ 0x40000000
1,559,314 UART:
1,559,330 UART: Running Caliptra FMC ...
1,559,738 UART:
1,559,879 UART: [fmc] Received command: 0x46574C44
1,560,703 UART:
1,560,719 UART: Running Caliptra ROM ...
1,561,127 UART:
1,561,182 UART: [state] CFI Enabled
1,563,574 UART: [state] LifecycleState = Unprovisioned
1,564,233 UART: [state] DebugLocked = No
1,564,856 UART: [state] WD Timer not started. Device not locked for debugging
1,566,346 UART: [update-reset] ++
2,846,687 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,743 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,128 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,142 UART: [update-reset Success] --
3,004,551 >>> mbox cmd response: success
3,004,551 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,982 UART: [state] Locking Datavault
3,005,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,364 UART: [state] Locking ICCM
3,006,872 UART: [exit] Launching FMC @ 0x40000000
3,012,169 UART:
3,012,185 UART: Running Caliptra FMC ...
3,012,593 UART:
3,012,734 UART: [fmc] Received command: 0x1000000C
3,013,469 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,423 UART: [fake-rom-cold-reset] ++
89,351 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,629 UART: [fht] FHT @ 0x50003400
92,926 UART: [fwproc] Wait for Commands...
93,629 UART: [fwproc] Recv command 0x46574c44
94,357 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,661 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,329 >>> mbox cmd response: success
1,549,487 UART: [fake-rom-cold-reset] --
1,549,882 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,385 UART: [state] Locking Datavault
1,551,704 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,308 UART: [state] Locking ICCM
1,552,818 UART: [exit] Launching FMC @ 0x40000000
1,558,115 UART:
1,558,131 UART: Running Caliptra FMC ...
1,558,539 UART:
1,558,680 UART: [fmc] Received command: 0x46574C44
1,559,504 UART:
1,559,520 UART: Running Caliptra ROM ...
1,559,928 UART:
1,560,070 UART: [state] CFI Enabled
1,562,632 UART: [state] LifecycleState = Unprovisioned
1,563,291 UART: [state] DebugLocked = No
1,563,928 UART: [state] WD Timer not started. Device not locked for debugging
1,565,528 UART: [update-reset] ++
2,847,597 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,966 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,980 UART: [update-reset Success] --
3,005,389 >>> mbox cmd response: success
3,005,389 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,014 UART: [state] Locking Datavault
3,006,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,382 UART: [state] Locking ICCM
3,007,956 UART: [exit] Launching FMC @ 0x40000000
3,013,253 UART:
3,013,269 UART: Running Caliptra FMC ...
3,013,677 UART:
3,013,818 UART: [fmc] Received command: 0x1000000C
3,014,553 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [fake-rom-cold-reset] ++
88,843 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,105 UART: [fht] FHT @ 0x50003400
92,516 UART: [fwproc] Wait for Commands...
93,179 UART: [fwproc] Recv command 0x46574c44
93,907 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,719 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,425 >>> mbox cmd response: success
1,550,583 UART: [fake-rom-cold-reset] --
1,550,978 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,551,407 UART: [state] Locking Datavault
1,552,746 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,350 UART: [state] Locking ICCM
1,553,872 UART: [exit] Launching FMC @ 0x40000000
1,559,169 UART:
1,559,185 UART: Running Caliptra FMC ...
1,559,593 UART:
1,559,734 UART: [fmc] Received command: 0x46574C44
1,560,558 UART:
1,560,574 UART: Running Caliptra ROM ...
1,560,982 UART:
1,561,124 UART: [state] CFI Enabled
1,564,164 UART: [state] LifecycleState = Unprovisioned
1,564,823 UART: [state] DebugLocked = No
1,565,370 UART: [state] WD Timer not started. Device not locked for debugging
1,566,978 UART: [update-reset] ++
2,847,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,467 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,876 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,890 UART: [update-reset Success] --
3,005,299 >>> mbox cmd response: success
3,005,299 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,934 UART: [state] Locking Datavault
3,006,652 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,256 UART: [state] Locking ICCM
3,007,750 UART: [exit] Launching FMC @ 0x40000000
3,013,047 UART:
3,013,063 UART: Running Caliptra FMC ...
3,013,471 UART:
3,013,612 UART: [fmc] Received command: 0x1000000C
3,014,347 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [fake-rom-cold-reset] ++
88,488 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,654 UART: [fht] FHT @ 0x50003400
92,091 UART: [fwproc] Wait for Commands...
92,906 UART: [fwproc] Recv command 0x46574c44
93,634 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,278 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,052 >>> mbox cmd response: success
1,549,210 UART: [fake-rom-cold-reset] --
1,549,605 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,892 UART: [state] Locking Datavault
1,550,909 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,513 UART: [state] Locking ICCM
1,552,081 UART: [exit] Launching FMC @ 0x40000000
1,557,378 UART:
1,557,394 UART: Running Caliptra FMC ...
1,557,802 UART:
1,557,943 UART: [fmc] Received command: 0x46574C44
1,558,767 UART:
1,558,783 UART: Running Caliptra ROM ...
1,559,191 UART:
1,559,246 UART: [state] CFI Enabled
1,561,888 UART: [state] LifecycleState = Unprovisioned
1,562,547 UART: [state] DebugLocked = No
1,563,212 UART: [state] WD Timer not started. Device not locked for debugging
1,564,694 UART: [update-reset] ++
2,845,429 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,994,710 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,724 UART: [update-reset Success] --
3,003,133 >>> mbox cmd response: success
3,003,133 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,788 UART: [state] Locking Datavault
3,004,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,124 UART: [state] Locking ICCM
3,005,634 UART: [exit] Launching FMC @ 0x40000000
3,010,931 UART:
3,010,947 UART: Running Caliptra FMC ...
3,011,355 UART:
3,011,496 UART: [fmc] Received command: 0x1000000C
3,012,231 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,154 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [fake-rom-cold-reset] ++
88,598 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,890 UART: [fht] FHT @ 0x50003400
92,291 UART: [fwproc] Wait for Commands...
92,894 UART: [fwproc] Recv command 0x46574c44
93,622 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,994 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,600 >>> mbox cmd response: success
1,549,758 UART: [fake-rom-cold-reset] --
1,550,153 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,628 UART: [state] Locking Datavault
1,551,885 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,489 UART: [state] Locking ICCM
1,552,955 UART: [exit] Launching FMC @ 0x40000000
1,558,252 UART:
1,558,268 UART: Running Caliptra FMC ...
1,558,676 UART:
1,558,817 UART: [fmc] Received command: 0x46574C44
1,559,641 UART:
1,559,657 UART: Running Caliptra ROM ...
1,560,065 UART:
1,560,120 UART: [state] CFI Enabled
1,562,630 UART: [state] LifecycleState = Unprovisioned
1,563,289 UART: [state] DebugLocked = No
1,564,000 UART: [state] WD Timer not started. Device not locked for debugging
1,565,776 UART: [update-reset] ++
2,846,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,479 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,995,912 UART: [update-reset] Copying MAN_2 To MAN_1
3,003,926 UART: [update-reset Success] --
3,004,335 >>> mbox cmd response: success
3,004,335 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,974 UART: [state] Locking Datavault
3,005,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,450 UART: [state] Locking ICCM
3,006,990 UART: [exit] Launching FMC @ 0x40000000
3,012,287 UART:
3,012,303 UART: Running Caliptra FMC ...
3,012,711 UART:
3,012,852 UART: [fmc] Received command: 0x1000000C
3,013,587 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [fake-rom-cold-reset] ++
88,741 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,935 UART: [fht] FHT @ 0x50003400
92,376 UART: [fwproc] Wait for Commands...
93,115 UART: [fwproc] Recv command 0x46574c44
93,843 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,913 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,501 >>> mbox cmd response: success
1,548,659 UART: [fake-rom-cold-reset] --
1,549,054 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,321 UART: [state] Locking Datavault
1,550,580 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,184 UART: [state] Locking ICCM
1,551,764 UART: [exit] Launching FMC @ 0x40000000
1,557,061 UART:
1,557,077 UART: Running Caliptra FMC ...
1,557,485 UART:
1,557,626 UART: [fmc] Received command: 0x46574C44
1,558,450 UART:
1,558,466 UART: Running Caliptra ROM ...
1,558,874 UART:
1,559,016 UART: [state] CFI Enabled
1,561,216 UART: [state] LifecycleState = Unprovisioned
1,561,875 UART: [state] DebugLocked = No
1,562,590 UART: [state] WD Timer not started. Device not locked for debugging
1,564,168 UART: [update-reset] ++
2,844,123 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,291 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,993,804 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,818 UART: [update-reset Success] --
3,002,227 >>> mbox cmd response: success
3,002,227 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,924 UART: [state] Locking Datavault
3,003,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,562 UART: [state] Locking ICCM
3,005,060 UART: [exit] Launching FMC @ 0x40000000
3,010,357 UART:
3,010,373 UART: Running Caliptra FMC ...
3,010,781 UART:
3,010,922 UART: [fmc] Received command: 0x1000000C
3,011,657 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [fake-rom-cold-reset] ++
88,813 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,945 UART: [fht] FHT @ 0x50003400
92,298 UART: [fwproc] Wait for Commands...
93,047 UART: [fwproc] Recv command 0x46574c44
93,775 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,237 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,005 >>> mbox cmd response: success
1,550,163 UART: [fake-rom-cold-reset] --
1,550,558 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,959 UART: [state] Locking Datavault
1,552,004 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,608 UART: [state] Locking ICCM
1,553,064 UART: [exit] Launching FMC @ 0x40000000
1,558,361 UART:
1,558,377 UART: Running Caliptra FMC ...
1,558,785 UART:
1,558,926 UART: [fmc] Received command: 0x46574C44
1,559,750 UART:
1,559,766 UART: Running Caliptra ROM ...
1,560,174 UART:
1,560,316 UART: [state] CFI Enabled
1,563,686 UART: [state] LifecycleState = Unprovisioned
1,564,345 UART: [state] DebugLocked = No
1,564,922 UART: [state] WD Timer not started. Device not locked for debugging
1,566,268 UART: [update-reset] ++
2,846,927 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,905 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,368 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,382 UART: [update-reset Success] --
3,004,791 >>> mbox cmd response: success
3,004,791 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,428 UART: [state] Locking Datavault
3,006,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,808 UART: [state] Locking ICCM
3,007,396 UART: [exit] Launching FMC @ 0x40000000
3,012,693 UART:
3,012,709 UART: Running Caliptra FMC ...
3,013,117 UART:
3,013,258 UART: [fmc] Received command: 0x1000000C
3,013,993 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,102 UART:
192,481 UART: Running Caliptra ROM ...
193,718 UART:
193,871 UART: [state] CFI Enabled
263,028 UART: [state] LifecycleState = Unprovisioned
265,406 UART: [state] DebugLocked = No
267,481 UART: [state] WD Timer not started. Device not locked for debugging
271,825 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,955 UART:
192,350 UART: Running Caliptra ROM ...
193,651 UART:
193,825 UART: [state] CFI Enabled
264,326 UART: [state] LifecycleState = Unprovisioned
266,896 UART: [state] DebugLocked = No
269,802 UART: [state] WD Timer not started. Device not locked for debugging
276,271 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,464 UART:
192,838 UART: Running Caliptra ROM ...
194,077 UART:
603,912 UART: [state] CFI Enabled
618,670 UART: [state] LifecycleState = Unprovisioned
621,014 UART: [state] DebugLocked = No
624,066 UART: [state] WD Timer not started. Device not locked for debugging
629,509 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
192,553 UART:
192,931 UART: Running Caliptra ROM ...
194,060 UART:
604,124 UART: [state] CFI Enabled
617,087 UART: [state] LifecycleState = Unprovisioned
619,451 UART: [state] DebugLocked = No
622,577 UART: [state] WD Timer not started. Device not locked for debugging
628,635 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
860 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,137 writing to cptra_bootfsm_go
193,221 UART:
193,614 UART: Running Caliptra ROM ...
194,802 UART:
194,957 UART: [state] CFI Enabled
262,230 UART: [state] LifecycleState = Unprovisioned
264,008 UART: [state] DebugLocked = No
265,722 UART: [state] WD Timer not started. Device not locked for debugging
269,735 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,014 UART:
192,432 UART: Running Caliptra ROM ...
193,527 UART:
193,672 UART: [state] CFI Enabled
266,633 UART: [state] LifecycleState = Unprovisioned
268,412 UART: [state] DebugLocked = No
270,782 UART: [state] WD Timer not started. Device not locked for debugging
275,389 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,466 UART:
192,859 UART: Running Caliptra ROM ...
194,055 UART:
603,539 UART: [state] CFI Enabled
616,105 UART: [state] LifecycleState = Unprovisioned
617,838 UART: [state] DebugLocked = No
620,290 UART: [state] WD Timer not started. Device not locked for debugging
623,980 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,510 UART:
192,901 UART: Running Caliptra ROM ...
193,994 UART:
603,391 UART: [state] CFI Enabled
618,712 UART: [state] LifecycleState = Unprovisioned
620,400 UART: [state] DebugLocked = No
621,771 UART: [state] WD Timer not started. Device not locked for debugging
626,167 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,119 UART:
192,503 UART: Running Caliptra ROM ...
193,632 UART:
193,780 UART: [state] CFI Enabled
265,812 UART: [state] LifecycleState = Unprovisioned
267,536 UART: [state] DebugLocked = No
268,966 UART: [state] WD Timer not started. Device not locked for debugging
273,904 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
191,982 UART:
192,379 UART: Running Caliptra ROM ...
193,569 UART:
193,725 UART: [state] CFI Enabled
267,828 UART: [state] LifecycleState = Unprovisioned
269,609 UART: [state] DebugLocked = No
272,180 UART: [state] WD Timer not started. Device not locked for debugging
275,822 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,607 UART:
192,968 UART: Running Caliptra ROM ...
194,154 UART:
603,745 UART: [state] CFI Enabled
618,321 UART: [state] LifecycleState = Unprovisioned
620,062 UART: [state] DebugLocked = No
622,944 UART: [state] WD Timer not started. Device not locked for debugging
627,552 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,347 UART:
192,738 UART: Running Caliptra ROM ...
193,942 UART:
603,529 UART: [state] CFI Enabled
615,738 UART: [state] LifecycleState = Unprovisioned
617,479 UART: [state] DebugLocked = No
620,037 UART: [state] WD Timer not started. Device not locked for debugging
624,270 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,276 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,160 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,847 UART: [state] LifecycleState = Unprovisioned
85,506 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,408 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,052 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
2,213,649 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,356,095 UART:
2,356,566 UART: Running Caliptra ROM ...
2,357,672 UART:
2,357,837 UART: [state] CFI Enabled
2,358,822 UART: [state] LifecycleState = Unprovisioned
2,360,477 UART: [state] DebugLocked = No
2,361,510 UART: [state] WD Timer not started. Device not locked for debugging
2,363,991 UART: [fake-rom-cold-reset] ++
2,365,019 UART: [fht] FHT @ 0x50003400
2,365,995 UART: [fwproc] Wait for Commands...
2,367,300 UART: [fwproc] Recv command 0x46574c44
2,368,640 UART: [fwproc] Recv'd Img size: 111688 bytes
3,761,983 UART: ROM Fatal Error: 0x000B000C
3,765,823 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,212,542 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,353,598 UART:
2,353,991 UART: Running Caliptra ROM ...
2,355,161 UART:
2,355,333 UART: [state] CFI Enabled
2,356,336 UART: [state] LifecycleState = Unprovisioned
2,357,989 UART: [state] DebugLocked = No
2,359,096 UART: [state] WD Timer not started. Device not locked for debugging
2,361,931 UART: [fake-rom-cold-reset] ++
2,362,977 UART: [fht] FHT @ 0x50003400
2,363,924 UART: [fwproc] Wait for Commands...
2,365,208 UART: [fwproc] Recv command 0x46574c44
2,366,642 UART: [fwproc] Recv'd Img size: 111688 bytes
3,759,485 UART: ROM Fatal Error: 0x000B000C
3,763,325 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,218,307 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,360,293 UART:
2,360,715 UART: Running Caliptra ROM ...
2,361,892 UART:
2,362,060 UART: [state] CFI Enabled
2,363,037 UART: [state] LifecycleState = Unprovisioned
2,364,680 UART: [state] DebugLocked = No
2,365,781 UART: [state] WD Timer not started. Device not locked for debugging
2,368,259 UART: [fake-rom-cold-reset] ++
2,369,359 UART: [fht] FHT @ 0x50003400
2,370,387 UART: [fwproc] Wait for Commands...
2,371,666 UART: [fwproc] Recv command 0x46574c44
2,373,087 UART: [fwproc] Recv'd Img size: 111688 bytes
3,767,386 UART: ROM Fatal Error: 0x000B000C
3,771,229 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,223,502 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,364,796 UART:
2,365,236 UART: Running Caliptra ROM ...
2,366,324 UART:
2,366,478 UART: [state] CFI Enabled
2,367,362 UART: [state] LifecycleState = Unprovisioned
2,369,011 UART: [state] DebugLocked = No
2,370,125 UART: [state] WD Timer not started. Device not locked for debugging
2,372,601 UART: [fake-rom-cold-reset] ++
2,373,704 UART: [fht] FHT @ 0x50003400
2,374,731 UART: [fwproc] Wait for Commands...
2,376,030 UART: [fwproc] Recv command 0x46574c44
2,377,451 UART: [fwproc] Recv'd Img size: 111688 bytes
3,775,238 UART: ROM Fatal Error: 0x000B000C
3,779,056 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,223,233 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,962 UART:
2,365,375 UART: Running Caliptra ROM ...
2,366,557 UART:
2,366,730 UART: [state] CFI Enabled
2,367,688 UART: [state] LifecycleState = Unprovisioned
2,369,338 UART: [state] DebugLocked = No
2,370,450 UART: [state] WD Timer not started. Device not locked for debugging
2,372,922 UART: [fake-rom-cold-reset] ++
2,374,030 UART: [fht] FHT @ 0x50003400
2,375,071 UART: [fwproc] Wait for Commands...
2,376,381 UART: [fwproc] Recv command 0x46574c44
2,377,812 UART: [fwproc] Recv'd Img size: 112032 bytes
3,430,956 UART: ROM Fatal Error: 0x000B000C
3,433,955 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,214,053 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,355,725 UART:
2,356,154 UART: Running Caliptra ROM ...
2,357,239 UART:
2,357,390 UART: [state] CFI Enabled
2,358,364 UART: [state] LifecycleState = Unprovisioned
2,360,023 UART: [state] DebugLocked = No
2,361,140 UART: [state] WD Timer not started. Device not locked for debugging
2,363,612 UART: [fake-rom-cold-reset] ++
2,364,731 UART: [fht] FHT @ 0x50003400
2,365,728 UART: [fwproc] Wait for Commands...
2,367,011 UART: [fwproc] Recv command 0x46574c44
2,368,441 UART: [fwproc] Recv'd Img size: 112032 bytes
3,427,201 UART: ROM Fatal Error: 0x000B000C
3,430,185 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,222,672 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,364,388 UART:
2,364,801 UART: Running Caliptra ROM ...
2,365,979 UART:
2,366,155 UART: [state] CFI Enabled
2,367,111 UART: [state] LifecycleState = Unprovisioned
2,368,763 UART: [state] DebugLocked = No
2,369,868 UART: [state] WD Timer not started. Device not locked for debugging
2,372,366 UART: [fake-rom-cold-reset] ++
2,373,468 UART: [fht] FHT @ 0x50003400
2,374,496 UART: [fwproc] Wait for Commands...
2,375,777 UART: [fwproc] Recv command 0x46574c44
2,377,198 UART: [fwproc] Recv'd Img size: 112032 bytes
3,428,183 UART: ROM Fatal Error: 0x000B000C
3,431,164 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,229,687 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,371,364 UART:
2,371,779 UART: Running Caliptra ROM ...
2,372,950 UART:
2,373,122 UART: [state] CFI Enabled
2,374,086 UART: [state] LifecycleState = Unprovisioned
2,375,737 UART: [state] DebugLocked = No
2,376,843 UART: [state] WD Timer not started. Device not locked for debugging
2,379,311 UART: [fake-rom-cold-reset] ++
2,380,413 UART: [fht] FHT @ 0x50003400
2,381,460 UART: [fwproc] Wait for Commands...
2,382,743 UART: [fwproc] Recv command 0x46574c44
2,384,172 UART: [fwproc] Recv'd Img size: 112032 bytes
3,431,743 UART: ROM Fatal Error: 0x000B000C
3,434,737 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,222,042 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,470 UART:
2,363,875 UART: Running Caliptra ROM ...
2,365,053 UART:
2,365,246 UART: [state] CFI Enabled
2,366,142 UART: [state] LifecycleState = Unprovisioned
2,367,712 UART: [state] DebugLocked = No
2,368,824 UART: [state] WD Timer not started. Device not locked for debugging
2,371,303 UART: [fake-rom-cold-reset] ++
2,372,414 UART: [fht] FHT @ 0x50003400
2,373,451 UART: [fwproc] Wait for Commands...
2,375,092 UART: [fwproc] Recv command 0x46574c44
2,376,583 UART: [fwproc] Recv'd Img size: 112032 bytes
3,435,468 UART: ROM Fatal Error: 0x000B000C
3,438,442 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,221,661 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,044 UART:
2,363,438 UART: Running Caliptra ROM ...
2,364,551 UART:
2,364,714 UART: [state] CFI Enabled
2,365,690 UART: [state] LifecycleState = Unprovisioned
2,367,369 UART: [state] DebugLocked = No
2,368,491 UART: [state] WD Timer not started. Device not locked for debugging
2,370,967 UART: [fake-rom-cold-reset] ++
2,372,074 UART: [fht] FHT @ 0x50003400
2,373,114 UART: [fwproc] Wait for Commands...
2,374,395 UART: [fwproc] Recv command 0x46574c44
2,375,830 UART: [fwproc] Recv'd Img size: 112032 bytes
3,424,197 UART: ROM Fatal Error: 0x000B000C
3,427,190 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
2,218,270 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,360,032 UART:
2,360,482 UART: Running Caliptra ROM ...
2,361,655 UART:
2,361,825 UART: [state] CFI Enabled
2,362,788 UART: [state] LifecycleState = Unprovisioned
2,364,437 UART: [state] DebugLocked = No
2,365,537 UART: [state] WD Timer not started. Device not locked for debugging
2,368,005 UART: [fake-rom-cold-reset] ++
2,369,113 UART: [fht] FHT @ 0x50003400
2,370,141 UART: [fwproc] Wait for Commands...
2,371,417 UART: [fwproc] Recv command 0x46574c44
2,372,836 UART: [fwproc] Recv'd Img size: 112032 bytes
3,422,135 UART: ROM Fatal Error: 0x000B000C
3,425,129 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,217,183 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,359,634 UART:
2,360,042 UART: Running Caliptra ROM ...
2,361,123 UART:
2,361,282 UART: [state] CFI Enabled
2,362,254 UART: [state] LifecycleState = Unprovisioned
2,363,919 UART: [state] DebugLocked = No
2,364,944 UART: [state] WD Timer not started. Device not locked for debugging
2,367,409 UART: [fake-rom-cold-reset] ++
2,368,441 UART: [fht] FHT @ 0x50003400
2,369,420 UART: [fwproc] Wait for Commands...
2,370,704 UART: [fwproc] Recv command 0x46574c44
2,372,072 UART: [fwproc] Recv'd Img size: 112032 bytes
3,423,476 UART: ROM Fatal Error: 0x000B000C
3,426,479 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [fake-rom-cold-reset] ++
88,870 UART: [fht] FHT @ 0x50003400
92,291 UART: [fwproc] Wait for Commands...
92,914 UART: [fwproc] Recv command 0x46574c44
93,642 UART: [fwproc] Recv'd Img size: 112032 bytes
129,571 UART: ROM Fatal Error: 0x000B000C
130,740 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [fake-rom-cold-reset] ++
89,134 UART: [fht] FHT @ 0x50003400
92,547 UART: [fwproc] Wait for Commands...
93,380 UART: [fwproc] Recv command 0x46574c44
94,108 UART: [fwproc] Recv'd Img size: 112032 bytes
131,163 UART: ROM Fatal Error: 0x000B000C
132,332 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,075 UART: [state] WD Timer not started. Device not locked for debugging
88,653 UART: [fake-rom-cold-reset] ++
89,767 UART: [fht] FHT @ 0x50003400
93,214 UART: [fwproc] Wait for Commands...
94,049 UART: [fwproc] Recv command 0x46574c44
94,777 UART: [fwproc] Recv'd Img size: 112032 bytes
131,790 UART: ROM Fatal Error: 0x000B000C
132,959 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [fake-rom-cold-reset] ++
89,005 UART: [fht] FHT @ 0x50003400
92,428 UART: [fwproc] Wait for Commands...
93,235 UART: [fwproc] Recv command 0x46574c44
93,963 UART: [fwproc] Recv'd Img size: 112032 bytes
131,924 UART: ROM Fatal Error: 0x000B000C
133,093 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [fake-rom-cold-reset] ++
89,270 UART: [fht] FHT @ 0x50003400
92,625 UART: [fwproc] Wait for Commands...
93,256 UART: [fwproc] Recv command 0x46574c44
93,984 UART: [fwproc] Recv'd Img size: 112032 bytes
132,105 UART: ROM Fatal Error: 0x000B000C
133,274 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,202 UART: [fake-rom-cold-reset] ++
89,372 UART: [fht] FHT @ 0x50003400
92,675 UART: [fwproc] Wait for Commands...
93,278 UART: [fwproc] Recv command 0x46574c44
94,006 UART: [fwproc] Recv'd Img size: 112032 bytes
131,497 UART: ROM Fatal Error: 0x000B000C
132,666 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,985 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [fake-rom-cold-reset] ++
89,413 UART: [fht] FHT @ 0x50003400
92,674 UART: [fwproc] Wait for Commands...
93,429 UART: [fwproc] Recv command 0x46574c44
94,157 UART: [fwproc] Recv'd Img size: 112032 bytes
131,986 UART: ROM Fatal Error: 0x000B000C
133,155 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,041 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [fake-rom-cold-reset] ++
89,431 UART: [fht] FHT @ 0x50003400
92,882 UART: [fwproc] Wait for Commands...
93,535 UART: [fwproc] Recv command 0x46574c44
94,263 UART: [fwproc] Recv'd Img size: 112032 bytes
132,122 UART: ROM Fatal Error: 0x000B000C
133,291 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [fake-rom-cold-reset] ++
88,932 UART: [fht] FHT @ 0x50003400
92,331 UART: [fwproc] Wait for Commands...
93,026 UART: [fwproc] Recv command 0x46574c44
93,754 UART: [fwproc] Recv'd Img size: 112032 bytes
130,019 UART: ROM Fatal Error: 0x000B000C
131,188 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [fake-rom-cold-reset] ++
89,124 UART: [fht] FHT @ 0x50003400
92,403 UART: [fwproc] Wait for Commands...
93,036 UART: [fwproc] Recv command 0x46574c44
93,764 UART: [fwproc] Recv'd Img size: 112032 bytes
131,039 UART: ROM Fatal Error: 0x000B000C
132,208 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [fake-rom-cold-reset] ++
88,945 UART: [fht] FHT @ 0x50003400
92,264 UART: [fwproc] Wait for Commands...
92,973 UART: [fwproc] Recv command 0x46574c44
93,701 UART: [fwproc] Recv'd Img size: 112032 bytes
130,700 UART: ROM Fatal Error: 0x000B000C
131,869 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,103 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [fake-rom-cold-reset] ++
89,569 UART: [fht] FHT @ 0x50003400
92,796 UART: [fwproc] Wait for Commands...
93,621 UART: [fwproc] Recv command 0x46574c44
94,349 UART: [fwproc] Recv'd Img size: 112032 bytes
130,560 UART: ROM Fatal Error: 0x000B000C
131,729 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,335 UART:
192,710 UART: Running Caliptra ROM ...
193,883 UART:
194,035 UART: [state] CFI Enabled
264,602 UART: [state] LifecycleState = Unprovisioned
267,003 UART: [state] DebugLocked = No
269,203 UART: [state] WD Timer not started. Device not locked for debugging
274,903 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,084 UART:
192,464 UART: Running Caliptra ROM ...
193,557 UART:
193,698 UART: [state] CFI Enabled
267,629 UART: [state] LifecycleState = Unprovisioned
270,016 UART: [state] DebugLocked = No
273,187 UART: [state] WD Timer not started. Device not locked for debugging
279,601 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,501 UART:
192,880 UART: Running Caliptra ROM ...
193,968 UART:
603,985 UART: [state] CFI Enabled
619,418 UART: [state] LifecycleState = Unprovisioned
621,822 UART: [state] DebugLocked = No
624,119 UART: [state] WD Timer not started. Device not locked for debugging
629,235 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,496 writing to cptra_bootfsm_go
192,744 UART:
193,121 UART: Running Caliptra ROM ...
194,371 UART:
604,107 UART: [state] CFI Enabled
615,826 UART: [state] LifecycleState = Unprovisioned
618,241 UART: [state] DebugLocked = No
620,917 UART: [state] WD Timer not started. Device not locked for debugging
626,982 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,239 UART:
192,621 UART: Running Caliptra ROM ...
193,708 UART:
193,850 UART: [state] CFI Enabled
261,984 UART: [state] LifecycleState = Unprovisioned
263,708 UART: [state] DebugLocked = No
265,269 UART: [state] WD Timer not started. Device not locked for debugging
268,907 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,158 UART:
192,551 UART: Running Caliptra ROM ...
193,648 UART:
193,789 UART: [state] CFI Enabled
261,687 UART: [state] LifecycleState = Unprovisioned
263,443 UART: [state] DebugLocked = No
266,229 UART: [state] WD Timer not started. Device not locked for debugging
272,241 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,386 UART:
192,763 UART: Running Caliptra ROM ...
193,948 UART:
603,346 UART: [state] CFI Enabled
619,619 UART: [state] LifecycleState = Unprovisioned
621,396 UART: [state] DebugLocked = No
622,502 UART: [state] WD Timer not started. Device not locked for debugging
627,300 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,616 writing to cptra_bootfsm_go
192,686 UART:
193,052 UART: Running Caliptra ROM ...
194,240 UART:
603,974 UART: [state] CFI Enabled
620,842 UART: [state] LifecycleState = Unprovisioned
622,579 UART: [state] DebugLocked = No
624,293 UART: [state] WD Timer not started. Device not locked for debugging
628,445 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,013 UART:
192,398 UART: Running Caliptra ROM ...
193,589 UART:
193,745 UART: [state] CFI Enabled
259,888 UART: [state] LifecycleState = Unprovisioned
261,643 UART: [state] DebugLocked = No
262,865 UART: [state] WD Timer not started. Device not locked for debugging
267,640 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,024 UART:
192,393 UART: Running Caliptra ROM ...
193,529 UART:
193,674 UART: [state] CFI Enabled
262,197 UART: [state] LifecycleState = Unprovisioned
263,999 UART: [state] DebugLocked = No
266,730 UART: [state] WD Timer not started. Device not locked for debugging
271,395 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,459 UART:
192,864 UART: Running Caliptra ROM ...
194,000 UART:
603,370 UART: [state] CFI Enabled
617,054 UART: [state] LifecycleState = Unprovisioned
618,804 UART: [state] DebugLocked = No
620,878 UART: [state] WD Timer not started. Device not locked for debugging
625,805 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,360 UART:
192,736 UART: Running Caliptra ROM ...
193,883 UART:
603,492 UART: [state] CFI Enabled
617,364 UART: [state] LifecycleState = Unprovisioned
619,288 UART: [state] DebugLocked = No
621,748 UART: [state] WD Timer not started. Device not locked for debugging
626,958 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,492 UART: [state] LifecycleState = Unprovisioned
85,151 UART: [state] DebugLocked = No
85,832 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,463 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
4,876,308 ready_for_fw is high
4,876,771 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,452,977 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,507 writing to cptra_bootfsm_go
4,875,700 ready_for_fw is high
4,876,111 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,462,221 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
5,179,953 ready_for_fw is high
5,180,571 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,621,898 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
5,182,736 ready_for_fw is high
5,183,253 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,618,059 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,484,526 ready_for_fw is high
3,485,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,343,651 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,459,602 ready_for_fw is high
3,460,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,297,786 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,313 writing to cptra_bootfsm_go
3,791,970 ready_for_fw is high
3,792,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,529,114 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,788,281 ready_for_fw is high
3,788,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,531,846 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,441,260 ready_for_fw is high
3,441,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,600 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,436,700 ready_for_fw is high
3,437,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,243,991 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,780,234 ready_for_fw is high
3,780,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,515,449 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,792,303 ready_for_fw is high
3,792,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,502,043 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,625 ready_for_fw is high
1,077,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,406 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,625 ready_for_fw is high
1,078,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,932 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,372 ready_for_fw is high
1,078,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,499 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,218 ready_for_fw is high
1,078,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,999 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,109 ready_for_fw is high
1,078,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,788 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,881 ready_for_fw is high
1,077,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,450 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,530 ready_for_fw is high
1,078,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,499 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,824 ready_for_fw is high
1,077,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,711 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,457 ready_for_fw is high
1,077,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,662 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,153 ready_for_fw is high
1,078,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,284 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,742 ready_for_fw is high
1,077,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,965 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,036 ready_for_fw is high
1,078,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,831 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,213,571 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,348,308 UART:
2,348,702 UART: Running Caliptra ROM ...
2,349,781 UART:
2,349,938 UART: [state] CFI Enabled
2,351,252 UART: [state] LifecycleState = Unprovisioned
2,352,916 UART: [state] DebugLocked = No
2,354,021 UART: [state] WD Timer not started. Device not locked for debugging
2,356,496 UART: [kat] SHA2-256
2,357,162 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,168 UART: [kat] ++
2,360,619 UART: [kat] sha1
2,361,173 UART: [kat] SHA2-256
2,361,922 UART: [kat] SHA2-384
2,362,636 UART: [kat] SHA2-512-ACC
2,363,527 UART: [kat] ECC-384
3,776,721 UART: [kat] HMAC-384Kdf
3,802,024 UART: [kat] LMS
4,875,188 UART: [kat] --
4,879,312 UART: [cold-reset] ++
4,881,416 UART: [fht] FHT @ 0x50003400
4,892,337 UART: [idev] ++
4,893,009 UART: [idev] CDI.KEYID = 6
4,894,169 UART: [idev] SUBJECT.KEYID = 7
4,895,378 UART: [idev] UDS.KEYID = 0
4,930,173 UART: [idev] Erasing UDS.KEYID = 0
8,240,992 UART: [idev] Sha1 KeyId Algorithm
8,262,022 UART: [idev] --
8,265,536 UART: [ldev] ++
8,266,103 UART: [ldev] CDI.KEYID = 6
8,267,360 UART: [ldev] SUBJECT.KEYID = 5
8,268,474 UART: [ldev] AUTHORITY.KEYID = 7
8,269,629 UART: [ldev] FE.KEYID = 1
8,297,308 UART: [ldev] Erasing FE.KEYID = 1
11,632,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,965 UART: [ldev] --
14,014,827 UART: [fwproc] Wait for Commands...
14,017,518 UART: [fwproc] Recv command 0x46574c44
14,019,830 UART: [fwproc] Recv'd Img size: 106620 bytes
17,998,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,073,814 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,116,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,433,617 >>> mbox cmd response: success
18,438,381 UART: [afmc] ++
18,438,968 UART: [afmc] CDI.KEYID = 6
18,440,151 UART: [afmc] SUBJECT.KEYID = 7
18,441,309 UART: [afmc] AUTHORITY.KEYID = 5
21,795,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,094,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,097,143 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,113,191 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,129,251 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,145,349 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,167,212 UART: [afmc] --
24,171,621 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,171,992 UART: [cold-reset] --
24,177,398 UART: [state] Locking Datavault
24,183,789 UART: [state] Locking PCR0, PCR1 and PCR31
24,185,453 UART: [state] Locking ICCM
24,187,547 UART: [exit] Launching FMC @ 0x40000000
24,196,178 UART:
24,196,459 UART: Running Caliptra FMC ...
24,197,573 UART:
24,197,729 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,199,295 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,210,753 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,206,781 >>> mbox cmd response: success
23,894,780 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,908,809 UART:
23,909,159 UART: Running Caliptra FMC ...
23,910,328 UART:
23,910,495 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,912,255 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,220,713 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,355,710 UART:
2,356,126 UART: Running Caliptra ROM ...
2,357,298 UART:
2,357,461 UART: [state] CFI Enabled
2,358,432 UART: [state] LifecycleState = Unprovisioned
2,360,074 UART: [state] DebugLocked = No
2,361,179 UART: [state] WD Timer not started. Device not locked for debugging
2,363,652 UART: [kat] SHA2-256
2,364,314 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,367,317 UART: [kat] ++
2,367,759 UART: [kat] sha1
2,368,262 UART: [kat] SHA2-256
2,368,991 UART: [kat] SHA2-384
2,369,675 UART: [kat] SHA2-512-ACC
2,370,469 UART: [kat] ECC-384
4,096,433 UART: [kat] HMAC-384Kdf
4,108,818 UART: [kat] LMS
5,181,969 UART: [kat] --
5,186,363 UART: [cold-reset] ++
5,187,542 UART: [fht] FHT @ 0x50003400
5,199,474 UART: [idev] ++
5,200,195 UART: [idev] CDI.KEYID = 6
5,201,302 UART: [idev] SUBJECT.KEYID = 7
5,202,782 UART: [idev] UDS.KEYID = 0
5,218,514 UART: [idev] Erasing UDS.KEYID = 0
8,491,972 UART: [idev] Sha1 KeyId Algorithm
8,513,787 UART: [idev] --
8,518,256 UART: [ldev] ++
8,518,819 UART: [ldev] CDI.KEYID = 6
8,520,049 UART: [ldev] SUBJECT.KEYID = 5
8,521,478 UART: [ldev] AUTHORITY.KEYID = 7
8,523,046 UART: [ldev] FE.KEYID = 1
8,534,338 UART: [ldev] Erasing FE.KEYID = 1
11,825,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,707 UART: [ldev] --
14,191,781 UART: [fwproc] Wait for Commands...
14,195,013 UART: [fwproc] Recv command 0x46574c44
14,197,270 UART: [fwproc] Recv'd Img size: 106620 bytes
18,175,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,249,205 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,291,731 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,608,003 >>> mbox cmd response: success
18,612,769 UART: [afmc] ++
18,613,374 UART: [afmc] CDI.KEYID = 6
18,614,557 UART: [afmc] SUBJECT.KEYID = 7
18,615,663 UART: [afmc] AUTHORITY.KEYID = 5
21,932,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,230,258 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,246,273 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,262,307 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,278,421 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,423 UART: [afmc] --
24,304,570 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,304,941 UART: [cold-reset] --
24,309,257 UART: [state] Locking Datavault
24,314,629 UART: [state] Locking PCR0, PCR1 and PCR31
24,316,370 UART: [state] Locking ICCM
24,318,985 UART: [exit] Launching FMC @ 0x40000000
24,327,570 UART:
24,327,800 UART: Running Caliptra FMC ...
24,328,817 UART:
24,328,955 UART: [fmc] Received command: 0x10000005
24,330,436 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,214,842 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,406,230 >>> mbox cmd response: success
24,027,833 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,043,298 UART:
24,043,646 UART: Running Caliptra FMC ...
24,044,823 UART:
24,044,983 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,046,750 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,215,188 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,350,689 UART:
2,351,088 UART: Running Caliptra ROM ...
2,352,260 UART:
2,352,435 UART: [state] CFI Enabled
2,353,405 UART: [state] LifecycleState = Unprovisioned
2,355,069 UART: [state] DebugLocked = No
2,356,179 UART: [state] WD Timer not started. Device not locked for debugging
2,358,655 UART: [kat] SHA2-256
2,359,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,332 UART: [kat] ++
2,362,779 UART: [kat] sha1
2,363,289 UART: [kat] SHA2-256
2,363,988 UART: [kat] SHA2-384
2,364,671 UART: [kat] SHA2-512-ACC
2,365,470 UART: [kat] ECC-384
2,945,530 UART: [kat] HMAC-384Kdf
2,970,261 UART: [kat] LMS
3,499,729 UART: [kat] --
3,503,182 UART: [cold-reset] ++
3,505,442 UART: [fht] FHT @ 0x50003400
3,516,974 UART: [idev] ++
3,517,576 UART: [idev] CDI.KEYID = 6
3,518,491 UART: [idev] SUBJECT.KEYID = 7
3,519,652 UART: [idev] UDS.KEYID = 0
3,542,975 UART: [idev] Erasing UDS.KEYID = 0
6,023,504 UART: [idev] Sha1 KeyId Algorithm
6,046,957 UART: [idev] --
6,049,767 UART: [ldev] ++
6,050,341 UART: [ldev] CDI.KEYID = 6
6,051,234 UART: [ldev] SUBJECT.KEYID = 5
6,052,364 UART: [ldev] AUTHORITY.KEYID = 7
6,053,704 UART: [ldev] FE.KEYID = 1
6,098,320 UART: [ldev] Erasing FE.KEYID = 1
8,602,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,531 UART: [ldev] --
10,413,060 UART: [fwproc] Wait for Commands...
10,415,380 UART: [fwproc] Recv command 0x46574c44
10,417,476 UART: [fwproc] Recv'd Img size: 106964 bytes
13,725,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,795,702 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,838,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,157,410 >>> mbox cmd response: success
14,162,251 UART: [afmc] ++
14,162,837 UART: [afmc] CDI.KEYID = 6
14,163,739 UART: [afmc] SUBJECT.KEYID = 7
14,164,958 UART: [afmc] AUTHORITY.KEYID = 5
16,698,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,369 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,364 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,282 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,230 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,673 UART: [afmc] --
18,501,197 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,501,559 UART: [cold-reset] --
18,505,667 UART: [state] Locking Datavault
18,512,104 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,745 UART: [state] Locking ICCM
18,515,812 UART: [exit] Launching FMC @ 0x40000000
18,524,204 UART:
18,524,466 UART: Running Caliptra FMC ...
18,525,491 UART:
18,525,637 UART: [fmc] Received command: 0x10000005
18,527,072 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,213,737 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,939,959 >>> mbox cmd response: success
18,213,093 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,227,403 UART:
18,227,752 UART: Running Caliptra FMC ...
18,228,852 UART:
18,229,005 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,230,796 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
2,221,383 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,357,314 UART:
2,357,769 UART: Running Caliptra ROM ...
2,358,938 UART:
2,359,113 UART: [state] CFI Enabled
2,360,075 UART: [state] LifecycleState = Unprovisioned
2,361,742 UART: [state] DebugLocked = No
2,362,851 UART: [state] WD Timer not started. Device not locked for debugging
2,365,324 UART: [kat] SHA2-256
2,365,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,033 UART: [kat] ++
2,369,486 UART: [kat] sha1
2,370,016 UART: [kat] SHA2-256
2,370,673 UART: [kat] SHA2-384
2,371,328 UART: [kat] SHA2-512-ACC
2,372,160 UART: [kat] ECC-384
3,283,712 UART: [kat] HMAC-384Kdf
3,296,082 UART: [kat] LMS
3,825,578 UART: [kat] --
3,830,512 UART: [cold-reset] ++
3,832,663 UART: [fht] FHT @ 0x50003400
3,844,184 UART: [idev] ++
3,844,743 UART: [idev] CDI.KEYID = 6
3,845,658 UART: [idev] SUBJECT.KEYID = 7
3,846,872 UART: [idev] UDS.KEYID = 0
3,863,010 UART: [idev] Erasing UDS.KEYID = 0
6,316,265 UART: [idev] Sha1 KeyId Algorithm
6,338,304 UART: [idev] --
6,342,458 UART: [ldev] ++
6,343,020 UART: [ldev] CDI.KEYID = 6
6,343,904 UART: [ldev] SUBJECT.KEYID = 5
6,345,117 UART: [ldev] AUTHORITY.KEYID = 7
6,346,324 UART: [ldev] FE.KEYID = 1
6,358,049 UART: [ldev] Erasing FE.KEYID = 1
8,834,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,610 UART: [ldev] --
10,625,063 UART: [fwproc] Wait for Commands...
10,627,010 UART: [fwproc] Recv command 0x46574c44
10,629,071 UART: [fwproc] Recv'd Img size: 106964 bytes
13,943,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,669 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,056,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,374,558 >>> mbox cmd response: success
14,378,882 UART: [afmc] ++
14,379,466 UART: [afmc] CDI.KEYID = 6
14,380,373 UART: [afmc] SUBJECT.KEYID = 7
14,381,526 UART: [afmc] AUTHORITY.KEYID = 5
16,882,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,603,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,605,186 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,621,159 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,637,118 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,653,020 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,675,895 UART: [afmc] --
18,680,472 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,680,852 UART: [cold-reset] --
18,685,768 UART: [state] Locking Datavault
18,692,468 UART: [state] Locking PCR0, PCR1 and PCR31
18,694,106 UART: [state] Locking ICCM
18,696,226 UART: [exit] Launching FMC @ 0x40000000
18,704,611 UART:
18,704,841 UART: Running Caliptra FMC ...
18,705,862 UART:
18,706,005 UART: [fmc] Received command: 0x10000005
18,707,441 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,215,447 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,162,935 >>> mbox cmd response: success
18,394,650 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,407,752 UART:
18,408,103 UART: Running Caliptra FMC ...
18,409,278 UART:
18,409,443 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,411,198 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,216,555 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,351,996 UART:
2,352,434 UART: Running Caliptra ROM ...
2,353,546 UART:
2,353,711 UART: [state] CFI Enabled
2,354,682 UART: [state] LifecycleState = Unprovisioned
2,356,346 UART: [state] DebugLocked = No
2,357,462 UART: [state] WD Timer not started. Device not locked for debugging
2,359,936 UART: [kat] SHA2-256
2,360,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,363,614 UART: [kat] ++
2,364,064 UART: [kat] sha1
2,364,581 UART: [kat] SHA2-256
2,365,240 UART: [kat] SHA2-384
2,365,921 UART: [kat] SHA2-512-ACC
2,366,723 UART: [kat] ECC-384
2,949,203 UART: [kat] HMAC-384Kdf
2,973,312 UART: [kat] LMS
3,502,740 UART: [kat] --
3,507,890 UART: [cold-reset] ++
3,508,802 UART: [fht] FHT @ 0x50003400
3,519,542 UART: [idev] ++
3,520,117 UART: [idev] CDI.KEYID = 6
3,521,081 UART: [idev] SUBJECT.KEYID = 7
3,522,244 UART: [idev] UDS.KEYID = 0
3,544,779 UART: [idev] Erasing UDS.KEYID = 0
6,025,922 UART: [idev] Sha1 KeyId Algorithm
6,048,007 UART: [idev] --
6,050,931 UART: [ldev] ++
6,051,503 UART: [ldev] CDI.KEYID = 6
6,052,417 UART: [ldev] SUBJECT.KEYID = 5
6,053,580 UART: [ldev] AUTHORITY.KEYID = 7
6,054,891 UART: [ldev] FE.KEYID = 1
6,100,256 UART: [ldev] Erasing FE.KEYID = 1
8,604,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,283 UART: [ldev] --
10,415,506 UART: [fwproc] Wait for Commands...
10,418,310 UART: [fwproc] Recv command 0x46574c44
10,420,356 UART: [fwproc] Recv'd Img size: 106964 bytes
13,727,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,804,347 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,846,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,165,087 >>> mbox cmd response: success
14,169,203 UART: [afmc] ++
14,169,809 UART: [afmc] CDI.KEYID = 6
14,170,722 UART: [afmc] SUBJECT.KEYID = 7
14,171,884 UART: [afmc] AUTHORITY.KEYID = 5
16,704,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,599 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,577 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,501 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,472 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,187 UART: [afmc] --
18,501,019 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,501,386 UART: [cold-reset] --
18,504,740 UART: [state] Locking Datavault
18,509,665 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,313 UART: [state] Locking ICCM
18,512,602 UART: [exit] Launching FMC @ 0x40000000
18,520,963 UART:
18,521,205 UART: Running Caliptra FMC ...
18,522,258 UART:
18,522,405 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,523,972 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,211,637 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,930,250 >>> mbox cmd response: success
18,196,800 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,211,095 UART:
18,211,437 UART: Running Caliptra FMC ...
18,212,638 UART:
18,212,804 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,214,587 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,222,463 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,357,721 UART:
2,358,185 UART: Running Caliptra ROM ...
2,359,328 UART:
2,359,497 UART: [state] CFI Enabled
2,360,462 UART: [state] LifecycleState = Unprovisioned
2,362,130 UART: [state] DebugLocked = No
2,363,380 UART: [state] WD Timer not started. Device not locked for debugging
2,365,811 UART: [kat] SHA2-256
2,366,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,508 UART: [kat] ++
2,369,967 UART: [kat] sha1
2,370,476 UART: [kat] SHA2-256
2,371,219 UART: [kat] SHA2-384
2,371,885 UART: [kat] SHA2-512-ACC
2,372,765 UART: [kat] ECC-384
3,278,992 UART: [kat] HMAC-384Kdf
3,291,223 UART: [kat] LMS
3,820,758 UART: [kat] --
3,826,548 UART: [cold-reset] ++
3,829,129 UART: [fht] FHT @ 0x50003400
3,841,779 UART: [idev] ++
3,842,342 UART: [idev] CDI.KEYID = 6
3,843,217 UART: [idev] SUBJECT.KEYID = 7
3,844,376 UART: [idev] UDS.KEYID = 0
3,861,048 UART: [idev] Erasing UDS.KEYID = 0
6,312,514 UART: [idev] Sha1 KeyId Algorithm
6,334,982 UART: [idev] --
6,338,316 UART: [ldev] ++
6,338,878 UART: [ldev] CDI.KEYID = 6
6,339,814 UART: [ldev] SUBJECT.KEYID = 5
6,341,021 UART: [ldev] AUTHORITY.KEYID = 7
6,342,249 UART: [ldev] FE.KEYID = 1
6,353,139 UART: [ldev] Erasing FE.KEYID = 1
8,825,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,934 UART: [ldev] --
10,616,368 UART: [fwproc] Wait for Commands...
10,619,009 UART: [fwproc] Recv command 0x46574c44
10,621,105 UART: [fwproc] Recv'd Img size: 106964 bytes
13,932,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,167 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,047,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,366,232 >>> mbox cmd response: success
14,370,779 UART: [afmc] ++
14,371,370 UART: [afmc] CDI.KEYID = 6
14,372,279 UART: [afmc] SUBJECT.KEYID = 7
14,373,441 UART: [afmc] AUTHORITY.KEYID = 5
16,870,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,590,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,592,398 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,608,403 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,624,338 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,640,265 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,664,595 UART: [afmc] --
18,668,781 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,669,151 UART: [cold-reset] --
18,673,418 UART: [state] Locking Datavault
18,679,632 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,275 UART: [state] Locking ICCM
18,682,853 UART: [exit] Launching FMC @ 0x40000000
18,691,228 UART:
18,691,480 UART: Running Caliptra FMC ...
18,692,508 UART:
18,692,675 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,694,242 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,217,339 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,155,030 >>> mbox cmd response: success
18,387,252 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,403,437 UART:
18,403,799 UART: Running Caliptra FMC ...
18,404,980 UART:
18,405,150 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,406,908 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,320 UART: [ldev] --
1,281,712 UART: [fwproc] Wait for Commands...
1,282,509 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,386 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,507 >>> mbox cmd response: success
2,677,586 UART: [afmc] ++
2,677,754 UART: [afmc] CDI.KEYID = 6
2,678,117 UART: [afmc] SUBJECT.KEYID = 7
2,678,543 UART: [afmc] AUTHORITY.KEYID = 5
2,713,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,778 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,498 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,391 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,084 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,757 UART: [afmc] --
2,756,745 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,767 UART: [cold-reset] --
2,757,551 UART: [state] Locking Datavault
2,758,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,070 UART: [state] Locking ICCM
2,759,612 UART: [exit] Launching FMC @ 0x40000000
2,764,909 UART:
2,764,925 UART: Running Caliptra FMC ...
2,765,333 UART:
2,765,471 UART: [fmc] Received command: 0x10000005
2,766,572 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,273 >>> mbox cmd response: success
2,582,523 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,482 UART:
2,588,498 UART: Running Caliptra FMC ...
2,588,906 UART:
2,589,044 UART: [fmc] Received command: 0x10000005
2,590,145 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,741 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,550 UART: [idev] Sha1 KeyId Algorithm
1,209,576 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,139 UART: [ldev] SUBJECT.KEYID = 5
1,211,566 UART: [ldev] AUTHORITY.KEYID = 7
1,212,029 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,357 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,725 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,477 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,616 >>> mbox cmd response: success
2,678,683 UART: [afmc] ++
2,678,851 UART: [afmc] CDI.KEYID = 6
2,679,214 UART: [afmc] SUBJECT.KEYID = 7
2,679,640 UART: [afmc] AUTHORITY.KEYID = 5
2,715,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,315 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,035 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,928 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,621 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,434 UART: [afmc] --
2,758,484 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,758,506 UART: [cold-reset] --
2,759,304 UART: [state] Locking Datavault
2,760,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,795 UART: [state] Locking ICCM
2,761,423 UART: [exit] Launching FMC @ 0x40000000
2,766,720 UART:
2,766,736 UART: Running Caliptra FMC ...
2,767,144 UART:
2,767,282 UART: [fmc] Received command: 0x10000005
2,768,383 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,538 >>> mbox cmd response: success
2,584,956 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,591,197 UART:
2,591,213 UART: Running Caliptra FMC ...
2,591,621 UART:
2,591,759 UART: [fmc] Received command: 0x10000005
2,592,860 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,500 UART: [state] LifecycleState = Unprovisioned
85,155 UART: [state] DebugLocked = No
85,809 UART: [state] WD Timer not started. Device not locked for debugging
87,016 UART: [kat] SHA2-256
890,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,695 UART: [kat] ++
894,847 UART: [kat] sha1
899,061 UART: [kat] SHA2-256
901,001 UART: [kat] SHA2-384
903,906 UART: [kat] SHA2-512-ACC
905,807 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,554 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,614 UART: [fwproc] Wait for Commands...
1,281,257 UART: [fwproc] Recv command 0x46574c44
1,281,990 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,942 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,909 >>> mbox cmd response: success
2,677,928 UART: [afmc] ++
2,678,096 UART: [afmc] CDI.KEYID = 6
2,678,459 UART: [afmc] SUBJECT.KEYID = 7
2,678,885 UART: [afmc] AUTHORITY.KEYID = 5
2,714,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,534 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,254 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,147 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,840 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,813 UART: [afmc] --
2,757,881 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,903 UART: [cold-reset] --
2,758,701 UART: [state] Locking Datavault
2,759,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,382 UART: [state] Locking ICCM
2,760,956 UART: [exit] Launching FMC @ 0x40000000
2,766,253 UART:
2,766,269 UART: Running Caliptra FMC ...
2,766,677 UART:
2,766,815 UART: [fmc] Received command: 0x10000005
2,767,916 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,123 >>> mbox cmd response: success
2,581,651 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,008 UART:
2,588,024 UART: Running Caliptra FMC ...
2,588,432 UART:
2,588,570 UART: [fmc] Received command: 0x10000005
2,589,671 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,529 UART: [kat] LMS
1,168,841 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,969 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,282,064 UART: [fwproc] Recv command 0x46574c44
1,282,797 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,715 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,764 >>> mbox cmd response: success
2,676,881 UART: [afmc] ++
2,677,049 UART: [afmc] CDI.KEYID = 6
2,677,412 UART: [afmc] SUBJECT.KEYID = 7
2,677,838 UART: [afmc] AUTHORITY.KEYID = 5
2,713,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,551 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,271 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,164 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,857 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,662 UART: [afmc] --
2,756,576 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,598 UART: [cold-reset] --
2,757,538 UART: [state] Locking Datavault
2,758,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,163 UART: [state] Locking ICCM
2,759,611 UART: [exit] Launching FMC @ 0x40000000
2,764,908 UART:
2,764,924 UART: Running Caliptra FMC ...
2,765,332 UART:
2,765,470 UART: [fmc] Received command: 0x10000005
2,766,571 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,684 >>> mbox cmd response: success
2,582,824 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,871 UART:
2,588,887 UART: Running Caliptra FMC ...
2,589,295 UART:
2,589,433 UART: [fmc] Received command: 0x10000005
2,590,534 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,305 UART: [kat] SHA2-256
901,245 UART: [kat] SHA2-384
903,924 UART: [kat] SHA2-512-ACC
905,825 UART: [kat] ECC-384
915,348 UART: [kat] HMAC-384Kdf
919,808 UART: [kat] LMS
1,168,120 UART: [kat] --
1,168,783 UART: [cold-reset] ++
1,169,169 UART: [fht] FHT @ 0x50003400
1,171,799 UART: [idev] ++
1,171,967 UART: [idev] CDI.KEYID = 6
1,172,328 UART: [idev] SUBJECT.KEYID = 7
1,172,753 UART: [idev] UDS.KEYID = 0
1,180,733 UART: [idev] Erasing UDS.KEYID = 0
1,197,359 UART: [idev] Sha1 KeyId Algorithm
1,206,255 UART: [idev] --
1,207,306 UART: [ldev] ++
1,207,474 UART: [ldev] CDI.KEYID = 6
1,207,838 UART: [ldev] SUBJECT.KEYID = 5
1,208,265 UART: [ldev] AUTHORITY.KEYID = 7
1,208,728 UART: [ldev] FE.KEYID = 1
1,213,578 UART: [ldev] Erasing FE.KEYID = 1
1,239,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,269,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,094 UART: [ldev] --
1,278,584 UART: [fwproc] Wait for Commands...
1,279,317 UART: [fwproc] Recv command 0x46574c44
1,280,050 UART: [fwproc] Recv'd Img size: 106964 bytes
2,492,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,316 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,673,377 >>> mbox cmd response: success
2,674,406 UART: [afmc] ++
2,674,574 UART: [afmc] CDI.KEYID = 6
2,674,937 UART: [afmc] SUBJECT.KEYID = 7
2,675,363 UART: [afmc] AUTHORITY.KEYID = 5
2,711,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,282 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,002 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,895 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,588 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,231 UART: [afmc] --
2,754,271 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,293 UART: [cold-reset] --
2,755,159 UART: [state] Locking Datavault
2,756,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,802 UART: [state] Locking ICCM
2,757,434 UART: [exit] Launching FMC @ 0x40000000
2,762,731 UART:
2,762,747 UART: Running Caliptra FMC ...
2,763,155 UART:
2,763,293 UART: [fmc] Received command: 0x10000005
2,764,394 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,945 >>> mbox cmd response: success
2,581,637 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,510 UART:
2,587,526 UART: Running Caliptra FMC ...
2,587,934 UART:
2,588,072 UART: [fmc] Received command: 0x10000005
2,589,173 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,862 UART: [kat] ++
896,014 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,777 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,574 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,858 UART: [idev] ++
1,174,026 UART: [idev] CDI.KEYID = 6
1,174,387 UART: [idev] SUBJECT.KEYID = 7
1,174,812 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,295 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,517 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,532 >>> mbox cmd response: success
2,676,789 UART: [afmc] ++
2,676,957 UART: [afmc] CDI.KEYID = 6
2,677,320 UART: [afmc] SUBJECT.KEYID = 7
2,677,746 UART: [afmc] AUTHORITY.KEYID = 5
2,713,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,681 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,401 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,294 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,987 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,728 UART: [afmc] --
2,756,782 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,804 UART: [cold-reset] --
2,757,844 UART: [state] Locking Datavault
2,758,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,591 UART: [state] Locking ICCM
2,760,067 UART: [exit] Launching FMC @ 0x40000000
2,765,364 UART:
2,765,380 UART: Running Caliptra FMC ...
2,765,788 UART:
2,765,926 UART: [fmc] Received command: 0x10000005
2,767,027 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,536 >>> mbox cmd response: success
2,585,964 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,592,103 UART:
2,592,119 UART: Running Caliptra FMC ...
2,592,527 UART:
2,592,665 UART: [fmc] Received command: 0x10000005
2,593,766 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,215,935 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,350,601 UART:
2,350,999 UART: Running Caliptra ROM ...
2,352,077 UART:
2,352,234 UART: [state] CFI Enabled
2,353,220 UART: [state] LifecycleState = Unprovisioned
2,354,875 UART: [state] DebugLocked = No
2,355,903 UART: [state] WD Timer not started. Device not locked for debugging
2,358,374 UART: [kat] SHA2-256
2,359,043 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,362,052 UART: [kat] ++
2,362,504 UART: [kat] sha1
2,363,021 UART: [kat] SHA2-256
2,363,681 UART: [kat] SHA2-384
2,364,360 UART: [kat] SHA2-512-ACC
2,365,162 UART: [kat] ECC-384
3,773,963 UART: [kat] HMAC-384Kdf
3,802,572 UART: [kat] LMS
4,875,694 UART: [kat] --
4,880,025 UART: [cold-reset] ++
4,881,430 UART: [fht] FHT @ 0x50003400
4,892,785 UART: [idev] ++
4,893,460 UART: [idev] CDI.KEYID = 6
4,894,691 UART: [idev] SUBJECT.KEYID = 7
4,895,793 UART: [idev] UDS.KEYID = 0
4,929,963 UART: [idev] Erasing UDS.KEYID = 0
8,243,960 UART: [idev] Sha1 KeyId Algorithm
8,265,618 UART: [idev] --
8,270,269 UART: [ldev] ++
8,270,836 UART: [ldev] CDI.KEYID = 6
8,272,096 UART: [ldev] SUBJECT.KEYID = 5
8,273,130 UART: [ldev] AUTHORITY.KEYID = 7
8,274,470 UART: [ldev] FE.KEYID = 1
8,310,498 UART: [ldev] Erasing FE.KEYID = 1
11,645,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,957,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,973,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,989,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,005,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,025,360 UART: [ldev] --
14,029,816 UART: [fwproc] Wait for Commands...
14,032,830 UART: [fwproc] Recv command 0x46574c44
14,035,147 UART: [fwproc] Recv'd Img size: 106620 bytes
18,019,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,092,810 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,135,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,452,021 >>> mbox cmd response: success
18,456,321 UART: [afmc] ++
18,456,913 UART: [afmc] CDI.KEYID = 6
18,458,099 UART: [afmc] SUBJECT.KEYID = 7
18,459,208 UART: [afmc] AUTHORITY.KEYID = 5
21,831,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,131,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,134,284 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,150,330 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,166,375 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,182,476 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,204,599 UART: [afmc] --
24,208,696 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,209,112 UART: [cold-reset] --
24,212,419 UART: [state] Locking Datavault
24,219,571 UART: [state] Locking PCR0, PCR1 and PCR31
24,221,241 UART: [state] Locking ICCM
24,224,202 UART: [exit] Launching FMC @ 0x40000000
24,232,810 UART:
24,233,041 UART: Running Caliptra FMC ...
24,234,145 UART:
24,234,307 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,235,875 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,213,090 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,197,574 >>> mbox cmd response: success
23,870,449 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,886,532 UART:
23,886,848 UART: Running Caliptra FMC ...
23,888,005 UART:
23,888,176 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,889,917 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,219,242 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,354,202 UART:
2,354,647 UART: Running Caliptra ROM ...
2,355,828 UART:
2,355,990 UART: [state] CFI Enabled
2,356,965 UART: [state] LifecycleState = Unprovisioned
2,358,607 UART: [state] DebugLocked = No
2,359,709 UART: [state] WD Timer not started. Device not locked for debugging
2,362,174 UART: [kat] SHA2-256
2,362,833 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,830 UART: [kat] ++
2,366,274 UART: [kat] sha1
2,366,777 UART: [kat] SHA2-256
2,367,508 UART: [kat] SHA2-384
2,368,187 UART: [kat] SHA2-512-ACC
2,369,066 UART: [kat] ECC-384
4,102,418 UART: [kat] HMAC-384Kdf
4,114,615 UART: [kat] LMS
5,187,747 UART: [kat] --
5,192,994 UART: [cold-reset] ++
5,194,825 UART: [fht] FHT @ 0x50003400
5,205,694 UART: [idev] ++
5,206,358 UART: [idev] CDI.KEYID = 6
5,207,515 UART: [idev] SUBJECT.KEYID = 7
5,209,051 UART: [idev] UDS.KEYID = 0
5,225,365 UART: [idev] Erasing UDS.KEYID = 0
8,498,983 UART: [idev] Sha1 KeyId Algorithm
8,519,732 UART: [idev] --
8,524,511 UART: [ldev] ++
8,525,086 UART: [ldev] CDI.KEYID = 6
8,526,284 UART: [ldev] SUBJECT.KEYID = 5
8,527,770 UART: [ldev] AUTHORITY.KEYID = 7
8,529,330 UART: [ldev] FE.KEYID = 1
8,542,408 UART: [ldev] Erasing FE.KEYID = 1
11,835,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,571 UART: [ldev] --
14,198,712 UART: [fwproc] Wait for Commands...
14,201,189 UART: [fwproc] Recv command 0x46574c44
14,203,501 UART: [fwproc] Recv'd Img size: 106620 bytes
18,189,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,261,573 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,304,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,621,692 >>> mbox cmd response: success
18,625,390 UART: [afmc] ++
18,625,977 UART: [afmc] CDI.KEYID = 6
18,627,163 UART: [afmc] SUBJECT.KEYID = 7
18,628,313 UART: [afmc] AUTHORITY.KEYID = 5
21,945,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,241,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,244,093 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,260,132 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,276,199 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,292,278 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,314,608 UART: [afmc] --
24,318,960 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,319,324 UART: [cold-reset] --
24,324,617 UART: [state] Locking Datavault
24,332,244 UART: [state] Locking PCR0, PCR1 and PCR31
24,333,912 UART: [state] Locking ICCM
24,336,820 UART: [exit] Launching FMC @ 0x40000000
24,345,456 UART:
24,345,736 UART: Running Caliptra FMC ...
24,346,846 UART:
24,347,007 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,348,603 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,214,901 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,407,120 >>> mbox cmd response: success
24,027,055 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,041,820 UART:
24,042,150 UART: Running Caliptra FMC ...
24,043,312 UART:
24,043,480 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,045,247 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
2,216,225 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,351,770 UART:
2,352,209 UART: Running Caliptra ROM ...
2,353,291 UART:
2,353,463 UART: [state] CFI Enabled
2,354,452 UART: [state] LifecycleState = Unprovisioned
2,356,125 UART: [state] DebugLocked = No
2,357,236 UART: [state] WD Timer not started. Device not locked for debugging
2,359,712 UART: [kat] SHA2-256
2,360,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,363,381 UART: [kat] ++
2,363,835 UART: [kat] sha1
2,364,350 UART: [kat] SHA2-256
2,365,089 UART: [kat] SHA2-384
2,365,754 UART: [kat] SHA2-512-ACC
2,366,582 UART: [kat] ECC-384
2,948,507 UART: [kat] HMAC-384Kdf
2,971,207 UART: [kat] LMS
3,500,679 UART: [kat] --
3,505,804 UART: [cold-reset] ++
3,508,065 UART: [fht] FHT @ 0x50003400
3,519,602 UART: [idev] ++
3,520,176 UART: [idev] CDI.KEYID = 6
3,521,055 UART: [idev] SUBJECT.KEYID = 7
3,522,272 UART: [idev] UDS.KEYID = 0
3,542,466 UART: [idev] Erasing UDS.KEYID = 0
6,023,649 UART: [idev] Sha1 KeyId Algorithm
6,047,460 UART: [idev] --
6,052,055 UART: [ldev] ++
6,052,638 UART: [ldev] CDI.KEYID = 6
6,053,558 UART: [ldev] SUBJECT.KEYID = 5
6,054,638 UART: [ldev] AUTHORITY.KEYID = 7
6,055,978 UART: [ldev] FE.KEYID = 1
6,099,405 UART: [ldev] Erasing FE.KEYID = 1
8,600,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,322 UART: [ldev] --
10,391,994 UART: [fwproc] Wait for Commands...
10,394,314 UART: [fwproc] Recv command 0x46574c44
10,396,360 UART: [fwproc] Recv'd Img size: 106964 bytes
13,710,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,786,885 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,829,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,148,420 >>> mbox cmd response: success
14,152,432 UART: [afmc] ++
14,153,017 UART: [afmc] CDI.KEYID = 6
14,153,933 UART: [afmc] SUBJECT.KEYID = 7
14,155,090 UART: [afmc] AUTHORITY.KEYID = 5
16,681,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,402,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,404,568 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,420,578 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,436,499 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,452,410 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,475,401 UART: [afmc] --
18,479,224 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,479,601 UART: [cold-reset] --
18,483,885 UART: [state] Locking Datavault
18,488,200 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,861 UART: [state] Locking ICCM
18,491,689 UART: [exit] Launching FMC @ 0x40000000
18,500,091 UART:
18,500,331 UART: Running Caliptra FMC ...
18,501,433 UART:
18,501,592 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,503,178 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,218,084 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,929,413 >>> mbox cmd response: success
18,201,776 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,214,868 UART:
18,215,225 UART: Running Caliptra FMC ...
18,216,399 UART:
18,216,567 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,218,322 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,219,514 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,354,794 UART:
2,355,209 UART: Running Caliptra ROM ...
2,356,385 UART:
2,356,558 UART: [state] CFI Enabled
2,357,523 UART: [state] LifecycleState = Unprovisioned
2,359,183 UART: [state] DebugLocked = No
2,360,213 UART: [state] WD Timer not started. Device not locked for debugging
2,362,681 UART: [kat] SHA2-256
2,363,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,352 UART: [kat] ++
2,366,816 UART: [kat] sha1
2,367,328 UART: [kat] SHA2-256
2,367,984 UART: [kat] SHA2-384
2,368,640 UART: [kat] SHA2-512-ACC
2,369,481 UART: [kat] ECC-384
3,274,375 UART: [kat] HMAC-384Kdf
3,286,040 UART: [kat] LMS
3,815,520 UART: [kat] --
3,820,888 UART: [cold-reset] ++
3,821,739 UART: [fht] FHT @ 0x50003400
3,834,178 UART: [idev] ++
3,834,741 UART: [idev] CDI.KEYID = 6
3,835,703 UART: [idev] SUBJECT.KEYID = 7
3,836,859 UART: [idev] UDS.KEYID = 0
3,854,674 UART: [idev] Erasing UDS.KEYID = 0
6,307,291 UART: [idev] Sha1 KeyId Algorithm
6,329,844 UART: [idev] --
6,334,164 UART: [ldev] ++
6,334,733 UART: [ldev] CDI.KEYID = 6
6,335,643 UART: [ldev] SUBJECT.KEYID = 5
6,336,800 UART: [ldev] AUTHORITY.KEYID = 7
6,338,256 UART: [ldev] FE.KEYID = 1
6,349,607 UART: [ldev] Erasing FE.KEYID = 1
8,821,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,025 UART: [ldev] --
10,613,048 UART: [fwproc] Wait for Commands...
10,615,307 UART: [fwproc] Recv command 0x46574c44
10,617,404 UART: [fwproc] Recv'd Img size: 106964 bytes
13,928,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,125 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,046,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,365,873 >>> mbox cmd response: success
14,370,969 UART: [afmc] ++
14,371,551 UART: [afmc] CDI.KEYID = 6
14,372,430 UART: [afmc] SUBJECT.KEYID = 7
14,373,588 UART: [afmc] AUTHORITY.KEYID = 5
16,876,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,728 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,615,725 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,631,642 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,647,598 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,670,833 UART: [afmc] --
18,675,369 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,675,764 UART: [cold-reset] --
18,679,281 UART: [state] Locking Datavault
18,684,907 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,550 UART: [state] Locking ICCM
18,688,698 UART: [exit] Launching FMC @ 0x40000000
18,697,039 UART:
18,697,283 UART: Running Caliptra FMC ...
18,698,382 UART:
18,698,537 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,700,100 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,215,442 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,153,900 >>> mbox cmd response: success
18,390,867 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,406,842 UART:
18,407,194 UART: Running Caliptra FMC ...
18,408,295 UART:
18,408,444 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,410,191 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,218,856 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,354,341 UART:
2,354,761 UART: Running Caliptra ROM ...
2,355,846 UART:
2,356,011 UART: [state] CFI Enabled
2,356,997 UART: [state] LifecycleState = Unprovisioned
2,358,666 UART: [state] DebugLocked = No
2,359,774 UART: [state] WD Timer not started. Device not locked for debugging
2,362,242 UART: [kat] SHA2-256
2,362,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,918 UART: [kat] ++
2,366,368 UART: [kat] sha1
2,366,926 UART: [kat] SHA2-256
2,367,784 UART: [kat] SHA2-384
2,368,471 UART: [kat] SHA2-512-ACC
2,369,369 UART: [kat] ECC-384
2,949,032 UART: [kat] HMAC-384Kdf
2,971,432 UART: [kat] LMS
3,500,901 UART: [kat] --
3,505,866 UART: [cold-reset] ++
3,508,012 UART: [fht] FHT @ 0x50003400
3,517,968 UART: [idev] ++
3,518,533 UART: [idev] CDI.KEYID = 6
3,519,545 UART: [idev] SUBJECT.KEYID = 7
3,520,701 UART: [idev] UDS.KEYID = 0
3,542,740 UART: [idev] Erasing UDS.KEYID = 0
6,026,520 UART: [idev] Sha1 KeyId Algorithm
6,050,676 UART: [idev] --
6,054,677 UART: [ldev] ++
6,055,253 UART: [ldev] CDI.KEYID = 6
6,056,181 UART: [ldev] SUBJECT.KEYID = 5
6,057,347 UART: [ldev] AUTHORITY.KEYID = 7
6,058,580 UART: [ldev] FE.KEYID = 1
6,097,972 UART: [ldev] Erasing FE.KEYID = 1
8,602,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,920 UART: [ldev] --
10,413,186 UART: [fwproc] Wait for Commands...
10,415,446 UART: [fwproc] Recv command 0x46574c44
10,417,544 UART: [fwproc] Recv'd Img size: 106964 bytes
13,730,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,799,347 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,841,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,160,920 >>> mbox cmd response: success
14,164,836 UART: [afmc] ++
14,165,424 UART: [afmc] CDI.KEYID = 6
14,166,332 UART: [afmc] SUBJECT.KEYID = 7
14,167,546 UART: [afmc] AUTHORITY.KEYID = 5
16,699,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,107 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,086 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,004 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,976 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,675 UART: [afmc] --
18,500,319 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,500,695 UART: [cold-reset] --
18,505,504 UART: [state] Locking Datavault
18,510,319 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,978 UART: [state] Locking ICCM
18,514,667 UART: [exit] Launching FMC @ 0x40000000
18,523,020 UART:
18,523,262 UART: Running Caliptra FMC ...
18,524,364 UART:
18,524,524 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,526,096 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,210,482 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,879,720 >>> mbox cmd response: success
18,157,138 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,169,424 UART:
18,169,766 UART: Running Caliptra FMC ...
18,170,937 UART:
18,171,104 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,172,873 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,220,975 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,356,289 UART:
2,356,711 UART: Running Caliptra ROM ...
2,357,826 UART:
2,357,988 UART: [state] CFI Enabled
2,358,880 UART: [state] LifecycleState = Unprovisioned
2,360,546 UART: [state] DebugLocked = No
2,361,655 UART: [state] WD Timer not started. Device not locked for debugging
2,364,136 UART: [kat] SHA2-256
2,364,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,826 UART: [kat] ++
2,368,275 UART: [kat] sha1
2,368,836 UART: [kat] SHA2-256
2,369,500 UART: [kat] SHA2-384
2,370,160 UART: [kat] SHA2-512-ACC
2,371,048 UART: [kat] ECC-384
3,285,349 UART: [kat] HMAC-384Kdf
3,298,019 UART: [kat] LMS
3,827,513 UART: [kat] --
3,831,721 UART: [cold-reset] ++
3,833,115 UART: [fht] FHT @ 0x50003400
3,843,064 UART: [idev] ++
3,843,627 UART: [idev] CDI.KEYID = 6
3,844,640 UART: [idev] SUBJECT.KEYID = 7
3,845,801 UART: [idev] UDS.KEYID = 0
3,860,888 UART: [idev] Erasing UDS.KEYID = 0
6,318,410 UART: [idev] Sha1 KeyId Algorithm
6,341,035 UART: [idev] --
6,344,122 UART: [ldev] ++
6,344,690 UART: [ldev] CDI.KEYID = 6
6,345,600 UART: [ldev] SUBJECT.KEYID = 5
6,346,763 UART: [ldev] AUTHORITY.KEYID = 7
6,348,052 UART: [ldev] FE.KEYID = 1
6,359,861 UART: [ldev] Erasing FE.KEYID = 1
8,834,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,833 UART: [ldev] --
10,624,749 UART: [fwproc] Wait for Commands...
10,627,767 UART: [fwproc] Recv command 0x46574c44
10,629,861 UART: [fwproc] Recv'd Img size: 106964 bytes
13,940,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,919 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,055,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,373,308 >>> mbox cmd response: success
14,376,881 UART: [afmc] ++
14,377,470 UART: [afmc] CDI.KEYID = 6
14,378,379 UART: [afmc] SUBJECT.KEYID = 7
14,379,537 UART: [afmc] AUTHORITY.KEYID = 5
16,881,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,603,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,605,538 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,621,517 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,637,435 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,653,396 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,677,230 UART: [afmc] --
18,681,085 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,681,465 UART: [cold-reset] --
18,685,220 UART: [state] Locking Datavault
18,689,060 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,705 UART: [state] Locking ICCM
18,692,695 UART: [exit] Launching FMC @ 0x40000000
18,701,091 UART:
18,701,335 UART: Running Caliptra FMC ...
18,702,433 UART:
18,702,588 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,704,160 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,219,176 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,152,194 >>> mbox cmd response: success
18,391,811 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,405,272 UART:
18,405,602 UART: Running Caliptra FMC ...
18,406,772 UART:
18,406,937 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,408,710 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,829 UART: [kat] ++
894,981 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,208 UART: [kat] LMS
1,168,520 UART: [kat] --
1,169,273 UART: [cold-reset] ++
1,169,847 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,215,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,690 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,769 UART: [fwproc] Recv command 0x46574c44
1,282,502 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,004 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,117 >>> mbox cmd response: success
2,677,312 UART: [afmc] ++
2,677,480 UART: [afmc] CDI.KEYID = 6
2,677,843 UART: [afmc] SUBJECT.KEYID = 7
2,678,269 UART: [afmc] AUTHORITY.KEYID = 5
2,712,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,708 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,428 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,321 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,014 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,857 UART: [afmc] --
2,755,795 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,817 UART: [cold-reset] --
2,756,635 UART: [state] Locking Datavault
2,757,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,432 UART: [state] Locking ICCM
2,758,896 UART: [exit] Launching FMC @ 0x40000000
2,764,193 UART:
2,764,209 UART: Running Caliptra FMC ...
2,764,617 UART:
2,764,755 UART: [fmc] Received command: 0x10000005
2,765,856 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,217 >>> mbox cmd response: success
2,579,651 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,754 UART:
2,585,770 UART: Running Caliptra FMC ...
2,586,178 UART:
2,586,316 UART: [fmc] Received command: 0x10000005
2,587,417 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,935 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,377 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,337 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,436 >>> mbox cmd response: success
2,677,679 UART: [afmc] ++
2,677,847 UART: [afmc] CDI.KEYID = 6
2,678,210 UART: [afmc] SUBJECT.KEYID = 7
2,678,636 UART: [afmc] AUTHORITY.KEYID = 5
2,713,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,903 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,623 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,516 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,209 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,178 UART: [afmc] --
2,757,112 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,134 UART: [cold-reset] --
2,757,988 UART: [state] Locking Datavault
2,759,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,051 UART: [state] Locking ICCM
2,760,725 UART: [exit] Launching FMC @ 0x40000000
2,766,022 UART:
2,766,038 UART: Running Caliptra FMC ...
2,766,446 UART:
2,766,584 UART: [fmc] Received command: 0x10000005
2,767,685 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,064 >>> mbox cmd response: success
2,583,590 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,319 UART:
2,589,335 UART: Running Caliptra FMC ...
2,589,743 UART:
2,589,881 UART: [fmc] Received command: 0x10000005
2,590,982 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,387 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,312 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,429 >>> mbox cmd response: success
2,678,518 UART: [afmc] ++
2,678,686 UART: [afmc] CDI.KEYID = 6
2,679,049 UART: [afmc] SUBJECT.KEYID = 7
2,679,475 UART: [afmc] AUTHORITY.KEYID = 5
2,715,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,288 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,008 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,901 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,594 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,477 UART: [afmc] --
2,758,569 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,758,591 UART: [cold-reset] --
2,759,659 UART: [state] Locking Datavault
2,760,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,304 UART: [state] Locking ICCM
2,761,800 UART: [exit] Launching FMC @ 0x40000000
2,767,097 UART:
2,767,113 UART: Running Caliptra FMC ...
2,767,521 UART:
2,767,659 UART: [fmc] Received command: 0x10000005
2,768,760 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,521 >>> mbox cmd response: success
2,580,909 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,056 UART:
2,587,072 UART: Running Caliptra FMC ...
2,587,480 UART:
2,587,618 UART: [fmc] Received command: 0x10000005
2,588,719 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,945 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,281,904 UART: [fwproc] Recv command 0x46574c44
1,282,637 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,967 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,940 >>> mbox cmd response: success
2,676,981 UART: [afmc] ++
2,677,149 UART: [afmc] CDI.KEYID = 6
2,677,512 UART: [afmc] SUBJECT.KEYID = 7
2,677,938 UART: [afmc] AUTHORITY.KEYID = 5
2,713,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,971 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,691 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,584 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,277 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,272 UART: [afmc] --
2,757,220 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,242 UART: [cold-reset] --
2,758,218 UART: [state] Locking Datavault
2,759,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,307 UART: [state] Locking ICCM
2,760,749 UART: [exit] Launching FMC @ 0x40000000
2,766,046 UART:
2,766,062 UART: Running Caliptra FMC ...
2,766,470 UART:
2,766,608 UART: [fmc] Received command: 0x10000005
2,767,709 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,852 >>> mbox cmd response: success
2,582,106 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,199 UART:
2,588,215 UART: Running Caliptra FMC ...
2,588,623 UART:
2,588,761 UART: [fmc] Received command: 0x10000005
2,589,862 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,160 UART: [fwproc] Wait for Commands...
1,280,907 UART: [fwproc] Recv command 0x46574c44
1,281,640 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,124 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,277 >>> mbox cmd response: success
2,676,312 UART: [afmc] ++
2,676,480 UART: [afmc] CDI.KEYID = 6
2,676,843 UART: [afmc] SUBJECT.KEYID = 7
2,677,269 UART: [afmc] AUTHORITY.KEYID = 5
2,712,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,976 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,696 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,589 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,282 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,167 UART: [afmc] --
2,755,199 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,221 UART: [cold-reset] --
2,756,135 UART: [state] Locking Datavault
2,757,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,018 UART: [state] Locking ICCM
2,758,618 UART: [exit] Launching FMC @ 0x40000000
2,763,915 UART:
2,763,931 UART: Running Caliptra FMC ...
2,764,339 UART:
2,764,477 UART: [fmc] Received command: 0x10000005
2,765,578 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,737 >>> mbox cmd response: success
2,581,017 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,986 UART:
2,587,002 UART: Running Caliptra FMC ...
2,587,410 UART:
2,587,548 UART: [fmc] Received command: 0x10000005
2,588,649 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,243 UART: [kat] LMS
1,168,555 UART: [kat] --
1,169,262 UART: [cold-reset] ++
1,169,638 UART: [fht] FHT @ 0x50003400
1,172,286 UART: [idev] ++
1,172,454 UART: [idev] CDI.KEYID = 6
1,172,815 UART: [idev] SUBJECT.KEYID = 7
1,173,240 UART: [idev] UDS.KEYID = 0
1,181,206 UART: [idev] Erasing UDS.KEYID = 0
1,198,246 UART: [idev] Sha1 KeyId Algorithm
1,207,026 UART: [idev] --
1,207,969 UART: [ldev] ++
1,208,137 UART: [ldev] CDI.KEYID = 6
1,208,501 UART: [ldev] SUBJECT.KEYID = 5
1,208,928 UART: [ldev] AUTHORITY.KEYID = 7
1,209,391 UART: [ldev] FE.KEYID = 1
1,214,511 UART: [ldev] Erasing FE.KEYID = 1
1,240,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,799 UART: [ldev] --
1,280,187 UART: [fwproc] Wait for Commands...
1,280,762 UART: [fwproc] Recv command 0x46574c44
1,281,495 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,701 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,864 >>> mbox cmd response: success
2,676,077 UART: [afmc] ++
2,676,245 UART: [afmc] CDI.KEYID = 6
2,676,608 UART: [afmc] SUBJECT.KEYID = 7
2,677,034 UART: [afmc] AUTHORITY.KEYID = 5
2,713,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,449 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,169 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,062 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,755 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,536 UART: [afmc] --
2,756,520 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,542 UART: [cold-reset] --
2,757,232 UART: [state] Locking Datavault
2,758,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,935 UART: [state] Locking ICCM
2,759,441 UART: [exit] Launching FMC @ 0x40000000
2,764,738 UART:
2,764,754 UART: Running Caliptra FMC ...
2,765,162 UART:
2,765,300 UART: [fmc] Received command: 0x10000005
2,766,401 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,068 >>> mbox cmd response: success
2,584,236 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,871 UART:
2,589,887 UART: Running Caliptra FMC ...
2,590,295 UART:
2,590,433 UART: [fmc] Received command: 0x10000005
2,591,534 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,215,459 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,350,478 UART:
2,350,899 UART: Running Caliptra ROM ...
2,352,068 UART:
2,352,252 UART: [state] CFI Enabled
2,353,236 UART: [state] LifecycleState = Unprovisioned
2,354,882 UART: [state] DebugLocked = No
2,355,983 UART: [state] WD Timer not started. Device not locked for debugging
2,358,456 UART: [kat] SHA2-256
2,359,125 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,362,139 UART: [kat] ++
2,362,590 UART: [kat] sha1
2,363,106 UART: [kat] SHA2-256
2,363,845 UART: [kat] SHA2-384
2,364,518 UART: [kat] SHA2-512-ACC
2,365,396 UART: [kat] ECC-384
3,777,237 UART: [kat] HMAC-384Kdf
3,803,566 UART: [kat] LMS
4,876,699 UART: [kat] --
4,882,938 UART: [cold-reset] ++
4,884,497 UART: [fht] FHT @ 0x50003400
4,895,149 UART: [idev] ++
4,895,822 UART: [idev] CDI.KEYID = 6
4,897,051 UART: [idev] SUBJECT.KEYID = 7
4,898,216 UART: [idev] UDS.KEYID = 0
4,930,185 UART: [idev] Erasing UDS.KEYID = 0
8,246,222 UART: [idev] Sha1 KeyId Algorithm
8,269,321 UART: [idev] --
8,272,750 UART: [ldev] ++
8,273,320 UART: [ldev] CDI.KEYID = 6
8,274,485 UART: [ldev] SUBJECT.KEYID = 5
8,275,692 UART: [ldev] AUTHORITY.KEYID = 7
8,276,863 UART: [ldev] FE.KEYID = 1
8,317,731 UART: [ldev] Erasing FE.KEYID = 1
11,650,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,376 UART: [ldev] --
14,038,114 UART: [fwproc] Wait for Commands...
14,039,942 UART: [fwproc] Recv command 0x46574c44
14,042,262 UART: [fwproc] Recv'd Img size: 106620 bytes
18,018,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,092,197 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,134,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,451,658 >>> mbox cmd response: success
18,455,587 UART: [afmc] ++
18,456,193 UART: [afmc] CDI.KEYID = 6
18,457,379 UART: [afmc] SUBJECT.KEYID = 7
18,458,490 UART: [afmc] AUTHORITY.KEYID = 5
21,810,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,112,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,115,226 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,131,287 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,147,341 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,163,383 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,185,146 UART: [afmc] --
24,188,838 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,189,220 UART: [cold-reset] --
24,193,004 UART: [state] Locking Datavault
24,199,025 UART: [state] Locking PCR0, PCR1 and PCR31
24,200,734 UART: [state] Locking ICCM
24,201,962 UART: [exit] Launching FMC @ 0x40000000
24,210,593 UART:
24,210,827 UART: Running Caliptra FMC ...
24,211,849 UART:
24,211,993 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,221,907 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,208,261 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,230,656 >>> mbox cmd response: success
23,915,529 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,931,788 UART:
23,932,135 UART: Running Caliptra FMC ...
23,933,301 UART:
23,933,475 UART: [fmc] Received command: 0x10000003
23,942,894 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,219,367 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,354,065 UART:
2,354,475 UART: Running Caliptra ROM ...
2,355,649 UART:
2,355,821 UART: [state] CFI Enabled
2,356,804 UART: [state] LifecycleState = Unprovisioned
2,358,442 UART: [state] DebugLocked = No
2,359,542 UART: [state] WD Timer not started. Device not locked for debugging
2,362,009 UART: [kat] SHA2-256
2,363,014 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,366,080 UART: [kat] ++
2,366,533 UART: [kat] sha1
2,367,043 UART: [kat] SHA2-256
2,367,694 UART: [kat] SHA2-384
2,368,344 UART: [kat] SHA2-512-ACC
2,369,136 UART: [kat] ECC-384
4,099,056 UART: [kat] HMAC-384Kdf
4,111,845 UART: [kat] LMS
5,185,017 UART: [kat] --
5,189,038 UART: [cold-reset] ++
5,190,876 UART: [fht] FHT @ 0x50003400
5,202,770 UART: [idev] ++
5,203,445 UART: [idev] CDI.KEYID = 6
5,204,676 UART: [idev] SUBJECT.KEYID = 7
5,206,108 UART: [idev] UDS.KEYID = 0
5,224,994 UART: [idev] Erasing UDS.KEYID = 0
8,495,956 UART: [idev] Sha1 KeyId Algorithm
8,516,869 UART: [idev] --
8,521,289 UART: [ldev] ++
8,521,853 UART: [ldev] CDI.KEYID = 6
8,523,126 UART: [ldev] SUBJECT.KEYID = 5
8,524,568 UART: [ldev] AUTHORITY.KEYID = 7
8,526,119 UART: [ldev] FE.KEYID = 1
8,538,113 UART: [ldev] Erasing FE.KEYID = 1
11,832,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,336 UART: [ldev] --
14,195,946 UART: [fwproc] Wait for Commands...
14,198,153 UART: [fwproc] Recv command 0x46574c44
14,200,488 UART: [fwproc] Recv'd Img size: 106620 bytes
18,177,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,245,095 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,287,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,604,380 >>> mbox cmd response: success
18,608,576 UART: [afmc] ++
18,609,167 UART: [afmc] CDI.KEYID = 6
18,610,348 UART: [afmc] SUBJECT.KEYID = 7
18,611,505 UART: [afmc] AUTHORITY.KEYID = 5
21,927,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,225,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,227,469 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,243,456 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,259,523 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,275,598 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,297,084 UART: [afmc] --
24,299,852 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,300,239 UART: [cold-reset] --
24,303,530 UART: [state] Locking Datavault
24,309,700 UART: [state] Locking PCR0, PCR1 and PCR31
24,311,395 UART: [state] Locking ICCM
24,313,490 UART: [exit] Launching FMC @ 0x40000000
24,322,103 UART:
24,322,326 UART: Running Caliptra FMC ...
24,323,420 UART:
24,323,573 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,333,407 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,217,605 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,430,420 >>> mbox cmd response: success
24,052,195 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,066,674 UART:
24,067,020 UART: Running Caliptra FMC ...
24,068,212 UART:
24,068,391 UART: [fmc] Received command: 0x10000003
24,077,787 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,214,111 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,349,273 UART:
2,349,686 UART: Running Caliptra ROM ...
2,350,853 UART:
2,351,025 UART: [state] CFI Enabled
2,351,989 UART: [state] LifecycleState = Unprovisioned
2,353,643 UART: [state] DebugLocked = No
2,354,755 UART: [state] WD Timer not started. Device not locked for debugging
2,357,567 UART: [kat] SHA2-256
2,358,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,395 UART: [kat] ++
2,361,845 UART: [kat] sha1
2,362,379 UART: [kat] SHA2-256
2,363,127 UART: [kat] SHA2-384
2,363,793 UART: [kat] SHA2-512-ACC
2,364,623 UART: [kat] ECC-384
2,926,550 UART: [kat] HMAC-384Kdf
2,950,117 UART: [kat] LMS
3,479,593 UART: [kat] --
3,483,154 UART: [cold-reset] ++
3,485,259 UART: [fht] FHT @ 0x50003400
3,496,507 UART: [idev] ++
3,497,071 UART: [idev] CDI.KEYID = 6
3,498,011 UART: [idev] SUBJECT.KEYID = 7
3,499,227 UART: [idev] UDS.KEYID = 0
3,522,899 UART: [idev] Erasing UDS.KEYID = 0
6,006,418 UART: [idev] Sha1 KeyId Algorithm
6,029,053 UART: [idev] --
6,031,513 UART: [ldev] ++
6,032,087 UART: [ldev] CDI.KEYID = 6
6,033,012 UART: [ldev] SUBJECT.KEYID = 5
6,034,232 UART: [ldev] AUTHORITY.KEYID = 7
6,035,462 UART: [ldev] FE.KEYID = 1
6,077,336 UART: [ldev] Erasing FE.KEYID = 1
8,580,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,180 UART: [ldev] --
10,389,534 UART: [fwproc] Wait for Commands...
10,392,607 UART: [fwproc] Recv command 0x46574c44
10,394,707 UART: [fwproc] Recv'd Img size: 106964 bytes
13,701,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,775,976 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,818,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,136,466 >>> mbox cmd response: success
14,140,101 UART: [afmc] ++
14,140,689 UART: [afmc] CDI.KEYID = 6
14,141,579 UART: [afmc] SUBJECT.KEYID = 7
14,142,677 UART: [afmc] AUTHORITY.KEYID = 5
16,680,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,402,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,404,167 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,420,161 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,436,083 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,452,045 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,474,716 UART: [afmc] --
18,478,211 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,478,582 UART: [cold-reset] --
18,481,630 UART: [state] Locking Datavault
18,487,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,069 UART: [state] Locking ICCM
18,491,170 UART: [exit] Launching FMC @ 0x40000000
18,499,570 UART:
18,499,817 UART: Running Caliptra FMC ...
18,500,920 UART:
18,501,081 UART: [fmc] Received command: 0x10000003
18,510,600 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,213,278 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,951,582 >>> mbox cmd response: success
18,253,038 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,268,158 UART:
18,268,522 UART: Running Caliptra FMC ...
18,269,707 UART:
18,269,878 UART: [fmc] Received command: 0x10000003
18,279,313 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,220,464 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,355,895 UART:
2,356,327 UART: Running Caliptra ROM ...
2,357,496 UART:
2,357,666 UART: [state] CFI Enabled
2,358,621 UART: [state] LifecycleState = Unprovisioned
2,360,285 UART: [state] DebugLocked = No
2,361,391 UART: [state] WD Timer not started. Device not locked for debugging
2,363,861 UART: [kat] SHA2-256
2,364,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,543 UART: [kat] ++
2,367,991 UART: [kat] sha1
2,368,540 UART: [kat] SHA2-256
2,369,221 UART: [kat] SHA2-384
2,369,878 UART: [kat] SHA2-512-ACC
2,370,678 UART: [kat] ECC-384
3,285,503 UART: [kat] HMAC-384Kdf
3,299,341 UART: [kat] LMS
3,828,840 UART: [kat] --
3,833,453 UART: [cold-reset] ++
3,835,927 UART: [fht] FHT @ 0x50003400
3,846,353 UART: [idev] ++
3,846,921 UART: [idev] CDI.KEYID = 6
3,847,828 UART: [idev] SUBJECT.KEYID = 7
3,849,037 UART: [idev] UDS.KEYID = 0
3,867,766 UART: [idev] Erasing UDS.KEYID = 0
6,326,126 UART: [idev] Sha1 KeyId Algorithm
6,350,007 UART: [idev] --
6,354,649 UART: [ldev] ++
6,355,231 UART: [ldev] CDI.KEYID = 6
6,356,116 UART: [ldev] SUBJECT.KEYID = 5
6,357,218 UART: [ldev] AUTHORITY.KEYID = 7
6,358,555 UART: [ldev] FE.KEYID = 1
6,370,683 UART: [ldev] Erasing FE.KEYID = 1
8,841,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,388 UART: [ldev] --
10,633,000 UART: [fwproc] Wait for Commands...
10,635,809 UART: [fwproc] Recv command 0x46574c44
10,637,943 UART: [fwproc] Recv'd Img size: 106964 bytes
13,939,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,423 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,055,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,374,160 >>> mbox cmd response: success
14,378,058 UART: [afmc] ++
14,378,650 UART: [afmc] CDI.KEYID = 6
14,379,560 UART: [afmc] SUBJECT.KEYID = 7
14,380,721 UART: [afmc] AUTHORITY.KEYID = 5
16,877,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,769 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,615,776 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,631,684 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,647,685 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,669,717 UART: [afmc] --
18,673,527 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,673,891 UART: [cold-reset] --
18,676,918 UART: [state] Locking Datavault
18,682,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,378 UART: [state] Locking ICCM
18,685,822 UART: [exit] Launching FMC @ 0x40000000
18,694,219 UART:
18,694,447 UART: Running Caliptra FMC ...
18,695,543 UART:
18,695,699 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,705,535 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,281 writing to cptra_bootfsm_go
2,216,601 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,155,238 >>> mbox cmd response: success
18,386,244 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,400,852 UART:
18,401,218 UART: Running Caliptra FMC ...
18,402,413 UART:
18,402,600 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,412,283 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,217,194 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,352,624 UART:
2,353,053 UART: Running Caliptra ROM ...
2,354,137 UART:
2,354,290 UART: [state] CFI Enabled
2,355,262 UART: [state] LifecycleState = Unprovisioned
2,356,941 UART: [state] DebugLocked = No
2,357,969 UART: [state] WD Timer not started. Device not locked for debugging
2,360,439 UART: [kat] SHA2-256
2,361,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,119 UART: [kat] ++
2,364,569 UART: [kat] sha1
2,365,172 UART: [kat] SHA2-256
2,365,835 UART: [kat] SHA2-384
2,366,493 UART: [kat] SHA2-512-ACC
2,367,374 UART: [kat] ECC-384
2,948,427 UART: [kat] HMAC-384Kdf
2,971,373 UART: [kat] LMS
3,500,857 UART: [kat] --
3,502,473 UART: [cold-reset] ++
3,503,544 UART: [fht] FHT @ 0x50003400
3,515,332 UART: [idev] ++
3,515,972 UART: [idev] CDI.KEYID = 6
3,516,899 UART: [idev] SUBJECT.KEYID = 7
3,517,944 UART: [idev] UDS.KEYID = 0
3,548,226 UART: [idev] Erasing UDS.KEYID = 0
6,031,981 UART: [idev] Sha1 KeyId Algorithm
6,055,388 UART: [idev] --
6,059,609 UART: [ldev] ++
6,060,188 UART: [ldev] CDI.KEYID = 6
6,061,100 UART: [ldev] SUBJECT.KEYID = 5
6,062,320 UART: [ldev] AUTHORITY.KEYID = 7
6,063,558 UART: [ldev] FE.KEYID = 1
6,103,423 UART: [ldev] Erasing FE.KEYID = 1
8,606,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,476 UART: [ldev] --
10,395,459 UART: [fwproc] Wait for Commands...
10,397,825 UART: [fwproc] Recv command 0x46574c44
10,399,920 UART: [fwproc] Recv'd Img size: 106964 bytes
13,716,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,786,267 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,828,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,147,487 >>> mbox cmd response: success
14,152,266 UART: [afmc] ++
14,152,859 UART: [afmc] CDI.KEYID = 6
14,153,771 UART: [afmc] SUBJECT.KEYID = 7
14,154,992 UART: [afmc] AUTHORITY.KEYID = 5
16,683,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,213 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,443,248 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,459,153 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,475,088 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,774 UART: [afmc] --
18,502,291 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,502,668 UART: [cold-reset] --
18,507,802 UART: [state] Locking Datavault
18,511,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,410 UART: [state] Locking ICCM
18,515,751 UART: [exit] Launching FMC @ 0x40000000
18,524,144 UART:
18,524,379 UART: Running Caliptra FMC ...
18,525,405 UART:
18,525,552 UART: [fmc] Received command: 0x10000003
18,535,196 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,216,074 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,984,671 >>> mbox cmd response: success
18,253,049 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,268,317 UART:
18,268,683 UART: Running Caliptra FMC ...
18,269,870 UART:
18,270,038 UART: [fmc] Received command: 0x10000003
18,279,459 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,220,488 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,355,918 UART:
2,356,345 UART: Running Caliptra ROM ...
2,357,419 UART:
2,357,571 UART: [state] CFI Enabled
2,358,435 UART: [state] LifecycleState = Unprovisioned
2,360,088 UART: [state] DebugLocked = No
2,361,114 UART: [state] WD Timer not started. Device not locked for debugging
2,363,608 UART: [kat] SHA2-256
2,364,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,288 UART: [kat] ++
2,367,734 UART: [kat] sha1
2,368,244 UART: [kat] SHA2-256
2,368,901 UART: [kat] SHA2-384
2,369,559 UART: [kat] SHA2-512-ACC
2,370,359 UART: [kat] ECC-384
3,277,029 UART: [kat] HMAC-384Kdf
3,288,597 UART: [kat] LMS
3,818,094 UART: [kat] --
3,823,059 UART: [cold-reset] ++
3,825,205 UART: [fht] FHT @ 0x50003400
3,836,887 UART: [idev] ++
3,837,452 UART: [idev] CDI.KEYID = 6
3,838,368 UART: [idev] SUBJECT.KEYID = 7
3,839,599 UART: [idev] UDS.KEYID = 0
3,855,363 UART: [idev] Erasing UDS.KEYID = 0
6,313,620 UART: [idev] Sha1 KeyId Algorithm
6,336,962 UART: [idev] --
6,341,314 UART: [ldev] ++
6,341,892 UART: [ldev] CDI.KEYID = 6
6,342,774 UART: [ldev] SUBJECT.KEYID = 5
6,343,987 UART: [ldev] AUTHORITY.KEYID = 7
6,345,217 UART: [ldev] FE.KEYID = 1
6,357,074 UART: [ldev] Erasing FE.KEYID = 1
8,828,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,363 UART: [ldev] --
10,620,191 UART: [fwproc] Wait for Commands...
10,622,664 UART: [fwproc] Recv command 0x46574c44
10,624,706 UART: [fwproc] Recv'd Img size: 106964 bytes
13,936,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,672 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,049,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,367,367 >>> mbox cmd response: success
14,372,338 UART: [afmc] ++
14,372,927 UART: [afmc] CDI.KEYID = 6
14,373,811 UART: [afmc] SUBJECT.KEYID = 7
14,375,026 UART: [afmc] AUTHORITY.KEYID = 5
16,874,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,471 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,611,468 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,627,386 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,643,306 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,667,576 UART: [afmc] --
18,670,933 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,671,312 UART: [cold-reset] --
18,675,366 UART: [state] Locking Datavault
18,679,960 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,597 UART: [state] Locking ICCM
18,683,282 UART: [exit] Launching FMC @ 0x40000000
18,691,675 UART:
18,691,914 UART: Running Caliptra FMC ...
18,693,013 UART:
18,693,170 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,702,978 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,223,072 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,144,967 >>> mbox cmd response: success
18,378,592 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,389,856 UART:
18,390,185 UART: Running Caliptra FMC ...
18,391,366 UART:
18,391,535 UART: [fmc] Received command: 0x10000003
18,401,024 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,716 UART: [ldev] ++
1,208,884 UART: [ldev] CDI.KEYID = 6
1,209,248 UART: [ldev] SUBJECT.KEYID = 5
1,209,675 UART: [ldev] AUTHORITY.KEYID = 7
1,210,138 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,526 UART: [ldev] --
1,280,990 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,498 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,463 >>> mbox cmd response: success
2,677,484 UART: [afmc] ++
2,677,652 UART: [afmc] CDI.KEYID = 6
2,678,015 UART: [afmc] SUBJECT.KEYID = 7
2,678,441 UART: [afmc] AUTHORITY.KEYID = 5
2,714,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,550 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,270 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,163 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,856 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,669 UART: [afmc] --
2,757,775 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,797 UART: [cold-reset] --
2,758,759 UART: [state] Locking Datavault
2,759,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,442 UART: [state] Locking ICCM
2,761,050 UART: [exit] Launching FMC @ 0x40000000
2,766,347 UART:
2,766,363 UART: Running Caliptra FMC ...
2,766,771 UART:
2,766,909 UART: [fmc] Received command: 0x10000003
2,776,385 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,321 >>> mbox cmd response: success
2,583,327 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,589,612 UART:
2,589,628 UART: Running Caliptra FMC ...
2,590,036 UART:
2,590,174 UART: [fmc] Received command: 0x10000003
2,599,650 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,407 UART: [kat] SHA2-256
890,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,181,888 UART: [idev] Erasing UDS.KEYID = 0
1,198,748 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,427 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,329 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,394 >>> mbox cmd response: success
2,677,449 UART: [afmc] ++
2,677,617 UART: [afmc] CDI.KEYID = 6
2,677,980 UART: [afmc] SUBJECT.KEYID = 7
2,678,406 UART: [afmc] AUTHORITY.KEYID = 5
2,714,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,531 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,251 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,144 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,837 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,574 UART: [afmc] --
2,757,458 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,480 UART: [cold-reset] --
2,758,598 UART: [state] Locking Datavault
2,759,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,421 UART: [state] Locking ICCM
2,761,063 UART: [exit] Launching FMC @ 0x40000000
2,766,360 UART:
2,766,376 UART: Running Caliptra FMC ...
2,766,784 UART:
2,766,922 UART: [fmc] Received command: 0x10000003
2,776,398 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,196 >>> mbox cmd response: success
2,582,084 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,089 UART:
2,588,105 UART: Running Caliptra FMC ...
2,588,513 UART:
2,588,651 UART: [fmc] Received command: 0x10000003
2,598,127 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,874 UART: [ldev] ++
1,209,042 UART: [ldev] CDI.KEYID = 6
1,209,406 UART: [ldev] SUBJECT.KEYID = 5
1,209,833 UART: [ldev] AUTHORITY.KEYID = 7
1,210,296 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,434 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,611 >>> mbox cmd response: success
2,676,636 UART: [afmc] ++
2,676,804 UART: [afmc] CDI.KEYID = 6
2,677,167 UART: [afmc] SUBJECT.KEYID = 7
2,677,593 UART: [afmc] AUTHORITY.KEYID = 5
2,713,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,598 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,318 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,211 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,904 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,661 UART: [afmc] --
2,756,521 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,543 UART: [cold-reset] --
2,757,339 UART: [state] Locking Datavault
2,758,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,326 UART: [state] Locking ICCM
2,759,864 UART: [exit] Launching FMC @ 0x40000000
2,765,161 UART:
2,765,177 UART: Running Caliptra FMC ...
2,765,585 UART:
2,765,723 UART: [fmc] Received command: 0x10000003
2,775,199 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,663 >>> mbox cmd response: success
2,582,771 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,800 UART:
2,588,816 UART: Running Caliptra FMC ...
2,589,224 UART:
2,589,362 UART: [fmc] Received command: 0x10000003
2,598,838 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,530 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,347 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,771 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,734 >>> mbox cmd response: success
2,677,855 UART: [afmc] ++
2,678,023 UART: [afmc] CDI.KEYID = 6
2,678,386 UART: [afmc] SUBJECT.KEYID = 7
2,678,812 UART: [afmc] AUTHORITY.KEYID = 5
2,715,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,105 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,825 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,718 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,411 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,398 UART: [afmc] --
2,758,322 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,758,344 UART: [cold-reset] --
2,759,202 UART: [state] Locking Datavault
2,760,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,047 UART: [state] Locking ICCM
2,761,685 UART: [exit] Launching FMC @ 0x40000000
2,766,982 UART:
2,766,998 UART: Running Caliptra FMC ...
2,767,406 UART:
2,767,544 UART: [fmc] Received command: 0x10000003
2,777,020 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,898 >>> mbox cmd response: success
2,582,262 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,187 UART:
2,588,203 UART: Running Caliptra FMC ...
2,588,611 UART:
2,588,749 UART: [fmc] Received command: 0x10000003
2,598,225 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,755 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,348 UART: [ldev] ++
1,209,516 UART: [ldev] CDI.KEYID = 6
1,209,880 UART: [ldev] SUBJECT.KEYID = 5
1,210,307 UART: [ldev] AUTHORITY.KEYID = 7
1,210,770 UART: [ldev] FE.KEYID = 1
1,215,928 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,350 UART: [ldev] --
1,281,822 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,382 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,417 >>> mbox cmd response: success
2,676,618 UART: [afmc] ++
2,676,786 UART: [afmc] CDI.KEYID = 6
2,677,149 UART: [afmc] SUBJECT.KEYID = 7
2,677,575 UART: [afmc] AUTHORITY.KEYID = 5
2,712,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,172 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,892 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,785 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,478 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,197 UART: [afmc] --
2,756,099 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,121 UART: [cold-reset] --
2,757,067 UART: [state] Locking Datavault
2,758,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,636 UART: [state] Locking ICCM
2,759,222 UART: [exit] Launching FMC @ 0x40000000
2,764,519 UART:
2,764,535 UART: Running Caliptra FMC ...
2,764,943 UART:
2,765,081 UART: [fmc] Received command: 0x10000003
2,774,557 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,449 >>> mbox cmd response: success
2,580,661 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,946 UART:
2,586,962 UART: Running Caliptra FMC ...
2,587,370 UART:
2,587,508 UART: [fmc] Received command: 0x10000003
2,596,984 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,036 UART: [idev] ++
1,173,204 UART: [idev] CDI.KEYID = 6
1,173,565 UART: [idev] SUBJECT.KEYID = 7
1,173,990 UART: [idev] UDS.KEYID = 0
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,198,518 UART: [idev] Sha1 KeyId Algorithm
1,207,258 UART: [idev] --
1,208,443 UART: [ldev] ++
1,208,611 UART: [ldev] CDI.KEYID = 6
1,208,975 UART: [ldev] SUBJECT.KEYID = 5
1,209,402 UART: [ldev] AUTHORITY.KEYID = 7
1,209,865 UART: [ldev] FE.KEYID = 1
1,215,143 UART: [ldev] Erasing FE.KEYID = 1
1,241,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,471 UART: [fwproc] Wait for Commands...
1,281,092 UART: [fwproc] Recv command 0x46574c44
1,281,825 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,241 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,246 >>> mbox cmd response: success
2,675,437 UART: [afmc] ++
2,675,605 UART: [afmc] CDI.KEYID = 6
2,675,968 UART: [afmc] SUBJECT.KEYID = 7
2,676,394 UART: [afmc] AUTHORITY.KEYID = 5
2,711,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,123 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,843 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,736 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,429 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,440 UART: [afmc] --
2,755,526 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,548 UART: [cold-reset] --
2,756,224 UART: [state] Locking Datavault
2,757,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,987 UART: [state] Locking ICCM
2,758,543 UART: [exit] Launching FMC @ 0x40000000
2,763,840 UART:
2,763,856 UART: Running Caliptra FMC ...
2,764,264 UART:
2,764,402 UART: [fmc] Received command: 0x10000003
2,773,878 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,818 >>> mbox cmd response: success
2,582,898 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,589,203 UART:
2,589,219 UART: Running Caliptra FMC ...
2,589,627 UART:
2,589,765 UART: [fmc] Received command: 0x10000003
2,599,241 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,192 UART:
192,574 UART: Running Caliptra ROM ...
193,785 UART:
193,938 UART: [state] CFI Enabled
265,446 UART: [state] LifecycleState = Unprovisioned
267,836 UART: [state] DebugLocked = No
269,004 UART: [state] WD Timer not started. Device not locked for debugging
272,900 UART: [kat] SHA2-256
454,835 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,353 UART: [kat] ++
467,019 UART: [kat] sha1
477,068 UART: [kat] SHA2-256
480,089 UART: [kat] SHA2-384
486,122 UART: [kat] SHA2-512-ACC
488,746 UART: [kat] ECC-384
3,778,653 UART: [kat] HMAC-384Kdf
3,804,631 UART: [kat] LMS
4,877,764 UART: [kat] --
4,879,924 UART: [cold-reset] ++
4,882,301 UART: [fht] FHT @ 0x50003400
4,894,421 UART: [idev] ++
4,895,123 UART: [idev] CDI.KEYID = 6
4,896,364 UART: [idev] SUBJECT.KEYID = 7
4,897,466 UART: [idev] UDS.KEYID = 0
4,931,646 UART: [idev] Erasing UDS.KEYID = 0
8,246,358 UART: [idev] Sha1 KeyId Algorithm
8,268,039 UART: [idev] --
8,272,247 UART: [ldev] ++
8,272,812 UART: [ldev] CDI.KEYID = 6
8,273,999 UART: [ldev] SUBJECT.KEYID = 5
8,275,107 UART: [ldev] AUTHORITY.KEYID = 7
8,276,398 UART: [ldev] FE.KEYID = 1
8,319,856 UART: [ldev] Erasing FE.KEYID = 1
11,655,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,293 UART: [ldev] --
14,040,070 UART: [fwproc] Wait for Commands...
14,042,333 UART: [fwproc] Recv command 0x46574c44
14,044,607 UART: Invalid Img size: 131073 bytes
14,048,210 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,419 UART:
192,784 UART: Running Caliptra ROM ...
193,995 UART:
603,707 UART: [state] CFI Enabled
617,695 UART: [state] LifecycleState = Unprovisioned
620,087 UART: [state] DebugLocked = No
622,213 UART: [state] WD Timer not started. Device not locked for debugging
626,078 UART: [kat] SHA2-256
808,062 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,560 UART: [kat] ++
820,064 UART: [kat] sha1
831,430 UART: [kat] SHA2-256
834,445 UART: [kat] SHA2-384
840,147 UART: [kat] SHA2-512-ACC
842,756 UART: [kat] ECC-384
4,099,965 UART: [kat] HMAC-384Kdf
4,111,062 UART: [kat] LMS
5,184,172 UART: [kat] --
5,189,123 UART: [cold-reset] ++
5,191,295 UART: [fht] FHT @ 0x50003400
5,202,604 UART: [idev] ++
5,203,275 UART: [idev] CDI.KEYID = 6
5,204,533 UART: [idev] SUBJECT.KEYID = 7
5,205,974 UART: [idev] UDS.KEYID = 0
5,223,681 UART: [idev] Erasing UDS.KEYID = 0
8,496,893 UART: [idev] Sha1 KeyId Algorithm
8,518,401 UART: [idev] --
8,521,831 UART: [ldev] ++
8,522,418 UART: [ldev] CDI.KEYID = 6
8,523,613 UART: [ldev] SUBJECT.KEYID = 5
8,525,052 UART: [ldev] AUTHORITY.KEYID = 7
8,526,619 UART: [ldev] FE.KEYID = 1
8,537,380 UART: [ldev] Erasing FE.KEYID = 1
11,828,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,372 UART: [ldev] --
14,194,596 UART: [fwproc] Wait for Commands...
14,197,341 UART: [fwproc] Recv command 0x46574c44
14,199,612 UART: Invalid Img size: 131073 bytes
14,203,747 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,294 UART:
192,683 UART: Running Caliptra ROM ...
193,849 UART:
194,004 UART: [state] CFI Enabled
263,228 UART: [state] LifecycleState = Unprovisioned
265,091 UART: [state] DebugLocked = No
267,506 UART: [state] WD Timer not started. Device not locked for debugging
270,647 UART: [kat] SHA2-256
449,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,374 UART: [kat] ++
461,820 UART: [kat] sha1
472,912 UART: [kat] SHA2-256
475,968 UART: [kat] SHA2-384
482,749 UART: [kat] SHA2-512-ACC
485,709 UART: [kat] ECC-384
2,949,442 UART: [kat] HMAC-384Kdf
2,970,764 UART: [kat] LMS
3,500,225 UART: [kat] --
3,504,567 UART: [cold-reset] ++
3,507,155 UART: [fht] FHT @ 0x50003400
3,518,773 UART: [idev] ++
3,519,405 UART: [idev] CDI.KEYID = 6
3,520,300 UART: [idev] SUBJECT.KEYID = 7
3,521,421 UART: [idev] UDS.KEYID = 0
3,542,659 UART: [idev] Erasing UDS.KEYID = 0
6,024,906 UART: [idev] Sha1 KeyId Algorithm
6,048,383 UART: [idev] --
6,051,252 UART: [ldev] ++
6,051,828 UART: [ldev] CDI.KEYID = 6
6,052,743 UART: [ldev] SUBJECT.KEYID = 5
6,053,906 UART: [ldev] AUTHORITY.KEYID = 7
6,055,143 UART: [ldev] FE.KEYID = 1
6,098,543 UART: [ldev] Erasing FE.KEYID = 1
8,601,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,812 UART: [ldev] --
10,412,576 UART: [fwproc] Wait for Commands...
10,414,304 UART: [fwproc] Recv command 0x46574c44
10,416,404 UART: Invalid Img size: 131073 bytes
10,420,381 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,445 UART:
192,830 UART: Running Caliptra ROM ...
193,957 UART:
603,768 UART: [state] CFI Enabled
616,973 UART: [state] LifecycleState = Unprovisioned
618,846 UART: [state] DebugLocked = No
620,163 UART: [state] WD Timer not started. Device not locked for debugging
623,035 UART: [kat] SHA2-256
802,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,720 UART: [kat] ++
814,266 UART: [kat] sha1
825,690 UART: [kat] SHA2-256
828,688 UART: [kat] SHA2-384
834,078 UART: [kat] SHA2-512-ACC
837,072 UART: [kat] ECC-384
3,279,294 UART: [kat] HMAC-384Kdf
3,292,801 UART: [kat] LMS
3,822,314 UART: [kat] --
3,827,154 UART: [cold-reset] ++
3,828,936 UART: [fht] FHT @ 0x50003400
3,841,100 UART: [idev] ++
3,841,660 UART: [idev] CDI.KEYID = 6
3,842,567 UART: [idev] SUBJECT.KEYID = 7
3,843,778 UART: [idev] UDS.KEYID = 0
3,862,669 UART: [idev] Erasing UDS.KEYID = 0
6,319,331 UART: [idev] Sha1 KeyId Algorithm
6,342,111 UART: [idev] --
6,345,755 UART: [ldev] ++
6,346,333 UART: [ldev] CDI.KEYID = 6
6,347,223 UART: [ldev] SUBJECT.KEYID = 5
6,348,441 UART: [ldev] AUTHORITY.KEYID = 7
6,349,593 UART: [ldev] FE.KEYID = 1
6,358,797 UART: [ldev] Erasing FE.KEYID = 1
8,830,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,210 UART: [ldev] --
10,619,874 UART: [fwproc] Wait for Commands...
10,622,401 UART: [fwproc] Recv command 0x46574c44
10,624,441 UART: Invalid Img size: 131073 bytes
10,627,770 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,013 UART:
192,415 UART: Running Caliptra ROM ...
193,540 UART:
193,691 UART: [state] CFI Enabled
260,910 UART: [state] LifecycleState = Unprovisioned
262,839 UART: [state] DebugLocked = No
265,522 UART: [state] WD Timer not started. Device not locked for debugging
268,829 UART: [kat] SHA2-256
447,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,496 UART: [kat] ++
459,946 UART: [kat] sha1
470,332 UART: [kat] SHA2-256
473,399 UART: [kat] SHA2-384
479,879 UART: [kat] SHA2-512-ACC
482,816 UART: [kat] ECC-384
2,950,668 UART: [kat] HMAC-384Kdf
2,973,654 UART: [kat] LMS
3,503,106 UART: [kat] --
3,508,025 UART: [cold-reset] ++
3,509,096 UART: [fht] FHT @ 0x50003400
3,520,189 UART: [idev] ++
3,520,752 UART: [idev] CDI.KEYID = 6
3,521,660 UART: [idev] SUBJECT.KEYID = 7
3,522,875 UART: [idev] UDS.KEYID = 0
3,544,627 UART: [idev] Erasing UDS.KEYID = 0
6,026,995 UART: [idev] Sha1 KeyId Algorithm
6,050,503 UART: [idev] --
6,054,425 UART: [ldev] ++
6,055,005 UART: [ldev] CDI.KEYID = 6
6,055,943 UART: [ldev] SUBJECT.KEYID = 5
6,057,108 UART: [ldev] AUTHORITY.KEYID = 7
6,058,343 UART: [ldev] FE.KEYID = 1
6,101,346 UART: [ldev] Erasing FE.KEYID = 1
8,606,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,659 UART: [ldev] --
10,413,791 UART: [fwproc] Wait for Commands...
10,416,861 UART: [fwproc] Recv command 0x46574c44
10,418,908 UART: Invalid Img size: 131073 bytes
10,423,694 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,327 UART:
192,725 UART: Running Caliptra ROM ...
194,011 UART:
603,454 UART: [state] CFI Enabled
615,599 UART: [state] LifecycleState = Unprovisioned
617,511 UART: [state] DebugLocked = No
619,267 UART: [state] WD Timer not started. Device not locked for debugging
623,548 UART: [kat] SHA2-256
802,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,241 UART: [kat] ++
814,773 UART: [kat] sha1
826,358 UART: [kat] SHA2-256
829,378 UART: [kat] SHA2-384
836,424 UART: [kat] SHA2-512-ACC
839,359 UART: [kat] ECC-384
3,279,026 UART: [kat] HMAC-384Kdf
3,291,260 UART: [kat] LMS
3,820,769 UART: [kat] --
3,822,973 UART: [cold-reset] ++
3,825,003 UART: [fht] FHT @ 0x50003400
3,836,791 UART: [idev] ++
3,837,370 UART: [idev] CDI.KEYID = 6
3,838,275 UART: [idev] SUBJECT.KEYID = 7
3,839,488 UART: [idev] UDS.KEYID = 0
3,857,921 UART: [idev] Erasing UDS.KEYID = 0
6,316,828 UART: [idev] Sha1 KeyId Algorithm
6,338,328 UART: [idev] --
6,341,781 UART: [ldev] ++
6,342,347 UART: [ldev] CDI.KEYID = 6
6,343,255 UART: [ldev] SUBJECT.KEYID = 5
6,344,415 UART: [ldev] AUTHORITY.KEYID = 7
6,345,698 UART: [ldev] FE.KEYID = 1
6,355,490 UART: [ldev] Erasing FE.KEYID = 1
8,827,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,875 UART: [ldev] --
10,615,730 UART: [fwproc] Wait for Commands...
10,618,531 UART: [fwproc] Recv command 0x46574c44
10,620,628 UART: Invalid Img size: 131073 bytes
10,623,389 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
890,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,895 UART: [kat] ++
895,047 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,350 UART: [ldev] ++
1,208,518 UART: [ldev] CDI.KEYID = 6
1,208,882 UART: [ldev] SUBJECT.KEYID = 5
1,209,309 UART: [ldev] AUTHORITY.KEYID = 7
1,209,772 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,186 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,297 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: Invalid Img size: 131073 bytes
1,284,059 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,282,002 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: Invalid Img size: 131073 bytes
1,283,792 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,776 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0x46574c44
1,282,205 UART: Invalid Img size: 131073 bytes
1,283,275 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,536 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,181,262 UART: [idev] Erasing UDS.KEYID = 0
1,198,218 UART: [idev] Sha1 KeyId Algorithm
1,207,122 UART: [idev] --
1,208,341 UART: [ldev] ++
1,208,509 UART: [ldev] CDI.KEYID = 6
1,208,873 UART: [ldev] SUBJECT.KEYID = 5
1,209,300 UART: [ldev] AUTHORITY.KEYID = 7
1,209,763 UART: [ldev] FE.KEYID = 1
1,215,071 UART: [ldev] Erasing FE.KEYID = 1
1,240,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,977 UART: [ldev] --
1,280,475 UART: [fwproc] Wait for Commands...
1,281,098 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: Invalid Img size: 131073 bytes
1,282,920 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,804 UART: [ldev] ++
1,208,972 UART: [ldev] CDI.KEYID = 6
1,209,336 UART: [ldev] SUBJECT.KEYID = 5
1,209,763 UART: [ldev] AUTHORITY.KEYID = 7
1,210,226 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,218 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: Invalid Img size: 131073 bytes
1,284,335 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,155 UART: [kat] SHA2-512-ACC
906,056 UART: [kat] ECC-384
915,493 UART: [kat] HMAC-384Kdf
920,057 UART: [kat] LMS
1,168,369 UART: [kat] --
1,169,178 UART: [cold-reset] ++
1,169,680 UART: [fht] FHT @ 0x50003400
1,172,406 UART: [idev] ++
1,172,574 UART: [idev] CDI.KEYID = 6
1,172,935 UART: [idev] SUBJECT.KEYID = 7
1,173,360 UART: [idev] UDS.KEYID = 0
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,846 UART: [idev] Sha1 KeyId Algorithm
1,207,798 UART: [idev] --
1,208,749 UART: [ldev] ++
1,208,917 UART: [ldev] CDI.KEYID = 6
1,209,281 UART: [ldev] SUBJECT.KEYID = 5
1,209,708 UART: [ldev] AUTHORITY.KEYID = 7
1,210,171 UART: [ldev] FE.KEYID = 1
1,215,491 UART: [ldev] Erasing FE.KEYID = 1
1,241,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,463 UART: [ldev] --
1,280,939 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,418 UART: Invalid Img size: 131073 bytes
1,283,258 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,214,849 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,350,162 UART:
2,350,579 UART: Running Caliptra ROM ...
2,351,658 UART:
2,351,820 UART: [state] CFI Enabled
2,352,801 UART: [state] LifecycleState = Unprovisioned
2,354,464 UART: [state] DebugLocked = No
2,355,569 UART: [state] WD Timer not started. Device not locked for debugging
2,358,044 UART: [kat] SHA2-256
2,358,715 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,361,721 UART: [kat] ++
2,362,172 UART: [kat] sha1
2,362,684 UART: [kat] SHA2-256
2,363,421 UART: [kat] SHA2-384
2,364,086 UART: [kat] SHA2-512-ACC
2,364,924 UART: [kat] ECC-384
3,775,772 UART: [kat] HMAC-384Kdf
3,802,371 UART: [kat] LMS
4,875,459 UART: [kat] --
4,879,220 UART: [cold-reset] ++
4,880,560 UART: [fht] FHT @ 0x50003400
4,892,755 UART: [idev] ++
4,893,506 UART: [idev] CDI.KEYID = 6
4,894,610 UART: [idev] SUBJECT.KEYID = 7
4,895,822 UART: [idev] UDS.KEYID = 0
4,929,483 UART: [idev] Erasing UDS.KEYID = 0
8,239,096 UART: [idev] Sha1 KeyId Algorithm
8,261,424 UART: [idev] --
8,265,475 UART: [ldev] ++
8,266,044 UART: [ldev] CDI.KEYID = 6
8,267,203 UART: [ldev] SUBJECT.KEYID = 5
8,268,414 UART: [ldev] AUTHORITY.KEYID = 7
8,269,563 UART: [ldev] FE.KEYID = 1
8,317,836 UART: [ldev] Erasing FE.KEYID = 1
11,654,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,491 UART: [ldev] --
14,037,220 UART: [fwproc] Wait for Commands...
14,038,992 UART: [fwproc] Recv command 0x46574c44
14,041,301 UART: [fwproc] Recv'd Img size: 106620 bytes
22,501,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,580,347 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,622,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,939,855 >>> mbox cmd response: success
22,944,252 UART: [afmc] ++
22,944,948 UART: [afmc] CDI.KEYID = 6
22,946,054 UART: [afmc] SUBJECT.KEYID = 7
22,947,321 UART: [afmc] AUTHORITY.KEYID = 5
26,319,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,618,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,620,079 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,636,115 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,652,170 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,668,162 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,690,742 UART: [afmc] --
28,694,282 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,694,657 UART: [cold-reset] --
28,697,897 UART: [state] Locking Datavault
28,703,406 UART: [state] Locking PCR0, PCR1 and PCR31
28,705,119 UART: [state] Locking ICCM
28,706,216 UART: [exit] Launching FMC @ 0x40000000
28,714,871 UART:
28,715,110 UART: Running Caliptra FMC ...
28,716,205 UART:
28,716,358 UART: [fmc] Received command: 0x10000002
28,718,251 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,210,548 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
22,330,177 >>> mbox cmd response: success
28,019,936 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,034,839 UART:
28,035,173 UART: Running Caliptra FMC ...
28,036,348 UART:
28,036,524 UART: [fmc] Received command: 0x10000002
* TESTCASE PASSED
28,038,415 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,221,011 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,356,478 UART:
2,356,888 UART: Running Caliptra ROM ...
2,357,973 UART:
2,358,122 UART: [state] CFI Enabled
2,359,108 UART: [state] LifecycleState = Unprovisioned
2,360,756 UART: [state] DebugLocked = No
2,361,776 UART: [state] WD Timer not started. Device not locked for debugging
2,364,238 UART: [kat] SHA2-256
2,364,901 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,367,904 UART: [kat] ++
2,368,347 UART: [kat] sha1
2,368,870 UART: [kat] SHA2-256
2,369,608 UART: [kat] SHA2-384
2,370,268 UART: [kat] SHA2-512-ACC
2,371,091 UART: [kat] ECC-384
4,097,217 UART: [kat] HMAC-384Kdf
4,108,711 UART: [kat] LMS
5,181,889 UART: [kat] --
5,185,783 UART: [cold-reset] ++
5,187,985 UART: [fht] FHT @ 0x50003400
5,199,501 UART: [idev] ++
5,200,234 UART: [idev] CDI.KEYID = 6
5,201,338 UART: [idev] SUBJECT.KEYID = 7
5,202,870 UART: [idev] UDS.KEYID = 0
5,219,089 UART: [idev] Erasing UDS.KEYID = 0
8,491,305 UART: [idev] Sha1 KeyId Algorithm
8,514,427 UART: [idev] --
8,518,910 UART: [ldev] ++
8,519,540 UART: [ldev] CDI.KEYID = 6
8,520,648 UART: [ldev] SUBJECT.KEYID = 5
8,522,190 UART: [ldev] AUTHORITY.KEYID = 7
8,523,754 UART: [ldev] FE.KEYID = 1
8,535,747 UART: [ldev] Erasing FE.KEYID = 1
11,828,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,844 UART: [ldev] --
14,189,709 UART: [fwproc] Wait for Commands...
14,192,549 UART: [fwproc] Recv command 0x46574c44
14,194,873 UART: [fwproc] Recv'd Img size: 106620 bytes
22,732,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,809,409 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,851,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,168,883 >>> mbox cmd response: success
23,172,375 UART: [afmc] ++
23,173,069 UART: [afmc] CDI.KEYID = 6
23,174,180 UART: [afmc] SUBJECT.KEYID = 7
23,175,443 UART: [afmc] AUTHORITY.KEYID = 5
26,489,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,785,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,787,664 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,803,647 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,819,729 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,835,734 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,859,214 UART: [afmc] --
28,863,245 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,863,609 UART: [cold-reset] --
28,866,168 UART: [state] Locking Datavault
28,872,658 UART: [state] Locking PCR0, PCR1 and PCR31
28,874,361 UART: [state] Locking ICCM
28,876,588 UART: [exit] Launching FMC @ 0x40000000
28,885,197 UART:
28,885,426 UART: Running Caliptra FMC ...
28,886,520 UART:
28,886,674 UART: [fmc] Received command: 0x10000002
28,888,588 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,216,077 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
22,431,054 >>> mbox cmd response: success
28,058,970 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,073,968 UART:
28,074,302 UART: Running Caliptra FMC ...
28,075,476 UART:
28,075,640 UART: [fmc] Received command: 0x10000002
28,077,368 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,217,330 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,353,736 UART:
2,354,331 UART: Running Caliptra ROM ...
2,355,432 UART:
2,355,594 UART: [state] CFI Enabled
2,356,540 UART: [state] LifecycleState = Unprovisioned
2,358,225 UART: [state] DebugLocked = No
2,359,347 UART: [state] WD Timer not started. Device not locked for debugging
2,361,835 UART: [kat] SHA2-256
2,362,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,526 UART: [kat] ++
2,365,981 UART: [kat] sha1
2,366,492 UART: [kat] SHA2-256
2,367,147 UART: [kat] SHA2-384
2,367,803 UART: [kat] SHA2-512-ACC
2,368,602 UART: [kat] ECC-384
2,947,936 UART: [kat] HMAC-384Kdf
2,971,615 UART: [kat] LMS
3,501,050 UART: [kat] --
3,504,991 UART: [cold-reset] ++
3,505,894 UART: [fht] FHT @ 0x50003400
3,517,631 UART: [idev] ++
3,518,196 UART: [idev] CDI.KEYID = 6
3,519,218 UART: [idev] SUBJECT.KEYID = 7
3,520,322 UART: [idev] UDS.KEYID = 0
3,543,699 UART: [idev] Erasing UDS.KEYID = 0
6,027,026 UART: [idev] Sha1 KeyId Algorithm
6,048,924 UART: [idev] --
6,052,309 UART: [ldev] ++
6,052,886 UART: [ldev] CDI.KEYID = 6
6,053,801 UART: [ldev] SUBJECT.KEYID = 5
6,054,965 UART: [ldev] AUTHORITY.KEYID = 7
6,056,200 UART: [ldev] FE.KEYID = 1
6,098,564 UART: [ldev] Erasing FE.KEYID = 1
8,599,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,420 UART: [ldev] --
10,388,692 UART: [fwproc] Wait for Commands...
10,391,763 UART: [fwproc] Recv command 0x46574c44
10,393,857 UART: [fwproc] Recv'd Img size: 106964 bytes
14,877,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,952,975 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,995,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,313,075 >>> mbox cmd response: success
15,316,591 UART: [afmc] ++
15,317,180 UART: [afmc] CDI.KEYID = 6
15,318,271 UART: [afmc] SUBJECT.KEYID = 7
15,319,384 UART: [afmc] AUTHORITY.KEYID = 5
17,850,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,572,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,573,943 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,589,887 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,605,860 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,621,715 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,643,856 UART: [afmc] --
19,648,175 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,648,552 UART: [cold-reset] --
19,651,204 UART: [state] Locking Datavault
19,656,129 UART: [state] Locking PCR0, PCR1 and PCR31
19,657,775 UART: [state] Locking ICCM
19,660,301 UART: [exit] Launching FMC @ 0x40000000
19,668,698 UART:
19,668,953 UART: Running Caliptra FMC ...
19,670,062 UART:
19,670,229 UART: [fmc] Received command: 0x10000002
19,672,072 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
2,215,657 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,954,260 >>> mbox cmd response: success
19,225,869 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,239,301 UART:
19,239,685 UART: Running Caliptra FMC ...
19,240,784 UART:
19,240,934 UART: [fmc] Received command: 0x10000002
19,242,732 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
2,219,516 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,355,120 UART:
2,355,546 UART: Running Caliptra ROM ...
2,356,721 UART:
2,356,892 UART: [state] CFI Enabled
2,357,856 UART: [state] LifecycleState = Unprovisioned
2,359,509 UART: [state] DebugLocked = No
2,360,617 UART: [state] WD Timer not started. Device not locked for debugging
2,363,107 UART: [kat] SHA2-256
2,363,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,779 UART: [kat] ++
2,367,229 UART: [kat] sha1
2,367,823 UART: [kat] SHA2-256
2,368,488 UART: [kat] SHA2-384
2,369,144 UART: [kat] SHA2-512-ACC
2,369,976 UART: [kat] ECC-384
3,282,410 UART: [kat] HMAC-384Kdf
3,293,922 UART: [kat] LMS
3,823,427 UART: [kat] --
3,828,462 UART: [cold-reset] ++
3,830,618 UART: [fht] FHT @ 0x50003400
3,842,348 UART: [idev] ++
3,842,929 UART: [idev] CDI.KEYID = 6
3,843,894 UART: [idev] SUBJECT.KEYID = 7
3,845,069 UART: [idev] UDS.KEYID = 0
3,861,482 UART: [idev] Erasing UDS.KEYID = 0
6,319,172 UART: [idev] Sha1 KeyId Algorithm
6,342,314 UART: [idev] --
6,346,203 UART: [ldev] ++
6,346,769 UART: [ldev] CDI.KEYID = 6
6,347,650 UART: [ldev] SUBJECT.KEYID = 5
6,348,859 UART: [ldev] AUTHORITY.KEYID = 7
6,350,084 UART: [ldev] FE.KEYID = 1
6,359,140 UART: [ldev] Erasing FE.KEYID = 1
8,834,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,772 UART: [ldev] --
10,625,508 UART: [fwproc] Wait for Commands...
10,628,636 UART: [fwproc] Recv command 0x46574c44
10,630,727 UART: [fwproc] Recv'd Img size: 106964 bytes
15,120,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,200,868 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,243,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,561,834 >>> mbox cmd response: success
15,566,178 UART: [afmc] ++
15,566,761 UART: [afmc] CDI.KEYID = 6
15,567,670 UART: [afmc] SUBJECT.KEYID = 7
15,568,827 UART: [afmc] AUTHORITY.KEYID = 5
18,068,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,790,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,792,180 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,808,127 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,824,148 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,840,062 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,862,865 UART: [afmc] --
19,866,466 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,866,844 UART: [cold-reset] --
19,871,064 UART: [state] Locking Datavault
19,876,694 UART: [state] Locking PCR0, PCR1 and PCR31
19,878,392 UART: [state] Locking ICCM
19,879,731 UART: [exit] Launching FMC @ 0x40000000
19,888,183 UART:
19,888,413 UART: Running Caliptra FMC ...
19,889,513 UART:
19,889,668 UART: [fmc] Received command: 0x10000002
19,891,512 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,215,834 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,147,907 >>> mbox cmd response: success
19,381,645 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,399,279 UART:
19,399,645 UART: Running Caliptra FMC ...
19,400,770 UART:
19,400,958 UART: [fmc] Received command: 0x10000002
19,402,698 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,213,988 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,349,847 UART:
2,350,282 UART: Running Caliptra ROM ...
2,351,369 UART:
2,351,532 UART: [state] CFI Enabled
2,352,495 UART: [state] LifecycleState = Unprovisioned
2,354,149 UART: [state] DebugLocked = No
2,355,255 UART: [state] WD Timer not started. Device not locked for debugging
2,357,724 UART: [kat] SHA2-256
2,358,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,423 UART: [kat] ++
2,361,875 UART: [kat] sha1
2,362,389 UART: [kat] SHA2-256
2,363,047 UART: [kat] SHA2-384
2,363,710 UART: [kat] SHA2-512-ACC
2,364,592 UART: [kat] ECC-384
2,943,771 UART: [kat] HMAC-384Kdf
2,971,365 UART: [kat] LMS
3,500,791 UART: [kat] --
3,505,922 UART: [cold-reset] ++
3,506,774 UART: [fht] FHT @ 0x50003400
3,518,043 UART: [idev] ++
3,518,654 UART: [idev] CDI.KEYID = 6
3,519,547 UART: [idev] SUBJECT.KEYID = 7
3,520,765 UART: [idev] UDS.KEYID = 0
3,543,169 UART: [idev] Erasing UDS.KEYID = 0
6,026,419 UART: [idev] Sha1 KeyId Algorithm
6,050,419 UART: [idev] --
6,053,228 UART: [ldev] ++
6,053,882 UART: [ldev] CDI.KEYID = 6
6,054,779 UART: [ldev] SUBJECT.KEYID = 5
6,055,946 UART: [ldev] AUTHORITY.KEYID = 7
6,057,183 UART: [ldev] FE.KEYID = 1
6,099,709 UART: [ldev] Erasing FE.KEYID = 1
8,604,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,035 UART: [ldev] --
10,412,616 UART: [fwproc] Wait for Commands...
10,415,202 UART: [fwproc] Recv command 0x46574c44
10,417,328 UART: [fwproc] Recv'd Img size: 106964 bytes
14,902,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,979,782 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,022,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,340,070 >>> mbox cmd response: success
15,344,948 UART: [afmc] ++
15,345,538 UART: [afmc] CDI.KEYID = 6
15,346,458 UART: [afmc] SUBJECT.KEYID = 7
15,347,620 UART: [afmc] AUTHORITY.KEYID = 5
17,892,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,615,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,617,865 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,633,855 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,649,775 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,665,684 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,688,585 UART: [afmc] --
19,691,741 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,692,129 UART: [cold-reset] --
19,694,944 UART: [state] Locking Datavault
19,698,892 UART: [state] Locking PCR0, PCR1 and PCR31
19,700,594 UART: [state] Locking ICCM
19,702,202 UART: [exit] Launching FMC @ 0x40000000
19,710,583 UART:
19,710,836 UART: Running Caliptra FMC ...
19,711,888 UART:
19,712,040 UART: [fmc] Received command: 0x10000002
19,713,942 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,215,015 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,990,036 >>> mbox cmd response: success
19,253,929 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,269,182 UART:
19,269,545 UART: Running Caliptra FMC ...
19,270,649 UART:
19,270,801 UART: [fmc] Received command: 0x10000002
19,272,646 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,007 writing to cptra_bootfsm_go
2,231,569 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,367,200 UART:
2,367,612 UART: Running Caliptra ROM ...
2,368,700 UART:
2,368,855 UART: [state] CFI Enabled
2,369,814 UART: [state] LifecycleState = Unprovisioned
2,371,464 UART: [state] DebugLocked = No
2,372,486 UART: [state] WD Timer not started. Device not locked for debugging
2,374,972 UART: [kat] SHA2-256
2,375,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,648 UART: [kat] ++
2,379,098 UART: [kat] sha1
2,379,614 UART: [kat] SHA2-256
2,380,353 UART: [kat] SHA2-384
2,381,019 UART: [kat] SHA2-512-ACC
2,381,858 UART: [kat] ECC-384
3,299,670 UART: [kat] HMAC-384Kdf
3,312,221 UART: [kat] LMS
3,841,723 UART: [kat] --
3,845,711 UART: [cold-reset] ++
3,847,015 UART: [fht] FHT @ 0x50003400
3,858,814 UART: [idev] ++
3,859,375 UART: [idev] CDI.KEYID = 6
3,860,311 UART: [idev] SUBJECT.KEYID = 7
3,861,540 UART: [idev] UDS.KEYID = 0
3,878,085 UART: [idev] Erasing UDS.KEYID = 0
6,337,194 UART: [idev] Sha1 KeyId Algorithm
6,359,524 UART: [idev] --
6,364,218 UART: [ldev] ++
6,364,793 UART: [ldev] CDI.KEYID = 6
6,365,701 UART: [ldev] SUBJECT.KEYID = 5
6,366,916 UART: [ldev] AUTHORITY.KEYID = 7
6,368,144 UART: [ldev] FE.KEYID = 1
6,377,493 UART: [ldev] Erasing FE.KEYID = 1
8,853,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,703 UART: [ldev] --
10,644,885 UART: [fwproc] Wait for Commands...
10,646,807 UART: [fwproc] Recv command 0x46574c44
10,648,856 UART: [fwproc] Recv'd Img size: 106964 bytes
15,148,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,226,584 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,269,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,586,692 >>> mbox cmd response: success
15,590,110 UART: [afmc] ++
15,590,706 UART: [afmc] CDI.KEYID = 6
15,591,622 UART: [afmc] SUBJECT.KEYID = 7
15,592,839 UART: [afmc] AUTHORITY.KEYID = 5
18,090,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,811,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,813,466 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,829,444 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,845,506 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,861,319 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,884,017 UART: [afmc] --
19,888,538 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,888,909 UART: [cold-reset] --
19,891,182 UART: [state] Locking Datavault
19,896,853 UART: [state] Locking PCR0, PCR1 and PCR31
19,898,560 UART: [state] Locking ICCM
19,900,040 UART: [exit] Launching FMC @ 0x40000000
19,908,430 UART:
19,908,659 UART: Running Caliptra FMC ...
19,909,681 UART:
19,909,826 UART: [fmc] Received command: 0x10000002
19,911,767 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,217,126 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,113,599 >>> mbox cmd response: success
19,345,038 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,360,959 UART:
19,361,293 UART: Running Caliptra FMC ...
19,362,387 UART:
19,362,536 UART: [fmc] Received command: 0x10000002
19,364,375 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,297 UART: [idev] Sha1 KeyId Algorithm
1,207,071 UART: [idev] --
1,208,036 UART: [ldev] ++
1,208,204 UART: [ldev] CDI.KEYID = 6
1,208,568 UART: [ldev] SUBJECT.KEYID = 5
1,208,995 UART: [ldev] AUTHORITY.KEYID = 7
1,209,458 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,240,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,038 UART: [fwproc] Wait for Commands...
1,280,799 UART: [fwproc] Recv command 0x46574c44
1,281,532 UART: [fwproc] Recv'd Img size: 106964 bytes
3,030,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,058,222 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,076,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,212,369 >>> mbox cmd response: success
3,213,618 UART: [afmc] ++
3,213,786 UART: [afmc] CDI.KEYID = 6
3,214,149 UART: [afmc] SUBJECT.KEYID = 7
3,214,575 UART: [afmc] AUTHORITY.KEYID = 5
3,250,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,266,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,267,220 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,272,897 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,278,790 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,284,500 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,292,192 UART: [afmc] --
3,293,244 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,293,266 UART: [cold-reset] --
3,294,332 UART: [state] Locking Datavault
3,295,391 UART: [state] Locking PCR0, PCR1 and PCR31
3,295,995 UART: [state] Locking ICCM
3,296,417 UART: [exit] Launching FMC @ 0x40000000
3,301,714 UART:
3,301,730 UART: Running Caliptra FMC ...
3,302,138 UART:
3,302,276 UART: [fmc] Received command: 0x10000002
3,304,020 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,057,501 >>> mbox cmd response: success
3,113,305 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,119,216 UART:
3,119,232 UART: Running Caliptra FMC ...
3,119,640 UART:
3,119,778 UART: [fmc] Received command: 0x10000002
3,121,522 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 106964 bytes
3,028,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,056,481 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,074,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,210,580 >>> mbox cmd response: success
3,211,839 UART: [afmc] ++
3,212,007 UART: [afmc] CDI.KEYID = 6
3,212,370 UART: [afmc] SUBJECT.KEYID = 7
3,212,796 UART: [afmc] AUTHORITY.KEYID = 5
3,247,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,264,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,265,265 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,270,942 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,276,835 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,282,545 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,290,473 UART: [afmc] --
3,291,503 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,291,525 UART: [cold-reset] --
3,292,213 UART: [state] Locking Datavault
3,293,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,294,096 UART: [state] Locking ICCM
3,294,622 UART: [exit] Launching FMC @ 0x40000000
3,299,919 UART:
3,299,935 UART: Running Caliptra FMC ...
3,300,343 UART:
3,300,481 UART: [fmc] Received command: 0x10000002
3,302,225 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,074,750 >>> mbox cmd response: success
3,129,572 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,135,867 UART:
3,135,883 UART: Running Caliptra FMC ...
3,136,291 UART:
3,136,429 UART: [fmc] Received command: 0x10000002
3,138,173 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,199,615 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,476 UART: [ldev] ++
1,209,644 UART: [ldev] CDI.KEYID = 6
1,210,008 UART: [ldev] SUBJECT.KEYID = 5
1,210,435 UART: [ldev] AUTHORITY.KEYID = 7
1,210,898 UART: [ldev] FE.KEYID = 1
1,216,028 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,822 UART: [ldev] --
1,281,228 UART: [fwproc] Wait for Commands...
1,281,981 UART: [fwproc] Recv command 0x46574c44
1,282,714 UART: [fwproc] Recv'd Img size: 106964 bytes
3,041,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,069,272 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,087,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,223,237 >>> mbox cmd response: success
3,224,340 UART: [afmc] ++
3,224,508 UART: [afmc] CDI.KEYID = 6
3,224,871 UART: [afmc] SUBJECT.KEYID = 7
3,225,297 UART: [afmc] AUTHORITY.KEYID = 5
3,260,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,277,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,277,856 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,283,533 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,289,426 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,295,136 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,004 UART: [afmc] --
3,303,864 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,303,886 UART: [cold-reset] --
3,304,698 UART: [state] Locking Datavault
3,306,087 UART: [state] Locking PCR0, PCR1 and PCR31
3,306,691 UART: [state] Locking ICCM
3,307,317 UART: [exit] Launching FMC @ 0x40000000
3,312,614 UART:
3,312,630 UART: Running Caliptra FMC ...
3,313,038 UART:
3,313,176 UART: [fmc] Received command: 0x10000002
3,314,920 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,071,116 >>> mbox cmd response: success
3,127,060 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,159 UART:
3,133,175 UART: Running Caliptra FMC ...
3,133,583 UART:
3,133,721 UART: [fmc] Received command: 0x10000002
3,135,465 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,561 UART: [kat] LMS
1,168,873 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,888 UART: [fht] FHT @ 0x50003400
1,172,436 UART: [idev] ++
1,172,604 UART: [idev] CDI.KEYID = 6
1,172,965 UART: [idev] SUBJECT.KEYID = 7
1,173,390 UART: [idev] UDS.KEYID = 0
1,181,446 UART: [idev] Erasing UDS.KEYID = 0
1,198,406 UART: [idev] Sha1 KeyId Algorithm
1,207,242 UART: [idev] --
1,208,165 UART: [ldev] ++
1,208,333 UART: [ldev] CDI.KEYID = 6
1,208,697 UART: [ldev] SUBJECT.KEYID = 5
1,209,124 UART: [ldev] AUTHORITY.KEYID = 7
1,209,587 UART: [ldev] FE.KEYID = 1
1,214,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,967 UART: [ldev] --
1,280,471 UART: [fwproc] Wait for Commands...
1,281,166 UART: [fwproc] Recv command 0x46574c44
1,281,899 UART: [fwproc] Recv'd Img size: 106964 bytes
3,041,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,068,839 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,086,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,222,982 >>> mbox cmd response: success
3,224,181 UART: [afmc] ++
3,224,349 UART: [afmc] CDI.KEYID = 6
3,224,712 UART: [afmc] SUBJECT.KEYID = 7
3,225,138 UART: [afmc] AUTHORITY.KEYID = 5
3,260,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,277,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,277,993 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,283,670 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,289,563 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,295,273 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,331 UART: [afmc] --
3,304,319 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,304,341 UART: [cold-reset] --
3,305,171 UART: [state] Locking Datavault
3,306,436 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,040 UART: [state] Locking ICCM
3,307,530 UART: [exit] Launching FMC @ 0x40000000
3,312,827 UART:
3,312,843 UART: Running Caliptra FMC ...
3,313,251 UART:
3,313,389 UART: [fmc] Received command: 0x10000002
3,315,133 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,080,892 >>> mbox cmd response: success
3,137,258 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,143,281 UART:
3,143,297 UART: Running Caliptra FMC ...
3,143,705 UART:
3,143,843 UART: [fmc] Received command: 0x10000002
3,145,587 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,228 UART: [ldev] ++
1,209,396 UART: [ldev] CDI.KEYID = 6
1,209,760 UART: [ldev] SUBJECT.KEYID = 5
1,210,187 UART: [ldev] AUTHORITY.KEYID = 7
1,210,650 UART: [ldev] FE.KEYID = 1
1,215,792 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,456 UART: [fwproc] Wait for Commands...
1,282,027 UART: [fwproc] Recv command 0x46574c44
1,282,760 UART: [fwproc] Recv'd Img size: 106964 bytes
3,035,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,063,253 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,081,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,217,298 >>> mbox cmd response: success
3,218,511 UART: [afmc] ++
3,218,679 UART: [afmc] CDI.KEYID = 6
3,219,042 UART: [afmc] SUBJECT.KEYID = 7
3,219,468 UART: [afmc] AUTHORITY.KEYID = 5
3,254,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,271,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,271,971 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,277,648 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,283,541 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,289,251 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,296,965 UART: [afmc] --
3,297,999 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,298,021 UART: [cold-reset] --
3,298,971 UART: [state] Locking Datavault
3,300,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,300,924 UART: [state] Locking ICCM
3,301,362 UART: [exit] Launching FMC @ 0x40000000
3,306,659 UART:
3,306,675 UART: Running Caliptra FMC ...
3,307,083 UART:
3,307,221 UART: [fmc] Received command: 0x10000002
3,308,965 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,070,500 >>> mbox cmd response: success
3,126,446 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,132,635 UART:
3,132,651 UART: Running Caliptra FMC ...
3,133,059 UART:
3,133,197 UART: [fmc] Received command: 0x10000002
3,134,941 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,780 UART: [idev] ++
1,173,948 UART: [idev] CDI.KEYID = 6
1,174,309 UART: [idev] SUBJECT.KEYID = 7
1,174,734 UART: [idev] UDS.KEYID = 0
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,162 UART: [fwproc] Recv command 0x46574c44
1,282,895 UART: [fwproc] Recv'd Img size: 106964 bytes
3,030,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,058,209 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,076,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,212,352 >>> mbox cmd response: success
3,213,521 UART: [afmc] ++
3,213,689 UART: [afmc] CDI.KEYID = 6
3,214,052 UART: [afmc] SUBJECT.KEYID = 7
3,214,478 UART: [afmc] AUTHORITY.KEYID = 5
3,249,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,266,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,266,967 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,272,644 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,278,537 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,284,247 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,292,007 UART: [afmc] --
3,293,015 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,293,037 UART: [cold-reset] --
3,293,823 UART: [state] Locking Datavault
3,294,630 UART: [state] Locking PCR0, PCR1 and PCR31
3,295,234 UART: [state] Locking ICCM
3,295,864 UART: [exit] Launching FMC @ 0x40000000
3,301,161 UART:
3,301,177 UART: Running Caliptra FMC ...
3,301,585 UART:
3,301,723 UART: [fmc] Received command: 0x10000002
3,303,467 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,072,047 >>> mbox cmd response: success
3,127,327 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,564 UART:
3,133,580 UART: Running Caliptra FMC ...
3,133,988 UART:
3,134,126 UART: [fmc] Received command: 0x10000002
3,135,870 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,058,901 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,200,305 UART:
2,200,748 UART: Running Caliptra ROM ...
2,201,919 UART:
2,202,090 UART: [state] CFI Enabled
2,203,074 UART: [state] LifecycleState = Unprovisioned
2,204,724 UART: [state] DebugLocked = No
2,205,853 UART: [state] WD Timer not started. Device not locked for debugging
2,208,332 UART: [kat] SHA2-256
2,208,999 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,006 UART: [kat] ++
2,212,463 UART: [kat] sha1
2,213,058 UART: [kat] SHA2-256
2,213,727 UART: [kat] SHA2-384
2,214,384 UART: [kat] SHA2-512-ACC
2,215,216 UART: [kat] ECC-384
3,778,185 UART: [kat] HMAC-384Kdf
3,803,291 UART: [kat] LMS
4,876,428 UART: [kat] --
4,881,594 UART: [cold-reset] ++
4,884,296 UART: [fht] FHT @ 0x50003400
4,895,922 UART: [idev] ++
4,896,597 UART: [idev] CDI.KEYID = 6
4,897,851 UART: [idev] SUBJECT.KEYID = 7
4,898,955 UART: [idev] UDS.KEYID = 0
4,929,740 UART: [idev] Erasing UDS.KEYID = 0
8,246,042 UART: [idev] Sha1 KeyId Algorithm
8,268,952 UART: [idev] --
8,272,298 UART: [ldev] ++
8,272,860 UART: [ldev] CDI.KEYID = 6
8,274,021 UART: [ldev] SUBJECT.KEYID = 5
8,275,239 UART: [ldev] AUTHORITY.KEYID = 7
8,276,389 UART: [ldev] FE.KEYID = 1
8,316,446 UART: [ldev] Erasing FE.KEYID = 1
11,652,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,554 UART: [ldev] --
14,035,360 UART: [fwproc] Wait for Commands...
14,036,858 UART: [fwproc] Recv command 0x46574c44
14,038,847 UART: [fwproc] Recv'd Img size: 111688 bytes
22,568,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,643,548 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,703,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,020,294 >>> mbox cmd response: success
23,024,158 UART: [afmc] ++
23,024,776 UART: [afmc] CDI.KEYID = 6
23,025,891 UART: [afmc] SUBJECT.KEYID = 7
23,027,112 UART: [afmc] AUTHORITY.KEYID = 5
26,380,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,680,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,682,168 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,698,345 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,714,289 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,730,228 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,751,860 UART: [afmc] --
28,754,760 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,755,130 UART: [cold-reset] --
28,759,020 UART: [state] Locking Datavault
28,763,521 UART: [state] Locking PCR0, PCR1 and PCR31
28,765,215 UART: [state] Locking ICCM
28,766,936 UART: [exit] Launching FMC @ 0x40000000
28,775,549 UART:
28,775,789 UART: Running Caliptra FMC ...
28,776,825 UART:
28,776,972 UART: [fmc] Received command: 0x10000000
28,779,484 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,060,734 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,402,436 >>> mbox cmd response: success
28,071,946 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,087,314 UART:
28,087,668 UART: Running Caliptra FMC ...
28,088,800 UART:
28,088,956 UART: [fmc] Received command: 0x10000000
28,091,272 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
2,066,644 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,207,973 UART:
2,208,386 UART: Running Caliptra ROM ...
2,209,465 UART:
2,209,614 UART: [state] CFI Enabled
2,210,527 UART: [state] LifecycleState = Unprovisioned
2,212,175 UART: [state] DebugLocked = No
2,213,333 UART: [state] WD Timer not started. Device not locked for debugging
2,215,809 UART: [kat] SHA2-256
2,216,472 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,477 UART: [kat] ++
2,219,926 UART: [kat] sha1
2,220,452 UART: [kat] SHA2-256
2,221,222 UART: [kat] SHA2-384
2,221,888 UART: [kat] SHA2-512-ACC
2,222,815 UART: [kat] ECC-384
4,099,242 UART: [kat] HMAC-384Kdf
4,110,515 UART: [kat] LMS
5,183,663 UART: [kat] --
5,186,265 UART: [cold-reset] ++
5,188,252 UART: [fht] FHT @ 0x50003400
5,199,391 UART: [idev] ++
5,200,058 UART: [idev] CDI.KEYID = 6
5,201,216 UART: [idev] SUBJECT.KEYID = 7
5,202,691 UART: [idev] UDS.KEYID = 0
5,217,020 UART: [idev] Erasing UDS.KEYID = 0
8,491,173 UART: [idev] Sha1 KeyId Algorithm
8,513,890 UART: [idev] --
8,517,339 UART: [ldev] ++
8,517,912 UART: [ldev] CDI.KEYID = 6
8,519,146 UART: [ldev] SUBJECT.KEYID = 5
8,520,575 UART: [ldev] AUTHORITY.KEYID = 7
8,522,129 UART: [ldev] FE.KEYID = 1
8,533,691 UART: [ldev] Erasing FE.KEYID = 1
11,825,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,012 UART: [ldev] --
14,192,691 UART: [fwproc] Wait for Commands...
14,195,164 UART: [fwproc] Recv command 0x46574c44
14,197,476 UART: [fwproc] Recv'd Img size: 111688 bytes
22,304,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,387,070 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,447,274 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,764,896 >>> mbox cmd response: success
22,768,662 UART: [afmc] ++
22,769,410 UART: [afmc] CDI.KEYID = 6
22,770,592 UART: [afmc] SUBJECT.KEYID = 7
22,771,745 UART: [afmc] AUTHORITY.KEYID = 5
26,086,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,381,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,383,843 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,399,990 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,415,990 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,431,907 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,455,453 UART: [afmc] --
28,458,619 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,458,988 UART: [cold-reset] --
28,462,847 UART: [state] Locking Datavault
28,468,310 UART: [state] Locking PCR0, PCR1 and PCR31
28,469,948 UART: [state] Locking ICCM
28,471,964 UART: [exit] Launching FMC @ 0x40000000
28,480,568 UART:
28,480,804 UART: Running Caliptra FMC ...
28,481,901 UART:
28,482,050 UART: [fmc] Received command: 0x10000000
28,484,503 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
2,067,666 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,877,080 >>> mbox cmd response: success
28,495,039 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,508,802 UART:
28,509,150 UART: Running Caliptra FMC ...
28,510,332 UART:
28,510,494 UART: [fmc] Received command: 0x10000000
28,512,799 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,068,032 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,209,836 UART:
2,210,265 UART: Running Caliptra ROM ...
2,211,463 UART:
2,211,642 UART: [state] CFI Enabled
2,212,622 UART: [state] LifecycleState = Unprovisioned
2,214,264 UART: [state] DebugLocked = No
2,215,377 UART: [state] WD Timer not started. Device not locked for debugging
2,217,851 UART: [kat] SHA2-256
2,218,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,541 UART: [kat] ++
2,221,991 UART: [kat] sha1
2,222,504 UART: [kat] SHA2-256
2,223,157 UART: [kat] SHA2-384
2,223,810 UART: [kat] SHA2-512-ACC
2,224,642 UART: [kat] ECC-384
2,947,901 UART: [kat] HMAC-384Kdf
2,971,846 UART: [kat] LMS
3,501,306 UART: [kat] --
3,504,134 UART: [cold-reset] ++
3,505,743 UART: [fht] FHT @ 0x50003400
3,516,670 UART: [idev] ++
3,517,273 UART: [idev] CDI.KEYID = 6
3,518,164 UART: [idev] SUBJECT.KEYID = 7
3,519,381 UART: [idev] UDS.KEYID = 0
3,544,784 UART: [idev] Erasing UDS.KEYID = 0
6,029,381 UART: [idev] Sha1 KeyId Algorithm
6,052,119 UART: [idev] --
6,055,880 UART: [ldev] ++
6,056,460 UART: [ldev] CDI.KEYID = 6
6,057,346 UART: [ldev] SUBJECT.KEYID = 5
6,058,564 UART: [ldev] AUTHORITY.KEYID = 7
6,059,808 UART: [ldev] FE.KEYID = 1
6,101,372 UART: [ldev] Erasing FE.KEYID = 1
8,602,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,293 UART: [ldev] --
10,415,259 UART: [fwproc] Wait for Commands...
10,417,303 UART: [fwproc] Recv command 0x46574c44
10,419,402 UART: [fwproc] Recv'd Img size: 112032 bytes
14,958,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,032,169 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,092,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,410,175 >>> mbox cmd response: success
15,413,673 UART: [afmc] ++
15,414,275 UART: [afmc] CDI.KEYID = 6
15,415,161 UART: [afmc] SUBJECT.KEYID = 7
15,416,381 UART: [afmc] AUTHORITY.KEYID = 5
17,959,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,632 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,701,641 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,717,515 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,733,377 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,755,233 UART: [afmc] --
19,759,446 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,759,857 UART: [cold-reset] --
19,762,786 UART: [state] Locking Datavault
19,767,056 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,700 UART: [state] Locking ICCM
19,770,714 UART: [exit] Launching FMC @ 0x40000000
19,779,109 UART:
19,779,370 UART: Running Caliptra FMC ...
19,780,399 UART:
19,780,548 UART: [fmc] Received command: 0x10000000
19,783,093 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,061,888 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,008,614 >>> mbox cmd response: success
19,286,579 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,301,579 UART:
19,301,910 UART: Running Caliptra FMC ...
19,303,087 UART:
19,303,275 UART: [fmc] Received command: 0x10000000
19,305,611 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,066,705 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,208,514 UART:
2,208,935 UART: Running Caliptra ROM ...
2,210,056 UART:
2,210,249 UART: [state] CFI Enabled
2,211,236 UART: [state] LifecycleState = Unprovisioned
2,212,896 UART: [state] DebugLocked = No
2,213,928 UART: [state] WD Timer not started. Device not locked for debugging
2,216,393 UART: [kat] SHA2-256
2,217,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,076 UART: [kat] ++
2,220,527 UART: [kat] sha1
2,221,062 UART: [kat] SHA2-256
2,221,725 UART: [kat] SHA2-384
2,222,379 UART: [kat] SHA2-512-ACC
2,223,230 UART: [kat] ECC-384
3,279,928 UART: [kat] HMAC-384Kdf
3,290,984 UART: [kat] LMS
3,820,494 UART: [kat] --
3,825,457 UART: [cold-reset] ++
3,827,725 UART: [fht] FHT @ 0x50003400
3,838,594 UART: [idev] ++
3,839,164 UART: [idev] CDI.KEYID = 6
3,840,075 UART: [idev] SUBJECT.KEYID = 7
3,841,235 UART: [idev] UDS.KEYID = 0
3,855,860 UART: [idev] Erasing UDS.KEYID = 0
6,311,640 UART: [idev] Sha1 KeyId Algorithm
6,335,033 UART: [idev] --
6,338,697 UART: [ldev] ++
6,339,301 UART: [ldev] CDI.KEYID = 6
6,340,190 UART: [ldev] SUBJECT.KEYID = 5
6,341,293 UART: [ldev] AUTHORITY.KEYID = 7
6,342,635 UART: [ldev] FE.KEYID = 1
6,354,710 UART: [ldev] Erasing FE.KEYID = 1
8,828,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,868 UART: [ldev] --
10,617,110 UART: [fwproc] Wait for Commands...
10,619,525 UART: [fwproc] Recv command 0x46574c44
10,621,562 UART: [fwproc] Recv'd Img size: 112032 bytes
15,143,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,224,015 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,284,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,602,748 >>> mbox cmd response: success
15,606,894 UART: [afmc] ++
15,607,479 UART: [afmc] CDI.KEYID = 6
15,608,357 UART: [afmc] SUBJECT.KEYID = 7
15,609,623 UART: [afmc] AUTHORITY.KEYID = 5
18,110,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,831,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,833,287 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,849,296 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,865,208 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,880,987 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,903,269 UART: [afmc] --
19,907,352 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,907,718 UART: [cold-reset] --
19,909,232 UART: [state] Locking Datavault
19,913,502 UART: [state] Locking PCR0, PCR1 and PCR31
19,915,196 UART: [state] Locking ICCM
19,916,452 UART: [exit] Launching FMC @ 0x40000000
19,924,848 UART:
19,925,084 UART: Running Caliptra FMC ...
19,926,121 UART:
19,926,267 UART: [fmc] Received command: 0x10000000
19,928,771 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
2,064,643 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,228,476 >>> mbox cmd response: success
19,469,568 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,485,379 UART:
19,485,725 UART: Running Caliptra FMC ...
19,486,855 UART:
19,487,016 UART: [fmc] Received command: 0x10000000
19,489,391 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,062,020 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,203,862 UART:
2,204,278 UART: Running Caliptra ROM ...
2,205,461 UART:
2,205,639 UART: [state] CFI Enabled
2,206,622 UART: [state] LifecycleState = Unprovisioned
2,208,267 UART: [state] DebugLocked = No
2,209,373 UART: [state] WD Timer not started. Device not locked for debugging
2,211,845 UART: [kat] SHA2-256
2,212,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,544 UART: [kat] ++
2,215,998 UART: [kat] sha1
2,216,510 UART: [kat] SHA2-256
2,217,215 UART: [kat] SHA2-384
2,217,873 UART: [kat] SHA2-512-ACC
2,218,672 UART: [kat] ECC-384
2,950,999 UART: [kat] HMAC-384Kdf
2,972,738 UART: [kat] LMS
3,502,188 UART: [kat] --
3,506,629 UART: [cold-reset] ++
3,509,047 UART: [fht] FHT @ 0x50003400
3,520,353 UART: [idev] ++
3,520,926 UART: [idev] CDI.KEYID = 6
3,521,805 UART: [idev] SUBJECT.KEYID = 7
3,523,021 UART: [idev] UDS.KEYID = 0
3,546,196 UART: [idev] Erasing UDS.KEYID = 0
6,028,770 UART: [idev] Sha1 KeyId Algorithm
6,050,651 UART: [idev] --
6,054,242 UART: [ldev] ++
6,054,817 UART: [ldev] CDI.KEYID = 6
6,055,701 UART: [ldev] SUBJECT.KEYID = 5
6,056,918 UART: [ldev] AUTHORITY.KEYID = 7
6,058,210 UART: [ldev] FE.KEYID = 1
6,102,269 UART: [ldev] Erasing FE.KEYID = 1
8,605,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,116 UART: [ldev] --
10,416,134 UART: [fwproc] Wait for Commands...
10,417,744 UART: [fwproc] Recv command 0x46574c44
10,419,866 UART: [fwproc] Recv'd Img size: 112032 bytes
14,966,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,046,237 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,106,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,424,675 >>> mbox cmd response: success
15,428,115 UART: [afmc] ++
15,428,718 UART: [afmc] CDI.KEYID = 6
15,429,604 UART: [afmc] SUBJECT.KEYID = 7
15,430,828 UART: [afmc] AUTHORITY.KEYID = 5
17,960,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,878 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,699,870 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,715,769 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,731,581 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,753,864 UART: [afmc] --
19,757,434 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,757,813 UART: [cold-reset] --
19,759,813 UART: [state] Locking Datavault
19,764,354 UART: [state] Locking PCR0, PCR1 and PCR31
19,765,994 UART: [state] Locking ICCM
19,767,386 UART: [exit] Launching FMC @ 0x40000000
19,775,778 UART:
19,776,011 UART: Running Caliptra FMC ...
19,777,118 UART:
19,777,274 UART: [fmc] Received command: 0x10000000
19,779,682 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,061,830 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,021,754 >>> mbox cmd response: success
19,290,902 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,307,833 UART:
19,308,202 UART: Running Caliptra FMC ...
19,309,390 UART:
19,309,557 UART: [fmc] Received command: 0x10000000
19,311,846 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
2,065,077 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,206,883 UART:
2,207,285 UART: Running Caliptra ROM ...
2,208,364 UART:
2,208,521 UART: [state] CFI Enabled
2,209,434 UART: [state] LifecycleState = Unprovisioned
2,211,098 UART: [state] DebugLocked = No
2,212,129 UART: [state] WD Timer not started. Device not locked for debugging
2,214,598 UART: [kat] SHA2-256
2,215,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,262 UART: [kat] ++
2,218,704 UART: [kat] sha1
2,219,212 UART: [kat] SHA2-256
2,219,867 UART: [kat] SHA2-384
2,220,523 UART: [kat] SHA2-512-ACC
2,221,321 UART: [kat] ECC-384
3,277,869 UART: [kat] HMAC-384Kdf
3,291,022 UART: [kat] LMS
3,820,536 UART: [kat] --
3,823,889 UART: [cold-reset] ++
3,825,225 UART: [fht] FHT @ 0x50003400
3,836,307 UART: [idev] ++
3,836,883 UART: [idev] CDI.KEYID = 6
3,837,790 UART: [idev] SUBJECT.KEYID = 7
3,839,001 UART: [idev] UDS.KEYID = 0
3,856,708 UART: [idev] Erasing UDS.KEYID = 0
6,311,899 UART: [idev] Sha1 KeyId Algorithm
6,335,419 UART: [idev] --
6,338,011 UART: [ldev] ++
6,338,580 UART: [ldev] CDI.KEYID = 6
6,339,485 UART: [ldev] SUBJECT.KEYID = 5
6,340,853 UART: [ldev] AUTHORITY.KEYID = 7
6,342,042 UART: [ldev] FE.KEYID = 1
6,353,666 UART: [ldev] Erasing FE.KEYID = 1
8,827,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,283 UART: [ldev] --
10,615,845 UART: [fwproc] Wait for Commands...
10,617,834 UART: [fwproc] Recv command 0x46574c44
10,619,937 UART: [fwproc] Recv'd Img size: 112032 bytes
15,151,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,228,978 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,289,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,607,898 >>> mbox cmd response: success
15,611,979 UART: [afmc] ++
15,612,577 UART: [afmc] CDI.KEYID = 6
15,613,484 UART: [afmc] SUBJECT.KEYID = 7
15,614,700 UART: [afmc] AUTHORITY.KEYID = 5
18,115,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,836,994 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,853,044 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,868,896 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,884,705 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,907,479 UART: [afmc] --
19,911,022 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,911,397 UART: [cold-reset] --
19,914,211 UART: [state] Locking Datavault
19,918,536 UART: [state] Locking PCR0, PCR1 and PCR31
19,920,176 UART: [state] Locking ICCM
19,921,404 UART: [exit] Launching FMC @ 0x40000000
19,929,796 UART:
19,930,021 UART: Running Caliptra FMC ...
19,931,118 UART:
19,931,274 UART: [fmc] Received command: 0x10000000
19,933,700 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
2,066,368 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,218,857 >>> mbox cmd response: success
19,455,261 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,470,833 UART:
19,471,166 UART: Running Caliptra FMC ...
19,472,254 UART:
19,472,400 UART: [fmc] Received command: 0x10000000
19,474,876 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
891,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,313 UART: [fwproc] Recv command 0x46574c44
1,282,046 UART: [fwproc] Recv'd Img size: 112032 bytes
3,091,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,789 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,280,498 >>> mbox cmd response: success
3,281,659 UART: [afmc] ++
3,281,827 UART: [afmc] CDI.KEYID = 6
3,282,190 UART: [afmc] SUBJECT.KEYID = 7
3,282,616 UART: [afmc] AUTHORITY.KEYID = 5
3,318,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,428 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,122 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,022 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,352,731 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,641 UART: [afmc] --
3,361,603 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,625 UART: [cold-reset] --
3,362,277 UART: [state] Locking Datavault
3,363,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,212 UART: [state] Locking ICCM
3,364,848 UART: [exit] Launching FMC @ 0x40000000
3,370,145 UART:
3,370,161 UART: Running Caliptra FMC ...
3,370,569 UART:
3,370,799 UART: [fmc] Received command: 0x10000000
3,372,968 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,135,382 >>> mbox cmd response: success
3,191,579 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,197,676 UART:
3,197,692 UART: Running Caliptra FMC ...
3,198,100 UART:
3,198,330 UART: [fmc] Received command: 0x10000000
3,200,499 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,256 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 112032 bytes
3,093,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,388 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,147,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,283,029 >>> mbox cmd response: success
3,284,150 UART: [afmc] ++
3,284,318 UART: [afmc] CDI.KEYID = 6
3,284,681 UART: [afmc] SUBJECT.KEYID = 7
3,285,107 UART: [afmc] AUTHORITY.KEYID = 5
3,320,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,336,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,337,569 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,343,263 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,349,163 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,354,872 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,362,606 UART: [afmc] --
3,363,538 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,363,560 UART: [cold-reset] --
3,364,386 UART: [state] Locking Datavault
3,365,689 UART: [state] Locking PCR0, PCR1 and PCR31
3,366,293 UART: [state] Locking ICCM
3,366,827 UART: [exit] Launching FMC @ 0x40000000
3,372,124 UART:
3,372,140 UART: Running Caliptra FMC ...
3,372,548 UART:
3,372,778 UART: [fmc] Received command: 0x10000000
3,374,947 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,136,563 >>> mbox cmd response: success
3,193,432 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,455 UART:
3,199,471 UART: Running Caliptra FMC ...
3,199,879 UART:
3,200,109 UART: [fmc] Received command: 0x10000000
3,202,278 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,572 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,345 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,215,066 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,614 UART: [ldev] --
1,280,064 UART: [fwproc] Wait for Commands...
1,280,863 UART: [fwproc] Recv command 0x46574c44
1,281,596 UART: [fwproc] Recv'd Img size: 112032 bytes
3,099,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,268 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,289,061 >>> mbox cmd response: success
3,290,324 UART: [afmc] ++
3,290,492 UART: [afmc] CDI.KEYID = 6
3,290,855 UART: [afmc] SUBJECT.KEYID = 7
3,291,281 UART: [afmc] AUTHORITY.KEYID = 5
3,326,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,911 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,349,605 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,355,505 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,361,214 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,369,102 UART: [afmc] --
3,370,120 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,142 UART: [cold-reset] --
3,371,002 UART: [state] Locking Datavault
3,372,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,675 UART: [state] Locking ICCM
3,373,315 UART: [exit] Launching FMC @ 0x40000000
3,378,612 UART:
3,378,628 UART: Running Caliptra FMC ...
3,379,036 UART:
3,379,266 UART: [fmc] Received command: 0x10000000
3,381,435 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,138,384 >>> mbox cmd response: success
3,194,379 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,558 UART:
3,200,574 UART: Running Caliptra FMC ...
3,200,982 UART:
3,201,212 UART: [fmc] Received command: 0x10000000
3,203,381 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,182,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,142 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,210,035 UART: [ldev] ++
1,210,203 UART: [ldev] CDI.KEYID = 6
1,210,567 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,510 UART: [fwproc] Recv command 0x46574c44
1,284,243 UART: [fwproc] Recv'd Img size: 112032 bytes
3,103,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,131,068 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,156,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,292,785 >>> mbox cmd response: success
3,293,976 UART: [afmc] ++
3,294,144 UART: [afmc] CDI.KEYID = 6
3,294,507 UART: [afmc] SUBJECT.KEYID = 7
3,294,933 UART: [afmc] AUTHORITY.KEYID = 5
3,329,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,347,001 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,352,695 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,358,595 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,364,304 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,372,128 UART: [afmc] --
3,373,200 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,222 UART: [cold-reset] --
3,374,014 UART: [state] Locking Datavault
3,375,349 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,953 UART: [state] Locking ICCM
3,376,415 UART: [exit] Launching FMC @ 0x40000000
3,381,712 UART:
3,381,728 UART: Running Caliptra FMC ...
3,382,136 UART:
3,382,366 UART: [fmc] Received command: 0x10000000
3,384,535 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,141,198 >>> mbox cmd response: success
3,196,913 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,203,240 UART:
3,203,256 UART: Running Caliptra FMC ...
3,203,664 UART:
3,203,894 UART: [fmc] Received command: 0x10000000
3,206,063 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 112032 bytes
3,089,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,117,216 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,142,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,278,999 >>> mbox cmd response: success
3,280,070 UART: [afmc] ++
3,280,238 UART: [afmc] CDI.KEYID = 6
3,280,601 UART: [afmc] SUBJECT.KEYID = 7
3,281,027 UART: [afmc] AUTHORITY.KEYID = 5
3,316,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,867 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,339,561 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,345,461 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,351,170 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,359,102 UART: [afmc] --
3,360,146 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,360,168 UART: [cold-reset] --
3,360,916 UART: [state] Locking Datavault
3,361,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,361 UART: [state] Locking ICCM
3,362,869 UART: [exit] Launching FMC @ 0x40000000
3,368,166 UART:
3,368,182 UART: Running Caliptra FMC ...
3,368,590 UART:
3,368,820 UART: [fmc] Received command: 0x10000000
3,370,989 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,137,919 >>> mbox cmd response: success
3,192,824 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,099 UART:
3,199,115 UART: Running Caliptra FMC ...
3,199,523 UART:
3,199,753 UART: [fmc] Received command: 0x10000000
3,201,922 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
921,277 UART: [kat] LMS
1,169,589 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,800 UART: [idev] ++
1,173,968 UART: [idev] CDI.KEYID = 6
1,174,329 UART: [idev] SUBJECT.KEYID = 7
1,174,754 UART: [idev] UDS.KEYID = 0
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,169 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,957 UART: [fwproc] Recv'd Img size: 112032 bytes
3,103,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,131,292 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,156,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,292,969 >>> mbox cmd response: success
3,294,048 UART: [afmc] ++
3,294,216 UART: [afmc] CDI.KEYID = 6
3,294,579 UART: [afmc] SUBJECT.KEYID = 7
3,295,005 UART: [afmc] AUTHORITY.KEYID = 5
3,330,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,347,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,348,147 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,353,841 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,359,741 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,365,450 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,373,270 UART: [afmc] --
3,374,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,374,182 UART: [cold-reset] --
3,374,782 UART: [state] Locking Datavault
3,375,931 UART: [state] Locking PCR0, PCR1 and PCR31
3,376,535 UART: [state] Locking ICCM
3,377,059 UART: [exit] Launching FMC @ 0x40000000
3,382,356 UART:
3,382,372 UART: Running Caliptra FMC ...
3,382,780 UART:
3,383,010 UART: [fmc] Received command: 0x10000000
3,385,179 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,145,111 >>> mbox cmd response: success
3,201,510 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,207,463 UART:
3,207,479 UART: Running Caliptra FMC ...
3,207,887 UART:
3,208,117 UART: [fmc] Received command: 0x10000000
3,210,286 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,053,453 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,195,745 UART:
2,196,189 UART: Running Caliptra ROM ...
2,197,318 UART:
2,197,481 UART: [state] CFI Enabled
2,198,471 UART: [state] LifecycleState = Unprovisioned
2,200,128 UART: [state] DebugLocked = No
2,201,158 UART: [state] WD Timer not started. Device not locked for debugging
2,203,627 UART: [kat] SHA2-256
2,204,293 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,305 UART: [kat] ++
2,207,756 UART: [kat] sha1
2,208,269 UART: [kat] SHA2-256
2,209,026 UART: [kat] SHA2-384
2,209,696 UART: [kat] SHA2-512-ACC
2,210,525 UART: [kat] ECC-384
3,779,501 UART: [kat] HMAC-384Kdf
3,804,417 UART: [kat] LMS
4,877,556 UART: [kat] --
4,883,463 UART: [cold-reset] ++
4,884,750 UART: [fht] FHT @ 0x50003400
4,896,031 UART: [idev] ++
4,896,748 UART: [idev] CDI.KEYID = 6
4,897,938 UART: [idev] SUBJECT.KEYID = 7
4,899,095 UART: [idev] UDS.KEYID = 0
4,930,947 UART: [idev] Erasing UDS.KEYID = 0
8,246,652 UART: [idev] Sha1 KeyId Algorithm
8,268,059 UART: [idev] --
8,273,350 UART: [ldev] ++
8,273,934 UART: [ldev] CDI.KEYID = 6
8,275,091 UART: [ldev] SUBJECT.KEYID = 5
8,276,312 UART: [ldev] AUTHORITY.KEYID = 7
8,277,466 UART: [ldev] FE.KEYID = 1
8,319,461 UART: [ldev] Erasing FE.KEYID = 1
11,655,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,377 UART: [ldev] --
14,039,045 UART: [fwproc] Wait for Commands...
14,042,118 UART: [fwproc] Recv command 0x46574c44
14,044,427 UART: [fwproc] Recv'd Img size: 111688 bytes
18,087,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,165,154 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,225,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,543,300 >>> mbox cmd response: success
18,548,182 UART: [afmc] ++
18,548,763 UART: [afmc] CDI.KEYID = 6
18,549,943 UART: [afmc] SUBJECT.KEYID = 7
18,551,096 UART: [afmc] AUTHORITY.KEYID = 5
21,926,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,226,065 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,242,053 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,258,137 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,274,180 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,295,778 UART: [afmc] --
24,298,943 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,299,302 UART: [cold-reset] --
24,303,027 UART: [state] Locking Datavault
24,308,834 UART: [state] Locking PCR0, PCR1 and PCR31
24,310,477 UART: [state] Locking ICCM
24,312,288 UART: [exit] Launching FMC @ 0x40000000
24,320,904 UART:
24,321,136 UART: Running Caliptra FMC ...
24,322,230 UART:
24,322,381 UART: [fmc] Received command: 0x10000000
24,324,869 >>> mbox cmd response data (224 bytes)
24,326,352 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,326,767 UART: [fmc] Received command: 0x10000006
24,348,006 >>> mbox cmd response data (1536 bytes)
24,358,522 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,498,994 UART: [fmc] Received command: 0x46574C44
24,500,540 UART:
24,500,710 UART: Running Caliptra ROM ...
24,501,813 UART:
24,501,991 UART: [state] CFI Enabled
24,558,978 UART: [state] LifecycleState = Unprovisioned
24,560,811 UART: [state] DebugLocked = No
24,562,020 UART: [state] WD Timer not started. Device not locked for debugging
24,565,317 UART: [kat] SHA2-256
24,747,241 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,758,765 UART: [kat] ++
24,759,216 UART: [kat] sha1
24,768,916 UART: [kat] SHA2-256
24,771,927 UART: [kat] SHA2-384
24,778,226 UART: [kat] SHA2-512-ACC
24,780,844 UART: [kat] ECC-384
28,071,412 UART: [kat] HMAC-384Kdf
28,097,538 UART: [kat] LMS
29,170,686 UART: [kat] --
29,175,505 UART: [update-reset] ++
33,243,982 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,247,409 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,621,036 >>> mbox cmd response: success
33,622,211 UART: [update-reset] Copying MAN_2 To MAN_1
33,645,094 UART: [update-reset Success] --
33,646,741 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,649,438 UART: [state] Locking Datavault
33,651,618 UART: [state] Locking PCR0, PCR1 and PCR31
33,653,318 UART: [state] Locking ICCM
33,656,308 UART: [exit] Launching FMC @ 0x40000000
33,664,919 UART:
33,665,148 UART: Running Caliptra FMC ...
33,666,171 UART:
33,666,315 UART: [fmc] Received command: 0x10000000
33,668,852 >>> mbox cmd response data (224 bytes)
33,670,169 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,670,596 UART: [fmc] Received command: 0x10000006
33,691,854 >>> mbox cmd response data (1536 bytes)
33,700,115 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,700,571 UART: [fmc] Received command: 0x10000007
33,702,109 >>> mbox cmd response data (4 bytes)
33,702,430 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,702,747 UART: [fmc] Received command: 0x10000006
33,723,993 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,056,615 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,287,101 >>> mbox cmd response: success
23,956,137 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,968,864 UART:
23,969,208 UART: Running Caliptra FMC ...
23,970,310 UART:
23,970,460 UART: [fmc] Received command: 0x10000000
23,972,830 >>> mbox cmd response data (224 bytes)
23,974,233 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
23,974,647 UART: [fmc] Received command: 0x10000006
23,995,908 >>> mbox cmd response data (1536 bytes)
24,006,145 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,146,632 UART: [fmc] Received command: 0x46574C44
33,181,394 >>> mbox cmd response: success
33,202,900 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,216,404 UART:
33,216,686 UART: Running Caliptra FMC ...
33,217,792 UART:
33,217,953 UART: [fmc] Received command: 0x10000000
33,220,330 >>> mbox cmd response data (224 bytes)
33,221,720 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,222,128 UART: [fmc] Received command: 0x10000006
33,243,388 >>> mbox cmd response data (1536 bytes)
33,251,609 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,252,062 UART: [fmc] Received command: 0x10000007
33,253,568 >>> mbox cmd response data (4 bytes)
33,253,869 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,254,189 UART: [fmc] Received command: 0x10000006
33,275,387 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
2,057,702 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,199,117 UART:
2,199,602 UART: Running Caliptra ROM ...
2,200,681 UART:
2,200,832 UART: [state] CFI Enabled
2,201,739 UART: [state] LifecycleState = Unprovisioned
2,203,410 UART: [state] DebugLocked = No
2,204,431 UART: [state] WD Timer not started. Device not locked for debugging
2,206,901 UART: [kat] SHA2-256
2,207,557 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,577 UART: [kat] ++
2,211,020 UART: [kat] sha1
2,211,525 UART: [kat] SHA2-256
2,212,171 UART: [kat] SHA2-384
2,212,863 UART: [kat] SHA2-512-ACC
2,213,685 UART: [kat] ECC-384
4,091,321 UART: [kat] HMAC-384Kdf
4,103,679 UART: [kat] LMS
5,176,785 UART: [kat] --
5,181,833 UART: [cold-reset] ++
5,184,473 UART: [fht] FHT @ 0x50003400
5,195,554 UART: [idev] ++
5,196,247 UART: [idev] CDI.KEYID = 6
5,197,424 UART: [idev] SUBJECT.KEYID = 7
5,199,010 UART: [idev] UDS.KEYID = 0
5,216,455 UART: [idev] Erasing UDS.KEYID = 0
8,492,073 UART: [idev] Sha1 KeyId Algorithm
8,514,268 UART: [idev] --
8,517,729 UART: [ldev] ++
8,518,330 UART: [ldev] CDI.KEYID = 6
8,519,483 UART: [ldev] SUBJECT.KEYID = 5
8,520,968 UART: [ldev] AUTHORITY.KEYID = 7
8,522,526 UART: [ldev] FE.KEYID = 1
8,533,065 UART: [ldev] Erasing FE.KEYID = 1
11,823,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,894 UART: [ldev] --
14,187,134 UART: [fwproc] Wait for Commands...
14,188,906 UART: [fwproc] Recv command 0x46574c44
14,191,222 UART: [fwproc] Recv'd Img size: 111688 bytes
18,235,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,308,773 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,368,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,685,869 >>> mbox cmd response: success
18,690,845 UART: [afmc] ++
18,691,429 UART: [afmc] CDI.KEYID = 6
18,692,610 UART: [afmc] SUBJECT.KEYID = 7
18,693,774 UART: [afmc] AUTHORITY.KEYID = 5
22,010,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,303,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,125 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,322,217 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,338,201 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,354,279 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,376,563 UART: [afmc] --
24,379,410 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,379,786 UART: [cold-reset] --
24,384,433 UART: [state] Locking Datavault
24,387,626 UART: [state] Locking PCR0, PCR1 and PCR31
24,389,262 UART: [state] Locking ICCM
24,392,003 UART: [exit] Launching FMC @ 0x40000000
24,400,582 UART:
24,400,862 UART: Running Caliptra FMC ...
24,401,969 UART:
24,402,125 UART: [fmc] Received command: 0x10000000
24,404,554 >>> mbox cmd response data (224 bytes)
24,406,040 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,406,471 UART: [fmc] Received command: 0x10000006
24,427,709 >>> mbox cmd response data (1536 bytes)
24,438,543 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,579,011 UART: [fmc] Received command: 0x46574C44
24,580,563 UART:
24,580,730 UART: Running Caliptra ROM ...
24,581,740 UART:
24,582,145 UART: [state] CFI Enabled
24,597,106 UART: [state] LifecycleState = Unprovisioned
24,598,934 UART: [state] DebugLocked = No
24,600,335 UART: [state] WD Timer not started. Device not locked for debugging
24,604,673 UART: [kat] SHA2-256
24,786,654 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,798,216 UART: [kat] ++
24,798,852 UART: [kat] sha1
24,808,008 UART: [kat] SHA2-256
24,810,998 UART: [kat] SHA2-384
24,816,383 UART: [kat] SHA2-512-ACC
24,819,007 UART: [kat] ECC-384
28,074,637 UART: [kat] HMAC-384Kdf
28,087,488 UART: [kat] LMS
29,160,651 UART: [kat] --
29,165,453 UART: [update-reset] ++
33,233,421 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,237,509 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,611,174 >>> mbox cmd response: success
33,611,685 UART: [update-reset] Copying MAN_2 To MAN_1
33,634,580 UART: [update-reset Success] --
33,636,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,639,850 UART: [state] Locking Datavault
33,643,211 UART: [state] Locking PCR0, PCR1 and PCR31
33,644,908 UART: [state] Locking ICCM
33,647,404 UART: [exit] Launching FMC @ 0x40000000
33,656,024 UART:
33,656,258 UART: Running Caliptra FMC ...
33,657,288 UART:
33,657,425 UART: [fmc] Received command: 0x10000000
33,660,009 >>> mbox cmd response data (224 bytes)
33,661,334 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,661,732 UART: [fmc] Received command: 0x10000006
33,682,985 >>> mbox cmd response data (1536 bytes)
33,691,221 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,691,682 UART: [fmc] Received command: 0x10000007
33,693,133 >>> mbox cmd response data (4 bytes)
33,693,431 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,693,738 UART: [fmc] Received command: 0x10000006
33,714,926 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,058,557 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,501,520 >>> mbox cmd response: success
24,128,168 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,142,193 UART:
24,142,529 UART: Running Caliptra FMC ...
24,143,624 UART:
24,143,765 UART: [fmc] Received command: 0x10000000
24,146,124 >>> mbox cmd response data (224 bytes)
24,147,523 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,147,931 UART: [fmc] Received command: 0x10000006
24,169,184 >>> mbox cmd response data (1536 bytes)
24,179,747 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,320,060 UART: [fmc] Received command: 0x46574C44
33,243,460 >>> mbox cmd response: success
33,264,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,276,800 UART:
33,277,058 UART: Running Caliptra FMC ...
33,278,164 UART:
33,278,325 UART: [fmc] Received command: 0x10000000
33,280,751 >>> mbox cmd response data (224 bytes)
33,282,159 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,282,559 UART: [fmc] Received command: 0x10000006
33,303,814 >>> mbox cmd response data (1536 bytes)
33,312,116 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,312,558 UART: [fmc] Received command: 0x10000007
33,314,140 >>> mbox cmd response data (4 bytes)
33,314,456 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,314,788 UART: [fmc] Received command: 0x10000006
33,336,032 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,055,858 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,197,658 UART:
2,198,089 UART: Running Caliptra ROM ...
2,199,172 UART:
2,199,326 UART: [state] CFI Enabled
2,200,259 UART: [state] LifecycleState = Unprovisioned
2,201,932 UART: [state] DebugLocked = No
2,202,964 UART: [state] WD Timer not started. Device not locked for debugging
2,205,439 UART: [kat] SHA2-256
2,206,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,113 UART: [kat] ++
2,209,564 UART: [kat] sha1
2,210,075 UART: [kat] SHA2-256
2,210,734 UART: [kat] SHA2-384
2,211,388 UART: [kat] SHA2-512-ACC
2,212,390 UART: [kat] ECC-384
2,945,353 UART: [kat] HMAC-384Kdf
2,971,647 UART: [kat] LMS
3,501,126 UART: [kat] --
3,506,226 UART: [cold-reset] ++
3,507,465 UART: [fht] FHT @ 0x50003400
3,519,184 UART: [idev] ++
3,519,766 UART: [idev] CDI.KEYID = 6
3,520,650 UART: [idev] SUBJECT.KEYID = 7
3,521,867 UART: [idev] UDS.KEYID = 0
3,543,093 UART: [idev] Erasing UDS.KEYID = 0
6,025,621 UART: [idev] Sha1 KeyId Algorithm
6,048,262 UART: [idev] --
6,053,211 UART: [ldev] ++
6,053,795 UART: [ldev] CDI.KEYID = 6
6,054,685 UART: [ldev] SUBJECT.KEYID = 5
6,055,849 UART: [ldev] AUTHORITY.KEYID = 7
6,057,140 UART: [ldev] FE.KEYID = 1
6,099,740 UART: [ldev] Erasing FE.KEYID = 1
8,600,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,490 UART: [ldev] --
10,413,485 UART: [fwproc] Wait for Commands...
10,415,961 UART: [fwproc] Recv command 0x46574c44
10,418,063 UART: [fwproc] Recv'd Img size: 112032 bytes
13,794,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,869,403 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,929,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,248,678 >>> mbox cmd response: success
14,252,465 UART: [afmc] ++
14,253,055 UART: [afmc] CDI.KEYID = 6
14,253,970 UART: [afmc] SUBJECT.KEYID = 7
14,255,190 UART: [afmc] AUTHORITY.KEYID = 5
16,784,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,144 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,530,093 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,545,977 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,561,952 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,584,149 UART: [afmc] --
18,588,012 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,588,416 UART: [cold-reset] --
18,590,206 UART: [state] Locking Datavault
18,595,182 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,881 UART: [state] Locking ICCM
18,598,196 UART: [exit] Launching FMC @ 0x40000000
18,606,544 UART:
18,606,782 UART: Running Caliptra FMC ...
18,607,886 UART:
18,608,049 UART: [fmc] Received command: 0x10000000
18,610,503 >>> mbox cmd response data (224 bytes)
18,612,000 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,612,435 UART: [fmc] Received command: 0x10000006
18,633,677 >>> mbox cmd response data (1536 bytes)
18,644,226 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,785,150 UART: [fmc] Received command: 0x46574C44
18,786,703 UART:
18,786,876 UART: Running Caliptra ROM ...
18,787,987 UART:
18,788,147 UART: [state] CFI Enabled
18,846,394 UART: [state] LifecycleState = Unprovisioned
18,848,265 UART: [state] DebugLocked = No
18,849,679 UART: [state] WD Timer not started. Device not locked for debugging
18,853,706 UART: [kat] SHA2-256
19,032,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,044,365 UART: [kat] ++
19,044,825 UART: [kat] sha1
19,057,492 UART: [kat] SHA2-256
19,060,534 UART: [kat] SHA2-384
19,066,999 UART: [kat] SHA2-512-ACC
19,069,900 UART: [kat] ECC-384
21,529,380 UART: [kat] HMAC-384Kdf
21,552,390 UART: [kat] LMS
22,081,856 UART: [kat] --
22,085,815 UART: [update-reset] ++
25,483,110 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,486,764 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,861,648 >>> mbox cmd response: success
25,862,976 UART: [update-reset] Copying MAN_2 To MAN_1
25,885,323 UART: [update-reset Success] --
25,886,589 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,889,773 UART: [state] Locking Datavault
25,893,783 UART: [state] Locking PCR0, PCR1 and PCR31
25,895,431 UART: [state] Locking ICCM
25,897,338 UART: [exit] Launching FMC @ 0x40000000
25,905,740 UART:
25,905,977 UART: Running Caliptra FMC ...
25,907,081 UART:
25,907,241 UART: [fmc] Received command: 0x10000000
25,909,676 >>> mbox cmd response data (224 bytes)
25,911,072 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,911,480 UART: [fmc] Received command: 0x10000006
25,932,726 >>> mbox cmd response data (1536 bytes)
25,941,089 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,941,576 UART: [fmc] Received command: 0x10000007
25,943,122 >>> mbox cmd response data (4 bytes)
25,943,439 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,943,749 UART: [fmc] Received command: 0x10000006
25,964,990 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,057,431 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,030,398 >>> mbox cmd response: success
18,308,180 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,322,472 UART:
18,322,817 UART: Running Caliptra FMC ...
18,323,909 UART:
18,324,059 UART: [fmc] Received command: 0x10000000
18,326,513 >>> mbox cmd response data (224 bytes)
18,328,009 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,328,424 UART: [fmc] Received command: 0x10000006
18,349,715 >>> mbox cmd response data (1536 bytes)
18,360,018 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,500,903 UART: [fmc] Received command: 0x46574C44
25,435,268 >>> mbox cmd response: success
25,457,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,471,908 UART:
25,472,165 UART: Running Caliptra FMC ...
25,473,272 UART:
25,473,427 UART: [fmc] Received command: 0x10000000
25,475,934 >>> mbox cmd response data (224 bytes)
25,477,343 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,477,744 UART: [fmc] Received command: 0x10000006
25,498,995 >>> mbox cmd response data (1536 bytes)
25,507,224 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,507,689 UART: [fmc] Received command: 0x10000007
25,509,276 >>> mbox cmd response data (4 bytes)
25,509,592 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,509,902 UART: [fmc] Received command: 0x10000006
25,531,091 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,577 writing to cptra_bootfsm_go
2,059,594 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,201,472 UART:
2,201,903 UART: Running Caliptra ROM ...
2,203,072 UART:
2,203,249 UART: [state] CFI Enabled
2,204,229 UART: [state] LifecycleState = Unprovisioned
2,205,882 UART: [state] DebugLocked = No
2,206,992 UART: [state] WD Timer not started. Device not locked for debugging
2,209,463 UART: [kat] SHA2-256
2,210,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,138 UART: [kat] ++
2,213,586 UART: [kat] sha1
2,214,122 UART: [kat] SHA2-256
2,214,865 UART: [kat] SHA2-384
2,215,531 UART: [kat] SHA2-512-ACC
2,216,415 UART: [kat] ECC-384
3,285,339 UART: [kat] HMAC-384Kdf
3,296,871 UART: [kat] LMS
3,826,314 UART: [kat] --
3,831,441 UART: [cold-reset] ++
3,832,335 UART: [fht] FHT @ 0x50003400
3,843,179 UART: [idev] ++
3,843,784 UART: [idev] CDI.KEYID = 6
3,844,669 UART: [idev] SUBJECT.KEYID = 7
3,845,880 UART: [idev] UDS.KEYID = 0
3,860,946 UART: [idev] Erasing UDS.KEYID = 0
6,316,018 UART: [idev] Sha1 KeyId Algorithm
6,338,870 UART: [idev] --
6,342,482 UART: [ldev] ++
6,343,055 UART: [ldev] CDI.KEYID = 6
6,343,941 UART: [ldev] SUBJECT.KEYID = 5
6,345,153 UART: [ldev] AUTHORITY.KEYID = 7
6,346,378 UART: [ldev] FE.KEYID = 1
6,355,539 UART: [ldev] Erasing FE.KEYID = 1
8,827,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,582 UART: [ldev] --
10,619,192 UART: [fwproc] Wait for Commands...
10,621,986 UART: [fwproc] Recv command 0x46574c44
10,624,085 UART: [fwproc] Recv'd Img size: 112032 bytes
13,990,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,060,020 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,120,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,438,018 >>> mbox cmd response: success
14,441,684 UART: [afmc] ++
14,442,279 UART: [afmc] CDI.KEYID = 6
14,443,191 UART: [afmc] SUBJECT.KEYID = 7
14,444,352 UART: [afmc] AUTHORITY.KEYID = 5
16,941,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,663,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,665,398 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,681,295 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,697,204 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,713,165 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,736,760 UART: [afmc] --
18,740,317 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,740,691 UART: [cold-reset] --
18,743,148 UART: [state] Locking Datavault
18,747,423 UART: [state] Locking PCR0, PCR1 and PCR31
18,749,065 UART: [state] Locking ICCM
18,751,486 UART: [exit] Launching FMC @ 0x40000000
18,759,878 UART:
18,760,118 UART: Running Caliptra FMC ...
18,761,216 UART:
18,761,371 UART: [fmc] Received command: 0x10000000
18,763,778 >>> mbox cmd response data (224 bytes)
18,765,247 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,765,663 UART: [fmc] Received command: 0x10000006
18,786,901 >>> mbox cmd response data (1536 bytes)
18,796,919 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,937,815 UART: [fmc] Received command: 0x46574C44
18,939,364 UART:
18,939,534 UART: Running Caliptra ROM ...
18,940,663 UART:
18,940,927 UART: [state] CFI Enabled
18,956,107 UART: [state] LifecycleState = Unprovisioned
18,957,941 UART: [state] DebugLocked = No
18,960,575 UART: [state] WD Timer not started. Device not locked for debugging
18,964,681 UART: [kat] SHA2-256
19,143,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,155,466 UART: [kat] ++
19,156,000 UART: [kat] sha1
19,167,114 UART: [kat] SHA2-256
19,170,132 UART: [kat] SHA2-384
19,176,592 UART: [kat] SHA2-512-ACC
19,179,527 UART: [kat] ECC-384
21,623,323 UART: [kat] HMAC-384Kdf
21,635,769 UART: [kat] LMS
22,165,324 UART: [kat] --
22,170,736 UART: [update-reset] ++
25,573,405 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,576,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,951,586 >>> mbox cmd response: success
25,952,387 UART: [update-reset] Copying MAN_2 To MAN_1
25,974,748 UART: [update-reset Success] --
25,976,012 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,979,368 UART: [state] Locking Datavault
25,981,539 UART: [state] Locking PCR0, PCR1 and PCR31
25,983,241 UART: [state] Locking ICCM
25,985,716 UART: [exit] Launching FMC @ 0x40000000
25,994,162 UART:
25,994,393 UART: Running Caliptra FMC ...
25,995,489 UART:
25,995,643 UART: [fmc] Received command: 0x10000000
25,998,075 >>> mbox cmd response data (224 bytes)
25,999,502 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,000,124 UART: [fmc] Received command: 0x10000006
26,021,390 >>> mbox cmd response data (1536 bytes)
26,029,604 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,030,057 UART: [fmc] Received command: 0x10000007
26,031,517 >>> mbox cmd response data (4 bytes)
26,031,826 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,032,144 UART: [fmc] Received command: 0x10000006
26,053,390 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,060,527 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,229,873 >>> mbox cmd response: success
18,463,999 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,478,177 UART:
18,478,517 UART: Running Caliptra FMC ...
18,479,707 UART:
18,479,879 UART: [fmc] Received command: 0x10000000
18,482,183 >>> mbox cmd response data (224 bytes)
18,483,659 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,484,074 UART: [fmc] Received command: 0x10000006
18,505,354 >>> mbox cmd response data (1536 bytes)
18,515,651 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,656,383 UART: [fmc] Received command: 0x46574C44
25,513,300 >>> mbox cmd response: success
25,534,708 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,547,788 UART:
25,548,074 UART: Running Caliptra FMC ...
25,549,192 UART:
25,549,358 UART: [fmc] Received command: 0x10000000
25,551,794 >>> mbox cmd response data (224 bytes)
25,553,192 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,553,614 UART: [fmc] Received command: 0x10000006
25,574,858 >>> mbox cmd response data (1536 bytes)
25,583,066 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,583,515 UART: [fmc] Received command: 0x10000007
25,585,116 >>> mbox cmd response data (4 bytes)
25,585,436 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,585,750 UART: [fmc] Received command: 0x10000006
25,606,993 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
2,056,578 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,199,057 UART:
2,199,466 UART: Running Caliptra ROM ...
2,200,553 UART:
2,200,714 UART: [state] CFI Enabled
2,201,700 UART: [state] LifecycleState = Unprovisioned
2,203,373 UART: [state] DebugLocked = No
2,204,399 UART: [state] WD Timer not started. Device not locked for debugging
2,206,874 UART: [kat] SHA2-256
2,207,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,543 UART: [kat] ++
2,210,991 UART: [kat] sha1
2,211,500 UART: [kat] SHA2-256
2,212,157 UART: [kat] SHA2-384
2,212,812 UART: [kat] SHA2-512-ACC
2,213,641 UART: [kat] ECC-384
2,950,862 UART: [kat] HMAC-384Kdf
2,971,451 UART: [kat] LMS
3,500,911 UART: [kat] --
3,505,765 UART: [cold-reset] ++
3,507,154 UART: [fht] FHT @ 0x50003400
3,518,993 UART: [idev] ++
3,519,585 UART: [idev] CDI.KEYID = 6
3,520,511 UART: [idev] SUBJECT.KEYID = 7
3,521,673 UART: [idev] UDS.KEYID = 0
3,543,635 UART: [idev] Erasing UDS.KEYID = 0
6,038,252 UART: [idev] Sha1 KeyId Algorithm
6,061,537 UART: [idev] --
6,063,974 UART: [ldev] ++
6,064,552 UART: [ldev] CDI.KEYID = 6
6,065,465 UART: [ldev] SUBJECT.KEYID = 5
6,066,683 UART: [ldev] AUTHORITY.KEYID = 7
6,067,915 UART: [ldev] FE.KEYID = 1
6,114,735 UART: [ldev] Erasing FE.KEYID = 1
8,617,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,382 UART: [ldev] --
10,426,226 UART: [fwproc] Wait for Commands...
10,428,607 UART: [fwproc] Recv command 0x46574c44
10,430,708 UART: [fwproc] Recv'd Img size: 112032 bytes
13,796,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,871,658 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,932,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,250,220 >>> mbox cmd response: success
14,255,177 UART: [afmc] ++
14,255,763 UART: [afmc] CDI.KEYID = 6
14,256,672 UART: [afmc] SUBJECT.KEYID = 7
14,257,833 UART: [afmc] AUTHORITY.KEYID = 5
16,798,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,522,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,524,494 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,540,399 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,556,326 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,572,229 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,594,552 UART: [afmc] --
18,597,406 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,597,793 UART: [cold-reset] --
18,600,121 UART: [state] Locking Datavault
18,605,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,606,752 UART: [state] Locking ICCM
18,608,197 UART: [exit] Launching FMC @ 0x40000000
18,616,593 UART:
18,616,830 UART: Running Caliptra FMC ...
18,617,930 UART:
18,618,090 UART: [fmc] Received command: 0x10000000
18,620,526 >>> mbox cmd response data (224 bytes)
18,622,012 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,622,440 UART: [fmc] Received command: 0x10000006
18,643,681 >>> mbox cmd response data (1536 bytes)
18,654,659 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,795,939 UART: [fmc] Received command: 0x46574C44
18,797,503 UART:
18,797,678 UART: Running Caliptra ROM ...
18,798,786 UART:
18,798,945 UART: [state] CFI Enabled
18,856,601 UART: [state] LifecycleState = Unprovisioned
18,858,537 UART: [state] DebugLocked = No
18,859,760 UART: [state] WD Timer not started. Device not locked for debugging
18,864,254 UART: [kat] SHA2-256
19,043,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,054,942 UART: [kat] ++
19,055,486 UART: [kat] sha1
19,067,144 UART: [kat] SHA2-256
19,070,168 UART: [kat] SHA2-384
19,076,215 UART: [kat] SHA2-512-ACC
19,079,162 UART: [kat] ECC-384
21,541,716 UART: [kat] HMAC-384Kdf
21,564,150 UART: [kat] LMS
22,093,604 UART: [kat] --
22,100,662 UART: [update-reset] ++
25,505,017 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,508,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,883,807 >>> mbox cmd response: success
25,884,203 UART: [update-reset] Copying MAN_2 To MAN_1
25,906,507 UART: [update-reset Success] --
25,907,777 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,911,396 UART: [state] Locking Datavault
25,915,192 UART: [state] Locking PCR0, PCR1 and PCR31
25,916,843 UART: [state] Locking ICCM
25,918,013 UART: [exit] Launching FMC @ 0x40000000
25,926,424 UART:
25,926,661 UART: Running Caliptra FMC ...
25,927,766 UART:
25,927,923 UART: [fmc] Received command: 0x10000000
25,930,361 >>> mbox cmd response data (224 bytes)
25,931,778 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,932,188 UART: [fmc] Received command: 0x10000006
25,953,446 >>> mbox cmd response data (1536 bytes)
25,961,705 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,962,169 UART: [fmc] Received command: 0x10000007
25,963,624 >>> mbox cmd response data (4 bytes)
25,963,931 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,964,242 UART: [fmc] Received command: 0x10000006
25,985,489 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,058,114 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,018,723 >>> mbox cmd response: success
18,283,868 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,301,238 UART:
18,301,586 UART: Running Caliptra FMC ...
18,302,754 UART:
18,302,923 UART: [fmc] Received command: 0x10000000
18,305,249 >>> mbox cmd response data (224 bytes)
18,306,728 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,307,131 UART: [fmc] Received command: 0x10000006
18,328,378 >>> mbox cmd response data (1536 bytes)
18,338,615 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,479,517 UART: [fmc] Received command: 0x46574C44
25,407,297 >>> mbox cmd response: success
25,429,532 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,444,013 UART:
25,444,278 UART: Running Caliptra FMC ...
25,445,392 UART:
25,445,556 UART: [fmc] Received command: 0x10000000
25,447,996 >>> mbox cmd response data (224 bytes)
25,449,408 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,449,821 UART: [fmc] Received command: 0x10000006
25,471,125 >>> mbox cmd response data (1536 bytes)
25,479,566 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,480,042 UART: [fmc] Received command: 0x10000007
25,481,564 >>> mbox cmd response data (4 bytes)
25,481,876 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,482,186 UART: [fmc] Received command: 0x10000006
25,503,384 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,157 writing to cptra_bootfsm_go
2,062,825 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,204,694 UART:
2,205,105 UART: Running Caliptra ROM ...
2,206,275 UART:
2,206,459 UART: [state] CFI Enabled
2,207,439 UART: [state] LifecycleState = Unprovisioned
2,209,087 UART: [state] DebugLocked = No
2,210,118 UART: [state] WD Timer not started. Device not locked for debugging
2,212,540 UART: [kat] SHA2-256
2,213,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,225 UART: [kat] ++
2,216,676 UART: [kat] sha1
2,217,188 UART: [kat] SHA2-256
2,217,845 UART: [kat] SHA2-384
2,218,501 UART: [kat] SHA2-512-ACC
2,219,346 UART: [kat] ECC-384
3,282,130 UART: [kat] HMAC-384Kdf
3,295,951 UART: [kat] LMS
3,825,476 UART: [kat] --
3,830,659 UART: [cold-reset] ++
3,833,242 UART: [fht] FHT @ 0x50003400
3,844,905 UART: [idev] ++
3,845,540 UART: [idev] CDI.KEYID = 6
3,846,458 UART: [idev] SUBJECT.KEYID = 7
3,847,619 UART: [idev] UDS.KEYID = 0
3,864,668 UART: [idev] Erasing UDS.KEYID = 0
6,320,697 UART: [idev] Sha1 KeyId Algorithm
6,343,712 UART: [idev] --
6,348,599 UART: [ldev] ++
6,349,177 UART: [ldev] CDI.KEYID = 6
6,350,239 UART: [ldev] SUBJECT.KEYID = 5
6,351,338 UART: [ldev] AUTHORITY.KEYID = 7
6,352,532 UART: [ldev] FE.KEYID = 1
6,364,420 UART: [ldev] Erasing FE.KEYID = 1
8,837,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,116 UART: [ldev] --
10,625,080 UART: [fwproc] Wait for Commands...
10,627,726 UART: [fwproc] Recv command 0x46574c44
10,629,818 UART: [fwproc] Recv'd Img size: 112032 bytes
14,002,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,074,084 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,134,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,451,847 >>> mbox cmd response: success
14,456,506 UART: [afmc] ++
14,457,117 UART: [afmc] CDI.KEYID = 6
14,458,028 UART: [afmc] SUBJECT.KEYID = 7
14,459,188 UART: [afmc] AUTHORITY.KEYID = 5
16,958,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,677,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,679,489 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,695,405 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,711,319 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,727,309 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,750,405 UART: [afmc] --
18,753,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,753,885 UART: [cold-reset] --
18,756,749 UART: [state] Locking Datavault
18,763,773 UART: [state] Locking PCR0, PCR1 and PCR31
18,765,425 UART: [state] Locking ICCM
18,767,625 UART: [exit] Launching FMC @ 0x40000000
18,775,981 UART:
18,776,213 UART: Running Caliptra FMC ...
18,777,309 UART:
18,777,463 UART: [fmc] Received command: 0x10000000
18,779,897 >>> mbox cmd response data (224 bytes)
18,781,363 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,781,770 UART: [fmc] Received command: 0x10000006
18,803,059 >>> mbox cmd response data (1536 bytes)
18,813,768 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,954,521 UART: [fmc] Received command: 0x46574C44
18,956,063 UART:
18,956,228 UART: Running Caliptra ROM ...
18,957,243 UART:
18,957,603 UART: [state] CFI Enabled
18,972,976 UART: [state] LifecycleState = Unprovisioned
18,974,853 UART: [state] DebugLocked = No
18,976,445 UART: [state] WD Timer not started. Device not locked for debugging
18,979,694 UART: [kat] SHA2-256
19,158,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,170,414 UART: [kat] ++
19,170,944 UART: [kat] sha1
19,180,373 UART: [kat] SHA2-256
19,183,440 UART: [kat] SHA2-384
19,189,683 UART: [kat] SHA2-512-ACC
19,192,673 UART: [kat] ECC-384
21,635,739 UART: [kat] HMAC-384Kdf
21,648,290 UART: [kat] LMS
22,177,789 UART: [kat] --
22,182,421 UART: [update-reset] ++
25,579,713 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,582,653 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,957,120 >>> mbox cmd response: success
25,957,664 UART: [update-reset] Copying MAN_2 To MAN_1
25,980,030 UART: [update-reset Success] --
25,981,304 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,982,842 UART: [state] Locking Datavault
25,986,962 UART: [state] Locking PCR0, PCR1 and PCR31
25,988,604 UART: [state] Locking ICCM
25,990,076 UART: [exit] Launching FMC @ 0x40000000
25,998,468 UART:
25,998,705 UART: Running Caliptra FMC ...
25,999,741 UART:
25,999,886 UART: [fmc] Received command: 0x10000000
26,002,423 >>> mbox cmd response data (224 bytes)
26,003,847 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,004,269 UART: [fmc] Received command: 0x10000006
26,025,525 >>> mbox cmd response data (1536 bytes)
26,034,140 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,034,621 UART: [fmc] Received command: 0x10000007
26,036,073 >>> mbox cmd response data (4 bytes)
26,036,380 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,036,700 UART: [fmc] Received command: 0x10000006
26,057,896 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,059,844 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,238,102 >>> mbox cmd response: success
18,472,636 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,489,320 UART:
18,489,668 UART: Running Caliptra FMC ...
18,490,846 UART:
18,491,021 UART: [fmc] Received command: 0x10000000
18,493,358 >>> mbox cmd response data (224 bytes)
18,494,954 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,495,415 UART: [fmc] Received command: 0x10000006
18,516,666 >>> mbox cmd response data (1536 bytes)
18,526,964 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,667,867 UART: [fmc] Received command: 0x46574C44
25,528,316 >>> mbox cmd response: success
25,549,495 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,561,953 UART:
25,562,234 UART: Running Caliptra FMC ...
25,563,268 UART:
25,563,416 UART: [fmc] Received command: 0x10000000
25,565,957 >>> mbox cmd response data (224 bytes)
25,567,276 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,567,690 UART: [fmc] Received command: 0x10000006
25,588,959 >>> mbox cmd response data (1536 bytes)
25,597,235 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,597,693 UART: [fmc] Received command: 0x10000007
25,599,199 >>> mbox cmd response data (4 bytes)
25,599,510 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,599,829 UART: [fmc] Received command: 0x10000006
25,621,052 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,341 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,411 UART: [idev] ++
1,172,579 UART: [idev] CDI.KEYID = 6
1,172,940 UART: [idev] SUBJECT.KEYID = 7
1,173,365 UART: [idev] UDS.KEYID = 0
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,355 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,530 UART: [ldev] Erasing FE.KEYID = 1
1,241,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,735 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,542 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,241 >>> mbox cmd response: success
2,741,508 UART: [afmc] ++
2,741,676 UART: [afmc] CDI.KEYID = 6
2,742,039 UART: [afmc] SUBJECT.KEYID = 7
2,742,465 UART: [afmc] AUTHORITY.KEYID = 5
2,777,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,248 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,968 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,860 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,554 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,433 UART: [afmc] --
2,820,477 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,499 UART: [cold-reset] --
2,821,379 UART: [state] Locking Datavault
2,822,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,048 UART: [state] Locking ICCM
2,823,606 UART: [exit] Launching FMC @ 0x40000000
2,828,903 UART:
2,828,919 UART: Running Caliptra FMC ...
2,829,327 UART:
2,829,557 UART: [fmc] Received command: 0x10000000
2,831,726 >>> mbox cmd response data (224 bytes)
2,831,727 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,756 UART: [fmc] Received command: 0x10000006
2,849,773 >>> mbox cmd response data (1536 bytes)
2,849,774 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,849,802 UART: [fmc] Received command: 0x46574C44
2,850,628 UART:
2,850,644 UART: Running Caliptra ROM ...
2,851,052 UART:
2,851,107 UART: [state] CFI Enabled
2,853,809 UART: [state] LifecycleState = Unprovisioned
2,854,464 UART: [state] DebugLocked = No
2,855,072 UART: [state] WD Timer not started. Device not locked for debugging
2,856,410 UART: [kat] SHA2-256
3,659,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,089 UART: [kat] ++
3,664,241 UART: [kat] sha1
3,668,467 UART: [kat] SHA2-256
3,670,407 UART: [kat] SHA2-384
3,673,192 UART: [kat] SHA2-512-ACC
3,675,092 UART: [kat] ECC-384
3,685,205 UART: [kat] HMAC-384Kdf
3,689,763 UART: [kat] LMS
3,938,075 UART: [kat] --
3,938,977 UART: [update-reset] ++
5,224,384 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,225,581 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,373,767 >>> mbox cmd response: success
5,373,880 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,894 UART: [update-reset Success] --
5,382,303 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,382,915 UART: [state] Locking Datavault
5,383,695 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,299 UART: [state] Locking ICCM
5,384,941 UART: [exit] Launching FMC @ 0x40000000
5,390,238 UART:
5,390,254 UART: Running Caliptra FMC ...
5,390,662 UART:
5,390,884 UART: [fmc] Received command: 0x10000000
5,393,053 >>> mbox cmd response data (224 bytes)
5,393,054 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,393,083 UART: [fmc] Received command: 0x10000006
5,411,100 >>> mbox cmd response data (1536 bytes)
5,411,101 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,411,129 UART: [fmc] Received command: 0x10000007
5,411,921 >>> mbox cmd response data (4 bytes)
5,411,922 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,411,950 UART: [fmc] Received command: 0x10000006
5,429,967 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,589,853 >>> mbox cmd response: success
2,645,671 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,450 UART:
2,651,466 UART: Running Caliptra FMC ...
2,651,874 UART:
2,652,104 UART: [fmc] Received command: 0x10000000
2,654,273 >>> mbox cmd response data (224 bytes)
2,654,274 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,303 UART: [fmc] Received command: 0x10000006
2,672,320 >>> mbox cmd response data (1536 bytes)
2,672,321 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,672,349 UART: [fmc] Received command: 0x46574C44
5,076,531 >>> mbox cmd response: success
5,084,113 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,883 UART:
5,089,899 UART: Running Caliptra FMC ...
5,090,307 UART:
5,090,529 UART: [fmc] Received command: 0x10000000
5,092,698 >>> mbox cmd response data (224 bytes)
5,092,699 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,728 UART: [fmc] Received command: 0x10000006
5,110,745 >>> mbox cmd response data (1536 bytes)
5,110,746 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,774 UART: [fmc] Received command: 0x10000007
5,111,566 >>> mbox cmd response data (4 bytes)
5,111,567 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,595 UART: [fmc] Received command: 0x10000006
5,129,612 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,361 UART: [kat] SHA2-256
891,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,040 UART: [kat] ++
896,192 UART: [kat] sha1
900,538 UART: [kat] SHA2-256
902,478 UART: [kat] SHA2-384
905,227 UART: [kat] SHA2-512-ACC
907,128 UART: [kat] ECC-384
916,855 UART: [kat] HMAC-384Kdf
921,491 UART: [kat] LMS
1,169,803 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,168 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,473 UART: [idev] SUBJECT.KEYID = 7
1,174,898 UART: [idev] UDS.KEYID = 0
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,917 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,482 >>> mbox cmd response: success
2,744,547 UART: [afmc] ++
2,744,715 UART: [afmc] CDI.KEYID = 6
2,745,078 UART: [afmc] SUBJECT.KEYID = 7
2,745,504 UART: [afmc] AUTHORITY.KEYID = 5
2,780,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,049 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,803,769 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,809,661 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,815,355 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,823,014 UART: [afmc] --
2,823,884 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,906 UART: [cold-reset] --
2,824,638 UART: [state] Locking Datavault
2,825,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,301 UART: [state] Locking ICCM
2,826,771 UART: [exit] Launching FMC @ 0x40000000
2,832,068 UART:
2,832,084 UART: Running Caliptra FMC ...
2,832,492 UART:
2,832,722 UART: [fmc] Received command: 0x10000000
2,834,891 >>> mbox cmd response data (224 bytes)
2,834,892 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,921 UART: [fmc] Received command: 0x10000006
2,852,938 >>> mbox cmd response data (1536 bytes)
2,852,939 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,852,967 UART: [fmc] Received command: 0x46574C44
2,853,793 UART:
2,853,809 UART: Running Caliptra ROM ...
2,854,217 UART:
2,854,359 UART: [state] CFI Enabled
2,857,103 UART: [state] LifecycleState = Unprovisioned
2,857,758 UART: [state] DebugLocked = No
2,858,396 UART: [state] WD Timer not started. Device not locked for debugging
2,859,524 UART: [kat] SHA2-256
3,663,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,203 UART: [kat] ++
3,667,355 UART: [kat] sha1
3,671,545 UART: [kat] SHA2-256
3,673,485 UART: [kat] SHA2-384
3,676,272 UART: [kat] SHA2-512-ACC
3,678,172 UART: [kat] ECC-384
3,688,279 UART: [kat] HMAC-384Kdf
3,693,067 UART: [kat] LMS
3,941,379 UART: [kat] --
3,942,407 UART: [update-reset] ++
5,227,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,228,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,377,033 >>> mbox cmd response: success
5,377,358 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,372 UART: [update-reset Success] --
5,385,781 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,386,543 UART: [state] Locking Datavault
5,387,379 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,983 UART: [state] Locking ICCM
5,388,609 UART: [exit] Launching FMC @ 0x40000000
5,393,906 UART:
5,393,922 UART: Running Caliptra FMC ...
5,394,330 UART:
5,394,552 UART: [fmc] Received command: 0x10000000
5,396,721 >>> mbox cmd response data (224 bytes)
5,396,722 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,396,751 UART: [fmc] Received command: 0x10000006
5,414,768 >>> mbox cmd response data (1536 bytes)
5,414,769 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,414,797 UART: [fmc] Received command: 0x10000007
5,415,589 >>> mbox cmd response data (4 bytes)
5,415,590 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,415,618 UART: [fmc] Received command: 0x10000006
5,433,635 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,596,682 >>> mbox cmd response: success
2,652,724 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,659,019 UART:
2,659,035 UART: Running Caliptra FMC ...
2,659,443 UART:
2,659,673 UART: [fmc] Received command: 0x10000000
2,661,842 >>> mbox cmd response data (224 bytes)
2,661,843 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,661,872 UART: [fmc] Received command: 0x10000006
2,679,889 >>> mbox cmd response data (1536 bytes)
2,679,890 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,679,918 UART: [fmc] Received command: 0x46574C44
5,084,457 >>> mbox cmd response: success
5,092,045 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,097,801 UART:
5,097,817 UART: Running Caliptra FMC ...
5,098,225 UART:
5,098,447 UART: [fmc] Received command: 0x10000000
5,100,616 >>> mbox cmd response data (224 bytes)
5,100,617 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,100,646 UART: [fmc] Received command: 0x10000006
5,118,663 >>> mbox cmd response data (1536 bytes)
5,118,664 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,118,692 UART: [fmc] Received command: 0x10000007
5,119,484 >>> mbox cmd response data (4 bytes)
5,119,485 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,119,513 UART: [fmc] Received command: 0x10000006
5,137,530 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,638 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,255 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,182,415 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,640 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,506 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,071 >>> mbox cmd response: success
2,742,106 UART: [afmc] ++
2,742,274 UART: [afmc] CDI.KEYID = 6
2,742,637 UART: [afmc] SUBJECT.KEYID = 7
2,743,063 UART: [afmc] AUTHORITY.KEYID = 5
2,778,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,216 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,936 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,828 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,522 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,820,389 UART: [afmc] --
2,821,397 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,419 UART: [cold-reset] --
2,822,321 UART: [state] Locking Datavault
2,823,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,996 UART: [state] Locking ICCM
2,824,606 UART: [exit] Launching FMC @ 0x40000000
2,829,903 UART:
2,829,919 UART: Running Caliptra FMC ...
2,830,327 UART:
2,830,557 UART: [fmc] Received command: 0x10000000
2,832,726 >>> mbox cmd response data (224 bytes)
2,832,727 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,756 UART: [fmc] Received command: 0x10000006
2,850,773 >>> mbox cmd response data (1536 bytes)
2,850,774 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,850,802 UART: [fmc] Received command: 0x46574C44
2,851,628 UART:
2,851,644 UART: Running Caliptra ROM ...
2,852,052 UART:
2,852,107 UART: [state] CFI Enabled
2,854,415 UART: [state] LifecycleState = Unprovisioned
2,855,070 UART: [state] DebugLocked = No
2,855,622 UART: [state] WD Timer not started. Device not locked for debugging
2,856,958 UART: [kat] SHA2-256
3,660,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,637 UART: [kat] ++
3,664,789 UART: [kat] sha1
3,668,969 UART: [kat] SHA2-256
3,670,909 UART: [kat] SHA2-384
3,673,738 UART: [kat] SHA2-512-ACC
3,675,638 UART: [kat] ECC-384
3,685,499 UART: [kat] HMAC-384Kdf
3,690,261 UART: [kat] LMS
3,938,573 UART: [kat] --
3,939,499 UART: [update-reset] ++
5,224,574 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,225,577 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,373,763 >>> mbox cmd response: success
5,373,884 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,898 UART: [update-reset Success] --
5,382,307 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,382,799 UART: [state] Locking Datavault
5,383,473 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,077 UART: [state] Locking ICCM
5,384,643 UART: [exit] Launching FMC @ 0x40000000
5,389,940 UART:
5,389,956 UART: Running Caliptra FMC ...
5,390,364 UART:
5,390,586 UART: [fmc] Received command: 0x10000000
5,392,755 >>> mbox cmd response data (224 bytes)
5,392,756 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,392,785 UART: [fmc] Received command: 0x10000006
5,410,802 >>> mbox cmd response data (1536 bytes)
5,410,803 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,410,831 UART: [fmc] Received command: 0x10000007
5,411,623 >>> mbox cmd response data (4 bytes)
5,411,624 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,411,652 UART: [fmc] Received command: 0x10000006
5,429,669 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,781 >>> mbox cmd response: success
2,647,513 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,620 UART:
2,653,636 UART: Running Caliptra FMC ...
2,654,044 UART:
2,654,274 UART: [fmc] Received command: 0x10000000
2,656,443 >>> mbox cmd response data (224 bytes)
2,656,444 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,656,473 UART: [fmc] Received command: 0x10000006
2,674,490 >>> mbox cmd response data (1536 bytes)
2,674,491 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,674,519 UART: [fmc] Received command: 0x46574C44
5,078,969 >>> mbox cmd response: success
5,086,643 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,092,491 UART:
5,092,507 UART: Running Caliptra FMC ...
5,092,915 UART:
5,093,137 UART: [fmc] Received command: 0x10000000
5,095,306 >>> mbox cmd response data (224 bytes)
5,095,307 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,095,336 UART: [fmc] Received command: 0x10000006
5,113,353 >>> mbox cmd response data (1536 bytes)
5,113,354 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,113,382 UART: [fmc] Received command: 0x10000007
5,114,174 >>> mbox cmd response data (4 bytes)
5,114,175 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,114,203 UART: [fmc] Received command: 0x10000006
5,132,220 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,055 UART: [ldev] --
1,282,491 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 112032 bytes
2,556,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,582,853 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,410 >>> mbox cmd response: success
2,745,447 UART: [afmc] ++
2,745,615 UART: [afmc] CDI.KEYID = 6
2,745,978 UART: [afmc] SUBJECT.KEYID = 7
2,746,404 UART: [afmc] AUTHORITY.KEYID = 5
2,781,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,191 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,804,911 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,810,803 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,816,497 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,824,344 UART: [afmc] --
2,825,336 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,825,358 UART: [cold-reset] --
2,826,438 UART: [state] Locking Datavault
2,827,795 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,399 UART: [state] Locking ICCM
2,828,921 UART: [exit] Launching FMC @ 0x40000000
2,834,218 UART:
2,834,234 UART: Running Caliptra FMC ...
2,834,642 UART:
2,834,872 UART: [fmc] Received command: 0x10000000
2,837,041 >>> mbox cmd response data (224 bytes)
2,837,042 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,837,071 UART: [fmc] Received command: 0x10000006
2,855,088 >>> mbox cmd response data (1536 bytes)
2,855,089 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,855,117 UART: [fmc] Received command: 0x46574C44
2,855,943 UART:
2,855,959 UART: Running Caliptra ROM ...
2,856,367 UART:
2,856,509 UART: [state] CFI Enabled
2,859,209 UART: [state] LifecycleState = Unprovisioned
2,859,864 UART: [state] DebugLocked = No
2,860,396 UART: [state] WD Timer not started. Device not locked for debugging
2,861,556 UART: [kat] SHA2-256
3,665,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,669,235 UART: [kat] ++
3,669,387 UART: [kat] sha1
3,673,599 UART: [kat] SHA2-256
3,675,539 UART: [kat] SHA2-384
3,678,228 UART: [kat] SHA2-512-ACC
3,680,128 UART: [kat] ECC-384
3,690,049 UART: [kat] HMAC-384Kdf
3,694,509 UART: [kat] LMS
3,942,821 UART: [kat] --
3,943,783 UART: [update-reset] ++
5,228,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,229,913 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,378,099 >>> mbox cmd response: success
5,378,282 UART: [update-reset] Copying MAN_2 To MAN_1
5,386,296 UART: [update-reset Success] --
5,386,705 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,387,297 UART: [state] Locking Datavault
5,388,251 UART: [state] Locking PCR0, PCR1 and PCR31
5,388,855 UART: [state] Locking ICCM
5,389,321 UART: [exit] Launching FMC @ 0x40000000
5,394,618 UART:
5,394,634 UART: Running Caliptra FMC ...
5,395,042 UART:
5,395,264 UART: [fmc] Received command: 0x10000000
5,397,433 >>> mbox cmd response data (224 bytes)
5,397,434 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,397,463 UART: [fmc] Received command: 0x10000006
5,415,480 >>> mbox cmd response data (1536 bytes)
5,415,481 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,415,509 UART: [fmc] Received command: 0x10000007
5,416,301 >>> mbox cmd response data (4 bytes)
5,416,302 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,416,330 UART: [fmc] Received command: 0x10000006
5,434,347 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,242 >>> mbox cmd response: success
2,649,814 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,655,619 UART:
2,655,635 UART: Running Caliptra FMC ...
2,656,043 UART:
2,656,273 UART: [fmc] Received command: 0x10000000
2,658,442 >>> mbox cmd response data (224 bytes)
2,658,443 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,658,472 UART: [fmc] Received command: 0x10000006
2,676,489 >>> mbox cmd response data (1536 bytes)
2,676,490 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,676,518 UART: [fmc] Received command: 0x46574C44
5,081,301 >>> mbox cmd response: success
5,088,943 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,094,533 UART:
5,094,549 UART: Running Caliptra FMC ...
5,094,957 UART:
5,095,179 UART: [fmc] Received command: 0x10000000
5,097,348 >>> mbox cmd response data (224 bytes)
5,097,349 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,097,378 UART: [fmc] Received command: 0x10000006
5,115,395 >>> mbox cmd response data (1536 bytes)
5,115,396 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,115,424 UART: [fmc] Received command: 0x10000007
5,116,216 >>> mbox cmd response data (4 bytes)
5,116,217 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,116,245 UART: [fmc] Received command: 0x10000006
5,134,262 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,429 UART: [kat] SHA2-256
901,369 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,314 UART: [kat] HMAC-384Kdf
919,916 UART: [kat] LMS
1,168,228 UART: [kat] --
1,169,217 UART: [cold-reset] ++
1,169,645 UART: [fht] FHT @ 0x50003400
1,172,335 UART: [idev] ++
1,172,503 UART: [idev] CDI.KEYID = 6
1,172,864 UART: [idev] SUBJECT.KEYID = 7
1,173,289 UART: [idev] UDS.KEYID = 0
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,197,955 UART: [idev] Sha1 KeyId Algorithm
1,206,885 UART: [idev] --
1,207,944 UART: [ldev] ++
1,208,112 UART: [ldev] CDI.KEYID = 6
1,208,476 UART: [ldev] SUBJECT.KEYID = 5
1,208,903 UART: [ldev] AUTHORITY.KEYID = 7
1,209,366 UART: [ldev] FE.KEYID = 1
1,214,402 UART: [ldev] Erasing FE.KEYID = 1
1,241,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,281,163 UART: [fwproc] Recv command 0x46574c44
1,281,896 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,020 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,725 >>> mbox cmd response: success
2,742,914 UART: [afmc] ++
2,743,082 UART: [afmc] CDI.KEYID = 6
2,743,445 UART: [afmc] SUBJECT.KEYID = 7
2,743,871 UART: [afmc] AUTHORITY.KEYID = 5
2,778,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,406 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,126 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,018 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,712 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,357 UART: [afmc] --
2,822,457 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,479 UART: [cold-reset] --
2,823,445 UART: [state] Locking Datavault
2,824,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,180 UART: [state] Locking ICCM
2,825,626 UART: [exit] Launching FMC @ 0x40000000
2,830,923 UART:
2,830,939 UART: Running Caliptra FMC ...
2,831,347 UART:
2,831,577 UART: [fmc] Received command: 0x10000000
2,833,746 >>> mbox cmd response data (224 bytes)
2,833,747 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,776 UART: [fmc] Received command: 0x10000006
2,851,793 >>> mbox cmd response data (1536 bytes)
2,851,794 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,851,822 UART: [fmc] Received command: 0x46574C44
2,852,648 UART:
2,852,664 UART: Running Caliptra ROM ...
2,853,072 UART:
2,853,127 UART: [state] CFI Enabled
2,855,793 UART: [state] LifecycleState = Unprovisioned
2,856,448 UART: [state] DebugLocked = No
2,857,140 UART: [state] WD Timer not started. Device not locked for debugging
2,858,252 UART: [kat] SHA2-256
3,661,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,931 UART: [kat] ++
3,666,083 UART: [kat] sha1
3,670,125 UART: [kat] SHA2-256
3,672,065 UART: [kat] SHA2-384
3,674,980 UART: [kat] SHA2-512-ACC
3,676,880 UART: [kat] ECC-384
3,686,451 UART: [kat] HMAC-384Kdf
3,690,975 UART: [kat] LMS
3,939,287 UART: [kat] --
3,940,169 UART: [update-reset] ++
5,224,974 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,255 >>> mbox cmd response: success
5,374,376 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,390 UART: [update-reset Success] --
5,382,799 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,383,433 UART: [state] Locking Datavault
5,384,289 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,893 UART: [state] Locking ICCM
5,385,373 UART: [exit] Launching FMC @ 0x40000000
5,390,670 UART:
5,390,686 UART: Running Caliptra FMC ...
5,391,094 UART:
5,391,316 UART: [fmc] Received command: 0x10000000
5,393,485 >>> mbox cmd response data (224 bytes)
5,393,486 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,393,515 UART: [fmc] Received command: 0x10000006
5,411,532 >>> mbox cmd response data (1536 bytes)
5,411,533 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,411,561 UART: [fmc] Received command: 0x10000007
5,412,353 >>> mbox cmd response data (4 bytes)
5,412,354 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,412,382 UART: [fmc] Received command: 0x10000006
5,430,399 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,287 >>> mbox cmd response: success
2,645,915 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,960 UART:
2,651,976 UART: Running Caliptra FMC ...
2,652,384 UART:
2,652,614 UART: [fmc] Received command: 0x10000000
2,654,783 >>> mbox cmd response data (224 bytes)
2,654,784 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,813 UART: [fmc] Received command: 0x10000006
2,672,830 >>> mbox cmd response data (1536 bytes)
2,672,831 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,672,859 UART: [fmc] Received command: 0x46574C44
5,077,327 >>> mbox cmd response: success
5,084,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,633 UART:
5,090,649 UART: Running Caliptra FMC ...
5,091,057 UART:
5,091,279 UART: [fmc] Received command: 0x10000000
5,093,448 >>> mbox cmd response data (224 bytes)
5,093,449 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,093,478 UART: [fmc] Received command: 0x10000006
5,111,495 >>> mbox cmd response data (1536 bytes)
5,111,496 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,111,524 UART: [fmc] Received command: 0x10000007
5,112,316 >>> mbox cmd response data (4 bytes)
5,112,317 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,112,345 UART: [fmc] Received command: 0x10000006
5,130,362 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,185 UART: [kat] SHA2-512-ACC
906,086 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,557 UART: [kat] LMS
1,168,869 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,651 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,977 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,680 >>> mbox cmd response: success
2,744,863 UART: [afmc] ++
2,745,031 UART: [afmc] CDI.KEYID = 6
2,745,394 UART: [afmc] SUBJECT.KEYID = 7
2,745,820 UART: [afmc] AUTHORITY.KEYID = 5
2,781,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,215 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,803,935 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,809,827 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,815,521 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,823,424 UART: [afmc] --
2,824,296 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,318 UART: [cold-reset] --
2,824,934 UART: [state] Locking Datavault
2,825,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,503 UART: [state] Locking ICCM
2,827,095 UART: [exit] Launching FMC @ 0x40000000
2,832,392 UART:
2,832,408 UART: Running Caliptra FMC ...
2,832,816 UART:
2,833,046 UART: [fmc] Received command: 0x10000000
2,835,215 >>> mbox cmd response data (224 bytes)
2,835,216 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,835,245 UART: [fmc] Received command: 0x10000006
2,853,262 >>> mbox cmd response data (1536 bytes)
2,853,263 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,853,291 UART: [fmc] Received command: 0x46574C44
2,854,117 UART:
2,854,133 UART: Running Caliptra ROM ...
2,854,541 UART:
2,854,683 UART: [state] CFI Enabled
2,857,593 UART: [state] LifecycleState = Unprovisioned
2,858,248 UART: [state] DebugLocked = No
2,858,804 UART: [state] WD Timer not started. Device not locked for debugging
2,860,156 UART: [kat] SHA2-256
3,663,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,835 UART: [kat] ++
3,667,987 UART: [kat] sha1
3,672,439 UART: [kat] SHA2-256
3,674,379 UART: [kat] SHA2-384
3,677,274 UART: [kat] SHA2-512-ACC
3,679,174 UART: [kat] ECC-384
3,688,841 UART: [kat] HMAC-384Kdf
3,693,475 UART: [kat] LMS
3,941,787 UART: [kat] --
3,942,693 UART: [update-reset] ++
5,227,076 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,228,285 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,471 >>> mbox cmd response: success
5,376,696 UART: [update-reset] Copying MAN_2 To MAN_1
5,384,710 UART: [update-reset Success] --
5,385,119 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,385,755 UART: [state] Locking Datavault
5,386,361 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,965 UART: [state] Locking ICCM
5,387,399 UART: [exit] Launching FMC @ 0x40000000
5,392,696 UART:
5,392,712 UART: Running Caliptra FMC ...
5,393,120 UART:
5,393,342 UART: [fmc] Received command: 0x10000000
5,395,511 >>> mbox cmd response data (224 bytes)
5,395,512 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,395,541 UART: [fmc] Received command: 0x10000006
5,413,558 >>> mbox cmd response data (1536 bytes)
5,413,559 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,413,587 UART: [fmc] Received command: 0x10000007
5,414,379 >>> mbox cmd response data (4 bytes)
5,414,380 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,414,408 UART: [fmc] Received command: 0x10000006
5,432,425 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,595,902 >>> mbox cmd response: success
2,651,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,658,257 UART:
2,658,273 UART: Running Caliptra FMC ...
2,658,681 UART:
2,658,911 UART: [fmc] Received command: 0x10000000
2,661,080 >>> mbox cmd response data (224 bytes)
2,661,081 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,661,110 UART: [fmc] Received command: 0x10000006
2,679,127 >>> mbox cmd response data (1536 bytes)
2,679,128 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,679,156 UART: [fmc] Received command: 0x46574C44
5,084,519 >>> mbox cmd response: success
5,092,155 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,097,681 UART:
5,097,697 UART: Running Caliptra FMC ...
5,098,105 UART:
5,098,327 UART: [fmc] Received command: 0x10000000
5,100,496 >>> mbox cmd response data (224 bytes)
5,100,497 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,100,526 UART: [fmc] Received command: 0x10000006
5,118,543 >>> mbox cmd response data (1536 bytes)
5,118,544 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,118,572 UART: [fmc] Received command: 0x10000007
5,119,364 >>> mbox cmd response data (4 bytes)
5,119,365 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,119,393 UART: [fmc] Received command: 0x10000006
5,137,410 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,056,732 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,197,889 UART:
2,198,297 UART: Running Caliptra ROM ...
2,199,386 UART:
2,199,540 UART: [state] CFI Enabled
2,200,526 UART: [state] LifecycleState = Unprovisioned
2,202,208 UART: [state] DebugLocked = No
2,203,242 UART: [state] WD Timer not started. Device not locked for debugging
2,205,939 UART: [kat] SHA2-256
2,206,615 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,632 UART: [kat] ++
2,210,080 UART: [kat] sha1
2,210,589 UART: [kat] SHA2-256
2,211,246 UART: [kat] SHA2-384
2,211,900 UART: [kat] SHA2-512-ACC
2,212,728 UART: [kat] ECC-384
3,778,791 UART: [kat] HMAC-384Kdf
3,803,937 UART: [kat] LMS
4,877,137 UART: [kat] --
4,879,796 UART: [cold-reset] ++
4,882,001 UART: [fht] FHT @ 0x50003400
4,893,309 UART: [idev] ++
4,894,010 UART: [idev] CDI.KEYID = 6
4,895,116 UART: [idev] SUBJECT.KEYID = 7
4,896,327 UART: [idev] UDS.KEYID = 0
4,931,606 UART: [idev] Erasing UDS.KEYID = 0
8,244,939 UART: [idev] Sha1 KeyId Algorithm
8,265,602 UART: [idev] --
8,269,174 UART: [ldev] ++
8,269,798 UART: [ldev] CDI.KEYID = 6
8,270,979 UART: [ldev] SUBJECT.KEYID = 5
8,272,136 UART: [ldev] AUTHORITY.KEYID = 7
8,273,365 UART: [ldev] FE.KEYID = 1
8,318,952 UART: [ldev] Erasing FE.KEYID = 1
11,652,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,444 UART: [ldev] --
14,037,899 UART: [fwproc] Wait for Commands...
14,039,671 UART: [fwproc] Recv command 0x46574c44
14,041,928 UART: [fwproc] Recv'd Img size: 111688 bytes
18,075,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,148,528 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,208,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,526,064 >>> mbox cmd response: success
18,530,141 UART: [afmc] ++
18,530,726 UART: [afmc] CDI.KEYID = 6
18,531,913 UART: [afmc] SUBJECT.KEYID = 7
18,533,013 UART: [afmc] AUTHORITY.KEYID = 5
21,901,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,202,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,204,763 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,220,841 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,236,890 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,252,824 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,276,433 UART: [afmc] --
24,279,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,280,303 UART: [cold-reset] --
24,284,047 UART: [state] Locking Datavault
24,291,296 UART: [state] Locking PCR0, PCR1 and PCR31
24,292,950 UART: [state] Locking ICCM
24,294,235 UART: [exit] Launching FMC @ 0x40000000
24,302,846 UART:
24,303,074 UART: Running Caliptra FMC ...
24,304,176 UART:
24,304,350 UART: [fmc] Received command: 0x10000000
24,306,783 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,058,774 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,323,784 >>> mbox cmd response: success
23,995,935 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,011,031 UART:
24,011,385 UART: Running Caliptra FMC ...
24,012,498 UART:
24,012,650 UART: [fmc] Received command: 0x10000000
24,015,025 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,062,721 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,204,147 UART:
2,204,608 UART: Running Caliptra ROM ...
2,205,687 UART:
2,205,840 UART: [state] CFI Enabled
2,206,711 UART: [state] LifecycleState = Unprovisioned
2,208,363 UART: [state] DebugLocked = No
2,209,383 UART: [state] WD Timer not started. Device not locked for debugging
2,211,850 UART: [kat] SHA2-256
2,212,508 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,520 UART: [kat] ++
2,215,965 UART: [kat] sha1
2,216,465 UART: [kat] SHA2-256
2,217,136 UART: [kat] SHA2-384
2,217,792 UART: [kat] SHA2-512-ACC
2,218,672 UART: [kat] ECC-384
4,092,066 UART: [kat] HMAC-384Kdf
4,104,272 UART: [kat] LMS
5,177,419 UART: [kat] --
5,182,956 UART: [cold-reset] ++
5,184,622 UART: [fht] FHT @ 0x50003400
5,195,492 UART: [idev] ++
5,196,174 UART: [idev] CDI.KEYID = 6
5,197,405 UART: [idev] SUBJECT.KEYID = 7
5,198,831 UART: [idev] UDS.KEYID = 0
5,219,123 UART: [idev] Erasing UDS.KEYID = 0
8,488,129 UART: [idev] Sha1 KeyId Algorithm
8,509,248 UART: [idev] --
8,513,726 UART: [ldev] ++
8,514,309 UART: [ldev] CDI.KEYID = 6
8,515,490 UART: [ldev] SUBJECT.KEYID = 5
8,516,973 UART: [ldev] AUTHORITY.KEYID = 7
8,518,523 UART: [ldev] FE.KEYID = 1
8,529,065 UART: [ldev] Erasing FE.KEYID = 1
11,816,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,178,516 UART: [ldev] --
14,182,428 UART: [fwproc] Wait for Commands...
14,185,542 UART: [fwproc] Recv command 0x46574c44
14,187,798 UART: [fwproc] Recv'd Img size: 111688 bytes
18,226,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,303,994 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,364,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,680,737 >>> mbox cmd response: success
18,685,281 UART: [afmc] ++
18,685,874 UART: [afmc] CDI.KEYID = 6
18,687,061 UART: [afmc] SUBJECT.KEYID = 7
18,688,217 UART: [afmc] AUTHORITY.KEYID = 5
22,006,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,302,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,304,397 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,320,478 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,336,497 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,352,455 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,374,674 UART: [afmc] --
24,377,905 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,378,277 UART: [cold-reset] --
24,382,389 UART: [state] Locking Datavault
24,389,388 UART: [state] Locking PCR0, PCR1 and PCR31
24,391,026 UART: [state] Locking ICCM
24,393,534 UART: [exit] Launching FMC @ 0x40000000
24,402,137 UART:
24,402,362 UART: Running Caliptra FMC ...
24,403,456 UART:
24,403,607 UART: [fmc] Received command: 0x10000000
24,406,102 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,062,793 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,483,755 >>> mbox cmd response: success
24,101,278 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,115,533 UART:
24,115,869 UART: Running Caliptra FMC ...
24,116,962 UART:
24,117,104 UART: [fmc] Received command: 0x10000000
24,119,488 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,072,396 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,214,305 UART:
2,214,726 UART: Running Caliptra ROM ...
2,215,908 UART:
2,216,077 UART: [state] CFI Enabled
2,217,067 UART: [state] LifecycleState = Unprovisioned
2,218,719 UART: [state] DebugLocked = No
2,219,828 UART: [state] WD Timer not started. Device not locked for debugging
2,222,303 UART: [kat] SHA2-256
2,222,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,225,983 UART: [kat] ++
2,226,433 UART: [kat] sha1
2,226,946 UART: [kat] SHA2-256
2,227,687 UART: [kat] SHA2-384
2,228,353 UART: [kat] SHA2-512-ACC
2,229,203 UART: [kat] ECC-384
2,946,406 UART: [kat] HMAC-384Kdf
2,971,221 UART: [kat] LMS
3,500,679 UART: [kat] --
3,504,665 UART: [cold-reset] ++
3,506,926 UART: [fht] FHT @ 0x50003400
3,518,009 UART: [idev] ++
3,518,578 UART: [idev] CDI.KEYID = 6
3,519,487 UART: [idev] SUBJECT.KEYID = 7
3,520,706 UART: [idev] UDS.KEYID = 0
3,543,056 UART: [idev] Erasing UDS.KEYID = 0
6,025,695 UART: [idev] Sha1 KeyId Algorithm
6,048,719 UART: [idev] --
6,053,244 UART: [ldev] ++
6,053,825 UART: [ldev] CDI.KEYID = 6
6,054,737 UART: [ldev] SUBJECT.KEYID = 5
6,055,905 UART: [ldev] AUTHORITY.KEYID = 7
6,057,141 UART: [ldev] FE.KEYID = 1
6,100,268 UART: [ldev] Erasing FE.KEYID = 1
8,604,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,111 UART: [ldev] --
10,412,999 UART: [fwproc] Wait for Commands...
10,415,311 UART: [fwproc] Recv command 0x46574c44
10,417,411 UART: [fwproc] Recv'd Img size: 112032 bytes
13,792,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,867,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,245,709 >>> mbox cmd response: success
14,249,666 UART: [afmc] ++
14,250,258 UART: [afmc] CDI.KEYID = 6
14,251,189 UART: [afmc] SUBJECT.KEYID = 7
14,252,353 UART: [afmc] AUTHORITY.KEYID = 5
16,785,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,222 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,524,232 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,540,172 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,555,932 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,578,852 UART: [afmc] --
18,581,865 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,582,231 UART: [cold-reset] --
18,585,803 UART: [state] Locking Datavault
18,592,455 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,192 UART: [state] Locking ICCM
18,596,516 UART: [exit] Launching FMC @ 0x40000000
18,604,927 UART:
18,605,183 UART: Running Caliptra FMC ...
18,606,289 UART:
18,606,444 UART: [fmc] Received command: 0x10000000
18,608,878 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,058,899 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,025,023 >>> mbox cmd response: success
18,308,883 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,323,302 UART:
18,323,670 UART: Running Caliptra FMC ...
18,324,849 UART:
18,325,022 UART: [fmc] Received command: 0x10000000
18,327,360 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,061,052 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,202,800 UART:
2,203,355 UART: Running Caliptra ROM ...
2,204,434 UART:
2,204,601 UART: [state] CFI Enabled
2,205,580 UART: [state] LifecycleState = Unprovisioned
2,207,243 UART: [state] DebugLocked = No
2,208,276 UART: [state] WD Timer not started. Device not locked for debugging
2,210,745 UART: [kat] SHA2-256
2,211,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,437 UART: [kat] ++
2,214,890 UART: [kat] sha1
2,215,407 UART: [kat] SHA2-256
2,216,184 UART: [kat] SHA2-384
2,216,851 UART: [kat] SHA2-512-ACC
2,217,679 UART: [kat] ECC-384
3,282,805 UART: [kat] HMAC-384Kdf
3,297,023 UART: [kat] LMS
3,826,557 UART: [kat] --
3,829,320 UART: [cold-reset] ++
3,830,984 UART: [fht] FHT @ 0x50003400
3,841,377 UART: [idev] ++
3,841,938 UART: [idev] CDI.KEYID = 6
3,842,844 UART: [idev] SUBJECT.KEYID = 7
3,844,062 UART: [idev] UDS.KEYID = 0
3,858,373 UART: [idev] Erasing UDS.KEYID = 0
6,316,629 UART: [idev] Sha1 KeyId Algorithm
6,338,227 UART: [idev] --
6,342,846 UART: [ldev] ++
6,343,441 UART: [ldev] CDI.KEYID = 6
6,344,326 UART: [ldev] SUBJECT.KEYID = 5
6,345,480 UART: [ldev] AUTHORITY.KEYID = 7
6,346,766 UART: [ldev] FE.KEYID = 1
6,356,176 UART: [ldev] Erasing FE.KEYID = 1
8,831,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,517 UART: [ldev] --
10,621,508 UART: [fwproc] Wait for Commands...
10,623,442 UART: [fwproc] Recv command 0x46574c44
10,625,547 UART: [fwproc] Recv'd Img size: 112032 bytes
13,996,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,067,260 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,127,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,445,721 >>> mbox cmd response: success
14,449,342 UART: [afmc] ++
14,449,938 UART: [afmc] CDI.KEYID = 6
14,450,848 UART: [afmc] SUBJECT.KEYID = 7
14,452,063 UART: [afmc] AUTHORITY.KEYID = 5
16,950,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,670,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,836 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,688,778 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,704,769 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,720,476 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,743,383 UART: [afmc] --
18,747,274 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,747,637 UART: [cold-reset] --
18,751,857 UART: [state] Locking Datavault
18,756,316 UART: [state] Locking PCR0, PCR1 and PCR31
18,758,018 UART: [state] Locking ICCM
18,760,225 UART: [exit] Launching FMC @ 0x40000000
18,768,626 UART:
18,768,860 UART: Running Caliptra FMC ...
18,769,962 UART:
18,770,115 UART: [fmc] Received command: 0x10000000
18,772,548 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,068,200 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,234,924 >>> mbox cmd response: success
18,466,530 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,481,208 UART:
18,481,553 UART: Running Caliptra FMC ...
18,482,727 UART:
18,482,889 UART: [fmc] Received command: 0x10000000
18,485,198 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,057,949 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,199,805 UART:
2,200,216 UART: Running Caliptra ROM ...
2,201,337 UART:
2,201,503 UART: [state] CFI Enabled
2,202,489 UART: [state] LifecycleState = Unprovisioned
2,204,155 UART: [state] DebugLocked = No
2,205,185 UART: [state] WD Timer not started. Device not locked for debugging
2,207,656 UART: [kat] SHA2-256
2,208,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,339 UART: [kat] ++
2,211,810 UART: [kat] sha1
2,212,328 UART: [kat] SHA2-256
2,212,981 UART: [kat] SHA2-384
2,213,635 UART: [kat] SHA2-512-ACC
2,214,471 UART: [kat] ECC-384
2,950,027 UART: [kat] HMAC-384Kdf
2,970,889 UART: [kat] LMS
3,500,348 UART: [kat] --
3,505,956 UART: [cold-reset] ++
3,508,149 UART: [fht] FHT @ 0x50003400
3,520,472 UART: [idev] ++
3,521,031 UART: [idev] CDI.KEYID = 6
3,521,971 UART: [idev] SUBJECT.KEYID = 7
3,523,181 UART: [idev] UDS.KEYID = 0
3,544,096 UART: [idev] Erasing UDS.KEYID = 0
6,027,312 UART: [idev] Sha1 KeyId Algorithm
6,048,725 UART: [idev] --
6,053,697 UART: [ldev] ++
6,054,267 UART: [ldev] CDI.KEYID = 6
6,055,147 UART: [ldev] SUBJECT.KEYID = 5
6,056,362 UART: [ldev] AUTHORITY.KEYID = 7
6,057,599 UART: [ldev] FE.KEYID = 1
6,099,229 UART: [ldev] Erasing FE.KEYID = 1
8,600,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,678 UART: [ldev] --
10,411,969 UART: [fwproc] Wait for Commands...
10,415,149 UART: [fwproc] Recv command 0x46574c44
10,417,294 UART: [fwproc] Recv'd Img size: 112032 bytes
13,790,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,863,063 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,923,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,241,448 >>> mbox cmd response: success
14,246,304 UART: [afmc] ++
14,246,895 UART: [afmc] CDI.KEYID = 6
14,247,773 UART: [afmc] SUBJECT.KEYID = 7
14,248,985 UART: [afmc] AUTHORITY.KEYID = 5
16,787,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,065 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,548,051 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,564,030 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,579,783 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,601,865 UART: [afmc] --
18,606,075 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,606,460 UART: [cold-reset] --
18,608,300 UART: [state] Locking Datavault
18,614,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,683 UART: [state] Locking ICCM
18,618,375 UART: [exit] Launching FMC @ 0x40000000
18,626,776 UART:
18,627,026 UART: Running Caliptra FMC ...
18,628,135 UART:
18,628,287 UART: [fmc] Received command: 0x10000000
18,630,694 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,070,813 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,051,113 >>> mbox cmd response: success
18,325,513 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,339,881 UART:
18,340,240 UART: Running Caliptra FMC ...
18,341,423 UART:
18,341,590 UART: [fmc] Received command: 0x10000000
18,343,878 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,060,688 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,202,438 UART:
2,202,848 UART: Running Caliptra ROM ...
2,204,025 UART:
2,204,197 UART: [state] CFI Enabled
2,205,175 UART: [state] LifecycleState = Unprovisioned
2,206,821 UART: [state] DebugLocked = No
2,207,928 UART: [state] WD Timer not started. Device not locked for debugging
2,210,406 UART: [kat] SHA2-256
2,211,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,107 UART: [kat] ++
2,214,558 UART: [kat] sha1
2,215,152 UART: [kat] SHA2-256
2,215,815 UART: [kat] SHA2-384
2,216,474 UART: [kat] SHA2-512-ACC
2,217,355 UART: [kat] ECC-384
3,281,219 UART: [kat] HMAC-384Kdf
3,294,743 UART: [kat] LMS
3,824,207 UART: [kat] --
3,827,981 UART: [cold-reset] ++
3,829,206 UART: [fht] FHT @ 0x50003400
3,840,236 UART: [idev] ++
3,840,796 UART: [idev] CDI.KEYID = 6
3,841,731 UART: [idev] SUBJECT.KEYID = 7
3,842,939 UART: [idev] UDS.KEYID = 0
3,856,838 UART: [idev] Erasing UDS.KEYID = 0
6,312,404 UART: [idev] Sha1 KeyId Algorithm
6,336,003 UART: [idev] --
6,339,303 UART: [ldev] ++
6,339,869 UART: [ldev] CDI.KEYID = 6
6,340,882 UART: [ldev] SUBJECT.KEYID = 5
6,341,982 UART: [ldev] AUTHORITY.KEYID = 7
6,343,211 UART: [ldev] FE.KEYID = 1
6,354,619 UART: [ldev] Erasing FE.KEYID = 1
8,831,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,360 UART: [ldev] --
10,618,761 UART: [fwproc] Wait for Commands...
10,621,251 UART: [fwproc] Recv command 0x46574c44
10,623,290 UART: [fwproc] Recv'd Img size: 112032 bytes
13,989,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,059,501 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,119,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,438,883 >>> mbox cmd response: success
14,442,951 UART: [afmc] ++
14,443,540 UART: [afmc] CDI.KEYID = 6
14,444,447 UART: [afmc] SUBJECT.KEYID = 7
14,445,607 UART: [afmc] AUTHORITY.KEYID = 5
16,946,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,668,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,670,259 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,686,184 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,702,196 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,717,934 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,739,646 UART: [afmc] --
18,743,562 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,743,928 UART: [cold-reset] --
18,747,128 UART: [state] Locking Datavault
18,752,684 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,340 UART: [state] Locking ICCM
18,756,546 UART: [exit] Launching FMC @ 0x40000000
18,764,886 UART:
18,765,117 UART: Running Caliptra FMC ...
18,766,210 UART:
18,766,367 UART: [fmc] Received command: 0x10000000
18,768,828 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,061,706 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,217,004 >>> mbox cmd response: success
18,449,587 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,463,412 UART:
18,463,783 UART: Running Caliptra FMC ...
18,464,944 UART:
18,465,113 UART: [fmc] Received command: 0x10000000
18,467,467 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,146 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,917 >>> mbox cmd response: success
2,743,114 UART: [afmc] ++
2,743,282 UART: [afmc] CDI.KEYID = 6
2,743,645 UART: [afmc] SUBJECT.KEYID = 7
2,744,071 UART: [afmc] AUTHORITY.KEYID = 5
2,779,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,207 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,802,913 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,808,800 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,519 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,822,399 UART: [afmc] --
2,823,423 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,445 UART: [cold-reset] --
2,824,465 UART: [state] Locking Datavault
2,825,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,196 UART: [state] Locking ICCM
2,826,846 UART: [exit] Launching FMC @ 0x40000000
2,832,143 UART:
2,832,159 UART: Running Caliptra FMC ...
2,832,567 UART:
2,832,797 UART: [fmc] Received command: 0x10000000
2,834,966 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,933 >>> mbox cmd response: success
2,647,176 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,031 UART:
2,653,047 UART: Running Caliptra FMC ...
2,653,455 UART:
2,653,685 UART: [fmc] Received command: 0x10000000
2,655,854 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,120 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,536 UART: [kat] SHA2-256
902,476 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,764 UART: [cold-reset] ++
1,171,156 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,182,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,514 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,613 UART: [ldev] ++
1,210,781 UART: [ldev] CDI.KEYID = 6
1,211,145 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,043 UART: [ldev] Erasing FE.KEYID = 1
1,243,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,582,569 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,180 >>> mbox cmd response: success
2,745,203 UART: [afmc] ++
2,745,371 UART: [afmc] CDI.KEYID = 6
2,745,734 UART: [afmc] SUBJECT.KEYID = 7
2,746,160 UART: [afmc] AUTHORITY.KEYID = 5
2,780,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,872 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,803,578 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,809,465 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,815,184 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,823,234 UART: [afmc] --
2,824,342 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,364 UART: [cold-reset] --
2,825,080 UART: [state] Locking Datavault
2,826,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,745 UART: [state] Locking ICCM
2,827,367 UART: [exit] Launching FMC @ 0x40000000
2,832,664 UART:
2,832,680 UART: Running Caliptra FMC ...
2,833,088 UART:
2,833,318 UART: [fmc] Received command: 0x10000000
2,835,487 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,356 >>> mbox cmd response: success
2,648,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,816 UART:
2,654,832 UART: Running Caliptra FMC ...
2,655,240 UART:
2,655,470 UART: [fmc] Received command: 0x10000000
2,657,639 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
915,592 UART: [kat] HMAC-384Kdf
920,104 UART: [kat] LMS
1,168,416 UART: [kat] --
1,169,213 UART: [cold-reset] ++
1,169,767 UART: [fht] FHT @ 0x50003400
1,172,409 UART: [idev] ++
1,172,577 UART: [idev] CDI.KEYID = 6
1,172,938 UART: [idev] SUBJECT.KEYID = 7
1,173,363 UART: [idev] UDS.KEYID = 0
1,180,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,151 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,409 UART: [fwproc] Recv command 0x46574c44
1,282,142 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,064 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,627 >>> mbox cmd response: success
2,741,676 UART: [afmc] ++
2,741,844 UART: [afmc] CDI.KEYID = 6
2,742,207 UART: [afmc] SUBJECT.KEYID = 7
2,742,633 UART: [afmc] AUTHORITY.KEYID = 5
2,777,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,857 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,563 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,450 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,169 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,923 UART: [afmc] --
2,820,919 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,941 UART: [cold-reset] --
2,821,875 UART: [state] Locking Datavault
2,822,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,480 UART: [state] Locking ICCM
2,824,002 UART: [exit] Launching FMC @ 0x40000000
2,829,299 UART:
2,829,315 UART: Running Caliptra FMC ...
2,829,723 UART:
2,829,953 UART: [fmc] Received command: 0x10000000
2,832,122 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,191 >>> mbox cmd response: success
2,647,924 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,941 UART:
2,653,957 UART: Running Caliptra FMC ...
2,654,365 UART:
2,654,595 UART: [fmc] Received command: 0x10000000
2,656,764 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,632 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,896 UART: [idev] ++
1,174,064 UART: [idev] CDI.KEYID = 6
1,174,425 UART: [idev] SUBJECT.KEYID = 7
1,174,850 UART: [idev] UDS.KEYID = 0
1,182,896 UART: [idev] Erasing UDS.KEYID = 0
1,200,132 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,582,105 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,690 >>> mbox cmd response: success
2,744,789 UART: [afmc] ++
2,744,957 UART: [afmc] CDI.KEYID = 6
2,745,320 UART: [afmc] SUBJECT.KEYID = 7
2,745,746 UART: [afmc] AUTHORITY.KEYID = 5
2,781,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,378 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,804,084 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,809,971 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,815,690 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,823,542 UART: [afmc] --
2,824,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,566 UART: [cold-reset] --
2,825,266 UART: [state] Locking Datavault
2,826,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,195 UART: [state] Locking ICCM
2,827,675 UART: [exit] Launching FMC @ 0x40000000
2,832,972 UART:
2,832,988 UART: Running Caliptra FMC ...
2,833,396 UART:
2,833,626 UART: [fmc] Received command: 0x10000000
2,835,795 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,186 >>> mbox cmd response: success
2,649,189 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,655,244 UART:
2,655,260 UART: Running Caliptra FMC ...
2,655,668 UART:
2,655,898 UART: [fmc] Received command: 0x10000000
2,658,067 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,240,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,818 UART: [ldev] --
1,280,196 UART: [fwproc] Wait for Commands...
1,280,935 UART: [fwproc] Recv command 0x46574c44
1,281,668 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,886 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,739,625 >>> mbox cmd response: success
2,740,750 UART: [afmc] ++
2,740,918 UART: [afmc] CDI.KEYID = 6
2,741,281 UART: [afmc] SUBJECT.KEYID = 7
2,741,707 UART: [afmc] AUTHORITY.KEYID = 5
2,776,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,325 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,031 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,805,918 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,637 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,369 UART: [afmc] --
2,820,303 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,325 UART: [cold-reset] --
2,821,123 UART: [state] Locking Datavault
2,822,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,690 UART: [state] Locking ICCM
2,823,266 UART: [exit] Launching FMC @ 0x40000000
2,828,563 UART:
2,828,579 UART: Running Caliptra FMC ...
2,828,987 UART:
2,829,217 UART: [fmc] Received command: 0x10000000
2,831,386 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,305 >>> mbox cmd response: success
2,648,520 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,669 UART:
2,654,685 UART: Running Caliptra FMC ...
2,655,093 UART:
2,655,323 UART: [fmc] Received command: 0x10000000
2,657,492 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
891,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,900 UART: [kat] ++
896,052 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,182,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,242,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,121 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,131 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,720 >>> mbox cmd response: success
2,743,759 UART: [afmc] ++
2,743,927 UART: [afmc] CDI.KEYID = 6
2,744,290 UART: [afmc] SUBJECT.KEYID = 7
2,744,716 UART: [afmc] AUTHORITY.KEYID = 5
2,780,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,068 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,802,774 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,808,661 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,380 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,822,204 UART: [afmc] --
2,823,216 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,238 UART: [cold-reset] --
2,823,936 UART: [state] Locking Datavault
2,825,159 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,763 UART: [state] Locking ICCM
2,826,267 UART: [exit] Launching FMC @ 0x40000000
2,831,564 UART:
2,831,580 UART: Running Caliptra FMC ...
2,831,988 UART:
2,832,218 UART: [fmc] Received command: 0x10000000
2,834,387 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,019 >>> mbox cmd response: success
2,648,288 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,393 UART:
2,654,409 UART: Running Caliptra FMC ...
2,654,817 UART:
2,655,047 UART: [fmc] Received command: 0x10000000
2,657,216 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,055,591 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,196,798 UART:
2,197,237 UART: Running Caliptra ROM ...
2,198,370 UART:
2,198,543 UART: [state] CFI Enabled
2,199,517 UART: [state] LifecycleState = Unprovisioned
2,201,158 UART: [state] DebugLocked = No
2,202,263 UART: [state] WD Timer not started. Device not locked for debugging
2,204,953 UART: [kat] SHA2-256
2,205,639 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,661 UART: [kat] ++
2,209,115 UART: [kat] sha1
2,209,848 UART: [kat] SHA2-256
2,210,542 UART: [kat] SHA2-384
2,211,204 UART: [kat] SHA2-512-ACC
2,212,004 UART: [kat] ECC-384
3,779,011 UART: [kat] HMAC-384Kdf
3,803,854 UART: [kat] LMS
4,877,006 UART: [kat] --
4,881,383 UART: [cold-reset] ++
4,883,586 UART: [fht] FHT @ 0x50003400
4,894,033 UART: [idev] ++
4,894,705 UART: [idev] CDI.KEYID = 6
4,895,939 UART: [idev] SUBJECT.KEYID = 7
4,897,047 UART: [idev] UDS.KEYID = 0
4,932,413 UART: [idev] Erasing UDS.KEYID = 0
8,242,273 UART: [idev] Sha1 KeyId Algorithm
8,264,259 UART: [idev] --
8,269,494 UART: [ldev] ++
8,270,064 UART: [ldev] CDI.KEYID = 6
8,271,241 UART: [ldev] SUBJECT.KEYID = 5
8,272,398 UART: [ldev] AUTHORITY.KEYID = 7
8,273,625 UART: [ldev] FE.KEYID = 1
8,320,002 UART: [ldev] Erasing FE.KEYID = 1
11,658,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,246 UART: [ldev] --
14,038,809 UART: [fwproc] Wait for Commands...
14,041,127 UART: [fwproc] Recv command 0x46574c44
14,043,440 UART: [fwproc] Recv'd Img size: 111688 bytes
22,208,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,287,807 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,348,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,666,085 >>> mbox cmd response: success
22,669,543 UART: [afmc] ++
22,670,243 UART: [afmc] CDI.KEYID = 6
22,671,445 UART: [afmc] SUBJECT.KEYID = 7
22,672,600 UART: [afmc] AUTHORITY.KEYID = 5
26,044,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,346,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,347,957 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,364,127 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,380,253 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,396,209 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,419,443 UART: [afmc] --
28,422,400 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,422,775 UART: [cold-reset] --
28,426,291 UART: [state] Locking Datavault
28,432,191 UART: [state] Locking PCR0, PCR1 and PCR31
28,433,829 UART: [state] Locking ICCM
28,436,202 UART: [exit] Launching FMC @ 0x40000000
28,444,935 UART:
28,445,229 UART: Running Caliptra FMC ...
28,446,338 UART:
28,446,499 UART: [fmc] Received command: 0x10000000
28,448,780 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,059,547 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,405,398 >>> mbox cmd response: success
28,076,162 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,092,894 UART:
28,093,239 UART: Running Caliptra FMC ...
28,094,336 UART:
28,094,488 UART: [fmc] Received command: 0x10000000
28,096,869 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
2,069,286 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,211,267 UART:
2,211,864 UART: Running Caliptra ROM ...
2,212,977 UART:
2,213,126 UART: [state] CFI Enabled
2,214,036 UART: [state] LifecycleState = Unprovisioned
2,215,689 UART: [state] DebugLocked = No
2,216,708 UART: [state] WD Timer not started. Device not locked for debugging
2,219,203 UART: [kat] SHA2-256
2,219,864 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,222,879 UART: [kat] ++
2,223,325 UART: [kat] sha1
2,223,828 UART: [kat] SHA2-256
2,224,558 UART: [kat] SHA2-384
2,225,220 UART: [kat] SHA2-512-ACC
2,226,043 UART: [kat] ECC-384
4,097,037 UART: [kat] HMAC-384Kdf
4,108,991 UART: [kat] LMS
5,182,163 UART: [kat] --
5,186,282 UART: [cold-reset] ++
5,187,731 UART: [fht] FHT @ 0x50003400
5,199,035 UART: [idev] ++
5,199,707 UART: [idev] CDI.KEYID = 6
5,200,869 UART: [idev] SUBJECT.KEYID = 7
5,202,369 UART: [idev] UDS.KEYID = 0
5,218,805 UART: [idev] Erasing UDS.KEYID = 0
8,489,825 UART: [idev] Sha1 KeyId Algorithm
8,510,758 UART: [idev] --
8,514,919 UART: [ldev] ++
8,515,539 UART: [ldev] CDI.KEYID = 6
8,516,716 UART: [ldev] SUBJECT.KEYID = 5
8,518,197 UART: [ldev] AUTHORITY.KEYID = 7
8,519,748 UART: [ldev] FE.KEYID = 1
8,530,340 UART: [ldev] Erasing FE.KEYID = 1
11,823,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,249 UART: [ldev] --
14,189,399 UART: [fwproc] Wait for Commands...
14,191,009 UART: [fwproc] Recv command 0x46574c44
14,193,327 UART: [fwproc] Recv'd Img size: 111688 bytes
22,511,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,589,737 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,650,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,968,294 >>> mbox cmd response: success
22,971,677 UART: [afmc] ++
22,972,376 UART: [afmc] CDI.KEYID = 6
22,973,611 UART: [afmc] SUBJECT.KEYID = 7
22,974,765 UART: [afmc] AUTHORITY.KEYID = 5
26,293,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,589,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,591,574 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,607,809 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,623,899 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,639,828 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,662,918 UART: [afmc] --
28,667,162 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,667,533 UART: [cold-reset] --
28,671,909 UART: [state] Locking Datavault
28,679,207 UART: [state] Locking PCR0, PCR1 and PCR31
28,681,008 UART: [state] Locking ICCM
28,682,742 UART: [exit] Launching FMC @ 0x40000000
28,691,357 UART:
28,691,585 UART: Running Caliptra FMC ...
28,692,677 UART:
28,692,832 UART: [fmc] Received command: 0x10000000
28,695,322 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,063,025 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,522,952 >>> mbox cmd response: success
28,142,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,158,674 UART:
28,159,010 UART: Running Caliptra FMC ...
28,160,109 UART:
28,160,253 UART: [fmc] Received command: 0x10000000
28,162,632 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,055,862 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,197,664 UART:
2,198,103 UART: Running Caliptra ROM ...
2,199,281 UART:
2,199,456 UART: [state] CFI Enabled
2,200,431 UART: [state] LifecycleState = Unprovisioned
2,202,084 UART: [state] DebugLocked = No
2,203,116 UART: [state] WD Timer not started. Device not locked for debugging
2,205,612 UART: [kat] SHA2-256
2,206,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,291 UART: [kat] ++
2,209,756 UART: [kat] sha1
2,210,269 UART: [kat] SHA2-256
2,211,010 UART: [kat] SHA2-384
2,211,680 UART: [kat] SHA2-512-ACC
2,212,566 UART: [kat] ECC-384
2,928,678 UART: [kat] HMAC-384Kdf
2,952,020 UART: [kat] LMS
3,481,452 UART: [kat] --
3,485,684 UART: [cold-reset] ++
3,486,647 UART: [fht] FHT @ 0x50003400
3,498,574 UART: [idev] ++
3,499,142 UART: [idev] CDI.KEYID = 6
3,500,026 UART: [idev] SUBJECT.KEYID = 7
3,501,267 UART: [idev] UDS.KEYID = 0
3,523,855 UART: [idev] Erasing UDS.KEYID = 0
6,007,905 UART: [idev] Sha1 KeyId Algorithm
6,030,604 UART: [idev] --
6,034,658 UART: [ldev] ++
6,035,233 UART: [ldev] CDI.KEYID = 6
6,036,141 UART: [ldev] SUBJECT.KEYID = 5
6,037,306 UART: [ldev] AUTHORITY.KEYID = 7
6,038,544 UART: [ldev] FE.KEYID = 1
6,078,472 UART: [ldev] Erasing FE.KEYID = 1
8,584,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,778 UART: [ldev] --
10,392,855 UART: [fwproc] Wait for Commands...
10,395,008 UART: [fwproc] Recv command 0x46574c44
10,397,106 UART: [fwproc] Recv'd Img size: 112032 bytes
14,932,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,012,672 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,072,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,392,028 >>> mbox cmd response: success
15,396,134 UART: [afmc] ++
15,396,722 UART: [afmc] CDI.KEYID = 6
15,397,633 UART: [afmc] SUBJECT.KEYID = 7
15,398,844 UART: [afmc] AUTHORITY.KEYID = 5
17,940,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,661,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,663,509 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,679,605 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,695,578 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,711,351 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,734,928 UART: [afmc] --
19,738,420 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,738,782 UART: [cold-reset] --
19,742,692 UART: [state] Locking Datavault
19,746,582 UART: [state] Locking PCR0, PCR1 and PCR31
19,748,290 UART: [state] Locking ICCM
19,751,009 UART: [exit] Launching FMC @ 0x40000000
19,759,406 UART:
19,759,637 UART: Running Caliptra FMC ...
19,760,672 UART:
19,760,815 UART: [fmc] Received command: 0x10000000
19,763,330 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,057,619 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,991,448 >>> mbox cmd response: success
19,267,607 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,280,671 UART:
19,281,016 UART: Running Caliptra FMC ...
19,282,193 UART:
19,282,360 UART: [fmc] Received command: 0x10000000
19,284,644 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,058,503 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,200,117 UART:
2,200,520 UART: Running Caliptra ROM ...
2,201,821 UART:
2,201,992 UART: [state] CFI Enabled
2,202,973 UART: [state] LifecycleState = Unprovisioned
2,204,623 UART: [state] DebugLocked = No
2,205,726 UART: [state] WD Timer not started. Device not locked for debugging
2,208,215 UART: [kat] SHA2-256
2,208,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,906 UART: [kat] ++
2,212,351 UART: [kat] sha1
2,212,864 UART: [kat] SHA2-256
2,213,524 UART: [kat] SHA2-384
2,214,214 UART: [kat] SHA2-512-ACC
2,215,040 UART: [kat] ECC-384
3,285,934 UART: [kat] HMAC-384Kdf
3,298,950 UART: [kat] LMS
3,828,437 UART: [kat] --
3,833,578 UART: [cold-reset] ++
3,835,408 UART: [fht] FHT @ 0x50003400
3,844,868 UART: [idev] ++
3,845,427 UART: [idev] CDI.KEYID = 6
3,846,361 UART: [idev] SUBJECT.KEYID = 7
3,847,556 UART: [idev] UDS.KEYID = 0
3,862,210 UART: [idev] Erasing UDS.KEYID = 0
6,320,781 UART: [idev] Sha1 KeyId Algorithm
6,342,333 UART: [idev] --
6,346,488 UART: [ldev] ++
6,347,057 UART: [ldev] CDI.KEYID = 6
6,347,978 UART: [ldev] SUBJECT.KEYID = 5
6,349,134 UART: [ldev] AUTHORITY.KEYID = 7
6,350,366 UART: [ldev] FE.KEYID = 1
6,360,697 UART: [ldev] Erasing FE.KEYID = 1
8,835,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,705 UART: [ldev] --
10,622,974 UART: [fwproc] Wait for Commands...
10,626,205 UART: [fwproc] Recv command 0x46574c44
10,628,305 UART: [fwproc] Recv'd Img size: 112032 bytes
15,166,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,247,087 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,307,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,625,972 >>> mbox cmd response: success
15,630,455 UART: [afmc] ++
15,631,042 UART: [afmc] CDI.KEYID = 6
15,631,929 UART: [afmc] SUBJECT.KEYID = 7
15,633,141 UART: [afmc] AUTHORITY.KEYID = 5
18,132,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,853,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,855,329 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,871,408 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,887,333 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,903,141 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,925,270 UART: [afmc] --
19,929,242 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,929,653 UART: [cold-reset] --
19,934,627 UART: [state] Locking Datavault
19,939,333 UART: [state] Locking PCR0, PCR1 and PCR31
19,940,982 UART: [state] Locking ICCM
19,942,346 UART: [exit] Launching FMC @ 0x40000000
19,950,736 UART:
19,950,966 UART: Running Caliptra FMC ...
19,951,999 UART:
19,952,145 UART: [fmc] Received command: 0x10000000
19,954,691 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
2,063,344 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,209,859 >>> mbox cmd response: success
19,433,918 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,450,163 UART:
19,450,500 UART: Running Caliptra FMC ...
19,451,675 UART:
19,451,849 UART: [fmc] Received command: 0x10000000
19,454,208 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,058,308 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,200,787 UART:
2,201,215 UART: Running Caliptra ROM ...
2,202,391 UART:
2,202,564 UART: [state] CFI Enabled
2,203,545 UART: [state] LifecycleState = Unprovisioned
2,205,196 UART: [state] DebugLocked = No
2,206,303 UART: [state] WD Timer not started. Device not locked for debugging
2,208,772 UART: [kat] SHA2-256
2,209,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,452 UART: [kat] ++
2,212,901 UART: [kat] sha1
2,213,416 UART: [kat] SHA2-256
2,214,158 UART: [kat] SHA2-384
2,214,825 UART: [kat] SHA2-512-ACC
2,215,670 UART: [kat] ECC-384
2,947,675 UART: [kat] HMAC-384Kdf
2,971,773 UART: [kat] LMS
3,501,253 UART: [kat] --
3,504,807 UART: [cold-reset] ++
3,505,881 UART: [fht] FHT @ 0x50003400
3,517,295 UART: [idev] ++
3,517,857 UART: [idev] CDI.KEYID = 6
3,518,874 UART: [idev] SUBJECT.KEYID = 7
3,519,975 UART: [idev] UDS.KEYID = 0
3,544,111 UART: [idev] Erasing UDS.KEYID = 0
6,026,695 UART: [idev] Sha1 KeyId Algorithm
6,049,439 UART: [idev] --
6,053,765 UART: [ldev] ++
6,054,334 UART: [ldev] CDI.KEYID = 6
6,055,245 UART: [ldev] SUBJECT.KEYID = 5
6,056,466 UART: [ldev] AUTHORITY.KEYID = 7
6,057,721 UART: [ldev] FE.KEYID = 1
6,099,324 UART: [ldev] Erasing FE.KEYID = 1
8,604,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,510 UART: [ldev] --
10,411,394 UART: [fwproc] Wait for Commands...
10,412,906 UART: [fwproc] Recv command 0x46574c44
10,415,025 UART: [fwproc] Recv'd Img size: 112032 bytes
14,967,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,047,638 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,107,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,426,973 >>> mbox cmd response: success
15,430,852 UART: [afmc] ++
15,431,461 UART: [afmc] CDI.KEYID = 6
15,432,373 UART: [afmc] SUBJECT.KEYID = 7
15,433,534 UART: [afmc] AUTHORITY.KEYID = 5
17,978,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,699,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,701,618 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,717,713 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,733,682 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,749,437 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,771,502 UART: [afmc] --
19,775,842 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,776,211 UART: [cold-reset] --
19,779,725 UART: [state] Locking Datavault
19,785,295 UART: [state] Locking PCR0, PCR1 and PCR31
19,786,938 UART: [state] Locking ICCM
19,789,623 UART: [exit] Launching FMC @ 0x40000000
19,798,037 UART:
19,798,285 UART: Running Caliptra FMC ...
19,799,387 UART:
19,799,544 UART: [fmc] Received command: 0x10000000
19,801,925 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,058,507 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,037,582 >>> mbox cmd response: success
19,306,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,323,151 UART:
19,323,501 UART: Running Caliptra FMC ...
19,324,592 UART:
19,324,742 UART: [fmc] Received command: 0x10000000
19,327,182 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,062,345 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,204,049 UART:
2,204,442 UART: Running Caliptra ROM ...
2,205,611 UART:
2,205,784 UART: [state] CFI Enabled
2,206,760 UART: [state] LifecycleState = Unprovisioned
2,208,403 UART: [state] DebugLocked = No
2,209,509 UART: [state] WD Timer not started. Device not locked for debugging
2,211,974 UART: [kat] SHA2-256
2,212,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,645 UART: [kat] ++
2,216,093 UART: [kat] sha1
2,216,671 UART: [kat] SHA2-256
2,217,334 UART: [kat] SHA2-384
2,217,990 UART: [kat] SHA2-512-ACC
2,219,117 UART: [kat] ECC-384
3,280,686 UART: [kat] HMAC-384Kdf
3,294,818 UART: [kat] LMS
3,824,318 UART: [kat] --
3,827,737 UART: [cold-reset] ++
3,829,178 UART: [fht] FHT @ 0x50003400
3,839,452 UART: [idev] ++
3,840,010 UART: [idev] CDI.KEYID = 6
3,840,914 UART: [idev] SUBJECT.KEYID = 7
3,842,124 UART: [idev] UDS.KEYID = 0
3,858,581 UART: [idev] Erasing UDS.KEYID = 0
6,316,778 UART: [idev] Sha1 KeyId Algorithm
6,339,891 UART: [idev] --
6,344,983 UART: [ldev] ++
6,345,547 UART: [ldev] CDI.KEYID = 6
6,346,450 UART: [ldev] SUBJECT.KEYID = 5
6,347,660 UART: [ldev] AUTHORITY.KEYID = 7
6,348,883 UART: [ldev] FE.KEYID = 1
6,359,741 UART: [ldev] Erasing FE.KEYID = 1
8,833,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,112 UART: [ldev] --
10,626,603 UART: [fwproc] Wait for Commands...
10,629,413 UART: [fwproc] Recv command 0x46574c44
10,631,506 UART: [fwproc] Recv'd Img size: 112032 bytes
15,166,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,245,544 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,305,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,623,507 >>> mbox cmd response: success
15,628,192 UART: [afmc] ++
15,628,776 UART: [afmc] CDI.KEYID = 6
15,629,662 UART: [afmc] SUBJECT.KEYID = 7
15,630,867 UART: [afmc] AUTHORITY.KEYID = 5
18,130,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,852,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,854,360 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,870,397 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,886,365 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,902,191 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,924,363 UART: [afmc] --
19,928,939 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,929,324 UART: [cold-reset] --
19,932,806 UART: [state] Locking Datavault
19,938,162 UART: [state] Locking PCR0, PCR1 and PCR31
19,939,805 UART: [state] Locking ICCM
19,941,416 UART: [exit] Launching FMC @ 0x40000000
19,949,806 UART:
19,950,045 UART: Running Caliptra FMC ...
19,951,145 UART:
19,951,300 UART: [fmc] Received command: 0x10000000
19,953,731 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,067,895 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,188,205 >>> mbox cmd response: success
19,421,385 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,436,389 UART:
19,436,744 UART: Running Caliptra FMC ...
19,437,933 UART:
19,438,120 UART: [fmc] Received command: 0x10000000
19,440,411 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,674 UART: [ldev] --
1,280,038 UART: [fwproc] Wait for Commands...
1,280,863 UART: [fwproc] Recv command 0x46574c44
1,281,596 UART: [fwproc] Recv'd Img size: 112032 bytes
3,090,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,279 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,280,002 >>> mbox cmd response: success
3,281,053 UART: [afmc] ++
3,281,221 UART: [afmc] CDI.KEYID = 6
3,281,584 UART: [afmc] SUBJECT.KEYID = 7
3,282,010 UART: [afmc] AUTHORITY.KEYID = 5
3,317,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,334,712 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,340,415 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,346,297 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,352,003 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,359,791 UART: [afmc] --
3,360,823 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,360,845 UART: [cold-reset] --
3,361,743 UART: [state] Locking Datavault
3,362,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,363,470 UART: [state] Locking ICCM
3,364,078 UART: [exit] Launching FMC @ 0x40000000
3,369,375 UART:
3,369,391 UART: Running Caliptra FMC ...
3,369,799 UART:
3,370,029 UART: [fmc] Received command: 0x10000000
3,372,198 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,145,881 >>> mbox cmd response: success
3,202,334 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,208,681 UART:
3,208,697 UART: Running Caliptra FMC ...
3,209,105 UART:
3,209,335 UART: [fmc] Received command: 0x10000000
3,211,504 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,250 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
891,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,046 UART: [kat] ++
896,198 UART: [kat] sha1
900,646 UART: [kat] SHA2-256
902,586 UART: [kat] SHA2-384
905,491 UART: [kat] SHA2-512-ACC
907,392 UART: [kat] ECC-384
917,331 UART: [kat] HMAC-384Kdf
921,985 UART: [kat] LMS
1,170,297 UART: [kat] --
1,171,162 UART: [cold-reset] ++
1,171,570 UART: [fht] FHT @ 0x50003400
1,174,220 UART: [idev] ++
1,174,388 UART: [idev] CDI.KEYID = 6
1,174,749 UART: [idev] SUBJECT.KEYID = 7
1,175,174 UART: [idev] UDS.KEYID = 0
1,183,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,344 UART: [idev] Sha1 KeyId Algorithm
1,209,226 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,283,043 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 112032 bytes
3,087,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,114,736 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,140,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,276,327 >>> mbox cmd response: success
3,277,374 UART: [afmc] ++
3,277,542 UART: [afmc] CDI.KEYID = 6
3,277,905 UART: [afmc] SUBJECT.KEYID = 7
3,278,331 UART: [afmc] AUTHORITY.KEYID = 5
3,314,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,330,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,331,637 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,337,340 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,343,222 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,348,928 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,356,724 UART: [afmc] --
3,357,694 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,357,716 UART: [cold-reset] --
3,358,716 UART: [state] Locking Datavault
3,359,859 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,463 UART: [state] Locking ICCM
3,360,901 UART: [exit] Launching FMC @ 0x40000000
3,366,198 UART:
3,366,214 UART: Running Caliptra FMC ...
3,366,622 UART:
3,366,852 UART: [fmc] Received command: 0x10000000
3,369,021 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,140,372 >>> mbox cmd response: success
3,197,021 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,203,094 UART:
3,203,110 UART: Running Caliptra FMC ...
3,203,518 UART:
3,203,748 UART: [fmc] Received command: 0x10000000
3,205,917 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,166 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,441 UART: [fwproc] Recv command 0x46574c44
1,282,174 UART: [fwproc] Recv'd Img size: 112032 bytes
3,102,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,129,760 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,291,557 >>> mbox cmd response: success
3,292,816 UART: [afmc] ++
3,292,984 UART: [afmc] CDI.KEYID = 6
3,293,347 UART: [afmc] SUBJECT.KEYID = 7
3,293,773 UART: [afmc] AUTHORITY.KEYID = 5
3,329,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,346,783 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,352,486 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,358,368 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,364,074 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,372,084 UART: [afmc] --
3,373,034 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,056 UART: [cold-reset] --
3,373,986 UART: [state] Locking Datavault
3,375,209 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,813 UART: [state] Locking ICCM
3,376,351 UART: [exit] Launching FMC @ 0x40000000
3,381,648 UART:
3,381,664 UART: Running Caliptra FMC ...
3,382,072 UART:
3,382,302 UART: [fmc] Received command: 0x10000000
3,384,471 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,134,030 >>> mbox cmd response: success
3,190,139 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,932 UART:
3,195,948 UART: Running Caliptra FMC ...
3,196,356 UART:
3,196,586 UART: [fmc] Received command: 0x10000000
3,198,755 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
905,109 UART: [kat] SHA2-512-ACC
907,010 UART: [kat] ECC-384
916,595 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,006 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,241,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,265 UART: [ldev] --
1,280,729 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 112032 bytes
3,094,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,790 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,147,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,283,595 >>> mbox cmd response: success
3,284,634 UART: [afmc] ++
3,284,802 UART: [afmc] CDI.KEYID = 6
3,285,165 UART: [afmc] SUBJECT.KEYID = 7
3,285,591 UART: [afmc] AUTHORITY.KEYID = 5
3,321,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,337,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,338,355 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,344,058 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,349,940 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,355,646 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,363,438 UART: [afmc] --
3,364,372 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,364,394 UART: [cold-reset] --
3,365,008 UART: [state] Locking Datavault
3,366,001 UART: [state] Locking PCR0, PCR1 and PCR31
3,366,605 UART: [state] Locking ICCM
3,367,165 UART: [exit] Launching FMC @ 0x40000000
3,372,462 UART:
3,372,478 UART: Running Caliptra FMC ...
3,372,886 UART:
3,373,116 UART: [fmc] Received command: 0x10000000
3,375,285 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,146,202 >>> mbox cmd response: success
3,202,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,208,520 UART:
3,208,536 UART: Running Caliptra FMC ...
3,208,944 UART:
3,209,174 UART: [fmc] Received command: 0x10000000
3,211,343 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,663 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,393 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,612 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: [fwproc] Recv'd Img size: 112032 bytes
3,107,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,135,194 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,160,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,296,835 >>> mbox cmd response: success
3,297,950 UART: [afmc] ++
3,298,118 UART: [afmc] CDI.KEYID = 6
3,298,481 UART: [afmc] SUBJECT.KEYID = 7
3,298,907 UART: [afmc] AUTHORITY.KEYID = 5
3,334,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,351,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,351,895 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,357,598 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,363,480 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,369,186 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,376,926 UART: [afmc] --
3,377,836 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,377,858 UART: [cold-reset] --
3,378,468 UART: [state] Locking Datavault
3,379,437 UART: [state] Locking PCR0, PCR1 and PCR31
3,380,041 UART: [state] Locking ICCM
3,380,685 UART: [exit] Launching FMC @ 0x40000000
3,385,982 UART:
3,385,998 UART: Running Caliptra FMC ...
3,386,406 UART:
3,386,636 UART: [fmc] Received command: 0x10000000
3,388,805 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,133,844 >>> mbox cmd response: success
3,189,419 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,436 UART:
3,195,452 UART: Running Caliptra FMC ...
3,195,860 UART:
3,196,090 UART: [fmc] Received command: 0x10000000
3,198,259 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,241,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,675 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,744 UART: [fwproc] Recv command 0x46574c44
1,282,477 UART: [fwproc] Recv'd Img size: 112032 bytes
3,093,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,227 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,282,860 >>> mbox cmd response: success
3,283,965 UART: [afmc] ++
3,284,133 UART: [afmc] CDI.KEYID = 6
3,284,496 UART: [afmc] SUBJECT.KEYID = 7
3,284,922 UART: [afmc] AUTHORITY.KEYID = 5
3,320,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,336,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,337,320 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,343,023 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,348,905 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,354,611 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,362,363 UART: [afmc] --
3,363,463 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,363,485 UART: [cold-reset] --
3,364,157 UART: [state] Locking Datavault
3,365,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,366,210 UART: [state] Locking ICCM
3,366,824 UART: [exit] Launching FMC @ 0x40000000
3,372,121 UART:
3,372,137 UART: Running Caliptra FMC ...
3,372,545 UART:
3,372,775 UART: [fmc] Received command: 0x10000000
3,374,944 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,127,366 >>> mbox cmd response: success
3,183,345 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,189,556 UART:
3,189,572 UART: Running Caliptra FMC ...
3,189,980 UART:
3,190,210 UART: [fmc] Received command: 0x10000000
3,192,379 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,215,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,657 UART:
2,216,920 UART: Running Caliptra ROM ...
2,217,984 UART:
2,218,136 UART: [state] CFI Enabled
2,219,006 UART: [state] LifecycleState = Unprovisioned
2,220,681 UART: [state] DebugLocked = No
2,221,795 UART: [state] WD Timer not started. Device not locked for debugging
2,224,272 UART: [kat] SHA2-256
2,224,941 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,227,949 UART: [kat] ++
2,228,398 UART: [kat] sha1
2,228,912 UART: [kat] SHA2-256
2,229,647 UART: [kat] SHA2-384
2,230,330 UART: [kat] SHA2-512-ACC
2,231,213 UART: [kat] ECC-384
3,775,020 UART: [kat] HMAC-384Kdf
3,802,609 UART: [kat] LMS
4,875,776 UART: [kat] --
4,879,551 UART: [cold-reset] ++
4,881,064 UART: [fht] FHT @ 0x50003400
4,892,532 UART: [idev] ++
4,893,202 UART: [idev] CDI.KEYID = 6
4,894,433 UART: [idev] SUBJECT.KEYID = 7
4,895,545 UART: [idev] UDS.KEYID = 0
4,929,765 UART: [idev] Erasing UDS.KEYID = 0
8,241,357 UART: [idev] Sha1 KeyId Algorithm
8,263,188 UART: [idev] --
8,267,297 UART: [ldev] ++
8,267,920 UART: [ldev] CDI.KEYID = 6
8,269,120 UART: [ldev] SUBJECT.KEYID = 5
8,270,276 UART: [ldev] AUTHORITY.KEYID = 7
8,271,503 UART: [ldev] FE.KEYID = 1
8,316,135 UART: [ldev] Erasing FE.KEYID = 1
11,650,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,453 UART: [ldev] --
14,038,312 UART: [fwproc] Wait for Commands...
14,040,247 UART: [fwproc] Recv command 0x4d454153
14,049,262 >>> mbox cmd response data (12 bytes)
14,050,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,051,111 UART: [fwproc] Recv command 0x4d454153
14,060,041 >>> mbox cmd response data (12 bytes)
14,060,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,061,393 UART: [fwproc] Recv command 0x4d454153
14,070,322 >>> mbox cmd response data (12 bytes)
14,070,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,071,910 UART: [fwproc] Recv command 0x4d454153
14,080,772 >>> mbox cmd response data (12 bytes)
14,081,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,082,521 UART: [fwproc] Recv command 0x4d454153
14,091,109 >>> mbox cmd response data (12 bytes)
14,091,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,092,580 UART: [fwproc] Recv command 0x4d454153
14,101,113 >>> mbox cmd response data (12 bytes)
14,101,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,102,499 UART: [fwproc] Recv command 0x4d454153
14,111,087 >>> mbox cmd response data (12 bytes)
14,111,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,112,639 UART: [fwproc] Recv command 0x4d454153
14,121,230 >>> mbox cmd response data (12 bytes)
14,122,901 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,264,105 UART: [fwproc] Recv command 0x46574c44
14,266,174 UART: [fwproc] Recv'd Img size: 111688 bytes
18,309,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,383,808 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,444,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,761,474 >>> mbox cmd response: success
18,765,117 UART: [afmc] ++
18,765,699 UART: [afmc] CDI.KEYID = 6
18,766,878 UART: [afmc] SUBJECT.KEYID = 7
18,768,026 UART: [afmc] AUTHORITY.KEYID = 5
22,137,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,433,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,435,708 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,451,922 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,468,013 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,483,845 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,506,463 UART: [afmc] --
24,510,860 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,511,206 UART: [cold-reset] --
24,516,337 UART: [state] Locking Datavault
24,521,143 UART: [state] Locking PCR0, PCR1 and PCR31
24,522,785 UART: [state] Locking ICCM
24,524,725 UART: [exit] Launching FMC @ 0x40000000
24,533,391 UART:
24,533,674 UART: Running Caliptra FMC ...
24,534,783 UART:
24,534,940 UART: [fmc] Received command: 0x1000000A
24,541,371 >>> mbox cmd response data (928 bytes)
24,546,598 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,547,057 UART: [fmc] Received command: 0x10000009
24,548,865 >>> mbox cmd response data (48 bytes)
24,551,033 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,551,504 UART: [fmc] Received command: 0x10000003
24,561,426 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,208,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,834,660 >>> mbox cmd response data (12 bytes)
13,835,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,843,573 >>> mbox cmd response data (12 bytes)
13,844,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,852,874 >>> mbox cmd response data (12 bytes)
13,853,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,861,369 >>> mbox cmd response data (12 bytes)
13,861,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,869,500 >>> mbox cmd response data (12 bytes)
13,869,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,877,414 >>> mbox cmd response data (12 bytes)
13,877,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,886,721 >>> mbox cmd response data (12 bytes)
13,887,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,895,118 >>> mbox cmd response data (12 bytes)
13,896,857 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,520,176 >>> mbox cmd response: success
24,193,081 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,206,874 UART:
24,207,193 UART: Running Caliptra FMC ...
24,208,344 UART:
24,208,503 UART: [fmc] Received command: 0x1000000A
24,214,902 >>> mbox cmd response data (928 bytes)
24,220,321 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,220,777 UART: [fmc] Received command: 0x10000009
24,222,599 >>> mbox cmd response data (48 bytes)
24,224,743 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,225,207 UART: [fmc] Received command: 0x10000003
24,235,157 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,225,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,226,484 UART:
2,226,746 UART: Running Caliptra ROM ...
2,227,807 UART:
2,227,951 UART: [state] CFI Enabled
2,228,814 UART: [state] LifecycleState = Unprovisioned
2,230,493 UART: [state] DebugLocked = No
2,231,607 UART: [state] WD Timer not started. Device not locked for debugging
2,234,081 UART: [kat] SHA2-256
2,234,749 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,237,752 UART: [kat] ++
2,238,199 UART: [kat] sha1
2,238,704 UART: [kat] SHA2-256
2,239,460 UART: [kat] SHA2-384
2,240,122 UART: [kat] SHA2-512-ACC
2,240,947 UART: [kat] ECC-384
4,100,163 UART: [kat] HMAC-384Kdf
4,112,835 UART: [kat] LMS
5,186,003 UART: [kat] --
5,191,183 UART: [cold-reset] ++
5,192,373 UART: [fht] FHT @ 0x50003400
5,203,999 UART: [idev] ++
5,204,670 UART: [idev] CDI.KEYID = 6
5,205,898 UART: [idev] SUBJECT.KEYID = 7
5,207,329 UART: [idev] UDS.KEYID = 0
5,223,763 UART: [idev] Erasing UDS.KEYID = 0
8,496,117 UART: [idev] Sha1 KeyId Algorithm
8,518,483 UART: [idev] --
8,522,634 UART: [ldev] ++
8,523,227 UART: [ldev] CDI.KEYID = 6
8,524,410 UART: [ldev] SUBJECT.KEYID = 5
8,525,896 UART: [ldev] AUTHORITY.KEYID = 7
8,527,448 UART: [ldev] FE.KEYID = 1
8,538,200 UART: [ldev] Erasing FE.KEYID = 1
11,827,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,020 UART: [ldev] --
14,196,123 UART: [fwproc] Wait for Commands...
14,197,790 UART: [fwproc] Recv command 0x4d454153
14,206,807 >>> mbox cmd response data (12 bytes)
14,207,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,208,593 UART: [fwproc] Recv command 0x4d454153
14,217,530 >>> mbox cmd response data (12 bytes)
14,217,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,218,788 UART: [fwproc] Recv command 0x4d454153
14,227,705 >>> mbox cmd response data (12 bytes)
14,228,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,229,334 UART: [fwproc] Recv command 0x4d454153
14,238,251 >>> mbox cmd response data (12 bytes)
14,238,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,239,213 UART: [fwproc] Recv command 0x4d454153
14,248,072 >>> mbox cmd response data (12 bytes)
14,248,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,250,284 UART: [fwproc] Recv command 0x4d454153
14,258,834 >>> mbox cmd response data (12 bytes)
14,259,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,260,290 UART: [fwproc] Recv command 0x4d454153
14,268,874 >>> mbox cmd response data (12 bytes)
14,269,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,270,466 UART: [fwproc] Recv command 0x4d454153
14,278,998 >>> mbox cmd response data (12 bytes)
14,280,655 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,421,080 UART: [fwproc] Recv command 0x46574c44
14,423,199 UART: [fwproc] Recv'd Img size: 111688 bytes
18,472,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,548,912 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,609,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,926,946 >>> mbox cmd response: success
18,931,339 UART: [afmc] ++
18,931,923 UART: [afmc] CDI.KEYID = 6
18,933,161 UART: [afmc] SUBJECT.KEYID = 7
18,934,262 UART: [afmc] AUTHORITY.KEYID = 5
22,254,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,550,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,552,987 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,569,139 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,585,289 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,601,060 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,623,966 UART: [afmc] --
24,627,665 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,628,019 UART: [cold-reset] --
24,631,050 UART: [state] Locking Datavault
24,637,335 UART: [state] Locking PCR0, PCR1 and PCR31
24,638,976 UART: [state] Locking ICCM
24,641,011 UART: [exit] Launching FMC @ 0x40000000
24,649,627 UART:
24,649,928 UART: Running Caliptra FMC ...
24,651,043 UART:
24,651,201 UART: [fmc] Received command: 0x1000000A
24,657,683 >>> mbox cmd response data (928 bytes)
24,662,792 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,663,228 UART: [fmc] Received command: 0x10000009
24,665,035 >>> mbox cmd response data (48 bytes)
24,667,214 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,667,669 UART: [fmc] Received command: 0x10000003
24,677,597 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,217,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,021,428 >>> mbox cmd response data (12 bytes)
14,022,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,030,113 >>> mbox cmd response data (12 bytes)
14,030,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,038,763 >>> mbox cmd response data (12 bytes)
14,039,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,047,316 >>> mbox cmd response data (12 bytes)
14,047,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,055,396 >>> mbox cmd response data (12 bytes)
14,055,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,063,348 >>> mbox cmd response data (12 bytes)
14,063,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,071,083 >>> mbox cmd response data (12 bytes)
14,071,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,079,113 >>> mbox cmd response data (12 bytes)
14,080,828 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,697,948 >>> mbox cmd response: success
24,323,709 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,340,691 UART:
24,341,042 UART: Running Caliptra FMC ...
24,342,232 UART:
24,342,395 UART: [fmc] Received command: 0x1000000A
24,348,730 >>> mbox cmd response data (928 bytes)
24,354,060 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,354,505 UART: [fmc] Received command: 0x10000009
24,356,272 >>> mbox cmd response data (48 bytes)
24,358,460 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,358,921 UART: [fmc] Received command: 0x10000003
24,368,892 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,225,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,263 UART:
2,227,514 UART: Running Caliptra ROM ...
2,228,578 UART:
2,228,730 UART: [state] CFI Enabled
2,229,590 UART: [state] LifecycleState = Unprovisioned
2,231,148 UART: [state] DebugLocked = No
2,232,279 UART: [state] WD Timer not started. Device not locked for debugging
2,234,672 UART: [kat] SHA2-256
2,235,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,238,346 UART: [kat] ++
2,238,799 UART: [kat] sha1
2,239,316 UART: [kat] SHA2-256
2,240,064 UART: [kat] SHA2-384
2,240,740 UART: [kat] SHA2-512-ACC
2,241,646 UART: [kat] ECC-384
2,948,413 UART: [kat] HMAC-384Kdf
2,970,249 UART: [kat] LMS
3,499,691 UART: [kat] --
3,504,174 UART: [cold-reset] ++
3,506,324 UART: [fht] FHT @ 0x50003400
3,516,059 UART: [idev] ++
3,516,630 UART: [idev] CDI.KEYID = 6
3,517,540 UART: [idev] SUBJECT.KEYID = 7
3,518,758 UART: [idev] UDS.KEYID = 0
3,542,192 UART: [idev] Erasing UDS.KEYID = 0
6,024,010 UART: [idev] Sha1 KeyId Algorithm
6,047,211 UART: [idev] --
6,051,696 UART: [ldev] ++
6,052,287 UART: [ldev] CDI.KEYID = 6
6,053,201 UART: [ldev] SUBJECT.KEYID = 5
6,054,324 UART: [ldev] AUTHORITY.KEYID = 7
6,055,627 UART: [ldev] FE.KEYID = 1
6,099,122 UART: [ldev] Erasing FE.KEYID = 1
8,605,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,195 UART: [ldev] --
10,412,003 UART: [fwproc] Wait for Commands...
10,413,511 UART: [fwproc] Recv command 0x4d454153
10,422,050 >>> mbox cmd response data (12 bytes)
10,422,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,213 UART: [fwproc] Recv command 0x4d454153
10,431,706 >>> mbox cmd response data (12 bytes)
10,432,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,132 UART: [fwproc] Recv command 0x4d454153
10,441,601 >>> mbox cmd response data (12 bytes)
10,442,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,444,225 UART: [fwproc] Recv command 0x4d454153
10,452,655 >>> mbox cmd response data (12 bytes)
10,453,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,123 UART: [fwproc] Recv command 0x4d454153
10,462,547 >>> mbox cmd response data (12 bytes)
10,462,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,908 UART: [fwproc] Recv command 0x4d454153
10,472,336 >>> mbox cmd response data (12 bytes)
10,472,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,474,284 UART: [fwproc] Recv command 0x4d454153
10,482,711 >>> mbox cmd response data (12 bytes)
10,483,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,484,936 UART: [fwproc] Recv command 0x4d454153
10,493,380 >>> mbox cmd response data (12 bytes)
10,495,074 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,637,275 UART: [fwproc] Recv command 0x46574c44
10,639,397 UART: [fwproc] Recv'd Img size: 112032 bytes
14,014,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,244 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,145,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,464,722 >>> mbox cmd response: success
14,468,491 UART: [afmc] ++
14,469,080 UART: [afmc] CDI.KEYID = 6
14,470,022 UART: [afmc] SUBJECT.KEYID = 7
14,471,044 UART: [afmc] AUTHORITY.KEYID = 5
17,006,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,744,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,746,934 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,762,894 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,778,918 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,794,629 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,818,431 UART: [afmc] --
18,822,523 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,822,926 UART: [cold-reset] --
18,827,636 UART: [state] Locking Datavault
18,833,834 UART: [state] Locking PCR0, PCR1 and PCR31
18,835,520 UART: [state] Locking ICCM
18,836,623 UART: [exit] Launching FMC @ 0x40000000
18,845,025 UART:
18,845,267 UART: Running Caliptra FMC ...
18,846,372 UART:
18,846,529 UART: [fmc] Received command: 0x1000000A
18,853,071 >>> mbox cmd response data (928 bytes)
18,858,425 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,858,862 UART: [fmc] Received command: 0x10000009
18,860,684 >>> mbox cmd response data (48 bytes)
18,862,909 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,863,377 UART: [fmc] Received command: 0x10000003
18,873,344 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,221,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,224,995 >>> mbox cmd response data (12 bytes)
10,226,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,234,362 >>> mbox cmd response data (12 bytes)
10,234,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,242,380 >>> mbox cmd response data (12 bytes)
10,242,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,251,242 >>> mbox cmd response data (12 bytes)
10,251,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,259,466 >>> mbox cmd response data (12 bytes)
10,259,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,266,819 >>> mbox cmd response data (12 bytes)
10,267,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,274,598 >>> mbox cmd response data (12 bytes)
10,275,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,282,970 >>> mbox cmd response data (12 bytes)
10,284,705 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,254,419 >>> mbox cmd response: success
18,520,966 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,537,928 UART:
18,538,260 UART: Running Caliptra FMC ...
18,539,415 UART:
18,539,572 UART: [fmc] Received command: 0x1000000A
18,546,046 >>> mbox cmd response data (928 bytes)
18,551,213 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,551,650 UART: [fmc] Received command: 0x10000009
18,553,457 >>> mbox cmd response data (48 bytes)
18,555,615 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,556,083 UART: [fmc] Received command: 0x10000003
18,566,042 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,220,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,088 UART:
2,222,347 UART: Running Caliptra ROM ...
2,223,410 UART:
2,223,562 UART: [state] CFI Enabled
2,224,447 UART: [state] LifecycleState = Unprovisioned
2,226,046 UART: [state] DebugLocked = No
2,227,176 UART: [state] WD Timer not started. Device not locked for debugging
2,229,654 UART: [kat] SHA2-256
2,230,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,233,327 UART: [kat] ++
2,233,779 UART: [kat] sha1
2,234,287 UART: [kat] SHA2-256
2,234,943 UART: [kat] SHA2-384
2,235,600 UART: [kat] SHA2-512-ACC
2,236,424 UART: [kat] ECC-384
3,276,257 UART: [kat] HMAC-384Kdf
3,289,284 UART: [kat] LMS
3,818,783 UART: [kat] --
3,823,719 UART: [cold-reset] ++
3,825,496 UART: [fht] FHT @ 0x50003400
3,835,305 UART: [idev] ++
3,835,871 UART: [idev] CDI.KEYID = 6
3,836,749 UART: [idev] SUBJECT.KEYID = 7
3,838,013 UART: [idev] UDS.KEYID = 0
3,853,966 UART: [idev] Erasing UDS.KEYID = 0
6,310,822 UART: [idev] Sha1 KeyId Algorithm
6,332,973 UART: [idev] --
6,336,639 UART: [ldev] ++
6,337,203 UART: [ldev] CDI.KEYID = 6
6,338,078 UART: [ldev] SUBJECT.KEYID = 5
6,339,291 UART: [ldev] AUTHORITY.KEYID = 7
6,340,576 UART: [ldev] FE.KEYID = 1
6,352,765 UART: [ldev] Erasing FE.KEYID = 1
8,824,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,896 UART: [ldev] --
10,614,307 UART: [fwproc] Wait for Commands...
10,617,491 UART: [fwproc] Recv command 0x4d454153
10,626,024 >>> mbox cmd response data (12 bytes)
10,626,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,627,220 UART: [fwproc] Recv command 0x4d454153
10,635,705 >>> mbox cmd response data (12 bytes)
10,636,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,637,339 UART: [fwproc] Recv command 0x4d454153
10,645,817 >>> mbox cmd response data (12 bytes)
10,646,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,646,942 UART: [fwproc] Recv command 0x4d454153
10,655,431 >>> mbox cmd response data (12 bytes)
10,655,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,657,142 UART: [fwproc] Recv command 0x4d454153
10,665,570 >>> mbox cmd response data (12 bytes)
10,666,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,667,493 UART: [fwproc] Recv command 0x4d454153
10,675,920 >>> mbox cmd response data (12 bytes)
10,676,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,677,235 UART: [fwproc] Recv command 0x4d454153
10,685,715 >>> mbox cmd response data (12 bytes)
10,686,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,687,525 UART: [fwproc] Recv command 0x4d454153
10,696,010 >>> mbox cmd response data (12 bytes)
10,697,706 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,838,438 UART: [fwproc] Recv command 0x46574c44
10,840,551 UART: [fwproc] Recv'd Img size: 112032 bytes
14,210,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,284,576 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,344,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,662,861 >>> mbox cmd response: success
14,666,844 UART: [afmc] ++
14,667,437 UART: [afmc] CDI.KEYID = 6
14,668,348 UART: [afmc] SUBJECT.KEYID = 7
14,669,506 UART: [afmc] AUTHORITY.KEYID = 5
17,170,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,280 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,910,363 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,926,421 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,942,086 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,964,707 UART: [afmc] --
18,967,542 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,967,913 UART: [cold-reset] --
18,971,050 UART: [state] Locking Datavault
18,977,616 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,264 UART: [state] Locking ICCM
18,981,253 UART: [exit] Launching FMC @ 0x40000000
18,989,647 UART:
18,989,888 UART: Running Caliptra FMC ...
18,990,987 UART:
18,991,145 UART: [fmc] Received command: 0x1000000A
18,997,686 >>> mbox cmd response data (928 bytes)
19,002,844 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,003,292 UART: [fmc] Received command: 0x10000009
19,005,121 >>> mbox cmd response data (48 bytes)
19,007,262 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,007,946 UART: [fmc] Received command: 0x10000003
19,017,909 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
2,219,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,568 >>> mbox cmd response data (12 bytes)
10,420,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,427,677 >>> mbox cmd response data (12 bytes)
10,428,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,097 >>> mbox cmd response data (12 bytes)
10,436,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,906 >>> mbox cmd response data (12 bytes)
10,444,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,456 >>> mbox cmd response data (12 bytes)
10,452,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,459,978 >>> mbox cmd response data (12 bytes)
10,460,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,467,972 >>> mbox cmd response data (12 bytes)
10,468,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,475,497 >>> mbox cmd response data (12 bytes)
10,477,197 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,444,521 >>> mbox cmd response: success
18,681,443 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,697,100 UART:
18,697,427 UART: Running Caliptra FMC ...
18,698,495 UART:
18,698,646 UART: [fmc] Received command: 0x1000000A
18,705,221 >>> mbox cmd response data (928 bytes)
18,710,478 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,710,948 UART: [fmc] Received command: 0x10000009
18,712,754 >>> mbox cmd response data (48 bytes)
18,714,848 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,715,331 UART: [fmc] Received command: 0x10000003
18,725,288 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,215,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,721 UART:
2,216,990 UART: Running Caliptra ROM ...
2,218,066 UART:
2,218,218 UART: [state] CFI Enabled
2,219,089 UART: [state] LifecycleState = Unprovisioned
2,220,649 UART: [state] DebugLocked = No
2,221,701 UART: [state] WD Timer not started. Device not locked for debugging
2,224,196 UART: [kat] SHA2-256
2,224,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,914 UART: [kat] ++
2,228,366 UART: [kat] sha1
2,228,879 UART: [kat] SHA2-256
2,229,622 UART: [kat] SHA2-384
2,230,291 UART: [kat] SHA2-512-ACC
2,231,172 UART: [kat] ECC-384
2,946,602 UART: [kat] HMAC-384Kdf
2,972,213 UART: [kat] LMS
3,501,651 UART: [kat] --
3,506,269 UART: [cold-reset] ++
3,507,127 UART: [fht] FHT @ 0x50003400
3,518,819 UART: [idev] ++
3,519,396 UART: [idev] CDI.KEYID = 6
3,520,362 UART: [idev] SUBJECT.KEYID = 7
3,521,522 UART: [idev] UDS.KEYID = 0
3,543,038 UART: [idev] Erasing UDS.KEYID = 0
6,025,194 UART: [idev] Sha1 KeyId Algorithm
6,047,626 UART: [idev] --
6,050,444 UART: [ldev] ++
6,051,021 UART: [ldev] CDI.KEYID = 6
6,051,931 UART: [ldev] SUBJECT.KEYID = 5
6,053,096 UART: [ldev] AUTHORITY.KEYID = 7
6,054,391 UART: [ldev] FE.KEYID = 1
6,100,070 UART: [ldev] Erasing FE.KEYID = 1
8,604,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,748 UART: [ldev] --
10,415,673 UART: [fwproc] Wait for Commands...
10,418,716 UART: [fwproc] Recv command 0x4d454153
10,427,254 >>> mbox cmd response data (12 bytes)
10,427,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,429,539 UART: [fwproc] Recv command 0x4d454153
10,438,022 >>> mbox cmd response data (12 bytes)
10,438,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,439,335 UART: [fwproc] Recv command 0x4d454153
10,447,819 >>> mbox cmd response data (12 bytes)
10,448,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,448,833 UART: [fwproc] Recv command 0x4d454153
10,457,261 >>> mbox cmd response data (12 bytes)
10,457,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,458,403 UART: [fwproc] Recv command 0x4d454153
10,466,842 >>> mbox cmd response data (12 bytes)
10,467,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,579 UART: [fwproc] Recv command 0x4d454153
10,477,030 >>> mbox cmd response data (12 bytes)
10,477,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,478,550 UART: [fwproc] Recv command 0x4d454153
10,486,987 >>> mbox cmd response data (12 bytes)
10,487,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,488,854 UART: [fwproc] Recv command 0x4d454153
10,497,298 >>> mbox cmd response data (12 bytes)
10,498,949 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,640,625 UART: [fwproc] Recv command 0x46574c44
10,642,734 UART: [fwproc] Recv'd Img size: 112032 bytes
14,015,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,084,956 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,145,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,463,722 >>> mbox cmd response: success
14,468,544 UART: [afmc] ++
14,469,138 UART: [afmc] CDI.KEYID = 6
14,470,073 UART: [afmc] SUBJECT.KEYID = 7
14,471,246 UART: [afmc] AUTHORITY.KEYID = 5
16,998,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,264 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,740,384 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,756,404 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,772,100 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,793,850 UART: [afmc] --
18,796,800 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,797,147 UART: [cold-reset] --
18,800,932 UART: [state] Locking Datavault
18,806,444 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,296 UART: [state] Locking ICCM
18,809,653 UART: [exit] Launching FMC @ 0x40000000
18,818,058 UART:
18,818,320 UART: Running Caliptra FMC ...
18,819,430 UART:
18,819,595 UART: [fmc] Received command: 0x1000000A
18,826,078 >>> mbox cmd response data (928 bytes)
18,831,186 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,831,619 UART: [fmc] Received command: 0x10000009
18,833,422 >>> mbox cmd response data (48 bytes)
18,835,547 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,836,013 UART: [fmc] Received command: 0x10000003
18,845,939 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,211,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,229,596 >>> mbox cmd response data (12 bytes)
10,230,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,238,250 >>> mbox cmd response data (12 bytes)
10,238,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,246,085 >>> mbox cmd response data (12 bytes)
10,246,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,254,376 >>> mbox cmd response data (12 bytes)
10,254,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,262,267 >>> mbox cmd response data (12 bytes)
10,262,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,269,995 >>> mbox cmd response data (12 bytes)
10,270,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,278,079 >>> mbox cmd response data (12 bytes)
10,278,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,285,549 >>> mbox cmd response data (12 bytes)
10,287,284 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,252,985 >>> mbox cmd response: success
18,522,370 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,536,928 UART:
18,537,256 UART: Running Caliptra FMC ...
18,538,334 UART:
18,538,483 UART: [fmc] Received command: 0x1000000A
18,545,017 >>> mbox cmd response data (928 bytes)
18,550,194 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,550,638 UART: [fmc] Received command: 0x10000009
18,552,411 >>> mbox cmd response data (48 bytes)
18,554,600 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,555,068 UART: [fmc] Received command: 0x10000003
18,565,041 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,221,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,742 UART:
2,223,000 UART: Running Caliptra ROM ...
2,224,088 UART:
2,224,242 UART: [state] CFI Enabled
2,225,105 UART: [state] LifecycleState = Unprovisioned
2,226,806 UART: [state] DebugLocked = No
2,227,923 UART: [state] WD Timer not started. Device not locked for debugging
2,230,397 UART: [kat] SHA2-256
2,231,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,081 UART: [kat] ++
2,234,532 UART: [kat] sha1
2,235,132 UART: [kat] SHA2-256
2,235,795 UART: [kat] SHA2-384
2,236,522 UART: [kat] SHA2-512-ACC
2,237,372 UART: [kat] ECC-384
3,282,307 UART: [kat] HMAC-384Kdf
3,293,413 UART: [kat] LMS
3,822,937 UART: [kat] --
3,827,527 UART: [cold-reset] ++
3,830,052 UART: [fht] FHT @ 0x50003400
3,841,578 UART: [idev] ++
3,842,199 UART: [idev] CDI.KEYID = 6
3,843,125 UART: [idev] SUBJECT.KEYID = 7
3,844,291 UART: [idev] UDS.KEYID = 0
3,860,350 UART: [idev] Erasing UDS.KEYID = 0
6,319,502 UART: [idev] Sha1 KeyId Algorithm
6,341,867 UART: [idev] --
6,346,718 UART: [ldev] ++
6,347,280 UART: [ldev] CDI.KEYID = 6
6,348,155 UART: [ldev] SUBJECT.KEYID = 5
6,349,360 UART: [ldev] AUTHORITY.KEYID = 7
6,350,643 UART: [ldev] FE.KEYID = 1
6,363,045 UART: [ldev] Erasing FE.KEYID = 1
8,831,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,828 UART: [ldev] --
10,621,872 UART: [fwproc] Wait for Commands...
10,623,912 UART: [fwproc] Recv command 0x4d454153
10,632,432 >>> mbox cmd response data (12 bytes)
10,633,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,633,609 UART: [fwproc] Recv command 0x4d454153
10,642,105 >>> mbox cmd response data (12 bytes)
10,642,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,643,539 UART: [fwproc] Recv command 0x4d454153
10,652,026 >>> mbox cmd response data (12 bytes)
10,652,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,653,788 UART: [fwproc] Recv command 0x4d454153
10,662,270 >>> mbox cmd response data (12 bytes)
10,662,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,663,808 UART: [fwproc] Recv command 0x4d454153
10,672,255 >>> mbox cmd response data (12 bytes)
10,672,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,673,340 UART: [fwproc] Recv command 0x4d454153
10,681,760 >>> mbox cmd response data (12 bytes)
10,682,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,683,060 UART: [fwproc] Recv command 0x4d454153
10,691,485 >>> mbox cmd response data (12 bytes)
10,691,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,692,461 UART: [fwproc] Recv command 0x4d454153
10,700,881 >>> mbox cmd response data (12 bytes)
10,702,570 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,843,904 UART: [fwproc] Recv command 0x46574c44
10,846,081 UART: [fwproc] Recv'd Img size: 112032 bytes
14,220,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,297,306 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,357,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,675,253 >>> mbox cmd response: success
14,680,203 UART: [afmc] ++
14,680,790 UART: [afmc] CDI.KEYID = 6
14,681,674 UART: [afmc] SUBJECT.KEYID = 7
14,682,776 UART: [afmc] AUTHORITY.KEYID = 5
17,180,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,262 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,919,333 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,935,397 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,951,039 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,974,452 UART: [afmc] --
18,978,487 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,978,839 UART: [cold-reset] --
18,981,812 UART: [state] Locking Datavault
18,987,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,989,101 UART: [state] Locking ICCM
18,990,711 UART: [exit] Launching FMC @ 0x40000000
18,999,107 UART:
18,999,334 UART: Running Caliptra FMC ...
19,000,428 UART:
19,000,586 UART: [fmc] Received command: 0x1000000A
19,007,126 >>> mbox cmd response data (928 bytes)
19,012,361 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,012,809 UART: [fmc] Received command: 0x10000009
19,014,620 >>> mbox cmd response data (48 bytes)
19,016,757 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,017,220 UART: [fmc] Received command: 0x10000003
19,027,140 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,216,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,420,232 >>> mbox cmd response data (12 bytes)
10,421,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,428,639 >>> mbox cmd response data (12 bytes)
10,429,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,700 >>> mbox cmd response data (12 bytes)
10,437,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,444,953 >>> mbox cmd response data (12 bytes)
10,445,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,881 >>> mbox cmd response data (12 bytes)
10,453,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,460,943 >>> mbox cmd response data (12 bytes)
10,461,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,995 >>> mbox cmd response data (12 bytes)
10,469,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,477,124 >>> mbox cmd response data (12 bytes)
10,478,886 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,447,971 >>> mbox cmd response: success
18,678,159 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,694,312 UART:
18,694,638 UART: Running Caliptra FMC ...
18,695,704 UART:
18,695,853 UART: [fmc] Received command: 0x1000000A
18,702,404 >>> mbox cmd response data (928 bytes)
18,707,799 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,708,268 UART: [fmc] Received command: 0x10000009
18,710,053 >>> mbox cmd response data (48 bytes)
18,712,167 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,712,631 UART: [fmc] Received command: 0x10000003
18,722,577 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,614 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,357 UART: [cold-reset] ++
1,170,927 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,182,429 UART: [idev] Erasing UDS.KEYID = 0
1,199,265 UART: [idev] Sha1 KeyId Algorithm
1,208,215 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,216,004 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,096 UART: [fwproc] Wait for Commands...
1,281,739 UART: [fwproc] Recv command 0x4d454153
1,285,766 >>> mbox cmd response data (12 bytes)
1,285,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,038 UART: [fwproc] Recv command 0x4d454153
1,290,065 >>> mbox cmd response data (12 bytes)
1,290,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,253 UART: [fwproc] Recv command 0x4d454153
1,294,280 >>> mbox cmd response data (12 bytes)
1,294,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,486 UART: [fwproc] Recv command 0x4d454153
1,298,513 >>> mbox cmd response data (12 bytes)
1,298,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,661 UART: [fwproc] Recv command 0x4d454153
1,302,688 >>> mbox cmd response data (12 bytes)
1,302,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,922 UART: [fwproc] Recv command 0x4d454153
1,306,949 >>> mbox cmd response data (12 bytes)
1,306,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,059 UART: [fwproc] Recv command 0x4d454153
1,311,086 >>> mbox cmd response data (12 bytes)
1,311,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,158 UART: [fwproc] Recv command 0x4d454153
1,315,185 >>> mbox cmd response data (12 bytes)
1,315,186 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,315,405 UART: [fwproc] Recv command 0x46574c44
1,316,138 UART: [fwproc] Recv'd Img size: 112032 bytes
2,586,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,551 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,330 >>> mbox cmd response: success
2,776,357 UART: [afmc] ++
2,776,525 UART: [afmc] CDI.KEYID = 6
2,776,888 UART: [afmc] SUBJECT.KEYID = 7
2,777,314 UART: [afmc] AUTHORITY.KEYID = 5
2,813,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,086 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,782 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,681 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,374 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,300 UART: [afmc] --
2,856,404 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,426 UART: [cold-reset] --
2,857,222 UART: [state] Locking Datavault
2,858,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,869 UART: [state] Locking ICCM
2,859,297 UART: [exit] Launching FMC @ 0x40000000
2,864,594 UART:
2,864,610 UART: Running Caliptra FMC ...
2,865,018 UART:
2,865,248 UART: [fmc] Received command: 0x1000000A
2,871,479 >>> mbox cmd response data (928 bytes)
2,871,480 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,509 UART: [fmc] Received command: 0x10000009
2,872,707 >>> mbox cmd response data (48 bytes)
2,872,708 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,737 UART: [fmc] Received command: 0x10000003
2,882,193 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,792 >>> mbox cmd response data (12 bytes)
1,139,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,398 >>> mbox cmd response data (12 bytes)
1,143,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,996 >>> mbox cmd response data (12 bytes)
1,146,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,460 >>> mbox cmd response data (12 bytes)
1,150,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,830 >>> mbox cmd response data (12 bytes)
1,153,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,308 >>> mbox cmd response data (12 bytes)
1,157,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,930 >>> mbox cmd response data (12 bytes)
1,160,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,490 >>> mbox cmd response data (12 bytes)
1,164,491 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,886 >>> mbox cmd response: success
2,677,069 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,683,118 UART:
2,683,134 UART: Running Caliptra FMC ...
2,683,542 UART:
2,683,772 UART: [fmc] Received command: 0x1000000A
2,690,003 >>> mbox cmd response data (928 bytes)
2,690,004 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,690,033 UART: [fmc] Received command: 0x10000009
2,691,231 >>> mbox cmd response data (48 bytes)
2,691,232 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,691,261 UART: [fmc] Received command: 0x10000003
2,700,717 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,771 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,792 UART: [idev] ++
1,173,960 UART: [idev] CDI.KEYID = 6
1,174,321 UART: [idev] SUBJECT.KEYID = 7
1,174,746 UART: [idev] UDS.KEYID = 0
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,678 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,301 UART: [ldev] SUBJECT.KEYID = 5
1,210,728 UART: [ldev] AUTHORITY.KEYID = 7
1,211,191 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,515 UART: [ldev] --
1,283,023 UART: [fwproc] Wait for Commands...
1,283,664 UART: [fwproc] Recv command 0x4d454153
1,287,691 >>> mbox cmd response data (12 bytes)
1,287,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,797 UART: [fwproc] Recv command 0x4d454153
1,291,824 >>> mbox cmd response data (12 bytes)
1,291,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,036 UART: [fwproc] Recv command 0x4d454153
1,296,063 >>> mbox cmd response data (12 bytes)
1,296,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,371 UART: [fwproc] Recv command 0x4d454153
1,300,398 >>> mbox cmd response data (12 bytes)
1,300,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,542 UART: [fwproc] Recv command 0x4d454153
1,304,569 >>> mbox cmd response data (12 bytes)
1,304,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,793 UART: [fwproc] Recv command 0x4d454153
1,308,820 >>> mbox cmd response data (12 bytes)
1,308,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,912 UART: [fwproc] Recv command 0x4d454153
1,312,939 >>> mbox cmd response data (12 bytes)
1,312,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,087 UART: [fwproc] Recv command 0x4d454153
1,317,114 >>> mbox cmd response data (12 bytes)
1,317,115 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,317,286 UART: [fwproc] Recv command 0x46574c44
1,318,019 UART: [fwproc] Recv'd Img size: 112032 bytes
2,589,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,236 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,827 >>> mbox cmd response: success
2,779,998 UART: [afmc] ++
2,780,166 UART: [afmc] CDI.KEYID = 6
2,780,529 UART: [afmc] SUBJECT.KEYID = 7
2,780,955 UART: [afmc] AUTHORITY.KEYID = 5
2,816,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,091 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,787 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,686 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,379 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,237 UART: [afmc] --
2,860,139 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,860,161 UART: [cold-reset] --
2,860,823 UART: [state] Locking Datavault
2,861,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,462 UART: [state] Locking ICCM
2,863,064 UART: [exit] Launching FMC @ 0x40000000
2,868,361 UART:
2,868,377 UART: Running Caliptra FMC ...
2,868,785 UART:
2,869,015 UART: [fmc] Received command: 0x1000000A
2,875,246 >>> mbox cmd response data (928 bytes)
2,875,247 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,276 UART: [fmc] Received command: 0x10000009
2,876,474 >>> mbox cmd response data (48 bytes)
2,876,475 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,504 UART: [fmc] Received command: 0x10000003
2,885,960 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,957 >>> mbox cmd response data (12 bytes)
1,138,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,327 >>> mbox cmd response data (12 bytes)
1,142,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,741 >>> mbox cmd response data (12 bytes)
1,145,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,121 >>> mbox cmd response data (12 bytes)
1,149,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,719 >>> mbox cmd response data (12 bytes)
1,152,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,137 >>> mbox cmd response data (12 bytes)
1,156,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,591 >>> mbox cmd response data (12 bytes)
1,159,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,077 >>> mbox cmd response data (12 bytes)
1,163,078 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,620,443 >>> mbox cmd response: success
2,676,304 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,385 UART:
2,682,401 UART: Running Caliptra FMC ...
2,682,809 UART:
2,683,039 UART: [fmc] Received command: 0x1000000A
2,689,270 >>> mbox cmd response data (928 bytes)
2,689,271 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,300 UART: [fmc] Received command: 0x10000009
2,690,498 >>> mbox cmd response data (48 bytes)
2,690,499 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,528 UART: [fmc] Received command: 0x10000003
2,699,984 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,411 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,341 UART: [fwproc] Recv command 0x4d454153
1,285,368 >>> mbox cmd response data (12 bytes)
1,285,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,586 UART: [fwproc] Recv command 0x4d454153
1,289,613 >>> mbox cmd response data (12 bytes)
1,289,614 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,911 UART: [fwproc] Recv command 0x4d454153
1,293,938 >>> mbox cmd response data (12 bytes)
1,293,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,218 UART: [fwproc] Recv command 0x4d454153
1,298,245 >>> mbox cmd response data (12 bytes)
1,298,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,331 UART: [fwproc] Recv command 0x4d454153
1,302,358 >>> mbox cmd response data (12 bytes)
1,302,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,612 UART: [fwproc] Recv command 0x4d454153
1,306,639 >>> mbox cmd response data (12 bytes)
1,306,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,909 UART: [fwproc] Recv command 0x4d454153
1,310,936 >>> mbox cmd response data (12 bytes)
1,310,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,082 UART: [fwproc] Recv command 0x4d454153
1,315,109 >>> mbox cmd response data (12 bytes)
1,315,110 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,315,197 UART: [fwproc] Recv command 0x46574c44
1,315,930 UART: [fwproc] Recv'd Img size: 112032 bytes
2,585,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,911 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,598 >>> mbox cmd response: success
2,774,855 UART: [afmc] ++
2,775,023 UART: [afmc] CDI.KEYID = 6
2,775,386 UART: [afmc] SUBJECT.KEYID = 7
2,775,812 UART: [afmc] AUTHORITY.KEYID = 5
2,810,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,912 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,833,608 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,839,507 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,845,200 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,853,006 UART: [afmc] --
2,854,014 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,854,036 UART: [cold-reset] --
2,854,730 UART: [state] Locking Datavault
2,855,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,491 UART: [state] Locking ICCM
2,857,157 UART: [exit] Launching FMC @ 0x40000000
2,862,454 UART:
2,862,470 UART: Running Caliptra FMC ...
2,862,878 UART:
2,863,108 UART: [fmc] Received command: 0x1000000A
2,869,339 >>> mbox cmd response data (928 bytes)
2,869,340 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,869,369 UART: [fmc] Received command: 0x10000009
2,870,567 >>> mbox cmd response data (48 bytes)
2,870,568 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,597 UART: [fmc] Received command: 0x10000003
2,880,053 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,174 >>> mbox cmd response data (12 bytes)
1,139,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,624 >>> mbox cmd response data (12 bytes)
1,142,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,038 >>> mbox cmd response data (12 bytes)
1,146,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,440 >>> mbox cmd response data (12 bytes)
1,149,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,814 >>> mbox cmd response data (12 bytes)
1,152,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,226 >>> mbox cmd response data (12 bytes)
1,156,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,642 >>> mbox cmd response data (12 bytes)
1,159,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,148 >>> mbox cmd response data (12 bytes)
1,163,149 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,618,530 >>> mbox cmd response: success
2,674,299 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,116 UART:
2,680,132 UART: Running Caliptra FMC ...
2,680,540 UART:
2,680,770 UART: [fmc] Received command: 0x1000000A
2,687,001 >>> mbox cmd response data (928 bytes)
2,687,002 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,031 UART: [fmc] Received command: 0x10000009
2,688,229 >>> mbox cmd response data (48 bytes)
2,688,230 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,259 UART: [fmc] Received command: 0x10000003
2,697,715 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,319 UART: [ldev] SUBJECT.KEYID = 5
1,210,746 UART: [ldev] AUTHORITY.KEYID = 7
1,211,209 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x4d454153
1,286,875 >>> mbox cmd response data (12 bytes)
1,286,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,047 UART: [fwproc] Recv command 0x4d454153
1,291,074 >>> mbox cmd response data (12 bytes)
1,291,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,388 UART: [fwproc] Recv command 0x4d454153
1,295,415 >>> mbox cmd response data (12 bytes)
1,295,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,623 UART: [fwproc] Recv command 0x4d454153
1,299,650 >>> mbox cmd response data (12 bytes)
1,299,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,734 UART: [fwproc] Recv command 0x4d454153
1,303,761 >>> mbox cmd response data (12 bytes)
1,303,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,979 UART: [fwproc] Recv command 0x4d454153
1,308,006 >>> mbox cmd response data (12 bytes)
1,308,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,086 UART: [fwproc] Recv command 0x4d454153
1,312,113 >>> mbox cmd response data (12 bytes)
1,312,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,299 UART: [fwproc] Recv command 0x4d454153
1,316,326 >>> mbox cmd response data (12 bytes)
1,316,327 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,316,430 UART: [fwproc] Recv command 0x46574c44
1,317,163 UART: [fwproc] Recv'd Img size: 112032 bytes
2,586,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,690 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,349 >>> mbox cmd response: success
2,777,558 UART: [afmc] ++
2,777,726 UART: [afmc] CDI.KEYID = 6
2,778,089 UART: [afmc] SUBJECT.KEYID = 7
2,778,515 UART: [afmc] AUTHORITY.KEYID = 5
2,814,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,427 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,123 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,022 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,715 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,315 UART: [afmc] --
2,857,369 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,391 UART: [cold-reset] --
2,858,465 UART: [state] Locking Datavault
2,859,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,064 UART: [state] Locking ICCM
2,860,736 UART: [exit] Launching FMC @ 0x40000000
2,866,033 UART:
2,866,049 UART: Running Caliptra FMC ...
2,866,457 UART:
2,866,687 UART: [fmc] Received command: 0x1000000A
2,872,918 >>> mbox cmd response data (928 bytes)
2,872,919 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,948 UART: [fmc] Received command: 0x10000009
2,874,146 >>> mbox cmd response data (48 bytes)
2,874,147 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,176 UART: [fmc] Received command: 0x10000003
2,883,632 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,903 >>> mbox cmd response data (12 bytes)
1,139,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,405 >>> mbox cmd response data (12 bytes)
1,143,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,875 >>> mbox cmd response data (12 bytes)
1,146,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,405 >>> mbox cmd response data (12 bytes)
1,150,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,919 >>> mbox cmd response data (12 bytes)
1,153,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,429 >>> mbox cmd response data (12 bytes)
1,157,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,037 >>> mbox cmd response data (12 bytes)
1,161,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,525 >>> mbox cmd response data (12 bytes)
1,164,526 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,619,949 >>> mbox cmd response: success
2,676,508 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,597 UART:
2,682,613 UART: Running Caliptra FMC ...
2,683,021 UART:
2,683,251 UART: [fmc] Received command: 0x1000000A
2,689,482 >>> mbox cmd response data (928 bytes)
2,689,483 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,512 UART: [fmc] Received command: 0x10000009
2,690,710 >>> mbox cmd response data (48 bytes)
2,690,711 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,740 UART: [fmc] Received command: 0x10000003
2,700,196 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,182,189 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,251 UART: [idev] --
1,209,178 UART: [ldev] ++
1,209,346 UART: [ldev] CDI.KEYID = 6
1,209,710 UART: [ldev] SUBJECT.KEYID = 5
1,210,137 UART: [ldev] AUTHORITY.KEYID = 7
1,210,600 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,094 UART: [ldev] --
1,281,424 UART: [fwproc] Wait for Commands...
1,282,235 UART: [fwproc] Recv command 0x4d454153
1,286,262 >>> mbox cmd response data (12 bytes)
1,286,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,428 UART: [fwproc] Recv command 0x4d454153
1,290,455 >>> mbox cmd response data (12 bytes)
1,290,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,619 UART: [fwproc] Recv command 0x4d454153
1,294,646 >>> mbox cmd response data (12 bytes)
1,294,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,790 UART: [fwproc] Recv command 0x4d454153
1,298,817 >>> mbox cmd response data (12 bytes)
1,298,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,105 UART: [fwproc] Recv command 0x4d454153
1,303,132 >>> mbox cmd response data (12 bytes)
1,303,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,288 UART: [fwproc] Recv command 0x4d454153
1,307,315 >>> mbox cmd response data (12 bytes)
1,307,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,495 UART: [fwproc] Recv command 0x4d454153
1,311,522 >>> mbox cmd response data (12 bytes)
1,311,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,830 UART: [fwproc] Recv command 0x4d454153
1,315,857 >>> mbox cmd response data (12 bytes)
1,315,858 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,316,021 UART: [fwproc] Recv command 0x46574c44
1,316,754 UART: [fwproc] Recv'd Img size: 112032 bytes
2,588,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,451 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,230 >>> mbox cmd response: success
2,778,299 UART: [afmc] ++
2,778,467 UART: [afmc] CDI.KEYID = 6
2,778,830 UART: [afmc] SUBJECT.KEYID = 7
2,779,256 UART: [afmc] AUTHORITY.KEYID = 5
2,814,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,006 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,702 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,601 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,294 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,106 UART: [afmc] --
2,857,968 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,990 UART: [cold-reset] --
2,858,876 UART: [state] Locking Datavault
2,860,057 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,661 UART: [state] Locking ICCM
2,861,141 UART: [exit] Launching FMC @ 0x40000000
2,866,438 UART:
2,866,454 UART: Running Caliptra FMC ...
2,866,862 UART:
2,867,092 UART: [fmc] Received command: 0x1000000A
2,873,323 >>> mbox cmd response data (928 bytes)
2,873,324 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,353 UART: [fmc] Received command: 0x10000009
2,874,551 >>> mbox cmd response data (48 bytes)
2,874,552 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,581 UART: [fmc] Received command: 0x10000003
2,884,037 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,954 >>> mbox cmd response data (12 bytes)
1,138,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,428 >>> mbox cmd response data (12 bytes)
1,142,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,048 >>> mbox cmd response data (12 bytes)
1,146,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,506 >>> mbox cmd response data (12 bytes)
1,149,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,054 >>> mbox cmd response data (12 bytes)
1,153,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,552 >>> mbox cmd response data (12 bytes)
1,156,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,124 >>> mbox cmd response data (12 bytes)
1,160,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,694 >>> mbox cmd response data (12 bytes)
1,163,695 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,620,180 >>> mbox cmd response: success
2,675,741 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,681,934 UART:
2,681,950 UART: Running Caliptra FMC ...
2,682,358 UART:
2,682,588 UART: [fmc] Received command: 0x1000000A
2,688,819 >>> mbox cmd response data (928 bytes)
2,688,820 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,849 UART: [fmc] Received command: 0x10000009
2,690,047 >>> mbox cmd response data (48 bytes)
2,690,048 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,077 UART: [fmc] Received command: 0x10000003
2,699,533 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,342 UART: [kat] SHA2-256
902,282 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,439 UART: [kat] LMS
1,169,751 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,106 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x4d454153
1,286,729 >>> mbox cmd response data (12 bytes)
1,286,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,797 UART: [fwproc] Recv command 0x4d454153
1,290,824 >>> mbox cmd response data (12 bytes)
1,290,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,976 UART: [fwproc] Recv command 0x4d454153
1,295,003 >>> mbox cmd response data (12 bytes)
1,295,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,127 UART: [fwproc] Recv command 0x4d454153
1,299,154 >>> mbox cmd response data (12 bytes)
1,299,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,260 UART: [fwproc] Recv command 0x4d454153
1,303,287 >>> mbox cmd response data (12 bytes)
1,303,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,441 UART: [fwproc] Recv command 0x4d454153
1,307,468 >>> mbox cmd response data (12 bytes)
1,307,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,646 UART: [fwproc] Recv command 0x4d454153
1,311,673 >>> mbox cmd response data (12 bytes)
1,311,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,987 UART: [fwproc] Recv command 0x4d454153
1,316,014 >>> mbox cmd response data (12 bytes)
1,316,015 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,316,180 UART: [fwproc] Recv command 0x46574c44
1,316,913 UART: [fwproc] Recv'd Img size: 112032 bytes
2,588,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,942 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,727 >>> mbox cmd response: success
2,778,776 UART: [afmc] ++
2,778,944 UART: [afmc] CDI.KEYID = 6
2,779,307 UART: [afmc] SUBJECT.KEYID = 7
2,779,733 UART: [afmc] AUTHORITY.KEYID = 5
2,814,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,133 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,829 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,728 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,421 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,151 UART: [afmc] --
2,858,179 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,858,201 UART: [cold-reset] --
2,859,051 UART: [state] Locking Datavault
2,860,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,820 UART: [state] Locking ICCM
2,861,452 UART: [exit] Launching FMC @ 0x40000000
2,866,749 UART:
2,866,765 UART: Running Caliptra FMC ...
2,867,173 UART:
2,867,403 UART: [fmc] Received command: 0x1000000A
2,873,634 >>> mbox cmd response data (928 bytes)
2,873,635 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,664 UART: [fmc] Received command: 0x10000009
2,874,862 >>> mbox cmd response data (48 bytes)
2,874,863 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,892 UART: [fmc] Received command: 0x10000003
2,884,348 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,639 >>> mbox cmd response data (12 bytes)
1,140,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,217 >>> mbox cmd response data (12 bytes)
1,144,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,717 >>> mbox cmd response data (12 bytes)
1,147,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,327 >>> mbox cmd response data (12 bytes)
1,151,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,729 >>> mbox cmd response data (12 bytes)
1,154,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,199 >>> mbox cmd response data (12 bytes)
1,158,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,617 >>> mbox cmd response data (12 bytes)
1,161,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,103 >>> mbox cmd response data (12 bytes)
1,165,104 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,219 >>> mbox cmd response: success
2,677,960 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,683,997 UART:
2,684,013 UART: Running Caliptra FMC ...
2,684,421 UART:
2,684,651 UART: [fmc] Received command: 0x1000000A
2,690,882 >>> mbox cmd response data (928 bytes)
2,690,883 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,690,912 UART: [fmc] Received command: 0x10000009
2,692,110 >>> mbox cmd response data (48 bytes)
2,692,111 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,692,140 UART: [fmc] Received command: 0x10000003
2,701,596 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
4,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,921 UART:
193,318 UART: Running Caliptra ROM ...
194,510 UART:
194,662 UART: [state] CFI Enabled
260,462 UART: [state] LifecycleState = Unprovisioned
262,876 UART: [state] DebugLocked = No
264,661 UART: [state] WD Timer not started. Device not locked for debugging
268,793 UART: [kat] SHA2-256
450,714 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,235 UART: [kat] ++
462,825 UART: [kat] sha1
472,522 UART: [kat] SHA2-256
475,576 UART: [kat] SHA2-384
481,327 UART: [kat] SHA2-512-ACC
483,928 UART: [kat] ECC-384
3,777,746 UART: [kat] HMAC-384Kdf
3,801,162 UART: [kat] LMS
4,874,315 UART: [kat] --
4,880,977 UART: [cold-reset] ++
4,882,952 UART: [fht] FHT @ 0x50003400
4,893,833 UART: [idev] ++
4,894,566 UART: [idev] CDI.KEYID = 6
4,895,671 UART: [idev] SUBJECT.KEYID = 7
4,896,885 UART: [idev] UDS.KEYID = 0
4,928,063 UART: [idev] Erasing UDS.KEYID = 0
8,243,302 UART: [idev] Sha1 KeyId Algorithm
8,265,035 UART: [idev] --
8,268,811 UART: [ldev] ++
8,269,376 UART: [ldev] CDI.KEYID = 6
8,270,610 UART: [ldev] SUBJECT.KEYID = 5
8,271,768 UART: [ldev] AUTHORITY.KEYID = 7
8,272,960 UART: [ldev] FE.KEYID = 1
8,316,097 UART: [ldev] Erasing FE.KEYID = 1
11,650,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,077 UART: [ldev] --
14,032,883 UART: [fwproc] Wait for Commands...
14,035,582 UART: [fwproc] Recv command 0x4d454153
14,044,598 >>> mbox cmd response data (12 bytes)
14,045,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,047,342 UART: [fwproc] Recv command 0x4d454153
14,056,310 >>> mbox cmd response data (12 bytes)
14,056,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,057,912 UART: [fwproc] Recv command 0x4d454153
14,066,877 >>> mbox cmd response data (12 bytes)
14,067,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,068,582 UART: [fwproc] Recv command 0x4d454153
14,077,440 >>> mbox cmd response data (12 bytes)
14,077,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,079,242 UART: [fwproc] Recv command 0x4d454153
14,088,123 >>> mbox cmd response data (12 bytes)
14,088,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,089,263 UART: [fwproc] Recv command 0x4d454153
14,098,179 >>> mbox cmd response data (12 bytes)
14,098,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,100,412 UART: [fwproc] Recv command 0x4d454153
14,109,324 >>> mbox cmd response data (12 bytes)
14,109,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,111,142 UART: [fwproc] Recv command 0x4d454153
14,119,996 >>> mbox cmd response data (12 bytes)
14,120,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,121,114 UART: [fwproc] Recv command 0x4d454153
14,123,451 UART: [fwproc] Max # of measurements received.
14,125,281 >>> mbox cmd response: failed
14,128,686 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,828,960 >>> mbox cmd response data (12 bytes)
13,830,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,838,304 >>> mbox cmd response data (12 bytes)
13,838,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,846,877 >>> mbox cmd response data (12 bytes)
13,847,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,855,156 >>> mbox cmd response data (12 bytes)
13,855,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,863,276 >>> mbox cmd response data (12 bytes)
13,863,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,871,138 >>> mbox cmd response data (12 bytes)
13,871,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,879,426 >>> mbox cmd response data (12 bytes)
13,879,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,887,357 >>> mbox cmd response data (12 bytes)
13,887,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,889,196 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,413 UART:
192,799 UART: Running Caliptra ROM ...
193,981 UART:
603,745 UART: [state] CFI Enabled
619,393 UART: [state] LifecycleState = Unprovisioned
621,750 UART: [state] DebugLocked = No
623,015 UART: [state] WD Timer not started. Device not locked for debugging
628,262 UART: [kat] SHA2-256
810,288 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,813 UART: [kat] ++
822,309 UART: [kat] sha1
833,201 UART: [kat] SHA2-256
836,245 UART: [kat] SHA2-384
842,766 UART: [kat] SHA2-512-ACC
845,431 UART: [kat] ECC-384
4,100,641 UART: [kat] HMAC-384Kdf
4,111,495 UART: [kat] LMS
5,184,647 UART: [kat] --
5,189,606 UART: [cold-reset] ++
5,191,920 UART: [fht] FHT @ 0x50003400
5,202,301 UART: [idev] ++
5,202,851 UART: [idev] CDI.KEYID = 6
5,204,012 UART: [idev] SUBJECT.KEYID = 7
5,205,544 UART: [idev] UDS.KEYID = 0
5,223,271 UART: [idev] Erasing UDS.KEYID = 0
8,497,595 UART: [idev] Sha1 KeyId Algorithm
8,519,589 UART: [idev] --
8,523,399 UART: [ldev] ++
8,523,970 UART: [ldev] CDI.KEYID = 6
8,525,150 UART: [ldev] SUBJECT.KEYID = 5
8,526,634 UART: [ldev] AUTHORITY.KEYID = 7
8,528,188 UART: [ldev] FE.KEYID = 1
8,540,828 UART: [ldev] Erasing FE.KEYID = 1
11,834,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,146,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,162,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,178,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,599 UART: [ldev] --
14,204,592 UART: [fwproc] Wait for Commands...
14,206,849 UART: [fwproc] Recv command 0x4d454153
14,215,871 >>> mbox cmd response data (12 bytes)
14,216,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,217,094 UART: [fwproc] Recv command 0x4d454153
14,226,074 >>> mbox cmd response data (12 bytes)
14,226,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,228,355 UART: [fwproc] Recv command 0x4d454153
14,237,271 >>> mbox cmd response data (12 bytes)
14,237,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,239,151 UART: [fwproc] Recv command 0x4d454153
14,248,029 >>> mbox cmd response data (12 bytes)
14,248,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,248,945 UART: [fwproc] Recv command 0x4d454153
14,257,860 >>> mbox cmd response data (12 bytes)
14,258,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,258,920 UART: [fwproc] Recv command 0x4d454153
14,267,816 >>> mbox cmd response data (12 bytes)
14,268,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,269,510 UART: [fwproc] Recv command 0x4d454153
14,278,439 >>> mbox cmd response data (12 bytes)
14,278,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,280,120 UART: [fwproc] Recv command 0x4d454153
14,289,034 >>> mbox cmd response data (12 bytes)
14,289,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,290,610 UART: [fwproc] Recv command 0x4d454153
14,292,878 UART: [fwproc] Max # of measurements received.
14,294,777 >>> mbox cmd response: failed
14,296,337 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
6,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,019,298 >>> mbox cmd response data (12 bytes)
14,020,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,027,606 >>> mbox cmd response data (12 bytes)
14,028,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,035,630 >>> mbox cmd response data (12 bytes)
14,036,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,044,114 >>> mbox cmd response data (12 bytes)
14,044,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,051,739 >>> mbox cmd response data (12 bytes)
14,052,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,059,488 >>> mbox cmd response data (12 bytes)
14,059,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,067,677 >>> mbox cmd response data (12 bytes)
14,068,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,075,797 >>> mbox cmd response data (12 bytes)
14,076,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,077,076 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,414 UART:
192,790 UART: Running Caliptra ROM ...
193,914 UART:
194,061 UART: [state] CFI Enabled
265,349 UART: [state] LifecycleState = Unprovisioned
267,237 UART: [state] DebugLocked = No
268,996 UART: [state] WD Timer not started. Device not locked for debugging
273,578 UART: [kat] SHA2-256
452,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,277 UART: [kat] ++
464,811 UART: [kat] sha1
476,236 UART: [kat] SHA2-256
479,247 UART: [kat] SHA2-384
484,611 UART: [kat] SHA2-512-ACC
487,547 UART: [kat] ECC-384
2,945,132 UART: [kat] HMAC-384Kdf
2,969,256 UART: [kat] LMS
3,498,715 UART: [kat] --
3,503,057 UART: [cold-reset] ++
3,503,917 UART: [fht] FHT @ 0x50003400
3,514,789 UART: [idev] ++
3,515,353 UART: [idev] CDI.KEYID = 6
3,516,258 UART: [idev] SUBJECT.KEYID = 7
3,517,490 UART: [idev] UDS.KEYID = 0
3,541,834 UART: [idev] Erasing UDS.KEYID = 0
6,025,487 UART: [idev] Sha1 KeyId Algorithm
6,048,182 UART: [idev] --
6,052,667 UART: [ldev] ++
6,053,243 UART: [ldev] CDI.KEYID = 6
6,054,156 UART: [ldev] SUBJECT.KEYID = 5
6,055,259 UART: [ldev] AUTHORITY.KEYID = 7
6,056,546 UART: [ldev] FE.KEYID = 1
6,098,691 UART: [ldev] Erasing FE.KEYID = 1
8,600,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,093 UART: [ldev] --
10,391,735 UART: [fwproc] Wait for Commands...
10,394,648 UART: [fwproc] Recv command 0x4d454153
10,403,144 >>> mbox cmd response data (12 bytes)
10,403,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,405,720 UART: [fwproc] Recv command 0x4d454153
10,414,211 >>> mbox cmd response data (12 bytes)
10,414,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,415,470 UART: [fwproc] Recv command 0x4d454153
10,423,951 >>> mbox cmd response data (12 bytes)
10,424,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,425,785 UART: [fwproc] Recv command 0x4d454153
10,434,214 >>> mbox cmd response data (12 bytes)
10,434,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,435,937 UART: [fwproc] Recv command 0x4d454153
10,444,363 >>> mbox cmd response data (12 bytes)
10,444,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,446,542 UART: [fwproc] Recv command 0x4d454153
10,455,023 >>> mbox cmd response data (12 bytes)
10,455,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,910 UART: [fwproc] Recv command 0x4d454153
10,465,396 >>> mbox cmd response data (12 bytes)
10,465,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,467,401 UART: [fwproc] Recv command 0x4d454153
10,475,830 >>> mbox cmd response data (12 bytes)
10,476,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,477,724 UART: [fwproc] Recv command 0x4d454153
10,479,883 UART: [fwproc] Max # of measurements received.
10,481,675 >>> mbox cmd response: failed
10,484,050 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,186,355 >>> mbox cmd response data (12 bytes)
10,187,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,194,512 >>> mbox cmd response data (12 bytes)
10,194,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,202,915 >>> mbox cmd response data (12 bytes)
10,203,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,210,787 >>> mbox cmd response data (12 bytes)
10,211,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,218,656 >>> mbox cmd response data (12 bytes)
10,219,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,226,499 >>> mbox cmd response data (12 bytes)
10,226,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,234,661 >>> mbox cmd response data (12 bytes)
10,235,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,243,528 >>> mbox cmd response data (12 bytes)
10,243,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,245,458 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,271 UART:
192,641 UART: Running Caliptra ROM ...
193,762 UART:
603,295 UART: [state] CFI Enabled
617,378 UART: [state] LifecycleState = Unprovisioned
619,235 UART: [state] DebugLocked = No
620,717 UART: [state] WD Timer not started. Device not locked for debugging
624,194 UART: [kat] SHA2-256
803,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,891 UART: [kat] ++
815,435 UART: [kat] sha1
825,563 UART: [kat] SHA2-256
828,622 UART: [kat] SHA2-384
834,292 UART: [kat] SHA2-512-ACC
837,213 UART: [kat] ECC-384
3,280,866 UART: [kat] HMAC-384Kdf
3,293,526 UART: [kat] LMS
3,822,980 UART: [kat] --
3,828,153 UART: [cold-reset] ++
3,830,025 UART: [fht] FHT @ 0x50003400
3,841,115 UART: [idev] ++
3,841,672 UART: [idev] CDI.KEYID = 6
3,842,683 UART: [idev] SUBJECT.KEYID = 7
3,843,781 UART: [idev] UDS.KEYID = 0
3,859,263 UART: [idev] Erasing UDS.KEYID = 0
6,316,423 UART: [idev] Sha1 KeyId Algorithm
6,338,890 UART: [idev] --
6,341,208 UART: [ldev] ++
6,341,773 UART: [ldev] CDI.KEYID = 6
6,342,737 UART: [ldev] SUBJECT.KEYID = 5
6,343,895 UART: [ldev] AUTHORITY.KEYID = 7
6,345,121 UART: [ldev] FE.KEYID = 1
6,354,098 UART: [ldev] Erasing FE.KEYID = 1
8,830,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,869 UART: [ldev] --
10,618,645 UART: [fwproc] Wait for Commands...
10,621,652 UART: [fwproc] Recv command 0x4d454153
10,630,145 >>> mbox cmd response data (12 bytes)
10,630,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,632,113 UART: [fwproc] Recv command 0x4d454153
10,640,651 >>> mbox cmd response data (12 bytes)
10,641,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,642,073 UART: [fwproc] Recv command 0x4d454153
10,650,554 >>> mbox cmd response data (12 bytes)
10,650,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,652,068 UART: [fwproc] Recv command 0x4d454153
10,660,542 >>> mbox cmd response data (12 bytes)
10,660,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,661,729 UART: [fwproc] Recv command 0x4d454153
10,670,172 >>> mbox cmd response data (12 bytes)
10,670,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,671,172 UART: [fwproc] Recv command 0x4d454153
10,679,603 >>> mbox cmd response data (12 bytes)
10,680,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,681,655 UART: [fwproc] Recv command 0x4d454153
10,690,082 >>> mbox cmd response data (12 bytes)
10,690,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,691,674 UART: [fwproc] Recv command 0x4d454153
10,700,152 >>> mbox cmd response data (12 bytes)
10,700,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,701,297 UART: [fwproc] Recv command 0x4d454153
10,703,341 UART: [fwproc] Max # of measurements received.
10,705,165 >>> mbox cmd response: failed
10,707,435 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
4,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,348 >>> mbox cmd response data (12 bytes)
10,414,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,001 >>> mbox cmd response data (12 bytes)
10,422,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,429,464 >>> mbox cmd response data (12 bytes)
10,429,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,983 >>> mbox cmd response data (12 bytes)
10,437,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,444,802 >>> mbox cmd response data (12 bytes)
10,445,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,261 >>> mbox cmd response data (12 bytes)
10,452,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,460,015 >>> mbox cmd response data (12 bytes)
10,460,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,467,439 >>> mbox cmd response data (12 bytes)
10,467,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,674 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,304 UART:
192,677 UART: Running Caliptra ROM ...
193,877 UART:
194,031 UART: [state] CFI Enabled
263,802 UART: [state] LifecycleState = Unprovisioned
265,698 UART: [state] DebugLocked = No
268,114 UART: [state] WD Timer not started. Device not locked for debugging
271,605 UART: [kat] SHA2-256
450,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,295 UART: [kat] ++
462,825 UART: [kat] sha1
474,798 UART: [kat] SHA2-256
477,803 UART: [kat] SHA2-384
484,393 UART: [kat] SHA2-512-ACC
487,330 UART: [kat] ECC-384
2,947,207 UART: [kat] HMAC-384Kdf
2,968,580 UART: [kat] LMS
3,498,014 UART: [kat] --
3,502,086 UART: [cold-reset] ++
3,504,622 UART: [fht] FHT @ 0x50003400
3,516,188 UART: [idev] ++
3,516,791 UART: [idev] CDI.KEYID = 6
3,517,707 UART: [idev] SUBJECT.KEYID = 7
3,518,922 UART: [idev] UDS.KEYID = 0
3,541,055 UART: [idev] Erasing UDS.KEYID = 0
6,022,354 UART: [idev] Sha1 KeyId Algorithm
6,044,457 UART: [idev] --
6,047,962 UART: [ldev] ++
6,048,536 UART: [ldev] CDI.KEYID = 6
6,049,444 UART: [ldev] SUBJECT.KEYID = 5
6,050,606 UART: [ldev] AUTHORITY.KEYID = 7
6,051,894 UART: [ldev] FE.KEYID = 1
6,098,194 UART: [ldev] Erasing FE.KEYID = 1
8,604,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,143 UART: [ldev] --
10,400,091 UART: [fwproc] Wait for Commands...
10,402,959 UART: [fwproc] Recv command 0x4d454153
10,411,499 >>> mbox cmd response data (12 bytes)
10,412,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,373 UART: [fwproc] Recv command 0x4d454153
10,421,867 >>> mbox cmd response data (12 bytes)
10,422,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,456 UART: [fwproc] Recv command 0x4d454153
10,431,934 >>> mbox cmd response data (12 bytes)
10,432,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,663 UART: [fwproc] Recv command 0x4d454153
10,442,113 >>> mbox cmd response data (12 bytes)
10,442,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,422 UART: [fwproc] Recv command 0x4d454153
10,451,852 >>> mbox cmd response data (12 bytes)
10,452,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,982 UART: [fwproc] Recv command 0x4d454153
10,461,403 >>> mbox cmd response data (12 bytes)
10,461,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,570 UART: [fwproc] Recv command 0x4d454153
10,471,998 >>> mbox cmd response data (12 bytes)
10,472,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,473,249 UART: [fwproc] Recv command 0x4d454153
10,481,713 >>> mbox cmd response data (12 bytes)
10,482,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,483,041 UART: [fwproc] Recv command 0x4d454153
10,485,151 UART: [fwproc] Max # of measurements received.
10,487,005 >>> mbox cmd response: failed
10,488,898 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,194,210 >>> mbox cmd response data (12 bytes)
10,195,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,202,739 >>> mbox cmd response data (12 bytes)
10,203,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,210,817 >>> mbox cmd response data (12 bytes)
10,211,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,218,921 >>> mbox cmd response data (12 bytes)
10,219,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,227,099 >>> mbox cmd response data (12 bytes)
10,227,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,234,450 >>> mbox cmd response data (12 bytes)
10,234,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,242,007 >>> mbox cmd response data (12 bytes)
10,242,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,249,374 >>> mbox cmd response data (12 bytes)
10,249,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,251,561 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,450 UART:
192,839 UART: Running Caliptra ROM ...
193,955 UART:
603,508 UART: [state] CFI Enabled
618,539 UART: [state] LifecycleState = Unprovisioned
620,398 UART: [state] DebugLocked = No
621,821 UART: [state] WD Timer not started. Device not locked for debugging
626,288 UART: [kat] SHA2-256
805,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,003 UART: [kat] ++
817,542 UART: [kat] sha1
829,085 UART: [kat] SHA2-256
832,147 UART: [kat] SHA2-384
838,228 UART: [kat] SHA2-512-ACC
841,205 UART: [kat] ECC-384
3,281,651 UART: [kat] HMAC-384Kdf
3,294,745 UART: [kat] LMS
3,824,216 UART: [kat] --
3,827,938 UART: [cold-reset] ++
3,830,401 UART: [fht] FHT @ 0x50003400
3,841,973 UART: [idev] ++
3,842,531 UART: [idev] CDI.KEYID = 6
3,843,541 UART: [idev] SUBJECT.KEYID = 7
3,844,713 UART: [idev] UDS.KEYID = 0
3,860,525 UART: [idev] Erasing UDS.KEYID = 0
6,316,025 UART: [idev] Sha1 KeyId Algorithm
6,338,879 UART: [idev] --
6,343,787 UART: [ldev] ++
6,344,350 UART: [ldev] CDI.KEYID = 6
6,345,252 UART: [ldev] SUBJECT.KEYID = 5
6,346,461 UART: [ldev] AUTHORITY.KEYID = 7
6,347,695 UART: [ldev] FE.KEYID = 1
6,358,120 UART: [ldev] Erasing FE.KEYID = 1
8,833,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,011 UART: [ldev] --
10,626,737 UART: [fwproc] Wait for Commands...
10,628,301 UART: [fwproc] Recv command 0x4d454153
10,636,779 >>> mbox cmd response data (12 bytes)
10,637,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,639,097 UART: [fwproc] Recv command 0x4d454153
10,647,578 >>> mbox cmd response data (12 bytes)
10,647,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,648,836 UART: [fwproc] Recv command 0x4d454153
10,657,371 >>> mbox cmd response data (12 bytes)
10,657,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,658,395 UART: [fwproc] Recv command 0x4d454153
10,666,819 >>> mbox cmd response data (12 bytes)
10,667,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,667,792 UART: [fwproc] Recv command 0x4d454153
10,676,214 >>> mbox cmd response data (12 bytes)
10,676,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,677,152 UART: [fwproc] Recv command 0x4d454153
10,685,601 >>> mbox cmd response data (12 bytes)
10,686,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,687,229 UART: [fwproc] Recv command 0x4d454153
10,695,664 >>> mbox cmd response data (12 bytes)
10,696,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,697,682 UART: [fwproc] Recv command 0x4d454153
10,706,161 >>> mbox cmd response data (12 bytes)
10,706,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,707,529 UART: [fwproc] Recv command 0x4d454153
10,709,634 UART: [fwproc] Max # of measurements received.
10,711,458 >>> mbox cmd response: failed
10,714,158 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
4,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,412,908 >>> mbox cmd response data (12 bytes)
10,413,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,421,467 >>> mbox cmd response data (12 bytes)
10,421,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,429,290 >>> mbox cmd response data (12 bytes)
10,429,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,437,356 >>> mbox cmd response data (12 bytes)
10,437,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,368 >>> mbox cmd response data (12 bytes)
10,445,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,999 >>> mbox cmd response data (12 bytes)
10,453,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,460,676 >>> mbox cmd response data (12 bytes)
10,461,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,313 >>> mbox cmd response data (12 bytes)
10,468,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,638 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,154 UART: [kat] LMS
1,169,466 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,182,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,208,075 UART: [idev] --
1,209,280 UART: [ldev] ++
1,209,448 UART: [ldev] CDI.KEYID = 6
1,209,812 UART: [ldev] SUBJECT.KEYID = 5
1,210,239 UART: [ldev] AUTHORITY.KEYID = 7
1,210,702 UART: [ldev] FE.KEYID = 1
1,215,870 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,925 UART: [fwproc] Recv command 0x4d454153
1,285,952 >>> mbox cmd response data (12 bytes)
1,285,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,218 UART: [fwproc] Recv command 0x4d454153
1,290,245 >>> mbox cmd response data (12 bytes)
1,290,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,351 UART: [fwproc] Recv command 0x4d454153
1,294,378 >>> mbox cmd response data (12 bytes)
1,294,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,678 UART: [fwproc] Recv command 0x4d454153
1,298,705 >>> mbox cmd response data (12 bytes)
1,298,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,777 UART: [fwproc] Recv command 0x4d454153
1,302,804 >>> mbox cmd response data (12 bytes)
1,302,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,980 UART: [fwproc] Recv command 0x4d454153
1,307,007 >>> mbox cmd response data (12 bytes)
1,307,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,275 UART: [fwproc] Recv command 0x4d454153
1,311,302 >>> mbox cmd response data (12 bytes)
1,311,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,364 UART: [fwproc] Recv command 0x4d454153
1,315,391 >>> mbox cmd response data (12 bytes)
1,315,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,667 UART: [fwproc] Recv command 0x4d454153
1,316,410 UART: [fwproc] Max # of measurements received.
1,317,055 >>> mbox cmd response: failed
1,317,413 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,510 >>> mbox cmd response data (12 bytes)
1,138,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,084 >>> mbox cmd response data (12 bytes)
1,142,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,504 >>> mbox cmd response data (12 bytes)
1,145,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,926 >>> mbox cmd response data (12 bytes)
1,148,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,510 >>> mbox cmd response data (12 bytes)
1,152,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,968 >>> mbox cmd response data (12 bytes)
1,155,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,496 >>> mbox cmd response data (12 bytes)
1,159,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,030 >>> mbox cmd response data (12 bytes)
1,163,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,160 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,093 UART: [kat] SHA2-512-ACC
905,994 UART: [kat] ECC-384
915,701 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,241,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,159 UART: [fwproc] Wait for Commands...
1,281,874 UART: [fwproc] Recv command 0x4d454153
1,285,901 >>> mbox cmd response data (12 bytes)
1,285,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,051 UART: [fwproc] Recv command 0x4d454153
1,290,078 >>> mbox cmd response data (12 bytes)
1,290,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,216 UART: [fwproc] Recv command 0x4d454153
1,294,243 >>> mbox cmd response data (12 bytes)
1,294,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,397 UART: [fwproc] Recv command 0x4d454153
1,298,424 >>> mbox cmd response data (12 bytes)
1,298,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,544 UART: [fwproc] Recv command 0x4d454153
1,302,571 >>> mbox cmd response data (12 bytes)
1,302,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,759 UART: [fwproc] Recv command 0x4d454153
1,306,786 >>> mbox cmd response data (12 bytes)
1,306,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,076 UART: [fwproc] Recv command 0x4d454153
1,311,103 >>> mbox cmd response data (12 bytes)
1,311,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,291 UART: [fwproc] Recv command 0x4d454153
1,315,318 >>> mbox cmd response data (12 bytes)
1,315,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,442 UART: [fwproc] Recv command 0x4d454153
1,316,185 UART: [fwproc] Max # of measurements received.
1,316,830 >>> mbox cmd response: failed
1,317,188 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,305 >>> mbox cmd response data (12 bytes)
1,139,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,875 >>> mbox cmd response data (12 bytes)
1,142,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,323 >>> mbox cmd response data (12 bytes)
1,146,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,919 >>> mbox cmd response data (12 bytes)
1,149,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,507 >>> mbox cmd response data (12 bytes)
1,153,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,029 >>> mbox cmd response data (12 bytes)
1,157,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,541 >>> mbox cmd response data (12 bytes)
1,160,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,975 >>> mbox cmd response data (12 bytes)
1,163,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,257 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,585 UART: [idev] Sha1 KeyId Algorithm
1,208,697 UART: [idev] --
1,209,784 UART: [ldev] ++
1,209,952 UART: [ldev] CDI.KEYID = 6
1,210,316 UART: [ldev] SUBJECT.KEYID = 5
1,210,743 UART: [ldev] AUTHORITY.KEYID = 7
1,211,206 UART: [ldev] FE.KEYID = 1
1,216,266 UART: [ldev] Erasing FE.KEYID = 1
1,243,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,704 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,791 UART: [fwproc] Recv command 0x4d454153
1,286,818 >>> mbox cmd response data (12 bytes)
1,286,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,930 UART: [fwproc] Recv command 0x4d454153
1,290,957 >>> mbox cmd response data (12 bytes)
1,290,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,271 UART: [fwproc] Recv command 0x4d454153
1,295,298 >>> mbox cmd response data (12 bytes)
1,295,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,400 UART: [fwproc] Recv command 0x4d454153
1,299,427 >>> mbox cmd response data (12 bytes)
1,299,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,543 UART: [fwproc] Recv command 0x4d454153
1,303,570 >>> mbox cmd response data (12 bytes)
1,303,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,776 UART: [fwproc] Recv command 0x4d454153
1,307,803 >>> mbox cmd response data (12 bytes)
1,307,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,987 UART: [fwproc] Recv command 0x4d454153
1,312,014 >>> mbox cmd response data (12 bytes)
1,312,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,088 UART: [fwproc] Recv command 0x4d454153
1,316,115 >>> mbox cmd response data (12 bytes)
1,316,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,409 UART: [fwproc] Recv command 0x4d454153
1,317,152 UART: [fwproc] Max # of measurements received.
1,317,797 >>> mbox cmd response: failed
1,318,115 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,430 >>> mbox cmd response data (12 bytes)
1,139,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,898 >>> mbox cmd response data (12 bytes)
1,142,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,348 >>> mbox cmd response data (12 bytes)
1,146,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,930 >>> mbox cmd response data (12 bytes)
1,149,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,504 >>> mbox cmd response data (12 bytes)
1,153,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,114 >>> mbox cmd response data (12 bytes)
1,157,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,734 >>> mbox cmd response data (12 bytes)
1,160,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,132 >>> mbox cmd response data (12 bytes)
1,164,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,396 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,927 UART: [kat] HMAC-384Kdf
921,493 UART: [kat] LMS
1,169,805 UART: [kat] --
1,170,816 UART: [cold-reset] ++
1,171,376 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,020 UART: [idev] Sha1 KeyId Algorithm
1,208,890 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,435 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,858 UART: [fwproc] Recv command 0x4d454153
1,286,885 >>> mbox cmd response data (12 bytes)
1,286,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,033 UART: [fwproc] Recv command 0x4d454153
1,291,060 >>> mbox cmd response data (12 bytes)
1,291,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,362 UART: [fwproc] Recv command 0x4d454153
1,295,389 >>> mbox cmd response data (12 bytes)
1,295,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,639 UART: [fwproc] Recv command 0x4d454153
1,299,666 >>> mbox cmd response data (12 bytes)
1,299,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,744 UART: [fwproc] Recv command 0x4d454153
1,303,771 >>> mbox cmd response data (12 bytes)
1,303,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,873 UART: [fwproc] Recv command 0x4d454153
1,307,900 >>> mbox cmd response data (12 bytes)
1,307,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,130 UART: [fwproc] Recv command 0x4d454153
1,312,157 >>> mbox cmd response data (12 bytes)
1,312,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,367 UART: [fwproc] Recv command 0x4d454153
1,316,394 >>> mbox cmd response data (12 bytes)
1,316,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,612 UART: [fwproc] Recv command 0x4d454153
1,317,355 UART: [fwproc] Max # of measurements received.
1,318,000 >>> mbox cmd response: failed
1,318,464 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,399 >>> mbox cmd response data (12 bytes)
1,140,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,875 >>> mbox cmd response data (12 bytes)
1,143,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,363 >>> mbox cmd response data (12 bytes)
1,147,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,841 >>> mbox cmd response data (12 bytes)
1,150,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,389 >>> mbox cmd response data (12 bytes)
1,154,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,979 >>> mbox cmd response data (12 bytes)
1,157,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,599 >>> mbox cmd response data (12 bytes)
1,161,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,053 >>> mbox cmd response data (12 bytes)
1,165,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,187 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,215,280 UART: [ldev] Erasing FE.KEYID = 1
1,241,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,571 UART: [fwproc] Recv command 0x4d454153
1,285,598 >>> mbox cmd response data (12 bytes)
1,285,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,872 UART: [fwproc] Recv command 0x4d454153
1,289,899 >>> mbox cmd response data (12 bytes)
1,289,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,041 UART: [fwproc] Recv command 0x4d454153
1,294,068 >>> mbox cmd response data (12 bytes)
1,294,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,282 UART: [fwproc] Recv command 0x4d454153
1,298,309 >>> mbox cmd response data (12 bytes)
1,298,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,437 UART: [fwproc] Recv command 0x4d454153
1,302,464 >>> mbox cmd response data (12 bytes)
1,302,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,574 UART: [fwproc] Recv command 0x4d454153
1,306,601 >>> mbox cmd response data (12 bytes)
1,306,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,675 UART: [fwproc] Recv command 0x4d454153
1,310,702 >>> mbox cmd response data (12 bytes)
1,310,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,960 UART: [fwproc] Recv command 0x4d454153
1,314,987 >>> mbox cmd response data (12 bytes)
1,314,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,209 UART: [fwproc] Recv command 0x4d454153
1,315,952 UART: [fwproc] Max # of measurements received.
1,316,597 >>> mbox cmd response: failed
1,316,821 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,338 >>> mbox cmd response data (12 bytes)
1,139,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,854 >>> mbox cmd response data (12 bytes)
1,142,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,452 >>> mbox cmd response data (12 bytes)
1,146,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,958 >>> mbox cmd response data (12 bytes)
1,149,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,406 >>> mbox cmd response data (12 bytes)
1,153,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,852 >>> mbox cmd response data (12 bytes)
1,156,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,260 >>> mbox cmd response data (12 bytes)
1,160,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,804 >>> mbox cmd response data (12 bytes)
1,163,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,104 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x4d454153
1,286,661 >>> mbox cmd response data (12 bytes)
1,286,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,885 UART: [fwproc] Recv command 0x4d454153
1,290,912 >>> mbox cmd response data (12 bytes)
1,290,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,162 UART: [fwproc] Recv command 0x4d454153
1,295,189 >>> mbox cmd response data (12 bytes)
1,295,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,465 UART: [fwproc] Recv command 0x4d454153
1,299,492 >>> mbox cmd response data (12 bytes)
1,299,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,704 UART: [fwproc] Recv command 0x4d454153
1,303,731 >>> mbox cmd response data (12 bytes)
1,303,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,893 UART: [fwproc] Recv command 0x4d454153
1,307,920 >>> mbox cmd response data (12 bytes)
1,307,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,044 UART: [fwproc] Recv command 0x4d454153
1,312,071 >>> mbox cmd response data (12 bytes)
1,312,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,159 UART: [fwproc] Recv command 0x4d454153
1,316,186 >>> mbox cmd response data (12 bytes)
1,316,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,324 UART: [fwproc] Recv command 0x4d454153
1,317,067 UART: [fwproc] Max # of measurements received.
1,317,712 >>> mbox cmd response: failed
1,318,092 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,759 >>> mbox cmd response data (12 bytes)
1,139,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,187 >>> mbox cmd response data (12 bytes)
1,143,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,639 >>> mbox cmd response data (12 bytes)
1,146,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,105 >>> mbox cmd response data (12 bytes)
1,150,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,611 >>> mbox cmd response data (12 bytes)
1,153,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,225 >>> mbox cmd response data (12 bytes)
1,157,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,609 >>> mbox cmd response data (12 bytes)
1,160,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,089 >>> mbox cmd response data (12 bytes)
1,164,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,295 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
2,216,598 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,358,087 UART:
2,358,507 UART: Running Caliptra ROM ...
2,359,591 UART:
2,359,753 UART: [state] CFI Enabled
2,360,716 UART: [state] LifecycleState = Unprovisioned
2,362,395 UART: [state] DebugLocked = No
2,363,503 UART: [state] WD Timer not started. Device not locked for debugging
2,365,976 UART: [kat] SHA2-256
2,366,645 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,369,653 UART: [kat] ++
2,370,101 UART: [kat] sha1
2,370,614 UART: [kat] SHA2-256
2,371,351 UART: [kat] SHA2-384
2,372,014 UART: [kat] SHA2-512-ACC
2,372,854 UART: [kat] ECC-384
3,777,133 UART: [kat] HMAC-384Kdf
3,802,390 UART: [kat] LMS
4,875,545 UART: [kat] --
4,880,165 UART: [cold-reset] ++
4,881,830 UART: [fht] FHT @ 0x50003400
4,894,109 UART: [idev] ++
4,894,799 UART: [idev] CDI.KEYID = 6
4,895,971 UART: [idev] SUBJECT.KEYID = 7
4,897,062 UART: [idev] UDS.KEYID = 0
4,921,572 UART: [idev] Erasing UDS.KEYID = 0
8,235,556 UART: [idev] Sha1 KeyId Algorithm
8,257,276 UART: [idev] --
8,260,166 UART: [ldev] ++
8,260,742 UART: [ldev] CDI.KEYID = 6
8,261,981 UART: [ldev] SUBJECT.KEYID = 5
8,263,086 UART: [ldev] AUTHORITY.KEYID = 7
8,264,319 UART: [ldev] FE.KEYID = 1
8,308,182 UART: [ldev] Erasing FE.KEYID = 1
11,642,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,934,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,951,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,966,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,982,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,001,982 UART: [ldev] --
14,007,136 UART: [fwproc] Wait for Commands...
14,009,123 UART: [fwproc] Recv command 0x46574c44
14,011,437 UART: [fwproc] Recv'd Img size: 111688 bytes
18,062,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,144,876 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,205,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,521,613 >>> mbox cmd response: success
18,526,244 UART: [afmc] ++
18,526,826 UART: [afmc] CDI.KEYID = 6
18,527,932 UART: [afmc] SUBJECT.KEYID = 7
18,529,145 UART: [afmc] AUTHORITY.KEYID = 5
21,892,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,189,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,191,747 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,207,976 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,224,008 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,239,829 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,261,716 UART: [afmc] --
24,265,654 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,266,021 UART: [cold-reset] --
24,268,783 UART: [state] Locking Datavault
24,273,056 UART: [state] Locking PCR0, PCR1 and PCR31
24,274,763 UART: [state] Locking ICCM
24,276,368 UART: [exit] Launching FMC @ 0x40000000
24,284,985 UART:
24,285,215 UART: Running Caliptra FMC ...
24,286,250 UART:
24,286,395 UART: [fmc] Received command: 0x10000009
24,288,017 >>> mbox cmd response data (48 bytes)
24,288,613 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,288,957 UART: [fmc] Received command: 0x1000000A
24,290,485 >>> mbox cmd response data (0 bytes)
24,290,752 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,291,063 UART: [fmc] Received command: 0x10000003
24,301,020 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,209,064 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,299,698 >>> mbox cmd response: success
23,989,108 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,006,115 UART:
24,006,480 UART: Running Caliptra FMC ...
24,007,678 UART:
24,007,871 UART: [fmc] Received command: 0x10000009
24,009,465 >>> mbox cmd response data (48 bytes)
24,010,053 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,010,381 UART: [fmc] Received command: 0x1000000A
24,011,991 >>> mbox cmd response data (0 bytes)
24,012,266 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,012,579 UART: [fmc] Received command: 0x10000003
24,022,528 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,222,417 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,363,781 UART:
2,364,203 UART: Running Caliptra ROM ...
2,365,371 UART:
2,365,560 UART: [state] CFI Enabled
2,366,536 UART: [state] LifecycleState = Unprovisioned
2,368,190 UART: [state] DebugLocked = No
2,369,298 UART: [state] WD Timer not started. Device not locked for debugging
2,371,776 UART: [kat] SHA2-256
2,372,439 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,375,442 UART: [kat] ++
2,375,888 UART: [kat] sha1
2,376,393 UART: [kat] SHA2-256
2,377,126 UART: [kat] SHA2-384
2,377,786 UART: [kat] SHA2-512-ACC
2,378,691 UART: [kat] ECC-384
4,103,939 UART: [kat] HMAC-384Kdf
4,115,634 UART: [kat] LMS
5,188,777 UART: [kat] --
5,194,112 UART: [cold-reset] ++
5,196,595 UART: [fht] FHT @ 0x50003400
5,207,047 UART: [idev] ++
5,207,734 UART: [idev] CDI.KEYID = 6
5,208,969 UART: [idev] SUBJECT.KEYID = 7
5,210,397 UART: [idev] UDS.KEYID = 0
5,226,266 UART: [idev] Erasing UDS.KEYID = 0
8,500,872 UART: [idev] Sha1 KeyId Algorithm
8,522,598 UART: [idev] --
8,526,697 UART: [ldev] ++
8,527,264 UART: [ldev] CDI.KEYID = 6
8,528,499 UART: [ldev] SUBJECT.KEYID = 5
8,529,924 UART: [ldev] AUTHORITY.KEYID = 7
8,531,478 UART: [ldev] FE.KEYID = 1
8,543,857 UART: [ldev] Erasing FE.KEYID = 1
11,834,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,632 UART: [ldev] --
14,202,009 UART: [fwproc] Wait for Commands...
14,203,518 UART: [fwproc] Recv command 0x46574c44
14,205,446 UART: [fwproc] Recv'd Img size: 111688 bytes
18,244,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,315,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,376,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,692,646 >>> mbox cmd response: success
18,696,831 UART: [afmc] ++
18,697,423 UART: [afmc] CDI.KEYID = 6
18,698,658 UART: [afmc] SUBJECT.KEYID = 7
18,699,751 UART: [afmc] AUTHORITY.KEYID = 5
22,012,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,306,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,308,544 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,324,717 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,340,798 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,356,641 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,379,818 UART: [afmc] --
24,382,654 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,383,017 UART: [cold-reset] --
24,385,610 UART: [state] Locking Datavault
24,392,796 UART: [state] Locking PCR0, PCR1 and PCR31
24,394,494 UART: [state] Locking ICCM
24,396,127 UART: [exit] Launching FMC @ 0x40000000
24,404,735 UART:
24,404,961 UART: Running Caliptra FMC ...
24,406,053 UART:
24,406,206 UART: [fmc] Received command: 0x10000009
24,407,769 >>> mbox cmd response data (48 bytes)
24,408,363 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,408,702 UART: [fmc] Received command: 0x1000000A
24,410,226 >>> mbox cmd response data (0 bytes)
24,410,483 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,410,783 UART: [fmc] Received command: 0x10000003
24,420,729 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
2,215,128 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,512,367 >>> mbox cmd response: success
24,135,113 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,151,213 UART:
24,151,561 UART: Running Caliptra FMC ...
24,152,657 UART:
24,152,800 UART: [fmc] Received command: 0x10000009
24,154,372 >>> mbox cmd response data (48 bytes)
24,154,945 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,155,275 UART: [fmc] Received command: 0x1000000A
24,156,883 >>> mbox cmd response data (0 bytes)
24,157,144 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,157,445 UART: [fmc] Received command: 0x10000003
24,167,383 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,215,342 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,356,957 UART:
2,357,392 UART: Running Caliptra ROM ...
2,358,566 UART:
2,358,738 UART: [state] CFI Enabled
2,359,699 UART: [state] LifecycleState = Unprovisioned
2,361,353 UART: [state] DebugLocked = No
2,362,465 UART: [state] WD Timer not started. Device not locked for debugging
2,364,938 UART: [kat] SHA2-256
2,365,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,642 UART: [kat] ++
2,369,099 UART: [kat] sha1
2,369,616 UART: [kat] SHA2-256
2,370,360 UART: [kat] SHA2-384
2,371,022 UART: [kat] SHA2-512-ACC
2,371,856 UART: [kat] ECC-384
2,946,443 UART: [kat] HMAC-384Kdf
2,972,178 UART: [kat] LMS
3,501,626 UART: [kat] --
3,503,515 UART: [cold-reset] ++
3,504,691 UART: [fht] FHT @ 0x50003400
3,515,241 UART: [idev] ++
3,515,805 UART: [idev] CDI.KEYID = 6
3,516,769 UART: [idev] SUBJECT.KEYID = 7
3,517,926 UART: [idev] UDS.KEYID = 0
3,544,166 UART: [idev] Erasing UDS.KEYID = 0
6,024,329 UART: [idev] Sha1 KeyId Algorithm
6,046,165 UART: [idev] --
6,049,518 UART: [ldev] ++
6,050,093 UART: [ldev] CDI.KEYID = 6
6,051,009 UART: [ldev] SUBJECT.KEYID = 5
6,052,230 UART: [ldev] AUTHORITY.KEYID = 7
6,053,472 UART: [ldev] FE.KEYID = 1
6,100,204 UART: [ldev] Erasing FE.KEYID = 1
8,600,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,084 UART: [ldev] --
10,389,773 UART: [fwproc] Wait for Commands...
10,391,225 UART: [fwproc] Recv command 0x46574c44
10,393,341 UART: [fwproc] Recv'd Img size: 112032 bytes
13,758,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,830,716 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,891,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,208,666 >>> mbox cmd response: success
14,212,761 UART: [afmc] ++
14,213,353 UART: [afmc] CDI.KEYID = 6
14,214,263 UART: [afmc] SUBJECT.KEYID = 7
14,215,415 UART: [afmc] AUTHORITY.KEYID = 5
16,746,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,100 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,506,140 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,522,165 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,537,861 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,560,647 UART: [afmc] --
18,564,125 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,564,499 UART: [cold-reset] --
18,568,556 UART: [state] Locking Datavault
18,572,666 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,308 UART: [state] Locking ICCM
18,576,134 UART: [exit] Launching FMC @ 0x40000000
18,584,532 UART:
18,584,787 UART: Running Caliptra FMC ...
18,585,841 UART:
18,585,991 UART: [fmc] Received command: 0x10000009
18,587,565 >>> mbox cmd response data (48 bytes)
18,588,160 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,588,475 UART: [fmc] Received command: 0x1000000A
18,589,999 >>> mbox cmd response data (0 bytes)
18,590,267 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,590,571 UART: [fmc] Received command: 0x10000003
18,600,488 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,215,151 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
13,988,460 >>> mbox cmd response: success
18,266,215 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,281,873 UART:
18,282,231 UART: Running Caliptra FMC ...
18,283,446 UART:
18,283,619 UART: [fmc] Received command: 0x10000009
18,285,196 >>> mbox cmd response data (48 bytes)
18,285,785 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,286,097 UART: [fmc] Received command: 0x1000000A
18,287,708 >>> mbox cmd response data (0 bytes)
18,287,974 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,288,279 UART: [fmc] Received command: 0x10000003
18,298,219 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,218,265 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,360,058 UART:
2,360,475 UART: Running Caliptra ROM ...
2,361,647 UART:
2,361,821 UART: [state] CFI Enabled
2,362,791 UART: [state] LifecycleState = Unprovisioned
2,364,443 UART: [state] DebugLocked = No
2,365,545 UART: [state] WD Timer not started. Device not locked for debugging
2,368,019 UART: [kat] SHA2-256
2,368,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,371,696 UART: [kat] ++
2,372,146 UART: [kat] sha1
2,372,659 UART: [kat] SHA2-256
2,373,415 UART: [kat] SHA2-384
2,374,083 UART: [kat] SHA2-512-ACC
2,374,968 UART: [kat] ECC-384
3,284,424 UART: [kat] HMAC-384Kdf
3,297,097 UART: [kat] LMS
3,826,562 UART: [kat] --
3,829,909 UART: [cold-reset] ++
3,832,381 UART: [fht] FHT @ 0x50003400
3,843,358 UART: [idev] ++
3,843,921 UART: [idev] CDI.KEYID = 6
3,844,883 UART: [idev] SUBJECT.KEYID = 7
3,846,039 UART: [idev] UDS.KEYID = 0
3,863,754 UART: [idev] Erasing UDS.KEYID = 0
6,319,836 UART: [idev] Sha1 KeyId Algorithm
6,342,138 UART: [idev] --
6,346,320 UART: [ldev] ++
6,346,914 UART: [ldev] CDI.KEYID = 6
6,347,825 UART: [ldev] SUBJECT.KEYID = 5
6,348,984 UART: [ldev] AUTHORITY.KEYID = 7
6,350,214 UART: [ldev] FE.KEYID = 1
6,361,289 UART: [ldev] Erasing FE.KEYID = 1
8,837,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,088 UART: [ldev] --
10,631,619 UART: [fwproc] Wait for Commands...
10,634,683 UART: [fwproc] Recv command 0x46574c44
10,636,775 UART: [fwproc] Recv'd Img size: 112032 bytes
14,012,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,779 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,148,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,466,139 >>> mbox cmd response: success
14,471,026 UART: [afmc] ++
14,471,615 UART: [afmc] CDI.KEYID = 6
14,472,532 UART: [afmc] SUBJECT.KEYID = 7
14,473,689 UART: [afmc] AUTHORITY.KEYID = 5
16,973,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,695,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,697,696 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,713,760 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,729,792 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,745,505 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,767,168 UART: [afmc] --
18,771,804 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,772,213 UART: [cold-reset] --
18,776,288 UART: [state] Locking Datavault
18,782,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,514 UART: [state] Locking ICCM
18,786,040 UART: [exit] Launching FMC @ 0x40000000
18,794,430 UART:
18,794,658 UART: Running Caliptra FMC ...
18,795,679 UART:
18,795,823 UART: [fmc] Received command: 0x10000009
18,797,468 >>> mbox cmd response data (48 bytes)
18,798,078 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,798,402 UART: [fmc] Received command: 0x1000000A
18,799,941 >>> mbox cmd response data (0 bytes)
18,800,210 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,800,518 UART: [fmc] Received command: 0x10000003
18,810,459 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
2,220,425 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,219,298 >>> mbox cmd response: success
18,457,218 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,473,406 UART:
18,473,769 UART: Running Caliptra FMC ...
18,474,953 UART:
18,475,122 UART: [fmc] Received command: 0x10000009
18,476,700 >>> mbox cmd response data (48 bytes)
18,477,280 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,477,598 UART: [fmc] Received command: 0x1000000A
18,479,211 >>> mbox cmd response data (0 bytes)
18,479,479 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,479,789 UART: [fmc] Received command: 0x10000003
18,489,732 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,214,682 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,356,128 UART:
2,356,526 UART: Running Caliptra ROM ...
2,357,691 UART:
2,357,885 UART: [state] CFI Enabled
2,358,859 UART: [state] LifecycleState = Unprovisioned
2,360,520 UART: [state] DebugLocked = No
2,361,630 UART: [state] WD Timer not started. Device not locked for debugging
2,364,231 UART: [kat] SHA2-256
2,364,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,151 UART: [kat] ++
2,368,615 UART: [kat] sha1
2,369,125 UART: [kat] SHA2-256
2,369,783 UART: [kat] SHA2-384
2,370,534 UART: [kat] SHA2-512-ACC
2,371,346 UART: [kat] ECC-384
2,946,932 UART: [kat] HMAC-384Kdf
2,972,445 UART: [kat] LMS
3,501,903 UART: [kat] --
3,506,324 UART: [cold-reset] ++
3,507,442 UART: [fht] FHT @ 0x50003400
3,518,583 UART: [idev] ++
3,519,155 UART: [idev] CDI.KEYID = 6
3,520,071 UART: [idev] SUBJECT.KEYID = 7
3,521,230 UART: [idev] UDS.KEYID = 0
3,543,529 UART: [idev] Erasing UDS.KEYID = 0
6,025,650 UART: [idev] Sha1 KeyId Algorithm
6,049,592 UART: [idev] --
6,054,268 UART: [ldev] ++
6,054,856 UART: [ldev] CDI.KEYID = 6
6,055,740 UART: [ldev] SUBJECT.KEYID = 5
6,056,959 UART: [ldev] AUTHORITY.KEYID = 7
6,058,194 UART: [ldev] FE.KEYID = 1
6,098,921 UART: [ldev] Erasing FE.KEYID = 1
8,603,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,656 UART: [ldev] --
10,391,571 UART: [fwproc] Wait for Commands...
10,394,100 UART: [fwproc] Recv command 0x46574c44
10,396,204 UART: [fwproc] Recv'd Img size: 112032 bytes
13,775,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,849,108 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,909,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,227,900 >>> mbox cmd response: success
14,231,708 UART: [afmc] ++
14,232,299 UART: [afmc] CDI.KEYID = 6
14,233,200 UART: [afmc] SUBJECT.KEYID = 7
14,234,418 UART: [afmc] AUTHORITY.KEYID = 5
16,764,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,071 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,508,106 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,524,158 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,539,912 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,564,087 UART: [afmc] --
18,568,559 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,568,929 UART: [cold-reset] --
18,573,140 UART: [state] Locking Datavault
18,581,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,583,164 UART: [state] Locking ICCM
18,584,585 UART: [exit] Launching FMC @ 0x40000000
18,592,981 UART:
18,593,230 UART: Running Caliptra FMC ...
18,594,334 UART:
18,594,487 UART: [fmc] Received command: 0x10000009
18,596,005 >>> mbox cmd response data (48 bytes)
18,596,589 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,596,903 UART: [fmc] Received command: 0x1000000A
18,598,434 >>> mbox cmd response data (0 bytes)
18,598,700 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,599,003 UART: [fmc] Received command: 0x10000003
18,608,920 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,214,134 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,001,804 >>> mbox cmd response: success
18,285,073 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,301,653 UART:
18,302,001 UART: Running Caliptra FMC ...
18,303,393 UART:
18,303,568 UART: [fmc] Received command: 0x10000009
18,305,164 >>> mbox cmd response data (48 bytes)
18,305,758 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,306,076 UART: [fmc] Received command: 0x1000000A
18,307,694 >>> mbox cmd response data (0 bytes)
18,307,962 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,308,267 UART: [fmc] Received command: 0x10000003
18,318,210 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,221,505 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,253 UART:
2,363,662 UART: Running Caliptra ROM ...
2,364,742 UART:
2,364,894 UART: [state] CFI Enabled
2,365,805 UART: [state] LifecycleState = Unprovisioned
2,367,461 UART: [state] DebugLocked = No
2,368,487 UART: [state] WD Timer not started. Device not locked for debugging
2,370,952 UART: [kat] SHA2-256
2,371,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,374,619 UART: [kat] ++
2,375,068 UART: [kat] sha1
2,375,582 UART: [kat] SHA2-256
2,376,236 UART: [kat] SHA2-384
2,376,891 UART: [kat] SHA2-512-ACC
2,377,694 UART: [kat] ECC-384
3,280,603 UART: [kat] HMAC-384Kdf
3,292,486 UART: [kat] LMS
3,822,005 UART: [kat] --
3,825,997 UART: [cold-reset] ++
3,828,458 UART: [fht] FHT @ 0x50003400
3,839,540 UART: [idev] ++
3,840,108 UART: [idev] CDI.KEYID = 6
3,840,991 UART: [idev] SUBJECT.KEYID = 7
3,842,202 UART: [idev] UDS.KEYID = 0
3,858,633 UART: [idev] Erasing UDS.KEYID = 0
6,312,152 UART: [idev] Sha1 KeyId Algorithm
6,335,873 UART: [idev] --
6,339,861 UART: [ldev] ++
6,340,427 UART: [ldev] CDI.KEYID = 6
6,341,307 UART: [ldev] SUBJECT.KEYID = 5
6,342,515 UART: [ldev] AUTHORITY.KEYID = 7
6,343,666 UART: [ldev] FE.KEYID = 1
6,355,284 UART: [ldev] Erasing FE.KEYID = 1
8,827,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,880 UART: [ldev] --
10,618,977 UART: [fwproc] Wait for Commands...
10,621,934 UART: [fwproc] Recv command 0x46574c44
10,624,027 UART: [fwproc] Recv'd Img size: 112032 bytes
13,993,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,062,403 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,122,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,441,855 >>> mbox cmd response: success
14,446,478 UART: [afmc] ++
14,447,069 UART: [afmc] CDI.KEYID = 6
14,447,998 UART: [afmc] SUBJECT.KEYID = 7
14,449,158 UART: [afmc] AUTHORITY.KEYID = 5
16,950,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,371 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,691,435 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,707,477 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,166 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,744,564 UART: [afmc] --
18,748,972 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,749,339 UART: [cold-reset] --
18,753,506 UART: [state] Locking Datavault
18,758,304 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,007 UART: [state] Locking ICCM
18,761,464 UART: [exit] Launching FMC @ 0x40000000
18,769,804 UART:
18,770,054 UART: Running Caliptra FMC ...
18,771,154 UART:
18,771,302 UART: [fmc] Received command: 0x10000009
18,772,867 >>> mbox cmd response data (48 bytes)
18,773,459 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,773,806 UART: [fmc] Received command: 0x1000000A
18,775,331 >>> mbox cmd response data (0 bytes)
18,775,599 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,775,904 UART: [fmc] Received command: 0x10000003
18,785,855 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,217,159 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,243,074 >>> mbox cmd response: success
18,477,524 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,495,602 UART:
18,495,948 UART: Running Caliptra FMC ...
18,497,055 UART:
18,497,209 UART: [fmc] Received command: 0x10000009
18,498,785 >>> mbox cmd response data (48 bytes)
18,499,380 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,499,701 UART: [fmc] Received command: 0x1000000A
18,501,329 >>> mbox cmd response data (0 bytes)
18,501,596 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,501,902 UART: [fmc] Received command: 0x10000003
18,511,837 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,808 UART: [ldev] --
1,280,134 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,551 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,230 >>> mbox cmd response: success
2,741,381 UART: [afmc] ++
2,741,549 UART: [afmc] CDI.KEYID = 6
2,741,912 UART: [afmc] SUBJECT.KEYID = 7
2,742,338 UART: [afmc] AUTHORITY.KEYID = 5
2,777,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,072 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,768 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,667 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,360 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,030 UART: [afmc] --
2,821,126 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,148 UART: [cold-reset] --
2,822,062 UART: [state] Locking Datavault
2,823,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,063 UART: [state] Locking ICCM
2,824,615 UART: [exit] Launching FMC @ 0x40000000
2,829,912 UART:
2,829,928 UART: Running Caliptra FMC ...
2,830,336 UART:
2,830,566 UART: [fmc] Received command: 0x10000009
2,831,764 >>> mbox cmd response data (48 bytes)
2,831,765 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,831,794 UART: [fmc] Received command: 0x1000000A
2,832,534 >>> mbox cmd response data (0 bytes)
2,832,535 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,564 UART: [fmc] Received command: 0x10000003
2,842,020 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,278 >>> mbox cmd response: success
2,648,793 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,880 UART:
2,654,896 UART: Running Caliptra FMC ...
2,655,304 UART:
2,655,534 UART: [fmc] Received command: 0x10000009
2,656,732 >>> mbox cmd response data (48 bytes)
2,656,733 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,762 UART: [fmc] Received command: 0x1000000A
2,657,502 >>> mbox cmd response data (0 bytes)
2,657,503 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,532 UART: [fmc] Received command: 0x10000003
2,666,988 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
917,217 UART: [kat] HMAC-384Kdf
921,705 UART: [kat] LMS
1,170,017 UART: [kat] --
1,170,970 UART: [cold-reset] ++
1,171,516 UART: [fht] FHT @ 0x50003400
1,174,212 UART: [idev] ++
1,174,380 UART: [idev] CDI.KEYID = 6
1,174,741 UART: [idev] SUBJECT.KEYID = 7
1,175,166 UART: [idev] UDS.KEYID = 0
1,183,306 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,209,316 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,438 UART: [ldev] AUTHORITY.KEYID = 7
1,211,901 UART: [ldev] FE.KEYID = 1
1,217,029 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,569 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,420 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,979 >>> mbox cmd response: success
2,744,062 UART: [afmc] ++
2,744,230 UART: [afmc] CDI.KEYID = 6
2,744,593 UART: [afmc] SUBJECT.KEYID = 7
2,745,019 UART: [afmc] AUTHORITY.KEYID = 5
2,781,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,207 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,903 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,802 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,495 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,163 UART: [afmc] --
2,824,111 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,824,133 UART: [cold-reset] --
2,824,997 UART: [state] Locking Datavault
2,826,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,718 UART: [state] Locking ICCM
2,827,212 UART: [exit] Launching FMC @ 0x40000000
2,832,509 UART:
2,832,525 UART: Running Caliptra FMC ...
2,832,933 UART:
2,833,163 UART: [fmc] Received command: 0x10000009
2,834,361 >>> mbox cmd response data (48 bytes)
2,834,362 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,391 UART: [fmc] Received command: 0x1000000A
2,835,131 >>> mbox cmd response data (0 bytes)
2,835,132 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,161 UART: [fmc] Received command: 0x10000003
2,844,617 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,837 >>> mbox cmd response: success
2,647,722 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,093 UART:
2,654,109 UART: Running Caliptra FMC ...
2,654,517 UART:
2,654,747 UART: [fmc] Received command: 0x10000009
2,655,945 >>> mbox cmd response data (48 bytes)
2,655,946 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,975 UART: [fmc] Received command: 0x1000000A
2,656,715 >>> mbox cmd response data (0 bytes)
2,656,716 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,745 UART: [fmc] Received command: 0x10000003
2,666,201 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,257 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,170 UART: [ldev] ++
1,208,338 UART: [ldev] CDI.KEYID = 6
1,208,702 UART: [ldev] SUBJECT.KEYID = 5
1,209,129 UART: [ldev] AUTHORITY.KEYID = 7
1,209,592 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,241,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,278 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,241 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,992 >>> mbox cmd response: success
2,742,023 UART: [afmc] ++
2,742,191 UART: [afmc] CDI.KEYID = 6
2,742,554 UART: [afmc] SUBJECT.KEYID = 7
2,742,980 UART: [afmc] AUTHORITY.KEYID = 5
2,778,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,140 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,836 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,735 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,428 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,274 UART: [afmc] --
2,821,134 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,156 UART: [cold-reset] --
2,822,042 UART: [state] Locking Datavault
2,823,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,895 UART: [state] Locking ICCM
2,824,545 UART: [exit] Launching FMC @ 0x40000000
2,829,842 UART:
2,829,858 UART: Running Caliptra FMC ...
2,830,266 UART:
2,830,496 UART: [fmc] Received command: 0x10000009
2,831,694 >>> mbox cmd response data (48 bytes)
2,831,695 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,831,724 UART: [fmc] Received command: 0x1000000A
2,832,464 >>> mbox cmd response data (0 bytes)
2,832,465 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,494 UART: [fmc] Received command: 0x10000003
2,841,950 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,320 >>> mbox cmd response: success
2,647,799 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,282 UART:
2,654,298 UART: Running Caliptra FMC ...
2,654,706 UART:
2,654,936 UART: [fmc] Received command: 0x10000009
2,656,134 >>> mbox cmd response data (48 bytes)
2,656,135 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,164 UART: [fmc] Received command: 0x1000000A
2,656,904 >>> mbox cmd response data (0 bytes)
2,656,905 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,934 UART: [fmc] Received command: 0x10000003
2,666,390 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,181,738 UART: [idev] Erasing UDS.KEYID = 0
1,198,344 UART: [idev] Sha1 KeyId Algorithm
1,207,288 UART: [idev] --
1,208,293 UART: [ldev] ++
1,208,461 UART: [ldev] CDI.KEYID = 6
1,208,825 UART: [ldev] SUBJECT.KEYID = 5
1,209,252 UART: [ldev] AUTHORITY.KEYID = 7
1,209,715 UART: [ldev] FE.KEYID = 1
1,214,783 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,873 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,868 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,463 >>> mbox cmd response: success
2,742,614 UART: [afmc] ++
2,742,782 UART: [afmc] CDI.KEYID = 6
2,743,145 UART: [afmc] SUBJECT.KEYID = 7
2,743,571 UART: [afmc] AUTHORITY.KEYID = 5
2,778,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,095 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,791 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,690 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,383 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,263 UART: [afmc] --
2,821,281 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,303 UART: [cold-reset] --
2,821,985 UART: [state] Locking Datavault
2,823,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,616 UART: [state] Locking ICCM
2,824,174 UART: [exit] Launching FMC @ 0x40000000
2,829,471 UART:
2,829,487 UART: Running Caliptra FMC ...
2,829,895 UART:
2,830,125 UART: [fmc] Received command: 0x10000009
2,831,323 >>> mbox cmd response data (48 bytes)
2,831,324 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,831,353 UART: [fmc] Received command: 0x1000000A
2,832,093 >>> mbox cmd response data (0 bytes)
2,832,094 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,123 UART: [fmc] Received command: 0x10000003
2,841,579 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,425 >>> mbox cmd response: success
2,649,434 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,655,567 UART:
2,655,583 UART: Running Caliptra FMC ...
2,655,991 UART:
2,656,221 UART: [fmc] Received command: 0x10000009
2,657,419 >>> mbox cmd response data (48 bytes)
2,657,420 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,449 UART: [fmc] Received command: 0x1000000A
2,658,189 >>> mbox cmd response data (0 bytes)
2,658,190 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,219 UART: [fmc] Received command: 0x10000003
2,667,675 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,077 UART: [idev] Sha1 KeyId Algorithm
1,206,891 UART: [idev] --
1,207,828 UART: [ldev] ++
1,207,996 UART: [ldev] CDI.KEYID = 6
1,208,360 UART: [ldev] SUBJECT.KEYID = 5
1,208,787 UART: [ldev] AUTHORITY.KEYID = 7
1,209,250 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,662 UART: [ldev] --
1,280,102 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,449 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,122 >>> mbox cmd response: success
2,743,365 UART: [afmc] ++
2,743,533 UART: [afmc] CDI.KEYID = 6
2,743,896 UART: [afmc] SUBJECT.KEYID = 7
2,744,322 UART: [afmc] AUTHORITY.KEYID = 5
2,779,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,856 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,552 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,451 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,144 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,906 UART: [afmc] --
2,822,902 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,924 UART: [cold-reset] --
2,823,862 UART: [state] Locking Datavault
2,825,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,877 UART: [state] Locking ICCM
2,826,341 UART: [exit] Launching FMC @ 0x40000000
2,831,638 UART:
2,831,654 UART: Running Caliptra FMC ...
2,832,062 UART:
2,832,292 UART: [fmc] Received command: 0x10000009
2,833,490 >>> mbox cmd response data (48 bytes)
2,833,491 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,520 UART: [fmc] Received command: 0x1000000A
2,834,260 >>> mbox cmd response data (0 bytes)
2,834,261 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,290 UART: [fmc] Received command: 0x10000003
2,843,746 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,450 >>> mbox cmd response: success
2,647,213 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,454 UART:
2,653,470 UART: Running Caliptra FMC ...
2,653,878 UART:
2,654,108 UART: [fmc] Received command: 0x10000009
2,655,306 >>> mbox cmd response data (48 bytes)
2,655,307 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,336 UART: [fmc] Received command: 0x1000000A
2,656,076 >>> mbox cmd response data (0 bytes)
2,656,077 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,106 UART: [fmc] Received command: 0x10000003
2,665,562 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,004 UART: [kat] ++
896,156 UART: [kat] sha1
900,440 UART: [kat] SHA2-256
902,380 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,339 UART: [kat] LMS
1,169,651 UART: [kat] --
1,170,302 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,501 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,992 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,763 >>> mbox cmd response: success
2,743,890 UART: [afmc] ++
2,744,058 UART: [afmc] CDI.KEYID = 6
2,744,421 UART: [afmc] SUBJECT.KEYID = 7
2,744,847 UART: [afmc] AUTHORITY.KEYID = 5
2,780,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,441 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,137 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,036 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,729 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,461 UART: [afmc] --
2,823,571 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,593 UART: [cold-reset] --
2,824,551 UART: [state] Locking Datavault
2,825,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,474 UART: [state] Locking ICCM
2,827,094 UART: [exit] Launching FMC @ 0x40000000
2,832,391 UART:
2,832,407 UART: Running Caliptra FMC ...
2,832,815 UART:
2,833,045 UART: [fmc] Received command: 0x10000009
2,834,243 >>> mbox cmd response data (48 bytes)
2,834,244 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,273 UART: [fmc] Received command: 0x1000000A
2,835,013 >>> mbox cmd response data (0 bytes)
2,835,014 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,043 UART: [fmc] Received command: 0x10000003
2,844,499 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,705 >>> mbox cmd response: success
2,648,278 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,455 UART:
2,654,471 UART: Running Caliptra FMC ...
2,654,879 UART:
2,655,109 UART: [fmc] Received command: 0x10000009
2,656,307 >>> mbox cmd response data (48 bytes)
2,656,308 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,337 UART: [fmc] Received command: 0x1000000A
2,657,077 >>> mbox cmd response data (0 bytes)
2,657,078 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,107 UART: [fmc] Received command: 0x10000003
2,666,563 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,216,655 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,973 UART:
2,218,247 UART: Running Caliptra ROM ...
2,219,315 UART:
2,219,465 UART: [state] CFI Enabled
2,220,330 UART: [state] LifecycleState = Unprovisioned
2,222,008 UART: [state] DebugLocked = No
2,223,074 UART: [state] WD Timer not started. Device not locked for debugging
2,225,551 UART: [kat] SHA2-256
2,226,222 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,229,228 UART: [kat] ++
2,229,923 UART: [kat] sha1
2,230,489 UART: [kat] SHA2-256
2,231,156 UART: [kat] SHA2-384
2,231,814 UART: [kat] SHA2-512-ACC
2,232,637 UART: [kat] ECC-384
3,774,960 UART: [kat] HMAC-384Kdf
3,802,814 UART: [kat] LMS
4,875,958 UART: [kat] --
4,881,168 UART: [cold-reset] ++
4,883,426 UART: [fht] FHT @ 0x50003400
4,895,051 UART: [idev] ++
4,895,778 UART: [idev] CDI.KEYID = 6
4,896,972 UART: [idev] SUBJECT.KEYID = 7
4,898,129 UART: [idev] UDS.KEYID = 0
4,930,140 UART: [idev] Erasing UDS.KEYID = 0
8,244,229 UART: [idev] Sha1 KeyId Algorithm
8,265,101 UART: [idev] --
8,269,738 UART: [ldev] ++
8,270,307 UART: [ldev] CDI.KEYID = 6
8,271,489 UART: [ldev] SUBJECT.KEYID = 5
8,272,651 UART: [ldev] AUTHORITY.KEYID = 7
8,273,889 UART: [ldev] FE.KEYID = 1
8,318,738 UART: [ldev] Erasing FE.KEYID = 1
11,654,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,537 UART: [ldev] --
14,038,477 UART: [fwproc] Wait for Commands...
14,040,518 UART: [fwproc] Recv command 0x4d454153
14,049,540 >>> mbox cmd response data (12 bytes)
14,051,387 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,191,809 UART: [fwproc] Recv command 0x46574c44
14,194,200 UART: [fwproc] Recv'd Img size: 111688 bytes
18,234,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,309,352 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,369,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,687,192 >>> mbox cmd response: success
18,690,779 UART: [afmc] ++
18,691,365 UART: [afmc] CDI.KEYID = 6
18,692,548 UART: [afmc] SUBJECT.KEYID = 7
18,693,707 UART: [afmc] AUTHORITY.KEYID = 5
22,057,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,355,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,357,911 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,374,086 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,390,234 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,406,022 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,427,577 UART: [afmc] --
24,431,291 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,431,694 UART: [cold-reset] --
24,435,156 UART: [state] Locking Datavault
24,440,618 UART: [state] Locking PCR0, PCR1 and PCR31
24,442,261 UART: [state] Locking ICCM
24,443,737 UART: [exit] Launching FMC @ 0x40000000
24,452,341 UART:
24,452,574 UART: Running Caliptra FMC ...
24,453,673 UART:
24,453,835 UART: [fmc] Received command: 0x1000000A
24,455,536 >>> mbox cmd response data (116 bytes)
24,457,029 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,457,473 UART: [fmc] Received command: 0x10000009
24,459,278 >>> mbox cmd response data (48 bytes)
24,460,867 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,461,337 UART: [fmc] Received command: 0x10000003
24,471,306 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,217,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,831,128 >>> mbox cmd response data (12 bytes)
13,833,321 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,465,767 >>> mbox cmd response: success
24,154,736 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,167,498 UART:
24,167,850 UART: Running Caliptra FMC ...
24,169,019 UART:
24,169,195 UART: [fmc] Received command: 0x1000000A
24,170,767 >>> mbox cmd response data (116 bytes)
24,172,156 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,172,603 UART: [fmc] Received command: 0x10000009
24,174,372 >>> mbox cmd response data (48 bytes)
24,175,754 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,176,219 UART: [fmc] Received command: 0x10000003
24,186,184 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,224,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,716 UART:
2,225,974 UART: Running Caliptra ROM ...
2,227,034 UART:
2,227,184 UART: [state] CFI Enabled
2,228,043 UART: [state] LifecycleState = Unprovisioned
2,229,708 UART: [state] DebugLocked = No
2,230,821 UART: [state] WD Timer not started. Device not locked for debugging
2,233,291 UART: [kat] SHA2-256
2,233,954 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,236,971 UART: [kat] ++
2,237,415 UART: [kat] sha1
2,237,954 UART: [kat] SHA2-256
2,238,606 UART: [kat] SHA2-384
2,239,252 UART: [kat] SHA2-512-ACC
2,240,064 UART: [kat] ECC-384
4,097,467 UART: [kat] HMAC-384Kdf
4,109,897 UART: [kat] LMS
5,183,033 UART: [kat] --
5,187,765 UART: [cold-reset] ++
5,188,891 UART: [fht] FHT @ 0x50003400
5,199,900 UART: [idev] ++
5,200,632 UART: [idev] CDI.KEYID = 6
5,201,811 UART: [idev] SUBJECT.KEYID = 7
5,203,238 UART: [idev] UDS.KEYID = 0
5,215,759 UART: [idev] Erasing UDS.KEYID = 0
8,489,155 UART: [idev] Sha1 KeyId Algorithm
8,511,537 UART: [idev] --
8,515,089 UART: [ldev] ++
8,515,655 UART: [ldev] CDI.KEYID = 6
8,516,817 UART: [ldev] SUBJECT.KEYID = 5
8,518,370 UART: [ldev] AUTHORITY.KEYID = 7
8,519,790 UART: [ldev] FE.KEYID = 1
8,530,710 UART: [ldev] Erasing FE.KEYID = 1
11,823,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,289 UART: [ldev] --
14,189,738 UART: [fwproc] Wait for Commands...
14,192,963 UART: [fwproc] Recv command 0x4d454153
14,201,979 >>> mbox cmd response data (12 bytes)
14,203,858 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,344,579 UART: [fwproc] Recv command 0x46574c44
14,346,917 UART: [fwproc] Recv'd Img size: 111688 bytes
18,389,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,459,765 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,519,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,836,551 >>> mbox cmd response: success
18,840,838 UART: [afmc] ++
18,841,413 UART: [afmc] CDI.KEYID = 6
18,842,597 UART: [afmc] SUBJECT.KEYID = 7
18,843,758 UART: [afmc] AUTHORITY.KEYID = 5
22,163,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,461,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,463,384 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,479,592 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,495,720 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,511,512 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,534,038 UART: [afmc] --
24,537,595 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,537,947 UART: [cold-reset] --
24,541,048 UART: [state] Locking Datavault
24,545,868 UART: [state] Locking PCR0, PCR1 and PCR31
24,547,502 UART: [state] Locking ICCM
24,549,194 UART: [exit] Launching FMC @ 0x40000000
24,557,806 UART:
24,558,039 UART: Running Caliptra FMC ...
24,559,092 UART:
24,559,242 UART: [fmc] Received command: 0x1000000A
24,561,022 >>> mbox cmd response data (116 bytes)
24,562,347 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,562,781 UART: [fmc] Received command: 0x10000009
24,564,577 >>> mbox cmd response data (48 bytes)
24,566,081 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,566,538 UART: [fmc] Received command: 0x10000003
24,576,503 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,222,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,021,055 >>> mbox cmd response data (12 bytes)
14,023,554 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,642,708 >>> mbox cmd response: success
24,271,161 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,283,977 UART:
24,284,310 UART: Running Caliptra FMC ...
24,285,462 UART:
24,285,620 UART: [fmc] Received command: 0x1000000A
24,287,186 >>> mbox cmd response data (116 bytes)
24,288,585 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,289,017 UART: [fmc] Received command: 0x10000009
24,290,830 >>> mbox cmd response data (48 bytes)
24,292,315 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,292,770 UART: [fmc] Received command: 0x10000003
24,302,730 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,221,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,223,295 UART:
2,223,550 UART: Running Caliptra ROM ...
2,224,608 UART:
2,224,759 UART: [state] CFI Enabled
2,225,629 UART: [state] LifecycleState = Unprovisioned
2,227,302 UART: [state] DebugLocked = No
2,228,422 UART: [state] WD Timer not started. Device not locked for debugging
2,230,902 UART: [kat] SHA2-256
2,231,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,579 UART: [kat] ++
2,235,030 UART: [kat] sha1
2,235,546 UART: [kat] SHA2-256
2,236,285 UART: [kat] SHA2-384
2,236,974 UART: [kat] SHA2-512-ACC
2,237,800 UART: [kat] ECC-384
2,946,047 UART: [kat] HMAC-384Kdf
2,970,391 UART: [kat] LMS
3,499,824 UART: [kat] --
3,505,531 UART: [cold-reset] ++
3,506,742 UART: [fht] FHT @ 0x50003400
3,516,434 UART: [idev] ++
3,517,002 UART: [idev] CDI.KEYID = 6
3,517,915 UART: [idev] SUBJECT.KEYID = 7
3,519,129 UART: [idev] UDS.KEYID = 0
3,541,967 UART: [idev] Erasing UDS.KEYID = 0
6,021,966 UART: [idev] Sha1 KeyId Algorithm
6,044,501 UART: [idev] --
6,047,905 UART: [ldev] ++
6,048,478 UART: [ldev] CDI.KEYID = 6
6,049,407 UART: [ldev] SUBJECT.KEYID = 5
6,050,577 UART: [ldev] AUTHORITY.KEYID = 7
6,051,808 UART: [ldev] FE.KEYID = 1
6,098,378 UART: [ldev] Erasing FE.KEYID = 1
8,599,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,959 UART: [ldev] --
10,409,064 UART: [fwproc] Wait for Commands...
10,412,305 UART: [fwproc] Recv command 0x4d454153
10,420,836 >>> mbox cmd response data (12 bytes)
10,422,711 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,563,627 UART: [fwproc] Recv command 0x46574c44
10,565,795 UART: [fwproc] Recv'd Img size: 112032 bytes
13,944,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,761 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,073,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,391,572 >>> mbox cmd response: success
14,396,191 UART: [afmc] ++
14,396,778 UART: [afmc] CDI.KEYID = 6
14,397,667 UART: [afmc] SUBJECT.KEYID = 7
14,398,880 UART: [afmc] AUTHORITY.KEYID = 5
16,932,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,655,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,656,964 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,673,056 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,689,082 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,704,819 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,726,731 UART: [afmc] --
18,730,497 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,730,872 UART: [cold-reset] --
18,732,982 UART: [state] Locking Datavault
18,740,279 UART: [state] Locking PCR0, PCR1 and PCR31
18,741,919 UART: [state] Locking ICCM
18,743,397 UART: [exit] Launching FMC @ 0x40000000
18,751,799 UART:
18,752,040 UART: Running Caliptra FMC ...
18,753,146 UART:
18,753,301 UART: [fmc] Received command: 0x1000000A
18,754,980 >>> mbox cmd response data (116 bytes)
18,756,324 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,756,756 UART: [fmc] Received command: 0x10000009
18,758,560 >>> mbox cmd response data (48 bytes)
18,760,085 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,760,546 UART: [fmc] Received command: 0x10000003
18,770,458 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,652 writing to cptra_bootfsm_go
2,219,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,206,560 >>> mbox cmd response data (12 bytes)
10,208,969 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,177,017 >>> mbox cmd response: success
18,454,620 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,468,452 UART:
18,468,783 UART: Running Caliptra FMC ...
18,469,934 UART:
18,470,099 UART: [fmc] Received command: 0x1000000A
18,471,664 >>> mbox cmd response data (116 bytes)
18,473,069 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,473,503 UART: [fmc] Received command: 0x10000009
18,475,268 >>> mbox cmd response data (48 bytes)
18,476,794 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,477,252 UART: [fmc] Received command: 0x10000003
18,487,180 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,227,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,332 UART:
2,229,586 UART: Running Caliptra ROM ...
2,230,675 UART:
2,230,824 UART: [state] CFI Enabled
2,231,692 UART: [state] LifecycleState = Unprovisioned
2,233,359 UART: [state] DebugLocked = No
2,234,471 UART: [state] WD Timer not started. Device not locked for debugging
2,236,960 UART: [kat] SHA2-256
2,237,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,240,630 UART: [kat] ++
2,241,101 UART: [kat] sha1
2,241,614 UART: [kat] SHA2-256
2,242,267 UART: [kat] SHA2-384
2,242,921 UART: [kat] SHA2-512-ACC
2,243,720 UART: [kat] ECC-384
3,280,537 UART: [kat] HMAC-384Kdf
3,293,592 UART: [kat] LMS
3,823,049 UART: [kat] --
3,827,879 UART: [cold-reset] ++
3,829,657 UART: [fht] FHT @ 0x50003400
3,840,745 UART: [idev] ++
3,841,359 UART: [idev] CDI.KEYID = 6
3,842,246 UART: [idev] SUBJECT.KEYID = 7
3,843,596 UART: [idev] UDS.KEYID = 0
3,859,713 UART: [idev] Erasing UDS.KEYID = 0
6,317,673 UART: [idev] Sha1 KeyId Algorithm
6,341,030 UART: [idev] --
6,344,375 UART: [ldev] ++
6,344,939 UART: [ldev] CDI.KEYID = 6
6,345,846 UART: [ldev] SUBJECT.KEYID = 5
6,347,001 UART: [ldev] AUTHORITY.KEYID = 7
6,348,289 UART: [ldev] FE.KEYID = 1
6,359,313 UART: [ldev] Erasing FE.KEYID = 1
8,835,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,708 UART: [ldev] --
10,624,493 UART: [fwproc] Wait for Commands...
10,626,489 UART: [fwproc] Recv command 0x4d454153
10,635,016 >>> mbox cmd response data (12 bytes)
10,636,917 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,777,891 UART: [fwproc] Recv command 0x46574c44
10,780,062 UART: [fwproc] Recv'd Img size: 112032 bytes
14,160,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,347 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,295,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,614,134 >>> mbox cmd response: success
14,617,780 UART: [afmc] ++
14,618,365 UART: [afmc] CDI.KEYID = 6
14,619,248 UART: [afmc] SUBJECT.KEYID = 7
14,620,458 UART: [afmc] AUTHORITY.KEYID = 5
17,122,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,843,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,844,988 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,861,069 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,877,095 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,892,811 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,914,157 UART: [afmc] --
18,918,510 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,918,862 UART: [cold-reset] --
18,923,033 UART: [state] Locking Datavault
18,930,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,932,304 UART: [state] Locking ICCM
18,933,947 UART: [exit] Launching FMC @ 0x40000000
18,942,347 UART:
18,942,575 UART: Running Caliptra FMC ...
18,943,674 UART:
18,943,835 UART: [fmc] Received command: 0x1000000A
18,945,505 >>> mbox cmd response data (116 bytes)
18,946,965 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,947,401 UART: [fmc] Received command: 0x10000009
18,949,204 >>> mbox cmd response data (48 bytes)
18,950,690 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,951,142 UART: [fmc] Received command: 0x10000003
18,961,106 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,434 writing to cptra_bootfsm_go
2,222,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,993 >>> mbox cmd response data (12 bytes)
10,419,456 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,385,757 >>> mbox cmd response: success
18,620,997 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,636,520 UART:
18,636,849 UART: Running Caliptra FMC ...
18,637,931 UART:
18,638,079 UART: [fmc] Received command: 0x1000000A
18,639,759 >>> mbox cmd response data (116 bytes)
18,641,422 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,641,785 UART: [fmc] Received command: 0x10000009
18,643,562 >>> mbox cmd response data (48 bytes)
18,645,046 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,645,409 UART: [fmc] Received command: 0x10000003
18,655,331 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,228,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,391 UART:
2,229,657 UART: Running Caliptra ROM ...
2,230,738 UART:
2,230,888 UART: [state] CFI Enabled
2,231,763 UART: [state] LifecycleState = Unprovisioned
2,233,436 UART: [state] DebugLocked = No
2,234,575 UART: [state] WD Timer not started. Device not locked for debugging
2,237,057 UART: [kat] SHA2-256
2,237,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,240,746 UART: [kat] ++
2,241,195 UART: [kat] sha1
2,241,721 UART: [kat] SHA2-256
2,242,413 UART: [kat] SHA2-384
2,243,071 UART: [kat] SHA2-512-ACC
2,243,873 UART: [kat] ECC-384
2,948,503 UART: [kat] HMAC-384Kdf
2,970,415 UART: [kat] LMS
3,499,885 UART: [kat] --
3,504,637 UART: [cold-reset] ++
3,506,028 UART: [fht] FHT @ 0x50003400
3,516,902 UART: [idev] ++
3,517,468 UART: [idev] CDI.KEYID = 6
3,518,396 UART: [idev] SUBJECT.KEYID = 7
3,519,616 UART: [idev] UDS.KEYID = 0
3,542,995 UART: [idev] Erasing UDS.KEYID = 0
6,024,346 UART: [idev] Sha1 KeyId Algorithm
6,046,113 UART: [idev] --
6,050,632 UART: [ldev] ++
6,051,213 UART: [ldev] CDI.KEYID = 6
6,052,122 UART: [ldev] SUBJECT.KEYID = 5
6,053,283 UART: [ldev] AUTHORITY.KEYID = 7
6,054,521 UART: [ldev] FE.KEYID = 1
6,099,142 UART: [ldev] Erasing FE.KEYID = 1
8,599,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,274 UART: [ldev] --
10,387,731 UART: [fwproc] Wait for Commands...
10,390,427 UART: [fwproc] Recv command 0x4d454153
10,398,958 >>> mbox cmd response data (12 bytes)
10,400,739 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,541,825 UART: [fwproc] Recv command 0x46574c44
10,543,944 UART: [fwproc] Recv'd Img size: 112032 bytes
13,921,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,348 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,049,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,368,852 >>> mbox cmd response: success
14,372,544 UART: [afmc] ++
14,373,130 UART: [afmc] CDI.KEYID = 6
14,374,044 UART: [afmc] SUBJECT.KEYID = 7
14,375,148 UART: [afmc] AUTHORITY.KEYID = 5
16,911,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,333 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,653,410 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,669,446 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,685,135 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,707,199 UART: [afmc] --
18,711,396 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,711,749 UART: [cold-reset] --
18,715,156 UART: [state] Locking Datavault
18,720,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,722,217 UART: [state] Locking ICCM
18,723,537 UART: [exit] Launching FMC @ 0x40000000
18,731,943 UART:
18,732,179 UART: Running Caliptra FMC ...
18,733,282 UART:
18,733,444 UART: [fmc] Received command: 0x1000000A
18,735,092 >>> mbox cmd response data (116 bytes)
18,736,496 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,736,938 UART: [fmc] Received command: 0x10000009
18,738,745 >>> mbox cmd response data (48 bytes)
18,740,187 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,740,638 UART: [fmc] Received command: 0x10000003
18,750,583 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,225,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,185,459 >>> mbox cmd response data (12 bytes)
10,187,937 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,162,597 >>> mbox cmd response: success
18,435,807 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,450,556 UART:
18,450,888 UART: Running Caliptra FMC ...
18,452,047 UART:
18,452,222 UART: [fmc] Received command: 0x1000000A
18,453,842 >>> mbox cmd response data (116 bytes)
18,455,280 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,455,715 UART: [fmc] Received command: 0x10000009
18,457,488 >>> mbox cmd response data (48 bytes)
18,459,039 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,459,518 UART: [fmc] Received command: 0x10000003
18,469,449 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,225,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,147 UART:
2,227,414 UART: Running Caliptra ROM ...
2,228,494 UART:
2,228,692 UART: [state] CFI Enabled
2,229,563 UART: [state] LifecycleState = Unprovisioned
2,231,293 UART: [state] DebugLocked = No
2,232,458 UART: [state] WD Timer not started. Device not locked for debugging
2,234,983 UART: [kat] SHA2-256
2,235,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,238,732 UART: [kat] ++
2,239,191 UART: [kat] sha1
2,239,706 UART: [kat] SHA2-256
2,240,388 UART: [kat] SHA2-384
2,241,048 UART: [kat] SHA2-512-ACC
2,241,901 UART: [kat] ECC-384
3,282,932 UART: [kat] HMAC-384Kdf
3,295,979 UART: [kat] LMS
3,825,453 UART: [kat] --
3,829,929 UART: [cold-reset] ++
3,831,754 UART: [fht] FHT @ 0x50003400
3,843,538 UART: [idev] ++
3,844,107 UART: [idev] CDI.KEYID = 6
3,845,020 UART: [idev] SUBJECT.KEYID = 7
3,846,233 UART: [idev] UDS.KEYID = 0
3,863,621 UART: [idev] Erasing UDS.KEYID = 0
6,320,834 UART: [idev] Sha1 KeyId Algorithm
6,343,247 UART: [idev] --
6,347,379 UART: [ldev] ++
6,347,970 UART: [ldev] CDI.KEYID = 6
6,348,855 UART: [ldev] SUBJECT.KEYID = 5
6,349,957 UART: [ldev] AUTHORITY.KEYID = 7
6,351,248 UART: [ldev] FE.KEYID = 1
6,361,973 UART: [ldev] Erasing FE.KEYID = 1
8,830,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,065 UART: [ldev] --
10,620,205 UART: [fwproc] Wait for Commands...
10,623,109 UART: [fwproc] Recv command 0x4d454153
10,631,633 >>> mbox cmd response data (12 bytes)
10,633,556 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,775,302 UART: [fwproc] Recv command 0x46574c44
10,777,451 UART: [fwproc] Recv'd Img size: 112032 bytes
14,155,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,352 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,289,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,462 >>> mbox cmd response: success
14,612,105 UART: [afmc] ++
14,612,691 UART: [afmc] CDI.KEYID = 6
14,613,600 UART: [afmc] SUBJECT.KEYID = 7
14,614,813 UART: [afmc] AUTHORITY.KEYID = 5
17,115,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,836,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,838,172 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,854,223 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,870,272 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,885,965 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,908,827 UART: [afmc] --
18,913,048 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,913,419 UART: [cold-reset] --
18,915,099 UART: [state] Locking Datavault
18,920,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,921,735 UART: [state] Locking ICCM
18,922,885 UART: [exit] Launching FMC @ 0x40000000
18,931,275 UART:
18,931,506 UART: Running Caliptra FMC ...
18,932,605 UART:
18,932,769 UART: [fmc] Received command: 0x1000000A
18,934,442 >>> mbox cmd response data (116 bytes)
18,935,942 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,936,376 UART: [fmc] Received command: 0x10000009
18,938,187 >>> mbox cmd response data (48 bytes)
18,939,706 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,940,165 UART: [fmc] Received command: 0x10000003
18,950,100 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,218,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,784 >>> mbox cmd response data (12 bytes)
10,412,325 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,379,002 >>> mbox cmd response: success
18,615,146 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,630,234 UART:
18,630,579 UART: Running Caliptra FMC ...
18,631,762 UART:
18,631,930 UART: [fmc] Received command: 0x1000000A
18,633,501 >>> mbox cmd response data (116 bytes)
18,635,069 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,635,512 UART: [fmc] Received command: 0x10000009
18,637,282 >>> mbox cmd response data (48 bytes)
18,638,804 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,639,278 UART: [fmc] Received command: 0x10000003
18,649,239 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,878 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x4d454153
1,285,634 >>> mbox cmd response data (12 bytes)
1,285,635 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,285,850 UART: [fwproc] Recv command 0x46574c44
1,286,583 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,654 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,746,211 >>> mbox cmd response: success
2,747,480 UART: [afmc] ++
2,747,648 UART: [afmc] CDI.KEYID = 6
2,748,011 UART: [afmc] SUBJECT.KEYID = 7
2,748,437 UART: [afmc] AUTHORITY.KEYID = 5
2,783,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,367 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,063 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,962 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,655 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,349 UART: [afmc] --
2,826,285 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,307 UART: [cold-reset] --
2,827,193 UART: [state] Locking Datavault
2,828,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,842 UART: [state] Locking ICCM
2,829,492 UART: [exit] Launching FMC @ 0x40000000
2,834,789 UART:
2,834,805 UART: Running Caliptra FMC ...
2,835,213 UART:
2,835,443 UART: [fmc] Received command: 0x1000000A
2,836,872 >>> mbox cmd response data (116 bytes)
2,836,873 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,902 UART: [fmc] Received command: 0x10000009
2,838,100 >>> mbox cmd response data (48 bytes)
2,838,101 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,130 UART: [fmc] Received command: 0x10000003
2,847,586 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,396 >>> mbox cmd response data (12 bytes)
1,140,397 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,597,024 >>> mbox cmd response: success
2,653,099 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,659,452 UART:
2,659,468 UART: Running Caliptra FMC ...
2,659,876 UART:
2,660,106 UART: [fmc] Received command: 0x1000000A
2,661,535 >>> mbox cmd response data (116 bytes)
2,661,536 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,661,565 UART: [fmc] Received command: 0x10000009
2,662,763 >>> mbox cmd response data (48 bytes)
2,662,764 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,662,793 UART: [fmc] Received command: 0x10000003
2,672,249 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,429 UART: [kat] LMS
1,169,741 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x4d454153
1,287,297 >>> mbox cmd response data (12 bytes)
1,287,298 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,287,485 UART: [fwproc] Recv command 0x46574c44
1,288,218 UART: [fwproc] Recv'd Img size: 112032 bytes
2,558,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,585,391 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,611,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,747,070 >>> mbox cmd response: success
2,748,223 UART: [afmc] ++
2,748,391 UART: [afmc] CDI.KEYID = 6
2,748,754 UART: [afmc] SUBJECT.KEYID = 7
2,749,180 UART: [afmc] AUTHORITY.KEYID = 5
2,785,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,801,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,802,074 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,807,770 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,813,669 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,819,362 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,827,138 UART: [afmc] --
2,828,078 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,828,100 UART: [cold-reset] --
2,828,858 UART: [state] Locking Datavault
2,830,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,830,643 UART: [state] Locking ICCM
2,831,209 UART: [exit] Launching FMC @ 0x40000000
2,836,506 UART:
2,836,522 UART: Running Caliptra FMC ...
2,836,930 UART:
2,837,160 UART: [fmc] Received command: 0x1000000A
2,838,589 >>> mbox cmd response data (116 bytes)
2,838,590 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,838,619 UART: [fmc] Received command: 0x10000009
2,839,817 >>> mbox cmd response data (48 bytes)
2,839,818 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,847 UART: [fmc] Received command: 0x10000003
2,849,303 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,277 >>> mbox cmd response data (12 bytes)
1,139,278 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,447 >>> mbox cmd response: success
2,650,514 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,719 UART:
2,656,735 UART: Running Caliptra FMC ...
2,657,143 UART:
2,657,373 UART: [fmc] Received command: 0x1000000A
2,658,802 >>> mbox cmd response data (116 bytes)
2,658,803 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,832 UART: [fmc] Received command: 0x10000009
2,660,030 >>> mbox cmd response data (48 bytes)
2,660,031 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,060 UART: [fmc] Received command: 0x10000003
2,669,516 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,782 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,895 UART: [fht] FHT @ 0x50003400
1,172,571 UART: [idev] ++
1,172,739 UART: [idev] CDI.KEYID = 6
1,173,100 UART: [idev] SUBJECT.KEYID = 7
1,173,525 UART: [idev] UDS.KEYID = 0
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,763 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x4d454153
1,286,540 >>> mbox cmd response data (12 bytes)
1,286,541 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,286,656 UART: [fwproc] Recv command 0x46574c44
1,287,389 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,456 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,746,083 >>> mbox cmd response: success
2,747,206 UART: [afmc] ++
2,747,374 UART: [afmc] CDI.KEYID = 6
2,747,737 UART: [afmc] SUBJECT.KEYID = 7
2,748,163 UART: [afmc] AUTHORITY.KEYID = 5
2,784,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,139 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,835 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,734 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,427 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,283 UART: [afmc] --
2,827,383 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,405 UART: [cold-reset] --
2,828,507 UART: [state] Locking Datavault
2,829,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,830,100 UART: [state] Locking ICCM
2,830,746 UART: [exit] Launching FMC @ 0x40000000
2,836,043 UART:
2,836,059 UART: Running Caliptra FMC ...
2,836,467 UART:
2,836,697 UART: [fmc] Received command: 0x1000000A
2,838,126 >>> mbox cmd response data (116 bytes)
2,838,127 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,838,156 UART: [fmc] Received command: 0x10000009
2,839,354 >>> mbox cmd response data (48 bytes)
2,839,355 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,384 UART: [fmc] Received command: 0x10000003
2,848,840 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,580 >>> mbox cmd response data (12 bytes)
1,138,581 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,276 >>> mbox cmd response: success
2,650,043 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,036 UART:
2,656,052 UART: Running Caliptra FMC ...
2,656,460 UART:
2,656,690 UART: [fmc] Received command: 0x1000000A
2,658,119 >>> mbox cmd response data (116 bytes)
2,658,120 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,149 UART: [fmc] Received command: 0x10000009
2,659,347 >>> mbox cmd response data (48 bytes)
2,659,348 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,377 UART: [fmc] Received command: 0x10000003
2,668,833 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,282,016 UART: [fwproc] Recv command 0x4d454153
1,286,043 >>> mbox cmd response data (12 bytes)
1,286,044 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,286,121 UART: [fwproc] Recv command 0x46574c44
1,286,854 UART: [fwproc] Recv'd Img size: 112032 bytes
2,558,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,555 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,746,326 >>> mbox cmd response: success
2,747,459 UART: [afmc] ++
2,747,627 UART: [afmc] CDI.KEYID = 6
2,747,990 UART: [afmc] SUBJECT.KEYID = 7
2,748,416 UART: [afmc] AUTHORITY.KEYID = 5
2,784,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,801,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,842 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,807,538 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,813,437 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,819,130 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,918 UART: [afmc] --
2,827,960 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,982 UART: [cold-reset] --
2,828,852 UART: [state] Locking Datavault
2,829,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,830,477 UART: [state] Locking ICCM
2,831,019 UART: [exit] Launching FMC @ 0x40000000
2,836,316 UART:
2,836,332 UART: Running Caliptra FMC ...
2,836,740 UART:
2,836,970 UART: [fmc] Received command: 0x1000000A
2,838,399 >>> mbox cmd response data (116 bytes)
2,838,400 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,838,429 UART: [fmc] Received command: 0x10000009
2,839,627 >>> mbox cmd response data (48 bytes)
2,839,628 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,657 UART: [fmc] Received command: 0x10000003
2,849,113 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,217 >>> mbox cmd response data (12 bytes)
1,141,218 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,598,725 >>> mbox cmd response: success
2,655,604 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,661,735 UART:
2,661,751 UART: Running Caliptra FMC ...
2,662,159 UART:
2,662,389 UART: [fmc] Received command: 0x1000000A
2,663,818 >>> mbox cmd response data (116 bytes)
2,663,819 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,663,848 UART: [fmc] Received command: 0x10000009
2,665,046 >>> mbox cmd response data (48 bytes)
2,665,047 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,665,076 UART: [fmc] Received command: 0x10000003
2,674,532 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Unprovisioned
86,317 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,194 UART: [kat] SHA2-256
891,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,873 UART: [kat] ++
896,025 UART: [kat] sha1
900,333 UART: [kat] SHA2-256
902,273 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,430 UART: [kat] LMS
1,169,742 UART: [kat] --
1,170,769 UART: [cold-reset] ++
1,171,103 UART: [fht] FHT @ 0x50003400
1,173,839 UART: [idev] ++
1,174,007 UART: [idev] CDI.KEYID = 6
1,174,368 UART: [idev] SUBJECT.KEYID = 7
1,174,793 UART: [idev] UDS.KEYID = 0
1,182,777 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,241,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,180 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x4d454153
1,285,994 >>> mbox cmd response data (12 bytes)
1,285,995 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,286,070 UART: [fwproc] Recv command 0x46574c44
1,286,803 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,585,300 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,747,041 >>> mbox cmd response: success
2,748,306 UART: [afmc] ++
2,748,474 UART: [afmc] CDI.KEYID = 6
2,748,837 UART: [afmc] SUBJECT.KEYID = 7
2,749,263 UART: [afmc] AUTHORITY.KEYID = 5
2,784,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,263 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,959 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,858 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,551 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,439 UART: [afmc] --
2,827,495 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,517 UART: [cold-reset] --
2,828,263 UART: [state] Locking Datavault
2,829,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,814 UART: [state] Locking ICCM
2,830,308 UART: [exit] Launching FMC @ 0x40000000
2,835,605 UART:
2,835,621 UART: Running Caliptra FMC ...
2,836,029 UART:
2,836,259 UART: [fmc] Received command: 0x1000000A
2,837,688 >>> mbox cmd response data (116 bytes)
2,837,689 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,718 UART: [fmc] Received command: 0x10000009
2,838,916 >>> mbox cmd response data (48 bytes)
2,838,917 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,946 UART: [fmc] Received command: 0x10000003
2,848,402 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,866 >>> mbox cmd response data (12 bytes)
1,139,867 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,596,552 >>> mbox cmd response: success
2,652,159 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,244 UART:
2,658,260 UART: Running Caliptra FMC ...
2,658,668 UART:
2,658,898 UART: [fmc] Received command: 0x1000000A
2,660,327 >>> mbox cmd response data (116 bytes)
2,660,328 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,357 UART: [fmc] Received command: 0x10000009
2,661,555 >>> mbox cmd response data (48 bytes)
2,661,556 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,585 UART: [fmc] Received command: 0x10000003
2,671,041 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,792 UART: [idev] ++
1,173,960 UART: [idev] CDI.KEYID = 6
1,174,321 UART: [idev] SUBJECT.KEYID = 7
1,174,746 UART: [idev] UDS.KEYID = 0
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,994 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x4d454153
1,286,933 >>> mbox cmd response data (12 bytes)
1,286,934 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,287,131 UART: [fwproc] Recv command 0x46574c44
1,287,864 UART: [fwproc] Recv'd Img size: 112032 bytes
2,559,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,586,325 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,612,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,747,988 >>> mbox cmd response: success
2,749,033 UART: [afmc] ++
2,749,201 UART: [afmc] CDI.KEYID = 6
2,749,564 UART: [afmc] SUBJECT.KEYID = 7
2,749,990 UART: [afmc] AUTHORITY.KEYID = 5
2,786,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,802,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,803,508 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,809,204 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,815,103 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,820,796 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,828,548 UART: [afmc] --
2,829,536 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,829,558 UART: [cold-reset] --
2,830,346 UART: [state] Locking Datavault
2,831,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,832,279 UART: [state] Locking ICCM
2,832,835 UART: [exit] Launching FMC @ 0x40000000
2,838,132 UART:
2,838,148 UART: Running Caliptra FMC ...
2,838,556 UART:
2,838,786 UART: [fmc] Received command: 0x1000000A
2,840,215 >>> mbox cmd response data (116 bytes)
2,840,216 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,840,245 UART: [fmc] Received command: 0x10000009
2,841,443 >>> mbox cmd response data (48 bytes)
2,841,444 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,841,473 UART: [fmc] Received command: 0x10000003
2,850,929 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,635 >>> mbox cmd response data (12 bytes)
1,139,636 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,596,083 >>> mbox cmd response: success
2,651,994 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,123 UART:
2,658,139 UART: Running Caliptra FMC ...
2,658,547 UART:
2,658,777 UART: [fmc] Received command: 0x1000000A
2,660,206 >>> mbox cmd response data (116 bytes)
2,660,207 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,236 UART: [fmc] Received command: 0x10000009
2,661,434 >>> mbox cmd response data (48 bytes)
2,661,435 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,464 UART: [fmc] Received command: 0x10000003
2,670,920 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
4,004 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,298 UART:
192,662 UART: Running Caliptra ROM ...
193,857 UART:
194,033 UART: [state] CFI Enabled
267,353 UART: [state] LifecycleState = Unprovisioned
269,731 UART: [state] DebugLocked = No
271,277 UART: [state] WD Timer not started. Device not locked for debugging
276,061 UART: [kat] SHA2-256
457,994 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,525 UART: [kat] ++
470,114 UART: [kat] sha1
481,280 UART: [kat] SHA2-256
484,325 UART: [kat] SHA2-384
490,733 UART: [kat] SHA2-512-ACC
493,403 UART: [kat] ECC-384
3,775,218 UART: [kat] HMAC-384Kdf
3,803,069 UART: [kat] LMS
4,876,219 UART: [kat] --
4,881,956 UART: [cold-reset] ++
4,883,914 UART: [fht] FHT @ 0x50003400
4,896,137 UART: [idev] ++
4,896,820 UART: [idev] CDI.KEYID = 6
4,898,053 UART: [idev] SUBJECT.KEYID = 7
4,899,154 UART: [idev] UDS.KEYID = 0
4,929,222 UART: [idev] Erasing UDS.KEYID = 0
8,243,641 UART: [idev] Sha1 KeyId Algorithm
8,265,299 UART: [idev] --
8,269,450 UART: [ldev] ++
8,270,013 UART: [ldev] CDI.KEYID = 6
8,271,180 UART: [ldev] SUBJECT.KEYID = 5
8,272,390 UART: [ldev] AUTHORITY.KEYID = 7
8,273,540 UART: [ldev] FE.KEYID = 1
8,317,327 UART: [ldev] Erasing FE.KEYID = 1
11,653,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,639 UART: [ldev] --
14,034,928 UART: [fwproc] Wait for Commands...
14,037,020 UART: [fwproc] Recv command 0x46574c44
14,039,288 UART: Invalid Img size: 0 bytes
14,043,922 UART: ROM Fatal Error: 0x01020002
14,047,286 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,761 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,808,945 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
4,313 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,550 UART:
192,925 UART: Running Caliptra ROM ...
194,086 UART:
603,679 UART: [state] CFI Enabled
616,855 UART: [state] LifecycleState = Unprovisioned
618,846 UART: [state] DebugLocked = No
620,441 UART: [state] WD Timer not started. Device not locked for debugging
625,220 UART: [kat] SHA2-256
807,172 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,734 UART: [kat] ++
819,234 UART: [kat] sha1
829,679 UART: [kat] SHA2-256
832,725 UART: [kat] SHA2-384
839,995 UART: [kat] SHA2-512-ACC
842,603 UART: [kat] ECC-384
4,096,362 UART: [kat] HMAC-384Kdf
4,108,914 UART: [kat] LMS
5,182,042 UART: [kat] --
5,187,778 UART: [cold-reset] ++
5,189,714 UART: [fht] FHT @ 0x50003400
5,201,826 UART: [idev] ++
5,202,492 UART: [idev] CDI.KEYID = 6
5,203,656 UART: [idev] SUBJECT.KEYID = 7
5,205,136 UART: [idev] UDS.KEYID = 0
5,222,812 UART: [idev] Erasing UDS.KEYID = 0
8,493,464 UART: [idev] Sha1 KeyId Algorithm
8,514,543 UART: [idev] --
8,518,289 UART: [ldev] ++
8,518,865 UART: [ldev] CDI.KEYID = 6
8,520,110 UART: [ldev] SUBJECT.KEYID = 5
8,521,538 UART: [ldev] AUTHORITY.KEYID = 7
8,523,017 UART: [ldev] FE.KEYID = 1
8,534,040 UART: [ldev] Erasing FE.KEYID = 1
11,826,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,479 UART: [ldev] --
14,189,111 UART: [fwproc] Wait for Commands...
14,191,894 UART: [fwproc] Recv command 0x46574c44
14,194,244 UART: Invalid Img size: 0 bytes
14,197,865 UART: ROM Fatal Error: 0x01020002
14,201,177 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
4,374 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,015,155 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,843 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,133 UART:
192,533 UART: Running Caliptra ROM ...
193,652 UART:
193,804 UART: [state] CFI Enabled
267,601 UART: [state] LifecycleState = Unprovisioned
269,556 UART: [state] DebugLocked = No
272,263 UART: [state] WD Timer not started. Device not locked for debugging
276,373 UART: [kat] SHA2-256
455,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,066 UART: [kat] ++
467,632 UART: [kat] sha1
477,762 UART: [kat] SHA2-256
480,770 UART: [kat] SHA2-384
487,896 UART: [kat] SHA2-512-ACC
490,824 UART: [kat] ECC-384
2,949,959 UART: [kat] HMAC-384Kdf
2,964,641 UART: [kat] LMS
3,494,105 UART: [kat] --
3,498,391 UART: [cold-reset] ++
3,499,575 UART: [fht] FHT @ 0x50003400
3,510,833 UART: [idev] ++
3,511,408 UART: [idev] CDI.KEYID = 6
3,512,317 UART: [idev] SUBJECT.KEYID = 7
3,513,531 UART: [idev] UDS.KEYID = 0
3,535,947 UART: [idev] Erasing UDS.KEYID = 0
6,015,058 UART: [idev] Sha1 KeyId Algorithm
6,037,510 UART: [idev] --
6,041,882 UART: [ldev] ++
6,042,465 UART: [ldev] CDI.KEYID = 6
6,043,379 UART: [ldev] SUBJECT.KEYID = 5
6,044,597 UART: [ldev] AUTHORITY.KEYID = 7
6,045,831 UART: [ldev] FE.KEYID = 1
6,092,760 UART: [ldev] Erasing FE.KEYID = 1
8,599,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,784 UART: [ldev] --
10,410,017 UART: [fwproc] Wait for Commands...
10,412,589 UART: [fwproc] Recv command 0x46574c44
10,414,695 UART: Invalid Img size: 0 bytes
10,417,913 UART: ROM Fatal Error: 0x01020002
10,421,021 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,952 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,162,701 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,260 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,478 UART:
192,859 UART: Running Caliptra ROM ...
193,965 UART:
603,666 UART: [state] CFI Enabled
616,388 UART: [state] LifecycleState = Unprovisioned
618,222 UART: [state] DebugLocked = No
619,657 UART: [state] WD Timer not started. Device not locked for debugging
624,253 UART: [kat] SHA2-256
803,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,967 UART: [kat] ++
815,493 UART: [kat] sha1
826,429 UART: [kat] SHA2-256
829,487 UART: [kat] SHA2-384
836,248 UART: [kat] SHA2-512-ACC
839,193 UART: [kat] ECC-384
3,278,165 UART: [kat] HMAC-384Kdf
3,290,396 UART: [kat] LMS
3,819,894 UART: [kat] --
3,824,310 UART: [cold-reset] ++
3,826,886 UART: [fht] FHT @ 0x50003400
3,836,566 UART: [idev] ++
3,837,123 UART: [idev] CDI.KEYID = 6
3,838,133 UART: [idev] SUBJECT.KEYID = 7
3,839,230 UART: [idev] UDS.KEYID = 0
3,854,826 UART: [idev] Erasing UDS.KEYID = 0
6,313,381 UART: [idev] Sha1 KeyId Algorithm
6,336,140 UART: [idev] --
6,340,559 UART: [ldev] ++
6,341,123 UART: [ldev] CDI.KEYID = 6
6,342,176 UART: [ldev] SUBJECT.KEYID = 5
6,343,272 UART: [ldev] AUTHORITY.KEYID = 7
6,344,440 UART: [ldev] FE.KEYID = 1
6,353,682 UART: [ldev] Erasing FE.KEYID = 1
8,831,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,342 UART: [ldev] --
10,620,855 UART: [fwproc] Wait for Commands...
10,622,629 UART: [fwproc] Recv command 0x46574c44
10,624,737 UART: Invalid Img size: 0 bytes
10,628,470 UART: ROM Fatal Error: 0x01020002
10,631,619 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
4,511 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,406,604 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,921 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,232 UART:
192,626 UART: Running Caliptra ROM ...
193,717 UART:
193,859 UART: [state] CFI Enabled
263,227 UART: [state] LifecycleState = Unprovisioned
265,095 UART: [state] DebugLocked = No
266,402 UART: [state] WD Timer not started. Device not locked for debugging
269,827 UART: [kat] SHA2-256
448,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,554 UART: [kat] ++
460,998 UART: [kat] sha1
471,656 UART: [kat] SHA2-256
474,662 UART: [kat] SHA2-384
479,516 UART: [kat] SHA2-512-ACC
482,498 UART: [kat] ECC-384
2,945,547 UART: [kat] HMAC-384Kdf
2,970,697 UART: [kat] LMS
3,500,151 UART: [kat] --
3,503,656 UART: [cold-reset] ++
3,504,942 UART: [fht] FHT @ 0x50003400
3,516,896 UART: [idev] ++
3,517,495 UART: [idev] CDI.KEYID = 6
3,518,423 UART: [idev] SUBJECT.KEYID = 7
3,519,584 UART: [idev] UDS.KEYID = 0
3,542,373 UART: [idev] Erasing UDS.KEYID = 0
6,026,763 UART: [idev] Sha1 KeyId Algorithm
6,050,103 UART: [idev] --
6,054,637 UART: [ldev] ++
6,055,210 UART: [ldev] CDI.KEYID = 6
6,056,094 UART: [ldev] SUBJECT.KEYID = 5
6,057,313 UART: [ldev] AUTHORITY.KEYID = 7
6,058,553 UART: [ldev] FE.KEYID = 1
6,099,965 UART: [ldev] Erasing FE.KEYID = 1
8,601,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,180 UART: [ldev] --
10,391,634 UART: [fwproc] Wait for Commands...
10,394,169 UART: [fwproc] Recv command 0x46574c44
10,396,312 UART: Invalid Img size: 0 bytes
10,400,983 UART: ROM Fatal Error: 0x01020002
10,404,079 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,788 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,207,354 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,375 writing to cptra_bootfsm_go
15,636 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
203,774 UART:
204,137 UART: Running Caliptra ROM ...
205,303 UART:
615,048 UART: [state] CFI Enabled
627,258 UART: [state] LifecycleState = Unprovisioned
629,091 UART: [state] DebugLocked = No
630,362 UART: [state] WD Timer not started. Device not locked for debugging
634,637 UART: [kat] SHA2-256
813,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
825,328 UART: [kat] ++
825,872 UART: [kat] sha1
836,863 UART: [kat] SHA2-256
839,935 UART: [kat] SHA2-384
845,311 UART: [kat] SHA2-512-ACC
848,239 UART: [kat] ECC-384
3,291,199 UART: [kat] HMAC-384Kdf
3,304,248 UART: [kat] LMS
3,833,718 UART: [kat] --
3,835,497 UART: [cold-reset] ++
3,837,427 UART: [fht] FHT @ 0x50003400
3,848,414 UART: [idev] ++
3,849,013 UART: [idev] CDI.KEYID = 6
3,849,929 UART: [idev] SUBJECT.KEYID = 7
3,851,144 UART: [idev] UDS.KEYID = 0
3,867,279 UART: [idev] Erasing UDS.KEYID = 0
6,323,850 UART: [idev] Sha1 KeyId Algorithm
6,348,317 UART: [idev] --
6,351,764 UART: [ldev] ++
6,352,333 UART: [ldev] CDI.KEYID = 6
6,353,238 UART: [ldev] SUBJECT.KEYID = 5
6,354,399 UART: [ldev] AUTHORITY.KEYID = 7
6,355,631 UART: [ldev] FE.KEYID = 1
6,366,058 UART: [ldev] Erasing FE.KEYID = 1
8,844,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,763 UART: [ldev] --
10,635,760 UART: [fwproc] Wait for Commands...
10,637,206 UART: [fwproc] Recv command 0x46574c44
10,639,324 UART: Invalid Img size: 0 bytes
10,642,253 UART: ROM Fatal Error: 0x01020002
10,645,389 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,125 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,409,546 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,329 UART: [idev] ++
1,172,497 UART: [idev] CDI.KEYID = 6
1,172,858 UART: [idev] SUBJECT.KEYID = 7
1,173,283 UART: [idev] UDS.KEYID = 0
1,181,045 UART: [idev] Erasing UDS.KEYID = 0
1,198,397 UART: [idev] Sha1 KeyId Algorithm
1,207,209 UART: [idev] --
1,208,280 UART: [ldev] ++
1,208,448 UART: [ldev] CDI.KEYID = 6
1,208,812 UART: [ldev] SUBJECT.KEYID = 5
1,209,239 UART: [ldev] AUTHORITY.KEYID = 7
1,209,702 UART: [ldev] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,241,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,134 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,279 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: Invalid Img size: 0 bytes
1,283,872 UART: ROM Fatal Error: 0x01020002
1,285,031 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,285 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,750 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,321 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,691 UART: Invalid Img size: 0 bytes
1,284,433 UART: ROM Fatal Error: 0x01020002
1,285,592 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,226 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
919,992 UART: [kat] LMS
1,168,304 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,591 UART: [fht] FHT @ 0x50003400
1,172,325 UART: [idev] ++
1,172,493 UART: [idev] CDI.KEYID = 6
1,172,854 UART: [idev] SUBJECT.KEYID = 7
1,173,279 UART: [idev] UDS.KEYID = 0
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,197,889 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,708 UART: [ldev] ++
1,207,876 UART: [ldev] CDI.KEYID = 6
1,208,240 UART: [ldev] SUBJECT.KEYID = 5
1,208,667 UART: [ldev] AUTHORITY.KEYID = 7
1,209,130 UART: [ldev] FE.KEYID = 1
1,214,324 UART: [ldev] Erasing FE.KEYID = 1
1,240,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,556 UART: [ldev] --
1,279,910 UART: [fwproc] Wait for Commands...
1,280,705 UART: [fwproc] Recv command 0x46574c44
1,281,434 UART: Invalid Img size: 0 bytes
1,282,260 UART: ROM Fatal Error: 0x01020002
1,283,419 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,045 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,601 UART: [kat] HMAC-384Kdf
921,141 UART: [kat] LMS
1,169,453 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,171,058 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,633 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46574c44
1,282,337 UART: Invalid Img size: 0 bytes
1,283,191 UART: ROM Fatal Error: 0x01020002
1,284,350 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,662 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
891,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,201 UART: [kat] SHA2-256
902,141 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,199,457 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,216,364 UART: [ldev] Erasing FE.KEYID = 1
1,242,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,376 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,316 UART: Invalid Img size: 0 bytes
1,284,246 UART: ROM Fatal Error: 0x01020002
1,285,405 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,327 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,182,134 UART: [idev] Erasing UDS.KEYID = 0
1,199,418 UART: [idev] Sha1 KeyId Algorithm
1,208,182 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,242,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,961 UART: [ldev] --
1,281,257 UART: [fwproc] Wait for Commands...
1,281,828 UART: [fwproc] Recv command 0x46574c44
1,282,557 UART: Invalid Img size: 0 bytes
1,283,369 UART: ROM Fatal Error: 0x01020002
1,284,528 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,708 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,106 UART:
192,801 UART: Running Caliptra ROM ...
194,032 UART:
194,202 UART: [state] CFI Enabled
264,727 UART: [state] LifecycleState = Unprovisioned
267,033 UART: [state] DebugLocked = No
269,592 UART: [state] WD Timer not started. Device not locked for debugging
273,426 UART: [kat] SHA2-256
455,354 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,895 UART: [kat] ++
467,420 UART: [kat] sha1
478,733 UART: [kat] SHA2-256
481,738 UART: [kat] SHA2-384
488,948 UART: [kat] SHA2-512-ACC
491,562 UART: [kat] ECC-384
3,778,321 UART: [kat] HMAC-384Kdf
3,803,724 UART: [kat] LMS
4,876,920 UART: [kat] --
4,883,291 UART: [cold-reset] ++
4,884,895 UART: [fht] FHT @ 0x50003400
4,897,330 UART: [idev] ++
4,898,067 UART: [idev] CDI.KEYID = 6
4,899,251 UART: [idev] SUBJECT.KEYID = 7
4,900,405 UART: [idev] UDS.KEYID = 0
4,923,911 UART: [idev] Erasing UDS.KEYID = 0
8,237,294 UART: [idev] Sha1 KeyId Algorithm
8,258,398 UART: [idev] CSR upload begun
8,263,874 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,568,052 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,584,337 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,600,412 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,616,459 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,641,001 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,787,091 UART: [idev] CSR uploaded
10,804,909 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,948,697 UART: [idev] --
10,949,337 UART: [ldev] ++
10,949,828 UART: [ldev] CDI.KEYID = 6
10,950,723 UART: [ldev] SUBJECT.KEYID = 5
10,951,823 UART: [ldev] AUTHORITY.KEYID = 7
10,952,948 UART: [ldev] FE.KEYID = 1
10,953,886 UART: [ldev] Erasing FE.KEYID = 1
14,189,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,499,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,515,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,531,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,547,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,568,303 UART: [ldev] --
16,572,530 UART: [fwproc] Wait for Commands...
16,575,271 UART: [fwproc] Recv command 0x46574c44
16,577,579 UART: [fwproc] Recv'd Img size: 114124 bytes
20,646,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,721,146 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,789,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,106,099 >>> mbox cmd response: success
21,109,766 UART: [afmc] ++
21,110,351 UART: [afmc] CDI.KEYID = 6
21,111,534 UART: [afmc] SUBJECT.KEYID = 7
21,112,720 UART: [afmc] AUTHORITY.KEYID = 5
24,479,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,777,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,780,212 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,796,401 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,812,454 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,828,457 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,851,725 UART: [afmc] --
26,854,739 UART: [cold-reset] --
26,859,898 UART: [state] Locking Datavault
26,865,950 UART: [state] Locking PCR0, PCR1 and PCR31
26,867,598 UART: [state] Locking ICCM
26,869,051 UART: [exit] Launching FMC @ 0x40000130
26,877,720 UART:
26,877,952 UART: Running Caliptra FMC ...
26,879,048 UART:
26,879,226 UART: [state] CFI Enabled
26,939,697 UART: [fht] FMC Alias Private Key: 7
29,278,097 UART: [art] Extend RT PCRs Done
29,279,321 UART: [art] Lock RT PCRs Done
29,280,699 UART: [art] Populate DV Done
29,286,106 UART: [fht] FMC Alias Private Key: 7
29,287,585 UART: [art] Derive CDI
29,288,343 UART: [art] Store in in slot 0x4
29,347,878 UART: [art] Derive Key Pair
29,348,916 UART: [art] Store priv key in slot 0x5
32,640,862 UART: [art] Derive Key Pair - Done
32,653,803 UART: [art] Signing Cert with AUTHO
32,655,104 UART: RITY.KEYID = 7
34,941,693 UART: [art] Erasing AUTHORITY.KEYID = 7
34,943,202 UART: [art] PUB.X = 5F9CF04AF9DD2D0F49E59B44A57EF0BCB20381EEAE279E4362CCE3F255BABAEC0091210D6FD741A8D52B1595551BA932
34,950,445 UART: [art] PUB.Y = 137D356AC740AAEAE2DC4A8C018EAD96F07F011C745C8ABE8FE8D0485A3ACB39A7DAD0203BD4BA2A87ED24B1CC28E6FB
34,957,752 UART: [art] SIG.R = 5550CEDF2FB971496385BF79276B31D05BD424745A3EDC534D4140887C038E9E23FE724F380FEBEB2B13D71CEECBACA0
34,965,157 UART: [art] SIG.S = B0AC24B3CDDEA648099A7ED6DD8376B8113F29581255BA476E7A948C54B51E677876790D2ABFE0CECA2C5FFDAF399D6A
36,270,401 UART: Caliptra RT
36,271,118 UART: [state] CFI Enabled
36,431,575 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
10,492,868 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,671,282 >>> mbox cmd response: success
26,355,816 UART:
26,356,221 UART: Running Caliptra FMC ...
26,357,348 UART:
26,357,504 UART: [state] CFI Enabled
26,424,198 UART: [fht] FMC Alias Private Key: 7
28,762,034 UART: [art] Extend RT PCRs Done
28,763,269 UART: [art] Lock RT PCRs Done
28,764,813 UART: [art] Populate DV Done
28,770,071 UART: [fht] FMC Alias Private Key: 7
28,771,613 UART: [art] Derive CDI
28,772,350 UART: [art] Store in in slot 0x4
28,832,226 UART: [art] Derive Key Pair
28,833,267 UART: [art] Store priv key in slot 0x5
32,125,682 UART: [art] Derive Key Pair - Done
32,138,722 UART: [art] Signing Cert with AUTHO
32,140,030 UART: RITY.KEYID = 7
34,426,895 UART: [art] Erasing AUTHORITY.KEYID = 7
34,428,410 UART: [art] PUB.X = 944F3D7F901E4B6D084F19C2846BD64936165F6F37B9E7D022797A91675C8B61076F05E0425DCD8B5AF3F6637395F3C6
34,435,656 UART: [art] PUB.Y = 22E8564F1A3A697CA827FF560C4A1CBAA5E56180E52D0275C80DA0D2AF74582A6CFEE1DA203C8DBBFC96613F877A3889
34,442,921 UART: [art] SIG.R = 2B790CF46E9F10B2610ED2C476D030089A04D6BA802E6F5255A27FB48061749AF976AF59156A0C0A4114B50525E1721C
34,450,259 UART: [art] SIG.S = D98E9939489ABB7350FF944F260ABDB07D0B7C851ED5C9630E5752FBDE15405CCA312850E40292775F6355EE67675B35
35,755,776 UART: Caliptra RT
35,756,495 UART: [state] CFI Enabled
35,916,522 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,461 UART:
192,837 UART: Running Caliptra ROM ...
193,957 UART:
603,755 UART: [state] CFI Enabled
612,583 UART: [state] LifecycleState = Unprovisioned
614,958 UART: [state] DebugLocked = No
616,927 UART: [state] WD Timer not started. Device not locked for debugging
621,193 UART: [kat] SHA2-256
803,197 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
814,721 UART: [kat] ++
815,219 UART: [kat] sha1
826,216 UART: [kat] SHA2-256
829,274 UART: [kat] SHA2-384
835,889 UART: [kat] SHA2-512-ACC
838,507 UART: [kat] ECC-384
4,093,920 UART: [kat] HMAC-384Kdf
4,105,257 UART: [kat] LMS
5,178,422 UART: [kat] --
5,184,589 UART: [cold-reset] ++
5,185,665 UART: [fht] FHT @ 0x50003400
5,198,477 UART: [idev] ++
5,199,153 UART: [idev] CDI.KEYID = 6
5,200,382 UART: [idev] SUBJECT.KEYID = 7
5,201,807 UART: [idev] UDS.KEYID = 0
5,219,614 UART: [idev] Erasing UDS.KEYID = 0
8,492,309 UART: [idev] Sha1 KeyId Algorithm
8,512,509 UART: [idev] CSR upload begun
8,518,021 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,806,984 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,823,414 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,839,462 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,855,450 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,880,035 UART: [idev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
11,026,082 UART: [idev] CSR uploaded
11,043,408 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,186,897 UART: [idev] --
11,187,533 UART: [ldev] ++
11,188,032 UART: [ldev] CDI.KEYID = 6
11,188,905 UART: [ldev] SUBJECT.KEYID = 5
11,189,977 UART: [ldev] AUTHORITY.KEYID = 7
11,191,158 UART: [ldev] FE.KEYID = 1
11,191,993 UART: [ldev] Erasing FE.KEYID = 1
14,353,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,643,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,659,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,675,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,691,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,711,250 UART: [ldev] --
16,716,574 UART: [fwproc] Wait for Commands...
16,719,204 UART: [fwproc] Recv command 0x46574c44
16,721,455 UART: [fwproc] Recv'd Img size: 114124 bytes
20,794,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,870,095 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,938,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,256,604 >>> mbox cmd response: success
21,260,596 UART: [afmc] ++
21,261,220 UART: [afmc] CDI.KEYID = 6
21,262,273 UART: [afmc] SUBJECT.KEYID = 7
21,263,490 UART: [afmc] AUTHORITY.KEYID = 5
24,578,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,872,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,874,775 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,890,978 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,907,049 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,923,018 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,945,770 UART: [afmc] --
26,950,131 UART: [cold-reset] --
26,952,861 UART: [state] Locking Datavault
26,959,724 UART: [state] Locking PCR0, PCR1 and PCR31
26,961,358 UART: [state] Locking ICCM
26,964,261 UART: [exit] Launching FMC @ 0x40000130
26,972,938 UART:
26,973,167 UART: Running Caliptra FMC ...
26,974,261 UART:
26,974,414 UART: [state] CFI Enabled
26,982,526 UART: [fht] FMC Alias Private Key: 7
29,313,280 UART: [art] Extend RT PCRs Done
29,314,502 UART: [art] Lock RT PCRs Done
29,316,473 UART: [art] Populate DV Done
29,321,823 UART: [fht] FMC Alias Private Key: 7
29,323,463 UART: [art] Derive CDI
29,324,267 UART: [art] Store in in slot 0x4
29,366,672 UART: [art] Derive Key Pair
29,367,742 UART: [art] Store priv key in slot 0x5
32,609,434 UART: [art] Derive Key Pair - Done
32,622,428 UART: [art] Signing Cert with AUTHO
32,623,755 UART: RITY.KEYID = 7
34,902,918 UART: [art] Erasing AUTHORITY.KEYID = 7
34,904,429 UART: [art] PUB.X = C3F7C40241F52022BA9EA95A552146FAFF2BE5FD05FB736FE1026A213D39EE9EF501FAD18ACDDED24E3A16C662EBB563
34,911,655 UART: [art] PUB.Y = BA72A7A6C93ECA5FB0F8BFE0A64EFB372A0F8F1D48F3475B3846D72D96AE2AD44E061C11B1D91BF18E5F9227516D610E
34,918,929 UART: [art] SIG.R = 2EB5DC6576FBD25EDEBCBA270802AEA0CF28268EAE828F16D135D62AC26529250CCB8DB920BB58680202F57146359AFE
34,926,326 UART: [art] SIG.S = DA80D2FDFE5D6F7A5168DC5D07E5FC4E3A13E0F0411EA6C3AC3D39995E27F7AFC77B52696C01E0434C1B916F0B9B39E2
36,230,955 UART: Caliptra RT
36,231,668 UART: [state] CFI Enabled
36,349,329 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
10,734,041 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,856,210 >>> mbox cmd response: success
26,493,130 UART:
26,493,926 UART: Running Caliptra FMC ...
26,495,110 UART:
26,495,260 UART: [state] CFI Enabled
26,502,823 UART: [fht] FMC Alias Private Key: 7
28,833,549 UART: [art] Extend RT PCRs Done
28,834,800 UART: [art] Lock RT PCRs Done
28,836,400 UART: [art] Populate DV Done
28,841,697 UART: [fht] FMC Alias Private Key: 7
28,843,344 UART: [art] Derive CDI
28,844,099 UART: [art] Store in in slot 0x4
28,887,132 UART: [art] Derive Key Pair
28,888,171 UART: [art] Store priv key in slot 0x5
32,129,447 UART: [art] Derive Key Pair - Done
32,142,215 UART: [art] Signing Cert with AUTHO
32,143,566 UART: RITY.KEYID = 7
34,422,798 UART: [art] Erasing AUTHORITY.KEYID = 7
34,424,299 UART: [art] PUB.X = 722DFFE355DCCB12A07492276BD5559D714F93B20AA188D0280AC312E97D39E8624D7EC6BA8482CFE1571346A9DCF4BF
34,431,512 UART: [art] PUB.Y = E2797E2D41808E126D99418E5C01E56A08B204B9F9BC9B6D06BAAB6A673E91A48A5AB162D839FEF1F04D086E067BD714
34,438,782 UART: [art] SIG.R = 5399EEDBFAA3349D8F09CEDE50BEF79A62FA852C32312F5E6C6AB98627255256C9E3B55CFCE125E9C0DFB94C2E8673BC
34,446,190 UART: [art] SIG.S = 6297A57CD85E7E741BDCCCEC64A4A2D31CDFD1E89114D7F48E964FEE27BF35B343B196032F3725813C5FB8E5EADBE049
35,751,389 UART: Caliptra RT
35,752,087 UART: [state] CFI Enabled
35,869,549 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,364 UART:
192,737 UART: Running Caliptra ROM ...
193,924 UART:
194,075 UART: [state] CFI Enabled
261,923 UART: [state] LifecycleState = Unprovisioned
263,844 UART: [state] DebugLocked = No
265,990 UART: [state] WD Timer not started. Device not locked for debugging
269,453 UART: [kat] SHA2-256
448,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,157 UART: [kat] ++
460,690 UART: [kat] sha1
470,659 UART: [kat] SHA2-256
473,657 UART: [kat] SHA2-384
479,099 UART: [kat] SHA2-512-ACC
482,039 UART: [kat] ECC-384
2,924,984 UART: [kat] HMAC-384Kdf
2,948,880 UART: [kat] LMS
3,478,337 UART: [kat] --
3,482,883 UART: [cold-reset] ++
3,483,785 UART: [fht] FHT @ 0x50003400
3,494,358 UART: [idev] ++
3,494,919 UART: [idev] CDI.KEYID = 6
3,495,800 UART: [idev] SUBJECT.KEYID = 7
3,496,954 UART: [idev] UDS.KEYID = 0
3,521,294 UART: [idev] Erasing UDS.KEYID = 0
6,003,673 UART: [idev] Sha1 KeyId Algorithm
6,024,739 UART: [idev] CSR upload begun
6,029,465 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,758,985 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,775,035 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,790,969 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,806,832 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,830,659 UART: [idev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
7,975,730 UART: [idev] CSR uploaded
7,993,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,137,981 UART: [idev] --
8,138,613 UART: [ldev] ++
8,139,106 UART: [ldev] CDI.KEYID = 6
8,140,017 UART: [ldev] SUBJECT.KEYID = 5
8,141,065 UART: [ldev] AUTHORITY.KEYID = 7
8,142,159 UART: [ldev] FE.KEYID = 1
8,143,231 UART: [ldev] Erasing FE.KEYID = 1
10,541,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,278,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,294,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,309,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,330,104 UART: [ldev] --
12,334,023 UART: [fwproc] Wait for Commands...
12,337,103 UART: [fwproc] Recv command 0x46574c44
12,339,224 UART: [fwproc] Recv'd Img size: 114448 bytes
15,738,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,813,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,881,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,200,945 >>> mbox cmd response: success
16,205,864 UART: [afmc] ++
16,206,453 UART: [afmc] CDI.KEYID = 6
16,207,363 UART: [afmc] SUBJECT.KEYID = 7
16,208,585 UART: [afmc] AUTHORITY.KEYID = 5
18,747,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,472,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,474,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,490,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,506,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,522,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,543,963 UART: [afmc] --
20,547,447 UART: [cold-reset] --
20,551,156 UART: [state] Locking Datavault
20,555,165 UART: [state] Locking PCR0, PCR1 and PCR31
20,556,871 UART: [state] Locking ICCM
20,559,021 UART: [exit] Launching FMC @ 0x40000130
20,567,420 UART:
20,567,655 UART: Running Caliptra FMC ...
20,568,755 UART:
20,568,917 UART: [state] CFI Enabled
20,630,274 UART: [fht] FMC Alias Private Key: 7
22,394,267 UART: [art] Extend RT PCRs Done
22,395,486 UART: [art] Lock RT PCRs Done
22,397,428 UART: [art] Populate DV Done
22,402,671 UART: [fht] FMC Alias Private Key: 7
22,404,168 UART: [art] Derive CDI
22,404,905 UART: [art] Store in in slot 0x4
22,463,037 UART: [art] Derive Key Pair
22,464,085 UART: [art] Store priv key in slot 0x5
24,927,182 UART: [art] Derive Key Pair - Done
24,940,396 UART: [art] Signing Cert with AUTHO
24,941,703 UART: RITY.KEYID = 7
26,652,600 UART: [art] Erasing AUTHORITY.KEYID = 7
26,654,104 UART: [art] PUB.X = 4E3447B84D30107016A3D8640C897B8FBA93ABEB5A4B3F19BD49060757D3CBD8D4D42C96A945B67D2E7C5EDFE43665E0
26,661,398 UART: [art] PUB.Y = A7C3CDD65E3DB464930B855C17A5C3D055E91384FD74F38578D76259501EB7974D14E92BC3956E5630AAC97E0F64BBFB
26,668,630 UART: [art] SIG.R = 30A73B8C890E19BEB76641F77B6EF525F8DC9642B45A1482CBD7B2524DDF168C6713224C9F30AEC6E6B5FBD81B893E87
26,676,016 UART: [art] SIG.S = 56BC15000E7F4DC4F99EE4186C63E2AE42C20AFF07C3BE5EC6054CF8B0EAE95DD64D8CB311A4BE073603B7B278B6C397
27,655,131 UART: Caliptra RT
27,655,837 UART: [state] CFI Enabled
27,820,439 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
7,703,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,824,544 >>> mbox cmd response: success
20,104,853 UART:
20,105,253 UART: Running Caliptra FMC ...
20,106,370 UART:
20,106,522 UART: [state] CFI Enabled
20,174,162 UART: [fht] FMC Alias Private Key: 7
21,937,846 UART: [art] Extend RT PCRs Done
21,939,051 UART: [art] Lock RT PCRs Done
21,940,611 UART: [art] Populate DV Done
21,946,137 UART: [fht] FMC Alias Private Key: 7
21,947,728 UART: [art] Derive CDI
21,948,463 UART: [art] Store in in slot 0x4
22,006,851 UART: [art] Derive Key Pair
22,007,901 UART: [art] Store priv key in slot 0x5
24,482,199 UART: [art] Derive Key Pair - Done
24,495,034 UART: [art] Signing Cert with AUTHO
24,496,381 UART: RITY.KEYID = 7
26,210,022 UART: [art] Erasing AUTHORITY.KEYID = 7
26,211,537 UART: [art] PUB.X = 2375ABE07F065CDA4F307CDDB17F080D7AF4C38DF7808D61B73108454590C542852B6E10AB61B6D2E8E6F63EA9E5FA1D
26,218,807 UART: [art] PUB.Y = 13A3287C805BB334A764223EC7D7D3D9892FF636976F7E7E71CEB0D0A899D99F52DAF66EE2456EF0918916F88B61405C
26,226,046 UART: [art] SIG.R = 80B1122DAC0143515F0B4BAB8C787EC2CD9EC172C5774F5DFC85361792AD78D16DF8712099AE329A4478F5ABBD4F9DE2
26,233,465 UART: [art] SIG.S = 35C2E43417D668628BA9F2DD0BC3955CBA7F1621B88C5BAA83D4AD64A1C2AE7C92F9349BDAECD2120AE1D9EE0767206B
27,212,526 UART: Caliptra RT
27,213,716 UART: [state] CFI Enabled
27,378,152 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,295 UART:
192,680 UART: Running Caliptra ROM ...
193,858 UART:
603,422 UART: [state] CFI Enabled
617,695 UART: [state] LifecycleState = Unprovisioned
619,567 UART: [state] DebugLocked = No
622,211 UART: [state] WD Timer not started. Device not locked for debugging
626,309 UART: [kat] SHA2-256
805,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,030 UART: [kat] ++
817,482 UART: [kat] sha1
829,272 UART: [kat] SHA2-256
832,332 UART: [kat] SHA2-384
838,954 UART: [kat] SHA2-512-ACC
841,923 UART: [kat] ECC-384
3,285,005 UART: [kat] HMAC-384Kdf
3,296,901 UART: [kat] LMS
3,826,411 UART: [kat] --
3,830,618 UART: [cold-reset] ++
3,832,597 UART: [fht] FHT @ 0x50003400
3,843,838 UART: [idev] ++
3,844,399 UART: [idev] CDI.KEYID = 6
3,845,282 UART: [idev] SUBJECT.KEYID = 7
3,846,492 UART: [idev] UDS.KEYID = 0
3,865,251 UART: [idev] Erasing UDS.KEYID = 0
6,322,544 UART: [idev] Sha1 KeyId Algorithm
6,342,810 UART: [idev] CSR upload begun
6,347,527 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,064,625 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,080,716 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,096,645 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,112,510 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,136,309 UART: [idev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
8,281,442 UART: [idev] CSR uploaded
8,299,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,443,580 UART: [idev] --
8,444,227 UART: [ldev] ++
8,444,724 UART: [ldev] CDI.KEYID = 6
8,445,601 UART: [ldev] SUBJECT.KEYID = 5
8,446,746 UART: [ldev] AUTHORITY.KEYID = 7
8,447,867 UART: [ldev] FE.KEYID = 1
8,448,709 UART: [ldev] Erasing FE.KEYID = 1
10,789,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,509,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,525,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,541,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,557,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,576,700 UART: [ldev] --
12,581,093 UART: [fwproc] Wait for Commands...
12,582,973 UART: [fwproc] Recv command 0x46574c44
12,585,069 UART: [fwproc] Recv'd Img size: 114448 bytes
15,986,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,060,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,129,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,447,747 >>> mbox cmd response: success
16,452,141 UART: [afmc] ++
16,452,744 UART: [afmc] CDI.KEYID = 6
16,453,653 UART: [afmc] SUBJECT.KEYID = 7
16,454,811 UART: [afmc] AUTHORITY.KEYID = 5
18,954,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,672,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,674,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,689,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,705,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,721,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,743,371 UART: [afmc] --
20,747,818 UART: [cold-reset] --
20,751,947 UART: [state] Locking Datavault
20,756,763 UART: [state] Locking PCR0, PCR1 and PCR31
20,758,506 UART: [state] Locking ICCM
20,759,912 UART: [exit] Launching FMC @ 0x40000130
20,768,311 UART:
20,768,569 UART: Running Caliptra FMC ...
20,769,669 UART:
20,769,824 UART: [state] CFI Enabled
20,778,036 UART: [fht] FMC Alias Private Key: 7
22,534,834 UART: [art] Extend RT PCRs Done
22,536,042 UART: [art] Lock RT PCRs Done
22,537,829 UART: [art] Populate DV Done
22,543,071 UART: [fht] FMC Alias Private Key: 7
22,544,713 UART: [art] Derive CDI
22,545,520 UART: [art] Store in in slot 0x4
22,588,376 UART: [art] Derive Key Pair
22,589,377 UART: [art] Store priv key in slot 0x5
25,016,060 UART: [art] Derive Key Pair - Done
25,028,903 UART: [art] Signing Cert with AUTHO
25,030,215 UART: RITY.KEYID = 7
26,735,416 UART: [art] Erasing AUTHORITY.KEYID = 7
26,736,920 UART: [art] PUB.X = 59FDD8CBBD7F19700DD67F49CC6C04E5B985968C8B8F8DD4022C05E0F8E9EDCFEC0AE01A6C098AC2F58C102625901CA4
26,744,191 UART: [art] PUB.Y = D1221A847F28329756A65976BDAD6026E04195BA18A2063C6AFCDA068604B2417E6B84DC459361402BCFA33F50D61E88
26,751,470 UART: [art] SIG.R = A8DC232A43E4D6879A3DB2B4488D25FCDF00BFF614CAD69932B09D981B0C3D5DADD80569D8C589404173CF011F74E23B
26,758,889 UART: [art] SIG.S = 5F3F2801EC3DB751787F0DC35CB101D2FFD09443FC73B708D341138A4EF84C1BECA2947EA52C6B06D7DDA86E26E7C55C
27,738,085 UART: Caliptra RT
27,738,804 UART: [state] CFI Enabled
27,855,646 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
7,940,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,413 >>> mbox cmd response: success
20,266,747 UART:
20,267,151 UART: Running Caliptra FMC ...
20,268,259 UART:
20,268,434 UART: [state] CFI Enabled
20,276,554 UART: [fht] FMC Alias Private Key: 7
22,033,505 UART: [art] Extend RT PCRs Done
22,034,713 UART: [art] Lock RT PCRs Done
22,036,366 UART: [art] Populate DV Done
22,041,826 UART: [fht] FMC Alias Private Key: 7
22,043,308 UART: [art] Derive CDI
22,044,041 UART: [art] Store in in slot 0x4
22,086,378 UART: [art] Derive Key Pair
22,087,416 UART: [art] Store priv key in slot 0x5
24,514,271 UART: [art] Derive Key Pair - Done
24,526,782 UART: [art] Signing Cert with AUTHO
24,528,118 UART: RITY.KEYID = 7
26,233,680 UART: [art] Erasing AUTHORITY.KEYID = 7
26,235,182 UART: [art] PUB.X = C3B5588930B8DD96D7E27FE6267151B2C93E18D7CAAFCCABC35A87F288D29773133B3F60A0FA7C3FA46747B589517503
26,242,478 UART: [art] PUB.Y = ABA1EBD9BC7E135F065F0A53ED5236A0D84A643474B9E34B728D05D6D679A74A0D011A1A5B9B98B687245924AF358C36
26,249,762 UART: [art] SIG.R = BFCBB9766F26DD210EE3D1B5A14C01D67DE6784BC06DC10D1DD2BB33CA86EDB5ADE7184EC0332E55A7F3119716B9818F
26,257,151 UART: [art] SIG.S = 93B93D7E788899F925B8AC63CA916F2B0674F3F70F459B04FB733A618975FDC1A2BFE2ECDE6DC87D9DC15FD6DF1137FA
27,236,051 UART: Caliptra RT
27,236,774 UART: [state] CFI Enabled
27,354,411 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,088 writing to cptra_bootfsm_go
193,432 UART:
193,797 UART: Running Caliptra ROM ...
194,977 UART:
195,148 UART: [state] CFI Enabled
264,365 UART: [state] LifecycleState = Unprovisioned
266,233 UART: [state] DebugLocked = No
267,940 UART: [state] WD Timer not started. Device not locked for debugging
272,164 UART: [kat] SHA2-256
451,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,855 UART: [kat] ++
463,388 UART: [kat] sha1
473,620 UART: [kat] SHA2-256
476,628 UART: [kat] SHA2-384
483,657 UART: [kat] SHA2-512-ACC
486,588 UART: [kat] ECC-384
2,948,427 UART: [kat] HMAC-384Kdf
2,972,331 UART: [kat] LMS
3,501,774 UART: [kat] --
3,507,460 UART: [cold-reset] ++
3,508,882 UART: [fht] FHT @ 0x50003400
3,519,002 UART: [idev] ++
3,519,574 UART: [idev] CDI.KEYID = 6
3,520,666 UART: [idev] SUBJECT.KEYID = 7
3,521,788 UART: [idev] UDS.KEYID = 0
3,544,040 UART: [idev] Erasing UDS.KEYID = 0
6,027,814 UART: [idev] Sha1 KeyId Algorithm
6,049,108 UART: [idev] CSR upload begun
6,053,791 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,775 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,034 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,823 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,829,638 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,445 UART: [idev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
7,998,609 UART: [idev] CSR uploaded
8,016,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,161,138 UART: [idev] --
8,161,793 UART: [ldev] ++
8,162,290 UART: [ldev] CDI.KEYID = 6
8,163,167 UART: [ldev] SUBJECT.KEYID = 5
8,164,260 UART: [ldev] AUTHORITY.KEYID = 7
8,165,378 UART: [ldev] FE.KEYID = 1
8,166,215 UART: [ldev] Erasing FE.KEYID = 1
10,568,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,308,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,324,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,340,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,356,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,377,116 UART: [ldev] --
12,381,086 UART: [fwproc] Wait for Commands...
12,383,131 UART: [fwproc] Recv command 0x46574c44
12,385,171 UART: [fwproc] Recv'd Img size: 114448 bytes
15,794,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,858,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,927,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,246,185 >>> mbox cmd response: success
16,250,007 UART: [afmc] ++
16,250,599 UART: [afmc] CDI.KEYID = 6
16,251,512 UART: [afmc] SUBJECT.KEYID = 7
16,252,670 UART: [afmc] AUTHORITY.KEYID = 5
18,790,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,516,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,518,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,534,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,550,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,566,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,589,527 UART: [afmc] --
20,593,928 UART: [cold-reset] --
20,596,939 UART: [state] Locking Datavault
20,601,700 UART: [state] Locking PCR0, PCR1 and PCR31
20,603,340 UART: [state] Locking ICCM
20,605,794 UART: [exit] Launching FMC @ 0x40000130
20,614,240 UART:
20,614,470 UART: Running Caliptra FMC ...
20,615,508 UART:
20,615,653 UART: [state] CFI Enabled
20,675,352 UART: [fht] FMC Alias Private Key: 7
22,439,126 UART: [art] Extend RT PCRs Done
22,440,364 UART: [art] Lock RT PCRs Done
22,442,071 UART: [art] Populate DV Done
22,447,432 UART: [fht] FMC Alias Private Key: 7
22,449,136 UART: [art] Derive CDI
22,449,951 UART: [art] Store in in slot 0x4
22,507,836 UART: [art] Derive Key Pair
22,508,895 UART: [art] Store priv key in slot 0x5
24,971,487 UART: [art] Derive Key Pair - Done
24,984,760 UART: [art] Signing Cert with AUTHO
24,986,064 UART: RITY.KEYID = 7
26,697,181 UART: [art] Erasing AUTHORITY.KEYID = 7
26,698,679 UART: [art] PUB.X = 275D19E9378434D1D2EDA1DB71D79C97D99AA57D88D8AEEE7790F29C553F767D27055C38C71817BF066C4F727FB9C183
26,705,945 UART: [art] PUB.Y = 5346AB7D4AFB67E976D25FAA1AD5FD8E6BC694A835312709333CB176181C8D7AC4508ECFB8305235A3ED68FE8FF24D13
26,713,180 UART: [art] SIG.R = 0ACF601BBA6A2D861A12C89530082FA65DB8ABF8B45AF586C166BAA0D1504695EE97EBDBADFFF44B89C8412A3F65600D
26,720,816 UART: [art] SIG.S = 80F6F6DCEBEBBFAD18477815B893A340F58F261263FA471E9811AF7AE6F4D51BAD60E92701753865E53AC26F0F3ECDD3
27,699,629 UART: Caliptra RT
27,700,335 UART: [state] CFI Enabled
27,867,007 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
7,669,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,822,453 >>> mbox cmd response: success
20,114,316 UART:
20,114,711 UART: Running Caliptra FMC ...
20,115,811 UART:
20,115,964 UART: [state] CFI Enabled
20,180,645 UART: [fht] FMC Alias Private Key: 7
21,944,603 UART: [art] Extend RT PCRs Done
21,945,842 UART: [art] Lock RT PCRs Done
21,947,386 UART: [art] Populate DV Done
21,952,740 UART: [fht] FMC Alias Private Key: 7
21,954,441 UART: [art] Derive CDI
21,955,178 UART: [art] Store in in slot 0x4
22,013,463 UART: [art] Derive Key Pair
22,014,510 UART: [art] Store priv key in slot 0x5
24,477,122 UART: [art] Derive Key Pair - Done
24,490,122 UART: [art] Signing Cert with AUTHO
24,491,422 UART: RITY.KEYID = 7
26,202,813 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,324 UART: [art] PUB.X = F11DF3B67B16D143B7F0E53E94F66E8B622897686A7D988C5E116F4505AA56DE5598863C7A3ABE52EE42F1D886BABD2F
26,211,621 UART: [art] PUB.Y = 788CF5BC42180FC44F24C8B1AD72E1C2FB0D8F1886EF0F7AF29EC65097DCAF0B6E4A0896F1708A1DA6ED70EEFF1BA08F
26,218,899 UART: [art] SIG.R = E5A5A5A85FC31615EE01E9139E8FC7E13E8DE4333445344F36A693D2A9417DB445A9228A9B45E3F212117D263D70AF7E
26,226,326 UART: [art] SIG.S = FB36B27CC1BED65A0AD07E63BC81922302230B5715EF4FB50FF98919A165D5D9FD2A5918D821F4D2590A668344348B7F
27,204,772 UART: Caliptra RT
27,205,485 UART: [state] CFI Enabled
27,370,606 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,586 UART:
192,954 UART: Running Caliptra ROM ...
194,130 UART:
603,658 UART: [state] CFI Enabled
619,530 UART: [state] LifecycleState = Unprovisioned
621,407 UART: [state] DebugLocked = No
623,428 UART: [state] WD Timer not started. Device not locked for debugging
626,959 UART: [kat] SHA2-256
806,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,663 UART: [kat] ++
818,108 UART: [kat] sha1
829,144 UART: [kat] SHA2-256
832,149 UART: [kat] SHA2-384
838,720 UART: [kat] SHA2-512-ACC
841,711 UART: [kat] ECC-384
3,282,492 UART: [kat] HMAC-384Kdf
3,293,582 UART: [kat] LMS
3,823,066 UART: [kat] --
3,826,997 UART: [cold-reset] ++
3,829,407 UART: [fht] FHT @ 0x50003400
3,840,594 UART: [idev] ++
3,841,199 UART: [idev] CDI.KEYID = 6
3,842,116 UART: [idev] SUBJECT.KEYID = 7
3,843,293 UART: [idev] UDS.KEYID = 0
3,858,730 UART: [idev] Erasing UDS.KEYID = 0
6,312,309 UART: [idev] Sha1 KeyId Algorithm
6,333,592 UART: [idev] CSR upload begun
6,338,306 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,055,733 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,071,856 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,087,754 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,103,630 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,127,447 UART: [idev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
8,272,638 UART: [idev] CSR uploaded
8,290,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,434,725 UART: [idev] --
8,435,366 UART: [ldev] ++
8,435,859 UART: [ldev] CDI.KEYID = 6
8,436,735 UART: [ldev] SUBJECT.KEYID = 5
8,437,890 UART: [ldev] AUTHORITY.KEYID = 7
8,439,067 UART: [ldev] FE.KEYID = 1
8,439,942 UART: [ldev] Erasing FE.KEYID = 1
10,783,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,502,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,518,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,534,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,549,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,570,308 UART: [ldev] --
12,575,311 UART: [fwproc] Wait for Commands...
12,576,918 UART: [fwproc] Recv command 0x46574c44
12,578,961 UART: [fwproc] Recv'd Img size: 114448 bytes
15,982,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,124,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,442,768 >>> mbox cmd response: success
16,446,863 UART: [afmc] ++
16,447,447 UART: [afmc] CDI.KEYID = 6
16,448,330 UART: [afmc] SUBJECT.KEYID = 7
16,449,537 UART: [afmc] AUTHORITY.KEYID = 5
18,949,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,671,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,673,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,689,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,705,499 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,721,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,743,944 UART: [afmc] --
20,747,373 UART: [cold-reset] --
20,752,415 UART: [state] Locking Datavault
20,757,331 UART: [state] Locking PCR0, PCR1 and PCR31
20,759,023 UART: [state] Locking ICCM
20,760,390 UART: [exit] Launching FMC @ 0x40000130
20,768,796 UART:
20,769,025 UART: Running Caliptra FMC ...
20,770,048 UART:
20,770,194 UART: [state] CFI Enabled
20,777,914 UART: [fht] FMC Alias Private Key: 7
22,534,530 UART: [art] Extend RT PCRs Done
22,535,750 UART: [art] Lock RT PCRs Done
22,537,128 UART: [art] Populate DV Done
22,542,648 UART: [fht] FMC Alias Private Key: 7
22,544,186 UART: [art] Derive CDI
22,544,916 UART: [art] Store in in slot 0x4
22,587,335 UART: [art] Derive Key Pair
22,588,372 UART: [art] Store priv key in slot 0x5
25,015,585 UART: [art] Derive Key Pair - Done
25,028,430 UART: [art] Signing Cert with AUTHO
25,029,732 UART: RITY.KEYID = 7
26,735,220 UART: [art] Erasing AUTHORITY.KEYID = 7
26,736,722 UART: [art] PUB.X = 0FBD31BD39410091E14DB1FB0B693D86A97E451F138128B4CA2282C269702CC1954B329276809AF3C9D5600FFEFB584F
26,743,948 UART: [art] PUB.Y = 0806E604358FB5749DC206BE74AE45465B6BB116068EBB6AA27EDAC8D0DB6B0BFCDADF5C30CF445CB1534ED7726181C4
26,751,229 UART: [art] SIG.R = AAF64C8DE535A1B7B36661EC7A9B0BEB636B935E015029E385F41944F6CF593CD240346C84B067D6569A12BA5BC1B243
26,758,622 UART: [art] SIG.S = 162B434EF6C4D81E2ECBECF73BAF7CC9F618EFD4A57594BBDE70DA66838BFE3D2B0533ED566773A6FB2B4BCE819D0DBA
27,737,385 UART: Caliptra RT
27,738,127 UART: [state] CFI Enabled
27,854,026 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
7,939,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,219 >>> mbox cmd response: success
20,270,235 UART:
20,270,618 UART: Running Caliptra FMC ...
20,271,708 UART:
20,271,863 UART: [state] CFI Enabled
20,279,880 UART: [fht] FMC Alias Private Key: 7
22,036,407 UART: [art] Extend RT PCRs Done
22,037,629 UART: [art] Lock RT PCRs Done
22,039,240 UART: [art] Populate DV Done
22,044,713 UART: [fht] FMC Alias Private Key: 7
22,046,415 UART: [art] Derive CDI
22,047,155 UART: [art] Store in in slot 0x4
22,089,646 UART: [art] Derive Key Pair
22,090,646 UART: [art] Store priv key in slot 0x5
24,517,886 UART: [art] Derive Key Pair - Done
24,531,155 UART: [art] Signing Cert with AUTHO
24,532,468 UART: RITY.KEYID = 7
26,237,686 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,187 UART: [art] PUB.X = 6CB184DA5D9BE205FB44FA12399E96AB75E43811E806B4A5E5877D8BA3D3744F84C730FB2E81E969A42D7A5F1F793B57
26,246,486 UART: [art] PUB.Y = A08DE1DB8FB1A37FA9A79DB622EDF66C02A2B00D1088ACDE0615B2557A5137F77C5FD8D655B67A4C1CC3AB7B7C991A7C
26,253,753 UART: [art] SIG.R = 46C16EB86A47F67755971A522DD4C833321094388253DDAA6C0D5DE2CC3C89DB6B1581759BE334815DDA96BB78A897FC
26,261,141 UART: [art] SIG.S = 6D4F0BE309B8A0AFBC110E16F5983FE9DD47DE1F86A2D20634F84EBA36B89C42F1E8075EE6F726BBA3395A873250D4D8
27,240,523 UART: Caliptra RT
27,241,236 UART: [state] CFI Enabled
27,358,355 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,281 UART: [idev] ++
1,173,449 UART: [idev] CDI.KEYID = 6
1,173,810 UART: [idev] SUBJECT.KEYID = 7
1,174,235 UART: [idev] UDS.KEYID = 0
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] CSR upload begun
1,209,022 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,635 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,343 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,228 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,934 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,363 UART: [idev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
1,296,860 UART: [idev] CSR uploaded
1,299,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,074 UART: [idev] --
1,301,155 UART: [ldev] ++
1,301,323 UART: [ldev] CDI.KEYID = 6
1,301,687 UART: [ldev] SUBJECT.KEYID = 5
1,302,114 UART: [ldev] AUTHORITY.KEYID = 7
1,302,577 UART: [ldev] FE.KEYID = 1
1,307,505 UART: [ldev] Erasing FE.KEYID = 1
1,334,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,465 UART: [ldev] --
1,373,859 UART: [fwproc] Wait for Commands...
1,374,488 UART: [fwproc] Recv command 0x46574c44
1,375,221 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,865,505 >>> mbox cmd response: success
2,866,654 UART: [afmc] ++
2,866,822 UART: [afmc] CDI.KEYID = 6
2,867,185 UART: [afmc] SUBJECT.KEYID = 7
2,867,611 UART: [afmc] AUTHORITY.KEYID = 5
2,902,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,261 UART: [afmc] --
2,946,365 UART: [cold-reset] --
2,946,973 UART: [state] Locking Datavault
2,948,094 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,698 UART: [state] Locking ICCM
2,949,172 UART: [exit] Launching FMC @ 0x40000130
2,954,501 UART:
2,954,517 UART: Running Caliptra FMC ...
2,954,925 UART:
2,954,979 UART: [state] CFI Enabled
2,965,130 UART: [fht] FMC Alias Private Key: 7
3,073,199 UART: [art] Extend RT PCRs Done
3,073,627 UART: [art] Lock RT PCRs Done
3,075,135 UART: [art] Populate DV Done
3,083,376 UART: [fht] FMC Alias Private Key: 7
3,084,446 UART: [art] Derive CDI
3,084,726 UART: [art] Store in in slot 0x4
3,170,411 UART: [art] Derive Key Pair
3,170,771 UART: [art] Store priv key in slot 0x5
3,183,919 UART: [art] Derive Key Pair - Done
3,198,661 UART: [art] Signing Cert with AUTHO
3,199,141 UART: RITY.KEYID = 7
3,213,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,754 UART: [art] PUB.X = F4B6EC1AE9704DB515158D7E3ECACA9348E74330B345FDC025C2B49F90C7D423ED007D7831215605A33DEDD8F6CB28C1
3,221,511 UART: [art] PUB.Y = 875C6B8F3472FD3630CF98C3584735DF6F0B18CF5B5C68A5405072D6EBBAD44EFC4724B4C9DDF9DDC955F4CBB078755E
3,228,474 UART: [art] SIG.R = C90183EF1E6A11204DC26952C34D9A67A5890B4E895184AD9A66E9F7B0460CF31C1D33B7F2C372181512DD0D1CDF14EA
3,235,238 UART: [art] SIG.S = B4C2AF84E2F9B6272E3496A708A9AABE1236AA23D01585131833E558A22A51F2F956791C060EAC588D7F73CA9B98551D
3,259,646 UART: Caliptra RT
3,259,899 UART: [state] CFI Enabled
3,367,285 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,014 >>> mbox cmd response: success
2,703,428 UART:
2,703,444 UART: Running Caliptra FMC ...
2,703,852 UART:
2,703,906 UART: [state] CFI Enabled
2,714,291 UART: [fht] FMC Alias Private Key: 7
2,821,904 UART: [art] Extend RT PCRs Done
2,822,332 UART: [art] Lock RT PCRs Done
2,824,146 UART: [art] Populate DV Done
2,832,221 UART: [fht] FMC Alias Private Key: 7
2,833,331 UART: [art] Derive CDI
2,833,611 UART: [art] Store in in slot 0x4
2,919,056 UART: [art] Derive Key Pair
2,919,416 UART: [art] Store priv key in slot 0x5
2,932,618 UART: [art] Derive Key Pair - Done
2,947,388 UART: [art] Signing Cert with AUTHO
2,947,868 UART: RITY.KEYID = 7
2,963,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,965 UART: [art] PUB.X = 0370C641356713E5471E62062DAD46BC3C9CBDA163DB8758C11C758B122B2D7C0C1558C60C743A77D7F59616087CC85C
2,970,718 UART: [art] PUB.Y = FB2DA524669ABDBBA951FD31C76F7DA0B82ABFA8B95C7526B13AF24560926AF0F8F1D175C3F412220ED78A396DD81DD5
2,977,683 UART: [art] SIG.R = 40E4A2AC0DF1D0B8B229D3867CF113C31FE907EFA080343AE09289D8208E0695D87C6279A9D3C84C1164B3436E34DA1B
2,984,448 UART: [art] SIG.S = 6D61D6E611FFAC47159D852495BF64BFABB0E0DF021866E0FFE7D3030A5385BEDE8417FB7A0D4380703AD267A4175E4D
3,008,051 UART: Caliptra RT
3,008,304 UART: [state] CFI Enabled
3,116,933 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,678 UART: [cold-reset] ++
1,171,100 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,146 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] CSR upload begun
1,210,189 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,706 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,414 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,299 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,005 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,434 UART: [idev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
1,297,931 UART: [idev] CSR uploaded
1,300,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,145 UART: [idev] --
1,302,096 UART: [ldev] ++
1,302,264 UART: [ldev] CDI.KEYID = 6
1,302,628 UART: [ldev] SUBJECT.KEYID = 5
1,303,055 UART: [ldev] AUTHORITY.KEYID = 7
1,303,518 UART: [ldev] FE.KEYID = 1
1,308,880 UART: [ldev] Erasing FE.KEYID = 1
1,334,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,598 UART: [ldev] --
1,373,974 UART: [fwproc] Wait for Commands...
1,374,619 UART: [fwproc] Recv command 0x46574c44
1,375,352 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,370 >>> mbox cmd response: success
2,867,581 UART: [afmc] ++
2,867,749 UART: [afmc] CDI.KEYID = 6
2,868,112 UART: [afmc] SUBJECT.KEYID = 7
2,868,538 UART: [afmc] AUTHORITY.KEYID = 5
2,904,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,194 UART: [afmc] --
2,948,252 UART: [cold-reset] --
2,948,808 UART: [state] Locking Datavault
2,949,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,597 UART: [state] Locking ICCM
2,951,249 UART: [exit] Launching FMC @ 0x40000130
2,956,578 UART:
2,956,594 UART: Running Caliptra FMC ...
2,957,002 UART:
2,957,145 UART: [state] CFI Enabled
2,967,548 UART: [fht] FMC Alias Private Key: 7
3,076,115 UART: [art] Extend RT PCRs Done
3,076,543 UART: [art] Lock RT PCRs Done
3,078,169 UART: [art] Populate DV Done
3,086,210 UART: [fht] FMC Alias Private Key: 7
3,087,262 UART: [art] Derive CDI
3,087,542 UART: [art] Store in in slot 0x4
3,173,481 UART: [art] Derive Key Pair
3,173,841 UART: [art] Store priv key in slot 0x5
3,187,327 UART: [art] Derive Key Pair - Done
3,202,058 UART: [art] Signing Cert with AUTHO
3,202,538 UART: RITY.KEYID = 7
3,218,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,813 UART: [art] PUB.X = 6158C9E65B81FAE3B9CAE90358A695F8A8B31F9FA1DBBD6E47FF5CB5668C10703145A7591CB1FF3E9363C1D1D5247ACF
3,225,596 UART: [art] PUB.Y = B4BA1D728C5E5EE17E3895C15B840CC50714DFA451578D68FCBFE451971FC4F5474E8AD5D0113962C603CB02B767D4D8
3,232,542 UART: [art] SIG.R = 0E9C58610D59BEE23B3B056B6D0A948E4DF63234CA7B6CE06E971C8A458F5FDE88B79D2DA68720286A7AB11F66FC59DE
3,239,314 UART: [art] SIG.S = 7366BAB37E431F879E0C0EB61B176F554E45C6F889C5E19A1F6E495E31AA787C50553DEDA68F7A9E169C540A898283D1
3,263,330 UART: Caliptra RT
3,263,675 UART: [state] CFI Enabled
3,370,650 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,703 >>> mbox cmd response: success
2,704,905 UART:
2,704,921 UART: Running Caliptra FMC ...
2,705,329 UART:
2,705,472 UART: [state] CFI Enabled
2,715,967 UART: [fht] FMC Alias Private Key: 7
2,824,448 UART: [art] Extend RT PCRs Done
2,824,876 UART: [art] Lock RT PCRs Done
2,826,184 UART: [art] Populate DV Done
2,834,565 UART: [fht] FMC Alias Private Key: 7
2,835,575 UART: [art] Derive CDI
2,835,855 UART: [art] Store in in slot 0x4
2,921,380 UART: [art] Derive Key Pair
2,921,740 UART: [art] Store priv key in slot 0x5
2,934,976 UART: [art] Derive Key Pair - Done
2,949,636 UART: [art] Signing Cert with AUTHO
2,950,116 UART: RITY.KEYID = 7
2,965,082 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,847 UART: [art] PUB.X = 504A740288ED1C68847EA3EE4072BAD4F3983007B0713E9F1411F77B88BF8BEE75CE2543BEE0FD66E0FAA4D86586FFC7
2,972,623 UART: [art] PUB.Y = 6E16646AC67DC819539F7949FEB0742A074BEC24CBD98FD30569D52648982D37604480D33235A067051D1716CBF18159
2,979,554 UART: [art] SIG.R = FE15A2F9AEC35BBC073184F294606017AA34C15872118C5D0B93AAE1E15FCE7C4876CAA1711C2FBEB18A0E0F037B9A94
2,986,323 UART: [art] SIG.S = 0E5FB86B60E71246F952FB34738B0F8E458843938B8582B49E1D73F627C3CA0660B4B79C1274E9A0BE248B7AFBCBEE2D
3,009,837 UART: Caliptra RT
3,010,182 UART: [state] CFI Enabled
3,117,529 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,202 UART: [kat] SHA2-256
890,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,881 UART: [kat] ++
895,033 UART: [kat] sha1
899,235 UART: [kat] SHA2-256
901,175 UART: [kat] SHA2-384
903,994 UART: [kat] SHA2-512-ACC
905,895 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,849 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] CSR upload begun
1,208,990 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,375 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,083 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,968 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,674 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,103 UART: [idev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
1,296,600 UART: [idev] CSR uploaded
1,299,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,814 UART: [idev] --
1,300,849 UART: [ldev] ++
1,301,017 UART: [ldev] CDI.KEYID = 6
1,301,381 UART: [ldev] SUBJECT.KEYID = 5
1,301,808 UART: [ldev] AUTHORITY.KEYID = 7
1,302,271 UART: [ldev] FE.KEYID = 1
1,307,503 UART: [ldev] Erasing FE.KEYID = 1
1,333,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,601 UART: [ldev] --
1,373,087 UART: [fwproc] Wait for Commands...
1,373,908 UART: [fwproc] Recv command 0x46574c44
1,374,641 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,845 >>> mbox cmd response: success
2,868,064 UART: [afmc] ++
2,868,232 UART: [afmc] CDI.KEYID = 6
2,868,595 UART: [afmc] SUBJECT.KEYID = 7
2,869,021 UART: [afmc] AUTHORITY.KEYID = 5
2,903,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,977 UART: [afmc] --
2,947,015 UART: [cold-reset] --
2,948,111 UART: [state] Locking Datavault
2,949,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,096 UART: [state] Locking ICCM
2,950,570 UART: [exit] Launching FMC @ 0x40000130
2,955,899 UART:
2,955,915 UART: Running Caliptra FMC ...
2,956,323 UART:
2,956,377 UART: [state] CFI Enabled
2,966,860 UART: [fht] FMC Alias Private Key: 7
3,074,973 UART: [art] Extend RT PCRs Done
3,075,401 UART: [art] Lock RT PCRs Done
3,076,769 UART: [art] Populate DV Done
3,085,266 UART: [fht] FMC Alias Private Key: 7
3,086,386 UART: [art] Derive CDI
3,086,666 UART: [art] Store in in slot 0x4
3,172,143 UART: [art] Derive Key Pair
3,172,503 UART: [art] Store priv key in slot 0x5
3,185,313 UART: [art] Derive Key Pair - Done
3,200,014 UART: [art] Signing Cert with AUTHO
3,200,494 UART: RITY.KEYID = 7
3,215,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,739 UART: [art] PUB.X = FF44A80B6DB04A1CD9730AC40B5085ACBB51DFD64C81CCD7AEC2BC2C90096F71B8732FFABA69E442811D7150ED71E8CD
3,223,521 UART: [art] PUB.Y = 048841B2D97C38C9056480872F0C0EEBE0E39B60DCDD941AB745A0A28A6890FBB955EBF70D012E4A90BE6DFE35C8E826
3,230,465 UART: [art] SIG.R = 1893D09D9C3A51B58529630DC28D6C703011F00D368D57E8295DA77B74BC10DC2D0CB8C3601D3A6C386A6429202C143B
3,237,224 UART: [art] SIG.S = ED05785708F4CC5D4FCC443C9E8460D0D39482B6AE428536D7E0A8A7CFEC622738369BB58E00752EEA73AF9E9549C31C
3,260,845 UART: Caliptra RT
3,261,098 UART: [state] CFI Enabled
3,369,045 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,260 >>> mbox cmd response: success
2,704,240 UART:
2,704,256 UART: Running Caliptra FMC ...
2,704,664 UART:
2,704,718 UART: [state] CFI Enabled
2,715,295 UART: [fht] FMC Alias Private Key: 7
2,823,986 UART: [art] Extend RT PCRs Done
2,824,414 UART: [art] Lock RT PCRs Done
2,825,838 UART: [art] Populate DV Done
2,833,915 UART: [fht] FMC Alias Private Key: 7
2,834,857 UART: [art] Derive CDI
2,835,137 UART: [art] Store in in slot 0x4
2,920,296 UART: [art] Derive Key Pair
2,920,656 UART: [art] Store priv key in slot 0x5
2,933,930 UART: [art] Derive Key Pair - Done
2,948,638 UART: [art] Signing Cert with AUTHO
2,949,118 UART: RITY.KEYID = 7
2,964,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,259 UART: [art] PUB.X = 618E8AC9B7CF304A19CF2E666FD866949A8DC9FD6F47BD026BA3B48060CB1CDA48F1FC7894FE9C111B23768CB472A66A
2,972,042 UART: [art] PUB.Y = E9769363D1B7BE503312DE17C92578FE6A2AB0694B98CF003803ABF05CB3E9DE8ECD0568944569DAE8F035AB990CEA9E
2,978,973 UART: [art] SIG.R = 1E00D11163DA67FD870CA20FCC16B06CCC2764B464E56D9C799C3FA0724315B7F57E8E79958A279454FEF729D5148503
2,985,712 UART: [art] SIG.S = 128594AE8C3F931E87A3656DD948165EA39BC6AC2EA850597C566AD514BB6CE20E410B1A911F9EA71337CC6895854135
3,009,875 UART: Caliptra RT
3,010,128 UART: [state] CFI Enabled
3,119,275 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,200,072 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] CSR upload begun
1,210,129 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,780 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,488 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,373 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,079 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,508 UART: [idev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
1,298,005 UART: [idev] CSR uploaded
1,301,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,219 UART: [idev] --
1,302,384 UART: [ldev] ++
1,302,552 UART: [ldev] CDI.KEYID = 6
1,302,916 UART: [ldev] SUBJECT.KEYID = 5
1,303,343 UART: [ldev] AUTHORITY.KEYID = 7
1,303,806 UART: [ldev] FE.KEYID = 1
1,308,930 UART: [ldev] Erasing FE.KEYID = 1
1,335,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,390 UART: [ldev] --
1,374,792 UART: [fwproc] Wait for Commands...
1,375,375 UART: [fwproc] Recv command 0x46574c44
1,376,108 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,592 >>> mbox cmd response: success
2,867,801 UART: [afmc] ++
2,867,969 UART: [afmc] CDI.KEYID = 6
2,868,332 UART: [afmc] SUBJECT.KEYID = 7
2,868,758 UART: [afmc] AUTHORITY.KEYID = 5
2,903,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,258 UART: [afmc] --
2,947,192 UART: [cold-reset] --
2,947,938 UART: [state] Locking Datavault
2,948,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,515 UART: [state] Locking ICCM
2,950,007 UART: [exit] Launching FMC @ 0x40000130
2,955,336 UART:
2,955,352 UART: Running Caliptra FMC ...
2,955,760 UART:
2,955,903 UART: [state] CFI Enabled
2,966,362 UART: [fht] FMC Alias Private Key: 7
3,073,703 UART: [art] Extend RT PCRs Done
3,074,131 UART: [art] Lock RT PCRs Done
3,075,705 UART: [art] Populate DV Done
3,084,002 UART: [fht] FMC Alias Private Key: 7
3,085,122 UART: [art] Derive CDI
3,085,402 UART: [art] Store in in slot 0x4
3,171,219 UART: [art] Derive Key Pair
3,171,579 UART: [art] Store priv key in slot 0x5
3,185,091 UART: [art] Derive Key Pair - Done
3,199,935 UART: [art] Signing Cert with AUTHO
3,200,415 UART: RITY.KEYID = 7
3,215,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,370 UART: [art] PUB.X = FB45CCCF142A869C9DE076557A56ED1F22DEA027DB1C80A1FA06D46DCB9FA24D719283665F3173E6E725566028E22813
3,223,143 UART: [art] PUB.Y = 61602B7D67BE3F80888B0293CF9AF5197F63C80BCF6F786966992935725DCEE95C3F6DE56596B67BE7EA25F44799DE19
3,230,089 UART: [art] SIG.R = 4A9F6692CBF28D37C6914A3DD930501A19ACA57ACA4023DE82635D6B9628EC26F67A5E8D2C9E93BF43435BFC2DCD24E8
3,236,873 UART: [art] SIG.S = 994D598DB5587B1B1BC4D514B61CCDC91007B86623111E1BF384AA62CED25A3868ED8EDC06CFAD6E65835B647D4BCFA6
3,260,494 UART: Caliptra RT
3,260,839 UART: [state] CFI Enabled
3,368,746 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,039 >>> mbox cmd response: success
2,707,115 UART:
2,707,131 UART: Running Caliptra FMC ...
2,707,539 UART:
2,707,682 UART: [state] CFI Enabled
2,718,419 UART: [fht] FMC Alias Private Key: 7
2,825,622 UART: [art] Extend RT PCRs Done
2,826,050 UART: [art] Lock RT PCRs Done
2,827,582 UART: [art] Populate DV Done
2,835,949 UART: [fht] FMC Alias Private Key: 7
2,837,007 UART: [art] Derive CDI
2,837,287 UART: [art] Store in in slot 0x4
2,923,296 UART: [art] Derive Key Pair
2,923,656 UART: [art] Store priv key in slot 0x5
2,936,876 UART: [art] Derive Key Pair - Done
2,951,606 UART: [art] Signing Cert with AUTHO
2,952,086 UART: RITY.KEYID = 7
2,966,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,627 UART: [art] PUB.X = EBFE5ED80FB0697B11D6823E2004F6F86831E6A6C70EC5EEF461111EFCB638E73FF4AA713EA6510877A157F5E9E04EB6
2,974,399 UART: [art] PUB.Y = 7EFB143A933E6BDA7ED669FAB6E4D3B5BF3A5E70463233CCC99D1BD24810575AEBB8AD9FAC0AB911ED889145190A1902
2,981,358 UART: [art] SIG.R = D0C65EC09054650A185CBE3A8A2F76F57410C7191D5265B1A0ED88619D2B5EE444D870B8F135504EF38CA736EDF23C1A
2,988,131 UART: [art] SIG.S = EDA27EFF670CD119A6C3F2F3203BEC7475D288DC102752FF3B014BCEE7C8059702DA5C4156574C5A813A82312710F329
3,011,280 UART: Caliptra RT
3,011,625 UART: [state] CFI Enabled
3,119,787 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,071 UART: [idev] CSR upload begun
1,208,850 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,493 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,201 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,086 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,792 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,221 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,718 UART: [idev] CSR uploaded
1,299,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,932 UART: [idev] --
1,300,995 UART: [ldev] ++
1,301,163 UART: [ldev] CDI.KEYID = 6
1,301,527 UART: [ldev] SUBJECT.KEYID = 5
1,301,954 UART: [ldev] AUTHORITY.KEYID = 7
1,302,417 UART: [ldev] FE.KEYID = 1
1,307,705 UART: [ldev] Erasing FE.KEYID = 1
1,333,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,853 UART: [ldev] --
1,373,317 UART: [fwproc] Wait for Commands...
1,374,128 UART: [fwproc] Recv command 0x46574c44
1,374,861 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,633 >>> mbox cmd response: success
2,867,654 UART: [afmc] ++
2,867,822 UART: [afmc] CDI.KEYID = 6
2,868,185 UART: [afmc] SUBJECT.KEYID = 7
2,868,611 UART: [afmc] AUTHORITY.KEYID = 5
2,903,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,581 UART: [afmc] --
2,947,511 UART: [cold-reset] --
2,948,213 UART: [state] Locking Datavault
2,949,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,038 UART: [state] Locking ICCM
2,950,712 UART: [exit] Launching FMC @ 0x40000130
2,956,041 UART:
2,956,057 UART: Running Caliptra FMC ...
2,956,465 UART:
2,956,519 UART: [state] CFI Enabled
2,966,890 UART: [fht] FMC Alias Private Key: 7
3,075,223 UART: [art] Extend RT PCRs Done
3,075,651 UART: [art] Lock RT PCRs Done
3,077,153 UART: [art] Populate DV Done
3,085,344 UART: [fht] FMC Alias Private Key: 7
3,086,282 UART: [art] Derive CDI
3,086,562 UART: [art] Store in in slot 0x4
3,172,161 UART: [art] Derive Key Pair
3,172,521 UART: [art] Store priv key in slot 0x5
3,184,951 UART: [art] Derive Key Pair - Done
3,199,721 UART: [art] Signing Cert with AUTHO
3,200,201 UART: RITY.KEYID = 7
3,215,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,302 UART: [art] PUB.X = 3349C24EA94A24407D7135751801E0AB0F246B7D2B8E1E86AC02914F486C3D94C438B332E55222C4904F6A3C28E6BB36
3,223,059 UART: [art] PUB.Y = ADFE5B2904603BD1CB59B4BC5CF59A5F7C50A5C70A9D0E336DF66F2A66CBDD60B7853C5B1CA77220A8790B4E70553C16
3,230,013 UART: [art] SIG.R = 0CC92D0496AC82887D1FC85C6FE81AD24FA1D8866D7CCFD4950AD1A31034F512B10A29C8F2C3416F1394C3881CB0B3F1
3,236,781 UART: [art] SIG.S = E01889AEA78BD5F8D56C70D84943D715E2C2B6EB11AC04E0690CD130BCDF7DED02EFBDF0CBF4757401CEEFFF51F26C43
3,260,638 UART: Caliptra RT
3,260,891 UART: [state] CFI Enabled
3,368,330 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,638 >>> mbox cmd response: success
2,705,016 UART:
2,705,032 UART: Running Caliptra FMC ...
2,705,440 UART:
2,705,494 UART: [state] CFI Enabled
2,715,897 UART: [fht] FMC Alias Private Key: 7
2,824,302 UART: [art] Extend RT PCRs Done
2,824,730 UART: [art] Lock RT PCRs Done
2,825,998 UART: [art] Populate DV Done
2,834,271 UART: [fht] FMC Alias Private Key: 7
2,835,239 UART: [art] Derive CDI
2,835,519 UART: [art] Store in in slot 0x4
2,921,018 UART: [art] Derive Key Pair
2,921,378 UART: [art] Store priv key in slot 0x5
2,933,866 UART: [art] Derive Key Pair - Done
2,948,638 UART: [art] Signing Cert with AUTHO
2,949,118 UART: RITY.KEYID = 7
2,963,824 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,589 UART: [art] PUB.X = 3C2A34545AEC71BEFBA631BCC2705FF246FC851638AD0120A9CDC5341D9ED841F8AC8CC992B94272C51AF89EFE3B5714
2,971,372 UART: [art] PUB.Y = 3091836A33DCC82BB81AE2D7E8376FF69B77F995419C761DEC47F48AAED453297D19F3C3422C5270B75401A7A6BC7975
2,978,321 UART: [art] SIG.R = 4E69BBA6844E4169585BF7363D4164B7A967C74F00552B9385B2A759D902DA41A84170A377E32FDD1634801DF68378B1
2,985,058 UART: [art] SIG.S = C0F7DFEF19B2C246CCF6E222A584701477230AEE7C95E5798766A75888F49ED7F468068F275D0D36D6E80405D792E8D5
3,008,480 UART: Caliptra RT
3,008,733 UART: [state] CFI Enabled
3,116,292 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,194 UART: [state] WD Timer not started. Device not locked for debugging
88,543 UART: [kat] SHA2-256
892,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,222 UART: [kat] ++
896,374 UART: [kat] sha1
900,518 UART: [kat] SHA2-256
902,458 UART: [kat] SHA2-384
905,253 UART: [kat] SHA2-512-ACC
907,154 UART: [kat] ECC-384
916,973 UART: [kat] HMAC-384Kdf
921,515 UART: [kat] LMS
1,169,827 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,174,076 UART: [idev] ++
1,174,244 UART: [idev] CDI.KEYID = 6
1,174,605 UART: [idev] SUBJECT.KEYID = 7
1,175,030 UART: [idev] UDS.KEYID = 0
1,183,154 UART: [idev] Erasing UDS.KEYID = 0
1,200,626 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] CSR upload begun
1,210,685 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,192 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,900 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,785 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,491 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,920 UART: [idev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
1,298,417 UART: [idev] CSR uploaded
1,301,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,631 UART: [idev] --
1,302,716 UART: [ldev] ++
1,302,884 UART: [ldev] CDI.KEYID = 6
1,303,248 UART: [ldev] SUBJECT.KEYID = 5
1,303,675 UART: [ldev] AUTHORITY.KEYID = 7
1,304,138 UART: [ldev] FE.KEYID = 1
1,309,210 UART: [ldev] Erasing FE.KEYID = 1
1,335,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,542 UART: [ldev] --
1,374,842 UART: [fwproc] Wait for Commands...
1,375,661 UART: [fwproc] Recv command 0x46574c44
1,376,394 UART: [fwproc] Recv'd Img size: 114448 bytes
2,676,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,703,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,732,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,868,412 >>> mbox cmd response: success
2,869,635 UART: [afmc] ++
2,869,803 UART: [afmc] CDI.KEYID = 6
2,870,166 UART: [afmc] SUBJECT.KEYID = 7
2,870,592 UART: [afmc] AUTHORITY.KEYID = 5
2,906,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,923,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,929,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,935,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,941,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,856 UART: [afmc] --
2,949,972 UART: [cold-reset] --
2,950,856 UART: [state] Locking Datavault
2,952,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,649 UART: [state] Locking ICCM
2,953,165 UART: [exit] Launching FMC @ 0x40000130
2,958,494 UART:
2,958,510 UART: Running Caliptra FMC ...
2,958,918 UART:
2,959,061 UART: [state] CFI Enabled
2,969,464 UART: [fht] FMC Alias Private Key: 7
3,077,619 UART: [art] Extend RT PCRs Done
3,078,047 UART: [art] Lock RT PCRs Done
3,079,595 UART: [art] Populate DV Done
3,087,922 UART: [fht] FMC Alias Private Key: 7
3,089,000 UART: [art] Derive CDI
3,089,280 UART: [art] Store in in slot 0x4
3,174,847 UART: [art] Derive Key Pair
3,175,207 UART: [art] Store priv key in slot 0x5
3,189,851 UART: [art] Derive Key Pair - Done
3,204,418 UART: [art] Signing Cert with AUTHO
3,204,898 UART: RITY.KEYID = 7
3,220,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,220,855 UART: [art] PUB.X = 5A83062DFA2EF2C8E18148141057FD3BB981A8A65557E554AD447CE4692D6C7142B78B9787E3BFCC87F3CC4CDB83A022
3,227,630 UART: [art] PUB.Y = 57B09DBAE5C9E53AC91CE847EB6792B9FC19DAF73FE77741EF4BC095995A8D04F4C9F6DED81C2112CBAA8D9A8898D660
3,234,597 UART: [art] SIG.R = 0EEFC3E180AB351A423B9BA0EFE58B7CC1D8D351647BF8F8448EF1E4B12FB53BA683505542E56346979266398A11E3D6
3,241,370 UART: [art] SIG.S = 1B952743D971EFF73BC27BAAA7295EEB334C83CA308AA3354F89B2BD3F46A79CFDBF5A398301DA8C8E829DF034CB56CD
3,265,988 UART: Caliptra RT
3,266,333 UART: [state] CFI Enabled
3,374,054 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,435 >>> mbox cmd response: success
2,703,891 UART:
2,703,907 UART: Running Caliptra FMC ...
2,704,315 UART:
2,704,458 UART: [state] CFI Enabled
2,715,247 UART: [fht] FMC Alias Private Key: 7
2,823,424 UART: [art] Extend RT PCRs Done
2,823,852 UART: [art] Lock RT PCRs Done
2,825,530 UART: [art] Populate DV Done
2,833,653 UART: [fht] FMC Alias Private Key: 7
2,834,615 UART: [art] Derive CDI
2,834,895 UART: [art] Store in in slot 0x4
2,920,496 UART: [art] Derive Key Pair
2,920,856 UART: [art] Store priv key in slot 0x5
2,934,054 UART: [art] Derive Key Pair - Done
2,948,780 UART: [art] Signing Cert with AUTHO
2,949,260 UART: RITY.KEYID = 7
2,964,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,465 UART: [art] PUB.X = C4B91F9397599240FF745BA97DF056A6556FEBDA491E86A5B41653EDD0F16ACE6B44DCA54342CC6D1996A3570BDE8FB6
2,972,246 UART: [art] PUB.Y = 88552EAC1EF965D28D48CDDA464489972FE79A8D171F5B02C6F01985E293B04751EAFC5D4B79641C0AF41AB183340DA1
2,979,193 UART: [art] SIG.R = 727D191F97ECD15808B0C68A87C2CF6CDF92F07175AA31A7A2C7B0F20D718718DB05AE4F0FBCC80B18046E3DC2CD4E17
2,985,961 UART: [art] SIG.S = BDDB208627917F04521D68FD1AE25DF64276511F4E6D32218F6B13F3142B914DCE6A5230A8459B5CE18C34CF4353820B
3,009,446 UART: Caliptra RT
3,009,791 UART: [state] CFI Enabled
3,118,188 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,786,257 UART: [idev] CSR uploaded
10,802,568 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,946,282 UART: [idev] --
10,946,912 UART: [ldev] ++
10,947,408 UART: [ldev] CDI.KEYID = 6
10,948,310 UART: [ldev] SUBJECT.KEYID = 5
10,949,407 UART: [ldev] AUTHORITY.KEYID = 7
10,950,596 UART: [ldev] FE.KEYID = 1
10,951,467 UART: [ldev] Erasing FE.KEYID = 1
14,182,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,477,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,493,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,509,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,525,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,546,616 UART: [ldev] --
16,550,638 UART: [fwproc] Wait for Commands...
16,552,998 UART: [fwproc] Recv command 0x46574c44
16,555,312 UART: [fwproc] Recv'd Img size: 114124 bytes
20,635,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,711,765 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,780,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,096,918 >>> mbox cmd response: success
21,101,720 UART: [afmc] ++
21,102,306 UART: [afmc] CDI.KEYID = 6
21,103,411 UART: [afmc] SUBJECT.KEYID = 7
21,104,628 UART: [afmc] AUTHORITY.KEYID = 5
24,461,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,754,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,756,770 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,772,959 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,789,017 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,805,012 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,826,997 UART: [afmc] --
26,830,853 UART: [cold-reset] --
26,836,274 UART: [state] Locking Datavault
26,842,771 UART: [state] Locking PCR0, PCR1 and PCR31
26,844,414 UART: [state] Locking ICCM
26,846,818 UART: [exit] Launching FMC @ 0x40000130
26,855,471 UART:
26,855,707 UART: Running Caliptra FMC ...
26,856,804 UART:
26,856,962 UART: [state] CFI Enabled
26,916,896 UART: [fht] FMC Alias Private Key: 7
29,254,601 UART: [art] Extend RT PCRs Done
29,255,823 UART: [art] Lock RT PCRs Done
29,257,646 UART: [art] Populate DV Done
29,263,270 UART: [fht] FMC Alias Private Key: 7
29,264,749 UART: [art] Derive CDI
29,265,511 UART: [art] Store in in slot 0x4
29,325,683 UART: [art] Derive Key Pair
29,326,715 UART: [art] Store priv key in slot 0x5
32,619,083 UART: [art] Derive Key Pair - Done
32,631,973 UART: [art] Signing Cert with AUTHO
32,633,274 UART: RITY.KEYID = 7
34,921,793 UART: [art] Erasing AUTHORITY.KEYID = 7
34,923,300 UART: [art] PUB.X = E5962C922B93E155EE7BC43CF0BA69D5B407983A73FD0F2D620548E7DCDCF4A351B3EEC39D05E91D37F42BD83A70F62E
34,930,637 UART: [art] PUB.Y = BF8718FF120226BC37270FE8CF08CFE846436B26A470489DBF2768397C131C8BA7673C43D2A271E18ECB272809C0BB36
34,937,838 UART: [art] SIG.R = 5156AB0CCFDF86E55FD0FEDFD6629097F7C194BFF18A8151707B14FD57DF44F2D2C434969E2E1942DED4D5640E1408F8
34,945,240 UART: [art] SIG.S = AE93A26E2D0EBD3BE270336F84767A0C3CF13E51F69AAFC0645419D9BA9A5F0E9FDE8A0635F99E1831F85FAC60D2EC54
36,249,877 UART: Caliptra RT
36,250,578 UART: [state] CFI Enabled
36,412,118 UART: [rt] RT listening for mailbox commands...
36,563,213 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,593,175 UART: [rt]cmd =0x4c444556, len=4
36,604,234 >>> mbox cmd response data (687 bytes)
36,749,922 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,779,896 UART: [rt]cmd =0x43455246, len=4
36,792,807 >>> mbox cmd response data (886 bytes)
36,937,164 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,967,102 UART: [rt]cmd =0x43455252, len=4
36,978,401 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,189 UART:
192,547 UART: Running Caliptra ROM ...
193,715 UART:
193,866 UART: [state] CFI Enabled
263,650 UART: [state] LifecycleState = Unprovisioned
265,997 UART: [state] DebugLocked = No
267,703 UART: [state] WD Timer not started. Device not locked for debugging
272,132 UART: [kat] SHA2-256
454,074 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,593 UART: [kat] ++
466,091 UART: [kat] sha1
478,000 UART: [kat] SHA2-256
481,040 UART: [kat] SHA2-384
487,448 UART: [kat] SHA2-512-ACC
490,053 UART: [kat] ECC-384
3,775,539 UART: [kat] HMAC-384Kdf
3,803,229 UART: [kat] LMS
4,876,388 UART: [kat] --
4,880,397 UART: [cold-reset] ++
4,882,760 UART: [fht] FHT @ 0x50003400
4,894,761 UART: [idev] ++
4,895,430 UART: [idev] CDI.KEYID = 6
4,896,661 UART: [idev] SUBJECT.KEYID = 7
4,897,824 UART: [idev] UDS.KEYID = 0
4,930,298 UART: [idev] Erasing UDS.KEYID = 0
8,240,512 UART: [idev] Sha1 KeyId Algorithm
8,260,603 UART: [idev] CSR upload begun
8,266,068 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,570,779 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,587,112 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,603,166 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,619,183 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,643,732 UART: [idev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
10,789,194 UART: [idev] CSR uploaded
10,805,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,949,241 UART: [idev] --
10,949,869 UART: [ldev] ++
10,950,362 UART: [ldev] CDI.KEYID = 6
10,951,278 UART: [ldev] SUBJECT.KEYID = 5
10,952,375 UART: [ldev] AUTHORITY.KEYID = 7
10,953,558 UART: [ldev] FE.KEYID = 1
10,954,404 UART: [ldev] Erasing FE.KEYID = 1
14,188,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,500,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,516,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,532,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,548,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,568,868 UART: [ldev] --
16,573,804 UART: [fwproc] Wait for Commands...
16,575,302 UART: [fwproc] Recv command 0x46574c44
16,577,287 UART: [fwproc] Recv'd Img size: 114124 bytes
20,645,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,727,904 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,796,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,114,297 >>> mbox cmd response: success
21,118,804 UART: [afmc] ++
21,119,386 UART: [afmc] CDI.KEYID = 6
21,120,563 UART: [afmc] SUBJECT.KEYID = 7
21,121,718 UART: [afmc] AUTHORITY.KEYID = 5
24,483,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,782,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,784,589 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,800,753 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,816,804 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,832,788 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,855,394 UART: [afmc] --
26,858,372 UART: [cold-reset] --
26,861,532 UART: [state] Locking Datavault
26,867,327 UART: [state] Locking PCR0, PCR1 and PCR31
26,868,967 UART: [state] Locking ICCM
26,870,792 UART: [exit] Launching FMC @ 0x40000130
26,879,468 UART:
26,879,701 UART: Running Caliptra FMC ...
26,880,739 UART:
26,880,885 UART: [state] CFI Enabled
26,943,302 UART: [fht] FMC Alias Private Key: 7
29,280,416 UART: [art] Extend RT PCRs Done
29,281,675 UART: [art] Lock RT PCRs Done
29,283,048 UART: [art] Populate DV Done
29,288,411 UART: [fht] FMC Alias Private Key: 7
29,290,052 UART: [art] Derive CDI
29,290,790 UART: [art] Store in in slot 0x4
29,352,089 UART: [art] Derive Key Pair
29,353,128 UART: [art] Store priv key in slot 0x5
32,645,761 UART: [art] Derive Key Pair - Done
32,658,547 UART: [art] Signing Cert with AUTHO
32,659,844 UART: RITY.KEYID = 7
34,948,188 UART: [art] Erasing AUTHORITY.KEYID = 7
34,949,699 UART: [art] PUB.X = A77D5D11FC14E45B7E3051469813B21AD49FD9881FABCDF845AEB637B25F4DBD189E9E5A9809352F57FCFC39080E23CB
34,956,990 UART: [art] PUB.Y = 3C6F48EA62A695C0D76046D647A4894F5846EDCEF045F99199949BEAA1D3C09AE408F98FC5402139797C21390D58F7F3
34,964,179 UART: [art] SIG.R = 34B78D4A16F3CC8B41B80EE6740740F15024F7793821EF5A59352BB675CCAEAA38FE74D8BE41CF7ADFDA7673A72FACA8
34,971,581 UART: [art] SIG.S = 3B7549C97CEBD8B4624EB9ABF6C124813157A10C5DD511B930D87727918AA7F7C516D30119A036486A29765614232CCA
36,276,692 UART: Caliptra RT
36,277,387 UART: [state] CFI Enabled
36,438,846 UART: [rt] RT listening for mailbox commands...
36,589,782 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,619,810 UART: [rt]cmd =0x4c444556, len=4
36,630,793 >>> mbox cmd response data (687 bytes)
36,775,206 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,805,241 UART: [rt]cmd =0x43455246, len=4
36,818,011 >>> mbox cmd response data (886 bytes)
36,962,535 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,992,542 UART: [rt]cmd =0x43455252, len=4
37,003,775 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1965.18s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
10,497,546 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,718,845 >>> mbox cmd response: success
26,407,176 UART:
26,407,584 UART: Running Caliptra FMC ...
26,408,773 UART:
26,408,944 UART: [state] CFI Enabled
26,473,850 UART: [fht] FMC Alias Private Key: 7
28,812,007 UART: [art] Extend RT PCRs Done
28,813,268 UART: [art] Lock RT PCRs Done
28,814,550 UART: [art] Populate DV Done
28,819,775 UART: [fht] FMC Alias Private Key: 7
28,821,334 UART: [art] Derive CDI
28,822,100 UART: [art] Store in in slot 0x4
28,882,784 UART: [art] Derive Key Pair
28,883,828 UART: [art] Store priv key in slot 0x5
32,176,490 UART: [art] Derive Key Pair - Done
32,189,399 UART: [art] Signing Cert with AUTHO
32,190,703 UART: RITY.KEYID = 7
34,477,616 UART: [art] Erasing AUTHORITY.KEYID = 7
34,479,133 UART: [art] PUB.X = CFAB107E45B1E936BD860F54A360CD4BAF18C5FB7BDC833C26465B2F8E8FAA6290C2975DBF82E19520BEF2D5A16A3F80
34,486,381 UART: [art] PUB.Y = C29CCBDC58CCDEBD47D95F7ABB26A7A14C683BC6028A812E8773F8DA8E1A4B2455768A85D97A908A9DD44364D85DDB7B
34,493,658 UART: [art] SIG.R = FC7583163DCE877338337985C955B3DFC0CCB40BF195A56787E7290D8D771488CD3D4D700749EF87A9D09DF74828A158
34,500,992 UART: [art] SIG.S = 1CF155E260E3DB9375007B05AA717A13BA76034B762EB8A485974A8A009E724417498404D81614E80376894F47F80797
35,806,132 UART: Caliptra RT
35,806,843 UART: [state] CFI Enabled
35,967,616 UART: [rt] RT listening for mailbox commands...
36,117,267 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,147,220 UART: [rt]cmd =0x4c444556, len=4
36,158,445 >>> mbox cmd response data (687 bytes)
36,303,189 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,332,965 UART: [rt]cmd =0x43455246, len=4
36,345,847 >>> mbox cmd response data (886 bytes)
36,489,416 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,519,274 UART: [rt]cmd =0x43455252, len=4
36,530,734 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
10,500,966 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,715,851 >>> mbox cmd response: success
26,407,625 UART:
26,408,035 UART: Running Caliptra FMC ...
26,409,161 UART:
26,409,324 UART: [state] CFI Enabled
26,478,463 UART: [fht] FMC Alias Private Key: 7
28,815,854 UART: [art] Extend RT PCRs Done
28,817,085 UART: [art] Lock RT PCRs Done
28,818,635 UART: [art] Populate DV Done
28,824,040 UART: [fht] FMC Alias Private Key: 7
28,825,637 UART: [art] Derive CDI
28,826,372 UART: [art] Store in in slot 0x4
28,887,911 UART: [art] Derive Key Pair
28,888,958 UART: [art] Store priv key in slot 0x5
32,181,764 UART: [art] Derive Key Pair - Done
32,194,837 UART: [art] Signing Cert with AUTHO
32,196,148 UART: RITY.KEYID = 7
34,482,835 UART: [art] Erasing AUTHORITY.KEYID = 7
34,484,349 UART: [art] PUB.X = A9870298568502543E43880B7EE36DA0AB76A5D6CB554FD62634FF839A25B3FC1BA37A6030157D28691AEEDA18E7D056
34,491,623 UART: [art] PUB.Y = C5B73541FC510268AE0CEE8E0360A8C9E4F905FB4236584907168EE1E71111144EEDE7DEE21D2BBB020906E82EBB9951
34,498,799 UART: [art] SIG.R = 18AA7680E913C0C60849DB2E16C557E18EAF838C7516E53CF0FC96C81F80595389ADC638223062F63CD55289FDA0F154
34,506,195 UART: [art] SIG.S = B825F3E69AFE8ED2AB986CB309819F0B568CB5DACEA94D1A02A1C055AA14433A8847342DF85D35C74DC9B04AF811D335
35,811,706 UART: Caliptra RT
35,812,424 UART: [state] CFI Enabled
35,972,344 UART: [rt] RT listening for mailbox commands...
36,121,860 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,151,952 UART: [rt]cmd =0x4c444556, len=4
36,163,180 >>> mbox cmd response data (687 bytes)
36,308,350 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,338,274 UART: [rt]cmd =0x43455246, len=4
36,350,805 >>> mbox cmd response data (886 bytes)
36,494,241 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,524,054 UART: [rt]cmd =0x43455252, len=4
36,535,378 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
10,475,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,672,375 >>> mbox cmd response: success
26,360,413 UART:
26,360,805 UART: Running Caliptra FMC ...
26,362,012 UART:
26,362,180 UART: [state] CFI Enabled
26,430,827 UART: [fht] FMC Alias Private Key: 7
28,768,916 UART: [art] Extend RT PCRs Done
28,770,145 UART: [art] Lock RT PCRs Done
28,771,933 UART: [art] Populate DV Done
28,777,455 UART: [fht] FMC Alias Private Key: 7
28,778,927 UART: [art] Derive CDI
28,779,709 UART: [art] Store in in slot 0x4
28,839,418 UART: [art] Derive Key Pair
28,840,424 UART: [art] Store priv key in slot 0x5
32,133,595 UART: [art] Derive Key Pair - Done
32,146,594 UART: [art] Signing Cert with AUTHO
32,147,925 UART: RITY.KEYID = 7
34,435,463 UART: [art] Erasing AUTHORITY.KEYID = 7
34,436,975 UART: [art] PUB.X = B64509D865BAAD92EEF0EC6E80E5BEE65939C2B4983DF5F62DA6F49AA0FEC12E8299F73F38B0B20EDED592C537AFDC62
34,444,228 UART: [art] PUB.Y = D162DB5086FD4B3B298142033949B2DDAA42677DF15401B9390328B425D704E9A1A0030A8E40A4E639F85E605C24F04C
34,451,456 UART: [art] SIG.R = BB90F67431AFB26438A5B7A75D2E8F8889946B8118409EB186AC2E644CF66712825D4024B99B8D539769F4C7D438AF9E
34,458,896 UART: [art] SIG.S = FC139CE375874402FCBCF307466CE73D8CFE7EE2AF2A837734B1BBA9F3734D29FDFEDC03AF9E041BC17D0023E229DE1F
35,764,177 UART: Caliptra RT
35,764,867 UART: [state] CFI Enabled
35,926,175 UART: [rt] RT listening for mailbox commands...
36,075,752 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,105,743 UART: [rt]cmd =0x4c444556, len=4
36,116,887 >>> mbox cmd response data (687 bytes)
36,262,640 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,292,355 UART: [rt]cmd =0x43455246, len=4
36,305,112 >>> mbox cmd response data (886 bytes)
36,449,123 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,478,927 UART: [rt]cmd =0x43455252, len=4
36,490,409 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
10,475,337 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,666,312 >>> mbox cmd response: success
26,355,474 UART:
26,355,874 UART: Running Caliptra FMC ...
26,357,063 UART:
26,357,233 UART: [state] CFI Enabled
26,424,204 UART: [fht] FMC Alias Private Key: 7
28,762,541 UART: [art] Extend RT PCRs Done
28,763,782 UART: [art] Lock RT PCRs Done
28,765,202 UART: [art] Populate DV Done
28,770,724 UART: [fht] FMC Alias Private Key: 7
28,772,320 UART: [art] Derive CDI
28,773,133 UART: [art] Store in in slot 0x4
28,832,228 UART: [art] Derive Key Pair
28,833,269 UART: [art] Store priv key in slot 0x5
32,126,426 UART: [art] Derive Key Pair - Done
32,139,542 UART: [art] Signing Cert with AUTHO
32,140,847 UART: RITY.KEYID = 7
34,428,436 UART: [art] Erasing AUTHORITY.KEYID = 7
34,429,959 UART: [art] PUB.X = EA54D080C5E4F5A89E7357338842B204F73E0D72502D71758F353217DD21C6C586B4DACBB627140FE11182D3436B8E71
34,437,185 UART: [art] PUB.Y = 75A97F7350CB1A546348B948DC6B42DE05C8C9CA2D28E5864F59BDEA5805EB2BBC30188AB7FF3AC36B0D86FAF2BCAF10
34,444,410 UART: [art] SIG.R = AB6D9B46A5E457703E1FB1DA47CE70FBB471D8F92995ECA17E352F6913B4111C8B020E0900E441F64D4864E5DBFB68DD
34,451,816 UART: [art] SIG.S = 257D5A907758E7FF54210B56A0438DAAE0AEC79F7138840DE1CC98E17A91DEA9E70CDAB47C040B681577DFACC76807C5
35,756,834 UART: Caliptra RT
35,757,568 UART: [state] CFI Enabled
35,918,984 UART: [rt] RT listening for mailbox commands...
36,068,570 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,098,625 UART: [rt]cmd =0x4c444556, len=4
36,109,728 >>> mbox cmd response data (687 bytes)
36,255,370 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,285,312 UART: [rt]cmd =0x43455246, len=4
36,298,024 >>> mbox cmd response data (886 bytes)
36,441,635 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,471,499 UART: [rt]cmd =0x43455252, len=4
36,482,679 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
10,477,531 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,680,516 >>> mbox cmd response: success
26,379,531 UART:
26,379,958 UART: Running Caliptra FMC ...
26,381,115 UART:
26,381,279 UART: [state] CFI Enabled
26,449,062 UART: [fht] FMC Alias Private Key: 7
28,787,434 UART: [art] Extend RT PCRs Done
28,788,664 UART: [art] Lock RT PCRs Done
28,790,093 UART: [art] Populate DV Done
28,795,399 UART: [fht] FMC Alias Private Key: 7
28,797,096 UART: [art] Derive CDI
28,797,837 UART: [art] Store in in slot 0x4
28,857,857 UART: [art] Derive Key Pair
28,858,903 UART: [art] Store priv key in slot 0x5
32,151,816 UART: [art] Derive Key Pair - Done
32,164,603 UART: [art] Signing Cert with AUTHO
32,165,905 UART: RITY.KEYID = 7
34,453,755 UART: [art] Erasing AUTHORITY.KEYID = 7
34,455,280 UART: [art] PUB.X = 0AB4C1C3D00F9A1E9800A64CE8B38CA15D4A0AE3FAB39106EC8995901D86F12E7AABFFBED3706288589F8F9ACA79AC88
34,462,516 UART: [art] PUB.Y = 34EC856F4BF687218E0A60CD913FF964A326FFF402E7C46C8E789F98A32D14B09E4002728CBE8782A4087FFC3AB61D87
34,469,755 UART: [art] SIG.R = 4F58674D432337D2B4444F92700851642C09F705E636633AC11F516F84238DB970714144C020AC33CA59745778EE780A
34,477,102 UART: [art] SIG.S = 7EBD375BCAA7FC5D5DF94DC3DC3BD5FB40218F6382D00469AB31F729F782F5056624067B0C86F8A3813514333058D6C6
35,782,620 UART: Caliptra RT
35,783,346 UART: [state] CFI Enabled
35,944,099 UART: [rt] RT listening for mailbox commands...
36,093,489 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,123,239 UART: [rt]cmd =0x4c444556, len=4
36,134,218 >>> mbox cmd response data (687 bytes)
36,279,784 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,309,618 UART: [rt]cmd =0x43455246, len=4
36,322,505 >>> mbox cmd response data (886 bytes)
36,465,573 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,495,437 UART: [rt]cmd =0x43455252, len=4
36,506,948 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1940.23s
Truncated 7343978 bytes from beginning
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
11,025,322 UART: [idev] CSR uploaded
11,041,695 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,185,502 UART: [idev] --
11,186,172 UART: [ldev] ++
11,186,667 UART: [ldev] CDI.KEYID = 6
11,187,533 UART: [ldev] SUBJECT.KEYID = 5
11,188,604 UART: [ldev] AUTHORITY.KEYID = 7
11,189,687 UART: [ldev] FE.KEYID = 1
11,190,549 UART: [ldev] Erasing FE.KEYID = 1
14,355,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,649,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,665,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,681,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,697,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,718,914 UART: [ldev] --
16,723,739 UART: [fwproc] Wait for Commands...
16,725,719 UART: [fwproc] Recv command 0x46574c44
16,728,025 UART: [fwproc] Recv'd Img size: 114124 bytes
20,804,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,879,161 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,947,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,265,439 >>> mbox cmd response: success
21,268,910 UART: [afmc] ++
21,269,493 UART: [afmc] CDI.KEYID = 6
21,270,668 UART: [afmc] SUBJECT.KEYID = 7
21,271,813 UART: [afmc] AUTHORITY.KEYID = 5
24,585,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,881,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,883,977 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,900,184 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,916,193 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,932,183 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,954,757 UART: [afmc] --
26,958,066 UART: [cold-reset] --
26,962,734 UART: [state] Locking Datavault
26,968,110 UART: [state] Locking PCR0, PCR1 and PCR31
26,969,750 UART: [state] Locking ICCM
26,972,481 UART: [exit] Launching FMC @ 0x40000130
26,981,133 UART:
26,981,366 UART: Running Caliptra FMC ...
26,982,460 UART:
26,982,608 UART: [state] CFI Enabled
26,991,086 UART: [fht] FMC Alias Private Key: 7
29,322,498 UART: [art] Extend RT PCRs Done
29,323,716 UART: [art] Lock RT PCRs Done
29,325,413 UART: [art] Populate DV Done
29,330,661 UART: [fht] FMC Alias Private Key: 7
29,332,189 UART: [art] Derive CDI
29,332,912 UART: [art] Store in in slot 0x4
29,375,621 UART: [art] Derive Key Pair
29,376,654 UART: [art] Store priv key in slot 0x5
32,619,111 UART: [art] Derive Key Pair - Done
32,632,061 UART: [art] Signing Cert with AUTHO
32,633,366 UART: RITY.KEYID = 7
34,912,565 UART: [art] Erasing AUTHORITY.KEYID = 7
34,914,075 UART: [art] PUB.X = DB870EA02928B618CC616A384C2F728A05F714B7934CB14D2D9EC66D8DD300A5314B5DC6798E6E1CA7C0B19ADAF7554B
34,921,364 UART: [art] PUB.Y = BBE06285244972683684CDFA1C5EADCDC2FDE1B32855F4261EFB80C62E8C1E4A587BC6A132433348C4A338B9B20D1D82
34,928,586 UART: [art] SIG.R = 706A5AD7CED962656940D0F5702FFA5CD85F8CD26E7E87DE49AAD453BC2A64D6D61F5893BF24FED8BABF10F9F7DD2007
34,936,025 UART: [art] SIG.S = BE029570FCC413C8D19D0AB6DE2CC64F9696589CEC6A2D51E95CD3E0A9BC011CC9B0FA052C1FE6D29ED39037EB203684
36,241,233 UART: Caliptra RT
36,241,950 UART: [state] CFI Enabled
36,358,949 UART: [rt] RT listening for mailbox commands...
36,510,197 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,540,130 UART: [rt]cmd =0x4c444556, len=4
36,551,297 >>> mbox cmd response data (687 bytes)
36,696,668 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,726,706 UART: [rt]cmd =0x43455246, len=4
36,739,401 >>> mbox cmd response data (886 bytes)
36,882,666 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,912,582 UART: [rt]cmd =0x43455252, len=4
36,924,069 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,271 UART:
192,647 UART: Running Caliptra ROM ...
193,832 UART:
603,459 UART: [state] CFI Enabled
619,506 UART: [state] LifecycleState = Unprovisioned
621,856 UART: [state] DebugLocked = No
624,284 UART: [state] WD Timer not started. Device not locked for debugging
628,322 UART: [kat] SHA2-256
810,310 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,846 UART: [kat] ++
822,451 UART: [kat] sha1
832,577 UART: [kat] SHA2-256
835,630 UART: [kat] SHA2-384
841,814 UART: [kat] SHA2-512-ACC
844,472 UART: [kat] ECC-384
4,100,948 UART: [kat] HMAC-384Kdf
4,113,366 UART: [kat] LMS
5,186,467 UART: [kat] --
5,189,506 UART: [cold-reset] ++
5,191,814 UART: [fht] FHT @ 0x50003400
5,203,490 UART: [idev] ++
5,204,156 UART: [idev] CDI.KEYID = 6
5,205,419 UART: [idev] SUBJECT.KEYID = 7
5,206,863 UART: [idev] UDS.KEYID = 0
5,223,352 UART: [idev] Erasing UDS.KEYID = 0
8,499,320 UART: [idev] Sha1 KeyId Algorithm
8,519,721 UART: [idev] CSR upload begun
8,525,198 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,818,486 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,834,831 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,850,922 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,866,927 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,891,531 UART: [idev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
11,036,893 UART: [idev] CSR uploaded
11,053,196 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,196,642 UART: [idev] --
11,197,283 UART: [ldev] ++
11,197,776 UART: [ldev] CDI.KEYID = 6
11,198,676 UART: [ldev] SUBJECT.KEYID = 5
11,199,752 UART: [ldev] AUTHORITY.KEYID = 7
11,200,929 UART: [ldev] FE.KEYID = 1
11,201,948 UART: [ldev] Erasing FE.KEYID = 1
14,366,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,657,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,674,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,690,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,706,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,726,448 UART: [ldev] --
16,731,715 UART: [fwproc] Wait for Commands...
16,734,620 UART: [fwproc] Recv command 0x46574c44
16,736,877 UART: [fwproc] Recv'd Img size: 114124 bytes
20,809,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,882,927 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,951,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,268,789 >>> mbox cmd response: success
21,273,457 UART: [afmc] ++
21,274,045 UART: [afmc] CDI.KEYID = 6
21,275,160 UART: [afmc] SUBJECT.KEYID = 7
21,276,391 UART: [afmc] AUTHORITY.KEYID = 5
24,593,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,890,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,892,359 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,908,563 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,924,638 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,940,648 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,963,102 UART: [afmc] --
26,966,517 UART: [cold-reset] --
26,969,575 UART: [state] Locking Datavault
26,974,555 UART: [state] Locking PCR0, PCR1 and PCR31
26,976,190 UART: [state] Locking ICCM
26,979,212 UART: [exit] Launching FMC @ 0x40000130
26,987,892 UART:
26,988,121 UART: Running Caliptra FMC ...
26,989,216 UART:
26,989,391 UART: [state] CFI Enabled
26,997,702 UART: [fht] FMC Alias Private Key: 7
29,327,904 UART: [art] Extend RT PCRs Done
29,329,131 UART: [art] Lock RT PCRs Done
29,330,702 UART: [art] Populate DV Done
29,336,095 UART: [fht] FMC Alias Private Key: 7
29,337,638 UART: [art] Derive CDI
29,338,394 UART: [art] Store in in slot 0x4
29,380,922 UART: [art] Derive Key Pair
29,381,917 UART: [art] Store priv key in slot 0x5
32,624,151 UART: [art] Derive Key Pair - Done
32,636,935 UART: [art] Signing Cert with AUTHO
32,638,229 UART: RITY.KEYID = 7
34,917,844 UART: [art] Erasing AUTHORITY.KEYID = 7
34,919,352 UART: [art] PUB.X = A6CA15BD171E035E69246D116F453E13E4791883DB7CDEB2C5EC1709F5EFC4051ABF7EF7A7127440D6EA49335CFBAA1D
34,926,603 UART: [art] PUB.Y = 8DA082173025C9A4A2D172860C82A95CBED0F5469CDDD715242C623715A54F0D16085C44F604A685460F8BE8200E1029
34,933,848 UART: [art] SIG.R = 66D7573075583D98536E6D14564E2FD5DA5E11E82685CBB372D28FEE53C94D9CF84F75ABA62E9D0783812ABF31064A37
34,941,200 UART: [art] SIG.S = B7D4AFB280973F75BC78C342FB14D709285CA6A24DEDD7A4B4BEDC8C0C6DCCA51ED85CBA0431531E564E2FD9B3B09293
36,246,387 UART: Caliptra RT
36,247,091 UART: [state] CFI Enabled
36,364,235 UART: [rt] RT listening for mailbox commands...
36,515,167 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,545,145 UART: [rt]cmd =0x4c444556, len=4
36,556,147 >>> mbox cmd response data (687 bytes)
36,701,139 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,731,123 UART: [rt]cmd =0x43455246, len=4
36,743,946 >>> mbox cmd response data (886 bytes)
36,886,589 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,916,628 UART: [rt]cmd =0x43455252, len=4
36,928,127 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1961.43s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
10,731,076 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,857,335 >>> mbox cmd response: success
26,495,259 UART:
26,495,644 UART: Running Caliptra FMC ...
26,496,923 UART:
26,497,079 UART: [state] CFI Enabled
26,505,189 UART: [fht] FMC Alias Private Key: 7
28,836,126 UART: [art] Extend RT PCRs Done
28,837,347 UART: [art] Lock RT PCRs Done
28,838,890 UART: [art] Populate DV Done
28,844,474 UART: [fht] FMC Alias Private Key: 7
28,846,063 UART: [art] Derive CDI
28,846,807 UART: [art] Store in in slot 0x4
28,889,307 UART: [art] Derive Key Pair
28,890,299 UART: [art] Store priv key in slot 0x5
32,132,579 UART: [art] Derive Key Pair - Done
32,145,264 UART: [art] Signing Cert with AUTHO
32,146,565 UART: RITY.KEYID = 7
34,426,239 UART: [art] Erasing AUTHORITY.KEYID = 7
34,427,745 UART: [art] PUB.X = 7714DD1B62232B4B749469F71C0F53DE68A535EAB5CF8B95B79D002CDFB99BBA444CBEFE0083D503195F9442608F4CDB
34,435,012 UART: [art] PUB.Y = 53B32A155FCA8F54E536E627EE9C08787AB5D32074770094828B7A60B91B2ABA32AEE45D1C9E708982AA51A4F5A32CF1
34,442,213 UART: [art] SIG.R = F32E98DF42196CD8DF86DF6DC72DC421E02BC25502811C0AC6909BBA1EDA93B7DF35F36F7C661BD820C6608C48DDBEF3
34,449,625 UART: [art] SIG.S = 78E364670F35AD068F58BC00C86FF325F700418DFD1AE3D9ABA364BD11BA90D90030F1AF545FB9C43B51D92D970BB613
35,755,049 UART: Caliptra RT
35,755,752 UART: [state] CFI Enabled
35,873,409 UART: [rt] RT listening for mailbox commands...
36,023,396 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,053,234 UART: [rt]cmd =0x4c444556, len=4
36,064,154 >>> mbox cmd response data (687 bytes)
36,209,448 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,239,385 UART: [rt]cmd =0x43455246, len=4
36,252,147 >>> mbox cmd response data (886 bytes)
36,395,797 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,425,817 UART: [rt]cmd =0x43455252, len=4
36,437,057 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
10,734,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,863,387 >>> mbox cmd response: success
26,501,158 UART:
26,501,627 UART: Running Caliptra FMC ...
26,502,754 UART:
26,502,897 UART: [state] CFI Enabled
26,510,938 UART: [fht] FMC Alias Private Key: 7
28,841,664 UART: [art] Extend RT PCRs Done
28,842,907 UART: [art] Lock RT PCRs Done
28,844,722 UART: [art] Populate DV Done
28,850,402 UART: [fht] FMC Alias Private Key: 7
28,851,882 UART: [art] Derive CDI
28,852,610 UART: [art] Store in in slot 0x4
28,895,095 UART: [art] Derive Key Pair
28,896,137 UART: [art] Store priv key in slot 0x5
32,138,043 UART: [art] Derive Key Pair - Done
32,151,239 UART: [art] Signing Cert with AUTHO
32,152,542 UART: RITY.KEYID = 7
34,432,056 UART: [art] Erasing AUTHORITY.KEYID = 7
34,433,569 UART: [art] PUB.X = 9ACE43629EDDB534D70EC35619691281A471DB2034D57261B1CC11C678C8869A86D6B6B8C7567ECC75FD7E52B0DB3EF9
34,440,846 UART: [art] PUB.Y = E92E629AED1A1E28B6031259FFA43A4916D6064D372A7F2E49C67E0BE3FB19B6634AB9AFA35FE9C8C5969C903F44E663
34,448,059 UART: [art] SIG.R = DD42E3527FB701918BD710D460A46BBEC2CCFD294E6C27B1CF344BCA7CB6D1DE2801E3C9BBA1E84C35C0356D1F2DDC7B
34,455,470 UART: [art] SIG.S = 94FD87C58350F912CF1427333923AE88C799FDA32F6F2B3D7632FACA34BC4606E88BA14897B42C8FB1C7CDB3E3D43285
35,761,130 UART: Caliptra RT
35,761,862 UART: [state] CFI Enabled
35,879,946 UART: [rt] RT listening for mailbox commands...
36,030,248 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,060,145 UART: [rt]cmd =0x4c444556, len=4
36,071,313 >>> mbox cmd response data (687 bytes)
36,216,287 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,246,194 UART: [rt]cmd =0x43455246, len=4
36,258,883 >>> mbox cmd response data (886 bytes)
36,402,154 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,432,062 UART: [rt]cmd =0x43455252, len=4
36,443,261 >>> mbox cmd response data (784 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
10,730,393 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,860,582 >>> mbox cmd response: success
26,494,180 UART:
26,494,620 UART: Running Caliptra FMC ...
26,495,823 UART:
26,496,008 UART: [state] CFI Enabled
26,503,746 UART: [fht] FMC Alias Private Key: 7
28,834,002 UART: [art] Extend RT PCRs Done
28,835,227 UART: [art] Lock RT PCRs Done
28,836,641 UART: [art] Populate DV Done
28,841,990 UART: [fht] FMC Alias Private Key: 7
28,843,480 UART: [art] Derive CDI
28,844,248 UART: [art] Store in in slot 0x4
28,886,844 UART: [art] Derive Key Pair
28,887,885 UART: [art] Store priv key in slot 0x5
32,130,181 UART: [art] Derive Key Pair - Done
32,143,131 UART: [art] Signing Cert with AUTHO
32,144,433 UART: RITY.KEYID = 7
34,423,852 UART: [art] Erasing AUTHORITY.KEYID = 7
34,425,381 UART: [art] PUB.X = 9EFB0216032786391BE08DED272F1F06000041AB99F2B8716CDDC5B7EB64B926A3FE509C88DF30C86ED6C884E019919E
34,432,542 UART: [art] PUB.Y = CB81D268DDDCD7A44E488EBFE4131559DFBFAA88A27A1ACC1E1235D3404E5AA0C4B8DBC5263CFED03E1710C4395C234F
34,439,863 UART: [art] SIG.R = 42500841EA5422177A09651BC8C7BE59B19A389D630D5DB07C333545F057809A51DF56FF74BBEC56B2251F9E174089AC
34,447,220 UART: [art] SIG.S = 305D6F702FFA89B5E7ABAF6712368CD19AFFB367CCDBC4DFCEB3AFD6FA5CBFFAB6CBDD132E3E8D6DB05C33A732EF3B61
35,752,847 UART: Caliptra RT
35,753,559 UART: [state] CFI Enabled
35,870,260 UART: [rt] RT listening for mailbox commands...
36,020,507 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,050,289 UART: [rt]cmd =0x4c444556, len=4
36,061,333 >>> mbox cmd response data (687 bytes)
36,205,819 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,235,578 UART: [rt]cmd =0x43455246, len=4
36,248,374 >>> mbox cmd response data (886 bytes)
36,391,926 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,421,584 UART: [rt]cmd =0x43455252, len=4
36,433,013 >>> mbox cmd response data (782 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
10,740,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,863,375 >>> mbox cmd response: success
26,506,308 UART:
26,506,699 UART: Running Caliptra FMC ...
26,507,829 UART:
26,507,983 UART: [state] CFI Enabled
26,515,753 UART: [fht] FMC Alias Private Key: 7
28,845,760 UART: [art] Extend RT PCRs Done
28,846,988 UART: [art] Lock RT PCRs Done
28,848,608 UART: [art] Populate DV Done
28,854,334 UART: [fht] FMC Alias Private Key: 7
28,856,084 UART: [art] Derive CDI
28,856,900 UART: [art] Store in in slot 0x4
28,899,816 UART: [art] Derive Key Pair
28,900,821 UART: [art] Store priv key in slot 0x5
32,143,219 UART: [art] Derive Key Pair - Done
32,156,429 UART: [art] Signing Cert with AUTHO
32,157,733 UART: RITY.KEYID = 7
34,437,332 UART: [art] Erasing AUTHORITY.KEYID = 7
34,438,844 UART: [art] PUB.X = 7B6DD909356EFF5AB17685CE3CC89F9DA35B66A1CCD3A839F37237AC97FFD88298E4DC5D09A3B3663633CA3112DE9446
34,446,117 UART: [art] PUB.Y = F0FB96E67C001C2B00A9346D2BA154B74F2E21558F850F358AFDC65FA37C678907886FF59466613E20CBF624FA55051E
34,453,356 UART: [art] SIG.R = 45226D2A015A1A68B92F06B8F629C4CEDEB0B6ECAEED6B72B60330F63CF2C28C6FEE77FD2456697007D37649E13176CE
34,460,721 UART: [art] SIG.S = 5F52BE91FCD8123049A03E72DE81319BEC421B5D2657F73FB6CF036A29288556E1123D5F0A766E927BB0B992305AB669
35,766,326 UART: Caliptra RT
35,767,028 UART: [state] CFI Enabled
35,883,075 UART: [rt] RT listening for mailbox commands...
36,032,738 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,062,432 UART: [rt]cmd =0x4c444556, len=4
36,073,529 >>> mbox cmd response data (687 bytes)
36,218,661 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,248,645 UART: [rt]cmd =0x43455246, len=4
36,261,468 >>> mbox cmd response data (886 bytes)
36,405,182 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,435,141 UART: [rt]cmd =0x43455252, len=4
36,446,490 >>> mbox cmd response data (782 bytes)
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,376 writing to cptra_bootfsm_go
10,737,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,866,627 >>> mbox cmd response: success
26,512,204 UART:
26,512,582 UART: Running Caliptra FMC ...
26,513,780 UART:
26,513,947 UART: [state] CFI Enabled
26,522,052 UART: [fht] FMC Alias Private Key: 7
28,853,066 UART: [art] Extend RT PCRs Done
28,854,302 UART: [art] Lock RT PCRs Done
28,856,198 UART: [art] Populate DV Done
28,861,459 UART: [fht] FMC Alias Private Key: 7
28,862,938 UART: [art] Derive CDI
28,863,698 UART: [art] Store in in slot 0x4
28,906,443 UART: [art] Derive Key Pair
28,907,496 UART: [art] Store priv key in slot 0x5
32,149,233 UART: [art] Derive Key Pair - Done
32,161,901 UART: [art] Signing Cert with AUTHO
32,163,235 UART: RITY.KEYID = 7
34,442,735 UART: [art] Erasing AUTHORITY.KEYID = 7
34,444,243 UART: [art] PUB.X = 93398CF11E60C429A6A5AAEAA229ADB34A38E65AAC655A0ADA91813E3636B85A0A429964304A8225B1D6A6EBEEA75273
34,451,499 UART: [art] PUB.Y = 7565FB4097B3F12B139B01E8B1BCE2CCA015B061DDCE69F006B262FB44E08D785C4B34CCEEDE64BE7635A52B82DA3D78
34,458,736 UART: [art] SIG.R = C88640840C375D416E6E915D6CEDE7B83BA04FD7B956D89399EFD4D037938FD1BA2F6A9F46D6E1EA681BECCF350F6B8D
34,466,154 UART: [art] SIG.S = F9084D78E57339DE31CC2F550B903357C8C4852E9497DCD77901BACEA0057C635CAA6C4394330E805B365A139291C63E
35,771,169 UART: Caliptra RT
35,771,905 UART: [state] CFI Enabled
35,890,919 UART: [rt] RT listening for mailbox commands...
36,040,681 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,070,534 UART: [rt]cmd =0x4c444556, len=4
36,081,655 >>> mbox cmd response data (687 bytes)
36,227,126 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,256,970 UART: [rt]cmd =0x43455246, len=4
36,269,547 >>> mbox cmd response data (886 bytes)
36,413,224 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,443,031 UART: [rt]cmd =0x43455252, len=4
36,454,455 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1937.20s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,994,536 UART: [idev] CSR uploaded
8,011,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,155,995 UART: [idev] --
8,156,628 UART: [ldev] ++
8,157,133 UART: [ldev] CDI.KEYID = 6
8,158,011 UART: [ldev] SUBJECT.KEYID = 5
8,159,092 UART: [ldev] AUTHORITY.KEYID = 7
8,160,280 UART: [ldev] FE.KEYID = 1
8,161,153 UART: [ldev] Erasing FE.KEYID = 1
10,562,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,367,565 UART: [ldev] --
12,372,069 UART: [fwproc] Wait for Commands...
12,374,459 UART: [fwproc] Recv command 0x46574c44
12,376,558 UART: [fwproc] Recv'd Img size: 114448 bytes
15,775,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,844,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,913,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,232,126 >>> mbox cmd response: success
16,235,821 UART: [afmc] ++
16,236,410 UART: [afmc] CDI.KEYID = 6
16,237,291 UART: [afmc] SUBJECT.KEYID = 7
16,238,503 UART: [afmc] AUTHORITY.KEYID = 5
18,767,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,490,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,492,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,508,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,524,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,539,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,561,676 UART: [afmc] --
20,565,333 UART: [cold-reset] --
20,569,581 UART: [state] Locking Datavault
20,575,206 UART: [state] Locking PCR0, PCR1 and PCR31
20,576,848 UART: [state] Locking ICCM
20,578,730 UART: [exit] Launching FMC @ 0x40000130
20,587,126 UART:
20,587,370 UART: Running Caliptra FMC ...
20,588,472 UART:
20,588,629 UART: [state] CFI Enabled
20,649,377 UART: [fht] FMC Alias Private Key: 7
22,413,725 UART: [art] Extend RT PCRs Done
22,414,950 UART: [art] Lock RT PCRs Done
22,416,841 UART: [art] Populate DV Done
22,422,362 UART: [fht] FMC Alias Private Key: 7
22,423,901 UART: [art] Derive CDI
22,424,731 UART: [art] Store in in slot 0x4
22,482,098 UART: [art] Derive Key Pair
22,483,149 UART: [art] Store priv key in slot 0x5
24,946,404 UART: [art] Derive Key Pair - Done
24,959,619 UART: [art] Signing Cert with AUTHO
24,960,915 UART: RITY.KEYID = 7
26,672,479 UART: [art] Erasing AUTHORITY.KEYID = 7
26,673,986 UART: [art] PUB.X = 1D247BEFFF7C07AD6030834179E7931D1DCB44E92C406C8D3CA7B30009E23D8F16126AC399F8B2920395C135BB86CDD3
26,681,274 UART: [art] PUB.Y = E85021BD457B09B992DF046F18B75DCAFE145383A8C15BDB2D9A3A8752F704BADA0B37EF245DAC334D31983A4B9061AD
26,688,513 UART: [art] SIG.R = F467A212958A211EBF0614B67533876A3D7FE29A5D0D194CA49F5E8030F4B9AB51293CDED15B9F28D53B1688223AA34E
26,695,898 UART: [art] SIG.S = 8B1CCFC2233F76A7DB22D1FACF0079039CF70BE26C365048259F88E99FED368271635F0F1A59EBF9144F8C3D2AB62D2D
27,674,755 UART: Caliptra RT
27,675,455 UART: [state] CFI Enabled
27,840,879 UART: [rt] RT listening for mailbox commands...
27,991,602 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,021,834 UART: [rt]cmd =0x4c444556, len=4
28,032,957 >>> mbox cmd response data (687 bytes)
28,178,479 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,208,506 UART: [rt]cmd =0x43455246, len=4
28,221,103 >>> mbox cmd response data (887 bytes)
28,364,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,394,648 UART: [rt]cmd =0x43455252, len=4
28,405,922 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,391 UART:
192,753 UART: Running Caliptra ROM ...
193,928 UART:
194,087 UART: [state] CFI Enabled
262,556 UART: [state] LifecycleState = Unprovisioned
264,486 UART: [state] DebugLocked = No
267,170 UART: [state] WD Timer not started. Device not locked for debugging
271,288 UART: [kat] SHA2-256
450,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,978 UART: [kat] ++
462,515 UART: [kat] sha1
474,418 UART: [kat] SHA2-256
477,407 UART: [kat] SHA2-384
482,874 UART: [kat] SHA2-512-ACC
485,870 UART: [kat] ECC-384
2,948,453 UART: [kat] HMAC-384Kdf
2,970,631 UART: [kat] LMS
3,500,050 UART: [kat] --
3,505,450 UART: [cold-reset] ++
3,506,790 UART: [fht] FHT @ 0x50003400
3,517,934 UART: [idev] ++
3,518,537 UART: [idev] CDI.KEYID = 6
3,519,452 UART: [idev] SUBJECT.KEYID = 7
3,520,638 UART: [idev] UDS.KEYID = 0
3,543,374 UART: [idev] Erasing UDS.KEYID = 0
6,023,678 UART: [idev] Sha1 KeyId Algorithm
6,043,308 UART: [idev] CSR upload begun
6,048,034 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,166 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,218 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,158 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,829,015 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,816 UART: [idev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
7,997,521 UART: [idev] CSR uploaded
8,014,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,158,942 UART: [idev] --
8,159,578 UART: [ldev] ++
8,160,078 UART: [ldev] CDI.KEYID = 6
8,160,965 UART: [ldev] SUBJECT.KEYID = 5
8,162,061 UART: [ldev] AUTHORITY.KEYID = 7
8,163,259 UART: [ldev] FE.KEYID = 1
8,164,105 UART: [ldev] Erasing FE.KEYID = 1
10,564,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,282,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,298,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,314,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,329,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,350,713 UART: [ldev] --
12,355,111 UART: [fwproc] Wait for Commands...
12,357,638 UART: [fwproc] Recv command 0x46574c44
12,359,684 UART: [fwproc] Recv'd Img size: 114448 bytes
15,757,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,832,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,901,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,218,840 >>> mbox cmd response: success
16,223,506 UART: [afmc] ++
16,224,102 UART: [afmc] CDI.KEYID = 6
16,224,987 UART: [afmc] SUBJECT.KEYID = 7
16,226,204 UART: [afmc] AUTHORITY.KEYID = 5
18,768,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,495,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,497,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,513,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,529,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,545,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,567,195 UART: [afmc] --
20,570,312 UART: [cold-reset] --
20,574,493 UART: [state] Locking Datavault
20,578,713 UART: [state] Locking PCR0, PCR1 and PCR31
20,580,354 UART: [state] Locking ICCM
20,582,877 UART: [exit] Launching FMC @ 0x40000130
20,591,293 UART:
20,591,531 UART: Running Caliptra FMC ...
20,592,633 UART:
20,592,790 UART: [state] CFI Enabled
20,653,462 UART: [fht] FMC Alias Private Key: 7
22,417,261 UART: [art] Extend RT PCRs Done
22,418,818 UART: [art] Lock RT PCRs Done
22,420,094 UART: [art] Populate DV Done
22,425,420 UART: [fht] FMC Alias Private Key: 7
22,426,957 UART: [art] Derive CDI
22,427,722 UART: [art] Store in in slot 0x4
22,486,553 UART: [art] Derive Key Pair
22,487,588 UART: [art] Store priv key in slot 0x5
24,950,755 UART: [art] Derive Key Pair - Done
24,963,606 UART: [art] Signing Cert with AUTHO
24,964,948 UART: RITY.KEYID = 7
26,677,739 UART: [art] Erasing AUTHORITY.KEYID = 7
26,679,586 UART: [art] PUB.X = 4BF67D9AA3C0965BC0C1BF6AEA1A9853BCD0C87C1BF05C3E250D26C1C43A3AE16173033EE675B2C0F3AF25C0C962E129
26,686,588 UART: [art] PUB.Y = 25B8471A2D0C60B875D70FA04207F471983A9F114369AEB536B7963D9E2D6B2A6FA226BBDD09BDCA81A293F5CD293239
26,693,820 UART: [art] SIG.R = D9E37AA36CB738C13C15045FC88AB6D170A9D69058AAA110536FF5ACB97A2578462BDAA8C9700B27A89349B2D77BCE8B
26,701,214 UART: [art] SIG.S = 1202B1C422E65899259C5AC35BA9FFDE3043114BC84970841702EEFD97537AE1D863A0B56F6CA06BFD590020E650EBC2
27,680,178 UART: Caliptra RT
27,680,886 UART: [state] CFI Enabled
27,846,253 UART: [rt] RT listening for mailbox commands...
27,997,288 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,027,382 UART: [rt]cmd =0x4c444556, len=4
28,038,406 >>> mbox cmd response data (687 bytes)
28,183,934 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,213,940 UART: [rt]cmd =0x43455246, len=4
28,226,666 >>> mbox cmd response data (887 bytes)
28,370,288 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,400,278 UART: [rt]cmd =0x43455252, len=4
28,411,746 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.56s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
7,686,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,838,269 >>> mbox cmd response: success
20,135,758 UART:
20,136,139 UART: Running Caliptra FMC ...
20,137,321 UART:
20,137,503 UART: [state] CFI Enabled
20,203,833 UART: [fht] FMC Alias Private Key: 7
21,967,453 UART: [art] Extend RT PCRs Done
21,968,670 UART: [art] Lock RT PCRs Done
21,970,076 UART: [art] Populate DV Done
21,975,478 UART: [fht] FMC Alias Private Key: 7
21,977,235 UART: [art] Derive CDI
21,978,049 UART: [art] Store in in slot 0x4
22,036,493 UART: [art] Derive Key Pair
22,037,531 UART: [art] Store priv key in slot 0x5
24,500,158 UART: [art] Derive Key Pair - Done
24,512,885 UART: [art] Signing Cert with AUTHO
24,514,187 UART: RITY.KEYID = 7
26,226,456 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,968 UART: [art] PUB.X = 70BF69F918341B26DAC1FEE4BDF24CA7139068377CD95F78C5B4323838877906FBF4D7B727FFDD094A293FA82E50FDAA
26,235,229 UART: [art] PUB.Y = 0287882CDE8A107E1760ECA80940CBE1BF9B3C697A50188108007D73A4B787AA59466276BCE3913B27E4E422A53A503E
26,242,474 UART: [art] SIG.R = 757A50105686CEA90528E024349C09B7040611BD3717DF1E854A116B582D7DE6E5F1B31853D6E259F63C5F594D763A9E
26,249,976 UART: [art] SIG.S = 087B5AB602B974D5C874DD5B155F12029ED9E8D6D5388AEB763A02620DEA54BB71C18FB679250E7CB62E2C44D951A357
27,229,132 UART: Caliptra RT
27,229,848 UART: [state] CFI Enabled
27,396,035 UART: [rt] RT listening for mailbox commands...
27,545,959 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,575,911 UART: [rt]cmd =0x4c444556, len=4
27,587,086 >>> mbox cmd response data (687 bytes)
27,732,487 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,762,308 UART: [rt]cmd =0x43455246, len=4
27,775,070 >>> mbox cmd response data (887 bytes)
27,918,134 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,948,312 UART: [rt]cmd =0x43455252, len=4
27,959,720 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
7,667,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,811,985 >>> mbox cmd response: success
20,090,273 UART:
20,090,807 UART: Running Caliptra FMC ...
20,091,940 UART:
20,092,104 UART: [state] CFI Enabled
20,157,579 UART: [fht] FMC Alias Private Key: 7
21,921,316 UART: [art] Extend RT PCRs Done
21,922,545 UART: [art] Lock RT PCRs Done
21,924,360 UART: [art] Populate DV Done
21,929,598 UART: [fht] FMC Alias Private Key: 7
21,931,200 UART: [art] Derive CDI
21,931,937 UART: [art] Store in in slot 0x4
21,990,563 UART: [art] Derive Key Pair
21,991,566 UART: [art] Store priv key in slot 0x5
24,454,217 UART: [art] Derive Key Pair - Done
24,467,281 UART: [art] Signing Cert with AUTHO
24,468,595 UART: RITY.KEYID = 7
26,179,255 UART: [art] Erasing AUTHORITY.KEYID = 7
26,180,771 UART: [art] PUB.X = 64E4D33EFBDF61A1779DF2A5AA1A332516C0C5CC8DA935BFA6F21708F98DA2F013C29C2744B30E39BE24BC1833DCAB33
26,188,044 UART: [art] PUB.Y = 95E6245A02FB845638054A98A32665A8D08DC1633E090F6D5E59CFCC839453C40156BF4E23E287E9C6F2353243CAB784
26,195,282 UART: [art] SIG.R = D8075714959F562593AAC362D6A8A0A52655AB51E025FC01466F38EA3189F4C1ECCA4287A02632BC03CE0D1647B3FF82
26,202,633 UART: [art] SIG.S = 71A92270F84D251514AE55C00FE8556E44F4AD62AF9B94E1A0DC9BB147AAE086A56284EDD736C5D6C8E683F70FF086EB
27,181,957 UART: Caliptra RT
27,182,659 UART: [state] CFI Enabled
27,348,308 UART: [rt] RT listening for mailbox commands...
27,498,408 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,528,510 UART: [rt]cmd =0x4c444556, len=4
27,539,629 >>> mbox cmd response data (687 bytes)
27,684,627 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,714,401 UART: [rt]cmd =0x43455246, len=4
27,727,178 >>> mbox cmd response data (887 bytes)
27,870,523 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,900,506 UART: [rt]cmd =0x43455252, len=4
27,911,891 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
7,684,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,809,579 >>> mbox cmd response: success
20,094,598 UART:
20,094,996 UART: Running Caliptra FMC ...
20,096,139 UART:
20,096,304 UART: [state] CFI Enabled
20,160,567 UART: [fht] FMC Alias Private Key: 7
21,925,021 UART: [art] Extend RT PCRs Done
21,926,269 UART: [art] Lock RT PCRs Done
21,927,686 UART: [art] Populate DV Done
21,932,823 UART: [fht] FMC Alias Private Key: 7
21,934,417 UART: [art] Derive CDI
21,935,231 UART: [art] Store in in slot 0x4
21,993,942 UART: [art] Derive Key Pair
21,994,981 UART: [art] Store priv key in slot 0x5
24,459,328 UART: [art] Derive Key Pair - Done
24,472,111 UART: [art] Signing Cert with AUTHO
24,473,413 UART: RITY.KEYID = 7
26,184,315 UART: [art] Erasing AUTHORITY.KEYID = 7
26,185,959 UART: [art] PUB.X = 07F07B75D4FD8B2CF1386B3775A87BD83C2F85462328B22C79078CBB1BE1E63FA8B9A3D9C0F63F6A9120A05310922FD4
26,193,067 UART: [art] PUB.Y = 832145A63E8039F664E8F311913D372ABF60A75CFAC971E820054AB110F4531D39F68397D2E332FC0FF4431351B2C013
26,200,327 UART: [art] SIG.R = 7DAD5AB708A0D00251F8DFF81392AC7452A99305BED19708F2EB1CADC495EE9F93D339F99736435763FBF912C6592A63
26,207,687 UART: [art] SIG.S = F7F501EEA71C2399CA18848DF98FCEE709499E21C3F603EA5DF44C30B815A1EB0B92A57E4EA6AF4649D579F33D383837
27,186,661 UART: Caliptra RT
27,187,390 UART: [state] CFI Enabled
27,353,359 UART: [rt] RT listening for mailbox commands...
27,503,031 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,532,859 UART: [rt]cmd =0x4c444556, len=4
27,543,922 >>> mbox cmd response data (687 bytes)
27,688,836 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,718,854 UART: [rt]cmd =0x43455246, len=4
27,731,603 >>> mbox cmd response data (887 bytes)
27,875,070 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,905,104 UART: [rt]cmd =0x43455252, len=4
27,916,486 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
7,671,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,801,558 >>> mbox cmd response: success
20,100,408 UART:
20,100,810 UART: Running Caliptra FMC ...
20,101,942 UART:
20,102,111 UART: [state] CFI Enabled
20,165,462 UART: [fht] FMC Alias Private Key: 7
21,929,659 UART: [art] Extend RT PCRs Done
21,930,881 UART: [art] Lock RT PCRs Done
21,932,733 UART: [art] Populate DV Done
21,938,087 UART: [fht] FMC Alias Private Key: 7
21,939,743 UART: [art] Derive CDI
21,940,561 UART: [art] Store in in slot 0x4
21,998,740 UART: [art] Derive Key Pair
21,999,777 UART: [art] Store priv key in slot 0x5
24,462,549 UART: [art] Derive Key Pair - Done
24,475,661 UART: [art] Signing Cert with AUTHO
24,476,967 UART: RITY.KEYID = 7
26,189,416 UART: [art] Erasing AUTHORITY.KEYID = 7
26,190,948 UART: [art] PUB.X = D8C128F2A341C5EB83C75D4EF2F3FBD685C85CE91F0DCB9163A79117084F56929627DCF8A64EB64C15A7848D7DE00733
26,198,166 UART: [art] PUB.Y = D5454B4FE6A43160C0C069FC46E79037BDFE9F326E39128356F0F483727BEC385F1E59328D83079C0CD43020E92511C4
26,205,406 UART: [art] SIG.R = DA938C874BF5CE94C90D9537D586A4A45FD50ED8FDBF1A64ABB7583E9CEACEFCDAF253F4958F77A6F884B635E67A953C
26,212,846 UART: [art] SIG.S = 764ECC1C747B516458869ABE7346729CAB2C4C0BFDA631B633D2DD966ABA5ACFA97AECC7289A63AA46DD26694F26503C
27,192,401 UART: Caliptra RT
27,193,087 UART: [state] CFI Enabled
27,356,896 UART: [rt] RT listening for mailbox commands...
27,506,753 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,536,827 UART: [rt]cmd =0x4c444556, len=4
27,547,996 >>> mbox cmd response data (687 bytes)
27,693,508 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,723,701 UART: [rt]cmd =0x43455246, len=4
27,736,393 >>> mbox cmd response data (887 bytes)
27,879,895 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,909,637 UART: [rt]cmd =0x43455252, len=4
27,920,975 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,489 writing to cptra_bootfsm_go
7,689,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,827,060 >>> mbox cmd response: success
20,116,464 UART:
20,116,859 UART: Running Caliptra FMC ...
20,117,969 UART:
20,118,121 UART: [state] CFI Enabled
20,182,772 UART: [fht] FMC Alias Private Key: 7
21,946,623 UART: [art] Extend RT PCRs Done
21,947,848 UART: [art] Lock RT PCRs Done
21,949,284 UART: [art] Populate DV Done
21,954,800 UART: [fht] FMC Alias Private Key: 7
21,956,338 UART: [art] Derive CDI
21,957,069 UART: [art] Store in in slot 0x4
22,015,247 UART: [art] Derive Key Pair
22,016,309 UART: [art] Store priv key in slot 0x5
24,479,440 UART: [art] Derive Key Pair - Done
24,492,498 UART: [art] Signing Cert with AUTHO
24,493,801 UART: RITY.KEYID = 7
26,205,372 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,868 UART: [art] PUB.X = 38172EE1F138C6448DC027994F0266404107FB562AAC69B8999410517F71ED1B654B0708D98F87E3C505BE614615898F
26,214,122 UART: [art] PUB.Y = 45278BDB7E0711F0B06B413EB1A4300A6CAAD751CA0B185D2E72758D8C4F159816E84365A65F18713C9685EF20DECA51
26,221,381 UART: [art] SIG.R = 502A513E9EBD7EB6E032C660D97C7E7DA6E21EB3F9F3F3964C5965D78BFE9FA24758C01D2CE0663D6711C87794F42C73
26,228,833 UART: [art] SIG.S = 84B2DD62C00DB962B625B04E036D0EF8F2D5A22BEB805685BFDC835F569F3C2AEEE7B01E9525668E3A2ACA4E63A1348C
27,208,297 UART: Caliptra RT
27,209,010 UART: [state] CFI Enabled
27,373,477 UART: [rt] RT listening for mailbox commands...
27,523,197 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,374 UART: [rt]cmd =0x4c444556, len=4
27,564,553 >>> mbox cmd response data (687 bytes)
27,709,680 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,346 UART: [rt]cmd =0x43455246, len=4
27,751,988 >>> mbox cmd response data (887 bytes)
27,895,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,924,841 UART: [rt]cmd =0x43455252, len=4
27,936,249 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1512.00s
Truncated 7343978 bytes from beginning
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
8,275,925 UART: [idev] CSR uploaded
8,293,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,437,049 UART: [idev] --
8,437,689 UART: [ldev] ++
8,438,188 UART: [ldev] CDI.KEYID = 6
8,439,295 UART: [ldev] SUBJECT.KEYID = 5
8,440,482 UART: [ldev] AUTHORITY.KEYID = 7
8,441,665 UART: [ldev] FE.KEYID = 1
8,442,534 UART: [ldev] Erasing FE.KEYID = 1
10,785,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,503,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,519,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,535,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,570,514 UART: [ldev] --
12,575,553 UART: [fwproc] Wait for Commands...
12,578,508 UART: [fwproc] Recv command 0x46574c44
12,580,600 UART: [fwproc] Recv'd Img size: 114448 bytes
15,986,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,067,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,136,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,454,397 >>> mbox cmd response: success
16,458,755 UART: [afmc] ++
16,459,343 UART: [afmc] CDI.KEYID = 6
16,460,256 UART: [afmc] SUBJECT.KEYID = 7
16,461,470 UART: [afmc] AUTHORITY.KEYID = 5
18,966,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,687,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,689,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,704,965 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,721,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,736,833 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,758,412 UART: [afmc] --
20,762,436 UART: [cold-reset] --
20,765,760 UART: [state] Locking Datavault
20,770,733 UART: [state] Locking PCR0, PCR1 and PCR31
20,772,374 UART: [state] Locking ICCM
20,773,601 UART: [exit] Launching FMC @ 0x40000130
20,782,045 UART:
20,782,278 UART: Running Caliptra FMC ...
20,783,300 UART:
20,783,445 UART: [state] CFI Enabled
20,791,651 UART: [fht] FMC Alias Private Key: 7
22,548,916 UART: [art] Extend RT PCRs Done
22,550,134 UART: [art] Lock RT PCRs Done
22,552,031 UART: [art] Populate DV Done
22,557,499 UART: [fht] FMC Alias Private Key: 7
22,559,089 UART: [art] Derive CDI
22,559,901 UART: [art] Store in in slot 0x4
22,602,493 UART: [art] Derive Key Pair
22,603,535 UART: [art] Store priv key in slot 0x5
25,030,244 UART: [art] Derive Key Pair - Done
25,043,546 UART: [art] Signing Cert with AUTHO
25,044,879 UART: RITY.KEYID = 7
26,750,914 UART: [art] Erasing AUTHORITY.KEYID = 7
26,752,429 UART: [art] PUB.X = D0AF32BF9F61D314DCB9F5B04ACDF2C78250E7BE523DA4B8E984169F7FC83B4696214B37659DAE4FAF755BD7F9B9638F
26,759,713 UART: [art] PUB.Y = A500589FA4A2F9F6C39B4A75916BD1D7709BC34913DA51254716B7DDC0DBAB77BEF2B342C6526F01705A8DC0C49E62E8
26,766,965 UART: [art] SIG.R = 8386CF730112EE92CE4E3ED5D422B820F26CAB94871CCB4A0AB52578804D09AB24EC0EDBE005E3E2407D98A2E554BA6A
26,774,362 UART: [art] SIG.S = 855578BAD1DF5F1087C317CACE3547B75C358AE74271EB294C34746E993C76E3EE39F4D2FDB695455FCE0869A9A05D85
27,752,998 UART: Caliptra RT
27,753,705 UART: [state] CFI Enabled
27,870,761 UART: [rt] RT listening for mailbox commands...
28,022,293 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,052,357 UART: [rt]cmd =0x4c444556, len=4
28,063,405 >>> mbox cmd response data (687 bytes)
28,208,459 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,238,394 UART: [rt]cmd =0x43455246, len=4
28,251,183 >>> mbox cmd response data (887 bytes)
28,394,477 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,424,131 UART: [rt]cmd =0x43455252, len=4
28,435,287 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,447 UART:
192,825 UART: Running Caliptra ROM ...
193,941 UART:
603,509 UART: [state] CFI Enabled
619,124 UART: [state] LifecycleState = Unprovisioned
621,000 UART: [state] DebugLocked = No
622,762 UART: [state] WD Timer not started. Device not locked for debugging
626,001 UART: [kat] SHA2-256
805,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,702 UART: [kat] ++
817,144 UART: [kat] sha1
828,016 UART: [kat] SHA2-256
831,033 UART: [kat] SHA2-384
835,995 UART: [kat] SHA2-512-ACC
838,980 UART: [kat] ECC-384
3,280,242 UART: [kat] HMAC-384Kdf
3,293,282 UART: [kat] LMS
3,822,772 UART: [kat] --
3,827,489 UART: [cold-reset] ++
3,829,208 UART: [fht] FHT @ 0x50003400
3,839,698 UART: [idev] ++
3,840,261 UART: [idev] CDI.KEYID = 6
3,841,173 UART: [idev] SUBJECT.KEYID = 7
3,842,382 UART: [idev] UDS.KEYID = 0
3,860,820 UART: [idev] Erasing UDS.KEYID = 0
6,317,932 UART: [idev] Sha1 KeyId Algorithm
6,337,591 UART: [idev] CSR upload begun
6,342,275 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,058,221 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,074,273 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,090,208 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,106,112 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,129,900 UART: [idev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
8,274,494 UART: [idev] CSR uploaded
8,291,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,435,776 UART: [idev] --
8,436,415 UART: [ldev] ++
8,436,910 UART: [ldev] CDI.KEYID = 6
8,437,784 UART: [ldev] SUBJECT.KEYID = 5
8,438,864 UART: [ldev] AUTHORITY.KEYID = 7
8,440,053 UART: [ldev] FE.KEYID = 1
8,440,899 UART: [ldev] Erasing FE.KEYID = 1
10,781,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,530,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,546,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,565,103 UART: [ldev] --
12,569,385 UART: [fwproc] Wait for Commands...
12,571,852 UART: [fwproc] Recv command 0x46574c44
12,573,945 UART: [fwproc] Recv'd Img size: 114448 bytes
15,982,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,118,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,437,399 >>> mbox cmd response: success
16,440,983 UART: [afmc] ++
16,441,565 UART: [afmc] CDI.KEYID = 6
16,442,445 UART: [afmc] SUBJECT.KEYID = 7
16,443,714 UART: [afmc] AUTHORITY.KEYID = 5
18,943,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,664,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,666,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,682,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,698,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,714,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,736,839 UART: [afmc] --
20,740,855 UART: [cold-reset] --
20,744,212 UART: [state] Locking Datavault
20,748,328 UART: [state] Locking PCR0, PCR1 and PCR31
20,749,977 UART: [state] Locking ICCM
20,751,317 UART: [exit] Launching FMC @ 0x40000130
20,759,768 UART:
20,759,996 UART: Running Caliptra FMC ...
20,761,091 UART:
20,761,247 UART: [state] CFI Enabled
20,769,667 UART: [fht] FMC Alias Private Key: 7
22,526,708 UART: [art] Extend RT PCRs Done
22,527,931 UART: [art] Lock RT PCRs Done
22,529,661 UART: [art] Populate DV Done
22,534,852 UART: [fht] FMC Alias Private Key: 7
22,536,437 UART: [art] Derive CDI
22,537,242 UART: [art] Store in in slot 0x4
22,580,373 UART: [art] Derive Key Pair
22,581,400 UART: [art] Store priv key in slot 0x5
25,008,555 UART: [art] Derive Key Pair - Done
25,021,122 UART: [art] Signing Cert with AUTHO
25,022,420 UART: RITY.KEYID = 7
26,727,780 UART: [art] Erasing AUTHORITY.KEYID = 7
26,729,284 UART: [art] PUB.X = 73D8E2A339C392F71F5BE12F4EF20968011FF5EE37A7DA07B7EEAA51397555665247FC78071A230DEB9395313069CDC2
26,736,526 UART: [art] PUB.Y = CF22B0853F483649884123308FFDA124577F8D3BDEE60286254A0A56C7A7A927464B092066AE42F6E5CB6D76A2763744
26,743,790 UART: [art] SIG.R = 2CCDDD7916199D077E07F5545828EBFB9BC6C2E97289D3E23189589486C867AD964801FAF6F41D2A7D8C3FEB833E951D
26,751,130 UART: [art] SIG.S = 912A0A17963E16BD6B03AEF2E0B817823DFF57A35D5A0E877700112FF1FC99AEEB513BFB756619F9C4D360DC6FEBB196
27,730,423 UART: Caliptra RT
27,731,113 UART: [state] CFI Enabled
27,847,788 UART: [rt] RT listening for mailbox commands...
27,998,925 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,029,127 UART: [rt]cmd =0x4c444556, len=4
28,040,230 >>> mbox cmd response data (687 bytes)
28,185,633 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,215,572 UART: [rt]cmd =0x43455246, len=4
28,228,285 >>> mbox cmd response data (887 bytes)
28,371,837 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,401,555 UART: [rt]cmd =0x43455252, len=4
28,412,942 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.42s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
7,941,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,027,585 >>> mbox cmd response: success
20,275,963 UART:
20,276,351 UART: Running Caliptra FMC ...
20,277,550 UART:
20,277,722 UART: [state] CFI Enabled
20,285,666 UART: [fht] FMC Alias Private Key: 7
22,042,923 UART: [art] Extend RT PCRs Done
22,044,149 UART: [art] Lock RT PCRs Done
22,045,924 UART: [art] Populate DV Done
22,051,245 UART: [fht] FMC Alias Private Key: 7
22,052,730 UART: [art] Derive CDI
22,053,465 UART: [art] Store in in slot 0x4
22,095,947 UART: [art] Derive Key Pair
22,096,942 UART: [art] Store priv key in slot 0x5
24,523,566 UART: [art] Derive Key Pair - Done
24,536,808 UART: [art] Signing Cert with AUTHO
24,538,118 UART: RITY.KEYID = 7
26,243,404 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,910 UART: [art] PUB.X = F77C35704650A0F4E32E9DDC896CAFAD8738A38E25023CF51B3CB81E0E6442B0BC4FCFAF9EA6226922CA547E2EB744D4
26,252,208 UART: [art] PUB.Y = EA87AC3739A72CEA043D42D2B194E09942EC79EC663CD5422F64028641AD4BAC6825E0D2395B8B628D0888C137DB62DD
26,259,484 UART: [art] SIG.R = 0BA63E53AC2D2768D1A99D7F841CB9C54E4AC495D2BA9C438278E55879D3FDBBE0C9668975A4C8F5ABB13BB48FE58F36
26,266,879 UART: [art] SIG.S = EDF5627C7E5A263A4CA0FC7C7FB17ABE1E5390CB996AAAFC40DBA6CC4E58C5D9C104B7382465C8EC9BE51BF2E1A960B9
27,245,633 UART: Caliptra RT
27,246,330 UART: [state] CFI Enabled
27,364,098 UART: [rt] RT listening for mailbox commands...
27,514,432 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,544,625 UART: [rt]cmd =0x4c444556, len=4
27,555,722 >>> mbox cmd response data (687 bytes)
27,701,192 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,731,024 UART: [rt]cmd =0x43455246, len=4
27,743,511 >>> mbox cmd response data (887 bytes)
27,888,130 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,918,163 UART: [rt]cmd =0x43455252, len=4
27,929,420 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
7,945,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,030,962 >>> mbox cmd response: success
20,276,961 UART:
20,277,354 UART: Running Caliptra FMC ...
20,278,493 UART:
20,278,660 UART: [state] CFI Enabled
20,286,718 UART: [fht] FMC Alias Private Key: 7
22,043,765 UART: [art] Extend RT PCRs Done
22,045,018 UART: [art] Lock RT PCRs Done
22,046,837 UART: [art] Populate DV Done
22,052,092 UART: [fht] FMC Alias Private Key: 7
22,053,549 UART: [art] Derive CDI
22,054,324 UART: [art] Store in in slot 0x4
22,096,754 UART: [art] Derive Key Pair
22,097,754 UART: [art] Store priv key in slot 0x5
24,524,528 UART: [art] Derive Key Pair - Done
24,537,636 UART: [art] Signing Cert with AUTHO
24,538,933 UART: RITY.KEYID = 7
26,244,342 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,836 UART: [art] PUB.X = 577614F2964982BF71BE2B698019DDB60A58F238CE7D50ECF5DF3AE24F95B318CE107A1DC0F5BBE23A31C34E5F1102F1
26,253,080 UART: [art] PUB.Y = 1F52FD444D40D6195D203D972A44B950BDAF61FE21ED85A4C3013ADFAFDAA5EC6DB089DA9302EA2C7EDBE21C34CD192E
26,260,396 UART: [art] SIG.R = A7FDDE67B58098D01934BAC205D40C4DC0E5276E9D2A615FF5099C45F6C6F2FB421495CF9EC99ED7A58F273DA0644902
26,267,784 UART: [art] SIG.S = 2111BDE97B71224D1F9C6E0D7BF9B904517713886EA86AAE9315FDCF4E7ECCE5351075B5F669B16C560BFA142743A8E5
27,246,532 UART: Caliptra RT
27,247,253 UART: [state] CFI Enabled
27,365,398 UART: [rt] RT listening for mailbox commands...
27,515,596 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,545,789 UART: [rt]cmd =0x4c444556, len=4
27,556,722 >>> mbox cmd response data (687 bytes)
27,702,180 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,732,294 UART: [rt]cmd =0x43455246, len=4
27,745,004 >>> mbox cmd response data (887 bytes)
27,888,650 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,918,675 UART: [rt]cmd =0x43455252, len=4
27,930,100 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
7,938,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,020,885 >>> mbox cmd response: success
20,268,669 UART:
20,269,040 UART: Running Caliptra FMC ...
20,270,149 UART:
20,270,304 UART: [state] CFI Enabled
20,278,380 UART: [fht] FMC Alias Private Key: 7
22,035,369 UART: [art] Extend RT PCRs Done
22,036,595 UART: [art] Lock RT PCRs Done
22,038,579 UART: [art] Populate DV Done
22,044,011 UART: [fht] FMC Alias Private Key: 7
22,045,609 UART: [art] Derive CDI
22,046,361 UART: [art] Store in in slot 0x4
22,088,863 UART: [art] Derive Key Pair
22,089,907 UART: [art] Store priv key in slot 0x5
24,516,270 UART: [art] Derive Key Pair - Done
24,529,421 UART: [art] Signing Cert with AUTHO
24,530,751 UART: RITY.KEYID = 7
26,236,140 UART: [art] Erasing AUTHORITY.KEYID = 7
26,237,648 UART: [art] PUB.X = 737B8BE06937C29EAA75D73ACB4629EB9646A1899BC85427F5F4217144717AAFF5BA3AD8C7565B405E2491ABC880B499
26,244,893 UART: [art] PUB.Y = F3C8D9CF0A84B22D1844F85E7919F5741A537394C5C996465743EF02233F06F413A02E637F6D1F852290EE062CE3C9DA
26,252,115 UART: [art] SIG.R = 294DC224AA3DC3A969777E58EE0BF25649DC87A2D3AD839FAC081E23FDF1E06178946B2B76A1EF152C695B4B651EFB13
26,259,581 UART: [art] SIG.S = 5E9AF1A1706F370C5D19E271ABC114CCBDD5CCD560C2216C23D65FED108DB0B7707DED5F5567F5B280A397A259162909
27,239,643 UART: Caliptra RT
27,240,335 UART: [state] CFI Enabled
27,358,005 UART: [rt] RT listening for mailbox commands...
27,508,054 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,538,155 UART: [rt]cmd =0x4c444556, len=4
27,549,167 >>> mbox cmd response data (687 bytes)
27,694,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,725,017 UART: [rt]cmd =0x43455246, len=4
27,737,613 >>> mbox cmd response data (887 bytes)
27,881,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,910,988 UART: [rt]cmd =0x43455252, len=4
27,922,511 >>> mbox cmd response data (782 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
7,940,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,015,061 >>> mbox cmd response: success
20,267,751 UART:
20,268,124 UART: Running Caliptra FMC ...
20,269,315 UART:
20,269,484 UART: [state] CFI Enabled
20,277,324 UART: [fht] FMC Alias Private Key: 7
22,034,749 UART: [art] Extend RT PCRs Done
22,035,960 UART: [art] Lock RT PCRs Done
22,037,635 UART: [art] Populate DV Done
22,042,925 UART: [fht] FMC Alias Private Key: 7
22,044,517 UART: [art] Derive CDI
22,045,333 UART: [art] Store in in slot 0x4
22,087,667 UART: [art] Derive Key Pair
22,088,727 UART: [art] Store priv key in slot 0x5
24,515,164 UART: [art] Derive Key Pair - Done
24,528,030 UART: [art] Signing Cert with AUTHO
24,529,336 UART: RITY.KEYID = 7
26,234,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,389 UART: [art] PUB.X = AEAF242FF53D2452FCC09A1A361E8F9E4BFAC1CA38DFD695E7BD5B277E651DB5F76D1407DD686AAB8921F3576AEB2470
26,243,698 UART: [art] PUB.Y = B21D921A65EE84ACF1103A7153EF89F36FDFABFE9AD14A6DB9D9A6177F0F300CF37F8F64FC42B75AE6A1FB5896B5CD7A
26,250,993 UART: [art] SIG.R = F5BA9AB718AEAAD47F7C24A1183E1ACEF8F991D6A3AF32BF3E533962BFA8BB80E312A343551E0BCE4362FE9DB6613696
26,258,389 UART: [art] SIG.S = B69D6F0609A8905D71C7E0B8D9DA327DD2CBB797EF3EB247BA8FBCDD89615C57FF4CA85337E0229A84D38558100BB764
27,237,398 UART: Caliptra RT
27,238,081 UART: [state] CFI Enabled
27,355,856 UART: [rt] RT listening for mailbox commands...
27,505,761 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,535,965 UART: [rt]cmd =0x4c444556, len=4
27,547,042 >>> mbox cmd response data (687 bytes)
27,692,553 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,722,526 UART: [rt]cmd =0x43455246, len=4
27,735,313 >>> mbox cmd response data (887 bytes)
27,879,215 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,909,054 UART: [rt]cmd =0x43455252, len=4
27,920,509 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
7,939,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,015,752 >>> mbox cmd response: success
20,265,207 UART:
20,265,597 UART: Running Caliptra FMC ...
20,266,777 UART:
20,266,946 UART: [state] CFI Enabled
20,274,516 UART: [fht] FMC Alias Private Key: 7
22,031,755 UART: [art] Extend RT PCRs Done
22,032,973 UART: [art] Lock RT PCRs Done
22,034,823 UART: [art] Populate DV Done
22,040,184 UART: [fht] FMC Alias Private Key: 7
22,041,758 UART: [art] Derive CDI
22,042,579 UART: [art] Store in in slot 0x4
22,085,178 UART: [art] Derive Key Pair
22,086,178 UART: [art] Store priv key in slot 0x5
24,512,504 UART: [art] Derive Key Pair - Done
24,525,619 UART: [art] Signing Cert with AUTHO
24,526,916 UART: RITY.KEYID = 7
26,232,682 UART: [art] Erasing AUTHORITY.KEYID = 7
26,234,200 UART: [art] PUB.X = 7B8F625639FE7C7E466AEE0E8BA8043A1E351330028FA0191CD9574A65EEA3A10E471A611F788EC930D4C902DB7864E4
26,241,449 UART: [art] PUB.Y = 9333A51B069E00B71D49218D3152429C9680BAF9CD9488B9FDD8D5380A8C1994964629FD2462812D30A70E4137109480
26,248,691 UART: [art] SIG.R = E6B50E243BC9A4F24D14AC0B3BB6B5BB10F258BD13219F3E115FB300865B7EB25BD30C8FE5F437DD5D661142EE2A798B
26,256,103 UART: [art] SIG.S = 59E7BE4746B05075E6913B6DCEDEB25DBE698528E5A594F430799423188D04CC0CEDE3FB16F850CE1B3DEB2626903CC9
27,235,316 UART: Caliptra RT
27,236,448 UART: [state] CFI Enabled
27,352,843 UART: [rt] RT listening for mailbox commands...
27,505,591 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,536,100 UART: [rt]cmd =0x4c444556, len=4
27,547,120 >>> mbox cmd response data (687 bytes)
27,701,665 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,732,096 UART: [rt]cmd =0x43455246, len=4
27,744,779 >>> mbox cmd response data (887 bytes)
27,898,098 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,928,495 UART: [rt]cmd =0x43455252, len=4
27,939,696 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.49s
Truncated 7343978 bytes from beginning
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
7,998,073 UART: [idev] CSR uploaded
8,015,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,159,516 UART: [idev] --
8,160,149 UART: [ldev] ++
8,160,645 UART: [ldev] CDI.KEYID = 6
8,161,579 UART: [ldev] SUBJECT.KEYID = 5
8,162,761 UART: [ldev] AUTHORITY.KEYID = 7
8,163,944 UART: [ldev] FE.KEYID = 1
8,164,870 UART: [ldev] Erasing FE.KEYID = 1
10,565,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,304,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,320,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,336,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,352,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,374,239 UART: [ldev] --
12,379,073 UART: [fwproc] Wait for Commands...
12,381,062 UART: [fwproc] Recv command 0x46574c44
12,383,107 UART: [fwproc] Recv'd Img size: 114448 bytes
15,782,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,856,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,925,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,244,552 >>> mbox cmd response: success
16,247,998 UART: [afmc] ++
16,248,587 UART: [afmc] CDI.KEYID = 6
16,249,498 UART: [afmc] SUBJECT.KEYID = 7
16,250,661 UART: [afmc] AUTHORITY.KEYID = 5
18,792,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,518,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,520,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,536,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,552,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,568,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,591,342 UART: [afmc] --
20,595,914 UART: [cold-reset] --
20,600,156 UART: [state] Locking Datavault
20,604,588 UART: [state] Locking PCR0, PCR1 and PCR31
20,606,239 UART: [state] Locking ICCM
20,608,384 UART: [exit] Launching FMC @ 0x40000130
20,616,835 UART:
20,617,070 UART: Running Caliptra FMC ...
20,618,177 UART:
20,618,333 UART: [state] CFI Enabled
20,675,873 UART: [fht] FMC Alias Private Key: 7
22,439,781 UART: [art] Extend RT PCRs Done
22,441,009 UART: [art] Lock RT PCRs Done
22,442,450 UART: [art] Populate DV Done
22,447,755 UART: [fht] FMC Alias Private Key: 7
22,449,453 UART: [art] Derive CDI
22,450,188 UART: [art] Store in in slot 0x4
22,508,793 UART: [art] Derive Key Pair
22,509,831 UART: [art] Store priv key in slot 0x5
24,972,687 UART: [art] Derive Key Pair - Done
24,985,882 UART: [art] Signing Cert with AUTHO
24,987,241 UART: RITY.KEYID = 7
26,698,827 UART: [art] Erasing AUTHORITY.KEYID = 7
26,700,327 UART: [art] PUB.X = 3EEF4AE2C6AE455974A4B48395B3412E3E7B3E82256EA4DEF69C8F1C4176C09C45ACFC6F26C3FE286A7BAE657D826B87
26,707,608 UART: [art] PUB.Y = 1350EC70A4327C1C4FE90A8174E5D5EF2727CF40D332FBAA77AECB6B7155EE8ED7F34938F94C7BD7D9634B65345DBB0C
26,714,893 UART: [art] SIG.R = C0228E25BE5AB04E6588F3121B3F931045383049D9837F81B93C6E0009DF329D0FCE1FD8D78E10E01592B2145F0A35D8
26,722,222 UART: [art] SIG.S = 28E9CDE851E9345FB62D765A8ABB3EDC4C5858ABD005BDC4C9A5E4688D99A7CC7D38C73C176ABD4C594275AFD84FE706
27,701,842 UART: Caliptra RT
27,702,546 UART: [state] CFI Enabled
27,867,112 UART: [rt] RT listening for mailbox commands...
28,017,871 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,048,108 UART: [rt]cmd =0x4c444556, len=4
28,059,124 >>> mbox cmd response data (687 bytes)
28,205,480 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,235,149 UART: [rt]cmd =0x43455246, len=4
28,247,779 >>> mbox cmd response data (887 bytes)
28,391,758 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,421,720 UART: [rt]cmd =0x43455252, len=4
28,433,171 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,196 UART:
192,555 UART: Running Caliptra ROM ...
193,640 UART:
193,779 UART: [state] CFI Enabled
265,676 UART: [state] LifecycleState = Unprovisioned
267,553 UART: [state] DebugLocked = No
269,068 UART: [state] WD Timer not started. Device not locked for debugging
272,309 UART: [kat] SHA2-256
451,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,023 UART: [kat] ++
463,562 UART: [kat] sha1
474,714 UART: [kat] SHA2-256
477,730 UART: [kat] SHA2-384
484,149 UART: [kat] SHA2-512-ACC
487,087 UART: [kat] ECC-384
2,946,293 UART: [kat] HMAC-384Kdf
2,968,955 UART: [kat] LMS
3,498,424 UART: [kat] --
3,502,684 UART: [cold-reset] ++
3,504,069 UART: [fht] FHT @ 0x50003400
3,514,946 UART: [idev] ++
3,515,510 UART: [idev] CDI.KEYID = 6
3,516,524 UART: [idev] SUBJECT.KEYID = 7
3,517,638 UART: [idev] UDS.KEYID = 0
3,541,356 UART: [idev] Erasing UDS.KEYID = 0
6,024,981 UART: [idev] Sha1 KeyId Algorithm
6,046,053 UART: [idev] CSR upload begun
6,050,775 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,776,704 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,792,767 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,808,704 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,824,559 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,848,350 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,992,878 UART: [idev] CSR uploaded
8,010,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,154,786 UART: [idev] --
8,155,442 UART: [ldev] ++
8,155,943 UART: [ldev] CDI.KEYID = 6
8,156,850 UART: [ldev] SUBJECT.KEYID = 5
8,157,932 UART: [ldev] AUTHORITY.KEYID = 7
8,159,126 UART: [ldev] FE.KEYID = 1
8,159,972 UART: [ldev] Erasing FE.KEYID = 1
10,562,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,369,485 UART: [ldev] --
12,374,320 UART: [fwproc] Wait for Commands...
12,376,039 UART: [fwproc] Recv command 0x46574c44
12,378,256 UART: [fwproc] Recv'd Img size: 114448 bytes
15,779,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,846,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,915,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,234,359 >>> mbox cmd response: success
16,238,111 UART: [afmc] ++
16,238,703 UART: [afmc] CDI.KEYID = 6
16,239,585 UART: [afmc] SUBJECT.KEYID = 7
16,240,686 UART: [afmc] AUTHORITY.KEYID = 5
18,764,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,487,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,489,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,505,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,521,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,537,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,560,332 UART: [afmc] --
20,564,205 UART: [cold-reset] --
20,567,955 UART: [state] Locking Datavault
20,572,344 UART: [state] Locking PCR0, PCR1 and PCR31
20,573,988 UART: [state] Locking ICCM
20,575,759 UART: [exit] Launching FMC @ 0x40000130
20,584,152 UART:
20,584,387 UART: Running Caliptra FMC ...
20,585,487 UART:
20,585,640 UART: [state] CFI Enabled
20,646,490 UART: [fht] FMC Alias Private Key: 7
22,410,695 UART: [art] Extend RT PCRs Done
22,411,903 UART: [art] Lock RT PCRs Done
22,413,544 UART: [art] Populate DV Done
22,418,738 UART: [fht] FMC Alias Private Key: 7
22,420,378 UART: [art] Derive CDI
22,421,113 UART: [art] Store in in slot 0x4
22,479,927 UART: [art] Derive Key Pair
22,480,965 UART: [art] Store priv key in slot 0x5
24,943,424 UART: [art] Derive Key Pair - Done
24,956,422 UART: [art] Signing Cert with AUTHO
24,957,734 UART: RITY.KEYID = 7
26,669,501 UART: [art] Erasing AUTHORITY.KEYID = 7
26,670,993 UART: [art] PUB.X = DBF0D322EAF2A7B123AD1EF3E224A739DCC01F8DC5D5088717365017FB38BE8C167835992441E98D0DD8FFE75D084B7A
26,678,275 UART: [art] PUB.Y = 25070C8D1AEE0FAF1C8EB9746F4BC45C3AF82A493421953A5222907C8069F0B3E81E74F843C9ED174A74B18F4EAD2192
26,685,560 UART: [art] SIG.R = 4FEE44BC6CE969C8E4CCA643130175CF3FD170F872847BD089ED9AB1EDEFAFF758E41C4B73BEC179997040F640DF031D
26,692,953 UART: [art] SIG.S = C42240D254122653DBA19A8E8AC35FBF4B0771072CF790D326A5F1DC5008901415C85B213E94C0CC18133EEEF6E375CA
27,671,551 UART: Caliptra RT
27,672,265 UART: [state] CFI Enabled
27,836,787 UART: [rt] RT listening for mailbox commands...
27,986,949 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,016,879 UART: [rt]cmd =0x4c444556, len=4
28,027,902 >>> mbox cmd response data (687 bytes)
28,173,098 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,203,155 UART: [rt]cmd =0x43455246, len=4
28,215,820 >>> mbox cmd response data (887 bytes)
28,359,162 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,389,487 UART: [rt]cmd =0x43455252, len=4
28,400,682 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.33s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
7,666,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,816,854 >>> mbox cmd response: success
20,109,003 UART:
20,109,435 UART: Running Caliptra FMC ...
20,110,622 UART:
20,110,785 UART: [state] CFI Enabled
20,180,422 UART: [fht] FMC Alias Private Key: 7
21,945,046 UART: [art] Extend RT PCRs Done
21,946,267 UART: [art] Lock RT PCRs Done
21,947,674 UART: [art] Populate DV Done
21,953,080 UART: [fht] FMC Alias Private Key: 7
21,954,731 UART: [art] Derive CDI
21,955,548 UART: [art] Store in in slot 0x4
22,013,396 UART: [art] Derive Key Pair
22,014,445 UART: [art] Store priv key in slot 0x5
24,477,703 UART: [art] Derive Key Pair - Done
24,490,755 UART: [art] Signing Cert with AUTHO
24,492,072 UART: RITY.KEYID = 7
26,203,626 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,134 UART: [art] PUB.X = 874779C6443E6B1DA02AB95B26FFEA65B11D67E979FA3657CCD13C3F264B5D49131471D605681BA1E7857CF86EF998CB
26,212,374 UART: [art] PUB.Y = 37C3664E90416AA59AA3D639E352971B5768A10A3B99DFDD40C1559445C79F53D4923FEFC1B130EB16BAF34360251CBC
26,219,664 UART: [art] SIG.R = 0E5DB4787018D4E46A73763615E95BFAB58605A6B246F57F1BBC9C3B55B75119F475EA1AAFA39B81B6ED04FFF8E80974
26,227,068 UART: [art] SIG.S = DCE33C54D4EC66689BC70C25A22C969AC18CA059EBA5997CB985A0D9AFBB4AC3ACAAE60C68AD83ABF081D5214ABA823F
27,207,004 UART: Caliptra RT
27,207,695 UART: [state] CFI Enabled
27,371,188 UART: [rt] RT listening for mailbox commands...
27,520,935 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,550,804 UART: [rt]cmd =0x4c444556, len=4
27,561,851 >>> mbox cmd response data (687 bytes)
27,707,120 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,737,170 UART: [rt]cmd =0x43455246, len=4
27,749,969 >>> mbox cmd response data (887 bytes)
27,893,273 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,923,307 UART: [rt]cmd =0x43455252, len=4
27,934,715 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
7,665,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,793,869 >>> mbox cmd response: success
20,092,270 UART:
20,092,713 UART: Running Caliptra FMC ...
20,093,834 UART:
20,093,988 UART: [state] CFI Enabled
20,159,987 UART: [fht] FMC Alias Private Key: 7
21,923,530 UART: [art] Extend RT PCRs Done
21,924,746 UART: [art] Lock RT PCRs Done
21,926,243 UART: [art] Populate DV Done
21,931,704 UART: [fht] FMC Alias Private Key: 7
21,933,405 UART: [art] Derive CDI
21,934,158 UART: [art] Store in in slot 0x4
21,992,064 UART: [art] Derive Key Pair
21,993,066 UART: [art] Store priv key in slot 0x5
24,455,957 UART: [art] Derive Key Pair - Done
24,468,797 UART: [art] Signing Cert with AUTHO
24,470,102 UART: RITY.KEYID = 7
26,183,067 UART: [art] Erasing AUTHORITY.KEYID = 7
26,184,578 UART: [art] PUB.X = FDC1076D6F3E07C10CCEE131E55BCC15CEB8794B04A258681E255822136CEF80AD4E145114DD45D0451C859B5C0A533F
26,191,873 UART: [art] PUB.Y = 97919A637D836EA4B74C47608E0710EBFD0904581B61177D88334C50C8B608BA0F6E5DAF7A7CDAB4037ED75A767A17B0
26,199,104 UART: [art] SIG.R = 55240ABC88E7C175940A99C2097FBAC5588A0687531F11F404F172F67C226BCA46F85143DA7E6CC1756BBEA2E3EAFCA9
26,206,498 UART: [art] SIG.S = 29D6879A5D13553B3DF9BEB1572D73D4266E1C392501247DA30AE3364CE8FDAB39F39224B6EF31B349262670685DD97C
27,185,149 UART: Caliptra RT
27,185,841 UART: [state] CFI Enabled
27,350,952 UART: [rt] RT listening for mailbox commands...
27,500,796 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,531,013 UART: [rt]cmd =0x4c444556, len=4
27,542,071 >>> mbox cmd response data (687 bytes)
27,687,318 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,717,295 UART: [rt]cmd =0x43455246, len=4
27,729,906 >>> mbox cmd response data (887 bytes)
27,872,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,938 UART: [rt]cmd =0x43455252, len=4
27,914,243 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
7,686,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,832,223 >>> mbox cmd response: success
20,112,959 UART:
20,113,360 UART: Running Caliptra FMC ...
20,114,559 UART:
20,114,731 UART: [state] CFI Enabled
20,180,286 UART: [fht] FMC Alias Private Key: 7
21,944,604 UART: [art] Extend RT PCRs Done
21,945,824 UART: [art] Lock RT PCRs Done
21,947,350 UART: [art] Populate DV Done
21,952,540 UART: [fht] FMC Alias Private Key: 7
21,954,240 UART: [art] Derive CDI
21,954,979 UART: [art] Store in in slot 0x4
22,013,310 UART: [art] Derive Key Pair
22,014,313 UART: [art] Store priv key in slot 0x5
24,477,208 UART: [art] Derive Key Pair - Done
24,489,990 UART: [art] Signing Cert with AUTHO
24,491,297 UART: RITY.KEYID = 7
26,203,050 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,566 UART: [art] PUB.X = B5596C3FBD8623979EBCE6F750F644B5404938139343D2B3F24001FDEA0112C7421CF5734C34ED93005E6EA75241C768
26,211,762 UART: [art] PUB.Y = 09FB3C2AFF1D7B2899BC7A5F2872B6CB96B3BC6E7070C7CCEFBCDCECEB027549E6F6DB221FE95427B6751EEA2DF412DC
26,219,058 UART: [art] SIG.R = 11DDDFB2A3C3D61D783A231587C147DB1123F1533BA87661073361E1320250073F05A53846DC710452BFCD5E35CB24F7
26,226,453 UART: [art] SIG.S = 7DC78E05D53664C899CDD31B166F151412507D15FAE5CF292D322A7999933715AE92CC4CD3F75385161C35FB375263C9
27,205,363 UART: Caliptra RT
27,206,074 UART: [state] CFI Enabled
27,370,120 UART: [rt] RT listening for mailbox commands...
27,520,175 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,550,037 UART: [rt]cmd =0x4c444556, len=4
27,561,247 >>> mbox cmd response data (687 bytes)
27,706,778 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,736,493 UART: [rt]cmd =0x43455246, len=4
27,749,056 >>> mbox cmd response data (887 bytes)
27,891,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,921,538 UART: [rt]cmd =0x43455252, len=4
27,932,969 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
7,687,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,842,751 >>> mbox cmd response: success
20,139,779 UART:
20,140,158 UART: Running Caliptra FMC ...
20,141,264 UART:
20,141,416 UART: [state] CFI Enabled
20,204,604 UART: [fht] FMC Alias Private Key: 7
21,968,317 UART: [art] Extend RT PCRs Done
21,969,545 UART: [art] Lock RT PCRs Done
21,971,468 UART: [art] Populate DV Done
21,976,603 UART: [fht] FMC Alias Private Key: 7
21,978,257 UART: [art] Derive CDI
21,978,992 UART: [art] Store in in slot 0x4
22,036,624 UART: [art] Derive Key Pair
22,037,668 UART: [art] Store priv key in slot 0x5
24,500,083 UART: [art] Derive Key Pair - Done
24,512,802 UART: [art] Signing Cert with AUTHO
24,514,132 UART: RITY.KEYID = 7
26,225,383 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,897 UART: [art] PUB.X = 8E4EB2386BF96FB7DCCC1CF2790DAC9D15C0BAE40C95B8DC78B66555C8AB9F19D5F41671B9D80B02CD3F81D1EAFEAE90
26,234,201 UART: [art] PUB.Y = CFBD316C5BCF3C6A5B61112E70AC28FCCAEB54F4833541A0E9097E7E9C4D1AA153128EB7A2FAFE52ABE1324AD730EAB5
26,241,535 UART: [art] SIG.R = 0115A590552078AD9035F2F9C7D5D722486AD8850EC770F0DE8AC2D1EACDA338524BFCE237FABDA8C740B224279F98D1
26,248,926 UART: [art] SIG.S = C941F9341C3628D935EF900472BA0E6D3222A0F7A0D23CF9E850E2A2F4F6C80B55D95179990DBEC5142810A8F96B9600
27,227,720 UART: Caliptra RT
27,228,425 UART: [state] CFI Enabled
27,393,972 UART: [rt] RT listening for mailbox commands...
27,543,138 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,573,106 UART: [rt]cmd =0x4c444556, len=4
27,584,204 >>> mbox cmd response data (687 bytes)
27,729,693 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,759,611 UART: [rt]cmd =0x43455246, len=4
27,772,108 >>> mbox cmd response data (887 bytes)
27,914,873 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,944,794 UART: [rt]cmd =0x43455252, len=4
27,956,245 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
7,666,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,820,799 >>> mbox cmd response: success
20,112,282 UART:
20,112,691 UART: Running Caliptra FMC ...
20,113,841 UART:
20,114,010 UART: [state] CFI Enabled
20,177,886 UART: [fht] FMC Alias Private Key: 7
21,942,461 UART: [art] Extend RT PCRs Done
21,943,684 UART: [art] Lock RT PCRs Done
21,945,103 UART: [art] Populate DV Done
21,950,564 UART: [fht] FMC Alias Private Key: 7
21,952,006 UART: [art] Derive CDI
21,952,775 UART: [art] Store in in slot 0x4
22,010,596 UART: [art] Derive Key Pair
22,011,639 UART: [art] Store priv key in slot 0x5
24,474,317 UART: [art] Derive Key Pair - Done
24,487,254 UART: [art] Signing Cert with AUTHO
24,488,593 UART: RITY.KEYID = 7
26,199,958 UART: [art] Erasing AUTHORITY.KEYID = 7
26,201,470 UART: [art] PUB.X = 8680181ECF22C105CDED1A9F0721714912D1A1362124DE29F7E7A61BBCF3F4271B3C8DF3A74C7B05D2DDE983A2AE1FD8
26,208,776 UART: [art] PUB.Y = 08E7C9EFFACD947D772449920C63C2D614C439B95553F99DB55DA93C64BEFDF56E280F1EAE1C93ECF99BD542AC5FA75F
26,216,054 UART: [art] SIG.R = 56486DA1F385DA1C7823958ABD3838C035B30C8D6C881D9C2063539ED2CBBB41C8ADA71D4D977A9FF163972EC27D1CA0
26,223,454 UART: [art] SIG.S = C7B6BAF34F861E1CD5B2ECB01940FB300FE8029C44E91532FA39A1723D64447ED8077A75B7BD7B131B4307DB3927703A
27,202,966 UART: Caliptra RT
27,203,677 UART: [state] CFI Enabled
27,368,397 UART: [rt] RT listening for mailbox commands...
27,518,127 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,547,917 UART: [rt]cmd =0x4c444556, len=4
27,559,107 >>> mbox cmd response data (687 bytes)
27,704,202 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,734,125 UART: [rt]cmd =0x43455246, len=4
27,746,946 >>> mbox cmd response data (887 bytes)
27,890,163 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,919,955 UART: [rt]cmd =0x43455252, len=4
27,931,249 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.96s
Truncated 7343978 bytes from beginning
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
8,268,067 UART: [idev] CSR uploaded
8,285,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,429,297 UART: [idev] --
8,429,928 UART: [ldev] ++
8,430,418 UART: [ldev] CDI.KEYID = 6
8,431,295 UART: [ldev] SUBJECT.KEYID = 5
8,432,381 UART: [ldev] AUTHORITY.KEYID = 7
8,433,562 UART: [ldev] FE.KEYID = 1
8,434,401 UART: [ldev] Erasing FE.KEYID = 1
10,778,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,495,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,511,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,526,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,542,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,563,267 UART: [ldev] --
12,568,148 UART: [fwproc] Wait for Commands...
12,570,834 UART: [fwproc] Recv command 0x46574c44
12,572,929 UART: [fwproc] Recv'd Img size: 114448 bytes
15,976,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,116,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,435,458 >>> mbox cmd response: success
16,439,219 UART: [afmc] ++
16,439,809 UART: [afmc] CDI.KEYID = 6
16,440,690 UART: [afmc] SUBJECT.KEYID = 7
16,441,899 UART: [afmc] AUTHORITY.KEYID = 5
18,944,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,664,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,666,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,682,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,698,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,714,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,736,732 UART: [afmc] --
20,741,073 UART: [cold-reset] --
20,744,549 UART: [state] Locking Datavault
20,748,920 UART: [state] Locking PCR0, PCR1 and PCR31
20,750,613 UART: [state] Locking ICCM
20,751,950 UART: [exit] Launching FMC @ 0x40000130
20,760,345 UART:
20,760,571 UART: Running Caliptra FMC ...
20,761,665 UART:
20,761,817 UART: [state] CFI Enabled
20,770,134 UART: [fht] FMC Alias Private Key: 7
22,526,939 UART: [art] Extend RT PCRs Done
22,528,182 UART: [art] Lock RT PCRs Done
22,530,157 UART: [art] Populate DV Done
22,535,726 UART: [fht] FMC Alias Private Key: 7
22,537,360 UART: [art] Derive CDI
22,538,099 UART: [art] Store in in slot 0x4
22,580,689 UART: [art] Derive Key Pair
22,581,687 UART: [art] Store priv key in slot 0x5
25,008,516 UART: [art] Derive Key Pair - Done
25,021,569 UART: [art] Signing Cert with AUTHO
25,022,898 UART: RITY.KEYID = 7
26,728,283 UART: [art] Erasing AUTHORITY.KEYID = 7
26,729,786 UART: [art] PUB.X = C340FFC7652C4B6BD53C80864933F5A34CE143E419927ADA3894C119FEDC8B74DF3B57B3E84010CC622C1CDBA3FF1E9A
26,737,067 UART: [art] PUB.Y = EFEE8BD80E04B00025191CBCF9CC709066120CA492A82B4500DC75D9AA9E3FF972207942760FF0E146D2510AFBC2E7BF
26,744,348 UART: [art] SIG.R = 12A8AE1B830F77C500B1C5DCCB5D32FC50A5877BCF65230D5F0FF7D1B68310EEE5FC895C0C2B9DE7273F4180AA943FEA
26,751,731 UART: [art] SIG.S = 05B39C8729024BCA341AFC4A77725B0C856F99172F090063F0E3E7424E4DE83B29EBF5198F664F86471E5CC31C5472CA
27,730,418 UART: Caliptra RT
27,731,153 UART: [state] CFI Enabled
27,848,989 UART: [rt] RT listening for mailbox commands...
27,999,989 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,030,088 UART: [rt]cmd =0x4c444556, len=4
28,041,138 >>> mbox cmd response data (687 bytes)
28,189,248 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,219,150 UART: [rt]cmd =0x43455246, len=4
28,231,960 >>> mbox cmd response data (887 bytes)
28,375,874 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,405,796 UART: [rt]cmd =0x43455252, len=4
28,417,265 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
192,743 UART:
193,120 UART: Running Caliptra ROM ...
194,306 UART:
603,631 UART: [state] CFI Enabled
617,239 UART: [state] LifecycleState = Unprovisioned
619,094 UART: [state] DebugLocked = No
620,319 UART: [state] WD Timer not started. Device not locked for debugging
624,526 UART: [kat] SHA2-256
803,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,236 UART: [kat] ++
815,770 UART: [kat] sha1
827,514 UART: [kat] SHA2-256
830,514 UART: [kat] SHA2-384
835,352 UART: [kat] SHA2-512-ACC
838,339 UART: [kat] ECC-384
3,279,052 UART: [kat] HMAC-384Kdf
3,292,150 UART: [kat] LMS
3,821,605 UART: [kat] --
3,825,110 UART: [cold-reset] ++
3,827,055 UART: [fht] FHT @ 0x50003400
3,838,304 UART: [idev] ++
3,838,872 UART: [idev] CDI.KEYID = 6
3,839,836 UART: [idev] SUBJECT.KEYID = 7
3,840,991 UART: [idev] UDS.KEYID = 0
3,856,724 UART: [idev] Erasing UDS.KEYID = 0
6,313,061 UART: [idev] Sha1 KeyId Algorithm
6,333,698 UART: [idev] CSR upload begun
6,338,413 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,054,273 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,070,318 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,086,291 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,102,089 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,125,960 UART: [idev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
8,270,444 UART: [idev] CSR uploaded
8,287,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,432,029 UART: [idev] --
8,432,678 UART: [ldev] ++
8,433,172 UART: [ldev] CDI.KEYID = 6
8,434,050 UART: [ldev] SUBJECT.KEYID = 5
8,435,132 UART: [ldev] AUTHORITY.KEYID = 7
8,436,315 UART: [ldev] FE.KEYID = 1
8,437,186 UART: [ldev] Erasing FE.KEYID = 1
10,783,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,502,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,518,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,534,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,549,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,571,929 UART: [ldev] --
12,576,274 UART: [fwproc] Wait for Commands...
12,579,350 UART: [fwproc] Recv command 0x46574c44
12,581,512 UART: [fwproc] Recv'd Img size: 114448 bytes
15,986,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,443,533 >>> mbox cmd response: success
16,447,101 UART: [afmc] ++
16,447,684 UART: [afmc] CDI.KEYID = 6
16,448,573 UART: [afmc] SUBJECT.KEYID = 7
16,449,782 UART: [afmc] AUTHORITY.KEYID = 5
18,949,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,669,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,671,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,687,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,703,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,719,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,742,108 UART: [afmc] --
20,745,963 UART: [cold-reset] --
20,748,277 UART: [state] Locking Datavault
20,753,147 UART: [state] Locking PCR0, PCR1 and PCR31
20,754,842 UART: [state] Locking ICCM
20,756,089 UART: [exit] Launching FMC @ 0x40000130
20,764,487 UART:
20,764,719 UART: Running Caliptra FMC ...
20,765,817 UART:
20,765,971 UART: [state] CFI Enabled
20,773,960 UART: [fht] FMC Alias Private Key: 7
22,530,743 UART: [art] Extend RT PCRs Done
22,531,968 UART: [art] Lock RT PCRs Done
22,534,021 UART: [art] Populate DV Done
22,539,273 UART: [fht] FMC Alias Private Key: 7
22,540,746 UART: [art] Derive CDI
22,541,484 UART: [art] Store in in slot 0x4
22,583,963 UART: [art] Derive Key Pair
22,584,979 UART: [art] Store priv key in slot 0x5
25,012,054 UART: [art] Derive Key Pair - Done
25,024,946 UART: [art] Signing Cert with AUTHO
25,026,299 UART: RITY.KEYID = 7
26,731,560 UART: [art] Erasing AUTHORITY.KEYID = 7
26,733,053 UART: [art] PUB.X = CBA6717E6B0D348C78EE4AAD5ED08982B85A5A8D38B51D38BB074AAFDB5F90B5EED74E5BD7BB9F10781A93E161886FCE
26,740,391 UART: [art] PUB.Y = 7F321A6FDB239C96DCD5CBE6097BD1D24CF4AA70228C74A34B6D8E151C94B9C42255D4F5D4C515AE248867E53AE9B7D0
26,747,625 UART: [art] SIG.R = 3AE1D6C39AF514632614C5074CCBA3EC174A2B12FB06926390EEE07EF657FE9CF6FC74FFC7BC5FF43D56A01353E1C3D9
26,755,073 UART: [art] SIG.S = 5A73000C05FFC0BBB0A1305072D82F327C665CE9395FEB2C7AFBB4611070A4D398A7858417E19F708E79293EDD294751
27,733,684 UART: Caliptra RT
27,734,396 UART: [state] CFI Enabled
27,852,976 UART: [rt] RT listening for mailbox commands...
28,004,219 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,034,354 UART: [rt]cmd =0x4c444556, len=4
28,045,534 >>> mbox cmd response data (687 bytes)
28,191,293 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,221,550 UART: [rt]cmd =0x43455246, len=4
28,234,138 >>> mbox cmd response data (887 bytes)
28,377,254 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,407,192 UART: [rt]cmd =0x43455252, len=4
28,418,694 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.39s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
7,941,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,026,755 >>> mbox cmd response: success
20,275,511 UART:
20,276,276 UART: Running Caliptra FMC ...
20,277,436 UART:
20,277,588 UART: [state] CFI Enabled
20,285,122 UART: [fht] FMC Alias Private Key: 7
22,042,386 UART: [art] Extend RT PCRs Done
22,043,631 UART: [art] Lock RT PCRs Done
22,045,076 UART: [art] Populate DV Done
22,050,274 UART: [fht] FMC Alias Private Key: 7
22,051,922 UART: [art] Derive CDI
22,052,739 UART: [art] Store in in slot 0x4
22,095,609 UART: [art] Derive Key Pair
22,096,614 UART: [art] Store priv key in slot 0x5
24,522,973 UART: [art] Derive Key Pair - Done
24,535,650 UART: [art] Signing Cert with AUTHO
24,536,953 UART: RITY.KEYID = 7
26,242,551 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,062 UART: [art] PUB.X = EB4BE7EB756A00D39DFA979FB32727C02AD0B6B3898DCC4795967263465965FFC0F8FAB24A7E91273DD18B6FAB0506FE
26,251,311 UART: [art] PUB.Y = 6609E6FB51811B824735D18DBF5323D462FF7405FDC881A9A228A6BEFADA90D44B0221941B9DBAF8F7DE9E503D3DE75A
26,258,579 UART: [art] SIG.R = 692C010C2AED7C189B44CBAAEABBE3B544FAECE6BD5432D950722C4E9AB243EC6D7C1F0C4B8C9CDA37E4BFA731879BEE
26,266,018 UART: [art] SIG.S = A405B7855C39C65E3E7BE8ECD7C52AD6A4AD76386A75DF892293B340CA39CA0DD5AB1D5C964442D8AAB934871BEC8555
27,245,438 UART: Caliptra RT
27,246,131 UART: [state] CFI Enabled
27,363,939 UART: [rt] RT listening for mailbox commands...
27,514,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,544,442 UART: [rt]cmd =0x4c444556, len=4
27,555,551 >>> mbox cmd response data (687 bytes)
27,700,799 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,730,949 UART: [rt]cmd =0x43455246, len=4
27,743,591 >>> mbox cmd response data (887 bytes)
27,887,474 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,917,411 UART: [rt]cmd =0x43455252, len=4
27,928,756 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
7,935,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,004,514 >>> mbox cmd response: success
20,250,999 UART:
20,251,388 UART: Running Caliptra FMC ...
20,252,538 UART:
20,252,699 UART: [state] CFI Enabled
20,259,994 UART: [fht] FMC Alias Private Key: 7
22,016,824 UART: [art] Extend RT PCRs Done
22,018,036 UART: [art] Lock RT PCRs Done
22,019,879 UART: [art] Populate DV Done
22,025,265 UART: [fht] FMC Alias Private Key: 7
22,026,762 UART: [art] Derive CDI
22,027,530 UART: [art] Store in in slot 0x4
22,070,239 UART: [art] Derive Key Pair
22,071,285 UART: [art] Store priv key in slot 0x5
24,498,057 UART: [art] Derive Key Pair - Done
24,511,013 UART: [art] Signing Cert with AUTHO
24,512,313 UART: RITY.KEYID = 7
26,217,847 UART: [art] Erasing AUTHORITY.KEYID = 7
26,219,348 UART: [art] PUB.X = 033AC9498DE639F2055C65588B6274FF0869B3A90751CEFCC9AE25F778F287F75E885D8FD9DD4C07F6D51CA367BBA34E
26,226,595 UART: [art] PUB.Y = CA81C4F1DE6B7DEB9871663CDB52B9C29B3A61E744F0BA839820ABFD4549CADC5228698EE09DA0F3123A195F1F665DB3
26,233,879 UART: [art] SIG.R = 55E965CF7791C185C34F859476E8F0E264DFEEB66E12A94CBBE29D30BEBCCDDBB0A4790123AADC575326F6A438AEFAC9
26,241,269 UART: [art] SIG.S = D2E9D06789ABC49D4CF3856C96C740AB643B42F215486853A0C1A4590B59747DB7A7ECF53BD1B1377F308127B1CDBF56
27,220,237 UART: Caliptra RT
27,220,943 UART: [state] CFI Enabled
27,337,865 UART: [rt] RT listening for mailbox commands...
27,487,872 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,518,170 UART: [rt]cmd =0x4c444556, len=4
27,529,421 >>> mbox cmd response data (687 bytes)
27,675,281 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,705,110 UART: [rt]cmd =0x43455246, len=4
27,717,895 >>> mbox cmd response data (887 bytes)
27,861,953 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,891,709 UART: [rt]cmd =0x43455252, len=4
27,902,998 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
7,939,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,023,757 >>> mbox cmd response: success
20,274,368 UART:
20,274,761 UART: Running Caliptra FMC ...
20,275,899 UART:
20,276,085 UART: [state] CFI Enabled
20,283,749 UART: [fht] FMC Alias Private Key: 7
22,039,863 UART: [art] Extend RT PCRs Done
22,041,092 UART: [art] Lock RT PCRs Done
22,042,560 UART: [art] Populate DV Done
22,047,779 UART: [fht] FMC Alias Private Key: 7
22,049,480 UART: [art] Derive CDI
22,050,294 UART: [art] Store in in slot 0x4
22,092,799 UART: [art] Derive Key Pair
22,093,842 UART: [art] Store priv key in slot 0x5
24,520,556 UART: [art] Derive Key Pair - Done
24,533,336 UART: [art] Signing Cert with AUTHO
24,534,642 UART: RITY.KEYID = 7
26,240,367 UART: [art] Erasing AUTHORITY.KEYID = 7
26,241,872 UART: [art] PUB.X = B9B3AAA29519AB5C8DF6E34D35BE0BB72D15A0D743CFE2EC956A6FA478A56EB7284066685317F339A7AAD1742C2F8409
26,249,172 UART: [art] PUB.Y = B1C2146E013CC8A65FAAEFE2EB90BE4E507BC2A895DF2DB6D6E9D033791938777F97F4BF9E17304E96DE5B08F83E408C
26,256,453 UART: [art] SIG.R = 1FD648831E027DFE77A41CEC29C666A074F749BE9D4961558F524AA5CE30AEC0E286622D92D05AF49328766135C470D7
26,263,854 UART: [art] SIG.S = C568A6A6045CBAABC83399052A77BA0B2B45955489728ADF543DA2ECBE54966AEDA2AA126D88559086F7B0FC285B374C
27,242,336 UART: Caliptra RT
27,243,026 UART: [state] CFI Enabled
27,360,343 UART: [rt] RT listening for mailbox commands...
27,510,614 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,540,581 UART: [rt]cmd =0x4c444556, len=4
27,551,895 >>> mbox cmd response data (687 bytes)
27,697,977 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,727,803 UART: [rt]cmd =0x43455246, len=4
27,740,527 >>> mbox cmd response data (887 bytes)
27,884,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,914,265 UART: [rt]cmd =0x43455252, len=4
27,925,726 >>> mbox cmd response data (783 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
7,939,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,024,519 >>> mbox cmd response: success
20,270,208 UART:
20,270,596 UART: Running Caliptra FMC ...
20,271,705 UART:
20,271,865 UART: [state] CFI Enabled
20,279,732 UART: [fht] FMC Alias Private Key: 7
22,036,653 UART: [art] Extend RT PCRs Done
22,037,866 UART: [art] Lock RT PCRs Done
22,039,600 UART: [art] Populate DV Done
22,045,080 UART: [fht] FMC Alias Private Key: 7
22,046,632 UART: [art] Derive CDI
22,047,447 UART: [art] Store in in slot 0x4
22,090,258 UART: [art] Derive Key Pair
22,091,251 UART: [art] Store priv key in slot 0x5
24,518,025 UART: [art] Derive Key Pair - Done
24,530,997 UART: [art] Signing Cert with AUTHO
24,532,307 UART: RITY.KEYID = 7
26,237,724 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,206 UART: [art] PUB.X = CD43ED72C6ACB8C61AFE460CC9C21954482C41B91AA87495257F0D39BDDDF81BE68DD381221284BD8F5FBB3A5BD243DF
26,246,542 UART: [art] PUB.Y = E18EA62E01AE5A79E91D9B3173FBD56EB0F5084B4878225B62DEE04A38036D7948036289C729D50ADD7FE3956490E990
26,253,766 UART: [art] SIG.R = 764D9BA8BEF7268E225BE3D0C1AFD21516DF91173189E16E50E6FBB65971D1E1BACAEDB44D3EE07CFDA99209D85D4E0E
26,261,159 UART: [art] SIG.S = 4B8F75C90BA53F2E5271F7C3F77F9C667A16346947A0ADA04D3E1811A92096133A90516CF1B78108BFD4A3C35BB18A2F
27,240,388 UART: Caliptra RT
27,241,105 UART: [state] CFI Enabled
27,358,764 UART: [rt] RT listening for mailbox commands...
27,508,526 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,538,503 UART: [rt]cmd =0x4c444556, len=4
27,549,820 >>> mbox cmd response data (687 bytes)
27,695,130 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,725,025 UART: [rt]cmd =0x43455246, len=4
27,737,675 >>> mbox cmd response data (887 bytes)
27,881,058 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,910,778 UART: [rt]cmd =0x43455252, len=4
27,922,169 >>> mbox cmd response data (782 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
7,942,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,675 >>> mbox cmd response: success
20,269,562 UART:
20,269,934 UART: Running Caliptra FMC ...
20,271,035 UART:
20,271,190 UART: [state] CFI Enabled
20,278,977 UART: [fht] FMC Alias Private Key: 7
22,035,097 UART: [art] Extend RT PCRs Done
22,036,335 UART: [art] Lock RT PCRs Done
22,037,936 UART: [art] Populate DV Done
22,043,004 UART: [fht] FMC Alias Private Key: 7
22,044,734 UART: [art] Derive CDI
22,045,676 UART: [art] Store in in slot 0x4
22,087,865 UART: [art] Derive Key Pair
22,088,871 UART: [art] Store priv key in slot 0x5
24,515,604 UART: [art] Derive Key Pair - Done
24,528,602 UART: [art] Signing Cert with AUTHO
24,529,937 UART: RITY.KEYID = 7
26,235,219 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,721 UART: [art] PUB.X = 910128BF3CA200677BA678BD69C0F8FF8D78B9756023178D1FFFCC0D10085453C82759568C93892CA3A89DD652BFED7F
26,243,965 UART: [art] PUB.Y = DAD63C9E950C1089FB909D6581E74E732077360870C6C15043798B6A9C82F1DEB60EF4CA41D5C0EE9228394B3D280E56
26,251,271 UART: [art] SIG.R = 7DF46528A724B4DA27DA9195C6D8E354B2AA3B817E636B39B3A15DEAFCD5A93DB461E4A18F3505C31252597AE3E7FDDD
26,258,665 UART: [art] SIG.S = 9D44D0596A7D6D836014FB54766D02BDD2513FB6275D1E4FFCA2DA52BEA58D168FFDDE976130A69ED1D0B6A7D68EAF92
27,237,260 UART: Caliptra RT
27,237,960 UART: [state] CFI Enabled
27,355,618 UART: [rt] RT listening for mailbox commands...
27,505,572 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,535,628 UART: [rt]cmd =0x4c444556, len=4
27,546,643 >>> mbox cmd response data (687 bytes)
27,691,867 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,721,910 UART: [rt]cmd =0x43455246, len=4
27,734,608 >>> mbox cmd response data (887 bytes)
27,878,151 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,907,837 UART: [rt]cmd =0x43455252, len=4
27,919,281 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.48s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,430 UART: [idev] CSR uploaded
1,299,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,644 UART: [idev] --
1,300,587 UART: [ldev] ++
1,300,755 UART: [ldev] CDI.KEYID = 6
1,301,119 UART: [ldev] SUBJECT.KEYID = 5
1,301,546 UART: [ldev] AUTHORITY.KEYID = 7
1,302,009 UART: [ldev] FE.KEYID = 1
1,307,153 UART: [ldev] Erasing FE.KEYID = 1
1,333,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,429 UART: [ldev] --
1,372,745 UART: [fwproc] Wait for Commands...
1,373,442 UART: [fwproc] Recv command 0x46574c44
1,374,175 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,195 >>> mbox cmd response: success
2,867,366 UART: [afmc] ++
2,867,534 UART: [afmc] CDI.KEYID = 6
2,867,897 UART: [afmc] SUBJECT.KEYID = 7
2,868,323 UART: [afmc] AUTHORITY.KEYID = 5
2,903,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,602 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,571 UART: [afmc] --
2,947,635 UART: [cold-reset] --
2,948,461 UART: [state] Locking Datavault
2,949,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,954 UART: [state] Locking ICCM
2,950,486 UART: [exit] Launching FMC @ 0x40000130
2,955,815 UART:
2,955,831 UART: Running Caliptra FMC ...
2,956,239 UART:
2,956,293 UART: [state] CFI Enabled
2,966,554 UART: [fht] FMC Alias Private Key: 7
3,074,513 UART: [art] Extend RT PCRs Done
3,074,941 UART: [art] Lock RT PCRs Done
3,076,329 UART: [art] Populate DV Done
3,084,634 UART: [fht] FMC Alias Private Key: 7
3,085,696 UART: [art] Derive CDI
3,085,976 UART: [art] Store in in slot 0x4
3,171,477 UART: [art] Derive Key Pair
3,171,837 UART: [art] Store priv key in slot 0x5
3,184,573 UART: [art] Derive Key Pair - Done
3,199,424 UART: [art] Signing Cert with AUTHO
3,199,904 UART: RITY.KEYID = 7
3,214,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,615 UART: [art] PUB.X = BF931ABE9990B1EFE48E3B283B3FA9B63EE97A4786A39654864359232628F0BC230D51A370243F7C5FC30E7E1683A86E
3,222,381 UART: [art] PUB.Y = 41A12AB968212DF9D0C77904A85DCD2C0914B0A7CA682BF58BBCFF474DC7652C3F2DF813D080D409D802A10A59674148
3,229,322 UART: [art] SIG.R = 9E9DF9E27C03B8E7EE0129CA0F37F2E7606677457D751DE99645A6EA7447BE3AF4919D441DDA2DFBAF16721944FE4FBB
3,236,097 UART: [art] SIG.S = 62C02051794F7731614D345E97D89CFC1DF3356DB12B97BDA33DC5B84D2FDC598B7B8E213ECD32B33DCC07026C988EB4
3,260,052 UART: Caliptra RT
3,260,305 UART: [state] CFI Enabled
3,368,048 UART: [rt] RT listening for mailbox commands...
3,368,718 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,600 UART: [rt]cmd =0x4c444556, len=4
3,409,106 >>> mbox cmd response data (687 bytes)
3,409,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,606 UART: [rt]cmd =0x43455246, len=4
3,450,766 >>> mbox cmd response data (887 bytes)
3,450,767 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,958 UART: [rt]cmd =0x43455252, len=4
3,490,691 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] CSR upload begun
1,208,948 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,787 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,495 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,380 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,086 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,515 UART: [idev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
1,297,012 UART: [idev] CSR uploaded
1,300,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,226 UART: [idev] --
1,301,229 UART: [ldev] ++
1,301,397 UART: [ldev] CDI.KEYID = 6
1,301,761 UART: [ldev] SUBJECT.KEYID = 5
1,302,188 UART: [ldev] AUTHORITY.KEYID = 7
1,302,651 UART: [ldev] FE.KEYID = 1
1,307,885 UART: [ldev] Erasing FE.KEYID = 1
1,334,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,405 UART: [ldev] --
1,373,699 UART: [fwproc] Wait for Commands...
1,374,356 UART: [fwproc] Recv command 0x46574c44
1,375,089 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,297 >>> mbox cmd response: success
2,867,360 UART: [afmc] ++
2,867,528 UART: [afmc] CDI.KEYID = 6
2,867,891 UART: [afmc] SUBJECT.KEYID = 7
2,868,317 UART: [afmc] AUTHORITY.KEYID = 5
2,903,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,749 UART: [afmc] --
2,947,683 UART: [cold-reset] --
2,948,521 UART: [state] Locking Datavault
2,949,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,122 UART: [state] Locking ICCM
2,950,674 UART: [exit] Launching FMC @ 0x40000130
2,956,003 UART:
2,956,019 UART: Running Caliptra FMC ...
2,956,427 UART:
2,956,481 UART: [state] CFI Enabled
2,967,098 UART: [fht] FMC Alias Private Key: 7
3,074,597 UART: [art] Extend RT PCRs Done
3,075,025 UART: [art] Lock RT PCRs Done
3,076,301 UART: [art] Populate DV Done
3,084,202 UART: [fht] FMC Alias Private Key: 7
3,085,240 UART: [art] Derive CDI
3,085,520 UART: [art] Store in in slot 0x4
3,171,249 UART: [art] Derive Key Pair
3,171,609 UART: [art] Store priv key in slot 0x5
3,184,641 UART: [art] Derive Key Pair - Done
3,199,602 UART: [art] Signing Cert with AUTHO
3,200,082 UART: RITY.KEYID = 7
3,215,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,063 UART: [art] PUB.X = B8BFDA260FC388E9069C40477FB36AAF3EF78811540FC23019DFD61803582349920A551136D8F8C8CBE77C9845073479
3,222,811 UART: [art] PUB.Y = BFEFD590DA8E9591ACD212F05BF7F829BDCFAE79EB55C545E0253BD8B37A8F51C84F9AD7F297C08E4339713DE719DB27
3,229,781 UART: [art] SIG.R = 996E2249C78DE577441BF6B7C71B2311215B0048B8352390E8D2D2427D8AA60B1488B2260BCB903C699F5170CCCD8DA2
3,236,521 UART: [art] SIG.S = 6F6933C8A638D9948645B544EB9B334685689BEEAAB8CE5E4B8A484FD1F37506434C2B7350234F68234D63335A91EC40
3,260,405 UART: Caliptra RT
3,260,658 UART: [state] CFI Enabled
3,368,575 UART: [rt] RT listening for mailbox commands...
3,369,245 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,233 UART: [rt]cmd =0x4c444556, len=4
3,409,859 >>> mbox cmd response data (687 bytes)
3,409,860 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,267 UART: [rt]cmd =0x43455246, len=4
3,451,369 >>> mbox cmd response data (887 bytes)
3,451,370 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,917 UART: [rt]cmd =0x43455252, len=4
3,491,778 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 926.38s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,800 UART: [art] Lock RT PCRs Done
2,826,510 UART: [art] Populate DV Done
2,834,999 UART: [fht] FMC Alias Private Key: 7
2,836,131 UART: [art] Derive CDI
2,836,411 UART: [art] Store in in slot 0x4
2,922,144 UART: [art] Derive Key Pair
2,922,504 UART: [art] Store priv key in slot 0x5
2,935,772 UART: [art] Derive Key Pair - Done
2,950,534 UART: [art] Signing Cert with AUTHO
2,951,014 UART: RITY.KEYID = 7
2,966,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,359 UART: [art] PUB.X = 2BC6D0C8922D180DAA4F0EE423D9DEE626E8F3BCD7532380170290694FDE384BBFF9547A9EB29404436B6C816D6BB673
2,974,125 UART: [art] PUB.Y = 1970A601D161B19478754CC596565251D05BD064856022A5EA696911A696A01A46EAE99BE6C88B26215CF0E27CD6B4BE
2,981,068 UART: [art] SIG.R = B67B829B1553B8E2FA877A1411F0CE6AD92CE409E7C5C068744F6B1CE01B36350D508E17F6C8A84AB23A27C27AB9EB06
2,987,839 UART: [art] SIG.S = 19FB410B01BA56D4F810E26ED9A4FD5E4A17CF394D9D5C72D17E5EC6E5A70A8754685C7DA5924D46FC316193A004BCFB
3,011,160 UART: Caliptra RT
3,011,413 UART: [state] CFI Enabled
3,118,708 UART: [rt] RT listening for mailbox commands...
3,119,378 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,268 UART: [rt]cmd =0x4c444556, len=4
3,159,868 >>> mbox cmd response data (687 bytes)
3,159,869 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,168 UART: [rt]cmd =0x43455246, len=4
3,201,396 >>> mbox cmd response data (887 bytes)
3,201,397 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,000 UART: [rt]cmd =0x43455252, len=4
3,241,717 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,180 >>> mbox cmd response: success
2,704,348 UART:
2,704,364 UART: Running Caliptra FMC ...
2,704,772 UART:
2,704,826 UART: [state] CFI Enabled
2,715,095 UART: [fht] FMC Alias Private Key: 7
2,823,288 UART: [art] Extend RT PCRs Done
2,823,716 UART: [art] Lock RT PCRs Done
2,825,252 UART: [art] Populate DV Done
2,833,327 UART: [fht] FMC Alias Private Key: 7
2,834,421 UART: [art] Derive CDI
2,834,701 UART: [art] Store in in slot 0x4
2,919,848 UART: [art] Derive Key Pair
2,920,208 UART: [art] Store priv key in slot 0x5
2,934,040 UART: [art] Derive Key Pair - Done
2,949,063 UART: [art] Signing Cert with AUTHO
2,949,543 UART: RITY.KEYID = 7
2,964,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,440 UART: [art] PUB.X = 288A9BCB25CE50AA41C74AB4530EFE560A710C736F0AEDC05CEE6401615BD6030EBDFA93EEEA2948416DDA1BB8589520
2,972,207 UART: [art] PUB.Y = 1E115A8D98DF15CD8053F15C1639AD60DD32F84607BDCFD10AC06D6C756EB6229366CADB132149A1BCD53BB6B45D3113
2,979,163 UART: [art] SIG.R = C2080998D0333C9E558B1DC8BBA68F92BE90D963ED7B7F258DC6A0C38661EDDD643E523CF7500C3AB8ACA826642F3939
2,985,934 UART: [art] SIG.S = FFDB5332C2450E6A77B602A33A0ABA138DCD9E3D9547753445CA7703D0DFE662CBCB3273B892A742498E90545430B44A
3,009,969 UART: Caliptra RT
3,010,222 UART: [state] CFI Enabled
3,117,904 UART: [rt] RT listening for mailbox commands...
3,118,574 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,196 UART: [rt]cmd =0x4c444556, len=4
3,158,626 >>> mbox cmd response data (687 bytes)
3,158,627 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,084 UART: [rt]cmd =0x43455246, len=4
3,200,376 >>> mbox cmd response data (887 bytes)
3,200,377 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,920 UART: [rt]cmd =0x43455252, len=4
3,240,792 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,924 >>> mbox cmd response: success
2,704,088 UART:
2,704,104 UART: Running Caliptra FMC ...
2,704,512 UART:
2,704,566 UART: [state] CFI Enabled
2,715,105 UART: [fht] FMC Alias Private Key: 7
2,822,672 UART: [art] Extend RT PCRs Done
2,823,100 UART: [art] Lock RT PCRs Done
2,824,908 UART: [art] Populate DV Done
2,833,133 UART: [fht] FMC Alias Private Key: 7
2,834,111 UART: [art] Derive CDI
2,834,391 UART: [art] Store in in slot 0x4
2,920,278 UART: [art] Derive Key Pair
2,920,638 UART: [art] Store priv key in slot 0x5
2,933,298 UART: [art] Derive Key Pair - Done
2,947,953 UART: [art] Signing Cert with AUTHO
2,948,433 UART: RITY.KEYID = 7
2,963,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,486 UART: [art] PUB.X = 4ADBB48CF017399788804C656F465FC1B6D29324E32E02A8FDF33F820A4BF62A094548B11D2AF161ACCC505236D2A244
2,971,251 UART: [art] PUB.Y = 3920A1A24B790691A1E87DC538A0C226FFAB4D30B580046D75142CD614F5BEBAEAA4E5539803A1D1D38D23D3A1BED2BC
2,978,206 UART: [art] SIG.R = 27A2E6711B4ED2525BACBA6EACCC54ED01C9E27CD8A657D44C4CF6AC3F007C7DC98D46F66585C551D0771B882B8E05D8
2,984,966 UART: [art] SIG.S = 563B08AC317884FE140E24450415D09F947B4C4F37ED38F86D2F2595826D4B83A43536B3641061C2DF4BD519D2D1D85D
3,008,964 UART: Caliptra RT
3,009,217 UART: [state] CFI Enabled
3,117,238 UART: [rt] RT listening for mailbox commands...
3,117,908 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,668 UART: [rt]cmd =0x4c444556, len=4
3,158,086 >>> mbox cmd response data (687 bytes)
3,158,087 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,512 UART: [rt]cmd =0x43455246, len=4
3,199,586 >>> mbox cmd response data (887 bytes)
3,199,587 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,096 UART: [rt]cmd =0x43455252, len=4
3,240,183 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,606 >>> mbox cmd response: success
2,705,938 UART:
2,705,954 UART: Running Caliptra FMC ...
2,706,362 UART:
2,706,416 UART: [state] CFI Enabled
2,716,531 UART: [fht] FMC Alias Private Key: 7
2,824,568 UART: [art] Extend RT PCRs Done
2,824,996 UART: [art] Lock RT PCRs Done
2,826,676 UART: [art] Populate DV Done
2,834,679 UART: [fht] FMC Alias Private Key: 7
2,835,665 UART: [art] Derive CDI
2,835,945 UART: [art] Store in in slot 0x4
2,921,838 UART: [art] Derive Key Pair
2,922,198 UART: [art] Store priv key in slot 0x5
2,935,920 UART: [art] Derive Key Pair - Done
2,950,836 UART: [art] Signing Cert with AUTHO
2,951,316 UART: RITY.KEYID = 7
2,966,412 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,177 UART: [art] PUB.X = 6182002ACFFB1E2886E3048E36D139F4381AB3139BD97FEABA098E9C69144C5302C57C68877C6C6FF5966C6382D0B2A4
2,973,918 UART: [art] PUB.Y = 9E82FBA7FFD2FD14E49A89B8D8FCDFA41FE63C3A3BB3E79B96749A924012F16005292FE82F315B01C4831216D1CA153E
2,980,874 UART: [art] SIG.R = 658C5934E368F04FC81B3811B0F80E12FD779E59DF8C12AF7F1C74318739E7CD2D1B51050B33F536C66E875E2C4F945D
2,987,637 UART: [art] SIG.S = 1F40F50DA730D70AA69257E5324040696ECB629D399F16816508D35B8A66B37708CA3D2A4FC75116C86139A9849DC298
3,011,052 UART: Caliptra RT
3,011,305 UART: [state] CFI Enabled
3,119,708 UART: [rt] RT listening for mailbox commands...
3,120,378 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,198 UART: [rt]cmd =0x4c444556, len=4
3,160,800 >>> mbox cmd response data (687 bytes)
3,160,801 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,126 UART: [rt]cmd =0x43455246, len=4
3,202,330 >>> mbox cmd response data (887 bytes)
3,202,331 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,860 UART: [rt]cmd =0x43455252, len=4
3,242,723 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,836 >>> mbox cmd response: success
2,704,748 UART:
2,704,764 UART: Running Caliptra FMC ...
2,705,172 UART:
2,705,226 UART: [state] CFI Enabled
2,715,577 UART: [fht] FMC Alias Private Key: 7
2,823,442 UART: [art] Extend RT PCRs Done
2,823,870 UART: [art] Lock RT PCRs Done
2,825,444 UART: [art] Populate DV Done
2,833,315 UART: [fht] FMC Alias Private Key: 7
2,834,433 UART: [art] Derive CDI
2,834,713 UART: [art] Store in in slot 0x4
2,920,300 UART: [art] Derive Key Pair
2,920,660 UART: [art] Store priv key in slot 0x5
2,933,738 UART: [art] Derive Key Pair - Done
2,948,344 UART: [art] Signing Cert with AUTHO
2,948,824 UART: RITY.KEYID = 7
2,963,848 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,613 UART: [art] PUB.X = 79B9CDD72103C973D2D61978BBDF15BEB732A14F97C7B5377D28186DDEB7D9AEB858D45824A3997EC587C184717AD34A
2,971,388 UART: [art] PUB.Y = C1F8287CC0A974EA2C5E5C8403BCF34C2ECEE9D5D0DEFC37D6C2FD33DFA86E691F2DBAFFDBCA12A300E0868C012DF26F
2,978,344 UART: [art] SIG.R = 15311DF972DF3B98B4E2BF97095AFD61CD391D1268A08935C5155C23C3DA81D3B0BAFE7F4FF5568B34F1A5A60798553F
2,985,116 UART: [art] SIG.S = 636A6C3AA3BEB6A5A403ECF8AADDB92FFB5E4A4AF1BD0EAD4DC410C1A914272EE36AAE6201907FE48CB4E777E2BC909B
3,009,004 UART: Caliptra RT
3,009,257 UART: [state] CFI Enabled
3,115,914 UART: [rt] RT listening for mailbox commands...
3,116,584 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,462 UART: [rt]cmd =0x4c444556, len=4
3,156,918 >>> mbox cmd response data (687 bytes)
3,156,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,980 UART: [rt]cmd =0x43455246, len=4
3,197,834 >>> mbox cmd response data (887 bytes)
3,197,835 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,188 UART: [rt]cmd =0x43455252, len=4
3,238,009 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 895.00s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,839 UART: [idev] CSR uploaded
1,301,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,302,053 UART: [idev] --
1,303,236 UART: [ldev] ++
1,303,404 UART: [ldev] CDI.KEYID = 6
1,303,768 UART: [ldev] SUBJECT.KEYID = 5
1,304,195 UART: [ldev] AUTHORITY.KEYID = 7
1,304,658 UART: [ldev] FE.KEYID = 1
1,309,834 UART: [ldev] Erasing FE.KEYID = 1
1,336,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,378 UART: [ldev] --
1,375,888 UART: [fwproc] Wait for Commands...
1,376,459 UART: [fwproc] Recv command 0x46574c44
1,377,192 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,703,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,732,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,868,714 >>> mbox cmd response: success
2,869,959 UART: [afmc] ++
2,870,127 UART: [afmc] CDI.KEYID = 6
2,870,490 UART: [afmc] SUBJECT.KEYID = 7
2,870,916 UART: [afmc] AUTHORITY.KEYID = 5
2,906,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,923,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,929,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,935,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,941,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,858 UART: [afmc] --
2,949,964 UART: [cold-reset] --
2,950,688 UART: [state] Locking Datavault
2,951,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,373 UART: [state] Locking ICCM
2,952,883 UART: [exit] Launching FMC @ 0x40000130
2,958,212 UART:
2,958,228 UART: Running Caliptra FMC ...
2,958,636 UART:
2,958,779 UART: [state] CFI Enabled
2,969,706 UART: [fht] FMC Alias Private Key: 7
3,078,635 UART: [art] Extend RT PCRs Done
3,079,063 UART: [art] Lock RT PCRs Done
3,080,491 UART: [art] Populate DV Done
3,088,914 UART: [fht] FMC Alias Private Key: 7
3,090,020 UART: [art] Derive CDI
3,090,300 UART: [art] Store in in slot 0x4
3,176,229 UART: [art] Derive Key Pair
3,176,589 UART: [art] Store priv key in slot 0x5
3,189,713 UART: [art] Derive Key Pair - Done
3,204,536 UART: [art] Signing Cert with AUTHO
3,205,016 UART: RITY.KEYID = 7
3,220,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,220,969 UART: [art] PUB.X = A81DFB7C04A7CFAB20F7513978AA8F2C0273448CD24AB4F5F1D340AB56C333E96A56EDF1258293A3918DC70D15064F11
3,227,735 UART: [art] PUB.Y = ECEA4EBA5C35A12BD20BACE4163D4E7DD3CFD70635E218913DDB3FCF55A57BF70C5BCDF9FC1FBD1DF3DD9431B26F9CF1
3,234,714 UART: [art] SIG.R = A518DE3638D5C7D1398A4672363822B74BAD5A3976D997C63FE8EEF9231116BE6EB95F334E1A07EC1C6F14F9D1F4B1E4
3,241,489 UART: [art] SIG.S = AEF5D2CD13367D384DE8AC1D6BEC900620ECBDFA4911CB93A89198DE974809B7D9C1D343CA90BCC8BDC9F83ADC7B8CED
3,264,900 UART: Caliptra RT
3,265,245 UART: [state] CFI Enabled
3,374,443 UART: [rt] RT listening for mailbox commands...
3,375,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,101 UART: [rt]cmd =0x4c444556, len=4
3,415,555 >>> mbox cmd response data (687 bytes)
3,415,556 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,913 UART: [rt]cmd =0x43455246, len=4
3,456,799 >>> mbox cmd response data (887 bytes)
3,456,800 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,167 UART: [rt]cmd =0x43455252, len=4
3,496,923 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,750 UART: [idev] ++
1,172,918 UART: [idev] CDI.KEYID = 6
1,173,279 UART: [idev] SUBJECT.KEYID = 7
1,173,704 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,318 UART: [idev] CSR upload begun
1,209,097 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,708 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,416 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,301 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,007 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,436 UART: [idev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
1,296,933 UART: [idev] CSR uploaded
1,299,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,147 UART: [idev] --
1,301,084 UART: [ldev] ++
1,301,252 UART: [ldev] CDI.KEYID = 6
1,301,616 UART: [ldev] SUBJECT.KEYID = 5
1,302,043 UART: [ldev] AUTHORITY.KEYID = 7
1,302,506 UART: [ldev] FE.KEYID = 1
1,307,688 UART: [ldev] Erasing FE.KEYID = 1
1,333,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,742 UART: [ldev] --
1,373,154 UART: [fwproc] Wait for Commands...
1,373,801 UART: [fwproc] Recv command 0x46574c44
1,374,534 UART: [fwproc] Recv'd Img size: 114448 bytes
2,672,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,864,642 >>> mbox cmd response: success
2,865,671 UART: [afmc] ++
2,865,839 UART: [afmc] CDI.KEYID = 6
2,866,202 UART: [afmc] SUBJECT.KEYID = 7
2,866,628 UART: [afmc] AUTHORITY.KEYID = 5
2,902,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,744 UART: [afmc] --
2,945,756 UART: [cold-reset] --
2,946,596 UART: [state] Locking Datavault
2,947,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,347 UART: [state] Locking ICCM
2,948,833 UART: [exit] Launching FMC @ 0x40000130
2,954,162 UART:
2,954,178 UART: Running Caliptra FMC ...
2,954,586 UART:
2,954,729 UART: [state] CFI Enabled
2,965,230 UART: [fht] FMC Alias Private Key: 7
3,072,915 UART: [art] Extend RT PCRs Done
3,073,343 UART: [art] Lock RT PCRs Done
3,074,959 UART: [art] Populate DV Done
3,083,230 UART: [fht] FMC Alias Private Key: 7
3,084,242 UART: [art] Derive CDI
3,084,522 UART: [art] Store in in slot 0x4
3,169,831 UART: [art] Derive Key Pair
3,170,191 UART: [art] Store priv key in slot 0x5
3,183,335 UART: [art] Derive Key Pair - Done
3,198,031 UART: [art] Signing Cert with AUTHO
3,198,511 UART: RITY.KEYID = 7
3,213,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,402 UART: [art] PUB.X = 56E8ABBCAF3991D4804FD830D23D8B820BC328F3EEE64BBE40BC29029F90014BE65FFFC554470C946EE8A1C758876E76
3,221,172 UART: [art] PUB.Y = C9BAEF717B4BAE9173F3D463ECDDB4EE3B1D5335FF302C7EE8C30DDFCC9F7E897AE608FFB40070CE9DEB65617F1BDD67
3,228,126 UART: [art] SIG.R = 6F1DADA7FB3F7D633BC9DD08B64C9746BE33E4E852F3D9D68F03FFBC68CFF9958F9C18E1974E197D906131932C6AEF77
3,234,906 UART: [art] SIG.S = 0A29F5A99E4D7575E1C8E2ADC9DE425916FA6B9935709353A84E90BB92EFF44018CACF050A9631610612B49EBDDA1558
3,258,795 UART: Caliptra RT
3,259,140 UART: [state] CFI Enabled
3,367,081 UART: [rt] RT listening for mailbox commands...
3,367,751 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,733 UART: [rt]cmd =0x4c444556, len=4
3,408,047 >>> mbox cmd response data (687 bytes)
3,408,048 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,435 UART: [rt]cmd =0x43455246, len=4
3,449,603 >>> mbox cmd response data (887 bytes)
3,449,604 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,969 UART: [rt]cmd =0x43455252, len=4
3,489,768 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 904.34s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,825,130 UART: [art] Lock RT PCRs Done
2,826,356 UART: [art] Populate DV Done
2,834,675 UART: [fht] FMC Alias Private Key: 7
2,835,759 UART: [art] Derive CDI
2,836,039 UART: [art] Store in in slot 0x4
2,921,878 UART: [art] Derive Key Pair
2,922,238 UART: [art] Store priv key in slot 0x5
2,935,604 UART: [art] Derive Key Pair - Done
2,950,483 UART: [art] Signing Cert with AUTHO
2,950,963 UART: RITY.KEYID = 7
2,966,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,060 UART: [art] PUB.X = 65BD5D28D8D30897E66B42F7F6E6408D484AC01190F23496B8AA1443088BA4FF1F3B856F76943AD8E382060C178BC5BA
2,973,820 UART: [art] PUB.Y = 65CFC319B634E9BF2C8662DFAE1540812731A588DC86F5F52B0954B9923C5AA9AC1F1D8DC7B635784B12664EB52D779D
2,980,773 UART: [art] SIG.R = 951DFD8AD1ED142C482CE96DCDAD27DB94687558E3F323C2E061D3D8C2BC0FA23C219DBE8C9DF31F3DC6007CD99076FC
2,987,540 UART: [art] SIG.S = 020CB645122246A388EC3BE4C65598AD1A2E4AA43EE86211DC7BB2938278F76BB19088E0B3248975A302C2E1E38AA088
3,011,660 UART: Caliptra RT
3,012,005 UART: [state] CFI Enabled
3,120,236 UART: [rt] RT listening for mailbox commands...
3,120,906 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,832 UART: [rt]cmd =0x4c444556, len=4
3,161,192 >>> mbox cmd response data (687 bytes)
3,161,193 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,526 UART: [rt]cmd =0x43455246, len=4
3,202,526 >>> mbox cmd response data (887 bytes)
3,202,527 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,922 UART: [rt]cmd =0x43455252, len=4
3,242,857 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,379 >>> mbox cmd response: success
2,707,015 UART:
2,707,031 UART: Running Caliptra FMC ...
2,707,439 UART:
2,707,582 UART: [state] CFI Enabled
2,717,967 UART: [fht] FMC Alias Private Key: 7
2,826,470 UART: [art] Extend RT PCRs Done
2,826,898 UART: [art] Lock RT PCRs Done
2,828,456 UART: [art] Populate DV Done
2,836,543 UART: [fht] FMC Alias Private Key: 7
2,837,547 UART: [art] Derive CDI
2,837,827 UART: [art] Store in in slot 0x4
2,923,282 UART: [art] Derive Key Pair
2,923,642 UART: [art] Store priv key in slot 0x5
2,937,002 UART: [art] Derive Key Pair - Done
2,951,901 UART: [art] Signing Cert with AUTHO
2,952,381 UART: RITY.KEYID = 7
2,967,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,426 UART: [art] PUB.X = C032CA096808A75E04EA96D3DA2A4AB84D6D9B14C1DB6AAF060F6FA89D68F0CE911827CF165E6CC6DFE4FFA66F42AC99
2,975,205 UART: [art] PUB.Y = 77D77281AE31B72DB4484E357CA69B83C292EE38FBABDCE32720328DD426FB935A9ECA4E240ECA5D54AB45BB25CA6421
2,982,168 UART: [art] SIG.R = 2F8798EB29D1044FBD15A4439740751E18F4AD34F2B2EC8CF593E1551CA4FD0F9ADA27E3B1C67BB04F93BF94F2797580
2,988,942 UART: [art] SIG.S = 9B0B06B23AE679CC49D22AACA0750785DDF84DD1A0F8A55F34472173C3E6CE9BA970BDAE1F43A28D7697C4921AA67BAE
3,012,716 UART: Caliptra RT
3,013,061 UART: [state] CFI Enabled
3,121,208 UART: [rt] RT listening for mailbox commands...
3,121,878 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,596 UART: [rt]cmd =0x4c444556, len=4
3,162,144 >>> mbox cmd response data (687 bytes)
3,162,145 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,352 UART: [rt]cmd =0x43455246, len=4
3,203,590 >>> mbox cmd response data (887 bytes)
3,203,591 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,112 UART: [rt]cmd =0x43455252, len=4
3,243,973 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,003 >>> mbox cmd response: success
2,707,743 UART:
2,707,759 UART: Running Caliptra FMC ...
2,708,167 UART:
2,708,310 UART: [state] CFI Enabled
2,718,745 UART: [fht] FMC Alias Private Key: 7
2,826,374 UART: [art] Extend RT PCRs Done
2,826,802 UART: [art] Lock RT PCRs Done
2,828,480 UART: [art] Populate DV Done
2,836,377 UART: [fht] FMC Alias Private Key: 7
2,837,305 UART: [art] Derive CDI
2,837,585 UART: [art] Store in in slot 0x4
2,923,454 UART: [art] Derive Key Pair
2,923,814 UART: [art] Store priv key in slot 0x5
2,937,322 UART: [art] Derive Key Pair - Done
2,952,254 UART: [art] Signing Cert with AUTHO
2,952,734 UART: RITY.KEYID = 7
2,968,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,983 UART: [art] PUB.X = 41CA68FAA2F4EF0BEEED86B717AD7D5AF2C0AAE0836CC51FEA77E811F06D3E3308FD9FD00FD50855CB718B445F878FCC
2,975,769 UART: [art] PUB.Y = 7756EE1CE6E5639432A0630FAEE4F7F0B2BFE19FECF1C579FE8002BE8C39288AA92380B8C64A3A052D9080DAD91EC7FE
2,982,728 UART: [art] SIG.R = 86251250C198F760A3B8698EEDFDE0C145228B64DF0495A530E2E461484D739A598ECA6510ED416594E35888F7387805
2,989,482 UART: [art] SIG.S = B8E17F0DC4DB894A425E377A253BD0523AA4B5EC0796CC7EC736BCDFB368ABC04BC2B308362F8D5A83F98D7529792CD3
3,012,822 UART: Caliptra RT
3,013,167 UART: [state] CFI Enabled
3,121,593 UART: [rt] RT listening for mailbox commands...
3,122,263 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,971 UART: [rt]cmd =0x4c444556, len=4
3,162,421 >>> mbox cmd response data (687 bytes)
3,162,422 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,813 UART: [rt]cmd =0x43455246, len=4
3,204,031 >>> mbox cmd response data (887 bytes)
3,204,032 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,387 UART: [rt]cmd =0x43455252, len=4
3,244,087 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,023 >>> mbox cmd response: success
2,705,313 UART:
2,705,329 UART: Running Caliptra FMC ...
2,705,737 UART:
2,705,880 UART: [state] CFI Enabled
2,716,787 UART: [fht] FMC Alias Private Key: 7
2,824,916 UART: [art] Extend RT PCRs Done
2,825,344 UART: [art] Lock RT PCRs Done
2,827,172 UART: [art] Populate DV Done
2,835,191 UART: [fht] FMC Alias Private Key: 7
2,836,303 UART: [art] Derive CDI
2,836,583 UART: [art] Store in in slot 0x4
2,922,188 UART: [art] Derive Key Pair
2,922,548 UART: [art] Store priv key in slot 0x5
2,936,034 UART: [art] Derive Key Pair - Done
2,950,484 UART: [art] Signing Cert with AUTHO
2,950,964 UART: RITY.KEYID = 7
2,966,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,953 UART: [art] PUB.X = 1147B6883F2B0BD5D60377ED1A289A6F5A44DBD0C10CAF8E44F278E41FCADE033802248A50FEC6E3D22EF99FB36D930F
2,973,721 UART: [art] PUB.Y = 8D9E2AFCA74BFB611D085792246D5DE7590F19EDAA9F267F3773DBB9165B3D83E2CB0E77ABDBDF0AB041279F8E16111E
2,980,677 UART: [art] SIG.R = BBEDC1B24CFD33F8D4F91904FED2E80EBD1736F3DE5C07E33B02F41A16F3966C5DD6ECEF0BEDE7EBAB3E8D042F81C5A8
2,987,463 UART: [art] SIG.S = 65F2A746D249C8B18770D5172477B16204AA1172B66D8F42611D7F07194A48E80375154B60EF50224C986E0C80AF3214
3,011,090 UART: Caliptra RT
3,011,435 UART: [state] CFI Enabled
3,119,766 UART: [rt] RT listening for mailbox commands...
3,120,436 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,170 UART: [rt]cmd =0x4c444556, len=4
3,160,570 >>> mbox cmd response data (687 bytes)
3,160,571 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,020 UART: [rt]cmd =0x43455246, len=4
3,202,126 >>> mbox cmd response data (887 bytes)
3,202,127 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,404 UART: [rt]cmd =0x43455252, len=4
3,242,249 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,073 >>> mbox cmd response: success
2,706,995 UART:
2,707,011 UART: Running Caliptra FMC ...
2,707,419 UART:
2,707,562 UART: [state] CFI Enabled
2,718,323 UART: [fht] FMC Alias Private Key: 7
2,826,384 UART: [art] Extend RT PCRs Done
2,826,812 UART: [art] Lock RT PCRs Done
2,828,482 UART: [art] Populate DV Done
2,836,639 UART: [fht] FMC Alias Private Key: 7
2,837,693 UART: [art] Derive CDI
2,837,973 UART: [art] Store in in slot 0x4
2,923,398 UART: [art] Derive Key Pair
2,923,758 UART: [art] Store priv key in slot 0x5
2,936,888 UART: [art] Derive Key Pair - Done
2,951,577 UART: [art] Signing Cert with AUTHO
2,952,057 UART: RITY.KEYID = 7
2,967,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,160 UART: [art] PUB.X = C56C75DEACD268A1EFC5469328DA60F62BA050E7282CC934742F9BA36AAB34EF66BDDE87F7FF5A8D239E9BA9468516F6
2,974,948 UART: [art] PUB.Y = 7BCEC1A78F1DA4C0588AB312532FCBF7468D2979D0BF164E72CAA0D8F1FC7714F699EA99487BDCDD92B872755A78EFE2
2,981,916 UART: [art] SIG.R = DE4B0466BC1CFBA508E8EF0ED429A25898862C27A29985A7623A84265B0A52691B194506D15FDEC5E2C131BCD97C1268
2,988,675 UART: [art] SIG.S = 7FCD87940CB4BBC296261F4D2105F8D75AF9DFB608FD14AE0C6F828B9BEFB26FF0BFBD58F966A9EE70F5118A068C1751
3,013,179 UART: Caliptra RT
3,013,524 UART: [state] CFI Enabled
3,121,011 UART: [rt] RT listening for mailbox commands...
3,121,681 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,553 UART: [rt]cmd =0x4c444556, len=4
3,161,869 >>> mbox cmd response data (687 bytes)
3,161,870 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,309 UART: [rt]cmd =0x43455246, len=4
3,203,455 >>> mbox cmd response data (887 bytes)
3,203,456 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,891 UART: [rt]cmd =0x43455252, len=4
3,243,844 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 874.89s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,792 UART: [idev] CSR uploaded
1,299,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,006 UART: [idev] --
1,301,131 UART: [ldev] ++
1,301,299 UART: [ldev] CDI.KEYID = 6
1,301,663 UART: [ldev] SUBJECT.KEYID = 5
1,302,090 UART: [ldev] AUTHORITY.KEYID = 7
1,302,553 UART: [ldev] FE.KEYID = 1
1,307,703 UART: [ldev] Erasing FE.KEYID = 1
1,334,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,459 UART: [ldev] --
1,373,745 UART: [fwproc] Wait for Commands...
1,374,426 UART: [fwproc] Recv command 0x46574c44
1,375,159 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,021 >>> mbox cmd response: success
2,867,154 UART: [afmc] ++
2,867,322 UART: [afmc] CDI.KEYID = 6
2,867,685 UART: [afmc] SUBJECT.KEYID = 7
2,868,111 UART: [afmc] AUTHORITY.KEYID = 5
2,903,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,077 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,796 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,637 UART: [afmc] --
2,946,603 UART: [cold-reset] --
2,947,541 UART: [state] Locking Datavault
2,949,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,610 UART: [state] Locking ICCM
2,950,126 UART: [exit] Launching FMC @ 0x40000130
2,955,455 UART:
2,955,471 UART: Running Caliptra FMC ...
2,955,879 UART:
2,955,933 UART: [state] CFI Enabled
2,966,732 UART: [fht] FMC Alias Private Key: 7
3,074,861 UART: [art] Extend RT PCRs Done
3,075,289 UART: [art] Lock RT PCRs Done
3,076,949 UART: [art] Populate DV Done
3,084,998 UART: [fht] FMC Alias Private Key: 7
3,086,138 UART: [art] Derive CDI
3,086,418 UART: [art] Store in in slot 0x4
3,172,149 UART: [art] Derive Key Pair
3,172,509 UART: [art] Store priv key in slot 0x5
3,185,043 UART: [art] Derive Key Pair - Done
3,199,425 UART: [art] Signing Cert with AUTHO
3,199,905 UART: RITY.KEYID = 7
3,215,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,976 UART: [art] PUB.X = 854BF9B6866C2D84177F75222BE883C5DB796BB1722C622DAD256166EBACFE5C4DA9B9AF668FBB09BB5C1EC1DC1120E2
3,222,761 UART: [art] PUB.Y = 0735A30B7E4E2DDA039F824D1BC2C0825B8EE1EB96C2BA23A3DC527EDB678A61C27C99E17A227EFC957008CDB39FB99F
3,229,717 UART: [art] SIG.R = 9A610451ADBB65F02141A46C186636A911B77A8AC445BCDCE98CE6256DF817BA8E748BDE4D7A1FEA55D677D4BF022CDB
3,236,499 UART: [art] SIG.S = CF3DAC14C4C4EEEF49926FCA5DF114713ACC6FE817E39232C9323AB91E103100F97E3189099F1D560E0028BBFAC7A17B
3,260,322 UART: Caliptra RT
3,260,575 UART: [state] CFI Enabled
3,368,691 UART: [rt] RT listening for mailbox commands...
3,369,361 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,413 UART: [rt]cmd =0x4c444556, len=4
3,409,797 >>> mbox cmd response data (687 bytes)
3,409,798 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,397 UART: [rt]cmd =0x43455246, len=4
3,451,481 >>> mbox cmd response data (887 bytes)
3,451,482 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,917 UART: [rt]cmd =0x43455252, len=4
3,491,705 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,206,491 UART: [idev] CSR upload begun
1,208,270 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,251 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,959 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,844 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,550 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,979 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,476 UART: [idev] CSR uploaded
1,299,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,690 UART: [idev] --
1,300,785 UART: [ldev] ++
1,300,953 UART: [ldev] CDI.KEYID = 6
1,301,317 UART: [ldev] SUBJECT.KEYID = 5
1,301,744 UART: [ldev] AUTHORITY.KEYID = 7
1,302,207 UART: [ldev] FE.KEYID = 1
1,307,155 UART: [ldev] Erasing FE.KEYID = 1
1,332,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,829 UART: [ldev] --
1,372,295 UART: [fwproc] Wait for Commands...
1,373,052 UART: [fwproc] Recv command 0x46574c44
1,373,785 UART: [fwproc] Recv'd Img size: 114448 bytes
2,672,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,635 >>> mbox cmd response: success
2,867,676 UART: [afmc] ++
2,867,844 UART: [afmc] CDI.KEYID = 6
2,868,207 UART: [afmc] SUBJECT.KEYID = 7
2,868,633 UART: [afmc] AUTHORITY.KEYID = 5
2,904,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,475 UART: [afmc] --
2,947,471 UART: [cold-reset] --
2,948,125 UART: [state] Locking Datavault
2,949,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,918 UART: [state] Locking ICCM
2,950,570 UART: [exit] Launching FMC @ 0x40000130
2,955,899 UART:
2,955,915 UART: Running Caliptra FMC ...
2,956,323 UART:
2,956,377 UART: [state] CFI Enabled
2,967,078 UART: [fht] FMC Alias Private Key: 7
3,075,697 UART: [art] Extend RT PCRs Done
3,076,125 UART: [art] Lock RT PCRs Done
3,077,759 UART: [art] Populate DV Done
3,086,060 UART: [fht] FMC Alias Private Key: 7
3,087,084 UART: [art] Derive CDI
3,087,364 UART: [art] Store in in slot 0x4
3,173,353 UART: [art] Derive Key Pair
3,173,713 UART: [art] Store priv key in slot 0x5
3,186,975 UART: [art] Derive Key Pair - Done
3,201,693 UART: [art] Signing Cert with AUTHO
3,202,173 UART: RITY.KEYID = 7
3,217,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,106 UART: [art] PUB.X = D0CF92B587AF4708891B476E2AD6E8B9A635D9920F92A0D9A1749BC98B91F206B74FD18B7F8AEDB23A61463CFA799AD6
3,224,879 UART: [art] PUB.Y = 71BF37E90E40651845C42250DBFE804B1D1F99600A1908B0A36DD1791566CCA27F95DDC3EE15958C62CEB0CB70FEC984
3,231,828 UART: [art] SIG.R = B483E15D941530D99C1FFAF22138F509F02C48F5779E3C3ABF8EBDF32414383A161D9D3023C80C34A7137392571A7CF8
3,238,592 UART: [art] SIG.S = 0A9D201E707B310B3FBB469E11D568EABE060A57B5C773E9E23214C54EED08A2765E60084DFC4B711D8A4BBBBDFACCFB
3,262,515 UART: Caliptra RT
3,262,768 UART: [state] CFI Enabled
3,370,245 UART: [rt] RT listening for mailbox commands...
3,370,915 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,887 UART: [rt]cmd =0x4c444556, len=4
3,411,343 >>> mbox cmd response data (687 bytes)
3,411,344 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,671 UART: [rt]cmd =0x43455246, len=4
3,452,781 >>> mbox cmd response data (887 bytes)
3,452,782 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,325 UART: [rt]cmd =0x43455252, len=4
3,493,088 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 886.03s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,821,180 UART: [art] Lock RT PCRs Done
2,822,410 UART: [art] Populate DV Done
2,830,549 UART: [fht] FMC Alias Private Key: 7
2,831,517 UART: [art] Derive CDI
2,831,797 UART: [art] Store in in slot 0x4
2,917,574 UART: [art] Derive Key Pair
2,917,934 UART: [art] Store priv key in slot 0x5
2,930,842 UART: [art] Derive Key Pair - Done
2,945,741 UART: [art] Signing Cert with AUTHO
2,946,221 UART: RITY.KEYID = 7
2,961,635 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,400 UART: [art] PUB.X = 05CC1913D7EA6649E085FE1EC9AA861A0BEE8D709CDDBA1E9CC6D13A0D18EEA13A2474F4A4DA798DEAC8A4E6F34257A2
2,969,187 UART: [art] PUB.Y = B64B18848428DA1DE3EA2DE37FE37D64181ECD75719631FA8AE7CA4ADE735595EA80A01AD27ADC452EB1712074DB4C56
2,976,151 UART: [art] SIG.R = 0F92004EFB01C8CFC4F1041F31D5480F4314AE9ACE977FFFEEB321F7B1E3F031F2E4B5637B1BBCDE9F38D7D66A070B80
2,982,901 UART: [art] SIG.S = 20B667C39FD4E39C50A14443632F6AA543CA9F176142B746DA1C61170599AB5778A906DC8FF5B7139D652E6910701420
3,006,778 UART: Caliptra RT
3,007,031 UART: [state] CFI Enabled
3,114,598 UART: [rt] RT listening for mailbox commands...
3,115,268 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,838 UART: [rt]cmd =0x4c444556, len=4
3,155,118 >>> mbox cmd response data (687 bytes)
3,155,119 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,362 UART: [rt]cmd =0x43455246, len=4
3,196,572 >>> mbox cmd response data (887 bytes)
3,196,573 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,966 UART: [rt]cmd =0x43455252, len=4
3,236,765 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,766 >>> mbox cmd response: success
2,705,090 UART:
2,705,106 UART: Running Caliptra FMC ...
2,705,514 UART:
2,705,568 UART: [state] CFI Enabled
2,715,825 UART: [fht] FMC Alias Private Key: 7
2,823,528 UART: [art] Extend RT PCRs Done
2,823,956 UART: [art] Lock RT PCRs Done
2,825,318 UART: [art] Populate DV Done
2,833,565 UART: [fht] FMC Alias Private Key: 7
2,834,577 UART: [art] Derive CDI
2,834,857 UART: [art] Store in in slot 0x4
2,920,106 UART: [art] Derive Key Pair
2,920,466 UART: [art] Store priv key in slot 0x5
2,933,654 UART: [art] Derive Key Pair - Done
2,948,602 UART: [art] Signing Cert with AUTHO
2,949,082 UART: RITY.KEYID = 7
2,964,504 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,269 UART: [art] PUB.X = C0A12F132222B9FCCDF9FC880CFC934E5C71B2332F5CF7AC869722090639E9641643EA6AD35BDDC4AFFB745D576D14BD
2,972,046 UART: [art] PUB.Y = 500CC3AF22E3A54CC194C58FFD57F0A15A3676CA7709EDCC514317FFACC2D5908C00255589214729A6D14D8CD0D06326
2,978,974 UART: [art] SIG.R = EC0967437CB541C22A12A82C969314F390EE3EC48C8748410A7B4DE4039C667EEE597032FD543E561B3E7FE2862340A8
2,985,733 UART: [art] SIG.S = B9201B183747EA6BDBFF90D5BE589FA5F27E3CEF2943B695F41E279C1D3813F58C38A8CD2E0C06B1ABEEB9AD99094884
3,009,539 UART: Caliptra RT
3,009,792 UART: [state] CFI Enabled
3,117,206 UART: [rt] RT listening for mailbox commands...
3,117,876 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,498 UART: [rt]cmd =0x4c444556, len=4
3,157,918 >>> mbox cmd response data (687 bytes)
3,157,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,408 UART: [rt]cmd =0x43455246, len=4
3,199,572 >>> mbox cmd response data (887 bytes)
3,199,573 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,664 UART: [rt]cmd =0x43455252, len=4
3,239,362 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,502 >>> mbox cmd response: success
2,704,630 UART:
2,704,646 UART: Running Caliptra FMC ...
2,705,054 UART:
2,705,108 UART: [state] CFI Enabled
2,715,931 UART: [fht] FMC Alias Private Key: 7
2,823,530 UART: [art] Extend RT PCRs Done
2,823,958 UART: [art] Lock RT PCRs Done
2,825,398 UART: [art] Populate DV Done
2,833,705 UART: [fht] FMC Alias Private Key: 7
2,834,821 UART: [art] Derive CDI
2,835,101 UART: [art] Store in in slot 0x4
2,920,858 UART: [art] Derive Key Pair
2,921,218 UART: [art] Store priv key in slot 0x5
2,934,122 UART: [art] Derive Key Pair - Done
2,948,778 UART: [art] Signing Cert with AUTHO
2,949,258 UART: RITY.KEYID = 7
2,964,764 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,529 UART: [art] PUB.X = 31C9A27D254A8F99D1FCF930BF68EA779E70E8BE5EC49F814A0A5FACF998373BD82F8BA47B71B91B914AB9E69FEE21F1
2,972,316 UART: [art] PUB.Y = 4DBD14169D2B47048E38E2BD07E8993228C8C68846FD5B53320241BE82FFC453B96DB0FC428F0683E255F43B743D231D
2,979,254 UART: [art] SIG.R = B16D5D190481DFA58BAA1B35BABB8A0B7BEE7DD0BC8A97AE63F865A5D20E7D3A9BE93EA627084CD32EE4AA5F726F49F9
2,986,040 UART: [art] SIG.S = 5305FD64D38E38939A62DEC70379D2B553834DFEC302748C1B2215637AB39467947AAB0C236E5FD958B1EB71F93D04B7
3,009,702 UART: Caliptra RT
3,009,955 UART: [state] CFI Enabled
3,117,504 UART: [rt] RT listening for mailbox commands...
3,118,174 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,986 UART: [rt]cmd =0x4c444556, len=4
3,158,326 >>> mbox cmd response data (687 bytes)
3,158,327 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,868 UART: [rt]cmd =0x43455246, len=4
3,199,886 >>> mbox cmd response data (887 bytes)
3,199,887 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,014 UART: [rt]cmd =0x43455252, len=4
3,239,599 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,438 >>> mbox cmd response: success
2,704,736 UART:
2,704,752 UART: Running Caliptra FMC ...
2,705,160 UART:
2,705,214 UART: [state] CFI Enabled
2,715,919 UART: [fht] FMC Alias Private Key: 7
2,823,670 UART: [art] Extend RT PCRs Done
2,824,098 UART: [art] Lock RT PCRs Done
2,825,894 UART: [art] Populate DV Done
2,834,349 UART: [fht] FMC Alias Private Key: 7
2,835,445 UART: [art] Derive CDI
2,835,725 UART: [art] Store in in slot 0x4
2,920,974 UART: [art] Derive Key Pair
2,921,334 UART: [art] Store priv key in slot 0x5
2,934,264 UART: [art] Derive Key Pair - Done
2,949,398 UART: [art] Signing Cert with AUTHO
2,949,878 UART: RITY.KEYID = 7
2,965,388 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,153 UART: [art] PUB.X = AE9A09F77BD618141B03CE676048343C7FA42121EFA3F851359D603E95ACE4EC517031F9808E89B8E29E152947E55D00
2,972,893 UART: [art] PUB.Y = CE74E086E1804143F4D990581F6E4F619D57F9F9A35B9C0F083604E82DEB11200D5D5A88C2FCC6342498A65B75943771
2,979,827 UART: [art] SIG.R = 4E2434F0C368345D3708251BA5064D8F88B83407A409FA9174D87C33E9C47E336DF50A35CBB895231A5C7B14663B9659
2,986,574 UART: [art] SIG.S = 910B4F3BEDF3D41AF269369C1C37D6B717E739C8C08B2F767361CF942D2310E806365C5479AE0E6C82000B808A1058D0
3,011,035 UART: Caliptra RT
3,011,288 UART: [state] CFI Enabled
3,119,365 UART: [rt] RT listening for mailbox commands...
3,120,035 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,023 UART: [rt]cmd =0x4c444556, len=4
3,160,457 >>> mbox cmd response data (687 bytes)
3,160,458 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,633 UART: [rt]cmd =0x43455246, len=4
3,201,515 >>> mbox cmd response data (887 bytes)
3,201,516 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,985 UART: [rt]cmd =0x43455252, len=4
3,241,988 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,714 >>> mbox cmd response: success
2,703,768 UART:
2,703,784 UART: Running Caliptra FMC ...
2,704,192 UART:
2,704,246 UART: [state] CFI Enabled
2,714,937 UART: [fht] FMC Alias Private Key: 7
2,823,526 UART: [art] Extend RT PCRs Done
2,823,954 UART: [art] Lock RT PCRs Done
2,825,570 UART: [art] Populate DV Done
2,833,853 UART: [fht] FMC Alias Private Key: 7
2,834,889 UART: [art] Derive CDI
2,835,169 UART: [art] Store in in slot 0x4
2,921,146 UART: [art] Derive Key Pair
2,921,506 UART: [art] Store priv key in slot 0x5
2,935,390 UART: [art] Derive Key Pair - Done
2,950,317 UART: [art] Signing Cert with AUTHO
2,950,797 UART: RITY.KEYID = 7
2,965,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,242 UART: [art] PUB.X = A101B718EBBA9B763F0D282F4C675C54E8AC242E3F3F187560A2EEC151D548EEAA11E96D5F41954E9CF5542F5BC5F80F
2,973,017 UART: [art] PUB.Y = 3C87EAD53B4E06BAC07834AB1F5B2BC41A639E2F082732E385A1D5A18F3B6E8A9931EF26268992EB7C1B7C1D7F97B49F
2,979,973 UART: [art] SIG.R = 3194B5D72AB8549608FB620527393310535B70CCD99D6B70DAA93C2CD470CF1A0CDDFAD63624739E36A37B09B1692AAD
2,986,737 UART: [art] SIG.S = 766CCF39BAE4AF668D4727ED321995CF64F74420496537FBBA5757FA1AC33DA8F91927FC7E2AED742A013730D3E6917F
3,010,497 UART: Caliptra RT
3,010,750 UART: [state] CFI Enabled
3,118,591 UART: [rt] RT listening for mailbox commands...
3,119,261 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,907 UART: [rt]cmd =0x4c444556, len=4
3,159,387 >>> mbox cmd response data (687 bytes)
3,159,388 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,951 UART: [rt]cmd =0x43455246, len=4
3,201,079 >>> mbox cmd response data (887 bytes)
3,201,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,265 UART: [rt]cmd =0x43455252, len=4
3,241,280 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 859.40s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,617 UART: [idev] CSR uploaded
1,300,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,831 UART: [idev] --
1,301,928 UART: [ldev] ++
1,302,096 UART: [ldev] CDI.KEYID = 6
1,302,460 UART: [ldev] SUBJECT.KEYID = 5
1,302,887 UART: [ldev] AUTHORITY.KEYID = 7
1,303,350 UART: [ldev] FE.KEYID = 1
1,308,382 UART: [ldev] Erasing FE.KEYID = 1
1,334,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,342 UART: [ldev] --
1,373,818 UART: [fwproc] Wait for Commands...
1,374,471 UART: [fwproc] Recv command 0x46574c44
1,375,204 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,516 >>> mbox cmd response: success
2,867,533 UART: [afmc] ++
2,867,701 UART: [afmc] CDI.KEYID = 6
2,868,064 UART: [afmc] SUBJECT.KEYID = 7
2,868,490 UART: [afmc] AUTHORITY.KEYID = 5
2,903,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,880 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,599 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,548 UART: [afmc] --
2,947,532 UART: [cold-reset] --
2,948,274 UART: [state] Locking Datavault
2,949,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,149 UART: [state] Locking ICCM
2,950,793 UART: [exit] Launching FMC @ 0x40000130
2,956,122 UART:
2,956,138 UART: Running Caliptra FMC ...
2,956,546 UART:
2,956,689 UART: [state] CFI Enabled
2,967,372 UART: [fht] FMC Alias Private Key: 7
3,075,981 UART: [art] Extend RT PCRs Done
3,076,409 UART: [art] Lock RT PCRs Done
3,077,645 UART: [art] Populate DV Done
3,086,134 UART: [fht] FMC Alias Private Key: 7
3,087,134 UART: [art] Derive CDI
3,087,414 UART: [art] Store in in slot 0x4
3,172,893 UART: [art] Derive Key Pair
3,173,253 UART: [art] Store priv key in slot 0x5
3,186,667 UART: [art] Derive Key Pair - Done
3,201,431 UART: [art] Signing Cert with AUTHO
3,201,911 UART: RITY.KEYID = 7
3,217,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,858 UART: [art] PUB.X = 43D9E78CBA933CF21F234379D9A84239A0F0E066F708C98FFCE55863C23C216A338181A9262409995F14292C428A2B0A
3,224,613 UART: [art] PUB.Y = E5705A492C6F7C1148DF6F05A23C3753F52E46043CB38E593B58728FF28507889FEC11A45963206CBF3BEAC917870204
3,231,544 UART: [art] SIG.R = 08C64B420F3C323DB7B052EAB68C93636DBBB12807E7B49E8F811638A21BEF1EAE17CE413FE679B3A290DDA3ECBF17D0
3,238,323 UART: [art] SIG.S = 29B45F4A0DA49C191598B62FE77ADC3C056071C61183917EF4BA5483191D27F243EC892478597F8CD77890E3A7CC1CC9
3,262,834 UART: Caliptra RT
3,263,179 UART: [state] CFI Enabled
3,371,252 UART: [rt] RT listening for mailbox commands...
3,371,922 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,494 UART: [rt]cmd =0x4c444556, len=4
3,411,850 >>> mbox cmd response data (687 bytes)
3,411,851 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,196 UART: [rt]cmd =0x43455246, len=4
3,453,440 >>> mbox cmd response data (887 bytes)
3,453,441 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,912 UART: [rt]cmd =0x43455252, len=4
3,493,847 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,262 UART: [idev] CSR upload begun
1,209,041 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,774 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,482 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,367 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,073 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,502 UART: [idev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
1,296,999 UART: [idev] CSR uploaded
1,300,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,213 UART: [idev] --
1,301,114 UART: [ldev] ++
1,301,282 UART: [ldev] CDI.KEYID = 6
1,301,646 UART: [ldev] SUBJECT.KEYID = 5
1,302,073 UART: [ldev] AUTHORITY.KEYID = 7
1,302,536 UART: [ldev] FE.KEYID = 1
1,307,794 UART: [ldev] Erasing FE.KEYID = 1
1,334,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,838 UART: [ldev] --
1,373,228 UART: [fwproc] Wait for Commands...
1,373,945 UART: [fwproc] Recv command 0x46574c44
1,374,678 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,394 >>> mbox cmd response: success
2,867,593 UART: [afmc] ++
2,867,761 UART: [afmc] CDI.KEYID = 6
2,868,124 UART: [afmc] SUBJECT.KEYID = 7
2,868,550 UART: [afmc] AUTHORITY.KEYID = 5
2,903,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,402 UART: [afmc] --
2,947,478 UART: [cold-reset] --
2,948,534 UART: [state] Locking Datavault
2,949,573 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,177 UART: [state] Locking ICCM
2,950,625 UART: [exit] Launching FMC @ 0x40000130
2,955,954 UART:
2,955,970 UART: Running Caliptra FMC ...
2,956,378 UART:
2,956,521 UART: [state] CFI Enabled
2,967,278 UART: [fht] FMC Alias Private Key: 7
3,075,663 UART: [art] Extend RT PCRs Done
3,076,091 UART: [art] Lock RT PCRs Done
3,077,513 UART: [art] Populate DV Done
3,085,860 UART: [fht] FMC Alias Private Key: 7
3,086,998 UART: [art] Derive CDI
3,087,278 UART: [art] Store in in slot 0x4
3,173,051 UART: [art] Derive Key Pair
3,173,411 UART: [art] Store priv key in slot 0x5
3,187,045 UART: [art] Derive Key Pair - Done
3,201,563 UART: [art] Signing Cert with AUTHO
3,202,043 UART: RITY.KEYID = 7
3,217,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,266 UART: [art] PUB.X = 200D27144574C3481923C14AD467FC04861BD4A9346FAF1E566398201829410BBC77CA7E9992ADBEC6A14845A25291BC
3,225,023 UART: [art] PUB.Y = 90D7D744ADF7FE8BA5A075340B0FAC29A8893BBD98F22FC4ED0CBB7FCE230F77C984B54800FB5400DF5B9D08F0398224
3,231,930 UART: [art] SIG.R = 933CAFC79EB9555FF4F3FFAC11B81FAA0FFD91FE7C431F79A9B286EFE079DB94F9F90C55A0EE15FB85A0365817D9BF0B
3,238,717 UART: [art] SIG.S = F2267DA8E3E5BD9A363FEFD703EAA2895F63FEC43BA752DB27AB411D5C945C7BB2D56CE83376D114624090B23E5EF628
3,262,877 UART: Caliptra RT
3,263,222 UART: [state] CFI Enabled
3,371,886 UART: [rt] RT listening for mailbox commands...
3,372,556 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,250 UART: [rt]cmd =0x4c444556, len=4
3,412,478 >>> mbox cmd response data (687 bytes)
3,412,479 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,822 UART: [rt]cmd =0x43455246, len=4
3,453,954 >>> mbox cmd response data (887 bytes)
3,453,955 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,134 UART: [rt]cmd =0x43455252, len=4
3,493,874 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 889.00s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,825,412 UART: [art] Lock RT PCRs Done
2,827,024 UART: [art] Populate DV Done
2,835,689 UART: [fht] FMC Alias Private Key: 7
2,836,703 UART: [art] Derive CDI
2,836,983 UART: [art] Store in in slot 0x4
2,922,628 UART: [art] Derive Key Pair
2,922,988 UART: [art] Store priv key in slot 0x5
2,936,844 UART: [art] Derive Key Pair - Done
2,951,690 UART: [art] Signing Cert with AUTHO
2,952,170 UART: RITY.KEYID = 7
2,967,586 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,351 UART: [art] PUB.X = 0D7FDC68CEF481C951347C18A5F20E4B18DF4DD94A6831E5CA5267006D4503C9BF4311B57AB7797A26E04CA31EA11B11
2,975,098 UART: [art] PUB.Y = AA803646BE069F1339A36B1703D6460F99DACE97F7FC0B23AC21B08471BE19F2C1AFF464918DDAB5A33CF0536AA0DD55
2,982,050 UART: [art] SIG.R = DC2B28AD976EC6E46E0592D999DA7EA92F2819C12B1041D9F6D270207FDBD0A9E69BB5476C82D6E0A21A30FF6A0CA39B
2,988,830 UART: [art] SIG.S = 777DC3B90E4CDF527BA3B3A182E3ECD5B2A3B9BBD2460B6992A822BB4EC447FC528F1E14008DB356C9CF007F987850DF
3,012,419 UART: Caliptra RT
3,012,764 UART: [state] CFI Enabled
3,120,451 UART: [rt] RT listening for mailbox commands...
3,121,121 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,861 UART: [rt]cmd =0x4c444556, len=4
3,161,321 >>> mbox cmd response data (687 bytes)
3,161,322 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,837 UART: [rt]cmd =0x43455246, len=4
3,203,085 >>> mbox cmd response data (887 bytes)
3,203,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,445 UART: [rt]cmd =0x43455252, len=4
3,243,198 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,563 >>> mbox cmd response: success
2,704,159 UART:
2,704,175 UART: Running Caliptra FMC ...
2,704,583 UART:
2,704,726 UART: [state] CFI Enabled
2,715,417 UART: [fht] FMC Alias Private Key: 7
2,822,774 UART: [art] Extend RT PCRs Done
2,823,202 UART: [art] Lock RT PCRs Done
2,824,676 UART: [art] Populate DV Done
2,832,889 UART: [fht] FMC Alias Private Key: 7
2,833,937 UART: [art] Derive CDI
2,834,217 UART: [art] Store in in slot 0x4
2,920,148 UART: [art] Derive Key Pair
2,920,508 UART: [art] Store priv key in slot 0x5
2,934,292 UART: [art] Derive Key Pair - Done
2,949,047 UART: [art] Signing Cert with AUTHO
2,949,527 UART: RITY.KEYID = 7
2,964,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,530 UART: [art] PUB.X = 5A2BD98B1CD1E6CCE37522F34B02BDA49C8AB6EA1DC760A372726F54BFE121222908125FF1D1281F42AA2B2DA11E4FA6
2,972,310 UART: [art] PUB.Y = 6CE2138A8862502432F68F36DA5E79F9C290D3F9F96B52F6B93E2A1D420B766414199A44CD25A1E9F7825CA7F71F57A4
2,979,257 UART: [art] SIG.R = D13CBD56E535582925FF01E7DEC435F0F0A7E979C50C042A58347822E9D350500CF1F99ECD87475CFF94B035018DCCB2
2,986,018 UART: [art] SIG.S = E6ED15189C83C995A8AAF777184BADE7C79D5F771E17A6ED540B5923BFC74FE445CA4B3790813CA0AD84600C021DFFDC
3,010,142 UART: Caliptra RT
3,010,487 UART: [state] CFI Enabled
3,118,809 UART: [rt] RT listening for mailbox commands...
3,119,479 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,093 UART: [rt]cmd =0x4c444556, len=4
3,159,661 >>> mbox cmd response data (687 bytes)
3,159,662 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,891 UART: [rt]cmd =0x43455246, len=4
3,200,959 >>> mbox cmd response data (887 bytes)
3,200,960 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,487 UART: [rt]cmd =0x43455252, len=4
3,241,145 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,907 >>> mbox cmd response: success
2,705,779 UART:
2,705,795 UART: Running Caliptra FMC ...
2,706,203 UART:
2,706,346 UART: [state] CFI Enabled
2,716,707 UART: [fht] FMC Alias Private Key: 7
2,824,914 UART: [art] Extend RT PCRs Done
2,825,342 UART: [art] Lock RT PCRs Done
2,826,820 UART: [art] Populate DV Done
2,834,983 UART: [fht] FMC Alias Private Key: 7
2,835,927 UART: [art] Derive CDI
2,836,207 UART: [art] Store in in slot 0x4
2,922,306 UART: [art] Derive Key Pair
2,922,666 UART: [art] Store priv key in slot 0x5
2,936,210 UART: [art] Derive Key Pair - Done
2,950,832 UART: [art] Signing Cert with AUTHO
2,951,312 UART: RITY.KEYID = 7
2,966,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,221 UART: [art] PUB.X = B948A884CFD0AC338B531433613D214ACBD3DA0CD846199E56F6965129E9D2A5CA03C37D7105CBAA59B548E71129161C
2,973,986 UART: [art] PUB.Y = 7315E2E3AFC9FDC052E66E4A49974844B6C4E7101863C343D9374CB3532D30554B753F45C673C030D1508C8120B0F96B
2,980,930 UART: [art] SIG.R = 7DF31F0589265AF728C7650CCD735BE161475763C44B14A4BA51842BAE2AEF2C10D2A33B1D4EE0EA4E5D7750C5C69EF6
2,987,706 UART: [art] SIG.S = 2C005F4A6F5AC485995A4A46902A8FFC7108C93648035956071034A7967DE10C0162EE99562DE6FAB1FB4589B1D14AB1
3,011,334 UART: Caliptra RT
3,011,679 UART: [state] CFI Enabled
3,119,818 UART: [rt] RT listening for mailbox commands...
3,120,488 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,254 UART: [rt]cmd =0x4c444556, len=4
3,160,760 >>> mbox cmd response data (687 bytes)
3,160,761 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,126 UART: [rt]cmd =0x43455246, len=4
3,202,358 >>> mbox cmd response data (887 bytes)
3,202,359 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,720 UART: [rt]cmd =0x43455252, len=4
3,242,773 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,640,933 >>> mbox cmd response: success
2,702,061 UART:
2,702,077 UART: Running Caliptra FMC ...
2,702,485 UART:
2,702,628 UART: [state] CFI Enabled
2,713,557 UART: [fht] FMC Alias Private Key: 7
2,821,966 UART: [art] Extend RT PCRs Done
2,822,394 UART: [art] Lock RT PCRs Done
2,824,232 UART: [art] Populate DV Done
2,832,487 UART: [fht] FMC Alias Private Key: 7
2,833,429 UART: [art] Derive CDI
2,833,709 UART: [art] Store in in slot 0x4
2,919,418 UART: [art] Derive Key Pair
2,919,778 UART: [art] Store priv key in slot 0x5
2,933,198 UART: [art] Derive Key Pair - Done
2,947,946 UART: [art] Signing Cert with AUTHO
2,948,426 UART: RITY.KEYID = 7
2,963,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,137 UART: [art] PUB.X = BAE2105428B27511DDA71354534D4F36DC5356A8D199FC5A7846A87FDC4A3A2FFA8039BCD43D96BBB4A07B81B21C7A4E
2,970,921 UART: [art] PUB.Y = E4A57B496808486AC933486315D00931A68192F8667DDF43C26516131FC94FEA39A2768AF0ACBA779421F8852A66CDF4
2,977,861 UART: [art] SIG.R = 1C7B08357DBB730D099590B9D7B7DC36B1B1F9FEE629B874C5D45DCE59453E6582A8CA5D16C800520B1977B391C5638F
2,984,601 UART: [art] SIG.S = 55539044FB490584A6464A61A54FD442330AD4733FB165EC4DB0A9222E243C359A6AE3D3CDA9F776EF59831BDC529684
3,008,954 UART: Caliptra RT
3,009,299 UART: [state] CFI Enabled
3,117,032 UART: [rt] RT listening for mailbox commands...
3,117,702 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,500 UART: [rt]cmd =0x4c444556, len=4
3,157,908 >>> mbox cmd response data (687 bytes)
3,157,909 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,184 UART: [rt]cmd =0x43455246, len=4
3,199,186 >>> mbox cmd response data (887 bytes)
3,199,187 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,576 UART: [rt]cmd =0x43455252, len=4
3,239,385 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,703 >>> mbox cmd response: success
2,704,845 UART:
2,704,861 UART: Running Caliptra FMC ...
2,705,269 UART:
2,705,412 UART: [state] CFI Enabled
2,716,259 UART: [fht] FMC Alias Private Key: 7
2,823,750 UART: [art] Extend RT PCRs Done
2,824,178 UART: [art] Lock RT PCRs Done
2,825,622 UART: [art] Populate DV Done
2,833,599 UART: [fht] FMC Alias Private Key: 7
2,834,609 UART: [art] Derive CDI
2,834,889 UART: [art] Store in in slot 0x4
2,920,766 UART: [art] Derive Key Pair
2,921,126 UART: [art] Store priv key in slot 0x5
2,934,064 UART: [art] Derive Key Pair - Done
2,948,585 UART: [art] Signing Cert with AUTHO
2,949,065 UART: RITY.KEYID = 7
2,963,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,752 UART: [art] PUB.X = 820EECEB01678B62B7CCE590B867B4564763DBCBF4A10AFAEF5B249815B4BAEB43AA21635FF7FB0FB11B1CC953443B18
2,971,530 UART: [art] PUB.Y = E5ECAA7585B8FEBB4B20B5A4C99AE109D5E067E5FC76AA5FF0391C841011361945C20F9BAAC2FC42DE31F828C83D67C6
2,978,492 UART: [art] SIG.R = 204D976AF1EAF0A23422AA9A737592F92AA6AED81C5C50C161A09F9D387BFF7B71093041628F474D4779EE0DB6E7F525
2,985,262 UART: [art] SIG.S = BA4EC90DA8B04C123C939C5323BDC8A3BACE097A62E746DCBA89306A855A50DEA334A4EAF07C8BC36B5AAF160A8FDAA4
3,009,082 UART: Caliptra RT
3,009,427 UART: [state] CFI Enabled
3,117,304 UART: [rt] RT listening for mailbox commands...
3,117,974 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,858 UART: [rt]cmd =0x4c444556, len=4
3,158,232 >>> mbox cmd response data (687 bytes)
3,158,233 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,528 UART: [rt]cmd =0x43455246, len=4
3,199,642 >>> mbox cmd response data (887 bytes)
3,199,643 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,018 UART: [rt]cmd =0x43455252, len=4
3,240,139 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 857.09s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,370 UART: [idev] CSR uploaded
1,299,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,584 UART: [idev] --
1,300,703 UART: [ldev] ++
1,300,871 UART: [ldev] CDI.KEYID = 6
1,301,235 UART: [ldev] SUBJECT.KEYID = 5
1,301,662 UART: [ldev] AUTHORITY.KEYID = 7
1,302,125 UART: [ldev] FE.KEYID = 1
1,307,467 UART: [ldev] Erasing FE.KEYID = 1
1,333,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,329 UART: [ldev] --
1,372,801 UART: [fwproc] Wait for Commands...
1,373,596 UART: [fwproc] Recv command 0x46574c44
1,374,329 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,469 >>> mbox cmd response: success
2,868,670 UART: [afmc] ++
2,868,838 UART: [afmc] CDI.KEYID = 6
2,869,201 UART: [afmc] SUBJECT.KEYID = 7
2,869,627 UART: [afmc] AUTHORITY.KEYID = 5
2,904,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,057 UART: [afmc] --
2,948,107 UART: [cold-reset] --
2,948,967 UART: [state] Locking Datavault
2,950,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,734 UART: [state] Locking ICCM
2,951,398 UART: [exit] Launching FMC @ 0x40000130
2,956,727 UART:
2,956,743 UART: Running Caliptra FMC ...
2,957,151 UART:
2,957,205 UART: [state] CFI Enabled
2,967,640 UART: [fht] FMC Alias Private Key: 7
3,075,851 UART: [art] Extend RT PCRs Done
3,076,279 UART: [art] Lock RT PCRs Done
3,077,655 UART: [art] Populate DV Done
3,086,124 UART: [fht] FMC Alias Private Key: 7
3,087,176 UART: [art] Derive CDI
3,087,456 UART: [art] Store in in slot 0x4
3,173,337 UART: [art] Derive Key Pair
3,173,697 UART: [art] Store priv key in slot 0x5
3,186,439 UART: [art] Derive Key Pair - Done
3,201,322 UART: [art] Signing Cert with AUTHO
3,201,802 UART: RITY.KEYID = 7
3,216,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,721 UART: [art] PUB.X = 9314E3DDEE19A188EFA9808A210829A20AD42DE9161A31C247949DD2E2A7AAC40E1BD513EF8A2E98DED3EE4E5FA02F3D
3,224,502 UART: [art] PUB.Y = 549E3BDAC22AD79E6B68D4B3075ED7C8CF57E33CAAF3B247E7EC6171B2B7D7C7CD58AB24B8BCA6F28D8AFE5552642499
3,231,471 UART: [art] SIG.R = DAB1F55D7696C637AFAA33B7CFCC161E1A0FB77540971902B8C4ECFE1694B0273878523D7881965A3161A7556983349B
3,238,233 UART: [art] SIG.S = BDC2E550D49277B3B0D3CF2EDC70B9CA332003F0E5F3920F7E591B11A3E47E5AD82F42DDBBE26A711350945ADD25A69A
3,262,110 UART: Caliptra RT
3,262,363 UART: [state] CFI Enabled
3,370,729 UART: [rt] RT listening for mailbox commands...
3,371,399 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,247 UART: [rt]cmd =0x4c444556, len=4
3,411,863 >>> mbox cmd response data (687 bytes)
3,411,864 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,175 UART: [rt]cmd =0x43455246, len=4
3,453,439 >>> mbox cmd response data (887 bytes)
3,453,440 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,781 UART: [rt]cmd =0x43455252, len=4
3,493,605 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,204 UART: [kat] LMS
1,168,516 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,671 UART: [fht] FHT @ 0x50003400
1,172,285 UART: [idev] ++
1,172,453 UART: [idev] CDI.KEYID = 6
1,172,814 UART: [idev] SUBJECT.KEYID = 7
1,173,239 UART: [idev] UDS.KEYID = 0
1,181,139 UART: [idev] Erasing UDS.KEYID = 0
1,197,417 UART: [idev] Sha1 KeyId Algorithm
1,205,545 UART: [idev] CSR upload begun
1,207,324 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,063 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,771 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,656 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,362 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,791 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,295,288 UART: [idev] CSR uploaded
1,298,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,298,502 UART: [idev] --
1,299,377 UART: [ldev] ++
1,299,545 UART: [ldev] CDI.KEYID = 6
1,299,909 UART: [ldev] SUBJECT.KEYID = 5
1,300,336 UART: [ldev] AUTHORITY.KEYID = 7
1,300,799 UART: [ldev] FE.KEYID = 1
1,306,003 UART: [ldev] Erasing FE.KEYID = 1
1,332,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,033 UART: [ldev] --
1,371,323 UART: [fwproc] Wait for Commands...
1,371,958 UART: [fwproc] Recv command 0x46574c44
1,372,691 UART: [fwproc] Recv'd Img size: 114448 bytes
2,671,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,863,859 >>> mbox cmd response: success
2,864,902 UART: [afmc] ++
2,865,070 UART: [afmc] CDI.KEYID = 6
2,865,433 UART: [afmc] SUBJECT.KEYID = 7
2,865,859 UART: [afmc] AUTHORITY.KEYID = 5
2,901,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,161 UART: [afmc] --
2,945,071 UART: [cold-reset] --
2,945,915 UART: [state] Locking Datavault
2,947,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,634 UART: [state] Locking ICCM
2,948,112 UART: [exit] Launching FMC @ 0x40000130
2,953,441 UART:
2,953,457 UART: Running Caliptra FMC ...
2,953,865 UART:
2,953,919 UART: [state] CFI Enabled
2,964,308 UART: [fht] FMC Alias Private Key: 7
3,072,013 UART: [art] Extend RT PCRs Done
3,072,441 UART: [art] Lock RT PCRs Done
3,073,845 UART: [art] Populate DV Done
3,082,084 UART: [fht] FMC Alias Private Key: 7
3,083,056 UART: [art] Derive CDI
3,083,336 UART: [art] Store in in slot 0x4
3,168,787 UART: [art] Derive Key Pair
3,169,147 UART: [art] Store priv key in slot 0x5
3,182,121 UART: [art] Derive Key Pair - Done
3,197,403 UART: [art] Signing Cert with AUTHO
3,197,883 UART: RITY.KEYID = 7
3,213,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,934 UART: [art] PUB.X = A9EE508943397BB460460BE0AAFB0AD2E65F55346FEA9E7D477683C2C9788A7647FCFE3284DF0D4257E367B62DB74D6C
3,220,705 UART: [art] PUB.Y = C7FF42BB278C2588BA9F4C746AF99A71177689525CF1087632C2482B7C990B036A3BDF9E3618661585D69A32D066B572
3,227,640 UART: [art] SIG.R = 12AEF1DADB1E66D7E0C9A0B3E513076A7C67AD240EDA5A8BA4FAACF1972386F17D0DE3B93287FCABED9A456EE908E27F
3,234,426 UART: [art] SIG.S = 83E15F54BC7D2A301B73A0A361ADF1E881B0F6877EE66DBB3E981372FD64EB5655E5B746E1DF8904D032F81234F75AB3
3,257,836 UART: Caliptra RT
3,258,089 UART: [state] CFI Enabled
3,366,258 UART: [rt] RT listening for mailbox commands...
3,366,928 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,638 UART: [rt]cmd =0x4c444556, len=4
3,407,096 >>> mbox cmd response data (687 bytes)
3,407,097 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,286 UART: [rt]cmd =0x43455246, len=4
3,448,440 >>> mbox cmd response data (887 bytes)
3,448,441 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,870 UART: [rt]cmd =0x43455252, len=4
3,488,635 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 890.98s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,823,508 UART: [art] Lock RT PCRs Done
2,825,090 UART: [art] Populate DV Done
2,833,343 UART: [fht] FMC Alias Private Key: 7
2,834,397 UART: [art] Derive CDI
2,834,677 UART: [art] Store in in slot 0x4
2,920,132 UART: [art] Derive Key Pair
2,920,492 UART: [art] Store priv key in slot 0x5
2,933,414 UART: [art] Derive Key Pair - Done
2,948,258 UART: [art] Signing Cert with AUTHO
2,948,738 UART: RITY.KEYID = 7
2,964,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,273 UART: [art] PUB.X = 31DD5438E31563E3590D0C87F8DAA5129517B598D75A8F117328A5C675A6C9A83F4CABEA045D151FA18AD29A0DCCA64D
2,972,041 UART: [art] PUB.Y = 2F4517CCBE050929EA3D6990E112724070886FB8E18AE526ECC3C619DB8BBC89A6AEB37212C32FE2A448FF3B59B7F067
2,978,995 UART: [art] SIG.R = D925A4655073CF3B6E7D49087952F162AFE5DD573424296E33E47C2CDD16EA9E1CD2309B1658B043B2E492FA74E221AA
2,985,766 UART: [art] SIG.S = B0B408D984F0D02155231F4353524FC20D4E20447EB09FD5D425913ECC25D51CF2D9A3593E44EBEAA40A481AF43321BC
3,009,432 UART: Caliptra RT
3,009,685 UART: [state] CFI Enabled
3,116,941 UART: [rt] RT listening for mailbox commands...
3,117,611 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,711 UART: [rt]cmd =0x4c444556, len=4
3,158,167 >>> mbox cmd response data (687 bytes)
3,158,168 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,487 UART: [rt]cmd =0x43455246, len=4
3,199,677 >>> mbox cmd response data (887 bytes)
3,199,678 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,043 UART: [rt]cmd =0x43455252, len=4
3,239,805 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,838 >>> mbox cmd response: success
2,704,644 UART:
2,704,660 UART: Running Caliptra FMC ...
2,705,068 UART:
2,705,122 UART: [state] CFI Enabled
2,715,477 UART: [fht] FMC Alias Private Key: 7
2,823,528 UART: [art] Extend RT PCRs Done
2,823,956 UART: [art] Lock RT PCRs Done
2,825,332 UART: [art] Populate DV Done
2,833,579 UART: [fht] FMC Alias Private Key: 7
2,834,753 UART: [art] Derive CDI
2,835,033 UART: [art] Store in in slot 0x4
2,920,786 UART: [art] Derive Key Pair
2,921,146 UART: [art] Store priv key in slot 0x5
2,934,696 UART: [art] Derive Key Pair - Done
2,949,450 UART: [art] Signing Cert with AUTHO
2,949,930 UART: RITY.KEYID = 7
2,964,810 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,575 UART: [art] PUB.X = 383CD74601F257D724F08E318D9563D74A558CB78790BE0C9CF3FB20390D45A1A7D0AE12A0ABD3DE7A8E94F4BEBE6F61
2,972,350 UART: [art] PUB.Y = A16588FEC689476C971A87DB2353E99888DD9BC3C34095348BAABD300FF68D3D24DB937E9415F873B578BFF35F827F29
2,979,301 UART: [art] SIG.R = 33BB35C0861AAB05E6941875F482BBA3C9689DBAC9953841554B12CA46A41094C49403686C687EF438BBF2CD7A74112C
2,986,065 UART: [art] SIG.S = D8AB6F2F29CB83298C4A98E19ADA525C76208F89ABC2BEB7028FBA527871088FA5403F407B5D969A3F2C6D1DFBDB0647
3,010,453 UART: Caliptra RT
3,010,706 UART: [state] CFI Enabled
3,118,689 UART: [rt] RT listening for mailbox commands...
3,119,359 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,073 UART: [rt]cmd =0x4c444556, len=4
3,159,495 >>> mbox cmd response data (687 bytes)
3,159,496 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,959 UART: [rt]cmd =0x43455246, len=4
3,201,013 >>> mbox cmd response data (887 bytes)
3,201,014 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,245 UART: [rt]cmd =0x43455252, len=4
3,241,286 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,204 >>> mbox cmd response: success
2,703,360 UART:
2,703,376 UART: Running Caliptra FMC ...
2,703,784 UART:
2,703,838 UART: [state] CFI Enabled
2,714,511 UART: [fht] FMC Alias Private Key: 7
2,822,304 UART: [art] Extend RT PCRs Done
2,822,732 UART: [art] Lock RT PCRs Done
2,824,296 UART: [art] Populate DV Done
2,832,645 UART: [fht] FMC Alias Private Key: 7
2,833,597 UART: [art] Derive CDI
2,833,877 UART: [art] Store in in slot 0x4
2,919,300 UART: [art] Derive Key Pair
2,919,660 UART: [art] Store priv key in slot 0x5
2,932,758 UART: [art] Derive Key Pair - Done
2,947,356 UART: [art] Signing Cert with AUTHO
2,947,836 UART: RITY.KEYID = 7
2,963,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,977 UART: [art] PUB.X = 5D82003D665B434D272248DC696966037B595371A5D0E59AD667D473E075FFD4C1A1D30B2BE5D17F59577E03B51BB68C
2,970,714 UART: [art] PUB.Y = A5A43FB2BD3DBC36FE789BD34EDEFB54A81BD698AB0A17C58A9AC508123FBB75D57673F404E0E864ABD65571B0E89B5F
2,977,677 UART: [art] SIG.R = D68D18089C3F348E57F46867233F514C7A3B65AFAA4452FC5FF1E725F8B0305F819F3222FF26695DDC9F1F067D5F2FD3
2,984,447 UART: [art] SIG.S = 70B23643B4A54651D0CAF131E64E75F75ADF0EE83B66BC608BAA9801CB1379BCCE114E3976624A706C1462DEAA6BC8B3
3,007,688 UART: Caliptra RT
3,007,941 UART: [state] CFI Enabled
3,114,706 UART: [rt] RT listening for mailbox commands...
3,115,376 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,194 UART: [rt]cmd =0x4c444556, len=4
3,155,736 >>> mbox cmd response data (687 bytes)
3,155,737 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,818 UART: [rt]cmd =0x43455246, len=4
3,196,854 >>> mbox cmd response data (887 bytes)
3,196,855 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,036 UART: [rt]cmd =0x43455252, len=4
3,236,877 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,774 >>> mbox cmd response: success
2,706,014 UART:
2,706,030 UART: Running Caliptra FMC ...
2,706,438 UART:
2,706,492 UART: [state] CFI Enabled
2,716,953 UART: [fht] FMC Alias Private Key: 7
2,824,978 UART: [art] Extend RT PCRs Done
2,825,406 UART: [art] Lock RT PCRs Done
2,826,864 UART: [art] Populate DV Done
2,835,043 UART: [fht] FMC Alias Private Key: 7
2,836,155 UART: [art] Derive CDI
2,836,435 UART: [art] Store in in slot 0x4
2,922,104 UART: [art] Derive Key Pair
2,922,464 UART: [art] Store priv key in slot 0x5
2,935,240 UART: [art] Derive Key Pair - Done
2,949,771 UART: [art] Signing Cert with AUTHO
2,950,251 UART: RITY.KEYID = 7
2,965,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,580 UART: [art] PUB.X = 4FCB0034BB22D25ACAD2EDB75A34B5C155D510D990646AEE567292EB91596AF7C6F48B44B4413A97C1E86F94B8C14742
2,973,336 UART: [art] PUB.Y = 9AB70C25F14C56508C4D121259FF32BD2A3F6EDF8DF4FCE3A45AA8A73FBEA169DF6C947B098870FD43C95E650990FA09
2,980,290 UART: [art] SIG.R = D5A3D52C9154D9D971ADF849077FEFA9CCC655F763F3B586ADEB71D41C95CEB5975CF6D2A8CFEB6D827314B43B15F1EB
2,987,079 UART: [art] SIG.S = 3803F0BED609469C584BB637183CC80F1596A9784674D762F5B5C9C5E26A55C0DDB8F1E430C7D805C987DEDAA45E7626
3,011,250 UART: Caliptra RT
3,011,503 UART: [state] CFI Enabled
3,118,168 UART: [rt] RT listening for mailbox commands...
3,118,838 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,582 UART: [rt]cmd =0x4c444556, len=4
3,158,848 >>> mbox cmd response data (687 bytes)
3,158,849 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,086 UART: [rt]cmd =0x43455246, len=4
3,200,120 >>> mbox cmd response data (887 bytes)
3,200,121 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,514 UART: [rt]cmd =0x43455252, len=4
3,240,391 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,364 >>> mbox cmd response: success
2,705,680 UART:
2,705,696 UART: Running Caliptra FMC ...
2,706,104 UART:
2,706,158 UART: [state] CFI Enabled
2,716,785 UART: [fht] FMC Alias Private Key: 7
2,824,818 UART: [art] Extend RT PCRs Done
2,825,246 UART: [art] Lock RT PCRs Done
2,826,920 UART: [art] Populate DV Done
2,835,047 UART: [fht] FMC Alias Private Key: 7
2,836,029 UART: [art] Derive CDI
2,836,309 UART: [art] Store in in slot 0x4
2,921,760 UART: [art] Derive Key Pair
2,922,120 UART: [art] Store priv key in slot 0x5
2,935,304 UART: [art] Derive Key Pair - Done
2,950,381 UART: [art] Signing Cert with AUTHO
2,950,861 UART: RITY.KEYID = 7
2,966,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,190 UART: [art] PUB.X = 04F994C57F3A61C9DC4ABA33532131916AE52A2AF4A37D9043572DEE9A11C72B94B4C9F317240412F37F3BA936A52C5F
2,973,958 UART: [art] PUB.Y = 43D6EB5E1AFA4ACEFAF6336C0D5A596AAB3729CDB8D2FF22973CBBCF6B3A26B4C358D0AE827D3B542CA3E675D044D86F
2,980,933 UART: [art] SIG.R = 2798E2321FFC7DA11AFA34365846AC30398AC1E50D720EED1ECA4B90D223EACA245CC8C45315A074C298CFDABA8C016A
2,987,712 UART: [art] SIG.S = 0EF80218886A728F0991771EF1DADAD86AB20B2BC1A9D2E2A7C44E031DD93E7C2D2BB6C034F096864BF8CCC1ED23695E
3,010,902 UART: Caliptra RT
3,011,155 UART: [state] CFI Enabled
3,118,866 UART: [rt] RT listening for mailbox commands...
3,119,536 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,312 UART: [rt]cmd =0x4c444556, len=4
3,159,874 >>> mbox cmd response data (687 bytes)
3,159,875 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,324 UART: [rt]cmd =0x43455246, len=4
3,201,454 >>> mbox cmd response data (887 bytes)
3,201,455 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,868 UART: [rt]cmd =0x43455252, len=4
3,241,711 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 857.33s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,345 UART: [idev] CSR uploaded
1,301,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,559 UART: [idev] --
1,302,554 UART: [ldev] ++
1,302,722 UART: [ldev] CDI.KEYID = 6
1,303,086 UART: [ldev] SUBJECT.KEYID = 5
1,303,513 UART: [ldev] AUTHORITY.KEYID = 7
1,303,976 UART: [ldev] FE.KEYID = 1
1,309,202 UART: [ldev] Erasing FE.KEYID = 1
1,335,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,494 UART: [ldev] --
1,374,992 UART: [fwproc] Wait for Commands...
1,375,689 UART: [fwproc] Recv command 0x46574c44
1,376,422 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,856 >>> mbox cmd response: success
2,867,931 UART: [afmc] ++
2,868,099 UART: [afmc] CDI.KEYID = 6
2,868,462 UART: [afmc] SUBJECT.KEYID = 7
2,868,888 UART: [afmc] AUTHORITY.KEYID = 5
2,904,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,760 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,479 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,328 UART: [afmc] --
2,948,374 UART: [cold-reset] --
2,949,400 UART: [state] Locking Datavault
2,950,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,029 UART: [state] Locking ICCM
2,951,699 UART: [exit] Launching FMC @ 0x40000130
2,957,028 UART:
2,957,044 UART: Running Caliptra FMC ...
2,957,452 UART:
2,957,595 UART: [state] CFI Enabled
2,968,200 UART: [fht] FMC Alias Private Key: 7
3,075,605 UART: [art] Extend RT PCRs Done
3,076,033 UART: [art] Lock RT PCRs Done
3,077,567 UART: [art] Populate DV Done
3,085,582 UART: [fht] FMC Alias Private Key: 7
3,086,634 UART: [art] Derive CDI
3,086,914 UART: [art] Store in in slot 0x4
3,172,761 UART: [art] Derive Key Pair
3,173,121 UART: [art] Store priv key in slot 0x5
3,186,193 UART: [art] Derive Key Pair - Done
3,200,968 UART: [art] Signing Cert with AUTHO
3,201,448 UART: RITY.KEYID = 7
3,216,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,365 UART: [art] PUB.X = 525E3CC1F8A7CC7872E7D83AB05C0B29047C7E4E253D42D7AD42E95D03FA1822BBDAA5E4D1CA7395780EB7EB4CC3E1B6
3,224,143 UART: [art] PUB.Y = DDAA6A6668333ABA25619F1DAC7AAE3D9B93EEC3569F124EAD012A5FE23F2629D0A5BE9E396D4BB50F808BCE76E484C5
3,231,109 UART: [art] SIG.R = 34FDED471284505F374E3BDF2A71F1E438DEC59B1B3CAB848E9BAC94CD9EE01961A02313775863092BD69B8FBFCFEE1E
3,237,894 UART: [art] SIG.S = 60911A574C10EA6A95D96BA5168831B35B310043AAD5D089105CA191B6F4C65B4C557E32422953775B35614138E334C5
3,261,329 UART: Caliptra RT
3,261,674 UART: [state] CFI Enabled
3,370,047 UART: [rt] RT listening for mailbox commands...
3,370,717 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,567 UART: [rt]cmd =0x4c444556, len=4
3,410,831 >>> mbox cmd response data (687 bytes)
3,410,832 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,175 UART: [rt]cmd =0x43455246, len=4
3,452,359 >>> mbox cmd response data (887 bytes)
3,452,360 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,815 UART: [rt]cmd =0x43455252, len=4
3,492,816 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,198,716 UART: [idev] Sha1 KeyId Algorithm
1,207,242 UART: [idev] CSR upload begun
1,209,021 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,604 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,312 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,197 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,903 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,332 UART: [idev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
1,296,829 UART: [idev] CSR uploaded
1,299,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,043 UART: [idev] --
1,301,148 UART: [ldev] ++
1,301,316 UART: [ldev] CDI.KEYID = 6
1,301,680 UART: [ldev] SUBJECT.KEYID = 5
1,302,107 UART: [ldev] AUTHORITY.KEYID = 7
1,302,570 UART: [ldev] FE.KEYID = 1
1,307,594 UART: [ldev] Erasing FE.KEYID = 1
1,333,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,604 UART: [ldev] --
1,373,006 UART: [fwproc] Wait for Commands...
1,373,683 UART: [fwproc] Recv command 0x46574c44
1,374,416 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,172 >>> mbox cmd response: success
2,867,365 UART: [afmc] ++
2,867,533 UART: [afmc] CDI.KEYID = 6
2,867,896 UART: [afmc] SUBJECT.KEYID = 7
2,868,322 UART: [afmc] AUTHORITY.KEYID = 5
2,903,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,989 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,658 UART: [afmc] --
2,946,684 UART: [cold-reset] --
2,947,542 UART: [state] Locking Datavault
2,948,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,261 UART: [state] Locking ICCM
2,949,715 UART: [exit] Launching FMC @ 0x40000130
2,955,044 UART:
2,955,060 UART: Running Caliptra FMC ...
2,955,468 UART:
2,955,611 UART: [state] CFI Enabled
2,966,110 UART: [fht] FMC Alias Private Key: 7
3,074,333 UART: [art] Extend RT PCRs Done
3,074,761 UART: [art] Lock RT PCRs Done
3,076,243 UART: [art] Populate DV Done
3,084,340 UART: [fht] FMC Alias Private Key: 7
3,085,368 UART: [art] Derive CDI
3,085,648 UART: [art] Store in in slot 0x4
3,171,267 UART: [art] Derive Key Pair
3,171,627 UART: [art] Store priv key in slot 0x5
3,184,917 UART: [art] Derive Key Pair - Done
3,199,496 UART: [art] Signing Cert with AUTHO
3,199,976 UART: RITY.KEYID = 7
3,215,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,957 UART: [art] PUB.X = 39B93D22EE37E1A99A0B46BCDD57E15C15C2063B3D5CE5F936C434FAD31F87EAA8BCFD8571E327AE2EFB07A04971F201
3,222,733 UART: [art] PUB.Y = 62C140FD82D696F0913DAD745F9A1DE591B5BD0F62E3BAE61AB381937C0DCA2C73CE754B0B4496DA5F5F6032A0DD8248
3,229,688 UART: [art] SIG.R = 39C50E32D531F1C8A754511D6C79B33750F16DCEE0C786742D96738C18D127DCA4885FF5641C5539F46F34990E402BD6
3,236,448 UART: [art] SIG.S = C568E383289AF6F02F1FA539C7D13BA7F3FF672C96623A25CD8940604FE3A068376CE0BCAFC9A709F0948C720E12CE37
3,260,155 UART: Caliptra RT
3,260,500 UART: [state] CFI Enabled
3,368,445 UART: [rt] RT listening for mailbox commands...
3,369,115 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,865 UART: [rt]cmd =0x4c444556, len=4
3,409,147 >>> mbox cmd response data (687 bytes)
3,409,148 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,261 UART: [rt]cmd =0x43455246, len=4
3,450,289 >>> mbox cmd response data (887 bytes)
3,450,290 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,991 UART: [rt]cmd =0x43455252, len=4
3,490,936 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 896.99s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,827,060 UART: [art] Lock RT PCRs Done
2,828,792 UART: [art] Populate DV Done
2,836,981 UART: [fht] FMC Alias Private Key: 7
2,838,121 UART: [art] Derive CDI
2,838,401 UART: [art] Store in in slot 0x4
2,924,196 UART: [art] Derive Key Pair
2,924,556 UART: [art] Store priv key in slot 0x5
2,937,576 UART: [art] Derive Key Pair - Done
2,952,660 UART: [art] Signing Cert with AUTHO
2,953,140 UART: RITY.KEYID = 7
2,968,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,057 UART: [art] PUB.X = 6828984594E8148D51C720BC39401371EC5FCCA5C6ABE569A46D00BDA85CABB403808DEEE77372BBAA180BB33CFEF7C7
2,975,815 UART: [art] PUB.Y = 246A3F33E5BC34F80187D9E81F7BAE46D43E097845CF78A0283BCE4DC59666FE7C87B42B56A1E8F54827E8F0E2339AAF
2,982,769 UART: [art] SIG.R = 062E02A35CEAA9D4DB2E98491DABC6884795F206BC0598CE0AB851A23F50C2A1B4AB19757A56BA5821AB9F6E17D90D59
2,989,533 UART: [art] SIG.S = DC0FDAEE580EA7B4FA1BE971832E996D91B372D58208803BE7FDEB2F1F78C3510E28C0E674D0B01AE04921BCA0DB1809
3,012,943 UART: Caliptra RT
3,013,288 UART: [state] CFI Enabled
3,121,439 UART: [rt] RT listening for mailbox commands...
3,122,109 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,869 UART: [rt]cmd =0x4c444556, len=4
3,162,431 >>> mbox cmd response data (687 bytes)
3,162,432 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,527 UART: [rt]cmd =0x43455246, len=4
3,203,825 >>> mbox cmd response data (887 bytes)
3,203,826 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,311 UART: [rt]cmd =0x43455252, len=4
3,244,040 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,453 >>> mbox cmd response: success
2,705,815 UART:
2,705,831 UART: Running Caliptra FMC ...
2,706,239 UART:
2,706,382 UART: [state] CFI Enabled
2,717,065 UART: [fht] FMC Alias Private Key: 7
2,824,738 UART: [art] Extend RT PCRs Done
2,825,166 UART: [art] Lock RT PCRs Done
2,826,658 UART: [art] Populate DV Done
2,835,009 UART: [fht] FMC Alias Private Key: 7
2,835,963 UART: [art] Derive CDI
2,836,243 UART: [art] Store in in slot 0x4
2,922,218 UART: [art] Derive Key Pair
2,922,578 UART: [art] Store priv key in slot 0x5
2,935,594 UART: [art] Derive Key Pair - Done
2,950,083 UART: [art] Signing Cert with AUTHO
2,950,563 UART: RITY.KEYID = 7
2,965,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,102 UART: [art] PUB.X = 7893E26A7F4EDA6E6F8F9890B77E34B09D983C019AEC64A036B64BFAFB65308C325AA5902622407D56F0427CD01AAA67
2,972,875 UART: [art] PUB.Y = 093FEFEF1216562DDA368ED3F2AF97E3971B58B204687A2C8AB4B48D286DC96240529176EB86D5BC28E4A1C932FE80BA
2,979,829 UART: [art] SIG.R = 2838089F684A86E049E8DF709A141ACA08756B5BFE1E16CB62E6BD30C0EFAC5D3FC16330F6F1828757D81ED54E33960E
2,986,598 UART: [art] SIG.S = A5881A1F070E1DBF50D920153612659544449DC97784E917B0E7EBB99094E08A5887AA7E33E12006963722320612FD4F
3,010,187 UART: Caliptra RT
3,010,532 UART: [state] CFI Enabled
3,119,023 UART: [rt] RT listening for mailbox commands...
3,119,693 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,561 UART: [rt]cmd =0x4c444556, len=4
3,159,945 >>> mbox cmd response data (687 bytes)
3,159,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,307 UART: [rt]cmd =0x43455246, len=4
3,201,407 >>> mbox cmd response data (887 bytes)
3,201,408 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,817 UART: [rt]cmd =0x43455252, len=4
3,241,594 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,189 >>> mbox cmd response: success
2,705,863 UART:
2,705,879 UART: Running Caliptra FMC ...
2,706,287 UART:
2,706,430 UART: [state] CFI Enabled
2,716,961 UART: [fht] FMC Alias Private Key: 7
2,824,860 UART: [art] Extend RT PCRs Done
2,825,288 UART: [art] Lock RT PCRs Done
2,826,686 UART: [art] Populate DV Done
2,835,061 UART: [fht] FMC Alias Private Key: 7
2,836,157 UART: [art] Derive CDI
2,836,437 UART: [art] Store in in slot 0x4
2,922,258 UART: [art] Derive Key Pair
2,922,618 UART: [art] Store priv key in slot 0x5
2,935,994 UART: [art] Derive Key Pair - Done
2,950,850 UART: [art] Signing Cert with AUTHO
2,951,330 UART: RITY.KEYID = 7
2,966,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,273 UART: [art] PUB.X = 10FB13483E8C1FE337BB1D8720A7332AE66A7A5EBBAD9BABE3DFEFD5A788ACAEA17F7A4C3C87DF6315735D268C8C9798
2,974,067 UART: [art] PUB.Y = 7CFEFE8C036D8FA6D1DAD96C1DC2D75D086D9F1387459C3763E87E235C301FC48AC799A30682A8D5ED4413AA7F7BA360
2,981,022 UART: [art] SIG.R = DB1BB4D0C069C456A54A34567149860DC86EFC4C2EE45DC8CB67239830BCAFC2410AAB72C192868DEC09D60F672C7E4A
2,987,794 UART: [art] SIG.S = F9A46DFE0B916642D9AAD817576176ECCA6DC88C5C7E85B28B17B8B0FDA954160E3B2969264044812AF2495F99EB1B61
3,011,255 UART: Caliptra RT
3,011,600 UART: [state] CFI Enabled
3,119,342 UART: [rt] RT listening for mailbox commands...
3,120,012 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,016 UART: [rt]cmd =0x4c444556, len=4
3,160,488 >>> mbox cmd response data (687 bytes)
3,160,489 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,198 UART: [rt]cmd =0x43455246, len=4
3,202,334 >>> mbox cmd response data (887 bytes)
3,202,335 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,902 UART: [rt]cmd =0x43455252, len=4
3,242,882 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,045 >>> mbox cmd response: success
2,704,145 UART:
2,704,161 UART: Running Caliptra FMC ...
2,704,569 UART:
2,704,712 UART: [state] CFI Enabled
2,715,297 UART: [fht] FMC Alias Private Key: 7
2,822,954 UART: [art] Extend RT PCRs Done
2,823,382 UART: [art] Lock RT PCRs Done
2,824,854 UART: [art] Populate DV Done
2,832,999 UART: [fht] FMC Alias Private Key: 7
2,834,015 UART: [art] Derive CDI
2,834,295 UART: [art] Store in in slot 0x4
2,920,134 UART: [art] Derive Key Pair
2,920,494 UART: [art] Store priv key in slot 0x5
2,933,872 UART: [art] Derive Key Pair - Done
2,948,699 UART: [art] Signing Cert with AUTHO
2,949,179 UART: RITY.KEYID = 7
2,964,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,290 UART: [art] PUB.X = 8E64A299F9E14ED45CF52E4DB97EDE234AF90C6972C9F087F4BA21EB40ADDF353C45F3A3306FD44CA6797369D8CB490E
2,972,070 UART: [art] PUB.Y = 143764699683F36DA3BDED3AB65464DC5B9258F55DA2982B01E8468D8012786491F8220AF3C4E6AE85A1F3574D1581E2
2,979,010 UART: [art] SIG.R = 2A11A75CC1E13037CD0888E48BC2C3742477400144F6ED5756612F74775B240E0852C8CF4AB3CAE333AE83DF0951A233
2,985,763 UART: [art] SIG.S = C2C9EC29E08ACA605E28A49C6B1261F52CABC17F29481B0EACC3B0BC478A3D08C7597415B646932DA003818919C444F7
3,009,927 UART: Caliptra RT
3,010,272 UART: [state] CFI Enabled
3,118,973 UART: [rt] RT listening for mailbox commands...
3,119,643 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,713 UART: [rt]cmd =0x4c444556, len=4
3,159,993 >>> mbox cmd response data (687 bytes)
3,159,994 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,485 UART: [rt]cmd =0x43455246, len=4
3,201,621 >>> mbox cmd response data (887 bytes)
3,201,622 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,011 UART: [rt]cmd =0x43455252, len=4
3,241,774 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,739 >>> mbox cmd response: success
2,705,167 UART:
2,705,183 UART: Running Caliptra FMC ...
2,705,591 UART:
2,705,734 UART: [state] CFI Enabled
2,716,665 UART: [fht] FMC Alias Private Key: 7
2,824,744 UART: [art] Extend RT PCRs Done
2,825,172 UART: [art] Lock RT PCRs Done
2,826,902 UART: [art] Populate DV Done
2,835,435 UART: [fht] FMC Alias Private Key: 7
2,836,459 UART: [art] Derive CDI
2,836,739 UART: [art] Store in in slot 0x4
2,922,734 UART: [art] Derive Key Pair
2,923,094 UART: [art] Store priv key in slot 0x5
2,936,436 UART: [art] Derive Key Pair - Done
2,950,758 UART: [art] Signing Cert with AUTHO
2,951,238 UART: RITY.KEYID = 7
2,966,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,969 UART: [art] PUB.X = FCE04988BDD9FD2B8970515DD24EB39E6682AA32B84F5ED8F1CF54D6E5CB0528DF33D2D57CA2F0CF8804EE666B564728
2,973,749 UART: [art] PUB.Y = 6913E9823079924FBB569D5A4AC4A0775B75C5AA54AFD2AEB1D762DB9A19386565977F555139E68A9801D002A499CE12
2,980,691 UART: [art] SIG.R = AA368EA294EF2CC9CCD57C146E135CBC9D0CC068BDBA67693E602968D26297718D20A262A6E963B359684E2F5877884A
2,987,462 UART: [art] SIG.S = 57C3E62CF1AF1A6304E071739416A984CD4B1CEC2E4256E5E4B176AE78361DC4BD31B1E0FE9C4D173A2C6F381EEE25F3
3,011,266 UART: Caliptra RT
3,011,611 UART: [state] CFI Enabled
3,118,368 UART: [rt] RT listening for mailbox commands...
3,119,038 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,064 UART: [rt]cmd =0x4c444556, len=4
3,159,512 >>> mbox cmd response data (687 bytes)
3,159,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,688 UART: [rt]cmd =0x43455246, len=4
3,200,780 >>> mbox cmd response data (887 bytes)
3,200,781 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,202 UART: [rt]cmd =0x43455252, len=4
3,240,881 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 857.38s
Truncated 9072 bytes from beginning
24,345,957 UART: [state] Locking Datavault
24,351,522 UART: [state] Locking PCR0, PCR1 and PCR31
24,353,311 UART: [state] Locking ICCM
24,355,665 UART: [exit] Launching FMC @ 0x40000130
24,364,327 UART:
24,364,567 UART: Running Caliptra FMC ...
24,365,604 UART:
24,365,750 UART: [state] CFI Enabled
24,423,775 UART: [fht] FMC Alias Private Key: 7
26,762,045 UART: [art] Extend RT PCRs Done
26,763,266 UART: [art] Lock RT PCRs Done
26,765,001 UART: [art] Populate DV Done
26,770,200 UART: [fht] FMC Alias Private Key: 7
26,771,785 UART: [art] Derive CDI
26,772,615 UART: [art] Store in in slot 0x4
26,832,678 UART: [art] Derive Key Pair
26,833,719 UART: [art] Store priv key in slot 0x5
30,126,656 UART: [art] Derive Key Pair - Done
30,139,381 UART: [art] Signing Cert with AUTHO
30,140,681 UART: RITY.KEYID = 7
32,429,002 UART: [art] Erasing AUTHORITY.KEYID = 7
32,430,505 UART: [art] PUB.X = 62C669C95D3354F0528093D3E7E934E4EA855FFDD9E11BE49885F1BCCEC325F1792124736A5BD4EE90B6D45796BC47E5
32,437,785 UART: [art] PUB.Y = AEFDAB29B7DBAEB0012D8028197B5818CB64F5724F9BE7977DA0EA27C0ECA6982FC68AF401C0C122236C65CE9AE6D083
32,445,043 UART: [art] SIG.R = D3826803E4CD18012679E30846423DEDAEE902765AC1C703208756F6420AA1DE1F0C458F0A8AA50990CB371A2079590E
32,452,395 UART: [art] SIG.S = 38A4D8B55A0C610140D78B0D9E0111CA41D16316371C85DF3E25BE37BB153B23C11731DB979A1053B178E315CD72671A
33,757,909 UART: Caliptra RT
33,758,609 UART: [state] CFI Enabled
33,918,804 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
4,670 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,047 UART:
192,423 UART: Running Caliptra ROM ...
193,528 UART:
193,672 UART: [state] CFI Enabled
267,566 UART: [state] LifecycleState = Unprovisioned
269,991 UART: [state] DebugLocked = No
271,852 UART: [state] WD Timer not started. Device not locked for debugging
276,814 UART: [kat] SHA2-256
458,742 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,254 UART: [kat] ++
470,786 UART: [kat] sha1
481,084 UART: [kat] SHA2-256
484,096 UART: [kat] SHA2-384
489,965 UART: [kat] SHA2-512-ACC
492,574 UART: [kat] ECC-384
3,780,361 UART: [kat] HMAC-384Kdf
3,806,565 UART: [kat] LMS
4,879,699 UART: [kat] --
4,884,528 UART: [cold-reset] ++
4,886,519 UART: [fht] FHT @ 0x50003400
4,899,547 UART: [idev] ++
4,900,236 UART: [idev] CDI.KEYID = 6
4,901,396 UART: [idev] SUBJECT.KEYID = 7
4,902,606 UART: [idev] UDS.KEYID = 0
4,936,700 UART: [idev] Erasing UDS.KEYID = 0
8,250,534 UART: [idev] Sha384 KeyId Algorithm
8,259,987 UART: [idev] --
8,263,809 UART: [ldev] ++
8,264,432 UART: [ldev] CDI.KEYID = 6
8,265,534 UART: [ldev] SUBJECT.KEYID = 5
8,266,662 UART: [ldev] AUTHORITY.KEYID = 7
8,267,993 UART: [ldev] FE.KEYID = 1
8,301,995 UART: [ldev] Erasing FE.KEYID = 1
11,636,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,951,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,967,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,983,688 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
13,999,650 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,021,047 UART: [ldev] --
14,025,347 UART: [fwproc] Wait for Commands...
14,026,901 UART: [fwproc] Recv command 0x46574c44
14,029,160 UART: [fwproc] Recv'd Img size: 114124 bytes
18,103,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,181,233 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,249,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,567,735 >>> mbox cmd response: success
18,571,539 UART: [afmc] ++
18,572,125 UART: [afmc] CDI.KEYID = 6
18,573,304 UART: [afmc] SUBJECT.KEYID = 7
18,574,460 UART: [afmc] AUTHORITY.KEYID = 5
21,934,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,250,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,252,593 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,268,778 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,284,834 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,300,807 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,323,775 UART: [afmc] --
24,327,421 UART: [cold-reset] --
24,332,150 UART: [state] Locking Datavault
24,336,530 UART: [state] Locking PCR0, PCR1 and PCR31
24,338,226 UART: [state] Locking ICCM
24,341,073 UART: [exit] Launching FMC @ 0x40000130
24,349,792 UART:
24,350,030 UART: Running Caliptra FMC ...
24,351,128 UART:
24,351,283 UART: [state] CFI Enabled
24,409,540 UART: [fht] FMC Alias Private Key: 7
26,748,132 UART: [art] Extend RT PCRs Done
26,749,356 UART: [art] Lock RT PCRs Done
26,750,839 UART: [art] Populate DV Done
26,756,630 UART: [fht] FMC Alias Private Key: 7
26,758,216 UART: [art] Derive CDI
26,759,034 UART: [art] Store in in slot 0x4
26,818,834 UART: [art] Derive Key Pair
26,819,870 UART: [art] Store priv key in slot 0x5
30,113,205 UART: [art] Derive Key Pair - Done
30,125,994 UART: [art] Signing Cert with AUTHO
30,127,292 UART: RITY.KEYID = 7
32,413,898 UART: [art] Erasing AUTHORITY.KEYID = 7
32,415,403 UART: [art] PUB.X = 27DFC83A8FCFD18F883EF152F174595A6D943D26281A3C8BB69683F73545C05035CB4EA31D605E40807BEDC4C805E2DD
32,422,666 UART: [art] PUB.Y = 6287EF5B983327C86DF333622EDF9427273B88C438B373D6C69E3CC145CF0A286401E06A1FD2887ADD4F132995D45074
32,429,854 UART: [art] SIG.R = 30D8EF3490CACEBB209812472ED966FF6C164CF54256EC6EC9727A6F42F18585A359B17920177C4C98F11B2309642E8A
32,437,251 UART: [art] SIG.S = 1EB0131C1B4B444323BE25C312132D4E28D96E4BA6C17260768752EC60FA5D82F4E0AE4048E5A024D74C47AEA23BDE9B
33,742,536 UART: Caliptra RT
33,743,244 UART: [state] CFI Enabled
33,905,503 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,005 writing to cptra_bootfsm_go
5,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
193,088 UART:
193,476 UART: Running Caliptra ROM ...
194,646 UART:
194,798 UART: [state] CFI Enabled
266,832 UART: [state] LifecycleState = Unprovisioned
269,188 UART: [state] DebugLocked = No
271,111 UART: [state] WD Timer not started. Device not locked for debugging
275,391 UART: [kat] SHA2-256
457,339 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,859 UART: [kat] ++
469,359 UART: [kat] sha1
479,316 UART: [kat] SHA2-256
482,327 UART: [kat] SHA2-384
486,667 UART: [kat] SHA2-512-ACC
489,277 UART: [kat] ECC-384
3,775,207 UART: [kat] HMAC-384Kdf
3,804,250 UART: [kat] LMS
4,877,405 UART: [kat] --
4,882,330 UART: [cold-reset] ++
4,884,400 UART: [fht] FHT @ 0x50003400
4,896,304 UART: [idev] ++
4,897,038 UART: [idev] CDI.KEYID = 6
4,898,145 UART: [idev] SUBJECT.KEYID = 7
4,899,350 UART: [idev] UDS.KEYID = 0
4,932,009 UART: [idev] Erasing UDS.KEYID = 0
8,243,406 UART: [idev] Fuse KeyId
8,247,610 UART: [idev] --
8,251,979 UART: [ldev] ++
8,252,547 UART: [ldev] CDI.KEYID = 6
8,253,784 UART: [ldev] SUBJECT.KEYID = 5
8,254,954 UART: [ldev] AUTHORITY.KEYID = 7
8,256,048 UART: [ldev] FE.KEYID = 1
8,298,377 UART: [ldev] Erasing FE.KEYID = 1
11,636,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,687 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
13,993,682 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,013,400 UART: [ldev] --
14,018,786 UART: [fwproc] Wait for Commands...
14,021,433 UART: [fwproc] Recv command 0x46574c44
14,023,422 UART: [fwproc] Recv'd Img size: 114124 bytes
18,096,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,173,573 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,242,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,559,307 >>> mbox cmd response: success
18,562,883 UART: [afmc] ++
18,563,499 UART: [afmc] CDI.KEYID = 6
18,564,605 UART: [afmc] SUBJECT.KEYID = 7
18,565,844 UART: [afmc] AUTHORITY.KEYID = 5
21,929,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,228,757 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,244,966 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,260,965 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,276,955 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,299,774 UART: [afmc] --
24,302,825 UART: [cold-reset] --
24,305,278 UART: [state] Locking Datavault
24,311,489 UART: [state] Locking PCR0, PCR1 and PCR31
24,313,188 UART: [state] Locking ICCM
24,314,471 UART: [exit] Launching FMC @ 0x40000130
24,322,822 UART:
24,323,099 UART: Running Caliptra FMC ...
24,324,215 UART:
24,324,391 UART: [state] CFI Enabled
24,386,324 UART: [fht] FMC Alias Private Key: 7
26,724,267 UART: [art] Extend RT PCRs Done
26,725,497 UART: [art] Lock RT PCRs Done
26,727,257 UART: [art] Populate DV Done
26,732,563 UART: [fht] FMC Alias Private Key: 7
26,734,207 UART: [art] Derive CDI
26,735,014 UART: [art] Store in in slot 0x4
26,794,324 UART: [art] Derive Key Pair
26,795,320 UART: [art] Store priv key in slot 0x5
30,088,323 UART: [art] Derive Key Pair - Done
30,101,541 UART: [art] Signing Cert with AUTHO
30,102,849 UART: RITY.KEYID = 7
32,389,426 UART: [art] Erasing AUTHORITY.KEYID = 7
32,390,930 UART: [art] PUB.X = 3B91C22A85478B5808A8E6E171DE8A38C0C59AF2B65D232E67C20CC161D902F3ECE69C50F597A4E827C971D0993415F7
32,398,187 UART: [art] PUB.Y = C81F5C26B4E0B5FD69969431C924FFCF56BFE1407436F7845CFC37A63140C89B713F562D68A3CBF20E6212545BBC7D45
32,405,484 UART: [art] SIG.R = 2D72E9F5C65E680FDE32993C5C76357D49F0341B44A3F2F5BE7AA82B66AE69BD7D70431A3B2134E14EE3F96BB1B1E500
32,412,788 UART: [art] SIG.S = D7E50065D4F408B8C7D035BC03D7836276F3B4785F6260898E73CCDCFCB08E55FCD7DCF09C52D69093D6D2D075539792
33,717,933 UART: Caliptra RT
33,718,642 UART: [state] CFI Enabled
33,880,005 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,018 writing to cptra_bootfsm_go
6,256 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,334,488 >>> mbox cmd response: success
24,024,254 UART:
24,024,672 UART: Running Caliptra FMC ...
24,025,818 UART:
24,025,971 UART: [state] CFI Enabled
24,096,234 UART: [fht] FMC Alias Private Key: 7
26,433,939 UART: [art] Extend RT PCRs Done
26,435,172 UART: [art] Lock RT PCRs Done
26,436,720 UART: [art] Populate DV Done
26,441,966 UART: [fht] FMC Alias Private Key: 7
26,443,450 UART: [art] Derive CDI
26,444,181 UART: [art] Store in in slot 0x4
26,504,520 UART: [art] Derive Key Pair
26,505,557 UART: [art] Store priv key in slot 0x5
29,798,987 UART: [art] Derive Key Pair - Done
29,811,710 UART: [art] Signing Cert with AUTHO
29,813,039 UART: RITY.KEYID = 7
32,101,033 UART: [art] Erasing AUTHORITY.KEYID = 7
32,102,539 UART: [art] PUB.X = BB5CBC193A3E6C2BE0E2ECB6669AD660131F3F8FB0772E5C18244ED2823838666200FA40DC46A4BF822445305AEF2208
32,109,782 UART: [art] PUB.Y = DAA9FCD8079FA372FBA72F1ED68AF86F62CDD84A3D388F7232257D496AACE678AF844EB0B7D6F91187599DE4002D65FE
32,117,035 UART: [art] SIG.R = B41A3DEE0E9B65BF6B93C0C44025BEB5101B13804992C8E45349A643F787B238799492C2D4D2CABFA8A8914EACCE16AE
32,124,425 UART: [art] SIG.S = 25CFAEFABCB78FE2C6145311B62BC0292531B7CC9092257B2AD83A7059CFB3C78298946E0B3DE684BD8070C9C98758C2
33,429,609 UART: Caliptra RT
33,430,324 UART: [state] CFI Enabled
33,592,049 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
5,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,328,750 >>> mbox cmd response: success
24,020,307 UART:
24,020,710 UART: Running Caliptra FMC ...
24,021,929 UART:
24,022,102 UART: [state] CFI Enabled
24,088,085 UART: [fht] FMC Alias Private Key: 7
26,425,632 UART: [art] Extend RT PCRs Done
26,426,875 UART: [art] Lock RT PCRs Done
26,428,124 UART: [art] Populate DV Done
26,433,328 UART: [fht] FMC Alias Private Key: 7
26,434,877 UART: [art] Derive CDI
26,435,644 UART: [art] Store in in slot 0x4
26,498,092 UART: [art] Derive Key Pair
26,499,095 UART: [art] Store priv key in slot 0x5
29,791,356 UART: [art] Derive Key Pair - Done
29,804,358 UART: [art] Signing Cert with AUTHO
29,805,664 UART: RITY.KEYID = 7
32,092,943 UART: [art] Erasing AUTHORITY.KEYID = 7
32,094,456 UART: [art] PUB.X = 05FA575242ACB1C7B094E7052AB27044E5A244747E80B237EC5ACEB7A6DFB723736FD659D3246F2D1A429222113D1FE2
32,101,705 UART: [art] PUB.Y = A03AB3CBCD40CC8D4657C01AA3F1634D22E8E0AA971BDBCA993FBE757A2F5D316637B2507550CAF3833C46E9879C811D
32,109,001 UART: [art] SIG.R = 1A8F43839C6DE3C1305E5696A56EF3ADB5260D81E48B2FF609C5134926FF03691110B059A4846CF796056FA18B3D3C7C
32,116,357 UART: [art] SIG.S = 62B49CC9587F6B7238E2FCF5785A3963472D5821C643DA304FDDC4C3AFD32CDD5770F8DD38C52E2EFD776C0C3A7E1BFE
33,421,910 UART: Caliptra RT
33,422,619 UART: [state] CFI Enabled
33,583,492 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
4,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,330,118 >>> mbox cmd response: success
24,015,754 UART:
24,016,188 UART: Running Caliptra FMC ...
24,017,321 UART:
24,017,473 UART: [state] CFI Enabled
24,082,393 UART: [fht] FMC Alias Private Key: 7
26,419,875 UART: [art] Extend RT PCRs Done
26,421,101 UART: [art] Lock RT PCRs Done
26,422,970 UART: [art] Populate DV Done
26,428,547 UART: [fht] FMC Alias Private Key: 7
26,430,137 UART: [art] Derive CDI
26,430,868 UART: [art] Store in in slot 0x4
26,491,187 UART: [art] Derive Key Pair
26,492,220 UART: [art] Store priv key in slot 0x5
29,785,007 UART: [art] Derive Key Pair - Done
29,797,960 UART: [art] Signing Cert with AUTHO
29,799,286 UART: RITY.KEYID = 7
32,086,878 UART: [art] Erasing AUTHORITY.KEYID = 7
32,088,387 UART: [art] PUB.X = 28F63A6034799F6CF99172FEC923C2B68BCBD85DA38CF6F0AA0C89F67B2A80A7FAB33AC750DE537A92B9E343EFB761D4
32,095,634 UART: [art] PUB.Y = C365133CF531C8CC61CAFC96E667C1ACB75057248CA1507C1A95842E822BB47A97BCFF4A6A190816FD6DFF058030E8ED
32,102,855 UART: [art] SIG.R = 5065C701EB731F5534D1ADEDD58FDFF7EA3BE847215D527A37E32AC53369927334CD457424CB5AAFB649583DA9290AE5
32,110,244 UART: [art] SIG.S = 1CC09E29E9DFDB182A7C3943FB03A328EDB62FACAFEFDD592174BA13026957E39082CA9827982E6E9D3B442BC1C97BEC
33,415,444 UART: Caliptra RT
33,416,142 UART: [state] CFI Enabled
33,576,313 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
4,740 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,350,308 >>> mbox cmd response: success
24,036,156 UART:
24,036,695 UART: Running Caliptra FMC ...
24,037,829 UART:
24,037,990 UART: [state] CFI Enabled
24,107,180 UART: [fht] FMC Alias Private Key: 7
26,444,811 UART: [art] Extend RT PCRs Done
26,446,041 UART: [art] Lock RT PCRs Done
26,447,823 UART: [art] Populate DV Done
26,453,291 UART: [fht] FMC Alias Private Key: 7
26,454,840 UART: [art] Derive CDI
26,455,576 UART: [art] Store in in slot 0x4
26,516,792 UART: [art] Derive Key Pair
26,517,837 UART: [art] Store priv key in slot 0x5
29,810,527 UART: [art] Derive Key Pair - Done
29,823,483 UART: [art] Signing Cert with AUTHO
29,824,793 UART: RITY.KEYID = 7
32,112,081 UART: [art] Erasing AUTHORITY.KEYID = 7
32,113,594 UART: [art] PUB.X = 4CF778AD9FBC273DF3D32D26C67E08561612FD83FCC08EB69E55A0D1E9D6C530102CAC4DED42F679183ACBBD2B0419D2
32,120,895 UART: [art] PUB.Y = 66BD102D70B4CEBB97A0EE56CD59F6D8E154D67DDEE3A05E084C463F0ECF577ED457267C437AE5DAC5E0C819A58E9AD9
32,128,154 UART: [art] SIG.R = 5514C1DED34C52DE1058FB78B5EBB003CA57AC3452CC8BD53FD44E426B33C35603F9529182E91893C64D683A8218CC11
32,135,489 UART: [art] SIG.S = A10F3ADA9F9BBC9373B98841656CB6D402F80A1ACBAE5676568E34F395921993055282F8CB99D21A4DD232AB507B371B
33,440,861 UART: Caliptra RT
33,441,573 UART: [state] CFI Enabled
33,601,363 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.16s
Truncated 9072 bytes from beginning
24,414,549 UART: [state] Locking Datavault
24,421,197 UART: [state] Locking PCR0, PCR1 and PCR31
24,423,007 UART: [state] Locking ICCM
24,424,630 UART: [exit] Launching FMC @ 0x40000130
24,433,301 UART:
24,433,526 UART: Running Caliptra FMC ...
24,434,615 UART:
24,434,772 UART: [state] CFI Enabled
24,442,919 UART: [fht] FMC Alias Private Key: 7
26,773,622 UART: [art] Extend RT PCRs Done
26,774,840 UART: [art] Lock RT PCRs Done
26,776,675 UART: [art] Populate DV Done
26,782,203 UART: [fht] FMC Alias Private Key: 7
26,783,839 UART: [art] Derive CDI
26,784,645 UART: [art] Store in in slot 0x4
26,827,181 UART: [art] Derive Key Pair
26,828,218 UART: [art] Store priv key in slot 0x5
30,070,132 UART: [art] Derive Key Pair - Done
30,082,921 UART: [art] Signing Cert with AUTHO
30,084,232 UART: RITY.KEYID = 7
32,364,176 UART: [art] Erasing AUTHORITY.KEYID = 7
32,365,689 UART: [art] PUB.X = E2D57D661DEF4D6BE144C7C56DCB86105C4506DF142184DDACBEEAADA7D0373E3F1893856F547649C201728034D1E276
32,372,931 UART: [art] PUB.Y = 8187A6B076E70D85F7C22869B5C48AD51DC8BD3238E827ED6D29EE18EF7B89A61B722164FA94C7596E2F6AB801660E34
32,380,205 UART: [art] SIG.R = CC596BE298F25DAA9B6D40E9D25992487A71C0A19719E148E14274AA2B3437D4DC31AA129C79114F7012CB9605EE02E5
32,387,587 UART: [art] SIG.S = E24232C097043742BC3A72317C594A53E1E1EA7813C78B9D24742FC94229B5BB7BB0F2CEDE23BE3AF7D3C55A43B8284D
33,692,984 UART: Caliptra RT
33,693,698 UART: [state] CFI Enabled
33,810,939 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
5,397 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,312 UART:
192,683 UART: Running Caliptra ROM ...
193,876 UART:
603,343 UART: [state] CFI Enabled
617,801 UART: [state] LifecycleState = Unprovisioned
620,169 UART: [state] DebugLocked = No
622,538 UART: [state] WD Timer not started. Device not locked for debugging
627,507 UART: [kat] SHA2-256
809,465 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,050 UART: [kat] ++
821,549 UART: [kat] sha1
832,199 UART: [kat] SHA2-256
835,262 UART: [kat] SHA2-384
840,256 UART: [kat] SHA2-512-ACC
842,914 UART: [kat] ECC-384
4,098,052 UART: [kat] HMAC-384Kdf
4,111,170 UART: [kat] LMS
5,184,301 UART: [kat] --
5,188,295 UART: [cold-reset] ++
5,189,961 UART: [fht] FHT @ 0x50003400
5,201,377 UART: [idev] ++
5,202,088 UART: [idev] CDI.KEYID = 6
5,203,201 UART: [idev] SUBJECT.KEYID = 7
5,204,737 UART: [idev] UDS.KEYID = 0
5,224,250 UART: [idev] Erasing UDS.KEYID = 0
8,499,551 UART: [idev] Sha384 KeyId Algorithm
8,509,921 UART: [idev] --
8,513,699 UART: [ldev] ++
8,514,264 UART: [ldev] CDI.KEYID = 6
8,515,418 UART: [ldev] SUBJECT.KEYID = 5
8,516,844 UART: [ldev] AUTHORITY.KEYID = 7
8,518,552 UART: [ldev] FE.KEYID = 1
8,528,126 UART: [ldev] Erasing FE.KEYID = 1
11,818,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,395 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
14,159,380 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,179,085 UART: [ldev] --
14,182,892 UART: [fwproc] Wait for Commands...
14,184,455 UART: [fwproc] Recv command 0x46574c44
14,186,722 UART: [fwproc] Recv'd Img size: 114124 bytes
18,260,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,336,365 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,405,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,722,550 >>> mbox cmd response: success
18,725,893 UART: [afmc] ++
18,726,478 UART: [afmc] CDI.KEYID = 6
18,727,585 UART: [afmc] SUBJECT.KEYID = 7
18,728,792 UART: [afmc] AUTHORITY.KEYID = 5
22,045,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,342,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,344,543 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,360,698 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,376,781 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,392,745 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,416,095 UART: [afmc] --
24,419,057 UART: [cold-reset] --
24,423,573 UART: [state] Locking Datavault
24,427,466 UART: [state] Locking PCR0, PCR1 and PCR31
24,429,099 UART: [state] Locking ICCM
24,432,163 UART: [exit] Launching FMC @ 0x40000130
24,440,882 UART:
24,441,116 UART: Running Caliptra FMC ...
24,442,209 UART:
24,442,365 UART: [state] CFI Enabled
24,450,205 UART: [fht] FMC Alias Private Key: 7
26,781,466 UART: [art] Extend RT PCRs Done
26,782,704 UART: [art] Lock RT PCRs Done
26,784,108 UART: [art] Populate DV Done
26,789,675 UART: [fht] FMC Alias Private Key: 7
26,791,366 UART: [art] Derive CDI
26,792,172 UART: [art] Store in in slot 0x4
26,834,762 UART: [art] Derive Key Pair
26,835,803 UART: [art] Store priv key in slot 0x5
30,077,627 UART: [art] Derive Key Pair - Done
30,090,791 UART: [art] Signing Cert with AUTHO
30,092,092 UART: RITY.KEYID = 7
32,371,621 UART: [art] Erasing AUTHORITY.KEYID = 7
32,373,148 UART: [art] PUB.X = DE7B955310186511818C2939421D79C699EFFD74E242981236330A72ECAC667D5BB196B253A4FB733D97A3AFA85E4DDC
32,380,334 UART: [art] PUB.Y = 6EE7CE6AE768F0B00331B020F37FF11D4019645163C7F7F8160642054149DA0D75516C3CA913E67DE3CE70647E0E8608
32,387,563 UART: [art] SIG.R = 9BC486DB7B4D62B97196A6E5536C3C9339E8BE0B713A811B379FD8EF3909523F60802A74DF1D3A9864A67C443AAB78FD
32,395,005 UART: [art] SIG.S = 6461345BF323BB7511E2651E410B264C27BAD98E71720461DAE89CCF455B96F25B09E20D53D0C9B097E604243ABF2007
33,699,842 UART: Caliptra RT
33,700,527 UART: [state] CFI Enabled
33,817,745 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
5,464 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,364 UART:
192,754 UART: Running Caliptra ROM ...
193,839 UART:
603,488 UART: [state] CFI Enabled
618,124 UART: [state] LifecycleState = Unprovisioned
620,502 UART: [state] DebugLocked = No
622,960 UART: [state] WD Timer not started. Device not locked for debugging
626,961 UART: [kat] SHA2-256
808,909 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,489 UART: [kat] ++
821,068 UART: [kat] sha1
831,033 UART: [kat] SHA2-256
834,088 UART: [kat] SHA2-384
839,740 UART: [kat] SHA2-512-ACC
842,353 UART: [kat] ECC-384
4,097,915 UART: [kat] HMAC-384Kdf
4,110,323 UART: [kat] LMS
5,183,453 UART: [kat] --
5,186,655 UART: [cold-reset] ++
5,188,213 UART: [fht] FHT @ 0x50003400
5,198,807 UART: [idev] ++
5,199,473 UART: [idev] CDI.KEYID = 6
5,200,700 UART: [idev] SUBJECT.KEYID = 7
5,202,181 UART: [idev] UDS.KEYID = 0
5,219,987 UART: [idev] Erasing UDS.KEYID = 0
8,497,717 UART: [idev] Fuse KeyId
8,501,897 UART: [idev] --
8,506,478 UART: [ldev] ++
8,507,080 UART: [ldev] CDI.KEYID = 6
8,508,270 UART: [ldev] SUBJECT.KEYID = 5
8,509,754 UART: [ldev] AUTHORITY.KEYID = 7
8,511,333 UART: [ldev] FE.KEYID = 1
8,524,573 UART: [ldev] Erasing FE.KEYID = 1
11,813,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,106,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,122,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,138,685 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
14,154,658 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,175,213 UART: [ldev] --
14,180,683 UART: [fwproc] Wait for Commands...
14,183,373 UART: [fwproc] Recv command 0x46574c44
14,185,361 UART: [fwproc] Recv'd Img size: 114124 bytes
18,254,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,328,963 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,397,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,714,002 >>> mbox cmd response: success
18,717,317 UART: [afmc] ++
18,717,913 UART: [afmc] CDI.KEYID = 6
18,719,096 UART: [afmc] SUBJECT.KEYID = 7
18,720,252 UART: [afmc] AUTHORITY.KEYID = 5
22,036,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,329,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,331,780 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,347,991 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,364,014 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,380,007 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,402,685 UART: [afmc] --
24,406,056 UART: [cold-reset] --
24,411,911 UART: [state] Locking Datavault
24,418,563 UART: [state] Locking PCR0, PCR1 and PCR31
24,420,255 UART: [state] Locking ICCM
24,421,642 UART: [exit] Launching FMC @ 0x40000130
24,430,316 UART:
24,430,609 UART: Running Caliptra FMC ...
24,431,718 UART:
24,431,886 UART: [state] CFI Enabled
24,440,305 UART: [fht] FMC Alias Private Key: 7
26,771,360 UART: [art] Extend RT PCRs Done
26,772,578 UART: [art] Lock RT PCRs Done
26,774,521 UART: [art] Populate DV Done
26,779,978 UART: [fht] FMC Alias Private Key: 7
26,781,449 UART: [art] Derive CDI
26,782,179 UART: [art] Store in in slot 0x4
26,824,925 UART: [art] Derive Key Pair
26,825,960 UART: [art] Store priv key in slot 0x5
30,067,958 UART: [art] Derive Key Pair - Done
30,080,708 UART: [art] Signing Cert with AUTHO
30,082,021 UART: RITY.KEYID = 7
32,361,420 UART: [art] Erasing AUTHORITY.KEYID = 7
32,362,949 UART: [art] PUB.X = F28C3F629735E49D4FC0C52358C6FD3D30303A3830D610A540425F5E45DED0267C16A6B8DFC3FD6E983489D045AD40E1
32,370,136 UART: [art] PUB.Y = 7C22EB66ACF58A73D04767A711AC1F88F6D38257E565D870BFFF97FCE33ABE1539381986895578940FC014915765F1AD
32,377,417 UART: [art] SIG.R = 7C5844797261D53117B6D98E4BFE9CF7BECB0D34BE1C494B8419006C9EF0C4829C606F25D9DB4A916CA811FCB48E82D1
32,384,754 UART: [art] SIG.S = D4FA58113BFEE869CE7A554E5830C12611F05A1F23CDA938A489FAD6F0C0F014DDA5E9900FED6499947862720A9B28A9
33,690,068 UART: Caliptra RT
33,690,790 UART: [state] CFI Enabled
33,807,763 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
5,897 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,540,877 >>> mbox cmd response: success
24,179,351 UART:
24,179,764 UART: Running Caliptra FMC ...
24,180,929 UART:
24,181,080 UART: [state] CFI Enabled
24,189,460 UART: [fht] FMC Alias Private Key: 7
26,519,815 UART: [art] Extend RT PCRs Done
26,521,062 UART: [art] Lock RT PCRs Done
26,522,659 UART: [art] Populate DV Done
26,528,027 UART: [fht] FMC Alias Private Key: 7
26,529,610 UART: [art] Derive CDI
26,530,349 UART: [art] Store in in slot 0x4
26,573,045 UART: [art] Derive Key Pair
26,574,043 UART: [art] Store priv key in slot 0x5
29,816,154 UART: [art] Derive Key Pair - Done
29,829,264 UART: [art] Signing Cert with AUTHO
29,830,573 UART: RITY.KEYID = 7
32,110,039 UART: [art] Erasing AUTHORITY.KEYID = 7
32,111,550 UART: [art] PUB.X = 4B14AE4062E4212D5D3EB5E0437713C711F4D1A085A0EAF9684FA545D201BD7F7F232E6B30B3B34F50FE033FFF9B41A6
32,118,826 UART: [art] PUB.Y = 5DF23D359F1B31A46F7B68E17393F5AE0761CE321B17DE68CB4A79301FE64218C2C65D2EFE689AEF1F91D99F21BDAD7A
32,126,039 UART: [art] SIG.R = A64AEF4A5C8CC43ACC41E89981A4F10307B7E8AD9C6A10FBB7FEE6E6ADCBE76BA571ABB1F86DD3389EFC5EAE6021DFD5
32,133,517 UART: [art] SIG.S = 53C2B85D691E5894316CBAB8814BAC56DAB0A4E527B9F8E0D0D4F926E361EB72DC75B72532DDF103AE8B41496DBF64C9
33,438,783 UART: Caliptra RT
33,439,501 UART: [state] CFI Enabled
33,556,466 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
5,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,525,913 >>> mbox cmd response: success
24,165,234 UART:
24,165,675 UART: Running Caliptra FMC ...
24,166,808 UART:
24,166,955 UART: [state] CFI Enabled
24,174,901 UART: [fht] FMC Alias Private Key: 7
26,506,049 UART: [art] Extend RT PCRs Done
26,507,278 UART: [art] Lock RT PCRs Done
26,509,017 UART: [art] Populate DV Done
26,514,340 UART: [fht] FMC Alias Private Key: 7
26,515,932 UART: [art] Derive CDI
26,516,676 UART: [art] Store in in slot 0x4
26,559,107 UART: [art] Derive Key Pair
26,560,095 UART: [art] Store priv key in slot 0x5
29,802,871 UART: [art] Derive Key Pair - Done
29,815,928 UART: [art] Signing Cert with AUTHO
29,817,228 UART: RITY.KEYID = 7
32,096,889 UART: [art] Erasing AUTHORITY.KEYID = 7
32,098,402 UART: [art] PUB.X = E871B3A5BC23C043D34D2B45C1D2E7D521EC0EF3B2AAFAFC0751B065D88B153AC5A624174C8AFFEA60AFCD73AAB88CE8
32,105,668 UART: [art] PUB.Y = BE72E14F21DD781AADC9B9709C37C05BA74CC42FF5942C15D17792F6770D3E5A3DDCB732BC0D005B9A4025CA7F848BD0
32,112,940 UART: [art] SIG.R = 06A42B1312EFA385CAA1863CB71A271ED205B65C3967A9B95073614CB6B835B0931B5BD5DE450B2674FB2ECC660ECC90
32,120,362 UART: [art] SIG.S = D20C35E9F80065B2ACDC5D8B280A576DD4F322DD854C7C1C832EBD858250B30B53AF1E2D4F2A7188B1FA2AB8C89B81F0
33,425,758 UART: Caliptra RT
33,426,464 UART: [state] CFI Enabled
33,543,876 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,515,936 >>> mbox cmd response: success
24,158,748 UART:
24,159,158 UART: Running Caliptra FMC ...
24,160,378 UART:
24,160,543 UART: [state] CFI Enabled
24,168,310 UART: [fht] FMC Alias Private Key: 7
26,498,946 UART: [art] Extend RT PCRs Done
26,500,236 UART: [art] Lock RT PCRs Done
26,501,737 UART: [art] Populate DV Done
26,507,166 UART: [fht] FMC Alias Private Key: 7
26,508,766 UART: [art] Derive CDI
26,509,580 UART: [art] Store in in slot 0x4
26,552,332 UART: [art] Derive Key Pair
26,553,329 UART: [art] Store priv key in slot 0x5
29,795,345 UART: [art] Derive Key Pair - Done
29,808,462 UART: [art] Signing Cert with AUTHO
29,809,769 UART: RITY.KEYID = 7
32,089,362 UART: [art] Erasing AUTHORITY.KEYID = 7
32,091,035 UART: [art] PUB.X = C1634B7D9508AC29885F2EF2E26790043201E52CEF46C46647706BBBF0BFF46EBD90A0E256FA4DD7362987954220E3E1
32,098,157 UART: [art] PUB.Y = 54FDAF16EF46D073178B614FEB00D193B7EC530D5350320CF503332E5C606A0E7E710CB25ADB4296456FC4276AFA1635
32,105,395 UART: [art] SIG.R = C998318BE4221D377ED98850937FA0586623AD2B2F5BC298CA292BF5E366CA90B3E1DB56BF3624BF563F26F10655B94C
32,112,759 UART: [art] SIG.S = 1B5A23F6789D7AAB88E669AB8D5FB64BBC5DFAB2CE861E1129D9945C5DDD2AAA0A8601BFBBCF2064482851FC79AA8FE5
33,417,853 UART: Caliptra RT
33,418,598 UART: [state] CFI Enabled
33,535,905 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
5,400 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,525,591 >>> mbox cmd response: success
24,159,780 UART:
24,160,191 UART: Running Caliptra FMC ...
24,161,522 UART:
24,161,687 UART: [state] CFI Enabled
24,169,697 UART: [fht] FMC Alias Private Key: 7
26,501,018 UART: [art] Extend RT PCRs Done
26,502,247 UART: [art] Lock RT PCRs Done
26,503,896 UART: [art] Populate DV Done
26,509,359 UART: [fht] FMC Alias Private Key: 7
26,511,107 UART: [art] Derive CDI
26,511,834 UART: [art] Store in in slot 0x4
26,554,533 UART: [art] Derive Key Pair
26,555,525 UART: [art] Store priv key in slot 0x5
29,797,810 UART: [art] Derive Key Pair - Done
29,810,487 UART: [art] Signing Cert with AUTHO
29,811,793 UART: RITY.KEYID = 7
32,091,583 UART: [art] Erasing AUTHORITY.KEYID = 7
32,093,093 UART: [art] PUB.X = 20D844A654BAD0B2ADC0669474B4D3F78733607DA46B2633FFE7A715791BFE758E65346FC56CB31541F0CE546B25DFCB
32,100,318 UART: [art] PUB.Y = FE4B4EF2A45CDD80C123362122DCBC1B85804A0186F94DAAA9220553851381737EA39E3F961CE6C432EA72CD86E61B04
32,107,590 UART: [art] SIG.R = 27E28EA8184B724AA9F52B24A3CF7A2EE28B9C0930D59EB02004C34D23C9D4BC1DAC4EA88E6619B4DC0B561FE49925CC
32,114,940 UART: [art] SIG.S = EEB2697BFB206953BAAA36D10560B6CB1700DBEEF12CFB7F76D717F50B2BB36287AD81E52D633330D9971663C6C06687
33,420,420 UART: Caliptra RT
33,421,131 UART: [state] CFI Enabled
33,538,580 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.15s
Truncated 9072 bytes from beginning
18,593,476 UART: [state] Locking Datavault
18,599,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,601,114 UART: [state] Locking ICCM
18,602,505 UART: [exit] Launching FMC @ 0x40000130
18,610,925 UART:
18,611,167 UART: Running Caliptra FMC ...
18,612,199 UART:
18,612,346 UART: [state] CFI Enabled
18,675,109 UART: [fht] FMC Alias Private Key: 7
20,439,171 UART: [art] Extend RT PCRs Done
20,440,398 UART: [art] Lock RT PCRs Done
20,442,100 UART: [art] Populate DV Done
20,447,462 UART: [fht] FMC Alias Private Key: 7
20,448,992 UART: [art] Derive CDI
20,449,731 UART: [art] Store in in slot 0x4
20,507,742 UART: [art] Derive Key Pair
20,508,743 UART: [art] Store priv key in slot 0x5
22,972,180 UART: [art] Derive Key Pair - Done
22,985,232 UART: [art] Signing Cert with AUTHO
22,986,541 UART: RITY.KEYID = 7
24,697,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,867 UART: [art] PUB.X = 8F82341E10E6D7478F507902DE0FB20295B95EC27339D636241B62E498BA20B4A315A1B7EB2B0F07662F5852994B22F5
24,706,118 UART: [art] PUB.Y = E485EC2AE76331DC01F88A752A3B18F0E310185F5ABB72936957299F7A63CF3BA423C10944B95DACCB689F8D781A7BC0
24,713,346 UART: [art] SIG.R = 821850FA04AAB73472DF295821607509394A46CBBFE1949BE293F35889F523EFD89E5A82A55D9224521A8F3F2B276956
24,720,757 UART: [art] SIG.S = CDA49EA51443D455593F2644F1C4BE160BFEFCECB7BF008294E1FE424C239648A2A1A372444005F65177C1159A252B42
25,699,633 UART: Caliptra RT
25,700,346 UART: [state] CFI Enabled
25,862,318 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
4,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,238 UART:
192,739 UART: Running Caliptra ROM ...
193,872 UART:
194,023 UART: [state] CFI Enabled
266,474 UART: [state] LifecycleState = Unprovisioned
268,294 UART: [state] DebugLocked = No
270,918 UART: [state] WD Timer not started. Device not locked for debugging
275,409 UART: [kat] SHA2-256
454,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,117 UART: [kat] ++
466,655 UART: [kat] sha1
476,622 UART: [kat] SHA2-256
479,679 UART: [kat] SHA2-384
486,084 UART: [kat] SHA2-512-ACC
489,045 UART: [kat] ECC-384
2,950,784 UART: [kat] HMAC-384Kdf
2,972,152 UART: [kat] LMS
3,501,568 UART: [kat] --
3,507,258 UART: [cold-reset] ++
3,509,838 UART: [fht] FHT @ 0x50003400
3,521,847 UART: [idev] ++
3,522,414 UART: [idev] CDI.KEYID = 6
3,523,319 UART: [idev] SUBJECT.KEYID = 7
3,524,536 UART: [idev] UDS.KEYID = 0
3,543,162 UART: [idev] Erasing UDS.KEYID = 0
6,025,616 UART: [idev] Sha384 KeyId Algorithm
6,034,279 UART: [idev] --
6,037,921 UART: [ldev] ++
6,038,503 UART: [ldev] CDI.KEYID = 6
6,039,392 UART: [ldev] SUBJECT.KEYID = 5
6,040,564 UART: [ldev] AUTHORITY.KEYID = 7
6,041,854 UART: [ldev] FE.KEYID = 1
6,077,250 UART: [ldev] Erasing FE.KEYID = 1
8,582,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,287 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,366,126 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,387,458 UART: [ldev] --
10,391,382 UART: [fwproc] Wait for Commands...
10,393,539 UART: [fwproc] Recv command 0x46574c44
10,395,587 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,819 >>> mbox cmd response: success
14,272,818 UART: [afmc] ++
14,273,437 UART: [afmc] CDI.KEYID = 6
14,274,354 UART: [afmc] SUBJECT.KEYID = 7
14,275,513 UART: [afmc] AUTHORITY.KEYID = 5
16,800,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,542,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,558,857 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,574,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,597,311 UART: [afmc] --
18,601,109 UART: [cold-reset] --
18,605,032 UART: [state] Locking Datavault
18,610,283 UART: [state] Locking PCR0, PCR1 and PCR31
18,611,991 UART: [state] Locking ICCM
18,613,470 UART: [exit] Launching FMC @ 0x40000130
18,621,889 UART:
18,622,127 UART: Running Caliptra FMC ...
18,623,230 UART:
18,623,386 UART: [state] CFI Enabled
18,684,870 UART: [fht] FMC Alias Private Key: 7
20,448,810 UART: [art] Extend RT PCRs Done
20,450,028 UART: [art] Lock RT PCRs Done
20,451,815 UART: [art] Populate DV Done
20,457,175 UART: [fht] FMC Alias Private Key: 7
20,458,767 UART: [art] Derive CDI
20,459,582 UART: [art] Store in in slot 0x4
20,517,756 UART: [art] Derive Key Pair
20,518,796 UART: [art] Store priv key in slot 0x5
22,982,324 UART: [art] Derive Key Pair - Done
22,995,146 UART: [art] Signing Cert with AUTHO
22,996,483 UART: RITY.KEYID = 7
24,708,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,775 UART: [art] PUB.X = C685A05A68EAFF1CBC60FF9B879D21EDD13305A196C1A5DD8867AEE6C108D5EC82000DA216F1B2E06902A9BCC82E82E2
24,717,021 UART: [art] PUB.Y = 9B781F28ABBC87664CD855D9B4073333017429D40120136B4C276EEED2A5FAD86DC358CB75ED5B729179CB929CD8ED2D
24,724,308 UART: [art] SIG.R = 2D8DA5661D7D0316FAD7D220F9BEDA940E24A18AD51827F405E3D7FB87798F3345E7DF4FFACCA480622FE83FB9209727
24,731,699 UART: [art] SIG.S = 217E3D7D131E4F14F7B62FA8929155F24F289FE5144D0B71452DD84EDD0B7FB151EF3AE76ACB6CCBC4C7A1EE9D55E994
25,711,472 UART: Caliptra RT
25,712,164 UART: [state] CFI Enabled
25,874,412 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
4,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,173 UART:
192,548 UART: Running Caliptra ROM ...
193,717 UART:
193,876 UART: [state] CFI Enabled
262,648 UART: [state] LifecycleState = Unprovisioned
264,593 UART: [state] DebugLocked = No
266,354 UART: [state] WD Timer not started. Device not locked for debugging
270,200 UART: [kat] SHA2-256
449,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,884 UART: [kat] ++
461,420 UART: [kat] sha1
471,082 UART: [kat] SHA2-256
474,105 UART: [kat] SHA2-384
480,784 UART: [kat] SHA2-512-ACC
483,770 UART: [kat] ECC-384
2,950,886 UART: [kat] HMAC-384Kdf
2,970,913 UART: [kat] LMS
3,500,385 UART: [kat] --
3,503,406 UART: [cold-reset] ++
3,505,063 UART: [fht] FHT @ 0x50003400
3,515,999 UART: [idev] ++
3,516,561 UART: [idev] CDI.KEYID = 6
3,517,498 UART: [idev] SUBJECT.KEYID = 7
3,518,627 UART: [idev] UDS.KEYID = 0
3,543,831 UART: [idev] Erasing UDS.KEYID = 0
6,022,672 UART: [idev] Fuse KeyId
6,026,694 UART: [idev] --
6,030,217 UART: [ldev] ++
6,030,791 UART: [ldev] CDI.KEYID = 6
6,031,702 UART: [ldev] SUBJECT.KEYID = 5
6,032,867 UART: [ldev] AUTHORITY.KEYID = 7
6,034,155 UART: [ldev] FE.KEYID = 1
6,077,265 UART: [ldev] Erasing FE.KEYID = 1
8,580,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,791 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,364,536 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,384,820 UART: [ldev] --
10,389,812 UART: [fwproc] Wait for Commands...
10,392,991 UART: [fwproc] Recv command 0x46574c44
10,395,087 UART: [fwproc] Recv'd Img size: 114448 bytes
13,794,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,931,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,249,724 >>> mbox cmd response: success
14,253,826 UART: [afmc] ++
14,254,438 UART: [afmc] CDI.KEYID = 6
14,255,353 UART: [afmc] SUBJECT.KEYID = 7
14,256,517 UART: [afmc] AUTHORITY.KEYID = 5
16,778,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,956 UART: [afmc] --
18,584,425 UART: [cold-reset] --
18,588,832 UART: [state] Locking Datavault
18,593,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,374 UART: [state] Locking ICCM
18,597,308 UART: [exit] Launching FMC @ 0x40000130
18,605,760 UART:
18,605,997 UART: Running Caliptra FMC ...
18,607,110 UART:
18,607,274 UART: [state] CFI Enabled
18,665,855 UART: [fht] FMC Alias Private Key: 7
20,430,161 UART: [art] Extend RT PCRs Done
20,431,382 UART: [art] Lock RT PCRs Done
20,433,218 UART: [art] Populate DV Done
20,438,582 UART: [fht] FMC Alias Private Key: 7
20,440,121 UART: [art] Derive CDI
20,440,935 UART: [art] Store in in slot 0x4
20,498,951 UART: [art] Derive Key Pair
20,499,990 UART: [art] Store priv key in slot 0x5
22,962,494 UART: [art] Derive Key Pair - Done
22,975,872 UART: [art] Signing Cert with AUTHO
22,977,210 UART: RITY.KEYID = 7
24,689,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,966 UART: [art] PUB.X = 2F01A03E87273ED3E40AC1A825AE0C4CC18596463063F0A464651A1F237737AB6FFF97301A9A18A77F19314EA81BC3F9
24,698,212 UART: [art] PUB.Y = 708A42BF5734F3398A638BF120F43F34F9EE1CD8F4C5F4B5160EE6653685E41D9765055BC583F3C5BA99BBE0E97152D3
24,705,497 UART: [art] SIG.R = 14679657CC860168527F0118DD7AA94B5497311C95533596FA40621D46DDDFE4DBAD13C7E13E12D3BE5A36A33EB27DF4
24,712,894 UART: [art] SIG.S = 5E2A962A451E84729A21A1DEE1F207CCC8C808939953BDC842CFD4D0B501288BD9ED20A270DA1B318C70A1112BCD708A
25,691,258 UART: Caliptra RT
25,691,977 UART: [state] CFI Enabled
25,857,499 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
5,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,376 >>> mbox cmd response: success
18,367,271 UART:
18,367,714 UART: Running Caliptra FMC ...
18,368,821 UART:
18,368,976 UART: [state] CFI Enabled
18,436,332 UART: [fht] FMC Alias Private Key: 7
20,200,973 UART: [art] Extend RT PCRs Done
20,202,197 UART: [art] Lock RT PCRs Done
20,203,523 UART: [art] Populate DV Done
20,208,944 UART: [fht] FMC Alias Private Key: 7
20,210,482 UART: [art] Derive CDI
20,211,214 UART: [art] Store in in slot 0x4
20,268,902 UART: [art] Derive Key Pair
20,269,939 UART: [art] Store priv key in slot 0x5
22,733,017 UART: [art] Derive Key Pair - Done
22,746,019 UART: [art] Signing Cert with AUTHO
22,747,330 UART: RITY.KEYID = 7
24,458,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,487 UART: [art] PUB.X = 6FA67C1F8474A8196AA2E7BE3C6213430587B3D65C84BACCA2F36710174CD63B11020A7CE500DE6091688B9A34E69AFD
24,467,783 UART: [art] PUB.Y = 5267B306E9B3C1C549AA0E935F1B36CE70CA28867F356993F0403F4346600949A70220391EC4A6C4C358C2D0C2E6C1D2
24,474,972 UART: [art] SIG.R = 1C4AF304DDA0864E68928581DA41BEA17312CFC9C8D86631E193358935C043A0BA0A7A0FF1D7D99D2FE8F0451EF23239
24,482,401 UART: [art] SIG.S = 9FF430541278417E53DEA8915ECB18922409BBD29ED8385FD19E5EF1BACC6199D445D521A033C4161E0E4CBBDBCDC4DB
25,461,439 UART: Caliptra RT
25,462,160 UART: [state] CFI Enabled
25,627,488 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
4,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,473 >>> mbox cmd response: success
18,348,089 UART:
18,348,501 UART: Running Caliptra FMC ...
18,349,614 UART:
18,349,768 UART: [state] CFI Enabled
18,413,443 UART: [fht] FMC Alias Private Key: 7
20,176,381 UART: [art] Extend RT PCRs Done
20,177,599 UART: [art] Lock RT PCRs Done
20,179,361 UART: [art] Populate DV Done
20,185,146 UART: [fht] FMC Alias Private Key: 7
20,186,695 UART: [art] Derive CDI
20,187,430 UART: [art] Store in in slot 0x4
20,245,664 UART: [art] Derive Key Pair
20,246,721 UART: [art] Store priv key in slot 0x5
22,709,767 UART: [art] Derive Key Pair - Done
22,722,655 UART: [art] Signing Cert with AUTHO
22,723,964 UART: RITY.KEYID = 7
24,435,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,986 UART: [art] PUB.X = 641DA449CD647B9FB21F1D64D9981533851F936A10A077F4A1D7450B46FC37790D6350449891A45EB781665DD0F1FE28
24,444,299 UART: [art] PUB.Y = BC13E2240057B77F20C3B5FBC5A54E9599ADEFC8F5D5C6754B7BCB94272A2C0AAF1113BB993EBEAA01D48EE7B0B11460
24,451,519 UART: [art] SIG.R = 46945BA82F0A6C9C73EEAF02BC773BA297FB4D61C288E6E55A33C6C03CDC53699B974FA637B50C9209C4188E23EE4A29
24,458,913 UART: [art] SIG.S = 7E89E2F6649C491421667EE828F19F3A53B0762F0E96A4ED053E8412B2D27699B9CD8CE121D90F98957AD7861D32AD65
25,437,759 UART: Caliptra RT
25,438,447 UART: [state] CFI Enabled
25,602,695 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
5,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,022,754 >>> mbox cmd response: success
18,326,439 UART:
18,326,848 UART: Running Caliptra FMC ...
18,328,009 UART:
18,328,165 UART: [state] CFI Enabled
18,390,307 UART: [fht] FMC Alias Private Key: 7
20,154,692 UART: [art] Extend RT PCRs Done
20,155,917 UART: [art] Lock RT PCRs Done
20,157,680 UART: [art] Populate DV Done
20,162,927 UART: [fht] FMC Alias Private Key: 7
20,164,421 UART: [art] Derive CDI
20,165,185 UART: [art] Store in in slot 0x4
20,223,475 UART: [art] Derive Key Pair
20,224,520 UART: [art] Store priv key in slot 0x5
22,687,630 UART: [art] Derive Key Pair - Done
22,700,758 UART: [art] Signing Cert with AUTHO
22,702,092 UART: RITY.KEYID = 7
24,413,450 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,956 UART: [art] PUB.X = 644F663BB027E4E7D2CD59B825FBC09BDC72546A216AE953C8D3C227E44630F00017144CC0BDB6B932E60BF6E13D9643
24,422,166 UART: [art] PUB.Y = C62916D25ADFAA90E44691176E874402482330A75EA70734D749C5BBA61AD097EC894169222C3C8F9A453348C19B5483
24,429,432 UART: [art] SIG.R = 290B294EF519C21696BA4842B2278050BFC0EB35498A450975F9CD313F5B2B2AE7BF91F28FB092638BF727DF834D0F5D
24,436,776 UART: [art] SIG.S = 897CCAC4F5FAD4CB23857A2CE14EB00BA38701A56775E11031D008DFEAA11347DD636227FBDC3594B2F528F5E09E237C
25,416,110 UART: Caliptra RT
25,416,801 UART: [state] CFI Enabled
25,582,769 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
4,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,634 >>> mbox cmd response: success
18,364,969 UART:
18,365,402 UART: Running Caliptra FMC ...
18,366,536 UART:
18,366,693 UART: [state] CFI Enabled
18,434,259 UART: [fht] FMC Alias Private Key: 7
20,197,609 UART: [art] Extend RT PCRs Done
20,198,827 UART: [art] Lock RT PCRs Done
20,200,533 UART: [art] Populate DV Done
20,205,882 UART: [fht] FMC Alias Private Key: 7
20,207,373 UART: [art] Derive CDI
20,208,106 UART: [art] Store in in slot 0x4
20,267,091 UART: [art] Derive Key Pair
20,268,132 UART: [art] Store priv key in slot 0x5
22,731,503 UART: [art] Derive Key Pair - Done
22,744,343 UART: [art] Signing Cert with AUTHO
22,745,670 UART: RITY.KEYID = 7
24,456,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,422 UART: [art] PUB.X = 2D1561389AC64F154C4B27F1FBDB2C261C8AD6678EFCF428C615265123FFCD390607E84D411682F500B490065E294C1F
24,465,691 UART: [art] PUB.Y = 1EBD10E1A24208C87F2D4A60FACD5E5822EC0A331CA0570E0180D1A247ED35186008356EC245B7BDED472450F2E6171E
24,472,959 UART: [art] SIG.R = 0A981CD930D372ADF04ABBCF1E29DF4C380DF5150E179EB830AEB09F5A057FC8286ED185D18FB3F967DFD824AE299B35
24,480,366 UART: [art] SIG.S = 257B2B0A9589CDDA993441757534D0C6FAB31475B7721D4219A4E4776889F697D00129D9A1F2E3F2C0C2BCA6FA85AF83
25,459,218 UART: Caliptra RT
25,459,926 UART: [state] CFI Enabled
25,625,370 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,782,834 UART: [state] Locking Datavault
18,788,620 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,273 UART: [state] Locking ICCM
18,791,536 UART: [exit] Launching FMC @ 0x40000130
18,799,979 UART:
18,800,223 UART: Running Caliptra FMC ...
18,801,325 UART:
18,801,495 UART: [state] CFI Enabled
18,809,545 UART: [fht] FMC Alias Private Key: 7
20,566,443 UART: [art] Extend RT PCRs Done
20,567,662 UART: [art] Lock RT PCRs Done
20,569,229 UART: [art] Populate DV Done
20,574,800 UART: [fht] FMC Alias Private Key: 7
20,576,494 UART: [art] Derive CDI
20,577,310 UART: [art] Store in in slot 0x4
20,619,434 UART: [art] Derive Key Pair
20,620,471 UART: [art] Store priv key in slot 0x5
23,047,591 UART: [art] Derive Key Pair - Done
23,060,312 UART: [art] Signing Cert with AUTHO
23,061,616 UART: RITY.KEYID = 7
24,766,967 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,473 UART: [art] PUB.X = 19C9FF0D584239EA96DBD9D188C0204008149F6A640D7CA4CF7F6072FC8050592F0677A5FFCB924858193499FD481F78
24,775,724 UART: [art] PUB.Y = 3C26B5FE273E7FB3F83B24CE69CBEC7CC581A8C1086A8768AEF4A583D68C944E9114C831855CE1B0DA6CA1FCF78F7BC8
24,783,029 UART: [art] SIG.R = 3E5754555FD6DBD388B708AD44490F6A41034DD41692A483F48DC6223A8C1E5AEDE576C941C8E0E3503098AFAD542E78
24,790,420 UART: [art] SIG.S = 2F88AD54BF2EA9D332DB584CCDA08428B95619211041C51102E589A6E9613810075BD77CCB4E4B129B41326FB65BB3B1
25,769,610 UART: Caliptra RT
25,770,299 UART: [state] CFI Enabled
25,886,784 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
6,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,520 UART:
192,882 UART: Running Caliptra ROM ...
194,061 UART:
603,831 UART: [state] CFI Enabled
618,420 UART: [state] LifecycleState = Unprovisioned
620,322 UART: [state] DebugLocked = No
622,131 UART: [state] WD Timer not started. Device not locked for debugging
625,253 UART: [kat] SHA2-256
804,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,993 UART: [kat] ++
816,441 UART: [kat] sha1
828,666 UART: [kat] SHA2-256
831,674 UART: [kat] SHA2-384
837,724 UART: [kat] SHA2-512-ACC
840,711 UART: [kat] ECC-384
3,281,953 UART: [kat] HMAC-384Kdf
3,294,828 UART: [kat] LMS
3,824,322 UART: [kat] --
3,828,323 UART: [cold-reset] ++
3,829,924 UART: [fht] FHT @ 0x50003400
3,841,169 UART: [idev] ++
3,841,768 UART: [idev] CDI.KEYID = 6
3,842,690 UART: [idev] SUBJECT.KEYID = 7
3,843,861 UART: [idev] UDS.KEYID = 0
3,857,574 UART: [idev] Erasing UDS.KEYID = 0
6,318,576 UART: [idev] Sha384 KeyId Algorithm
6,327,793 UART: [idev] --
6,332,100 UART: [ldev] ++
6,332,663 UART: [ldev] CDI.KEYID = 6
6,333,741 UART: [ldev] SUBJECT.KEYID = 5
6,334,844 UART: [ldev] AUTHORITY.KEYID = 7
6,336,012 UART: [ldev] FE.KEYID = 1
6,344,929 UART: [ldev] Erasing FE.KEYID = 1
8,823,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,723 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,585,539 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,607,079 UART: [ldev] --
10,611,420 UART: [fwproc] Wait for Commands...
10,613,621 UART: [fwproc] Recv command 0x46574c44
10,615,708 UART: [fwproc] Recv'd Img size: 114448 bytes
14,019,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,318 >>> mbox cmd response: success
14,483,025 UART: [afmc] ++
14,483,610 UART: [afmc] CDI.KEYID = 6
14,484,491 UART: [afmc] SUBJECT.KEYID = 7
14,485,698 UART: [afmc] AUTHORITY.KEYID = 5
16,982,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,006 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,329 UART: [afmc] --
18,777,594 UART: [cold-reset] --
18,781,282 UART: [state] Locking Datavault
18,786,250 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,949 UART: [state] Locking ICCM
18,790,362 UART: [exit] Launching FMC @ 0x40000130
18,798,824 UART:
18,799,109 UART: Running Caliptra FMC ...
18,800,222 UART:
18,800,383 UART: [state] CFI Enabled
18,808,319 UART: [fht] FMC Alias Private Key: 7
20,565,155 UART: [art] Extend RT PCRs Done
20,566,375 UART: [art] Lock RT PCRs Done
20,567,942 UART: [art] Populate DV Done
20,573,351 UART: [fht] FMC Alias Private Key: 7
20,575,045 UART: [art] Derive CDI
20,575,858 UART: [art] Store in in slot 0x4
20,618,451 UART: [art] Derive Key Pair
20,619,445 UART: [art] Store priv key in slot 0x5
23,046,630 UART: [art] Derive Key Pair - Done
23,059,788 UART: [art] Signing Cert with AUTHO
23,061,111 UART: RITY.KEYID = 7
24,766,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,113 UART: [art] PUB.X = 302BD8B2329700BFF9512D0BF220071A42053185879D7146CBFB04AE0D557A92EB58A2BE1A0367E837A7385DA842674B
24,775,358 UART: [art] PUB.Y = E4BB0058D48455C649D6D5F13E5C48755F0782387831E91FB4E255991BCBBE5A71AA59EE914130DA8253CF5D23B7D00E
24,782,578 UART: [art] SIG.R = B425472FDCE0621908566CFF1694708CC4F9DF253D8A3BC88EA49E45ECF0834EEC18DDC0330B68605681CF8B7B68CF50
24,790,016 UART: [art] SIG.S = 1BF898EAA684BA8C3B1CEED8734CE359094EC290FC9F5B5D6939C6C5A28DBB2D62DDDA60985B481A32E64287214F913D
25,768,822 UART: Caliptra RT
25,769,539 UART: [state] CFI Enabled
25,885,903 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
5,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,339 UART:
192,734 UART: Running Caliptra ROM ...
193,901 UART:
603,565 UART: [state] CFI Enabled
617,841 UART: [state] LifecycleState = Unprovisioned
619,740 UART: [state] DebugLocked = No
621,039 UART: [state] WD Timer not started. Device not locked for debugging
625,150 UART: [kat] SHA2-256
804,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,829 UART: [kat] ++
816,294 UART: [kat] sha1
827,062 UART: [kat] SHA2-256
830,078 UART: [kat] SHA2-384
835,627 UART: [kat] SHA2-512-ACC
838,596 UART: [kat] ECC-384
3,281,741 UART: [kat] HMAC-384Kdf
3,295,335 UART: [kat] LMS
3,824,811 UART: [kat] --
3,830,016 UART: [cold-reset] ++
3,831,571 UART: [fht] FHT @ 0x50003400
3,843,842 UART: [idev] ++
3,844,412 UART: [idev] CDI.KEYID = 6
3,845,322 UART: [idev] SUBJECT.KEYID = 7
3,846,533 UART: [idev] UDS.KEYID = 0
3,863,208 UART: [idev] Erasing UDS.KEYID = 0
6,320,234 UART: [idev] Fuse KeyId
6,324,219 UART: [idev] --
6,327,340 UART: [ldev] ++
6,327,905 UART: [ldev] CDI.KEYID = 6
6,328,920 UART: [ldev] SUBJECT.KEYID = 5
6,330,021 UART: [ldev] AUTHORITY.KEYID = 7
6,331,304 UART: [ldev] FE.KEYID = 1
6,341,301 UART: [ldev] Erasing FE.KEYID = 1
8,809,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,526,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,542,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,558,716 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,574,501 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,594,028 UART: [ldev] --
10,598,697 UART: [fwproc] Wait for Commands...
10,600,749 UART: [fwproc] Recv command 0x46574c44
10,602,791 UART: [fwproc] Recv'd Img size: 114448 bytes
14,001,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,068,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,136,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,456,008 >>> mbox cmd response: success
14,461,089 UART: [afmc] ++
14,461,674 UART: [afmc] CDI.KEYID = 6
14,462,583 UART: [afmc] SUBJECT.KEYID = 7
14,463,737 UART: [afmc] AUTHORITY.KEYID = 5
16,963,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,686,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,702,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,718,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,734,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,755,903 UART: [afmc] --
18,760,076 UART: [cold-reset] --
18,763,322 UART: [state] Locking Datavault
18,767,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,769,562 UART: [state] Locking ICCM
18,771,845 UART: [exit] Launching FMC @ 0x40000130
18,780,243 UART:
18,780,472 UART: Running Caliptra FMC ...
18,781,567 UART:
18,781,722 UART: [state] CFI Enabled
18,790,248 UART: [fht] FMC Alias Private Key: 7
20,547,328 UART: [art] Extend RT PCRs Done
20,548,546 UART: [art] Lock RT PCRs Done
20,550,169 UART: [art] Populate DV Done
20,555,528 UART: [fht] FMC Alias Private Key: 7
20,557,121 UART: [art] Derive CDI
20,557,932 UART: [art] Store in in slot 0x4
20,600,475 UART: [art] Derive Key Pair
20,601,527 UART: [art] Store priv key in slot 0x5
23,028,251 UART: [art] Derive Key Pair - Done
23,041,039 UART: [art] Signing Cert with AUTHO
23,042,347 UART: RITY.KEYID = 7
24,747,323 UART: [art] Erasing AUTHORITY.KEYID = 7
24,748,830 UART: [art] PUB.X = 284A875243B4D3C271D0B5F0B2BFADEE0A0D0B0B6E9215B4835597E418614DA50F6D867E0859937B6F6CA1F8E80A80A2
24,756,093 UART: [art] PUB.Y = A4AA96FBA1A306378AD1F157F57FACECC2605DF9026324C92704A055F8E3A64841FE70C5D0FB9739C6280C86A1420C63
24,763,340 UART: [art] SIG.R = 5C56611A03CFA29D556C63E3B436249E1BE2ADBE15904EC6A093F776AB8CD0BACD2F08EB29FB3C76D7C8A64D96E54463
24,770,786 UART: [art] SIG.S = 99A5DAFBB23BF2C088EF0691EA4E61F3F783EACEE4F309C51B9CE662C5D114801D80D52AEA2A3B5B2427552E0D62FB3A
25,749,123 UART: Caliptra RT
25,749,825 UART: [state] CFI Enabled
25,868,084 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
5,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,866 >>> mbox cmd response: success
18,521,089 UART:
18,521,516 UART: Running Caliptra FMC ...
18,522,648 UART:
18,522,806 UART: [state] CFI Enabled
18,530,447 UART: [fht] FMC Alias Private Key: 7
20,287,858 UART: [art] Extend RT PCRs Done
20,289,083 UART: [art] Lock RT PCRs Done
20,290,925 UART: [art] Populate DV Done
20,296,132 UART: [fht] FMC Alias Private Key: 7
20,297,830 UART: [art] Derive CDI
20,298,641 UART: [art] Store in in slot 0x4
20,341,205 UART: [art] Derive Key Pair
20,342,254 UART: [art] Store priv key in slot 0x5
22,768,639 UART: [art] Derive Key Pair - Done
22,781,481 UART: [art] Signing Cert with AUTHO
22,782,776 UART: RITY.KEYID = 7
24,487,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,083 UART: [art] PUB.X = AFD13627DC7AD99B88AE04EE7C3E4DA2B110BBC7A0B97580A2D691280CF20BE48D4599ABF5500A05B5A13BCC777D9CC8
24,496,381 UART: [art] PUB.Y = FFD66A30DDB11701914BFDACEE6D084346CEFA2DDB08A9F7E6CE29E603F4E325F34BFD95338F5EC94B8CAEDCBD0B8769
24,503,691 UART: [art] SIG.R = 4F930ACC2686592E21FBF5FB51CEB8DC9E7A74930E89B2C74F78A11C47F6C47301F435F44AA395846F90CE3E85890860
24,511,083 UART: [art] SIG.S = 0DB6A5D5ABF8F9ACEB699E6AD06AED3028FF6769BD2DF72BC344C685548C52541258E024DD1F1220A7EA8256D81B3910
25,490,538 UART: Caliptra RT
25,491,239 UART: [state] CFI Enabled
25,608,044 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
5,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,703 >>> mbox cmd response: success
18,499,627 UART:
18,500,046 UART: Running Caliptra FMC ...
18,501,208 UART:
18,501,361 UART: [state] CFI Enabled
18,508,925 UART: [fht] FMC Alias Private Key: 7
20,266,369 UART: [art] Extend RT PCRs Done
20,267,597 UART: [art] Lock RT PCRs Done
20,269,358 UART: [art] Populate DV Done
20,274,870 UART: [fht] FMC Alias Private Key: 7
20,276,350 UART: [art] Derive CDI
20,277,082 UART: [art] Store in in slot 0x4
20,319,731 UART: [art] Derive Key Pair
20,320,727 UART: [art] Store priv key in slot 0x5
22,747,617 UART: [art] Derive Key Pair - Done
22,760,237 UART: [art] Signing Cert with AUTHO
22,761,545 UART: RITY.KEYID = 7
24,466,876 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,381 UART: [art] PUB.X = 35E9EE2C4E07BFD3118CF9F7BCD2E2D8FD9B578552B28EF99DF783E338874CFFAB08936CF3732B30CEF02221B63C1B82
24,475,687 UART: [art] PUB.Y = 3C31AD12AAEB2F3617FCB6FA6FBF8F8B683C9EFEF7A887EA898432CF149223B8BDA36848F1D7CC3832AC992E3E6E6E20
24,482,922 UART: [art] SIG.R = 527A3D39209DB01CBE151CEAD37D7F72489C205FF35B8475C1D27B601D41E0CD1DACA53B0DB1B015262E1ACFF023DE07
24,490,397 UART: [art] SIG.S = 6A13D5570DB67F13933BE8057CB24CB20A8E697D0333F22BE84E914A46B90CD54BBECEEF0E7A58BF648E7E142900EC73
25,469,230 UART: Caliptra RT
25,469,944 UART: [state] CFI Enabled
25,586,442 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
5,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,060 >>> mbox cmd response: success
18,511,164 UART:
18,511,556 UART: Running Caliptra FMC ...
18,512,723 UART:
18,512,885 UART: [state] CFI Enabled
18,521,038 UART: [fht] FMC Alias Private Key: 7
20,278,258 UART: [art] Extend RT PCRs Done
20,279,486 UART: [art] Lock RT PCRs Done
20,281,322 UART: [art] Populate DV Done
20,286,635 UART: [fht] FMC Alias Private Key: 7
20,288,173 UART: [art] Derive CDI
20,288,921 UART: [art] Store in in slot 0x4
20,331,516 UART: [art] Derive Key Pair
20,332,519 UART: [art] Store priv key in slot 0x5
22,759,411 UART: [art] Derive Key Pair - Done
22,772,204 UART: [art] Signing Cert with AUTHO
22,773,534 UART: RITY.KEYID = 7
24,479,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,657 UART: [art] PUB.X = D791885F8D4D896E598DA646BCA5FF91AD94CB4D84F8198E48E9C8E50305A2CACB8ACD7EC78C90E06FBBFD56512438F9
24,487,955 UART: [art] PUB.Y = 2A35CFD9ECE7369CE12B7571A90462381E48857736AF7258743E8215DC0D8B236D0A11469E353C30CBFBC7D3D6E8DB4E
24,495,215 UART: [art] SIG.R = 1ED3A7A430D6622502AA2542414AFC692B8856B729F5F5BD85A9AD235A71E2D0130A53E079910BB7674745B63957B2EC
24,502,551 UART: [art] SIG.S = 954AE636C55EAAC74ACBEDA30FA239DF0F95B1AEA783D64971222E4E922283DA1A7845DE32C335396DD0AE8584737C4F
25,481,029 UART: Caliptra RT
25,481,725 UART: [state] CFI Enabled
25,599,553 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
5,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,867 >>> mbox cmd response: success
18,513,635 UART:
18,514,102 UART: Running Caliptra FMC ...
18,515,234 UART:
18,515,398 UART: [state] CFI Enabled
18,523,130 UART: [fht] FMC Alias Private Key: 7
20,280,280 UART: [art] Extend RT PCRs Done
20,281,505 UART: [art] Lock RT PCRs Done
20,283,531 UART: [art] Populate DV Done
20,289,005 UART: [fht] FMC Alias Private Key: 7
20,290,562 UART: [art] Derive CDI
20,291,326 UART: [art] Store in in slot 0x4
20,334,034 UART: [art] Derive Key Pair
20,335,082 UART: [art] Store priv key in slot 0x5
22,761,377 UART: [art] Derive Key Pair - Done
22,774,422 UART: [art] Signing Cert with AUTHO
22,775,717 UART: RITY.KEYID = 7
24,481,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,813 UART: [art] PUB.X = C2CD6371BA13C4C26AF9AFFD65242888FF7EB42C2D2D5EBD894416FFFF2F0B53A351FB0D5593AD02958C2C76C298715D
24,490,109 UART: [art] PUB.Y = 8AB214F9217B2DD33981F822F8BAA9A35D2DFC523EA6AC48118F06B90A24E58850AADA6327805C0CF20AB19DB3E231C1
24,497,365 UART: [art] SIG.R = 24DAEF7E4B3C01E4045A0DE2D5215C18801D738D73D1DD5FE982309E9484366DF06C124D6E266FFC76BEEB10C999E9AC
24,504,763 UART: [art] SIG.S = 7BBFA30701056CCE6BFB76F964FDCBC10675B4070CA58B40A3BB42FE5A37386DE8C5F969B469F5EFE5283A7D959B4BEB
25,483,294 UART: Caliptra RT
25,483,987 UART: [state] CFI Enabled
25,601,792 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,616,485 UART: [state] Locking Datavault
18,623,625 UART: [state] Locking PCR0, PCR1 and PCR31
18,625,269 UART: [state] Locking ICCM
18,627,392 UART: [exit] Launching FMC @ 0x40000130
18,635,788 UART:
18,636,022 UART: Running Caliptra FMC ...
18,637,125 UART:
18,637,281 UART: [state] CFI Enabled
18,695,425 UART: [fht] FMC Alias Private Key: 7
20,458,855 UART: [art] Extend RT PCRs Done
20,460,077 UART: [art] Lock RT PCRs Done
20,461,783 UART: [art] Populate DV Done
20,467,310 UART: [fht] FMC Alias Private Key: 7
20,468,847 UART: [art] Derive CDI
20,469,578 UART: [art] Store in in slot 0x4
20,527,750 UART: [art] Derive Key Pair
20,528,790 UART: [art] Store priv key in slot 0x5
22,992,574 UART: [art] Derive Key Pair - Done
23,005,515 UART: [art] Signing Cert with AUTHO
23,006,825 UART: RITY.KEYID = 7
24,717,663 UART: [art] Erasing AUTHORITY.KEYID = 7
24,719,166 UART: [art] PUB.X = 26A29C381C421343D16A7932D68A834B9A307005C42F25BCA49AE46889443A76233110DB4FEE40E2A815EAB646A2330A
24,726,409 UART: [art] PUB.Y = C987F237FD63631118C42178F57F2926093D08672CD10DB6CECFD24C11D059285DDFB99BB9AE827CEF4D5D22BDC2F45B
24,733,688 UART: [art] SIG.R = D668F8B42F1D1C1D8DD5E2D9036853084B565967BA67DBD670512BB37D2D8B6FDBBA5A1515B68609282E9C770CC3A803
24,741,088 UART: [art] SIG.S = F209979D89A98AA220F3336E77A3C47FBFEA7B3CD18A515B696276381EBB4FC1EB0BAAA645F4113F958A3FA544FE8D7B
25,720,631 UART: Caliptra RT
25,721,337 UART: [state] CFI Enabled
25,884,781 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
5,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,432 UART:
192,813 UART: Running Caliptra ROM ...
193,906 UART:
194,051 UART: [state] CFI Enabled
263,341 UART: [state] LifecycleState = Unprovisioned
265,217 UART: [state] DebugLocked = No
267,108 UART: [state] WD Timer not started. Device not locked for debugging
270,553 UART: [kat] SHA2-256
449,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,277 UART: [kat] ++
461,731 UART: [kat] sha1
472,187 UART: [kat] SHA2-256
475,226 UART: [kat] SHA2-384
480,774 UART: [kat] SHA2-512-ACC
483,709 UART: [kat] ECC-384
2,945,510 UART: [kat] HMAC-384Kdf
2,970,488 UART: [kat] LMS
3,499,955 UART: [kat] --
3,505,624 UART: [cold-reset] ++
3,508,044 UART: [fht] FHT @ 0x50003400
3,518,404 UART: [idev] ++
3,519,040 UART: [idev] CDI.KEYID = 6
3,519,966 UART: [idev] SUBJECT.KEYID = 7
3,521,133 UART: [idev] UDS.KEYID = 0
3,541,754 UART: [idev] Erasing UDS.KEYID = 0
6,022,255 UART: [idev] Sha384 KeyId Algorithm
6,031,255 UART: [idev] --
6,035,032 UART: [ldev] ++
6,035,616 UART: [ldev] CDI.KEYID = 6
6,036,530 UART: [ldev] SUBJECT.KEYID = 5
6,037,693 UART: [ldev] AUTHORITY.KEYID = 7
6,038,947 UART: [ldev] FE.KEYID = 1
6,075,153 UART: [ldev] Erasing FE.KEYID = 1
8,580,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,364 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,364,208 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,383,213 UART: [ldev] --
10,387,828 UART: [fwproc] Wait for Commands...
10,390,900 UART: [fwproc] Recv command 0x46574c44
10,392,986 UART: [fwproc] Recv'd Img size: 114448 bytes
13,791,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,865,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,933,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,251,593 >>> mbox cmd response: success
14,255,487 UART: [afmc] ++
14,256,107 UART: [afmc] CDI.KEYID = 6
14,257,019 UART: [afmc] SUBJECT.KEYID = 7
14,258,127 UART: [afmc] AUTHORITY.KEYID = 5
16,779,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,504,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,506,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,522,595 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,538,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,554,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,576,634 UART: [afmc] --
18,580,562 UART: [cold-reset] --
18,583,725 UART: [state] Locking Datavault
18,589,350 UART: [state] Locking PCR0, PCR1 and PCR31
18,590,992 UART: [state] Locking ICCM
18,592,382 UART: [exit] Launching FMC @ 0x40000130
18,600,781 UART:
18,601,046 UART: Running Caliptra FMC ...
18,602,159 UART:
18,602,314 UART: [state] CFI Enabled
18,662,958 UART: [fht] FMC Alias Private Key: 7
20,426,921 UART: [art] Extend RT PCRs Done
20,428,149 UART: [art] Lock RT PCRs Done
20,430,094 UART: [art] Populate DV Done
20,435,724 UART: [fht] FMC Alias Private Key: 7
20,437,368 UART: [art] Derive CDI
20,438,183 UART: [art] Store in in slot 0x4
20,495,441 UART: [art] Derive Key Pair
20,496,480 UART: [art] Store priv key in slot 0x5
22,959,203 UART: [art] Derive Key Pair - Done
22,972,416 UART: [art] Signing Cert with AUTHO
22,973,715 UART: RITY.KEYID = 7
24,684,374 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,898 UART: [art] PUB.X = F4768B4770E12BE8CFF0AC10438DDA54BBAA702FE3A493CE0C359F3162171108A119C9C8E35D5821403DBCA9FF4605D5
24,693,141 UART: [art] PUB.Y = C5CD9DB1AC5DD49145764825EBF04E82A65DFF04748FCCD9DC3268356F5D27B251F6EC942F62AC7C579318991CDFF8E7
24,700,436 UART: [art] SIG.R = 538DC9603F123F8ACA3E0B3D5110524F21F385C24F120E60DA091A3E3D16112C1258BE49916B7209191DBB5A17AE85A6
24,707,767 UART: [art] SIG.S = B81DFA8EFC9CF6D824016FD25E45D813F770AC527E91B2CFA1FFDE4A8AA2E9A51046CAE8F2714E005985A1E28D89433B
25,686,749 UART: Caliptra RT
25,687,433 UART: [state] CFI Enabled
25,851,352 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
5,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,345 UART:
192,715 UART: Running Caliptra ROM ...
193,883 UART:
194,031 UART: [state] CFI Enabled
265,851 UART: [state] LifecycleState = Unprovisioned
267,785 UART: [state] DebugLocked = No
269,870 UART: [state] WD Timer not started. Device not locked for debugging
273,657 UART: [kat] SHA2-256
452,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,384 UART: [kat] ++
464,916 UART: [kat] sha1
474,967 UART: [kat] SHA2-256
478,017 UART: [kat] SHA2-384
483,581 UART: [kat] SHA2-512-ACC
486,521 UART: [kat] ECC-384
2,946,763 UART: [kat] HMAC-384Kdf
2,969,574 UART: [kat] LMS
3,498,997 UART: [kat] --
3,502,448 UART: [cold-reset] ++
3,504,861 UART: [fht] FHT @ 0x50003400
3,516,166 UART: [idev] ++
3,516,774 UART: [idev] CDI.KEYID = 6
3,517,690 UART: [idev] SUBJECT.KEYID = 7
3,518,856 UART: [idev] UDS.KEYID = 0
3,542,292 UART: [idev] Erasing UDS.KEYID = 0
6,024,170 UART: [idev] Fuse KeyId
6,028,143 UART: [idev] --
6,032,461 UART: [ldev] ++
6,033,058 UART: [ldev] CDI.KEYID = 6
6,033,975 UART: [ldev] SUBJECT.KEYID = 5
6,035,142 UART: [ldev] AUTHORITY.KEYID = 7
6,036,376 UART: [ldev] FE.KEYID = 1
6,076,205 UART: [ldev] Erasing FE.KEYID = 1
8,580,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,869 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,362,652 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,383,654 UART: [ldev] --
10,387,726 UART: [fwproc] Wait for Commands...
10,389,443 UART: [fwproc] Recv command 0x46574c44
10,391,489 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,949 >>> mbox cmd response: success
14,258,097 UART: [afmc] ++
14,258,688 UART: [afmc] CDI.KEYID = 6
14,259,568 UART: [afmc] SUBJECT.KEYID = 7
14,260,782 UART: [afmc] AUTHORITY.KEYID = 5
16,804,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,359 UART: [afmc] --
18,623,842 UART: [cold-reset] --
18,627,104 UART: [state] Locking Datavault
18,633,164 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,871 UART: [state] Locking ICCM
18,636,731 UART: [exit] Launching FMC @ 0x40000130
18,645,135 UART:
18,645,374 UART: Running Caliptra FMC ...
18,646,475 UART:
18,646,629 UART: [state] CFI Enabled
18,704,064 UART: [fht] FMC Alias Private Key: 7
20,468,840 UART: [art] Extend RT PCRs Done
20,470,060 UART: [art] Lock RT PCRs Done
20,471,821 UART: [art] Populate DV Done
20,476,987 UART: [fht] FMC Alias Private Key: 7
20,478,482 UART: [art] Derive CDI
20,479,217 UART: [art] Store in in slot 0x4
20,537,124 UART: [art] Derive Key Pair
20,538,122 UART: [art] Store priv key in slot 0x5
23,000,915 UART: [art] Derive Key Pair - Done
23,013,725 UART: [art] Signing Cert with AUTHO
23,015,032 UART: RITY.KEYID = 7
24,726,771 UART: [art] Erasing AUTHORITY.KEYID = 7
24,728,273 UART: [art] PUB.X = 67A3D55F600BE5648F8CEF019CDDAA836F92CDCB4F4B05148486FD69C81EC830FE8BB4FDBFEF8DDD38393A6CCB36B5DD
24,735,617 UART: [art] PUB.Y = A95237852B67115960CD734FB8BB513E3473A8A9E1AB07EA7BB2F4557ACC6406A07CCBB69D3DADFB3A49711E55D6CE68
24,742,851 UART: [art] SIG.R = AC4E061B84CA198047BA4284AC4895DFE21D1628C6BACEB2897911B8908FD4886DB2E5E329857C585D9EF33ED5C8435B
24,750,244 UART: [art] SIG.S = CF17F1A8DF083DF6EB1501635D46FF7C1D7C5C37FFF617F0B433A5DC9E2F9203CD5507950C5D7B6EDADA5458E11C7769
25,728,666 UART: Caliptra RT
25,729,385 UART: [state] CFI Enabled
25,896,180 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,251 writing to cptra_bootfsm_go
6,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,151 >>> mbox cmd response: success
18,388,390 UART:
18,388,783 UART: Running Caliptra FMC ...
18,389,968 UART:
18,390,139 UART: [state] CFI Enabled
18,453,669 UART: [fht] FMC Alias Private Key: 7
20,217,568 UART: [art] Extend RT PCRs Done
20,218,796 UART: [art] Lock RT PCRs Done
20,220,430 UART: [art] Populate DV Done
20,225,798 UART: [fht] FMC Alias Private Key: 7
20,227,498 UART: [art] Derive CDI
20,228,312 UART: [art] Store in in slot 0x4
20,286,113 UART: [art] Derive Key Pair
20,287,156 UART: [art] Store priv key in slot 0x5
22,760,116 UART: [art] Derive Key Pair - Done
22,773,094 UART: [art] Signing Cert with AUTHO
22,774,414 UART: RITY.KEYID = 7
24,486,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,205 UART: [art] PUB.X = 181DC360A5D5F9DF1226DCF720E489D09E7BDA5B0E9E3E743C5B14AB0E6F074FA6D115F1BB477D992B7E5931A91D63AD
24,495,460 UART: [art] PUB.Y = E0A539615DC612435751D91BD944A84DA15862DCF165AA0C92D167161AA8944DBEF1F7783F845092EB6CFEC654DBA0C2
24,502,744 UART: [art] SIG.R = 80ACD1BDD0FA0A38D21D2817D241256629F20B56F28EFF03D5BA0BF57268B063E5DC7ADEDDAEA40844331790CD727224
24,510,145 UART: [art] SIG.S = BF55456AD31914520F282E7A9B955D2809C4613A03200B9A5FD56BC511A1FFA1C597E45D97376A332134D68EEB969850
25,489,144 UART: Caliptra RT
25,489,862 UART: [state] CFI Enabled
25,654,113 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
4,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,055,808 >>> mbox cmd response: success
18,347,762 UART:
18,348,178 UART: Running Caliptra FMC ...
18,349,339 UART:
18,349,510 UART: [state] CFI Enabled
18,410,369 UART: [fht] FMC Alias Private Key: 7
20,174,890 UART: [art] Extend RT PCRs Done
20,176,108 UART: [art] Lock RT PCRs Done
20,177,784 UART: [art] Populate DV Done
20,183,025 UART: [fht] FMC Alias Private Key: 7
20,184,577 UART: [art] Derive CDI
20,185,344 UART: [art] Store in in slot 0x4
20,242,284 UART: [art] Derive Key Pair
20,243,325 UART: [art] Store priv key in slot 0x5
22,706,587 UART: [art] Derive Key Pair - Done
22,719,489 UART: [art] Signing Cert with AUTHO
22,720,800 UART: RITY.KEYID = 7
24,431,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,386 UART: [art] PUB.X = 0C79CA68192AB1DF368CC58CCA91AF240CF145D4A4D550DC85CA015120732016CC3F0CA0752EFD7EE99BBED1D38A4EF4
24,440,752 UART: [art] PUB.Y = B75053542371BD25A9816C4BD25951EA9F0DCA14AE9BB4872CEC7A99613CCF30FEC2B5EA81C0528757E36584FF2CEEA4
24,447,999 UART: [art] SIG.R = D9E76F3AC2392DA2E55DC108569FD264B345E450289A3CD25D0BCB587B64352A0BDC3C89D1D6DF0DF3863ECF68312FD6
24,455,423 UART: [art] SIG.S = EF96319AB7AEB221121635E10C23B2B1F98D8CF50D1821A86585E94E69896294DE8E5191D8E5010ABEFFA54EEEF314C1
25,433,843 UART: Caliptra RT
25,434,556 UART: [state] CFI Enabled
25,597,481 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
5,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,052 >>> mbox cmd response: success
18,342,802 UART:
18,343,186 UART: Running Caliptra FMC ...
18,344,381 UART:
18,344,546 UART: [state] CFI Enabled
18,408,700 UART: [fht] FMC Alias Private Key: 7
20,172,826 UART: [art] Extend RT PCRs Done
20,174,045 UART: [art] Lock RT PCRs Done
20,175,942 UART: [art] Populate DV Done
20,181,357 UART: [fht] FMC Alias Private Key: 7
20,182,953 UART: [art] Derive CDI
20,183,771 UART: [art] Store in in slot 0x4
20,241,411 UART: [art] Derive Key Pair
20,242,454 UART: [art] Store priv key in slot 0x5
22,705,653 UART: [art] Derive Key Pair - Done
22,718,333 UART: [art] Signing Cert with AUTHO
22,719,637 UART: RITY.KEYID = 7
24,431,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,945 UART: [art] PUB.X = 20F0AB521FF292F47C8477D063E6BCFF00791AAAEFE5A6629FB117CF7B128DCC0B4D9EEC622EE8CBA180563FF4E68DD2
24,440,191 UART: [art] PUB.Y = 6D3659B30A587E1BFBB15D7CA6A0D5187E9C3ED3DCF2BC2EDED2D5658F341B8BAF5AFD310119B11D8877192839224335
24,447,455 UART: [art] SIG.R = 68B736C73F9903736CF3C604ECDF2370E7A6F35D76A05FAD5FEEF14997B9A1DFCCB082942EB3582C7E14F4F00FDE5640
24,454,900 UART: [art] SIG.S = 2ED604984B1712686218D6E4E45C90F13ECB6EA07D6091AF04CAC534B1621A4E6AEF20F086CEC8EBDA05F462A34A6032
25,433,544 UART: Caliptra RT
25,434,258 UART: [state] CFI Enabled
25,598,244 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,039 writing to cptra_bootfsm_go
6,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,624 >>> mbox cmd response: success
18,343,054 UART:
18,343,624 UART: Running Caliptra FMC ...
18,344,758 UART:
18,344,913 UART: [state] CFI Enabled
18,414,493 UART: [fht] FMC Alias Private Key: 7
20,178,965 UART: [art] Extend RT PCRs Done
20,180,189 UART: [art] Lock RT PCRs Done
20,181,550 UART: [art] Populate DV Done
20,186,686 UART: [fht] FMC Alias Private Key: 7
20,188,390 UART: [art] Derive CDI
20,189,208 UART: [art] Store in in slot 0x4
20,247,169 UART: [art] Derive Key Pair
20,248,204 UART: [art] Store priv key in slot 0x5
22,711,007 UART: [art] Derive Key Pair - Done
22,723,775 UART: [art] Signing Cert with AUTHO
22,725,142 UART: RITY.KEYID = 7
24,437,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,846 UART: [art] PUB.X = 9E4A73B6E14AD8BF9446523891E09D7BD5C46DF664686828D894F0D86A38B50A7261C9E4CA8F7E693A4B51EF7E9A926A
24,446,149 UART: [art] PUB.Y = 7DFB10F22ED1FD420E05A01DC6026C8164BD87833D51F710EEBEF5C5CFF673FCF17569DC373B7F90FE704EDC576F609A
24,453,419 UART: [art] SIG.R = 5F6BB96E69E0B77887DC1A1FA1ECA5BF9280DE48B376A2FA6E9B6122C70AA1F2174789305905AA6574C2B4557600DE8B
24,460,807 UART: [art] SIG.S = 18075ABBFB1FA4DDBD407394AF0CDFA16750FEF5CF0973C6C5A1E91B1D3DA03A04B0725C2A57EE84DBD35AFE3AE5F8A4
25,439,633 UART: Caliptra RT
25,440,340 UART: [state] CFI Enabled
25,606,548 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,783,207 UART: [state] Locking Datavault
18,787,795 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,450 UART: [state] Locking ICCM
18,790,948 UART: [exit] Launching FMC @ 0x40000130
18,799,398 UART:
18,799,628 UART: Running Caliptra FMC ...
18,800,725 UART:
18,800,884 UART: [state] CFI Enabled
18,808,930 UART: [fht] FMC Alias Private Key: 7
20,565,145 UART: [art] Extend RT PCRs Done
20,566,360 UART: [art] Lock RT PCRs Done
20,567,955 UART: [art] Populate DV Done
20,573,472 UART: [fht] FMC Alias Private Key: 7
20,575,167 UART: [art] Derive CDI
20,575,975 UART: [art] Store in in slot 0x4
20,618,614 UART: [art] Derive Key Pair
20,619,608 UART: [art] Store priv key in slot 0x5
23,046,711 UART: [art] Derive Key Pair - Done
23,059,514 UART: [art] Signing Cert with AUTHO
23,060,822 UART: RITY.KEYID = 7
24,766,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,992 UART: [art] PUB.X = D6A883AC7ED438E01EE86AC011CA5D5514627375EAED46D644949F6A38299C34BBE58118F7D10E66E8149FAD42D8A1B0
24,775,282 UART: [art] PUB.Y = A2B9CD910DA5099B69391D568AB5379D6F9D5D7017794F527E89BF4F87DE7B1A50BA76F0CA38577745956E286791F2A8
24,782,508 UART: [art] SIG.R = A180A2BDAC7D97C18396A5804D778E0A0DE49599220CD3797C65CB4F87C6406C7F074CF1CAD472B9F9F5786A4AD1E685
24,789,944 UART: [art] SIG.S = C7CF8DBCC3B4F4343892CC4FC566E97BE43DFBD5A7DFF5A50194BC931223F514466DF297EEF5C44B25DC8E227CD9D005
25,768,576 UART: Caliptra RT
25,769,260 UART: [state] CFI Enabled
25,884,749 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
5,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,535 UART:
192,916 UART: Running Caliptra ROM ...
194,095 UART:
603,535 UART: [state] CFI Enabled
619,054 UART: [state] LifecycleState = Unprovisioned
620,974 UART: [state] DebugLocked = No
622,894 UART: [state] WD Timer not started. Device not locked for debugging
626,234 UART: [kat] SHA2-256
805,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,970 UART: [kat] ++
817,503 UART: [kat] sha1
828,221 UART: [kat] SHA2-256
831,274 UART: [kat] SHA2-384
836,806 UART: [kat] SHA2-512-ACC
839,741 UART: [kat] ECC-384
3,281,212 UART: [kat] HMAC-384Kdf
3,293,431 UART: [kat] LMS
3,822,890 UART: [kat] --
3,828,942 UART: [cold-reset] ++
3,830,278 UART: [fht] FHT @ 0x50003400
3,840,662 UART: [idev] ++
3,841,219 UART: [idev] CDI.KEYID = 6
3,842,181 UART: [idev] SUBJECT.KEYID = 7
3,843,337 UART: [idev] UDS.KEYID = 0
3,861,761 UART: [idev] Erasing UDS.KEYID = 0
6,319,603 UART: [idev] Sha384 KeyId Algorithm
6,327,612 UART: [idev] --
6,332,087 UART: [ldev] ++
6,332,658 UART: [ldev] CDI.KEYID = 6
6,333,541 UART: [ldev] SUBJECT.KEYID = 5
6,334,671 UART: [ldev] AUTHORITY.KEYID = 7
6,336,010 UART: [ldev] FE.KEYID = 1
6,348,060 UART: [ldev] Erasing FE.KEYID = 1
8,820,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,895 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,586,684 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,607,179 UART: [ldev] --
10,611,361 UART: [fwproc] Wait for Commands...
10,613,030 UART: [fwproc] Recv command 0x46574c44
10,615,094 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,979 >>> mbox cmd response: success
14,482,754 UART: [afmc] ++
14,483,337 UART: [afmc] CDI.KEYID = 6
14,484,247 UART: [afmc] SUBJECT.KEYID = 7
14,485,460 UART: [afmc] AUTHORITY.KEYID = 5
16,985,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,747 UART: [afmc] --
18,782,619 UART: [cold-reset] --
18,787,504 UART: [state] Locking Datavault
18,791,563 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,200 UART: [state] Locking ICCM
18,794,647 UART: [exit] Launching FMC @ 0x40000130
18,803,039 UART:
18,803,271 UART: Running Caliptra FMC ...
18,804,365 UART:
18,804,514 UART: [state] CFI Enabled
18,812,877 UART: [fht] FMC Alias Private Key: 7
20,570,279 UART: [art] Extend RT PCRs Done
20,571,498 UART: [art] Lock RT PCRs Done
20,573,341 UART: [art] Populate DV Done
20,578,750 UART: [fht] FMC Alias Private Key: 7
20,580,394 UART: [art] Derive CDI
20,581,147 UART: [art] Store in in slot 0x4
20,623,953 UART: [art] Derive Key Pair
20,624,992 UART: [art] Store priv key in slot 0x5
23,052,004 UART: [art] Derive Key Pair - Done
23,065,164 UART: [art] Signing Cert with AUTHO
23,066,465 UART: RITY.KEYID = 7
24,772,164 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,666 UART: [art] PUB.X = 4185E2DE2E95757DB993FCBF7367C928D8A0C36C90E454D7EC8B0672EC9CFA923D8A31246E08725E358F8E2C152B6F71
24,780,954 UART: [art] PUB.Y = 5B24030AAD6D370190E0815071A2EC2777F02A5263F8DFF902624DD5CF500B372C7C449008F9838635300C6C9FDC68E9
24,788,176 UART: [art] SIG.R = 12769E9C327F33DFB7DFCBF517DE353918EA765A39FCF23A3F92ECE668F7A98B394FCB99F9C106D244EEF2722A73E59E
24,795,614 UART: [art] SIG.S = 2758940944D1C6ECD8F3741612F5E16A7E43833BA3729F5A38C7373A6D7142E9355450258E2710BE6166751D6CE31814
25,774,477 UART: Caliptra RT
25,775,186 UART: [state] CFI Enabled
25,892,140 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
5,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,502 UART:
192,887 UART: Running Caliptra ROM ...
194,055 UART:
603,642 UART: [state] CFI Enabled
618,281 UART: [state] LifecycleState = Unprovisioned
620,198 UART: [state] DebugLocked = No
621,865 UART: [state] WD Timer not started. Device not locked for debugging
626,118 UART: [kat] SHA2-256
805,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,811 UART: [kat] ++
817,258 UART: [kat] sha1
828,130 UART: [kat] SHA2-256
831,191 UART: [kat] SHA2-384
836,790 UART: [kat] SHA2-512-ACC
839,716 UART: [kat] ECC-384
3,281,619 UART: [kat] HMAC-384Kdf
3,293,729 UART: [kat] LMS
3,823,204 UART: [kat] --
3,829,047 UART: [cold-reset] ++
3,831,683 UART: [fht] FHT @ 0x50003400
3,843,843 UART: [idev] ++
3,844,419 UART: [idev] CDI.KEYID = 6
3,845,335 UART: [idev] SUBJECT.KEYID = 7
3,846,541 UART: [idev] UDS.KEYID = 0
3,862,146 UART: [idev] Erasing UDS.KEYID = 0
6,321,345 UART: [idev] Fuse KeyId
6,325,311 UART: [idev] --
6,328,221 UART: [ldev] ++
6,328,786 UART: [ldev] CDI.KEYID = 6
6,329,689 UART: [ldev] SUBJECT.KEYID = 5
6,330,907 UART: [ldev] AUTHORITY.KEYID = 7
6,332,092 UART: [ldev] FE.KEYID = 1
6,341,092 UART: [ldev] Erasing FE.KEYID = 1
8,811,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,529,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,545,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,561,654 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,577,473 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,598,365 UART: [ldev] --
10,603,899 UART: [fwproc] Wait for Commands...
10,607,136 UART: [fwproc] Recv command 0x46574c44
10,609,228 UART: [fwproc] Recv'd Img size: 114448 bytes
14,012,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,084,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,152,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,470,966 >>> mbox cmd response: success
14,475,697 UART: [afmc] ++
14,476,277 UART: [afmc] CDI.KEYID = 6
14,477,182 UART: [afmc] SUBJECT.KEYID = 7
14,478,392 UART: [afmc] AUTHORITY.KEYID = 5
16,981,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,719,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,735,562 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,039 UART: [afmc] --
18,777,465 UART: [cold-reset] --
18,780,942 UART: [state] Locking Datavault
18,786,614 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,304 UART: [state] Locking ICCM
18,789,423 UART: [exit] Launching FMC @ 0x40000130
18,797,815 UART:
18,798,044 UART: Running Caliptra FMC ...
18,799,144 UART:
18,799,301 UART: [state] CFI Enabled
18,807,612 UART: [fht] FMC Alias Private Key: 7
20,563,807 UART: [art] Extend RT PCRs Done
20,565,024 UART: [art] Lock RT PCRs Done
20,566,910 UART: [art] Populate DV Done
20,572,429 UART: [fht] FMC Alias Private Key: 7
20,573,892 UART: [art] Derive CDI
20,574,657 UART: [art] Store in in slot 0x4
20,617,572 UART: [art] Derive Key Pair
20,618,567 UART: [art] Store priv key in slot 0x5
23,045,171 UART: [art] Derive Key Pair - Done
23,058,223 UART: [art] Signing Cert with AUTHO
23,059,556 UART: RITY.KEYID = 7
24,764,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,507 UART: [art] PUB.X = 380A806B1C9D79CD6E3AE9D7068AF97EB8A4AAEB7AD8973CA07E1107C908F7EB1D154C651C958F88019E71EC26A058CE
24,773,808 UART: [art] PUB.Y = C6DEDD0A8B591D6DD20EAAF0026090540280EC3380FD19937D4A6F9DB54A582E679E3B361A03002FE2E8C352059472D9
24,781,031 UART: [art] SIG.R = 5F276543CF3CF66DD6C20CB755CF550CF5C5D1D8148AFB2FBCC62761D30FD81C2FC53BD89854B3DE945437E32524D954
24,788,410 UART: [art] SIG.S = EDE784798561DDDFBF8823677F1E41C7C2F541099001C7372D76E5B5E0AFD279433978137ACECA9D3F3A028B5AB642B8
25,767,695 UART: Caliptra RT
25,768,394 UART: [state] CFI Enabled
25,884,575 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
6,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,309 >>> mbox cmd response: success
18,532,586 UART:
18,533,004 UART: Running Caliptra FMC ...
18,534,110 UART:
18,534,266 UART: [state] CFI Enabled
18,542,043 UART: [fht] FMC Alias Private Key: 7
20,298,817 UART: [art] Extend RT PCRs Done
20,300,044 UART: [art] Lock RT PCRs Done
20,301,805 UART: [art] Populate DV Done
20,307,389 UART: [fht] FMC Alias Private Key: 7
20,308,924 UART: [art] Derive CDI
20,309,682 UART: [art] Store in in slot 0x4
20,352,057 UART: [art] Derive Key Pair
20,353,056 UART: [art] Store priv key in slot 0x5
22,779,441 UART: [art] Derive Key Pair - Done
22,792,281 UART: [art] Signing Cert with AUTHO
22,793,588 UART: RITY.KEYID = 7
24,498,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,131 UART: [art] PUB.X = 6D632D0135CD50A63D73EC748AC0CC3DA98EEB3CE9177FF4911C69D198EE40B33FE9CC2E71DD3696FD801E2E85B90777
24,507,431 UART: [art] PUB.Y = 3242F2A6AFC929C9F7013935151AE464DBA211EBB92DA1360AA7523506E8DBD0CBB2EEB10EA7A1D09B3FD46CD70E4232
24,514,690 UART: [art] SIG.R = 24562E965450C7A2FD7A5EDB596F2F10B92E7FB0C1C2C513720FCAC7A17C31C68A9CF1E71737DE9A3C365093088541DC
24,522,080 UART: [art] SIG.S = 39966BC6A9981ACF09EF1CE1390D325F1CF81E201880542F18D979CE9BBAC10CD3DAECC8DDF7F9F74B9BED2A6BE2655D
25,501,239 UART: Caliptra RT
25,501,955 UART: [state] CFI Enabled
25,618,853 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
5,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,159 >>> mbox cmd response: success
18,506,132 UART:
18,506,533 UART: Running Caliptra FMC ...
18,507,804 UART:
18,507,976 UART: [state] CFI Enabled
18,515,751 UART: [fht] FMC Alias Private Key: 7
20,273,413 UART: [art] Extend RT PCRs Done
20,274,638 UART: [art] Lock RT PCRs Done
20,276,479 UART: [art] Populate DV Done
20,281,940 UART: [fht] FMC Alias Private Key: 7
20,283,534 UART: [art] Derive CDI
20,284,345 UART: [art] Store in in slot 0x4
20,327,067 UART: [art] Derive Key Pair
20,328,119 UART: [art] Store priv key in slot 0x5
22,754,860 UART: [art] Derive Key Pair - Done
22,767,749 UART: [art] Signing Cert with AUTHO
22,769,053 UART: RITY.KEYID = 7
24,474,212 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,721 UART: [art] PUB.X = 0FE05EAABF76F3D4608A03104D3973BF2C04B0280C77F8807ADBF663976A304B4A8856F1BC9A4808EACBE4627D83246C
24,483,036 UART: [art] PUB.Y = A8B04EC481174088B19426E25EFEF8F3ACB662549EFB1FABB97A55FB5809DE97DF138086CB3F7A49A2B2E8FB42E8ACD9
24,490,271 UART: [art] SIG.R = 7AA2902DF2DC6955EDA32543B6F93C5296DA8A711DE810424ACF3A1C1C6386241FF8250B1F788EABEA5C8A9A521024E6
24,497,654 UART: [art] SIG.S = DA764D138885B076C134EE944DF2A2375C40DD63A8B0F5DF172404EDB0F742F9E61F0C45C9CBC0C8C96F75092854FDB7
25,476,552 UART: Caliptra RT
25,477,251 UART: [state] CFI Enabled
25,594,537 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
6,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,265 >>> mbox cmd response: success
18,518,012 UART:
18,518,425 UART: Running Caliptra FMC ...
18,519,690 UART:
18,519,868 UART: [state] CFI Enabled
18,527,707 UART: [fht] FMC Alias Private Key: 7
20,284,859 UART: [art] Extend RT PCRs Done
20,286,088 UART: [art] Lock RT PCRs Done
20,287,999 UART: [art] Populate DV Done
20,293,134 UART: [fht] FMC Alias Private Key: 7
20,294,845 UART: [art] Derive CDI
20,295,657 UART: [art] Store in in slot 0x4
20,338,328 UART: [art] Derive Key Pair
20,339,372 UART: [art] Store priv key in slot 0x5
22,766,672 UART: [art] Derive Key Pair - Done
22,779,772 UART: [art] Signing Cert with AUTHO
22,781,072 UART: RITY.KEYID = 7
24,486,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,272 UART: [art] PUB.X = 824CD47CE02B14D2FC2FBB776F2CC0141BAE556C75ABF2E89A30D95F1744BB0F7D4039BC32CC4F85852F74F75CCD942E
24,495,580 UART: [art] PUB.Y = 71D37BBC6164F8A60403DE8923487B820BD2C9D710C20D960D3956AC75EB158735138D833E18790A085E6162C24018B0
24,502,835 UART: [art] SIG.R = 90D3951BD9F5FD4C778F815B198EFE0A32932E8F030B41BD3AE0487EDA4700B41463AA586386A8E62EDF2E60BCBD11F7
24,510,231 UART: [art] SIG.S = 673B0D50FC38F86CA04E6FAC10C79CEBA1C5C07BBD96ECA2308021F32B1E9E0EBE2C7428A0C4BF26E5F59C1518A63C9C
25,489,530 UART: Caliptra RT
25,490,220 UART: [state] CFI Enabled
25,607,370 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
5,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,255,394 >>> mbox cmd response: success
18,500,950 UART:
18,501,336 UART: Running Caliptra FMC ...
18,502,527 UART:
18,502,713 UART: [state] CFI Enabled
18,510,823 UART: [fht] FMC Alias Private Key: 7
20,267,432 UART: [art] Extend RT PCRs Done
20,268,661 UART: [art] Lock RT PCRs Done
20,270,826 UART: [art] Populate DV Done
20,276,026 UART: [fht] FMC Alias Private Key: 7
20,277,624 UART: [art] Derive CDI
20,278,435 UART: [art] Store in in slot 0x4
20,321,144 UART: [art] Derive Key Pair
20,322,186 UART: [art] Store priv key in slot 0x5
22,748,590 UART: [art] Derive Key Pair - Done
22,761,480 UART: [art] Signing Cert with AUTHO
22,762,789 UART: RITY.KEYID = 7
24,468,006 UART: [art] Erasing AUTHORITY.KEYID = 7
24,469,652 UART: [art] PUB.X = 60D8E42E2EDEA8997572FD1CDEB688098BA899117D9D4B6AA35952E4181F49A61C06939079A3465042EF3E5613BD3CEC
24,476,800 UART: [art] PUB.Y = 730CE55EE8339D2A55FBE080FF78BB4AFDF23D6C49504AE90184EFCA70124085EA7E3E982F2FD073903CA1675687FD04
24,484,059 UART: [art] SIG.R = 24CA20DB8D7D17EFC0831849B86A14AFC1A0E36C52154F38FE9000EF3B09FF585420C48C3ADF3BB651ACEB420BA2141C
24,491,450 UART: [art] SIG.S = A49900F52B30365CF5D61C2B53DFA9066C704388E893C3B995666FEAA914A6D1B0C53FAB48F3B8FAAC2602B65103672C
25,470,206 UART: Caliptra RT
25,470,913 UART: [state] CFI Enabled
25,588,292 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,632 UART: [afmc] --
2,851,704 UART: [cold-reset] --
2,852,612 UART: [state] Locking Datavault
2,853,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,529 UART: [state] Locking ICCM
2,855,061 UART: [exit] Launching FMC @ 0x40000130
2,860,390 UART:
2,860,406 UART: Running Caliptra FMC ...
2,860,814 UART:
2,860,868 UART: [state] CFI Enabled
2,871,179 UART: [fht] FMC Alias Private Key: 7
2,978,752 UART: [art] Extend RT PCRs Done
2,979,180 UART: [art] Lock RT PCRs Done
2,980,788 UART: [art] Populate DV Done
2,989,069 UART: [fht] FMC Alias Private Key: 7
2,990,071 UART: [art] Derive CDI
2,990,351 UART: [art] Store in in slot 0x4
3,076,050 UART: [art] Derive Key Pair
3,076,410 UART: [art] Store priv key in slot 0x5
3,089,308 UART: [art] Derive Key Pair - Done
3,103,916 UART: [art] Signing Cert with AUTHO
3,104,396 UART: RITY.KEYID = 7
3,119,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,993 UART: [art] PUB.X = C282F16D83EEAA2ACA48C2734740565057C4AB2A13A752434AEDB0AD45D27B63CDE4EC987FCD67FBF4FE0198C2B8BE04
3,126,777 UART: [art] PUB.Y = AFA52DC5C3FB779553893E0FEE63F38A81543D04C422945CB3B79223B16D339AC1BE82726CD9D7575B95E3F7209A9933
3,133,723 UART: [art] SIG.R = 1A3D563D3C46E591676414C996AFB66997A0C8A1241BCD638B2CC4CE967F09FE8900FC75BC63196B89A8CBD5071DFD23
3,140,473 UART: [art] SIG.S = 2C92F8F53C34E1FC4B95F37E8E47C820A1B7C8C5DCB2D13D8D711393B7F4B6E67CC8DA8B93F6BBCF5B788DA868BA9DA5
3,164,202 UART: Caliptra RT
3,164,455 UART: [state] CFI Enabled
3,271,686 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,096 UART: [idev] Sha384 KeyId Algorithm
1,201,833 UART: [idev] --
1,203,064 UART: [ldev] ++
1,203,232 UART: [ldev] CDI.KEYID = 6
1,203,596 UART: [ldev] SUBJECT.KEYID = 5
1,204,023 UART: [ldev] AUTHORITY.KEYID = 7
1,204,486 UART: [ldev] FE.KEYID = 1
1,209,626 UART: [ldev] Erasing FE.KEYID = 1
1,235,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,810 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,532 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,758 UART: [ldev] --
1,275,242 UART: [fwproc] Wait for Commands...
1,275,933 UART: [fwproc] Recv command 0x46574c44
1,276,666 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,946 >>> mbox cmd response: success
2,770,027 UART: [afmc] ++
2,770,195 UART: [afmc] CDI.KEYID = 6
2,770,558 UART: [afmc] SUBJECT.KEYID = 7
2,770,984 UART: [afmc] AUTHORITY.KEYID = 5
2,806,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,236 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,796 UART: [afmc] --
2,849,774 UART: [cold-reset] --
2,850,674 UART: [state] Locking Datavault
2,851,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,321 UART: [state] Locking ICCM
2,852,887 UART: [exit] Launching FMC @ 0x40000130
2,858,216 UART:
2,858,232 UART: Running Caliptra FMC ...
2,858,640 UART:
2,858,694 UART: [state] CFI Enabled
2,869,127 UART: [fht] FMC Alias Private Key: 7
2,976,878 UART: [art] Extend RT PCRs Done
2,977,306 UART: [art] Lock RT PCRs Done
2,978,856 UART: [art] Populate DV Done
2,987,085 UART: [fht] FMC Alias Private Key: 7
2,988,055 UART: [art] Derive CDI
2,988,335 UART: [art] Store in in slot 0x4
3,074,092 UART: [art] Derive Key Pair
3,074,452 UART: [art] Store priv key in slot 0x5
3,087,506 UART: [art] Derive Key Pair - Done
3,102,217 UART: [art] Signing Cert with AUTHO
3,102,697 UART: RITY.KEYID = 7
3,117,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,686 UART: [art] PUB.X = 5F1F17C2E8A08DAA3C25CB85716919BF8CC61E4826B2573C8EADD8E551C6DABE74C5EAE43B24B2E458424449E3628643
3,125,466 UART: [art] PUB.Y = 57DE12E8EBF58693E491128DC6D0FDA2777A8ABAF38C45D821FA1C1C77FCD0259C80CCA8213964C2EA8E0A5532547974
3,132,423 UART: [art] SIG.R = 61F5BB8D888390CFA61E3E354FD07728798735FE8CBF959689A2A396F6D9B10E99CF31C7120B6B23E53E621B90FF2148
3,139,189 UART: [art] SIG.S = 76BAB9C4A15B263AE2882D74543620690B7475A25ECD9FF49EC5550F117659DE7FB159FBE0A75E283E17633C7A87CEED
3,162,920 UART: Caliptra RT
3,163,173 UART: [state] CFI Enabled
3,270,246 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Fuse KeyId
1,199,908 UART: [idev] --
1,200,975 UART: [ldev] ++
1,201,143 UART: [ldev] CDI.KEYID = 6
1,201,507 UART: [ldev] SUBJECT.KEYID = 5
1,201,934 UART: [ldev] AUTHORITY.KEYID = 7
1,202,397 UART: [ldev] FE.KEYID = 1
1,207,511 UART: [ldev] Erasing FE.KEYID = 1
1,234,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,545 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,227 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,208 UART: [ldev] --
1,273,620 UART: [fwproc] Wait for Commands...
1,274,221 UART: [fwproc] Recv command 0x46574c44
1,274,954 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,767,232 >>> mbox cmd response: success
2,768,329 UART: [afmc] ++
2,768,497 UART: [afmc] CDI.KEYID = 6
2,768,860 UART: [afmc] SUBJECT.KEYID = 7
2,769,286 UART: [afmc] AUTHORITY.KEYID = 5
2,804,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,126 UART: [afmc] --
2,848,056 UART: [cold-reset] --
2,848,924 UART: [state] Locking Datavault
2,849,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,499 UART: [state] Locking ICCM
2,851,067 UART: [exit] Launching FMC @ 0x40000130
2,856,396 UART:
2,856,412 UART: Running Caliptra FMC ...
2,856,820 UART:
2,856,874 UART: [state] CFI Enabled
2,867,671 UART: [fht] FMC Alias Private Key: 7
2,975,450 UART: [art] Extend RT PCRs Done
2,975,878 UART: [art] Lock RT PCRs Done
2,977,298 UART: [art] Populate DV Done
2,985,665 UART: [fht] FMC Alias Private Key: 7
2,986,711 UART: [art] Derive CDI
2,986,991 UART: [art] Store in in slot 0x4
3,072,552 UART: [art] Derive Key Pair
3,072,912 UART: [art] Store priv key in slot 0x5
3,086,602 UART: [art] Derive Key Pair - Done
3,101,589 UART: [art] Signing Cert with AUTHO
3,102,069 UART: RITY.KEYID = 7
3,117,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,524 UART: [art] PUB.X = B133FB2ED6A2B78F42F89FFAFA8954DC115D3A53A754C8CC8EE11A4523AAE90046DF5861D664D8BEB7C3ACEA6746EC2B
3,125,296 UART: [art] PUB.Y = 3FCFB3F12B024FFB4B78EF27280439B9988B965BA4A4005CEF5D26A9F7BF28699F4BB8700983CC7B7A9BB7FCBCBE1FF5
3,132,237 UART: [art] SIG.R = C31CEE421B608B899A2532265AD09671E8730022C5CDC5B27289756972E8213B3BCA55E3C7778B5DF1A2AFB83D0626A7
3,138,982 UART: [art] SIG.S = AA3002E942DD533DED23B0317A1C21170347E653121DDD33365D46718353538B3FB6D55F45A4650FB3B80FBA277BAB25
3,162,467 UART: Caliptra RT
3,162,720 UART: [state] CFI Enabled
3,270,906 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 6.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,646 >>> mbox cmd response: success
2,685,956 UART:
2,685,972 UART: Running Caliptra FMC ...
2,686,380 UART:
2,686,434 UART: [state] CFI Enabled
2,697,311 UART: [fht] FMC Alias Private Key: 7
2,805,086 UART: [art] Extend RT PCRs Done
2,805,514 UART: [art] Lock RT PCRs Done
2,807,142 UART: [art] Populate DV Done
2,815,445 UART: [fht] FMC Alias Private Key: 7
2,816,441 UART: [art] Derive CDI
2,816,721 UART: [art] Store in in slot 0x4
2,902,710 UART: [art] Derive Key Pair
2,903,070 UART: [art] Store priv key in slot 0x5
2,916,278 UART: [art] Derive Key Pair - Done
2,930,830 UART: [art] Signing Cert with AUTHO
2,931,310 UART: RITY.KEYID = 7
2,946,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,555 UART: [art] PUB.X = 7A5CC8EA7642DF2A832B4D16EB07F375F22FD7199A8020246560DA0B7B2D1AC530F9697A88CA6B7783570B0F86FBC2E4
2,954,321 UART: [art] PUB.Y = 035293AEB6518B0D600DACA4C1B67DC51937F38A420D8F2EAF499A1B065D8972984545C742AC5915470B49CD9722AE5C
2,961,255 UART: [art] SIG.R = D84BB02155541401D08482D4FEB29F250417F2EECE5DC6414C04799AD91A5C21A528BB38AC4E813105C32CA020C4E654
2,968,015 UART: [art] SIG.S = 32DD68DE42EA4030E189DC59BC6CE8D8CA2C43F1C27401B5BB509D40B1E6D3AAF2DC96C1B58A783FC9324B0712265508
2,991,857 UART: Caliptra RT
2,992,110 UART: [state] CFI Enabled
3,099,765 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,619,704 >>> mbox cmd response: success
2,682,426 UART:
2,682,442 UART: Running Caliptra FMC ...
2,682,850 UART:
2,682,904 UART: [state] CFI Enabled
2,693,497 UART: [fht] FMC Alias Private Key: 7
2,801,808 UART: [art] Extend RT PCRs Done
2,802,236 UART: [art] Lock RT PCRs Done
2,803,466 UART: [art] Populate DV Done
2,811,577 UART: [fht] FMC Alias Private Key: 7
2,812,675 UART: [art] Derive CDI
2,812,955 UART: [art] Store in in slot 0x4
2,898,324 UART: [art] Derive Key Pair
2,898,684 UART: [art] Store priv key in slot 0x5
2,912,546 UART: [art] Derive Key Pair - Done
2,927,590 UART: [art] Signing Cert with AUTHO
2,928,070 UART: RITY.KEYID = 7
2,943,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,273 UART: [art] PUB.X = 09D6EF97B39515D7737D0C57B1A858154F9A7C41B54493A02244DBF234100B84F4A47DC22A0B63F066EB63084B185563
2,951,022 UART: [art] PUB.Y = 1521463C99E58FD3A3293A0423403BCC856CCD6146BC4DCEC424135AF7FEEA9A1D2B3F5C6D9EDF67CEC5E1CED3DBF54F
2,957,995 UART: [art] SIG.R = E18B2B426F055541C0FB7541CFBD86A9C896F53A4CA2A37209CBF7C2B51E5A03840BDA2EDFCB0C29600653F2C6B6F010
2,964,761 UART: [art] SIG.S = 2FB53DE8546904FA9BE78A85F075536EB419417C28ECF1376EC3C4A76C7357D3C81AA02555DCC2DEEE7B3A6E22A72C86
2,988,635 UART: Caliptra RT
2,988,888 UART: [state] CFI Enabled
3,095,460 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,630 >>> mbox cmd response: success
2,680,444 UART:
2,680,460 UART: Running Caliptra FMC ...
2,680,868 UART:
2,680,922 UART: [state] CFI Enabled
2,691,605 UART: [fht] FMC Alias Private Key: 7
2,799,264 UART: [art] Extend RT PCRs Done
2,799,692 UART: [art] Lock RT PCRs Done
2,801,226 UART: [art] Populate DV Done
2,809,677 UART: [fht] FMC Alias Private Key: 7
2,810,837 UART: [art] Derive CDI
2,811,117 UART: [art] Store in in slot 0x4
2,896,904 UART: [art] Derive Key Pair
2,897,264 UART: [art] Store priv key in slot 0x5
2,911,282 UART: [art] Derive Key Pair - Done
2,926,271 UART: [art] Signing Cert with AUTHO
2,926,751 UART: RITY.KEYID = 7
2,942,073 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,838 UART: [art] PUB.X = A48263FBB501E46BCE206C37E2094FA609FAFB6ACEEF463A373B5AFB6D1047CD28373F7AFA7ED29C370037C00DC466E6
2,949,592 UART: [art] PUB.Y = CB4F202E36E60B6065A559BA10D5E0E6636638BC3202093728DD9733CCE007E65491841296BCA52DE3A326BEB7AF2735
2,956,530 UART: [art] SIG.R = DC7327D501C34A2443C8D777823D48B0350E6B9570A93DB2C56A42B6C7C1B0EFE8ABE135CECF16E5D6E638228A47F14E
2,963,304 UART: [art] SIG.S = D44F57414B15DB3A831546B2406A20047AE27F28C3CDA169B3E312E5ADAA7F5B4227C76B888B8785D1B2C3AAEC4DE47B
2,987,270 UART: Caliptra RT
2,987,523 UART: [state] CFI Enabled
3,095,280 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,615,522 >>> mbox cmd response: success
2,677,390 UART:
2,677,406 UART: Running Caliptra FMC ...
2,677,814 UART:
2,677,868 UART: [state] CFI Enabled
2,688,295 UART: [fht] FMC Alias Private Key: 7
2,796,634 UART: [art] Extend RT PCRs Done
2,797,062 UART: [art] Lock RT PCRs Done
2,798,780 UART: [art] Populate DV Done
2,806,995 UART: [fht] FMC Alias Private Key: 7
2,808,143 UART: [art] Derive CDI
2,808,423 UART: [art] Store in in slot 0x4
2,894,122 UART: [art] Derive Key Pair
2,894,482 UART: [art] Store priv key in slot 0x5
2,907,216 UART: [art] Derive Key Pair - Done
2,921,601 UART: [art] Signing Cert with AUTHO
2,922,081 UART: RITY.KEYID = 7
2,937,687 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,452 UART: [art] PUB.X = 2E9ED8E794F6836CDA719BFAECBB2E06E08070227572101C5317EE588F8BBD4130A4DEC082B474649AB3B0CA5068DBE0
2,945,231 UART: [art] PUB.Y = 8023F62849D3FBC20663E424F4318C240BF3C167B7BFC908BD528B9E031FA3ADB7150A181BC2337BA3ACBEB45776343F
2,952,174 UART: [art] SIG.R = BA8CF22495B3ABA4150634772F47BF147EB10E6F7E9129A7FC4FDDB87E227A94F9C578E9B9C10175BD8234F51925EA73
2,958,943 UART: [art] SIG.S = A7568E4048D8A9D9B696C8A2682CBAF3F0A19EFE8563EFEC3E72FB2DFC95CCDDAFA0AD4D80C7A91258E5451CBBB3D760
2,982,886 UART: Caliptra RT
2,983,139 UART: [state] CFI Enabled
3,090,969 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.43s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,137 UART: [afmc] --
2,853,081 UART: [cold-reset] --
2,853,687 UART: [state] Locking Datavault
2,854,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,570 UART: [state] Locking ICCM
2,856,122 UART: [exit] Launching FMC @ 0x40000130
2,861,451 UART:
2,861,467 UART: Running Caliptra FMC ...
2,861,875 UART:
2,862,018 UART: [state] CFI Enabled
2,872,895 UART: [fht] FMC Alias Private Key: 7
2,980,556 UART: [art] Extend RT PCRs Done
2,980,984 UART: [art] Lock RT PCRs Done
2,982,862 UART: [art] Populate DV Done
2,991,359 UART: [fht] FMC Alias Private Key: 7
2,992,377 UART: [art] Derive CDI
2,992,657 UART: [art] Store in in slot 0x4
3,078,388 UART: [art] Derive Key Pair
3,078,748 UART: [art] Store priv key in slot 0x5
3,093,100 UART: [art] Derive Key Pair - Done
3,107,838 UART: [art] Signing Cert with AUTHO
3,108,318 UART: RITY.KEYID = 7
3,123,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,731 UART: [art] PUB.X = 5FA1D97EF818D2E1104FA41EEBC415B73C7ADB7431855B5DBF6429FC30FCB06EB7DC3BEBA5F03A19B6C35BFBCE96F36C
3,131,531 UART: [art] PUB.Y = FF13FA61267105EF24C4EBFFC5098C4F268E084C26A39B15D2252EC7D5D3631857983CAD82DA0F5A980971C9E83ACD2B
3,138,476 UART: [art] SIG.R = 1838AA3C4DE2E903FC03494C946C452CFAC0AEEA009E2E484D799231B230EC98A25CCFCA6B1E43003836E5CBCAC1EA03
3,145,211 UART: [art] SIG.S = DE760FD4991DF2586568330C3A9DE3BFB3A221A0F9BFDD3F2C2AAF6F2CEA170EE11CF1F93FE03ACA1C69ED79A358AC4E
3,169,335 UART: Caliptra RT
3,169,680 UART: [state] CFI Enabled
3,277,026 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,130 UART: [kat] SHA2-256
902,070 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha384 KeyId Algorithm
1,202,958 UART: [idev] --
1,203,825 UART: [ldev] ++
1,203,993 UART: [ldev] CDI.KEYID = 6
1,204,357 UART: [ldev] SUBJECT.KEYID = 5
1,204,784 UART: [ldev] AUTHORITY.KEYID = 7
1,205,247 UART: [ldev] FE.KEYID = 1
1,210,395 UART: [ldev] Erasing FE.KEYID = 1
1,236,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,781 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,503 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,647 UART: [ldev] --
1,276,043 UART: [fwproc] Wait for Commands...
1,276,726 UART: [fwproc] Recv command 0x46574c44
1,277,459 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,957 >>> mbox cmd response: success
2,770,120 UART: [afmc] ++
2,770,288 UART: [afmc] CDI.KEYID = 6
2,770,651 UART: [afmc] SUBJECT.KEYID = 7
2,771,077 UART: [afmc] AUTHORITY.KEYID = 5
2,806,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,221 UART: [afmc] --
2,850,137 UART: [cold-reset] --
2,850,775 UART: [state] Locking Datavault
2,852,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,734 UART: [state] Locking ICCM
2,853,182 UART: [exit] Launching FMC @ 0x40000130
2,858,511 UART:
2,858,527 UART: Running Caliptra FMC ...
2,858,935 UART:
2,859,078 UART: [state] CFI Enabled
2,869,793 UART: [fht] FMC Alias Private Key: 7
2,977,958 UART: [art] Extend RT PCRs Done
2,978,386 UART: [art] Lock RT PCRs Done
2,979,960 UART: [art] Populate DV Done
2,988,003 UART: [fht] FMC Alias Private Key: 7
2,988,999 UART: [art] Derive CDI
2,989,279 UART: [art] Store in in slot 0x4
3,075,368 UART: [art] Derive Key Pair
3,075,728 UART: [art] Store priv key in slot 0x5
3,089,090 UART: [art] Derive Key Pair - Done
3,103,296 UART: [art] Signing Cert with AUTHO
3,103,776 UART: RITY.KEYID = 7
3,119,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,059 UART: [art] PUB.X = E12CE85A0125EE1BC98876FA09C52FFAD361C209606EFBC4FA392A30C20748896B0F2283FEA0418FFFE8504E0C7200A8
3,126,799 UART: [art] PUB.Y = FBEA2A8C491F7F418BD14A24F4CF3173851D6889576A2F9A35F58081EB64A7609C100AC214EE58E49545812771BCC2A5
3,133,748 UART: [art] SIG.R = 37E1BE525BE149245816A7B42ECCFCDC640A0522107D33C98D60CA030412A14DD61D49F3B095801FAD50A8B69305E51E
3,140,507 UART: [art] SIG.S = 7B13DB0B1B0D3BAE177B935CE7BCE4E0F45B47A4283B65A5D95F47C1590A40D4398B0335901498F2F39925D3800DC351
3,164,247 UART: Caliptra RT
3,164,592 UART: [state] CFI Enabled
3,272,673 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,181,698 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Fuse KeyId
1,200,035 UART: [idev] --
1,201,024 UART: [ldev] ++
1,201,192 UART: [ldev] CDI.KEYID = 6
1,201,556 UART: [ldev] SUBJECT.KEYID = 5
1,201,983 UART: [ldev] AUTHORITY.KEYID = 7
1,202,446 UART: [ldev] FE.KEYID = 1
1,207,876 UART: [ldev] Erasing FE.KEYID = 1
1,234,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,434 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,116 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,997 UART: [ldev] --
1,273,459 UART: [fwproc] Wait for Commands...
1,274,270 UART: [fwproc] Recv command 0x46574c44
1,275,003 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,840 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,159 >>> mbox cmd response: success
2,767,200 UART: [afmc] ++
2,767,368 UART: [afmc] CDI.KEYID = 6
2,767,731 UART: [afmc] SUBJECT.KEYID = 7
2,768,157 UART: [afmc] AUTHORITY.KEYID = 5
2,803,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,529 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,248 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,187 UART: [afmc] --
2,847,125 UART: [cold-reset] --
2,847,929 UART: [state] Locking Datavault
2,849,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,690 UART: [state] Locking ICCM
2,850,230 UART: [exit] Launching FMC @ 0x40000130
2,855,559 UART:
2,855,575 UART: Running Caliptra FMC ...
2,855,983 UART:
2,856,126 UART: [state] CFI Enabled
2,866,627 UART: [fht] FMC Alias Private Key: 7
2,974,668 UART: [art] Extend RT PCRs Done
2,975,096 UART: [art] Lock RT PCRs Done
2,976,724 UART: [art] Populate DV Done
2,985,235 UART: [fht] FMC Alias Private Key: 7
2,986,227 UART: [art] Derive CDI
2,986,507 UART: [art] Store in in slot 0x4
3,071,930 UART: [art] Derive Key Pair
3,072,290 UART: [art] Store priv key in slot 0x5
3,085,784 UART: [art] Derive Key Pair - Done
3,100,479 UART: [art] Signing Cert with AUTHO
3,100,959 UART: RITY.KEYID = 7
3,116,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,796 UART: [art] PUB.X = A9E73681199E3D28D16471301C96DA1A9B0EF31E8672FAECF59EDB39E2E72F4FCC2484CD4A98F775408B995C3C16B6B7
3,123,573 UART: [art] PUB.Y = 353600A9688CD7A538D758B980E3B25A35C49E8F678EC2CF8BC4DAD6E39B6FD926AF10308B9FB7C39E2581E9F5827931
3,130,507 UART: [art] SIG.R = DE1CF68008623D965B797C8AC23CCD6BFE47ADFC5E887F308420E70155B4FD5B6641A6B06EB674DF70399B196ACBFC41
3,137,285 UART: [art] SIG.S = A6BB7A88C0DE911320F7C290CCD105B8BFF820B7B473E1D626F39845058D2D83A34C7CF1B743ECBDED517E699CA7AEBE
3,160,790 UART: Caliptra RT
3,161,135 UART: [state] CFI Enabled
3,268,529 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,399 >>> mbox cmd response: success
2,686,233 UART:
2,686,249 UART: Running Caliptra FMC ...
2,686,657 UART:
2,686,800 UART: [state] CFI Enabled
2,697,643 UART: [fht] FMC Alias Private Key: 7
2,805,838 UART: [art] Extend RT PCRs Done
2,806,266 UART: [art] Lock RT PCRs Done
2,808,054 UART: [art] Populate DV Done
2,815,963 UART: [fht] FMC Alias Private Key: 7
2,817,075 UART: [art] Derive CDI
2,817,355 UART: [art] Store in in slot 0x4
2,902,948 UART: [art] Derive Key Pair
2,903,308 UART: [art] Store priv key in slot 0x5
2,916,806 UART: [art] Derive Key Pair - Done
2,931,602 UART: [art] Signing Cert with AUTHO
2,932,082 UART: RITY.KEYID = 7
2,947,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,913 UART: [art] PUB.X = F4F4AE72E567CDCE2A0DBB1CC386D52B274110735B3E2FDA546A193ACBF39216B830F605DB0F6C68C73F9E1864F26E8F
2,954,690 UART: [art] PUB.Y = 0F8BD3AC269119D11C6BD13E7FA1A379AB44F3BA62C17CC90EDD6113C820E6263013478C984BD79A2B83BA3D8D197E63
2,961,644 UART: [art] SIG.R = 6572648DDFC490EA09A5641274CC66E85317103FE36BAF7EE0405063E199EAEA1756A5B59C01ABF3B113F95834658CB6
2,968,410 UART: [art] SIG.S = 714E66C43A077023C870FAC1B80D8544229F315D48A958909722CE2B912896B8BAFA46514CDD13A3E4B90B8E11DDFD47
2,992,294 UART: Caliptra RT
2,992,639 UART: [state] CFI Enabled
3,100,382 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,485 >>> mbox cmd response: success
2,680,703 UART:
2,680,719 UART: Running Caliptra FMC ...
2,681,127 UART:
2,681,270 UART: [state] CFI Enabled
2,692,093 UART: [fht] FMC Alias Private Key: 7
2,799,978 UART: [art] Extend RT PCRs Done
2,800,406 UART: [art] Lock RT PCRs Done
2,802,212 UART: [art] Populate DV Done
2,810,543 UART: [fht] FMC Alias Private Key: 7
2,811,611 UART: [art] Derive CDI
2,811,891 UART: [art] Store in in slot 0x4
2,897,816 UART: [art] Derive Key Pair
2,898,176 UART: [art] Store priv key in slot 0x5
2,911,620 UART: [art] Derive Key Pair - Done
2,926,372 UART: [art] Signing Cert with AUTHO
2,926,852 UART: RITY.KEYID = 7
2,941,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,341 UART: [art] PUB.X = B0EB4CFC94E3F5571253AEF07AF949DD7A49368D0FF60F6B7AFF2A0CC6E89B31ADA8A7809AFFF0FE6CB263231E379AD7
2,949,128 UART: [art] PUB.Y = C490B7A48E8C733F600BA34AE82591E41A9381377F5A49BF3833468483D59509C5E189CB93AD6DF25C296AC833185A94
2,956,068 UART: [art] SIG.R = 77F05903225CAD7CC2CD1B22BFCC3BC3D1FAE8445F6C8E93AF35B136383E9F16F93890E9E1F4BF61CA6AF741F87EA397
2,962,853 UART: [art] SIG.S = 8F413190E8813B1DC12BCF96056E413BB6A87E0ACC3247B384805BD8170104D0C1C46EB61021F7EE07C003D817CBBD35
2,986,662 UART: Caliptra RT
2,987,007 UART: [state] CFI Enabled
3,094,675 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,243 >>> mbox cmd response: success
2,679,627 UART:
2,679,643 UART: Running Caliptra FMC ...
2,680,051 UART:
2,680,194 UART: [state] CFI Enabled
2,690,895 UART: [fht] FMC Alias Private Key: 7
2,799,172 UART: [art] Extend RT PCRs Done
2,799,600 UART: [art] Lock RT PCRs Done
2,801,274 UART: [art] Populate DV Done
2,809,613 UART: [fht] FMC Alias Private Key: 7
2,810,659 UART: [art] Derive CDI
2,810,939 UART: [art] Store in in slot 0x4
2,896,722 UART: [art] Derive Key Pair
2,897,082 UART: [art] Store priv key in slot 0x5
2,909,800 UART: [art] Derive Key Pair - Done
2,924,481 UART: [art] Signing Cert with AUTHO
2,924,961 UART: RITY.KEYID = 7
2,940,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,834 UART: [art] PUB.X = 6356A82AF495E6CC22DA6E97BB512FFC362053B145D61330362551D67B52A58B5471F39270D762E4D011F6A4D7B94F11
2,947,600 UART: [art] PUB.Y = F567EF5F3045443E4EB58E86D14B1FA72AAD0AC8ABD004262006601D00A23ACCE79F1FEC3049D5B12C95A0442CADB71D
2,954,535 UART: [art] SIG.R = 8A3F518BFF2E66B4E3850DDF648AE42DDCD039BB1DA9CBE51C09D67A31171F73BF36A9B32383DFC06B592560D5E89DCE
2,961,319 UART: [art] SIG.S = FC9EA2472656BBA978B06F6E5EB9496F801F2AFC68B49C7F3CB456B394D97BCA36E6AC2005316DF2BEF30D2A19986334
2,985,292 UART: Caliptra RT
2,985,637 UART: [state] CFI Enabled
3,093,242 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,169 >>> mbox cmd response: success
2,677,499 UART:
2,677,515 UART: Running Caliptra FMC ...
2,677,923 UART:
2,678,066 UART: [state] CFI Enabled
2,688,767 UART: [fht] FMC Alias Private Key: 7
2,796,850 UART: [art] Extend RT PCRs Done
2,797,278 UART: [art] Lock RT PCRs Done
2,798,768 UART: [art] Populate DV Done
2,806,793 UART: [fht] FMC Alias Private Key: 7
2,807,773 UART: [art] Derive CDI
2,808,053 UART: [art] Store in in slot 0x4
2,893,806 UART: [art] Derive Key Pair
2,894,166 UART: [art] Store priv key in slot 0x5
2,907,464 UART: [art] Derive Key Pair - Done
2,921,972 UART: [art] Signing Cert with AUTHO
2,922,452 UART: RITY.KEYID = 7
2,937,816 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,581 UART: [art] PUB.X = BAC4783864C7F4E652206EFCB65111ECE48F0889914418D7DB6E000126878BB27AF2826138880E8B0044F0C8DB5AB232
2,945,296 UART: [art] PUB.Y = F2BE374E4C2C96648621F814409B9445B86D7D29B6F5D84592ACAC0061C7AAB6E3A90FDAFD127E40E391CF983FF6D926
2,952,231 UART: [art] SIG.R = 62962FD11600652541904F938E58169C9EF2033518275F6E89E722AACFBB6112D8794C1A17C63C3A6B5680274F045735
2,958,959 UART: [art] SIG.S = 21A181B49184B2FF24ABD269C892FAB791EB6D56A9C7A1C8E2479F44E9502652D24348E76237861339E65EC801C9509F
2,982,429 UART: Caliptra RT
2,982,774 UART: [state] CFI Enabled
3,091,269 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.18s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,022 UART: [afmc] --
2,850,006 UART: [cold-reset] --
2,850,722 UART: [state] Locking Datavault
2,851,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,455 UART: [state] Locking ICCM
2,853,081 UART: [exit] Launching FMC @ 0x40000130
2,858,410 UART:
2,858,426 UART: Running Caliptra FMC ...
2,858,834 UART:
2,858,888 UART: [state] CFI Enabled
2,869,113 UART: [fht] FMC Alias Private Key: 7
2,977,548 UART: [art] Extend RT PCRs Done
2,977,976 UART: [art] Lock RT PCRs Done
2,979,630 UART: [art] Populate DV Done
2,987,897 UART: [fht] FMC Alias Private Key: 7
2,989,059 UART: [art] Derive CDI
2,989,339 UART: [art] Store in in slot 0x4
3,074,938 UART: [art] Derive Key Pair
3,075,298 UART: [art] Store priv key in slot 0x5
3,088,008 UART: [art] Derive Key Pair - Done
3,102,642 UART: [art] Signing Cert with AUTHO
3,103,122 UART: RITY.KEYID = 7
3,118,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,371 UART: [art] PUB.X = BAED8C7D1CE78D6E93C5AAE02C5760C9D3C99A2E3562EEF3529C8AFB7CAA45ECD58C0C71036022D8ED8E909277459FCE
3,126,157 UART: [art] PUB.Y = 3D2773C5398C95FCAA26D720B8C0DD181F609343B8D564F6EC111F0691CC8FB2020F455E83958225E2D7E823930B505B
3,133,093 UART: [art] SIG.R = 3A89B0BFD550E9CBA7015107DE5C7BEF2C856E405D229BD5E800A1E7390AA4F41F78D9A23183BE7787673CE3E91FA345
3,139,842 UART: [art] SIG.S = 98CE2E0484C2B70AF92B97FC263BB1216134499D6D17CA801534B8880F938E4B71561BE2BE2F50E02E62D1F2BEAF929F
3,164,042 UART: Caliptra RT
3,164,295 UART: [state] CFI Enabled
3,271,409 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,182,447 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha384 KeyId Algorithm
1,202,963 UART: [idev] --
1,204,014 UART: [ldev] ++
1,204,182 UART: [ldev] CDI.KEYID = 6
1,204,546 UART: [ldev] SUBJECT.KEYID = 5
1,204,973 UART: [ldev] AUTHORITY.KEYID = 7
1,205,436 UART: [ldev] FE.KEYID = 1
1,210,504 UART: [ldev] Erasing FE.KEYID = 1
1,237,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,358 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,080 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,176 UART: [ldev] --
1,276,634 UART: [fwproc] Wait for Commands...
1,277,445 UART: [fwproc] Recv command 0x46574c44
1,278,178 UART: [fwproc] Recv'd Img size: 114448 bytes
2,577,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,224 >>> mbox cmd response: success
2,771,373 UART: [afmc] ++
2,771,541 UART: [afmc] CDI.KEYID = 6
2,771,904 UART: [afmc] SUBJECT.KEYID = 7
2,772,330 UART: [afmc] AUTHORITY.KEYID = 5
2,808,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,378 UART: [afmc] --
2,851,256 UART: [cold-reset] --
2,852,148 UART: [state] Locking Datavault
2,853,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,827 UART: [state] Locking ICCM
2,854,249 UART: [exit] Launching FMC @ 0x40000130
2,859,578 UART:
2,859,594 UART: Running Caliptra FMC ...
2,860,002 UART:
2,860,056 UART: [state] CFI Enabled
2,870,397 UART: [fht] FMC Alias Private Key: 7
2,978,880 UART: [art] Extend RT PCRs Done
2,979,308 UART: [art] Lock RT PCRs Done
2,980,630 UART: [art] Populate DV Done
2,988,931 UART: [fht] FMC Alias Private Key: 7
2,990,103 UART: [art] Derive CDI
2,990,383 UART: [art] Store in in slot 0x4
3,076,234 UART: [art] Derive Key Pair
3,076,594 UART: [art] Store priv key in slot 0x5
3,089,960 UART: [art] Derive Key Pair - Done
3,104,598 UART: [art] Signing Cert with AUTHO
3,105,078 UART: RITY.KEYID = 7
3,120,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,959 UART: [art] PUB.X = F4940A499CBB8B46760FA3BEC303738FBEE98E9A28105440F314F627380E62D2071D27EBF49492B7AF6ACD7852C385A1
3,127,718 UART: [art] PUB.Y = C1F54DB78617A97AFBC9DD35F817171EE4AEC1AEF165BB7E7A24E1F7793AB84F6FB16E618477EC18CDA18769B74DFBD5
3,134,690 UART: [art] SIG.R = C51B9416E288F40E0DDBF590B1B17D2FD906D349A0A5B6E85DD3AAB9211BE1B45C99C942564F836528FAF79C7460013F
3,141,456 UART: [art] SIG.S = 052EDE87EA82D6C9919C294FD8239DD9CDA391D2C58E98DB7417EA06A32699A84C67AA2809CBD1194621CA021931EDD7
3,164,905 UART: Caliptra RT
3,165,158 UART: [state] CFI Enabled
3,273,090 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Fuse KeyId
1,200,390 UART: [idev] --
1,201,401 UART: [ldev] ++
1,201,569 UART: [ldev] CDI.KEYID = 6
1,201,933 UART: [ldev] SUBJECT.KEYID = 5
1,202,360 UART: [ldev] AUTHORITY.KEYID = 7
1,202,823 UART: [ldev] FE.KEYID = 1
1,207,845 UART: [ldev] Erasing FE.KEYID = 1
1,234,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,375 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,057 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,034 UART: [ldev] --
1,273,534 UART: [fwproc] Wait for Commands...
1,274,163 UART: [fwproc] Recv command 0x46574c44
1,274,896 UART: [fwproc] Recv'd Img size: 114448 bytes
2,573,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,765,779 >>> mbox cmd response: success
2,766,838 UART: [afmc] ++
2,767,006 UART: [afmc] CDI.KEYID = 6
2,767,369 UART: [afmc] SUBJECT.KEYID = 7
2,767,795 UART: [afmc] AUTHORITY.KEYID = 5
2,802,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,331 UART: [afmc] --
2,846,337 UART: [cold-reset] --
2,847,247 UART: [state] Locking Datavault
2,848,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,434 UART: [state] Locking ICCM
2,850,086 UART: [exit] Launching FMC @ 0x40000130
2,855,415 UART:
2,855,431 UART: Running Caliptra FMC ...
2,855,839 UART:
2,855,893 UART: [state] CFI Enabled
2,866,528 UART: [fht] FMC Alias Private Key: 7
2,974,243 UART: [art] Extend RT PCRs Done
2,974,671 UART: [art] Lock RT PCRs Done
2,976,249 UART: [art] Populate DV Done
2,984,358 UART: [fht] FMC Alias Private Key: 7
2,985,350 UART: [art] Derive CDI
2,985,630 UART: [art] Store in in slot 0x4
3,071,043 UART: [art] Derive Key Pair
3,071,403 UART: [art] Store priv key in slot 0x5
3,084,417 UART: [art] Derive Key Pair - Done
3,098,810 UART: [art] Signing Cert with AUTHO
3,099,290 UART: RITY.KEYID = 7
3,114,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,179 UART: [art] PUB.X = AE037CF363D32306C9161FED05D2E7FCB76F1F462BF6C576EFE309092FEA8B8C751C047959F272DB2DDE094401F01706
3,121,930 UART: [art] PUB.Y = 75B3C23970174473D0A27863C5BA593858C852FEC99EB4461CD14E3D30EFBBEFACB29B36F2BA50237C4A761E96CD0010
3,128,866 UART: [art] SIG.R = 6CD74E6758FEAB66086196344F16F04EE65643F56F22327276A8C11C16AC04088A84B8BF281832A2C1292FF552EA34A6
3,135,623 UART: [art] SIG.S = 295E0EFFFBACBBBF87E2C454BC87EF85B72FB13D54D663A1D004AC68C250A0D895BBD6583D462854BF31EC799DDBF039
3,159,636 UART: Caliptra RT
3,159,889 UART: [state] CFI Enabled
3,267,160 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,195 >>> mbox cmd response: success
2,686,075 UART:
2,686,091 UART: Running Caliptra FMC ...
2,686,499 UART:
2,686,553 UART: [state] CFI Enabled
2,696,644 UART: [fht] FMC Alias Private Key: 7
2,804,505 UART: [art] Extend RT PCRs Done
2,804,933 UART: [art] Lock RT PCRs Done
2,806,357 UART: [art] Populate DV Done
2,814,474 UART: [fht] FMC Alias Private Key: 7
2,815,534 UART: [art] Derive CDI
2,815,814 UART: [art] Store in in slot 0x4
2,901,317 UART: [art] Derive Key Pair
2,901,677 UART: [art] Store priv key in slot 0x5
2,914,463 UART: [art] Derive Key Pair - Done
2,929,064 UART: [art] Signing Cert with AUTHO
2,929,544 UART: RITY.KEYID = 7
2,944,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,667 UART: [art] PUB.X = 9FD52165B67311C1FA5CCCB803C66D2ED96E7B9AF4EE23512C170B030C9176613E7432B04F5611CB9E4383B6BF06A7EF
2,952,430 UART: [art] PUB.Y = 6280CEF8C39251632CC60AD6AB22DB29F5D0A5D367A5160C2771ACE13CE8557C4992449FD9BF361197E1B0C93836E6F7
2,959,378 UART: [art] SIG.R = 07F0EFC3CB6B7DA1B8A9AD8191A95FAA991A461E3127045B5083BFB1CD0A5AF26330FAAF3A1AF3C8E009A215542EAFDB
2,966,160 UART: [art] SIG.S = E6C529783F4A7B9D31BE81E344ACF9FE8406672877FBB6090D8F480941A3F23F14ABB71A8DCA6ED44395486E5208D54D
2,989,946 UART: Caliptra RT
2,990,199 UART: [state] CFI Enabled
3,099,126 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,040 >>> mbox cmd response: success
2,680,040 UART:
2,680,056 UART: Running Caliptra FMC ...
2,680,464 UART:
2,680,518 UART: [state] CFI Enabled
2,691,113 UART: [fht] FMC Alias Private Key: 7
2,799,356 UART: [art] Extend RT PCRs Done
2,799,784 UART: [art] Lock RT PCRs Done
2,801,462 UART: [art] Populate DV Done
2,809,867 UART: [fht] FMC Alias Private Key: 7
2,810,809 UART: [art] Derive CDI
2,811,089 UART: [art] Store in in slot 0x4
2,897,214 UART: [art] Derive Key Pair
2,897,574 UART: [art] Store priv key in slot 0x5
2,910,512 UART: [art] Derive Key Pair - Done
2,925,034 UART: [art] Signing Cert with AUTHO
2,925,514 UART: RITY.KEYID = 7
2,940,810 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,575 UART: [art] PUB.X = 18E5C8DCA0E280245A177522B13B20DD0572666AAC126176CC8E95BD7FED90FAB20BC3214D0426E5D7E5DAE8FCDFDA97
2,948,354 UART: [art] PUB.Y = 88701D62B2B032FCCF46A880E645EE8ADA09EAC0DCBF20566AE0222B878E6786AA209058555018EF42E5D15C1AB78186
2,955,307 UART: [art] SIG.R = 43674F380EDAD5A82A1C934A45D29E2242774A7484158C82C6A63A57B4762FD7F045F3ABC586C055E26EF9948DDCDFE4
2,962,080 UART: [art] SIG.S = 0C83149255A641DEB701B7B4C53D7252F5B7BB4C1F68D05EC73CAD503F6C742CC6871EB5F0C6DE901A797BAFDBC303C4
2,986,168 UART: Caliptra RT
2,986,421 UART: [state] CFI Enabled
3,094,066 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,408 >>> mbox cmd response: success
2,681,064 UART:
2,681,080 UART: Running Caliptra FMC ...
2,681,488 UART:
2,681,542 UART: [state] CFI Enabled
2,692,543 UART: [fht] FMC Alias Private Key: 7
2,800,622 UART: [art] Extend RT PCRs Done
2,801,050 UART: [art] Lock RT PCRs Done
2,802,860 UART: [art] Populate DV Done
2,811,191 UART: [fht] FMC Alias Private Key: 7
2,812,129 UART: [art] Derive CDI
2,812,409 UART: [art] Store in in slot 0x4
2,898,180 UART: [art] Derive Key Pair
2,898,540 UART: [art] Store priv key in slot 0x5
2,911,988 UART: [art] Derive Key Pair - Done
2,926,776 UART: [art] Signing Cert with AUTHO
2,927,256 UART: RITY.KEYID = 7
2,942,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,983 UART: [art] PUB.X = CF7EB5DD53EBECF7798FD954A816DBD7CBCA571BB078778FEF061FBF1F8EEB83A6BE69EEB7DBE0680703C86D74B003F1
2,949,771 UART: [art] PUB.Y = 6E1A98501FB62ADAD9279D62A0987D10653A80B9F5917572947D3D4F4E2FA9DCADBD2B46BCE1ADF6A89C7ED10E22CF98
2,956,736 UART: [art] SIG.R = 2DF0763C93F3DED0F371F13C63B2BC263081D6532F1345AB797A072E0B0F45608C0C27F9C745C220C8EC9DB80A13B057
2,963,495 UART: [art] SIG.S = 944B97C6AC2A98A30E3C877F2CE9A8B0F5B59C99FBD8006112D4A4BB235A76926666819A03328E50FC215527F2DCA086
2,986,452 UART: Caliptra RT
2,986,705 UART: [state] CFI Enabled
3,093,665 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,614,374 >>> mbox cmd response: success
2,675,918 UART:
2,675,934 UART: Running Caliptra FMC ...
2,676,342 UART:
2,676,396 UART: [state] CFI Enabled
2,686,823 UART: [fht] FMC Alias Private Key: 7
2,794,460 UART: [art] Extend RT PCRs Done
2,794,888 UART: [art] Lock RT PCRs Done
2,796,260 UART: [art] Populate DV Done
2,804,345 UART: [fht] FMC Alias Private Key: 7
2,805,301 UART: [art] Derive CDI
2,805,581 UART: [art] Store in in slot 0x4
2,891,038 UART: [art] Derive Key Pair
2,891,398 UART: [art] Store priv key in slot 0x5
2,904,450 UART: [art] Derive Key Pair - Done
2,918,970 UART: [art] Signing Cert with AUTHO
2,919,450 UART: RITY.KEYID = 7
2,934,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,207 UART: [art] PUB.X = A5E4C1FFB87EA2CB3BC8590755ED6E7AFED6402A80C0D09B9AC7E15E122A18C5418CC3F0565648A5E1D27A5953CF61D6
2,941,990 UART: [art] PUB.Y = 65D3DA195A76F658741EC792597A6C8F596A6EF2F7C2CB10188E1371A914109711951EB19447EF9DAF0B05ED6BD0D44C
2,948,938 UART: [art] SIG.R = 24E96D63726E71522A192B5880F01E6558BA48847D2E4F5BA69ADCBAB3AF31C27E48D5FA7BB5D3253E2957AE8995605E
2,955,714 UART: [art] SIG.S = F53BE6CCCE013D803E4BE263C13CB73D4A56BE6853F4B67FBE47E577CFA55C121B13337E237CB03816FFF3F367F86F94
2,979,304 UART: Caliptra RT
2,979,557 UART: [state] CFI Enabled
3,087,484 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.73s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,375 UART: [afmc] --
2,851,417 UART: [cold-reset] --
2,852,137 UART: [state] Locking Datavault
2,853,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,926 UART: [state] Locking ICCM
2,854,460 UART: [exit] Launching FMC @ 0x40000130
2,859,789 UART:
2,859,805 UART: Running Caliptra FMC ...
2,860,213 UART:
2,860,356 UART: [state] CFI Enabled
2,871,199 UART: [fht] FMC Alias Private Key: 7
2,979,104 UART: [art] Extend RT PCRs Done
2,979,532 UART: [art] Lock RT PCRs Done
2,981,266 UART: [art] Populate DV Done
2,989,519 UART: [fht] FMC Alias Private Key: 7
2,990,635 UART: [art] Derive CDI
2,990,915 UART: [art] Store in in slot 0x4
3,076,644 UART: [art] Derive Key Pair
3,077,004 UART: [art] Store priv key in slot 0x5
3,090,390 UART: [art] Derive Key Pair - Done
3,105,311 UART: [art] Signing Cert with AUTHO
3,105,791 UART: RITY.KEYID = 7
3,121,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,968 UART: [art] PUB.X = 007F3FDFDD56CE3B6AA5F3F3454CC3528F2206519723DF715D36E0064919B27C298A3EA90ABE8523CDEA7901109EFF84
3,128,712 UART: [art] PUB.Y = 671E788B6A9A8A1CB96A79C6DF86B7B128B9C4A0D107557E4C9073577A1CE5345C335DC6FE5912026698238B4A3EA59C
3,135,658 UART: [art] SIG.R = 7B354FAEA9FD814802BB2EB4EA44AA18F15C1F3DA92A1629D4396F24CA3740261C944DDB942C3B17A2DFA9FFD47A8362
3,142,441 UART: [art] SIG.S = 5727D360CC32AAEA25C36CBC53003BF5EA3FED351DEA7C561070C92BEA3F2C3EF706DF74D3E4CC5EE82C1095340BDDBB
3,165,666 UART: Caliptra RT
3,166,011 UART: [state] CFI Enabled
3,273,154 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,198,851 UART: [idev] Sha384 KeyId Algorithm
1,202,546 UART: [idev] --
1,203,519 UART: [ldev] ++
1,203,687 UART: [ldev] CDI.KEYID = 6
1,204,051 UART: [ldev] SUBJECT.KEYID = 5
1,204,478 UART: [ldev] AUTHORITY.KEYID = 7
1,204,941 UART: [ldev] FE.KEYID = 1
1,210,091 UART: [ldev] Erasing FE.KEYID = 1
1,236,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,335 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,057 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,115 UART: [ldev] --
1,275,607 UART: [fwproc] Wait for Commands...
1,276,396 UART: [fwproc] Recv command 0x46574c44
1,277,129 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,271 >>> mbox cmd response: success
2,769,302 UART: [afmc] ++
2,769,470 UART: [afmc] CDI.KEYID = 6
2,769,833 UART: [afmc] SUBJECT.KEYID = 7
2,770,259 UART: [afmc] AUTHORITY.KEYID = 5
2,805,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,815 UART: [afmc] --
2,848,947 UART: [cold-reset] --
2,849,819 UART: [state] Locking Datavault
2,850,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,456 UART: [state] Locking ICCM
2,852,012 UART: [exit] Launching FMC @ 0x40000130
2,857,341 UART:
2,857,357 UART: Running Caliptra FMC ...
2,857,765 UART:
2,857,908 UART: [state] CFI Enabled
2,868,167 UART: [fht] FMC Alias Private Key: 7
2,976,854 UART: [art] Extend RT PCRs Done
2,977,282 UART: [art] Lock RT PCRs Done
2,978,886 UART: [art] Populate DV Done
2,987,179 UART: [fht] FMC Alias Private Key: 7
2,988,189 UART: [art] Derive CDI
2,988,469 UART: [art] Store in in slot 0x4
3,074,172 UART: [art] Derive Key Pair
3,074,532 UART: [art] Store priv key in slot 0x5
3,087,592 UART: [art] Derive Key Pair - Done
3,102,011 UART: [art] Signing Cert with AUTHO
3,102,491 UART: RITY.KEYID = 7
3,117,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,522 UART: [art] PUB.X = 9A8A96F19F86230F6C629F365D297E4A0FC8C5B699D9A1388430F989BA9699664CEDE73A995BB9E29598FCE6D3D032A7
3,125,290 UART: [art] PUB.Y = 7A459148707F31E792C4D58598931393E62079A714BAB375F57948455A628CBB9CE72FF2F551317D911D7D6E655C1EB9
3,132,232 UART: [art] SIG.R = 4D2A10AA264FBC73C87A152D0A550C9B85AA9C7C5C378561B3FEF1F5D9B4DE447298C810C473E17E80C73E27D3BFB29B
3,139,010 UART: [art] SIG.S = 7E79D9AFFACF6DAC80AAE88201AFF7CA5DDC66B3792164AFD2E3AF8F2796697E7B1B72A89C4CD410237616A42E9A42DB
3,163,512 UART: Caliptra RT
3,163,857 UART: [state] CFI Enabled
3,270,978 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,459 UART: [kat] SHA2-256
892,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,138 UART: [kat] ++
896,290 UART: [kat] sha1
900,550 UART: [kat] SHA2-256
902,490 UART: [kat] SHA2-384
905,215 UART: [kat] SHA2-512-ACC
907,116 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,726 UART: [cold-reset] ++
1,171,260 UART: [fht] FHT @ 0x50003400
1,173,902 UART: [idev] ++
1,174,070 UART: [idev] CDI.KEYID = 6
1,174,431 UART: [idev] SUBJECT.KEYID = 7
1,174,856 UART: [idev] UDS.KEYID = 0
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,200,203 UART: [idev] Fuse KeyId
1,201,425 UART: [idev] --
1,202,488 UART: [ldev] ++
1,202,656 UART: [ldev] CDI.KEYID = 6
1,203,020 UART: [ldev] SUBJECT.KEYID = 5
1,203,447 UART: [ldev] AUTHORITY.KEYID = 7
1,203,910 UART: [ldev] FE.KEYID = 1
1,208,958 UART: [ldev] Erasing FE.KEYID = 1
1,235,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,984 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,666 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,873 UART: [ldev] --
1,275,245 UART: [fwproc] Wait for Commands...
1,275,900 UART: [fwproc] Recv command 0x46574c44
1,276,633 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,537 >>> mbox cmd response: success
2,767,660 UART: [afmc] ++
2,767,828 UART: [afmc] CDI.KEYID = 6
2,768,191 UART: [afmc] SUBJECT.KEYID = 7
2,768,617 UART: [afmc] AUTHORITY.KEYID = 5
2,804,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,969 UART: [afmc] --
2,848,017 UART: [cold-reset] --
2,848,945 UART: [state] Locking Datavault
2,849,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,578 UART: [state] Locking ICCM
2,851,184 UART: [exit] Launching FMC @ 0x40000130
2,856,513 UART:
2,856,529 UART: Running Caliptra FMC ...
2,856,937 UART:
2,857,080 UART: [state] CFI Enabled
2,867,609 UART: [fht] FMC Alias Private Key: 7
2,975,768 UART: [art] Extend RT PCRs Done
2,976,196 UART: [art] Lock RT PCRs Done
2,977,544 UART: [art] Populate DV Done
2,985,729 UART: [fht] FMC Alias Private Key: 7
2,986,865 UART: [art] Derive CDI
2,987,145 UART: [art] Store in in slot 0x4
3,072,848 UART: [art] Derive Key Pair
3,073,208 UART: [art] Store priv key in slot 0x5
3,086,700 UART: [art] Derive Key Pair - Done
3,101,527 UART: [art] Signing Cert with AUTHO
3,102,007 UART: RITY.KEYID = 7
3,117,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,184 UART: [art] PUB.X = C4DAB4AB93C2D9D10CD24F12E5ED0CCD82A4FB33A4083AAAACAF38803476E05ACC2D00394005508752C7924AE776FAA6
3,124,938 UART: [art] PUB.Y = 4AE8B02677C2B58036A8B70D9EA638A709A527E127C6D1D29BABE284E68EF89AAF28CBD06D90D9B29D474DBC2F409E41
3,131,896 UART: [art] SIG.R = E1E293EF0370450C533E5EC28516A26E384A57B26C3FA87CE03A6DC88255E14DE3CE58D1779FD163113223B56390B5FC
3,138,662 UART: [art] SIG.S = 25DF37C6D27E8F4F45BEF39417A3596000F4E678C26BF490D3301623AEB9270641222897947815B571E2472E4677F2FE
3,161,790 UART: Caliptra RT
3,162,135 UART: [state] CFI Enabled
3,270,126 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,285 >>> mbox cmd response: success
2,686,213 UART:
2,686,229 UART: Running Caliptra FMC ...
2,686,637 UART:
2,686,780 UART: [state] CFI Enabled
2,697,251 UART: [fht] FMC Alias Private Key: 7
2,805,616 UART: [art] Extend RT PCRs Done
2,806,044 UART: [art] Lock RT PCRs Done
2,807,820 UART: [art] Populate DV Done
2,816,125 UART: [fht] FMC Alias Private Key: 7
2,817,073 UART: [art] Derive CDI
2,817,353 UART: [art] Store in in slot 0x4
2,903,094 UART: [art] Derive Key Pair
2,903,454 UART: [art] Store priv key in slot 0x5
2,917,578 UART: [art] Derive Key Pair - Done
2,932,321 UART: [art] Signing Cert with AUTHO
2,932,801 UART: RITY.KEYID = 7
2,948,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,926 UART: [art] PUB.X = 704D157D4D01B1F444472DD3894F3D65EDC69EB9F2189768D2B00F81CDAA345A577F139128216CCF849475DE8AB6038E
2,955,689 UART: [art] PUB.Y = 39454716A3E9F5A29A9F5FA757529B2A675D36C3EDA84DE328AE32926B42385E3372198A185987DD6973278F8A544BE3
2,962,633 UART: [art] SIG.R = 5C6F5B8A4D32E73584876EF568B675C542B08A95C2FE4DF3AF2F4C03AC19F34642ECCA2FADA769A07D63D618F1C0AC24
2,969,416 UART: [art] SIG.S = AF8E8B1F0C455B77288A606D1029129CE06D0729F34E5D560FEEE464C7B64AC5E8408BFAEF4074CD190DE3CF4ECE24C7
2,994,133 UART: Caliptra RT
2,994,478 UART: [state] CFI Enabled
3,102,747 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,067 >>> mbox cmd response: success
2,683,515 UART:
2,683,531 UART: Running Caliptra FMC ...
2,683,939 UART:
2,684,082 UART: [state] CFI Enabled
2,694,711 UART: [fht] FMC Alias Private Key: 7
2,802,482 UART: [art] Extend RT PCRs Done
2,802,910 UART: [art] Lock RT PCRs Done
2,804,560 UART: [art] Populate DV Done
2,812,873 UART: [fht] FMC Alias Private Key: 7
2,813,985 UART: [art] Derive CDI
2,814,265 UART: [art] Store in in slot 0x4
2,900,272 UART: [art] Derive Key Pair
2,900,632 UART: [art] Store priv key in slot 0x5
2,913,608 UART: [art] Derive Key Pair - Done
2,928,448 UART: [art] Signing Cert with AUTHO
2,928,928 UART: RITY.KEYID = 7
2,944,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,277 UART: [art] PUB.X = 1D2A2B24B51A699DAF544BDF15DC12E4F2BFFAA98C816E36B752007A721E452FEA09B9C17D95ADCF4F93F5EBB974D50D
2,952,041 UART: [art] PUB.Y = 9EB5945474FB576B6DF78B4FE0EEE812C1CE4B38283E218FA41C60B861399C319CD69E8A94A006D946D9202F0B631686
2,958,987 UART: [art] SIG.R = B1400BF7B4DC30B6B874C79C2080BF0544DA1004941B7650FBC89FBB5EA01B565CF24A11F6F378BC978D9486ED803CF9
2,965,758 UART: [art] SIG.S = 22137801AB7C85E573330632E3F42062908EE31F8C1862A00EA5C7B3E2808EBAB75128FE187EE46CB4717C704F991113
2,989,752 UART: Caliptra RT
2,990,097 UART: [state] CFI Enabled
3,097,027 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,619,139 >>> mbox cmd response: success
2,681,673 UART:
2,681,689 UART: Running Caliptra FMC ...
2,682,097 UART:
2,682,240 UART: [state] CFI Enabled
2,692,819 UART: [fht] FMC Alias Private Key: 7
2,801,432 UART: [art] Extend RT PCRs Done
2,801,860 UART: [art] Lock RT PCRs Done
2,803,442 UART: [art] Populate DV Done
2,811,525 UART: [fht] FMC Alias Private Key: 7
2,812,467 UART: [art] Derive CDI
2,812,747 UART: [art] Store in in slot 0x4
2,898,164 UART: [art] Derive Key Pair
2,898,524 UART: [art] Store priv key in slot 0x5
2,912,126 UART: [art] Derive Key Pair - Done
2,926,850 UART: [art] Signing Cert with AUTHO
2,927,330 UART: RITY.KEYID = 7
2,942,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,311 UART: [art] PUB.X = 5DF7D432D6EDBA63BC7DE56D9B5A43699C16DC84079B2D9A5D5B0ABD627AD2A34D697F6644ED3E91D15F6BF6D9734EE8
2,950,095 UART: [art] PUB.Y = 8BABA6D639A6E8D4059DC3FF826D1D34A80F7E089A542E45069AEA31E0091A4E3A35DB1E7698F5E8905143795D95DA02
2,957,033 UART: [art] SIG.R = 6DA3EE16D5537E848B0CF274CA0256B25922D715E28D57BB08EA519AE3A5ECEA7F4D8388E92711022418A4B217026935
2,963,788 UART: [art] SIG.S = FD126DD54556CC3AC0F6E4F17A2467292EFD92CA731CB3CBB6726CAA5D9BFCF4A1C158E81698E15FC8A58A1C93AE2C9B
2,987,379 UART: Caliptra RT
2,987,724 UART: [state] CFI Enabled
3,095,070 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,615,147 >>> mbox cmd response: success
2,677,273 UART:
2,677,289 UART: Running Caliptra FMC ...
2,677,697 UART:
2,677,840 UART: [state] CFI Enabled
2,688,443 UART: [fht] FMC Alias Private Key: 7
2,796,510 UART: [art] Extend RT PCRs Done
2,796,938 UART: [art] Lock RT PCRs Done
2,798,368 UART: [art] Populate DV Done
2,806,479 UART: [fht] FMC Alias Private Key: 7
2,807,555 UART: [art] Derive CDI
2,807,835 UART: [art] Store in in slot 0x4
2,893,624 UART: [art] Derive Key Pair
2,893,984 UART: [art] Store priv key in slot 0x5
2,907,290 UART: [art] Derive Key Pair - Done
2,922,034 UART: [art] Signing Cert with AUTHO
2,922,514 UART: RITY.KEYID = 7
2,937,940 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,705 UART: [art] PUB.X = 092F134007ED25EBEB1874D143917279C7D7160F29EDA26B6D5BF077D6A28A86A1538C8C86A896D333D01262E4697BBC
2,945,466 UART: [art] PUB.Y = 52955FB62F5D6C431BEC4DE3DFB6A6CBEDB48B661F60B5F809DAD3341515C4EC5C925DA1EDEDB3FC221ADB8488789D38
2,952,437 UART: [art] SIG.R = CD62893D6A9CF4397F85A4A2068A63001E37273C04CDE94DEBF1C2DE26BEB5246BE5DBE4A0DC0EED5C23A528D646BE50
2,959,196 UART: [art] SIG.S = 3B135152C192A1AAF72E0F76982DAAA93975447D7F835B472A6DEB9700103FA736CC0DE3DA755AF2B0E7367CFD49C864
2,982,783 UART: Caliptra RT
2,983,128 UART: [state] CFI Enabled
3,091,415 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.39s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,390 UART: [afmc] --
2,849,502 UART: [cold-reset] --
2,850,380 UART: [state] Locking Datavault
2,851,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,807 UART: [state] Locking ICCM
2,852,447 UART: [exit] Launching FMC @ 0x40000130
2,857,776 UART:
2,857,792 UART: Running Caliptra FMC ...
2,858,200 UART:
2,858,254 UART: [state] CFI Enabled
2,869,149 UART: [fht] FMC Alias Private Key: 7
2,977,390 UART: [art] Extend RT PCRs Done
2,977,818 UART: [art] Lock RT PCRs Done
2,979,370 UART: [art] Populate DV Done
2,987,733 UART: [fht] FMC Alias Private Key: 7
2,988,807 UART: [art] Derive CDI
2,989,087 UART: [art] Store in in slot 0x4
3,074,490 UART: [art] Derive Key Pair
3,074,850 UART: [art] Store priv key in slot 0x5
3,087,536 UART: [art] Derive Key Pair - Done
3,102,387 UART: [art] Signing Cert with AUTHO
3,102,867 UART: RITY.KEYID = 7
3,118,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,808 UART: [art] PUB.X = 64D8E3581722A17EDC8BFEDCB537409F95C920E1F36809E500715512ECF4B9634873980542B0B3182449D932FED63668
3,125,542 UART: [art] PUB.Y = 2948B74C7EBA377C3B81A681011599CED51B0759476826BE7F7CD2C629A87647927C04C0358048E7BD059CDD88985646
3,132,472 UART: [art] SIG.R = 9D2A80E68405433E09AA6BE7EB1A6472445282893AB3684FF7FB61DA99FA67C1BBFD6C5659B0D1F6D5BE54EEF87DDFC9
3,139,254 UART: [art] SIG.S = 3F837B1F59B2BCB8490CB50B26CD1F84BA4873B61451598FDFA6E3AFE54DE6EB1D36DF4E8ED37D2BD4EB1907BE845C43
3,163,240 UART: Caliptra RT
3,163,493 UART: [state] CFI Enabled
3,271,611 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Unprovisioned
85,297 UART: [state] DebugLocked = No
85,875 UART: [state] WD Timer not started. Device not locked for debugging
87,056 UART: [kat] SHA2-256
890,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,735 UART: [kat] ++
894,887 UART: [kat] sha1
899,073 UART: [kat] SHA2-256
901,013 UART: [kat] SHA2-384
903,756 UART: [kat] SHA2-512-ACC
905,657 UART: [kat] ECC-384
915,436 UART: [kat] HMAC-384Kdf
919,918 UART: [kat] LMS
1,168,230 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,573 UART: [fht] FHT @ 0x50003400
1,172,137 UART: [idev] ++
1,172,305 UART: [idev] CDI.KEYID = 6
1,172,666 UART: [idev] SUBJECT.KEYID = 7
1,173,091 UART: [idev] UDS.KEYID = 0
1,180,705 UART: [idev] Erasing UDS.KEYID = 0
1,197,922 UART: [idev] Sha384 KeyId Algorithm
1,201,797 UART: [idev] --
1,202,750 UART: [ldev] ++
1,202,918 UART: [ldev] CDI.KEYID = 6
1,203,282 UART: [ldev] SUBJECT.KEYID = 5
1,203,709 UART: [ldev] AUTHORITY.KEYID = 7
1,204,172 UART: [ldev] FE.KEYID = 1
1,209,348 UART: [ldev] Erasing FE.KEYID = 1
1,235,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,844 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,566 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,538 UART: [ldev] --
1,274,856 UART: [fwproc] Wait for Commands...
1,275,669 UART: [fwproc] Recv command 0x46574c44
1,276,402 UART: [fwproc] Recv'd Img size: 114448 bytes
2,575,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,490 >>> mbox cmd response: success
2,769,617 UART: [afmc] ++
2,769,785 UART: [afmc] CDI.KEYID = 6
2,770,148 UART: [afmc] SUBJECT.KEYID = 7
2,770,574 UART: [afmc] AUTHORITY.KEYID = 5
2,806,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,758 UART: [afmc] --
2,849,694 UART: [cold-reset] --
2,850,486 UART: [state] Locking Datavault
2,851,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,585 UART: [state] Locking ICCM
2,853,179 UART: [exit] Launching FMC @ 0x40000130
2,858,508 UART:
2,858,524 UART: Running Caliptra FMC ...
2,858,932 UART:
2,858,986 UART: [state] CFI Enabled
2,869,303 UART: [fht] FMC Alias Private Key: 7
2,977,204 UART: [art] Extend RT PCRs Done
2,977,632 UART: [art] Lock RT PCRs Done
2,979,044 UART: [art] Populate DV Done
2,987,307 UART: [fht] FMC Alias Private Key: 7
2,988,295 UART: [art] Derive CDI
2,988,575 UART: [art] Store in in slot 0x4
3,074,352 UART: [art] Derive Key Pair
3,074,712 UART: [art] Store priv key in slot 0x5
3,087,924 UART: [art] Derive Key Pair - Done
3,102,860 UART: [art] Signing Cert with AUTHO
3,103,340 UART: RITY.KEYID = 7
3,118,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,399 UART: [art] PUB.X = 0E83174C2199D468F09E501492F3260B6E9F62E35A936F64E1999B53EFD87DFFBE60CE448EEC735681DEEEF4AD2EBE2C
3,126,177 UART: [art] PUB.Y = 8BF6C70BF9A9849D7661F0974484C4298216FCE9A0DB05EEED1F3AF8282F16809A8777BD04F33CED5AFCE318BD9C0939
3,133,127 UART: [art] SIG.R = C18A5BA64CFA20115A803BA2C8142A95469A50939D47D82A23FD7A3811574E2BCB681623BA923A61E3EEAED3A1E5A3AD
3,139,909 UART: [art] SIG.S = DFBF23AA2C2D5D16C65F101A057770151BCA4886407481941ABAE337DB1A85165D41034F4E1F2688B0A97C8098BD5376
3,163,512 UART: Caliptra RT
3,163,765 UART: [state] CFI Enabled
3,271,668 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,889 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,787 UART: [kat] ++
894,939 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
903,968 UART: [kat] SHA2-512-ACC
905,869 UART: [kat] ECC-384
915,128 UART: [kat] HMAC-384Kdf
919,536 UART: [kat] LMS
1,167,848 UART: [kat] --
1,168,993 UART: [cold-reset] ++
1,169,347 UART: [fht] FHT @ 0x50003400
1,172,141 UART: [idev] ++
1,172,309 UART: [idev] CDI.KEYID = 6
1,172,670 UART: [idev] SUBJECT.KEYID = 7
1,173,095 UART: [idev] UDS.KEYID = 0
1,181,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,448 UART: [idev] Fuse KeyId
1,199,670 UART: [idev] --
1,200,793 UART: [ldev] ++
1,200,961 UART: [ldev] CDI.KEYID = 6
1,201,325 UART: [ldev] SUBJECT.KEYID = 5
1,201,752 UART: [ldev] AUTHORITY.KEYID = 7
1,202,215 UART: [ldev] FE.KEYID = 1
1,207,489 UART: [ldev] Erasing FE.KEYID = 1
1,233,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,739 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,421 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,544 UART: [ldev] --
1,273,022 UART: [fwproc] Wait for Commands...
1,273,595 UART: [fwproc] Recv command 0x46574c44
1,274,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,573,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,274 >>> mbox cmd response: success
2,767,427 UART: [afmc] ++
2,767,595 UART: [afmc] CDI.KEYID = 6
2,767,958 UART: [afmc] SUBJECT.KEYID = 7
2,768,384 UART: [afmc] AUTHORITY.KEYID = 5
2,803,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,494 UART: [afmc] --
2,847,542 UART: [cold-reset] --
2,848,380 UART: [state] Locking Datavault
2,849,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,351 UART: [state] Locking ICCM
2,850,995 UART: [exit] Launching FMC @ 0x40000130
2,856,324 UART:
2,856,340 UART: Running Caliptra FMC ...
2,856,748 UART:
2,856,802 UART: [state] CFI Enabled
2,867,309 UART: [fht] FMC Alias Private Key: 7
2,974,768 UART: [art] Extend RT PCRs Done
2,975,196 UART: [art] Lock RT PCRs Done
2,976,700 UART: [art] Populate DV Done
2,985,035 UART: [fht] FMC Alias Private Key: 7
2,986,015 UART: [art] Derive CDI
2,986,295 UART: [art] Store in in slot 0x4
3,071,698 UART: [art] Derive Key Pair
3,072,058 UART: [art] Store priv key in slot 0x5
3,084,548 UART: [art] Derive Key Pair - Done
3,099,608 UART: [art] Signing Cert with AUTHO
3,100,088 UART: RITY.KEYID = 7
3,115,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,261 UART: [art] PUB.X = CCD7B2C14E9C56BFE63C891D89B1CE8B0BCF28A9A9A4089802FEB38A470ABC49EFF2704D54A094B3A82BE1B98FEBD7DE
3,123,047 UART: [art] PUB.Y = 8C31061D46DFBD84014EB6C13AB871FEBDCD943979C1A02750ADC72A7A4CB1FB069944F05917B1C2EF274C0D4E4C6B30
3,129,999 UART: [art] SIG.R = F32DEB464A65F1F966878868E67453F5B581FE331CE3AC4DCE80C23A3A72A0D2F76AA3E872D57D71023DD1395B6E86E3
3,136,774 UART: [art] SIG.S = B791C53925EF17D191CB7968EAEB057CA41A15FAC6CE306DAF83BFF3C154729BAEF0492628C589C0224E1DC59BD1465D
3,160,570 UART: Caliptra RT
3,160,823 UART: [state] CFI Enabled
3,268,157 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,248 >>> mbox cmd response: success
2,685,628 UART:
2,685,644 UART: Running Caliptra FMC ...
2,686,052 UART:
2,686,106 UART: [state] CFI Enabled
2,696,265 UART: [fht] FMC Alias Private Key: 7
2,804,382 UART: [art] Extend RT PCRs Done
2,804,810 UART: [art] Lock RT PCRs Done
2,806,088 UART: [art] Populate DV Done
2,814,413 UART: [fht] FMC Alias Private Key: 7
2,815,377 UART: [art] Derive CDI
2,815,657 UART: [art] Store in in slot 0x4
2,901,246 UART: [art] Derive Key Pair
2,901,606 UART: [art] Store priv key in slot 0x5
2,914,126 UART: [art] Derive Key Pair - Done
2,929,086 UART: [art] Signing Cert with AUTHO
2,929,566 UART: RITY.KEYID = 7
2,944,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,519 UART: [art] PUB.X = A3F920D00F7F19670CD99C4AB054CB3FAFB7D0008C3B572DD0B43FBD0F63E5D14C8F908B2C7B7F9FB521D412B81A23F7
2,952,276 UART: [art] PUB.Y = 99075CAE39A66E8610234DC366388623C5A04B2657F809A28070E71CB2CAECC8A194EC27A0FF4B9DBCAACA7373379F35
2,959,228 UART: [art] SIG.R = D2768E00DE96A1F0C24939421CBFFA2B608856B46281F22ECA0BAC116A3D9F16FD88BE2F8F7C5B53032E8219AB6BF771
2,965,982 UART: [art] SIG.S = 80697CFCF2F9A660D1DB8B07622527A023C3FB39288ECDA3EC525EFDA9D80A41359B7B2CA8D0E8F034C9807DF30C71F4
2,989,186 UART: Caliptra RT
2,989,439 UART: [state] CFI Enabled
3,096,935 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,340 >>> mbox cmd response: success
2,682,224 UART:
2,682,240 UART: Running Caliptra FMC ...
2,682,648 UART:
2,682,702 UART: [state] CFI Enabled
2,693,311 UART: [fht] FMC Alias Private Key: 7
2,801,056 UART: [art] Extend RT PCRs Done
2,801,484 UART: [art] Lock RT PCRs Done
2,803,154 UART: [art] Populate DV Done
2,811,193 UART: [fht] FMC Alias Private Key: 7
2,812,167 UART: [art] Derive CDI
2,812,447 UART: [art] Store in in slot 0x4
2,898,330 UART: [art] Derive Key Pair
2,898,690 UART: [art] Store priv key in slot 0x5
2,911,976 UART: [art] Derive Key Pair - Done
2,926,929 UART: [art] Signing Cert with AUTHO
2,927,409 UART: RITY.KEYID = 7
2,942,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,104 UART: [art] PUB.X = 27ED576AD2AD7635F2C90DEA3253261A09CC169E882E3E6590FE8C55D7B569B476549BB5D24D1705810B38596B4F7572
2,949,860 UART: [art] PUB.Y = 1B2E250C29D6468BC783759CF80939FC0ADB671975BC2BCCFD8E4A784F3B63138EEAF39CCEDF0319DD7D10C1C1A0D094
2,956,816 UART: [art] SIG.R = 87B7999D37EA04CC949D9F01E0628EA0FBEC9C4FCAFEC754AF0A92DF55696703883ECC035A072ECAEDC899AEDC4365C6
2,963,590 UART: [art] SIG.S = E2D9074DCE8E5C338F4B7BEB1ECCB23FFE2096CCDBB66232ED4DC7A161EAA79A0A8BB4F967E81162491F15CCBCD6D054
2,987,783 UART: Caliptra RT
2,988,036 UART: [state] CFI Enabled
3,094,967 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,316 >>> mbox cmd response: success
2,679,890 UART:
2,679,906 UART: Running Caliptra FMC ...
2,680,314 UART:
2,680,368 UART: [state] CFI Enabled
2,690,687 UART: [fht] FMC Alias Private Key: 7
2,799,400 UART: [art] Extend RT PCRs Done
2,799,828 UART: [art] Lock RT PCRs Done
2,801,176 UART: [art] Populate DV Done
2,809,535 UART: [fht] FMC Alias Private Key: 7
2,810,671 UART: [art] Derive CDI
2,810,951 UART: [art] Store in in slot 0x4
2,896,548 UART: [art] Derive Key Pair
2,896,908 UART: [art] Store priv key in slot 0x5
2,910,194 UART: [art] Derive Key Pair - Done
2,925,214 UART: [art] Signing Cert with AUTHO
2,925,694 UART: RITY.KEYID = 7
2,941,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,993 UART: [art] PUB.X = 5962254F8C8B4074DACFB1D61E3BF2DE1DD3E61835D813BA2A5E3D7DB56063C2E2FC16CFE53972DE7A0FCEA0C34FE820
2,948,782 UART: [art] PUB.Y = C858809162D8E39375FF963C1FC029029FD0815FDE7E2E169AAD53450D1D4A45A20EBADBFEE3EC105F82E3A8DF908C49
2,955,737 UART: [art] SIG.R = AA96BB0DFAD68B14E9DEABB1B7821319DCD679C576F54D0A99518891B101643FF5E1BE61B7130C235B10B2C037B7B8B6
2,962,507 UART: [art] SIG.S = 162169990A650D89131C373A603ABAAD22E055D9F6E1C6319992FBCB48CE1E71D00F8A4E351E1B972541526AD7B42144
2,986,447 UART: Caliptra RT
2,986,700 UART: [state] CFI Enabled
3,093,178 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,617,294 >>> mbox cmd response: success
2,679,698 UART:
2,679,714 UART: Running Caliptra FMC ...
2,680,122 UART:
2,680,176 UART: [state] CFI Enabled
2,690,903 UART: [fht] FMC Alias Private Key: 7
2,798,820 UART: [art] Extend RT PCRs Done
2,799,248 UART: [art] Lock RT PCRs Done
2,800,942 UART: [art] Populate DV Done
2,808,905 UART: [fht] FMC Alias Private Key: 7
2,809,935 UART: [art] Derive CDI
2,810,215 UART: [art] Store in in slot 0x4
2,895,924 UART: [art] Derive Key Pair
2,896,284 UART: [art] Store priv key in slot 0x5
2,909,248 UART: [art] Derive Key Pair - Done
2,924,091 UART: [art] Signing Cert with AUTHO
2,924,571 UART: RITY.KEYID = 7
2,939,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,762 UART: [art] PUB.X = 70B0346BE257A8E1F3C12EC99C91CCD395FA96915F6E97CB11DE23A258DC2056206D038085AEBCE62134A000B618DBA6
2,947,515 UART: [art] PUB.Y = 6BC196840CDD70C6F04FE13EFE119532516213D2A26332DB6CFEB993EE0D64D85E7173C8922F702351EA0132621B5721
2,954,454 UART: [art] SIG.R = 029AA2E2A5679E1FEE36B5C1B8DD887D63FC3F4197219F573969BB4C3C6FFD0DAAE386ED5A088873AAD276D02F16B4E9
2,961,231 UART: [art] SIG.S = E99C1955E721B91C3C0D9DE78DE5C53A1C5AB25A5037E32A2F1A57530F69A0202FE978A2FD78CA25338D81DAF6C5260B
2,985,537 UART: Caliptra RT
2,985,790 UART: [state] CFI Enabled
3,093,533 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.74s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,269 UART: [afmc] --
2,851,217 UART: [cold-reset] --
2,852,161 UART: [state] Locking Datavault
2,853,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,102 UART: [state] Locking ICCM
2,854,708 UART: [exit] Launching FMC @ 0x40000130
2,860,037 UART:
2,860,053 UART: Running Caliptra FMC ...
2,860,461 UART:
2,860,604 UART: [state] CFI Enabled
2,871,149 UART: [fht] FMC Alias Private Key: 7
2,978,950 UART: [art] Extend RT PCRs Done
2,979,378 UART: [art] Lock RT PCRs Done
2,981,018 UART: [art] Populate DV Done
2,989,317 UART: [fht] FMC Alias Private Key: 7
2,990,385 UART: [art] Derive CDI
2,990,665 UART: [art] Store in in slot 0x4
3,076,518 UART: [art] Derive Key Pair
3,076,878 UART: [art] Store priv key in slot 0x5
3,089,980 UART: [art] Derive Key Pair - Done
3,104,565 UART: [art] Signing Cert with AUTHO
3,105,045 UART: RITY.KEYID = 7
3,120,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,990 UART: [art] PUB.X = 2C45289D3941B7B4BBFC8A97C8844C394D99D9AE4AF1F1CBDE1D33ECC97BD096544337153CCFF99493E011BCA0DC651A
3,127,776 UART: [art] PUB.Y = 942B46090BFCC53F5EA0B3D033120DAE6EB6CF6FC7151CCCCCCE50543F97CD5AF6E6771F02EDF03AF9DF5CC5A692C498
3,134,740 UART: [art] SIG.R = F97B001F9CA9D0866D51D36875846B81B37AF942C966BA15E29045FD6805D887CE77CA921AAB56260D2AE30389412415
3,141,475 UART: [art] SIG.S = 9984777DD1365A056C0B672C3F7C81196DC2C360252BDB5BC01CAFDC35453DD8A3400D030DB55774FAC8B730255732A3
3,165,399 UART: Caliptra RT
3,165,744 UART: [state] CFI Enabled
3,274,321 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,394 UART: [kat] SHA2-256
902,334 UART: [kat] SHA2-384
905,189 UART: [kat] SHA2-512-ACC
907,090 UART: [kat] ECC-384
917,139 UART: [kat] HMAC-384Kdf
921,775 UART: [kat] LMS
1,170,087 UART: [kat] --
1,170,892 UART: [cold-reset] ++
1,171,268 UART: [fht] FHT @ 0x50003400
1,173,910 UART: [idev] ++
1,174,078 UART: [idev] CDI.KEYID = 6
1,174,439 UART: [idev] SUBJECT.KEYID = 7
1,174,864 UART: [idev] UDS.KEYID = 0
1,183,088 UART: [idev] Erasing UDS.KEYID = 0
1,200,263 UART: [idev] Sha384 KeyId Algorithm
1,204,076 UART: [idev] --
1,205,257 UART: [ldev] ++
1,205,425 UART: [ldev] CDI.KEYID = 6
1,205,789 UART: [ldev] SUBJECT.KEYID = 5
1,206,216 UART: [ldev] AUTHORITY.KEYID = 7
1,206,679 UART: [ldev] FE.KEYID = 1
1,211,919 UART: [ldev] Erasing FE.KEYID = 1
1,238,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,047 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,769 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,605 UART: [ldev] --
1,277,987 UART: [fwproc] Wait for Commands...
1,278,692 UART: [fwproc] Recv command 0x46574c44
1,279,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,037 >>> mbox cmd response: success
2,773,228 UART: [afmc] ++
2,773,396 UART: [afmc] CDI.KEYID = 6
2,773,759 UART: [afmc] SUBJECT.KEYID = 7
2,774,185 UART: [afmc] AUTHORITY.KEYID = 5
2,809,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,533 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,252 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,057 UART: [afmc] --
2,852,943 UART: [cold-reset] --
2,853,711 UART: [state] Locking Datavault
2,855,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,628 UART: [state] Locking ICCM
2,856,120 UART: [exit] Launching FMC @ 0x40000130
2,861,449 UART:
2,861,465 UART: Running Caliptra FMC ...
2,861,873 UART:
2,862,016 UART: [state] CFI Enabled
2,872,803 UART: [fht] FMC Alias Private Key: 7
2,981,632 UART: [art] Extend RT PCRs Done
2,982,060 UART: [art] Lock RT PCRs Done
2,983,494 UART: [art] Populate DV Done
2,991,935 UART: [fht] FMC Alias Private Key: 7
2,993,077 UART: [art] Derive CDI
2,993,357 UART: [art] Store in in slot 0x4
3,079,062 UART: [art] Derive Key Pair
3,079,422 UART: [art] Store priv key in slot 0x5
3,092,836 UART: [art] Derive Key Pair - Done
3,107,738 UART: [art] Signing Cert with AUTHO
3,108,218 UART: RITY.KEYID = 7
3,123,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,159 UART: [art] PUB.X = 9A266F1ABFC784B6095FD3178E0CED18734CF7586F8DC427409E2B9EA836B598D3F459DBC869F0654F703587E1CA61F8
3,130,929 UART: [art] PUB.Y = 62F3FDC3656D22347C35906857E819023CAF5FD3397FB83DCB1A3EC950DE78C2D37FC958187342D4D9180955CE49A246
3,137,873 UART: [art] SIG.R = 69FD2B68BFB5F82E28F96437FEAD23E003B12624B60BE3B7C7FB31925418E086E973EE16B461D215C653208CA3E5F9A9
3,144,643 UART: [art] SIG.S = 63998800C189C340C7E56B6200EBDB614C8ABD2A676EEDC451F228F0410A900B254ACC42CBA4DB0E92F63B0EBC7E38F6
3,168,442 UART: Caliptra RT
3,168,787 UART: [state] CFI Enabled
3,275,750 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
917,071 UART: [kat] HMAC-384Kdf
921,735 UART: [kat] LMS
1,170,047 UART: [kat] --
1,170,952 UART: [cold-reset] ++
1,171,278 UART: [fht] FHT @ 0x50003400
1,173,998 UART: [idev] ++
1,174,166 UART: [idev] CDI.KEYID = 6
1,174,527 UART: [idev] SUBJECT.KEYID = 7
1,174,952 UART: [idev] UDS.KEYID = 0
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,825 UART: [idev] Fuse KeyId
1,201,047 UART: [idev] --
1,202,092 UART: [ldev] ++
1,202,260 UART: [ldev] CDI.KEYID = 6
1,202,624 UART: [ldev] SUBJECT.KEYID = 5
1,203,051 UART: [ldev] AUTHORITY.KEYID = 7
1,203,514 UART: [ldev] FE.KEYID = 1
1,208,530 UART: [ldev] Erasing FE.KEYID = 1
1,234,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,050 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,732 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,719 UART: [ldev] --
1,274,135 UART: [fwproc] Wait for Commands...
1,274,740 UART: [fwproc] Recv command 0x46574c44
1,275,473 UART: [fwproc] Recv'd Img size: 114448 bytes
2,573,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,765,687 >>> mbox cmd response: success
2,766,888 UART: [afmc] ++
2,767,056 UART: [afmc] CDI.KEYID = 6
2,767,419 UART: [afmc] SUBJECT.KEYID = 7
2,767,845 UART: [afmc] AUTHORITY.KEYID = 5
2,803,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,465 UART: [afmc] --
2,846,395 UART: [cold-reset] --
2,847,085 UART: [state] Locking Datavault
2,848,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,910 UART: [state] Locking ICCM
2,849,562 UART: [exit] Launching FMC @ 0x40000130
2,854,891 UART:
2,854,907 UART: Running Caliptra FMC ...
2,855,315 UART:
2,855,458 UART: [state] CFI Enabled
2,865,797 UART: [fht] FMC Alias Private Key: 7
2,974,374 UART: [art] Extend RT PCRs Done
2,974,802 UART: [art] Lock RT PCRs Done
2,976,222 UART: [art] Populate DV Done
2,984,601 UART: [fht] FMC Alias Private Key: 7
2,985,557 UART: [art] Derive CDI
2,985,837 UART: [art] Store in in slot 0x4
3,071,536 UART: [art] Derive Key Pair
3,071,896 UART: [art] Store priv key in slot 0x5
3,085,676 UART: [art] Derive Key Pair - Done
3,100,090 UART: [art] Signing Cert with AUTHO
3,100,570 UART: RITY.KEYID = 7
3,116,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,065 UART: [art] PUB.X = 885684F661DBB8D2CEA30AAF1E0387979557C92A68B849474869E2ECEA5AC81EC9E93446950C68B767F937DBF2C7A19D
3,123,832 UART: [art] PUB.Y = D7F2F1AF239A7986D4AAEABE515091BF6B53A574C37A3756CB7BB32A7C6F5D186EC89BCAFA641CBEC689AB3D06E3393B
3,130,803 UART: [art] SIG.R = 972B3602C946F908E01135A588D1F99DACD6CA23A178062C36E148588315E672EF5C9704909A1A76FEEB0387F3F28BC0
3,137,556 UART: [art] SIG.S = 7A805AC41B78BF73DC7B62AF6D9747E7A169CA4E3D2074C9FF9978D4EB81778A2E65471BD0B398B921098E128D88E631
3,161,446 UART: Caliptra RT
3,161,791 UART: [state] CFI Enabled
3,268,972 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,751 >>> mbox cmd response: success
2,689,229 UART:
2,689,245 UART: Running Caliptra FMC ...
2,689,653 UART:
2,689,796 UART: [state] CFI Enabled
2,700,291 UART: [fht] FMC Alias Private Key: 7
2,808,164 UART: [art] Extend RT PCRs Done
2,808,592 UART: [art] Lock RT PCRs Done
2,809,842 UART: [art] Populate DV Done
2,818,077 UART: [fht] FMC Alias Private Key: 7
2,819,005 UART: [art] Derive CDI
2,819,285 UART: [art] Store in in slot 0x4
2,904,880 UART: [art] Derive Key Pair
2,905,240 UART: [art] Store priv key in slot 0x5
2,918,912 UART: [art] Derive Key Pair - Done
2,933,866 UART: [art] Signing Cert with AUTHO
2,934,346 UART: RITY.KEYID = 7
2,949,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,105 UART: [art] PUB.X = 69770E729C59D94EC631D91567C41B6A6859D964F2CFF496B5577C22B2966B2301504A0C5C2BBA89CB796D760BFDB15F
2,956,865 UART: [art] PUB.Y = 4FF96526F415CA8A156D83383D49255A8589CB9F252E9CD086F3A3A4307691F9909F5DD8F7F31CCDCA81B016356652D0
2,963,815 UART: [art] SIG.R = 2CE2E5094C3490C1EA60D617A6EE145A970309061BF62E2412D5FECC22C6D51538B154C1CFF63C35ADAE5331CC161C36
2,970,581 UART: [art] SIG.S = D4A4426DB75DCA7F75D919D03E59451E3C0EE22777F1D93400858C0B7FA1668D3B92FB28EA841BAAD3BFD5B32498F9CF
2,994,242 UART: Caliptra RT
2,994,587 UART: [state] CFI Enabled
3,102,414 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,617,917 >>> mbox cmd response: success
2,680,557 UART:
2,680,573 UART: Running Caliptra FMC ...
2,680,981 UART:
2,681,124 UART: [state] CFI Enabled
2,692,035 UART: [fht] FMC Alias Private Key: 7
2,800,188 UART: [art] Extend RT PCRs Done
2,800,616 UART: [art] Lock RT PCRs Done
2,802,202 UART: [art] Populate DV Done
2,810,587 UART: [fht] FMC Alias Private Key: 7
2,811,641 UART: [art] Derive CDI
2,811,921 UART: [art] Store in in slot 0x4
2,897,800 UART: [art] Derive Key Pair
2,898,160 UART: [art] Store priv key in slot 0x5
2,912,054 UART: [art] Derive Key Pair - Done
2,926,658 UART: [art] Signing Cert with AUTHO
2,927,138 UART: RITY.KEYID = 7
2,941,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,659 UART: [art] PUB.X = 8145E19329B072CF028E14FFA6252C09DAC83956C5E8B97303B8A00F13773F5AAE6A0AC23B4A6C3D9838D45CFB147C55
2,949,420 UART: [art] PUB.Y = CD214F72BA68EC936070521CB08AEF01EE1B8A7B7F27AD2C0AEE35198D298A136EB90DC3D39A2CFFA2D293D690DA2710
2,956,379 UART: [art] SIG.R = 48008647BC6EB203D912AFCED4A257AC6CAF55FFB18FDEE770F31909D087F78191738ABE4D9DE36905237333691B7C08
2,963,121 UART: [art] SIG.S = 7D256B4D0AD990D060BC7F69850602D4233CCB99D19E15686487D3B21D546DBD6EC3A3290502D6F38D09516E62A52C0A
2,986,765 UART: Caliptra RT
2,987,110 UART: [state] CFI Enabled
3,093,993 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,499 >>> mbox cmd response: success
2,680,949 UART:
2,680,965 UART: Running Caliptra FMC ...
2,681,373 UART:
2,681,516 UART: [state] CFI Enabled
2,692,403 UART: [fht] FMC Alias Private Key: 7
2,800,492 UART: [art] Extend RT PCRs Done
2,800,920 UART: [art] Lock RT PCRs Done
2,802,250 UART: [art] Populate DV Done
2,810,523 UART: [fht] FMC Alias Private Key: 7
2,811,539 UART: [art] Derive CDI
2,811,819 UART: [art] Store in in slot 0x4
2,897,640 UART: [art] Derive Key Pair
2,898,000 UART: [art] Store priv key in slot 0x5
2,911,428 UART: [art] Derive Key Pair - Done
2,926,207 UART: [art] Signing Cert with AUTHO
2,926,687 UART: RITY.KEYID = 7
2,941,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,450 UART: [art] PUB.X = 4236E370DADF8C97EE26D80A3979CF105721EF2EC8CDCE52099A7805B1FDE47C70BE718D776D1555D87D32664961C623
2,949,215 UART: [art] PUB.Y = C08DF4BBB4B416CF6528D2DA63194838259BF94967D85A10116A1FE3C86E699D4E59CAEE6701A472BFB2D926EA5E1546
2,956,170 UART: [art] SIG.R = B06B96BF26FB45DC36449EEA9AD19CDAF6FFB4B39448869E4940D983BBBF21BEEA6385590A0F8AF92552498F89EE97AB
2,962,952 UART: [art] SIG.S = 03EC8F64BFD462117627614CB1DC53C6BDCD4A952E788C6A87783F318F9F1FBBADB1F76EA7CC44229561C4F6FF6BB439
2,986,892 UART: Caliptra RT
2,987,237 UART: [state] CFI Enabled
3,094,929 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,561 >>> mbox cmd response: success
2,679,165 UART:
2,679,181 UART: Running Caliptra FMC ...
2,679,589 UART:
2,679,732 UART: [state] CFI Enabled
2,690,725 UART: [fht] FMC Alias Private Key: 7
2,799,316 UART: [art] Extend RT PCRs Done
2,799,744 UART: [art] Lock RT PCRs Done
2,801,300 UART: [art] Populate DV Done
2,809,721 UART: [fht] FMC Alias Private Key: 7
2,810,669 UART: [art] Derive CDI
2,810,949 UART: [art] Store in in slot 0x4
2,896,756 UART: [art] Derive Key Pair
2,897,116 UART: [art] Store priv key in slot 0x5
2,910,448 UART: [art] Derive Key Pair - Done
2,925,049 UART: [art] Signing Cert with AUTHO
2,925,529 UART: RITY.KEYID = 7
2,940,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,682 UART: [art] PUB.X = 5CC5668301904FC06E20235A87EC6CCBF66E7965EFA59362C3C71AE5FC16B8ED9B3717E6CEFCEF2AD196C914D65EE886
2,948,465 UART: [art] PUB.Y = D6ADFF591A776EAFF9486260BD3214A374BF6AD662FB454252D081C8CEF2EA90F56897C60E8B94B7354B412745EF404E
2,955,420 UART: [art] SIG.R = B100FF183E92ACB5935D401E9CEB3FE46B28BC7324ACC064A34A54BDE46B5105BE36AF0BEC22BA24552556340B902B23
2,962,171 UART: [art] SIG.S = F7DE043BA43B4374C43F9E7459F58B79B709D302777B28E11C836834C1515112DF28073F96CB2F3A3F0CF96420766B0A
2,986,224 UART: Caliptra RT
2,986,569 UART: [state] CFI Enabled
3,094,549 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.46s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,013,009 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:58:51 2025 GMT
Not After : Jun 2 10:58:51 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:3b:f9:ba:c3:b7:5b:c1:8c:dc:e1:8f:13:87:
19:9e:0a:d9:03:70:8f:0d:52:b3:11:3a:be:5c:4d:
97:54:e4:e4:8d:ea:f7:72:3e:f6:52:83:50:dd:2d:
1c:66:c4:84:11:a1:99:71:94:9e:51:0b:da:3f:75:
22:21:d2:e9:ae:6b:5d:2c:d2:4d:cf:41:5b:a8:58:
47:28:02:02:18:0c:fd:cb:cb:6a:57:c7:0b:10:8b:
1a:06:50:21:06:73:04:29:34:6b:14:22:2f:db:7c:
ab:bf:78:cb:4e:05:53:91:a3:1a:c7:b6:b8:bd:bf:
1a:ec:e9:97:2c:43:ad:0b:9c:ca:50:27:34:f2:fe:
bd:c3:28:5d:1e:9c:c6:93:87:50:7b:5e:4b:e1:d9:
b7:83:25:2b:04:f8:39:75:7e:cf:10:fc:b1:82:df:
87:8a:35:86:f0:4b:9b:4d:71:5b:cf:52:b5:43:00:
49:b9:e8:75:cb:a4:25:7b:45:09:c4:a7:49:c1:1c:
d1:6e:f6:a9:64:b4:1b:4e:07:ab:ac:62:05:a8:31:
26:ba:e4:24:d8:20:86:4c:cd:5c:10:ed:53:68:f8:
a0:c8:f0:7e:40:3e:8a:51:ab:f4:c9:15:2a:16:6c:
f8:aa:9f:3d:a9:4f:2d:71:8d:ca:90:b7:ca:48:81:
dc:61
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
47:eb:ff:2e:e9:44:11:89:4a:b1:65:a4:fe:9f:e7:5a:ed:7c:
22:51:59:f0:0d:aa:f7:8f:76:f7:be:4f:9b:03:de:cd:b7:36:
c7:bd:2e:2a:c3:c5:cd:15:98:a4:3c:e3:88:f0:fb:9f:03:20:
1d:5b:fb:6c:b3:53:6b:ce:38:65:37:93:96:6b:b9:2d:7f:80:
5c:2f:54:a2:74:4a:ab:84:03:32:ab:d7:e2:9d:7f:32:53:df:
80:03:80:b0:06:f4:1f:c5:99:19:c5:4f:61:a5:84:11:cc:41:
03:45:2b:dc:db:08:19:05:1d:92:eb:64:ee:aa:e8:e6:35:99:
9a:4b:41:a5:f4:5d:05:9e:6e:f4:91:9a:13:44:2f:ca:62:81:
16:c2:4c:71:ea:8a:5e:58:80:b9:a6:5d:78:d4:af:df:27:b1:
f6:90:24:f1:47:76:16:7f:82:de:b7:05:45:23:92:72:ad:05:
40:07:32:c3:d6:03:fc:72:52:03:9b:16:31:c7:cb:a3:5e:46:
e4:57:96:a3:d4:7a:b9:4d:b6:c6:e1:3a:cd:5d:2f:c4:cb:71:
c9:07:af:4a:cb:85:14:b8:e5:c5:cb:8f:53:a8:39:8e:3e:2c:
2f:15:cd:33:6b:90:e9:ae:2f:06:9b:15:33:c2:86:e6:8f:91:
da:07:7e:74
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:58:52 2025 GMT
Not After : May 4 10:58:52 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:1f:58:5f:41:76:24:6f:61:4f:d3:8b:80:58:f6:7c:b5:25:
9d:16:0f:15:2a:89:37:62:9b:84:aa:1f:bf:6c:49:f4:2b:59:
8d:0e:06:a3:84:e4:72:b7:00:60:43:0d:93:ed:72:fe:73:ce:
8e:75:9c:c2:ed:4f:bd:18:94:b0:d9:75:30:ed:69:86:c3:67:
90:92:4d:7a:68:5d:87:e7:0d:7b:e2:9a:1a:8d:32:75:67:91:
5e:46:c0:f6:1d:e8:a9:f0:d7:70:9a:38:ae:48:8d:6c:36:ae:
70:de:5b:0f:98:ed:fe:dd:fe:aa:41:41:8d:cc:75:0a:9e:e7:
ee:44:11:d2:05:69:d2:65:94:a4:fc:07:6e:37:34:c8:50:65:
48:8a:b3:c8:84:c9:d9:d8:3f:df:7c:be:88:46:6f:cb:a8:74:
d8:a9:4f:c2:83:26:2e:23:0f:61:d3:b2:0b:c9:e4:2e:58:c4:
8d:bc:b1:94:8b:ed:35:09:5e:6c:f2:c7:60:86:70:1b:34:02:
17:b4:51:f7:22:8e:c1:1c:be:3d:77:5f:b6:df:eb:df:dc:99:
62:e1:dc:b5:16:6f:15:3b:c9:88:ca:51:9f:e0:f1:e6:15:1b:
63:a7:33:a1:6a:80:7c:7b:65:64:64:86:a3:37:93:99:d1:22:
46:8d:8c:cf
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.41s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
26,488,096 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:56:15 2025 GMT
Not After : Jun 2 11:56:15 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8a:08:17:e8:f4:4f:bd:5b:c9:19:fe:62:8d:9a:
fe:7c:e7:4c:7b:46:ff:4b:a5:38:69:a1:08:1d:8c:
fe:cd:87:3f:bc:f7:45:53:99:f5:d1:e5:a5:8a:bf:
1b:db:77:28:7a:1d:49:1d:a9:f9:39:9c:38:37:a1:
8a:7a:6f:58:e6:16:21:94:b3:76:40:76:f5:bf:76:
b0:36:9d:fe:08:98:8e:53:44:46:de:b1:a2:1c:62:
88:1d:c1:d5:bc:f3:eb:fa:f3:8f:73:31:2c:17:3a:
60:d9:3b:e4:8a:3e:11:5d:ce:ea:03:a9:42:cb:ce:
34:f5:14:c3:d2:1d:1c:5c:61:04:fa:28:38:69:b6:
b4:89:97:39:e2:1b:f7:64:df:0f:15:25:a6:45:f1:
a3:13:e7:6c:3f:a7:3a:11:92:12:d5:75:5f:be:e9:
18:f8:c7:ba:02:38:48:d8:1f:01:88:a5:83:92:91:
26:04:8a:f1:61:91:aa:e1:65:74:e1:ca:fe:0b:a7:
78:2d:e9:71:5c:c3:f3:d7:b1:15:fa:7b:91:e5:1e:
c7:30:61:42:a6:fa:13:50:60:42:cd:ee:8a:9d:dd:
72:84:b3:74:bc:b1:98:5a:33:1c:d9:64:77:cb:c5:
52:d0:82:0c:d0:8a:ac:a2:f3:37:19:c4:85:27:78:
8d:27
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:66:62:1c:ac:00:bf:f1:a6:2e:89:6c:a2:9e:9e:91:58:eb:
6f:5e:55:04:f6:f7:6e:0f:74:82:c4:7c:0a:ef:83:81:b5:2f:
3c:99:e2:14:8a:b3:ba:cd:eb:30:88:1b:bb:86:b7:81:89:2c:
a3:e3:97:7a:ec:40:c8:41:5e:b8:83:24:78:66:27:2e:38:af:
5d:0b:70:68:c5:b2:35:80:45:d6:66:0d:26:d3:8d:af:90:68:
4e:7b:97:eb:80:52:9a:7a:f0:91:99:27:62:4f:fe:d3:e4:26:
80:1c:f0:6c:53:89:e6:f3:f4:f5:c5:95:ec:6c:d4:65:ad:18:
4d:4b:e5:1d:40:d6:58:57:e4:55:a0:3e:9c:25:e4:b7:29:ce:
f2:41:14:cc:b5:2e:86:01:85:d9:4c:2f:dc:17:d2:53:24:2c:
52:4b:59:df:32:81:b2:71:85:8a:7e:33:0f:35:c5:02:ef:d2:
fa:79:31:f2:48:0d:d8:f9:88:e6:2d:47:d3:e6:0f:33:49:8b:
07:9e:43:09:19:b2:1c:d2:f3:66:45:c1:f7:76:ed:a8:35:47:
45:3a:d4:7c:bc:b8:d5:3c:43:c0:c1:f1:8e:4b:80:f1:64:97:
60:d6:47:3f:86:53:af:fc:1e:05:f6:74:fe:f9:27:5e:ea:fc:
34:6a:30:22
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:56:17 2025 GMT
Not After : May 4 11:56:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:6f:01:85:b1:19:16:ad:85:01:f3:9f:1e:9c:4d:7c:39:5a:
fc:3b:a4:f5:a9:c6:4d:34:e4:45:9e:d9:7c:59:d5:35:dc:97:
71:d5:6c:5c:be:a6:bb:d7:b5:17:a6:fc:1e:86:a0:62:e8:c2:
75:bf:71:8a:ac:57:ae:92:c2:65:e0:bc:37:57:c0:10:3d:6f:
0a:b3:6b:45:30:a3:32:96:2a:dc:08:9b:fc:e4:0d:36:5d:f1:
6d:c9:e7:cb:fe:3f:b4:38:7f:60:3a:e7:a4:65:8d:e8:3f:b1:
89:01:13:30:3d:0e:25:44:ff:e4:3e:08:78:45:ef:32:66:05:
49:6e:26:67:c8:3b:c7:5e:94:82:77:72:27:7c:8a:09:7d:f3:
d2:4c:b2:4f:7b:16:19:d6:83:2d:d5:39:a1:b7:52:46:4b:48:
f8:2f:3d:cd:d9:ab:76:cf:df:1e:7d:68:c9:55:34:ed:61:82:
11:dd:52:70:46:ff:ae:35:82:e7:64:de:19:6c:49:5d:2d:81:
f5:a3:0e:09:ee:35:81:72:eb:02:58:53:87:ab:86:e7:2f:99:
b2:58:b7:b3:f6:d5:ad:47:42:b9:22:bb:9e:4b:fe:cb:5b:d0:
85:0c:74:94:a7:62:fc:c1:f5:a9:e1:f0:75:7a:24:b5:f8:e7:
05:c9:c2:fe
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.29s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,115,361 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:55:46 2025 GMT
Not After : Jun 2 11:55:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8a:0c:80:20:64:d9:34:4e:e2:90:ff:58:2e:0a:
7e:e0:7b:af:f2:05:fd:78:a7:2c:89:24:f6:19:2e:
76:a9:0f:31:05:14:ec:96:6d:1d:21:a0:ef:a2:31:
8d:1b:10:51:55:a6:97:4e:83:6b:cb:0d:f0:af:27:
88:ed:26:eb:31:db:64:6f:57:fc:f4:6c:0f:ad:7c:
07:3a:c9:51:46:3f:b7:5a:32:63:f6:9d:a9:0a:89:
0a:ee:5a:26:97:57:b3:a4:6c:a7:93:d5:14:1f:c6:
ae:7f:a6:7b:6f:88:3c:26:41:66:84:f8:ae:8d:8e:
93:ad:a4:8e:14:6f:ea:5d:f7:af:7d:6c:3e:af:22:
12:42:72:8d:4b:7f:54:a9:96:68:4f:27:4f:e3:4d:
c4:c5:b3:2d:30:f5:88:17:98:b5:99:90:f3:c2:cb:
1c:b4:43:2b:7c:97:a9:fb:0d:ae:30:84:ac:22:35:
c6:6f:34:76:b8:4a:c2:4c:19:df:d7:e5:04:03:6e:
94:93:1e:87:7a:d1:33:48:d7:23:e5:96:17:de:3c:
75:2d:b6:56:9f:6e:2c:cb:a9:af:46:2c:fb:52:03:
59:da:3a:b1:fd:01:d4:97:b3:3d:19:1e:72:64:fc:
91:a9:71:8d:d1:46:6f:bd:37:92:8d:9e:db:b9:cc:
4d:79
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6b:1c:6e:f6:16:75:22:c1:56:38:53:c4:6c:10:e0:12:c7:ec:
56:75:d6:9b:be:b3:ac:7c:b8:3d:8a:48:08:b9:06:95:18:b6:
49:6e:ac:c6:85:43:c8:a6:59:b2:cc:1b:ba:4e:51:71:a9:4c:
77:8b:bc:a6:42:87:df:d7:7b:26:7f:a6:a5:7c:a2:e4:26:67:
ed:c0:0a:f1:28:54:41:82:34:20:26:13:ce:98:d8:43:f8:1e:
5e:1f:b3:db:4f:54:1a:48:82:7c:0d:e9:32:bf:20:9c:ce:01:
30:b4:fb:cd:87:55:2d:58:cc:98:ad:b3:9a:de:90:46:03:78:
53:b0:61:2f:f1:d9:c4:22:ca:6f:d0:63:9a:d1:5d:5c:6b:8c:
10:68:89:d7:40:81:1b:ba:23:16:ac:d3:9b:3a:fb:bf:0c:a3:
b5:f6:db:97:40:d5:bb:55:78:cc:88:55:36:93:69:e6:2f:84:
30:1b:00:75:aa:cb:c2:50:4f:e7:03:0b:72:82:ff:fd:67:ef:
a6:d8:93:c2:bd:97:25:85:c0:30:74:84:a5:0c:4b:fc:4b:40:
9f:0a:ea:93:b3:40:78:5b:0f:a2:69:c0:f2:70:08:27:d2:c0:
7b:94:47:f3:a0:df:4b:a9:1a:c4:ac:34:5d:cc:71:1e:e3:eb:
4a:a0:0c:ca
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:55:47 2025 GMT
Not After : May 4 11:55:47 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2b:bc:95:55:ba:21:ba:64:9c:16:9e:53:4a:31:e3:fd:02:b5:
df:62:c7:fa:ec:df:54:30:2d:7b:d7:da:f4:73:90:cb:52:b0:
6c:83:80:fd:be:1d:65:4c:c0:ca:24:bc:1c:d9:1a:97:45:6c:
1e:0e:79:96:6d:1f:51:36:a5:92:42:12:29:62:fb:63:7d:eb:
7c:92:aa:f0:28:08:16:40:5b:e4:96:49:6b:bd:55:72:d1:aa:
2f:db:d5:ef:9e:8e:e7:3e:5e:38:db:bb:a7:30:fd:8d:6f:51:
82:5d:8a:6e:fe:a2:90:49:78:30:68:84:b0:a7:70:a6:10:5d:
bb:56:f8:60:87:09:5e:f5:fe:d7:d9:f9:ae:04:08:7c:cb:44:
34:04:ef:b8:d3:49:98:ec:dc:27:be:26:39:e5:ae:ab:0d:b6:
27:df:b0:c4:e2:9b:7e:cc:f1:cd:d2:01:90:0a:3f:93:f9:ee:
5c:03:37:18:0e:86:26:7a:e8:80:c0:00:a7:14:ac:e3:a6:cd:
ae:ea:1a:89:8f:2b:8f:0e:60:92:19:cb:3e:a9:f4:11:7e:b0:
13:58:d7:8e:21:3c:1f:59:8a:ad:fc:09:be:55:07:33:e0:93:
c0:db:5d:1b:8b:f3:ae:8a:61:4a:76:79:4d:79:5d:ee:1a:a2:
cd:a8:7d:9c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.10s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
26,635,799 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:59:17 2025 GMT
Not After : Jun 2 10:59:17 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:88:f7:c7:46:ad:8d:23:b7:7b:65:0a:9b:68:49:
5c:86:cb:c1:9a:e7:fa:f0:77:49:77:80:13:0a:32:
9f:ea:55:f2:41:76:0b:fb:0e:c3:aa:42:39:ea:ad:
2b:eb:58:38:6b:9b:97:5b:c4:b5:7f:95:a2:76:95:
e4:34:f8:8a:ee:a4:e5:e5:82:7a:69:2e:0b:de:8c:
0f:a0:70:2c:b4:6d:f6:24:fa:37:af:48:41:d7:46:
c4:13:0b:5b:c8:0f:1b:36:23:f9:38:c2:f4:fc:0e:
48:a1:a0:75:13:ad:e2:62:c5:1b:9c:1f:73:aa:14:
dc:eb:70:49:3c:f4:4b:e4:9d:8d:74:51:5f:6f:de:
5e:10:21:e1:de:a7:8e:b4:57:01:32:91:78:f9:53:
79:2f:a3:51:2e:44:e7:72:26:0b:38:70:13:73:02:
1d:47:0c:a4:5e:d1:79:70:00:50:b7:05:c7:0b:87:
57:fc:3a:1f:1c:47:6b:13:a7:b3:51:b0:b2:a1:62:
80:e0:03:13:8a:fd:0d:30:33:ce:49:3f:7b:04:38:
56:f5:4c:40:cc:eb:7b:c4:b6:67:59:bf:25:18:b2:
76:7e:fc:b5:ee:2f:35:d1:53:31:7f:a5:bc:56:3d:
4c:5f:c9:c9:b6:65:7d:01:76:a9:33:99:0e:4e:f8:
8c:2f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
86:28:ec:2f:40:ce:c1:11:6f:c5:50:78:e3:3b:11:d5:c8:f5:
ab:f4:09:32:90:a4:9f:f3:09:54:a5:c9:2b:ba:55:a2:3d:fa:
71:73:be:1c:43:60:d2:e7:22:64:24:ae:07:76:bb:21:0d:ac:
5c:df:47:04:b7:9d:f3:74:ff:b5:7e:79:72:e3:ff:3c:cc:08:
a9:f6:ba:a0:9a:05:fc:83:b4:04:e4:7a:d3:a7:69:92:ea:05:
fd:44:20:83:14:52:a5:ca:f7:88:64:f8:8c:73:0d:62:c8:f6:
1e:5a:6b:6c:af:7d:3f:1e:32:bc:ed:95:f5:38:44:06:a0:37:
0d:4f:aa:ff:87:52:ff:56:a3:1c:d1:e1:50:99:52:4f:c3:df:
09:56:8a:c0:82:a1:89:a9:d6:6e:99:e6:50:70:25:b6:df:0b:
a7:e4:b7:22:fe:b9:d1:7a:8d:54:88:37:79:aa:98:50:28:4f:
26:ba:e7:66:21:6a:a5:a4:bd:42:f6:7c:b9:f9:ab:e6:d6:ae:
60:8c:22:26:2e:6f:83:2f:6b:6a:88:e3:3a:0d:a3:eb:ba:66:
f6:ee:1e:f9:9c:98:da:40:d7:91:4d:f1:24:19:49:82:f4:c1:
c4:c5:f2:5d:b2:75:b3:d8:7f:d4:d9:34:af:fc:be:30:1d:ea:
33:6a:99:08
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:59:18 2025 GMT
Not After : May 4 10:59:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:12:c6:62:63:44:67:34:5c:e4:06:63:76:62:99:88:95:6c:
e2:0d:7d:c8:18:8f:67:63:79:7a:d0:ce:e5:77:f9:5d:1a:9b:
e6:cb:e7:4d:60:26:36:29:b0:78:c5:4a:f8:41:d3:1e:d4:1e:
7d:e3:f8:7f:6e:18:88:a0:d1:08:41:04:cd:0d:46:bb:9f:f9:
86:d8:c5:df:e3:2f:ec:46:32:d0:e6:db:e1:fe:29:61:09:b3:
5c:25:3f:8f:b3:0a:54:04:ce:51:be:06:bb:f8:fc:03:e1:0d:
87:39:2b:a8:9f:19:79:49:26:88:57:8a:a4:16:97:01:a3:b1:
3c:39:d4:0d:3a:11:50:40:f2:54:f5:d2:f7:bb:63:26:6c:87:
ce:ef:a6:1a:ab:cb:97:81:47:a5:89:84:cc:ad:5b:c0:d1:e8:
81:0e:4d:46:75:4a:64:f9:d5:21:27:c9:15:37:40:08:9a:65:
e9:11:34:e4:3c:76:4c:76:c6:61:42:5e:cd:5f:2c:00:59:6e:
d1:ed:72:08:0b:9b:54:35:76:67:fa:67:05:16:27:b3:c0:72:
89:cd:7d:8b:9a:19:7d:9f:27:ca:bd:8b:18:30:f2:3d:d6:3e:
45:8a:84:d6:af:40:1b:b6:ca:f8:68:66:56:29:f3:e5:49:a2:
52:4b:df:b8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,718,389 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:55 2025 GMT
Not After : Jun 2 13:31:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:2c:87:21:be:37:4f:53:9c:21:73:2c:80:20:
c2:ae:18:55:ec:00:b0:ee:dd:39:c3:73:83:5c:ec:
eb:dc:cf:69:6d:a7:5a:0c:4e:0e:6f:ef:0d:47:75:
a9:0c:a7:ca:8c:c7:ad:e6:79:77:71:73:99:0e:f2:
46:2a:75:63:4f:06:b6:ed:b4:e0:21:10:04:7d:eb:
40:33:77:44:df:03:2a:90:65:ed:4e:bb:36:95:f6:
1d:9d:e7:b9:57:ff:b9:00:62:f8:19:e4:80:27:68:
6a:2a:08:5b:e8:31:f9:60:56:32:23:7e:96:b8:35:
6a:7b:64:fd:d2:ca:52:08:a8:47:a9:1c:37:1f:0f:
59:55:8f:6b:68:68:87:97:e3:8a:96:d1:a7:51:46:
16:7f:a2:9d:cd:6a:48:e1:18:b6:c0:4a:75:4d:34:
30:d1:bb:61:0b:71:ba:5a:8b:f2:b3:a8:15:03:b0:
92:bf:87:b5:5a:89:16:9a:1d:c3:90:84:e2:a1:55:
fc:aa:69:27:cf:6f:c8:5f:ee:49:9f:48:c3:bf:79:
d6:ff:88:a0:d2:ee:6e:28:97:bb:eb:58:14:fd:f5:
57:7a:0c:17:1b:c4:30:a5:1f:52:4f:af:44:10:18:
e3:53:05:40:9d:59:f8:f0:ca:80:f5:aa:5a:88:08:
b5:e5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
78:d3:21:1d:ae:bd:d4:93:d9:09:49:96:9f:33:5c:2d:70:8a:
f2:0b:9d:72:96:69:de:23:c6:0c:cd:cf:37:b7:fc:a9:e1:4c:
c0:55:d5:6a:cb:dd:26:4f:54:5e:6e:2b:56:8b:40:14:53:b8:
7b:ab:a1:df:3a:90:12:e4:b8:9f:7f:d2:0d:14:72:7a:49:62:
91:3d:9d:86:37:c8:39:8b:54:09:88:ec:8d:90:72:f2:39:a8:
a8:58:1e:10:28:92:ee:30:9b:b2:97:12:44:4e:35:48:ad:30:
07:df:33:f2:a1:a9:e8:20:93:61:fb:5a:76:73:5a:c8:e0:5f:
a1:da:fa:5f:a0:b8:41:c8:cf:bc:00:18:b5:2b:de:99:71:56:
68:39:92:47:17:54:01:de:e3:df:85:4e:f9:f5:f8:4f:91:7d:
27:a5:bb:4f:a2:b1:a6:2d:f2:0c:50:b3:a7:1c:a2:c7:9f:c0:
2b:2b:04:5a:1e:44:d6:0c:5f:19:d2:85:f3:ca:3c:18:e2:6a:
35:22:b2:46:9f:71:6f:00:39:b4:21:06:13:a9:1c:53:bf:b4:
e0:2a:30:05:4e:ab:e7:c7:92:b2:28:bb:f6:5e:c5:52:ff:b4:
6c:9c:3d:10:99:99:fd:d4:73:4e:0e:28:db:d4:a3:4f:8b:b2:
44:bd:53:e5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:56 2025 GMT
Not After : May 4 13:31:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:6e:2a:69:7d:d2:59:dd:16:49:71:70:98:72:c3:e1:6e:51:
2f:16:ce:e2:44:a8:ca:0a:02:fd:ba:bd:a2:59:2e:51:bc:fc:
80:07:c1:7a:36:0e:6a:cf:3d:69:0f:87:31:25:8f:15:f1:f5:
a0:ec:5f:d4:cb:ad:c7:85:0e:9d:d9:23:1c:f8:09:4f:42:22:
50:9f:6d:c2:56:f6:24:36:3e:ec:50:0f:51:97:fd:49:3e:7f:
a0:64:0a:ce:3c:d1:60:40:50:a6:9d:c8:c9:f6:53:fe:0e:09:
f6:7e:69:1a:bc:17:66:e7:6f:3d:97:a7:de:51:b9:85:0a:7b:
45:82:72:92:67:f7:fb:4c:da:5e:57:95:fb:42:e0:93:49:1a:
a5:cc:31:cf:6c:b2:12:8f:6d:1e:cd:96:40:c8:4f:06:15:48:
3b:df:ab:b0:57:d6:a8:a8:a1:47:fc:22:5e:5f:10:27:dd:32:
90:a9:fd:28:d8:4b:7d:03:05:7d:d1:8a:bc:39:72:2f:ff:46:
a5:ec:47:30:e8:57:bb:84:ae:12:92:dd:42:85:88:b6:7b:5b:
ff:bb:0a:b2:d4:01:ab:67:e5:42:ee:7a:34:00:5d:a0:63:d1:
8d:5e:f7:f8:47:c9:73:69:f5:27:b6:a0:51:1e:c4:ee:9b:3a:
ae:27:02:1d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.61s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,263,626 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:17:29 2025 GMT
Not After : Jun 2 14:17:29 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e6:33:58:08:a8:ce:06:26:a8:80:1c:99:40:2e:
ee:0b:6d:63:74:b0:b5:97:53:82:d9:22:e4:af:43:
cf:b6:3e:e4:a5:57:94:e4:46:2d:ac:70:4d:95:80:
b9:1f:67:9b:1b:ea:73:4a:83:15:65:f8:6a:d0:3e:
c8:b0:8f:1f:9a:8f:fc:6d:e9:b2:9c:09:53:63:1c:
ba:b4:21:9d:e6:ee:3c:46:4c:fc:5c:31:a6:ff:30:
00:9a:3f:67:ac:c3:97:68:2b:7e:0a:89:f0:53:8b:
16:cb:7d:1f:6b:29:75:91:0e:3e:2c:42:82:92:0c:
75:ea:b3:37:62:ae:54:b9:ed:ec:34:b1:54:42:a8:
04:98:9a:7b:fa:e3:2f:79:05:86:d1:51:5e:47:42:
20:5f:4e:8d:3e:3f:a7:4c:ce:78:71:03:b1:ba:86:
4e:34:b0:a4:9c:56:93:20:c7:15:0c:09:a6:53:fd:
1c:ea:01:88:83:27:1f:93:39:a8:65:bd:7f:a7:d4:
ef:33:16:c6:9b:91:e4:20:ed:ee:34:59:f8:23:f9:
c6:e6:30:49:90:fc:a8:6e:be:17:b9:7c:2b:1f:a6:
aa:ac:6c:c3:56:78:4e:21:20:69:25:da:bc:30:32:
18:f0:4f:ab:dd:7b:02:d5:f8:68:58:00:c8:c6:65:
fb:a9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:91:16:cd:c4:aa:68:80:a2:8f:97:65:f8:78:3b:cd:66:53:
43:53:88:75:77:4d:ad:e8:e8:7b:99:8d:b0:f7:ac:1d:78:c1:
b4:d4:b7:0e:3d:5d:1d:e9:e9:10:89:4a:c0:1a:c2:d9:2e:87:
f7:18:05:3c:3f:e1:a2:37:e7:4a:b1:be:65:85:95:1b:cb:b2:
4b:8f:57:36:0c:4b:9b:43:13:e9:32:61:2d:d1:94:65:b2:f3:
dc:50:d5:40:40:6f:e0:52:7f:04:2a:21:f7:0d:26:80:e7:66:
9e:50:9e:7d:8b:67:0d:a1:a3:f6:d7:e2:48:63:11:4c:9d:a8:
13:53:91:c6:92:29:f8:de:40:b3:08:06:03:02:10:df:c9:15:
80:88:1f:b5:44:21:72:39:b2:15:af:dc:81:86:28:60:ea:04:
02:ac:65:a6:b1:87:12:6b:f0:06:91:8c:07:4f:0d:34:79:da:
37:ec:8d:48:76:dc:1a:9d:16:10:78:52:55:36:22:1e:38:1a:
a0:7d:9a:bd:aa:5b:1c:a9:91:b0:c7:9f:93:6b:78:c6:15:0f:
3f:0a:06:15:e6:21:07:b8:b6:46:5f:09:fd:cf:4b:9a:41:2c:
d9:dc:b0:29:46:95:a4:0b:d2:86:ed:4b:a5:f0:d9:c5:18:3e:
a5:05:b9:42
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:17:29 2025 GMT
Not After : May 4 14:17:29 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
85:6f:34:83:a9:9a:0a:bc:0a:1b:68:db:e6:07:5f:27:7e:92:
4b:c3:f0:6b:b5:e0:ba:12:f6:81:11:3e:9d:7b:e9:c9:b7:b9:
b3:28:ca:f3:2d:32:89:3d:c9:64:8f:43:ee:9f:30:74:34:cd:
2c:52:69:9b:ba:77:da:2a:4f:dc:ef:8c:b2:0b:3a:5f:43:28:
5b:db:92:ce:aa:88:31:00:a0:bd:35:5a:57:39:ac:16:f9:c6:
66:cd:c7:65:55:d2:39:c7:e3:87:b6:ab:f3:a1:f8:3e:66:7a:
a6:a6:00:ca:7a:5b:fc:0a:26:e4:43:df:75:3b:f3:34:cb:a0:
3a:3e:ff:b7:79:e0:d3:39:5d:6c:10:5b:51:b3:f1:6a:ac:c5:
6f:c6:9a:61:fb:2e:e0:ec:e9:64:ef:e9:41:94:23:2c:87:af:
28:0a:d8:e1:4b:22:ee:64:d1:e7:ee:29:49:83:61:9f:97:76:
78:3c:d0:37:74:f4:a3:b9:14:2e:0f:d6:78:5d:9a:28:95:d4:
07:02:43:b6:19:3c:de:11:c3:50:2c:4e:47:a7:1a:46:3e:32:
1e:91:46:d1:05:b0:b0:a8:1c:00:8d:b1:13:37:5d:0b:bd:6f:
e4:9e:88:15:c7:1e:62:e1:6b:e7:a0:1e:a5:60:af:49:65:0d:
7c:83:8b:cd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,909,549 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:09 2025 GMT
Not After : Jun 2 15:05:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:6c:de:75:d7:2a:64:02:c6:7c:f5:4c:11:d6:
80:bc:49:12:10:8b:5c:5f:f8:11:37:45:6f:47:82:
1c:10:a5:11:fd:5c:52:4e:5d:59:f3:d5:24:5a:e5:
01:7f:4a:84:b5:3d:80:e8:3c:d2:72:b3:e4:b4:81:
b9:39:76:a1:ea:c0:a6:60:5d:db:e8:19:07:bc:fd:
f0:1d:ba:5b:b2:78:e6:6b:c0:7b:70:10:f5:3a:5d:
a3:6a:cb:9d:b2:b7:b3:fb:5a:39:e2:1c:53:b6:9b:
f4:7b:16:8a:3c:ac:44:3b:35:50:33:07:fd:01:ae:
40:28:78:73:d5:be:7b:6f:ba:aa:fe:b5:4d:48:eb:
0d:0b:a0:fc:74:c3:b2:36:c1:0c:70:dd:2d:6a:bc:
e6:2e:4d:36:52:18:f2:ee:d9:ad:b3:21:c7:52:32:
ee:75:e1:f7:96:50:b0:00:17:e2:9b:0d:7a:6c:2f:
8e:53:97:fa:e7:19:d3:94:cb:bf:47:07:42:48:2c:
6f:20:23:fe:e6:91:65:ae:e1:7a:5c:d1:69:df:52:
e2:36:55:b6:69:2b:6c:01:c8:eb:4a:32:25:7e:6c:
4f:01:ba:fe:dd:6f:7c:ce:aa:16:8d:26:56:f4:8c:
02:e4:74:eb:02:a4:82:61:c2:a8:96:82:c4:ca:24:
11:09
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:c9:55:aa:26:34:1e:59:70:54:92:2b:c1:fa:a2:70:5e:e8:
0e:02:fc:2a:9d:d2:14:91:b4:9a:27:e9:85:fe:72:e0:78:5c:
d8:9f:7d:b2:ab:6d:51:f6:6e:f6:20:ba:4d:81:9b:11:8d:97:
66:e1:0d:9b:49:bc:a0:55:9e:f4:53:18:58:fd:4f:8c:4f:bd:
e6:9c:62:cb:26:7f:f7:c2:05:69:3f:e0:a5:16:cb:b7:69:0a:
77:9b:a4:2f:5e:10:d1:5b:fd:3e:e3:49:37:a7:49:fc:ba:05:
77:4b:74:08:ad:50:9c:93:b2:b7:d4:58:3c:f0:10:db:f6:24:
44:19:45:c3:80:7a:bf:e9:06:84:9e:ed:70:1d:f8:58:04:e2:
6e:7f:3e:cc:75:a2:47:74:d2:23:df:68:36:20:03:5c:18:2b:
50:18:b1:dc:fb:25:f9:68:5e:46:5f:37:e1:6c:23:af:53:28:
1d:ec:69:40:73:df:f2:09:e0:84:4a:e5:ff:8f:9c:bb:4b:7d:
ad:63:b2:c4:82:6b:aa:63:51:f6:8f:bb:cc:db:fc:2b:c6:01:
b5:68:45:7c:58:7a:9b:ad:19:ac:54:df:a4:c0:8f:53:96:b5:
85:83:50:e7:21:5c:bb:c7:f0:6a:24:fa:f0:bf:64:13:54:7c:
02:cd:9b:9d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:09 2025 GMT
Not After : May 4 15:05:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:1f:2c:88:5d:17:b9:eb:f3:c4:45:71:9b:8b:7c:69:23:7c:
b3:ca:af:46:42:f4:79:64:ca:88:a9:cd:24:d3:47:85:14:9e:
b6:06:dc:59:f5:96:bf:59:50:f8:63:3d:54:e6:85:55:27:59:
56:20:4d:ee:41:59:24:a3:ba:2c:1d:95:c1:d6:be:84:14:b8:
03:e5:a1:29:14:b6:c8:00:d2:f9:0d:1f:db:a5:71:62:7f:3f:
7a:91:b6:4c:51:0f:d1:a9:b9:e7:54:68:d3:6a:70:73:6c:50:
ea:d0:2a:2d:df:1d:31:85:58:b9:17:c9:98:2f:67:dd:85:74:
0e:fb:44:8c:ee:0c:7d:d6:e3:b9:5d:53:e4:00:5d:d8:0c:a1:
10:e4:04:fa:2b:5b:d2:8a:c1:7e:8d:01:18:df:27:f8:72:4d:
bb:80:c4:bb:a5:58:20:76:9d:e1:e7:dc:87:a1:d2:96:eb:e5:
94:92:cd:62:f8:48:65:ef:77:73:8f:7b:19:17:05:2f:45:ed:
7d:0f:2d:8d:6a:37:11:93:5c:0c:8a:07:d6:d3:3e:25:3e:bb:
07:85:87:1b:5b:15:68:ed:a3:1c:55:b6:55:32:64:06:69:bf:
77:f5:43:6d:a3:8c:a4:18:10:63:14:4e:98:e2:76:5e:04:42:
42:d8:8e:10
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,395,008 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:10 2025 GMT
Not After : Jun 2 15:05:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:72:7a:90:83:c6:1a:53:9d:30:cc:50:68:2f:
04:ed:1d:f2:ba:88:b8:30:4d:0c:5f:72:6c:1c:dd:
15:23:04:e4:bf:82:bc:96:cf:17:dd:44:15:8f:8b:
2d:a7:75:1c:82:ae:1e:b2:37:4b:f5:fc:a9:84:ee:
f6:7d:27:b8:f8:22:cd:0f:3b:e5:d7:60:24:27:e0:
d3:db:78:3e:7b:d0:76:a5:79:2d:49:4b:97:8a:bb:
ef:64:81:aa:ed:d9:99:35:eb:5e:63:2b:f9:f8:a1:
49:90:e4:5d:ab:43:8f:24:87:bd:83:65:c0:b9:b8:
0a:7d:ed:7f:08:bc:d3:b4:46:4c:7d:b3:af:dd:4c:
5e:8c:15:26:73:e1:70:47:b6:1c:23:91:9b:3d:20:
44:a6:78:25:0f:3d:58:73:0e:39:a6:33:c0:70:4e:
ca:71:0d:e3:b1:3b:06:64:25:e9:02:68:4a:90:8a:
8d:fc:12:97:0f:9f:ca:33:6e:e2:16:e2:d2:dc:3b:
4f:8f:3a:3d:9a:f8:5e:0d:ad:de:17:46:52:00:d7:
6b:95:46:7e:74:02:0c:3e:d9:d5:a3:65:95:df:e3:
8f:d2:7f:72:dc:25:cf:8a:90:c3:61:c2:e4:34:a1:
e8:be:78:37:21:43:3d:dc:25:72:c9:6b:f2:ed:25:
d0:91
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6c:b7:3a:ad:56:b4:04:7e:89:61:70:b9:6d:e6:32:4c:d1:22:
4a:88:17:7b:fe:fe:62:66:b1:6e:0c:2c:3a:74:94:46:fc:2a:
e9:d9:b3:52:54:25:d9:1d:40:ce:9f:85:b9:93:6b:c5:d7:10:
9a:0b:7c:0f:51:f4:89:6c:92:bc:df:3d:6c:63:43:f6:02:ef:
f4:b2:c5:6a:a0:af:2f:f3:0e:98:27:87:c9:03:3c:19:fc:d5:
4c:b6:43:4e:e9:af:8c:49:2f:f6:e1:92:57:c3:e8:39:d4:36:
bf:76:ba:27:31:a2:09:7c:c0:a0:1b:ea:19:e7:f2:df:8e:75:
fc:b6:75:33:a0:a5:a7:85:c8:1f:59:5b:6f:57:3b:e5:a7:47:
0f:d7:7f:14:f3:97:c3:d6:81:05:ef:81:c8:bb:ef:31:61:99:
ef:1a:d5:ff:30:a0:d1:f0:c5:82:24:fe:b9:b9:49:4a:52:47:
58:3c:95:e9:5b:cc:96:92:f9:db:4a:bf:25:f6:90:d0:a4:68:
fc:ee:82:3f:2c:ba:bd:6a:2d:86:01:ee:b5:cb:70:a4:8b:91:
bc:0b:55:1f:93:31:c5:78:d7:08:81:8a:0b:a1:5a:d2:d1:e4:
d7:f6:b1:b7:d5:8f:1a:39:04:b4:03:06:b7:78:58:73:a1:79:
e3:e1:32:9e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:10 2025 GMT
Not After : May 4 15:05:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
57:07:18:b7:f3:89:48:cd:21:02:50:a9:d5:62:05:dc:f5:53:
a8:72:4e:0d:72:3f:e4:c4:08:35:90:2f:a0:6c:f8:55:53:03:
f7:ee:be:b2:98:89:41:d8:95:44:3a:10:17:9c:60:a4:fd:d4:
09:e7:ba:51:0d:a2:b5:98:e8:56:2e:aa:29:d4:71:c5:96:fb:
fd:4b:b7:18:4d:a7:4a:9f:24:78:bb:a3:6e:b0:bf:96:5b:d1:
bf:f6:12:df:f9:53:53:12:c9:6b:a5:78:eb:c4:4a:54:9d:80:
03:b8:32:8d:bb:78:dd:49:27:e1:71:ae:1a:87:bd:82:a5:43:
25:2d:95:bb:ff:95:29:cd:29:ca:7f:21:f7:8b:86:6e:e8:1a:
7c:88:b5:5e:47:d8:fa:b7:f3:04:dc:68:07:fa:45:39:76:b7:
a7:d8:44:29:09:a1:0c:36:6f:8d:5f:33:e4:4d:49:96:b4:5b:
f3:fc:2d:22:23:16:30:36:32:7e:b9:3c:91:8a:cb:0b:44:8d:
df:5c:70:0b:61:a8:14:8c:3f:9e:45:4c:a4:cd:7e:12:e3:cf:
a2:25:48:64:74:62:ec:8c:75:9f:af:ef:f2:29:27:1e:3f:b3:
75:30:d2:d5:f8:23:c6:0f:a7:ce:d4:de:6b:73:c5:0f:24:53:
30:15:39:45
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,738,319 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:41 2025 GMT
Not After : Jun 2 12:45:41 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a6:22:66:34:58:0e:16:65:d8:65:5f:86:65:2f:
54:46:4a:be:27:88:f5:4e:b6:5c:68:14:e8:93:c8:
18:db:1b:0f:ff:4c:bc:d0:16:7a:bf:11:9e:72:84:
e4:10:4b:a8:1e:d7:cd:7d:9d:ac:ee:08:a0:93:79:
da:cf:7b:14:98:65:c7:fe:66:2d:11:a7:bf:14:ef:
2d:e0:ae:8e:c1:34:0a:6b:4e:ab:a9:9d:cc:37:bb:
98:60:81:d9:cc:23:7e:4a:37:59:0b:cd:93:8e:f7:
a9:62:55:4f:42:6a:17:3b:a5:91:df:28:73:2f:42:
1a:48:4d:d8:1e:36:fa:6f:4f:b7:11:53:3f:ed:60:
a6:37:bc:d8:56:68:90:24:6d:57:4e:97:64:a9:8d:
a0:1e:86:23:86:95:66:24:22:22:d4:7b:e0:70:23:
cb:2f:db:5d:c4:3d:b9:f6:c3:6a:d6:32:0d:21:bc:
8e:ba:dd:69:64:b2:8d:9f:86:fc:64:13:df:1c:1f:
3f:36:5e:81:2b:f9:8f:7b:db:89:48:e0:48:4f:c3:
8c:a5:65:30:b0:7f:2d:82:bf:20:8a:f9:ed:0a:29:
2a:bf:d0:50:cd:97:8f:84:ad:ea:e4:70:9f:99:5c:
73:62:14:dc:9e:37:c1:22:bd:75:09:32:0f:1c:bb:
47:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
05:3b:9f:66:04:0e:a2:b3:cf:76:d7:0a:c2:0b:ab:3e:24:ce:
78:83:d9:2e:f3:f6:99:70:d2:22:d3:83:6e:2f:85:3c:18:3f:
42:44:5b:ca:10:fe:79:06:e7:ec:9d:dc:ff:95:d9:03:8b:05:
d8:e9:2d:0c:29:56:6f:92:83:a2:ca:ea:f8:e0:c1:ae:cb:b5:
c7:cc:e1:07:f6:6d:1e:44:d2:0b:82:a7:aa:88:84:cd:c0:9f:
6d:0a:cf:55:9d:83:94:d1:ff:fd:62:e1:e9:bd:43:a3:bd:b8:
a6:29:d5:e2:9b:1b:b9:70:b7:8e:59:57:30:3d:38:2d:aa:e2:
c2:f3:2e:59:c0:c4:97:cb:95:d3:9c:8c:2b:29:22:1a:53:29:
ec:2e:e3:4d:e9:bf:c9:6b:57:51:e4:f1:96:5f:80:93:fe:5d:
d3:70:72:c7:90:68:61:3d:8c:d7:16:21:ee:86:b4:ee:80:c8:
31:91:08:aa:4d:e4:fb:97:b1:a5:05:61:72:7f:2a:42:9b:85:
bd:76:6f:40:ee:50:51:7e:d2:d2:21:fb:1d:90:77:d6:74:96:
00:ca:45:ea:a6:40:c1:eb:da:06:19:f6:a2:d6:c1:84:a3:a1:
32:4c:21:57:61:c3:59:6e:54:08:03:e1:ac:64:eb:ed:52:ef:
dd:1f:39:2f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:42 2025 GMT
Not After : May 4 12:45:42 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1b:c7:55:0e:86:20:33:6f:f5:d8:3b:91:ce:1a:29:71:74:2f:
03:04:a6:2a:2a:c9:90:06:70:2f:7e:9d:aa:9c:ed:24:a4:2c:
98:e8:e6:e1:a0:cd:4b:7c:2e:4d:e9:14:74:65:09:3e:14:e8:
13:9e:3e:08:66:3e:a8:7f:fc:58:53:38:58:45:3a:cd:34:34:
fe:c6:0e:86:1e:b0:34:ff:28:43:ec:db:51:de:91:e5:9c:74:
7a:98:14:f6:83:85:5b:72:dc:e6:87:3c:a2:3a:c4:6f:7f:70:
3d:e1:30:46:18:bc:d6:e2:38:a2:96:7b:52:9c:4b:1d:c0:c5:
71:ad:05:0d:55:89:31:0d:ae:77:bc:9b:20:c1:8a:a9:89:68:
4f:fe:25:9f:9e:14:d5:74:11:e7:28:ec:36:00:80:69:d2:4d:
ed:08:96:a6:60:a1:d2:e3:79:2f:b7:21:11:5c:94:55:2a:18:
11:8b:aa:34:dc:02:82:d1:75:2b:e0:f5:31:2d:f6:eb:14:e8:
8c:01:f7:3c:bc:0a:1c:34:46:bb:5e:c1:71:c7:95:94:93:40:
71:4d:53:09:8f:bb:91:11:7d:c1:2e:82:35:bb:a0:7d:77:d5:
70:9e:c6:4b:6c:a7:fb:f2:d4:0f:b5:3a:49:45:d8:0e:c3:32:
7e:69:69:49
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,237,942 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:52 2025 GMT
Not After : Jun 2 12:45:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e3:5a:a4:ea:c6:23:38:6c:43:70:09:f9:c3:71:
e7:36:88:f7:f2:25:02:e6:6a:e7:3d:4d:c2:ab:a3:
a3:2b:63:d7:a6:2e:63:7c:54:2e:75:ff:4e:bc:a1:
cc:02:43:a4:50:bd:1b:54:90:fa:a5:19:c0:b9:b2:
44:d1:93:48:21:55:68:c2:f8:51:16:62:9d:bc:3c:
d1:06:eb:63:3a:f4:96:48:e8:47:39:6f:dc:a0:b7:
34:9f:a9:84:26:45:0f:db:96:76:83:be:b3:68:ec:
03:a9:7e:e7:ab:13:99:62:9f:43:cb:1c:ba:e5:e5:
ab:48:c1:76:7a:dc:57:e5:06:cc:7e:81:04:85:24:
d7:49:5d:74:80:a9:95:51:2a:87:23:69:44:48:33:
bf:e2:f5:0f:66:19:0f:be:8f:bd:25:fe:4f:05:13:
b8:2c:e6:5c:ab:b8:26:e6:8f:4f:b5:12:49:bd:44:
b4:b7:18:9d:df:75:70:f4:1e:4e:a8:ce:ae:b3:76:
2d:0f:e6:93:9e:5e:27:c5:86:9d:3e:7a:a8:42:24:
c3:45:a4:14:89:b8:19:00:7c:a9:e2:ab:c1:1f:b9:
2f:6c:ab:94:31:33:68:9f:20:21:3a:bf:aa:c0:72:
58:d8:69:8a:5d:c0:0b:fe:25:e2:44:5e:1e:1e:76:
4d:ad
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:6a:2a:b7:9c:8a:90:2f:ed:e6:ae:b9:d0:1d:93:81:94:13:
7f:34:ac:b6:0b:4b:8e:50:c2:f3:74:70:5c:e2:79:25:fd:0e:
26:fb:c5:a7:a0:8d:0f:03:5d:98:a1:8d:82:8b:c2:93:0f:be:
ff:d3:54:72:15:f0:f5:86:d3:e9:c0:b3:fb:fa:94:6a:bd:d4:
c3:bf:a7:f9:57:28:8a:9f:34:89:8e:59:3a:dd:b6:d9:7a:89:
e7:cd:61:66:91:ce:f7:57:c7:61:16:8b:c8:2e:05:38:d1:d6:
46:f2:dc:b3:49:24:32:60:bf:b0:17:5b:26:48:67:72:c5:27:
62:15:59:34:0b:e0:a1:e5:3d:58:7f:be:55:5b:90:a0:fe:c6:
e0:57:76:8d:ed:de:be:fd:01:81:62:44:18:95:6e:89:2f:a6:
18:53:83:be:eb:39:35:3a:34:a4:2b:3a:44:16:b2:b1:9f:2c:
61:1f:a4:dd:4a:f8:14:fc:df:3c:46:19:66:26:23:f5:93:03:
27:d8:55:63:d9:d3:99:8a:f2:35:f1:63:c5:cf:ca:c3:40:7a:
0a:fb:f9:38:00:8d:c4:10:62:29:d6:dd:97:0d:6c:1a:51:c7:
a3:5c:fb:4a:09:20:7f:94:67:d3:54:43:80:d9:84:66:ce:e7:
6f:cc:69:0b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:53 2025 GMT
Not After : May 4 12:45:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:7b:42:ef:c5:9f:aa:d0:26:a3:df:35:8f:ec:a7:96:46:70:
67:16:2a:4f:3d:63:8d:cf:e3:24:ed:34:06:ef:33:72:6a:0a:
2d:42:71:7e:b1:ce:48:d0:d0:dd:0a:51:07:b4:9f:0d:c9:8b:
fa:6f:57:44:af:c7:2e:41:9c:1b:a5:55:45:93:4a:70:ca:2a:
aa:4d:c0:05:70:87:98:48:a4:b9:c5:f1:7d:0a:e2:ee:9e:ff:
43:99:b9:42:18:2f:04:ce:f3:e5:31:03:e3:5a:46:10:2c:78:
ef:45:66:9e:69:16:75:42:62:e2:b8:31:91:64:59:82:d4:18:
9f:33:71:00:4d:60:da:a3:65:0b:95:c6:5b:d4:fc:83:2a:64:
e3:76:8e:59:f0:b9:b5:f0:85:7d:24:70:32:50:69:90:e5:68:
40:89:73:0e:a6:fa:2c:aa:06:7e:c2:bc:79:6c:31:22:b2:29:
90:6c:52:18:d0:ca:ec:41:8d:86:4d:da:8c:a3:9e:94:eb:8b:
ce:8f:32:5a:e2:2d:dc:bd:2d:9d:48:18:6d:33:dc:94:48:f6:
05:0e:2a:ea:9d:4e:fe:16:08:94:11:12:a3:aa:07:4a:41:66:
2f:e8:e7:1a:43:8b:6f:2a:76:a3:b2:9d:77:d0:e6:5a:ee:7b:
b6:94:3e:8b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,909,183 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:18:12 2025 GMT
Not After : Jun 2 14:18:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d4:86:24:a0:ee:b5:4c:ae:0c:58:41:0b:13:a4:
7c:10:91:11:d1:21:62:9a:75:0d:02:a0:c0:73:86:
ac:29:a8:49:14:08:09:52:ee:5c:dc:e9:2f:26:25:
2e:65:37:eb:3a:ad:11:7b:01:e1:56:3c:dd:85:54:
2d:b1:02:d6:c7:b2:2b:6d:5f:53:3b:dc:8b:fb:73:
76:2e:38:0a:b4:1c:8a:c0:75:ed:ea:c6:a3:8b:7d:
d5:e0:c5:6e:9f:73:2c:d6:65:45:71:25:75:25:d5:
73:bf:f8:cc:2a:ab:f7:f9:12:73:d0:db:ec:93:5a:
64:d8:05:34:bf:65:b0:b0:46:10:97:23:70:6a:2f:
93:a4:a3:f2:47:34:90:1b:fd:46:ed:5a:c7:50:53:
1a:5f:d2:d8:e0:fd:0c:93:63:98:4a:7a:c9:a5:c2:
ac:bb:2d:8a:bc:fa:4f:9c:64:a5:12:3d:25:58:da:
1b:77:ab:c4:a3:66:47:80:6e:ca:19:1e:8d:64:7e:
02:36:4c:f8:8b:ef:81:00:38:6e:2e:27:0c:33:a2:
96:ee:30:aa:14:11:64:19:dc:82:08:2c:31:b5:43:
9a:09:81:ec:79:69:96:c9:49:dd:a1:e9:c3:5a:6a:
0e:f3:c5:21:21:ef:89:f6:44:a4:8a:d0:d9:e7:6e:
3a:91
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3d:b7:d7:80:bd:0b:fc:b7:76:fe:92:32:b6:30:b0:15:12:31:
ed:10:78:78:b6:17:85:85:44:b6:a7:72:c3:a6:1e:04:54:9c:
1c:60:b1:17:fa:72:cd:94:f6:3b:f4:14:8d:d4:06:d9:a8:7c:
50:4d:57:cd:81:8e:31:e5:db:6e:7e:9a:98:31:57:d4:f4:20:
a8:24:6c:43:3c:dc:02:0b:54:54:7a:e1:74:27:d9:7a:06:ed:
fb:38:f1:97:f4:ac:77:c5:fd:2a:09:20:fe:64:08:09:9f:bf:
8f:03:ca:20:d6:c8:9f:73:9e:31:64:94:7e:48:a5:af:9e:9c:
bf:1d:60:ca:97:d8:04:17:a0:10:ac:cb:5d:90:63:0d:b7:a1:
80:a3:b0:33:d1:a2:b2:b2:ed:9c:aa:54:43:15:24:76:a4:54:
32:ca:19:ab:1b:27:04:a4:5b:b7:05:28:51:22:98:98:95:b2:
3b:7d:5f:9c:25:1f:24:b8:af:57:c6:78:46:d1:4f:e8:34:37:
54:96:27:ea:7a:a2:f2:81:1d:6a:86:00:17:82:e3:17:77:a4:
3e:d5:47:aa:88:85:1b:22:7e:84:47:1b:ee:7b:05:7f:9e:ff:
4b:62:b7:03:cc:5f:fd:61:f3:d5:3f:3f:db:20:cf:a1:18:c5:
41:52:7e:0c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:18:12 2025 GMT
Not After : May 4 14:18:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a6:8b:5a:bc:c5:f6:48:0e:49:68:cc:a1:a4:79:da:cf:08:d8:
cb:5e:cd:6f:13:17:17:25:4b:9b:de:e4:e2:1b:8f:0a:1c:da:
0a:2c:e4:b8:96:cc:dc:1b:72:41:b3:54:89:00:10:7b:88:8b:
ea:a3:09:f9:1d:21:49:d4:d3:cd:15:48:92:7b:1c:00:83:b2:
92:4e:75:31:0f:f5:64:89:f7:b4:c0:9f:18:97:b9:fa:fd:7b:
12:6b:f5:f2:5b:e5:8d:77:04:74:b1:9a:52:3b:0a:f1:b0:6e:
5d:f9:e5:60:3d:3e:ac:2f:44:91:4e:82:ee:cd:e1:0d:db:21:
48:38:05:42:fa:4e:c4:3e:a9:1e:6e:ae:fd:71:09:e3:33:7f:
c1:5d:f3:31:37:dd:cc:f3:d1:6c:11:a6:d9:5c:d7:98:1f:b1:
c6:ac:56:d2:8f:64:7c:bd:38:99:51:78:f3:9c:c4:6e:e5:9b:
f9:27:c7:f0:72:e9:d0:c9:02:fa:09:f7:73:8a:7d:91:d5:52:
37:3b:b9:9d:30:62:d5:93:9e:43:91:ee:14:f8:72:fe:21:90:
8e:f5:77:4a:ac:65:8e:12:c2:90:c9:0d:b1:fa:42:f9:f7:21:
ce:bb:09:0d:78:07:5f:80:b4:3e:3f:b5:94:9a:f1:11:84:5a:
5d:c3:bb:a1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,418,015 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:20 2025 GMT
Not After : Jun 2 13:31:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:56:0f:e3:02:12:a1:db:74:54:da:eb:68:88:
5a:1c:e1:8f:75:9d:80:52:54:a2:2b:5d:84:2a:e7:
6f:e7:85:ce:55:66:62:38:4b:4d:9b:6e:f8:4b:d1:
dd:5c:69:ac:77:97:10:cb:61:e5:71:f9:bc:4b:52:
c0:59:7d:40:7f:a6:1a:14:8d:c9:ef:06:57:3f:05:
55:a0:60:29:e2:d3:93:b6:05:86:3a:fa:15:b6:3e:
55:7b:64:50:20:b8:3f:ed:37:89:58:8e:9d:91:b4:
a7:19:d2:9a:26:1d:05:6f:3c:14:2a:97:44:96:69:
a4:4d:54:b1:50:86:34:8f:12:da:b6:b5:3e:38:7c:
03:08:0f:8b:25:4c:65:7e:bb:c3:40:fa:32:88:04:
93:57:a2:c2:e1:e7:e8:c3:5c:6a:b2:03:44:a6:de:
33:9f:e2:fb:4d:8b:41:00:c2:52:20:a9:94:1b:62:
92:07:21:02:9c:12:d5:dd:9d:82:4c:60:7f:7a:03:
71:a5:18:47:d4:4e:18:27:68:26:8e:e0:00:12:e0:
61:5f:d3:86:01:d9:b2:0d:36:c0:f8:b5:0c:e3:44:
a8:c4:07:be:f0:a5:55:dd:f4:19:d0:98:8b:fc:ac:
01:75:21:d3:15:a0:4f:94:27:c5:54:36:cf:06:eb:
b4:bb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:cf:e6:e5:cb:c0:d9:28:30:30:35:5b:5d:df:46:c2:af:04:
51:e3:48:77:95:88:01:fd:88:bc:08:f1:9e:24:10:4e:4c:3c:
94:6f:ed:d2:fe:1e:f3:9b:74:0a:dc:a7:2d:80:b9:1f:13:19:
5e:bc:1b:26:0d:c6:70:fa:33:f8:28:4a:4a:e9:1d:e4:b3:89:
19:4c:13:14:51:11:09:7d:11:be:f8:f0:8b:bb:d8:27:77:8f:
23:87:a0:68:cb:74:38:74:9c:32:0e:c0:9f:08:91:32:5a:9b:
7e:5d:66:61:e8:4c:7d:b4:80:27:32:84:33:5b:db:a9:a0:0a:
20:55:c1:b7:d9:17:c8:1d:9a:e0:50:12:04:6c:94:86:a3:b0:
05:02:7f:f7:f8:62:9b:68:04:07:86:c4:0c:fb:ec:f7:3e:fb:
70:1d:f9:3a:0b:46:09:71:0c:e5:46:7e:cd:18:71:3b:58:37:
e6:e1:78:70:cd:07:34:a0:d4:40:e6:c6:d6:46:ee:5a:8d:94:
ec:9a:cf:37:ae:97:82:27:21:98:d9:18:88:24:c9:4f:7c:b3:
04:41:e7:07:4c:5d:25:cb:ce:69:69:8d:5b:df:8d:ef:32:17:
c7:29:fe:00:eb:5f:a4:df:8b:2c:65:37:4d:e0:2e:8f:af:1e:
2f:2c:60:ac
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:20 2025 GMT
Not After : May 4 13:31:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
21:bb:13:50:a4:04:98:ee:4d:4a:65:a4:e1:93:9f:20:9a:f5:
8a:9c:36:54:c7:74:a9:85:98:62:d8:db:34:4c:43:19:99:c4:
92:c6:df:0e:54:2c:f7:ec:fc:66:4e:4d:5f:44:17:cf:de:34:
cc:9d:2b:33:ac:03:79:ec:3f:16:d9:72:68:8e:58:ad:ce:99:
13:0d:3d:04:b0:25:3b:dd:a8:45:d8:3d:01:fc:3b:6a:16:2e:
3d:7c:00:09:6c:72:cb:8a:36:57:04:35:a7:09:63:c9:ba:83:
02:55:de:33:f7:b0:cb:a6:7b:08:c8:ad:74:a9:68:05:60:57:
d6:b8:ac:6f:d3:e6:50:0c:da:b0:d0:cd:45:4e:03:f3:59:f0:
55:66:0e:06:2f:08:67:53:c5:8e:0a:d5:0c:92:e7:b5:e7:78:
df:d1:49:64:a5:32:e1:18:59:82:a2:64:f1:99:c8:01:2f:88:
d6:95:0f:3c:aa:a8:ff:7a:3f:72:77:5c:e8:27:ce:fb:c5:98:
84:7b:88:b0:36:2a:db:52:38:dc:d1:6e:30:28:d0:a1:d5:d9:
f2:9e:b9:78:86:63:df:57:4f:88:df:2a:82:bc:2d:30:22:78:
e5:f3:f6:ca:dc:d3:b0:6d:78:42:14:d0:96:cb:50:32:25:e7:
75:3c:a7:bd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
Truncated 7935 bytes from beginning
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
3,108,078 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:02 2025 GMT
Not After : Jun 2 10:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:d0:dd:cf:c7:0c:79:d1:2a:0c:78:fe:16:41:
2e:26:3d:08:5e:fb:4b:11:ed:37:34:f9:db:2c:d2:
78:23:20:a0:4b:a8:24:d5:3b:ad:9b:43:ca:e6:d6:
14:61:fe:ba:cf:ed:ea:f8:95:48:aa:76:e4:e9:77:
a2:f1:8b:27:dc:54:57:95:18:67:b3:bb:a3:4e:6a:
dd:61:87:a6:b9:84:a7:62:7b:e4:a1:d6:d6:97:07:
f3:be:3d:e1:e8:1d:05:3c:4c:68:6f:b6:bc:3d:c9:
b8:60:b7:f2:6b:9e:2f:1d:db:c6:ba:39:6d:4d:0a:
7d:00:65:0a:42:64:bb:ff:ce:a7:54:7d:33:2e:b4:
20:ce:47:e0:b3:cd:88:49:bc:26:43:d4:84:42:d4:
88:be:9d:bf:69:f8:cb:c9:aa:c9:25:ba:f3:a1:c7:
1e:f4:cd:5f:f6:93:7f:5d:99:38:8c:29:62:15:88:
67:06:0a:23:d6:09:70:98:a2:13:1d:fd:08:17:2d:
62:ec:9b:69:b5:0c:16:f7:49:0c:9d:07:42:68:ce:
fa:80:67:07:c9:8d:14:36:49:cd:47:d9:a0:b1:47:
94:8e:8a:e4:d6:f2:a6:fa:25:4f:10:31:22:11:2e:
56:ab:3b:0c:f3:31:36:e6:5d:4f:54:91:92:d7:35:
7c:25
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
54:9a:03:96:c0:96:a4:7c:79:9c:ba:99:99:d9:ef:3d:56:67:
59:37:a7:6b:2f:08:a0:27:62:fc:51:c3:8b:ab:3d:a5:2d:d2:
92:d8:cd:c6:ba:93:49:8d:f3:42:f8:3b:3d:5e:7d:61:c5:78:
1c:d5:93:6e:c1:86:f0:1a:a0:7e:9b:89:f3:f6:4a:07:c1:3c:
62:94:17:96:89:d1:85:84:48:8d:a6:c6:5c:e3:37:6b:f5:cf:
3b:72:53:5e:b9:b9:31:c5:3a:ae:3c:81:8e:ee:92:f5:92:ff:
42:2a:e4:13:32:71:05:46:15:36:e3:b2:f0:0e:c5:a6:61:22:
93:58:6e:5f:64:fc:4d:a1:2b:55:95:0e:31:8a:40:8d:54:fa:
a5:ce:5b:a2:63:9c:fb:0a:41:37:b2:59:11:92:c0:e0:7e:bb:
da:1d:6d:89:92:36:96:7c:cd:f1:af:9d:68:f9:d7:c2:3d:04:
c0:96:3c:a1:55:d3:89:fc:b5:69:ce:11:de:ea:f9:34:60:0a:
c9:b5:de:04:c5:75:26:7b:73:2c:86:cd:a1:57:0f:1f:66:76:
7b:21:43:cd:31:66:78:8e:67:a7:50:4d:6e:38:fa:2b:24:8b:
6e:86:85:ef:5a:36:5a:83:29:49:73:5e:45:7a:21:54:08:a1:
2b:ff:95:55
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:02 2025 GMT
Not After : May 4 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:0f:a5:e7:58:bc:9a:de:12:23:a3:3d:fc:ee:27:5e:98:0e:
9d:6c:c7:c0:b6:b7:76:13:64:b0:0f:90:c0:3e:8d:38:92:b6:
ce:38:b4:db:20:33:45:13:3a:86:e3:e3:f6:66:b9:1a:13:61:
01:c9:24:d2:78:33:fc:30:67:89:84:20:04:ed:aa:9a:e4:4c:
87:aa:08:84:04:43:96:47:68:8c:15:6e:bb:1d:26:a3:6f:21:
6c:74:f4:34:1e:be:a8:49:5e:9c:9c:6f:2e:d6:11:6e:b5:54:
b8:4c:a6:6a:f1:55:f1:4c:51:05:d8:2e:63:9a:e6:ad:2a:67:
0d:2b:4c:4f:0d:7c:1d:21:02:1b:96:5e:29:6e:e3:40:25:6e:
51:7d:86:d2:f9:35:b5:8c:42:59:0f:31:9b:82:d8:8b:a8:b7:
01:dd:b1:32:f4:45:05:7a:9c:a3:60:b1:6e:ff:fb:cd:41:2a:
a3:94:b5:2e:93:d9:ee:a5:3a:c4:b7:b2:e2:dd:b6:23:30:43:
5e:41:66:f7:28:4a:b5:f6:d5:4f:f9:9c:8b:75:21:55:dc:17:
68:bf:12:07:3e:8b:23:1f:57:46:27:55:c3:e4:d3:aa:97:80:
1b:10:de:76:d0:ed:23:46:3a:a7:a7:1c:41:6f:5e:aa:aa:22:
61:33:b9:b5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
Truncated 3059 bytes from beginning
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
2,856,158 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:19 2025 GMT
Not After : Jun 2 10:25:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:4b:77:41:62:d9:30:11:e8:50:2a:37:b8:24:
72:73:ed:b0:31:04:e9:ee:d2:67:3c:f1:56:e4:a4:
06:4a:8e:ce:90:ca:98:d4:5c:8f:86:bf:c4:ea:f9:
84:1b:48:b1:6c:9e:16:08:7d:84:7c:54:06:74:1c:
6e:30:27:37:ba:9e:e0:e0:2c:19:60:bf:0a:47:dd:
0b:3a:f6:6c:a3:88:ea:25:08:b4:e0:b1:ec:63:40:
02:70:9a:cc:a2:06:fa:06:d9:d3:01:0f:8e:b2:9f:
2c:ce:a5:52:72:31:12:5e:fe:6e:6a:3f:a1:c7:c2:
29:d8:d5:7a:a9:6b:84:6d:3b:1d:11:e5:72:85:fa:
e4:fc:33:0a:c7:48:7b:da:8c:a0:bf:ec:11:d9:ce:
11:a6:93:91:c8:f7:af:56:ef:6f:cf:65:64:48:ea:
07:0e:d8:ed:e2:58:87:52:83:23:4f:d7:89:8a:01:
8e:1f:8b:95:21:88:b5:38:b6:51:55:24:e8:9f:56:
e0:5b:71:1a:9c:c0:3e:10:87:2a:a7:5f:18:63:43:
19:58:90:fd:69:28:b6:59:8a:91:ec:0f:c9:b1:b9:
c6:d1:05:19:da:07:f6:47:fa:66:75:bc:bf:70:22:
5c:a4:53:98:23:10:81:ab:c4:df:2f:44:df:69:ec:
fe:95
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:d0:2f:0b:f4:2a:f7:8d:34:74:93:b6:73:06:44:51:02:23:
d4:12:16:3b:8f:57:53:0c:f8:86:bd:63:13:55:f7:81:91:c1:
ed:5d:b1:3a:4b:69:c0:14:83:17:9d:db:8e:c7:35:1b:cd:49:
c6:4d:16:51:cf:b7:3a:fc:24:a9:8c:d3:52:e3:4a:f9:fb:47:
db:f8:ee:5e:e2:ed:6d:3e:ef:93:96:24:e5:3a:06:6f:2d:78:
0f:ae:bd:3a:b3:10:f9:70:b0:34:46:3b:bf:f7:6f:72:53:46:
0f:58:9e:73:a2:45:50:a3:0b:0a:68:d3:d8:98:ce:e2:1d:fb:
d0:43:fb:58:cc:19:73:5f:8e:09:0f:47:60:d0:e4:c2:53:4d:
8c:40:f0:be:88:55:d9:0b:5c:de:e2:16:07:1c:c1:31:5a:6a:
53:ac:a9:f9:32:cc:95:bc:a5:7d:49:30:1a:53:65:d1:99:04:
a3:f7:99:d9:57:54:ba:3e:b6:76:76:d0:a8:a5:17:24:4b:8a:
50:4f:29:a8:f5:00:9f:63:95:2b:2e:9a:b4:a4:39:e4:e2:a7:
52:e4:45:f3:86:80:46:28:60:a9:67:d2:c4:60:02:5b:6a:e5:
2b:b8:05:c8:e6:52:11:c8:0f:9e:48:f3:82:a9:4d:32:ee:73:
d4:06:a4:57
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:19 2025 GMT
Not After : May 4 10:25:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:9c:17:50:9c:f3:57:36:94:28:f9:89:41:89:28:a6:d9:4e:
3c:22:a4:7b:78:aa:4d:7c:5e:7b:55:18:34:90:e9:0c:de:e8:
aa:8c:ea:ce:ce:fd:02:9b:a9:18:f3:28:7f:c2:e5:aa:91:82:
4c:0c:17:c7:ef:6c:25:ed:27:e1:a5:64:6e:83:e4:d1:30:cf:
2b:3b:30:69:d2:ba:29:53:2a:b5:88:29:b1:9d:42:c8:09:6b:
50:21:a0:71:36:e3:d8:29:a3:32:24:f3:9e:21:d3:c0:84:55:
53:ed:25:ab:d2:f0:55:77:b2:fe:9f:5e:39:64:39:11:70:ff:
ef:e4:ff:58:28:cb:0c:f3:2d:4b:75:ae:a6:31:4c:33:cd:a8:
03:da:d6:d3:a0:03:97:e3:c6:74:72:79:8c:0e:6d:83:a8:a6:
03:76:3d:68:45:d2:f7:67:59:41:a3:00:e3:e6:11:0d:60:07:
6a:f1:d8:55:12:11:a9:db:66:5c:26:c0:05:fe:7c:3b:2a:c4:
c5:f9:76:2a:92:ac:31:e3:76:7e:f1:12:85:dc:96:52:81:84:
ec:c4:3d:8b:a4:70:8a:7a:c9:92:1a:6d:c4:24:4a:f7:78:72:
d5:9b:32:ff:1c:0f:12:9c:9a:cf:f2:c0:76:9c:2a:e7:eb:f1:
88:ff:aa:c6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
Truncated 7935 bytes from beginning
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
3,107,885 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:44 2025 GMT
Not After : Jun 2 10:24:44 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8d:03:5c:a2:51:b6:ae:94:46:8f:52:f5:da:0d:
90:02:c2:28:73:26:61:5c:ed:f3:2f:67:d2:2f:fd:
b9:54:e5:0f:d9:b9:2c:36:80:ec:95:72:96:3f:23:
05:7a:aa:55:d3:2f:eb:68:ef:1d:50:c2:1e:ea:cc:
98:a4:2f:55:b5:ad:76:c1:72:17:55:d1:e4:6f:32:
55:b6:9e:22:bd:63:64:a5:5a:54:c7:94:c5:9d:dc:
30:03:3d:0b:28:4b:3b:c0:71:5d:3f:23:4d:20:5a:
a7:de:36:76:4f:86:58:94:e2:85:6e:33:24:f3:f0:
25:24:68:14:74:1b:f3:ca:c8:20:0f:da:f3:c0:20:
6d:cf:60:43:c7:62:98:83:7f:13:95:24:db:ff:1d:
65:62:bd:83:ed:e0:32:c7:87:9e:ae:a7:11:24:de:
e1:53:54:78:a2:47:ec:13:21:6c:e8:72:cd:e3:10:
2c:e9:c2:a8:27:13:d6:c8:81:d9:55:71:7d:3e:8a:
ed:3a:25:c9:6b:c4:1b:b4:58:e4:f2:7d:5c:56:58:
c5:6f:2e:9d:d7:8a:ac:b0:66:68:ed:81:95:9a:1c:
e2:8a:0e:5e:1e:5e:30:c3:3d:4f:b8:dc:0f:9e:ab:
fa:12:bd:da:13:67:b3:c5:26:b4:f4:ef:b4:32:e5:
24:1f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
59:ac:36:c2:1f:56:bd:5c:91:ce:70:b1:bc:a4:75:0e:77:4d:
bd:29:b8:d8:da:2d:ca:7c:64:3a:d6:b9:30:f8:a2:53:6a:22:
df:b5:b4:f5:11:a6:4d:a1:6d:11:76:fd:ab:93:bb:e9:eb:b7:
22:ad:95:64:f7:73:ea:4c:86:da:92:97:0e:cb:f7:b3:d9:22:
fb:af:69:69:3f:20:59:69:40:b3:03:30:1b:1c:bd:03:26:4b:
84:ca:72:9c:1f:28:96:d3:68:9f:31:63:17:08:0c:0c:b4:57:
60:eb:cf:bc:ae:93:dc:a5:f8:8b:94:b1:7d:4f:ac:03:20:21:
90:bc:b7:c7:8a:7d:c9:34:98:4a:2b:a5:95:af:d9:6f:66:49:
60:fa:a8:81:a2:6f:37:99:27:af:64:22:83:0b:a5:02:56:41:
6b:b3:d3:08:3f:1d:3b:0d:8f:1e:74:1d:e4:6c:77:f0:eb:ca:
5c:e0:16:2b:49:52:2d:7a:1e:e4:bd:15:dc:f4:46:8d:e5:15:
bc:0c:01:f6:36:e7:dc:01:31:ff:9d:13:59:d4:92:8c:a8:6c:
27:ec:ff:f3:be:68:77:2b:b1:b4:23:7e:87:93:e7:07:be:ee:
27:e8:32:1a:23:32:9d:25:f4:71:48:97:ec:50:c1:83:d6:ba:
f2:78:83:86
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:44 2025 GMT
Not After : May 4 10:24:44 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:57:e0:ac:7e:3e:b8:8a:58:bb:76:fd:ab:c5:00:ca:18:73:
4c:08:ec:92:a9:46:47:0d:36:d9:7e:fc:26:9f:03:ca:1e:58:
26:f6:6f:ec:f2:62:98:19:c4:75:4c:d6:d5:0d:e8:33:fd:c7:
2a:77:1b:74:8c:41:b3:34:f3:fd:00:7e:b3:ee:14:95:0e:5a:
6a:30:b2:61:66:50:f0:13:a1:43:2b:73:ac:d1:c6:48:52:ac:
98:59:3e:6f:11:71:ed:1d:00:d1:30:24:81:73:7d:74:a4:b2:
77:11:cb:86:72:8f:d6:53:a6:51:01:2a:c5:e8:f8:6a:b2:9a:
c6:24:c9:0f:0f:96:8f:39:a9:bd:81:7d:22:c9:89:2d:7d:c3:
b0:d8:65:5c:a8:19:77:2e:ab:43:b1:ed:75:4f:bd:46:b7:2b:
63:d2:5d:e3:de:21:f4:c5:97:4f:c3:2e:aa:52:a9:a5:15:bb:
55:29:36:b3:02:fd:c7:35:97:ab:06:0b:56:a0:47:39:32:84:
57:89:7c:de:fd:90:47:bf:54:6d:15:c7:61:ab:1c:a0:06:9f:
68:1c:07:34:67:8c:c0:dc:18:76:1b:dc:ca:41:30:3e:0f:28:
b0:e0:6a:78:ab:eb:4c:74:d1:41:b1:01:7e:eb:46:aa:d5:aa:
5f:b7:f9:21
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
Truncated 3059 bytes from beginning
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
2,857,601 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:46 2025 GMT
Not After : Jun 2 10:24:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a5:a3:7d:b5:42:ca:ff:d8:bd:37:19:56:6c:32:
ef:e5:3e:aa:19:29:fa:06:ea:aa:07:00:2e:34:40:
f0:d0:f2:9e:88:c6:c4:05:09:ed:1e:dc:01:2d:3c:
f9:67:1c:2e:47:76:f3:c3:e3:91:94:3b:2d:e3:74:
fb:1c:c7:f1:ac:35:b4:a8:ef:cc:50:96:3b:7a:6a:
27:cb:62:89:4d:d7:a7:32:45:f5:be:bb:37:e5:5b:
34:d2:5e:89:7d:3c:52:63:b1:59:ba:c0:b0:50:93:
3f:ab:63:df:13:69:28:54:55:a8:04:42:5b:34:6c:
0c:ff:ba:0e:c2:e1:18:54:cd:b9:3e:44:b8:46:f8:
45:7f:56:5e:d0:15:22:c1:da:50:56:eb:6f:b3:04:
99:cb:ec:5c:47:43:7a:39:cc:41:34:4b:6d:ea:a4:
55:ea:a9:71:67:e8:bc:2e:2a:90:0f:b5:1d:3a:d6:
e9:ee:96:58:ef:c4:ec:65:37:b6:ec:ff:9b:c8:18:
cf:32:9c:21:49:aa:3e:43:31:99:6f:44:9f:78:b3:
49:e3:ca:15:56:8a:e2:28:04:aa:f0:dd:e9:e8:a1:
8a:a7:a3:80:12:8f:46:26:f1:00:32:dd:c4:6a:d7:
36:a2:22:dd:d3:3e:00:64:43:51:b4:16:c5:78:ba:
04:89
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:2f:71:3c:0c:01:86:41:50:cf:d3:fe:52:0e:e2:12:e8:88:
03:4f:4e:c3:14:6c:fc:fd:57:7e:27:75:2e:b5:71:c8:5d:b9:
83:90:ad:7a:ec:b4:3e:9e:ba:a1:d4:e9:79:f0:68:17:29:e4:
5a:da:d1:3e:9e:fc:18:6f:ce:fb:b0:c2:fb:77:e8:e5:fd:9e:
5d:c2:d5:b6:8e:79:dd:55:b6:34:da:6a:11:b2:39:24:4b:ba:
7e:bc:1c:c5:b0:ee:7f:69:40:39:50:95:e5:88:54:b2:bb:61:
1f:f1:6b:20:b7:18:c6:d9:f9:83:75:74:f1:af:a8:78:ab:18:
0a:92:da:d0:e7:a0:2d:c6:00:1e:9f:06:e0:9a:e2:60:a4:6e:
62:e4:4c:17:7f:2a:d7:60:2e:33:3f:c3:ba:29:c8:e8:fc:4c:
37:9b:73:3a:ac:f3:77:29:8b:e0:d0:14:65:07:db:85:5e:28:
4f:91:75:63:41:da:59:22:a3:03:1a:3f:6e:ff:c6:a2:06:55:
5e:bb:72:a9:e9:4b:22:6d:99:b3:d9:cc:0c:44:d4:59:67:17:
44:c4:d2:7b:a6:a0:62:08:ab:05:7b:3b:8e:83:47:ac:bf:6b:
b0:dd:30:1a:66:9c:d3:50:f1:51:8e:78:ed:2f:cf:02:30:de:
f6:94:7a:c7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:46 2025 GMT
Not After : May 4 10:24:46 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
31:46:c1:da:5c:f8:d5:17:37:77:d9:11:27:90:f9:44:53:31:
06:f3:5c:0e:f4:db:54:4f:09:ca:16:c2:5d:74:17:72:fa:1e:
46:73:82:48:0e:4b:e3:b9:54:d8:39:a8:75:75:7f:eb:41:00:
ac:e2:b8:9a:8c:0f:c3:ed:51:33:f8:86:00:ad:e0:ba:72:d7:
a4:64:2e:fe:36:93:96:0c:fb:c9:52:03:fe:bd:37:73:a1:7a:
fb:6e:35:40:a2:5b:46:9f:8d:c1:56:6d:33:76:07:48:aa:2b:
84:b4:83:87:a3:8b:43:9d:f8:77:5e:a9:5d:1d:db:49:6d:23:
94:55:b0:cc:6f:a2:56:26:72:57:26:b1:31:f3:f8:1a:6f:9b:
08:dd:26:25:8b:85:a7:9a:98:f4:c0:8f:6a:dd:a9:51:e5:96:
a9:51:bd:a0:17:07:26:af:e3:54:6d:6a:7d:c8:fa:2e:16:c2:
e8:b6:2f:4c:ea:e2:5c:8a:28:60:92:dc:f1:87:45:75:42:46:
c3:a0:f9:dd:fd:19:29:9d:7a:d0:4a:06:8d:48:72:a9:2e:c1:
a9:74:bc:8f:3b:92:8f:1b:e0:00:c8:90:2d:8c:02:2f:39:47:
f1:5e:46:de:98:dd:c9:43:ad:94:30:e9:79:3e:ed:5c:c7:6f:
eb:6d:cf:c3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,107,646 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:39 2025 GMT
Not After : Jun 2 10:24:39 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:dc:8c:59:8a:8d:6e:66:87:b8:3a:15:39:dc:e4:
94:a8:dc:d8:fe:98:32:4a:3e:05:4e:87:a2:bc:12:
62:d0:59:c4:a4:b3:79:1d:94:9c:f3:74:47:d7:c7:
1e:1e:52:c8:34:94:9e:2b:e8:21:22:90:af:c6:76:
e9:aa:f8:e8:eb:1c:2e:e8:65:af:7d:6b:56:2d:81:
23:38:ea:88:3f:53:0f:a6:e2:eb:b6:8b:22:7e:52:
67:ec:e1:9d:eb:ab:7b:ea:63:cd:e8:e8:8c:e4:eb:
43:f2:df:4e:32:3e:4f:50:99:62:35:27:31:38:97:
ab:31:bb:c5:e8:27:96:5c:08:ec:23:ca:d2:a3:b0:
a7:8f:2f:5a:45:b1:1b:50:ea:10:ce:cd:eb:58:7d:
bf:9e:ff:13:40:77:23:b9:73:3f:ad:2a:87:5a:2a:
89:15:a8:ba:9e:6b:c2:e1:69:a8:32:fa:27:41:67:
28:38:cf:26:28:fe:79:2c:be:49:8e:8f:b6:81:bb:
d3:6b:27:49:12:72:d8:7a:67:ff:9e:90:ff:0b:84:
51:f4:6a:32:6d:b8:f6:3d:01:f4:58:f1:0f:74:c8:
e6:c6:36:26:1f:8e:63:1e:dc:b6:c2:8a:df:d0:36:
79:da:3d:28:6c:4e:a8:26:47:4d:f2:87:c6:c7:23:
eb:d9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
91:b8:14:7c:dd:b4:90:cf:02:bc:8d:36:26:51:50:32:fb:91:
c0:21:74:17:e4:bf:e4:b9:91:f7:fe:54:5a:d0:77:50:61:d7:
68:a6:a8:a1:94:20:d9:83:a7:2f:a8:d1:1b:21:b6:d5:1f:ed:
60:4f:e0:c2:f2:45:cd:39:46:02:24:76:88:f6:d0:57:4e:5a:
59:09:d4:1c:26:c7:3c:c3:da:f5:06:20:46:99:8e:4b:30:b0:
18:62:f5:55:19:a0:8d:18:0f:e1:b6:16:79:66:ec:d1:c2:01:
7d:f2:c2:6e:ac:e6:9a:8d:0b:32:b0:29:62:54:05:11:cb:00:
06:86:f2:91:f7:3a:96:0e:1b:33:6a:8b:6f:e5:4b:54:61:e8:
ee:0e:62:56:02:32:b6:d3:8a:bc:58:ee:23:dd:25:56:0f:94:
8c:58:d5:34:c8:0b:5d:06:35:ee:92:e0:2f:a5:80:be:47:7a:
bf:33:38:92:f4:5e:bd:7c:b5:13:3e:d0:b4:66:3c:89:77:5f:
52:9a:6d:f0:fe:30:03:ee:33:29:e9:a3:11:b1:d2:26:83:57:
47:ce:f7:0f:d7:b5:8f:9b:28:c5:18:9a:4b:f7:6e:d8:6b:ed:
e6:09:44:ae:8e:15:ab:8d:64:0b:4a:2f:07:1c:0f:24:d5:89:
6c:b7:4e:68
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:39 2025 GMT
Not After : May 4 10:24:39 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
af:a3:20:4c:0d:63:36:f8:92:70:f9:aa:39:db:47:80:7f:f8:
74:5b:83:8a:1c:f3:40:72:6d:36:a5:73:2d:f0:39:47:ae:73:
2e:84:f8:40:85:38:3b:f2:a4:d2:7c:e4:60:fb:d3:4d:c5:28:
9d:55:46:79:a2:28:7d:15:0d:8a:f8:52:d4:9a:d7:02:9c:62:
5f:3a:f8:3a:e8:cc:80:15:c5:5d:07:50:41:53:86:a4:6d:3c:
29:c3:e1:15:b0:11:10:f8:84:3b:dd:07:2b:e7:e1:c4:64:4f:
95:83:55:e3:33:ce:a6:cc:36:b2:8e:d4:17:bd:ec:e3:f3:03:
f4:5e:3f:e9:d1:13:fe:db:65:5f:09:85:a4:cb:89:61:2f:e3:
59:d5:06:d5:51:d8:b0:74:f5:1d:c6:f1:07:4c:8a:f9:64:77:
05:b7:8a:ce:21:7e:5d:27:da:17:0e:a6:e9:73:35:ab:13:9d:
c5:2f:b3:ef:f9:c0:7e:bc:b5:30:09:95:31:67:ea:26:02:cf:
93:01:0d:df:62:08:07:33:f8:b3:e5:39:0a:dd:64:99:ad:55:
5a:60:3b:ac:71:33:af:f7:01:e4:19:7c:86:32:f5:76:0f:a4:
cf:c2:57:df:ff:0a:5a:9d:43:b2:10:47:7a:90:3e:fa:9c:a9:
2a:d7:16:7a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3059 bytes from beginning
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
2,855,560 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:56 2025 GMT
Not After : Jun 2 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a0:9e:5d:29:22:8a:b9:db:c5:2e:65:78:34:cc:
79:25:ef:9c:c8:2a:15:7b:0f:36:c9:5e:99:f9:f2:
c9:8c:44:18:1b:79:9e:a7:d8:40:6f:13:e3:5d:6c:
f4:01:5b:4a:f0:a9:c8:fd:99:26:c6:4f:bd:39:94:
8a:c8:b3:54:e9:3f:78:b1:c2:57:63:ec:df:a6:64:
5f:37:d3:01:81:a8:3d:c6:b2:bf:0b:7b:be:a9:0d:
e2:b5:e1:be:b1:97:78:fc:96:ae:c9:d8:6e:87:7c:
af:80:96:47:95:77:eb:94:10:bb:fb:5d:dc:a6:cb:
f5:58:27:da:fb:c0:18:3e:1d:85:68:f8:26:10:fd:
f2:b8:24:3b:2d:27:1e:d0:4e:a3:b8:3d:12:94:19:
1e:9b:9d:1c:14:f9:32:3d:4b:87:bc:3a:a6:b1:24:
9a:cf:e7:1d:cc:9d:69:56:f2:7a:ca:0a:15:c0:24:
f6:21:54:25:b4:5e:88:b6:75:a0:6b:da:f6:7c:dc:
ef:55:78:9b:dc:1d:6b:0a:e7:2c:0d:0d:e2:66:bf:
b5:18:e1:5d:5e:39:f6:c9:bc:a8:3d:8f:f8:e9:6c:
a7:e7:f9:e3:c0:2a:92:6e:ee:07:39:e6:c5:66:3d:
4d:f6:88:6c:7d:42:59:56:85:41:b1:00:ad:8d:2d:
17:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
25:93:af:71:8c:03:5d:96:1c:b0:89:c4:82:f5:33:3b:ee:7c:
0d:40:96:96:56:0e:12:52:20:a2:42:6d:97:5b:d4:0c:38:57:
2f:1e:cf:e9:f4:9e:6b:9a:27:d1:ec:1b:40:1d:cb:e2:0d:cf:
ea:5a:ff:1b:64:4f:54:60:fb:bc:09:d8:3e:4a:9f:e1:75:ac:
5b:ac:2c:05:7d:69:ae:08:4f:ae:78:17:70:8c:51:08:e2:57:
08:5b:55:fb:65:a5:d5:3b:1e:0d:8c:4a:f8:ff:94:26:77:98:
ac:27:96:f5:23:0c:c3:cf:3b:03:e0:11:8a:e5:4e:d0:ae:b9:
78:fc:fb:d1:77:ff:b0:3e:e9:9b:f9:a5:50:d0:69:4a:cf:58:
b2:a2:0e:9c:e3:d8:b0:4f:e4:b6:47:0c:b0:d7:d8:59:32:6d:
0b:59:36:b6:86:83:05:37:44:72:f4:58:39:a2:72:a7:c0:2f:
58:6b:13:f8:e0:f8:59:ce:eb:b9:2d:e1:6a:fe:78:8f:c6:2b:
d2:0b:3d:17:cc:46:90:28:e9:84:68:e2:32:16:f0:73:f7:18:
54:58:e6:01:52:8b:57:9a:44:0d:34:bc:ba:f0:28:15:f1:0c:
38:11:60:98:c3:70:63:e5:a2:35:51:c4:05:3a:5c:9c:0d:dd:
e3:e8:1c:62
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:57 2025 GMT
Not After : May 4 10:24:57 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:61:be:85:3a:1f:f3:4c:ee:11:24:1d:a6:0a:ca:21:f6:a8:
24:49:6d:53:95:5e:34:5c:b4:52:cb:ff:de:5e:e7:ad:36:95:
e8:93:d7:dd:fb:06:e5:99:cc:27:80:e4:66:61:d9:9c:c6:ca:
09:4c:ed:09:90:bf:46:2b:de:03:f8:56:3f:37:54:1f:51:48:
93:04:c4:a7:86:b7:2a:9a:0d:1b:dd:cf:7f:c6:27:ca:5c:f5:
97:10:69:30:be:e5:96:26:1c:35:9b:1d:59:83:e6:e7:e1:f8:
9a:9d:3d:05:f0:bf:d3:d7:47:f1:bc:d8:54:a6:50:bc:cc:61:
ed:2f:61:ca:6e:46:63:f5:3b:ed:bf:14:ce:e1:40:89:21:1c:
59:23:eb:d4:b9:e4:95:89:a6:c8:ee:62:ae:a2:64:87:49:55:
e2:75:e9:3a:0d:78:05:9b:cf:25:64:b7:a0:62:40:8f:cc:c0:
cb:77:e2:39:8b:8a:b4:7d:0a:6b:98:1d:c8:a1:51:24:c4:8c:
1a:38:d8:75:33:bd:94:25:cf:01:53:f0:c9:c4:be:f0:17:05:
06:5c:2f:a2:c2:8a:5e:6b:e8:03:4e:44:4f:11:0b:49:9f:0f:
86:e8:50:83:3b:42:76:31:7f:6a:90:0b:0b:c5:81:6a:aa:c8:
14:57:12:c0
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
Truncated 7935 bytes from beginning
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
3,106,997 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:48 2025 GMT
Not After : Jun 2 10:24:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b0:92:e3:cc:da:31:f6:1d:be:61:a3:d9:c9:ed:
f5:a3:3d:06:72:32:a3:d8:eb:7a:12:f3:de:50:ae:
15:cd:7f:a7:e9:68:da:9e:35:4b:f4:59:02:0a:a0:
0d:92:5c:f3:bf:c6:ef:fe:d3:81:6b:0f:2c:21:85:
3a:31:30:75:ea:38:d4:a6:8d:58:df:60:a1:3d:bc:
4b:09:3f:79:9b:a4:7a:31:0e:71:d9:a1:6f:4e:a4:
7b:83:c5:43:a0:0e:2f:03:20:9a:c9:43:7a:c8:63:
e6:ed:60:58:fb:33:1d:5d:3f:8e:fb:69:2f:e9:93:
47:58:9c:63:83:b9:4e:9e:0f:90:e7:62:88:59:95:
c2:18:9f:ca:a8:bc:f4:05:07:2f:c5:d4:d8:a5:ea:
ef:27:3f:2f:14:ef:5c:d4:e5:6d:00:fd:49:70:31:
35:9f:5c:81:1a:df:35:27:ca:92:9b:98:41:ef:a3:
75:45:de:0e:03:06:f3:f2:66:4c:47:1e:15:51:7d:
ef:89:c7:d8:78:71:b7:db:f0:88:be:c6:ba:6d:37:
08:5b:44:d2:ba:0e:bd:59:72:d2:8b:6d:30:2c:3f:
cc:b1:4a:8c:55:4f:0b:ab:95:ee:38:29:45:6f:0b:
e9:bc:c4:70:79:a0:4d:23:45:bb:03:59:6b:9d:3d:
39:31
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8d:92:07:8a:10:1c:5c:ec:53:2b:d6:51:a8:fd:2b:72:b9:48:
59:29:ca:7f:fa:e6:eb:81:b8:bc:eb:37:fe:47:6b:80:77:8b:
f8:31:0d:9c:24:86:7a:b6:fa:97:69:70:55:16:26:b4:7a:ba:
5b:d6:67:52:e3:2c:56:99:e0:0e:74:f9:94:f0:0a:8b:81:69:
53:34:fc:1a:c8:b2:8b:c8:51:97:cb:18:9d:16:1b:36:70:c1:
b3:6e:ac:d1:cc:10:6b:de:c9:75:5f:2c:82:f7:c6:f5:9e:33:
18:d0:4f:ba:c8:f3:e4:3e:c1:8f:1e:ae:8b:a6:8a:f6:b5:c5:
da:6b:6d:4c:3b:e0:21:31:87:5a:27:da:1f:78:1b:6c:7b:39:
05:ea:f6:c1:ad:55:d0:d4:2d:99:d8:f1:77:24:0e:06:01:c0:
63:67:97:d2:80:72:af:49:12:2c:c7:77:4a:36:63:68:3d:b1:
7a:fa:14:bb:4c:1a:2c:6a:45:6e:44:28:c4:d2:10:88:4f:ac:
b2:d8:8c:85:b2:7a:f7:b3:92:72:32:0e:42:7f:84:1d:13:a8:
a3:8d:13:d5:79:6c:6d:07:f5:28:69:57:61:f2:9c:a8:d1:22:
ea:29:6f:11:97:50:0c:03:e0:65:a4:63:94:bb:ca:6b:18:d1:
8d:54:e5:0d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:48 2025 GMT
Not After : May 4 10:24:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:a8:c1:d3:1a:02:fb:95:92:5e:97:5d:97:ea:23:0d:f1:db:
80:3e:34:f5:62:f1:e4:ff:f6:fd:37:42:db:33:99:22:d8:79:
79:67:42:90:07:03:07:a4:82:39:f6:98:1d:ef:0e:40:70:2e:
63:7f:d9:99:76:34:6a:7e:4a:74:4f:20:6a:79:31:e6:7a:62:
62:36:bd:26:6b:f5:48:0e:fb:40:b0:6e:f1:fe:26:d4:9a:92:
18:a6:16:13:64:84:9f:3f:68:32:5e:a5:36:6f:d4:26:15:52:
b5:e4:5f:3e:51:9c:ec:ba:60:54:9d:6d:74:d9:7d:90:85:b2:
93:3a:b7:69:f1:ff:63:64:5d:66:5a:6c:78:51:1b:fc:e2:f2:
a9:a9:36:cb:36:1d:28:2b:e7:b6:d4:38:4c:9a:b1:c6:65:fb:
ef:6f:37:48:25:f1:14:79:b8:d5:25:14:7b:84:48:bb:94:d9:
57:38:ca:b5:08:33:f6:27:1f:ce:12:ff:c7:7d:24:6a:e4:78:
83:0d:a9:f3:f5:2f:9a:5e:84:c2:ec:70:89:43:65:e9:89:c7:
32:a1:7d:a7:78:81:c0:3d:5e:f8:85:12:7f:c8:5e:85:9e:31:
5e:a8:bb:33:4d:b6:5a:95:d7:e2:70:ea:83:38:8f:5f:47:d3:
53:f4:48:92
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3059 bytes from beginning
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
2,856,681 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:52 2025 GMT
Not After : Jun 2 10:24:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d9:28:7a:85:d4:e1:5f:1c:cd:4c:47:b8:63:f7:
41:68:c1:a9:29:8d:eb:91:21:2f:8d:ae:3f:49:39:
0b:f3:2f:1d:46:82:d8:9c:69:0a:a1:92:64:2a:c2:
16:41:48:71:88:29:e8:b5:1a:cb:45:76:f0:38:15:
12:7a:10:a7:b8:eb:54:bc:85:94:5b:ab:43:45:e8:
d8:a7:85:54:c5:69:67:4f:27:16:e3:58:10:bc:21:
b8:9c:7f:92:6a:db:ef:dd:ab:e7:a5:fb:47:89:95:
59:3f:32:86:6b:a0:cb:29:f3:5c:56:24:63:2f:63:
72:2f:36:af:28:f9:4d:88:be:f3:4b:f9:c2:f4:fd:
b8:bc:56:12:73:5b:44:11:09:4c:8a:a8:8e:6c:b2:
39:7b:0b:46:52:b1:e2:1b:48:12:c3:27:7e:0a:91:
9d:a1:f2:3c:18:cc:0d:a1:41:9f:6f:fd:b4:0a:26:
c7:4b:bd:84:a7:fa:c0:fa:b4:d2:c4:91:27:8d:2b:
e2:35:d2:51:df:40:ec:94:6d:13:75:c5:ae:db:77:
65:8b:b3:04:79:d7:51:5c:3e:2d:c8:8e:da:06:58:
38:51:c8:74:64:84:54:44:69:34:42:10:57:bb:04:
30:b9:0c:49:e3:01:30:0e:f7:eb:77:a0:46:97:a0:
31:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:87:cc:be:ce:13:bb:df:0a:2b:d6:e9:8d:6c:62:c8:0e:88:
59:2d:21:94:5d:b3:f7:02:83:fb:5e:7e:c0:46:2b:79:2c:bf:
93:e7:03:1f:84:ba:03:1f:16:80:4c:4c:57:d9:6e:8c:24:6a:
a1:e1:a9:27:52:65:ec:81:4d:a1:14:b4:bd:4a:92:76:63:c8:
21:9d:f0:bc:ae:a4:11:76:53:6b:65:5e:2b:75:03:c1:36:fc:
4d:ca:64:44:94:0f:b1:3d:3b:4d:92:7e:c2:9b:0a:62:72:3d:
45:4d:d4:9b:ff:de:bd:10:ad:3a:0f:24:92:59:7c:b5:32:08:
03:1b:58:27:5e:b6:00:30:56:f2:4f:49:5b:a9:55:4b:24:ae:
f3:64:dd:63:0b:50:0a:e5:52:cd:1e:58:15:5a:30:0f:b3:0c:
c0:d6:35:4b:37:ba:8d:ae:09:c6:41:7b:20:40:48:35:7a:e7:
b9:25:1d:85:f5:3d:cd:43:ef:90:e4:d3:89:05:f5:80:c7:8a:
e5:91:41:08:45:32:ad:d1:8b:07:b4:a3:ea:79:7a:86:11:ef:
99:30:d9:3a:9c:22:7d:8f:5b:c3:39:f6:52:1a:04:d6:a9:7a:
0d:5c:24:23:22:9a:42:c6:ba:f2:6e:f6:6e:8e:87:7a:2e:3c:
a9:82:92:bd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:52 2025 GMT
Not After : May 4 10:24:52 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3d:5a:fd:8d:80:f2:0b:27:cd:da:e0:d8:53:ba:c1:8e:b0:aa:
2f:f2:a7:95:0b:e7:f0:1b:9f:47:61:53:01:bd:48:e7:ea:89:
40:9d:6e:11:76:93:7b:00:d1:a5:29:a6:ff:16:1b:62:5f:8d:
96:48:7a:27:65:27:80:b5:cd:65:e2:19:60:39:51:05:14:b1:
1a:c0:07:ca:60:7a:8c:57:93:ba:08:56:44:42:a7:33:93:05:
92:c6:18:8d:a3:95:d7:8d:34:37:8a:f1:73:b6:1e:d4:ca:d8:
11:e4:67:91:24:ba:13:f4:30:94:3b:fb:fe:1e:ca:41:04:9f:
dc:ef:ff:cb:4e:35:42:54:40:7c:b2:b7:e3:6b:e4:0d:1e:d7:
d8:c3:75:7f:94:a9:48:ef:df:95:8d:d1:0b:a0:3f:c4:4d:6c:
fb:b9:42:d5:65:04:e1:db:d4:df:43:54:76:4e:4b:47:11:3b:
c6:61:d4:ee:3c:75:5e:51:cf:f1:ce:92:02:3b:42:15:9a:67:
c9:d5:ba:13:5e:df:9c:2e:2a:3e:94:00:78:cf:ab:64:6c:57:
67:77:3a:ec:0e:2e:da:09:ed:30:23:3e:25:34:bb:65:71:27:
a9:ae:b6:89:39:fb:f2:b7:65:f3:3a:2a:45:e9:65:d6:66:50:
ad:8b:8f:ef
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7935 bytes from beginning
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
3,104,956 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:48 2025 GMT
Not After : Jun 2 10:24:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:35:f2:66:cf:8d:b6:83:04:bf:9e:5b:f6:dd:
0d:6b:79:8b:60:54:9f:d4:ab:a3:71:ea:b4:1a:59:
fa:93:93:79:b0:1a:75:ce:d2:3d:05:88:f7:6b:1f:
e9:16:63:d3:ff:74:df:39:24:cd:5a:33:95:db:fc:
75:3d:46:47:ad:b9:83:28:3f:35:57:f6:e2:c6:13:
7f:5c:fa:4a:f5:f7:8b:eb:af:63:cb:72:eb:d7:fd:
78:a9:32:43:72:33:4a:8e:b7:20:f4:fe:c0:93:86:
c9:04:e4:fa:51:e5:95:dc:df:31:2b:13:9b:91:e5:
60:0e:8d:37:7a:dc:52:03:77:9f:89:c9:92:a5:28:
58:f9:b2:43:45:fd:62:38:0e:4b:75:fc:f7:11:cb:
e4:d7:f3:81:e5:8b:5c:dc:9e:ce:fa:87:f8:70:49:
eb:c4:00:8b:77:39:23:fe:78:58:e3:f8:47:3f:6f:
79:8d:6a:ba:35:88:fa:00:94:cc:b7:f4:f6:af:40:
bd:cf:6f:e1:59:66:15:5c:ca:bc:9d:63:f7:80:cd:
73:ba:1d:15:33:5c:b9:c7:96:2b:7d:2f:56:2e:85:
ea:86:4c:3b:c6:08:fe:68:7c:d1:21:b2:2e:3d:f8:
e1:22:42:7c:cd:a7:ff:93:75:38:a3:0d:04:5f:f4:
08:ab
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:61:8b:c8:eb:19:3d:9a:b4:72:d3:0a:1c:6d:07:9e:90:e7:
b6:af:b7:97:ee:e9:66:ff:af:6d:cf:b2:c3:ec:69:06:50:ef:
be:5b:bc:4b:b0:10:41:bc:51:00:d4:95:7d:aa:24:61:4b:9b:
8b:80:26:92:87:82:df:14:a9:ff:cf:50:88:4f:c7:a9:da:13:
9f:21:73:cd:eb:64:ba:11:a6:07:72:cc:43:3c:97:c3:ae:52:
27:27:9a:3d:a7:f9:10:4e:75:56:5f:8b:d0:ca:a8:48:46:4b:
27:73:3c:a0:80:f4:02:00:69:21:73:b8:79:4f:fe:c1:66:52:
bc:1b:b1:59:0f:28:a8:1d:05:6e:d9:3c:5a:ab:bb:80:32:2c:
eb:0f:ac:f6:22:12:7d:2e:f8:40:3d:90:11:30:fe:b3:3a:ff:
85:81:56:de:c3:4b:8d:d0:20:00:33:48:ea:b9:09:b7:23:04:
ec:9e:f1:2c:b0:d9:81:f0:db:a5:f5:61:40:57:d5:ce:74:47:
6e:0a:14:66:2f:f9:67:87:7f:43:4b:74:ac:b7:76:22:85:21:
5f:2d:41:49:6b:1a:a5:38:b0:26:54:74:75:9d:a7:dc:29:a4:
ba:1c:52:b3:f2:ca:78:8f:29:13:85:6c:ea:f4:93:84:79:6d:
cf:43:af:61
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:48 2025 GMT
Not After : May 4 10:24:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:72:c6:bb:1e:a6:cc:35:4d:4a:1d:0c:2b:e5:8d:3e:0c:0e:
63:21:02:80:25:be:56:49:37:b5:1b:b4:b1:27:07:6c:72:03:
8c:7b:46:b3:ab:0e:5d:d0:f6:8f:a1:36:3d:8c:07:b7:5c:20:
69:33:11:03:d9:80:73:89:27:ef:fb:ee:8f:2d:18:7f:dd:ac:
0e:0d:5e:87:c1:64:ac:1e:aa:e0:db:a9:c9:57:40:cc:c8:dc:
1e:a1:e6:04:a6:2e:b1:e2:4e:68:29:93:74:87:23:3b:88:62:
ab:af:40:e4:3b:b4:d3:7d:42:50:b5:05:ac:54:18:1c:47:38:
16:d6:52:5f:69:f9:9f:59:8f:37:85:d9:a5:d6:a6:c3:34:11:
64:31:d6:8d:af:2c:5f:d7:08:1f:02:df:c3:f2:cc:5c:6e:2f:
ce:8f:2b:81:9d:10:28:f9:8b:af:d8:58:63:de:44:07:7b:e9:
ba:d6:df:be:dd:a7:e3:98:a9:13:96:cd:ee:87:67:53:c5:a9:
bd:20:46:df:ef:f4:24:2f:e3:97:23:5e:3f:33:b7:3e:fa:6a:
e4:e1:db:ab:34:b3:80:94:46:f2:c3:83:22:42:7d:20:f2:72:
23:18:f1:0d:4e:74:33:3f:33:db:ae:6c:1d:da:a9:a8:ca:cf:
f7:f0:12:3b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3059 bytes from beginning
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
2,855,226 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:08 2025 GMT
Not After : Jun 2 10:25:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:b6:0d:2c:5c:7b:99:4b:d1:5b:9d:37:78:3b:
3d:9c:7d:45:ae:cc:1d:0f:df:55:73:ba:1f:8c:5e:
d8:32:42:65:49:98:4b:7f:5b:1f:4e:20:0b:61:03:
83:db:0d:09:ce:28:9c:84:16:61:f6:c8:2f:37:da:
58:f0:f9:80:9c:7c:cd:ed:f0:c2:f0:8e:35:e1:33:
8e:1b:16:35:0e:69:9c:1a:15:3d:7a:7b:66:4b:59:
e7:40:87:6a:a6:88:86:1c:1c:db:10:67:fe:35:94:
01:eb:14:80:a7:59:8b:b5:d2:f0:75:42:11:96:ce:
98:b2:e4:0a:dd:5c:0f:33:47:ec:d5:19:e2:f1:f9:
23:da:14:30:1d:f0:a3:7d:1e:a5:04:c2:75:f8:71:
37:df:33:4a:6a:e7:b4:65:e2:b1:d0:23:90:4d:de:
e1:fa:03:b6:dd:b8:23:d4:59:fc:3b:23:70:45:25:
11:7f:b8:2c:d6:52:cd:7e:81:38:93:03:2b:b4:09:
86:f2:f5:ea:e5:0f:e5:1b:4c:da:9a:71:6d:e0:7e:
ba:19:d0:7d:a6:d2:78:f3:7c:c1:42:2f:97:63:7c:
cf:a4:07:d9:bb:4c:a3:37:bb:13:c1:bc:a0:f0:d0:
d0:1f:7b:0a:ee:0a:0a:de:66:25:36:52:2c:95:3c:
95:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:ad:ca:90:2d:91:bc:5f:e0:25:20:a2:12:75:7c:16:33:1b:
78:31:a0:37:a7:fc:5d:04:bb:51:f4:da:fb:56:84:e9:56:1c:
fc:4d:28:7d:75:d1:87:d7:f9:a5:8a:c1:61:c7:60:62:5b:35:
e0:77:2e:f6:54:22:ad:3d:b1:b5:66:a0:a1:21:37:6d:8b:09:
61:d6:34:a9:2c:ef:54:a5:37:2e:8b:cf:7c:46:27:90:03:57:
26:2e:69:42:22:8a:66:cb:2e:da:6d:95:5b:6c:fd:99:b4:01:
73:8d:9a:d1:43:5f:51:50:16:1c:59:46:f1:e7:45:0f:08:e1:
e9:2f:7c:3c:49:8f:bc:49:50:8b:b3:ba:69:16:75:da:16:88:
64:d0:ba:30:4a:32:1d:6d:e6:79:2c:73:c4:b5:57:a6:5d:04:
e5:f5:b5:93:3b:91:77:fe:da:d0:e3:a0:06:2e:f2:af:91:65:
d0:6c:7d:50:76:2b:db:b2:4d:cf:1e:9d:4c:b0:ac:4e:b8:5b:
f9:f5:5c:bb:72:05:d9:56:7d:66:7a:c9:11:62:fc:51:ad:92:
fd:52:a0:14:70:f3:46:0b:6d:20:78:f9:a4:39:91:6d:fd:d3:
f6:b6:07:1a:31:f3:6a:e9:00:1f:e4:7f:c4:8f:3a:04:b3:82:
35:89:78:72
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:08 2025 GMT
Not After : May 4 10:25:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c5:a2:5a:2b:d3:85:fe:64:c7:08:2a:52:12:09:97:50:b6:ab:
52:db:91:c0:11:e9:ff:ce:56:12:31:d9:07:8e:3c:c5:d4:52:
2f:d4:51:13:0b:d5:63:79:67:25:a9:8c:9a:53:9a:6b:1e:65:
43:dd:de:1d:bb:1d:8f:26:15:25:f9:ab:bc:19:6a:2b:05:86:
0e:1e:42:bb:a5:5f:59:ec:06:25:5a:ba:bd:87:0b:a5:a8:43:
36:62:d3:5d:31:8f:ea:5d:cd:aa:2d:64:d2:a5:91:5f:90:e8:
3e:4c:2f:39:77:31:8d:03:4e:d6:47:1c:58:f0:0c:0c:aa:a3:
74:b9:c1:10:95:87:5a:62:9a:21:78:b9:2d:f5:00:3c:89:94:
b8:4b:00:87:c7:fe:7f:9e:de:53:72:99:c2:ea:f0:36:0e:04:
71:76:88:82:3d:7f:53:ea:0a:65:1d:94:56:e8:d3:8f:26:0f:
95:e5:20:3b:1f:6f:cd:9f:e5:58:2c:72:5b:78:57:e3:ce:f6:
9f:c8:f5:b0:85:87:e4:cb:4a:75:58:61:54:2e:cf:ed:b6:c1:
3f:bc:1e:ce:9c:e4:49:fb:6b:b5:8c:fb:4c:be:e9:78:e7:b0:
bd:5f:31:99:f6:45:5e:84:11:1f:e1:ed:90:bc:05:28:0b:05:
2c:6f:d2:57
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
Truncated 7935 bytes from beginning
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
3,108,683 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:42 2025 GMT
Not After : Jun 2 10:24:42 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a3:d5:b0:4e:4a:d2:90:32:da:26:0f:e7:8f:4a:
ac:77:f8:b8:1d:63:96:6c:fa:7a:84:8c:91:09:82:
c7:2a:b5:6c:91:6b:ee:a0:e8:6d:7a:13:04:1e:d3:
12:d5:e8:6d:82:c8:88:a9:61:8a:d2:32:b4:af:10:
86:86:1f:8e:ac:ad:6a:27:db:b2:66:52:07:ca:10:
8e:03:f4:76:c9:e7:9a:ab:73:65:96:a7:42:55:54:
0e:99:f2:e1:29:9e:85:ef:20:73:ea:69:c3:78:55:
26:b8:6e:99:f2:ea:e1:8b:66:e1:34:f9:9b:a7:e7:
66:3d:78:5a:34:52:58:52:82:63:9b:d4:9d:3b:76:
a1:b3:dc:3e:97:66:01:10:95:a3:71:a1:18:9d:f1:
c0:85:89:a8:86:f7:76:2f:d3:94:7b:04:c1:14:8b:
c2:38:92:9c:d0:85:d6:0d:bb:bd:43:eb:0a:82:1f:
fb:09:25:1d:08:c0:1d:d5:4a:bb:a3:77:98:78:c0:
55:0b:45:97:3b:47:6f:d0:f3:42:8b:02:10:6a:85:
9f:2d:1e:77:2b:73:a5:d4:0a:4d:95:52:08:72:96:
68:f2:2a:46:5c:09:1c:92:90:fe:16:66:46:06:dd:
76:37:c7:89:28:67:fa:38:c8:6d:2d:ac:79:cf:48:
35:8d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
45:2e:18:a4:95:c8:1d:50:3b:7e:70:fd:1e:ed:df:d3:e8:b4:
08:a3:55:c1:d7:34:26:ef:dc:f5:48:08:a5:c9:d9:93:1e:02:
85:16:e3:00:88:9c:2e:af:4a:43:f6:a7:9d:8f:88:16:89:04:
4a:e9:fb:85:47:23:74:2d:df:f6:93:2b:41:b2:56:cc:ea:1b:
e8:1b:ed:b3:22:4b:78:1b:9e:e5:4e:36:82:77:c2:69:4e:0b:
0e:30:d5:de:49:4e:0d:c3:9f:53:af:39:48:cc:5e:44:f9:69:
e0:c1:c0:20:6f:df:54:e0:3a:28:ff:39:56:db:f9:59:f5:22:
ac:7d:c5:0a:e4:de:f8:bb:bf:61:19:14:be:55:62:00:a9:56:
18:48:5d:d5:9a:67:db:e0:d2:a2:3a:a8:93:b7:63:94:31:9c:
79:0d:12:c0:2c:b8:56:40:b9:f8:3d:08:fa:c6:24:59:75:41:
5d:2a:8c:25:0d:c9:a6:51:ce:71:72:2b:71:c7:e5:c3:ba:39:
49:97:5d:1c:dc:10:e6:ed:4e:d8:95:f0:a8:d0:84:0a:35:0d:
bb:ab:a3:76:77:fe:bb:cf:86:09:84:ae:3f:ec:f7:77:76:1b:
46:f5:40:fa:13:16:a8:48:d2:96:f1:b1:4a:3c:31:dc:99:bb:
d3:85:66:49
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:42 2025 GMT
Not After : May 4 10:24:42 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
84:8f:3f:f4:cc:80:3a:16:e4:73:c0:e2:a5:08:b5:5b:57:39:
e2:15:33:9f:8e:ef:8f:0f:07:de:bd:3e:47:8a:09:0c:f4:94:
1e:c6:c9:ea:ca:0b:35:ad:29:56:7e:05:03:18:35:48:c6:9e:
6d:a4:5f:c1:47:42:ce:ca:e4:b3:12:66:d8:3b:0a:a0:4f:16:
32:29:f2:cf:64:8f:9c:61:24:b2:cf:e6:d7:b2:00:82:29:07:
2a:45:8b:ee:8b:fe:87:07:0b:3b:a2:8c:a3:3d:9a:3a:b4:74:
f4:52:a0:a2:8b:c4:d3:19:c8:a9:4e:fd:c1:4b:86:5a:6b:ca:
f1:53:c7:25:a4:99:c9:70:dd:2c:6d:e4:64:fe:d2:7a:71:d3:
db:be:41:5e:ee:84:b9:ee:ae:c6:69:ec:ed:d2:09:7f:e4:5f:
b1:b8:92:36:c7:f0:80:a7:a1:fa:36:c0:1c:f1:f8:ee:3b:54:
6d:a1:7a:37:98:be:16:7b:d3:81:58:de:81:2c:2b:d2:fa:33:
66:3f:82:46:af:28:49:f7:78:8c:df:b4:a2:e2:9f:97:c1:b1:
d8:89:dc:24:ff:6d:ac:28:62:84:b4:82:ea:22:2f:93:a4:5e:
9c:a6:c0:f5:5a:07:92:2f:07:d9:71:8a:e7:8d:96:84:57:fd:
c2:fa:a0:a8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
Truncated 3059 bytes from beginning
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
2,857,475 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:42 2025 GMT
Not After : Jun 2 10:24:42 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8d:43:cd:e6:32:8f:18:9b:a3:68:a0:ed:28:df:
53:42:e9:3b:42:e3:04:92:2b:61:a1:b3:08:3d:93:
76:b1:4c:75:35:0f:94:6a:6e:fa:6e:8c:f9:52:e5:
33:6f:03:ec:88:66:af:c2:2d:e1:91:59:bb:9d:17:
f4:5c:cb:fa:2b:78:a4:e8:9a:73:6a:6d:e6:13:e6:
fd:45:2a:22:96:e3:60:5e:64:3a:c1:98:39:a1:07:
52:a1:d2:ba:00:64:99:1a:a4:94:92:bc:19:f8:42:
7e:62:99:96:98:8f:35:fc:dd:a7:53:56:ff:83:d1:
41:37:44:e6:ff:04:6a:d3:fe:4f:5a:db:e7:e6:1a:
d5:bd:77:f4:75:f7:5c:ce:4c:c4:12:24:c1:77:81:
47:7c:92:1d:d3:6b:60:a1:f8:c5:c0:68:bf:5f:be:
7b:fb:73:7e:98:e2:a0:83:27:72:2a:b2:aa:64:3c:
a1:b3:7a:a4:2e:c2:4f:79:dd:30:c4:79:5b:5b:4c:
f9:8b:56:0a:2d:b3:71:fc:02:ed:8e:80:77:70:01:
a8:e3:80:84:4a:7d:16:08:fc:be:4d:42:25:60:f2:
59:2c:5e:90:4d:08:d8:13:ca:54:d7:a6:e2:e6:15:
dd:53:22:64:df:bc:b5:d2:a4:92:f3:3c:0f:00:ba:
3a:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:1d:13:30:19:13:0f:8b:8c:6b:19:c0:a7:f5:85:04:60:fe:
36:3e:1c:33:1a:18:aa:fd:8e:1f:71:0b:85:d3:f1:67:5e:a8:
09:07:eb:88:71:fa:c1:34:3c:2c:9b:e8:d4:69:5c:36:53:52:
9d:58:42:b9:e0:96:86:bc:3d:80:e1:8c:af:aa:b7:60:d1:0f:
b6:3d:7f:10:18:84:1b:e5:95:c8:87:e1:a5:34:c7:23:05:c4:
54:34:8c:80:74:01:e8:ca:22:e3:75:9a:b3:be:92:8e:6a:d9:
89:b2:87:b2:ea:b0:69:a7:e8:52:4d:f9:4d:53:15:59:d2:b3:
36:fc:70:0a:1a:b5:40:f3:91:13:6b:ef:84:4b:f4:af:4c:1f:
a8:84:d9:98:1a:b5:13:40:3c:f0:a2:a3:02:dc:a7:21:79:62:
c2:54:b5:30:38:6b:af:f9:49:ec:f0:25:68:d2:dc:05:28:bf:
51:8a:9a:40:57:53:af:b6:4c:91:bd:d9:a4:77:c4:ef:dd:3b:
d3:60:2f:2a:74:6e:59:f4:67:ed:ef:53:45:56:fb:90:45:24:
ea:4b:07:38:bf:85:77:75:04:9b:24:bb:81:fd:fe:5c:45:09:
62:76:05:b4:cd:fe:06:36:76:67:e3:38:82:2f:f3:7e:cb:91:
0c:c5:c1:e6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:42 2025 GMT
Not After : May 4 10:24:42 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
46:87:24:14:ef:37:3e:78:00:11:3d:67:20:15:73:a5:3e:44:
07:79:26:ce:40:17:98:2b:8b:46:da:56:a0:fb:f0:06:25:9c:
2e:57:58:d5:ef:ea:f5:ef:c7:26:f1:67:d8:14:5c:11:e8:fb:
20:3b:ff:a6:6d:f0:b9:62:a8:b8:08:26:aa:08:4b:15:69:d5:
16:97:c8:42:1c:47:ea:67:9b:3c:b1:e4:e6:8d:89:d9:80:97:
ba:34:ef:d6:dc:a0:65:b2:69:93:cf:d6:ae:21:cb:ef:1d:c9:
b7:aa:bd:98:de:6c:35:24:01:0e:ce:8c:e9:c0:87:0f:04:6b:
89:32:5a:57:e4:1d:d9:db:e2:e3:6a:f4:11:db:0b:c0:d1:e8:
d5:79:47:d6:eb:aa:c3:fd:32:9a:ee:5b:ba:3c:f5:bc:49:55:
f4:5b:20:67:5d:d1:07:e7:d1:d2:35:4b:5c:81:80:f8:86:27:
b7:3a:5c:c2:c9:9b:c0:b5:97:fd:8a:77:cd:8a:f1:a6:11:04:
a5:1f:23:be:d7:10:5d:b1:f0:ae:1a:ea:8c:58:15:3f:46:40:
ba:ce:0c:61:ad:2d:05:02:8c:06:64:b1:32:44:1a:d0:f8:63:
de:3b:1d:1e:27:a8:a6:df:49:3c:3d:e1:eb:c6:73:aa:e3:2f:
b8:bb:e9:f8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
26,991,236 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:58:53 2025 GMT
Not After : Jun 2 10:58:53 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:b9:70:1f:19:96:ca:f0:23:97:a9:d9:41:12:
d7:97:ee:0b:24:88:59:4b:d7:6e:30:60:2f:18:a8:
9f:1c:4c:68:71:4c:b7:8e:80:13:59:bc:1e:4f:45:
eb:ce:e2:73:d1:f4:da:62:ac:9f:09:97:8c:f3:bc:
ea:0c:0c:ef:6a:26:41:a3:d1:c1:70:ed:66:8a:d1:
cb:c3:a8:3b:90:43:7e:1e:7f:10:31:a6:53:be:14:
38:e8:cb:0a:e9:ee:4a:be:7b:12:5f:12:45:98:0e:
07:df:c0:b0:f9:2f:19:18:44:64:95:5f:c0:d4:01:
fd:e0:1b:b1:e4:4f:cd:d5:ae:71:6d:0a:64:51:fc:
6a:a2:18:8c:1b:5c:07:d3:2b:0e:63:2f:06:68:8d:
9d:0d:e2:c9:fe:e0:2f:3c:c4:4b:44:ec:0b:cd:82:
71:30:ba:0e:dc:6c:cf:4b:68:35:34:e8:a9:36:b5:
df:20:f4:a1:ee:cd:2e:6e:f8:3a:df:b0:f8:4b:fb:
fa:a7:43:87:1d:84:35:13:df:85:97:09:6f:d2:b2:
8e:19:25:89:fb:a4:2c:9d:92:c4:cd:cf:3f:6e:68:
8e:0d:ce:97:9e:2f:4c:45:02:93:3b:b5:a6:ba:b8:
31:b1:91:da:d9:40:f9:71:d4:34:60:3c:e4:cc:79:
61:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
33:f7:1a:41:e5:0f:bc:af:bd:0b:5a:0e:86:7e:d6:0d:91:6d:
46:3b:67:87:8e:8e:b3:cd:86:63:31:0c:8a:c4:92:76:e1:11:
73:fc:c2:0f:04:ad:13:59:9d:d7:91:8b:ae:16:1c:42:77:02:
37:8b:00:37:9f:85:0e:1e:3f:66:fb:22:b4:3d:2e:ba:1e:15:
1c:b1:30:97:b0:23:f7:2e:1a:3d:a7:a6:fc:6b:34:b1:36:58:
91:e7:73:b7:b6:3f:a4:60:c2:10:07:46:49:ff:79:04:74:5c:
29:56:ec:74:1f:b4:bb:14:7e:27:aa:4d:fd:63:98:79:ad:61:
75:e2:f2:cf:0d:06:41:1e:13:2d:2b:0c:8a:06:22:9f:82:0e:
48:ca:12:5a:ac:4e:4f:f0:6b:bf:19:1b:63:71:1b:97:01:3e:
69:2d:20:23:97:c7:59:c7:ee:93:3f:25:b1:ca:6b:32:f2:50:
e8:88:ba:1e:d1:18:cc:e5:8f:d3:8a:2f:7c:0c:9b:3c:64:46:
ba:54:da:07:3d:ae:c4:1c:88:41:2a:f0:66:11:47:0c:3e:bb:
ee:c9:f0:2c:a4:83:ae:8c:05:6c:cd:75:40:10:a0:5d:bb:0e:
c6:71:2f:dd:de:37:22:33:c9:d3:bc:cc:f4:af:94:c9:46:7f:
7a:11:ff:b0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:58:55 2025 GMT
Not After : May 4 10:58:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:e9:42:49:03:8d:38:b8:eb:d4:35:f3:7d:ff:ce:55:48:df:
b0:ee:cf:fe:4d:80:ec:8e:77:27:ee:28:eb:38:df:65:4f:62:
51:6a:9a:24:57:35:3b:35:8e:92:6d:96:db:80:4e:0c:44:4b:
3e:c8:ee:cb:5a:5e:17:53:9c:97:6c:4d:43:43:34:a5:e3:9f:
f0:e3:16:89:f6:2f:a8:7f:16:c3:74:6c:82:61:c0:e4:f8:d7:
1e:cc:da:5a:00:c2:7e:2d:8d:c5:48:41:e9:ef:ea:31:46:a4:
e1:b7:a0:d6:3b:25:8c:96:5a:32:a9:9b:7a:2c:14:ef:9c:c4:
7a:11:43:0a:d4:af:c0:46:cf:7a:e4:41:30:a3:ff:dc:5a:c5:
36:42:df:7a:1e:c7:21:36:47:83:37:6d:3e:98:ec:5e:42:a2:
db:89:7a:f0:23:2e:b3:84:f8:05:68:d0:8f:31:24:a9:2a:71:
86:c6:a9:c7:53:0c:3f:4d:53:d5:d2:e7:8b:cd:40:3d:b7:17:
8e:9c:87:b2:78:7e:63:03:29:f1:1a:aa:6b:ef:df:38:fa:60:
3c:ea:90:c4:ef:18:af:af:ee:fd:38:f7:1d:ac:a5:3e:99:ec:
e6:e8:30:64:34:94:d7:97:6d:61:6a:d8:e2:64:dc:bb:c3:0b:
6e:38:f9:a6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,512,775 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:56:19 2025 GMT
Not After : Jun 2 11:56:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:b9:bf:16:6f:1e:58:3c:d9:a1:cf:87:29:c0:
18:eb:67:06:e7:23:23:62:fa:1e:cd:39:a9:7d:25:
2c:94:b2:53:52:2b:a3:2e:ef:3f:2c:be:64:e6:18:
c9:83:0a:36:31:0f:40:4b:8f:25:eb:1a:68:8c:86:
6d:c4:83:01:00:f4:03:9e:67:e9:21:27:8e:8f:08:
80:c7:6a:4e:20:72:a8:78:2d:20:83:05:dc:f1:32:
63:f3:fb:d2:7d:07:74:5f:e4:5c:ea:94:4e:0d:f0:
a5:a1:d5:b7:9e:ac:78:df:99:15:b8:46:60:46:d3:
97:6f:73:4b:a7:d5:3a:16:10:6f:a8:e2:9c:b9:7f:
54:0a:b8:de:f5:f0:bc:b1:58:40:06:52:4a:97:84:
19:b3:d2:c1:e5:e2:e0:4a:14:e5:4f:a8:d8:e7:ce:
4b:01:56:26:07:69:94:33:cb:07:55:9f:0f:eb:59:
8e:c4:0b:56:a6:92:8b:ae:ca:ab:d8:49:aa:c6:d5:
7e:83:d3:e1:9c:5d:3a:e1:bd:6c:28:25:4e:74:86:
fa:0b:17:72:66:2a:d4:d8:54:59:75:3c:bd:76:96:
2b:9e:3a:09:03:51:c5:8a:1f:a1:64:8c:15:af:6b:
32:1e:59:9e:db:94:03:91:f0:1a:97:24:8d:55:3a:
8b:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:34:d1:b2:93:c4:d1:06:dc:1e:33:15:dd:d3:56:24:15:f8:
9a:cd:3d:42:af:b8:6a:44:dd:70:d8:d3:f0:81:1d:a7:64:47:
23:0f:e7:33:fa:0c:66:82:f7:21:86:3f:62:78:fc:1f:72:c1:
e9:1c:c1:4c:9f:2c:96:60:04:31:53:b3:e6:7a:e5:cb:4d:1c:
7c:03:07:3a:5b:47:29:57:68:fc:13:d1:60:cc:0f:cc:e4:81:
47:c5:f4:fb:30:8f:d5:30:ab:e1:bc:c5:73:84:97:20:2d:a7:
f0:23:c7:e3:c5:f3:46:ba:44:5b:b5:d1:65:2f:99:fc:96:80:
86:14:a2:57:94:c8:39:9a:4b:0d:cd:34:14:85:f6:cc:64:a2:
3d:57:b0:91:13:54:6d:71:97:64:da:fd:63:76:21:9a:38:86:
55:55:62:a8:db:f9:ed:86:62:2a:b3:e0:75:9a:ff:52:7e:b1:
86:ae:6b:5d:62:b5:87:10:ee:d4:5b:87:f8:f5:d2:f5:bd:45:
70:18:4f:66:e5:81:ff:8d:a5:46:04:3e:0b:6b:09:83:b9:f8:
f9:e1:8d:9c:47:6c:a5:4b:61:92:fd:d6:98:4d:32:cb:82:45:
47:12:e6:35:c4:f0:68:c9:73:87:29:75:14:f6:07:83:c2:22:
18:39:c8:d6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:56:20 2025 GMT
Not After : May 4 11:56:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
27:58:5b:38:dd:b2:20:92:ee:e7:54:7e:dd:ce:c6:e2:90:75:
d6:ff:62:5a:d3:e0:fe:35:04:91:88:fd:1e:60:91:86:8a:e6:
40:13:d4:1a:3e:a2:17:81:64:7e:7a:4d:cc:42:d1:17:d5:1f:
f5:72:18:04:0f:40:d1:a6:f0:af:b8:31:d0:3c:71:7e:c7:92:
57:8f:34:6e:3f:1a:16:93:dc:11:8a:7f:ac:1c:ba:0f:52:11:
7d:e7:64:ad:5c:42:54:ae:c9:4f:42:5a:b0:3b:3a:f0:2a:09:
42:8a:00:0d:0b:c8:ae:97:f1:8a:4a:da:ed:ad:ef:45:66:19:
ad:f4:28:5e:81:79:07:be:20:a0:3f:c6:d4:4f:af:aa:ad:5d:
a7:50:8b:79:bf:2b:98:e2:7b:5f:6a:bf:79:39:26:f3:6c:79:
30:48:a4:f1:c9:8f:3f:2f:0b:65:b9:9f:27:ec:0a:ee:44:ff:
43:0e:88:2a:e5:eb:3c:99:b6:6c:01:bf:ae:a0:8f:7a:4d:8b:
2b:42:09:12:8f:f9:76:fb:3d:bd:68:0e:39:7e:d8:ad:87:f0:
f7:53:70:44:3c:27:8e:2e:e6:c9:0c:96:9f:c7:3b:ac:8f:83:
d9:6d:c2:ca:59:7f:9a:dd:c5:74:3d:26:9c:05:5e:bf:02:cd:
f3:c9:bf:81
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
Truncated 8023 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
27,113,359 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:55:49 2025 GMT
Not After : Jun 2 11:55:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:ca:ae:9a:6e:70:87:48:a3:2d:7c:a7:e5:14:
00:12:dc:ba:1a:6a:54:67:9d:8c:82:41:db:2f:9d:
b5:21:d7:1f:6a:e1:27:de:a1:42:fb:ed:ab:4d:5e:
a8:9d:fb:2f:20:88:7e:06:c2:0f:62:ab:c6:79:94:
55:29:56:3b:c3:14:d3:2f:3e:72:41:73:f1:bf:3d:
3e:7c:84:00:70:69:6f:96:c9:31:e6:53:50:d7:49:
ff:4a:b9:18:21:de:8c:77:f5:f6:7e:60:f1:45:f2:
6c:64:7f:1c:2c:f6:6e:e9:68:43:5b:56:64:5a:49:
bd:57:31:f5:a4:ed:78:08:e5:b5:f4:94:a3:13:f7:
79:50:14:99:e8:e8:70:88:0d:32:23:79:46:b2:62:
6c:be:ca:36:b1:60:60:36:8e:a8:10:e1:d8:73:84:
f4:17:5b:1a:d1:9e:69:f8:28:79:bb:b3:50:6c:2f:
2c:da:12:0e:18:07:2b:ed:26:b1:49:47:be:22:6f:
00:ca:ca:cc:72:ba:f9:12:c9:fd:49:78:5c:56:f8:
ad:c2:e7:62:e8:da:c5:aa:81:79:e8:69:87:04:79:
30:7e:e8:39:cf:85:a8:f6:fd:df:62:dc:b9:87:b1:
0e:43:45:6c:ed:77:7c:64:ee:c7:2c:5c:66:ad:15:
12:99
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
74:d5:1f:76:b3:8c:77:f4:cf:2b:4f:60:0c:45:64:8b:15:d4:
fc:e1:4a:28:4d:cd:cd:18:6e:6b:a1:7b:82:47:78:ed:e3:d3:
9a:ff:db:26:db:92:48:d3:e9:b1:d2:49:0f:df:c5:98:25:25:
1b:97:7b:41:21:e2:ea:b8:2f:b0:af:0c:3a:76:24:f0:03:07:
59:fa:1b:3f:b1:b3:42:fd:10:20:c9:5b:4f:c6:b0:94:15:c7:
98:61:dc:a8:55:8e:bf:f8:63:7e:90:14:4f:20:f6:f2:60:df:
d0:dd:02:31:57:b1:d3:73:93:d9:1a:c0:83:c4:d8:af:67:ef:
22:2e:33:94:55:a4:94:39:14:54:9b:ce:fb:04:a6:3e:0e:e4:
8c:96:4e:71:47:b8:15:1d:c3:7b:e1:a2:d6:a1:08:e9:f9:2e:
cb:5b:81:ee:67:c7:7f:f8:24:bd:59:ff:0f:be:c8:80:e4:c3:
ce:67:50:e7:bf:88:d5:96:2a:9a:61:2b:db:e5:03:59:6b:66:
49:05:5e:83:a1:c6:95:64:45:23:0d:4a:f0:62:e1:86:67:31:
37:f8:d8:7b:d2:02:38:27:57:96:39:16:9f:18:ff:cd:e2:3e:
ff:9d:47:a4:48:0d:e6:51:0a:ff:3a:f7:2e:b8:52:00:b2:68:
6d:8b:05:82
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 11:55:49 2025 GMT
Not After : May 4 11:55:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a1:7a:66:00:6c:48:e3:5d:d2:e8:0f:04:b4:82:de:fb:f0:09:
d5:5c:82:4b:cd:4a:cc:84:f7:cd:e4:24:19:31:5c:59:f8:a2:
2b:c8:fb:5e:bf:2a:38:61:93:48:d2:c2:37:fc:68:d1:64:15:
90:f6:0a:71:59:d4:0f:0a:db:2f:b2:27:ed:75:7c:af:30:2c:
90:df:46:ec:86:cc:c3:0c:85:cc:d8:cb:eb:95:4f:ba:2c:6d:
82:74:6e:58:5d:94:f6:2c:ca:ce:1a:a4:c9:4b:aa:78:b5:02:
aa:5d:42:cc:b9:29:6e:14:49:8e:35:8d:c4:98:01:19:b4:29:
ab:67:ee:b2:7d:20:21:6a:88:33:b4:ed:c1:e9:28:71:8a:f9:
61:d3:6c:67:b7:09:d7:5f:3f:bb:1d:ae:43:2c:12:c5:88:3b:
56:d7:b4:e8:8e:7a:19:dd:e7:b6:1e:5a:a2:60:f8:66:97:fc:
8b:32:e1:ef:3d:56:cb:aa:80:77:50:89:7a:0c:98:5a:96:10:
f8:ca:f2:db:da:39:ce:da:e1:4e:7b:58:02:f3:f3:81:b6:1e:
5a:56:c1:5e:91:2e:6e:96:63:c0:3a:c4:08:dd:a7:71:fc:19:
7f:32:c0:f3:3d:eb:81:7b:8f:fd:c4:c5:1a:f2:67:71:e2:69:
0f:17:37:18
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.01s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,648,721 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:59:20 2025 GMT
Not After : Jun 2 10:59:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:db:35:d4:21:3c:94:28:84:8d:c4:10:14:3d:d3:
0f:76:60:33:66:bf:09:b3:36:d1:d0:dd:01:c0:24:
3a:1c:36:ef:0d:2f:5a:a1:8c:49:4a:d2:34:83:fb:
01:67:5e:86:eb:e0:35:43:5e:37:c0:84:5d:ac:26:
de:b6:18:65:49:d6:2a:47:a7:96:d3:b3:74:6a:a3:
b9:d9:2c:d5:89:89:fc:ae:f4:93:9f:c7:24:97:34:
d6:ea:e4:ea:fa:54:24:e6:92:97:19:54:bf:e9:db:
9a:f5:87:56:e2:09:47:4e:36:db:13:9c:4f:9c:6e:
e7:ed:ec:e6:20:07:bf:0e:4a:1b:f1:ce:0e:23:43:
00:9f:13:59:ec:1d:b6:bf:2f:c6:57:08:93:9d:97:
8b:4c:a2:3f:5c:c8:b0:15:fe:c8:7d:6b:11:da:88:
69:5f:aa:2c:48:59:b2:ce:60:ec:0b:5b:28:2a:0b:
c9:de:95:0d:6d:4a:79:73:50:0a:68:85:73:90:96:
19:2b:f7:e6:83:c0:8e:1b:2f:fd:9b:41:b1:66:26:
2c:0b:0d:0d:40:79:31:51:81:46:5e:d3:f7:f1:34:
a5:f0:94:f6:eb:d7:e1:d8:f9:3e:a1:b0:ab:7d:a4:
e6:bb:0b:cd:da:c1:9a:d5:11:0a:4e:ee:11:cd:60:
a9:9f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
05:70:77:df:79:d7:f5:2a:cb:7b:5b:3a:a2:8b:c3:b5:d6:13:
7b:d6:c9:76:d4:71:49:95:55:33:f1:ea:c0:0b:4d:a9:56:8e:
e7:a8:98:aa:91:4c:0e:0d:c5:56:74:18:37:57:db:73:a0:f0:
67:cb:71:f1:3a:5e:52:41:78:a3:f0:c6:93:9c:11:b4:c2:92:
62:23:68:fb:e2:86:ee:eb:37:1d:42:d5:ab:5a:30:63:6b:fd:
d5:65:e7:1e:17:db:65:80:f9:cb:11:c7:3f:c9:82:f0:d2:53:
7b:36:b8:5e:4d:6c:3e:92:85:09:a6:ce:7b:25:b1:e0:af:16:
a2:79:1f:18:73:d0:d3:8b:11:db:6c:4c:3f:f6:94:4e:e7:dd:
9f:29:21:e1:f4:3d:d6:70:c6:00:b9:c6:82:9b:04:cd:b7:57:
ef:95:24:8b:66:b3:de:fd:a0:9f:ca:d7:2e:00:2d:9a:fb:cc:
31:61:4b:10:04:76:7a:eb:82:52:d1:1a:6e:77:c9:93:8b:7c:
eb:47:a7:7e:d3:df:a5:a7:04:56:47:5f:17:9b:80:a7:56:73:
fa:fc:fe:c8:c1:de:5d:a2:5d:26:5f:aa:0f:a8:7b:1a:d3:f6:
af:28:cc:5d:1c:0c:d6:c9:b7:9b:37:81:f4:ba:f0:e5:aa:5d:
25:44:d0:53
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:59:20 2025 GMT
Not After : May 4 10:59:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
97:cd:19:65:fe:2f:f1:2c:ce:04:d0:ab:e1:69:34:ba:45:39:
b9:79:7b:f5:04:2e:03:d5:81:33:6c:38:b9:41:cd:8f:ff:bb:
e1:8b:44:99:be:2b:aa:03:4a:42:96:74:b2:bc:42:12:b9:a8:
6d:b1:9e:2f:ec:4e:9c:e8:72:cc:bd:8a:4e:7b:59:6a:85:7a:
a5:7f:0b:33:fd:b4:de:f4:f6:d1:72:77:58:70:92:7e:c7:bd:
a2:76:36:c9:1c:a8:9b:56:93:d8:48:bf:cc:90:5d:07:bb:28:
ab:50:2d:19:22:07:2b:03:f6:b4:64:b2:85:2a:a4:eb:29:02:
f3:f3:4f:75:2f:37:6d:d4:86:5c:16:cf:b4:63:32:a3:55:9e:
2c:af:f3:72:6c:e4:d4:0f:fd:c5:7c:7e:98:ce:1a:82:b2:b2:
eb:ef:8a:57:c2:be:82:0d:ed:41:ae:64:77:f1:43:d0:2f:a3:
bd:12:b7:79:aa:c0:b0:61:93:e7:b0:ee:c2:69:7c:53:69:2a:
9b:ae:09:49:97:8b:4d:33:6c:e7:28:04:e5:59:61:62:31:a3:
eb:fe:79:af:3f:5f:e3:97:93:ae:5d:f7:c1:a0:75:11:3b:59:
de:4f:71:6a:bf:eb:a9:a6:1a:ef:56:09:05:1a:93:d4:b4:48:
0b:2c:7d:7e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,739,665 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:57 2025 GMT
Not After : Jun 2 13:31:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:93:89:82:77:7e:f3:29:b1:f6:6c:ba:9c:f5:b0:
a0:66:71:e2:1d:af:bc:8d:da:92:7a:a2:e1:34:62:
4d:ff:cc:d3:c1:ea:12:8d:8a:86:94:9f:ae:ed:0c:
3d:d5:82:31:eb:74:87:f3:00:d9:20:32:6d:a1:8f:
45:a1:73:a2:b5:3e:fc:a7:63:73:53:bf:ad:2d:9f:
78:a9:0f:2a:a7:41:91:0d:9b:fc:df:b8:34:45:ca:
f6:a8:c1:0c:6f:aa:82:c5:f7:db:25:62:77:46:e4:
ce:49:ba:c4:56:61:dc:ca:c8:da:92:1d:dc:ec:05:
3a:e9:ec:95:62:5a:01:0c:d7:59:f0:26:d9:0f:9f:
29:38:ce:03:0e:6e:ce:7f:26:c3:1e:6b:cf:d5:5f:
16:3f:f7:c1:5f:2f:c8:be:a7:c8:e2:ac:60:54:6b:
03:72:33:f6:44:bb:6d:f1:1c:8f:35:6a:1c:7e:92:
6f:6e:4c:ac:bd:3e:2f:08:57:ee:58:63:fb:66:37:
24:27:47:e4:7c:13:d4:66:0b:f3:2d:5f:4c:8c:76:
ef:64:bb:5b:9e:6c:67:9a:35:a2:10:ea:f9:39:30:
e0:9e:6f:44:ce:5a:31:8f:89:40:f3:80:3f:0e:5c:
de:8d:29:bf:dc:76:bf:14:0a:e8:5b:10:8a:39:62:
c2:ff
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:24:13:84:a1:35:d5:b2:c0:a3:14:cc:b6:75:01:32:f7:4e:
c0:f1:5e:36:5e:d6:7f:6b:8b:e4:a9:ba:c0:7d:ab:3b:e0:77:
bd:d5:b0:0d:3f:5f:af:b0:28:7e:0e:36:c3:ed:7e:a2:fd:8c:
13:a3:fa:d8:02:39:7c:fe:b5:39:5b:8f:05:8e:ba:0c:97:14:
b4:d8:03:f3:96:f6:03:7e:06:28:4b:a4:4d:70:9b:7f:32:ee:
8d:f9:c1:a0:8a:18:74:af:97:a0:40:73:70:42:7e:4e:2f:8f:
a9:c6:7b:89:39:d7:18:f0:68:39:23:df:b2:e9:04:59:53:df:
1b:23:a1:fa:37:b5:5e:f8:df:30:26:ba:bd:24:c0:b4:34:6a:
cd:5a:ac:b0:cc:5e:9d:ac:85:63:77:41:86:e9:d6:94:eb:69:
1a:2d:31:22:45:73:e3:89:4e:d7:b8:1e:ec:e9:38:3e:e0:c3:
cf:0e:9e:a3:df:09:fa:bd:58:78:71:42:3e:ad:d3:2c:3e:ad:
aa:0e:19:1f:3c:70:2a:f5:02:b9:df:ba:78:d5:15:a2:76:91:
f9:3b:81:bd:5f:91:ad:b8:f4:ea:ae:c5:fb:85:2d:68:e2:a9:
ea:4f:71:7e:e7:29:38:6a:17:fa:39:4a:f1:2c:10:5e:c6:b7:
3d:09:90:4e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:58 2025 GMT
Not After : May 4 13:31:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0d:05:98:a6:5e:40:50:34:e6:f4:62:c7:a2:ae:1c:20:d2:3d:
63:50:8d:99:35:15:c9:cd:f5:c9:47:f3:92:cc:f1:d6:95:15:
cf:b7:cc:06:40:bd:03:cb:80:98:bc:0e:e8:d4:32:de:07:84:
e2:13:9f:34:42:51:21:1b:b8:67:0d:9c:31:25:01:77:29:f8:
62:63:d6:46:05:b7:9b:c4:6a:3d:ba:92:70:21:ed:27:11:cd:
41:6a:c6:5c:ed:a0:d8:f7:f9:ae:89:ea:29:50:47:76:fb:22:
04:5c:ca:4a:79:26:dc:4b:a3:b9:16:61:90:01:5d:a2:2a:ea:
bd:58:71:3a:7e:b8:c1:48:5b:cf:78:9f:e8:58:c5:4b:87:28:
29:23:88:ac:93:05:d5:68:a4:76:e4:77:0f:8b:d0:14:6e:a7:
92:e6:4a:58:2e:79:0e:1e:dc:1c:4a:96:0f:41:b7:4c:73:10:
7c:b2:bc:12:d2:db:4a:eb:40:44:f5:20:0d:e3:38:04:3b:4b:
3c:6e:40:a6:47:c0:52:28:39:86:ac:e3:bb:82:41:38:60:11:
96:f6:59:ff:5f:62:cc:87:7c:ba:01:3b:49:9d:28:e8:76:67:
a8:ad:b1:60:5f:0e:a0:ae:1d:db:54:d7:e2:ba:0d:83:19:1b:
5a:0f:c1:98
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,244,592 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:17:30 2025 GMT
Not After : Jun 2 14:17:30 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9c:07:a1:e9:6f:dc:e1:29:97:9f:a7:f8:6e:19:
42:77:d1:a4:b3:77:b4:dd:59:03:87:c3:bd:ba:4e:
2f:ee:03:30:7d:c5:e1:01:39:09:b6:71:10:43:18:
2e:cd:46:40:d2:83:ce:83:4a:f7:9c:59:1b:53:9c:
32:83:40:13:fe:d8:34:a1:0c:6a:f5:e8:0e:da:e0:
9c:fb:3d:7d:46:37:66:74:3b:3a:8c:6e:20:00:1a:
f0:8b:52:2b:54:91:7f:b8:4e:ac:8b:3a:31:a5:ff:
fa:4e:6e:78:3c:d3:39:9d:49:ec:b8:3f:7f:96:b4:
26:aa:ea:98:49:40:56:c7:30:31:f1:5d:d4:3d:e9:
9c:ef:3f:5e:85:aa:4c:ed:be:de:20:11:91:1b:cd:
cb:3e:8b:a3:db:ba:bf:0b:6d:07:3c:6b:e4:f3:8a:
53:f8:fd:2f:94:29:13:60:a3:0c:64:39:a4:cf:cc:
3c:fd:2e:11:7a:b7:67:28:e4:61:c7:d3:15:f5:6d:
45:08:c4:62:ec:b1:96:67:66:0a:12:c3:24:25:1e:
ec:5f:fe:80:2e:43:3a:e1:f7:08:7a:80:f9:0a:02:
90:5d:c7:46:4a:70:58:2e:9f:e4:df:1d:78:1e:31:
7c:a1:cc:3d:7e:51:00:c0:33:f0:28:dc:c4:ff:ab:
ef:c3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
79:f4:23:71:95:ec:c1:e0:64:3f:5b:9e:4a:74:8c:a0:d1:27:
84:80:d8:45:80:5e:e9:7e:f6:b2:71:2c:8c:c2:cb:c0:85:30:
ff:99:43:77:ba:59:06:f0:6b:a1:48:f1:f4:de:c1:fd:1e:18:
c0:c3:62:b0:c4:a0:d1:32:97:9c:98:fc:ac:de:3c:89:6b:e4:
f0:3b:5f:9e:b6:10:27:cf:0f:b2:76:ba:67:79:ea:17:04:9a:
6f:06:c7:fd:68:dc:82:a7:0e:6a:51:55:45:19:b0:c7:5c:bf:
e6:d9:09:7e:c1:fa:2b:81:be:e6:fd:25:4b:a0:7d:df:57:bf:
8a:0a:62:68:4b:a5:5d:ee:0c:c1:49:91:66:67:95:10:81:1c:
54:db:4a:a0:77:25:c0:c3:bc:e3:f4:cd:b4:e0:d2:f3:46:39:
d3:ca:13:78:2f:35:f3:32:0d:14:d6:ce:fd:9b:34:de:7b:67:
ed:40:21:7d:f3:18:b6:13:3f:85:9f:14:cc:4e:94:f6:f0:f9:
2d:f5:b7:2f:51:3d:ce:90:d2:16:68:6d:d6:36:75:38:0b:b8:
c1:c2:65:94:42:fb:13:aa:df:7b:38:8d:de:28:61:8a:f6:81:
5f:64:32:1b:ff:a1:22:56:93:77:e3:07:e5:55:f3:f6:61:b5:
ad:23:9b:81
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:17:31 2025 GMT
Not After : May 4 14:17:31 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:0e:43:8a:0b:97:a1:0c:ae:9c:49:d8:f3:5a:a0:d6:0e:df:
5e:38:49:f6:b9:29:c4:d4:71:a7:81:dd:78:3c:4c:f2:2d:82:
2d:15:97:ab:aa:df:20:b3:ba:5a:27:8a:9e:86:1b:45:3d:e1:
61:1d:3a:7e:34:a5:05:4f:20:4a:3a:5c:d3:c5:58:b4:08:9b:
5c:be:c9:50:0d:75:47:d7:88:3f:29:34:fa:1d:bd:28:a5:9a:
00:c0:ca:02:9d:4a:b1:1f:d9:b0:05:63:de:e6:99:ce:2f:0e:
01:08:8b:24:bf:f8:a1:30:96:c7:ed:b5:41:73:bd:2e:11:5d:
44:3d:b1:e4:dc:f1:39:2c:21:ec:c9:a2:70:3d:33:96:72:dc:
f4:43:99:03:4e:4d:fe:3d:c9:b2:0b:eb:46:53:38:0e:17:35:
76:9d:30:b8:7c:12:8f:23:50:f2:4a:11:56:01:68:53:d2:d2:
25:bf:bb:e6:2f:6e:8e:81:13:56:6a:dd:48:14:41:ff:10:64:
7e:2c:08:e3:e0:13:39:33:fb:4e:43:75:5b:15:fd:b9:72:3e:
ac:0b:43:02:80:2b:ec:24:7b:b2:6f:0c:e2:66:f9:f8:aa:dd:
0e:41:23:e6:27:14:82:ab:2d:1c:d2:58:ef:27:83:ca:a7:24:
ca:64:b7:32
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,915,097 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:10 2025 GMT
Not After : Jun 2 15:05:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:88:c6:3f:53:4e:f5:3e:ed:55:9f:e7:b9:88:7c:
92:4f:0a:d0:0e:3c:e7:c5:0d:12:12:e1:2b:80:03:
c6:a0:c5:44:ea:4a:0e:fd:51:c0:39:db:22:d9:07:
06:0e:0d:00:d1:45:58:8b:10:d8:e8:6f:6d:bf:af:
c3:15:7a:cd:6e:d4:67:23:6c:81:a5:d0:c1:fc:e8:
ca:8c:85:f1:e3:19:c8:57:9b:10:92:87:0b:0f:20:
72:7c:52:41:75:14:1b:7d:a0:ba:ff:c7:53:83:82:
75:4d:c4:f5:ea:6b:a3:37:b1:3f:8a:50:33:74:ab:
73:00:08:35:ca:18:41:47:7d:e7:e7:67:d9:eb:ff:
a6:69:43:9c:3d:3d:84:ae:2e:95:6f:04:d4:0a:b2:
0c:db:9c:54:0f:3d:be:9f:9c:8f:f0:8c:59:ac:e3:
c2:82:d4:cb:6c:3e:8c:ee:26:a6:7e:e1:16:81:44:
f4:55:1e:f5:b9:36:0b:02:cb:6b:cc:43:08:96:90:
f6:e2:5f:09:2a:bf:b8:9e:5a:68:02:f2:dd:09:32:
90:1a:8a:a8:1c:98:31:f0:6d:7e:b1:23:2e:c1:56:
34:7f:e9:b3:c1:e0:4b:dc:23:61:94:69:1e:72:b0:
5e:f1:55:af:be:2e:04:96:13:f1:72:5d:4f:d9:8e:
81:e5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:16:93:c9:4c:4f:8c:3f:11:1e:2f:b8:11:47:22:de:ef:d4:
2e:ab:ad:50:a8:26:f9:69:2d:39:fd:8c:91:f2:6a:e9:b9:31:
a8:d5:c0:dc:c0:f4:a1:49:cc:d8:7a:07:8a:3c:5a:61:ca:ac:
ec:0f:90:f3:b0:02:c1:1a:11:65:d4:06:78:7c:a2:45:39:ab:
b6:40:ea:8d:d6:7b:0e:8a:d5:48:bf:a8:ab:0a:b8:4a:27:d3:
a0:4e:6e:01:f8:8a:22:27:e0:5f:f2:31:22:48:0f:d9:df:2a:
23:35:fe:65:3c:74:a3:e8:40:70:eb:3e:a7:dc:b9:71:d9:eb:
5a:56:37:8e:76:2c:34:4f:c3:04:64:9a:f9:ae:3c:32:62:c9:
c6:b0:f7:98:f5:cd:54:1c:a3:53:46:e9:71:0e:49:3f:65:64:
48:93:93:2c:f4:3f:4a:fc:71:1c:b2:e3:70:74:86:c5:c3:c8:
09:e8:a9:88:ae:45:e9:ae:5a:ec:55:48:d5:ec:06:51:4d:26:
c4:3e:ac:81:14:5f:d5:6e:7e:88:ba:72:79:1b:38:b5:44:31:
2f:f1:e8:13:46:0b:8d:84:39:62:5a:cc:7b:8d:73:78:1b:06:
17:28:ee:77:55:45:33:5d:97:9f:a4:97:0d:ab:a1:5b:7c:4e:
8d:c5:25:d3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:11 2025 GMT
Not After : May 4 15:05:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
21:6c:a5:8a:c7:8e:c2:14:5e:89:24:d4:03:6b:55:14:2d:9e:
93:74:99:c7:89:26:97:75:ff:9b:d0:dd:3a:41:c9:8b:b9:69:
13:45:c4:3f:08:37:9c:8f:65:42:be:4c:e7:c4:6f:e9:13:8a:
88:1a:90:a1:4c:54:c4:bb:fc:3a:1b:13:94:b4:1a:79:6d:5d:
ba:70:a6:8f:42:f5:0f:54:19:d5:4c:b1:2e:6a:87:f5:f4:d2:
b2:76:39:34:02:ff:55:2c:90:6c:8f:20:f0:60:23:59:06:b0:
66:4b:1e:67:30:47:4a:f4:42:99:25:89:91:9b:b0:76:22:92:
3f:24:2f:57:30:12:50:e2:81:d6:2c:62:fa:35:a4:e9:a3:aa:
67:2f:27:61:a0:3d:c0:b3:1a:79:d6:b4:60:d6:3b:98:b1:c8:
4d:dd:17:c3:76:66:66:90:29:1f:f7:29:e2:02:aa:46:1e:85:
8b:82:cb:62:a1:46:70:eb:d9:0d:34:4d:c9:4b:f1:ff:00:48:
12:3e:cf:4a:c5:03:5e:4e:fd:c0:f3:de:c6:70:cf:e1:35:14:
96:db:d7:58:91:82:05:af:31:a0:32:a0:7f:28:00:a6:dd:ab:
ef:0e:25:54:4e:42:36:7f:f3:ab:30:c7:d7:07:f2:97:6b:49:
ea:85:2b:a8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.19s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,400,511 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:11 2025 GMT
Not After : Jun 2 15:05:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a1:20:6e:b0:3f:74:1f:72:4a:b1:da:88:a8:86:
cc:56:55:00:69:13:55:ea:17:f8:c7:ae:47:2c:a1:
3b:93:6d:7c:09:2a:e6:2f:e4:21:7d:b1:b9:b3:40:
63:7e:52:6c:af:05:83:e7:28:19:21:e8:52:a8:84:
50:86:07:55:fa:d8:95:a1:c2:0f:2c:c2:63:2f:42:
f8:73:fa:f0:0f:7f:71:b1:a1:83:65:6d:d0:38:b6:
c6:ff:86:41:ce:88:7b:16:54:5a:25:41:d4:1e:2b:
b0:5a:c8:9f:b2:ca:60:8e:19:ed:73:8c:c0:1f:7a:
ca:c1:a3:6a:3b:1f:84:2b:c7:09:09:ec:50:9e:94:
56:75:3d:3e:bd:9b:75:fc:bc:a8:04:20:57:b6:c2:
f0:42:2e:f2:0d:e1:38:0d:37:14:39:76:d8:3a:63:
94:e3:62:4a:af:79:bc:3d:9e:e6:28:53:e2:49:7c:
5f:ac:68:ff:c2:87:bc:f0:4b:c3:47:4e:de:1c:35:
68:f4:1f:99:10:fd:51:72:62:a9:01:8d:3d:4b:fd:
00:64:71:8f:a7:22:2d:c6:9a:77:fd:ac:f6:3a:f5:
ff:08:60:d4:f9:4f:f2:14:20:09:c3:58:61:87:00:
7a:66:94:b2:2b:66:ae:f5:b1:bf:72:53:a4:c1:e5:
09:b3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8c:c4:5a:f1:48:63:84:7e:48:d0:c3:7e:66:9f:8f:0b:39:3a:
b1:c9:94:07:a0:75:2c:ab:2d:aa:a7:bc:55:2d:0f:16:dd:6b:
ec:ce:b6:54:88:b0:44:39:00:d0:51:16:ce:42:a0:04:64:f7:
9d:71:92:49:de:a2:a5:73:3b:64:49:a5:e8:eb:1b:01:5f:c2:
2c:6a:8b:9e:4e:6d:a3:d6:51:4a:74:90:d8:f4:c3:86:84:9d:
99:c0:e3:6b:49:e4:4c:9b:c3:59:38:b2:14:6a:cf:9f:16:5d:
b1:aa:40:bc:20:09:4e:f3:57:e0:dc:bf:e0:ca:9b:1b:35:60:
b6:55:16:2f:2a:01:7b:54:c1:e6:1f:09:f5:15:f5:ab:e8:2b:
1a:5d:c6:1b:73:95:e4:e0:a6:c2:5c:38:14:8f:c1:05:4f:33:
a0:aa:a9:5a:27:1d:1e:e6:00:17:c8:9a:02:80:85:58:96:81:
83:7d:a4:68:61:f8:6d:ec:37:41:1e:1e:7c:bc:b0:e1:e5:52:
1b:f8:1e:a7:c2:77:78:fd:3f:4c:c2:5b:53:f8:60:a9:0d:57:
f0:41:b1:55:c1:12:54:3a:ab:51:66:c6:54:f6:b0:41:1e:d0:
96:7d:bc:43:06:41:7e:d4:93:1e:32:99:02:9b:27:87:99:6c:
47:27:5c:2a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 15:05:12 2025 GMT
Not After : May 4 15:05:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4d:b7:22:1f:c1:d8:cf:dd:95:27:34:a3:37:19:2c:b7:a0:f6:
61:c5:ad:59:05:8e:53:77:f9:2c:98:b1:c9:b5:7a:42:a6:3e:
dd:a7:fc:c7:e5:8d:3a:59:8a:75:60:4e:a8:82:04:31:11:e5:
bf:80:90:de:99:e0:56:1c:41:10:31:a6:b9:07:29:c7:9a:5d:
b3:a1:22:96:3a:4a:39:66:e7:c5:bb:ee:2c:52:e9:e1:10:ff:
dd:d1:4e:fb:b4:27:18:20:c6:b2:08:0e:e2:a6:4b:a9:6f:f7:
b5:7f:66:1f:94:08:dd:b2:3c:3a:e8:f2:1b:0b:f1:e0:14:82:
6e:eb:24:1a:af:1a:13:c2:34:58:0f:ea:5a:e8:e9:80:d6:79:
88:20:d4:34:b4:40:83:52:72:26:6e:fb:25:66:8e:83:7d:b9:
4f:ed:24:24:a7:49:40:14:9b:7c:7b:bb:fb:cd:9d:88:af:43:
c4:c6:51:12:02:5f:12:61:4e:68:71:66:7f:5c:05:4d:d4:ef:
15:aa:ed:43:c4:ee:20:28:97:1a:7f:18:3f:9f:97:0c:53:95:
95:b9:80:ad:27:c0:f6:75:1e:cf:7d:35:92:8b:e2:6f:c7:1d:
c8:f2:da:e4:e5:f6:3d:0d:95:1f:a6:ac:b6:b6:43:89:c0:fd:
8b:22:56:51
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,724,333 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:43 2025 GMT
Not After : Jun 2 12:45:43 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c3:b3:95:8f:47:df:68:ad:d7:ff:5e:2c:50:56:
2e:f9:52:df:41:21:8d:07:4d:86:8b:1c:eb:f1:36:
86:69:d8:3e:8f:a4:8a:70:8f:72:25:d4:88:c5:53:
cd:95:af:61:20:f7:4e:84:1c:06:19:de:90:df:78:
53:54:8a:95:b8:bc:3c:de:b1:9d:64:c5:13:c6:80:
97:4a:d7:08:e6:9c:9e:6e:1d:c7:51:76:9a:9b:32:
d5:bb:31:23:b5:7a:80:ec:4f:ee:51:3a:ae:3c:c6:
b4:81:ad:5e:37:99:3c:19:a0:4d:9d:4a:1d:93:84:
d5:d6:b8:9a:b5:0f:77:9f:4b:ab:f1:05:3d:36:cc:
95:a7:7e:4a:f9:e9:2b:49:ef:69:ab:57:40:f9:91:
25:90:02:49:a0:ad:c9:3b:0b:18:2a:e0:65:e4:0c:
4b:f5:8e:61:40:0c:5c:e9:92:00:be:3d:58:73:2b:
ef:74:3d:34:2b:61:e4:ea:25:c2:2c:09:49:fa:6c:
fc:5a:9e:85:c3:cd:fb:3b:87:43:dd:45:9a:8c:85:
c4:a3:8d:c9:56:f7:e6:54:2b:1b:28:c4:6f:1b:97:
0a:14:8a:73:a1:11:71:2a:ab:4c:ca:3a:4a:44:31:
a8:d0:82:e7:64:29:9a:17:60:5a:35:f8:86:00:3b:
9c:bd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
74:d9:70:2a:f0:dd:65:e4:ae:2d:7e:16:8c:09:c4:09:f9:cb:
bc:e2:60:6c:74:0f:3e:3e:3a:6a:41:56:49:7b:a9:b8:de:01:
8b:cc:f9:85:ad:b5:90:f5:2e:6c:ba:a9:12:c8:4e:20:39:1f:
5f:63:5c:f0:57:18:ad:56:ac:17:71:a9:79:f6:2a:9e:92:a0:
21:9f:53:60:10:66:8e:0a:31:69:02:fd:4c:7d:20:2d:60:c9:
d8:04:91:f4:4f:ed:dc:c7:ec:f6:65:aa:ac:1d:c3:0d:2c:f5:
18:af:b7:c2:1b:01:d1:5d:da:7b:88:cc:5b:2e:52:da:fa:bf:
42:22:15:ea:cd:42:fe:02:ee:5a:aa:c8:ee:ea:d7:25:1c:03:
03:0c:2b:11:6c:1f:32:b6:f5:89:57:7d:6b:de:ad:92:42:01:
f2:05:44:03:d6:81:65:95:fd:3a:04:2f:2d:9b:32:59:74:71:
71:19:26:62:da:d4:a1:a2:c9:2e:be:97:29:d0:f4:28:d6:f2:
a6:d6:2a:cf:0d:26:67:f4:78:f4:2c:55:66:3d:b6:e5:c7:57:
f8:36:af:34:50:8a:35:b0:b4:65:77:3a:2a:c1:47:a3:11:97:
4f:fb:64:ac:d3:d7:e5:25:9f:cf:2b:ee:9d:eb:45:b9:27:f6:
c0:81:9a:bf
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:43 2025 GMT
Not After : May 4 12:45:43 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
33:40:ca:23:91:d4:45:0c:36:51:e0:3a:72:08:84:8b:2c:c5:
6d:2d:9d:33:b8:55:eb:08:bb:3b:12:2c:e6:cb:6a:d8:39:c4:
8a:59:4b:81:bd:50:c4:a2:09:54:72:42:ec:77:c2:ce:a0:b6:
c9:76:45:b5:78:3c:91:cc:a6:89:c8:21:fb:71:66:95:2f:18:
ab:22:2e:05:4f:d3:11:ba:28:66:64:dc:35:a4:db:a1:be:72:
ac:ed:b2:3a:eb:92:b2:c0:78:38:76:cd:67:f4:7a:e2:d0:12:
b5:c7:cd:e8:c9:a2:8b:67:e1:f1:b2:2b:25:a6:2b:21:13:c5:
51:56:26:7e:13:ad:42:c7:1c:52:1d:5d:91:cc:5f:1d:35:16:
dd:db:c0:18:e5:cc:cb:31:d7:50:3b:d6:2a:f2:ac:d5:60:33:
de:f8:ab:3f:7f:2d:08:34:a3:74:ea:9a:c1:2c:9f:39:d2:e2:
04:f5:39:fb:8a:18:93:ec:d0:31:b4:39:5d:bd:83:65:f4:78:
64:a9:ab:29:ee:fd:5e:81:2c:c9:85:3b:14:c5:ba:ed:09:5f:
15:7b:d2:b3:e3:f4:75:fc:c9:97:e8:5c:27:49:6b:a4:6e:94:
74:d5:15:db:4b:c3:02:38:8c:c9:d0:2d:68:03:7d:16:4b:4f:
4c:18:01:66
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,274,650 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:54 2025 GMT
Not After : Jun 2 12:45:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:94:47:8c:f9:4a:1a:70:e8:51:ae:c5:b9:d8:ad:
80:77:3f:16:36:9f:84:82:76:18:ef:6a:de:3f:b8:
97:37:d1:49:36:80:e8:4e:c2:6e:0b:7b:24:a7:e2:
6a:81:9f:d8:97:c3:9b:41:5e:39:b7:9c:d7:b1:71:
ce:9e:7d:42:fd:70:f1:7f:16:de:75:46:d2:c6:3e:
d0:85:fa:99:cc:38:4e:c2:19:5a:f8:56:40:29:f6:
74:1c:b9:54:19:dc:08:bc:9f:b2:c3:3d:7c:2b:72:
44:0b:45:a4:95:67:7e:a8:c5:9b:df:07:5a:74:51:
2e:aa:95:da:d3:50:20:8c:96:ea:21:cf:c3:c7:96:
11:ff:64:35:86:84:12:8e:f6:a1:d5:e2:68:5a:b5:
4c:28:69:a3:0d:75:0b:32:78:05:7b:ef:0d:2f:1f:
e9:fc:6b:6c:0e:46:81:4f:26:a6:63:ff:a7:0f:e5:
e4:ea:6c:22:1c:1a:aa:64:55:a6:44:4b:47:e7:c8:
a2:0c:28:12:8e:b2:9e:cb:d1:3e:7e:06:e2:51:91:
dd:f1:de:33:d9:40:59:7b:e9:e5:0a:d7:66:eb:1f:
81:7a:65:fa:d3:a4:ea:e2:5f:3a:97:51:d0:ad:a5:
7e:4d:ea:9c:4f:af:28:3c:da:1d:77:fb:ea:19:9b:
01:a7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:88:a2:d0:0f:82:0b:ec:d4:1b:83:c2:3f:fd:a1:ba:76:cc:
f5:53:df:4d:7a:14:a1:d5:01:f9:27:f3:8e:c0:ea:0d:3b:b9:
5b:76:a0:8b:a7:8d:ed:10:03:a2:24:4b:63:ec:f0:71:e6:e2:
e6:8d:da:13:1f:25:9c:e2:65:e0:ce:6a:cc:d8:8a:f4:5d:21:
bb:22:d2:bc:f4:0d:9b:b8:86:31:95:3b:3c:aa:20:40:d2:16:
b5:6e:22:76:e8:7f:39:a3:9e:78:94:9f:46:96:de:91:a3:c4:
2d:05:da:e3:34:53:d6:43:94:c9:81:74:0d:53:73:e0:aa:bf:
78:cd:df:a3:64:9e:2e:91:42:51:d2:85:9f:a8:9b:0d:6a:b8:
66:11:76:36:8a:f4:4b:db:44:f5:20:a3:25:69:e4:b0:c0:0d:
08:88:a5:0d:5e:45:a4:b9:31:6b:f8:ae:fa:8d:e8:99:79:df:
f9:be:d8:a8:5f:18:46:4e:ae:a1:c3:da:61:04:17:82:ce:a5:
9f:73:f3:b9:8b:30:c4:d7:5c:07:5e:76:45:a6:35:c6:cf:87:
0c:5f:ef:09:89:67:1b:b1:27:e0:7d:13:dc:ea:73:c9:4b:5e:
fd:44:3b:61:e9:eb:ff:2a:fb:37:86:e8:0b:7d:47:e2:e4:b5:
ca:8c:df:fd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 12:45:54 2025 GMT
Not After : May 4 12:45:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
50:1f:05:3c:37:a2:5b:ef:3e:3b:79:76:de:cf:b5:ca:ef:3a:
b5:ee:e9:11:ef:d3:7f:ac:85:ac:6f:11:c6:37:34:0a:2f:8a:
b5:47:14:20:50:6c:1a:0a:21:4a:ef:a6:d1:7b:b8:95:9b:b4:
ba:e5:76:2d:b6:03:7d:4b:08:01:54:e6:66:ea:60:97:4f:19:
4f:2b:df:d5:c2:1d:bf:17:58:19:47:e0:10:e0:da:a5:ef:ad:
6d:ff:ec:1e:4d:20:2e:9c:30:cd:95:ba:48:33:83:1f:bf:62:
bd:45:29:2a:77:f7:9b:00:86:c5:0e:c1:f2:14:4e:f0:75:cb:
06:c3:6c:e8:9d:47:73:59:cc:cc:5a:b4:e5:63:8a:b8:23:1a:
d5:2c:95:cc:7a:97:aa:64:a7:8a:05:84:cb:1c:9e:2b:c6:42:
01:3a:6c:ac:5d:8f:ee:f0:40:a9:d3:85:fc:ab:4b:4a:a0:c2:
76:cf:04:69:f8:33:e9:5c:4b:17:07:70:63:60:7a:f7:7c:6c:
22:99:55:c1:6e:b7:28:d3:58:c2:8e:f4:12:f0:44:e4:4a:fa:
97:12:64:ba:37:68:a8:97:67:f2:62:36:6d:46:68:d3:5d:39:
09:06:ab:02:57:c5:24:d1:62:83:0b:20:f3:85:6e:78:a0:fc:
97:6b:4f:6b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,915,600 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:18:13 2025 GMT
Not After : Jun 2 14:18:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f0:bb:ae:ff:f5:ee:47:82:ed:6d:ea:82:99:9f:
91:1f:a3:28:92:d7:3b:28:97:74:0f:45:86:50:e7:
dc:cf:e1:5b:d5:a1:8b:fb:f4:9f:c4:6c:61:26:41:
ac:dd:67:ad:3b:38:ad:40:ca:8f:15:32:b6:5a:6a:
e7:be:27:23:11:7d:ae:e7:95:11:32:8a:4f:19:f6:
c2:75:8c:81:33:49:d2:f6:39:9e:e1:2e:64:95:68:
59:d4:02:39:73:25:9b:ca:d7:29:26:90:0b:9b:f5:
b2:3f:0e:f2:68:6b:b3:1f:5b:9a:4c:04:a5:68:9c:
56:48:d2:91:5c:c2:1f:e4:22:bc:65:49:b2:38:ce:
2d:b0:b5:6c:b1:72:81:2f:93:c4:4d:4e:cc:a4:64:
20:28:0a:00:6b:b0:ff:d6:8d:b0:7e:47:eb:24:38:
b0:be:ac:89:b7:f9:97:ae:94:47:c9:d2:cc:dd:66:
75:a5:27:5c:f0:e0:0a:de:33:d9:e3:67:19:46:c6:
e7:56:60:bd:15:3d:c5:43:5a:2c:8c:c6:84:e4:28:
61:7e:34:c0:e0:f3:be:b1:5b:7e:21:28:b1:2e:5a:
b6:92:32:43:30:95:b3:54:12:22:8c:7b:52:28:62:
7e:c1:8a:f5:74:ca:dc:44:1d:d4:ba:74:30:ae:0e:
49:d7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:b2:34:ec:c8:a9:af:f7:6f:e6:12:82:9e:50:b2:00:4a:4d:
e9:36:e8:eb:fd:77:c3:f3:78:68:36:f6:bd:71:9b:7e:95:36:
3b:02:25:c5:70:07:e5:c2:d2:bf:28:ca:19:f4:7c:20:7c:b3:
a5:d8:25:8d:91:22:82:1f:1d:e0:cd:aa:7a:69:ff:13:63:dc:
ce:a9:7a:65:9c:ee:9e:f0:af:0b:bb:dc:e3:70:17:92:b2:f8:
a8:2e:9a:7c:37:34:bd:96:ae:b5:11:63:66:20:e8:aa:72:2c:
a1:4e:e5:00:3c:62:dd:96:00:2a:6a:e8:ad:87:16:2b:09:62:
17:19:f4:c8:2f:a8:ff:8d:7d:00:28:fa:24:33:ab:18:40:6d:
1d:6a:a2:07:48:6c:65:48:e1:67:74:18:41:71:48:40:97:98:
ec:19:7b:8b:54:33:18:1c:e0:1d:9e:f9:a0:d1:bd:f1:72:72:
41:40:12:f1:5b:37:14:93:59:6e:75:ce:12:ed:e8:47:87:25:
2a:7c:e3:8f:55:c2:42:88:ce:9f:76:a1:2d:df:3a:84:ae:d0:
81:72:0d:49:8b:e5:24:85:78:ee:48:ef:71:51:c3:16:cf:ad:
80:52:7b:f3:f2:10:77:d7:13:bb:7e:c9:31:62:c5:7a:07:cf:
d8:fb:5b:d3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 14:18:13 2025 GMT
Not After : May 4 14:18:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
61:a1:3a:4d:bb:9f:79:c4:e4:aa:b8:67:85:96:84:44:06:f8:
bc:03:ca:8f:75:62:b9:e7:dc:00:96:d4:92:86:c4:00:27:7e:
f0:94:a1:91:76:3f:51:d7:cb:54:3e:8d:c1:fa:13:d2:26:e3:
00:db:11:39:7e:54:78:be:f8:58:fd:3d:1e:15:5b:e6:8d:d7:
21:5f:63:ba:3a:76:f3:b4:8f:bc:c5:98:d3:3b:df:1d:69:f0:
48:62:49:6b:e7:fa:49:c5:f0:e7:6c:0c:70:b8:87:75:81:f6:
b6:6f:0e:95:c6:bd:b5:09:34:aa:4f:0c:4e:a8:56:82:b9:ae:
1c:e7:c6:7d:74:8e:ad:50:b7:1c:83:65:3e:79:01:80:f1:eb:
b0:71:58:b0:a4:ff:24:dd:4a:98:bd:06:63:ea:97:0a:22:86:
ad:df:b7:85:c8:48:63:c2:2f:5d:db:0d:93:68:a6:92:e7:54:
84:b4:b7:1b:48:5c:86:da:d7:51:f9:a0:72:10:84:db:56:1c:
10:0d:f5:1f:64:2b:90:07:df:93:c8:50:b9:f6:ea:0b:82:91:
7e:ff:4c:98:24:4f:cd:c3:47:09:66:5b:25:ac:02:f6:52:f8:
98:ed:5b:e4:54:ee:1f:f0:3d:74:6e:ad:72:0a:92:a4:ee:df:
bd:49:e2:3e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,416,954 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:21 2025 GMT
Not After : Jun 2 13:31:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cd:2f:05:fc:71:62:b1:68:95:ef:fd:07:5e:08:
78:bd:f4:92:b3:06:2f:74:38:55:53:a7:09:fa:70:
c1:30:9d:89:34:b6:8d:65:fb:2b:8f:22:e9:3c:20:
29:c3:7c:f3:f8:0e:4d:56:24:aa:40:e1:aa:2b:62:
3a:a0:f3:ce:5c:8d:4c:1e:ae:db:c4:1b:d9:c1:95:
d9:4f:3f:26:cf:6a:da:4b:35:c7:42:6c:10:d4:00:
cb:1f:3c:aa:b8:4c:19:a3:e7:0f:2c:7b:ca:6b:b3:
56:41:34:f8:4b:e2:ae:d2:d0:e0:3c:71:57:b0:67:
16:91:ba:8c:cd:9b:0a:16:14:c4:c7:16:40:c0:e1:
1d:38:53:f4:fa:e2:aa:e2:cd:04:de:8f:4b:e1:24:
c7:ff:44:30:86:1e:df:ac:7d:15:f4:47:e6:4b:90:
37:39:97:e5:13:e7:f8:a6:ab:5d:a7:17:e2:00:58:
7c:a0:ad:78:52:d6:e0:f4:c6:1f:1f:73:a3:04:d0:
ac:e5:a8:ee:4e:08:5c:c8:5c:be:eb:9a:0d:d7:82:
02:c0:13:13:4c:5b:0b:15:39:d5:11:55:ca:ad:45:
18:9a:5e:ab:0a:05:ff:f3:2e:89:56:2c:41:9b:75:
f8:41:af:b3:58:2e:5b:0a:6d:8e:f2:36:c1:0d:90:
0a:9b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
16:59:cb:f9:d3:f5:e3:1a:15:dc:0f:2e:bd:a1:e0:02:cb:aa:
60:75:6a:20:02:42:4c:e4:ef:21:ba:ad:a4:5f:9d:10:28:bf:
e6:c0:2c:50:99:47:5b:1c:e1:46:78:e9:7f:59:8e:4a:79:61:
df:6c:7e:65:a0:4a:2e:97:21:4e:a1:84:a0:c1:69:40:b7:4a:
c2:55:ae:b4:d3:5a:b4:33:51:d0:2d:0c:b0:86:55:8e:41:96:
6d:84:53:64:18:dd:30:1d:ce:b3:16:11:06:bf:b2:05:b4:27:
ce:80:ff:44:1a:b4:a7:64:0f:7c:6a:06:41:ae:c1:f7:88:a7:
4a:a2:2d:00:69:d4:57:49:1c:c3:27:bb:40:cb:28:ad:ed:92:
3d:0d:a5:af:f5:5f:2f:e4:2a:ec:65:6b:4e:86:77:76:c1:65:
37:a5:42:e4:df:47:d2:46:ea:39:33:3e:11:94:7b:8c:f2:b1:
90:0b:70:52:37:32:90:5f:54:30:ed:af:1d:41:c9:07:b8:01:
66:75:1a:c8:52:5b:0c:58:3d:fa:08:ad:a1:87:e5:96:c3:fb:
e9:df:d1:b4:d2:eb:f2:44:b0:fa:2e:71:d5:7a:f8:ff:5f:f8:
eb:34:f8:1d:81:3a:8b:99:05:01:9a:5d:f1:78:b7:e0:5a:60:
f2:d4:0f:d0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 13:31:22 2025 GMT
Not After : May 4 13:31:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:d4:2e:fc:23:52:25:63:ad:fe:5f:ba:3e:89:42:7b:f8:a0:
08:38:f2:64:c7:da:29:2f:58:d4:32:a1:1c:00:03:17:21:db:
bb:70:d9:2c:81:f0:88:44:f2:c0:e2:cb:f5:65:32:e2:6e:26:
68:a1:e2:6b:a0:27:d2:a0:33:f3:7c:47:f6:44:10:b4:6f:1d:
f7:b8:a4:7d:81:f5:34:f4:dc:7a:fc:59:17:a1:dc:78:56:5a:
b4:74:29:41:c9:24:7b:e0:db:bb:0b:2e:ef:5b:98:e9:9c:bf:
5d:ad:d5:08:ea:57:67:4d:bb:55:76:c3:86:30:93:67:f9:3a:
92:c3:9c:5e:c7:c4:b4:b4:3a:79:e6:de:e7:b9:ab:ab:b4:86:
4d:e3:34:bf:cf:0e:a2:f5:66:af:77:03:73:d8:1b:0f:45:46:
9f:b9:95:b3:04:0f:d8:06:e2:db:b3:5e:d0:43:6a:be:cc:b0:
6e:bc:f6:cc:1e:70:b0:9a:9a:bc:80:4d:77:c5:ec:87:69:3c:
44:37:e6:36:b1:d0:06:94:62:3e:a9:3b:14:83:ad:bd:ed:45:
a9:79:4c:1f:4f:14:94:c0:28:7e:37:40:06:29:4f:7a:f4:23:
4b:55:cb:a9:d4:00:07:a8:d4:bf:ef:b0:26:de:10:b2:a4:03:
fc:c8:48:21
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
Truncated 7958 bytes from beginning
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
3,108,858 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:03 2025 GMT
Not After : Jun 2 10:25:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:7e:13:0c:17:15:8c:db:4e:14:3e:39:b5:cc:
5c:2a:f7:a8:0a:3a:43:b4:dd:78:4b:d0:61:ae:9e:
c3:5b:61:92:ce:96:18:67:c7:5c:a8:74:2f:39:14:
83:c1:a1:79:f7:62:64:50:23:cf:d5:3a:6b:30:55:
78:79:47:03:51:40:17:04:8a:ee:b8:74:99:7c:7c:
42:9f:e6:b5:a2:f4:d4:c4:cf:dc:6f:1c:04:60:4c:
d9:1c:53:d9:f2:f1:bf:bf:d2:ef:ca:dc:86:a9:2f:
73:dd:94:b1:36:0c:2d:3d:90:72:c9:5e:04:40:68:
54:cf:0a:53:29:22:d5:2a:1a:2b:28:c2:bd:36:ea:
e2:72:5a:b6:34:85:03:8d:69:a2:38:40:56:24:ae:
aa:95:5b:6d:86:97:d2:99:5f:70:95:10:d3:4e:41:
2d:8a:b0:ee:aa:9d:3f:70:67:3b:41:f8:86:65:87:
c2:e8:fa:3c:ba:6c:d8:17:e9:fd:0c:ab:1e:e2:47:
6f:bc:63:0f:9a:3f:1d:90:e4:d1:06:94:7b:f1:f5:
44:0f:94:7a:f2:2c:e8:55:48:37:42:b0:df:ac:2a:
e0:90:a7:2c:09:ba:06:23:1d:15:c2:47:a3:ca:79:
d8:44:cf:d5:a6:c7:e7:59:8b:b5:28:7e:8a:1a:2a:
16:0d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8a:21:3c:e2:9a:83:5e:2d:33:fd:c4:a8:f2:14:a8:00:27:81:
5a:3e:ff:8a:bb:63:cf:0d:3b:dc:b3:8c:b8:70:14:7f:87:3b:
84:4e:77:f5:2c:a1:bc:9d:56:68:87:fa:b6:2a:08:d5:3c:8d:
ce:41:19:8f:e9:14:b2:51:26:cb:f1:cc:53:d2:4f:f4:af:dc:
16:94:32:4a:22:6b:4f:87:07:20:97:f7:a0:9c:a0:e6:12:46:
74:9f:c4:b2:9e:9e:c3:86:56:d0:8e:74:9c:cc:ad:cd:db:5e:
64:b3:f2:80:1b:86:42:5b:b5:dc:12:5d:d9:6d:99:57:0d:22:
81:52:1b:4a:12:f1:eb:db:85:53:3b:28:8d:ab:4d:2e:59:6a:
14:10:df:12:61:b8:d0:7d:b5:b0:c8:27:93:fc:30:01:c0:0c:
ad:db:bc:c4:6d:44:40:bb:74:06:33:32:af:a9:87:ed:db:f7:
a8:b8:8c:fa:40:88:bc:e7:90:e3:6b:03:d3:ee:5e:2b:dc:45:
cf:65:29:e4:83:27:95:0d:e4:6c:36:60:6f:ea:57:60:c5:77:
60:e8:ea:ff:b2:fb:d6:4b:50:c5:26:58:b9:7b:e3:c8:79:5a:
29:b4:6d:11:ed:dd:eb:fb:95:63:1e:09:21:c1:10:07:f1:38:
b5:fb:4e:e9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:03 2025 GMT
Not After : May 4 10:25:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a4:a9:06:46:c5:dc:25:3b:8b:db:0f:09:6c:6c:34:0f:ae:19:
a5:ca:a0:5c:9e:f6:66:93:cb:6a:f2:cb:fc:43:10:9d:fb:1f:
bf:ec:6c:73:e0:61:44:74:9f:9a:f3:40:5e:ac:93:a0:95:b0:
6f:2d:da:73:f8:46:34:5b:d9:53:14:c1:13:18:ef:de:5f:53:
76:ae:e7:0d:48:78:c4:aa:33:3d:d3:57:1f:ff:5c:a9:a9:2a:
b1:d1:34:9c:e5:e9:b1:b1:dc:23:57:ab:03:bf:83:bd:18:9d:
0e:35:37:5e:f2:89:bc:00:a0:f4:50:9c:c5:7f:b0:24:8a:0c:
49:fc:1c:72:3c:ae:72:84:bf:46:80:cc:15:ae:77:3c:02:c6:
17:7e:ea:5f:9b:0d:c3:00:06:b9:5f:60:03:90:da:0e:7d:9f:
b9:67:f4:75:e8:b2:01:55:7d:e8:e5:19:f3:4a:50:2b:28:66:
5d:a6:e4:1d:fa:8f:cd:78:7e:23:a7:ad:75:25:96:57:d7:0e:
6c:de:b7:02:22:e0:dc:ce:21:bc:72:7f:54:db:1b:52:66:e9:
f0:3d:13:3f:2d:ae:51:6f:4a:df:ef:12:eb:13:46:cd:cd:bd:
e6:08:0b:04:ad:16:ce:b1:e8:66:06:db:a4:91:16:7d:6b:50:
52:b6:96:55
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
Truncated 3082 bytes from beginning
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
2,854,839 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:20 2025 GMT
Not After : Jun 2 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:db:53:57:f2:18:ae:af:d0:fd:26:c7:3a:b1:37:
8c:23:04:c4:52:2a:38:e3:c0:87:28:1f:eb:62:71:
f4:9a:b8:c1:5a:24:70:b0:a8:8b:84:cc:ba:02:33:
a4:9c:47:4b:b1:cd:48:75:86:22:20:db:d9:68:02:
4c:21:ab:53:22:34:8c:42:c6:30:cf:16:58:de:42:
07:54:c1:ee:5b:de:e5:32:4e:9f:23:27:d8:88:af:
2d:d0:27:05:fb:14:92:48:3b:cb:fa:b4:7d:6d:ff:
f9:66:4c:24:67:c8:b2:d0:d7:e1:f9:87:58:d7:cc:
be:5a:5e:2a:5b:b6:12:70:d2:0c:d1:15:80:2c:d5:
40:13:08:f1:12:e7:c4:29:ef:ce:aa:88:ae:05:74:
ce:f7:e0:72:fc:34:f6:3e:90:d3:34:32:14:8f:c2:
4e:34:9c:ca:4f:b8:48:c4:cd:5a:2a:b4:c6:e9:8e:
68:70:3b:fa:90:ea:d2:2a:41:57:d5:f2:89:03:4c:
9a:f4:7a:b0:89:bb:0f:7c:75:39:fd:ad:aa:1e:57:
ca:66:5b:75:23:04:f1:ba:a0:03:f1:c6:16:64:cb:
5c:94:28:4f:82:7e:0e:d3:0c:a1:44:2b:35:ce:d2:
46:44:0a:d6:8f:7c:30:63:f2:93:30:b9:5c:61:7a:
6b:d9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
98:06:81:a2:05:52:42:d0:fc:85:11:26:28:d0:16:27:22:79:
ff:68:d4:51:91:31:b3:a6:ab:ea:d5:f5:1e:c0:8a:17:cd:1d:
56:7a:2a:a0:55:f8:df:19:36:68:38:22:e1:b5:6f:25:ce:09:
54:05:04:f0:83:86:db:d5:22:95:d3:3a:9c:a0:fc:4f:0f:1a:
fd:0d:3c:8a:1c:3a:e6:3d:04:3d:7b:6b:ee:84:c7:98:be:c5:
01:65:59:5e:b8:1a:f4:9c:02:26:01:1d:f7:a4:95:d4:8d:d5:
d2:4d:49:d5:d5:c3:40:48:a6:3a:1d:30:81:14:32:15:df:f1:
ba:44:1b:ee:9c:ce:8f:21:6b:60:4d:70:f9:4d:1f:a8:26:66:
55:cc:24:f1:8f:d7:b2:1b:c5:61:11:83:71:44:f5:63:93:39:
6d:db:09:63:d7:9b:c2:ea:fe:59:ff:99:a5:1d:7f:83:69:80:
8d:d7:c5:c4:42:fb:26:db:c8:2d:6e:e8:5c:03:26:22:b5:0f:
f8:93:7b:b9:24:a1:a7:d0:80:15:1e:63:83:cc:06:c5:59:c1:
2c:f6:cb:a7:ca:a4:17:53:a9:ea:4a:17:34:bc:1b:2c:ed:8a:
b4:b1:88:40:7d:5a:8c:0e:f8:eb:f4:45:19:9b:b3:63:58:a4:
14:4f:7a:7c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:20 2025 GMT
Not After : May 4 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:25:4d:68:32:6d:24:fe:a3:bc:b7:96:6c:54:52:94:d1:d8:
7c:57:0d:0f:87:e4:83:1d:f7:28:b2:ba:ca:b5:e8:1b:ee:7b:
75:fb:f4:e9:ed:32:bb:a2:34:5e:92:2a:ce:44:6b:72:d4:55:
c7:de:9c:11:a1:e0:ca:90:96:a1:91:45:d0:0b:a5:22:36:31:
05:4d:53:27:37:9f:91:2f:81:92:8e:f5:38:a0:33:7a:ac:15:
4c:cf:f7:b9:1e:63:71:9d:c9:3f:bf:eb:fb:52:bf:dc:61:84:
9f:0f:3b:73:76:88:3f:4e:40:50:8f:21:83:5a:e8:27:14:e4:
0c:be:23:c4:15:c5:8d:fa:e4:88:d7:81:cd:89:d7:a4:37:6d:
d2:f1:c6:08:87:6a:74:1f:1d:f2:7b:78:35:af:77:33:39:56:
73:ce:fc:ce:86:cb:1a:04:ea:f6:c4:fc:9e:f5:be:ac:54:46:
99:34:6d:32:34:99:9d:1e:2e:d0:a3:3f:b3:32:f7:14:64:bc:
b9:05:e5:9d:62:ea:77:71:d1:3a:35:49:88:b6:33:31:ee:85:
9c:3f:96:94:f5:35:9e:15:0c:58:c7:2b:0b:32:4a:19:4b:b1:
e4:ad:03:b6:3e:02:e6:84:d2:ed:1c:1e:34:3b:27:82:14:95:
f2:01:4c:9c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
Truncated 7958 bytes from beginning
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
3,107,951 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:45 2025 GMT
Not After : Jun 2 10:24:45 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:98:84:5c:b6:57:a5:4f:26:cc:36:48:1c:68:cc:
c4:62:88:ef:de:8d:7d:40:f0:da:e4:7f:48:01:59:
01:08:aa:fb:72:ab:4d:e2:e4:b1:21:97:b4:c7:48:
2d:54:5a:e9:23:82:2a:67:3d:ba:51:71:d9:41:b0:
8e:e0:3b:8e:92:36:8e:59:be:5f:7a:97:a7:d8:7f:
87:66:da:78:c5:98:24:a6:c8:dd:50:62:e3:10:ee:
8b:80:cb:20:00:b7:81:68:44:c6:e6:0b:df:14:db:
5c:fb:c5:a1:ee:11:ec:b2:43:81:ed:8f:21:b9:c8:
1f:74:bf:73:19:7f:3a:74:08:91:5f:d8:a0:54:1d:
14:bb:7c:37:b2:90:59:b2:61:6d:0b:60:7a:40:b0:
ea:d4:b9:fe:8e:82:31:a1:7f:49:0f:1c:f5:f5:98:
99:b2:a6:e3:ed:ab:af:97:ef:99:e3:ee:67:41:ca:
c6:0d:1a:b0:de:f7:a7:15:22:a0:01:36:92:c0:a5:
41:34:2e:be:87:74:b0:b1:8d:4d:75:39:9d:df:2b:
f3:e8:dc:74:61:c6:a5:12:41:49:47:d1:2d:2d:fb:
50:cf:43:39:67:6b:35:1c:55:20:57:33:fe:3a:97:
03:5d:95:c5:f1:00:c5:41:14:05:b2:b1:c9:87:16:
aa:6d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4d:b0:d7:e9:dd:f7:24:06:2f:2a:d6:f8:84:86:59:cb:51:ca:
02:3c:32:29:e1:b1:ff:56:79:da:68:05:ed:c0:a5:45:84:ed:
c0:d5:fc:cb:9c:33:8f:f3:20:0e:21:e0:df:ed:b9:fc:4b:80:
71:a7:6d:82:8c:7a:12:48:43:ad:49:b0:af:06:de:0d:89:f7:
e5:fd:42:c7:d7:04:3b:76:dd:b0:4d:e5:80:ee:4f:4e:5f:32:
7c:42:3e:ce:14:98:77:e3:c9:77:38:80:63:77:5f:53:47:58:
51:bd:40:16:1d:ae:ad:39:fe:1a:3b:60:96:5f:a2:7d:da:36:
96:bd:0e:a2:36:27:23:4d:7e:64:6a:be:81:5e:db:bc:49:fb:
cb:bb:af:fe:2f:04:0d:3d:d3:6b:b9:fe:c2:79:fa:0a:04:9a:
80:e2:a3:7e:56:e1:eb:5a:e6:47:03:1b:32:48:f2:67:67:86:
53:ca:d7:b8:5a:6e:a3:55:63:43:f1:96:32:f0:22:3e:43:8e:
a9:5f:1b:3d:e7:b4:5a:3b:18:5f:28:00:a4:01:f0:d0:40:29:
c8:b2:a8:5d:4f:ed:9c:a6:6e:f3:dc:97:fe:cd:99:ff:c8:a6:
1a:f0:23:1c:6c:4b:1a:40:1c:32:ca:1a:96:78:2f:6a:4e:a7:
c4:56:f9:3c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:45 2025 GMT
Not After : May 4 10:24:45 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
12:84:1e:a1:0b:ba:d2:0a:7b:8b:18:45:5a:17:d7:fc:a8:bf:
51:32:a3:50:d8:78:05:9c:54:a3:4d:dd:3a:59:a9:43:8d:b1:
77:63:d4:be:cf:09:9c:16:ca:9d:8c:31:d5:cf:9c:a1:a4:48:
f9:84:c2:ac:4d:2d:89:41:49:15:b0:9e:ca:5e:bc:f4:0e:8d:
cf:26:f9:47:2a:b4:ce:d8:03:a6:d8:0d:4f:a3:88:1b:67:a2:
d2:02:ce:66:8d:0b:ed:1a:cd:fa:d9:97:2c:e0:a8:a2:52:cc:
1e:13:d7:98:13:e1:60:1b:82:f8:ff:f6:f6:ae:a1:e2:bb:f3:
8f:ac:20:e3:3c:e2:f3:e4:46:04:bd:fd:29:5c:0e:40:28:95:
e2:09:91:d5:99:75:49:7c:e6:a7:99:4d:be:b8:3c:14:32:bf:
a7:cb:35:cd:c1:13:67:da:ef:fe:0c:22:f8:33:ef:44:ee:73:
57:01:2f:1c:e8:08:e2:e3:29:88:73:1f:61:3b:dc:09:93:76:
9d:1f:69:b8:28:25:e6:ff:c7:d2:d2:25:3c:c3:32:d8:3f:17:
bf:38:78:38:9b:84:d8:d4:2e:e8:75:6b:fb:2e:ab:61:d2:fa:
0b:d0:5d:16:87:8f:90:b1:c8:db:fb:a9:9a:be:7d:45:69:c7:
06:32:b5:8f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,856,448 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:47 2025 GMT
Not After : Jun 2 10:24:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a0:c6:97:fa:1a:ca:99:02:fa:49:72:0c:f7:82:
82:c7:a0:f1:49:84:7e:38:67:2e:a4:30:01:e0:68:
c1:9c:cf:ad:b0:53:ef:18:47:53:b1:a7:3f:81:df:
0c:83:12:29:40:03:39:fd:7e:91:b7:95:2c:61:a3:
c7:dd:63:13:5f:be:9e:55:dc:43:22:33:86:11:64:
74:d1:a5:02:14:55:41:ca:a1:61:99:20:57:a8:34:
c8:3d:41:55:ff:52:d7:8e:02:65:56:38:f9:80:e2:
bc:08:23:39:ba:c9:53:f1:82:a1:17:78:f6:95:4d:
db:88:aa:f5:f5:42:56:a7:f1:4f:15:ad:20:41:2b:
1c:4e:27:a0:a7:ff:5e:89:c7:af:15:f7:63:97:e3:
b5:02:37:68:59:b3:60:87:56:5b:af:53:d0:1e:6a:
70:1b:8a:27:69:e7:e1:1e:87:6c:a2:12:91:82:80:
13:dc:8f:fc:06:e6:12:c2:9f:4b:cb:39:64:57:d2:
cb:2f:32:60:4f:43:5d:b5:73:70:7a:21:e0:d1:35:
e8:de:d9:f0:4b:3b:33:f3:ab:ff:d9:04:12:35:d8:
6d:98:33:24:d6:b0:1a:d8:00:e4:f3:6d:78:1c:a6:
a9:26:a6:12:38:dc:78:30:26:bb:b0:9f:5d:e4:9d:
18:57
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:57:0d:b8:b7:33:b0:7e:ae:37:71:54:62:56:5b:f1:4e:af:
f8:bf:7d:93:4c:6b:03:bd:de:3b:13:23:df:f1:f6:8a:52:67:
bd:90:11:8b:3b:7b:5f:29:56:ae:2d:83:6b:c6:15:9c:40:8e:
cf:0f:44:6d:f6:ae:f1:70:d8:db:fd:24:55:19:93:17:d8:8b:
81:ff:21:fe:7e:d5:c7:c5:b2:84:26:12:92:63:68:e8:b1:e9:
22:0d:31:d8:1e:63:de:37:a2:9e:c7:7a:81:5f:78:1d:01:00:
72:2f:25:92:db:01:de:5c:d8:8e:c8:be:67:53:fa:67:6a:a0:
c0:18:1d:75:7b:1c:24:67:6b:5b:83:48:95:97:e0:1c:af:c5:
9e:32:35:5a:3e:95:56:28:0c:20:db:cc:46:e0:24:fd:2f:1c:
05:25:a5:0b:6b:d9:c3:8d:99:fb:a9:fa:63:88:1b:3f:b6:4e:
68:39:e0:32:f4:b3:49:3d:d0:f8:3e:7a:b4:b8:85:33:fd:3d:
87:0e:fc:0b:da:06:e2:8a:a6:c7:41:41:e8:9f:bc:34:0a:13:
f7:fe:37:e1:61:b4:d3:66:be:f1:a1:a7:18:72:42:f8:65:48:
34:bb:74:61:9c:b5:ae:6b:c1:40:3e:93:f7:9c:95:14:66:c2:
b1:0c:02:ca
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:47 2025 GMT
Not After : May 4 10:24:47 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4b:65:50:5a:21:d3:4e:f7:64:79:b1:f3:e5:b2:95:07:9a:6a:
7c:0f:bf:2e:8d:1d:05:49:a9:dc:ba:e1:49:47:57:a3:17:be:
60:84:c1:e2:19:e2:de:10:86:1b:37:0a:46:73:30:b2:8a:21:
67:3f:8e:48:c0:4f:97:e8:af:05:a9:95:d8:8b:bb:13:33:8b:
1e:78:2f:da:f4:87:0a:c5:5a:dc:f1:cc:34:61:ba:fd:31:1c:
17:1e:70:28:be:19:33:64:77:5e:32:49:6c:d0:3d:6a:84:3a:
16:9f:f3:69:03:e7:8a:7c:68:8b:68:6a:2d:3d:1b:42:9f:ca:
35:19:c1:f5:ca:79:45:51:de:62:d2:08:0e:79:e0:89:91:b1:
a9:11:38:48:fe:92:01:f5:0b:c7:91:66:15:f4:d3:63:9b:dc:
d1:86:23:3b:ad:9e:50:52:61:8c:91:3e:de:ed:16:0e:58:42:
ab:34:27:74:dc:09:cc:9b:14:b2:35:f2:16:8f:de:1d:41:21:
02:16:7e:64:cc:bb:9f:f8:19:48:a3:cc:16:56:d3:c1:a7:8e:
94:75:3d:14:94:f3:38:59:34:ee:81:5e:3f:45:21:6d:24:1d:
0c:33:af:0d:b5:b5:f9:2d:b8:08:32:fe:d1:00:2b:44:bd:3d:
32:1a:8e:06
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
Truncated 7958 bytes from beginning
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
3,106,964 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:40 2025 GMT
Not After : Jun 2 10:24:40 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:98:bc:df:96:36:4d:c2:15:08:52:36:c4:9a:f7:
c4:1e:0a:cd:e0:4c:de:00:43:07:13:26:9d:6e:80:
a3:4d:17:a6:37:d2:15:87:1d:a2:31:93:38:a2:2d:
72:f6:a4:21:29:dc:57:3a:ff:d7:d1:d0:ee:05:dd:
a6:92:f7:0b:86:98:4b:31:58:ea:10:00:c7:fb:6b:
d9:bd:f4:ba:b5:b2:49:95:5e:81:8a:0f:1f:6e:cc:
dd:44:8f:e1:1e:33:72:b4:a8:1e:6c:f5:2d:7c:a4:
32:dc:a6:ce:2a:76:f1:93:62:7a:fc:0b:38:94:5b:
e7:8b:e6:86:69:e6:1b:4d:d1:11:77:fa:ee:87:76:
4f:d8:2d:13:af:bf:f5:3b:ae:61:72:a0:09:3a:ed:
9a:9a:15:fe:d9:80:67:9a:bf:db:10:01:ea:0a:ca:
3a:9b:a2:98:42:3a:e2:55:02:b4:b0:4a:07:64:36:
63:2f:9a:8d:8d:f9:67:27:e4:9c:2d:a0:4b:20:a7:
ae:c6:32:0b:ee:45:3c:87:e7:62:85:3b:74:8a:8d:
aa:6e:81:17:8d:46:5e:a0:eb:f3:b1:dc:bd:ab:99:
9e:38:d6:0c:4f:53:ff:e6:d1:5b:d7:15:6a:99:2c:
cc:77:d4:f0:fa:4c:b2:49:7b:27:36:6a:5b:d1:36:
51:31
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:be:bb:6c:e1:c0:ca:56:1d:7e:d5:21:aa:b4:74:fb:d5:4c:
5a:0b:62:72:ee:eb:44:75:da:ff:1a:33:4e:3e:f3:b6:bb:28:
41:76:a6:c3:c7:f7:c5:8f:b4:1b:25:a5:a7:03:ba:66:ed:4c:
69:22:79:a5:5f:79:b8:63:f6:61:2a:63:4d:9e:2a:11:93:ff:
35:7d:7e:cc:0f:0e:52:1d:8f:fb:97:90:d0:a6:a1:d9:83:3c:
72:bf:1a:80:f3:0f:81:be:3e:6c:93:6a:77:ea:89:21:6b:83:
24:f6:50:a0:e4:e7:5d:d1:35:cd:dd:89:de:a8:f3:b3:28:2e:
4c:f2:b9:5c:60:2f:20:3d:5c:bf:ef:bd:1c:03:5a:4c:37:78:
88:fd:29:68:b1:7f:db:e6:a0:cc:27:ef:c0:a9:0c:90:fd:9a:
39:3e:6f:9a:3c:d1:34:ba:ec:d9:1c:60:db:65:3e:45:17:ce:
5a:ae:3a:2f:de:91:03:b2:54:0d:50:c7:be:40:4c:10:dc:12:
a6:11:dc:5d:e2:4f:31:3f:c3:8b:b2:4a:c0:d3:df:9c:66:4d:
b1:3b:46:af:44:b5:0e:40:78:dd:a1:05:c9:e3:64:91:e1:f3:
ba:4e:0b:1f:3b:c9:5b:29:37:b7:53:aa:62:71:94:c8:48:16:
99:93:b9:64
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:40 2025 GMT
Not After : May 4 10:24:40 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:f2:83:1d:88:a1:a8:f9:55:99:51:7a:39:56:a7:9b:4a:78:
ec:1c:3e:db:66:a4:59:2f:9f:00:fa:fb:54:09:66:95:29:ff:
a1:cd:1e:50:3a:92:29:4a:72:f0:7b:7b:af:fa:c1:aa:4a:b4:
c5:7a:05:29:29:a4:6f:2a:75:e1:46:da:1b:23:4c:10:7d:8e:
4e:aa:f0:8e:13:d2:ea:6b:64:5e:1f:98:3b:ab:f9:8f:67:93:
36:39:ff:33:3e:ac:c4:5c:e6:2a:86:6c:ff:70:d5:07:19:9f:
8f:1c:98:37:61:c3:72:b0:20:78:37:3f:10:59:84:26:4b:ac:
2c:65:6d:3d:70:19:a9:99:74:02:8d:43:eb:b1:02:26:e6:5a:
78:2c:e9:be:f1:79:e5:7d:8f:83:99:90:e6:36:35:aa:08:0a:
bd:46:a0:93:83:a4:ee:05:b5:cb:f8:a3:e4:43:1f:d5:2f:ae:
f3:0d:6a:a0:2c:b3:65:a6:51:e5:85:53:d8:17:f5:85:e3:c6:
65:89:d9:30:d3:6a:d6:6d:2d:93:ad:f7:4f:0f:53:4c:09:a6:
d3:a2:d6:4b:eb:e7:de:0e:b5:af:39:a8:55:dd:0b:b5:31:f1:
d1:a3:d4:bd:25:85:60:66:14:c2:bf:bf:78:3d:7c:d4:da:a4:
e2:fd:15:fe
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
Truncated 3082 bytes from beginning
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
2,855,521 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:58 2025 GMT
Not After : Jun 2 10:24:58 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:de:c8:c6:c3:51:40:5f:b4:07:30:a3:05:da:
6c:7d:1d:0d:eb:e3:ba:65:9e:de:08:32:76:df:d7:
c5:17:7a:32:f3:18:e3:65:60:55:85:d7:60:29:33:
c0:d7:02:75:34:90:9d:7a:a3:1d:be:0f:54:e8:e9:
4d:fb:08:53:8c:bd:47:f0:94:f3:95:7d:7b:cd:c1:
2b:a6:7a:fa:6e:d5:7a:8a:fd:12:c8:32:52:00:0f:
55:08:32:3e:e8:29:d7:96:1a:57:d1:e4:c8:eb:49:
a3:ca:19:ab:8a:57:f9:e7:09:cc:9b:49:c5:4b:bd:
4f:2e:89:6f:ff:fb:d6:b2:3a:b3:a9:e4:fa:61:86:
2e:fb:b2:ec:7a:c1:2c:16:72:22:2f:9f:48:ff:e9:
8d:02:af:bf:21:14:67:20:38:d7:04:27:fe:7e:7b:
c0:eb:4c:87:27:60:9e:98:f1:7b:15:ab:23:77:cd:
cd:f7:75:a0:aa:be:21:a3:81:e9:4f:d1:d8:55:c2:
e0:10:48:7d:61:27:f9:e0:c7:c5:38:f1:5c:c4:ef:
3c:39:44:f4:db:a9:19:06:6a:f6:26:83:ab:b1:83:
46:bc:55:3b:35:e6:3b:1f:95:26:0b:b3:e3:0c:c2:
03:42:92:dc:26:1f:3b:99:13:d7:93:c8:55:19:d3:
a7:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:31:19:34:bb:41:21:03:7c:9f:5f:85:3e:bf:17:b5:7d:02:
37:09:d9:7b:f5:84:1b:c9:2d:54:b5:c9:6d:ff:38:2d:a7:ad:
02:0a:98:a6:3c:d3:63:78:54:5e:05:59:b9:84:3a:8a:20:dc:
cb:2e:de:97:fd:d6:94:92:b0:df:60:36:8b:98:36:7a:9a:72:
f1:50:ae:c5:3f:88:eb:e4:58:05:59:bf:ed:e8:25:28:66:ee:
26:80:20:f5:ee:52:44:58:f5:17:4f:3d:90:e2:e8:92:c4:ce:
3a:c7:4e:60:7e:a1:e4:2a:66:d0:0f:ce:a4:1b:61:d4:07:ff:
1c:28:59:bb:96:b4:4c:33:88:b5:c7:6d:17:26:3e:39:29:5b:
b5:eb:67:fd:0b:b6:f4:2b:76:43:9b:00:a5:c6:22:ce:d3:c7:
6f:d7:63:46:aa:6a:1e:4b:56:b9:1d:c0:2e:ce:f3:ed:20:7c:
dc:17:1e:d6:ee:45:2f:ea:b4:80:69:f1:1a:bb:4d:c9:c4:37:
d3:ef:7c:ff:53:92:92:4b:07:08:d6:7a:fd:b4:cf:34:74:da:
d3:2c:0e:d8:eb:2a:f8:34:17:ec:34:71:5b:fc:50:d4:1f:ae:
c6:48:18:8d:35:d3:e2:ed:0f:f3:5f:16:5e:c3:73:db:9a:5f:
30:f9:93:50
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:58 2025 GMT
Not After : May 4 10:24:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
05:52:7a:0f:c8:9d:3f:c9:f9:0b:14:dc:a5:b0:ca:fd:d1:2e:
40:7b:49:7e:9d:d0:04:ab:ae:44:38:03:89:32:f5:89:b3:a2:
05:1b:1d:3a:26:1d:d1:92:27:f3:4d:98:2a:ed:92:40:85:fc:
ab:e1:2b:5f:e9:9a:97:6e:f9:0c:41:ca:8b:db:27:34:0e:f3:
a6:63:af:51:e6:7a:07:c0:60:be:99:86:fb:ee:67:0f:90:71:
13:7f:a1:f3:38:ee:b0:8f:ac:0a:c7:e1:31:df:2a:e7:6f:c9:
3f:6f:2d:fd:a9:a3:29:2c:cf:62:ca:48:b2:33:71:d8:81:69:
fe:e9:a8:67:d4:70:aa:81:a9:14:99:a6:ca:00:ad:4f:19:77:
38:2f:81:1d:d9:33:d8:a9:d2:24:09:a0:10:b0:06:87:c8:4c:
59:5f:d8:04:5e:56:73:d0:a0:b4:03:8b:d2:26:69:96:5a:e1:
9b:f4:e7:ce:81:e1:07:49:ca:19:a8:97:65:e6:1d:33:86:ae:
99:23:6d:44:b2:6d:f1:ce:c4:1d:4d:a3:ad:07:b1:ea:ba:af:
ab:ec:be:50:1c:64:6f:c4:c4:fc:b5:27:89:2e:3d:21:28:d3:
1b:e0:5c:85:3e:cc:73:16:24:3c:32:c4:67:d9:4a:2b:19:98:
65:47:58:a3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 7958 bytes from beginning
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
3,109,139 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:49 2025 GMT
Not After : Jun 2 10:24:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:eb:3e:f4:95:70:93:73:27:d5:76:17:d3:05:6e:
03:bf:60:fd:cc:aa:70:4f:06:04:77:df:66:61:ce:
df:7d:9a:13:f8:5f:07:51:1e:aa:b7:af:9f:27:4a:
3b:3d:e7:31:61:de:df:c1:9b:b6:3d:ed:a4:d2:7d:
a7:02:a0:01:aa:52:db:d1:7f:cd:90:52:89:b1:14:
30:04:97:2c:c5:4d:0a:c2:9a:07:c0:55:dc:94:f8:
4b:e5:b9:3a:62:bd:4f:18:85:1c:3e:88:a6:e2:fb:
d0:5e:e6:65:c1:e9:de:4c:a5:08:73:74:97:33:99:
9c:83:fd:cd:b5:2b:6f:18:e6:27:58:e0:ea:2a:d8:
44:64:e7:cf:05:b6:72:09:2c:e8:46:f9:d9:5a:28:
81:5e:7e:4d:cd:d7:40:d3:34:2a:fb:6b:c4:e6:26:
1d:31:72:c6:c8:7f:64:8a:3e:ba:08:ff:83:4b:39:
13:9b:02:db:1f:37:d5:49:eb:f4:e4:ec:ec:8c:65:
4d:7a:69:8e:2f:70:23:2e:a1:39:b6:fd:db:7f:8b:
94:6e:59:f5:65:15:f5:26:40:88:b6:75:90:5d:0e:
1b:29:d1:00:7c:a9:f0:94:19:e4:fb:ed:7e:59:c5:
59:39:98:d0:c7:bd:c4:c7:8f:67:fb:ca:81:a3:a8:
46:99
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9d:72:9f:48:2b:1a:68:cb:24:ae:74:74:7c:a3:13:64:fe:ce:
fb:ec:56:ee:dd:5e:87:66:93:df:22:05:33:b0:ad:c3:e2:fe:
2e:91:25:20:dc:12:dc:ff:ed:63:76:22:70:db:c1:12:43:55:
3e:51:bc:3a:cd:5d:c1:8e:7b:6e:87:ba:68:1e:80:4a:ae:e2:
13:df:cb:b9:12:d6:b1:ce:79:41:85:bf:e7:e6:a7:20:c6:3d:
28:87:f5:3b:f2:94:f7:d0:26:46:c1:4f:17:db:06:d7:1d:14:
90:28:fc:3a:24:77:df:52:47:5f:57:dc:94:d9:38:ad:37:70:
c5:e3:ce:c4:c0:bb:26:27:89:bc:12:91:21:e0:29:94:8e:8a:
b5:60:42:29:e8:df:55:3f:2d:1f:68:75:32:6c:1d:f0:ff:e7:
70:83:f4:d4:73:ac:4e:74:7d:9e:12:6f:f7:3a:55:87:6b:86:
a0:7d:a1:1f:5a:06:3f:84:ab:b7:58:a1:51:3f:ac:e2:1c:09:
5f:7e:2d:e4:e3:36:05:70:d7:cc:e3:e6:b6:be:05:cf:84:d7:
e1:13:5f:5f:c8:a6:1e:68:74:46:9f:8b:35:9a:c5:09:a3:a7:
e7:52:fd:7a:6d:fc:1c:3b:5f:d6:9d:3a:7d:9b:5f:56:15:d1:
8f:dd:f9:db
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:49 2025 GMT
Not After : May 4 10:24:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:cb:71:03:f9:6b:49:c1:7f:6b:c3:5c:0f:57:b9:65:60:e7:
7c:df:8a:88:8a:49:41:b2:8e:28:6d:58:51:cf:dc:f6:1c:8f:
76:a9:99:22:6f:f2:65:7b:1e:ef:04:aa:39:40:3d:7a:06:df:
af:58:5f:bf:75:73:d8:3e:fb:01:1f:fc:29:25:57:36:5d:eb:
55:33:f9:e6:4c:df:17:69:0b:04:ea:a6:a0:d3:98:d5:ee:f9:
4b:ed:f6:71:61:5f:20:de:75:8c:29:9a:12:c9:da:c3:35:25:
7e:c5:71:5e:2f:25:7f:13:9e:75:fa:86:87:c8:3a:fc:08:65:
2e:e7:7e:23:55:09:60:35:55:59:12:d8:9b:78:dd:e4:94:c0:
e6:95:ef:af:2d:54:cb:82:80:3b:42:39:b5:0b:e3:9a:d1:3d:
16:ad:33:5f:68:a8:2a:64:f7:29:d0:4e:73:4e:44:b1:97:4c:
19:16:44:35:7d:25:12:13:e3:51:68:70:4a:da:db:dc:8b:cc:
04:f2:02:6a:61:3d:5e:65:0e:a0:e1:84:58:68:04:42:99:4f:
48:79:f2:4a:40:ed:71:07:2e:1c:38:cb:d1:35:e6:35:f1:59:
43:4b:3e:20:b0:e5:9f:43:ef:8a:11:11:77:b5:88:f8:b7:97:
54:57:1f:5d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3082 bytes from beginning
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
2,857,194 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:53 2025 GMT
Not After : Jun 2 10:24:53 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:26:48:46:f6:5f:2b:6e:33:31:87:e8:1f:e1:
ef:22:15:ae:cd:b7:82:2c:d4:9a:5c:c0:49:9c:09:
d2:67:1b:02:0b:86:d6:fc:43:87:15:de:e4:86:06:
c4:9a:00:fa:da:da:98:23:2e:b6:69:71:09:c8:eb:
51:66:29:4b:25:9b:c6:9c:d9:68:2d:b8:1b:31:5b:
48:11:92:7d:61:c5:88:fd:dd:8b:4d:43:42:cb:5c:
38:97:ee:ad:df:11:06:a9:ed:2c:f9:18:78:cf:41:
89:bd:4f:1b:5d:d2:41:7a:e6:62:bd:7b:32:44:ff:
e0:a6:79:32:b8:64:6e:69:ad:0d:8c:80:4d:4f:2f:
f0:6a:de:b8:f2:c1:ef:df:f2:af:84:79:fe:7e:46:
e5:21:0d:63:5d:c3:ed:c9:df:e8:37:94:b0:9e:9d:
82:f0:97:76:76:08:4e:27:15:f0:31:54:45:a7:35:
21:46:c3:f4:c6:0b:85:ea:8e:d0:de:6f:47:ed:63:
f1:39:57:fd:f6:bd:2e:15:b5:2e:dc:31:3f:a3:ca:
4b:40:11:70:0b:f6:52:7b:cd:65:a3:fc:33:25:39:
d2:57:aa:a8:25:41:8c:47:bd:10:69:f3:f7:c1:80:
d5:6a:a2:a9:ad:d0:a3:7f:df:5e:47:39:6e:67:21:
78:f5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9d:fa:52:8d:2e:25:b2:51:3d:3f:45:00:a0:83:48:c5:e9:33:
bd:b4:f3:dd:93:c1:7e:6c:da:0c:0e:2b:30:f6:5a:26:c8:d4:
d9:c6:1c:c0:63:15:8a:03:17:38:65:6d:e5:f2:a4:60:9a:bf:
96:50:61:8e:55:37:d8:5f:bc:b1:80:cd:aa:35:f7:7d:85:d5:
1b:57:be:71:cb:a9:9e:61:0c:05:5c:96:cb:0c:c2:d6:33:db:
78:18:85:ca:b0:fa:86:18:ad:53:ce:8d:76:84:10:6a:2f:da:
1c:e9:91:ea:bb:f2:6a:7d:09:d0:a8:55:03:c9:b0:55:65:0d:
bc:71:67:0a:5e:26:e2:c0:56:43:82:15:52:70:22:a5:77:49:
fc:ce:24:85:76:81:eb:c9:80:a5:c0:de:74:9d:07:f2:6f:9f:
34:b9:b8:e0:fc:a2:cd:8c:89:dc:b9:a4:c9:c2:d0:66:72:59:
bf:f3:30:98:d6:81:19:95:4b:de:db:a2:31:2b:6b:3c:bc:da:
64:3b:da:c8:90:1f:5b:80:32:4d:a9:37:bf:85:0c:30:1c:d3:
01:62:1e:ab:c9:e9:df:c1:0d:74:20:ff:73:11:9a:12:52:c6:
8e:36:57:f4:ce:12:2a:f3:60:c5:9a:61:3f:9a:dc:ea:80:d9:
30:52:30:58
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:54 2025 GMT
Not After : May 4 10:24:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:7d:de:83:bd:43:f4:76:76:78:09:37:3f:c3:4c:56:40:94:
e3:06:55:48:e4:a7:53:2b:1e:36:11:7a:59:e2:cd:3b:25:bb:
8e:c4:87:0f:f7:04:66:04:91:9b:ef:16:57:d1:f1:32:82:37:
50:b0:50:02:79:6d:64:25:22:63:6a:9b:23:ad:19:27:fd:0e:
d8:ab:96:c9:3f:e3:d1:ba:90:0a:af:99:43:b5:73:4d:3f:0b:
59:69:af:7e:9a:ff:42:91:68:c2:83:d7:fa:04:65:0c:8b:15:
ee:cd:9d:80:d2:7d:85:43:18:27:49:f5:51:24:d6:8d:52:4a:
d0:57:77:72:8d:de:01:f4:3f:db:bb:92:fd:76:de:22:d5:0e:
dc:b2:73:4c:6c:1e:d3:4f:24:7d:e4:fe:4f:ac:16:a5:4c:e9:
0f:72:87:ec:12:57:fe:45:64:69:c2:30:f6:40:6a:56:55:c4:
5b:9a:94:f7:e7:54:5d:30:26:be:ca:cd:00:5b:29:55:9a:00:
c9:14:68:28:e9:fc:5b:47:b8:78:19:43:5d:84:df:a5:46:5f:
7b:3a:19:45:b2:73:18:fb:e7:47:32:8a:72:a3:6c:31:9c:39:
b9:e5:10:44:82:11:b2:a6:5d:d9:95:2d:93:18:e5:85:60:e3:
6e:9c:a2:78
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
Truncated 7958 bytes from beginning
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
3,107,904 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:49 2025 GMT
Not After : Jun 2 10:24:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b8:9a:f4:9c:af:ee:9e:53:1e:01:d6:f1:82:81:
77:6f:36:1c:cf:5e:cd:4d:9e:ad:ef:02:a3:3d:c5:
3a:32:37:26:a5:59:53:48:a1:55:90:b9:0e:dd:9d:
17:6b:0f:26:6a:82:7c:17:56:8c:b3:94:44:74:22:
f5:4a:f8:84:c7:02:0c:37:d9:71:fa:b7:06:b4:b6:
0b:1a:ce:62:b0:0f:56:f5:8a:a3:8e:40:36:ac:fa:
7c:43:40:ee:44:26:bf:e2:d6:2f:76:f4:a7:36:cf:
94:66:f2:8a:4b:33:af:b5:e1:05:d0:94:bc:74:dc:
b0:e9:18:0e:81:5d:ca:c4:cc:43:4d:5c:fa:52:33:
8f:b4:94:d4:89:26:99:cc:29:09:1e:99:ba:49:dd:
f7:1c:7d:b9:7e:dc:cb:29:5f:f8:f6:8c:76:5e:b6:
9f:f6:85:76:65:a8:27:91:c0:6f:2a:f5:a6:27:01:
b7:61:e5:aa:a9:d6:2c:30:05:6a:37:b8:d6:9b:35:
d1:85:cb:03:4e:20:2b:e5:fa:3a:c7:6a:30:f9:0a:
84:1f:ce:14:6b:80:45:70:ed:6f:f5:37:cb:01:20:
be:2b:3d:bc:a3:ce:35:f1:1b:56:e8:68:9e:98:62:
7f:7b:a0:25:fa:00:3e:56:ce:c6:48:f7:80:00:20:
b8:c3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
28:a8:68:ba:9e:17:bc:85:97:aa:3c:17:fd:0e:57:f2:bf:62:
73:fb:90:c4:30:56:76:ee:2d:3d:c5:32:ef:9e:6a:a3:69:c9:
8f:ee:07:6a:9a:62:5a:95:10:2f:eb:77:1c:58:3c:cd:bc:1c:
42:17:e7:23:5c:57:56:83:2e:42:9c:07:01:9a:84:79:06:6e:
8e:3c:de:d0:0a:34:0e:e3:67:a5:5e:f0:d6:f2:5c:45:56:e2:
70:88:05:66:52:f4:2c:f4:03:c2:0e:22:db:a8:32:b5:1c:c5:
b7:f6:14:4f:2d:eb:ed:14:5f:f0:e4:7e:52:8a:bc:90:92:ac:
70:a1:f5:d8:43:f5:62:e3:8a:b5:42:f2:79:84:b3:56:cd:28:
89:b5:7b:b4:db:bc:54:2b:f4:fa:a0:fb:fa:5f:f4:7b:49:20:
a6:4e:66:6a:e2:db:42:1e:78:27:35:1d:f0:ea:11:56:c8:1d:
d1:fd:ca:97:ef:b2:50:f9:8f:06:e0:1f:06:43:43:1b:4e:02:
d8:f9:6f:d5:e9:4c:42:50:f2:80:66:58:47:73:58:ba:c6:94:
72:a1:98:60:a8:2a:c3:ed:54:90:6b:53:d4:aa:43:6f:0b:3e:
ec:e6:64:e9:a9:bb:01:b3:0f:47:95:56:f3:c5:50:e1:80:86:
4b:0e:18:14
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:49 2025 GMT
Not After : May 4 10:24:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:70:69:f4:a9:f5:29:6d:07:ff:a9:bc:11:d9:c4:c8:3e:1d:
a1:dd:43:56:41:37:2f:1a:29:2d:1e:56:38:d8:3d:97:f6:68:
39:d8:f5:de:ba:7f:46:26:b2:be:6a:03:09:92:a6:11:80:4e:
af:7a:59:61:40:66:ca:ca:df:02:14:05:58:e3:56:87:e3:17:
79:ec:5d:5d:04:66:ab:5c:f8:ec:c7:df:3a:7b:5e:59:f4:b0:
b6:ab:12:b3:c1:4b:a2:54:d5:02:8b:3a:96:16:3a:79:13:08:
6a:a5:d2:b9:0e:61:f1:19:70:e8:52:a7:ba:f0:c9:70:37:36:
2c:64:e7:6e:fc:6c:a8:e0:56:8b:51:4f:85:5a:8d:45:4a:f3:
30:e1:a6:9d:1f:74:cc:25:75:28:5b:29:df:f6:b7:c4:55:09:
fc:18:2e:fd:1b:76:cb:12:a5:c7:60:3c:c4:2e:9d:bf:4e:e3:
25:aa:73:d4:fb:54:06:21:b6:86:d6:ca:6b:2b:c9:50:00:4b:
e4:b2:35:89:23:96:6b:8d:3e:86:db:06:33:b2:17:83:aa:e4:
43:77:e4:d2:a9:b7:a4:25:0e:a0:91:eb:9e:f9:74:e2:41:1a:
45:89:dd:85:c2:10:4e:00:52:63:9e:e3:83:9c:37:c6:ae:b0:
e2:8a:83:1f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 3082 bytes from beginning
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
2,851,983 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:09 2025 GMT
Not After : Jun 2 10:25:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:da:6a:0c:0b:06:ed:2c:5b:6b:1c:48:af:04:eb:
ec:61:3e:ff:84:07:e6:c0:e9:1d:70:80:30:f9:52:
6e:df:00:98:75:c7:4b:84:dc:f0:cf:b9:42:80:e6:
91:94:2d:58:f3:c0:36:ad:13:2e:33:b1:f9:73:64:
ff:cf:76:6a:20:bf:57:d2:c9:e3:47:0c:02:50:3b:
d9:a5:f2:15:c3:18:6b:f6:e3:93:90:e9:21:d7:72:
e0:54:cd:ad:3f:a0:9e:84:0c:9e:d6:44:21:64:61:
ab:72:1b:37:1e:6f:3a:1f:a7:c2:87:c5:fe:93:bb:
88:25:7e:58:c6:30:33:92:06:68:35:63:1a:a6:22:
6a:b9:ee:a6:7b:1b:bc:89:a0:a2:36:0a:19:be:b8:
bd:52:94:18:2c:71:1b:0a:db:a0:df:ea:e9:a2:a5:
76:bf:c8:19:60:64:ef:6e:7f:6e:37:20:94:6a:e3:
1e:86:f4:46:56:52:c5:f9:30:8c:4c:46:b0:5b:91:
3d:54:1e:20:d7:13:06:d3:b3:49:3b:7c:2a:1a:b4:
a1:80:87:20:3c:25:b6:46:30:98:08:24:cf:59:c5:
45:97:55:95:1a:8a:ab:46:76:6a:5f:6a:f5:41:ab:
c0:87:27:c5:f3:e2:47:fb:69:47:d9:1a:15:d8:62:
9c:89
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d7:a0:c2:62:52:ee:58:09:f9:15:fa:85:27:7c:70:97:44:8b:
7f:fa:e7:9d:5a:c9:78:ac:33:c7:fb:d2:c5:22:fc:25:d3:11:
66:23:13:7f:dc:f4:ac:03:11:b3:8d:2f:67:af:67:fc:03:47:
30:0f:dd:c3:28:f0:94:d6:03:07:eb:9f:32:3f:6a:d6:6d:ea:
a8:91:7e:1f:6c:22:51:c4:97:ab:24:48:57:d5:6d:68:d0:3e:
98:8d:e4:89:42:5a:7b:0c:ce:84:d5:20:54:32:88:7c:87:79:
19:1b:f6:aa:29:0e:9d:f6:f1:cb:e2:3f:fc:c2:81:85:2c:35:
90:39:19:90:d8:85:11:12:06:69:7b:32:09:3f:e3:fd:85:cd:
d9:6e:d8:9a:e0:07:dd:bc:c7:01:b8:e0:a0:6b:9c:3f:68:40:
2a:c1:10:1f:6f:bc:08:84:45:52:88:c5:e4:65:75:d6:70:10:
02:73:45:7b:df:21:e4:0c:5c:03:7c:95:cd:2b:d4:b3:74:96:
c2:bd:9e:8d:b1:9e:15:5c:29:1e:b5:4b:eb:80:ad:77:41:23:
76:4e:e3:61:5c:1e:d5:4e:e5:bd:51:09:b1:cc:33:05:e0:63:
a8:b8:31:27:7b:e8:e2:09:8d:76:bd:b3:52:af:a1:37:32:2e:
2e:28:14:47
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:25:09 2025 GMT
Not After : May 4 10:25:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:cf:31:9e:6f:d2:e4:05:0c:cf:2b:29:6f:04:71:e3:6c:e5:
4d:85:56:4c:97:21:a3:9d:58:16:17:26:90:19:1d:b2:e4:fc:
10:e2:5a:de:af:8c:4f:2c:33:bf:2d:91:52:57:46:51:46:1e:
f5:7b:40:a5:0a:f7:ff:cf:0a:2e:7f:f8:e2:ea:34:4a:c8:fc:
57:9e:f3:4f:bf:69:d0:9d:79:59:33:4d:73:7d:0a:a8:61:65:
27:65:56:88:5d:46:f4:24:02:36:f2:3b:0a:c2:00:67:c5:4b:
d5:79:dc:34:82:10:69:8e:7a:c6:07:5e:d7:71:1b:3f:b0:9b:
1b:86:6b:4a:d6:7d:8e:9b:4b:2c:60:ee:68:a4:ea:38:1e:7f:
9d:ff:bb:83:b0:8d:6e:6f:46:55:af:db:a6:64:9b:47:7d:11:
ec:df:a3:7b:da:41:04:f6:0f:3b:53:c4:b7:94:bd:c1:9f:4e:
86:61:b7:c9:48:fa:0a:fa:d9:91:e9:5e:f8:29:93:28:79:c7:
47:f0:fe:2b:60:1a:9e:32:b8:77:6b:e4:b9:19:6a:7d:42:17:
90:a0:ec:f1:b7:2e:2b:f0:d4:0b:da:b9:54:4a:e0:76:1b:4f:
ba:19:12:d1:69:9a:26:8c:f9:7a:21:29:2a:61:b9:42:22:c0:
7b:1b:32:5b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 7958 bytes from beginning
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
3,108,399 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:44 2025 GMT
Not After : Jun 2 10:24:44 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:eb:cf:79:7a:e8:38:2d:87:f9:8b:25:0a:27:30:
90:a6:66:c9:ca:4f:53:dd:d3:c3:d4:15:d6:3a:b1:
de:72:26:56:e6:56:67:ec:7f:37:21:66:90:d8:62:
7d:e7:5c:cb:2f:b0:8c:be:0d:6b:58:74:1c:e7:10:
c8:0f:51:1a:ac:ab:68:0f:31:b0:f4:07:7d:f1:b3:
41:ac:85:9e:21:d0:ef:ab:1b:e6:6c:4c:63:e5:ef:
0b:92:3a:43:40:45:96:4e:cf:48:66:f5:d0:c7:ee:
18:0a:30:8a:bf:f7:9d:65:fd:79:3d:9f:df:53:cd:
f1:58:71:ec:55:d0:ef:2c:47:7c:67:ce:c7:37:56:
d9:12:e5:1d:39:ca:17:a0:96:63:a9:e6:56:63:c3:
25:ae:94:d0:72:08:07:b4:63:72:07:e0:5a:0b:33:
43:e1:98:d7:d7:83:3e:20:03:c6:3b:92:20:47:3a:
1f:61:ae:c9:c4:4e:db:09:08:dc:4a:37:6b:48:58:
ab:88:d3:42:c7:c0:d7:47:af:cd:42:0f:76:f0:6b:
63:fc:7e:90:45:06:e4:56:ab:c9:fc:fa:cf:f6:04:
8c:b6:9e:38:22:de:1b:fa:56:fb:9d:4a:dc:aa:71:
72:a4:e0:1f:7d:3c:d8:30:7e:2e:f5:0e:f6:7e:a6:
af:dd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bb:56:a5:05:45:7e:d2:46:ec:51:5a:1e:03:43:05:73:e0:23:
56:f1:66:44:b9:2a:63:53:12:00:b6:4e:78:71:50:db:e0:40:
d6:42:10:d3:99:f9:7d:62:06:c6:cf:19:98:f7:93:37:f8:ec:
02:ff:df:38:aa:2f:a1:23:d9:55:86:c3:89:e2:44:0a:69:a2:
0b:dd:72:19:2d:db:1a:05:40:76:72:6a:92:64:73:ae:f7:d0:
d4:16:8c:cf:ca:cc:29:14:ae:8c:02:0a:c0:a6:e7:8a:5e:52:
59:a0:d1:71:9e:75:aa:98:61:ab:2c:6b:23:11:fd:a2:26:43:
ed:54:09:57:54:ff:3e:2d:3f:02:95:8c:de:17:b0:28:25:39:
7d:a1:ef:a5:00:f4:a8:6f:13:ae:15:8f:a0:c3:fe:f9:dd:78:
08:54:62:97:dc:5b:c2:96:14:8d:e3:59:c1:4c:dd:83:1e:20:
56:71:2e:61:bb:f8:ee:c7:78:ee:19:8e:ca:6c:a7:0b:3d:5d:
00:a8:e1:ba:56:9e:94:c8:5f:f0:e4:d2:81:aa:39:5c:68:89:
46:79:00:92:97:8e:f8:0b:71:9f:90:72:47:d9:12:95:4a:f4:
16:e0:e4:ac:c6:b7:74:ee:82:2a:17:bf:f9:04:20:a3:ba:66:
02:d6:ec:76
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:44 2025 GMT
Not After : May 4 10:24:44 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:9a:8a:6a:a1:d2:04:57:d1:16:c9:04:c3:9a:f0:6e:9e:04:
b9:c4:ef:33:be:43:85:ca:52:9b:da:47:c0:b9:2a:ca:e4:41:
8a:53:dd:9b:71:5e:5c:4b:79:18:de:2a:63:2d:31:c7:20:41:
67:41:65:b3:b4:cc:9f:f8:ef:65:96:b6:30:59:35:49:52:24:
ca:cc:0a:62:95:1f:d1:88:9f:57:4b:53:24:85:0e:78:f6:12:
0b:96:97:20:d5:dc:10:b1:25:b1:55:b6:8e:95:67:c3:79:db:
5e:83:62:2d:a0:7e:a7:32:c6:c4:37:d1:8c:25:f7:5e:0a:a6:
05:ea:f3:05:46:d0:4f:35:44:4c:db:2b:b0:3f:f3:fa:ed:d9:
d7:42:ad:5f:89:86:fa:39:58:f1:e7:e6:f7:79:87:c2:b4:b8:
1d:60:c1:35:71:25:c9:a0:7a:5a:33:ca:32:34:f7:c6:79:b7:
79:b5:98:3f:cc:e9:19:a4:d3:5b:60:fa:44:4d:a4:72:85:f6:
61:54:e3:3b:57:43:e8:dd:68:4b:6e:23:bc:a5:76:f4:09:68:
3b:03:e1:cd:14:86:c1:7f:d3:2d:26:64:64:05:09:78:41:50:
a0:0c:d1:8b:3e:01:16:e3:f0:fe:b9:53:af:21:47:e5:91:51:
3e:bd:3e:ad
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,857,124 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:43 2025 GMT
Not After : Jun 2 10:24:43 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e8:79:fd:11:ff:5b:ed:ab:98:fe:85:15:ec:7d:
fd:21:c9:a8:e1:16:8f:92:b5:f4:38:5c:00:08:21:
95:2c:e3:8c:13:02:27:0d:b0:09:a2:03:09:ba:51:
4c:4c:bd:1e:82:b0:6b:0c:5f:ef:10:36:56:aa:57:
fa:9f:21:c1:05:40:ad:eb:d3:05:cb:8c:af:cc:f3:
5c:99:54:9b:7c:21:a2:2b:1d:3a:16:44:c4:c4:64:
71:f6:a7:1e:a1:bf:52:b2:80:1c:e2:67:13:c3:e4:
45:ea:86:1d:d7:9e:4b:ae:a0:bc:b6:9a:de:47:5e:
96:46:44:c1:14:ea:f7:c3:db:82:c4:84:7e:dc:6f:
da:2a:24:16:73:09:7b:1f:fd:fc:f1:8d:10:71:30:
e6:a0:03:80:fd:0c:f0:46:d0:f4:30:94:33:7f:50:
7d:44:17:cc:8a:b4:6c:7e:91:db:49:6a:df:7e:98:
26:1a:ef:fc:7a:5d:86:c5:20:7b:60:06:32:1b:ff:
d0:ab:04:ee:c1:fa:49:b9:e4:b7:56:d5:7a:3f:de:
9f:a3:29:19:44:69:dc:28:3b:b0:a7:2e:1a:d9:11:
d6:ba:5a:cf:e6:6d:64:10:4b:1c:e7:b7:c5:76:70:
c0:bd:7b:97:f2:4b:b1:13:6d:9b:c1:cc:a5:8b:f9:
ba:b7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:13:70:53:df:b7:47:cc:f0:f1:46:a9:75:cd:d5:e6:42:7e:
b8:06:9c:48:75:2c:93:ee:5b:4a:95:f9:68:38:01:05:db:e0:
e9:26:80:19:18:97:54:2d:07:5e:9a:ad:ef:5f:07:9a:97:9c:
9b:1e:e4:5c:f2:15:de:06:a7:20:ed:3a:3c:41:bb:dd:98:97:
74:8a:b7:fd:9f:58:2d:49:a7:8c:c5:9f:5e:54:a8:00:ae:32:
7b:63:24:94:4d:59:9f:83:39:9a:e5:b8:c3:bb:83:55:f1:00:
26:de:5b:89:aa:4f:ad:0d:a2:e7:4a:e7:9a:41:06:d0:d8:d7:
11:43:8f:de:ae:3e:ae:16:e4:0f:7d:d9:8e:17:5d:60:5e:1e:
bf:83:58:b7:26:2a:37:fc:38:66:9b:9a:a5:d3:69:30:43:98:
46:34:a4:af:41:1a:e2:3f:3c:d6:b8:a4:cd:4b:8d:36:2e:8e:
f0:a3:b0:df:a6:89:55:85:6d:df:84:05:19:13:88:ea:9f:5e:
ba:b8:e8:88:d7:72:f8:d8:4d:e3:53:de:d3:7e:c3:5d:fc:37:
08:1a:45:ec:e6:8d:0c:e3:c7:ee:04:9a:95:c5:99:91:02:79:
75:59:8e:cc:32:e4:17:6f:4f:2f:73:87:eb:52:34:3a:7c:67:
c4:7b:c1:8b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 3 10:24:43 2025 GMT
Not After : May 4 10:24:43 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d6:57:7a:26:f5:e3:e7:4a:31:67:34:88:79:0c:a3:8b:96:24:
96:e1:d6:e2:5e:2b:78:9e:a4:43:c1:95:98:78:d0:d8:ff:38:
1a:eb:bd:ac:28:6f:c1:a3:2e:9f:d1:62:21:19:cf:ae:a7:67:
74:b9:4d:a1:52:a6:1b:71:e6:52:9c:6d:7d:a5:b7:2a:b5:e5:
67:c2:76:0a:e5:f9:bf:22:2b:37:fd:e7:01:6f:31:2c:60:ec:
20:af:d3:66:21:72:d0:dc:2c:f5:d2:f2:64:e6:d6:b0:33:31:
43:53:75:46:6c:6a:8a:39:79:e1:0d:09:5e:4a:d1:54:37:a3:
c8:d6:39:c6:03:3f:95:5c:3f:ab:1f:5f:48:5e:e1:89:48:3f:
2e:69:44:31:f0:8a:1d:55:94:e9:4e:eb:49:0b:a8:ea:56:81:
51:46:e5:a9:6b:72:f8:26:80:84:b5:67:6d:63:d1:07:16:2d:
ae:48:16:88:c9:69:72:74:86:5a:ee:e7:fc:cd:ce:1d:00:73:
78:14:98:04:7a:f5:e3:7d:d1:92:f4:d7:04:d1:c3:65:73:48:
b1:4d:9e:d8:d2:f5:b6:0f:e9:b8:47:85:3b:9e:e4:da:bf:9e:
6b:61:d4:79:30:e8:47:b0:e5:e1:e2:20:df:2c:20:2c:67:b8:
cf:8b:2a:b6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,208,568 UART:
2,209,558 UART: Running Caliptra ROM ...
2,210,645 UART:
2,210,808 UART: [state] CFI Enabled
2,211,698 UART: [state] LifecycleState = Unprovisioned
2,213,356 UART: [state] DebugLocked = No
2,214,391 UART: [state] WD Timer not started. Device not locked for debugging
2,217,116 UART: [kat] SHA2-256
2,217,797 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,220,828 UART: [kat] ++
2,221,282 UART: [kat] sha1
2,221,817 UART: [kat] SHA2-256
2,222,476 UART: [kat] SHA2-384
2,223,134 UART: [kat] SHA2-512-ACC
2,223,933 UART: [kat] ECC-384
3,771,708 UART: [kat] HMAC-384Kdf
3,799,004 UART: [kat] LMS
4,872,150 UART: [kat] --
4,876,879 UART: [cold-reset] ++
4,877,999 UART: [fht] FHT @ 0x50003400
4,890,569 UART: [idev] ++
4,891,242 UART: [idev] CDI.KEYID = 6
4,892,347 UART: [idev] SUBJECT.KEYID = 7
4,893,561 UART: [idev] UDS.KEYID = 0
4,927,170 UART: [idev] Erasing UDS.KEYID = 0
8,240,045 UART: [idev] Sha1 KeyId Algorithm
8,258,793 UART: [idev] CSR upload begun
8,264,229 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,572,309 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,588,651 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,604,657 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,620,743 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,645,101 UART: [idev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
10,792,010 UART: [idev] CSR uploaded
10,808,865 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
10,943,266 UART: [idev] --
10,943,907 UART: [ldev] ++
10,944,403 UART: [ldev] CDI.KEYID = 6
10,945,280 UART: [ldev] SUBJECT.KEYID = 5
10,946,329 UART: [ldev] AUTHORITY.KEYID = 7
10,947,516 UART: [ldev] FE.KEYID = 1
10,948,362 UART: [ldev] Erasing FE.KEYID = 1
14,189,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,948 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,551,811 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,571,699 UART: [ldev] --
16,575,722 UART: [fwproc] Wait for Commands...
16,578,790 UART: [fwproc] Recv command 0x46574c44
16,581,098 UART: [fwproc] Recv'd Img size: 106620 bytes
20,562,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,633,160 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,675,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
20,992,104 >>> mbox cmd response: success
20,992,476 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,995,629 UART: [afmc] ++
20,996,202 UART: [afmc] CDI.KEYID = 6
20,997,434 UART: [afmc] SUBJECT.KEYID = 7
20,998,606 UART: [afmc] AUTHORITY.KEYID = 5
24,357,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,655,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,658,062 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,674,122 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,690,209 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,706,181 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,729,742 UART: [afmc] --
26,732,789 UART: [cold-reset] --
26,736,971 UART: [state] Locking Datavault
26,743,082 UART: [state] Locking PCR0, PCR1 and PCR31
26,744,727 UART: [state] Locking ICCM
26,747,086 UART: [exit] Launching FMC @ 0x40000000
26,755,698 UART:
26,755,929 UART: Running Caliptra FMC ...
26,757,027 UART:
26,757,205 UART: [fmc] Received command: 0x10000001
26,758,662 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,778,395 UART: [fmc] LDEVID cert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
26,871,122 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,891,861 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,012,843 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
10,500,622 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
20,592,238 >>> mbox cmd response: success
20,592,718 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,278,635 UART:
26,279,030 UART: Running Caliptra FMC ...
26,280,146 UART:
26,280,303 UART: [fmc] Received command: 0x10000001
26,281,849 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,301,241 UART: [fmc] LDEVID cert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
26,393,982 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,414,689 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
26,535,686 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,227,286 UART:
2,228,201 UART: Running Caliptra ROM ...
2,229,319 UART:
2,229,468 UART: [state] CFI Enabled
2,230,382 UART: [state] LifecycleState = Unprovisioned
2,232,035 UART: [state] DebugLocked = No
2,233,152 UART: [state] WD Timer not started. Device not locked for debugging
2,235,621 UART: [kat] SHA2-256
2,236,281 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,239,290 UART: [kat] ++
2,239,732 UART: [kat] sha1
2,240,240 UART: [kat] SHA2-256
2,240,926 UART: [kat] SHA2-384
2,241,576 UART: [kat] SHA2-512-ACC
2,242,389 UART: [kat] ECC-384
4,097,860 UART: [kat] HMAC-384Kdf
4,109,272 UART: [kat] LMS
5,182,426 UART: [kat] --
5,186,931 UART: [cold-reset] ++
5,189,731 UART: [fht] FHT @ 0x50003400
5,200,431 UART: [idev] ++
5,201,097 UART: [idev] CDI.KEYID = 6
5,202,322 UART: [idev] SUBJECT.KEYID = 7
5,203,745 UART: [idev] UDS.KEYID = 0
5,222,032 UART: [idev] Erasing UDS.KEYID = 0
8,496,626 UART: [idev] Sha1 KeyId Algorithm
8,517,909 UART: [idev] CSR upload begun
8,523,409 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,814,247 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,830,653 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,846,725 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,862,785 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,887,147 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
11,033,961 UART: [idev] CSR uploaded
11,050,681 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
11,184,774 UART: [idev] --
11,185,414 UART: [ldev] ++
11,185,906 UART: [ldev] CDI.KEYID = 6
11,186,771 UART: [ldev] SUBJECT.KEYID = 5
11,187,903 UART: [ldev] AUTHORITY.KEYID = 7
11,188,989 UART: [ldev] FE.KEYID = 1
11,189,816 UART: [ldev] Erasing FE.KEYID = 1
14,358,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,652,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,668,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,684,318 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,700,256 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,720,370 UART: [ldev] --
16,724,871 UART: [fwproc] Wait for Commands...
16,727,503 UART: [fwproc] Recv command 0x46574c44
16,729,812 UART: [fwproc] Recv'd Img size: 106620 bytes
20,708,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,778,151 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,820,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,137,614 >>> mbox cmd response: success
21,137,993 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,140,928 UART: [afmc] ++
21,141,498 UART: [afmc] CDI.KEYID = 6
21,142,726 UART: [afmc] SUBJECT.KEYID = 7
21,143,874 UART: [afmc] AUTHORITY.KEYID = 5
24,463,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,759,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,762,322 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,778,313 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,794,379 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,810,335 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,834,019 UART: [afmc] --
26,837,282 UART: [cold-reset] --
26,841,095 UART: [state] Locking Datavault
26,847,201 UART: [state] Locking PCR0, PCR1 and PCR31
26,848,854 UART: [state] Locking ICCM
26,851,675 UART: [exit] Launching FMC @ 0x40000000
26,860,301 UART:
26,860,529 UART: Running Caliptra FMC ...
26,861,551 UART:
26,861,690 UART: [fmc] Received command: 0x10000001
26,863,131 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,882,992 UART: [fmc] LDEVID cert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
26,975,773 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,996,436 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,117,489 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
10,734,241 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
20,745,613 >>> mbox cmd response: success
20,746,070 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,382,898 UART:
26,383,296 UART: Running Caliptra FMC ...
26,384,369 UART:
26,384,513 UART: [fmc] Received command: 0x10000001
26,386,052 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,405,492 UART: [fmc] LDEVID cert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
26,498,266 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,518,975 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,640,035 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,210,987 UART:
2,211,903 UART: Running Caliptra ROM ...
2,213,026 UART:
2,213,184 UART: [state] CFI Enabled
2,214,058 UART: [state] LifecycleState = Unprovisioned
2,215,758 UART: [state] DebugLocked = No
2,216,876 UART: [state] WD Timer not started. Device not locked for debugging
2,219,357 UART: [kat] SHA2-256
2,220,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,036 UART: [kat] ++
2,223,486 UART: [kat] sha1
2,224,015 UART: [kat] SHA2-256
2,224,676 UART: [kat] SHA2-384
2,225,332 UART: [kat] SHA2-512-ACC
2,226,216 UART: [kat] ECC-384
2,950,407 UART: [kat] HMAC-384Kdf
2,972,159 UART: [kat] LMS
3,501,577 UART: [kat] --
3,508,059 UART: [cold-reset] ++
3,509,672 UART: [fht] FHT @ 0x50003400
3,520,867 UART: [idev] ++
3,521,441 UART: [idev] CDI.KEYID = 6
3,522,359 UART: [idev] SUBJECT.KEYID = 7
3,523,523 UART: [idev] UDS.KEYID = 0
3,542,636 UART: [idev] Erasing UDS.KEYID = 0
6,024,589 UART: [idev] Sha1 KeyId Algorithm
6,045,234 UART: [idev] CSR upload begun
6,049,918 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,782,370 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,452 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,814,400 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,830,261 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,853,917 UART: [idev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
7,999,589 UART: [idev] CSR uploaded
8,017,113 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,151,936 UART: [idev] --
8,152,579 UART: [ldev] ++
8,153,076 UART: [ldev] CDI.KEYID = 6
8,153,954 UART: [ldev] SUBJECT.KEYID = 5
8,155,097 UART: [ldev] AUTHORITY.KEYID = 7
8,156,199 UART: [ldev] FE.KEYID = 1
8,157,038 UART: [ldev] Erasing FE.KEYID = 1
10,566,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,282,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,298,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,314,582 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,330,342 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,350,703 UART: [ldev] --
12,355,115 UART: [fwproc] Wait for Commands...
12,357,271 UART: [fwproc] Recv command 0x46574c44
12,359,310 UART: [fwproc] Recv'd Img size: 106964 bytes
15,673,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,745,525 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,788,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,107,067 >>> mbox cmd response: success
16,107,457 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,111,901 UART: [afmc] ++
16,112,477 UART: [afmc] CDI.KEYID = 6
16,113,386 UART: [afmc] SUBJECT.KEYID = 7
16,114,565 UART: [afmc] AUTHORITY.KEYID = 5
18,655,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,380,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,381,928 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,398,025 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,413,941 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,429,769 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,452,505 UART: [afmc] --
20,457,125 UART: [cold-reset] --
20,459,366 UART: [state] Locking Datavault
20,466,662 UART: [state] Locking PCR0, PCR1 and PCR31
20,468,308 UART: [state] Locking ICCM
20,470,918 UART: [exit] Launching FMC @ 0x40000000
20,479,257 UART:
20,479,498 UART: Running Caliptra FMC ...
20,480,524 UART:
20,480,692 UART: [fmc] Received command: 0x10000001
20,482,151 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,501,962 UART: [fmc] LDEVID cert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
20,594,714 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,615,397 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,736,410 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
7,686,702 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,714,099 >>> mbox cmd response: success
15,714,834 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,006,669 UART:
20,007,070 UART: Running Caliptra FMC ...
20,008,162 UART:
20,008,323 UART: [fmc] Received command: 0x10000001
20,010,131 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,029,290 UART: [fmc] LDEVID cert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
20,122,193 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,142,893 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,264,158 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
2,215,294 UART:
2,216,267 UART: Running Caliptra ROM ...
2,217,381 UART:
2,217,540 UART: [state] CFI Enabled
2,218,408 UART: [state] LifecycleState = Unprovisioned
2,220,113 UART: [state] DebugLocked = No
2,221,229 UART: [state] WD Timer not started. Device not locked for debugging
2,223,709 UART: [kat] SHA2-256
2,224,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,372 UART: [kat] ++
2,227,819 UART: [kat] sha1
2,228,330 UART: [kat] SHA2-256
2,229,067 UART: [kat] SHA2-384
2,229,737 UART: [kat] SHA2-512-ACC
2,230,614 UART: [kat] ECC-384
3,278,346 UART: [kat] HMAC-384Kdf
3,289,885 UART: [kat] LMS
3,819,346 UART: [kat] --
3,825,700 UART: [cold-reset] ++
3,827,907 UART: [fht] FHT @ 0x50003400
3,839,910 UART: [idev] ++
3,840,506 UART: [idev] CDI.KEYID = 6
3,841,417 UART: [idev] SUBJECT.KEYID = 7
3,842,573 UART: [idev] UDS.KEYID = 0
3,858,494 UART: [idev] Erasing UDS.KEYID = 0
6,314,189 UART: [idev] Sha1 KeyId Algorithm
6,333,563 UART: [idev] CSR upload begun
6,338,228 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,054,656 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,070,763 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,086,690 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,102,563 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,126,271 UART: [idev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
8,272,162 UART: [idev] CSR uploaded
8,289,813 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,424,219 UART: [idev] --
8,424,857 UART: [ldev] ++
8,425,374 UART: [ldev] CDI.KEYID = 6
8,426,282 UART: [ldev] SUBJECT.KEYID = 5
8,427,331 UART: [ldev] AUTHORITY.KEYID = 7
8,428,420 UART: [ldev] FE.KEYID = 1
8,429,281 UART: [ldev] Erasing FE.KEYID = 1
10,784,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,501,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,517,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,533,121 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,548,893 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,567,998 UART: [ldev] --
12,573,202 UART: [fwproc] Wait for Commands...
12,575,133 UART: [fwproc] Recv command 0x46574c44
12,577,227 UART: [fwproc] Recv'd Img size: 106964 bytes
15,883,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,959,231 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,001,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,320,856 >>> mbox cmd response: success
16,321,220 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,324,267 UART: [afmc] ++
16,324,842 UART: [afmc] CDI.KEYID = 6
16,325,903 UART: [afmc] SUBJECT.KEYID = 7
16,327,004 UART: [afmc] AUTHORITY.KEYID = 5
18,827,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,549,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,551,747 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,567,834 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,583,752 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,599,552 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,621,961 UART: [afmc] --
20,626,040 UART: [cold-reset] --
20,629,792 UART: [state] Locking Datavault
20,634,730 UART: [state] Locking PCR0, PCR1 and PCR31
20,636,376 UART: [state] Locking ICCM
20,637,526 UART: [exit] Launching FMC @ 0x40000000
20,645,914 UART:
20,646,144 UART: Running Caliptra FMC ...
20,647,165 UART:
20,647,309 UART: [fmc] Received command: 0x10000001
20,648,765 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,668,526 UART: [fmc] LDEVID cert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
20,761,342 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,782,008 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,903,002 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
7,944,179 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,911,482 >>> mbox cmd response: success
15,911,971 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,168,515 UART:
20,168,897 UART: Running Caliptra FMC ...
20,170,012 UART:
20,170,172 UART: [fmc] Received command: 0x10000001
20,171,703 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,191,173 UART: [fmc] LDEVID cert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
20,284,070 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,304,754 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,425,999 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,213,600 UART:
2,214,535 UART: Running Caliptra ROM ...
2,215,627 UART:
2,215,781 UART: [state] CFI Enabled
2,216,658 UART: [state] LifecycleState = Unprovisioned
2,218,366 UART: [state] DebugLocked = No
2,219,490 UART: [state] WD Timer not started. Device not locked for debugging
2,221,978 UART: [kat] SHA2-256
2,222,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,226,028 UART: [kat] ++
2,226,497 UART: [kat] sha1
2,227,010 UART: [kat] SHA2-256
2,227,668 UART: [kat] SHA2-384
2,228,324 UART: [kat] SHA2-512-ACC
2,229,118 UART: [kat] ECC-384
2,949,508 UART: [kat] HMAC-384Kdf
2,969,496 UART: [kat] LMS
3,498,970 UART: [kat] --
3,503,328 UART: [cold-reset] ++
3,505,558 UART: [fht] FHT @ 0x50003400
3,515,569 UART: [idev] ++
3,516,156 UART: [idev] CDI.KEYID = 6
3,517,072 UART: [idev] SUBJECT.KEYID = 7
3,518,239 UART: [idev] UDS.KEYID = 0
3,542,490 UART: [idev] Erasing UDS.KEYID = 0
6,025,647 UART: [idev] Sha1 KeyId Algorithm
6,044,947 UART: [idev] CSR upload begun
6,049,616 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,685 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,795,806 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,737 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,827,634 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,851,272 UART: [idev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
7,997,153 UART: [idev] CSR uploaded
8,014,910 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,150,158 UART: [idev] --
8,150,814 UART: [ldev] ++
8,151,339 UART: [ldev] CDI.KEYID = 6
8,152,318 UART: [ldev] SUBJECT.KEYID = 5
8,153,389 UART: [ldev] AUTHORITY.KEYID = 7
8,154,482 UART: [ldev] FE.KEYID = 1
8,155,317 UART: [ldev] Erasing FE.KEYID = 1
10,570,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,304,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,320,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,336,587 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,352,335 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,372,559 UART: [ldev] --
12,378,044 UART: [fwproc] Wait for Commands...
12,379,661 UART: [fwproc] Recv command 0x46574c44
12,381,762 UART: [fwproc] Recv'd Img size: 106964 bytes
15,684,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,752,908 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,795,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,113,008 >>> mbox cmd response: success
16,113,386 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,116,902 UART: [afmc] ++
16,117,482 UART: [afmc] CDI.KEYID = 6
16,118,391 UART: [afmc] SUBJECT.KEYID = 7
16,119,551 UART: [afmc] AUTHORITY.KEYID = 5
18,643,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,368,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,370,598 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,386,702 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,402,622 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,418,420 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,440,594 UART: [afmc] --
20,443,536 UART: [cold-reset] --
20,448,848 UART: [state] Locking Datavault
20,454,110 UART: [state] Locking PCR0, PCR1 and PCR31
20,455,758 UART: [state] Locking ICCM
20,456,769 UART: [exit] Launching FMC @ 0x40000000
20,465,164 UART:
20,465,438 UART: Running Caliptra FMC ...
20,466,549 UART:
20,466,707 UART: [fmc] Received command: 0x10000001
20,468,167 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,487,815 UART: [fmc] LDEVID cert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
20,580,594 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,601,263 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,722,296 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,655 writing to cptra_bootfsm_go
7,687,391 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,710,966 >>> mbox cmd response: success
15,711,718 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,010,693 UART:
20,011,077 UART: Running Caliptra FMC ...
20,012,198 UART:
20,012,359 UART: [fmc] Received command: 0x10000001
20,013,916 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,033,360 UART: [fmc] LDEVID cert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
20,126,205 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,146,942 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,268,180 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
2,215,193 UART:
2,216,094 UART: Running Caliptra ROM ...
2,217,208 UART:
2,217,369 UART: [state] CFI Enabled
2,218,242 UART: [state] LifecycleState = Unprovisioned
2,219,954 UART: [state] DebugLocked = No
2,221,072 UART: [state] WD Timer not started. Device not locked for debugging
2,223,554 UART: [kat] SHA2-256
2,224,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,227 UART: [kat] ++
2,227,676 UART: [kat] sha1
2,228,189 UART: [kat] SHA2-256
2,228,927 UART: [kat] SHA2-384
2,229,849 UART: [kat] SHA2-512-ACC
2,230,689 UART: [kat] ECC-384
3,276,565 UART: [kat] HMAC-384Kdf
3,288,743 UART: [kat] LMS
3,818,235 UART: [kat] --
3,823,090 UART: [cold-reset] ++
3,824,747 UART: [fht] FHT @ 0x50003400
3,835,734 UART: [idev] ++
3,836,359 UART: [idev] CDI.KEYID = 6
3,837,243 UART: [idev] SUBJECT.KEYID = 7
3,838,344 UART: [idev] UDS.KEYID = 0
3,854,690 UART: [idev] Erasing UDS.KEYID = 0
6,310,505 UART: [idev] Sha1 KeyId Algorithm
6,331,963 UART: [idev] CSR upload begun
6,336,667 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,054,131 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,070,158 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,086,145 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,102,028 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,125,687 UART: [idev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
8,271,611 UART: [idev] CSR uploaded
8,289,424 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,424,249 UART: [idev] --
8,424,906 UART: [ldev] ++
8,425,433 UART: [ldev] CDI.KEYID = 6
8,426,310 UART: [ldev] SUBJECT.KEYID = 5
8,427,391 UART: [ldev] AUTHORITY.KEYID = 7
8,428,491 UART: [ldev] FE.KEYID = 1
8,429,364 UART: [ldev] Erasing FE.KEYID = 1
10,780,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,500,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,516,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,532,390 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,548,138 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,569,698 UART: [ldev] --
12,574,111 UART: [fwproc] Wait for Commands...
12,576,523 UART: [fwproc] Recv command 0x46574c44
12,578,564 UART: [fwproc] Recv'd Img size: 106964 bytes
15,891,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,962,868 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,005,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,733 >>> mbox cmd response: success
16,324,099 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,327,791 UART: [afmc] ++
16,328,363 UART: [afmc] CDI.KEYID = 6
16,329,272 UART: [afmc] SUBJECT.KEYID = 7
16,330,430 UART: [afmc] AUTHORITY.KEYID = 5
18,827,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,548,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,550,105 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,566,191 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,582,147 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,597,943 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,620,219 UART: [afmc] --
20,624,770 UART: [cold-reset] --
20,627,592 UART: [state] Locking Datavault
20,633,435 UART: [state] Locking PCR0, PCR1 and PCR31
20,635,173 UART: [state] Locking ICCM
20,637,000 UART: [exit] Launching FMC @ 0x40000000
20,645,343 UART:
20,645,577 UART: Running Caliptra FMC ...
20,646,675 UART:
20,646,830 UART: [fmc] Received command: 0x10000001
20,648,282 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,667,985 UART: [fmc] LDEVID cert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
20,760,778 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,781,488 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,902,490 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
7,948,104 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,912,617 >>> mbox cmd response: success
15,913,095 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,163,918 UART:
20,164,304 UART: Running Caliptra FMC ...
20,165,414 UART:
20,165,572 UART: [fmc] Received command: 0x10000001
20,167,112 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,186,624 UART: [fmc] LDEVID cert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
20,279,498 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,300,171 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,421,403 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,062 UART: [kat] SHA2-256
890,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,741 UART: [kat] ++
894,893 UART: [kat] sha1
899,091 UART: [kat] SHA2-256
901,031 UART: [kat] SHA2-384
903,816 UART: [kat] SHA2-512-ACC
905,717 UART: [kat] ECC-384
915,646 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,615 UART: [idev] ++
1,172,783 UART: [idev] CDI.KEYID = 6
1,173,144 UART: [idev] SUBJECT.KEYID = 7
1,173,569 UART: [idev] UDS.KEYID = 0
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,925 UART: [idev] Sha1 KeyId Algorithm
1,207,101 UART: [idev] CSR upload begun
1,208,880 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,853 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,561 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,446 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,162 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,627 UART: [idev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
1,297,417 UART: [idev] CSR uploaded
1,300,462 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,631 UART: [idev] --
1,301,576 UART: [ldev] ++
1,301,744 UART: [ldev] CDI.KEYID = 6
1,302,108 UART: [ldev] SUBJECT.KEYID = 5
1,302,535 UART: [ldev] AUTHORITY.KEYID = 7
1,302,998 UART: [ldev] FE.KEYID = 1
1,307,958 UART: [ldev] Erasing FE.KEYID = 1
1,334,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,796 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,520 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,643 UART: [ldev] --
1,374,121 UART: [fwproc] Wait for Commands...
1,374,874 UART: [fwproc] Recv command 0x46574c44
1,375,607 UART: [fwproc] Recv'd Img size: 106964 bytes
2,586,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,857 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,832 >>> mbox cmd response: success
2,768,832 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,769,995 UART: [afmc] ++
2,770,163 UART: [afmc] CDI.KEYID = 6
2,770,526 UART: [afmc] SUBJECT.KEYID = 7
2,770,952 UART: [afmc] AUTHORITY.KEYID = 5
2,805,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,153 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,873 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,766 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,471 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,398 UART: [afmc] --
2,849,442 UART: [cold-reset] --
2,850,434 UART: [state] Locking Datavault
2,851,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,207 UART: [state] Locking ICCM
2,852,865 UART: [exit] Launching FMC @ 0x40000000
2,858,162 UART:
2,858,178 UART: Running Caliptra FMC ...
2,858,586 UART:
2,858,724 UART: [fmc] Received command: 0x10000001
2,859,817 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,677 UART: [fmc] LDEVID cert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
2,969,654 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,245 UART: [fmc] FMCALIAS cert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
3,107,780 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,164 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,542,777 >>> mbox cmd response: success
2,542,777 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,604,852 UART:
2,604,868 UART: Running Caliptra FMC ...
2,605,276 UART:
2,605,414 UART: [fmc] Received command: 0x10000001
2,606,507 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,367 UART: [fmc] LDEVID cert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
2,716,344 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,935 UART: [fmc] FMCALIAS cert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
2,854,470 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
890,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,066 UART: [kat] ++
895,218 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,060 UART: [idev] CSR upload begun
1,208,839 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,046 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,754 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,639 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,355 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,820 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,610 UART: [idev] CSR uploaded
1,300,655 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,824 UART: [idev] --
1,301,799 UART: [ldev] ++
1,301,967 UART: [ldev] CDI.KEYID = 6
1,302,331 UART: [ldev] SUBJECT.KEYID = 5
1,302,758 UART: [ldev] AUTHORITY.KEYID = 7
1,303,221 UART: [ldev] FE.KEYID = 1
1,308,379 UART: [ldev] Erasing FE.KEYID = 1
1,334,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,695 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,419 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,350 UART: [ldev] --
1,373,748 UART: [fwproc] Wait for Commands...
1,374,375 UART: [fwproc] Recv command 0x46574c44
1,375,108 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,564 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,633,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,769,759 >>> mbox cmd response: success
2,769,759 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,976 UART: [afmc] ++
2,771,144 UART: [afmc] CDI.KEYID = 6
2,771,507 UART: [afmc] SUBJECT.KEYID = 7
2,771,933 UART: [afmc] AUTHORITY.KEYID = 5
2,808,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,352 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,831,072 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,836,965 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,842,670 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,850,645 UART: [afmc] --
2,851,621 UART: [cold-reset] --
2,852,591 UART: [state] Locking Datavault
2,853,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,414 UART: [state] Locking ICCM
2,855,044 UART: [exit] Launching FMC @ 0x40000000
2,860,341 UART:
2,860,357 UART: Running Caliptra FMC ...
2,860,765 UART:
2,860,903 UART: [fmc] Received command: 0x10000001
2,861,996 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,880,856 UART: [fmc] LDEVID cert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
2,971,833 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,991,424 UART: [fmc] FMCALIAS cert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
3,109,959 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,283 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,544,116 >>> mbox cmd response: success
2,544,116 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,345 UART:
2,606,361 UART: Running Caliptra FMC ...
2,606,769 UART:
2,606,907 UART: [fmc] Received command: 0x10000001
2,608,000 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,860 UART: [fmc] LDEVID cert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
2,717,837 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,428 UART: [fmc] FMCALIAS cert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
2,855,963 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
915,626 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,227 UART: [cold-reset] ++
1,169,721 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,181,409 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,206,729 UART: [idev] CSR upload begun
1,208,508 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,889 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,597 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,482 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,198 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,663 UART: [idev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
1,296,453 UART: [idev] CSR uploaded
1,299,498 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,299,667 UART: [idev] --
1,300,762 UART: [ldev] ++
1,300,930 UART: [ldev] CDI.KEYID = 6
1,301,294 UART: [ldev] SUBJECT.KEYID = 5
1,301,721 UART: [ldev] AUTHORITY.KEYID = 7
1,302,184 UART: [ldev] FE.KEYID = 1
1,307,438 UART: [ldev] Erasing FE.KEYID = 1
1,334,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,428 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,152 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,331 UART: [ldev] --
1,373,637 UART: [fwproc] Wait for Commands...
1,374,422 UART: [fwproc] Recv command 0x46574c44
1,375,155 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,759 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,767,818 >>> mbox cmd response: success
2,767,818 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,837 UART: [afmc] ++
2,769,005 UART: [afmc] CDI.KEYID = 6
2,769,368 UART: [afmc] SUBJECT.KEYID = 7
2,769,794 UART: [afmc] AUTHORITY.KEYID = 5
2,805,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,011 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,731 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,624 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,329 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,142 UART: [afmc] --
2,849,048 UART: [cold-reset] --
2,849,986 UART: [state] Locking Datavault
2,851,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,835 UART: [state] Locking ICCM
2,852,487 UART: [exit] Launching FMC @ 0x40000000
2,857,784 UART:
2,857,800 UART: Running Caliptra FMC ...
2,858,208 UART:
2,858,346 UART: [fmc] Received command: 0x10000001
2,859,439 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,299 UART: [fmc] LDEVID cert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
2,969,276 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,867 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,107,402 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,196 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,544,679 >>> mbox cmd response: success
2,544,679 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,276 UART:
2,606,292 UART: Running Caliptra FMC ...
2,606,700 UART:
2,606,838 UART: [fmc] Received command: 0x10000001
2,607,931 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,791 UART: [fmc] LDEVID cert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
2,717,768 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,359 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,855,894 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,379 UART: [kat] SHA2-256
891,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,058 UART: [kat] ++
896,210 UART: [kat] sha1
900,512 UART: [kat] SHA2-256
902,452 UART: [kat] SHA2-384
905,299 UART: [kat] SHA2-512-ACC
907,200 UART: [kat] ECC-384
917,317 UART: [kat] HMAC-384Kdf
921,767 UART: [kat] LMS
1,170,079 UART: [kat] --
1,170,924 UART: [cold-reset] ++
1,171,276 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,207,772 UART: [idev] CSR upload begun
1,209,551 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,756 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,464 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,349 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,065 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,530 UART: [idev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
1,298,320 UART: [idev] CSR uploaded
1,301,365 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,301,534 UART: [idev] --
1,302,501 UART: [ldev] ++
1,302,669 UART: [ldev] CDI.KEYID = 6
1,303,033 UART: [ldev] SUBJECT.KEYID = 5
1,303,460 UART: [ldev] AUTHORITY.KEYID = 7
1,303,923 UART: [ldev] FE.KEYID = 1
1,309,259 UART: [ldev] Erasing FE.KEYID = 1
1,335,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,531 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,255 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,168 UART: [ldev] --
1,374,542 UART: [fwproc] Wait for Commands...
1,375,367 UART: [fwproc] Recv command 0x46574c44
1,376,100 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,768 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,931 >>> mbox cmd response: success
2,768,931 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,000 UART: [afmc] ++
2,770,168 UART: [afmc] CDI.KEYID = 6
2,770,531 UART: [afmc] SUBJECT.KEYID = 7
2,770,957 UART: [afmc] AUTHORITY.KEYID = 5
2,806,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,584 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,304 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,197 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,902 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,641 UART: [afmc] --
2,849,727 UART: [cold-reset] --
2,850,405 UART: [state] Locking Datavault
2,851,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,280 UART: [state] Locking ICCM
2,852,862 UART: [exit] Launching FMC @ 0x40000000
2,858,159 UART:
2,858,175 UART: Running Caliptra FMC ...
2,858,583 UART:
2,858,721 UART: [fmc] Received command: 0x10000001
2,859,814 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,674 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,969,651 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,242 UART: [fmc] FMCALIAS cert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
3,107,777 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,691 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,547,280 >>> mbox cmd response: success
2,547,280 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,609,135 UART:
2,609,151 UART: Running Caliptra FMC ...
2,609,559 UART:
2,609,697 UART: [fmc] Received command: 0x10000001
2,610,790 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,629,650 UART: [fmc] LDEVID cert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
2,720,627 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,218 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,858,753 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,206,693 UART: [idev] CSR upload begun
1,208,472 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,287 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,995 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,880 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,596 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,061 UART: [idev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
1,296,851 UART: [idev] CSR uploaded
1,299,896 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,065 UART: [idev] --
1,301,314 UART: [ldev] ++
1,301,482 UART: [ldev] CDI.KEYID = 6
1,301,846 UART: [ldev] SUBJECT.KEYID = 5
1,302,273 UART: [ldev] AUTHORITY.KEYID = 7
1,302,736 UART: [ldev] FE.KEYID = 1
1,307,606 UART: [ldev] Erasing FE.KEYID = 1
1,333,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,550 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,274 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,243 UART: [ldev] --
1,372,627 UART: [fwproc] Wait for Commands...
1,373,264 UART: [fwproc] Recv command 0x46574c44
1,373,997 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,689 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,860 >>> mbox cmd response: success
2,768,860 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,011 UART: [afmc] ++
2,770,179 UART: [afmc] CDI.KEYID = 6
2,770,542 UART: [afmc] SUBJECT.KEYID = 7
2,770,968 UART: [afmc] AUTHORITY.KEYID = 5
2,805,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,027 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,747 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,640 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,345 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,196 UART: [afmc] --
2,849,268 UART: [cold-reset] --
2,850,292 UART: [state] Locking Datavault
2,851,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,995 UART: [state] Locking ICCM
2,852,651 UART: [exit] Launching FMC @ 0x40000000
2,857,948 UART:
2,857,964 UART: Running Caliptra FMC ...
2,858,372 UART:
2,858,510 UART: [fmc] Received command: 0x10000001
2,859,603 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,463 UART: [fmc] LDEVID cert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
2,969,440 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,031 UART: [fmc] FMCALIAS cert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
3,107,566 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,698 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,545,749 >>> mbox cmd response: success
2,545,749 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,607,122 UART:
2,607,138 UART: Running Caliptra FMC ...
2,607,546 UART:
2,607,684 UART: [fmc] Received command: 0x10000001
2,608,777 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,627,637 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,718,614 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,205 UART: [fmc] FMCALIAS cert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
2,856,740 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,447 UART: [kat] SHA2-256
891,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,126 UART: [kat] ++
896,278 UART: [kat] sha1
900,440 UART: [kat] SHA2-256
902,380 UART: [kat] SHA2-384
905,173 UART: [kat] SHA2-512-ACC
907,074 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] CSR upload begun
1,209,619 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,516 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,224 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,109 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,825 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,290 UART: [idev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
1,298,080 UART: [idev] CSR uploaded
1,301,125 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,301,294 UART: [idev] --
1,302,423 UART: [ldev] ++
1,302,591 UART: [ldev] CDI.KEYID = 6
1,302,955 UART: [ldev] SUBJECT.KEYID = 5
1,303,382 UART: [ldev] AUTHORITY.KEYID = 7
1,303,845 UART: [ldev] FE.KEYID = 1
1,309,157 UART: [ldev] Erasing FE.KEYID = 1
1,335,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,787 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,511 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,570 UART: [ldev] --
1,375,072 UART: [fwproc] Wait for Commands...
1,375,809 UART: [fwproc] Recv command 0x46574c44
1,376,542 UART: [fwproc] Recv'd Img size: 106964 bytes
2,588,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,670 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,633,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,769,661 >>> mbox cmd response: success
2,769,661 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,908 UART: [afmc] ++
2,771,076 UART: [afmc] CDI.KEYID = 6
2,771,439 UART: [afmc] SUBJECT.KEYID = 7
2,771,865 UART: [afmc] AUTHORITY.KEYID = 5
2,807,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,982 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,830,702 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,836,595 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,842,300 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,850,013 UART: [afmc] --
2,850,933 UART: [cold-reset] --
2,851,791 UART: [state] Locking Datavault
2,852,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,492 UART: [state] Locking ICCM
2,853,968 UART: [exit] Launching FMC @ 0x40000000
2,859,265 UART:
2,859,281 UART: Running Caliptra FMC ...
2,859,689 UART:
2,859,827 UART: [fmc] Received command: 0x10000001
2,860,920 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,879,780 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,970,757 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,990,348 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,108,883 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,219 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,546,172 >>> mbox cmd response: success
2,546,172 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,608,851 UART:
2,608,867 UART: Running Caliptra FMC ...
2,609,275 UART:
2,609,413 UART: [fmc] Received command: 0x10000001
2,610,506 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,629,366 UART: [fmc] LDEVID cert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
2,720,343 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,934 UART: [fmc] FMCALIAS cert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
2,858,469 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
5,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,015 UART:
192,426 UART: Running Caliptra ROM ...
193,518 UART:
193,656 UART: [state] CFI Enabled
260,673 UART: [state] LifecycleState = Unprovisioned
263,026 UART: [state] DebugLocked = No
265,027 UART: [state] WD Timer not started. Device not locked for debugging
269,271 UART: [kat] SHA2-256
451,195 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,715 UART: [kat] ++
463,223 UART: [kat] sha1
473,884 UART: [kat] SHA2-256
476,902 UART: [kat] SHA2-384
483,254 UART: [kat] SHA2-512-ACC
485,973 UART: [kat] ECC-384
3,775,170 UART: [kat] HMAC-384Kdf
3,801,707 UART: [kat] LMS
4,874,856 UART: [kat] --
4,879,016 UART: [cold-reset] ++
4,881,387 UART: [fht] FHT @ 0x50003400
4,891,247 UART: [idev] ++
4,891,972 UART: [idev] CDI.KEYID = 6
4,893,028 UART: [idev] SUBJECT.KEYID = 7
4,894,253 UART: [idev] UDS.KEYID = 0
4,919,693 UART: [idev] Erasing UDS.KEYID = 0
8,234,359 UART: [idev] Sha1 KeyId Algorithm
8,256,474 UART: [idev] --
8,261,313 UART: [ldev] ++
8,261,892 UART: [ldev] CDI.KEYID = 6
8,263,005 UART: [ldev] SUBJECT.KEYID = 5
8,264,230 UART: [ldev] AUTHORITY.KEYID = 7
8,265,386 UART: [ldev] FE.KEYID = 1
8,307,441 UART: [ldev] Erasing FE.KEYID = 1
11,644,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,956,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,972,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,988,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,004,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,024,454 UART: [ldev] --
14,029,518 UART: [fwproc] Wait for Commands...
14,032,707 UART: [fwproc] Recv command 0x46574c44
14,034,975 UART: [fwproc] Recv'd Img size: 114124 bytes
16,979,739 UART: ROM Fatal Error: 0x000B0014
16,983,188 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,288 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,746,967 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
6,647 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,656 UART:
193,377 UART: Running Caliptra ROM ...
194,557 UART:
603,700 UART: [state] CFI Enabled
618,024 UART: [state] LifecycleState = Unprovisioned
620,382 UART: [state] DebugLocked = No
621,872 UART: [state] WD Timer not started. Device not locked for debugging
626,615 UART: [kat] SHA2-256
808,619 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,171 UART: [kat] ++
820,698 UART: [kat] sha1
830,928 UART: [kat] SHA2-256
833,940 UART: [kat] SHA2-384
839,105 UART: [kat] SHA2-512-ACC
841,718 UART: [kat] ECC-384
4,099,002 UART: [kat] HMAC-384Kdf
4,111,386 UART: [kat] LMS
5,184,540 UART: [kat] --
5,190,116 UART: [cold-reset] ++
5,192,264 UART: [fht] FHT @ 0x50003400
5,203,190 UART: [idev] ++
5,203,857 UART: [idev] CDI.KEYID = 6
5,205,090 UART: [idev] SUBJECT.KEYID = 7
5,206,532 UART: [idev] UDS.KEYID = 0
5,224,723 UART: [idev] Erasing UDS.KEYID = 0
8,500,416 UART: [idev] Sha1 KeyId Algorithm
8,523,134 UART: [idev] --
8,527,407 UART: [ldev] ++
8,528,017 UART: [ldev] CDI.KEYID = 6
8,529,211 UART: [ldev] SUBJECT.KEYID = 5
8,530,652 UART: [ldev] AUTHORITY.KEYID = 7
8,532,217 UART: [ldev] FE.KEYID = 1
8,543,351 UART: [ldev] Erasing FE.KEYID = 1
11,837,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,018 UART: [ldev] --
14,202,227 UART: [fwproc] Wait for Commands...
14,204,050 UART: [fwproc] Recv command 0x46574c44
14,206,372 UART: [fwproc] Recv'd Img size: 114124 bytes
17,151,554 UART: ROM Fatal Error: 0x000B0014
17,155,014 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,958,012 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
5,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,070 UART:
192,476 UART: Running Caliptra ROM ...
193,647 UART:
193,802 UART: [state] CFI Enabled
264,566 UART: [state] LifecycleState = Unprovisioned
266,429 UART: [state] DebugLocked = No
268,406 UART: [state] WD Timer not started. Device not locked for debugging
271,767 UART: [kat] SHA2-256
450,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,430 UART: [kat] ++
462,934 UART: [kat] sha1
474,192 UART: [kat] SHA2-256
477,257 UART: [kat] SHA2-384
482,157 UART: [kat] SHA2-512-ACC
485,100 UART: [kat] ECC-384
2,948,079 UART: [kat] HMAC-384Kdf
2,970,823 UART: [kat] LMS
3,500,265 UART: [kat] --
3,505,881 UART: [cold-reset] ++
3,508,030 UART: [fht] FHT @ 0x50003400
3,519,391 UART: [idev] ++
3,519,955 UART: [idev] CDI.KEYID = 6
3,520,864 UART: [idev] SUBJECT.KEYID = 7
3,522,081 UART: [idev] UDS.KEYID = 0
3,543,085 UART: [idev] Erasing UDS.KEYID = 0
6,025,492 UART: [idev] Sha1 KeyId Algorithm
6,047,165 UART: [idev] --
6,050,416 UART: [ldev] ++
6,050,992 UART: [ldev] CDI.KEYID = 6
6,051,899 UART: [ldev] SUBJECT.KEYID = 5
6,053,117 UART: [ldev] AUTHORITY.KEYID = 7
6,054,371 UART: [ldev] FE.KEYID = 1
6,099,952 UART: [ldev] Erasing FE.KEYID = 1
8,601,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,405 UART: [ldev] --
10,390,077 UART: [fwproc] Wait for Commands...
10,392,016 UART: [fwproc] Recv command 0x46574c44
10,394,063 UART: [fwproc] Recv'd Img size: 114448 bytes
12,688,307 UART: ROM Fatal Error: 0x000B0014
12,691,435 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
5,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,496,194 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
6,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,364 UART:
192,757 UART: Running Caliptra ROM ...
193,923 UART:
603,321 UART: [state] CFI Enabled
615,045 UART: [state] LifecycleState = Unprovisioned
616,942 UART: [state] DebugLocked = No
619,744 UART: [state] WD Timer not started. Device not locked for debugging
623,429 UART: [kat] SHA2-256
802,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,111 UART: [kat] ++
814,554 UART: [kat] sha1
825,753 UART: [kat] SHA2-256
828,739 UART: [kat] SHA2-384
836,398 UART: [kat] SHA2-512-ACC
839,331 UART: [kat] ECC-384
3,280,851 UART: [kat] HMAC-384Kdf
3,293,097 UART: [kat] LMS
3,822,555 UART: [kat] --
3,828,130 UART: [cold-reset] ++
3,829,627 UART: [fht] FHT @ 0x50003400
3,840,180 UART: [idev] ++
3,840,742 UART: [idev] CDI.KEYID = 6
3,841,653 UART: [idev] SUBJECT.KEYID = 7
3,842,868 UART: [idev] UDS.KEYID = 0
3,856,682 UART: [idev] Erasing UDS.KEYID = 0
6,309,978 UART: [idev] Sha1 KeyId Algorithm
6,331,793 UART: [idev] --
6,334,917 UART: [ldev] ++
6,335,479 UART: [ldev] CDI.KEYID = 6
6,336,355 UART: [ldev] SUBJECT.KEYID = 5
6,337,567 UART: [ldev] AUTHORITY.KEYID = 7
6,338,818 UART: [ldev] FE.KEYID = 1
6,350,787 UART: [ldev] Erasing FE.KEYID = 1
8,829,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,179 UART: [ldev] --
10,618,387 UART: [fwproc] Wait for Commands...
10,620,265 UART: [fwproc] Recv command 0x46574c44
10,622,302 UART: [fwproc] Recv'd Img size: 114448 bytes
12,908,407 UART: ROM Fatal Error: 0x000B0014
12,911,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
6,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,690,019 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
5,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,267 UART:
192,671 UART: Running Caliptra ROM ...
193,844 UART:
193,999 UART: [state] CFI Enabled
260,999 UART: [state] LifecycleState = Unprovisioned
262,929 UART: [state] DebugLocked = No
265,500 UART: [state] WD Timer not started. Device not locked for debugging
270,075 UART: [kat] SHA2-256
449,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,788 UART: [kat] ++
461,329 UART: [kat] sha1
473,833 UART: [kat] SHA2-256
476,901 UART: [kat] SHA2-384
483,631 UART: [kat] SHA2-512-ACC
486,565 UART: [kat] ECC-384
2,949,779 UART: [kat] HMAC-384Kdf
2,970,495 UART: [kat] LMS
3,499,934 UART: [kat] --
3,504,469 UART: [cold-reset] ++
3,505,746 UART: [fht] FHT @ 0x50003400
3,517,321 UART: [idev] ++
3,517,888 UART: [idev] CDI.KEYID = 6
3,518,766 UART: [idev] SUBJECT.KEYID = 7
3,519,998 UART: [idev] UDS.KEYID = 0
3,542,080 UART: [idev] Erasing UDS.KEYID = 0
6,024,871 UART: [idev] Sha1 KeyId Algorithm
6,048,906 UART: [idev] --
6,052,149 UART: [ldev] ++
6,052,729 UART: [ldev] CDI.KEYID = 6
6,053,612 UART: [ldev] SUBJECT.KEYID = 5
6,054,832 UART: [ldev] AUTHORITY.KEYID = 7
6,056,239 UART: [ldev] FE.KEYID = 1
6,097,743 UART: [ldev] Erasing FE.KEYID = 1
8,601,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,654 UART: [ldev] --
10,412,785 UART: [fwproc] Wait for Commands...
10,415,324 UART: [fwproc] Recv command 0x46574c44
10,417,430 UART: [fwproc] Recv'd Img size: 114448 bytes
12,708,281 UART: ROM Fatal Error: 0x000B0014
12,711,418 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
5,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,497,416 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
6,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,495 UART:
192,878 UART: Running Caliptra ROM ...
193,950 UART:
603,566 UART: [state] CFI Enabled
616,286 UART: [state] LifecycleState = Unprovisioned
618,168 UART: [state] DebugLocked = No
620,353 UART: [state] WD Timer not started. Device not locked for debugging
624,069 UART: [kat] SHA2-256
803,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,727 UART: [kat] ++
815,257 UART: [kat] sha1
826,248 UART: [kat] SHA2-256
829,239 UART: [kat] SHA2-384
834,291 UART: [kat] SHA2-512-ACC
837,230 UART: [kat] ECC-384
3,278,049 UART: [kat] HMAC-384Kdf
3,290,507 UART: [kat] LMS
3,820,041 UART: [kat] --
3,823,294 UART: [cold-reset] ++
3,824,148 UART: [fht] FHT @ 0x50003400
3,834,684 UART: [idev] ++
3,835,250 UART: [idev] CDI.KEYID = 6
3,836,156 UART: [idev] SUBJECT.KEYID = 7
3,837,383 UART: [idev] UDS.KEYID = 0
3,852,762 UART: [idev] Erasing UDS.KEYID = 0
6,309,844 UART: [idev] Sha1 KeyId Algorithm
6,332,009 UART: [idev] --
6,335,742 UART: [ldev] ++
6,336,309 UART: [ldev] CDI.KEYID = 6
6,337,216 UART: [ldev] SUBJECT.KEYID = 5
6,338,372 UART: [ldev] AUTHORITY.KEYID = 7
6,339,655 UART: [ldev] FE.KEYID = 1
6,348,849 UART: [ldev] Erasing FE.KEYID = 1
8,820,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,515 UART: [ldev] --
10,611,439 UART: [fwproc] Wait for Commands...
10,612,998 UART: [fwproc] Recv command 0x46574c44
10,615,102 UART: [fwproc] Recv'd Img size: 114448 bytes
12,905,654 UART: ROM Fatal Error: 0x000B0014
12,908,778 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
6,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,699,571 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,182,427 UART: [idev] Erasing UDS.KEYID = 0
1,199,933 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,076 UART: [fwproc] Wait for Commands...
1,281,655 UART: [fwproc] Recv command 0x46574c44
1,282,388 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,605 UART: ROM Fatal Error: 0x000B0014
1,549,762 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,501 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,688 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,553 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,092 UART: ROM Fatal Error: 0x000B0014
1,549,249 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,506 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,583 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,968 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,281,015 UART: [fwproc] Recv command 0x46574c44
1,281,748 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,143 UART: ROM Fatal Error: 0x000B0014
1,549,300 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,763 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,987 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,776 UART: [idev] ++
1,172,944 UART: [idev] CDI.KEYID = 6
1,173,305 UART: [idev] SUBJECT.KEYID = 7
1,173,730 UART: [idev] UDS.KEYID = 0
1,181,746 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,497 UART: [ldev] --
1,280,855 UART: [fwproc] Wait for Commands...
1,281,484 UART: [fwproc] Recv command 0x46574c44
1,282,217 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,752 UART: ROM Fatal Error: 0x000B0014
1,549,909 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,146 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,196 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,459 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,238 UART: ROM Fatal Error: 0x000B0014
1,551,395 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,241 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,781 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,087 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,110 UART: ROM Fatal Error: 0x000B0014
1,550,267 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,302 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,364 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,092 UART:
192,471 UART: Running Caliptra ROM ...
193,676 UART:
193,825 UART: [state] CFI Enabled
268,209 UART: [state] LifecycleState = Unprovisioned
270,639 UART: [state] DebugLocked = No
272,074 UART: [state] WD Timer not started. Device not locked for debugging
277,367 UART: [kat] SHA2-256
459,327 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,848 UART: [kat] ++
471,288 UART: [kat] sha1
481,358 UART: [kat] SHA2-256
484,417 UART: [kat] SHA2-384
490,007 UART: [kat] SHA2-512-ACC
492,626 UART: [kat] ECC-384
3,774,028 UART: [kat] HMAC-384Kdf
3,801,786 UART: [kat] LMS
4,874,953 UART: [kat] --
4,880,132 UART: [cold-reset] ++
4,881,794 UART: [fht] FHT @ 0x50003400
4,893,691 UART: [idev] ++
4,894,388 UART: [idev] CDI.KEYID = 6
4,895,627 UART: [idev] SUBJECT.KEYID = 7
4,896,652 UART: [idev] UDS.KEYID = 0
4,928,664 UART: [idev] Erasing UDS.KEYID = 0
8,242,467 UART: [idev] Sha1 KeyId Algorithm
8,264,568 UART: [idev] --
8,268,290 UART: [ldev] ++
8,268,918 UART: [ldev] CDI.KEYID = 6
8,270,101 UART: [ldev] SUBJECT.KEYID = 5
8,271,260 UART: [ldev] AUTHORITY.KEYID = 7
8,272,486 UART: [ldev] FE.KEYID = 1
8,318,948 UART: [ldev] Erasing FE.KEYID = 1
11,653,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,236 UART: [ldev] --
14,039,010 UART: [fwproc] Wait for Commands...
14,040,617 UART: [fwproc] Recv command 0x46574c44
14,042,875 UART: [fwproc] Recv'd Img size: 114124 bytes
16,993,485 UART: ROM Fatal Error: 0x000B0024
16,996,930 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,799,679 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,536 UART:
192,912 UART: Running Caliptra ROM ...
194,144 UART:
603,598 UART: [state] CFI Enabled
621,064 UART: [state] LifecycleState = Unprovisioned
623,410 UART: [state] DebugLocked = No
625,488 UART: [state] WD Timer not started. Device not locked for debugging
629,275 UART: [kat] SHA2-256
811,290 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,796 UART: [kat] ++
823,337 UART: [kat] sha1
833,621 UART: [kat] SHA2-256
836,677 UART: [kat] SHA2-384
843,182 UART: [kat] SHA2-512-ACC
845,789 UART: [kat] ECC-384
4,102,689 UART: [kat] HMAC-384Kdf
4,114,625 UART: [kat] LMS
5,187,780 UART: [kat] --
5,190,880 UART: [cold-reset] ++
5,193,325 UART: [fht] FHT @ 0x50003400
5,204,725 UART: [idev] ++
5,205,404 UART: [idev] CDI.KEYID = 6
5,206,641 UART: [idev] SUBJECT.KEYID = 7
5,208,076 UART: [idev] UDS.KEYID = 0
5,224,438 UART: [idev] Erasing UDS.KEYID = 0
8,497,354 UART: [idev] Sha1 KeyId Algorithm
8,519,685 UART: [idev] --
8,523,565 UART: [ldev] ++
8,524,130 UART: [ldev] CDI.KEYID = 6
8,525,370 UART: [ldev] SUBJECT.KEYID = 5
8,526,815 UART: [ldev] AUTHORITY.KEYID = 7
8,528,373 UART: [ldev] FE.KEYID = 1
8,540,157 UART: [ldev] Erasing FE.KEYID = 1
11,831,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,722 UART: [ldev] --
14,199,711 UART: [fwproc] Wait for Commands...
14,201,666 UART: [fwproc] Recv command 0x46574c44
14,203,993 UART: [fwproc] Recv'd Img size: 114124 bytes
17,152,820 UART: ROM Fatal Error: 0x000B0024
17,156,278 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,610 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,956,832 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,171 UART:
192,570 UART: Running Caliptra ROM ...
193,692 UART:
193,834 UART: [state] CFI Enabled
267,012 UART: [state] LifecycleState = Unprovisioned
268,952 UART: [state] DebugLocked = No
271,061 UART: [state] WD Timer not started. Device not locked for debugging
274,808 UART: [kat] SHA2-256
453,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,544 UART: [kat] ++
466,077 UART: [kat] sha1
478,312 UART: [kat] SHA2-256
481,315 UART: [kat] SHA2-384
487,287 UART: [kat] SHA2-512-ACC
490,226 UART: [kat] ECC-384
2,949,709 UART: [kat] HMAC-384Kdf
2,970,927 UART: [kat] LMS
3,500,397 UART: [kat] --
3,505,063 UART: [cold-reset] ++
3,507,386 UART: [fht] FHT @ 0x50003400
3,517,777 UART: [idev] ++
3,518,344 UART: [idev] CDI.KEYID = 6
3,519,317 UART: [idev] SUBJECT.KEYID = 7
3,520,487 UART: [idev] UDS.KEYID = 0
3,542,986 UART: [idev] Erasing UDS.KEYID = 0
6,025,780 UART: [idev] Sha1 KeyId Algorithm
6,048,206 UART: [idev] --
6,052,529 UART: [ldev] ++
6,053,104 UART: [ldev] CDI.KEYID = 6
6,054,019 UART: [ldev] SUBJECT.KEYID = 5
6,055,188 UART: [ldev] AUTHORITY.KEYID = 7
6,056,440 UART: [ldev] FE.KEYID = 1
6,099,497 UART: [ldev] Erasing FE.KEYID = 1
8,603,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,781 UART: [ldev] --
10,413,277 UART: [fwproc] Wait for Commands...
10,415,817 UART: [fwproc] Recv command 0x46574c44
10,417,913 UART: [fwproc] Recv'd Img size: 114448 bytes
12,711,257 UART: ROM Fatal Error: 0x000B0024
12,714,391 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,491,500 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,409 UART:
192,800 UART: Running Caliptra ROM ...
193,944 UART:
603,550 UART: [state] CFI Enabled
618,028 UART: [state] LifecycleState = Unprovisioned
619,956 UART: [state] DebugLocked = No
621,941 UART: [state] WD Timer not started. Device not locked for debugging
625,428 UART: [kat] SHA2-256
804,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,113 UART: [kat] ++
816,639 UART: [kat] sha1
828,491 UART: [kat] SHA2-256
831,546 UART: [kat] SHA2-384
837,197 UART: [kat] SHA2-512-ACC
840,178 UART: [kat] ECC-384
3,280,259 UART: [kat] HMAC-384Kdf
3,292,174 UART: [kat] LMS
3,821,641 UART: [kat] --
3,827,755 UART: [cold-reset] ++
3,829,688 UART: [fht] FHT @ 0x50003400
3,840,832 UART: [idev] ++
3,841,390 UART: [idev] CDI.KEYID = 6
3,842,399 UART: [idev] SUBJECT.KEYID = 7
3,843,574 UART: [idev] UDS.KEYID = 0
3,860,146 UART: [idev] Erasing UDS.KEYID = 0
6,317,319 UART: [idev] Sha1 KeyId Algorithm
6,341,008 UART: [idev] --
6,344,687 UART: [ldev] ++
6,345,329 UART: [ldev] CDI.KEYID = 6
6,346,219 UART: [ldev] SUBJECT.KEYID = 5
6,347,264 UART: [ldev] AUTHORITY.KEYID = 7
6,348,605 UART: [ldev] FE.KEYID = 1
6,359,166 UART: [ldev] Erasing FE.KEYID = 1
8,833,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,356 UART: [ldev] --
10,623,298 UART: [fwproc] Wait for Commands...
10,625,943 UART: [fwproc] Recv command 0x46574c44
10,628,039 UART: [fwproc] Recv'd Img size: 114448 bytes
12,914,469 UART: ROM Fatal Error: 0x000B0024
12,917,592 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
3,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,683,091 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
191,980 UART:
192,398 UART: Running Caliptra ROM ...
193,506 UART:
193,655 UART: [state] CFI Enabled
264,115 UART: [state] LifecycleState = Unprovisioned
265,998 UART: [state] DebugLocked = No
267,617 UART: [state] WD Timer not started. Device not locked for debugging
271,192 UART: [kat] SHA2-256
450,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,907 UART: [kat] ++
462,355 UART: [kat] sha1
473,446 UART: [kat] SHA2-256
476,464 UART: [kat] SHA2-384
483,140 UART: [kat] SHA2-512-ACC
486,072 UART: [kat] ECC-384
2,948,295 UART: [kat] HMAC-384Kdf
2,971,554 UART: [kat] LMS
3,501,037 UART: [kat] --
3,506,338 UART: [cold-reset] ++
3,507,351 UART: [fht] FHT @ 0x50003400
3,518,162 UART: [idev] ++
3,518,722 UART: [idev] CDI.KEYID = 6
3,519,631 UART: [idev] SUBJECT.KEYID = 7
3,520,844 UART: [idev] UDS.KEYID = 0
3,543,516 UART: [idev] Erasing UDS.KEYID = 0
6,024,130 UART: [idev] Sha1 KeyId Algorithm
6,048,066 UART: [idev] --
6,052,583 UART: [ldev] ++
6,053,169 UART: [ldev] CDI.KEYID = 6
6,054,080 UART: [ldev] SUBJECT.KEYID = 5
6,055,189 UART: [ldev] AUTHORITY.KEYID = 7
6,056,487 UART: [ldev] FE.KEYID = 1
6,100,704 UART: [ldev] Erasing FE.KEYID = 1
8,601,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,779 UART: [ldev] --
10,392,556 UART: [fwproc] Wait for Commands...
10,394,820 UART: [fwproc] Recv command 0x46574c44
10,396,921 UART: [fwproc] Recv'd Img size: 114448 bytes
12,686,844 UART: ROM Fatal Error: 0x000B0024
12,689,965 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,485,909 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,567 UART:
192,939 UART: Running Caliptra ROM ...
194,043 UART:
603,518 UART: [state] CFI Enabled
617,875 UART: [state] LifecycleState = Unprovisioned
620,069 UART: [state] DebugLocked = No
622,292 UART: [state] WD Timer not started. Device not locked for debugging
626,743 UART: [kat] SHA2-256
805,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,430 UART: [kat] ++
817,956 UART: [kat] sha1
830,076 UART: [kat] SHA2-256
833,086 UART: [kat] SHA2-384
839,946 UART: [kat] SHA2-512-ACC
842,930 UART: [kat] ECC-384
3,284,279 UART: [kat] HMAC-384Kdf
3,296,031 UART: [kat] LMS
3,825,547 UART: [kat] --
3,830,506 UART: [cold-reset] ++
3,832,594 UART: [fht] FHT @ 0x50003400
3,843,778 UART: [idev] ++
3,844,336 UART: [idev] CDI.KEYID = 6
3,845,214 UART: [idev] SUBJECT.KEYID = 7
3,846,476 UART: [idev] UDS.KEYID = 0
3,865,073 UART: [idev] Erasing UDS.KEYID = 0
6,322,251 UART: [idev] Sha1 KeyId Algorithm
6,345,147 UART: [idev] --
6,349,621 UART: [ldev] ++
6,350,183 UART: [ldev] CDI.KEYID = 6
6,351,084 UART: [ldev] SUBJECT.KEYID = 5
6,352,298 UART: [ldev] AUTHORITY.KEYID = 7
6,353,527 UART: [ldev] FE.KEYID = 1
6,364,821 UART: [ldev] Erasing FE.KEYID = 1
8,842,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,152 UART: [ldev] --
10,635,046 UART: [fwproc] Wait for Commands...
10,638,120 UART: [fwproc] Recv command 0x46574c44
10,640,159 UART: [fwproc] Recv'd Img size: 114448 bytes
12,928,939 UART: ROM Fatal Error: 0x000B0024
12,932,057 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,704,401 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,120 UART: [kat] LMS
1,169,432 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,745 UART: [idev] ++
1,173,913 UART: [idev] CDI.KEYID = 6
1,174,274 UART: [idev] SUBJECT.KEYID = 7
1,174,699 UART: [idev] UDS.KEYID = 0
1,182,949 UART: [idev] Erasing UDS.KEYID = 0
1,200,017 UART: [idev] Sha1 KeyId Algorithm
1,208,839 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,243,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,978 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,999 UART: [fwproc] Recv command 0x46574c44
1,283,732 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,837 UART: ROM Fatal Error: 0x000B0024
1,551,994 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,925 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,969 UART: [ldev] --
1,282,413 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,937 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,936 UART: ROM Fatal Error: 0x000B0024
1,552,093 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,490 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,381 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,474 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,515 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,115 UART: ROM Fatal Error: 0x000B0024
1,550,272 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,253 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,824 UART: [kat] ++
895,976 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,762 UART: [cold-reset] ++
1,171,092 UART: [fht] FHT @ 0x50003400
1,173,810 UART: [idev] ++
1,173,978 UART: [idev] CDI.KEYID = 6
1,174,339 UART: [idev] SUBJECT.KEYID = 7
1,174,764 UART: [idev] UDS.KEYID = 0
1,182,654 UART: [idev] Erasing UDS.KEYID = 0
1,200,080 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,217,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,282,997 UART: [fwproc] Wait for Commands...
1,283,820 UART: [fwproc] Recv command 0x46574c44
1,284,553 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,812 UART: ROM Fatal Error: 0x000B0024
1,550,969 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,112 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,404 UART: [ldev] --
1,280,892 UART: [fwproc] Wait for Commands...
1,281,569 UART: [fwproc] Recv command 0x46574c44
1,282,302 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,901 UART: ROM Fatal Error: 0x000B0024
1,549,058 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,981 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,629 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,142 UART: ROM Fatal Error: 0x000B0024
1,552,299 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,404,012 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,683 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,423 UART:
192,788 UART: Running Caliptra ROM ...
194,012 UART:
194,175 UART: [state] CFI Enabled
262,057 UART: [state] LifecycleState = Unprovisioned
264,444 UART: [state] DebugLocked = No
266,417 UART: [state] WD Timer not started. Device not locked for debugging
270,241 UART: [kat] SHA2-256
452,168 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,691 UART: [kat] ++
464,133 UART: [kat] sha1
475,217 UART: [kat] SHA2-256
478,278 UART: [kat] SHA2-384
484,273 UART: [kat] SHA2-512-ACC
486,887 UART: [kat] ECC-384
3,776,951 UART: [kat] HMAC-384Kdf
3,802,810 UART: [kat] LMS
4,875,963 UART: [kat] --
4,881,337 UART: [cold-reset] ++
4,883,176 UART: [fht] FHT @ 0x50003400
4,893,782 UART: [idev] ++
4,894,511 UART: [idev] CDI.KEYID = 6
4,895,614 UART: [idev] SUBJECT.KEYID = 7
4,896,827 UART: [idev] UDS.KEYID = 0
4,929,734 UART: [idev] Erasing UDS.KEYID = 0
8,241,728 UART: [idev] Sha1 KeyId Algorithm
8,264,530 UART: [idev] --
8,268,737 UART: [ldev] ++
8,269,303 UART: [ldev] CDI.KEYID = 6
8,270,562 UART: [ldev] SUBJECT.KEYID = 5
8,271,723 UART: [ldev] AUTHORITY.KEYID = 7
8,272,904 UART: [ldev] FE.KEYID = 1
8,317,322 UART: [ldev] Erasing FE.KEYID = 1
11,653,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,947 UART: [ldev] --
14,038,727 UART: [fwproc] Wait for Commands...
14,040,555 UART: [fwproc] Recv command 0x46574c44
14,042,870 UART: [fwproc] Recv'd Img size: 114124 bytes
16,984,996 UART: ROM Fatal Error: 0x000B0023
16,988,400 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,395 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,769,313 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,345 UART:
192,736 UART: Running Caliptra ROM ...
193,953 UART:
603,398 UART: [state] CFI Enabled
615,965 UART: [state] LifecycleState = Unprovisioned
618,294 UART: [state] DebugLocked = No
620,125 UART: [state] WD Timer not started. Device not locked for debugging
625,197 UART: [kat] SHA2-256
807,151 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,712 UART: [kat] ++
819,218 UART: [kat] sha1
829,492 UART: [kat] SHA2-256
832,501 UART: [kat] SHA2-384
838,419 UART: [kat] SHA2-512-ACC
841,027 UART: [kat] ECC-384
4,098,704 UART: [kat] HMAC-384Kdf
4,110,515 UART: [kat] LMS
5,183,677 UART: [kat] --
5,188,430 UART: [cold-reset] ++
5,190,470 UART: [fht] FHT @ 0x50003400
5,202,144 UART: [idev] ++
5,202,877 UART: [idev] CDI.KEYID = 6
5,204,057 UART: [idev] SUBJECT.KEYID = 7
5,205,489 UART: [idev] UDS.KEYID = 0
5,219,523 UART: [idev] Erasing UDS.KEYID = 0
8,491,175 UART: [idev] Sha1 KeyId Algorithm
8,512,095 UART: [idev] --
8,515,179 UART: [ldev] ++
8,515,762 UART: [ldev] CDI.KEYID = 6
8,516,945 UART: [ldev] SUBJECT.KEYID = 5
8,518,432 UART: [ldev] AUTHORITY.KEYID = 7
8,519,988 UART: [ldev] FE.KEYID = 1
8,530,204 UART: [ldev] Erasing FE.KEYID = 1
11,819,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,124,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,140,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,156,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,401 UART: [ldev] --
14,181,150 UART: [fwproc] Wait for Commands...
14,183,362 UART: [fwproc] Recv command 0x46574c44
14,185,674 UART: [fwproc] Recv'd Img size: 114124 bytes
17,118,221 UART: ROM Fatal Error: 0x000B0023
17,121,648 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,793 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,962,690 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,272 UART:
192,647 UART: Running Caliptra ROM ...
193,774 UART:
193,914 UART: [state] CFI Enabled
264,416 UART: [state] LifecycleState = Unprovisioned
266,339 UART: [state] DebugLocked = No
269,039 UART: [state] WD Timer not started. Device not locked for debugging
272,882 UART: [kat] SHA2-256
452,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,597 UART: [kat] ++
464,052 UART: [kat] sha1
475,039 UART: [kat] SHA2-256
478,052 UART: [kat] SHA2-384
483,715 UART: [kat] SHA2-512-ACC
486,698 UART: [kat] ECC-384
2,947,431 UART: [kat] HMAC-384Kdf
2,972,478 UART: [kat] LMS
3,501,920 UART: [kat] --
3,506,916 UART: [cold-reset] ++
3,508,644 UART: [fht] FHT @ 0x50003400
3,520,326 UART: [idev] ++
3,520,891 UART: [idev] CDI.KEYID = 6
3,521,801 UART: [idev] SUBJECT.KEYID = 7
3,523,018 UART: [idev] UDS.KEYID = 0
3,543,266 UART: [idev] Erasing UDS.KEYID = 0
6,028,729 UART: [idev] Sha1 KeyId Algorithm
6,052,066 UART: [idev] --
6,054,773 UART: [ldev] ++
6,055,348 UART: [ldev] CDI.KEYID = 6
6,056,253 UART: [ldev] SUBJECT.KEYID = 5
6,057,468 UART: [ldev] AUTHORITY.KEYID = 7
6,058,702 UART: [ldev] FE.KEYID = 1
6,100,165 UART: [ldev] Erasing FE.KEYID = 1
8,606,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,869 UART: [ldev] --
10,412,190 UART: [fwproc] Wait for Commands...
10,414,233 UART: [fwproc] Recv command 0x46574c44
10,416,332 UART: [fwproc] Recv'd Img size: 114448 bytes
12,709,788 UART: ROM Fatal Error: 0x000B0023
12,712,913 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,518,560 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,515 UART:
192,883 UART: Running Caliptra ROM ...
194,114 UART:
603,553 UART: [state] CFI Enabled
615,309 UART: [state] LifecycleState = Unprovisioned
617,146 UART: [state] DebugLocked = No
618,686 UART: [state] WD Timer not started. Device not locked for debugging
622,801 UART: [kat] SHA2-256
801,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,500 UART: [kat] ++
814,030 UART: [kat] sha1
823,844 UART: [kat] SHA2-256
826,848 UART: [kat] SHA2-384
833,202 UART: [kat] SHA2-512-ACC
836,129 UART: [kat] ECC-384
3,275,657 UART: [kat] HMAC-384Kdf
3,288,480 UART: [kat] LMS
3,817,973 UART: [kat] --
3,821,656 UART: [cold-reset] ++
3,823,637 UART: [fht] FHT @ 0x50003400
3,833,313 UART: [idev] ++
3,833,916 UART: [idev] CDI.KEYID = 6
3,834,829 UART: [idev] SUBJECT.KEYID = 7
3,835,985 UART: [idev] UDS.KEYID = 0
3,852,229 UART: [idev] Erasing UDS.KEYID = 0
6,308,790 UART: [idev] Sha1 KeyId Algorithm
6,331,494 UART: [idev] --
6,335,815 UART: [ldev] ++
6,336,381 UART: [ldev] CDI.KEYID = 6
6,337,290 UART: [ldev] SUBJECT.KEYID = 5
6,338,446 UART: [ldev] AUTHORITY.KEYID = 7
6,339,737 UART: [ldev] FE.KEYID = 1
6,349,952 UART: [ldev] Erasing FE.KEYID = 1
8,823,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,544 UART: [ldev] --
10,613,586 UART: [fwproc] Wait for Commands...
10,615,733 UART: [fwproc] Recv command 0x46574c44
10,617,835 UART: [fwproc] Recv'd Img size: 114448 bytes
12,914,059 UART: ROM Fatal Error: 0x000B0023
12,917,191 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,703,392 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,003 UART:
192,403 UART: Running Caliptra ROM ...
193,627 UART:
193,777 UART: [state] CFI Enabled
264,772 UART: [state] LifecycleState = Unprovisioned
266,654 UART: [state] DebugLocked = No
269,444 UART: [state] WD Timer not started. Device not locked for debugging
274,057 UART: [kat] SHA2-256
453,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,767 UART: [kat] ++
465,298 UART: [kat] sha1
475,802 UART: [kat] SHA2-256
478,857 UART: [kat] SHA2-384
485,051 UART: [kat] SHA2-512-ACC
487,990 UART: [kat] ECC-384
2,948,255 UART: [kat] HMAC-384Kdf
2,971,663 UART: [kat] LMS
3,501,160 UART: [kat] --
3,506,078 UART: [cold-reset] ++
3,507,423 UART: [fht] FHT @ 0x50003400
3,518,241 UART: [idev] ++
3,518,802 UART: [idev] CDI.KEYID = 6
3,519,726 UART: [idev] SUBJECT.KEYID = 7
3,520,940 UART: [idev] UDS.KEYID = 0
3,544,591 UART: [idev] Erasing UDS.KEYID = 0
6,023,336 UART: [idev] Sha1 KeyId Algorithm
6,046,733 UART: [idev] --
6,050,896 UART: [ldev] ++
6,051,474 UART: [ldev] CDI.KEYID = 6
6,052,383 UART: [ldev] SUBJECT.KEYID = 5
6,053,542 UART: [ldev] AUTHORITY.KEYID = 7
6,054,774 UART: [ldev] FE.KEYID = 1
6,101,324 UART: [ldev] Erasing FE.KEYID = 1
8,601,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,471 UART: [ldev] --
10,395,461 UART: [fwproc] Wait for Commands...
10,397,992 UART: [fwproc] Recv command 0x46574c44
10,400,097 UART: [fwproc] Recv'd Img size: 114448 bytes
12,682,649 UART: ROM Fatal Error: 0x000B0023
12,685,773 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,470,963 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
3,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,525 UART:
192,893 UART: Running Caliptra ROM ...
193,999 UART:
603,718 UART: [state] CFI Enabled
618,257 UART: [state] LifecycleState = Unprovisioned
620,103 UART: [state] DebugLocked = No
622,942 UART: [state] WD Timer not started. Device not locked for debugging
625,788 UART: [kat] SHA2-256
804,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,465 UART: [kat] ++
817,042 UART: [kat] sha1
827,929 UART: [kat] SHA2-256
830,954 UART: [kat] SHA2-384
837,630 UART: [kat] SHA2-512-ACC
840,609 UART: [kat] ECC-384
3,280,991 UART: [kat] HMAC-384Kdf
3,293,059 UART: [kat] LMS
3,822,549 UART: [kat] --
3,827,237 UART: [cold-reset] ++
3,829,107 UART: [fht] FHT @ 0x50003400
3,839,710 UART: [idev] ++
3,840,267 UART: [idev] CDI.KEYID = 6
3,841,170 UART: [idev] SUBJECT.KEYID = 7
3,842,382 UART: [idev] UDS.KEYID = 0
3,856,951 UART: [idev] Erasing UDS.KEYID = 0
6,313,987 UART: [idev] Sha1 KeyId Algorithm
6,336,516 UART: [idev] --
6,339,756 UART: [ldev] ++
6,340,342 UART: [ldev] CDI.KEYID = 6
6,341,225 UART: [ldev] SUBJECT.KEYID = 5
6,342,380 UART: [ldev] AUTHORITY.KEYID = 7
6,343,722 UART: [ldev] FE.KEYID = 1
6,355,636 UART: [ldev] Erasing FE.KEYID = 1
8,826,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,553 UART: [ldev] --
10,615,572 UART: [fwproc] Wait for Commands...
10,617,126 UART: [fwproc] Recv command 0x46574c44
10,619,223 UART: [fwproc] Recv'd Img size: 114448 bytes
12,911,553 UART: ROM Fatal Error: 0x000B0023
12,914,676 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,704,445 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,279 UART: [kat] SHA2-256
901,219 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,319 UART: [idev] --
1,209,362 UART: [ldev] ++
1,209,530 UART: [ldev] CDI.KEYID = 6
1,209,894 UART: [ldev] SUBJECT.KEYID = 5
1,210,321 UART: [ldev] AUTHORITY.KEYID = 7
1,210,784 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,000 UART: [ldev] --
1,281,446 UART: [fwproc] Wait for Commands...
1,282,221 UART: [fwproc] Recv command 0x46574c44
1,282,954 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,946 UART: ROM Fatal Error: 0x000B0023
1,550,103 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,870 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,685 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,181,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,302 UART: [idev] Sha1 KeyId Algorithm
1,207,236 UART: [idev] --
1,208,391 UART: [ldev] ++
1,208,559 UART: [ldev] CDI.KEYID = 6
1,208,923 UART: [ldev] SUBJECT.KEYID = 5
1,209,350 UART: [ldev] AUTHORITY.KEYID = 7
1,209,813 UART: [ldev] FE.KEYID = 1
1,214,913 UART: [ldev] Erasing FE.KEYID = 1
1,241,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,353 UART: [fwproc] Wait for Commands...
1,281,002 UART: [fwproc] Recv command 0x46574c44
1,281,735 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,783 UART: ROM Fatal Error: 0x000B0023
1,548,940 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,721 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,242,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,879 UART: [fwproc] Recv command 0x46574c44
1,282,612 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,782 UART: ROM Fatal Error: 0x000B0023
1,548,939 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,028 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,745 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,561 UART: ROM Fatal Error: 0x000B0023
1,550,718 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,585 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,190 UART: [ldev] ++
1,208,358 UART: [ldev] CDI.KEYID = 6
1,208,722 UART: [ldev] SUBJECT.KEYID = 5
1,209,149 UART: [ldev] AUTHORITY.KEYID = 7
1,209,612 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,240,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,280,006 UART: [fwproc] Wait for Commands...
1,280,767 UART: [fwproc] Recv command 0x46574c44
1,281,500 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,530 UART: ROM Fatal Error: 0x000B0023
1,548,687 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,812 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,215,707 UART: [ldev] Erasing FE.KEYID = 1
1,242,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,516 UART: [fwproc] Recv command 0x46574c44
1,283,249 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,573 UART: ROM Fatal Error: 0x000B0023
1,550,730 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,643 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,021,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,168 UART:
2,166,574 UART: Running Caliptra ROM ...
2,167,749 UART:
2,167,924 UART: [state] CFI Enabled
2,168,898 UART: [state] LifecycleState = Unprovisioned
2,170,544 UART: [state] DebugLocked = No
2,171,653 UART: [state] WD Timer not started. Device not locked for debugging
2,174,142 UART: [kat] SHA2-256
2,174,811 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,821 UART: [kat] ++
2,178,270 UART: [kat] sha1
2,178,833 UART: [kat] SHA2-256
2,179,494 UART: [kat] SHA2-384
2,180,153 UART: [kat] SHA2-512-ACC
2,180,948 UART: [kat] ECC-384
3,776,601 UART: [kat] HMAC-384Kdf
3,806,274 UART: [kat] LMS
4,879,468 UART: [kat] --
4,885,353 UART: [cold-reset] ++
4,887,451 UART: [fht] FHT @ 0x50003400
4,898,808 UART: [idev] ++
4,899,480 UART: [idev] CDI.KEYID = 6
4,900,708 UART: [idev] SUBJECT.KEYID = 7
4,901,885 UART: [idev] UDS.KEYID = 0
4,932,984 UART: [idev] Erasing UDS.KEYID = 0
8,251,063 UART: [idev] Sha1 KeyId Algorithm
8,272,857 UART: [idev] --
8,277,344 UART: [ldev] ++
8,277,912 UART: [ldev] CDI.KEYID = 6
8,279,154 UART: [ldev] SUBJECT.KEYID = 5
8,280,182 UART: [ldev] AUTHORITY.KEYID = 7
8,281,441 UART: [ldev] FE.KEYID = 1
8,320,847 UART: [ldev] Erasing FE.KEYID = 1
11,659,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,038,242 UART: [ldev] --
14,043,314 UART: [fwproc] Wait for Commands...
14,044,929 UART: [fwproc] Recv command 0x46574c44
14,047,254 UART: [fwproc] Recv'd Img size: 114124 bytes
16,998,673 UART: ROM Fatal Error: 0x000B0023
17,002,133 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
2,020,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,752,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,022,306 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,445 UART:
2,166,853 UART: Running Caliptra ROM ...
2,167,947 UART:
2,168,097 UART: [state] CFI Enabled
2,169,080 UART: [state] LifecycleState = Unprovisioned
2,170,725 UART: [state] DebugLocked = No
2,171,747 UART: [state] WD Timer not started. Device not locked for debugging
2,174,207 UART: [kat] SHA2-256
2,174,861 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,862 UART: [kat] ++
2,178,300 UART: [kat] sha1
2,178,799 UART: [kat] SHA2-256
2,179,447 UART: [kat] SHA2-384
2,180,094 UART: [kat] SHA2-512-ACC
2,181,238 UART: [kat] ECC-384
4,097,224 UART: [kat] HMAC-384Kdf
4,110,168 UART: [kat] LMS
5,183,356 UART: [kat] --
5,188,409 UART: [cold-reset] ++
5,190,076 UART: [fht] FHT @ 0x50003400
5,200,680 UART: [idev] ++
5,201,358 UART: [idev] CDI.KEYID = 6
5,202,586 UART: [idev] SUBJECT.KEYID = 7
5,204,010 UART: [idev] UDS.KEYID = 0
5,222,626 UART: [idev] Erasing UDS.KEYID = 0
8,495,073 UART: [idev] Sha1 KeyId Algorithm
8,516,662 UART: [idev] --
8,521,885 UART: [ldev] ++
8,522,451 UART: [ldev] CDI.KEYID = 6
8,523,615 UART: [ldev] SUBJECT.KEYID = 5
8,525,149 UART: [ldev] AUTHORITY.KEYID = 7
8,526,629 UART: [ldev] FE.KEYID = 1
8,538,628 UART: [ldev] Erasing FE.KEYID = 1
11,831,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,335 UART: [ldev] --
14,198,451 UART: [fwproc] Wait for Commands...
14,199,954 UART: [fwproc] Recv command 0x46574c44
14,201,941 UART: [fwproc] Recv'd Img size: 114124 bytes
17,148,721 UART: ROM Fatal Error: 0x000B0023
17,152,131 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,020,718 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,966,102 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,021,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,555 UART:
2,165,950 UART: Running Caliptra ROM ...
2,167,144 UART:
2,167,317 UART: [state] CFI Enabled
2,168,278 UART: [state] LifecycleState = Unprovisioned
2,169,922 UART: [state] DebugLocked = No
2,171,031 UART: [state] WD Timer not started. Device not locked for debugging
2,173,514 UART: [kat] SHA2-256
2,174,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,189 UART: [kat] ++
2,177,642 UART: [kat] sha1
2,178,157 UART: [kat] SHA2-256
2,178,898 UART: [kat] SHA2-384
2,179,564 UART: [kat] SHA2-512-ACC
2,180,366 UART: [kat] ECC-384
2,946,843 UART: [kat] HMAC-384Kdf
2,972,139 UART: [kat] LMS
3,501,594 UART: [kat] --
3,507,145 UART: [cold-reset] ++
3,509,515 UART: [fht] FHT @ 0x50003400
3,521,196 UART: [idev] ++
3,521,759 UART: [idev] CDI.KEYID = 6
3,522,643 UART: [idev] SUBJECT.KEYID = 7
3,523,858 UART: [idev] UDS.KEYID = 0
3,543,086 UART: [idev] Erasing UDS.KEYID = 0
6,025,093 UART: [idev] Sha1 KeyId Algorithm
6,046,926 UART: [idev] --
6,050,273 UART: [ldev] ++
6,050,853 UART: [ldev] CDI.KEYID = 6
6,051,737 UART: [ldev] SUBJECT.KEYID = 5
6,052,957 UART: [ldev] AUTHORITY.KEYID = 7
6,054,196 UART: [ldev] FE.KEYID = 1
6,099,366 UART: [ldev] Erasing FE.KEYID = 1
8,600,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,561 UART: [ldev] --
10,391,622 UART: [fwproc] Wait for Commands...
10,393,840 UART: [fwproc] Recv command 0x46574c44
10,395,948 UART: [fwproc] Recv'd Img size: 114448 bytes
12,684,424 UART: ROM Fatal Error: 0x000B0023
12,687,553 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,023,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,483,534 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,022,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,315 UART:
2,167,707 UART: Running Caliptra ROM ...
2,168,880 UART:
2,169,079 UART: [state] CFI Enabled
2,170,043 UART: [state] LifecycleState = Unprovisioned
2,171,687 UART: [state] DebugLocked = No
2,172,788 UART: [state] WD Timer not started. Device not locked for debugging
2,175,262 UART: [kat] SHA2-256
2,175,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,941 UART: [kat] ++
2,179,393 UART: [kat] sha1
2,179,951 UART: [kat] SHA2-256
2,180,647 UART: [kat] SHA2-384
2,181,306 UART: [kat] SHA2-512-ACC
2,182,129 UART: [kat] ECC-384
3,282,601 UART: [kat] HMAC-384Kdf
3,295,095 UART: [kat] LMS
3,824,573 UART: [kat] --
3,828,103 UART: [cold-reset] ++
3,830,268 UART: [fht] FHT @ 0x50003400
3,841,138 UART: [idev] ++
3,841,698 UART: [idev] CDI.KEYID = 6
3,842,631 UART: [idev] SUBJECT.KEYID = 7
3,843,842 UART: [idev] UDS.KEYID = 0
3,861,470 UART: [idev] Erasing UDS.KEYID = 0
6,317,204 UART: [idev] Sha1 KeyId Algorithm
6,339,775 UART: [idev] --
6,343,111 UART: [ldev] ++
6,343,687 UART: [ldev] CDI.KEYID = 6
6,344,595 UART: [ldev] SUBJECT.KEYID = 5
6,345,810 UART: [ldev] AUTHORITY.KEYID = 7
6,347,040 UART: [ldev] FE.KEYID = 1
6,356,239 UART: [ldev] Erasing FE.KEYID = 1
8,831,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,559 UART: [ldev] --
10,623,872 UART: [fwproc] Wait for Commands...
10,625,976 UART: [fwproc] Recv command 0x46574c44
10,628,020 UART: [fwproc] Recv'd Img size: 114448 bytes
12,919,319 UART: ROM Fatal Error: 0x000B0023
12,922,452 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,028,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,694,347 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,022,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,902 UART:
2,167,293 UART: Running Caliptra ROM ...
2,168,374 UART:
2,168,527 UART: [state] CFI Enabled
2,169,496 UART: [state] LifecycleState = Unprovisioned
2,171,139 UART: [state] DebugLocked = No
2,172,248 UART: [state] WD Timer not started. Device not locked for debugging
2,174,723 UART: [kat] SHA2-256
2,175,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,433 UART: [kat] ++
2,178,890 UART: [kat] sha1
2,179,405 UART: [kat] SHA2-256
2,180,106 UART: [kat] SHA2-384
2,180,762 UART: [kat] SHA2-512-ACC
2,181,562 UART: [kat] ECC-384
2,950,485 UART: [kat] HMAC-384Kdf
2,973,613 UART: [kat] LMS
3,503,031 UART: [kat] --
3,507,315 UART: [cold-reset] ++
3,509,466 UART: [fht] FHT @ 0x50003400
3,520,243 UART: [idev] ++
3,520,807 UART: [idev] CDI.KEYID = 6
3,521,713 UART: [idev] SUBJECT.KEYID = 7
3,522,931 UART: [idev] UDS.KEYID = 0
3,546,901 UART: [idev] Erasing UDS.KEYID = 0
6,028,676 UART: [idev] Sha1 KeyId Algorithm
6,051,939 UART: [idev] --
6,056,287 UART: [ldev] ++
6,056,870 UART: [ldev] CDI.KEYID = 6
6,057,757 UART: [ldev] SUBJECT.KEYID = 5
6,058,889 UART: [ldev] AUTHORITY.KEYID = 7
6,060,240 UART: [ldev] FE.KEYID = 1
6,103,590 UART: [ldev] Erasing FE.KEYID = 1
8,604,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,680 UART: [ldev] --
10,395,839 UART: [fwproc] Wait for Commands...
10,397,905 UART: [fwproc] Recv command 0x46574c44
10,399,954 UART: [fwproc] Recv'd Img size: 114448 bytes
12,687,479 UART: ROM Fatal Error: 0x000B0023
12,690,622 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,023,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,489,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,022,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,630 UART:
2,167,026 UART: Running Caliptra ROM ...
2,168,197 UART:
2,168,368 UART: [state] CFI Enabled
2,169,275 UART: [state] LifecycleState = Unprovisioned
2,170,907 UART: [state] DebugLocked = No
2,172,017 UART: [state] WD Timer not started. Device not locked for debugging
2,174,517 UART: [kat] SHA2-256
2,175,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,190 UART: [kat] ++
2,178,639 UART: [kat] sha1
2,179,153 UART: [kat] SHA2-256
2,180,127 UART: [kat] SHA2-384
2,180,803 UART: [kat] SHA2-512-ACC
2,181,798 UART: [kat] ECC-384
3,280,741 UART: [kat] HMAC-384Kdf
3,292,906 UART: [kat] LMS
3,822,414 UART: [kat] --
3,828,231 UART: [cold-reset] ++
3,829,516 UART: [fht] FHT @ 0x50003400
3,840,756 UART: [idev] ++
3,841,315 UART: [idev] CDI.KEYID = 6
3,842,330 UART: [idev] SUBJECT.KEYID = 7
3,843,505 UART: [idev] UDS.KEYID = 0
3,857,831 UART: [idev] Erasing UDS.KEYID = 0
6,316,724 UART: [idev] Sha1 KeyId Algorithm
6,338,669 UART: [idev] --
6,343,469 UART: [ldev] ++
6,344,085 UART: [ldev] CDI.KEYID = 6
6,345,013 UART: [ldev] SUBJECT.KEYID = 5
6,346,062 UART: [ldev] AUTHORITY.KEYID = 7
6,347,351 UART: [ldev] FE.KEYID = 1
6,356,153 UART: [ldev] Erasing FE.KEYID = 1
8,833,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,180 UART: [ldev] --
10,622,676 UART: [fwproc] Wait for Commands...
10,625,863 UART: [fwproc] Recv command 0x46574c44
10,627,960 UART: [fwproc] Recv'd Img size: 114448 bytes
12,913,958 UART: ROM Fatal Error: 0x000B0023
12,917,094 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,022,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,699,147 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [kat] SHA2-256
891,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,827 UART: [kat] ++
895,979 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,685 UART: [fht] FHT @ 0x50003400
1,173,529 UART: [idev] ++
1,173,697 UART: [idev] CDI.KEYID = 6
1,174,058 UART: [idev] SUBJECT.KEYID = 7
1,174,483 UART: [idev] UDS.KEYID = 0
1,182,463 UART: [idev] Erasing UDS.KEYID = 0
1,199,501 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,494 UART: [ldev] ++
1,209,662 UART: [ldev] CDI.KEYID = 6
1,210,026 UART: [ldev] SUBJECT.KEYID = 5
1,210,453 UART: [ldev] AUTHORITY.KEYID = 7
1,210,916 UART: [ldev] FE.KEYID = 1
1,216,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,970 UART: [ldev] --
1,282,292 UART: [fwproc] Wait for Commands...
1,282,929 UART: [fwproc] Recv command 0x46574c44
1,283,662 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,358 UART: ROM Fatal Error: 0x000B0023
1,551,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,104 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,143 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,447 UART: ROM Fatal Error: 0x000B0023
1,550,604 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,453 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,319 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
891,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
900,421 UART: [kat] SHA2-256
902,361 UART: [kat] SHA2-384
904,964 UART: [kat] SHA2-512-ACC
906,865 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,431 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,182,957 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,209,365 UART: [idev] --
1,210,338 UART: [ldev] ++
1,210,506 UART: [ldev] CDI.KEYID = 6
1,210,870 UART: [ldev] SUBJECT.KEYID = 5
1,211,297 UART: [ldev] AUTHORITY.KEYID = 7
1,211,760 UART: [ldev] FE.KEYID = 1
1,216,878 UART: [ldev] Erasing FE.KEYID = 1
1,242,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,856 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,283,101 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,696 UART: ROM Fatal Error: 0x000B0023
1,551,853 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,276 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,808 UART: [idev] ++
1,173,976 UART: [idev] CDI.KEYID = 6
1,174,337 UART: [idev] SUBJECT.KEYID = 7
1,174,762 UART: [idev] UDS.KEYID = 0
1,182,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,386 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,701 UART: [fwproc] Wait for Commands...
1,283,300 UART: [fwproc] Recv command 0x46574c44
1,284,033 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,213 UART: ROM Fatal Error: 0x000B0023
1,551,370 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,629 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,059 UART: [idev] ++
1,173,227 UART: [idev] CDI.KEYID = 6
1,173,588 UART: [idev] SUBJECT.KEYID = 7
1,174,013 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,503 UART: [idev] Sha1 KeyId Algorithm
1,207,337 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,264 UART: ROM Fatal Error: 0x000B0023
1,549,421 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,648 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,198,974 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,208,907 UART: [ldev] ++
1,209,075 UART: [ldev] CDI.KEYID = 6
1,209,439 UART: [ldev] SUBJECT.KEYID = 5
1,209,866 UART: [ldev] AUTHORITY.KEYID = 7
1,210,329 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,647 UART: [ldev] --
1,281,137 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,721 UART: ROM Fatal Error: 0x000B0023
1,549,878 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,551 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
2,022,624 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,011 UART:
2,167,418 UART: Running Caliptra ROM ...
2,168,587 UART:
2,168,791 UART: [state] CFI Enabled
2,169,761 UART: [state] LifecycleState = Unprovisioned
2,171,402 UART: [state] DebugLocked = No
2,172,505 UART: [state] WD Timer not started. Device not locked for debugging
2,174,975 UART: [kat] SHA2-256
2,175,643 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,649 UART: [kat] ++
2,179,100 UART: [kat] sha1
2,179,614 UART: [kat] SHA2-256
2,180,351 UART: [kat] SHA2-384
2,181,016 UART: [kat] SHA2-512-ACC
2,181,852 UART: [kat] ECC-384
3,779,799 UART: [kat] HMAC-384Kdf
3,805,366 UART: [kat] LMS
4,878,501 UART: [kat] --
4,879,816 UART: [cold-reset] ++
4,882,164 UART: [fht] FHT @ 0x50003400
4,894,101 UART: [idev] ++
4,894,791 UART: [idev] CDI.KEYID = 6
4,896,021 UART: [idev] SUBJECT.KEYID = 7
4,897,124 UART: [idev] UDS.KEYID = 0
4,911,323 UART: [idev] Erasing UDS.KEYID = 0
8,226,058 UART: [idev] Sha1 KeyId Algorithm
8,248,295 UART: [idev] --
8,251,948 UART: [ldev] ++
8,252,524 UART: [ldev] CDI.KEYID = 6
8,253,716 UART: [ldev] SUBJECT.KEYID = 5
8,254,880 UART: [ldev] AUTHORITY.KEYID = 7
8,256,112 UART: [ldev] FE.KEYID = 1
8,300,365 UART: [ldev] Erasing FE.KEYID = 1
11,632,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,948,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,964,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,980,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,996,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,018,756 UART: [ldev] --
14,023,600 UART: [fwproc] Wait for Commands...
14,026,183 UART: [fwproc] Recv command 0x46574c44
14,028,450 UART: [fwproc] Recv'd Img size: 114124 bytes
16,973,164 UART: ROM Fatal Error: 0x000B0021
16,976,574 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,021,045 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,792,697 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,024,594 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,791 UART:
2,169,183 UART: Running Caliptra ROM ...
2,170,258 UART:
2,170,406 UART: [state] CFI Enabled
2,171,380 UART: [state] LifecycleState = Unprovisioned
2,173,021 UART: [state] DebugLocked = No
2,174,126 UART: [state] WD Timer not started. Device not locked for debugging
2,176,590 UART: [kat] SHA2-256
2,177,273 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,278 UART: [kat] ++
2,180,723 UART: [kat] sha1
2,181,228 UART: [kat] SHA2-256
2,181,959 UART: [kat] SHA2-384
2,182,618 UART: [kat] SHA2-512-ACC
2,183,448 UART: [kat] ECC-384
4,099,250 UART: [kat] HMAC-384Kdf
4,111,173 UART: [kat] LMS
5,184,294 UART: [kat] --
5,188,459 UART: [cold-reset] ++
5,190,403 UART: [fht] FHT @ 0x50003400
5,201,892 UART: [idev] ++
5,202,568 UART: [idev] CDI.KEYID = 6
5,203,723 UART: [idev] SUBJECT.KEYID = 7
5,205,261 UART: [idev] UDS.KEYID = 0
5,222,559 UART: [idev] Erasing UDS.KEYID = 0
8,498,208 UART: [idev] Sha1 KeyId Algorithm
8,520,317 UART: [idev] --
8,525,341 UART: [ldev] ++
8,525,904 UART: [ldev] CDI.KEYID = 6
8,527,140 UART: [ldev] SUBJECT.KEYID = 5
8,528,572 UART: [ldev] AUTHORITY.KEYID = 7
8,530,134 UART: [ldev] FE.KEYID = 1
8,542,132 UART: [ldev] Erasing FE.KEYID = 1
11,835,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,245 UART: [ldev] --
14,201,371 UART: [fwproc] Wait for Commands...
14,203,105 UART: [fwproc] Recv command 0x46574c44
14,205,375 UART: [fwproc] Recv'd Img size: 114124 bytes
17,143,851 UART: ROM Fatal Error: 0x000B0021
17,147,264 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
2,020,949 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,956,942 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,022,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,518 UART:
2,167,904 UART: Running Caliptra ROM ...
2,168,985 UART:
2,169,140 UART: [state] CFI Enabled
2,170,106 UART: [state] LifecycleState = Unprovisioned
2,171,750 UART: [state] DebugLocked = No
2,172,778 UART: [state] WD Timer not started. Device not locked for debugging
2,175,258 UART: [kat] SHA2-256
2,175,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,934 UART: [kat] ++
2,179,380 UART: [kat] sha1
2,179,908 UART: [kat] SHA2-256
2,180,567 UART: [kat] SHA2-384
2,181,221 UART: [kat] SHA2-512-ACC
2,182,053 UART: [kat] ECC-384
2,948,149 UART: [kat] HMAC-384Kdf
2,972,028 UART: [kat] LMS
3,501,486 UART: [kat] --
3,505,046 UART: [cold-reset] ++
3,506,184 UART: [fht] FHT @ 0x50003400
3,516,221 UART: [idev] ++
3,516,786 UART: [idev] CDI.KEYID = 6
3,517,696 UART: [idev] SUBJECT.KEYID = 7
3,518,914 UART: [idev] UDS.KEYID = 0
3,545,024 UART: [idev] Erasing UDS.KEYID = 0
6,028,371 UART: [idev] Sha1 KeyId Algorithm
6,052,629 UART: [idev] --
6,055,354 UART: [ldev] ++
6,055,932 UART: [ldev] CDI.KEYID = 6
6,056,841 UART: [ldev] SUBJECT.KEYID = 5
6,058,003 UART: [ldev] AUTHORITY.KEYID = 7
6,059,295 UART: [ldev] FE.KEYID = 1
6,102,140 UART: [ldev] Erasing FE.KEYID = 1
8,604,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,053 UART: [ldev] --
10,391,380 UART: [fwproc] Wait for Commands...
10,394,130 UART: [fwproc] Recv command 0x46574c44
10,396,231 UART: [fwproc] Recv'd Img size: 114448 bytes
12,687,622 UART: ROM Fatal Error: 0x000B0021
12,690,726 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,025,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,493,519 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,021,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,680 UART:
2,166,083 UART: Running Caliptra ROM ...
2,167,253 UART:
2,167,423 UART: [state] CFI Enabled
2,168,384 UART: [state] LifecycleState = Unprovisioned
2,170,027 UART: [state] DebugLocked = No
2,171,130 UART: [state] WD Timer not started. Device not locked for debugging
2,173,602 UART: [kat] SHA2-256
2,174,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,279 UART: [kat] ++
2,177,728 UART: [kat] sha1
2,178,322 UART: [kat] SHA2-256
2,179,010 UART: [kat] SHA2-384
2,179,674 UART: [kat] SHA2-512-ACC
2,180,473 UART: [kat] ECC-384
3,278,734 UART: [kat] HMAC-384Kdf
3,291,221 UART: [kat] LMS
3,820,696 UART: [kat] --
3,825,574 UART: [cold-reset] ++
3,827,934 UART: [fht] FHT @ 0x50003400
3,839,379 UART: [idev] ++
3,839,948 UART: [idev] CDI.KEYID = 6
3,840,859 UART: [idev] SUBJECT.KEYID = 7
3,842,075 UART: [idev] UDS.KEYID = 0
3,858,918 UART: [idev] Erasing UDS.KEYID = 0
6,311,263 UART: [idev] Sha1 KeyId Algorithm
6,333,071 UART: [idev] --
6,337,711 UART: [ldev] ++
6,338,294 UART: [ldev] CDI.KEYID = 6
6,339,177 UART: [ldev] SUBJECT.KEYID = 5
6,340,387 UART: [ldev] AUTHORITY.KEYID = 7
6,341,614 UART: [ldev] FE.KEYID = 1
6,351,502 UART: [ldev] Erasing FE.KEYID = 1
8,826,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,432 UART: [ldev] --
10,618,717 UART: [fwproc] Wait for Commands...
10,620,701 UART: [fwproc] Recv command 0x46574c44
10,622,747 UART: [fwproc] Recv'd Img size: 114448 bytes
12,912,243 UART: ROM Fatal Error: 0x000B0021
12,915,372 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,023,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,706,671 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,021,866 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,414 UART:
2,166,800 UART: Running Caliptra ROM ...
2,167,879 UART:
2,168,037 UART: [state] CFI Enabled
2,169,016 UART: [state] LifecycleState = Unprovisioned
2,170,688 UART: [state] DebugLocked = No
2,171,719 UART: [state] WD Timer not started. Device not locked for debugging
2,174,198 UART: [kat] SHA2-256
2,174,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,879 UART: [kat] ++
2,178,331 UART: [kat] sha1
2,178,891 UART: [kat] SHA2-256
2,179,554 UART: [kat] SHA2-384
2,180,208 UART: [kat] SHA2-512-ACC
2,181,058 UART: [kat] ECC-384
2,925,914 UART: [kat] HMAC-384Kdf
2,948,193 UART: [kat] LMS
3,477,635 UART: [kat] --
3,481,945 UART: [cold-reset] ++
3,484,358 UART: [fht] FHT @ 0x50003400
3,495,497 UART: [idev] ++
3,496,082 UART: [idev] CDI.KEYID = 6
3,496,973 UART: [idev] SUBJECT.KEYID = 7
3,498,190 UART: [idev] UDS.KEYID = 0
3,521,944 UART: [idev] Erasing UDS.KEYID = 0
6,001,005 UART: [idev] Sha1 KeyId Algorithm
6,023,598 UART: [idev] --
6,028,460 UART: [ldev] ++
6,029,029 UART: [ldev] CDI.KEYID = 6
6,029,939 UART: [ldev] SUBJECT.KEYID = 5
6,031,107 UART: [ldev] AUTHORITY.KEYID = 7
6,032,398 UART: [ldev] FE.KEYID = 1
6,076,755 UART: [ldev] Erasing FE.KEYID = 1
8,581,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,200 UART: [ldev] --
10,391,516 UART: [fwproc] Wait for Commands...
10,393,886 UART: [fwproc] Recv command 0x46574c44
10,395,973 UART: [fwproc] Recv'd Img size: 114448 bytes
12,684,187 UART: ROM Fatal Error: 0x000B0021
12,687,318 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,021,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,495,145 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
2,021,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,898 UART:
2,166,300 UART: Running Caliptra ROM ...
2,167,376 UART:
2,167,527 UART: [state] CFI Enabled
2,168,500 UART: [state] LifecycleState = Unprovisioned
2,170,145 UART: [state] DebugLocked = No
2,171,167 UART: [state] WD Timer not started. Device not locked for debugging
2,173,639 UART: [kat] SHA2-256
2,174,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,335 UART: [kat] ++
2,177,780 UART: [kat] sha1
2,178,288 UART: [kat] SHA2-256
2,178,942 UART: [kat] SHA2-384
2,179,596 UART: [kat] SHA2-512-ACC
2,180,395 UART: [kat] ECC-384
3,284,837 UART: [kat] HMAC-384Kdf
3,296,692 UART: [kat] LMS
3,826,147 UART: [kat] --
3,831,266 UART: [cold-reset] ++
3,832,251 UART: [fht] FHT @ 0x50003400
3,843,552 UART: [idev] ++
3,844,121 UART: [idev] CDI.KEYID = 6
3,845,131 UART: [idev] SUBJECT.KEYID = 7
3,846,227 UART: [idev] UDS.KEYID = 0
3,863,348 UART: [idev] Erasing UDS.KEYID = 0
6,319,552 UART: [idev] Sha1 KeyId Algorithm
6,341,271 UART: [idev] --
6,344,670 UART: [ldev] ++
6,345,235 UART: [ldev] CDI.KEYID = 6
6,346,115 UART: [ldev] SUBJECT.KEYID = 5
6,347,325 UART: [ldev] AUTHORITY.KEYID = 7
6,348,551 UART: [ldev] FE.KEYID = 1
6,359,548 UART: [ldev] Erasing FE.KEYID = 1
8,833,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,320 UART: [ldev] --
10,625,527 UART: [fwproc] Wait for Commands...
10,627,481 UART: [fwproc] Recv command 0x46574c44
10,629,688 UART: [fwproc] Recv'd Img size: 114448 bytes
12,916,366 UART: ROM Fatal Error: 0x000B0021
12,919,492 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
2,021,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,695,717 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,979 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,310 UART: [ldev] --
1,279,782 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 114448 bytes
1,546,951 UART: ROM Fatal Error: 0x000B0021
1,548,108 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,373 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,877 UART: [ldev] ++
1,210,045 UART: [ldev] CDI.KEYID = 6
1,210,409 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,549 UART: [fwproc] Wait for Commands...
1,283,350 UART: [fwproc] Recv command 0x46574c44
1,284,083 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,018 UART: ROM Fatal Error: 0x000B0021
1,550,175 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,248 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,182,215 UART: [idev] Erasing UDS.KEYID = 0
1,199,129 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,282 UART: [ldev] --
1,281,674 UART: [fwproc] Wait for Commands...
1,282,401 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,845 UART: ROM Fatal Error: 0x000B0021
1,550,002 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,959 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,181,936 UART: [idev] Erasing UDS.KEYID = 0
1,199,362 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,342 UART: ROM Fatal Error: 0x000B0021
1,550,499 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,404,228 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,353 UART: [cold-reset] ++
1,169,815 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,181,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,237 UART: [idev] Sha1 KeyId Algorithm
1,207,139 UART: [idev] --
1,208,266 UART: [ldev] ++
1,208,434 UART: [ldev] CDI.KEYID = 6
1,208,798 UART: [ldev] SUBJECT.KEYID = 5
1,209,225 UART: [ldev] AUTHORITY.KEYID = 7
1,209,688 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,240,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,810 UART: [ldev] --
1,279,276 UART: [fwproc] Wait for Commands...
1,280,093 UART: [fwproc] Recv command 0x46574c44
1,280,826 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,087 UART: ROM Fatal Error: 0x000B0021
1,548,244 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,797 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,713 UART: [state] LifecycleState = Unprovisioned
85,368 UART: [state] DebugLocked = No
85,926 UART: [state] WD Timer not started. Device not locked for debugging
87,077 UART: [kat] SHA2-256
890,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,756 UART: [kat] ++
894,908 UART: [kat] sha1
898,980 UART: [kat] SHA2-256
900,920 UART: [kat] SHA2-384
903,699 UART: [kat] SHA2-512-ACC
905,600 UART: [kat] ECC-384
915,187 UART: [kat] HMAC-384Kdf
919,763 UART: [kat] LMS
1,168,075 UART: [kat] --
1,169,118 UART: [cold-reset] ++
1,169,568 UART: [fht] FHT @ 0x50003400
1,172,370 UART: [idev] ++
1,172,538 UART: [idev] CDI.KEYID = 6
1,172,899 UART: [idev] SUBJECT.KEYID = 7
1,173,324 UART: [idev] UDS.KEYID = 0
1,181,482 UART: [idev] Erasing UDS.KEYID = 0
1,198,274 UART: [idev] Sha1 KeyId Algorithm
1,207,198 UART: [idev] --
1,208,473 UART: [ldev] ++
1,208,641 UART: [ldev] CDI.KEYID = 6
1,209,005 UART: [ldev] SUBJECT.KEYID = 5
1,209,432 UART: [ldev] AUTHORITY.KEYID = 7
1,209,895 UART: [ldev] FE.KEYID = 1
1,215,001 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,501 UART: [ldev] --
1,280,821 UART: [fwproc] Wait for Commands...
1,281,418 UART: [fwproc] Recv command 0x46574c44
1,282,151 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,246 UART: ROM Fatal Error: 0x000B0021
1,549,403 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,200 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,021,322 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,437 UART:
2,165,831 UART: Running Caliptra ROM ...
2,166,999 UART:
2,167,178 UART: [state] CFI Enabled
2,168,154 UART: [state] LifecycleState = Unprovisioned
2,169,794 UART: [state] DebugLocked = No
2,170,902 UART: [state] WD Timer not started. Device not locked for debugging
2,173,372 UART: [kat] SHA2-256
2,174,042 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,058 UART: [kat] ++
2,177,510 UART: [kat] sha1
2,178,066 UART: [kat] SHA2-256
2,178,768 UART: [kat] SHA2-384
2,179,429 UART: [kat] SHA2-512-ACC
2,180,251 UART: [kat] ECC-384
3,778,078 UART: [kat] HMAC-384Kdf
3,802,103 UART: [kat] LMS
4,875,274 UART: [kat] --
4,880,583 UART: [cold-reset] ++
4,882,412 UART: [fht] FHT @ 0x50003400
4,895,011 UART: [idev] ++
4,895,685 UART: [idev] CDI.KEYID = 6
4,896,861 UART: [idev] SUBJECT.KEYID = 7
4,898,017 UART: [idev] UDS.KEYID = 0
4,928,317 UART: [idev] Erasing UDS.KEYID = 0
8,240,776 UART: [idev] Sha1 KeyId Algorithm
8,262,831 UART: [idev] --
8,266,660 UART: [ldev] ++
8,267,223 UART: [ldev] CDI.KEYID = 6
8,268,459 UART: [ldev] SUBJECT.KEYID = 5
8,269,613 UART: [ldev] AUTHORITY.KEYID = 7
8,270,864 UART: [ldev] FE.KEYID = 1
8,317,709 UART: [ldev] Erasing FE.KEYID = 1
11,653,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,280 UART: [ldev] --
14,034,737 UART: [fwproc] Wait for Commands...
14,036,344 UART: [fwproc] Recv command 0x46574c44
14,038,610 UART: [fwproc] Recv'd Img size: 114124 bytes
16,992,412 UART: ROM Fatal Error: 0x000B0021
16,995,816 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,140 writing to cptra_bootfsm_go
2,019,835 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,816,262 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,022,151 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,477 UART:
2,166,869 UART: Running Caliptra ROM ...
2,168,036 UART:
2,168,209 UART: [state] CFI Enabled
2,169,186 UART: [state] LifecycleState = Unprovisioned
2,170,826 UART: [state] DebugLocked = No
2,171,926 UART: [state] WD Timer not started. Device not locked for debugging
2,174,418 UART: [kat] SHA2-256
2,175,088 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,098 UART: [kat] ++
2,178,545 UART: [kat] sha1
2,179,049 UART: [kat] SHA2-256
2,179,780 UART: [kat] SHA2-384
2,180,436 UART: [kat] SHA2-512-ACC
2,181,227 UART: [kat] ECC-384
4,095,847 UART: [kat] HMAC-384Kdf
4,106,534 UART: [kat] LMS
5,179,705 UART: [kat] --
5,184,524 UART: [cold-reset] ++
5,186,996 UART: [fht] FHT @ 0x50003400
5,198,237 UART: [idev] ++
5,198,910 UART: [idev] CDI.KEYID = 6
5,200,146 UART: [idev] SUBJECT.KEYID = 7
5,201,595 UART: [idev] UDS.KEYID = 0
5,214,278 UART: [idev] Erasing UDS.KEYID = 0
8,489,924 UART: [idev] Sha1 KeyId Algorithm
8,512,085 UART: [idev] --
8,516,140 UART: [ldev] ++
8,516,704 UART: [ldev] CDI.KEYID = 6
8,517,947 UART: [ldev] SUBJECT.KEYID = 5
8,519,389 UART: [ldev] AUTHORITY.KEYID = 7
8,520,949 UART: [ldev] FE.KEYID = 1
8,531,777 UART: [ldev] Erasing FE.KEYID = 1
11,824,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,416 UART: [ldev] --
14,189,992 UART: [fwproc] Wait for Commands...
14,192,362 UART: [fwproc] Recv command 0x46574c44
14,194,629 UART: [fwproc] Recv'd Img size: 114124 bytes
17,136,495 UART: ROM Fatal Error: 0x000B0021
17,139,905 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,021,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,954,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,036,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,180,617 UART:
2,181,024 UART: Running Caliptra ROM ...
2,182,195 UART:
2,182,368 UART: [state] CFI Enabled
2,183,332 UART: [state] LifecycleState = Unprovisioned
2,184,977 UART: [state] DebugLocked = No
2,186,083 UART: [state] WD Timer not started. Device not locked for debugging
2,188,566 UART: [kat] SHA2-256
2,189,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,192,274 UART: [kat] ++
2,192,723 UART: [kat] sha1
2,193,323 UART: [kat] SHA2-256
2,194,020 UART: [kat] SHA2-384
2,194,705 UART: [kat] SHA2-512-ACC
2,195,595 UART: [kat] ECC-384
2,947,180 UART: [kat] HMAC-384Kdf
2,972,304 UART: [kat] LMS
3,501,777 UART: [kat] --
3,505,418 UART: [cold-reset] ++
3,507,245 UART: [fht] FHT @ 0x50003400
3,517,632 UART: [idev] ++
3,518,202 UART: [idev] CDI.KEYID = 6
3,519,222 UART: [idev] SUBJECT.KEYID = 7
3,520,326 UART: [idev] UDS.KEYID = 0
3,545,236 UART: [idev] Erasing UDS.KEYID = 0
6,025,149 UART: [idev] Sha1 KeyId Algorithm
6,047,917 UART: [idev] --
6,052,841 UART: [ldev] ++
6,053,439 UART: [ldev] CDI.KEYID = 6
6,054,355 UART: [ldev] SUBJECT.KEYID = 5
6,055,538 UART: [ldev] AUTHORITY.KEYID = 7
6,056,690 UART: [ldev] FE.KEYID = 1
6,099,883 UART: [ldev] Erasing FE.KEYID = 1
8,604,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,449 UART: [ldev] --
10,414,441 UART: [fwproc] Wait for Commands...
10,416,567 UART: [fwproc] Recv command 0x46574c44
10,418,672 UART: [fwproc] Recv'd Img size: 114448 bytes
12,705,870 UART: ROM Fatal Error: 0x000B0021
12,709,000 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,033,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,468,084 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,022,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,123 UART:
2,167,521 UART: Running Caliptra ROM ...
2,168,615 UART:
2,168,771 UART: [state] CFI Enabled
2,169,734 UART: [state] LifecycleState = Unprovisioned
2,171,385 UART: [state] DebugLocked = No
2,172,489 UART: [state] WD Timer not started. Device not locked for debugging
2,174,984 UART: [kat] SHA2-256
2,175,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,663 UART: [kat] ++
2,179,112 UART: [kat] sha1
2,179,668 UART: [kat] SHA2-256
2,180,331 UART: [kat] SHA2-384
2,180,985 UART: [kat] SHA2-512-ACC
2,181,983 UART: [kat] ECC-384
3,278,080 UART: [kat] HMAC-384Kdf
3,291,003 UART: [kat] LMS
3,820,468 UART: [kat] --
3,825,371 UART: [cold-reset] ++
3,826,705 UART: [fht] FHT @ 0x50003400
3,838,659 UART: [idev] ++
3,839,229 UART: [idev] CDI.KEYID = 6
3,840,198 UART: [idev] SUBJECT.KEYID = 7
3,841,375 UART: [idev] UDS.KEYID = 0
3,858,806 UART: [idev] Erasing UDS.KEYID = 0
6,317,539 UART: [idev] Sha1 KeyId Algorithm
6,340,769 UART: [idev] --
6,344,214 UART: [ldev] ++
6,344,778 UART: [ldev] CDI.KEYID = 6
6,345,685 UART: [ldev] SUBJECT.KEYID = 5
6,346,842 UART: [ldev] AUTHORITY.KEYID = 7
6,348,123 UART: [ldev] FE.KEYID = 1
6,357,527 UART: [ldev] Erasing FE.KEYID = 1
8,831,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,950 UART: [ldev] --
10,622,136 UART: [fwproc] Wait for Commands...
10,623,697 UART: [fwproc] Recv command 0x46574c44
10,625,792 UART: [fwproc] Recv'd Img size: 114448 bytes
12,913,837 UART: ROM Fatal Error: 0x000B0021
12,917,133 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,028,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,699,402 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,026,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,670 UART:
2,171,101 UART: Running Caliptra ROM ...
2,172,286 UART:
2,172,468 UART: [state] CFI Enabled
2,173,439 UART: [state] LifecycleState = Unprovisioned
2,175,081 UART: [state] DebugLocked = No
2,176,192 UART: [state] WD Timer not started. Device not locked for debugging
2,178,667 UART: [kat] SHA2-256
2,179,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,343 UART: [kat] ++
2,182,792 UART: [kat] sha1
2,183,302 UART: [kat] SHA2-256
2,184,042 UART: [kat] SHA2-384
2,184,710 UART: [kat] SHA2-512-ACC
2,185,594 UART: [kat] ECC-384
2,949,389 UART: [kat] HMAC-384Kdf
2,971,995 UART: [kat] LMS
3,501,443 UART: [kat] --
3,505,305 UART: [cold-reset] ++
3,507,730 UART: [fht] FHT @ 0x50003400
3,518,755 UART: [idev] ++
3,519,321 UART: [idev] CDI.KEYID = 6
3,520,244 UART: [idev] SUBJECT.KEYID = 7
3,521,459 UART: [idev] UDS.KEYID = 0
3,542,996 UART: [idev] Erasing UDS.KEYID = 0
6,025,687 UART: [idev] Sha1 KeyId Algorithm
6,049,680 UART: [idev] --
6,053,169 UART: [ldev] ++
6,053,747 UART: [ldev] CDI.KEYID = 6
6,054,633 UART: [ldev] SUBJECT.KEYID = 5
6,055,850 UART: [ldev] AUTHORITY.KEYID = 7
6,057,038 UART: [ldev] FE.KEYID = 1
6,098,989 UART: [ldev] Erasing FE.KEYID = 1
8,601,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,496 UART: [ldev] --
10,412,599 UART: [fwproc] Wait for Commands...
10,414,043 UART: [fwproc] Recv command 0x46574c44
10,416,149 UART: [fwproc] Recv'd Img size: 114448 bytes
12,713,934 UART: ROM Fatal Error: 0x000B0021
12,717,066 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
2,021,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,515,818 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,021,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,020 UART:
2,166,419 UART: Running Caliptra ROM ...
2,167,581 UART:
2,167,748 UART: [state] CFI Enabled
2,168,706 UART: [state] LifecycleState = Unprovisioned
2,170,348 UART: [state] DebugLocked = No
2,171,468 UART: [state] WD Timer not started. Device not locked for debugging
2,173,953 UART: [kat] SHA2-256
2,174,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,823 UART: [kat] ++
2,178,290 UART: [kat] sha1
2,178,807 UART: [kat] SHA2-256
2,179,515 UART: [kat] SHA2-384
2,180,169 UART: [kat] SHA2-512-ACC
2,181,065 UART: [kat] ECC-384
3,281,612 UART: [kat] HMAC-384Kdf
3,294,583 UART: [kat] LMS
3,824,084 UART: [kat] --
3,829,645 UART: [cold-reset] ++
3,831,245 UART: [fht] FHT @ 0x50003400
3,842,545 UART: [idev] ++
3,843,103 UART: [idev] CDI.KEYID = 6
3,844,039 UART: [idev] SUBJECT.KEYID = 7
3,845,205 UART: [idev] UDS.KEYID = 0
3,865,552 UART: [idev] Erasing UDS.KEYID = 0
6,320,211 UART: [idev] Sha1 KeyId Algorithm
6,342,408 UART: [idev] --
6,346,866 UART: [ldev] ++
6,347,437 UART: [ldev] CDI.KEYID = 6
6,348,341 UART: [ldev] SUBJECT.KEYID = 5
6,349,557 UART: [ldev] AUTHORITY.KEYID = 7
6,350,785 UART: [ldev] FE.KEYID = 1
6,359,540 UART: [ldev] Erasing FE.KEYID = 1
8,835,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,378 UART: [ldev] --
10,629,535 UART: [fwproc] Wait for Commands...
10,631,738 UART: [fwproc] Recv command 0x46574c44
10,633,834 UART: [fwproc] Recv'd Img size: 114448 bytes
12,920,018 UART: ROM Fatal Error: 0x000B0021
12,923,148 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,028,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,703,275 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,168 UART: [ldev] ++
1,209,336 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,127 UART: [ldev] AUTHORITY.KEYID = 7
1,210,590 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,198 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,371 UART: [fwproc] Recv command 0x46574c44
1,283,104 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,399 UART: ROM Fatal Error: 0x000B0021
1,550,556 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,957 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,252 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,960 UART: ROM Fatal Error: 0x000B0021
1,550,117 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,218 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,242,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,960 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,282,045 UART: [fwproc] Recv command 0x46574c44
1,282,778 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,353 UART: ROM Fatal Error: 0x000B0021
1,549,510 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,533 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,248 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,217,097 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,961 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,558 UART: ROM Fatal Error: 0x000B0021
1,550,715 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,399,994 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,153 UART: [idev] --
1,209,334 UART: [ldev] ++
1,209,502 UART: [ldev] CDI.KEYID = 6
1,209,866 UART: [ldev] SUBJECT.KEYID = 5
1,210,293 UART: [ldev] AUTHORITY.KEYID = 7
1,210,756 UART: [ldev] FE.KEYID = 1
1,215,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,316 UART: [fwproc] Wait for Commands...
1,281,989 UART: [fwproc] Recv command 0x46574c44
1,282,722 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,555 UART: ROM Fatal Error: 0x000B0021
1,549,712 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,265 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,636 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,181,838 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,241,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,439 UART: [ldev] --
1,280,865 UART: [fwproc] Wait for Commands...
1,281,470 UART: [fwproc] Recv command 0x46574c44
1,282,203 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,723 UART: ROM Fatal Error: 0x000B0021
1,548,880 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,876 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,633 writing to cptra_bootfsm_go
2,021,882 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,097 UART:
2,166,491 UART: Running Caliptra ROM ...
2,167,569 UART:
2,167,721 UART: [state] CFI Enabled
2,168,691 UART: [state] LifecycleState = Unprovisioned
2,170,335 UART: [state] DebugLocked = No
2,171,362 UART: [state] WD Timer not started. Device not locked for debugging
2,173,819 UART: [kat] SHA2-256
2,174,484 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,502 UART: [kat] ++
2,177,956 UART: [kat] sha1
2,178,488 UART: [kat] SHA2-256
2,179,229 UART: [kat] SHA2-384
2,179,899 UART: [kat] SHA2-512-ACC
2,180,778 UART: [kat] ECC-384
3,772,143 UART: [kat] HMAC-384Kdf
3,802,891 UART: [kat] LMS
4,876,055 UART: [kat] --
4,878,703 UART: [cold-reset] ++
4,880,092 UART: [fht] FHT @ 0x50003400
4,892,394 UART: [idev] ++
4,893,109 UART: [idev] CDI.KEYID = 6
4,894,296 UART: [idev] SUBJECT.KEYID = 7
4,895,451 UART: [idev] UDS.KEYID = 0
4,930,279 UART: [idev] Erasing UDS.KEYID = 0
8,242,970 UART: [idev] Sha1 KeyId Algorithm
8,265,301 UART: [idev] --
8,269,421 UART: [ldev] ++
8,269,985 UART: [ldev] CDI.KEYID = 6
8,271,147 UART: [ldev] SUBJECT.KEYID = 5
8,272,365 UART: [ldev] AUTHORITY.KEYID = 7
8,273,517 UART: [ldev] FE.KEYID = 1
8,317,726 UART: [ldev] Erasing FE.KEYID = 1
11,651,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,642 UART: [ldev] --
14,035,724 UART: [fwproc] Wait for Commands...
14,037,878 UART: [fwproc] Recv command 0x46574c44
14,040,201 UART: [fwproc] Recv'd Img size: 114124 bytes
16,987,231 UART: ROM Fatal Error: 0x000B0022
16,990,707 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,019,676 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,782,590 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,024,612 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,913 UART:
2,169,321 UART: Running Caliptra ROM ...
2,170,488 UART:
2,170,672 UART: [state] CFI Enabled
2,171,660 UART: [state] LifecycleState = Unprovisioned
2,173,303 UART: [state] DebugLocked = No
2,174,357 UART: [state] WD Timer not started. Device not locked for debugging
2,176,819 UART: [kat] SHA2-256
2,177,481 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,495 UART: [kat] ++
2,180,942 UART: [kat] sha1
2,181,449 UART: [kat] SHA2-256
2,182,132 UART: [kat] SHA2-384
2,182,789 UART: [kat] SHA2-512-ACC
2,183,586 UART: [kat] ECC-384
4,094,163 UART: [kat] HMAC-384Kdf
4,104,900 UART: [kat] LMS
5,178,047 UART: [kat] --
5,183,890 UART: [cold-reset] ++
5,185,020 UART: [fht] FHT @ 0x50003400
5,197,292 UART: [idev] ++
5,197,962 UART: [idev] CDI.KEYID = 6
5,199,113 UART: [idev] SUBJECT.KEYID = 7
5,200,641 UART: [idev] UDS.KEYID = 0
5,216,483 UART: [idev] Erasing UDS.KEYID = 0
8,487,520 UART: [idev] Sha1 KeyId Algorithm
8,509,887 UART: [idev] --
8,514,802 UART: [ldev] ++
8,515,410 UART: [ldev] CDI.KEYID = 6
8,516,600 UART: [ldev] SUBJECT.KEYID = 5
8,518,030 UART: [ldev] AUTHORITY.KEYID = 7
8,519,591 UART: [ldev] FE.KEYID = 1
8,528,452 UART: [ldev] Erasing FE.KEYID = 1
11,818,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,136 UART: [ldev] --
14,183,648 UART: [fwproc] Wait for Commands...
14,185,419 UART: [fwproc] Recv command 0x46574c44
14,187,685 UART: [fwproc] Recv'd Img size: 114124 bytes
17,129,660 UART: ROM Fatal Error: 0x000B0022
17,133,066 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,020,624 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,959,947 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,022,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,723 UART:
2,167,123 UART: Running Caliptra ROM ...
2,168,292 UART:
2,168,467 UART: [state] CFI Enabled
2,169,430 UART: [state] LifecycleState = Unprovisioned
2,171,075 UART: [state] DebugLocked = No
2,172,216 UART: [state] WD Timer not started. Device not locked for debugging
2,174,698 UART: [kat] SHA2-256
2,175,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,378 UART: [kat] ++
2,178,828 UART: [kat] sha1
2,179,342 UART: [kat] SHA2-256
2,180,085 UART: [kat] SHA2-384
2,180,756 UART: [kat] SHA2-512-ACC
2,181,602 UART: [kat] ECC-384
2,947,361 UART: [kat] HMAC-384Kdf
2,970,596 UART: [kat] LMS
3,500,051 UART: [kat] --
3,503,753 UART: [cold-reset] ++
3,505,997 UART: [fht] FHT @ 0x50003400
3,518,176 UART: [idev] ++
3,518,743 UART: [idev] CDI.KEYID = 6
3,519,675 UART: [idev] SUBJECT.KEYID = 7
3,520,841 UART: [idev] UDS.KEYID = 0
3,543,094 UART: [idev] Erasing UDS.KEYID = 0
6,025,086 UART: [idev] Sha1 KeyId Algorithm
6,049,289 UART: [idev] --
6,054,746 UART: [ldev] ++
6,055,321 UART: [ldev] CDI.KEYID = 6
6,056,231 UART: [ldev] SUBJECT.KEYID = 5
6,057,395 UART: [ldev] AUTHORITY.KEYID = 7
6,058,632 UART: [ldev] FE.KEYID = 1
6,099,041 UART: [ldev] Erasing FE.KEYID = 1
8,600,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,805 UART: [ldev] --
10,388,962 UART: [fwproc] Wait for Commands...
10,391,565 UART: [fwproc] Recv command 0x46574c44
10,393,675 UART: [fwproc] Recv'd Img size: 114448 bytes
12,690,210 UART: ROM Fatal Error: 0x000B0022
12,693,337 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,022,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,470,529 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
2,021,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,128 UART:
2,166,519 UART: Running Caliptra ROM ...
2,167,601 UART:
2,167,780 UART: [state] CFI Enabled
2,168,967 UART: [state] LifecycleState = Unprovisioned
2,170,650 UART: [state] DebugLocked = No
2,171,676 UART: [state] WD Timer not started. Device not locked for debugging
2,174,154 UART: [kat] SHA2-256
2,174,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,838 UART: [kat] ++
2,178,288 UART: [kat] sha1
2,178,799 UART: [kat] SHA2-256
2,179,537 UART: [kat] SHA2-384
2,180,204 UART: [kat] SHA2-512-ACC
2,181,083 UART: [kat] ECC-384
3,282,813 UART: [kat] HMAC-384Kdf
3,295,944 UART: [kat] LMS
3,825,398 UART: [kat] --
3,828,741 UART: [cold-reset] ++
3,829,872 UART: [fht] FHT @ 0x50003400
3,839,855 UART: [idev] ++
3,840,409 UART: [idev] CDI.KEYID = 6
3,841,347 UART: [idev] SUBJECT.KEYID = 7
3,842,555 UART: [idev] UDS.KEYID = 0
3,859,205 UART: [idev] Erasing UDS.KEYID = 0
6,320,835 UART: [idev] Sha1 KeyId Algorithm
6,343,426 UART: [idev] --
6,346,970 UART: [ldev] ++
6,347,541 UART: [ldev] CDI.KEYID = 6
6,348,478 UART: [ldev] SUBJECT.KEYID = 5
6,349,637 UART: [ldev] AUTHORITY.KEYID = 7
6,350,921 UART: [ldev] FE.KEYID = 1
6,364,294 UART: [ldev] Erasing FE.KEYID = 1
8,843,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,311 UART: [ldev] --
10,634,759 UART: [fwproc] Wait for Commands...
10,636,798 UART: [fwproc] Recv command 0x46574c44
10,638,888 UART: [fwproc] Recv'd Img size: 114448 bytes
12,927,947 UART: ROM Fatal Error: 0x000B0022
12,931,083 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
2,022,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,695,641 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,021,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,342 UART:
2,166,735 UART: Running Caliptra ROM ...
2,167,903 UART:
2,168,081 UART: [state] CFI Enabled
2,169,057 UART: [state] LifecycleState = Unprovisioned
2,170,703 UART: [state] DebugLocked = No
2,171,811 UART: [state] WD Timer not started. Device not locked for debugging
2,174,295 UART: [kat] SHA2-256
2,174,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,975 UART: [kat] ++
2,178,423 UART: [kat] sha1
2,178,932 UART: [kat] SHA2-256
2,179,587 UART: [kat] SHA2-384
2,180,242 UART: [kat] SHA2-512-ACC
2,181,236 UART: [kat] ECC-384
2,926,827 UART: [kat] HMAC-384Kdf
2,951,544 UART: [kat] LMS
3,480,981 UART: [kat] --
3,486,915 UART: [cold-reset] ++
3,488,117 UART: [fht] FHT @ 0x50003400
3,497,645 UART: [idev] ++
3,498,220 UART: [idev] CDI.KEYID = 6
3,499,103 UART: [idev] SUBJECT.KEYID = 7
3,500,313 UART: [idev] UDS.KEYID = 0
3,524,123 UART: [idev] Erasing UDS.KEYID = 0
6,003,933 UART: [idev] Sha1 KeyId Algorithm
6,027,725 UART: [idev] --
6,030,699 UART: [ldev] ++
6,031,280 UART: [ldev] CDI.KEYID = 6
6,032,192 UART: [ldev] SUBJECT.KEYID = 5
6,033,379 UART: [ldev] AUTHORITY.KEYID = 7
6,034,622 UART: [ldev] FE.KEYID = 1
6,079,524 UART: [ldev] Erasing FE.KEYID = 1
8,583,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,003 UART: [ldev] --
10,394,951 UART: [fwproc] Wait for Commands...
10,396,839 UART: [fwproc] Recv command 0x46574c44
10,398,939 UART: [fwproc] Recv'd Img size: 114448 bytes
12,689,203 UART: ROM Fatal Error: 0x000B0022
12,692,328 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,020,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,683 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,021,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,532 UART:
2,165,929 UART: Running Caliptra ROM ...
2,167,104 UART:
2,167,281 UART: [state] CFI Enabled
2,168,243 UART: [state] LifecycleState = Unprovisioned
2,169,887 UART: [state] DebugLocked = No
2,170,912 UART: [state] WD Timer not started. Device not locked for debugging
2,173,385 UART: [kat] SHA2-256
2,174,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,079 UART: [kat] ++
2,177,534 UART: [kat] sha1
2,178,059 UART: [kat] SHA2-256
2,178,715 UART: [kat] SHA2-384
2,179,370 UART: [kat] SHA2-512-ACC
2,180,204 UART: [kat] ECC-384
3,282,098 UART: [kat] HMAC-384Kdf
3,294,718 UART: [kat] LMS
3,824,239 UART: [kat] --
3,830,118 UART: [cold-reset] ++
3,831,239 UART: [fht] FHT @ 0x50003400
3,843,187 UART: [idev] ++
3,843,753 UART: [idev] CDI.KEYID = 6
3,844,768 UART: [idev] SUBJECT.KEYID = 7
3,845,868 UART: [idev] UDS.KEYID = 0
3,860,754 UART: [idev] Erasing UDS.KEYID = 0
6,313,975 UART: [idev] Sha1 KeyId Algorithm
6,336,125 UART: [idev] --
6,340,276 UART: [ldev] ++
6,340,846 UART: [ldev] CDI.KEYID = 6
6,341,755 UART: [ldev] SUBJECT.KEYID = 5
6,342,972 UART: [ldev] AUTHORITY.KEYID = 7
6,344,199 UART: [ldev] FE.KEYID = 1
6,355,901 UART: [ldev] Erasing FE.KEYID = 1
8,829,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,445 UART: [ldev] --
10,619,801 UART: [fwproc] Wait for Commands...
10,622,761 UART: [fwproc] Recv command 0x46574c44
10,624,822 UART: [fwproc] Recv'd Img size: 114448 bytes
12,915,975 UART: ROM Fatal Error: 0x000B0022
12,919,101 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,021,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,703,306 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,790 UART: [kat] SHA2-512-ACC
906,691 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,281,043 UART: [fwproc] Recv command 0x46574c44
1,281,776 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,123 UART: ROM Fatal Error: 0x000B0022
1,549,280 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,413 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,734 UART: ROM Fatal Error: 0x000B0022
1,549,891 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,674 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,666 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,369 UART: ROM Fatal Error: 0x000B0022
1,549,526 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,357 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,358 UART: ROM Fatal Error: 0x000B0022
1,550,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,842 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,647 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,382 UART: [ldev] Erasing FE.KEYID = 1
1,241,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,281,016 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,697 UART: ROM Fatal Error: 0x000B0022
1,549,854 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,164 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,373 UART: [kat] SHA2-256
891,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,052 UART: [kat] ++
896,204 UART: [kat] sha1
900,378 UART: [kat] SHA2-256
902,318 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,498 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,031 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,176 UART: ROM Fatal Error: 0x000B0022
1,550,333 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,466 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,023,589 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,752 UART:
2,168,139 UART: Running Caliptra ROM ...
2,169,220 UART:
2,169,373 UART: [state] CFI Enabled
2,170,351 UART: [state] LifecycleState = Unprovisioned
2,171,996 UART: [state] DebugLocked = No
2,173,019 UART: [state] WD Timer not started. Device not locked for debugging
2,175,484 UART: [kat] SHA2-256
2,176,147 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,152 UART: [kat] ++
2,179,598 UART: [kat] sha1
2,180,103 UART: [kat] SHA2-256
2,180,756 UART: [kat] SHA2-384
2,181,492 UART: [kat] SHA2-512-ACC
2,182,344 UART: [kat] ECC-384
3,776,965 UART: [kat] HMAC-384Kdf
3,803,468 UART: [kat] LMS
4,876,610 UART: [kat] --
4,880,356 UART: [cold-reset] ++
4,883,106 UART: [fht] FHT @ 0x50003400
4,894,242 UART: [idev] ++
4,894,921 UART: [idev] CDI.KEYID = 6
4,896,153 UART: [idev] SUBJECT.KEYID = 7
4,897,323 UART: [idev] UDS.KEYID = 0
4,929,095 UART: [idev] Erasing UDS.KEYID = 0
8,244,160 UART: [idev] Sha1 KeyId Algorithm
8,265,544 UART: [idev] --
8,268,889 UART: [ldev] ++
8,269,451 UART: [ldev] CDI.KEYID = 6
8,270,613 UART: [ldev] SUBJECT.KEYID = 5
8,271,830 UART: [ldev] AUTHORITY.KEYID = 7
8,273,002 UART: [ldev] FE.KEYID = 1
8,317,665 UART: [ldev] Erasing FE.KEYID = 1
11,654,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,892 UART: [ldev] --
14,040,991 UART: [fwproc] Wait for Commands...
14,043,627 UART: [fwproc] Recv command 0x46574c44
14,045,949 UART: [fwproc] Recv'd Img size: 114124 bytes
16,995,635 UART: ROM Fatal Error: 0x000B0021
16,999,094 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,024,945 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,751,658 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,027,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,171,892 UART:
2,172,306 UART: Running Caliptra ROM ...
2,173,393 UART:
2,173,543 UART: [state] CFI Enabled
2,174,523 UART: [state] LifecycleState = Unprovisioned
2,176,163 UART: [state] DebugLocked = No
2,177,185 UART: [state] WD Timer not started. Device not locked for debugging
2,179,644 UART: [kat] SHA2-256
2,180,306 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,332 UART: [kat] ++
2,183,777 UART: [kat] sha1
2,184,278 UART: [kat] SHA2-256
2,184,927 UART: [kat] SHA2-384
2,185,574 UART: [kat] SHA2-512-ACC
2,186,605 UART: [kat] ECC-384
4,095,391 UART: [kat] HMAC-384Kdf
4,106,446 UART: [kat] LMS
5,179,576 UART: [kat] --
5,184,231 UART: [cold-reset] ++
5,186,055 UART: [fht] FHT @ 0x50003400
5,197,955 UART: [idev] ++
5,198,688 UART: [idev] CDI.KEYID = 6
5,199,867 UART: [idev] SUBJECT.KEYID = 7
5,201,298 UART: [idev] UDS.KEYID = 0
5,218,841 UART: [idev] Erasing UDS.KEYID = 0
8,491,273 UART: [idev] Sha1 KeyId Algorithm
8,513,376 UART: [idev] --
8,515,944 UART: [ldev] ++
8,516,517 UART: [ldev] CDI.KEYID = 6
8,517,759 UART: [ldev] SUBJECT.KEYID = 5
8,519,197 UART: [ldev] AUTHORITY.KEYID = 7
8,520,690 UART: [ldev] FE.KEYID = 1
8,533,437 UART: [ldev] Erasing FE.KEYID = 1
11,825,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,992 UART: [ldev] --
14,190,332 UART: [fwproc] Wait for Commands...
14,192,221 UART: [fwproc] Recv command 0x46574c44
14,194,509 UART: [fwproc] Recv'd Img size: 114124 bytes
17,144,387 UART: ROM Fatal Error: 0x000B0021
17,147,815 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
2,024,799 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,957,353 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,035,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,179,627 UART:
2,180,016 UART: Running Caliptra ROM ...
2,181,180 UART:
2,181,354 UART: [state] CFI Enabled
2,182,316 UART: [state] LifecycleState = Unprovisioned
2,183,957 UART: [state] DebugLocked = No
2,185,067 UART: [state] WD Timer not started. Device not locked for debugging
2,187,557 UART: [kat] SHA2-256
2,188,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,261 UART: [kat] ++
2,191,709 UART: [kat] sha1
2,192,257 UART: [kat] SHA2-256
2,192,918 UART: [kat] SHA2-384
2,193,598 UART: [kat] SHA2-512-ACC
2,194,498 UART: [kat] ECC-384
2,945,907 UART: [kat] HMAC-384Kdf
2,972,793 UART: [kat] LMS
3,502,246 UART: [kat] --
3,506,942 UART: [cold-reset] ++
3,508,276 UART: [fht] FHT @ 0x50003400
3,518,934 UART: [idev] ++
3,519,540 UART: [idev] CDI.KEYID = 6
3,520,427 UART: [idev] SUBJECT.KEYID = 7
3,521,648 UART: [idev] UDS.KEYID = 0
3,543,750 UART: [idev] Erasing UDS.KEYID = 0
6,028,442 UART: [idev] Sha1 KeyId Algorithm
6,051,844 UART: [idev] --
6,056,329 UART: [ldev] ++
6,056,906 UART: [ldev] CDI.KEYID = 6
6,057,814 UART: [ldev] SUBJECT.KEYID = 5
6,058,979 UART: [ldev] AUTHORITY.KEYID = 7
6,060,269 UART: [ldev] FE.KEYID = 1
6,093,557 UART: [ldev] Erasing FE.KEYID = 1
8,596,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,144 UART: [ldev] --
10,386,762 UART: [fwproc] Wait for Commands...
10,388,460 UART: [fwproc] Recv command 0x46574c44
10,390,570 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,982 UART: ROM Fatal Error: 0x000B0021
12,679,126 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,025,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,494,116 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
2,024,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,534 UART:
2,169,925 UART: Running Caliptra ROM ...
2,171,010 UART:
2,171,168 UART: [state] CFI Enabled
2,172,132 UART: [state] LifecycleState = Unprovisioned
2,173,782 UART: [state] DebugLocked = No
2,174,832 UART: [state] WD Timer not started. Device not locked for debugging
2,177,305 UART: [kat] SHA2-256
2,177,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,980 UART: [kat] ++
2,181,424 UART: [kat] sha1
2,181,933 UART: [kat] SHA2-256
2,182,590 UART: [kat] SHA2-384
2,183,245 UART: [kat] SHA2-512-ACC
2,184,077 UART: [kat] ECC-384
3,282,385 UART: [kat] HMAC-384Kdf
3,295,427 UART: [kat] LMS
3,824,915 UART: [kat] --
3,828,750 UART: [cold-reset] ++
3,829,973 UART: [fht] FHT @ 0x50003400
3,840,789 UART: [idev] ++
3,841,358 UART: [idev] CDI.KEYID = 6
3,842,284 UART: [idev] SUBJECT.KEYID = 7
3,843,391 UART: [idev] UDS.KEYID = 0
3,860,877 UART: [idev] Erasing UDS.KEYID = 0
6,319,055 UART: [idev] Sha1 KeyId Algorithm
6,342,285 UART: [idev] --
6,347,087 UART: [ldev] ++
6,347,656 UART: [ldev] CDI.KEYID = 6
6,348,560 UART: [ldev] SUBJECT.KEYID = 5
6,349,777 UART: [ldev] AUTHORITY.KEYID = 7
6,351,006 UART: [ldev] FE.KEYID = 1
6,359,826 UART: [ldev] Erasing FE.KEYID = 1
8,831,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,756 UART: [ldev] --
10,622,330 UART: [fwproc] Wait for Commands...
10,624,701 UART: [fwproc] Recv command 0x46574c44
10,626,743 UART: [fwproc] Recv'd Img size: 114448 bytes
12,919,562 UART: ROM Fatal Error: 0x000B0021
12,922,691 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,025,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,691,874 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,026,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,722 UART:
2,171,121 UART: Running Caliptra ROM ...
2,172,294 UART:
2,172,488 UART: [state] CFI Enabled
2,173,458 UART: [state] LifecycleState = Unprovisioned
2,175,101 UART: [state] DebugLocked = No
2,176,215 UART: [state] WD Timer not started. Device not locked for debugging
2,178,693 UART: [kat] SHA2-256
2,179,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,379 UART: [kat] ++
2,182,828 UART: [kat] sha1
2,183,341 UART: [kat] SHA2-256
2,184,086 UART: [kat] SHA2-384
2,184,756 UART: [kat] SHA2-512-ACC
2,185,639 UART: [kat] ECC-384
2,946,211 UART: [kat] HMAC-384Kdf
2,969,966 UART: [kat] LMS
3,499,434 UART: [kat] --
3,505,418 UART: [cold-reset] ++
3,507,567 UART: [fht] FHT @ 0x50003400
3,518,234 UART: [idev] ++
3,518,804 UART: [idev] CDI.KEYID = 6
3,519,723 UART: [idev] SUBJECT.KEYID = 7
3,520,939 UART: [idev] UDS.KEYID = 0
3,542,258 UART: [idev] Erasing UDS.KEYID = 0
6,025,874 UART: [idev] Sha1 KeyId Algorithm
6,048,096 UART: [idev] --
6,051,184 UART: [ldev] ++
6,051,758 UART: [ldev] CDI.KEYID = 6
6,052,670 UART: [ldev] SUBJECT.KEYID = 5
6,053,833 UART: [ldev] AUTHORITY.KEYID = 7
6,055,128 UART: [ldev] FE.KEYID = 1
6,098,414 UART: [ldev] Erasing FE.KEYID = 1
8,599,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,363 UART: [ldev] --
10,388,585 UART: [fwproc] Wait for Commands...
10,390,753 UART: [fwproc] Recv command 0x46574c44
10,392,804 UART: [fwproc] Recv'd Img size: 114448 bytes
12,684,426 UART: ROM Fatal Error: 0x000B0021
12,687,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,024,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,494,698 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,564 writing to cptra_bootfsm_go
2,026,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,270 UART:
2,171,664 UART: Running Caliptra ROM ...
2,172,742 UART:
2,172,894 UART: [state] CFI Enabled
2,173,870 UART: [state] LifecycleState = Unprovisioned
2,175,522 UART: [state] DebugLocked = No
2,176,735 UART: [state] WD Timer not started. Device not locked for debugging
2,179,260 UART: [kat] SHA2-256
2,179,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,940 UART: [kat] ++
2,183,387 UART: [kat] sha1
2,183,897 UART: [kat] SHA2-256
2,184,555 UART: [kat] SHA2-384
2,185,211 UART: [kat] SHA2-512-ACC
2,186,012 UART: [kat] ECC-384
3,281,433 UART: [kat] HMAC-384Kdf
3,292,985 UART: [kat] LMS
3,822,482 UART: [kat] --
3,828,037 UART: [cold-reset] ++
3,830,401 UART: [fht] FHT @ 0x50003400
3,841,648 UART: [idev] ++
3,842,207 UART: [idev] CDI.KEYID = 6
3,843,168 UART: [idev] SUBJECT.KEYID = 7
3,844,320 UART: [idev] UDS.KEYID = 0
3,860,670 UART: [idev] Erasing UDS.KEYID = 0
6,316,461 UART: [idev] Sha1 KeyId Algorithm
6,338,889 UART: [idev] --
6,342,699 UART: [ldev] ++
6,343,278 UART: [ldev] CDI.KEYID = 6
6,344,189 UART: [ldev] SUBJECT.KEYID = 5
6,345,401 UART: [ldev] AUTHORITY.KEYID = 7
6,346,629 UART: [ldev] FE.KEYID = 1
6,356,053 UART: [ldev] Erasing FE.KEYID = 1
8,829,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,016 UART: [ldev] --
10,620,549 UART: [fwproc] Wait for Commands...
10,622,162 UART: [fwproc] Recv command 0x46574c44
10,624,258 UART: [fwproc] Recv'd Img size: 114448 bytes
12,919,199 UART: ROM Fatal Error: 0x000B0021
12,922,275 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
2,024,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,705,658 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,781 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,432 UART: [ldev] Erasing FE.KEYID = 1
1,241,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,874 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,615 UART: ROM Fatal Error: 0x000B0021
1,550,772 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,759 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [kat] SHA2-256
891,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,116 UART: [kat] ++
896,268 UART: [kat] sha1
900,546 UART: [kat] SHA2-256
902,486 UART: [kat] SHA2-384
905,309 UART: [kat] SHA2-512-ACC
907,210 UART: [kat] ECC-384
916,861 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,548 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,079 UART: [ldev] --
1,281,503 UART: [fwproc] Wait for Commands...
1,282,090 UART: [fwproc] Recv command 0x46574c44
1,282,823 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,160 UART: ROM Fatal Error: 0x000B0021
1,550,317 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,806 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,130 UART: [kat] HMAC-384Kdf
919,694 UART: [kat] LMS
1,168,006 UART: [kat] --
1,168,771 UART: [cold-reset] ++
1,169,209 UART: [fht] FHT @ 0x50003400
1,171,813 UART: [idev] ++
1,171,981 UART: [idev] CDI.KEYID = 6
1,172,342 UART: [idev] SUBJECT.KEYID = 7
1,172,767 UART: [idev] UDS.KEYID = 0
1,181,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,545 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,270 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,151 UART: ROM Fatal Error: 0x000B0021
1,549,308 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,747 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,763 UART: [fwproc] Wait for Commands...
1,283,524 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,336 UART: ROM Fatal Error: 0x000B0021
1,552,493 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,326 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,070 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,795 UART: ROM Fatal Error: 0x000B0021
1,549,952 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,399,251 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,182,336 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,348 UART: [idev] --
1,209,431 UART: [ldev] ++
1,209,599 UART: [ldev] CDI.KEYID = 6
1,209,963 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,863 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,229 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,514 UART: ROM Fatal Error: 0x000B0021
1,550,671 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,524 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,020,819 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,902 UART:
2,165,298 UART: Running Caliptra ROM ...
2,166,596 UART:
2,166,767 UART: [state] CFI Enabled
2,167,646 UART: [state] LifecycleState = Unprovisioned
2,169,291 UART: [state] DebugLocked = No
2,170,325 UART: [state] WD Timer not started. Device not locked for debugging
2,172,811 UART: [kat] SHA2-256
2,173,475 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,487 UART: [kat] ++
2,176,931 UART: [kat] sha1
2,177,438 UART: [kat] SHA2-256
2,178,095 UART: [kat] SHA2-384
2,178,752 UART: [kat] SHA2-512-ACC
2,179,602 UART: [kat] ECC-384
3,776,739 UART: [kat] HMAC-384Kdf
3,803,611 UART: [kat] LMS
4,876,792 UART: [kat] --
4,882,403 UART: [cold-reset] ++
4,884,931 UART: [fht] FHT @ 0x50003400
4,897,064 UART: [idev] ++
4,897,765 UART: [idev] CDI.KEYID = 6
4,898,945 UART: [idev] SUBJECT.KEYID = 7
4,900,125 UART: [idev] UDS.KEYID = 0
4,931,762 UART: [idev] Erasing UDS.KEYID = 0
8,243,153 UART: [idev] Sha1 KeyId Algorithm
8,265,296 UART: [idev] --
8,269,749 UART: [ldev] ++
8,270,327 UART: [ldev] CDI.KEYID = 6
8,271,508 UART: [ldev] SUBJECT.KEYID = 5
8,272,667 UART: [ldev] AUTHORITY.KEYID = 7
8,273,894 UART: [ldev] FE.KEYID = 1
8,318,235 UART: [ldev] Erasing FE.KEYID = 1
11,653,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,517 UART: [ldev] --
14,034,508 UART: [fwproc] Wait for Commands...
14,037,373 UART: [fwproc] Recv command 0x46574c44
14,039,687 UART: [fwproc] Recv'd Img size: 114124 bytes
16,737,314 UART: ROM Fatal Error: 0x000B0034
16,740,761 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,019 writing to cptra_bootfsm_go
2,019,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,163,572 UART:
2,163,962 UART: Running Caliptra ROM ...
2,165,148 UART:
2,165,320 UART: [state] CFI Enabled
2,166,285 UART: [state] LifecycleState = Unprovisioned
2,167,920 UART: [state] DebugLocked = No
2,169,024 UART: [state] WD Timer not started. Device not locked for debugging
2,171,496 UART: [kat] SHA2-256
2,172,164 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,183 UART: [kat] ++
2,175,633 UART: [kat] sha1
2,176,178 UART: [kat] SHA2-256
2,176,836 UART: [kat] SHA2-384
2,177,492 UART: [kat] SHA2-512-ACC
2,178,372 UART: [kat] ECC-384
3,777,077 UART: [kat] HMAC-384Kdf
3,803,692 UART: [kat] LMS
4,876,849 UART: [kat] --
4,879,951 UART: [cold-reset] ++
4,881,244 UART: [fht] FHT @ 0x50003400
4,892,796 UART: [idev] ++
4,893,482 UART: [idev] CDI.KEYID = 6
4,894,665 UART: [idev] SUBJECT.KEYID = 7
4,895,822 UART: [idev] UDS.KEYID = 0
4,930,211 UART: [idev] Erasing UDS.KEYID = 0
8,243,991 UART: [idev] Sha1 KeyId Algorithm
8,266,194 UART: [idev] --
8,270,353 UART: [ldev] ++
8,270,972 UART: [ldev] CDI.KEYID = 6
8,272,205 UART: [ldev] SUBJECT.KEYID = 5
8,273,309 UART: [ldev] AUTHORITY.KEYID = 7
8,274,541 UART: [ldev] FE.KEYID = 1
8,316,866 UART: [ldev] Erasing FE.KEYID = 1
11,648,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,797 UART: [ldev] --
14,015,102 UART: [fwproc] Wait for Commands...
14,018,170 UART: [fwproc] Recv command 0x46574c44
14,020,485 UART: [fwproc] Recv'd Img size: 114124 bytes
16,722,227 UART: ROM Fatal Error: 0x000B0034
16,725,644 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,026,189 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,532,182 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,018,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,508,158 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,025,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,169,797 UART:
2,170,204 UART: Running Caliptra ROM ...
2,171,370 UART:
2,171,556 UART: [state] CFI Enabled
2,172,522 UART: [state] LifecycleState = Unprovisioned
2,174,171 UART: [state] DebugLocked = No
2,175,271 UART: [state] WD Timer not started. Device not locked for debugging
2,177,731 UART: [kat] SHA2-256
2,178,388 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,388 UART: [kat] ++
2,181,833 UART: [kat] sha1
2,182,417 UART: [kat] SHA2-256
2,183,077 UART: [kat] SHA2-384
2,183,732 UART: [kat] SHA2-512-ACC
2,184,545 UART: [kat] ECC-384
4,097,188 UART: [kat] HMAC-384Kdf
4,108,903 UART: [kat] LMS
5,182,081 UART: [kat] --
5,186,628 UART: [cold-reset] ++
5,189,159 UART: [fht] FHT @ 0x50003400
5,199,918 UART: [idev] ++
5,200,580 UART: [idev] CDI.KEYID = 6
5,201,732 UART: [idev] SUBJECT.KEYID = 7
5,203,260 UART: [idev] UDS.KEYID = 0
5,217,864 UART: [idev] Erasing UDS.KEYID = 0
8,487,750 UART: [idev] Sha1 KeyId Algorithm
8,510,444 UART: [idev] --
8,514,273 UART: [ldev] ++
8,514,839 UART: [ldev] CDI.KEYID = 6
8,516,067 UART: [ldev] SUBJECT.KEYID = 5
8,517,518 UART: [ldev] AUTHORITY.KEYID = 7
8,519,069 UART: [ldev] FE.KEYID = 1
8,531,712 UART: [ldev] Erasing FE.KEYID = 1
11,821,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,490 UART: [ldev] --
14,187,368 UART: [fwproc] Wait for Commands...
14,190,378 UART: [fwproc] Recv command 0x46574c44
14,192,687 UART: [fwproc] Recv'd Img size: 114124 bytes
16,899,090 UART: ROM Fatal Error: 0x000B0034
16,902,494 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,021,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,256 UART:
2,165,797 UART: Running Caliptra ROM ...
2,166,883 UART:
2,167,032 UART: [state] CFI Enabled
2,167,996 UART: [state] LifecycleState = Unprovisioned
2,169,644 UART: [state] DebugLocked = No
2,170,661 UART: [state] WD Timer not started. Device not locked for debugging
2,173,114 UART: [kat] SHA2-256
2,173,771 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,774 UART: [kat] ++
2,177,236 UART: [kat] sha1
2,177,739 UART: [kat] SHA2-256
2,178,388 UART: [kat] SHA2-384
2,179,077 UART: [kat] SHA2-512-ACC
2,179,874 UART: [kat] ECC-384
4,096,666 UART: [kat] HMAC-384Kdf
4,108,042 UART: [kat] LMS
5,181,196 UART: [kat] --
5,185,682 UART: [cold-reset] ++
5,187,940 UART: [fht] FHT @ 0x50003400
5,199,513 UART: [idev] ++
5,200,241 UART: [idev] CDI.KEYID = 6
5,201,411 UART: [idev] SUBJECT.KEYID = 7
5,202,893 UART: [idev] UDS.KEYID = 0
5,220,269 UART: [idev] Erasing UDS.KEYID = 0
8,495,157 UART: [idev] Sha1 KeyId Algorithm
8,516,627 UART: [idev] --
8,521,051 UART: [ldev] ++
8,521,682 UART: [ldev] CDI.KEYID = 6
8,522,862 UART: [ldev] SUBJECT.KEYID = 5
8,524,344 UART: [ldev] AUTHORITY.KEYID = 7
8,525,898 UART: [ldev] FE.KEYID = 1
8,537,132 UART: [ldev] Erasing FE.KEYID = 1
11,831,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,921 UART: [ldev] --
14,197,103 UART: [fwproc] Wait for Commands...
14,198,706 UART: [fwproc] Recv command 0x46574c44
14,201,010 UART: [fwproc] Recv'd Img size: 114124 bytes
16,902,815 UART: ROM Fatal Error: 0x000B0034
16,906,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,020,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,730,328 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,021,114 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,725,752 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,033,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,177,967 UART:
2,178,376 UART: Running Caliptra ROM ...
2,179,464 UART:
2,179,615 UART: [state] CFI Enabled
2,180,519 UART: [state] LifecycleState = Unprovisioned
2,182,166 UART: [state] DebugLocked = No
2,183,194 UART: [state] WD Timer not started. Device not locked for debugging
2,185,671 UART: [kat] SHA2-256
2,186,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,360 UART: [kat] ++
2,189,809 UART: [kat] sha1
2,190,323 UART: [kat] SHA2-256
2,190,982 UART: [kat] SHA2-384
2,191,638 UART: [kat] SHA2-512-ACC
2,192,476 UART: [kat] ECC-384
2,949,481 UART: [kat] HMAC-384Kdf
2,972,770 UART: [kat] LMS
3,502,202 UART: [kat] --
3,506,113 UART: [cold-reset] ++
3,507,947 UART: [fht] FHT @ 0x50003400
3,518,454 UART: [idev] ++
3,519,018 UART: [idev] CDI.KEYID = 6
3,519,929 UART: [idev] SUBJECT.KEYID = 7
3,521,141 UART: [idev] UDS.KEYID = 0
3,544,840 UART: [idev] Erasing UDS.KEYID = 0
6,025,162 UART: [idev] Sha1 KeyId Algorithm
6,047,586 UART: [idev] --
6,050,809 UART: [ldev] ++
6,051,393 UART: [ldev] CDI.KEYID = 6
6,052,307 UART: [ldev] SUBJECT.KEYID = 5
6,053,475 UART: [ldev] AUTHORITY.KEYID = 7
6,054,786 UART: [ldev] FE.KEYID = 1
6,100,601 UART: [ldev] Erasing FE.KEYID = 1
8,600,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,953 UART: [ldev] --
10,391,190 UART: [fwproc] Wait for Commands...
10,394,312 UART: [fwproc] Recv command 0x46574c44
10,396,414 UART: [fwproc] Recv'd Img size: 114448 bytes
12,450,147 UART: ROM Fatal Error: 0x000B0034
12,453,273 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,021,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,202 UART:
2,165,589 UART: Running Caliptra ROM ...
2,166,758 UART:
2,166,929 UART: [state] CFI Enabled
2,167,891 UART: [state] LifecycleState = Unprovisioned
2,169,544 UART: [state] DebugLocked = No
2,170,665 UART: [state] WD Timer not started. Device not locked for debugging
2,173,337 UART: [kat] SHA2-256
2,174,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,038 UART: [kat] ++
2,177,492 UART: [kat] sha1
2,178,027 UART: [kat] SHA2-256
2,178,771 UART: [kat] SHA2-384
2,179,435 UART: [kat] SHA2-512-ACC
2,180,319 UART: [kat] ECC-384
2,945,089 UART: [kat] HMAC-384Kdf
2,971,883 UART: [kat] LMS
3,501,371 UART: [kat] --
3,506,087 UART: [cold-reset] ++
3,507,104 UART: [fht] FHT @ 0x50003400
3,518,518 UART: [idev] ++
3,519,083 UART: [idev] CDI.KEYID = 6
3,519,998 UART: [idev] SUBJECT.KEYID = 7
3,521,220 UART: [idev] UDS.KEYID = 0
3,543,032 UART: [idev] Erasing UDS.KEYID = 0
6,027,231 UART: [idev] Sha1 KeyId Algorithm
6,049,109 UART: [idev] --
6,053,390 UART: [ldev] ++
6,053,967 UART: [ldev] CDI.KEYID = 6
6,054,879 UART: [ldev] SUBJECT.KEYID = 5
6,056,043 UART: [ldev] AUTHORITY.KEYID = 7
6,057,280 UART: [ldev] FE.KEYID = 1
6,098,721 UART: [ldev] Erasing FE.KEYID = 1
8,602,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,688 UART: [ldev] --
10,410,250 UART: [fwproc] Wait for Commands...
10,412,664 UART: [fwproc] Recv command 0x46574c44
10,414,816 UART: [fwproc] Recv'd Img size: 114448 bytes
12,468,183 UART: ROM Fatal Error: 0x000B0034
12,471,268 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,022,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,236,433 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,021,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,249,445 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
2,021,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,539 UART:
2,166,917 UART: Running Caliptra ROM ...
2,168,079 UART:
2,168,253 UART: [state] CFI Enabled
2,169,212 UART: [state] LifecycleState = Unprovisioned
2,170,877 UART: [state] DebugLocked = No
2,171,983 UART: [state] WD Timer not started. Device not locked for debugging
2,174,456 UART: [kat] SHA2-256
2,175,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,136 UART: [kat] ++
2,178,586 UART: [kat] sha1
2,179,146 UART: [kat] SHA2-256
2,179,804 UART: [kat] SHA2-384
2,180,459 UART: [kat] SHA2-512-ACC
2,181,281 UART: [kat] ECC-384
3,277,565 UART: [kat] HMAC-384Kdf
3,290,332 UART: [kat] LMS
3,819,836 UART: [kat] --
3,824,524 UART: [cold-reset] ++
3,826,296 UART: [fht] FHT @ 0x50003400
3,838,450 UART: [idev] ++
3,839,043 UART: [idev] CDI.KEYID = 6
3,839,958 UART: [idev] SUBJECT.KEYID = 7
3,841,170 UART: [idev] UDS.KEYID = 0
3,859,299 UART: [idev] Erasing UDS.KEYID = 0
6,314,741 UART: [idev] Sha1 KeyId Algorithm
6,336,932 UART: [idev] --
6,339,785 UART: [ldev] ++
6,340,352 UART: [ldev] CDI.KEYID = 6
6,341,313 UART: [ldev] SUBJECT.KEYID = 5
6,342,469 UART: [ldev] AUTHORITY.KEYID = 7
6,343,693 UART: [ldev] FE.KEYID = 1
6,353,632 UART: [ldev] Erasing FE.KEYID = 1
8,832,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,103 UART: [ldev] --
10,624,503 UART: [fwproc] Wait for Commands...
10,626,766 UART: [fwproc] Recv command 0x46574c44
10,628,902 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,275 UART: ROM Fatal Error: 0x000B0034
12,681,408 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,028,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,172,403 UART:
2,172,813 UART: Running Caliptra ROM ...
2,173,983 UART:
2,174,174 UART: [state] CFI Enabled
2,175,130 UART: [state] LifecycleState = Unprovisioned
2,176,779 UART: [state] DebugLocked = No
2,177,883 UART: [state] WD Timer not started. Device not locked for debugging
2,180,348 UART: [kat] SHA2-256
2,181,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,022 UART: [kat] ++
2,184,475 UART: [kat] sha1
2,184,989 UART: [kat] SHA2-256
2,185,723 UART: [kat] SHA2-384
2,186,388 UART: [kat] SHA2-512-ACC
2,187,217 UART: [kat] ECC-384
3,280,854 UART: [kat] HMAC-384Kdf
3,292,860 UART: [kat] LMS
3,822,336 UART: [kat] --
3,827,082 UART: [cold-reset] ++
3,829,611 UART: [fht] FHT @ 0x50003400
3,841,508 UART: [idev] ++
3,842,067 UART: [idev] CDI.KEYID = 6
3,843,033 UART: [idev] SUBJECT.KEYID = 7
3,844,193 UART: [idev] UDS.KEYID = 0
3,861,355 UART: [idev] Erasing UDS.KEYID = 0
6,321,880 UART: [idev] Sha1 KeyId Algorithm
6,345,049 UART: [idev] --
6,349,038 UART: [ldev] ++
6,349,617 UART: [ldev] CDI.KEYID = 6
6,350,523 UART: [ldev] SUBJECT.KEYID = 5
6,351,683 UART: [ldev] AUTHORITY.KEYID = 7
6,352,910 UART: [ldev] FE.KEYID = 1
6,364,040 UART: [ldev] Erasing FE.KEYID = 1
8,838,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,573 UART: [ldev] --
10,627,549 UART: [fwproc] Wait for Commands...
10,629,057 UART: [fwproc] Recv command 0x46574c44
10,631,163 UART: [fwproc] Recv'd Img size: 114448 bytes
12,679,963 UART: ROM Fatal Error: 0x000B0034
12,683,094 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,021,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,466,194 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,025,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,757 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,032,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,176,684 UART:
2,177,083 UART: Running Caliptra ROM ...
2,178,171 UART:
2,178,329 UART: [state] CFI Enabled
2,179,299 UART: [state] LifecycleState = Unprovisioned
2,180,951 UART: [state] DebugLocked = No
2,181,976 UART: [state] WD Timer not started. Device not locked for debugging
2,184,450 UART: [kat] SHA2-256
2,185,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,115 UART: [kat] ++
2,188,580 UART: [kat] sha1
2,189,094 UART: [kat] SHA2-256
2,189,752 UART: [kat] SHA2-384
2,190,405 UART: [kat] SHA2-512-ACC
2,191,206 UART: [kat] ECC-384
2,948,475 UART: [kat] HMAC-384Kdf
2,973,391 UART: [kat] LMS
3,502,890 UART: [kat] --
3,506,654 UART: [cold-reset] ++
3,509,294 UART: [fht] FHT @ 0x50003400
3,521,301 UART: [idev] ++
3,521,867 UART: [idev] CDI.KEYID = 6
3,522,789 UART: [idev] SUBJECT.KEYID = 7
3,524,005 UART: [idev] UDS.KEYID = 0
3,545,119 UART: [idev] Erasing UDS.KEYID = 0
6,028,939 UART: [idev] Sha1 KeyId Algorithm
6,051,434 UART: [idev] --
6,055,965 UART: [ldev] ++
6,056,537 UART: [ldev] CDI.KEYID = 6
6,057,446 UART: [ldev] SUBJECT.KEYID = 5
6,058,663 UART: [ldev] AUTHORITY.KEYID = 7
6,059,896 UART: [ldev] FE.KEYID = 1
6,101,234 UART: [ldev] Erasing FE.KEYID = 1
8,603,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,158 UART: [ldev] --
10,392,017 UART: [fwproc] Wait for Commands...
10,393,791 UART: [fwproc] Recv command 0x46574c44
10,395,894 UART: [fwproc] Recv'd Img size: 114448 bytes
12,443,617 UART: ROM Fatal Error: 0x000B0034
12,446,691 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,037,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,182,020 UART:
2,182,423 UART: Running Caliptra ROM ...
2,183,589 UART:
2,183,758 UART: [state] CFI Enabled
2,184,674 UART: [state] LifecycleState = Unprovisioned
2,186,328 UART: [state] DebugLocked = No
2,187,459 UART: [state] WD Timer not started. Device not locked for debugging
2,189,933 UART: [kat] SHA2-256
2,190,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,193,614 UART: [kat] ++
2,194,065 UART: [kat] sha1
2,194,668 UART: [kat] SHA2-256
2,195,332 UART: [kat] SHA2-384
2,196,000 UART: [kat] SHA2-512-ACC
2,196,829 UART: [kat] ECC-384
2,949,210 UART: [kat] HMAC-384Kdf
2,971,808 UART: [kat] LMS
3,501,219 UART: [kat] --
3,505,472 UART: [cold-reset] ++
3,507,886 UART: [fht] FHT @ 0x50003400
3,518,860 UART: [idev] ++
3,519,432 UART: [idev] CDI.KEYID = 6
3,520,361 UART: [idev] SUBJECT.KEYID = 7
3,521,527 UART: [idev] UDS.KEYID = 0
3,545,121 UART: [idev] Erasing UDS.KEYID = 0
6,025,020 UART: [idev] Sha1 KeyId Algorithm
6,048,045 UART: [idev] --
6,050,690 UART: [ldev] ++
6,051,300 UART: [ldev] CDI.KEYID = 6
6,052,190 UART: [ldev] SUBJECT.KEYID = 5
6,053,354 UART: [ldev] AUTHORITY.KEYID = 7
6,054,645 UART: [ldev] FE.KEYID = 1
6,099,941 UART: [ldev] Erasing FE.KEYID = 1
8,603,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,250 UART: [ldev] --
10,414,603 UART: [fwproc] Wait for Commands...
10,417,619 UART: [fwproc] Recv command 0x46574c44
10,419,671 UART: [fwproc] Recv'd Img size: 114448 bytes
12,469,719 UART: ROM Fatal Error: 0x000B0034
12,472,848 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,024,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,252,294 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,030,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,275,874 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
2,021,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,016 UART:
2,166,417 UART: Running Caliptra ROM ...
2,167,497 UART:
2,167,647 UART: [state] CFI Enabled
2,168,630 UART: [state] LifecycleState = Unprovisioned
2,170,273 UART: [state] DebugLocked = No
2,171,296 UART: [state] WD Timer not started. Device not locked for debugging
2,173,769 UART: [kat] SHA2-256
2,174,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,441 UART: [kat] ++
2,177,884 UART: [kat] sha1
2,178,391 UART: [kat] SHA2-256
2,179,050 UART: [kat] SHA2-384
2,179,707 UART: [kat] SHA2-512-ACC
2,180,507 UART: [kat] ECC-384
3,283,941 UART: [kat] HMAC-384Kdf
3,296,015 UART: [kat] LMS
3,825,524 UART: [kat] --
3,829,348 UART: [cold-reset] ++
3,830,567 UART: [fht] FHT @ 0x50003400
3,840,080 UART: [idev] ++
3,840,651 UART: [idev] CDI.KEYID = 6
3,841,529 UART: [idev] SUBJECT.KEYID = 7
3,842,738 UART: [idev] UDS.KEYID = 0
3,858,769 UART: [idev] Erasing UDS.KEYID = 0
6,315,578 UART: [idev] Sha1 KeyId Algorithm
6,339,311 UART: [idev] --
6,342,766 UART: [ldev] ++
6,343,331 UART: [ldev] CDI.KEYID = 6
6,344,208 UART: [ldev] SUBJECT.KEYID = 5
6,345,420 UART: [ldev] AUTHORITY.KEYID = 7
6,346,648 UART: [ldev] FE.KEYID = 1
6,357,100 UART: [ldev] Erasing FE.KEYID = 1
8,834,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,268 UART: [ldev] --
10,623,756 UART: [fwproc] Wait for Commands...
10,626,175 UART: [fwproc] Recv command 0x46574c44
10,628,212 UART: [fwproc] Recv'd Img size: 114448 bytes
12,682,363 UART: ROM Fatal Error: 0x000B0034
12,685,500 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,020,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,594 UART:
2,166,163 UART: Running Caliptra ROM ...
2,167,333 UART:
2,167,511 UART: [state] CFI Enabled
2,168,475 UART: [state] LifecycleState = Unprovisioned
2,170,125 UART: [state] DebugLocked = No
2,171,225 UART: [state] WD Timer not started. Device not locked for debugging
2,173,692 UART: [kat] SHA2-256
2,174,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,364 UART: [kat] ++
2,177,815 UART: [kat] sha1
2,178,328 UART: [kat] SHA2-256
2,179,067 UART: [kat] SHA2-384
2,179,734 UART: [kat] SHA2-512-ACC
2,180,536 UART: [kat] ECC-384
3,280,939 UART: [kat] HMAC-384Kdf
3,294,304 UART: [kat] LMS
3,823,821 UART: [kat] --
3,828,458 UART: [cold-reset] ++
3,829,890 UART: [fht] FHT @ 0x50003400
3,840,053 UART: [idev] ++
3,840,613 UART: [idev] CDI.KEYID = 6
3,841,626 UART: [idev] SUBJECT.KEYID = 7
3,842,843 UART: [idev] UDS.KEYID = 0
3,857,139 UART: [idev] Erasing UDS.KEYID = 0
6,315,089 UART: [idev] Sha1 KeyId Algorithm
6,338,431 UART: [idev] --
6,342,454 UART: [ldev] ++
6,343,022 UART: [ldev] CDI.KEYID = 6
6,343,906 UART: [ldev] SUBJECT.KEYID = 5
6,345,117 UART: [ldev] AUTHORITY.KEYID = 7
6,346,343 UART: [ldev] FE.KEYID = 1
6,355,954 UART: [ldev] Erasing FE.KEYID = 1
8,828,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,204 UART: [ldev] --
10,619,134 UART: [fwproc] Wait for Commands...
10,621,017 UART: [fwproc] Recv command 0x46574c44
10,623,112 UART: [fwproc] Recv'd Img size: 114448 bytes
12,666,909 UART: ROM Fatal Error: 0x000B0034
12,670,027 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,303 writing to cptra_bootfsm_go
2,023,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,453,976 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
2,021,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,465,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,782 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,281,005 UART: [fwproc] Recv command 0x46574c44
1,281,738 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,268 UART: ROM Fatal Error: 0x000B0034
1,330,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,829 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,180,997 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,888 UART: [ldev] --
1,280,328 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,662 UART: ROM Fatal Error: 0x000B0034
1,330,819 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,076 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,208,950 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,599 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,207 UART: ROM Fatal Error: 0x000B0034
1,332,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,713 UART: [ldev] --
1,282,161 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,643 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,679 UART: ROM Fatal Error: 0x000B0034
1,331,836 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,349 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,802 UART: [fwproc] Wait for Commands...
1,281,469 UART: [fwproc] Recv command 0x46574c44
1,282,202 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,409 UART: ROM Fatal Error: 0x000B0034
1,330,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,604 UART: [state] LifecycleState = Unprovisioned
85,259 UART: [state] DebugLocked = No
85,783 UART: [state] WD Timer not started. Device not locked for debugging
87,012 UART: [kat] SHA2-256
890,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,691 UART: [kat] ++
894,843 UART: [kat] sha1
899,151 UART: [kat] SHA2-256
901,091 UART: [kat] SHA2-384
903,684 UART: [kat] SHA2-512-ACC
905,585 UART: [kat] ECC-384
915,490 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,683 UART: [fht] FHT @ 0x50003400
1,172,239 UART: [idev] ++
1,172,407 UART: [idev] CDI.KEYID = 6
1,172,768 UART: [idev] SUBJECT.KEYID = 7
1,173,193 UART: [idev] UDS.KEYID = 0
1,180,945 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,176 UART: [ldev] ++
1,208,344 UART: [ldev] CDI.KEYID = 6
1,208,708 UART: [ldev] SUBJECT.KEYID = 5
1,209,135 UART: [ldev] AUTHORITY.KEYID = 7
1,209,598 UART: [ldev] FE.KEYID = 1
1,214,672 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,554 UART: [ldev] --
1,279,884 UART: [fwproc] Wait for Commands...
1,280,691 UART: [fwproc] Recv command 0x46574c44
1,281,424 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,732 UART: ROM Fatal Error: 0x000B0034
1,329,889 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,418 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,529 UART: [kat] LMS
1,168,841 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,824 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,181,502 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,646 UART: [idev] --
1,208,539 UART: [ldev] ++
1,208,707 UART: [ldev] CDI.KEYID = 6
1,209,071 UART: [ldev] SUBJECT.KEYID = 5
1,209,498 UART: [ldev] AUTHORITY.KEYID = 7
1,209,961 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,189 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,338 UART: [fwproc] Recv command 0x46574c44
1,283,071 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,945 UART: ROM Fatal Error: 0x000B0034
1,331,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,989 UART: [kat] HMAC-384Kdf
921,671 UART: [kat] LMS
1,169,983 UART: [kat] --
1,170,726 UART: [cold-reset] ++
1,171,214 UART: [fht] FHT @ 0x50003400
1,173,860 UART: [idev] ++
1,174,028 UART: [idev] CDI.KEYID = 6
1,174,389 UART: [idev] SUBJECT.KEYID = 7
1,174,814 UART: [idev] UDS.KEYID = 0
1,183,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,878 UART: [idev] Sha1 KeyId Algorithm
1,208,738 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,501 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,609 UART: ROM Fatal Error: 0x000B0034
1,331,766 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,165 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,164 UART: [kat] LMS
1,168,476 UART: [kat] --
1,169,273 UART: [cold-reset] ++
1,169,701 UART: [fht] FHT @ 0x50003400
1,172,371 UART: [idev] ++
1,172,539 UART: [idev] CDI.KEYID = 6
1,172,900 UART: [idev] SUBJECT.KEYID = 7
1,173,325 UART: [idev] UDS.KEYID = 0
1,181,419 UART: [idev] Erasing UDS.KEYID = 0
1,197,947 UART: [idev] Sha1 KeyId Algorithm
1,206,769 UART: [idev] --
1,207,594 UART: [ldev] ++
1,207,762 UART: [ldev] CDI.KEYID = 6
1,208,126 UART: [ldev] SUBJECT.KEYID = 5
1,208,553 UART: [ldev] AUTHORITY.KEYID = 7
1,209,016 UART: [ldev] FE.KEYID = 1
1,214,280 UART: [ldev] Erasing FE.KEYID = 1
1,240,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,090 UART: [ldev] --
1,279,604 UART: [fwproc] Wait for Commands...
1,280,407 UART: [fwproc] Recv command 0x46574c44
1,281,140 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,432 UART: ROM Fatal Error: 0x000B0034
1,330,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,083 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,263 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,600 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,060 UART: [ldev] --
1,280,570 UART: [fwproc] Wait for Commands...
1,281,201 UART: [fwproc] Recv command 0x46574c44
1,281,934 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,428 UART: ROM Fatal Error: 0x000B0034
1,330,585 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,106 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,012 UART: [kat] ++
896,164 UART: [kat] sha1
900,568 UART: [kat] SHA2-256
902,508 UART: [kat] SHA2-384
905,477 UART: [kat] SHA2-512-ACC
907,378 UART: [kat] ECC-384
917,237 UART: [kat] HMAC-384Kdf
921,875 UART: [kat] LMS
1,170,187 UART: [kat] --
1,170,942 UART: [cold-reset] ++
1,171,478 UART: [fht] FHT @ 0x50003400
1,174,096 UART: [idev] ++
1,174,264 UART: [idev] CDI.KEYID = 6
1,174,625 UART: [idev] SUBJECT.KEYID = 7
1,175,050 UART: [idev] UDS.KEYID = 0
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,319 UART: [ldev] SUBJECT.KEYID = 5
1,210,746 UART: [ldev] AUTHORITY.KEYID = 7
1,211,209 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,217 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,793 UART: ROM Fatal Error: 0x000B0034
1,331,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,381 UART: [kat] LMS
1,169,693 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,182,920 UART: [idev] Erasing UDS.KEYID = 0
1,200,102 UART: [idev] Sha1 KeyId Algorithm
1,208,982 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,282,037 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,529 UART: ROM Fatal Error: 0x000B0034
1,332,686 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
5,324 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,139 UART:
192,507 UART: Running Caliptra ROM ...
193,693 UART:
193,851 UART: [state] CFI Enabled
266,495 UART: [state] LifecycleState = Manufacturing
269,084 UART: [state] DebugLocked = No
270,199 UART: [state] WD Timer not started. Device not locked for debugging
274,051 UART: [kat] SHA2-256
455,941 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,497 UART: [kat] ++
468,023 UART: [kat] sha1
478,477 UART: [kat] SHA2-256
481,486 UART: [kat] SHA2-384
486,809 UART: [kat] SHA2-512-ACC
489,410 UART: [kat] ECC-384
3,777,753 UART: [kat] HMAC-384Kdf
3,801,989 UART: [kat] LMS
4,875,154 UART: [kat] --
4,877,892 UART: [cold-reset] ++
4,879,028 UART: [fht] FHT @ 0x50003400
4,890,063 UART: [idev] ++
4,890,737 UART: [idev] CDI.KEYID = 6
4,891,964 UART: [idev] SUBJECT.KEYID = 7
4,893,118 UART: [idev] UDS.KEYID = 0
4,928,539 UART: [idev] Erasing UDS.KEYID = 0
8,241,827 UART: [idev] Sha1 KeyId Algorithm
8,264,310 UART: [idev] --
8,267,822 UART: [ldev] ++
8,268,692 UART: [ldev] CDI.KEYID = 6
8,269,646 UART: [ldev] SUBJECT.KEYID = 5
8,270,861 UART: [ldev] AUTHORITY.KEYID = 7
8,272,086 UART: [ldev] FE.KEYID = 1
8,315,792 UART: [ldev] Erasing FE.KEYID = 1
11,652,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,279 UART: [ldev] --
14,038,582 UART: [fwproc] Wait for Commands...
14,041,388 UART: [fwproc] Recv command 0x46574c44
14,043,707 UART: [fwproc] Recv'd Img size: 114124 bytes
17,020,574 UART: ROM Fatal Error: 0x000B0025
17,023,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
5,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,807,260 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
7,065 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,548 UART:
192,952 UART: Running Caliptra ROM ...
194,046 UART:
603,627 UART: [state] CFI Enabled
618,543 UART: [state] LifecycleState = Manufacturing
620,923 UART: [state] DebugLocked = No
623,483 UART: [state] WD Timer not started. Device not locked for debugging
627,442 UART: [kat] SHA2-256
809,419 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,929 UART: [kat] ++
821,570 UART: [kat] sha1
831,424 UART: [kat] SHA2-256
834,434 UART: [kat] SHA2-384
841,108 UART: [kat] SHA2-512-ACC
843,718 UART: [kat] ECC-384
4,102,063 UART: [kat] HMAC-384Kdf
4,114,360 UART: [kat] LMS
5,187,495 UART: [kat] --
5,192,000 UART: [cold-reset] ++
5,194,430 UART: [fht] FHT @ 0x50003400
5,206,334 UART: [idev] ++
5,207,049 UART: [idev] CDI.KEYID = 6
5,208,239 UART: [idev] SUBJECT.KEYID = 7
5,209,669 UART: [idev] UDS.KEYID = 0
5,224,526 UART: [idev] Erasing UDS.KEYID = 0
8,498,225 UART: [idev] Sha1 KeyId Algorithm
8,519,516 UART: [idev] --
8,523,395 UART: [ldev] ++
8,523,963 UART: [ldev] CDI.KEYID = 6
8,525,192 UART: [ldev] SUBJECT.KEYID = 5
8,526,670 UART: [ldev] AUTHORITY.KEYID = 7
8,528,225 UART: [ldev] FE.KEYID = 1
8,540,535 UART: [ldev] Erasing FE.KEYID = 1
11,829,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,994 UART: [ldev] --
14,195,389 UART: [fwproc] Wait for Commands...
14,198,417 UART: [fwproc] Recv command 0x46574c44
14,200,731 UART: [fwproc] Recv'd Img size: 114124 bytes
17,172,087 UART: ROM Fatal Error: 0x000B0025
17,175,449 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
5,002 writing to cptra_bootfsm_go
8,022 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,990,436 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
5,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,199 UART:
192,589 UART: Running Caliptra ROM ...
193,716 UART:
193,867 UART: [state] CFI Enabled
265,263 UART: [state] LifecycleState = Manufacturing
267,135 UART: [state] DebugLocked = No
268,786 UART: [state] WD Timer not started. Device not locked for debugging
272,395 UART: [kat] SHA2-256
451,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,091 UART: [kat] ++
463,646 UART: [kat] sha1
475,448 UART: [kat] SHA2-256
478,506 UART: [kat] SHA2-384
483,639 UART: [kat] SHA2-512-ACC
486,585 UART: [kat] ECC-384
2,948,645 UART: [kat] HMAC-384Kdf
2,973,138 UART: [kat] LMS
3,502,612 UART: [kat] --
3,507,499 UART: [cold-reset] ++
3,508,582 UART: [fht] FHT @ 0x50003400
3,519,464 UART: [idev] ++
3,520,029 UART: [idev] CDI.KEYID = 6
3,520,943 UART: [idev] SUBJECT.KEYID = 7
3,522,161 UART: [idev] UDS.KEYID = 0
3,543,487 UART: [idev] Erasing UDS.KEYID = 0
6,025,232 UART: [idev] Sha1 KeyId Algorithm
6,048,251 UART: [idev] --
6,051,862 UART: [ldev] ++
6,052,465 UART: [ldev] CDI.KEYID = 6
6,053,376 UART: [ldev] SUBJECT.KEYID = 5
6,054,547 UART: [ldev] AUTHORITY.KEYID = 7
6,055,787 UART: [ldev] FE.KEYID = 1
6,099,898 UART: [ldev] Erasing FE.KEYID = 1
8,604,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,328 UART: [ldev] --
10,411,512 UART: [fwproc] Wait for Commands...
10,413,065 UART: [fwproc] Recv command 0x46574c44
10,415,112 UART: [fwproc] Recv'd Img size: 114448 bytes
12,738,906 UART: ROM Fatal Error: 0x000B0025
12,742,032 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
6,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,490,027 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
5,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,332 UART:
192,712 UART: Running Caliptra ROM ...
193,819 UART:
603,341 UART: [state] CFI Enabled
618,099 UART: [state] LifecycleState = Manufacturing
620,001 UART: [state] DebugLocked = No
622,679 UART: [state] WD Timer not started. Device not locked for debugging
627,312 UART: [kat] SHA2-256
806,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,008 UART: [kat] ++
818,543 UART: [kat] sha1
829,372 UART: [kat] SHA2-256
832,423 UART: [kat] SHA2-384
838,292 UART: [kat] SHA2-512-ACC
841,236 UART: [kat] ECC-384
3,283,392 UART: [kat] HMAC-384Kdf
3,296,665 UART: [kat] LMS
3,826,141 UART: [kat] --
3,828,424 UART: [cold-reset] ++
3,830,841 UART: [fht] FHT @ 0x50003400
3,841,980 UART: [idev] ++
3,842,550 UART: [idev] CDI.KEYID = 6
3,843,431 UART: [idev] SUBJECT.KEYID = 7
3,844,643 UART: [idev] UDS.KEYID = 0
3,862,475 UART: [idev] Erasing UDS.KEYID = 0
6,320,348 UART: [idev] Sha1 KeyId Algorithm
6,341,653 UART: [idev] --
6,346,726 UART: [ldev] ++
6,347,494 UART: [ldev] CDI.KEYID = 6
6,348,413 UART: [ldev] SUBJECT.KEYID = 5
6,349,521 UART: [ldev] AUTHORITY.KEYID = 7
6,350,695 UART: [ldev] FE.KEYID = 1
6,362,905 UART: [ldev] Erasing FE.KEYID = 1
8,837,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,840 UART: [ldev] --
10,630,591 UART: [fwproc] Wait for Commands...
10,632,644 UART: [fwproc] Recv command 0x46574c44
10,634,685 UART: [fwproc] Recv'd Img size: 114448 bytes
12,961,204 UART: ROM Fatal Error: 0x000B0025
12,964,329 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
6,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,722,591 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,960 writing to cptra_bootfsm_go
6,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,173 UART:
193,555 UART: Running Caliptra ROM ...
194,726 UART:
194,886 UART: [state] CFI Enabled
264,118 UART: [state] LifecycleState = Manufacturing
266,036 UART: [state] DebugLocked = No
267,855 UART: [state] WD Timer not started. Device not locked for debugging
271,861 UART: [kat] SHA2-256
451,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,565 UART: [kat] ++
463,102 UART: [kat] sha1
474,636 UART: [kat] SHA2-256
477,698 UART: [kat] SHA2-384
483,306 UART: [kat] SHA2-512-ACC
486,280 UART: [kat] ECC-384
2,949,120 UART: [kat] HMAC-384Kdf
2,973,682 UART: [kat] LMS
3,503,147 UART: [kat] --
3,508,924 UART: [cold-reset] ++
3,511,132 UART: [fht] FHT @ 0x50003400
3,523,599 UART: [idev] ++
3,524,198 UART: [idev] CDI.KEYID = 6
3,525,116 UART: [idev] SUBJECT.KEYID = 7
3,526,302 UART: [idev] UDS.KEYID = 0
3,546,064 UART: [idev] Erasing UDS.KEYID = 0
6,026,082 UART: [idev] Sha1 KeyId Algorithm
6,048,888 UART: [idev] --
6,052,620 UART: [ldev] ++
6,053,189 UART: [ldev] CDI.KEYID = 6
6,054,075 UART: [ldev] SUBJECT.KEYID = 5
6,055,294 UART: [ldev] AUTHORITY.KEYID = 7
6,056,528 UART: [ldev] FE.KEYID = 1
6,100,556 UART: [ldev] Erasing FE.KEYID = 1
8,608,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,783 UART: [ldev] --
10,415,078 UART: [fwproc] Wait for Commands...
10,417,993 UART: [fwproc] Recv command 0x46574c44
10,420,089 UART: [fwproc] Recv'd Img size: 114448 bytes
12,742,039 UART: ROM Fatal Error: 0x000B0025
12,745,171 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
6,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,480,570 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
6,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,518 UART:
192,916 UART: Running Caliptra ROM ...
194,091 UART:
603,640 UART: [state] CFI Enabled
619,969 UART: [state] LifecycleState = Manufacturing
621,858 UART: [state] DebugLocked = No
624,206 UART: [state] WD Timer not started. Device not locked for debugging
628,837 UART: [kat] SHA2-256
807,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,513 UART: [kat] ++
820,056 UART: [kat] sha1
830,891 UART: [kat] SHA2-256
833,917 UART: [kat] SHA2-384
839,953 UART: [kat] SHA2-512-ACC
842,939 UART: [kat] ECC-384
3,283,502 UART: [kat] HMAC-384Kdf
3,294,964 UART: [kat] LMS
3,824,473 UART: [kat] --
3,828,272 UART: [cold-reset] ++
3,830,472 UART: [fht] FHT @ 0x50003400
3,840,797 UART: [idev] ++
3,841,359 UART: [idev] CDI.KEYID = 6
3,842,325 UART: [idev] SUBJECT.KEYID = 7
3,843,482 UART: [idev] UDS.KEYID = 0
3,859,358 UART: [idev] Erasing UDS.KEYID = 0
6,316,259 UART: [idev] Sha1 KeyId Algorithm
6,339,985 UART: [idev] --
6,344,113 UART: [ldev] ++
6,344,710 UART: [ldev] CDI.KEYID = 6
6,345,623 UART: [ldev] SUBJECT.KEYID = 5
6,346,783 UART: [ldev] AUTHORITY.KEYID = 7
6,348,067 UART: [ldev] FE.KEYID = 1
6,357,580 UART: [ldev] Erasing FE.KEYID = 1
8,827,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,582 UART: [ldev] --
10,621,466 UART: [fwproc] Wait for Commands...
10,623,990 UART: [fwproc] Recv command 0x46574c44
10,626,087 UART: [fwproc] Recv'd Img size: 114448 bytes
12,948,067 UART: ROM Fatal Error: 0x000B0025
12,951,200 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
5,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,730,956 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Manufacturing
85,791 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,647 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,216,264 UART: [ldev] Erasing FE.KEYID = 1
1,242,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,260 UART: [ldev] --
1,281,704 UART: [fwproc] Wait for Commands...
1,282,505 UART: [fwproc] Recv command 0x46574c44
1,283,238 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,159 UART: ROM Fatal Error: 0x000B0025
1,575,316 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,747 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Manufacturing
86,266 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,464 UART: [kat] SHA2-256
902,404 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,550 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,764 UART: [idev] ++
1,173,932 UART: [idev] CDI.KEYID = 6
1,174,293 UART: [idev] SUBJECT.KEYID = 7
1,174,718 UART: [idev] UDS.KEYID = 0
1,182,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,734 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,282,019 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,276 UART: ROM Fatal Error: 0x000B0025
1,576,433 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,178 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Manufacturing
85,625 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,430 UART: [kat] LMS
1,168,742 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,804 UART: [ldev] ++
1,208,972 UART: [ldev] CDI.KEYID = 6
1,209,336 UART: [ldev] SUBJECT.KEYID = 5
1,209,763 UART: [ldev] AUTHORITY.KEYID = 7
1,210,226 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,242,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,045 UART: ROM Fatal Error: 0x000B0025
1,574,202 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,567 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Manufacturing
86,330 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,344 UART: [kat] SHA2-256
902,284 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,887 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,932 UART: [cold-reset] ++
1,171,264 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,215,731 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,515 UART: [fwproc] Wait for Commands...
1,282,160 UART: [fwproc] Recv command 0x46574c44
1,282,893 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,330 UART: ROM Fatal Error: 0x000B0025
1,575,487 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,920 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Manufacturing
86,217 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,892 UART: [kat] HMAC-384Kdf
921,480 UART: [kat] LMS
1,169,792 UART: [kat] --
1,170,877 UART: [cold-reset] ++
1,171,213 UART: [fht] FHT @ 0x50003400
1,173,991 UART: [idev] ++
1,174,159 UART: [idev] CDI.KEYID = 6
1,174,520 UART: [idev] SUBJECT.KEYID = 7
1,174,945 UART: [idev] UDS.KEYID = 0
1,182,895 UART: [idev] Erasing UDS.KEYID = 0
1,199,969 UART: [idev] Sha1 KeyId Algorithm
1,209,047 UART: [idev] --
1,209,994 UART: [ldev] ++
1,210,162 UART: [ldev] CDI.KEYID = 6
1,210,526 UART: [ldev] SUBJECT.KEYID = 5
1,210,953 UART: [ldev] AUTHORITY.KEYID = 7
1,211,416 UART: [ldev] FE.KEYID = 1
1,216,746 UART: [ldev] Erasing FE.KEYID = 1
1,242,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,816 UART: [ldev] --
1,282,332 UART: [fwproc] Wait for Commands...
1,283,023 UART: [fwproc] Recv command 0x46574c44
1,283,756 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,075 UART: ROM Fatal Error: 0x000B0025
1,576,232 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,859 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Manufacturing
86,234 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,918 UART: ROM Fatal Error: 0x000B0025
1,576,075 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,288 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,629 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,211 UART:
192,586 UART: Running Caliptra ROM ...
193,748 UART:
193,918 UART: [state] CFI Enabled
263,253 UART: [state] LifecycleState = Manufacturing
265,665 UART: [state] DebugLocked = No
268,586 UART: [state] WD Timer not started. Device not locked for debugging
272,488 UART: [kat] SHA2-256
454,430 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,940 UART: [kat] ++
466,444 UART: [kat] sha1
476,240 UART: [kat] SHA2-256
479,242 UART: [kat] SHA2-384
484,633 UART: [kat] SHA2-512-ACC
487,295 UART: [kat] ECC-384
3,762,541 UART: [kat] HMAC-384Kdf
3,790,288 UART: [kat] LMS
4,863,485 UART: [kat] --
4,867,748 UART: [cold-reset] ++
4,870,181 UART: [fht] FHT @ 0x50003400
4,881,272 UART: [idev] ++
4,881,987 UART: [idev] CDI.KEYID = 6
4,883,172 UART: [idev] SUBJECT.KEYID = 7
4,884,333 UART: [idev] UDS.KEYID = 0
4,915,831 UART: [idev] Erasing UDS.KEYID = 0
8,226,663 UART: [idev] Sha1 KeyId Algorithm
8,249,081 UART: [idev] --
8,252,621 UART: [ldev] ++
8,253,196 UART: [ldev] CDI.KEYID = 6
8,254,436 UART: [ldev] SUBJECT.KEYID = 5
8,255,605 UART: [ldev] AUTHORITY.KEYID = 7
8,256,699 UART: [ldev] FE.KEYID = 1
8,293,353 UART: [ldev] Erasing FE.KEYID = 1
11,630,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,939,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,955,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,971,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,987,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,008,229 UART: [ldev] --
14,012,927 UART: [fwproc] Wait for Commands...
14,015,726 UART: [fwproc] Recv command 0x46574c44
14,018,045 UART: [fwproc] Recv'd Img size: 114124 bytes
16,996,285 UART: ROM Fatal Error: 0x000B0027
16,999,688 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
5,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,805,724 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
6,399 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,728 UART:
193,104 UART: Running Caliptra ROM ...
194,177 UART:
603,755 UART: [state] CFI Enabled
618,531 UART: [state] LifecycleState = Manufacturing
620,911 UART: [state] DebugLocked = No
623,612 UART: [state] WD Timer not started. Device not locked for debugging
628,008 UART: [kat] SHA2-256
810,038 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,536 UART: [kat] ++
822,037 UART: [kat] sha1
833,777 UART: [kat] SHA2-256
836,837 UART: [kat] SHA2-384
841,994 UART: [kat] SHA2-512-ACC
844,601 UART: [kat] ECC-384
4,102,651 UART: [kat] HMAC-384Kdf
4,114,641 UART: [kat] LMS
5,187,797 UART: [kat] --
5,191,886 UART: [cold-reset] ++
5,193,280 UART: [fht] FHT @ 0x50003400
5,205,998 UART: [idev] ++
5,206,666 UART: [idev] CDI.KEYID = 6
5,207,896 UART: [idev] SUBJECT.KEYID = 7
5,209,327 UART: [idev] UDS.KEYID = 0
5,224,992 UART: [idev] Erasing UDS.KEYID = 0
8,494,598 UART: [idev] Sha1 KeyId Algorithm
8,516,110 UART: [idev] --
8,520,129 UART: [ldev] ++
8,520,692 UART: [ldev] CDI.KEYID = 6
8,521,932 UART: [ldev] SUBJECT.KEYID = 5
8,523,366 UART: [ldev] AUTHORITY.KEYID = 7
8,524,848 UART: [ldev] FE.KEYID = 1
8,536,374 UART: [ldev] Erasing FE.KEYID = 1
11,829,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,671 UART: [ldev] --
14,195,441 UART: [fwproc] Wait for Commands...
14,197,928 UART: [fwproc] Recv command 0x46574c44
14,200,239 UART: [fwproc] Recv'd Img size: 114124 bytes
17,177,241 UART: ROM Fatal Error: 0x000B0027
17,180,643 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
5,937 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,993,598 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
5,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,308 UART:
192,676 UART: Running Caliptra ROM ...
193,851 UART:
194,001 UART: [state] CFI Enabled
264,120 UART: [state] LifecycleState = Manufacturing
266,005 UART: [state] DebugLocked = No
268,017 UART: [state] WD Timer not started. Device not locked for debugging
272,397 UART: [kat] SHA2-256
451,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,070 UART: [kat] ++
463,764 UART: [kat] sha1
475,407 UART: [kat] SHA2-256
478,414 UART: [kat] SHA2-384
483,957 UART: [kat] SHA2-512-ACC
486,942 UART: [kat] ECC-384
2,962,156 UART: [kat] HMAC-384Kdf
2,985,481 UART: [kat] LMS
3,514,944 UART: [kat] --
3,519,805 UART: [cold-reset] ++
3,521,086 UART: [fht] FHT @ 0x50003400
3,533,261 UART: [idev] ++
3,533,833 UART: [idev] CDI.KEYID = 6
3,534,741 UART: [idev] SUBJECT.KEYID = 7
3,535,959 UART: [idev] UDS.KEYID = 0
3,556,768 UART: [idev] Erasing UDS.KEYID = 0
6,039,503 UART: [idev] Sha1 KeyId Algorithm
6,062,025 UART: [idev] --
6,066,732 UART: [ldev] ++
6,067,339 UART: [ldev] CDI.KEYID = 6
6,068,234 UART: [ldev] SUBJECT.KEYID = 5
6,069,398 UART: [ldev] AUTHORITY.KEYID = 7
6,070,634 UART: [ldev] FE.KEYID = 1
6,114,390 UART: [ldev] Erasing FE.KEYID = 1
8,615,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,382 UART: [ldev] --
10,409,167 UART: [fwproc] Wait for Commands...
10,411,864 UART: [fwproc] Recv command 0x46574c44
10,413,958 UART: [fwproc] Recv'd Img size: 114448 bytes
12,737,690 UART: ROM Fatal Error: 0x000B0027
12,740,816 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
5,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,505,892 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,558 UART:
192,946 UART: Running Caliptra ROM ...
194,119 UART:
603,787 UART: [state] CFI Enabled
615,360 UART: [state] LifecycleState = Manufacturing
617,202 UART: [state] DebugLocked = No
619,763 UART: [state] WD Timer not started. Device not locked for debugging
623,853 UART: [kat] SHA2-256
802,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,563 UART: [kat] ++
815,089 UART: [kat] sha1
826,628 UART: [kat] SHA2-256
829,637 UART: [kat] SHA2-384
835,723 UART: [kat] SHA2-512-ACC
838,707 UART: [kat] ECC-384
3,281,613 UART: [kat] HMAC-384Kdf
3,293,434 UART: [kat] LMS
3,822,950 UART: [kat] --
3,825,649 UART: [cold-reset] ++
3,826,980 UART: [fht] FHT @ 0x50003400
3,838,293 UART: [idev] ++
3,838,905 UART: [idev] CDI.KEYID = 6
3,839,799 UART: [idev] SUBJECT.KEYID = 7
3,841,011 UART: [idev] UDS.KEYID = 0
3,855,096 UART: [idev] Erasing UDS.KEYID = 0
6,309,078 UART: [idev] Sha1 KeyId Algorithm
6,333,259 UART: [idev] --
6,336,177 UART: [ldev] ++
6,336,743 UART: [ldev] CDI.KEYID = 6
6,337,653 UART: [ldev] SUBJECT.KEYID = 5
6,338,865 UART: [ldev] AUTHORITY.KEYID = 7
6,340,094 UART: [ldev] FE.KEYID = 1
6,350,848 UART: [ldev] Erasing FE.KEYID = 1
8,822,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,338 UART: [ldev] --
10,612,142 UART: [fwproc] Wait for Commands...
10,613,889 UART: [fwproc] Recv command 0x46574c44
10,615,929 UART: [fwproc] Recv'd Img size: 114448 bytes
12,943,730 UART: ROM Fatal Error: 0x000B0027
12,946,813 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,234 writing to cptra_bootfsm_go
7,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,719,442 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
5,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,014 UART:
192,400 UART: Running Caliptra ROM ...
193,573 UART:
193,728 UART: [state] CFI Enabled
265,403 UART: [state] LifecycleState = Manufacturing
267,273 UART: [state] DebugLocked = No
268,712 UART: [state] WD Timer not started. Device not locked for debugging
271,725 UART: [kat] SHA2-256
450,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,398 UART: [kat] ++
462,928 UART: [kat] sha1
473,379 UART: [kat] SHA2-256
476,384 UART: [kat] SHA2-384
483,006 UART: [kat] SHA2-512-ACC
485,945 UART: [kat] ECC-384
2,949,130 UART: [kat] HMAC-384Kdf
2,973,053 UART: [kat] LMS
3,502,501 UART: [kat] --
3,509,308 UART: [cold-reset] ++
3,510,495 UART: [fht] FHT @ 0x50003400
3,521,636 UART: [idev] ++
3,522,198 UART: [idev] CDI.KEYID = 6
3,523,161 UART: [idev] SUBJECT.KEYID = 7
3,524,373 UART: [idev] UDS.KEYID = 0
3,545,264 UART: [idev] Erasing UDS.KEYID = 0
6,027,809 UART: [idev] Sha1 KeyId Algorithm
6,049,916 UART: [idev] --
6,054,236 UART: [ldev] ++
6,054,806 UART: [ldev] CDI.KEYID = 6
6,055,720 UART: [ldev] SUBJECT.KEYID = 5
6,056,883 UART: [ldev] AUTHORITY.KEYID = 7
6,058,117 UART: [ldev] FE.KEYID = 1
6,102,868 UART: [ldev] Erasing FE.KEYID = 1
8,607,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,059 UART: [ldev] --
10,416,190 UART: [fwproc] Wait for Commands...
10,418,069 UART: [fwproc] Recv command 0x46574c44
10,420,126 UART: [fwproc] Recv'd Img size: 114448 bytes
12,737,911 UART: ROM Fatal Error: 0x000B0027
12,741,034 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
5,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,157 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
5,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,239 UART:
192,623 UART: Running Caliptra ROM ...
193,728 UART:
603,430 UART: [state] CFI Enabled
613,421 UART: [state] LifecycleState = Manufacturing
615,345 UART: [state] DebugLocked = No
617,153 UART: [state] WD Timer not started. Device not locked for debugging
620,376 UART: [kat] SHA2-256
799,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,071 UART: [kat] ++
811,528 UART: [kat] sha1
822,830 UART: [kat] SHA2-256
825,888 UART: [kat] SHA2-384
832,288 UART: [kat] SHA2-512-ACC
835,224 UART: [kat] ECC-384
3,277,999 UART: [kat] HMAC-384Kdf
3,290,390 UART: [kat] LMS
3,819,835 UART: [kat] --
3,825,281 UART: [cold-reset] ++
3,826,997 UART: [fht] FHT @ 0x50003400
3,838,615 UART: [idev] ++
3,839,173 UART: [idev] CDI.KEYID = 6
3,840,132 UART: [idev] SUBJECT.KEYID = 7
3,841,286 UART: [idev] UDS.KEYID = 0
3,859,958 UART: [idev] Erasing UDS.KEYID = 0
6,320,739 UART: [idev] Sha1 KeyId Algorithm
6,343,046 UART: [idev] --
6,346,439 UART: [ldev] ++
6,347,018 UART: [ldev] CDI.KEYID = 6
6,347,929 UART: [ldev] SUBJECT.KEYID = 5
6,349,153 UART: [ldev] AUTHORITY.KEYID = 7
6,350,381 UART: [ldev] FE.KEYID = 1
6,362,373 UART: [ldev] Erasing FE.KEYID = 1
8,836,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,591 UART: [ldev] --
10,628,601 UART: [fwproc] Wait for Commands...
10,631,831 UART: [fwproc] Recv command 0x46574c44
10,633,889 UART: [fwproc] Recv'd Img size: 114448 bytes
12,954,025 UART: ROM Fatal Error: 0x000B0027
12,957,151 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
6,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,735,587 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Manufacturing
85,573 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,939 UART: [kat] ++
895,091 UART: [kat] sha1
899,237 UART: [kat] SHA2-256
901,177 UART: [kat] SHA2-384
903,878 UART: [kat] SHA2-512-ACC
905,779 UART: [kat] ECC-384
915,508 UART: [kat] HMAC-384Kdf
919,884 UART: [kat] LMS
1,168,196 UART: [kat] --
1,169,261 UART: [cold-reset] ++
1,169,649 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,997 UART: [idev] --
1,207,884 UART: [ldev] ++
1,208,052 UART: [ldev] CDI.KEYID = 6
1,208,416 UART: [ldev] SUBJECT.KEYID = 5
1,208,843 UART: [ldev] AUTHORITY.KEYID = 7
1,209,306 UART: [ldev] FE.KEYID = 1
1,214,606 UART: [ldev] Erasing FE.KEYID = 1
1,240,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,122 UART: [ldev] --
1,279,628 UART: [fwproc] Wait for Commands...
1,280,389 UART: [fwproc] Recv command 0x46574c44
1,281,122 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,019 UART: ROM Fatal Error: 0x000B0027
1,573,176 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,765 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Manufacturing
86,232 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,854 UART: ROM Fatal Error: 0x000B0027
1,576,011 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Manufacturing
85,827 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,169,451 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,677 UART: [idev] ++
1,172,845 UART: [idev] CDI.KEYID = 6
1,173,206 UART: [idev] SUBJECT.KEYID = 7
1,173,631 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,880 UART: [ldev] ++
1,209,048 UART: [ldev] CDI.KEYID = 6
1,209,412 UART: [ldev] SUBJECT.KEYID = 5
1,209,839 UART: [ldev] AUTHORITY.KEYID = 7
1,210,302 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,386 UART: [ldev] --
1,280,862 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,571 UART: ROM Fatal Error: 0x000B0027
1,574,728 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,653 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Manufacturing
86,060 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
915,825 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,239 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,033 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,572 UART: ROM Fatal Error: 0x000B0027
1,574,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,216 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Manufacturing
85,375 UART: [state] DebugLocked = No
85,925 UART: [state] WD Timer not started. Device not locked for debugging
87,040 UART: [kat] SHA2-256
890,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,719 UART: [kat] ++
894,871 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,992 UART: [kat] SHA2-512-ACC
905,893 UART: [kat] ECC-384
915,598 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,750 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,145 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,051 UART: ROM Fatal Error: 0x000B0027
1,576,208 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,425,231 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Manufacturing
86,164 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,374 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,963 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,224 UART: ROM Fatal Error: 0x000B0027
1,575,381 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,348 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,021,442 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,605 UART:
2,165,995 UART: Running Caliptra ROM ...
2,167,187 UART:
2,167,363 UART: [state] CFI Enabled
2,168,331 UART: [state] LifecycleState = Unprovisioned
2,169,967 UART: [state] DebugLocked = No
2,171,035 UART: [state] WD Timer not started. Device not locked for debugging
2,173,503 UART: [kat] SHA2-256
2,174,167 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,171 UART: [kat] ++
2,177,620 UART: [kat] sha1
2,178,131 UART: [kat] SHA2-256
2,178,871 UART: [kat] SHA2-384
2,179,536 UART: [kat] SHA2-512-ACC
2,180,337 UART: [kat] ECC-384
3,773,506 UART: [kat] HMAC-384Kdf
3,801,894 UART: [kat] LMS
4,875,029 UART: [kat] --
4,878,388 UART: [cold-reset] ++
4,880,171 UART: [fht] FHT @ 0x50003400
4,891,159 UART: [idev] ++
4,891,842 UART: [idev] CDI.KEYID = 6
4,893,084 UART: [idev] SUBJECT.KEYID = 7
4,894,189 UART: [idev] UDS.KEYID = 0
4,929,172 UART: [idev] Erasing UDS.KEYID = 0
8,242,199 UART: [idev] Sha1 KeyId Algorithm
8,263,508 UART: [idev] --
8,267,988 UART: [ldev] ++
8,268,561 UART: [ldev] CDI.KEYID = 6
8,269,805 UART: [ldev] SUBJECT.KEYID = 5
8,270,962 UART: [ldev] AUTHORITY.KEYID = 7
8,272,196 UART: [ldev] FE.KEYID = 1
8,315,745 UART: [ldev] Erasing FE.KEYID = 1
11,652,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,181 UART: [ldev] --
14,036,637 UART: [fwproc] Wait for Commands...
14,039,553 UART: [fwproc] Recv command 0x46574c44
14,041,824 UART: [fwproc] Recv'd Img size: 114124 bytes
15,435,809 UART: ROM Fatal Error: 0x000B000D
15,439,208 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,021,094 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,214,982 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
2,026,510 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,779 UART:
2,171,170 UART: Running Caliptra ROM ...
2,172,257 UART:
2,172,406 UART: [state] CFI Enabled
2,173,377 UART: [state] LifecycleState = Unprovisioned
2,175,017 UART: [state] DebugLocked = No
2,176,039 UART: [state] WD Timer not started. Device not locked for debugging
2,178,501 UART: [kat] SHA2-256
2,179,157 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,162 UART: [kat] ++
2,182,608 UART: [kat] sha1
2,183,155 UART: [kat] SHA2-256
2,183,809 UART: [kat] SHA2-384
2,184,483 UART: [kat] SHA2-512-ACC
2,185,301 UART: [kat] ECC-384
4,099,110 UART: [kat] HMAC-384Kdf
4,111,322 UART: [kat] LMS
5,184,470 UART: [kat] --
5,190,343 UART: [cold-reset] ++
5,192,347 UART: [fht] FHT @ 0x50003400
5,203,599 UART: [idev] ++
5,204,279 UART: [idev] CDI.KEYID = 6
5,205,516 UART: [idev] SUBJECT.KEYID = 7
5,206,947 UART: [idev] UDS.KEYID = 0
5,223,029 UART: [idev] Erasing UDS.KEYID = 0
8,497,807 UART: [idev] Sha1 KeyId Algorithm
8,519,600 UART: [idev] --
8,523,467 UART: [ldev] ++
8,524,045 UART: [ldev] CDI.KEYID = 6
8,525,249 UART: [ldev] SUBJECT.KEYID = 5
8,526,685 UART: [ldev] AUTHORITY.KEYID = 7
8,528,253 UART: [ldev] FE.KEYID = 1
8,539,547 UART: [ldev] Erasing FE.KEYID = 1
11,830,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,895 UART: [ldev] --
14,194,627 UART: [fwproc] Wait for Commands...
14,197,482 UART: [fwproc] Recv command 0x46574c44
14,199,759 UART: [fwproc] Recv'd Img size: 114124 bytes
15,591,970 UART: ROM Fatal Error: 0x000B000D
15,595,371 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,023,318 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,407,965 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,029,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,174,281 UART:
2,174,693 UART: Running Caliptra ROM ...
2,175,774 UART:
2,175,926 UART: [state] CFI Enabled
2,176,898 UART: [state] LifecycleState = Unprovisioned
2,178,551 UART: [state] DebugLocked = No
2,179,581 UART: [state] WD Timer not started. Device not locked for debugging
2,182,038 UART: [kat] SHA2-256
2,182,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,730 UART: [kat] ++
2,186,182 UART: [kat] sha1
2,186,693 UART: [kat] SHA2-256
2,187,580 UART: [kat] SHA2-384
2,188,261 UART: [kat] SHA2-512-ACC
2,189,105 UART: [kat] ECC-384
2,945,122 UART: [kat] HMAC-384Kdf
2,970,549 UART: [kat] LMS
3,500,012 UART: [kat] --
3,504,979 UART: [cold-reset] ++
3,507,129 UART: [fht] FHT @ 0x50003400
3,518,432 UART: [idev] ++
3,518,995 UART: [idev] CDI.KEYID = 6
3,519,929 UART: [idev] SUBJECT.KEYID = 7
3,521,143 UART: [idev] UDS.KEYID = 0
3,541,792 UART: [idev] Erasing UDS.KEYID = 0
6,025,890 UART: [idev] Sha1 KeyId Algorithm
6,047,922 UART: [idev] --
6,051,524 UART: [ldev] ++
6,052,107 UART: [ldev] CDI.KEYID = 6
6,053,024 UART: [ldev] SUBJECT.KEYID = 5
6,054,192 UART: [ldev] AUTHORITY.KEYID = 7
6,055,428 UART: [ldev] FE.KEYID = 1
6,096,910 UART: [ldev] Erasing FE.KEYID = 1
8,602,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,604 UART: [ldev] --
10,409,788 UART: [fwproc] Wait for Commands...
10,411,894 UART: [fwproc] Recv command 0x46574c44
10,414,019 UART: [fwproc] Recv'd Img size: 114448 bytes
11,477,366 UART: ROM Fatal Error: 0x000B000D
11,480,493 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,022,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,239,837 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
2,023,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,026 UART:
2,168,422 UART: Running Caliptra ROM ...
2,169,499 UART:
2,169,654 UART: [state] CFI Enabled
2,170,611 UART: [state] LifecycleState = Unprovisioned
2,172,255 UART: [state] DebugLocked = No
2,173,280 UART: [state] WD Timer not started. Device not locked for debugging
2,175,733 UART: [kat] SHA2-256
2,176,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,386 UART: [kat] ++
2,179,834 UART: [kat] sha1
2,180,344 UART: [kat] SHA2-256
2,181,003 UART: [kat] SHA2-384
2,181,664 UART: [kat] SHA2-512-ACC
2,182,661 UART: [kat] ECC-384
3,279,367 UART: [kat] HMAC-384Kdf
3,290,465 UART: [kat] LMS
3,819,931 UART: [kat] --
3,824,465 UART: [cold-reset] ++
3,826,345 UART: [fht] FHT @ 0x50003400
3,838,296 UART: [idev] ++
3,838,852 UART: [idev] CDI.KEYID = 6
3,839,786 UART: [idev] SUBJECT.KEYID = 7
3,840,994 UART: [idev] UDS.KEYID = 0
3,856,729 UART: [idev] Erasing UDS.KEYID = 0
6,315,587 UART: [idev] Sha1 KeyId Algorithm
6,339,192 UART: [idev] --
6,342,961 UART: [ldev] ++
6,343,526 UART: [ldev] CDI.KEYID = 6
6,344,437 UART: [ldev] SUBJECT.KEYID = 5
6,345,591 UART: [ldev] AUTHORITY.KEYID = 7
6,346,898 UART: [ldev] FE.KEYID = 1
6,359,270 UART: [ldev] Erasing FE.KEYID = 1
8,832,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,160 UART: [ldev] --
10,622,961 UART: [fwproc] Wait for Commands...
10,625,242 UART: [fwproc] Recv command 0x46574c44
10,627,286 UART: [fwproc] Recv'd Img size: 114448 bytes
11,691,201 UART: ROM Fatal Error: 0x000B000D
11,694,328 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
2,031,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,479,071 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,022,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,225 UART:
2,168,645 UART: Running Caliptra ROM ...
2,169,815 UART:
2,169,987 UART: [state] CFI Enabled
2,170,960 UART: [state] LifecycleState = Unprovisioned
2,172,608 UART: [state] DebugLocked = No
2,173,635 UART: [state] WD Timer not started. Device not locked for debugging
2,176,071 UART: [kat] SHA2-256
2,176,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,757 UART: [kat] ++
2,180,210 UART: [kat] sha1
2,180,723 UART: [kat] SHA2-256
2,181,380 UART: [kat] SHA2-384
2,182,034 UART: [kat] SHA2-512-ACC
2,182,862 UART: [kat] ECC-384
2,933,765 UART: [kat] HMAC-384Kdf
2,957,665 UART: [kat] LMS
3,487,129 UART: [kat] --
3,493,116 UART: [cold-reset] ++
3,494,124 UART: [fht] FHT @ 0x50003400
3,506,593 UART: [idev] ++
3,507,151 UART: [idev] CDI.KEYID = 6
3,508,085 UART: [idev] SUBJECT.KEYID = 7
3,509,299 UART: [idev] UDS.KEYID = 0
3,529,169 UART: [idev] Erasing UDS.KEYID = 0
6,011,713 UART: [idev] Sha1 KeyId Algorithm
6,035,237 UART: [idev] --
6,039,558 UART: [ldev] ++
6,040,129 UART: [ldev] CDI.KEYID = 6
6,041,012 UART: [ldev] SUBJECT.KEYID = 5
6,042,175 UART: [ldev] AUTHORITY.KEYID = 7
6,043,466 UART: [ldev] FE.KEYID = 1
6,085,960 UART: [ldev] Erasing FE.KEYID = 1
8,588,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,535 UART: [ldev] --
10,399,567 UART: [fwproc] Wait for Commands...
10,402,377 UART: [fwproc] Recv command 0x46574c44
10,404,440 UART: [fwproc] Recv'd Img size: 114448 bytes
11,468,182 UART: ROM Fatal Error: 0x000B000D
11,471,252 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,024,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,266,848 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
2,023,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,489 UART:
2,168,905 UART: Running Caliptra ROM ...
2,170,076 UART:
2,170,264 UART: [state] CFI Enabled
2,171,227 UART: [state] LifecycleState = Unprovisioned
2,172,869 UART: [state] DebugLocked = No
2,173,974 UART: [state] WD Timer not started. Device not locked for debugging
2,176,434 UART: [kat] SHA2-256
2,177,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,106 UART: [kat] ++
2,180,577 UART: [kat] sha1
2,181,093 UART: [kat] SHA2-256
2,181,803 UART: [kat] SHA2-384
2,182,464 UART: [kat] SHA2-512-ACC
2,183,281 UART: [kat] ECC-384
3,283,434 UART: [kat] HMAC-384Kdf
3,295,345 UART: [kat] LMS
3,824,855 UART: [kat] --
3,829,709 UART: [cold-reset] ++
3,830,986 UART: [fht] FHT @ 0x50003400
3,840,856 UART: [idev] ++
3,841,421 UART: [idev] CDI.KEYID = 6
3,842,358 UART: [idev] SUBJECT.KEYID = 7
3,843,565 UART: [idev] UDS.KEYID = 0
3,858,273 UART: [idev] Erasing UDS.KEYID = 0
6,311,508 UART: [idev] Sha1 KeyId Algorithm
6,335,444 UART: [idev] --
6,339,381 UART: [ldev] ++
6,339,951 UART: [ldev] CDI.KEYID = 6
6,340,840 UART: [ldev] SUBJECT.KEYID = 5
6,342,072 UART: [ldev] AUTHORITY.KEYID = 7
6,343,305 UART: [ldev] FE.KEYID = 1
6,356,894 UART: [ldev] Erasing FE.KEYID = 1
8,827,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,893 UART: [ldev] --
10,619,566 UART: [fwproc] Wait for Commands...
10,621,115 UART: [fwproc] Recv command 0x46574c44
10,623,223 UART: [fwproc] Recv'd Img size: 114448 bytes
11,688,450 UART: ROM Fatal Error: 0x000B000D
11,691,583 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,022,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,469,663 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,661 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,359 UART: [idev] --
1,209,392 UART: [ldev] ++
1,209,560 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,351 UART: [ldev] AUTHORITY.KEYID = 7
1,210,814 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,285 UART: ROM Fatal Error: 0x000B000D
1,322,444 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,133 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,633 UART: [kat] HMAC-384Kdf
920,111 UART: [kat] LMS
1,168,423 UART: [kat] --
1,169,194 UART: [cold-reset] ++
1,169,580 UART: [fht] FHT @ 0x50003400
1,172,204 UART: [idev] ++
1,172,372 UART: [idev] CDI.KEYID = 6
1,172,733 UART: [idev] SUBJECT.KEYID = 7
1,173,158 UART: [idev] UDS.KEYID = 0
1,181,134 UART: [idev] Erasing UDS.KEYID = 0
1,198,678 UART: [idev] Sha1 KeyId Algorithm
1,207,490 UART: [idev] --
1,208,553 UART: [ldev] ++
1,208,721 UART: [ldev] CDI.KEYID = 6
1,209,085 UART: [ldev] SUBJECT.KEYID = 5
1,209,512 UART: [ldev] AUTHORITY.KEYID = 7
1,209,975 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,241,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,482 UART: [fwproc] Recv command 0x46574c44
1,283,215 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,388 UART: ROM Fatal Error: 0x000B000D
1,322,547 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,448 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
903,968 UART: [kat] SHA2-512-ACC
905,869 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,346 UART: [kat] LMS
1,168,658 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,218 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,173 UART: [fwproc] Recv command 0x46574c44
1,281,906 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,011 UART: ROM Fatal Error: 0x000B000D
1,321,170 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,093 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,210 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,841 UART: [ldev] ++
1,209,009 UART: [ldev] CDI.KEYID = 6
1,209,373 UART: [ldev] SUBJECT.KEYID = 5
1,209,800 UART: [ldev] AUTHORITY.KEYID = 7
1,210,263 UART: [ldev] FE.KEYID = 1
1,215,499 UART: [ldev] Erasing FE.KEYID = 1
1,241,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,221 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,086 UART: [fwproc] Recv command 0x46574c44
1,281,819 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,950 UART: ROM Fatal Error: 0x000B000D
1,321,109 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,236 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,023 UART: [kat] ++
895,175 UART: [kat] sha1
899,343 UART: [kat] SHA2-256
901,283 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,667 UART: [idev] --
1,208,608 UART: [ldev] ++
1,208,776 UART: [ldev] CDI.KEYID = 6
1,209,140 UART: [ldev] SUBJECT.KEYID = 5
1,209,567 UART: [ldev] AUTHORITY.KEYID = 7
1,210,030 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,294 UART: [ldev] --
1,281,576 UART: [fwproc] Wait for Commands...
1,282,261 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,437 UART: ROM Fatal Error: 0x000B000D
1,322,596 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,297 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,182,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,950 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,641 UART: [ldev] --
1,281,009 UART: [fwproc] Wait for Commands...
1,281,614 UART: [fwproc] Recv command 0x46574c44
1,282,347 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,018 UART: ROM Fatal Error: 0x000B000D
1,321,177 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,074 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,022,571 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,036 UART:
2,167,446 UART: Running Caliptra ROM ...
2,168,536 UART:
2,168,691 UART: [state] CFI Enabled
2,169,673 UART: [state] LifecycleState = Unprovisioned
2,171,318 UART: [state] DebugLocked = No
2,172,344 UART: [state] WD Timer not started. Device not locked for debugging
2,174,802 UART: [kat] SHA2-256
2,175,487 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,495 UART: [kat] ++
2,178,947 UART: [kat] sha1
2,179,460 UART: [kat] SHA2-256
2,180,116 UART: [kat] SHA2-384
2,180,772 UART: [kat] SHA2-512-ACC
2,181,764 UART: [kat] ECC-384
3,776,632 UART: [kat] HMAC-384Kdf
3,803,318 UART: [kat] LMS
4,876,447 UART: [kat] --
4,878,794 UART: [cold-reset] ++
4,880,891 UART: [fht] FHT @ 0x50003400
4,891,496 UART: [idev] ++
4,892,172 UART: [idev] CDI.KEYID = 6
4,893,332 UART: [idev] SUBJECT.KEYID = 7
4,894,536 UART: [idev] UDS.KEYID = 0
4,930,220 UART: [idev] Erasing UDS.KEYID = 0
8,244,069 UART: [idev] Sha1 KeyId Algorithm
8,266,604 UART: [idev] --
8,269,411 UART: [ldev] ++
8,269,976 UART: [ldev] CDI.KEYID = 6
8,271,137 UART: [ldev] SUBJECT.KEYID = 5
8,272,294 UART: [ldev] AUTHORITY.KEYID = 7
8,273,578 UART: [ldev] FE.KEYID = 1
8,317,744 UART: [ldev] Erasing FE.KEYID = 1
11,648,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,912 UART: [ldev] --
14,017,210 UART: [fwproc] Wait for Commands...
14,019,758 UART: [fwproc] Recv command 0x46574c44
14,022,071 UART: [fwproc] Recv'd Img size: 114124 bytes
18,099,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,174,418 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,243,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,560,701 >>> mbox cmd response: success
18,565,085 UART: [afmc] ++
18,565,685 UART: [afmc] CDI.KEYID = 6
18,566,792 UART: [afmc] SUBJECT.KEYID = 7
18,568,011 UART: [afmc] AUTHORITY.KEYID = 5
21,928,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,806 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,241,962 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,258,010 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,274,010 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,297,559 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,021,478 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,373,284 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
2,023,236 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,270 UART:
2,167,655 UART: Running Caliptra ROM ...
2,168,818 UART:
2,168,985 UART: [state] CFI Enabled
2,169,970 UART: [state] LifecycleState = Unprovisioned
2,171,832 UART: [state] DebugLocked = No
2,172,947 UART: [state] WD Timer not started. Device not locked for debugging
2,175,418 UART: [kat] SHA2-256
2,176,081 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,085 UART: [kat] ++
2,179,533 UART: [kat] sha1
2,180,036 UART: [kat] SHA2-256
2,180,770 UART: [kat] SHA2-384
2,181,427 UART: [kat] SHA2-512-ACC
2,182,248 UART: [kat] ECC-384
4,090,967 UART: [kat] HMAC-384Kdf
4,102,730 UART: [kat] LMS
5,175,919 UART: [kat] --
5,178,193 UART: [cold-reset] ++
5,179,805 UART: [fht] FHT @ 0x50003400
5,192,851 UART: [idev] ++
5,193,530 UART: [idev] CDI.KEYID = 6
5,194,707 UART: [idev] SUBJECT.KEYID = 7
5,196,194 UART: [idev] UDS.KEYID = 0
5,212,122 UART: [idev] Erasing UDS.KEYID = 0
8,485,385 UART: [idev] Sha1 KeyId Algorithm
8,507,431 UART: [idev] --
8,510,807 UART: [ldev] ++
8,511,380 UART: [ldev] CDI.KEYID = 6
8,512,611 UART: [ldev] SUBJECT.KEYID = 5
8,514,039 UART: [ldev] AUTHORITY.KEYID = 7
8,515,596 UART: [ldev] FE.KEYID = 1
8,526,725 UART: [ldev] Erasing FE.KEYID = 1
11,818,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,831 UART: [ldev] --
14,181,967 UART: [fwproc] Wait for Commands...
14,185,083 UART: [fwproc] Recv command 0x46574c44
14,187,401 UART: [fwproc] Recv'd Img size: 114124 bytes
18,266,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,346,226 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,414,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,732,879 >>> mbox cmd response: success
18,736,531 UART: [afmc] ++
18,737,112 UART: [afmc] CDI.KEYID = 6
18,738,270 UART: [afmc] SUBJECT.KEYID = 7
18,739,472 UART: [afmc] AUTHORITY.KEYID = 5
22,057,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,353,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,355,520 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,371,708 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,387,747 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,403,742 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,426,566 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
2,023,110 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,547,656 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,023,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,604 UART:
2,168,007 UART: Running Caliptra ROM ...
2,169,096 UART:
2,169,253 UART: [state] CFI Enabled
2,170,224 UART: [state] LifecycleState = Unprovisioned
2,171,871 UART: [state] DebugLocked = No
2,172,939 UART: [state] WD Timer not started. Device not locked for debugging
2,175,404 UART: [kat] SHA2-256
2,176,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,071 UART: [kat] ++
2,179,528 UART: [kat] sha1
2,180,043 UART: [kat] SHA2-256
2,180,700 UART: [kat] SHA2-384
2,181,353 UART: [kat] SHA2-512-ACC
2,182,176 UART: [kat] ECC-384
2,949,907 UART: [kat] HMAC-384Kdf
2,972,233 UART: [kat] LMS
3,501,693 UART: [kat] --
3,507,221 UART: [cold-reset] ++
3,508,137 UART: [fht] FHT @ 0x50003400
3,518,637 UART: [idev] ++
3,519,207 UART: [idev] CDI.KEYID = 6
3,520,111 UART: [idev] SUBJECT.KEYID = 7
3,521,326 UART: [idev] UDS.KEYID = 0
3,543,885 UART: [idev] Erasing UDS.KEYID = 0
6,025,663 UART: [idev] Sha1 KeyId Algorithm
6,049,496 UART: [idev] --
6,053,203 UART: [ldev] ++
6,053,782 UART: [ldev] CDI.KEYID = 6
6,054,695 UART: [ldev] SUBJECT.KEYID = 5
6,055,918 UART: [ldev] AUTHORITY.KEYID = 7
6,057,172 UART: [ldev] FE.KEYID = 1
6,100,392 UART: [ldev] Erasing FE.KEYID = 1
8,606,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,203 UART: [ldev] --
10,417,680 UART: [fwproc] Wait for Commands...
10,420,908 UART: [fwproc] Recv command 0x46574c44
10,422,950 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,579 >>> mbox cmd response: success
14,296,563 UART: [afmc] ++
14,297,171 UART: [afmc] CDI.KEYID = 6
14,298,083 UART: [afmc] SUBJECT.KEYID = 7
14,299,245 UART: [afmc] AUTHORITY.KEYID = 5
16,831,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,183 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
2,026,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,559 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,022,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,409 UART:
2,167,813 UART: Running Caliptra ROM ...
2,168,899 UART:
2,169,074 UART: [state] CFI Enabled
2,170,044 UART: [state] LifecycleState = Unprovisioned
2,171,690 UART: [state] DebugLocked = No
2,172,714 UART: [state] WD Timer not started. Device not locked for debugging
2,175,179 UART: [kat] SHA2-256
2,175,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,073 UART: [kat] ++
2,179,539 UART: [kat] sha1
2,180,046 UART: [kat] SHA2-256
2,180,703 UART: [kat] SHA2-384
2,181,355 UART: [kat] SHA2-512-ACC
2,182,154 UART: [kat] ECC-384
3,284,582 UART: [kat] HMAC-384Kdf
3,297,196 UART: [kat] LMS
3,826,664 UART: [kat] --
3,831,355 UART: [cold-reset] ++
3,833,521 UART: [fht] FHT @ 0x50003400
3,844,990 UART: [idev] ++
3,845,552 UART: [idev] CDI.KEYID = 6
3,846,462 UART: [idev] SUBJECT.KEYID = 7
3,847,676 UART: [idev] UDS.KEYID = 0
3,864,509 UART: [idev] Erasing UDS.KEYID = 0
6,320,631 UART: [idev] Sha1 KeyId Algorithm
6,343,487 UART: [idev] --
6,348,134 UART: [ldev] ++
6,348,715 UART: [ldev] CDI.KEYID = 6
6,349,621 UART: [ldev] SUBJECT.KEYID = 5
6,350,839 UART: [ldev] AUTHORITY.KEYID = 7
6,352,067 UART: [ldev] FE.KEYID = 1
6,362,011 UART: [ldev] Erasing FE.KEYID = 1
8,837,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,494 UART: [ldev] --
10,630,541 UART: [fwproc] Wait for Commands...
10,632,094 UART: [fwproc] Recv command 0x46574c44
10,634,194 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,505,002 >>> mbox cmd response: success
14,508,567 UART: [afmc] ++
14,509,163 UART: [afmc] CDI.KEYID = 6
14,510,072 UART: [afmc] SUBJECT.KEYID = 7
14,511,291 UART: [afmc] AUTHORITY.KEYID = 5
17,010,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,377 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,021,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,819 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,021,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,364 UART:
2,166,758 UART: Running Caliptra ROM ...
2,167,926 UART:
2,168,097 UART: [state] CFI Enabled
2,169,061 UART: [state] LifecycleState = Unprovisioned
2,170,707 UART: [state] DebugLocked = No
2,171,817 UART: [state] WD Timer not started. Device not locked for debugging
2,174,282 UART: [kat] SHA2-256
2,174,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,951 UART: [kat] ++
2,178,401 UART: [kat] sha1
2,178,953 UART: [kat] SHA2-256
2,179,632 UART: [kat] SHA2-384
2,180,382 UART: [kat] SHA2-512-ACC
2,181,232 UART: [kat] ECC-384
2,926,789 UART: [kat] HMAC-384Kdf
2,940,142 UART: [kat] LMS
3,469,586 UART: [kat] --
3,474,716 UART: [cold-reset] ++
3,477,076 UART: [fht] FHT @ 0x50003400
3,488,007 UART: [idev] ++
3,488,579 UART: [idev] CDI.KEYID = 6
3,489,460 UART: [idev] SUBJECT.KEYID = 7
3,490,729 UART: [idev] UDS.KEYID = 0
3,513,061 UART: [idev] Erasing UDS.KEYID = 0
5,993,711 UART: [idev] Sha1 KeyId Algorithm
6,016,722 UART: [idev] --
6,020,183 UART: [ldev] ++
6,020,776 UART: [ldev] CDI.KEYID = 6
6,021,661 UART: [ldev] SUBJECT.KEYID = 5
6,022,826 UART: [ldev] AUTHORITY.KEYID = 7
6,024,114 UART: [ldev] FE.KEYID = 1
6,068,448 UART: [ldev] Erasing FE.KEYID = 1
8,571,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,307,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,339,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,375,549 UART: [ldev] --
10,379,949 UART: [fwproc] Wait for Commands...
10,381,946 UART: [fwproc] Recv command 0x46574c44
10,384,045 UART: [fwproc] Recv'd Img size: 114448 bytes
13,786,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,859,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,928,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,246,034 >>> mbox cmd response: success
14,249,529 UART: [afmc] ++
14,250,118 UART: [afmc] CDI.KEYID = 6
14,251,025 UART: [afmc] SUBJECT.KEYID = 7
14,252,243 UART: [afmc] AUTHORITY.KEYID = 5
16,776,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,500,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,502,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,518,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,534,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,550,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,574,030 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,027,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,097,080 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,023,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,800 UART:
2,168,213 UART: Running Caliptra ROM ...
2,169,297 UART:
2,169,453 UART: [state] CFI Enabled
2,170,422 UART: [state] LifecycleState = Unprovisioned
2,172,069 UART: [state] DebugLocked = No
2,173,097 UART: [state] WD Timer not started. Device not locked for debugging
2,175,567 UART: [kat] SHA2-256
2,176,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,217 UART: [kat] ++
2,179,660 UART: [kat] sha1
2,180,167 UART: [kat] SHA2-256
2,180,824 UART: [kat] SHA2-384
2,181,499 UART: [kat] SHA2-512-ACC
2,182,494 UART: [kat] ECC-384
3,277,442 UART: [kat] HMAC-384Kdf
3,289,982 UART: [kat] LMS
3,819,449 UART: [kat] --
3,824,351 UART: [cold-reset] ++
3,825,953 UART: [fht] FHT @ 0x50003400
3,837,630 UART: [idev] ++
3,838,197 UART: [idev] CDI.KEYID = 6
3,839,257 UART: [idev] SUBJECT.KEYID = 7
3,840,282 UART: [idev] UDS.KEYID = 0
3,857,728 UART: [idev] Erasing UDS.KEYID = 0
6,314,107 UART: [idev] Sha1 KeyId Algorithm
6,336,469 UART: [idev] --
6,340,376 UART: [ldev] ++
6,340,948 UART: [ldev] CDI.KEYID = 6
6,341,878 UART: [ldev] SUBJECT.KEYID = 5
6,343,042 UART: [ldev] AUTHORITY.KEYID = 7
6,344,330 UART: [ldev] FE.KEYID = 1
6,355,181 UART: [ldev] Erasing FE.KEYID = 1
8,827,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,475 UART: [ldev] --
10,617,765 UART: [fwproc] Wait for Commands...
10,620,506 UART: [fwproc] Recv command 0x46574c44
10,622,603 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,786 >>> mbox cmd response: success
14,481,889 UART: [afmc] ++
14,482,485 UART: [afmc] CDI.KEYID = 6
14,483,372 UART: [afmc] SUBJECT.KEYID = 7
14,484,588 UART: [afmc] AUTHORITY.KEYID = 5
16,984,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,616 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,022,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,688 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,287 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,198,145 UART: [idev] Sha1 KeyId Algorithm
1,206,981 UART: [idev] --
1,208,052 UART: [ldev] ++
1,208,220 UART: [ldev] CDI.KEYID = 6
1,208,584 UART: [ldev] SUBJECT.KEYID = 5
1,209,011 UART: [ldev] AUTHORITY.KEYID = 7
1,209,474 UART: [ldev] FE.KEYID = 1
1,214,510 UART: [ldev] Erasing FE.KEYID = 1
1,240,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,202 UART: [ldev] --
1,279,646 UART: [fwproc] Wait for Commands...
1,280,415 UART: [fwproc] Recv command 0x46574c44
1,281,148 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,526 >>> mbox cmd response: success
2,774,773 UART: [afmc] ++
2,774,941 UART: [afmc] CDI.KEYID = 6
2,775,304 UART: [afmc] SUBJECT.KEYID = 7
2,775,730 UART: [afmc] AUTHORITY.KEYID = 5
2,811,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,849 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,451 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,274 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,520 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,049 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,233 >>> mbox cmd response: success
2,775,450 UART: [afmc] ++
2,775,618 UART: [afmc] CDI.KEYID = 6
2,775,981 UART: [afmc] SUBJECT.KEYID = 7
2,776,407 UART: [afmc] AUTHORITY.KEYID = 5
2,811,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,511 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,230 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,881 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,793 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,712 UART: [kat] HMAC-384Kdf
920,188 UART: [kat] LMS
1,168,500 UART: [kat] --
1,169,271 UART: [cold-reset] ++
1,169,611 UART: [fht] FHT @ 0x50003400
1,172,191 UART: [idev] ++
1,172,359 UART: [idev] CDI.KEYID = 6
1,172,720 UART: [idev] SUBJECT.KEYID = 7
1,173,145 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,197,597 UART: [idev] Sha1 KeyId Algorithm
1,206,331 UART: [idev] --
1,207,354 UART: [ldev] ++
1,207,522 UART: [ldev] CDI.KEYID = 6
1,207,886 UART: [ldev] SUBJECT.KEYID = 5
1,208,313 UART: [ldev] AUTHORITY.KEYID = 7
1,208,776 UART: [ldev] FE.KEYID = 1
1,214,100 UART: [ldev] Erasing FE.KEYID = 1
1,240,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,330 UART: [ldev] --
1,279,790 UART: [fwproc] Wait for Commands...
1,280,537 UART: [fwproc] Recv command 0x46574c44
1,281,270 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,494 >>> mbox cmd response: success
2,774,663 UART: [afmc] ++
2,774,831 UART: [afmc] CDI.KEYID = 6
2,775,194 UART: [afmc] SUBJECT.KEYID = 7
2,775,620 UART: [afmc] AUTHORITY.KEYID = 5
2,811,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,934 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,824 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,731 UART: [kat] HMAC-384Kdf
921,363 UART: [kat] LMS
1,169,675 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,071 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,910 UART: [fwproc] Recv command 0x46574c44
1,282,643 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,835 >>> mbox cmd response: success
2,774,928 UART: [afmc] ++
2,775,096 UART: [afmc] CDI.KEYID = 6
2,775,459 UART: [afmc] SUBJECT.KEYID = 7
2,775,885 UART: [afmc] AUTHORITY.KEYID = 5
2,811,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,537 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,437 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
904,904 UART: [kat] SHA2-512-ACC
906,805 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,849 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,182,549 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,506 UART: [ldev] --
1,281,950 UART: [fwproc] Wait for Commands...
1,282,771 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,430 >>> mbox cmd response: success
2,775,489 UART: [afmc] ++
2,775,657 UART: [afmc] CDI.KEYID = 6
2,776,020 UART: [afmc] SUBJECT.KEYID = 7
2,776,446 UART: [afmc] AUTHORITY.KEYID = 5
2,812,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,024 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,140 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,836 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,805 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,198,706 UART: [idev] Sha1 KeyId Algorithm
1,207,636 UART: [idev] --
1,208,483 UART: [ldev] ++
1,208,651 UART: [ldev] CDI.KEYID = 6
1,209,015 UART: [ldev] SUBJECT.KEYID = 5
1,209,442 UART: [ldev] AUTHORITY.KEYID = 7
1,209,905 UART: [ldev] FE.KEYID = 1
1,215,487 UART: [ldev] Erasing FE.KEYID = 1
1,241,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,193 >>> mbox cmd response: success
2,775,246 UART: [afmc] ++
2,775,414 UART: [afmc] CDI.KEYID = 6
2,775,777 UART: [afmc] SUBJECT.KEYID = 7
2,776,203 UART: [afmc] AUTHORITY.KEYID = 5
2,811,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,581 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,087 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,026,404 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,735 UART:
2,171,132 UART: Running Caliptra ROM ...
2,172,299 UART:
2,172,469 UART: [state] CFI Enabled
2,173,434 UART: [state] LifecycleState = Unprovisioned
2,175,071 UART: [state] DebugLocked = No
2,176,177 UART: [state] WD Timer not started. Device not locked for debugging
2,178,648 UART: [kat] SHA2-256
2,179,531 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,569 UART: [kat] ++
2,183,027 UART: [kat] sha1
2,183,544 UART: [kat] SHA2-256
2,184,230 UART: [kat] SHA2-384
2,184,890 UART: [kat] SHA2-512-ACC
2,185,710 UART: [kat] ECC-384
3,773,334 UART: [kat] HMAC-384Kdf
3,798,847 UART: [kat] LMS
4,871,978 UART: [kat] --
4,875,157 UART: [cold-reset] ++
4,877,850 UART: [fht] FHT @ 0x50003400
4,889,965 UART: [idev] ++
4,890,688 UART: [idev] CDI.KEYID = 6
4,891,919 UART: [idev] SUBJECT.KEYID = 7
4,893,025 UART: [idev] UDS.KEYID = 0
4,927,626 UART: [idev] Erasing UDS.KEYID = 0
8,240,378 UART: [idev] Sha1 KeyId Algorithm
8,262,093 UART: [idev] --
8,266,434 UART: [ldev] ++
8,267,010 UART: [ldev] CDI.KEYID = 6
8,268,199 UART: [ldev] SUBJECT.KEYID = 5
8,269,384 UART: [ldev] AUTHORITY.KEYID = 7
8,270,561 UART: [ldev] FE.KEYID = 1
8,315,019 UART: [ldev] Erasing FE.KEYID = 1
11,652,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,479 UART: [ldev] --
14,035,535 UART: [fwproc] Wait for Commands...
14,037,746 UART: [fwproc] Recv command 0x46574c44
14,040,060 UART: [fwproc] Recv'd Img size: 114124 bytes
17,569,549 UART: ROM Fatal Error: 0x000B0030
17,572,678 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,020,260 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,107,720 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,028,249 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,172,232 UART:
2,172,644 UART: Running Caliptra ROM ...
2,173,813 UART:
2,173,991 UART: [state] CFI Enabled
2,174,965 UART: [state] LifecycleState = Unprovisioned
2,176,604 UART: [state] DebugLocked = No
2,177,705 UART: [state] WD Timer not started. Device not locked for debugging
2,180,185 UART: [kat] SHA2-256
2,180,845 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,841 UART: [kat] ++
2,184,284 UART: [kat] sha1
2,184,825 UART: [kat] SHA2-256
2,185,480 UART: [kat] SHA2-384
2,186,129 UART: [kat] SHA2-512-ACC
2,187,239 UART: [kat] ECC-384
4,096,762 UART: [kat] HMAC-384Kdf
4,108,083 UART: [kat] LMS
5,181,226 UART: [kat] --
5,185,984 UART: [cold-reset] ++
5,187,117 UART: [fht] FHT @ 0x50003400
5,198,039 UART: [idev] ++
5,198,708 UART: [idev] CDI.KEYID = 6
5,199,937 UART: [idev] SUBJECT.KEYID = 7
5,201,383 UART: [idev] UDS.KEYID = 0
5,218,814 UART: [idev] Erasing UDS.KEYID = 0
8,490,624 UART: [idev] Sha1 KeyId Algorithm
8,512,933 UART: [idev] --
8,517,544 UART: [ldev] ++
8,518,177 UART: [ldev] CDI.KEYID = 6
8,519,359 UART: [ldev] SUBJECT.KEYID = 5
8,520,843 UART: [ldev] AUTHORITY.KEYID = 7
8,522,395 UART: [ldev] FE.KEYID = 1
8,533,577 UART: [ldev] Erasing FE.KEYID = 1
11,825,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,522 UART: [ldev] --
14,192,659 UART: [fwproc] Wait for Commands...
14,195,687 UART: [fwproc] Recv command 0x46574c44
14,197,945 UART: [fwproc] Recv'd Img size: 114124 bytes
17,803,068 UART: ROM Fatal Error: 0x000B0030
17,806,208 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
2,023,273 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,309,381 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
2,021,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,943 UART:
2,166,388 UART: Running Caliptra ROM ...
2,167,483 UART:
2,167,647 UART: [state] CFI Enabled
2,168,620 UART: [state] LifecycleState = Unprovisioned
2,170,279 UART: [state] DebugLocked = No
2,171,390 UART: [state] WD Timer not started. Device not locked for debugging
2,174,091 UART: [kat] SHA2-256
2,174,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,796 UART: [kat] ++
2,178,253 UART: [kat] sha1
2,178,770 UART: [kat] SHA2-256
2,179,521 UART: [kat] SHA2-384
2,180,187 UART: [kat] SHA2-512-ACC
2,181,019 UART: [kat] ECC-384
2,944,282 UART: [kat] HMAC-384Kdf
2,968,709 UART: [kat] LMS
3,498,144 UART: [kat] --
3,503,567 UART: [cold-reset] ++
3,504,854 UART: [fht] FHT @ 0x50003400
3,515,085 UART: [idev] ++
3,515,663 UART: [idev] CDI.KEYID = 6
3,516,545 UART: [idev] SUBJECT.KEYID = 7
3,517,811 UART: [idev] UDS.KEYID = 0
3,540,165 UART: [idev] Erasing UDS.KEYID = 0
6,024,237 UART: [idev] Sha1 KeyId Algorithm
6,047,311 UART: [idev] --
6,051,257 UART: [ldev] ++
6,051,833 UART: [ldev] CDI.KEYID = 6
6,052,741 UART: [ldev] SUBJECT.KEYID = 5
6,053,902 UART: [ldev] AUTHORITY.KEYID = 7
6,055,191 UART: [ldev] FE.KEYID = 1
6,096,351 UART: [ldev] Erasing FE.KEYID = 1
8,597,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,167 UART: [ldev] --
10,388,484 UART: [fwproc] Wait for Commands...
10,391,075 UART: [fwproc] Recv command 0x46574c44
10,393,195 UART: [fwproc] Recv'd Img size: 114448 bytes
12,040,897 UART: ROM Fatal Error: 0x000B0030
12,044,028 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,022,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,776,682 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
2,023,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,081 UART:
2,170,496 UART: Running Caliptra ROM ...
2,171,668 UART:
2,171,838 UART: [state] CFI Enabled
2,172,795 UART: [state] LifecycleState = Unprovisioned
2,174,440 UART: [state] DebugLocked = No
2,175,543 UART: [state] WD Timer not started. Device not locked for debugging
2,178,007 UART: [kat] SHA2-256
2,178,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,669 UART: [kat] ++
2,182,119 UART: [kat] sha1
2,182,631 UART: [kat] SHA2-256
2,183,369 UART: [kat] SHA2-384
2,184,038 UART: [kat] SHA2-512-ACC
2,184,921 UART: [kat] ECC-384
3,288,987 UART: [kat] HMAC-384Kdf
3,302,263 UART: [kat] LMS
3,831,724 UART: [kat] --
3,836,087 UART: [cold-reset] ++
3,837,513 UART: [fht] FHT @ 0x50003400
3,847,522 UART: [idev] ++
3,848,087 UART: [idev] CDI.KEYID = 6
3,849,014 UART: [idev] SUBJECT.KEYID = 7
3,850,231 UART: [idev] UDS.KEYID = 0
3,867,451 UART: [idev] Erasing UDS.KEYID = 0
6,323,230 UART: [idev] Sha1 KeyId Algorithm
6,346,520 UART: [idev] --
6,350,085 UART: [ldev] ++
6,350,654 UART: [ldev] CDI.KEYID = 6
6,351,616 UART: [ldev] SUBJECT.KEYID = 5
6,352,774 UART: [ldev] AUTHORITY.KEYID = 7
6,354,004 UART: [ldev] FE.KEYID = 1
6,364,185 UART: [ldev] Erasing FE.KEYID = 1
8,835,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,549 UART: [ldev] --
10,629,378 UART: [fwproc] Wait for Commands...
10,631,577 UART: [fwproc] Recv command 0x46574c44
10,633,673 UART: [fwproc] Recv'd Img size: 114448 bytes
12,275,647 UART: ROM Fatal Error: 0x000B0030
12,278,769 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,026,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,943,088 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,022,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,696 UART:
2,168,104 UART: Running Caliptra ROM ...
2,169,189 UART:
2,169,339 UART: [state] CFI Enabled
2,170,310 UART: [state] LifecycleState = Unprovisioned
2,171,981 UART: [state] DebugLocked = No
2,173,008 UART: [state] WD Timer not started. Device not locked for debugging
2,175,473 UART: [kat] SHA2-256
2,176,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,134 UART: [kat] ++
2,179,584 UART: [kat] sha1
2,180,186 UART: [kat] SHA2-256
2,180,849 UART: [kat] SHA2-384
2,181,503 UART: [kat] SHA2-512-ACC
2,182,302 UART: [kat] ECC-384
2,944,085 UART: [kat] HMAC-384Kdf
2,967,729 UART: [kat] LMS
3,497,141 UART: [kat] --
3,500,862 UART: [cold-reset] ++
3,503,176 UART: [fht] FHT @ 0x50003400
3,515,126 UART: [idev] ++
3,515,722 UART: [idev] CDI.KEYID = 6
3,516,648 UART: [idev] SUBJECT.KEYID = 7
3,517,813 UART: [idev] UDS.KEYID = 0
3,553,503 UART: [idev] Erasing UDS.KEYID = 0
6,035,957 UART: [idev] Sha1 KeyId Algorithm
6,058,320 UART: [idev] --
6,061,775 UART: [ldev] ++
6,062,350 UART: [ldev] CDI.KEYID = 6
6,063,260 UART: [ldev] SUBJECT.KEYID = 5
6,064,424 UART: [ldev] AUTHORITY.KEYID = 7
6,065,720 UART: [ldev] FE.KEYID = 1
6,110,426 UART: [ldev] Erasing FE.KEYID = 1
8,615,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,674 UART: [ldev] --
10,422,763 UART: [fwproc] Wait for Commands...
10,424,433 UART: [fwproc] Recv command 0x46574c44
10,426,477 UART: [fwproc] Recv'd Img size: 114448 bytes
12,096,527 UART: ROM Fatal Error: 0x000B0030
12,099,651 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,021,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,767,533 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,022,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,285 UART:
2,167,679 UART: Running Caliptra ROM ...
2,168,844 UART:
2,169,016 UART: [state] CFI Enabled
2,169,981 UART: [state] LifecycleState = Unprovisioned
2,171,635 UART: [state] DebugLocked = No
2,172,739 UART: [state] WD Timer not started. Device not locked for debugging
2,175,200 UART: [kat] SHA2-256
2,175,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,867 UART: [kat] ++
2,179,314 UART: [kat] sha1
2,179,827 UART: [kat] SHA2-256
2,180,562 UART: [kat] SHA2-384
2,181,247 UART: [kat] SHA2-512-ACC
2,182,126 UART: [kat] ECC-384
3,277,690 UART: [kat] HMAC-384Kdf
3,289,791 UART: [kat] LMS
3,819,326 UART: [kat] --
3,825,068 UART: [cold-reset] ++
3,826,677 UART: [fht] FHT @ 0x50003400
3,838,034 UART: [idev] ++
3,838,606 UART: [idev] CDI.KEYID = 6
3,839,486 UART: [idev] SUBJECT.KEYID = 7
3,840,697 UART: [idev] UDS.KEYID = 0
3,857,541 UART: [idev] Erasing UDS.KEYID = 0
6,314,903 UART: [idev] Sha1 KeyId Algorithm
6,337,623 UART: [idev] --
6,340,806 UART: [ldev] ++
6,341,369 UART: [ldev] CDI.KEYID = 6
6,342,268 UART: [ldev] SUBJECT.KEYID = 5
6,343,486 UART: [ldev] AUTHORITY.KEYID = 7
6,344,733 UART: [ldev] FE.KEYID = 1
6,355,024 UART: [ldev] Erasing FE.KEYID = 1
8,826,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,800 UART: [ldev] --
10,617,790 UART: [fwproc] Wait for Commands...
10,620,260 UART: [fwproc] Recv command 0x46574c44
10,622,350 UART: [fwproc] Recv'd Img size: 114448 bytes
12,273,500 UART: ROM Fatal Error: 0x000B0030
12,276,618 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,020,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,974,426 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
903,852 UART: [kat] SHA2-512-ACC
905,753 UART: [kat] ECC-384
915,490 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,169,261 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,251 UART: [idev] ++
1,172,419 UART: [idev] CDI.KEYID = 6
1,172,780 UART: [idev] SUBJECT.KEYID = 7
1,173,205 UART: [idev] UDS.KEYID = 0
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,598 UART: [fwproc] Wait for Commands...
1,281,249 UART: [fwproc] Recv command 0x46574c44
1,281,982 UART: [fwproc] Recv'd Img size: 114448 bytes
1,592,425 UART: ROM Fatal Error: 0x000B0030
1,593,582 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,444,796 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,183,190 UART: [idev] Erasing UDS.KEYID = 0
1,200,726 UART: [idev] Sha1 KeyId Algorithm
1,209,550 UART: [idev] --
1,210,559 UART: [ldev] ++
1,210,727 UART: [ldev] CDI.KEYID = 6
1,211,091 UART: [ldev] SUBJECT.KEYID = 5
1,211,518 UART: [ldev] AUTHORITY.KEYID = 7
1,211,981 UART: [ldev] FE.KEYID = 1
1,217,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,447 UART: [ldev] --
1,282,791 UART: [fwproc] Wait for Commands...
1,283,408 UART: [fwproc] Recv command 0x46574c44
1,284,141 UART: [fwproc] Recv'd Img size: 114448 bytes
1,594,924 UART: ROM Fatal Error: 0x000B0030
1,596,081 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,443,873 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,045 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,820 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,281,070 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114448 bytes
1,589,852 UART: ROM Fatal Error: 0x000B0030
1,591,009 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,442,980 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,966 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,381 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 114448 bytes
1,585,915 UART: ROM Fatal Error: 0x000B0030
1,587,072 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,443,192 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,368 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,459 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 114448 bytes
1,593,319 UART: ROM Fatal Error: 0x000B0030
1,594,476 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,444,046 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,339 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 114448 bytes
1,601,097 UART: ROM Fatal Error: 0x000B0030
1,602,254 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,446,080 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
5,782 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,197 UART:
192,566 UART: Running Caliptra ROM ...
193,751 UART:
193,908 UART: [state] CFI Enabled
265,161 UART: [state] LifecycleState = Unprovisioned
267,535 UART: [state] DebugLocked = No
269,727 UART: [state] WD Timer not started. Device not locked for debugging
274,891 UART: [kat] SHA2-256
456,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,330 UART: [kat] ++
468,934 UART: [kat] sha1
479,767 UART: [kat] SHA2-256
482,763 UART: [kat] SHA2-384
488,314 UART: [kat] SHA2-512-ACC
490,924 UART: [kat] ECC-384
3,775,417 UART: [kat] HMAC-384Kdf
3,802,075 UART: [kat] LMS
4,875,205 UART: [kat] --
4,881,019 UART: [cold-reset] ++
4,882,747 UART: [fht] FHT @ 0x50003400
4,893,249 UART: [idev] ++
4,893,919 UART: [idev] CDI.KEYID = 6
4,895,156 UART: [idev] SUBJECT.KEYID = 7
4,896,327 UART: [idev] UDS.KEYID = 0
4,929,301 UART: [idev] Erasing UDS.KEYID = 0
8,241,304 UART: [idev] Sha1 KeyId Algorithm
8,263,812 UART: [idev] --
8,267,157 UART: [ldev] ++
8,267,779 UART: [ldev] CDI.KEYID = 6
8,268,884 UART: [ldev] SUBJECT.KEYID = 5
8,270,148 UART: [ldev] AUTHORITY.KEYID = 7
8,271,301 UART: [ldev] FE.KEYID = 1
8,317,300 UART: [ldev] Erasing FE.KEYID = 1
11,652,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,831 UART: [ldev] --
14,037,018 UART: [fwproc] Wait for Commands...
14,039,068 UART: [fwproc] Recv command 0x46574c44
14,041,392 UART: [fwproc] Recv'd Img size: 114124 bytes
14,095,977 UART: ROM Fatal Error: 0x000B0001
14,099,350 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,106 writing to cptra_bootfsm_go
6,874 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,905,783 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
6,407 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,542 UART:
192,911 UART: Running Caliptra ROM ...
194,089 UART:
603,875 UART: [state] CFI Enabled
616,745 UART: [state] LifecycleState = Unprovisioned
618,741 UART: [state] DebugLocked = No
620,329 UART: [state] WD Timer not started. Device not locked for debugging
625,601 UART: [kat] SHA2-256
807,576 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,109 UART: [kat] ++
819,693 UART: [kat] sha1
830,136 UART: [kat] SHA2-256
833,140 UART: [kat] SHA2-384
839,922 UART: [kat] SHA2-512-ACC
842,569 UART: [kat] ECC-384
4,099,886 UART: [kat] HMAC-384Kdf
4,111,720 UART: [kat] LMS
5,184,881 UART: [kat] --
5,187,872 UART: [cold-reset] ++
5,189,497 UART: [fht] FHT @ 0x50003400
5,199,563 UART: [idev] ++
5,200,282 UART: [idev] CDI.KEYID = 6
5,201,472 UART: [idev] SUBJECT.KEYID = 7
5,202,904 UART: [idev] UDS.KEYID = 0
5,219,531 UART: [idev] Erasing UDS.KEYID = 0
8,491,771 UART: [idev] Sha1 KeyId Algorithm
8,513,646 UART: [idev] --
8,517,519 UART: [ldev] ++
8,518,082 UART: [ldev] CDI.KEYID = 6
8,519,319 UART: [ldev] SUBJECT.KEYID = 5
8,520,770 UART: [ldev] AUTHORITY.KEYID = 7
8,522,331 UART: [ldev] FE.KEYID = 1
8,535,028 UART: [ldev] Erasing FE.KEYID = 1
11,828,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,067 UART: [ldev] --
14,191,813 UART: [fwproc] Wait for Commands...
14,193,904 UART: [fwproc] Recv command 0x46574c44
14,196,177 UART: [fwproc] Recv'd Img size: 114124 bytes
14,252,398 UART: ROM Fatal Error: 0x000B0001
14,255,814 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
6,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,064,801 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
5,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,163 UART:
192,555 UART: Running Caliptra ROM ...
193,675 UART:
193,846 UART: [state] CFI Enabled
262,700 UART: [state] LifecycleState = Unprovisioned
264,564 UART: [state] DebugLocked = No
266,060 UART: [state] WD Timer not started. Device not locked for debugging
269,696 UART: [kat] SHA2-256
448,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,385 UART: [kat] ++
460,917 UART: [kat] sha1
472,285 UART: [kat] SHA2-256
475,294 UART: [kat] SHA2-384
481,646 UART: [kat] SHA2-512-ACC
484,644 UART: [kat] ECC-384
2,948,461 UART: [kat] HMAC-384Kdf
2,970,808 UART: [kat] LMS
3,500,304 UART: [kat] --
3,504,891 UART: [cold-reset] ++
3,506,688 UART: [fht] FHT @ 0x50003400
3,518,266 UART: [idev] ++
3,518,837 UART: [idev] CDI.KEYID = 6
3,519,746 UART: [idev] SUBJECT.KEYID = 7
3,520,965 UART: [idev] UDS.KEYID = 0
3,544,234 UART: [idev] Erasing UDS.KEYID = 0
6,024,801 UART: [idev] Sha1 KeyId Algorithm
6,047,014 UART: [idev] --
6,051,774 UART: [ldev] ++
6,052,347 UART: [ldev] CDI.KEYID = 6
6,053,258 UART: [ldev] SUBJECT.KEYID = 5
6,054,421 UART: [ldev] AUTHORITY.KEYID = 7
6,055,654 UART: [ldev] FE.KEYID = 1
6,097,423 UART: [ldev] Erasing FE.KEYID = 1
8,601,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,487 UART: [ldev] --
10,410,841 UART: [fwproc] Wait for Commands...
10,413,470 UART: [fwproc] Recv command 0x46574c44
10,415,584 UART: [fwproc] Recv'd Img size: 114448 bytes
10,469,425 UART: ROM Fatal Error: 0x000B0001
10,472,475 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
5,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,262,045 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
6,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,380 UART:
192,769 UART: Running Caliptra ROM ...
193,906 UART:
603,574 UART: [state] CFI Enabled
616,384 UART: [state] LifecycleState = Unprovisioned
618,230 UART: [state] DebugLocked = No
620,852 UART: [state] WD Timer not started. Device not locked for debugging
623,822 UART: [kat] SHA2-256
802,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,488 UART: [kat] ++
815,014 UART: [kat] sha1
826,227 UART: [kat] SHA2-256
829,289 UART: [kat] SHA2-384
835,043 UART: [kat] SHA2-512-ACC
837,979 UART: [kat] ECC-384
3,277,421 UART: [kat] HMAC-384Kdf
3,289,485 UART: [kat] LMS
3,818,937 UART: [kat] --
3,823,980 UART: [cold-reset] ++
3,825,907 UART: [fht] FHT @ 0x50003400
3,837,368 UART: [idev] ++
3,837,954 UART: [idev] CDI.KEYID = 6
3,838,870 UART: [idev] SUBJECT.KEYID = 7
3,840,079 UART: [idev] UDS.KEYID = 0
3,855,459 UART: [idev] Erasing UDS.KEYID = 0
6,312,581 UART: [idev] Sha1 KeyId Algorithm
6,335,930 UART: [idev] --
6,339,871 UART: [ldev] ++
6,340,438 UART: [ldev] CDI.KEYID = 6
6,341,376 UART: [ldev] SUBJECT.KEYID = 5
6,342,528 UART: [ldev] AUTHORITY.KEYID = 7
6,343,811 UART: [ldev] FE.KEYID = 1
6,354,536 UART: [ldev] Erasing FE.KEYID = 1
8,830,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,504 UART: [ldev] --
10,622,782 UART: [fwproc] Wait for Commands...
10,625,525 UART: [fwproc] Recv command 0x46574c44
10,627,569 UART: [fwproc] Recv'd Img size: 114448 bytes
10,682,840 UART: ROM Fatal Error: 0x000B0001
10,685,931 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
6,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,470,247 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
5,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,126 UART:
192,515 UART: Running Caliptra ROM ...
193,640 UART:
193,787 UART: [state] CFI Enabled
263,072 UART: [state] LifecycleState = Unprovisioned
264,958 UART: [state] DebugLocked = No
267,745 UART: [state] WD Timer not started. Device not locked for debugging
271,710 UART: [kat] SHA2-256
450,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,405 UART: [kat] ++
462,899 UART: [kat] sha1
475,505 UART: [kat] SHA2-256
478,542 UART: [kat] SHA2-384
485,659 UART: [kat] SHA2-512-ACC
488,649 UART: [kat] ECC-384
2,962,986 UART: [kat] HMAC-384Kdf
2,984,082 UART: [kat] LMS
3,513,543 UART: [kat] --
3,519,931 UART: [cold-reset] ++
3,522,513 UART: [fht] FHT @ 0x50003400
3,533,762 UART: [idev] ++
3,534,327 UART: [idev] CDI.KEYID = 6
3,535,233 UART: [idev] SUBJECT.KEYID = 7
3,536,456 UART: [idev] UDS.KEYID = 0
3,557,090 UART: [idev] Erasing UDS.KEYID = 0
6,039,291 UART: [idev] Sha1 KeyId Algorithm
6,061,092 UART: [idev] --
6,064,770 UART: [ldev] ++
6,065,363 UART: [ldev] CDI.KEYID = 6
6,066,285 UART: [ldev] SUBJECT.KEYID = 5
6,067,392 UART: [ldev] AUTHORITY.KEYID = 7
6,068,680 UART: [ldev] FE.KEYID = 1
6,115,927 UART: [ldev] Erasing FE.KEYID = 1
8,620,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,107 UART: [ldev] --
10,428,736 UART: [fwproc] Wait for Commands...
10,431,053 UART: [fwproc] Recv command 0x46574c44
10,433,102 UART: [fwproc] Recv'd Img size: 114448 bytes
10,490,781 UART: ROM Fatal Error: 0x000B0001
10,493,879 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,260,898 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
6,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,381 UART:
192,783 UART: Running Caliptra ROM ...
193,888 UART:
603,282 UART: [state] CFI Enabled
617,996 UART: [state] LifecycleState = Unprovisioned
619,888 UART: [state] DebugLocked = No
621,370 UART: [state] WD Timer not started. Device not locked for debugging
624,290 UART: [kat] SHA2-256
803,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,958 UART: [kat] ++
815,547 UART: [kat] sha1
826,429 UART: [kat] SHA2-256
829,418 UART: [kat] SHA2-384
834,808 UART: [kat] SHA2-512-ACC
837,736 UART: [kat] ECC-384
3,282,652 UART: [kat] HMAC-384Kdf
3,294,386 UART: [kat] LMS
3,823,869 UART: [kat] --
3,828,124 UART: [cold-reset] ++
3,830,534 UART: [fht] FHT @ 0x50003400
3,841,129 UART: [idev] ++
3,841,696 UART: [idev] CDI.KEYID = 6
3,842,633 UART: [idev] SUBJECT.KEYID = 7
3,843,844 UART: [idev] UDS.KEYID = 0
3,858,463 UART: [idev] Erasing UDS.KEYID = 0
6,313,125 UART: [idev] Sha1 KeyId Algorithm
6,335,982 UART: [idev] --
6,338,895 UART: [ldev] ++
6,339,459 UART: [ldev] CDI.KEYID = 6
6,340,395 UART: [ldev] SUBJECT.KEYID = 5
6,341,557 UART: [ldev] AUTHORITY.KEYID = 7
6,342,839 UART: [ldev] FE.KEYID = 1
6,354,596 UART: [ldev] Erasing FE.KEYID = 1
8,826,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,808 UART: [ldev] --
10,619,970 UART: [fwproc] Wait for Commands...
10,623,220 UART: [fwproc] Recv command 0x46574c44
10,625,261 UART: [fwproc] Recv'd Img size: 114448 bytes
10,680,370 UART: ROM Fatal Error: 0x000B0001
10,683,458 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
6,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,461,031 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,738 UART: [state] LifecycleState = Unprovisioned
85,393 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,181 UART: [kat] SHA2-256
901,121 UART: [kat] SHA2-384
903,788 UART: [kat] SHA2-512-ACC
905,689 UART: [kat] ECC-384
915,298 UART: [kat] HMAC-384Kdf
919,956 UART: [kat] LMS
1,168,268 UART: [kat] --
1,169,275 UART: [cold-reset] ++
1,169,647 UART: [fht] FHT @ 0x50003400
1,172,419 UART: [idev] ++
1,172,587 UART: [idev] CDI.KEYID = 6
1,172,948 UART: [idev] SUBJECT.KEYID = 7
1,173,373 UART: [idev] UDS.KEYID = 0
1,181,035 UART: [idev] Erasing UDS.KEYID = 0
1,197,917 UART: [idev] Sha1 KeyId Algorithm
1,206,767 UART: [idev] --
1,207,908 UART: [ldev] ++
1,208,076 UART: [ldev] CDI.KEYID = 6
1,208,440 UART: [ldev] SUBJECT.KEYID = 5
1,208,867 UART: [ldev] AUTHORITY.KEYID = 7
1,209,330 UART: [ldev] FE.KEYID = 1
1,214,240 UART: [ldev] Erasing FE.KEYID = 1
1,240,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,154 UART: [ldev] --
1,279,490 UART: [fwproc] Wait for Commands...
1,280,257 UART: [fwproc] Recv command 0x46574c44
1,280,990 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,121 UART: ROM Fatal Error: 0x000B0001
1,301,278 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,115 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,780 UART: [cold-reset] ++
1,171,226 UART: [fht] FHT @ 0x50003400
1,173,776 UART: [idev] ++
1,173,944 UART: [idev] CDI.KEYID = 6
1,174,305 UART: [idev] SUBJECT.KEYID = 7
1,174,730 UART: [idev] UDS.KEYID = 0
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,616 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,247 UART: [ldev] ++
1,210,415 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,557 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,957 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,716 UART: ROM Fatal Error: 0x000B0001
1,303,873 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,378 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,744 UART: [fwproc] Wait for Commands...
1,281,455 UART: [fwproc] Recv command 0x46574c44
1,282,188 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,585 UART: ROM Fatal Error: 0x000B0001
1,302,742 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,871 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,765 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,430 UART: ROM Fatal Error: 0x000B0001
1,304,587 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,682 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
85,899 UART: [state] WD Timer not started. Device not locked for debugging
87,176 UART: [kat] SHA2-256
890,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,855 UART: [kat] ++
895,007 UART: [kat] sha1
899,181 UART: [kat] SHA2-256
901,121 UART: [kat] SHA2-384
903,782 UART: [kat] SHA2-512-ACC
905,683 UART: [kat] ECC-384
915,604 UART: [kat] HMAC-384Kdf
920,226 UART: [kat] LMS
1,168,538 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,581 UART: [idev] ++
1,172,749 UART: [idev] CDI.KEYID = 6
1,173,110 UART: [idev] SUBJECT.KEYID = 7
1,173,535 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,189 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,216,162 UART: [ldev] Erasing FE.KEYID = 1
1,242,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,226 UART: [ldev] --
1,281,600 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,439 UART: ROM Fatal Error: 0x000B0001
1,303,596 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,401 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,208,805 UART: [ldev] ++
1,208,973 UART: [ldev] CDI.KEYID = 6
1,209,337 UART: [ldev] SUBJECT.KEYID = 5
1,209,764 UART: [ldev] AUTHORITY.KEYID = 7
1,210,227 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,241,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,543 UART: [ldev] --
1,280,925 UART: [fwproc] Wait for Commands...
1,281,750 UART: [fwproc] Recv command 0x46574c44
1,282,483 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,154 UART: ROM Fatal Error: 0x000B0001
1,303,311 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,282 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
5,572 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,056 UART:
192,444 UART: Running Caliptra ROM ...
193,592 UART:
193,739 UART: [state] CFI Enabled
268,704 UART: [state] LifecycleState = Unprovisioned
271,066 UART: [state] DebugLocked = No
273,532 UART: [state] WD Timer not started. Device not locked for debugging
278,440 UART: [kat] SHA2-256
460,354 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,881 UART: [kat] ++
472,471 UART: [kat] sha1
482,704 UART: [kat] SHA2-256
485,703 UART: [kat] SHA2-384
490,513 UART: [kat] SHA2-512-ACC
493,180 UART: [kat] ECC-384
3,776,849 UART: [kat] HMAC-384Kdf
3,805,043 UART: [kat] LMS
4,878,227 UART: [kat] --
4,883,191 UART: [cold-reset] ++
4,884,802 UART: [fht] FHT @ 0x50003400
4,896,049 UART: [idev] ++
4,896,731 UART: [idev] CDI.KEYID = 6
4,897,970 UART: [idev] SUBJECT.KEYID = 7
4,899,070 UART: [idev] UDS.KEYID = 0
4,932,333 UART: [idev] Erasing UDS.KEYID = 0
8,243,642 UART: [idev] Sha1 KeyId Algorithm
8,265,036 UART: [idev] --
8,269,738 UART: [ldev] ++
8,270,360 UART: [ldev] CDI.KEYID = 6
8,271,566 UART: [ldev] SUBJECT.KEYID = 5
8,272,736 UART: [ldev] AUTHORITY.KEYID = 7
8,273,831 UART: [ldev] FE.KEYID = 1
8,318,780 UART: [ldev] Erasing FE.KEYID = 1
11,649,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,878 UART: [ldev] --
14,017,854 UART: [fwproc] Wait for Commands...
14,019,958 UART: [fwproc] Recv command 0x46574c44
14,022,285 UART: [fwproc] Recv'd Img size: 114124 bytes
14,078,942 UART: ROM Fatal Error: 0x000B0002
14,082,317 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
5,399 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,903,565 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
6,562 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,496 UART:
192,878 UART: Running Caliptra ROM ...
194,065 UART:
603,834 UART: [state] CFI Enabled
619,117 UART: [state] LifecycleState = Unprovisioned
621,534 UART: [state] DebugLocked = No
622,888 UART: [state] WD Timer not started. Device not locked for debugging
627,787 UART: [kat] SHA2-256
809,759 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,292 UART: [kat] ++
821,791 UART: [kat] sha1
832,285 UART: [kat] SHA2-256
835,348 UART: [kat] SHA2-384
841,476 UART: [kat] SHA2-512-ACC
844,087 UART: [kat] ECC-384
4,096,750 UART: [kat] HMAC-384Kdf
4,108,966 UART: [kat] LMS
5,182,113 UART: [kat] --
5,188,127 UART: [cold-reset] ++
5,189,639 UART: [fht] FHT @ 0x50003400
5,200,403 UART: [idev] ++
5,201,071 UART: [idev] CDI.KEYID = 6
5,202,304 UART: [idev] SUBJECT.KEYID = 7
5,203,735 UART: [idev] UDS.KEYID = 0
5,222,593 UART: [idev] Erasing UDS.KEYID = 0
8,497,450 UART: [idev] Sha1 KeyId Algorithm
8,519,734 UART: [idev] --
8,524,647 UART: [ldev] ++
8,525,206 UART: [ldev] CDI.KEYID = 6
8,526,370 UART: [ldev] SUBJECT.KEYID = 5
8,527,852 UART: [ldev] AUTHORITY.KEYID = 7
8,529,334 UART: [ldev] FE.KEYID = 1
8,541,563 UART: [ldev] Erasing FE.KEYID = 1
11,833,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,719 UART: [ldev] --
14,198,386 UART: [fwproc] Wait for Commands...
14,200,715 UART: [fwproc] Recv command 0x46574c44
14,203,046 UART: [fwproc] Recv'd Img size: 114124 bytes
14,258,514 UART: ROM Fatal Error: 0x000B0002
14,261,939 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
6,091 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,065,878 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
5,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,095 UART:
192,489 UART: Running Caliptra ROM ...
193,652 UART:
193,802 UART: [state] CFI Enabled
265,076 UART: [state] LifecycleState = Unprovisioned
266,941 UART: [state] DebugLocked = No
268,597 UART: [state] WD Timer not started. Device not locked for debugging
272,407 UART: [kat] SHA2-256
451,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,090 UART: [kat] ++
463,542 UART: [kat] sha1
475,605 UART: [kat] SHA2-256
478,624 UART: [kat] SHA2-384
484,013 UART: [kat] SHA2-512-ACC
486,947 UART: [kat] ECC-384
2,950,705 UART: [kat] HMAC-384Kdf
2,970,936 UART: [kat] LMS
3,500,398 UART: [kat] --
3,504,605 UART: [cold-reset] ++
3,506,959 UART: [fht] FHT @ 0x50003400
3,517,726 UART: [idev] ++
3,518,296 UART: [idev] CDI.KEYID = 6
3,519,310 UART: [idev] SUBJECT.KEYID = 7
3,520,433 UART: [idev] UDS.KEYID = 0
3,543,973 UART: [idev] Erasing UDS.KEYID = 0
6,025,723 UART: [idev] Sha1 KeyId Algorithm
6,049,155 UART: [idev] --
6,052,444 UART: [ldev] ++
6,053,021 UART: [ldev] CDI.KEYID = 6
6,053,937 UART: [ldev] SUBJECT.KEYID = 5
6,055,020 UART: [ldev] AUTHORITY.KEYID = 7
6,056,369 UART: [ldev] FE.KEYID = 1
6,099,755 UART: [ldev] Erasing FE.KEYID = 1
8,605,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,689 UART: [ldev] --
10,414,033 UART: [fwproc] Wait for Commands...
10,416,081 UART: [fwproc] Recv command 0x46574c44
10,418,203 UART: [fwproc] Recv'd Img size: 114448 bytes
10,474,154 UART: ROM Fatal Error: 0x000B0002
10,477,260 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
5,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,260,481 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
7,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,422 UART:
192,948 UART: Running Caliptra ROM ...
194,072 UART:
603,522 UART: [state] CFI Enabled
617,399 UART: [state] LifecycleState = Unprovisioned
619,225 UART: [state] DebugLocked = No
622,085 UART: [state] WD Timer not started. Device not locked for debugging
626,150 UART: [kat] SHA2-256
805,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,858 UART: [kat] ++
817,305 UART: [kat] sha1
829,689 UART: [kat] SHA2-256
832,746 UART: [kat] SHA2-384
839,038 UART: [kat] SHA2-512-ACC
841,997 UART: [kat] ECC-384
3,282,334 UART: [kat] HMAC-384Kdf
3,295,072 UART: [kat] LMS
3,824,558 UART: [kat] --
3,828,655 UART: [cold-reset] ++
3,830,040 UART: [fht] FHT @ 0x50003400
3,840,965 UART: [idev] ++
3,841,532 UART: [idev] CDI.KEYID = 6
3,842,456 UART: [idev] SUBJECT.KEYID = 7
3,843,666 UART: [idev] UDS.KEYID = 0
3,859,480 UART: [idev] Erasing UDS.KEYID = 0
6,315,050 UART: [idev] Sha1 KeyId Algorithm
6,338,426 UART: [idev] --
6,342,612 UART: [ldev] ++
6,343,189 UART: [ldev] CDI.KEYID = 6
6,344,099 UART: [ldev] SUBJECT.KEYID = 5
6,345,334 UART: [ldev] AUTHORITY.KEYID = 7
6,346,566 UART: [ldev] FE.KEYID = 1
6,356,864 UART: [ldev] Erasing FE.KEYID = 1
8,826,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,471 UART: [ldev] --
10,620,083 UART: [fwproc] Wait for Commands...
10,621,694 UART: [fwproc] Recv command 0x46574c44
10,623,790 UART: [fwproc] Recv'd Img size: 114448 bytes
10,679,950 UART: ROM Fatal Error: 0x000B0002
10,683,100 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
5,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,465,479 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
5,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,113 UART:
192,503 UART: Running Caliptra ROM ...
193,582 UART:
193,725 UART: [state] CFI Enabled
262,410 UART: [state] LifecycleState = Unprovisioned
264,275 UART: [state] DebugLocked = No
265,465 UART: [state] WD Timer not started. Device not locked for debugging
270,018 UART: [kat] SHA2-256
449,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,693 UART: [kat] ++
461,289 UART: [kat] sha1
472,554 UART: [kat] SHA2-256
475,568 UART: [kat] SHA2-384
482,847 UART: [kat] SHA2-512-ACC
485,819 UART: [kat] ECC-384
2,947,779 UART: [kat] HMAC-384Kdf
2,969,858 UART: [kat] LMS
3,499,300 UART: [kat] --
3,503,026 UART: [cold-reset] ++
3,504,042 UART: [fht] FHT @ 0x50003400
3,514,187 UART: [idev] ++
3,514,748 UART: [idev] CDI.KEYID = 6
3,515,680 UART: [idev] SUBJECT.KEYID = 7
3,516,895 UART: [idev] UDS.KEYID = 0
3,541,431 UART: [idev] Erasing UDS.KEYID = 0
6,024,562 UART: [idev] Sha1 KeyId Algorithm
6,046,722 UART: [idev] --
6,050,721 UART: [ldev] ++
6,051,297 UART: [ldev] CDI.KEYID = 6
6,052,208 UART: [ldev] SUBJECT.KEYID = 5
6,053,374 UART: [ldev] AUTHORITY.KEYID = 7
6,054,663 UART: [ldev] FE.KEYID = 1
6,097,778 UART: [ldev] Erasing FE.KEYID = 1
8,600,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,845 UART: [ldev] --
10,412,770 UART: [fwproc] Wait for Commands...
10,414,653 UART: [fwproc] Recv command 0x46574c44
10,416,755 UART: [fwproc] Recv'd Img size: 114448 bytes
10,472,101 UART: ROM Fatal Error: 0x000B0002
10,475,212 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
5,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,271,957 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
6,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,432 UART:
192,818 UART: Running Caliptra ROM ...
193,985 UART:
603,394 UART: [state] CFI Enabled
621,555 UART: [state] LifecycleState = Unprovisioned
623,436 UART: [state] DebugLocked = No
625,887 UART: [state] WD Timer not started. Device not locked for debugging
629,267 UART: [kat] SHA2-256
808,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,711 UART: [kat] ++
820,244 UART: [kat] sha1
831,288 UART: [kat] SHA2-256
834,342 UART: [kat] SHA2-384
841,194 UART: [kat] SHA2-512-ACC
844,132 UART: [kat] ECC-384
3,285,672 UART: [kat] HMAC-384Kdf
3,297,898 UART: [kat] LMS
3,827,387 UART: [kat] --
3,833,845 UART: [cold-reset] ++
3,834,776 UART: [fht] FHT @ 0x50003400
3,845,974 UART: [idev] ++
3,846,547 UART: [idev] CDI.KEYID = 6
3,847,453 UART: [idev] SUBJECT.KEYID = 7
3,848,665 UART: [idev] UDS.KEYID = 0
3,863,884 UART: [idev] Erasing UDS.KEYID = 0
6,318,248 UART: [idev] Sha1 KeyId Algorithm
6,340,787 UART: [idev] --
6,344,573 UART: [ldev] ++
6,345,141 UART: [ldev] CDI.KEYID = 6
6,346,076 UART: [ldev] SUBJECT.KEYID = 5
6,347,240 UART: [ldev] AUTHORITY.KEYID = 7
6,348,473 UART: [ldev] FE.KEYID = 1
6,357,065 UART: [ldev] Erasing FE.KEYID = 1
8,826,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,732 UART: [ldev] --
10,616,293 UART: [fwproc] Wait for Commands...
10,618,549 UART: [fwproc] Recv command 0x46574c44
10,620,640 UART: [fwproc] Recv'd Img size: 114448 bytes
10,674,189 UART: ROM Fatal Error: 0x000B0002
10,677,339 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
6,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,462,874 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,182,317 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,294 UART: [ldev] ++
1,209,462 UART: [ldev] CDI.KEYID = 6
1,209,826 UART: [ldev] SUBJECT.KEYID = 5
1,210,253 UART: [ldev] AUTHORITY.KEYID = 7
1,210,716 UART: [ldev] FE.KEYID = 1
1,216,110 UART: [ldev] Erasing FE.KEYID = 1
1,242,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,408 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,012 UART: ROM Fatal Error: 0x000B0002
1,303,169 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,030 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,429 UART: [kat] LMS
1,169,741 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,541 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,577 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,475 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,827 UART: ROM Fatal Error: 0x000B0002
1,304,984 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,137 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,447 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,177 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,424 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,308 UART: ROM Fatal Error: 0x000B0002
1,303,465 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,292 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,875 UART: ROM Fatal Error: 0x000B0002
1,304,032 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,039 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,142 UART: [kat] SHA2-256
891,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,821 UART: [kat] ++
895,973 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,583 UART: [idev] --
1,209,614 UART: [ldev] ++
1,209,782 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,573 UART: [ldev] AUTHORITY.KEYID = 7
1,211,036 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,434 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,467 UART: [fwproc] Recv command 0x46574c44
1,283,200 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,768 UART: ROM Fatal Error: 0x000B0002
1,303,925 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,762 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,655 UART: [fwproc] Wait for Commands...
1,282,436 UART: [fwproc] Recv command 0x46574c44
1,283,169 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,129 UART: ROM Fatal Error: 0x000B0002
1,303,286 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,477 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,219,832 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,385,717 UART:
2,386,154 UART: Running Caliptra ROM ...
2,387,321 UART:
2,387,496 UART: [state] CFI Enabled
2,388,458 UART: [state] LifecycleState = Unprovisioned
2,390,116 UART: [state] DebugLocked = No
2,391,222 UART: [state] WD Timer not started. Device not locked for debugging
2,393,696 UART: [kat] SHA2-256
2,394,363 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,397,377 UART: [kat] ++
2,397,850 UART: [kat] sha1
2,398,367 UART: [kat] SHA2-256
2,399,109 UART: [kat] SHA2-384
2,399,775 UART: [kat] SHA2-512-ACC
2,400,605 UART: [kat] ECC-384
3,774,936 UART: [kat] HMAC-384Kdf
3,802,353 UART: [kat] LMS
4,875,483 UART: [kat] --
4,881,489 UART: [cold-reset] ++
4,883,109 UART: [fht] FHT @ 0x50003400
4,895,252 UART: [idev] ++
4,895,959 UART: [idev] CDI.KEYID = 6
4,897,147 UART: [idev] SUBJECT.KEYID = 7
4,898,307 UART: [idev] UDS.KEYID = 0
4,929,796 UART: [idev] Erasing UDS.KEYID = 0
8,244,401 UART: [idev] Sha1 KeyId Algorithm
8,267,274 UART: [idev] --
8,272,283 UART: [ldev] ++
8,272,863 UART: [ldev] CDI.KEYID = 6
8,274,105 UART: [ldev] SUBJECT.KEYID = 5
8,275,209 UART: [ldev] AUTHORITY.KEYID = 7
8,276,434 UART: [ldev] FE.KEYID = 1
8,317,277 UART: [ldev] Erasing FE.KEYID = 1
11,650,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,969 UART: [ldev] --
14,017,925 UART: [fwproc] Wait for Commands...
14,020,291 UART: [fwproc] Recv command 0x46574c44
14,022,601 UART: [fwproc] Recv'd Img size: 131072 bytes
18,311,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,383,169 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,443,383 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,828,779 >>> mbox cmd response: success
18,832,951 UART: [afmc] ++
18,833,653 UART: [afmc] CDI.KEYID = 6
18,834,837 UART: [afmc] SUBJECT.KEYID = 7
18,835,993 UART: [afmc] AUTHORITY.KEYID = 5
22,195,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,497,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,499,315 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,515,475 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,531,634 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,547,403 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,570,352 UART: [afmc] --
24,577,286 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,734,726 UART: [cold-reset] --
24,735,579 UART: [state] Locking Datavault
24,736,737 UART: [state] Locking PCR0, PCR1 and PCR31
24,738,268 UART: [state] Locking ICCM
24,739,174 UART: [exit] Launching FMC @ 0x40000000
24,740,594 UART:
24,740,753 UART: Running Caliptra FMC ...
24,741,845 UART:
24,742,001 UART: [fmc] Received command: 0x1000000E
25,519,101 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,215,156 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,607,590 >>> mbox cmd response: success
24,279,298 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,436,739 UART:
24,437,117 UART: Running Caliptra FMC ...
24,438,342 UART:
24,438,509 UART: [fmc] Received command: 0x1000000E
25,221,140 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
2,223,710 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,579 UART:
2,389,991 UART: Running Caliptra ROM ...
2,391,080 UART:
2,391,261 UART: [state] CFI Enabled
2,392,230 UART: [state] LifecycleState = Unprovisioned
2,393,879 UART: [state] DebugLocked = No
2,394,898 UART: [state] WD Timer not started. Device not locked for debugging
2,397,360 UART: [kat] SHA2-256
2,398,020 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,401,023 UART: [kat] ++
2,401,466 UART: [kat] sha1
2,401,968 UART: [kat] SHA2-256
2,402,616 UART: [kat] SHA2-384
2,403,265 UART: [kat] SHA2-512-ACC
2,404,057 UART: [kat] ECC-384
4,101,820 UART: [kat] HMAC-384Kdf
4,114,212 UART: [kat] LMS
5,187,371 UART: [kat] --
5,191,184 UART: [cold-reset] ++
5,192,385 UART: [fht] FHT @ 0x50003400
5,202,886 UART: [idev] ++
5,203,557 UART: [idev] CDI.KEYID = 6
5,204,785 UART: [idev] SUBJECT.KEYID = 7
5,206,212 UART: [idev] UDS.KEYID = 0
5,224,626 UART: [idev] Erasing UDS.KEYID = 0
8,495,790 UART: [idev] Sha1 KeyId Algorithm
8,518,383 UART: [idev] --
8,522,806 UART: [ldev] ++
8,523,422 UART: [ldev] CDI.KEYID = 6
8,524,525 UART: [ldev] SUBJECT.KEYID = 5
8,526,058 UART: [ldev] AUTHORITY.KEYID = 7
8,527,538 UART: [ldev] FE.KEYID = 1
8,539,315 UART: [ldev] Erasing FE.KEYID = 1
11,831,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,322 UART: [ldev] --
14,198,719 UART: [fwproc] Wait for Commands...
14,201,781 UART: [fwproc] Recv command 0x46574c44
14,204,091 UART: [fwproc] Recv'd Img size: 131072 bytes
18,489,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,565,229 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,625,492 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
19,010,332 >>> mbox cmd response: success
19,014,247 UART: [afmc] ++
19,014,955 UART: [afmc] CDI.KEYID = 6
19,016,062 UART: [afmc] SUBJECT.KEYID = 7
19,017,274 UART: [afmc] AUTHORITY.KEYID = 5
22,332,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,628,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,630,862 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,647,026 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,663,145 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,678,969 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,701,554 UART: [afmc] --
24,706,972 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,864,227 UART: [cold-reset] --
24,865,088 UART: [state] Locking Datavault
24,866,241 UART: [state] Locking PCR0, PCR1 and PCR31
24,867,768 UART: [state] Locking ICCM
24,868,670 UART: [exit] Launching FMC @ 0x40000000
24,870,082 UART:
24,870,241 UART: Running Caliptra FMC ...
24,871,329 UART:
24,871,475 UART: [fmc] Received command: 0x1000000E
25,648,626 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
2,215,588 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,801,720 >>> mbox cmd response: success
24,424,345 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,581,769 UART:
24,582,136 UART: Running Caliptra FMC ...
24,583,352 UART:
24,583,527 UART: [fmc] Received command: 0x1000000E
25,366,189 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,223,753 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,578 UART:
2,390,016 UART: Running Caliptra ROM ...
2,391,190 UART:
2,391,387 UART: [state] CFI Enabled
2,392,358 UART: [state] LifecycleState = Unprovisioned
2,394,022 UART: [state] DebugLocked = No
2,395,139 UART: [state] WD Timer not started. Device not locked for debugging
2,397,621 UART: [kat] SHA2-256
2,398,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,297 UART: [kat] ++
2,401,749 UART: [kat] sha1
2,402,261 UART: [kat] SHA2-256
2,403,006 UART: [kat] SHA2-384
2,403,677 UART: [kat] SHA2-512-ACC
2,404,562 UART: [kat] ECC-384
2,947,771 UART: [kat] HMAC-384Kdf
2,970,518 UART: [kat] LMS
3,499,970 UART: [kat] --
3,505,236 UART: [cold-reset] ++
3,506,986 UART: [fht] FHT @ 0x50003400
3,518,090 UART: [idev] ++
3,518,663 UART: [idev] CDI.KEYID = 6
3,519,542 UART: [idev] SUBJECT.KEYID = 7
3,520,760 UART: [idev] UDS.KEYID = 0
3,542,767 UART: [idev] Erasing UDS.KEYID = 0
6,027,888 UART: [idev] Sha1 KeyId Algorithm
6,050,259 UART: [idev] --
6,053,508 UART: [ldev] ++
6,054,083 UART: [ldev] CDI.KEYID = 6
6,054,972 UART: [ldev] SUBJECT.KEYID = 5
6,056,193 UART: [ldev] AUTHORITY.KEYID = 7
6,057,430 UART: [ldev] FE.KEYID = 1
6,097,263 UART: [ldev] Erasing FE.KEYID = 1
8,601,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,026 UART: [ldev] --
10,411,435 UART: [fwproc] Wait for Commands...
10,413,699 UART: [fwproc] Recv command 0x46574c44
10,415,802 UART: [fwproc] Recv'd Img size: 131072 bytes
14,017,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,345 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,154,681 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,540,095 >>> mbox cmd response: success
14,543,842 UART: [afmc] ++
14,544,436 UART: [afmc] CDI.KEYID = 6
14,545,351 UART: [afmc] SUBJECT.KEYID = 7
14,546,511 UART: [afmc] AUTHORITY.KEYID = 5
17,086,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,809,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,811,047 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,827,160 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,843,190 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,858,927 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,881,658 UART: [afmc] --
18,888,846 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,046,120 UART: [cold-reset] --
19,046,974 UART: [state] Locking Datavault
19,048,050 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,596 UART: [state] Locking ICCM
19,050,479 UART: [exit] Launching FMC @ 0x40000000
19,051,823 UART:
19,051,973 UART: Running Caliptra FMC ...
19,053,077 UART:
19,053,238 UART: [fmc] Received command: 0x1000000E
19,830,541 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,222,022 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,347,661 >>> mbox cmd response: success
18,631,780 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,789,249 UART:
18,789,628 UART: Running Caliptra FMC ...
18,790,750 UART:
18,790,903 UART: [fmc] Received command: 0x1000000E
19,573,627 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,224,269 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,964 UART:
2,390,381 UART: Running Caliptra ROM ...
2,391,501 UART:
2,391,668 UART: [state] CFI Enabled
2,392,633 UART: [state] LifecycleState = Unprovisioned
2,394,301 UART: [state] DebugLocked = No
2,395,406 UART: [state] WD Timer not started. Device not locked for debugging
2,397,880 UART: [kat] SHA2-256
2,398,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,561 UART: [kat] ++
2,402,008 UART: [kat] sha1
2,402,524 UART: [kat] SHA2-256
2,403,180 UART: [kat] SHA2-384
2,403,866 UART: [kat] SHA2-512-ACC
2,404,752 UART: [kat] ECC-384
3,280,115 UART: [kat] HMAC-384Kdf
3,293,354 UART: [kat] LMS
3,822,832 UART: [kat] --
3,826,789 UART: [cold-reset] ++
3,828,397 UART: [fht] FHT @ 0x50003400
3,839,116 UART: [idev] ++
3,839,676 UART: [idev] CDI.KEYID = 6
3,840,609 UART: [idev] SUBJECT.KEYID = 7
3,841,817 UART: [idev] UDS.KEYID = 0
3,860,111 UART: [idev] Erasing UDS.KEYID = 0
6,313,191 UART: [idev] Sha1 KeyId Algorithm
6,336,696 UART: [idev] --
6,340,618 UART: [ldev] ++
6,341,195 UART: [ldev] CDI.KEYID = 6
6,342,107 UART: [ldev] SUBJECT.KEYID = 5
6,343,266 UART: [ldev] AUTHORITY.KEYID = 7
6,344,569 UART: [ldev] FE.KEYID = 1
6,355,271 UART: [ldev] Erasing FE.KEYID = 1
8,828,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,074 UART: [ldev] --
10,618,094 UART: [fwproc] Wait for Commands...
10,619,866 UART: [fwproc] Recv command 0x46574c44
10,621,956 UART: [fwproc] Recv'd Img size: 131072 bytes
14,229,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,306,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,367,149 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,751,610 >>> mbox cmd response: success
14,756,480 UART: [afmc] ++
14,757,088 UART: [afmc] CDI.KEYID = 6
14,758,004 UART: [afmc] SUBJECT.KEYID = 7
14,759,165 UART: [afmc] AUTHORITY.KEYID = 5
17,258,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,797 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,996,889 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,012,940 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,028,586 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,051,975 UART: [afmc] --
19,058,773 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,215,888 UART: [cold-reset] --
19,216,887 UART: [state] Locking Datavault
19,218,048 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,584 UART: [state] Locking ICCM
19,220,490 UART: [exit] Launching FMC @ 0x40000000
19,221,932 UART:
19,222,095 UART: Running Caliptra FMC ...
19,223,193 UART:
19,223,344 UART: [fmc] Received command: 0x1000000E
20,000,285 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,218,552 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,533,923 >>> mbox cmd response: success
18,772,677 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,930,148 UART:
18,930,525 UART: Running Caliptra FMC ...
18,931,741 UART:
18,931,913 UART: [fmc] Received command: 0x1000000E
19,714,535 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,223,004 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,388,834 UART:
2,389,298 UART: Running Caliptra ROM ...
2,390,393 UART:
2,390,545 UART: [state] CFI Enabled
2,391,514 UART: [state] LifecycleState = Unprovisioned
2,393,185 UART: [state] DebugLocked = No
2,394,207 UART: [state] WD Timer not started. Device not locked for debugging
2,396,678 UART: [kat] SHA2-256
2,397,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,400,357 UART: [kat] ++
2,400,804 UART: [kat] sha1
2,401,315 UART: [kat] SHA2-256
2,401,972 UART: [kat] SHA2-384
2,402,625 UART: [kat] SHA2-512-ACC
2,403,623 UART: [kat] ECC-384
2,948,144 UART: [kat] HMAC-384Kdf
2,970,994 UART: [kat] LMS
3,500,441 UART: [kat] --
3,504,280 UART: [cold-reset] ++
3,505,289 UART: [fht] FHT @ 0x50003400
3,516,999 UART: [idev] ++
3,517,560 UART: [idev] CDI.KEYID = 6
3,518,494 UART: [idev] SUBJECT.KEYID = 7
3,519,704 UART: [idev] UDS.KEYID = 0
3,543,326 UART: [idev] Erasing UDS.KEYID = 0
6,025,184 UART: [idev] Sha1 KeyId Algorithm
6,047,715 UART: [idev] --
6,053,007 UART: [ldev] ++
6,053,628 UART: [ldev] CDI.KEYID = 6
6,054,522 UART: [ldev] SUBJECT.KEYID = 5
6,055,692 UART: [ldev] AUTHORITY.KEYID = 7
6,056,854 UART: [ldev] FE.KEYID = 1
6,099,718 UART: [ldev] Erasing FE.KEYID = 1
8,602,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,793 UART: [ldev] --
10,390,643 UART: [fwproc] Wait for Commands...
10,393,833 UART: [fwproc] Recv command 0x46574c44
10,395,934 UART: [fwproc] Recv'd Img size: 131072 bytes
13,995,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,066,333 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,676 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,511,394 >>> mbox cmd response: success
14,515,912 UART: [afmc] ++
14,516,509 UART: [afmc] CDI.KEYID = 6
14,517,426 UART: [afmc] SUBJECT.KEYID = 7
14,518,606 UART: [afmc] AUTHORITY.KEYID = 5
17,062,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,853 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,801,921 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,817,977 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,833,654 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,855,248 UART: [afmc] --
18,862,126 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,019,410 UART: [cold-reset] --
19,020,271 UART: [state] Locking Datavault
19,021,354 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,894 UART: [state] Locking ICCM
19,023,778 UART: [exit] Launching FMC @ 0x40000000
19,025,121 UART:
19,025,269 UART: Running Caliptra FMC ...
19,026,392 UART:
19,026,548 UART: [fmc] Received command: 0x1000000E
19,803,842 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
2,218,429 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,311,289 >>> mbox cmd response: success
18,585,959 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,743,326 UART:
18,743,718 UART: Running Caliptra FMC ...
18,744,995 UART:
18,745,167 UART: [fmc] Received command: 0x1000000E
19,527,761 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
2,223,703 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,399 UART:
2,389,830 UART: Running Caliptra ROM ...
2,391,006 UART:
2,391,184 UART: [state] CFI Enabled
2,392,160 UART: [state] LifecycleState = Unprovisioned
2,393,826 UART: [state] DebugLocked = No
2,394,934 UART: [state] WD Timer not started. Device not locked for debugging
2,397,632 UART: [kat] SHA2-256
2,398,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,322 UART: [kat] ++
2,401,777 UART: [kat] sha1
2,402,371 UART: [kat] SHA2-256
2,403,032 UART: [kat] SHA2-384
2,403,692 UART: [kat] SHA2-512-ACC
2,404,496 UART: [kat] ECC-384
3,284,325 UART: [kat] HMAC-384Kdf
3,296,447 UART: [kat] LMS
3,825,921 UART: [kat] --
3,830,209 UART: [cold-reset] ++
3,832,189 UART: [fht] FHT @ 0x50003400
3,843,828 UART: [idev] ++
3,844,446 UART: [idev] CDI.KEYID = 6
3,845,368 UART: [idev] SUBJECT.KEYID = 7
3,846,528 UART: [idev] UDS.KEYID = 0
3,863,096 UART: [idev] Erasing UDS.KEYID = 0
6,323,741 UART: [idev] Sha1 KeyId Algorithm
6,348,108 UART: [idev] --
6,352,425 UART: [ldev] ++
6,352,989 UART: [ldev] CDI.KEYID = 6
6,353,871 UART: [ldev] SUBJECT.KEYID = 5
6,355,079 UART: [ldev] AUTHORITY.KEYID = 7
6,356,370 UART: [ldev] FE.KEYID = 1
6,367,774 UART: [ldev] Erasing FE.KEYID = 1
8,843,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,347 UART: [ldev] --
10,634,418 UART: [fwproc] Wait for Commands...
10,637,323 UART: [fwproc] Recv command 0x46574c44
10,639,380 UART: [fwproc] Recv'd Img size: 131072 bytes
14,249,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,321,197 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,381,472 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,767,386 >>> mbox cmd response: success
14,771,122 UART: [afmc] ++
14,771,710 UART: [afmc] CDI.KEYID = 6
14,772,617 UART: [afmc] SUBJECT.KEYID = 7
14,773,773 UART: [afmc] AUTHORITY.KEYID = 5
17,273,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,993,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,995,343 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
19,011,351 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,027,452 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,043,136 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,064,985 UART: [afmc] --
19,071,705 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,228,941 UART: [cold-reset] --
19,229,800 UART: [state] Locking Datavault
19,230,956 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,492 UART: [state] Locking ICCM
19,233,452 UART: [exit] Launching FMC @ 0x40000000
19,234,877 UART:
19,235,036 UART: Running Caliptra FMC ...
19,236,134 UART:
19,236,283 UART: [fmc] Received command: 0x1000000E
20,013,364 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
2,216,612 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,537,417 >>> mbox cmd response: success
18,776,129 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,933,944 UART:
18,934,331 UART: Running Caliptra FMC ...
18,935,557 UART:
18,935,733 UART: [fmc] Received command: 0x1000000E
19,718,375 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,491 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,281,012 UART: [fwproc] Wait for Commands...
1,281,805 UART: [fwproc] Recv command 0x46574c44
1,282,538 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,206 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,891 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,471 >>> mbox cmd response: success
2,991,554 UART: [afmc] ++
2,991,722 UART: [afmc] CDI.KEYID = 6
2,992,085 UART: [afmc] SUBJECT.KEYID = 7
2,992,511 UART: [afmc] AUTHORITY.KEYID = 5
3,027,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,183 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,879 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,778 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,471 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,399 UART: [afmc] --
3,071,357 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,379 UART: [cold-reset] --
3,072,353 UART: [state] Locking Datavault
3,073,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,110 UART: [state] Locking ICCM
3,074,752 UART: [exit] Launching FMC @ 0x40000000
3,080,049 UART:
3,080,065 UART: Running Caliptra FMC ...
3,080,473 UART:
3,080,703 UART: [fmc] Received command: 0x1000000E
3,425,757 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,403 >>> mbox cmd response: success
2,895,972 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,069 UART:
2,902,085 UART: Running Caliptra FMC ...
2,902,493 UART:
2,902,723 UART: [fmc] Received command: 0x1000000E
3,247,777 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,953 UART: [ldev] ++
1,209,121 UART: [ldev] CDI.KEYID = 6
1,209,485 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,338 UART: [fwproc] Recv command 0x46574c44
1,283,071 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,771 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,456 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,920 >>> mbox cmd response: success
2,990,125 UART: [afmc] ++
2,990,293 UART: [afmc] CDI.KEYID = 6
2,990,656 UART: [afmc] SUBJECT.KEYID = 7
2,991,082 UART: [afmc] AUTHORITY.KEYID = 5
3,027,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,348 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,044 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,943 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,636 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,536 UART: [afmc] --
3,070,564 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,586 UART: [cold-reset] --
3,071,328 UART: [state] Locking Datavault
3,072,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,153 UART: [state] Locking ICCM
3,073,797 UART: [exit] Launching FMC @ 0x40000000
3,079,094 UART:
3,079,110 UART: Running Caliptra FMC ...
3,079,518 UART:
3,079,748 UART: [fmc] Received command: 0x1000000E
3,424,802 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,162 >>> mbox cmd response: success
2,894,697 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,428 UART:
2,900,444 UART: Running Caliptra FMC ...
2,900,852 UART:
2,901,082 UART: [fmc] Received command: 0x1000000E
3,246,136 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,348 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,527 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,558 UART: [ldev] ++
1,209,726 UART: [ldev] CDI.KEYID = 6
1,210,090 UART: [ldev] SUBJECT.KEYID = 5
1,210,517 UART: [ldev] AUTHORITY.KEYID = 7
1,210,980 UART: [ldev] FE.KEYID = 1
1,216,182 UART: [ldev] Erasing FE.KEYID = 1
1,242,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,982 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,667 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,203 >>> mbox cmd response: success
2,990,238 UART: [afmc] ++
2,990,406 UART: [afmc] CDI.KEYID = 6
2,990,769 UART: [afmc] SUBJECT.KEYID = 7
2,991,195 UART: [afmc] AUTHORITY.KEYID = 5
3,026,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,173 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,869 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,768 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,461 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,357 UART: [afmc] --
3,069,235 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,257 UART: [cold-reset] --
3,070,197 UART: [state] Locking Datavault
3,071,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,874 UART: [state] Locking ICCM
3,072,356 UART: [exit] Launching FMC @ 0x40000000
3,077,653 UART:
3,077,669 UART: Running Caliptra FMC ...
3,078,077 UART:
3,078,307 UART: [fmc] Received command: 0x1000000E
3,423,361 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,925 >>> mbox cmd response: success
2,895,906 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,913 UART:
2,901,929 UART: Running Caliptra FMC ...
2,902,337 UART:
2,902,567 UART: [fmc] Received command: 0x1000000E
3,247,621 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,200,402 UART: [idev] Sha1 KeyId Algorithm
1,209,180 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,789 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,477 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,624 UART: [fwproc] Recv command 0x46574c44
1,284,357 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,091 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,776 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,270 >>> mbox cmd response: success
2,990,497 UART: [afmc] ++
2,990,665 UART: [afmc] CDI.KEYID = 6
2,991,028 UART: [afmc] SUBJECT.KEYID = 7
2,991,454 UART: [afmc] AUTHORITY.KEYID = 5
3,027,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,472 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,168 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,067 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,760 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,616 UART: [afmc] --
3,070,712 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,734 UART: [cold-reset] --
3,071,424 UART: [state] Locking Datavault
3,072,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,199 UART: [state] Locking ICCM
3,073,831 UART: [exit] Launching FMC @ 0x40000000
3,079,128 UART:
3,079,144 UART: Running Caliptra FMC ...
3,079,552 UART:
3,079,782 UART: [fmc] Received command: 0x1000000E
3,424,836 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,024 >>> mbox cmd response: success
2,895,803 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,768 UART:
2,901,784 UART: Running Caliptra FMC ...
2,902,192 UART:
2,902,422 UART: [fmc] Received command: 0x1000000E
3,247,476 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,009 UART: [kat] ++
895,161 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,474 UART: [ldev] ++
1,208,642 UART: [ldev] CDI.KEYID = 6
1,209,006 UART: [ldev] SUBJECT.KEYID = 5
1,209,433 UART: [ldev] AUTHORITY.KEYID = 7
1,209,896 UART: [ldev] FE.KEYID = 1
1,214,958 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,450 UART: [ldev] --
1,280,934 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,724 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,409 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,989 >>> mbox cmd response: success
2,990,188 UART: [afmc] ++
2,990,356 UART: [afmc] CDI.KEYID = 6
2,990,719 UART: [afmc] SUBJECT.KEYID = 7
2,991,145 UART: [afmc] AUTHORITY.KEYID = 5
3,025,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,721 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,417 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,316 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,009 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,985 UART: [afmc] --
3,068,881 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,068,903 UART: [cold-reset] --
3,069,497 UART: [state] Locking Datavault
3,070,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,458 UART: [state] Locking ICCM
3,072,124 UART: [exit] Launching FMC @ 0x40000000
3,077,421 UART:
3,077,437 UART: Running Caliptra FMC ...
3,077,845 UART:
3,078,075 UART: [fmc] Received command: 0x1000000E
3,423,129 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,421 >>> mbox cmd response: success
2,894,398 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,227 UART:
2,900,243 UART: Running Caliptra FMC ...
2,900,651 UART:
2,900,881 UART: [fmc] Received command: 0x1000000E
3,245,935 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,200,360 UART: [idev] Sha1 KeyId Algorithm
1,209,154 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,781 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,691 UART: [ldev] --
1,283,115 UART: [fwproc] Wait for Commands...
1,283,932 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 131072 bytes
2,774,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,801,281 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,966 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,991,562 >>> mbox cmd response: success
2,992,733 UART: [afmc] ++
2,992,901 UART: [afmc] CDI.KEYID = 6
2,993,264 UART: [afmc] SUBJECT.KEYID = 7
2,993,690 UART: [afmc] AUTHORITY.KEYID = 5
3,028,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,532 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,228 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,127 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,820 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,706 UART: [afmc] --
3,071,810 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,832 UART: [cold-reset] --
3,072,788 UART: [state] Locking Datavault
3,073,925 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,529 UART: [state] Locking ICCM
3,075,099 UART: [exit] Launching FMC @ 0x40000000
3,080,396 UART:
3,080,412 UART: Running Caliptra FMC ...
3,080,820 UART:
3,081,050 UART: [fmc] Received command: 0x1000000E
3,426,104 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,554 >>> mbox cmd response: success
2,895,307 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,282 UART:
2,901,298 UART: Running Caliptra FMC ...
2,901,706 UART:
2,901,936 UART: [fmc] Received command: 0x1000000E
3,246,990 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
5,547 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,003 UART:
192,400 UART: Running Caliptra ROM ...
193,697 UART:
193,855 UART: [state] CFI Enabled
267,929 UART: [state] LifecycleState = Unprovisioned
270,308 UART: [state] DebugLocked = No
272,070 UART: [state] WD Timer not started. Device not locked for debugging
276,619 UART: [kat] SHA2-256
458,515 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,075 UART: [kat] ++
470,552 UART: [kat] sha1
481,162 UART: [kat] SHA2-256
484,168 UART: [kat] SHA2-384
490,191 UART: [kat] SHA2-512-ACC
492,809 UART: [kat] ECC-384
3,778,270 UART: [kat] HMAC-384Kdf
3,803,942 UART: [kat] LMS
4,877,089 UART: [kat] --
4,881,639 UART: [cold-reset] ++
4,883,198 UART: [fht] FHT @ 0x50003400
4,895,098 UART: [idev] ++
4,895,823 UART: [idev] CDI.KEYID = 6
4,896,933 UART: [idev] SUBJECT.KEYID = 7
4,898,149 UART: [idev] UDS.KEYID = 0
4,930,133 UART: [idev] Erasing UDS.KEYID = 0
8,244,116 UART: [idev] Sha1 KeyId Algorithm
8,266,681 UART: [idev] --
8,269,186 UART: [ldev] ++
8,269,813 UART: [ldev] CDI.KEYID = 6
8,270,990 UART: [ldev] SUBJECT.KEYID = 5
8,272,148 UART: [ldev] AUTHORITY.KEYID = 7
8,273,396 UART: [ldev] FE.KEYID = 1
8,318,353 UART: [ldev] Erasing FE.KEYID = 1
11,653,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,977 UART: [ldev] --
14,037,149 UART: [fwproc] Wait for Commands...
14,040,173 UART: [fwproc] Recv command 0x46574c44
14,042,433 UART: [fwproc] Recv'd Img size: 114124 bytes
14,113,490 UART: ROM Fatal Error: 0x000B0007
14,116,903 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
6,100 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,869,106 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
6,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,439 UART:
192,827 UART: Running Caliptra ROM ...
194,128 UART:
603,705 UART: [state] CFI Enabled
616,232 UART: [state] LifecycleState = Unprovisioned
618,628 UART: [state] DebugLocked = No
621,004 UART: [state] WD Timer not started. Device not locked for debugging
625,767 UART: [kat] SHA2-256
807,763 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,312 UART: [kat] ++
819,829 UART: [kat] sha1
830,867 UART: [kat] SHA2-256
833,876 UART: [kat] SHA2-384
839,576 UART: [kat] SHA2-512-ACC
842,181 UART: [kat] ECC-384
4,099,832 UART: [kat] HMAC-384Kdf
4,110,347 UART: [kat] LMS
5,183,481 UART: [kat] --
5,186,261 UART: [cold-reset] ++
5,188,367 UART: [fht] FHT @ 0x50003400
5,199,724 UART: [idev] ++
5,200,389 UART: [idev] CDI.KEYID = 6
5,201,620 UART: [idev] SUBJECT.KEYID = 7
5,203,047 UART: [idev] UDS.KEYID = 0
5,217,379 UART: [idev] Erasing UDS.KEYID = 0
8,493,442 UART: [idev] Sha1 KeyId Algorithm
8,514,946 UART: [idev] --
8,519,210 UART: [ldev] ++
8,519,777 UART: [ldev] CDI.KEYID = 6
8,520,943 UART: [ldev] SUBJECT.KEYID = 5
8,522,472 UART: [ldev] AUTHORITY.KEYID = 7
8,523,950 UART: [ldev] FE.KEYID = 1
8,537,207 UART: [ldev] Erasing FE.KEYID = 1
11,829,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,031 UART: [ldev] --
14,193,944 UART: [fwproc] Wait for Commands...
14,195,387 UART: [fwproc] Recv command 0x46574c44
14,197,365 UART: [fwproc] Recv'd Img size: 114124 bytes
14,265,000 UART: ROM Fatal Error: 0x000B0007
14,268,422 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
6,401 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,077,995 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
5,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,140 UART:
192,524 UART: Running Caliptra ROM ...
193,685 UART:
193,833 UART: [state] CFI Enabled
265,417 UART: [state] LifecycleState = Unprovisioned
267,271 UART: [state] DebugLocked = No
269,462 UART: [state] WD Timer not started. Device not locked for debugging
273,251 UART: [kat] SHA2-256
452,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,959 UART: [kat] ++
464,490 UART: [kat] sha1
475,706 UART: [kat] SHA2-256
478,766 UART: [kat] SHA2-384
484,642 UART: [kat] SHA2-512-ACC
487,634 UART: [kat] ECC-384
2,948,689 UART: [kat] HMAC-384Kdf
2,972,612 UART: [kat] LMS
3,502,069 UART: [kat] --
3,506,493 UART: [cold-reset] ++
3,508,479 UART: [fht] FHT @ 0x50003400
3,519,525 UART: [idev] ++
3,520,101 UART: [idev] CDI.KEYID = 6
3,520,984 UART: [idev] SUBJECT.KEYID = 7
3,522,199 UART: [idev] UDS.KEYID = 0
3,543,474 UART: [idev] Erasing UDS.KEYID = 0
6,025,623 UART: [idev] Sha1 KeyId Algorithm
6,048,244 UART: [idev] --
6,052,702 UART: [ldev] ++
6,053,286 UART: [ldev] CDI.KEYID = 6
6,054,202 UART: [ldev] SUBJECT.KEYID = 5
6,055,371 UART: [ldev] AUTHORITY.KEYID = 7
6,056,607 UART: [ldev] FE.KEYID = 1
6,099,125 UART: [ldev] Erasing FE.KEYID = 1
8,602,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,800 UART: [ldev] --
10,412,610 UART: [fwproc] Wait for Commands...
10,415,363 UART: [fwproc] Recv command 0x46574c44
10,417,461 UART: [fwproc] Recv'd Img size: 114448 bytes
10,482,203 UART: ROM Fatal Error: 0x000B0007
10,485,312 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
5,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,245,644 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
7,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,407 UART:
192,801 UART: Running Caliptra ROM ...
193,965 UART:
603,708 UART: [state] CFI Enabled
616,788 UART: [state] LifecycleState = Unprovisioned
618,672 UART: [state] DebugLocked = No
620,118 UART: [state] WD Timer not started. Device not locked for debugging
624,387 UART: [kat] SHA2-256
803,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,086 UART: [kat] ++
815,640 UART: [kat] sha1
825,877 UART: [kat] SHA2-256
828,887 UART: [kat] SHA2-384
834,106 UART: [kat] SHA2-512-ACC
837,086 UART: [kat] ECC-384
3,279,889 UART: [kat] HMAC-384Kdf
3,293,687 UART: [kat] LMS
3,823,200 UART: [kat] --
3,827,839 UART: [cold-reset] ++
3,830,034 UART: [fht] FHT @ 0x50003400
3,841,170 UART: [idev] ++
3,841,731 UART: [idev] CDI.KEYID = 6
3,842,682 UART: [idev] SUBJECT.KEYID = 7
3,843,840 UART: [idev] UDS.KEYID = 0
3,858,957 UART: [idev] Erasing UDS.KEYID = 0
6,314,669 UART: [idev] Sha1 KeyId Algorithm
6,337,787 UART: [idev] --
6,341,586 UART: [ldev] ++
6,342,166 UART: [ldev] CDI.KEYID = 6
6,343,050 UART: [ldev] SUBJECT.KEYID = 5
6,344,305 UART: [ldev] AUTHORITY.KEYID = 7
6,345,571 UART: [ldev] FE.KEYID = 1
6,355,922 UART: [ldev] Erasing FE.KEYID = 1
8,830,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,799 UART: [ldev] --
10,623,255 UART: [fwproc] Wait for Commands...
10,624,700 UART: [fwproc] Recv command 0x46574c44
10,626,791 UART: [fwproc] Recv'd Img size: 114448 bytes
10,692,454 UART: ROM Fatal Error: 0x000B0007
10,695,592 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,550 writing to cptra_bootfsm_go
6,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,134 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
6,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,067 UART:
193,445 UART: Running Caliptra ROM ...
194,604 UART:
194,757 UART: [state] CFI Enabled
266,574 UART: [state] LifecycleState = Unprovisioned
268,424 UART: [state] DebugLocked = No
270,397 UART: [state] WD Timer not started. Device not locked for debugging
274,401 UART: [kat] SHA2-256
453,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,103 UART: [kat] ++
465,636 UART: [kat] sha1
476,300 UART: [kat] SHA2-256
479,326 UART: [kat] SHA2-384
486,024 UART: [kat] SHA2-512-ACC
488,963 UART: [kat] ECC-384
2,948,581 UART: [kat] HMAC-384Kdf
2,973,175 UART: [kat] LMS
3,502,663 UART: [kat] --
3,507,140 UART: [cold-reset] ++
3,508,151 UART: [fht] FHT @ 0x50003400
3,519,101 UART: [idev] ++
3,519,665 UART: [idev] CDI.KEYID = 6
3,520,551 UART: [idev] SUBJECT.KEYID = 7
3,521,944 UART: [idev] UDS.KEYID = 0
3,546,277 UART: [idev] Erasing UDS.KEYID = 0
6,032,059 UART: [idev] Sha1 KeyId Algorithm
6,055,910 UART: [idev] --
6,060,126 UART: [ldev] ++
6,060,715 UART: [ldev] CDI.KEYID = 6
6,061,603 UART: [ldev] SUBJECT.KEYID = 5
6,062,767 UART: [ldev] AUTHORITY.KEYID = 7
6,064,060 UART: [ldev] FE.KEYID = 1
6,101,800 UART: [ldev] Erasing FE.KEYID = 1
8,606,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,499 UART: [ldev] --
10,415,717 UART: [fwproc] Wait for Commands...
10,417,273 UART: [fwproc] Recv command 0x46574c44
10,419,318 UART: [fwproc] Recv'd Img size: 114448 bytes
10,485,599 UART: ROM Fatal Error: 0x000B0007
10,488,736 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,267,950 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
6,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,788 UART:
193,175 UART: Running Caliptra ROM ...
194,337 UART:
603,870 UART: [state] CFI Enabled
619,891 UART: [state] LifecycleState = Unprovisioned
621,750 UART: [state] DebugLocked = No
623,559 UART: [state] WD Timer not started. Device not locked for debugging
627,407 UART: [kat] SHA2-256
806,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,113 UART: [kat] ++
818,643 UART: [kat] sha1
830,825 UART: [kat] SHA2-256
833,826 UART: [kat] SHA2-384
840,012 UART: [kat] SHA2-512-ACC
843,005 UART: [kat] ECC-384
3,283,215 UART: [kat] HMAC-384Kdf
3,297,317 UART: [kat] LMS
3,826,778 UART: [kat] --
3,831,847 UART: [cold-reset] ++
3,832,857 UART: [fht] FHT @ 0x50003400
3,843,323 UART: [idev] ++
3,843,879 UART: [idev] CDI.KEYID = 6
3,844,762 UART: [idev] SUBJECT.KEYID = 7
3,845,972 UART: [idev] UDS.KEYID = 0
3,863,681 UART: [idev] Erasing UDS.KEYID = 0
6,322,060 UART: [idev] Sha1 KeyId Algorithm
6,344,102 UART: [idev] --
6,346,582 UART: [ldev] ++
6,347,146 UART: [ldev] CDI.KEYID = 6
6,348,029 UART: [ldev] SUBJECT.KEYID = 5
6,349,238 UART: [ldev] AUTHORITY.KEYID = 7
6,350,464 UART: [ldev] FE.KEYID = 1
6,363,618 UART: [ldev] Erasing FE.KEYID = 1
8,835,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,343 UART: [ldev] --
10,625,812 UART: [fwproc] Wait for Commands...
10,628,618 UART: [fwproc] Recv command 0x46574c44
10,630,720 UART: [fwproc] Recv'd Img size: 114448 bytes
10,694,548 UART: ROM Fatal Error: 0x000B0007
10,697,701 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
6,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,834 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,722 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,833 UART: [idev] ++
1,174,001 UART: [idev] CDI.KEYID = 6
1,174,362 UART: [idev] SUBJECT.KEYID = 7
1,174,787 UART: [idev] UDS.KEYID = 0
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,459 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,416 UART: [ldev] ++
1,209,584 UART: [ldev] CDI.KEYID = 6
1,209,948 UART: [ldev] SUBJECT.KEYID = 5
1,210,375 UART: [ldev] AUTHORITY.KEYID = 7
1,210,838 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,742 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,282,073 UART: [fwproc] Recv command 0x46574c44
1,282,806 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,279 UART: ROM Fatal Error: 0x000B0007
1,307,436 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,749 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
891,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,860 UART: [kat] ++
896,012 UART: [kat] sha1
900,368 UART: [kat] SHA2-256
902,308 UART: [kat] SHA2-384
905,297 UART: [kat] SHA2-512-ACC
907,198 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,134 UART: [fht] FHT @ 0x50003400
1,173,890 UART: [idev] ++
1,174,058 UART: [idev] CDI.KEYID = 6
1,174,419 UART: [idev] SUBJECT.KEYID = 7
1,174,844 UART: [idev] UDS.KEYID = 0
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,523 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,671 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,223 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,888 UART: ROM Fatal Error: 0x000B0007
1,309,045 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,420 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,972 UART: [ldev] ++
1,209,140 UART: [ldev] CDI.KEYID = 6
1,209,504 UART: [ldev] SUBJECT.KEYID = 5
1,209,931 UART: [ldev] AUTHORITY.KEYID = 7
1,210,394 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,116 UART: [ldev] --
1,281,520 UART: [fwproc] Wait for Commands...
1,282,219 UART: [fwproc] Recv command 0x46574c44
1,282,952 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,633 UART: ROM Fatal Error: 0x000B0007
1,307,790 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,177 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,306 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,075 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,542 UART: ROM Fatal Error: 0x000B0007
1,307,699 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,664 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,688 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,816 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,994 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,149 UART: [fwproc] Recv command 0x46574c44
1,283,882 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,299 UART: ROM Fatal Error: 0x000B0007
1,308,456 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,593 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,536 UART: [kat] SHA2-256
902,476 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,148 UART: [idev] Sha1 KeyId Algorithm
1,209,132 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,047 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,100 UART: ROM Fatal Error: 0x000B0007
1,308,257 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,988 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
5,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,213 UART:
192,580 UART: Running Caliptra ROM ...
193,771 UART:
193,926 UART: [state] CFI Enabled
264,172 UART: [state] LifecycleState = Unprovisioned
266,603 UART: [state] DebugLocked = No
269,330 UART: [state] WD Timer not started. Device not locked for debugging
274,258 UART: [kat] SHA2-256
456,161 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,668 UART: [kat] ++
468,468 UART: [kat] sha1
478,333 UART: [kat] SHA2-256
481,364 UART: [kat] SHA2-384
487,611 UART: [kat] SHA2-512-ACC
490,225 UART: [kat] ECC-384
3,776,844 UART: [kat] HMAC-384Kdf
3,803,399 UART: [kat] LMS
4,876,547 UART: [kat] --
4,881,969 UART: [cold-reset] ++
4,883,906 UART: [fht] FHT @ 0x50003400
4,894,674 UART: [idev] ++
4,895,348 UART: [idev] CDI.KEYID = 6
4,896,585 UART: [idev] SUBJECT.KEYID = 7
4,897,760 UART: [idev] UDS.KEYID = 0
4,930,643 UART: [idev] Erasing UDS.KEYID = 0
8,243,023 UART: [idev] Sha1 KeyId Algorithm
8,266,257 UART: [idev] --
8,269,821 UART: [ldev] ++
8,270,445 UART: [ldev] CDI.KEYID = 6
8,271,629 UART: [ldev] SUBJECT.KEYID = 5
8,272,738 UART: [ldev] AUTHORITY.KEYID = 7
8,274,182 UART: [ldev] FE.KEYID = 1
8,318,288 UART: [ldev] Erasing FE.KEYID = 1
11,652,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,804 UART: [ldev] --
14,034,577 UART: [fwproc] Wait for Commands...
14,037,754 UART: [fwproc] Recv command 0x46574c44
14,040,078 UART: [fwproc] Recv'd Img size: 114124 bytes
14,113,746 UART: ROM Fatal Error: 0x000B0008
14,117,168 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
5,486 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,930,810 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
6,322 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,413 UART:
192,797 UART: Running Caliptra ROM ...
193,902 UART:
603,500 UART: [state] CFI Enabled
616,357 UART: [state] LifecycleState = Unprovisioned
618,700 UART: [state] DebugLocked = No
620,855 UART: [state] WD Timer not started. Device not locked for debugging
626,011 UART: [kat] SHA2-256
808,001 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,518 UART: [kat] ++
820,022 UART: [kat] sha1
830,256 UART: [kat] SHA2-256
833,291 UART: [kat] SHA2-384
840,134 UART: [kat] SHA2-512-ACC
842,751 UART: [kat] ECC-384
4,098,934 UART: [kat] HMAC-384Kdf
4,111,779 UART: [kat] LMS
5,184,936 UART: [kat] --
5,190,452 UART: [cold-reset] ++
5,192,614 UART: [fht] FHT @ 0x50003400
5,204,405 UART: [idev] ++
5,205,083 UART: [idev] CDI.KEYID = 6
5,206,321 UART: [idev] SUBJECT.KEYID = 7
5,207,752 UART: [idev] UDS.KEYID = 0
5,224,441 UART: [idev] Erasing UDS.KEYID = 0
8,498,331 UART: [idev] Sha1 KeyId Algorithm
8,520,785 UART: [idev] --
8,524,557 UART: [ldev] ++
8,525,144 UART: [ldev] CDI.KEYID = 6
8,526,329 UART: [ldev] SUBJECT.KEYID = 5
8,527,821 UART: [ldev] AUTHORITY.KEYID = 7
8,529,316 UART: [ldev] FE.KEYID = 1
8,541,154 UART: [ldev] Erasing FE.KEYID = 1
11,830,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,403 UART: [ldev] --
14,198,141 UART: [fwproc] Wait for Commands...
14,199,967 UART: [fwproc] Recv command 0x46574c44
14,202,240 UART: [fwproc] Recv'd Img size: 114124 bytes
14,271,202 UART: ROM Fatal Error: 0x000B0008
14,274,621 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
6,239 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,076,584 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
5,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,120 UART:
192,527 UART: Running Caliptra ROM ...
193,697 UART:
193,848 UART: [state] CFI Enabled
267,734 UART: [state] LifecycleState = Unprovisioned
269,664 UART: [state] DebugLocked = No
271,592 UART: [state] WD Timer not started. Device not locked for debugging
276,141 UART: [kat] SHA2-256
455,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,835 UART: [kat] ++
467,366 UART: [kat] sha1
477,923 UART: [kat] SHA2-256
480,922 UART: [kat] SHA2-384
486,145 UART: [kat] SHA2-512-ACC
489,088 UART: [kat] ECC-384
2,950,770 UART: [kat] HMAC-384Kdf
2,973,605 UART: [kat] LMS
3,503,049 UART: [kat] --
3,506,727 UART: [cold-reset] ++
3,509,035 UART: [fht] FHT @ 0x50003400
3,519,543 UART: [idev] ++
3,520,111 UART: [idev] CDI.KEYID = 6
3,521,080 UART: [idev] SUBJECT.KEYID = 7
3,522,240 UART: [idev] UDS.KEYID = 0
3,547,023 UART: [idev] Erasing UDS.KEYID = 0
6,030,008 UART: [idev] Sha1 KeyId Algorithm
6,052,406 UART: [idev] --
6,057,085 UART: [ldev] ++
6,057,677 UART: [ldev] CDI.KEYID = 6
6,058,589 UART: [ldev] SUBJECT.KEYID = 5
6,059,758 UART: [ldev] AUTHORITY.KEYID = 7
6,061,049 UART: [ldev] FE.KEYID = 1
6,101,784 UART: [ldev] Erasing FE.KEYID = 1
8,609,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,041 UART: [ldev] --
10,413,858 UART: [fwproc] Wait for Commands...
10,416,559 UART: [fwproc] Recv command 0x46574c44
10,418,658 UART: [fwproc] Recv'd Img size: 114448 bytes
10,487,889 UART: ROM Fatal Error: 0x000B0008
10,490,986 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
5,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,296,299 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
6,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,402 UART:
192,799 UART: Running Caliptra ROM ...
193,964 UART:
603,483 UART: [state] CFI Enabled
617,057 UART: [state] LifecycleState = Unprovisioned
618,939 UART: [state] DebugLocked = No
621,503 UART: [state] WD Timer not started. Device not locked for debugging
625,347 UART: [kat] SHA2-256
804,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,024 UART: [kat] ++
816,560 UART: [kat] sha1
826,367 UART: [kat] SHA2-256
829,416 UART: [kat] SHA2-384
835,507 UART: [kat] SHA2-512-ACC
838,501 UART: [kat] ECC-384
3,278,926 UART: [kat] HMAC-384Kdf
3,292,259 UART: [kat] LMS
3,821,752 UART: [kat] --
3,825,855 UART: [cold-reset] ++
3,827,456 UART: [fht] FHT @ 0x50003400
3,837,355 UART: [idev] ++
3,837,921 UART: [idev] CDI.KEYID = 6
3,838,831 UART: [idev] SUBJECT.KEYID = 7
3,840,042 UART: [idev] UDS.KEYID = 0
3,859,600 UART: [idev] Erasing UDS.KEYID = 0
6,320,796 UART: [idev] Sha1 KeyId Algorithm
6,343,991 UART: [idev] --
6,349,529 UART: [ldev] ++
6,350,104 UART: [ldev] CDI.KEYID = 6
6,351,012 UART: [ldev] SUBJECT.KEYID = 5
6,352,184 UART: [ldev] AUTHORITY.KEYID = 7
6,353,470 UART: [ldev] FE.KEYID = 1
6,363,683 UART: [ldev] Erasing FE.KEYID = 1
8,835,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,322 UART: [ldev] --
10,628,315 UART: [fwproc] Wait for Commands...
10,629,944 UART: [fwproc] Recv command 0x46574c44
10,631,989 UART: [fwproc] Recv'd Img size: 114448 bytes
10,705,579 UART: ROM Fatal Error: 0x000B0008
10,708,678 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
6,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,474 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
5,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,295 UART:
192,656 UART: Running Caliptra ROM ...
193,809 UART:
193,959 UART: [state] CFI Enabled
263,370 UART: [state] LifecycleState = Unprovisioned
265,229 UART: [state] DebugLocked = No
266,989 UART: [state] WD Timer not started. Device not locked for debugging
270,613 UART: [kat] SHA2-256
449,739 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,309 UART: [kat] ++
461,840 UART: [kat] sha1
472,775 UART: [kat] SHA2-256
475,832 UART: [kat] SHA2-384
481,286 UART: [kat] SHA2-512-ACC
484,228 UART: [kat] ECC-384
2,948,503 UART: [kat] HMAC-384Kdf
2,970,244 UART: [kat] LMS
3,499,684 UART: [kat] --
3,504,618 UART: [cold-reset] ++
3,506,281 UART: [fht] FHT @ 0x50003400
3,517,639 UART: [idev] ++
3,518,245 UART: [idev] CDI.KEYID = 6
3,519,177 UART: [idev] SUBJECT.KEYID = 7
3,520,339 UART: [idev] UDS.KEYID = 0
3,542,745 UART: [idev] Erasing UDS.KEYID = 0
6,023,086 UART: [idev] Sha1 KeyId Algorithm
6,046,779 UART: [idev] --
6,051,856 UART: [ldev] ++
6,052,435 UART: [ldev] CDI.KEYID = 6
6,053,350 UART: [ldev] SUBJECT.KEYID = 5
6,054,515 UART: [ldev] AUTHORITY.KEYID = 7
6,055,770 UART: [ldev] FE.KEYID = 1
6,098,673 UART: [ldev] Erasing FE.KEYID = 1
8,602,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,582 UART: [ldev] --
10,414,128 UART: [fwproc] Wait for Commands...
10,416,616 UART: [fwproc] Recv command 0x46574c44
10,418,715 UART: [fwproc] Recv'd Img size: 114448 bytes
10,485,354 UART: ROM Fatal Error: 0x000B0008
10,488,500 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
5,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,269,018 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,028 writing to cptra_bootfsm_go
7,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,252 UART:
193,641 UART: Running Caliptra ROM ...
194,797 UART:
604,438 UART: [state] CFI Enabled
618,072 UART: [state] LifecycleState = Unprovisioned
619,959 UART: [state] DebugLocked = No
621,607 UART: [state] WD Timer not started. Device not locked for debugging
624,853 UART: [kat] SHA2-256
803,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,525 UART: [kat] ++
815,979 UART: [kat] sha1
827,717 UART: [kat] SHA2-256
830,721 UART: [kat] SHA2-384
837,343 UART: [kat] SHA2-512-ACC
840,338 UART: [kat] ECC-384
3,283,154 UART: [kat] HMAC-384Kdf
3,295,986 UART: [kat] LMS
3,825,467 UART: [kat] --
3,830,153 UART: [cold-reset] ++
3,832,509 UART: [fht] FHT @ 0x50003400
3,843,053 UART: [idev] ++
3,843,660 UART: [idev] CDI.KEYID = 6
3,844,575 UART: [idev] SUBJECT.KEYID = 7
3,845,734 UART: [idev] UDS.KEYID = 0
3,859,978 UART: [idev] Erasing UDS.KEYID = 0
6,316,747 UART: [idev] Sha1 KeyId Algorithm
6,338,562 UART: [idev] --
6,341,176 UART: [ldev] ++
6,341,751 UART: [ldev] CDI.KEYID = 6
6,342,634 UART: [ldev] SUBJECT.KEYID = 5
6,343,843 UART: [ldev] AUTHORITY.KEYID = 7
6,345,070 UART: [ldev] FE.KEYID = 1
6,354,640 UART: [ldev] Erasing FE.KEYID = 1
8,828,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,358 UART: [ldev] --
10,621,753 UART: [fwproc] Wait for Commands...
10,623,464 UART: [fwproc] Recv command 0x46574c44
10,625,522 UART: [fwproc] Recv'd Img size: 114448 bytes
10,700,641 UART: ROM Fatal Error: 0x000B0008
10,703,733 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
6,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,609 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,562 UART: [ldev] ++
1,209,730 UART: [ldev] CDI.KEYID = 6
1,210,094 UART: [ldev] SUBJECT.KEYID = 5
1,210,521 UART: [ldev] AUTHORITY.KEYID = 7
1,210,984 UART: [ldev] FE.KEYID = 1
1,216,198 UART: [ldev] Erasing FE.KEYID = 1
1,242,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,558 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,014 UART: ROM Fatal Error: 0x000B0008
1,309,171 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,536 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,300 UART: [idev] Erasing UDS.KEYID = 0
1,198,936 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,497 UART: [ldev] --
1,280,973 UART: [fwproc] Wait for Commands...
1,281,722 UART: [fwproc] Recv command 0x46574c44
1,282,455 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,825 UART: ROM Fatal Error: 0x000B0008
1,308,982 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,417 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,240,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,422 UART: [ldev] --
1,279,766 UART: [fwproc] Wait for Commands...
1,280,463 UART: [fwproc] Recv command 0x46574c44
1,281,196 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,018 UART: ROM Fatal Error: 0x000B0008
1,307,175 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,518 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,246 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,043 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,130 UART: [fwproc] Recv command 0x46574c44
1,282,863 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,407 UART: ROM Fatal Error: 0x000B0008
1,308,564 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,827 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,047 UART: [kat] ++
895,199 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,188 UART: [kat] HMAC-384Kdf
919,798 UART: [kat] LMS
1,168,110 UART: [kat] --
1,169,017 UART: [cold-reset] ++
1,169,371 UART: [fht] FHT @ 0x50003400
1,171,893 UART: [idev] ++
1,172,061 UART: [idev] CDI.KEYID = 6
1,172,422 UART: [idev] SUBJECT.KEYID = 7
1,172,847 UART: [idev] UDS.KEYID = 0
1,180,791 UART: [idev] Erasing UDS.KEYID = 0
1,197,407 UART: [idev] Sha1 KeyId Algorithm
1,206,383 UART: [idev] --
1,207,600 UART: [ldev] ++
1,207,768 UART: [ldev] CDI.KEYID = 6
1,208,132 UART: [ldev] SUBJECT.KEYID = 5
1,208,559 UART: [ldev] AUTHORITY.KEYID = 7
1,209,022 UART: [ldev] FE.KEYID = 1
1,214,108 UART: [ldev] Erasing FE.KEYID = 1
1,240,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,964 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,736 UART: ROM Fatal Error: 0x000B0008
1,307,893 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,020 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,466 UART: [idev] --
1,208,401 UART: [ldev] ++
1,208,569 UART: [ldev] CDI.KEYID = 6
1,208,933 UART: [ldev] SUBJECT.KEYID = 5
1,209,360 UART: [ldev] AUTHORITY.KEYID = 7
1,209,823 UART: [ldev] FE.KEYID = 1
1,215,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,503 UART: [fwproc] Wait for Commands...
1,282,288 UART: [fwproc] Recv command 0x46574c44
1,283,021 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,311 UART: ROM Fatal Error: 0x000B0008
1,309,468 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,065 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,218,874 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,363,568 UART:
2,363,958 UART: Running Caliptra ROM ...
2,365,123 UART:
2,365,303 UART: [state] CFI Enabled
2,366,262 UART: [state] LifecycleState = Unprovisioned
2,367,920 UART: [state] DebugLocked = No
2,369,023 UART: [state] WD Timer not started. Device not locked for debugging
2,371,500 UART: [kat] SHA2-256
2,372,174 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,375,185 UART: [kat] ++
2,375,660 UART: [kat] sha1
2,376,259 UART: [kat] SHA2-256
2,376,920 UART: [kat] SHA2-384
2,377,578 UART: [kat] SHA2-512-ACC
2,378,457 UART: [kat] ECC-384
3,775,227 UART: [kat] HMAC-384Kdf
3,801,584 UART: [kat] LMS
4,874,775 UART: [kat] --
4,878,148 UART: [cold-reset] ++
4,880,903 UART: [fht] FHT @ 0x50003400
4,890,586 UART: [idev] ++
4,891,258 UART: [idev] CDI.KEYID = 6
4,892,490 UART: [idev] SUBJECT.KEYID = 7
4,893,646 UART: [idev] UDS.KEYID = 0
4,928,765 UART: [idev] Erasing UDS.KEYID = 0
8,242,345 UART: [idev] Sha1 KeyId Algorithm
8,265,979 UART: [idev] --
8,269,705 UART: [ldev] ++
8,270,274 UART: [ldev] CDI.KEYID = 6
8,271,511 UART: [ldev] SUBJECT.KEYID = 5
8,272,671 UART: [ldev] AUTHORITY.KEYID = 7
8,273,896 UART: [ldev] FE.KEYID = 1
8,317,652 UART: [ldev] Erasing FE.KEYID = 1
11,655,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,256 UART: [ldev] --
14,035,332 UART: [fwproc] Wait for Commands...
14,037,638 UART: [fwproc] Recv command 0x46574c44
14,039,950 UART: [fwproc] Recv'd Img size: 114124 bytes
14,109,849 UART: ROM Fatal Error: 0x000B0009
14,113,266 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,056,458 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,200,554 UART:
2,200,980 UART: Running Caliptra ROM ...
2,202,089 UART:
2,202,286 UART: [state] CFI Enabled
2,203,262 UART: [state] LifecycleState = Unprovisioned
2,204,919 UART: [state] DebugLocked = No
2,206,023 UART: [state] WD Timer not started. Device not locked for debugging
2,208,493 UART: [kat] SHA2-256
2,209,159 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,154 UART: [kat] ++
2,212,605 UART: [kat] sha1
2,213,116 UART: [kat] SHA2-256
2,213,856 UART: [kat] SHA2-384
2,214,520 UART: [kat] SHA2-512-ACC
2,215,348 UART: [kat] ECC-384
3,773,183 UART: [kat] HMAC-384Kdf
3,801,810 UART: [kat] LMS
4,874,918 UART: [kat] --
4,878,113 UART: [cold-reset] ++
4,879,201 UART: [fht] FHT @ 0x50003400
4,889,968 UART: [idev] ++
4,890,648 UART: [idev] CDI.KEYID = 6
4,891,885 UART: [idev] SUBJECT.KEYID = 7
4,892,911 UART: [idev] UDS.KEYID = 0
4,928,059 UART: [idev] Erasing UDS.KEYID = 0
8,242,898 UART: [idev] Sha1 KeyId Algorithm
8,265,489 UART: [idev] --
8,271,158 UART: [ldev] ++
8,271,775 UART: [ldev] CDI.KEYID = 6
8,272,952 UART: [ldev] SUBJECT.KEYID = 5
8,274,107 UART: [ldev] AUTHORITY.KEYID = 7
8,275,335 UART: [ldev] FE.KEYID = 1
8,315,041 UART: [ldev] Erasing FE.KEYID = 1
11,653,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,113 UART: [ldev] --
14,035,113 UART: [fwproc] Wait for Commands...
14,038,288 UART: [fwproc] Recv command 0x46574c44
14,040,596 UART: [fwproc] Recv'd Img size: 114124 bytes
14,113,990 UART: ROM Fatal Error: 0x000B0009
14,117,400 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,051,075 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,195,076 UART:
2,195,481 UART: Running Caliptra ROM ...
2,196,644 UART:
2,196,812 UART: [state] CFI Enabled
2,197,783 UART: [state] LifecycleState = Unprovisioned
2,199,427 UART: [state] DebugLocked = No
2,200,529 UART: [state] WD Timer not started. Device not locked for debugging
2,202,994 UART: [kat] SHA2-256
2,203,657 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,666 UART: [kat] ++
2,207,117 UART: [kat] sha1
2,207,626 UART: [kat] SHA2-256
2,208,363 UART: [kat] SHA2-384
2,209,029 UART: [kat] SHA2-512-ACC
2,209,910 UART: [kat] ECC-384
3,777,515 UART: [kat] HMAC-384Kdf
3,802,541 UART: [kat] LMS
4,875,681 UART: [kat] --
4,882,107 UART: [cold-reset] ++
4,884,411 UART: [fht] FHT @ 0x50003400
4,895,057 UART: [idev] ++
4,895,732 UART: [idev] CDI.KEYID = 6
4,896,888 UART: [idev] SUBJECT.KEYID = 7
4,898,098 UART: [idev] UDS.KEYID = 0
4,930,360 UART: [idev] Erasing UDS.KEYID = 0
8,239,863 UART: [idev] Sha1 KeyId Algorithm
8,260,939 UART: [idev] --
8,265,904 UART: [ldev] ++
8,266,467 UART: [ldev] CDI.KEYID = 6
8,267,622 UART: [ldev] SUBJECT.KEYID = 5
8,268,852 UART: [ldev] AUTHORITY.KEYID = 7
8,270,006 UART: [ldev] FE.KEYID = 1
8,296,516 UART: [ldev] Erasing FE.KEYID = 1
11,634,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,329 UART: [ldev] --
14,016,140 UART: [fwproc] Wait for Commands...
14,018,181 UART: [fwproc] Recv command 0x46574c44
14,020,498 UART: [fwproc] Recv'd Img size: 114124 bytes
14,093,564 UART: ROM Fatal Error: 0x000B0009
14,096,981 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,050,694 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,194,906 UART:
2,195,312 UART: Running Caliptra ROM ...
2,196,385 UART:
2,196,536 UART: [state] CFI Enabled
2,197,521 UART: [state] LifecycleState = Unprovisioned
2,199,166 UART: [state] DebugLocked = No
2,200,189 UART: [state] WD Timer not started. Device not locked for debugging
2,202,643 UART: [kat] SHA2-256
2,203,307 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,309 UART: [kat] ++
2,206,772 UART: [kat] sha1
2,207,282 UART: [kat] SHA2-256
2,207,940 UART: [kat] SHA2-384
2,208,597 UART: [kat] SHA2-512-ACC
2,209,441 UART: [kat] ECC-384
3,774,556 UART: [kat] HMAC-384Kdf
3,801,733 UART: [kat] LMS
4,874,855 UART: [kat] --
4,881,189 UART: [cold-reset] ++
4,883,448 UART: [fht] FHT @ 0x50003400
4,893,615 UART: [idev] ++
4,894,343 UART: [idev] CDI.KEYID = 6
4,895,444 UART: [idev] SUBJECT.KEYID = 7
4,896,654 UART: [idev] UDS.KEYID = 0
4,928,217 UART: [idev] Erasing UDS.KEYID = 0
8,241,562 UART: [idev] Sha1 KeyId Algorithm
8,262,917 UART: [idev] --
8,267,235 UART: [ldev] ++
8,267,843 UART: [ldev] CDI.KEYID = 6
8,269,085 UART: [ldev] SUBJECT.KEYID = 5
8,270,191 UART: [ldev] AUTHORITY.KEYID = 7
8,271,419 UART: [ldev] FE.KEYID = 1
8,318,511 UART: [ldev] Erasing FE.KEYID = 1
11,653,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,478 UART: [ldev] --
14,040,264 UART: [fwproc] Wait for Commands...
14,043,171 UART: [fwproc] Recv command 0x46574c44
14,045,485 UART: [fwproc] Recv'd Img size: 114124 bytes
18,117,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,193,496 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,262,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,580,768 >>> mbox cmd response: success
18,585,267 UART: [afmc] ++
18,585,963 UART: [afmc] CDI.KEYID = 6
18,587,125 UART: [afmc] SUBJECT.KEYID = 7
18,588,303 UART: [afmc] AUTHORITY.KEYID = 5
21,947,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,246,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,248,646 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,264,795 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,280,875 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,296,772 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,319,939 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,219,966 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,902,369 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,055,457 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,874,720 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,052,367 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,921,058 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,051,125 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,340,935 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
2,228,877 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,373,606 UART:
2,374,135 UART: Running Caliptra ROM ...
2,375,220 UART:
2,375,365 UART: [state] CFI Enabled
2,376,223 UART: [state] LifecycleState = Unprovisioned
2,377,902 UART: [state] DebugLocked = No
2,379,010 UART: [state] WD Timer not started. Device not locked for debugging
2,381,490 UART: [kat] SHA2-256
2,382,155 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,385,159 UART: [kat] ++
2,385,601 UART: [kat] sha1
2,386,107 UART: [kat] SHA2-256
2,386,837 UART: [kat] SHA2-384
2,387,495 UART: [kat] SHA2-512-ACC
2,388,321 UART: [kat] ECC-384
4,095,623 UART: [kat] HMAC-384Kdf
4,107,831 UART: [kat] LMS
5,180,996 UART: [kat] --
5,186,360 UART: [cold-reset] ++
5,187,704 UART: [fht] FHT @ 0x50003400
5,199,552 UART: [idev] ++
5,200,237 UART: [idev] CDI.KEYID = 6
5,201,394 UART: [idev] SUBJECT.KEYID = 7
5,202,869 UART: [idev] UDS.KEYID = 0
5,220,649 UART: [idev] Erasing UDS.KEYID = 0
8,491,121 UART: [idev] Sha1 KeyId Algorithm
8,512,415 UART: [idev] --
8,516,554 UART: [ldev] ++
8,517,127 UART: [ldev] CDI.KEYID = 6
8,518,361 UART: [ldev] SUBJECT.KEYID = 5
8,519,845 UART: [ldev] AUTHORITY.KEYID = 7
8,521,398 UART: [ldev] FE.KEYID = 1
8,533,877 UART: [ldev] Erasing FE.KEYID = 1
11,827,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,297 UART: [ldev] --
14,193,141 UART: [fwproc] Wait for Commands...
14,195,834 UART: [fwproc] Recv command 0x46574c44
14,198,093 UART: [fwproc] Recv'd Img size: 114124 bytes
14,270,990 UART: ROM Fatal Error: 0x000B0009
14,274,399 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,063,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,207,769 UART:
2,208,202 UART: Running Caliptra ROM ...
2,209,367 UART:
2,209,532 UART: [state] CFI Enabled
2,210,492 UART: [state] LifecycleState = Unprovisioned
2,212,144 UART: [state] DebugLocked = No
2,213,168 UART: [state] WD Timer not started. Device not locked for debugging
2,215,641 UART: [kat] SHA2-256
2,216,335 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,333 UART: [kat] ++
2,219,782 UART: [kat] sha1
2,220,315 UART: [kat] SHA2-256
2,220,967 UART: [kat] SHA2-384
2,221,637 UART: [kat] SHA2-512-ACC
2,222,431 UART: [kat] ECC-384
4,094,296 UART: [kat] HMAC-384Kdf
4,107,130 UART: [kat] LMS
5,180,265 UART: [kat] --
5,183,804 UART: [cold-reset] ++
5,185,364 UART: [fht] FHT @ 0x50003400
5,197,693 UART: [idev] ++
5,198,421 UART: [idev] CDI.KEYID = 6
5,199,598 UART: [idev] SUBJECT.KEYID = 7
5,201,078 UART: [idev] UDS.KEYID = 0
5,216,145 UART: [idev] Erasing UDS.KEYID = 0
8,487,743 UART: [idev] Sha1 KeyId Algorithm
8,510,091 UART: [idev] --
8,514,093 UART: [ldev] ++
8,514,661 UART: [ldev] CDI.KEYID = 6
8,515,910 UART: [ldev] SUBJECT.KEYID = 5
8,517,338 UART: [ldev] AUTHORITY.KEYID = 7
8,518,893 UART: [ldev] FE.KEYID = 1
8,530,721 UART: [ldev] Erasing FE.KEYID = 1
11,822,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,757 UART: [ldev] --
14,190,031 UART: [fwproc] Wait for Commands...
14,192,351 UART: [fwproc] Recv command 0x46574c44
14,194,666 UART: [fwproc] Recv'd Img size: 114124 bytes
14,268,799 UART: ROM Fatal Error: 0x000B0009
14,272,205 >>> mbox cmd response: failed
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,057,904 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,202,016 UART:
2,202,438 UART: Running Caliptra ROM ...
2,203,512 UART:
2,203,657 UART: [state] CFI Enabled
2,204,632 UART: [state] LifecycleState = Unprovisioned
2,206,268 UART: [state] DebugLocked = No
2,207,285 UART: [state] WD Timer not started. Device not locked for debugging
2,209,744 UART: [kat] SHA2-256
2,210,423 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,438 UART: [kat] ++
2,213,877 UART: [kat] sha1
2,214,377 UART: [kat] SHA2-256
2,215,025 UART: [kat] SHA2-384
2,215,676 UART: [kat] SHA2-512-ACC
2,216,469 UART: [kat] ECC-384
4,101,843 UART: [kat] HMAC-384Kdf
4,112,584 UART: [kat] LMS
5,185,771 UART: [kat] --
5,190,113 UART: [cold-reset] ++
5,191,811 UART: [fht] FHT @ 0x50003400
5,203,222 UART: [idev] ++
5,203,899 UART: [idev] CDI.KEYID = 6
5,205,131 UART: [idev] SUBJECT.KEYID = 7
5,206,556 UART: [idev] UDS.KEYID = 0
5,221,680 UART: [idev] Erasing UDS.KEYID = 0
8,494,901 UART: [idev] Sha1 KeyId Algorithm
8,517,863 UART: [idev] --
8,523,419 UART: [ldev] ++
8,523,981 UART: [ldev] CDI.KEYID = 6
8,525,217 UART: [ldev] SUBJECT.KEYID = 5
8,526,642 UART: [ldev] AUTHORITY.KEYID = 7
8,528,246 UART: [ldev] FE.KEYID = 1
8,540,614 UART: [ldev] Erasing FE.KEYID = 1
11,835,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,128 UART: [ldev] --
14,200,118 UART: [fwproc] Wait for Commands...
14,202,822 UART: [fwproc] Recv command 0x46574c44
14,205,079 UART: [fwproc] Recv'd Img size: 114124 bytes
14,281,237 UART: ROM Fatal Error: 0x000B0009
14,284,605 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,057,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,201,693 UART:
2,202,101 UART: Running Caliptra ROM ...
2,203,264 UART:
2,203,429 UART: [state] CFI Enabled
2,204,426 UART: [state] LifecycleState = Unprovisioned
2,206,075 UART: [state] DebugLocked = No
2,207,185 UART: [state] WD Timer not started. Device not locked for debugging
2,209,647 UART: [kat] SHA2-256
2,210,306 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,312 UART: [kat] ++
2,213,756 UART: [kat] sha1
2,214,260 UART: [kat] SHA2-256
2,214,992 UART: [kat] SHA2-384
2,215,652 UART: [kat] SHA2-512-ACC
2,216,525 UART: [kat] ECC-384
4,100,925 UART: [kat] HMAC-384Kdf
4,113,882 UART: [kat] LMS
5,187,059 UART: [kat] --
5,192,693 UART: [cold-reset] ++
5,194,631 UART: [fht] FHT @ 0x50003400
5,206,272 UART: [idev] ++
5,206,949 UART: [idev] CDI.KEYID = 6
5,208,175 UART: [idev] SUBJECT.KEYID = 7
5,209,600 UART: [idev] UDS.KEYID = 0
5,226,708 UART: [idev] Erasing UDS.KEYID = 0
8,499,619 UART: [idev] Sha1 KeyId Algorithm
8,520,545 UART: [idev] --
8,524,469 UART: [ldev] ++
8,525,043 UART: [ldev] CDI.KEYID = 6
8,526,228 UART: [ldev] SUBJECT.KEYID = 5
8,527,713 UART: [ldev] AUTHORITY.KEYID = 7
8,529,267 UART: [ldev] FE.KEYID = 1
8,540,017 UART: [ldev] Erasing FE.KEYID = 1
11,830,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,348 UART: [ldev] --
14,193,827 UART: [fwproc] Wait for Commands...
14,196,180 UART: [fwproc] Recv command 0x46574c44
14,198,508 UART: [fwproc] Recv'd Img size: 114124 bytes
18,267,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,347,751 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,416,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,733,675 >>> mbox cmd response: success
18,738,089 UART: [afmc] ++
18,738,844 UART: [afmc] CDI.KEYID = 6
18,740,028 UART: [afmc] SUBJECT.KEYID = 7
18,741,190 UART: [afmc] AUTHORITY.KEYID = 5
22,053,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,350,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,352,072 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,368,226 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,384,357 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,400,165 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,423,253 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,223,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,082,768 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,069,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,091,871 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,055,907 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,081,438 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,063,753 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,526,086 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,220,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,367,066 UART:
2,367,490 UART: Running Caliptra ROM ...
2,368,668 UART:
2,368,840 UART: [state] CFI Enabled
2,369,820 UART: [state] LifecycleState = Unprovisioned
2,371,501 UART: [state] DebugLocked = No
2,372,615 UART: [state] WD Timer not started. Device not locked for debugging
2,375,089 UART: [kat] SHA2-256
2,375,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,771 UART: [kat] ++
2,379,223 UART: [kat] sha1
2,379,734 UART: [kat] SHA2-256
2,380,477 UART: [kat] SHA2-384
2,381,137 UART: [kat] SHA2-512-ACC
2,381,974 UART: [kat] ECC-384
2,945,754 UART: [kat] HMAC-384Kdf
2,971,095 UART: [kat] LMS
3,500,590 UART: [kat] --
3,505,276 UART: [cold-reset] ++
3,506,184 UART: [fht] FHT @ 0x50003400
3,517,436 UART: [idev] ++
3,518,018 UART: [idev] CDI.KEYID = 6
3,518,928 UART: [idev] SUBJECT.KEYID = 7
3,520,088 UART: [idev] UDS.KEYID = 0
3,543,195 UART: [idev] Erasing UDS.KEYID = 0
6,024,541 UART: [idev] Sha1 KeyId Algorithm
6,047,294 UART: [idev] --
6,052,641 UART: [ldev] ++
6,053,215 UART: [ldev] CDI.KEYID = 6
6,054,102 UART: [ldev] SUBJECT.KEYID = 5
6,055,314 UART: [ldev] AUTHORITY.KEYID = 7
6,056,602 UART: [ldev] FE.KEYID = 1
6,100,146 UART: [ldev] Erasing FE.KEYID = 1
8,604,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,664 UART: [ldev] --
10,414,551 UART: [fwproc] Wait for Commands...
10,416,540 UART: [fwproc] Recv command 0x46574c44
10,418,638 UART: [fwproc] Recv'd Img size: 114448 bytes
10,490,471 UART: ROM Fatal Error: 0x000B0009
10,493,565 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
2,059,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,204,298 UART:
2,204,720 UART: Running Caliptra ROM ...
2,205,809 UART:
2,205,964 UART: [state] CFI Enabled
2,206,890 UART: [state] LifecycleState = Unprovisioned
2,208,557 UART: [state] DebugLocked = No
2,209,589 UART: [state] WD Timer not started. Device not locked for debugging
2,212,055 UART: [kat] SHA2-256
2,212,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,723 UART: [kat] ++
2,216,170 UART: [kat] sha1
2,216,677 UART: [kat] SHA2-256
2,217,332 UART: [kat] SHA2-384
2,217,985 UART: [kat] SHA2-512-ACC
2,218,854 UART: [kat] ECC-384
2,946,626 UART: [kat] HMAC-384Kdf
2,971,420 UART: [kat] LMS
3,500,876 UART: [kat] --
3,504,974 UART: [cold-reset] ++
3,507,229 UART: [fht] FHT @ 0x50003400
3,518,427 UART: [idev] ++
3,518,993 UART: [idev] CDI.KEYID = 6
3,520,009 UART: [idev] SUBJECT.KEYID = 7
3,521,117 UART: [idev] UDS.KEYID = 0
3,543,198 UART: [idev] Erasing UDS.KEYID = 0
6,024,201 UART: [idev] Sha1 KeyId Algorithm
6,047,875 UART: [idev] --
6,050,632 UART: [ldev] ++
6,051,205 UART: [ldev] CDI.KEYID = 6
6,052,094 UART: [ldev] SUBJECT.KEYID = 5
6,053,194 UART: [ldev] AUTHORITY.KEYID = 7
6,054,539 UART: [ldev] FE.KEYID = 1
6,099,950 UART: [ldev] Erasing FE.KEYID = 1
8,603,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,476 UART: [ldev] --
10,412,774 UART: [fwproc] Wait for Commands...
10,415,032 UART: [fwproc] Recv command 0x46574c44
10,417,172 UART: [fwproc] Recv'd Img size: 114448 bytes
10,489,493 UART: ROM Fatal Error: 0x000B0009
10,492,603 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,054,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,198,991 UART:
2,199,395 UART: Running Caliptra ROM ...
2,200,561 UART:
2,200,735 UART: [state] CFI Enabled
2,201,716 UART: [state] LifecycleState = Unprovisioned
2,203,364 UART: [state] DebugLocked = No
2,204,474 UART: [state] WD Timer not started. Device not locked for debugging
2,206,938 UART: [kat] SHA2-256
2,207,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,635 UART: [kat] ++
2,211,092 UART: [kat] sha1
2,211,608 UART: [kat] SHA2-256
2,212,265 UART: [kat] SHA2-384
2,212,918 UART: [kat] SHA2-512-ACC
2,213,715 UART: [kat] ECC-384
2,948,953 UART: [kat] HMAC-384Kdf
2,973,053 UART: [kat] LMS
3,502,476 UART: [kat] --
3,509,326 UART: [cold-reset] ++
3,510,498 UART: [fht] FHT @ 0x50003400
3,521,289 UART: [idev] ++
3,521,848 UART: [idev] CDI.KEYID = 6
3,522,780 UART: [idev] SUBJECT.KEYID = 7
3,523,990 UART: [idev] UDS.KEYID = 0
3,543,724 UART: [idev] Erasing UDS.KEYID = 0
6,025,320 UART: [idev] Sha1 KeyId Algorithm
6,049,308 UART: [idev] --
6,053,521 UART: [ldev] ++
6,054,093 UART: [ldev] CDI.KEYID = 6
6,054,981 UART: [ldev] SUBJECT.KEYID = 5
6,056,199 UART: [ldev] AUTHORITY.KEYID = 7
6,057,489 UART: [ldev] FE.KEYID = 1
6,102,745 UART: [ldev] Erasing FE.KEYID = 1
8,604,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,177 UART: [ldev] --
10,415,134 UART: [fwproc] Wait for Commands...
10,418,025 UART: [fwproc] Recv command 0x46574c44
10,420,155 UART: [fwproc] Recv'd Img size: 114448 bytes
10,494,575 UART: ROM Fatal Error: 0x000B0009
10,497,669 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,056,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,092 UART:
2,201,506 UART: Running Caliptra ROM ...
2,202,677 UART:
2,202,849 UART: [state] CFI Enabled
2,203,832 UART: [state] LifecycleState = Unprovisioned
2,205,500 UART: [state] DebugLocked = No
2,206,612 UART: [state] WD Timer not started. Device not locked for debugging
2,209,089 UART: [kat] SHA2-256
2,209,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,771 UART: [kat] ++
2,213,220 UART: [kat] sha1
2,213,735 UART: [kat] SHA2-256
2,214,389 UART: [kat] SHA2-384
2,215,085 UART: [kat] SHA2-512-ACC
2,215,891 UART: [kat] ECC-384
2,945,622 UART: [kat] HMAC-384Kdf
2,971,492 UART: [kat] LMS
3,500,955 UART: [kat] --
3,507,260 UART: [cold-reset] ++
3,509,785 UART: [fht] FHT @ 0x50003400
3,521,649 UART: [idev] ++
3,522,225 UART: [idev] CDI.KEYID = 6
3,523,133 UART: [idev] SUBJECT.KEYID = 7
3,524,350 UART: [idev] UDS.KEYID = 0
3,542,427 UART: [idev] Erasing UDS.KEYID = 0
6,023,902 UART: [idev] Sha1 KeyId Algorithm
6,046,294 UART: [idev] --
6,050,894 UART: [ldev] ++
6,051,470 UART: [ldev] CDI.KEYID = 6
6,052,382 UART: [ldev] SUBJECT.KEYID = 5
6,053,549 UART: [ldev] AUTHORITY.KEYID = 7
6,054,790 UART: [ldev] FE.KEYID = 1
6,098,725 UART: [ldev] Erasing FE.KEYID = 1
8,602,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,514 UART: [ldev] --
10,411,549 UART: [fwproc] Wait for Commands...
10,413,171 UART: [fwproc] Recv command 0x46574c44
10,415,279 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,897,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,727 >>> mbox cmd response: success
14,288,603 UART: [afmc] ++
14,289,192 UART: [afmc] CDI.KEYID = 6
14,290,077 UART: [afmc] SUBJECT.KEYID = 7
14,291,296 UART: [afmc] AUTHORITY.KEYID = 5
16,830,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,387 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,570,363 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,586,131 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,601,937 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,624,601 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,219,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,258,069 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,063,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,247,095 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,055,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,292,288 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,053,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,074,061 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,224,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,370,082 UART:
2,370,492 UART: Running Caliptra ROM ...
2,371,668 UART:
2,371,839 UART: [state] CFI Enabled
2,372,804 UART: [state] LifecycleState = Unprovisioned
2,374,467 UART: [state] DebugLocked = No
2,375,509 UART: [state] WD Timer not started. Device not locked for debugging
2,377,999 UART: [kat] SHA2-256
2,378,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,381,672 UART: [kat] ++
2,382,118 UART: [kat] sha1
2,382,628 UART: [kat] SHA2-256
2,383,286 UART: [kat] SHA2-384
2,383,963 UART: [kat] SHA2-512-ACC
2,384,813 UART: [kat] ECC-384
3,279,380 UART: [kat] HMAC-384Kdf
3,292,071 UART: [kat] LMS
3,821,606 UART: [kat] --
3,825,754 UART: [cold-reset] ++
3,827,411 UART: [fht] FHT @ 0x50003400
3,839,030 UART: [idev] ++
3,839,638 UART: [idev] CDI.KEYID = 6
3,840,519 UART: [idev] SUBJECT.KEYID = 7
3,841,734 UART: [idev] UDS.KEYID = 0
3,856,765 UART: [idev] Erasing UDS.KEYID = 0
6,313,538 UART: [idev] Sha1 KeyId Algorithm
6,336,605 UART: [idev] --
6,340,974 UART: [ldev] ++
6,341,534 UART: [ldev] CDI.KEYID = 6
6,342,486 UART: [ldev] SUBJECT.KEYID = 5
6,343,641 UART: [ldev] AUTHORITY.KEYID = 7
6,344,921 UART: [ldev] FE.KEYID = 1
6,356,460 UART: [ldev] Erasing FE.KEYID = 1
8,833,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,938 UART: [ldev] --
10,626,282 UART: [fwproc] Wait for Commands...
10,628,426 UART: [fwproc] Recv command 0x46574c44
10,630,520 UART: [fwproc] Recv'd Img size: 114448 bytes
10,701,352 UART: ROM Fatal Error: 0x000B0009
10,704,447 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,061,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,206,475 UART:
2,206,880 UART: Running Caliptra ROM ...
2,207,957 UART:
2,208,112 UART: [state] CFI Enabled
2,209,023 UART: [state] LifecycleState = Unprovisioned
2,210,684 UART: [state] DebugLocked = No
2,211,739 UART: [state] WD Timer not started. Device not locked for debugging
2,214,203 UART: [kat] SHA2-256
2,214,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,865 UART: [kat] ++
2,218,317 UART: [kat] sha1
2,218,830 UART: [kat] SHA2-256
2,219,568 UART: [kat] SHA2-384
2,220,232 UART: [kat] SHA2-512-ACC
2,221,063 UART: [kat] ECC-384
3,279,734 UART: [kat] HMAC-384Kdf
3,291,160 UART: [kat] LMS
3,820,635 UART: [kat] --
3,825,709 UART: [cold-reset] ++
3,828,177 UART: [fht] FHT @ 0x50003400
3,840,453 UART: [idev] ++
3,841,016 UART: [idev] CDI.KEYID = 6
3,841,917 UART: [idev] SUBJECT.KEYID = 7
3,843,130 UART: [idev] UDS.KEYID = 0
3,861,589 UART: [idev] Erasing UDS.KEYID = 0
6,318,592 UART: [idev] Sha1 KeyId Algorithm
6,342,289 UART: [idev] --
6,345,528 UART: [ldev] ++
6,346,106 UART: [ldev] CDI.KEYID = 6
6,347,017 UART: [ldev] SUBJECT.KEYID = 5
6,348,230 UART: [ldev] AUTHORITY.KEYID = 7
6,349,455 UART: [ldev] FE.KEYID = 1
6,359,130 UART: [ldev] Erasing FE.KEYID = 1
8,836,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,307 UART: [ldev] --
10,624,247 UART: [fwproc] Wait for Commands...
10,627,474 UART: [fwproc] Recv command 0x46574c44
10,629,564 UART: [fwproc] Recv'd Img size: 114448 bytes
10,706,561 UART: ROM Fatal Error: 0x000B0009
10,709,689 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,057,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,181 UART:
2,202,603 UART: Running Caliptra ROM ...
2,203,772 UART:
2,203,943 UART: [state] CFI Enabled
2,204,925 UART: [state] LifecycleState = Unprovisioned
2,206,574 UART: [state] DebugLocked = No
2,207,681 UART: [state] WD Timer not started. Device not locked for debugging
2,210,146 UART: [kat] SHA2-256
2,210,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,830 UART: [kat] ++
2,214,282 UART: [kat] sha1
2,214,792 UART: [kat] SHA2-256
2,215,447 UART: [kat] SHA2-384
2,216,137 UART: [kat] SHA2-512-ACC
2,216,942 UART: [kat] ECC-384
3,282,935 UART: [kat] HMAC-384Kdf
3,295,853 UART: [kat] LMS
3,825,319 UART: [kat] --
3,828,954 UART: [cold-reset] ++
3,829,912 UART: [fht] FHT @ 0x50003400
3,841,515 UART: [idev] ++
3,842,080 UART: [idev] CDI.KEYID = 6
3,843,019 UART: [idev] SUBJECT.KEYID = 7
3,844,231 UART: [idev] UDS.KEYID = 0
3,862,851 UART: [idev] Erasing UDS.KEYID = 0
6,314,640 UART: [idev] Sha1 KeyId Algorithm
6,337,646 UART: [idev] --
6,340,767 UART: [ldev] ++
6,341,333 UART: [ldev] CDI.KEYID = 6
6,342,238 UART: [ldev] SUBJECT.KEYID = 5
6,343,447 UART: [ldev] AUTHORITY.KEYID = 7
6,344,672 UART: [ldev] FE.KEYID = 1
6,355,968 UART: [ldev] Erasing FE.KEYID = 1
8,828,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,065 UART: [ldev] --
10,621,337 UART: [fwproc] Wait for Commands...
10,624,457 UART: [fwproc] Recv command 0x46574c44
10,626,553 UART: [fwproc] Recv'd Img size: 114448 bytes
10,699,444 UART: ROM Fatal Error: 0x000B0009
10,702,532 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,675 writing to cptra_bootfsm_go
2,058,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,809 UART:
2,203,216 UART: Running Caliptra ROM ...
2,204,383 UART:
2,204,554 UART: [state] CFI Enabled
2,205,519 UART: [state] LifecycleState = Unprovisioned
2,207,175 UART: [state] DebugLocked = No
2,208,278 UART: [state] WD Timer not started. Device not locked for debugging
2,210,748 UART: [kat] SHA2-256
2,211,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,428 UART: [kat] ++
2,214,878 UART: [kat] sha1
2,215,394 UART: [kat] SHA2-256
2,216,074 UART: [kat] SHA2-384
2,216,735 UART: [kat] SHA2-512-ACC
2,217,535 UART: [kat] ECC-384
3,283,303 UART: [kat] HMAC-384Kdf
3,295,212 UART: [kat] LMS
3,824,715 UART: [kat] --
3,828,329 UART: [cold-reset] ++
3,830,631 UART: [fht] FHT @ 0x50003400
3,841,711 UART: [idev] ++
3,842,272 UART: [idev] CDI.KEYID = 6
3,843,282 UART: [idev] SUBJECT.KEYID = 7
3,844,379 UART: [idev] UDS.KEYID = 0
3,855,868 UART: [idev] Erasing UDS.KEYID = 0
6,308,434 UART: [idev] Sha1 KeyId Algorithm
6,330,681 UART: [idev] --
6,335,425 UART: [ldev] ++
6,336,006 UART: [ldev] CDI.KEYID = 6
6,336,920 UART: [ldev] SUBJECT.KEYID = 5
6,338,022 UART: [ldev] AUTHORITY.KEYID = 7
6,339,303 UART: [ldev] FE.KEYID = 1
6,350,538 UART: [ldev] Erasing FE.KEYID = 1
8,822,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,251 UART: [ldev] --
10,614,025 UART: [fwproc] Wait for Commands...
10,615,798 UART: [fwproc] Recv command 0x46574c44
10,617,894 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,098,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,179 >>> mbox cmd response: success
14,490,926 UART: [afmc] ++
14,491,514 UART: [afmc] CDI.KEYID = 6
14,492,422 UART: [afmc] SUBJECT.KEYID = 7
14,493,580 UART: [afmc] AUTHORITY.KEYID = 5
16,996,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,874 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,732,824 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,664 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,398 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,785,787 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,226,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,381 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,061,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,313 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,055,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,438 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,055,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,250,767 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,222,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,367,353 UART:
2,367,779 UART: Running Caliptra ROM ...
2,369,309 UART:
2,369,511 UART: [state] CFI Enabled
2,370,477 UART: [state] LifecycleState = Unprovisioned
2,372,140 UART: [state] DebugLocked = No
2,373,251 UART: [state] WD Timer not started. Device not locked for debugging
2,375,734 UART: [kat] SHA2-256
2,376,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,379,418 UART: [kat] ++
2,379,871 UART: [kat] sha1
2,380,384 UART: [kat] SHA2-256
2,381,128 UART: [kat] SHA2-384
2,381,794 UART: [kat] SHA2-512-ACC
2,382,680 UART: [kat] ECC-384
2,948,942 UART: [kat] HMAC-384Kdf
2,971,280 UART: [kat] LMS
3,500,762 UART: [kat] --
3,504,060 UART: [cold-reset] ++
3,506,478 UART: [fht] FHT @ 0x50003400
3,517,296 UART: [idev] ++
3,517,869 UART: [idev] CDI.KEYID = 6
3,518,781 UART: [idev] SUBJECT.KEYID = 7
3,520,001 UART: [idev] UDS.KEYID = 0
3,542,625 UART: [idev] Erasing UDS.KEYID = 0
6,025,984 UART: [idev] Sha1 KeyId Algorithm
6,047,384 UART: [idev] --
6,052,250 UART: [ldev] ++
6,052,869 UART: [ldev] CDI.KEYID = 6
6,053,956 UART: [ldev] SUBJECT.KEYID = 5
6,055,071 UART: [ldev] AUTHORITY.KEYID = 7
6,056,252 UART: [ldev] FE.KEYID = 1
6,099,312 UART: [ldev] Erasing FE.KEYID = 1
8,605,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,922 UART: [ldev] --
10,413,378 UART: [fwproc] Wait for Commands...
10,415,915 UART: [fwproc] Recv command 0x46574c44
10,417,963 UART: [fwproc] Recv'd Img size: 114448 bytes
10,494,080 UART: ROM Fatal Error: 0x000B0009
10,497,230 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,071,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,215,862 UART:
2,216,270 UART: Running Caliptra ROM ...
2,217,354 UART:
2,217,507 UART: [state] CFI Enabled
2,218,475 UART: [state] LifecycleState = Unprovisioned
2,220,140 UART: [state] DebugLocked = No
2,221,170 UART: [state] WD Timer not started. Device not locked for debugging
2,223,637 UART: [kat] SHA2-256
2,224,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,307 UART: [kat] ++
2,227,775 UART: [kat] sha1
2,228,289 UART: [kat] SHA2-256
2,228,948 UART: [kat] SHA2-384
2,229,605 UART: [kat] SHA2-512-ACC
2,230,492 UART: [kat] ECC-384
2,948,246 UART: [kat] HMAC-384Kdf
2,970,751 UART: [kat] LMS
3,500,191 UART: [kat] --
3,504,407 UART: [cold-reset] ++
3,506,235 UART: [fht] FHT @ 0x50003400
3,518,081 UART: [idev] ++
3,518,660 UART: [idev] CDI.KEYID = 6
3,519,588 UART: [idev] SUBJECT.KEYID = 7
3,520,746 UART: [idev] UDS.KEYID = 0
3,542,343 UART: [idev] Erasing UDS.KEYID = 0
6,023,032 UART: [idev] Sha1 KeyId Algorithm
6,047,475 UART: [idev] --
6,050,702 UART: [ldev] ++
6,051,287 UART: [ldev] CDI.KEYID = 6
6,052,205 UART: [ldev] SUBJECT.KEYID = 5
6,053,368 UART: [ldev] AUTHORITY.KEYID = 7
6,054,602 UART: [ldev] FE.KEYID = 1
6,097,121 UART: [ldev] Erasing FE.KEYID = 1
8,599,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,438 UART: [ldev] --
10,408,053 UART: [fwproc] Wait for Commands...
10,409,885 UART: [fwproc] Recv command 0x46574c44
10,411,931 UART: [fwproc] Recv'd Img size: 114448 bytes
10,487,094 UART: ROM Fatal Error: 0x000B0009
10,490,191 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,056,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,717 UART:
2,201,123 UART: Running Caliptra ROM ...
2,202,207 UART:
2,202,365 UART: [state] CFI Enabled
2,203,351 UART: [state] LifecycleState = Unprovisioned
2,205,244 UART: [state] DebugLocked = No
2,206,285 UART: [state] WD Timer not started. Device not locked for debugging
2,208,763 UART: [kat] SHA2-256
2,209,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,441 UART: [kat] ++
2,212,892 UART: [kat] sha1
2,213,402 UART: [kat] SHA2-256
2,214,061 UART: [kat] SHA2-384
2,214,721 UART: [kat] SHA2-512-ACC
2,215,522 UART: [kat] ECC-384
2,946,513 UART: [kat] HMAC-384Kdf
2,969,769 UART: [kat] LMS
3,499,201 UART: [kat] --
3,503,735 UART: [cold-reset] ++
3,504,802 UART: [fht] FHT @ 0x50003400
3,514,922 UART: [idev] ++
3,515,514 UART: [idev] CDI.KEYID = 6
3,516,400 UART: [idev] SUBJECT.KEYID = 7
3,517,613 UART: [idev] UDS.KEYID = 0
3,545,044 UART: [idev] Erasing UDS.KEYID = 0
6,029,363 UART: [idev] Sha1 KeyId Algorithm
6,052,321 UART: [idev] --
6,056,152 UART: [ldev] ++
6,056,737 UART: [ldev] CDI.KEYID = 6
6,057,624 UART: [ldev] SUBJECT.KEYID = 5
6,058,845 UART: [ldev] AUTHORITY.KEYID = 7
6,060,085 UART: [ldev] FE.KEYID = 1
6,101,614 UART: [ldev] Erasing FE.KEYID = 1
8,604,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,479 UART: [ldev] --
10,414,717 UART: [fwproc] Wait for Commands...
10,416,812 UART: [fwproc] Recv command 0x46574c44
10,418,906 UART: [fwproc] Recv'd Img size: 114448 bytes
10,489,090 UART: ROM Fatal Error: 0x000B0009
10,492,181 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,056,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,797 UART:
2,202,218 UART: Running Caliptra ROM ...
2,203,305 UART:
2,203,461 UART: [state] CFI Enabled
2,204,464 UART: [state] LifecycleState = Unprovisioned
2,206,132 UART: [state] DebugLocked = No
2,207,160 UART: [state] WD Timer not started. Device not locked for debugging
2,209,627 UART: [kat] SHA2-256
2,210,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,310 UART: [kat] ++
2,213,764 UART: [kat] sha1
2,214,279 UART: [kat] SHA2-256
2,214,936 UART: [kat] SHA2-384
2,215,591 UART: [kat] SHA2-512-ACC
2,216,390 UART: [kat] ECC-384
2,950,343 UART: [kat] HMAC-384Kdf
2,971,395 UART: [kat] LMS
3,500,817 UART: [kat] --
3,504,103 UART: [cold-reset] ++
3,506,354 UART: [fht] FHT @ 0x50003400
3,518,150 UART: [idev] ++
3,518,718 UART: [idev] CDI.KEYID = 6
3,519,690 UART: [idev] SUBJECT.KEYID = 7
3,520,857 UART: [idev] UDS.KEYID = 0
3,542,778 UART: [idev] Erasing UDS.KEYID = 0
6,023,668 UART: [idev] Sha1 KeyId Algorithm
6,046,135 UART: [idev] --
6,049,947 UART: [ldev] ++
6,050,535 UART: [ldev] CDI.KEYID = 6
6,051,445 UART: [ldev] SUBJECT.KEYID = 5
6,052,672 UART: [ldev] AUTHORITY.KEYID = 7
6,053,805 UART: [ldev] FE.KEYID = 1
6,098,771 UART: [ldev] Erasing FE.KEYID = 1
8,604,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,743 UART: [ldev] --
10,413,199 UART: [fwproc] Wait for Commands...
10,414,709 UART: [fwproc] Recv command 0x46574c44
10,416,813 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,893,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,280,271 >>> mbox cmd response: success
14,284,051 UART: [afmc] ++
14,284,647 UART: [afmc] CDI.KEYID = 6
14,285,580 UART: [afmc] SUBJECT.KEYID = 7
14,286,746 UART: [afmc] AUTHORITY.KEYID = 5
16,825,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,692 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,568,680 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,584,493 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,600,269 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,624,020 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,223,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,270,825 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,062,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,291,814 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,054,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,277,709 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,054,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,006 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
2,224,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,369,275 UART:
2,369,690 UART: Running Caliptra ROM ...
2,370,860 UART:
2,371,035 UART: [state] CFI Enabled
2,372,010 UART: [state] LifecycleState = Unprovisioned
2,373,671 UART: [state] DebugLocked = No
2,374,779 UART: [state] WD Timer not started. Device not locked for debugging
2,377,249 UART: [kat] SHA2-256
2,377,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,380,921 UART: [kat] ++
2,381,426 UART: [kat] sha1
2,381,940 UART: [kat] SHA2-256
2,382,682 UART: [kat] SHA2-384
2,383,351 UART: [kat] SHA2-512-ACC
2,384,229 UART: [kat] ECC-384
3,280,571 UART: [kat] HMAC-384Kdf
3,293,482 UART: [kat] LMS
3,822,999 UART: [kat] --
3,827,127 UART: [cold-reset] ++
3,828,358 UART: [fht] FHT @ 0x50003400
3,840,361 UART: [idev] ++
3,840,948 UART: [idev] CDI.KEYID = 6
3,841,864 UART: [idev] SUBJECT.KEYID = 7
3,843,078 UART: [idev] UDS.KEYID = 0
3,856,142 UART: [idev] Erasing UDS.KEYID = 0
6,312,522 UART: [idev] Sha1 KeyId Algorithm
6,335,999 UART: [idev] --
6,339,879 UART: [ldev] ++
6,340,441 UART: [ldev] CDI.KEYID = 6
6,341,354 UART: [ldev] SUBJECT.KEYID = 5
6,342,509 UART: [ldev] AUTHORITY.KEYID = 7
6,343,763 UART: [ldev] FE.KEYID = 1
6,356,134 UART: [ldev] Erasing FE.KEYID = 1
8,832,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,022 UART: [ldev] --
10,623,232 UART: [fwproc] Wait for Commands...
10,625,756 UART: [fwproc] Recv command 0x46574c44
10,627,842 UART: [fwproc] Recv'd Img size: 114448 bytes
10,698,942 UART: ROM Fatal Error: 0x000B0009
10,702,057 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,062,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,207,099 UART:
2,207,519 UART: Running Caliptra ROM ...
2,208,601 UART:
2,208,755 UART: [state] CFI Enabled
2,209,728 UART: [state] LifecycleState = Unprovisioned
2,211,388 UART: [state] DebugLocked = No
2,212,413 UART: [state] WD Timer not started. Device not locked for debugging
2,214,873 UART: [kat] SHA2-256
2,215,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,559 UART: [kat] ++
2,219,004 UART: [kat] sha1
2,219,520 UART: [kat] SHA2-256
2,220,179 UART: [kat] SHA2-384
2,220,926 UART: [kat] SHA2-512-ACC
2,221,773 UART: [kat] ECC-384
3,277,335 UART: [kat] HMAC-384Kdf
3,289,651 UART: [kat] LMS
3,819,149 UART: [kat] --
3,822,358 UART: [cold-reset] ++
3,824,514 UART: [fht] FHT @ 0x50003400
3,836,517 UART: [idev] ++
3,837,079 UART: [idev] CDI.KEYID = 6
3,837,989 UART: [idev] SUBJECT.KEYID = 7
3,839,209 UART: [idev] UDS.KEYID = 0
3,855,851 UART: [idev] Erasing UDS.KEYID = 0
6,310,812 UART: [idev] Sha1 KeyId Algorithm
6,334,584 UART: [idev] --
6,338,250 UART: [ldev] ++
6,338,813 UART: [ldev] CDI.KEYID = 6
6,339,718 UART: [ldev] SUBJECT.KEYID = 5
6,340,930 UART: [ldev] AUTHORITY.KEYID = 7
6,342,157 UART: [ldev] FE.KEYID = 1
6,353,136 UART: [ldev] Erasing FE.KEYID = 1
8,825,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,750 UART: [ldev] --
10,614,211 UART: [fwproc] Wait for Commands...
10,615,630 UART: [fwproc] Recv command 0x46574c44
10,617,729 UART: [fwproc] Recv'd Img size: 114448 bytes
10,689,222 UART: ROM Fatal Error: 0x000B0009
10,692,304 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,056,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,214 UART:
2,201,613 UART: Running Caliptra ROM ...
2,202,772 UART:
2,202,980 UART: [state] CFI Enabled
2,203,966 UART: [state] LifecycleState = Unprovisioned
2,205,619 UART: [state] DebugLocked = No
2,206,724 UART: [state] WD Timer not started. Device not locked for debugging
2,209,191 UART: [kat] SHA2-256
2,209,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,867 UART: [kat] ++
2,213,317 UART: [kat] sha1
2,213,829 UART: [kat] SHA2-256
2,214,568 UART: [kat] SHA2-384
2,215,232 UART: [kat] SHA2-512-ACC
2,216,079 UART: [kat] ECC-384
3,277,637 UART: [kat] HMAC-384Kdf
3,290,157 UART: [kat] LMS
3,819,641 UART: [kat] --
3,825,521 UART: [cold-reset] ++
3,826,926 UART: [fht] FHT @ 0x50003400
3,838,659 UART: [idev] ++
3,839,258 UART: [idev] CDI.KEYID = 6
3,840,142 UART: [idev] SUBJECT.KEYID = 7
3,841,357 UART: [idev] UDS.KEYID = 0
3,856,360 UART: [idev] Erasing UDS.KEYID = 0
6,313,069 UART: [idev] Sha1 KeyId Algorithm
6,336,073 UART: [idev] --
6,339,938 UART: [ldev] ++
6,340,506 UART: [ldev] CDI.KEYID = 6
6,341,411 UART: [ldev] SUBJECT.KEYID = 5
6,342,570 UART: [ldev] AUTHORITY.KEYID = 7
6,343,851 UART: [ldev] FE.KEYID = 1
6,352,714 UART: [ldev] Erasing FE.KEYID = 1
8,826,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,140 UART: [ldev] --
10,615,509 UART: [fwproc] Wait for Commands...
10,618,316 UART: [fwproc] Recv command 0x46574c44
10,620,410 UART: [fwproc] Recv'd Img size: 114448 bytes
10,694,297 UART: ROM Fatal Error: 0x000B0009
10,697,392 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,057,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,891 UART:
2,202,308 UART: Running Caliptra ROM ...
2,203,386 UART:
2,203,544 UART: [state] CFI Enabled
2,204,520 UART: [state] LifecycleState = Unprovisioned
2,206,193 UART: [state] DebugLocked = No
2,207,218 UART: [state] WD Timer not started. Device not locked for debugging
2,209,691 UART: [kat] SHA2-256
2,210,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,371 UART: [kat] ++
2,213,820 UART: [kat] sha1
2,214,327 UART: [kat] SHA2-256
2,214,985 UART: [kat] SHA2-384
2,215,641 UART: [kat] SHA2-512-ACC
2,216,544 UART: [kat] ECC-384
3,279,998 UART: [kat] HMAC-384Kdf
3,294,130 UART: [kat] LMS
3,823,598 UART: [kat] --
3,827,106 UART: [cold-reset] ++
3,828,871 UART: [fht] FHT @ 0x50003400
3,839,689 UART: [idev] ++
3,840,260 UART: [idev] CDI.KEYID = 6
3,841,220 UART: [idev] SUBJECT.KEYID = 7
3,842,374 UART: [idev] UDS.KEYID = 0
3,856,730 UART: [idev] Erasing UDS.KEYID = 0
6,312,396 UART: [idev] Sha1 KeyId Algorithm
6,335,292 UART: [idev] --
6,339,495 UART: [ldev] ++
6,340,063 UART: [ldev] CDI.KEYID = 6
6,340,977 UART: [ldev] SUBJECT.KEYID = 5
6,342,206 UART: [ldev] AUTHORITY.KEYID = 7
6,343,439 UART: [ldev] FE.KEYID = 1
6,355,166 UART: [ldev] Erasing FE.KEYID = 1
8,830,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,761 UART: [ldev] --
10,625,590 UART: [fwproc] Wait for Commands...
10,627,897 UART: [fwproc] Recv command 0x46574c44
10,629,989 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,112,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,270 >>> mbox cmd response: success
14,503,053 UART: [afmc] ++
14,503,643 UART: [afmc] CDI.KEYID = 6
14,504,555 UART: [afmc] SUBJECT.KEYID = 7
14,505,714 UART: [afmc] AUTHORITY.KEYID = 5
17,000,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,399 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,737,386 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,753,189 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,769,022 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,792,654 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,224,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,469,267 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,061,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,467,032 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,057,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,512 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,056,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,356 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,150 UART: [ldev] --
1,281,668 UART: [fwproc] Wait for Commands...
1,282,429 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,876 UART: ROM Fatal Error: 0x000B0009
1,309,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
903,920 UART: [kat] SHA2-512-ACC
905,821 UART: [kat] ECC-384
915,354 UART: [kat] HMAC-384Kdf
919,928 UART: [kat] LMS
1,168,240 UART: [kat] --
1,169,119 UART: [cold-reset] ++
1,169,599 UART: [fht] FHT @ 0x50003400
1,172,079 UART: [idev] ++
1,172,247 UART: [idev] CDI.KEYID = 6
1,172,608 UART: [idev] SUBJECT.KEYID = 7
1,173,033 UART: [idev] UDS.KEYID = 0
1,180,837 UART: [idev] Erasing UDS.KEYID = 0
1,197,781 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,306 UART: [ldev] Erasing FE.KEYID = 1
1,240,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,556 UART: [ldev] --
1,279,866 UART: [fwproc] Wait for Commands...
1,280,561 UART: [fwproc] Recv command 0x46574c44
1,281,294 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,662 UART: ROM Fatal Error: 0x000B0009
1,307,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
85,891 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
890,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,913 UART: [kat] ++
895,065 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,848 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,956 UART: [fwproc] Wait for Commands...
1,281,657 UART: [fwproc] Recv command 0x46574c44
1,282,390 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,544 UART: ROM Fatal Error: 0x000B0009
1,308,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,893 UART: [state] WD Timer not started. Device not locked for debugging
87,018 UART: [kat] SHA2-256
890,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,697 UART: [kat] ++
894,849 UART: [kat] sha1
899,147 UART: [kat] SHA2-256
901,087 UART: [kat] SHA2-384
903,852 UART: [kat] SHA2-512-ACC
905,753 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,255 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,112 UART: [ldev] ++
1,209,280 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,071 UART: [ldev] AUTHORITY.KEYID = 7
1,210,534 UART: [ldev] FE.KEYID = 1
1,215,898 UART: [ldev] Erasing FE.KEYID = 1
1,242,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,140 UART: [ldev] --
1,282,654 UART: [fwproc] Wait for Commands...
1,283,287 UART: [fwproc] Recv command 0x46574c44
1,284,020 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,583 >>> mbox cmd response: success
2,775,682 UART: [afmc] ++
2,775,850 UART: [afmc] CDI.KEYID = 6
2,776,213 UART: [afmc] SUBJECT.KEYID = 7
2,776,639 UART: [afmc] AUTHORITY.KEYID = 5
2,812,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,159 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,872 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,781 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,495 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,266 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,433 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,360 UART: [fht] FHT @ 0x50003400
1,174,042 UART: [idev] ++
1,174,210 UART: [idev] CDI.KEYID = 6
1,174,571 UART: [idev] SUBJECT.KEYID = 7
1,174,996 UART: [idev] UDS.KEYID = 0
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,200,034 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,303 UART: [fwproc] Wait for Commands...
1,283,100 UART: [fwproc] Recv command 0x46574c44
1,283,833 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,641 UART: ROM Fatal Error: 0x000B0009
1,309,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,453 UART: [kat] LMS
1,168,765 UART: [kat] --
1,169,704 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,181,546 UART: [idev] Erasing UDS.KEYID = 0
1,198,464 UART: [idev] Sha1 KeyId Algorithm
1,207,326 UART: [idev] --
1,208,385 UART: [ldev] ++
1,208,553 UART: [ldev] CDI.KEYID = 6
1,208,917 UART: [ldev] SUBJECT.KEYID = 5
1,209,344 UART: [ldev] AUTHORITY.KEYID = 7
1,209,807 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,195 UART: [ldev] --
1,280,533 UART: [fwproc] Wait for Commands...
1,281,172 UART: [fwproc] Recv command 0x46574c44
1,281,905 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,157 UART: ROM Fatal Error: 0x000B0009
1,308,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,500 UART: [idev] ++
1,173,668 UART: [idev] CDI.KEYID = 6
1,174,029 UART: [idev] SUBJECT.KEYID = 7
1,174,454 UART: [idev] UDS.KEYID = 0
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,198,936 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,511 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,486 UART: [fwproc] Recv command 0x46574c44
1,282,219 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,519 UART: ROM Fatal Error: 0x000B0009
1,308,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,589 UART: [kat] LMS
1,169,901 UART: [kat] --
1,170,780 UART: [cold-reset] ++
1,171,170 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,061 UART: [ldev] ++
1,209,229 UART: [ldev] CDI.KEYID = 6
1,209,593 UART: [ldev] SUBJECT.KEYID = 5
1,210,020 UART: [ldev] AUTHORITY.KEYID = 7
1,210,483 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,703 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,128 >>> mbox cmd response: success
2,775,323 UART: [afmc] ++
2,775,491 UART: [afmc] CDI.KEYID = 6
2,775,854 UART: [afmc] SUBJECT.KEYID = 7
2,776,280 UART: [afmc] AUTHORITY.KEYID = 5
2,811,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,014 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,727 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,636 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,350 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,289 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,896 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,197,759 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,896 UART: [ldev] ++
1,208,064 UART: [ldev] CDI.KEYID = 6
1,208,428 UART: [ldev] SUBJECT.KEYID = 5
1,208,855 UART: [ldev] AUTHORITY.KEYID = 7
1,209,318 UART: [ldev] FE.KEYID = 1
1,214,766 UART: [ldev] Erasing FE.KEYID = 1
1,241,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,730 UART: [fwproc] Wait for Commands...
1,281,403 UART: [fwproc] Recv command 0x46574c44
1,282,136 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,450 UART: ROM Fatal Error: 0x000B0009
1,308,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,991 UART: [kat] ++
895,143 UART: [kat] sha1
899,307 UART: [kat] SHA2-256
901,247 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,650 UART: [kat] LMS
1,168,962 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,661 UART: [idev] ++
1,172,829 UART: [idev] CDI.KEYID = 6
1,173,190 UART: [idev] SUBJECT.KEYID = 7
1,173,615 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,197,893 UART: [idev] Sha1 KeyId Algorithm
1,206,739 UART: [idev] --
1,207,822 UART: [ldev] ++
1,207,990 UART: [ldev] CDI.KEYID = 6
1,208,354 UART: [ldev] SUBJECT.KEYID = 5
1,208,781 UART: [ldev] AUTHORITY.KEYID = 7
1,209,244 UART: [ldev] FE.KEYID = 1
1,214,492 UART: [ldev] Erasing FE.KEYID = 1
1,240,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,488 UART: [ldev] --
1,279,946 UART: [fwproc] Wait for Commands...
1,280,711 UART: [fwproc] Recv command 0x46574c44
1,281,444 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,830 UART: ROM Fatal Error: 0x000B0009
1,307,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,176 UART: [kat] SHA2-256
890,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,855 UART: [kat] ++
895,007 UART: [kat] sha1
899,197 UART: [kat] SHA2-256
901,137 UART: [kat] SHA2-384
903,944 UART: [kat] SHA2-512-ACC
905,845 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,207,081 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,736 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,348 UART: [ldev] --
1,279,798 UART: [fwproc] Wait for Commands...
1,280,539 UART: [fwproc] Recv command 0x46574c44
1,281,272 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,730 UART: ROM Fatal Error: 0x000B0009
1,307,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,758 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,090 UART: [kat] SHA2-256
890,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,769 UART: [kat] ++
894,921 UART: [kat] sha1
899,099 UART: [kat] SHA2-256
901,039 UART: [kat] SHA2-384
903,670 UART: [kat] SHA2-512-ACC
905,571 UART: [kat] ECC-384
915,174 UART: [kat] HMAC-384Kdf
919,814 UART: [kat] LMS
1,168,126 UART: [kat] --
1,168,869 UART: [cold-reset] ++
1,169,449 UART: [fht] FHT @ 0x50003400
1,172,111 UART: [idev] ++
1,172,279 UART: [idev] CDI.KEYID = 6
1,172,640 UART: [idev] SUBJECT.KEYID = 7
1,173,065 UART: [idev] UDS.KEYID = 0
1,181,253 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,201 >>> mbox cmd response: success
2,774,406 UART: [afmc] ++
2,774,574 UART: [afmc] CDI.KEYID = 6
2,774,937 UART: [afmc] SUBJECT.KEYID = 7
2,775,363 UART: [afmc] AUTHORITY.KEYID = 5
2,810,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,295 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,008 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,917 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,631 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,610 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,391 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,411 UART: [kat] LMS
1,169,723 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,380 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,213 UART: [fwproc] Wait for Commands...
1,281,838 UART: [fwproc] Recv command 0x46574c44
1,282,571 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,455 UART: ROM Fatal Error: 0x000B0009
1,308,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,295 UART: [state] LifecycleState = Unprovisioned
86,950 UART: [state] DebugLocked = No
87,586 UART: [state] WD Timer not started. Device not locked for debugging
88,937 UART: [kat] SHA2-256
892,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,616 UART: [kat] ++
896,768 UART: [kat] sha1
901,112 UART: [kat] SHA2-256
903,052 UART: [kat] SHA2-384
906,003 UART: [kat] SHA2-512-ACC
907,904 UART: [kat] ECC-384
917,805 UART: [kat] HMAC-384Kdf
922,403 UART: [kat] LMS
1,170,715 UART: [kat] --
1,171,484 UART: [cold-reset] ++
1,172,014 UART: [fht] FHT @ 0x50003400
1,174,698 UART: [idev] ++
1,174,866 UART: [idev] CDI.KEYID = 6
1,175,227 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,184,038 UART: [idev] Erasing UDS.KEYID = 0
1,201,578 UART: [idev] Sha1 KeyId Algorithm
1,210,424 UART: [idev] --
1,211,459 UART: [ldev] ++
1,211,627 UART: [ldev] CDI.KEYID = 6
1,211,991 UART: [ldev] SUBJECT.KEYID = 5
1,212,418 UART: [ldev] AUTHORITY.KEYID = 7
1,212,881 UART: [ldev] FE.KEYID = 1
1,218,377 UART: [ldev] Erasing FE.KEYID = 1
1,245,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,899 UART: [ldev] --
1,284,417 UART: [fwproc] Wait for Commands...
1,285,130 UART: [fwproc] Recv command 0x46574c44
1,285,863 UART: [fwproc] Recv'd Img size: 114448 bytes
1,311,639 UART: ROM Fatal Error: 0x000B0009
1,312,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,698 UART: [idev] ++
1,172,866 UART: [idev] CDI.KEYID = 6
1,173,227 UART: [idev] SUBJECT.KEYID = 7
1,173,652 UART: [idev] UDS.KEYID = 0
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,198,598 UART: [idev] Sha1 KeyId Algorithm
1,207,368 UART: [idev] --
1,208,365 UART: [ldev] ++
1,208,533 UART: [ldev] CDI.KEYID = 6
1,208,897 UART: [ldev] SUBJECT.KEYID = 5
1,209,324 UART: [ldev] AUTHORITY.KEYID = 7
1,209,787 UART: [ldev] FE.KEYID = 1
1,215,215 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,253 UART: [ldev] --
1,280,533 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,721 UART: ROM Fatal Error: 0x000B0009
1,308,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,369 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,088 >>> mbox cmd response: success
2,775,243 UART: [afmc] ++
2,775,411 UART: [afmc] CDI.KEYID = 6
2,775,774 UART: [afmc] SUBJECT.KEYID = 7
2,776,200 UART: [afmc] AUTHORITY.KEYID = 5
2,811,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,828 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,541 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,450 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,164 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,905 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,306 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,216,460 UART: [ldev] Erasing FE.KEYID = 1
1,243,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,388 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,954 UART: ROM Fatal Error: 0x000B0009
1,310,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,829 UART: [kat] ++
894,981 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,850 UART: [ldev] --
1,281,122 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,994 UART: ROM Fatal Error: 0x000B0009
1,309,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,527 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,215,772 UART: [ldev] Erasing FE.KEYID = 1
1,242,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,964 UART: ROM Fatal Error: 0x000B0009
1,310,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
916,558 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,233 UART: [idev] ++
1,173,401 UART: [idev] CDI.KEYID = 6
1,173,762 UART: [idev] SUBJECT.KEYID = 7
1,174,187 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,844 UART: [fwproc] Wait for Commands...
1,281,457 UART: [fwproc] Recv command 0x46574c44
1,282,190 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,373 >>> mbox cmd response: success
2,775,520 UART: [afmc] ++
2,775,688 UART: [afmc] CDI.KEYID = 6
2,776,051 UART: [afmc] SUBJECT.KEYID = 7
2,776,477 UART: [afmc] AUTHORITY.KEYID = 5
2,812,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,459 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,172 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,081 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,795 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,664 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,785 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,553 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,125 UART: ROM Fatal Error: 0x000B0009
1,309,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
891,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,181,684 UART: [idev] Erasing UDS.KEYID = 0
1,198,460 UART: [idev] Sha1 KeyId Algorithm
1,207,170 UART: [idev] --
1,208,233 UART: [ldev] ++
1,208,401 UART: [ldev] CDI.KEYID = 6
1,208,765 UART: [ldev] SUBJECT.KEYID = 5
1,209,192 UART: [ldev] AUTHORITY.KEYID = 7
1,209,655 UART: [ldev] FE.KEYID = 1
1,215,037 UART: [ldev] Erasing FE.KEYID = 1
1,241,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,435 UART: [ldev] --
1,280,921 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,695 UART: ROM Fatal Error: 0x000B0009
1,308,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,793 UART: [state] LifecycleState = Unprovisioned
85,448 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,333 UART: [kat] SHA2-256
890,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,012 UART: [kat] ++
895,164 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,015 UART: [kat] SHA2-512-ACC
905,916 UART: [kat] ECC-384
915,561 UART: [kat] HMAC-384Kdf
920,089 UART: [kat] LMS
1,168,401 UART: [kat] --
1,169,240 UART: [cold-reset] ++
1,169,664 UART: [fht] FHT @ 0x50003400
1,172,514 UART: [idev] ++
1,172,682 UART: [idev] CDI.KEYID = 6
1,173,043 UART: [idev] SUBJECT.KEYID = 7
1,173,468 UART: [idev] UDS.KEYID = 0
1,181,432 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,761 UART: [ldev] ++
1,208,929 UART: [ldev] CDI.KEYID = 6
1,209,293 UART: [ldev] SUBJECT.KEYID = 5
1,209,720 UART: [ldev] AUTHORITY.KEYID = 7
1,210,183 UART: [ldev] FE.KEYID = 1
1,215,433 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,049 UART: ROM Fatal Error: 0x000B0009
1,309,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,591 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,583 UART: [ldev] Erasing FE.KEYID = 1
1,241,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,662 >>> mbox cmd response: success
2,774,827 UART: [afmc] ++
2,774,995 UART: [afmc] CDI.KEYID = 6
2,775,358 UART: [afmc] SUBJECT.KEYID = 7
2,775,784 UART: [afmc] AUTHORITY.KEYID = 5
2,811,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,088 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,801 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,710 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,424 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,129 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,661 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,702 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
5,556 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,020 UART:
192,414 UART: Running Caliptra ROM ...
193,515 UART:
193,659 UART: [state] CFI Enabled
261,878 UART: [state] LifecycleState = Unprovisioned
263,918 UART: [state] DebugLocked = No
265,194 UART: [state] WD Timer not started. Device not locked for debugging
269,676 UART: [kat] SHA2-256
451,656 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,128 UART: [kat] ++
463,718 UART: [kat] sha1
473,738 UART: [kat] SHA2-256
476,739 UART: [kat] SHA2-384
482,004 UART: [kat] SHA2-512-ACC
484,618 UART: [kat] ECC-384
3,773,325 UART: [kat] HMAC-384Kdf
3,798,390 UART: [kat] LMS
4,871,519 UART: [kat] --
4,876,571 UART: [cold-reset] ++
4,879,154 UART: [fht] FHT @ 0x50003400
4,889,317 UART: [idev] ++
4,889,999 UART: [idev] CDI.KEYID = 6
4,891,228 UART: [idev] SUBJECT.KEYID = 7
4,892,325 UART: [idev] UDS.KEYID = 0
4,907,382 UART: [idev] Erasing UDS.KEYID = 0
8,221,247 UART: [idev] Sha1 KeyId Algorithm
8,242,809 UART: [idev] --
8,246,635 UART: [ldev] ++
8,247,209 UART: [ldev] CDI.KEYID = 6
8,248,447 UART: [ldev] SUBJECT.KEYID = 5
8,249,572 UART: [ldev] AUTHORITY.KEYID = 7
8,250,804 UART: [ldev] FE.KEYID = 1
8,294,881 UART: [ldev] Erasing FE.KEYID = 1
11,630,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,769 UART: [ldev] --
14,015,625 UART: [fwproc] Wait for Commands...
14,018,691 UART: [fwproc] Recv command 0x46574c44
14,020,948 UART: [fwproc] Recv'd Img size: 114124 bytes
18,097,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,174,759 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,243,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,559,998 >>> mbox cmd response: success
18,563,593 UART: [afmc] ++
18,564,184 UART: [afmc] CDI.KEYID = 6
18,565,389 UART: [afmc] SUBJECT.KEYID = 7
18,566,545 UART: [afmc] AUTHORITY.KEYID = 5
21,945,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,258,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,261,108 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,277,304 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,293,313 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,309,298 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,330,911 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
5,618 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,346,191 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
6,559 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,511 UART:
192,900 UART: Running Caliptra ROM ...
194,084 UART:
603,794 UART: [state] CFI Enabled
615,634 UART: [state] LifecycleState = Unprovisioned
618,011 UART: [state] DebugLocked = No
619,554 UART: [state] WD Timer not started. Device not locked for debugging
623,564 UART: [kat] SHA2-256
805,562 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,096 UART: [kat] ++
817,630 UART: [kat] sha1
828,125 UART: [kat] SHA2-256
831,128 UART: [kat] SHA2-384
835,429 UART: [kat] SHA2-512-ACC
838,039 UART: [kat] ECC-384
4,094,007 UART: [kat] HMAC-384Kdf
4,105,892 UART: [kat] LMS
5,179,074 UART: [kat] --
5,181,159 UART: [cold-reset] ++
5,183,262 UART: [fht] FHT @ 0x50003400
5,194,841 UART: [idev] ++
5,195,564 UART: [idev] CDI.KEYID = 6
5,196,674 UART: [idev] SUBJECT.KEYID = 7
5,198,157 UART: [idev] UDS.KEYID = 0
5,213,726 UART: [idev] Erasing UDS.KEYID = 0
8,483,511 UART: [idev] Sha1 KeyId Algorithm
8,506,715 UART: [idev] --
8,510,435 UART: [ldev] ++
8,511,054 UART: [ldev] CDI.KEYID = 6
8,512,161 UART: [ldev] SUBJECT.KEYID = 5
8,513,692 UART: [ldev] AUTHORITY.KEYID = 7
8,515,167 UART: [ldev] FE.KEYID = 1
8,525,921 UART: [ldev] Erasing FE.KEYID = 1
11,817,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,784 UART: [ldev] --
14,183,644 UART: [fwproc] Wait for Commands...
14,186,652 UART: [fwproc] Recv command 0x46574c44
14,188,963 UART: [fwproc] Recv'd Img size: 114124 bytes
18,261,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,338,813 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,407,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,724,747 >>> mbox cmd response: success
18,728,707 UART: [afmc] ++
18,729,286 UART: [afmc] CDI.KEYID = 6
18,730,465 UART: [afmc] SUBJECT.KEYID = 7
18,731,618 UART: [afmc] AUTHORITY.KEYID = 5
22,050,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,347,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,349,444 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,365,599 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,381,666 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,397,671 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,420,002 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
5,969 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,539,695 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,913 writing to cptra_bootfsm_go
6,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,051 UART:
193,433 UART: Running Caliptra ROM ...
194,604 UART:
194,760 UART: [state] CFI Enabled
261,924 UART: [state] LifecycleState = Unprovisioned
263,783 UART: [state] DebugLocked = No
265,833 UART: [state] WD Timer not started. Device not locked for debugging
269,574 UART: [kat] SHA2-256
448,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,299 UART: [kat] ++
460,745 UART: [kat] sha1
470,917 UART: [kat] SHA2-256
473,975 UART: [kat] SHA2-384
479,674 UART: [kat] SHA2-512-ACC
482,615 UART: [kat] ECC-384
2,945,368 UART: [kat] HMAC-384Kdf
2,969,560 UART: [kat] LMS
3,499,010 UART: [kat] --
3,503,973 UART: [cold-reset] ++
3,504,985 UART: [fht] FHT @ 0x50003400
3,515,482 UART: [idev] ++
3,516,045 UART: [idev] CDI.KEYID = 6
3,517,033 UART: [idev] SUBJECT.KEYID = 7
3,518,203 UART: [idev] UDS.KEYID = 0
3,541,149 UART: [idev] Erasing UDS.KEYID = 0
6,023,493 UART: [idev] Sha1 KeyId Algorithm
6,047,807 UART: [idev] --
6,051,764 UART: [ldev] ++
6,052,346 UART: [ldev] CDI.KEYID = 6
6,053,268 UART: [ldev] SUBJECT.KEYID = 5
6,054,435 UART: [ldev] AUTHORITY.KEYID = 7
6,055,730 UART: [ldev] FE.KEYID = 1
6,097,607 UART: [ldev] Erasing FE.KEYID = 1
8,601,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,458 UART: [ldev] --
10,410,204 UART: [fwproc] Wait for Commands...
10,412,747 UART: [fwproc] Recv command 0x46574c44
10,414,854 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,904 >>> mbox cmd response: success
14,291,855 UART: [afmc] ++
14,292,449 UART: [afmc] CDI.KEYID = 6
14,293,357 UART: [afmc] SUBJECT.KEYID = 7
14,294,525 UART: [afmc] AUTHORITY.KEYID = 5
16,822,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,389 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,658 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
5,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,098,004 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
6,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,596 UART:
192,982 UART: Running Caliptra ROM ...
194,154 UART:
603,620 UART: [state] CFI Enabled
613,967 UART: [state] LifecycleState = Unprovisioned
615,850 UART: [state] DebugLocked = No
618,682 UART: [state] WD Timer not started. Device not locked for debugging
622,303 UART: [kat] SHA2-256
801,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,983 UART: [kat] ++
813,515 UART: [kat] sha1
824,845 UART: [kat] SHA2-256
827,857 UART: [kat] SHA2-384
834,855 UART: [kat] SHA2-512-ACC
837,783 UART: [kat] ECC-384
3,277,869 UART: [kat] HMAC-384Kdf
3,290,468 UART: [kat] LMS
3,819,940 UART: [kat] --
3,824,737 UART: [cold-reset] ++
3,827,262 UART: [fht] FHT @ 0x50003400
3,838,235 UART: [idev] ++
3,838,792 UART: [idev] CDI.KEYID = 6
3,839,694 UART: [idev] SUBJECT.KEYID = 7
3,840,904 UART: [idev] UDS.KEYID = 0
3,857,740 UART: [idev] Erasing UDS.KEYID = 0
6,310,241 UART: [idev] Sha1 KeyId Algorithm
6,333,142 UART: [idev] --
6,337,150 UART: [ldev] ++
6,337,716 UART: [ldev] CDI.KEYID = 6
6,338,594 UART: [ldev] SUBJECT.KEYID = 5
6,339,805 UART: [ldev] AUTHORITY.KEYID = 7
6,341,089 UART: [ldev] FE.KEYID = 1
6,352,358 UART: [ldev] Erasing FE.KEYID = 1
8,824,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,057 UART: [ldev] --
10,615,266 UART: [fwproc] Wait for Commands...
10,617,421 UART: [fwproc] Recv command 0x46574c44
10,619,461 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,659 >>> mbox cmd response: success
14,487,963 UART: [afmc] ++
14,488,541 UART: [afmc] CDI.KEYID = 6
14,489,423 UART: [afmc] SUBJECT.KEYID = 7
14,490,689 UART: [afmc] AUTHORITY.KEYID = 5
16,988,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,937 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,014 writing to cptra_bootfsm_go
8,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,891 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,212 UART:
192,598 UART: Running Caliptra ROM ...
193,760 UART:
193,913 UART: [state] CFI Enabled
264,065 UART: [state] LifecycleState = Unprovisioned
265,919 UART: [state] DebugLocked = No
267,619 UART: [state] WD Timer not started. Device not locked for debugging
271,143 UART: [kat] SHA2-256
450,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,825 UART: [kat] ++
462,269 UART: [kat] sha1
472,385 UART: [kat] SHA2-256
475,395 UART: [kat] SHA2-384
480,505 UART: [kat] SHA2-512-ACC
483,452 UART: [kat] ECC-384
2,944,438 UART: [kat] HMAC-384Kdf
2,967,552 UART: [kat] LMS
3,497,007 UART: [kat] --
3,501,174 UART: [cold-reset] ++
3,503,163 UART: [fht] FHT @ 0x50003400
3,515,060 UART: [idev] ++
3,515,625 UART: [idev] CDI.KEYID = 6
3,516,501 UART: [idev] SUBJECT.KEYID = 7
3,517,709 UART: [idev] UDS.KEYID = 0
3,539,426 UART: [idev] Erasing UDS.KEYID = 0
6,023,410 UART: [idev] Sha1 KeyId Algorithm
6,046,153 UART: [idev] --
6,050,913 UART: [ldev] ++
6,051,523 UART: [ldev] CDI.KEYID = 6
6,052,433 UART: [ldev] SUBJECT.KEYID = 5
6,053,597 UART: [ldev] AUTHORITY.KEYID = 7
6,054,833 UART: [ldev] FE.KEYID = 1
6,095,992 UART: [ldev] Erasing FE.KEYID = 1
8,599,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,394 UART: [ldev] --
10,408,961 UART: [fwproc] Wait for Commands...
10,412,093 UART: [fwproc] Recv command 0x46574c44
10,414,140 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,771 >>> mbox cmd response: success
14,277,623 UART: [afmc] ++
14,278,209 UART: [afmc] CDI.KEYID = 6
14,279,120 UART: [afmc] SUBJECT.KEYID = 7
14,280,333 UART: [afmc] AUTHORITY.KEYID = 5
16,804,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,335 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
5,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,094,813 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,477 UART:
192,876 UART: Running Caliptra ROM ...
194,161 UART:
603,772 UART: [state] CFI Enabled
618,169 UART: [state] LifecycleState = Unprovisioned
619,989 UART: [state] DebugLocked = No
621,823 UART: [state] WD Timer not started. Device not locked for debugging
625,069 UART: [kat] SHA2-256
804,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,796 UART: [kat] ++
816,239 UART: [kat] sha1
827,215 UART: [kat] SHA2-256
830,265 UART: [kat] SHA2-384
836,671 UART: [kat] SHA2-512-ACC
839,654 UART: [kat] ECC-384
3,282,129 UART: [kat] HMAC-384Kdf
3,294,738 UART: [kat] LMS
3,824,259 UART: [kat] --
3,829,545 UART: [cold-reset] ++
3,831,040 UART: [fht] FHT @ 0x50003400
3,843,042 UART: [idev] ++
3,843,613 UART: [idev] CDI.KEYID = 6
3,844,587 UART: [idev] SUBJECT.KEYID = 7
3,845,743 UART: [idev] UDS.KEYID = 0
3,862,098 UART: [idev] Erasing UDS.KEYID = 0
6,322,944 UART: [idev] Sha1 KeyId Algorithm
6,345,051 UART: [idev] --
6,349,127 UART: [ldev] ++
6,349,700 UART: [ldev] CDI.KEYID = 6
6,350,612 UART: [ldev] SUBJECT.KEYID = 5
6,351,825 UART: [ldev] AUTHORITY.KEYID = 7
6,353,076 UART: [ldev] FE.KEYID = 1
6,364,105 UART: [ldev] Erasing FE.KEYID = 1
8,839,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,875 UART: [ldev] --
10,627,891 UART: [fwproc] Wait for Commands...
10,629,606 UART: [fwproc] Recv command 0x46574c44
10,631,698 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,402 >>> mbox cmd response: success
14,495,042 UART: [afmc] ++
14,495,646 UART: [afmc] CDI.KEYID = 6
14,496,532 UART: [afmc] SUBJECT.KEYID = 7
14,497,740 UART: [afmc] AUTHORITY.KEYID = 5
16,995,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,130 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,841 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,555 UART: [kat] SHA2-256
901,495 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,003 UART: [idev] Sha1 KeyId Algorithm
1,206,953 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,654 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,734 >>> mbox cmd response: success
2,774,955 UART: [afmc] ++
2,775,123 UART: [afmc] CDI.KEYID = 6
2,775,486 UART: [afmc] SUBJECT.KEYID = 7
2,775,912 UART: [afmc] AUTHORITY.KEYID = 5
2,811,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,245 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,980 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,532 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,571 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,107 >>> mbox cmd response: success
2,775,196 UART: [afmc] ++
2,775,364 UART: [afmc] CDI.KEYID = 6
2,775,727 UART: [afmc] SUBJECT.KEYID = 7
2,776,153 UART: [afmc] AUTHORITY.KEYID = 5
2,811,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,501 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,275 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,322 UART: [kat] SHA2-512-ACC
906,223 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,207,892 UART: [ldev] ++
1,208,060 UART: [ldev] CDI.KEYID = 6
1,208,424 UART: [ldev] SUBJECT.KEYID = 5
1,208,851 UART: [ldev] AUTHORITY.KEYID = 7
1,209,314 UART: [ldev] FE.KEYID = 1
1,214,434 UART: [ldev] Erasing FE.KEYID = 1
1,240,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,612 UART: [ldev] --
1,279,984 UART: [fwproc] Wait for Commands...
1,280,657 UART: [fwproc] Recv command 0x46574c44
1,281,390 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,164 >>> mbox cmd response: success
2,774,313 UART: [afmc] ++
2,774,481 UART: [afmc] CDI.KEYID = 6
2,774,844 UART: [afmc] SUBJECT.KEYID = 7
2,775,270 UART: [afmc] AUTHORITY.KEYID = 5
2,811,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,402 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,196 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,198,806 UART: [idev] Sha1 KeyId Algorithm
1,207,622 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,109 UART: [ldev] SUBJECT.KEYID = 5
1,209,536 UART: [ldev] AUTHORITY.KEYID = 7
1,209,999 UART: [ldev] FE.KEYID = 1
1,215,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,799 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,721 >>> mbox cmd response: success
2,774,982 UART: [afmc] ++
2,775,150 UART: [afmc] CDI.KEYID = 6
2,775,513 UART: [afmc] SUBJECT.KEYID = 7
2,775,939 UART: [afmc] AUTHORITY.KEYID = 5
2,811,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,467 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,995 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,327 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,272 UART: [kat] HMAC-384Kdf
919,900 UART: [kat] LMS
1,168,212 UART: [kat] --
1,168,985 UART: [cold-reset] ++
1,169,457 UART: [fht] FHT @ 0x50003400
1,172,161 UART: [idev] ++
1,172,329 UART: [idev] CDI.KEYID = 6
1,172,690 UART: [idev] SUBJECT.KEYID = 7
1,173,115 UART: [idev] UDS.KEYID = 0
1,180,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,207,105 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,886 UART: [ldev] Erasing FE.KEYID = 1
1,240,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,280,060 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,640 >>> mbox cmd response: success
2,772,891 UART: [afmc] ++
2,773,059 UART: [afmc] CDI.KEYID = 6
2,773,422 UART: [afmc] SUBJECT.KEYID = 7
2,773,848 UART: [afmc] AUTHORITY.KEYID = 5
2,809,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,048 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,977 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,300 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,563 UART: [fwproc] Wait for Commands...
1,283,248 UART: [fwproc] Recv command 0x46574c44
1,283,981 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,257 >>> mbox cmd response: success
2,776,358 UART: [afmc] ++
2,776,526 UART: [afmc] CDI.KEYID = 6
2,776,889 UART: [afmc] SUBJECT.KEYID = 7
2,777,315 UART: [afmc] AUTHORITY.KEYID = 5
2,812,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,609 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,173 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
Truncated 107056 bytes from beginning
252,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,569,485 >>> mbox cmd response: success
18,573,789 UART: [afmc] ++
18,574,496 UART: [afmc] CDI.KEYID = 6
18,575,737 UART: [afmc] SUBJECT.KEYID = 7
18,576,843 UART: [afmc] AUTHORITY.KEYID = 5
21,944,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,242,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,244,433 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,260,591 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,276,680 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,292,607 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,314,288 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,049,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,194,159 UART:
2,194,553 UART: Running Caliptra ROM ...
2,195,720 UART:
2,195,896 UART: [state] CFI Enabled
2,196,866 UART: [state] LifecycleState = Unprovisioned
2,198,506 UART: [state] DebugLocked = No
2,199,608 UART: [state] WD Timer not started. Device not locked for debugging
2,202,117 UART: [kat] SHA2-256
2,202,789 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,823 UART: [kat] ++
2,206,276 UART: [kat] sha1
2,206,790 UART: [kat] SHA2-256
2,207,528 UART: [kat] SHA2-384
2,208,191 UART: [kat] SHA2-512-ACC
2,209,033 UART: [kat] ECC-384
3,771,790 UART: [kat] HMAC-384Kdf
3,799,960 UART: [kat] LMS
4,873,092 UART: [kat] --
4,877,646 UART: [cold-reset] ++
4,880,013 UART: [fht] FHT @ 0x50003400
4,891,965 UART: [idev] ++
4,892,647 UART: [idev] CDI.KEYID = 6
4,893,881 UART: [idev] SUBJECT.KEYID = 7
4,895,004 UART: [idev] UDS.KEYID = 0
4,926,971 UART: [idev] Erasing UDS.KEYID = 0
8,241,720 UART: [idev] Sha1 KeyId Algorithm
8,263,644 UART: [idev] --
8,266,654 UART: [ldev] ++
8,267,218 UART: [ldev] CDI.KEYID = 6
8,268,450 UART: [ldev] SUBJECT.KEYID = 5
8,269,476 UART: [ldev] AUTHORITY.KEYID = 7
8,270,808 UART: [ldev] FE.KEYID = 1
8,314,372 UART: [ldev] Erasing FE.KEYID = 1
11,649,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,314 UART: [ldev] --
14,036,279 UART: [fwproc] Wait for Commands...
14,038,917 UART: [fwproc] Recv command 0x46574c44
14,041,174 UART: [fwproc] Recv'd Img size: 114124 bytes
18,107,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,188,606 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,257,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,575,670 >>> mbox cmd response: success
18,578,892 UART: [afmc] ++
18,579,644 UART: [afmc] CDI.KEYID = 6
18,580,750 UART: [afmc] SUBJECT.KEYID = 7
18,581,968 UART: [afmc] AUTHORITY.KEYID = 5
21,945,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,243,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,245,041 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,261,147 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,277,252 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,293,099 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,315,651 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,056,305 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,200,479 UART:
2,200,886 UART: Running Caliptra ROM ...
2,202,058 UART:
2,202,233 UART: [state] CFI Enabled
2,203,190 UART: [state] LifecycleState = Unprovisioned
2,204,828 UART: [state] DebugLocked = No
2,205,952 UART: [state] WD Timer not started. Device not locked for debugging
2,208,439 UART: [kat] SHA2-256
2,209,108 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,130 UART: [kat] ++
2,212,587 UART: [kat] sha1
2,213,136 UART: [kat] SHA2-256
2,213,799 UART: [kat] SHA2-384
2,214,505 UART: [kat] SHA2-512-ACC
2,215,309 UART: [kat] ECC-384
3,771,470 UART: [kat] HMAC-384Kdf
3,797,746 UART: [kat] LMS
4,870,928 UART: [kat] --
4,875,450 UART: [cold-reset] ++
4,877,766 UART: [fht] FHT @ 0x50003400
4,888,320 UART: [idev] ++
4,888,994 UART: [idev] CDI.KEYID = 6
4,890,246 UART: [idev] SUBJECT.KEYID = 7
4,891,361 UART: [idev] UDS.KEYID = 0
4,926,916 UART: [idev] Erasing UDS.KEYID = 0
8,240,123 UART: [idev] Sha1 KeyId Algorithm
8,261,727 UART: [idev] --
8,264,802 UART: [ldev] ++
8,265,363 UART: [ldev] CDI.KEYID = 6
8,266,518 UART: [ldev] SUBJECT.KEYID = 5
8,267,781 UART: [ldev] AUTHORITY.KEYID = 7
8,268,937 UART: [ldev] FE.KEYID = 1
8,314,660 UART: [ldev] Erasing FE.KEYID = 1
11,647,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,991,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,441 UART: [ldev] --
14,032,333 UART: [fwproc] Wait for Commands...
14,034,916 UART: [fwproc] Recv command 0x46574c44
14,037,224 UART: [fwproc] Recv'd Img size: 114124 bytes
18,119,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,193,793 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,262,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,580,991 >>> mbox cmd response: success
18,584,895 UART: [afmc] ++
18,585,601 UART: [afmc] CDI.KEYID = 6
18,586,759 UART: [afmc] SUBJECT.KEYID = 7
18,587,974 UART: [afmc] AUTHORITY.KEYID = 5
21,963,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,280,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,282,763 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,298,934 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,315,018 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,330,868 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,353,208 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,051,465 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,195,428 UART:
2,195,815 UART: Running Caliptra ROM ...
2,196,992 UART:
2,197,166 UART: [state] CFI Enabled
2,198,125 UART: [state] LifecycleState = Unprovisioned
2,199,804 UART: [state] DebugLocked = No
2,200,913 UART: [state] WD Timer not started. Device not locked for debugging
2,203,393 UART: [kat] SHA2-256
2,204,060 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,076 UART: [kat] ++
2,207,534 UART: [kat] sha1
2,208,050 UART: [kat] SHA2-256
2,208,788 UART: [kat] SHA2-384
2,209,457 UART: [kat] SHA2-512-ACC
2,210,337 UART: [kat] ECC-384
3,770,858 UART: [kat] HMAC-384Kdf
3,800,268 UART: [kat] LMS
4,873,450 UART: [kat] --
4,876,913 UART: [cold-reset] ++
4,879,337 UART: [fht] FHT @ 0x50003400
4,891,294 UART: [idev] ++
4,892,041 UART: [idev] CDI.KEYID = 6
4,893,231 UART: [idev] SUBJECT.KEYID = 7
4,894,343 UART: [idev] UDS.KEYID = 0
4,927,141 UART: [idev] Erasing UDS.KEYID = 0
8,238,734 UART: [idev] Sha1 KeyId Algorithm
8,261,974 UART: [idev] --
8,266,563 UART: [ldev] ++
8,267,130 UART: [ldev] CDI.KEYID = 6
8,268,368 UART: [ldev] SUBJECT.KEYID = 5
8,269,532 UART: [ldev] AUTHORITY.KEYID = 7
8,270,628 UART: [ldev] FE.KEYID = 1
8,315,874 UART: [ldev] Erasing FE.KEYID = 1
11,647,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,008,253 UART: [ldev] --
14,012,170 UART: [fwproc] Wait for Commands...
14,014,918 UART: [fwproc] Recv command 0x46574c44
14,017,228 UART: [fwproc] Recv'd Img size: 114124 bytes
18,088,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,162,998 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,231,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,549,826 >>> mbox cmd response: success
18,554,623 UART: [afmc] ++
18,555,332 UART: [afmc] CDI.KEYID = 6
18,556,514 UART: [afmc] SUBJECT.KEYID = 7
18,557,671 UART: [afmc] AUTHORITY.KEYID = 5
21,924,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,220,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,389 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,238,580 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,254,642 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,270,524 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,293,640 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.02s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,055,184 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,353,256 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,048,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,340,741 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,137 writing to cptra_bootfsm_go
2,056,083 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,344,773 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,049,929 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,351,952 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,049,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,338,389 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,048,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,340,150 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,050,132 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,323,237 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
2,049,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,341,723 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,048,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,317,740 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,056,854 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,343,085 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,051,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,339,410 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,559 writing to cptra_bootfsm_go
2,049,840 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,315,734 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,049,108 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,334,916 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,050,769 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,359,078 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,048,144 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,349,821 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,049,011 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,346,710 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,049,335 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,345,122 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,054,041 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,355,037 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,055,460 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,228,921 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.58s
Truncated 107056 bytes from beginning
416,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,733,165 >>> mbox cmd response: success
18,736,598 UART: [afmc] ++
18,737,291 UART: [afmc] CDI.KEYID = 6
18,738,397 UART: [afmc] SUBJECT.KEYID = 7
18,739,605 UART: [afmc] AUTHORITY.KEYID = 5
22,055,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,348,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,350,825 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,366,996 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,383,041 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,398,900 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,422,728 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,055,094 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,346 UART:
2,199,762 UART: Running Caliptra ROM ...
2,200,940 UART:
2,201,117 UART: [state] CFI Enabled
2,202,069 UART: [state] LifecycleState = Unprovisioned
2,203,750 UART: [state] DebugLocked = No
2,204,853 UART: [state] WD Timer not started. Device not locked for debugging
2,207,335 UART: [kat] SHA2-256
2,207,998 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,997 UART: [kat] ++
2,211,442 UART: [kat] sha1
2,211,982 UART: [kat] SHA2-256
2,212,636 UART: [kat] SHA2-384
2,213,287 UART: [kat] SHA2-512-ACC
2,214,077 UART: [kat] ECC-384
4,099,845 UART: [kat] HMAC-384Kdf
4,112,667 UART: [kat] LMS
5,185,825 UART: [kat] --
5,190,599 UART: [cold-reset] ++
5,191,944 UART: [fht] FHT @ 0x50003400
5,203,248 UART: [idev] ++
5,203,991 UART: [idev] CDI.KEYID = 6
5,205,166 UART: [idev] SUBJECT.KEYID = 7
5,206,598 UART: [idev] UDS.KEYID = 0
5,223,327 UART: [idev] Erasing UDS.KEYID = 0
8,495,100 UART: [idev] Sha1 KeyId Algorithm
8,516,121 UART: [idev] --
8,520,693 UART: [ldev] ++
8,521,277 UART: [ldev] CDI.KEYID = 6
8,522,514 UART: [ldev] SUBJECT.KEYID = 5
8,523,948 UART: [ldev] AUTHORITY.KEYID = 7
8,525,428 UART: [ldev] FE.KEYID = 1
8,537,960 UART: [ldev] Erasing FE.KEYID = 1
11,831,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,828 UART: [ldev] --
14,195,841 UART: [fwproc] Wait for Commands...
14,198,046 UART: [fwproc] Recv command 0x46574c44
14,200,365 UART: [fwproc] Recv'd Img size: 114124 bytes
18,270,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,346,336 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,415,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,731,919 >>> mbox cmd response: success
18,736,030 UART: [afmc] ++
18,736,722 UART: [afmc] CDI.KEYID = 6
18,737,879 UART: [afmc] SUBJECT.KEYID = 7
18,739,089 UART: [afmc] AUTHORITY.KEYID = 5
22,061,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,358,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,360,591 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,376,766 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,392,844 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,408,641 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,430,756 UART: [afmc] --
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,055,260 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,541 UART:
2,199,955 UART: Running Caliptra ROM ...
2,201,127 UART:
2,201,296 UART: [state] CFI Enabled
2,202,275 UART: [state] LifecycleState = Unprovisioned
2,203,936 UART: [state] DebugLocked = No
2,205,040 UART: [state] WD Timer not started. Device not locked for debugging
2,207,517 UART: [kat] SHA2-256
2,208,488 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,498 UART: [kat] ++
2,211,946 UART: [kat] sha1
2,212,451 UART: [kat] SHA2-256
2,213,186 UART: [kat] SHA2-384
2,213,852 UART: [kat] SHA2-512-ACC
2,214,674 UART: [kat] ECC-384
4,096,990 UART: [kat] HMAC-384Kdf
4,109,758 UART: [kat] LMS
5,182,922 UART: [kat] --
5,186,940 UART: [cold-reset] ++
5,189,088 UART: [fht] FHT @ 0x50003400
5,201,108 UART: [idev] ++
5,201,777 UART: [idev] CDI.KEYID = 6
5,202,937 UART: [idev] SUBJECT.KEYID = 7
5,204,519 UART: [idev] UDS.KEYID = 0
5,220,583 UART: [idev] Erasing UDS.KEYID = 0
8,494,350 UART: [idev] Sha1 KeyId Algorithm
8,515,258 UART: [idev] --
8,520,433 UART: [ldev] ++
8,520,996 UART: [ldev] CDI.KEYID = 6
8,522,229 UART: [ldev] SUBJECT.KEYID = 5
8,523,656 UART: [ldev] AUTHORITY.KEYID = 7
8,525,262 UART: [ldev] FE.KEYID = 1
8,536,715 UART: [ldev] Erasing FE.KEYID = 1
11,823,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,360 UART: [ldev] --
14,187,417 UART: [fwproc] Wait for Commands...
14,188,969 UART: [fwproc] Recv command 0x46574c44
14,191,283 UART: [fwproc] Recv'd Img size: 114124 bytes
18,266,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,342,645 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,411,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,728,656 >>> mbox cmd response: success
18,733,533 UART: [afmc] ++
18,734,225 UART: [afmc] CDI.KEYID = 6
18,735,405 UART: [afmc] SUBJECT.KEYID = 7
18,736,558 UART: [afmc] AUTHORITY.KEYID = 5
22,052,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,346,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,347,998 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,364,151 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,380,269 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,396,127 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,418,060 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,055,030 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,214 UART:
2,199,635 UART: Running Caliptra ROM ...
2,200,752 UART:
2,200,928 UART: [state] CFI Enabled
2,201,893 UART: [state] LifecycleState = Unprovisioned
2,203,553 UART: [state] DebugLocked = No
2,204,654 UART: [state] WD Timer not started. Device not locked for debugging
2,207,119 UART: [kat] SHA2-256
2,207,782 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,785 UART: [kat] ++
2,211,231 UART: [kat] sha1
2,211,736 UART: [kat] SHA2-256
2,212,467 UART: [kat] SHA2-384
2,213,128 UART: [kat] SHA2-512-ACC
2,213,947 UART: [kat] ECC-384
4,094,251 UART: [kat] HMAC-384Kdf
4,106,229 UART: [kat] LMS
5,179,426 UART: [kat] --
5,184,784 UART: [cold-reset] ++
5,186,681 UART: [fht] FHT @ 0x50003400
5,197,828 UART: [idev] ++
5,198,487 UART: [idev] CDI.KEYID = 6
5,199,669 UART: [idev] SUBJECT.KEYID = 7
5,201,108 UART: [idev] UDS.KEYID = 0
5,216,202 UART: [idev] Erasing UDS.KEYID = 0
8,486,299 UART: [idev] Sha1 KeyId Algorithm
8,509,199 UART: [idev] --
8,513,502 UART: [ldev] ++
8,514,070 UART: [ldev] CDI.KEYID = 6
8,515,310 UART: [ldev] SUBJECT.KEYID = 5
8,516,740 UART: [ldev] AUTHORITY.KEYID = 7
8,518,348 UART: [ldev] FE.KEYID = 1
8,528,825 UART: [ldev] Erasing FE.KEYID = 1
11,818,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,748 UART: [ldev] --
14,185,878 UART: [fwproc] Wait for Commands...
14,189,103 UART: [fwproc] Recv command 0x46574c44
14,191,413 UART: [fwproc] Recv'd Img size: 114124 bytes
18,260,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,338,287 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,407,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,724,733 >>> mbox cmd response: success
18,729,186 UART: [afmc] ++
18,729,888 UART: [afmc] CDI.KEYID = 6
18,731,070 UART: [afmc] SUBJECT.KEYID = 7
18,732,224 UART: [afmc] AUTHORITY.KEYID = 5
22,048,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,344,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,346,647 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,362,791 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,378,856 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,394,706 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,418,311 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.19s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,054,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,527,338 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
2,053,089 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,525,735 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,052,421 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,539,258 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
2,054,512 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,521,589 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,054,005 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,532,446 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,055,042 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,862 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,054,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,533,404 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,052,345 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,545,802 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
2,054,164 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,542,049 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,061,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,280 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,054,843 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,536,523 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,055,649 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,214 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,054,138 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,539,228 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,054,049 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,520,298 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,053,842 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,529,832 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,054,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,536,023 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,053,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,534,486 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,057,222 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,517,970 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,054,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,540,629 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.76s
Truncated 107056 bytes from beginning
936,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,773 >>> mbox cmd response: success
14,258,242 UART: [afmc] ++
14,258,838 UART: [afmc] CDI.KEYID = 6
14,259,748 UART: [afmc] SUBJECT.KEYID = 7
14,260,965 UART: [afmc] AUTHORITY.KEYID = 5
16,803,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,180 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,545,109 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,560,951 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,576,713 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,599,200 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,063,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,208,094 UART:
2,208,499 UART: Running Caliptra ROM ...
2,209,686 UART:
2,209,861 UART: [state] CFI Enabled
2,210,955 UART: [state] LifecycleState = Unprovisioned
2,212,662 UART: [state] DebugLocked = No
2,213,728 UART: [state] WD Timer not started. Device not locked for debugging
2,216,224 UART: [kat] SHA2-256
2,216,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,902 UART: [kat] ++
2,220,351 UART: [kat] sha1
2,220,881 UART: [kat] SHA2-256
2,221,542 UART: [kat] SHA2-384
2,222,196 UART: [kat] SHA2-512-ACC
2,222,994 UART: [kat] ECC-384
2,945,098 UART: [kat] HMAC-384Kdf
2,970,195 UART: [kat] LMS
3,499,666 UART: [kat] --
3,503,333 UART: [cold-reset] ++
3,505,912 UART: [fht] FHT @ 0x50003400
3,516,083 UART: [idev] ++
3,516,645 UART: [idev] CDI.KEYID = 6
3,517,553 UART: [idev] SUBJECT.KEYID = 7
3,518,764 UART: [idev] UDS.KEYID = 0
3,542,082 UART: [idev] Erasing UDS.KEYID = 0
6,026,538 UART: [idev] Sha1 KeyId Algorithm
6,048,963 UART: [idev] --
6,053,306 UART: [ldev] ++
6,053,923 UART: [ldev] CDI.KEYID = 6
6,054,838 UART: [ldev] SUBJECT.KEYID = 5
6,055,943 UART: [ldev] AUTHORITY.KEYID = 7
6,057,179 UART: [ldev] FE.KEYID = 1
6,098,314 UART: [ldev] Erasing FE.KEYID = 1
8,604,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,732 UART: [ldev] --
10,414,111 UART: [fwproc] Wait for Commands...
10,416,640 UART: [fwproc] Recv command 0x46574c44
10,418,732 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,898,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,553 >>> mbox cmd response: success
14,291,456 UART: [afmc] ++
14,292,069 UART: [afmc] CDI.KEYID = 6
14,292,987 UART: [afmc] SUBJECT.KEYID = 7
14,294,151 UART: [afmc] AUTHORITY.KEYID = 5
16,824,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,964 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,567,949 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,583,758 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,599,507 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,396 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,079,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,223,483 UART:
2,223,887 UART: Running Caliptra ROM ...
2,225,059 UART:
2,225,245 UART: [state] CFI Enabled
2,226,210 UART: [state] LifecycleState = Unprovisioned
2,227,866 UART: [state] DebugLocked = No
2,228,971 UART: [state] WD Timer not started. Device not locked for debugging
2,231,443 UART: [kat] SHA2-256
2,232,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,235,124 UART: [kat] ++
2,235,594 UART: [kat] sha1
2,236,193 UART: [kat] SHA2-256
2,236,863 UART: [kat] SHA2-384
2,237,567 UART: [kat] SHA2-512-ACC
2,238,609 UART: [kat] ECC-384
2,943,465 UART: [kat] HMAC-384Kdf
2,968,483 UART: [kat] LMS
3,497,937 UART: [kat] --
3,503,009 UART: [cold-reset] ++
3,505,376 UART: [fht] FHT @ 0x50003400
3,516,245 UART: [idev] ++
3,516,813 UART: [idev] CDI.KEYID = 6
3,517,832 UART: [idev] SUBJECT.KEYID = 7
3,519,140 UART: [idev] UDS.KEYID = 0
3,539,446 UART: [idev] Erasing UDS.KEYID = 0
6,022,222 UART: [idev] Sha1 KeyId Algorithm
6,046,521 UART: [idev] --
6,049,927 UART: [ldev] ++
6,050,511 UART: [ldev] CDI.KEYID = 6
6,051,425 UART: [ldev] SUBJECT.KEYID = 5
6,052,593 UART: [ldev] AUTHORITY.KEYID = 7
6,053,830 UART: [ldev] FE.KEYID = 1
6,096,021 UART: [ldev] Erasing FE.KEYID = 1
8,598,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,533 UART: [ldev] --
10,408,896 UART: [fwproc] Wait for Commands...
10,410,565 UART: [fwproc] Recv command 0x46574c44
10,412,664 UART: [fwproc] Recv'd Img size: 114448 bytes
13,804,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,880,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,266,774 >>> mbox cmd response: success
14,270,856 UART: [afmc] ++
14,271,454 UART: [afmc] CDI.KEYID = 6
14,272,365 UART: [afmc] SUBJECT.KEYID = 7
14,273,578 UART: [afmc] AUTHORITY.KEYID = 5
16,799,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,522,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,524,613 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,540,539 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,556,400 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,572,184 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,594,510 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,054,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,198,612 UART:
2,199,018 UART: Running Caliptra ROM ...
2,200,105 UART:
2,200,259 UART: [state] CFI Enabled
2,201,217 UART: [state] LifecycleState = Unprovisioned
2,202,855 UART: [state] DebugLocked = No
2,203,879 UART: [state] WD Timer not started. Device not locked for debugging
2,206,341 UART: [kat] SHA2-256
2,207,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,061 UART: [kat] ++
2,210,515 UART: [kat] sha1
2,211,027 UART: [kat] SHA2-256
2,211,689 UART: [kat] SHA2-384
2,212,439 UART: [kat] SHA2-512-ACC
2,213,460 UART: [kat] ECC-384
2,944,338 UART: [kat] HMAC-384Kdf
2,967,321 UART: [kat] LMS
3,496,777 UART: [kat] --
3,501,196 UART: [cold-reset] ++
3,503,610 UART: [fht] FHT @ 0x50003400
3,514,752 UART: [idev] ++
3,515,317 UART: [idev] CDI.KEYID = 6
3,516,229 UART: [idev] SUBJECT.KEYID = 7
3,517,448 UART: [idev] UDS.KEYID = 0
3,539,266 UART: [idev] Erasing UDS.KEYID = 0
6,025,183 UART: [idev] Sha1 KeyId Algorithm
6,048,968 UART: [idev] --
6,052,858 UART: [ldev] ++
6,053,629 UART: [ldev] CDI.KEYID = 6
6,054,524 UART: [ldev] SUBJECT.KEYID = 5
6,055,635 UART: [ldev] AUTHORITY.KEYID = 7
6,056,737 UART: [ldev] FE.KEYID = 1
6,096,086 UART: [ldev] Erasing FE.KEYID = 1
8,597,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,314 UART: [ldev] --
10,409,529 UART: [fwproc] Wait for Commands...
10,411,417 UART: [fwproc] Recv command 0x46574c44
10,413,479 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,897,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,173 >>> mbox cmd response: success
14,289,493 UART: [afmc] ++
14,290,089 UART: [afmc] CDI.KEYID = 6
14,291,002 UART: [afmc] SUBJECT.KEYID = 7
14,292,170 UART: [afmc] AUTHORITY.KEYID = 5
16,820,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,545,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,547,816 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,563,796 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,579,604 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,595,356 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,617,734 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.89s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,050,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,046,091 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,065,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,079,704 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,052,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,057,513 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,052,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,361 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,057,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,087,002 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,059,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,014 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,063,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,799 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,053,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,036,166 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,073,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,035,942 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,057,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,233 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,051,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,083,899 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,066,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,044,755 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,058,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,074,936 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,050,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,089,638 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,051,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,354 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,052,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,388 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,052,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,419 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,058,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,085,751 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,066,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,017,601 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.44s
Truncated 107056 bytes from beginning
156,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,474,353 >>> mbox cmd response: success
14,477,919 UART: [afmc] ++
14,478,505 UART: [afmc] CDI.KEYID = 6
14,479,385 UART: [afmc] SUBJECT.KEYID = 7
14,480,596 UART: [afmc] AUTHORITY.KEYID = 5
16,979,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,903 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,718,886 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,734,705 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,750,445 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,772,601 UART: [afmc] --
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,055,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,081 UART:
2,200,494 UART: Running Caliptra ROM ...
2,201,782 UART:
2,201,957 UART: [state] CFI Enabled
2,202,922 UART: [state] LifecycleState = Unprovisioned
2,204,581 UART: [state] DebugLocked = No
2,205,691 UART: [state] WD Timer not started. Device not locked for debugging
2,208,163 UART: [kat] SHA2-256
2,208,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,839 UART: [kat] ++
2,212,288 UART: [kat] sha1
2,212,828 UART: [kat] SHA2-256
2,213,568 UART: [kat] SHA2-384
2,214,233 UART: [kat] SHA2-512-ACC
2,215,067 UART: [kat] ECC-384
3,279,696 UART: [kat] HMAC-384Kdf
3,293,124 UART: [kat] LMS
3,822,621 UART: [kat] --
3,826,717 UART: [cold-reset] ++
3,828,212 UART: [fht] FHT @ 0x50003400
3,839,784 UART: [idev] ++
3,840,346 UART: [idev] CDI.KEYID = 6
3,841,304 UART: [idev] SUBJECT.KEYID = 7
3,842,459 UART: [idev] UDS.KEYID = 0
3,859,239 UART: [idev] Erasing UDS.KEYID = 0
6,314,973 UART: [idev] Sha1 KeyId Algorithm
6,338,585 UART: [idev] --
6,342,381 UART: [ldev] ++
6,342,951 UART: [ldev] CDI.KEYID = 6
6,343,857 UART: [ldev] SUBJECT.KEYID = 5
6,345,066 UART: [ldev] AUTHORITY.KEYID = 7
6,346,297 UART: [ldev] FE.KEYID = 1
6,359,000 UART: [ldev] Erasing FE.KEYID = 1
8,834,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,381 UART: [ldev] --
10,624,483 UART: [fwproc] Wait for Commands...
10,626,851 UART: [fwproc] Recv command 0x46574c44
10,628,945 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,097,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,213 >>> mbox cmd response: success
14,490,231 UART: [afmc] ++
14,490,817 UART: [afmc] CDI.KEYID = 6
14,491,726 UART: [afmc] SUBJECT.KEYID = 7
14,492,940 UART: [afmc] AUTHORITY.KEYID = 5
16,990,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,832 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,727,756 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,743,607 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,759,376 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,782,407 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,055,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,538 UART:
2,200,973 UART: Running Caliptra ROM ...
2,202,124 UART:
2,202,291 UART: [state] CFI Enabled
2,203,249 UART: [state] LifecycleState = Unprovisioned
2,204,914 UART: [state] DebugLocked = No
2,205,944 UART: [state] WD Timer not started. Device not locked for debugging
2,208,412 UART: [kat] SHA2-256
2,209,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,097 UART: [kat] ++
2,212,573 UART: [kat] sha1
2,213,087 UART: [kat] SHA2-256
2,213,828 UART: [kat] SHA2-384
2,214,497 UART: [kat] SHA2-512-ACC
2,215,375 UART: [kat] ECC-384
3,280,682 UART: [kat] HMAC-384Kdf
3,293,384 UART: [kat] LMS
3,822,904 UART: [kat] --
3,825,629 UART: [cold-reset] ++
3,827,474 UART: [fht] FHT @ 0x50003400
3,839,897 UART: [idev] ++
3,840,475 UART: [idev] CDI.KEYID = 6
3,841,356 UART: [idev] SUBJECT.KEYID = 7
3,842,570 UART: [idev] UDS.KEYID = 0
3,855,577 UART: [idev] Erasing UDS.KEYID = 0
6,314,375 UART: [idev] Sha1 KeyId Algorithm
6,336,647 UART: [idev] --
6,339,833 UART: [ldev] ++
6,340,399 UART: [ldev] CDI.KEYID = 6
6,341,282 UART: [ldev] SUBJECT.KEYID = 5
6,342,411 UART: [ldev] AUTHORITY.KEYID = 7
6,343,748 UART: [ldev] FE.KEYID = 1
6,354,585 UART: [ldev] Erasing FE.KEYID = 1
8,827,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,938 UART: [ldev] --
10,616,553 UART: [fwproc] Wait for Commands...
10,619,624 UART: [fwproc] Recv command 0x46574c44
10,621,716 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,100,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,684 >>> mbox cmd response: success
14,491,131 UART: [afmc] ++
14,491,722 UART: [afmc] CDI.KEYID = 6
14,492,603 UART: [afmc] SUBJECT.KEYID = 7
14,493,816 UART: [afmc] AUTHORITY.KEYID = 5
16,997,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,877 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,737,810 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,753,669 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,769,435 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,792,160 UART: [afmc] --
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,055,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,434 UART:
2,200,848 UART: Running Caliptra ROM ...
2,201,950 UART:
2,202,105 UART: [state] CFI Enabled
2,203,000 UART: [state] LifecycleState = Unprovisioned
2,204,660 UART: [state] DebugLocked = No
2,205,683 UART: [state] WD Timer not started. Device not locked for debugging
2,208,151 UART: [kat] SHA2-256
2,208,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,845 UART: [kat] ++
2,212,294 UART: [kat] sha1
2,212,804 UART: [kat] SHA2-256
2,213,464 UART: [kat] SHA2-384
2,214,121 UART: [kat] SHA2-512-ACC
2,214,947 UART: [kat] ECC-384
3,279,973 UART: [kat] HMAC-384Kdf
3,293,267 UART: [kat] LMS
3,822,733 UART: [kat] --
3,826,936 UART: [cold-reset] ++
3,828,214 UART: [fht] FHT @ 0x50003400
3,838,002 UART: [idev] ++
3,838,573 UART: [idev] CDI.KEYID = 6
3,839,479 UART: [idev] SUBJECT.KEYID = 7
3,840,689 UART: [idev] UDS.KEYID = 0
3,854,339 UART: [idev] Erasing UDS.KEYID = 0
6,310,636 UART: [idev] Sha1 KeyId Algorithm
6,333,811 UART: [idev] --
6,338,268 UART: [ldev] ++
6,338,842 UART: [ldev] CDI.KEYID = 6
6,339,751 UART: [ldev] SUBJECT.KEYID = 5
6,340,966 UART: [ldev] AUTHORITY.KEYID = 7
6,342,196 UART: [ldev] FE.KEYID = 1
6,351,650 UART: [ldev] Erasing FE.KEYID = 1
8,826,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,564 UART: [ldev] --
10,616,590 UART: [fwproc] Wait for Commands...
10,619,710 UART: [fwproc] Recv command 0x46574c44
10,621,823 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,099,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,277 >>> mbox cmd response: success
14,492,070 UART: [afmc] ++
14,493,182 UART: [afmc] CDI.KEYID = 6
14,494,107 UART: [afmc] SUBJECT.KEYID = 7
14,495,219 UART: [afmc] AUTHORITY.KEYID = 5
16,991,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,187 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,731,170 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,746,957 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,762,745 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,786,874 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,053,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,696 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,052,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,184 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,054,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,684 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,061,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,876 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,060,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,891 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,058,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,458 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,055,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,200 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,053,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,804 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,053,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,018 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,052,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,743 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
2,053,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,220 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,054,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,917 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,053,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,753 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,054,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,057 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
2,055,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,076 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,054,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,707 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
2,052,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,707 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,060,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,435 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,058,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,302 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.72s
Truncated 107056 bytes from beginning
964,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,739 >>> mbox cmd response: success
14,287,777 UART: [afmc] ++
14,288,366 UART: [afmc] CDI.KEYID = 6
14,289,274 UART: [afmc] SUBJECT.KEYID = 7
14,290,431 UART: [afmc] AUTHORITY.KEYID = 5
16,828,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,001 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,566,970 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,582,807 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,598,564 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,919 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,064,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,208,677 UART:
2,209,081 UART: Running Caliptra ROM ...
2,210,181 UART:
2,210,334 UART: [state] CFI Enabled
2,211,295 UART: [state] LifecycleState = Unprovisioned
2,212,951 UART: [state] DebugLocked = No
2,213,982 UART: [state] WD Timer not started. Device not locked for debugging
2,216,472 UART: [kat] SHA2-256
2,217,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,149 UART: [kat] ++
2,220,593 UART: [kat] sha1
2,221,102 UART: [kat] SHA2-256
2,221,782 UART: [kat] SHA2-384
2,222,442 UART: [kat] SHA2-512-ACC
2,223,331 UART: [kat] ECC-384
2,923,643 UART: [kat] HMAC-384Kdf
2,948,150 UART: [kat] LMS
3,477,564 UART: [kat] --
3,481,073 UART: [cold-reset] ++
3,483,337 UART: [fht] FHT @ 0x50003400
3,495,235 UART: [idev] ++
3,495,819 UART: [idev] CDI.KEYID = 6
3,496,703 UART: [idev] SUBJECT.KEYID = 7
3,497,919 UART: [idev] UDS.KEYID = 0
3,519,654 UART: [idev] Erasing UDS.KEYID = 0
6,001,848 UART: [idev] Sha1 KeyId Algorithm
6,024,704 UART: [idev] --
6,029,567 UART: [ldev] ++
6,030,162 UART: [ldev] CDI.KEYID = 6
6,031,046 UART: [ldev] SUBJECT.KEYID = 5
6,032,209 UART: [ldev] AUTHORITY.KEYID = 7
6,033,501 UART: [ldev] FE.KEYID = 1
6,074,645 UART: [ldev] Erasing FE.KEYID = 1
8,577,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,901 UART: [ldev] --
10,387,877 UART: [fwproc] Wait for Commands...
10,390,830 UART: [fwproc] Recv command 0x46574c44
10,392,942 UART: [fwproc] Recv'd Img size: 114448 bytes
13,793,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,870,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,436 >>> mbox cmd response: success
14,261,642 UART: [afmc] ++
14,262,229 UART: [afmc] CDI.KEYID = 6
14,263,139 UART: [afmc] SUBJECT.KEYID = 7
14,264,352 UART: [afmc] AUTHORITY.KEYID = 5
16,806,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,623 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,544,771 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,560,398 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,576,208 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,598,211 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,064,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,208,813 UART:
2,209,219 UART: Running Caliptra ROM ...
2,210,308 UART:
2,210,466 UART: [state] CFI Enabled
2,211,384 UART: [state] LifecycleState = Unprovisioned
2,213,052 UART: [state] DebugLocked = No
2,214,079 UART: [state] WD Timer not started. Device not locked for debugging
2,216,553 UART: [kat] SHA2-256
2,217,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,242 UART: [kat] ++
2,220,691 UART: [kat] sha1
2,221,224 UART: [kat] SHA2-256
2,221,882 UART: [kat] SHA2-384
2,222,627 UART: [kat] SHA2-512-ACC
2,223,459 UART: [kat] ECC-384
2,944,617 UART: [kat] HMAC-384Kdf
2,967,938 UART: [kat] LMS
3,497,420 UART: [kat] --
3,503,627 UART: [cold-reset] ++
3,505,398 UART: [fht] FHT @ 0x50003400
3,517,191 UART: [idev] ++
3,517,761 UART: [idev] CDI.KEYID = 6
3,518,667 UART: [idev] SUBJECT.KEYID = 7
3,519,883 UART: [idev] UDS.KEYID = 0
3,539,320 UART: [idev] Erasing UDS.KEYID = 0
6,020,095 UART: [idev] Sha1 KeyId Algorithm
6,042,105 UART: [idev] --
6,045,709 UART: [ldev] ++
6,046,291 UART: [ldev] CDI.KEYID = 6
6,047,174 UART: [ldev] SUBJECT.KEYID = 5
6,048,390 UART: [ldev] AUTHORITY.KEYID = 7
6,049,620 UART: [ldev] FE.KEYID = 1
6,095,348 UART: [ldev] Erasing FE.KEYID = 1
8,599,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,217 UART: [ldev] --
10,410,422 UART: [fwproc] Wait for Commands...
10,413,603 UART: [fwproc] Recv command 0x46574c44
10,415,702 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,897,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,527 >>> mbox cmd response: success
14,289,228 UART: [afmc] ++
14,289,822 UART: [afmc] CDI.KEYID = 6
14,290,727 UART: [afmc] SUBJECT.KEYID = 7
14,291,944 UART: [afmc] AUTHORITY.KEYID = 5
16,822,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,889 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,564,817 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,580,654 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,596,456 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,618,373 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,065,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,209,524 UART:
2,209,945 UART: Running Caliptra ROM ...
2,211,048 UART:
2,211,206 UART: [state] CFI Enabled
2,212,108 UART: [state] LifecycleState = Unprovisioned
2,213,756 UART: [state] DebugLocked = No
2,214,786 UART: [state] WD Timer not started. Device not locked for debugging
2,217,250 UART: [kat] SHA2-256
2,217,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,938 UART: [kat] ++
2,221,410 UART: [kat] sha1
2,221,928 UART: [kat] SHA2-256
2,222,587 UART: [kat] SHA2-384
2,223,241 UART: [kat] SHA2-512-ACC
2,224,045 UART: [kat] ECC-384
2,943,782 UART: [kat] HMAC-384Kdf
2,967,358 UART: [kat] LMS
3,496,837 UART: [kat] --
3,500,843 UART: [cold-reset] ++
3,502,941 UART: [fht] FHT @ 0x50003400
3,515,106 UART: [idev] ++
3,515,719 UART: [idev] CDI.KEYID = 6
3,516,633 UART: [idev] SUBJECT.KEYID = 7
3,517,794 UART: [idev] UDS.KEYID = 0
3,540,198 UART: [idev] Erasing UDS.KEYID = 0
6,022,533 UART: [idev] Sha1 KeyId Algorithm
6,045,624 UART: [idev] --
6,050,437 UART: [ldev] ++
6,051,018 UART: [ldev] CDI.KEYID = 6
6,051,929 UART: [ldev] SUBJECT.KEYID = 5
6,053,096 UART: [ldev] AUTHORITY.KEYID = 7
6,054,388 UART: [ldev] FE.KEYID = 1
6,095,887 UART: [ldev] Erasing FE.KEYID = 1
8,596,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,647 UART: [ldev] --
10,387,321 UART: [fwproc] Wait for Commands...
10,389,737 UART: [fwproc] Recv command 0x46574c44
10,391,842 UART: [fwproc] Recv'd Img size: 114448 bytes
13,788,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,863,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,250,782 >>> mbox cmd response: success
14,255,168 UART: [afmc] ++
14,255,758 UART: [afmc] CDI.KEYID = 6
14,256,671 UART: [afmc] SUBJECT.KEYID = 7
14,257,834 UART: [afmc] AUTHORITY.KEYID = 5
16,782,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,724 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,525,662 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,541,524 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,557,292 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,578,443 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.89s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,053,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,061,252 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,051,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,620 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,053,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,036,623 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
2,061,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,440 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,076,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,505 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,054,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,037,927 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,054,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,081,903 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,051,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,989 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,059,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,715 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,051,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,095,627 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,057,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,249 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,059,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,085,509 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,052,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,233 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,050,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,461 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,050,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,059,224 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
2,066,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,116 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,051,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,328 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,061,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,814 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,051,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,270 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.44s
Truncated 107056 bytes from beginning
177,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,216 >>> mbox cmd response: success
14,501,185 UART: [afmc] ++
14,501,769 UART: [afmc] CDI.KEYID = 6
14,502,653 UART: [afmc] SUBJECT.KEYID = 7
14,503,865 UART: [afmc] AUTHORITY.KEYID = 5
17,004,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,607 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,740,599 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,756,391 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,772,132 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,794,399 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,054,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,468 UART:
2,199,887 UART: Running Caliptra ROM ...
2,201,002 UART:
2,201,171 UART: [state] CFI Enabled
2,202,137 UART: [state] LifecycleState = Unprovisioned
2,203,808 UART: [state] DebugLocked = No
2,204,917 UART: [state] WD Timer not started. Device not locked for debugging
2,207,387 UART: [kat] SHA2-256
2,208,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,068 UART: [kat] ++
2,211,524 UART: [kat] sha1
2,212,036 UART: [kat] SHA2-256
2,212,774 UART: [kat] SHA2-384
2,213,438 UART: [kat] SHA2-512-ACC
2,214,239 UART: [kat] ECC-384
3,285,334 UART: [kat] HMAC-384Kdf
3,297,059 UART: [kat] LMS
3,826,563 UART: [kat] --
3,831,606 UART: [cold-reset] ++
3,834,182 UART: [fht] FHT @ 0x50003400
3,844,505 UART: [idev] ++
3,845,073 UART: [idev] CDI.KEYID = 6
3,846,046 UART: [idev] SUBJECT.KEYID = 7
3,847,206 UART: [idev] UDS.KEYID = 0
3,865,228 UART: [idev] Erasing UDS.KEYID = 0
6,322,298 UART: [idev] Sha1 KeyId Algorithm
6,344,297 UART: [idev] --
6,348,127 UART: [ldev] ++
6,348,692 UART: [ldev] CDI.KEYID = 6
6,349,596 UART: [ldev] SUBJECT.KEYID = 5
6,350,810 UART: [ldev] AUTHORITY.KEYID = 7
6,352,039 UART: [ldev] FE.KEYID = 1
6,361,752 UART: [ldev] Erasing FE.KEYID = 1
8,834,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,448 UART: [ldev] --
10,624,527 UART: [fwproc] Wait for Commands...
10,627,438 UART: [fwproc] Recv command 0x46574c44
10,629,529 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,096,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,902 >>> mbox cmd response: success
14,488,305 UART: [afmc] ++
14,488,893 UART: [afmc] CDI.KEYID = 6
14,489,780 UART: [afmc] SUBJECT.KEYID = 7
14,490,992 UART: [afmc] AUTHORITY.KEYID = 5
16,991,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,262 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,732,235 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,091 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,763,884 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,787,449 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,055,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,218 UART:
2,200,634 UART: Running Caliptra ROM ...
2,201,828 UART:
2,202,002 UART: [state] CFI Enabled
2,202,969 UART: [state] LifecycleState = Unprovisioned
2,204,627 UART: [state] DebugLocked = No
2,205,729 UART: [state] WD Timer not started. Device not locked for debugging
2,208,203 UART: [kat] SHA2-256
2,208,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,891 UART: [kat] ++
2,212,342 UART: [kat] sha1
2,212,852 UART: [kat] SHA2-256
2,213,587 UART: [kat] SHA2-384
2,214,253 UART: [kat] SHA2-512-ACC
2,215,100 UART: [kat] ECC-384
3,281,150 UART: [kat] HMAC-384Kdf
3,293,740 UART: [kat] LMS
3,823,234 UART: [kat] --
3,828,721 UART: [cold-reset] ++
3,830,843 UART: [fht] FHT @ 0x50003400
3,841,066 UART: [idev] ++
3,841,631 UART: [idev] CDI.KEYID = 6
3,842,565 UART: [idev] SUBJECT.KEYID = 7
3,843,771 UART: [idev] UDS.KEYID = 0
3,860,799 UART: [idev] Erasing UDS.KEYID = 0
6,316,596 UART: [idev] Sha1 KeyId Algorithm
6,339,180 UART: [idev] --
6,343,978 UART: [ldev] ++
6,344,551 UART: [ldev] CDI.KEYID = 6
6,345,612 UART: [ldev] SUBJECT.KEYID = 5
6,346,702 UART: [ldev] AUTHORITY.KEYID = 7
6,347,877 UART: [ldev] FE.KEYID = 1
6,360,140 UART: [ldev] Erasing FE.KEYID = 1
8,835,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,770 UART: [ldev] --
10,624,899 UART: [fwproc] Wait for Commands...
10,627,846 UART: [fwproc] Recv command 0x46574c44
10,629,899 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,108,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,310 >>> mbox cmd response: success
14,499,145 UART: [afmc] ++
14,499,729 UART: [afmc] CDI.KEYID = 6
14,500,610 UART: [afmc] SUBJECT.KEYID = 7
14,501,787 UART: [afmc] AUTHORITY.KEYID = 5
17,000,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,599 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,740,558 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,756,355 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,772,146 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,793,430 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,054,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,420 UART:
2,199,824 UART: Running Caliptra ROM ...
2,200,910 UART:
2,201,067 UART: [state] CFI Enabled
2,202,031 UART: [state] LifecycleState = Unprovisioned
2,203,699 UART: [state] DebugLocked = No
2,204,806 UART: [state] WD Timer not started. Device not locked for debugging
2,207,277 UART: [kat] SHA2-256
2,207,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,957 UART: [kat] ++
2,211,409 UART: [kat] sha1
2,211,923 UART: [kat] SHA2-256
2,212,659 UART: [kat] SHA2-384
2,213,325 UART: [kat] SHA2-512-ACC
2,214,155 UART: [kat] ECC-384
3,282,025 UART: [kat] HMAC-384Kdf
3,293,725 UART: [kat] LMS
3,823,207 UART: [kat] --
3,828,000 UART: [cold-reset] ++
3,829,822 UART: [fht] FHT @ 0x50003400
3,840,770 UART: [idev] ++
3,841,403 UART: [idev] CDI.KEYID = 6
3,842,290 UART: [idev] SUBJECT.KEYID = 7
3,843,453 UART: [idev] UDS.KEYID = 0
3,860,700 UART: [idev] Erasing UDS.KEYID = 0
6,320,474 UART: [idev] Sha1 KeyId Algorithm
6,343,054 UART: [idev] --
6,346,175 UART: [ldev] ++
6,346,742 UART: [ldev] CDI.KEYID = 6
6,347,754 UART: [ldev] SUBJECT.KEYID = 5
6,348,851 UART: [ldev] AUTHORITY.KEYID = 7
6,350,130 UART: [ldev] FE.KEYID = 1
6,358,310 UART: [ldev] Erasing FE.KEYID = 1
8,829,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,796 UART: [ldev] --
10,616,838 UART: [fwproc] Wait for Commands...
10,619,524 UART: [fwproc] Recv command 0x46574c44
10,621,617 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,091,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,447 >>> mbox cmd response: success
14,483,482 UART: [afmc] ++
14,484,085 UART: [afmc] CDI.KEYID = 6
14,485,016 UART: [afmc] SUBJECT.KEYID = 7
14,486,181 UART: [afmc] AUTHORITY.KEYID = 5
16,985,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,734 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,723,689 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,739,532 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,755,268 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,778,162 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,053,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,245 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,039 writing to cptra_bootfsm_go
2,053,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,343 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,056,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,074 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,059,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,255,746 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,058,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,391 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
2,055,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,741 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,056,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,694 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,055,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,823 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,054,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,612 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,054,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,445 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,059,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,862 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,054,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,181 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,054,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,999 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,054,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,744 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
2,055,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,552 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,054,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,767 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,053,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,767 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,053,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,874 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,055,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,799 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.72s
Truncated 104976 bytes from beginning
4
1,281,054 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,999 >>> mbox cmd response: success
2,773,174 UART: [afmc] ++
2,773,342 UART: [afmc] CDI.KEYID = 6
2,773,705 UART: [afmc] SUBJECT.KEYID = 7
2,774,131 UART: [afmc] AUTHORITY.KEYID = 5
2,809,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,073 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,786 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,695 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,409 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,468 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,654 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,671 UART: [cold-reset] ++
1,171,079 UART: [fht] FHT @ 0x50003400
1,173,931 UART: [idev] ++
1,174,099 UART: [idev] CDI.KEYID = 6
1,174,460 UART: [idev] SUBJECT.KEYID = 7
1,174,885 UART: [idev] UDS.KEYID = 0
1,182,799 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,202 UART: [ldev] Erasing FE.KEYID = 1
1,242,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,044 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,279 UART: [fwproc] Recv command 0x46574c44
1,284,012 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,688 >>> mbox cmd response: success
2,775,901 UART: [afmc] ++
2,776,069 UART: [afmc] CDI.KEYID = 6
2,776,432 UART: [afmc] SUBJECT.KEYID = 7
2,776,858 UART: [afmc] AUTHORITY.KEYID = 5
2,812,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,960 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,673 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,582 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,296 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,005 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,181,931 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,655 UART: [idev] --
1,208,668 UART: [ldev] ++
1,208,836 UART: [ldev] CDI.KEYID = 6
1,209,200 UART: [ldev] SUBJECT.KEYID = 5
1,209,627 UART: [ldev] AUTHORITY.KEYID = 7
1,210,090 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,668 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,773 >>> mbox cmd response: success
2,773,846 UART: [afmc] ++
2,774,014 UART: [afmc] CDI.KEYID = 6
2,774,377 UART: [afmc] SUBJECT.KEYID = 7
2,774,803 UART: [afmc] AUTHORITY.KEYID = 5
2,809,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,425 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,138 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,047 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,761 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,584 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,155 UART: [cold-reset] ++
1,169,719 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,181,119 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,783 UART: [idev] --
1,207,844 UART: [ldev] ++
1,208,012 UART: [ldev] CDI.KEYID = 6
1,208,376 UART: [ldev] SUBJECT.KEYID = 5
1,208,803 UART: [ldev] AUTHORITY.KEYID = 7
1,209,266 UART: [ldev] FE.KEYID = 1
1,214,380 UART: [ldev] Erasing FE.KEYID = 1
1,240,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,756 UART: [ldev] --
1,280,178 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,987 >>> mbox cmd response: success
2,775,058 UART: [afmc] ++
2,775,226 UART: [afmc] CDI.KEYID = 6
2,775,589 UART: [afmc] SUBJECT.KEYID = 7
2,776,015 UART: [afmc] AUTHORITY.KEYID = 5
2,810,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,107 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,820 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,729 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,443 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,492 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.05s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,279 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,413 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,585 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,731 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,531 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,129 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,193 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,715 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,059 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,343 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,441 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,476 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,573 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,197 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,285 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,135 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,803 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,915 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,909 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,977 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,453 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.31s
Truncated 104976 bytes from beginning
4
1,283,535 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,360 >>> mbox cmd response: success
2,776,429 UART: [afmc] ++
2,776,597 UART: [afmc] CDI.KEYID = 6
2,776,960 UART: [afmc] SUBJECT.KEYID = 7
2,777,386 UART: [afmc] AUTHORITY.KEYID = 5
2,813,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,840 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,553 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,462 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,176 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,899 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
904,923 UART: [kat] SHA2-512-ACC
906,824 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,806 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,172 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,237 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,774 >>> mbox cmd response: success
2,775,795 UART: [afmc] ++
2,775,963 UART: [afmc] CDI.KEYID = 6
2,776,326 UART: [afmc] SUBJECT.KEYID = 7
2,776,752 UART: [afmc] AUTHORITY.KEYID = 5
2,812,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,656 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,369 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,278 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,992 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,791 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,207,950 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,287 UART: [ldev] Erasing FE.KEYID = 1
1,241,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,781 UART: [fwproc] Wait for Commands...
1,281,360 UART: [fwproc] Recv command 0x46574c44
1,282,093 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,010 >>> mbox cmd response: success
2,774,151 UART: [afmc] ++
2,774,319 UART: [afmc] CDI.KEYID = 6
2,774,682 UART: [afmc] SUBJECT.KEYID = 7
2,775,108 UART: [afmc] AUTHORITY.KEYID = 5
2,810,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,556 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,269 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,178 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,892 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,775 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,855 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x46574c44
1,283,221 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,000 >>> mbox cmd response: success
2,775,147 UART: [afmc] ++
2,775,315 UART: [afmc] CDI.KEYID = 6
2,775,678 UART: [afmc] SUBJECT.KEYID = 7
2,776,104 UART: [afmc] AUTHORITY.KEYID = 5
2,811,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,748 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,461 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,370 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,084 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,967 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.87s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,012 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,754 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,554 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,802 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,204 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,175 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,194 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,550 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,554 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,180 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,660 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,084 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,984 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,152 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,598 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,061 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,822 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,358 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,164 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,300 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,494 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.68s
Truncated 104976 bytes from beginning
4
1,282,416 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,049 >>> mbox cmd response: success
2,774,308 UART: [afmc] ++
2,774,476 UART: [afmc] CDI.KEYID = 6
2,774,839 UART: [afmc] SUBJECT.KEYID = 7
2,775,265 UART: [afmc] AUTHORITY.KEYID = 5
2,810,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,769 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,482 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,391 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,105 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,072 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,208 UART: [ldev] --
1,281,480 UART: [fwproc] Wait for Commands...
1,282,217 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,963 >>> mbox cmd response: success
2,774,984 UART: [afmc] ++
2,775,152 UART: [afmc] CDI.KEYID = 6
2,775,515 UART: [afmc] SUBJECT.KEYID = 7
2,775,941 UART: [afmc] AUTHORITY.KEYID = 5
2,811,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,617 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,330 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,239 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,953 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,624 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
890,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,897 UART: [kat] ++
895,049 UART: [kat] sha1
899,197 UART: [kat] SHA2-256
901,137 UART: [kat] SHA2-384
903,944 UART: [kat] SHA2-512-ACC
905,845 UART: [kat] ECC-384
915,496 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,579 >>> mbox cmd response: success
2,774,726 UART: [afmc] ++
2,774,894 UART: [afmc] CDI.KEYID = 6
2,775,257 UART: [afmc] SUBJECT.KEYID = 7
2,775,683 UART: [afmc] AUTHORITY.KEYID = 5
2,811,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,139 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,852 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,761 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,475 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,162 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,486 UART: [kat] HMAC-384Kdf
919,946 UART: [kat] LMS
1,168,258 UART: [kat] --
1,169,055 UART: [cold-reset] ++
1,169,403 UART: [fht] FHT @ 0x50003400
1,171,881 UART: [idev] ++
1,172,049 UART: [idev] CDI.KEYID = 6
1,172,410 UART: [idev] SUBJECT.KEYID = 7
1,172,835 UART: [idev] UDS.KEYID = 0
1,180,879 UART: [idev] Erasing UDS.KEYID = 0
1,197,309 UART: [idev] Sha1 KeyId Algorithm
1,206,087 UART: [idev] --
1,207,322 UART: [ldev] ++
1,207,490 UART: [ldev] CDI.KEYID = 6
1,207,854 UART: [ldev] SUBJECT.KEYID = 5
1,208,281 UART: [ldev] AUTHORITY.KEYID = 7
1,208,744 UART: [ldev] FE.KEYID = 1
1,214,028 UART: [ldev] Erasing FE.KEYID = 1
1,240,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,946 UART: [ldev] --
1,279,218 UART: [fwproc] Wait for Commands...
1,279,815 UART: [fwproc] Recv command 0x46574c44
1,280,548 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,995 >>> mbox cmd response: success
2,774,222 UART: [afmc] ++
2,774,390 UART: [afmc] CDI.KEYID = 6
2,774,753 UART: [afmc] SUBJECT.KEYID = 7
2,775,179 UART: [afmc] AUTHORITY.KEYID = 5
2,810,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,725 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,438 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,347 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,061 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,776 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.74s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,433 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,279 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,701 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,671 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,309 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,559 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,073 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,507 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,431 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,963 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,341 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,023 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,367 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,103 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,803 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,385 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,697 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,973 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,785 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,385 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.33s
Truncated 104976 bytes from beginning
4
1,284,233 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,220 >>> mbox cmd response: success
2,777,337 UART: [afmc] ++
2,777,505 UART: [afmc] CDI.KEYID = 6
2,777,868 UART: [afmc] SUBJECT.KEYID = 7
2,778,294 UART: [afmc] AUTHORITY.KEYID = 5
2,813,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,638 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,351 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,260 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,974 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,747 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,173,038 UART: [idev] ++
1,173,206 UART: [idev] CDI.KEYID = 6
1,173,567 UART: [idev] SUBJECT.KEYID = 7
1,173,992 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,848 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,147 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,402 >>> mbox cmd response: success
2,775,569 UART: [afmc] ++
2,775,737 UART: [afmc] CDI.KEYID = 6
2,776,100 UART: [afmc] SUBJECT.KEYID = 7
2,776,526 UART: [afmc] AUTHORITY.KEYID = 5
2,812,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,252 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,965 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,874 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,588 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,473 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
915,627 UART: [kat] HMAC-384Kdf
920,329 UART: [kat] LMS
1,168,641 UART: [kat] --
1,169,514 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,610 UART: [idev] ++
1,172,778 UART: [idev] CDI.KEYID = 6
1,173,139 UART: [idev] SUBJECT.KEYID = 7
1,173,564 UART: [idev] UDS.KEYID = 0
1,181,502 UART: [idev] Erasing UDS.KEYID = 0
1,198,212 UART: [idev] Sha1 KeyId Algorithm
1,207,264 UART: [idev] --
1,208,287 UART: [ldev] ++
1,208,455 UART: [ldev] CDI.KEYID = 6
1,208,819 UART: [ldev] SUBJECT.KEYID = 5
1,209,246 UART: [ldev] AUTHORITY.KEYID = 7
1,209,709 UART: [ldev] FE.KEYID = 1
1,215,329 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,897 UART: [afmc] ++
2,775,065 UART: [afmc] CDI.KEYID = 6
2,775,428 UART: [afmc] SUBJECT.KEYID = 7
2,775,854 UART: [afmc] AUTHORITY.KEYID = 5
2,811,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,108 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,821 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,730 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,444 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,453 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,215 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x46574c44
1,283,649 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,768 >>> mbox cmd response: success
2,775,923 UART: [afmc] ++
2,776,091 UART: [afmc] CDI.KEYID = 6
2,776,454 UART: [afmc] SUBJECT.KEYID = 7
2,776,880 UART: [afmc] AUTHORITY.KEYID = 5
2,812,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,076 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,789 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,698 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,412 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,217 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.11s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,844 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,890 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,608 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,428 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,428 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,850 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,774 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,152 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,850 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,926 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,422 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,852 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,440 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,162 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,878 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,990 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,126 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,314 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,156 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,642 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,292 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.80s
Truncated 104976 bytes from beginning
4
1,282,374 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,534 >>> mbox cmd response: success
2,775,567 UART: [afmc] ++
2,775,735 UART: [afmc] CDI.KEYID = 6
2,776,098 UART: [afmc] SUBJECT.KEYID = 7
2,776,524 UART: [afmc] AUTHORITY.KEYID = 5
2,812,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,054 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,767 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,676 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,390 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,127 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,242,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,984 UART: [ldev] --
1,281,264 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,191 >>> mbox cmd response: success
2,775,254 UART: [afmc] ++
2,775,422 UART: [afmc] CDI.KEYID = 6
2,775,785 UART: [afmc] SUBJECT.KEYID = 7
2,776,211 UART: [afmc] AUTHORITY.KEYID = 5
2,811,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,233 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,946 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,855 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,569 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,572 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,647 UART: [idev] Sha1 KeyId Algorithm
1,208,511 UART: [idev] --
1,209,598 UART: [ldev] ++
1,209,766 UART: [ldev] CDI.KEYID = 6
1,210,130 UART: [ldev] SUBJECT.KEYID = 5
1,210,557 UART: [ldev] AUTHORITY.KEYID = 7
1,211,020 UART: [ldev] FE.KEYID = 1
1,216,048 UART: [ldev] Erasing FE.KEYID = 1
1,242,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,937 >>> mbox cmd response: success
2,774,974 UART: [afmc] ++
2,775,142 UART: [afmc] CDI.KEYID = 6
2,775,505 UART: [afmc] SUBJECT.KEYID = 7
2,775,931 UART: [afmc] AUTHORITY.KEYID = 5
2,811,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,363 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,076 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,985 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,699 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,644 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,136 UART: [kat] LMS
1,168,448 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,763 UART: [fht] FHT @ 0x50003400
1,172,349 UART: [idev] ++
1,172,517 UART: [idev] CDI.KEYID = 6
1,172,878 UART: [idev] SUBJECT.KEYID = 7
1,173,303 UART: [idev] UDS.KEYID = 0
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,065 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] --
1,207,910 UART: [ldev] ++
1,208,078 UART: [ldev] CDI.KEYID = 6
1,208,442 UART: [ldev] SUBJECT.KEYID = 5
1,208,869 UART: [ldev] AUTHORITY.KEYID = 7
1,209,332 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,474 UART: [ldev] --
1,279,806 UART: [fwproc] Wait for Commands...
1,280,411 UART: [fwproc] Recv command 0x46574c44
1,281,144 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,943 >>> mbox cmd response: success
2,772,058 UART: [afmc] ++
2,772,226 UART: [afmc] CDI.KEYID = 6
2,772,589 UART: [afmc] SUBJECT.KEYID = 7
2,773,015 UART: [afmc] AUTHORITY.KEYID = 5
2,808,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,719 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,432 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,341 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,055 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,004 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.70s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,573 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,069 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,941 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,631 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,981 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,575 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,827 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,097 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,517 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,887 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,477 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,195 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,473 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,487 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,018 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,985 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,471 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,409 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,195 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.66s
Truncated 104976 bytes from beginning
4
1,284,567 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,416 >>> mbox cmd response: success
2,776,573 UART: [afmc] ++
2,776,741 UART: [afmc] CDI.KEYID = 6
2,777,104 UART: [afmc] SUBJECT.KEYID = 7
2,777,530 UART: [afmc] AUTHORITY.KEYID = 5
2,813,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,908 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,621 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,530 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,244 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,965 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,478 UART: [idev] --
1,208,497 UART: [ldev] ++
1,208,665 UART: [ldev] CDI.KEYID = 6
1,209,029 UART: [ldev] SUBJECT.KEYID = 5
1,209,456 UART: [ldev] AUTHORITY.KEYID = 7
1,209,919 UART: [ldev] FE.KEYID = 1
1,215,255 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,311 UART: [ldev] --
1,280,611 UART: [fwproc] Wait for Commands...
1,281,394 UART: [fwproc] Recv command 0x46574c44
1,282,127 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,336 >>> mbox cmd response: success
2,773,465 UART: [afmc] ++
2,773,633 UART: [afmc] CDI.KEYID = 6
2,773,996 UART: [afmc] SUBJECT.KEYID = 7
2,774,422 UART: [afmc] AUTHORITY.KEYID = 5
2,810,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,034 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,747 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,656 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,370 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,221 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,988 UART: [kat] ++
896,140 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,025 UART: [kat] SHA2-512-ACC
906,926 UART: [kat] ECC-384
916,675 UART: [kat] HMAC-384Kdf
921,157 UART: [kat] LMS
1,169,469 UART: [kat] --
1,170,300 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,198,830 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,209,019 UART: [ldev] ++
1,209,187 UART: [ldev] CDI.KEYID = 6
1,209,551 UART: [ldev] SUBJECT.KEYID = 5
1,209,978 UART: [ldev] AUTHORITY.KEYID = 7
1,210,441 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,877 UART: [fwproc] Wait for Commands...
1,282,640 UART: [fwproc] Recv command 0x46574c44
1,283,373 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,206 >>> mbox cmd response: success
2,776,419 UART: [afmc] ++
2,776,587 UART: [afmc] CDI.KEYID = 6
2,776,950 UART: [afmc] SUBJECT.KEYID = 7
2,777,376 UART: [afmc] AUTHORITY.KEYID = 5
2,812,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,632 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,345 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,254 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,968 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,831 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,244,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,937 UART: [ldev] --
1,283,421 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,801 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,782 >>> mbox cmd response: success
2,777,865 UART: [afmc] ++
2,778,033 UART: [afmc] CDI.KEYID = 6
2,778,396 UART: [afmc] SUBJECT.KEYID = 7
2,778,822 UART: [afmc] AUTHORITY.KEYID = 5
2,814,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,754 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,837,467 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,843,376 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,849,090 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,817 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.97s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,770 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,288 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,780 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,522 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,746 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,316 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,036 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,864 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,752 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,384 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,368 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,658 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,030 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,726 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,824 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,584 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,560 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,894 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,786 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,840 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,430 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
5,860 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,306 UART:
192,712 UART: Running Caliptra ROM ...
193,832 UART:
193,981 UART: [state] CFI Enabled
253,825 UART: [state] LifecycleState = Unprovisioned
256,223 UART: [state] DebugLocked = No
258,466 UART: [state] WD Timer not started. Device not locked for debugging
263,759 UART: [kat] SHA2-256
445,703 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
457,220 UART: [kat] ++
457,801 UART: [kat] sha1
468,773 UART: [kat] SHA2-256
471,781 UART: [kat] SHA2-384
478,254 UART: [kat] SHA2-512-ACC
480,925 UART: [kat] ECC-384
3,763,437 UART: [kat] HMAC-384Kdf
3,791,280 UART: [kat] LMS
4,864,426 UART: [kat] --
4,867,922 UART: [cold-reset] ++
4,870,300 UART: [fht] FHT @ 0x50003400
4,880,800 UART: [idev] ++
4,881,480 UART: [idev] CDI.KEYID = 6
4,882,716 UART: [idev] SUBJECT.KEYID = 7
4,883,821 UART: [idev] UDS.KEYID = 0
4,917,618 UART: [idev] Erasing UDS.KEYID = 0
8,232,068 UART: [idev] Sha1 KeyId Algorithm
8,254,260 UART: [idev] --
8,258,687 UART: [ldev] ++
8,259,255 UART: [ldev] CDI.KEYID = 6
8,260,445 UART: [ldev] SUBJECT.KEYID = 5
8,261,605 UART: [ldev] AUTHORITY.KEYID = 7
8,262,851 UART: [ldev] FE.KEYID = 1
8,306,776 UART: [ldev] Erasing FE.KEYID = 1
11,643,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,969,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,985,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,001,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,021,729 UART: [ldev] --
14,026,455 UART: [fwproc] Wait for Commands...
14,029,586 UART: [fwproc] Recv command 0x46574c44
14,031,899 UART: [fwproc] Recv'd Img size: 114124 bytes
14,110,840 UART: ROM Fatal Error: 0x000B0032
14,114,253 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
5,648 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,900,917 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
7,330 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,573 UART:
192,980 UART: Running Caliptra ROM ...
194,076 UART:
603,872 UART: [state] CFI Enabled
617,891 UART: [state] LifecycleState = Unprovisioned
620,248 UART: [state] DebugLocked = No
622,004 UART: [state] WD Timer not started. Device not locked for debugging
625,736 UART: [kat] SHA2-256
807,521 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,087 UART: [kat] ++
819,671 UART: [kat] sha1
829,035 UART: [kat] SHA2-256
832,085 UART: [kat] SHA2-384
838,486 UART: [kat] SHA2-512-ACC
841,088 UART: [kat] ECC-384
4,098,691 UART: [kat] HMAC-384Kdf
4,111,377 UART: [kat] LMS
5,184,561 UART: [kat] --
5,189,068 UART: [cold-reset] ++
5,191,499 UART: [fht] FHT @ 0x50003400
5,202,637 UART: [idev] ++
5,203,315 UART: [idev] CDI.KEYID = 6
5,204,548 UART: [idev] SUBJECT.KEYID = 7
5,205,975 UART: [idev] UDS.KEYID = 0
5,220,866 UART: [idev] Erasing UDS.KEYID = 0
8,494,106 UART: [idev] Sha1 KeyId Algorithm
8,514,525 UART: [idev] --
8,518,508 UART: [ldev] ++
8,519,064 UART: [ldev] CDI.KEYID = 6
8,520,226 UART: [ldev] SUBJECT.KEYID = 5
8,521,754 UART: [ldev] AUTHORITY.KEYID = 7
8,523,233 UART: [ldev] FE.KEYID = 1
8,533,237 UART: [ldev] Erasing FE.KEYID = 1
11,823,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,015 UART: [ldev] --
14,190,172 UART: [fwproc] Wait for Commands...
14,193,020 UART: [fwproc] Recv command 0x46574c44
14,195,278 UART: [fwproc] Recv'd Img size: 114124 bytes
14,266,238 UART: ROM Fatal Error: 0x000B0032
14,269,599 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
6,207 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,089,095 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,216 UART:
192,597 UART: Running Caliptra ROM ...
193,670 UART:
193,812 UART: [state] CFI Enabled
262,437 UART: [state] LifecycleState = Unprovisioned
264,349 UART: [state] DebugLocked = No
266,725 UART: [state] WD Timer not started. Device not locked for debugging
271,327 UART: [kat] SHA2-256
450,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,019 UART: [kat] ++
462,478 UART: [kat] sha1
474,213 UART: [kat] SHA2-256
477,268 UART: [kat] SHA2-384
484,112 UART: [kat] SHA2-512-ACC
487,048 UART: [kat] ECC-384
2,944,488 UART: [kat] HMAC-384Kdf
2,967,328 UART: [kat] LMS
3,496,752 UART: [kat] --
3,499,930 UART: [cold-reset] ++
3,502,292 UART: [fht] FHT @ 0x50003400
3,513,109 UART: [idev] ++
3,513,670 UART: [idev] CDI.KEYID = 6
3,514,681 UART: [idev] SUBJECT.KEYID = 7
3,515,784 UART: [idev] UDS.KEYID = 0
3,539,863 UART: [idev] Erasing UDS.KEYID = 0
6,022,121 UART: [idev] Sha1 KeyId Algorithm
6,044,713 UART: [idev] --
6,048,388 UART: [ldev] ++
6,048,964 UART: [ldev] CDI.KEYID = 6
6,049,873 UART: [ldev] SUBJECT.KEYID = 5
6,051,093 UART: [ldev] AUTHORITY.KEYID = 7
6,052,327 UART: [ldev] FE.KEYID = 1
6,095,045 UART: [ldev] Erasing FE.KEYID = 1
8,597,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,536 UART: [ldev] --
10,409,587 UART: [fwproc] Wait for Commands...
10,411,088 UART: [fwproc] Recv command 0x46574c44
10,413,132 UART: [fwproc] Recv'd Img size: 114448 bytes
10,487,112 UART: ROM Fatal Error: 0x000B0032
10,490,201 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
5,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,156 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
6,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,628 UART:
193,023 UART: Running Caliptra ROM ...
194,195 UART:
603,734 UART: [state] CFI Enabled
613,960 UART: [state] LifecycleState = Unprovisioned
615,836 UART: [state] DebugLocked = No
617,476 UART: [state] WD Timer not started. Device not locked for debugging
621,580 UART: [kat] SHA2-256
800,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,260 UART: [kat] ++
812,792 UART: [kat] sha1
824,185 UART: [kat] SHA2-256
827,228 UART: [kat] SHA2-384
833,964 UART: [kat] SHA2-512-ACC
836,900 UART: [kat] ECC-384
3,279,147 UART: [kat] HMAC-384Kdf
3,291,454 UART: [kat] LMS
3,820,963 UART: [kat] --
3,827,108 UART: [cold-reset] ++
3,828,331 UART: [fht] FHT @ 0x50003400
3,840,499 UART: [idev] ++
3,841,066 UART: [idev] CDI.KEYID = 6
3,842,035 UART: [idev] SUBJECT.KEYID = 7
3,843,193 UART: [idev] UDS.KEYID = 0
3,861,110 UART: [idev] Erasing UDS.KEYID = 0
6,313,406 UART: [idev] Sha1 KeyId Algorithm
6,336,571 UART: [idev] --
6,339,690 UART: [ldev] ++
6,340,259 UART: [ldev] CDI.KEYID = 6
6,341,163 UART: [ldev] SUBJECT.KEYID = 5
6,342,318 UART: [ldev] AUTHORITY.KEYID = 7
6,343,601 UART: [ldev] FE.KEYID = 1
6,354,192 UART: [ldev] Erasing FE.KEYID = 1
8,828,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,114 UART: [ldev] --
10,620,593 UART: [fwproc] Wait for Commands...
10,623,497 UART: [fwproc] Recv command 0x46574c44
10,625,585 UART: [fwproc] Recv'd Img size: 114448 bytes
10,697,684 UART: ROM Fatal Error: 0x000B0032
10,700,791 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
6,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,933 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,048 UART:
192,446 UART: Running Caliptra ROM ...
193,530 UART:
193,672 UART: [state] CFI Enabled
262,813 UART: [state] LifecycleState = Unprovisioned
264,699 UART: [state] DebugLocked = No
266,371 UART: [state] WD Timer not started. Device not locked for debugging
269,675 UART: [kat] SHA2-256
448,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,396 UART: [kat] ++
460,930 UART: [kat] sha1
472,028 UART: [kat] SHA2-256
475,091 UART: [kat] SHA2-384
481,553 UART: [kat] SHA2-512-ACC
484,493 UART: [kat] ECC-384
2,945,810 UART: [kat] HMAC-384Kdf
2,970,123 UART: [kat] LMS
3,499,530 UART: [kat] --
3,502,630 UART: [cold-reset] ++
3,503,596 UART: [fht] FHT @ 0x50003400
3,513,979 UART: [idev] ++
3,514,547 UART: [idev] CDI.KEYID = 6
3,515,478 UART: [idev] SUBJECT.KEYID = 7
3,516,638 UART: [idev] UDS.KEYID = 0
3,540,603 UART: [idev] Erasing UDS.KEYID = 0
6,021,839 UART: [idev] Sha1 KeyId Algorithm
6,045,710 UART: [idev] --
6,048,988 UART: [ldev] ++
6,049,565 UART: [ldev] CDI.KEYID = 6
6,050,479 UART: [ldev] SUBJECT.KEYID = 5
6,051,697 UART: [ldev] AUTHORITY.KEYID = 7
6,052,886 UART: [ldev] FE.KEYID = 1
6,098,689 UART: [ldev] Erasing FE.KEYID = 1
8,602,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,154 UART: [ldev] --
10,409,234 UART: [fwproc] Wait for Commands...
10,411,226 UART: [fwproc] Recv command 0x46574c44
10,413,325 UART: [fwproc] Recv'd Img size: 114448 bytes
10,486,236 UART: ROM Fatal Error: 0x000B0032
10,489,326 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
5,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,256,214 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
6,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,487 UART:
192,868 UART: Running Caliptra ROM ...
194,056 UART:
603,655 UART: [state] CFI Enabled
616,105 UART: [state] LifecycleState = Unprovisioned
617,943 UART: [state] DebugLocked = No
619,213 UART: [state] WD Timer not started. Device not locked for debugging
622,783 UART: [kat] SHA2-256
801,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,515 UART: [kat] ++
814,051 UART: [kat] sha1
823,862 UART: [kat] SHA2-256
826,917 UART: [kat] SHA2-384
833,383 UART: [kat] SHA2-512-ACC
836,310 UART: [kat] ECC-384
3,276,571 UART: [kat] HMAC-384Kdf
3,289,446 UART: [kat] LMS
3,818,948 UART: [kat] --
3,822,795 UART: [cold-reset] ++
3,823,804 UART: [fht] FHT @ 0x50003400
3,834,086 UART: [idev] ++
3,834,651 UART: [idev] CDI.KEYID = 6
3,835,665 UART: [idev] SUBJECT.KEYID = 7
3,836,969 UART: [idev] UDS.KEYID = 0
3,852,637 UART: [idev] Erasing UDS.KEYID = 0
6,311,355 UART: [idev] Sha1 KeyId Algorithm
6,334,421 UART: [idev] --
6,339,467 UART: [ldev] ++
6,340,042 UART: [ldev] CDI.KEYID = 6
6,340,951 UART: [ldev] SUBJECT.KEYID = 5
6,342,159 UART: [ldev] AUTHORITY.KEYID = 7
6,343,385 UART: [ldev] FE.KEYID = 1
6,355,759 UART: [ldev] Erasing FE.KEYID = 1
8,828,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,077 UART: [ldev] --
10,618,389 UART: [fwproc] Wait for Commands...
10,620,001 UART: [fwproc] Recv command 0x46574c44
10,622,101 UART: [fwproc] Recv'd Img size: 114448 bytes
10,699,093 UART: ROM Fatal Error: 0x000B0032
10,702,194 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
6,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,759 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,247 UART: [idev] ++
1,173,415 UART: [idev] CDI.KEYID = 6
1,173,776 UART: [idev] SUBJECT.KEYID = 7
1,174,201 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,796 UART: [fwproc] Wait for Commands...
1,281,581 UART: [fwproc] Recv command 0x46574c44
1,282,314 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,164 UART: ROM Fatal Error: 0x000B0032
1,309,321 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,292 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,747 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,956 UART: [fwproc] Recv command 0x46574c44
1,282,689 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,117 UART: ROM Fatal Error: 0x000B0032
1,310,274 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,635 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,182,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,403 UART: [fwproc] Recv command 0x46574c44
1,282,136 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,218 UART: ROM Fatal Error: 0x000B0032
1,309,375 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,996 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,345 UART: [kat] SHA2-256
890,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,340 UART: [kat] SHA2-256
901,280 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,674 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,670 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,111 UART: [ldev] --
1,282,375 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,485 UART: ROM Fatal Error: 0x000B0032
1,310,642 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,299 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
916,292 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,153 UART: [idev] --
1,209,262 UART: [ldev] ++
1,209,430 UART: [ldev] CDI.KEYID = 6
1,209,794 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,215,688 UART: [ldev] Erasing FE.KEYID = 1
1,241,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,776 UART: [fwproc] Wait for Commands...
1,281,407 UART: [fwproc] Recv command 0x46574c44
1,282,140 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,974 UART: ROM Fatal Error: 0x000B0032
1,309,131 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,714 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,004 UART: [idev] ++
1,173,172 UART: [idev] CDI.KEYID = 6
1,173,533 UART: [idev] SUBJECT.KEYID = 7
1,173,958 UART: [idev] UDS.KEYID = 0
1,181,676 UART: [idev] Erasing UDS.KEYID = 0
1,198,432 UART: [idev] Sha1 KeyId Algorithm
1,207,306 UART: [idev] --
1,208,313 UART: [ldev] ++
1,208,481 UART: [ldev] CDI.KEYID = 6
1,208,845 UART: [ldev] SUBJECT.KEYID = 5
1,209,272 UART: [ldev] AUTHORITY.KEYID = 7
1,209,735 UART: [ldev] FE.KEYID = 1
1,214,783 UART: [ldev] Erasing FE.KEYID = 1
1,240,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,319 UART: [ldev] --
1,280,823 UART: [fwproc] Wait for Commands...
1,281,414 UART: [fwproc] Recv command 0x46574c44
1,282,147 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,683 UART: ROM Fatal Error: 0x000B0032
1,308,840 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,211 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 76844 bytes from beginning
4,037,133 UART: [fwproc] Recv'd Img size: 114124 bytes
14,110,532 UART: ROM Fatal Error: 0x00B0003A
14,113,894 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,051,191 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,195,334 UART:
2,195,724 UART: Running Caliptra ROM ...
2,196,890 UART:
2,197,059 UART: [state] CFI Enabled
2,198,020 UART: [state] LifecycleState = Unprovisioned
2,199,658 UART: [state] DebugLocked = No
2,200,764 UART: [state] WD Timer not started. Device not locked for debugging
2,203,227 UART: [kat] SHA2-256
2,203,915 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,933 UART: [kat] ++
2,207,385 UART: [kat] sha1
2,207,899 UART: [kat] SHA2-256
2,208,635 UART: [kat] SHA2-384
2,209,302 UART: [kat] SHA2-512-ACC
2,210,150 UART: [kat] ECC-384
3,775,138 UART: [kat] HMAC-384Kdf
3,799,444 UART: [kat] LMS
4,872,598 UART: [kat] --
4,876,848 UART: [cold-reset] ++
4,879,446 UART: [fht] FHT @ 0x50003400
4,890,919 UART: [idev] ++
4,891,601 UART: [idev] CDI.KEYID = 6
4,892,841 UART: [idev] SUBJECT.KEYID = 7
4,893,950 UART: [idev] UDS.KEYID = 0
4,928,389 UART: [idev] Erasing UDS.KEYID = 0
8,244,067 UART: [idev] Sha1 KeyId Algorithm
8,265,463 UART: [idev] --
8,269,621 UART: [ldev] ++
8,270,245 UART: [ldev] CDI.KEYID = 6
8,271,425 UART: [ldev] SUBJECT.KEYID = 5
8,272,580 UART: [ldev] AUTHORITY.KEYID = 7
8,273,806 UART: [ldev] FE.KEYID = 1
8,316,289 UART: [ldev] Erasing FE.KEYID = 1
11,650,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,027 UART: [ldev] --
14,036,637 UART: [fwproc] Wait for Commands...
14,038,966 UART: [fwproc] Recv command 0x46574c44
14,041,286 UART: [fwproc] Recv'd Img size: 114124 bytes
14,117,708 UART: ROM Fatal Error: 0x00B0003A
14,121,066 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,054,245 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,198,339 UART:
2,198,752 UART: Running Caliptra ROM ...
2,199,827 UART:
2,199,980 UART: [state] CFI Enabled
2,200,873 UART: [state] LifecycleState = Unprovisioned
2,202,514 UART: [state] DebugLocked = No
2,203,537 UART: [state] WD Timer not started. Device not locked for debugging
2,206,019 UART: [kat] SHA2-256
2,206,686 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,706 UART: [kat] ++
2,210,159 UART: [kat] sha1
2,210,673 UART: [kat] SHA2-256
2,211,413 UART: [kat] SHA2-384
2,212,078 UART: [kat] SHA2-512-ACC
2,212,928 UART: [kat] ECC-384
3,775,359 UART: [kat] HMAC-384Kdf
3,802,767 UART: [kat] LMS
4,875,921 UART: [kat] --
4,879,025 UART: [cold-reset] ++
4,881,667 UART: [fht] FHT @ 0x50003400
4,893,045 UART: [idev] ++
4,893,718 UART: [idev] CDI.KEYID = 6
4,894,879 UART: [idev] SUBJECT.KEYID = 7
4,896,092 UART: [idev] UDS.KEYID = 0
4,930,084 UART: [idev] Erasing UDS.KEYID = 0
8,239,354 UART: [idev] Sha1 KeyId Algorithm
8,260,904 UART: [idev] --
8,264,839 UART: [ldev] ++
8,265,408 UART: [ldev] CDI.KEYID = 6
8,266,641 UART: [ldev] SUBJECT.KEYID = 5
8,267,794 UART: [ldev] AUTHORITY.KEYID = 7
8,269,017 UART: [ldev] FE.KEYID = 1
8,316,508 UART: [ldev] Erasing FE.KEYID = 1
11,651,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,253 UART: [ldev] --
14,035,974 UART: [fwproc] Wait for Commands...
14,038,870 UART: [fwproc] Recv command 0x46574c44
14,041,197 UART: [fwproc] Recv'd Img size: 114124 bytes
14,118,522 UART: ROM Fatal Error: 0x00B0003A
14,121,878 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
2,053,356 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,197,650 UART:
2,198,069 UART: Running Caliptra ROM ...
2,199,166 UART:
2,199,326 UART: [state] CFI Enabled
2,200,291 UART: [state] LifecycleState = Unprovisioned
2,201,931 UART: [state] DebugLocked = No
2,202,954 UART: [state] WD Timer not started. Device not locked for debugging
2,205,433 UART: [kat] SHA2-256
2,206,094 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,101 UART: [kat] ++
2,209,548 UART: [kat] sha1
2,210,060 UART: [kat] SHA2-256
2,210,720 UART: [kat] SHA2-384
2,211,375 UART: [kat] SHA2-512-ACC
2,212,208 UART: [kat] ECC-384
3,776,929 UART: [kat] HMAC-384Kdf
3,801,776 UART: [kat] LMS
4,874,919 UART: [kat] --
4,880,120 UART: [cold-reset] ++
4,881,246 UART: [fht] FHT @ 0x50003400
4,893,579 UART: [idev] ++
4,894,297 UART: [idev] CDI.KEYID = 6
4,895,539 UART: [idev] SUBJECT.KEYID = 7
4,896,564 UART: [idev] UDS.KEYID = 0
4,930,086 UART: [idev] Erasing UDS.KEYID = 0
8,242,513 UART: [idev] Sha1 KeyId Algorithm
8,264,865 UART: [idev] --
8,270,127 UART: [ldev] ++
8,270,704 UART: [ldev] CDI.KEYID = 6
8,271,835 UART: [ldev] SUBJECT.KEYID = 5
8,273,048 UART: [ldev] AUTHORITY.KEYID = 7
8,274,280 UART: [ldev] FE.KEYID = 1
8,317,348 UART: [ldev] Erasing FE.KEYID = 1
11,650,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,683 UART: [ldev] --
14,017,262 UART: [fwproc] Wait for Commands...
14,020,282 UART: [fwproc] Recv command 0x46574c44
14,022,596 UART: [fwproc] Recv'd Img size: 114124 bytes
14,094,790 UART: ROM Fatal Error: 0x00B0003A
14,098,205 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,059,005 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,203,182 UART:
2,203,582 UART: Running Caliptra ROM ...
2,204,749 UART:
2,204,922 UART: [state] CFI Enabled
2,205,879 UART: [state] LifecycleState = Unprovisioned
2,207,526 UART: [state] DebugLocked = No
2,208,628 UART: [state] WD Timer not started. Device not locked for debugging
2,211,096 UART: [kat] SHA2-256
2,211,768 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,783 UART: [kat] ++
2,215,232 UART: [kat] sha1
2,215,748 UART: [kat] SHA2-256
2,216,427 UART: [kat] SHA2-384
2,217,095 UART: [kat] SHA2-512-ACC
2,218,071 UART: [kat] ECC-384
3,775,001 UART: [kat] HMAC-384Kdf
3,800,598 UART: [kat] LMS
4,873,768 UART: [kat] --
4,877,653 UART: [cold-reset] ++
4,879,151 UART: [fht] FHT @ 0x50003400
4,890,706 UART: [idev] ++
4,891,385 UART: [idev] CDI.KEYID = 6
4,892,541 UART: [idev] SUBJECT.KEYID = 7
4,893,754 UART: [idev] UDS.KEYID = 0
4,928,440 UART: [idev] Erasing UDS.KEYID = 0
8,238,025 UART: [idev] Sha1 KeyId Algorithm
8,259,718 UART: [idev] --
8,263,551 UART: [ldev] ++
8,264,139 UART: [ldev] CDI.KEYID = 6
8,265,246 UART: [ldev] SUBJECT.KEYID = 5
8,266,463 UART: [ldev] AUTHORITY.KEYID = 7
8,267,613 UART: [ldev] FE.KEYID = 1
8,294,596 UART: [ldev] Erasing FE.KEYID = 1
11,627,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,920,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,936,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,952,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,968,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,989,372 UART: [ldev] --
13,994,362 UART: [fwproc] Wait for Commands...
13,996,675 UART: [fwproc] Recv command 0x46574c44
13,998,993 UART: [fwproc] Recv'd Img size: 114124 bytes
22,275,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,346,587 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,415,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,733,159 >>> mbox cmd response: success
22,737,546 UART: [afmc] ++
22,738,244 UART: [afmc] CDI.KEYID = 6
22,739,431 UART: [afmc] SUBJECT.KEYID = 7
22,740,593 UART: [afmc] AUTHORITY.KEYID = 5
26,103,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,401,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,402,960 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,419,024 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,435,129 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,450,841 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,473,781 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.41s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
2,049,827 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,899,332 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,052,841 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,904,620 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,051,913 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,882,589 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,051,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,926,304 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,057,207 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,881,533 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,060,346 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,881,385 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,051,351 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,880,035 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,051,350 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,898,875 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,050,226 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,880,918 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,050,792 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,897,636 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,051,710 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,926,957 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,050,477 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,900,467 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,051,260 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,907,289 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,052,080 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,923,927 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,050,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,900,587 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,051,513 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,904,275 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,055,960 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,924,528 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
2,053,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,907,844 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
2,050,333 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,590,508 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.07s
Truncated 76844 bytes from beginning
4,203,305 UART: [fwproc] Recv'd Img size: 114124 bytes
14,281,074 UART: ROM Fatal Error: 0x00B0003A
14,284,448 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,057,808 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,202,520 UART:
2,202,944 UART: Running Caliptra ROM ...
2,204,020 UART:
2,204,169 UART: [state] CFI Enabled
2,205,132 UART: [state] LifecycleState = Unprovisioned
2,206,808 UART: [state] DebugLocked = No
2,207,832 UART: [state] WD Timer not started. Device not locked for debugging
2,210,304 UART: [kat] SHA2-256
2,210,964 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,966 UART: [kat] ++
2,214,404 UART: [kat] sha1
2,214,903 UART: [kat] SHA2-256
2,215,554 UART: [kat] SHA2-384
2,216,202 UART: [kat] SHA2-512-ACC
2,216,997 UART: [kat] ECC-384
4,099,293 UART: [kat] HMAC-384Kdf
4,111,589 UART: [kat] LMS
5,184,725 UART: [kat] --
5,188,834 UART: [cold-reset] ++
5,190,407 UART: [fht] FHT @ 0x50003400
5,201,226 UART: [idev] ++
5,201,925 UART: [idev] CDI.KEYID = 6
5,203,158 UART: [idev] SUBJECT.KEYID = 7
5,204,586 UART: [idev] UDS.KEYID = 0
5,221,260 UART: [idev] Erasing UDS.KEYID = 0
8,493,042 UART: [idev] Sha1 KeyId Algorithm
8,516,000 UART: [idev] --
8,520,326 UART: [ldev] ++
8,520,892 UART: [ldev] CDI.KEYID = 6
8,522,126 UART: [ldev] SUBJECT.KEYID = 5
8,523,556 UART: [ldev] AUTHORITY.KEYID = 7
8,525,109 UART: [ldev] FE.KEYID = 1
8,534,296 UART: [ldev] Erasing FE.KEYID = 1
11,824,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,278 UART: [ldev] --
14,190,267 UART: [fwproc] Wait for Commands...
14,193,113 UART: [fwproc] Recv command 0x46574c44
14,195,419 UART: [fwproc] Recv'd Img size: 114124 bytes
14,272,702 UART: ROM Fatal Error: 0x00B0003A
14,276,072 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,058,793 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,202,907 UART:
2,203,338 UART: Running Caliptra ROM ...
2,204,423 UART:
2,204,569 UART: [state] CFI Enabled
2,205,528 UART: [state] LifecycleState = Unprovisioned
2,207,099 UART: [state] DebugLocked = No
2,208,215 UART: [state] WD Timer not started. Device not locked for debugging
2,210,845 UART: [kat] SHA2-256
2,211,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,525 UART: [kat] ++
2,214,970 UART: [kat] sha1
2,215,473 UART: [kat] SHA2-256
2,216,122 UART: [kat] SHA2-384
2,216,772 UART: [kat] SHA2-512-ACC
2,217,658 UART: [kat] ECC-384
4,101,970 UART: [kat] HMAC-384Kdf
4,113,946 UART: [kat] LMS
5,187,089 UART: [kat] --
5,191,020 UART: [cold-reset] ++
5,192,529 UART: [fht] FHT @ 0x50003400
5,203,509 UART: [idev] ++
5,204,175 UART: [idev] CDI.KEYID = 6
5,205,403 UART: [idev] SUBJECT.KEYID = 7
5,206,830 UART: [idev] UDS.KEYID = 0
5,220,047 UART: [idev] Erasing UDS.KEYID = 0
8,489,752 UART: [idev] Sha1 KeyId Algorithm
8,511,056 UART: [idev] --
8,514,998 UART: [ldev] ++
8,515,565 UART: [ldev] CDI.KEYID = 6
8,516,723 UART: [ldev] SUBJECT.KEYID = 5
8,518,253 UART: [ldev] AUTHORITY.KEYID = 7
8,519,728 UART: [ldev] FE.KEYID = 1
8,529,508 UART: [ldev] Erasing FE.KEYID = 1
11,817,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,464 UART: [ldev] --
14,183,593 UART: [fwproc] Wait for Commands...
14,186,288 UART: [fwproc] Recv command 0x46574c44
14,188,604 UART: [fwproc] Recv'd Img size: 114124 bytes
14,262,906 UART: ROM Fatal Error: 0x00B0003A
14,266,264 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,060,813 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,205,031 UART:
2,205,440 UART: Running Caliptra ROM ...
2,206,515 UART:
2,206,662 UART: [state] CFI Enabled
2,207,623 UART: [state] LifecycleState = Unprovisioned
2,209,280 UART: [state] DebugLocked = No
2,210,300 UART: [state] WD Timer not started. Device not locked for debugging
2,212,762 UART: [kat] SHA2-256
2,213,421 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,216,430 UART: [kat] ++
2,216,870 UART: [kat] sha1
2,217,371 UART: [kat] SHA2-256
2,218,020 UART: [kat] SHA2-384
2,218,692 UART: [kat] SHA2-512-ACC
2,219,691 UART: [kat] ECC-384
4,096,144 UART: [kat] HMAC-384Kdf
4,108,564 UART: [kat] LMS
5,181,713 UART: [kat] --
5,187,581 UART: [cold-reset] ++
5,188,710 UART: [fht] FHT @ 0x50003400
5,201,448 UART: [idev] ++
5,202,111 UART: [idev] CDI.KEYID = 6
5,203,263 UART: [idev] SUBJECT.KEYID = 7
5,204,798 UART: [idev] UDS.KEYID = 0
5,221,579 UART: [idev] Erasing UDS.KEYID = 0
8,501,469 UART: [idev] Sha1 KeyId Algorithm
8,524,909 UART: [idev] --
8,529,641 UART: [ldev] ++
8,530,212 UART: [ldev] CDI.KEYID = 6
8,531,391 UART: [ldev] SUBJECT.KEYID = 5
8,532,873 UART: [ldev] AUTHORITY.KEYID = 7
8,534,346 UART: [ldev] FE.KEYID = 1
8,545,585 UART: [ldev] Erasing FE.KEYID = 1
11,839,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,132,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,149,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,165,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,181,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,200,960 UART: [ldev] --
14,205,285 UART: [fwproc] Wait for Commands...
14,207,868 UART: [fwproc] Recv command 0x46574c44
14,210,179 UART: [fwproc] Recv'd Img size: 114124 bytes
14,282,855 UART: ROM Fatal Error: 0x00B0003A
14,286,219 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
2,057,700 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,201,899 UART:
2,202,306 UART: Running Caliptra ROM ...
2,203,381 UART:
2,203,531 UART: [state] CFI Enabled
2,204,495 UART: [state] LifecycleState = Unprovisioned
2,206,145 UART: [state] DebugLocked = No
2,207,166 UART: [state] WD Timer not started. Device not locked for debugging
2,209,624 UART: [kat] SHA2-256
2,210,282 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,315 UART: [kat] ++
2,213,757 UART: [kat] sha1
2,214,260 UART: [kat] SHA2-256
2,214,908 UART: [kat] SHA2-384
2,215,555 UART: [kat] SHA2-512-ACC
2,216,380 UART: [kat] ECC-384
4,098,734 UART: [kat] HMAC-384Kdf
4,111,673 UART: [kat] LMS
5,184,786 UART: [kat] --
5,190,862 UART: [cold-reset] ++
5,192,216 UART: [fht] FHT @ 0x50003400
5,203,521 UART: [idev] ++
5,204,237 UART: [idev] CDI.KEYID = 6
5,205,421 UART: [idev] SUBJECT.KEYID = 7
5,206,849 UART: [idev] UDS.KEYID = 0
5,219,366 UART: [idev] Erasing UDS.KEYID = 0
8,492,426 UART: [idev] Sha1 KeyId Algorithm
8,514,150 UART: [idev] --
8,518,464 UART: [ldev] ++
8,519,025 UART: [ldev] CDI.KEYID = 6
8,520,188 UART: [ldev] SUBJECT.KEYID = 5
8,521,718 UART: [ldev] AUTHORITY.KEYID = 7
8,523,193 UART: [ldev] FE.KEYID = 1
8,535,454 UART: [ldev] Erasing FE.KEYID = 1
11,827,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,174 UART: [ldev] --
14,194,361 UART: [fwproc] Wait for Commands...
14,196,240 UART: [fwproc] Recv command 0x46574c44
14,198,519 UART: [fwproc] Recv'd Img size: 114124 bytes
22,401,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,477,157 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,545,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,864,023 >>> mbox cmd response: success
22,867,380 UART: [afmc] ++
22,868,074 UART: [afmc] CDI.KEYID = 6
22,869,266 UART: [afmc] SUBJECT.KEYID = 7
22,870,432 UART: [afmc] AUTHORITY.KEYID = 5
26,185,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,482,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,484,373 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,500,467 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,516,539 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,532,289 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,554,236 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.66s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,058,860 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,704 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,056,707 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,092,672 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,056,404 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,086,630 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,056,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,088,939 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,057,869 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,097,420 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
2,057,695 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,105,548 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,056,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,089,158 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,057,703 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,093,545 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,057,059 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,698 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,064,031 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,080,751 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,057,410 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,096,487 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,063,102 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,091,998 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,056,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,086,616 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,062,643 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,493 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,057,510 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,078,409 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,063,923 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,097,464 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,056,727 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,091,713 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,059,622 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,093,664 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,063,350 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,761,742 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.36s
Truncated 76844 bytes from beginning
0,415,998 UART: [fwproc] Recv'd Img size: 114448 bytes
10,491,009 UART: ROM Fatal Error: 0x00B0003A
10,494,111 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,055,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,043 UART:
2,200,647 UART: Running Caliptra ROM ...
2,201,748 UART:
2,201,910 UART: [state] CFI Enabled
2,202,892 UART: [state] LifecycleState = Unprovisioned
2,204,564 UART: [state] DebugLocked = No
2,205,678 UART: [state] WD Timer not started. Device not locked for debugging
2,208,158 UART: [kat] SHA2-256
2,208,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,841 UART: [kat] ++
2,212,335 UART: [kat] sha1
2,212,874 UART: [kat] SHA2-256
2,213,739 UART: [kat] SHA2-384
2,214,414 UART: [kat] SHA2-512-ACC
2,215,302 UART: [kat] ECC-384
2,946,915 UART: [kat] HMAC-384Kdf
2,971,141 UART: [kat] LMS
3,500,569 UART: [kat] --
3,503,029 UART: [cold-reset] ++
3,504,654 UART: [fht] FHT @ 0x50003400
3,517,104 UART: [idev] ++
3,517,672 UART: [idev] CDI.KEYID = 6
3,518,608 UART: [idev] SUBJECT.KEYID = 7
3,519,820 UART: [idev] UDS.KEYID = 0
3,542,957 UART: [idev] Erasing UDS.KEYID = 0
6,024,387 UART: [idev] Sha1 KeyId Algorithm
6,047,347 UART: [idev] --
6,052,099 UART: [ldev] ++
6,052,685 UART: [ldev] CDI.KEYID = 6
6,053,575 UART: [ldev] SUBJECT.KEYID = 5
6,054,797 UART: [ldev] AUTHORITY.KEYID = 7
6,056,037 UART: [ldev] FE.KEYID = 1
6,098,957 UART: [ldev] Erasing FE.KEYID = 1
8,602,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,629 UART: [ldev] --
10,412,787 UART: [fwproc] Wait for Commands...
10,415,854 UART: [fwproc] Recv command 0x46574c44
10,417,950 UART: [fwproc] Recv'd Img size: 114448 bytes
10,495,595 UART: ROM Fatal Error: 0x00B0003A
10,498,723 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,070,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,214,790 UART:
2,215,191 UART: Running Caliptra ROM ...
2,216,282 UART:
2,216,439 UART: [state] CFI Enabled
2,217,301 UART: [state] LifecycleState = Unprovisioned
2,218,942 UART: [state] DebugLocked = No
2,219,968 UART: [state] WD Timer not started. Device not locked for debugging
2,222,474 UART: [kat] SHA2-256
2,223,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,226,164 UART: [kat] ++
2,226,617 UART: [kat] sha1
2,227,132 UART: [kat] SHA2-256
2,227,788 UART: [kat] SHA2-384
2,228,444 UART: [kat] SHA2-512-ACC
2,229,288 UART: [kat] ECC-384
2,947,876 UART: [kat] HMAC-384Kdf
2,971,187 UART: [kat] LMS
3,500,663 UART: [kat] --
3,505,412 UART: [cold-reset] ++
3,506,425 UART: [fht] FHT @ 0x50003400
3,516,512 UART: [idev] ++
3,517,078 UART: [idev] CDI.KEYID = 6
3,517,963 UART: [idev] SUBJECT.KEYID = 7
3,519,196 UART: [idev] UDS.KEYID = 0
3,542,032 UART: [idev] Erasing UDS.KEYID = 0
6,024,611 UART: [idev] Sha1 KeyId Algorithm
6,046,651 UART: [idev] --
6,049,872 UART: [ldev] ++
6,050,460 UART: [ldev] CDI.KEYID = 6
6,051,376 UART: [ldev] SUBJECT.KEYID = 5
6,052,547 UART: [ldev] AUTHORITY.KEYID = 7
6,053,787 UART: [ldev] FE.KEYID = 1
6,096,795 UART: [ldev] Erasing FE.KEYID = 1
8,599,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,620 UART: [ldev] --
10,409,449 UART: [fwproc] Wait for Commands...
10,412,524 UART: [fwproc] Recv command 0x46574c44
10,414,618 UART: [fwproc] Recv'd Img size: 114448 bytes
10,491,560 UART: ROM Fatal Error: 0x00B0003A
10,494,711 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,055,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,747 UART:
2,201,176 UART: Running Caliptra ROM ...
2,202,319 UART:
2,202,507 UART: [state] CFI Enabled
2,203,474 UART: [state] LifecycleState = Unprovisioned
2,205,146 UART: [state] DebugLocked = No
2,206,266 UART: [state] WD Timer not started. Device not locked for debugging
2,208,658 UART: [kat] SHA2-256
2,209,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,334 UART: [kat] ++
2,212,784 UART: [kat] sha1
2,213,297 UART: [kat] SHA2-256
2,213,953 UART: [kat] SHA2-384
2,214,603 UART: [kat] SHA2-512-ACC
2,215,603 UART: [kat] ECC-384
2,946,512 UART: [kat] HMAC-384Kdf
2,971,030 UART: [kat] LMS
3,500,486 UART: [kat] --
3,504,155 UART: [cold-reset] ++
3,505,461 UART: [fht] FHT @ 0x50003400
3,515,852 UART: [idev] ++
3,516,417 UART: [idev] CDI.KEYID = 6
3,517,376 UART: [idev] SUBJECT.KEYID = 7
3,518,590 UART: [idev] UDS.KEYID = 0
3,542,450 UART: [idev] Erasing UDS.KEYID = 0
6,025,847 UART: [idev] Sha1 KeyId Algorithm
6,048,377 UART: [idev] --
6,052,781 UART: [ldev] ++
6,053,361 UART: [ldev] CDI.KEYID = 6
6,054,250 UART: [ldev] SUBJECT.KEYID = 5
6,055,410 UART: [ldev] AUTHORITY.KEYID = 7
6,056,702 UART: [ldev] FE.KEYID = 1
6,096,848 UART: [ldev] Erasing FE.KEYID = 1
8,600,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,580 UART: [ldev] --
10,407,493 UART: [fwproc] Wait for Commands...
10,410,777 UART: [fwproc] Recv command 0x46574c44
10,412,818 UART: [fwproc] Recv'd Img size: 114448 bytes
10,491,177 UART: ROM Fatal Error: 0x00B0003A
10,494,257 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,055,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,154 UART:
2,200,574 UART: Running Caliptra ROM ...
2,201,665 UART:
2,201,822 UART: [state] CFI Enabled
2,202,691 UART: [state] LifecycleState = Unprovisioned
2,204,330 UART: [state] DebugLocked = No
2,205,359 UART: [state] WD Timer not started. Device not locked for debugging
2,207,829 UART: [kat] SHA2-256
2,208,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,516 UART: [kat] ++
2,211,965 UART: [kat] sha1
2,212,471 UART: [kat] SHA2-256
2,213,124 UART: [kat] SHA2-384
2,213,781 UART: [kat] SHA2-512-ACC
2,214,581 UART: [kat] ECC-384
2,948,348 UART: [kat] HMAC-384Kdf
2,971,044 UART: [kat] LMS
3,500,461 UART: [kat] --
3,505,750 UART: [cold-reset] ++
3,507,303 UART: [fht] FHT @ 0x50003400
3,518,665 UART: [idev] ++
3,519,227 UART: [idev] CDI.KEYID = 6
3,520,136 UART: [idev] SUBJECT.KEYID = 7
3,521,354 UART: [idev] UDS.KEYID = 0
3,542,407 UART: [idev] Erasing UDS.KEYID = 0
6,023,326 UART: [idev] Sha1 KeyId Algorithm
6,046,549 UART: [idev] --
6,050,533 UART: [ldev] ++
6,051,115 UART: [ldev] CDI.KEYID = 6
6,052,004 UART: [ldev] SUBJECT.KEYID = 5
6,053,179 UART: [ldev] AUTHORITY.KEYID = 7
6,054,356 UART: [ldev] FE.KEYID = 1
6,099,359 UART: [ldev] Erasing FE.KEYID = 1
8,598,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,836 UART: [ldev] --
10,391,293 UART: [fwproc] Wait for Commands...
10,393,285 UART: [fwproc] Recv command 0x46574c44
10,395,385 UART: [fwproc] Recv'd Img size: 114448 bytes
14,940,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,014,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,083,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,402,842 >>> mbox cmd response: success
15,406,510 UART: [afmc] ++
15,407,119 UART: [afmc] CDI.KEYID = 6
15,408,033 UART: [afmc] SUBJECT.KEYID = 7
15,409,194 UART: [afmc] AUTHORITY.KEYID = 5
17,934,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,656,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,658,627 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,674,605 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,690,586 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,706,401 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,728,981 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,058,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,280,974 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,066,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,299,881 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,065,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,702 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,057,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,254,175 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,054,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,728 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,070,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,112 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,056,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,303,672 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,066,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,295,661 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
2,056,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,542 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,069,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,293,819 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,053,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,802 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,056,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,280,229 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,059,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,233,912 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,054,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,298,499 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,078,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,279,185 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,062,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,279,510 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,054,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,679 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,054,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,299,962 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,054,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,042,128 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.02s
Truncated 76844 bytes from beginning
0,628,892 UART: [fwproc] Recv'd Img size: 114448 bytes
10,706,597 UART: ROM Fatal Error: 0x00B0003A
10,709,683 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,058,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,998 UART:
2,203,405 UART: Running Caliptra ROM ...
2,204,568 UART:
2,204,748 UART: [state] CFI Enabled
2,205,711 UART: [state] LifecycleState = Unprovisioned
2,207,399 UART: [state] DebugLocked = No
2,208,509 UART: [state] WD Timer not started. Device not locked for debugging
2,210,987 UART: [kat] SHA2-256
2,211,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,669 UART: [kat] ++
2,215,121 UART: [kat] sha1
2,215,633 UART: [kat] SHA2-256
2,216,370 UART: [kat] SHA2-384
2,217,035 UART: [kat] SHA2-512-ACC
2,217,871 UART: [kat] ECC-384
3,278,458 UART: [kat] HMAC-384Kdf
3,291,236 UART: [kat] LMS
3,820,785 UART: [kat] --
3,825,044 UART: [cold-reset] ++
3,826,381 UART: [fht] FHT @ 0x50003400
3,838,765 UART: [idev] ++
3,839,355 UART: [idev] CDI.KEYID = 6
3,840,264 UART: [idev] SUBJECT.KEYID = 7
3,841,475 UART: [idev] UDS.KEYID = 0
3,858,746 UART: [idev] Erasing UDS.KEYID = 0
6,311,309 UART: [idev] Sha1 KeyId Algorithm
6,333,725 UART: [idev] --
6,338,092 UART: [ldev] ++
6,338,848 UART: [ldev] CDI.KEYID = 6
6,339,834 UART: [ldev] SUBJECT.KEYID = 5
6,340,939 UART: [ldev] AUTHORITY.KEYID = 7
6,342,110 UART: [ldev] FE.KEYID = 1
6,352,372 UART: [ldev] Erasing FE.KEYID = 1
8,827,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,215 UART: [ldev] --
10,618,727 UART: [fwproc] Wait for Commands...
10,620,767 UART: [fwproc] Recv command 0x46574c44
10,622,863 UART: [fwproc] Recv'd Img size: 114448 bytes
10,696,682 UART: ROM Fatal Error: 0x00B0003A
10,699,797 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,056,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,643 UART:
2,201,072 UART: Running Caliptra ROM ...
2,202,162 UART:
2,202,321 UART: [state] CFI Enabled
2,203,182 UART: [state] LifecycleState = Unprovisioned
2,204,846 UART: [state] DebugLocked = No
2,205,964 UART: [state] WD Timer not started. Device not locked for debugging
2,208,442 UART: [kat] SHA2-256
2,209,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,131 UART: [kat] ++
2,212,585 UART: [kat] sha1
2,213,095 UART: [kat] SHA2-256
2,213,804 UART: [kat] SHA2-384
2,214,462 UART: [kat] SHA2-512-ACC
2,215,260 UART: [kat] ECC-384
3,285,861 UART: [kat] HMAC-384Kdf
3,298,066 UART: [kat] LMS
3,827,523 UART: [kat] --
3,831,887 UART: [cold-reset] ++
3,834,243 UART: [fht] FHT @ 0x50003400
3,844,409 UART: [idev] ++
3,844,974 UART: [idev] CDI.KEYID = 6
3,845,985 UART: [idev] SUBJECT.KEYID = 7
3,847,080 UART: [idev] UDS.KEYID = 0
3,864,998 UART: [idev] Erasing UDS.KEYID = 0
6,319,414 UART: [idev] Sha1 KeyId Algorithm
6,343,418 UART: [idev] --
6,347,895 UART: [ldev] ++
6,348,462 UART: [ldev] CDI.KEYID = 6
6,349,369 UART: [ldev] SUBJECT.KEYID = 5
6,350,526 UART: [ldev] AUTHORITY.KEYID = 7
6,351,811 UART: [ldev] FE.KEYID = 1
6,360,784 UART: [ldev] Erasing FE.KEYID = 1
8,835,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,737 UART: [ldev] --
10,627,583 UART: [fwproc] Wait for Commands...
10,629,686 UART: [fwproc] Recv command 0x46574c44
10,631,780 UART: [fwproc] Recv'd Img size: 114448 bytes
10,706,831 UART: ROM Fatal Error: 0x00B0003A
10,709,915 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,057,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,591 UART:
2,201,998 UART: Running Caliptra ROM ...
2,203,095 UART:
2,203,254 UART: [state] CFI Enabled
2,204,157 UART: [state] LifecycleState = Unprovisioned
2,205,811 UART: [state] DebugLocked = No
2,206,837 UART: [state] WD Timer not started. Device not locked for debugging
2,209,312 UART: [kat] SHA2-256
2,209,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,983 UART: [kat] ++
2,213,431 UART: [kat] sha1
2,213,940 UART: [kat] SHA2-256
2,214,596 UART: [kat] SHA2-384
2,215,274 UART: [kat] SHA2-512-ACC
2,216,104 UART: [kat] ECC-384
3,282,135 UART: [kat] HMAC-384Kdf
3,294,513 UART: [kat] LMS
3,823,996 UART: [kat] --
3,827,853 UART: [cold-reset] ++
3,830,057 UART: [fht] FHT @ 0x50003400
3,842,384 UART: [idev] ++
3,842,945 UART: [idev] CDI.KEYID = 6
3,843,956 UART: [idev] SUBJECT.KEYID = 7
3,845,055 UART: [idev] UDS.KEYID = 0
3,861,744 UART: [idev] Erasing UDS.KEYID = 0
6,317,851 UART: [idev] Sha1 KeyId Algorithm
6,341,168 UART: [idev] --
6,344,754 UART: [ldev] ++
6,345,324 UART: [ldev] CDI.KEYID = 6
6,346,279 UART: [ldev] SUBJECT.KEYID = 5
6,347,434 UART: [ldev] AUTHORITY.KEYID = 7
6,348,663 UART: [ldev] FE.KEYID = 1
6,358,352 UART: [ldev] Erasing FE.KEYID = 1
8,828,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,764 UART: [ldev] --
10,619,862 UART: [fwproc] Wait for Commands...
10,622,284 UART: [fwproc] Recv command 0x46574c44
10,624,374 UART: [fwproc] Recv'd Img size: 114448 bytes
10,695,200 UART: ROM Fatal Error: 0x00B0003A
10,698,354 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,058,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,542 UART:
2,202,940 UART: Running Caliptra ROM ...
2,204,032 UART:
2,204,188 UART: [state] CFI Enabled
2,205,152 UART: [state] LifecycleState = Unprovisioned
2,206,812 UART: [state] DebugLocked = No
2,207,839 UART: [state] WD Timer not started. Device not locked for debugging
2,210,314 UART: [kat] SHA2-256
2,211,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,246 UART: [kat] ++
2,214,699 UART: [kat] sha1
2,215,212 UART: [kat] SHA2-256
2,215,952 UART: [kat] SHA2-384
2,216,616 UART: [kat] SHA2-512-ACC
2,217,463 UART: [kat] ECC-384
3,286,158 UART: [kat] HMAC-384Kdf
3,297,890 UART: [kat] LMS
3,827,371 UART: [kat] --
3,831,435 UART: [cold-reset] ++
3,833,469 UART: [fht] FHT @ 0x50003400
3,845,631 UART: [idev] ++
3,846,199 UART: [idev] CDI.KEYID = 6
3,847,104 UART: [idev] SUBJECT.KEYID = 7
3,848,314 UART: [idev] UDS.KEYID = 0
3,863,960 UART: [idev] Erasing UDS.KEYID = 0
6,319,489 UART: [idev] Sha1 KeyId Algorithm
6,342,503 UART: [idev] --
6,346,220 UART: [ldev] ++
6,346,787 UART: [ldev] CDI.KEYID = 6
6,347,664 UART: [ldev] SUBJECT.KEYID = 5
6,348,872 UART: [ldev] AUTHORITY.KEYID = 7
6,350,104 UART: [ldev] FE.KEYID = 1
6,360,293 UART: [ldev] Erasing FE.KEYID = 1
8,835,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,533 UART: [ldev] --
10,626,920 UART: [fwproc] Wait for Commands...
10,628,543 UART: [fwproc] Recv command 0x46574c44
10,630,616 UART: [fwproc] Recv'd Img size: 114448 bytes
15,208,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,285,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,354,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,673,194 >>> mbox cmd response: success
15,677,635 UART: [afmc] ++
15,678,224 UART: [afmc] CDI.KEYID = 6
15,679,136 UART: [afmc] SUBJECT.KEYID = 7
15,680,348 UART: [afmc] AUTHORITY.KEYID = 5
18,183,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,903,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,905,204 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,921,187 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,937,205 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,952,983 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,976,585 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.69s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,056,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,492,313 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,056,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,096 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,055,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,237 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,056,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,665 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,056,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,259 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,057,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,472,679 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,057,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,414 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,827 writing to cptra_bootfsm_go
2,054,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,485,312 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,055,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,362 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,057,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,481,115 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
2,056,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,196 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,056,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,488,998 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,055,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,092 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,055,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,933 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,063,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,475,593 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,064,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,491,540 >>> mbox cmd response: failed
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,055,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,495,345 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,064,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,757 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,055,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,253,567 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 76844 bytes from beginning
0,413,750 UART: [fwproc] Recv'd Img size: 114448 bytes
10,490,873 UART: ROM Fatal Error: 0x00B0003A
10,493,957 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,056,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,873 UART:
2,201,320 UART: Running Caliptra ROM ...
2,202,499 UART:
2,202,671 UART: [state] CFI Enabled
2,203,625 UART: [state] LifecycleState = Unprovisioned
2,205,289 UART: [state] DebugLocked = No
2,206,396 UART: [state] WD Timer not started. Device not locked for debugging
2,208,870 UART: [kat] SHA2-256
2,209,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,546 UART: [kat] ++
2,213,001 UART: [kat] sha1
2,213,521 UART: [kat] SHA2-256
2,214,261 UART: [kat] SHA2-384
2,214,926 UART: [kat] SHA2-512-ACC
2,215,819 UART: [kat] ECC-384
2,948,139 UART: [kat] HMAC-384Kdf
2,973,878 UART: [kat] LMS
3,503,361 UART: [kat] --
3,506,818 UART: [cold-reset] ++
3,509,181 UART: [fht] FHT @ 0x50003400
3,520,155 UART: [idev] ++
3,520,729 UART: [idev] CDI.KEYID = 6
3,521,751 UART: [idev] SUBJECT.KEYID = 7
3,522,856 UART: [idev] UDS.KEYID = 0
3,545,101 UART: [idev] Erasing UDS.KEYID = 0
6,024,047 UART: [idev] Sha1 KeyId Algorithm
6,047,884 UART: [idev] --
6,051,672 UART: [ldev] ++
6,052,247 UART: [ldev] CDI.KEYID = 6
6,053,131 UART: [ldev] SUBJECT.KEYID = 5
6,054,347 UART: [ldev] AUTHORITY.KEYID = 7
6,055,637 UART: [ldev] FE.KEYID = 1
6,101,531 UART: [ldev] Erasing FE.KEYID = 1
8,606,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,737 UART: [ldev] --
10,415,572 UART: [fwproc] Wait for Commands...
10,417,655 UART: [fwproc] Recv command 0x46574c44
10,419,766 UART: [fwproc] Recv'd Img size: 114448 bytes
10,493,616 UART: ROM Fatal Error: 0x00B0003A
10,496,746 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,058,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,203,268 UART:
2,203,698 UART: Running Caliptra ROM ...
2,204,794 UART:
2,204,950 UART: [state] CFI Enabled
2,205,914 UART: [state] LifecycleState = Unprovisioned
2,207,554 UART: [state] DebugLocked = No
2,208,580 UART: [state] WD Timer not started. Device not locked for debugging
2,211,060 UART: [kat] SHA2-256
2,211,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,741 UART: [kat] ++
2,215,192 UART: [kat] sha1
2,215,699 UART: [kat] SHA2-256
2,216,356 UART: [kat] SHA2-384
2,217,030 UART: [kat] SHA2-512-ACC
2,217,836 UART: [kat] ECC-384
2,947,836 UART: [kat] HMAC-384Kdf
2,973,451 UART: [kat] LMS
3,502,898 UART: [kat] --
3,508,725 UART: [cold-reset] ++
3,509,576 UART: [fht] FHT @ 0x50003400
3,521,258 UART: [idev] ++
3,521,821 UART: [idev] CDI.KEYID = 6
3,522,749 UART: [idev] SUBJECT.KEYID = 7
3,523,910 UART: [idev] UDS.KEYID = 0
3,544,913 UART: [idev] Erasing UDS.KEYID = 0
6,028,867 UART: [idev] Sha1 KeyId Algorithm
6,051,628 UART: [idev] --
6,055,036 UART: [ldev] ++
6,055,615 UART: [ldev] CDI.KEYID = 6
6,056,545 UART: [ldev] SUBJECT.KEYID = 5
6,057,711 UART: [ldev] AUTHORITY.KEYID = 7
6,058,943 UART: [ldev] FE.KEYID = 1
6,101,508 UART: [ldev] Erasing FE.KEYID = 1
8,604,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,407 UART: [ldev] --
10,413,468 UART: [fwproc] Wait for Commands...
10,416,057 UART: [fwproc] Recv command 0x46574c44
10,418,156 UART: [fwproc] Recv'd Img size: 114448 bytes
10,495,037 UART: ROM Fatal Error: 0x00B0003A
10,498,147 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,057,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,941 UART:
2,202,366 UART: Running Caliptra ROM ...
2,203,456 UART:
2,203,613 UART: [state] CFI Enabled
2,204,575 UART: [state] LifecycleState = Unprovisioned
2,206,238 UART: [state] DebugLocked = No
2,207,268 UART: [state] WD Timer not started. Device not locked for debugging
2,209,736 UART: [kat] SHA2-256
2,210,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,447 UART: [kat] ++
2,213,895 UART: [kat] sha1
2,214,406 UART: [kat] SHA2-256
2,215,063 UART: [kat] SHA2-384
2,215,722 UART: [kat] SHA2-512-ACC
2,216,718 UART: [kat] ECC-384
2,945,373 UART: [kat] HMAC-384Kdf
2,970,370 UART: [kat] LMS
3,499,837 UART: [kat] --
3,503,995 UART: [cold-reset] ++
3,506,300 UART: [fht] FHT @ 0x50003400
3,517,926 UART: [idev] ++
3,518,488 UART: [idev] CDI.KEYID = 6
3,519,463 UART: [idev] SUBJECT.KEYID = 7
3,520,559 UART: [idev] UDS.KEYID = 0
3,542,546 UART: [idev] Erasing UDS.KEYID = 0
6,025,744 UART: [idev] Sha1 KeyId Algorithm
6,048,389 UART: [idev] --
6,053,574 UART: [ldev] ++
6,054,148 UART: [ldev] CDI.KEYID = 6
6,055,056 UART: [ldev] SUBJECT.KEYID = 5
6,056,221 UART: [ldev] AUTHORITY.KEYID = 7
6,057,455 UART: [ldev] FE.KEYID = 1
6,097,922 UART: [ldev] Erasing FE.KEYID = 1
8,603,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,137 UART: [ldev] --
10,409,101 UART: [fwproc] Wait for Commands...
10,411,605 UART: [fwproc] Recv command 0x46574c44
10,413,652 UART: [fwproc] Recv'd Img size: 114448 bytes
10,490,168 UART: ROM Fatal Error: 0x00B0003A
10,493,263 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,523 writing to cptra_bootfsm_go
2,065,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,210,269 UART:
2,210,689 UART: Running Caliptra ROM ...
2,211,824 UART:
2,211,989 UART: [state] CFI Enabled
2,212,974 UART: [state] LifecycleState = Unprovisioned
2,214,626 UART: [state] DebugLocked = No
2,215,738 UART: [state] WD Timer not started. Device not locked for debugging
2,218,210 UART: [kat] SHA2-256
2,218,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,902 UART: [kat] ++
2,222,357 UART: [kat] sha1
2,222,872 UART: [kat] SHA2-256
2,223,616 UART: [kat] SHA2-384
2,224,281 UART: [kat] SHA2-512-ACC
2,225,163 UART: [kat] ECC-384
2,949,525 UART: [kat] HMAC-384Kdf
2,971,575 UART: [kat] LMS
3,501,041 UART: [kat] --
3,506,222 UART: [cold-reset] ++
3,507,184 UART: [fht] FHT @ 0x50003400
3,518,192 UART: [idev] ++
3,518,773 UART: [idev] CDI.KEYID = 6
3,519,680 UART: [idev] SUBJECT.KEYID = 7
3,520,842 UART: [idev] UDS.KEYID = 0
3,542,384 UART: [idev] Erasing UDS.KEYID = 0
6,025,206 UART: [idev] Sha1 KeyId Algorithm
6,048,655 UART: [idev] --
6,052,064 UART: [ldev] ++
6,052,644 UART: [ldev] CDI.KEYID = 6
6,053,718 UART: [ldev] SUBJECT.KEYID = 5
6,054,825 UART: [ldev] AUTHORITY.KEYID = 7
6,056,005 UART: [ldev] FE.KEYID = 1
6,098,816 UART: [ldev] Erasing FE.KEYID = 1
8,603,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,223 UART: [ldev] --
10,410,177 UART: [fwproc] Wait for Commands...
10,413,428 UART: [fwproc] Recv command 0x46574c44
10,415,494 UART: [fwproc] Recv'd Img size: 114448 bytes
14,988,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,064,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,132,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,452,156 >>> mbox cmd response: success
15,456,521 UART: [afmc] ++
15,457,113 UART: [afmc] CDI.KEYID = 6
15,458,022 UART: [afmc] SUBJECT.KEYID = 7
15,459,190 UART: [afmc] AUTHORITY.KEYID = 5
17,997,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,734,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,736,341 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,752,383 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,768,349 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,784,167 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,806,550 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,053,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,308 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,056,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,558 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,067,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,244,431 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,068,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,262,143 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,068,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,171 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,054,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,284,210 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,062,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,278 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
2,053,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,756 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,055,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,257,064 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
2,073,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,256,704 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,053,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,037 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
2,059,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,275,704 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,062,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,255,741 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,079,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,264,062 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,057,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,236,425 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,053,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,280,264 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,062,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,261,405 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,054,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,275,783 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,054,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,021,670 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.00s
Truncated 76844 bytes from beginning
0,626,545 UART: [fwproc] Recv'd Img size: 114448 bytes
10,700,112 UART: ROM Fatal Error: 0x00B0003A
10,703,204 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,577 writing to cptra_bootfsm_go
2,057,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,716 UART:
2,202,118 UART: Running Caliptra ROM ...
2,203,206 UART:
2,203,359 UART: [state] CFI Enabled
2,204,339 UART: [state] LifecycleState = Unprovisioned
2,206,033 UART: [state] DebugLocked = No
2,207,083 UART: [state] WD Timer not started. Device not locked for debugging
2,209,518 UART: [kat] SHA2-256
2,210,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,191 UART: [kat] ++
2,213,637 UART: [kat] sha1
2,214,149 UART: [kat] SHA2-256
2,214,803 UART: [kat] SHA2-384
2,215,462 UART: [kat] SHA2-512-ACC
2,216,265 UART: [kat] ECC-384
3,282,827 UART: [kat] HMAC-384Kdf
3,296,181 UART: [kat] LMS
3,825,674 UART: [kat] --
3,829,860 UART: [cold-reset] ++
3,831,528 UART: [fht] FHT @ 0x50003400
3,843,377 UART: [idev] ++
3,843,979 UART: [idev] CDI.KEYID = 6
3,844,911 UART: [idev] SUBJECT.KEYID = 7
3,846,070 UART: [idev] UDS.KEYID = 0
3,862,692 UART: [idev] Erasing UDS.KEYID = 0
6,319,887 UART: [idev] Sha1 KeyId Algorithm
6,343,902 UART: [idev] --
6,348,406 UART: [ldev] ++
6,348,973 UART: [ldev] CDI.KEYID = 6
6,349,850 UART: [ldev] SUBJECT.KEYID = 5
6,351,061 UART: [ldev] AUTHORITY.KEYID = 7
6,352,350 UART: [ldev] FE.KEYID = 1
6,361,349 UART: [ldev] Erasing FE.KEYID = 1
8,837,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,088 UART: [ldev] --
10,628,517 UART: [fwproc] Wait for Commands...
10,631,257 UART: [fwproc] Recv command 0x46574c44
10,633,348 UART: [fwproc] Recv'd Img size: 114448 bytes
10,712,063 UART: ROM Fatal Error: 0x00B0003A
10,715,166 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,057,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,253 UART:
2,202,663 UART: Running Caliptra ROM ...
2,203,844 UART:
2,204,018 UART: [state] CFI Enabled
2,204,979 UART: [state] LifecycleState = Unprovisioned
2,206,640 UART: [state] DebugLocked = No
2,207,742 UART: [state] WD Timer not started. Device not locked for debugging
2,210,209 UART: [kat] SHA2-256
2,210,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,897 UART: [kat] ++
2,214,346 UART: [kat] sha1
2,214,857 UART: [kat] SHA2-256
2,215,596 UART: [kat] SHA2-384
2,216,257 UART: [kat] SHA2-512-ACC
2,217,088 UART: [kat] ECC-384
3,280,631 UART: [kat] HMAC-384Kdf
3,293,493 UART: [kat] LMS
3,822,983 UART: [kat] --
3,827,103 UART: [cold-reset] ++
3,828,121 UART: [fht] FHT @ 0x50003400
3,839,667 UART: [idev] ++
3,840,225 UART: [idev] CDI.KEYID = 6
3,841,157 UART: [idev] SUBJECT.KEYID = 7
3,842,370 UART: [idev] UDS.KEYID = 0
3,860,448 UART: [idev] Erasing UDS.KEYID = 0
6,321,067 UART: [idev] Sha1 KeyId Algorithm
6,342,837 UART: [idev] --
6,346,765 UART: [ldev] ++
6,347,373 UART: [ldev] CDI.KEYID = 6
6,348,288 UART: [ldev] SUBJECT.KEYID = 5
6,349,456 UART: [ldev] AUTHORITY.KEYID = 7
6,350,686 UART: [ldev] FE.KEYID = 1
6,361,363 UART: [ldev] Erasing FE.KEYID = 1
8,832,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,652 UART: [ldev] --
10,623,534 UART: [fwproc] Wait for Commands...
10,625,420 UART: [fwproc] Recv command 0x46574c44
10,627,513 UART: [fwproc] Recv'd Img size: 114448 bytes
10,707,738 UART: ROM Fatal Error: 0x00B0003A
10,710,818 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,062,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,206,850 UART:
2,207,236 UART: Running Caliptra ROM ...
2,208,523 UART:
2,208,690 UART: [state] CFI Enabled
2,209,674 UART: [state] LifecycleState = Unprovisioned
2,211,248 UART: [state] DebugLocked = No
2,212,268 UART: [state] WD Timer not started. Device not locked for debugging
2,214,749 UART: [kat] SHA2-256
2,215,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,432 UART: [kat] ++
2,218,879 UART: [kat] sha1
2,219,390 UART: [kat] SHA2-256
2,220,047 UART: [kat] SHA2-384
2,220,730 UART: [kat] SHA2-512-ACC
2,221,616 UART: [kat] ECC-384
3,280,699 UART: [kat] HMAC-384Kdf
3,293,091 UART: [kat] LMS
3,822,607 UART: [kat] --
3,827,951 UART: [cold-reset] ++
3,830,258 UART: [fht] FHT @ 0x50003400
3,842,205 UART: [idev] ++
3,842,764 UART: [idev] CDI.KEYID = 6
3,843,685 UART: [idev] SUBJECT.KEYID = 7
3,844,842 UART: [idev] UDS.KEYID = 0
3,861,087 UART: [idev] Erasing UDS.KEYID = 0
6,319,989 UART: [idev] Sha1 KeyId Algorithm
6,343,220 UART: [idev] --
6,348,234 UART: [ldev] ++
6,348,805 UART: [ldev] CDI.KEYID = 6
6,349,735 UART: [ldev] SUBJECT.KEYID = 5
6,350,896 UART: [ldev] AUTHORITY.KEYID = 7
6,352,180 UART: [ldev] FE.KEYID = 1
6,364,065 UART: [ldev] Erasing FE.KEYID = 1
8,839,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,998 UART: [ldev] --
10,630,011 UART: [fwproc] Wait for Commands...
10,631,622 UART: [fwproc] Recv command 0x46574c44
10,633,719 UART: [fwproc] Recv'd Img size: 114448 bytes
10,706,526 UART: ROM Fatal Error: 0x00B0003A
10,709,613 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,056,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,070 UART:
2,201,501 UART: Running Caliptra ROM ...
2,202,644 UART:
2,202,805 UART: [state] CFI Enabled
2,203,706 UART: [state] LifecycleState = Unprovisioned
2,205,367 UART: [state] DebugLocked = No
2,206,397 UART: [state] WD Timer not started. Device not locked for debugging
2,208,869 UART: [kat] SHA2-256
2,209,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,576 UART: [kat] ++
2,213,070 UART: [kat] sha1
2,213,587 UART: [kat] SHA2-256
2,214,267 UART: [kat] SHA2-384
2,214,925 UART: [kat] SHA2-512-ACC
2,215,724 UART: [kat] ECC-384
3,281,103 UART: [kat] HMAC-384Kdf
3,292,911 UART: [kat] LMS
3,822,402 UART: [kat] --
3,827,742 UART: [cold-reset] ++
3,829,291 UART: [fht] FHT @ 0x50003400
3,839,777 UART: [idev] ++
3,840,387 UART: [idev] CDI.KEYID = 6
3,841,270 UART: [idev] SUBJECT.KEYID = 7
3,842,485 UART: [idev] UDS.KEYID = 0
3,858,345 UART: [idev] Erasing UDS.KEYID = 0
6,311,597 UART: [idev] Sha1 KeyId Algorithm
6,335,207 UART: [idev] --
6,339,986 UART: [ldev] ++
6,340,557 UART: [ldev] CDI.KEYID = 6
6,341,438 UART: [ldev] SUBJECT.KEYID = 5
6,342,647 UART: [ldev] AUTHORITY.KEYID = 7
6,343,877 UART: [ldev] FE.KEYID = 1
6,353,523 UART: [ldev] Erasing FE.KEYID = 1
8,831,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,351 UART: [ldev] --
10,624,446 UART: [fwproc] Wait for Commands...
10,627,026 UART: [fwproc] Recv command 0x46574c44
10,629,141 UART: [fwproc] Recv'd Img size: 114448 bytes
15,203,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,275,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,343,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,662,081 >>> mbox cmd response: success
15,666,293 UART: [afmc] ++
15,666,880 UART: [afmc] CDI.KEYID = 6
15,667,789 UART: [afmc] SUBJECT.KEYID = 7
15,668,947 UART: [afmc] AUTHORITY.KEYID = 5
18,171,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,888,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,890,783 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,906,814 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,922,815 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,938,616 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,960,986 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.70s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
2,056,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,689 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,057,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,473,160 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,063,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,956 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,055,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,475,187 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,057,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,794 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,058,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,626 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,057,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,489,145 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,057,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,489,223 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,055,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,544 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,056,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,468,807 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,063,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,139 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,057,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,650 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,060,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,489,406 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,055,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,487,650 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,668 writing to cptra_bootfsm_go
2,056,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,488,059 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,057,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,672 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,055,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,561 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,057,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,467 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,056,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,240,850 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 74764 bytes from beginning
1,273,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,046 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,281,911 UART: [fwproc] Recv command 0x46574c44
1,282,644 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,432 UART: ROM Fatal Error: 0x00B0003A
1,309,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,216,220 UART: [ldev] Erasing FE.KEYID = 1
1,242,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,142 UART: ROM Fatal Error: 0x00B0003A
1,310,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,338 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,758 UART: ROM Fatal Error: 0x00B0003A
1,309,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,204 UART: [ldev] ++
1,209,372 UART: [ldev] CDI.KEYID = 6
1,209,736 UART: [ldev] SUBJECT.KEYID = 5
1,210,163 UART: [ldev] AUTHORITY.KEYID = 7
1,210,626 UART: [ldev] FE.KEYID = 1
1,215,820 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,459 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,552 UART: ROM Fatal Error: 0x00B0003A
1,310,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,147,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,796 >>> mbox cmd response: success
3,314,059 UART: [afmc] ++
3,314,227 UART: [afmc] CDI.KEYID = 6
3,314,590 UART: [afmc] SUBJECT.KEYID = 7
3,315,016 UART: [afmc] AUTHORITY.KEYID = 5
3,350,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,853 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,373,561 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,379,446 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,385,148 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,392,832 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.04s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,665 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.15s
Truncated 74764 bytes from beginning
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,907 UART: [ldev] --
1,283,191 UART: [fwproc] Wait for Commands...
1,284,006 UART: [fwproc] Recv command 0x46574c44
1,284,739 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,669 UART: ROM Fatal Error: 0x00B0003A
1,311,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,536 UART: [cold-reset] ++
1,170,102 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,181,486 UART: [idev] Erasing UDS.KEYID = 0
1,198,992 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,460 UART: [fwproc] Recv command 0x46574c44
1,283,193 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,603 UART: ROM Fatal Error: 0x00B0003A
1,310,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,277 UART: [kat] LMS
1,169,589 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,098 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,319 UART: [fwproc] Wait for Commands...
1,283,122 UART: [fwproc] Recv command 0x46574c44
1,283,855 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,515 UART: ROM Fatal Error: 0x00B0003A
1,310,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,568 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,182 UART: [fwproc] Recv command 0x46574c44
1,282,915 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,935 UART: ROM Fatal Error: 0x00B0003A
1,310,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,421 UART: [ldev] --
1,280,715 UART: [fwproc] Wait for Commands...
1,281,324 UART: [fwproc] Recv command 0x46574c44
1,282,057 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,155,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,484 >>> mbox cmd response: success
3,321,691 UART: [afmc] ++
3,321,859 UART: [afmc] CDI.KEYID = 6
3,322,222 UART: [afmc] SUBJECT.KEYID = 7
3,322,648 UART: [afmc] AUTHORITY.KEYID = 5
3,358,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,699 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,407 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,292 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,392,994 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,400,932 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.89s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,281 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.87s
Truncated 74764 bytes from beginning
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,934 UART: [ldev] --
1,281,354 UART: [fwproc] Wait for Commands...
1,282,127 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,024 UART: ROM Fatal Error: 0x00B0003A
1,310,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,939 UART: [idev] Sha1 KeyId Algorithm
1,207,951 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,006 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,296 UART: ROM Fatal Error: 0x00B0003A
1,309,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,567 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,215,500 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,602 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,940 UART: ROM Fatal Error: 0x00B0003A
1,310,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,976 UART: [ldev] Erasing FE.KEYID = 1
1,241,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,056 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,052 UART: ROM Fatal Error: 0x00B0003A
1,309,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,182,041 UART: [idev] Erasing UDS.KEYID = 0
1,199,567 UART: [idev] Sha1 KeyId Algorithm
1,208,457 UART: [idev] --
1,209,598 UART: [ldev] ++
1,209,766 UART: [ldev] CDI.KEYID = 6
1,210,130 UART: [ldev] SUBJECT.KEYID = 5
1,210,557 UART: [ldev] AUTHORITY.KEYID = 7
1,211,020 UART: [ldev] FE.KEYID = 1
1,216,228 UART: [ldev] Erasing FE.KEYID = 1
1,242,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,490 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,699 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,159,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,351 >>> mbox cmd response: success
3,326,472 UART: [afmc] ++
3,326,640 UART: [afmc] CDI.KEYID = 6
3,327,003 UART: [afmc] SUBJECT.KEYID = 7
3,327,429 UART: [afmc] AUTHORITY.KEYID = 5
3,362,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,282 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,385,990 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,391,875 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,397,577 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,405,475 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.51s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,175,456 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.48s
Truncated 74764 bytes from beginning
1,272,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,025 UART: ROM Fatal Error: 0x00B0003A
1,310,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,200,264 UART: [idev] Sha1 KeyId Algorithm
1,209,210 UART: [idev] --
1,210,339 UART: [ldev] ++
1,210,507 UART: [ldev] CDI.KEYID = 6
1,210,871 UART: [ldev] SUBJECT.KEYID = 5
1,211,298 UART: [ldev] AUTHORITY.KEYID = 7
1,211,761 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,675 UART: ROM Fatal Error: 0x00B0003A
1,310,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,198,750 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,821 UART: [ldev] ++
1,208,989 UART: [ldev] CDI.KEYID = 6
1,209,353 UART: [ldev] SUBJECT.KEYID = 5
1,209,780 UART: [ldev] AUTHORITY.KEYID = 7
1,210,243 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,633 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,301 UART: ROM Fatal Error: 0x00B0003A
1,309,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,114 UART: [kat] ++
896,266 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
905,213 UART: [kat] SHA2-512-ACC
907,114 UART: [kat] ECC-384
916,969 UART: [kat] HMAC-384Kdf
921,549 UART: [kat] LMS
1,169,861 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,302 UART: [fht] FHT @ 0x50003400
1,173,784 UART: [idev] ++
1,173,952 UART: [idev] CDI.KEYID = 6
1,174,313 UART: [idev] SUBJECT.KEYID = 7
1,174,738 UART: [idev] UDS.KEYID = 0
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,698 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,342 UART: [fwproc] Recv command 0x46574c44
1,284,075 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,945 UART: ROM Fatal Error: 0x00B0003A
1,312,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,767 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x46574c44
1,283,167 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,158,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,563 >>> mbox cmd response: success
3,324,596 UART: [afmc] ++
3,324,764 UART: [afmc] CDI.KEYID = 6
3,325,127 UART: [afmc] SUBJECT.KEYID = 7
3,325,553 UART: [afmc] AUTHORITY.KEYID = 5
3,361,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,890 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,383,598 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,389,483 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,395,185 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,403,079 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.69s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,847 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.57s
Truncated 74764 bytes from beginning
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,672 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,937 UART: [fwproc] Recv command 0x46574c44
1,282,670 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,394 UART: ROM Fatal Error: 0x00B0003A
1,309,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,392 UART: [kat] LMS
1,168,704 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,033 UART: [idev] --
1,208,944 UART: [ldev] ++
1,209,112 UART: [ldev] CDI.KEYID = 6
1,209,476 UART: [ldev] SUBJECT.KEYID = 5
1,209,903 UART: [ldev] AUTHORITY.KEYID = 7
1,210,366 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,822 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,282,037 UART: [fwproc] Recv command 0x46574c44
1,282,770 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,570 UART: ROM Fatal Error: 0x00B0003A
1,309,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,182,897 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,209,200 UART: [ldev] ++
1,209,368 UART: [ldev] CDI.KEYID = 6
1,209,732 UART: [ldev] SUBJECT.KEYID = 5
1,210,159 UART: [ldev] AUTHORITY.KEYID = 7
1,210,622 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,242,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,930 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,161 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,696 UART: ROM Fatal Error: 0x00B0003A
1,309,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,490 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,717 UART: [fwproc] Recv command 0x46574c44
1,282,450 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,060 UART: ROM Fatal Error: 0x00B0003A
1,309,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,216,056 UART: [ldev] Erasing FE.KEYID = 1
1,242,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,704 UART: [fwproc] Wait for Commands...
1,282,493 UART: [fwproc] Recv command 0x46574c44
1,283,226 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,156,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,531 >>> mbox cmd response: success
3,322,660 UART: [afmc] ++
3,322,828 UART: [afmc] CDI.KEYID = 6
3,323,191 UART: [afmc] SUBJECT.KEYID = 7
3,323,617 UART: [afmc] AUTHORITY.KEYID = 5
3,358,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,988 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,696 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,581 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,393,283 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,401,051 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.59s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,800 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,819 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.49s
Truncated 74764 bytes from beginning
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,191 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,983 UART: ROM Fatal Error: 0x00B0003A
1,310,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,517 UART: [kat] SHA2-256
891,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,196 UART: [kat] ++
895,348 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,669 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,169,972 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,181,380 UART: [idev] Erasing UDS.KEYID = 0
1,198,514 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,461 UART: [ldev] ++
1,208,629 UART: [ldev] CDI.KEYID = 6
1,208,993 UART: [ldev] SUBJECT.KEYID = 5
1,209,420 UART: [ldev] AUTHORITY.KEYID = 7
1,209,883 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,097 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,985 UART: ROM Fatal Error: 0x00B0003A
1,310,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,728 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,415 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,574 UART: [fwproc] Recv command 0x46574c44
1,284,307 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,779 UART: ROM Fatal Error: 0x00B0003A
1,310,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,519 UART: [ldev] ++
1,209,687 UART: [ldev] CDI.KEYID = 6
1,210,051 UART: [ldev] SUBJECT.KEYID = 5
1,210,478 UART: [ldev] AUTHORITY.KEYID = 7
1,210,941 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,403 UART: ROM Fatal Error: 0x00B0003A
1,309,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
1,169,487 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,390 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,343 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,653 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,152,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,286 >>> mbox cmd response: success
3,319,309 UART: [afmc] ++
3,319,477 UART: [afmc] CDI.KEYID = 6
3,319,840 UART: [afmc] SUBJECT.KEYID = 7
3,320,266 UART: [afmc] AUTHORITY.KEYID = 5
3,356,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,933 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,379,641 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,385,526 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,391,228 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,399,134 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.73s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,722 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
5,847 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,246 UART:
192,630 UART: Running Caliptra ROM ...
193,814 UART:
193,968 UART: [state] CFI Enabled
261,996 UART: [state] LifecycleState = Manufacturing
264,415 UART: [state] DebugLocked = No
266,497 UART: [state] WD Timer not started. Device not locked for debugging
270,589 UART: [kat] SHA2-256
452,534 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,052 UART: [kat] ++
464,500 UART: [kat] sha1
474,531 UART: [kat] SHA2-256
477,550 UART: [kat] SHA2-384
482,288 UART: [kat] SHA2-512-ACC
484,890 UART: [kat] ECC-384
3,776,695 UART: [kat] HMAC-384Kdf
3,801,111 UART: [kat] LMS
4,874,223 UART: [kat] --
4,878,702 UART: [cold-reset] ++
4,879,824 UART: [fht] FHT @ 0x50003400
4,890,474 UART: [idev] ++
4,891,152 UART: [idev] CDI.KEYID = 6
4,892,383 UART: [idev] SUBJECT.KEYID = 7
4,893,484 UART: [idev] UDS.KEYID = 0
4,928,968 UART: [idev] Erasing UDS.KEYID = 0
8,240,406 UART: [idev] Sha1 KeyId Algorithm
8,262,128 UART: [idev] --
8,266,328 UART: [ldev] ++
8,266,965 UART: [ldev] CDI.KEYID = 6
8,268,072 UART: [ldev] SUBJECT.KEYID = 5
8,269,293 UART: [ldev] AUTHORITY.KEYID = 7
8,270,447 UART: [ldev] FE.KEYID = 1
8,314,392 UART: [ldev] Erasing FE.KEYID = 1
11,650,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,947 UART: [ldev] --
14,035,238 UART: [fwproc] Wait for Commands...
14,036,899 UART: [fwproc] Recv command 0x46574c44
14,039,157 UART: [fwproc] Recv'd Img size: 114124 bytes
14,128,787 UART: ROM Fatal Error: 0x000B0005
14,132,199 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
6,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,944,699 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
6,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,345 UART:
192,722 UART: Running Caliptra ROM ...
193,814 UART:
603,634 UART: [state] CFI Enabled
615,907 UART: [state] LifecycleState = Manufacturing
618,252 UART: [state] DebugLocked = No
620,760 UART: [state] WD Timer not started. Device not locked for debugging
625,138 UART: [kat] SHA2-256
807,092 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,661 UART: [kat] ++
819,248 UART: [kat] sha1
830,831 UART: [kat] SHA2-256
833,881 UART: [kat] SHA2-384
839,793 UART: [kat] SHA2-512-ACC
842,409 UART: [kat] ECC-384
4,096,754 UART: [kat] HMAC-384Kdf
4,109,203 UART: [kat] LMS
5,182,393 UART: [kat] --
5,186,844 UART: [cold-reset] ++
5,188,591 UART: [fht] FHT @ 0x50003400
5,200,173 UART: [idev] ++
5,200,859 UART: [idev] CDI.KEYID = 6
5,202,090 UART: [idev] SUBJECT.KEYID = 7
5,203,522 UART: [idev] UDS.KEYID = 0
5,220,790 UART: [idev] Erasing UDS.KEYID = 0
8,495,328 UART: [idev] Sha1 KeyId Algorithm
8,517,364 UART: [idev] --
8,521,030 UART: [ldev] ++
8,521,596 UART: [ldev] CDI.KEYID = 6
8,522,828 UART: [ldev] SUBJECT.KEYID = 5
8,524,255 UART: [ldev] AUTHORITY.KEYID = 7
8,525,862 UART: [ldev] FE.KEYID = 1
8,536,987 UART: [ldev] Erasing FE.KEYID = 1
11,832,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,991 UART: [ldev] --
14,197,002 UART: [fwproc] Wait for Commands...
14,200,078 UART: [fwproc] Recv command 0x46574c44
14,202,398 UART: [fwproc] Recv'd Img size: 114124 bytes
14,290,984 UART: ROM Fatal Error: 0x000B0005
14,294,344 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
6,128 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,117,663 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
5,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,299 UART:
192,701 UART: Running Caliptra ROM ...
193,865 UART:
194,016 UART: [state] CFI Enabled
261,297 UART: [state] LifecycleState = Manufacturing
263,159 UART: [state] DebugLocked = No
264,591 UART: [state] WD Timer not started. Device not locked for debugging
268,700 UART: [kat] SHA2-256
447,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,447 UART: [kat] ++
459,976 UART: [kat] sha1
470,858 UART: [kat] SHA2-256
473,919 UART: [kat] SHA2-384
481,454 UART: [kat] SHA2-512-ACC
484,436 UART: [kat] ECC-384
2,946,867 UART: [kat] HMAC-384Kdf
2,968,662 UART: [kat] LMS
3,498,154 UART: [kat] --
3,499,307 UART: [cold-reset] ++
3,500,444 UART: [fht] FHT @ 0x50003400
3,511,159 UART: [idev] ++
3,511,720 UART: [idev] CDI.KEYID = 6
3,512,653 UART: [idev] SUBJECT.KEYID = 7
3,513,863 UART: [idev] UDS.KEYID = 0
3,539,969 UART: [idev] Erasing UDS.KEYID = 0
6,020,027 UART: [idev] Sha1 KeyId Algorithm
6,043,113 UART: [idev] --
6,045,659 UART: [ldev] ++
6,046,234 UART: [ldev] CDI.KEYID = 6
6,047,303 UART: [ldev] SUBJECT.KEYID = 5
6,048,412 UART: [ldev] AUTHORITY.KEYID = 7
6,049,591 UART: [ldev] FE.KEYID = 1
6,075,849 UART: [ldev] Erasing FE.KEYID = 1
8,577,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,840 UART: [ldev] --
10,388,616 UART: [fwproc] Wait for Commands...
10,390,717 UART: [fwproc] Recv command 0x46574c44
10,392,814 UART: [fwproc] Recv'd Img size: 114448 bytes
10,481,404 UART: ROM Fatal Error: 0x000B0005
10,484,489 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
5,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,311,790 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
6,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,620 UART:
193,001 UART: Running Caliptra ROM ...
194,171 UART:
603,744 UART: [state] CFI Enabled
616,220 UART: [state] LifecycleState = Manufacturing
618,078 UART: [state] DebugLocked = No
619,977 UART: [state] WD Timer not started. Device not locked for debugging
623,384 UART: [kat] SHA2-256
802,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,086 UART: [kat] ++
814,532 UART: [kat] sha1
826,020 UART: [kat] SHA2-256
829,090 UART: [kat] SHA2-384
834,797 UART: [kat] SHA2-512-ACC
837,724 UART: [kat] ECC-384
3,279,796 UART: [kat] HMAC-384Kdf
3,291,702 UART: [kat] LMS
3,821,199 UART: [kat] --
3,827,026 UART: [cold-reset] ++
3,828,581 UART: [fht] FHT @ 0x50003400
3,839,392 UART: [idev] ++
3,839,959 UART: [idev] CDI.KEYID = 6
3,840,919 UART: [idev] SUBJECT.KEYID = 7
3,842,017 UART: [idev] UDS.KEYID = 0
3,858,560 UART: [idev] Erasing UDS.KEYID = 0
6,320,139 UART: [idev] Sha1 KeyId Algorithm
6,343,696 UART: [idev] --
6,347,866 UART: [ldev] ++
6,348,429 UART: [ldev] CDI.KEYID = 6
6,349,395 UART: [ldev] SUBJECT.KEYID = 5
6,350,548 UART: [ldev] AUTHORITY.KEYID = 7
6,351,776 UART: [ldev] FE.KEYID = 1
6,360,527 UART: [ldev] Erasing FE.KEYID = 1
8,834,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,570 UART: [ldev] --
10,627,471 UART: [fwproc] Wait for Commands...
10,629,507 UART: [fwproc] Recv command 0x46574c44
10,631,547 UART: [fwproc] Recv'd Img size: 114448 bytes
10,723,518 UART: ROM Fatal Error: 0x000B0005
10,726,633 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
6,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,499,478 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,041 UART:
192,434 UART: Running Caliptra ROM ...
193,598 UART:
193,750 UART: [state] CFI Enabled
260,331 UART: [state] LifecycleState = Manufacturing
262,147 UART: [state] DebugLocked = No
264,769 UART: [state] WD Timer not started. Device not locked for debugging
269,070 UART: [kat] SHA2-256
448,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,798 UART: [kat] ++
460,328 UART: [kat] sha1
470,398 UART: [kat] SHA2-256
473,405 UART: [kat] SHA2-384
479,596 UART: [kat] SHA2-512-ACC
482,554 UART: [kat] ECC-384
2,945,002 UART: [kat] HMAC-384Kdf
2,962,351 UART: [kat] LMS
3,491,819 UART: [kat] --
3,496,804 UART: [cold-reset] ++
3,499,077 UART: [fht] FHT @ 0x50003400
3,511,143 UART: [idev] ++
3,511,705 UART: [idev] CDI.KEYID = 6
3,512,587 UART: [idev] SUBJECT.KEYID = 7
3,513,799 UART: [idev] UDS.KEYID = 0
3,534,488 UART: [idev] Erasing UDS.KEYID = 0
6,016,631 UART: [idev] Sha1 KeyId Algorithm
6,038,183 UART: [idev] --
6,040,969 UART: [ldev] ++
6,041,552 UART: [ldev] CDI.KEYID = 6
6,042,461 UART: [ldev] SUBJECT.KEYID = 5
6,043,643 UART: [ldev] AUTHORITY.KEYID = 7
6,044,879 UART: [ldev] FE.KEYID = 1
6,091,012 UART: [ldev] Erasing FE.KEYID = 1
8,596,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,910 UART: [ldev] --
10,402,822 UART: [fwproc] Wait for Commands...
10,404,700 UART: [fwproc] Recv command 0x46574c44
10,406,795 UART: [fwproc] Recv'd Img size: 114448 bytes
10,495,389 UART: ROM Fatal Error: 0x000B0005
10,498,535 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
5,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,268,808 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
6,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,478 UART:
192,887 UART: Running Caliptra ROM ...
193,962 UART:
603,480 UART: [state] CFI Enabled
617,912 UART: [state] LifecycleState = Manufacturing
619,754 UART: [state] DebugLocked = No
621,832 UART: [state] WD Timer not started. Device not locked for debugging
624,762 UART: [kat] SHA2-256
803,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,436 UART: [kat] ++
815,961 UART: [kat] sha1
827,330 UART: [kat] SHA2-256
830,378 UART: [kat] SHA2-384
835,551 UART: [kat] SHA2-512-ACC
838,540 UART: [kat] ECC-384
3,281,466 UART: [kat] HMAC-384Kdf
3,293,438 UART: [kat] LMS
3,822,922 UART: [kat] --
3,827,258 UART: [cold-reset] ++
3,829,574 UART: [fht] FHT @ 0x50003400
3,840,555 UART: [idev] ++
3,841,134 UART: [idev] CDI.KEYID = 6
3,842,037 UART: [idev] SUBJECT.KEYID = 7
3,843,197 UART: [idev] UDS.KEYID = 0
3,860,085 UART: [idev] Erasing UDS.KEYID = 0
6,316,761 UART: [idev] Sha1 KeyId Algorithm
6,339,287 UART: [idev] --
6,344,037 UART: [ldev] ++
6,344,649 UART: [ldev] CDI.KEYID = 6
6,345,562 UART: [ldev] SUBJECT.KEYID = 5
6,346,644 UART: [ldev] AUTHORITY.KEYID = 7
6,347,931 UART: [ldev] FE.KEYID = 1
6,357,097 UART: [ldev] Erasing FE.KEYID = 1
8,830,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,680 UART: [ldev] --
10,621,104 UART: [fwproc] Wait for Commands...
10,623,035 UART: [fwproc] Recv command 0x46574c44
10,625,128 UART: [fwproc] Recv'd Img size: 114448 bytes
10,717,445 UART: ROM Fatal Error: 0x000B0005
10,720,535 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
6,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,500,056 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Manufacturing
85,613 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,241,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,546 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,791 UART: ROM Fatal Error: 0x000B0005
1,327,948 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,775 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Manufacturing
86,326 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,127 UART: [ldev] --
1,281,549 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,416 UART: ROM Fatal Error: 0x000B0005
1,328,573 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,480 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Manufacturing
85,687 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,019 UART: [idev] Sha1 KeyId Algorithm
1,206,947 UART: [idev] --
1,207,994 UART: [ldev] ++
1,208,162 UART: [ldev] CDI.KEYID = 6
1,208,526 UART: [ldev] SUBJECT.KEYID = 5
1,208,953 UART: [ldev] AUTHORITY.KEYID = 7
1,209,416 UART: [ldev] FE.KEYID = 1
1,214,218 UART: [ldev] Erasing FE.KEYID = 1
1,240,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,120 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,205 UART: ROM Fatal Error: 0x000B0005
1,326,362 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,917 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Manufacturing
86,070 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,200,074 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,933 UART: [ldev] ++
1,210,101 UART: [ldev] CDI.KEYID = 6
1,210,465 UART: [ldev] SUBJECT.KEYID = 5
1,210,892 UART: [ldev] AUTHORITY.KEYID = 7
1,211,355 UART: [ldev] FE.KEYID = 1
1,216,827 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,599 UART: [fwproc] Wait for Commands...
1,283,370 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,888 UART: ROM Fatal Error: 0x000B0005
1,330,045 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,606 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Manufacturing
85,945 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,182,213 UART: [idev] Erasing UDS.KEYID = 0
1,199,929 UART: [idev] Sha1 KeyId Algorithm
1,208,741 UART: [idev] --
1,209,858 UART: [ldev] ++
1,210,026 UART: [ldev] CDI.KEYID = 6
1,210,390 UART: [ldev] SUBJECT.KEYID = 5
1,210,817 UART: [ldev] AUTHORITY.KEYID = 7
1,211,280 UART: [ldev] FE.KEYID = 1
1,216,816 UART: [ldev] Erasing FE.KEYID = 1
1,243,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,588 UART: [fwproc] Wait for Commands...
1,283,325 UART: [fwproc] Recv command 0x46574c44
1,284,058 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,037 UART: ROM Fatal Error: 0x000B0005
1,330,194 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,321 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Manufacturing
86,078 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,182 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,302 UART: ROM Fatal Error: 0x000B0005
1,328,459 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,306 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,546 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,021 UART:
192,404 UART: Running Caliptra ROM ...
193,505 UART:
193,645 UART: [state] CFI Enabled
270,027 UART: [state] LifecycleState = Manufacturing
272,449 UART: [state] DebugLocked = No
274,071 UART: [state] WD Timer not started. Device not locked for debugging
278,607 UART: [kat] SHA2-256
460,529 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
472,036 UART: [kat] ++
472,542 UART: [kat] sha1
482,551 UART: [kat] SHA2-256
485,613 UART: [kat] SHA2-384
491,963 UART: [kat] SHA2-512-ACC
494,579 UART: [kat] ECC-384
3,775,941 UART: [kat] HMAC-384Kdf
3,803,051 UART: [kat] LMS
4,876,207 UART: [kat] --
4,880,523 UART: [cold-reset] ++
4,883,274 UART: [fht] FHT @ 0x50003400
4,895,603 UART: [idev] ++
4,896,279 UART: [idev] CDI.KEYID = 6
4,897,508 UART: [idev] SUBJECT.KEYID = 7
4,898,666 UART: [idev] UDS.KEYID = 0
4,930,438 UART: [idev] Erasing UDS.KEYID = 0
8,243,801 UART: [idev] Sha1 KeyId Algorithm
8,265,856 UART: [idev] --
8,270,421 UART: [ldev] ++
8,270,993 UART: [ldev] CDI.KEYID = 6
8,272,157 UART: [ldev] SUBJECT.KEYID = 5
8,273,369 UART: [ldev] AUTHORITY.KEYID = 7
8,274,521 UART: [ldev] FE.KEYID = 1
8,319,051 UART: [ldev] Erasing FE.KEYID = 1
11,657,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,555 UART: [ldev] --
14,039,187 UART: [fwproc] Wait for Commands...
14,042,256 UART: [fwproc] Recv command 0x46574c44
14,044,533 UART: [fwproc] Recv'd Img size: 114124 bytes
14,102,898 UART: ROM Fatal Error: 0x000B0003
14,106,311 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
5,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,866,166 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,543 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,430 UART:
192,822 UART: Running Caliptra ROM ...
193,927 UART:
603,567 UART: [state] CFI Enabled
618,853 UART: [state] LifecycleState = Manufacturing
621,227 UART: [state] DebugLocked = No
623,303 UART: [state] WD Timer not started. Device not locked for debugging
627,809 UART: [kat] SHA2-256
809,805 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,320 UART: [kat] ++
821,900 UART: [kat] sha1
832,872 UART: [kat] SHA2-256
835,895 UART: [kat] SHA2-384
841,992 UART: [kat] SHA2-512-ACC
844,613 UART: [kat] ECC-384
4,101,512 UART: [kat] HMAC-384Kdf
4,112,069 UART: [kat] LMS
5,185,212 UART: [kat] --
5,191,819 UART: [cold-reset] ++
5,193,593 UART: [fht] FHT @ 0x50003400
5,205,708 UART: [idev] ++
5,206,386 UART: [idev] CDI.KEYID = 6
5,207,622 UART: [idev] SUBJECT.KEYID = 7
5,209,073 UART: [idev] UDS.KEYID = 0
5,229,875 UART: [idev] Erasing UDS.KEYID = 0
8,501,218 UART: [idev] Sha1 KeyId Algorithm
8,522,772 UART: [idev] --
8,527,713 UART: [ldev] ++
8,528,283 UART: [ldev] CDI.KEYID = 6
8,529,517 UART: [ldev] SUBJECT.KEYID = 5
8,530,945 UART: [ldev] AUTHORITY.KEYID = 7
8,532,500 UART: [ldev] FE.KEYID = 1
8,545,361 UART: [ldev] Erasing FE.KEYID = 1
11,835,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,179 UART: [ldev] --
14,203,067 UART: [fwproc] Wait for Commands...
14,205,114 UART: [fwproc] Recv command 0x46574c44
14,207,375 UART: [fwproc] Recv'd Img size: 114124 bytes
14,266,935 UART: ROM Fatal Error: 0x000B0003
14,270,350 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
6,356 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,067,670 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
5,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,179 UART:
192,572 UART: Running Caliptra ROM ...
193,645 UART:
193,787 UART: [state] CFI Enabled
264,520 UART: [state] LifecycleState = Manufacturing
266,449 UART: [state] DebugLocked = No
268,181 UART: [state] WD Timer not started. Device not locked for debugging
272,456 UART: [kat] SHA2-256
451,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,142 UART: [kat] ++
463,600 UART: [kat] sha1
475,610 UART: [kat] SHA2-256
478,623 UART: [kat] SHA2-384
485,142 UART: [kat] SHA2-512-ACC
488,075 UART: [kat] ECC-384
2,950,698 UART: [kat] HMAC-384Kdf
2,972,225 UART: [kat] LMS
3,501,722 UART: [kat] --
3,506,794 UART: [cold-reset] ++
3,507,914 UART: [fht] FHT @ 0x50003400
3,518,995 UART: [idev] ++
3,519,558 UART: [idev] CDI.KEYID = 6
3,520,480 UART: [idev] SUBJECT.KEYID = 7
3,521,696 UART: [idev] UDS.KEYID = 0
3,544,802 UART: [idev] Erasing UDS.KEYID = 0
6,028,381 UART: [idev] Sha1 KeyId Algorithm
6,050,768 UART: [idev] --
6,055,883 UART: [ldev] ++
6,056,491 UART: [ldev] CDI.KEYID = 6
6,057,405 UART: [ldev] SUBJECT.KEYID = 5
6,058,566 UART: [ldev] AUTHORITY.KEYID = 7
6,059,798 UART: [ldev] FE.KEYID = 1
6,100,696 UART: [ldev] Erasing FE.KEYID = 1
8,604,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,262 UART: [ldev] --
10,414,830 UART: [fwproc] Wait for Commands...
10,416,441 UART: [fwproc] Recv command 0x46574c44
10,418,535 UART: [fwproc] Recv'd Img size: 114448 bytes
10,482,574 UART: ROM Fatal Error: 0x000B0003
10,485,722 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,244,513 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
6,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,361 UART:
192,754 UART: Running Caliptra ROM ...
193,855 UART:
603,540 UART: [state] CFI Enabled
618,405 UART: [state] LifecycleState = Manufacturing
620,310 UART: [state] DebugLocked = No
623,094 UART: [state] WD Timer not started. Device not locked for debugging
626,305 UART: [kat] SHA2-256
805,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,970 UART: [kat] ++
817,499 UART: [kat] sha1
828,057 UART: [kat] SHA2-256
831,067 UART: [kat] SHA2-384
836,775 UART: [kat] SHA2-512-ACC
839,712 UART: [kat] ECC-384
3,282,290 UART: [kat] HMAC-384Kdf
3,294,978 UART: [kat] LMS
3,824,438 UART: [kat] --
3,829,134 UART: [cold-reset] ++
3,830,522 UART: [fht] FHT @ 0x50003400
3,841,336 UART: [idev] ++
3,841,903 UART: [idev] CDI.KEYID = 6
3,842,787 UART: [idev] SUBJECT.KEYID = 7
3,843,995 UART: [idev] UDS.KEYID = 0
3,860,780 UART: [idev] Erasing UDS.KEYID = 0
6,315,331 UART: [idev] Sha1 KeyId Algorithm
6,338,341 UART: [idev] --
6,342,220 UART: [ldev] ++
6,342,785 UART: [ldev] CDI.KEYID = 6
6,343,717 UART: [ldev] SUBJECT.KEYID = 5
6,344,873 UART: [ldev] AUTHORITY.KEYID = 7
6,346,164 UART: [ldev] FE.KEYID = 1
6,357,162 UART: [ldev] Erasing FE.KEYID = 1
8,834,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,809 UART: [ldev] --
10,628,351 UART: [fwproc] Wait for Commands...
10,630,181 UART: [fwproc] Recv command 0x46574c44
10,632,245 UART: [fwproc] Recv'd Img size: 114448 bytes
10,693,638 UART: ROM Fatal Error: 0x000B0003
10,696,779 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
6,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,467,641 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
5,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,274 UART:
192,673 UART: Running Caliptra ROM ...
193,755 UART:
193,898 UART: [state] CFI Enabled
264,905 UART: [state] LifecycleState = Manufacturing
266,816 UART: [state] DebugLocked = No
269,194 UART: [state] WD Timer not started. Device not locked for debugging
272,553 UART: [kat] SHA2-256
451,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,287 UART: [kat] ++
463,801 UART: [kat] sha1
473,603 UART: [kat] SHA2-256
476,619 UART: [kat] SHA2-384
483,998 UART: [kat] SHA2-512-ACC
486,985 UART: [kat] ECC-384
2,949,074 UART: [kat] HMAC-384Kdf
2,971,358 UART: [kat] LMS
3,500,770 UART: [kat] --
3,504,377 UART: [cold-reset] ++
3,506,040 UART: [fht] FHT @ 0x50003400
3,516,859 UART: [idev] ++
3,517,424 UART: [idev] CDI.KEYID = 6
3,518,386 UART: [idev] SUBJECT.KEYID = 7
3,519,543 UART: [idev] UDS.KEYID = 0
3,543,026 UART: [idev] Erasing UDS.KEYID = 0
6,026,020 UART: [idev] Sha1 KeyId Algorithm
6,049,275 UART: [idev] --
6,053,323 UART: [ldev] ++
6,053,898 UART: [ldev] CDI.KEYID = 6
6,054,784 UART: [ldev] SUBJECT.KEYID = 5
6,056,001 UART: [ldev] AUTHORITY.KEYID = 7
6,057,157 UART: [ldev] FE.KEYID = 1
6,100,607 UART: [ldev] Erasing FE.KEYID = 1
8,606,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,051 UART: [ldev] --
10,413,925 UART: [fwproc] Wait for Commands...
10,416,608 UART: [fwproc] Recv command 0x46574c44
10,418,666 UART: [fwproc] Recv'd Img size: 114448 bytes
10,481,433 UART: ROM Fatal Error: 0x000B0003
10,484,541 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
5,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,245,332 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,511 UART:
192,901 UART: Running Caliptra ROM ...
194,075 UART:
603,678 UART: [state] CFI Enabled
617,797 UART: [state] LifecycleState = Manufacturing
619,691 UART: [state] DebugLocked = No
621,388 UART: [state] WD Timer not started. Device not locked for debugging
624,649 UART: [kat] SHA2-256
803,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,405 UART: [kat] ++
815,931 UART: [kat] sha1
827,839 UART: [kat] SHA2-256
830,832 UART: [kat] SHA2-384
837,516 UART: [kat] SHA2-512-ACC
840,508 UART: [kat] ECC-384
3,280,452 UART: [kat] HMAC-384Kdf
3,293,163 UART: [kat] LMS
3,822,616 UART: [kat] --
3,829,087 UART: [cold-reset] ++
3,830,636 UART: [fht] FHT @ 0x50003400
3,841,344 UART: [idev] ++
3,841,922 UART: [idev] CDI.KEYID = 6
3,842,837 UART: [idev] SUBJECT.KEYID = 7
3,844,050 UART: [idev] UDS.KEYID = 0
3,860,892 UART: [idev] Erasing UDS.KEYID = 0
6,316,566 UART: [idev] Sha1 KeyId Algorithm
6,338,235 UART: [idev] --
6,342,820 UART: [ldev] ++
6,343,383 UART: [ldev] CDI.KEYID = 6
6,344,478 UART: [ldev] SUBJECT.KEYID = 5
6,345,595 UART: [ldev] AUTHORITY.KEYID = 7
6,346,774 UART: [ldev] FE.KEYID = 1
6,355,966 UART: [ldev] Erasing FE.KEYID = 1
8,831,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,552 UART: [ldev] --
10,622,733 UART: [fwproc] Wait for Commands...
10,624,337 UART: [fwproc] Recv command 0x46574c44
10,626,438 UART: [fwproc] Recv'd Img size: 114448 bytes
10,683,838 UART: ROM Fatal Error: 0x000B0003
10,686,981 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,466,192 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Manufacturing
85,551 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,181,269 UART: [idev] Erasing UDS.KEYID = 0
1,198,135 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,782 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,021 UART: ROM Fatal Error: 0x000B0003
1,303,178 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,375 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Manufacturing
86,056 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,858 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,515 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,892 UART: [fwproc] Recv command 0x46574c44
1,283,625 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,712 UART: ROM Fatal Error: 0x000B0003
1,304,869 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,716 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Manufacturing
85,351 UART: [state] DebugLocked = No
85,879 UART: [state] WD Timer not started. Device not locked for debugging
87,060 UART: [kat] SHA2-256
890,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,739 UART: [kat] ++
894,891 UART: [kat] sha1
899,119 UART: [kat] SHA2-256
901,059 UART: [kat] SHA2-384
903,744 UART: [kat] SHA2-512-ACC
905,645 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
919,946 UART: [kat] LMS
1,168,258 UART: [kat] --
1,169,205 UART: [cold-reset] ++
1,169,569 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,181,211 UART: [idev] Erasing UDS.KEYID = 0
1,197,933 UART: [idev] Sha1 KeyId Algorithm
1,206,847 UART: [idev] --
1,207,880 UART: [ldev] ++
1,208,048 UART: [ldev] CDI.KEYID = 6
1,208,412 UART: [ldev] SUBJECT.KEYID = 5
1,208,839 UART: [ldev] AUTHORITY.KEYID = 7
1,209,302 UART: [ldev] FE.KEYID = 1
1,214,258 UART: [ldev] Erasing FE.KEYID = 1
1,240,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,442 UART: [ldev] --
1,279,782 UART: [fwproc] Wait for Commands...
1,280,475 UART: [fwproc] Recv command 0x46574c44
1,281,208 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,509 UART: ROM Fatal Error: 0x000B0003
1,302,666 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,313 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Manufacturing
85,970 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,181,414 UART: [idev] Erasing UDS.KEYID = 0
1,198,390 UART: [idev] Sha1 KeyId Algorithm
1,207,436 UART: [idev] --
1,208,561 UART: [ldev] ++
1,208,729 UART: [ldev] CDI.KEYID = 6
1,209,093 UART: [ldev] SUBJECT.KEYID = 5
1,209,520 UART: [ldev] AUTHORITY.KEYID = 7
1,209,983 UART: [ldev] FE.KEYID = 1
1,214,897 UART: [ldev] Erasing FE.KEYID = 1
1,240,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,943 UART: [ldev] --
1,280,415 UART: [fwproc] Wait for Commands...
1,281,136 UART: [fwproc] Recv command 0x46574c44
1,281,869 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,470 UART: ROM Fatal Error: 0x000B0003
1,303,627 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,157,836 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Manufacturing
85,771 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,415 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,214,898 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,209 UART: [fwproc] Recv command 0x46574c44
1,281,942 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,261 UART: ROM Fatal Error: 0x000B0003
1,303,418 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,281 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Manufacturing
86,088 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,199 UART: [kat] LMS
1,169,511 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,480 UART: [idev] ++
1,173,648 UART: [idev] CDI.KEYID = 6
1,174,009 UART: [idev] SUBJECT.KEYID = 7
1,174,434 UART: [idev] UDS.KEYID = 0
1,182,552 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,079 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,442 UART: ROM Fatal Error: 0x000B0003
1,304,599 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,157,456 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
5,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,406 UART:
192,782 UART: Running Caliptra ROM ...
193,882 UART:
194,024 UART: [state] CFI Enabled
265,099 UART: [state] LifecycleState = Unprovisioned
267,481 UART: [state] DebugLocked = No
270,050 UART: [state] WD Timer not started. Device not locked for debugging
275,333 UART: [kat] SHA2-256
457,220 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,749 UART: [kat] ++
469,335 UART: [kat] sha1
479,289 UART: [kat] SHA2-256
482,307 UART: [kat] SHA2-384
486,453 UART: [kat] SHA2-512-ACC
489,072 UART: [kat] ECC-384
3,769,736 UART: [kat] HMAC-384Kdf
3,795,932 UART: [kat] LMS
4,869,072 UART: [kat] --
4,874,195 UART: [cold-reset] ++
4,876,002 UART: [fht] FHT @ 0x50003400
4,888,149 UART: [idev] ++
4,888,842 UART: [idev] CDI.KEYID = 6
4,890,028 UART: [idev] SUBJECT.KEYID = 7
4,891,187 UART: [idev] UDS.KEYID = 0
4,922,883 UART: [idev] Erasing UDS.KEYID = 0
8,233,690 UART: [idev] Sha1 KeyId Algorithm
8,255,816 UART: [idev] --
8,259,116 UART: [ldev] ++
8,259,680 UART: [ldev] CDI.KEYID = 6
8,260,845 UART: [ldev] SUBJECT.KEYID = 5
8,262,056 UART: [ldev] AUTHORITY.KEYID = 7
8,263,213 UART: [ldev] FE.KEYID = 1
8,310,395 UART: [ldev] Erasing FE.KEYID = 1
11,646,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,974,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,366 UART: [ldev] --
14,033,477 UART: [fwproc] Wait for Commands...
14,035,472 UART: [fwproc] Recv command 0x46574c44
14,037,794 UART: [fwproc] Recv'd Img size: 114124 bytes
18,107,478 UART: ROM Fatal Error: 0x000B0016
18,110,885 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,310 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,916,852 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
6,504 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,449 UART:
192,845 UART: Running Caliptra ROM ...
194,044 UART:
603,544 UART: [state] CFI Enabled
620,557 UART: [state] LifecycleState = Unprovisioned
622,901 UART: [state] DebugLocked = No
625,551 UART: [state] WD Timer not started. Device not locked for debugging
630,536 UART: [kat] SHA2-256
812,477 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
824,034 UART: [kat] ++
824,571 UART: [kat] sha1
835,123 UART: [kat] SHA2-256
838,137 UART: [kat] SHA2-384
843,136 UART: [kat] SHA2-512-ACC
845,805 UART: [kat] ECC-384
4,100,515 UART: [kat] HMAC-384Kdf
4,112,811 UART: [kat] LMS
5,185,962 UART: [kat] --
5,191,184 UART: [cold-reset] ++
5,193,316 UART: [fht] FHT @ 0x50003400
5,205,004 UART: [idev] ++
5,205,682 UART: [idev] CDI.KEYID = 6
5,206,911 UART: [idev] SUBJECT.KEYID = 7
5,208,342 UART: [idev] UDS.KEYID = 0
5,224,801 UART: [idev] Erasing UDS.KEYID = 0
8,498,052 UART: [idev] Sha1 KeyId Algorithm
8,519,884 UART: [idev] --
8,525,273 UART: [ldev] ++
8,525,849 UART: [ldev] CDI.KEYID = 6
8,527,032 UART: [ldev] SUBJECT.KEYID = 5
8,528,527 UART: [ldev] AUTHORITY.KEYID = 7
8,530,082 UART: [ldev] FE.KEYID = 1
8,540,893 UART: [ldev] Erasing FE.KEYID = 1
11,833,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,192 UART: [ldev] --
14,200,071 UART: [fwproc] Wait for Commands...
14,201,626 UART: [fwproc] Recv command 0x46574c44
14,203,910 UART: [fwproc] Recv'd Img size: 114124 bytes
18,270,646 UART: ROM Fatal Error: 0x000B0016
18,274,050 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,167 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,350 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
5,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,208 UART:
192,585 UART: Running Caliptra ROM ...
193,695 UART:
193,844 UART: [state] CFI Enabled
265,305 UART: [state] LifecycleState = Unprovisioned
267,216 UART: [state] DebugLocked = No
268,435 UART: [state] WD Timer not started. Device not locked for debugging
273,035 UART: [kat] SHA2-256
452,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,723 UART: [kat] ++
464,171 UART: [kat] sha1
474,339 UART: [kat] SHA2-256
477,354 UART: [kat] SHA2-384
483,334 UART: [kat] SHA2-512-ACC
486,265 UART: [kat] ECC-384
2,947,583 UART: [kat] HMAC-384Kdf
2,973,059 UART: [kat] LMS
3,502,489 UART: [kat] --
3,507,378 UART: [cold-reset] ++
3,508,508 UART: [fht] FHT @ 0x50003400
3,519,002 UART: [idev] ++
3,519,576 UART: [idev] CDI.KEYID = 6
3,520,485 UART: [idev] SUBJECT.KEYID = 7
3,521,648 UART: [idev] UDS.KEYID = 0
3,543,887 UART: [idev] Erasing UDS.KEYID = 0
6,027,668 UART: [idev] Sha1 KeyId Algorithm
6,050,676 UART: [idev] --
6,054,670 UART: [ldev] ++
6,055,259 UART: [ldev] CDI.KEYID = 6
6,056,172 UART: [ldev] SUBJECT.KEYID = 5
6,057,338 UART: [ldev] AUTHORITY.KEYID = 7
6,058,648 UART: [ldev] FE.KEYID = 1
6,100,513 UART: [ldev] Erasing FE.KEYID = 1
8,599,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,446 UART: [ldev] --
10,392,747 UART: [fwproc] Wait for Commands...
10,394,476 UART: [fwproc] Recv command 0x46574c44
10,396,521 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,452 UART: ROM Fatal Error: 0x000B0016
13,802,583 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
5,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,569,274 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,663 UART:
193,047 UART: Running Caliptra ROM ...
194,123 UART:
603,957 UART: [state] CFI Enabled
619,699 UART: [state] LifecycleState = Unprovisioned
621,523 UART: [state] DebugLocked = No
624,419 UART: [state] WD Timer not started. Device not locked for debugging
627,731 UART: [kat] SHA2-256
806,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,430 UART: [kat] ++
818,957 UART: [kat] sha1
829,351 UART: [kat] SHA2-256
832,414 UART: [kat] SHA2-384
838,720 UART: [kat] SHA2-512-ACC
841,706 UART: [kat] ECC-384
3,284,423 UART: [kat] HMAC-384Kdf
3,297,073 UART: [kat] LMS
3,826,557 UART: [kat] --
3,830,082 UART: [cold-reset] ++
3,831,798 UART: [fht] FHT @ 0x50003400
3,842,648 UART: [idev] ++
3,843,216 UART: [idev] CDI.KEYID = 6
3,844,183 UART: [idev] SUBJECT.KEYID = 7
3,845,355 UART: [idev] UDS.KEYID = 0
3,861,006 UART: [idev] Erasing UDS.KEYID = 0
6,316,285 UART: [idev] Sha1 KeyId Algorithm
6,339,672 UART: [idev] --
6,344,362 UART: [ldev] ++
6,344,926 UART: [ldev] CDI.KEYID = 6
6,345,832 UART: [ldev] SUBJECT.KEYID = 5
6,346,986 UART: [ldev] AUTHORITY.KEYID = 7
6,348,268 UART: [ldev] FE.KEYID = 1
6,360,690 UART: [ldev] Erasing FE.KEYID = 1
8,837,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,562 UART: [ldev] --
10,627,569 UART: [fwproc] Wait for Commands...
10,629,134 UART: [fwproc] Recv command 0x46574c44
10,631,374 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,850 UART: ROM Fatal Error: 0x000B0016
14,033,981 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
6,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,829,556 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
5,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,167 UART:
192,560 UART: Running Caliptra ROM ...
193,678 UART:
193,826 UART: [state] CFI Enabled
264,973 UART: [state] LifecycleState = Unprovisioned
266,833 UART: [state] DebugLocked = No
269,593 UART: [state] WD Timer not started. Device not locked for debugging
272,687 UART: [kat] SHA2-256
451,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,383 UART: [kat] ++
463,830 UART: [kat] sha1
475,519 UART: [kat] SHA2-256
478,521 UART: [kat] SHA2-384
483,366 UART: [kat] SHA2-512-ACC
486,299 UART: [kat] ECC-384
2,947,947 UART: [kat] HMAC-384Kdf
2,971,808 UART: [kat] LMS
3,501,220 UART: [kat] --
3,505,127 UART: [cold-reset] ++
3,505,988 UART: [fht] FHT @ 0x50003400
3,518,269 UART: [idev] ++
3,518,834 UART: [idev] CDI.KEYID = 6
3,519,855 UART: [idev] SUBJECT.KEYID = 7
3,520,957 UART: [idev] UDS.KEYID = 0
3,544,194 UART: [idev] Erasing UDS.KEYID = 0
6,024,576 UART: [idev] Sha1 KeyId Algorithm
6,049,048 UART: [idev] --
6,053,166 UART: [ldev] ++
6,053,746 UART: [ldev] CDI.KEYID = 6
6,054,660 UART: [ldev] SUBJECT.KEYID = 5
6,055,831 UART: [ldev] AUTHORITY.KEYID = 7
6,057,090 UART: [ldev] FE.KEYID = 1
6,099,887 UART: [ldev] Erasing FE.KEYID = 1
8,603,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,004 UART: [ldev] --
10,393,116 UART: [fwproc] Wait for Commands...
10,394,839 UART: [fwproc] Recv command 0x46574c44
10,396,935 UART: [fwproc] Recv'd Img size: 114448 bytes
13,795,194 UART: ROM Fatal Error: 0x000B0016
13,798,345 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,605,618 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
6,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,447 UART:
192,843 UART: Running Caliptra ROM ...
193,912 UART:
603,766 UART: [state] CFI Enabled
619,605 UART: [state] LifecycleState = Unprovisioned
621,461 UART: [state] DebugLocked = No
624,182 UART: [state] WD Timer not started. Device not locked for debugging
628,456 UART: [kat] SHA2-256
807,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,151 UART: [kat] ++
819,594 UART: [kat] sha1
830,088 UART: [kat] SHA2-256
833,151 UART: [kat] SHA2-384
837,882 UART: [kat] SHA2-512-ACC
840,815 UART: [kat] ECC-384
3,281,625 UART: [kat] HMAC-384Kdf
3,294,090 UART: [kat] LMS
3,823,609 UART: [kat] --
3,830,407 UART: [cold-reset] ++
3,832,873 UART: [fht] FHT @ 0x50003400
3,844,336 UART: [idev] ++
3,844,901 UART: [idev] CDI.KEYID = 6
3,845,894 UART: [idev] SUBJECT.KEYID = 7
3,847,054 UART: [idev] UDS.KEYID = 0
3,862,599 UART: [idev] Erasing UDS.KEYID = 0
6,323,182 UART: [idev] Sha1 KeyId Algorithm
6,345,273 UART: [idev] --
6,350,665 UART: [ldev] ++
6,351,228 UART: [ldev] CDI.KEYID = 6
6,352,104 UART: [ldev] SUBJECT.KEYID = 5
6,353,262 UART: [ldev] AUTHORITY.KEYID = 7
6,354,542 UART: [ldev] FE.KEYID = 1
6,367,484 UART: [ldev] Erasing FE.KEYID = 1
8,838,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,526 UART: [ldev] --
10,628,668 UART: [fwproc] Wait for Commands...
10,631,145 UART: [fwproc] Recv command 0x46574c44
10,633,247 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,552 UART: ROM Fatal Error: 0x000B0016
14,040,695 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
6,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,818,055 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,313 UART: [fwproc] Recv command 0x46574c44
1,283,046 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,559 UART: ROM Fatal Error: 0x000B0016
2,582,716 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,361 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,574 UART: [idev] Sha1 KeyId Algorithm
1,207,530 UART: [idev] --
1,208,603 UART: [ldev] ++
1,208,771 UART: [ldev] CDI.KEYID = 6
1,209,135 UART: [ldev] SUBJECT.KEYID = 5
1,209,562 UART: [ldev] AUTHORITY.KEYID = 7
1,210,025 UART: [ldev] FE.KEYID = 1
1,215,495 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,854 UART: ROM Fatal Error: 0x000B0016
2,581,011 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,562 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,783 UART: [state] WD Timer not started. Device not locked for debugging
86,944 UART: [kat] SHA2-256
890,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,623 UART: [kat] ++
894,775 UART: [kat] sha1
898,927 UART: [kat] SHA2-256
900,867 UART: [kat] SHA2-384
903,794 UART: [kat] SHA2-512-ACC
905,695 UART: [kat] ECC-384
915,320 UART: [kat] HMAC-384Kdf
919,806 UART: [kat] LMS
1,168,118 UART: [kat] --
1,168,931 UART: [cold-reset] ++
1,169,445 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,181,233 UART: [idev] Erasing UDS.KEYID = 0
1,197,605 UART: [idev] Sha1 KeyId Algorithm
1,206,403 UART: [idev] --
1,207,412 UART: [ldev] ++
1,207,580 UART: [ldev] CDI.KEYID = 6
1,207,944 UART: [ldev] SUBJECT.KEYID = 5
1,208,371 UART: [ldev] AUTHORITY.KEYID = 7
1,208,834 UART: [ldev] FE.KEYID = 1
1,213,860 UART: [ldev] Erasing FE.KEYID = 1
1,240,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,664 UART: [ldev] --
1,280,010 UART: [fwproc] Wait for Commands...
1,280,583 UART: [fwproc] Recv command 0x46574c44
1,281,316 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,711 UART: ROM Fatal Error: 0x000B0016
2,580,868 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,535 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,066 UART: [kat] ++
896,218 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,040 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,384 UART: [fwproc] Recv command 0x46574c44
1,283,117 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,812 UART: ROM Fatal Error: 0x000B0016
2,581,969 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,850 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,543 UART: [fwproc] Recv command 0x46574c44
1,282,276 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,261 UART: ROM Fatal Error: 0x000B0016
2,580,418 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,037 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,949 UART: [ldev] ++
1,209,117 UART: [ldev] CDI.KEYID = 6
1,209,481 UART: [ldev] SUBJECT.KEYID = 5
1,209,908 UART: [ldev] AUTHORITY.KEYID = 7
1,210,371 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,645 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,936 UART: ROM Fatal Error: 0x000B0016
2,582,093 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,442 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,021,299 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,673 UART:
2,166,096 UART: Running Caliptra ROM ...
2,167,268 UART:
2,167,441 UART: [state] CFI Enabled
2,168,332 UART: [state] LifecycleState = Unprovisioned
2,169,979 UART: [state] DebugLocked = No
2,171,001 UART: [state] WD Timer not started. Device not locked for debugging
2,173,475 UART: [kat] SHA2-256
2,174,141 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,154 UART: [kat] ++
2,177,600 UART: [kat] sha1
2,178,106 UART: [kat] SHA2-256
2,178,760 UART: [kat] SHA2-384
2,179,452 UART: [kat] SHA2-512-ACC
2,180,298 UART: [kat] ECC-384
3,776,784 UART: [kat] HMAC-384Kdf
3,796,086 UART: [kat] LMS
4,869,219 UART: [kat] --
4,873,560 UART: [cold-reset] ++
4,875,063 UART: [fht] FHT @ 0x50003400
4,886,201 UART: [idev] ++
4,886,874 UART: [idev] CDI.KEYID = 6
4,888,103 UART: [idev] SUBJECT.KEYID = 7
4,889,259 UART: [idev] UDS.KEYID = 0
4,923,113 UART: [idev] Erasing UDS.KEYID = 0
8,234,675 UART: [idev] Sha1 KeyId Algorithm
8,257,926 UART: [idev] --
8,262,728 UART: [ldev] ++
8,263,294 UART: [ldev] CDI.KEYID = 6
8,264,461 UART: [ldev] SUBJECT.KEYID = 5
8,265,674 UART: [ldev] AUTHORITY.KEYID = 7
8,266,823 UART: [ldev] FE.KEYID = 1
8,311,522 UART: [ldev] Erasing FE.KEYID = 1
11,646,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,026,241 UART: [ldev] --
14,030,044 UART: [fwproc] Wait for Commands...
14,031,769 UART: [fwproc] Recv command 0x46574c44
14,034,036 UART: [fwproc] Recv'd Img size: 114124 bytes
18,109,021 UART: ROM Fatal Error: 0x000B002B
18,112,390 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,020,066 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,927,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,021,858 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,066 UART:
2,166,471 UART: Running Caliptra ROM ...
2,167,642 UART:
2,167,814 UART: [state] CFI Enabled
2,168,774 UART: [state] LifecycleState = Unprovisioned
2,170,413 UART: [state] DebugLocked = No
2,171,438 UART: [state] WD Timer not started. Device not locked for debugging
2,173,899 UART: [kat] SHA2-256
2,174,565 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,574 UART: [kat] ++
2,178,022 UART: [kat] sha1
2,178,531 UART: [kat] SHA2-256
2,179,263 UART: [kat] SHA2-384
2,179,925 UART: [kat] SHA2-512-ACC
2,180,795 UART: [kat] ECC-384
4,097,799 UART: [kat] HMAC-384Kdf
4,110,782 UART: [kat] LMS
5,183,918 UART: [kat] --
5,188,211 UART: [cold-reset] ++
5,189,824 UART: [fht] FHT @ 0x50003400
5,200,646 UART: [idev] ++
5,201,321 UART: [idev] CDI.KEYID = 6
5,202,482 UART: [idev] SUBJECT.KEYID = 7
5,203,959 UART: [idev] UDS.KEYID = 0
5,223,365 UART: [idev] Erasing UDS.KEYID = 0
8,495,538 UART: [idev] Sha1 KeyId Algorithm
8,517,705 UART: [idev] --
8,521,701 UART: [ldev] ++
8,522,268 UART: [ldev] CDI.KEYID = 6
8,523,505 UART: [ldev] SUBJECT.KEYID = 5
8,524,938 UART: [ldev] AUTHORITY.KEYID = 7
8,526,516 UART: [ldev] FE.KEYID = 1
8,540,077 UART: [ldev] Erasing FE.KEYID = 1
11,827,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,832 UART: [ldev] --
14,190,955 UART: [fwproc] Wait for Commands...
14,194,124 UART: [fwproc] Recv command 0x46574c44
14,196,386 UART: [fwproc] Recv'd Img size: 114124 bytes
18,264,389 UART: ROM Fatal Error: 0x000B002B
18,267,825 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,022,763 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,713 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,021,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,977 UART:
2,167,395 UART: Running Caliptra ROM ...
2,168,570 UART:
2,168,781 UART: [state] CFI Enabled
2,169,760 UART: [state] LifecycleState = Unprovisioned
2,171,406 UART: [state] DebugLocked = No
2,172,517 UART: [state] WD Timer not started. Device not locked for debugging
2,174,995 UART: [kat] SHA2-256
2,175,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,673 UART: [kat] ++
2,179,125 UART: [kat] sha1
2,179,639 UART: [kat] SHA2-256
2,180,380 UART: [kat] SHA2-384
2,181,050 UART: [kat] SHA2-512-ACC
2,181,937 UART: [kat] ECC-384
2,948,425 UART: [kat] HMAC-384Kdf
2,972,208 UART: [kat] LMS
3,501,662 UART: [kat] --
3,503,562 UART: [cold-reset] ++
3,506,112 UART: [fht] FHT @ 0x50003400
3,515,696 UART: [idev] ++
3,516,267 UART: [idev] CDI.KEYID = 6
3,517,192 UART: [idev] SUBJECT.KEYID = 7
3,518,301 UART: [idev] UDS.KEYID = 0
3,546,747 UART: [idev] Erasing UDS.KEYID = 0
6,030,778 UART: [idev] Sha1 KeyId Algorithm
6,054,292 UART: [idev] --
6,057,539 UART: [ldev] ++
6,058,112 UART: [ldev] CDI.KEYID = 6
6,059,027 UART: [ldev] SUBJECT.KEYID = 5
6,060,251 UART: [ldev] AUTHORITY.KEYID = 7
6,061,487 UART: [ldev] FE.KEYID = 1
6,102,387 UART: [ldev] Erasing FE.KEYID = 1
8,605,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,996 UART: [ldev] --
10,416,699 UART: [fwproc] Wait for Commands...
10,418,754 UART: [fwproc] Recv command 0x46574c44
10,420,858 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,726 UART: ROM Fatal Error: 0x000B002B
13,820,866 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,021,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,637,778 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
2,022,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,141 UART:
2,167,552 UART: Running Caliptra ROM ...
2,168,663 UART:
2,168,827 UART: [state] CFI Enabled
2,169,704 UART: [state] LifecycleState = Unprovisioned
2,171,372 UART: [state] DebugLocked = No
2,172,429 UART: [state] WD Timer not started. Device not locked for debugging
2,174,913 UART: [kat] SHA2-256
2,175,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,603 UART: [kat] ++
2,179,054 UART: [kat] sha1
2,179,614 UART: [kat] SHA2-256
2,180,276 UART: [kat] SHA2-384
2,180,932 UART: [kat] SHA2-512-ACC
2,181,757 UART: [kat] ECC-384
3,283,725 UART: [kat] HMAC-384Kdf
3,296,445 UART: [kat] LMS
3,825,954 UART: [kat] --
3,831,615 UART: [cold-reset] ++
3,832,732 UART: [fht] FHT @ 0x50003400
3,843,062 UART: [idev] ++
3,843,650 UART: [idev] CDI.KEYID = 6
3,844,558 UART: [idev] SUBJECT.KEYID = 7
3,845,768 UART: [idev] UDS.KEYID = 0
3,860,609 UART: [idev] Erasing UDS.KEYID = 0
6,318,026 UART: [idev] Sha1 KeyId Algorithm
6,340,294 UART: [idev] --
6,344,344 UART: [ldev] ++
6,344,912 UART: [ldev] CDI.KEYID = 6
6,345,819 UART: [ldev] SUBJECT.KEYID = 5
6,347,029 UART: [ldev] AUTHORITY.KEYID = 7
6,348,261 UART: [ldev] FE.KEYID = 1
6,359,975 UART: [ldev] Erasing FE.KEYID = 1
8,830,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,374 UART: [ldev] --
10,618,514 UART: [fwproc] Wait for Commands...
10,620,401 UART: [fwproc] Recv command 0x46574c44
10,622,497 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,230 UART: ROM Fatal Error: 0x000B002B
14,028,369 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,021,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,805,831 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,022,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,042 UART:
2,167,447 UART: Running Caliptra ROM ...
2,168,617 UART:
2,168,785 UART: [state] CFI Enabled
2,169,746 UART: [state] LifecycleState = Unprovisioned
2,171,391 UART: [state] DebugLocked = No
2,172,500 UART: [state] WD Timer not started. Device not locked for debugging
2,175,009 UART: [kat] SHA2-256
2,175,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,697 UART: [kat] ++
2,179,145 UART: [kat] sha1
2,179,657 UART: [kat] SHA2-256
2,180,397 UART: [kat] SHA2-384
2,181,061 UART: [kat] SHA2-512-ACC
2,181,869 UART: [kat] ECC-384
2,963,381 UART: [kat] HMAC-384Kdf
2,986,266 UART: [kat] LMS
3,515,724 UART: [kat] --
3,520,649 UART: [cold-reset] ++
3,521,611 UART: [fht] FHT @ 0x50003400
3,532,487 UART: [idev] ++
3,533,052 UART: [idev] CDI.KEYID = 6
3,533,974 UART: [idev] SUBJECT.KEYID = 7
3,535,213 UART: [idev] UDS.KEYID = 0
3,558,535 UART: [idev] Erasing UDS.KEYID = 0
6,039,744 UART: [idev] Sha1 KeyId Algorithm
6,063,681 UART: [idev] --
6,068,415 UART: [ldev] ++
6,069,001 UART: [ldev] CDI.KEYID = 6
6,069,920 UART: [ldev] SUBJECT.KEYID = 5
6,071,085 UART: [ldev] AUTHORITY.KEYID = 7
6,072,379 UART: [ldev] FE.KEYID = 1
6,113,550 UART: [ldev] Erasing FE.KEYID = 1
8,614,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,318 UART: [ldev] --
10,427,469 UART: [fwproc] Wait for Commands...
10,429,573 UART: [fwproc] Recv command 0x46574c44
10,431,673 UART: [fwproc] Recv'd Img size: 114448 bytes
13,830,732 UART: ROM Fatal Error: 0x000B002B
13,833,867 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,021,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,589,856 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,022,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,074 UART:
2,167,468 UART: Running Caliptra ROM ...
2,168,555 UART:
2,168,705 UART: [state] CFI Enabled
2,169,574 UART: [state] LifecycleState = Unprovisioned
2,171,220 UART: [state] DebugLocked = No
2,172,241 UART: [state] WD Timer not started. Device not locked for debugging
2,174,744 UART: [kat] SHA2-256
2,175,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,425 UART: [kat] ++
2,178,873 UART: [kat] sha1
2,179,382 UART: [kat] SHA2-256
2,180,038 UART: [kat] SHA2-384
2,180,694 UART: [kat] SHA2-512-ACC
2,181,579 UART: [kat] ECC-384
3,277,502 UART: [kat] HMAC-384Kdf
3,290,314 UART: [kat] LMS
3,819,824 UART: [kat] --
3,824,145 UART: [cold-reset] ++
3,826,356 UART: [fht] FHT @ 0x50003400
3,836,307 UART: [idev] ++
3,836,867 UART: [idev] CDI.KEYID = 6
3,837,788 UART: [idev] SUBJECT.KEYID = 7
3,838,967 UART: [idev] UDS.KEYID = 0
3,853,220 UART: [idev] Erasing UDS.KEYID = 0
6,312,689 UART: [idev] Sha1 KeyId Algorithm
6,334,897 UART: [idev] --
6,338,548 UART: [ldev] ++
6,339,126 UART: [ldev] CDI.KEYID = 6
6,340,050 UART: [ldev] SUBJECT.KEYID = 5
6,341,218 UART: [ldev] AUTHORITY.KEYID = 7
6,342,444 UART: [ldev] FE.KEYID = 1
6,352,656 UART: [ldev] Erasing FE.KEYID = 1
8,827,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,119 UART: [ldev] --
10,617,289 UART: [fwproc] Wait for Commands...
10,619,283 UART: [fwproc] Recv command 0x46574c44
10,621,379 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,171 UART: ROM Fatal Error: 0x000B002B
14,030,300 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,020,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,825,964 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,764 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,711 UART: [cold-reset] ++
1,171,227 UART: [fht] FHT @ 0x50003400
1,173,961 UART: [idev] ++
1,174,129 UART: [idev] CDI.KEYID = 6
1,174,490 UART: [idev] SUBJECT.KEYID = 7
1,174,915 UART: [idev] UDS.KEYID = 0
1,183,003 UART: [idev] Erasing UDS.KEYID = 0
1,199,833 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,816 UART: [fwproc] Wait for Commands...
1,281,457 UART: [fwproc] Recv command 0x46574c44
1,282,190 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,628 UART: ROM Fatal Error: 0x000B002B
2,580,787 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,810 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,938 UART: [kat] ++
896,090 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,182,544 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,601 UART: [fwproc] Wait for Commands...
1,283,424 UART: [fwproc] Recv command 0x46574c44
1,284,157 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,051 UART: ROM Fatal Error: 0x000B002B
2,583,210 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,657 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,038 UART: [kat] HMAC-384Kdf
919,842 UART: [kat] LMS
1,168,154 UART: [kat] --
1,168,835 UART: [cold-reset] ++
1,169,383 UART: [fht] FHT @ 0x50003400
1,171,973 UART: [idev] ++
1,172,141 UART: [idev] CDI.KEYID = 6
1,172,502 UART: [idev] SUBJECT.KEYID = 7
1,172,927 UART: [idev] UDS.KEYID = 0
1,180,549 UART: [idev] Erasing UDS.KEYID = 0
1,197,491 UART: [idev] Sha1 KeyId Algorithm
1,206,447 UART: [idev] --
1,207,478 UART: [ldev] ++
1,207,646 UART: [ldev] CDI.KEYID = 6
1,208,010 UART: [ldev] SUBJECT.KEYID = 5
1,208,437 UART: [ldev] AUTHORITY.KEYID = 7
1,208,900 UART: [ldev] FE.KEYID = 1
1,213,876 UART: [ldev] Erasing FE.KEYID = 1
1,240,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,144 UART: [ldev] --
1,279,590 UART: [fwproc] Wait for Commands...
1,280,401 UART: [fwproc] Recv command 0x46574c44
1,281,134 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,780 UART: ROM Fatal Error: 0x000B002B
2,579,939 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,094 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,713 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,171,058 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,200,312 UART: [idev] Sha1 KeyId Algorithm
1,209,304 UART: [idev] --
1,210,297 UART: [ldev] ++
1,210,465 UART: [ldev] CDI.KEYID = 6
1,210,829 UART: [ldev] SUBJECT.KEYID = 5
1,211,256 UART: [ldev] AUTHORITY.KEYID = 7
1,211,719 UART: [ldev] FE.KEYID = 1
1,216,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,282,987 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,463 UART: ROM Fatal Error: 0x000B002B
2,582,622 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,591 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,199,469 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,356 UART: [ldev] ++
1,209,524 UART: [ldev] CDI.KEYID = 6
1,209,888 UART: [ldev] SUBJECT.KEYID = 5
1,210,315 UART: [ldev] AUTHORITY.KEYID = 7
1,210,778 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,446 UART: [ldev] --
1,281,910 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,830 UART: ROM Fatal Error: 0x000B002B
2,582,989 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,042 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
915,519 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,440 UART: [cold-reset] ++
1,169,920 UART: [fht] FHT @ 0x50003400
1,172,508 UART: [idev] ++
1,172,676 UART: [idev] CDI.KEYID = 6
1,173,037 UART: [idev] SUBJECT.KEYID = 7
1,173,462 UART: [idev] UDS.KEYID = 0
1,181,708 UART: [idev] Erasing UDS.KEYID = 0
1,198,720 UART: [idev] Sha1 KeyId Algorithm
1,207,572 UART: [idev] --
1,208,829 UART: [ldev] ++
1,208,997 UART: [ldev] CDI.KEYID = 6
1,209,361 UART: [ldev] SUBJECT.KEYID = 5
1,209,788 UART: [ldev] AUTHORITY.KEYID = 7
1,210,251 UART: [ldev] FE.KEYID = 1
1,215,613 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,870 UART: [fwproc] Recv command 0x46574c44
1,282,603 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,383 UART: ROM Fatal Error: 0x000B002B
2,582,542 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,709 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,021,045 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,127 UART:
2,165,518 UART: Running Caliptra ROM ...
2,166,688 UART:
2,166,858 UART: [state] CFI Enabled
2,167,835 UART: [state] LifecycleState = Unprovisioned
2,169,394 UART: [state] DebugLocked = No
2,170,476 UART: [state] WD Timer not started. Device not locked for debugging
2,172,947 UART: [kat] SHA2-256
2,173,631 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,640 UART: [kat] ++
2,177,088 UART: [kat] sha1
2,177,817 UART: [kat] SHA2-256
2,178,490 UART: [kat] SHA2-384
2,179,149 UART: [kat] SHA2-512-ACC
2,180,049 UART: [kat] ECC-384
3,777,035 UART: [kat] HMAC-384Kdf
3,803,277 UART: [kat] LMS
4,876,437 UART: [kat] --
4,882,082 UART: [cold-reset] ++
4,884,293 UART: [fht] FHT @ 0x50003400
4,895,540 UART: [idev] ++
4,896,218 UART: [idev] CDI.KEYID = 6
4,897,396 UART: [idev] SUBJECT.KEYID = 7
4,898,623 UART: [idev] UDS.KEYID = 0
4,929,648 UART: [idev] Erasing UDS.KEYID = 0
8,241,582 UART: [idev] Sha1 KeyId Algorithm
8,263,445 UART: [idev] --
8,266,662 UART: [ldev] ++
8,267,244 UART: [ldev] CDI.KEYID = 6
8,268,410 UART: [ldev] SUBJECT.KEYID = 5
8,269,627 UART: [ldev] AUTHORITY.KEYID = 7
8,270,777 UART: [ldev] FE.KEYID = 1
8,318,716 UART: [ldev] Erasing FE.KEYID = 1
11,649,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,724 UART: [ldev] --
14,016,334 UART: [fwproc] Wait for Commands...
14,019,477 UART: [fwproc] Recv command 0x46574c44
14,021,778 UART: [fwproc] Recv'd Img size: 114124 bytes
18,088,170 UART: ROM Fatal Error: 0x000B002A
18,091,585 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,019,954 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,885,591 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,020,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,779 UART:
2,165,196 UART: Running Caliptra ROM ...
2,166,276 UART:
2,166,426 UART: [state] CFI Enabled
2,167,402 UART: [state] LifecycleState = Unprovisioned
2,169,044 UART: [state] DebugLocked = No
2,170,068 UART: [state] WD Timer not started. Device not locked for debugging
2,172,755 UART: [kat] SHA2-256
2,173,427 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,438 UART: [kat] ++
2,176,883 UART: [kat] sha1
2,177,387 UART: [kat] SHA2-256
2,178,120 UART: [kat] SHA2-384
2,178,779 UART: [kat] SHA2-512-ACC
2,179,633 UART: [kat] ECC-384
4,098,709 UART: [kat] HMAC-384Kdf
4,111,782 UART: [kat] LMS
5,184,984 UART: [kat] --
5,189,426 UART: [cold-reset] ++
5,190,821 UART: [fht] FHT @ 0x50003400
5,202,560 UART: [idev] ++
5,203,225 UART: [idev] CDI.KEYID = 6
5,204,385 UART: [idev] SUBJECT.KEYID = 7
5,205,862 UART: [idev] UDS.KEYID = 0
5,221,987 UART: [idev] Erasing UDS.KEYID = 0
8,493,672 UART: [idev] Sha1 KeyId Algorithm
8,514,842 UART: [idev] --
8,519,430 UART: [ldev] ++
8,519,991 UART: [ldev] CDI.KEYID = 6
8,521,226 UART: [ldev] SUBJECT.KEYID = 5
8,522,740 UART: [ldev] AUTHORITY.KEYID = 7
8,524,258 UART: [ldev] FE.KEYID = 1
8,537,608 UART: [ldev] Erasing FE.KEYID = 1
11,826,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,388 UART: [ldev] --
14,191,529 UART: [fwproc] Wait for Commands...
14,193,785 UART: [fwproc] Recv command 0x46574c44
14,196,108 UART: [fwproc] Recv'd Img size: 114124 bytes
18,267,128 UART: ROM Fatal Error: 0x000B002A
18,270,542 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,022,901 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,625 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,027,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,318 UART:
2,171,720 UART: Running Caliptra ROM ...
2,172,803 UART:
2,172,964 UART: [state] CFI Enabled
2,173,938 UART: [state] LifecycleState = Unprovisioned
2,175,796 UART: [state] DebugLocked = No
2,176,832 UART: [state] WD Timer not started. Device not locked for debugging
2,179,307 UART: [kat] SHA2-256
2,179,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,990 UART: [kat] ++
2,183,443 UART: [kat] sha1
2,183,956 UART: [kat] SHA2-256
2,184,613 UART: [kat] SHA2-384
2,185,266 UART: [kat] SHA2-512-ACC
2,186,098 UART: [kat] ECC-384
2,950,829 UART: [kat] HMAC-384Kdf
2,973,363 UART: [kat] LMS
3,502,806 UART: [kat] --
3,507,174 UART: [cold-reset] ++
3,508,297 UART: [fht] FHT @ 0x50003400
3,518,683 UART: [idev] ++
3,519,249 UART: [idev] CDI.KEYID = 6
3,520,158 UART: [idev] SUBJECT.KEYID = 7
3,521,374 UART: [idev] UDS.KEYID = 0
3,544,854 UART: [idev] Erasing UDS.KEYID = 0
6,025,385 UART: [idev] Sha1 KeyId Algorithm
6,048,246 UART: [idev] --
6,052,844 UART: [ldev] ++
6,053,416 UART: [ldev] CDI.KEYID = 6
6,054,327 UART: [ldev] SUBJECT.KEYID = 5
6,055,493 UART: [ldev] AUTHORITY.KEYID = 7
6,056,735 UART: [ldev] FE.KEYID = 1
6,101,746 UART: [ldev] Erasing FE.KEYID = 1
8,609,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,841 UART: [ldev] --
10,413,700 UART: [fwproc] Wait for Commands...
10,415,593 UART: [fwproc] Recv command 0x46574c44
10,417,753 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,871 UART: ROM Fatal Error: 0x000B002A
13,819,009 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,023,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,596,390 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,021,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,904 UART:
2,166,310 UART: Running Caliptra ROM ...
2,167,474 UART:
2,167,645 UART: [state] CFI Enabled
2,168,614 UART: [state] LifecycleState = Unprovisioned
2,170,259 UART: [state] DebugLocked = No
2,171,387 UART: [state] WD Timer not started. Device not locked for debugging
2,174,091 UART: [kat] SHA2-256
2,174,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,808 UART: [kat] ++
2,178,260 UART: [kat] sha1
2,178,778 UART: [kat] SHA2-256
2,179,434 UART: [kat] SHA2-384
2,180,115 UART: [kat] SHA2-512-ACC
2,180,916 UART: [kat] ECC-384
3,282,518 UART: [kat] HMAC-384Kdf
3,294,465 UART: [kat] LMS
3,823,937 UART: [kat] --
3,829,758 UART: [cold-reset] ++
3,830,821 UART: [fht] FHT @ 0x50003400
3,841,292 UART: [idev] ++
3,841,855 UART: [idev] CDI.KEYID = 6
3,842,756 UART: [idev] SUBJECT.KEYID = 7
3,843,970 UART: [idev] UDS.KEYID = 0
3,858,836 UART: [idev] Erasing UDS.KEYID = 0
6,314,794 UART: [idev] Sha1 KeyId Algorithm
6,337,202 UART: [idev] --
6,341,011 UART: [ldev] ++
6,341,588 UART: [ldev] CDI.KEYID = 6
6,342,500 UART: [ldev] SUBJECT.KEYID = 5
6,343,657 UART: [ldev] AUTHORITY.KEYID = 7
6,344,942 UART: [ldev] FE.KEYID = 1
6,356,610 UART: [ldev] Erasing FE.KEYID = 1
8,831,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,046 UART: [ldev] --
10,622,585 UART: [fwproc] Wait for Commands...
10,625,170 UART: [fwproc] Recv command 0x46574c44
10,627,212 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,026 UART: ROM Fatal Error: 0x000B002A
14,027,156 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,022,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,812,631 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,027,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,844 UART:
2,172,435 UART: Running Caliptra ROM ...
2,173,544 UART:
2,173,708 UART: [state] CFI Enabled
2,174,647 UART: [state] LifecycleState = Unprovisioned
2,176,306 UART: [state] DebugLocked = No
2,177,417 UART: [state] WD Timer not started. Device not locked for debugging
2,179,911 UART: [kat] SHA2-256
2,180,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,594 UART: [kat] ++
2,184,045 UART: [kat] sha1
2,184,647 UART: [kat] SHA2-256
2,185,313 UART: [kat] SHA2-384
2,185,971 UART: [kat] SHA2-512-ACC
2,186,793 UART: [kat] ECC-384
2,945,866 UART: [kat] HMAC-384Kdf
2,971,052 UART: [kat] LMS
3,500,509 UART: [kat] --
3,503,260 UART: [cold-reset] ++
3,504,706 UART: [fht] FHT @ 0x50003400
3,514,822 UART: [idev] ++
3,515,392 UART: [idev] CDI.KEYID = 6
3,516,333 UART: [idev] SUBJECT.KEYID = 7
3,517,550 UART: [idev] UDS.KEYID = 0
3,545,168 UART: [idev] Erasing UDS.KEYID = 0
6,028,002 UART: [idev] Sha1 KeyId Algorithm
6,050,861 UART: [idev] --
6,053,490 UART: [ldev] ++
6,054,075 UART: [ldev] CDI.KEYID = 6
6,054,967 UART: [ldev] SUBJECT.KEYID = 5
6,056,105 UART: [ldev] AUTHORITY.KEYID = 7
6,057,454 UART: [ldev] FE.KEYID = 1
6,101,018 UART: [ldev] Erasing FE.KEYID = 1
8,604,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,162 UART: [ldev] --
10,414,215 UART: [fwproc] Wait for Commands...
10,417,337 UART: [fwproc] Recv command 0x46574c44
10,419,381 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,338 UART: ROM Fatal Error: 0x000B002A
13,824,472 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,040,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,610,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
2,022,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,239 UART:
2,167,666 UART: Running Caliptra ROM ...
2,168,747 UART:
2,168,904 UART: [state] CFI Enabled
2,169,872 UART: [state] LifecycleState = Unprovisioned
2,171,518 UART: [state] DebugLocked = No
2,172,545 UART: [state] WD Timer not started. Device not locked for debugging
2,175,016 UART: [kat] SHA2-256
2,175,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,692 UART: [kat] ++
2,179,140 UART: [kat] sha1
2,179,650 UART: [kat] SHA2-256
2,180,308 UART: [kat] SHA2-384
2,180,965 UART: [kat] SHA2-512-ACC
2,181,793 UART: [kat] ECC-384
3,285,381 UART: [kat] HMAC-384Kdf
3,297,765 UART: [kat] LMS
3,827,240 UART: [kat] --
3,831,938 UART: [cold-reset] ++
3,833,651 UART: [fht] FHT @ 0x50003400
3,845,924 UART: [idev] ++
3,846,491 UART: [idev] CDI.KEYID = 6
3,847,423 UART: [idev] SUBJECT.KEYID = 7
3,848,631 UART: [idev] UDS.KEYID = 0
3,865,612 UART: [idev] Erasing UDS.KEYID = 0
6,326,441 UART: [idev] Sha1 KeyId Algorithm
6,349,782 UART: [idev] --
6,353,826 UART: [ldev] ++
6,354,392 UART: [ldev] CDI.KEYID = 6
6,355,328 UART: [ldev] SUBJECT.KEYID = 5
6,356,537 UART: [ldev] AUTHORITY.KEYID = 7
6,357,766 UART: [ldev] FE.KEYID = 1
6,369,531 UART: [ldev] Erasing FE.KEYID = 1
8,839,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,875 UART: [ldev] --
10,630,634 UART: [fwproc] Wait for Commands...
10,632,464 UART: [fwproc] Recv command 0x46574c44
10,634,558 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,626 UART: ROM Fatal Error: 0x000B002A
14,039,700 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,023,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,824,775 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,251 UART: [fwproc] Recv command 0x46574c44
1,281,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,042 UART: ROM Fatal Error: 0x000B002A
2,580,201 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,902 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,997 UART: [state] LifecycleState = Unprovisioned
86,652 UART: [state] DebugLocked = No
87,368 UART: [state] WD Timer not started. Device not locked for debugging
88,635 UART: [kat] SHA2-256
892,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,314 UART: [kat] ++
896,466 UART: [kat] sha1
900,596 UART: [kat] SHA2-256
902,536 UART: [kat] SHA2-384
905,095 UART: [kat] SHA2-512-ACC
906,996 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,282,043 UART: [fwproc] Wait for Commands...
1,282,842 UART: [fwproc] Recv command 0x46574c44
1,283,575 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,595 UART: ROM Fatal Error: 0x000B002A
2,583,754 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,787 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,232 UART: [kat] LMS
1,169,544 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,662 UART: [ldev] ++
1,208,830 UART: [ldev] CDI.KEYID = 6
1,209,194 UART: [ldev] SUBJECT.KEYID = 5
1,209,621 UART: [ldev] AUTHORITY.KEYID = 7
1,210,084 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,118 UART: [ldev] --
1,280,392 UART: [fwproc] Wait for Commands...
1,281,001 UART: [fwproc] Recv command 0x46574c44
1,281,734 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,580 UART: ROM Fatal Error: 0x000B002A
2,581,739 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,526 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
891,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,998 UART: [kat] ++
896,150 UART: [kat] sha1
900,346 UART: [kat] SHA2-256
902,286 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,020 UART: [idev] Sha1 KeyId Algorithm
1,208,886 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,805 UART: ROM Fatal Error: 0x000B002A
2,583,964 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,237 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,083 UART: [kat] SHA2-256
902,023 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,067 UART: [idev] Erasing UDS.KEYID = 0
1,199,311 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,496 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,717 UART: [fwproc] Recv command 0x46574c44
1,282,450 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,363 UART: ROM Fatal Error: 0x000B002A
2,582,522 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,462 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,687 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,159 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,208 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,831 UART: ROM Fatal Error: 0x000B002A
2,583,990 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,245 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
2,020,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,268 UART:
2,164,653 UART: Running Caliptra ROM ...
2,165,739 UART:
2,165,889 UART: [state] CFI Enabled
2,167,084 UART: [state] LifecycleState = Unprovisioned
2,168,755 UART: [state] DebugLocked = No
2,169,785 UART: [state] WD Timer not started. Device not locked for debugging
2,172,254 UART: [kat] SHA2-256
2,172,924 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,956 UART: [kat] ++
2,176,406 UART: [kat] sha1
2,176,918 UART: [kat] SHA2-256
2,177,579 UART: [kat] SHA2-384
2,178,265 UART: [kat] SHA2-512-ACC
2,179,098 UART: [kat] ECC-384
3,776,340 UART: [kat] HMAC-384Kdf
3,802,895 UART: [kat] LMS
4,876,032 UART: [kat] --
4,880,790 UART: [cold-reset] ++
4,882,622 UART: [fht] FHT @ 0x50003400
4,893,130 UART: [idev] ++
4,893,842 UART: [idev] CDI.KEYID = 6
4,895,030 UART: [idev] SUBJECT.KEYID = 7
4,896,143 UART: [idev] UDS.KEYID = 0
4,929,890 UART: [idev] Erasing UDS.KEYID = 0
8,241,950 UART: [idev] Sha1 KeyId Algorithm
8,263,649 UART: [idev] --
8,268,380 UART: [ldev] ++
8,268,951 UART: [ldev] CDI.KEYID = 6
8,270,118 UART: [ldev] SUBJECT.KEYID = 5
8,271,341 UART: [ldev] AUTHORITY.KEYID = 7
8,272,495 UART: [ldev] FE.KEYID = 1
8,318,542 UART: [ldev] Erasing FE.KEYID = 1
11,651,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,606 UART: [ldev] --
14,039,499 UART: [fwproc] Wait for Commands...
14,042,572 UART: [fwproc] Recv command 0x46574c44
14,044,873 UART: [fwproc] Recv'd Img size: 114124 bytes
18,116,833 UART: ROM Fatal Error: 0x000B002A
18,120,249 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,018,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,893,334 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
2,022,463 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,128 UART:
2,168,555 UART: Running Caliptra ROM ...
2,169,746 UART:
2,169,914 UART: [state] CFI Enabled
2,170,888 UART: [state] LifecycleState = Unprovisioned
2,172,533 UART: [state] DebugLocked = No
2,173,631 UART: [state] WD Timer not started. Device not locked for debugging
2,176,096 UART: [kat] SHA2-256
2,176,761 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,765 UART: [kat] ++
2,180,210 UART: [kat] sha1
2,180,717 UART: [kat] SHA2-256
2,181,365 UART: [kat] SHA2-384
2,182,013 UART: [kat] SHA2-512-ACC
2,182,806 UART: [kat] ECC-384
4,100,341 UART: [kat] HMAC-384Kdf
4,113,159 UART: [kat] LMS
5,186,341 UART: [kat] --
5,189,938 UART: [cold-reset] ++
5,192,534 UART: [fht] FHT @ 0x50003400
5,203,732 UART: [idev] ++
5,204,399 UART: [idev] CDI.KEYID = 6
5,205,727 UART: [idev] SUBJECT.KEYID = 7
5,206,977 UART: [idev] UDS.KEYID = 0
5,219,725 UART: [idev] Erasing UDS.KEYID = 0
8,491,910 UART: [idev] Sha1 KeyId Algorithm
8,515,198 UART: [idev] --
8,519,346 UART: [ldev] ++
8,519,907 UART: [ldev] CDI.KEYID = 6
8,521,140 UART: [ldev] SUBJECT.KEYID = 5
8,522,640 UART: [ldev] AUTHORITY.KEYID = 7
8,524,148 UART: [ldev] FE.KEYID = 1
8,534,959 UART: [ldev] Erasing FE.KEYID = 1
11,828,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,973 UART: [ldev] --
14,194,124 UART: [fwproc] Wait for Commands...
14,197,024 UART: [fwproc] Recv command 0x46574c44
14,199,291 UART: [fwproc] Recv'd Img size: 114124 bytes
18,278,479 UART: ROM Fatal Error: 0x000B002A
18,281,892 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,023,115 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,702 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,024,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,446 UART:
2,169,868 UART: Running Caliptra ROM ...
2,170,950 UART:
2,171,103 UART: [state] CFI Enabled
2,172,078 UART: [state] LifecycleState = Unprovisioned
2,173,737 UART: [state] DebugLocked = No
2,174,849 UART: [state] WD Timer not started. Device not locked for debugging
2,177,326 UART: [kat] SHA2-256
2,177,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,007 UART: [kat] ++
2,181,465 UART: [kat] sha1
2,182,001 UART: [kat] SHA2-256
2,182,755 UART: [kat] SHA2-384
2,183,421 UART: [kat] SHA2-512-ACC
2,184,250 UART: [kat] ECC-384
2,947,958 UART: [kat] HMAC-384Kdf
2,972,616 UART: [kat] LMS
3,502,079 UART: [kat] --
3,506,293 UART: [cold-reset] ++
3,507,688 UART: [fht] FHT @ 0x50003400
3,519,102 UART: [idev] ++
3,519,672 UART: [idev] CDI.KEYID = 6
3,520,552 UART: [idev] SUBJECT.KEYID = 7
3,521,768 UART: [idev] UDS.KEYID = 0
3,543,043 UART: [idev] Erasing UDS.KEYID = 0
6,027,304 UART: [idev] Sha1 KeyId Algorithm
6,051,299 UART: [idev] --
6,056,266 UART: [ldev] ++
6,056,855 UART: [ldev] CDI.KEYID = 6
6,057,770 UART: [ldev] SUBJECT.KEYID = 5
6,058,935 UART: [ldev] AUTHORITY.KEYID = 7
6,060,170 UART: [ldev] FE.KEYID = 1
6,100,302 UART: [ldev] Erasing FE.KEYID = 1
8,602,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,969 UART: [ldev] --
10,413,126 UART: [fwproc] Wait for Commands...
10,415,014 UART: [fwproc] Recv command 0x46574c44
10,417,065 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,668 UART: ROM Fatal Error: 0x000B002A
13,808,830 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,044,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,583,935 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,021,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,087 UART:
2,166,484 UART: Running Caliptra ROM ...
2,167,657 UART:
2,167,834 UART: [state] CFI Enabled
2,168,794 UART: [state] LifecycleState = Unprovisioned
2,170,454 UART: [state] DebugLocked = No
2,171,561 UART: [state] WD Timer not started. Device not locked for debugging
2,174,040 UART: [kat] SHA2-256
2,174,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,727 UART: [kat] ++
2,178,179 UART: [kat] sha1
2,178,691 UART: [kat] SHA2-256
2,179,430 UART: [kat] SHA2-384
2,180,096 UART: [kat] SHA2-512-ACC
2,180,980 UART: [kat] ECC-384
3,279,758 UART: [kat] HMAC-384Kdf
3,291,707 UART: [kat] LMS
3,821,233 UART: [kat] --
3,825,601 UART: [cold-reset] ++
3,827,485 UART: [fht] FHT @ 0x50003400
3,838,390 UART: [idev] ++
3,838,989 UART: [idev] CDI.KEYID = 6
3,839,917 UART: [idev] SUBJECT.KEYID = 7
3,841,080 UART: [idev] UDS.KEYID = 0
3,857,978 UART: [idev] Erasing UDS.KEYID = 0
6,316,549 UART: [idev] Sha1 KeyId Algorithm
6,338,865 UART: [idev] --
6,342,864 UART: [ldev] ++
6,343,440 UART: [ldev] CDI.KEYID = 6
6,344,352 UART: [ldev] SUBJECT.KEYID = 5
6,345,565 UART: [ldev] AUTHORITY.KEYID = 7
6,346,794 UART: [ldev] FE.KEYID = 1
6,356,902 UART: [ldev] Erasing FE.KEYID = 1
8,829,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,890 UART: [ldev] --
10,620,913 UART: [fwproc] Wait for Commands...
10,622,476 UART: [fwproc] Recv command 0x46574c44
10,624,520 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,470 UART: ROM Fatal Error: 0x000B002A
14,041,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,021,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,819,644 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,021,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,911 UART:
2,166,306 UART: Running Caliptra ROM ...
2,167,390 UART:
2,167,546 UART: [state] CFI Enabled
2,168,516 UART: [state] LifecycleState = Unprovisioned
2,170,174 UART: [state] DebugLocked = No
2,171,200 UART: [state] WD Timer not started. Device not locked for debugging
2,173,680 UART: [kat] SHA2-256
2,174,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,358 UART: [kat] ++
2,177,814 UART: [kat] sha1
2,178,348 UART: [kat] SHA2-256
2,179,098 UART: [kat] SHA2-384
2,179,767 UART: [kat] SHA2-512-ACC
2,180,653 UART: [kat] ECC-384
2,946,511 UART: [kat] HMAC-384Kdf
2,970,082 UART: [kat] LMS
3,499,526 UART: [kat] --
3,503,895 UART: [cold-reset] ++
3,505,721 UART: [fht] FHT @ 0x50003400
3,516,654 UART: [idev] ++
3,517,215 UART: [idev] CDI.KEYID = 6
3,518,121 UART: [idev] SUBJECT.KEYID = 7
3,519,333 UART: [idev] UDS.KEYID = 0
3,542,004 UART: [idev] Erasing UDS.KEYID = 0
6,027,438 UART: [idev] Sha1 KeyId Algorithm
6,051,145 UART: [idev] --
6,054,329 UART: [ldev] ++
6,054,912 UART: [ldev] CDI.KEYID = 6
6,055,798 UART: [ldev] SUBJECT.KEYID = 5
6,057,014 UART: [ldev] AUTHORITY.KEYID = 7
6,058,254 UART: [ldev] FE.KEYID = 1
6,099,903 UART: [ldev] Erasing FE.KEYID = 1
8,599,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,186 UART: [ldev] --
10,390,931 UART: [fwproc] Wait for Commands...
10,393,198 UART: [fwproc] Recv command 0x46574c44
10,395,297 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,873 UART: ROM Fatal Error: 0x000B002A
13,801,983 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,020,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,593,912 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,021,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,797 UART:
2,166,190 UART: Running Caliptra ROM ...
2,167,359 UART:
2,167,524 UART: [state] CFI Enabled
2,168,391 UART: [state] LifecycleState = Unprovisioned
2,170,031 UART: [state] DebugLocked = No
2,171,056 UART: [state] WD Timer not started. Device not locked for debugging
2,173,532 UART: [kat] SHA2-256
2,174,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,203 UART: [kat] ++
2,177,650 UART: [kat] sha1
2,178,177 UART: [kat] SHA2-256
2,178,836 UART: [kat] SHA2-384
2,179,492 UART: [kat] SHA2-512-ACC
2,180,320 UART: [kat] ECC-384
3,283,036 UART: [kat] HMAC-384Kdf
3,294,745 UART: [kat] LMS
3,824,228 UART: [kat] --
3,828,486 UART: [cold-reset] ++
3,829,451 UART: [fht] FHT @ 0x50003400
3,841,292 UART: [idev] ++
3,841,854 UART: [idev] CDI.KEYID = 6
3,842,792 UART: [idev] SUBJECT.KEYID = 7
3,843,999 UART: [idev] UDS.KEYID = 0
3,859,277 UART: [idev] Erasing UDS.KEYID = 0
6,315,111 UART: [idev] Sha1 KeyId Algorithm
6,337,259 UART: [idev] --
6,341,585 UART: [ldev] ++
6,342,147 UART: [ldev] CDI.KEYID = 6
6,343,233 UART: [ldev] SUBJECT.KEYID = 5
6,344,290 UART: [ldev] AUTHORITY.KEYID = 7
6,345,406 UART: [ldev] FE.KEYID = 1
6,354,008 UART: [ldev] Erasing FE.KEYID = 1
8,829,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,209 UART: [ldev] --
10,618,340 UART: [fwproc] Wait for Commands...
10,620,272 UART: [fwproc] Recv command 0x46574c44
10,622,318 UART: [fwproc] Recv'd Img size: 114448 bytes
14,013,050 UART: ROM Fatal Error: 0x000B002A
14,016,165 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,025,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,822,761 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,379 UART: [idev] ++
1,173,547 UART: [idev] CDI.KEYID = 6
1,173,908 UART: [idev] SUBJECT.KEYID = 7
1,174,333 UART: [idev] UDS.KEYID = 0
1,182,449 UART: [idev] Erasing UDS.KEYID = 0
1,199,793 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,764 UART: [ldev] ++
1,209,932 UART: [ldev] CDI.KEYID = 6
1,210,296 UART: [ldev] SUBJECT.KEYID = 5
1,210,723 UART: [ldev] AUTHORITY.KEYID = 7
1,211,186 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,242,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,960 UART: ROM Fatal Error: 0x000B002A
2,583,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,256 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,944 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,841 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,483 UART: ROM Fatal Error: 0x000B002A
2,583,642 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,339 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,197,929 UART: [idev] Sha1 KeyId Algorithm
1,206,827 UART: [idev] --
1,207,952 UART: [ldev] ++
1,208,120 UART: [ldev] CDI.KEYID = 6
1,208,484 UART: [ldev] SUBJECT.KEYID = 5
1,208,911 UART: [ldev] AUTHORITY.KEYID = 7
1,209,374 UART: [ldev] FE.KEYID = 1
1,214,388 UART: [ldev] Erasing FE.KEYID = 1
1,240,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,281,019 UART: [fwproc] Recv command 0x46574c44
1,281,752 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,202 UART: ROM Fatal Error: 0x000B002A
2,581,361 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,486 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,098 UART: [idev] Sha1 KeyId Algorithm
1,209,164 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,733 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,217,047 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,345 UART: ROM Fatal Error: 0x000B002A
2,583,504 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,039 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,104 UART: [kat] SHA2-256
890,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,783 UART: [kat] ++
894,935 UART: [kat] sha1
899,033 UART: [kat] SHA2-256
900,973 UART: [kat] SHA2-384
903,728 UART: [kat] SHA2-512-ACC
905,629 UART: [kat] ECC-384
915,474 UART: [kat] HMAC-384Kdf
919,894 UART: [kat] LMS
1,168,206 UART: [kat] --
1,169,079 UART: [cold-reset] ++
1,169,409 UART: [fht] FHT @ 0x50003400
1,172,107 UART: [idev] ++
1,172,275 UART: [idev] CDI.KEYID = 6
1,172,636 UART: [idev] SUBJECT.KEYID = 7
1,173,061 UART: [idev] UDS.KEYID = 0
1,180,843 UART: [idev] Erasing UDS.KEYID = 0
1,197,193 UART: [idev] Sha1 KeyId Algorithm
1,206,251 UART: [idev] --
1,207,226 UART: [ldev] ++
1,207,394 UART: [ldev] CDI.KEYID = 6
1,207,758 UART: [ldev] SUBJECT.KEYID = 5
1,208,185 UART: [ldev] AUTHORITY.KEYID = 7
1,208,648 UART: [ldev] FE.KEYID = 1
1,213,878 UART: [ldev] Erasing FE.KEYID = 1
1,240,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,624 UART: [ldev] --
1,279,892 UART: [fwproc] Wait for Commands...
1,280,505 UART: [fwproc] Recv command 0x46574c44
1,281,238 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,610 UART: ROM Fatal Error: 0x000B002A
2,580,769 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,616 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,244 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
890,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,777 UART: [kat] LMS
1,169,089 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,245 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,621 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,561 UART: ROM Fatal Error: 0x000B002A
2,582,720 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,551 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,020,943 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,080 UART:
2,165,485 UART: Running Caliptra ROM ...
2,166,605 UART:
2,166,769 UART: [state] CFI Enabled
2,167,741 UART: [state] LifecycleState = Unprovisioned
2,169,393 UART: [state] DebugLocked = No
2,170,424 UART: [state] WD Timer not started. Device not locked for debugging
2,172,890 UART: [kat] SHA2-256
2,173,578 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,589 UART: [kat] ++
2,177,041 UART: [kat] sha1
2,177,556 UART: [kat] SHA2-256
2,178,295 UART: [kat] SHA2-384
2,178,956 UART: [kat] SHA2-512-ACC
2,179,758 UART: [kat] ECC-384
3,776,284 UART: [kat] HMAC-384Kdf
3,802,610 UART: [kat] LMS
4,875,760 UART: [kat] --
4,879,853 UART: [cold-reset] ++
4,881,899 UART: [fht] FHT @ 0x50003400
4,893,101 UART: [idev] ++
4,893,775 UART: [idev] CDI.KEYID = 6
4,895,007 UART: [idev] SUBJECT.KEYID = 7
4,896,109 UART: [idev] UDS.KEYID = 0
4,931,344 UART: [idev] Erasing UDS.KEYID = 0
8,244,464 UART: [idev] Sha1 KeyId Algorithm
8,265,802 UART: [idev] --
8,269,528 UART: [ldev] ++
8,270,151 UART: [ldev] CDI.KEYID = 6
8,271,335 UART: [ldev] SUBJECT.KEYID = 5
8,272,505 UART: [ldev] AUTHORITY.KEYID = 7
8,273,659 UART: [ldev] FE.KEYID = 1
8,318,253 UART: [ldev] Erasing FE.KEYID = 1
11,652,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,118 UART: [ldev] --
14,041,491 UART: [fwproc] Wait for Commands...
14,044,361 UART: [fwproc] Recv command 0x46574c44
14,046,689 UART: [fwproc] Recv'd Img size: 114124 bytes
18,111,281 UART: ROM Fatal Error: 0x000B0028
18,114,750 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,020,103 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,885,901 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
49 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,022,902 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,866 UART:
2,168,296 UART: Running Caliptra ROM ...
2,169,482 UART:
2,169,648 UART: [state] CFI Enabled
2,170,528 UART: [state] LifecycleState = Unprovisioned
2,172,170 UART: [state] DebugLocked = No
2,173,226 UART: [state] WD Timer not started. Device not locked for debugging
2,175,709 UART: [kat] SHA2-256
2,176,373 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,380 UART: [kat] ++
2,179,822 UART: [kat] sha1
2,180,328 UART: [kat] SHA2-256
2,181,061 UART: [kat] SHA2-384
2,181,723 UART: [kat] SHA2-512-ACC
2,182,597 UART: [kat] ECC-384
4,098,000 UART: [kat] HMAC-384Kdf
4,109,495 UART: [kat] LMS
5,182,628 UART: [kat] --
5,188,109 UART: [cold-reset] ++
5,189,511 UART: [fht] FHT @ 0x50003400
5,201,146 UART: [idev] ++
5,201,828 UART: [idev] CDI.KEYID = 6
5,203,077 UART: [idev] SUBJECT.KEYID = 7
5,204,478 UART: [idev] UDS.KEYID = 0
5,221,029 UART: [idev] Erasing UDS.KEYID = 0
8,496,940 UART: [idev] Sha1 KeyId Algorithm
8,519,365 UART: [idev] --
8,522,253 UART: [ldev] ++
8,522,823 UART: [ldev] CDI.KEYID = 6
8,523,935 UART: [ldev] SUBJECT.KEYID = 5
8,525,474 UART: [ldev] AUTHORITY.KEYID = 7
8,526,955 UART: [ldev] FE.KEYID = 1
8,538,201 UART: [ldev] Erasing FE.KEYID = 1
11,829,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,190 UART: [ldev] --
14,197,883 UART: [fwproc] Wait for Commands...
14,200,527 UART: [fwproc] Recv command 0x46574c44
14,202,792 UART: [fwproc] Recv'd Img size: 114124 bytes
18,278,731 UART: ROM Fatal Error: 0x000B0028
18,282,148 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,021,181 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,084,313 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,023,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,724 UART:
2,168,116 UART: Running Caliptra ROM ...
2,169,195 UART:
2,169,370 UART: [state] CFI Enabled
2,170,355 UART: [state] LifecycleState = Unprovisioned
2,172,009 UART: [state] DebugLocked = No
2,173,044 UART: [state] WD Timer not started. Device not locked for debugging
2,175,529 UART: [kat] SHA2-256
2,176,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,217 UART: [kat] ++
2,179,670 UART: [kat] sha1
2,180,184 UART: [kat] SHA2-256
2,180,927 UART: [kat] SHA2-384
2,181,593 UART: [kat] SHA2-512-ACC
2,182,428 UART: [kat] ECC-384
2,951,468 UART: [kat] HMAC-384Kdf
2,971,802 UART: [kat] LMS
3,501,287 UART: [kat] --
3,505,866 UART: [cold-reset] ++
3,506,901 UART: [fht] FHT @ 0x50003400
3,518,049 UART: [idev] ++
3,518,618 UART: [idev] CDI.KEYID = 6
3,519,528 UART: [idev] SUBJECT.KEYID = 7
3,520,746 UART: [idev] UDS.KEYID = 0
3,544,394 UART: [idev] Erasing UDS.KEYID = 0
6,030,218 UART: [idev] Sha1 KeyId Algorithm
6,052,705 UART: [idev] --
6,057,346 UART: [ldev] ++
6,057,920 UART: [ldev] CDI.KEYID = 6
6,058,835 UART: [ldev] SUBJECT.KEYID = 5
6,060,003 UART: [ldev] AUTHORITY.KEYID = 7
6,061,241 UART: [ldev] FE.KEYID = 1
6,101,031 UART: [ldev] Erasing FE.KEYID = 1
8,605,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,623 UART: [ldev] --
10,415,795 UART: [fwproc] Wait for Commands...
10,418,447 UART: [fwproc] Recv command 0x46574c44
10,420,552 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,232 UART: ROM Fatal Error: 0x000B0028
13,822,373 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,022,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,615,992 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
2,022,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,071 UART:
2,167,480 UART: Running Caliptra ROM ...
2,168,564 UART:
2,168,716 UART: [state] CFI Enabled
2,169,707 UART: [state] LifecycleState = Unprovisioned
2,171,359 UART: [state] DebugLocked = No
2,172,389 UART: [state] WD Timer not started. Device not locked for debugging
2,174,864 UART: [kat] SHA2-256
2,175,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,546 UART: [kat] ++
2,178,988 UART: [kat] sha1
2,179,494 UART: [kat] SHA2-256
2,180,152 UART: [kat] SHA2-384
2,180,806 UART: [kat] SHA2-512-ACC
2,181,648 UART: [kat] ECC-384
3,277,642 UART: [kat] HMAC-384Kdf
3,290,792 UART: [kat] LMS
3,820,310 UART: [kat] --
3,824,774 UART: [cold-reset] ++
3,827,079 UART: [fht] FHT @ 0x50003400
3,837,537 UART: [idev] ++
3,838,096 UART: [idev] CDI.KEYID = 6
3,839,029 UART: [idev] SUBJECT.KEYID = 7
3,840,238 UART: [idev] UDS.KEYID = 0
3,857,267 UART: [idev] Erasing UDS.KEYID = 0
6,315,310 UART: [idev] Sha1 KeyId Algorithm
6,337,507 UART: [idev] --
6,340,627 UART: [ldev] ++
6,341,193 UART: [ldev] CDI.KEYID = 6
6,342,168 UART: [ldev] SUBJECT.KEYID = 5
6,343,269 UART: [ldev] AUTHORITY.KEYID = 7
6,344,553 UART: [ldev] FE.KEYID = 1
6,354,172 UART: [ldev] Erasing FE.KEYID = 1
8,827,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,770 UART: [ldev] --
10,618,292 UART: [fwproc] Wait for Commands...
10,619,851 UART: [fwproc] Recv command 0x46574c44
10,621,891 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,585 UART: ROM Fatal Error: 0x000B0028
14,027,723 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
2,020,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,815,930 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
949 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,966 writing to cptra_bootfsm_go
2,023,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,948 UART:
2,168,348 UART: Running Caliptra ROM ...
2,169,519 UART:
2,169,692 UART: [state] CFI Enabled
2,170,659 UART: [state] LifecycleState = Unprovisioned
2,172,303 UART: [state] DebugLocked = No
2,173,333 UART: [state] WD Timer not started. Device not locked for debugging
2,175,813 UART: [kat] SHA2-256
2,176,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,496 UART: [kat] ++
2,179,986 UART: [kat] sha1
2,180,525 UART: [kat] SHA2-256
2,181,203 UART: [kat] SHA2-384
2,181,861 UART: [kat] SHA2-512-ACC
2,182,694 UART: [kat] ECC-384
2,946,476 UART: [kat] HMAC-384Kdf
2,970,929 UART: [kat] LMS
3,500,407 UART: [kat] --
3,504,396 UART: [cold-reset] ++
3,506,972 UART: [fht] FHT @ 0x50003400
3,518,437 UART: [idev] ++
3,519,001 UART: [idev] CDI.KEYID = 6
3,519,912 UART: [idev] SUBJECT.KEYID = 7
3,521,162 UART: [idev] UDS.KEYID = 0
3,541,813 UART: [idev] Erasing UDS.KEYID = 0
6,025,060 UART: [idev] Sha1 KeyId Algorithm
6,048,674 UART: [idev] --
6,053,051 UART: [ldev] ++
6,053,647 UART: [ldev] CDI.KEYID = 6
6,054,534 UART: [ldev] SUBJECT.KEYID = 5
6,055,753 UART: [ldev] AUTHORITY.KEYID = 7
6,056,986 UART: [ldev] FE.KEYID = 1
6,099,790 UART: [ldev] Erasing FE.KEYID = 1
8,601,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,050 UART: [ldev] --
10,394,260 UART: [fwproc] Wait for Commands...
10,397,117 UART: [fwproc] Recv command 0x46574c44
10,399,167 UART: [fwproc] Recv'd Img size: 114448 bytes
13,793,864 UART: ROM Fatal Error: 0x000B0028
13,796,995 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,027,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,647,228 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,920 writing to cptra_bootfsm_go
2,020,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,393 UART:
2,165,805 UART: Running Caliptra ROM ...
2,166,978 UART:
2,167,152 UART: [state] CFI Enabled
2,168,110 UART: [state] LifecycleState = Unprovisioned
2,169,747 UART: [state] DebugLocked = No
2,170,847 UART: [state] WD Timer not started. Device not locked for debugging
2,173,323 UART: [kat] SHA2-256
2,173,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,000 UART: [kat] ++
2,177,458 UART: [kat] sha1
2,177,968 UART: [kat] SHA2-256
2,178,704 UART: [kat] SHA2-384
2,179,368 UART: [kat] SHA2-512-ACC
2,180,248 UART: [kat] ECC-384
3,285,346 UART: [kat] HMAC-384Kdf
3,297,715 UART: [kat] LMS
3,827,218 UART: [kat] --
3,832,067 UART: [cold-reset] ++
3,833,779 UART: [fht] FHT @ 0x50003400
3,845,717 UART: [idev] ++
3,846,325 UART: [idev] CDI.KEYID = 6
3,847,205 UART: [idev] SUBJECT.KEYID = 7
3,848,417 UART: [idev] UDS.KEYID = 0
3,863,479 UART: [idev] Erasing UDS.KEYID = 0
6,320,752 UART: [idev] Sha1 KeyId Algorithm
6,342,782 UART: [idev] --
6,346,371 UART: [ldev] ++
6,346,945 UART: [ldev] CDI.KEYID = 6
6,347,826 UART: [ldev] SUBJECT.KEYID = 5
6,349,038 UART: [ldev] AUTHORITY.KEYID = 7
6,350,265 UART: [ldev] FE.KEYID = 1
6,360,287 UART: [ldev] Erasing FE.KEYID = 1
8,831,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,898 UART: [ldev] --
10,623,456 UART: [fwproc] Wait for Commands...
10,626,086 UART: [fwproc] Recv command 0x46574c44
10,628,131 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,492 UART: ROM Fatal Error: 0x000B0028
14,030,586 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
2,023,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,804,011 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,036 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,245 UART: ROM Fatal Error: 0x000B0028
2,581,402 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,191 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,816 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,553 UART: [fwproc] Wait for Commands...
1,282,162 UART: [fwproc] Recv command 0x46574c44
1,282,895 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,472 UART: ROM Fatal Error: 0x000B0028
2,583,629 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,378 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,913 UART: [state] WD Timer not started. Device not locked for debugging
87,036 UART: [kat] SHA2-256
890,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,715 UART: [kat] ++
894,867 UART: [kat] sha1
899,089 UART: [kat] SHA2-256
901,029 UART: [kat] SHA2-384
903,892 UART: [kat] SHA2-512-ACC
905,793 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,215,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,785 UART: ROM Fatal Error: 0x000B0028
2,581,942 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,437 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,069 UART: [ldev] --
1,280,545 UART: [fwproc] Wait for Commands...
1,281,180 UART: [fwproc] Recv command 0x46574c44
1,281,913 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,412 UART: ROM Fatal Error: 0x000B0028
2,581,569 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,284 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,696 UART: [ldev] ++
1,208,864 UART: [ldev] CDI.KEYID = 6
1,209,228 UART: [ldev] SUBJECT.KEYID = 5
1,209,655 UART: [ldev] AUTHORITY.KEYID = 7
1,210,118 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,350 UART: [ldev] --
1,279,670 UART: [fwproc] Wait for Commands...
1,280,291 UART: [fwproc] Recv command 0x46574c44
1,281,024 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,773 UART: ROM Fatal Error: 0x000B0028
2,579,930 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,361 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,816 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,457 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,579 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,160 UART: ROM Fatal Error: 0x000B0028
2,583,317 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,574 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,019,868 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,163,970 UART:
2,164,354 UART: Running Caliptra ROM ...
2,165,522 UART:
2,165,717 UART: [state] CFI Enabled
2,166,694 UART: [state] LifecycleState = Unprovisioned
2,168,337 UART: [state] DebugLocked = No
2,169,441 UART: [state] WD Timer not started. Device not locked for debugging
2,172,645 UART: [kat] SHA2-256
2,173,336 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,361 UART: [kat] ++
2,176,816 UART: [kat] sha1
2,177,331 UART: [kat] SHA2-256
2,178,070 UART: [kat] SHA2-384
2,178,739 UART: [kat] SHA2-512-ACC
2,179,615 UART: [kat] ECC-384
3,777,132 UART: [kat] HMAC-384Kdf
3,802,808 UART: [kat] LMS
4,875,994 UART: [kat] --
4,881,713 UART: [cold-reset] ++
4,883,508 UART: [fht] FHT @ 0x50003400
4,895,738 UART: [idev] ++
4,896,456 UART: [idev] CDI.KEYID = 6
4,897,642 UART: [idev] SUBJECT.KEYID = 7
4,898,749 UART: [idev] UDS.KEYID = 0
4,930,455 UART: [idev] Erasing UDS.KEYID = 0
8,240,102 UART: [idev] Sha1 KeyId Algorithm
8,260,622 UART: [idev] --
8,265,173 UART: [ldev] ++
8,265,798 UART: [ldev] CDI.KEYID = 6
8,266,914 UART: [ldev] SUBJECT.KEYID = 5
8,268,126 UART: [ldev] AUTHORITY.KEYID = 7
8,269,283 UART: [ldev] FE.KEYID = 1
8,297,618 UART: [ldev] Erasing FE.KEYID = 1
11,631,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,280 UART: [ldev] --
14,016,291 UART: [fwproc] Wait for Commands...
14,018,395 UART: [fwproc] Recv command 0x46574c44
14,020,723 UART: [fwproc] Recv'd Img size: 114124 bytes
18,088,582 UART: ROM Fatal Error: 0x000B0028
18,092,034 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,023,238 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,175 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
2,022,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,640 UART:
2,167,028 UART: Running Caliptra ROM ...
2,168,196 UART:
2,168,368 UART: [state] CFI Enabled
2,169,334 UART: [state] LifecycleState = Unprovisioned
2,170,969 UART: [state] DebugLocked = No
2,172,068 UART: [state] WD Timer not started. Device not locked for debugging
2,174,540 UART: [kat] SHA2-256
2,175,202 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,208 UART: [kat] ++
2,178,651 UART: [kat] sha1
2,179,153 UART: [kat] SHA2-256
2,179,882 UART: [kat] SHA2-384
2,180,540 UART: [kat] SHA2-512-ACC
2,181,436 UART: [kat] ECC-384
4,098,393 UART: [kat] HMAC-384Kdf
4,109,080 UART: [kat] LMS
5,182,241 UART: [kat] --
5,188,148 UART: [cold-reset] ++
5,190,137 UART: [fht] FHT @ 0x50003400
5,200,890 UART: [idev] ++
5,201,571 UART: [idev] CDI.KEYID = 6
5,202,726 UART: [idev] SUBJECT.KEYID = 7
5,204,255 UART: [idev] UDS.KEYID = 0
5,222,146 UART: [idev] Erasing UDS.KEYID = 0
8,492,235 UART: [idev] Sha1 KeyId Algorithm
8,513,906 UART: [idev] --
8,516,657 UART: [ldev] ++
8,517,220 UART: [ldev] CDI.KEYID = 6
8,518,455 UART: [ldev] SUBJECT.KEYID = 5
8,519,907 UART: [ldev] AUTHORITY.KEYID = 7
8,521,468 UART: [ldev] FE.KEYID = 1
8,534,705 UART: [ldev] Erasing FE.KEYID = 1
11,826,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,820 UART: [ldev] --
14,193,940 UART: [fwproc] Wait for Commands...
14,196,250 UART: [fwproc] Recv command 0x46574c44
14,198,511 UART: [fwproc] Recv'd Img size: 114124 bytes
18,265,040 UART: ROM Fatal Error: 0x000B0028
18,268,462 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
2,027,618 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,535 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,029,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,174,358 UART:
2,174,768 UART: Running Caliptra ROM ...
2,175,887 UART:
2,176,048 UART: [state] CFI Enabled
2,177,020 UART: [state] LifecycleState = Unprovisioned
2,178,676 UART: [state] DebugLocked = No
2,179,957 UART: [state] WD Timer not started. Device not locked for debugging
2,182,368 UART: [kat] SHA2-256
2,183,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,054 UART: [kat] ++
2,186,510 UART: [kat] sha1
2,187,026 UART: [kat] SHA2-256
2,187,778 UART: [kat] SHA2-384
2,188,443 UART: [kat] SHA2-512-ACC
2,189,267 UART: [kat] ECC-384
2,946,681 UART: [kat] HMAC-384Kdf
2,970,456 UART: [kat] LMS
3,499,937 UART: [kat] --
3,503,852 UART: [cold-reset] ++
3,505,413 UART: [fht] FHT @ 0x50003400
3,516,997 UART: [idev] ++
3,517,576 UART: [idev] CDI.KEYID = 6
3,518,533 UART: [idev] SUBJECT.KEYID = 7
3,519,694 UART: [idev] UDS.KEYID = 0
3,543,401 UART: [idev] Erasing UDS.KEYID = 0
6,027,904 UART: [idev] Sha1 KeyId Algorithm
6,050,653 UART: [idev] --
6,054,801 UART: [ldev] ++
6,055,372 UART: [ldev] CDI.KEYID = 6
6,056,253 UART: [ldev] SUBJECT.KEYID = 5
6,057,471 UART: [ldev] AUTHORITY.KEYID = 7
6,058,656 UART: [ldev] FE.KEYID = 1
6,097,114 UART: [ldev] Erasing FE.KEYID = 1
8,598,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,173 UART: [ldev] --
10,410,035 UART: [fwproc] Wait for Commands...
10,411,819 UART: [fwproc] Recv command 0x46574c44
10,413,932 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,858 UART: ROM Fatal Error: 0x000B0028
13,820,987 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,021,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,594,802 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,023,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,771 UART:
2,168,155 UART: Running Caliptra ROM ...
2,169,322 UART:
2,169,495 UART: [state] CFI Enabled
2,170,455 UART: [state] LifecycleState = Unprovisioned
2,172,095 UART: [state] DebugLocked = No
2,173,201 UART: [state] WD Timer not started. Device not locked for debugging
2,175,695 UART: [kat] SHA2-256
2,176,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,377 UART: [kat] ++
2,179,828 UART: [kat] sha1
2,180,432 UART: [kat] SHA2-256
2,181,094 UART: [kat] SHA2-384
2,181,754 UART: [kat] SHA2-512-ACC
2,182,580 UART: [kat] ECC-384
3,280,402 UART: [kat] HMAC-384Kdf
3,291,767 UART: [kat] LMS
3,821,222 UART: [kat] --
3,826,078 UART: [cold-reset] ++
3,828,277 UART: [fht] FHT @ 0x50003400
3,838,171 UART: [idev] ++
3,838,731 UART: [idev] CDI.KEYID = 6
3,839,637 UART: [idev] SUBJECT.KEYID = 7
3,840,865 UART: [idev] UDS.KEYID = 0
3,854,953 UART: [idev] Erasing UDS.KEYID = 0
6,312,139 UART: [idev] Sha1 KeyId Algorithm
6,334,840 UART: [idev] --
6,337,574 UART: [ldev] ++
6,338,148 UART: [ldev] CDI.KEYID = 6
6,339,058 UART: [ldev] SUBJECT.KEYID = 5
6,340,270 UART: [ldev] AUTHORITY.KEYID = 7
6,341,496 UART: [ldev] FE.KEYID = 1
6,350,305 UART: [ldev] Erasing FE.KEYID = 1
8,824,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,751 UART: [ldev] --
10,616,493 UART: [fwproc] Wait for Commands...
10,618,481 UART: [fwproc] Recv command 0x46574c44
10,620,583 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,778 UART: ROM Fatal Error: 0x000B0028
14,031,910 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,020,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,817,531 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,021,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,736 UART:
2,166,128 UART: Running Caliptra ROM ...
2,167,295 UART:
2,167,485 UART: [state] CFI Enabled
2,168,452 UART: [state] LifecycleState = Unprovisioned
2,170,094 UART: [state] DebugLocked = No
2,171,211 UART: [state] WD Timer not started. Device not locked for debugging
2,173,699 UART: [kat] SHA2-256
2,174,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,385 UART: [kat] ++
2,177,837 UART: [kat] sha1
2,178,436 UART: [kat] SHA2-256
2,179,102 UART: [kat] SHA2-384
2,179,761 UART: [kat] SHA2-512-ACC
2,180,646 UART: [kat] ECC-384
2,947,217 UART: [kat] HMAC-384Kdf
2,969,392 UART: [kat] LMS
3,498,823 UART: [kat] --
3,503,230 UART: [cold-reset] ++
3,505,570 UART: [fht] FHT @ 0x50003400
3,515,481 UART: [idev] ++
3,516,056 UART: [idev] CDI.KEYID = 6
3,516,988 UART: [idev] SUBJECT.KEYID = 7
3,518,152 UART: [idev] UDS.KEYID = 0
3,542,068 UART: [idev] Erasing UDS.KEYID = 0
6,024,122 UART: [idev] Sha1 KeyId Algorithm
6,047,965 UART: [idev] --
6,051,369 UART: [ldev] ++
6,051,944 UART: [ldev] CDI.KEYID = 6
6,052,832 UART: [ldev] SUBJECT.KEYID = 5
6,054,055 UART: [ldev] AUTHORITY.KEYID = 7
6,055,402 UART: [ldev] FE.KEYID = 1
6,097,629 UART: [ldev] Erasing FE.KEYID = 1
8,601,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,478 UART: [ldev] --
10,410,991 UART: [fwproc] Wait for Commands...
10,413,305 UART: [fwproc] Recv command 0x46574c44
10,415,413 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,622 UART: ROM Fatal Error: 0x000B0028
13,822,749 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,021,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,595,347 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,022,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,995 UART:
2,169,517 UART: Running Caliptra ROM ...
2,170,612 UART:
2,170,772 UART: [state] CFI Enabled
2,171,669 UART: [state] LifecycleState = Unprovisioned
2,173,324 UART: [state] DebugLocked = No
2,174,431 UART: [state] WD Timer not started. Device not locked for debugging
2,176,926 UART: [kat] SHA2-256
2,177,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,605 UART: [kat] ++
2,181,054 UART: [kat] sha1
2,181,589 UART: [kat] SHA2-256
2,182,247 UART: [kat] SHA2-384
2,182,903 UART: [kat] SHA2-512-ACC
2,183,729 UART: [kat] ECC-384
3,281,076 UART: [kat] HMAC-384Kdf
3,293,457 UART: [kat] LMS
3,822,966 UART: [kat] --
3,825,440 UART: [cold-reset] ++
3,827,582 UART: [fht] FHT @ 0x50003400
3,838,455 UART: [idev] ++
3,839,023 UART: [idev] CDI.KEYID = 6
3,839,930 UART: [idev] SUBJECT.KEYID = 7
3,841,139 UART: [idev] UDS.KEYID = 0
3,856,947 UART: [idev] Erasing UDS.KEYID = 0
6,313,833 UART: [idev] Sha1 KeyId Algorithm
6,337,712 UART: [idev] --
6,341,620 UART: [ldev] ++
6,342,187 UART: [ldev] CDI.KEYID = 6
6,343,066 UART: [ldev] SUBJECT.KEYID = 5
6,344,278 UART: [ldev] AUTHORITY.KEYID = 7
6,345,507 UART: [ldev] FE.KEYID = 1
6,358,604 UART: [ldev] Erasing FE.KEYID = 1
8,834,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,917 UART: [ldev] --
10,623,273 UART: [fwproc] Wait for Commands...
10,626,182 UART: [fwproc] Recv command 0x46574c44
10,628,224 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,576 UART: ROM Fatal Error: 0x000B0028
14,028,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,021,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,823,264 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,768 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,183,083 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,209,347 UART: [idev] --
1,210,266 UART: [ldev] ++
1,210,434 UART: [ldev] CDI.KEYID = 6
1,210,798 UART: [ldev] SUBJECT.KEYID = 5
1,211,225 UART: [ldev] AUTHORITY.KEYID = 7
1,211,688 UART: [ldev] FE.KEYID = 1
1,216,904 UART: [ldev] Erasing FE.KEYID = 1
1,243,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,570 UART: [ldev] --
1,282,924 UART: [fwproc] Wait for Commands...
1,283,745 UART: [fwproc] Recv command 0x46574c44
1,284,478 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,954 UART: ROM Fatal Error: 0x000B0028
2,584,111 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,125 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,284 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,633 UART: [ldev] ++
1,208,801 UART: [ldev] CDI.KEYID = 6
1,209,165 UART: [ldev] SUBJECT.KEYID = 5
1,209,592 UART: [ldev] AUTHORITY.KEYID = 7
1,210,055 UART: [ldev] FE.KEYID = 1
1,215,195 UART: [ldev] Erasing FE.KEYID = 1
1,241,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,489 UART: [ldev] --
1,280,975 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,482 UART: ROM Fatal Error: 0x000B0028
2,581,639 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,516 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,426 UART: [kat] HMAC-384Kdf
920,086 UART: [kat] LMS
1,168,398 UART: [kat] --
1,169,211 UART: [cold-reset] ++
1,169,741 UART: [fht] FHT @ 0x50003400
1,172,561 UART: [idev] ++
1,172,729 UART: [idev] CDI.KEYID = 6
1,173,090 UART: [idev] SUBJECT.KEYID = 7
1,173,515 UART: [idev] UDS.KEYID = 0
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,648 UART: [ldev] --
1,281,076 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,393 UART: ROM Fatal Error: 0x000B0028
2,581,550 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,917 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,170,048 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,490 UART: [idev] Sha1 KeyId Algorithm
1,208,304 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,073 UART: [fwproc] Wait for Commands...
1,282,808 UART: [fwproc] Recv command 0x46574c44
1,283,541 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,254 UART: ROM Fatal Error: 0x000B0028
2,582,411 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,498 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,415 UART: [idev] ++
1,172,583 UART: [idev] CDI.KEYID = 6
1,172,944 UART: [idev] SUBJECT.KEYID = 7
1,173,369 UART: [idev] UDS.KEYID = 0
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,305 UART: [idev] Sha1 KeyId Algorithm
1,207,415 UART: [idev] --
1,208,272 UART: [ldev] ++
1,208,440 UART: [ldev] CDI.KEYID = 6
1,208,804 UART: [ldev] SUBJECT.KEYID = 5
1,209,231 UART: [ldev] AUTHORITY.KEYID = 7
1,209,694 UART: [ldev] FE.KEYID = 1
1,214,898 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,806 UART: [ldev] --
1,280,246 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,691 UART: ROM Fatal Error: 0x000B0028
2,580,848 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,431,483 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
915,611 UART: [kat] HMAC-384Kdf
920,319 UART: [kat] LMS
1,168,631 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,169,994 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,165 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,265 UART: ROM Fatal Error: 0x000B0028
2,583,422 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,988 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,023,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,131 UART:
2,168,527 UART: Running Caliptra ROM ...
2,169,700 UART:
2,169,876 UART: [state] CFI Enabled
2,170,844 UART: [state] LifecycleState = Unprovisioned
2,172,485 UART: [state] DebugLocked = No
2,173,592 UART: [state] WD Timer not started. Device not locked for debugging
2,176,083 UART: [kat] SHA2-256
2,176,756 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,770 UART: [kat] ++
2,180,221 UART: [kat] sha1
2,180,733 UART: [kat] SHA2-256
2,181,470 UART: [kat] SHA2-384
2,182,137 UART: [kat] SHA2-512-ACC
2,182,967 UART: [kat] ECC-384
3,775,704 UART: [kat] HMAC-384Kdf
3,804,579 UART: [kat] LMS
4,877,738 UART: [kat] --
4,882,269 UART: [cold-reset] ++
4,883,380 UART: [fht] FHT @ 0x50003400
4,895,961 UART: [idev] ++
4,896,643 UART: [idev] CDI.KEYID = 6
4,897,881 UART: [idev] SUBJECT.KEYID = 7
4,899,009 UART: [idev] UDS.KEYID = 0
4,931,551 UART: [idev] Erasing UDS.KEYID = 0
8,244,759 UART: [idev] Sha1 KeyId Algorithm
8,265,563 UART: [idev] --
8,268,421 UART: [ldev] ++
8,268,994 UART: [ldev] CDI.KEYID = 6
8,270,235 UART: [ldev] SUBJECT.KEYID = 5
8,271,345 UART: [ldev] AUTHORITY.KEYID = 7
8,272,497 UART: [ldev] FE.KEYID = 1
8,319,474 UART: [ldev] Erasing FE.KEYID = 1
11,657,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,116 UART: [ldev] --
14,040,942 UART: [fwproc] Wait for Commands...
14,042,934 UART: [fwproc] Recv command 0x46574c44
14,045,254 UART: [fwproc] Recv'd Img size: 114124 bytes
18,113,975 UART: ROM Fatal Error: 0x000B0029
18,117,448 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,020,768 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,707 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,024,234 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,603 UART:
2,169,002 UART: Running Caliptra ROM ...
2,170,180 UART:
2,170,349 UART: [state] CFI Enabled
2,171,310 UART: [state] LifecycleState = Unprovisioned
2,172,966 UART: [state] DebugLocked = No
2,174,070 UART: [state] WD Timer not started. Device not locked for debugging
2,176,526 UART: [kat] SHA2-256
2,177,185 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,186 UART: [kat] ++
2,180,628 UART: [kat] sha1
2,181,130 UART: [kat] SHA2-256
2,181,858 UART: [kat] SHA2-384
2,182,515 UART: [kat] SHA2-512-ACC
2,183,337 UART: [kat] ECC-384
4,097,709 UART: [kat] HMAC-384Kdf
4,109,366 UART: [kat] LMS
5,182,498 UART: [kat] --
5,187,548 UART: [cold-reset] ++
5,189,114 UART: [fht] FHT @ 0x50003400
5,200,099 UART: [idev] ++
5,200,791 UART: [idev] CDI.KEYID = 6
5,202,023 UART: [idev] SUBJECT.KEYID = 7
5,203,421 UART: [idev] UDS.KEYID = 0
5,220,002 UART: [idev] Erasing UDS.KEYID = 0
8,488,744 UART: [idev] Sha1 KeyId Algorithm
8,510,849 UART: [idev] --
8,514,403 UART: [ldev] ++
8,514,967 UART: [ldev] CDI.KEYID = 6
8,516,279 UART: [ldev] SUBJECT.KEYID = 5
8,517,677 UART: [ldev] AUTHORITY.KEYID = 7
8,519,240 UART: [ldev] FE.KEYID = 1
8,529,454 UART: [ldev] Erasing FE.KEYID = 1
11,827,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,735 UART: [ldev] --
14,193,947 UART: [fwproc] Wait for Commands...
14,197,136 UART: [fwproc] Recv command 0x46574c44
14,199,504 UART: [fwproc] Recv'd Img size: 114124 bytes
18,265,559 UART: ROM Fatal Error: 0x000B0029
18,268,993 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,024,419 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,091,887 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,027,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,172,412 UART:
2,172,828 UART: Running Caliptra ROM ...
2,173,995 UART:
2,174,170 UART: [state] CFI Enabled
2,175,135 UART: [state] LifecycleState = Unprovisioned
2,176,788 UART: [state] DebugLocked = No
2,177,816 UART: [state] WD Timer not started. Device not locked for debugging
2,180,292 UART: [kat] SHA2-256
2,180,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,972 UART: [kat] ++
2,184,418 UART: [kat] sha1
2,184,928 UART: [kat] SHA2-256
2,185,582 UART: [kat] SHA2-384
2,186,238 UART: [kat] SHA2-512-ACC
2,187,074 UART: [kat] ECC-384
2,952,838 UART: [kat] HMAC-384Kdf
2,975,376 UART: [kat] LMS
3,504,849 UART: [kat] --
3,510,227 UART: [cold-reset] ++
3,512,705 UART: [fht] FHT @ 0x50003400
3,523,152 UART: [idev] ++
3,523,718 UART: [idev] CDI.KEYID = 6
3,524,655 UART: [idev] SUBJECT.KEYID = 7
3,525,866 UART: [idev] UDS.KEYID = 0
3,547,009 UART: [idev] Erasing UDS.KEYID = 0
6,034,665 UART: [idev] Sha1 KeyId Algorithm
6,057,274 UART: [idev] --
6,061,158 UART: [ldev] ++
6,061,745 UART: [ldev] CDI.KEYID = 6
6,062,658 UART: [ldev] SUBJECT.KEYID = 5
6,063,837 UART: [ldev] AUTHORITY.KEYID = 7
6,065,018 UART: [ldev] FE.KEYID = 1
6,105,408 UART: [ldev] Erasing FE.KEYID = 1
8,608,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,585 UART: [ldev] --
10,420,151 UART: [fwproc] Wait for Commands...
10,421,770 UART: [fwproc] Recv command 0x46574c44
10,423,876 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,341 UART: ROM Fatal Error: 0x000B0029
13,824,480 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,023,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,616,737 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,023,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,244 UART:
2,168,642 UART: Running Caliptra ROM ...
2,169,727 UART:
2,169,886 UART: [state] CFI Enabled
2,170,850 UART: [state] LifecycleState = Unprovisioned
2,172,495 UART: [state] DebugLocked = No
2,173,600 UART: [state] WD Timer not started. Device not locked for debugging
2,176,077 UART: [kat] SHA2-256
2,176,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,760 UART: [kat] ++
2,180,206 UART: [kat] sha1
2,180,798 UART: [kat] SHA2-256
2,181,462 UART: [kat] SHA2-384
2,182,117 UART: [kat] SHA2-512-ACC
2,182,997 UART: [kat] ECC-384
3,286,250 UART: [kat] HMAC-384Kdf
3,300,485 UART: [kat] LMS
3,829,950 UART: [kat] --
3,833,722 UART: [cold-reset] ++
3,835,378 UART: [fht] FHT @ 0x50003400
3,845,605 UART: [idev] ++
3,846,174 UART: [idev] CDI.KEYID = 6
3,847,140 UART: [idev] SUBJECT.KEYID = 7
3,848,293 UART: [idev] UDS.KEYID = 0
3,866,425 UART: [idev] Erasing UDS.KEYID = 0
6,321,022 UART: [idev] Sha1 KeyId Algorithm
6,343,927 UART: [idev] --
6,347,814 UART: [ldev] ++
6,348,377 UART: [ldev] CDI.KEYID = 6
6,349,253 UART: [ldev] SUBJECT.KEYID = 5
6,350,463 UART: [ldev] AUTHORITY.KEYID = 7
6,351,768 UART: [ldev] FE.KEYID = 1
6,362,170 UART: [ldev] Erasing FE.KEYID = 1
8,835,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,290 UART: [ldev] --
10,628,051 UART: [fwproc] Wait for Commands...
10,630,478 UART: [fwproc] Recv command 0x46574c44
10,632,574 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,767 UART: ROM Fatal Error: 0x000B0029
14,030,855 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,021,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,823,402 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,021,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,632 UART:
2,166,028 UART: Running Caliptra ROM ...
2,167,204 UART:
2,167,376 UART: [state] CFI Enabled
2,168,343 UART: [state] LifecycleState = Unprovisioned
2,170,011 UART: [state] DebugLocked = No
2,171,128 UART: [state] WD Timer not started. Device not locked for debugging
2,173,611 UART: [kat] SHA2-256
2,174,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,287 UART: [kat] ++
2,177,738 UART: [kat] sha1
2,178,337 UART: [kat] SHA2-256
2,179,003 UART: [kat] SHA2-384
2,179,664 UART: [kat] SHA2-512-ACC
2,180,495 UART: [kat] ECC-384
2,946,410 UART: [kat] HMAC-384Kdf
2,970,681 UART: [kat] LMS
3,500,135 UART: [kat] --
3,505,612 UART: [cold-reset] ++
3,506,736 UART: [fht] FHT @ 0x50003400
3,518,908 UART: [idev] ++
3,519,493 UART: [idev] CDI.KEYID = 6
3,520,382 UART: [idev] SUBJECT.KEYID = 7
3,521,596 UART: [idev] UDS.KEYID = 0
3,542,485 UART: [idev] Erasing UDS.KEYID = 0
6,021,432 UART: [idev] Sha1 KeyId Algorithm
6,043,697 UART: [idev] --
6,048,931 UART: [ldev] ++
6,049,503 UART: [ldev] CDI.KEYID = 6
6,050,410 UART: [ldev] SUBJECT.KEYID = 5
6,051,628 UART: [ldev] AUTHORITY.KEYID = 7
6,052,861 UART: [ldev] FE.KEYID = 1
6,098,118 UART: [ldev] Erasing FE.KEYID = 1
8,606,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,918 UART: [ldev] --
10,412,324 UART: [fwproc] Wait for Commands...
10,414,965 UART: [fwproc] Recv command 0x46574c44
10,417,066 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,907 UART: ROM Fatal Error: 0x000B0029
13,824,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,019,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,605,560 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,021,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,380 UART:
2,166,782 UART: Running Caliptra ROM ...
2,167,860 UART:
2,168,015 UART: [state] CFI Enabled
2,168,924 UART: [state] LifecycleState = Unprovisioned
2,170,571 UART: [state] DebugLocked = No
2,171,599 UART: [state] WD Timer not started. Device not locked for debugging
2,174,091 UART: [kat] SHA2-256
2,174,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,773 UART: [kat] ++
2,178,218 UART: [kat] sha1
2,178,725 UART: [kat] SHA2-256
2,179,380 UART: [kat] SHA2-384
2,180,033 UART: [kat] SHA2-512-ACC
2,180,862 UART: [kat] ECC-384
3,277,257 UART: [kat] HMAC-384Kdf
3,290,131 UART: [kat] LMS
3,819,593 UART: [kat] --
3,824,178 UART: [cold-reset] ++
3,826,218 UART: [fht] FHT @ 0x50003400
3,838,053 UART: [idev] ++
3,838,615 UART: [idev] CDI.KEYID = 6
3,839,526 UART: [idev] SUBJECT.KEYID = 7
3,840,758 UART: [idev] UDS.KEYID = 0
3,854,841 UART: [idev] Erasing UDS.KEYID = 0
6,313,034 UART: [idev] Sha1 KeyId Algorithm
6,335,688 UART: [idev] --
6,339,198 UART: [ldev] ++
6,339,764 UART: [ldev] CDI.KEYID = 6
6,340,729 UART: [ldev] SUBJECT.KEYID = 5
6,341,883 UART: [ldev] AUTHORITY.KEYID = 7
6,343,108 UART: [ldev] FE.KEYID = 1
6,354,460 UART: [ldev] Erasing FE.KEYID = 1
8,830,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,214 UART: [ldev] --
10,622,281 UART: [fwproc] Wait for Commands...
10,625,090 UART: [fwproc] Recv command 0x46574c44
10,627,191 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,489 UART: ROM Fatal Error: 0x000B0029
14,038,628 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
2,021,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,821,012 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,696 UART: [ldev] ++
1,208,864 UART: [ldev] CDI.KEYID = 6
1,209,228 UART: [ldev] SUBJECT.KEYID = 5
1,209,655 UART: [ldev] AUTHORITY.KEYID = 7
1,210,118 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,307 UART: ROM Fatal Error: 0x000B0029
2,582,464 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,631 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,905 UART: [state] LifecycleState = Unprovisioned
85,560 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,223 UART: [kat] SHA2-256
890,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,902 UART: [kat] ++
895,054 UART: [kat] sha1
899,156 UART: [kat] SHA2-256
901,096 UART: [kat] SHA2-384
903,989 UART: [kat] SHA2-512-ACC
905,890 UART: [kat] ECC-384
915,605 UART: [kat] HMAC-384Kdf
920,213 UART: [kat] LMS
1,168,525 UART: [kat] --
1,169,434 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,410 UART: ROM Fatal Error: 0x000B0029
2,581,567 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,731 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,403 UART: [idev] --
1,209,430 UART: [ldev] ++
1,209,598 UART: [ldev] CDI.KEYID = 6
1,209,962 UART: [ldev] SUBJECT.KEYID = 5
1,210,389 UART: [ldev] AUTHORITY.KEYID = 7
1,210,852 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,456 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,123 UART: ROM Fatal Error: 0x000B0029
2,582,280 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,637 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,555 UART: [kat] HMAC-384Kdf
920,261 UART: [kat] LMS
1,168,573 UART: [kat] --
1,169,332 UART: [cold-reset] ++
1,169,756 UART: [fht] FHT @ 0x50003400
1,172,428 UART: [idev] ++
1,172,596 UART: [idev] CDI.KEYID = 6
1,172,957 UART: [idev] SUBJECT.KEYID = 7
1,173,382 UART: [idev] UDS.KEYID = 0
1,181,650 UART: [idev] Erasing UDS.KEYID = 0
1,198,586 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,713 UART: [ldev] ++
1,208,881 UART: [ldev] CDI.KEYID = 6
1,209,245 UART: [ldev] SUBJECT.KEYID = 5
1,209,672 UART: [ldev] AUTHORITY.KEYID = 7
1,210,135 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,241,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,215 UART: [ldev] --
1,280,655 UART: [fwproc] Wait for Commands...
1,281,424 UART: [fwproc] Recv command 0x46574c44
1,282,157 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,820 UART: ROM Fatal Error: 0x000B0029
2,580,977 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,302 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
85,855 UART: [state] WD Timer not started. Device not locked for debugging
87,124 UART: [kat] SHA2-256
890,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,803 UART: [kat] ++
894,955 UART: [kat] sha1
899,401 UART: [kat] SHA2-256
901,341 UART: [kat] SHA2-384
904,188 UART: [kat] SHA2-512-ACC
906,089 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,150 UART: [kat] LMS
1,168,462 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,169,979 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,131 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,474 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,375 UART: ROM Fatal Error: 0x000B0029
2,580,532 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,133 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,465 UART: [kat] SHA2-256
892,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,144 UART: [kat] ++
896,296 UART: [kat] sha1
900,650 UART: [kat] SHA2-256
902,590 UART: [kat] SHA2-384
905,287 UART: [kat] SHA2-512-ACC
907,188 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,537 UART: [kat] LMS
1,169,849 UART: [kat] --
1,170,838 UART: [cold-reset] ++
1,171,302 UART: [fht] FHT @ 0x50003400
1,173,908 UART: [idev] ++
1,174,076 UART: [idev] CDI.KEYID = 6
1,174,437 UART: [idev] SUBJECT.KEYID = 7
1,174,862 UART: [idev] UDS.KEYID = 0
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,200,490 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,393 UART: [ldev] --
1,282,679 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,203 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,272 UART: ROM Fatal Error: 0x000B0029
2,582,429 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,008 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,023,725 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,946 UART:
2,168,344 UART: Running Caliptra ROM ...
2,169,523 UART:
2,169,694 UART: [state] CFI Enabled
2,170,663 UART: [state] LifecycleState = Unprovisioned
2,172,310 UART: [state] DebugLocked = No
2,173,414 UART: [state] WD Timer not started. Device not locked for debugging
2,175,879 UART: [kat] SHA2-256
2,176,568 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,588 UART: [kat] ++
2,180,042 UART: [kat] sha1
2,180,595 UART: [kat] SHA2-256
2,181,281 UART: [kat] SHA2-384
2,181,941 UART: [kat] SHA2-512-ACC
2,182,826 UART: [kat] ECC-384
3,776,762 UART: [kat] HMAC-384Kdf
3,803,371 UART: [kat] LMS
4,876,539 UART: [kat] --
4,881,372 UART: [cold-reset] ++
4,882,659 UART: [fht] FHT @ 0x50003400
4,894,304 UART: [idev] ++
4,894,972 UART: [idev] CDI.KEYID = 6
4,896,129 UART: [idev] SUBJECT.KEYID = 7
4,897,347 UART: [idev] UDS.KEYID = 0
4,929,642 UART: [idev] Erasing UDS.KEYID = 0
8,244,141 UART: [idev] Sha1 KeyId Algorithm
8,266,729 UART: [idev] --
8,270,995 UART: [ldev] ++
8,271,560 UART: [ldev] CDI.KEYID = 6
8,272,720 UART: [ldev] SUBJECT.KEYID = 5
8,273,931 UART: [ldev] AUTHORITY.KEYID = 7
8,275,080 UART: [ldev] FE.KEYID = 1
8,316,758 UART: [ldev] Erasing FE.KEYID = 1
11,650,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,955 UART: [ldev] --
14,036,767 UART: [fwproc] Wait for Commands...
14,039,319 UART: [fwproc] Recv command 0x46574c44
14,041,686 UART: [fwproc] Recv'd Img size: 114124 bytes
18,108,779 UART: ROM Fatal Error: 0x000B0028
18,112,188 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,023,367 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,894,082 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,026,027 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,265 UART:
2,170,665 UART: Running Caliptra ROM ...
2,171,834 UART:
2,172,002 UART: [state] CFI Enabled
2,172,970 UART: [state] LifecycleState = Unprovisioned
2,174,610 UART: [state] DebugLocked = No
2,175,711 UART: [state] WD Timer not started. Device not locked for debugging
2,178,407 UART: [kat] SHA2-256
2,179,080 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,093 UART: [kat] ++
2,182,545 UART: [kat] sha1
2,183,052 UART: [kat] SHA2-256
2,183,790 UART: [kat] SHA2-384
2,184,450 UART: [kat] SHA2-512-ACC
2,185,327 UART: [kat] ECC-384
4,100,250 UART: [kat] HMAC-384Kdf
4,112,014 UART: [kat] LMS
5,185,179 UART: [kat] --
5,190,703 UART: [cold-reset] ++
5,192,911 UART: [fht] FHT @ 0x50003400
5,205,075 UART: [idev] ++
5,205,750 UART: [idev] CDI.KEYID = 6
5,206,928 UART: [idev] SUBJECT.KEYID = 7
5,208,410 UART: [idev] UDS.KEYID = 0
5,224,181 UART: [idev] Erasing UDS.KEYID = 0
8,500,379 UART: [idev] Sha1 KeyId Algorithm
8,521,511 UART: [idev] --
8,524,960 UART: [ldev] ++
8,525,527 UART: [ldev] CDI.KEYID = 6
8,526,759 UART: [ldev] SUBJECT.KEYID = 5
8,528,184 UART: [ldev] AUTHORITY.KEYID = 7
8,529,761 UART: [ldev] FE.KEYID = 1
8,541,164 UART: [ldev] Erasing FE.KEYID = 1
11,837,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,129,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,146,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,162,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,178,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,200,403 UART: [ldev] --
14,205,773 UART: [fwproc] Wait for Commands...
14,207,546 UART: [fwproc] Recv command 0x46574c44
14,209,868 UART: [fwproc] Recv'd Img size: 114124 bytes
18,281,883 UART: ROM Fatal Error: 0x000B0028
18,285,350 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,026,880 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,803 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,025,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,763 UART:
2,170,140 UART: Running Caliptra ROM ...
2,171,306 UART:
2,171,488 UART: [state] CFI Enabled
2,172,455 UART: [state] LifecycleState = Unprovisioned
2,174,103 UART: [state] DebugLocked = No
2,175,128 UART: [state] WD Timer not started. Device not locked for debugging
2,177,599 UART: [kat] SHA2-256
2,178,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,272 UART: [kat] ++
2,181,720 UART: [kat] sha1
2,182,247 UART: [kat] SHA2-256
2,182,909 UART: [kat] SHA2-384
2,183,564 UART: [kat] SHA2-512-ACC
2,184,397 UART: [kat] ECC-384
2,949,369 UART: [kat] HMAC-384Kdf
2,973,810 UART: [kat] LMS
3,503,220 UART: [kat] --
3,506,022 UART: [cold-reset] ++
3,507,844 UART: [fht] FHT @ 0x50003400
3,519,956 UART: [idev] ++
3,520,525 UART: [idev] CDI.KEYID = 6
3,521,461 UART: [idev] SUBJECT.KEYID = 7
3,522,676 UART: [idev] UDS.KEYID = 0
3,545,167 UART: [idev] Erasing UDS.KEYID = 0
6,026,473 UART: [idev] Sha1 KeyId Algorithm
6,049,221 UART: [idev] --
6,053,161 UART: [ldev] ++
6,053,749 UART: [ldev] CDI.KEYID = 6
6,054,638 UART: [ldev] SUBJECT.KEYID = 5
6,055,753 UART: [ldev] AUTHORITY.KEYID = 7
6,057,106 UART: [ldev] FE.KEYID = 1
6,100,781 UART: [ldev] Erasing FE.KEYID = 1
8,603,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,662 UART: [ldev] --
10,417,008 UART: [fwproc] Wait for Commands...
10,419,706 UART: [fwproc] Recv command 0x46574c44
10,421,754 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,747 UART: ROM Fatal Error: 0x000B0028
13,823,871 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,028,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,612,920 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,025,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,658 UART:
2,171,072 UART: Running Caliptra ROM ...
2,172,246 UART:
2,172,422 UART: [state] CFI Enabled
2,173,390 UART: [state] LifecycleState = Unprovisioned
2,175,037 UART: [state] DebugLocked = No
2,176,141 UART: [state] WD Timer not started. Device not locked for debugging
2,178,616 UART: [kat] SHA2-256
2,179,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,301 UART: [kat] ++
2,182,752 UART: [kat] sha1
2,183,347 UART: [kat] SHA2-256
2,184,009 UART: [kat] SHA2-384
2,184,670 UART: [kat] SHA2-512-ACC
2,185,549 UART: [kat] ECC-384
3,283,687 UART: [kat] HMAC-384Kdf
3,295,578 UART: [kat] LMS
3,825,072 UART: [kat] --
3,828,584 UART: [cold-reset] ++
3,829,596 UART: [fht] FHT @ 0x50003400
3,840,792 UART: [idev] ++
3,841,364 UART: [idev] CDI.KEYID = 6
3,842,380 UART: [idev] SUBJECT.KEYID = 7
3,843,481 UART: [idev] UDS.KEYID = 0
3,861,728 UART: [idev] Erasing UDS.KEYID = 0
6,319,488 UART: [idev] Sha1 KeyId Algorithm
6,342,601 UART: [idev] --
6,347,219 UART: [ldev] ++
6,347,792 UART: [ldev] CDI.KEYID = 6
6,348,669 UART: [ldev] SUBJECT.KEYID = 5
6,349,880 UART: [ldev] AUTHORITY.KEYID = 7
6,351,111 UART: [ldev] FE.KEYID = 1
6,362,233 UART: [ldev] Erasing FE.KEYID = 1
8,833,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,176 UART: [ldev] --
10,626,431 UART: [fwproc] Wait for Commands...
10,628,574 UART: [fwproc] Recv command 0x46574c44
10,630,672 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,336 UART: ROM Fatal Error: 0x000B0028
14,037,473 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,025,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,804,901 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,032,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,178,233 UART:
2,178,732 UART: Running Caliptra ROM ...
2,179,822 UART:
2,179,990 UART: [state] CFI Enabled
2,180,976 UART: [state] LifecycleState = Unprovisioned
2,182,636 UART: [state] DebugLocked = No
2,183,742 UART: [state] WD Timer not started. Device not locked for debugging
2,186,224 UART: [kat] SHA2-256
2,186,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,908 UART: [kat] ++
2,190,358 UART: [kat] sha1
2,190,870 UART: [kat] SHA2-256
2,191,558 UART: [kat] SHA2-384
2,192,217 UART: [kat] SHA2-512-ACC
2,193,037 UART: [kat] ECC-384
2,947,168 UART: [kat] HMAC-384Kdf
2,972,257 UART: [kat] LMS
3,501,735 UART: [kat] --
3,505,781 UART: [cold-reset] ++
3,507,657 UART: [fht] FHT @ 0x50003400
3,518,799 UART: [idev] ++
3,519,413 UART: [idev] CDI.KEYID = 6
3,520,325 UART: [idev] SUBJECT.KEYID = 7
3,521,488 UART: [idev] UDS.KEYID = 0
3,543,616 UART: [idev] Erasing UDS.KEYID = 0
6,026,245 UART: [idev] Sha1 KeyId Algorithm
6,048,497 UART: [idev] --
6,050,972 UART: [ldev] ++
6,051,540 UART: [ldev] CDI.KEYID = 6
6,052,446 UART: [ldev] SUBJECT.KEYID = 5
6,053,619 UART: [ldev] AUTHORITY.KEYID = 7
6,054,875 UART: [ldev] FE.KEYID = 1
6,101,315 UART: [ldev] Erasing FE.KEYID = 1
8,601,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,006 UART: [ldev] --
10,414,901 UART: [fwproc] Wait for Commands...
10,416,899 UART: [fwproc] Recv command 0x46574c44
10,418,944 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,415 UART: ROM Fatal Error: 0x000B0028
13,822,545 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,025,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,610,690 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,519 writing to cptra_bootfsm_go
2,025,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,614 UART:
2,171,018 UART: Running Caliptra ROM ...
2,172,122 UART:
2,172,279 UART: [state] CFI Enabled
2,173,247 UART: [state] LifecycleState = Unprovisioned
2,174,893 UART: [state] DebugLocked = No
2,175,917 UART: [state] WD Timer not started. Device not locked for debugging
2,178,389 UART: [kat] SHA2-256
2,179,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,073 UART: [kat] ++
2,182,527 UART: [kat] sha1
2,183,038 UART: [kat] SHA2-256
2,183,697 UART: [kat] SHA2-384
2,184,353 UART: [kat] SHA2-512-ACC
2,185,349 UART: [kat] ECC-384
3,278,372 UART: [kat] HMAC-384Kdf
3,292,422 UART: [kat] LMS
3,821,962 UART: [kat] --
3,827,358 UART: [cold-reset] ++
3,829,050 UART: [fht] FHT @ 0x50003400
3,841,074 UART: [idev] ++
3,841,647 UART: [idev] CDI.KEYID = 6
3,842,526 UART: [idev] SUBJECT.KEYID = 7
3,843,691 UART: [idev] UDS.KEYID = 0
3,859,800 UART: [idev] Erasing UDS.KEYID = 0
6,317,397 UART: [idev] Sha1 KeyId Algorithm
6,339,362 UART: [idev] --
6,343,471 UART: [ldev] ++
6,344,048 UART: [ldev] CDI.KEYID = 6
6,344,962 UART: [ldev] SUBJECT.KEYID = 5
6,346,126 UART: [ldev] AUTHORITY.KEYID = 7
6,347,355 UART: [ldev] FE.KEYID = 1
6,356,541 UART: [ldev] Erasing FE.KEYID = 1
8,830,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,149 UART: [ldev] --
10,621,543 UART: [fwproc] Wait for Commands...
10,623,315 UART: [fwproc] Recv command 0x46574c44
10,625,462 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,418 UART: ROM Fatal Error: 0x000B0028
14,025,545 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
2,026,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,812,163 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,072 UART: [ldev] --
1,281,378 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x46574c44
1,282,792 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,941 UART: ROM Fatal Error: 0x000B0028
2,582,098 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,445 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,181,642 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,688 UART: [idev] --
1,208,847 UART: [ldev] ++
1,209,015 UART: [ldev] CDI.KEYID = 6
1,209,379 UART: [ldev] SUBJECT.KEYID = 5
1,209,806 UART: [ldev] AUTHORITY.KEYID = 7
1,210,269 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,727 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,768 UART: ROM Fatal Error: 0x000B0028
2,581,925 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,558 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,261 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,589 UART: [idev] Sha1 KeyId Algorithm
1,208,449 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,997 UART: ROM Fatal Error: 0x000B0028
2,583,154 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,253 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,319 UART: [kat] LMS
1,168,631 UART: [kat] --
1,169,570 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,181,234 UART: [idev] Erasing UDS.KEYID = 0
1,197,916 UART: [idev] Sha1 KeyId Algorithm
1,206,734 UART: [idev] --
1,207,721 UART: [ldev] ++
1,207,889 UART: [ldev] CDI.KEYID = 6
1,208,253 UART: [ldev] SUBJECT.KEYID = 5
1,208,680 UART: [ldev] AUTHORITY.KEYID = 7
1,209,143 UART: [ldev] FE.KEYID = 1
1,214,245 UART: [ldev] Erasing FE.KEYID = 1
1,240,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,833 UART: [ldev] --
1,280,139 UART: [fwproc] Wait for Commands...
1,280,930 UART: [fwproc] Recv command 0x46574c44
1,281,663 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,576 UART: ROM Fatal Error: 0x000B0028
2,580,733 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,672 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,182,315 UART: [idev] Erasing UDS.KEYID = 0
1,199,451 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,262 UART: [ldev] ++
1,209,430 UART: [ldev] CDI.KEYID = 6
1,209,794 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,884 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,993 UART: ROM Fatal Error: 0x000B0028
2,582,150 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,265 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,832 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,919 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,914 UART: ROM Fatal Error: 0x000B0028
2,582,071 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,917 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
5,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,117 UART:
192,500 UART: Running Caliptra ROM ...
193,585 UART:
193,725 UART: [state] CFI Enabled
264,127 UART: [state] LifecycleState = Manufacturing
266,531 UART: [state] DebugLocked = No
269,283 UART: [state] WD Timer not started. Device not locked for debugging
273,495 UART: [kat] SHA2-256
455,398 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,923 UART: [kat] ++
467,432 UART: [kat] sha1
479,338 UART: [kat] SHA2-256
482,363 UART: [kat] SHA2-384
488,983 UART: [kat] SHA2-512-ACC
491,596 UART: [kat] ECC-384
3,775,601 UART: [kat] HMAC-384Kdf
3,802,012 UART: [kat] LMS
4,875,157 UART: [kat] --
4,879,122 UART: [cold-reset] ++
4,880,734 UART: [fht] FHT @ 0x50003400
4,892,738 UART: [idev] ++
4,893,421 UART: [idev] CDI.KEYID = 6
4,894,658 UART: [idev] SUBJECT.KEYID = 7
4,895,819 UART: [idev] UDS.KEYID = 0
4,929,419 UART: [idev] Erasing UDS.KEYID = 0
8,244,725 UART: [idev] Sha1 KeyId Algorithm
8,268,496 UART: [idev] --
8,271,087 UART: [ldev] ++
8,271,677 UART: [ldev] CDI.KEYID = 6
8,272,862 UART: [ldev] SUBJECT.KEYID = 5
8,274,034 UART: [ldev] AUTHORITY.KEYID = 7
8,275,193 UART: [ldev] FE.KEYID = 1
8,317,382 UART: [ldev] Erasing FE.KEYID = 1
11,651,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,096 UART: [ldev] --
14,036,184 UART: [fwproc] Wait for Commands...
14,038,374 UART: [fwproc] Recv command 0x46574c44
14,040,700 UART: [fwproc] Recv'd Img size: 114124 bytes
18,141,931 UART: ROM Fatal Error: 0x000B002C
18,145,333 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
5,533 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,945,442 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
6,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,563 UART:
192,937 UART: Running Caliptra ROM ...
194,104 UART:
603,649 UART: [state] CFI Enabled
614,692 UART: [state] LifecycleState = Manufacturing
617,000 UART: [state] DebugLocked = No
618,264 UART: [state] WD Timer not started. Device not locked for debugging
621,771 UART: [kat] SHA2-256
803,749 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,251 UART: [kat] ++
815,753 UART: [kat] sha1
825,384 UART: [kat] SHA2-256
828,437 UART: [kat] SHA2-384
834,414 UART: [kat] SHA2-512-ACC
837,018 UART: [kat] ECC-384
4,092,901 UART: [kat] HMAC-384Kdf
4,105,197 UART: [kat] LMS
5,178,332 UART: [kat] --
5,184,546 UART: [cold-reset] ++
5,187,018 UART: [fht] FHT @ 0x50003400
5,198,810 UART: [idev] ++
5,199,542 UART: [idev] CDI.KEYID = 6
5,200,743 UART: [idev] SUBJECT.KEYID = 7
5,202,176 UART: [idev] UDS.KEYID = 0
5,219,188 UART: [idev] Erasing UDS.KEYID = 0
8,492,219 UART: [idev] Sha1 KeyId Algorithm
8,513,881 UART: [idev] --
8,517,826 UART: [ldev] ++
8,518,389 UART: [ldev] CDI.KEYID = 6
8,519,547 UART: [ldev] SUBJECT.KEYID = 5
8,521,082 UART: [ldev] AUTHORITY.KEYID = 7
8,522,562 UART: [ldev] FE.KEYID = 1
8,532,504 UART: [ldev] Erasing FE.KEYID = 1
11,820,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,435 UART: [ldev] --
14,187,065 UART: [fwproc] Wait for Commands...
14,189,442 UART: [fwproc] Recv command 0x46574c44
14,191,759 UART: [fwproc] Recv'd Img size: 114124 bytes
18,295,286 UART: ROM Fatal Error: 0x000B002C
18,298,689 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
6,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,110,462 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,313 UART:
192,670 UART: Running Caliptra ROM ...
193,836 UART:
194,005 UART: [state] CFI Enabled
262,730 UART: [state] LifecycleState = Manufacturing
264,614 UART: [state] DebugLocked = No
267,187 UART: [state] WD Timer not started. Device not locked for debugging
271,292 UART: [kat] SHA2-256
450,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,982 UART: [kat] ++
462,439 UART: [kat] sha1
472,452 UART: [kat] SHA2-256
475,515 UART: [kat] SHA2-384
481,493 UART: [kat] SHA2-512-ACC
484,433 UART: [kat] ECC-384
2,948,313 UART: [kat] HMAC-384Kdf
2,971,461 UART: [kat] LMS
3,500,883 UART: [kat] --
3,506,203 UART: [cold-reset] ++
3,507,837 UART: [fht] FHT @ 0x50003400
3,519,481 UART: [idev] ++
3,520,050 UART: [idev] CDI.KEYID = 6
3,520,936 UART: [idev] SUBJECT.KEYID = 7
3,522,148 UART: [idev] UDS.KEYID = 0
3,543,340 UART: [idev] Erasing UDS.KEYID = 0
6,027,169 UART: [idev] Sha1 KeyId Algorithm
6,049,054 UART: [idev] --
6,052,837 UART: [ldev] ++
6,053,409 UART: [ldev] CDI.KEYID = 6
6,054,290 UART: [ldev] SUBJECT.KEYID = 5
6,055,507 UART: [ldev] AUTHORITY.KEYID = 7
6,056,744 UART: [ldev] FE.KEYID = 1
6,098,266 UART: [ldev] Erasing FE.KEYID = 1
8,602,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,118 UART: [ldev] --
10,410,841 UART: [fwproc] Wait for Commands...
10,412,611 UART: [fwproc] Recv command 0x46574c44
10,414,706 UART: [fwproc] Recv'd Img size: 114448 bytes
13,848,444 UART: ROM Fatal Error: 0x000B002C
13,851,573 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
5,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,617,019 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,827 writing to cptra_bootfsm_go
7,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,912 UART:
194,285 UART: Running Caliptra ROM ...
195,449 UART:
605,019 UART: [state] CFI Enabled
620,709 UART: [state] LifecycleState = Manufacturing
622,553 UART: [state] DebugLocked = No
625,526 UART: [state] WD Timer not started. Device not locked for debugging
629,151 UART: [kat] SHA2-256
808,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,868 UART: [kat] ++
820,317 UART: [kat] sha1
831,730 UART: [kat] SHA2-256
834,730 UART: [kat] SHA2-384
840,723 UART: [kat] SHA2-512-ACC
843,652 UART: [kat] ECC-384
3,283,562 UART: [kat] HMAC-384Kdf
3,296,598 UART: [kat] LMS
3,826,117 UART: [kat] --
3,831,565 UART: [cold-reset] ++
3,833,980 UART: [fht] FHT @ 0x50003400
3,844,530 UART: [idev] ++
3,845,134 UART: [idev] CDI.KEYID = 6
3,846,055 UART: [idev] SUBJECT.KEYID = 7
3,847,218 UART: [idev] UDS.KEYID = 0
3,865,888 UART: [idev] Erasing UDS.KEYID = 0
6,325,799 UART: [idev] Sha1 KeyId Algorithm
6,349,891 UART: [idev] --
6,354,043 UART: [ldev] ++
6,354,619 UART: [ldev] CDI.KEYID = 6
6,355,547 UART: [ldev] SUBJECT.KEYID = 5
6,356,703 UART: [ldev] AUTHORITY.KEYID = 7
6,357,983 UART: [ldev] FE.KEYID = 1
6,368,523 UART: [ldev] Erasing FE.KEYID = 1
8,837,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,660 UART: [ldev] --
10,632,704 UART: [fwproc] Wait for Commands...
10,635,887 UART: [fwproc] Recv command 0x46574c44
10,637,982 UART: [fwproc] Recv'd Img size: 114448 bytes
14,065,418 UART: ROM Fatal Error: 0x000B002C
14,068,560 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
6,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,856,701 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
5,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,159 UART:
192,556 UART: Running Caliptra ROM ...
193,734 UART:
193,890 UART: [state] CFI Enabled
267,780 UART: [state] LifecycleState = Manufacturing
269,684 UART: [state] DebugLocked = No
271,780 UART: [state] WD Timer not started. Device not locked for debugging
276,093 UART: [kat] SHA2-256
455,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,755 UART: [kat] ++
467,206 UART: [kat] sha1
477,870 UART: [kat] SHA2-256
480,884 UART: [kat] SHA2-384
487,835 UART: [kat] SHA2-512-ACC
490,774 UART: [kat] ECC-384
2,950,092 UART: [kat] HMAC-384Kdf
2,973,529 UART: [kat] LMS
3,502,970 UART: [kat] --
3,507,238 UART: [cold-reset] ++
3,509,769 UART: [fht] FHT @ 0x50003400
3,520,913 UART: [idev] ++
3,521,498 UART: [idev] CDI.KEYID = 6
3,522,427 UART: [idev] SUBJECT.KEYID = 7
3,523,587 UART: [idev] UDS.KEYID = 0
3,543,724 UART: [idev] Erasing UDS.KEYID = 0
6,027,024 UART: [idev] Sha1 KeyId Algorithm
6,050,959 UART: [idev] --
6,055,388 UART: [ldev] ++
6,055,960 UART: [ldev] CDI.KEYID = 6
6,056,869 UART: [ldev] SUBJECT.KEYID = 5
6,058,089 UART: [ldev] AUTHORITY.KEYID = 7
6,059,327 UART: [ldev] FE.KEYID = 1
6,100,828 UART: [ldev] Erasing FE.KEYID = 1
8,600,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,599 UART: [ldev] --
10,391,734 UART: [fwproc] Wait for Commands...
10,393,559 UART: [fwproc] Recv command 0x46574c44
10,395,653 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,908 UART: ROM Fatal Error: 0x000B002C
13,832,982 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
5,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,640,225 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
6,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,519 UART:
192,899 UART: Running Caliptra ROM ...
193,980 UART:
603,666 UART: [state] CFI Enabled
616,858 UART: [state] LifecycleState = Manufacturing
618,696 UART: [state] DebugLocked = No
621,159 UART: [state] WD Timer not started. Device not locked for debugging
625,135 UART: [kat] SHA2-256
804,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,831 UART: [kat] ++
816,278 UART: [kat] sha1
826,884 UART: [kat] SHA2-256
829,891 UART: [kat] SHA2-384
834,750 UART: [kat] SHA2-512-ACC
837,684 UART: [kat] ECC-384
3,278,183 UART: [kat] HMAC-384Kdf
3,290,258 UART: [kat] LMS
3,819,743 UART: [kat] --
3,824,145 UART: [cold-reset] ++
3,825,674 UART: [fht] FHT @ 0x50003400
3,835,312 UART: [idev] ++
3,835,876 UART: [idev] CDI.KEYID = 6
3,836,813 UART: [idev] SUBJECT.KEYID = 7
3,838,023 UART: [idev] UDS.KEYID = 0
3,853,440 UART: [idev] Erasing UDS.KEYID = 0
6,311,330 UART: [idev] Sha1 KeyId Algorithm
6,333,704 UART: [idev] --
6,338,181 UART: [ldev] ++
6,338,745 UART: [ldev] CDI.KEYID = 6
6,339,702 UART: [ldev] SUBJECT.KEYID = 5
6,340,860 UART: [ldev] AUTHORITY.KEYID = 7
6,342,146 UART: [ldev] FE.KEYID = 1
6,353,493 UART: [ldev] Erasing FE.KEYID = 1
8,828,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,399 UART: [ldev] --
10,617,765 UART: [fwproc] Wait for Commands...
10,619,429 UART: [fwproc] Recv command 0x46574c44
10,621,525 UART: [fwproc] Recv'd Img size: 114448 bytes
14,060,751 UART: ROM Fatal Error: 0x000B002C
14,063,848 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
5,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,840,834 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Manufacturing
85,827 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,170,197 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,798 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,105 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,530 UART: ROM Fatal Error: 0x000B002C
2,606,689 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,146 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Manufacturing
86,034 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,282,113 UART: [fwproc] Wait for Commands...
1,282,742 UART: [fwproc] Recv command 0x46574c44
1,283,475 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,275 UART: ROM Fatal Error: 0x000B002C
2,608,434 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,319 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Manufacturing
85,375 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,522 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,931 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,181,361 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,322 UART: [ldev] --
1,280,678 UART: [fwproc] Wait for Commands...
1,281,453 UART: [fwproc] Recv command 0x46574c44
1,282,186 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,764 UART: ROM Fatal Error: 0x000B002C
2,606,923 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,457,278 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Manufacturing
86,214 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
917,251 UART: [kat] HMAC-384Kdf
921,851 UART: [kat] LMS
1,170,163 UART: [kat] --
1,171,044 UART: [cold-reset] ++
1,171,442 UART: [fht] FHT @ 0x50003400
1,174,224 UART: [idev] ++
1,174,392 UART: [idev] CDI.KEYID = 6
1,174,753 UART: [idev] SUBJECT.KEYID = 7
1,175,178 UART: [idev] UDS.KEYID = 0
1,183,432 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,330 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,217,177 UART: [ldev] Erasing FE.KEYID = 1
1,243,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,507 UART: [ldev] --
1,283,003 UART: [fwproc] Wait for Commands...
1,283,630 UART: [fwproc] Recv command 0x46574c44
1,284,363 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,431 UART: ROM Fatal Error: 0x000B002C
2,608,590 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,701 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Manufacturing
85,679 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,735 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,181,281 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,215,194 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,544 UART: [fwproc] Wait for Commands...
1,281,183 UART: [fwproc] Recv command 0x46574c44
1,281,916 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,812 UART: ROM Fatal Error: 0x000B002C
2,606,971 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,958 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Manufacturing
86,398 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
917,491 UART: [kat] HMAC-384Kdf
922,239 UART: [kat] LMS
1,170,551 UART: [kat] --
1,171,346 UART: [cold-reset] ++
1,171,846 UART: [fht] FHT @ 0x50003400
1,174,588 UART: [idev] ++
1,174,756 UART: [idev] CDI.KEYID = 6
1,175,117 UART: [idev] SUBJECT.KEYID = 7
1,175,542 UART: [idev] UDS.KEYID = 0
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,614 UART: [idev] Sha1 KeyId Algorithm
1,209,360 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,909 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,115 UART: [fwproc] Wait for Commands...
1,283,932 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,289 UART: ROM Fatal Error: 0x000B002C
2,609,448 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,847 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
5,250 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,016 UART:
192,409 UART: Running Caliptra ROM ...
193,580 UART:
193,740 UART: [state] CFI Enabled
265,695 UART: [state] LifecycleState = Manufacturing
268,101 UART: [state] DebugLocked = No
269,696 UART: [state] WD Timer not started. Device not locked for debugging
275,126 UART: [kat] SHA2-256
457,098 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,603 UART: [kat] ++
469,087 UART: [kat] sha1
479,918 UART: [kat] SHA2-256
482,984 UART: [kat] SHA2-384
488,521 UART: [kat] SHA2-512-ACC
491,127 UART: [kat] ECC-384
3,770,082 UART: [kat] HMAC-384Kdf
3,795,203 UART: [kat] LMS
4,868,345 UART: [kat] --
4,871,359 UART: [cold-reset] ++
4,873,726 UART: [fht] FHT @ 0x50003400
4,885,242 UART: [idev] ++
4,885,919 UART: [idev] CDI.KEYID = 6
4,887,076 UART: [idev] SUBJECT.KEYID = 7
4,888,311 UART: [idev] UDS.KEYID = 0
4,922,403 UART: [idev] Erasing UDS.KEYID = 0
8,234,983 UART: [idev] Sha1 KeyId Algorithm
8,257,990 UART: [idev] --
8,260,872 UART: [ldev] ++
8,261,443 UART: [ldev] CDI.KEYID = 6
8,262,680 UART: [ldev] SUBJECT.KEYID = 5
8,263,838 UART: [ldev] AUTHORITY.KEYID = 7
8,265,066 UART: [ldev] FE.KEYID = 1
8,310,278 UART: [ldev] Erasing FE.KEYID = 1
11,647,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,957,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,973,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,989,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,005,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,026,394 UART: [ldev] --
14,030,660 UART: [fwproc] Wait for Commands...
14,033,355 UART: [fwproc] Recv command 0x46574c44
14,035,665 UART: [fwproc] Recv'd Img size: 114124 bytes
18,136,798 UART: ROM Fatal Error: 0x000B002E
18,140,205 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
5,616 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,934,057 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
6,415 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,521 UART:
192,896 UART: Running Caliptra ROM ...
194,063 UART:
603,692 UART: [state] CFI Enabled
617,461 UART: [state] LifecycleState = Manufacturing
619,807 UART: [state] DebugLocked = No
621,643 UART: [state] WD Timer not started. Device not locked for debugging
626,899 UART: [kat] SHA2-256
808,867 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,427 UART: [kat] ++
820,925 UART: [kat] sha1
831,361 UART: [kat] SHA2-256
834,422 UART: [kat] SHA2-384
841,091 UART: [kat] SHA2-512-ACC
843,708 UART: [kat] ECC-384
4,100,448 UART: [kat] HMAC-384Kdf
4,113,396 UART: [kat] LMS
5,186,525 UART: [kat] --
5,190,249 UART: [cold-reset] ++
5,192,998 UART: [fht] FHT @ 0x50003400
5,205,167 UART: [idev] ++
5,205,847 UART: [idev] CDI.KEYID = 6
5,207,026 UART: [idev] SUBJECT.KEYID = 7
5,208,513 UART: [idev] UDS.KEYID = 0
5,224,875 UART: [idev] Erasing UDS.KEYID = 0
8,498,438 UART: [idev] Sha1 KeyId Algorithm
8,520,097 UART: [idev] --
8,524,793 UART: [ldev] ++
8,525,356 UART: [ldev] CDI.KEYID = 6
8,526,583 UART: [ldev] SUBJECT.KEYID = 5
8,528,010 UART: [ldev] AUTHORITY.KEYID = 7
8,529,589 UART: [ldev] FE.KEYID = 1
8,541,972 UART: [ldev] Erasing FE.KEYID = 1
11,835,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,963 UART: [ldev] --
14,203,059 UART: [fwproc] Wait for Commands...
14,205,754 UART: [fwproc] Recv command 0x46574c44
14,208,072 UART: [fwproc] Recv'd Img size: 114124 bytes
18,316,945 UART: ROM Fatal Error: 0x000B002E
18,320,352 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
6,308 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,121,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
5,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,244 UART:
192,618 UART: Running Caliptra ROM ...
193,798 UART:
193,952 UART: [state] CFI Enabled
266,275 UART: [state] LifecycleState = Manufacturing
268,156 UART: [state] DebugLocked = No
269,344 UART: [state] WD Timer not started. Device not locked for debugging
272,477 UART: [kat] SHA2-256
451,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,134 UART: [kat] ++
463,662 UART: [kat] sha1
474,780 UART: [kat] SHA2-256
477,786 UART: [kat] SHA2-384
483,016 UART: [kat] SHA2-512-ACC
485,955 UART: [kat] ECC-384
2,951,245 UART: [kat] HMAC-384Kdf
2,973,630 UART: [kat] LMS
3,503,111 UART: [kat] --
3,507,917 UART: [cold-reset] ++
3,509,787 UART: [fht] FHT @ 0x50003400
3,521,349 UART: [idev] ++
3,521,954 UART: [idev] CDI.KEYID = 6
3,522,885 UART: [idev] SUBJECT.KEYID = 7
3,524,057 UART: [idev] UDS.KEYID = 0
3,545,987 UART: [idev] Erasing UDS.KEYID = 0
6,028,782 UART: [idev] Sha1 KeyId Algorithm
6,052,449 UART: [idev] --
6,056,452 UART: [ldev] ++
6,057,086 UART: [ldev] CDI.KEYID = 6
6,057,983 UART: [ldev] SUBJECT.KEYID = 5
6,059,087 UART: [ldev] AUTHORITY.KEYID = 7
6,060,384 UART: [ldev] FE.KEYID = 1
6,102,023 UART: [ldev] Erasing FE.KEYID = 1
8,606,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,251 UART: [ldev] --
10,415,666 UART: [fwproc] Wait for Commands...
10,418,521 UART: [fwproc] Recv command 0x46574c44
10,420,563 UART: [fwproc] Recv'd Img size: 114448 bytes
13,856,505 UART: ROM Fatal Error: 0x000B002E
13,859,639 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,623,823 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
6,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,471 UART:
192,875 UART: Running Caliptra ROM ...
194,041 UART:
603,447 UART: [state] CFI Enabled
617,437 UART: [state] LifecycleState = Manufacturing
619,324 UART: [state] DebugLocked = No
620,760 UART: [state] WD Timer not started. Device not locked for debugging
624,963 UART: [kat] SHA2-256
804,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,699 UART: [kat] ++
816,146 UART: [kat] sha1
827,669 UART: [kat] SHA2-256
830,681 UART: [kat] SHA2-384
837,153 UART: [kat] SHA2-512-ACC
840,140 UART: [kat] ECC-384
3,280,072 UART: [kat] HMAC-384Kdf
3,292,957 UART: [kat] LMS
3,822,418 UART: [kat] --
3,827,111 UART: [cold-reset] ++
3,829,254 UART: [fht] FHT @ 0x50003400
3,841,415 UART: [idev] ++
3,841,974 UART: [idev] CDI.KEYID = 6
3,842,852 UART: [idev] SUBJECT.KEYID = 7
3,844,058 UART: [idev] UDS.KEYID = 0
3,859,985 UART: [idev] Erasing UDS.KEYID = 0
6,316,823 UART: [idev] Sha1 KeyId Algorithm
6,339,676 UART: [idev] --
6,342,434 UART: [ldev] ++
6,343,049 UART: [ldev] CDI.KEYID = 6
6,343,941 UART: [ldev] SUBJECT.KEYID = 5
6,345,099 UART: [ldev] AUTHORITY.KEYID = 7
6,346,352 UART: [ldev] FE.KEYID = 1
6,357,051 UART: [ldev] Erasing FE.KEYID = 1
8,830,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,027 UART: [ldev] --
10,620,710 UART: [fwproc] Wait for Commands...
10,623,454 UART: [fwproc] Recv command 0x46574c44
10,625,557 UART: [fwproc] Recv'd Img size: 114448 bytes
14,065,514 UART: ROM Fatal Error: 0x000B002E
14,068,653 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
6,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,840,359 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
5,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,012 UART:
192,393 UART: Running Caliptra ROM ...
193,478 UART:
193,619 UART: [state] CFI Enabled
264,406 UART: [state] LifecycleState = Manufacturing
266,301 UART: [state] DebugLocked = No
268,949 UART: [state] WD Timer not started. Device not locked for debugging
272,885 UART: [kat] SHA2-256
452,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,557 UART: [kat] ++
464,001 UART: [kat] sha1
474,070 UART: [kat] SHA2-256
477,148 UART: [kat] SHA2-384
483,123 UART: [kat] SHA2-512-ACC
486,060 UART: [kat] ECC-384
2,951,784 UART: [kat] HMAC-384Kdf
2,973,715 UART: [kat] LMS
3,503,187 UART: [kat] --
3,506,867 UART: [cold-reset] ++
3,508,425 UART: [fht] FHT @ 0x50003400
3,519,459 UART: [idev] ++
3,520,029 UART: [idev] CDI.KEYID = 6
3,520,972 UART: [idev] SUBJECT.KEYID = 7
3,522,181 UART: [idev] UDS.KEYID = 0
3,546,236 UART: [idev] Erasing UDS.KEYID = 0
6,028,086 UART: [idev] Sha1 KeyId Algorithm
6,050,944 UART: [idev] --
6,055,083 UART: [ldev] ++
6,055,662 UART: [ldev] CDI.KEYID = 6
6,056,549 UART: [ldev] SUBJECT.KEYID = 5
6,057,767 UART: [ldev] AUTHORITY.KEYID = 7
6,059,024 UART: [ldev] FE.KEYID = 1
6,100,429 UART: [ldev] Erasing FE.KEYID = 1
8,605,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,352 UART: [ldev] --
10,415,072 UART: [fwproc] Wait for Commands...
10,417,870 UART: [fwproc] Recv command 0x46574c44
10,419,966 UART: [fwproc] Recv'd Img size: 114448 bytes
13,856,796 UART: ROM Fatal Error: 0x000B002E
13,859,875 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,627,839 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,373 UART:
192,775 UART: Running Caliptra ROM ...
194,318 UART:
603,400 UART: [state] CFI Enabled
615,642 UART: [state] LifecycleState = Manufacturing
617,491 UART: [state] DebugLocked = No
619,459 UART: [state] WD Timer not started. Device not locked for debugging
622,522 UART: [kat] SHA2-256
801,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,256 UART: [kat] ++
813,790 UART: [kat] sha1
825,425 UART: [kat] SHA2-256
828,429 UART: [kat] SHA2-384
835,053 UART: [kat] SHA2-512-ACC
837,990 UART: [kat] ECC-384
3,278,243 UART: [kat] HMAC-384Kdf
3,290,472 UART: [kat] LMS
3,819,971 UART: [kat] --
3,826,930 UART: [cold-reset] ++
3,828,161 UART: [fht] FHT @ 0x50003400
3,839,731 UART: [idev] ++
3,840,291 UART: [idev] CDI.KEYID = 6
3,841,251 UART: [idev] SUBJECT.KEYID = 7
3,842,407 UART: [idev] UDS.KEYID = 0
3,859,780 UART: [idev] Erasing UDS.KEYID = 0
6,317,643 UART: [idev] Sha1 KeyId Algorithm
6,340,017 UART: [idev] --
6,343,856 UART: [ldev] ++
6,344,418 UART: [ldev] CDI.KEYID = 6
6,345,379 UART: [ldev] SUBJECT.KEYID = 5
6,346,556 UART: [ldev] AUTHORITY.KEYID = 7
6,347,785 UART: [ldev] FE.KEYID = 1
6,359,080 UART: [ldev] Erasing FE.KEYID = 1
8,833,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,603 UART: [ldev] --
10,623,600 UART: [fwproc] Wait for Commands...
10,626,181 UART: [fwproc] Recv command 0x46574c44
10,628,272 UART: [fwproc] Recv'd Img size: 114448 bytes
14,061,159 UART: ROM Fatal Error: 0x000B002E
14,064,287 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
7,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,845,893 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Manufacturing
85,913 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,198,313 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,168 UART: [ldev] ++
1,208,336 UART: [ldev] CDI.KEYID = 6
1,208,700 UART: [ldev] SUBJECT.KEYID = 5
1,209,127 UART: [ldev] AUTHORITY.KEYID = 7
1,209,590 UART: [ldev] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,241,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,670 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,312 UART: ROM Fatal Error: 0x000B002E
2,607,471 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,320 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Manufacturing
85,694 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,215 UART: [ldev] --
1,282,531 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,771 UART: ROM Fatal Error: 0x000B002E
2,607,930 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,773 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Manufacturing
85,733 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,214,782 UART: [ldev] Erasing FE.KEYID = 1
1,241,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,604 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,820 UART: ROM Fatal Error: 0x000B002E
2,606,979 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,178 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Manufacturing
85,552 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,476 UART: [kat] SHA2-256
901,416 UART: [kat] SHA2-384
904,147 UART: [kat] SHA2-512-ACC
906,048 UART: [kat] ECC-384
915,407 UART: [kat] HMAC-384Kdf
919,919 UART: [kat] LMS
1,168,231 UART: [kat] --
1,169,092 UART: [cold-reset] ++
1,169,646 UART: [fht] FHT @ 0x50003400
1,172,254 UART: [idev] ++
1,172,422 UART: [idev] CDI.KEYID = 6
1,172,783 UART: [idev] SUBJECT.KEYID = 7
1,173,208 UART: [idev] UDS.KEYID = 0
1,181,616 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,314 UART: [idev] --
1,208,417 UART: [ldev] ++
1,208,585 UART: [ldev] CDI.KEYID = 6
1,208,949 UART: [ldev] SUBJECT.KEYID = 5
1,209,376 UART: [ldev] AUTHORITY.KEYID = 7
1,209,839 UART: [ldev] FE.KEYID = 1
1,214,955 UART: [ldev] Erasing FE.KEYID = 1
1,241,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,131 UART: [ldev] --
1,280,559 UART: [fwproc] Wait for Commands...
1,281,202 UART: [fwproc] Recv command 0x46574c44
1,281,935 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,587 UART: ROM Fatal Error: 0x000B002E
2,606,746 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Manufacturing
85,771 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,392 UART: [kat] LMS
1,168,704 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,206,903 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,214,756 UART: [ldev] Erasing FE.KEYID = 1
1,240,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,732 UART: [ldev] --
1,280,170 UART: [fwproc] Wait for Commands...
1,280,831 UART: [fwproc] Recv command 0x46574c44
1,281,564 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,288 UART: ROM Fatal Error: 0x000B002E
2,607,447 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,834 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Manufacturing
85,846 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
915,839 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,952 UART: [fht] FHT @ 0x50003400
1,172,440 UART: [idev] ++
1,172,608 UART: [idev] CDI.KEYID = 6
1,172,969 UART: [idev] SUBJECT.KEYID = 7
1,173,394 UART: [idev] UDS.KEYID = 0
1,181,220 UART: [idev] Erasing UDS.KEYID = 0
1,198,402 UART: [idev] Sha1 KeyId Algorithm
1,207,302 UART: [idev] --
1,208,259 UART: [ldev] ++
1,208,427 UART: [ldev] CDI.KEYID = 6
1,208,791 UART: [ldev] SUBJECT.KEYID = 5
1,209,218 UART: [ldev] AUTHORITY.KEYID = 7
1,209,681 UART: [ldev] FE.KEYID = 1
1,215,219 UART: [ldev] Erasing FE.KEYID = 1
1,241,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,341 UART: [ldev] --
1,280,737 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,149 UART: [fwproc] Recv'd Img size: 114448 bytes
2,604,775 UART: ROM Fatal Error: 0x000B002E
2,605,934 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,341 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,020,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,043 UART:
2,165,444 UART: Running Caliptra ROM ...
2,166,527 UART:
2,166,683 UART: [state] CFI Enabled
2,167,662 UART: [state] LifecycleState = Unprovisioned
2,169,328 UART: [state] DebugLocked = No
2,170,356 UART: [state] WD Timer not started. Device not locked for debugging
2,172,825 UART: [kat] SHA2-256
2,173,492 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,502 UART: [kat] ++
2,176,948 UART: [kat] sha1
2,177,459 UART: [kat] SHA2-256
2,178,118 UART: [kat] SHA2-384
2,178,772 UART: [kat] SHA2-512-ACC
2,179,768 UART: [kat] ECC-384
3,778,346 UART: [kat] HMAC-384Kdf
3,804,782 UART: [kat] LMS
4,877,972 UART: [kat] --
4,882,413 UART: [cold-reset] ++
4,884,736 UART: [fht] FHT @ 0x50003400
4,895,715 UART: [idev] ++
4,896,413 UART: [idev] CDI.KEYID = 6
4,897,596 UART: [idev] SUBJECT.KEYID = 7
4,898,764 UART: [idev] UDS.KEYID = 0
4,931,353 UART: [idev] Erasing UDS.KEYID = 0
8,243,616 UART: [idev] Sha1 KeyId Algorithm
8,265,729 UART: [idev] --
8,269,338 UART: [ldev] ++
8,269,903 UART: [ldev] CDI.KEYID = 6
8,271,156 UART: [ldev] SUBJECT.KEYID = 5
8,272,325 UART: [ldev] AUTHORITY.KEYID = 7
8,273,483 UART: [ldev] FE.KEYID = 1
8,318,570 UART: [ldev] Erasing FE.KEYID = 1
11,656,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,703 UART: [ldev] --
14,040,697 UART: [fwproc] Wait for Commands...
14,042,476 UART: [fwproc] Recv command 0x46574c44
14,044,805 UART: [fwproc] Recv'd Img size: 114124 bytes
16,747,775 UART: ROM Fatal Error: 0x000B0018
16,751,189 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
2,020,978 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,554,210 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,020,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,207 UART:
2,165,620 UART: Running Caliptra ROM ...
2,166,785 UART:
2,166,955 UART: [state] CFI Enabled
2,167,934 UART: [state] LifecycleState = Unprovisioned
2,169,589 UART: [state] DebugLocked = No
2,170,696 UART: [state] WD Timer not started. Device not locked for debugging
2,173,218 UART: [kat] SHA2-256
2,173,886 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,899 UART: [kat] ++
2,177,344 UART: [kat] sha1
2,177,849 UART: [kat] SHA2-256
2,178,498 UART: [kat] SHA2-384
2,179,167 UART: [kat] SHA2-512-ACC
2,179,961 UART: [kat] ECC-384
4,097,511 UART: [kat] HMAC-384Kdf
4,110,845 UART: [kat] LMS
5,184,018 UART: [kat] --
5,187,584 UART: [cold-reset] ++
5,189,893 UART: [fht] FHT @ 0x50003400
5,202,705 UART: [idev] ++
5,203,370 UART: [idev] CDI.KEYID = 6
5,204,608 UART: [idev] SUBJECT.KEYID = 7
5,206,042 UART: [idev] UDS.KEYID = 0
5,223,210 UART: [idev] Erasing UDS.KEYID = 0
8,496,513 UART: [idev] Sha1 KeyId Algorithm
8,519,856 UART: [idev] --
8,522,662 UART: [ldev] ++
8,523,227 UART: [ldev] CDI.KEYID = 6
8,524,483 UART: [ldev] SUBJECT.KEYID = 5
8,525,920 UART: [ldev] AUTHORITY.KEYID = 7
8,527,480 UART: [ldev] FE.KEYID = 1
8,538,835 UART: [ldev] Erasing FE.KEYID = 1
11,830,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,536 UART: [ldev] --
14,194,366 UART: [fwproc] Wait for Commands...
14,196,940 UART: [fwproc] Recv command 0x46574c44
14,199,259 UART: [fwproc] Recv'd Img size: 114124 bytes
16,900,820 UART: ROM Fatal Error: 0x000B0018
16,904,281 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,021,362 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,715,180 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,022,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,341 UART:
2,167,742 UART: Running Caliptra ROM ...
2,168,909 UART:
2,169,109 UART: [state] CFI Enabled
2,170,082 UART: [state] LifecycleState = Unprovisioned
2,171,730 UART: [state] DebugLocked = No
2,172,759 UART: [state] WD Timer not started. Device not locked for debugging
2,175,233 UART: [kat] SHA2-256
2,175,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,902 UART: [kat] ++
2,179,350 UART: [kat] sha1
2,179,861 UART: [kat] SHA2-256
2,180,517 UART: [kat] SHA2-384
2,181,172 UART: [kat] SHA2-512-ACC
2,182,018 UART: [kat] ECC-384
2,947,082 UART: [kat] HMAC-384Kdf
2,973,456 UART: [kat] LMS
3,502,906 UART: [kat] --
3,504,955 UART: [cold-reset] ++
3,507,418 UART: [fht] FHT @ 0x50003400
3,517,648 UART: [idev] ++
3,518,217 UART: [idev] CDI.KEYID = 6
3,519,125 UART: [idev] SUBJECT.KEYID = 7
3,520,339 UART: [idev] UDS.KEYID = 0
3,545,496 UART: [idev] Erasing UDS.KEYID = 0
6,029,768 UART: [idev] Sha1 KeyId Algorithm
6,053,170 UART: [idev] --
6,057,651 UART: [ldev] ++
6,058,223 UART: [ldev] CDI.KEYID = 6
6,059,131 UART: [ldev] SUBJECT.KEYID = 5
6,060,349 UART: [ldev] AUTHORITY.KEYID = 7
6,061,584 UART: [ldev] FE.KEYID = 1
6,100,657 UART: [ldev] Erasing FE.KEYID = 1
8,601,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,339 UART: [ldev] --
10,412,633 UART: [fwproc] Wait for Commands...
10,415,003 UART: [fwproc] Recv command 0x46574c44
10,417,055 UART: [fwproc] Recv'd Img size: 114448 bytes
12,465,787 UART: ROM Fatal Error: 0x000B0018
12,468,916 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,024,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,230,520 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,021,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,903 UART:
2,166,303 UART: Running Caliptra ROM ...
2,167,390 UART:
2,167,547 UART: [state] CFI Enabled
2,168,515 UART: [state] LifecycleState = Unprovisioned
2,170,164 UART: [state] DebugLocked = No
2,171,190 UART: [state] WD Timer not started. Device not locked for debugging
2,173,668 UART: [kat] SHA2-256
2,174,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,360 UART: [kat] ++
2,177,803 UART: [kat] sha1
2,178,310 UART: [kat] SHA2-256
2,178,965 UART: [kat] SHA2-384
2,179,621 UART: [kat] SHA2-512-ACC
2,180,453 UART: [kat] ECC-384
3,280,044 UART: [kat] HMAC-384Kdf
3,291,462 UART: [kat] LMS
3,820,943 UART: [kat] --
3,826,294 UART: [cold-reset] ++
3,828,657 UART: [fht] FHT @ 0x50003400
3,839,315 UART: [idev] ++
3,839,876 UART: [idev] CDI.KEYID = 6
3,840,892 UART: [idev] SUBJECT.KEYID = 7
3,841,990 UART: [idev] UDS.KEYID = 0
3,859,871 UART: [idev] Erasing UDS.KEYID = 0
6,315,519 UART: [idev] Sha1 KeyId Algorithm
6,338,383 UART: [idev] --
6,341,618 UART: [ldev] ++
6,342,185 UART: [ldev] CDI.KEYID = 6
6,343,067 UART: [ldev] SUBJECT.KEYID = 5
6,344,285 UART: [ldev] AUTHORITY.KEYID = 7
6,345,439 UART: [ldev] FE.KEYID = 1
6,356,381 UART: [ldev] Erasing FE.KEYID = 1
8,833,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,561 UART: [ldev] --
10,625,140 UART: [fwproc] Wait for Commands...
10,627,643 UART: [fwproc] Recv command 0x46574c44
10,629,692 UART: [fwproc] Recv'd Img size: 114448 bytes
12,685,697 UART: ROM Fatal Error: 0x000B0018
12,688,826 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,021,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,460,097 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,021,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,343 UART:
2,166,771 UART: Running Caliptra ROM ...
2,167,854 UART:
2,168,009 UART: [state] CFI Enabled
2,168,977 UART: [state] LifecycleState = Unprovisioned
2,170,628 UART: [state] DebugLocked = No
2,171,652 UART: [state] WD Timer not started. Device not locked for debugging
2,174,121 UART: [kat] SHA2-256
2,174,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,793 UART: [kat] ++
2,178,241 UART: [kat] sha1
2,178,753 UART: [kat] SHA2-256
2,179,409 UART: [kat] SHA2-384
2,180,071 UART: [kat] SHA2-512-ACC
2,180,909 UART: [kat] ECC-384
2,947,191 UART: [kat] HMAC-384Kdf
2,971,193 UART: [kat] LMS
3,500,649 UART: [kat] --
3,504,264 UART: [cold-reset] ++
3,506,838 UART: [fht] FHT @ 0x50003400
3,517,706 UART: [idev] ++
3,518,273 UART: [idev] CDI.KEYID = 6
3,519,253 UART: [idev] SUBJECT.KEYID = 7
3,520,415 UART: [idev] UDS.KEYID = 0
3,543,140 UART: [idev] Erasing UDS.KEYID = 0
6,024,698 UART: [idev] Sha1 KeyId Algorithm
6,048,440 UART: [idev] --
6,052,002 UART: [ldev] ++
6,052,596 UART: [ldev] CDI.KEYID = 6
6,053,509 UART: [ldev] SUBJECT.KEYID = 5
6,054,591 UART: [ldev] AUTHORITY.KEYID = 7
6,055,937 UART: [ldev] FE.KEYID = 1
6,100,377 UART: [ldev] Erasing FE.KEYID = 1
8,602,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,297 UART: [ldev] --
10,411,481 UART: [fwproc] Wait for Commands...
10,414,552 UART: [fwproc] Recv command 0x46574c44
10,416,650 UART: [fwproc] Recv'd Img size: 114448 bytes
12,469,481 UART: ROM Fatal Error: 0x000B0018
12,472,609 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,020,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,257,632 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,022,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,854 UART:
2,167,361 UART: Running Caliptra ROM ...
2,168,458 UART:
2,168,624 UART: [state] CFI Enabled
2,169,599 UART: [state] LifecycleState = Unprovisioned
2,171,302 UART: [state] DebugLocked = No
2,172,415 UART: [state] WD Timer not started. Device not locked for debugging
2,174,913 UART: [kat] SHA2-256
2,175,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,588 UART: [kat] ++
2,179,036 UART: [kat] sha1
2,179,815 UART: [kat] SHA2-256
2,180,491 UART: [kat] SHA2-384
2,181,182 UART: [kat] SHA2-512-ACC
2,182,075 UART: [kat] ECC-384
3,283,263 UART: [kat] HMAC-384Kdf
3,297,230 UART: [kat] LMS
3,826,747 UART: [kat] --
3,832,201 UART: [cold-reset] ++
3,833,211 UART: [fht] FHT @ 0x50003400
3,844,569 UART: [idev] ++
3,845,150 UART: [idev] CDI.KEYID = 6
3,846,063 UART: [idev] SUBJECT.KEYID = 7
3,847,279 UART: [idev] UDS.KEYID = 0
3,863,418 UART: [idev] Erasing UDS.KEYID = 0
6,319,234 UART: [idev] Sha1 KeyId Algorithm
6,343,487 UART: [idev] --
6,348,020 UART: [ldev] ++
6,348,592 UART: [ldev] CDI.KEYID = 6
6,349,501 UART: [ldev] SUBJECT.KEYID = 5
6,350,716 UART: [ldev] AUTHORITY.KEYID = 7
6,351,943 UART: [ldev] FE.KEYID = 1
6,363,502 UART: [ldev] Erasing FE.KEYID = 1
8,837,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,174 UART: [ldev] --
10,630,628 UART: [fwproc] Wait for Commands...
10,632,781 UART: [fwproc] Recv command 0x46574c44
10,634,880 UART: [fwproc] Recv'd Img size: 114448 bytes
12,681,144 UART: ROM Fatal Error: 0x000B0018
12,684,282 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,027,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,463,755 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,321 UART: [kat] SHA2-256
901,261 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,446 UART: [kat] HMAC-384Kdf
920,108 UART: [kat] LMS
1,168,420 UART: [kat] --
1,169,185 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
1,181,401 UART: [idev] Erasing UDS.KEYID = 0
1,198,381 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,240,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,316 UART: [ldev] --
1,279,690 UART: [fwproc] Wait for Commands...
1,280,417 UART: [fwproc] Recv command 0x46574c44
1,281,150 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,416 UART: ROM Fatal Error: 0x000B0018
1,329,573 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,522 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,170,048 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,348 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,067 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,217 UART: ROM Fatal Error: 0x000B0018
1,332,374 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,967 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,447 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,653 UART: [idev] ++
1,172,821 UART: [idev] CDI.KEYID = 6
1,173,182 UART: [idev] SUBJECT.KEYID = 7
1,173,607 UART: [idev] UDS.KEYID = 0
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,465 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,926 UART: [ldev] --
1,280,212 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,239 UART: ROM Fatal Error: 0x000B0018
1,329,396 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,138 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
917,023 UART: [kat] HMAC-384Kdf
921,759 UART: [kat] LMS
1,170,071 UART: [kat] --
1,171,012 UART: [cold-reset] ++
1,171,482 UART: [fht] FHT @ 0x50003400
1,174,020 UART: [idev] ++
1,174,188 UART: [idev] CDI.KEYID = 6
1,174,549 UART: [idev] SUBJECT.KEYID = 7
1,174,974 UART: [idev] UDS.KEYID = 0
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,662 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,255 UART: ROM Fatal Error: 0x000B0018
1,330,412 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,047 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,345 UART: [kat] SHA2-256
901,285 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,470 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,195 UART: [cold-reset] ++
1,169,635 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,712 UART: [ldev] --
1,280,138 UART: [fwproc] Wait for Commands...
1,280,759 UART: [fwproc] Recv command 0x46574c44
1,281,492 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,946 UART: ROM Fatal Error: 0x000B0018
1,329,103 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,948 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,255 UART: [ldev] ++
1,209,423 UART: [ldev] CDI.KEYID = 6
1,209,787 UART: [ldev] SUBJECT.KEYID = 5
1,210,214 UART: [ldev] AUTHORITY.KEYID = 7
1,210,677 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,931 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,361 UART: ROM Fatal Error: 0x000B0018
1,332,518 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,967 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,021,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,624 UART:
2,166,018 UART: Running Caliptra ROM ...
2,167,214 UART:
2,167,392 UART: [state] CFI Enabled
2,168,371 UART: [state] LifecycleState = Unprovisioned
2,170,016 UART: [state] DebugLocked = No
2,171,126 UART: [state] WD Timer not started. Device not locked for debugging
2,173,790 UART: [kat] SHA2-256
2,174,506 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,535 UART: [kat] ++
2,177,986 UART: [kat] sha1
2,178,495 UART: [kat] SHA2-256
2,179,242 UART: [kat] SHA2-384
2,179,912 UART: [kat] SHA2-512-ACC
2,180,792 UART: [kat] ECC-384
3,775,755 UART: [kat] HMAC-384Kdf
3,804,036 UART: [kat] LMS
4,877,176 UART: [kat] --
4,882,436 UART: [cold-reset] ++
4,885,126 UART: [fht] FHT @ 0x50003400
4,895,613 UART: [idev] ++
4,896,320 UART: [idev] CDI.KEYID = 6
4,897,505 UART: [idev] SUBJECT.KEYID = 7
4,898,673 UART: [idev] UDS.KEYID = 0
4,929,827 UART: [idev] Erasing UDS.KEYID = 0
8,242,166 UART: [idev] Sha1 KeyId Algorithm
8,263,512 UART: [idev] --
8,266,840 UART: [ldev] ++
8,267,417 UART: [ldev] CDI.KEYID = 6
8,268,582 UART: [ldev] SUBJECT.KEYID = 5
8,269,794 UART: [ldev] AUTHORITY.KEYID = 7
8,270,944 UART: [ldev] FE.KEYID = 1
8,316,563 UART: [ldev] Erasing FE.KEYID = 1
11,654,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,246 UART: [ldev] --
14,037,415 UART: [fwproc] Wait for Commands...
14,040,536 UART: [fwproc] Recv command 0x46574c44
14,042,788 UART: [fwproc] Recv'd Img size: 114124 bytes
16,747,467 UART: ROM Fatal Error: 0x000B0017
16,750,908 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,018,917 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,162,731 UART:
2,163,119 UART: Running Caliptra ROM ...
2,164,283 UART:
2,164,460 UART: [state] CFI Enabled
2,165,416 UART: [state] LifecycleState = Unprovisioned
2,167,050 UART: [state] DebugLocked = No
2,168,156 UART: [state] WD Timer not started. Device not locked for debugging
2,170,638 UART: [kat] SHA2-256
2,171,309 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,316 UART: [kat] ++
2,174,765 UART: [kat] sha1
2,175,282 UART: [kat] SHA2-256
2,175,940 UART: [kat] SHA2-384
2,176,596 UART: [kat] SHA2-512-ACC
2,177,414 UART: [kat] ECC-384
3,775,496 UART: [kat] HMAC-384Kdf
3,802,760 UART: [kat] LMS
4,875,910 UART: [kat] --
4,880,282 UART: [cold-reset] ++
4,882,384 UART: [fht] FHT @ 0x50003400
4,894,874 UART: [idev] ++
4,895,548 UART: [idev] CDI.KEYID = 6
4,896,777 UART: [idev] SUBJECT.KEYID = 7
4,897,835 UART: [idev] UDS.KEYID = 0
4,930,413 UART: [idev] Erasing UDS.KEYID = 0
8,242,440 UART: [idev] Sha1 KeyId Algorithm
8,263,460 UART: [idev] --
8,268,423 UART: [ldev] ++
8,268,987 UART: [ldev] CDI.KEYID = 6
8,270,145 UART: [ldev] SUBJECT.KEYID = 5
8,271,375 UART: [ldev] AUTHORITY.KEYID = 7
8,272,523 UART: [ldev] FE.KEYID = 1
8,317,982 UART: [ldev] Erasing FE.KEYID = 1
11,653,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,809 UART: [ldev] --
14,040,319 UART: [fwproc] Wait for Commands...
14,043,277 UART: [fwproc] Recv command 0x46574c44
14,045,588 UART: [fwproc] Recv'd Img size: 114124 bytes
16,751,655 UART: ROM Fatal Error: 0x000B0017
16,755,053 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,020,933 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,638 UART:
2,165,023 UART: Running Caliptra ROM ...
2,166,184 UART:
2,166,352 UART: [state] CFI Enabled
2,167,308 UART: [state] LifecycleState = Unprovisioned
2,168,961 UART: [state] DebugLocked = No
2,170,066 UART: [state] WD Timer not started. Device not locked for debugging
2,172,549 UART: [kat] SHA2-256
2,173,216 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,223 UART: [kat] ++
2,176,694 UART: [kat] sha1
2,177,207 UART: [kat] SHA2-256
2,177,894 UART: [kat] SHA2-384
2,178,589 UART: [kat] SHA2-512-ACC
2,179,577 UART: [kat] ECC-384
3,775,663 UART: [kat] HMAC-384Kdf
3,802,647 UART: [kat] LMS
4,875,808 UART: [kat] --
4,881,554 UART: [cold-reset] ++
4,883,919 UART: [fht] FHT @ 0x50003400
4,896,141 UART: [idev] ++
4,896,865 UART: [idev] CDI.KEYID = 6
4,898,042 UART: [idev] SUBJECT.KEYID = 7
4,899,206 UART: [idev] UDS.KEYID = 0
4,928,906 UART: [idev] Erasing UDS.KEYID = 0
8,238,518 UART: [idev] Sha1 KeyId Algorithm
8,260,307 UART: [idev] --
8,263,812 UART: [ldev] ++
8,264,378 UART: [ldev] CDI.KEYID = 6
8,265,613 UART: [ldev] SUBJECT.KEYID = 5
8,266,783 UART: [ldev] AUTHORITY.KEYID = 7
8,267,879 UART: [ldev] FE.KEYID = 1
8,315,827 UART: [ldev] Erasing FE.KEYID = 1
11,648,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,429 UART: [ldev] --
14,036,205 UART: [fwproc] Wait for Commands...
14,039,001 UART: [fwproc] Recv command 0x46574c44
14,041,317 UART: [fwproc] Recv'd Img size: 114124 bytes
16,746,591 UART: ROM Fatal Error: 0x000B0017
16,749,992 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
2,020,131 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,534,154 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,022,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,509,475 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,018,978 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,507,658 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,023,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,734 UART:
2,168,136 UART: Running Caliptra ROM ...
2,169,308 UART:
2,169,478 UART: [state] CFI Enabled
2,170,458 UART: [state] LifecycleState = Unprovisioned
2,172,100 UART: [state] DebugLocked = No
2,173,196 UART: [state] WD Timer not started. Device not locked for debugging
2,175,664 UART: [kat] SHA2-256
2,176,322 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,325 UART: [kat] ++
2,179,769 UART: [kat] sha1
2,180,275 UART: [kat] SHA2-256
2,181,007 UART: [kat] SHA2-384
2,181,672 UART: [kat] SHA2-512-ACC
2,182,568 UART: [kat] ECC-384
4,097,165 UART: [kat] HMAC-384Kdf
4,109,317 UART: [kat] LMS
5,182,473 UART: [kat] --
5,186,799 UART: [cold-reset] ++
5,189,163 UART: [fht] FHT @ 0x50003400
5,200,300 UART: [idev] ++
5,200,978 UART: [idev] CDI.KEYID = 6
5,202,154 UART: [idev] SUBJECT.KEYID = 7
5,203,634 UART: [idev] UDS.KEYID = 0
5,218,253 UART: [idev] Erasing UDS.KEYID = 0
8,490,444 UART: [idev] Sha1 KeyId Algorithm
8,512,802 UART: [idev] --
8,516,882 UART: [ldev] ++
8,517,458 UART: [ldev] CDI.KEYID = 6
8,518,621 UART: [ldev] SUBJECT.KEYID = 5
8,520,174 UART: [ldev] AUTHORITY.KEYID = 7
8,521,597 UART: [ldev] FE.KEYID = 1
8,534,240 UART: [ldev] Erasing FE.KEYID = 1
11,826,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,004 UART: [ldev] --
14,193,842 UART: [fwproc] Wait for Commands...
14,196,040 UART: [fwproc] Recv command 0x46574c44
14,198,368 UART: [fwproc] Recv'd Img size: 114124 bytes
16,901,881 UART: ROM Fatal Error: 0x000B0017
16,905,282 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,021,019 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,798 UART:
2,165,190 UART: Running Caliptra ROM ...
2,166,358 UART:
2,166,527 UART: [state] CFI Enabled
2,167,479 UART: [state] LifecycleState = Unprovisioned
2,169,129 UART: [state] DebugLocked = No
2,170,231 UART: [state] WD Timer not started. Device not locked for debugging
2,172,701 UART: [kat] SHA2-256
2,173,366 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,375 UART: [kat] ++
2,176,840 UART: [kat] sha1
2,177,348 UART: [kat] SHA2-256
2,178,083 UART: [kat] SHA2-384
2,178,745 UART: [kat] SHA2-512-ACC
2,179,569 UART: [kat] ECC-384
4,099,639 UART: [kat] HMAC-384Kdf
4,112,108 UART: [kat] LMS
5,185,249 UART: [kat] --
5,190,347 UART: [cold-reset] ++
5,191,472 UART: [fht] FHT @ 0x50003400
5,202,324 UART: [idev] ++
5,203,044 UART: [idev] CDI.KEYID = 6
5,204,224 UART: [idev] SUBJECT.KEYID = 7
5,205,711 UART: [idev] UDS.KEYID = 0
5,222,655 UART: [idev] Erasing UDS.KEYID = 0
8,498,874 UART: [idev] Sha1 KeyId Algorithm
8,521,143 UART: [idev] --
8,525,008 UART: [ldev] ++
8,525,585 UART: [ldev] CDI.KEYID = 6
8,526,831 UART: [ldev] SUBJECT.KEYID = 5
8,528,274 UART: [ldev] AUTHORITY.KEYID = 7
8,529,829 UART: [ldev] FE.KEYID = 1
8,542,339 UART: [ldev] Erasing FE.KEYID = 1
11,832,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,397 UART: [ldev] --
14,196,641 UART: [fwproc] Wait for Commands...
14,198,518 UART: [fwproc] Recv command 0x46574c44
14,200,825 UART: [fwproc] Recv'd Img size: 114124 bytes
16,903,469 UART: ROM Fatal Error: 0x000B0017
16,906,926 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,023,489 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,190 UART:
2,167,578 UART: Running Caliptra ROM ...
2,168,665 UART:
2,168,809 UART: [state] CFI Enabled
2,169,785 UART: [state] LifecycleState = Unprovisioned
2,171,443 UART: [state] DebugLocked = No
2,172,489 UART: [state] WD Timer not started. Device not locked for debugging
2,174,953 UART: [kat] SHA2-256
2,175,613 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,617 UART: [kat] ++
2,179,057 UART: [kat] sha1
2,179,562 UART: [kat] SHA2-256
2,180,210 UART: [kat] SHA2-384
2,180,861 UART: [kat] SHA2-512-ACC
2,181,896 UART: [kat] ECC-384
4,102,203 UART: [kat] HMAC-384Kdf
4,114,655 UART: [kat] LMS
5,187,806 UART: [kat] --
5,193,067 UART: [cold-reset] ++
5,194,799 UART: [fht] FHT @ 0x50003400
5,204,648 UART: [idev] ++
5,205,314 UART: [idev] CDI.KEYID = 6
5,206,486 UART: [idev] SUBJECT.KEYID = 7
5,207,965 UART: [idev] UDS.KEYID = 0
5,224,354 UART: [idev] Erasing UDS.KEYID = 0
8,491,926 UART: [idev] Sha1 KeyId Algorithm
8,514,339 UART: [idev] --
8,518,793 UART: [ldev] ++
8,519,364 UART: [ldev] CDI.KEYID = 6
8,520,524 UART: [ldev] SUBJECT.KEYID = 5
8,522,001 UART: [ldev] AUTHORITY.KEYID = 7
8,523,484 UART: [ldev] FE.KEYID = 1
8,534,732 UART: [ldev] Erasing FE.KEYID = 1
11,824,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,349 UART: [ldev] --
14,188,623 UART: [fwproc] Wait for Commands...
14,191,160 UART: [fwproc] Recv command 0x46574c44
14,193,479 UART: [fwproc] Recv'd Img size: 114124 bytes
16,899,547 UART: ROM Fatal Error: 0x000B0017
16,902,919 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,023,721 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,715,183 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,020,979 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,725,135 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
2,021,063 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,704,505 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,021,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,751 UART:
2,166,137 UART: Running Caliptra ROM ...
2,167,304 UART:
2,167,481 UART: [state] CFI Enabled
2,168,476 UART: [state] LifecycleState = Unprovisioned
2,170,140 UART: [state] DebugLocked = No
2,171,250 UART: [state] WD Timer not started. Device not locked for debugging
2,173,731 UART: [kat] SHA2-256
2,174,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,402 UART: [kat] ++
2,177,878 UART: [kat] sha1
2,178,393 UART: [kat] SHA2-256
2,179,133 UART: [kat] SHA2-384
2,179,800 UART: [kat] SHA2-512-ACC
2,180,788 UART: [kat] ECC-384
2,949,299 UART: [kat] HMAC-384Kdf
2,970,886 UART: [kat] LMS
3,500,289 UART: [kat] --
3,504,281 UART: [cold-reset] ++
3,505,620 UART: [fht] FHT @ 0x50003400
3,515,932 UART: [idev] ++
3,516,576 UART: [idev] CDI.KEYID = 6
3,517,498 UART: [idev] SUBJECT.KEYID = 7
3,518,611 UART: [idev] UDS.KEYID = 0
3,542,580 UART: [idev] Erasing UDS.KEYID = 0
6,027,017 UART: [idev] Sha1 KeyId Algorithm
6,048,638 UART: [idev] --
6,053,550 UART: [ldev] ++
6,054,175 UART: [ldev] CDI.KEYID = 6
6,055,093 UART: [ldev] SUBJECT.KEYID = 5
6,056,276 UART: [ldev] AUTHORITY.KEYID = 7
6,057,586 UART: [ldev] FE.KEYID = 1
6,102,045 UART: [ldev] Erasing FE.KEYID = 1
8,601,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,923 UART: [ldev] --
10,392,311 UART: [fwproc] Wait for Commands...
10,395,001 UART: [fwproc] Recv command 0x46574c44
10,397,064 UART: [fwproc] Recv'd Img size: 114448 bytes
12,446,249 UART: ROM Fatal Error: 0x000B0017
12,449,392 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,027,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,707 UART:
2,172,123 UART: Running Caliptra ROM ...
2,173,201 UART:
2,173,356 UART: [state] CFI Enabled
2,174,326 UART: [state] LifecycleState = Unprovisioned
2,175,986 UART: [state] DebugLocked = No
2,177,015 UART: [state] WD Timer not started. Device not locked for debugging
2,179,478 UART: [kat] SHA2-256
2,180,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,146 UART: [kat] ++
2,183,594 UART: [kat] sha1
2,184,104 UART: [kat] SHA2-256
2,184,759 UART: [kat] SHA2-384
2,185,413 UART: [kat] SHA2-512-ACC
2,186,210 UART: [kat] ECC-384
2,947,825 UART: [kat] HMAC-384Kdf
2,972,064 UART: [kat] LMS
3,501,530 UART: [kat] --
3,506,893 UART: [cold-reset] ++
3,508,289 UART: [fht] FHT @ 0x50003400
3,517,980 UART: [idev] ++
3,518,544 UART: [idev] CDI.KEYID = 6
3,519,422 UART: [idev] SUBJECT.KEYID = 7
3,520,636 UART: [idev] UDS.KEYID = 0
3,542,989 UART: [idev] Erasing UDS.KEYID = 0
6,023,629 UART: [idev] Sha1 KeyId Algorithm
6,045,743 UART: [idev] --
6,049,878 UART: [ldev] ++
6,050,462 UART: [ldev] CDI.KEYID = 6
6,051,375 UART: [ldev] SUBJECT.KEYID = 5
6,052,542 UART: [ldev] AUTHORITY.KEYID = 7
6,053,780 UART: [ldev] FE.KEYID = 1
6,098,203 UART: [ldev] Erasing FE.KEYID = 1
8,604,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,100 UART: [ldev] --
10,410,908 UART: [fwproc] Wait for Commands...
10,413,546 UART: [fwproc] Recv command 0x46574c44
10,415,587 UART: [fwproc] Recv'd Img size: 114448 bytes
12,471,755 UART: ROM Fatal Error: 0x000B0017
12,474,886 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,021,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,663 UART:
2,166,062 UART: Running Caliptra ROM ...
2,167,230 UART:
2,167,399 UART: [state] CFI Enabled
2,168,360 UART: [state] LifecycleState = Unprovisioned
2,170,021 UART: [state] DebugLocked = No
2,171,135 UART: [state] WD Timer not started. Device not locked for debugging
2,173,611 UART: [kat] SHA2-256
2,174,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,307 UART: [kat] ++
2,177,763 UART: [kat] sha1
2,178,298 UART: [kat] SHA2-256
2,178,993 UART: [kat] SHA2-384
2,179,650 UART: [kat] SHA2-512-ACC
2,180,446 UART: [kat] ECC-384
2,948,097 UART: [kat] HMAC-384Kdf
2,972,410 UART: [kat] LMS
3,501,906 UART: [kat] --
3,506,944 UART: [cold-reset] ++
3,508,934 UART: [fht] FHT @ 0x50003400
3,519,590 UART: [idev] ++
3,520,156 UART: [idev] CDI.KEYID = 6
3,521,118 UART: [idev] SUBJECT.KEYID = 7
3,522,278 UART: [idev] UDS.KEYID = 0
3,544,688 UART: [idev] Erasing UDS.KEYID = 0
6,026,120 UART: [idev] Sha1 KeyId Algorithm
6,049,249 UART: [idev] --
6,053,728 UART: [ldev] ++
6,054,312 UART: [ldev] CDI.KEYID = 6
6,055,200 UART: [ldev] SUBJECT.KEYID = 5
6,056,360 UART: [ldev] AUTHORITY.KEYID = 7
6,057,651 UART: [ldev] FE.KEYID = 1
6,100,354 UART: [ldev] Erasing FE.KEYID = 1
8,601,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,158 UART: [ldev] --
10,393,130 UART: [fwproc] Wait for Commands...
10,395,452 UART: [fwproc] Recv command 0x46574c44
10,397,551 UART: [fwproc] Recv'd Img size: 114448 bytes
12,452,598 UART: ROM Fatal Error: 0x000B0017
12,455,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,024,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,229,672 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,024,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,272,181 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,025,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,234,282 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,021,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,737 UART:
2,166,149 UART: Running Caliptra ROM ...
2,167,232 UART:
2,167,385 UART: [state] CFI Enabled
2,168,382 UART: [state] LifecycleState = Unprovisioned
2,170,035 UART: [state] DebugLocked = No
2,171,062 UART: [state] WD Timer not started. Device not locked for debugging
2,173,532 UART: [kat] SHA2-256
2,174,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,199 UART: [kat] ++
2,177,643 UART: [kat] sha1
2,178,155 UART: [kat] SHA2-256
2,178,813 UART: [kat] SHA2-384
2,179,469 UART: [kat] SHA2-512-ACC
2,180,350 UART: [kat] ECC-384
3,277,056 UART: [kat] HMAC-384Kdf
3,289,482 UART: [kat] LMS
3,818,947 UART: [kat] --
3,823,639 UART: [cold-reset] ++
3,825,457 UART: [fht] FHT @ 0x50003400
3,837,695 UART: [idev] ++
3,838,259 UART: [idev] CDI.KEYID = 6
3,839,802 UART: [idev] SUBJECT.KEYID = 7
3,840,874 UART: [idev] UDS.KEYID = 0
3,858,066 UART: [idev] Erasing UDS.KEYID = 0
6,315,569 UART: [idev] Sha1 KeyId Algorithm
6,338,982 UART: [idev] --
6,343,610 UART: [ldev] ++
6,344,195 UART: [ldev] CDI.KEYID = 6
6,345,101 UART: [ldev] SUBJECT.KEYID = 5
6,346,263 UART: [ldev] AUTHORITY.KEYID = 7
6,347,492 UART: [ldev] FE.KEYID = 1
6,357,975 UART: [ldev] Erasing FE.KEYID = 1
8,833,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,835 UART: [ldev] --
10,624,074 UART: [fwproc] Wait for Commands...
10,626,712 UART: [fwproc] Recv command 0x46574c44
10,628,804 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,264 UART: ROM Fatal Error: 0x000B0017
12,681,394 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,021,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,811 UART:
2,166,196 UART: Running Caliptra ROM ...
2,167,359 UART:
2,167,528 UART: [state] CFI Enabled
2,168,482 UART: [state] LifecycleState = Unprovisioned
2,170,137 UART: [state] DebugLocked = No
2,171,240 UART: [state] WD Timer not started. Device not locked for debugging
2,173,711 UART: [kat] SHA2-256
2,174,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,383 UART: [kat] ++
2,177,835 UART: [kat] sha1
2,178,350 UART: [kat] SHA2-256
2,179,008 UART: [kat] SHA2-384
2,179,669 UART: [kat] SHA2-512-ACC
2,180,467 UART: [kat] ECC-384
3,276,982 UART: [kat] HMAC-384Kdf
3,288,733 UART: [kat] LMS
3,818,205 UART: [kat] --
3,821,844 UART: [cold-reset] ++
3,823,936 UART: [fht] FHT @ 0x50003400
3,835,942 UART: [idev] ++
3,836,514 UART: [idev] CDI.KEYID = 6
3,837,489 UART: [idev] SUBJECT.KEYID = 7
3,838,591 UART: [idev] UDS.KEYID = 0
3,852,349 UART: [idev] Erasing UDS.KEYID = 0
6,311,451 UART: [idev] Sha1 KeyId Algorithm
6,333,812 UART: [idev] --
6,338,341 UART: [ldev] ++
6,338,908 UART: [ldev] CDI.KEYID = 6
6,339,820 UART: [ldev] SUBJECT.KEYID = 5
6,341,035 UART: [ldev] AUTHORITY.KEYID = 7
6,342,271 UART: [ldev] FE.KEYID = 1
6,355,043 UART: [ldev] Erasing FE.KEYID = 1
8,829,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,378 UART: [ldev] --
10,621,487 UART: [fwproc] Wait for Commands...
10,623,346 UART: [fwproc] Recv command 0x46574c44
10,625,446 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,956 UART: ROM Fatal Error: 0x000B0017
12,679,076 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,020,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,164,669 UART:
2,165,073 UART: Running Caliptra ROM ...
2,166,240 UART:
2,166,425 UART: [state] CFI Enabled
2,167,388 UART: [state] LifecycleState = Unprovisioned
2,169,035 UART: [state] DebugLocked = No
2,170,142 UART: [state] WD Timer not started. Device not locked for debugging
2,172,626 UART: [kat] SHA2-256
2,173,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,303 UART: [kat] ++
2,176,756 UART: [kat] sha1
2,177,270 UART: [kat] SHA2-256
2,178,029 UART: [kat] SHA2-384
2,178,701 UART: [kat] SHA2-512-ACC
2,179,582 UART: [kat] ECC-384
3,279,516 UART: [kat] HMAC-384Kdf
3,292,975 UART: [kat] LMS
3,822,435 UART: [kat] --
3,827,049 UART: [cold-reset] ++
3,827,902 UART: [fht] FHT @ 0x50003400
3,838,352 UART: [idev] ++
3,838,916 UART: [idev] CDI.KEYID = 6
3,839,931 UART: [idev] SUBJECT.KEYID = 7
3,841,031 UART: [idev] UDS.KEYID = 0
3,857,869 UART: [idev] Erasing UDS.KEYID = 0
6,319,292 UART: [idev] Sha1 KeyId Algorithm
6,342,045 UART: [idev] --
6,345,988 UART: [ldev] ++
6,346,584 UART: [ldev] CDI.KEYID = 6
6,347,469 UART: [ldev] SUBJECT.KEYID = 5
6,348,623 UART: [ldev] AUTHORITY.KEYID = 7
6,350,017 UART: [ldev] FE.KEYID = 1
6,361,061 UART: [ldev] Erasing FE.KEYID = 1
8,837,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,094 UART: [ldev] --
10,629,610 UART: [fwproc] Wait for Commands...
10,632,298 UART: [fwproc] Recv command 0x46574c44
10,634,339 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,055 UART: ROM Fatal Error: 0x000B0017
12,681,184 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,025,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,459,805 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,020,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,468,136 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,024,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,461,405 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,033,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,178,657 UART:
2,179,054 UART: Running Caliptra ROM ...
2,180,224 UART:
2,180,395 UART: [state] CFI Enabled
2,181,379 UART: [state] LifecycleState = Unprovisioned
2,183,027 UART: [state] DebugLocked = No
2,184,140 UART: [state] WD Timer not started. Device not locked for debugging
2,186,620 UART: [kat] SHA2-256
2,187,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,190,295 UART: [kat] ++
2,190,745 UART: [kat] sha1
2,191,345 UART: [kat] SHA2-256
2,192,007 UART: [kat] SHA2-384
2,192,669 UART: [kat] SHA2-512-ACC
2,193,549 UART: [kat] ECC-384
2,949,563 UART: [kat] HMAC-384Kdf
2,972,425 UART: [kat] LMS
3,501,869 UART: [kat] --
3,506,970 UART: [cold-reset] ++
3,508,901 UART: [fht] FHT @ 0x50003400
3,519,737 UART: [idev] ++
3,520,313 UART: [idev] CDI.KEYID = 6
3,521,334 UART: [idev] SUBJECT.KEYID = 7
3,522,440 UART: [idev] UDS.KEYID = 0
3,543,568 UART: [idev] Erasing UDS.KEYID = 0
6,028,220 UART: [idev] Sha1 KeyId Algorithm
6,050,794 UART: [idev] --
6,053,575 UART: [ldev] ++
6,054,161 UART: [ldev] CDI.KEYID = 6
6,055,049 UART: [ldev] SUBJECT.KEYID = 5
6,056,269 UART: [ldev] AUTHORITY.KEYID = 7
6,057,427 UART: [ldev] FE.KEYID = 1
6,101,153 UART: [ldev] Erasing FE.KEYID = 1
8,606,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,448 UART: [ldev] --
10,417,385 UART: [fwproc] Wait for Commands...
10,420,515 UART: [fwproc] Recv command 0x46574c44
10,422,611 UART: [fwproc] Recv'd Img size: 114448 bytes
12,468,787 UART: ROM Fatal Error: 0x000B0017
12,471,879 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,023,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,977 UART:
2,168,479 UART: Running Caliptra ROM ...
2,169,561 UART:
2,169,721 UART: [state] CFI Enabled
2,170,691 UART: [state] LifecycleState = Unprovisioned
2,172,351 UART: [state] DebugLocked = No
2,173,377 UART: [state] WD Timer not started. Device not locked for debugging
2,175,843 UART: [kat] SHA2-256
2,176,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,520 UART: [kat] ++
2,179,967 UART: [kat] sha1
2,180,479 UART: [kat] SHA2-256
2,181,134 UART: [kat] SHA2-384
2,181,788 UART: [kat] SHA2-512-ACC
2,182,618 UART: [kat] ECC-384
2,947,248 UART: [kat] HMAC-384Kdf
2,971,745 UART: [kat] LMS
3,501,180 UART: [kat] --
3,505,543 UART: [cold-reset] ++
3,507,028 UART: [fht] FHT @ 0x50003400
3,518,087 UART: [idev] ++
3,518,656 UART: [idev] CDI.KEYID = 6
3,519,621 UART: [idev] SUBJECT.KEYID = 7
3,520,780 UART: [idev] UDS.KEYID = 0
3,543,347 UART: [idev] Erasing UDS.KEYID = 0
6,025,417 UART: [idev] Sha1 KeyId Algorithm
6,049,784 UART: [idev] --
6,053,789 UART: [ldev] ++
6,054,399 UART: [ldev] CDI.KEYID = 6
6,055,292 UART: [ldev] SUBJECT.KEYID = 5
6,056,398 UART: [ldev] AUTHORITY.KEYID = 7
6,057,692 UART: [ldev] FE.KEYID = 1
6,099,587 UART: [ldev] Erasing FE.KEYID = 1
8,603,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,314 UART: [ldev] --
10,413,098 UART: [fwproc] Wait for Commands...
10,416,222 UART: [fwproc] Recv command 0x46574c44
10,418,319 UART: [fwproc] Recv'd Img size: 114448 bytes
12,474,092 UART: ROM Fatal Error: 0x000B0017
12,477,215 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,047,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,191,737 UART:
2,192,129 UART: Running Caliptra ROM ...
2,193,253 UART:
2,193,416 UART: [state] CFI Enabled
2,194,285 UART: [state] LifecycleState = Unprovisioned
2,195,950 UART: [state] DebugLocked = No
2,197,066 UART: [state] WD Timer not started. Device not locked for debugging
2,199,546 UART: [kat] SHA2-256
2,200,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,203,224 UART: [kat] ++
2,203,672 UART: [kat] sha1
2,204,273 UART: [kat] SHA2-256
2,204,999 UART: [kat] SHA2-384
2,205,688 UART: [kat] SHA2-512-ACC
2,206,734 UART: [kat] ECC-384
2,948,751 UART: [kat] HMAC-384Kdf
2,973,228 UART: [kat] LMS
3,502,686 UART: [kat] --
3,508,531 UART: [cold-reset] ++
3,509,932 UART: [fht] FHT @ 0x50003400
3,521,024 UART: [idev] ++
3,521,600 UART: [idev] CDI.KEYID = 6
3,522,483 UART: [idev] SUBJECT.KEYID = 7
3,523,696 UART: [idev] UDS.KEYID = 0
3,544,857 UART: [idev] Erasing UDS.KEYID = 0
6,025,596 UART: [idev] Sha1 KeyId Algorithm
6,048,771 UART: [idev] --
6,052,096 UART: [ldev] ++
6,052,698 UART: [ldev] CDI.KEYID = 6
6,053,580 UART: [ldev] SUBJECT.KEYID = 5
6,054,799 UART: [ldev] AUTHORITY.KEYID = 7
6,056,033 UART: [ldev] FE.KEYID = 1
6,099,409 UART: [ldev] Erasing FE.KEYID = 1
8,604,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,421 UART: [ldev] --
10,413,776 UART: [fwproc] Wait for Commands...
10,416,634 UART: [fwproc] Recv command 0x46574c44
10,418,728 UART: [fwproc] Recv'd Img size: 114448 bytes
12,473,132 UART: ROM Fatal Error: 0x000B0017
12,476,254 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,021,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,229,803 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,022,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,253,340 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,040,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,274,508 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,021,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,352 UART:
2,166,733 UART: Running Caliptra ROM ...
2,167,898 UART:
2,168,066 UART: [state] CFI Enabled
2,169,030 UART: [state] LifecycleState = Unprovisioned
2,171,006 UART: [state] DebugLocked = No
2,172,090 UART: [state] WD Timer not started. Device not locked for debugging
2,174,589 UART: [kat] SHA2-256
2,175,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,274 UART: [kat] ++
2,178,773 UART: [kat] sha1
2,179,288 UART: [kat] SHA2-256
2,180,025 UART: [kat] SHA2-384
2,180,695 UART: [kat] SHA2-512-ACC
2,181,575 UART: [kat] ECC-384
3,283,805 UART: [kat] HMAC-384Kdf
3,296,598 UART: [kat] LMS
3,826,105 UART: [kat] --
3,830,202 UART: [cold-reset] ++
3,831,155 UART: [fht] FHT @ 0x50003400
3,842,059 UART: [idev] ++
3,842,616 UART: [idev] CDI.KEYID = 6
3,843,549 UART: [idev] SUBJECT.KEYID = 7
3,844,758 UART: [idev] UDS.KEYID = 0
3,857,743 UART: [idev] Erasing UDS.KEYID = 0
6,314,503 UART: [idev] Sha1 KeyId Algorithm
6,338,857 UART: [idev] --
6,342,339 UART: [ldev] ++
6,342,921 UART: [ldev] CDI.KEYID = 6
6,343,834 UART: [ldev] SUBJECT.KEYID = 5
6,344,990 UART: [ldev] AUTHORITY.KEYID = 7
6,346,216 UART: [ldev] FE.KEYID = 1
6,355,960 UART: [ldev] Erasing FE.KEYID = 1
8,826,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,195 UART: [ldev] --
10,617,506 UART: [fwproc] Wait for Commands...
10,620,306 UART: [fwproc] Recv command 0x46574c44
10,622,344 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,376 UART: ROM Fatal Error: 0x000B0017
12,678,463 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
2,021,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,778 UART:
2,166,169 UART: Running Caliptra ROM ...
2,167,249 UART:
2,167,401 UART: [state] CFI Enabled
2,168,371 UART: [state] LifecycleState = Unprovisioned
2,170,030 UART: [state] DebugLocked = No
2,171,053 UART: [state] WD Timer not started. Device not locked for debugging
2,173,519 UART: [kat] SHA2-256
2,174,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,181 UART: [kat] ++
2,177,626 UART: [kat] sha1
2,178,137 UART: [kat] SHA2-256
2,178,812 UART: [kat] SHA2-384
2,179,470 UART: [kat] SHA2-512-ACC
2,180,296 UART: [kat] ECC-384
3,285,730 UART: [kat] HMAC-384Kdf
3,297,863 UART: [kat] LMS
3,827,322 UART: [kat] --
3,832,282 UART: [cold-reset] ++
3,834,699 UART: [fht] FHT @ 0x50003400
3,845,995 UART: [idev] ++
3,846,564 UART: [idev] CDI.KEYID = 6
3,847,467 UART: [idev] SUBJECT.KEYID = 7
3,848,679 UART: [idev] UDS.KEYID = 0
3,866,166 UART: [idev] Erasing UDS.KEYID = 0
6,321,923 UART: [idev] Sha1 KeyId Algorithm
6,346,234 UART: [idev] --
6,348,986 UART: [ldev] ++
6,349,570 UART: [ldev] CDI.KEYID = 6
6,350,476 UART: [ldev] SUBJECT.KEYID = 5
6,351,579 UART: [ldev] AUTHORITY.KEYID = 7
6,352,914 UART: [ldev] FE.KEYID = 1
6,365,344 UART: [ldev] Erasing FE.KEYID = 1
8,837,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,185 UART: [ldev] --
10,630,243 UART: [fwproc] Wait for Commands...
10,631,802 UART: [fwproc] Recv command 0x46574c44
10,633,838 UART: [fwproc] Recv'd Img size: 114448 bytes
12,682,577 UART: ROM Fatal Error: 0x000B0017
12,685,699 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,021,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,989 UART:
2,166,380 UART: Running Caliptra ROM ...
2,167,545 UART:
2,167,716 UART: [state] CFI Enabled
2,168,683 UART: [state] LifecycleState = Unprovisioned
2,170,325 UART: [state] DebugLocked = No
2,171,425 UART: [state] WD Timer not started. Device not locked for debugging
2,173,901 UART: [kat] SHA2-256
2,174,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,590 UART: [kat] ++
2,178,041 UART: [kat] sha1
2,178,634 UART: [kat] SHA2-256
2,179,302 UART: [kat] SHA2-384
2,179,997 UART: [kat] SHA2-512-ACC
2,180,819 UART: [kat] ECC-384
3,281,919 UART: [kat] HMAC-384Kdf
3,294,702 UART: [kat] LMS
3,824,185 UART: [kat] --
3,826,795 UART: [cold-reset] ++
3,829,327 UART: [fht] FHT @ 0x50003400
3,840,629 UART: [idev] ++
3,841,189 UART: [idev] CDI.KEYID = 6
3,842,148 UART: [idev] SUBJECT.KEYID = 7
3,843,303 UART: [idev] UDS.KEYID = 0
3,861,345 UART: [idev] Erasing UDS.KEYID = 0
6,319,826 UART: [idev] Sha1 KeyId Algorithm
6,342,780 UART: [idev] --
6,347,528 UART: [ldev] ++
6,348,090 UART: [ldev] CDI.KEYID = 6
6,348,999 UART: [ldev] SUBJECT.KEYID = 5
6,350,155 UART: [ldev] AUTHORITY.KEYID = 7
6,351,443 UART: [ldev] FE.KEYID = 1
6,362,634 UART: [ldev] Erasing FE.KEYID = 1
8,835,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,856 UART: [ldev] --
10,627,281 UART: [fwproc] Wait for Commands...
10,629,987 UART: [fwproc] Recv command 0x46574c44
10,632,082 UART: [fwproc] Recv'd Img size: 114448 bytes
12,685,917 UART: ROM Fatal Error: 0x000B0017
12,688,985 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,021,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,463,042 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,024,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,463,254 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,021,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,466,695 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
890,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,901 UART: [kat] ++
895,053 UART: [kat] sha1
899,185 UART: [kat] SHA2-256
901,125 UART: [kat] SHA2-384
903,906 UART: [kat] SHA2-512-ACC
905,807 UART: [kat] ECC-384
915,218 UART: [kat] HMAC-384Kdf
919,876 UART: [kat] LMS
1,168,188 UART: [kat] --
1,169,015 UART: [cold-reset] ++
1,169,547 UART: [fht] FHT @ 0x50003400
1,172,279 UART: [idev] ++
1,172,447 UART: [idev] CDI.KEYID = 6
1,172,808 UART: [idev] SUBJECT.KEYID = 7
1,173,233 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,197,603 UART: [idev] Sha1 KeyId Algorithm
1,206,619 UART: [idev] --
1,207,722 UART: [ldev] ++
1,207,890 UART: [ldev] CDI.KEYID = 6
1,208,254 UART: [ldev] SUBJECT.KEYID = 5
1,208,681 UART: [ldev] AUTHORITY.KEYID = 7
1,209,144 UART: [ldev] FE.KEYID = 1
1,214,512 UART: [ldev] Erasing FE.KEYID = 1
1,240,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,148 UART: [ldev] --
1,279,552 UART: [fwproc] Wait for Commands...
1,280,301 UART: [fwproc] Recv command 0x46574c44
1,281,034 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,616 UART: ROM Fatal Error: 0x000B0017
1,329,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,343 UART: [kat] SHA2-256
901,283 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,158 UART: [kat] LMS
1,168,470 UART: [kat] --
1,169,503 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,499 UART: [fwproc] Recv command 0x46574c44
1,282,232 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,730 UART: ROM Fatal Error: 0x000B0017
1,329,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,465 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,222 UART: [fwproc] Wait for Commands...
1,280,973 UART: [fwproc] Recv command 0x46574c44
1,281,706 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,516 UART: ROM Fatal Error: 0x000B0017
1,330,673 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,128 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
905,095 UART: [kat] SHA2-512-ACC
906,996 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,527 UART: [kat] LMS
1,169,839 UART: [kat] --
1,170,784 UART: [cold-reset] ++
1,171,226 UART: [fht] FHT @ 0x50003400
1,173,906 UART: [idev] ++
1,174,074 UART: [idev] CDI.KEYID = 6
1,174,435 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,440 UART: [idev] Sha1 KeyId Algorithm
1,209,282 UART: [idev] --
1,210,493 UART: [ldev] ++
1,210,661 UART: [ldev] CDI.KEYID = 6
1,211,025 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,735 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,900 UART: [fwproc] Recv command 0x46574c44
1,284,633 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,427 UART: ROM Fatal Error: 0x000B0017
1,333,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,369 UART: [fwproc] Wait for Commands...
1,282,144 UART: [fwproc] Recv command 0x46574c44
1,282,877 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,961 UART: ROM Fatal Error: 0x000B0017
1,331,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,601 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,944 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,662 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,367 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,283,020 UART: [fwproc] Recv command 0x46574c44
1,283,753 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,825 UART: ROM Fatal Error: 0x000B0017
1,331,982 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,229 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,395 UART: [kat] SHA2-256
901,335 UART: [kat] SHA2-384
903,982 UART: [kat] SHA2-512-ACC
905,883 UART: [kat] ECC-384
915,674 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,199,191 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,700 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,874 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,066 UART: ROM Fatal Error: 0x000B0017
1,331,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,206 UART: [ldev] ++
1,209,374 UART: [ldev] CDI.KEYID = 6
1,209,738 UART: [ldev] SUBJECT.KEYID = 5
1,210,165 UART: [ldev] AUTHORITY.KEYID = 7
1,210,628 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,861 UART: [fwproc] Recv command 0x46574c44
1,282,594 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,586 UART: ROM Fatal Error: 0x000B0017
1,330,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,354 UART: [ldev] ++
1,209,522 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,313 UART: [ldev] AUTHORITY.KEYID = 7
1,210,776 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,198 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,209 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,520 UART: ROM Fatal Error: 0x000B0017
1,330,677 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,728 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
915,559 UART: [kat] HMAC-384Kdf
920,091 UART: [kat] LMS
1,168,403 UART: [kat] --
1,169,366 UART: [cold-reset] ++
1,169,706 UART: [fht] FHT @ 0x50003400
1,172,528 UART: [idev] ++
1,172,696 UART: [idev] CDI.KEYID = 6
1,173,057 UART: [idev] SUBJECT.KEYID = 7
1,173,482 UART: [idev] UDS.KEYID = 0
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,581 UART: [ldev] ++
1,208,749 UART: [ldev] CDI.KEYID = 6
1,209,113 UART: [ldev] SUBJECT.KEYID = 5
1,209,540 UART: [ldev] AUTHORITY.KEYID = 7
1,210,003 UART: [ldev] FE.KEYID = 1
1,215,229 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,525 UART: [ldev] --
1,280,913 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,933 UART: ROM Fatal Error: 0x000B0017
1,331,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,488 UART: [kat] SHA2-256
901,428 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,395 UART: [kat] LMS
1,168,707 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,798 UART: [fht] FHT @ 0x50003400
1,172,436 UART: [idev] ++
1,172,604 UART: [idev] CDI.KEYID = 6
1,172,965 UART: [idev] SUBJECT.KEYID = 7
1,173,390 UART: [idev] UDS.KEYID = 0
1,181,060 UART: [idev] Erasing UDS.KEYID = 0
1,198,242 UART: [idev] Sha1 KeyId Algorithm
1,207,032 UART: [idev] --
1,208,049 UART: [ldev] ++
1,208,217 UART: [ldev] CDI.KEYID = 6
1,208,581 UART: [ldev] SUBJECT.KEYID = 5
1,209,008 UART: [ldev] AUTHORITY.KEYID = 7
1,209,471 UART: [ldev] FE.KEYID = 1
1,215,075 UART: [ldev] Erasing FE.KEYID = 1
1,241,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,003 UART: [ldev] --
1,280,323 UART: [fwproc] Wait for Commands...
1,280,902 UART: [fwproc] Recv command 0x46574c44
1,281,635 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,457 UART: ROM Fatal Error: 0x000B0017
1,329,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,298 UART: [idev] Sha1 KeyId Algorithm
1,207,244 UART: [idev] --
1,208,321 UART: [ldev] ++
1,208,489 UART: [ldev] CDI.KEYID = 6
1,208,853 UART: [ldev] SUBJECT.KEYID = 5
1,209,280 UART: [ldev] AUTHORITY.KEYID = 7
1,209,743 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,979 UART: [ldev] --
1,280,353 UART: [fwproc] Wait for Commands...
1,280,994 UART: [fwproc] Recv command 0x46574c44
1,281,727 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,475 UART: ROM Fatal Error: 0x000B0017
1,330,632 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,735 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,689 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,664 UART: [ldev] ++
1,208,832 UART: [ldev] CDI.KEYID = 6
1,209,196 UART: [ldev] SUBJECT.KEYID = 5
1,209,623 UART: [ldev] AUTHORITY.KEYID = 7
1,210,086 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,348 UART: ROM Fatal Error: 0x000B0017
1,330,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,610 UART: [fwproc] Wait for Commands...
1,281,421 UART: [fwproc] Recv command 0x46574c44
1,282,154 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,160 UART: ROM Fatal Error: 0x000B0017
1,331,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,182,401 UART: [idev] Erasing UDS.KEYID = 0
1,199,865 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,724 UART: [ldev] ++
1,209,892 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,683 UART: [ldev] AUTHORITY.KEYID = 7
1,211,146 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,150 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,658 UART: ROM Fatal Error: 0x000B0017
1,330,815 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,746 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,565 UART: [kat] LMS
1,169,877 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,151 UART: [ldev] --
1,281,569 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,199 UART: ROM Fatal Error: 0x000B0017
1,331,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,752 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,209 UART: [ldev] SUBJECT.KEYID = 5
1,210,636 UART: [ldev] AUTHORITY.KEYID = 7
1,211,099 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,359 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,835 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,617 UART: ROM Fatal Error: 0x000B0017
1,331,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,146 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
891,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,329 UART: [kat] LMS
1,168,641 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,698 UART: [idev] Erasing UDS.KEYID = 0
1,198,726 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,509 UART: [ldev] ++
1,208,677 UART: [ldev] CDI.KEYID = 6
1,209,041 UART: [ldev] SUBJECT.KEYID = 5
1,209,468 UART: [ldev] AUTHORITY.KEYID = 7
1,209,931 UART: [ldev] FE.KEYID = 1
1,215,235 UART: [ldev] Erasing FE.KEYID = 1
1,241,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,551 UART: [ldev] --
1,280,815 UART: [fwproc] Wait for Commands...
1,281,518 UART: [fwproc] Recv command 0x46574c44
1,282,251 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,559 UART: ROM Fatal Error: 0x000B0017
1,329,716 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,797 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,030,654 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,174,641 UART:
2,175,041 UART: Running Caliptra ROM ...
2,176,324 UART:
2,176,487 UART: [state] CFI Enabled
2,177,482 UART: [state] LifecycleState = Unprovisioned
2,179,131 UART: [state] DebugLocked = No
2,180,242 UART: [state] WD Timer not started. Device not locked for debugging
2,182,723 UART: [kat] SHA2-256
2,183,387 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,186,402 UART: [kat] ++
2,186,851 UART: [kat] sha1
2,187,363 UART: [kat] SHA2-256
2,188,100 UART: [kat] SHA2-384
2,188,768 UART: [kat] SHA2-512-ACC
2,189,646 UART: [kat] ECC-384
3,775,278 UART: [kat] HMAC-384Kdf
3,794,164 UART: [kat] LMS
4,867,290 UART: [kat] --
4,871,721 UART: [cold-reset] ++
4,874,188 UART: [fht] FHT @ 0x50003400
4,883,984 UART: [idev] ++
4,884,545 UART: [idev] CDI.KEYID = 6
4,885,721 UART: [idev] SUBJECT.KEYID = 7
4,886,879 UART: [idev] UDS.KEYID = 0
4,921,381 UART: [idev] Erasing UDS.KEYID = 0
8,234,900 UART: [idev] Sha1 KeyId Algorithm
8,256,661 UART: [idev] --
8,260,350 UART: [ldev] ++
8,260,918 UART: [ldev] CDI.KEYID = 6
8,262,083 UART: [ldev] SUBJECT.KEYID = 5
8,263,308 UART: [ldev] AUTHORITY.KEYID = 7
8,264,406 UART: [ldev] FE.KEYID = 1
8,308,239 UART: [ldev] Erasing FE.KEYID = 1
11,642,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,955,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,971,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,987,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,003,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,023,301 UART: [ldev] --
14,028,147 UART: [fwproc] Wait for Commands...
14,031,272 UART: [fwproc] Recv command 0x46574c44
14,033,593 UART: [fwproc] Recv'd Img size: 114124 bytes
16,737,033 UART: ROM Fatal Error: 0x000B003B
16,740,446 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,023,662 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,523,437 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
2,025,380 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,169,506 UART:
2,169,894 UART: Running Caliptra ROM ...
2,171,059 UART:
2,171,231 UART: [state] CFI Enabled
2,172,204 UART: [state] LifecycleState = Unprovisioned
2,173,841 UART: [state] DebugLocked = No
2,174,942 UART: [state] WD Timer not started. Device not locked for debugging
2,177,410 UART: [kat] SHA2-256
2,178,076 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,094 UART: [kat] ++
2,181,545 UART: [kat] sha1
2,182,051 UART: [kat] SHA2-256
2,182,748 UART: [kat] SHA2-384
2,183,399 UART: [kat] SHA2-512-ACC
2,184,192 UART: [kat] ECC-384
4,095,452 UART: [kat] HMAC-384Kdf
4,108,273 UART: [kat] LMS
5,181,418 UART: [kat] --
5,185,919 UART: [cold-reset] ++
5,188,572 UART: [fht] FHT @ 0x50003400
5,200,025 UART: [idev] ++
5,200,706 UART: [idev] CDI.KEYID = 6
5,201,938 UART: [idev] SUBJECT.KEYID = 7
5,203,385 UART: [idev] UDS.KEYID = 0
5,219,153 UART: [idev] Erasing UDS.KEYID = 0
8,494,280 UART: [idev] Sha1 KeyId Algorithm
8,517,670 UART: [idev] --
8,521,338 UART: [ldev] ++
8,521,958 UART: [ldev] CDI.KEYID = 6
8,523,138 UART: [ldev] SUBJECT.KEYID = 5
8,524,626 UART: [ldev] AUTHORITY.KEYID = 7
8,526,207 UART: [ldev] FE.KEYID = 1
8,537,231 UART: [ldev] Erasing FE.KEYID = 1
11,826,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,346 UART: [ldev] --
14,192,019 UART: [fwproc] Wait for Commands...
14,195,140 UART: [fwproc] Recv command 0x46574c44
14,197,401 UART: [fwproc] Recv'd Img size: 114124 bytes
16,908,153 UART: ROM Fatal Error: 0x000B003B
16,911,559 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
2,025,076 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,721,756 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,026,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,243 UART:
2,171,674 UART: Running Caliptra ROM ...
2,172,806 UART:
2,172,975 UART: [state] CFI Enabled
2,173,949 UART: [state] LifecycleState = Unprovisioned
2,175,597 UART: [state] DebugLocked = No
2,176,708 UART: [state] WD Timer not started. Device not locked for debugging
2,179,189 UART: [kat] SHA2-256
2,179,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,879 UART: [kat] ++
2,183,330 UART: [kat] sha1
2,183,845 UART: [kat] SHA2-256
2,184,590 UART: [kat] SHA2-384
2,185,253 UART: [kat] SHA2-512-ACC
2,186,085 UART: [kat] ECC-384
2,927,947 UART: [kat] HMAC-384Kdf
2,951,686 UART: [kat] LMS
3,481,128 UART: [kat] --
3,484,961 UART: [cold-reset] ++
3,487,485 UART: [fht] FHT @ 0x50003400
3,498,549 UART: [idev] ++
3,499,121 UART: [idev] CDI.KEYID = 6
3,500,054 UART: [idev] SUBJECT.KEYID = 7
3,501,268 UART: [idev] UDS.KEYID = 0
3,522,573 UART: [idev] Erasing UDS.KEYID = 0
6,005,339 UART: [idev] Sha1 KeyId Algorithm
6,028,363 UART: [idev] --
6,032,307 UART: [ldev] ++
6,032,879 UART: [ldev] CDI.KEYID = 6
6,033,794 UART: [ldev] SUBJECT.KEYID = 5
6,035,016 UART: [ldev] AUTHORITY.KEYID = 7
6,036,253 UART: [ldev] FE.KEYID = 1
6,078,766 UART: [ldev] Erasing FE.KEYID = 1
8,583,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,052 UART: [ldev] --
10,392,892 UART: [fwproc] Wait for Commands...
10,394,827 UART: [fwproc] Recv command 0x46574c44
10,396,873 UART: [fwproc] Recv'd Img size: 114448 bytes
12,440,623 UART: ROM Fatal Error: 0x000B003B
12,443,749 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,026,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,245,937 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
2,025,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,793 UART:
2,170,184 UART: Running Caliptra ROM ...
2,171,353 UART:
2,171,529 UART: [state] CFI Enabled
2,172,487 UART: [state] LifecycleState = Unprovisioned
2,174,125 UART: [state] DebugLocked = No
2,175,227 UART: [state] WD Timer not started. Device not locked for debugging
2,177,696 UART: [kat] SHA2-256
2,178,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,368 UART: [kat] ++
2,181,814 UART: [kat] sha1
2,182,330 UART: [kat] SHA2-256
2,183,008 UART: [kat] SHA2-384
2,183,674 UART: [kat] SHA2-512-ACC
2,184,518 UART: [kat] ECC-384
3,278,813 UART: [kat] HMAC-384Kdf
3,292,504 UART: [kat] LMS
3,822,013 UART: [kat] --
3,825,142 UART: [cold-reset] ++
3,827,453 UART: [fht] FHT @ 0x50003400
3,838,815 UART: [idev] ++
3,839,411 UART: [idev] CDI.KEYID = 6
3,840,294 UART: [idev] SUBJECT.KEYID = 7
3,841,451 UART: [idev] UDS.KEYID = 0
3,857,693 UART: [idev] Erasing UDS.KEYID = 0
6,315,652 UART: [idev] Sha1 KeyId Algorithm
6,339,368 UART: [idev] --
6,344,600 UART: [ldev] ++
6,345,185 UART: [ldev] CDI.KEYID = 6
6,346,095 UART: [ldev] SUBJECT.KEYID = 5
6,347,258 UART: [ldev] AUTHORITY.KEYID = 7
6,348,544 UART: [ldev] FE.KEYID = 1
6,358,593 UART: [ldev] Erasing FE.KEYID = 1
8,832,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,228 UART: [ldev] --
10,626,785 UART: [fwproc] Wait for Commands...
10,630,017 UART: [fwproc] Recv command 0x46574c44
10,632,115 UART: [fwproc] Recv'd Img size: 114448 bytes
12,682,190 UART: ROM Fatal Error: 0x000B003B
12,685,313 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
2,024,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,197 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,035,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,179,902 UART:
2,180,304 UART: Running Caliptra ROM ...
2,181,477 UART:
2,181,649 UART: [state] CFI Enabled
2,182,619 UART: [state] LifecycleState = Unprovisioned
2,184,491 UART: [state] DebugLocked = No
2,185,617 UART: [state] WD Timer not started. Device not locked for debugging
2,188,095 UART: [kat] SHA2-256
2,188,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,780 UART: [kat] ++
2,192,236 UART: [kat] sha1
2,192,772 UART: [kat] SHA2-256
2,193,467 UART: [kat] SHA2-384
2,194,142 UART: [kat] SHA2-512-ACC
2,194,968 UART: [kat] ECC-384
2,949,604 UART: [kat] HMAC-384Kdf
2,972,034 UART: [kat] LMS
3,501,462 UART: [kat] --
3,506,538 UART: [cold-reset] ++
3,508,530 UART: [fht] FHT @ 0x50003400
3,520,493 UART: [idev] ++
3,521,055 UART: [idev] CDI.KEYID = 6
3,522,079 UART: [idev] SUBJECT.KEYID = 7
3,523,191 UART: [idev] UDS.KEYID = 0
3,542,845 UART: [idev] Erasing UDS.KEYID = 0
6,025,004 UART: [idev] Sha1 KeyId Algorithm
6,047,926 UART: [idev] --
6,052,862 UART: [ldev] ++
6,053,443 UART: [ldev] CDI.KEYID = 6
6,054,355 UART: [ldev] SUBJECT.KEYID = 5
6,055,521 UART: [ldev] AUTHORITY.KEYID = 7
6,056,812 UART: [ldev] FE.KEYID = 1
6,099,544 UART: [ldev] Erasing FE.KEYID = 1
8,603,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,440 UART: [ldev] --
10,414,817 UART: [fwproc] Wait for Commands...
10,417,240 UART: [fwproc] Recv command 0x46574c44
10,419,337 UART: [fwproc] Recv'd Img size: 114448 bytes
12,465,674 UART: ROM Fatal Error: 0x000B003B
12,468,768 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,890 writing to cptra_bootfsm_go
2,029,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,226,239 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,025,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,083 UART:
2,170,499 UART: Running Caliptra ROM ...
2,171,663 UART:
2,171,831 UART: [state] CFI Enabled
2,172,797 UART: [state] LifecycleState = Unprovisioned
2,174,445 UART: [state] DebugLocked = No
2,175,499 UART: [state] WD Timer not started. Device not locked for debugging
2,177,986 UART: [kat] SHA2-256
2,178,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,673 UART: [kat] ++
2,182,123 UART: [kat] sha1
2,182,636 UART: [kat] SHA2-256
2,183,370 UART: [kat] SHA2-384
2,184,034 UART: [kat] SHA2-512-ACC
2,184,914 UART: [kat] ECC-384
3,278,247 UART: [kat] HMAC-384Kdf
3,291,234 UART: [kat] LMS
3,820,715 UART: [kat] --
3,826,710 UART: [cold-reset] ++
3,828,526 UART: [fht] FHT @ 0x50003400
3,839,121 UART: [idev] ++
3,839,692 UART: [idev] CDI.KEYID = 6
3,840,599 UART: [idev] SUBJECT.KEYID = 7
3,841,810 UART: [idev] UDS.KEYID = 0
3,859,620 UART: [idev] Erasing UDS.KEYID = 0
6,317,581 UART: [idev] Sha1 KeyId Algorithm
6,340,857 UART: [idev] --
6,345,390 UART: [ldev] ++
6,345,953 UART: [ldev] CDI.KEYID = 6
6,346,857 UART: [ldev] SUBJECT.KEYID = 5
6,348,008 UART: [ldev] AUTHORITY.KEYID = 7
6,349,314 UART: [ldev] FE.KEYID = 1
6,359,747 UART: [ldev] Erasing FE.KEYID = 1
8,833,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,788 UART: [ldev] --
10,624,847 UART: [fwproc] Wait for Commands...
10,626,404 UART: [fwproc] Recv command 0x46574c44
10,628,509 UART: [fwproc] Recv'd Img size: 114448 bytes
12,680,179 UART: ROM Fatal Error: 0x000B003B
12,683,310 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,024,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,450,807 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,224 UART: [ldev] --
1,280,512 UART: [fwproc] Wait for Commands...
1,281,237 UART: [fwproc] Recv command 0x46574c44
1,281,970 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,718 UART: ROM Fatal Error: 0x000B003B
1,329,877 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,268 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,431 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,281,957 UART: [fwproc] Wait for Commands...
1,282,632 UART: [fwproc] Recv command 0x46574c44
1,283,365 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,977 UART: ROM Fatal Error: 0x000B003B
1,331,136 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,699 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,324 UART: [kat] HMAC-384Kdf
919,956 UART: [kat] LMS
1,168,268 UART: [kat] --
1,169,043 UART: [cold-reset] ++
1,169,399 UART: [fht] FHT @ 0x50003400
1,172,175 UART: [idev] ++
1,172,343 UART: [idev] CDI.KEYID = 6
1,172,704 UART: [idev] SUBJECT.KEYID = 7
1,173,129 UART: [idev] UDS.KEYID = 0
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,856 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,412 UART: ROM Fatal Error: 0x000B003B
1,330,571 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,086 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,793 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x46574c44
1,283,327 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,805 UART: ROM Fatal Error: 0x000B003B
1,331,964 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,491 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,278 UART: [kat] SHA2-512-ACC
906,179 UART: [kat] ECC-384
915,544 UART: [kat] HMAC-384Kdf
920,072 UART: [kat] LMS
1,168,384 UART: [kat] --
1,169,237 UART: [cold-reset] ++
1,169,803 UART: [fht] FHT @ 0x50003400
1,172,415 UART: [idev] ++
1,172,583 UART: [idev] CDI.KEYID = 6
1,172,944 UART: [idev] SUBJECT.KEYID = 7
1,173,369 UART: [idev] UDS.KEYID = 0
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,241 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,240,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,798 UART: [ldev] --
1,280,172 UART: [fwproc] Wait for Commands...
1,280,743 UART: [fwproc] Recv command 0x46574c44
1,281,476 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,408 UART: ROM Fatal Error: 0x000B003B
1,329,567 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,388 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,862 UART: [kat] ++
896,014 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,969 UART: [kat] HMAC-384Kdf
921,655 UART: [kat] LMS
1,169,967 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,158 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,578 UART: [idev] Sha1 KeyId Algorithm
1,209,430 UART: [idev] --
1,210,421 UART: [ldev] ++
1,210,589 UART: [ldev] CDI.KEYID = 6
1,210,953 UART: [ldev] SUBJECT.KEYID = 5
1,211,380 UART: [ldev] AUTHORITY.KEYID = 7
1,211,843 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,499 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,301 UART: ROM Fatal Error: 0x000B003B
1,332,460 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,469 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,023,676 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,082 UART:
2,168,470 UART: Running Caliptra ROM ...
2,169,634 UART:
2,169,815 UART: [state] CFI Enabled
2,170,791 UART: [state] LifecycleState = Unprovisioned
2,172,514 UART: [state] DebugLocked = No
2,173,593 UART: [state] WD Timer not started. Device not locked for debugging
2,176,062 UART: [kat] SHA2-256
2,176,732 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,742 UART: [kat] ++
2,180,194 UART: [kat] sha1
2,180,707 UART: [kat] SHA2-256
2,181,465 UART: [kat] SHA2-384
2,182,130 UART: [kat] SHA2-512-ACC
2,183,013 UART: [kat] ECC-384
3,775,177 UART: [kat] HMAC-384Kdf
3,803,454 UART: [kat] LMS
4,876,612 UART: [kat] --
4,881,270 UART: [cold-reset] ++
4,883,097 UART: [fht] FHT @ 0x50003400
4,894,518 UART: [idev] ++
4,895,190 UART: [idev] CDI.KEYID = 6
4,896,372 UART: [idev] SUBJECT.KEYID = 7
4,897,541 UART: [idev] UDS.KEYID = 0
4,930,455 UART: [idev] Erasing UDS.KEYID = 0
8,243,873 UART: [idev] Sha1 KeyId Algorithm
8,267,002 UART: [idev] --
8,271,646 UART: [ldev] ++
8,272,236 UART: [ldev] CDI.KEYID = 6
8,273,425 UART: [ldev] SUBJECT.KEYID = 5
8,274,591 UART: [ldev] AUTHORITY.KEYID = 7
8,275,747 UART: [ldev] FE.KEYID = 1
8,317,695 UART: [ldev] Erasing FE.KEYID = 1
11,650,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,251 UART: [ldev] --
14,038,759 UART: [fwproc] Wait for Commands...
14,041,122 UART: [fwproc] Recv command 0x46574c44
14,043,439 UART: [fwproc] Recv'd Img size: 114124 bytes
16,742,993 UART: ROM Fatal Error: 0x000B0010
16,746,407 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,020,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,502,672 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,022,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,464 UART:
2,166,865 UART: Running Caliptra ROM ...
2,168,033 UART:
2,168,207 UART: [state] CFI Enabled
2,169,176 UART: [state] LifecycleState = Unprovisioned
2,170,819 UART: [state] DebugLocked = No
2,171,927 UART: [state] WD Timer not started. Device not locked for debugging
2,174,397 UART: [kat] SHA2-256
2,175,063 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,093 UART: [kat] ++
2,178,544 UART: [kat] sha1
2,179,050 UART: [kat] SHA2-256
2,179,747 UART: [kat] SHA2-384
2,180,399 UART: [kat] SHA2-512-ACC
2,181,191 UART: [kat] ECC-384
4,097,748 UART: [kat] HMAC-384Kdf
4,109,142 UART: [kat] LMS
5,182,299 UART: [kat] --
5,185,700 UART: [cold-reset] ++
5,187,150 UART: [fht] FHT @ 0x50003400
5,198,781 UART: [idev] ++
5,199,458 UART: [idev] CDI.KEYID = 6
5,200,570 UART: [idev] SUBJECT.KEYID = 7
5,202,111 UART: [idev] UDS.KEYID = 0
5,216,898 UART: [idev] Erasing UDS.KEYID = 0
8,491,755 UART: [idev] Sha1 KeyId Algorithm
8,513,757 UART: [idev] --
8,517,179 UART: [ldev] ++
8,517,791 UART: [ldev] CDI.KEYID = 6
8,518,979 UART: [ldev] SUBJECT.KEYID = 5
8,520,415 UART: [ldev] AUTHORITY.KEYID = 7
8,521,975 UART: [ldev] FE.KEYID = 1
8,534,724 UART: [ldev] Erasing FE.KEYID = 1
11,826,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,945 UART: [ldev] --
14,193,396 UART: [fwproc] Wait for Commands...
14,195,064 UART: [fwproc] Recv command 0x46574c44
14,197,351 UART: [fwproc] Recv'd Img size: 114124 bytes
16,892,584 UART: ROM Fatal Error: 0x000B0010
16,896,005 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,028,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,695,301 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,022,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,599 UART:
2,166,992 UART: Running Caliptra ROM ...
2,168,096 UART:
2,168,257 UART: [state] CFI Enabled
2,169,233 UART: [state] LifecycleState = Unprovisioned
2,170,798 UART: [state] DebugLocked = No
2,171,820 UART: [state] WD Timer not started. Device not locked for debugging
2,174,280 UART: [kat] SHA2-256
2,174,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,945 UART: [kat] ++
2,178,394 UART: [kat] sha1
2,178,909 UART: [kat] SHA2-256
2,179,569 UART: [kat] SHA2-384
2,180,224 UART: [kat] SHA2-512-ACC
2,181,111 UART: [kat] ECC-384
2,947,164 UART: [kat] HMAC-384Kdf
2,969,766 UART: [kat] LMS
3,499,258 UART: [kat] --
3,502,245 UART: [cold-reset] ++
3,503,263 UART: [fht] FHT @ 0x50003400
3,514,032 UART: [idev] ++
3,514,611 UART: [idev] CDI.KEYID = 6
3,515,634 UART: [idev] SUBJECT.KEYID = 7
3,516,741 UART: [idev] UDS.KEYID = 0
3,541,544 UART: [idev] Erasing UDS.KEYID = 0
6,025,719 UART: [idev] Sha1 KeyId Algorithm
6,048,370 UART: [idev] --
6,053,130 UART: [ldev] ++
6,053,709 UART: [ldev] CDI.KEYID = 6
6,054,794 UART: [ldev] SUBJECT.KEYID = 5
6,055,903 UART: [ldev] AUTHORITY.KEYID = 7
6,057,083 UART: [ldev] FE.KEYID = 1
6,097,340 UART: [ldev] Erasing FE.KEYID = 1
8,601,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,352 UART: [ldev] --
10,412,140 UART: [fwproc] Wait for Commands...
10,414,956 UART: [fwproc] Recv command 0x46574c44
10,417,055 UART: [fwproc] Recv'd Img size: 114448 bytes
12,457,868 UART: ROM Fatal Error: 0x000B0010
12,461,006 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,024,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,227,316 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,022,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,087 UART:
2,167,641 UART: Running Caliptra ROM ...
2,168,747 UART:
2,168,909 UART: [state] CFI Enabled
2,169,903 UART: [state] LifecycleState = Unprovisioned
2,171,564 UART: [state] DebugLocked = No
2,172,667 UART: [state] WD Timer not started. Device not locked for debugging
2,175,145 UART: [kat] SHA2-256
2,175,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,800 UART: [kat] ++
2,179,249 UART: [kat] sha1
2,179,762 UART: [kat] SHA2-256
2,180,523 UART: [kat] SHA2-384
2,181,191 UART: [kat] SHA2-512-ACC
2,182,071 UART: [kat] ECC-384
3,278,857 UART: [kat] HMAC-384Kdf
3,291,255 UART: [kat] LMS
3,820,785 UART: [kat] --
3,824,941 UART: [cold-reset] ++
3,826,501 UART: [fht] FHT @ 0x50003400
3,837,533 UART: [idev] ++
3,838,091 UART: [idev] CDI.KEYID = 6
3,839,055 UART: [idev] SUBJECT.KEYID = 7
3,840,213 UART: [idev] UDS.KEYID = 0
3,858,191 UART: [idev] Erasing UDS.KEYID = 0
6,311,579 UART: [idev] Sha1 KeyId Algorithm
6,335,406 UART: [idev] --
6,340,534 UART: [ldev] ++
6,341,123 UART: [ldev] CDI.KEYID = 6
6,342,029 UART: [ldev] SUBJECT.KEYID = 5
6,343,195 UART: [ldev] AUTHORITY.KEYID = 7
6,344,423 UART: [ldev] FE.KEYID = 1
6,353,732 UART: [ldev] Erasing FE.KEYID = 1
8,828,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,052 UART: [ldev] --
10,622,505 UART: [fwproc] Wait for Commands...
10,624,385 UART: [fwproc] Recv command 0x46574c44
10,626,483 UART: [fwproc] Recv'd Img size: 114448 bytes
12,669,023 UART: ROM Fatal Error: 0x000B0010
12,672,117 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,021,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,452,630 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,023,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,691 UART:
2,169,096 UART: Running Caliptra ROM ...
2,170,269 UART:
2,170,439 UART: [state] CFI Enabled
2,171,402 UART: [state] LifecycleState = Unprovisioned
2,173,055 UART: [state] DebugLocked = No
2,174,169 UART: [state] WD Timer not started. Device not locked for debugging
2,176,634 UART: [kat] SHA2-256
2,177,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,307 UART: [kat] ++
2,180,760 UART: [kat] sha1
2,181,273 UART: [kat] SHA2-256
2,181,952 UART: [kat] SHA2-384
2,182,789 UART: [kat] SHA2-512-ACC
2,183,613 UART: [kat] ECC-384
2,946,631 UART: [kat] HMAC-384Kdf
2,971,549 UART: [kat] LMS
3,500,987 UART: [kat] --
3,504,536 UART: [cold-reset] ++
3,505,603 UART: [fht] FHT @ 0x50003400
3,515,424 UART: [idev] ++
3,515,988 UART: [idev] CDI.KEYID = 6
3,516,922 UART: [idev] SUBJECT.KEYID = 7
3,518,133 UART: [idev] UDS.KEYID = 0
3,544,346 UART: [idev] Erasing UDS.KEYID = 0
6,028,758 UART: [idev] Sha1 KeyId Algorithm
6,050,368 UART: [idev] --
6,053,370 UART: [ldev] ++
6,053,969 UART: [ldev] CDI.KEYID = 6
6,054,859 UART: [ldev] SUBJECT.KEYID = 5
6,055,969 UART: [ldev] AUTHORITY.KEYID = 7
6,057,314 UART: [ldev] FE.KEYID = 1
6,099,960 UART: [ldev] Erasing FE.KEYID = 1
8,603,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,165 UART: [ldev] --
10,412,890 UART: [fwproc] Wait for Commands...
10,415,046 UART: [fwproc] Recv command 0x46574c44
10,417,148 UART: [fwproc] Recv'd Img size: 114448 bytes
12,460,696 UART: ROM Fatal Error: 0x000B0010
12,463,822 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,023,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,247,420 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,023,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,589 UART:
2,168,135 UART: Running Caliptra ROM ...
2,169,305 UART:
2,169,481 UART: [state] CFI Enabled
2,170,382 UART: [state] LifecycleState = Unprovisioned
2,172,041 UART: [state] DebugLocked = No
2,173,071 UART: [state] WD Timer not started. Device not locked for debugging
2,175,530 UART: [kat] SHA2-256
2,176,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,184 UART: [kat] ++
2,179,630 UART: [kat] sha1
2,180,141 UART: [kat] SHA2-256
2,180,800 UART: [kat] SHA2-384
2,181,453 UART: [kat] SHA2-512-ACC
2,182,251 UART: [kat] ECC-384
3,284,701 UART: [kat] HMAC-384Kdf
3,298,390 UART: [kat] LMS
3,827,900 UART: [kat] --
3,830,637 UART: [cold-reset] ++
3,831,919 UART: [fht] FHT @ 0x50003400
3,843,821 UART: [idev] ++
3,844,409 UART: [idev] CDI.KEYID = 6
3,845,321 UART: [idev] SUBJECT.KEYID = 7
3,846,480 UART: [idev] UDS.KEYID = 0
3,862,080 UART: [idev] Erasing UDS.KEYID = 0
6,320,603 UART: [idev] Sha1 KeyId Algorithm
6,342,471 UART: [idev] --
6,346,492 UART: [ldev] ++
6,347,064 UART: [ldev] CDI.KEYID = 6
6,347,975 UART: [ldev] SUBJECT.KEYID = 5
6,349,186 UART: [ldev] AUTHORITY.KEYID = 7
6,350,413 UART: [ldev] FE.KEYID = 1
6,362,435 UART: [ldev] Erasing FE.KEYID = 1
8,836,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,786 UART: [ldev] --
10,628,152 UART: [fwproc] Wait for Commands...
10,631,109 UART: [fwproc] Recv command 0x46574c44
10,633,210 UART: [fwproc] Recv'd Img size: 114448 bytes
12,670,843 UART: ROM Fatal Error: 0x000B0010
12,673,926 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
2,023,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,042 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,526 UART: [ldev] --
1,280,968 UART: [fwproc] Wait for Commands...
1,281,743 UART: [fwproc] Recv command 0x46574c44
1,282,476 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,783 UART: ROM Fatal Error: 0x000B0010
1,325,940 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,859 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,816 UART: [idev] ++
1,173,984 UART: [idev] CDI.KEYID = 6
1,174,345 UART: [idev] SUBJECT.KEYID = 7
1,174,770 UART: [idev] UDS.KEYID = 0
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,247 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,366 UART: [fwproc] Recv command 0x46574c44
1,284,099 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,812 UART: ROM Fatal Error: 0x000B0010
1,327,969 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,378 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,838 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,281,905 UART: [fwproc] Recv command 0x46574c44
1,282,638 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,943 UART: ROM Fatal Error: 0x000B0010
1,327,100 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,925 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,485 UART: [ldev] SUBJECT.KEYID = 5
1,210,912 UART: [ldev] AUTHORITY.KEYID = 7
1,211,375 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,481 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,849 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,478 UART: ROM Fatal Error: 0x000B0010
1,327,635 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,722 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,209,040 UART: [ldev] ++
1,209,208 UART: [ldev] CDI.KEYID = 6
1,209,572 UART: [ldev] SUBJECT.KEYID = 5
1,209,999 UART: [ldev] AUTHORITY.KEYID = 7
1,210,462 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,427 UART: [fwproc] Recv command 0x46574c44
1,282,160 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,747 UART: ROM Fatal Error: 0x000B0010
1,325,904 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,181 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,091 UART: [kat] SHA2-512-ACC
906,992 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,777 UART: [ldev] ++
1,209,945 UART: [ldev] CDI.KEYID = 6
1,210,309 UART: [ldev] SUBJECT.KEYID = 5
1,210,736 UART: [ldev] AUTHORITY.KEYID = 7
1,211,199 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,738 UART: ROM Fatal Error: 0x000B0010
1,325,895 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,698 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,028,186 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,172,652 UART:
2,173,059 UART: Running Caliptra ROM ...
2,174,147 UART:
2,174,309 UART: [state] CFI Enabled
2,175,286 UART: [state] LifecycleState = Unprovisioned
2,176,937 UART: [state] DebugLocked = No
2,177,985 UART: [state] WD Timer not started. Device not locked for debugging
2,180,456 UART: [kat] SHA2-256
2,181,122 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,128 UART: [kat] ++
2,184,578 UART: [kat] sha1
2,185,091 UART: [kat] SHA2-256
2,185,830 UART: [kat] SHA2-384
2,186,493 UART: [kat] SHA2-512-ACC
2,187,322 UART: [kat] ECC-384
3,777,287 UART: [kat] HMAC-384Kdf
3,804,813 UART: [kat] LMS
4,877,942 UART: [kat] --
4,881,828 UART: [cold-reset] ++
4,884,567 UART: [fht] FHT @ 0x50003400
4,896,081 UART: [idev] ++
4,896,764 UART: [idev] CDI.KEYID = 6
4,897,947 UART: [idev] SUBJECT.KEYID = 7
4,899,108 UART: [idev] UDS.KEYID = 0
4,931,098 UART: [idev] Erasing UDS.KEYID = 0
8,244,654 UART: [idev] Sha1 KeyId Algorithm
8,267,297 UART: [idev] --
8,271,777 UART: [ldev] ++
8,272,395 UART: [ldev] CDI.KEYID = 6
8,273,571 UART: [ldev] SUBJECT.KEYID = 5
8,274,752 UART: [ldev] AUTHORITY.KEYID = 7
8,275,985 UART: [ldev] FE.KEYID = 1
8,317,896 UART: [ldev] Erasing FE.KEYID = 1
11,653,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,017 UART: [ldev] --
14,035,482 UART: [fwproc] Wait for Commands...
14,038,436 UART: [fwproc] Recv command 0x46574c44
14,040,766 UART: [fwproc] Recv'd Img size: 114124 bytes
16,745,798 UART: ROM Fatal Error: 0x000B0012
16,749,264 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,021,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,519,513 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,030,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,174,353 UART:
2,174,750 UART: Running Caliptra ROM ...
2,175,920 UART:
2,176,086 UART: [state] CFI Enabled
2,177,056 UART: [state] LifecycleState = Unprovisioned
2,178,697 UART: [state] DebugLocked = No
2,179,794 UART: [state] WD Timer not started. Device not locked for debugging
2,182,490 UART: [kat] SHA2-256
2,183,170 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,186,181 UART: [kat] ++
2,186,649 UART: [kat] sha1
2,187,195 UART: [kat] SHA2-256
2,187,848 UART: [kat] SHA2-384
2,188,495 UART: [kat] SHA2-512-ACC
2,189,310 UART: [kat] ECC-384
4,098,630 UART: [kat] HMAC-384Kdf
4,109,741 UART: [kat] LMS
5,182,876 UART: [kat] --
5,186,593 UART: [cold-reset] ++
5,188,919 UART: [fht] FHT @ 0x50003400
5,200,713 UART: [idev] ++
5,201,434 UART: [idev] CDI.KEYID = 6
5,202,594 UART: [idev] SUBJECT.KEYID = 7
5,204,076 UART: [idev] UDS.KEYID = 0
5,218,300 UART: [idev] Erasing UDS.KEYID = 0
8,491,630 UART: [idev] Sha1 KeyId Algorithm
8,513,636 UART: [idev] --
8,517,114 UART: [ldev] ++
8,517,685 UART: [ldev] CDI.KEYID = 6
8,518,866 UART: [ldev] SUBJECT.KEYID = 5
8,520,355 UART: [ldev] AUTHORITY.KEYID = 7
8,521,918 UART: [ldev] FE.KEYID = 1
8,532,565 UART: [ldev] Erasing FE.KEYID = 1
11,822,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,053 UART: [ldev] --
14,186,854 UART: [fwproc] Wait for Commands...
14,189,012 UART: [fwproc] Recv command 0x46574c44
14,191,336 UART: [fwproc] Recv'd Img size: 114124 bytes
16,883,272 UART: ROM Fatal Error: 0x000B0012
16,886,722 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,022,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,719,306 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,035,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,180,488 UART:
2,180,891 UART: Running Caliptra ROM ...
2,182,063 UART:
2,182,241 UART: [state] CFI Enabled
2,183,231 UART: [state] LifecycleState = Unprovisioned
2,184,895 UART: [state] DebugLocked = No
2,186,006 UART: [state] WD Timer not started. Device not locked for debugging
2,188,481 UART: [kat] SHA2-256
2,189,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,192,146 UART: [kat] ++
2,192,595 UART: [kat] sha1
2,193,111 UART: [kat] SHA2-256
2,193,852 UART: [kat] SHA2-384
2,194,519 UART: [kat] SHA2-512-ACC
2,195,404 UART: [kat] ECC-384
2,946,827 UART: [kat] HMAC-384Kdf
2,971,852 UART: [kat] LMS
3,501,256 UART: [kat] --
3,504,835 UART: [cold-reset] ++
3,507,260 UART: [fht] FHT @ 0x50003400
3,518,594 UART: [idev] ++
3,519,160 UART: [idev] CDI.KEYID = 6
3,520,083 UART: [idev] SUBJECT.KEYID = 7
3,521,248 UART: [idev] UDS.KEYID = 0
3,542,313 UART: [idev] Erasing UDS.KEYID = 0
6,025,272 UART: [idev] Sha1 KeyId Algorithm
6,048,775 UART: [idev] --
6,053,156 UART: [ldev] ++
6,053,727 UART: [ldev] CDI.KEYID = 6
6,054,609 UART: [ldev] SUBJECT.KEYID = 5
6,055,826 UART: [ldev] AUTHORITY.KEYID = 7
6,057,065 UART: [ldev] FE.KEYID = 1
6,100,291 UART: [ldev] Erasing FE.KEYID = 1
8,604,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,534 UART: [ldev] --
10,412,621 UART: [fwproc] Wait for Commands...
10,415,356 UART: [fwproc] Recv command 0x46574c44
10,417,414 UART: [fwproc] Recv'd Img size: 114448 bytes
12,466,958 UART: ROM Fatal Error: 0x000B0012
12,470,088 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,025,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,235,300 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,029,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,173,702 UART:
2,174,087 UART: Running Caliptra ROM ...
2,175,262 UART:
2,175,434 UART: [state] CFI Enabled
2,176,403 UART: [state] LifecycleState = Unprovisioned
2,178,049 UART: [state] DebugLocked = No
2,179,158 UART: [state] WD Timer not started. Device not locked for debugging
2,181,632 UART: [kat] SHA2-256
2,182,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,291 UART: [kat] ++
2,185,782 UART: [kat] sha1
2,186,294 UART: [kat] SHA2-256
2,187,034 UART: [kat] SHA2-384
2,187,724 UART: [kat] SHA2-512-ACC
2,188,610 UART: [kat] ECC-384
3,286,494 UART: [kat] HMAC-384Kdf
3,298,119 UART: [kat] LMS
3,827,579 UART: [kat] --
3,831,679 UART: [cold-reset] ++
3,832,656 UART: [fht] FHT @ 0x50003400
3,844,989 UART: [idev] ++
3,845,558 UART: [idev] CDI.KEYID = 6
3,846,482 UART: [idev] SUBJECT.KEYID = 7
3,847,640 UART: [idev] UDS.KEYID = 0
3,863,400 UART: [idev] Erasing UDS.KEYID = 0
6,320,531 UART: [idev] Sha1 KeyId Algorithm
6,344,563 UART: [idev] --
6,347,364 UART: [ldev] ++
6,347,927 UART: [ldev] CDI.KEYID = 6
6,348,833 UART: [ldev] SUBJECT.KEYID = 5
6,349,965 UART: [ldev] AUTHORITY.KEYID = 7
6,351,307 UART: [ldev] FE.KEYID = 1
6,363,868 UART: [ldev] Erasing FE.KEYID = 1
8,832,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,772 UART: [ldev] --
10,621,492 UART: [fwproc] Wait for Commands...
10,624,125 UART: [fwproc] Recv command 0x46574c44
10,626,220 UART: [fwproc] Recv'd Img size: 114448 bytes
12,679,778 UART: ROM Fatal Error: 0x000B0012
12,682,912 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,029,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,452,992 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,024,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,161 UART:
2,169,548 UART: Running Caliptra ROM ...
2,170,701 UART:
2,170,874 UART: [state] CFI Enabled
2,171,775 UART: [state] LifecycleState = Unprovisioned
2,173,427 UART: [state] DebugLocked = No
2,174,462 UART: [state] WD Timer not started. Device not locked for debugging
2,176,988 UART: [kat] SHA2-256
2,177,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,668 UART: [kat] ++
2,181,174 UART: [kat] sha1
2,181,690 UART: [kat] SHA2-256
2,182,373 UART: [kat] SHA2-384
2,183,033 UART: [kat] SHA2-512-ACC
2,183,834 UART: [kat] ECC-384
2,947,062 UART: [kat] HMAC-384Kdf
2,969,950 UART: [kat] LMS
3,499,440 UART: [kat] --
3,502,972 UART: [cold-reset] ++
3,504,690 UART: [fht] FHT @ 0x50003400
3,515,455 UART: [idev] ++
3,516,020 UART: [idev] CDI.KEYID = 6
3,517,039 UART: [idev] SUBJECT.KEYID = 7
3,518,146 UART: [idev] UDS.KEYID = 0
3,541,581 UART: [idev] Erasing UDS.KEYID = 0
6,028,264 UART: [idev] Sha1 KeyId Algorithm
6,051,564 UART: [idev] --
6,054,919 UART: [ldev] ++
6,055,496 UART: [ldev] CDI.KEYID = 6
6,056,551 UART: [ldev] SUBJECT.KEYID = 5
6,057,581 UART: [ldev] AUTHORITY.KEYID = 7
6,058,881 UART: [ldev] FE.KEYID = 1
6,099,035 UART: [ldev] Erasing FE.KEYID = 1
8,603,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,177 UART: [ldev] --
10,414,102 UART: [fwproc] Wait for Commands...
10,417,122 UART: [fwproc] Recv command 0x46574c44
10,419,228 UART: [fwproc] Recv'd Img size: 114448 bytes
12,469,381 UART: ROM Fatal Error: 0x000B0012
12,472,508 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,031,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,283,502 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,691 writing to cptra_bootfsm_go
2,024,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,357 UART:
2,169,762 UART: Running Caliptra ROM ...
2,170,931 UART:
2,171,116 UART: [state] CFI Enabled
2,172,073 UART: [state] LifecycleState = Unprovisioned
2,173,725 UART: [state] DebugLocked = No
2,174,828 UART: [state] WD Timer not started. Device not locked for debugging
2,177,286 UART: [kat] SHA2-256
2,177,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,944 UART: [kat] ++
2,181,394 UART: [kat] sha1
2,181,907 UART: [kat] SHA2-256
2,182,643 UART: [kat] SHA2-384
2,183,307 UART: [kat] SHA2-512-ACC
2,184,186 UART: [kat] ECC-384
3,279,174 UART: [kat] HMAC-384Kdf
3,291,696 UART: [kat] LMS
3,821,207 UART: [kat] --
3,824,817 UART: [cold-reset] ++
3,826,580 UART: [fht] FHT @ 0x50003400
3,836,633 UART: [idev] ++
3,837,201 UART: [idev] CDI.KEYID = 6
3,838,134 UART: [idev] SUBJECT.KEYID = 7
3,839,344 UART: [idev] UDS.KEYID = 0
3,854,485 UART: [idev] Erasing UDS.KEYID = 0
6,309,146 UART: [idev] Sha1 KeyId Algorithm
6,332,705 UART: [idev] --
6,337,934 UART: [ldev] ++
6,338,497 UART: [ldev] CDI.KEYID = 6
6,339,375 UART: [ldev] SUBJECT.KEYID = 5
6,340,587 UART: [ldev] AUTHORITY.KEYID = 7
6,341,895 UART: [ldev] FE.KEYID = 1
6,352,027 UART: [ldev] Erasing FE.KEYID = 1
8,823,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,284 UART: [ldev] --
10,612,575 UART: [fwproc] Wait for Commands...
10,614,837 UART: [fwproc] Recv command 0x46574c44
10,616,893 UART: [fwproc] Recv'd Img size: 114448 bytes
12,677,544 UART: ROM Fatal Error: 0x000B0012
12,680,651 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,021,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,459,697 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,305 UART: [kat] SHA2-256
902,245 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,846 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,681 UART: [cold-reset] ++
1,171,179 UART: [fht] FHT @ 0x50003400
1,174,007 UART: [idev] ++
1,174,175 UART: [idev] CDI.KEYID = 6
1,174,536 UART: [idev] SUBJECT.KEYID = 7
1,174,961 UART: [idev] UDS.KEYID = 0
1,182,967 UART: [idev] Erasing UDS.KEYID = 0
1,199,685 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,764 UART: [ldev] ++
1,209,932 UART: [ldev] CDI.KEYID = 6
1,210,296 UART: [ldev] SUBJECT.KEYID = 5
1,210,723 UART: [ldev] AUTHORITY.KEYID = 7
1,211,186 UART: [ldev] FE.KEYID = 1
1,216,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,820 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,141 UART: ROM Fatal Error: 0x000B0012
1,331,298 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,605 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,466 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,059 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,283,996 UART: [fwproc] Recv command 0x46574c44
1,284,729 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,052 UART: ROM Fatal Error: 0x000B0012
1,332,209 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,912 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,703 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,932 UART: [ldev] --
1,281,242 UART: [fwproc] Wait for Commands...
1,282,063 UART: [fwproc] Recv command 0x46574c44
1,282,796 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,051 UART: ROM Fatal Error: 0x000B0012
1,331,208 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,617 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,181,682 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,786 UART: [idev] --
1,209,061 UART: [ldev] ++
1,209,229 UART: [ldev] CDI.KEYID = 6
1,209,593 UART: [ldev] SUBJECT.KEYID = 5
1,210,020 UART: [ldev] AUTHORITY.KEYID = 7
1,210,483 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,917 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,425 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,448 UART: ROM Fatal Error: 0x000B0012
1,330,605 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,606 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,102 UART: [kat] LMS
1,168,414 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,499 UART: [fht] FHT @ 0x50003400
1,172,209 UART: [idev] ++
1,172,377 UART: [idev] CDI.KEYID = 6
1,172,738 UART: [idev] SUBJECT.KEYID = 7
1,173,163 UART: [idev] UDS.KEYID = 0
1,181,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,206,969 UART: [idev] --
1,208,058 UART: [ldev] ++
1,208,226 UART: [ldev] CDI.KEYID = 6
1,208,590 UART: [ldev] SUBJECT.KEYID = 5
1,209,017 UART: [ldev] AUTHORITY.KEYID = 7
1,209,480 UART: [ldev] FE.KEYID = 1
1,214,582 UART: [ldev] Erasing FE.KEYID = 1
1,240,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,740 UART: [fwproc] Wait for Commands...
1,281,399 UART: [fwproc] Recv command 0x46574c44
1,282,132 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,701 UART: ROM Fatal Error: 0x000B0012
1,328,858 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,221 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,133 UART: [kat] SHA2-512-ACC
906,034 UART: [kat] ECC-384
915,755 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,156 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,181,914 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,365 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,281,886 UART: [fwproc] Recv command 0x46574c44
1,282,619 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,644 UART: ROM Fatal Error: 0x000B0012
1,330,801 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,778 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,024,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,169,384 UART:
2,169,792 UART: Running Caliptra ROM ...
2,170,970 UART:
2,171,140 UART: [state] CFI Enabled
2,172,119 UART: [state] LifecycleState = Unprovisioned
2,173,773 UART: [state] DebugLocked = No
2,174,879 UART: [state] WD Timer not started. Device not locked for debugging
2,177,351 UART: [kat] SHA2-256
2,178,038 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,063 UART: [kat] ++
2,181,519 UART: [kat] sha1
2,182,030 UART: [kat] SHA2-256
2,182,689 UART: [kat] SHA2-384
2,183,346 UART: [kat] SHA2-512-ACC
2,184,145 UART: [kat] ECC-384
3,774,455 UART: [kat] HMAC-384Kdf
3,802,416 UART: [kat] LMS
4,875,578 UART: [kat] --
4,879,223 UART: [cold-reset] ++
4,880,462 UART: [fht] FHT @ 0x50003400
4,892,482 UART: [idev] ++
4,893,196 UART: [idev] CDI.KEYID = 6
4,894,381 UART: [idev] SUBJECT.KEYID = 7
4,895,547 UART: [idev] UDS.KEYID = 0
4,929,579 UART: [idev] Erasing UDS.KEYID = 0
8,241,729 UART: [idev] Sha1 KeyId Algorithm
8,263,209 UART: [idev] --
8,266,483 UART: [ldev] ++
8,267,062 UART: [ldev] CDI.KEYID = 6
8,268,247 UART: [ldev] SUBJECT.KEYID = 5
8,269,401 UART: [ldev] AUTHORITY.KEYID = 7
8,270,625 UART: [ldev] FE.KEYID = 1
8,316,156 UART: [ldev] Erasing FE.KEYID = 1
11,652,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,218 UART: [ldev] --
14,038,108 UART: [fwproc] Wait for Commands...
14,040,275 UART: [fwproc] Recv command 0x46574c44
14,042,598 UART: [fwproc] Recv'd Img size: 114124 bytes
16,751,459 UART: ROM Fatal Error: 0x000B003C
16,754,877 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,024,409 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,538,368 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,074 writing to cptra_bootfsm_go
2,027,120 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,171,426 UART:
2,171,893 UART: Running Caliptra ROM ...
2,173,004 UART:
2,173,177 UART: [state] CFI Enabled
2,174,153 UART: [state] LifecycleState = Unprovisioned
2,175,805 UART: [state] DebugLocked = No
2,176,831 UART: [state] WD Timer not started. Device not locked for debugging
2,179,312 UART: [kat] SHA2-256
2,179,977 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,990 UART: [kat] ++
2,183,438 UART: [kat] sha1
2,183,946 UART: [kat] SHA2-256
2,184,682 UART: [kat] SHA2-384
2,185,342 UART: [kat] SHA2-512-ACC
2,186,219 UART: [kat] ECC-384
4,099,098 UART: [kat] HMAC-384Kdf
4,110,874 UART: [kat] LMS
5,183,974 UART: [kat] --
5,189,543 UART: [cold-reset] ++
5,191,639 UART: [fht] FHT @ 0x50003400
5,202,404 UART: [idev] ++
5,203,225 UART: [idev] CDI.KEYID = 6
5,204,235 UART: [idev] SUBJECT.KEYID = 7
5,205,797 UART: [idev] UDS.KEYID = 0
5,220,701 UART: [idev] Erasing UDS.KEYID = 0
8,495,872 UART: [idev] Sha1 KeyId Algorithm
8,517,555 UART: [idev] --
8,521,877 UART: [ldev] ++
8,522,447 UART: [ldev] CDI.KEYID = 6
8,523,685 UART: [ldev] SUBJECT.KEYID = 5
8,525,120 UART: [ldev] AUTHORITY.KEYID = 7
8,526,681 UART: [ldev] FE.KEYID = 1
8,538,960 UART: [ldev] Erasing FE.KEYID = 1
11,832,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,528 UART: [ldev] --
14,198,377 UART: [fwproc] Wait for Commands...
14,200,315 UART: [fwproc] Recv command 0x46574c44
14,202,582 UART: [fwproc] Recv'd Img size: 114124 bytes
16,902,920 UART: ROM Fatal Error: 0x000B003C
16,906,343 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,032,751 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,718,498 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,025,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,449 UART:
2,170,847 UART: Running Caliptra ROM ...
2,171,941 UART:
2,172,103 UART: [state] CFI Enabled
2,173,078 UART: [state] LifecycleState = Unprovisioned
2,174,641 UART: [state] DebugLocked = No
2,175,662 UART: [state] WD Timer not started. Device not locked for debugging
2,178,137 UART: [kat] SHA2-256
2,178,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,816 UART: [kat] ++
2,182,267 UART: [kat] sha1
2,182,778 UART: [kat] SHA2-256
2,183,521 UART: [kat] SHA2-384
2,184,192 UART: [kat] SHA2-512-ACC
2,185,078 UART: [kat] ECC-384
2,949,261 UART: [kat] HMAC-384Kdf
2,973,379 UART: [kat] LMS
3,502,805 UART: [kat] --
3,508,065 UART: [cold-reset] ++
3,510,006 UART: [fht] FHT @ 0x50003400
3,522,121 UART: [idev] ++
3,522,694 UART: [idev] CDI.KEYID = 6
3,523,631 UART: [idev] SUBJECT.KEYID = 7
3,524,843 UART: [idev] UDS.KEYID = 0
3,544,041 UART: [idev] Erasing UDS.KEYID = 0
6,026,864 UART: [idev] Sha1 KeyId Algorithm
6,050,585 UART: [idev] --
6,055,340 UART: [ldev] ++
6,055,918 UART: [ldev] CDI.KEYID = 6
6,056,803 UART: [ldev] SUBJECT.KEYID = 5
6,058,022 UART: [ldev] AUTHORITY.KEYID = 7
6,059,267 UART: [ldev] FE.KEYID = 1
6,101,599 UART: [ldev] Erasing FE.KEYID = 1
8,606,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,284 UART: [ldev] --
10,414,791 UART: [fwproc] Wait for Commands...
10,417,859 UART: [fwproc] Recv command 0x46574c44
10,419,905 UART: [fwproc] Recv'd Img size: 114448 bytes
12,467,613 UART: ROM Fatal Error: 0x000B003C
12,470,690 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,025,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,270,169 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
2,025,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,712 UART:
2,171,120 UART: Running Caliptra ROM ...
2,172,285 UART:
2,172,458 UART: [state] CFI Enabled
2,173,422 UART: [state] LifecycleState = Unprovisioned
2,175,068 UART: [state] DebugLocked = No
2,176,175 UART: [state] WD Timer not started. Device not locked for debugging
2,178,650 UART: [kat] SHA2-256
2,179,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,333 UART: [kat] ++
2,182,852 UART: [kat] sha1
2,183,369 UART: [kat] SHA2-256
2,184,070 UART: [kat] SHA2-384
2,184,732 UART: [kat] SHA2-512-ACC
2,185,554 UART: [kat] ECC-384
3,281,989 UART: [kat] HMAC-384Kdf
3,293,861 UART: [kat] LMS
3,823,373 UART: [kat] --
3,825,594 UART: [cold-reset] ++
3,826,453 UART: [fht] FHT @ 0x50003400
3,837,764 UART: [idev] ++
3,838,334 UART: [idev] CDI.KEYID = 6
3,839,244 UART: [idev] SUBJECT.KEYID = 7
3,840,454 UART: [idev] UDS.KEYID = 0
3,856,648 UART: [idev] Erasing UDS.KEYID = 0
6,312,075 UART: [idev] Sha1 KeyId Algorithm
6,335,059 UART: [idev] --
6,337,816 UART: [ldev] ++
6,338,381 UART: [ldev] CDI.KEYID = 6
6,339,290 UART: [ldev] SUBJECT.KEYID = 5
6,340,447 UART: [ldev] AUTHORITY.KEYID = 7
6,341,734 UART: [ldev] FE.KEYID = 1
6,353,407 UART: [ldev] Erasing FE.KEYID = 1
8,827,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,051 UART: [ldev] --
10,615,869 UART: [fwproc] Wait for Commands...
10,617,858 UART: [fwproc] Recv command 0x46574c44
10,619,900 UART: [fwproc] Recv'd Img size: 114448 bytes
12,670,394 UART: ROM Fatal Error: 0x000B003C
12,673,515 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,024,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,460,124 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,029,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,173,887 UART:
2,174,289 UART: Running Caliptra ROM ...
2,175,374 UART:
2,175,528 UART: [state] CFI Enabled
2,176,492 UART: [state] LifecycleState = Unprovisioned
2,178,140 UART: [state] DebugLocked = No
2,179,169 UART: [state] WD Timer not started. Device not locked for debugging
2,181,647 UART: [kat] SHA2-256
2,182,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,338 UART: [kat] ++
2,185,792 UART: [kat] sha1
2,186,347 UART: [kat] SHA2-256
2,187,027 UART: [kat] SHA2-384
2,187,690 UART: [kat] SHA2-512-ACC
2,188,512 UART: [kat] ECC-384
2,951,127 UART: [kat] HMAC-384Kdf
2,972,095 UART: [kat] LMS
3,501,549 UART: [kat] --
3,505,912 UART: [cold-reset] ++
3,507,688 UART: [fht] FHT @ 0x50003400
3,519,537 UART: [idev] ++
3,520,105 UART: [idev] CDI.KEYID = 6
3,521,068 UART: [idev] SUBJECT.KEYID = 7
3,522,231 UART: [idev] UDS.KEYID = 0
3,543,610 UART: [idev] Erasing UDS.KEYID = 0
6,039,440 UART: [idev] Sha1 KeyId Algorithm
6,062,882 UART: [idev] --
6,066,807 UART: [ldev] ++
6,067,409 UART: [ldev] CDI.KEYID = 6
6,068,302 UART: [ldev] SUBJECT.KEYID = 5
6,069,524 UART: [ldev] AUTHORITY.KEYID = 7
6,070,680 UART: [ldev] FE.KEYID = 1
6,114,783 UART: [ldev] Erasing FE.KEYID = 1
8,619,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,747 UART: [ldev] --
10,428,041 UART: [fwproc] Wait for Commands...
10,430,469 UART: [fwproc] Recv command 0x46574c44
10,432,567 UART: [fwproc] Recv'd Img size: 114448 bytes
12,484,839 UART: ROM Fatal Error: 0x000B003C
12,487,968 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,038,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,253,511 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,025,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,862 UART:
2,170,253 UART: Running Caliptra ROM ...
2,171,419 UART:
2,171,590 UART: [state] CFI Enabled
2,172,552 UART: [state] LifecycleState = Unprovisioned
2,174,187 UART: [state] DebugLocked = No
2,175,289 UART: [state] WD Timer not started. Device not locked for debugging
2,177,988 UART: [kat] SHA2-256
2,178,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,715 UART: [kat] ++
2,182,170 UART: [kat] sha1
2,182,683 UART: [kat] SHA2-256
2,183,342 UART: [kat] SHA2-384
2,183,999 UART: [kat] SHA2-512-ACC
2,184,797 UART: [kat] ECC-384
3,281,471 UART: [kat] HMAC-384Kdf
3,292,578 UART: [kat] LMS
3,822,080 UART: [kat] --
3,826,506 UART: [cold-reset] ++
3,828,766 UART: [fht] FHT @ 0x50003400
3,839,742 UART: [idev] ++
3,840,299 UART: [idev] CDI.KEYID = 6
3,841,176 UART: [idev] SUBJECT.KEYID = 7
3,842,385 UART: [idev] UDS.KEYID = 0
3,859,467 UART: [idev] Erasing UDS.KEYID = 0
6,314,695 UART: [idev] Sha1 KeyId Algorithm
6,337,895 UART: [idev] --
6,340,680 UART: [ldev] ++
6,341,253 UART: [ldev] CDI.KEYID = 6
6,342,160 UART: [ldev] SUBJECT.KEYID = 5
6,343,374 UART: [ldev] AUTHORITY.KEYID = 7
6,344,600 UART: [ldev] FE.KEYID = 1
6,355,142 UART: [ldev] Erasing FE.KEYID = 1
8,833,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,745 UART: [ldev] --
10,625,315 UART: [fwproc] Wait for Commands...
10,627,966 UART: [fwproc] Recv command 0x46574c44
10,630,060 UART: [fwproc] Recv'd Img size: 114448 bytes
12,683,519 UART: ROM Fatal Error: 0x000B003C
12,686,651 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,026,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,047 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,180 UART: [fwproc] Wait for Commands...
1,281,965 UART: [fwproc] Recv command 0x46574c44
1,282,698 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,729 UART: ROM Fatal Error: 0x000B003C
1,330,888 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,199 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,960 UART: [kat] ++
896,112 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
917,039 UART: [kat] HMAC-384Kdf
921,633 UART: [kat] LMS
1,169,945 UART: [kat] --
1,171,052 UART: [cold-reset] ++
1,171,614 UART: [fht] FHT @ 0x50003400
1,174,326 UART: [idev] ++
1,174,494 UART: [idev] CDI.KEYID = 6
1,174,855 UART: [idev] SUBJECT.KEYID = 7
1,175,280 UART: [idev] UDS.KEYID = 0
1,183,568 UART: [idev] Erasing UDS.KEYID = 0
1,201,414 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,289 UART: [ldev] ++
1,211,457 UART: [ldev] CDI.KEYID = 6
1,211,821 UART: [ldev] SUBJECT.KEYID = 5
1,212,248 UART: [ldev] AUTHORITY.KEYID = 7
1,212,711 UART: [ldev] FE.KEYID = 1
1,218,041 UART: [ldev] Erasing FE.KEYID = 1
1,244,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,775 UART: [ldev] --
1,284,135 UART: [fwproc] Wait for Commands...
1,284,712 UART: [fwproc] Recv command 0x46574c44
1,285,445 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,518 UART: ROM Fatal Error: 0x000B003C
1,333,677 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,120 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,796 UART: [fwproc] Wait for Commands...
1,281,601 UART: [fwproc] Recv command 0x46574c44
1,282,334 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,045 UART: ROM Fatal Error: 0x000B003C
1,330,204 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,603 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,642 UART: [fwproc] Recv command 0x46574c44
1,283,375 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,846 UART: ROM Fatal Error: 0x000B003C
1,331,005 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,240 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
921,014 UART: [kat] LMS
1,169,326 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,553 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,952 UART: [ldev] ++
1,209,120 UART: [ldev] CDI.KEYID = 6
1,209,484 UART: [ldev] SUBJECT.KEYID = 5
1,209,911 UART: [ldev] AUTHORITY.KEYID = 7
1,210,374 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,241,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,493 UART: ROM Fatal Error: 0x000B003C
1,329,652 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,395 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,891 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,044 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,241,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,645 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,556 UART: ROM Fatal Error: 0x000B003C
1,330,715 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,092 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,665 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,271 UART:
192,630 UART: Running Caliptra ROM ...
193,826 UART:
193,974 UART: [state] CFI Enabled
262,058 UART: [state] LifecycleState = Unprovisioned
264,487 UART: [state] DebugLocked = No
266,160 UART: [state] WD Timer not started. Device not locked for debugging
271,434 UART: [kat] SHA2-256
453,354 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,858 UART: [kat] ++
465,366 UART: [kat] sha1
475,976 UART: [kat] SHA2-256
478,992 UART: [kat] SHA2-384
484,810 UART: [kat] SHA2-512-ACC
487,432 UART: [kat] ECC-384
3,777,070 UART: [kat] HMAC-384Kdf
3,803,063 UART: [kat] LMS
4,876,230 UART: [kat] --
4,880,713 UART: [cold-reset] ++
4,882,756 UART: [fht] FHT @ 0x50003400
4,894,546 UART: [idev] ++
4,895,286 UART: [idev] CDI.KEYID = 6
4,896,469 UART: [idev] SUBJECT.KEYID = 7
4,897,625 UART: [idev] UDS.KEYID = 0
4,929,898 UART: [idev] Erasing UDS.KEYID = 0
8,242,641 UART: [idev] Sha1 KeyId Algorithm
8,265,066 UART: [idev] --
8,268,844 UART: [ldev] ++
8,269,410 UART: [ldev] CDI.KEYID = 6
8,270,650 UART: [ldev] SUBJECT.KEYID = 5
8,271,855 UART: [ldev] AUTHORITY.KEYID = 7
8,272,960 UART: [ldev] FE.KEYID = 1
8,317,312 UART: [ldev] Erasing FE.KEYID = 1
11,654,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,176 UART: [ldev] --
14,036,339 UART: [fwproc] Wait for Commands...
14,038,995 UART: [fwproc] Recv command 0x46574c44
14,041,261 UART: Invalid Img size: 0 bytes
14,045,160 UART: ROM Fatal Error: 0x01020002
14,048,532 >>> mbox cmd response: failed
14,051,109 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,194,988 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,689 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,827,301 >>> mbox cmd response: failed
13,829,622 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,972,979 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,908 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,488 UART:
192,862 UART: Running Caliptra ROM ...
194,015 UART:
603,496 UART: [state] CFI Enabled
620,844 UART: [state] LifecycleState = Unprovisioned
623,238 UART: [state] DebugLocked = No
624,988 UART: [state] WD Timer not started. Device not locked for debugging
629,785 UART: [kat] SHA2-256
811,769 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,304 UART: [kat] ++
823,893 UART: [kat] sha1
834,610 UART: [kat] SHA2-256
837,618 UART: [kat] SHA2-384
843,731 UART: [kat] SHA2-512-ACC
846,168 UART: [kat] ECC-384
4,102,892 UART: [kat] HMAC-384Kdf
4,114,658 UART: [kat] LMS
5,187,817 UART: [kat] --
5,193,652 UART: [cold-reset] ++
5,196,068 UART: [fht] FHT @ 0x50003400
5,208,509 UART: [idev] ++
5,209,241 UART: [idev] CDI.KEYID = 6
5,210,346 UART: [idev] SUBJECT.KEYID = 7
5,211,888 UART: [idev] UDS.KEYID = 0
5,228,431 UART: [idev] Erasing UDS.KEYID = 0
8,501,768 UART: [idev] Sha1 KeyId Algorithm
8,524,884 UART: [idev] --
8,528,484 UART: [ldev] ++
8,529,112 UART: [ldev] CDI.KEYID = 6
8,530,239 UART: [ldev] SUBJECT.KEYID = 5
8,531,726 UART: [ldev] AUTHORITY.KEYID = 7
8,533,208 UART: [ldev] FE.KEYID = 1
8,544,499 UART: [ldev] Erasing FE.KEYID = 1
11,836,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,129,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,145,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,161,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,177,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,198,185 UART: [ldev] --
14,202,689 UART: [fwproc] Wait for Commands...
14,204,233 UART: [fwproc] Recv command 0x46574c44
14,206,095 UART: Invalid Img size: 0 bytes
14,209,399 UART: ROM Fatal Error: 0x01020002
14,212,717 >>> mbox cmd response: failed
14,215,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,358,606 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
4,021 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,014,359 >>> mbox cmd response: failed
14,017,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,160,389 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,410 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,046 UART:
192,427 UART: Running Caliptra ROM ...
193,968 UART:
194,131 UART: [state] CFI Enabled
267,818 UART: [state] LifecycleState = Unprovisioned
269,637 UART: [state] DebugLocked = No
271,234 UART: [state] WD Timer not started. Device not locked for debugging
274,452 UART: [kat] SHA2-256
453,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,160 UART: [kat] ++
465,610 UART: [kat] sha1
475,351 UART: [kat] SHA2-256
478,352 UART: [kat] SHA2-384
484,221 UART: [kat] SHA2-512-ACC
487,149 UART: [kat] ECC-384
2,948,936 UART: [kat] HMAC-384Kdf
2,971,676 UART: [kat] LMS
3,501,101 UART: [kat] --
3,504,067 UART: [cold-reset] ++
3,505,296 UART: [fht] FHT @ 0x50003400
3,516,751 UART: [idev] ++
3,517,318 UART: [idev] CDI.KEYID = 6
3,518,245 UART: [idev] SUBJECT.KEYID = 7
3,519,405 UART: [idev] UDS.KEYID = 0
3,543,265 UART: [idev] Erasing UDS.KEYID = 0
6,026,871 UART: [idev] Sha1 KeyId Algorithm
6,049,362 UART: [idev] --
6,053,718 UART: [ldev] ++
6,054,300 UART: [ldev] CDI.KEYID = 6
6,055,215 UART: [ldev] SUBJECT.KEYID = 5
6,056,437 UART: [ldev] AUTHORITY.KEYID = 7
6,057,670 UART: [ldev] FE.KEYID = 1
6,100,504 UART: [ldev] Erasing FE.KEYID = 1
8,601,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,007 UART: [ldev] --
10,395,501 UART: [fwproc] Wait for Commands...
10,398,628 UART: [fwproc] Recv command 0x46574c44
10,400,674 UART: Invalid Img size: 0 bytes
10,403,705 UART: ROM Fatal Error: 0x01020002
10,406,859 >>> mbox cmd response: failed
10,409,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,553,417 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,567 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,208,717 >>> mbox cmd response: failed
10,211,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,355,067 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,878 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,463 UART:
192,829 UART: Running Caliptra ROM ...
194,008 UART:
603,452 UART: [state] CFI Enabled
616,612 UART: [state] LifecycleState = Unprovisioned
618,502 UART: [state] DebugLocked = No
619,935 UART: [state] WD Timer not started. Device not locked for debugging
623,475 UART: [kat] SHA2-256
802,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,196 UART: [kat] ++
814,731 UART: [kat] sha1
826,153 UART: [kat] SHA2-256
829,158 UART: [kat] SHA2-384
835,619 UART: [kat] SHA2-512-ACC
838,602 UART: [kat] ECC-384
3,281,956 UART: [kat] HMAC-384Kdf
3,294,032 UART: [kat] LMS
3,823,537 UART: [kat] --
3,826,283 UART: [cold-reset] ++
3,828,049 UART: [fht] FHT @ 0x50003400
3,837,835 UART: [idev] ++
3,838,432 UART: [idev] CDI.KEYID = 6
3,839,339 UART: [idev] SUBJECT.KEYID = 7
3,840,518 UART: [idev] UDS.KEYID = 0
3,853,905 UART: [idev] Erasing UDS.KEYID = 0
6,309,672 UART: [idev] Sha1 KeyId Algorithm
6,332,860 UART: [idev] --
6,337,827 UART: [ldev] ++
6,338,403 UART: [ldev] CDI.KEYID = 6
6,339,286 UART: [ldev] SUBJECT.KEYID = 5
6,340,497 UART: [ldev] AUTHORITY.KEYID = 7
6,341,725 UART: [ldev] FE.KEYID = 1
6,350,674 UART: [ldev] Erasing FE.KEYID = 1
8,824,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,163 UART: [ldev] --
10,613,419 UART: [fwproc] Wait for Commands...
10,615,894 UART: [fwproc] Recv command 0x46574c44
10,618,000 UART: Invalid Img size: 0 bytes
10,621,147 UART: ROM Fatal Error: 0x01020002
10,624,296 >>> mbox cmd response: failed
10,626,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,770,792 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,903 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,411,069 >>> mbox cmd response: failed
10,413,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,557,672 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,413 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,070 UART:
192,460 UART: Running Caliptra ROM ...
193,545 UART:
193,687 UART: [state] CFI Enabled
263,434 UART: [state] LifecycleState = Unprovisioned
265,368 UART: [state] DebugLocked = No
267,370 UART: [state] WD Timer not started. Device not locked for debugging
271,911 UART: [kat] SHA2-256
451,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,646 UART: [kat] ++
463,180 UART: [kat] sha1
473,524 UART: [kat] SHA2-256
476,539 UART: [kat] SHA2-384
484,085 UART: [kat] SHA2-512-ACC
487,023 UART: [kat] ECC-384
2,946,048 UART: [kat] HMAC-384Kdf
2,970,923 UART: [kat] LMS
3,500,397 UART: [kat] --
3,504,876 UART: [cold-reset] ++
3,505,675 UART: [fht] FHT @ 0x50003400
3,515,529 UART: [idev] ++
3,516,121 UART: [idev] CDI.KEYID = 6
3,517,051 UART: [idev] SUBJECT.KEYID = 7
3,518,220 UART: [idev] UDS.KEYID = 0
3,543,216 UART: [idev] Erasing UDS.KEYID = 0
6,026,088 UART: [idev] Sha1 KeyId Algorithm
6,049,431 UART: [idev] --
6,052,596 UART: [ldev] ++
6,053,177 UART: [ldev] CDI.KEYID = 6
6,054,087 UART: [ldev] SUBJECT.KEYID = 5
6,055,251 UART: [ldev] AUTHORITY.KEYID = 7
6,056,485 UART: [ldev] FE.KEYID = 1
6,099,978 UART: [ldev] Erasing FE.KEYID = 1
8,598,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,407 UART: [ldev] --
10,392,096 UART: [fwproc] Wait for Commands...
10,393,938 UART: [fwproc] Recv command 0x46574c44
10,396,042 UART: Invalid Img size: 0 bytes
10,398,277 UART: ROM Fatal Error: 0x01020002
10,401,380 >>> mbox cmd response: failed
10,403,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,547,873 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,548 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,198,724 >>> mbox cmd response: failed
10,201,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,345,475 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,784 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,381 UART:
192,776 UART: Running Caliptra ROM ...
193,865 UART:
603,533 UART: [state] CFI Enabled
619,581 UART: [state] LifecycleState = Unprovisioned
621,480 UART: [state] DebugLocked = No
622,827 UART: [state] WD Timer not started. Device not locked for debugging
627,319 UART: [kat] SHA2-256
806,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,021 UART: [kat] ++
818,483 UART: [kat] sha1
829,304 UART: [kat] SHA2-256
832,358 UART: [kat] SHA2-384
838,708 UART: [kat] SHA2-512-ACC
841,693 UART: [kat] ECC-384
3,284,220 UART: [kat] HMAC-384Kdf
3,297,050 UART: [kat] LMS
3,826,526 UART: [kat] --
3,832,135 UART: [cold-reset] ++
3,833,469 UART: [fht] FHT @ 0x50003400
3,844,010 UART: [idev] ++
3,844,581 UART: [idev] CDI.KEYID = 6
3,845,501 UART: [idev] SUBJECT.KEYID = 7
3,846,658 UART: [idev] UDS.KEYID = 0
3,862,363 UART: [idev] Erasing UDS.KEYID = 0
6,316,200 UART: [idev] Sha1 KeyId Algorithm
6,339,213 UART: [idev] --
6,342,394 UART: [ldev] ++
6,342,962 UART: [ldev] CDI.KEYID = 6
6,343,903 UART: [ldev] SUBJECT.KEYID = 5
6,345,064 UART: [ldev] AUTHORITY.KEYID = 7
6,346,374 UART: [ldev] FE.KEYID = 1
6,357,641 UART: [ldev] Erasing FE.KEYID = 1
8,827,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,801 UART: [ldev] --
10,616,897 UART: [fwproc] Wait for Commands...
10,619,160 UART: [fwproc] Recv command 0x46574c44
10,621,261 UART: Invalid Img size: 0 bytes
10,624,622 UART: ROM Fatal Error: 0x01020002
10,627,717 >>> mbox cmd response: failed
10,630,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,774,202 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,630 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,411,138 >>> mbox cmd response: failed
10,413,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,557,615 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,991 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [kat] SHA2-256
891,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,905 UART: [kat] ++
896,057 UART: [kat] sha1
900,357 UART: [kat] SHA2-256
902,297 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,833 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,820 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: Invalid Img size: 0 bytes
1,283,202 UART: ROM Fatal Error: 0x01020002
1,284,361 >>> mbox cmd response: failed
1,284,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,367 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,961 >>> mbox cmd response: failed
1,137,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,137,967 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,987 UART: [kat] HMAC-384Kdf
921,721 UART: [kat] LMS
1,170,033 UART: [kat] --
1,170,954 UART: [cold-reset] ++
1,171,336 UART: [fht] FHT @ 0x50003400
1,173,986 UART: [idev] ++
1,174,154 UART: [idev] CDI.KEYID = 6
1,174,515 UART: [idev] SUBJECT.KEYID = 7
1,174,940 UART: [idev] UDS.KEYID = 0
1,182,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: Invalid Img size: 0 bytes
1,284,355 UART: ROM Fatal Error: 0x01020002
1,285,514 >>> mbox cmd response: failed
1,285,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,285,520 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,880 >>> mbox cmd response: failed
1,137,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,137,886 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,640 UART: [ldev] ++
1,209,808 UART: [ldev] CDI.KEYID = 6
1,210,172 UART: [ldev] SUBJECT.KEYID = 5
1,210,599 UART: [ldev] AUTHORITY.KEYID = 7
1,211,062 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,918 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,861 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: Invalid Img size: 0 bytes
1,283,574 UART: ROM Fatal Error: 0x01020002
1,284,733 >>> mbox cmd response: failed
1,284,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,739 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,239 >>> mbox cmd response: failed
1,138,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,138,245 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,265 UART: [kat] LMS
1,169,577 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,198,902 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,208,789 UART: [ldev] ++
1,208,957 UART: [ldev] CDI.KEYID = 6
1,209,321 UART: [ldev] SUBJECT.KEYID = 5
1,209,748 UART: [ldev] AUTHORITY.KEYID = 7
1,210,211 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,241,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,433 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,478 UART: [fwproc] Recv command 0x46574c44
1,282,207 UART: Invalid Img size: 0 bytes
1,283,123 UART: ROM Fatal Error: 0x01020002
1,284,282 >>> mbox cmd response: failed
1,284,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,288 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,104 >>> mbox cmd response: failed
1,138,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,138,110 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,684 UART: [kat] HMAC-384Kdf
921,344 UART: [kat] LMS
1,169,656 UART: [kat] --
1,170,841 UART: [cold-reset] ++
1,171,259 UART: [fht] FHT @ 0x50003400
1,173,913 UART: [idev] ++
1,174,081 UART: [idev] CDI.KEYID = 6
1,174,442 UART: [idev] SUBJECT.KEYID = 7
1,174,867 UART: [idev] UDS.KEYID = 0
1,182,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,803 UART: [idev] Sha1 KeyId Algorithm
1,208,685 UART: [idev] --
1,209,564 UART: [ldev] ++
1,209,732 UART: [ldev] CDI.KEYID = 6
1,210,096 UART: [ldev] SUBJECT.KEYID = 5
1,210,523 UART: [ldev] AUTHORITY.KEYID = 7
1,210,986 UART: [ldev] FE.KEYID = 1
1,216,014 UART: [ldev] Erasing FE.KEYID = 1
1,242,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,072 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,171 UART: [fwproc] Recv command 0x46574c44
1,282,900 UART: Invalid Img size: 0 bytes
1,283,998 UART: ROM Fatal Error: 0x01020002
1,285,157 >>> mbox cmd response: failed
1,285,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,285,163 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,383 >>> mbox cmd response: failed
1,137,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,137,389 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,127 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,183 UART: [fwproc] Wait for Commands...
1,282,814 UART: [fwproc] Recv command 0x46574c44
1,283,543 UART: Invalid Img size: 0 bytes
1,284,263 UART: ROM Fatal Error: 0x01020002
1,285,422 >>> mbox cmd response: failed
1,285,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,285,428 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,124 >>> mbox cmd response: failed
1,137,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,137,130 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,089 UART:
192,470 UART: Running Caliptra ROM ...
193,667 UART:
193,818 UART: [state] CFI Enabled
264,923 UART: [state] LifecycleState = Unprovisioned
267,433 UART: [state] DebugLocked = No
270,071 UART: [state] WD Timer not started. Device not locked for debugging
275,102 UART: [kat] SHA2-256
456,982 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,521 UART: [kat] ++
469,075 UART: [kat] sha1
479,963 UART: [kat] SHA2-256
482,978 UART: [kat] SHA2-384
488,894 UART: [kat] SHA2-512-ACC
491,555 UART: [kat] ECC-384
3,774,160 UART: [kat] HMAC-384Kdf
3,801,636 UART: [kat] LMS
4,874,819 UART: [kat] --
4,880,074 UART: [cold-reset] ++
4,882,123 UART: [fht] FHT @ 0x50003400
4,893,745 UART: [idev] ++
4,894,415 UART: [idev] CDI.KEYID = 6
4,895,644 UART: [idev] SUBJECT.KEYID = 7
4,896,743 UART: [idev] UDS.KEYID = 0
4,929,456 UART: [idev] Erasing UDS.KEYID = 0
8,242,468 UART: [idev] Sha1 KeyId Algorithm
8,264,185 UART: [idev] --
8,269,264 UART: [ldev] ++
8,269,869 UART: [ldev] CDI.KEYID = 6
8,270,982 UART: [ldev] SUBJECT.KEYID = 5
8,272,251 UART: [ldev] AUTHORITY.KEYID = 7
8,273,343 UART: [ldev] FE.KEYID = 1
8,316,422 UART: [ldev] Erasing FE.KEYID = 1
11,651,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,245 UART: [ldev] --
14,038,545 UART: [fwproc] Wait for Commands...
14,041,025 UART: [fwproc] Recv command 0x4d454153
14,048,527 UART: ROM Fatal Error: 0x01020005
14,051,853 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,855,326 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
4,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,498 UART:
192,875 UART: Running Caliptra ROM ...
193,996 UART:
603,613 UART: [state] CFI Enabled
615,632 UART: [state] LifecycleState = Unprovisioned
617,968 UART: [state] DebugLocked = No
619,560 UART: [state] WD Timer not started. Device not locked for debugging
623,455 UART: [kat] SHA2-256
805,472 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,984 UART: [kat] ++
817,572 UART: [kat] sha1
827,861 UART: [kat] SHA2-256
830,880 UART: [kat] SHA2-384
837,718 UART: [kat] SHA2-512-ACC
840,326 UART: [kat] ECC-384
4,092,772 UART: [kat] HMAC-384Kdf
4,103,615 UART: [kat] LMS
5,176,774 UART: [kat] --
5,180,270 UART: [cold-reset] ++
5,181,735 UART: [fht] FHT @ 0x50003400
5,192,603 UART: [idev] ++
5,193,274 UART: [idev] CDI.KEYID = 6
5,194,450 UART: [idev] SUBJECT.KEYID = 7
5,195,937 UART: [idev] UDS.KEYID = 0
5,213,480 UART: [idev] Erasing UDS.KEYID = 0
8,487,552 UART: [idev] Sha1 KeyId Algorithm
8,508,724 UART: [idev] --
8,512,552 UART: [ldev] ++
8,513,137 UART: [ldev] CDI.KEYID = 6
8,514,369 UART: [ldev] SUBJECT.KEYID = 5
8,515,793 UART: [ldev] AUTHORITY.KEYID = 7
8,517,345 UART: [ldev] FE.KEYID = 1
8,528,905 UART: [ldev] Erasing FE.KEYID = 1
11,821,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,486 UART: [ldev] --
14,186,234 UART: [fwproc] Wait for Commands...
14,188,052 UART: [fwproc] Recv command 0x4d454153
14,194,147 UART: ROM Fatal Error: 0x01020005
14,197,452 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,026,435 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,101 UART:
192,485 UART: Running Caliptra ROM ...
193,655 UART:
193,812 UART: [state] CFI Enabled
264,181 UART: [state] LifecycleState = Unprovisioned
266,030 UART: [state] DebugLocked = No
268,553 UART: [state] WD Timer not started. Device not locked for debugging
272,666 UART: [kat] SHA2-256
451,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,342 UART: [kat] ++
463,880 UART: [kat] sha1
476,163 UART: [kat] SHA2-256
479,176 UART: [kat] SHA2-384
484,774 UART: [kat] SHA2-512-ACC
487,757 UART: [kat] ECC-384
2,949,358 UART: [kat] HMAC-384Kdf
2,972,153 UART: [kat] LMS
3,501,578 UART: [kat] --
3,506,460 UART: [cold-reset] ++
3,509,047 UART: [fht] FHT @ 0x50003400
3,520,198 UART: [idev] ++
3,520,765 UART: [idev] CDI.KEYID = 6
3,521,780 UART: [idev] SUBJECT.KEYID = 7
3,522,883 UART: [idev] UDS.KEYID = 0
3,542,807 UART: [idev] Erasing UDS.KEYID = 0
6,027,279 UART: [idev] Sha1 KeyId Algorithm
6,049,527 UART: [idev] --
6,053,768 UART: [ldev] ++
6,054,352 UART: [ldev] CDI.KEYID = 6
6,055,242 UART: [ldev] SUBJECT.KEYID = 5
6,056,464 UART: [ldev] AUTHORITY.KEYID = 7
6,057,694 UART: [ldev] FE.KEYID = 1
6,100,717 UART: [ldev] Erasing FE.KEYID = 1
8,605,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,192 UART: [ldev] --
10,413,923 UART: [fwproc] Wait for Commands...
10,416,884 UART: [fwproc] Recv command 0x4d454153
10,424,224 UART: ROM Fatal Error: 0x01020005
10,427,376 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,465 writing to cptra_bootfsm_go
5,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,560 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
4,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,782 UART:
193,158 UART: Running Caliptra ROM ...
194,265 UART:
603,912 UART: [state] CFI Enabled
620,024 UART: [state] LifecycleState = Unprovisioned
621,909 UART: [state] DebugLocked = No
623,688 UART: [state] WD Timer not started. Device not locked for debugging
627,794 UART: [kat] SHA2-256
806,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,510 UART: [kat] ++
818,961 UART: [kat] sha1
830,211 UART: [kat] SHA2-256
833,276 UART: [kat] SHA2-384
838,010 UART: [kat] SHA2-512-ACC
840,941 UART: [kat] ECC-384
3,283,345 UART: [kat] HMAC-384Kdf
3,297,270 UART: [kat] LMS
3,826,738 UART: [kat] --
3,830,831 UART: [cold-reset] ++
3,833,184 UART: [fht] FHT @ 0x50003400
3,845,779 UART: [idev] ++
3,846,349 UART: [idev] CDI.KEYID = 6
3,847,319 UART: [idev] SUBJECT.KEYID = 7
3,848,476 UART: [idev] UDS.KEYID = 0
3,863,808 UART: [idev] Erasing UDS.KEYID = 0
6,322,839 UART: [idev] Sha1 KeyId Algorithm
6,347,061 UART: [idev] --
6,351,030 UART: [ldev] ++
6,351,609 UART: [ldev] CDI.KEYID = 6
6,352,518 UART: [ldev] SUBJECT.KEYID = 5
6,353,734 UART: [ldev] AUTHORITY.KEYID = 7
6,354,984 UART: [ldev] FE.KEYID = 1
6,364,658 UART: [ldev] Erasing FE.KEYID = 1
8,838,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,499 UART: [ldev] --
10,627,679 UART: [fwproc] Wait for Commands...
10,629,609 UART: [fwproc] Recv command 0x4d454153
10,635,599 UART: ROM Fatal Error: 0x01020005
10,638,712 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,275 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
4,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,313 UART:
192,689 UART: Running Caliptra ROM ...
193,862 UART:
194,014 UART: [state] CFI Enabled
261,341 UART: [state] LifecycleState = Unprovisioned
263,206 UART: [state] DebugLocked = No
265,672 UART: [state] WD Timer not started. Device not locked for debugging
268,930 UART: [kat] SHA2-256
448,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,621 UART: [kat] ++
460,166 UART: [kat] sha1
472,347 UART: [kat] SHA2-256
475,354 UART: [kat] SHA2-384
481,493 UART: [kat] SHA2-512-ACC
484,420 UART: [kat] ECC-384
2,946,165 UART: [kat] HMAC-384Kdf
2,969,419 UART: [kat] LMS
3,498,886 UART: [kat] --
3,505,462 UART: [cold-reset] ++
3,507,936 UART: [fht] FHT @ 0x50003400
3,519,886 UART: [idev] ++
3,520,448 UART: [idev] CDI.KEYID = 6
3,521,355 UART: [idev] SUBJECT.KEYID = 7
3,522,588 UART: [idev] UDS.KEYID = 0
3,541,698 UART: [idev] Erasing UDS.KEYID = 0
6,026,111 UART: [idev] Sha1 KeyId Algorithm
6,048,292 UART: [idev] --
6,051,478 UART: [ldev] ++
6,052,057 UART: [ldev] CDI.KEYID = 6
6,052,971 UART: [ldev] SUBJECT.KEYID = 5
6,054,053 UART: [ldev] AUTHORITY.KEYID = 7
6,055,397 UART: [ldev] FE.KEYID = 1
6,098,933 UART: [ldev] Erasing FE.KEYID = 1
8,603,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,755 UART: [ldev] --
10,414,147 UART: [fwproc] Wait for Commands...
10,415,607 UART: [fwproc] Recv command 0x4d454153
10,422,353 UART: ROM Fatal Error: 0x01020005
10,425,455 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,168,627 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
4,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,609 UART:
192,991 UART: Running Caliptra ROM ...
194,072 UART:
603,895 UART: [state] CFI Enabled
619,538 UART: [state] LifecycleState = Unprovisioned
621,448 UART: [state] DebugLocked = No
623,613 UART: [state] WD Timer not started. Device not locked for debugging
626,703 UART: [kat] SHA2-256
805,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,430 UART: [kat] ++
817,875 UART: [kat] sha1
829,686 UART: [kat] SHA2-256
832,755 UART: [kat] SHA2-384
839,268 UART: [kat] SHA2-512-ACC
842,195 UART: [kat] ECC-384
3,286,046 UART: [kat] HMAC-384Kdf
3,297,958 UART: [kat] LMS
3,827,409 UART: [kat] --
3,830,479 UART: [cold-reset] ++
3,832,568 UART: [fht] FHT @ 0x50003400
3,843,003 UART: [idev] ++
3,843,577 UART: [idev] CDI.KEYID = 6
3,844,550 UART: [idev] SUBJECT.KEYID = 7
3,845,707 UART: [idev] UDS.KEYID = 0
3,861,952 UART: [idev] Erasing UDS.KEYID = 0
6,320,165 UART: [idev] Sha1 KeyId Algorithm
6,343,721 UART: [idev] --
6,347,844 UART: [ldev] ++
6,348,412 UART: [ldev] CDI.KEYID = 6
6,349,315 UART: [ldev] SUBJECT.KEYID = 5
6,350,471 UART: [ldev] AUTHORITY.KEYID = 7
6,351,753 UART: [ldev] FE.KEYID = 1
6,362,830 UART: [ldev] Erasing FE.KEYID = 1
8,837,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,304 UART: [ldev] --
10,629,087 UART: [fwproc] Wait for Commands...
10,630,805 UART: [fwproc] Recv command 0x4d454153
10,637,760 UART: ROM Fatal Error: 0x01020005
10,640,857 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
4,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,099 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,182,385 UART: [idev] Erasing UDS.KEYID = 0
1,199,695 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,168 UART: [ldev] Erasing FE.KEYID = 1
1,242,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,905 UART: [fwproc] Recv command 0x4d454153
1,285,102 UART: ROM Fatal Error: 0x01020005
1,286,261 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,029 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,503 UART: [kat] LMS
1,168,815 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,839 UART: [ldev] ++
1,209,007 UART: [ldev] CDI.KEYID = 6
1,209,371 UART: [ldev] SUBJECT.KEYID = 5
1,209,798 UART: [ldev] AUTHORITY.KEYID = 7
1,210,261 UART: [ldev] FE.KEYID = 1
1,215,789 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,437 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,422 UART: [fwproc] Recv command 0x4d454153
1,284,447 UART: ROM Fatal Error: 0x01020005
1,285,606 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,702 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,169,979 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,850 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x4d454153
1,283,956 UART: ROM Fatal Error: 0x01020005
1,285,115 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,277 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,361 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x4d454153
1,285,155 UART: ROM Fatal Error: 0x01020005
1,286,314 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,124 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,325 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,182,251 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,242,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,520 UART: [fwproc] Wait for Commands...
1,282,273 UART: [fwproc] Recv command 0x4d454153
1,284,334 UART: ROM Fatal Error: 0x01020005
1,285,493 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,273 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,181,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,252 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,585 UART: [fwproc] Wait for Commands...
1,282,358 UART: [fwproc] Recv command 0x4d454153
1,284,365 UART: ROM Fatal Error: 0x01020005
1,285,524 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,136,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,369 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,025 UART:
192,410 UART: Running Caliptra ROM ...
193,612 UART:
193,764 UART: [state] CFI Enabled
267,497 UART: [state] LifecycleState = Unprovisioned
269,849 UART: [state] DebugLocked = No
271,985 UART: [state] WD Timer not started. Device not locked for debugging
276,909 UART: [kat] SHA2-256
458,867 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,352 UART: [kat] ++
470,896 UART: [kat] sha1
481,937 UART: [kat] SHA2-256
484,946 UART: [kat] SHA2-384
489,511 UART: [kat] SHA2-512-ACC
492,111 UART: [kat] ECC-384
3,776,654 UART: [kat] HMAC-384Kdf
3,803,210 UART: [kat] LMS
4,876,350 UART: [kat] --
4,881,529 UART: [cold-reset] ++
4,883,409 UART: [fht] FHT @ 0x50003400
4,895,135 UART: [idev] ++
4,895,861 UART: [idev] CDI.KEYID = 6
4,897,037 UART: [idev] SUBJECT.KEYID = 7
4,898,194 UART: [idev] UDS.KEYID = 0
4,930,430 UART: [idev] Erasing UDS.KEYID = 0
8,243,184 UART: [idev] Sha1 KeyId Algorithm
8,265,283 UART: [idev] --
8,269,221 UART: [ldev] ++
8,269,784 UART: [ldev] CDI.KEYID = 6
8,271,019 UART: [ldev] SUBJECT.KEYID = 5
8,272,178 UART: [ldev] AUTHORITY.KEYID = 7
8,273,405 UART: [ldev] FE.KEYID = 1
8,318,077 UART: [ldev] Erasing FE.KEYID = 1
11,655,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,303 UART: [ldev] --
14,038,161 UART: [fwproc] Wait for Commands...
14,040,734 UART: [fwproc] Recv command 0x43415053
14,045,430 UART: ROM Fatal Error: 0x01020006
14,048,749 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,505 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
13,826,487 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,927 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,512 UART:
192,906 UART: Running Caliptra ROM ...
194,030 UART:
603,694 UART: [state] CFI Enabled
619,379 UART: [state] LifecycleState = Unprovisioned
621,765 UART: [state] DebugLocked = No
623,679 UART: [state] WD Timer not started. Device not locked for debugging
628,869 UART: [kat] SHA2-256
810,846 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,362 UART: [kat] ++
822,946 UART: [kat] sha1
834,096 UART: [kat] SHA2-256
837,106 UART: [kat] SHA2-384
843,902 UART: [kat] SHA2-512-ACC
846,507 UART: [kat] ECC-384
4,103,569 UART: [kat] HMAC-384Kdf
4,114,841 UART: [kat] LMS
5,187,962 UART: [kat] --
5,192,814 UART: [cold-reset] ++
5,194,104 UART: [fht] FHT @ 0x50003400
5,205,043 UART: [idev] ++
5,205,718 UART: [idev] CDI.KEYID = 6
5,206,880 UART: [idev] SUBJECT.KEYID = 7
5,208,359 UART: [idev] UDS.KEYID = 0
5,225,058 UART: [idev] Erasing UDS.KEYID = 0
8,497,393 UART: [idev] Sha1 KeyId Algorithm
8,519,867 UART: [idev] --
8,523,298 UART: [ldev] ++
8,523,923 UART: [ldev] CDI.KEYID = 6
8,525,100 UART: [ldev] SUBJECT.KEYID = 5
8,526,583 UART: [ldev] AUTHORITY.KEYID = 7
8,528,134 UART: [ldev] FE.KEYID = 1
8,540,394 UART: [ldev] Erasing FE.KEYID = 1
11,832,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,459 UART: [ldev] --
14,200,131 UART: [fwproc] Wait for Commands...
14,201,898 UART: [fwproc] Recv command 0x43415053
14,206,867 UART: ROM Fatal Error: 0x01020006
14,210,178 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,808 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
14,009,622 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,427 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,081 UART:
192,480 UART: Running Caliptra ROM ...
193,620 UART:
193,768 UART: [state] CFI Enabled
264,205 UART: [state] LifecycleState = Unprovisioned
266,077 UART: [state] DebugLocked = No
267,566 UART: [state] WD Timer not started. Device not locked for debugging
270,632 UART: [kat] SHA2-256
449,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,340 UART: [kat] ++
461,876 UART: [kat] sha1
472,274 UART: [kat] SHA2-256
475,328 UART: [kat] SHA2-384
481,698 UART: [kat] SHA2-512-ACC
484,645 UART: [kat] ECC-384
2,950,310 UART: [kat] HMAC-384Kdf
2,973,044 UART: [kat] LMS
3,502,511 UART: [kat] --
3,506,749 UART: [cold-reset] ++
3,508,527 UART: [fht] FHT @ 0x50003400
3,518,861 UART: [idev] ++
3,519,425 UART: [idev] CDI.KEYID = 6
3,520,441 UART: [idev] SUBJECT.KEYID = 7
3,521,547 UART: [idev] UDS.KEYID = 0
3,546,006 UART: [idev] Erasing UDS.KEYID = 0
6,028,378 UART: [idev] Sha1 KeyId Algorithm
6,051,196 UART: [idev] --
6,056,764 UART: [ldev] ++
6,057,345 UART: [ldev] CDI.KEYID = 6
6,058,276 UART: [ldev] SUBJECT.KEYID = 5
6,059,446 UART: [ldev] AUTHORITY.KEYID = 7
6,060,736 UART: [ldev] FE.KEYID = 1
6,101,688 UART: [ldev] Erasing FE.KEYID = 1
8,608,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,300 UART: [ldev] --
10,416,355 UART: [fwproc] Wait for Commands...
10,419,480 UART: [fwproc] Recv command 0x43415053
10,423,586 UART: ROM Fatal Error: 0x01020006
10,426,684 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,560 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,207,244 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,796 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,400 UART:
192,785 UART: Running Caliptra ROM ...
193,900 UART:
603,529 UART: [state] CFI Enabled
615,590 UART: [state] LifecycleState = Unprovisioned
617,462 UART: [state] DebugLocked = No
619,157 UART: [state] WD Timer not started. Device not locked for debugging
623,801 UART: [kat] SHA2-256
802,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,488 UART: [kat] ++
815,025 UART: [kat] sha1
825,047 UART: [kat] SHA2-256
828,101 UART: [kat] SHA2-384
834,337 UART: [kat] SHA2-512-ACC
837,290 UART: [kat] ECC-384
3,280,182 UART: [kat] HMAC-384Kdf
3,292,038 UART: [kat] LMS
3,821,518 UART: [kat] --
3,826,427 UART: [cold-reset] ++
3,827,758 UART: [fht] FHT @ 0x50003400
3,838,408 UART: [idev] ++
3,838,977 UART: [idev] CDI.KEYID = 6
3,839,910 UART: [idev] SUBJECT.KEYID = 7
3,841,116 UART: [idev] UDS.KEYID = 0
3,856,472 UART: [idev] Erasing UDS.KEYID = 0
6,310,228 UART: [idev] Sha1 KeyId Algorithm
6,334,093 UART: [idev] --
6,338,571 UART: [ldev] ++
6,339,146 UART: [ldev] CDI.KEYID = 6
6,340,052 UART: [ldev] SUBJECT.KEYID = 5
6,341,235 UART: [ldev] AUTHORITY.KEYID = 7
6,342,465 UART: [ldev] FE.KEYID = 1
6,355,165 UART: [ldev] Erasing FE.KEYID = 1
8,830,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,161 UART: [ldev] --
10,622,205 UART: [fwproc] Wait for Commands...
10,623,974 UART: [fwproc] Recv command 0x43415053
10,629,145 UART: ROM Fatal Error: 0x01020006
10,632,242 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,407 writing to cptra_bootfsm_go
5,104 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,414,897 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,459 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,102 UART:
192,593 UART: Running Caliptra ROM ...
193,689 UART:
193,831 UART: [state] CFI Enabled
264,298 UART: [state] LifecycleState = Unprovisioned
266,162 UART: [state] DebugLocked = No
267,701 UART: [state] WD Timer not started. Device not locked for debugging
271,469 UART: [kat] SHA2-256
450,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,159 UART: [kat] ++
462,605 UART: [kat] sha1
473,747 UART: [kat] SHA2-256
476,753 UART: [kat] SHA2-384
481,867 UART: [kat] SHA2-512-ACC
484,852 UART: [kat] ECC-384
2,949,002 UART: [kat] HMAC-384Kdf
2,971,407 UART: [kat] LMS
3,500,855 UART: [kat] --
3,506,466 UART: [cold-reset] ++
3,508,666 UART: [fht] FHT @ 0x50003400
3,520,405 UART: [idev] ++
3,520,978 UART: [idev] CDI.KEYID = 6
3,521,913 UART: [idev] SUBJECT.KEYID = 7
3,523,079 UART: [idev] UDS.KEYID = 0
3,542,628 UART: [idev] Erasing UDS.KEYID = 0
6,023,318 UART: [idev] Sha1 KeyId Algorithm
6,046,325 UART: [idev] --
6,051,596 UART: [ldev] ++
6,052,178 UART: [ldev] CDI.KEYID = 6
6,053,062 UART: [ldev] SUBJECT.KEYID = 5
6,054,232 UART: [ldev] AUTHORITY.KEYID = 7
6,055,520 UART: [ldev] FE.KEYID = 1
6,099,764 UART: [ldev] Erasing FE.KEYID = 1
8,599,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,604 UART: [ldev] --
10,414,766 UART: [fwproc] Wait for Commands...
10,418,001 UART: [fwproc] Recv command 0x43415053
10,421,996 UART: ROM Fatal Error: 0x01020006
10,425,143 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,409 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,184,884 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,804 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,380 UART:
192,763 UART: Running Caliptra ROM ...
193,875 UART:
603,423 UART: [state] CFI Enabled
620,246 UART: [state] LifecycleState = Unprovisioned
622,106 UART: [state] DebugLocked = No
623,320 UART: [state] WD Timer not started. Device not locked for debugging
626,409 UART: [kat] SHA2-256
805,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,075 UART: [kat] ++
817,532 UART: [kat] sha1
828,696 UART: [kat] SHA2-256
831,758 UART: [kat] SHA2-384
837,678 UART: [kat] SHA2-512-ACC
840,660 UART: [kat] ECC-384
3,283,901 UART: [kat] HMAC-384Kdf
3,295,595 UART: [kat] LMS
3,825,106 UART: [kat] --
3,828,458 UART: [cold-reset] ++
3,830,229 UART: [fht] FHT @ 0x50003400
3,840,829 UART: [idev] ++
3,841,384 UART: [idev] CDI.KEYID = 6
3,842,296 UART: [idev] SUBJECT.KEYID = 7
3,843,508 UART: [idev] UDS.KEYID = 0
3,858,723 UART: [idev] Erasing UDS.KEYID = 0
6,316,116 UART: [idev] Sha1 KeyId Algorithm
6,338,917 UART: [idev] --
6,342,062 UART: [ldev] ++
6,342,630 UART: [ldev] CDI.KEYID = 6
6,343,533 UART: [ldev] SUBJECT.KEYID = 5
6,344,746 UART: [ldev] AUTHORITY.KEYID = 7
6,345,971 UART: [ldev] FE.KEYID = 1
6,355,429 UART: [ldev] Erasing FE.KEYID = 1
8,828,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,863 UART: [ldev] --
10,620,841 UART: [fwproc] Wait for Commands...
10,622,937 UART: [fwproc] Recv command 0x43415053
10,625,943 UART: ROM Fatal Error: 0x01020006
10,629,033 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,817 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,411,833 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,633 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,808 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x43415053
1,282,766 UART: ROM Fatal Error: 0x01020006
1,283,925 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,489 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x43415053
1,283,375 UART: ROM Fatal Error: 0x01020006
1,284,534 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,716 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,332 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,690 UART: [ldev] ++
1,208,858 UART: [ldev] CDI.KEYID = 6
1,209,222 UART: [ldev] SUBJECT.KEYID = 5
1,209,649 UART: [ldev] AUTHORITY.KEYID = 7
1,210,112 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,242,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,852 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,281,973 UART: [fwproc] Recv command 0x43415053
1,283,128 UART: ROM Fatal Error: 0x01020006
1,284,287 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,023 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,595 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,598 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,017 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x43415053
1,283,373 UART: ROM Fatal Error: 0x01020006
1,284,532 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,664 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,181,449 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,240,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,130 UART: [ldev] --
1,279,396 UART: [fwproc] Wait for Commands...
1,280,201 UART: [fwproc] Recv command 0x43415053
1,281,380 UART: ROM Fatal Error: 0x01020006
1,282,539 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,385 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,324 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,061 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x43415053
1,284,277 UART: ROM Fatal Error: 0x01020006
1,285,436 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,068 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,553 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,196 UART:
192,562 UART: Running Caliptra ROM ...
193,771 UART:
193,928 UART: [state] CFI Enabled
267,062 UART: [state] LifecycleState = Unprovisioned
269,429 UART: [state] DebugLocked = No
270,813 UART: [state] WD Timer not started. Device not locked for debugging
275,904 UART: [kat] SHA2-256
457,832 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,353 UART: [kat] ++
469,937 UART: [kat] sha1
481,649 UART: [kat] SHA2-256
484,662 UART: [kat] SHA2-384
490,809 UART: [kat] SHA2-512-ACC
493,419 UART: [kat] ECC-384
3,776,566 UART: [kat] HMAC-384Kdf
3,801,041 UART: [kat] LMS
4,874,183 UART: [kat] --
4,878,715 UART: [cold-reset] ++
4,880,235 UART: [fht] FHT @ 0x50003400
4,891,545 UART: [idev] ++
4,892,216 UART: [idev] CDI.KEYID = 6
4,893,445 UART: [idev] SUBJECT.KEYID = 7
4,894,620 UART: [idev] UDS.KEYID = 0
4,929,763 UART: [idev] Erasing UDS.KEYID = 0
8,233,559 UART: [idev] Sha1 KeyId Algorithm
8,255,503 UART: [idev] --
8,259,047 UART: [ldev] ++
8,259,624 UART: [ldev] CDI.KEYID = 6
8,260,856 UART: [ldev] SUBJECT.KEYID = 5
8,262,011 UART: [ldev] AUTHORITY.KEYID = 7
8,263,238 UART: [ldev] FE.KEYID = 1
8,308,701 UART: [ldev] Erasing FE.KEYID = 1
11,643,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,933,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,949,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,965,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,981,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,002,502 UART: [ldev] --
14,007,291 UART: [fwproc] Wait for Commands...
14,010,486 UART: [fwproc] Recv command 0x4d454153
14,015,345 UART: ROM Fatal Error: 0x01020006
14,018,710 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
13,829,317 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,800 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,374 UART:
192,747 UART: Running Caliptra ROM ...
193,953 UART:
603,669 UART: [state] CFI Enabled
615,732 UART: [state] LifecycleState = Unprovisioned
618,046 UART: [state] DebugLocked = No
620,292 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
807,401 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,910 UART: [kat] ++
819,491 UART: [kat] sha1
828,429 UART: [kat] SHA2-256
831,491 UART: [kat] SHA2-384
836,052 UART: [kat] SHA2-512-ACC
838,663 UART: [kat] ECC-384
4,094,412 UART: [kat] HMAC-384Kdf
4,107,035 UART: [kat] LMS
5,180,179 UART: [kat] --
5,185,587 UART: [cold-reset] ++
5,187,594 UART: [fht] FHT @ 0x50003400
5,197,842 UART: [idev] ++
5,198,523 UART: [idev] CDI.KEYID = 6
5,199,754 UART: [idev] SUBJECT.KEYID = 7
5,201,204 UART: [idev] UDS.KEYID = 0
5,217,774 UART: [idev] Erasing UDS.KEYID = 0
8,492,347 UART: [idev] Sha1 KeyId Algorithm
8,514,978 UART: [idev] --
8,519,021 UART: [ldev] ++
8,519,587 UART: [ldev] CDI.KEYID = 6
8,520,817 UART: [ldev] SUBJECT.KEYID = 5
8,522,243 UART: [ldev] AUTHORITY.KEYID = 7
8,523,849 UART: [ldev] FE.KEYID = 1
8,535,905 UART: [ldev] Erasing FE.KEYID = 1
11,829,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,038 UART: [ldev] --
14,196,835 UART: [fwproc] Wait for Commands...
14,199,413 UART: [fwproc] Recv command 0x4d454153
14,205,018 UART: ROM Fatal Error: 0x01020006
14,208,328 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
4,034 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
14,022,131 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,629 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,269 UART:
192,658 UART: Running Caliptra ROM ...
193,786 UART:
193,933 UART: [state] CFI Enabled
263,551 UART: [state] LifecycleState = Unprovisioned
265,407 UART: [state] DebugLocked = No
267,227 UART: [state] WD Timer not started. Device not locked for debugging
271,501 UART: [kat] SHA2-256
450,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,183 UART: [kat] ++
462,714 UART: [kat] sha1
472,948 UART: [kat] SHA2-256
475,954 UART: [kat] SHA2-384
481,175 UART: [kat] SHA2-512-ACC
484,106 UART: [kat] ECC-384
2,947,224 UART: [kat] HMAC-384Kdf
2,972,911 UART: [kat] LMS
3,502,387 UART: [kat] --
3,508,056 UART: [cold-reset] ++
3,510,051 UART: [fht] FHT @ 0x50003400
3,520,189 UART: [idev] ++
3,520,760 UART: [idev] CDI.KEYID = 6
3,521,681 UART: [idev] SUBJECT.KEYID = 7
3,522,844 UART: [idev] UDS.KEYID = 0
3,545,356 UART: [idev] Erasing UDS.KEYID = 0
6,025,898 UART: [idev] Sha1 KeyId Algorithm
6,050,592 UART: [idev] --
6,055,244 UART: [ldev] ++
6,055,822 UART: [ldev] CDI.KEYID = 6
6,056,735 UART: [ldev] SUBJECT.KEYID = 5
6,057,951 UART: [ldev] AUTHORITY.KEYID = 7
6,059,186 UART: [ldev] FE.KEYID = 1
6,100,252 UART: [ldev] Erasing FE.KEYID = 1
8,603,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,820 UART: [ldev] --
10,413,355 UART: [fwproc] Wait for Commands...
10,415,983 UART: [fwproc] Recv command 0x4d454153
10,420,199 UART: ROM Fatal Error: 0x01020006
10,423,301 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
4,607 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,184,213 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,972 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,546 UART:
192,911 UART: Running Caliptra ROM ...
194,024 UART:
603,575 UART: [state] CFI Enabled
617,640 UART: [state] LifecycleState = Unprovisioned
619,465 UART: [state] DebugLocked = No
622,409 UART: [state] WD Timer not started. Device not locked for debugging
626,412 UART: [kat] SHA2-256
805,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,074 UART: [kat] ++
817,608 UART: [kat] sha1
827,788 UART: [kat] SHA2-256
830,842 UART: [kat] SHA2-384
835,959 UART: [kat] SHA2-512-ACC
838,891 UART: [kat] ECC-384
3,281,638 UART: [kat] HMAC-384Kdf
3,294,033 UART: [kat] LMS
3,823,506 UART: [kat] --
3,829,194 UART: [cold-reset] ++
3,831,230 UART: [fht] FHT @ 0x50003400
3,841,340 UART: [idev] ++
3,841,899 UART: [idev] CDI.KEYID = 6
3,842,775 UART: [idev] SUBJECT.KEYID = 7
3,843,983 UART: [idev] UDS.KEYID = 0
3,862,173 UART: [idev] Erasing UDS.KEYID = 0
6,318,187 UART: [idev] Sha1 KeyId Algorithm
6,341,533 UART: [idev] --
6,345,275 UART: [ldev] ++
6,345,881 UART: [ldev] CDI.KEYID = 6
6,346,767 UART: [ldev] SUBJECT.KEYID = 5
6,347,975 UART: [ldev] AUTHORITY.KEYID = 7
6,349,206 UART: [ldev] FE.KEYID = 1
6,361,554 UART: [ldev] Erasing FE.KEYID = 1
8,835,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,103 UART: [ldev] --
10,625,256 UART: [fwproc] Wait for Commands...
10,627,020 UART: [fwproc] Recv command 0x4d454153
10,630,869 UART: ROM Fatal Error: 0x01020006
10,633,969 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,718 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,415,738 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,562 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,237 UART:
192,631 UART: Running Caliptra ROM ...
193,717 UART:
193,862 UART: [state] CFI Enabled
262,737 UART: [state] LifecycleState = Unprovisioned
264,662 UART: [state] DebugLocked = No
265,933 UART: [state] WD Timer not started. Device not locked for debugging
269,886 UART: [kat] SHA2-256
449,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,544 UART: [kat] ++
460,992 UART: [kat] sha1
471,862 UART: [kat] SHA2-256
474,860 UART: [kat] SHA2-384
480,783 UART: [kat] SHA2-512-ACC
483,764 UART: [kat] ECC-384
2,947,999 UART: [kat] HMAC-384Kdf
2,971,135 UART: [kat] LMS
3,500,570 UART: [kat] --
3,504,075 UART: [cold-reset] ++
3,506,442 UART: [fht] FHT @ 0x50003400
3,519,089 UART: [idev] ++
3,519,687 UART: [idev] CDI.KEYID = 6
3,520,597 UART: [idev] SUBJECT.KEYID = 7
3,521,815 UART: [idev] UDS.KEYID = 0
3,544,190 UART: [idev] Erasing UDS.KEYID = 0
6,024,637 UART: [idev] Sha1 KeyId Algorithm
6,048,031 UART: [idev] --
6,051,600 UART: [ldev] ++
6,052,173 UART: [ldev] CDI.KEYID = 6
6,053,085 UART: [ldev] SUBJECT.KEYID = 5
6,054,248 UART: [ldev] AUTHORITY.KEYID = 7
6,055,481 UART: [ldev] FE.KEYID = 1
6,100,208 UART: [ldev] Erasing FE.KEYID = 1
8,601,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,737 UART: [ldev] --
10,414,147 UART: [fwproc] Wait for Commands...
10,416,501 UART: [fwproc] Recv command 0x4d454153
10,421,536 UART: ROM Fatal Error: 0x01020006
10,424,637 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,396 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,188,708 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,933 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,568 UART:
192,966 UART: Running Caliptra ROM ...
194,153 UART:
603,830 UART: [state] CFI Enabled
618,973 UART: [state] LifecycleState = Unprovisioned
620,853 UART: [state] DebugLocked = No
623,378 UART: [state] WD Timer not started. Device not locked for debugging
627,772 UART: [kat] SHA2-256
806,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,468 UART: [kat] ++
818,912 UART: [kat] sha1
829,619 UART: [kat] SHA2-256
832,619 UART: [kat] SHA2-384
839,831 UART: [kat] SHA2-512-ACC
842,810 UART: [kat] ECC-384
3,283,474 UART: [kat] HMAC-384Kdf
3,297,452 UART: [kat] LMS
3,826,953 UART: [kat] --
3,830,782 UART: [cold-reset] ++
3,832,274 UART: [fht] FHT @ 0x50003400
3,843,892 UART: [idev] ++
3,844,476 UART: [idev] CDI.KEYID = 6
3,845,358 UART: [idev] SUBJECT.KEYID = 7
3,846,565 UART: [idev] UDS.KEYID = 0
3,863,672 UART: [idev] Erasing UDS.KEYID = 0
6,322,327 UART: [idev] Sha1 KeyId Algorithm
6,344,160 UART: [idev] --
6,349,127 UART: [ldev] ++
6,349,693 UART: [ldev] CDI.KEYID = 6
6,350,601 UART: [ldev] SUBJECT.KEYID = 5
6,351,813 UART: [ldev] AUTHORITY.KEYID = 7
6,353,038 UART: [ldev] FE.KEYID = 1
6,364,008 UART: [ldev] Erasing FE.KEYID = 1
8,837,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,033 UART: [ldev] --
10,626,555 UART: [fwproc] Wait for Commands...
10,628,818 UART: [fwproc] Recv command 0x4d454153
10,634,259 UART: ROM Fatal Error: 0x01020006
10,637,349 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,840 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,404,448 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
915,708 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,197,343 UART: [idev] Sha1 KeyId Algorithm
1,206,185 UART: [idev] --
1,207,294 UART: [ldev] ++
1,207,462 UART: [ldev] CDI.KEYID = 6
1,207,826 UART: [ldev] SUBJECT.KEYID = 5
1,208,253 UART: [ldev] AUTHORITY.KEYID = 7
1,208,716 UART: [ldev] FE.KEYID = 1
1,213,988 UART: [ldev] Erasing FE.KEYID = 1
1,240,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,156 UART: [ldev] --
1,279,562 UART: [fwproc] Wait for Commands...
1,280,143 UART: [fwproc] Recv command 0x4d454153
1,281,283 UART: ROM Fatal Error: 0x01020006
1,282,442 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,726 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,200,158 UART: [idev] Sha1 KeyId Algorithm
1,209,002 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,025 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x4d454153
1,284,138 UART: ROM Fatal Error: 0x01020006
1,285,297 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,677 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,856 UART: [kat] HMAC-384Kdf
921,422 UART: [kat] LMS
1,169,734 UART: [kat] --
1,170,843 UART: [cold-reset] ++
1,171,287 UART: [fht] FHT @ 0x50003400
1,174,017 UART: [idev] ++
1,174,185 UART: [idev] CDI.KEYID = 6
1,174,546 UART: [idev] SUBJECT.KEYID = 7
1,174,971 UART: [idev] UDS.KEYID = 0
1,182,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,009 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,760 UART: [ldev] ++
1,209,928 UART: [ldev] CDI.KEYID = 6
1,210,292 UART: [ldev] SUBJECT.KEYID = 5
1,210,719 UART: [ldev] AUTHORITY.KEYID = 7
1,211,182 UART: [ldev] FE.KEYID = 1
1,216,198 UART: [ldev] Erasing FE.KEYID = 1
1,242,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,350 UART: [ldev] --
1,281,692 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x4d454153
1,283,731 UART: ROM Fatal Error: 0x01020006
1,284,890 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,135,858 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,287 UART: [kat] LMS
1,169,599 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x4d454153
1,283,898 UART: ROM Fatal Error: 0x01020006
1,285,057 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,643 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,910 UART: [kat] HMAC-384Kdf
921,438 UART: [kat] LMS
1,169,750 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,171,121 UART: [fht] FHT @ 0x50003400
1,173,629 UART: [idev] ++
1,173,797 UART: [idev] CDI.KEYID = 6
1,174,158 UART: [idev] SUBJECT.KEYID = 7
1,174,583 UART: [idev] UDS.KEYID = 0
1,182,303 UART: [idev] Erasing UDS.KEYID = 0
1,199,311 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,166 UART: [ldev] ++
1,209,334 UART: [ldev] CDI.KEYID = 6
1,209,698 UART: [ldev] SUBJECT.KEYID = 5
1,210,125 UART: [ldev] AUTHORITY.KEYID = 7
1,210,588 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,262 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x4d454153
1,283,385 UART: ROM Fatal Error: 0x01020006
1,284,544 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,972 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,662 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,669 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x4d454153
1,284,932 UART: ROM Fatal Error: 0x01020006
1,286,091 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,309 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,581 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,196 UART:
192,555 UART: Running Caliptra ROM ...
193,695 UART:
193,844 UART: [state] CFI Enabled
261,030 UART: [state] LifecycleState = Unprovisioned
263,454 UART: [state] DebugLocked = No
264,944 UART: [state] WD Timer not started. Device not locked for debugging
270,014 UART: [kat] SHA2-256
451,941 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,456 UART: [kat] ++
464,049 UART: [kat] sha1
474,365 UART: [kat] SHA2-256
477,350 UART: [kat] SHA2-384
483,874 UART: [kat] SHA2-512-ACC
486,488 UART: [kat] ECC-384
3,776,416 UART: [kat] HMAC-384Kdf
3,802,375 UART: [kat] LMS
4,875,548 UART: [kat] --
4,879,430 UART: [cold-reset] ++
4,881,045 UART: [fht] FHT @ 0x50003400
4,892,356 UART: [idev] ++
4,893,027 UART: [idev] CDI.KEYID = 6
4,894,270 UART: [idev] SUBJECT.KEYID = 7
4,895,398 UART: [idev] UDS.KEYID = 0
4,930,468 UART: [idev] Erasing UDS.KEYID = 0
8,242,790 UART: [idev] Sha1 KeyId Algorithm
8,265,062 UART: [idev] --
8,269,167 UART: [ldev] ++
8,269,786 UART: [ldev] CDI.KEYID = 6
8,270,967 UART: [ldev] SUBJECT.KEYID = 5
8,272,124 UART: [ldev] AUTHORITY.KEYID = 7
8,273,357 UART: [ldev] FE.KEYID = 1
8,319,629 UART: [ldev] Erasing FE.KEYID = 1
11,655,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,262 UART: [ldev] --
14,041,056 UART: [fwproc] Wait for Commands...
14,043,538 UART: [fwproc] Recv command 0x43415053
14,048,454 UART: ROM Fatal Error: 0x01020006
14,051,774 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,383 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
13,849,174 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,922 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,522 UART:
192,898 UART: Running Caliptra ROM ...
194,102 UART:
603,806 UART: [state] CFI Enabled
616,132 UART: [state] LifecycleState = Unprovisioned
618,522 UART: [state] DebugLocked = No
620,595 UART: [state] WD Timer not started. Device not locked for debugging
624,887 UART: [kat] SHA2-256
806,842 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,390 UART: [kat] ++
818,922 UART: [kat] sha1
829,261 UART: [kat] SHA2-256
832,270 UART: [kat] SHA2-384
837,269 UART: [kat] SHA2-512-ACC
839,906 UART: [kat] ECC-384
4,095,282 UART: [kat] HMAC-384Kdf
4,106,892 UART: [kat] LMS
5,180,081 UART: [kat] --
5,181,893 UART: [cold-reset] ++
5,184,592 UART: [fht] FHT @ 0x50003400
5,196,216 UART: [idev] ++
5,196,938 UART: [idev] CDI.KEYID = 6
5,198,111 UART: [idev] SUBJECT.KEYID = 7
5,199,596 UART: [idev] UDS.KEYID = 0
5,215,619 UART: [idev] Erasing UDS.KEYID = 0
8,486,430 UART: [idev] Sha1 KeyId Algorithm
8,508,211 UART: [idev] --
8,511,853 UART: [ldev] ++
8,512,479 UART: [ldev] CDI.KEYID = 6
8,513,588 UART: [ldev] SUBJECT.KEYID = 5
8,515,147 UART: [ldev] AUTHORITY.KEYID = 7
8,516,623 UART: [ldev] FE.KEYID = 1
8,530,344 UART: [ldev] Erasing FE.KEYID = 1
11,821,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,845 UART: [ldev] --
14,185,994 UART: [fwproc] Wait for Commands...
14,187,773 UART: [fwproc] Recv command 0x43415053
14,191,662 UART: ROM Fatal Error: 0x01020006
14,194,978 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,907 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
14,017,702 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,559 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,190 UART:
192,579 UART: Running Caliptra ROM ...
193,683 UART:
193,829 UART: [state] CFI Enabled
263,222 UART: [state] LifecycleState = Unprovisioned
265,133 UART: [state] DebugLocked = No
267,610 UART: [state] WD Timer not started. Device not locked for debugging
271,786 UART: [kat] SHA2-256
450,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,498 UART: [kat] ++
463,031 UART: [kat] sha1
474,282 UART: [kat] SHA2-256
477,279 UART: [kat] SHA2-384
483,263 UART: [kat] SHA2-512-ACC
486,198 UART: [kat] ECC-384
2,948,064 UART: [kat] HMAC-384Kdf
2,970,954 UART: [kat] LMS
3,500,370 UART: [kat] --
3,506,466 UART: [cold-reset] ++
3,508,826 UART: [fht] FHT @ 0x50003400
3,519,884 UART: [idev] ++
3,520,465 UART: [idev] CDI.KEYID = 6
3,521,394 UART: [idev] SUBJECT.KEYID = 7
3,522,559 UART: [idev] UDS.KEYID = 0
3,543,025 UART: [idev] Erasing UDS.KEYID = 0
6,023,197 UART: [idev] Sha1 KeyId Algorithm
6,045,778 UART: [idev] --
6,050,799 UART: [ldev] ++
6,051,369 UART: [ldev] CDI.KEYID = 6
6,052,254 UART: [ldev] SUBJECT.KEYID = 5
6,053,475 UART: [ldev] AUTHORITY.KEYID = 7
6,054,660 UART: [ldev] FE.KEYID = 1
6,099,503 UART: [ldev] Erasing FE.KEYID = 1
8,601,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,145 UART: [ldev] --
10,411,072 UART: [fwproc] Wait for Commands...
10,413,288 UART: [fwproc] Recv command 0x43415053
10,418,470 UART: ROM Fatal Error: 0x01020006
10,421,567 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,226,313 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,847 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,455 UART:
192,848 UART: Running Caliptra ROM ...
193,924 UART:
603,786 UART: [state] CFI Enabled
618,112 UART: [state] LifecycleState = Unprovisioned
620,000 UART: [state] DebugLocked = No
622,162 UART: [state] WD Timer not started. Device not locked for debugging
625,189 UART: [kat] SHA2-256
804,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,883 UART: [kat] ++
816,331 UART: [kat] sha1
826,935 UART: [kat] SHA2-256
830,007 UART: [kat] SHA2-384
836,058 UART: [kat] SHA2-512-ACC
839,003 UART: [kat] ECC-384
3,277,458 UART: [kat] HMAC-384Kdf
3,290,911 UART: [kat] LMS
3,820,413 UART: [kat] --
3,825,639 UART: [cold-reset] ++
3,828,008 UART: [fht] FHT @ 0x50003400
3,839,040 UART: [idev] ++
3,839,601 UART: [idev] CDI.KEYID = 6
3,840,516 UART: [idev] SUBJECT.KEYID = 7
3,841,727 UART: [idev] UDS.KEYID = 0
3,860,617 UART: [idev] Erasing UDS.KEYID = 0
6,319,364 UART: [idev] Sha1 KeyId Algorithm
6,342,489 UART: [idev] --
6,345,996 UART: [ldev] ++
6,346,562 UART: [ldev] CDI.KEYID = 6
6,347,523 UART: [ldev] SUBJECT.KEYID = 5
6,348,698 UART: [ldev] AUTHORITY.KEYID = 7
6,349,925 UART: [ldev] FE.KEYID = 1
6,362,086 UART: [ldev] Erasing FE.KEYID = 1
8,836,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,547 UART: [ldev] --
10,629,755 UART: [fwproc] Wait for Commands...
10,631,197 UART: [fwproc] Recv command 0x43415053
10,634,104 UART: ROM Fatal Error: 0x01020006
10,637,198 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
4,101 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,413,209 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,612 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,218 UART:
192,588 UART: Running Caliptra ROM ...
193,763 UART:
193,937 UART: [state] CFI Enabled
261,229 UART: [state] LifecycleState = Unprovisioned
263,084 UART: [state] DebugLocked = No
265,878 UART: [state] WD Timer not started. Device not locked for debugging
268,968 UART: [kat] SHA2-256
448,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,698 UART: [kat] ++
460,239 UART: [kat] sha1
472,690 UART: [kat] SHA2-256
475,753 UART: [kat] SHA2-384
482,861 UART: [kat] SHA2-512-ACC
485,849 UART: [kat] ECC-384
2,947,679 UART: [kat] HMAC-384Kdf
2,969,948 UART: [kat] LMS
3,499,437 UART: [kat] --
3,502,298 UART: [cold-reset] ++
3,503,533 UART: [fht] FHT @ 0x50003400
3,515,264 UART: [idev] ++
3,515,836 UART: [idev] CDI.KEYID = 6
3,516,712 UART: [idev] SUBJECT.KEYID = 7
3,517,929 UART: [idev] UDS.KEYID = 0
3,543,304 UART: [idev] Erasing UDS.KEYID = 0
6,023,928 UART: [idev] Sha1 KeyId Algorithm
6,046,394 UART: [idev] --
6,050,179 UART: [ldev] ++
6,050,754 UART: [ldev] CDI.KEYID = 6
6,051,677 UART: [ldev] SUBJECT.KEYID = 5
6,052,840 UART: [ldev] AUTHORITY.KEYID = 7
6,054,080 UART: [ldev] FE.KEYID = 1
6,098,552 UART: [ldev] Erasing FE.KEYID = 1
8,600,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,176 UART: [ldev] --
10,394,543 UART: [fwproc] Wait for Commands...
10,396,213 UART: [fwproc] Recv command 0x43415053
10,400,256 UART: ROM Fatal Error: 0x01020006
10,403,403 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,531 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,177,313 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,890 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,445 UART:
192,820 UART: Running Caliptra ROM ...
193,995 UART:
603,443 UART: [state] CFI Enabled
619,805 UART: [state] LifecycleState = Unprovisioned
621,663 UART: [state] DebugLocked = No
623,398 UART: [state] WD Timer not started. Device not locked for debugging
626,544 UART: [kat] SHA2-256
805,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,242 UART: [kat] ++
817,687 UART: [kat] sha1
827,589 UART: [kat] SHA2-256
830,645 UART: [kat] SHA2-384
837,531 UART: [kat] SHA2-512-ACC
840,464 UART: [kat] ECC-384
3,282,935 UART: [kat] HMAC-384Kdf
3,294,509 UART: [kat] LMS
3,824,036 UART: [kat] --
3,829,163 UART: [cold-reset] ++
3,831,412 UART: [fht] FHT @ 0x50003400
3,842,328 UART: [idev] ++
3,842,891 UART: [idev] CDI.KEYID = 6
3,843,768 UART: [idev] SUBJECT.KEYID = 7
3,845,034 UART: [idev] UDS.KEYID = 0
3,861,598 UART: [idev] Erasing UDS.KEYID = 0
6,313,908 UART: [idev] Sha1 KeyId Algorithm
6,337,942 UART: [idev] --
6,340,366 UART: [ldev] ++
6,340,941 UART: [ldev] CDI.KEYID = 6
6,341,851 UART: [ldev] SUBJECT.KEYID = 5
6,343,011 UART: [ldev] AUTHORITY.KEYID = 7
6,344,299 UART: [ldev] FE.KEYID = 1
6,355,376 UART: [ldev] Erasing FE.KEYID = 1
8,831,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,821 UART: [ldev] --
10,623,447 UART: [fwproc] Wait for Commands...
10,626,051 UART: [fwproc] Recv command 0x43415053
10,630,267 UART: ROM Fatal Error: 0x01020006
10,633,372 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,873 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,413,884 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,930 UART: [kat] SHA2-512-ACC
906,831 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,198,635 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,718 UART: [ldev] --
1,281,176 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x43415053
1,282,826 UART: ROM Fatal Error: 0x01020006
1,283,985 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,421 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,216,191 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x43415053
1,283,679 UART: ROM Fatal Error: 0x01020006
1,284,838 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,986 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
916,614 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,349 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,221 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,396 UART: [ldev] ++
1,209,564 UART: [ldev] CDI.KEYID = 6
1,209,928 UART: [ldev] SUBJECT.KEYID = 5
1,210,355 UART: [ldev] AUTHORITY.KEYID = 7
1,210,818 UART: [ldev] FE.KEYID = 1
1,216,308 UART: [ldev] Erasing FE.KEYID = 1
1,243,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,602 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,659 UART: [fwproc] Recv command 0x43415053
1,284,810 UART: ROM Fatal Error: 0x01020006
1,285,969 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,383 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,617 UART: [ldev] SUBJECT.KEYID = 5
1,210,044 UART: [ldev] AUTHORITY.KEYID = 7
1,210,507 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,571 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x43415053
1,284,033 UART: ROM Fatal Error: 0x01020006
1,285,192 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,484 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,228 UART: [kat] LMS
1,169,540 UART: [kat] --
1,170,499 UART: [cold-reset] ++
1,171,043 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,182,535 UART: [idev] Erasing UDS.KEYID = 0
1,199,673 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,218 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,351 UART: [fwproc] Recv command 0x43415053
1,283,494 UART: ROM Fatal Error: 0x01020006
1,284,653 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,195 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
890,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,736 UART: [idev] ++
1,172,904 UART: [idev] CDI.KEYID = 6
1,173,265 UART: [idev] SUBJECT.KEYID = 7
1,173,690 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,481 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x43415053
1,284,151 UART: ROM Fatal Error: 0x01020006
1,285,310 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,458 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,418 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,044 UART:
192,427 UART: Running Caliptra ROM ...
193,625 UART:
193,781 UART: [state] CFI Enabled
262,183 UART: [state] LifecycleState = Unprovisioned
264,537 UART: [state] DebugLocked = No
266,562 UART: [state] WD Timer not started. Device not locked for debugging
270,332 UART: [kat] SHA2-256
452,071 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,584 UART: [kat] ++
464,170 UART: [kat] sha1
475,106 UART: [kat] SHA2-256
478,110 UART: [kat] SHA2-384
484,682 UART: [kat] SHA2-512-ACC
487,314 UART: [kat] ECC-384
3,776,511 UART: [kat] HMAC-384Kdf
3,803,605 UART: [kat] LMS
4,876,735 UART: [kat] --
4,882,471 UART: [cold-reset] ++
4,884,630 UART: [fht] FHT @ 0x50003400
4,895,610 UART: [idev] ++
4,896,282 UART: [idev] CDI.KEYID = 6
4,897,465 UART: [idev] SUBJECT.KEYID = 7
4,898,622 UART: [idev] UDS.KEYID = 0
4,929,515 UART: [idev] Erasing UDS.KEYID = 0
8,243,616 UART: [idev] Sha1 KeyId Algorithm
8,265,764 UART: [idev] --
8,270,760 UART: [ldev] ++
8,271,392 UART: [ldev] CDI.KEYID = 6
8,272,535 UART: [ldev] SUBJECT.KEYID = 5
8,273,723 UART: [ldev] AUTHORITY.KEYID = 7
8,274,957 UART: [ldev] FE.KEYID = 1
8,317,409 UART: [ldev] Erasing FE.KEYID = 1
11,652,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,851 UART: [ldev] --
14,037,371 UART: [fwproc] Wait for Commands...
14,041,253 UART: ROM Fatal Error: 0x01020009
14,044,572 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,482 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
13,811,353 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,032 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,646 UART:
193,016 UART: Running Caliptra ROM ...
194,231 UART:
603,970 UART: [state] CFI Enabled
619,581 UART: [state] LifecycleState = Unprovisioned
621,947 UART: [state] DebugLocked = No
623,384 UART: [state] WD Timer not started. Device not locked for debugging
627,249 UART: [kat] SHA2-256
809,251 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,795 UART: [kat] ++
821,293 UART: [kat] sha1
831,864 UART: [kat] SHA2-256
834,933 UART: [kat] SHA2-384
841,118 UART: [kat] SHA2-512-ACC
843,729 UART: [kat] ECC-384
4,098,270 UART: [kat] HMAC-384Kdf
4,110,240 UART: [kat] LMS
5,183,390 UART: [kat] --
5,186,965 UART: [cold-reset] ++
5,188,095 UART: [fht] FHT @ 0x50003400
5,200,698 UART: [idev] ++
5,201,367 UART: [idev] CDI.KEYID = 6
5,202,602 UART: [idev] SUBJECT.KEYID = 7
5,204,036 UART: [idev] UDS.KEYID = 0
5,217,347 UART: [idev] Erasing UDS.KEYID = 0
8,490,728 UART: [idev] Sha1 KeyId Algorithm
8,513,535 UART: [idev] --
8,517,712 UART: [ldev] ++
8,518,279 UART: [ldev] CDI.KEYID = 6
8,519,446 UART: [ldev] SUBJECT.KEYID = 5
8,520,988 UART: [ldev] AUTHORITY.KEYID = 7
8,522,468 UART: [ldev] FE.KEYID = 1
8,533,714 UART: [ldev] Erasing FE.KEYID = 1
11,825,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,576 UART: [ldev] --
14,193,135 UART: [fwproc] Wait for Commands...
14,197,983 UART: ROM Fatal Error: 0x01020009
14,201,297 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,814 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
14,019,116 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,625 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,232 UART:
192,603 UART: Running Caliptra ROM ...
193,772 UART:
193,925 UART: [state] CFI Enabled
264,249 UART: [state] LifecycleState = Unprovisioned
266,117 UART: [state] DebugLocked = No
268,856 UART: [state] WD Timer not started. Device not locked for debugging
271,778 UART: [kat] SHA2-256
450,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,488 UART: [kat] ++
463,024 UART: [kat] sha1
474,634 UART: [kat] SHA2-256
477,641 UART: [kat] SHA2-384
484,868 UART: [kat] SHA2-512-ACC
487,804 UART: [kat] ECC-384
2,949,916 UART: [kat] HMAC-384Kdf
2,971,124 UART: [kat] LMS
3,500,563 UART: [kat] --
3,504,984 UART: [cold-reset] ++
3,507,569 UART: [fht] FHT @ 0x50003400
3,518,380 UART: [idev] ++
3,518,953 UART: [idev] CDI.KEYID = 6
3,519,863 UART: [idev] SUBJECT.KEYID = 7
3,521,079 UART: [idev] UDS.KEYID = 0
3,542,944 UART: [idev] Erasing UDS.KEYID = 0
6,023,222 UART: [idev] Sha1 KeyId Algorithm
6,045,786 UART: [idev] --
6,050,137 UART: [ldev] ++
6,050,717 UART: [ldev] CDI.KEYID = 6
6,051,627 UART: [ldev] SUBJECT.KEYID = 5
6,052,882 UART: [ldev] AUTHORITY.KEYID = 7
6,054,016 UART: [ldev] FE.KEYID = 1
6,099,700 UART: [ldev] Erasing FE.KEYID = 1
8,601,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,237 UART: [ldev] --
10,391,219 UART: [fwproc] Wait for Commands...
10,394,570 UART: ROM Fatal Error: 0x01020009
10,397,684 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,608 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,185,210 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,760 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,398 UART:
192,764 UART: Running Caliptra ROM ...
193,946 UART:
603,425 UART: [state] CFI Enabled
618,151 UART: [state] LifecycleState = Unprovisioned
619,981 UART: [state] DebugLocked = No
621,279 UART: [state] WD Timer not started. Device not locked for debugging
625,768 UART: [kat] SHA2-256
804,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,446 UART: [kat] ++
816,916 UART: [kat] sha1
827,738 UART: [kat] SHA2-256
830,751 UART: [kat] SHA2-384
837,486 UART: [kat] SHA2-512-ACC
840,457 UART: [kat] ECC-384
3,279,445 UART: [kat] HMAC-384Kdf
3,292,953 UART: [kat] LMS
3,822,426 UART: [kat] --
3,827,174 UART: [cold-reset] ++
3,829,484 UART: [fht] FHT @ 0x50003400
3,841,002 UART: [idev] ++
3,841,571 UART: [idev] CDI.KEYID = 6
3,842,475 UART: [idev] SUBJECT.KEYID = 7
3,843,687 UART: [idev] UDS.KEYID = 0
3,862,119 UART: [idev] Erasing UDS.KEYID = 0
6,320,120 UART: [idev] Sha1 KeyId Algorithm
6,342,462 UART: [idev] --
6,346,135 UART: [ldev] ++
6,346,698 UART: [ldev] CDI.KEYID = 6
6,347,577 UART: [ldev] SUBJECT.KEYID = 5
6,348,790 UART: [ldev] AUTHORITY.KEYID = 7
6,350,078 UART: [ldev] FE.KEYID = 1
6,361,245 UART: [ldev] Erasing FE.KEYID = 1
8,833,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,945 UART: [ldev] --
10,623,138 UART: [fwproc] Wait for Commands...
10,627,300 UART: ROM Fatal Error: 0x01020009
10,630,400 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,810 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,410,823 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,660 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,281 UART:
192,640 UART: Running Caliptra ROM ...
193,814 UART:
193,963 UART: [state] CFI Enabled
266,780 UART: [state] LifecycleState = Unprovisioned
268,653 UART: [state] DebugLocked = No
269,874 UART: [state] WD Timer not started. Device not locked for debugging
273,294 UART: [kat] SHA2-256
452,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,993 UART: [kat] ++
464,443 UART: [kat] sha1
474,452 UART: [kat] SHA2-256
477,468 UART: [kat] SHA2-384
483,393 UART: [kat] SHA2-512-ACC
486,381 UART: [kat] ECC-384
2,947,819 UART: [kat] HMAC-384Kdf
2,971,198 UART: [kat] LMS
3,500,616 UART: [kat] --
3,506,934 UART: [cold-reset] ++
3,508,811 UART: [fht] FHT @ 0x50003400
3,518,653 UART: [idev] ++
3,519,212 UART: [idev] CDI.KEYID = 6
3,520,149 UART: [idev] SUBJECT.KEYID = 7
3,521,361 UART: [idev] UDS.KEYID = 0
3,542,652 UART: [idev] Erasing UDS.KEYID = 0
6,027,451 UART: [idev] Sha1 KeyId Algorithm
6,049,817 UART: [idev] --
6,053,054 UART: [ldev] ++
6,053,628 UART: [ldev] CDI.KEYID = 6
6,054,540 UART: [ldev] SUBJECT.KEYID = 5
6,055,756 UART: [ldev] AUTHORITY.KEYID = 7
6,057,007 UART: [ldev] FE.KEYID = 1
6,097,894 UART: [ldev] Erasing FE.KEYID = 1
8,600,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,009 UART: [ldev] --
10,391,020 UART: [fwproc] Wait for Commands...
10,394,964 UART: ROM Fatal Error: 0x01020009
10,398,064 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,204,519 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
3,963 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,570 UART:
192,949 UART: Running Caliptra ROM ...
194,115 UART:
603,779 UART: [state] CFI Enabled
616,128 UART: [state] LifecycleState = Unprovisioned
618,005 UART: [state] DebugLocked = No
619,689 UART: [state] WD Timer not started. Device not locked for debugging
623,860 UART: [kat] SHA2-256
802,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,534 UART: [kat] ++
815,058 UART: [kat] sha1
824,916 UART: [kat] SHA2-256
827,921 UART: [kat] SHA2-384
834,163 UART: [kat] SHA2-512-ACC
837,148 UART: [kat] ECC-384
3,277,610 UART: [kat] HMAC-384Kdf
3,289,515 UART: [kat] LMS
3,819,007 UART: [kat] --
3,821,721 UART: [cold-reset] ++
3,822,787 UART: [fht] FHT @ 0x50003400
3,833,522 UART: [idev] ++
3,834,096 UART: [idev] CDI.KEYID = 6
3,834,981 UART: [idev] SUBJECT.KEYID = 7
3,836,192 UART: [idev] UDS.KEYID = 0
3,851,957 UART: [idev] Erasing UDS.KEYID = 0
6,309,566 UART: [idev] Sha1 KeyId Algorithm
6,332,775 UART: [idev] --
6,336,502 UART: [ldev] ++
6,337,066 UART: [ldev] CDI.KEYID = 6
6,337,949 UART: [ldev] SUBJECT.KEYID = 5
6,339,156 UART: [ldev] AUTHORITY.KEYID = 7
6,340,384 UART: [ldev] FE.KEYID = 1
6,350,459 UART: [ldev] Erasing FE.KEYID = 1
8,824,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,233 UART: [ldev] --
10,616,610 UART: [fwproc] Wait for Commands...
10,621,499 UART: ROM Fatal Error: 0x01020009
10,624,542 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,825 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,416,013 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,625 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,274 UART:
192,638 UART: Running Caliptra ROM ...
193,801 UART:
193,950 UART: [state] CFI Enabled
265,837 UART: [state] LifecycleState = Unprovisioned
268,210 UART: [state] DebugLocked = No
269,379 UART: [state] WD Timer not started. Device not locked for debugging
273,211 UART: [kat] SHA2-256
455,152 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,653 UART: [kat] ++
467,192 UART: [kat] sha1
476,725 UART: [kat] SHA2-256
479,736 UART: [kat] SHA2-384
484,684 UART: [kat] SHA2-512-ACC
487,300 UART: [kat] ECC-384
3,776,034 UART: [kat] HMAC-384Kdf
3,803,919 UART: [kat] LMS
4,877,089 UART: [kat] --
4,880,746 UART: [cold-reset] ++
4,882,144 UART: [fht] FHT @ 0x50003400
4,893,618 UART: [idev] ++
4,894,356 UART: [idev] CDI.KEYID = 6
4,895,536 UART: [idev] SUBJECT.KEYID = 7
4,896,692 UART: [idev] UDS.KEYID = 0
4,931,572 UART: [idev] Erasing UDS.KEYID = 0
8,243,448 UART: [idev] Sha1 KeyId Algorithm
8,266,320 UART: [idev] --
8,270,641 UART: [ldev] ++
8,271,267 UART: [ldev] CDI.KEYID = 6
8,272,373 UART: [ldev] SUBJECT.KEYID = 5
8,273,589 UART: [ldev] AUTHORITY.KEYID = 7
8,274,745 UART: [ldev] FE.KEYID = 1
8,318,854 UART: [ldev] Erasing FE.KEYID = 1
11,654,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,510 UART: [ldev] --
14,039,379 UART: [fwproc] Wait for Commands...
14,042,343 UART: [fwproc] Recv command 0xabcd1234
14,044,722 UART: [fwproc] Invalid command received
14,048,267 UART: ROM Fatal Error: 0x01020004
14,051,590 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,759 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
13,831,870 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,869 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,487 UART:
192,878 UART: Running Caliptra ROM ...
194,098 UART:
603,787 UART: [state] CFI Enabled
618,205 UART: [state] LifecycleState = Unprovisioned
620,543 UART: [state] DebugLocked = No
622,243 UART: [state] WD Timer not started. Device not locked for debugging
627,415 UART: [kat] SHA2-256
809,387 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,951 UART: [kat] ++
821,453 UART: [kat] sha1
831,295 UART: [kat] SHA2-256
834,355 UART: [kat] SHA2-384
840,223 UART: [kat] SHA2-512-ACC
842,892 UART: [kat] ECC-384
4,100,292 UART: [kat] HMAC-384Kdf
4,112,759 UART: [kat] LMS
5,185,920 UART: [kat] --
5,189,759 UART: [cold-reset] ++
5,190,937 UART: [fht] FHT @ 0x50003400
5,201,682 UART: [idev] ++
5,202,355 UART: [idev] CDI.KEYID = 6
5,203,588 UART: [idev] SUBJECT.KEYID = 7
5,205,026 UART: [idev] UDS.KEYID = 0
5,221,686 UART: [idev] Erasing UDS.KEYID = 0
8,492,718 UART: [idev] Sha1 KeyId Algorithm
8,513,583 UART: [idev] --
8,518,658 UART: [ldev] ++
8,519,223 UART: [ldev] CDI.KEYID = 6
8,520,394 UART: [ldev] SUBJECT.KEYID = 5
8,521,930 UART: [ldev] AUTHORITY.KEYID = 7
8,523,409 UART: [ldev] FE.KEYID = 1
8,534,593 UART: [ldev] Erasing FE.KEYID = 1
11,825,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,424 UART: [ldev] --
14,192,585 UART: [fwproc] Wait for Commands...
14,194,061 UART: [fwproc] Recv command 0xabcd1234
14,196,102 UART: [fwproc] Invalid command received
14,198,982 UART: ROM Fatal Error: 0x01020004
14,202,296 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,891 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
14,020,395 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,565 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,216 UART:
192,594 UART: Running Caliptra ROM ...
193,772 UART:
193,929 UART: [state] CFI Enabled
265,798 UART: [state] LifecycleState = Unprovisioned
267,720 UART: [state] DebugLocked = No
270,394 UART: [state] WD Timer not started. Device not locked for debugging
274,022 UART: [kat] SHA2-256
453,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,742 UART: [kat] ++
465,231 UART: [kat] sha1
476,649 UART: [kat] SHA2-256
479,655 UART: [kat] SHA2-384
485,796 UART: [kat] SHA2-512-ACC
488,789 UART: [kat] ECC-384
2,946,121 UART: [kat] HMAC-384Kdf
2,971,324 UART: [kat] LMS
3,500,798 UART: [kat] --
3,503,873 UART: [cold-reset] ++
3,506,397 UART: [fht] FHT @ 0x50003400
3,516,077 UART: [idev] ++
3,516,644 UART: [idev] CDI.KEYID = 6
3,517,664 UART: [idev] SUBJECT.KEYID = 7
3,518,720 UART: [idev] UDS.KEYID = 0
3,541,959 UART: [idev] Erasing UDS.KEYID = 0
6,025,887 UART: [idev] Sha1 KeyId Algorithm
6,047,292 UART: [idev] --
6,052,477 UART: [ldev] ++
6,053,049 UART: [ldev] CDI.KEYID = 6
6,054,133 UART: [ldev] SUBJECT.KEYID = 5
6,055,262 UART: [ldev] AUTHORITY.KEYID = 7
6,056,456 UART: [ldev] FE.KEYID = 1
6,098,031 UART: [ldev] Erasing FE.KEYID = 1
8,601,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,877 UART: [ldev] --
10,412,357 UART: [fwproc] Wait for Commands...
10,415,160 UART: [fwproc] Recv command 0xabcd1234
10,417,279 UART: [fwproc] Invalid command received
10,420,740 UART: ROM Fatal Error: 0x01020004
10,423,845 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,449 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,206,765 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,849 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,461 UART:
192,843 UART: Running Caliptra ROM ...
193,951 UART:
603,741 UART: [state] CFI Enabled
614,457 UART: [state] LifecycleState = Unprovisioned
616,329 UART: [state] DebugLocked = No
618,585 UART: [state] WD Timer not started. Device not locked for debugging
622,314 UART: [kat] SHA2-256
801,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,968 UART: [kat] ++
813,494 UART: [kat] sha1
823,727 UART: [kat] SHA2-256
826,775 UART: [kat] SHA2-384
832,792 UART: [kat] SHA2-512-ACC
835,719 UART: [kat] ECC-384
3,280,656 UART: [kat] HMAC-384Kdf
3,293,264 UART: [kat] LMS
3,822,793 UART: [kat] --
3,826,923 UART: [cold-reset] ++
3,829,140 UART: [fht] FHT @ 0x50003400
3,840,171 UART: [idev] ++
3,840,732 UART: [idev] CDI.KEYID = 6
3,841,631 UART: [idev] SUBJECT.KEYID = 7
3,842,843 UART: [idev] UDS.KEYID = 0
3,859,606 UART: [idev] Erasing UDS.KEYID = 0
6,318,143 UART: [idev] Sha1 KeyId Algorithm
6,339,858 UART: [idev] --
6,342,235 UART: [ldev] ++
6,342,806 UART: [ldev] CDI.KEYID = 6
6,343,715 UART: [ldev] SUBJECT.KEYID = 5
6,344,872 UART: [ldev] AUTHORITY.KEYID = 7
6,346,100 UART: [ldev] FE.KEYID = 1
6,356,318 UART: [ldev] Erasing FE.KEYID = 1
8,835,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,575 UART: [ldev] --
10,625,510 UART: [fwproc] Wait for Commands...
10,627,068 UART: [fwproc] Recv command 0xabcd1234
10,629,180 UART: [fwproc] Invalid command received
10,633,683 UART: ROM Fatal Error: 0x01020004
10,636,789 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,975 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,410,065 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,607 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,199 UART:
192,588 UART: Running Caliptra ROM ...
193,676 UART:
193,815 UART: [state] CFI Enabled
263,604 UART: [state] LifecycleState = Unprovisioned
265,495 UART: [state] DebugLocked = No
266,961 UART: [state] WD Timer not started. Device not locked for debugging
271,411 UART: [kat] SHA2-256
450,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,109 UART: [kat] ++
462,612 UART: [kat] sha1
473,490 UART: [kat] SHA2-256
476,490 UART: [kat] SHA2-384
481,658 UART: [kat] SHA2-512-ACC
484,591 UART: [kat] ECC-384
2,947,509 UART: [kat] HMAC-384Kdf
2,971,245 UART: [kat] LMS
3,500,659 UART: [kat] --
3,504,112 UART: [cold-reset] ++
3,505,396 UART: [fht] FHT @ 0x50003400
3,516,536 UART: [idev] ++
3,517,103 UART: [idev] CDI.KEYID = 6
3,518,011 UART: [idev] SUBJECT.KEYID = 7
3,519,172 UART: [idev] UDS.KEYID = 0
3,543,737 UART: [idev] Erasing UDS.KEYID = 0
6,026,090 UART: [idev] Sha1 KeyId Algorithm
6,049,646 UART: [idev] --
6,053,045 UART: [ldev] ++
6,053,619 UART: [ldev] CDI.KEYID = 6
6,054,505 UART: [ldev] SUBJECT.KEYID = 5
6,055,725 UART: [ldev] AUTHORITY.KEYID = 7
6,056,960 UART: [ldev] FE.KEYID = 1
6,100,266 UART: [ldev] Erasing FE.KEYID = 1
8,603,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,549 UART: [ldev] --
10,411,305 UART: [fwproc] Wait for Commands...
10,413,888 UART: [fwproc] Recv command 0xabcd1234
10,415,985 UART: [fwproc] Invalid command received
10,419,682 UART: ROM Fatal Error: 0x01020004
10,422,833 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,329 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,230,716 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,844 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,469 UART:
192,843 UART: Running Caliptra ROM ...
193,909 UART:
603,582 UART: [state] CFI Enabled
617,242 UART: [state] LifecycleState = Unprovisioned
619,064 UART: [state] DebugLocked = No
621,228 UART: [state] WD Timer not started. Device not locked for debugging
625,345 UART: [kat] SHA2-256
804,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,029 UART: [kat] ++
816,483 UART: [kat] sha1
827,249 UART: [kat] SHA2-256
830,281 UART: [kat] SHA2-384
836,478 UART: [kat] SHA2-512-ACC
839,408 UART: [kat] ECC-384
3,279,973 UART: [kat] HMAC-384Kdf
3,293,182 UART: [kat] LMS
3,822,686 UART: [kat] --
3,828,149 UART: [cold-reset] ++
3,830,222 UART: [fht] FHT @ 0x50003400
3,840,557 UART: [idev] ++
3,841,118 UART: [idev] CDI.KEYID = 6
3,842,049 UART: [idev] SUBJECT.KEYID = 7
3,843,259 UART: [idev] UDS.KEYID = 0
3,856,022 UART: [idev] Erasing UDS.KEYID = 0
6,308,938 UART: [idev] Sha1 KeyId Algorithm
6,332,296 UART: [idev] --
6,337,092 UART: [ldev] ++
6,337,679 UART: [ldev] CDI.KEYID = 6
6,338,560 UART: [ldev] SUBJECT.KEYID = 5
6,339,775 UART: [ldev] AUTHORITY.KEYID = 7
6,341,060 UART: [ldev] FE.KEYID = 1
6,352,215 UART: [ldev] Erasing FE.KEYID = 1
8,825,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,372 UART: [ldev] --
10,616,550 UART: [fwproc] Wait for Commands...
10,619,462 UART: [fwproc] Recv command 0xabcd1234
10,621,554 UART: [fwproc] Invalid command received
10,626,612 UART: ROM Fatal Error: 0x01020004
10,629,752 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,886 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,409,715 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,475 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,711 UART: [idev] ++
1,172,879 UART: [idev] CDI.KEYID = 6
1,173,240 UART: [idev] SUBJECT.KEYID = 7
1,173,665 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,347 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,214,786 UART: [ldev] Erasing FE.KEYID = 1
1,241,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,014 UART: [ldev] --
1,280,324 UART: [fwproc] Wait for Commands...
1,281,005 UART: [fwproc] Recv command 0xabcd1234
1,281,750 UART: [fwproc] Invalid command received
1,282,713 UART: ROM Fatal Error: 0x01020004
1,283,872 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,364 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,408 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,182,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0xabcd1234
1,283,199 UART: [fwproc] Invalid command received
1,284,170 UART: ROM Fatal Error: 0x01020004
1,285,329 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,653 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,411 UART: [fwproc] Recv command 0xabcd1234
1,283,156 UART: [fwproc] Invalid command received
1,284,285 UART: ROM Fatal Error: 0x01020004
1,285,444 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,914 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,673 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,356 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0xabcd1234
1,283,003 UART: [fwproc] Invalid command received
1,283,830 UART: ROM Fatal Error: 0x01020004
1,284,989 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,939 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,265 UART: [kat] SHA2-256
901,205 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,368 UART: [ldev] Erasing FE.KEYID = 1
1,242,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,910 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,935 UART: [fwproc] Recv command 0xabcd1234
1,283,680 UART: [fwproc] Invalid command received
1,284,645 UART: ROM Fatal Error: 0x01020004
1,285,804 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,132 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,208 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,809 UART: [ldev] --
1,282,175 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0xabcd1234
1,283,515 UART: [fwproc] Invalid command received
1,284,602 UART: ROM Fatal Error: 0x01020004
1,285,761 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,869 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,097 UART:
192,484 UART: Running Caliptra ROM ...
193,669 UART:
193,827 UART: [state] CFI Enabled
260,833 UART: [state] LifecycleState = Unprovisioned
263,176 UART: [state] DebugLocked = No
264,929 UART: [state] WD Timer not started. Device not locked for debugging
269,103 UART: [kat] SHA2-256
451,025 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,548 UART: [kat] ++
463,022 UART: [kat] sha1
472,975 UART: [kat] SHA2-256
476,019 UART: [kat] SHA2-384
481,625 UART: [kat] SHA2-512-ACC
484,209 UART: [kat] ECC-384
3,776,748 UART: [kat] HMAC-384Kdf
3,802,705 UART: [kat] LMS
4,875,865 UART: [kat] --
4,879,451 UART: [cold-reset] ++
4,881,031 UART: [fht] FHT @ 0x50003400
4,892,363 UART: [idev] ++
4,892,990 UART: [idev] CDI.KEYID = 6
4,894,232 UART: [idev] SUBJECT.KEYID = 7
4,895,403 UART: [idev] UDS.KEYID = 0
4,896,335 ready_for_fw is high
4,896,548 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,031,108 UART: [idev] Erasing UDS.KEYID = 0
8,242,862 UART: [idev] Sha1 KeyId Algorithm
8,264,857 UART: [idev] --
8,270,198 UART: [ldev] ++
8,270,770 UART: [ldev] CDI.KEYID = 6
8,271,953 UART: [ldev] SUBJECT.KEYID = 5
8,273,113 UART: [ldev] AUTHORITY.KEYID = 7
8,274,362 UART: [ldev] FE.KEYID = 1
8,317,106 UART: [ldev] Erasing FE.KEYID = 1
11,652,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,242 UART: [ldev] --
14,038,127 UART: [fwproc] Wait for Commands...
14,040,600 UART: [fwproc] Recv command 0x46574c44
14,042,916 UART: [fwproc] Recv'd Img size: 106620 bytes
18,019,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,092,110 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,134,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,451,408 >>> mbox cmd response: success
18,452,440 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,454,767 UART: [afmc] ++
18,455,366 UART: [afmc] CDI.KEYID = 6
18,456,558 UART: [afmc] SUBJECT.KEYID = 7
18,457,671 UART: [afmc] AUTHORITY.KEYID = 5
21,823,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,116,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,119,162 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,135,157 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,151,208 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,167,329 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,190,247 UART: [afmc] --
24,192,917 UART: [cold-reset] --
24,198,230 UART: [state] Locking Datavault
24,204,816 UART: [state] Locking PCR0, PCR1 and PCR31
24,206,454 UART: [state] Locking ICCM
24,209,497 UART: [exit] Launching FMC @ 0x40000000
24,218,118 UART:
24,218,353 UART: Running Caliptra FMC ...
24,219,451 UART:
24,219,604 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,221,263 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
4,803,407 ready_for_fw is high
4,803,947 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,259,809 >>> mbox cmd response: success
18,260,948 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
23,947,893 UART:
23,948,311 UART: Running Caliptra FMC ...
23,949,512 UART:
23,949,695 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
23,951,404 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,293 UART:
192,678 UART: Running Caliptra ROM ...
193,769 UART:
603,677 UART: [state] CFI Enabled
617,113 UART: [state] LifecycleState = Unprovisioned
619,490 UART: [state] DebugLocked = No
621,786 UART: [state] WD Timer not started. Device not locked for debugging
625,875 UART: [kat] SHA2-256
807,805 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,333 UART: [kat] ++
819,849 UART: [kat] sha1
831,445 UART: [kat] SHA2-256
834,488 UART: [kat] SHA2-384
841,117 UART: [kat] SHA2-512-ACC
843,692 UART: [kat] ECC-384
4,097,854 UART: [kat] HMAC-384Kdf
4,110,396 UART: [kat] LMS
5,183,540 UART: [kat] --
5,188,690 UART: [cold-reset] ++
5,190,907 UART: [fht] FHT @ 0x50003400
5,203,438 UART: [idev] ++
5,204,106 UART: [idev] CDI.KEYID = 6
5,205,353 UART: [idev] SUBJECT.KEYID = 7
5,206,740 UART: [idev] UDS.KEYID = 0
5,207,923 ready_for_fw is high
5,208,123 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,342,032 UART: [idev] Erasing UDS.KEYID = 0
8,498,811 UART: [idev] Sha1 KeyId Algorithm
8,521,221 UART: [idev] --
8,526,271 UART: [ldev] ++
8,526,840 UART: [ldev] CDI.KEYID = 6
8,527,997 UART: [ldev] SUBJECT.KEYID = 5
8,529,521 UART: [ldev] AUTHORITY.KEYID = 7
8,530,989 UART: [ldev] FE.KEYID = 1
8,542,269 UART: [ldev] Erasing FE.KEYID = 1
11,831,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,270 UART: [ldev] --
14,195,919 UART: [fwproc] Wait for Commands...
14,197,531 UART: [fwproc] Recv command 0x46574c44
14,199,832 UART: [fwproc] Recv'd Img size: 106620 bytes
18,177,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,250,288 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,292,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,610,227 >>> mbox cmd response: success
18,611,211 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,613,755 UART: [afmc] ++
18,614,354 UART: [afmc] CDI.KEYID = 6
18,615,536 UART: [afmc] SUBJECT.KEYID = 7
18,616,688 UART: [afmc] AUTHORITY.KEYID = 5
21,932,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,230,105 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,246,088 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,262,181 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,278,317 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,797 UART: [afmc] --
24,303,570 UART: [cold-reset] --
24,307,588 UART: [state] Locking Datavault
24,312,450 UART: [state] Locking PCR0, PCR1 and PCR31
24,314,087 UART: [state] Locking ICCM
24,316,722 UART: [exit] Launching FMC @ 0x40000000
24,325,333 UART:
24,325,561 UART: Running Caliptra FMC ...
24,326,654 UART:
24,326,808 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,328,445 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
5,102,710 ready_for_fw is high
5,103,268 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,418,131 >>> mbox cmd response: success
18,419,146 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
24,063,503 UART:
24,063,908 UART: Running Caliptra FMC ...
24,065,271 UART:
24,065,443 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,067,158 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,978 UART:
192,357 UART: Running Caliptra ROM ...
193,560 UART:
193,718 UART: [state] CFI Enabled
260,612 UART: [state] LifecycleState = Unprovisioned
262,463 UART: [state] DebugLocked = No
263,939 UART: [state] WD Timer not started. Device not locked for debugging
268,390 UART: [kat] SHA2-256
447,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,105 UART: [kat] ++
459,644 UART: [kat] sha1
470,312 UART: [kat] SHA2-256
473,330 UART: [kat] SHA2-384
480,121 UART: [kat] SHA2-512-ACC
483,062 UART: [kat] ECC-384
2,947,993 UART: [kat] HMAC-384Kdf
2,969,561 UART: [kat] LMS
3,499,000 UART: [kat] --
3,501,301 UART: [cold-reset] ++
3,503,518 UART: [fht] FHT @ 0x50003400
3,515,440 UART: [idev] ++
3,516,012 UART: [idev] CDI.KEYID = 6
3,516,897 UART: [idev] SUBJECT.KEYID = 7
3,518,072 UART: [idev] UDS.KEYID = 0
3,519,019 ready_for_fw is high
3,519,206 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,653,798 UART: [idev] Erasing UDS.KEYID = 0
6,026,269 UART: [idev] Sha1 KeyId Algorithm
6,048,432 UART: [idev] --
6,052,995 UART: [ldev] ++
6,053,576 UART: [ldev] CDI.KEYID = 6
6,054,489 UART: [ldev] SUBJECT.KEYID = 5
6,055,706 UART: [ldev] AUTHORITY.KEYID = 7
6,056,938 UART: [ldev] FE.KEYID = 1
6,096,971 UART: [ldev] Erasing FE.KEYID = 1
8,599,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,371 UART: [ldev] --
10,401,148 UART: [fwproc] Wait for Commands...
10,403,294 UART: [fwproc] Recv command 0x46574c44
10,405,332 UART: [fwproc] Recv'd Img size: 106964 bytes
13,716,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,791,385 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,833,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,153,153 >>> mbox cmd response: success
14,154,017 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,156,589 UART: [afmc] ++
14,157,185 UART: [afmc] CDI.KEYID = 6
14,158,094 UART: [afmc] SUBJECT.KEYID = 7
14,159,256 UART: [afmc] AUTHORITY.KEYID = 5
16,687,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,411,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,412,906 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,428,917 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,444,794 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,460,762 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,483,567 UART: [afmc] --
18,487,330 UART: [cold-reset] --
18,491,210 UART: [state] Locking Datavault
18,495,918 UART: [state] Locking PCR0, PCR1 and PCR31
18,497,617 UART: [state] Locking ICCM
18,499,153 UART: [exit] Launching FMC @ 0x40000000
18,507,490 UART:
18,507,743 UART: Running Caliptra FMC ...
18,508,846 UART:
18,509,008 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,510,662 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,382,627 ready_for_fw is high
3,383,021 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,954,823 >>> mbox cmd response: success
13,955,724 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,232,469 UART:
18,232,861 UART: Running Caliptra FMC ...
18,234,007 UART:
18,234,166 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,235,853 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,424 UART:
192,834 UART: Running Caliptra ROM ...
193,947 UART:
603,470 UART: [state] CFI Enabled
617,206 UART: [state] LifecycleState = Unprovisioned
619,016 UART: [state] DebugLocked = No
621,681 UART: [state] WD Timer not started. Device not locked for debugging
625,146 UART: [kat] SHA2-256
804,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,798 UART: [kat] ++
816,247 UART: [kat] sha1
826,924 UART: [kat] SHA2-256
829,933 UART: [kat] SHA2-384
835,696 UART: [kat] SHA2-512-ACC
838,639 UART: [kat] ECC-384
3,281,882 UART: [kat] HMAC-384Kdf
3,294,821 UART: [kat] LMS
3,824,360 UART: [kat] --
3,829,202 UART: [cold-reset] ++
3,831,624 UART: [fht] FHT @ 0x50003400
3,842,592 UART: [idev] ++
3,843,151 UART: [idev] CDI.KEYID = 6
3,844,136 UART: [idev] SUBJECT.KEYID = 7
3,845,313 UART: [idev] UDS.KEYID = 0
3,846,235 ready_for_fw is high
3,846,446 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,980,926 UART: [idev] Erasing UDS.KEYID = 0
6,318,331 UART: [idev] Sha1 KeyId Algorithm
6,342,328 UART: [idev] --
6,347,077 UART: [ldev] ++
6,347,649 UART: [ldev] CDI.KEYID = 6
6,348,535 UART: [ldev] SUBJECT.KEYID = 5
6,349,745 UART: [ldev] AUTHORITY.KEYID = 7
6,351,055 UART: [ldev] FE.KEYID = 1
6,361,846 UART: [ldev] Erasing FE.KEYID = 1
8,835,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,773 UART: [ldev] --
10,626,080 UART: [fwproc] Wait for Commands...
10,628,877 UART: [fwproc] Recv command 0x46574c44
10,630,985 UART: [fwproc] Recv'd Img size: 106964 bytes
13,944,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,021,084 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,063,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,381,615 >>> mbox cmd response: success
14,382,600 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,386,264 UART: [afmc] ++
14,386,869 UART: [afmc] CDI.KEYID = 6
14,387,781 UART: [afmc] SUBJECT.KEYID = 7
14,388,944 UART: [afmc] AUTHORITY.KEYID = 5
16,887,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,992 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,628,014 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,643,931 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,659,894 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,681,733 UART: [afmc] --
18,685,768 UART: [cold-reset] --
18,691,458 UART: [state] Locking Datavault
18,696,703 UART: [state] Locking PCR0, PCR1 and PCR31
18,698,339 UART: [state] Locking ICCM
18,699,892 UART: [exit] Launching FMC @ 0x40000000
18,708,231 UART:
18,708,462 UART: Running Caliptra FMC ...
18,709,559 UART:
18,709,715 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,711,368 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,692,310 ready_for_fw is high
3,692,954 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,138,609 >>> mbox cmd response: success
14,139,609 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,392,703 UART:
18,393,098 UART: Running Caliptra FMC ...
18,394,331 UART:
18,394,519 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,396,216 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,095 UART:
192,503 UART: Running Caliptra ROM ...
193,604 UART:
193,755 UART: [state] CFI Enabled
263,858 UART: [state] LifecycleState = Unprovisioned
265,767 UART: [state] DebugLocked = No
267,355 UART: [state] WD Timer not started. Device not locked for debugging
271,881 UART: [kat] SHA2-256
451,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,571 UART: [kat] ++
463,019 UART: [kat] sha1
474,884 UART: [kat] SHA2-256
477,892 UART: [kat] SHA2-384
483,529 UART: [kat] SHA2-512-ACC
486,486 UART: [kat] ECC-384
2,947,705 UART: [kat] HMAC-384Kdf
2,971,685 UART: [kat] LMS
3,501,181 UART: [kat] --
3,504,699 UART: [cold-reset] ++
3,506,918 UART: [fht] FHT @ 0x50003400
3,518,465 UART: [idev] ++
3,519,039 UART: [idev] CDI.KEYID = 6
3,519,950 UART: [idev] SUBJECT.KEYID = 7
3,521,123 UART: [idev] UDS.KEYID = 0
3,522,176 ready_for_fw is high
3,522,367 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,656,976 UART: [idev] Erasing UDS.KEYID = 0
6,027,227 UART: [idev] Sha1 KeyId Algorithm
6,050,059 UART: [idev] --
6,053,631 UART: [ldev] ++
6,054,222 UART: [ldev] CDI.KEYID = 6
6,055,107 UART: [ldev] SUBJECT.KEYID = 5
6,056,322 UART: [ldev] AUTHORITY.KEYID = 7
6,057,552 UART: [ldev] FE.KEYID = 1
6,100,026 UART: [ldev] Erasing FE.KEYID = 1
8,604,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,136 UART: [ldev] --
10,413,699 UART: [fwproc] Wait for Commands...
10,415,455 UART: [fwproc] Recv command 0x46574c44
10,417,555 UART: [fwproc] Recv'd Img size: 106964 bytes
13,736,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,807,759 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,850,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,168,472 >>> mbox cmd response: success
14,169,443 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,172,195 UART: [afmc] ++
14,172,817 UART: [afmc] CDI.KEYID = 6
14,173,739 UART: [afmc] SUBJECT.KEYID = 7
14,174,902 UART: [afmc] AUTHORITY.KEYID = 5
16,703,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,832 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,815 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,729 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,696 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,337 UART: [afmc] --
18,499,915 UART: [cold-reset] --
18,503,834 UART: [state] Locking Datavault
18,510,513 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,221 UART: [state] Locking ICCM
18,513,883 UART: [exit] Launching FMC @ 0x40000000
18,522,280 UART:
18,522,515 UART: Running Caliptra FMC ...
18,523,614 UART:
18,523,771 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,525,334 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,359,976 ready_for_fw is high
3,360,575 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,896,430 >>> mbox cmd response: success
13,897,438 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,175,414 UART:
18,175,803 UART: Running Caliptra FMC ...
18,176,965 UART:
18,177,167 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,178,910 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,590 UART:
192,948 UART: Running Caliptra ROM ...
194,136 UART:
603,727 UART: [state] CFI Enabled
614,357 UART: [state] LifecycleState = Unprovisioned
616,055 UART: [state] DebugLocked = No
618,652 UART: [state] WD Timer not started. Device not locked for debugging
621,902 UART: [kat] SHA2-256
801,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,591 UART: [kat] ++
813,041 UART: [kat] sha1
822,925 UART: [kat] SHA2-256
825,932 UART: [kat] SHA2-384
831,704 UART: [kat] SHA2-512-ACC
834,631 UART: [kat] ECC-384
3,276,089 UART: [kat] HMAC-384Kdf
3,288,765 UART: [kat] LMS
3,818,277 UART: [kat] --
3,823,259 UART: [cold-reset] ++
3,825,334 UART: [fht] FHT @ 0x50003400
3,835,322 UART: [idev] ++
3,835,880 UART: [idev] CDI.KEYID = 6
3,836,762 UART: [idev] SUBJECT.KEYID = 7
3,838,003 UART: [idev] UDS.KEYID = 0
3,838,933 ready_for_fw is high
3,839,115 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,973,332 UART: [idev] Erasing UDS.KEYID = 0
6,309,471 UART: [idev] Sha1 KeyId Algorithm
6,333,993 UART: [idev] --
6,338,631 UART: [ldev] ++
6,339,201 UART: [ldev] CDI.KEYID = 6
6,340,111 UART: [ldev] SUBJECT.KEYID = 5
6,341,289 UART: [ldev] AUTHORITY.KEYID = 7
6,342,517 UART: [ldev] FE.KEYID = 1
6,355,157 UART: [ldev] Erasing FE.KEYID = 1
8,828,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,927 UART: [ldev] --
10,619,763 UART: [fwproc] Wait for Commands...
10,621,703 UART: [fwproc] Recv command 0x46574c44
10,623,797 UART: [fwproc] Recv'd Img size: 106964 bytes
13,935,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,126 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,048,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,366,313 >>> mbox cmd response: success
14,367,276 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,370,564 UART: [afmc] ++
14,371,177 UART: [afmc] CDI.KEYID = 6
14,372,089 UART: [afmc] SUBJECT.KEYID = 7
14,373,251 UART: [afmc] AUTHORITY.KEYID = 5
16,875,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,334 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,617,331 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,633,251 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,649,161 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,499 UART: [afmc] --
18,676,955 UART: [cold-reset] --
18,681,344 UART: [state] Locking Datavault
18,687,607 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,244 UART: [state] Locking ICCM
18,691,981 UART: [exit] Launching FMC @ 0x40000000
18,700,351 UART:
18,700,598 UART: Running Caliptra FMC ...
18,701,692 UART:
18,701,846 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,703,510 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,701,881 ready_for_fw is high
3,702,287 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,161,945 >>> mbox cmd response: success
14,163,120 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,411,377 UART:
18,411,761 UART: Running Caliptra FMC ...
18,412,928 UART:
18,413,082 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,414,775 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,174,087 ready_for_fw is high
1,174,087 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,170 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,159 >>> mbox cmd response: success
2,676,159 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,188 UART: [afmc] ++
2,677,356 UART: [afmc] CDI.KEYID = 6
2,677,719 UART: [afmc] SUBJECT.KEYID = 7
2,678,145 UART: [afmc] AUTHORITY.KEYID = 5
2,713,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,094 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,814 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,707 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,400 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,197 UART: [afmc] --
2,757,207 UART: [cold-reset] --
2,758,303 UART: [state] Locking Datavault
2,759,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,106 UART: [state] Locking ICCM
2,760,582 UART: [exit] Launching FMC @ 0x40000000
2,765,879 UART:
2,765,895 UART: Running Caliptra FMC ...
2,766,303 UART:
2,766,441 UART: [fmc] Received command: 0x10000008
2,767,473 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,456 ready_for_fw is high
1,056,456 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,927 >>> mbox cmd response: success
2,525,927 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,108 UART:
2,588,124 UART: Running Caliptra FMC ...
2,588,532 UART:
2,588,670 UART: [fmc] Received command: 0x10000008
2,589,702 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,263 UART: [kat] LMS
1,169,575 UART: [kat] --
1,170,384 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,174,656 ready_for_fw is high
1,174,656 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,578 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,111 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,991 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,996 >>> mbox cmd response: success
2,676,996 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,678,203 UART: [afmc] ++
2,678,371 UART: [afmc] CDI.KEYID = 6
2,678,734 UART: [afmc] SUBJECT.KEYID = 7
2,679,160 UART: [afmc] AUTHORITY.KEYID = 5
2,714,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,169 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,889 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,782 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,475 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,122 UART: [afmc] --
2,758,046 UART: [cold-reset] --
2,758,684 UART: [state] Locking Datavault
2,759,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,493 UART: [state] Locking ICCM
2,761,017 UART: [exit] Launching FMC @ 0x40000000
2,766,314 UART:
2,766,330 UART: Running Caliptra FMC ...
2,766,738 UART:
2,766,876 UART: [fmc] Received command: 0x10000008
2,767,908 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,625 ready_for_fw is high
1,056,625 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,202 >>> mbox cmd response: success
2,528,202 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,591,001 UART:
2,591,017 UART: Running Caliptra FMC ...
2,591,425 UART:
2,591,563 UART: [fmc] Received command: 0x10000008
2,592,595 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,661 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,174,167 ready_for_fw is high
1,174,167 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,207,003 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,420 UART: [ldev] --
1,279,870 UART: [fwproc] Wait for Commands...
1,280,473 UART: [fwproc] Recv command 0x46574c44
1,281,206 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,510 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,667 >>> mbox cmd response: success
2,674,667 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,675,934 UART: [afmc] ++
2,676,102 UART: [afmc] CDI.KEYID = 6
2,676,465 UART: [afmc] SUBJECT.KEYID = 7
2,676,891 UART: [afmc] AUTHORITY.KEYID = 5
2,712,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,022 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,742 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,635 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,328 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,233 UART: [afmc] --
2,755,327 UART: [cold-reset] --
2,756,235 UART: [state] Locking Datavault
2,757,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,076 UART: [state] Locking ICCM
2,758,740 UART: [exit] Launching FMC @ 0x40000000
2,764,037 UART:
2,764,053 UART: Running Caliptra FMC ...
2,764,461 UART:
2,764,599 UART: [fmc] Received command: 0x10000008
2,765,631 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,750 ready_for_fw is high
1,055,750 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,229 >>> mbox cmd response: success
2,526,229 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,360 UART:
2,588,376 UART: Running Caliptra FMC ...
2,588,784 UART:
2,588,922 UART: [fmc] Received command: 0x10000008
2,589,954 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,677 UART: [kat] LMS
1,169,989 UART: [kat] --
1,170,832 UART: [cold-reset] ++
1,171,210 UART: [fht] FHT @ 0x50003400
1,174,036 UART: [idev] ++
1,174,204 UART: [idev] CDI.KEYID = 6
1,174,565 UART: [idev] SUBJECT.KEYID = 7
1,174,990 UART: [idev] UDS.KEYID = 0
1,175,336 ready_for_fw is high
1,175,336 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,374 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,288 UART: [ldev] AUTHORITY.KEYID = 7
1,211,751 UART: [ldev] FE.KEYID = 1
1,217,127 UART: [ldev] Erasing FE.KEYID = 1
1,243,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46574c44
1,284,349 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,339 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,434 >>> mbox cmd response: success
2,676,434 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,569 UART: [afmc] ++
2,677,737 UART: [afmc] CDI.KEYID = 6
2,678,100 UART: [afmc] SUBJECT.KEYID = 7
2,678,526 UART: [afmc] AUTHORITY.KEYID = 5
2,715,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,411 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,131 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,024 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,717 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,584 UART: [afmc] --
2,758,686 UART: [cold-reset] --
2,759,452 UART: [state] Locking Datavault
2,760,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,297 UART: [state] Locking ICCM
2,761,735 UART: [exit] Launching FMC @ 0x40000000
2,767,032 UART:
2,767,048 UART: Running Caliptra FMC ...
2,767,456 UART:
2,767,594 UART: [fmc] Received command: 0x10000008
2,768,626 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 ready_for_fw is high
1,056,295 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,250 >>> mbox cmd response: success
2,527,250 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,589,691 UART:
2,589,707 UART: Running Caliptra FMC ...
2,590,115 UART:
2,590,253 UART: [fmc] Received command: 0x10000008
2,591,285 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,169,979 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 ready_for_fw is high
1,174,517 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,655 UART: [fwproc] Recv command 0x46574c44
1,282,388 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,160 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,329 >>> mbox cmd response: success
2,675,329 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,538 UART: [afmc] ++
2,676,706 UART: [afmc] CDI.KEYID = 6
2,677,069 UART: [afmc] SUBJECT.KEYID = 7
2,677,495 UART: [afmc] AUTHORITY.KEYID = 5
2,713,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,136 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,856 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,749 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,442 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,541 UART: [afmc] --
2,756,483 UART: [cold-reset] --
2,757,549 UART: [state] Locking Datavault
2,758,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,346 UART: [state] Locking ICCM
2,759,872 UART: [exit] Launching FMC @ 0x40000000
2,765,169 UART:
2,765,185 UART: Running Caliptra FMC ...
2,765,593 UART:
2,765,731 UART: [fmc] Received command: 0x10000008
2,766,763 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,684 ready_for_fw is high
1,056,684 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,863 >>> mbox cmd response: success
2,526,863 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,589,624 UART:
2,589,640 UART: Running Caliptra FMC ...
2,590,048 UART:
2,590,186 UART: [fmc] Received command: 0x10000008
2,591,218 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 ready_for_fw is high
1,174,682 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,363 UART: [ldev] ++
1,209,531 UART: [ldev] CDI.KEYID = 6
1,209,895 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,253 UART: [ldev] --
1,280,737 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,149 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,603 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,646 >>> mbox cmd response: success
2,676,646 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,887 UART: [afmc] ++
2,678,055 UART: [afmc] CDI.KEYID = 6
2,678,418 UART: [afmc] SUBJECT.KEYID = 7
2,678,844 UART: [afmc] AUTHORITY.KEYID = 5
2,715,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,233 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,953 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,846 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,539 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,324 UART: [afmc] --
2,758,416 UART: [cold-reset] --
2,759,352 UART: [state] Locking Datavault
2,760,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,871 UART: [state] Locking ICCM
2,761,407 UART: [exit] Launching FMC @ 0x40000000
2,766,704 UART:
2,766,720 UART: Running Caliptra FMC ...
2,767,128 UART:
2,767,266 UART: [fmc] Received command: 0x10000008
2,768,298 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 ready_for_fw is high
1,056,133 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,630 >>> mbox cmd response: success
2,525,630 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,197 UART:
2,587,213 UART: Running Caliptra FMC ...
2,587,621 UART:
2,587,759 UART: [fmc] Received command: 0x10000008
2,588,791 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,310 UART:
192,783 UART: Running Caliptra ROM ...
193,897 UART:
194,040 UART: [state] CFI Enabled
263,302 UART: [state] LifecycleState = Unprovisioned
265,688 UART: [state] DebugLocked = No
268,141 UART: [state] WD Timer not started. Device not locked for debugging
273,089 UART: [kat] SHA2-256
455,054 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,241 UART: ROM integrity test failed
467,638 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,388 UART:
192,741 UART: Running Caliptra ROM ...
193,930 UART:
603,662 UART: [state] CFI Enabled
618,290 UART: [state] LifecycleState = Unprovisioned
620,529 UART: [state] DebugLocked = No
622,200 UART: [state] WD Timer not started. Device not locked for debugging
627,636 UART: [kat] SHA2-256
809,590 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,834 UART: ROM integrity test failed
822,138 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 41856
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,097 UART:
192,612 UART: Running Caliptra ROM ...
193,748 UART:
193,900 UART: [state] CFI Enabled
266,397 UART: [state] LifecycleState = Unprovisioned
268,290 UART: [state] DebugLocked = No
271,109 UART: [state] WD Timer not started. Device not locked for debugging
273,989 UART: [kat] SHA2-256
453,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,144 UART: ROM integrity test failed
465,383 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,424 UART:
192,805 UART: Running Caliptra ROM ...
193,996 UART:
603,687 UART: [state] CFI Enabled
615,505 UART: [state] LifecycleState = Unprovisioned
617,352 UART: [state] DebugLocked = No
620,089 UART: [state] WD Timer not started. Device not locked for debugging
624,318 UART: [kat] SHA2-256
803,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,521 UART: ROM integrity test failed
815,737 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,034 UART:
192,443 UART: Running Caliptra ROM ...
193,640 UART:
193,792 UART: [state] CFI Enabled
266,550 UART: [state] LifecycleState = Unprovisioned
268,425 UART: [state] DebugLocked = No
269,739 UART: [state] WD Timer not started. Device not locked for debugging
274,316 UART: [kat] SHA2-256
453,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,443 UART: ROM integrity test failed
465,678 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,419 UART:
192,806 UART: Running Caliptra ROM ...
193,989 UART:
603,407 UART: [state] CFI Enabled
619,633 UART: [state] LifecycleState = Unprovisioned
621,487 UART: [state] DebugLocked = No
623,011 UART: [state] WD Timer not started. Device not locked for debugging
627,307 UART: [kat] SHA2-256
806,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,463 UART: ROM integrity test failed
818,686 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: ROM integrity test failed
895,812 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.24s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: ROM integrity test failed
895,659 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.20s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,881 UART: ROM integrity test failed
895,328 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: ROM integrity test failed
895,777 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: ROM integrity test failed
895,632 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: ROM integrity test failed
895,659 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,137 UART:
192,501 UART: Running Caliptra ROM ...
193,681 UART:
193,834 UART: [state] CFI Enabled
265,172 UART: [state] LifecycleState = Unprovisioned
267,575 UART: [state] DebugLocked = No
270,451 UART: [state] WD Timer not started. Device not locked for debugging
275,349 UART: [kat] SHA2-256
457,265 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,768 UART: [kat] ++
469,369 UART: [kat] sha1
479,141 UART: [kat] SHA2-256
482,141 UART: [kat] SHA2-384
488,272 UART: [kat] SHA2-512-ACC
490,856 UART: [kat] ECC-384
3,775,033 UART: [kat] HMAC-384Kdf
3,802,046 UART: [kat] LMS
4,875,158 UART: [kat] --
4,878,946 UART: [cold-reset] ++
4,881,377 UART: [fht] FHT @ 0x50003400
4,893,699 UART: [idev] ++
4,894,410 UART: [idev] CDI.KEYID = 6
4,895,580 UART: [idev] SUBJECT.KEYID = 7
4,896,754 UART: [idev] UDS.KEYID = 0
4,897,681 ready_for_fw is high
4,897,868 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,038,765 UART: [idev] Erasing UDS.KEYID = 0
8,246,521 UART: [idev] Sha1 KeyId Algorithm
8,267,756 UART: [idev] --
8,271,804 UART: [ldev] ++
8,272,372 UART: [ldev] CDI.KEYID = 6
8,273,604 UART: [ldev] SUBJECT.KEYID = 5
8,274,718 UART: [ldev] AUTHORITY.KEYID = 7
8,276,006 UART: [ldev] FE.KEYID = 1
8,319,853 UART: [ldev] Erasing FE.KEYID = 1
11,653,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,946,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,963,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,995,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,015,143 UART: [ldev] --
14,019,230 UART: [fwproc] Wait for Commands...
14,021,268 UART: [fwproc] Recv command 0x46574c44
14,023,600 UART: [fwproc] Recv'd Img size: 111688 bytes
18,063,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,133,413 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,193,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,510,647 >>> mbox cmd response: success
18,514,018 UART: [afmc] ++
18,514,632 UART: [afmc] CDI.KEYID = 6
18,515,819 UART: [afmc] SUBJECT.KEYID = 7
18,516,921 UART: [afmc] AUTHORITY.KEYID = 5
21,886,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,185,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,187,586 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,203,764 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,219,871 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,235,712 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,257,741 UART: [afmc] --
24,262,740 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,403,579 UART: [cold-reset] --
24,404,450 UART: [state] Locking Datavault
24,405,529 UART: [state] Locking PCR0, PCR1 and PCR31
24,407,068 UART: [state] Locking ICCM
24,407,982 UART: [exit] Launching FMC @ 0x40000000
24,409,402 UART:
24,409,556 UART: Running Caliptra FMC ...
24,410,649 UART:
24,410,802 UART: [fmc] Received command: 0x46574C44
24,412,173 UART:
24,412,315 UART: Running Caliptra ROM ...
24,413,407 UART:
24,413,560 UART: [state] CFI Enabled
24,481,952 UART: [state] LifecycleState = Unprovisioned
24,483,828 UART: [state] DebugLocked = No
24,486,470 UART: [state] WD Timer not started. Device not locked for debugging
24,490,262 UART: [kat] SHA2-256
24,672,198 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,683,714 UART: [kat] ++
24,684,386 UART: [kat] sha1
24,695,661 UART: [kat] SHA2-256
24,698,683 UART: [kat] SHA2-384
24,704,720 UART: [kat] SHA2-512-ACC
24,707,341 UART: [kat] ECC-384
27,988,719 UART: [kat] HMAC-384Kdf
28,016,890 UART: [kat] LMS
29,090,040 UART: [kat] --
29,094,851 UART: [update-reset] ++
33,171,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,173,722 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,547,328 >>> mbox cmd response: success
33,549,084 UART: [update-reset] Copying MAN_2 To MAN_1
33,571,958 UART: [update-reset Success] --
33,573,639 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,578,675 UART: [state] Locking Datavault
33,582,589 UART: [state] Locking PCR0, PCR1 and PCR31
33,584,290 UART: [state] Locking ICCM
33,586,061 UART: [exit] Launching FMC @ 0x40000000
33,594,727 UART:
33,594,961 UART: Running Caliptra FMC ...
33,596,060 UART:
33,596,218 UART: [fmc] Received command: 0x1000000D
33,597,729 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
4,781,321 ready_for_fw is high
4,781,691 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,289,558 >>> mbox cmd response: success
23,973,930 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,114,826 UART:
24,115,214 UART: Running Caliptra FMC ...
24,116,341 UART:
24,116,494 UART: [fmc] Received command: 0x46574C44
33,128,221 >>> mbox cmd response: success
33,150,514 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,163,646 UART:
33,163,921 UART: Running Caliptra FMC ...
33,165,089 UART:
33,165,273 UART: [fmc] Received command: 0x1000000D
33,166,796 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,374 UART:
192,745 UART: Running Caliptra ROM ...
193,885 UART:
603,513 UART: [state] CFI Enabled
617,890 UART: [state] LifecycleState = Unprovisioned
620,194 UART: [state] DebugLocked = No
621,720 UART: [state] WD Timer not started. Device not locked for debugging
625,759 UART: [kat] SHA2-256
807,768 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,328 UART: [kat] ++
819,781 UART: [kat] sha1
830,715 UART: [kat] SHA2-256
833,718 UART: [kat] SHA2-384
839,061 UART: [kat] SHA2-512-ACC
841,710 UART: [kat] ECC-384
4,097,165 UART: [kat] HMAC-384Kdf
4,109,608 UART: [kat] LMS
5,182,728 UART: [kat] --
5,186,226 UART: [cold-reset] ++
5,188,446 UART: [fht] FHT @ 0x50003400
5,201,499 UART: [idev] ++
5,202,210 UART: [idev] CDI.KEYID = 6
5,203,383 UART: [idev] SUBJECT.KEYID = 7
5,204,838 UART: [idev] UDS.KEYID = 0
5,206,094 ready_for_fw is high
5,206,291 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,346,582 UART: [idev] Erasing UDS.KEYID = 0
8,495,041 UART: [idev] Sha1 KeyId Algorithm
8,516,869 UART: [idev] --
8,520,644 UART: [ldev] ++
8,521,212 UART: [ldev] CDI.KEYID = 6
8,522,440 UART: [ldev] SUBJECT.KEYID = 5
8,523,868 UART: [ldev] AUTHORITY.KEYID = 7
8,525,417 UART: [ldev] FE.KEYID = 1
8,536,109 UART: [ldev] Erasing FE.KEYID = 1
11,827,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,323 UART: [ldev] --
14,191,736 UART: [fwproc] Wait for Commands...
14,193,559 UART: [fwproc] Recv command 0x46574c44
14,195,862 UART: [fwproc] Recv'd Img size: 111688 bytes
18,242,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,321,682 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,381,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,698,702 >>> mbox cmd response: success
18,703,404 UART: [afmc] ++
18,704,027 UART: [afmc] CDI.KEYID = 6
18,705,169 UART: [afmc] SUBJECT.KEYID = 7
18,706,326 UART: [afmc] AUTHORITY.KEYID = 5
22,022,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,319,990 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,336,193 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,352,283 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,368,146 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,390,621 UART: [afmc] --
24,395,349 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,536,087 UART: [cold-reset] --
24,536,952 UART: [state] Locking Datavault
24,538,024 UART: [state] Locking PCR0, PCR1 and PCR31
24,539,557 UART: [state] Locking ICCM
24,540,431 UART: [exit] Launching FMC @ 0x40000000
24,541,765 UART:
24,541,903 UART: Running Caliptra FMC ...
24,542,991 UART:
24,543,162 UART: [fmc] Received command: 0x46574C44
24,544,613 UART:
24,544,760 UART: Running Caliptra ROM ...
24,545,851 UART:
24,545,999 UART: [state] CFI Enabled
24,551,985 UART: [state] LifecycleState = Unprovisioned
24,553,869 UART: [state] DebugLocked = No
24,555,779 UART: [state] WD Timer not started. Device not locked for debugging
24,559,848 UART: [kat] SHA2-256
24,741,795 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,753,351 UART: [kat] ++
24,753,886 UART: [kat] sha1
24,763,207 UART: [kat] SHA2-256
24,766,221 UART: [kat] SHA2-384
24,771,495 UART: [kat] SHA2-512-ACC
24,774,110 UART: [kat] ECC-384
28,028,190 UART: [kat] HMAC-384Kdf
28,039,563 UART: [kat] LMS
29,112,691 UART: [kat] --
29,116,089 UART: [update-reset] ++
33,181,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,184,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,558,173 >>> mbox cmd response: success
33,559,958 UART: [update-reset] Copying MAN_2 To MAN_1
33,582,833 UART: [update-reset Success] --
33,584,475 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,586,475 UART: [state] Locking Datavault
33,590,214 UART: [state] Locking PCR0, PCR1 and PCR31
33,591,908 UART: [state] Locking ICCM
33,593,325 UART: [exit] Launching FMC @ 0x40000000
33,601,933 UART:
33,602,156 UART: Running Caliptra FMC ...
33,603,192 UART:
33,603,334 UART: [fmc] Received command: 0x1000000D
33,604,892 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
5,099,786 ready_for_fw is high
5,100,406 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,495,436 >>> mbox cmd response: success
24,124,066 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,264,877 UART:
24,265,272 UART: Running Caliptra FMC ...
24,266,478 UART:
24,266,663 UART: [fmc] Received command: 0x46574C44
33,177,027 >>> mbox cmd response: success
33,198,494 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,209,662 UART:
33,209,923 UART: Running Caliptra FMC ...
33,211,099 UART:
33,211,265 UART: [fmc] Received command: 0x1000000D
33,212,802 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,179 UART:
192,559 UART: Running Caliptra ROM ...
193,745 UART:
193,904 UART: [state] CFI Enabled
267,914 UART: [state] LifecycleState = Unprovisioned
269,752 UART: [state] DebugLocked = No
272,002 UART: [state] WD Timer not started. Device not locked for debugging
276,548 UART: [kat] SHA2-256
455,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,239 UART: [kat] ++
467,784 UART: [kat] sha1
477,815 UART: [kat] SHA2-256
480,889 UART: [kat] SHA2-384
486,517 UART: [kat] SHA2-512-ACC
489,457 UART: [kat] ECC-384
2,949,226 UART: [kat] HMAC-384Kdf
2,971,972 UART: [kat] LMS
3,501,446 UART: [kat] --
3,506,796 UART: [cold-reset] ++
3,508,735 UART: [fht] FHT @ 0x50003400
3,519,931 UART: [idev] ++
3,520,495 UART: [idev] CDI.KEYID = 6
3,521,404 UART: [idev] SUBJECT.KEYID = 7
3,522,578 UART: [idev] UDS.KEYID = 0
3,523,630 ready_for_fw is high
3,523,831 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,664,735 UART: [idev] Erasing UDS.KEYID = 0
6,026,136 UART: [idev] Sha1 KeyId Algorithm
6,048,193 UART: [idev] --
6,051,705 UART: [ldev] ++
6,052,277 UART: [ldev] CDI.KEYID = 6
6,053,211 UART: [ldev] SUBJECT.KEYID = 5
6,054,376 UART: [ldev] AUTHORITY.KEYID = 7
6,055,663 UART: [ldev] FE.KEYID = 1
6,101,521 UART: [ldev] Erasing FE.KEYID = 1
8,602,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,604 UART: [ldev] --
10,394,546 UART: [fwproc] Wait for Commands...
10,396,804 UART: [fwproc] Recv command 0x46574c44
10,398,899 UART: [fwproc] Recv'd Img size: 112032 bytes
13,774,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,847,599 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,907,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,225,944 >>> mbox cmd response: success
14,230,004 UART: [afmc] ++
14,230,628 UART: [afmc] CDI.KEYID = 6
14,231,546 UART: [afmc] SUBJECT.KEYID = 7
14,232,710 UART: [afmc] AUTHORITY.KEYID = 5
16,764,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,493,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,495,384 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,511,443 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,527,483 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,543,189 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,567,191 UART: [afmc] --
18,572,178 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,713,960 UART: [cold-reset] --
18,714,844 UART: [state] Locking Datavault
18,716,006 UART: [state] Locking PCR0, PCR1 and PCR31
18,717,572 UART: [state] Locking ICCM
18,718,478 UART: [exit] Launching FMC @ 0x40000000
18,719,904 UART:
18,720,059 UART: Running Caliptra FMC ...
18,721,163 UART:
18,721,318 UART: [fmc] Received command: 0x46574C44
18,722,776 UART:
18,722,929 UART: Running Caliptra ROM ...
18,724,025 UART:
18,724,181 UART: [state] CFI Enabled
18,778,866 UART: [state] LifecycleState = Unprovisioned
18,780,749 UART: [state] DebugLocked = No
18,783,542 UART: [state] WD Timer not started. Device not locked for debugging
18,788,040 UART: [kat] SHA2-256
18,967,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,978,743 UART: [kat] ++
18,979,241 UART: [kat] sha1
18,989,749 UART: [kat] SHA2-256
18,992,773 UART: [kat] SHA2-384
18,998,766 UART: [kat] SHA2-512-ACC
19,001,711 UART: [kat] ECC-384
21,469,039 UART: [kat] HMAC-384Kdf
21,490,179 UART: [kat] LMS
22,019,599 UART: [kat] --
22,024,400 UART: [update-reset] ++
25,428,010 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,431,614 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,806,438 >>> mbox cmd response: success
25,806,819 UART: [update-reset] Copying MAN_2 To MAN_1
25,829,095 UART: [update-reset Success] --
25,830,366 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,833,877 UART: [state] Locking Datavault
25,836,172 UART: [state] Locking PCR0, PCR1 and PCR31
25,837,819 UART: [state] Locking ICCM
25,840,563 UART: [exit] Launching FMC @ 0x40000000
25,848,963 UART:
25,849,201 UART: Running Caliptra FMC ...
25,850,306 UART:
25,850,461 UART: [fmc] Received command: 0x1000000D
25,851,977 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,382,188 ready_for_fw is high
3,382,578 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,015,841 >>> mbox cmd response: success
18,309,613 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,451,614 UART:
18,452,030 UART: Running Caliptra FMC ...
18,453,237 UART:
18,453,408 UART: [fmc] Received command: 0x46574C44
25,380,381 >>> mbox cmd response: success
25,401,826 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,412,154 UART:
25,412,421 UART: Running Caliptra FMC ...
25,413,665 UART:
25,413,832 UART: [fmc] Received command: 0x1000000D
25,415,351 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,323 UART:
192,720 UART: Running Caliptra ROM ...
193,906 UART:
603,257 UART: [state] CFI Enabled
621,333 UART: [state] LifecycleState = Unprovisioned
623,215 UART: [state] DebugLocked = No
624,880 UART: [state] WD Timer not started. Device not locked for debugging
629,067 UART: [kat] SHA2-256
808,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,819 UART: [kat] ++
820,351 UART: [kat] sha1
830,732 UART: [kat] SHA2-256
833,727 UART: [kat] SHA2-384
840,093 UART: [kat] SHA2-512-ACC
843,070 UART: [kat] ECC-384
3,288,088 UART: [kat] HMAC-384Kdf
3,300,473 UART: [kat] LMS
3,829,965 UART: [kat] --
3,834,316 UART: [cold-reset] ++
3,835,745 UART: [fht] FHT @ 0x50003400
3,848,285 UART: [idev] ++
3,848,839 UART: [idev] CDI.KEYID = 6
3,849,786 UART: [idev] SUBJECT.KEYID = 7
3,851,026 UART: [idev] UDS.KEYID = 0
3,851,923 ready_for_fw is high
3,852,117 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,992,877 UART: [idev] Erasing UDS.KEYID = 0
6,322,873 UART: [idev] Sha1 KeyId Algorithm
6,345,991 UART: [idev] --
6,349,982 UART: [ldev] ++
6,350,553 UART: [ldev] CDI.KEYID = 6
6,351,462 UART: [ldev] SUBJECT.KEYID = 5
6,352,670 UART: [ldev] AUTHORITY.KEYID = 7
6,353,915 UART: [ldev] FE.KEYID = 1
6,362,713 UART: [ldev] Erasing FE.KEYID = 1
8,834,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,449 UART: [ldev] --
10,623,010 UART: [fwproc] Wait for Commands...
10,625,856 UART: [fwproc] Recv command 0x46574c44
10,627,886 UART: [fwproc] Recv'd Img size: 112032 bytes
14,006,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,079,795 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,140,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,457,740 >>> mbox cmd response: success
14,461,796 UART: [afmc] ++
14,462,430 UART: [afmc] CDI.KEYID = 6
14,463,349 UART: [afmc] SUBJECT.KEYID = 7
14,464,508 UART: [afmc] AUTHORITY.KEYID = 5
16,964,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,682,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,684,008 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,700,045 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,716,071 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,731,768 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,754,359 UART: [afmc] --
18,758,685 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,899,746 UART: [cold-reset] --
18,900,608 UART: [state] Locking Datavault
18,901,763 UART: [state] Locking PCR0, PCR1 and PCR31
18,903,300 UART: [state] Locking ICCM
18,904,202 UART: [exit] Launching FMC @ 0x40000000
18,905,642 UART:
18,905,800 UART: Running Caliptra FMC ...
18,906,895 UART:
18,907,048 UART: [fmc] Received command: 0x46574C44
18,908,426 UART:
18,908,570 UART: Running Caliptra ROM ...
18,909,663 UART:
18,909,813 UART: [state] CFI Enabled
18,915,698 UART: [state] LifecycleState = Unprovisioned
18,917,881 UART: [state] DebugLocked = No
18,919,869 UART: [state] WD Timer not started. Device not locked for debugging
18,924,047 UART: [kat] SHA2-256
19,103,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,114,795 UART: [kat] ++
19,115,332 UART: [kat] sha1
19,126,815 UART: [kat] SHA2-256
19,129,849 UART: [kat] SHA2-384
19,134,751 UART: [kat] SHA2-512-ACC
19,137,687 UART: [kat] ECC-384
21,577,142 UART: [kat] HMAC-384Kdf
21,590,772 UART: [kat] LMS
22,120,276 UART: [kat] --
22,124,095 UART: [update-reset] ++
25,519,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,522,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,897,522 >>> mbox cmd response: success
25,897,913 UART: [update-reset] Copying MAN_2 To MAN_1
25,920,130 UART: [update-reset Success] --
25,921,450 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,925,457 UART: [state] Locking Datavault
25,928,919 UART: [state] Locking PCR0, PCR1 and PCR31
25,930,618 UART: [state] Locking ICCM
25,931,977 UART: [exit] Launching FMC @ 0x40000000
25,940,424 UART:
25,940,664 UART: Running Caliptra FMC ...
25,941,761 UART:
25,941,917 UART: [fmc] Received command: 0x1000000D
25,943,432 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,693,275 ready_for_fw is high
3,693,656 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,227,900 >>> mbox cmd response: success
18,464,382 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,605,838 UART:
18,606,247 UART: Running Caliptra FMC ...
18,607,444 UART:
18,607,612 UART: [fmc] Received command: 0x46574C44
25,474,396 >>> mbox cmd response: success
25,497,174 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,507,163 UART:
25,507,439 UART: Running Caliptra FMC ...
25,508,601 UART:
25,508,757 UART: [fmc] Received command: 0x1000000D
25,510,276 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,126 UART:
192,492 UART: Running Caliptra ROM ...
193,600 UART:
193,739 UART: [state] CFI Enabled
264,260 UART: [state] LifecycleState = Unprovisioned
266,195 UART: [state] DebugLocked = No
268,494 UART: [state] WD Timer not started. Device not locked for debugging
271,960 UART: [kat] SHA2-256
451,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,640 UART: [kat] ++
463,171 UART: [kat] sha1
474,333 UART: [kat] SHA2-256
477,337 UART: [kat] SHA2-384
483,500 UART: [kat] SHA2-512-ACC
486,412 UART: [kat] ECC-384
2,948,305 UART: [kat] HMAC-384Kdf
2,972,066 UART: [kat] LMS
3,501,529 UART: [kat] --
3,505,739 UART: [cold-reset] ++
3,507,955 UART: [fht] FHT @ 0x50003400
3,519,158 UART: [idev] ++
3,519,766 UART: [idev] CDI.KEYID = 6
3,520,687 UART: [idev] SUBJECT.KEYID = 7
3,521,869 UART: [idev] UDS.KEYID = 0
3,522,814 ready_for_fw is high
3,523,014 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,663,885 UART: [idev] Erasing UDS.KEYID = 0
6,029,154 UART: [idev] Sha1 KeyId Algorithm
6,052,985 UART: [idev] --
6,056,708 UART: [ldev] ++
6,057,276 UART: [ldev] CDI.KEYID = 6
6,058,186 UART: [ldev] SUBJECT.KEYID = 5
6,059,347 UART: [ldev] AUTHORITY.KEYID = 7
6,060,634 UART: [ldev] FE.KEYID = 1
6,100,545 UART: [ldev] Erasing FE.KEYID = 1
8,603,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,245 UART: [ldev] --
10,414,554 UART: [fwproc] Wait for Commands...
10,417,299 UART: [fwproc] Recv command 0x46574c44
10,419,393 UART: [fwproc] Recv'd Img size: 112032 bytes
13,792,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,513 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,923,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,242,884 >>> mbox cmd response: success
14,246,787 UART: [afmc] ++
14,247,398 UART: [afmc] CDI.KEYID = 6
14,248,309 UART: [afmc] SUBJECT.KEYID = 7
14,249,474 UART: [afmc] AUTHORITY.KEYID = 5
16,783,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,513,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,515,054 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,531,093 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,547,131 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,562,866 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,584,112 UART: [afmc] --
18,589,036 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,730,253 UART: [cold-reset] --
18,731,109 UART: [state] Locking Datavault
18,732,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,718 UART: [state] Locking ICCM
18,734,595 UART: [exit] Launching FMC @ 0x40000000
18,735,933 UART:
18,736,077 UART: Running Caliptra FMC ...
18,737,176 UART:
18,737,329 UART: [fmc] Received command: 0x46574C44
18,738,783 UART:
18,738,937 UART: Running Caliptra ROM ...
18,740,031 UART:
18,740,207 UART: [state] CFI Enabled
18,799,582 UART: [state] LifecycleState = Unprovisioned
18,801,454 UART: [state] DebugLocked = No
18,803,761 UART: [state] WD Timer not started. Device not locked for debugging
18,806,753 UART: [kat] SHA2-256
18,985,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,997,450 UART: [kat] ++
18,997,991 UART: [kat] sha1
19,009,260 UART: [kat] SHA2-256
19,012,276 UART: [kat] SHA2-384
19,017,341 UART: [kat] SHA2-512-ACC
19,020,288 UART: [kat] ECC-384
21,483,571 UART: [kat] HMAC-384Kdf
21,508,483 UART: [kat] LMS
22,037,912 UART: [kat] --
22,041,952 UART: [update-reset] ++
25,439,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,443,184 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,818,043 >>> mbox cmd response: success
25,820,056 UART: [update-reset] Copying MAN_2 To MAN_1
25,842,369 UART: [update-reset Success] --
25,843,658 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,846,798 UART: [state] Locking Datavault
25,849,569 UART: [state] Locking PCR0, PCR1 and PCR31
25,851,273 UART: [state] Locking ICCM
25,853,640 UART: [exit] Launching FMC @ 0x40000000
25,862,038 UART:
25,862,272 UART: Running Caliptra FMC ...
25,863,372 UART:
25,863,527 UART: [fmc] Received command: 0x1000000D
25,865,041 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,360,247 ready_for_fw is high
3,360,630 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,006,946 >>> mbox cmd response: success
18,288,579 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,429,723 UART:
18,430,110 UART: Running Caliptra FMC ...
18,431,227 UART:
18,431,377 UART: [fmc] Received command: 0x46574C44
25,386,776 >>> mbox cmd response: success
25,408,615 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,420,710 UART:
25,420,999 UART: Running Caliptra FMC ...
25,422,182 UART:
25,422,342 UART: [fmc] Received command: 0x1000000D
25,423,874 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,494 UART:
192,859 UART: Running Caliptra ROM ...
194,035 UART:
603,629 UART: [state] CFI Enabled
613,745 UART: [state] LifecycleState = Unprovisioned
615,558 UART: [state] DebugLocked = No
617,321 UART: [state] WD Timer not started. Device not locked for debugging
621,889 UART: [kat] SHA2-256
800,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,558 UART: [kat] ++
813,084 UART: [kat] sha1
823,542 UART: [kat] SHA2-256
826,541 UART: [kat] SHA2-384
832,238 UART: [kat] SHA2-512-ACC
835,178 UART: [kat] ECC-384
3,278,785 UART: [kat] HMAC-384Kdf
3,291,158 UART: [kat] LMS
3,820,703 UART: [kat] --
3,825,972 UART: [cold-reset] ++
3,827,043 UART: [fht] FHT @ 0x50003400
3,838,086 UART: [idev] ++
3,838,645 UART: [idev] CDI.KEYID = 6
3,839,545 UART: [idev] SUBJECT.KEYID = 7
3,840,668 UART: [idev] UDS.KEYID = 0
3,841,656 ready_for_fw is high
3,841,834 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,982,757 UART: [idev] Erasing UDS.KEYID = 0
6,311,706 UART: [idev] Sha1 KeyId Algorithm
6,335,915 UART: [idev] --
6,340,181 UART: [ldev] ++
6,340,746 UART: [ldev] CDI.KEYID = 6
6,341,628 UART: [ldev] SUBJECT.KEYID = 5
6,342,833 UART: [ldev] AUTHORITY.KEYID = 7
6,344,119 UART: [ldev] FE.KEYID = 1
6,355,547 UART: [ldev] Erasing FE.KEYID = 1
8,829,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,461 UART: [ldev] --
10,619,724 UART: [fwproc] Wait for Commands...
10,622,939 UART: [fwproc] Recv command 0x46574c44
10,624,992 UART: [fwproc] Recv'd Img size: 112032 bytes
13,989,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,055,160 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,115,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,434,670 >>> mbox cmd response: success
14,439,799 UART: [afmc] ++
14,440,408 UART: [afmc] CDI.KEYID = 6
14,441,324 UART: [afmc] SUBJECT.KEYID = 7
14,442,483 UART: [afmc] AUTHORITY.KEYID = 5
16,942,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,662,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,664,204 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,680,243 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,696,492 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,712,025 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,735,505 UART: [afmc] --
18,741,102 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,882,284 UART: [cold-reset] --
18,883,139 UART: [state] Locking Datavault
18,884,295 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,824 UART: [state] Locking ICCM
18,886,725 UART: [exit] Launching FMC @ 0x40000000
18,888,144 UART:
18,888,299 UART: Running Caliptra FMC ...
18,889,391 UART:
18,889,549 UART: [fmc] Received command: 0x46574C44
18,891,001 UART:
18,891,177 UART: Running Caliptra ROM ...
18,892,273 UART:
18,892,425 UART: [state] CFI Enabled
18,901,061 UART: [state] LifecycleState = Unprovisioned
18,902,938 UART: [state] DebugLocked = No
18,904,578 UART: [state] WD Timer not started. Device not locked for debugging
18,907,891 UART: [kat] SHA2-256
19,087,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,098,611 UART: [kat] ++
19,099,070 UART: [kat] sha1
19,111,632 UART: [kat] SHA2-256
19,114,638 UART: [kat] SHA2-384
19,119,971 UART: [kat] SHA2-512-ACC
19,122,960 UART: [kat] ECC-384
21,565,725 UART: [kat] HMAC-384Kdf
21,576,966 UART: [kat] LMS
22,106,490 UART: [kat] --
22,109,717 UART: [update-reset] ++
25,514,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,517,429 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,892,282 >>> mbox cmd response: success
25,893,686 UART: [update-reset] Copying MAN_2 To MAN_1
25,916,015 UART: [update-reset Success] --
25,917,323 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,919,493 UART: [state] Locking Datavault
25,921,182 UART: [state] Locking PCR0, PCR1 and PCR31
25,922,828 UART: [state] Locking ICCM
25,923,840 UART: [exit] Launching FMC @ 0x40000000
25,932,236 UART:
25,932,467 UART: Running Caliptra FMC ...
25,933,561 UART:
25,933,714 UART: [fmc] Received command: 0x1000000D
25,935,245 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,699,223 ready_for_fw is high
3,699,804 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,239,245 >>> mbox cmd response: success
18,473,246 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,614,521 UART:
18,614,906 UART: Running Caliptra FMC ...
18,616,113 UART:
18,616,284 UART: [fmc] Received command: 0x46574C44
25,474,593 >>> mbox cmd response: success
25,497,377 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,510,524 UART:
25,510,781 UART: Running Caliptra FMC ...
25,511,941 UART:
25,512,099 UART: [fmc] Received command: 0x1000000D
25,513,620 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,800 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 ready_for_fw is high
1,174,289 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,664 UART: [ldev] ++
1,208,832 UART: [ldev] CDI.KEYID = 6
1,209,196 UART: [ldev] SUBJECT.KEYID = 5
1,209,623 UART: [ldev] AUTHORITY.KEYID = 7
1,210,086 UART: [ldev] FE.KEYID = 1
1,215,398 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,282,037 UART: [fwproc] Recv command 0x46574c44
1,282,770 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,215 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,822 >>> mbox cmd response: success
2,744,031 UART: [afmc] ++
2,744,199 UART: [afmc] CDI.KEYID = 6
2,744,562 UART: [afmc] SUBJECT.KEYID = 7
2,744,988 UART: [afmc] AUTHORITY.KEYID = 5
2,780,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,922 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,618 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,517 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,210 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,052 UART: [afmc] --
2,823,982 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,004 UART: [cold-reset] --
2,824,888 UART: [state] Locking Datavault
2,825,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,463 UART: [state] Locking ICCM
2,827,045 UART: [exit] Launching FMC @ 0x40000000
2,832,342 UART:
2,832,358 UART: Running Caliptra FMC ...
2,832,766 UART:
2,832,996 UART: [fmc] Received command: 0x46574C44
2,833,822 UART:
2,833,838 UART: Running Caliptra ROM ...
2,834,246 UART:
2,834,301 UART: [state] CFI Enabled
2,837,161 UART: [state] LifecycleState = Unprovisioned
2,837,816 UART: [state] DebugLocked = No
2,838,484 UART: [state] WD Timer not started. Device not locked for debugging
2,839,822 UART: [kat] SHA2-256
3,643,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,501 UART: [kat] ++
3,647,653 UART: [kat] sha1
3,651,875 UART: [kat] SHA2-256
3,653,815 UART: [kat] SHA2-384
3,656,592 UART: [kat] SHA2-512-ACC
3,658,492 UART: [kat] ECC-384
3,667,791 UART: [kat] HMAC-384Kdf
3,672,335 UART: [kat] LMS
3,920,647 UART: [kat] --
3,921,529 UART: [update-reset] ++
5,206,885 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,912 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,098 >>> mbox cmd response: success
5,356,265 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,279 UART: [update-reset Success] --
5,364,688 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,365,416 UART: [state] Locking Datavault
5,366,028 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,632 UART: [state] Locking ICCM
5,367,210 UART: [exit] Launching FMC @ 0x40000000
5,372,507 UART:
5,372,523 UART: Running Caliptra FMC ...
5,372,931 UART:
5,373,153 UART: [fmc] Received command: 0x1000000D
5,374,245 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,778 ready_for_fw is high
1,055,778 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,368 >>> mbox cmd response: success
2,647,063 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,468 UART:
2,653,484 UART: Running Caliptra FMC ...
2,653,892 UART:
2,654,122 UART: [fmc] Received command: 0x46574C44
5,057,209 >>> mbox cmd response: success
5,064,897 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,665 UART:
5,070,681 UART: Running Caliptra FMC ...
5,071,089 UART:
5,071,311 UART: [fmc] Received command: 0x1000000D
5,072,403 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,377 UART: [kat] SHA2-256
891,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,056 UART: [kat] ++
896,208 UART: [kat] sha1
900,526 UART: [kat] SHA2-256
902,466 UART: [kat] SHA2-384
905,359 UART: [kat] SHA2-512-ACC
907,260 UART: [kat] ECC-384
917,011 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,702 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 ready_for_fw is high
1,175,222 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,364 UART: [idev] Erasing UDS.KEYID = 0
1,200,654 UART: [idev] Sha1 KeyId Algorithm
1,209,636 UART: [idev] --
1,210,879 UART: [ldev] ++
1,211,047 UART: [ldev] CDI.KEYID = 6
1,211,411 UART: [ldev] SUBJECT.KEYID = 5
1,211,838 UART: [ldev] AUTHORITY.KEYID = 7
1,212,301 UART: [ldev] FE.KEYID = 1
1,217,553 UART: [ldev] Erasing FE.KEYID = 1
1,244,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,423 UART: [ldev] --
1,283,755 UART: [fwproc] Wait for Commands...
1,284,400 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 112032 bytes
2,556,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,042 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,733 >>> mbox cmd response: success
2,745,930 UART: [afmc] ++
2,746,098 UART: [afmc] CDI.KEYID = 6
2,746,461 UART: [afmc] SUBJECT.KEYID = 7
2,746,887 UART: [afmc] AUTHORITY.KEYID = 5
2,782,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,451 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,147 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,046 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,739 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,723 UART: [afmc] --
2,825,589 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,825,611 UART: [cold-reset] --
2,826,321 UART: [state] Locking Datavault
2,827,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,352 UART: [state] Locking ICCM
2,828,862 UART: [exit] Launching FMC @ 0x40000000
2,834,159 UART:
2,834,175 UART: Running Caliptra FMC ...
2,834,583 UART:
2,834,813 UART: [fmc] Received command: 0x46574C44
2,835,639 UART:
2,835,655 UART: Running Caliptra ROM ...
2,836,063 UART:
2,836,205 UART: [state] CFI Enabled
2,838,503 UART: [state] LifecycleState = Unprovisioned
2,839,158 UART: [state] DebugLocked = No
2,839,802 UART: [state] WD Timer not started. Device not locked for debugging
2,840,960 UART: [kat] SHA2-256
3,644,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,639 UART: [kat] ++
3,648,791 UART: [kat] sha1
3,653,099 UART: [kat] SHA2-256
3,655,039 UART: [kat] SHA2-384
3,657,556 UART: [kat] SHA2-512-ACC
3,659,456 UART: [kat] ECC-384
3,669,199 UART: [kat] HMAC-384Kdf
3,674,017 UART: [kat] LMS
3,922,329 UART: [kat] --
3,923,221 UART: [update-reset] ++
5,208,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,742 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,928 >>> mbox cmd response: success
5,358,265 UART: [update-reset] Copying MAN_2 To MAN_1
5,366,279 UART: [update-reset Success] --
5,366,688 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,367,392 UART: [state] Locking Datavault
5,368,160 UART: [state] Locking PCR0, PCR1 and PCR31
5,368,764 UART: [state] Locking ICCM
5,369,302 UART: [exit] Launching FMC @ 0x40000000
5,374,599 UART:
5,374,615 UART: Running Caliptra FMC ...
5,375,023 UART:
5,375,245 UART: [fmc] Received command: 0x1000000D
5,376,337 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,697 ready_for_fw is high
1,056,697 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,053 >>> mbox cmd response: success
2,650,160 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,656,787 UART:
2,656,803 UART: Running Caliptra FMC ...
2,657,211 UART:
2,657,441 UART: [fmc] Received command: 0x46574C44
5,062,425 >>> mbox cmd response: success
5,070,101 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,075,715 UART:
5,075,731 UART: Running Caliptra FMC ...
5,076,139 UART:
5,076,361 UART: [fmc] Received command: 0x1000000D
5,077,453 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,047 UART: [kat] ++
895,199 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 ready_for_fw is high
1,174,249 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,540 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,833 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,528 >>> mbox cmd response: success
2,742,761 UART: [afmc] ++
2,742,929 UART: [afmc] CDI.KEYID = 6
2,743,292 UART: [afmc] SUBJECT.KEYID = 7
2,743,718 UART: [afmc] AUTHORITY.KEYID = 5
2,779,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,088 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,784 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,683 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,376 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,168 UART: [afmc] --
2,823,078 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,100 UART: [cold-reset] --
2,823,638 UART: [state] Locking Datavault
2,824,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,279 UART: [state] Locking ICCM
2,825,745 UART: [exit] Launching FMC @ 0x40000000
2,831,042 UART:
2,831,058 UART: Running Caliptra FMC ...
2,831,466 UART:
2,831,696 UART: [fmc] Received command: 0x46574C44
2,832,522 UART:
2,832,538 UART: Running Caliptra ROM ...
2,832,946 UART:
2,833,001 UART: [state] CFI Enabled
2,835,675 UART: [state] LifecycleState = Unprovisioned
2,836,330 UART: [state] DebugLocked = No
2,837,056 UART: [state] WD Timer not started. Device not locked for debugging
2,838,382 UART: [kat] SHA2-256
3,641,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,061 UART: [kat] ++
3,646,213 UART: [kat] sha1
3,650,391 UART: [kat] SHA2-256
3,652,331 UART: [kat] SHA2-384
3,655,134 UART: [kat] SHA2-512-ACC
3,657,034 UART: [kat] ECC-384
3,666,787 UART: [kat] HMAC-384Kdf
3,671,445 UART: [kat] LMS
3,919,757 UART: [kat] --
3,920,737 UART: [update-reset] ++
5,206,429 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,560 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,355,746 >>> mbox cmd response: success
5,355,855 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,869 UART: [update-reset Success] --
5,364,278 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,734 UART: [state] Locking Datavault
5,365,428 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,032 UART: [state] Locking ICCM
5,366,478 UART: [exit] Launching FMC @ 0x40000000
5,371,775 UART:
5,371,791 UART: Running Caliptra FMC ...
5,372,199 UART:
5,372,421 UART: [fmc] Received command: 0x1000000D
5,373,513 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,224 ready_for_fw is high
1,055,224 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,519 >>> mbox cmd response: success
2,647,416 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,529 UART:
2,653,545 UART: Running Caliptra FMC ...
2,653,953 UART:
2,654,183 UART: [fmc] Received command: 0x46574C44
5,058,849 >>> mbox cmd response: success
5,066,547 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,403 UART:
5,072,419 UART: Running Caliptra FMC ...
5,072,827 UART:
5,073,049 UART: [fmc] Received command: 0x1000000D
5,074,141 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,855 UART: [kat] SHA2-512-ACC
906,756 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 ready_for_fw is high
1,174,864 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,374 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,219 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,550 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,295 >>> mbox cmd response: success
2,744,420 UART: [afmc] ++
2,744,588 UART: [afmc] CDI.KEYID = 6
2,744,951 UART: [afmc] SUBJECT.KEYID = 7
2,745,377 UART: [afmc] AUTHORITY.KEYID = 5
2,781,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,941 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,637 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,536 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,229 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,123 UART: [afmc] --
2,825,183 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,825,205 UART: [cold-reset] --
2,826,071 UART: [state] Locking Datavault
2,826,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,598 UART: [state] Locking ICCM
2,828,168 UART: [exit] Launching FMC @ 0x40000000
2,833,465 UART:
2,833,481 UART: Running Caliptra FMC ...
2,833,889 UART:
2,834,119 UART: [fmc] Received command: 0x46574C44
2,834,945 UART:
2,834,961 UART: Running Caliptra ROM ...
2,835,369 UART:
2,835,511 UART: [state] CFI Enabled
2,838,569 UART: [state] LifecycleState = Unprovisioned
2,839,224 UART: [state] DebugLocked = No
2,839,892 UART: [state] WD Timer not started. Device not locked for debugging
2,841,210 UART: [kat] SHA2-256
3,644,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,889 UART: [kat] ++
3,649,041 UART: [kat] sha1
3,653,139 UART: [kat] SHA2-256
3,655,079 UART: [kat] SHA2-384
3,657,816 UART: [kat] SHA2-512-ACC
3,659,716 UART: [kat] ECC-384
3,669,175 UART: [kat] HMAC-384Kdf
3,673,769 UART: [kat] LMS
3,922,081 UART: [kat] --
3,923,067 UART: [update-reset] ++
5,207,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,448 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,634 >>> mbox cmd response: success
5,356,887 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,901 UART: [update-reset Success] --
5,365,310 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,365,812 UART: [state] Locking Datavault
5,366,646 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,250 UART: [state] Locking ICCM
5,367,892 UART: [exit] Launching FMC @ 0x40000000
5,373,189 UART:
5,373,205 UART: Running Caliptra FMC ...
5,373,613 UART:
5,373,835 UART: [fmc] Received command: 0x1000000D
5,374,927 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 ready_for_fw is high
1,056,567 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,737 >>> mbox cmd response: success
2,649,226 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,157 UART:
2,655,173 UART: Running Caliptra FMC ...
2,655,581 UART:
2,655,811 UART: [fmc] Received command: 0x46574C44
5,061,343 >>> mbox cmd response: success
5,068,875 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,074,203 UART:
5,074,219 UART: Running Caliptra FMC ...
5,074,627 UART:
5,074,849 UART: [fmc] Received command: 0x1000000D
5,075,941 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,983 UART: [kat] ++
895,135 UART: [kat] sha1
899,403 UART: [kat] SHA2-256
901,343 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,312 UART: [kat] HMAC-384Kdf
919,888 UART: [kat] LMS
1,168,200 UART: [kat] --
1,169,061 UART: [cold-reset] ++
1,169,587 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,173,435 ready_for_fw is high
1,173,435 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,180,939 UART: [idev] Erasing UDS.KEYID = 0
1,197,653 UART: [idev] Sha1 KeyId Algorithm
1,206,459 UART: [idev] --
1,207,508 UART: [ldev] ++
1,207,676 UART: [ldev] CDI.KEYID = 6
1,208,040 UART: [ldev] SUBJECT.KEYID = 5
1,208,467 UART: [ldev] AUTHORITY.KEYID = 7
1,208,930 UART: [ldev] FE.KEYID = 1
1,214,116 UART: [ldev] Erasing FE.KEYID = 1
1,240,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,676 UART: [ldev] --
1,279,944 UART: [fwproc] Wait for Commands...
1,280,661 UART: [fwproc] Recv command 0x46574c44
1,281,394 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,157 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,956 >>> mbox cmd response: success
2,743,059 UART: [afmc] ++
2,743,227 UART: [afmc] CDI.KEYID = 6
2,743,590 UART: [afmc] SUBJECT.KEYID = 7
2,744,016 UART: [afmc] AUTHORITY.KEYID = 5
2,779,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,498 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,194 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,093 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,786 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,558 UART: [afmc] --
2,822,618 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,640 UART: [cold-reset] --
2,823,346 UART: [state] Locking Datavault
2,824,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,985 UART: [state] Locking ICCM
2,825,439 UART: [exit] Launching FMC @ 0x40000000
2,830,736 UART:
2,830,752 UART: Running Caliptra FMC ...
2,831,160 UART:
2,831,390 UART: [fmc] Received command: 0x46574C44
2,832,216 UART:
2,832,232 UART: Running Caliptra ROM ...
2,832,640 UART:
2,832,695 UART: [state] CFI Enabled
2,835,363 UART: [state] LifecycleState = Unprovisioned
2,836,018 UART: [state] DebugLocked = No
2,836,612 UART: [state] WD Timer not started. Device not locked for debugging
2,837,744 UART: [kat] SHA2-256
3,641,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,423 UART: [kat] ++
3,645,575 UART: [kat] sha1
3,649,901 UART: [kat] SHA2-256
3,651,841 UART: [kat] SHA2-384
3,654,646 UART: [kat] SHA2-512-ACC
3,656,546 UART: [kat] ECC-384
3,666,163 UART: [kat] HMAC-384Kdf
3,670,737 UART: [kat] LMS
3,919,049 UART: [kat] --
3,919,931 UART: [update-reset] ++
5,206,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,456 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,355,642 >>> mbox cmd response: success
5,355,865 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,879 UART: [update-reset Success] --
5,364,288 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,950 UART: [state] Locking Datavault
5,365,622 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,226 UART: [state] Locking ICCM
5,366,844 UART: [exit] Launching FMC @ 0x40000000
5,372,141 UART:
5,372,157 UART: Running Caliptra FMC ...
5,372,565 UART:
5,372,787 UART: [fmc] Received command: 0x1000000D
5,373,879 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 ready_for_fw is high
1,055,944 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,052 >>> mbox cmd response: success
2,649,161 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,298 UART:
2,655,314 UART: Running Caliptra FMC ...
2,655,722 UART:
2,655,952 UART: [fmc] Received command: 0x46574C44
5,059,633 >>> mbox cmd response: success
5,067,147 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,631 UART:
5,072,647 UART: Running Caliptra FMC ...
5,073,055 UART:
5,073,277 UART: [fmc] Received command: 0x1000000D
5,074,369 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,119 UART: [kat] SHA2-512-ACC
906,020 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 ready_for_fw is high
1,174,204 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,241,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,651 UART: [ldev] --
1,280,963 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x46574c44
1,282,279 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,816 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,565 >>> mbox cmd response: success
2,742,790 UART: [afmc] ++
2,742,958 UART: [afmc] CDI.KEYID = 6
2,743,321 UART: [afmc] SUBJECT.KEYID = 7
2,743,747 UART: [afmc] AUTHORITY.KEYID = 5
2,779,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,761 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,457 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,356 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,049 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,931 UART: [afmc] --
2,822,793 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,815 UART: [cold-reset] --
2,823,745 UART: [state] Locking Datavault
2,824,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,374 UART: [state] Locking ICCM
2,825,862 UART: [exit] Launching FMC @ 0x40000000
2,831,159 UART:
2,831,175 UART: Running Caliptra FMC ...
2,831,583 UART:
2,831,813 UART: [fmc] Received command: 0x46574C44
2,832,639 UART:
2,832,655 UART: Running Caliptra ROM ...
2,833,063 UART:
2,833,205 UART: [state] CFI Enabled
2,835,859 UART: [state] LifecycleState = Unprovisioned
2,836,514 UART: [state] DebugLocked = No
2,837,194 UART: [state] WD Timer not started. Device not locked for debugging
2,838,404 UART: [kat] SHA2-256
3,641,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,083 UART: [kat] ++
3,646,235 UART: [kat] sha1
3,650,573 UART: [kat] SHA2-256
3,652,513 UART: [kat] SHA2-384
3,655,300 UART: [kat] SHA2-512-ACC
3,657,200 UART: [kat] ECC-384
3,666,979 UART: [kat] HMAC-384Kdf
3,671,689 UART: [kat] LMS
3,920,001 UART: [kat] --
3,920,839 UART: [update-reset] ++
5,206,727 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,012 >>> mbox cmd response: success
5,356,299 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,313 UART: [update-reset Success] --
5,364,722 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,365,208 UART: [state] Locking Datavault
5,365,990 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,594 UART: [state] Locking ICCM
5,367,082 UART: [exit] Launching FMC @ 0x40000000
5,372,379 UART:
5,372,395 UART: Running Caliptra FMC ...
5,372,803 UART:
5,373,025 UART: [fmc] Received command: 0x1000000D
5,374,117 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,987 ready_for_fw is high
1,055,987 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,293 >>> mbox cmd response: success
2,648,186 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,285 UART:
2,654,301 UART: Running Caliptra FMC ...
2,654,709 UART:
2,654,939 UART: [fmc] Received command: 0x46574C44
5,060,173 >>> mbox cmd response: success
5,067,807 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,073,383 UART:
5,073,399 UART: Running Caliptra FMC ...
5,073,807 UART:
5,074,029 UART: [fmc] Received command: 0x1000000D
5,075,121 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,040 UART:
192,400 UART: Running Caliptra ROM ...
193,674 UART:
193,825 UART: [state] CFI Enabled
261,083 UART: [state] LifecycleState = Unprovisioned
263,451 UART: [state] DebugLocked = No
265,839 UART: [state] WD Timer not started. Device not locked for debugging
270,387 UART: [kat] SHA2-256
452,250 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,779 UART: [kat] ++
464,340 UART: [kat] sha1
474,432 UART: [kat] SHA2-256
477,441 UART: [kat] SHA2-384
484,220 UART: [kat] SHA2-512-ACC
486,873 UART: [kat] ECC-384
3,777,183 UART: [kat] HMAC-384Kdf
3,804,408 UART: [kat] LMS
4,877,610 UART: [kat] --
4,880,770 UART: [cold-reset] ++
4,882,915 UART: [fht] FHT @ 0x50003400
4,893,887 UART: [idev] ++
4,894,536 UART: [idev] CDI.KEYID = 6
4,895,781 UART: [idev] SUBJECT.KEYID = 7
4,896,809 UART: [idev] UDS.KEYID = 0
4,897,800 ready_for_fw is high
4,898,011 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,038,600 UART: [idev] Erasing UDS.KEYID = 0
8,248,164 UART: [idev] Sha1 KeyId Algorithm
8,271,140 UART: [idev] --
8,273,840 UART: [ldev] ++
8,274,441 UART: [ldev] CDI.KEYID = 6
8,275,630 UART: [ldev] SUBJECT.KEYID = 5
8,276,792 UART: [ldev] AUTHORITY.KEYID = 7
8,278,017 UART: [ldev] FE.KEYID = 1
8,320,097 UART: [ldev] Erasing FE.KEYID = 1
11,651,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,979 UART: [ldev] --
14,017,841 UART: [fwproc] Wait for Commands...
14,021,011 UART: [fwproc] Recv command 0x46574c44
14,023,321 UART: [fwproc] Recv'd Img size: 111688 bytes
18,070,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,145,163 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,205,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,522,975 >>> mbox cmd response: success
18,526,713 UART: [afmc] ++
18,527,323 UART: [afmc] CDI.KEYID = 6
18,528,511 UART: [afmc] SUBJECT.KEYID = 7
18,529,615 UART: [afmc] AUTHORITY.KEYID = 5
21,884,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,182,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,185,046 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,201,274 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,217,340 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,233,169 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,255,298 UART: [afmc] --
24,259,291 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,400,108 UART: [cold-reset] --
24,400,979 UART: [state] Locking Datavault
24,402,136 UART: [state] Locking PCR0, PCR1 and PCR31
24,403,668 UART: [state] Locking ICCM
24,404,571 UART: [exit] Launching FMC @ 0x40000000
24,405,991 UART:
24,406,149 UART: Running Caliptra FMC ...
24,407,240 UART:
24,407,391 UART: [fmc] Received command: 0x46574C44
24,408,815 UART:
24,408,968 UART: Running Caliptra ROM ...
24,410,066 UART:
24,410,221 UART: [state] CFI Enabled
24,475,361 UART: [state] LifecycleState = Unprovisioned
24,477,285 UART: [state] DebugLocked = No
24,479,585 UART: [state] WD Timer not started. Device not locked for debugging
24,484,029 UART: [kat] SHA2-256
24,665,972 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,677,487 UART: [kat] ++
24,678,078 UART: [kat] sha1
24,688,485 UART: [kat] SHA2-256
24,691,490 UART: [kat] SHA2-384
24,697,621 UART: [kat] SHA2-512-ACC
24,700,250 UART: [kat] ECC-384
27,988,965 UART: [kat] HMAC-384Kdf
28,013,536 UART: [kat] LMS
29,086,686 UART: [kat] --
29,091,582 UART: [update-reset] ++
33,156,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,160,635 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,536,264 UART: [update-reset] Copying MAN_2 To MAN_1
33,559,176 UART: [update-reset Success] --
33,560,782 >>> mbox cmd response: success
33,561,000 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,563,315 UART: [state] Locking Datavault
33,567,430 UART: [state] Locking PCR0, PCR1 and PCR31
33,569,128 UART: [state] Locking ICCM
33,571,122 UART: [exit] Launching FMC @ 0x40000000
33,579,809 UART:
33,580,045 UART: Running Caliptra FMC ...
33,581,073 UART:
33,581,241 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,582,882 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
4,806,370 ready_for_fw is high
4,806,979 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,304,485 >>> mbox cmd response: success
23,983,370 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,124,131 UART:
24,124,502 UART: Running Caliptra FMC ...
24,125,716 UART:
24,125,890 UART: [fmc] Received command: 0x46574C44
33,162,285 >>> mbox cmd response: success
33,162,674 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,176,895 UART:
33,177,182 UART: Running Caliptra FMC ...
33,178,354 UART:
33,178,514 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,180,184 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,421 UART:
192,784 UART: Running Caliptra ROM ...
193,905 UART:
603,758 UART: [state] CFI Enabled
617,352 UART: [state] LifecycleState = Unprovisioned
619,643 UART: [state] DebugLocked = No
621,012 UART: [state] WD Timer not started. Device not locked for debugging
626,187 UART: [kat] SHA2-256
808,167 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,736 UART: [kat] ++
820,330 UART: [kat] sha1
831,372 UART: [kat] SHA2-256
834,410 UART: [kat] SHA2-384
839,123 UART: [kat] SHA2-512-ACC
841,700 UART: [kat] ECC-384
4,095,659 UART: [kat] HMAC-384Kdf
4,106,628 UART: [kat] LMS
5,179,761 UART: [kat] --
5,184,491 UART: [cold-reset] ++
5,185,645 UART: [fht] FHT @ 0x50003400
5,195,406 UART: [idev] ++
5,196,114 UART: [idev] CDI.KEYID = 6
5,197,280 UART: [idev] SUBJECT.KEYID = 7
5,198,724 UART: [idev] UDS.KEYID = 0
5,199,995 ready_for_fw is high
5,200,187 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,340,444 UART: [idev] Erasing UDS.KEYID = 0
8,486,891 UART: [idev] Sha1 KeyId Algorithm
8,508,399 UART: [idev] --
8,511,720 UART: [ldev] ++
8,512,292 UART: [ldev] CDI.KEYID = 6
8,513,447 UART: [ldev] SUBJECT.KEYID = 5
8,514,974 UART: [ldev] AUTHORITY.KEYID = 7
8,516,447 UART: [ldev] FE.KEYID = 1
8,527,839 UART: [ldev] Erasing FE.KEYID = 1
11,820,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,013 UART: [ldev] --
14,183,248 UART: [fwproc] Wait for Commands...
14,185,341 UART: [fwproc] Recv command 0x46574c44
14,187,692 UART: [fwproc] Recv'd Img size: 111688 bytes
18,230,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,306,484 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,366,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,684,176 >>> mbox cmd response: success
18,687,951 UART: [afmc] ++
18,688,564 UART: [afmc] CDI.KEYID = 6
18,689,681 UART: [afmc] SUBJECT.KEYID = 7
18,690,836 UART: [afmc] AUTHORITY.KEYID = 5
22,010,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,304,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,950 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,323,146 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,339,258 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,355,126 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,378,837 UART: [afmc] --
24,383,519 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,524,287 UART: [cold-reset] --
24,525,152 UART: [state] Locking Datavault
24,526,220 UART: [state] Locking PCR0, PCR1 and PCR31
24,527,751 UART: [state] Locking ICCM
24,528,621 UART: [exit] Launching FMC @ 0x40000000
24,529,951 UART:
24,530,089 UART: Running Caliptra FMC ...
24,531,196 UART:
24,531,342 UART: [fmc] Received command: 0x46574C44
24,532,706 UART:
24,532,840 UART: Running Caliptra ROM ...
24,533,877 UART:
24,534,035 UART: [state] CFI Enabled
24,537,589 UART: [state] LifecycleState = Unprovisioned
24,539,409 UART: [state] DebugLocked = No
24,540,649 UART: [state] WD Timer not started. Device not locked for debugging
24,543,779 UART: [kat] SHA2-256
24,725,722 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,737,291 UART: [kat] ++
24,737,742 UART: [kat] sha1
24,748,027 UART: [kat] SHA2-256
24,751,080 UART: [kat] SHA2-384
24,757,874 UART: [kat] SHA2-512-ACC
24,760,488 UART: [kat] ECC-384
28,015,436 UART: [kat] HMAC-384Kdf
28,028,326 UART: [kat] LMS
29,101,482 UART: [kat] --
29,107,249 UART: [update-reset] ++
33,174,073 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,178,108 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,553,306 UART: [update-reset] Copying MAN_2 To MAN_1
33,576,167 UART: [update-reset Success] --
33,577,834 >>> mbox cmd response: success
33,578,048 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,579,496 UART: [state] Locking Datavault
33,581,886 UART: [state] Locking PCR0, PCR1 and PCR31
33,583,580 UART: [state] Locking ICCM
33,585,293 UART: [exit] Launching FMC @ 0x40000000
33,593,965 UART:
33,594,200 UART: Running Caliptra FMC ...
33,595,296 UART:
33,595,449 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,597,066 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
5,102,311 ready_for_fw is high
5,102,986 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,504,263 >>> mbox cmd response: success
24,127,711 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,268,499 UART:
24,268,888 UART: Running Caliptra FMC ...
24,270,084 UART:
24,270,267 UART: [fmc] Received command: 0x46574C44
33,212,349 >>> mbox cmd response: success
33,212,777 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,224,511 UART:
33,224,809 UART: Running Caliptra FMC ...
33,225,889 UART:
33,226,029 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,227,668 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,020 UART:
192,380 UART: Running Caliptra ROM ...
193,495 UART:
193,643 UART: [state] CFI Enabled
265,173 UART: [state] LifecycleState = Unprovisioned
267,008 UART: [state] DebugLocked = No
268,219 UART: [state] WD Timer not started. Device not locked for debugging
272,194 UART: [kat] SHA2-256
451,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,954 UART: [kat] ++
463,486 UART: [kat] sha1
473,796 UART: [kat] SHA2-256
476,870 UART: [kat] SHA2-384
483,968 UART: [kat] SHA2-512-ACC
486,894 UART: [kat] ECC-384
2,948,497 UART: [kat] HMAC-384Kdf
2,972,434 UART: [kat] LMS
3,501,866 UART: [kat] --
3,507,429 UART: [cold-reset] ++
3,508,869 UART: [fht] FHT @ 0x50003400
3,520,491 UART: [idev] ++
3,521,061 UART: [idev] CDI.KEYID = 6
3,522,042 UART: [idev] SUBJECT.KEYID = 7
3,523,224 UART: [idev] UDS.KEYID = 0
3,524,309 ready_for_fw is high
3,524,520 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,665,384 UART: [idev] Erasing UDS.KEYID = 0
6,028,376 UART: [idev] Sha1 KeyId Algorithm
6,051,674 UART: [idev] --
6,055,668 UART: [ldev] ++
6,056,247 UART: [ldev] CDI.KEYID = 6
6,057,133 UART: [ldev] SUBJECT.KEYID = 5
6,058,235 UART: [ldev] AUTHORITY.KEYID = 7
6,059,585 UART: [ldev] FE.KEYID = 1
6,102,555 UART: [ldev] Erasing FE.KEYID = 1
8,608,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,435 UART: [ldev] --
10,416,442 UART: [fwproc] Wait for Commands...
10,419,615 UART: [fwproc] Recv command 0x46574c44
10,421,707 UART: [fwproc] Recv'd Img size: 112032 bytes
13,792,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,250 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,246,037 >>> mbox cmd response: success
14,250,219 UART: [afmc] ++
14,250,830 UART: [afmc] CDI.KEYID = 6
14,251,745 UART: [afmc] SUBJECT.KEYID = 7
14,252,911 UART: [afmc] AUTHORITY.KEYID = 5
16,792,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,513,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,515,179 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,531,226 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,547,304 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,562,999 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,586,273 UART: [afmc] --
18,590,609 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,731,799 UART: [cold-reset] --
18,732,670 UART: [state] Locking Datavault
18,733,745 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,285 UART: [state] Locking ICCM
18,736,355 UART: [exit] Launching FMC @ 0x40000000
18,737,785 UART:
18,737,943 UART: Running Caliptra FMC ...
18,739,040 UART:
18,739,200 UART: [fmc] Received command: 0x46574C44
18,740,663 UART:
18,740,837 UART: Running Caliptra ROM ...
18,741,943 UART:
18,742,100 UART: [state] CFI Enabled
18,809,627 UART: [state] LifecycleState = Unprovisioned
18,811,502 UART: [state] DebugLocked = No
18,813,234 UART: [state] WD Timer not started. Device not locked for debugging
18,816,972 UART: [kat] SHA2-256
18,996,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,007,669 UART: [kat] ++
19,008,126 UART: [kat] sha1
19,019,012 UART: [kat] SHA2-256
19,022,028 UART: [kat] SHA2-384
19,028,882 UART: [kat] SHA2-512-ACC
19,031,824 UART: [kat] ECC-384
21,491,447 UART: [kat] HMAC-384Kdf
21,512,861 UART: [kat] LMS
22,042,338 UART: [kat] --
22,046,026 UART: [update-reset] ++
25,437,929 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,440,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,816,965 UART: [update-reset] Copying MAN_2 To MAN_1
25,839,334 UART: [update-reset Success] --
25,840,618 >>> mbox cmd response: success
25,840,835 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,842,387 UART: [state] Locking Datavault
25,845,121 UART: [state] Locking PCR0, PCR1 and PCR31
25,846,837 UART: [state] Locking ICCM
25,848,135 UART: [exit] Launching FMC @ 0x40000000
25,856,533 UART:
25,856,782 UART: Running Caliptra FMC ...
25,857,886 UART:
25,858,042 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,859,699 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,384,801 ready_for_fw is high
3,385,346 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,055,279 >>> mbox cmd response: success
18,329,945 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,471,205 UART:
18,471,584 UART: Running Caliptra FMC ...
18,472,814 UART:
18,472,985 UART: [fmc] Received command: 0x46574C44
25,425,544 >>> mbox cmd response: success
25,425,927 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,438,574 UART:
25,438,837 UART: Running Caliptra FMC ...
25,440,007 UART:
25,440,172 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,441,806 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,475 UART:
192,830 UART: Running Caliptra ROM ...
193,946 UART:
603,542 UART: [state] CFI Enabled
618,129 UART: [state] LifecycleState = Unprovisioned
619,942 UART: [state] DebugLocked = No
622,100 UART: [state] WD Timer not started. Device not locked for debugging
625,422 UART: [kat] SHA2-256
804,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,155 UART: [kat] ++
816,600 UART: [kat] sha1
829,194 UART: [kat] SHA2-256
832,240 UART: [kat] SHA2-384
838,368 UART: [kat] SHA2-512-ACC
841,328 UART: [kat] ECC-384
3,281,540 UART: [kat] HMAC-384Kdf
3,294,835 UART: [kat] LMS
3,824,368 UART: [kat] --
3,829,852 UART: [cold-reset] ++
3,831,353 UART: [fht] FHT @ 0x50003400
3,842,042 UART: [idev] ++
3,842,609 UART: [idev] CDI.KEYID = 6
3,843,519 UART: [idev] SUBJECT.KEYID = 7
3,844,690 UART: [idev] UDS.KEYID = 0
3,845,685 ready_for_fw is high
3,845,871 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,986,592 UART: [idev] Erasing UDS.KEYID = 0
6,317,188 UART: [idev] Sha1 KeyId Algorithm
6,340,494 UART: [idev] --
6,344,703 UART: [ldev] ++
6,345,289 UART: [ldev] CDI.KEYID = 6
6,346,200 UART: [ldev] SUBJECT.KEYID = 5
6,347,613 UART: [ldev] AUTHORITY.KEYID = 7
6,348,825 UART: [ldev] FE.KEYID = 1
6,358,943 UART: [ldev] Erasing FE.KEYID = 1
8,833,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,827 UART: [ldev] --
10,620,794 UART: [fwproc] Wait for Commands...
10,623,642 UART: [fwproc] Recv command 0x46574c44
10,625,731 UART: [fwproc] Recv'd Img size: 112032 bytes
14,008,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,078,491 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,138,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,456,690 >>> mbox cmd response: success
14,461,034 UART: [afmc] ++
14,461,655 UART: [afmc] CDI.KEYID = 6
14,462,571 UART: [afmc] SUBJECT.KEYID = 7
14,463,677 UART: [afmc] AUTHORITY.KEYID = 5
16,965,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,685,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,687,463 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,703,499 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,719,520 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,735,213 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,757,225 UART: [afmc] --
18,762,140 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,903,191 UART: [cold-reset] --
18,904,055 UART: [state] Locking Datavault
18,905,232 UART: [state] Locking PCR0, PCR1 and PCR31
18,906,772 UART: [state] Locking ICCM
18,907,858 UART: [exit] Launching FMC @ 0x40000000
18,909,302 UART:
18,909,462 UART: Running Caliptra FMC ...
18,910,562 UART:
18,910,717 UART: [fmc] Received command: 0x46574C44
18,912,170 UART:
18,912,323 UART: Running Caliptra ROM ...
18,913,416 UART:
18,913,568 UART: [state] CFI Enabled
18,919,023 UART: [state] LifecycleState = Unprovisioned
18,920,846 UART: [state] DebugLocked = No
18,922,431 UART: [state] WD Timer not started. Device not locked for debugging
18,926,214 UART: [kat] SHA2-256
19,105,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,116,991 UART: [kat] ++
19,117,528 UART: [kat] sha1
19,128,635 UART: [kat] SHA2-256
19,131,648 UART: [kat] SHA2-384
19,136,705 UART: [kat] SHA2-512-ACC
19,139,634 UART: [kat] ECC-384
21,579,273 UART: [kat] HMAC-384Kdf
21,591,343 UART: [kat] LMS
22,120,855 UART: [kat] --
22,123,332 UART: [update-reset] ++
25,523,993 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,528,183 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,904,232 UART: [update-reset] Copying MAN_2 To MAN_1
25,926,603 UART: [update-reset Success] --
25,927,882 >>> mbox cmd response: success
25,928,103 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,932,816 UART: [state] Locking Datavault
25,937,522 UART: [state] Locking PCR0, PCR1 and PCR31
25,939,218 UART: [state] Locking ICCM
25,940,717 UART: [exit] Launching FMC @ 0x40000000
25,949,116 UART:
25,949,387 UART: Running Caliptra FMC ...
25,950,490 UART:
25,950,643 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,952,267 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,696,276 ready_for_fw is high
3,696,715 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,233,192 >>> mbox cmd response: success
18,471,845 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,613,002 UART:
18,613,390 UART: Running Caliptra FMC ...
18,614,589 UART:
18,614,760 UART: [fmc] Received command: 0x46574C44
25,502,639 >>> mbox cmd response: success
25,503,053 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,515,934 UART:
25,516,196 UART: Running Caliptra FMC ...
25,517,285 UART:
25,517,434 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,519,070 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,223 UART:
192,577 UART: Running Caliptra ROM ...
193,760 UART:
193,916 UART: [state] CFI Enabled
266,431 UART: [state] LifecycleState = Unprovisioned
268,265 UART: [state] DebugLocked = No
270,438 UART: [state] WD Timer not started. Device not locked for debugging
273,918 UART: [kat] SHA2-256
453,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,835 UART: [kat] ++
465,329 UART: [kat] sha1
477,027 UART: [kat] SHA2-256
480,061 UART: [kat] SHA2-384
485,132 UART: [kat] SHA2-512-ACC
488,137 UART: [kat] ECC-384
2,947,095 UART: [kat] HMAC-384Kdf
2,971,767 UART: [kat] LMS
3,501,227 UART: [kat] --
3,506,046 UART: [cold-reset] ++
3,507,448 UART: [fht] FHT @ 0x50003400
3,519,431 UART: [idev] ++
3,519,999 UART: [idev] CDI.KEYID = 6
3,520,913 UART: [idev] SUBJECT.KEYID = 7
3,522,161 UART: [idev] UDS.KEYID = 0
3,523,087 ready_for_fw is high
3,523,275 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,664,050 UART: [idev] Erasing UDS.KEYID = 0
6,025,479 UART: [idev] Sha1 KeyId Algorithm
6,048,981 UART: [idev] --
6,053,955 UART: [ldev] ++
6,054,529 UART: [ldev] CDI.KEYID = 6
6,055,432 UART: [ldev] SUBJECT.KEYID = 5
6,056,594 UART: [ldev] AUTHORITY.KEYID = 7
6,057,882 UART: [ldev] FE.KEYID = 1
6,098,261 UART: [ldev] Erasing FE.KEYID = 1
8,605,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,910 UART: [ldev] --
10,411,447 UART: [fwproc] Wait for Commands...
10,414,521 UART: [fwproc] Recv command 0x46574c44
10,416,615 UART: [fwproc] Recv'd Img size: 112032 bytes
13,786,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,856,043 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,916,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,234,165 >>> mbox cmd response: success
14,239,238 UART: [afmc] ++
14,239,847 UART: [afmc] CDI.KEYID = 6
14,240,763 UART: [afmc] SUBJECT.KEYID = 7
14,241,924 UART: [afmc] AUTHORITY.KEYID = 5
16,785,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,759 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,816 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,896 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,592 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,584,126 UART: [afmc] --
18,589,279 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,730,490 UART: [cold-reset] --
18,731,352 UART: [state] Locking Datavault
18,732,505 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,059 UART: [state] Locking ICCM
18,734,972 UART: [exit] Launching FMC @ 0x40000000
18,736,400 UART:
18,736,565 UART: Running Caliptra FMC ...
18,737,662 UART:
18,737,830 UART: [fmc] Received command: 0x46574C44
18,739,289 UART:
18,739,441 UART: Running Caliptra ROM ...
18,740,539 UART:
18,740,691 UART: [state] CFI Enabled
18,800,225 UART: [state] LifecycleState = Unprovisioned
18,802,107 UART: [state] DebugLocked = No
18,804,093 UART: [state] WD Timer not started. Device not locked for debugging
18,808,217 UART: [kat] SHA2-256
18,987,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,998,942 UART: [kat] ++
18,999,497 UART: [kat] sha1
19,010,334 UART: [kat] SHA2-256
19,013,351 UART: [kat] SHA2-384
19,019,497 UART: [kat] SHA2-512-ACC
19,022,440 UART: [kat] ECC-384
21,485,935 UART: [kat] HMAC-384Kdf
21,509,819 UART: [kat] LMS
22,039,279 UART: [kat] --
22,042,300 UART: [update-reset] ++
25,443,398 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,446,671 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,822,302 UART: [update-reset] Copying MAN_2 To MAN_1
25,844,666 UART: [update-reset Success] --
25,845,982 >>> mbox cmd response: success
25,846,209 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,847,070 UART: [state] Locking Datavault
25,848,677 UART: [state] Locking PCR0, PCR1 and PCR31
25,850,329 UART: [state] Locking ICCM
25,851,509 UART: [exit] Launching FMC @ 0x40000000
25,859,906 UART:
25,860,140 UART: Running Caliptra FMC ...
25,861,241 UART:
25,861,394 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,863,033 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,382,922 ready_for_fw is high
3,383,301 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,030,529 >>> mbox cmd response: success
18,308,749 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,449,876 UART:
18,450,263 UART: Running Caliptra FMC ...
18,451,470 UART:
18,451,641 UART: [fmc] Received command: 0x46574C44
25,407,042 >>> mbox cmd response: success
25,407,424 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,419,968 UART:
25,420,229 UART: Running Caliptra FMC ...
25,421,402 UART:
25,421,561 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,423,198 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,472 UART:
192,830 UART: Running Caliptra ROM ...
193,919 UART:
603,634 UART: [state] CFI Enabled
618,941 UART: [state] LifecycleState = Unprovisioned
620,774 UART: [state] DebugLocked = No
622,787 UART: [state] WD Timer not started. Device not locked for debugging
625,971 UART: [kat] SHA2-256
805,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,697 UART: [kat] ++
817,146 UART: [kat] sha1
829,245 UART: [kat] SHA2-256
832,256 UART: [kat] SHA2-384
839,944 UART: [kat] SHA2-512-ACC
842,870 UART: [kat] ECC-384
3,283,102 UART: [kat] HMAC-384Kdf
3,294,907 UART: [kat] LMS
3,824,455 UART: [kat] --
3,830,225 UART: [cold-reset] ++
3,831,084 UART: [fht] FHT @ 0x50003400
3,840,706 UART: [idev] ++
3,841,265 UART: [idev] CDI.KEYID = 6
3,842,144 UART: [idev] SUBJECT.KEYID = 7
3,843,385 UART: [idev] UDS.KEYID = 0
3,844,307 ready_for_fw is high
3,844,497 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,985,193 UART: [idev] Erasing UDS.KEYID = 0
6,315,854 UART: [idev] Sha1 KeyId Algorithm
6,339,933 UART: [idev] --
6,343,380 UART: [ldev] ++
6,343,946 UART: [ldev] CDI.KEYID = 6
6,344,857 UART: [ldev] SUBJECT.KEYID = 5
6,346,066 UART: [ldev] AUTHORITY.KEYID = 7
6,347,296 UART: [ldev] FE.KEYID = 1
6,358,476 UART: [ldev] Erasing FE.KEYID = 1
8,833,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,525 UART: [ldev] --
10,624,987 UART: [fwproc] Wait for Commands...
10,626,869 UART: [fwproc] Recv command 0x46574c44
10,628,978 UART: [fwproc] Recv'd Img size: 112032 bytes
14,010,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,490 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,148,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,466,736 >>> mbox cmd response: success
14,470,713 UART: [afmc] ++
14,471,330 UART: [afmc] CDI.KEYID = 6
14,472,243 UART: [afmc] SUBJECT.KEYID = 7
14,473,414 UART: [afmc] AUTHORITY.KEYID = 5
16,971,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,690,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,692,569 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,708,629 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,724,660 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,740,331 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,763,363 UART: [afmc] --
18,769,105 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,910,332 UART: [cold-reset] --
18,911,192 UART: [state] Locking Datavault
18,912,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,913,794 UART: [state] Locking ICCM
18,914,672 UART: [exit] Launching FMC @ 0x40000000
18,916,009 UART:
18,916,161 UART: Running Caliptra FMC ...
18,917,257 UART:
18,917,409 UART: [fmc] Received command: 0x46574C44
18,918,776 UART:
18,918,921 UART: Running Caliptra ROM ...
18,919,963 UART:
18,920,107 UART: [state] CFI Enabled
18,926,904 UART: [state] LifecycleState = Unprovisioned
18,928,724 UART: [state] DebugLocked = No
18,929,955 UART: [state] WD Timer not started. Device not locked for debugging
18,933,860 UART: [kat] SHA2-256
19,113,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,124,612 UART: [kat] ++
19,125,065 UART: [kat] sha1
19,137,084 UART: [kat] SHA2-256
19,140,105 UART: [kat] SHA2-384
19,145,868 UART: [kat] SHA2-512-ACC
19,148,803 UART: [kat] ECC-384
21,593,852 UART: [kat] HMAC-384Kdf
21,605,750 UART: [kat] LMS
22,135,297 UART: [kat] --
22,138,918 UART: [update-reset] ++
25,535,631 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,538,895 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,914,459 UART: [update-reset] Copying MAN_2 To MAN_1
25,936,792 UART: [update-reset Success] --
25,938,068 >>> mbox cmd response: success
25,938,291 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,941,255 UART: [state] Locking Datavault
25,945,585 UART: [state] Locking PCR0, PCR1 and PCR31
25,947,236 UART: [state] Locking ICCM
25,949,841 UART: [exit] Launching FMC @ 0x40000000
25,958,287 UART:
25,958,516 UART: Running Caliptra FMC ...
25,959,537 UART:
25,959,682 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,961,308 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,695,290 ready_for_fw is high
3,695,659 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,231,047 >>> mbox cmd response: success
18,464,306 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,605,379 UART:
18,605,745 UART: Running Caliptra FMC ...
18,606,855 UART:
18,607,009 UART: [fmc] Received command: 0x46574C44
25,490,387 >>> mbox cmd response: success
25,490,770 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,502,339 UART:
25,502,606 UART: Running Caliptra FMC ...
25,504,241 UART:
25,504,409 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,506,078 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,309 UART: [kat] SHA2-256
901,249 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,550 UART: [kat] LMS
1,168,862 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,174,149 ready_for_fw is high
1,174,149 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,281,142 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,977 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,538 >>> mbox cmd response: success
2,743,771 UART: [afmc] ++
2,743,939 UART: [afmc] CDI.KEYID = 6
2,744,302 UART: [afmc] SUBJECT.KEYID = 7
2,744,728 UART: [afmc] AUTHORITY.KEYID = 5
2,779,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,040 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,736 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,635 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,328 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,154 UART: [afmc] --
2,823,028 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,050 UART: [cold-reset] --
2,824,014 UART: [state] Locking Datavault
2,825,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,773 UART: [state] Locking ICCM
2,826,417 UART: [exit] Launching FMC @ 0x40000000
2,831,714 UART:
2,831,730 UART: Running Caliptra FMC ...
2,832,138 UART:
2,832,368 UART: [fmc] Received command: 0x46574C44
2,833,194 UART:
2,833,210 UART: Running Caliptra ROM ...
2,833,618 UART:
2,833,673 UART: [state] CFI Enabled
2,836,125 UART: [state] LifecycleState = Unprovisioned
2,836,780 UART: [state] DebugLocked = No
2,837,404 UART: [state] WD Timer not started. Device not locked for debugging
2,838,574 UART: [kat] SHA2-256
3,642,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,253 UART: [kat] ++
3,646,405 UART: [kat] sha1
3,650,681 UART: [kat] SHA2-256
3,652,621 UART: [kat] SHA2-384
3,655,402 UART: [kat] SHA2-512-ACC
3,657,302 UART: [kat] ECC-384
3,666,877 UART: [kat] HMAC-384Kdf
3,671,349 UART: [kat] LMS
3,919,661 UART: [kat] --
3,920,375 UART: [update-reset] ++
5,207,037 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,028 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,375 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,389 UART: [update-reset Success] --
5,364,798 >>> mbox cmd response: success
5,364,798 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,502 UART: [state] Locking Datavault
5,366,386 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,990 UART: [state] Locking ICCM
5,367,460 UART: [exit] Launching FMC @ 0x40000000
5,372,757 UART:
5,372,773 UART: Running Caliptra FMC ...
5,373,181 UART:
5,373,403 UART: [fmc] Received command: 0x1000000C
5,374,138 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,202 ready_for_fw is high
1,055,202 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,344 >>> mbox cmd response: success
2,646,987 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,126 UART:
2,653,142 UART: Running Caliptra FMC ...
2,653,550 UART:
2,653,780 UART: [fmc] Received command: 0x46574C44
5,066,695 >>> mbox cmd response: success
5,066,695 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,325 UART:
5,072,341 UART: Running Caliptra FMC ...
5,072,749 UART:
5,072,971 UART: [fmc] Received command: 0x1000000C
5,073,706 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,655 UART: [kat] LMS
1,169,967 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,216,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,652 UART: [fwproc] Recv command 0x46574c44
1,283,385 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,078 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,667 >>> mbox cmd response: success
2,743,732 UART: [afmc] ++
2,743,900 UART: [afmc] CDI.KEYID = 6
2,744,263 UART: [afmc] SUBJECT.KEYID = 7
2,744,689 UART: [afmc] AUTHORITY.KEYID = 5
2,780,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,757 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,453 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,352 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,045 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,883 UART: [afmc] --
2,823,897 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,919 UART: [cold-reset] --
2,824,569 UART: [state] Locking Datavault
2,825,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,234 UART: [state] Locking ICCM
2,826,884 UART: [exit] Launching FMC @ 0x40000000
2,832,181 UART:
2,832,197 UART: Running Caliptra FMC ...
2,832,605 UART:
2,832,835 UART: [fmc] Received command: 0x46574C44
2,833,661 UART:
2,833,677 UART: Running Caliptra ROM ...
2,834,085 UART:
2,834,227 UART: [state] CFI Enabled
2,837,159 UART: [state] LifecycleState = Unprovisioned
2,837,814 UART: [state] DebugLocked = No
2,838,510 UART: [state] WD Timer not started. Device not locked for debugging
2,839,854 UART: [kat] SHA2-256
3,643,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,533 UART: [kat] ++
3,647,685 UART: [kat] sha1
3,651,711 UART: [kat] SHA2-256
3,653,651 UART: [kat] SHA2-384
3,656,300 UART: [kat] SHA2-512-ACC
3,658,200 UART: [kat] ECC-384
3,667,635 UART: [kat] HMAC-384Kdf
3,672,267 UART: [kat] LMS
3,920,579 UART: [kat] --
3,921,401 UART: [update-reset] ++
5,205,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,036 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,355,521 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,535 UART: [update-reset Success] --
5,363,944 >>> mbox cmd response: success
5,363,944 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,364,632 UART: [state] Locking Datavault
5,365,358 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,962 UART: [state] Locking ICCM
5,366,434 UART: [exit] Launching FMC @ 0x40000000
5,371,731 UART:
5,371,747 UART: Running Caliptra FMC ...
5,372,155 UART:
5,372,377 UART: [fmc] Received command: 0x1000000C
5,373,112 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,723 >>> mbox cmd response: success
2,650,722 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,657,127 UART:
2,657,143 UART: Running Caliptra FMC ...
2,657,551 UART:
2,657,781 UART: [fmc] Received command: 0x46574C44
5,071,595 >>> mbox cmd response: success
5,071,595 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,077,311 UART:
5,077,327 UART: Running Caliptra FMC ...
5,077,735 UART:
5,077,957 UART: [fmc] Received command: 0x1000000C
5,078,692 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,097 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,173,903 ready_for_fw is high
1,173,903 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,271 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,060 >>> mbox cmd response: success
2,744,241 UART: [afmc] ++
2,744,409 UART: [afmc] CDI.KEYID = 6
2,744,772 UART: [afmc] SUBJECT.KEYID = 7
2,745,198 UART: [afmc] AUTHORITY.KEYID = 5
2,781,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,498 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,194 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,093 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,786 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,670 UART: [afmc] --
2,824,662 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,684 UART: [cold-reset] --
2,825,766 UART: [state] Locking Datavault
2,827,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,737 UART: [state] Locking ICCM
2,828,225 UART: [exit] Launching FMC @ 0x40000000
2,833,522 UART:
2,833,538 UART: Running Caliptra FMC ...
2,833,946 UART:
2,834,176 UART: [fmc] Received command: 0x46574C44
2,835,002 UART:
2,835,018 UART: Running Caliptra ROM ...
2,835,426 UART:
2,835,481 UART: [state] CFI Enabled
2,838,385 UART: [state] LifecycleState = Unprovisioned
2,839,040 UART: [state] DebugLocked = No
2,839,570 UART: [state] WD Timer not started. Device not locked for debugging
2,840,916 UART: [kat] SHA2-256
3,644,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,595 UART: [kat] ++
3,648,747 UART: [kat] sha1
3,652,917 UART: [kat] SHA2-256
3,654,857 UART: [kat] SHA2-384
3,657,482 UART: [kat] SHA2-512-ACC
3,659,382 UART: [kat] ECC-384
3,669,207 UART: [kat] HMAC-384Kdf
3,673,769 UART: [kat] LMS
3,922,081 UART: [kat] --
3,923,167 UART: [update-reset] ++
5,207,661 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,726 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,261 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,275 UART: [update-reset Success] --
5,365,684 >>> mbox cmd response: success
5,365,684 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,456 UART: [state] Locking Datavault
5,367,236 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,840 UART: [state] Locking ICCM
5,368,428 UART: [exit] Launching FMC @ 0x40000000
5,373,725 UART:
5,373,741 UART: Running Caliptra FMC ...
5,374,149 UART:
5,374,371 UART: [fmc] Received command: 0x1000000C
5,375,106 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,994 ready_for_fw is high
1,055,994 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,332 >>> mbox cmd response: success
2,648,671 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,790 UART:
2,654,806 UART: Running Caliptra FMC ...
2,655,214 UART:
2,655,444 UART: [fmc] Received command: 0x46574C44
5,067,425 >>> mbox cmd response: success
5,067,425 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,169 UART:
5,073,185 UART: Running Caliptra FMC ...
5,073,593 UART:
5,073,815 UART: [fmc] Received command: 0x1000000C
5,074,550 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,174,950 ready_for_fw is high
1,174,950 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,328 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,299 UART: [ldev] ++
1,210,467 UART: [ldev] CDI.KEYID = 6
1,210,831 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,217,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,659 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,788 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,473 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,559 >>> mbox cmd response: success
2,745,768 UART: [afmc] ++
2,745,936 UART: [afmc] CDI.KEYID = 6
2,746,299 UART: [afmc] SUBJECT.KEYID = 7
2,746,725 UART: [afmc] AUTHORITY.KEYID = 5
2,782,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,045 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,741 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,640 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,333 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,219 UART: [afmc] --
2,826,185 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,826,207 UART: [cold-reset] --
2,827,013 UART: [state] Locking Datavault
2,828,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,736 UART: [state] Locking ICCM
2,829,402 UART: [exit] Launching FMC @ 0x40000000
2,834,699 UART:
2,834,715 UART: Running Caliptra FMC ...
2,835,123 UART:
2,835,353 UART: [fmc] Received command: 0x46574C44
2,836,179 UART:
2,836,195 UART: Running Caliptra ROM ...
2,836,603 UART:
2,836,745 UART: [state] CFI Enabled
2,839,581 UART: [state] LifecycleState = Unprovisioned
2,840,236 UART: [state] DebugLocked = No
2,840,832 UART: [state] WD Timer not started. Device not locked for debugging
2,842,156 UART: [kat] SHA2-256
3,645,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,649,835 UART: [kat] ++
3,649,987 UART: [kat] sha1
3,654,309 UART: [kat] SHA2-256
3,656,249 UART: [kat] SHA2-384
3,659,156 UART: [kat] SHA2-512-ACC
3,661,056 UART: [kat] ECC-384
3,671,069 UART: [kat] HMAC-384Kdf
3,675,721 UART: [kat] LMS
3,924,033 UART: [kat] --
3,924,915 UART: [update-reset] ++
5,209,999 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,211,050 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,359,421 UART: [update-reset] Copying MAN_2 To MAN_1
5,367,435 UART: [update-reset Success] --
5,367,844 >>> mbox cmd response: success
5,367,844 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,368,330 UART: [state] Locking Datavault
5,369,054 UART: [state] Locking PCR0, PCR1 and PCR31
5,369,658 UART: [state] Locking ICCM
5,370,130 UART: [exit] Launching FMC @ 0x40000000
5,375,427 UART:
5,375,443 UART: Running Caliptra FMC ...
5,375,851 UART:
5,376,073 UART: [fmc] Received command: 0x1000000C
5,376,808 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,017 ready_for_fw is high
1,056,017 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,663 >>> mbox cmd response: success
2,649,870 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,989 UART:
2,656,005 UART: Running Caliptra FMC ...
2,656,413 UART:
2,656,643 UART: [fmc] Received command: 0x46574C44
5,069,307 >>> mbox cmd response: success
5,069,307 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,075,165 UART:
5,075,181 UART: Running Caliptra FMC ...
5,075,589 UART:
5,075,811 UART: [fmc] Received command: 0x1000000C
5,076,546 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,174,131 ready_for_fw is high
1,174,131 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,115 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,836 >>> mbox cmd response: success
2,743,069 UART: [afmc] ++
2,743,237 UART: [afmc] CDI.KEYID = 6
2,743,600 UART: [afmc] SUBJECT.KEYID = 7
2,744,026 UART: [afmc] AUTHORITY.KEYID = 5
2,779,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,844 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,540 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,439 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,132 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,144 UART: [afmc] --
2,823,098 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,120 UART: [cold-reset] --
2,823,914 UART: [state] Locking Datavault
2,825,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,711 UART: [state] Locking ICCM
2,826,273 UART: [exit] Launching FMC @ 0x40000000
2,831,570 UART:
2,831,586 UART: Running Caliptra FMC ...
2,831,994 UART:
2,832,224 UART: [fmc] Received command: 0x46574C44
2,833,050 UART:
2,833,066 UART: Running Caliptra ROM ...
2,833,474 UART:
2,833,529 UART: [state] CFI Enabled
2,836,557 UART: [state] LifecycleState = Unprovisioned
2,837,212 UART: [state] DebugLocked = No
2,837,786 UART: [state] WD Timer not started. Device not locked for debugging
2,838,976 UART: [kat] SHA2-256
3,642,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,655 UART: [kat] ++
3,646,807 UART: [kat] sha1
3,651,095 UART: [kat] SHA2-256
3,653,035 UART: [kat] SHA2-384
3,655,802 UART: [kat] SHA2-512-ACC
3,657,702 UART: [kat] ECC-384
3,667,565 UART: [kat] HMAC-384Kdf
3,672,209 UART: [kat] LMS
3,920,521 UART: [kat] --
3,921,319 UART: [update-reset] ++
5,207,309 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,669 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,683 UART: [update-reset Success] --
5,365,092 >>> mbox cmd response: success
5,365,092 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,536 UART: [state] Locking Datavault
5,366,156 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,760 UART: [state] Locking ICCM
5,367,242 UART: [exit] Launching FMC @ 0x40000000
5,372,539 UART:
5,372,555 UART: Running Caliptra FMC ...
5,372,963 UART:
5,373,185 UART: [fmc] Received command: 0x1000000C
5,373,920 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 ready_for_fw is high
1,056,314 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,732 >>> mbox cmd response: success
2,648,481 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,450 UART:
2,654,466 UART: Running Caliptra FMC ...
2,654,874 UART:
2,655,104 UART: [fmc] Received command: 0x46574C44
5,068,383 >>> mbox cmd response: success
5,068,383 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,941 UART:
5,073,957 UART: Running Caliptra FMC ...
5,074,365 UART:
5,074,587 UART: [fmc] Received command: 0x1000000C
5,075,322 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,674 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,854 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,659 UART: [ldev] ++
1,208,827 UART: [ldev] CDI.KEYID = 6
1,209,191 UART: [ldev] SUBJECT.KEYID = 5
1,209,618 UART: [ldev] AUTHORITY.KEYID = 7
1,210,081 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,309 UART: [ldev] --
1,280,821 UART: [fwproc] Wait for Commands...
1,281,516 UART: [fwproc] Recv command 0x46574c44
1,282,249 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,840 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,455 >>> mbox cmd response: success
2,742,484 UART: [afmc] ++
2,742,652 UART: [afmc] CDI.KEYID = 6
2,743,015 UART: [afmc] SUBJECT.KEYID = 7
2,743,441 UART: [afmc] AUTHORITY.KEYID = 5
2,779,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,523 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,219 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,118 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,811 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,841 UART: [afmc] --
2,822,715 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,737 UART: [cold-reset] --
2,823,605 UART: [state] Locking Datavault
2,824,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,436 UART: [state] Locking ICCM
2,826,030 UART: [exit] Launching FMC @ 0x40000000
2,831,327 UART:
2,831,343 UART: Running Caliptra FMC ...
2,831,751 UART:
2,831,981 UART: [fmc] Received command: 0x46574C44
2,832,807 UART:
2,832,823 UART: Running Caliptra ROM ...
2,833,231 UART:
2,833,373 UART: [state] CFI Enabled
2,836,401 UART: [state] LifecycleState = Unprovisioned
2,837,056 UART: [state] DebugLocked = No
2,837,714 UART: [state] WD Timer not started. Device not locked for debugging
2,838,820 UART: [kat] SHA2-256
3,642,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,499 UART: [kat] ++
3,646,651 UART: [kat] sha1
3,651,115 UART: [kat] SHA2-256
3,653,055 UART: [kat] SHA2-384
3,655,922 UART: [kat] SHA2-512-ACC
3,657,822 UART: [kat] ECC-384
3,667,649 UART: [kat] HMAC-384Kdf
3,672,137 UART: [kat] LMS
3,920,449 UART: [kat] --
3,921,423 UART: [update-reset] ++
5,206,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,026 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,497 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,511 UART: [update-reset Success] --
5,364,920 >>> mbox cmd response: success
5,364,920 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,584 UART: [state] Locking Datavault
5,366,364 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,968 UART: [state] Locking ICCM
5,367,472 UART: [exit] Launching FMC @ 0x40000000
5,372,769 UART:
5,372,785 UART: Running Caliptra FMC ...
5,373,193 UART:
5,373,415 UART: [fmc] Received command: 0x1000000C
5,374,150 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,543 ready_for_fw is high
1,055,543 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,461 >>> mbox cmd response: success
2,647,934 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,623 UART:
2,653,639 UART: Running Caliptra FMC ...
2,654,047 UART:
2,654,277 UART: [fmc] Received command: 0x46574C44
5,066,147 >>> mbox cmd response: success
5,066,147 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,005 UART:
5,072,021 UART: Running Caliptra FMC ...
5,072,429 UART:
5,072,651 UART: [fmc] Received command: 0x1000000C
5,073,386 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,401 UART:
192,755 UART: Running Caliptra ROM ...
193,940 UART:
194,092 UART: [state] CFI Enabled
262,619 UART: [state] LifecycleState = Unprovisioned
264,963 UART: [state] DebugLocked = No
267,419 UART: [state] WD Timer not started. Device not locked for debugging
272,732 UART: [kat] SHA2-256
454,643 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,242 UART: [kat] ++
466,734 UART: [kat] sha1
477,827 UART: [kat] SHA2-256
480,838 UART: [kat] SHA2-384
485,049 UART: [kat] SHA2-512-ACC
487,671 UART: [kat] ECC-384
3,773,666 UART: [kat] HMAC-384Kdf
3,802,808 UART: [kat] LMS
4,875,982 UART: [kat] --
4,881,921 UART: [cold-reset] ++
4,884,776 UART: [fht] FHT @ 0x50003400
4,896,884 UART: [idev] ++
4,897,594 UART: [idev] CDI.KEYID = 6
4,898,765 UART: [idev] SUBJECT.KEYID = 7
4,899,933 UART: [idev] UDS.KEYID = 0
4,900,860 ready_for_fw is high
4,901,066 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,041,661 UART: [idev] Erasing UDS.KEYID = 0
8,241,865 UART: [idev] Sha1 KeyId Algorithm
8,264,794 UART: [idev] --
8,270,039 UART: [ldev] ++
8,270,610 UART: [ldev] CDI.KEYID = 6
8,271,796 UART: [ldev] SUBJECT.KEYID = 5
8,272,953 UART: [ldev] AUTHORITY.KEYID = 7
8,274,180 UART: [ldev] FE.KEYID = 1
8,318,331 UART: [ldev] Erasing FE.KEYID = 1
11,655,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,468 UART: [ldev] --
14,036,210 UART: [fwproc] Wait for Commands...
14,039,119 UART: [fwproc] Recv command 0x46574c44
14,041,434 UART: [fwproc] Recv'd Img size: 111688 bytes
18,087,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,164,760 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,225,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,541,338 >>> mbox cmd response: success
18,545,860 UART: [afmc] ++
18,546,493 UART: [afmc] CDI.KEYID = 6
18,547,612 UART: [afmc] SUBJECT.KEYID = 7
18,548,779 UART: [afmc] AUTHORITY.KEYID = 5
21,906,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,199,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,202,196 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,218,365 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,234,472 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,250,313 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,271,949 UART: [afmc] --
26,335,764 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,501,503 UART: [cold-reset] --
26,502,451 UART: [state] Locking Datavault
26,503,577 UART: [state] Locking PCR0, PCR1 and PCR31
26,505,119 UART: [state] Locking ICCM
26,506,027 UART: [exit] Launching FMC @ 0x40000000
26,507,452 UART:
26,507,614 UART: Running Caliptra FMC ...
26,508,733 UART:
26,508,891 UART: [fmc] Received command: 0x46574C44
26,510,351 UART:
26,510,503 UART: Running Caliptra ROM ...
26,511,596 UART:
26,511,748 UART: [state] CFI Enabled
26,567,060 UART: [state] LifecycleState = Unprovisioned
26,568,944 UART: [state] DebugLocked = No
26,570,442 UART: [state] WD Timer not started. Device not locked for debugging
26,575,529 UART: [kat] SHA2-256
26,757,446 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,768,945 UART: [kat] ++
26,769,458 UART: [kat] sha1
26,780,344 UART: [kat] SHA2-256
26,783,354 UART: [kat] SHA2-384
26,789,278 UART: [kat] SHA2-512-ACC
26,791,850 UART: [kat] ECC-384
30,078,657 UART: [kat] HMAC-384Kdf
30,103,704 UART: [kat] LMS
31,176,861 UART: [kat] --
31,182,578 UART: [update-reset] ++
35,490,590 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,494,792 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,936,335 >>> mbox cmd response: success
35,938,316 UART: [update-reset] Copying MAN_2 To MAN_1
35,961,192 UART: [update-reset Success] --
35,969,051 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,126,440 UART: [state] Locking Datavault
36,127,738 UART: [state] Locking PCR0, PCR1 and PCR31
36,129,295 UART: [state] Locking ICCM
36,130,182 UART: [exit] Launching FMC @ 0x40000000
36,131,622 UART:
36,131,779 UART: Running Caliptra FMC ...
36,132,873 UART:
36,133,024 UART: [fmc] Received command: 0x1000000E
36,910,825 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
4,804,156 ready_for_fw is high
4,804,597 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,305,577 >>> mbox cmd response: success
26,040,349 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,206,130 UART:
26,206,562 UART: Running Caliptra FMC ...
26,207,671 UART:
26,207,833 UART: [fmc] Received command: 0x46574C44
35,516,834 >>> mbox cmd response: success
35,544,603 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,702,072 UART:
35,702,417 UART: Running Caliptra FMC ...
35,703,635 UART:
35,703,804 UART: [fmc] Received command: 0x1000000E
36,486,446 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,526 UART:
192,897 UART: Running Caliptra ROM ...
194,093 UART:
603,791 UART: [state] CFI Enabled
619,428 UART: [state] LifecycleState = Unprovisioned
621,793 UART: [state] DebugLocked = No
624,031 UART: [state] WD Timer not started. Device not locked for debugging
629,133 UART: [kat] SHA2-256
811,101 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,600 UART: [kat] ++
823,196 UART: [kat] sha1
833,289 UART: [kat] SHA2-256
836,315 UART: [kat] SHA2-384
841,983 UART: [kat] SHA2-512-ACC
844,568 UART: [kat] ECC-384
4,101,709 UART: [kat] HMAC-384Kdf
4,112,598 UART: [kat] LMS
5,185,749 UART: [kat] --
5,189,183 UART: [cold-reset] ++
5,190,470 UART: [fht] FHT @ 0x50003400
5,202,013 UART: [idev] ++
5,202,712 UART: [idev] CDI.KEYID = 6
5,203,949 UART: [idev] SUBJECT.KEYID = 7
5,205,399 UART: [idev] UDS.KEYID = 0
5,206,600 ready_for_fw is high
5,206,787 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,347,092 UART: [idev] Erasing UDS.KEYID = 0
8,499,533 UART: [idev] Sha1 KeyId Algorithm
8,521,518 UART: [idev] --
8,526,462 UART: [ldev] ++
8,527,031 UART: [ldev] CDI.KEYID = 6
8,528,137 UART: [ldev] SUBJECT.KEYID = 5
8,529,661 UART: [ldev] AUTHORITY.KEYID = 7
8,531,182 UART: [ldev] FE.KEYID = 1
8,543,002 UART: [ldev] Erasing FE.KEYID = 1
11,833,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,250 UART: [ldev] --
14,197,626 UART: [fwproc] Wait for Commands...
14,200,680 UART: [fwproc] Recv command 0x46574c44
14,203,000 UART: [fwproc] Recv'd Img size: 111688 bytes
18,245,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,321,377 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,381,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,697,797 >>> mbox cmd response: success
18,702,776 UART: [afmc] ++
18,703,390 UART: [afmc] CDI.KEYID = 6
18,704,576 UART: [afmc] SUBJECT.KEYID = 7
18,705,678 UART: [afmc] AUTHORITY.KEYID = 5
22,021,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,315,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,317,987 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,334,158 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,350,271 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,366,134 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,388,014 UART: [afmc] --
26,449,577 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,615,306 UART: [cold-reset] --
26,616,262 UART: [state] Locking Datavault
26,617,423 UART: [state] Locking PCR0, PCR1 and PCR31
26,618,961 UART: [state] Locking ICCM
26,619,881 UART: [exit] Launching FMC @ 0x40000000
26,621,316 UART:
26,621,493 UART: Running Caliptra FMC ...
26,622,594 UART:
26,622,744 UART: [fmc] Received command: 0x46574C44
26,624,207 UART:
26,624,356 UART: Running Caliptra ROM ...
26,625,360 UART:
26,625,496 UART: [state] CFI Enabled
26,635,127 UART: [state] LifecycleState = Unprovisioned
26,636,954 UART: [state] DebugLocked = No
26,638,953 UART: [state] WD Timer not started. Device not locked for debugging
26,642,806 UART: [kat] SHA2-256
26,824,758 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,836,291 UART: [kat] ++
26,836,756 UART: [kat] sha1
26,848,614 UART: [kat] SHA2-256
26,851,633 UART: [kat] SHA2-384
26,857,416 UART: [kat] SHA2-512-ACC
26,860,037 UART: [kat] ECC-384
30,113,575 UART: [kat] HMAC-384Kdf
30,125,709 UART: [kat] LMS
31,198,846 UART: [kat] --
31,204,645 UART: [update-reset] ++
35,512,604 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,516,319 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,957,818 >>> mbox cmd response: success
35,958,610 UART: [update-reset] Copying MAN_2 To MAN_1
35,981,490 UART: [update-reset Success] --
35,989,051 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,146,429 UART: [state] Locking Datavault
36,147,668 UART: [state] Locking PCR0, PCR1 and PCR31
36,149,219 UART: [state] Locking ICCM
36,150,154 UART: [exit] Launching FMC @ 0x40000000
36,151,572 UART:
36,151,727 UART: Running Caliptra FMC ...
36,152,814 UART:
36,152,966 UART: [fmc] Received command: 0x1000000E
36,930,840 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,105,516 ready_for_fw is high
5,105,924 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,507,813 >>> mbox cmd response: success
26,187,859 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,353,646 UART:
26,354,082 UART: Running Caliptra FMC ...
26,355,200 UART:
26,355,365 UART: [fmc] Received command: 0x46574C44
35,580,953 >>> mbox cmd response: success
35,608,223 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,766,018 UART:
35,766,363 UART: Running Caliptra FMC ...
35,767,597 UART:
35,767,768 UART: [fmc] Received command: 0x1000000E
36,550,460 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,422 UART:
192,789 UART: Running Caliptra ROM ...
193,999 UART:
194,154 UART: [state] CFI Enabled
258,504 UART: [state] LifecycleState = Unprovisioned
260,430 UART: [state] DebugLocked = No
262,469 UART: [state] WD Timer not started. Device not locked for debugging
265,742 UART: [kat] SHA2-256
444,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,431 UART: [kat] ++
456,902 UART: [kat] sha1
467,065 UART: [kat] SHA2-256
470,085 UART: [kat] SHA2-384
476,164 UART: [kat] SHA2-512-ACC
479,173 UART: [kat] ECC-384
2,926,539 UART: [kat] HMAC-384Kdf
2,949,660 UART: [kat] LMS
3,479,100 UART: [kat] --
3,485,273 UART: [cold-reset] ++
3,486,994 UART: [fht] FHT @ 0x50003400
3,497,998 UART: [idev] ++
3,498,609 UART: [idev] CDI.KEYID = 6
3,499,544 UART: [idev] SUBJECT.KEYID = 7
3,500,744 UART: [idev] UDS.KEYID = 0
3,501,675 ready_for_fw is high
3,501,896 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,642,692 UART: [idev] Erasing UDS.KEYID = 0
6,005,477 UART: [idev] Sha1 KeyId Algorithm
6,028,509 UART: [idev] --
6,032,672 UART: [ldev] ++
6,033,246 UART: [ldev] CDI.KEYID = 6
6,034,134 UART: [ldev] SUBJECT.KEYID = 5
6,035,348 UART: [ldev] AUTHORITY.KEYID = 7
6,036,585 UART: [ldev] FE.KEYID = 1
6,078,690 UART: [ldev] Erasing FE.KEYID = 1
8,582,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,030 UART: [ldev] --
10,392,099 UART: [fwproc] Wait for Commands...
10,393,821 UART: [fwproc] Recv command 0x46574c44
10,395,915 UART: [fwproc] Recv'd Img size: 112032 bytes
13,767,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,844,601 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,904,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,222,772 >>> mbox cmd response: success
14,227,559 UART: [afmc] ++
14,228,179 UART: [afmc] CDI.KEYID = 6
14,229,067 UART: [afmc] SUBJECT.KEYID = 7
14,230,172 UART: [afmc] AUTHORITY.KEYID = 5
16,763,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,486,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,488,772 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,504,829 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,520,854 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,536,583 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,559,304 UART: [afmc] --
20,627,770 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,793,879 UART: [cold-reset] --
20,794,816 UART: [state] Locking Datavault
20,795,914 UART: [state] Locking PCR0, PCR1 and PCR31
20,797,464 UART: [state] Locking ICCM
20,798,346 UART: [exit] Launching FMC @ 0x40000000
20,799,713 UART:
20,799,863 UART: Running Caliptra FMC ...
20,800,911 UART:
20,801,060 UART: [fmc] Received command: 0x46574C44
20,802,535 UART:
20,802,687 UART: Running Caliptra ROM ...
20,803,727 UART:
20,803,871 UART: [state] CFI Enabled
20,867,619 UART: [state] LifecycleState = Unprovisioned
20,869,500 UART: [state] DebugLocked = No
20,871,997 UART: [state] WD Timer not started. Device not locked for debugging
20,875,468 UART: [kat] SHA2-256
21,054,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,066,169 UART: [kat] ++
21,066,630 UART: [kat] sha1
21,078,538 UART: [kat] SHA2-256
21,081,570 UART: [kat] SHA2-384
21,087,504 UART: [kat] SHA2-512-ACC
21,090,459 UART: [kat] ECC-384
23,552,444 UART: [kat] HMAC-384Kdf
23,575,207 UART: [kat] LMS
24,104,703 UART: [kat] --
24,110,104 UART: [update-reset] ++
27,743,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,747,518 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,189,069 >>> mbox cmd response: success
28,190,779 UART: [update-reset] Copying MAN_2 To MAN_1
28,213,113 UART: [update-reset Success] --
28,220,809 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,378,223 UART: [state] Locking Datavault
28,379,443 UART: [state] Locking PCR0, PCR1 and PCR31
28,381,015 UART: [state] Locking ICCM
28,381,909 UART: [exit] Launching FMC @ 0x40000000
28,383,258 UART:
28,383,403 UART: Running Caliptra FMC ...
28,384,461 UART:
28,384,606 UART: [fmc] Received command: 0x1000000E
29,162,660 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,381,923 ready_for_fw is high
3,382,315 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,050,331 >>> mbox cmd response: success
20,387,293 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,553,031 UART:
20,553,443 UART: Running Caliptra FMC ...
20,554,576 UART:
20,554,741 UART: [fmc] Received command: 0x46574C44
27,805,007 >>> mbox cmd response: success
27,832,497 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,989,969 UART:
27,990,308 UART: Running Caliptra FMC ...
27,991,431 UART:
27,991,583 UART: [fmc] Received command: 0x1000000E
28,774,391 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,505 UART:
192,875 UART: Running Caliptra ROM ...
194,059 UART:
603,801 UART: [state] CFI Enabled
617,043 UART: [state] LifecycleState = Unprovisioned
618,933 UART: [state] DebugLocked = No
621,808 UART: [state] WD Timer not started. Device not locked for debugging
625,915 UART: [kat] SHA2-256
805,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,641 UART: [kat] ++
817,171 UART: [kat] sha1
828,049 UART: [kat] SHA2-256
831,135 UART: [kat] SHA2-384
837,542 UART: [kat] SHA2-512-ACC
840,492 UART: [kat] ECC-384
3,281,744 UART: [kat] HMAC-384Kdf
3,295,041 UART: [kat] LMS
3,824,534 UART: [kat] --
3,827,887 UART: [cold-reset] ++
3,828,856 UART: [fht] FHT @ 0x50003400
3,839,848 UART: [idev] ++
3,840,410 UART: [idev] CDI.KEYID = 6
3,841,289 UART: [idev] SUBJECT.KEYID = 7
3,842,532 UART: [idev] UDS.KEYID = 0
3,843,467 ready_for_fw is high
3,843,650 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,984,210 UART: [idev] Erasing UDS.KEYID = 0
6,320,643 UART: [idev] Sha1 KeyId Algorithm
6,343,404 UART: [idev] --
6,346,266 UART: [ldev] ++
6,346,852 UART: [ldev] CDI.KEYID = 6
6,347,738 UART: [ldev] SUBJECT.KEYID = 5
6,348,892 UART: [ldev] AUTHORITY.KEYID = 7
6,350,227 UART: [ldev] FE.KEYID = 1
6,361,059 UART: [ldev] Erasing FE.KEYID = 1
8,835,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,119 UART: [ldev] --
10,625,322 UART: [fwproc] Wait for Commands...
10,626,870 UART: [fwproc] Recv command 0x46574c44
10,628,984 UART: [fwproc] Recv'd Img size: 112032 bytes
14,000,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,074,218 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,134,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,453,289 >>> mbox cmd response: success
14,458,444 UART: [afmc] ++
14,459,057 UART: [afmc] CDI.KEYID = 6
14,459,945 UART: [afmc] SUBJECT.KEYID = 7
14,461,102 UART: [afmc] AUTHORITY.KEYID = 5
16,960,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,682,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,684,244 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,700,337 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,716,399 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,732,067 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,753,924 UART: [afmc] --
20,814,840 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,981,026 UART: [cold-reset] --
20,981,984 UART: [state] Locking Datavault
20,983,153 UART: [state] Locking PCR0, PCR1 and PCR31
20,984,696 UART: [state] Locking ICCM
20,985,613 UART: [exit] Launching FMC @ 0x40000000
20,987,040 UART:
20,987,208 UART: Running Caliptra FMC ...
20,988,314 UART:
20,988,468 UART: [fmc] Received command: 0x46574C44
20,989,937 UART:
20,990,086 UART: Running Caliptra ROM ...
20,991,135 UART:
20,991,303 UART: [state] CFI Enabled
20,994,720 UART: [state] LifecycleState = Unprovisioned
20,996,546 UART: [state] DebugLocked = No
20,997,900 UART: [state] WD Timer not started. Device not locked for debugging
21,002,283 UART: [kat] SHA2-256
21,181,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,193,052 UART: [kat] ++
21,193,516 UART: [kat] sha1
21,203,428 UART: [kat] SHA2-256
21,206,442 UART: [kat] SHA2-384
21,212,710 UART: [kat] SHA2-512-ACC
21,215,650 UART: [kat] ECC-384
23,656,517 UART: [kat] HMAC-384Kdf
23,668,579 UART: [kat] LMS
24,198,095 UART: [kat] --
24,200,467 UART: [update-reset] ++
27,839,800 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,842,538 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,284,070 >>> mbox cmd response: success
28,284,792 UART: [update-reset] Copying MAN_2 To MAN_1
28,307,125 UART: [update-reset Success] --
28,314,000 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,471,386 UART: [state] Locking Datavault
28,472,613 UART: [state] Locking PCR0, PCR1 and PCR31
28,474,168 UART: [state] Locking ICCM
28,475,054 UART: [exit] Launching FMC @ 0x40000000
28,476,394 UART:
28,476,546 UART: Running Caliptra FMC ...
28,477,648 UART:
28,477,805 UART: [fmc] Received command: 0x1000000E
29,255,815 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,698,281 ready_for_fw is high
3,698,667 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,637 >>> mbox cmd response: success
20,526,147 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,691,861 UART:
20,692,281 UART: Running Caliptra FMC ...
20,693,452 UART:
20,693,623 UART: [fmc] Received command: 0x46574C44
27,851,267 >>> mbox cmd response: success
27,877,832 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,035,234 UART:
28,035,573 UART: Running Caliptra FMC ...
28,036,774 UART:
28,036,948 UART: [fmc] Received command: 0x1000000E
28,819,670 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,145 UART:
192,501 UART: Running Caliptra ROM ...
193,643 UART:
193,789 UART: [state] CFI Enabled
263,827 UART: [state] LifecycleState = Unprovisioned
265,729 UART: [state] DebugLocked = No
267,265 UART: [state] WD Timer not started. Device not locked for debugging
270,328 UART: [kat] SHA2-256
449,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,032 UART: [kat] ++
461,564 UART: [kat] sha1
472,585 UART: [kat] SHA2-256
475,655 UART: [kat] SHA2-384
481,148 UART: [kat] SHA2-512-ACC
484,091 UART: [kat] ECC-384
2,951,510 UART: [kat] HMAC-384Kdf
2,973,840 UART: [kat] LMS
3,503,288 UART: [kat] --
3,507,069 UART: [cold-reset] ++
3,508,431 UART: [fht] FHT @ 0x50003400
3,520,195 UART: [idev] ++
3,520,754 UART: [idev] CDI.KEYID = 6
3,521,634 UART: [idev] SUBJECT.KEYID = 7
3,522,907 UART: [idev] UDS.KEYID = 0
3,523,808 ready_for_fw is high
3,523,994 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,665,269 UART: [idev] Erasing UDS.KEYID = 0
6,030,071 UART: [idev] Sha1 KeyId Algorithm
6,053,142 UART: [idev] --
6,056,575 UART: [ldev] ++
6,057,159 UART: [ldev] CDI.KEYID = 6
6,058,047 UART: [ldev] SUBJECT.KEYID = 5
6,059,272 UART: [ldev] AUTHORITY.KEYID = 7
6,060,522 UART: [ldev] FE.KEYID = 1
6,103,553 UART: [ldev] Erasing FE.KEYID = 1
8,608,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,249 UART: [ldev] --
10,418,511 UART: [fwproc] Wait for Commands...
10,421,629 UART: [fwproc] Recv command 0x46574c44
10,423,728 UART: [fwproc] Recv'd Img size: 112032 bytes
13,797,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,243 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,932,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,251,255 >>> mbox cmd response: success
14,254,968 UART: [afmc] ++
14,255,580 UART: [afmc] CDI.KEYID = 6
14,256,491 UART: [afmc] SUBJECT.KEYID = 7
14,257,658 UART: [afmc] AUTHORITY.KEYID = 5
16,789,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,515,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,517,744 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,533,813 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,549,852 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,565,533 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,587,502 UART: [afmc] --
20,649,230 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,815,063 UART: [cold-reset] --
20,816,013 UART: [state] Locking Datavault
20,817,186 UART: [state] Locking PCR0, PCR1 and PCR31
20,818,728 UART: [state] Locking ICCM
20,819,648 UART: [exit] Launching FMC @ 0x40000000
20,821,102 UART:
20,821,270 UART: Running Caliptra FMC ...
20,822,376 UART:
20,822,534 UART: [fmc] Received command: 0x46574C44
20,824,001 UART:
20,824,164 UART: Running Caliptra ROM ...
20,825,265 UART:
20,825,419 UART: [state] CFI Enabled
20,880,089 UART: [state] LifecycleState = Unprovisioned
20,881,973 UART: [state] DebugLocked = No
20,884,413 UART: [state] WD Timer not started. Device not locked for debugging
20,887,614 UART: [kat] SHA2-256
21,066,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,078,321 UART: [kat] ++
21,078,783 UART: [kat] sha1
21,089,019 UART: [kat] SHA2-256
21,092,053 UART: [kat] SHA2-384
21,098,479 UART: [kat] SHA2-512-ACC
21,101,433 UART: [kat] ECC-384
23,564,471 UART: [kat] HMAC-384Kdf
23,586,425 UART: [kat] LMS
24,115,926 UART: [kat] --
24,120,806 UART: [update-reset] ++
27,756,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,760,041 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,201,602 >>> mbox cmd response: success
28,202,334 UART: [update-reset] Copying MAN_2 To MAN_1
28,224,684 UART: [update-reset Success] --
28,232,279 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,389,703 UART: [state] Locking Datavault
28,390,928 UART: [state] Locking PCR0, PCR1 and PCR31
28,392,500 UART: [state] Locking ICCM
28,393,424 UART: [exit] Launching FMC @ 0x40000000
28,394,851 UART:
28,395,013 UART: Running Caliptra FMC ...
28,396,117 UART:
28,396,271 UART: [fmc] Received command: 0x1000000E
29,174,151 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,384,785 ready_for_fw is high
3,385,187 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,034,359 >>> mbox cmd response: success
20,363,400 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,529,047 UART:
20,529,510 UART: Running Caliptra FMC ...
20,530,720 UART:
20,530,903 UART: [fmc] Received command: 0x46574C44
27,786,249 >>> mbox cmd response: success
27,813,172 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,971,011 UART:
27,971,355 UART: Running Caliptra FMC ...
27,972,558 UART:
27,972,729 UART: [fmc] Received command: 0x1000000E
28,755,401 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,489 UART:
192,871 UART: Running Caliptra ROM ...
193,989 UART:
603,623 UART: [state] CFI Enabled
617,237 UART: [state] LifecycleState = Unprovisioned
619,070 UART: [state] DebugLocked = No
621,528 UART: [state] WD Timer not started. Device not locked for debugging
625,713 UART: [kat] SHA2-256
804,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,400 UART: [kat] ++
817,068 UART: [kat] sha1
829,517 UART: [kat] SHA2-256
832,595 UART: [kat] SHA2-384
837,801 UART: [kat] SHA2-512-ACC
840,729 UART: [kat] ECC-384
3,277,630 UART: [kat] HMAC-384Kdf
3,289,380 UART: [kat] LMS
3,818,892 UART: [kat] --
3,825,345 UART: [cold-reset] ++
3,827,784 UART: [fht] FHT @ 0x50003400
3,839,402 UART: [idev] ++
3,839,966 UART: [idev] CDI.KEYID = 6
3,840,997 UART: [idev] SUBJECT.KEYID = 7
3,842,098 UART: [idev] UDS.KEYID = 0
3,843,029 ready_for_fw is high
3,843,232 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,984,041 UART: [idev] Erasing UDS.KEYID = 0
6,318,213 UART: [idev] Sha1 KeyId Algorithm
6,341,597 UART: [idev] --
6,345,022 UART: [ldev] ++
6,345,600 UART: [ldev] CDI.KEYID = 6
6,346,510 UART: [ldev] SUBJECT.KEYID = 5
6,347,723 UART: [ldev] AUTHORITY.KEYID = 7
6,348,968 UART: [ldev] FE.KEYID = 1
6,360,098 UART: [ldev] Erasing FE.KEYID = 1
8,834,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,583 UART: [ldev] --
10,623,685 UART: [fwproc] Wait for Commands...
10,625,233 UART: [fwproc] Recv command 0x46574c44
10,627,327 UART: [fwproc] Recv'd Img size: 112032 bytes
14,000,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,078,827 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,139,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,456,807 >>> mbox cmd response: success
14,460,905 UART: [afmc] ++
14,461,537 UART: [afmc] CDI.KEYID = 6
14,462,454 UART: [afmc] SUBJECT.KEYID = 7
14,463,613 UART: [afmc] AUTHORITY.KEYID = 5
16,963,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,686,111 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,702,172 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,718,189 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,733,845 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,755,505 UART: [afmc] --
20,815,716 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,981,651 UART: [cold-reset] --
20,982,588 UART: [state] Locking Datavault
20,983,753 UART: [state] Locking PCR0, PCR1 and PCR31
20,985,297 UART: [state] Locking ICCM
20,986,209 UART: [exit] Launching FMC @ 0x40000000
20,987,642 UART:
20,987,800 UART: Running Caliptra FMC ...
20,988,902 UART:
20,989,054 UART: [fmc] Received command: 0x46574C44
20,990,523 UART:
20,990,675 UART: Running Caliptra ROM ...
20,991,771 UART:
20,991,925 UART: [state] CFI Enabled
20,996,353 UART: [state] LifecycleState = Unprovisioned
20,998,179 UART: [state] DebugLocked = No
20,999,898 UART: [state] WD Timer not started. Device not locked for debugging
21,003,416 UART: [kat] SHA2-256
21,182,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,194,168 UART: [kat] ++
21,194,623 UART: [kat] sha1
21,206,800 UART: [kat] SHA2-256
21,209,807 UART: [kat] SHA2-384
21,215,366 UART: [kat] SHA2-512-ACC
21,218,296 UART: [kat] ECC-384
23,659,497 UART: [kat] HMAC-384Kdf
23,672,047 UART: [kat] LMS
24,201,525 UART: [kat] --
24,206,538 UART: [update-reset] ++
27,839,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,843,597 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,285,119 >>> mbox cmd response: success
28,286,226 UART: [update-reset] Copying MAN_2 To MAN_1
28,308,610 UART: [update-reset Success] --
28,316,018 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,473,403 UART: [state] Locking Datavault
28,474,634 UART: [state] Locking PCR0, PCR1 and PCR31
28,476,104 UART: [state] Locking ICCM
28,476,980 UART: [exit] Launching FMC @ 0x40000000
28,478,401 UART:
28,478,555 UART: Running Caliptra FMC ...
28,479,568 UART:
28,479,707 UART: [fmc] Received command: 0x1000000E
29,257,804 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,693,560 ready_for_fw is high
3,694,153 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,233,622 >>> mbox cmd response: success
20,529,651 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,695,365 UART:
20,695,783 UART: Running Caliptra FMC ...
20,696,869 UART:
20,697,023 UART: [fmc] Received command: 0x46574C44
27,861,704 >>> mbox cmd response: success
27,889,478 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,046,898 UART:
28,047,249 UART: Running Caliptra FMC ...
28,048,372 UART:
28,048,526 UART: [fmc] Received command: 0x1000000E
28,831,335 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,078 UART: [kat] LMS
1,169,390 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,695 UART: [idev] ++
1,173,863 UART: [idev] CDI.KEYID = 6
1,174,224 UART: [idev] SUBJECT.KEYID = 7
1,174,649 UART: [idev] UDS.KEYID = 0
1,174,995 ready_for_fw is high
1,174,995 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,787 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,209,113 UART: [idev] --
1,210,168 UART: [ldev] ++
1,210,336 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,127 UART: [ldev] AUTHORITY.KEYID = 7
1,211,590 UART: [ldev] FE.KEYID = 1
1,216,886 UART: [ldev] Erasing FE.KEYID = 1
1,242,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,708 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x46574c44
1,283,490 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,437 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,194 >>> mbox cmd response: success
2,744,263 UART: [afmc] ++
2,744,431 UART: [afmc] CDI.KEYID = 6
2,744,794 UART: [afmc] SUBJECT.KEYID = 7
2,745,220 UART: [afmc] AUTHORITY.KEYID = 5
2,780,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,928 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,624 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,523 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,216 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,014 UART: [afmc] --
2,823,908 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,930 UART: [cold-reset] --
2,824,786 UART: [state] Locking Datavault
2,825,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,463 UART: [state] Locking ICCM
2,826,955 UART: [exit] Launching FMC @ 0x40000000
2,832,252 UART:
2,832,268 UART: Running Caliptra FMC ...
2,832,676 UART:
2,832,906 UART: [fmc] Received command: 0x46574C44
2,833,732 UART:
2,833,748 UART: Running Caliptra ROM ...
2,834,156 UART:
2,834,211 UART: [state] CFI Enabled
2,836,775 UART: [state] LifecycleState = Unprovisioned
2,837,430 UART: [state] DebugLocked = No
2,838,064 UART: [state] WD Timer not started. Device not locked for debugging
2,839,358 UART: [kat] SHA2-256
3,642,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,037 UART: [kat] ++
3,647,189 UART: [kat] sha1
3,651,463 UART: [kat] SHA2-256
3,653,403 UART: [kat] SHA2-384
3,656,196 UART: [kat] SHA2-512-ACC
3,658,096 UART: [kat] ECC-384
3,667,703 UART: [kat] HMAC-384Kdf
3,672,103 UART: [kat] LMS
3,920,415 UART: [kat] --
3,921,227 UART: [update-reset] ++
5,424,296 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,503 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,277 >>> mbox cmd response: success
5,602,474 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,488 UART: [update-reset Success] --
5,610,897 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,401 UART: [state] Locking Datavault
5,612,311 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,915 UART: [state] Locking ICCM
5,613,483 UART: [exit] Launching FMC @ 0x40000000
5,618,780 UART:
5,618,796 UART: Running Caliptra FMC ...
5,619,204 UART:
5,619,426 UART: [fmc] Received command: 0x1000000E
5,964,480 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,194 ready_for_fw is high
1,056,194 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,960 >>> mbox cmd response: success
2,649,827 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,602 UART:
2,655,618 UART: Running Caliptra FMC ...
2,656,026 UART:
2,656,256 UART: [fmc] Received command: 0x46574C44
5,308,938 >>> mbox cmd response: success
5,316,474 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,322,154 UART:
5,322,170 UART: Running Caliptra FMC ...
5,322,578 UART:
5,322,800 UART: [fmc] Received command: 0x1000000E
5,667,854 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
916,945 UART: [kat] HMAC-384Kdf
921,469 UART: [kat] LMS
1,169,781 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,260 UART: [fht] FHT @ 0x50003400
1,173,932 UART: [idev] ++
1,174,100 UART: [idev] CDI.KEYID = 6
1,174,461 UART: [idev] SUBJECT.KEYID = 7
1,174,886 UART: [idev] UDS.KEYID = 0
1,175,232 ready_for_fw is high
1,175,232 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,216 UART: [idev] Erasing UDS.KEYID = 0
1,200,102 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46574c44
1,283,543 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,570 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,367 >>> mbox cmd response: success
2,744,418 UART: [afmc] ++
2,744,586 UART: [afmc] CDI.KEYID = 6
2,744,949 UART: [afmc] SUBJECT.KEYID = 7
2,745,375 UART: [afmc] AUTHORITY.KEYID = 5
2,780,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,977 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,673 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,572 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,265 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,111 UART: [afmc] --
2,824,083 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,824,105 UART: [cold-reset] --
2,824,871 UART: [state] Locking Datavault
2,826,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,714 UART: [state] Locking ICCM
2,827,170 UART: [exit] Launching FMC @ 0x40000000
2,832,467 UART:
2,832,483 UART: Running Caliptra FMC ...
2,832,891 UART:
2,833,121 UART: [fmc] Received command: 0x46574C44
2,833,947 UART:
2,833,963 UART: Running Caliptra ROM ...
2,834,371 UART:
2,834,513 UART: [state] CFI Enabled
2,837,679 UART: [state] LifecycleState = Unprovisioned
2,838,334 UART: [state] DebugLocked = No
2,838,942 UART: [state] WD Timer not started. Device not locked for debugging
2,840,290 UART: [kat] SHA2-256
3,643,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,969 UART: [kat] ++
3,648,121 UART: [kat] sha1
3,652,195 UART: [kat] SHA2-256
3,654,135 UART: [kat] SHA2-384
3,656,916 UART: [kat] SHA2-512-ACC
3,658,816 UART: [kat] ECC-384
3,668,363 UART: [kat] HMAC-384Kdf
3,672,963 UART: [kat] LMS
3,921,275 UART: [kat] --
3,922,213 UART: [update-reset] ++
5,426,110 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,271 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,604,045 >>> mbox cmd response: success
5,604,380 UART: [update-reset] Copying MAN_2 To MAN_1
5,612,394 UART: [update-reset Success] --
5,612,803 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,613,309 UART: [state] Locking Datavault
5,614,183 UART: [state] Locking PCR0, PCR1 and PCR31
5,614,787 UART: [state] Locking ICCM
5,615,351 UART: [exit] Launching FMC @ 0x40000000
5,620,648 UART:
5,620,664 UART: Running Caliptra FMC ...
5,621,072 UART:
5,621,294 UART: [fmc] Received command: 0x1000000E
5,966,348 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,641 ready_for_fw is high
1,055,641 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,915 >>> mbox cmd response: success
2,649,024 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,403 UART:
2,655,419 UART: Running Caliptra FMC ...
2,655,827 UART:
2,656,057 UART: [fmc] Received command: 0x46574C44
5,307,632 >>> mbox cmd response: success
5,315,362 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,321,108 UART:
5,321,124 UART: Running Caliptra FMC ...
5,321,532 UART:
5,321,754 UART: [fmc] Received command: 0x1000000E
5,666,808 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,174,037 ready_for_fw is high
1,174,037 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,189 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,207,962 UART: [ldev] ++
1,208,130 UART: [ldev] CDI.KEYID = 6
1,208,494 UART: [ldev] SUBJECT.KEYID = 5
1,208,921 UART: [ldev] AUTHORITY.KEYID = 7
1,209,384 UART: [ldev] FE.KEYID = 1
1,214,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,286 UART: [fwproc] Wait for Commands...
1,280,985 UART: [fwproc] Recv command 0x46574c44
1,281,718 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,593 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,262 >>> mbox cmd response: success
2,741,345 UART: [afmc] ++
2,741,513 UART: [afmc] CDI.KEYID = 6
2,741,876 UART: [afmc] SUBJECT.KEYID = 7
2,742,302 UART: [afmc] AUTHORITY.KEYID = 5
2,778,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,080 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,776 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,675 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,368 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,090 UART: [afmc] --
2,821,184 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,206 UART: [cold-reset] --
2,821,844 UART: [state] Locking Datavault
2,822,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,557 UART: [state] Locking ICCM
2,824,123 UART: [exit] Launching FMC @ 0x40000000
2,829,420 UART:
2,829,436 UART: Running Caliptra FMC ...
2,829,844 UART:
2,830,074 UART: [fmc] Received command: 0x46574C44
2,830,900 UART:
2,830,916 UART: Running Caliptra ROM ...
2,831,324 UART:
2,831,379 UART: [state] CFI Enabled
2,834,345 UART: [state] LifecycleState = Unprovisioned
2,835,000 UART: [state] DebugLocked = No
2,835,614 UART: [state] WD Timer not started. Device not locked for debugging
2,836,780 UART: [kat] SHA2-256
3,640,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,459 UART: [kat] ++
3,644,611 UART: [kat] sha1
3,648,715 UART: [kat] SHA2-256
3,650,655 UART: [kat] SHA2-384
3,653,472 UART: [kat] SHA2-512-ACC
3,655,372 UART: [kat] ECC-384
3,665,119 UART: [kat] HMAC-384Kdf
3,669,615 UART: [kat] LMS
3,917,927 UART: [kat] --
3,919,081 UART: [update-reset] ++
5,423,228 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,425 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,199 >>> mbox cmd response: success
5,601,420 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,434 UART: [update-reset Success] --
5,609,843 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,409 UART: [state] Locking Datavault
5,611,121 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,725 UART: [state] Locking ICCM
5,612,157 UART: [exit] Launching FMC @ 0x40000000
5,617,454 UART:
5,617,470 UART: Running Caliptra FMC ...
5,617,878 UART:
5,618,100 UART: [fmc] Received command: 0x1000000E
5,963,154 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,790 ready_for_fw is high
1,055,790 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,146 >>> mbox cmd response: success
2,649,349 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,176 UART:
2,655,192 UART: Running Caliptra FMC ...
2,655,600 UART:
2,655,830 UART: [fmc] Received command: 0x46574C44
5,308,000 >>> mbox cmd response: success
5,315,674 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,321,040 UART:
5,321,056 UART: Running Caliptra FMC ...
5,321,464 UART:
5,321,686 UART: [fmc] Received command: 0x1000000E
5,666,740 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,518 UART: [idev] ++
1,173,686 UART: [idev] CDI.KEYID = 6
1,174,047 UART: [idev] SUBJECT.KEYID = 7
1,174,472 UART: [idev] UDS.KEYID = 0
1,174,818 ready_for_fw is high
1,174,818 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,593 UART: [fwproc] Recv'd Img size: 112032 bytes
2,556,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,032 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,593 >>> mbox cmd response: success
2,745,692 UART: [afmc] ++
2,745,860 UART: [afmc] CDI.KEYID = 6
2,746,223 UART: [afmc] SUBJECT.KEYID = 7
2,746,649 UART: [afmc] AUTHORITY.KEYID = 5
2,782,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,497 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,193 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,092 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,785 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,669 UART: [afmc] --
2,825,779 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,825,801 UART: [cold-reset] --
2,826,573 UART: [state] Locking Datavault
2,827,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,132 UART: [state] Locking ICCM
2,828,768 UART: [exit] Launching FMC @ 0x40000000
2,834,065 UART:
2,834,081 UART: Running Caliptra FMC ...
2,834,489 UART:
2,834,719 UART: [fmc] Received command: 0x46574C44
2,835,545 UART:
2,835,561 UART: Running Caliptra ROM ...
2,835,969 UART:
2,836,111 UART: [state] CFI Enabled
2,838,479 UART: [state] LifecycleState = Unprovisioned
2,839,134 UART: [state] DebugLocked = No
2,839,854 UART: [state] WD Timer not started. Device not locked for debugging
2,841,158 UART: [kat] SHA2-256
3,644,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,837 UART: [kat] ++
3,648,989 UART: [kat] sha1
3,653,391 UART: [kat] SHA2-256
3,655,331 UART: [kat] SHA2-384
3,657,994 UART: [kat] SHA2-512-ACC
3,659,894 UART: [kat] ECC-384
3,669,415 UART: [kat] HMAC-384Kdf
3,674,155 UART: [kat] LMS
3,922,467 UART: [kat] --
3,923,257 UART: [update-reset] ++
5,427,594 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,631 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,605,405 >>> mbox cmd response: success
5,605,692 UART: [update-reset] Copying MAN_2 To MAN_1
5,613,706 UART: [update-reset Success] --
5,614,115 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,614,743 UART: [state] Locking Datavault
5,615,655 UART: [state] Locking PCR0, PCR1 and PCR31
5,616,259 UART: [state] Locking ICCM
5,616,889 UART: [exit] Launching FMC @ 0x40000000
5,622,186 UART:
5,622,202 UART: Running Caliptra FMC ...
5,622,610 UART:
5,622,832 UART: [fmc] Received command: 0x1000000E
5,967,886 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,809 ready_for_fw is high
1,056,809 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,161 >>> mbox cmd response: success
2,649,992 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,851 UART:
2,655,867 UART: Running Caliptra FMC ...
2,656,275 UART:
2,656,505 UART: [fmc] Received command: 0x46574C44
5,306,966 >>> mbox cmd response: success
5,314,666 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,216 UART:
5,320,232 UART: Running Caliptra FMC ...
5,320,640 UART:
5,320,862 UART: [fmc] Received command: 0x1000000E
5,665,916 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,504 UART: [state] LifecycleState = Unprovisioned
85,159 UART: [state] DebugLocked = No
85,775 UART: [state] WD Timer not started. Device not locked for debugging
87,046 UART: [kat] SHA2-256
890,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,725 UART: [kat] ++
894,877 UART: [kat] sha1
899,225 UART: [kat] SHA2-256
901,165 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,174,045 ready_for_fw is high
1,174,045 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,010 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,848 UART: [fwproc] Wait for Commands...
1,281,673 UART: [fwproc] Recv command 0x46574c44
1,282,406 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,594 >>> mbox cmd response: success
2,743,687 UART: [afmc] ++
2,743,855 UART: [afmc] CDI.KEYID = 6
2,744,218 UART: [afmc] SUBJECT.KEYID = 7
2,744,644 UART: [afmc] AUTHORITY.KEYID = 5
2,780,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,484 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,180 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,079 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,772 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,560 UART: [afmc] --
2,823,576 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,598 UART: [cold-reset] --
2,824,342 UART: [state] Locking Datavault
2,825,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,167 UART: [state] Locking ICCM
2,826,701 UART: [exit] Launching FMC @ 0x40000000
2,831,998 UART:
2,832,014 UART: Running Caliptra FMC ...
2,832,422 UART:
2,832,652 UART: [fmc] Received command: 0x46574C44
2,833,478 UART:
2,833,494 UART: Running Caliptra ROM ...
2,833,902 UART:
2,833,957 UART: [state] CFI Enabled
2,836,733 UART: [state] LifecycleState = Unprovisioned
2,837,388 UART: [state] DebugLocked = No
2,837,934 UART: [state] WD Timer not started. Device not locked for debugging
2,839,184 UART: [kat] SHA2-256
3,642,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,863 UART: [kat] ++
3,647,015 UART: [kat] sha1
3,651,243 UART: [kat] SHA2-256
3,653,183 UART: [kat] SHA2-384
3,656,000 UART: [kat] SHA2-512-ACC
3,657,900 UART: [kat] ECC-384
3,667,109 UART: [kat] HMAC-384Kdf
3,671,773 UART: [kat] LMS
3,920,085 UART: [kat] --
3,920,979 UART: [update-reset] ++
5,424,230 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,407 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,181 >>> mbox cmd response: success
5,602,288 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,302 UART: [update-reset Success] --
5,610,711 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,231 UART: [state] Locking Datavault
5,612,077 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,681 UART: [state] Locking ICCM
5,613,355 UART: [exit] Launching FMC @ 0x40000000
5,618,652 UART:
5,618,668 UART: Running Caliptra FMC ...
5,619,076 UART:
5,619,298 UART: [fmc] Received command: 0x1000000E
5,964,352 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,586 >>> mbox cmd response: success
2,646,071 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,652,356 UART:
2,652,372 UART: Running Caliptra FMC ...
2,652,780 UART:
2,653,010 UART: [fmc] Received command: 0x46574C44
5,305,024 >>> mbox cmd response: success
5,312,516 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,458 UART:
5,318,474 UART: Running Caliptra FMC ...
5,318,882 UART:
5,319,104 UART: [fmc] Received command: 0x1000000E
5,664,158 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,122 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [kat] SHA2-256
890,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,114 UART: [kat] ++
895,266 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,192 UART: [idev] Sha1 KeyId Algorithm
1,206,960 UART: [idev] --
1,207,877 UART: [ldev] ++
1,208,045 UART: [ldev] CDI.KEYID = 6
1,208,409 UART: [ldev] SUBJECT.KEYID = 5
1,208,836 UART: [ldev] AUTHORITY.KEYID = 7
1,209,299 UART: [ldev] FE.KEYID = 1
1,214,293 UART: [ldev] Erasing FE.KEYID = 1
1,240,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,067 UART: [ldev] --
1,279,391 UART: [fwproc] Wait for Commands...
1,280,040 UART: [fwproc] Recv command 0x46574c44
1,280,773 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,514 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,203 >>> mbox cmd response: success
2,743,322 UART: [afmc] ++
2,743,490 UART: [afmc] CDI.KEYID = 6
2,743,853 UART: [afmc] SUBJECT.KEYID = 7
2,744,279 UART: [afmc] AUTHORITY.KEYID = 5
2,780,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,837 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,533 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,432 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,125 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,901 UART: [afmc] --
2,823,913 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,935 UART: [cold-reset] --
2,824,613 UART: [state] Locking Datavault
2,825,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,550 UART: [state] Locking ICCM
2,826,980 UART: [exit] Launching FMC @ 0x40000000
2,832,277 UART:
2,832,293 UART: Running Caliptra FMC ...
2,832,701 UART:
2,832,931 UART: [fmc] Received command: 0x46574C44
2,833,757 UART:
2,833,773 UART: Running Caliptra ROM ...
2,834,181 UART:
2,834,323 UART: [state] CFI Enabled
2,837,107 UART: [state] LifecycleState = Unprovisioned
2,837,762 UART: [state] DebugLocked = No
2,838,348 UART: [state] WD Timer not started. Device not locked for debugging
2,839,572 UART: [kat] SHA2-256
3,643,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,251 UART: [kat] ++
3,647,403 UART: [kat] sha1
3,651,617 UART: [kat] SHA2-256
3,653,557 UART: [kat] SHA2-384
3,656,218 UART: [kat] SHA2-512-ACC
3,658,118 UART: [kat] ECC-384
3,668,425 UART: [kat] HMAC-384Kdf
3,673,099 UART: [kat] LMS
3,921,411 UART: [kat] --
3,922,453 UART: [update-reset] ++
5,425,922 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,941 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,603,715 >>> mbox cmd response: success
5,603,916 UART: [update-reset] Copying MAN_2 To MAN_1
5,611,930 UART: [update-reset Success] --
5,612,339 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,613,203 UART: [state] Locking Datavault
5,614,145 UART: [state] Locking PCR0, PCR1 and PCR31
5,614,749 UART: [state] Locking ICCM
5,615,353 UART: [exit] Launching FMC @ 0x40000000
5,620,650 UART:
5,620,666 UART: Running Caliptra FMC ...
5,621,074 UART:
5,621,296 UART: [fmc] Received command: 0x1000000E
5,966,350 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,215 ready_for_fw is high
1,056,215 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,235 >>> mbox cmd response: success
2,649,190 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,517 UART:
2,655,533 UART: Running Caliptra FMC ...
2,655,941 UART:
2,656,171 UART: [fmc] Received command: 0x46574C44
5,308,242 >>> mbox cmd response: success
5,315,802 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,321,612 UART:
5,321,628 UART: Running Caliptra FMC ...
5,322,036 UART:
5,322,258 UART: [fmc] Received command: 0x1000000E
5,667,312 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,045 UART:
192,411 UART: Running Caliptra ROM ...
193,711 UART:
193,864 UART: [state] CFI Enabled
264,943 UART: [state] LifecycleState = Unprovisioned
267,281 UART: [state] DebugLocked = No
269,094 UART: [state] WD Timer not started. Device not locked for debugging
273,699 UART: [kat] SHA2-256
455,632 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,157 UART: [kat] ++
467,759 UART: [kat] sha1
478,780 UART: [kat] SHA2-256
481,790 UART: [kat] SHA2-384
487,852 UART: [kat] SHA2-512-ACC
490,502 UART: [kat] ECC-384
3,774,154 UART: [kat] HMAC-384Kdf
3,802,601 UART: [kat] LMS
4,875,752 UART: [kat] --
4,881,332 UART: [cold-reset] ++
4,883,062 UART: [fht] FHT @ 0x50003400
4,893,899 UART: [idev] ++
4,894,602 UART: [idev] CDI.KEYID = 6
4,895,847 UART: [idev] SUBJECT.KEYID = 7
4,896,970 UART: [idev] UDS.KEYID = 0
4,897,898 ready_for_fw is high
4,898,085 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,032,239 UART: [idev] Erasing UDS.KEYID = 0
8,240,012 UART: [idev] Sha1 KeyId Algorithm
8,262,216 UART: [idev] --
8,265,452 UART: [ldev] ++
8,266,019 UART: [ldev] CDI.KEYID = 6
8,267,253 UART: [ldev] SUBJECT.KEYID = 5
8,268,428 UART: [ldev] AUTHORITY.KEYID = 7
8,269,606 UART: [ldev] FE.KEYID = 1
8,317,573 UART: [ldev] Erasing FE.KEYID = 1
11,652,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,514 UART: [ldev] --
14,034,453 UART: [fwproc] Wait for Commands...
14,036,009 UART: [fwproc] Recv command 0x46574c44
14,038,320 UART: [fwproc] Recv'd Img size: 106620 bytes
18,013,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,085,652 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,128,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,445,234 >>> mbox cmd response: success
18,449,121 UART: [afmc] ++
18,449,722 UART: [afmc] CDI.KEYID = 6
18,450,907 UART: [afmc] SUBJECT.KEYID = 7
18,452,008 UART: [afmc] AUTHORITY.KEYID = 5
21,813,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,115,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,117,632 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,133,721 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,149,764 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,165,807 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,187,448 UART: [afmc] --
24,190,452 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,191,370 UART: [cold-reset] --
24,194,671 UART: [state] Locking Datavault
24,199,840 UART: [state] Locking PCR0, PCR1 and PCR31
24,201,529 UART: [state] Locking ICCM
24,203,926 UART: [exit] Launching FMC @ 0x40000000
24,212,540 UART:
24,212,771 UART: Running Caliptra FMC ...
24,213,873 UART:
24,214,031 UART: [fmc] Received command: 0x10000004
24,215,488 UART:
24,215,645 UART: Running Caliptra ROM ...
24,216,738 UART:
24,216,894 UART: [state] CFI Enabled
24,217,850 >>> mbox cmd response: success
24,278,372 UART: [state] LifecycleState = Unprovisioned
24,280,284 UART: [state] DebugLocked = No
24,282,806 UART: [state] WD Timer not started. Device not locked for debugging
24,286,801 UART: [kat] SHA2-256
24,468,740 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,480,260 UART: [kat] ++
24,480,808 UART: [kat] sha1
24,491,107 UART: [kat] SHA2-256
24,494,126 UART: [kat] SHA2-384
24,499,892 UART: [kat] SHA2-512-ACC
24,502,508 UART: [kat] ECC-384
27,790,186 UART: [kat] HMAC-384Kdf
27,815,481 UART: [kat] LMS
28,888,627 UART: [kat] --
28,892,351 UART: [update-reset] ++
28,893,495 UART: Failed To Get Mailbox Txn
28,895,615 UART: ROM Non-Fatal Error: 0x01040004
28,897,915 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,898,346 UART: [state] Locking Datavault
28,901,871 UART: [state] Locking PCR0, PCR1 and PCR31
28,904,054 UART: [state] Locking ICCM
28,905,371 UART: [exit] Launching FMC @ 0x40000000
28,914,001 UART:
28,914,246 UART: Running Caliptra FMC ...
28,915,282 UART:
28,915,428 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,917,056 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
4,783,581 ready_for_fw is high
4,784,021 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,212,603 >>> mbox cmd response: success
23,895,530 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
23,909,734 UART:
23,910,084 UART: Running Caliptra FMC ...
23,911,255 UART:
23,911,405 UART: [fmc] Received command: 0x10000004
23,912,940 >>> mbox cmd response: success
28,512,813 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,524,003 UART:
28,524,268 UART: Running Caliptra FMC ...
28,525,351 UART:
28,525,498 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,527,160 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,452 UART:
192,874 UART: Running Caliptra ROM ...
193,994 UART:
603,633 UART: [state] CFI Enabled
618,971 UART: [state] LifecycleState = Unprovisioned
621,371 UART: [state] DebugLocked = No
622,954 UART: [state] WD Timer not started. Device not locked for debugging
627,144 UART: [kat] SHA2-256
809,117 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,714 UART: [kat] ++
821,238 UART: [kat] sha1
832,397 UART: [kat] SHA2-256
835,392 UART: [kat] SHA2-384
839,737 UART: [kat] SHA2-512-ACC
842,379 UART: [kat] ECC-384
4,098,546 UART: [kat] HMAC-384Kdf
4,111,358 UART: [kat] LMS
5,184,446 UART: [kat] --
5,187,751 UART: [cold-reset] ++
5,189,107 UART: [fht] FHT @ 0x50003400
5,201,261 UART: [idev] ++
5,201,889 UART: [idev] CDI.KEYID = 6
5,203,055 UART: [idev] SUBJECT.KEYID = 7
5,204,571 UART: [idev] UDS.KEYID = 0
5,205,745 ready_for_fw is high
5,205,935 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,340,382 UART: [idev] Erasing UDS.KEYID = 0
8,498,970 UART: [idev] Sha1 KeyId Algorithm
8,521,989 UART: [idev] --
8,525,115 UART: [ldev] ++
8,525,679 UART: [ldev] CDI.KEYID = 6
8,526,907 UART: [ldev] SUBJECT.KEYID = 5
8,528,384 UART: [ldev] AUTHORITY.KEYID = 7
8,529,859 UART: [ldev] FE.KEYID = 1
8,540,655 UART: [ldev] Erasing FE.KEYID = 1
11,833,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,560 UART: [ldev] --
14,199,980 UART: [fwproc] Wait for Commands...
14,201,860 UART: [fwproc] Recv command 0x46574c44
14,204,166 UART: [fwproc] Recv'd Img size: 106620 bytes
18,177,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,247,270 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,289,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,606,867 >>> mbox cmd response: success
18,611,846 UART: [afmc] ++
18,612,430 UART: [afmc] CDI.KEYID = 6
18,613,610 UART: [afmc] SUBJECT.KEYID = 7
18,614,765 UART: [afmc] AUTHORITY.KEYID = 5
21,925,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,219,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,221,901 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,237,914 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,253,998 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,270,072 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,291,522 UART: [afmc] --
24,294,848 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,295,779 UART: [cold-reset] --
24,300,016 UART: [state] Locking Datavault
24,304,823 UART: [state] Locking PCR0, PCR1 and PCR31
24,306,509 UART: [state] Locking ICCM
24,307,884 UART: [exit] Launching FMC @ 0x40000000
24,316,507 UART:
24,316,737 UART: Running Caliptra FMC ...
24,317,758 UART:
24,317,917 UART: [fmc] Received command: 0x10000004
24,319,317 UART:
24,319,456 UART: Running Caliptra ROM ...
24,320,543 UART:
24,320,745 >>> mbox cmd response: success
24,320,978 UART: [state] CFI Enabled
24,335,826 UART: [state] LifecycleState = Unprovisioned
24,337,711 UART: [state] DebugLocked = No
24,340,484 UART: [state] WD Timer not started. Device not locked for debugging
24,344,970 UART: [kat] SHA2-256
24,526,890 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,538,436 UART: [kat] ++
24,539,026 UART: [kat] sha1
24,549,057 UART: [kat] SHA2-256
24,552,116 UART: [kat] SHA2-384
24,556,699 UART: [kat] SHA2-512-ACC
24,559,279 UART: [kat] ECC-384
27,816,751 UART: [kat] HMAC-384Kdf
27,829,515 UART: [kat] LMS
28,902,619 UART: [kat] --
28,906,169 UART: [update-reset] ++
28,907,312 UART: Failed To Get Mailbox Txn
28,910,309 UART: ROM Non-Fatal Error: 0x01040004
28,912,615 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,914,238 UART: [state] Locking Datavault
28,917,114 UART: [state] Locking PCR0, PCR1 and PCR31
28,919,303 UART: [state] Locking ICCM
28,922,043 UART: [exit] Launching FMC @ 0x40000000
28,930,727 UART:
28,930,956 UART: Running Caliptra FMC ...
28,932,050 UART:
28,932,205 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,933,851 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
5,100,832 ready_for_fw is high
5,101,245 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,424,872 >>> mbox cmd response: success
24,049,345 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,063,399 UART:
24,063,750 UART: Running Caliptra FMC ...
24,064,930 UART:
24,065,122 UART: [fmc] Received command: 0x10000004
24,066,669 >>> mbox cmd response: success
28,556,513 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,567,261 UART:
28,567,528 UART: Running Caliptra FMC ...
28,568,691 UART:
28,568,847 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,570,475 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,965 UART:
192,339 UART: Running Caliptra ROM ...
193,434 UART:
193,573 UART: [state] CFI Enabled
262,265 UART: [state] LifecycleState = Unprovisioned
264,181 UART: [state] DebugLocked = No
266,907 UART: [state] WD Timer not started. Device not locked for debugging
269,804 UART: [kat] SHA2-256
448,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,513 UART: [kat] ++
461,062 UART: [kat] sha1
472,377 UART: [kat] SHA2-256
475,384 UART: [kat] SHA2-384
482,152 UART: [kat] SHA2-512-ACC
485,098 UART: [kat] ECC-384
2,950,394 UART: [kat] HMAC-384Kdf
2,973,907 UART: [kat] LMS
3,503,337 UART: [kat] --
3,507,999 UART: [cold-reset] ++
3,509,866 UART: [fht] FHT @ 0x50003400
3,520,491 UART: [idev] ++
3,521,059 UART: [idev] CDI.KEYID = 6
3,521,991 UART: [idev] SUBJECT.KEYID = 7
3,523,167 UART: [idev] UDS.KEYID = 0
3,524,093 ready_for_fw is high
3,524,302 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,658,947 UART: [idev] Erasing UDS.KEYID = 0
6,028,437 UART: [idev] Sha1 KeyId Algorithm
6,050,767 UART: [idev] --
6,054,874 UART: [ldev] ++
6,055,449 UART: [ldev] CDI.KEYID = 6
6,056,358 UART: [ldev] SUBJECT.KEYID = 5
6,057,524 UART: [ldev] AUTHORITY.KEYID = 7
6,058,762 UART: [ldev] FE.KEYID = 1
6,100,424 UART: [ldev] Erasing FE.KEYID = 1
8,601,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,393 UART: [ldev] --
10,415,737 UART: [fwproc] Wait for Commands...
10,418,272 UART: [fwproc] Recv command 0x46574c44
10,420,325 UART: [fwproc] Recv'd Img size: 106964 bytes
13,734,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,805,018 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,847,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,165,518 >>> mbox cmd response: success
14,169,593 UART: [afmc] ++
14,170,191 UART: [afmc] CDI.KEYID = 6
14,171,106 UART: [afmc] SUBJECT.KEYID = 7
14,172,269 UART: [afmc] AUTHORITY.KEYID = 5
16,700,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,427,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,429,284 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,445,272 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,461,192 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,477,157 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,433 UART: [afmc] --
18,503,731 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,504,664 UART: [cold-reset] --
18,507,659 UART: [state] Locking Datavault
18,511,411 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,065 UART: [state] Locking ICCM
18,514,682 UART: [exit] Launching FMC @ 0x40000000
18,523,084 UART:
18,523,331 UART: Running Caliptra FMC ...
18,524,433 UART:
18,524,589 UART: [fmc] Received command: 0x10000004
18,526,046 UART:
18,526,207 UART: Running Caliptra ROM ...
18,527,306 UART:
18,527,460 UART: [state] CFI Enabled
18,528,424 >>> mbox cmd response: success
18,585,047 UART: [state] LifecycleState = Unprovisioned
18,586,880 UART: [state] DebugLocked = No
18,588,753 UART: [state] WD Timer not started. Device not locked for debugging
18,592,104 UART: [kat] SHA2-256
18,771,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,782,784 UART: [kat] ++
18,783,320 UART: [kat] sha1
18,794,211 UART: [kat] SHA2-256
18,797,225 UART: [kat] SHA2-384
18,803,802 UART: [kat] SHA2-512-ACC
18,806,794 UART: [kat] ECC-384
21,249,474 UART: [kat] HMAC-384Kdf
21,275,044 UART: [kat] LMS
21,804,466 UART: [kat] --
21,809,698 UART: [update-reset] ++
21,810,619 UART: Failed To Get Mailbox Txn
21,813,564 UART: ROM Non-Fatal Error: 0x01040004
21,815,654 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,816,677 UART: [state] Locking Datavault
21,818,801 UART: [state] Locking PCR0, PCR1 and PCR31
21,820,376 UART: [state] Locking ICCM
21,823,231 UART: [exit] Launching FMC @ 0x40000000
21,831,631 UART:
21,831,864 UART: Running Caliptra FMC ...
21,832,886 UART:
21,833,030 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,834,659 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,361,337 ready_for_fw is high
3,361,928 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,926,061 >>> mbox cmd response: success
18,201,144 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,217,540 UART:
18,217,908 UART: Running Caliptra FMC ...
18,219,174 UART:
18,219,349 UART: [fmc] Received command: 0x10000004
18,220,889 >>> mbox cmd response: success
21,399,417 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,409,426 UART:
21,409,690 UART: Running Caliptra FMC ...
21,410,867 UART:
21,411,029 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,412,665 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,482 UART:
192,846 UART: Running Caliptra ROM ...
194,028 UART:
603,703 UART: [state] CFI Enabled
618,294 UART: [state] LifecycleState = Unprovisioned
620,173 UART: [state] DebugLocked = No
621,476 UART: [state] WD Timer not started. Device not locked for debugging
624,522 UART: [kat] SHA2-256
803,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,187 UART: [kat] ++
815,635 UART: [kat] sha1
827,501 UART: [kat] SHA2-256
830,509 UART: [kat] SHA2-384
836,776 UART: [kat] SHA2-512-ACC
839,704 UART: [kat] ECC-384
3,282,826 UART: [kat] HMAC-384Kdf
3,294,279 UART: [kat] LMS
3,823,779 UART: [kat] --
3,829,117 UART: [cold-reset] ++
3,830,758 UART: [fht] FHT @ 0x50003400
3,841,236 UART: [idev] ++
3,841,797 UART: [idev] CDI.KEYID = 6
3,842,747 UART: [idev] SUBJECT.KEYID = 7
3,843,941 UART: [idev] UDS.KEYID = 0
3,844,869 ready_for_fw is high
3,845,053 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,979,432 UART: [idev] Erasing UDS.KEYID = 0
6,316,143 UART: [idev] Sha1 KeyId Algorithm
6,338,621 UART: [idev] --
6,343,184 UART: [ldev] ++
6,343,761 UART: [ldev] CDI.KEYID = 6
6,344,677 UART: [ldev] SUBJECT.KEYID = 5
6,345,832 UART: [ldev] AUTHORITY.KEYID = 7
6,347,057 UART: [ldev] FE.KEYID = 1
6,358,997 UART: [ldev] Erasing FE.KEYID = 1
8,832,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,309 UART: [ldev] --
10,622,862 UART: [fwproc] Wait for Commands...
10,625,273 UART: [fwproc] Recv command 0x46574c44
10,627,359 UART: [fwproc] Recv'd Img size: 106964 bytes
13,931,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,010,380 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,052,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,370,732 >>> mbox cmd response: success
14,375,259 UART: [afmc] ++
14,375,852 UART: [afmc] CDI.KEYID = 6
14,376,760 UART: [afmc] SUBJECT.KEYID = 7
14,377,972 UART: [afmc] AUTHORITY.KEYID = 5
16,881,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,542 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,618,513 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,634,428 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,650,386 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,899 UART: [afmc] --
18,676,620 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,677,607 UART: [cold-reset] --
18,678,770 UART: [state] Locking Datavault
18,684,087 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,737 UART: [state] Locking ICCM
18,687,864 UART: [exit] Launching FMC @ 0x40000000
18,696,267 UART:
18,696,495 UART: Running Caliptra FMC ...
18,697,518 UART:
18,697,665 UART: [fmc] Received command: 0x10000004
18,699,116 UART:
18,699,263 UART: Running Caliptra ROM ...
18,700,294 UART:
18,700,440 UART: [state] CFI 18,700,923 >>> mbox cmd response: success
Enabled
18,715,973 UART: [state] LifecycleState = Unprovisioned
18,717,804 UART: [state] DebugLocked = No
18,719,934 UART: [state] WD Timer not started. Device not locked for debugging
18,723,110 UART: [kat] SHA2-256
18,902,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,913,838 UART: [kat] ++
18,914,291 UART: [kat] sha1
18,927,006 UART: [kat] SHA2-256
18,930,026 UART: [kat] SHA2-384
18,936,978 UART: [kat] SHA2-512-ACC
18,939,913 UART: [kat] ECC-384
21,381,438 UART: [kat] HMAC-384Kdf
21,394,576 UART: [kat] LMS
21,924,080 UART: [kat] --
21,929,734 UART: [update-reset] ++
21,930,648 UART: Failed To Get Mailbox Txn
21,935,470 UART: ROM Non-Fatal Error: 0x01040004
21,937,567 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,939,142 UART: [state] Locking Datavault
21,942,723 UART: [state] Locking PCR0, PCR1 and PCR31
21,944,369 UART: [state] Locking ICCM
21,947,006 UART: [exit] Launching FMC @ 0x40000000
21,955,409 UART:
21,955,642 UART: Running Caliptra FMC ...
21,956,739 UART:
21,956,893 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,958,526 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
3,695,839 ready_for_fw is high
3,696,208 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,144,629 >>> mbox cmd response: success
18,379,874 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,396,560 UART:
18,396,932 UART: Running Caliptra FMC ...
18,398,182 UART:
18,398,349 UART: [fmc] Received command: 0x10000004
18,399,892 >>> mbox cmd response: success
21,490,679 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,500,393 UART:
21,500,654 UART: Running Caliptra FMC ...
21,501,821 UART:
21,502,000 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,503,641 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,298 UART:
192,689 UART: Running Caliptra ROM ...
193,786 UART:
193,926 UART: [state] CFI Enabled
253,612 UART: [state] LifecycleState = Unprovisioned
255,531 UART: [state] DebugLocked = No
257,547 UART: [state] WD Timer not started. Device not locked for debugging
260,515 UART: [kat] SHA2-256
439,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,154 UART: [kat] ++
451,694 UART: [kat] sha1
462,464 UART: [kat] SHA2-256
465,469 UART: [kat] SHA2-384
470,906 UART: [kat] SHA2-512-ACC
473,846 UART: [kat] ECC-384
2,937,528 UART: [kat] HMAC-384Kdf
2,961,423 UART: [kat] LMS
3,490,932 UART: [kat] --
3,494,930 UART: [cold-reset] ++
3,497,006 UART: [fht] FHT @ 0x50003400
3,507,743 UART: [idev] ++
3,508,312 UART: [idev] CDI.KEYID = 6
3,509,345 UART: [idev] SUBJECT.KEYID = 7
3,510,471 UART: [idev] UDS.KEYID = 0
3,511,557 ready_for_fw is high
3,511,749 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,646,188 UART: [idev] Erasing UDS.KEYID = 0
6,017,579 UART: [idev] Sha1 KeyId Algorithm
6,040,666 UART: [idev] --
6,045,204 UART: [ldev] ++
6,045,779 UART: [ldev] CDI.KEYID = 6
6,046,698 UART: [ldev] SUBJECT.KEYID = 5
6,047,912 UART: [ldev] AUTHORITY.KEYID = 7
6,049,146 UART: [ldev] FE.KEYID = 1
6,089,507 UART: [ldev] Erasing FE.KEYID = 1
8,592,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,014 UART: [ldev] --
10,404,120 UART: [fwproc] Wait for Commands...
10,407,345 UART: [fwproc] Recv command 0x46574c44
10,409,434 UART: [fwproc] Recv'd Img size: 106964 bytes
13,723,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,796,504 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,839,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,157,179 >>> mbox cmd response: success
14,160,737 UART: [afmc] ++
14,161,325 UART: [afmc] CDI.KEYID = 6
14,162,254 UART: [afmc] SUBJECT.KEYID = 7
14,163,412 UART: [afmc] AUTHORITY.KEYID = 5
16,690,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,412,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,414,833 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,430,826 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,446,735 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,462,740 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,485,995 UART: [afmc] --
18,490,083 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,491,159 UART: [cold-reset] --
18,493,165 UART: [state] Locking Datavault
18,498,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,500,116 UART: [state] Locking ICCM
18,502,428 UART: [exit] Launching FMC @ 0x40000000
18,510,770 UART:
18,511,005 UART: Running Caliptra FMC ...
18,512,110 UART:
18,512,266 UART: [fmc] Received command: 0x10000004
18,513,722 UART:
18,513,875 UART: Running Caliptra ROM ...
18,514,971 UART:
18,515,123 UART: [state] CFI Enabled
18,516,079 >>> mbox cmd response: success
18,579,374 UART: [state] LifecycleState = Unprovisioned
18,581,252 UART: [state] DebugLocked = No
18,583,793 UART: [state] WD Timer not started. Device not locked for debugging
18,588,116 UART: [kat] SHA2-256
18,767,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,778,771 UART: [kat] ++
18,779,372 UART: [kat] sha1
18,790,430 UART: [kat] SHA2-256
18,793,456 UART: [kat] SHA2-384
18,800,522 UART: [kat] SHA2-512-ACC
18,803,456 UART: [kat] ECC-384
21,261,162 UART: [kat] HMAC-384Kdf
21,284,140 UART: [kat] LMS
21,813,561 UART: [kat] --
21,818,539 UART: [update-reset] ++
21,819,430 UART: Failed To Get Mailbox Txn
21,823,633 UART: ROM Non-Fatal Error: 0x01040004
21,825,741 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,826,521 UART: [state] Locking Datavault
21,830,695 UART: [state] Locking PCR0, PCR1 and PCR31
21,832,394 UART: [state] Locking ICCM
21,834,057 UART: [exit] Launching FMC @ 0x40000000
21,842,454 UART:
21,842,687 UART: Running Caliptra FMC ...
21,843,788 UART:
21,843,944 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,845,576 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,381,004 ready_for_fw is high
3,381,393 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,971,342 >>> mbox cmd response: success
18,240,574 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,257,649 UART:
18,257,997 UART: Running Caliptra FMC ...
18,259,172 UART:
18,259,323 UART: [fmc] Received command: 0x10000004
18,260,858 >>> mbox cmd response: success
21,412,830 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,423,791 UART:
21,424,054 UART: Running Caliptra FMC ...
21,425,224 UART:
21,425,385 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,427,028 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,361 UART:
192,733 UART: Running Caliptra ROM ...
194,770 UART:
603,640 UART: [state] CFI Enabled
618,146 UART: [state] LifecycleState = Unprovisioned
620,020 UART: [state] DebugLocked = No
621,838 UART: [state] WD Timer not started. Device not locked for debugging
625,510 UART: [kat] SHA2-256
804,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,195 UART: [kat] ++
816,725 UART: [kat] sha1
827,172 UART: [kat] SHA2-256
830,179 UART: [kat] SHA2-384
836,534 UART: [kat] SHA2-512-ACC
839,453 UART: [kat] ECC-384
3,281,972 UART: [kat] HMAC-384Kdf
3,295,057 UART: [kat] LMS
3,824,505 UART: [kat] --
3,830,271 UART: [cold-reset] ++
3,831,631 UART: [fht] FHT @ 0x50003400
3,841,491 UART: [idev] ++
3,842,053 UART: [idev] CDI.KEYID = 6
3,842,936 UART: [idev] SUBJECT.KEYID = 7
3,844,176 UART: [idev] UDS.KEYID = 0
3,845,071 ready_for_fw is high
3,845,257 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,979,638 UART: [idev] Erasing UDS.KEYID = 0
6,314,787 UART: [idev] Sha1 KeyId Algorithm
6,337,738 UART: [idev] --
6,341,507 UART: [ldev] ++
6,342,089 UART: [ldev] CDI.KEYID = 6
6,342,979 UART: [ldev] SUBJECT.KEYID = 5
6,344,189 UART: [ldev] AUTHORITY.KEYID = 7
6,345,373 UART: [ldev] FE.KEYID = 1
6,355,534 UART: [ldev] Erasing FE.KEYID = 1
8,829,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,177 UART: [ldev] --
10,622,790 UART: [fwproc] Wait for Commands...
10,625,471 UART: [fwproc] Recv command 0x46574c44
10,627,557 UART: [fwproc] Recv'd Img size: 106964 bytes
13,941,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,406 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,053,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,372,183 >>> mbox cmd response: success
14,376,770 UART: [afmc] ++
14,377,353 UART: [afmc] CDI.KEYID = 6
14,378,264 UART: [afmc] SUBJECT.KEYID = 7
14,379,477 UART: [afmc] AUTHORITY.KEYID = 5
16,877,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,149 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,615,123 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,631,056 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,647,023 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,670,472 UART: [afmc] --
18,674,190 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,675,108 UART: [cold-reset] --
18,677,434 UART: [state] Locking Datavault
18,683,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,889 UART: [state] Locking ICCM
18,687,096 UART: [exit] Launching FMC @ 0x40000000
18,695,508 UART:
18,695,740 UART: Running Caliptra FMC ...
18,696,839 UART:
18,696,995 UART: [fmc] Received command: 0x10000004
18,698,447 UART:
18,698,609 UART: Running Caliptra ROM ...
18,699,703 UART:
18,699,852 UART: [state] CFI Enabled
18,700,807 >>> mbox cmd response: success
18,712,563 UART: [state] LifecycleState = Unprovisioned
18,714,451 UART: [state] DebugLocked = No
18,716,099 UART: [state] WD Timer not started. Device not locked for debugging
18,719,720 UART: [kat] SHA2-256
18,898,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,910,473 UART: [kat] ++
18,911,012 UART: [kat] sha1
18,922,030 UART: [kat] SHA2-256
18,925,061 UART: [kat] SHA2-384
18,931,056 UART: [kat] SHA2-512-ACC
18,934,048 UART: [kat] ECC-384
21,376,097 UART: [kat] HMAC-384Kdf
21,388,907 UART: [kat] LMS
21,918,437 UART: [kat] --
21,922,674 UART: [update-reset] ++
21,923,587 UART: Failed To Get Mailbox Txn
21,926,638 UART: ROM Non-Fatal Error: 0x01040004
21,928,665 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,929,368 UART: [state] Locking Datavault
21,931,805 UART: [state] Locking PCR0, PCR1 and PCR31
21,933,520 UART: [state] Locking ICCM
21,934,750 UART: [exit] Launching FMC @ 0x40000000
21,943,150 UART:
21,943,381 UART: Running Caliptra FMC ...
21,944,480 UART:
21,944,636 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,946,255 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,698,463 ready_for_fw is high
3,698,882 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,154,812 >>> mbox cmd response: success
18,386,615 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,397,605 UART:
18,397,952 UART: Running Caliptra FMC ...
18,399,192 UART:
18,399,375 UART: [fmc] Received command: 0x10000004
18,400,917 >>> mbox cmd response: success
21,489,432 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,502,065 UART:
21,502,360 UART: Running Caliptra FMC ...
21,503,450 UART:
21,503,602 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,505,245 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 ready_for_fw is high
1,174,481 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,872 UART: [ldev] --
1,281,376 UART: [fwproc] Wait for Commands...
1,282,079 UART: [fwproc] Recv command 0x46574c44
1,282,812 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,384 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,557 >>> mbox cmd response: success
2,677,572 UART: [afmc] ++
2,677,740 UART: [afmc] CDI.KEYID = 6
2,678,103 UART: [afmc] SUBJECT.KEYID = 7
2,678,529 UART: [afmc] AUTHORITY.KEYID = 5
2,714,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,336 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,056 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,949 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,642 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,667 UART: [afmc] --
2,757,641 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,663 UART: [cold-reset] --
2,758,457 UART: [state] Locking Datavault
2,759,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,418 UART: [state] Locking ICCM
2,761,080 UART: [exit] Launching FMC @ 0x40000000
2,766,377 UART:
2,766,393 UART: Running Caliptra FMC ...
2,766,801 UART:
2,766,939 UART: [fmc] Received command: 0x10000004
2,767,676 >>> mbox cmd response: success
2,767,772 UART:
2,767,788 UART: Running Caliptra ROM ...
2,768,196 UART:
2,768,251 UART: [state] CFI Enabled
2,771,497 UART: [state] LifecycleState = Unprovisioned
2,772,152 UART: [state] DebugLocked = No
2,772,832 UART: [state] WD Timer not started. Device not locked for debugging
2,774,170 UART: [kat] SHA2-256
3,577,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,849 UART: [kat] ++
3,582,001 UART: [kat] sha1
3,586,233 UART: [kat] SHA2-256
3,588,173 UART: [kat] SHA2-384
3,590,682 UART: [kat] SHA2-512-ACC
3,592,582 UART: [kat] ECC-384
3,602,283 UART: [kat] HMAC-384Kdf
3,606,923 UART: [kat] LMS
3,855,235 UART: [kat] --
3,855,963 UART: [update-reset] ++
3,856,274 UART: Failed To Get Mailbox Txn
3,856,935 UART: ROM Non-Fatal Error: 0x01040004
3,857,610 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,835 UART: [state] Locking Datavault
3,858,445 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,049 UART: [state] Locking ICCM
3,859,565 UART: [exit] Launching FMC @ 0x40000000
3,864,862 UART:
3,864,878 UART: Running Caliptra FMC ...
3,865,286 UART:
3,865,416 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,866,192 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,516 ready_for_fw is high
1,056,516 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,747 >>> mbox cmd response: success
2,581,387 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,454 UART:
2,587,470 UART: Running Caliptra FMC ...
2,587,878 UART:
2,588,016 UART: [fmc] Received command: 0x10000004
2,588,753 >>> mbox cmd response: success
3,560,553 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,114 UART:
3,566,130 UART: Running Caliptra FMC ...
3,566,538 UART:
3,566,668 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,444 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,598 UART: [idev] Erasing UDS.KEYID = 0
1,198,568 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,345 UART: [ldev] ++
1,208,513 UART: [ldev] CDI.KEYID = 6
1,208,877 UART: [ldev] SUBJECT.KEYID = 5
1,209,304 UART: [ldev] AUTHORITY.KEYID = 7
1,209,767 UART: [ldev] FE.KEYID = 1
1,214,989 UART: [ldev] Erasing FE.KEYID = 1
1,241,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,137 UART: [ldev] --
1,280,401 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,695 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,862 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,712,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,249 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,969 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,862 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,555 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,348 UART: [afmc] --
2,756,230 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,756,252 UART: [cold-reset] --
2,757,318 UART: [state] Locking Datavault
2,758,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,055 UART: [state] Locking ICCM
2,759,671 UART: [exit] Launching FMC @ 0x40000000
2,764,968 UART:
2,764,984 UART: Running Caliptra FMC ...
2,765,392 UART:
2,765,530 UART: [fmc] Received command: 0x10000004
2,766,267 >>> mbox cmd response: success
2,766,363 UART:
2,766,379 UART: Running Caliptra ROM ...
2,766,787 UART:
2,766,929 UART: [state] CFI Enabled
2,769,587 UART: [state] LifecycleState = Unprovisioned
2,770,242 UART: [state] DebugLocked = No
2,770,766 UART: [state] WD Timer not started. Device not locked for debugging
2,771,996 UART: [kat] SHA2-256
3,575,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,675 UART: [kat] ++
3,579,827 UART: [kat] sha1
3,584,173 UART: [kat] SHA2-256
3,586,113 UART: [kat] SHA2-384
3,588,822 UART: [kat] SHA2-512-ACC
3,590,722 UART: [kat] ECC-384
3,600,491 UART: [kat] HMAC-384Kdf
3,605,127 UART: [kat] LMS
3,853,439 UART: [kat] --
3,854,383 UART: [update-reset] ++
3,854,694 UART: Failed To Get Mailbox Txn
3,855,387 UART: ROM Non-Fatal Error: 0x01040004
3,856,062 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,856,323 UART: [state] Locking Datavault
3,857,313 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,917 UART: [state] Locking ICCM
3,858,363 UART: [exit] Launching FMC @ 0x40000000
3,863,660 UART:
3,863,676 UART: Running Caliptra FMC ...
3,864,084 UART:
3,864,214 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,864,990 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,813 ready_for_fw is high
1,055,813 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,604 >>> mbox cmd response: success
2,581,840 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,588,157 UART:
2,588,173 UART: Running Caliptra FMC ...
2,588,581 UART:
2,588,719 UART: [fmc] Received command: 0x10000004
2,589,456 >>> mbox cmd response: success
3,561,817 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,282 UART:
3,567,298 UART: Running Caliptra FMC ...
3,567,706 UART:
3,567,836 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,612 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 ready_for_fw is high
1,174,399 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,553 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,032 UART: [ldev] --
1,280,366 UART: [fwproc] Wait for Commands...
1,281,173 UART: [fwproc] Recv command 0x46574c44
1,281,906 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,286 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,327 >>> mbox cmd response: success
2,676,514 UART: [afmc] ++
2,676,682 UART: [afmc] CDI.KEYID = 6
2,677,045 UART: [afmc] SUBJECT.KEYID = 7
2,677,471 UART: [afmc] AUTHORITY.KEYID = 5
2,712,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,718 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,438 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,331 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,024 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,887 UART: [afmc] --
2,755,877 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,899 UART: [cold-reset] --
2,756,883 UART: [state] Locking Datavault
2,757,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,494 UART: [state] Locking ICCM
2,759,154 UART: [exit] Launching FMC @ 0x40000000
2,764,451 UART:
2,764,467 UART: Running Caliptra FMC ...
2,764,875 UART:
2,765,013 UART: [fmc] Received command: 0x10000004
2,765,750 >>> mbox cmd response: success
2,765,846 UART:
2,765,862 UART: Running Caliptra ROM ...
2,766,270 UART:
2,766,325 UART: [state] CFI Enabled
2,768,979 UART: [state] LifecycleState = Unprovisioned
2,769,634 UART: [state] DebugLocked = No
2,770,272 UART: [state] WD Timer not started. Device not locked for debugging
2,771,582 UART: [kat] SHA2-256
3,575,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,261 UART: [kat] ++
3,579,413 UART: [kat] sha1
3,583,693 UART: [kat] SHA2-256
3,585,633 UART: [kat] SHA2-384
3,588,508 UART: [kat] SHA2-512-ACC
3,590,408 UART: [kat] ECC-384
3,599,431 UART: [kat] HMAC-384Kdf
3,604,057 UART: [kat] LMS
3,852,369 UART: [kat] --
3,853,257 UART: [update-reset] ++
3,853,568 UART: Failed To Get Mailbox Txn
3,854,453 UART: ROM Non-Fatal Error: 0x01040004
3,855,128 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,855,447 UART: [state] Locking Datavault
3,856,463 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,067 UART: [state] Locking ICCM
3,857,541 UART: [exit] Launching FMC @ 0x40000000
3,862,838 UART:
3,862,854 UART: Running Caliptra FMC ...
3,863,262 UART:
3,863,392 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,864,168 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,290 ready_for_fw is high
1,055,290 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,225 >>> mbox cmd response: success
2,579,437 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,536 UART:
2,585,552 UART: Running Caliptra FMC ...
2,585,960 UART:
2,586,098 UART: [fmc] Received command: 0x10000004
2,586,835 >>> mbox cmd response: success
3,559,067 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,336 UART:
3,564,352 UART: Running Caliptra FMC ...
3,564,760 UART:
3,564,890 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,565,666 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
905,097 UART: [kat] SHA2-512-ACC
906,998 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,611 UART: [kat] LMS
1,169,923 UART: [kat] --
1,170,760 UART: [cold-reset] ++
1,171,274 UART: [fht] FHT @ 0x50003400
1,173,914 UART: [idev] ++
1,174,082 UART: [idev] CDI.KEYID = 6
1,174,443 UART: [idev] SUBJECT.KEYID = 7
1,174,868 UART: [idev] UDS.KEYID = 0
1,175,214 ready_for_fw is high
1,175,214 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,206 UART: [idev] Erasing UDS.KEYID = 0
1,200,368 UART: [idev] Sha1 KeyId Algorithm
1,209,314 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,755 UART: [ldev] --
1,283,103 UART: [fwproc] Wait for Commands...
1,283,716 UART: [fwproc] Recv command 0x46574c44
1,284,449 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,043 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,040 >>> mbox cmd response: success
2,680,155 UART: [afmc] ++
2,680,323 UART: [afmc] CDI.KEYID = 6
2,680,686 UART: [afmc] SUBJECT.KEYID = 7
2,681,112 UART: [afmc] AUTHORITY.KEYID = 5
2,716,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,751 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,739,471 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,745,364 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,057 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,938 UART: [afmc] --
2,759,838 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,759,860 UART: [cold-reset] --
2,760,632 UART: [state] Locking Datavault
2,761,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,762,309 UART: [state] Locking ICCM
2,762,969 UART: [exit] Launching FMC @ 0x40000000
2,768,266 UART:
2,768,282 UART: Running Caliptra FMC ...
2,768,690 UART:
2,768,828 UART: [fmc] Received command: 0x10000004
2,769,565 >>> mbox cmd response: success
2,769,661 UART:
2,769,677 UART: Running Caliptra ROM ...
2,770,085 UART:
2,770,227 UART: [state] CFI Enabled
2,773,309 UART: [state] LifecycleState = Unprovisioned
2,773,964 UART: [state] DebugLocked = No
2,774,476 UART: [state] WD Timer not started. Device not locked for debugging
2,775,788 UART: [kat] SHA2-256
3,579,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,583,467 UART: [kat] ++
3,583,619 UART: [kat] sha1
3,587,857 UART: [kat] SHA2-256
3,589,797 UART: [kat] SHA2-384
3,592,504 UART: [kat] SHA2-512-ACC
3,594,404 UART: [kat] ECC-384
3,603,925 UART: [kat] HMAC-384Kdf
3,608,355 UART: [kat] LMS
3,856,667 UART: [kat] --
3,857,507 UART: [update-reset] ++
3,857,818 UART: Failed To Get Mailbox Txn
3,858,423 UART: ROM Non-Fatal Error: 0x01040004
3,859,098 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,859,401 UART: [state] Locking Datavault
3,860,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,761 UART: [state] Locking ICCM
3,861,299 UART: [exit] Launching FMC @ 0x40000000
3,866,596 UART:
3,866,612 UART: Running Caliptra FMC ...
3,867,020 UART:
3,867,150 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,867,926 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,515 ready_for_fw is high
1,056,515 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,674 >>> mbox cmd response: success
2,582,502 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,588,803 UART:
2,588,819 UART: Running Caliptra FMC ...
2,589,227 UART:
2,589,365 UART: [fmc] Received command: 0x10000004
2,590,102 >>> mbox cmd response: success
3,562,125 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,562 UART:
3,567,578 UART: Running Caliptra FMC ...
3,567,986 UART:
3,568,116 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,892 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 ready_for_fw is high
1,173,943 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,724 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,798 UART: [ldev] --
1,280,236 UART: [fwproc] Wait for Commands...
1,280,949 UART: [fwproc] Recv command 0x46574c44
1,281,682 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,922 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,031 >>> mbox cmd response: success
2,676,174 UART: [afmc] ++
2,676,342 UART: [afmc] CDI.KEYID = 6
2,676,705 UART: [afmc] SUBJECT.KEYID = 7
2,677,131 UART: [afmc] AUTHORITY.KEYID = 5
2,712,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,246 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,966 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,859 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,552 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,423 UART: [afmc] --
2,755,315 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,337 UART: [cold-reset] --
2,756,313 UART: [state] Locking Datavault
2,757,428 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,032 UART: [state] Locking ICCM
2,758,498 UART: [exit] Launching FMC @ 0x40000000
2,763,795 UART:
2,763,811 UART: Running Caliptra FMC ...
2,764,219 UART:
2,764,357 UART: [fmc] Received command: 0x10000004
2,765,094 >>> mbox cmd response: success
2,765,190 UART:
2,765,206 UART: Running Caliptra ROM ...
2,765,614 UART:
2,765,669 UART: [state] CFI Enabled
2,767,937 UART: [state] LifecycleState = Unprovisioned
2,768,592 UART: [state] DebugLocked = No
2,769,172 UART: [state] WD Timer not started. Device not locked for debugging
2,770,438 UART: [kat] SHA2-256
3,573,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,117 UART: [kat] ++
3,578,269 UART: [kat] sha1
3,582,567 UART: [kat] SHA2-256
3,584,507 UART: [kat] SHA2-384
3,587,250 UART: [kat] SHA2-512-ACC
3,589,150 UART: [kat] ECC-384
3,598,797 UART: [kat] HMAC-384Kdf
3,603,437 UART: [kat] LMS
3,851,749 UART: [kat] --
3,852,657 UART: [update-reset] ++
3,852,968 UART: Failed To Get Mailbox Txn
3,853,689 UART: ROM Non-Fatal Error: 0x01040004
3,854,364 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,537 UART: [state] Locking Datavault
3,855,323 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,927 UART: [state] Locking ICCM
3,856,387 UART: [exit] Launching FMC @ 0x40000000
3,861,684 UART:
3,861,700 UART: Running Caliptra FMC ...
3,862,108 UART:
3,862,238 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,014 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,266 ready_for_fw is high
1,056,266 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,075 >>> mbox cmd response: success
2,582,399 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,588,752 UART:
2,588,768 UART: Running Caliptra FMC ...
2,589,176 UART:
2,589,314 UART: [fmc] Received command: 0x10000004
2,590,051 >>> mbox cmd response: success
3,562,113 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,388 UART:
3,567,404 UART: Running Caliptra FMC ...
3,567,812 UART:
3,567,942 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,718 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,174,226 ready_for_fw is high
1,174,226 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,614 UART: [idev] Erasing UDS.KEYID = 0
1,198,736 UART: [idev] Sha1 KeyId Algorithm
1,207,480 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,157 UART: [ldev] Erasing FE.KEYID = 1
1,241,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,609 UART: [ldev] --
1,280,967 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,995 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,954 >>> mbox cmd response: success
2,677,999 UART: [afmc] ++
2,678,167 UART: [afmc] CDI.KEYID = 6
2,678,530 UART: [afmc] SUBJECT.KEYID = 7
2,678,956 UART: [afmc] AUTHORITY.KEYID = 5
2,714,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,367 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,087 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,980 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,673 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,360 UART: [afmc] --
2,757,356 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,378 UART: [cold-reset] --
2,758,160 UART: [state] Locking Datavault
2,759,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,087 UART: [state] Locking ICCM
2,760,673 UART: [exit] Launching FMC @ 0x40000000
2,765,970 UART:
2,765,986 UART: Running Caliptra FMC ...
2,766,394 UART:
2,766,532 UART: [fmc] Received command: 0x10000004
2,767,269 >>> mbox cmd response: success
2,767,365 UART:
2,767,381 UART: Running Caliptra ROM ...
2,767,789 UART:
2,767,931 UART: [state] CFI Enabled
2,770,541 UART: [state] LifecycleState = Unprovisioned
2,771,196 UART: [state] DebugLocked = No
2,771,876 UART: [state] WD Timer not started. Device not locked for debugging
2,773,082 UART: [kat] SHA2-256
3,576,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,761 UART: [kat] ++
3,580,913 UART: [kat] sha1
3,585,167 UART: [kat] SHA2-256
3,587,107 UART: [kat] SHA2-384
3,589,922 UART: [kat] SHA2-512-ACC
3,591,822 UART: [kat] ECC-384
3,601,813 UART: [kat] HMAC-384Kdf
3,606,387 UART: [kat] LMS
3,854,699 UART: [kat] --
3,855,861 UART: [update-reset] ++
3,856,172 UART: Failed To Get Mailbox Txn
3,857,085 UART: ROM Non-Fatal Error: 0x01040004
3,857,760 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,901 UART: [state] Locking Datavault
3,858,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,435 UART: [state] Locking ICCM
3,859,855 UART: [exit] Launching FMC @ 0x40000000
3,865,152 UART:
3,865,168 UART: Running Caliptra FMC ...
3,865,576 UART:
3,865,706 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,866,482 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,263 ready_for_fw is high
1,056,263 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,368 >>> mbox cmd response: success
2,583,452 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,589,457 UART:
2,589,473 UART: Running Caliptra FMC ...
2,589,881 UART:
2,590,019 UART: [fmc] Received command: 0x10000004
2,590,756 >>> mbox cmd response: success
3,563,929 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,569,340 UART:
3,569,356 UART: Running Caliptra FMC ...
3,569,764 UART:
3,569,894 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,570,670 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,361 UART:
192,724 UART: Running Caliptra ROM ...
193,905 UART:
194,056 UART: [state] CFI Enabled
263,950 UART: [state] LifecycleState = Unprovisioned
266,406 UART: [state] DebugLocked = No
267,651 UART: [state] WD Timer not started. Device not locked for debugging
271,961 UART: [kat] SHA2-256
453,944 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,456 UART: [kat] ++
465,902 UART: [kat] sha1
475,985 UART: [kat] SHA2-256
479,007 UART: [kat] SHA2-384
485,305 UART: [kat] SHA2-512-ACC
487,891 UART: [kat] ECC-384
3,777,124 UART: [kat] HMAC-384Kdf
3,800,234 UART: [kat] LMS
4,873,447 UART: [kat] --
4,875,917 UART: [cold-reset] ++
4,877,526 UART: [fht] FHT @ 0x50003400
4,888,193 UART: [idev] ++
4,888,830 UART: [idev] CDI.KEYID = 6
4,890,004 UART: [idev] SUBJECT.KEYID = 7
4,891,183 UART: [idev] UDS.KEYID = 0
4,892,077 ready_for_fw is high
4,892,266 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,026,307 UART: [idev] Erasing UDS.KEYID = 0
8,219,573 UART: [idev] Sha1 KeyId Algorithm
8,241,166 UART: [idev] --
8,244,650 UART: [ldev] ++
8,245,227 UART: [ldev] CDI.KEYID = 6
8,246,460 UART: [ldev] SUBJECT.KEYID = 5
8,247,558 UART: [ldev] AUTHORITY.KEYID = 7
8,248,784 UART: [ldev] FE.KEYID = 1
8,275,474 UART: [ldev] Erasing FE.KEYID = 1
11,611,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,938,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,954,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,970,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,992,646 UART: [ldev] --
13,997,745 UART: [fwproc] Wait for Commands...
13,999,333 UART: [fwproc] Recv command 0x46574c44
14,001,654 UART: [fwproc] Recv'd Img size: 106620 bytes
17,982,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,052,608 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,095,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,411,932 >>> mbox cmd response: success
18,416,914 UART: [afmc] ++
18,417,498 UART: [afmc] CDI.KEYID = 6
18,418,679 UART: [afmc] SUBJECT.KEYID = 7
18,419,833 UART: [afmc] AUTHORITY.KEYID = 5
21,778,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,075,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,078,194 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,094,213 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,110,264 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,126,348 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,149,509 UART: [afmc] --
24,153,916 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,155,126 UART: [cold-reset] --
24,158,075 UART: [state] Locking Datavault
24,161,341 UART: [state] Locking PCR0, PCR1 and PCR31
24,162,985 UART: [state] Locking ICCM
24,165,834 UART: [exit] Launching FMC @ 0x40000000
24,174,490 UART:
24,174,731 UART: Running Caliptra FMC ...
24,175,826 UART:
24,176,003 UART: [fmc] Received command: 0x1000000B
24,177,390 UART:
24,177,536 UART: Running Caliptra ROM ...
24,178,630 UART:
24,178,780 UART: [state] CFI Enabled
24,242,612 UART: [state] LifecycleState = Unprovisioned
24,244,531 UART: [state] DebugLocked = No
24,246,833 UART: [state] WD Timer not started. Device not locked for debugging
24,251,207 UART: [kat] SHA2-256
24,433,150 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,444,675 UART: [kat] ++
24,445,205 UART: [kat] sha1
24,455,393 UART: [kat] SHA2-256
24,458,401 UART: [kat] SHA2-384
24,464,222 UART: [kat] SHA2-512-ACC
24,466,847 UART: [kat] ECC-384
27,753,121 UART: [kat] HMAC-384Kdf
27,780,521 UART: [kat] LMS
28,853,695 UART: [kat] --
28,860,101 UART: [update-reset] ++
28,861,238 UART: Invalid command 0x1000000b recv
28,863,936 UART: ROM Non-Fatal Error: 0x01040003
28,866,231 UART: [state] Locking Datavault
28,869,039 UART: [state] Locking PCR0, PCR1 and PCR31
28,871,246 UART: [state] Locking ICCM
28,872,849 UART: [exit] Launching FMC @ 0x40000000
28,881,418 UART:
28,881,685 UART: Running Caliptra FMC ...
28,882,865 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
4,778,973 ready_for_fw is high
4,779,356 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,210,138 >>> mbox cmd response: success
23,894,483 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
23,909,459 UART:
23,909,848 UART: Running Caliptra FMC ...
23,911,125 UART:
23,911,298 UART: [fmc] Received command: 0x1000000B
28,504,350 UART:
28,504,696 UART: Running Caliptra FMC ...
28,505,813 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,498 UART:
192,862 UART: Running Caliptra ROM ...
193,987 UART:
603,835 UART: [state] CFI Enabled
615,989 UART: [state] LifecycleState = Unprovisioned
618,358 UART: [state] DebugLocked = No
620,368 UART: [state] WD Timer not started. Device not locked for debugging
624,742 UART: [kat] SHA2-256
806,742 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,323 UART: [kat] ++
818,765 UART: [kat] sha1
829,785 UART: [kat] SHA2-256
832,850 UART: [kat] SHA2-384
838,772 UART: [kat] SHA2-512-ACC
841,429 UART: [kat] ECC-384
4,096,604 UART: [kat] HMAC-384Kdf
4,110,042 UART: [kat] LMS
5,183,257 UART: [kat] --
5,187,335 UART: [cold-reset] ++
5,189,767 UART: [fht] FHT @ 0x50003400
5,199,744 UART: [idev] ++
5,200,440 UART: [idev] CDI.KEYID = 6
5,201,678 UART: [idev] SUBJECT.KEYID = 7
5,203,133 UART: [idev] UDS.KEYID = 0
5,204,315 ready_for_fw is high
5,204,493 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,338,427 UART: [idev] Erasing UDS.KEYID = 0
8,497,018 UART: [idev] Sha1 KeyId Algorithm
8,518,648 UART: [idev] --
8,522,831 UART: [ldev] ++
8,523,410 UART: [ldev] CDI.KEYID = 6
8,524,633 UART: [ldev] SUBJECT.KEYID = 5
8,526,054 UART: [ldev] AUTHORITY.KEYID = 7
8,527,654 UART: [ldev] FE.KEYID = 1
8,540,071 UART: [ldev] Erasing FE.KEYID = 1
11,831,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,716 UART: [ldev] --
14,198,280 UART: [fwproc] Wait for Commands...
14,200,854 UART: [fwproc] Recv command 0x46574c44
14,203,104 UART: [fwproc] Recv'd Img size: 106620 bytes
18,183,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,256,181 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,298,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,614,909 >>> mbox cmd response: success
18,618,239 UART: [afmc] ++
18,618,824 UART: [afmc] CDI.KEYID = 6
18,620,007 UART: [afmc] SUBJECT.KEYID = 7
18,621,221 UART: [afmc] AUTHORITY.KEYID = 5
21,936,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,233,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,235,769 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,251,814 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,267,825 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,283,957 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,305,838 UART: [afmc] --
24,309,916 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,310,850 UART: [cold-reset] --
24,313,604 UART: [state] Locking Datavault
24,318,319 UART: [state] Locking PCR0, PCR1 and PCR31
24,319,952 UART: [state] Locking ICCM
24,322,366 UART: [exit] Launching FMC @ 0x40000000
24,330,971 UART:
24,331,197 UART: Running Caliptra FMC ...
24,332,288 UART:
24,332,442 UART: [fmc] Received command: 0x1000000B
24,333,809 UART:
24,333,947 UART: Running Caliptra ROM ...
24,335,032 UART:
24,335,240 UART: [state] CFI Enabled
24,347,565 UART: [state] LifecycleState = Unprovisioned
24,349,432 UART: [state] DebugLocked = No
24,351,185 UART: [state] WD Timer not started. Device not locked for debugging
24,356,513 UART: [kat] SHA2-256
24,538,461 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,550,010 UART: [kat] ++
24,550,488 UART: [kat] sha1
24,560,882 UART: [kat] SHA2-256
24,563,894 UART: [kat] SHA2-384
24,570,311 UART: [kat] SHA2-512-ACC
24,572,923 UART: [kat] ECC-384
27,831,052 UART: [kat] HMAC-384Kdf
27,842,987 UART: [kat] LMS
28,916,129 UART: [kat] --
28,919,943 UART: [update-reset] ++
28,921,078 UART: Invalid command 0x1000000b recv
28,925,916 UART: ROM Non-Fatal Error: 0x01040003
28,929,898 UART: [state] Locking Datavault
28,932,017 UART: [state] Locking PCR0, PCR1 and PCR31
28,934,234 UART: [state] Locking ICCM
28,936,797 UART: [exit] Launching FMC @ 0x40000000
28,945,433 UART:
28,945,672 UART: Running Caliptra FMC ...
28,946,837 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
5,105,993 ready_for_fw is high
5,106,456 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,409,809 >>> mbox cmd response: success
24,030,992 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,044,863 UART:
24,045,240 UART: Running Caliptra FMC ...
24,046,425 UART:
24,046,628 UART: [fmc] Received command: 0x1000000B
28,550,639 UART:
28,550,995 UART: Running Caliptra FMC ...
28,552,118 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,131 UART:
192,514 UART: Running Caliptra ROM ...
193,623 UART:
193,760 UART: [state] CFI Enabled
261,419 UART: [state] LifecycleState = Unprovisioned
263,285 UART: [state] DebugLocked = No
264,657 UART: [state] WD Timer not started. Device not locked for debugging
269,034 UART: [kat] SHA2-256
448,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,753 UART: [kat] ++
460,195 UART: [kat] sha1
471,420 UART: [kat] SHA2-256
474,429 UART: [kat] SHA2-384
481,556 UART: [kat] SHA2-512-ACC
484,509 UART: [kat] ECC-384
2,946,099 UART: [kat] HMAC-384Kdf
2,970,567 UART: [kat] LMS
3,499,986 UART: [kat] --
3,504,433 UART: [cold-reset] ++
3,506,300 UART: [fht] FHT @ 0x50003400
3,518,277 UART: [idev] ++
3,518,841 UART: [idev] CDI.KEYID = 6
3,519,877 UART: [idev] SUBJECT.KEYID = 7
3,520,982 UART: [idev] UDS.KEYID = 0
3,521,919 ready_for_fw is high
3,522,104 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,656,660 UART: [idev] Erasing UDS.KEYID = 0
6,026,493 UART: [idev] Sha1 KeyId Algorithm
6,049,350 UART: [idev] --
6,053,130 UART: [ldev] ++
6,053,723 UART: [ldev] CDI.KEYID = 6
6,054,612 UART: [ldev] SUBJECT.KEYID = 5
6,055,718 UART: [ldev] AUTHORITY.KEYID = 7
6,057,014 UART: [ldev] FE.KEYID = 1
6,098,694 UART: [ldev] Erasing FE.KEYID = 1
8,603,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,286 UART: [ldev] --
10,411,551 UART: [fwproc] Wait for Commands...
10,414,508 UART: [fwproc] Recv command 0x46574c44
10,416,598 UART: [fwproc] Recv'd Img size: 106964 bytes
13,726,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,798,457 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,841,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,160,211 >>> mbox cmd response: success
14,165,265 UART: [afmc] ++
14,165,853 UART: [afmc] CDI.KEYID = 6
14,166,738 UART: [afmc] SUBJECT.KEYID = 7
14,167,838 UART: [afmc] AUTHORITY.KEYID = 5
16,704,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,221 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,234 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,153 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,064 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,741 UART: [afmc] --
18,501,342 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,502,320 UART: [cold-reset] --
18,506,301 UART: [state] Locking Datavault
18,511,829 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,486 UART: [state] Locking ICCM
18,515,448 UART: [exit] Launching FMC @ 0x40000000
18,523,842 UART:
18,524,087 UART: Running Caliptra FMC ...
18,525,115 UART:
18,525,258 UART: [fmc] Received command: 0x1000000B
18,526,716 UART:
18,526,865 UART: Running Caliptra ROM ...
18,527,880 UART:
18,528,021 UART: [state] CFI Enabled
18,584,770 UART: [state] LifecycleState = Unprovisioned
18,586,741 UART: [state] DebugLocked = No
18,589,182 UART: [state] WD Timer not started. Device not locked for debugging
18,593,067 UART: [kat] SHA2-256
18,772,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,783,767 UART: [kat] ++
18,784,221 UART: [kat] sha1
18,794,777 UART: [kat] SHA2-256
18,797,850 UART: [kat] SHA2-384
18,804,532 UART: [kat] SHA2-512-ACC
18,807,472 UART: [kat] ECC-384
21,271,110 UART: [kat] HMAC-384Kdf
21,296,088 UART: [kat] LMS
21,825,545 UART: [kat] --
21,829,790 UART: [update-reset] ++
21,830,713 UART: Invalid command 0x1000000b recv
21,834,418 UART: ROM Non-Fatal Error: 0x01040003
21,837,767 UART: [state] Locking Datavault
21,841,285 UART: [state] Locking PCR0, PCR1 and PCR31
21,842,968 UART: [state] Locking ICCM
21,844,409 UART: [exit] Launching FMC @ 0x40000000
21,852,813 UART:
21,853,064 UART: Running Caliptra FMC ...
21,854,215 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,381,608 ready_for_fw is high
3,382,055 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,939,631 >>> mbox cmd response: success
18,216,360 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,231,178 UART:
18,231,551 UART: Running Caliptra FMC ...
18,232,824 UART:
18,233,015 UART: [fmc] Received command: 0x1000000B
21,425,653 UART:
21,425,983 UART: Running Caliptra FMC ...
21,427,168 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,549 UART:
192,904 UART: Running Caliptra ROM ...
194,005 UART:
603,475 UART: [state] CFI Enabled
618,291 UART: [state] LifecycleState = Unprovisioned
620,202 UART: [state] DebugLocked = No
621,690 UART: [state] WD Timer not started. Device not locked for debugging
625,224 UART: [kat] SHA2-256
804,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,920 UART: [kat] ++
816,450 UART: [kat] sha1
827,256 UART: [kat] SHA2-256
830,325 UART: [kat] SHA2-384
837,232 UART: [kat] SHA2-512-ACC
840,236 UART: [kat] ECC-384
3,282,757 UART: [kat] HMAC-384Kdf
3,295,776 UART: [kat] LMS
3,825,314 UART: [kat] --
3,828,955 UART: [cold-reset] ++
3,830,815 UART: [fht] FHT @ 0x50003400
3,841,927 UART: [idev] ++
3,842,485 UART: [idev] CDI.KEYID = 6
3,843,454 UART: [idev] SUBJECT.KEYID = 7
3,844,625 UART: [idev] UDS.KEYID = 0
3,845,592 ready_for_fw is high
3,845,776 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,980,142 UART: [idev] Erasing UDS.KEYID = 0
6,320,358 UART: [idev] Sha1 KeyId Algorithm
6,344,557 UART: [idev] --
6,349,899 UART: [ldev] ++
6,350,463 UART: [ldev] CDI.KEYID = 6
6,351,375 UART: [ldev] SUBJECT.KEYID = 5
6,352,534 UART: [ldev] AUTHORITY.KEYID = 7
6,353,817 UART: [ldev] FE.KEYID = 1
6,362,679 UART: [ldev] Erasing FE.KEYID = 1
8,838,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,252 UART: [ldev] --
10,629,084 UART: [fwproc] Wait for Commands...
10,631,612 UART: [fwproc] Recv command 0x46574c44
10,633,700 UART: [fwproc] Recv'd Img size: 106964 bytes
13,940,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,017,368 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,059,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,377,536 >>> mbox cmd response: success
14,382,303 UART: [afmc] ++
14,382,890 UART: [afmc] CDI.KEYID = 6
14,383,799 UART: [afmc] SUBJECT.KEYID = 7
14,385,013 UART: [afmc] AUTHORITY.KEYID = 5
16,889,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,743 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,630,694 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,646,625 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,662,592 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,684,324 UART: [afmc] --
18,688,842 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,689,749 UART: [cold-reset] --
18,691,804 UART: [state] Locking Datavault
18,697,278 UART: [state] Locking PCR0, PCR1 and PCR31
18,699,028 UART: [state] Locking ICCM
18,700,738 UART: [exit] Launching FMC @ 0x40000000
18,709,133 UART:
18,709,364 UART: Running Caliptra FMC ...
18,710,462 UART:
18,710,614 UART: [fmc] Received command: 0x1000000B
18,712,068 UART:
18,712,241 UART: Running Caliptra ROM ...
18,713,335 UART:
18,713,485 UART: [state] CFI Enabled
18,727,743 UART: [state] LifecycleState = Unprovisioned
18,729,575 UART: [state] DebugLocked = No
18,730,892 UART: [state] WD Timer not started. Device not locked for debugging
18,735,365 UART: [kat] SHA2-256
18,914,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,926,104 UART: [kat] ++
18,926,643 UART: [kat] sha1
18,936,561 UART: [kat] SHA2-256
18,939,571 UART: [kat] SHA2-384
18,946,344 UART: [kat] SHA2-512-ACC
18,949,287 UART: [kat] ECC-384
21,394,103 UART: [kat] HMAC-384Kdf
21,407,510 UART: [kat] LMS
21,937,021 UART: [kat] --
21,941,539 UART: [update-reset] ++
21,942,458 UART: Invalid command 0x1000000b recv
21,946,976 UART: ROM Non-Fatal Error: 0x01040003
21,950,479 UART: [state] Locking Datavault
21,952,957 UART: [state] Locking PCR0, PCR1 and PCR31
21,954,632 UART: [state] Locking ICCM
21,955,944 UART: [exit] Launching FMC @ 0x40000000
21,964,344 UART:
21,964,584 UART: Running Caliptra FMC ...
21,965,727 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,695,881 ready_for_fw is high
3,696,501 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,149,020 >>> mbox cmd response: success
18,385,511 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,402,488 UART:
18,402,836 UART: Running Caliptra FMC ...
18,404,003 UART:
18,404,163 UART: [fmc] Received command: 0x1000000B
21,506,416 UART:
21,506,757 UART: Running Caliptra FMC ...
21,507,873 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,012 UART:
192,388 UART: Running Caliptra ROM ...
193,581 UART:
193,734 UART: [state] CFI Enabled
266,636 UART: [state] LifecycleState = Unprovisioned
268,550 UART: [state] DebugLocked = No
271,155 UART: [state] WD Timer not started. Device not locked for debugging
274,825 UART: [kat] SHA2-256
453,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,534 UART: [kat] ++
466,079 UART: [kat] sha1
477,602 UART: [kat] SHA2-256
480,617 UART: [kat] SHA2-384
486,959 UART: [kat] SHA2-512-ACC
489,896 UART: [kat] ECC-384
2,948,472 UART: [kat] HMAC-384Kdf
2,973,358 UART: [kat] LMS
3,502,852 UART: [kat] --
3,506,017 UART: [cold-reset] ++
3,508,517 UART: [fht] FHT @ 0x50003400
3,518,714 UART: [idev] ++
3,519,279 UART: [idev] CDI.KEYID = 6
3,520,203 UART: [idev] SUBJECT.KEYID = 7
3,521,381 UART: [idev] UDS.KEYID = 0
3,522,385 ready_for_fw is high
3,522,586 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,657,050 UART: [idev] Erasing UDS.KEYID = 0
6,029,469 UART: [idev] Sha1 KeyId Algorithm
6,053,358 UART: [idev] --
6,058,115 UART: [ldev] ++
6,058,883 UART: [ldev] CDI.KEYID = 6
6,059,779 UART: [ldev] SUBJECT.KEYID = 5
6,060,837 UART: [ldev] AUTHORITY.KEYID = 7
6,062,039 UART: [ldev] FE.KEYID = 1
6,101,191 UART: [ldev] Erasing FE.KEYID = 1
8,607,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,320 UART: [ldev] --
10,414,071 UART: [fwproc] Wait for Commands...
10,417,029 UART: [fwproc] Recv command 0x46574c44
10,419,068 UART: [fwproc] Recv'd Img size: 106964 bytes
13,731,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,806,025 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,848,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,166,837 >>> mbox cmd response: success
14,170,799 UART: [afmc] ++
14,171,409 UART: [afmc] CDI.KEYID = 6
14,172,292 UART: [afmc] SUBJECT.KEYID = 7
14,173,398 UART: [afmc] AUTHORITY.KEYID = 5
16,699,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,426,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,428,312 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,444,300 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,460,260 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,476,193 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,221 UART: [afmc] --
18,502,879 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,503,869 UART: [cold-reset] --
18,507,064 UART: [state] Locking Datavault
18,511,092 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,746 UART: [state] Locking ICCM
18,515,306 UART: [exit] Launching FMC @ 0x40000000
18,523,716 UART:
18,523,956 UART: Running Caliptra FMC ...
18,525,058 UART:
18,525,215 UART: [fmc] Received command: 0x1000000B
18,526,589 UART:
18,526,733 UART: Running Caliptra ROM ...
18,527,826 UART:
18,527,979 UART: [state] CFI Enabled
18,594,048 UART: [state] LifecycleState = Unprovisioned
18,595,925 UART: [state] DebugLocked = No
18,598,307 UART: [state] WD Timer not started. Device not locked for debugging
18,602,514 UART: [kat] SHA2-256
18,781,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,793,207 UART: [kat] ++
18,793,661 UART: [kat] sha1
18,805,299 UART: [kat] SHA2-256
18,808,335 UART: [kat] SHA2-384
18,814,916 UART: [kat] SHA2-512-ACC
18,817,853 UART: [kat] ECC-384
21,275,412 UART: [kat] HMAC-384Kdf
21,297,576 UART: [kat] LMS
21,827,033 UART: [kat] --
21,831,034 UART: [update-reset] ++
21,831,914 UART: Invalid command 0x1000000b recv
21,835,203 UART: ROM Non-Fatal Error: 0x01040003
21,838,343 UART: [state] Locking Datavault
21,841,866 UART: [state] Locking PCR0, PCR1 and PCR31
21,843,557 UART: [state] Locking ICCM
21,845,774 UART: [exit] Launching FMC @ 0x40000000
21,854,176 UART:
21,854,426 UART: Running Caliptra FMC ...
21,855,570 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,086 writing to cptra_bootfsm_go
3,358,114 ready_for_fw is high
3,358,589 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,953,597 >>> mbox cmd response: success
18,238,066 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,252,257 UART:
18,252,628 UART: Running Caliptra FMC ...
18,253,894 UART:
18,254,062 UART: [fmc] Received command: 0x1000000B
21,443,235 UART:
21,443,590 UART: Running Caliptra FMC ...
21,444,766 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,434 UART:
192,812 UART: Running Caliptra ROM ...
193,942 UART:
603,425 UART: [state] CFI Enabled
616,711 UART: [state] LifecycleState = Unprovisioned
618,512 UART: [state] DebugLocked = No
621,021 UART: [state] WD Timer not started. Device not locked for debugging
624,550 UART: [kat] SHA2-256
803,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,216 UART: [kat] ++
815,664 UART: [kat] sha1
826,531 UART: [kat] SHA2-256
829,537 UART: [kat] SHA2-384
836,518 UART: [kat] SHA2-512-ACC
839,458 UART: [kat] ECC-384
3,279,858 UART: [kat] HMAC-384Kdf
3,291,746 UART: [kat] LMS
3,821,236 UART: [kat] --
3,826,774 UART: [cold-reset] ++
3,828,947 UART: [fht] FHT @ 0x50003400
3,840,573 UART: [idev] ++
3,841,136 UART: [idev] CDI.KEYID = 6
3,842,020 UART: [idev] SUBJECT.KEYID = 7
3,843,263 UART: [idev] UDS.KEYID = 0
3,844,188 ready_for_fw is high
3,844,388 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,978,866 UART: [idev] Erasing UDS.KEYID = 0
6,314,414 UART: [idev] Sha1 KeyId Algorithm
6,337,045 UART: [idev] --
6,340,637 UART: [ldev] ++
6,341,207 UART: [ldev] CDI.KEYID = 6
6,342,117 UART: [ldev] SUBJECT.KEYID = 5
6,343,274 UART: [ldev] AUTHORITY.KEYID = 7
6,344,578 UART: [ldev] FE.KEYID = 1
6,356,195 UART: [ldev] Erasing FE.KEYID = 1
8,827,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,533 UART: [ldev] --
10,615,605 UART: [fwproc] Wait for Commands...
10,618,017 UART: [fwproc] Recv command 0x46574c44
10,620,112 UART: [fwproc] Recv'd Img size: 106964 bytes
13,924,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,829 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,042,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,360,365 >>> mbox cmd response: success
14,364,602 UART: [afmc] ++
14,365,208 UART: [afmc] CDI.KEYID = 6
14,366,116 UART: [afmc] SUBJECT.KEYID = 7
14,367,325 UART: [afmc] AUTHORITY.KEYID = 5
16,864,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,585,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,587,718 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,603,700 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,619,642 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,635,543 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,657,466 UART: [afmc] --
18,661,396 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,662,388 UART: [cold-reset] --
18,664,624 UART: [state] Locking Datavault
18,670,146 UART: [state] Locking PCR0, PCR1 and PCR31
18,671,788 UART: [state] Locking ICCM
18,672,832 UART: [exit] Launching FMC @ 0x40000000
18,681,240 UART:
18,681,483 UART: Running Caliptra FMC ...
18,682,582 UART:
18,682,735 UART: [fmc] Received command: 0x1000000B
18,684,191 UART:
18,684,342 UART: Running Caliptra ROM ...
18,685,434 UART:
18,685,584 UART: [state] CFI Enabled
18,697,999 UART: [state] LifecycleState = Unprovisioned
18,699,823 UART: [state] DebugLocked = No
18,701,626 UART: [state] WD Timer not started. Device not locked for debugging
18,705,069 UART: [kat] SHA2-256
18,884,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,895,843 UART: [kat] ++
18,896,378 UART: [kat] sha1
18,908,128 UART: [kat] SHA2-256
18,911,148 UART: [kat] SHA2-384
18,918,053 UART: [kat] SHA2-512-ACC
18,920,989 UART: [kat] ECC-384
21,362,252 UART: [kat] HMAC-384Kdf
21,373,741 UART: [kat] LMS
21,903,239 UART: [kat] --
21,907,748 UART: [update-reset] ++
21,908,607 UART: Invalid command 0x1000000b recv
21,912,691 UART: ROM Non-Fatal Error: 0x01040003
21,915,436 UART: [state] Locking Datavault
21,919,574 UART: [state] Locking PCR0, PCR1 and PCR31
21,921,249 UART: [state] Locking ICCM
21,922,966 UART: [exit] Launching FMC @ 0x40000000
21,931,396 UART:
21,931,688 UART: Running Caliptra FMC ...
21,932,758 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,299 writing to cptra_bootfsm_go
3,698,528 ready_for_fw is high
3,698,912 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,153,669 >>> mbox cmd response: success
18,389,912 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,404,024 UART:
18,404,421 UART: Running Caliptra FMC ...
18,405,695 UART:
18,405,861 UART: [fmc] Received command: 0x1000000B
21,504,253 UART:
21,504,577 UART: Running Caliptra FMC ...
21,505,744 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 ready_for_fw is high
1,174,637 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,295 UART: [idev] --
1,209,212 UART: [ldev] ++
1,209,380 UART: [ldev] CDI.KEYID = 6
1,209,744 UART: [ldev] SUBJECT.KEYID = 5
1,210,171 UART: [ldev] AUTHORITY.KEYID = 7
1,210,634 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,100 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,319 UART: [fwproc] Recv command 0x46574c44
1,283,052 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,524,012 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,542,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,678,087 >>> mbox cmd response: success
2,679,208 UART: [afmc] ++
2,679,376 UART: [afmc] CDI.KEYID = 6
2,679,739 UART: [afmc] SUBJECT.KEYID = 7
2,680,165 UART: [afmc] AUTHORITY.KEYID = 5
2,716,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,302 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,739,022 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,915 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,608 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,491 UART: [afmc] --
2,759,365 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,759,387 UART: [cold-reset] --
2,760,375 UART: [state] Locking Datavault
2,761,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,762,340 UART: [state] Locking ICCM
2,763,012 UART: [exit] Launching FMC @ 0x40000000
2,768,309 UART:
2,768,325 UART: Running Caliptra FMC ...
2,768,733 UART:
2,768,871 UART: [fmc] Received command: 0x1000000B
2,769,703 UART:
2,769,719 UART: Running Caliptra ROM ...
2,770,127 UART:
2,770,182 UART: [state] CFI Enabled
2,773,238 UART: [state] LifecycleState = Unprovisioned
2,773,893 UART: [state] DebugLocked = No
2,774,599 UART: [state] WD Timer not started. Device not locked for debugging
2,775,801 UART: [kat] SHA2-256
3,579,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,583,480 UART: [kat] ++
3,583,632 UART: [kat] sha1
3,587,642 UART: [kat] SHA2-256
3,589,582 UART: [kat] SHA2-384
3,592,507 UART: [kat] SHA2-512-ACC
3,594,407 UART: [kat] ECC-384
3,604,440 UART: [kat] HMAC-384Kdf
3,609,046 UART: [kat] LMS
3,857,358 UART: [kat] --
3,858,114 UART: [update-reset] ++
3,858,431 UART: Invalid command 0x1000000b recv
3,859,677 UART: ROM Non-Fatal Error: 0x01040003
3,860,571 UART: [state] Locking Datavault
3,861,421 UART: [state] Locking PCR0, PCR1 and PCR31
3,862,025 UART: [state] Locking ICCM
3,862,673 UART: [exit] Launching FMC @ 0x40000000
3,867,970 UART:
3,867,986 UART: Running Caliptra FMC ...
3,868,394 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,716 ready_for_fw is high
1,055,716 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,055 >>> mbox cmd response: success
2,581,099 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,164 UART:
2,587,180 UART: Running Caliptra FMC ...
2,587,588 UART:
2,587,726 UART: [fmc] Received command: 0x1000000B
3,566,271 UART:
3,566,287 UART: Running Caliptra FMC ...
3,566,695 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,205 UART: [kat] LMS
1,169,517 UART: [kat] --
1,170,292 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 ready_for_fw is high
1,174,726 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,123 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,032 UART: [fwproc] Recv command 0x46574c44
1,282,765 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,487 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,550 >>> mbox cmd response: success
2,677,741 UART: [afmc] ++
2,677,909 UART: [afmc] CDI.KEYID = 6
2,678,272 UART: [afmc] SUBJECT.KEYID = 7
2,678,698 UART: [afmc] AUTHORITY.KEYID = 5
2,713,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,899 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,619 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,512 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,205 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,988 UART: [afmc] --
2,757,056 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,078 UART: [cold-reset] --
2,757,996 UART: [state] Locking Datavault
2,759,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,805 UART: [state] Locking ICCM
2,760,227 UART: [exit] Launching FMC @ 0x40000000
2,765,524 UART:
2,765,540 UART: Running Caliptra FMC ...
2,765,948 UART:
2,766,086 UART: [fmc] Received command: 0x1000000B
2,766,918 UART:
2,766,934 UART: Running Caliptra ROM ...
2,767,342 UART:
2,767,484 UART: [state] CFI Enabled
2,769,996 UART: [state] LifecycleState = Unprovisioned
2,770,651 UART: [state] DebugLocked = No
2,771,247 UART: [state] WD Timer not started. Device not locked for debugging
2,772,557 UART: [kat] SHA2-256
3,576,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,236 UART: [kat] ++
3,580,388 UART: [kat] sha1
3,584,558 UART: [kat] SHA2-256
3,586,498 UART: [kat] SHA2-384
3,589,387 UART: [kat] SHA2-512-ACC
3,591,287 UART: [kat] ECC-384
3,600,968 UART: [kat] HMAC-384Kdf
3,605,504 UART: [kat] LMS
3,853,816 UART: [kat] --
3,854,578 UART: [update-reset] ++
3,854,895 UART: Invalid command 0x1000000b recv
3,856,083 UART: ROM Non-Fatal Error: 0x01040003
3,857,013 UART: [state] Locking Datavault
3,857,989 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,593 UART: [state] Locking ICCM
3,859,031 UART: [exit] Launching FMC @ 0x40000000
3,864,328 UART:
3,864,344 UART: Running Caliptra FMC ...
3,864,752 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,825 ready_for_fw is high
1,056,825 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,892 >>> mbox cmd response: success
2,584,142 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,590,333 UART:
2,590,349 UART: Running Caliptra FMC ...
2,590,757 UART:
2,590,895 UART: [fmc] Received command: 0x1000000B
3,568,633 UART:
3,568,649 UART: Running Caliptra FMC ...
3,569,057 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 ready_for_fw is high
1,174,101 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,044 UART: [ldev] ++
1,208,212 UART: [ldev] CDI.KEYID = 6
1,208,576 UART: [ldev] SUBJECT.KEYID = 5
1,209,003 UART: [ldev] AUTHORITY.KEYID = 7
1,209,466 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,670 UART: [ldev] --
1,279,992 UART: [fwproc] Wait for Commands...
1,280,583 UART: [fwproc] Recv command 0x46574c44
1,281,316 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,502 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,673 >>> mbox cmd response: success
2,676,880 UART: [afmc] ++
2,677,048 UART: [afmc] CDI.KEYID = 6
2,677,411 UART: [afmc] SUBJECT.KEYID = 7
2,677,837 UART: [afmc] AUTHORITY.KEYID = 5
2,712,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,042 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,762 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,655 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,348 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,137 UART: [afmc] --
2,756,237 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,259 UART: [cold-reset] --
2,757,197 UART: [state] Locking Datavault
2,758,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,164 UART: [state] Locking ICCM
2,759,690 UART: [exit] Launching FMC @ 0x40000000
2,764,987 UART:
2,765,003 UART: Running Caliptra FMC ...
2,765,411 UART:
2,765,549 UART: [fmc] Received command: 0x1000000B
2,766,381 UART:
2,766,397 UART: Running Caliptra ROM ...
2,766,805 UART:
2,766,860 UART: [state] CFI Enabled
2,769,414 UART: [state] LifecycleState = Unprovisioned
2,770,069 UART: [state] DebugLocked = No
2,770,671 UART: [state] WD Timer not started. Device not locked for debugging
2,771,967 UART: [kat] SHA2-256
3,575,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,646 UART: [kat] ++
3,579,798 UART: [kat] sha1
3,584,228 UART: [kat] SHA2-256
3,586,168 UART: [kat] SHA2-384
3,588,913 UART: [kat] SHA2-512-ACC
3,590,813 UART: [kat] ECC-384
3,600,404 UART: [kat] HMAC-384Kdf
3,605,154 UART: [kat] LMS
3,853,466 UART: [kat] --
3,854,272 UART: [update-reset] ++
3,854,589 UART: Invalid command 0x1000000b recv
3,855,737 UART: ROM Non-Fatal Error: 0x01040003
3,856,507 UART: [state] Locking Datavault
3,857,213 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,817 UART: [state] Locking ICCM
3,858,461 UART: [exit] Launching FMC @ 0x40000000
3,863,758 UART:
3,863,774 UART: Running Caliptra FMC ...
3,864,182 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,766 ready_for_fw is high
1,055,766 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,217 >>> mbox cmd response: success
2,581,165 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,380 UART:
2,587,396 UART: Running Caliptra FMC ...
2,587,804 UART:
2,587,942 UART: [fmc] Received command: 0x1000000B
3,565,697 UART:
3,565,713 UART: Running Caliptra FMC ...
3,566,121 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,282,071 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,323 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,488 >>> mbox cmd response: success
2,677,729 UART: [afmc] ++
2,677,897 UART: [afmc] CDI.KEYID = 6
2,678,260 UART: [afmc] SUBJECT.KEYID = 7
2,678,686 UART: [afmc] AUTHORITY.KEYID = 5
2,713,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,917 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,637 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,530 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,223 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,074 UART: [afmc] --
2,756,968 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,990 UART: [cold-reset] --
2,757,752 UART: [state] Locking Datavault
2,758,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,321 UART: [state] Locking ICCM
2,759,899 UART: [exit] Launching FMC @ 0x40000000
2,765,196 UART:
2,765,212 UART: Running Caliptra FMC ...
2,765,620 UART:
2,765,758 UART: [fmc] Received command: 0x1000000B
2,766,590 UART:
2,766,606 UART: Running Caliptra ROM ...
2,767,014 UART:
2,767,156 UART: [state] CFI Enabled
2,769,998 UART: [state] LifecycleState = Unprovisioned
2,770,653 UART: [state] DebugLocked = No
2,771,273 UART: [state] WD Timer not started. Device not locked for debugging
2,772,627 UART: [kat] SHA2-256
3,576,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,306 UART: [kat] ++
3,580,458 UART: [kat] sha1
3,584,782 UART: [kat] SHA2-256
3,586,722 UART: [kat] SHA2-384
3,589,623 UART: [kat] SHA2-512-ACC
3,591,523 UART: [kat] ECC-384
3,601,302 UART: [kat] HMAC-384Kdf
3,606,148 UART: [kat] LMS
3,854,460 UART: [kat] --
3,855,176 UART: [update-reset] ++
3,855,493 UART: Invalid command 0x1000000b recv
3,856,431 UART: ROM Non-Fatal Error: 0x01040003
3,857,321 UART: [state] Locking Datavault
3,858,011 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,615 UART: [state] Locking ICCM
3,859,179 UART: [exit] Launching FMC @ 0x40000000
3,864,476 UART:
3,864,492 UART: Running Caliptra FMC ...
3,864,900 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 ready_for_fw is high
1,056,433 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,614 >>> mbox cmd response: success
2,583,552 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,589,671 UART:
2,589,687 UART: Running Caliptra FMC ...
2,590,095 UART:
2,590,233 UART: [fmc] Received command: 0x1000000B
3,568,015 UART:
3,568,031 UART: Running Caliptra FMC ...
3,568,439 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,409 UART: [idev] ++
1,173,577 UART: [idev] CDI.KEYID = 6
1,173,938 UART: [idev] SUBJECT.KEYID = 7
1,174,363 UART: [idev] UDS.KEYID = 0
1,174,709 ready_for_fw is high
1,174,709 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,216,090 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,394 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,557 >>> mbox cmd response: success
2,677,624 UART: [afmc] ++
2,677,792 UART: [afmc] CDI.KEYID = 6
2,678,155 UART: [afmc] SUBJECT.KEYID = 7
2,678,581 UART: [afmc] AUTHORITY.KEYID = 5
2,714,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,254 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,974 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,867 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,560 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,543 UART: [afmc] --
2,757,447 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,469 UART: [cold-reset] --
2,758,245 UART: [state] Locking Datavault
2,759,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,900 UART: [state] Locking ICCM
2,760,570 UART: [exit] Launching FMC @ 0x40000000
2,765,867 UART:
2,765,883 UART: Running Caliptra FMC ...
2,766,291 UART:
2,766,429 UART: [fmc] Received command: 0x1000000B
2,767,261 UART:
2,767,277 UART: Running Caliptra ROM ...
2,767,685 UART:
2,767,740 UART: [state] CFI Enabled
2,770,242 UART: [state] LifecycleState = Unprovisioned
2,770,897 UART: [state] DebugLocked = No
2,771,487 UART: [state] WD Timer not started. Device not locked for debugging
2,772,809 UART: [kat] SHA2-256
3,576,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,488 UART: [kat] ++
3,580,640 UART: [kat] sha1
3,584,952 UART: [kat] SHA2-256
3,586,892 UART: [kat] SHA2-384
3,589,781 UART: [kat] SHA2-512-ACC
3,591,681 UART: [kat] ECC-384
3,600,976 UART: [kat] HMAC-384Kdf
3,605,476 UART: [kat] LMS
3,853,788 UART: [kat] --
3,854,712 UART: [update-reset] ++
3,855,029 UART: Invalid command 0x1000000b recv
3,855,967 UART: ROM Non-Fatal Error: 0x01040003
3,856,817 UART: [state] Locking Datavault
3,857,695 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,299 UART: [state] Locking ICCM
3,858,933 UART: [exit] Launching FMC @ 0x40000000
3,864,230 UART:
3,864,246 UART: Running Caliptra FMC ...
3,864,654 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,690 ready_for_fw is high
1,055,690 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,023 >>> mbox cmd response: success
2,581,773 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,756 UART:
2,587,772 UART: Running Caliptra FMC ...
2,588,180 UART:
2,588,318 UART: [fmc] Received command: 0x1000000B
3,566,643 UART:
3,566,659 UART: Running Caliptra FMC ...
3,567,067 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,228 UART: [state] WD Timer not started. Device not locked for debugging
88,589 UART: [kat] SHA2-256
892,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,268 UART: [kat] ++
896,420 UART: [kat] sha1
900,718 UART: [kat] SHA2-256
902,658 UART: [kat] SHA2-384
905,529 UART: [kat] SHA2-512-ACC
907,430 UART: [kat] ECC-384
916,881 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,638 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 ready_for_fw is high
1,174,810 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,640 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,231 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,303 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,258 >>> mbox cmd response: success
2,678,487 UART: [afmc] ++
2,678,655 UART: [afmc] CDI.KEYID = 6
2,679,018 UART: [afmc] SUBJECT.KEYID = 7
2,679,444 UART: [afmc] AUTHORITY.KEYID = 5
2,714,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,153 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,873 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,766 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,459 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,346 UART: [afmc] --
2,758,334 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,758,356 UART: [cold-reset] --
2,759,256 UART: [state] Locking Datavault
2,760,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,013 UART: [state] Locking ICCM
2,761,539 UART: [exit] Launching FMC @ 0x40000000
2,766,836 UART:
2,766,852 UART: Running Caliptra FMC ...
2,767,260 UART:
2,767,398 UART: [fmc] Received command: 0x1000000B
2,768,230 UART:
2,768,246 UART: Running Caliptra ROM ...
2,768,654 UART:
2,768,796 UART: [state] CFI Enabled
2,771,614 UART: [state] LifecycleState = Unprovisioned
2,772,269 UART: [state] DebugLocked = No
2,772,929 UART: [state] WD Timer not started. Device not locked for debugging
2,774,039 UART: [kat] SHA2-256
3,577,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,718 UART: [kat] ++
3,581,870 UART: [kat] sha1
3,586,094 UART: [kat] SHA2-256
3,588,034 UART: [kat] SHA2-384
3,590,821 UART: [kat] SHA2-512-ACC
3,592,721 UART: [kat] ECC-384
3,602,554 UART: [kat] HMAC-384Kdf
3,607,174 UART: [kat] LMS
3,855,486 UART: [kat] --
3,856,536 UART: [update-reset] ++
3,856,853 UART: Invalid command 0x1000000b recv
3,857,889 UART: ROM Non-Fatal Error: 0x01040003
3,858,781 UART: [state] Locking Datavault
3,859,551 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,155 UART: [state] Locking ICCM
3,860,761 UART: [exit] Launching FMC @ 0x40000000
3,866,058 UART:
3,866,074 UART: Running Caliptra FMC ...
3,866,482 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,595 ready_for_fw is high
1,055,595 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,202 >>> mbox cmd response: success
2,582,284 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,588,321 UART:
2,588,337 UART: Running Caliptra FMC ...
2,588,745 UART:
2,588,883 UART: [fmc] Received command: 0x1000000B
3,567,225 UART:
3,567,241 UART: Running Caliptra FMC ...
3,567,649 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,066 UART:
192,440 UART: Running Caliptra ROM ...
193,525 UART:
193,665 UART: [state] CFI Enabled
261,550 UART: [state] LifecycleState = Unprovisioned
263,906 UART: [state] DebugLocked = No
266,352 UART: [state] WD Timer not started. Device not locked for debugging
271,302 UART: [kat] SHA2-256
453,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,713 UART: [kat] ++
465,233 UART: [kat] sha1
474,609 UART: [kat] SHA2-256
477,610 UART: [kat] SHA2-384
485,084 UART: [kat] SHA2-512-ACC
487,744 UART: [kat] ECC-384
3,774,056 UART: [kat] HMAC-384Kdf
3,802,469 UART: [kat] LMS
4,875,616 UART: [kat] --
4,880,525 UART: [cold-reset] ++
4,881,600 UART: [fht] FHT @ 0x50003400
4,894,561 UART: [idev] ++
4,895,200 UART: [idev] CDI.KEYID = 6
4,896,453 UART: [idev] SUBJECT.KEYID = 7
4,897,493 UART: [idev] UDS.KEYID = 0
4,898,657 ready_for_fw is high
4,898,879 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,039,625 UART: [idev] Erasing UDS.KEYID = 0
8,243,821 UART: [idev] Sha1 KeyId Algorithm
8,266,201 UART: [idev] --
8,270,572 UART: [ldev] ++
8,271,197 UART: [ldev] CDI.KEYID = 6
8,272,395 UART: [ldev] SUBJECT.KEYID = 5
8,273,554 UART: [ldev] AUTHORITY.KEYID = 7
8,274,778 UART: [ldev] FE.KEYID = 1
8,316,454 UART: [ldev] Erasing FE.KEYID = 1
11,653,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,491 UART: [ldev] --
14,038,170 UART: [fwproc] Wait for Commands...
14,040,534 UART: [fwproc] Recv command 0x46574c44
14,042,845 UART: [fwproc] Recv'd Img size: 111688 bytes
18,090,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,163,985 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,224,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,541,632 >>> mbox cmd response: success
18,545,870 UART: [afmc] ++
18,546,481 UART: [afmc] CDI.KEYID = 6
18,547,619 UART: [afmc] SUBJECT.KEYID = 7
18,548,782 UART: [afmc] AUTHORITY.KEYID = 5
21,925,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,657 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,241,814 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,257,916 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,273,748 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,295,183 UART: [afmc] --
24,299,469 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,440,504 UART: [cold-reset] --
24,441,373 UART: [state] Locking Datavault
24,442,447 UART: [state] Locking PCR0, PCR1 and PCR31
24,443,998 UART: [state] Locking ICCM
24,444,876 UART: [exit] Launching FMC @ 0x40000000
24,446,216 UART:
24,446,362 UART: Running Caliptra FMC ...
24,447,461 UART:
24,447,613 UART: [fmc] Received command: 0x46574C44
24,448,983 UART:
24,449,129 UART: Running Caliptra ROM ...
24,450,141 UART:
24,450,285 UART: [state] CFI Enabled
24,517,619 UART: [state] LifecycleState = Unprovisioned
24,519,496 UART: [state] DebugLocked = No
24,522,362 UART: [state] WD Timer not started. Device not locked for debugging
24,527,073 UART: [kat] SHA2-256
24,709,024 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,720,556 UART: [kat] ++
24,721,034 UART: [kat] sha1
24,731,167 UART: [kat] SHA2-256
24,734,184 UART: [kat] SHA2-384
24,739,788 UART: [kat] SHA2-512-ACC
24,742,404 UART: [kat] ECC-384
28,028,515 UART: [kat] HMAC-384Kdf
28,055,817 UART: [kat] LMS
29,128,929 UART: [kat] --
29,133,274 UART: [update-reset] ++
33,201,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,204,960 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,578,621 >>> mbox cmd response: success
33,579,275 UART: [update-reset] Copying MAN_2 To MAN_1
33,602,146 UART: [update-reset Success] --
33,603,826 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,607,015 UART: [state] Locking Datavault
33,610,563 UART: [state] Locking PCR0, PCR1 and PCR31
33,612,210 UART: [state] Locking ICCM
33,614,088 UART: [exit] Launching FMC @ 0x40000000
33,622,698 UART:
33,622,927 UART: Running Caliptra FMC ...
33,624,026 UART:
33,624,184 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,625,825 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
4,804,925 ready_for_fw is high
4,805,305 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,309,203 >>> mbox cmd response: success
23,982,387 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,123,969 UART:
24,124,357 UART: Running Caliptra FMC ...
24,125,575 UART:
24,125,739 UART: [fmc] Received command: 0x46574C44
33,129,959 >>> mbox cmd response: success
33,152,042 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,166,475 UART:
33,166,767 UART: Running Caliptra FMC ...
33,167,948 UART:
33,168,112 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,169,757 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,441 UART:
193,000 UART: Running Caliptra ROM ...
194,191 UART:
603,394 UART: [state] CFI Enabled
617,187 UART: [state] LifecycleState = Unprovisioned
619,564 UART: [state] DebugLocked = No
621,854 UART: [state] WD Timer not started. Device not locked for debugging
627,297 UART: [kat] SHA2-256
809,230 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,793 UART: [kat] ++
821,308 UART: [kat] sha1
831,177 UART: [kat] SHA2-256
834,199 UART: [kat] SHA2-384
840,073 UART: [kat] SHA2-512-ACC
842,727 UART: [kat] ECC-384
4,100,708 UART: [kat] HMAC-384Kdf
4,112,739 UART: [kat] LMS
5,185,687 UART: [kat] --
5,189,970 UART: [cold-reset] ++
5,192,468 UART: [fht] FHT @ 0x50003400
5,204,505 UART: [idev] ++
5,205,214 UART: [idev] CDI.KEYID = 6
5,206,333 UART: [idev] SUBJECT.KEYID = 7
5,207,857 UART: [idev] UDS.KEYID = 0
5,209,036 ready_for_fw is high
5,209,218 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,349,896 UART: [idev] Erasing UDS.KEYID = 0
8,499,374 UART: [idev] Sha1 KeyId Algorithm
8,521,563 UART: [idev] --
8,525,694 UART: [ldev] ++
8,526,321 UART: [ldev] CDI.KEYID = 6
8,527,495 UART: [ldev] SUBJECT.KEYID = 5
8,528,971 UART: [ldev] AUTHORITY.KEYID = 7
8,530,543 UART: [ldev] FE.KEYID = 1
8,541,883 UART: [ldev] Erasing FE.KEYID = 1
11,830,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,203 UART: [ldev] --
14,197,747 UART: [fwproc] Wait for Commands...
14,199,795 UART: [fwproc] Recv command 0x46574c44
14,202,101 UART: [fwproc] Recv'd Img size: 111688 bytes
18,238,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,309,310 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,369,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,685,983 >>> mbox cmd response: success
18,690,445 UART: [afmc] ++
18,691,047 UART: [afmc] CDI.KEYID = 6
18,692,154 UART: [afmc] SUBJECT.KEYID = 7
18,693,365 UART: [afmc] AUTHORITY.KEYID = 5
22,012,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,305,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,308,195 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,324,356 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,340,494 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,356,304 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,379,696 UART: [afmc] --
24,385,080 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,526,117 UART: [cold-reset] --
24,526,977 UART: [state] Locking Datavault
24,528,129 UART: [state] Locking PCR0, PCR1 and PCR31
24,529,657 UART: [state] Locking ICCM
24,530,561 UART: [exit] Launching FMC @ 0x40000000
24,531,997 UART:
24,532,155 UART: Running Caliptra FMC ...
24,533,244 UART:
24,533,394 UART: [fmc] Received command: 0x46574C44
24,534,853 UART:
24,534,999 UART: Running Caliptra ROM ...
24,536,085 UART:
24,536,233 UART: [state] CFI Enabled
24,543,008 UART: [state] LifecycleState = Unprovisioned
24,544,828 UART: [state] DebugLocked = No
24,547,220 UART: [state] WD Timer not started. Device not locked for debugging
24,552,210 UART: [kat] SHA2-256
24,734,160 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,745,707 UART: [kat] ++
24,746,153 UART: [kat] sha1
24,756,439 UART: [kat] SHA2-256
24,759,456 UART: [kat] SHA2-384
24,766,362 UART: [kat] SHA2-512-ACC
24,768,932 UART: [kat] ECC-384
28,021,973 UART: [kat] HMAC-384Kdf
28,034,272 UART: [kat] LMS
29,107,442 UART: [kat] --
29,112,262 UART: [update-reset] ++
33,175,264 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,179,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,552,966 >>> mbox cmd response: success
33,553,460 UART: [update-reset] Copying MAN_2 To MAN_1
33,576,333 UART: [update-reset Success] --
33,577,978 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,581,118 UART: [state] Locking Datavault
33,585,935 UART: [state] Locking PCR0, PCR1 and PCR31
33,587,626 UART: [state] Locking ICCM
33,588,981 UART: [exit] Launching FMC @ 0x40000000
33,597,600 UART:
33,597,839 UART: Running Caliptra FMC ...
33,598,883 UART:
33,599,025 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,600,648 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
5,096,088 ready_for_fw is high
5,096,752 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,488,663 >>> mbox cmd response: success
24,114,424 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,255,502 UART:
24,255,890 UART: Running Caliptra FMC ...
24,257,042 UART:
24,257,205 UART: [fmc] Received command: 0x46574C44
33,179,206 >>> mbox cmd response: success
33,200,375 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,216,357 UART:
33,216,612 UART: Running Caliptra FMC ...
33,217,782 UART:
33,217,939 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,219,569 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,006 UART:
192,375 UART: Running Caliptra ROM ...
193,470 UART:
193,618 UART: [state] CFI Enabled
263,619 UART: [state] LifecycleState = Unprovisioned
265,475 UART: [state] DebugLocked = No
268,031 UART: [state] WD Timer not started. Device not locked for debugging
271,999 UART: [kat] SHA2-256
451,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,695 UART: [kat] ++
463,146 UART: [kat] sha1
474,371 UART: [kat] SHA2-256
477,450 UART: [kat] SHA2-384
484,998 UART: [kat] SHA2-512-ACC
487,930 UART: [kat] ECC-384
2,948,425 UART: [kat] HMAC-384Kdf
2,971,443 UART: [kat] LMS
3,500,934 UART: [kat] --
3,506,123 UART: [cold-reset] ++
3,507,207 UART: [fht] FHT @ 0x50003400
3,518,897 UART: [idev] ++
3,519,463 UART: [idev] CDI.KEYID = 6
3,520,482 UART: [idev] SUBJECT.KEYID = 7
3,521,595 UART: [idev] UDS.KEYID = 0
3,522,512 ready_for_fw is high
3,522,714 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,663,866 UART: [idev] Erasing UDS.KEYID = 0
6,027,266 UART: [idev] Sha1 KeyId Algorithm
6,051,367 UART: [idev] --
6,057,039 UART: [ldev] ++
6,057,610 UART: [ldev] CDI.KEYID = 6
6,058,494 UART: [ldev] SUBJECT.KEYID = 5
6,059,705 UART: [ldev] AUTHORITY.KEYID = 7
6,060,938 UART: [ldev] FE.KEYID = 1
6,099,708 UART: [ldev] Erasing FE.KEYID = 1
8,603,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,201 UART: [ldev] --
10,410,057 UART: [fwproc] Wait for Commands...
10,412,153 UART: [fwproc] Recv command 0x46574c44
10,414,256 UART: [fwproc] Recv'd Img size: 112032 bytes
13,792,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,749 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,923,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,241,466 >>> mbox cmd response: success
14,246,359 UART: [afmc] ++
14,246,947 UART: [afmc] CDI.KEYID = 6
14,247,860 UART: [afmc] SUBJECT.KEYID = 7
14,249,073 UART: [afmc] AUTHORITY.KEYID = 5
16,780,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,404 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,526,440 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,542,519 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,558,157 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,580,203 UART: [afmc] --
18,584,943 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,726,188 UART: [cold-reset] --
18,727,050 UART: [state] Locking Datavault
18,728,126 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,665 UART: [state] Locking ICCM
18,730,544 UART: [exit] Launching FMC @ 0x40000000
18,731,908 UART:
18,732,057 UART: Running Caliptra FMC ...
18,733,160 UART:
18,733,310 UART: [fmc] Received command: 0x46574C44
18,734,678 UART:
18,734,839 UART: Running Caliptra ROM ...
18,735,942 UART:
18,736,094 UART: [state] CFI Enabled
18,798,492 UART: [state] LifecycleState = Unprovisioned
18,800,365 UART: [state] DebugLocked = No
18,802,694 UART: [state] WD Timer not started. Device not locked for debugging
18,805,683 UART: [kat] SHA2-256
18,984,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,996,338 UART: [kat] ++
18,996,793 UART: [kat] sha1
19,006,650 UART: [kat] SHA2-256
19,009,724 UART: [kat] SHA2-384
19,016,141 UART: [kat] SHA2-512-ACC
19,019,092 UART: [kat] ECC-384
21,483,487 UART: [kat] HMAC-384Kdf
21,506,560 UART: [kat] LMS
22,036,034 UART: [kat] --
22,040,890 UART: [update-reset] ++
25,444,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,447,754 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,822,632 >>> mbox cmd response: success
25,823,765 UART: [update-reset] Copying MAN_2 To MAN_1
25,846,096 UART: [update-reset Success] --
25,847,363 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,849,470 UART: [state] Locking Datavault
25,852,998 UART: [state] Locking PCR0, PCR1 and PCR31
25,854,645 UART: [state] Locking ICCM
25,855,824 UART: [exit] Launching FMC @ 0x40000000
25,864,230 UART:
25,864,506 UART: Running Caliptra FMC ...
25,865,614 UART:
25,865,773 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,867,421 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,360,032 ready_for_fw is high
3,360,442 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,024,893 >>> mbox cmd response: success
18,309,043 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,450,591 UART:
18,450,972 UART: Running Caliptra FMC ...
18,452,192 UART:
18,452,380 UART: [fmc] Received command: 0x46574C44
25,380,647 >>> mbox cmd response: success
25,402,196 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,414,247 UART:
25,414,503 UART: Running Caliptra FMC ...
25,415,682 UART:
25,415,847 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,417,504 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,379 UART:
192,749 UART: Running Caliptra ROM ...
193,933 UART:
603,496 UART: [state] CFI Enabled
616,673 UART: [state] LifecycleState = Unprovisioned
618,547 UART: [state] DebugLocked = No
620,570 UART: [state] WD Timer not started. Device not locked for debugging
624,102 UART: [kat] SHA2-256
803,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,830 UART: [kat] ++
815,357 UART: [kat] sha1
827,511 UART: [kat] SHA2-256
830,516 UART: [kat] SHA2-384
836,212 UART: [kat] SHA2-512-ACC
839,211 UART: [kat] ECC-384
3,280,217 UART: [kat] HMAC-384Kdf
3,292,823 UART: [kat] LMS
3,822,333 UART: [kat] --
3,826,109 UART: [cold-reset] ++
3,828,315 UART: [fht] FHT @ 0x50003400
3,839,871 UART: [idev] ++
3,840,441 UART: [idev] CDI.KEYID = 6
3,841,351 UART: [idev] SUBJECT.KEYID = 7
3,842,596 UART: [idev] UDS.KEYID = 0
3,843,515 ready_for_fw is high
3,843,700 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,984,427 UART: [idev] Erasing UDS.KEYID = 0
6,312,306 UART: [idev] Sha1 KeyId Algorithm
6,335,671 UART: [idev] --
6,338,351 UART: [ldev] ++
6,338,925 UART: [ldev] CDI.KEYID = 6
6,339,842 UART: [ldev] SUBJECT.KEYID = 5
6,340,999 UART: [ldev] AUTHORITY.KEYID = 7
6,342,283 UART: [ldev] FE.KEYID = 1
6,353,088 UART: [ldev] Erasing FE.KEYID = 1
8,826,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,836 UART: [ldev] --
10,613,742 UART: [fwproc] Wait for Commands...
10,615,827 UART: [fwproc] Recv command 0x46574c44
10,617,911 UART: [fwproc] Recv'd Img size: 112032 bytes
13,994,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,066,052 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,443,864 >>> mbox cmd response: success
14,447,859 UART: [afmc] ++
14,448,450 UART: [afmc] CDI.KEYID = 6
14,449,363 UART: [afmc] SUBJECT.KEYID = 7
14,450,518 UART: [afmc] AUTHORITY.KEYID = 5
16,949,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,669,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,671,732 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,687,796 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,703,869 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,719,513 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,741,447 UART: [afmc] --
18,745,787 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,887,253 UART: [cold-reset] --
18,888,120 UART: [state] Locking Datavault
18,889,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,737 UART: [state] Locking ICCM
18,891,614 UART: [exit] Launching FMC @ 0x40000000
18,892,953 UART:
18,893,098 UART: Running Caliptra FMC ...
18,894,148 UART:
18,894,314 UART: [fmc] Received command: 0x46574C44
18,895,776 UART:
18,895,930 UART: Running Caliptra ROM ...
18,896,939 UART:
18,897,082 UART: [state] CFI Enabled
18,904,239 UART: [state] LifecycleState = Unprovisioned
18,906,055 UART: [state] DebugLocked = No
18,907,682 UART: [state] WD Timer not started. Device not locked for debugging
18,910,547 UART: [kat] SHA2-256
19,089,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,101,337 UART: [kat] ++
19,101,794 UART: [kat] sha1
19,112,082 UART: [kat] SHA2-256
19,115,153 UART: [kat] SHA2-384
19,122,050 UART: [kat] SHA2-512-ACC
19,124,984 UART: [kat] ECC-384
21,567,816 UART: [kat] HMAC-384Kdf
21,580,684 UART: [kat] LMS
22,110,192 UART: [kat] --
22,114,356 UART: [update-reset] ++
25,509,113 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,511,792 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,886,642 >>> mbox cmd response: success
25,888,047 UART: [update-reset] Copying MAN_2 To MAN_1
25,910,379 UART: [update-reset Success] --
25,911,692 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,914,884 UART: [state] Locking Datavault
25,919,423 UART: [state] Locking PCR0, PCR1 and PCR31
25,921,069 UART: [state] Locking ICCM
25,923,086 UART: [exit] Launching FMC @ 0x40000000
25,931,487 UART:
25,931,760 UART: Running Caliptra FMC ...
25,932,807 UART:
25,932,951 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,934,573 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,697,865 ready_for_fw is high
3,698,274 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,239,235 >>> mbox cmd response: success
18,473,966 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,615,910 UART:
18,616,281 UART: Running Caliptra FMC ...
18,617,481 UART:
18,617,648 UART: [fmc] Received command: 0x46574C44
25,486,612 >>> mbox cmd response: success
25,509,324 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,523,382 UART:
25,523,633 UART: Running Caliptra FMC ...
25,524,795 UART:
25,524,950 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,526,608 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,031 UART:
192,421 UART: Running Caliptra ROM ...
193,523 UART:
193,664 UART: [state] CFI Enabled
256,731 UART: [state] LifecycleState = Unprovisioned
258,576 UART: [state] DebugLocked = No
259,903 UART: [state] WD Timer not started. Device not locked for debugging
263,163 UART: [kat] SHA2-256
442,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
453,905 UART: [kat] ++
454,353 UART: [kat] sha1
464,799 UART: [kat] SHA2-256
467,813 UART: [kat] SHA2-384
474,654 UART: [kat] SHA2-512-ACC
477,588 UART: [kat] ECC-384
2,939,060 UART: [kat] HMAC-384Kdf
2,963,037 UART: [kat] LMS
3,492,468 UART: [kat] --
3,498,050 UART: [cold-reset] ++
3,500,417 UART: [fht] FHT @ 0x50003400
3,511,849 UART: [idev] ++
3,512,420 UART: [idev] CDI.KEYID = 6
3,513,303 UART: [idev] SUBJECT.KEYID = 7
3,514,545 UART: [idev] UDS.KEYID = 0
3,515,472 ready_for_fw is high
3,515,656 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,656,595 UART: [idev] Erasing UDS.KEYID = 0
6,019,942 UART: [idev] Sha1 KeyId Algorithm
6,043,434 UART: [idev] --
6,047,459 UART: [ldev] ++
6,048,041 UART: [ldev] CDI.KEYID = 6
6,048,960 UART: [ldev] SUBJECT.KEYID = 5
6,050,122 UART: [ldev] AUTHORITY.KEYID = 7
6,051,359 UART: [ldev] FE.KEYID = 1
6,092,306 UART: [ldev] Erasing FE.KEYID = 1
8,595,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,521 UART: [ldev] --
10,405,894 UART: [fwproc] Wait for Commands...
10,407,606 UART: [fwproc] Recv command 0x46574c44
10,409,703 UART: [fwproc] Recv'd Img size: 112032 bytes
13,779,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,241 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,918,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,236,851 >>> mbox cmd response: success
14,241,764 UART: [afmc] ++
14,242,362 UART: [afmc] CDI.KEYID = 6
14,243,272 UART: [afmc] SUBJECT.KEYID = 7
14,244,429 UART: [afmc] AUTHORITY.KEYID = 5
16,780,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,504,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,506,670 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,522,739 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,538,773 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,554,475 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,578,092 UART: [afmc] --
18,583,014 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,724,350 UART: [cold-reset] --
18,725,214 UART: [state] Locking Datavault
18,726,288 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,821 UART: [state] Locking ICCM
18,728,699 UART: [exit] Launching FMC @ 0x40000000
18,730,040 UART:
18,730,192 UART: Running Caliptra FMC ...
18,731,292 UART:
18,731,462 UART: [fmc] Received command: 0x46574C44
18,732,839 UART:
18,732,986 UART: Running Caliptra ROM ...
18,734,176 UART:
18,734,353 UART: [state] CFI Enabled
18,794,805 UART: [state] LifecycleState = Unprovisioned
18,796,684 UART: [state] DebugLocked = No
18,798,176 UART: [state] WD Timer not started. Device not locked for debugging
18,802,619 UART: [kat] SHA2-256
18,981,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,993,355 UART: [kat] ++
18,993,809 UART: [kat] sha1
19,004,257 UART: [kat] SHA2-256
19,007,319 UART: [kat] SHA2-384
19,013,485 UART: [kat] SHA2-512-ACC
19,016,428 UART: [kat] ECC-384
21,478,156 UART: [kat] HMAC-384Kdf
21,501,888 UART: [kat] LMS
22,031,338 UART: [kat] --
22,037,834 UART: [update-reset] ++
25,434,630 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,437,309 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,812,139 >>> mbox cmd response: success
25,812,526 UART: [update-reset] Copying MAN_2 To MAN_1
25,834,748 UART: [update-reset Success] --
25,836,014 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,838,397 UART: [state] Locking Datavault
25,840,904 UART: [state] Locking PCR0, PCR1 and PCR31
25,842,550 UART: [state] Locking ICCM
25,844,320 UART: [exit] Launching FMC @ 0x40000000
25,852,721 UART:
25,852,958 UART: Running Caliptra FMC ...
25,854,080 UART:
25,854,244 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,855,873 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,361,079 ready_for_fw is high
3,361,478 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,008,732 >>> mbox cmd response: success
18,289,970 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,431,907 UART:
18,432,301 UART: Running Caliptra FMC ...
18,433,415 UART:
18,433,568 UART: [fmc] Received command: 0x46574C44
25,393,465 >>> mbox cmd response: success
25,415,120 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,428,570 UART:
25,428,824 UART: Running Caliptra FMC ...
25,429,991 UART:
25,430,155 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,431,793 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,378 UART:
192,742 UART: Running Caliptra ROM ...
193,947 UART:
603,632 UART: [state] CFI Enabled
618,280 UART: [state] LifecycleState = Unprovisioned
620,163 UART: [state] DebugLocked = No
622,116 UART: [state] WD Timer not started. Device not locked for debugging
625,222 UART: [kat] SHA2-256
804,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,952 UART: [kat] ++
816,484 UART: [kat] sha1
828,748 UART: [kat] SHA2-256
831,760 UART: [kat] SHA2-384
837,122 UART: [kat] SHA2-512-ACC
840,129 UART: [kat] ECC-384
3,282,669 UART: [kat] HMAC-384Kdf
3,296,252 UART: [kat] LMS
3,825,800 UART: [kat] --
3,832,462 UART: [cold-reset] ++
3,833,686 UART: [fht] FHT @ 0x50003400
3,843,071 UART: [idev] ++
3,843,685 UART: [idev] CDI.KEYID = 6
3,844,601 UART: [idev] SUBJECT.KEYID = 7
3,845,776 UART: [idev] UDS.KEYID = 0
3,846,697 ready_for_fw is high
3,846,877 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,987,444 UART: [idev] Erasing UDS.KEYID = 0
6,312,254 UART: [idev] Sha1 KeyId Algorithm
6,334,943 UART: [idev] --
6,338,150 UART: [ldev] ++
6,338,730 UART: [ldev] CDI.KEYID = 6
6,339,638 UART: [ldev] SUBJECT.KEYID = 5
6,340,797 UART: [ldev] AUTHORITY.KEYID = 7
6,341,945 UART: [ldev] FE.KEYID = 1
6,352,471 UART: [ldev] Erasing FE.KEYID = 1
8,826,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,473 UART: [ldev] --
10,618,348 UART: [fwproc] Wait for Commands...
10,620,224 UART: [fwproc] Recv command 0x46574c44
10,622,316 UART: [fwproc] Recv'd Img size: 112032 bytes
13,998,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,067,936 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,128,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,446,531 >>> mbox cmd response: success
14,450,924 UART: [afmc] ++
14,451,507 UART: [afmc] CDI.KEYID = 6
14,452,438 UART: [afmc] SUBJECT.KEYID = 7
14,453,608 UART: [afmc] AUTHORITY.KEYID = 5
16,953,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,659 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,691,755 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,707,770 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,490 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,745,929 UART: [afmc] --
18,750,515 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,891,902 UART: [cold-reset] --
18,892,803 UART: [state] Locking Datavault
18,893,883 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,420 UART: [state] Locking ICCM
18,896,298 UART: [exit] Launching FMC @ 0x40000000
18,897,716 UART:
18,897,886 UART: Running Caliptra FMC ...
18,898,899 UART:
18,899,041 UART: [fmc] Received command: 0x46574C44
18,900,539 UART:
18,900,698 UART: Running Caliptra ROM ...
18,901,821 UART:
18,901,976 UART: [state] CFI Enabled
18,910,805 UART: [state] LifecycleState = Unprovisioned
18,912,641 UART: [state] DebugLocked = No
18,914,018 UART: [state] WD Timer not started. Device not locked for debugging
18,918,239 UART: [kat] SHA2-256
19,097,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,108,993 UART: [kat] ++
19,109,445 UART: [kat] sha1
19,121,351 UART: [kat] SHA2-256
19,124,400 UART: [kat] SHA2-384
19,129,160 UART: [kat] SHA2-512-ACC
19,132,098 UART: [kat] ECC-384
21,575,215 UART: [kat] HMAC-384Kdf
21,588,134 UART: [kat] LMS
22,117,633 UART: [kat] --
22,121,674 UART: [update-reset] ++
25,514,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,518,257 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,893,069 >>> mbox cmd response: success
25,894,807 UART: [update-reset] Copying MAN_2 To MAN_1
25,917,138 UART: [update-reset Success] --
25,918,428 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,921,622 UART: [state] Locking Datavault
25,924,448 UART: [state] Locking PCR0, PCR1 and PCR31
25,926,101 UART: [state] Locking ICCM
25,928,250 UART: [exit] Launching FMC @ 0x40000000
25,936,608 UART:
25,936,842 UART: Running Caliptra FMC ...
25,937,938 UART:
25,938,089 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,939,718 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,701,410 ready_for_fw is high
3,701,999 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,226,616 >>> mbox cmd response: success
18,460,180 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,602,004 UART:
18,602,394 UART: Running Caliptra FMC ...
18,603,612 UART:
18,603,783 UART: [fmc] Received command: 0x46574C44
25,456,046 >>> mbox cmd response: success
25,478,310 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,493,746 UART:
25,494,009 UART: Running Caliptra FMC ...
25,495,188 UART:
25,495,352 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,496,995 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,174,063 ready_for_fw is high
1,174,063 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,911 UART: [fwproc] Recv command 0x46574c44
1,282,644 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,141 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,820 >>> mbox cmd response: success
2,744,917 UART: [afmc] ++
2,745,085 UART: [afmc] CDI.KEYID = 6
2,745,448 UART: [afmc] SUBJECT.KEYID = 7
2,745,874 UART: [afmc] AUTHORITY.KEYID = 5
2,781,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,738 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,434 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,333 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,026 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,784 UART: [afmc] --
2,824,688 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,710 UART: [cold-reset] --
2,825,666 UART: [state] Locking Datavault
2,826,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,309 UART: [state] Locking ICCM
2,827,755 UART: [exit] Launching FMC @ 0x40000000
2,833,052 UART:
2,833,068 UART: Running Caliptra FMC ...
2,833,476 UART:
2,833,706 UART: [fmc] Received command: 0x46574C44
2,834,532 UART:
2,834,548 UART: Running Caliptra ROM ...
2,834,956 UART:
2,835,011 UART: [state] CFI Enabled
2,837,901 UART: [state] LifecycleState = Unprovisioned
2,838,556 UART: [state] DebugLocked = No
2,839,162 UART: [state] WD Timer not started. Device not locked for debugging
2,840,270 UART: [kat] SHA2-256
3,643,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,949 UART: [kat] ++
3,648,101 UART: [kat] sha1
3,652,271 UART: [kat] SHA2-256
3,654,211 UART: [kat] SHA2-384
3,656,908 UART: [kat] SHA2-512-ACC
3,658,808 UART: [kat] ECC-384
3,668,833 UART: [kat] HMAC-384Kdf
3,673,345 UART: [kat] LMS
3,921,657 UART: [kat] --
3,922,601 UART: [update-reset] ++
5,207,977 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,076 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,262 >>> mbox cmd response: success
5,357,565 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,579 UART: [update-reset Success] --
5,365,988 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,358 UART: [state] Locking Datavault
5,367,028 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,632 UART: [state] Locking ICCM
5,368,144 UART: [exit] Launching FMC @ 0x40000000
5,373,441 UART:
5,373,457 UART: Running Caliptra FMC ...
5,373,865 UART:
5,374,087 UART: [fmc] Received command: 0x1000000C
5,374,822 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,464 ready_for_fw is high
1,055,464 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,622 >>> mbox cmd response: success
2,647,103 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,100 UART:
2,653,116 UART: Running Caliptra FMC ...
2,653,524 UART:
2,653,754 UART: [fmc] Received command: 0x46574C44
5,059,789 >>> mbox cmd response: success
5,067,471 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,087 UART:
5,073,103 UART: Running Caliptra FMC ...
5,073,511 UART:
5,073,733 UART: [fmc] Received command: 0x1000000C
5,074,468 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,590 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,548 UART: [idev] ++
1,173,716 UART: [idev] CDI.KEYID = 6
1,174,077 UART: [idev] SUBJECT.KEYID = 7
1,174,502 UART: [idev] UDS.KEYID = 0
1,174,848 ready_for_fw is high
1,174,848 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,729 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,926 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,645 >>> mbox cmd response: success
2,745,844 UART: [afmc] ++
2,746,012 UART: [afmc] CDI.KEYID = 6
2,746,375 UART: [afmc] SUBJECT.KEYID = 7
2,746,801 UART: [afmc] AUTHORITY.KEYID = 5
2,782,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,343 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,039 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,938 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,631 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,543 UART: [afmc] --
2,825,585 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,825,607 UART: [cold-reset] --
2,826,491 UART: [state] Locking Datavault
2,827,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,362 UART: [state] Locking ICCM
2,828,998 UART: [exit] Launching FMC @ 0x40000000
2,834,295 UART:
2,834,311 UART: Running Caliptra FMC ...
2,834,719 UART:
2,834,949 UART: [fmc] Received command: 0x46574C44
2,835,775 UART:
2,835,791 UART: Running Caliptra ROM ...
2,836,199 UART:
2,836,341 UART: [state] CFI Enabled
2,839,429 UART: [state] LifecycleState = Unprovisioned
2,840,084 UART: [state] DebugLocked = No
2,840,710 UART: [state] WD Timer not started. Device not locked for debugging
2,841,824 UART: [kat] SHA2-256
3,645,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,649,503 UART: [kat] ++
3,649,655 UART: [kat] sha1
3,653,863 UART: [kat] SHA2-256
3,655,803 UART: [kat] SHA2-384
3,658,654 UART: [kat] SHA2-512-ACC
3,660,554 UART: [kat] ECC-384
3,669,949 UART: [kat] HMAC-384Kdf
3,674,753 UART: [kat] LMS
3,923,065 UART: [kat] --
3,924,157 UART: [update-reset] ++
5,209,221 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,210,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,358,432 >>> mbox cmd response: success
5,358,655 UART: [update-reset] Copying MAN_2 To MAN_1
5,366,669 UART: [update-reset Success] --
5,367,078 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,367,664 UART: [state] Locking Datavault
5,368,526 UART: [state] Locking PCR0, PCR1 and PCR31
5,369,130 UART: [state] Locking ICCM
5,369,700 UART: [exit] Launching FMC @ 0x40000000
5,374,997 UART:
5,375,013 UART: Running Caliptra FMC ...
5,375,421 UART:
5,375,643 UART: [fmc] Received command: 0x1000000C
5,376,378 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,607 ready_for_fw is high
1,056,607 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,609 >>> mbox cmd response: success
2,648,384 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,113 UART:
2,654,129 UART: Running Caliptra FMC ...
2,654,537 UART:
2,654,767 UART: [fmc] Received command: 0x46574C44
5,061,751 >>> mbox cmd response: success
5,069,277 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,075,061 UART:
5,075,077 UART: Running Caliptra FMC ...
5,075,485 UART:
5,075,707 UART: [fmc] Received command: 0x1000000C
5,076,442 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,309 UART: [kat] SHA2-256
901,249 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,174,151 ready_for_fw is high
1,174,151 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,118 UART: [ldev] ++
1,208,286 UART: [ldev] CDI.KEYID = 6
1,208,650 UART: [ldev] SUBJECT.KEYID = 5
1,209,077 UART: [ldev] AUTHORITY.KEYID = 7
1,209,540 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,168 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,263 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,912 >>> mbox cmd response: success
2,743,931 UART: [afmc] ++
2,744,099 UART: [afmc] CDI.KEYID = 6
2,744,462 UART: [afmc] SUBJECT.KEYID = 7
2,744,888 UART: [afmc] AUTHORITY.KEYID = 5
2,780,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,754 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,450 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,349 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,042 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,066 UART: [afmc] --
2,823,966 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,988 UART: [cold-reset] --
2,824,750 UART: [state] Locking Datavault
2,825,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,395 UART: [state] Locking ICCM
2,826,863 UART: [exit] Launching FMC @ 0x40000000
2,832,160 UART:
2,832,176 UART: Running Caliptra FMC ...
2,832,584 UART:
2,832,814 UART: [fmc] Received command: 0x46574C44
2,833,640 UART:
2,833,656 UART: Running Caliptra ROM ...
2,834,064 UART:
2,834,119 UART: [state] CFI Enabled
2,836,497 UART: [state] LifecycleState = Unprovisioned
2,837,152 UART: [state] DebugLocked = No
2,837,822 UART: [state] WD Timer not started. Device not locked for debugging
2,838,992 UART: [kat] SHA2-256
3,642,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,671 UART: [kat] ++
3,646,823 UART: [kat] sha1
3,651,019 UART: [kat] SHA2-256
3,652,959 UART: [kat] SHA2-384
3,655,704 UART: [kat] SHA2-512-ACC
3,657,604 UART: [kat] ECC-384
3,667,051 UART: [kat] HMAC-384Kdf
3,671,501 UART: [kat] LMS
3,919,813 UART: [kat] --
3,920,591 UART: [update-reset] ++
5,206,883 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,910 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,096 >>> mbox cmd response: success
5,356,267 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,281 UART: [update-reset Success] --
5,364,690 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,294 UART: [state] Locking Datavault
5,366,096 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,700 UART: [state] Locking ICCM
5,367,342 UART: [exit] Launching FMC @ 0x40000000
5,372,639 UART:
5,372,655 UART: Running Caliptra FMC ...
5,373,063 UART:
5,373,285 UART: [fmc] Received command: 0x1000000C
5,374,020 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 ready_for_fw is high
1,056,588 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,608 >>> mbox cmd response: success
2,648,287 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,568 UART:
2,654,584 UART: Running Caliptra FMC ...
2,654,992 UART:
2,655,222 UART: [fmc] Received command: 0x46574C44
5,059,247 >>> mbox cmd response: success
5,066,825 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,419 UART:
5,072,435 UART: Running Caliptra FMC ...
5,072,843 UART:
5,073,065 UART: [fmc] Received command: 0x1000000C
5,073,800 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 ready_for_fw is high
1,174,322 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,418 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,173 >>> mbox cmd response: success
2,744,236 UART: [afmc] ++
2,744,404 UART: [afmc] CDI.KEYID = 6
2,744,767 UART: [afmc] SUBJECT.KEYID = 7
2,745,193 UART: [afmc] AUTHORITY.KEYID = 5
2,781,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,753 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,449 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,348 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,041 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,777 UART: [afmc] --
2,824,635 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,657 UART: [cold-reset] --
2,825,581 UART: [state] Locking Datavault
2,826,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,284 UART: [state] Locking ICCM
2,827,724 UART: [exit] Launching FMC @ 0x40000000
2,833,021 UART:
2,833,037 UART: Running Caliptra FMC ...
2,833,445 UART:
2,833,675 UART: [fmc] Received command: 0x46574C44
2,834,501 UART:
2,834,517 UART: Running Caliptra ROM ...
2,834,925 UART:
2,835,067 UART: [state] CFI Enabled
2,837,961 UART: [state] LifecycleState = Unprovisioned
2,838,616 UART: [state] DebugLocked = No
2,839,318 UART: [state] WD Timer not started. Device not locked for debugging
2,840,560 UART: [kat] SHA2-256
3,644,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,239 UART: [kat] ++
3,648,391 UART: [kat] sha1
3,652,581 UART: [kat] SHA2-256
3,654,521 UART: [kat] SHA2-384
3,657,106 UART: [kat] SHA2-512-ACC
3,659,006 UART: [kat] ECC-384
3,668,633 UART: [kat] HMAC-384Kdf
3,673,313 UART: [kat] LMS
3,921,625 UART: [kat] --
3,922,269 UART: [update-reset] ++
5,208,347 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,338 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,524 >>> mbox cmd response: success
5,357,881 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,895 UART: [update-reset Success] --
5,366,304 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,808 UART: [state] Locking Datavault
5,367,764 UART: [state] Locking PCR0, PCR1 and PCR31
5,368,368 UART: [state] Locking ICCM
5,369,042 UART: [exit] Launching FMC @ 0x40000000
5,374,339 UART:
5,374,355 UART: Running Caliptra FMC ...
5,374,763 UART:
5,374,985 UART: [fmc] Received command: 0x1000000C
5,375,720 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,515 ready_for_fw is high
1,055,515 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,811 >>> mbox cmd response: success
2,649,640 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,863 UART:
2,655,879 UART: Running Caliptra FMC ...
2,656,287 UART:
2,656,517 UART: [fmc] Received command: 0x46574C44
5,061,683 >>> mbox cmd response: success
5,069,235 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,075,349 UART:
5,075,365 UART: Running Caliptra FMC ...
5,075,773 UART:
5,075,995 UART: [fmc] Received command: 0x1000000C
5,076,730 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,169,961 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,173,839 ready_for_fw is high
1,173,839 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,199,281 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,399 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,130 >>> mbox cmd response: success
2,743,251 UART: [afmc] ++
2,743,419 UART: [afmc] CDI.KEYID = 6
2,743,782 UART: [afmc] SUBJECT.KEYID = 7
2,744,208 UART: [afmc] AUTHORITY.KEYID = 5
2,779,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,798 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,494 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,393 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,086 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,812 UART: [afmc] --
2,822,852 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,874 UART: [cold-reset] --
2,823,762 UART: [state] Locking Datavault
2,824,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,435 UART: [state] Locking ICCM
2,825,933 UART: [exit] Launching FMC @ 0x40000000
2,831,230 UART:
2,831,246 UART: Running Caliptra FMC ...
2,831,654 UART:
2,831,884 UART: [fmc] Received command: 0x46574C44
2,832,710 UART:
2,832,726 UART: Running Caliptra ROM ...
2,833,134 UART:
2,833,189 UART: [state] CFI Enabled
2,836,631 UART: [state] LifecycleState = Unprovisioned
2,837,286 UART: [state] DebugLocked = No
2,837,916 UART: [state] WD Timer not started. Device not locked for debugging
2,839,270 UART: [kat] SHA2-256
3,642,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,949 UART: [kat] ++
3,647,101 UART: [kat] sha1
3,651,381 UART: [kat] SHA2-256
3,653,321 UART: [kat] SHA2-384
3,656,162 UART: [kat] SHA2-512-ACC
3,658,062 UART: [kat] ECC-384
3,667,819 UART: [kat] HMAC-384Kdf
3,672,451 UART: [kat] LMS
3,920,763 UART: [kat] --
3,921,577 UART: [update-reset] ++
5,208,179 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,414 >>> mbox cmd response: success
5,357,525 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,539 UART: [update-reset Success] --
5,365,948 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,680 UART: [state] Locking Datavault
5,367,528 UART: [state] Locking PCR0, PCR1 and PCR31
5,368,132 UART: [state] Locking ICCM
5,368,770 UART: [exit] Launching FMC @ 0x40000000
5,374,067 UART:
5,374,083 UART: Running Caliptra FMC ...
5,374,491 UART:
5,374,713 UART: [fmc] Received command: 0x1000000C
5,375,448 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,582 ready_for_fw is high
1,056,582 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,568 >>> mbox cmd response: success
2,648,639 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,568 UART:
2,654,584 UART: Running Caliptra FMC ...
2,654,992 UART:
2,655,222 UART: [fmc] Received command: 0x46574C44
5,061,359 >>> mbox cmd response: success
5,068,943 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,074,765 UART:
5,074,781 UART: Running Caliptra FMC ...
5,075,189 UART:
5,075,411 UART: [fmc] Received command: 0x1000000C
5,076,146 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,592 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,175,172 ready_for_fw is high
1,175,172 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,946 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,753 >>> mbox cmd response: success
2,743,788 UART: [afmc] ++
2,743,956 UART: [afmc] CDI.KEYID = 6
2,744,319 UART: [afmc] SUBJECT.KEYID = 7
2,744,745 UART: [afmc] AUTHORITY.KEYID = 5
2,779,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,907 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,603 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,502 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,195 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,091 UART: [afmc] --
2,823,187 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,209 UART: [cold-reset] --
2,824,215 UART: [state] Locking Datavault
2,825,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,834 UART: [state] Locking ICCM
2,826,438 UART: [exit] Launching FMC @ 0x40000000
2,831,735 UART:
2,831,751 UART: Running Caliptra FMC ...
2,832,159 UART:
2,832,389 UART: [fmc] Received command: 0x46574C44
2,833,215 UART:
2,833,231 UART: Running Caliptra ROM ...
2,833,639 UART:
2,833,781 UART: [state] CFI Enabled
2,837,187 UART: [state] LifecycleState = Unprovisioned
2,837,842 UART: [state] DebugLocked = No
2,838,476 UART: [state] WD Timer not started. Device not locked for debugging
2,839,790 UART: [kat] SHA2-256
3,643,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,469 UART: [kat] ++
3,647,621 UART: [kat] sha1
3,651,789 UART: [kat] SHA2-256
3,653,729 UART: [kat] SHA2-384
3,656,580 UART: [kat] SHA2-512-ACC
3,658,480 UART: [kat] ECC-384
3,668,559 UART: [kat] HMAC-384Kdf
3,673,259 UART: [kat] LMS
3,921,571 UART: [kat] --
3,922,481 UART: [update-reset] ++
5,207,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,148 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,334 >>> mbox cmd response: success
5,356,545 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,559 UART: [update-reset Success] --
5,364,968 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,446 UART: [state] Locking Datavault
5,366,466 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,070 UART: [state] Locking ICCM
5,367,658 UART: [exit] Launching FMC @ 0x40000000
5,372,955 UART:
5,372,971 UART: Running Caliptra FMC ...
5,373,379 UART:
5,373,601 UART: [fmc] Received command: 0x1000000C
5,374,336 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,111 ready_for_fw is high
1,056,111 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,075 >>> mbox cmd response: success
2,648,352 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,653 UART:
2,654,669 UART: Running Caliptra FMC ...
2,655,077 UART:
2,655,307 UART: [fmc] Received command: 0x46574C44
5,060,065 >>> mbox cmd response: success
5,067,583 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,201 UART:
5,073,217 UART: Running Caliptra FMC ...
5,073,625 UART:
5,073,847 UART: [fmc] Received command: 0x1000000C
5,074,582 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,286 UART:
192,642 UART: Running Caliptra ROM ...
194,005 UART:
194,168 UART: [state] CFI Enabled
264,667 UART: [state] LifecycleState = Unprovisioned
266,967 UART: [state] DebugLocked = No
268,423 UART: [state] WD Timer not started. Device not locked for debugging
272,889 UART: [kat] SHA2-256
454,789 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,367 UART: [kat] ++
466,910 UART: [kat] sha1
478,293 UART: [kat] SHA2-256
481,299 UART: [kat] SHA2-384
487,430 UART: [kat] SHA2-512-ACC
490,023 UART: [kat] ECC-384
3,780,466 UART: [kat] HMAC-384Kdf
3,806,216 UART: [kat] LMS
4,879,363 UART: [kat] --
4,883,426 UART: [cold-reset] ++
4,884,997 UART: [fht] FHT @ 0x50003400
4,896,682 UART: [idev] ++
4,897,382 UART: [idev] CDI.KEYID = 6
4,898,554 UART: [idev] SUBJECT.KEYID = 7
4,899,722 UART: [idev] UDS.KEYID = 0
4,900,646 ready_for_fw is high
4,900,832 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,041,338 UART: [idev] Erasing UDS.KEYID = 0
8,245,654 UART: [idev] Sha1 KeyId Algorithm
8,267,966 UART: [idev] --
8,272,231 UART: [ldev] ++
8,272,875 UART: [ldev] CDI.KEYID = 6
8,274,037 UART: [ldev] SUBJECT.KEYID = 5
8,275,214 UART: [ldev] AUTHORITY.KEYID = 7
8,276,443 UART: [ldev] FE.KEYID = 1
8,320,355 UART: [ldev] Erasing FE.KEYID = 1
11,654,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,623 UART: [ldev] --
14,042,552 UART: [fwproc] Wait for Commands...
14,044,771 UART: [fwproc] Recv command 0x46574c44
14,047,083 UART: [fwproc] Recv'd Img size: 111688 bytes
18,095,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,174,330 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,234,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,551,821 >>> mbox cmd response: success
18,555,642 UART: [afmc] ++
18,556,410 UART: [afmc] CDI.KEYID = 6
18,557,496 UART: [afmc] SUBJECT.KEYID = 7
18,558,596 UART: [afmc] AUTHORITY.KEYID = 5
21,925,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,902 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,246,009 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,262,174 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,278,146 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,301,310 UART: [afmc] --
26,367,658 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,502,840 UART: [cold-reset] --
26,503,770 UART: [state] Locking Datavault
26,504,851 UART: [state] Locking PCR0, PCR1 and PCR31
26,506,391 UART: [state] Locking ICCM
26,507,277 UART: [exit] Launching FMC @ 0x40000000
26,508,619 UART:
26,508,765 UART: Running Caliptra FMC ...
26,509,864 UART:
26,510,016 UART: [fmc] Received command: 0x46574C44
26,511,410 UART:
26,511,560 UART: Running Caliptra ROM ...
26,512,574 UART:
26,512,719 UART: [state] CFI Enabled
26,570,758 UART: [state] LifecycleState = Unprovisioned
26,572,621 UART: [state] DebugLocked = No
26,575,435 UART: [state] WD Timer not started. Device not locked for debugging
26,579,662 UART: [kat] SHA2-256
26,761,601 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,773,135 UART: [kat] ++
26,773,595 UART: [kat] sha1
26,784,805 UART: [kat] SHA2-256
26,787,817 UART: [kat] SHA2-384
26,795,041 UART: [kat] SHA2-512-ACC
26,797,669 UART: [kat] ECC-384
30,079,786 UART: [kat] HMAC-384Kdf
30,106,301 UART: [kat] LMS
31,179,432 UART: [kat] --
31,183,770 UART: [update-reset] ++
31,228,357 >>> mbox cmd response: failed
31,228,718 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,230,621 UART: ROM Non-Fatal Error: 0x000B001E
31,233,454 UART: [state] Locking Datavault
31,237,290 UART: [state] Locking PCR0, PCR1 and PCR31
31,239,492 UART: [state] Locking ICCM
31,241,487 UART: [exit] Launching FMC @ 0x40000000
31,250,158 UART:
31,250,388 UART: Running Caliptra FMC ...
31,251,492 UART:
31,251,643 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,253,277 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
4,801,210 ready_for_fw is high
4,801,608 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,305,509 >>> mbox cmd response: success
26,034,451 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,169,711 UART:
26,170,119 UART: Running Caliptra FMC ...
26,171,227 UART:
26,171,390 UART: [fmc] Received command: 0x46574C44
30,820,961 >>> mbox cmd response: failed
30,821,405 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,832,440 UART:
30,832,703 UART: Running Caliptra FMC ...
30,833,854 UART:
30,834,017 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,835,654 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,397 UART:
192,765 UART: Running Caliptra ROM ...
193,883 UART:
603,461 UART: [state] CFI Enabled
620,517 UART: [state] LifecycleState = Unprovisioned
622,903 UART: [state] DebugLocked = No
625,491 UART: [state] WD Timer not started. Device not locked for debugging
630,240 UART: [kat] SHA2-256
812,178 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,763 UART: [kat] ++
824,205 UART: [kat] sha1
835,642 UART: [kat] SHA2-256
838,660 UART: [kat] SHA2-384
844,301 UART: [kat] SHA2-512-ACC
846,879 UART: [kat] ECC-384
4,102,592 UART: [kat] HMAC-384Kdf
4,115,123 UART: [kat] LMS
5,188,311 UART: [kat] --
5,194,832 UART: [cold-reset] ++
5,196,132 UART: [fht] FHT @ 0x50003400
5,208,451 UART: [idev] ++
5,209,153 UART: [idev] CDI.KEYID = 6
5,210,317 UART: [idev] SUBJECT.KEYID = 7
5,211,768 UART: [idev] UDS.KEYID = 0
5,213,018 ready_for_fw is high
5,213,236 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,353,570 UART: [idev] Erasing UDS.KEYID = 0
8,496,857 UART: [idev] Sha1 KeyId Algorithm
8,520,152 UART: [idev] --
8,523,300 UART: [ldev] ++
8,523,868 UART: [ldev] CDI.KEYID = 6
8,525,097 UART: [ldev] SUBJECT.KEYID = 5
8,526,529 UART: [ldev] AUTHORITY.KEYID = 7
8,528,002 UART: [ldev] FE.KEYID = 1
8,540,604 UART: [ldev] Erasing FE.KEYID = 1
11,834,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,773 UART: [ldev] --
14,199,528 UART: [fwproc] Wait for Commands...
14,201,018 UART: [fwproc] Recv command 0x46574c44
14,202,957 UART: [fwproc] Recv'd Img size: 111688 bytes
18,242,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,308,529 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,368,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,686,521 >>> mbox cmd response: success
18,690,931 UART: [afmc] ++
18,691,658 UART: [afmc] CDI.KEYID = 6
18,692,865 UART: [afmc] SUBJECT.KEYID = 7
18,693,966 UART: [afmc] AUTHORITY.KEYID = 5
22,011,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,304,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,043 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,322,163 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,338,302 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,354,282 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,376,947 UART: [afmc] --
26,447,643 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,582,852 UART: [cold-reset] --
26,583,798 UART: [state] Locking Datavault
26,584,876 UART: [state] Locking PCR0, PCR1 and PCR31
26,586,416 UART: [state] Locking ICCM
26,587,286 UART: [exit] Launching FMC @ 0x40000000
26,588,621 UART:
26,588,758 UART: Running Caliptra FMC ...
26,590,130 UART:
26,590,295 UART: [fmc] Received command: 0x46574C44
26,591,755 UART:
26,591,900 UART: Running Caliptra ROM ...
26,592,993 UART:
26,593,137 UART: [state] CFI Enabled
26,597,598 UART: [state] LifecycleState = Unprovisioned
26,599,467 UART: [state] DebugLocked = No
26,601,894 UART: [state] WD Timer not started. Device not locked for debugging
26,606,876 UART: [kat] SHA2-256
26,788,822 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,800,376 UART: [kat] ++
26,800,895 UART: [kat] sha1
26,811,936 UART: [kat] SHA2-256
26,814,944 UART: [kat] SHA2-384
26,821,349 UART: [kat] SHA2-512-ACC
26,823,963 UART: [kat] ECC-384
30,080,255 UART: [kat] HMAC-384Kdf
30,091,333 UART: [kat] LMS
31,164,502 UART: [kat] --
31,168,493 UART: [update-reset] ++
31,213,230 >>> mbox cmd response: failed
31,213,604 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,216,468 UART: ROM Non-Fatal Error: 0x000B001E
31,219,069 UART: [state] Locking Datavault
31,223,511 UART: [state] Locking PCR0, PCR1 and PCR31
31,225,696 UART: [state] Locking ICCM
31,228,250 UART: [exit] Launching FMC @ 0x40000000
31,236,908 UART:
31,237,147 UART: Running Caliptra FMC ...
31,238,163 UART:
31,238,302 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,239,922 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,101,092 ready_for_fw is high
5,101,507 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,494,364 >>> mbox cmd response: success
26,166,652 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,301,882 UART:
26,302,308 UART: Running Caliptra FMC ...
26,303,489 UART:
26,303,649 UART: [fmc] Received command: 0x46574C44
30,834,129 >>> mbox cmd response: failed
30,834,585 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,846,762 UART:
30,847,026 UART: Running Caliptra FMC ...
30,848,089 UART:
30,848,252 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,849,894 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,236 UART:
192,616 UART: Running Caliptra ROM ...
193,713 UART:
193,854 UART: [state] CFI Enabled
264,099 UART: [state] LifecycleState = Unprovisioned
266,011 UART: [state] DebugLocked = No
267,180 UART: [state] WD Timer not started. Device not locked for debugging
270,860 UART: [kat] SHA2-256
450,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,593 UART: [kat] ++
462,040 UART: [kat] sha1
471,993 UART: [kat] SHA2-256
475,065 UART: [kat] SHA2-384
481,627 UART: [kat] SHA2-512-ACC
484,575 UART: [kat] ECC-384
2,944,034 UART: [kat] HMAC-384Kdf
2,962,972 UART: [kat] LMS
3,492,438 UART: [kat] --
3,496,503 UART: [cold-reset] ++
3,497,726 UART: [fht] FHT @ 0x50003400
3,509,063 UART: [idev] ++
3,509,634 UART: [idev] CDI.KEYID = 6
3,510,544 UART: [idev] SUBJECT.KEYID = 7
3,511,791 UART: [idev] UDS.KEYID = 0
3,512,712 ready_for_fw is high
3,512,897 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,653,794 UART: [idev] Erasing UDS.KEYID = 0
6,018,187 UART: [idev] Sha1 KeyId Algorithm
6,040,826 UART: [idev] --
6,046,386 UART: [ldev] ++
6,046,961 UART: [ldev] CDI.KEYID = 6
6,047,878 UART: [ldev] SUBJECT.KEYID = 5
6,049,044 UART: [ldev] AUTHORITY.KEYID = 7
6,050,299 UART: [ldev] FE.KEYID = 1
6,091,088 UART: [ldev] Erasing FE.KEYID = 1
8,593,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,343,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,003 UART: [ldev] --
10,383,411 UART: [fwproc] Wait for Commands...
10,386,638 UART: [fwproc] Recv command 0x46574c44
10,388,740 UART: [fwproc] Recv'd Img size: 112032 bytes
13,764,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,837,446 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,897,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,216,358 >>> mbox cmd response: success
14,220,344 UART: [afmc] ++
14,220,983 UART: [afmc] CDI.KEYID = 6
14,221,901 UART: [afmc] SUBJECT.KEYID = 7
14,223,063 UART: [afmc] AUTHORITY.KEYID = 5
16,756,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,481,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,483,261 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,499,240 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,515,267 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,531,017 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,554,433 UART: [afmc] --
20,619,721 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,755,425 UART: [cold-reset] --
20,756,366 UART: [state] Locking Datavault
20,757,496 UART: [state] Locking PCR0, PCR1 and PCR31
20,759,046 UART: [state] Locking ICCM
20,759,958 UART: [exit] Launching FMC @ 0x40000000
20,761,387 UART:
20,761,547 UART: Running Caliptra FMC ...
20,762,645 UART:
20,762,799 UART: [fmc] Received command: 0x46574C44
20,764,262 UART:
20,764,417 UART: Running Caliptra ROM ...
20,765,520 UART:
20,765,695 UART: [state] CFI Enabled
20,819,588 UART: [state] LifecycleState = Unprovisioned
20,821,473 UART: [state] DebugLocked = No
20,823,510 UART: [state] WD Timer not started. Device not locked for debugging
20,827,142 UART: [kat] SHA2-256
21,006,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,017,872 UART: [kat] ++
21,018,330 UART: [kat] sha1
21,030,675 UART: [kat] SHA2-256
21,033,691 UART: [kat] SHA2-384
21,039,774 UART: [kat] SHA2-512-ACC
21,042,728 UART: [kat] ECC-384
23,503,064 UART: [kat] HMAC-384Kdf
23,524,816 UART: [kat] LMS
24,054,287 UART: [kat] --
24,059,145 UART: [update-reset] ++
24,107,742 >>> mbox cmd response: failed
24,108,132 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,108,896 UART: ROM Non-Fatal Error: 0x000B001E
24,111,246 UART: [state] Locking Datavault
24,114,175 UART: [state] Locking PCR0, PCR1 and PCR31
24,115,818 UART: [state] Locking ICCM
24,117,647 UART: [exit] Launching FMC @ 0x40000000
24,126,045 UART:
24,126,292 UART: Running Caliptra FMC ...
24,127,394 UART:
24,127,551 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,129,197 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,382,419 ready_for_fw is high
3,383,001 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,022,554 >>> mbox cmd response: success
20,345,278 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,480,773 UART:
20,481,163 UART: Running Caliptra FMC ...
20,482,239 UART:
20,482,390 UART: [fmc] Received command: 0x46574C44
23,679,726 >>> mbox cmd response: failed
23,680,175 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,693,468 UART:
23,693,754 UART: Running Caliptra FMC ...
23,694,831 UART:
23,694,978 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,696,621 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,479 UART:
192,838 UART: Running Caliptra ROM ...
193,941 UART:
603,606 UART: [state] CFI Enabled
616,698 UART: [state] LifecycleState = Unprovisioned
618,580 UART: [state] DebugLocked = No
620,732 UART: [state] WD Timer not started. Device not locked for debugging
624,478 UART: [kat] SHA2-256
803,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,213 UART: [kat] ++
815,659 UART: [kat] sha1
827,451 UART: [kat] SHA2-256
830,472 UART: [kat] SHA2-384
835,896 UART: [kat] SHA2-512-ACC
838,832 UART: [kat] ECC-384
3,281,068 UART: [kat] HMAC-384Kdf
3,295,009 UART: [kat] LMS
3,824,495 UART: [kat] --
3,830,121 UART: [cold-reset] ++
3,831,144 UART: [fht] FHT @ 0x50003400
3,842,853 UART: [idev] ++
3,843,425 UART: [idev] CDI.KEYID = 6
3,844,304 UART: [idev] SUBJECT.KEYID = 7
3,845,422 UART: [idev] UDS.KEYID = 0
3,846,563 ready_for_fw is high
3,846,752 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,987,314 UART: [idev] Erasing UDS.KEYID = 0
6,314,102 UART: [idev] Sha1 KeyId Algorithm
6,336,037 UART: [idev] --
6,340,402 UART: [ldev] ++
6,341,029 UART: [ldev] CDI.KEYID = 6
6,341,921 UART: [ldev] SUBJECT.KEYID = 5
6,343,036 UART: [ldev] AUTHORITY.KEYID = 7
6,344,404 UART: [ldev] FE.KEYID = 1
6,354,175 UART: [ldev] Erasing FE.KEYID = 1
8,828,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,101 UART: [ldev] --
10,618,665 UART: [fwproc] Wait for Commands...
10,621,570 UART: [fwproc] Recv command 0x46574c44
10,623,659 UART: [fwproc] Recv'd Img size: 112032 bytes
13,995,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,066,361 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,445,527 >>> mbox cmd response: success
14,450,521 UART: [afmc] ++
14,451,139 UART: [afmc] CDI.KEYID = 6
14,452,058 UART: [afmc] SUBJECT.KEYID = 7
14,453,225 UART: [afmc] AUTHORITY.KEYID = 5
16,949,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,670,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,180 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,688,172 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,704,173 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,719,968 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,741,930 UART: [afmc] --
20,806,287 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,941,946 UART: [cold-reset] --
20,942,866 UART: [state] Locking Datavault
20,943,947 UART: [state] Locking PCR0, PCR1 and PCR31
20,945,515 UART: [state] Locking ICCM
20,946,438 UART: [exit] Launching FMC @ 0x40000000
20,947,867 UART:
20,948,026 UART: Running Caliptra FMC ...
20,949,130 UART:
20,949,281 UART: [fmc] Received command: 0x46574C44
20,950,656 UART:
20,950,799 UART: Running Caliptra ROM ...
20,952,179 UART:
20,952,345 UART: [state] CFI Enabled
20,960,405 UART: [state] LifecycleState = Unprovisioned
20,962,302 UART: [state] DebugLocked = No
20,965,033 UART: [state] WD Timer not started. Device not locked for debugging
20,969,043 UART: [kat] SHA2-256
21,148,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,159,755 UART: [kat] ++
21,160,315 UART: [kat] sha1
21,169,805 UART: [kat] SHA2-256
21,172,816 UART: [kat] SHA2-384
21,177,659 UART: [kat] SHA2-512-ACC
21,180,593 UART: [kat] ECC-384
23,621,576 UART: [kat] HMAC-384Kdf
23,633,109 UART: [kat] LMS
24,162,633 UART: [kat] --
24,167,322 UART: [update-reset] ++
24,213,788 >>> mbox cmd response: failed
24,214,148 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,216,266 UART: ROM Non-Fatal Error: 0x000B001E
24,219,639 UART: [state] Locking Datavault
24,224,292 UART: [state] Locking PCR0, PCR1 and PCR31
24,225,996 UART: [state] Locking ICCM
24,227,207 UART: [exit] Launching FMC @ 0x40000000
24,235,584 UART:
24,235,867 UART: Running Caliptra FMC ...
24,236,975 UART:
24,237,130 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,238,755 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,697,219 ready_for_fw is high
3,697,622 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,226,302 >>> mbox cmd response: success
20,519,784 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,655,297 UART:
20,655,690 UART: Running Caliptra FMC ...
20,656,771 UART:
20,656,938 UART: [fmc] Received command: 0x46574C44
23,782,555 >>> mbox cmd response: failed
23,782,995 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,796,816 UART:
23,797,122 UART: Running Caliptra FMC ...
23,798,211 UART:
23,798,361 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,800,020 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
193,155 UART:
193,508 UART: Running Caliptra ROM ...
194,694 UART:
194,849 UART: [state] CFI Enabled
260,792 UART: [state] LifecycleState = Unprovisioned
262,705 UART: [state] DebugLocked = No
265,450 UART: [state] WD Timer not started. Device not locked for debugging
269,625 UART: [kat] SHA2-256
448,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,379 UART: [kat] ++
460,911 UART: [kat] sha1
472,288 UART: [kat] SHA2-256
475,296 UART: [kat] SHA2-384
481,500 UART: [kat] SHA2-512-ACC
484,492 UART: [kat] ECC-384
2,948,748 UART: [kat] HMAC-384Kdf
2,971,862 UART: [kat] LMS
3,501,313 UART: [kat] --
3,506,797 UART: [cold-reset] ++
3,508,725 UART: [fht] FHT @ 0x50003400
3,519,629 UART: [idev] ++
3,520,187 UART: [idev] CDI.KEYID = 6
3,521,140 UART: [idev] SUBJECT.KEYID = 7
3,522,486 UART: [idev] UDS.KEYID = 0
3,523,431 ready_for_fw is high
3,523,616 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,664,362 UART: [idev] Erasing UDS.KEYID = 0
6,027,608 UART: [idev] Sha1 KeyId Algorithm
6,051,873 UART: [idev] --
6,055,276 UART: [ldev] ++
6,055,869 UART: [ldev] CDI.KEYID = 6
6,056,756 UART: [ldev] SUBJECT.KEYID = 5
6,057,908 UART: [ldev] AUTHORITY.KEYID = 7
6,059,193 UART: [ldev] FE.KEYID = 1
6,086,446 UART: [ldev] Erasing FE.KEYID = 1
8,585,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,306,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,338,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,847 UART: [ldev] --
10,378,708 UART: [fwproc] Wait for Commands...
10,381,393 UART: [fwproc] Recv command 0x46574c44
10,383,487 UART: [fwproc] Recv'd Img size: 112032 bytes
13,750,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,826,431 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,886,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,204,819 >>> mbox cmd response: success
14,209,825 UART: [afmc] ++
14,210,433 UART: [afmc] CDI.KEYID = 6
14,211,321 UART: [afmc] SUBJECT.KEYID = 7
14,212,419 UART: [afmc] AUTHORITY.KEYID = 5
16,750,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,472,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,474,670 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,490,680 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,506,691 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,522,464 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,545,027 UART: [afmc] --
20,609,794 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,746,101 UART: [cold-reset] --
20,747,061 UART: [state] Locking Datavault
20,748,186 UART: [state] Locking PCR0, PCR1 and PCR31
20,749,731 UART: [state] Locking ICCM
20,750,659 UART: [exit] Launching FMC @ 0x40000000
20,752,087 UART:
20,752,251 UART: Running Caliptra FMC ...
20,753,350 UART:
20,753,508 UART: [fmc] Received command: 0x46574C44
20,754,988 UART:
20,755,146 UART: Running Caliptra ROM ...
20,756,246 UART:
20,756,399 UART: [state] CFI Enabled
20,810,701 UART: [state] LifecycleState = Unprovisioned
20,812,582 UART: [state] DebugLocked = No
20,814,564 UART: [state] WD Timer not started. Device not locked for debugging
20,817,659 UART: [kat] SHA2-256
20,996,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,008,365 UART: [kat] ++
21,008,913 UART: [kat] sha1
21,020,076 UART: [kat] SHA2-256
21,023,085 UART: [kat] SHA2-384
21,029,889 UART: [kat] SHA2-512-ACC
21,032,834 UART: [kat] ECC-384
23,496,418 UART: [kat] HMAC-384Kdf
23,516,928 UART: [kat] LMS
24,046,380 UART: [kat] --
24,049,564 UART: [update-reset] ++
24,096,779 >>> mbox cmd response: failed
24,097,175 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,098,854 UART: ROM Non-Fatal Error: 0x000B001E
24,101,257 UART: [state] Locking Datavault
24,104,133 UART: [state] Locking PCR0, PCR1 and PCR31
24,105,840 UART: [state] Locking ICCM
24,107,882 UART: [exit] Launching FMC @ 0x40000000
24,116,278 UART:
24,116,514 UART: Running Caliptra FMC ...
24,117,616 UART:
24,117,772 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,119,404 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,381,305 ready_for_fw is high
3,381,700 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,037,379 >>> mbox cmd response: success
20,365,738 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,501,818 UART:
20,502,269 UART: Running Caliptra FMC ...
20,503,408 UART:
20,503,569 UART: [fmc] Received command: 0x46574C44
23,702,010 >>> mbox cmd response: failed
23,702,438 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,713,958 UART:
23,714,213 UART: Running Caliptra FMC ...
23,715,293 UART:
23,715,451 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,717,093 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,231 UART:
192,614 UART: Running Caliptra ROM ...
193,735 UART:
603,238 UART: [state] CFI Enabled
618,129 UART: [state] LifecycleState = Unprovisioned
619,967 UART: [state] DebugLocked = No
622,542 UART: [state] WD Timer not started. Device not locked for debugging
626,444 UART: [kat] SHA2-256
805,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,152 UART: [kat] ++
817,631 UART: [kat] sha1
828,512 UART: [kat] SHA2-256
831,523 UART: [kat] SHA2-384
838,572 UART: [kat] SHA2-512-ACC
841,575 UART: [kat] ECC-384
3,282,598 UART: [kat] HMAC-384Kdf
3,295,203 UART: [kat] LMS
3,824,678 UART: [kat] --
3,829,939 UART: [cold-reset] ++
3,832,500 UART: [fht] FHT @ 0x50003400
3,843,824 UART: [idev] ++
3,844,388 UART: [idev] CDI.KEYID = 6
3,845,262 UART: [idev] SUBJECT.KEYID = 7
3,846,498 UART: [idev] UDS.KEYID = 0
3,847,398 ready_for_fw is high
3,847,600 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,988,407 UART: [idev] Erasing UDS.KEYID = 0
6,318,341 UART: [idev] Sha1 KeyId Algorithm
6,340,214 UART: [idev] --
6,344,414 UART: [ldev] ++
6,344,977 UART: [ldev] CDI.KEYID = 6
6,345,883 UART: [ldev] SUBJECT.KEYID = 5
6,347,090 UART: [ldev] AUTHORITY.KEYID = 7
6,348,340 UART: [ldev] FE.KEYID = 1
6,360,442 UART: [ldev] Erasing FE.KEYID = 1
8,833,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,311 UART: [ldev] --
10,622,258 UART: [fwproc] Wait for Commands...
10,624,024 UART: [fwproc] Recv command 0x46574c44
10,626,115 UART: [fwproc] Recv'd Img size: 112032 bytes
14,000,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,069,249 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,129,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,447,276 >>> mbox cmd response: success
14,451,602 UART: [afmc] ++
14,452,270 UART: [afmc] CDI.KEYID = 6
14,453,167 UART: [afmc] SUBJECT.KEYID = 7
14,454,271 UART: [afmc] AUTHORITY.KEYID = 5
16,955,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,677,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,678,928 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,694,959 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,710,963 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,726,697 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,749,438 UART: [afmc] --
20,812,920 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,948,733 UART: [cold-reset] --
20,949,658 UART: [state] Locking Datavault
20,950,821 UART: [state] Locking PCR0, PCR1 and PCR31
20,952,359 UART: [state] Locking ICCM
20,953,289 UART: [exit] Launching FMC @ 0x40000000
20,954,713 UART:
20,954,874 UART: Running Caliptra FMC ...
20,955,973 UART:
20,956,127 UART: [fmc] Received command: 0x46574C44
20,957,581 UART:
20,957,731 UART: Running Caliptra ROM ...
20,958,829 UART:
20,959,002 UART: [state] CFI Enabled
20,966,841 UART: [state] LifecycleState = Unprovisioned
20,968,665 UART: [state] DebugLocked = No
20,971,333 UART: [state] WD Timer not started. Device not locked for debugging
20,974,211 UART: [kat] SHA2-256
21,153,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,164,962 UART: [kat] ++
21,165,420 UART: [kat] sha1
21,175,977 UART: [kat] SHA2-256
21,179,028 UART: [kat] SHA2-384
21,184,695 UART: [kat] SHA2-512-ACC
21,187,639 UART: [kat] ECC-384
23,627,299 UART: [kat] HMAC-384Kdf
23,639,089 UART: [kat] LMS
24,168,590 UART: [kat] --
24,171,978 UART: [update-reset] ++
24,221,154 >>> mbox cmd response: failed
24,221,542 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,223,926 UART: ROM Non-Fatal Error: 0x000B001E
24,227,683 UART: [state] Locking Datavault
24,231,042 UART: [state] Locking PCR0, PCR1 and PCR31
24,232,742 UART: [state] Locking ICCM
24,235,325 UART: [exit] Launching FMC @ 0x40000000
24,243,722 UART:
24,243,948 UART: Running Caliptra FMC ...
24,245,052 UART:
24,245,208 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,246,838 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,692,614 ready_for_fw is high
3,693,162 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,220,324 >>> mbox cmd response: success
20,512,869 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,648,522 UART:
20,648,969 UART: Running Caliptra FMC ...
20,650,058 UART:
20,650,212 UART: [fmc] Received command: 0x46574C44
23,777,550 >>> mbox cmd response: failed
23,778,006 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,789,589 UART:
23,789,852 UART: Running Caliptra FMC ...
23,791,025 UART:
23,791,212 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,792,864 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,173,747 ready_for_fw is high
1,173,747 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,319 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,207,023 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,744 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,640 UART: [fwproc] Wait for Commands...
1,281,373 UART: [fwproc] Recv command 0x46574c44
1,282,106 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,944 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,717 >>> mbox cmd response: success
2,742,936 UART: [afmc] ++
2,743,104 UART: [afmc] CDI.KEYID = 6
2,743,467 UART: [afmc] SUBJECT.KEYID = 7
2,743,893 UART: [afmc] AUTHORITY.KEYID = 5
2,780,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,745 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,460 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,352 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,064 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,939 UART: [afmc] --
2,822,949 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,822,971 UART: [cold-reset] --
2,823,647 UART: [state] Locking Datavault
2,824,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,310 UART: [state] Locking ICCM
2,825,872 UART: [exit] Launching FMC @ 0x40000000
2,831,169 UART:
2,831,185 UART: Running Caliptra FMC ...
2,831,593 UART:
2,831,823 UART: [fmc] Received command: 0x46574C44
2,832,649 UART:
2,832,665 UART: Running Caliptra ROM ...
2,833,073 UART:
2,833,128 UART: [state] CFI Enabled
2,836,280 UART: [state] LifecycleState = Unprovisioned
2,836,935 UART: [state] DebugLocked = No
2,837,543 UART: [state] WD Timer not started. Device not locked for debugging
2,838,839 UART: [kat] SHA2-256
3,642,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,518 UART: [kat] ++
3,646,670 UART: [kat] sha1
3,650,922 UART: [kat] SHA2-256
3,652,862 UART: [kat] SHA2-384
3,655,539 UART: [kat] SHA2-512-ACC
3,657,439 UART: [kat] ECC-384
3,667,702 UART: [kat] HMAC-384Kdf
3,672,270 UART: [kat] LMS
3,920,582 UART: [kat] --
3,921,482 UART: [update-reset] ++
3,937,968 >>> mbox cmd response: failed
3,937,968 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,198 UART: ROM Non-Fatal Error: 0x000B001E
3,938,976 UART: [state] Locking Datavault
3,939,852 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,456 UART: [state] Locking ICCM
3,940,936 UART: [exit] Launching FMC @ 0x40000000
3,946,233 UART:
3,946,249 UART: Running Caliptra FMC ...
3,946,657 UART:
3,946,879 UART: [fmc] Received command: 0x1000000C
3,947,614 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,498 ready_for_fw is high
1,056,498 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,729 >>> mbox cmd response: success
2,650,642 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,656,753 UART:
2,656,769 UART: Running Caliptra FMC ...
2,657,177 UART:
2,657,407 UART: [fmc] Received command: 0x46574C44
3,647,488 >>> mbox cmd response: failed
3,647,488 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,653,419 UART:
3,653,435 UART: Running Caliptra FMC ...
3,653,843 UART:
3,654,065 UART: [fmc] Received command: 0x1000000C
3,654,800 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,726 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,938 UART: [idev] ++
1,174,106 UART: [idev] CDI.KEYID = 6
1,174,467 UART: [idev] SUBJECT.KEYID = 7
1,174,892 UART: [idev] UDS.KEYID = 0
1,175,238 ready_for_fw is high
1,175,238 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,774 UART: [idev] Sha1 KeyId Algorithm
1,209,540 UART: [idev] --
1,210,507 UART: [ldev] ++
1,210,675 UART: [ldev] CDI.KEYID = 6
1,211,039 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,763 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,299 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,582,187 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,782 >>> mbox cmd response: success
2,744,873 UART: [afmc] ++
2,745,041 UART: [afmc] CDI.KEYID = 6
2,745,404 UART: [afmc] SUBJECT.KEYID = 7
2,745,830 UART: [afmc] AUTHORITY.KEYID = 5
2,781,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,800 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,804,515 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,810,407 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,816,119 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,824,054 UART: [afmc] --
2,825,026 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,825,048 UART: [cold-reset] --
2,825,744 UART: [state] Locking Datavault
2,826,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,601 UART: [state] Locking ICCM
2,828,147 UART: [exit] Launching FMC @ 0x40000000
2,833,444 UART:
2,833,460 UART: Running Caliptra FMC ...
2,833,868 UART:
2,834,098 UART: [fmc] Received command: 0x46574C44
2,834,924 UART:
2,834,940 UART: Running Caliptra ROM ...
2,835,348 UART:
2,835,490 UART: [state] CFI Enabled
2,838,204 UART: [state] LifecycleState = Unprovisioned
2,838,859 UART: [state] DebugLocked = No
2,839,437 UART: [state] WD Timer not started. Device not locked for debugging
2,840,621 UART: [kat] SHA2-256
3,644,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,300 UART: [kat] ++
3,648,452 UART: [kat] sha1
3,652,692 UART: [kat] SHA2-256
3,654,632 UART: [kat] SHA2-384
3,657,411 UART: [kat] SHA2-512-ACC
3,659,311 UART: [kat] ECC-384
3,669,190 UART: [kat] HMAC-384Kdf
3,673,904 UART: [kat] LMS
3,922,216 UART: [kat] --
3,923,150 UART: [update-reset] ++
3,940,092 >>> mbox cmd response: failed
3,940,092 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,940,544 UART: ROM Non-Fatal Error: 0x000B001E
3,941,370 UART: [state] Locking Datavault
3,942,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,942,712 UART: [state] Locking ICCM
3,943,294 UART: [exit] Launching FMC @ 0x40000000
3,948,591 UART:
3,948,607 UART: Running Caliptra FMC ...
3,949,015 UART:
3,949,237 UART: [fmc] Received command: 0x1000000C
3,949,972 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 ready_for_fw is high
1,056,537 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,014 >>> mbox cmd response: success
2,648,537 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,654,352 UART:
2,654,368 UART: Running Caliptra FMC ...
2,654,776 UART:
2,655,006 UART: [fmc] Received command: 0x46574C44
3,644,152 >>> mbox cmd response: failed
3,644,152 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,715 UART:
3,649,731 UART: Running Caliptra FMC ...
3,650,139 UART:
3,650,361 UART: [fmc] Received command: 0x1000000C
3,651,096 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,199,141 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,569 UART: [fwproc] Recv command 0x46574c44
1,282,302 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,714 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,451 >>> mbox cmd response: success
2,742,648 UART: [afmc] ++
2,742,816 UART: [afmc] CDI.KEYID = 6
2,743,179 UART: [afmc] SUBJECT.KEYID = 7
2,743,605 UART: [afmc] AUTHORITY.KEYID = 5
2,779,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,627 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,342 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,234 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,946 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,841 UART: [afmc] --
2,822,909 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,822,931 UART: [cold-reset] --
2,823,593 UART: [state] Locking Datavault
2,824,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,374 UART: [state] Locking ICCM
2,825,958 UART: [exit] Launching FMC @ 0x40000000
2,831,255 UART:
2,831,271 UART: Running Caliptra FMC ...
2,831,679 UART:
2,831,909 UART: [fmc] Received command: 0x46574C44
2,832,735 UART:
2,832,751 UART: Running Caliptra ROM ...
2,833,159 UART:
2,833,214 UART: [state] CFI Enabled
2,835,814 UART: [state] LifecycleState = Unprovisioned
2,836,469 UART: [state] DebugLocked = No
2,836,953 UART: [state] WD Timer not started. Device not locked for debugging
2,838,153 UART: [kat] SHA2-256
3,641,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,832 UART: [kat] ++
3,645,984 UART: [kat] sha1
3,650,198 UART: [kat] SHA2-256
3,652,138 UART: [kat] SHA2-384
3,654,767 UART: [kat] SHA2-512-ACC
3,656,667 UART: [kat] ECC-384
3,665,990 UART: [kat] HMAC-384Kdf
3,670,534 UART: [kat] LMS
3,918,846 UART: [kat] --
3,919,528 UART: [update-reset] ++
3,936,410 >>> mbox cmd response: failed
3,936,410 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,898 UART: ROM Non-Fatal Error: 0x000B001E
3,937,822 UART: [state] Locking Datavault
3,938,516 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,120 UART: [state] Locking ICCM
3,939,600 UART: [exit] Launching FMC @ 0x40000000
3,944,897 UART:
3,944,913 UART: Running Caliptra FMC ...
3,945,321 UART:
3,945,543 UART: [fmc] Received command: 0x1000000C
3,946,278 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,202 ready_for_fw is high
1,056,202 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,589,863 >>> mbox cmd response: success
2,645,886 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,652,243 UART:
2,652,259 UART: Running Caliptra FMC ...
2,652,667 UART:
2,652,897 UART: [fmc] Received command: 0x46574C44
3,642,266 >>> mbox cmd response: failed
3,642,266 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,011 UART:
3,648,027 UART: Running Caliptra FMC ...
3,648,435 UART:
3,648,657 UART: [fmc] Received command: 0x1000000C
3,649,392 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
892,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,132 UART: [kat] ++
896,284 UART: [kat] sha1
900,684 UART: [kat] SHA2-256
902,624 UART: [kat] SHA2-384
905,243 UART: [kat] SHA2-512-ACC
907,144 UART: [kat] ECC-384
916,803 UART: [kat] HMAC-384Kdf
921,567 UART: [kat] LMS
1,169,879 UART: [kat] --
1,170,990 UART: [cold-reset] ++
1,171,500 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,175,248 ready_for_fw is high
1,175,248 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,098 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,118 UART: [ldev] AUTHORITY.KEYID = 7
1,211,581 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,243,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,631 UART: [fwproc] Wait for Commands...
1,283,428 UART: [fwproc] Recv command 0x46574c44
1,284,161 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,547 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,172 >>> mbox cmd response: success
2,742,215 UART: [afmc] ++
2,742,383 UART: [afmc] CDI.KEYID = 6
2,742,746 UART: [afmc] SUBJECT.KEYID = 7
2,743,172 UART: [afmc] AUTHORITY.KEYID = 5
2,778,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,248 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,963 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,855 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,567 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,486 UART: [afmc] --
2,822,450 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,822,472 UART: [cold-reset] --
2,823,336 UART: [state] Locking Datavault
2,824,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,197 UART: [state] Locking ICCM
2,825,725 UART: [exit] Launching FMC @ 0x40000000
2,831,022 UART:
2,831,038 UART: Running Caliptra FMC ...
2,831,446 UART:
2,831,676 UART: [fmc] Received command: 0x46574C44
2,832,502 UART:
2,832,518 UART: Running Caliptra ROM ...
2,832,926 UART:
2,833,068 UART: [state] CFI Enabled
2,835,836 UART: [state] LifecycleState = Unprovisioned
2,836,491 UART: [state] DebugLocked = No
2,837,017 UART: [state] WD Timer not started. Device not locked for debugging
2,838,319 UART: [kat] SHA2-256
3,641,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,998 UART: [kat] ++
3,646,150 UART: [kat] sha1
3,650,306 UART: [kat] SHA2-256
3,652,246 UART: [kat] SHA2-384
3,654,983 UART: [kat] SHA2-512-ACC
3,656,883 UART: [kat] ECC-384
3,666,762 UART: [kat] HMAC-384Kdf
3,671,462 UART: [kat] LMS
3,919,774 UART: [kat] --
3,920,540 UART: [update-reset] ++
3,937,090 >>> mbox cmd response: failed
3,937,090 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,714 UART: ROM Non-Fatal Error: 0x000B001E
3,938,690 UART: [state] Locking Datavault
3,939,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,092 UART: [state] Locking ICCM
3,940,528 UART: [exit] Launching FMC @ 0x40000000
3,945,825 UART:
3,945,841 UART: Running Caliptra FMC ...
3,946,249 UART:
3,946,471 UART: [fmc] Received command: 0x1000000C
3,947,206 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,151 ready_for_fw is high
1,057,151 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,786 >>> mbox cmd response: success
2,651,367 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,657,472 UART:
2,657,488 UART: Running Caliptra FMC ...
2,657,896 UART:
2,658,126 UART: [fmc] Received command: 0x46574C44
3,647,780 >>> mbox cmd response: failed
3,647,780 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,653,703 UART:
3,653,719 UART: Running Caliptra FMC ...
3,654,127 UART:
3,654,349 UART: [fmc] Received command: 0x1000000C
3,655,084 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 ready_for_fw is high
1,174,437 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,199,217 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,243,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,002 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,201 UART: [fwproc] Recv command 0x46574c44
1,283,934 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,520 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,087 >>> mbox cmd response: success
2,744,278 UART: [afmc] ++
2,744,446 UART: [afmc] CDI.KEYID = 6
2,744,809 UART: [afmc] SUBJECT.KEYID = 7
2,745,235 UART: [afmc] AUTHORITY.KEYID = 5
2,781,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,313 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,804,028 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,920 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,815,632 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,823,525 UART: [afmc] --
2,824,609 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,824,631 UART: [cold-reset] --
2,825,401 UART: [state] Locking Datavault
2,826,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,320 UART: [state] Locking ICCM
2,827,990 UART: [exit] Launching FMC @ 0x40000000
2,833,287 UART:
2,833,303 UART: Running Caliptra FMC ...
2,833,711 UART:
2,833,941 UART: [fmc] Received command: 0x46574C44
2,834,767 UART:
2,834,783 UART: Running Caliptra ROM ...
2,835,191 UART:
2,835,246 UART: [state] CFI Enabled
2,837,708 UART: [state] LifecycleState = Unprovisioned
2,838,363 UART: [state] DebugLocked = No
2,839,079 UART: [state] WD Timer not started. Device not locked for debugging
2,840,229 UART: [kat] SHA2-256
3,643,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,908 UART: [kat] ++
3,648,060 UART: [kat] sha1
3,652,178 UART: [kat] SHA2-256
3,654,118 UART: [kat] SHA2-384
3,656,725 UART: [kat] SHA2-512-ACC
3,658,625 UART: [kat] ECC-384
3,667,830 UART: [kat] HMAC-384Kdf
3,672,190 UART: [kat] LMS
3,920,502 UART: [kat] --
3,921,344 UART: [update-reset] ++
3,938,090 >>> mbox cmd response: failed
3,938,090 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,556 UART: ROM Non-Fatal Error: 0x000B001E
3,939,524 UART: [state] Locking Datavault
3,940,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,910 UART: [state] Locking ICCM
3,941,562 UART: [exit] Launching FMC @ 0x40000000
3,946,859 UART:
3,946,875 UART: Running Caliptra FMC ...
3,947,283 UART:
3,947,505 UART: [fmc] Received command: 0x1000000C
3,948,240 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,754 ready_for_fw is high
1,055,754 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,589,900 >>> mbox cmd response: success
2,646,677 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,652,740 UART:
2,652,756 UART: Running Caliptra FMC ...
2,653,164 UART:
2,653,394 UART: [fmc] Received command: 0x46574C44
3,642,499 >>> mbox cmd response: failed
3,642,499 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,006 UART:
3,648,022 UART: Running Caliptra FMC ...
3,648,430 UART:
3,648,652 UART: [fmc] Received command: 0x1000000C
3,649,387 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,174,086 ready_for_fw is high
1,174,086 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,448 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,602 UART: [idev] --
1,208,709 UART: [ldev] ++
1,208,877 UART: [ldev] CDI.KEYID = 6
1,209,241 UART: [ldev] SUBJECT.KEYID = 5
1,209,668 UART: [ldev] AUTHORITY.KEYID = 7
1,210,131 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,407 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,261 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,032 >>> mbox cmd response: success
2,744,069 UART: [afmc] ++
2,744,237 UART: [afmc] CDI.KEYID = 6
2,744,600 UART: [afmc] SUBJECT.KEYID = 7
2,745,026 UART: [afmc] AUTHORITY.KEYID = 5
2,779,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,926 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,641 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,533 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,245 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,844 UART: [afmc] --
2,822,746 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,822,768 UART: [cold-reset] --
2,823,684 UART: [state] Locking Datavault
2,825,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,683 UART: [state] Locking ICCM
2,826,355 UART: [exit] Launching FMC @ 0x40000000
2,831,652 UART:
2,831,668 UART: Running Caliptra FMC ...
2,832,076 UART:
2,832,306 UART: [fmc] Received command: 0x46574C44
2,833,132 UART:
2,833,148 UART: Running Caliptra ROM ...
2,833,556 UART:
2,833,698 UART: [state] CFI Enabled
2,836,306 UART: [state] LifecycleState = Unprovisioned
2,836,961 UART: [state] DebugLocked = No
2,837,599 UART: [state] WD Timer not started. Device not locked for debugging
2,838,809 UART: [kat] SHA2-256
3,642,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,488 UART: [kat] ++
3,646,640 UART: [kat] sha1
3,650,884 UART: [kat] SHA2-256
3,652,824 UART: [kat] SHA2-384
3,655,367 UART: [kat] SHA2-512-ACC
3,657,267 UART: [kat] ECC-384
3,666,726 UART: [kat] HMAC-384Kdf
3,671,356 UART: [kat] LMS
3,919,668 UART: [kat] --
3,920,448 UART: [update-reset] ++
3,937,260 >>> mbox cmd response: failed
3,937,260 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,662 UART: ROM Non-Fatal Error: 0x000B001E
3,938,512 UART: [state] Locking Datavault
3,939,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,914 UART: [state] Locking ICCM
3,940,402 UART: [exit] Launching FMC @ 0x40000000
3,945,699 UART:
3,945,715 UART: Running Caliptra FMC ...
3,946,123 UART:
3,946,345 UART: [fmc] Received command: 0x1000000C
3,947,080 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,237 ready_for_fw is high
1,056,237 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,348 >>> mbox cmd response: success
2,648,521 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,654,838 UART:
2,654,854 UART: Running Caliptra FMC ...
2,655,262 UART:
2,655,492 UART: [fmc] Received command: 0x46574C44
3,645,162 >>> mbox cmd response: failed
3,645,162 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,650,717 UART:
3,650,733 UART: Running Caliptra FMC ...
3,651,141 UART:
3,651,363 UART: [fmc] Received command: 0x1000000C
3,652,098 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,265 UART:
192,621 UART: Running Caliptra ROM ...
193,690 UART:
193,834 UART: [state] CFI Enabled
263,952 UART: [state] LifecycleState = Unprovisioned
266,359 UART: [state] DebugLocked = No
267,677 UART: [state] WD Timer not started. Device not locked for debugging
272,774 UART: [kat] SHA2-256
454,639 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,168 UART: [kat] ++
466,774 UART: [kat] sha1
478,149 UART: [kat] SHA2-256
481,151 UART: [kat] SHA2-384
485,866 UART: [kat] SHA2-512-ACC
488,518 UART: [kat] ECC-384
3,775,834 UART: [kat] HMAC-384Kdf
3,803,658 UART: [kat] LMS
4,876,767 UART: [kat] --
4,882,842 UART: [cold-reset] ++
4,885,562 UART: [fht] FHT @ 0x50003400
4,896,889 UART: [idev] ++
4,897,559 UART: [idev] CDI.KEYID = 6
4,898,852 UART: [idev] SUBJECT.KEYID = 7
4,900,011 UART: [idev] UDS.KEYID = 0
4,900,947 ready_for_fw is high
4,901,157 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,041,749 UART: [idev] Erasing UDS.KEYID = 0
8,248,523 UART: [idev] Sha1 KeyId Algorithm
8,270,840 UART: [idev] --
8,274,731 UART: [ldev] ++
8,275,302 UART: [ldev] CDI.KEYID = 6
8,276,535 UART: [ldev] SUBJECT.KEYID = 5
8,277,643 UART: [ldev] AUTHORITY.KEYID = 7
8,278,870 UART: [ldev] FE.KEYID = 1
8,319,636 UART: [ldev] Erasing FE.KEYID = 1
11,655,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,060 UART: [ldev] --
14,041,032 UART: [fwproc] Wait for Commands...
14,043,722 UART: [fwproc] Recv command 0x46574c44
14,046,038 UART: [fwproc] Recv'd Img size: 111688 bytes
22,509,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,588,130 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,648,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,965,889 >>> mbox cmd response: success
22,969,195 UART: [afmc] ++
22,969,922 UART: [afmc] CDI.KEYID = 6
22,971,042 UART: [afmc] SUBJECT.KEYID = 7
22,972,261 UART: [afmc] AUTHORITY.KEYID = 5
26,331,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,632,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,634,186 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,650,315 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,666,365 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,682,328 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,705,703 UART: [afmc] --
28,711,526 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,852,191 UART: [cold-reset] --
28,853,046 UART: [state] Locking Datavault
28,854,200 UART: [state] Locking PCR0, PCR1 and PCR31
28,855,736 UART: [state] Locking ICCM
28,856,645 UART: [exit] Launching FMC @ 0x40000000
28,858,069 UART:
28,858,233 UART: Running Caliptra FMC ...
28,859,327 UART:
28,859,481 UART: [fmc] Received command: 0x46574C44
28,860,860 UART:
28,861,004 UART: Running Caliptra ROM ...
28,862,037 UART:
28,862,188 UART: [state] CFI Enabled
28,928,343 UART: [state] LifecycleState = Unprovisioned
28,930,222 UART: [state] DebugLocked = No
28,931,902 UART: [state] WD Timer not started. Device not locked for debugging
28,936,239 UART: [kat] SHA2-256
29,118,152 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,129,714 UART: [kat] ++
29,130,169 UART: [kat] sha1
29,141,919 UART: [kat] SHA2-256
29,144,930 UART: [kat] SHA2-384
29,150,369 UART: [kat] SHA2-512-ACC
29,152,933 UART: [kat] ECC-384
32,436,136 UART: [kat] HMAC-384Kdf
32,465,154 UART: [kat] LMS
33,538,304 UART: [kat] --
33,541,900 UART: [update-reset] ++
33,591,252 >>> mbox cmd response: failed
33,591,680 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,592,660 UART: ROM Non-Fatal Error: 0x000B003D
33,594,954 UART: [state] Locking Datavault
33,599,067 UART: [state] Locking PCR0, PCR1 and PCR31
33,601,249 UART: [state] Locking ICCM
33,603,989 UART: [exit] Launching FMC @ 0x40000000
33,612,650 UART:
33,612,886 UART: Running Caliptra FMC ...
33,613,985 UART:
33,614,142 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,615,775 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
4,773,903 ready_for_fw is high
4,774,525 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,295,947 >>> mbox cmd response: success
27,980,728 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,121,566 UART:
28,121,958 UART: Running Caliptra FMC ...
28,123,142 UART:
28,123,313 UART: [fmc] Received command: 0x46574C44
32,771,675 >>> mbox cmd response: failed
32,772,176 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,784,503 UART:
32,784,764 UART: Running Caliptra FMC ...
32,785,951 UART:
32,786,111 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,787,747 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,356 UART:
192,736 UART: Running Caliptra ROM ...
193,809 UART:
603,354 UART: [state] CFI Enabled
615,766 UART: [state] LifecycleState = Unprovisioned
617,807 UART: [state] DebugLocked = No
620,245 UART: [state] WD Timer not started. Device not locked for debugging
624,253 UART: [kat] SHA2-256
806,243 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,822 UART: [kat] ++
818,453 UART: [kat] sha1
828,328 UART: [kat] SHA2-256
831,349 UART: [kat] SHA2-384
836,132 UART: [kat] SHA2-512-ACC
838,707 UART: [kat] ECC-384
4,096,262 UART: [kat] HMAC-384Kdf
4,107,321 UART: [kat] LMS
5,180,427 UART: [kat] --
5,184,843 UART: [cold-reset] ++
5,186,139 UART: [fht] FHT @ 0x50003400
5,196,262 UART: [idev] ++
5,196,981 UART: [idev] CDI.KEYID = 6
5,198,154 UART: [idev] SUBJECT.KEYID = 7
5,199,608 UART: [idev] UDS.KEYID = 0
5,200,864 ready_for_fw is high
5,201,079 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,341,454 UART: [idev] Erasing UDS.KEYID = 0
8,486,910 UART: [idev] Sha1 KeyId Algorithm
8,509,414 UART: [idev] --
8,512,251 UART: [ldev] ++
8,512,823 UART: [ldev] CDI.KEYID = 6
8,514,055 UART: [ldev] SUBJECT.KEYID = 5
8,515,405 UART: [ldev] AUTHORITY.KEYID = 7
8,517,055 UART: [ldev] FE.KEYID = 1
8,527,186 UART: [ldev] Erasing FE.KEYID = 1
11,819,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,822 UART: [ldev] --
14,184,043 UART: [fwproc] Wait for Commands...
14,186,255 UART: [fwproc] Recv command 0x46574c44
14,188,559 UART: [fwproc] Recv'd Img size: 111688 bytes
22,004,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,082,309 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,142,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,459,390 >>> mbox cmd response: success
22,463,221 UART: [afmc] ++
22,463,941 UART: [afmc] CDI.KEYID = 6
22,465,177 UART: [afmc] SUBJECT.KEYID = 7
22,466,324 UART: [afmc] AUTHORITY.KEYID = 5
25,782,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,077,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,079,641 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,095,734 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,111,798 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,127,773 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,151,562 UART: [afmc] --
28,156,998 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,297,754 UART: [cold-reset] --
28,298,616 UART: [state] Locking Datavault
28,299,765 UART: [state] Locking PCR0, PCR1 and PCR31
28,301,294 UART: [state] Locking ICCM
28,302,197 UART: [exit] Launching FMC @ 0x40000000
28,303,613 UART:
28,303,763 UART: Running Caliptra FMC ...
28,304,849 UART:
28,304,993 UART: [fmc] Received command: 0x46574C44
28,306,460 UART:
28,306,607 UART: Running Caliptra ROM ...
28,307,690 UART:
28,307,835 UART: [state] CFI Enabled
28,316,627 UART: [state] LifecycleState = Unprovisioned
28,318,451 UART: [state] DebugLocked = No
28,320,471 UART: [state] WD Timer not started. Device not locked for debugging
28,325,406 UART: [kat] SHA2-256
28,507,353 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
28,518,887 UART: [kat] ++
28,519,422 UART: [kat] sha1
28,530,309 UART: [kat] SHA2-256
28,533,318 UART: [kat] SHA2-384
28,537,674 UART: [kat] SHA2-512-ACC
28,540,231 UART: [kat] ECC-384
31,795,755 UART: [kat] HMAC-384Kdf
31,806,989 UART: [kat] LMS
32,880,106 UART: [kat] --
32,884,971 UART: [update-reset] ++
32,930,764 >>> mbox cmd response: failed
32,931,182 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,932,168 UART: ROM Non-Fatal Error: 0x000B003D
32,935,647 UART: [state] Locking Datavault
32,939,443 UART: [state] Locking PCR0, PCR1 and PCR31
32,941,627 UART: [state] Locking ICCM
32,943,498 UART: [exit] Launching FMC @ 0x40000000
32,952,165 UART:
32,952,391 UART: Running Caliptra FMC ...
32,953,485 UART:
32,953,630 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,955,247 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
5,100,934 ready_for_fw is high
5,101,532 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,247,696 >>> mbox cmd response: success
27,875,782 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,016,582 UART:
28,016,971 UART: Running Caliptra FMC ...
28,018,072 UART:
28,018,222 UART: [fmc] Received command: 0x46574C44
32,557,204 >>> mbox cmd response: failed
32,557,676 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,571,072 UART:
32,571,325 UART: Running Caliptra FMC ...
32,572,415 UART:
32,572,556 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,574,195 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,128 UART:
192,494 UART: Running Caliptra ROM ...
193,771 UART:
193,926 UART: [state] CFI Enabled
261,126 UART: [state] LifecycleState = Unprovisioned
262,980 UART: [state] DebugLocked = No
265,012 UART: [state] WD Timer not started. Device not locked for debugging
269,178 UART: [kat] SHA2-256
448,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,877 UART: [kat] ++
460,429 UART: [kat] sha1
470,892 UART: [kat] SHA2-256
473,898 UART: [kat] SHA2-384
480,740 UART: [kat] SHA2-512-ACC
483,683 UART: [kat] ECC-384
2,946,600 UART: [kat] HMAC-384Kdf
2,971,207 UART: [kat] LMS
3,500,660 UART: [kat] --
3,506,810 UART: [cold-reset] ++
3,508,103 UART: [fht] FHT @ 0x50003400
3,519,249 UART: [idev] ++
3,519,812 UART: [idev] CDI.KEYID = 6
3,520,695 UART: [idev] SUBJECT.KEYID = 7
3,521,942 UART: [idev] UDS.KEYID = 0
3,522,867 ready_for_fw is high
3,523,052 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,663,992 UART: [idev] Erasing UDS.KEYID = 0
6,025,959 UART: [idev] Sha1 KeyId Algorithm
6,048,155 UART: [idev] --
6,052,450 UART: [ldev] ++
6,053,050 UART: [ldev] CDI.KEYID = 6
6,053,973 UART: [ldev] SUBJECT.KEYID = 5
6,055,022 UART: [ldev] AUTHORITY.KEYID = 7
6,056,372 UART: [ldev] FE.KEYID = 1
6,100,057 UART: [ldev] Erasing FE.KEYID = 1
8,601,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,503 UART: [ldev] --
10,393,273 UART: [fwproc] Wait for Commands...
10,395,982 UART: [fwproc] Recv command 0x46574c44
10,398,080 UART: [fwproc] Recv'd Img size: 112032 bytes
14,910,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,993,004 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,053,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,371,105 >>> mbox cmd response: success
15,375,319 UART: [afmc] ++
15,375,928 UART: [afmc] CDI.KEYID = 6
15,376,820 UART: [afmc] SUBJECT.KEYID = 7
15,377,919 UART: [afmc] AUTHORITY.KEYID = 5
17,913,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,637,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,639,101 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,655,116 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,671,106 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,686,856 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,710,932 UART: [afmc] --
19,715,456 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,856,655 UART: [cold-reset] --
19,857,521 UART: [state] Locking Datavault
19,858,680 UART: [state] Locking PCR0, PCR1 and PCR31
19,860,217 UART: [state] Locking ICCM
19,861,100 UART: [exit] Launching FMC @ 0x40000000
19,862,440 UART:
19,862,586 UART: Running Caliptra FMC ...
19,863,692 UART:
19,863,846 UART: [fmc] Received command: 0x46574C44
19,865,218 UART:
19,865,363 UART: Running Caliptra ROM ...
19,866,404 UART:
19,866,549 UART: [state] CFI Enabled
19,925,271 UART: [state] LifecycleState = Unprovisioned
19,927,169 UART: [state] DebugLocked = No
19,929,667 UART: [state] WD Timer not started. Device not locked for debugging
19,933,136 UART: [kat] SHA2-256
20,112,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,123,850 UART: [kat] ++
20,124,398 UART: [kat] sha1
20,134,374 UART: [kat] SHA2-256
20,137,385 UART: [kat] SHA2-384
20,143,429 UART: [kat] SHA2-512-ACC
20,146,367 UART: [kat] ECC-384
22,608,685 UART: [kat] HMAC-384Kdf
22,630,804 UART: [kat] LMS
23,160,279 UART: [kat] --
23,162,927 UART: [update-reset] ++
23,218,705 >>> mbox cmd response: failed
23,219,118 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,221,737 UART: ROM Non-Fatal Error: 0x000B003D
23,225,339 UART: [state] Locking Datavault
23,227,568 UART: [state] Locking PCR0, PCR1 and PCR31
23,229,213 UART: [state] Locking ICCM
23,230,989 UART: [exit] Launching FMC @ 0x40000000
23,239,389 UART:
23,239,625 UART: Running Caliptra FMC ...
23,240,730 UART:
23,240,888 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,242,532 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,322 writing to cptra_bootfsm_go
3,384,156 ready_for_fw is high
3,384,593 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,009,357 >>> mbox cmd response: success
19,294,606 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,435,717 UART:
19,436,101 UART: Running Caliptra FMC ...
19,437,284 UART:
19,437,455 UART: [fmc] Received command: 0x46574C44
22,647,253 >>> mbox cmd response: failed
22,647,790 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,661,641 UART:
22,661,911 UART: Running Caliptra FMC ...
22,663,144 UART:
22,663,308 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,664,949 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,341 UART:
192,707 UART: Running Caliptra ROM ...
193,817 UART:
603,449 UART: [state] CFI Enabled
616,327 UART: [state] LifecycleState = Unprovisioned
618,194 UART: [state] DebugLocked = No
621,135 UART: [state] WD Timer not started. Device not locked for debugging
624,514 UART: [kat] SHA2-256
803,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,225 UART: [kat] ++
815,784 UART: [kat] sha1
826,595 UART: [kat] SHA2-256
829,665 UART: [kat] SHA2-384
836,155 UART: [kat] SHA2-512-ACC
839,086 UART: [kat] ECC-384
3,278,078 UART: [kat] HMAC-384Kdf
3,289,321 UART: [kat] LMS
3,818,822 UART: [kat] --
3,823,522 UART: [cold-reset] ++
3,825,097 UART: [fht] FHT @ 0x50003400
3,835,293 UART: [idev] ++
3,835,860 UART: [idev] CDI.KEYID = 6
3,836,841 UART: [idev] SUBJECT.KEYID = 7
3,838,014 UART: [idev] UDS.KEYID = 0
3,838,938 ready_for_fw is high
3,839,144 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,980,263 UART: [idev] Erasing UDS.KEYID = 0
6,307,581 UART: [idev] Sha1 KeyId Algorithm
6,329,776 UART: [idev] --
6,333,602 UART: [ldev] ++
6,334,169 UART: [ldev] CDI.KEYID = 6
6,335,242 UART: [ldev] SUBJECT.KEYID = 5
6,336,303 UART: [ldev] AUTHORITY.KEYID = 7
6,337,545 UART: [ldev] FE.KEYID = 1
6,348,945 UART: [ldev] Erasing FE.KEYID = 1
8,823,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,301 UART: [ldev] --
10,612,987 UART: [fwproc] Wait for Commands...
10,615,191 UART: [fwproc] Recv command 0x46574c44
10,617,286 UART: [fwproc] Recv'd Img size: 112032 bytes
15,152,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,231,946 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,292,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,610,131 >>> mbox cmd response: success
15,614,040 UART: [afmc] ++
15,614,843 UART: [afmc] CDI.KEYID = 6
15,615,750 UART: [afmc] SUBJECT.KEYID = 7
15,616,869 UART: [afmc] AUTHORITY.KEYID = 5
18,109,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,831,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,833,493 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,849,467 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,865,459 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,881,241 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,903,787 UART: [afmc] --
19,907,792 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
20,048,918 UART: [cold-reset] --
20,049,782 UART: [state] Locking Datavault
20,050,941 UART: [state] Locking PCR0, PCR1 and PCR31
20,052,478 UART: [state] Locking ICCM
20,053,384 UART: [exit] Launching FMC @ 0x40000000
20,054,837 UART:
20,055,007 UART: Running Caliptra FMC ...
20,056,145 UART:
20,056,312 UART: [fmc] Received command: 0x46574C44
20,057,838 UART:
20,058,011 UART: Running Caliptra ROM ...
20,059,083 UART:
20,059,240 UART: [state] CFI Enabled
20,067,591 UART: [state] LifecycleState = Unprovisioned
20,069,467 UART: [state] DebugLocked = No
20,071,509 UART: [state] WD Timer not started. Device not locked for debugging
20,075,963 UART: [kat] SHA2-256
20,255,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,266,755 UART: [kat] ++
20,267,289 UART: [kat] sha1
20,277,260 UART: [kat] SHA2-256
20,280,279 UART: [kat] SHA2-384
20,285,340 UART: [kat] SHA2-512-ACC
20,288,277 UART: [kat] ECC-384
22,728,960 UART: [kat] HMAC-384Kdf
22,740,866 UART: [kat] LMS
23,270,387 UART: [kat] --
23,275,089 UART: [update-reset] ++
23,327,942 >>> mbox cmd response: failed
23,328,376 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,330,870 UART: ROM Non-Fatal Error: 0x000B003D
23,333,557 UART: [state] Locking Datavault
23,336,810 UART: [state] Locking PCR0, PCR1 and PCR31
23,338,451 UART: [state] Locking ICCM
23,340,113 UART: [exit] Launching FMC @ 0x40000000
23,348,509 UART:
23,348,739 UART: Running Caliptra FMC ...
23,349,832 UART:
23,349,986 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,351,612 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,698,307 ready_for_fw is high
3,698,736 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,233,669 >>> mbox cmd response: success
19,463,891 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,605,285 UART:
19,605,680 UART: Running Caliptra FMC ...
19,606,871 UART:
19,607,046 UART: [fmc] Received command: 0x46574C44
22,737,163 >>> mbox cmd response: failed
22,737,636 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,751,177 UART:
22,751,442 UART: Running Caliptra FMC ...
22,752,630 UART:
22,752,802 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,754,438 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,150 UART:
192,512 UART: Running Caliptra ROM ...
193,673 UART:
193,826 UART: [state] CFI Enabled
261,552 UART: [state] LifecycleState = Unprovisioned
263,472 UART: [state] DebugLocked = No
265,096 UART: [state] WD Timer not started. Device not locked for debugging
269,253 UART: [kat] SHA2-256
448,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,959 UART: [kat] ++
460,500 UART: [kat] sha1
470,999 UART: [kat] SHA2-256
474,055 UART: [kat] SHA2-384
480,487 UART: [kat] SHA2-512-ACC
483,422 UART: [kat] ECC-384
2,947,504 UART: [kat] HMAC-384Kdf
2,972,334 UART: [kat] LMS
3,501,822 UART: [kat] --
3,505,181 UART: [cold-reset] ++
3,506,779 UART: [fht] FHT @ 0x50003400
3,518,839 UART: [idev] ++
3,519,407 UART: [idev] CDI.KEYID = 6
3,520,325 UART: [idev] SUBJECT.KEYID = 7
3,521,499 UART: [idev] UDS.KEYID = 0
3,522,422 ready_for_fw is high
3,522,624 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,663,659 UART: [idev] Erasing UDS.KEYID = 0
6,028,359 UART: [idev] Sha1 KeyId Algorithm
6,050,778 UART: [idev] --
6,055,367 UART: [ldev] ++
6,055,940 UART: [ldev] CDI.KEYID = 6
6,056,829 UART: [ldev] SUBJECT.KEYID = 5
6,058,040 UART: [ldev] AUTHORITY.KEYID = 7
6,059,273 UART: [ldev] FE.KEYID = 1
6,102,000 UART: [ldev] Erasing FE.KEYID = 1
8,606,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,811 UART: [ldev] --
10,415,276 UART: [fwproc] Wait for Commands...
10,416,991 UART: [fwproc] Recv command 0x46574c44
10,419,085 UART: [fwproc] Recv'd Img size: 112032 bytes
14,975,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,057,238 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,117,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,435,781 >>> mbox cmd response: success
15,439,354 UART: [afmc] ++
15,439,978 UART: [afmc] CDI.KEYID = 6
15,440,896 UART: [afmc] SUBJECT.KEYID = 7
15,442,060 UART: [afmc] AUTHORITY.KEYID = 5
17,984,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,707,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,915 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,724,928 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,740,881 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,756,685 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,778,806 UART: [afmc] --
19,784,461 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,925,683 UART: [cold-reset] --
19,926,541 UART: [state] Locking Datavault
19,927,697 UART: [state] Locking PCR0, PCR1 and PCR31
19,929,233 UART: [state] Locking ICCM
19,930,138 UART: [exit] Launching FMC @ 0x40000000
19,931,557 UART:
19,931,714 UART: Running Caliptra FMC ...
19,932,812 UART:
19,932,984 UART: [fmc] Received command: 0x46574C44
19,934,443 UART:
19,934,598 UART: Running Caliptra ROM ...
19,935,696 UART:
19,935,850 UART: [state] CFI Enabled
20,001,042 UART: [state] LifecycleState = Unprovisioned
20,002,933 UART: [state] DebugLocked = No
20,005,889 UART: [state] WD Timer not started. Device not locked for debugging
20,008,822 UART: [kat] SHA2-256
20,187,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,199,523 UART: [kat] ++
20,200,063 UART: [kat] sha1
20,211,819 UART: [kat] SHA2-256
20,214,827 UART: [kat] SHA2-384
20,221,184 UART: [kat] SHA2-512-ACC
20,224,163 UART: [kat] ECC-384
22,686,229 UART: [kat] HMAC-384Kdf
22,708,360 UART: [kat] LMS
23,237,825 UART: [kat] --
23,240,951 UART: [update-reset] ++
23,298,345 >>> mbox cmd response: failed
23,298,759 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,299,515 UART: ROM Non-Fatal Error: 0x000B003D
23,302,727 UART: [state] Locking Datavault
23,305,817 UART: [state] Locking PCR0, PCR1 and PCR31
23,307,460 UART: [state] Locking ICCM
23,309,608 UART: [exit] Launching FMC @ 0x40000000
23,318,000 UART:
23,318,240 UART: Running Caliptra FMC ...
23,319,342 UART:
23,319,496 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,321,146 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,357,886 ready_for_fw is high
3,358,270 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,018,056 >>> mbox cmd response: success
19,285,591 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,426,867 UART:
19,427,248 UART: Running Caliptra FMC ...
19,428,433 UART:
19,428,599 UART: [fmc] Received command: 0x46574C44
22,638,317 >>> mbox cmd response: failed
22,638,794 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,651,653 UART:
22,651,910 UART: Running Caliptra FMC ...
22,653,004 UART:
22,653,158 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,654,817 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,530 UART:
192,891 UART: Running Caliptra ROM ...
194,056 UART:
603,564 UART: [state] CFI Enabled
613,913 UART: [state] LifecycleState = Unprovisioned
615,834 UART: [state] DebugLocked = No
618,360 UART: [state] WD Timer not started. Device not locked for debugging
621,884 UART: [kat] SHA2-256
801,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,580 UART: [kat] ++
813,133 UART: [kat] sha1
824,440 UART: [kat] SHA2-256
827,445 UART: [kat] SHA2-384
833,511 UART: [kat] SHA2-512-ACC
836,512 UART: [kat] ECC-384
3,276,601 UART: [kat] HMAC-384Kdf
3,289,253 UART: [kat] LMS
3,818,730 UART: [kat] --
3,823,406 UART: [cold-reset] ++
3,825,195 UART: [fht] FHT @ 0x50003400
3,836,237 UART: [idev] ++
3,836,793 UART: [idev] CDI.KEYID = 6
3,837,669 UART: [idev] SUBJECT.KEYID = 7
3,838,907 UART: [idev] UDS.KEYID = 0
3,839,989 ready_for_fw is high
3,840,204 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,981,095 UART: [idev] Erasing UDS.KEYID = 0
6,313,157 UART: [idev] Sha1 KeyId Algorithm
6,335,846 UART: [idev] --
6,340,217 UART: [ldev] ++
6,340,779 UART: [ldev] CDI.KEYID = 6
6,341,691 UART: [ldev] SUBJECT.KEYID = 5
6,342,901 UART: [ldev] AUTHORITY.KEYID = 7
6,344,127 UART: [ldev] FE.KEYID = 1
6,354,218 UART: [ldev] Erasing FE.KEYID = 1
8,826,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,045 UART: [ldev] --
10,618,469 UART: [fwproc] Wait for Commands...
10,620,566 UART: [fwproc] Recv command 0x46574c44
10,622,666 UART: [fwproc] Recv'd Img size: 112032 bytes
15,169,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,247,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,308,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,625,608 >>> mbox cmd response: success
15,630,068 UART: [afmc] ++
15,630,677 UART: [afmc] CDI.KEYID = 6
15,631,587 UART: [afmc] SUBJECT.KEYID = 7
15,632,747 UART: [afmc] AUTHORITY.KEYID = 5
18,130,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,851,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,853,823 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,869,833 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,885,815 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,901,603 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,925,275 UART: [afmc] --
19,930,613 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
20,071,799 UART: [cold-reset] --
20,072,809 UART: [state] Locking Datavault
20,073,919 UART: [state] Locking PCR0, PCR1 and PCR31
20,075,512 UART: [state] Locking ICCM
20,076,428 UART: [exit] Launching FMC @ 0x40000000
20,077,943 UART:
20,078,104 UART: Running Caliptra FMC ...
20,079,185 UART:
20,079,345 UART: [fmc] Received command: 0x46574C44
20,080,781 UART:
20,080,937 UART: Running Caliptra ROM ...
20,082,019 UART:
20,082,180 UART: [state] CFI Enabled
20,089,970 UART: [state] LifecycleState = Unprovisioned
20,091,872 UART: [state] DebugLocked = No
20,093,840 UART: [state] WD Timer not started. Device not locked for debugging
20,096,743 UART: [kat] SHA2-256
20,275,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,287,475 UART: [kat] ++
20,288,019 UART: [kat] sha1
20,299,350 UART: [kat] SHA2-256
20,302,401 UART: [kat] SHA2-384
20,309,519 UART: [kat] SHA2-512-ACC
20,312,463 UART: [kat] ECC-384
22,749,142 UART: [kat] HMAC-384Kdf
22,762,009 UART: [kat] LMS
23,291,514 UART: [kat] --
23,295,880 UART: [update-reset] ++
23,349,055 >>> mbox cmd response: failed
23,349,483 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,350,426 UART: ROM Non-Fatal Error: 0x000B003D
23,353,973 UART: [state] Locking Datavault
23,355,765 UART: [state] Locking PCR0, PCR1 and PCR31
23,357,333 UART: [state] Locking ICCM
23,359,962 UART: [exit] Launching FMC @ 0x40000000
23,368,357 UART:
23,368,587 UART: Running Caliptra FMC ...
23,369,680 UART:
23,369,833 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,371,454 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,694,255 ready_for_fw is high
3,694,689 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,217,586 >>> mbox cmd response: success
19,456,970 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,598,248 UART:
19,598,626 UART: Running Caliptra FMC ...
19,599,833 UART:
19,600,003 UART: [fmc] Received command: 0x46574C44
22,733,965 >>> mbox cmd response: failed
22,734,425 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,746,971 UART:
22,747,228 UART: Running Caliptra FMC ...
22,748,413 UART:
22,748,572 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,750,211 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,294 UART: [kat] HMAC-384Kdf
919,758 UART: [kat] LMS
1,168,070 UART: [kat] --
1,168,747 UART: [cold-reset] ++
1,169,313 UART: [fht] FHT @ 0x50003400
1,171,891 UART: [idev] ++
1,172,059 UART: [idev] CDI.KEYID = 6
1,172,420 UART: [idev] SUBJECT.KEYID = 7
1,172,845 UART: [idev] UDS.KEYID = 0
1,173,191 ready_for_fw is high
1,173,191 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,180,643 UART: [idev] Erasing UDS.KEYID = 0
1,197,945 UART: [idev] Sha1 KeyId Algorithm
1,206,841 UART: [idev] --
1,207,792 UART: [ldev] ++
1,207,960 UART: [ldev] CDI.KEYID = 6
1,208,324 UART: [ldev] SUBJECT.KEYID = 5
1,208,751 UART: [ldev] AUTHORITY.KEYID = 7
1,209,214 UART: [ldev] FE.KEYID = 1
1,214,450 UART: [ldev] Erasing FE.KEYID = 1
1,240,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,734 UART: [ldev] --
1,280,060 UART: [fwproc] Wait for Commands...
1,280,645 UART: [fwproc] Recv command 0x46574c44
1,281,378 UART: [fwproc] Recv'd Img size: 112032 bytes
3,089,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,117,187 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,142,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,278,806 >>> mbox cmd response: success
3,279,995 UART: [afmc] ++
3,280,163 UART: [afmc] CDI.KEYID = 6
3,280,526 UART: [afmc] SUBJECT.KEYID = 7
3,280,952 UART: [afmc] AUTHORITY.KEYID = 5
3,316,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,332,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,516 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,339,227 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,345,114 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,350,812 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,358,703 UART: [afmc] --
3,359,771 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,359,793 UART: [cold-reset] --
3,360,765 UART: [state] Locking Datavault
3,361,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,522 UART: [state] Locking ICCM
3,363,148 UART: [exit] Launching FMC @ 0x40000000
3,368,445 UART:
3,368,461 UART: Running Caliptra FMC ...
3,368,869 UART:
3,369,099 UART: [fmc] Received command: 0x46574C44
3,369,925 UART:
3,369,941 UART: Running Caliptra ROM ...
3,370,349 UART:
3,370,404 UART: [state] CFI Enabled
3,372,904 UART: [state] LifecycleState = Unprovisioned
3,373,559 UART: [state] DebugLocked = No
3,374,113 UART: [state] WD Timer not started. Device not locked for debugging
3,375,267 UART: [kat] SHA2-256
4,178,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,182,946 UART: [kat] ++
4,183,098 UART: [kat] sha1
4,187,292 UART: [kat] SHA2-256
4,189,232 UART: [kat] SHA2-384
4,192,067 UART: [kat] SHA2-512-ACC
4,193,967 UART: [kat] ECC-384
4,203,826 UART: [kat] HMAC-384Kdf
4,208,408 UART: [kat] LMS
4,456,720 UART: [kat] --
4,457,780 UART: [update-reset] ++
4,475,744 >>> mbox cmd response: failed
4,475,744 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,094 UART: ROM Non-Fatal Error: 0x000B003D
4,477,018 UART: [state] Locking Datavault
4,477,658 UART: [state] Locking PCR0, PCR1 and PCR31
4,478,262 UART: [state] Locking ICCM
4,478,904 UART: [exit] Launching FMC @ 0x40000000
4,484,201 UART:
4,484,217 UART: Running Caliptra FMC ...
4,484,625 UART:
4,484,847 UART: [fmc] Received command: 0x1000000C
4,485,582 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,350 ready_for_fw is high
1,055,350 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,134,842 >>> mbox cmd response: success
3,190,253 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,196,296 UART:
3,196,312 UART: Running Caliptra FMC ...
3,196,720 UART:
3,196,950 UART: [fmc] Received command: 0x46574C44
4,186,447 >>> mbox cmd response: failed
4,186,447 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,292 UART:
4,192,308 UART: Running Caliptra FMC ...
4,192,716 UART:
4,192,938 UART: [fmc] Received command: 0x1000000C
4,193,673 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 ready_for_fw is high
1,174,506 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,200,114 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,665 UART: [ldev] SUBJECT.KEYID = 5
1,211,092 UART: [ldev] AUTHORITY.KEYID = 7
1,211,555 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 112032 bytes
3,099,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,127,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,289,584 >>> mbox cmd response: success
3,290,747 UART: [afmc] ++
3,290,915 UART: [afmc] CDI.KEYID = 6
3,291,278 UART: [afmc] SUBJECT.KEYID = 7
3,291,704 UART: [afmc] AUTHORITY.KEYID = 5
3,327,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,650 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,350,361 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,356,248 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,361,946 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,673 UART: [afmc] --
3,370,577 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,370,599 UART: [cold-reset] --
3,371,395 UART: [state] Locking Datavault
3,372,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,182 UART: [state] Locking ICCM
3,373,846 UART: [exit] Launching FMC @ 0x40000000
3,379,143 UART:
3,379,159 UART: Running Caliptra FMC ...
3,379,567 UART:
3,379,797 UART: [fmc] Received command: 0x46574C44
3,380,623 UART:
3,380,639 UART: Running Caliptra ROM ...
3,381,047 UART:
3,381,189 UART: [state] CFI Enabled
3,384,279 UART: [state] LifecycleState = Unprovisioned
3,384,934 UART: [state] DebugLocked = No
3,385,474 UART: [state] WD Timer not started. Device not locked for debugging
3,386,612 UART: [kat] SHA2-256
4,190,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,194,291 UART: [kat] ++
4,194,443 UART: [kat] sha1
4,198,673 UART: [kat] SHA2-256
4,200,613 UART: [kat] SHA2-384
4,203,550 UART: [kat] SHA2-512-ACC
4,205,450 UART: [kat] ECC-384
4,215,097 UART: [kat] HMAC-384Kdf
4,219,645 UART: [kat] LMS
4,467,957 UART: [kat] --
4,468,767 UART: [update-reset] ++
4,486,459 >>> mbox cmd response: failed
4,486,459 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,486,795 UART: ROM Non-Fatal Error: 0x000B003D
4,487,565 UART: [state] Locking Datavault
4,488,359 UART: [state] Locking PCR0, PCR1 and PCR31
4,488,963 UART: [state] Locking ICCM
4,489,637 UART: [exit] Launching FMC @ 0x40000000
4,494,934 UART:
4,494,950 UART: Running Caliptra FMC ...
4,495,358 UART:
4,495,580 UART: [fmc] Received command: 0x1000000C
4,496,315 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,729 ready_for_fw is high
1,055,729 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,131,505 >>> mbox cmd response: success
3,187,234 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,193,241 UART:
3,193,257 UART: Running Caliptra FMC ...
3,193,665 UART:
3,193,895 UART: [fmc] Received command: 0x46574C44
4,184,567 >>> mbox cmd response: failed
4,184,567 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,190,438 UART:
4,190,454 UART: Running Caliptra FMC ...
4,190,862 UART:
4,191,084 UART: [fmc] Received command: 0x1000000C
4,191,819 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,759 UART: [kat] ++
895,911 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,832 UART: [kat] SHA2-512-ACC
906,733 UART: [kat] ECC-384
916,348 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 ready_for_fw is high
1,174,103 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,034 UART: [fwproc] Wait for Commands...
1,281,637 UART: [fwproc] Recv command 0x46574c44
1,282,370 UART: [fwproc] Recv'd Img size: 112032 bytes
3,105,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,132,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,158,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,294,576 >>> mbox cmd response: success
3,295,721 UART: [afmc] ++
3,295,889 UART: [afmc] CDI.KEYID = 6
3,296,252 UART: [afmc] SUBJECT.KEYID = 7
3,296,678 UART: [afmc] AUTHORITY.KEYID = 5
3,332,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,348,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,349,534 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,355,245 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,361,132 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,366,830 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,374,751 UART: [afmc] --
3,375,607 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,375,629 UART: [cold-reset] --
3,376,469 UART: [state] Locking Datavault
3,377,706 UART: [state] Locking PCR0, PCR1 and PCR31
3,378,310 UART: [state] Locking ICCM
3,378,788 UART: [exit] Launching FMC @ 0x40000000
3,384,085 UART:
3,384,101 UART: Running Caliptra FMC ...
3,384,509 UART:
3,384,739 UART: [fmc] Received command: 0x46574C44
3,385,565 UART:
3,385,581 UART: Running Caliptra ROM ...
3,385,989 UART:
3,386,044 UART: [state] CFI Enabled
3,389,042 UART: [state] LifecycleState = Unprovisioned
3,389,697 UART: [state] DebugLocked = No
3,390,363 UART: [state] WD Timer not started. Device not locked for debugging
3,391,527 UART: [kat] SHA2-256
4,195,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,199,206 UART: [kat] ++
4,199,358 UART: [kat] sha1
4,203,736 UART: [kat] SHA2-256
4,205,676 UART: [kat] SHA2-384
4,208,531 UART: [kat] SHA2-512-ACC
4,210,431 UART: [kat] ECC-384
4,220,222 UART: [kat] HMAC-384Kdf
4,224,670 UART: [kat] LMS
4,472,982 UART: [kat] --
4,474,186 UART: [update-reset] ++
4,491,640 >>> mbox cmd response: failed
4,491,640 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,492,042 UART: ROM Non-Fatal Error: 0x000B003D
4,492,814 UART: [state] Locking Datavault
4,493,634 UART: [state] Locking PCR0, PCR1 and PCR31
4,494,238 UART: [state] Locking ICCM
4,494,880 UART: [exit] Launching FMC @ 0x40000000
4,500,177 UART:
4,500,193 UART: Running Caliptra FMC ...
4,500,601 UART:
4,500,823 UART: [fmc] Received command: 0x1000000C
4,501,558 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,496 ready_for_fw is high
1,056,496 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,132,957 >>> mbox cmd response: success
3,189,730 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,195,775 UART:
3,195,791 UART: Running Caliptra FMC ...
3,196,199 UART:
3,196,429 UART: [fmc] Received command: 0x46574C44
4,186,520 >>> mbox cmd response: failed
4,186,520 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,431 UART:
4,192,447 UART: Running Caliptra FMC ...
4,192,855 UART:
4,193,077 UART: [fmc] Received command: 0x1000000C
4,193,812 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,348 UART: [kat] SHA2-256
902,288 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,754 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 ready_for_fw is high
1,174,478 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,241,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,766 UART: [fwproc] Recv command 0x46574c44
1,282,499 UART: [fwproc] Recv'd Img size: 112032 bytes
3,091,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,119,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,281,710 >>> mbox cmd response: success
3,282,741 UART: [afmc] ++
3,282,909 UART: [afmc] CDI.KEYID = 6
3,283,272 UART: [afmc] SUBJECT.KEYID = 7
3,283,698 UART: [afmc] AUTHORITY.KEYID = 5
3,318,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,002 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,341,713 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,347,600 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,353,298 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,361,099 UART: [afmc] --
3,362,139 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,362,161 UART: [cold-reset] --
3,363,229 UART: [state] Locking Datavault
3,364,328 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,932 UART: [state] Locking ICCM
3,365,408 UART: [exit] Launching FMC @ 0x40000000
3,370,705 UART:
3,370,721 UART: Running Caliptra FMC ...
3,371,129 UART:
3,371,359 UART: [fmc] Received command: 0x46574C44
3,372,185 UART:
3,372,201 UART: Running Caliptra ROM ...
3,372,609 UART:
3,372,751 UART: [state] CFI Enabled
3,375,679 UART: [state] LifecycleState = Unprovisioned
3,376,334 UART: [state] DebugLocked = No
3,376,826 UART: [state] WD Timer not started. Device not locked for debugging
3,378,186 UART: [kat] SHA2-256
4,181,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,185,865 UART: [kat] ++
4,186,017 UART: [kat] sha1
4,190,445 UART: [kat] SHA2-256
4,192,385 UART: [kat] SHA2-384
4,194,924 UART: [kat] SHA2-512-ACC
4,196,824 UART: [kat] ECC-384
4,206,635 UART: [kat] HMAC-384Kdf
4,211,165 UART: [kat] LMS
4,459,477 UART: [kat] --
4,460,395 UART: [update-reset] ++
4,477,935 >>> mbox cmd response: failed
4,477,935 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,478,225 UART: ROM Non-Fatal Error: 0x000B003D
4,479,079 UART: [state] Locking Datavault
4,479,831 UART: [state] Locking PCR0, PCR1 and PCR31
4,480,435 UART: [state] Locking ICCM
4,480,995 UART: [exit] Launching FMC @ 0x40000000
4,486,292 UART:
4,486,308 UART: Running Caliptra FMC ...
4,486,716 UART:
4,486,938 UART: [fmc] Received command: 0x1000000C
4,487,673 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,931 ready_for_fw is high
1,055,931 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,140,748 >>> mbox cmd response: success
3,197,035 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,203,114 UART:
3,203,130 UART: Running Caliptra FMC ...
3,203,538 UART:
3,203,768 UART: [fmc] Received command: 0x46574C44
4,193,730 >>> mbox cmd response: failed
4,193,730 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,199,791 UART:
4,199,807 UART: Running Caliptra FMC ...
4,200,215 UART:
4,200,437 UART: [fmc] Received command: 0x1000000C
4,201,172 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,039 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,173,891 ready_for_fw is high
1,173,891 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,555 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,596 UART: [ldev] ++
1,209,764 UART: [ldev] CDI.KEYID = 6
1,210,128 UART: [ldev] SUBJECT.KEYID = 5
1,210,555 UART: [ldev] AUTHORITY.KEYID = 7
1,211,018 UART: [ldev] FE.KEYID = 1
1,216,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,200 UART: [ldev] --
1,281,708 UART: [fwproc] Wait for Commands...
1,282,369 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 112032 bytes
3,090,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,118,559 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,280,334 >>> mbox cmd response: success
3,281,357 UART: [afmc] ++
3,281,525 UART: [afmc] CDI.KEYID = 6
3,281,888 UART: [afmc] SUBJECT.KEYID = 7
3,282,314 UART: [afmc] AUTHORITY.KEYID = 5
3,317,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,218 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,340,929 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,346,816 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,352,514 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,360,363 UART: [afmc] --
3,361,269 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,361,291 UART: [cold-reset] --
3,362,165 UART: [state] Locking Datavault
3,363,626 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,230 UART: [state] Locking ICCM
3,364,854 UART: [exit] Launching FMC @ 0x40000000
3,370,151 UART:
3,370,167 UART: Running Caliptra FMC ...
3,370,575 UART:
3,370,805 UART: [fmc] Received command: 0x46574C44
3,371,631 UART:
3,371,647 UART: Running Caliptra ROM ...
3,372,055 UART:
3,372,110 UART: [state] CFI Enabled
3,374,736 UART: [state] LifecycleState = Unprovisioned
3,375,391 UART: [state] DebugLocked = No
3,376,031 UART: [state] WD Timer not started. Device not locked for debugging
3,377,367 UART: [kat] SHA2-256
4,180,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,185,046 UART: [kat] ++
4,185,198 UART: [kat] sha1
4,189,538 UART: [kat] SHA2-256
4,191,478 UART: [kat] SHA2-384
4,194,001 UART: [kat] SHA2-512-ACC
4,195,901 UART: [kat] ECC-384
4,205,246 UART: [kat] HMAC-384Kdf
4,209,674 UART: [kat] LMS
4,457,986 UART: [kat] --
4,458,784 UART: [update-reset] ++
4,476,442 >>> mbox cmd response: failed
4,476,442 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,752 UART: ROM Non-Fatal Error: 0x000B003D
4,477,722 UART: [state] Locking Datavault
4,478,450 UART: [state] Locking PCR0, PCR1 and PCR31
4,479,054 UART: [state] Locking ICCM
4,479,484 UART: [exit] Launching FMC @ 0x40000000
4,484,781 UART:
4,484,797 UART: Running Caliptra FMC ...
4,485,205 UART:
4,485,427 UART: [fmc] Received command: 0x1000000C
4,486,162 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,690 ready_for_fw is high
1,055,690 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,132,896 >>> mbox cmd response: success
3,189,167 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,195,626 UART:
3,195,642 UART: Running Caliptra FMC ...
3,196,050 UART:
3,196,280 UART: [fmc] Received command: 0x46574C44
4,185,709 >>> mbox cmd response: failed
4,185,709 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,191,820 UART:
4,191,836 UART: Running Caliptra FMC ...
4,192,244 UART:
4,192,466 UART: [fmc] Received command: 0x1000000C
4,193,201 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,174,524 ready_for_fw is high
1,174,524 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,784 UART: [fwproc] Recv command 0x46574c44
1,283,517 UART: [fwproc] Recv'd Img size: 112032 bytes
3,101,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,129,284 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,290,915 >>> mbox cmd response: success
3,292,172 UART: [afmc] ++
3,292,340 UART: [afmc] CDI.KEYID = 6
3,292,703 UART: [afmc] SUBJECT.KEYID = 7
3,293,129 UART: [afmc] AUTHORITY.KEYID = 5
3,329,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,345,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,346,661 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,352,372 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,358,259 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,363,957 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,371,770 UART: [afmc] --
3,372,848 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,372,870 UART: [cold-reset] --
3,373,974 UART: [state] Locking Datavault
3,375,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,887 UART: [state] Locking ICCM
3,376,559 UART: [exit] Launching FMC @ 0x40000000
3,381,856 UART:
3,381,872 UART: Running Caliptra FMC ...
3,382,280 UART:
3,382,510 UART: [fmc] Received command: 0x46574C44
3,383,336 UART:
3,383,352 UART: Running Caliptra ROM ...
3,383,760 UART:
3,383,902 UART: [state] CFI Enabled
3,386,678 UART: [state] LifecycleState = Unprovisioned
3,387,333 UART: [state] DebugLocked = No
3,387,823 UART: [state] WD Timer not started. Device not locked for debugging
3,389,117 UART: [kat] SHA2-256
4,192,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,196,796 UART: [kat] ++
4,196,948 UART: [kat] sha1
4,201,330 UART: [kat] SHA2-256
4,203,270 UART: [kat] SHA2-384
4,205,855 UART: [kat] SHA2-512-ACC
4,207,755 UART: [kat] ECC-384
4,217,612 UART: [kat] HMAC-384Kdf
4,222,204 UART: [kat] LMS
4,470,516 UART: [kat] --
4,471,362 UART: [update-reset] ++
4,489,572 >>> mbox cmd response: failed
4,489,572 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,489,982 UART: ROM Non-Fatal Error: 0x000B003D
4,490,834 UART: [state] Locking Datavault
4,491,588 UART: [state] Locking PCR0, PCR1 and PCR31
4,492,192 UART: [state] Locking ICCM
4,492,816 UART: [exit] Launching FMC @ 0x40000000
4,498,113 UART:
4,498,129 UART: Running Caliptra FMC ...
4,498,537 UART:
4,498,759 UART: [fmc] Received command: 0x1000000C
4,499,494 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,245 ready_for_fw is high
1,056,245 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,140,825 >>> mbox cmd response: success
3,197,168 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,203,323 UART:
3,203,339 UART: Running Caliptra FMC ...
3,203,747 UART:
3,203,977 UART: [fmc] Received command: 0x46574C44
4,193,783 >>> mbox cmd response: failed
4,193,783 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,199,590 UART:
4,199,606 UART: Running Caliptra FMC ...
4,200,014 UART:
4,200,236 UART: [fmc] Received command: 0x1000000C
4,200,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,060 UART:
192,451 UART: Running Caliptra ROM ...
193,629 UART:
193,780 UART: [state] CFI Enabled
261,812 UART: [state] LifecycleState = Unprovisioned
264,148 UART: [state] DebugLocked = No
266,386 UART: [state] WD Timer not started. Device not locked for debugging
270,124 UART: [kat] SHA2-256
451,899 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,424 UART: [kat] ++
463,898 UART: [kat] sha1
473,353 UART: [kat] SHA2-256
476,354 UART: [kat] SHA2-384
482,488 UART: [kat] SHA2-512-ACC
485,058 UART: [kat] ECC-384
3,777,182 UART: [kat] HMAC-384Kdf
3,802,535 UART: [kat] LMS
4,875,676 UART: [kat] --
4,879,894 UART: [cold-reset] ++
4,881,413 UART: [fht] FHT @ 0x50003400
4,893,597 UART: [idev] ++
4,894,301 UART: [idev] CDI.KEYID = 6
4,895,542 UART: [idev] SUBJECT.KEYID = 7
4,896,640 UART: [idev] UDS.KEYID = 0
4,897,571 ready_for_fw is high
4,897,808 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,032,388 UART: [idev] Erasing UDS.KEYID = 0
8,243,353 UART: [idev] Sha1 KeyId Algorithm
8,266,377 UART: [idev] --
8,269,561 UART: [ldev] ++
8,270,125 UART: [ldev] CDI.KEYID = 6
8,271,354 UART: [ldev] SUBJECT.KEYID = 5
8,272,507 UART: [ldev] AUTHORITY.KEYID = 7
8,273,754 UART: [ldev] FE.KEYID = 1
8,318,073 UART: [ldev] Erasing FE.KEYID = 1
11,650,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,418 UART: [ldev] --
14,041,247 UART: [fwproc] Wait for Commands...
14,043,392 UART: [fwproc] Recv command 0x46574c44
14,045,704 UART: [fwproc] Recv'd Img size: 106620 bytes
18,027,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,099,925 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,142,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,460,191 >>> mbox cmd response: success
18,463,556 UART: [afmc] ++
18,464,183 UART: [afmc] CDI.KEYID = 6
18,465,322 UART: [afmc] SUBJECT.KEYID = 7
18,466,484 UART: [afmc] AUTHORITY.KEYID = 5
21,843,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,158,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,160,563 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,176,569 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,192,666 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,208,707 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,231,969 UART: [afmc] --
24,234,723 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,235,499 UART: [cold-reset] --
24,238,118 UART: [state] Locking Datavault
24,244,183 UART: [state] Locking PCR0, PCR1 and PCR31
24,245,827 UART: [state] Locking ICCM
24,247,654 UART: [exit] Launching FMC @ 0x40000000
24,256,288 UART:
24,256,523 UART: Running Caliptra FMC ...
24,257,618 UART:
24,257,770 UART: [fmc] Received command: 0x46574C44
24,259,224 UART:
24,259,378 UART: Running Caliptra ROM ...
24,260,468 UART:
24,260,623 UART: [state] CFI Enabled
24,324,798 UART: [state] LifecycleState = Unprovisioned
24,326,727 UART: [state] DebugLocked = No
24,329,404 UART: [state] WD Timer not started. Device not locked for debugging
24,334,693 UART: [kat] SHA2-256
24,516,628 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,528,158 UART: [kat] ++
24,528,610 UART: [kat] sha1
24,538,521 UART: [kat] SHA2-256
24,541,543 UART: [kat] SHA2-384
24,545,754 UART: [kat] SHA2-512-ACC
24,548,371 UART: [kat] ECC-384
27,835,885 UART: [kat] HMAC-384Kdf
27,861,940 UART: [kat] LMS
28,935,059 UART: [kat] --
28,940,501 UART: [update-reset] ++
28,945,493 >>> mbox cmd response: failed
28,947,786 UART: ROM Non-Fatal Error: 0x000B0001
28,950,814 UART: [state] Locking Datavault
28,955,218 UART: [state] Locking PCR0, PCR1 and PCR31
28,957,425 UART: [state] Locking ICCM
28,959,993 UART: [exit] Launching FMC @ 0x40000000
28,968,631 UART:
28,968,871 UART: Running Caliptra FMC ...
28,970,012 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
4,800,910 ready_for_fw is high
4,801,321 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,259,623 >>> mbox cmd response: success
23,942,186 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
23,956,250 UART:
23,956,629 UART: Running Caliptra FMC ...
23,957,872 UART:
23,958,041 UART: [fmc] Received command: 0x46574C44
28,541,667 >>> mbox cmd response: failed
28,554,056 UART:
28,554,352 UART: Running Caliptra FMC ...
28,555,431 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,496 UART:
192,878 UART: Running Caliptra ROM ...
194,014 UART:
603,733 UART: [state] CFI Enabled
618,304 UART: [state] LifecycleState = Unprovisioned
620,676 UART: [state] DebugLocked = No
623,266 UART: [state] WD Timer not started. Device not locked for debugging
627,429 UART: [kat] SHA2-256
809,383 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,938 UART: [kat] ++
821,678 UART: [kat] sha1
832,942 UART: [kat] SHA2-256
835,955 UART: [kat] SHA2-384
842,517 UART: [kat] SHA2-512-ACC
845,167 UART: [kat] ECC-384
4,099,411 UART: [kat] HMAC-384Kdf
4,111,818 UART: [kat] LMS
5,184,964 UART: [kat] --
5,189,328 UART: [cold-reset] ++
5,190,835 UART: [fht] FHT @ 0x50003400
5,202,516 UART: [idev] ++
5,203,225 UART: [idev] CDI.KEYID = 6
5,204,465 UART: [idev] SUBJECT.KEYID = 7
5,205,919 UART: [idev] UDS.KEYID = 0
5,207,106 ready_for_fw is high
5,207,295 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,341,249 UART: [idev] Erasing UDS.KEYID = 0
8,493,994 UART: [idev] Sha1 KeyId Algorithm
8,515,925 UART: [idev] --
8,520,277 UART: [ldev] ++
8,520,904 UART: [ldev] CDI.KEYID = 6
8,522,008 UART: [ldev] SUBJECT.KEYID = 5
8,523,538 UART: [ldev] AUTHORITY.KEYID = 7
8,525,012 UART: [ldev] FE.KEYID = 1
8,534,948 UART: [ldev] Erasing FE.KEYID = 1
11,831,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,173 UART: [ldev] --
14,199,753 UART: [fwproc] Wait for Commands...
14,201,625 UART: [fwproc] Recv command 0x46574c44
14,203,945 UART: [fwproc] Recv'd Img size: 106620 bytes
18,184,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,265,674 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,308,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,625,771 >>> mbox cmd response: success
18,629,454 UART: [afmc] ++
18,630,065 UART: [afmc] CDI.KEYID = 6
18,631,178 UART: [afmc] SUBJECT.KEYID = 7
18,632,400 UART: [afmc] AUTHORITY.KEYID = 5
21,950,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,243,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,245,437 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,261,465 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,277,529 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,293,607 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,315,015 UART: [afmc] --
24,318,584 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,319,357 UART: [cold-reset] --
24,323,351 UART: [state] Locking Datavault
24,329,361 UART: [state] Locking PCR0, PCR1 and PCR31
24,330,997 UART: [state] Locking ICCM
24,333,844 UART: [exit] Launching FMC @ 0x40000000
24,342,470 UART:
24,342,748 UART: Running Caliptra FMC ...
24,343,854 UART:
24,344,009 UART: [fmc] Received command: 0x46574C44
24,345,379 UART:
24,345,516 UART: Running Caliptra ROM ...
24,346,610 UART:
24,346,761 UART: [state] CFI Enabled
24,361,065 UART: [state] LifecycleState = Unprovisioned
24,362,887 UART: [state] DebugLocked = No
24,364,539 UART: [state] WD Timer not started. Device not locked for debugging
24,368,277 UART: [kat] SHA2-256
24,550,065 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,561,589 UART: [kat] ++
24,562,185 UART: [kat] sha1
24,574,043 UART: [kat] SHA2-256
24,577,050 UART: [kat] SHA2-384
24,581,804 UART: [kat] SHA2-512-ACC
24,584,413 UART: [kat] ECC-384
27,837,603 UART: [kat] HMAC-384Kdf
27,850,367 UART: [kat] LMS
28,923,507 UART: [kat] --
28,927,068 UART: [update-reset] ++
28,931,625 >>> mbox cmd response: failed
28,933,503 UART: ROM Non-Fatal Error: 0x000B0001
28,936,320 UART: [state] Locking Datavault
28,940,164 UART: [state] Locking PCR0, PCR1 and PCR31
28,942,368 UART: [state] Locking ICCM
28,945,217 UART: [exit] Launching FMC @ 0x40000000
28,953,882 UART:
28,954,123 UART: Running Caliptra FMC ...
28,955,261 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
5,104,538 ready_for_fw is high
5,104,919 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,428,051 >>> mbox cmd response: success
24,048,833 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,063,240 UART:
24,063,591 UART: Running Caliptra FMC ...
24,064,867 UART:
24,065,045 UART: [fmc] Received command: 0x46574C44
28,561,501 >>> mbox cmd response: failed
28,576,787 UART:
28,577,068 UART: Running Caliptra FMC ...
28,578,231 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,193 UART:
192,566 UART: Running Caliptra ROM ...
193,759 UART:
193,909 UART: [state] CFI Enabled
265,697 UART: [state] LifecycleState = Unprovisioned
267,634 UART: [state] DebugLocked = No
269,741 UART: [state] WD Timer not started. Device not locked for debugging
274,128 UART: [kat] SHA2-256
453,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,778 UART: [kat] ++
465,309 UART: [kat] sha1
477,069 UART: [kat] SHA2-256
480,118 UART: [kat] SHA2-384
486,190 UART: [kat] SHA2-512-ACC
489,204 UART: [kat] ECC-384
2,949,197 UART: [kat] HMAC-384Kdf
2,974,241 UART: [kat] LMS
3,503,687 UART: [kat] --
3,508,680 UART: [cold-reset] ++
3,509,763 UART: [fht] FHT @ 0x50003400
3,521,966 UART: [idev] ++
3,522,592 UART: [idev] CDI.KEYID = 6
3,523,509 UART: [idev] SUBJECT.KEYID = 7
3,524,619 UART: [idev] UDS.KEYID = 0
3,525,544 ready_for_fw is high
3,525,739 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,660,183 UART: [idev] Erasing UDS.KEYID = 0
6,028,593 UART: [idev] Sha1 KeyId Algorithm
6,050,747 UART: [idev] --
6,054,642 UART: [ldev] ++
6,055,219 UART: [ldev] CDI.KEYID = 6
6,056,130 UART: [ldev] SUBJECT.KEYID = 5
6,057,296 UART: [ldev] AUTHORITY.KEYID = 7
6,058,533 UART: [ldev] FE.KEYID = 1
6,102,615 UART: [ldev] Erasing FE.KEYID = 1
8,606,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,002 UART: [ldev] --
10,420,122 UART: [fwproc] Wait for Commands...
10,423,301 UART: [fwproc] Recv command 0x46574c44
10,425,345 UART: [fwproc] Recv'd Img size: 106964 bytes
13,739,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,810,486 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,853,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,171,629 >>> mbox cmd response: success
14,175,006 UART: [afmc] ++
14,175,641 UART: [afmc] CDI.KEYID = 6
14,176,562 UART: [afmc] SUBJECT.KEYID = 7
14,177,727 UART: [afmc] AUTHORITY.KEYID = 5
16,703,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,427,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,429,663 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,445,619 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,461,569 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,477,536 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,546 UART: [afmc] --
18,502,456 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,503,174 UART: [cold-reset] --
18,505,393 UART: [state] Locking Datavault
18,511,183 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,832 UART: [state] Locking ICCM
18,514,172 UART: [exit] Launching FMC @ 0x40000000
18,522,573 UART:
18,522,819 UART: Running Caliptra FMC ...
18,523,923 UART:
18,524,084 UART: [fmc] Received command: 0x46574C44
18,525,570 UART:
18,525,728 UART: Running Caliptra ROM ...
18,526,829 UART:
18,526,987 UART: [state] CFI Enabled
18,590,196 UART: [state] LifecycleState = Unprovisioned
18,592,081 UART: [state] DebugLocked = No
18,594,769 UART: [state] WD Timer not started. Device not locked for debugging
18,598,983 UART: [kat] SHA2-256
18,778,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,789,649 UART: [kat] ++
18,790,189 UART: [kat] sha1
18,800,810 UART: [kat] SHA2-256
18,803,815 UART: [kat] SHA2-384
18,810,086 UART: [kat] SHA2-512-ACC
18,813,031 UART: [kat] ECC-384
21,274,513 UART: [kat] HMAC-384Kdf
21,298,214 UART: [kat] LMS
21,827,635 UART: [kat] --
21,832,091 UART: [update-reset] ++
21,838,530 >>> mbox cmd response: failed
21,840,101 UART: ROM Non-Fatal Error: 0x000B0001
21,843,946 UART: [state] Locking Datavault
21,847,371 UART: [state] Locking PCR0, PCR1 and PCR31
21,849,053 UART: [state] Locking ICCM
21,850,654 UART: [exit] Launching FMC @ 0x40000000
21,859,057 UART:
21,859,320 UART: Running Caliptra FMC ...
21,860,459 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,382,511 ready_for_fw is high
3,383,416 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,952,445 >>> mbox cmd response: success
18,223,505 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,240,776 UART:
18,241,201 UART: Running Caliptra FMC ...
18,242,505 UART:
18,242,678 UART: [fmc] Received command: 0x46574C44
21,425,121 >>> mbox cmd response: failed
21,439,363 UART:
21,439,699 UART: Running Caliptra FMC ...
21,440,896 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,443 UART:
192,829 UART: Running Caliptra ROM ...
194,012 UART:
603,524 UART: [state] CFI Enabled
614,187 UART: [state] LifecycleState = Unprovisioned
616,062 UART: [state] DebugLocked = No
617,729 UART: [state] WD Timer not started. Device not locked for debugging
621,048 UART: [kat] SHA2-256
800,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,742 UART: [kat] ++
812,272 UART: [kat] sha1
823,588 UART: [kat] SHA2-256
826,600 UART: [kat] SHA2-384
833,163 UART: [kat] SHA2-512-ACC
836,094 UART: [kat] ECC-384
3,274,991 UART: [kat] HMAC-384Kdf
3,288,217 UART: [kat] LMS
3,817,688 UART: [kat] --
3,822,322 UART: [cold-reset] ++
3,823,755 UART: [fht] FHT @ 0x50003400
3,834,159 UART: [idev] ++
3,834,716 UART: [idev] CDI.KEYID = 6
3,835,740 UART: [idev] SUBJECT.KEYID = 7
3,836,837 UART: [idev] UDS.KEYID = 0
3,837,879 ready_for_fw is high
3,838,096 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,972,600 UART: [idev] Erasing UDS.KEYID = 0
6,306,855 UART: [idev] Sha1 KeyId Algorithm
6,329,812 UART: [idev] --
6,333,749 UART: [ldev] ++
6,334,318 UART: [ldev] CDI.KEYID = 6
6,335,196 UART: [ldev] SUBJECT.KEYID = 5
6,336,419 UART: [ldev] AUTHORITY.KEYID = 7
6,337,648 UART: [ldev] FE.KEYID = 1
6,349,182 UART: [ldev] Erasing FE.KEYID = 1
8,821,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,154 UART: [ldev] --
10,612,066 UART: [fwproc] Wait for Commands...
10,614,870 UART: [fwproc] Recv command 0x46574c44
10,616,978 UART: [fwproc] Recv'd Img size: 106964 bytes
13,929,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,854 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,046,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,364,454 >>> mbox cmd response: success
14,369,210 UART: [afmc] ++
14,369,830 UART: [afmc] CDI.KEYID = 6
14,370,745 UART: [afmc] SUBJECT.KEYID = 7
14,371,909 UART: [afmc] AUTHORITY.KEYID = 5
16,866,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,588,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,589,868 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,605,889 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,621,805 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,637,776 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,661,395 UART: [afmc] --
18,665,602 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,666,371 UART: [cold-reset] --
18,669,994 UART: [state] Locking Datavault
18,675,791 UART: [state] Locking PCR0, PCR1 and PCR31
18,677,488 UART: [state] Locking ICCM
18,680,066 UART: [exit] Launching FMC @ 0x40000000
18,688,405 UART:
18,688,645 UART: Running Caliptra FMC ...
18,689,743 UART:
18,689,897 UART: [fmc] Received command: 0x46574C44
18,691,348 UART:
18,691,500 UART: Running Caliptra ROM ...
18,692,590 UART:
18,692,739 UART: [state] CFI Enabled
18,703,805 UART: [state] LifecycleState = Unprovisioned
18,705,625 UART: [state] DebugLocked = No
18,707,282 UART: [state] WD Timer not started. Device not locked for debugging
18,710,742 UART: [kat] SHA2-256
18,889,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,901,522 UART: [kat] ++
18,902,033 UART: [kat] sha1
18,912,223 UART: [kat] SHA2-256
18,915,240 UART: [kat] SHA2-384
18,919,868 UART: [kat] SHA2-512-ACC
18,922,810 UART: [kat] ECC-384
21,366,068 UART: [kat] HMAC-384Kdf
21,380,032 UART: [kat] LMS
21,909,551 UART: [kat] --
21,915,603 UART: [update-reset] ++
21,922,487 >>> mbox cmd response: failed
21,923,665 UART: ROM Non-Fatal Error: 0x000B0001
21,926,293 UART: [state] Locking Datavault
21,928,352 UART: [state] Locking PCR0, PCR1 and PCR31
21,930,031 UART: [state] Locking ICCM
21,932,260 UART: [exit] Launching FMC @ 0x40000000
21,940,652 UART:
21,940,899 UART: Running Caliptra FMC ...
21,942,254 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,165 writing to cptra_bootfsm_go
3,697,482 ready_for_fw is high
3,697,872 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,158,902 >>> mbox cmd response: success
18,391,549 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,406,713 UART:
18,407,081 UART: Running Caliptra FMC ...
18,408,358 UART:
18,408,526 UART: [fmc] Received command: 0x46574C44
21,502,438 >>> mbox cmd response: failed
21,516,943 UART:
21,517,223 UART: Running Caliptra FMC ...
21,518,382 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,079 UART:
192,472 UART: Running Caliptra ROM ...
193,571 UART:
193,712 UART: [state] CFI Enabled
267,086 UART: [state] LifecycleState = Unprovisioned
268,994 UART: [state] DebugLocked = No
271,503 UART: [state] WD Timer not started. Device not locked for debugging
275,883 UART: [kat] SHA2-256
455,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,556 UART: [kat] ++
467,002 UART: [kat] sha1
478,162 UART: [kat] SHA2-256
481,182 UART: [kat] SHA2-384
488,451 UART: [kat] SHA2-512-ACC
491,430 UART: [kat] ECC-384
2,948,775 UART: [kat] HMAC-384Kdf
2,972,541 UART: [kat] LMS
3,501,969 UART: [kat] --
3,504,286 UART: [cold-reset] ++
3,506,584 UART: [fht] FHT @ 0x50003400
3,517,351 UART: [idev] ++
3,517,924 UART: [idev] CDI.KEYID = 6
3,518,831 UART: [idev] SUBJECT.KEYID = 7
3,520,005 UART: [idev] UDS.KEYID = 0
3,520,935 ready_for_fw is high
3,521,120 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,655,717 UART: [idev] Erasing UDS.KEYID = 0
6,028,899 UART: [idev] Sha1 KeyId Algorithm
6,051,260 UART: [idev] --
6,055,963 UART: [ldev] ++
6,056,562 UART: [ldev] CDI.KEYID = 6
6,057,533 UART: [ldev] SUBJECT.KEYID = 5
6,058,639 UART: [ldev] AUTHORITY.KEYID = 7
6,059,869 UART: [ldev] FE.KEYID = 1
6,099,965 UART: [ldev] Erasing FE.KEYID = 1
8,599,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,679 UART: [ldev] --
10,396,240 UART: [fwproc] Wait for Commands...
10,398,179 UART: [fwproc] Recv command 0x46574c44
10,400,274 UART: [fwproc] Recv'd Img size: 106964 bytes
13,720,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,790,145 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,832,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,151,803 >>> mbox cmd response: success
14,156,925 UART: [afmc] ++
14,157,538 UART: [afmc] CDI.KEYID = 6
14,158,452 UART: [afmc] SUBJECT.KEYID = 7
14,159,614 UART: [afmc] AUTHORITY.KEYID = 5
16,695,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,324 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,314 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,235 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,144 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,490 UART: [afmc] --
18,500,034 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,500,809 UART: [cold-reset] --
18,502,861 UART: [state] Locking Datavault
18,507,217 UART: [state] Locking PCR0, PCR1 and PCR31
18,508,866 UART: [state] Locking ICCM
18,511,395 UART: [exit] Launching FMC @ 0x40000000
18,519,794 UART:
18,520,028 UART: Running Caliptra FMC ...
18,521,132 UART:
18,521,288 UART: [fmc] Received command: 0x46574C44
18,522,745 UART:
18,522,899 UART: Running Caliptra ROM ...
18,523,999 UART:
18,524,155 UART: [state] CFI Enabled
18,588,608 UART: [state] LifecycleState = Unprovisioned
18,590,479 UART: [state] DebugLocked = No
18,592,890 UART: [state] WD Timer not started. Device not locked for debugging
18,596,777 UART: [kat] SHA2-256
18,775,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,787,493 UART: [kat] ++
18,788,032 UART: [kat] sha1
18,799,035 UART: [kat] SHA2-256
18,802,103 UART: [kat] SHA2-384
18,807,921 UART: [kat] SHA2-512-ACC
18,810,865 UART: [kat] ECC-384
21,271,120 UART: [kat] HMAC-384Kdf
21,296,033 UART: [kat] LMS
21,825,506 UART: [kat] --
21,829,104 UART: [update-reset] ++
21,837,543 >>> mbox cmd response: failed
21,838,791 UART: ROM Non-Fatal Error: 0x000B0001
21,841,606 UART: [state] Locking Datavault
21,845,096 UART: [state] Locking PCR0, PCR1 and PCR31
21,846,786 UART: [state] Locking ICCM
21,848,441 UART: [exit] Launching FMC @ 0x40000000
21,856,888 UART:
21,857,153 UART: Running Caliptra FMC ...
21,858,301 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,383,014 ready_for_fw is high
3,383,419 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,954,818 >>> mbox cmd response: success
18,225,732 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,239,706 UART:
18,240,060 UART: Running Caliptra FMC ...
18,241,324 UART:
18,241,499 UART: [fmc] Received command: 0x46574C44
21,406,030 >>> mbox cmd response: failed
21,419,872 UART:
21,420,239 UART: Running Caliptra FMC ...
21,421,457 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,339 UART:
192,711 UART: Running Caliptra ROM ...
193,790 UART:
603,627 UART: [state] CFI Enabled
616,467 UART: [state] LifecycleState = Unprovisioned
618,285 UART: [state] DebugLocked = No
620,508 UART: [state] WD Timer not started. Device not locked for debugging
625,090 UART: [kat] SHA2-256
804,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,793 UART: [kat] ++
816,237 UART: [kat] sha1
828,809 UART: [kat] SHA2-256
831,885 UART: [kat] SHA2-384
839,076 UART: [kat] SHA2-512-ACC
842,009 UART: [kat] ECC-384
3,284,756 UART: [kat] HMAC-384Kdf
3,297,297 UART: [kat] LMS
3,826,770 UART: [kat] --
3,832,041 UART: [cold-reset] ++
3,833,049 UART: [fht] FHT @ 0x50003400
3,844,446 UART: [idev] ++
3,845,010 UART: [idev] CDI.KEYID = 6
3,846,045 UART: [idev] SUBJECT.KEYID = 7
3,847,145 UART: [idev] UDS.KEYID = 0
3,848,071 ready_for_fw is high
3,848,255 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,982,634 UART: [idev] Erasing UDS.KEYID = 0
6,323,545 UART: [idev] Sha1 KeyId Algorithm
6,347,960 UART: [idev] --
6,351,198 UART: [ldev] ++
6,351,768 UART: [ldev] CDI.KEYID = 6
6,352,676 UART: [ldev] SUBJECT.KEYID = 5
6,353,856 UART: [ldev] AUTHORITY.KEYID = 7
6,355,086 UART: [ldev] FE.KEYID = 1
6,364,170 UART: [ldev] Erasing FE.KEYID = 1
8,839,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,047 UART: [ldev] --
10,629,474 UART: [fwproc] Wait for Commands...
10,631,348 UART: [fwproc] Recv command 0x46574c44
10,633,440 UART: [fwproc] Recv'd Img size: 106964 bytes
13,947,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,022,314 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,064,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,383,078 >>> mbox cmd response: success
14,388,101 UART: [afmc] ++
14,388,711 UART: [afmc] CDI.KEYID = 6
14,389,623 UART: [afmc] SUBJECT.KEYID = 7
14,390,782 UART: [afmc] AUTHORITY.KEYID = 5
16,891,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,169 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,631,150 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,647,069 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,662,975 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,685,458 UART: [afmc] --
18,689,529 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,690,299 UART: [cold-reset] --
18,694,033 UART: [state] Locking Datavault
18,698,909 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,607 UART: [state] Locking ICCM
18,702,371 UART: [exit] Launching FMC @ 0x40000000
18,710,766 UART:
18,711,047 UART: Running Caliptra FMC ...
18,712,290 UART:
18,712,453 UART: [fmc] Received command: 0x46574C44
18,713,910 UART:
18,714,062 UART: Running Caliptra ROM ...
18,715,160 UART:
18,715,316 UART: [state] CFI Enabled
18,729,787 UART: [state] LifecycleState = Unprovisioned
18,731,620 UART: [state] DebugLocked = No
18,734,125 UART: [state] WD Timer not started. Device not locked for debugging
18,738,663 UART: [kat] SHA2-256
18,917,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,929,399 UART: [kat] ++
18,929,860 UART: [kat] sha1
18,940,114 UART: [kat] SHA2-256
18,943,135 UART: [kat] SHA2-384
18,950,575 UART: [kat] SHA2-512-ACC
18,953,512 UART: [kat] ECC-384
21,393,980 UART: [kat] HMAC-384Kdf
21,406,098 UART: [kat] LMS
21,935,607 UART: [kat] --
21,940,483 UART: [update-reset] ++
21,946,715 >>> mbox cmd response: failed
21,949,653 UART: ROM Non-Fatal Error: 0x000B0001
21,952,231 UART: [state] Locking Datavault
21,955,101 UART: [state] Locking PCR0, PCR1 and PCR31
21,956,781 UART: [state] Locking ICCM
21,958,504 UART: [exit] Launching FMC @ 0x40000000
21,966,850 UART:
21,967,137 UART: Running Caliptra FMC ...
21,968,311 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
1,963 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,287 writing to cptra_bootfsm_go
3,698,669 ready_for_fw is high
3,699,086 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,157,790 >>> mbox cmd response: success
18,385,507 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,399,675 UART:
18,400,017 UART: Running Caliptra FMC ...
18,401,161 UART:
18,401,312 UART: [fmc] Received command: 0x46574C44
21,491,617 >>> mbox cmd response: failed
21,503,988 UART:
21,504,266 UART: Running Caliptra FMC ...
21,505,420 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,406 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,169,101 UART: [cold-reset] ++
1,169,547 UART: [fht] FHT @ 0x50003400
1,172,153 UART: [idev] ++
1,172,321 UART: [idev] CDI.KEYID = 6
1,172,682 UART: [idev] SUBJECT.KEYID = 7
1,173,107 UART: [idev] UDS.KEYID = 0
1,173,453 ready_for_fw is high
1,173,453 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,137 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,466 UART: [ldev] --
1,279,730 UART: [fwproc] Wait for Commands...
1,280,419 UART: [fwproc] Recv command 0x46574c44
1,281,152 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,506 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,675 >>> mbox cmd response: success
2,675,754 UART: [afmc] ++
2,675,922 UART: [afmc] CDI.KEYID = 6
2,676,285 UART: [afmc] SUBJECT.KEYID = 7
2,676,711 UART: [afmc] AUTHORITY.KEYID = 5
2,712,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,452 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,172 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,065 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,758 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,599 UART: [afmc] --
2,755,677 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,699 UART: [cold-reset] --
2,756,521 UART: [state] Locking Datavault
2,757,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,400 UART: [state] Locking ICCM
2,759,074 UART: [exit] Launching FMC @ 0x40000000
2,764,371 UART:
2,764,387 UART: Running Caliptra FMC ...
2,764,795 UART:
2,764,933 UART: [fmc] Received command: 0x46574C44
2,765,762 UART:
2,765,778 UART: Running Caliptra ROM ...
2,766,186 UART:
2,766,241 UART: [state] CFI Enabled
2,768,789 UART: [state] LifecycleState = Unprovisioned
2,769,444 UART: [state] DebugLocked = No
2,770,160 UART: [state] WD Timer not started. Device not locked for debugging
2,771,458 UART: [kat] SHA2-256
3,575,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,137 UART: [kat] ++
3,579,289 UART: [kat] sha1
3,583,485 UART: [kat] SHA2-256
3,585,425 UART: [kat] SHA2-384
3,588,208 UART: [kat] SHA2-512-ACC
3,590,108 UART: [kat] ECC-384
3,599,893 UART: [kat] HMAC-384Kdf
3,604,385 UART: [kat] LMS
3,852,697 UART: [kat] --
3,853,739 UART: [update-reset] ++
3,855,280 >>> mbox cmd response: failed
3,855,726 UART: ROM Non-Fatal Error: 0x000B0001
3,856,716 UART: [state] Locking Datavault
3,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,978 UART: [state] Locking ICCM
3,858,500 UART: [exit] Launching FMC @ 0x40000000
3,863,797 UART:
3,863,813 UART: Running Caliptra FMC ...
3,864,221 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,078 ready_for_fw is high
1,055,078 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,893 >>> mbox cmd response: success
2,581,441 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,436 UART:
2,587,452 UART: Running Caliptra FMC ...
2,587,860 UART:
2,587,998 UART: [fmc] Received command: 0x46574C44
3,561,983 >>> mbox cmd response: failed
3,567,566 UART:
3,567,582 UART: Running Caliptra FMC ...
3,567,990 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,174,794 ready_for_fw is high
1,174,794 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,415 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,961 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,375 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,540 >>> mbox cmd response: success
2,678,691 UART: [afmc] ++
2,678,859 UART: [afmc] CDI.KEYID = 6
2,679,222 UART: [afmc] SUBJECT.KEYID = 7
2,679,648 UART: [afmc] AUTHORITY.KEYID = 5
2,715,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,789 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,509 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,402 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,095 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,790 UART: [afmc] --
2,758,672 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,758,694 UART: [cold-reset] --
2,759,522 UART: [state] Locking Datavault
2,760,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,505 UART: [state] Locking ICCM
2,762,161 UART: [exit] Launching FMC @ 0x40000000
2,767,458 UART:
2,767,474 UART: Running Caliptra FMC ...
2,767,882 UART:
2,768,020 UART: [fmc] Received command: 0x46574C44
2,768,849 UART:
2,768,865 UART: Running Caliptra ROM ...
2,769,273 UART:
2,769,415 UART: [state] CFI Enabled
2,771,949 UART: [state] LifecycleState = Unprovisioned
2,772,604 UART: [state] DebugLocked = No
2,773,092 UART: [state] WD Timer not started. Device not locked for debugging
2,774,220 UART: [kat] SHA2-256
3,577,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,899 UART: [kat] ++
3,582,051 UART: [kat] sha1
3,586,443 UART: [kat] SHA2-256
3,588,383 UART: [kat] SHA2-384
3,591,142 UART: [kat] SHA2-512-ACC
3,593,042 UART: [kat] ECC-384
3,602,533 UART: [kat] HMAC-384Kdf
3,607,263 UART: [kat] LMS
3,855,575 UART: [kat] --
3,856,415 UART: [update-reset] ++
3,857,850 >>> mbox cmd response: failed
3,858,314 UART: ROM Non-Fatal Error: 0x000B0001
3,859,082 UART: [state] Locking Datavault
3,859,974 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,578 UART: [state] Locking ICCM
3,861,126 UART: [exit] Launching FMC @ 0x40000000
3,866,423 UART:
3,866,439 UART: Running Caliptra FMC ...
3,866,847 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,629 ready_for_fw is high
1,056,629 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,118 >>> mbox cmd response: success
2,582,524 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,588,849 UART:
2,588,865 UART: Running Caliptra FMC ...
2,589,273 UART:
2,589,411 UART: [fmc] Received command: 0x46574C44
3,563,477 >>> mbox cmd response: failed
3,569,364 UART:
3,569,380 UART: Running Caliptra FMC ...
3,569,788 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,782 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,173,873 ready_for_fw is high
1,173,873 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,341 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,362 UART: [ldev] ++
1,208,530 UART: [ldev] CDI.KEYID = 6
1,208,894 UART: [ldev] SUBJECT.KEYID = 5
1,209,321 UART: [ldev] AUTHORITY.KEYID = 7
1,209,784 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,848 UART: [ldev] --
1,281,288 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,843 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,886 >>> mbox cmd response: success
2,677,073 UART: [afmc] ++
2,677,241 UART: [afmc] CDI.KEYID = 6
2,677,604 UART: [afmc] SUBJECT.KEYID = 7
2,678,030 UART: [afmc] AUTHORITY.KEYID = 5
2,713,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,649 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,369 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,262 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,955 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,902 UART: [afmc] --
2,756,972 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,994 UART: [cold-reset] --
2,757,944 UART: [state] Locking Datavault
2,758,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,519 UART: [state] Locking ICCM
2,760,173 UART: [exit] Launching FMC @ 0x40000000
2,765,470 UART:
2,765,486 UART: Running Caliptra FMC ...
2,765,894 UART:
2,766,032 UART: [fmc] Received command: 0x46574C44
2,766,861 UART:
2,766,877 UART: Running Caliptra ROM ...
2,767,285 UART:
2,767,340 UART: [state] CFI Enabled
2,770,122 UART: [state] LifecycleState = Unprovisioned
2,770,777 UART: [state] DebugLocked = No
2,771,315 UART: [state] WD Timer not started. Device not locked for debugging
2,772,579 UART: [kat] SHA2-256
3,576,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,258 UART: [kat] ++
3,580,410 UART: [kat] sha1
3,584,754 UART: [kat] SHA2-256
3,586,694 UART: [kat] SHA2-384
3,589,431 UART: [kat] SHA2-512-ACC
3,591,331 UART: [kat] ECC-384
3,601,470 UART: [kat] HMAC-384Kdf
3,606,136 UART: [kat] LMS
3,854,448 UART: [kat] --
3,855,532 UART: [update-reset] ++
3,857,337 >>> mbox cmd response: failed
3,857,695 UART: ROM Non-Fatal Error: 0x000B0001
3,858,621 UART: [state] Locking Datavault
3,859,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,091 UART: [state] Locking ICCM
3,860,695 UART: [exit] Launching FMC @ 0x40000000
3,865,992 UART:
3,866,008 UART: Running Caliptra FMC ...
3,866,416 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,256 ready_for_fw is high
1,056,256 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,925 >>> mbox cmd response: success
2,581,329 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,110 UART:
2,587,126 UART: Running Caliptra FMC ...
2,587,534 UART:
2,587,672 UART: [fmc] Received command: 0x46574C44
3,561,371 >>> mbox cmd response: failed
3,567,122 UART:
3,567,138 UART: Running Caliptra FMC ...
3,567,546 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,815 UART: [kat] HMAC-384Kdf
921,381 UART: [kat] LMS
1,169,693 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,174,956 ready_for_fw is high
1,174,956 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,633 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,047 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,228 >>> mbox cmd response: success
2,678,435 UART: [afmc] ++
2,678,603 UART: [afmc] CDI.KEYID = 6
2,678,966 UART: [afmc] SUBJECT.KEYID = 7
2,679,392 UART: [afmc] AUTHORITY.KEYID = 5
2,714,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,207 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,927 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,820 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,513 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,366 UART: [afmc] --
2,758,326 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,758,348 UART: [cold-reset] --
2,759,110 UART: [state] Locking Datavault
2,760,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,045 UART: [state] Locking ICCM
2,761,487 UART: [exit] Launching FMC @ 0x40000000
2,766,784 UART:
2,766,800 UART: Running Caliptra FMC ...
2,767,208 UART:
2,767,346 UART: [fmc] Received command: 0x46574C44
2,768,175 UART:
2,768,191 UART: Running Caliptra ROM ...
2,768,599 UART:
2,768,741 UART: [state] CFI Enabled
2,771,601 UART: [state] LifecycleState = Unprovisioned
2,772,256 UART: [state] DebugLocked = No
2,772,934 UART: [state] WD Timer not started. Device not locked for debugging
2,774,192 UART: [kat] SHA2-256
3,577,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,871 UART: [kat] ++
3,582,023 UART: [kat] sha1
3,586,293 UART: [kat] SHA2-256
3,588,233 UART: [kat] SHA2-384
3,590,918 UART: [kat] SHA2-512-ACC
3,592,818 UART: [kat] ECC-384
3,602,399 UART: [kat] HMAC-384Kdf
3,607,019 UART: [kat] LMS
3,855,331 UART: [kat] --
3,856,187 UART: [update-reset] ++
3,857,720 >>> mbox cmd response: failed
3,858,118 UART: ROM Non-Fatal Error: 0x000B0001
3,859,014 UART: [state] Locking Datavault
3,859,728 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,332 UART: [state] Locking ICCM
3,860,778 UART: [exit] Launching FMC @ 0x40000000
3,866,075 UART:
3,866,091 UART: Running Caliptra FMC ...
3,866,499 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,459 ready_for_fw is high
1,056,459 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,386 >>> mbox cmd response: success
2,583,358 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,589,317 UART:
2,589,333 UART: Running Caliptra FMC ...
2,589,741 UART:
2,589,879 UART: [fmc] Received command: 0x46574C44
3,564,225 >>> mbox cmd response: failed
3,569,712 UART:
3,569,728 UART: Running Caliptra FMC ...
3,570,136 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,278 UART: [kat] SHA2-512-ACC
906,179 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,174,365 ready_for_fw is high
1,174,365 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,285 UART: [idev] --
1,208,266 UART: [ldev] ++
1,208,434 UART: [ldev] CDI.KEYID = 6
1,208,798 UART: [ldev] SUBJECT.KEYID = 5
1,209,225 UART: [ldev] AUTHORITY.KEYID = 7
1,209,688 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,166 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x46574c44
1,282,708 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,636 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,649 >>> mbox cmd response: success
2,676,838 UART: [afmc] ++
2,677,006 UART: [afmc] CDI.KEYID = 6
2,677,369 UART: [afmc] SUBJECT.KEYID = 7
2,677,795 UART: [afmc] AUTHORITY.KEYID = 5
2,713,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,902 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,622 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,515 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,208 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,127 UART: [afmc] --
2,757,063 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,757,085 UART: [cold-reset] --
2,758,021 UART: [state] Locking Datavault
2,759,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,760 UART: [state] Locking ICCM
2,760,378 UART: [exit] Launching FMC @ 0x40000000
2,765,675 UART:
2,765,691 UART: Running Caliptra FMC ...
2,766,099 UART:
2,766,237 UART: [fmc] Received command: 0x46574C44
2,767,066 UART:
2,767,082 UART: Running Caliptra ROM ...
2,767,490 UART:
2,767,545 UART: [state] CFI Enabled
2,770,137 UART: [state] LifecycleState = Unprovisioned
2,770,792 UART: [state] DebugLocked = No
2,771,454 UART: [state] WD Timer not started. Device not locked for debugging
2,772,608 UART: [kat] SHA2-256
3,576,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,287 UART: [kat] ++
3,580,439 UART: [kat] sha1
3,584,613 UART: [kat] SHA2-256
3,586,553 UART: [kat] SHA2-384
3,589,384 UART: [kat] SHA2-512-ACC
3,591,284 UART: [kat] ECC-384
3,600,585 UART: [kat] HMAC-384Kdf
3,605,199 UART: [kat] LMS
3,853,511 UART: [kat] --
3,854,343 UART: [update-reset] ++
3,855,740 >>> mbox cmd response: failed
3,856,292 UART: ROM Non-Fatal Error: 0x000B0001
3,857,144 UART: [state] Locking Datavault
3,857,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,534 UART: [state] Locking ICCM
3,859,114 UART: [exit] Launching FMC @ 0x40000000
3,864,411 UART:
3,864,427 UART: Running Caliptra FMC ...
3,864,835 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,596 ready_for_fw is high
1,056,596 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,877 >>> mbox cmd response: success
2,584,307 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,590,420 UART:
2,590,436 UART: Running Caliptra FMC ...
2,590,844 UART:
2,590,982 UART: [fmc] Received command: 0x46574C44
3,565,153 >>> mbox cmd response: failed
3,571,092 UART:
3,571,108 UART: Running Caliptra FMC ...
3,571,516 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,475 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,174,890 ready_for_fw is high
1,174,890 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,088 UART: [idev] Sha1 KeyId Algorithm
1,209,112 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,282,081 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,293 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,428 >>> mbox cmd response: success
2,678,623 UART: [afmc] ++
2,678,791 UART: [afmc] CDI.KEYID = 6
2,679,154 UART: [afmc] SUBJECT.KEYID = 7
2,679,580 UART: [afmc] AUTHORITY.KEYID = 5
2,715,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,191 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,911 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,804 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,497 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,354 UART: [afmc] --
2,759,360 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,759,382 UART: [cold-reset] --
2,760,332 UART: [state] Locking Datavault
2,761,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,995 UART: [state] Locking ICCM
2,762,473 UART: [exit] Launching FMC @ 0x40000000
2,767,770 UART:
2,767,786 UART: Running Caliptra FMC ...
2,768,194 UART:
2,768,332 UART: [fmc] Received command: 0x46574C44
2,769,161 UART:
2,769,177 UART: Running Caliptra ROM ...
2,769,585 UART:
2,769,727 UART: [state] CFI Enabled
2,772,359 UART: [state] LifecycleState = Unprovisioned
2,773,014 UART: [state] DebugLocked = No
2,773,550 UART: [state] WD Timer not started. Device not locked for debugging
2,774,800 UART: [kat] SHA2-256
3,578,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,582,479 UART: [kat] ++
3,582,631 UART: [kat] sha1
3,586,971 UART: [kat] SHA2-256
3,588,911 UART: [kat] SHA2-384
3,591,580 UART: [kat] SHA2-512-ACC
3,593,480 UART: [kat] ECC-384
3,603,545 UART: [kat] HMAC-384Kdf
3,608,217 UART: [kat] LMS
3,856,529 UART: [kat] --
3,857,445 UART: [update-reset] ++
3,858,906 >>> mbox cmd response: failed
3,859,360 UART: ROM Non-Fatal Error: 0x000B0001
3,860,280 UART: [state] Locking Datavault
3,861,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,861,746 UART: [state] Locking ICCM
3,862,374 UART: [exit] Launching FMC @ 0x40000000
3,867,671 UART:
3,867,687 UART: Running Caliptra FMC ...
3,868,095 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,357 ready_for_fw is high
1,056,357 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,844 >>> mbox cmd response: success
2,583,214 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,589,327 UART:
2,589,343 UART: Running Caliptra FMC ...
2,589,751 UART:
2,589,889 UART: [fmc] Received command: 0x46574C44
3,564,869 >>> mbox cmd response: failed
3,570,506 UART:
3,570,522 UART: Running Caliptra FMC ...
3,570,930 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,813 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,083 UART:
192,480 UART: Running Caliptra ROM ...
193,690 UART:
193,845 UART: [state] CFI Enabled
260,484 UART: [state] LifecycleState = Unprovisioned
262,902 UART: [state] DebugLocked = No
264,988 UART: [state] WD Timer not started. Device not locked for debugging
270,439 UART: [kat] SHA2-256
452,339 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,862 UART: [kat] ++
464,367 UART: [kat] sha1
474,327 UART: [kat] SHA2-256
477,358 UART: [kat] SHA2-384
482,095 UART: [kat] SHA2-512-ACC
484,709 UART: [kat] ECC-384
3,775,563 UART: [kat] HMAC-384Kdf
3,802,708 UART: [kat] LMS
4,875,834 UART: [kat] --
4,879,736 UART: [cold-reset] ++
4,881,303 UART: [fht] FHT @ 0x50003400
4,891,690 UART: [idev] ++
4,892,422 UART: [idev] CDI.KEYID = 6
4,893,600 UART: [idev] SUBJECT.KEYID = 7
4,894,760 UART: [idev] UDS.KEYID = 0
4,931,925 UART: [idev] Erasing UDS.KEYID = 0
8,242,239 UART: [idev] Sha1 KeyId Algorithm
8,265,260 UART: [idev] --
8,269,304 UART: [ldev] ++
8,269,899 UART: [ldev] CDI.KEYID = 6
8,271,087 UART: [ldev] SUBJECT.KEYID = 5
8,272,251 UART: [ldev] AUTHORITY.KEYID = 7
8,273,487 UART: [ldev] FE.KEYID = 1
8,318,579 UART: [ldev] Erasing FE.KEYID = 1
11,655,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,723 UART: [ldev] --
14,037,688 UART: [fwproc] Wait for Commands...
14,039,309 UART: [fwproc] Recv command 0x46505652
14,041,456 UART: [rt] FIPS Version
14,043,228 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,789 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,829,968 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,273 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,475 UART:
192,862 UART: Running Caliptra ROM ...
194,005 UART:
603,664 UART: [state] CFI Enabled
619,656 UART: [state] LifecycleState = Unprovisioned
622,028 UART: [state] DebugLocked = No
623,403 UART: [state] WD Timer not started. Device not locked for debugging
628,271 UART: [kat] SHA2-256
810,254 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,766 UART: [kat] ++
822,349 UART: [kat] sha1
833,446 UART: [kat] SHA2-256
836,498 UART: [kat] SHA2-384
841,195 UART: [kat] SHA2-512-ACC
843,808 UART: [kat] ECC-384
4,098,910 UART: [kat] HMAC-384Kdf
4,110,344 UART: [kat] LMS
5,183,502 UART: [kat] --
5,188,169 UART: [cold-reset] ++
5,190,757 UART: [fht] FHT @ 0x50003400
5,200,765 UART: [idev] ++
5,201,502 UART: [idev] CDI.KEYID = 6
5,202,699 UART: [idev] SUBJECT.KEYID = 7
5,204,128 UART: [idev] UDS.KEYID = 0
5,219,943 UART: [idev] Erasing UDS.KEYID = 0
8,495,241 UART: [idev] Sha1 KeyId Algorithm
8,517,334 UART: [idev] --
8,522,306 UART: [ldev] ++
8,522,871 UART: [ldev] CDI.KEYID = 6
8,524,124 UART: [ldev] SUBJECT.KEYID = 5
8,525,558 UART: [ldev] AUTHORITY.KEYID = 7
8,527,110 UART: [ldev] FE.KEYID = 1
8,536,790 UART: [ldev] Erasing FE.KEYID = 1
11,826,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,358 UART: [ldev] --
14,189,608 UART: [fwproc] Wait for Commands...
14,192,026 UART: [fwproc] Recv command 0x46505652
14,194,615 UART: [rt] FIPS Version
14,196,376 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,204 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,018,179 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,796 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,122 UART:
192,529 UART: Running Caliptra ROM ...
193,658 UART:
193,806 UART: [state] CFI Enabled
262,145 UART: [state] LifecycleState = Unprovisioned
263,999 UART: [state] DebugLocked = No
265,820 UART: [state] WD Timer not started. Device not locked for debugging
270,204 UART: [kat] SHA2-256
449,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,941 UART: [kat] ++
461,485 UART: [kat] sha1
472,804 UART: [kat] SHA2-256
475,823 UART: [kat] SHA2-384
481,644 UART: [kat] SHA2-512-ACC
484,627 UART: [kat] ECC-384
2,945,740 UART: [kat] HMAC-384Kdf
2,971,363 UART: [kat] LMS
3,500,783 UART: [kat] --
3,505,421 UART: [cold-reset] ++
3,506,379 UART: [fht] FHT @ 0x50003400
3,517,581 UART: [idev] ++
3,518,150 UART: [idev] CDI.KEYID = 6
3,519,218 UART: [idev] SUBJECT.KEYID = 7
3,520,324 UART: [idev] UDS.KEYID = 0
3,542,836 UART: [idev] Erasing UDS.KEYID = 0
6,024,691 UART: [idev] Sha1 KeyId Algorithm
6,047,486 UART: [idev] --
6,053,025 UART: [ldev] ++
6,053,615 UART: [ldev] CDI.KEYID = 6
6,054,504 UART: [ldev] SUBJECT.KEYID = 5
6,055,670 UART: [ldev] AUTHORITY.KEYID = 7
6,056,908 UART: [ldev] FE.KEYID = 1
6,100,351 UART: [ldev] Erasing FE.KEYID = 1
8,603,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,638 UART: [ldev] --
10,414,719 UART: [fwproc] Wait for Commands...
10,416,827 UART: [fwproc] Recv command 0x46505652
10,419,145 UART: [rt] FIPS Version
10,420,653 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,226,263 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
4,480 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,681 UART:
193,056 UART: Running Caliptra ROM ...
194,183 UART:
603,708 UART: [state] CFI Enabled
619,230 UART: [state] LifecycleState = Unprovisioned
621,102 UART: [state] DebugLocked = No
622,588 UART: [state] WD Timer not started. Device not locked for debugging
626,776 UART: [kat] SHA2-256
805,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,469 UART: [kat] ++
817,997 UART: [kat] sha1
829,091 UART: [kat] SHA2-256
832,105 UART: [kat] SHA2-384
837,429 UART: [kat] SHA2-512-ACC
840,410 UART: [kat] ECC-384
3,286,611 UART: [kat] HMAC-384Kdf
3,298,952 UART: [kat] LMS
3,828,424 UART: [kat] --
3,831,333 UART: [cold-reset] ++
3,832,614 UART: [fht] FHT @ 0x50003400
3,843,536 UART: [idev] ++
3,844,103 UART: [idev] CDI.KEYID = 6
3,844,982 UART: [idev] SUBJECT.KEYID = 7
3,846,195 UART: [idev] UDS.KEYID = 0
3,863,160 UART: [idev] Erasing UDS.KEYID = 0
6,318,808 UART: [idev] Sha1 KeyId Algorithm
6,340,628 UART: [idev] --
6,344,831 UART: [ldev] ++
6,345,394 UART: [ldev] CDI.KEYID = 6
6,346,352 UART: [ldev] SUBJECT.KEYID = 5
6,347,508 UART: [ldev] AUTHORITY.KEYID = 7
6,348,787 UART: [ldev] FE.KEYID = 1
6,360,502 UART: [ldev] Erasing FE.KEYID = 1
8,831,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,257 UART: [ldev] --
10,624,574 UART: [fwproc] Wait for Commands...
10,626,182 UART: [fwproc] Recv command 0x46505652
10,628,515 UART: [rt] FIPS Version
10,630,024 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,095 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,404,935 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,099 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,358 UART:
192,732 UART: Running Caliptra ROM ...
193,909 UART:
194,061 UART: [state] CFI Enabled
262,211 UART: [state] LifecycleState = Unprovisioned
264,121 UART: [state] DebugLocked = No
266,170 UART: [state] WD Timer not started. Device not locked for debugging
270,499 UART: [kat] SHA2-256
449,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,163 UART: [kat] ++
461,690 UART: [kat] sha1
471,709 UART: [kat] SHA2-256
474,703 UART: [kat] SHA2-384
480,088 UART: [kat] SHA2-512-ACC
483,052 UART: [kat] ECC-384
2,948,548 UART: [kat] HMAC-384Kdf
2,971,801 UART: [kat] LMS
3,501,275 UART: [kat] --
3,505,264 UART: [cold-reset] ++
3,507,462 UART: [fht] FHT @ 0x50003400
3,518,372 UART: [idev] ++
3,518,973 UART: [idev] CDI.KEYID = 6
3,520,077 UART: [idev] SUBJECT.KEYID = 7
3,521,191 UART: [idev] UDS.KEYID = 0
3,544,891 UART: [idev] Erasing UDS.KEYID = 0
6,023,105 UART: [idev] Sha1 KeyId Algorithm
6,046,713 UART: [idev] --
6,052,167 UART: [ldev] ++
6,052,742 UART: [ldev] CDI.KEYID = 6
6,053,654 UART: [ldev] SUBJECT.KEYID = 5
6,054,814 UART: [ldev] AUTHORITY.KEYID = 7
6,056,104 UART: [ldev] FE.KEYID = 1
6,093,545 UART: [ldev] Erasing FE.KEYID = 1
8,595,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,975 UART: [ldev] --
10,406,068 UART: [fwproc] Wait for Commands...
10,409,253 UART: [fwproc] Recv command 0x46505652
10,411,569 UART: [rt] FIPS Version
10,413,057 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,987 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,187,629 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,578 UART:
192,946 UART: Running Caliptra ROM ...
194,112 UART:
603,675 UART: [state] CFI Enabled
618,986 UART: [state] LifecycleState = Unprovisioned
620,800 UART: [state] DebugLocked = No
623,625 UART: [state] WD Timer not started. Device not locked for debugging
626,503 UART: [kat] SHA2-256
805,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,233 UART: [kat] ++
817,756 UART: [kat] sha1
830,062 UART: [kat] SHA2-256
833,072 UART: [kat] SHA2-384
838,948 UART: [kat] SHA2-512-ACC
841,878 UART: [kat] ECC-384
3,285,585 UART: [kat] HMAC-384Kdf
3,297,828 UART: [kat] LMS
3,827,329 UART: [kat] --
3,829,880 UART: [cold-reset] ++
3,831,056 UART: [fht] FHT @ 0x50003400
3,840,695 UART: [idev] ++
3,841,302 UART: [idev] CDI.KEYID = 6
3,842,227 UART: [idev] SUBJECT.KEYID = 7
3,843,387 UART: [idev] UDS.KEYID = 0
3,861,628 UART: [idev] Erasing UDS.KEYID = 0
6,318,928 UART: [idev] Sha1 KeyId Algorithm
6,340,425 UART: [idev] --
6,343,733 UART: [ldev] ++
6,344,300 UART: [ldev] CDI.KEYID = 6
6,345,205 UART: [ldev] SUBJECT.KEYID = 5
6,346,359 UART: [ldev] AUTHORITY.KEYID = 7
6,347,642 UART: [ldev] FE.KEYID = 1
6,359,689 UART: [ldev] Erasing FE.KEYID = 1
8,831,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,539 UART: [ldev] --
10,620,366 UART: [fwproc] Wait for Commands...
10,623,051 UART: [fwproc] Recv command 0x46505652
10,625,415 UART: [rt] FIPS Version
10,626,914 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,076 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,404,854 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,652 UART: [state] LifecycleState = Unprovisioned
85,307 UART: [state] DebugLocked = No
85,935 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
890,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,887 UART: [kat] ++
895,039 UART: [kat] sha1
899,077 UART: [kat] SHA2-256
901,017 UART: [kat] SHA2-384
903,922 UART: [kat] SHA2-512-ACC
905,823 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,509 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,694 UART: [ldev] ++
1,208,862 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,653 UART: [ldev] AUTHORITY.KEYID = 7
1,210,116 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,350 UART: [ldev] --
1,280,750 UART: [fwproc] Wait for Commands...
1,281,443 UART: [fwproc] Recv command 0x46505652
1,282,270 UART: [rt] FIPS Version
1,282,831 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,916 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,805 UART: [kat] HMAC-384Kdf
921,563 UART: [kat] LMS
1,169,875 UART: [kat] --
1,170,566 UART: [cold-reset] ++
1,171,084 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,183,052 UART: [idev] Erasing UDS.KEYID = 0
1,200,084 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,493 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46505652
1,284,139 UART: [rt] FIPS Version
1,284,700 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,813 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,010 UART: [kat] SHA2-512-ACC
905,911 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,140 UART: [kat] LMS
1,168,452 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,349 UART: [idev] ++
1,172,517 UART: [idev] CDI.KEYID = 6
1,172,878 UART: [idev] SUBJECT.KEYID = 7
1,173,303 UART: [idev] UDS.KEYID = 0
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,160 UART: [ldev] ++
1,208,328 UART: [ldev] CDI.KEYID = 6
1,208,692 UART: [ldev] SUBJECT.KEYID = 5
1,209,119 UART: [ldev] AUTHORITY.KEYID = 7
1,209,582 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,571 UART: [fwproc] Recv command 0x46505652
1,282,398 UART: [rt] FIPS Version
1,282,959 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,892 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,274 UART: [fht] FHT @ 0x50003400
1,174,134 UART: [idev] ++
1,174,302 UART: [idev] CDI.KEYID = 6
1,174,663 UART: [idev] SUBJECT.KEYID = 7
1,175,088 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha1 KeyId Algorithm
1,208,552 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46505652
1,283,683 UART: [rt] FIPS Version
1,284,244 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,097 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
891,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,834 UART: [kat] LMS
1,169,146 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,199,117 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,242,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,936 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,031 UART: [fwproc] Recv command 0x46505652
1,283,858 UART: [rt] FIPS Version
1,284,419 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,514 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,428 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,427 UART: [fwproc] Wait for Commands...
1,282,148 UART: [fwproc] Recv command 0x46505652
1,282,975 UART: [rt] FIPS Version
1,283,536 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,625 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
6,138 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,476 UART:
192,848 UART: Running Caliptra ROM ...
194,037 UART:
194,193 UART: [state] CFI Enabled
262,169 UART: [state] LifecycleState = Unprovisioned
264,535 UART: [state] DebugLocked = No
267,214 UART: [state] WD Timer not started. Device not locked for debugging
272,613 UART: [kat] SHA2-256
454,539 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,074 UART: [kat] ++
466,663 UART: [kat] sha1
477,064 UART: [kat] SHA2-256
480,120 UART: [kat] SHA2-384
486,825 UART: [kat] SHA2-512-ACC
489,430 UART: [kat] ECC-384
3,774,287 UART: [kat] HMAC-384Kdf
3,801,913 UART: [kat] LMS
4,875,091 UART: [kat] --
4,878,040 UART: [cold-reset] ++
4,879,570 UART: [fht] FHT @ 0x50003400
4,892,239 UART: [idev] ++
4,892,920 UART: [idev] CDI.KEYID = 6
4,894,153 UART: [idev] SUBJECT.KEYID = 7
4,895,255 UART: [idev] UDS.KEYID = 0
4,930,075 UART: [idev] Erasing UDS.KEYID = 0
8,243,199 UART: [idev] Sha1 KeyId Algorithm
8,264,758 UART: [idev] --
8,269,723 UART: [ldev] ++
8,270,343 UART: [ldev] CDI.KEYID = 6
8,271,540 UART: [ldev] SUBJECT.KEYID = 5
8,272,706 UART: [ldev] AUTHORITY.KEYID = 7
8,273,858 UART: [ldev] FE.KEYID = 1
8,319,102 UART: [ldev] Erasing FE.KEYID = 1
11,651,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,319 UART: [ldev] --
14,016,852 UART: [fwproc] Wait for Commands...
14,019,495 UART: [fwproc] Recv command 0x46574c44
14,021,806 UART: [fwproc] Recv'd Img size: 114124 bytes
18,097,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,176,148 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,244,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,561,859 >>> mbox cmd response: success
18,565,178 UART: [afmc] ++
18,565,767 UART: [afmc] CDI.KEYID = 6
18,567,011 UART: [afmc] SUBJECT.KEYID = 7
18,568,119 UART: [afmc] AUTHORITY.KEYID = 5
21,928,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,246,759 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,262,924 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,278,968 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,294,940 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
1,139 UART:
1,309 UART: Running Caliptra ROM ...
2,354 UART:
2,497 UART: [state] CFI Enabled
72,884 UART: [state] LifecycleState = Unprovisioned
74,717 UART: [state] DebugLocked = No
77,091 UART: [state] WD Timer not started. Device not locked for debugging
82,528 UART: [kat] SHA2-256
264,439 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
275,974 UART: [kat] ++
276,415 UART: [kat] sha1
285,837 UART: [kat] SHA2-256
288,840 UART: [kat] SHA2-384
293,136 UART: [kat] SHA2-512-ACC
295,742 UART: [kat] ECC-384
3,580,453 UART: [kat] HMAC-384Kdf
3,609,631 UART: [kat] LMS
4,682,773 UART: [kat] --
4,687,372 UART: [warm-reset] ++
4,688,389 UART: [warm-reset] Prev Cold-Reset failed
4,693,547 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
5,637 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,368,944 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
6,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,368 UART:
192,746 UART: Running Caliptra ROM ...
193,840 UART:
603,747 UART: [state] CFI Enabled
618,324 UART: [state] LifecycleState = Unprovisioned
620,649 UART: [state] DebugLocked = No
622,100 UART: [state] WD Timer not started. Device not locked for debugging
626,901 UART: [kat] SHA2-256
808,898 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,454 UART: [kat] ++
820,952 UART: [kat] sha1
830,959 UART: [kat] SHA2-256
833,971 UART: [kat] SHA2-384
839,460 UART: [kat] SHA2-512-ACC
842,073 UART: [kat] ECC-384
4,095,582 UART: [kat] HMAC-384Kdf
4,107,173 UART: [kat] LMS
5,180,322 UART: [kat] --
5,185,083 UART: [cold-reset] ++
5,187,287 UART: [fht] FHT @ 0x50003400
5,199,622 UART: [idev] ++
5,200,341 UART: [idev] CDI.KEYID = 6
5,201,531 UART: [idev] SUBJECT.KEYID = 7
5,202,964 UART: [idev] UDS.KEYID = 0
5,219,510 UART: [idev] Erasing UDS.KEYID = 0
8,494,904 UART: [idev] Sha1 KeyId Algorithm
8,516,351 UART: [idev] --
8,519,862 UART: [ldev] ++
8,520,426 UART: [ldev] CDI.KEYID = 6
8,521,657 UART: [ldev] SUBJECT.KEYID = 5
8,523,105 UART: [ldev] AUTHORITY.KEYID = 7
8,524,586 UART: [ldev] FE.KEYID = 1
8,536,902 UART: [ldev] Erasing FE.KEYID = 1
11,826,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,641 UART: [ldev] --
14,192,008 UART: [fwproc] Wait for Commands...
14,193,850 UART: [fwproc] Recv command 0x46574c44
14,196,165 UART: [fwproc] Recv'd Img size: 114124 bytes
18,274,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,353,355 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,422,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,738,513 >>> mbox cmd response: success
18,742,442 UART: [afmc] ++
18,743,036 UART: [afmc] CDI.KEYID = 6
18,744,223 UART: [afmc] SUBJECT.KEYID = 7
18,745,378 UART: [afmc] AUTHORITY.KEYID = 5
22,062,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,358,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,361,046 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,377,210 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,393,293 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,409,266 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
850 UART: [
1,319 UART: Running Caliptra ROM ...
2,420 UART:
16,138,290 UART: [state] CFI Enabled
16,151,526 UART: [state] LifecycleState = Unprovisioned
16,153,454 UART: [state] DebugLocked = No
16,154,668 UART: [state] WD Timer not started. Device not locked for debugging
16,158,851 UART: [kat] SHA2-256
16,340,840 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
16,352,397 UART: [kat] ++
16,352,985 UART: [kat] sha1
16,364,198 UART: [kat] SHA2-256
16,367,250 UART: [kat] SHA2-384
16,372,911 UART: [kat] SHA2-512-ACC
16,375,532 UART: [kat] ECC-384
19,633,076 UART: [kat] HMAC-384Kdf
19,644,840 UART: [kat] LMS
20,718,015 UART: [kat] --
20,723,855 UART: [warm-reset] ++
20,724,920 UART: [warm-reset] Prev Cold-Reset failed
20,728,586 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
6,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,535,587 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
5,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,040 UART:
192,437 UART: Running Caliptra ROM ...
193,509 UART:
193,653 UART: [state] CFI Enabled
263,816 UART: [state] LifecycleState = Unprovisioned
265,683 UART: [state] DebugLocked = No
267,677 UART: [state] WD Timer not started. Device not locked for debugging
271,799 UART: [kat] SHA2-256
450,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,469 UART: [kat] ++
462,914 UART: [kat] sha1
474,814 UART: [kat] SHA2-256
477,875 UART: [kat] SHA2-384
484,388 UART: [kat] SHA2-512-ACC
487,378 UART: [kat] ECC-384
2,947,468 UART: [kat] HMAC-384Kdf
2,971,840 UART: [kat] LMS
3,501,243 UART: [kat] --
3,508,388 UART: [cold-reset] ++
3,510,479 UART: [fht] FHT @ 0x50003400
3,521,514 UART: [idev] ++
3,522,085 UART: [idev] CDI.KEYID = 6
3,523,014 UART: [idev] SUBJECT.KEYID = 7
3,524,178 UART: [idev] UDS.KEYID = 0
3,542,502 UART: [idev] Erasing UDS.KEYID = 0
6,023,013 UART: [idev] Sha1 KeyId Algorithm
6,045,575 UART: [idev] --
6,048,299 UART: [ldev] ++
6,048,886 UART: [ldev] CDI.KEYID = 6
6,049,799 UART: [ldev] SUBJECT.KEYID = 5
6,051,019 UART: [ldev] AUTHORITY.KEYID = 7
6,052,256 UART: [ldev] FE.KEYID = 1
6,098,641 UART: [ldev] Erasing FE.KEYID = 1
8,603,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,027 UART: [ldev] --
10,411,188 UART: [fwproc] Wait for Commands...
10,412,930 UART: [fwproc] Recv command 0x46574c44
10,415,034 UART: [fwproc] Recv'd Img size: 114448 bytes
13,831,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,288,698 >>> mbox cmd response: success
14,293,162 UART: [afmc] ++
14,293,748 UART: [afmc] CDI.KEYID = 6
14,294,660 UART: [afmc] SUBJECT.KEYID = 7
14,295,821 UART: [afmc] AUTHORITY.KEYID = 5
16,825,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
811 UART: [
1,300 UART: Running Caliptra ROM ...
2,410 UART:
2,568 UART: [state] CFI Enabled
67,821 UART: [state] LifecycleState = Unprovisioned
69,691 UART: [state] DebugLocked = No
71,989 UART: [state] WD Timer not started. Device not locked for debugging
75,835 UART: [kat] SHA2-256
254,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,531 UART: [kat] ++
267,064 UART: [kat] sha1
279,403 UART: [kat] SHA2-256
282,416 UART: [kat] SHA2-384
288,555 UART: [kat] SHA2-512-ACC
291,468 UART: [kat] ECC-384
2,753,137 UART: [kat] HMAC-384Kdf
2,775,193 UART: [kat] LMS
3,304,649 UART: [kat] --
3,309,340 UART: [warm-reset] ++
3,310,187 UART: [warm-reset] Prev Cold-Reset failed
3,314,127 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
5,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,117 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
6,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,503 UART:
192,875 UART: Running Caliptra ROM ...
194,047 UART:
603,749 UART: [state] CFI Enabled
616,194 UART: [state] LifecycleState = Unprovisioned
618,067 UART: [state] DebugLocked = No
620,716 UART: [state] WD Timer not started. Device not locked for debugging
624,038 UART: [kat] SHA2-256
803,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,740 UART: [kat] ++
815,187 UART: [kat] sha1
827,680 UART: [kat] SHA2-256
830,683 UART: [kat] SHA2-384
836,712 UART: [kat] SHA2-512-ACC
839,640 UART: [kat] ECC-384
3,281,247 UART: [kat] HMAC-384Kdf
3,292,393 UART: [kat] LMS
3,821,861 UART: [kat] --
3,827,691 UART: [cold-reset] ++
3,830,230 UART: [fht] FHT @ 0x50003400
3,841,698 UART: [idev] ++
3,842,297 UART: [idev] CDI.KEYID = 6
3,843,188 UART: [idev] SUBJECT.KEYID = 7
3,844,317 UART: [idev] UDS.KEYID = 0
3,860,897 UART: [idev] Erasing UDS.KEYID = 0
6,316,446 UART: [idev] Sha1 KeyId Algorithm
6,338,839 UART: [idev] --
6,342,886 UART: [ldev] ++
6,343,457 UART: [ldev] CDI.KEYID = 6
6,344,366 UART: [ldev] SUBJECT.KEYID = 5
6,345,582 UART: [ldev] AUTHORITY.KEYID = 7
6,346,810 UART: [ldev] FE.KEYID = 1
6,358,055 UART: [ldev] Erasing FE.KEYID = 1
8,831,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,701 UART: [ldev] --
10,624,040 UART: [fwproc] Wait for Commands...
10,626,149 UART: [fwproc] Recv command 0x46574c44
10,628,188 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,936 >>> mbox cmd response: success
14,496,379 UART: [afmc] ++
14,496,962 UART: [afmc] CDI.KEYID = 6
14,497,872 UART: [afmc] SUBJECT.KEYID = 7
14,499,085 UART: [afmc] AUTHORITY.KEYID = 5
16,998,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
801 UART: [
1,449 UART: Running Caliptra ROM ...
2,546 UART:
1,719,377 UART: [state] CFI Enabled
1,733,246 UART: [state] LifecycleState = Unprovisioned
1,735,099 UART: [state] DebugLocked = No
1,737,241 UART: [state] WD Timer not started. Device not locked for debugging
1,741,735 UART: [kat] SHA2-256
1,920,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,932,437 UART: [kat] ++
1,932,984 UART: [kat] sha1
1,943,228 UART: [kat] SHA2-256
1,946,246 UART: [kat] SHA2-384
1,951,741 UART: [kat] SHA2-512-ACC
1,954,695 UART: [kat] ECC-384
4,399,959 UART: [kat] HMAC-384Kdf
4,411,963 UART: [kat] LMS
4,941,413 UART: [kat] --
4,946,123 UART: [warm-reset] ++
4,946,916 UART: [warm-reset] Prev Cold-Reset failed
4,949,314 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
6,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,202 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
5,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,277 UART:
192,648 UART: Running Caliptra ROM ...
193,803 UART:
193,950 UART: [state] CFI Enabled
265,411 UART: [state] LifecycleState = Unprovisioned
267,324 UART: [state] DebugLocked = No
269,617 UART: [state] WD Timer not started. Device not locked for debugging
273,296 UART: [kat] SHA2-256
452,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,991 UART: [kat] ++
464,456 UART: [kat] sha1
475,839 UART: [kat] SHA2-256
478,854 UART: [kat] SHA2-384
485,330 UART: [kat] SHA2-512-ACC
488,263 UART: [kat] ECC-384
2,950,779 UART: [kat] HMAC-384Kdf
2,972,718 UART: [kat] LMS
3,502,187 UART: [kat] --
3,507,010 UART: [cold-reset] ++
3,507,927 UART: [fht] FHT @ 0x50003400
3,518,813 UART: [idev] ++
3,519,413 UART: [idev] CDI.KEYID = 6
3,520,328 UART: [idev] SUBJECT.KEYID = 7
3,521,547 UART: [idev] UDS.KEYID = 0
3,545,461 UART: [idev] Erasing UDS.KEYID = 0
6,027,022 UART: [idev] Sha1 KeyId Algorithm
6,050,710 UART: [idev] --
6,053,360 UART: [ldev] ++
6,053,933 UART: [ldev] CDI.KEYID = 6
6,054,820 UART: [ldev] SUBJECT.KEYID = 5
6,055,985 UART: [ldev] AUTHORITY.KEYID = 7
6,057,198 UART: [ldev] FE.KEYID = 1
6,101,395 UART: [ldev] Erasing FE.KEYID = 1
8,605,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,800 UART: [ldev] --
10,412,650 UART: [fwproc] Wait for Commands...
10,414,695 UART: [fwproc] Recv command 0x46574c44
10,416,803 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,000 >>> mbox cmd response: success
14,287,103 UART: [afmc] ++
14,287,690 UART: [afmc] CDI.KEYID = 6
14,288,606 UART: [afmc] SUBJECT.KEYID = 7
14,289,764 UART: [afmc] AUTHORITY.KEYID = 5
16,825,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
1,138 UART:
1,413 UART: Running Caliptra ROM ...
2,518 UART:
2,673 UART: [state] CFI Enabled
67,272 UART: [state] LifecycleState = Unprovisioned
69,139 UART: [state] DebugLocked = No
71,543 UART: [state] WD Timer not started. Device not locked for debugging
75,763 UART: [kat] SHA2-256
254,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,448 UART: [kat] ++
266,980 UART: [kat] sha1
277,537 UART: [kat] SHA2-256
280,539 UART: [kat] SHA2-384
286,244 UART: [kat] SHA2-512-ACC
289,173 UART: [kat] ECC-384
2,732,538 UART: [kat] HMAC-384Kdf
2,754,220 UART: [kat] LMS
3,283,666 UART: [kat] --
3,288,271 UART: [warm-reset] ++
3,289,072 UART: [warm-reset] Prev Cold-Reset failed
3,292,417 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
5,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,697 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
7,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,437 UART:
192,821 UART: Running Caliptra ROM ...
193,987 UART:
603,364 UART: [state] CFI Enabled
616,988 UART: [state] LifecycleState = Unprovisioned
618,869 UART: [state] DebugLocked = No
621,703 UART: [state] WD Timer not started. Device not locked for debugging
625,988 UART: [kat] SHA2-256
805,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,673 UART: [kat] ++
817,215 UART: [kat] sha1
828,798 UART: [kat] SHA2-256
831,854 UART: [kat] SHA2-384
838,578 UART: [kat] SHA2-512-ACC
841,570 UART: [kat] ECC-384
3,282,761 UART: [kat] HMAC-384Kdf
3,295,297 UART: [kat] LMS
3,824,797 UART: [kat] --
3,829,059 UART: [cold-reset] ++
3,831,155 UART: [fht] FHT @ 0x50003400
3,842,017 UART: [idev] ++
3,842,591 UART: [idev] CDI.KEYID = 6
3,843,500 UART: [idev] SUBJECT.KEYID = 7
3,844,733 UART: [idev] UDS.KEYID = 0
3,857,808 UART: [idev] Erasing UDS.KEYID = 0
6,317,538 UART: [idev] Sha1 KeyId Algorithm
6,339,786 UART: [idev] --
6,343,321 UART: [ldev] ++
6,343,895 UART: [ldev] CDI.KEYID = 6
6,344,800 UART: [ldev] SUBJECT.KEYID = 5
6,345,960 UART: [ldev] AUTHORITY.KEYID = 7
6,347,248 UART: [ldev] FE.KEYID = 1
6,357,891 UART: [ldev] Erasing FE.KEYID = 1
8,830,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,691 UART: [ldev] --
10,622,702 UART: [fwproc] Wait for Commands...
10,624,851 UART: [fwproc] Recv command 0x46574c44
10,626,943 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,352 >>> mbox cmd response: success
14,488,840 UART: [afmc] ++
14,489,454 UART: [afmc] CDI.KEYID = 6
14,490,368 UART: [afmc] SUBJECT.KEYID = 7
14,491,536 UART: [afmc] AUTHORITY.KEYID = 5
16,988,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
802 UART: [
1,288 UART: Running Caliptra ROM ...
2,390 UART:
1,737,400 UART: [state] CFI Enabled
1,747,105 UART: [state] LifecycleState = Unprovisioned
1,748,949 UART: [state] DebugLocked = No
1,751,867 UART: [state] WD Timer not started. Device not locked for debugging
1,755,281 UART: [kat] SHA2-256
1,934,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,945,991 UART: [kat] ++
1,946,644 UART: [kat] sha1
1,956,455 UART: [kat] SHA2-256
1,959,468 UART: [kat] SHA2-384
1,965,182 UART: [kat] SHA2-512-ACC
1,968,140 UART: [kat] ECC-384
4,411,280 UART: [kat] HMAC-384Kdf
4,423,948 UART: [kat] LMS
4,953,448 UART: [kat] --
4,957,882 UART: [warm-reset] ++
4,958,732 UART: [warm-reset] Prev Cold-Reset failed
4,960,560 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
6,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,289,647 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,026 UART: [kat] LMS
1,169,338 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,812 >>> mbox cmd response: success
2,775,869 UART: [afmc] ++
2,776,037 UART: [afmc] CDI.KEYID = 6
2,776,400 UART: [afmc] SUBJECT.KEYID = 7
2,776,826 UART: [afmc] AUTHORITY.KEYID = 5
2,811,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,130 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,461 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,175 UART:
2,854,191 UART: Running Caliptra ROM ...
2,854,599 UART:
2,854,654 UART: [state] CFI Enabled
2,857,246 UART: [state] LifecycleState = Unprovisioned
2,857,901 UART: [state] DebugLocked = No
2,858,433 UART: [state] WD Timer not started. Device not locked for debugging
2,859,664 UART: [kat] SHA2-256
3,663,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,343 UART: [kat] ++
3,667,495 UART: [kat] sha1
3,671,815 UART: [kat] SHA2-256
3,673,755 UART: [kat] SHA2-384
3,676,478 UART: [kat] SHA2-512-ACC
3,678,379 UART: [kat] ECC-384
3,687,908 UART: [kat] HMAC-384Kdf
3,692,456 UART: [kat] LMS
3,940,768 UART: [kat] --
3,941,660 UART: [warm-reset] ++
3,941,928 UART: [warm-reset] Prev Cold-Reset failed
3,943,027 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,538 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,121 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,221 >>> mbox cmd response: success
2,776,404 UART: [afmc] ++
2,776,572 UART: [afmc] CDI.KEYID = 6
2,776,935 UART: [afmc] SUBJECT.KEYID = 7
2,777,361 UART: [afmc] AUTHORITY.KEYID = 5
2,812,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,609 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,221 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,940 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,722 UART:
2,854,738 UART: Running Caliptra ROM ...
2,855,146 UART:
2,855,288 UART: [state] CFI Enabled
2,858,086 UART: [state] LifecycleState = Unprovisioned
2,858,741 UART: [state] DebugLocked = No
2,859,347 UART: [state] WD Timer not started. Device not locked for debugging
2,860,658 UART: [kat] SHA2-256
3,664,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,337 UART: [kat] ++
3,668,489 UART: [kat] sha1
3,672,651 UART: [kat] SHA2-256
3,674,591 UART: [kat] SHA2-384
3,677,416 UART: [kat] SHA2-512-ACC
3,679,317 UART: [kat] ECC-384
3,689,184 UART: [kat] HMAC-384Kdf
3,693,764 UART: [kat] LMS
3,942,076 UART: [kat] --
3,942,894 UART: [warm-reset] ++
3,943,162 UART: [warm-reset] Prev Cold-Reset failed
3,944,155 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,375 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,832 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,181,221 UART: [idev] Erasing UDS.KEYID = 0
1,198,591 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,622 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,657 UART: [fwproc] Recv command 0x46574c44
1,282,390 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,020 >>> mbox cmd response: success
2,774,185 UART: [afmc] ++
2,774,353 UART: [afmc] CDI.KEYID = 6
2,774,716 UART: [afmc] SUBJECT.KEYID = 7
2,775,142 UART: [afmc] AUTHORITY.KEYID = 5
2,810,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,983 UART:
2,852,999 UART: Running Caliptra ROM ...
2,853,407 UART:
2,853,462 UART: [state] CFI Enabled
2,855,782 UART: [state] LifecycleState = Unprovisioned
2,856,437 UART: [state] DebugLocked = No
2,857,083 UART: [state] WD Timer not started. Device not locked for debugging
2,858,190 UART: [kat] SHA2-256
3,661,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,869 UART: [kat] ++
3,666,021 UART: [kat] sha1
3,670,263 UART: [kat] SHA2-256
3,672,203 UART: [kat] SHA2-384
3,675,012 UART: [kat] SHA2-512-ACC
3,676,913 UART: [kat] ECC-384
3,686,674 UART: [kat] HMAC-384Kdf
3,691,314 UART: [kat] LMS
3,939,626 UART: [kat] --
3,940,686 UART: [warm-reset] ++
3,940,954 UART: [warm-reset] Prev Cold-Reset failed
3,941,851 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,110 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,968 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,959 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,063 >>> mbox cmd response: success
2,777,090 UART: [afmc] ++
2,777,258 UART: [afmc] CDI.KEYID = 6
2,777,621 UART: [afmc] SUBJECT.KEYID = 7
2,778,047 UART: [afmc] AUTHORITY.KEYID = 5
2,813,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,856,298 UART:
2,856,314 UART: Running Caliptra ROM ...
2,856,722 UART:
2,856,864 UART: [state] CFI Enabled
2,859,490 UART: [state] LifecycleState = Unprovisioned
2,860,145 UART: [state] DebugLocked = No
2,860,791 UART: [state] WD Timer not started. Device not locked for debugging
2,861,962 UART: [kat] SHA2-256
3,665,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,669,641 UART: [kat] ++
3,669,793 UART: [kat] sha1
3,674,037 UART: [kat] SHA2-256
3,675,977 UART: [kat] SHA2-384
3,678,628 UART: [kat] SHA2-512-ACC
3,680,529 UART: [kat] ECC-384
3,689,756 UART: [kat] HMAC-384Kdf
3,694,374 UART: [kat] LMS
3,942,686 UART: [kat] --
3,943,696 UART: [warm-reset] ++
3,943,964 UART: [warm-reset] Prev Cold-Reset failed
3,944,891 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,509 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,774 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,527 UART: [idev] ++
1,172,695 UART: [idev] CDI.KEYID = 6
1,173,056 UART: [idev] SUBJECT.KEYID = 7
1,173,481 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,279 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,241,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,696 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,784 >>> mbox cmd response: success
2,774,995 UART: [afmc] ++
2,775,163 UART: [afmc] CDI.KEYID = 6
2,775,526 UART: [afmc] SUBJECT.KEYID = 7
2,775,952 UART: [afmc] AUTHORITY.KEYID = 5
2,811,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,173 UART:
2,854,189 UART: Running Caliptra ROM ...
2,854,597 UART:
2,854,652 UART: [state] CFI Enabled
2,857,564 UART: [state] LifecycleState = Unprovisioned
2,858,219 UART: [state] DebugLocked = No
2,858,801 UART: [state] WD Timer not started. Device not locked for debugging
2,860,136 UART: [kat] SHA2-256
3,663,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,815 UART: [kat] ++
3,667,967 UART: [kat] sha1
3,672,167 UART: [kat] SHA2-256
3,674,107 UART: [kat] SHA2-384
3,676,802 UART: [kat] SHA2-512-ACC
3,678,703 UART: [kat] ECC-384
3,688,002 UART: [kat] HMAC-384Kdf
3,692,480 UART: [kat] LMS
3,940,792 UART: [kat] --
3,941,526 UART: [warm-reset] ++
3,941,794 UART: [warm-reset] Prev Cold-Reset failed
3,942,925 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,124 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,903 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,385 UART: [kat] SHA2-256
891,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,064 UART: [kat] ++
896,216 UART: [kat] sha1
900,648 UART: [kat] SHA2-256
902,588 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
917,299 UART: [kat] HMAC-384Kdf
921,945 UART: [kat] LMS
1,170,257 UART: [kat] --
1,170,976 UART: [cold-reset] ++
1,171,500 UART: [fht] FHT @ 0x50003400
1,174,072 UART: [idev] ++
1,174,240 UART: [idev] CDI.KEYID = 6
1,174,601 UART: [idev] SUBJECT.KEYID = 7
1,175,026 UART: [idev] UDS.KEYID = 0
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,231 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,793 UART: [ldev] --
1,281,109 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,133 >>> mbox cmd response: success
2,776,258 UART: [afmc] ++
2,776,426 UART: [afmc] CDI.KEYID = 6
2,776,789 UART: [afmc] SUBJECT.KEYID = 7
2,777,215 UART: [afmc] AUTHORITY.KEYID = 5
2,813,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,855,748 UART:
2,855,764 UART: Running Caliptra ROM ...
2,856,172 UART:
2,856,314 UART: [state] CFI Enabled
2,858,858 UART: [state] LifecycleState = Unprovisioned
2,859,513 UART: [state] DebugLocked = No
2,860,125 UART: [state] WD Timer not started. Device not locked for debugging
2,861,316 UART: [kat] SHA2-256
3,664,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,995 UART: [kat] ++
3,669,147 UART: [kat] sha1
3,673,489 UART: [kat] SHA2-256
3,675,429 UART: [kat] SHA2-384
3,678,210 UART: [kat] SHA2-512-ACC
3,680,111 UART: [kat] ECC-384
3,689,946 UART: [kat] HMAC-384Kdf
3,694,740 UART: [kat] LMS
3,943,052 UART: [kat] --
3,943,934 UART: [warm-reset] ++
3,944,202 UART: [warm-reset] Prev Cold-Reset failed
3,945,189 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,093 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,202 UART:
192,596 UART: Running Caliptra ROM ...
193,807 UART:
193,965 UART: [state] CFI Enabled
261,404 UART: [state] LifecycleState = Production
263,638 UART: [state] DebugLocked = No
264,913 UART: [state] WD Timer not started. Device not locked for debugging
269,660 UART: [kat] SHA2-256
451,582 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,144 UART: [kat] ++
463,594 UART: [kat] sha1
473,875 UART: [kat] SHA2-256
476,894 UART: [kat] SHA2-384
484,115 UART: [kat] SHA2-512-ACC
486,777 UART: [kat] ECC-384
3,776,509 UART: [kat] HMAC-384Kdf
3,802,365 UART: [kat] LMS
4,875,505 UART: [kat] --
4,880,595 UART: [cold-reset] ++
4,882,912 UART: [fht] FHT @ 0x50003400
4,895,887 UART: [idev] ++
4,896,621 UART: [idev] CDI.KEYID = 6
4,897,802 UART: [idev] SUBJECT.KEYID = 7
4,898,961 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,509 UART:
1,803 UART: Running Caliptra ROM ...
2,963 UART:
3,122 UART: [state] CFI Enabled
78,620 UART: [state] LifecycleState = Production
80,336 UART: [state] DebugLocked = No
83,108 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
269,932 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
281,448 UART: [kat] ++
282,032 UART: [kat] sha1
292,218 UART: [kat] SHA2-256
295,225 UART: [kat] SHA2-384
300,384 UART: [kat] SHA2-512-ACC
302,989 UART: [kat] ECC-384
3,588,838 UART: [kat] HMAC-384Kdf
3,615,533 UART: [kat] LMS
4,688,664 UART: [kat] --
4,693,376 UART: [warm-reset] ++
4,694,395 UART: [warm-reset] Prev Cold-Reset failed
4,697,477 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,393 UART:
192,773 UART: Running Caliptra ROM ...
193,907 UART:
603,658 UART: [state] CFI Enabled
615,051 UART: [state] LifecycleState = Production
617,256 UART: [state] DebugLocked = No
619,088 UART: [state] WD Timer not started. Device not locked for debugging
624,111 UART: [kat] SHA2-256
806,051 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,637 UART: [kat] ++
818,153 UART: [kat] sha1
828,431 UART: [kat] SHA2-256
831,497 UART: [kat] SHA2-384
837,244 UART: [kat] SHA2-512-ACC
839,863 UART: [kat] ECC-384
4,097,409 UART: [kat] HMAC-384Kdf
4,108,870 UART: [kat] LMS
5,182,055 UART: [kat] --
5,188,105 UART: [cold-reset] ++
5,189,294 UART: [fht] FHT @ 0x50003400
5,201,085 UART: [idev] ++
5,201,755 UART: [idev] CDI.KEYID = 6
5,202,984 UART: [idev] SUBJECT.KEYID = 7
5,204,408 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,715 UART:
2,001 UART: Running Caliptra ROM ...
3,184 UART:
15,263,490 UART: [state] CFI Enabled
15,277,760 UART: [state] LifecycleState = Production
15,279,508 UART: [state] DebugLocked = No
15,281,319 UART: [state] WD Timer not started. Device not locked for debugging
15,286,698 UART: [kat] SHA2-256
15,468,652 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
15,480,201 UART: [kat] ++
15,480,793 UART: [kat] sha1
15,490,497 UART: [kat] SHA2-256
15,493,557 UART: [kat] SHA2-384
15,499,958 UART: [kat] SHA2-512-ACC
15,502,572 UART: [kat] ECC-384
18,755,732 UART: [kat] HMAC-384Kdf
18,767,706 UART: [kat] LMS
19,840,858 UART: [kat] --
19,844,532 UART: [warm-reset] ++
19,845,595 UART: [warm-reset] Prev Cold-Reset failed
19,850,073 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,062 UART:
192,475 UART: Running Caliptra ROM ...
193,661 UART:
193,818 UART: [state] CFI Enabled
264,848 UART: [state] LifecycleState = Production
266,596 UART: [state] DebugLocked = No
267,812 UART: [state] WD Timer not started. Device not locked for debugging
272,158 UART: [kat] SHA2-256
451,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,844 UART: [kat] ++
463,379 UART: [kat] sha1
474,908 UART: [kat] SHA2-256
477,972 UART: [kat] SHA2-384
484,547 UART: [kat] SHA2-512-ACC
487,479 UART: [kat] ECC-384
2,946,426 UART: [kat] HMAC-384Kdf
2,970,863 UART: [kat] LMS
3,500,271 UART: [kat] --
3,506,093 UART: [cold-reset] ++
3,506,997 UART: [fht] FHT @ 0x50003400
3,518,353 UART: [idev] ++
3,518,922 UART: [idev] CDI.KEYID = 6
3,519,900 UART: [idev] SUBJECT.KEYID = 7
3,521,081 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,438 UART:
1,708 UART: Running Caliptra ROM ...
2,885 UART:
3,043 UART: [state] CFI Enabled
67,660 UART: [state] LifecycleState = Production
69,424 UART: [state] DebugLocked = No
72,103 UART: [state] WD Timer not started. Device not locked for debugging
76,051 UART: [kat] SHA2-256
255,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,773 UART: [kat] ++
267,300 UART: [kat] sha1
278,668 UART: [kat] SHA2-256
281,731 UART: [kat] SHA2-384
289,324 UART: [kat] SHA2-512-ACC
292,285 UART: [kat] ECC-384
2,754,621 UART: [kat] HMAC-384Kdf
2,775,226 UART: [kat] LMS
3,304,716 UART: [kat] --
3,308,782 UART: [warm-reset] ++
3,309,591 UART: [warm-reset] Prev Cold-Reset failed
3,312,337 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,406 UART:
192,806 UART: Running Caliptra ROM ...
193,887 UART:
603,379 UART: [state] CFI Enabled
617,494 UART: [state] LifecycleState = Production
619,202 UART: [state] DebugLocked = No
620,467 UART: [state] WD Timer not started. Device not locked for debugging
623,711 UART: [kat] SHA2-256
802,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,418 UART: [kat] ++
814,947 UART: [kat] sha1
825,942 UART: [kat] SHA2-256
829,010 UART: [kat] SHA2-384
833,936 UART: [kat] SHA2-512-ACC
836,921 UART: [kat] ECC-384
3,278,831 UART: [kat] HMAC-384Kdf
3,290,908 UART: [kat] LMS
3,820,365 UART: [kat] --
3,824,464 UART: [cold-reset] ++
3,825,577 UART: [fht] FHT @ 0x50003400
3,837,131 UART: [idev] ++
3,837,690 UART: [idev] CDI.KEYID = 6
3,838,625 UART: [idev] SUBJECT.KEYID = 7
3,839,832 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,460 UART:
1,734 UART: Running Caliptra ROM ...
2,873 UART:
16,616,178 UART: [state] CFI Enabled
16,628,832 UART: [state] LifecycleState = Production
16,630,582 UART: [state] DebugLocked = No
16,633,022 UART: [state] WD Timer not started. Device not locked for debugging
16,637,030 UART: [kat] SHA2-256
16,816,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,827,744 UART: [kat] ++
16,828,200 UART: [kat] sha1
16,839,405 UART: [kat] SHA2-256
16,842,415 UART: [kat] SHA2-384
16,848,073 UART: [kat] SHA2-512-ACC
16,851,009 UART: [kat] ECC-384
19,291,502 UART: [kat] HMAC-384Kdf
19,304,466 UART: [kat] LMS
19,833,911 UART: [kat] --
19,837,633 UART: [warm-reset] ++
19,838,422 UART: [warm-reset] Prev Cold-Reset failed
19,843,017 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,311 UART:
192,694 UART: Running Caliptra ROM ...
193,784 UART:
193,923 UART: [state] CFI Enabled
261,156 UART: [state] LifecycleState = Production
262,911 UART: [state] DebugLocked = No
265,014 UART: [state] WD Timer not started. Device not locked for debugging
268,481 UART: [kat] SHA2-256
447,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,165 UART: [kat] ++
459,617 UART: [kat] sha1
469,792 UART: [kat] SHA2-256
472,857 UART: [kat] SHA2-384
479,589 UART: [kat] SHA2-512-ACC
482,578 UART: [kat] ECC-384
2,947,550 UART: [kat] HMAC-384Kdf
2,972,122 UART: [kat] LMS
3,501,536 UART: [kat] --
3,505,745 UART: [cold-reset] ++
3,506,711 UART: [fht] FHT @ 0x50003400
3,517,798 UART: [idev] ++
3,518,364 UART: [idev] CDI.KEYID = 6
3,519,380 UART: [idev] SUBJECT.KEYID = 7
3,520,485 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,936 UART:
2,231 UART: Running Caliptra ROM ...
3,498 UART:
3,659 UART: [state] CFI Enabled
72,898 UART: [state] LifecycleState = Production
74,622 UART: [state] DebugLocked = No
76,911 UART: [state] WD Timer not started. Device not locked for debugging
81,217 UART: [kat] SHA2-256
260,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
271,894 UART: [kat] ++
272,343 UART: [kat] sha1
284,912 UART: [kat] SHA2-256
287,942 UART: [kat] SHA2-384
294,850 UART: [kat] SHA2-512-ACC
297,837 UART: [kat] ECC-384
2,753,572 UART: [kat] HMAC-384Kdf
2,777,425 UART: [kat] LMS
3,306,849 UART: [kat] --
3,310,976 UART: [warm-reset] ++
3,311,773 UART: [warm-reset] Prev Cold-Reset failed
3,315,251 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,621 UART:
193,013 UART: Running Caliptra ROM ...
194,186 UART:
603,725 UART: [state] CFI Enabled
615,304 UART: [state] LifecycleState = Production
617,013 UART: [state] DebugLocked = No
619,392 UART: [state] WD Timer not started. Device not locked for debugging
623,168 UART: [kat] SHA2-256
802,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,861 UART: [kat] ++
814,308 UART: [kat] sha1
826,657 UART: [kat] SHA2-256
829,700 UART: [kat] SHA2-384
835,945 UART: [kat] SHA2-512-ACC
838,881 UART: [kat] ECC-384
3,280,393 UART: [kat] HMAC-384Kdf
3,294,018 UART: [kat] LMS
3,823,546 UART: [kat] --
3,829,107 UART: [cold-reset] ++
3,830,065 UART: [fht] FHT @ 0x50003400
3,840,608 UART: [idev] ++
3,841,173 UART: [idev] CDI.KEYID = 6
3,842,086 UART: [idev] SUBJECT.KEYID = 7
3,843,304 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,670 UART:
1,938 UART: Running Caliptra ROM ...
3,206 UART:
16,618,434 UART: [state] CFI Enabled
16,634,322 UART: [state] LifecycleState = Production
16,636,016 UART: [state] DebugLocked = No
16,637,939 UART: [state] WD Timer not started. Device not locked for debugging
16,641,036 UART: [kat] SHA2-256
16,820,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,831,728 UART: [kat] ++
16,832,273 UART: [kat] sha1
16,842,354 UART: [kat] SHA2-256
16,845,416 UART: [kat] SHA2-384
16,850,799 UART: [kat] SHA2-512-ACC
16,853,742 UART: [kat] ECC-384
19,294,255 UART: [kat] HMAC-384Kdf
19,306,857 UART: [kat] LMS
19,836,367 UART: [kat] --
19,839,724 UART: [warm-reset] ++
19,840,510 UART: [warm-reset] Prev Cold-Reset failed
19,842,927 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,494 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Production
85,379 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,513 UART:
1,175,529 UART: Running Caliptra ROM ...
1,175,937 UART:
1,175,992 UART: [state] CFI Enabled
1,179,060 UART: [state] LifecycleState = Production
1,179,667 UART: [state] DebugLocked = No
1,180,225 UART: [state] WD Timer not started. Device not locked for debugging
1,181,584 UART: [kat] SHA2-256
1,985,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,263 UART: [kat] ++
1,989,415 UART: [kat] sha1
1,993,629 UART: [kat] SHA2-256
1,995,569 UART: [kat] SHA2-384
1,998,444 UART: [kat] SHA2-512-ACC
2,000,345 UART: [kat] ECC-384
2,009,750 UART: [kat] HMAC-384Kdf
2,014,382 UART: [kat] LMS
2,262,694 UART: [kat] --
2,263,808 UART: [warm-reset] ++
2,264,076 UART: [warm-reset] Prev Cold-Reset failed
2,265,057 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Production
85,678 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,760 UART:
1,175,776 UART: Running Caliptra ROM ...
1,176,184 UART:
1,176,326 UART: [state] CFI Enabled
1,179,160 UART: [state] LifecycleState = Production
1,179,767 UART: [state] DebugLocked = No
1,180,329 UART: [state] WD Timer not started. Device not locked for debugging
1,181,456 UART: [kat] SHA2-256
1,985,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,135 UART: [kat] ++
1,989,287 UART: [kat] sha1
1,993,459 UART: [kat] SHA2-256
1,995,399 UART: [kat] SHA2-384
1,998,020 UART: [kat] SHA2-512-ACC
1,999,921 UART: [kat] ECC-384
2,009,396 UART: [kat] HMAC-384Kdf
2,014,056 UART: [kat] LMS
2,262,368 UART: [kat] --
2,263,172 UART: [warm-reset] ++
2,263,440 UART: [warm-reset] Prev Cold-Reset failed
2,264,361 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Production
85,615 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,617 UART: [idev] ++
1,172,785 UART: [idev] CDI.KEYID = 6
1,173,146 UART: [idev] SUBJECT.KEYID = 7
1,173,571 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,111 UART:
1,175,127 UART: Running Caliptra ROM ...
1,175,535 UART:
1,175,590 UART: [state] CFI Enabled
1,178,342 UART: [state] LifecycleState = Production
1,178,949 UART: [state] DebugLocked = No
1,179,527 UART: [state] WD Timer not started. Device not locked for debugging
1,180,776 UART: [kat] SHA2-256
1,984,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,455 UART: [kat] ++
1,988,607 UART: [kat] sha1
1,992,675 UART: [kat] SHA2-256
1,994,615 UART: [kat] SHA2-384
1,997,214 UART: [kat] SHA2-512-ACC
1,999,115 UART: [kat] ECC-384
2,008,888 UART: [kat] HMAC-384Kdf
2,013,372 UART: [kat] LMS
2,261,684 UART: [kat] --
2,262,532 UART: [warm-reset] ++
2,262,800 UART: [warm-reset] Prev Cold-Reset failed
2,263,851 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,806 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,258 UART:
1,176,274 UART: Running Caliptra ROM ...
1,176,682 UART:
1,176,824 UART: [state] CFI Enabled
1,179,580 UART: [state] LifecycleState = Production
1,180,187 UART: [state] DebugLocked = No
1,180,669 UART: [state] WD Timer not started. Device not locked for debugging
1,181,906 UART: [kat] SHA2-256
1,985,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,585 UART: [kat] ++
1,989,737 UART: [kat] sha1
1,994,161 UART: [kat] SHA2-256
1,996,101 UART: [kat] SHA2-384
1,998,920 UART: [kat] SHA2-512-ACC
2,000,821 UART: [kat] ECC-384
2,010,530 UART: [kat] HMAC-384Kdf
2,015,114 UART: [kat] LMS
2,263,426 UART: [kat] --
2,264,548 UART: [warm-reset] ++
2,264,816 UART: [warm-reset] Prev Cold-Reset failed
2,265,715 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Production
85,227 UART: [state] DebugLocked = No
85,877 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,641 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,349 UART:
1,175,365 UART: Running Caliptra ROM ...
1,175,773 UART:
1,175,828 UART: [state] CFI Enabled
1,178,782 UART: [state] LifecycleState = Production
1,179,389 UART: [state] DebugLocked = No
1,179,877 UART: [state] WD Timer not started. Device not locked for debugging
1,180,990 UART: [kat] SHA2-256
1,984,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,669 UART: [kat] ++
1,988,821 UART: [kat] sha1
1,993,125 UART: [kat] SHA2-256
1,995,065 UART: [kat] SHA2-384
1,997,964 UART: [kat] SHA2-512-ACC
1,999,865 UART: [kat] ECC-384
2,009,818 UART: [kat] HMAC-384Kdf
2,014,340 UART: [kat] LMS
2,262,652 UART: [kat] --
2,263,496 UART: [warm-reset] ++
2,263,764 UART: [warm-reset] Prev Cold-Reset failed
2,264,803 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,097 UART: [state] LifecycleState = Production
86,704 UART: [state] DebugLocked = No
87,420 UART: [state] WD Timer not started. Device not locked for debugging
88,573 UART: [kat] SHA2-256
892,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,252 UART: [kat] ++
896,404 UART: [kat] sha1
900,540 UART: [kat] SHA2-256
902,480 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,918 UART:
1,175,934 UART: Running Caliptra ROM ...
1,176,342 UART:
1,176,484 UART: [state] CFI Enabled
1,179,272 UART: [state] LifecycleState = Production
1,179,879 UART: [state] DebugLocked = No
1,180,371 UART: [state] WD Timer not started. Device not locked for debugging
1,181,520 UART: [kat] SHA2-256
1,985,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,199 UART: [kat] ++
1,989,351 UART: [kat] sha1
1,993,547 UART: [kat] SHA2-256
1,995,487 UART: [kat] SHA2-384
1,998,022 UART: [kat] SHA2-512-ACC
1,999,923 UART: [kat] ECC-384
2,009,874 UART: [kat] HMAC-384Kdf
2,014,458 UART: [kat] LMS
2,262,770 UART: [kat] --
2,263,474 UART: [warm-reset] ++
2,263,742 UART: [warm-reset] Prev Cold-Reset failed
2,264,673 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
5,604 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,056 UART:
192,467 UART: Running Caliptra ROM ...
193,599 UART:
193,748 UART: [state] CFI Enabled
261,248 UART: [state] LifecycleState = Unprovisioned
263,647 UART: [state] DebugLocked = No
265,350 UART: [state] WD Timer not started. Device not locked for debugging
270,747 UART: [kat] SHA2-256
452,682 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,223 UART: [kat] ++
464,760 UART: [kat] sha1
474,562 UART: [kat] SHA2-256
477,573 UART: [kat] SHA2-384
483,919 UART: [kat] SHA2-512-ACC
486,576 UART: [kat] ECC-384
3,776,834 UART: [kat] HMAC-384Kdf
3,802,863 UART: [kat] LMS
4,875,994 UART: [kat] --
4,878,274 UART: [cold-reset] ++
4,881,089 UART: [fht] FHT @ 0x50003400
4,892,720 UART: [idev] ++
4,893,402 UART: [idev] CDI.KEYID = 6
4,894,564 UART: [idev] SUBJECT.KEYID = 7
4,895,774 UART: [idev] UDS.KEYID = 0
4,934,188 UART: [idev] Erasing UDS.KEYID = 0
8,245,875 UART: [idev] Sha1 KeyId Algorithm
8,267,737 UART: [idev] --
8,270,740 UART: [ldev] ++
8,271,313 UART: [ldev] CDI.KEYID = 6
8,272,550 UART: [ldev] SUBJECT.KEYID = 5
8,273,669 UART: [ldev] AUTHORITY.KEYID = 7
8,274,829 UART: [ldev] FE.KEYID = 1
8,299,769 UART: [ldev] Erasing FE.KEYID = 1
11,634,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,995 UART: [ldev] --
14,017,720 UART: [fwproc] Wait for Commands...
14,019,912 UART: [fwproc] Recv command 0x46574c44
14,022,194 UART: [fwproc] Recv'd Img size: 114124 bytes
Initializing fuses
1,135 UART:
1,382 UART: Running Caliptra ROM ...
2,479 UART:
2,636 UART: [state] CFI Enabled
72,160 UART: [state] LifecycleState = Unprovisioned
74,094 UART: [state] DebugLocked = No
76,553 UART: [state] WD Timer not started. Device not locked for debugging
80,837 UART: [kat] SHA2-256
262,736 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
274,272 UART: [kat] ++
274,854 UART: [kat] sha1
285,845 UART: [kat] SHA2-256
288,908 UART: [kat] SHA2-384
295,522 UART: [kat] SHA2-512-ACC
298,127 UART: [kat] ECC-384
3,585,180 UART: [kat] HMAC-384Kdf
3,610,546 UART: [kat] LMS
4,683,648 UART: [kat] --
4,688,017 UART: [warm-reset] ++
4,689,029 UART: [warm-reset] Prev Cold-Reset failed
4,692,545 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
5,440 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
6,986 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,623 UART:
193,021 UART: Running Caliptra ROM ...
194,217 UART:
603,911 UART: [state] CFI Enabled
618,110 UART: [state] LifecycleState = Unprovisioned
620,508 UART: [state] DebugLocked = No
622,046 UART: [state] WD Timer not started. Device not locked for debugging
626,042 UART: [kat] SHA2-256
808,039 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,587 UART: [kat] ++
820,177 UART: [kat] sha1
830,354 UART: [kat] SHA2-256
833,365 UART: [kat] SHA2-384
838,904 UART: [kat] SHA2-512-ACC
841,564 UART: [kat] ECC-384
4,097,394 UART: [kat] HMAC-384Kdf
4,110,191 UART: [kat] LMS
5,183,297 UART: [kat] --
5,187,188 UART: [cold-reset] ++
5,189,060 UART: [fht] FHT @ 0x50003400
5,200,736 UART: [idev] ++
5,201,474 UART: [idev] CDI.KEYID = 6
5,202,646 UART: [idev] SUBJECT.KEYID = 7
5,204,066 UART: [idev] UDS.KEYID = 0
5,217,179 UART: [idev] Erasing UDS.KEYID = 0
8,489,900 UART: [idev] Sha1 KeyId Algorithm
8,511,038 UART: [idev] --
8,513,445 UART: [ldev] ++
8,514,076 UART: [ldev] CDI.KEYID = 6
8,515,256 UART: [ldev] SUBJECT.KEYID = 5
8,516,736 UART: [ldev] AUTHORITY.KEYID = 7
8,518,287 UART: [ldev] FE.KEYID = 1
8,528,874 UART: [ldev] Erasing FE.KEYID = 1
11,821,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,239 UART: [ldev] --
14,185,268 UART: [fwproc] Wait for Commands...
14,188,172 UART: [fwproc] Recv command 0x46574c44
14,190,491 UART: [fwproc] Recv'd Img size: 114124 bytes
Initializing fuses
1,130 UART:
1,371 UART: Running Caliptra ROM ...
2,466 UART:
6,272,953 UART: [state] CFI Enabled
6,284,729 UART: [state] LifecycleState = Unprovisioned
6,286,582 UART: [state] DebugLocked = No
6,289,153 UART: [state] WD Timer not started. Device not locked for debugging
6,293,283 UART: [kat] SHA2-256
6,475,258 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,486,800 UART: [kat] ++
6,487,282 UART: [kat] sha1
6,498,170 UART: [kat] SHA2-256
6,501,181 UART: [kat] SHA2-384
6,506,350 UART: [kat] SHA2-512-ACC
6,508,973 UART: [kat] ECC-384
9,765,950 UART: [kat] HMAC-384Kdf
9,777,058 UART: [kat] LMS
10,850,216 UART: [kat] --
10,855,848 UART: [warm-reset] ++
10,856,915 UART: [warm-reset] Prev Cold-Reset failed
10,860,587 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
6,378 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
5,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,317 UART:
192,697 UART: Running Caliptra ROM ...
193,762 UART:
193,902 UART: [state] CFI Enabled
263,804 UART: [state] LifecycleState = Unprovisioned
265,726 UART: [state] DebugLocked = No
268,272 UART: [state] WD Timer not started. Device not locked for debugging
272,383 UART: [kat] SHA2-256
451,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,100 UART: [kat] ++
463,554 UART: [kat] sha1
474,436 UART: [kat] SHA2-256
477,468 UART: [kat] SHA2-384
483,236 UART: [kat] SHA2-512-ACC
486,176 UART: [kat] ECC-384
2,949,128 UART: [kat] HMAC-384Kdf
2,972,651 UART: [kat] LMS
3,502,129 UART: [kat] --
3,508,523 UART: [cold-reset] ++
3,509,389 UART: [fht] FHT @ 0x50003400
3,520,643 UART: [idev] ++
3,521,210 UART: [idev] CDI.KEYID = 6
3,522,174 UART: [idev] SUBJECT.KEYID = 7
3,523,278 UART: [idev] UDS.KEYID = 0
3,543,470 UART: [idev] Erasing UDS.KEYID = 0
6,025,660 UART: [idev] Sha1 KeyId Algorithm
6,047,925 UART: [idev] --
6,051,813 UART: [ldev] ++
6,052,403 UART: [ldev] CDI.KEYID = 6
6,053,290 UART: [ldev] SUBJECT.KEYID = 5
6,054,510 UART: [ldev] AUTHORITY.KEYID = 7
6,055,755 UART: [ldev] FE.KEYID = 1
6,100,573 UART: [ldev] Erasing FE.KEYID = 1
8,603,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,400 UART: [ldev] --
10,413,733 UART: [fwproc] Wait for Commands...
10,416,212 UART: [fwproc] Recv command 0x46574c44
10,418,307 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,160 UART:
1,357 UART: Running Caliptra ROM ...
2,468 UART:
2,622 UART: [state] CFI Enabled
66,700 UART: [state] LifecycleState = Unprovisioned
68,626 UART: [state] DebugLocked = No
70,739 UART: [state] WD Timer not started. Device not locked for debugging
73,720 UART: [kat] SHA2-256
252,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,416 UART: [kat] ++
264,861 UART: [kat] sha1
276,275 UART: [kat] SHA2-256
279,285 UART: [kat] SHA2-384
286,182 UART: [kat] SHA2-512-ACC
289,171 UART: [kat] ECC-384
2,754,542 UART: [kat] HMAC-384Kdf
2,776,385 UART: [kat] LMS
3,305,869 UART: [kat] --
3,309,344 UART: [warm-reset] ++
3,310,203 UART: [warm-reset] Prev Cold-Reset failed
3,314,635 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
6,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,368 UART:
192,774 UART: Running Caliptra ROM ...
193,858 UART:
603,343 UART: [state] CFI Enabled
619,127 UART: [state] LifecycleState = Unprovisioned
621,001 UART: [state] DebugLocked = No
623,547 UART: [state] WD Timer not started. Device not locked for debugging
627,827 UART: [kat] SHA2-256
806,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,502 UART: [kat] ++
819,067 UART: [kat] sha1
829,258 UART: [kat] SHA2-256
832,262 UART: [kat] SHA2-384
838,462 UART: [kat] SHA2-512-ACC
841,395 UART: [kat] ECC-384
3,284,262 UART: [kat] HMAC-384Kdf
3,297,976 UART: [kat] LMS
3,827,393 UART: [kat] --
3,831,218 UART: [cold-reset] ++
3,832,181 UART: [fht] FHT @ 0x50003400
3,843,077 UART: [idev] ++
3,843,637 UART: [idev] CDI.KEYID = 6
3,844,535 UART: [idev] SUBJECT.KEYID = 7
3,845,748 UART: [idev] UDS.KEYID = 0
3,864,338 UART: [idev] Erasing UDS.KEYID = 0
6,323,879 UART: [idev] Sha1 KeyId Algorithm
6,347,043 UART: [idev] --
6,350,687 UART: [ldev] ++
6,351,257 UART: [ldev] CDI.KEYID = 6
6,352,173 UART: [ldev] SUBJECT.KEYID = 5
6,353,389 UART: [ldev] AUTHORITY.KEYID = 7
6,354,620 UART: [ldev] FE.KEYID = 1
6,364,970 UART: [ldev] Erasing FE.KEYID = 1
8,839,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,759 UART: [ldev] --
10,627,155 UART: [fwproc] Wait for Commands...
10,629,949 UART: [fwproc] Recv command 0x46574c44
10,632,039 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,158 UART:
1,361 UART: Running Caliptra ROM ...
2,467 UART:
9,828,117 UART: [state] CFI Enabled
9,841,945 UART: [state] LifecycleState = Unprovisioned
9,843,800 UART: [state] DebugLocked = No
9,845,589 UART: [state] WD Timer not started. Device not locked for debugging
9,849,216 UART: [kat] SHA2-256
10,028,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,039,888 UART: [kat] ++
10,040,347 UART: [kat] sha1
10,052,652 UART: [kat] SHA2-256
10,055,658 UART: [kat] SHA2-384
10,060,896 UART: [kat] SHA2-512-ACC
10,063,890 UART: [kat] ECC-384
12,504,310 UART: [kat] HMAC-384Kdf
12,516,044 UART: [kat] LMS
13,045,539 UART: [kat] --
13,049,371 UART: [warm-reset] ++
13,050,163 UART: [warm-reset] Prev Cold-Reset failed
13,054,368 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
6,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
5,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,039 UART:
192,465 UART: Running Caliptra ROM ...
193,599 UART:
193,747 UART: [state] CFI Enabled
264,400 UART: [state] LifecycleState = Unprovisioned
266,271 UART: [state] DebugLocked = No
267,815 UART: [state] WD Timer not started. Device not locked for debugging
271,815 UART: [kat] SHA2-256
450,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,518 UART: [kat] ++
463,055 UART: [kat] sha1
474,107 UART: [kat] SHA2-256
477,116 UART: [kat] SHA2-384
482,876 UART: [kat] SHA2-512-ACC
485,864 UART: [kat] ECC-384
2,948,595 UART: [kat] HMAC-384Kdf
2,970,497 UART: [kat] LMS
3,499,919 UART: [kat] --
3,504,090 UART: [cold-reset] ++
3,506,296 UART: [fht] FHT @ 0x50003400
3,516,090 UART: [idev] ++
3,516,665 UART: [idev] CDI.KEYID = 6
3,517,587 UART: [idev] SUBJECT.KEYID = 7
3,518,748 UART: [idev] UDS.KEYID = 0
3,543,363 UART: [idev] Erasing UDS.KEYID = 0
6,024,421 UART: [idev] Sha1 KeyId Algorithm
6,046,090 UART: [idev] --
6,049,660 UART: [ldev] ++
6,050,238 UART: [ldev] CDI.KEYID = 6
6,051,319 UART: [ldev] SUBJECT.KEYID = 5
6,052,435 UART: [ldev] AUTHORITY.KEYID = 7
6,053,617 UART: [ldev] FE.KEYID = 1
6,099,887 UART: [ldev] Erasing FE.KEYID = 1
8,603,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,151 UART: [ldev] --
10,411,899 UART: [fwproc] Wait for Commands...
10,414,431 UART: [fwproc] Recv command 0x46574c44
10,416,547 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,160 UART:
1,337 UART: Running Caliptra ROM ...
2,382 UART:
2,526 UART: [state] CFI Enabled
72,303 UART: [state] LifecycleState = Unprovisioned
74,171 UART: [state] DebugLocked = No
75,955 UART: [state] WD Timer not started. Device not locked for debugging
79,476 UART: [kat] SHA2-256
258,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,196 UART: [kat] ++
270,642 UART: [kat] sha1
282,053 UART: [kat] SHA2-256
285,117 UART: [kat] SHA2-384
291,196 UART: [kat] SHA2-512-ACC
294,146 UART: [kat] ECC-384
2,754,853 UART: [kat] HMAC-384Kdf
2,778,597 UART: [kat] LMS
3,308,034 UART: [kat] --
3,311,878 UART: [warm-reset] ++
3,312,730 UART: [warm-reset] Prev Cold-Reset failed
3,315,560 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
5,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
6,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,478 UART:
192,856 UART: Running Caliptra ROM ...
194,018 UART:
603,764 UART: [state] CFI Enabled
616,912 UART: [state] LifecycleState = Unprovisioned
618,743 UART: [state] DebugLocked = No
620,496 UART: [state] WD Timer not started. Device not locked for debugging
624,870 UART: [kat] SHA2-256
803,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,573 UART: [kat] ++
816,109 UART: [kat] sha1
826,130 UART: [kat] SHA2-256
829,151 UART: [kat] SHA2-384
836,419 UART: [kat] SHA2-512-ACC
839,346 UART: [kat] ECC-384
3,279,848 UART: [kat] HMAC-384Kdf
3,292,292 UART: [kat] LMS
3,821,802 UART: [kat] --
3,826,541 UART: [cold-reset] ++
3,827,930 UART: [fht] FHT @ 0x50003400
3,839,190 UART: [idev] ++
3,839,750 UART: [idev] CDI.KEYID = 6
3,840,684 UART: [idev] SUBJECT.KEYID = 7
3,841,892 UART: [idev] UDS.KEYID = 0
3,857,677 UART: [idev] Erasing UDS.KEYID = 0
6,314,124 UART: [idev] Sha1 KeyId Algorithm
6,337,160 UART: [idev] --
6,340,314 UART: [ldev] ++
6,340,907 UART: [ldev] CDI.KEYID = 6
6,341,825 UART: [ldev] SUBJECT.KEYID = 5
6,342,985 UART: [ldev] AUTHORITY.KEYID = 7
6,344,268 UART: [ldev] FE.KEYID = 1
6,354,907 UART: [ldev] Erasing FE.KEYID = 1
8,831,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,911 UART: [ldev] --
10,621,797 UART: [fwproc] Wait for Commands...
10,624,163 UART: [fwproc] Recv command 0x46574c44
10,626,205 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,153 UART:
1,427 UART: Running Caliptra ROM ...
2,529 UART:
9,834,644 UART: [state] CFI Enabled
9,845,282 UART: [state] LifecycleState = Unprovisioned
9,847,129 UART: [state] DebugLocked = No
9,849,427 UART: [state] WD Timer not started. Device not locked for debugging
9,853,498 UART: [kat] SHA2-256
10,032,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,044,210 UART: [kat] ++
10,044,753 UART: [kat] sha1
10,056,348 UART: [kat] SHA2-256
10,059,414 UART: [kat] SHA2-384
10,066,689 UART: [kat] SHA2-512-ACC
10,069,681 UART: [kat] ECC-384
12,511,869 UART: [kat] HMAC-384Kdf
12,526,019 UART: [kat] LMS
13,055,544 UART: [kat] --
13,059,472 UART: [warm-reset] ++
13,060,268 UART: [warm-reset] Prev Cold-Reset failed
13,062,855 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,240,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,410 UART: [ldev] --
1,279,760 UART: [fwproc] Wait for Commands...
1,280,559 UART: [fwproc] Recv command 0x46574c44
1,281,292 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,033 UART:
1,292,049 UART: Running Caliptra ROM ...
1,292,457 UART:
1,292,512 UART: [state] CFI Enabled
1,295,106 UART: [state] LifecycleState = Unprovisioned
1,295,761 UART: [state] DebugLocked = No
1,296,301 UART: [state] WD Timer not started. Device not locked for debugging
1,297,446 UART: [kat] SHA2-256
2,100,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,125 UART: [kat] ++
2,105,277 UART: [kat] sha1
2,109,431 UART: [kat] SHA2-256
2,111,371 UART: [kat] SHA2-384
2,114,118 UART: [kat] SHA2-512-ACC
2,116,019 UART: [kat] ECC-384
2,125,466 UART: [kat] HMAC-384Kdf
2,130,046 UART: [kat] LMS
2,378,358 UART: [kat] --
2,379,392 UART: [warm-reset] ++
2,379,660 UART: [warm-reset] Prev Cold-Reset failed
2,380,469 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,546 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,293,998 UART:
1,294,014 UART: Running Caliptra ROM ...
1,294,422 UART:
1,294,564 UART: [state] CFI Enabled
1,296,848 UART: [state] LifecycleState = Unprovisioned
1,297,503 UART: [state] DebugLocked = No
1,298,049 UART: [state] WD Timer not started. Device not locked for debugging
1,299,238 UART: [kat] SHA2-256
2,102,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,917 UART: [kat] ++
2,107,069 UART: [kat] sha1
2,111,245 UART: [kat] SHA2-256
2,113,185 UART: [kat] SHA2-384
2,115,796 UART: [kat] SHA2-512-ACC
2,117,697 UART: [kat] ECC-384
2,127,444 UART: [kat] HMAC-384Kdf
2,132,102 UART: [kat] LMS
2,380,414 UART: [kat] --
2,381,436 UART: [warm-reset] ++
2,381,704 UART: [warm-reset] Prev Cold-Reset failed
2,382,671 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,543 UART: [idev] --
1,208,618 UART: [ldev] ++
1,208,786 UART: [ldev] CDI.KEYID = 6
1,209,150 UART: [ldev] SUBJECT.KEYID = 5
1,209,577 UART: [ldev] AUTHORITY.KEYID = 7
1,210,040 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,241,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,336 UART: [fwproc] Wait for Commands...
1,281,033 UART: [fwproc] Recv command 0x46574c44
1,281,766 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,497 UART:
1,292,513 UART: Running Caliptra ROM ...
1,292,921 UART:
1,292,976 UART: [state] CFI Enabled
1,295,874 UART: [state] LifecycleState = Unprovisioned
1,296,529 UART: [state] DebugLocked = No
1,297,111 UART: [state] WD Timer not started. Device not locked for debugging
1,298,334 UART: [kat] SHA2-256
2,101,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,013 UART: [kat] ++
2,106,165 UART: [kat] sha1
2,110,457 UART: [kat] SHA2-256
2,112,397 UART: [kat] SHA2-384
2,115,210 UART: [kat] SHA2-512-ACC
2,117,111 UART: [kat] ECC-384
2,127,002 UART: [kat] HMAC-384Kdf
2,131,490 UART: [kat] LMS
2,379,802 UART: [kat] --
2,380,794 UART: [warm-reset] ++
2,381,062 UART: [warm-reset] Prev Cold-Reset failed
2,382,207 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,976 UART: [kat] ++
896,128 UART: [kat] sha1
900,382 UART: [kat] SHA2-256
902,322 UART: [kat] SHA2-384
905,139 UART: [kat] SHA2-512-ACC
907,040 UART: [kat] ECC-384
917,051 UART: [kat] HMAC-384Kdf
921,741 UART: [kat] LMS
1,170,053 UART: [kat] --
1,170,622 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,688 UART: [idev] ++
1,173,856 UART: [idev] CDI.KEYID = 6
1,174,217 UART: [idev] SUBJECT.KEYID = 7
1,174,642 UART: [idev] UDS.KEYID = 0
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,851 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,294,314 UART:
1,294,330 UART: Running Caliptra ROM ...
1,294,738 UART:
1,294,880 UART: [state] CFI Enabled
1,298,000 UART: [state] LifecycleState = Unprovisioned
1,298,655 UART: [state] DebugLocked = No
1,299,311 UART: [state] WD Timer not started. Device not locked for debugging
1,300,466 UART: [kat] SHA2-256
2,104,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,108,145 UART: [kat] ++
2,108,297 UART: [kat] sha1
2,112,649 UART: [kat] SHA2-256
2,114,589 UART: [kat] SHA2-384
2,117,452 UART: [kat] SHA2-512-ACC
2,119,353 UART: [kat] ECC-384
2,129,108 UART: [kat] HMAC-384Kdf
2,133,806 UART: [kat] LMS
2,382,118 UART: [kat] --
2,383,046 UART: [warm-reset] ++
2,383,314 UART: [warm-reset] Prev Cold-Reset failed
2,384,139 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,181,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,083 UART: [idev] Sha1 KeyId Algorithm
1,206,847 UART: [idev] --
1,207,860 UART: [ldev] ++
1,208,028 UART: [ldev] CDI.KEYID = 6
1,208,392 UART: [ldev] SUBJECT.KEYID = 5
1,208,819 UART: [ldev] AUTHORITY.KEYID = 7
1,209,282 UART: [ldev] FE.KEYID = 1
1,214,184 UART: [ldev] Erasing FE.KEYID = 1
1,240,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,468 UART: [ldev] --
1,279,984 UART: [fwproc] Wait for Commands...
1,280,617 UART: [fwproc] Recv command 0x46574c44
1,281,350 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,191 UART:
1,292,207 UART: Running Caliptra ROM ...
1,292,615 UART:
1,292,670 UART: [state] CFI Enabled
1,295,588 UART: [state] LifecycleState = Unprovisioned
1,296,243 UART: [state] DebugLocked = No
1,296,977 UART: [state] WD Timer not started. Device not locked for debugging
1,298,206 UART: [kat] SHA2-256
2,101,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,885 UART: [kat] ++
2,106,037 UART: [kat] sha1
2,110,227 UART: [kat] SHA2-256
2,112,167 UART: [kat] SHA2-384
2,114,972 UART: [kat] SHA2-512-ACC
2,116,873 UART: [kat] ECC-384
2,126,426 UART: [kat] HMAC-384Kdf
2,130,834 UART: [kat] LMS
2,379,146 UART: [kat] --
2,379,902 UART: [warm-reset] ++
2,380,170 UART: [warm-reset] Prev Cold-Reset failed
2,381,145 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,540 UART: [kat] SHA2-256
902,480 UART: [kat] SHA2-384
905,255 UART: [kat] SHA2-512-ACC
907,156 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,577 UART: [kat] LMS
1,169,889 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,226 UART: [fht] FHT @ 0x50003400
1,173,800 UART: [idev] ++
1,173,968 UART: [idev] CDI.KEYID = 6
1,174,329 UART: [idev] SUBJECT.KEYID = 7
1,174,754 UART: [idev] UDS.KEYID = 0
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,168 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,786 UART: [fwproc] Recv command 0x46574c44
1,283,519 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,294,398 UART:
1,294,414 UART: Running Caliptra ROM ...
1,294,822 UART:
1,294,964 UART: [state] CFI Enabled
1,297,838 UART: [state] LifecycleState = Unprovisioned
1,298,493 UART: [state] DebugLocked = No
1,299,005 UART: [state] WD Timer not started. Device not locked for debugging
1,300,168 UART: [kat] SHA2-256
2,103,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,847 UART: [kat] ++
2,107,999 UART: [kat] sha1
2,112,239 UART: [kat] SHA2-256
2,114,179 UART: [kat] SHA2-384
2,116,928 UART: [kat] SHA2-512-ACC
2,118,829 UART: [kat] ECC-384
2,128,686 UART: [kat] HMAC-384Kdf
2,133,154 UART: [kat] LMS
2,381,466 UART: [kat] --
2,382,250 UART: [warm-reset] ++
2,382,518 UART: [warm-reset] Prev Cold-Reset failed
2,383,571 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
5,596 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,105 UART:
192,487 UART: Running Caliptra ROM ...
193,672 UART:
193,828 UART: [state] CFI Enabled
262,632 UART: [state] LifecycleState = Unprovisioned
265,022 UART: [state] DebugLocked = No
267,811 UART: [state] WD Timer not started. Device not locked for debugging
272,879 UART: [kat] SHA2-256
454,839 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,360 UART: [kat] ++
466,915 UART: [kat] sha1
476,991 UART: [kat] SHA2-256
480,055 UART: [kat] SHA2-384
485,135 UART: [kat] SHA2-512-ACC
487,556 UART: [kat] ECC-384
3,778,948 UART: [kat] HMAC-384Kdf
3,804,975 UART: [kat] LMS
4,878,090 UART: [kat] --
4,884,751 UART: [cold-reset] ++
4,886,691 UART: [fht] FHT @ 0x50003400
4,898,149 UART: [idev] ++
4,898,815 UART: [idev] CDI.KEYID = 6
4,899,973 UART: [idev] SUBJECT.KEYID = 7
4,901,179 UART: [idev] UDS.KEYID = 0
4,932,466 UART: [idev] Erasing UDS.KEYID = 0
8,247,486 UART: [idev] Sha1 KeyId Algorithm
8,269,118 UART: [idev] --
8,272,955 UART: [ldev] ++
8,273,579 UART: [ldev] CDI.KEYID = 6
8,274,736 UART: [ldev] SUBJECT.KEYID = 5
8,275,911 UART: [ldev] AUTHORITY.KEYID = 7
8,277,146 UART: [ldev] FE.KEYID = 1
8,319,549 UART: [ldev] Erasing FE.KEYID = 1
11,656,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,729 UART: [ldev] --
14,041,915 UART: [fwproc] Wait for Commands...
14,043,962 UART: [fwproc] Recv command 0x46574c44
14,046,272 UART: [fwproc] Recv'd Img size: 114124 bytes
18,118,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,196,012 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,264,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,582,539 >>> mbox cmd response: success
18,586,282 UART: [afmc] ++
18,586,866 UART: [afmc] CDI.KEYID = 6
18,588,099 UART: [afmc] SUBJECT.KEYID = 7
18,589,202 UART: [afmc] AUTHORITY.KEYID = 5
21,949,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,249,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,252,164 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,268,332 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,284,408 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,300,350 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,323,300 UART: [afmc] --
24,329,298 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,472,998 UART: [cold-reset] --
24,473,856 UART: [state] Locking Datavault
24,475,009 UART: [state] Locking PCR0, PCR1 and PCR31
24,476,551 UART: [state] Locking ICCM
24,477,456 UART: [exit] Launching FMC @ 0x40000130
24,478,876 UART:
24,479,050 UART: Running Caliptra FMC ...
24,480,148 UART:
24,480,299 UART: [state] CFI Enabled
24,481,159 UART: [fht] FMC Alias Private Key: 7
26,748,112 UART: [art] Extend RT PCRs Done
26,749,339 UART: [art] Lock RT PCRs Done
26,751,204 UART: [art] Populate DV Done
26,756,401 UART: [fht] FMC Alias Private Key: 7
26,757,916 UART: [art] Derive CDI
26,758,651 UART: [art] Store in in slot 0x4
26,818,873 UART: [art] Derive Key Pair
26,819,872 UART: [art] Store priv key in slot 0x5
30,112,700 UART: [art] Derive Key Pair - Done
30,125,532 UART: [art] Signing Cert with AUTHO
30,126,860 UART: RITY.KEYID = 7
32,414,077 UART: [art] Erasing AUTHORITY.KEYID = 7
32,415,594 UART: [art] PUB.X = 05C03C9997B26B44F87506A1A7AF48EC9050B41324961F2C422E6C04FE04C866BF44093378479129E0559455803EB68F
32,422,798 UART: [art] PUB.Y = F1000D2E078CF23F270AF6BF01AE41807A3DA0D320811B4AA38C8FDDBFAC1DBFE4044CA3FF8977FCB0FB7A52D248BC43
32,430,091 UART: [art] SIG.R = A17E01EABC9AA86374F6DEAE3C841EBAA77C1334590C3748366760EB26892646B691CBB4F6CD0CA33AFB6C319F70DCD6
32,437,532 UART: [art] SIG.S = 54E9B3B04BAC4CE0EF62F77657652B3DC800DE1081DC3ACD7A2088066AB1335C91578296082658D7A5F72D3AFFC2A795
33,742,626 UART: Caliptra RT
33,743,309 UART: [state] CFI Enabled
33,905,802 UART: [rt] RT listening for mailbox commands...
33,909,131 UART:
33,909,375 UART: Running Caliptra ROM ...
33,910,477 UART:
33,910,653 UART: [state] CFI Enabled
33,970,378 UART: [state] LifecycleState = Unprovisioned
33,972,264 UART: [state] DebugLocked = No
33,973,923 UART: [state] WD Timer not started. Device not locked for debugging
33,978,908 UART: [kat] SHA2-256
34,160,854 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,172,372 UART: [kat] ++
34,172,909 UART: [kat] sha1
34,183,420 UART: [kat] SHA2-256
34,186,436 UART: [kat] SHA2-384
34,192,790 UART: [kat] SHA2-512-ACC
34,195,403 UART: [kat] ECC-384
37,483,528 UART: [kat] HMAC-384Kdf
37,511,470 UART: [kat] LMS
38,584,655 UART: [kat] --
38,589,362 UART: [update-reset] ++
42,683,607 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,686,437 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
43,068,573 >>> mbox cmd response: success
Initializing fuses
725 UART: [
1,189 UART: Running Caliptra ROM ...
2,207 UART:
2,351 UART: [state] CFI Enabled
73,022 UART: [state] LifecycleState = Unprovisioned
74,954 UART: [state] DebugLocked = No
77,254 UART: [state] WD Timer not started. Device not locked for debugging
82,391 UART: [kat] SHA2-256
264,309 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
275,827 UART: [kat] ++
276,322 UART: [kat] sha1
286,605 UART: [kat] SHA2-256
289,627 UART: [kat] SHA2-384
296,034 UART: [kat] SHA2-512-ACC
298,696 UART: [kat] ECC-384
3,588,005 UART: [kat] HMAC-384Kdf
3,611,785 UART: [kat] LMS
4,684,920 UART: [kat] --
4,689,563 UART: [warm-reset] ++
4,693,875 UART: [warm-reset] Prev Update Reset failed
4,697,239 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
5,842 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,352,002 >>> mbox cmd response: success
24,024,497 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,168,795 UART:
24,169,206 UART: Running Caliptra FMC ...
24,170,412 UART:
24,170,582 UART: [state] CFI Enabled
24,171,541 UART: [fht] FMC Alias Private Key: 7
26,444,610 UART: [art] Extend RT PCRs Done
26,445,843 UART: [art] Lock RT PCRs Done
26,447,738 UART: [art] Populate DV Done
26,452,981 UART: [fht] FMC Alias Private Key: 7
26,454,575 UART: [art] Derive CDI
26,455,392 UART: [art] Store in in slot 0x4
26,515,329 UART: [art] Derive Key Pair
26,516,340 UART: [art] Store priv key in slot 0x5
29,809,336 UART: [art] Derive Key Pair - Done
29,822,162 UART: [art] Signing Cert with AUTHO
29,823,488 UART: RITY.KEYID = 7
32,110,968 UART: [art] Erasing AUTHORITY.KEYID = 7
32,112,473 UART: [art] PUB.X = C2741DA23CFD97B94D5072555AE27A543756E3269D239BB931FB5DE6DCF6A287254CE26A3273D094A881891BB2CE59A8
32,119,672 UART: [art] PUB.Y = D5030DD1E718BAC31338A165032330B40BA7191A06B3D7BA3CEDCBFF4AB1AFF44F74FEBE858ED68F6C256B9175CFD3FF
32,126,984 UART: [art] SIG.R = 350B1CD88FB07030E46CFF065C9A12A2DECE3162291E9B6E0127FCEB294F0FDFF0CDB35692F941E3C6FA6F94571FA26F
32,134,369 UART: [art] SIG.S = C916337686E3BF28BA9046FD4A2EA392266CDA7104D22F275B69EB27E5F8962F0AE37256DA11903E9AC771949B7C2CFA
33,439,165 UART: Caliptra RT
33,439,880 UART: [state] CFI Enabled
33,602,111 UART: [rt] RT listening for mailbox commands...
42,669,139 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
6,319 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,398 UART:
192,809 UART: Running Caliptra ROM ...
193,916 UART:
603,556 UART: [state] CFI Enabled
619,878 UART: [state] LifecycleState = Unprovisioned
622,211 UART: [state] DebugLocked = No
623,691 UART: [state] WD Timer not started. Device not locked for debugging
627,639 UART: [kat] SHA2-256
809,602 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,186 UART: [kat] ++
821,685 UART: [kat] sha1
832,397 UART: [kat] SHA2-256
835,464 UART: [kat] SHA2-384
841,114 UART: [kat] SHA2-512-ACC
843,739 UART: [kat] ECC-384
4,096,724 UART: [kat] HMAC-384Kdf
4,110,104 UART: [kat] LMS
5,183,221 UART: [kat] --
5,187,063 UART: [cold-reset] ++
5,188,568 UART: [fht] FHT @ 0x50003400
5,199,219 UART: [idev] ++
5,199,888 UART: [idev] CDI.KEYID = 6
5,201,118 UART: [idev] SUBJECT.KEYID = 7
5,202,546 UART: [idev] UDS.KEYID = 0
5,218,202 UART: [idev] Erasing UDS.KEYID = 0
8,489,148 UART: [idev] Sha1 KeyId Algorithm
8,511,310 UART: [idev] --
8,515,362 UART: [ldev] ++
8,515,930 UART: [ldev] CDI.KEYID = 6
8,517,164 UART: [ldev] SUBJECT.KEYID = 5
8,518,611 UART: [ldev] AUTHORITY.KEYID = 7
8,520,172 UART: [ldev] FE.KEYID = 1
8,533,170 UART: [ldev] Erasing FE.KEYID = 1
11,825,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,858 UART: [ldev] --
14,190,329 UART: [fwproc] Wait for Commands...
14,191,991 UART: [fwproc] Recv command 0x46574c44
14,194,304 UART: [fwproc] Recv'd Img size: 114124 bytes
18,271,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,342,892 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,411,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,729,057 >>> mbox cmd response: success
18,733,956 UART: [afmc] ++
18,734,545 UART: [afmc] CDI.KEYID = 6
18,735,730 UART: [afmc] SUBJECT.KEYID = 7
18,736,888 UART: [afmc] AUTHORITY.KEYID = 5
22,049,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,345,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,347,409 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,363,600 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,379,638 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,395,636 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,417,977 UART: [afmc] --
24,423,464 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,566,768 UART: [cold-reset] --
24,567,751 UART: [state] Locking Datavault
24,568,821 UART: [state] Locking PCR0, PCR1 and PCR31
24,570,355 UART: [state] Locking ICCM
24,571,279 UART: [exit] Launching FMC @ 0x40000130
24,572,698 UART:
24,572,852 UART: Running Caliptra FMC ...
24,573,941 UART:
24,574,086 UART: [state] CFI Enabled
24,574,954 UART: [fht] FMC Alias Private Key: 7
26,784,416 UART: [art] Extend RT PCRs Done
26,785,643 UART: [art] Lock RT PCRs Done
26,787,158 UART: [art] Populate DV Done
26,792,568 UART: [fht] FMC Alias Private Key: 7
26,794,056 UART: [art] Derive CDI
26,794,815 UART: [art] Store in in slot 0x4
26,837,199 UART: [art] Derive Key Pair
26,838,237 UART: [art] Store priv key in slot 0x5
30,079,752 UART: [art] Derive Key Pair - Done
30,092,658 UART: [art] Signing Cert with AUTHO
30,094,024 UART: RITY.KEYID = 7
32,373,617 UART: [art] Erasing AUTHORITY.KEYID = 7
32,375,129 UART: [art] PUB.X = 3A79F2CA367E1844FC0323AB7F7325DB5E60599A6E6B23AA43C02E6EFA58DAE5AC6CA136E6039976323D623467F7FEB8
32,382,364 UART: [art] PUB.Y = 4DCE5620605BF9B180C4507905E403A76955FE1E8C8D444B7218457166B85B2750640FE61AAA6FB5BC3309B218615F3F
32,389,586 UART: [art] SIG.R = 4FDA3080DA9BFAA4183364207FBDB0BDDDEFC6C0A23B31591B2C489715DD2756CB33355807685678176E6A5C42777BFC
32,396,967 UART: [art] SIG.S = 2BEA5F01649286FC9539C9856DB9C0EB593B08FFA9091798A5E8BC700C83F9ED4D2FD9C8960A83DDD2EA529B4CBECE11
33,702,382 UART: Caliptra RT
33,703,099 UART: [state] CFI Enabled
33,820,107 UART: [rt] RT listening for mailbox commands...
33,823,438 UART:
33,823,687 UART: Running Caliptra ROM ...
33,824,787 UART:
33,825,048 UART: [state] CFI Enabled
33,840,981 UART: [state] LifecycleState = Unprovisioned
33,842,811 UART: [state] DebugLocked = No
33,844,776 UART: [state] WD Timer not started. Device not locked for debugging
33,849,176 UART: [kat] SHA2-256
34,031,130 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,042,682 UART: [kat] ++
34,043,220 UART: [kat] sha1
34,052,647 UART: [kat] SHA2-256
34,055,668 UART: [kat] SHA2-384
34,060,683 UART: [kat] SHA2-512-ACC
34,063,306 UART: [kat] ECC-384
37,314,619 UART: [kat] HMAC-384Kdf
37,326,963 UART: [kat] LMS
38,400,123 UART: [kat] --
38,403,435 UART: [update-reset] ++
42,500,496 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,503,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
42,885,331 >>> mbox cmd response: success
Initializing fuses
758 UART: [upd
1,322 UART: Running Caliptra ROM ...
2,544 UART:
412,232 UART: [state] CFI Enabled
428,752 UART: [state] LifecycleState = Unprovisioned
430,577 UART: [state] DebugLocked = No
433,357 UART: [state] WD Timer not started. Device not locked for debugging
437,585 UART: [kat] SHA2-256
619,569 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
631,100 UART: [kat] ++
631,680 UART: [kat] sha1
642,401 UART: [kat] SHA2-256
645,449 UART: [kat] SHA2-384
650,885 UART: [kat] SHA2-512-ACC
653,495 UART: [kat] ECC-384
3,909,818 UART: [kat] HMAC-384Kdf
3,921,689 UART: [kat] LMS
4,994,795 UART: [kat] --
4,998,389 UART: [warm-reset] ++
5,002,485 UART: [warm-reset] Prev Update Reset failed
5,005,490 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
6,096 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,537,286 >>> mbox cmd response: success
24,162,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,306,122 UART:
24,306,499 UART: Running Caliptra FMC ...
24,307,622 UART:
24,307,765 UART: [state] CFI Enabled
24,308,722 UART: [fht] FMC Alias Private Key: 7
26,515,745 UART: [art] Extend RT PCRs Done
26,516,975 UART: [art] Lock RT PCRs Done
26,518,898 UART: [art] Populate DV Done
26,524,146 UART: [fht] FMC Alias Private Key: 7
26,525,630 UART: [art] Derive CDI
26,526,390 UART: [art] Store in in slot 0x4
26,569,271 UART: [art] Derive Key Pair
26,570,312 UART: [art] Store priv key in slot 0x5
29,812,239 UART: [art] Derive Key Pair - Done
29,825,243 UART: [art] Signing Cert with AUTHO
29,826,547 UART: RITY.KEYID = 7
32,105,820 UART: [art] Erasing AUTHORITY.KEYID = 7
32,107,329 UART: [art] PUB.X = 85F372EBFFEBF482EAFC5CE0AC74B86777FA46776ACCFC49EA82965C674AC24594484EF22647E2C2C3E7A593713C0DF7
32,114,602 UART: [art] PUB.Y = AC72A80A5E68C349D8F9F9F7C0C343B8D51006E29629A4F7F8E169CE1D093CB06E692E39506D94F75B5D5C75D9B1F107
32,121,827 UART: [art] SIG.R = 5885F9A3939B9E2F02886D85089A1C5C3A3054D4E94DD74467F8C3F1A622B1949AAF29873E366B789ED7E4350D1BC879
32,129,187 UART: [art] SIG.S = E8252FA8718E506379CBDEF58B6BF86567298DABDE75E312E655BE3663CE64E14D73632303BB78D33F76B12BFD77860A
33,434,888 UART: Caliptra RT
33,435,601 UART: [state] CFI Enabled
33,551,980 UART: [rt] RT listening for mailbox commands...
42,518,093 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
5,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,157 UART:
192,766 UART: Running Caliptra ROM ...
193,962 UART:
194,123 UART: [state] CFI Enabled
265,354 UART: [state] LifecycleState = Unprovisioned
267,225 UART: [state] DebugLocked = No
268,974 UART: [state] WD Timer not started. Device not locked for debugging
272,383 UART: [kat] SHA2-256
451,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,095 UART: [kat] ++
463,663 UART: [kat] sha1
475,250 UART: [kat] SHA2-256
478,309 UART: [kat] SHA2-384
484,609 UART: [kat] SHA2-512-ACC
487,596 UART: [kat] ECC-384
2,951,803 UART: [kat] HMAC-384Kdf
2,973,828 UART: [kat] LMS
3,503,266 UART: [kat] --
3,508,696 UART: [cold-reset] ++
3,509,880 UART: [fht] FHT @ 0x50003400
3,521,836 UART: [idev] ++
3,522,415 UART: [idev] CDI.KEYID = 6
3,523,299 UART: [idev] SUBJECT.KEYID = 7
3,524,514 UART: [idev] UDS.KEYID = 0
3,545,089 UART: [idev] Erasing UDS.KEYID = 0
6,028,698 UART: [idev] Sha1 KeyId Algorithm
6,051,787 UART: [idev] --
6,055,766 UART: [ldev] ++
6,056,354 UART: [ldev] CDI.KEYID = 6
6,057,245 UART: [ldev] SUBJECT.KEYID = 5
6,058,464 UART: [ldev] AUTHORITY.KEYID = 7
6,059,626 UART: [ldev] FE.KEYID = 1
6,103,892 UART: [ldev] Erasing FE.KEYID = 1
8,606,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,200 UART: [ldev] --
10,415,166 UART: [fwproc] Wait for Commands...
10,417,753 UART: [fwproc] Recv command 0x46574c44
10,419,854 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,462 >>> mbox cmd response: success
14,287,949 UART: [afmc] ++
14,288,539 UART: [afmc] CDI.KEYID = 6
14,289,448 UART: [afmc] SUBJECT.KEYID = 7
14,290,611 UART: [afmc] AUTHORITY.KEYID = 5
16,829,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,813 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,452 UART: [afmc] --
18,631,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,776,023 UART: [cold-reset] --
18,776,891 UART: [state] Locking Datavault
18,778,050 UART: [state] Locking PCR0, PCR1 and PCR31
18,779,595 UART: [state] Locking ICCM
18,780,501 UART: [exit] Launching FMC @ 0x40000130
18,781,927 UART:
18,782,087 UART: Running Caliptra FMC ...
18,783,193 UART:
18,783,349 UART: [state] CFI Enabled
18,784,188 UART: [fht] FMC Alias Private Key: 7
20,477,985 UART: [art] Extend RT PCRs Done
20,479,206 UART: [art] Lock RT PCRs Done
20,481,154 UART: [art] Populate DV Done
20,486,407 UART: [fht] FMC Alias Private Key: 7
20,488,170 UART: [art] Derive CDI
20,488,989 UART: [art] Store in in slot 0x4
20,545,521 UART: [art] Derive Key Pair
20,546,555 UART: [art] Store priv key in slot 0x5
23,009,817 UART: [art] Derive Key Pair - Done
23,022,988 UART: [art] Signing Cert with AUTHO
23,024,293 UART: RITY.KEYID = 7
24,735,196 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,710 UART: [art] PUB.X = 0A389E0092030278C6680014F6D92FD3D317D37C28EA8C2FAA3B91E5D5263CE61F50F57CA1244334B1AFED9EEEAAE6F4
24,743,954 UART: [art] PUB.Y = B461351AFDDC2900AE6EBE8346E1F13B1DD942CCF0B0EE283F10F23C47B561A8C634C8AE1D06ACFAF4E7FAA5E69BDD73
24,751,243 UART: [art] SIG.R = 309E31C6B68DA5635E9223F99794223A28295272371FB0E1BE3D99143D59BAE1BDCB773281AED518C2D8931B02385040
24,758,612 UART: [art] SIG.S = 0CF880ABF4329FB4659E942AA408ECB29E25D6DAC2A7DB39C97E539CE6C07A043FC94F6B5AB863E392CFFE241C4A04EA
25,737,654 UART: Caliptra RT
25,738,358 UART: [state] CFI Enabled
25,903,172 UART: [rt] RT listening for mailbox commands...
25,905,908 UART:
25,906,163 UART: Running Caliptra ROM ...
25,907,271 UART:
25,907,453 UART: [state] CFI Enabled
25,968,752 UART: [state] LifecycleState = Unprovisioned
25,970,621 UART: [state] DebugLocked = No
25,973,032 UART: [state] WD Timer not started. Device not locked for debugging
25,976,668 UART: [kat] SHA2-256
26,155,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,167,387 UART: [kat] ++
26,167,922 UART: [kat] sha1
26,177,783 UART: [kat] SHA2-256
26,180,802 UART: [kat] SHA2-384
26,186,898 UART: [kat] SHA2-512-ACC
26,189,841 UART: [kat] ECC-384
28,653,504 UART: [kat] HMAC-384Kdf
28,677,549 UART: [kat] LMS
29,207,017 UART: [kat] --
29,210,422 UART: [update-reset] ++
32,635,555 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,639,156 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,022,494 >>> mbox cmd response: success
Initializing fuses
725 UART: [
1,194 UART: Running Caliptra ROM ...
2,309 UART:
2,459 UART: [state] CFI Enabled
71,241 UART: [state] LifecycleState = Unprovisioned
73,110 UART: [state] DebugLocked = No
75,705 UART: [state] WD Timer not started. Device not locked for debugging
79,011 UART: [kat] SHA2-256
258,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,696 UART: [kat] ++
270,138 UART: [kat] sha1
280,739 UART: [kat] SHA2-256
283,770 UART: [kat] SHA2-384
290,608 UART: [kat] SHA2-512-ACC
293,577 UART: [kat] ECC-384
2,756,337 UART: [kat] HMAC-384Kdf
2,780,123 UART: [kat] LMS
3,309,594 UART: [kat] --
3,314,551 UART: [warm-reset] ++
3,316,102 UART: [warm-reset] Prev Update Reset failed
3,319,788 UART: ROM Fatal Error: 0x01040011test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
5,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,711 >>> mbox cmd response: success
18,329,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,473,743 UART:
18,474,131 UART: Running Caliptra FMC ...
18,475,300 UART:
18,475,466 UART: [state] CFI Enabled
18,476,444 UART: [fht] FMC Alias Private Key: 7
20,173,679 UART: [art] Extend RT PCRs Done
20,174,929 UART: [art] Lock RT PCRs Done
20,176,697 UART: [art] Populate DV Done
20,181,991 UART: [fht] FMC Alias Private Key: 7
20,183,645 UART: [art] Derive CDI
20,184,383 UART: [art] Store in in slot 0x4
20,243,030 UART: [art] Derive Key Pair
20,244,079 UART: [art] Store priv key in slot 0x5
22,707,047 UART: [art] Derive Key Pair - Done
22,719,892 UART: [art] Signing Cert with AUTHO
22,721,193 UART: RITY.KEYID = 7
24,432,900 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,405 UART: [art] PUB.X = 4904913FF2E25F22879FA0E2C72A5BB070439605C268F771047FCC3D871788BACEECCE3FC432B86C8A2B1EB62B2CCD76
24,441,717 UART: [art] PUB.Y = F26D178349FD906354EA6D9085D57860A67ABC2BEC9671C9DB62BB552AE790B99111EA9D5F1C575B0DDFB61E25963061
24,448,940 UART: [art] SIG.R = 1F4E6763D79FEE05BD11D5D03605CB89BD900BED8ED6A668B5AAC00B18828DAF8D50F632F3DD60C877CC76BCB3FCB15F
24,456,371 UART: [art] SIG.S = 826205FEBA1748C1733B76899D672D71568B96F80DF8C3442D06E1077670EC0D0F7A47D0198DF31878324B9EC6A1347F
25,435,019 UART: Caliptra RT
25,435,739 UART: [state] CFI Enabled
25,600,453 UART: [rt] RT listening for mailbox commands...
32,567,608 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
6,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,265 UART:
192,648 UART: Running Caliptra ROM ...
193,811 UART:
603,405 UART: [state] CFI Enabled
617,470 UART: [state] LifecycleState = Unprovisioned
619,305 UART: [state] DebugLocked = No
620,595 UART: [state] WD Timer not started. Device not locked for debugging
624,328 UART: [kat] SHA2-256
803,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,004 UART: [kat] ++
815,458 UART: [kat] sha1
825,739 UART: [kat] SHA2-256
828,812 UART: [kat] SHA2-384
834,881 UART: [kat] SHA2-512-ACC
837,876 UART: [kat] ECC-384
3,280,875 UART: [kat] HMAC-384Kdf
3,293,585 UART: [kat] LMS
3,823,067 UART: [kat] --
3,829,221 UART: [cold-reset] ++
3,831,170 UART: [fht] FHT @ 0x50003400
3,843,012 UART: [idev] ++
3,843,582 UART: [idev] CDI.KEYID = 6
3,844,594 UART: [idev] SUBJECT.KEYID = 7
3,845,748 UART: [idev] UDS.KEYID = 0
3,862,807 UART: [idev] Erasing UDS.KEYID = 0
6,317,349 UART: [idev] Sha1 KeyId Algorithm
6,340,677 UART: [idev] --
6,343,488 UART: [ldev] ++
6,344,056 UART: [ldev] CDI.KEYID = 6
6,344,942 UART: [ldev] SUBJECT.KEYID = 5
6,346,150 UART: [ldev] AUTHORITY.KEYID = 7
6,347,626 UART: [ldev] FE.KEYID = 1
6,357,201 UART: [ldev] Erasing FE.KEYID = 1
8,829,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,094 UART: [ldev] --
10,622,775 UART: [fwproc] Wait for Commands...
10,624,870 UART: [fwproc] Recv command 0x46574c44
10,626,961 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,805 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,804 >>> mbox cmd response: success
14,502,993 UART: [afmc] ++
14,503,578 UART: [afmc] CDI.KEYID = 6
14,504,491 UART: [afmc] SUBJECT.KEYID = 7
14,505,702 UART: [afmc] AUTHORITY.KEYID = 5
17,004,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,701 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,865 UART: [afmc] --
18,804,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,948,729 UART: [cold-reset] --
18,949,583 UART: [state] Locking Datavault
18,950,658 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,195 UART: [state] Locking ICCM
18,953,075 UART: [exit] Launching FMC @ 0x40000130
18,954,419 UART:
18,954,567 UART: Running Caliptra FMC ...
18,955,661 UART:
18,955,812 UART: [state] CFI Enabled
18,956,667 UART: [fht] FMC Alias Private Key: 7
20,591,409 UART: [art] Extend RT PCRs Done
20,592,624 UART: [art] Lock RT PCRs Done
20,594,271 UART: [art] Populate DV Done
20,599,896 UART: [fht] FMC Alias Private Key: 7
20,601,498 UART: [art] Derive CDI
20,602,306 UART: [art] Store in in slot 0x4
20,644,465 UART: [art] Derive Key Pair
20,645,459 UART: [art] Store priv key in slot 0x5
23,072,374 UART: [art] Derive Key Pair - Done
23,085,264 UART: [art] Signing Cert with AUTHO
23,086,562 UART: RITY.KEYID = 7
24,791,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,391 UART: [art] PUB.X = 01B0F5027EDB28DC0CBD5A2B17EB36D3FF572FB64B1D0F73BD61067C22F22C7D16D3E587D872B3907A22022FD061DF33
24,800,682 UART: [art] PUB.Y = AE19538D373061EDAB09E9A78A97211AD6F0040231C4DACE64DC14E02A05809E2EB3D7EB7DCA33C93D5E9C363FFC9881
24,807,956 UART: [art] SIG.R = 408A46755E5530A69FF165CE133CA22204D3BF1212B1C9C81AA022CC34D9C81B7EDBB52C6E0C5784A7F51D27E9BA09A0
24,815,365 UART: [art] SIG.S = D8DBDE7083E8EA2C5834D1573118D0A3C84F5005BF2BE1EAC8FC1C231F708C36947FB7A06EE2076F55CC6E1A6455C011
25,794,715 UART: Caliptra RT
25,795,433 UART: [state] CFI Enabled
25,913,790 UART: [rt] RT listening for mailbox commands...
25,916,638 UART:
25,916,806 UART: Running Caliptra ROM ...
25,917,915 UART:
25,918,179 UART: [state] CFI Enabled
25,935,162 UART: [state] LifecycleState = Unprovisioned
25,936,993 UART: [state] DebugLocked = No
25,938,799 UART: [state] WD Timer not started. Device not locked for debugging
25,942,101 UART: [kat] SHA2-256
26,121,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,132,876 UART: [kat] ++
26,133,331 UART: [kat] sha1
26,144,374 UART: [kat] SHA2-256
26,147,411 UART: [kat] SHA2-384
26,154,364 UART: [kat] SHA2-512-ACC
26,157,304 UART: [kat] ECC-384
28,599,298 UART: [kat] HMAC-384Kdf
28,613,029 UART: [kat] LMS
29,142,521 UART: [kat] --
29,146,934 UART: [update-reset] ++
32,568,063 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,571,074 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
32,954,358 >>> mbox cmd response: success
Initializing fuses
1,045 UART:
1,208 UART: Running Caliptra ROM ...
2,320 UART:
7,616,129 UART: [state] CFI Enabled
7,628,596 UART: [state] LifecycleState = Unprovisioned
7,630,468 UART: [state] DebugLocked = No
7,632,829 UART: [state] WD Timer not started. Device not locked for debugging
7,637,149 UART: [kat] SHA2-256
7,816,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,827,876 UART: [kat] ++
7,828,334 UART: [kat] sha1
7,838,946 UART: [kat] SHA2-256
7,841,953 UART: [kat] SHA2-384
7,848,584 UART: [kat] SHA2-512-ACC
7,851,517 UART: [kat] ECC-384
10,294,417 UART: [kat] HMAC-384Kdf
10,307,174 UART: [kat] LMS
10,836,650 UART: [kat] --
10,839,227 UART: [warm-reset] ++
10,841,851 UART: [warm-reset] Prev Update Reset failed
10,844,881 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
6,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,707 >>> mbox cmd response: success
18,514,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,658,394 UART:
18,658,776 UART: Running Caliptra FMC ...
18,659,868 UART:
18,660,038 UART: [state] CFI Enabled
18,661,020 UART: [fht] FMC Alias Private Key: 7
20,297,070 UART: [art] Extend RT PCRs Done
20,298,292 UART: [art] Lock RT PCRs Done
20,299,838 UART: [art] Populate DV Done
20,305,472 UART: [fht] FMC Alias Private Key: 7
20,307,119 UART: [art] Derive CDI
20,308,056 UART: [art] Store in in slot 0x4
20,350,509 UART: [art] Derive Key Pair
20,351,515 UART: [art] Store priv key in slot 0x5
22,778,326 UART: [art] Derive Key Pair - Done
22,791,524 UART: [art] Signing Cert with AUTHO
22,792,858 UART: RITY.KEYID = 7
24,498,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,683 UART: [art] PUB.X = 0492438AA2BBBC201740C607BA93C4093A4BE9EFDCE9601CA2AED0E4654193594EC65484DAFC1DC48485FE0FB83E97E5
24,506,983 UART: [art] PUB.Y = 4CE05A3ACC26BF4F668E04D633A30D87850351BB0B11494A3F5321F7FB651075632EAC5188ECB99F5A4BBCA3219DF5CC
24,514,259 UART: [art] SIG.R = C7228ED721D6838A78F0361BA89059B832E70E49F21D3D424E56B0D94A3679A40AB3672759848A89F8857F5EF360E616
24,521,597 UART: [art] SIG.S = C8DE1ED1AEE3D35E355EF1DB169EB62DF3BB3092E3032C29EC010460E07E4898D249D09984075D0F561093B07DD7B41F
25,500,281 UART: Caliptra RT
25,500,978 UART: [state] CFI Enabled
25,618,456 UART: [rt] RT listening for mailbox commands...
32,531,623 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
5,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,092 UART:
192,467 UART: Running Caliptra ROM ...
193,620 UART:
193,779 UART: [state] CFI Enabled
267,851 UART: [state] LifecycleState = Unprovisioned
269,718 UART: [state] DebugLocked = No
271,705 UART: [state] WD Timer not started. Device not locked for debugging
276,249 UART: [kat] SHA2-256
455,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,975 UART: [kat] ++
467,498 UART: [kat] sha1
477,806 UART: [kat] SHA2-256
480,815 UART: [kat] SHA2-384
487,708 UART: [kat] SHA2-512-ACC
490,636 UART: [kat] ECC-384
2,947,811 UART: [kat] HMAC-384Kdf
2,972,638 UART: [kat] LMS
3,502,071 UART: [kat] --
3,506,373 UART: [cold-reset] ++
3,508,635 UART: [fht] FHT @ 0x50003400
3,520,443 UART: [idev] ++
3,521,007 UART: [idev] CDI.KEYID = 6
3,521,891 UART: [idev] SUBJECT.KEYID = 7
3,523,158 UART: [idev] UDS.KEYID = 0
3,543,517 UART: [idev] Erasing UDS.KEYID = 0
6,028,259 UART: [idev] Sha1 KeyId Algorithm
6,051,816 UART: [idev] --
6,055,596 UART: [ldev] ++
6,056,168 UART: [ldev] CDI.KEYID = 6
6,057,096 UART: [ldev] SUBJECT.KEYID = 5
6,058,199 UART: [ldev] AUTHORITY.KEYID = 7
6,059,484 UART: [ldev] FE.KEYID = 1
6,099,544 UART: [ldev] Erasing FE.KEYID = 1
8,603,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,964 UART: [ldev] --
10,410,293 UART: [fwproc] Wait for Commands...
10,413,297 UART: [fwproc] Recv command 0x46574c44
10,415,405 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,762 >>> mbox cmd response: success
14,290,004 UART: [afmc] ++
14,290,607 UART: [afmc] CDI.KEYID = 6
14,291,526 UART: [afmc] SUBJECT.KEYID = 7
14,292,691 UART: [afmc] AUTHORITY.KEYID = 5
16,824,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,521 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,300 UART: [afmc] --
18,631,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,775,401 UART: [cold-reset] --
18,776,250 UART: [state] Locking Datavault
18,777,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,778,941 UART: [state] Locking ICCM
18,779,849 UART: [exit] Launching FMC @ 0x40000130
18,781,273 UART:
18,781,437 UART: Running Caliptra FMC ...
18,782,534 UART:
18,782,687 UART: [state] CFI Enabled
18,783,544 UART: [fht] FMC Alias Private Key: 7
20,473,497 UART: [art] Extend RT PCRs Done
20,474,712 UART: [art] Lock RT PCRs Done
20,476,277 UART: [art] Populate DV Done
20,481,967 UART: [fht] FMC Alias Private Key: 7
20,483,506 UART: [art] Derive CDI
20,484,322 UART: [art] Store in in slot 0x4
20,542,748 UART: [art] Derive Key Pair
20,543,789 UART: [art] Store priv key in slot 0x5
23,006,626 UART: [art] Derive Key Pair - Done
23,019,575 UART: [art] Signing Cert with AUTHO
23,020,886 UART: RITY.KEYID = 7
24,732,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,382 UART: [art] PUB.X = 9D96836145890856AF93359FFD4071ADE31A1B77CF98B7497EF65F13A22AEC4B619A4B82B1A5C0410645E6B88598FF16
24,741,624 UART: [art] PUB.Y = 16B19A3FD835598FA9A6A5DCD87A7B5C3EC83D40D1227CE2C5F75C14658E01AE9D4D13690ADD0500A7B9DC3E907B23AA
24,748,905 UART: [art] SIG.R = FC8FD9AD582D8F8FC1136903827BC6DBF9C39D8CF519557163B4442A32A8CE468997CF6E4B636980412D734E22B9CF42
24,756,303 UART: [art] SIG.S = 33976BBE7E58D0BC83BAF1336F3B4AF6300D059D99C7550E48C74E1E5EDBD51C125BA747CCC823C654D9FFAA23276AEA
25,735,034 UART: Caliptra RT
25,735,724 UART: [state] CFI Enabled
25,899,644 UART: [rt] RT listening for mailbox commands...
25,902,807 UART:
25,903,052 UART: Running Caliptra ROM ...
25,904,160 UART:
25,904,318 UART: [state] CFI Enabled
25,965,735 UART: [state] LifecycleState = Unprovisioned
25,967,602 UART: [state] DebugLocked = No
25,969,584 UART: [state] WD Timer not started. Device not locked for debugging
25,972,741 UART: [kat] SHA2-256
26,151,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,163,442 UART: [kat] ++
26,163,977 UART: [kat] sha1
26,175,677 UART: [kat] SHA2-256
26,178,722 UART: [kat] SHA2-384
26,184,841 UART: [kat] SHA2-512-ACC
26,187,793 UART: [kat] ECC-384
28,651,724 UART: [kat] HMAC-384Kdf
28,674,322 UART: [kat] LMS
29,203,756 UART: [kat] --
29,207,749 UART: [update-reset] ++
32,634,135 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,637,015 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,020,302 >>> mbox cmd response: success
Initializing fuses
811 UART: [
1,310 UART: Running Caliptra ROM ...
2,416 UART:
2,573 UART: [state] CFI Enabled
67,386 UART: [state] LifecycleState = Unprovisioned
69,255 UART: [state] DebugLocked = No
70,872 UART: [state] WD Timer not started. Device not locked for debugging
74,934 UART: [kat] SHA2-256
254,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,651 UART: [kat] ++
266,350 UART: [kat] sha1
277,721 UART: [kat] SHA2-256
280,775 UART: [kat] SHA2-384
287,072 UART: [kat] SHA2-512-ACC
290,060 UART: [kat] ECC-384
2,754,168 UART: [kat] HMAC-384Kdf
2,775,836 UART: [kat] LMS
3,305,321 UART: [kat] --
3,309,666 UART: [warm-reset] ++
3,313,359 UART: [warm-reset] Prev Update Reset failed
3,316,515 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
6,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,210 >>> mbox cmd response: success
18,332,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,476,311 UART:
18,476,691 UART: Running Caliptra FMC ...
18,477,856 UART:
18,478,034 UART: [state] CFI Enabled
18,479,020 UART: [fht] FMC Alias Private Key: 7
20,177,219 UART: [art] Extend RT PCRs Done
20,178,455 UART: [art] Lock RT PCRs Done
20,179,922 UART: [art] Populate DV Done
20,185,186 UART: [fht] FMC Alias Private Key: 7
20,186,889 UART: [art] Derive CDI
20,187,706 UART: [art] Store in in slot 0x4
20,245,603 UART: [art] Derive Key Pair
20,246,646 UART: [art] Store priv key in slot 0x5
22,709,329 UART: [art] Derive Key Pair - Done
22,722,382 UART: [art] Signing Cert with AUTHO
22,723,692 UART: RITY.KEYID = 7
24,435,958 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,473 UART: [art] PUB.X = C1C3E3971C562308002DACB7A164D6DBF3124C95E2B39366C905D03C6E2A7FB7B19E92DC09588A2E1D29225E81842BFF
24,444,717 UART: [art] PUB.Y = 139B2E2068DDDEA78962DFCA3AAE8B9888C722D3F6E4DC42DCE47A40BC4A5B03DDF39DA2FEC43903A17B9BA97AC69CC5
24,451,979 UART: [art] SIG.R = D5443CEA7D45BBA290EA8CCD7AA2F0107C05A034694A72DA6050590DCACB77A7432BBDD85DFDA19FC615BD63FD394496
24,459,437 UART: [art] SIG.S = 5622E45CB03684989F7377762E1F7EBE342A9E517FEAC768C7FDC1841AB51684A9CF5DB9BE4CCD317F0AC736A7BB696E
25,438,133 UART: Caliptra RT
25,438,846 UART: [state] CFI Enabled
25,604,642 UART: [rt] RT listening for mailbox commands...
32,600,589 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
6,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,483 UART:
192,868 UART: Running Caliptra ROM ...
193,977 UART:
603,636 UART: [state] CFI Enabled
613,998 UART: [state] LifecycleState = Unprovisioned
615,830 UART: [state] DebugLocked = No
618,690 UART: [state] WD Timer not started. Device not locked for debugging
622,754 UART: [kat] SHA2-256
801,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,427 UART: [kat] ++
813,876 UART: [kat] sha1
825,236 UART: [kat] SHA2-256
828,294 UART: [kat] SHA2-384
834,208 UART: [kat] SHA2-512-ACC
837,198 UART: [kat] ECC-384
3,278,692 UART: [kat] HMAC-384Kdf
3,291,360 UART: [kat] LMS
3,820,884 UART: [kat] --
3,825,521 UART: [cold-reset] ++
3,828,094 UART: [fht] FHT @ 0x50003400
3,840,170 UART: [idev] ++
3,840,730 UART: [idev] CDI.KEYID = 6
3,841,608 UART: [idev] SUBJECT.KEYID = 7
3,842,819 UART: [idev] UDS.KEYID = 0
3,857,877 UART: [idev] Erasing UDS.KEYID = 0
6,316,447 UART: [idev] Sha1 KeyId Algorithm
6,338,979 UART: [idev] --
6,344,078 UART: [ldev] ++
6,344,655 UART: [ldev] CDI.KEYID = 6
6,345,563 UART: [ldev] SUBJECT.KEYID = 5
6,346,729 UART: [ldev] AUTHORITY.KEYID = 7
6,347,958 UART: [ldev] FE.KEYID = 1
6,360,764 UART: [ldev] Erasing FE.KEYID = 1
8,834,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,512 UART: [ldev] --
10,625,503 UART: [fwproc] Wait for Commands...
10,627,067 UART: [fwproc] Recv command 0x46574c44
10,629,168 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,036 >>> mbox cmd response: success
14,495,948 UART: [afmc] ++
14,496,559 UART: [afmc] CDI.KEYID = 6
14,497,465 UART: [afmc] SUBJECT.KEYID = 7
14,498,620 UART: [afmc] AUTHORITY.KEYID = 5
16,996,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,211 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,042 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,554 UART: [afmc] --
18,793,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,937,591 UART: [cold-reset] --
18,938,439 UART: [state] Locking Datavault
18,939,589 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,123 UART: [state] Locking ICCM
18,942,028 UART: [exit] Launching FMC @ 0x40000130
18,943,450 UART:
18,943,611 UART: Running Caliptra FMC ...
18,944,706 UART:
18,944,860 UART: [state] CFI Enabled
18,945,718 UART: [fht] FMC Alias Private Key: 7
20,579,787 UART: [art] Extend RT PCRs Done
20,581,012 UART: [art] Lock RT PCRs Done
20,582,367 UART: [art] Populate DV Done
20,587,661 UART: [fht] FMC Alias Private Key: 7
20,589,260 UART: [art] Derive CDI
20,589,994 UART: [art] Store in in slot 0x4
20,632,421 UART: [art] Derive Key Pair
20,633,413 UART: [art] Store priv key in slot 0x5
23,060,710 UART: [art] Derive Key Pair - Done
23,073,759 UART: [art] Signing Cert with AUTHO
23,075,056 UART: RITY.KEYID = 7
24,780,648 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,159 UART: [art] PUB.X = 53354D00B67F95D6D967480BCE26B6898E06FEC1144637324B388517508B8B533545967817FDE0882EA803F1B4901916
24,789,396 UART: [art] PUB.Y = 71729ACF595162BB315A17AABD01856C2E7E852AE976F7E8B44949A95ECF00F730DC587518A7EC241B509DDA3E57B831
24,796,616 UART: [art] SIG.R = BE0AF7C5831DEA6CD8E2CD528E3D806677535A804CE8D79C3AA1CEA8FC83821A816346C15EA2544FDFE16D97D0043261
24,804,056 UART: [art] SIG.S = D90A5C62858E915C00AFA6E9FB9824204414C6C935E374F8933D2F65CED91D604D0AE6C52D4729D00D88E0458116C589
25,782,523 UART: Caliptra RT
25,783,222 UART: [state] CFI Enabled
25,900,240 UART: [rt] RT listening for mailbox commands...
25,903,160 UART:
25,903,326 UART: Running Caliptra ROM ...
25,904,428 UART:
25,904,743 UART: [state] CFI Enabled
25,916,923 UART: [state] LifecycleState = Unprovisioned
25,918,752 UART: [state] DebugLocked = No
25,921,183 UART: [state] WD Timer not started. Device not locked for debugging
25,925,609 UART: [kat] SHA2-256
26,104,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,116,411 UART: [kat] ++
26,116,865 UART: [kat] sha1
26,127,747 UART: [kat] SHA2-256
26,130,762 UART: [kat] SHA2-384
26,137,249 UART: [kat] SHA2-512-ACC
26,140,241 UART: [kat] ECC-384
28,580,537 UART: [kat] HMAC-384Kdf
28,593,341 UART: [kat] LMS
29,122,841 UART: [kat] --
29,126,933 UART: [update-reset] ++
32,561,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,564,890 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
32,948,181 >>> mbox cmd response: success
Initializing fuses
813 UART: [
1,312 UART: Running Caliptra ROM ...
2,417 UART:
7,631,113 UART: [state] CFI Enabled
7,643,953 UART: [state] LifecycleState = Unprovisioned
7,645,815 UART: [state] DebugLocked = No
7,648,300 UART: [state] WD Timer not started. Device not locked for debugging
7,651,123 UART: [kat] SHA2-256
7,830,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,841,843 UART: [kat] ++
7,842,377 UART: [kat] sha1
7,853,969 UART: [kat] SHA2-256
7,856,981 UART: [kat] SHA2-384
7,863,829 UART: [kat] SHA2-512-ACC
7,866,807 UART: [kat] ECC-384
10,308,192 UART: [kat] HMAC-384Kdf
10,320,793 UART: [kat] LMS
10,850,300 UART: [kat] --
10,854,470 UART: [warm-reset] ++
10,857,754 UART: [warm-reset] Prev Update Reset failed
10,860,409 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
6,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,514 >>> mbox cmd response: success
18,500,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,644,061 UART:
18,644,452 UART: Running Caliptra FMC ...
18,645,625 UART:
18,645,808 UART: [state] CFI Enabled
18,646,794 UART: [fht] FMC Alias Private Key: 7
20,278,225 UART: [art] Extend RT PCRs Done
20,279,439 UART: [art] Lock RT PCRs Done
20,281,280 UART: [art] Populate DV Done
20,286,919 UART: [fht] FMC Alias Private Key: 7
20,288,578 UART: [art] Derive CDI
20,289,409 UART: [art] Store in in slot 0x4
20,331,843 UART: [art] Derive Key Pair
20,332,842 UART: [art] Store priv key in slot 0x5
22,760,070 UART: [art] Derive Key Pair - Done
22,773,022 UART: [art] Signing Cert with AUTHO
22,774,382 UART: RITY.KEYID = 7
24,480,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,516 UART: [art] PUB.X = 010728C0E07717A814B3D0481379B3E9A8AF052A11A1A27895EF353B0052A25FB5478A08B625B0E51497513D86016077
24,488,761 UART: [art] PUB.Y = 05949E89D680E556CD66BA9844B9505B1788AA43E95581369B77E69A041DF596D2E055936BD42428F8F4910D8AFF49B0
24,495,957 UART: [art] SIG.R = C867C7F0A9D685C14FB96F040E4976982CEB9FBAA144C95F6A1A4FD06882268093B4D5F818ECDD8CE64A8C224DFF4973
24,503,340 UART: [art] SIG.S = 8A9B023AA98D800A32EA6DBC9EF3060DC9922C81FCC83CB0E6C726352A3099F3395AD94945A10F8CF53742206455C448
25,482,597 UART: Caliptra RT
25,483,419 UART: [state] CFI Enabled
25,599,236 UART: [rt] RT listening for mailbox commands...
32,511,801 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,927 UART: [state] WD Timer not started. Device not locked for debugging
87,052 UART: [kat] SHA2-256
890,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,731 UART: [kat] ++
894,883 UART: [kat] sha1
899,193 UART: [kat] SHA2-256
901,133 UART: [kat] SHA2-384
903,834 UART: [kat] SHA2-512-ACC
905,735 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,790 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,862 >>> mbox cmd response: success
2,774,963 UART: [afmc] ++
2,775,131 UART: [afmc] CDI.KEYID = 6
2,775,494 UART: [afmc] SUBJECT.KEYID = 7
2,775,920 UART: [afmc] AUTHORITY.KEYID = 5
2,810,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,688 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,300 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,896 UART: [afmc] --
2,853,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,853,916 UART: [cold-reset] --
2,854,950 UART: [state] Locking Datavault
2,856,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,687 UART: [state] Locking ICCM
2,857,181 UART: [exit] Launching FMC @ 0x40000130
2,862,510 UART:
2,862,526 UART: Running Caliptra FMC ...
2,862,934 UART:
2,862,988 UART: [state] CFI Enabled
2,873,493 UART: [fht] FMC Alias Private Key: 7
2,981,028 UART: [art] Extend RT PCRs Done
2,981,456 UART: [art] Lock RT PCRs Done
2,983,072 UART: [art] Populate DV Done
2,991,523 UART: [fht] FMC Alias Private Key: 7
2,992,695 UART: [art] Derive CDI
2,992,975 UART: [art] Store in in slot 0x4
3,078,858 UART: [art] Derive Key Pair
3,079,218 UART: [art] Store priv key in slot 0x5
3,092,900 UART: [art] Derive Key Pair - Done
3,107,599 UART: [art] Signing Cert with AUTHO
3,108,079 UART: RITY.KEYID = 7
3,122,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,728 UART: [art] PUB.X = 98850134C4CB0ED28F3C3B9D4CE71355B1486825EBB33EEDA6B8505D3233C3CB9F0C5210AAA0BDECF0B8A70A46524048
3,130,498 UART: [art] PUB.Y = ECEF8F4F5A36ADE8671FC168083439BEB1CD2C456BC28E362C4BB8BEDE426B222001655C6D7533834FCADD87D41EBD89
3,137,460 UART: [art] SIG.R = 6B50A3BA3CF672F6BD49B17A560691A8A7E11EFE8E4E83A6FAB4CF40197FEFF52F6D13341135B057C614735F97259D1E
3,144,237 UART: [art] SIG.S = 5A3D624BD38D73AC0573D8C66A22F9E4F627DA371902D7649670B2AFF84E9DFB7BF98F0A45C3E070FFC49A9D77C3D215
3,167,433 UART: Caliptra RT
3,167,686 UART: [state] CFI Enabled
3,275,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,695 UART:
3,277,711 UART: Running Caliptra ROM ...
3,278,119 UART:
3,278,174 UART: [state] CFI Enabled
3,280,858 UART: [state] LifecycleState = Unprovisioned
3,281,513 UART: [state] DebugLocked = No
3,282,163 UART: [state] WD Timer not started. Device not locked for debugging
3,283,445 UART: [kat] SHA2-256
4,086,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,124 UART: [kat] ++
4,091,276 UART: [kat] sha1
4,095,320 UART: [kat] SHA2-256
4,097,260 UART: [kat] SHA2-384
4,100,017 UART: [kat] SHA2-512-ACC
4,101,917 UART: [kat] ECC-384
4,111,736 UART: [kat] HMAC-384Kdf
4,116,318 UART: [kat] LMS
4,364,630 UART: [kat] --
4,365,246 UART: [update-reset] ++
5,678,698 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,759 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,829,757 >>> mbox cmd response: success
Initializing fuses
5,830,159 UART:
5,830,175 UART: Running Caliptra ROM ...
5,830,583 UART:
5,830,638 UART: [state] CFI Enabled
5,833,422 UART: [state] LifecycleState = Unprovisioned
5,834,077 UART: [state] DebugLocked = No
5,834,603 UART: [state] WD Timer not started. Device not locked for debugging
5,835,780 UART: [kat] SHA2-256
6,639,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,459 UART: [kat] ++
6,643,611 UART: [kat] sha1
6,647,747 UART: [kat] SHA2-256
6,649,687 UART: [kat] SHA2-384
6,652,530 UART: [kat] SHA2-512-ACC
6,654,431 UART: [kat] ECC-384
6,664,006 UART: [kat] HMAC-384Kdf
6,668,572 UART: [kat] LMS
6,916,884 UART: [kat] --
6,917,768 UART: [warm-reset] ++
6,918,363 UART: [warm-reset] Prev Update Reset failed
6,919,366 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,366 >>> mbox cmd response: success
2,679,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,964 UART:
2,685,980 UART: Running Caliptra FMC ...
2,686,388 UART:
2,686,442 UART: [state] CFI Enabled
2,696,893 UART: [fht] FMC Alias Private Key: 7
2,805,178 UART: [art] Extend RT PCRs Done
2,805,606 UART: [art] Lock RT PCRs Done
2,807,414 UART: [art] Populate DV Done
2,815,843 UART: [fht] FMC Alias Private Key: 7
2,817,019 UART: [art] Derive CDI
2,817,299 UART: [art] Store in in slot 0x4
2,902,908 UART: [art] Derive Key Pair
2,903,268 UART: [art] Store priv key in slot 0x5
2,916,366 UART: [art] Derive Key Pair - Done
2,931,187 UART: [art] Signing Cert with AUTHO
2,931,667 UART: RITY.KEYID = 7
2,947,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,988 UART: [art] PUB.X = 57AF779210AB0CE87F8EB1050A141006516F4CF5D0BAD772B6696AC0641A4CD15C3A9C19E40D3B19D56ED1AA3C721E83
2,954,753 UART: [art] PUB.Y = 233AA01CD90ACF6B09347879B894FBD53BD4A86A4EA5ECF6F9E6B6FAEF48FFBCA0488A7B96B2AB9481F71F456676AB57
2,961,719 UART: [art] SIG.R = 7BFDE07D3F713E10281D5B568D844B4F6B985D94DC11B847059FB787A7ECD67240CDC42D5BAEB56EC824AC24A620C832
2,968,498 UART: [art] SIG.S = EBC08842C32F5FD5501AC4D10C30F1EDC4BDA9C50D6AE013F1516E9A99C508C5B2B6358823DB103E6F4BD8C3A6A59E62
2,992,778 UART: Caliptra RT
2,993,031 UART: [state] CFI Enabled
3,101,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,537,327 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,182,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,241,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,589 >>> mbox cmd response: success
2,775,674 UART: [afmc] ++
2,775,842 UART: [afmc] CDI.KEYID = 6
2,776,205 UART: [afmc] SUBJECT.KEYID = 7
2,776,631 UART: [afmc] AUTHORITY.KEYID = 5
2,811,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,041 UART: [afmc] --
2,855,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,855,099 UART: [cold-reset] --
2,856,023 UART: [state] Locking Datavault
2,857,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,830 UART: [state] Locking ICCM
2,858,250 UART: [exit] Launching FMC @ 0x40000130
2,863,579 UART:
2,863,595 UART: Running Caliptra FMC ...
2,864,003 UART:
2,864,146 UART: [state] CFI Enabled
2,874,781 UART: [fht] FMC Alias Private Key: 7
2,983,296 UART: [art] Extend RT PCRs Done
2,983,724 UART: [art] Lock RT PCRs Done
2,985,086 UART: [art] Populate DV Done
2,993,443 UART: [fht] FMC Alias Private Key: 7
2,994,611 UART: [art] Derive CDI
2,994,891 UART: [art] Store in in slot 0x4
3,080,774 UART: [art] Derive Key Pair
3,081,134 UART: [art] Store priv key in slot 0x5
3,094,760 UART: [art] Derive Key Pair - Done
3,109,497 UART: [art] Signing Cert with AUTHO
3,109,977 UART: RITY.KEYID = 7
3,124,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,598 UART: [art] PUB.X = A8D823D7C051C21E075F2688EBFC07AC5A2F6EB52E96E7A497827F3933A247A473037AECB9B3BD8F07A5A13AE4B69D7C
3,132,370 UART: [art] PUB.Y = 290893A0C817AAAAFA58DC4722D76493AB8C3163388B6E14994E0473B50B67CF932471618689C48ED781E8C75E3CEA80
3,139,309 UART: [art] SIG.R = D545984A8D345F3EC56BB2C45D6E36460CE81F852F6E0B9C5D12DAFF98CE91BEAF329C1F546B768627F2B836674FA658
3,146,083 UART: [art] SIG.S = 97E00A121C685AECD7877A6336612D57DC791790778A6B761CD044CF2595A3ADFE1B184B55F82E0F2411113AC4BD1204
3,170,725 UART: Caliptra RT
3,171,070 UART: [state] CFI Enabled
3,278,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,336 UART:
3,280,352 UART: Running Caliptra ROM ...
3,280,760 UART:
3,280,902 UART: [state] CFI Enabled
3,283,896 UART: [state] LifecycleState = Unprovisioned
3,284,551 UART: [state] DebugLocked = No
3,285,113 UART: [state] WD Timer not started. Device not locked for debugging
3,286,351 UART: [kat] SHA2-256
4,089,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,094,030 UART: [kat] ++
4,094,182 UART: [kat] sha1
4,098,200 UART: [kat] SHA2-256
4,100,140 UART: [kat] SHA2-384
4,102,865 UART: [kat] SHA2-512-ACC
4,104,765 UART: [kat] ECC-384
4,114,744 UART: [kat] HMAC-384Kdf
4,119,350 UART: [kat] LMS
4,367,662 UART: [kat] --
4,368,372 UART: [update-reset] ++
5,681,928 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,683,019 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,833,017 >>> mbox cmd response: success
Initializing fuses
5,833,191 UART:
5,833,207 UART: Running Caliptra ROM ...
5,833,615 UART:
5,833,757 UART: [state] CFI Enabled
5,836,453 UART: [state] LifecycleState = Unprovisioned
5,837,108 UART: [state] DebugLocked = No
5,837,652 UART: [state] WD Timer not started. Device not locked for debugging
5,838,981 UART: [kat] SHA2-256
6,642,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,646,660 UART: [kat] ++
6,646,812 UART: [kat] sha1
6,651,030 UART: [kat] SHA2-256
6,652,970 UART: [kat] SHA2-384
6,655,875 UART: [kat] SHA2-512-ACC
6,657,776 UART: [kat] ECC-384
6,667,515 UART: [kat] HMAC-384Kdf
6,672,099 UART: [kat] LMS
6,920,411 UART: [kat] --
6,921,235 UART: [warm-reset] ++
6,921,958 UART: [warm-reset] Prev Update Reset failed
6,923,023 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,041 >>> mbox cmd response: success
2,678,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,684,961 UART:
2,684,977 UART: Running Caliptra FMC ...
2,685,385 UART:
2,685,528 UART: [state] CFI Enabled
2,695,723 UART: [fht] FMC Alias Private Key: 7
2,803,214 UART: [art] Extend RT PCRs Done
2,803,642 UART: [art] Lock RT PCRs Done
2,804,984 UART: [art] Populate DV Done
2,813,227 UART: [fht] FMC Alias Private Key: 7
2,814,269 UART: [art] Derive CDI
2,814,549 UART: [art] Store in in slot 0x4
2,900,828 UART: [art] Derive Key Pair
2,901,188 UART: [art] Store priv key in slot 0x5
2,915,146 UART: [art] Derive Key Pair - Done
2,929,954 UART: [art] Signing Cert with AUTHO
2,930,434 UART: RITY.KEYID = 7
2,945,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,219 UART: [art] PUB.X = 66A59CE0F38176FCC00682B8EA5FE13FF6E358520EFDF29635ECCFACC94F6065FA8207A27788AF2F12C533274A48602B
2,952,990 UART: [art] PUB.Y = 365D502C2D929238F3DBD75AE6200309F60D78619A31CD1616677EEC71E4B476998C0B63396077B9FDDE16574D9A9662
2,959,922 UART: [art] SIG.R = 0A30ADECF467FC25EFAE59A7210FCA082BF43145E4578F42D4E176DCC92F58A4AE9FE88F0FF1A24805C273713736BE41
2,966,691 UART: [art] SIG.S = 6A0D89F80D4CB3BCC90DAE45D75F72988049764162816A5C5BF342D97C0ECB2A55B7BBD12673ECE7BFC9B4AEAA265B4A
2,990,554 UART: Caliptra RT
2,990,899 UART: [state] CFI Enabled
3,099,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,536,122 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,584 UART: [state] LifecycleState = Unprovisioned
85,239 UART: [state] DebugLocked = No
85,809 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,823 UART: [kat] ++
894,975 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
903,862 UART: [kat] SHA2-512-ACC
905,763 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,633 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,430 >>> mbox cmd response: success
2,774,609 UART: [afmc] ++
2,774,777 UART: [afmc] CDI.KEYID = 6
2,775,140 UART: [afmc] SUBJECT.KEYID = 7
2,775,566 UART: [afmc] AUTHORITY.KEYID = 5
2,810,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,416 UART: [afmc] --
2,854,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,854,392 UART: [cold-reset] --
2,855,344 UART: [state] Locking Datavault
2,856,499 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,103 UART: [state] Locking ICCM
2,857,759 UART: [exit] Launching FMC @ 0x40000130
2,863,088 UART:
2,863,104 UART: Running Caliptra FMC ...
2,863,512 UART:
2,863,566 UART: [state] CFI Enabled
2,874,017 UART: [fht] FMC Alias Private Key: 7
2,981,916 UART: [art] Extend RT PCRs Done
2,982,344 UART: [art] Lock RT PCRs Done
2,983,794 UART: [art] Populate DV Done
2,991,971 UART: [fht] FMC Alias Private Key: 7
2,992,901 UART: [art] Derive CDI
2,993,181 UART: [art] Store in in slot 0x4
3,078,938 UART: [art] Derive Key Pair
3,079,298 UART: [art] Store priv key in slot 0x5
3,092,678 UART: [art] Derive Key Pair - Done
3,107,762 UART: [art] Signing Cert with AUTHO
3,108,242 UART: RITY.KEYID = 7
3,123,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,185 UART: [art] PUB.X = 47AD554A3482A7AB934B13C055461920B59BD59B4F340EC4102344DC3B20C3E7C04EED3602A1A607C7DEA9BDD79C6383
3,130,952 UART: [art] PUB.Y = C5D13BB02E697CECA6A69BFF045D66B172B3870397BBE06006D833671B9CB11C7DF3CC6761CEA920DE17F1A5015312EA
3,137,902 UART: [art] SIG.R = 2FB374EBC73AB1DED60D480FCCB3E89464550B1722F8CE04BF779BFB6F1FCD3A567318249271D78D465D2BC743CED1DD
3,144,678 UART: [art] SIG.S = 3811B8A1B9C57DB7474A79514CF075BE9ABD1423465120B591B5075FA335C73A71B7B3ADA67F2D318E1838FFEDAFC2B5
3,168,022 UART: Caliptra RT
3,168,275 UART: [state] CFI Enabled
3,275,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,930 UART:
3,277,946 UART: Running Caliptra ROM ...
3,278,354 UART:
3,278,409 UART: [state] CFI Enabled
3,281,313 UART: [state] LifecycleState = Unprovisioned
3,281,968 UART: [state] DebugLocked = No
3,282,670 UART: [state] WD Timer not started. Device not locked for debugging
3,283,802 UART: [kat] SHA2-256
4,087,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,481 UART: [kat] ++
4,091,633 UART: [kat] sha1
4,095,943 UART: [kat] SHA2-256
4,097,883 UART: [kat] SHA2-384
4,100,748 UART: [kat] SHA2-512-ACC
4,102,648 UART: [kat] ECC-384
4,112,387 UART: [kat] HMAC-384Kdf
4,116,925 UART: [kat] LMS
4,365,237 UART: [kat] --
4,366,231 UART: [update-reset] ++
5,679,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,628 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,830,626 >>> mbox cmd response: success
Initializing fuses
5,830,858 UART:
5,830,874 UART: Running Caliptra ROM ...
5,831,282 UART:
5,831,337 UART: [state] CFI Enabled
5,833,697 UART: [state] LifecycleState = Unprovisioned
5,834,352 UART: [state] DebugLocked = No
5,835,078 UART: [state] WD Timer not started. Device not locked for debugging
5,836,219 UART: [kat] SHA2-256
6,639,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,898 UART: [kat] ++
6,644,050 UART: [kat] sha1
6,648,096 UART: [kat] SHA2-256
6,650,036 UART: [kat] SHA2-384
6,652,803 UART: [kat] SHA2-512-ACC
6,654,704 UART: [kat] ECC-384
6,664,817 UART: [kat] HMAC-384Kdf
6,669,513 UART: [kat] LMS
6,917,825 UART: [kat] --
6,918,679 UART: [warm-reset] ++
6,919,418 UART: [warm-reset] Prev Update Reset failed
6,920,485 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,770 >>> mbox cmd response: success
2,678,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,683,734 UART:
2,683,750 UART: Running Caliptra FMC ...
2,684,158 UART:
2,684,212 UART: [state] CFI Enabled
2,694,729 UART: [fht] FMC Alias Private Key: 7
2,802,664 UART: [art] Extend RT PCRs Done
2,803,092 UART: [art] Lock RT PCRs Done
2,804,688 UART: [art] Populate DV Done
2,813,049 UART: [fht] FMC Alias Private Key: 7
2,814,009 UART: [art] Derive CDI
2,814,289 UART: [art] Store in in slot 0x4
2,899,672 UART: [art] Derive Key Pair
2,900,032 UART: [art] Store priv key in slot 0x5
2,912,544 UART: [art] Derive Key Pair - Done
2,927,196 UART: [art] Signing Cert with AUTHO
2,927,676 UART: RITY.KEYID = 7
2,943,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,895 UART: [art] PUB.X = AAE6FD0472E1CCF3792E7B79F933C4B8DB04BA15F18A022BC0D183A1E14C86F2D23109DD732EBE3EA4CEA948D1360646
2,950,666 UART: [art] PUB.Y = 7A161890D717CDE267C4A8E6AB5B1EDD648B27B42D68C5AEC4C00BAE1949DBBB3C6EE9A40A0A850D08D041E1C1BD00D7
2,957,601 UART: [art] SIG.R = 0D024EF6FF169309FDB2A02F49EF0A3BE8B5435876E1C3948FCEA32AE6FD7E6BB693E89C7EC642B0A1571E13A8D94C13
2,964,375 UART: [art] SIG.S = 85F5F6D25EDC72B7C1F72BDB948113805C920F2270E24923ACBBECBEA3FEBE34769D3EA0571B2891A85CBA0970B0B6BC
2,988,112 UART: Caliptra RT
2,988,365 UART: [state] CFI Enabled
3,095,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,531,975 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,811 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,881 UART: [kat] HMAC-384Kdf
921,523 UART: [kat] LMS
1,169,835 UART: [kat] --
1,170,880 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,242 UART: [idev] ++
1,174,410 UART: [idev] CDI.KEYID = 6
1,174,771 UART: [idev] SUBJECT.KEYID = 7
1,175,196 UART: [idev] UDS.KEYID = 0
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,844 UART: [idev] Sha1 KeyId Algorithm
1,209,848 UART: [idev] --
1,210,895 UART: [ldev] ++
1,211,063 UART: [ldev] CDI.KEYID = 6
1,211,427 UART: [ldev] SUBJECT.KEYID = 5
1,211,854 UART: [ldev] AUTHORITY.KEYID = 7
1,212,317 UART: [ldev] FE.KEYID = 1
1,217,499 UART: [ldev] Erasing FE.KEYID = 1
1,244,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,583 UART: [ldev] --
1,284,053 UART: [fwproc] Wait for Commands...
1,284,722 UART: [fwproc] Recv command 0x46574c44
1,285,455 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,025 >>> mbox cmd response: success
2,778,044 UART: [afmc] ++
2,778,212 UART: [afmc] CDI.KEYID = 6
2,778,575 UART: [afmc] SUBJECT.KEYID = 7
2,779,001 UART: [afmc] AUTHORITY.KEYID = 5
2,814,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,066 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,001 UART: [afmc] --
2,857,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,857,897 UART: [cold-reset] --
2,858,839 UART: [state] Locking Datavault
2,859,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,534 UART: [state] Locking ICCM
2,861,130 UART: [exit] Launching FMC @ 0x40000130
2,866,459 UART:
2,866,475 UART: Running Caliptra FMC ...
2,866,883 UART:
2,867,026 UART: [state] CFI Enabled
2,877,839 UART: [fht] FMC Alias Private Key: 7
2,985,534 UART: [art] Extend RT PCRs Done
2,985,962 UART: [art] Lock RT PCRs Done
2,987,304 UART: [art] Populate DV Done
2,995,217 UART: [fht] FMC Alias Private Key: 7
2,996,167 UART: [art] Derive CDI
2,996,447 UART: [art] Store in in slot 0x4
3,082,290 UART: [art] Derive Key Pair
3,082,650 UART: [art] Store priv key in slot 0x5
3,095,538 UART: [art] Derive Key Pair - Done
3,110,456 UART: [art] Signing Cert with AUTHO
3,110,936 UART: RITY.KEYID = 7
3,125,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,755 UART: [art] PUB.X = D2DB2483C46D0D0E71582DA38F4D12D43693D0F6CDB7FA73B94287FA7F82FBBF843A94D53519D0E8E2D218F0D1387B89
3,133,529 UART: [art] PUB.Y = 678E5EF88873A0060EC512B0AF8734FBDF5F6E6C036BEA342A649A064697890B6AF6BFD67EAA74809916D996D67C4998
3,140,468 UART: [art] SIG.R = DCFC12C965F7FB5B84665C6F7C025EF4A632AA3AF403DAD0D3B7F91DBF28C5E78966DFB2C0F30C19161D409021B0307E
3,147,245 UART: [art] SIG.S = 4E45589F4D71B1702CCB475AE439EBDFB6D5BCCFC608FF8668FB3454041609986B650653F317BE7F7211DBB14BC204B7
3,171,511 UART: Caliptra RT
3,171,856 UART: [state] CFI Enabled
3,279,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,207 UART:
3,281,223 UART: Running Caliptra ROM ...
3,281,631 UART:
3,281,773 UART: [state] CFI Enabled
3,284,855 UART: [state] LifecycleState = Unprovisioned
3,285,510 UART: [state] DebugLocked = No
3,286,126 UART: [state] WD Timer not started. Device not locked for debugging
3,287,402 UART: [kat] SHA2-256
4,090,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,095,081 UART: [kat] ++
4,095,233 UART: [kat] sha1
4,099,597 UART: [kat] SHA2-256
4,101,537 UART: [kat] SHA2-384
4,104,224 UART: [kat] SHA2-512-ACC
4,106,124 UART: [kat] ECC-384
4,116,337 UART: [kat] HMAC-384Kdf
4,121,105 UART: [kat] LMS
4,369,417 UART: [kat] --
4,369,959 UART: [update-reset] ++
5,684,959 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,685,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,835,994 >>> mbox cmd response: success
Initializing fuses
5,836,294 UART:
5,836,310 UART: Running Caliptra ROM ...
5,836,718 UART:
5,836,860 UART: [state] CFI Enabled
5,839,738 UART: [state] LifecycleState = Unprovisioned
5,840,393 UART: [state] DebugLocked = No
5,840,995 UART: [state] WD Timer not started. Device not locked for debugging
5,842,246 UART: [kat] SHA2-256
6,645,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,649,925 UART: [kat] ++
6,650,077 UART: [kat] sha1
6,654,483 UART: [kat] SHA2-256
6,656,423 UART: [kat] SHA2-384
6,659,040 UART: [kat] SHA2-512-ACC
6,660,941 UART: [kat] ECC-384
6,670,878 UART: [kat] HMAC-384Kdf
6,675,588 UART: [kat] LMS
6,923,900 UART: [kat] --
6,924,602 UART: [warm-reset] ++
6,925,045 UART: [warm-reset] Prev Update Reset failed
6,926,068 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,243 >>> mbox cmd response: success
2,683,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,689,847 UART:
2,689,863 UART: Running Caliptra FMC ...
2,690,271 UART:
2,690,414 UART: [state] CFI Enabled
2,701,081 UART: [fht] FMC Alias Private Key: 7
2,809,212 UART: [art] Extend RT PCRs Done
2,809,640 UART: [art] Lock RT PCRs Done
2,811,276 UART: [art] Populate DV Done
2,819,437 UART: [fht] FMC Alias Private Key: 7
2,820,411 UART: [art] Derive CDI
2,820,691 UART: [art] Store in in slot 0x4
2,906,500 UART: [art] Derive Key Pair
2,906,860 UART: [art] Store priv key in slot 0x5
2,919,936 UART: [art] Derive Key Pair - Done
2,934,405 UART: [art] Signing Cert with AUTHO
2,934,885 UART: RITY.KEYID = 7
2,950,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,804 UART: [art] PUB.X = BD08BA21FFDAB50A7BA991C10FBA055AEE2DCC5423FDCCA9B9BD83BAF185FDE379146F75D2F47A2BE2D084ED5005FA00
2,957,569 UART: [art] PUB.Y = 0ACEA6315A571C4D3CC72E6FF72500C8D8661C382D0EB12E5FBC22AA2D51E8999410DF34C936A5A92C0C4FE228744473
2,964,496 UART: [art] SIG.R = 4902200697E1A2068FED31EBA3F67B3736CE5A78FA1BB4291838AADE2E34E7BBBF47F9896BE837569A7E199B3DA04D3A
2,971,269 UART: [art] SIG.S = 8C43B043CF576DF36E2F0D3E960614005B12E5E9A1900E252C48CF286FB3B3265BB5C21F5E6198C0C9D01B01FCF13548
2,995,296 UART: Caliptra RT
2,995,641 UART: [state] CFI Enabled
3,103,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,537,404 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,242,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,904 >>> mbox cmd response: success
2,775,015 UART: [afmc] ++
2,775,183 UART: [afmc] CDI.KEYID = 6
2,775,546 UART: [afmc] SUBJECT.KEYID = 7
2,775,972 UART: [afmc] AUTHORITY.KEYID = 5
2,811,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,716 UART: [afmc] --
2,854,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,854,814 UART: [cold-reset] --
2,855,770 UART: [state] Locking Datavault
2,856,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,411 UART: [state] Locking ICCM
2,857,913 UART: [exit] Launching FMC @ 0x40000130
2,863,242 UART:
2,863,258 UART: Running Caliptra FMC ...
2,863,666 UART:
2,863,720 UART: [state] CFI Enabled
2,873,963 UART: [fht] FMC Alias Private Key: 7
2,982,292 UART: [art] Extend RT PCRs Done
2,982,720 UART: [art] Lock RT PCRs Done
2,984,134 UART: [art] Populate DV Done
2,992,113 UART: [fht] FMC Alias Private Key: 7
2,993,137 UART: [art] Derive CDI
2,993,417 UART: [art] Store in in slot 0x4
3,079,188 UART: [art] Derive Key Pair
3,079,548 UART: [art] Store priv key in slot 0x5
3,092,400 UART: [art] Derive Key Pair - Done
3,107,303 UART: [art] Signing Cert with AUTHO
3,107,783 UART: RITY.KEYID = 7
3,122,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,628 UART: [art] PUB.X = 3DC16A75E9191962131378D9468590D2C11C7376E46974DD58CB0DAEA46F4DFF9FDE76949D870281B32B02012481CE64
3,130,382 UART: [art] PUB.Y = 61308494938FF7F09BD96CBE33879E79A3CF6202A399B80761490C9D19B714C87BE6795CD005308A5B15DFFD9755EB10
3,137,318 UART: [art] SIG.R = 7FD8C281FA2B12BF0438C891CD17E2756E4A7CA23135BA1F5F69E5649487202F07FA51C73398CD97F7B147A3CF877000
3,144,062 UART: [art] SIG.S = 02F2D6F7169F3F5202AB4C4FAE4243E469E7FDA1D676873B15E490BBECA8EF468DDF369C52F459F77273241F07041AE9
3,168,067 UART: Caliptra RT
3,168,320 UART: [state] CFI Enabled
3,276,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,063 UART:
3,278,079 UART: Running Caliptra ROM ...
3,278,487 UART:
3,278,542 UART: [state] CFI Enabled
3,281,226 UART: [state] LifecycleState = Unprovisioned
3,281,881 UART: [state] DebugLocked = No
3,282,475 UART: [state] WD Timer not started. Device not locked for debugging
3,283,721 UART: [kat] SHA2-256
4,087,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,400 UART: [kat] ++
4,091,552 UART: [kat] sha1
4,095,862 UART: [kat] SHA2-256
4,097,802 UART: [kat] SHA2-384
4,100,483 UART: [kat] SHA2-512-ACC
4,102,383 UART: [kat] ECC-384
4,112,316 UART: [kat] HMAC-384Kdf
4,116,724 UART: [kat] LMS
4,365,036 UART: [kat] --
4,365,934 UART: [update-reset] ++
5,678,750 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,805 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,829,803 >>> mbox cmd response: success
Initializing fuses
5,830,059 UART:
5,830,075 UART: Running Caliptra ROM ...
5,830,483 UART:
5,830,538 UART: [state] CFI Enabled
5,833,352 UART: [state] LifecycleState = Unprovisioned
5,834,007 UART: [state] DebugLocked = No
5,834,575 UART: [state] WD Timer not started. Device not locked for debugging
5,835,770 UART: [kat] SHA2-256
6,639,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,449 UART: [kat] ++
6,643,601 UART: [kat] sha1
6,647,815 UART: [kat] SHA2-256
6,649,755 UART: [kat] SHA2-384
6,652,440 UART: [kat] SHA2-512-ACC
6,654,341 UART: [kat] ECC-384
6,663,822 UART: [kat] HMAC-384Kdf
6,668,418 UART: [kat] LMS
6,916,730 UART: [kat] --
6,917,814 UART: [warm-reset] ++
6,918,313 UART: [warm-reset] Prev Update Reset failed
6,919,332 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,538 >>> mbox cmd response: success
2,680,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,580 UART:
2,686,596 UART: Running Caliptra FMC ...
2,687,004 UART:
2,687,058 UART: [state] CFI Enabled
2,697,359 UART: [fht] FMC Alias Private Key: 7
2,806,118 UART: [art] Extend RT PCRs Done
2,806,546 UART: [art] Lock RT PCRs Done
2,808,152 UART: [art] Populate DV Done
2,816,367 UART: [fht] FMC Alias Private Key: 7
2,817,327 UART: [art] Derive CDI
2,817,607 UART: [art] Store in in slot 0x4
2,903,134 UART: [art] Derive Key Pair
2,903,494 UART: [art] Store priv key in slot 0x5
2,916,218 UART: [art] Derive Key Pair - Done
2,930,922 UART: [art] Signing Cert with AUTHO
2,931,402 UART: RITY.KEYID = 7
2,946,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,747 UART: [art] PUB.X = 48BB0BA242628DF84C070EAE958B98D5217641AEEDA725C2653735CC842AF3FD0FEC724BF59C9AB56F4F5CB48E04C5D5
2,954,518 UART: [art] PUB.Y = DF2C772F0B88A129CD8072667A8AC83BE584D81F1ABE3C0B2B877962DD452A9A9FFAE6D9E13706BDC139811FBF08299F
2,961,470 UART: [art] SIG.R = 4BBA32AB37A0018D0D39BFBF24BA873523AD5CE61F84AB6DD4DE3DD8A838643207B930C7FFF161A9D0DD58ACB9CAC274
2,968,255 UART: [art] SIG.S = 6CB61E396B4ACB23E3C376692DD4B11ED41B905CF24F7F1546E75AE544F861B35970414DFD5C66E9E21E159FD9C87E4D
2,991,940 UART: Caliptra RT
2,992,193 UART: [state] CFI Enabled
3,099,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,721 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,979 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,633 UART: [ldev] --
1,282,911 UART: [fwproc] Wait for Commands...
1,283,546 UART: [fwproc] Recv command 0x46574c44
1,284,279 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,961 >>> mbox cmd response: success
2,778,152 UART: [afmc] ++
2,778,320 UART: [afmc] CDI.KEYID = 6
2,778,683 UART: [afmc] SUBJECT.KEYID = 7
2,779,109 UART: [afmc] AUTHORITY.KEYID = 5
2,814,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,215 UART: [afmc] --
2,858,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,858,311 UART: [cold-reset] --
2,859,197 UART: [state] Locking Datavault
2,860,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,886 UART: [state] Locking ICCM
2,861,462 UART: [exit] Launching FMC @ 0x40000130
2,866,791 UART:
2,866,807 UART: Running Caliptra FMC ...
2,867,215 UART:
2,867,358 UART: [state] CFI Enabled
2,878,031 UART: [fht] FMC Alias Private Key: 7
2,986,494 UART: [art] Extend RT PCRs Done
2,986,922 UART: [art] Lock RT PCRs Done
2,988,532 UART: [art] Populate DV Done
2,996,753 UART: [fht] FMC Alias Private Key: 7
2,997,751 UART: [art] Derive CDI
2,998,031 UART: [art] Store in in slot 0x4
3,083,634 UART: [art] Derive Key Pair
3,083,994 UART: [art] Store priv key in slot 0x5
3,097,090 UART: [art] Derive Key Pair - Done
3,111,978 UART: [art] Signing Cert with AUTHO
3,112,458 UART: RITY.KEYID = 7
3,127,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,371 UART: [art] PUB.X = A5708699CE3E4EC1FF79C42C8B0152D1834CDE7EE20B4B2378053B02C1EDFFC4BA53607CAF05E3AFEFEE2AD8538A1F38
3,135,148 UART: [art] PUB.Y = 62DC58A766313DF72E9AA8A5EE82D6831E05C5573259DB57FA6CC46348CB3B7965C693C5792E49985AAEA4B48611008D
3,142,075 UART: [art] SIG.R = B5E1DAE51FDABD7BB870E339001409F397877C10CB70FBC818F4216160C605EFD1F313578C42D0FCA77984CFA5DA52EB
3,148,831 UART: [art] SIG.S = 8F60FC6EE307DBD51859613178F54A7CB80A890B68468F0FA0EAECB6F83838F876BF34707BDF94D16021ED5D36CD8F57
3,172,154 UART: Caliptra RT
3,172,499 UART: [state] CFI Enabled
3,280,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,019 UART:
3,282,035 UART: Running Caliptra ROM ...
3,282,443 UART:
3,282,585 UART: [state] CFI Enabled
3,285,377 UART: [state] LifecycleState = Unprovisioned
3,286,032 UART: [state] DebugLocked = No
3,286,752 UART: [state] WD Timer not started. Device not locked for debugging
3,287,942 UART: [kat] SHA2-256
4,091,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,095,621 UART: [kat] ++
4,095,773 UART: [kat] sha1
4,099,953 UART: [kat] SHA2-256
4,101,893 UART: [kat] SHA2-384
4,104,588 UART: [kat] SHA2-512-ACC
4,106,488 UART: [kat] ECC-384
4,116,057 UART: [kat] HMAC-384Kdf
4,120,717 UART: [kat] LMS
4,369,029 UART: [kat] --
4,370,201 UART: [update-reset] ++
5,683,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,684,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,834,110 >>> mbox cmd response: success
Initializing fuses
5,834,356 UART:
5,834,372 UART: Running Caliptra ROM ...
5,834,780 UART:
5,834,922 UART: [state] CFI Enabled
5,837,386 UART: [state] LifecycleState = Unprovisioned
5,838,041 UART: [state] DebugLocked = No
5,838,571 UART: [state] WD Timer not started. Device not locked for debugging
5,839,704 UART: [kat] SHA2-256
6,643,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,647,383 UART: [kat] ++
6,647,535 UART: [kat] sha1
6,651,845 UART: [kat] SHA2-256
6,653,785 UART: [kat] SHA2-384
6,656,604 UART: [kat] SHA2-512-ACC
6,658,505 UART: [kat] ECC-384
6,668,222 UART: [kat] HMAC-384Kdf
6,672,690 UART: [kat] LMS
6,921,002 UART: [kat] --
6,921,836 UART: [warm-reset] ++
6,922,551 UART: [warm-reset] Prev Update Reset failed
6,923,586 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,387 >>> mbox cmd response: success
2,679,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,431 UART:
2,685,447 UART: Running Caliptra FMC ...
2,685,855 UART:
2,685,998 UART: [state] CFI Enabled
2,696,311 UART: [fht] FMC Alias Private Key: 7
2,804,452 UART: [art] Extend RT PCRs Done
2,804,880 UART: [art] Lock RT PCRs Done
2,806,314 UART: [art] Populate DV Done
2,814,497 UART: [fht] FMC Alias Private Key: 7
2,815,467 UART: [art] Derive CDI
2,815,747 UART: [art] Store in in slot 0x4
2,901,292 UART: [art] Derive Key Pair
2,901,652 UART: [art] Store priv key in slot 0x5
2,915,030 UART: [art] Derive Key Pair - Done
2,929,674 UART: [art] Signing Cert with AUTHO
2,930,154 UART: RITY.KEYID = 7
2,945,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,239 UART: [art] PUB.X = 75340DAF33DE3A75A5B9B63B92F0E9365660EFFFC83FDF484EB87357B9E57D80520163EB04CBF0123757723DCD32AD6B
2,953,010 UART: [art] PUB.Y = 28D64562ADF8E99655DB32FB560221E5D3437B9FF41E40A09F29F9F62F64E07F61B8E2E92C095DB1F169C646A52B78A4
2,959,958 UART: [art] SIG.R = B4B2A28B9C2C4BC87C3706F18B9768BCC9E2A335D8C0BD1E46901A4A54FD1C35615B0F1294D8143ADDEC0C933F208F70
2,966,731 UART: [art] SIG.S = B6768D26E04ED1C0A70DCE692BB5DAD4095487F97084B22F13B2525579CA3B20E9EFA637BE9D95545F96FD5CAE34BE0B
2,990,639 UART: Caliptra RT
2,990,984 UART: [state] CFI Enabled
3,098,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,804 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
191,559 UART:
191,937 UART: Running Caliptra ROM ...
193,092 UART:
193,247 UART: [state] CFI Enabled
268,055 UART: [state] LifecycleState = Production
270,320 UART: [state] DebugLocked = Yes
272,959 UART: [state] Starting the WD Timer 40000000 cycles
277,629 UART: [kat] SHA2-256
459,592 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,131 UART: [kat] ++
471,656 UART: [kat] sha1
483,131 UART: [kat] SHA2-256
486,142 UART: [kat] SHA2-384
491,771 UART: [kat] SHA2-512-ACC
494,415 UART: [kat] ECC-384
3,779,220 UART: [kat] HMAC-384Kdf
3,804,959 UART: [kat] LMS
4,878,139 UART: [kat] --
4,883,009 UART: [cold-reset] ++
4,884,166 UART: [fht] FHT @ 0x50003400
4,895,662 UART: [idev] ++
4,896,428 UART: [idev] CDI.KEYID = 6
4,897,612 UART: [idev] SUBJECT.KEYID = 7
4,898,755 UART: [idev] UDS.KEYID = 0
4,899,660 ready_for_fw is high
4,899,858 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,043,342 UART: [idev] Erasing UDS.KEYID = 0
8,243,161 UART: [idev] Sha1 KeyId Algorithm
8,265,952 UART: [idev] --
8,271,597 UART: [ldev] ++
8,272,176 UART: [ldev] CDI.KEYID = 6
8,273,357 UART: [ldev] SUBJECT.KEYID = 5
8,274,516 UART: [ldev] AUTHORITY.KEYID = 7
8,275,745 UART: [ldev] FE.KEYID = 1
8,318,557 UART: [ldev] Erasing FE.KEYID = 1
11,653,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,674 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,007 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,997,999 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,014,163 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,036,010 UART: [ldev] --
14,041,186 UART: [fwproc] Wait for Commands...
14,042,800 UART: [fwproc] Recv command 0x46574c44
14,045,113 UART: [fwproc] Recv'd Img size: 114124 bytes
18,162,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,238,451 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,307,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,624,328 >>> mbox cmd response: success
18,628,540 UART: [afmc] ++
18,629,128 UART: [afmc] CDI.KEYID = 6
18,630,367 UART: [afmc] SUBJECT.KEYID = 7
18,631,469 UART: [afmc] AUTHORITY.KEYID = 5
21,988,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,287,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,289,802 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,305,799 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,321,938 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,338,029 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,361,646 UART: [afmc] --
24,364,521 UART: [cold-reset] --
24,369,902 UART: [state] Locking Datavault
24,375,906 UART: [state] Locking PCR0, PCR1 and PCR31
24,377,546 UART: [state] Locking ICCM
24,379,640 UART: [exit] Launching FMC @ 0x40000130
24,388,307 UART:
24,388,545 UART: Running Caliptra FMC ...
24,389,574 UART:
24,389,721 UART: [state] CFI Enabled
24,445,544 UART: [fht] FMC Alias Private Key: 7
26,783,949 UART: [art] Extend RT PCRs Done
26,785,169 UART: [art] Lock RT PCRs Done
26,786,763 UART: [art] Populate DV Done
26,792,064 UART: [fht] FMC Alias Private Key: 7
26,793,656 UART: [art] Derive CDI
26,794,397 UART: [art] Store in in slot 0x4
26,854,260 UART: [art] Derive Key Pair
26,855,296 UART: [art] Store priv key in slot 0x5
30,147,607 UART: [art] Derive Key Pair - Done
30,160,704 UART: [art] Signing Cert with AUTHO
30,162,004 UART: RITY.KEYID = 7
32,449,528 UART: [art] Erasing AUTHORITY.KEYID = 7
32,451,038 UART: [art] PUB.X = 758EB1DE89BA4B4E18CC11766EE3A0F472063786A1A6392F1903F29AB332FE3410A9A89247393BC3500106B2397A167A
32,458,247 UART: [art] PUB.Y = 334D72DFBD6388E8CAC211DE29938370C132A700CE3C0A5C0A7712B4C4EE5D6D3EF5B8F6D86268CB1AE55FF5F9F7D7E8
32,465,492 UART: [art] SIG.R = 71750AABEB884C296C0A7030CBC801CC42E3C2C310798829E201574320C2186492D1E6732B77A209629D7FDFDFBDFBD3
32,472,904 UART: [art] SIG.S = AEFC98393078FF76C7A0B335D41443D8D1C1966C4F649822FA5015A103E441751E91B161469125234A83130F31517DE2
33,778,177 UART: Caliptra RT
33,778,886 UART: [state] CFI Enabled
33,939,194 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,345 UART:
1,628 UART: Running Caliptra ROM ...
2,736 UART:
2,890 UART: [state] CFI Enabled
65,483 UART: [state] LifecycleState = Production
67,199 UART: [state] DebugLocked = Yes
70,007 UART: [state] Starting the WD Timer 40000000 cycles
75,822 UART: [kat] SHA2-256
257,829 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
269,295 UART: [kat] ++
269,797 UART: [kat] sha1
280,406 UART: [kat] SHA2-256
283,430 UART: [kat] SHA2-384
289,506 UART: [kat] SHA2-512-ACC
292,110 UART: [kat] ECC-384
3,576,617 UART: [kat] HMAC-384Kdf
3,603,041 UART: [kat] LMS
4,676,205 UART: [kat] --
4,681,168 UART: [warm-reset] ++
4,686,172 UART: [warm-reset] --
4,691,223 UART: [state] Locking Datavault
4,694,849 UART: [state] Locking PCR0, PCR1 and PCR31
4,697,026 UART: [state] Locking ICCM
4,699,479 UART: [exit] Launching FMC @ 0x40000130
4,708,137 UART:
4,708,374 UART: Running Caliptra FMC ...
4,709,396 UART:
4,709,543 UART: [state] CFI Enabled
4,768,261 UART: [aliasrt :skip pcr extension
4,769,560 UART: [art] Extend RT PCRs Done
4,770,708 UART: [art] Lock RT PCRs Done
4,772,101 UART: [art] Populate DV Done
4,777,775 UART: [fht] FMC Alias Private Key: 7
4,779,411 UART: [art] Derive CDI
4,780,142 UART: [art] Store in in slot 0x4
4,837,124 UART: [art] Derive Key Pair
4,838,161 UART: [art] Store priv key in slot 0x5
8,130,966 UART: [art] Derive Key Pair - Done
8,143,969 UART: [art] Signing Cert with AUTHO
8,145,276 UART: RITY.KEYID = 7
10,432,401 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,907 UART: [art] PUB.X = 758EB1DE89BA4B4E18CC11766EE3A0F472063786A1A6392F1903F29AB332FE3410A9A89247393BC3500106B2397A167A
10,441,156 UART: [art] PUB.Y = 334D72DFBD6388E8CAC211DE29938370C132A700CE3C0A5C0A7712B4C4EE5D6D3EF5B8F6D86268CB1AE55FF5F9F7D7E8
10,448,402 UART: [art] SIG.R = 71750AABEB884C296C0A7030CBC801CC42E3C2C310798829E201574320C2186492D1E6732B77A209629D7FDFDFBDFBD3
10,455,779 UART: [art] SIG.S = AEFC98393078FF76C7A0B335D41443D8D1C1966C4F649822FA5015A103E441751E91B161469125234A83130F31517DE2
11,761,481 UART: Caliptra RT
11,762,198 UART: [state] CFI Enabled
12,118,299 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
191,559 UART:
191,938 UART: Running Caliptra ROM ...
193,121 UART:
193,276 UART: [state] CFI Enabled
264,092 UART: [state] LifecycleState = Production
266,260 UART: [state] DebugLocked = Yes
267,692 UART: [state] Starting the WD Timer 40000000 cycles
273,933 UART: [kat] SHA2-256
455,907 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,381 UART: [kat] ++
467,901 UART: [kat] sha1
478,305 UART: [kat] SHA2-256
481,384 UART: [kat] SHA2-384
488,507 UART: [kat] SHA2-512-ACC
491,095 UART: [kat] ECC-384
3,777,267 UART: [kat] HMAC-384Kdf
3,802,855 UART: [kat] LMS
4,875,975 UART: [kat] --
4,881,533 UART: [cold-reset] ++
4,883,108 UART: [fht] FHT @ 0x50003400
4,896,072 UART: [idev] ++
4,896,784 UART: [idev] CDI.KEYID = 6
4,898,040 UART: [idev] SUBJECT.KEYID = 7
4,899,150 UART: [idev] UDS.KEYID = 0
4,900,116 ready_for_fw is high
4,900,310 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,043,700 UART: [idev] Erasing UDS.KEYID = 0
8,241,605 UART: [idev] Sha1 KeyId Algorithm
8,264,268 UART: [idev] --
8,268,730 UART: [ldev] ++
8,269,310 UART: [ldev] CDI.KEYID = 6
8,270,490 UART: [ldev] SUBJECT.KEYID = 5
8,271,648 UART: [ldev] AUTHORITY.KEYID = 7
8,272,877 UART: [ldev] FE.KEYID = 1
8,318,043 UART: [ldev] Erasing FE.KEYID = 1
11,655,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,087 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,401 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,998,436 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,014,553 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,035,847 UART: [ldev] --
14,040,375 UART: [fwproc] Wait for Commands...
14,042,100 UART: [fwproc] Recv command 0x46574c44
14,044,407 UART: [fwproc] Recv'd Img size: 114124 bytes
18,145,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,220,708 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,289,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,605,983 >>> mbox cmd response: success
18,610,202 UART: [afmc] ++
18,610,788 UART: [afmc] CDI.KEYID = 6
18,611,973 UART: [afmc] SUBJECT.KEYID = 7
18,613,132 UART: [afmc] AUTHORITY.KEYID = 5
21,972,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,269,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,271,676 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,287,664 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,303,759 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,319,783 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,342,077 UART: [afmc] --
24,346,454 UART: [cold-reset] --
24,349,730 UART: [state] Locking Datavault
24,354,987 UART: [state] Locking PCR0, PCR1 and PCR31
24,356,685 UART: [state] Locking ICCM
24,358,022 UART: [exit] Launching FMC @ 0x40000130
24,366,699 UART:
24,366,930 UART: Running Caliptra FMC ...
24,368,031 UART:
24,368,197 UART: [state] CFI Enabled
24,419,435 UART: [fht] FMC Alias Private Key: 7
26,757,050 UART: [art] Extend RT PCRs Done
26,758,278 UART: [art] Lock RT PCRs Done
26,760,101 UART: [art] Populate DV Done
26,765,371 UART: [fht] FMC Alias Private Key: 7
26,767,018 UART: [art] Derive CDI
26,767,834 UART: [art] Store in in slot 0x4
26,827,960 UART: [art] Derive Key Pair
26,829,001 UART: [art] Store priv key in slot 0x5
30,121,626 UART: [art] Derive Key Pair - Done
30,134,625 UART: [art] Signing Cert with AUTHO
30,135,922 UART: RITY.KEYID = 7
32,424,194 UART: [art] Erasing AUTHORITY.KEYID = 7
32,425,707 UART: [art] PUB.X = B433F7DCC6EEC54967A27F07ADD28522079A3B206065D145C2BAFB09A6D13B9BE34A9B4881AEC7213F4DA647CB3F7688
32,432,949 UART: [art] PUB.Y = F7FEB6D57A71C1453CECACAC9EF2B60E4EED891847FC54C3A95CF7A473CFFBE984856EF6F666BCC791B9FF4CBF85BCE8
32,440,235 UART: [art] SIG.R = A096C306A0FA15AC4A4616E2EDF07D9DA48520E26D48D94438F2A000FC5E40B9A309C72507F571E561FBB38B64A13190
32,447,634 UART: [art] SIG.S = 0E9531720A94E8219C952226013DBA51FE04198241D484809B03C5F5C96EB2D8886EBFEA882A487D7FC12D09DD0BB852
33,753,069 UART: Caliptra RT
33,753,756 UART: [state] CFI Enabled
33,914,855 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,316 UART:
1,595 UART: Running Caliptra ROM ...
2,654 UART:
2,803 UART: [state] CFI Enabled
63,728 UART: [state] LifecycleState = Production
65,546 UART: [state] DebugLocked = Yes
67,260 UART: [state] Starting the WD Timer 40000000 cycles
72,372 UART: [kat] SHA2-256
254,336 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
265,843 UART: [kat] ++
266,349 UART: [kat] sha1
277,764 UART: [kat] SHA2-256
280,770 UART: [kat] SHA2-384
286,746 UART: [kat] SHA2-512-ACC
289,356 UART: [kat] ECC-384
3,577,598 UART: [kat] HMAC-384Kdf
3,602,741 UART: [kat] LMS
4,675,917 UART: [kat] --
4,680,462 UART: [warm-reset] ++
4,686,234 UART: [warm-reset] --
4,691,512 UART: [state] Locking Datavault
4,694,277 UART: [state] Locking PCR0, PCR1 and PCR31
4,696,418 UART: [state] Locking ICCM
4,698,944 UART: [exit] Launching FMC @ 0x40000130
4,707,615 UART:
4,707,850 UART: Running Caliptra FMC ...
4,708,951 UART:
4,709,107 UART: [state] CFI Enabled
4,767,805 UART: [aliasrt :skip pcr extension
4,769,099 UART: [art] Extend RT PCRs Done
4,770,247 UART: [art] Lock RT PCRs Done
4,771,331 UART: [art] Populate DV Done
4,777,113 UART: [fht] FMC Alias Private Key: 7
4,778,601 UART: [art] Derive CDI
4,779,364 UART: [art] Store in in slot 0x4
4,836,502 UART: [art] Derive Key Pair
4,837,542 UART: [art] Store priv key in slot 0x5
8,130,361 UART: [art] Derive Key Pair - Done
8,143,195 UART: [art] Signing Cert with AUTHO
8,144,489 UART: RITY.KEYID = 7
10,431,747 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,246 UART: [art] PUB.X = B433F7DCC6EEC54967A27F07ADD28522079A3B206065D145C2BAFB09A6D13B9BE34A9B4881AEC7213F4DA647CB3F7688
10,440,543 UART: [art] PUB.Y = F7FEB6D57A71C1453CECACAC9EF2B60E4EED891847FC54C3A95CF7A473CFFBE984856EF6F666BCC791B9FF4CBF85BCE8
10,447,777 UART: [art] SIG.R = A096C306A0FA15AC4A4616E2EDF07D9DA48520E26D48D94438F2A000FC5E40B9A309C72507F571E561FBB38B64A13190
10,455,168 UART: [art] SIG.S = 0E9531720A94E8219C952226013DBA51FE04198241D484809B03C5F5C96EB2D8886EBFEA882A487D7FC12D09DD0BB852
11,760,278 UART: Caliptra RT
11,760,993 UART: [state] CFI Enabled
12,090,185 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
191,759 UART:
192,132 UART: Running Caliptra ROM ...
193,226 UART:
603,069 UART: [state] CFI Enabled
613,393 UART: [state] LifecycleState = Production
615,609 UART: [state] DebugLocked = Yes
617,100 UART: [state] Starting the WD Timer 40000000 cycles
622,970 UART: [kat] SHA2-256
804,979 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,520 UART: [kat] ++
817,043 UART: [kat] sha1
827,310 UART: [kat] SHA2-256
830,316 UART: [kat] SHA2-384
837,169 UART: [kat] SHA2-512-ACC
839,781 UART: [kat] ECC-384
4,092,181 UART: [kat] HMAC-384Kdf
4,103,425 UART: [kat] LMS
5,176,566 UART: [kat] --
5,181,558 UART: [cold-reset] ++
5,183,062 UART: [fht] FHT @ 0x50003400
5,194,325 UART: [idev] ++
5,195,042 UART: [idev] CDI.KEYID = 6
5,196,218 UART: [idev] SUBJECT.KEYID = 7
5,197,673 UART: [idev] UDS.KEYID = 0
5,198,928 ready_for_fw is high
5,199,130 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,342,864 UART: [idev] Erasing UDS.KEYID = 0
8,489,340 UART: [idev] Sha1 KeyId Algorithm
8,512,012 UART: [idev] --
8,516,428 UART: [ldev] ++
8,517,172 UART: [ldev] CDI.KEYID = 6
8,518,208 UART: [ldev] SUBJECT.KEYID = 5
8,519,302 UART: [ldev] AUTHORITY.KEYID = 7
8,520,578 UART: [ldev] FE.KEYID = 1
8,531,593 UART: [ldev] Erasing FE.KEYID = 1
11,826,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,942 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,272 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,303 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,166,399 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,186,030 UART: [ldev] --
14,190,259 UART: [fwproc] Wait for Commands...
14,193,420 UART: [fwproc] Recv command 0x46574c44
14,195,718 UART: [fwproc] Recv'd Img size: 114124 bytes
18,304,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,386,304 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,455,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,771,741 >>> mbox cmd response: success
18,775,793 UART: [afmc] ++
18,776,379 UART: [afmc] CDI.KEYID = 6
18,777,558 UART: [afmc] SUBJECT.KEYID = 7
18,778,709 UART: [afmc] AUTHORITY.KEYID = 5
22,097,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,389,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,391,443 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,407,423 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,423,550 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,439,602 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,462,331 UART: [afmc] --
24,466,234 UART: [cold-reset] --
24,469,387 UART: [state] Locking Datavault
24,474,142 UART: [state] Locking PCR0, PCR1 and PCR31
24,475,838 UART: [state] Locking ICCM
24,478,360 UART: [exit] Launching FMC @ 0x40000130
24,487,027 UART:
24,487,254 UART: Running Caliptra FMC ...
24,488,273 UART:
24,488,411 UART: [state] CFI Enabled
24,496,881 UART: [fht] FMC Alias Private Key: 7
26,827,575 UART: [art] Extend RT PCRs Done
26,828,798 UART: [art] Lock RT PCRs Done
26,830,715 UART: [art] Populate DV Done
26,835,963 UART: [fht] FMC Alias Private Key: 7
26,837,484 UART: [art] Derive CDI
26,838,224 UART: [art] Store in in slot 0x4
26,880,807 UART: [art] Derive Key Pair
26,881,798 UART: [art] Store priv key in slot 0x5
30,124,168 UART: [art] Derive Key Pair - Done
30,137,161 UART: [art] Signing Cert with AUTHO
30,138,464 UART: RITY.KEYID = 7
32,417,905 UART: [art] Erasing AUTHORITY.KEYID = 7
32,419,413 UART: [art] PUB.X = 8B3BBB1163F23EE4EDB4DF6B4090345EA200119096B085EF0ADCCE9E998724CB5E56147D45A91FE484B7AC0D5DDCC539
32,426,658 UART: [art] PUB.Y = E2E9C74B1FB2D75C5CAE70321E7A38CF9504EB549859A87155BCB90084A8225D93DCE99F0DD2E8292E1A44349A5B7E3C
32,433,936 UART: [art] SIG.R = 0563D9045C1C6A23B5D9542DBE440AA3C61B86C7F14EC62AEC7357D1762FFE98EAE42A8CF24EB4DBD33A750DC9EF5F6A
32,441,364 UART: [art] SIG.S = 7ACA51815CCB4A72067A1D58641FCE6B1829A15C67F7E27CA3A882B18DA64A8D61CE621B70AA8AAAE5F9A72E005E7741
33,746,653 UART: Caliptra RT
33,747,362 UART: [state] CFI Enabled
33,864,256 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,329 UART:
1,614 UART: Running Caliptra ROM ...
2,717 UART:
6,668,308 UART: [state] CFI Enabled
6,682,145 UART: [state] LifecycleState = Production
6,683,901 UART: [state] DebugLocked = Yes
6,686,672 UART: [state] Starting the WD Timer 40000000 cycles
6,692,272 UART: [kat] SHA2-256
6,874,262 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,885,790 UART: [kat] ++
6,886,388 UART: [kat] sha1
6,896,796 UART: [kat] SHA2-256
6,899,819 UART: [kat] SHA2-384
6,904,896 UART: [kat] SHA2-512-ACC
6,907,528 UART: [kat] ECC-384
10,163,704 UART: [kat] HMAC-384Kdf
10,175,436 UART: [kat] LMS
11,248,592 UART: [kat] --
11,253,248 UART: [warm-reset] ++
11,258,801 UART: [warm-reset] --
11,262,820 UART: [state] Locking Datavault
11,265,847 UART: [state] Locking PCR0, PCR1 and PCR31
11,267,976 UART: [state] Locking ICCM
11,270,014 UART: [exit] Launching FMC @ 0x40000130
11,278,681 UART:
11,278,908 UART: Running Caliptra FMC ...
11,279,996 UART:
11,280,148 UART: [state] CFI Enabled
11,282,322 UART: [aliasrt :skip pcr extension
11,283,561 UART: [art] Extend RT PCRs Done
11,284,690 UART: [art] Lock RT PCRs Done
11,285,914 UART: [art] Populate DV Done
11,291,209 UART: [fht] FMC Alias Private Key: 7
11,292,780 UART: [art] Derive CDI
11,293,600 UART: [art] Store in in slot 0x4
11,335,914 UART: [art] Derive Key Pair
11,336,905 UART: [art] Store priv key in slot 0x5
14,579,497 UART: [art] Derive Key Pair - Done
14,592,327 UART: [art] Signing Cert with AUTHO
14,593,622 UART: RITY.KEYID = 7
16,872,849 UART: [art] Erasing AUTHORITY.KEYID = 7
16,874,360 UART: [art] PUB.X = 8B3BBB1163F23EE4EDB4DF6B4090345EA200119096B085EF0ADCCE9E998724CB5E56147D45A91FE484B7AC0D5DDCC539
16,881,652 UART: [art] PUB.Y = E2E9C74B1FB2D75C5CAE70321E7A38CF9504EB549859A87155BCB90084A8225D93DCE99F0DD2E8292E1A44349A5B7E3C
16,888,889 UART: [art] SIG.R = 0563D9045C1C6A23B5D9542DBE440AA3C61B86C7F14EC62AEC7357D1762FFE98EAE42A8CF24EB4DBD33A750DC9EF5F6A
16,896,344 UART: [art] SIG.S = 7ACA51815CCB4A72067A1D58641FCE6B1829A15C67F7E27CA3A882B18DA64A8D61CE621B70AA8AAAE5F9A72E005E7741
18,201,500 UART: Caliptra RT
18,202,206 UART: [state] CFI Enabled
18,490,100 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
191,794 UART:
192,196 UART: Running Caliptra ROM ...
193,302 UART:
603,019 UART: [state] CFI Enabled
614,756 UART: [state] LifecycleState = Production
616,959 UART: [state] DebugLocked = Yes
619,005 UART: [state] Starting the WD Timer 40000000 cycles
623,676 UART: [kat] SHA2-256
805,684 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,236 UART: [kat] ++
817,790 UART: [kat] sha1
826,983 UART: [kat] SHA2-256
829,999 UART: [kat] SHA2-384
835,637 UART: [kat] SHA2-512-ACC
838,215 UART: [kat] ECC-384
4,093,401 UART: [kat] HMAC-384Kdf
4,107,065 UART: [kat] LMS
5,180,263 UART: [kat] --
5,184,171 UART: [cold-reset] ++
5,185,614 UART: [fht] FHT @ 0x50003400
5,197,154 UART: [idev] ++
5,197,863 UART: [idev] CDI.KEYID = 6
5,199,037 UART: [idev] SUBJECT.KEYID = 7
5,200,497 UART: [idev] UDS.KEYID = 0
5,201,683 ready_for_fw is high
5,201,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,345,220 UART: [idev] Erasing UDS.KEYID = 0
8,491,985 UART: [idev] Sha1 KeyId Algorithm
8,515,142 UART: [idev] --
8,519,409 UART: [ldev] ++
8,519,975 UART: [ldev] CDI.KEYID = 6
8,521,206 UART: [ldev] SUBJECT.KEYID = 5
8,522,359 UART: [ldev] AUTHORITY.KEYID = 7
8,523,580 UART: [ldev] FE.KEYID = 1
8,534,735 UART: [ldev] Erasing FE.KEYID = 1
11,830,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,428 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,137,742 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,153,775 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,169,874 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,190,811 UART: [ldev] --
14,196,236 UART: [fwproc] Wait for Commands...
14,197,784 UART: [fwproc] Recv command 0x46574c44
14,200,087 UART: [fwproc] Recv'd Img size: 114124 bytes
18,307,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,382,679 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,451,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,768,716 >>> mbox cmd response: success
18,772,585 UART: [afmc] ++
18,773,172 UART: [afmc] CDI.KEYID = 6
18,774,377 UART: [afmc] SUBJECT.KEYID = 7
18,775,487 UART: [afmc] AUTHORITY.KEYID = 5
22,091,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,388,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,390,640 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,406,600 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,422,702 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,438,754 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,460,632 UART: [afmc] --
24,463,734 UART: [cold-reset] --
24,467,864 UART: [state] Locking Datavault
24,473,057 UART: [state] Locking PCR0, PCR1 and PCR31
24,474,699 UART: [state] Locking ICCM
24,476,094 UART: [exit] Launching FMC @ 0x40000130
24,484,767 UART:
24,485,006 UART: Running Caliptra FMC ...
24,486,127 UART:
24,486,278 UART: [state] CFI Enabled
24,494,345 UART: [fht] FMC Alias Private Key: 7
26,825,724 UART: [art] Extend RT PCRs Done
26,826,942 UART: [art] Lock RT PCRs Done
26,828,509 UART: [art] Populate DV Done
26,833,594 UART: [fht] FMC Alias Private Key: 7
26,835,176 UART: [art] Derive CDI
26,835,908 UART: [art] Store in in slot 0x4
26,878,487 UART: [art] Derive Key Pair
26,879,475 UART: [art] Store priv key in slot 0x5
30,121,703 UART: [art] Derive Key Pair - Done
30,134,971 UART: [art] Signing Cert with AUTHO
30,136,271 UART: RITY.KEYID = 7
32,415,715 UART: [art] Erasing AUTHORITY.KEYID = 7
32,417,218 UART: [art] PUB.X = 8C20532632504165992DD9705605A87E14D8622774E7CA50544F2DA431DFA3CF2C5B3380618B1B16497BF7C18B19D9E7
32,424,446 UART: [art] PUB.Y = B1C4913278AD6E965A78C3B7BEAF77470FCD846777CD2C92D402ED4A684786F209C287CFC8BEA27743FAB815D0D19548
32,431,694 UART: [art] SIG.R = AD4F132EFB2664351D0F612E6AC65BC794C9C20FA18FB86AB4997CAD6F05313E89EB0A992DCBA59FC16E12F1926C390F
32,439,050 UART: [art] SIG.S = D7494ECB52E96936B869643C387FD1A6966B89758C79F1B09A9A9BE822D5BD008AED8B0CD2DF3EE6F7089F516089AC9D
33,743,896 UART: Caliptra RT
33,744,618 UART: [state] CFI Enabled
33,861,858 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,288 UART:
1,574 UART: Running Caliptra ROM ...
2,682 UART:
6,672,752 UART: [state] CFI Enabled
6,686,824 UART: [state] LifecycleState = Production
6,688,571 UART: [state] DebugLocked = Yes
6,690,793 UART: [state] Starting the WD Timer 40000000 cycles
6,696,067 UART: [kat] SHA2-256
6,878,070 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,889,614 UART: [kat] ++
6,890,072 UART: [kat] sha1
6,901,175 UART: [kat] SHA2-256
6,904,251 UART: [kat] SHA2-384
6,909,796 UART: [kat] SHA2-512-ACC
6,912,419 UART: [kat] ECC-384
10,166,283 UART: [kat] HMAC-384Kdf
10,177,814 UART: [kat] LMS
11,251,017 UART: [kat] --
11,256,874 UART: [warm-reset] ++
11,259,732 UART: [warm-reset] --
11,263,114 UART: [state] Locking Datavault
11,266,839 UART: [state] Locking PCR0, PCR1 and PCR31
11,268,992 UART: [state] Locking ICCM
11,271,985 UART: [exit] Launching FMC @ 0x40000130
11,280,656 UART:
11,280,900 UART: Running Caliptra FMC ...
11,281,915 UART:
11,282,055 UART: [state] CFI Enabled
11,284,106 UART: [aliasrt :skip pcr extension
11,285,340 UART: [art] Extend RT PCRs Done
11,286,388 UART: [art] Lock RT PCRs Done
11,287,439 UART: [art] Populate DV Done
11,293,058 UART: [fht] FMC Alias Private Key: 7
11,294,745 UART: [art] Derive CDI
11,295,475 UART: [art] Store in in slot 0x4
11,338,161 UART: [art] Derive Key Pair
11,339,153 UART: [art] Store priv key in slot 0x5
14,581,518 UART: [art] Derive Key Pair - Done
14,594,409 UART: [art] Signing Cert with AUTHO
14,595,714 UART: RITY.KEYID = 7
16,875,581 UART: [art] Erasing AUTHORITY.KEYID = 7
16,877,105 UART: [art] PUB.X = 8C20532632504165992DD9705605A87E14D8622774E7CA50544F2DA431DFA3CF2C5B3380618B1B16497BF7C18B19D9E7
16,884,285 UART: [art] PUB.Y = B1C4913278AD6E965A78C3B7BEAF77470FCD846777CD2C92D402ED4A684786F209C287CFC8BEA27743FAB815D0D19548
16,891,531 UART: [art] SIG.R = AD4F132EFB2664351D0F612E6AC65BC794C9C20FA18FB86AB4997CAD6F05313E89EB0A992DCBA59FC16E12F1926C390F
16,898,940 UART: [art] SIG.S = D7494ECB52E96936B869643C387FD1A6966B89758C79F1B09A9A9BE822D5BD008AED8B0CD2DF3EE6F7089F516089AC9D
18,203,676 UART: Caliptra RT
18,204,383 UART: [state] CFI Enabled
18,488,340 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,005 writing to cptra_bootfsm_go
192,670 UART:
193,043 UART: Running Caliptra ROM ...
194,237 UART:
194,396 UART: [state] CFI Enabled
263,416 UART: [state] LifecycleState = Production
265,173 UART: [state] DebugLocked = Yes
268,032 UART: [state] Starting the WD Timer 40000000 cycles
273,426 UART: [kat] SHA2-256
452,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,185 UART: [kat] ++
464,629 UART: [kat] sha1
475,307 UART: [kat] SHA2-256
478,321 UART: [kat] SHA2-384
485,122 UART: [kat] SHA2-512-ACC
488,095 UART: [kat] ECC-384
2,951,167 UART: [kat] HMAC-384Kdf
2,973,069 UART: [kat] LMS
3,502,580 UART: [kat] --
3,507,046 UART: [cold-reset] ++
3,509,054 UART: [fht] FHT @ 0x50003400
3,520,599 UART: [idev] ++
3,521,169 UART: [idev] CDI.KEYID = 6
3,522,268 UART: [idev] SUBJECT.KEYID = 7
3,523,391 UART: [idev] UDS.KEYID = 0
3,524,322 ready_for_fw is high
3,524,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,400 UART: [idev] Erasing UDS.KEYID = 0
6,026,389 UART: [idev] Sha1 KeyId Algorithm
6,049,238 UART: [idev] --
6,052,916 UART: [ldev] ++
6,053,492 UART: [ldev] CDI.KEYID = 6
6,054,375 UART: [ldev] SUBJECT.KEYID = 5
6,055,558 UART: [ldev] AUTHORITY.KEYID = 7
6,056,798 UART: [ldev] FE.KEYID = 1
6,100,049 UART: [ldev] Erasing FE.KEYID = 1
8,605,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,726 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,721 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,537 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,471 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,344 UART: [ldev] --
10,416,783 UART: [fwproc] Wait for Commands...
10,419,860 UART: [fwproc] Recv command 0x46574c44
10,421,954 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,001,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,319,909 >>> mbox cmd response: success
14,324,626 UART: [afmc] ++
14,325,243 UART: [afmc] CDI.KEYID = 6
14,326,301 UART: [afmc] SUBJECT.KEYID = 7
14,327,412 UART: [afmc] AUTHORITY.KEYID = 5
16,849,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,855 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,591,833 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,607,694 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,623,458 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,646,336 UART: [afmc] --
18,650,595 UART: [cold-reset] --
18,653,006 UART: [state] Locking Datavault
18,660,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,015 UART: [state] Locking ICCM
18,663,499 UART: [exit] Launching FMC @ 0x40000130
18,671,915 UART:
18,672,150 UART: Running Caliptra FMC ...
18,673,175 UART:
18,673,318 UART: [state] CFI Enabled
18,731,945 UART: [fht] FMC Alias Private Key: 7
20,495,777 UART: [art] Extend RT PCRs Done
20,497,001 UART: [art] Lock RT PCRs Done
20,498,658 UART: [art] Populate DV Done
20,504,075 UART: [fht] FMC Alias Private Key: 7
20,505,680 UART: [art] Derive CDI
20,506,495 UART: [art] Store in in slot 0x4
20,564,353 UART: [art] Derive Key Pair
20,565,388 UART: [art] Store priv key in slot 0x5
23,028,039 UART: [art] Derive Key Pair - Done
23,040,987 UART: [art] Signing Cert with AUTHO
23,042,478 UART: RITY.KEYID = 7
24,753,913 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,416 UART: [art] PUB.X = C55D8F0939169B9A04E1C4C91F077C377417B55C294A3CA93C699A4BC69D78AE1E0D5E1BFECD4C378F94D519FA773968
24,762,670 UART: [art] PUB.Y = A208021EB6A352219CEB73F7913CE4A224B0B277A750E956ADBF6F8F66A073ACDA4D7F0808843916E46BA0B4FFA4420E
24,769,960 UART: [art] SIG.R = 7B06EA41704AE97B91D348B535430BF09AB1F5F4946DCC33D5E9E2481BD548A9A759D90E94107DA9CF4FCD0B60197FD0
24,777,353 UART: [art] SIG.S = 55F29D6A2CA7F05FBABB38D79B0DF49AEEAC843BF702B031A7B1313109CF650763A6B17538ACF12BC8D810CD4CBB4B50
25,755,854 UART: Caliptra RT
25,756,585 UART: [state] CFI Enabled
25,923,076 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,271 UART:
1,553 UART: Running Caliptra ROM ...
2,605 UART:
2,751 UART: [state] CFI Enabled
61,894 UART: [state] LifecycleState = Production
63,671 UART: [state] DebugLocked = Yes
65,946 UART: [state] Starting the WD Timer 40000000 cycles
71,069 UART: [kat] SHA2-256
250,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,816 UART: [kat] ++
262,349 UART: [kat] sha1
272,639 UART: [kat] SHA2-256
275,644 UART: [kat] SHA2-384
280,431 UART: [kat] SHA2-512-ACC
283,361 UART: [kat] ECC-384
2,749,641 UART: [kat] HMAC-384Kdf
2,769,323 UART: [kat] LMS
3,298,810 UART: [kat] --
3,302,898 UART: [warm-reset] ++
3,308,398 UART: [warm-reset] --
3,311,346 UART: [state] Locking Datavault
3,313,784 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,427 UART: [state] Locking ICCM
3,316,975 UART: [exit] Launching FMC @ 0x40000130
3,325,428 UART:
3,325,668 UART: Running Caliptra FMC ...
3,326,696 UART:
3,326,843 UART: [state] CFI Enabled
3,378,564 UART: [aliasrt :skip pcr extension
3,379,854 UART: [art] Extend RT PCRs Done
3,380,920 UART: [art] Lock RT PCRs Done
3,382,152 UART: [art] Populate DV Done
3,387,668 UART: [fht] FMC Alias Private Key: 7
3,389,151 UART: [art] Derive CDI
3,389,887 UART: [art] Store in in slot 0x4
3,447,157 UART: [art] Derive Key Pair
3,448,227 UART: [art] Store priv key in slot 0x5
5,911,214 UART: [art] Derive Key Pair - Done
5,924,312 UART: [art] Signing Cert with AUTHO
5,925,665 UART: RITY.KEYID = 7
7,636,921 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,421 UART: [art] PUB.X = C55D8F0939169B9A04E1C4C91F077C377417B55C294A3CA93C699A4BC69D78AE1E0D5E1BFECD4C378F94D519FA773968
7,645,667 UART: [art] PUB.Y = A208021EB6A352219CEB73F7913CE4A224B0B277A750E956ADBF6F8F66A073ACDA4D7F0808843916E46BA0B4FFA4420E
7,652,962 UART: [art] SIG.R = 7B06EA41704AE97B91D348B535430BF09AB1F5F4946DCC33D5E9E2481BD548A9A759D90E94107DA9CF4FCD0B60197FD0
7,660,352 UART: [art] SIG.S = 55F29D6A2CA7F05FBABB38D79B0DF49AEEAC843BF702B031A7B1313109CF650763A6B17538ACF12BC8D810CD4CBB4B50
8,639,418 UART: Caliptra RT
8,640,110 UART: [state] CFI Enabled
8,981,162 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
191,817 UART:
192,193 UART: Running Caliptra ROM ...
193,393 UART:
193,547 UART: [state] CFI Enabled
263,005 UART: [state] LifecycleState = Production
264,754 UART: [state] DebugLocked = Yes
267,341 UART: [state] Starting the WD Timer 40000000 cycles
272,153 UART: [kat] SHA2-256
451,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,847 UART: [kat] ++
463,376 UART: [kat] sha1
475,582 UART: [kat] SHA2-256
478,639 UART: [kat] SHA2-384
483,569 UART: [kat] SHA2-512-ACC
486,576 UART: [kat] ECC-384
2,948,002 UART: [kat] HMAC-384Kdf
2,971,344 UART: [kat] LMS
3,500,806 UART: [kat] --
3,506,316 UART: [cold-reset] ++
3,507,759 UART: [fht] FHT @ 0x50003400
3,517,631 UART: [idev] ++
3,518,251 UART: [idev] CDI.KEYID = 6
3,519,188 UART: [idev] SUBJECT.KEYID = 7
3,520,295 UART: [idev] UDS.KEYID = 0
3,521,216 ready_for_fw is high
3,521,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,188 UART: [idev] Erasing UDS.KEYID = 0
6,026,495 UART: [idev] Sha1 KeyId Algorithm
6,048,769 UART: [idev] --
6,053,462 UART: [ldev] ++
6,054,037 UART: [ldev] CDI.KEYID = 6
6,054,922 UART: [ldev] SUBJECT.KEYID = 5
6,056,136 UART: [ldev] AUTHORITY.KEYID = 7
6,057,392 UART: [ldev] FE.KEYID = 1
6,099,772 UART: [ldev] Erasing FE.KEYID = 1
8,603,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,500 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,493 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,356 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,291 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,430 UART: [ldev] --
10,411,411 UART: [fwproc] Wait for Commands...
10,413,894 UART: [fwproc] Recv command 0x46574c44
10,415,987 UART: [fwproc] Recv'd Img size: 114448 bytes
13,857,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,997,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,315,139 >>> mbox cmd response: success
14,319,816 UART: [afmc] ++
14,320,431 UART: [afmc] CDI.KEYID = 6
14,321,341 UART: [afmc] SUBJECT.KEYID = 7
14,322,502 UART: [afmc] AUTHORITY.KEYID = 5
16,853,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,338 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,612,353 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,628,177 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,643,922 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,667,444 UART: [afmc] --
18,670,702 UART: [cold-reset] --
18,673,917 UART: [state] Locking Datavault
18,678,522 UART: [state] Locking PCR0, PCR1 and PCR31
18,680,165 UART: [state] Locking ICCM
18,682,963 UART: [exit] Launching FMC @ 0x40000130
18,691,359 UART:
18,691,613 UART: Running Caliptra FMC ...
18,692,716 UART:
18,692,878 UART: [state] CFI Enabled
18,753,354 UART: [fht] FMC Alias Private Key: 7
20,516,679 UART: [art] Extend RT PCRs Done
20,517,903 UART: [art] Lock RT PCRs Done
20,519,286 UART: [art] Populate DV Done
20,524,766 UART: [fht] FMC Alias Private Key: 7
20,526,517 UART: [art] Derive CDI
20,527,336 UART: [art] Store in in slot 0x4
20,586,226 UART: [art] Derive Key Pair
20,587,261 UART: [art] Store priv key in slot 0x5
23,050,179 UART: [art] Derive Key Pair - Done
23,063,226 UART: [art] Signing Cert with AUTHO
23,064,535 UART: RITY.KEYID = 7
24,775,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,239 UART: [art] PUB.X = 8BEAD97569F32A33683840123D760524FF8B999DA9E21F72AE5DD972EEEE5F6FDE6876DEF195D1923AD466B6F9DE5EA9
24,784,502 UART: [art] PUB.Y = FF29FCB8942794B090D51F4A41B8CE691ADEE09043C1C6D2025D0004AC69EF1E9D268143EDC2510E814EB1223B3F16C8
24,791,738 UART: [art] SIG.R = DFF8CDFC456F95D8CAAFE90B09784D07EB8740E51AABEC4F074C2FC55B0BE009E8AC1E9136ACD39769BF709D9D9F926B
24,799,182 UART: [art] SIG.S = B9F33C8F15CB834B2798A6CC8FE92813270E928CF097CD1467C81C3A615AD1C5EFC3271A3551111BA4330EA678DB8846
25,778,613 UART: Caliptra RT
25,779,315 UART: [state] CFI Enabled
25,942,539 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,289 UART:
1,574 UART: Running Caliptra ROM ...
2,684 UART:
2,837 UART: [state] CFI Enabled
63,232 UART: [state] LifecycleState = Production
64,992 UART: [state] DebugLocked = Yes
67,540 UART: [state] Starting the WD Timer 40000000 cycles
71,785 UART: [kat] SHA2-256
250,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,481 UART: [kat] ++
263,019 UART: [kat] sha1
275,202 UART: [kat] SHA2-256
278,258 UART: [kat] SHA2-384
283,848 UART: [kat] SHA2-512-ACC
286,779 UART: [kat] ECC-384
2,751,015 UART: [kat] HMAC-384Kdf
2,771,003 UART: [kat] LMS
3,300,467 UART: [kat] --
3,304,021 UART: [warm-reset] ++
3,308,494 UART: [warm-reset] --
3,311,269 UART: [state] Locking Datavault
3,314,786 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,427 UART: [state] Locking ICCM
3,318,442 UART: [exit] Launching FMC @ 0x40000130
3,326,856 UART:
3,327,098 UART: Running Caliptra FMC ...
3,328,204 UART:
3,328,361 UART: [state] CFI Enabled
3,380,764 UART: [aliasrt :skip pcr extension
3,382,033 UART: [art] Extend RT PCRs Done
3,383,183 UART: [art] Lock RT PCRs Done
3,384,630 UART: [art] Populate DV Done
3,390,354 UART: [fht] FMC Alias Private Key: 7
3,391,943 UART: [art] Derive CDI
3,392,756 UART: [art] Store in in slot 0x4
3,449,370 UART: [art] Derive Key Pair
3,450,417 UART: [art] Store priv key in slot 0x5
5,913,253 UART: [art] Derive Key Pair - Done
5,926,466 UART: [art] Signing Cert with AUTHO
5,927,773 UART: RITY.KEYID = 7
7,638,214 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,723 UART: [art] PUB.X = 8BEAD97569F32A33683840123D760524FF8B999DA9E21F72AE5DD972EEEE5F6FDE6876DEF195D1923AD466B6F9DE5EA9
7,646,974 UART: [art] PUB.Y = FF29FCB8942794B090D51F4A41B8CE691ADEE09043C1C6D2025D0004AC69EF1E9D268143EDC2510E814EB1223B3F16C8
7,654,198 UART: [art] SIG.R = DFF8CDFC456F95D8CAAFE90B09784D07EB8740E51AABEC4F074C2FC55B0BE009E8AC1E9136ACD39769BF709D9D9F926B
7,661,666 UART: [art] SIG.S = B9F33C8F15CB834B2798A6CC8FE92813270E928CF097CD1467C81C3A615AD1C5EFC3271A3551111BA4330EA678DB8846
8,640,998 UART: Caliptra RT
8,641,711 UART: [state] CFI Enabled
8,979,078 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
191,915 UART:
192,269 UART: Running Caliptra ROM ...
193,459 UART:
603,107 UART: [state] CFI Enabled
619,901 UART: [state] LifecycleState = Production
621,687 UART: [state] DebugLocked = Yes
624,248 UART: [state] Starting the WD Timer 40000000 cycles
629,836 UART: [kat] SHA2-256
808,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,563 UART: [kat] ++
821,096 UART: [kat] sha1
832,501 UART: [kat] SHA2-256
835,518 UART: [kat] SHA2-384
841,717 UART: [kat] SHA2-512-ACC
844,717 UART: [kat] ECC-384
3,286,761 UART: [kat] HMAC-384Kdf
3,298,921 UART: [kat] LMS
3,828,436 UART: [kat] --
3,833,280 UART: [cold-reset] ++
3,835,702 UART: [fht] FHT @ 0x50003400
3,845,683 UART: [idev] ++
3,846,250 UART: [idev] CDI.KEYID = 6
3,847,159 UART: [idev] SUBJECT.KEYID = 7
3,848,331 UART: [idev] UDS.KEYID = 0
3,849,375 ready_for_fw is high
3,849,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,707 UART: [idev] Erasing UDS.KEYID = 0
6,320,264 UART: [idev] Sha1 KeyId Algorithm
6,343,492 UART: [idev] --
6,348,289 UART: [ldev] ++
6,348,855 UART: [ldev] CDI.KEYID = 6
6,349,734 UART: [ldev] SUBJECT.KEYID = 5
6,350,945 UART: [ldev] AUTHORITY.KEYID = 7
6,352,229 UART: [ldev] FE.KEYID = 1
6,363,547 UART: [ldev] Erasing FE.KEYID = 1
8,840,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,032 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,576,068 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,591,881 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,607,806 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,628,725 UART: [ldev] --
10,633,363 UART: [fwproc] Wait for Commands...
10,635,079 UART: [fwproc] Recv command 0x46574c44
10,637,178 UART: [fwproc] Recv'd Img size: 114448 bytes
14,072,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,212,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,530,900 >>> mbox cmd response: success
14,535,980 UART: [afmc] ++
14,536,568 UART: [afmc] CDI.KEYID = 6
14,537,643 UART: [afmc] SUBJECT.KEYID = 7
14,538,764 UART: [afmc] AUTHORITY.KEYID = 5
17,039,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,762,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,764,779 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,780,812 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,796,596 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,812,363 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,836,062 UART: [afmc] --
18,839,528 UART: [cold-reset] --
18,842,475 UART: [state] Locking Datavault
18,848,528 UART: [state] Locking PCR0, PCR1 and PCR31
18,850,166 UART: [state] Locking ICCM
18,851,797 UART: [exit] Launching FMC @ 0x40000130
18,860,193 UART:
18,860,474 UART: Running Caliptra FMC ...
18,861,498 UART:
18,861,643 UART: [state] CFI Enabled
18,869,797 UART: [fht] FMC Alias Private Key: 7
20,626,833 UART: [art] Extend RT PCRs Done
20,628,049 UART: [art] Lock RT PCRs Done
20,629,864 UART: [art] Populate DV Done
20,635,331 UART: [fht] FMC Alias Private Key: 7
20,636,882 UART: [art] Derive CDI
20,637,616 UART: [art] Store in in slot 0x4
20,680,419 UART: [art] Derive Key Pair
20,681,414 UART: [art] Store priv key in slot 0x5
23,108,301 UART: [art] Derive Key Pair - Done
23,121,293 UART: [art] Signing Cert with AUTHO
23,122,592 UART: RITY.KEYID = 7
24,827,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,829,301 UART: [art] PUB.X = 32F83A5A84DE64E8E4FE00DE80AC2A36A5A074419D82CF24DD17B4E5B48BC9FCB803A04674A81FCDF640E8C1AE756EF6
24,836,539 UART: [art] PUB.Y = 666EFF18A7B6E402FE6B8BC00274BB5D843D99928CFD6C311D4E2B5E4695B35A90E99A8B015B82B3107AA1E884A41E30
24,843,819 UART: [art] SIG.R = 789391C63B2AD6D3B7A96B9506D280B1BF3732BEB449F6A3B111EE708B7F97A33D125A8ECD3F138E75DF455D1657BADC
24,851,202 UART: [art] SIG.S = 99DDBA4691C55A05593F642B4CAEC06AC85FB1B26E82D69C06CDD885E7965EAD0C7999380B4D44FDF397AFA704D03A12
25,829,866 UART: Caliptra RT
25,830,563 UART: [state] CFI Enabled
25,946,860 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,367 UART:
1,640 UART: Running Caliptra ROM ...
2,749 UART:
14,574,733 UART: [state] CFI Enabled
14,588,060 UART: [state] LifecycleState = Production
14,589,774 UART: [state] DebugLocked = Yes
14,591,705 UART: [state] Starting the WD Timer 40000000 cycles
14,596,715 UART: [kat] SHA2-256
14,775,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,787,425 UART: [kat] ++
14,787,961 UART: [kat] sha1
14,798,690 UART: [kat] SHA2-256
14,801,749 UART: [kat] SHA2-384
14,806,374 UART: [kat] SHA2-512-ACC
14,809,316 UART: [kat] ECC-384
17,249,617 UART: [kat] HMAC-384Kdf
17,261,806 UART: [kat] LMS
17,791,339 UART: [kat] --
17,795,619 UART: [warm-reset] ++
17,800,947 UART: [warm-reset] --
17,805,235 UART: [state] Locking Datavault
17,808,810 UART: [state] Locking PCR0, PCR1 and PCR31
17,810,507 UART: [state] Locking ICCM
17,812,277 UART: [exit] Launching FMC @ 0x40000130
17,820,725 UART:
17,820,955 UART: Running Caliptra FMC ...
17,821,980 UART:
17,822,126 UART: [state] CFI Enabled
17,824,071 UART: [aliasrt :skip pcr extension
17,825,317 UART: [art] Extend RT PCRs Done
17,826,373 UART: [art] Lock RT PCRs Done
17,827,807 UART: [art] Populate DV Done
17,833,446 UART: [fht] FMC Alias Private Key: 7
17,835,138 UART: [art] Derive CDI
17,835,943 UART: [art] Store in in slot 0x4
17,878,587 UART: [art] Derive Key Pair
17,879,617 UART: [art] Store priv key in slot 0x5
20,306,429 UART: [art] Derive Key Pair - Done
20,319,483 UART: [art] Signing Cert with AUTHO
20,320,787 UART: RITY.KEYID = 7
22,026,475 UART: [art] Erasing AUTHORITY.KEYID = 7
22,028,126 UART: [art] PUB.X = 32F83A5A84DE64E8E4FE00DE80AC2A36A5A074419D82CF24DD17B4E5B48BC9FCB803A04674A81FCDF640E8C1AE756EF6
22,035,241 UART: [art] PUB.Y = 666EFF18A7B6E402FE6B8BC00274BB5D843D99928CFD6C311D4E2B5E4695B35A90E99A8B015B82B3107AA1E884A41E30
22,042,487 UART: [art] SIG.R = 789391C63B2AD6D3B7A96B9506D280B1BF3732BEB449F6A3B111EE708B7F97A33D125A8ECD3F138E75DF455D1657BADC
22,049,880 UART: [art] SIG.S = 99DDBA4691C55A05593F642B4CAEC06AC85FB1B26E82D69C06CDD885E7965EAD0C7999380B4D44FDF397AFA704D03A12
23,028,825 UART: Caliptra RT
23,029,517 UART: [state] CFI Enabled
23,316,816 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
191,807 UART:
192,173 UART: Running Caliptra ROM ...
193,268 UART:
602,813 UART: [state] CFI Enabled
614,902 UART: [state] LifecycleState = Production
616,669 UART: [state] DebugLocked = Yes
618,927 UART: [state] Starting the WD Timer 40000000 cycles
624,439 UART: [kat] SHA2-256
803,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,117 UART: [kat] ++
815,563 UART: [kat] sha1
825,536 UART: [kat] SHA2-256
828,622 UART: [kat] SHA2-384
833,476 UART: [kat] SHA2-512-ACC
836,411 UART: [kat] ECC-384
3,279,982 UART: [kat] HMAC-384Kdf
3,293,132 UART: [kat] LMS
3,822,657 UART: [kat] --
3,827,922 UART: [cold-reset] ++
3,828,849 UART: [fht] FHT @ 0x50003400
3,840,797 UART: [idev] ++
3,841,406 UART: [idev] CDI.KEYID = 6
3,842,295 UART: [idev] SUBJECT.KEYID = 7
3,843,418 UART: [idev] UDS.KEYID = 0
3,844,405 ready_for_fw is high
3,844,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,287 UART: [idev] Erasing UDS.KEYID = 0
6,320,189 UART: [idev] Sha1 KeyId Algorithm
6,342,802 UART: [idev] --
6,348,144 UART: [ldev] ++
6,348,711 UART: [ldev] CDI.KEYID = 6
6,349,621 UART: [ldev] SUBJECT.KEYID = 5
6,350,853 UART: [ldev] AUTHORITY.KEYID = 7
6,352,083 UART: [ldev] FE.KEYID = 1
6,363,974 UART: [ldev] Erasing FE.KEYID = 1
8,839,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,924 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,573,904 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,589,766 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,605,699 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,626,523 UART: [ldev] --
10,630,595 UART: [fwproc] Wait for Commands...
10,633,323 UART: [fwproc] Recv command 0x46574c44
10,635,421 UART: [fwproc] Recv'd Img size: 114448 bytes
14,075,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,214,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,534,015 >>> mbox cmd response: success
14,538,030 UART: [afmc] ++
14,538,623 UART: [afmc] CDI.KEYID = 6
14,539,534 UART: [afmc] SUBJECT.KEYID = 7
14,540,695 UART: [afmc] AUTHORITY.KEYID = 5
17,044,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,767,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,769,164 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,785,146 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,801,015 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,816,738 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,838,589 UART: [afmc] --
18,841,525 UART: [cold-reset] --
18,847,381 UART: [state] Locking Datavault
18,852,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,854,539 UART: [state] Locking ICCM
18,855,609 UART: [exit] Launching FMC @ 0x40000130
18,864,024 UART:
18,864,261 UART: Running Caliptra FMC ...
18,865,357 UART:
18,865,512 UART: [state] CFI Enabled
18,873,459 UART: [fht] FMC Alias Private Key: 7
20,630,220 UART: [art] Extend RT PCRs Done
20,631,572 UART: [art] Lock RT PCRs Done
20,633,115 UART: [art] Populate DV Done
20,638,680 UART: [fht] FMC Alias Private Key: 7
20,640,320 UART: [art] Derive CDI
20,641,052 UART: [art] Store in in slot 0x4
20,684,075 UART: [art] Derive Key Pair
20,685,072 UART: [art] Store priv key in slot 0x5
23,111,585 UART: [art] Derive Key Pair - Done
23,125,002 UART: [art] Signing Cert with AUTHO
23,126,302 UART: RITY.KEYID = 7
24,832,465 UART: [art] Erasing AUTHORITY.KEYID = 7
24,833,964 UART: [art] PUB.X = 6F1E0049A3DF77071DCCCB6F641CD4690F3B783FCF011468EB0E1A2174B6756EC9F5F3F52239D66632060E98CE5A214B
24,841,203 UART: [art] PUB.Y = A5C1B87290F64ABB6FEF5C7E394D6A4CFFB9F3D67B7E30B4A3AF5FB0D4C8F1E00B2036B7C5B6164431B7100E0AB78EDE
24,848,483 UART: [art] SIG.R = 83C62D6D69D85A120A70AC8A50649FF86802B017C944F777A1F95CB1CD0811879FE67D4DF60012AA23B350D6585FCEA4
24,855,873 UART: [art] SIG.S = F621170CAC3ADFD0CC845425A2B3FD57228EFB5A5A2AB7EB1644FEB814CEDE87A6496228D60230954A7C2E86D2FB7C8F
25,834,602 UART: Caliptra RT
25,835,300 UART: [state] CFI Enabled
25,952,137 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,353 UART:
1,564 UART: Running Caliptra ROM ...
2,585 UART:
14,562,695 UART: [state] CFI Enabled
14,577,977 UART: [state] LifecycleState = Production
14,579,725 UART: [state] DebugLocked = Yes
14,581,553 UART: [state] Starting the WD Timer 40000000 cycles
14,586,680 UART: [kat] SHA2-256
14,765,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,777,403 UART: [kat] ++
14,777,865 UART: [kat] sha1
14,789,072 UART: [kat] SHA2-256
14,792,081 UART: [kat] SHA2-384
14,797,957 UART: [kat] SHA2-512-ACC
14,800,889 UART: [kat] ECC-384
17,241,767 UART: [kat] HMAC-384Kdf
17,253,939 UART: [kat] LMS
17,783,497 UART: [kat] --
17,790,667 UART: [warm-reset] ++
17,797,282 UART: [warm-reset] --
17,802,094 UART: [state] Locking Datavault
17,804,648 UART: [state] Locking PCR0, PCR1 and PCR31
17,806,344 UART: [state] Locking ICCM
17,808,783 UART: [exit] Launching FMC @ 0x40000130
17,817,236 UART:
17,817,477 UART: Running Caliptra FMC ...
17,818,577 UART:
17,818,729 UART: [state] CFI Enabled
17,820,670 UART: [aliasrt :skip pcr extension
17,821,910 UART: [art] Extend RT PCRs Done
17,823,040 UART: [art] Lock RT PCRs Done
17,824,104 UART: [art] Populate DV Done
17,829,502 UART: [fht] FMC Alias Private Key: 7
17,830,975 UART: [art] Derive CDI
17,831,731 UART: [art] Store in in slot 0x4
17,873,992 UART: [art] Derive Key Pair
17,874,983 UART: [art] Store priv key in slot 0x5
20,301,265 UART: [art] Derive Key Pair - Done
20,314,312 UART: [art] Signing Cert with AUTHO
20,315,632 UART: RITY.KEYID = 7
22,020,971 UART: [art] Erasing AUTHORITY.KEYID = 7
22,022,481 UART: [art] PUB.X = 6F1E0049A3DF77071DCCCB6F641CD4690F3B783FCF011468EB0E1A2174B6756EC9F5F3F52239D66632060E98CE5A214B
22,029,707 UART: [art] PUB.Y = A5C1B87290F64ABB6FEF5C7E394D6A4CFFB9F3D67B7E30B4A3AF5FB0D4C8F1E00B2036B7C5B6164431B7100E0AB78EDE
22,036,970 UART: [art] SIG.R = 83C62D6D69D85A120A70AC8A50649FF86802B017C944F777A1F95CB1CD0811879FE67D4DF60012AA23B350D6585FCEA4
22,044,371 UART: [art] SIG.S = F621170CAC3ADFD0CC845425A2B3FD57228EFB5A5A2AB7EB1644FEB814CEDE87A6496228D60230954A7C2E86D2FB7C8F
23,023,005 UART: Caliptra RT
23,023,718 UART: [state] CFI Enabled
23,313,725 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
191,604 UART:
191,981 UART: Running Caliptra ROM ...
193,166 UART:
193,318 UART: [state] CFI Enabled
264,177 UART: [state] LifecycleState = Production
265,984 UART: [state] DebugLocked = Yes
268,905 UART: [state] Starting the WD Timer 40000000 cycles
274,139 UART: [kat] SHA2-256
453,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,835 UART: [kat] ++
465,367 UART: [kat] sha1
476,651 UART: [kat] SHA2-256
479,649 UART: [kat] SHA2-384
485,218 UART: [kat] SHA2-512-ACC
488,159 UART: [kat] ECC-384
2,949,473 UART: [kat] HMAC-384Kdf
2,972,364 UART: [kat] LMS
3,501,857 UART: [kat] --
3,507,635 UART: [cold-reset] ++
3,509,846 UART: [fht] FHT @ 0x50003400
3,522,195 UART: [idev] ++
3,522,764 UART: [idev] CDI.KEYID = 6
3,523,831 UART: [idev] SUBJECT.KEYID = 7
3,524,937 UART: [idev] UDS.KEYID = 0
3,525,874 ready_for_fw is high
3,526,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,988 UART: [idev] Erasing UDS.KEYID = 0
6,028,757 UART: [idev] Sha1 KeyId Algorithm
6,051,198 UART: [idev] --
6,055,522 UART: [ldev] ++
6,056,134 UART: [ldev] CDI.KEYID = 6
6,057,030 UART: [ldev] SUBJECT.KEYID = 5
6,058,249 UART: [ldev] AUTHORITY.KEYID = 7
6,059,483 UART: [ldev] FE.KEYID = 1
6,101,033 UART: [ldev] Erasing FE.KEYID = 1
8,604,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,247 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,238 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,103 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,055 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,001 UART: [ldev] --
10,413,625 UART: [fwproc] Wait for Commands...
10,416,849 UART: [fwproc] Recv command 0x46574c44
10,418,948 UART: [fwproc] Recv'd Img size: 114448 bytes
13,857,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,000,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,318,343 >>> mbox cmd response: success
14,323,195 UART: [afmc] ++
14,323,792 UART: [afmc] CDI.KEYID = 6
14,324,704 UART: [afmc] SUBJECT.KEYID = 7
14,325,863 UART: [afmc] AUTHORITY.KEYID = 5
16,853,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,787 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,611,766 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,627,635 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,643,397 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,666,225 UART: [afmc] --
18,669,424 UART: [cold-reset] --
18,672,282 UART: [state] Locking Datavault
18,678,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,680,216 UART: [state] Locking ICCM
18,681,721 UART: [exit] Launching FMC @ 0x40000130
18,690,120 UART:
18,690,357 UART: Running Caliptra FMC ...
18,691,407 UART:
18,691,558 UART: [state] CFI Enabled
18,753,665 UART: [fht] FMC Alias Private Key: 7
20,517,380 UART: [art] Extend RT PCRs Done
20,518,579 UART: [art] Lock RT PCRs Done
20,520,411 UART: [art] Populate DV Done
20,525,986 UART: [fht] FMC Alias Private Key: 7
20,527,530 UART: [art] Derive CDI
20,528,347 UART: [art] Store in in slot 0x4
20,586,358 UART: [art] Derive Key Pair
20,587,406 UART: [art] Store priv key in slot 0x5
23,051,176 UART: [art] Derive Key Pair - Done
23,064,175 UART: [art] Signing Cert with AUTHO
23,065,487 UART: RITY.KEYID = 7
24,775,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,434 UART: [art] PUB.X = DF84543DE019CECC7D2F09289A1CBD08ABF2B525B5E441EBCCF8E0C40200107BDC942294F3D66FB02A1968E1A4B349BC
24,784,741 UART: [art] PUB.Y = 4AAEF065AA3341C1EFB0361362DD0AC8B6129DAF5CF21CD56728F5FB1875F0E275C004D1AD177A95F4319968C2D06A23
24,791,994 UART: [art] SIG.R = 4E9F957BFEFA85FC5118764E0ECC27D736F0C4E77AB7BD03B2C5A85F7316CD66E140505FF075841C5550ACCD0A9009BF
24,799,396 UART: [art] SIG.S = 38AD01F98F9C0486EC9725B8ACD7D28FA44266D3419274E19F89B9EB1BD815BC0AEFF0628A2C34FF4F4D5A8EED657275
25,778,283 UART: Caliptra RT
25,778,997 UART: [state] CFI Enabled
25,944,652 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,302 UART:
1,587 UART: Running Caliptra ROM ...
2,696 UART:
2,867 UART: [state] CFI Enabled
63,545 UART: [state] LifecycleState = Production
65,306 UART: [state] DebugLocked = Yes
67,018 UART: [state] Starting the WD Timer 40000000 cycles
72,445 UART: [kat] SHA2-256
251,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,160 UART: [kat] ++
263,604 UART: [kat] sha1
273,828 UART: [kat] SHA2-256
276,882 UART: [kat] SHA2-384
282,358 UART: [kat] SHA2-512-ACC
285,277 UART: [kat] ECC-384
2,749,505 UART: [kat] HMAC-384Kdf
2,772,417 UART: [kat] LMS
3,301,910 UART: [kat] --
3,306,950 UART: [warm-reset] ++
3,311,599 UART: [warm-reset] --
3,314,171 UART: [state] Locking Datavault
3,317,259 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,906 UART: [state] Locking ICCM
3,320,813 UART: [exit] Launching FMC @ 0x40000130
3,329,250 UART:
3,329,497 UART: Running Caliptra FMC ...
3,330,523 UART:
3,330,674 UART: [state] CFI Enabled
3,380,820 UART: [aliasrt :skip pcr extension
3,382,076 UART: [art] Extend RT PCRs Done
3,383,217 UART: [art] Lock RT PCRs Done
3,384,341 UART: [art] Populate DV Done
3,389,800 UART: [fht] FMC Alias Private Key: 7
3,391,442 UART: [art] Derive CDI
3,392,252 UART: [art] Store in in slot 0x4
3,449,472 UART: [art] Derive Key Pair
3,450,514 UART: [art] Store priv key in slot 0x5
5,913,515 UART: [art] Derive Key Pair - Done
5,926,720 UART: [art] Signing Cert with AUTHO
5,928,024 UART: RITY.KEYID = 7
7,639,335 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,842 UART: [art] PUB.X = DF84543DE019CECC7D2F09289A1CBD08ABF2B525B5E441EBCCF8E0C40200107BDC942294F3D66FB02A1968E1A4B349BC
7,648,165 UART: [art] PUB.Y = 4AAEF065AA3341C1EFB0361362DD0AC8B6129DAF5CF21CD56728F5FB1875F0E275C004D1AD177A95F4319968C2D06A23
7,655,414 UART: [art] SIG.R = 4E9F957BFEFA85FC5118764E0ECC27D736F0C4E77AB7BD03B2C5A85F7316CD66E140505FF075841C5550ACCD0A9009BF
7,662,812 UART: [art] SIG.S = 38AD01F98F9C0486EC9725B8ACD7D28FA44266D3419274E19F89B9EB1BD815BC0AEFF0628A2C34FF4F4D5A8EED657275
8,641,689 UART: Caliptra RT
8,642,380 UART: [state] CFI Enabled
8,975,804 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
191,669 UART:
192,037 UART: Running Caliptra ROM ...
193,172 UART:
193,318 UART: [state] CFI Enabled
267,421 UART: [state] LifecycleState = Production
269,176 UART: [state] DebugLocked = Yes
270,735 UART: [state] Starting the WD Timer 40000000 cycles
275,550 UART: [kat] SHA2-256
454,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,266 UART: [kat] ++
466,712 UART: [kat] sha1
477,250 UART: [kat] SHA2-256
480,260 UART: [kat] SHA2-384
486,322 UART: [kat] SHA2-512-ACC
489,268 UART: [kat] ECC-384
2,947,646 UART: [kat] HMAC-384Kdf
2,970,891 UART: [kat] LMS
3,500,310 UART: [kat] --
3,504,433 UART: [cold-reset] ++
3,506,797 UART: [fht] FHT @ 0x50003400
3,518,629 UART: [idev] ++
3,519,196 UART: [idev] CDI.KEYID = 6
3,520,102 UART: [idev] SUBJECT.KEYID = 7
3,521,282 UART: [idev] UDS.KEYID = 0
3,522,351 ready_for_fw is high
3,522,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,486 UART: [idev] Erasing UDS.KEYID = 0
6,025,262 UART: [idev] Sha1 KeyId Algorithm
6,048,975 UART: [idev] --
6,052,329 UART: [ldev] ++
6,052,903 UART: [ldev] CDI.KEYID = 6
6,053,816 UART: [ldev] SUBJECT.KEYID = 5
6,054,981 UART: [ldev] AUTHORITY.KEYID = 7
6,056,269 UART: [ldev] FE.KEYID = 1
6,101,012 UART: [ldev] Erasing FE.KEYID = 1
8,603,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,327 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,337,303 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,353,176 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,369,096 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,683 UART: [ldev] --
10,393,426 UART: [fwproc] Wait for Commands...
10,396,440 UART: [fwproc] Recv command 0x46574c44
10,398,532 UART: [fwproc] Recv'd Img size: 114448 bytes
13,830,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,293,652 >>> mbox cmd response: success
14,297,191 UART: [afmc] ++
14,297,783 UART: [afmc] CDI.KEYID = 6
14,298,695 UART: [afmc] SUBJECT.KEYID = 7
14,299,857 UART: [afmc] AUTHORITY.KEYID = 5
16,829,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,465 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,573,444 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,589,331 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,605,035 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,627,367 UART: [afmc] --
18,631,666 UART: [cold-reset] --
18,634,724 UART: [state] Locking Datavault
18,638,943 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,585 UART: [state] Locking ICCM
18,642,898 UART: [exit] Launching FMC @ 0x40000130
18,651,357 UART:
18,651,590 UART: Running Caliptra FMC ...
18,652,690 UART:
18,652,847 UART: [state] CFI Enabled
18,713,162 UART: [fht] FMC Alias Private Key: 7
20,477,177 UART: [art] Extend RT PCRs Done
20,478,399 UART: [art] Lock RT PCRs Done
20,479,971 UART: [art] Populate DV Done
20,485,350 UART: [fht] FMC Alias Private Key: 7
20,487,049 UART: [art] Derive CDI
20,487,867 UART: [art] Store in in slot 0x4
20,546,211 UART: [art] Derive Key Pair
20,547,243 UART: [art] Store priv key in slot 0x5
23,010,487 UART: [art] Derive Key Pair - Done
23,023,270 UART: [art] Signing Cert with AUTHO
23,024,605 UART: RITY.KEYID = 7
24,736,169 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,675 UART: [art] PUB.X = 5B7619F0ADE1A3C3E0B300AA11D178605992E8CD40FC507EFB7FE70A4C334E7F317281D176AB116347755588BA92E734
24,744,872 UART: [art] PUB.Y = 3891A96EA374147FE9E68780753CD3EA09195EFD27711CD4F3D388111C02AC4E816DC8F59B60DC3BE0650C858BFF8E47
24,752,157 UART: [art] SIG.R = 6144BB7D0A5E4D470E3F90CB5379C7C57C88CC85E4CC106A097E0CB00E5257D352572A4197979792E5B8319A91050EEE
24,759,548 UART: [art] SIG.S = D8F602B04A037C74731EB4C45EA51918C8106CEEF6C358CE33E6B215CE27B0A788F19E49B4A569F64743F43EBE1BAD94
25,738,345 UART: Caliptra RT
25,739,066 UART: [state] CFI Enabled
25,905,617 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,267 UART:
1,552 UART: Running Caliptra ROM ...
2,665 UART:
2,821 UART: [state] CFI Enabled
62,233 UART: [state] LifecycleState = Production
63,958 UART: [state] DebugLocked = Yes
66,934 UART: [state] Starting the WD Timer 40000000 cycles
71,873 UART: [kat] SHA2-256
251,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,647 UART: [kat] ++
263,184 UART: [kat] sha1
274,175 UART: [kat] SHA2-256
277,232 UART: [kat] SHA2-384
284,231 UART: [kat] SHA2-512-ACC
287,164 UART: [kat] ECC-384
2,748,781 UART: [kat] HMAC-384Kdf
2,770,520 UART: [kat] LMS
3,299,978 UART: [kat] --
3,304,986 UART: [warm-reset] ++
3,309,568 UART: [warm-reset] --
3,312,892 UART: [state] Locking Datavault
3,316,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,842 UART: [state] Locking ICCM
3,319,156 UART: [exit] Launching FMC @ 0x40000130
3,327,610 UART:
3,327,854 UART: Running Caliptra FMC ...
3,328,959 UART:
3,329,116 UART: [state] CFI Enabled
3,380,458 UART: [aliasrt :skip pcr extension
3,381,751 UART: [art] Extend RT PCRs Done
3,382,819 UART: [art] Lock RT PCRs Done
3,384,229 UART: [art] Populate DV Done
3,389,422 UART: [fht] FMC Alias Private Key: 7
3,391,132 UART: [art] Derive CDI
3,391,949 UART: [art] Store in in slot 0x4
3,449,441 UART: [art] Derive Key Pair
3,450,505 UART: [art] Store priv key in slot 0x5
5,912,896 UART: [art] Derive Key Pair - Done
5,925,628 UART: [art] Signing Cert with AUTHO
5,926,933 UART: RITY.KEYID = 7
7,639,090 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,593 UART: [art] PUB.X = 5B7619F0ADE1A3C3E0B300AA11D178605992E8CD40FC507EFB7FE70A4C334E7F317281D176AB116347755588BA92E734
7,647,828 UART: [art] PUB.Y = 3891A96EA374147FE9E68780753CD3EA09195EFD27711CD4F3D388111C02AC4E816DC8F59B60DC3BE0650C858BFF8E47
7,655,120 UART: [art] SIG.R = 6144BB7D0A5E4D470E3F90CB5379C7C57C88CC85E4CC106A097E0CB00E5257D352572A4197979792E5B8319A91050EEE
7,662,458 UART: [art] SIG.S = D8F602B04A037C74731EB4C45EA51918C8106CEEF6C358CE33E6B215CE27B0A788F19E49B4A569F64743F43EBE1BAD94
8,641,385 UART: Caliptra RT
8,642,075 UART: [state] CFI Enabled
8,976,998 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
191,872 UART:
192,241 UART: Running Caliptra ROM ...
193,543 UART:
602,973 UART: [state] CFI Enabled
615,868 UART: [state] LifecycleState = Production
617,648 UART: [state] DebugLocked = Yes
619,077 UART: [state] Starting the WD Timer 40000000 cycles
623,540 UART: [kat] SHA2-256
802,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,281 UART: [kat] ++
814,725 UART: [kat] sha1
825,620 UART: [kat] SHA2-256
828,634 UART: [kat] SHA2-384
834,430 UART: [kat] SHA2-512-ACC
837,351 UART: [kat] ECC-384
3,278,177 UART: [kat] HMAC-384Kdf
3,291,938 UART: [kat] LMS
3,821,460 UART: [kat] --
3,826,168 UART: [cold-reset] ++
3,827,523 UART: [fht] FHT @ 0x50003400
3,838,073 UART: [idev] ++
3,838,637 UART: [idev] CDI.KEYID = 6
3,839,547 UART: [idev] SUBJECT.KEYID = 7
3,840,723 UART: [idev] UDS.KEYID = 0
3,841,867 ready_for_fw is high
3,842,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,352 UART: [idev] Erasing UDS.KEYID = 0
6,311,931 UART: [idev] Sha1 KeyId Algorithm
6,334,571 UART: [idev] --
6,339,208 UART: [ldev] ++
6,339,799 UART: [ldev] CDI.KEYID = 6
6,340,680 UART: [ldev] SUBJECT.KEYID = 5
6,341,895 UART: [ldev] AUTHORITY.KEYID = 7
6,343,178 UART: [ldev] FE.KEYID = 1
6,352,939 UART: [ldev] Erasing FE.KEYID = 1
8,828,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,427 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,562,459 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,578,277 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,594,256 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,739 UART: [ldev] --
10,620,840 UART: [fwproc] Wait for Commands...
10,623,899 UART: [fwproc] Recv command 0x46574c44
10,625,986 UART: [fwproc] Recv'd Img size: 114448 bytes
14,057,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,131,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,200,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,518,720 >>> mbox cmd response: success
14,523,464 UART: [afmc] ++
14,524,046 UART: [afmc] CDI.KEYID = 6
14,524,962 UART: [afmc] SUBJECT.KEYID = 7
14,526,119 UART: [afmc] AUTHORITY.KEYID = 5
17,025,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,060 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,763,073 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,778,898 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,794,593 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,818,493 UART: [afmc] --
18,821,748 UART: [cold-reset] --
18,826,741 UART: [state] Locking Datavault
18,832,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,833,790 UART: [state] Locking ICCM
18,835,684 UART: [exit] Launching FMC @ 0x40000130
18,844,087 UART:
18,844,321 UART: Running Caliptra FMC ...
18,845,416 UART:
18,845,574 UART: [state] CFI Enabled
18,854,049 UART: [fht] FMC Alias Private Key: 7
20,610,492 UART: [art] Extend RT PCRs Done
20,611,720 UART: [art] Lock RT PCRs Done
20,613,504 UART: [art] Populate DV Done
20,618,919 UART: [fht] FMC Alias Private Key: 7
20,620,448 UART: [art] Derive CDI
20,621,180 UART: [art] Store in in slot 0x4
20,663,766 UART: [art] Derive Key Pair
20,664,760 UART: [art] Store priv key in slot 0x5
23,091,153 UART: [art] Derive Key Pair - Done
23,104,176 UART: [art] Signing Cert with AUTHO
23,105,486 UART: RITY.KEYID = 7
24,811,073 UART: [art] Erasing AUTHORITY.KEYID = 7
24,812,580 UART: [art] PUB.X = EBD38677CF442C96C0795A5BE06E93CD7A10A83FAC91B2AF798DFEDAB51BBF25B559C7BF261E62F47410302D26935741
24,819,832 UART: [art] PUB.Y = BD6AF29D774983E77AA99713E8E76B780F4F1643F0F5AB0CF0A5951726B57D80D39C4FD8DA5087DFA83D1A46C9AAE261
24,827,114 UART: [art] SIG.R = A8401DEDF5AA138CA720951444FA5CAC14BDE954B4D96CF5E7C4FE484304FE0B685E919DD47937FCA3D58EFED3C06292
24,834,580 UART: [art] SIG.S = D94557B4D55C4488A0B9C2889BF77F0C31ED855308FA68E031C25889B71CF556292171A31AA65A03D7E7600E47CE846C
25,813,535 UART: Caliptra RT
25,814,248 UART: [state] CFI Enabled
25,931,250 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,309 UART:
1,598 UART: Running Caliptra ROM ...
2,704 UART:
14,597,626 UART: [state] CFI Enabled
14,609,226 UART: [state] LifecycleState = Production
14,611,001 UART: [state] DebugLocked = Yes
14,613,073 UART: [state] Starting the WD Timer 40000000 cycles
14,617,368 UART: [kat] SHA2-256
14,796,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,808,052 UART: [kat] ++
14,808,589 UART: [kat] sha1
14,818,558 UART: [kat] SHA2-256
14,821,610 UART: [kat] SHA2-384
14,828,620 UART: [kat] SHA2-512-ACC
14,831,559 UART: [kat] ECC-384
17,277,576 UART: [kat] HMAC-384Kdf
17,289,306 UART: [kat] LMS
17,818,843 UART: [kat] --
17,821,961 UART: [warm-reset] ++
17,826,963 UART: [warm-reset] --
17,831,141 UART: [state] Locking Datavault
17,835,160 UART: [state] Locking PCR0, PCR1 and PCR31
17,836,857 UART: [state] Locking ICCM
17,839,544 UART: [exit] Launching FMC @ 0x40000130
17,847,999 UART:
17,848,230 UART: Running Caliptra FMC ...
17,849,326 UART:
17,849,478 UART: [state] CFI Enabled
17,851,525 UART: [aliasrt :skip pcr extension
17,852,764 UART: [art] Extend RT PCRs Done
17,853,896 UART: [art] Lock RT PCRs Done
17,855,118 UART: [art] Populate DV Done
17,860,625 UART: [fht] FMC Alias Private Key: 7
17,862,256 UART: [art] Derive CDI
17,863,073 UART: [art] Store in in slot 0x4
17,905,988 UART: [art] Derive Key Pair
17,906,983 UART: [art] Store priv key in slot 0x5
20,333,662 UART: [art] Derive Key Pair - Done
20,346,590 UART: [art] Signing Cert with AUTHO
20,347,931 UART: RITY.KEYID = 7
22,053,042 UART: [art] Erasing AUTHORITY.KEYID = 7
22,054,543 UART: [art] PUB.X = EBD38677CF442C96C0795A5BE06E93CD7A10A83FAC91B2AF798DFEDAB51BBF25B559C7BF261E62F47410302D26935741
22,061,829 UART: [art] PUB.Y = BD6AF29D774983E77AA99713E8E76B780F4F1643F0F5AB0CF0A5951726B57D80D39C4FD8DA5087DFA83D1A46C9AAE261
22,069,116 UART: [art] SIG.R = A8401DEDF5AA138CA720951444FA5CAC14BDE954B4D96CF5E7C4FE484304FE0B685E919DD47937FCA3D58EFED3C06292
22,076,573 UART: [art] SIG.S = D94557B4D55C4488A0B9C2889BF77F0C31ED855308FA68E031C25889B71CF556292171A31AA65A03D7E7600E47CE846C
23,055,678 UART: Caliptra RT
23,056,390 UART: [state] CFI Enabled
23,344,937 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
191,836 UART:
192,199 UART: Running Caliptra ROM ...
193,318 UART:
603,049 UART: [state] CFI Enabled
615,030 UART: [state] LifecycleState = Production
616,743 UART: [state] DebugLocked = Yes
618,944 UART: [state] Starting the WD Timer 40000000 cycles
623,535 UART: [kat] SHA2-256
802,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,276 UART: [kat] ++
814,801 UART: [kat] sha1
825,913 UART: [kat] SHA2-256
828,918 UART: [kat] SHA2-384
834,782 UART: [kat] SHA2-512-ACC
837,752 UART: [kat] ECC-384
3,280,116 UART: [kat] HMAC-384Kdf
3,293,556 UART: [kat] LMS
3,823,085 UART: [kat] --
3,826,228 UART: [cold-reset] ++
3,827,091 UART: [fht] FHT @ 0x50003400
3,838,063 UART: [idev] ++
3,838,629 UART: [idev] CDI.KEYID = 6
3,839,508 UART: [idev] SUBJECT.KEYID = 7
3,840,751 UART: [idev] UDS.KEYID = 0
3,841,667 ready_for_fw is high
3,841,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,596 UART: [idev] Erasing UDS.KEYID = 0
6,313,240 UART: [idev] Sha1 KeyId Algorithm
6,336,042 UART: [idev] --
6,341,438 UART: [ldev] ++
6,342,005 UART: [ldev] CDI.KEYID = 6
6,342,996 UART: [ldev] SUBJECT.KEYID = 5
6,344,153 UART: [ldev] AUTHORITY.KEYID = 7
6,345,383 UART: [ldev] FE.KEYID = 1
6,358,053 UART: [ldev] Erasing FE.KEYID = 1
8,830,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,672 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,639 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,503 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,494 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,545 UART: [ldev] --
10,621,001 UART: [fwproc] Wait for Commands...
10,624,175 UART: [fwproc] Recv command 0x46574c44
10,626,264 UART: [fwproc] Recv'd Img size: 114448 bytes
14,057,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,134,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,203,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,521,456 >>> mbox cmd response: success
14,526,162 UART: [afmc] ++
14,526,745 UART: [afmc] CDI.KEYID = 6
14,527,627 UART: [afmc] SUBJECT.KEYID = 7
14,528,841 UART: [afmc] AUTHORITY.KEYID = 5
17,027,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,746,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,748,810 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,764,810 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,780,642 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,796,407 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,819,394 UART: [afmc] --
18,822,647 UART: [cold-reset] --
18,826,674 UART: [state] Locking Datavault
18,831,161 UART: [state] Locking PCR0, PCR1 and PCR31
18,832,811 UART: [state] Locking ICCM
18,834,805 UART: [exit] Launching FMC @ 0x40000130
18,843,242 UART:
18,843,484 UART: Running Caliptra FMC ...
18,844,584 UART:
18,844,737 UART: [state] CFI Enabled
18,852,729 UART: [fht] FMC Alias Private Key: 7
20,609,814 UART: [art] Extend RT PCRs Done
20,611,035 UART: [art] Lock RT PCRs Done
20,612,716 UART: [art] Populate DV Done
20,618,095 UART: [fht] FMC Alias Private Key: 7
20,619,635 UART: [art] Derive CDI
20,620,453 UART: [art] Store in in slot 0x4
20,662,719 UART: [art] Derive Key Pair
20,663,719 UART: [art] Store priv key in slot 0x5
23,090,308 UART: [art] Derive Key Pair - Done
23,103,245 UART: [art] Signing Cert with AUTHO
23,104,543 UART: RITY.KEYID = 7
24,810,361 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,874 UART: [art] PUB.X = 09963D0DCBC0D85C66341CC4877842193FCA3A66BE0CDD5D776E614D87D4EC6494B2582BE4981F418C66FC96A5D0CFCD
24,819,177 UART: [art] PUB.Y = 19888E1D814DE3D30603D8773CBC5F76F4A7A32EA8F3669E514B612766CA12BF169FD1E8F84553A929534FE50483FA06
24,826,407 UART: [art] SIG.R = 3539662E69012FDDAB91CAC587FB6B9F6BCDDFD672B8448C82E758CC1E5B6E2FA826E23FFF71366B4135668E891B377F
24,833,808 UART: [art] SIG.S = 694EF7767AD461D3ADAD4366D809F9D0733EB172F40BEA6277B2B7650CDD69B6B35351D29D7CEBE6661B65CB7B47C126
25,812,075 UART: Caliptra RT
25,812,783 UART: [state] CFI Enabled
25,930,601 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,366 UART:
1,646 UART: Running Caliptra ROM ...
2,753 UART:
14,597,907 UART: [state] CFI Enabled
14,613,025 UART: [state] LifecycleState = Production
14,614,738 UART: [state] DebugLocked = Yes
14,616,428 UART: [state] Starting the WD Timer 40000000 cycles
14,621,106 UART: [kat] SHA2-256
14,800,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,811,802 UART: [kat] ++
14,812,344 UART: [kat] sha1
14,823,289 UART: [kat] SHA2-256
14,826,336 UART: [kat] SHA2-384
14,832,438 UART: [kat] SHA2-512-ACC
14,835,384 UART: [kat] ECC-384
17,276,101 UART: [kat] HMAC-384Kdf
17,288,161 UART: [kat] LMS
17,817,668 UART: [kat] --
17,822,359 UART: [warm-reset] ++
17,827,360 UART: [warm-reset] --
17,830,841 UART: [state] Locking Datavault
17,835,603 UART: [state] Locking PCR0, PCR1 and PCR31
17,837,241 UART: [state] Locking ICCM
17,839,574 UART: [exit] Launching FMC @ 0x40000130
17,848,022 UART:
17,848,257 UART: Running Caliptra FMC ...
17,849,354 UART:
17,849,507 UART: [state] CFI Enabled
17,851,453 UART: [aliasrt :skip pcr extension
17,852,705 UART: [art] Extend RT PCRs Done
17,853,838 UART: [art] Lock RT PCRs Done
17,855,300 UART: [art] Populate DV Done
17,860,977 UART: [fht] FMC Alias Private Key: 7
17,862,489 UART: [art] Derive CDI
17,863,254 UART: [art] Store in in slot 0x4
17,906,065 UART: [art] Derive Key Pair
17,907,071 UART: [art] Store priv key in slot 0x5
20,334,249 UART: [art] Derive Key Pair - Done
20,347,251 UART: [art] Signing Cert with AUTHO
20,348,591 UART: RITY.KEYID = 7
22,054,444 UART: [art] Erasing AUTHORITY.KEYID = 7
22,055,943 UART: [art] PUB.X = 09963D0DCBC0D85C66341CC4877842193FCA3A66BE0CDD5D776E614D87D4EC6494B2582BE4981F418C66FC96A5D0CFCD
22,063,228 UART: [art] PUB.Y = 19888E1D814DE3D30603D8773CBC5F76F4A7A32EA8F3669E514B612766CA12BF169FD1E8F84553A929534FE50483FA06
22,070,468 UART: [art] SIG.R = 3539662E69012FDDAB91CAC587FB6B9F6BCDDFD672B8448C82E758CC1E5B6E2FA826E23FFF71366B4135668E891B377F
22,077,854 UART: [art] SIG.S = 694EF7767AD461D3ADAD4366D809F9D0733EB172F40BEA6277B2B7650CDD69B6B35351D29D7CEBE6661B65CB7B47C126
23,056,753 UART: Caliptra RT
23,057,473 UART: [state] CFI Enabled
23,347,539 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,487 UART: [state] Starting the WD Timer 40000000 cycles
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,174,456 ready_for_fw is high
1,174,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,465 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,260 UART: [ldev] Erasing FE.KEYID = 1
1,242,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,813 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,683 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,389 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,415 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,219 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,375 >>> mbox cmd response: success
2,801,621 UART: [afmc] ++
2,801,789 UART: [afmc] CDI.KEYID = 6
2,802,152 UART: [afmc] SUBJECT.KEYID = 7
2,802,578 UART: [afmc] AUTHORITY.KEYID = 5
2,838,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,460 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,179 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,072 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,779 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,664 UART: [afmc] --
2,881,577 UART: [cold-reset] --
2,882,615 UART: [state] Locking Datavault
2,883,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,306 UART: [state] Locking ICCM
2,884,830 UART: [exit] Launching FMC @ 0x40000130
2,890,159 UART:
2,890,175 UART: Running Caliptra FMC ...
2,890,583 UART:
2,890,637 UART: [state] CFI Enabled
2,901,066 UART: [fht] FMC Alias Private Key: 7
3,009,071 UART: [art] Extend RT PCRs Done
3,009,499 UART: [art] Lock RT PCRs Done
3,010,949 UART: [art] Populate DV Done
3,019,303 UART: [fht] FMC Alias Private Key: 7
3,020,295 UART: [art] Derive CDI
3,020,575 UART: [art] Store in in slot 0x4
3,105,982 UART: [art] Derive Key Pair
3,106,342 UART: [art] Store priv key in slot 0x5
3,119,692 UART: [art] Derive Key Pair - Done
3,134,339 UART: [art] Signing Cert with AUTHO
3,134,819 UART: RITY.KEYID = 7
3,149,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,622 UART: [art] PUB.X = 8FD7A97F1EA85F7B6B7287069CBA2ABAEE23ED1BF75434B7FED3DF9BB640520333D5C6070D4A6A95F95BC6B48717993D
3,157,396 UART: [art] PUB.Y = AF85699840F2BCBB26412D534DBF8CFE06C9D6A52E72424257584B277749DCD1A48175DD182D9BC143EA9178F4C49234
3,164,345 UART: [art] SIG.R = EDDCBE5626BBB1200DBFAE0AC3CD13004B3B00B264E0FD1B8A0302C2B6DAA154DA55C373805AFD77A39875825F96980A
3,171,074 UART: [art] SIG.S = 7DE1B037F3F4B9858CE0991413B2B6EA881A8CE2ABFE0BB0D9BBA402413945619D749639F0784302984105E65E6085D0
3,194,689 UART: Caliptra RT
3,194,942 UART: [state] CFI Enabled
3,302,955 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,711 UART:
3,303,727 UART: Running Caliptra ROM ...
3,304,135 UART:
3,304,190 UART: [state] CFI Enabled
3,307,069 UART: [state] LifecycleState = Production
3,307,677 UART: [state] DebugLocked = Yes
3,308,347 UART: [state] Starting the WD Timer 40000000 cycles
3,310,020 UART: [kat] SHA2-256
4,113,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,699 UART: [kat] ++
4,117,851 UART: [kat] sha1
4,122,051 UART: [kat] SHA2-256
4,123,991 UART: [kat] SHA2-384
4,126,832 UART: [kat] SHA2-512-ACC
4,128,733 UART: [kat] ECC-384
4,138,024 UART: [kat] HMAC-384Kdf
4,142,626 UART: [kat] LMS
4,390,938 UART: [kat] --
4,392,010 UART: [warm-reset] ++
4,392,877 UART: [warm-reset] --
4,393,512 UART: [state] Locking Datavault
4,394,254 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,858 UART: [state] Locking ICCM
4,395,434 UART: [exit] Launching FMC @ 0x40000130
4,400,763 UART:
4,400,779 UART: Running Caliptra FMC ...
4,401,187 UART:
4,401,241 UART: [state] CFI Enabled
4,402,572 UART: [aliasrt :skip pcr extension
4,403,045 UART: [art] Extend RT PCRs Done
4,403,473 UART: [art] Lock RT PCRs Done
4,404,846 UART: [art] Populate DV Done
4,412,866 UART: [fht] FMC Alias Private Key: 7
4,413,912 UART: [art] Derive CDI
4,414,192 UART: [art] Store in in slot 0x4
4,499,831 UART: [art] Derive Key Pair
4,500,191 UART: [art] Store priv key in slot 0x5
4,513,213 UART: [art] Derive Key Pair - Done
4,527,852 UART: [art] Signing Cert with AUTHO
4,528,332 UART: RITY.KEYID = 7
4,542,942 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,707 UART: [art] PUB.X = 8FD7A97F1EA85F7B6B7287069CBA2ABAEE23ED1BF75434B7FED3DF9BB640520333D5C6070D4A6A95F95BC6B48717993D
4,550,481 UART: [art] PUB.Y = AF85699840F2BCBB26412D534DBF8CFE06C9D6A52E72424257584B277749DCD1A48175DD182D9BC143EA9178F4C49234
4,557,430 UART: [art] SIG.R = EDDCBE5626BBB1200DBFAE0AC3CD13004B3B00B264E0FD1B8A0302C2B6DAA154DA55C373805AFD77A39875825F96980A
4,564,159 UART: [art] SIG.S = 7DE1B037F3F4B9858CE0991413B2B6EA881A8CE2ABFE0BB0D9BBA402413945619D749639F0784302984105E65E6085D0
4,588,122 UART: Caliptra RT
4,588,375 UART: [state] CFI Enabled
4,871,088 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Production
85,487 UART: [state] DebugLocked = Yes
86,093 UART: [state] Starting the WD Timer 40000000 cycles
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,425 UART: [cold-reset] ++
1,169,878 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 ready_for_fw is high
1,173,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,132 UART: [idev] Sha1 KeyId Algorithm
1,206,999 UART: [idev] --
1,208,058 UART: [ldev] ++
1,208,226 UART: [ldev] CDI.KEYID = 6
1,208,590 UART: [ldev] SUBJECT.KEYID = 5
1,209,017 UART: [ldev] AUTHORITY.KEYID = 7
1,209,480 UART: [ldev] FE.KEYID = 1
1,214,540 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,065 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,935 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,641 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,627 UART: [ldev] --
1,280,011 UART: [fwproc] Wait for Commands...
1,280,796 UART: [fwproc] Recv command 0x46574c44
1,281,529 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,011 >>> mbox cmd response: success
2,799,093 UART: [afmc] ++
2,799,261 UART: [afmc] CDI.KEYID = 6
2,799,624 UART: [afmc] SUBJECT.KEYID = 7
2,800,050 UART: [afmc] AUTHORITY.KEYID = 5
2,835,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,948 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,667 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,560 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,267 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,090 UART: [afmc] --
2,879,185 UART: [cold-reset] --
2,880,073 UART: [state] Locking Datavault
2,881,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,810 UART: [state] Locking ICCM
2,882,292 UART: [exit] Launching FMC @ 0x40000130
2,887,621 UART:
2,887,637 UART: Running Caliptra FMC ...
2,888,045 UART:
2,888,099 UART: [state] CFI Enabled
2,898,546 UART: [fht] FMC Alias Private Key: 7
3,006,085 UART: [art] Extend RT PCRs Done
3,006,513 UART: [art] Lock RT PCRs Done
3,007,759 UART: [art] Populate DV Done
3,015,831 UART: [fht] FMC Alias Private Key: 7
3,016,799 UART: [art] Derive CDI
3,017,079 UART: [art] Store in in slot 0x4
3,102,804 UART: [art] Derive Key Pair
3,103,164 UART: [art] Store priv key in slot 0x5
3,116,520 UART: [art] Derive Key Pair - Done
3,131,433 UART: [art] Signing Cert with AUTHO
3,131,913 UART: RITY.KEYID = 7
3,146,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,278 UART: [art] PUB.X = A736532145765176EC2535D71B1FB0EED848AB8731C0A1C77778EF4B46AB2C32C624CABAB42BB3B547B3E1B4D580BD6D
3,154,060 UART: [art] PUB.Y = 69D97C5B3EDC52242BEF19ABDDF96E233876A70040B477F9480047F13C2BCA00C911580EE61C2F7EF9721B49E74A8E00
3,160,925 UART: [art] SIG.R = 4D4EA2F626AB172F97810C9CB82F4D4D727D4162A9B6B84DBA6B01DAFC43C86F9202543C5ED2F9AA15DC8FD4E68BC27B
3,167,706 UART: [art] SIG.S = 9373A2FD9FEF9A68B135D3D00D6EEEB7FDAF1043AA8E299B5F510BF7E0E2696469C53FFC8992376C78F5026B8C2CED7F
3,191,326 UART: Caliptra RT
3,191,579 UART: [state] CFI Enabled
3,299,092 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,848 UART:
3,299,864 UART: Running Caliptra ROM ...
3,300,272 UART:
3,300,327 UART: [state] CFI Enabled
3,302,772 UART: [state] LifecycleState = Production
3,303,380 UART: [state] DebugLocked = Yes
3,303,950 UART: [state] Starting the WD Timer 40000000 cycles
3,305,427 UART: [kat] SHA2-256
4,108,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,106 UART: [kat] ++
4,113,258 UART: [kat] sha1
4,117,540 UART: [kat] SHA2-256
4,119,480 UART: [kat] SHA2-384
4,122,111 UART: [kat] SHA2-512-ACC
4,124,012 UART: [kat] ECC-384
4,133,833 UART: [kat] HMAC-384Kdf
4,138,309 UART: [kat] LMS
4,386,621 UART: [kat] --
4,387,527 UART: [warm-reset] ++
4,388,590 UART: [warm-reset] --
4,389,641 UART: [state] Locking Datavault
4,390,379 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,983 UART: [state] Locking ICCM
4,391,647 UART: [exit] Launching FMC @ 0x40000130
4,396,976 UART:
4,396,992 UART: Running Caliptra FMC ...
4,397,400 UART:
4,397,454 UART: [state] CFI Enabled
4,398,679 UART: [aliasrt :skip pcr extension
4,399,152 UART: [art] Extend RT PCRs Done
4,399,580 UART: [art] Lock RT PCRs Done
4,400,801 UART: [art] Populate DV Done
4,409,321 UART: [fht] FMC Alias Private Key: 7
4,410,323 UART: [art] Derive CDI
4,410,603 UART: [art] Store in in slot 0x4
4,495,768 UART: [art] Derive Key Pair
4,496,128 UART: [art] Store priv key in slot 0x5
4,509,366 UART: [art] Derive Key Pair - Done
4,524,219 UART: [art] Signing Cert with AUTHO
4,524,699 UART: RITY.KEYID = 7
4,539,607 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,372 UART: [art] PUB.X = A736532145765176EC2535D71B1FB0EED848AB8731C0A1C77778EF4B46AB2C32C624CABAB42BB3B547B3E1B4D580BD6D
4,547,154 UART: [art] PUB.Y = 69D97C5B3EDC52242BEF19ABDDF96E233876A70040B477F9480047F13C2BCA00C911580EE61C2F7EF9721B49E74A8E00
4,554,019 UART: [art] SIG.R = 4D4EA2F626AB172F97810C9CB82F4D4D727D4162A9B6B84DBA6B01DAFC43C86F9202543C5ED2F9AA15DC8FD4E68BC27B
4,560,800 UART: [art] SIG.S = 9373A2FD9FEF9A68B135D3D00D6EEEB7FDAF1043AA8E299B5F510BF7E0E2696469C53FFC8992376C78F5026B8C2CED7F
4,585,124 UART: Caliptra RT
4,585,377 UART: [state] CFI Enabled
4,871,886 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Production
86,080 UART: [state] DebugLocked = Yes
86,590 UART: [state] Starting the WD Timer 40000000 cycles
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 ready_for_fw is high
1,174,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,506 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,694 UART: [idev] --
1,208,663 UART: [ldev] ++
1,208,831 UART: [ldev] CDI.KEYID = 6
1,209,195 UART: [ldev] SUBJECT.KEYID = 5
1,209,622 UART: [ldev] AUTHORITY.KEYID = 7
1,210,085 UART: [ldev] FE.KEYID = 1
1,215,285 UART: [ldev] Erasing FE.KEYID = 1
1,241,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,920 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,614 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,484 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,190 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,198 UART: [ldev] --
1,280,576 UART: [fwproc] Wait for Commands...
1,281,369 UART: [fwproc] Recv command 0x46574c44
1,282,102 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,496 >>> mbox cmd response: success
2,798,510 UART: [afmc] ++
2,798,678 UART: [afmc] CDI.KEYID = 6
2,799,041 UART: [afmc] SUBJECT.KEYID = 7
2,799,467 UART: [afmc] AUTHORITY.KEYID = 5
2,834,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,903 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,622 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,515 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,222 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,203 UART: [afmc] --
2,878,094 UART: [cold-reset] --
2,878,798 UART: [state] Locking Datavault
2,879,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,535 UART: [state] Locking ICCM
2,881,207 UART: [exit] Launching FMC @ 0x40000130
2,886,536 UART:
2,886,552 UART: Running Caliptra FMC ...
2,886,960 UART:
2,887,103 UART: [state] CFI Enabled
2,897,934 UART: [fht] FMC Alias Private Key: 7
3,006,175 UART: [art] Extend RT PCRs Done
3,006,603 UART: [art] Lock RT PCRs Done
3,007,703 UART: [art] Populate DV Done
3,015,769 UART: [fht] FMC Alias Private Key: 7
3,016,889 UART: [art] Derive CDI
3,017,169 UART: [art] Store in in slot 0x4
3,103,130 UART: [art] Derive Key Pair
3,103,490 UART: [art] Store priv key in slot 0x5
3,117,076 UART: [art] Derive Key Pair - Done
3,131,625 UART: [art] Signing Cert with AUTHO
3,132,105 UART: RITY.KEYID = 7
3,147,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,152 UART: [art] PUB.X = 13C39DA249465855A519DE7ECF151A5628B8921823920D919EE32E60B50633BA408CB119CDC7F1287F41F5A2C4CF0012
3,154,892 UART: [art] PUB.Y = 49915C9992068DF5EFB7F0A62B287EF4DF55F0582FE29ABBF04BD9A5827D775CBEB021219BE7269F5CCE589FB91577EA
3,161,853 UART: [art] SIG.R = 42341B9DC6E3AB6F496F17186630FC3652895194D2D0D669DCD90E0E93C63300DDDD7BB0329AFB40C864B883481D1BD6
3,168,599 UART: [art] SIG.S = 27A854069F255C9E6977FBCB3050AF43BB4641CDF66C5089D2992684DA688BF2FE406E75E0638B8A65459F099D4B7EF9
3,193,256 UART: Caliptra RT
3,193,601 UART: [state] CFI Enabled
3,301,711 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,467 UART:
3,302,483 UART: Running Caliptra ROM ...
3,302,891 UART:
3,303,033 UART: [state] CFI Enabled
3,306,058 UART: [state] LifecycleState = Production
3,306,666 UART: [state] DebugLocked = Yes
3,307,350 UART: [state] Starting the WD Timer 40000000 cycles
3,308,857 UART: [kat] SHA2-256
4,112,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,536 UART: [kat] ++
4,116,688 UART: [kat] sha1
4,120,768 UART: [kat] SHA2-256
4,122,708 UART: [kat] SHA2-384
4,125,557 UART: [kat] SHA2-512-ACC
4,127,458 UART: [kat] ECC-384
4,137,113 UART: [kat] HMAC-384Kdf
4,141,749 UART: [kat] LMS
4,390,061 UART: [kat] --
4,391,113 UART: [warm-reset] ++
4,392,182 UART: [warm-reset] --
4,393,147 UART: [state] Locking Datavault
4,394,137 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,741 UART: [state] Locking ICCM
4,395,257 UART: [exit] Launching FMC @ 0x40000130
4,400,586 UART:
4,400,602 UART: Running Caliptra FMC ...
4,401,010 UART:
4,401,153 UART: [state] CFI Enabled
4,402,464 UART: [aliasrt :skip pcr extension
4,402,937 UART: [art] Extend RT PCRs Done
4,403,365 UART: [art] Lock RT PCRs Done
4,404,796 UART: [art] Populate DV Done
4,413,246 UART: [fht] FMC Alias Private Key: 7
4,414,428 UART: [art] Derive CDI
4,414,708 UART: [art] Store in in slot 0x4
4,500,499 UART: [art] Derive Key Pair
4,500,859 UART: [art] Store priv key in slot 0x5
4,513,669 UART: [art] Derive Key Pair - Done
4,528,346 UART: [art] Signing Cert with AUTHO
4,528,826 UART: RITY.KEYID = 7
4,543,572 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,337 UART: [art] PUB.X = 13C39DA249465855A519DE7ECF151A5628B8921823920D919EE32E60B50633BA408CB119CDC7F1287F41F5A2C4CF0012
4,551,077 UART: [art] PUB.Y = 49915C9992068DF5EFB7F0A62B287EF4DF55F0582FE29ABBF04BD9A5827D775CBEB021219BE7269F5CCE589FB91577EA
4,558,038 UART: [art] SIG.R = 42341B9DC6E3AB6F496F17186630FC3652895194D2D0D669DCD90E0E93C63300DDDD7BB0329AFB40C864B883481D1BD6
4,564,784 UART: [art] SIG.S = 27A854069F255C9E6977FBCB3050AF43BB4641CDF66C5089D2992684DA688BF2FE406E75E0638B8A65459F099D4B7EF9
4,588,449 UART: Caliptra RT
4,588,794 UART: [state] CFI Enabled
4,871,106 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Production
86,006 UART: [state] DebugLocked = Yes
86,684 UART: [state] Starting the WD Timer 40000000 cycles
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,174,861 ready_for_fw is high
1,174,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,729 UART: [idev] Sha1 KeyId Algorithm
1,208,710 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,928 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,798 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,504 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,628 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,593 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,532 >>> mbox cmd response: success
2,800,580 UART: [afmc] ++
2,800,748 UART: [afmc] CDI.KEYID = 6
2,801,111 UART: [afmc] SUBJECT.KEYID = 7
2,801,537 UART: [afmc] AUTHORITY.KEYID = 5
2,837,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,559 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,278 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,171 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,878 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,867 UART: [afmc] --
2,880,940 UART: [cold-reset] --
2,881,894 UART: [state] Locking Datavault
2,882,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,567 UART: [state] Locking ICCM
2,884,237 UART: [exit] Launching FMC @ 0x40000130
2,889,566 UART:
2,889,582 UART: Running Caliptra FMC ...
2,889,990 UART:
2,890,133 UART: [state] CFI Enabled
2,901,128 UART: [fht] FMC Alias Private Key: 7
3,008,701 UART: [art] Extend RT PCRs Done
3,009,129 UART: [art] Lock RT PCRs Done
3,010,541 UART: [art] Populate DV Done
3,018,817 UART: [fht] FMC Alias Private Key: 7
3,019,793 UART: [art] Derive CDI
3,020,073 UART: [art] Store in in slot 0x4
3,105,528 UART: [art] Derive Key Pair
3,105,888 UART: [art] Store priv key in slot 0x5
3,119,650 UART: [art] Derive Key Pair - Done
3,134,405 UART: [art] Signing Cert with AUTHO
3,134,885 UART: RITY.KEYID = 7
3,150,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,420 UART: [art] PUB.X = D9FC4174477FBBDA4066BC4927C1B476BDC56950687D6326434C82F9455B0377727171ECB35E68311E5EB355651D10F8
3,158,181 UART: [art] PUB.Y = 54B74573116C17D75E0A565610CB0E4DAE6247DCF84BD03DA48E3304315B365AD9BB0D69B60C72D175C049BBEFE785A9
3,165,124 UART: [art] SIG.R = BCB4A8B120AA7F41DF523452D4BDE2A2C573DC78C57A528AF80164590F818ECDA9BE65834C34B54637FC674DFB3FEB14
3,171,904 UART: [art] SIG.S = 7357F715C3D1949C89B272177DF2B7F3A75D7E24AFBE46278B18529DD38CADF0317FF3F3FF956EB77972D39E4F289B17
3,195,315 UART: Caliptra RT
3,195,660 UART: [state] CFI Enabled
3,303,185 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,941 UART:
3,303,957 UART: Running Caliptra ROM ...
3,304,365 UART:
3,304,507 UART: [state] CFI Enabled
3,307,364 UART: [state] LifecycleState = Production
3,307,972 UART: [state] DebugLocked = Yes
3,308,496 UART: [state] Starting the WD Timer 40000000 cycles
3,310,015 UART: [kat] SHA2-256
4,113,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,694 UART: [kat] ++
4,117,846 UART: [kat] sha1
4,122,024 UART: [kat] SHA2-256
4,123,964 UART: [kat] SHA2-384
4,126,699 UART: [kat] SHA2-512-ACC
4,128,600 UART: [kat] ECC-384
4,138,415 UART: [kat] HMAC-384Kdf
4,142,955 UART: [kat] LMS
4,391,267 UART: [kat] --
4,392,215 UART: [warm-reset] ++
4,393,180 UART: [warm-reset] --
4,394,093 UART: [state] Locking Datavault
4,394,665 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,269 UART: [state] Locking ICCM
4,395,751 UART: [exit] Launching FMC @ 0x40000130
4,401,080 UART:
4,401,096 UART: Running Caliptra FMC ...
4,401,504 UART:
4,401,647 UART: [state] CFI Enabled
4,403,074 UART: [aliasrt :skip pcr extension
4,403,547 UART: [art] Extend RT PCRs Done
4,403,975 UART: [art] Lock RT PCRs Done
4,405,440 UART: [art] Populate DV Done
4,413,724 UART: [fht] FMC Alias Private Key: 7
4,414,802 UART: [art] Derive CDI
4,415,082 UART: [art] Store in in slot 0x4
4,500,989 UART: [art] Derive Key Pair
4,501,349 UART: [art] Store priv key in slot 0x5
4,515,289 UART: [art] Derive Key Pair - Done
4,529,978 UART: [art] Signing Cert with AUTHO
4,530,458 UART: RITY.KEYID = 7
4,545,710 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,475 UART: [art] PUB.X = D9FC4174477FBBDA4066BC4927C1B476BDC56950687D6326434C82F9455B0377727171ECB35E68311E5EB355651D10F8
4,553,236 UART: [art] PUB.Y = 54B74573116C17D75E0A565610CB0E4DAE6247DCF84BD03DA48E3304315B365AD9BB0D69B60C72D175C049BBEFE785A9
4,560,179 UART: [art] SIG.R = BCB4A8B120AA7F41DF523452D4BDE2A2C573DC78C57A528AF80164590F818ECDA9BE65834C34B54637FC674DFB3FEB14
4,566,959 UART: [art] SIG.S = 7357F715C3D1949C89B272177DF2B7F3A75D7E24AFBE46278B18529DD38CADF0317FF3F3FF956EB77972D39E4F289B17
4,590,412 UART: Caliptra RT
4,590,757 UART: [state] CFI Enabled
4,874,644 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,851 UART: [state] LifecycleState = Production
85,459 UART: [state] DebugLocked = Yes
86,119 UART: [state] Starting the WD Timer 40000000 cycles
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 ready_for_fw is high
1,174,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,197,882 UART: [idev] Sha1 KeyId Algorithm
1,206,679 UART: [idev] --
1,207,800 UART: [ldev] ++
1,207,968 UART: [ldev] CDI.KEYID = 6
1,208,332 UART: [ldev] SUBJECT.KEYID = 5
1,208,759 UART: [ldev] AUTHORITY.KEYID = 7
1,209,222 UART: [ldev] FE.KEYID = 1
1,214,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,417 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,287 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,993 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,181 UART: [ldev] --
1,280,645 UART: [fwproc] Wait for Commands...
1,281,458 UART: [fwproc] Recv command 0x46574c44
1,282,191 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,133 >>> mbox cmd response: success
2,800,395 UART: [afmc] ++
2,800,563 UART: [afmc] CDI.KEYID = 6
2,800,926 UART: [afmc] SUBJECT.KEYID = 7
2,801,352 UART: [afmc] AUTHORITY.KEYID = 5
2,836,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,152 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,871 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,764 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,471 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,434 UART: [afmc] --
2,880,337 UART: [cold-reset] --
2,881,345 UART: [state] Locking Datavault
2,882,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,832 UART: [state] Locking ICCM
2,883,428 UART: [exit] Launching FMC @ 0x40000130
2,888,757 UART:
2,888,773 UART: Running Caliptra FMC ...
2,889,181 UART:
2,889,235 UART: [state] CFI Enabled
2,899,690 UART: [fht] FMC Alias Private Key: 7
3,007,401 UART: [art] Extend RT PCRs Done
3,007,829 UART: [art] Lock RT PCRs Done
3,009,537 UART: [art] Populate DV Done
3,017,665 UART: [fht] FMC Alias Private Key: 7
3,018,795 UART: [art] Derive CDI
3,019,075 UART: [art] Store in in slot 0x4
3,104,586 UART: [art] Derive Key Pair
3,104,946 UART: [art] Store priv key in slot 0x5
3,118,220 UART: [art] Derive Key Pair - Done
3,133,273 UART: [art] Signing Cert with AUTHO
3,133,753 UART: RITY.KEYID = 7
3,148,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,620 UART: [art] PUB.X = 961B26128A5EBD19EF61EA7D359A62680CA82730F989DA4A3672C6C5BE7C33B7219DA854F2BDDFBA668103D754F93FDE
3,156,396 UART: [art] PUB.Y = 4B96F2A35C59389F1EB85F9613A4A52B920189EF97B4030A2ED7C7AF9191D061C4FFBC170A9F7CAE05FD0041F0768A05
3,163,314 UART: [art] SIG.R = F7E267D7DB28F7ECE8FE541878232FA76861DA2982D158272F15116622DEFD3E8A5BA7F49185CFA65045B8159D008444
3,170,062 UART: [art] SIG.S = 8DCCED16DE14E2ACC8F9E9038FAD2D49FB41A78F175A7C1A4D1F19F85BB22C4698FF43791D0535D9A002C7E88A47CEBA
3,193,656 UART: Caliptra RT
3,193,909 UART: [state] CFI Enabled
3,301,718 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,474 UART:
3,302,490 UART: Running Caliptra ROM ...
3,302,898 UART:
3,302,953 UART: [state] CFI Enabled
3,305,326 UART: [state] LifecycleState = Production
3,305,934 UART: [state] DebugLocked = Yes
3,306,578 UART: [state] Starting the WD Timer 40000000 cycles
3,308,197 UART: [kat] SHA2-256
4,111,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,876 UART: [kat] ++
4,116,028 UART: [kat] sha1
4,120,334 UART: [kat] SHA2-256
4,122,274 UART: [kat] SHA2-384
4,124,837 UART: [kat] SHA2-512-ACC
4,126,738 UART: [kat] ECC-384
4,136,117 UART: [kat] HMAC-384Kdf
4,140,663 UART: [kat] LMS
4,388,975 UART: [kat] --
4,389,591 UART: [warm-reset] ++
4,390,558 UART: [warm-reset] --
4,391,543 UART: [state] Locking Datavault
4,392,521 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,125 UART: [state] Locking ICCM
4,393,725 UART: [exit] Launching FMC @ 0x40000130
4,399,054 UART:
4,399,070 UART: Running Caliptra FMC ...
4,399,478 UART:
4,399,532 UART: [state] CFI Enabled
4,400,817 UART: [aliasrt :skip pcr extension
4,401,290 UART: [art] Extend RT PCRs Done
4,401,718 UART: [art] Lock RT PCRs Done
4,402,939 UART: [art] Populate DV Done
4,411,409 UART: [fht] FMC Alias Private Key: 7
4,412,487 UART: [art] Derive CDI
4,412,767 UART: [art] Store in in slot 0x4
4,498,438 UART: [art] Derive Key Pair
4,498,798 UART: [art] Store priv key in slot 0x5
4,512,120 UART: [art] Derive Key Pair - Done
4,526,953 UART: [art] Signing Cert with AUTHO
4,527,433 UART: RITY.KEYID = 7
4,542,621 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,386 UART: [art] PUB.X = 961B26128A5EBD19EF61EA7D359A62680CA82730F989DA4A3672C6C5BE7C33B7219DA854F2BDDFBA668103D754F93FDE
4,550,162 UART: [art] PUB.Y = 4B96F2A35C59389F1EB85F9613A4A52B920189EF97B4030A2ED7C7AF9191D061C4FFBC170A9F7CAE05FD0041F0768A05
4,557,080 UART: [art] SIG.R = F7E267D7DB28F7ECE8FE541878232FA76861DA2982D158272F15116622DEFD3E8A5BA7F49185CFA65045B8159D008444
4,563,828 UART: [art] SIG.S = 8DCCED16DE14E2ACC8F9E9038FAD2D49FB41A78F175A7C1A4D1F19F85BB22C4698FF43791D0535D9A002C7E88A47CEBA
4,587,294 UART: Caliptra RT
4,587,547 UART: [state] CFI Enabled
4,874,806 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Production
85,883 UART: [state] DebugLocked = Yes
86,597 UART: [state] Starting the WD Timer 40000000 cycles
88,220 UART: [kat] SHA2-256
891,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,899 UART: [kat] ++
896,051 UART: [kat] sha1
900,159 UART: [kat] SHA2-256
902,099 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,499 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,174,888 ready_for_fw is high
1,174,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,512 UART: [ldev] ++
1,209,680 UART: [ldev] CDI.KEYID = 6
1,210,044 UART: [ldev] SUBJECT.KEYID = 5
1,210,471 UART: [ldev] AUTHORITY.KEYID = 7
1,210,934 UART: [ldev] FE.KEYID = 1
1,215,954 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,039 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,745 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,757 UART: [ldev] --
1,282,097 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,579 >>> mbox cmd response: success
2,801,673 UART: [afmc] ++
2,801,841 UART: [afmc] CDI.KEYID = 6
2,802,204 UART: [afmc] SUBJECT.KEYID = 7
2,802,630 UART: [afmc] AUTHORITY.KEYID = 5
2,838,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,602 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,321 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,214 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,921 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,716 UART: [afmc] --
2,881,691 UART: [cold-reset] --
2,882,377 UART: [state] Locking Datavault
2,883,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,144 UART: [state] Locking ICCM
2,884,652 UART: [exit] Launching FMC @ 0x40000130
2,889,981 UART:
2,889,997 UART: Running Caliptra FMC ...
2,890,405 UART:
2,890,459 UART: [state] CFI Enabled
2,900,954 UART: [fht] FMC Alias Private Key: 7
3,008,823 UART: [art] Extend RT PCRs Done
3,009,251 UART: [art] Lock RT PCRs Done
3,011,009 UART: [art] Populate DV Done
3,019,325 UART: [fht] FMC Alias Private Key: 7
3,020,393 UART: [art] Derive CDI
3,020,673 UART: [art] Store in in slot 0x4
3,106,440 UART: [art] Derive Key Pair
3,106,800 UART: [art] Store priv key in slot 0x5
3,119,510 UART: [art] Derive Key Pair - Done
3,134,268 UART: [art] Signing Cert with AUTHO
3,134,748 UART: RITY.KEYID = 7
3,150,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,871 UART: [art] PUB.X = 05336EC9F60FCBB63C921DA7BCF9AD421254B1FF50B2E82CA13379268E528DC4E4C5B261C723B872B1917D11C886BCFB
3,157,647 UART: [art] PUB.Y = D48EEDF82740C8257E31AB05D0BE8CB0717619F5BF5E0D57F422CBF53DC0C1FBBED2984E5C192E6BE923602504EC2F16
3,164,604 UART: [art] SIG.R = 5EAEEBB1F92E82365D11CE9FEA8E0F57E487EEF3F93FDCB0A90C31CDFE4AB9C6C6BF9F21076F56BD86A6FD0D4E9E6D7F
3,171,398 UART: [art] SIG.S = BDDB32A3133AE9671F047404FD262D5C548834B62A82B663E365BCE5C7506EEA182FFCF3F22DFDE2A69A6D4BE9412EAA
3,195,071 UART: Caliptra RT
3,195,324 UART: [state] CFI Enabled
3,302,953 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,709 UART:
3,303,725 UART: Running Caliptra ROM ...
3,304,133 UART:
3,304,188 UART: [state] CFI Enabled
3,306,783 UART: [state] LifecycleState = Production
3,307,391 UART: [state] DebugLocked = Yes
3,307,913 UART: [state] Starting the WD Timer 40000000 cycles
3,309,494 UART: [kat] SHA2-256
4,113,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,173 UART: [kat] ++
4,117,325 UART: [kat] sha1
4,121,463 UART: [kat] SHA2-256
4,123,403 UART: [kat] SHA2-384
4,126,090 UART: [kat] SHA2-512-ACC
4,127,991 UART: [kat] ECC-384
4,137,410 UART: [kat] HMAC-384Kdf
4,142,070 UART: [kat] LMS
4,390,382 UART: [kat] --
4,391,290 UART: [warm-reset] ++
4,392,339 UART: [warm-reset] --
4,393,278 UART: [state] Locking Datavault
4,394,156 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,760 UART: [state] Locking ICCM
4,395,278 UART: [exit] Launching FMC @ 0x40000130
4,400,607 UART:
4,400,623 UART: Running Caliptra FMC ...
4,401,031 UART:
4,401,085 UART: [state] CFI Enabled
4,402,236 UART: [aliasrt :skip pcr extension
4,402,709 UART: [art] Extend RT PCRs Done
4,403,137 UART: [art] Lock RT PCRs Done
4,404,290 UART: [art] Populate DV Done
4,412,422 UART: [fht] FMC Alias Private Key: 7
4,413,458 UART: [art] Derive CDI
4,413,738 UART: [art] Store in in slot 0x4
4,499,437 UART: [art] Derive Key Pair
4,499,797 UART: [art] Store priv key in slot 0x5
4,512,859 UART: [art] Derive Key Pair - Done
4,527,865 UART: [art] Signing Cert with AUTHO
4,528,345 UART: RITY.KEYID = 7
4,543,551 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,316 UART: [art] PUB.X = 05336EC9F60FCBB63C921DA7BCF9AD421254B1FF50B2E82CA13379268E528DC4E4C5B261C723B872B1917D11C886BCFB
4,551,092 UART: [art] PUB.Y = D48EEDF82740C8257E31AB05D0BE8CB0717619F5BF5E0D57F422CBF53DC0C1FBBED2984E5C192E6BE923602504EC2F16
4,558,049 UART: [art] SIG.R = 5EAEEBB1F92E82365D11CE9FEA8E0F57E487EEF3F93FDCB0A90C31CDFE4AB9C6C6BF9F21076F56BD86A6FD0D4E9E6D7F
4,564,843 UART: [art] SIG.S = BDDB32A3133AE9671F047404FD262D5C548834B62A82B663E365BCE5C7506EEA182FFCF3F22DFDE2A69A6D4BE9412EAA
4,588,952 UART: Caliptra RT
4,589,205 UART: [state] CFI Enabled
4,871,226 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Production
86,138 UART: [state] DebugLocked = Yes
86,706 UART: [state] Starting the WD Timer 40000000 cycles
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,608 UART: [kat] SHA2-256
902,548 UART: [kat] SHA2-384
905,297 UART: [kat] SHA2-512-ACC
907,198 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,170,991 UART: [fht] FHT @ 0x50003400
1,173,643 UART: [idev] ++
1,173,811 UART: [idev] CDI.KEYID = 6
1,174,172 UART: [idev] SUBJECT.KEYID = 7
1,174,597 UART: [idev] UDS.KEYID = 0
1,174,943 ready_for_fw is high
1,174,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,441 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,404 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,274 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,980 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,002 UART: [ldev] --
1,281,326 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,040 >>> mbox cmd response: success
2,799,224 UART: [afmc] ++
2,799,392 UART: [afmc] CDI.KEYID = 6
2,799,755 UART: [afmc] SUBJECT.KEYID = 7
2,800,181 UART: [afmc] AUTHORITY.KEYID = 5
2,835,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,641 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,360 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,253 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,960 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,825 UART: [afmc] --
2,878,736 UART: [cold-reset] --
2,879,562 UART: [state] Locking Datavault
2,880,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,321 UART: [state] Locking ICCM
2,881,779 UART: [exit] Launching FMC @ 0x40000130
2,887,108 UART:
2,887,124 UART: Running Caliptra FMC ...
2,887,532 UART:
2,887,675 UART: [state] CFI Enabled
2,898,192 UART: [fht] FMC Alias Private Key: 7
3,006,319 UART: [art] Extend RT PCRs Done
3,006,747 UART: [art] Lock RT PCRs Done
3,008,249 UART: [art] Populate DV Done
3,016,399 UART: [fht] FMC Alias Private Key: 7
3,017,441 UART: [art] Derive CDI
3,017,721 UART: [art] Store in in slot 0x4
3,103,242 UART: [art] Derive Key Pair
3,103,602 UART: [art] Store priv key in slot 0x5
3,117,864 UART: [art] Derive Key Pair - Done
3,132,740 UART: [art] Signing Cert with AUTHO
3,133,220 UART: RITY.KEYID = 7
3,148,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,299 UART: [art] PUB.X = 9A490CC8773F10000FF17BF1BF494EA61E68725170F144787CFE3669B43035887B9BC0CEE695DF03ECA9D3D2F6EED1AE
3,156,050 UART: [art] PUB.Y = 9C0763BF87C82FED99CA7F1FC0DD95CE54BC6A8E83C18330069BF8EF47509E5E053A75FAA918C2B0CDFC6F20FBC4F3EF
3,163,017 UART: [art] SIG.R = 1042195F83BE9BEBBE2A1D5B246D8EB13126411E1DB25AD78EAB2BE0A6DF350E19453F371BDCDD1853BCA04BE767A484
3,169,802 UART: [art] SIG.S = E9E0667843B751ED40C0E687CBDEB04237BBC1D0C1CD3C3CF8AF02C58719BC277E102A1446FC851F964C3EA33CC9C03B
3,193,356 UART: Caliptra RT
3,193,701 UART: [state] CFI Enabled
3,302,556 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,312 UART:
3,303,328 UART: Running Caliptra ROM ...
3,303,736 UART:
3,303,878 UART: [state] CFI Enabled
3,307,079 UART: [state] LifecycleState = Production
3,307,687 UART: [state] DebugLocked = Yes
3,308,227 UART: [state] Starting the WD Timer 40000000 cycles
3,309,834 UART: [kat] SHA2-256
4,113,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,513 UART: [kat] ++
4,117,665 UART: [kat] sha1
4,121,727 UART: [kat] SHA2-256
4,123,667 UART: [kat] SHA2-384
4,126,578 UART: [kat] SHA2-512-ACC
4,128,479 UART: [kat] ECC-384
4,138,218 UART: [kat] HMAC-384Kdf
4,142,968 UART: [kat] LMS
4,391,280 UART: [kat] --
4,392,124 UART: [warm-reset] ++
4,393,123 UART: [warm-reset] --
4,394,026 UART: [state] Locking Datavault
4,395,016 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,620 UART: [state] Locking ICCM
4,396,146 UART: [exit] Launching FMC @ 0x40000130
4,401,475 UART:
4,401,491 UART: Running Caliptra FMC ...
4,401,899 UART:
4,402,042 UART: [state] CFI Enabled
4,403,397 UART: [aliasrt :skip pcr extension
4,403,870 UART: [art] Extend RT PCRs Done
4,404,298 UART: [art] Lock RT PCRs Done
4,405,697 UART: [art] Populate DV Done
4,413,909 UART: [fht] FMC Alias Private Key: 7
4,415,087 UART: [art] Derive CDI
4,415,367 UART: [art] Store in in slot 0x4
4,501,168 UART: [art] Derive Key Pair
4,501,528 UART: [art] Store priv key in slot 0x5
4,514,860 UART: [art] Derive Key Pair - Done
4,529,892 UART: [art] Signing Cert with AUTHO
4,530,372 UART: RITY.KEYID = 7
4,545,320 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,085 UART: [art] PUB.X = 9A490CC8773F10000FF17BF1BF494EA61E68725170F144787CFE3669B43035887B9BC0CEE695DF03ECA9D3D2F6EED1AE
4,552,836 UART: [art] PUB.Y = 9C0763BF87C82FED99CA7F1FC0DD95CE54BC6A8E83C18330069BF8EF47509E5E053A75FAA918C2B0CDFC6F20FBC4F3EF
4,559,803 UART: [art] SIG.R = 1042195F83BE9BEBBE2A1D5B246D8EB13126411E1DB25AD78EAB2BE0A6DF350E19453F371BDCDD1853BCA04BE767A484
4,566,588 UART: [art] SIG.S = E9E0667843B751ED40C0E687CBDEB04237BBC1D0C1CD3C3CF8AF02C58719BC277E102A1446FC851F964C3EA33CC9C03B
4,590,466 UART: Caliptra RT
4,590,811 UART: [state] CFI Enabled
4,875,646 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Production
85,920 UART: [state] DebugLocked = Yes
86,540 UART: [state] Starting the WD Timer 40000000 cycles
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,700 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,783 UART: [idev] ++
1,173,951 UART: [idev] CDI.KEYID = 6
1,174,312 UART: [idev] SUBJECT.KEYID = 7
1,174,737 UART: [idev] UDS.KEYID = 0
1,175,083 ready_for_fw is high
1,175,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,479 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,558 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,252 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,122 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,828 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,942 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,133 UART: [fwproc] Recv command 0x46574c44
1,282,866 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,684 >>> mbox cmd response: success
2,799,770 UART: [afmc] ++
2,799,938 UART: [afmc] CDI.KEYID = 6
2,800,301 UART: [afmc] SUBJECT.KEYID = 7
2,800,727 UART: [afmc] AUTHORITY.KEYID = 5
2,836,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,393 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,112 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,005 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,712 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,579 UART: [afmc] --
2,879,706 UART: [cold-reset] --
2,880,438 UART: [state] Locking Datavault
2,881,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,121 UART: [state] Locking ICCM
2,882,741 UART: [exit] Launching FMC @ 0x40000130
2,888,070 UART:
2,888,086 UART: Running Caliptra FMC ...
2,888,494 UART:
2,888,637 UART: [state] CFI Enabled
2,899,244 UART: [fht] FMC Alias Private Key: 7
3,007,267 UART: [art] Extend RT PCRs Done
3,007,695 UART: [art] Lock RT PCRs Done
3,009,617 UART: [art] Populate DV Done
3,017,931 UART: [fht] FMC Alias Private Key: 7
3,019,073 UART: [art] Derive CDI
3,019,353 UART: [art] Store in in slot 0x4
3,105,180 UART: [art] Derive Key Pair
3,105,540 UART: [art] Store priv key in slot 0x5
3,118,484 UART: [art] Derive Key Pair - Done
3,133,182 UART: [art] Signing Cert with AUTHO
3,133,662 UART: RITY.KEYID = 7
3,148,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,495 UART: [art] PUB.X = 7A15F237C81077F4D4FE615C9172E0F7613EB65D74235A58E6696A1F0249AB68F38CA3B926FDC548F91A8F3E99DAEFE7
3,156,270 UART: [art] PUB.Y = 3FC63FAFC3E83CCD3059B7AEB72C869227CD6C8F5C4FF5110763AECF28BBCF55C20F4E3722BC7AF01418532791080136
3,163,220 UART: [art] SIG.R = 4F50A8AC365D20940438DB22F39BDBF409FA57D92B46B8A758077ED6D9D1ADC7D6F9EAEBEEF11B4488A12EC63CF1AEFE
3,170,007 UART: [art] SIG.S = 25C1F2B57ED55F6FF35387A0E0DBDDB1506A2113A2A1F4CFE239B7270778A63F14F944B55A081DE0CA82FF2BF0BC3E7F
3,193,418 UART: Caliptra RT
3,193,763 UART: [state] CFI Enabled
3,301,569 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,325 UART:
3,302,341 UART: Running Caliptra ROM ...
3,302,749 UART:
3,302,891 UART: [state] CFI Enabled
3,305,448 UART: [state] LifecycleState = Production
3,306,056 UART: [state] DebugLocked = Yes
3,306,564 UART: [state] Starting the WD Timer 40000000 cycles
3,308,233 UART: [kat] SHA2-256
4,111,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,912 UART: [kat] ++
4,116,064 UART: [kat] sha1
4,120,236 UART: [kat] SHA2-256
4,122,176 UART: [kat] SHA2-384
4,124,779 UART: [kat] SHA2-512-ACC
4,126,680 UART: [kat] ECC-384
4,136,457 UART: [kat] HMAC-384Kdf
4,141,053 UART: [kat] LMS
4,389,365 UART: [kat] --
4,390,493 UART: [warm-reset] ++
4,391,086 UART: [warm-reset] --
4,391,855 UART: [state] Locking Datavault
4,392,791 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,395 UART: [state] Locking ICCM
4,393,923 UART: [exit] Launching FMC @ 0x40000130
4,399,252 UART:
4,399,268 UART: Running Caliptra FMC ...
4,399,676 UART:
4,399,819 UART: [state] CFI Enabled
4,401,476 UART: [aliasrt :skip pcr extension
4,401,949 UART: [art] Extend RT PCRs Done
4,402,377 UART: [art] Lock RT PCRs Done
4,403,410 UART: [art] Populate DV Done
4,411,848 UART: [fht] FMC Alias Private Key: 7
4,412,898 UART: [art] Derive CDI
4,413,178 UART: [art] Store in in slot 0x4
4,499,193 UART: [art] Derive Key Pair
4,499,553 UART: [art] Store priv key in slot 0x5
4,512,627 UART: [art] Derive Key Pair - Done
4,527,435 UART: [art] Signing Cert with AUTHO
4,527,915 UART: RITY.KEYID = 7
4,543,135 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,900 UART: [art] PUB.X = 7A15F237C81077F4D4FE615C9172E0F7613EB65D74235A58E6696A1F0249AB68F38CA3B926FDC548F91A8F3E99DAEFE7
4,550,675 UART: [art] PUB.Y = 3FC63FAFC3E83CCD3059B7AEB72C869227CD6C8F5C4FF5110763AECF28BBCF55C20F4E3722BC7AF01418532791080136
4,557,625 UART: [art] SIG.R = 4F50A8AC365D20940438DB22F39BDBF409FA57D92B46B8A758077ED6D9D1ADC7D6F9EAEBEEF11B4488A12EC63CF1AEFE
4,564,412 UART: [art] SIG.S = 25C1F2B57ED55F6FF35387A0E0DBDDB1506A2113A2A1F4CFE239B7270778A63F14F944B55A081DE0CA82FF2BF0BC3E7F
4,587,661 UART: Caliptra RT
4,588,006 UART: [state] CFI Enabled
4,873,600 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,787 UART: [state] LifecycleState = Production
85,395 UART: [state] DebugLocked = Yes
85,933 UART: [state] Starting the WD Timer 40000000 cycles
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 ready_for_fw is high
1,174,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,130 UART: [idev] Sha1 KeyId Algorithm
1,206,965 UART: [idev] --
1,207,860 UART: [ldev] ++
1,208,028 UART: [ldev] CDI.KEYID = 6
1,208,392 UART: [ldev] SUBJECT.KEYID = 5
1,208,819 UART: [ldev] AUTHORITY.KEYID = 7
1,209,282 UART: [ldev] FE.KEYID = 1
1,214,198 UART: [ldev] Erasing FE.KEYID = 1
1,240,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,187 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,881 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,751 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,457 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,699 UART: [ldev] --
1,280,019 UART: [fwproc] Wait for Commands...
1,280,596 UART: [fwproc] Recv command 0x46574c44
1,281,329 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,505 >>> mbox cmd response: success
2,799,665 UART: [afmc] ++
2,799,833 UART: [afmc] CDI.KEYID = 6
2,800,196 UART: [afmc] SUBJECT.KEYID = 7
2,800,622 UART: [afmc] AUTHORITY.KEYID = 5
2,836,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,430 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,149 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,042 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,749 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,710 UART: [afmc] --
2,879,719 UART: [cold-reset] --
2,880,605 UART: [state] Locking Datavault
2,881,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,144 UART: [state] Locking ICCM
2,882,606 UART: [exit] Launching FMC @ 0x40000130
2,887,935 UART:
2,887,951 UART: Running Caliptra FMC ...
2,888,359 UART:
2,888,413 UART: [state] CFI Enabled
2,899,376 UART: [fht] FMC Alias Private Key: 7
3,006,583 UART: [art] Extend RT PCRs Done
3,007,011 UART: [art] Lock RT PCRs Done
3,008,327 UART: [art] Populate DV Done
3,016,607 UART: [fht] FMC Alias Private Key: 7
3,017,641 UART: [art] Derive CDI
3,017,921 UART: [art] Store in in slot 0x4
3,103,726 UART: [art] Derive Key Pair
3,104,086 UART: [art] Store priv key in slot 0x5
3,116,938 UART: [art] Derive Key Pair - Done
3,132,245 UART: [art] Signing Cert with AUTHO
3,132,725 UART: RITY.KEYID = 7
3,148,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,770 UART: [art] PUB.X = 8E3B5C84425BF0827D63120A6B459FDFA3CCD3D4497088CC89B01871068B242D6D7E74A7B94D2180D769D3D8414BB0A6
3,155,536 UART: [art] PUB.Y = 35AB3E84EE6431DE94FF8906E667F551FCF3A725624994E1C8F23C9F0F3FE69E49865CFA8F9D162365C454EFA3899B20
3,162,486 UART: [art] SIG.R = 7F00C521D0DE5E5C47DEEAC04847CCA33A6F26B502569CDC16C68BDB736F24BCBFD8C6DB6469EDD812DBE56DB10CA947
3,169,254 UART: [art] SIG.S = 1D8798AF4A47BBC53E5C4D794BB579A12030A5BDE872ED7992FA98FE89F92B8F4B2383B4E0D04E9810AE2959673170D0
3,192,381 UART: Caliptra RT
3,192,634 UART: [state] CFI Enabled
3,300,482 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,238 UART:
3,301,254 UART: Running Caliptra ROM ...
3,301,662 UART:
3,301,717 UART: [state] CFI Enabled
3,304,298 UART: [state] LifecycleState = Production
3,304,906 UART: [state] DebugLocked = Yes
3,305,562 UART: [state] Starting the WD Timer 40000000 cycles
3,307,187 UART: [kat] SHA2-256
4,110,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,866 UART: [kat] ++
4,115,018 UART: [kat] sha1
4,119,250 UART: [kat] SHA2-256
4,121,190 UART: [kat] SHA2-384
4,124,077 UART: [kat] SHA2-512-ACC
4,125,978 UART: [kat] ECC-384
4,135,419 UART: [kat] HMAC-384Kdf
4,139,981 UART: [kat] LMS
4,388,293 UART: [kat] --
4,389,505 UART: [warm-reset] ++
4,390,424 UART: [warm-reset] --
4,391,253 UART: [state] Locking Datavault
4,392,049 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,653 UART: [state] Locking ICCM
4,393,277 UART: [exit] Launching FMC @ 0x40000130
4,398,606 UART:
4,398,622 UART: Running Caliptra FMC ...
4,399,030 UART:
4,399,084 UART: [state] CFI Enabled
4,400,367 UART: [aliasrt :skip pcr extension
4,400,840 UART: [art] Extend RT PCRs Done
4,401,268 UART: [art] Lock RT PCRs Done
4,402,611 UART: [art] Populate DV Done
4,410,839 UART: [fht] FMC Alias Private Key: 7
4,411,953 UART: [art] Derive CDI
4,412,233 UART: [art] Store in in slot 0x4
4,497,830 UART: [art] Derive Key Pair
4,498,190 UART: [art] Store priv key in slot 0x5
4,511,578 UART: [art] Derive Key Pair - Done
4,526,437 UART: [art] Signing Cert with AUTHO
4,526,917 UART: RITY.KEYID = 7
4,542,529 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,294 UART: [art] PUB.X = 8E3B5C84425BF0827D63120A6B459FDFA3CCD3D4497088CC89B01871068B242D6D7E74A7B94D2180D769D3D8414BB0A6
4,550,060 UART: [art] PUB.Y = 35AB3E84EE6431DE94FF8906E667F551FCF3A725624994E1C8F23C9F0F3FE69E49865CFA8F9D162365C454EFA3899B20
4,557,010 UART: [art] SIG.R = 7F00C521D0DE5E5C47DEEAC04847CCA33A6F26B502569CDC16C68BDB736F24BCBFD8C6DB6469EDD812DBE56DB10CA947
4,563,778 UART: [art] SIG.S = 1D8798AF4A47BBC53E5C4D794BB579A12030A5BDE872ED7992FA98FE89F92B8F4B2383B4E0D04E9810AE2959673170D0
4,587,855 UART: Caliptra RT
4,588,108 UART: [state] CFI Enabled
4,866,846 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Production
85,789 UART: [state] DebugLocked = Yes
86,395 UART: [state] Starting the WD Timer 40000000 cycles
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,304 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 ready_for_fw is high
1,174,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,438 UART: [ldev] ++
1,209,606 UART: [ldev] CDI.KEYID = 6
1,209,970 UART: [ldev] SUBJECT.KEYID = 5
1,210,397 UART: [ldev] AUTHORITY.KEYID = 7
1,210,860 UART: [ldev] FE.KEYID = 1
1,215,968 UART: [ldev] Erasing FE.KEYID = 1
1,242,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,415 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,285 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,991 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,995 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,683 >>> mbox cmd response: success
2,798,843 UART: [afmc] ++
2,799,011 UART: [afmc] CDI.KEYID = 6
2,799,374 UART: [afmc] SUBJECT.KEYID = 7
2,799,800 UART: [afmc] AUTHORITY.KEYID = 5
2,835,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,262 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,981 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,874 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,581 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,434 UART: [afmc] --
2,878,365 UART: [cold-reset] --
2,878,905 UART: [state] Locking Datavault
2,880,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,710 UART: [state] Locking ICCM
2,881,144 UART: [exit] Launching FMC @ 0x40000130
2,886,473 UART:
2,886,489 UART: Running Caliptra FMC ...
2,886,897 UART:
2,886,951 UART: [state] CFI Enabled
2,897,206 UART: [fht] FMC Alias Private Key: 7
3,005,087 UART: [art] Extend RT PCRs Done
3,005,515 UART: [art] Lock RT PCRs Done
3,007,049 UART: [art] Populate DV Done
3,015,237 UART: [fht] FMC Alias Private Key: 7
3,016,301 UART: [art] Derive CDI
3,016,581 UART: [art] Store in in slot 0x4
3,102,194 UART: [art] Derive Key Pair
3,102,554 UART: [art] Store priv key in slot 0x5
3,115,962 UART: [art] Derive Key Pair - Done
3,130,994 UART: [art] Signing Cert with AUTHO
3,131,474 UART: RITY.KEYID = 7
3,146,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,537 UART: [art] PUB.X = C5F165A74B982F9D6E06ECDBA036C538EE1BCFB393DCD85F988329C7A2B1B9566B9C4A0BA8BB6260B8BB452D496739D3
3,154,317 UART: [art] PUB.Y = E06A3C2F84266DA0DEFCCDCFC4E7960A34F7770A512FA8A47C0BBBBAB930EF9D2F0266692D65AD6A25C828898DC0CE1F
3,161,279 UART: [art] SIG.R = 8005F07FDFF01E81CD16FE554DE568FC3C2F59BB75FA80CE5B9745CF0352F6BBDED34FEFE027F13814C2FE01322F7DD2
3,168,062 UART: [art] SIG.S = 708794799E1262D5CFCACA87C140A162EEE33B6657B754C3AB3700017DA24CFF753DB4B8E69CD24FA4B3BC3E2D751D20
3,192,202 UART: Caliptra RT
3,192,455 UART: [state] CFI Enabled
3,300,564 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,320 UART:
3,301,336 UART: Running Caliptra ROM ...
3,301,744 UART:
3,301,799 UART: [state] CFI Enabled
3,304,586 UART: [state] LifecycleState = Production
3,305,194 UART: [state] DebugLocked = Yes
3,305,772 UART: [state] Starting the WD Timer 40000000 cycles
3,307,267 UART: [kat] SHA2-256
4,110,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,946 UART: [kat] ++
4,115,098 UART: [kat] sha1
4,119,368 UART: [kat] SHA2-256
4,121,308 UART: [kat] SHA2-384
4,123,999 UART: [kat] SHA2-512-ACC
4,125,900 UART: [kat] ECC-384
4,135,817 UART: [kat] HMAC-384Kdf
4,140,421 UART: [kat] LMS
4,388,733 UART: [kat] --
4,389,847 UART: [warm-reset] ++
4,390,942 UART: [warm-reset] --
4,391,713 UART: [state] Locking Datavault
4,392,551 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,155 UART: [state] Locking ICCM
4,393,657 UART: [exit] Launching FMC @ 0x40000130
4,398,986 UART:
4,399,002 UART: Running Caliptra FMC ...
4,399,410 UART:
4,399,464 UART: [state] CFI Enabled
4,400,707 UART: [aliasrt :skip pcr extension
4,401,180 UART: [art] Extend RT PCRs Done
4,401,608 UART: [art] Lock RT PCRs Done
4,403,015 UART: [art] Populate DV Done
4,411,349 UART: [fht] FMC Alias Private Key: 7
4,412,491 UART: [art] Derive CDI
4,412,771 UART: [art] Store in in slot 0x4
4,498,294 UART: [art] Derive Key Pair
4,498,654 UART: [art] Store priv key in slot 0x5
4,512,216 UART: [art] Derive Key Pair - Done
4,526,824 UART: [art] Signing Cert with AUTHO
4,527,304 UART: RITY.KEYID = 7
4,542,476 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,241 UART: [art] PUB.X = C5F165A74B982F9D6E06ECDBA036C538EE1BCFB393DCD85F988329C7A2B1B9566B9C4A0BA8BB6260B8BB452D496739D3
4,550,021 UART: [art] PUB.Y = E06A3C2F84266DA0DEFCCDCFC4E7960A34F7770A512FA8A47C0BBBBAB930EF9D2F0266692D65AD6A25C828898DC0CE1F
4,556,983 UART: [art] SIG.R = 8005F07FDFF01E81CD16FE554DE568FC3C2F59BB75FA80CE5B9745CF0352F6BBDED34FEFE027F13814C2FE01322F7DD2
4,563,766 UART: [art] SIG.S = 708794799E1262D5CFCACA87C140A162EEE33B6657B754C3AB3700017DA24CFF753DB4B8E69CD24FA4B3BC3E2D751D20
4,587,020 UART: Caliptra RT
4,587,273 UART: [state] CFI Enabled
4,868,190 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Production
86,246 UART: [state] DebugLocked = Yes
86,956 UART: [state] Starting the WD Timer 40000000 cycles
88,465 UART: [kat] SHA2-256
892,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,144 UART: [kat] ++
896,296 UART: [kat] sha1
900,566 UART: [kat] SHA2-256
902,506 UART: [kat] SHA2-384
905,287 UART: [kat] SHA2-512-ACC
907,188 UART: [kat] ECC-384
917,285 UART: [kat] HMAC-384Kdf
921,967 UART: [kat] LMS
1,170,279 UART: [kat] --
1,171,172 UART: [cold-reset] ++
1,171,519 UART: [fht] FHT @ 0x50003400
1,174,293 UART: [idev] ++
1,174,461 UART: [idev] CDI.KEYID = 6
1,174,822 UART: [idev] SUBJECT.KEYID = 7
1,175,247 UART: [idev] UDS.KEYID = 0
1,175,593 ready_for_fw is high
1,175,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,175 UART: [idev] Sha1 KeyId Algorithm
1,209,112 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,767 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,272 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,490 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,785 UART: [fwproc] Recv command 0x46574c44
1,284,518 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,386 >>> mbox cmd response: success
2,801,552 UART: [afmc] ++
2,801,720 UART: [afmc] CDI.KEYID = 6
2,802,083 UART: [afmc] SUBJECT.KEYID = 7
2,802,509 UART: [afmc] AUTHORITY.KEYID = 5
2,837,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,983 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,702 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,595 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,302 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,287 UART: [afmc] --
2,881,394 UART: [cold-reset] --
2,882,212 UART: [state] Locking Datavault
2,883,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,909 UART: [state] Locking ICCM
2,884,543 UART: [exit] Launching FMC @ 0x40000130
2,889,872 UART:
2,889,888 UART: Running Caliptra FMC ...
2,890,296 UART:
2,890,439 UART: [state] CFI Enabled
2,901,126 UART: [fht] FMC Alias Private Key: 7
3,008,759 UART: [art] Extend RT PCRs Done
3,009,187 UART: [art] Lock RT PCRs Done
3,010,773 UART: [art] Populate DV Done
3,019,013 UART: [fht] FMC Alias Private Key: 7
3,019,979 UART: [art] Derive CDI
3,020,259 UART: [art] Store in in slot 0x4
3,105,978 UART: [art] Derive Key Pair
3,106,338 UART: [art] Store priv key in slot 0x5
3,120,380 UART: [art] Derive Key Pair - Done
3,135,281 UART: [art] Signing Cert with AUTHO
3,135,761 UART: RITY.KEYID = 7
3,150,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,546 UART: [art] PUB.X = 7C89461FEFF81AFA74E25BDEDB0955ED72E7CE9AB1BAE60BBE9CB1F480924F99D4035360A126AA12BF9A33224B03A083
3,158,322 UART: [art] PUB.Y = 25EC8705A7D9D711C5B2A0029B93ABA42D3EA1E0A1B3BE743031210B90A6B9C81617F5295DAEB63B4A4F965C3E2978B0
3,165,271 UART: [art] SIG.R = 107A74AC6AA1D9F1607414EEF4D1AFAE3EBEEB48F0FB1BB3B2C5F52BC2DB3A5500843D7C665617B0B95DB6E1B1A5C2FF
3,172,047 UART: [art] SIG.S = 25E3080CF2947E9A98D77D21B6463C980A211E916AD8D886726CF6AB45B1436E4F75F74289E01EC1AD38AD3929654799
3,195,983 UART: Caliptra RT
3,196,328 UART: [state] CFI Enabled
3,303,666 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,422 UART:
3,304,438 UART: Running Caliptra ROM ...
3,304,846 UART:
3,304,988 UART: [state] CFI Enabled
3,307,593 UART: [state] LifecycleState = Production
3,308,201 UART: [state] DebugLocked = Yes
3,308,723 UART: [state] Starting the WD Timer 40000000 cycles
3,310,212 UART: [kat] SHA2-256
4,113,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,891 UART: [kat] ++
4,118,043 UART: [kat] sha1
4,122,223 UART: [kat] SHA2-256
4,124,163 UART: [kat] SHA2-384
4,126,844 UART: [kat] SHA2-512-ACC
4,128,745 UART: [kat] ECC-384
4,138,806 UART: [kat] HMAC-384Kdf
4,143,394 UART: [kat] LMS
4,391,706 UART: [kat] --
4,392,374 UART: [warm-reset] ++
4,392,927 UART: [warm-reset] --
4,393,726 UART: [state] Locking Datavault
4,394,658 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,262 UART: [state] Locking ICCM
4,395,682 UART: [exit] Launching FMC @ 0x40000130
4,401,011 UART:
4,401,027 UART: Running Caliptra FMC ...
4,401,435 UART:
4,401,578 UART: [state] CFI Enabled
4,403,145 UART: [aliasrt :skip pcr extension
4,403,618 UART: [art] Extend RT PCRs Done
4,404,046 UART: [art] Lock RT PCRs Done
4,405,417 UART: [art] Populate DV Done
4,413,595 UART: [fht] FMC Alias Private Key: 7
4,414,557 UART: [art] Derive CDI
4,414,837 UART: [art] Store in in slot 0x4
4,500,510 UART: [art] Derive Key Pair
4,500,870 UART: [art] Store priv key in slot 0x5
4,514,250 UART: [art] Derive Key Pair - Done
4,529,525 UART: [art] Signing Cert with AUTHO
4,530,005 UART: RITY.KEYID = 7
4,545,141 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,906 UART: [art] PUB.X = 7C89461FEFF81AFA74E25BDEDB0955ED72E7CE9AB1BAE60BBE9CB1F480924F99D4035360A126AA12BF9A33224B03A083
4,552,682 UART: [art] PUB.Y = 25EC8705A7D9D711C5B2A0029B93ABA42D3EA1E0A1B3BE743031210B90A6B9C81617F5295DAEB63B4A4F965C3E2978B0
4,559,631 UART: [art] SIG.R = 107A74AC6AA1D9F1607414EEF4D1AFAE3EBEEB48F0FB1BB3B2C5F52BC2DB3A5500843D7C665617B0B95DB6E1B1A5C2FF
4,566,407 UART: [art] SIG.S = 25E3080CF2947E9A98D77D21B6463C980A211E916AD8D886726CF6AB45B1436E4F75F74289E01EC1AD38AD3929654799
4,590,251 UART: Caliptra RT
4,590,596 UART: [state] CFI Enabled
4,875,872 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Production
85,874 UART: [state] DebugLocked = Yes
86,430 UART: [state] Starting the WD Timer 40000000 cycles
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,296 UART: [kat] SHA2-256
902,236 UART: [kat] SHA2-384
905,127 UART: [kat] SHA2-512-ACC
907,028 UART: [kat] ECC-384
917,007 UART: [kat] HMAC-384Kdf
921,575 UART: [kat] LMS
1,169,887 UART: [kat] --
1,170,824 UART: [cold-reset] ++
1,171,157 UART: [fht] FHT @ 0x50003400
1,173,821 UART: [idev] ++
1,173,989 UART: [idev] CDI.KEYID = 6
1,174,350 UART: [idev] SUBJECT.KEYID = 7
1,174,775 UART: [idev] UDS.KEYID = 0
1,175,121 ready_for_fw is high
1,175,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,164 UART: [idev] Erasing UDS.KEYID = 0
1,200,389 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,055 UART: [ldev] SUBJECT.KEYID = 5
1,211,482 UART: [ldev] AUTHORITY.KEYID = 7
1,211,945 UART: [ldev] FE.KEYID = 1
1,217,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,792 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,486 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,356 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,062 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,168 UART: [ldev] --
1,282,600 UART: [fwproc] Wait for Commands...
1,283,369 UART: [fwproc] Recv command 0x46574c44
1,284,102 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,452 >>> mbox cmd response: success
2,801,686 UART: [afmc] ++
2,801,854 UART: [afmc] CDI.KEYID = 6
2,802,217 UART: [afmc] SUBJECT.KEYID = 7
2,802,643 UART: [afmc] AUTHORITY.KEYID = 5
2,838,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,856,037 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,756 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,649 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,356 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,211 UART: [afmc] --
2,882,182 UART: [cold-reset] --
2,883,240 UART: [state] Locking Datavault
2,884,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,885,303 UART: [state] Locking ICCM
2,885,753 UART: [exit] Launching FMC @ 0x40000130
2,891,082 UART:
2,891,098 UART: Running Caliptra FMC ...
2,891,506 UART:
2,891,649 UART: [state] CFI Enabled
2,902,594 UART: [fht] FMC Alias Private Key: 7
3,010,823 UART: [art] Extend RT PCRs Done
3,011,251 UART: [art] Lock RT PCRs Done
3,012,681 UART: [art] Populate DV Done
3,020,747 UART: [fht] FMC Alias Private Key: 7
3,021,899 UART: [art] Derive CDI
3,022,179 UART: [art] Store in in slot 0x4
3,107,838 UART: [art] Derive Key Pair
3,108,198 UART: [art] Store priv key in slot 0x5
3,121,656 UART: [art] Derive Key Pair - Done
3,136,503 UART: [art] Signing Cert with AUTHO
3,136,983 UART: RITY.KEYID = 7
3,152,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,152,916 UART: [art] PUB.X = E62033C3CFA92FD816923C09687B5E18B6A05263683C112F0C8D4B1000AA3652E4D380F925807E472B1362FBE3A2355D
3,159,654 UART: [art] PUB.Y = E5B96B8AD54BEC0247C3757237AEF0E976FDA43952076FA3596339CDA5133C309149F90EC6EB0F5D7F3A523661BF91BF
3,166,600 UART: [art] SIG.R = 698FCB18CC7E50C21D59EBE5BFDB8859D94D2CD24265F2B45B5F6C61854CDF945D548EE881A99970D7A2D0863296FEF6
3,173,382 UART: [art] SIG.S = BAFE6AB049C24068C2CFC7CA65F5E339EED6C8028294087339D45CDBEABE2941F31A43B8A33755BD817015DB80E715C1
3,197,199 UART: Caliptra RT
3,197,544 UART: [state] CFI Enabled
3,304,943 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,699 UART:
3,305,715 UART: Running Caliptra ROM ...
3,306,123 UART:
3,306,265 UART: [state] CFI Enabled
3,308,858 UART: [state] LifecycleState = Production
3,309,466 UART: [state] DebugLocked = Yes
3,310,042 UART: [state] Starting the WD Timer 40000000 cycles
3,311,663 UART: [kat] SHA2-256
4,115,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,342 UART: [kat] ++
4,119,494 UART: [kat] sha1
4,123,660 UART: [kat] SHA2-256
4,125,600 UART: [kat] SHA2-384
4,128,193 UART: [kat] SHA2-512-ACC
4,130,094 UART: [kat] ECC-384
4,140,201 UART: [kat] HMAC-384Kdf
4,144,859 UART: [kat] LMS
4,393,171 UART: [kat] --
4,393,959 UART: [warm-reset] ++
4,394,674 UART: [warm-reset] --
4,395,211 UART: [state] Locking Datavault
4,396,089 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,693 UART: [state] Locking ICCM
4,397,113 UART: [exit] Launching FMC @ 0x40000130
4,402,442 UART:
4,402,458 UART: Running Caliptra FMC ...
4,402,866 UART:
4,403,009 UART: [state] CFI Enabled
4,404,366 UART: [aliasrt :skip pcr extension
4,404,839 UART: [art] Extend RT PCRs Done
4,405,267 UART: [art] Lock RT PCRs Done
4,406,520 UART: [art] Populate DV Done
4,414,910 UART: [fht] FMC Alias Private Key: 7
4,416,042 UART: [art] Derive CDI
4,416,322 UART: [art] Store in in slot 0x4
4,502,241 UART: [art] Derive Key Pair
4,502,601 UART: [art] Store priv key in slot 0x5
4,516,545 UART: [art] Derive Key Pair - Done
4,531,510 UART: [art] Signing Cert with AUTHO
4,531,990 UART: RITY.KEYID = 7
4,547,566 UART: [art] Erasing AUTHORITY.KEYID = 7
4,548,331 UART: [art] PUB.X = E62033C3CFA92FD816923C09687B5E18B6A05263683C112F0C8D4B1000AA3652E4D380F925807E472B1362FBE3A2355D
4,555,069 UART: [art] PUB.Y = E5B96B8AD54BEC0247C3757237AEF0E976FDA43952076FA3596339CDA5133C309149F90EC6EB0F5D7F3A523661BF91BF
4,562,015 UART: [art] SIG.R = 698FCB18CC7E50C21D59EBE5BFDB8859D94D2CD24265F2B45B5F6C61854CDF945D548EE881A99970D7A2D0863296FEF6
4,568,797 UART: [art] SIG.S = BAFE6AB049C24068C2CFC7CA65F5E339EED6C8028294087339D45CDBEABE2941F31A43B8A33755BD817015DB80E715C1
4,592,370 UART: Caliptra RT
4,592,715 UART: [state] CFI Enabled
4,877,088 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
191,621 UART:
192,005 UART: Running Caliptra ROM ...
193,197 UART:
193,353 UART: [state] CFI Enabled
261,483 UART: [state] LifecycleState = Unprovisioned
263,912 UART: [state] DebugLocked = Yes
265,378 UART: [state] Starting the WD Timer 1000000 cycles
269,860 UART: [kat] SHA2-256
451,827 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,354 UART: [kat] ++
463,955 UART: [kat] sha1
475,881 UART: [kat] SHA2-256
478,882 UART: [kat] SHA2-384
483,497 UART: [kat] SHA2-512-ACC
486,107 UART: [kat] ECC-384
1,269,395 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,277,062 UART: WDT Expired
1,277,634 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C4E ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
192,312 UART:
192,678 UART: Running Caliptra ROM ...
193,872 UART:
603,548 UART: [state] CFI Enabled
618,308 UART: [state] LifecycleState = Unprovisioned
620,662 UART: [state] DebugLocked = Yes
622,720 UART: [state] Starting the WD Timer 1000000 cycles
626,995 UART: [kat] SHA2-256
808,986 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,532 UART: [kat] ++
821,045 UART: [kat] sha1
832,300 UART: [kat] SHA2-256
835,300 UART: [kat] SHA2-384
840,993 UART: [kat] SHA2-512-ACC
843,604 UART: [kat] ECC-384
1,626,766 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D0E ra=0x00008CFA error_internal_intr_r=00000040
1,634,415 UART: WDT Expired
1,634,980 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D0E ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C54 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
191,560 UART:
191,958 UART: Running Caliptra ROM ...
193,077 UART:
193,229 UART: [state] CFI Enabled
264,522 UART: [state] LifecycleState = Unprovisioned
266,391 UART: [state] DebugLocked = Yes
268,793 UART: [state] Starting the WD Timer 1000000 cycles
273,356 UART: [kat] SHA2-256
452,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,069 UART: [kat] ++
464,627 UART: [kat] sha1
476,317 UART: [kat] SHA2-256
479,317 UART: [kat] SHA2-384
484,055 UART: [kat] SHA2-512-ACC
486,990 UART: [kat] ECC-384
1,272,326 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
1,279,288 UART: WDT Expired
1,279,853 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008072 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
191,913 UART:
192,289 UART: Running Caliptra ROM ...
193,410 UART:
603,002 UART: [state] CFI Enabled
618,709 UART: [state] LifecycleState = Unprovisioned
620,569 UART: [state] DebugLocked = Yes
622,306 UART: [state] Starting the WD Timer 1000000 cycles
627,433 UART: [kat] SHA2-256
806,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,155 UART: [kat] ++
818,706 UART: [kat] sha1
829,153 UART: [kat] SHA2-256
832,168 UART: [kat] SHA2-384
837,158 UART: [kat] SHA2-512-ACC
840,149 UART: [kat] ECC-384
1,625,900 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
1,632,886 UART: WDT Expired
1,633,458 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008062 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
191,738 UART:
192,103 UART: Running Caliptra ROM ...
193,290 UART:
193,457 UART: [state] CFI Enabled
263,295 UART: [state] LifecycleState = Unprovisioned
265,166 UART: [state] DebugLocked = Yes
267,404 UART: [state] Starting the WD Timer 1000000 cycles
271,797 UART: [kat] SHA2-256
450,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,501 UART: [kat] ++
463,047 UART: [kat] sha1
474,649 UART: [kat] SHA2-256
477,695 UART: [kat] SHA2-384
482,169 UART: [kat] SHA2-512-ACC
485,157 UART: [kat] ECC-384
1,270,948 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,277,958 UART: WDT Expired
1,278,539 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,859 UART:
192,223 UART: Running Caliptra ROM ...
193,406 UART:
602,967 UART: [state] CFI Enabled
617,380 UART: [state] LifecycleState = Unprovisioned
619,232 UART: [state] DebugLocked = Yes
622,129 UART: [state] Starting the WD Timer 1000000 cycles
627,097 UART: [kat] SHA2-256
806,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,801 UART: [kat] ++
818,264 UART: [kat] sha1
829,137 UART: [kat] SHA2-256
832,194 UART: [kat] SHA2-384
838,863 UART: [kat] SHA2-512-ACC
841,843 UART: [kat] ECC-384
1,625,707 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
1,632,700 UART: WDT Expired
1,633,271 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = Yes
86,573 UART: [state] Starting the WD Timer 1000000 cycles
88,182 UART: [kat] SHA2-256
891,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,861 UART: [kat] ++
896,013 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
905,018 UART: [kat] SHA2-512-ACC
906,919 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,886 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C4 ra=0x00008150 error_internal_intr_r=00000040
1,090,327 UART: WDT Expired
1,090,536 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C4 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007862 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = Yes
86,588 UART: [state] Starting the WD Timer 1000000 cycles
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,901 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079D4 ra=0x00008150 error_internal_intr_r=00000040
1,090,342 UART: WDT Expired
1,090,551 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079D4 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CC ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = Yes
86,583 UART: [state] Starting the WD Timer 1000000 cycles
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,896 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000813A ra=0x00008150 error_internal_intr_r=00000040
1,090,337 UART: WDT Expired
1,090,546 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000813A ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007826 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = Yes
86,562 UART: [state] Starting the WD Timer 1000000 cycles
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,875 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
1,090,314 UART: WDT Expired
1,090,523 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CA ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,859 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = Yes
86,181 UART: [state] Starting the WD Timer 1000000 cycles
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,234 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,494 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2A6 ra=0x00008132 error_internal_intr_r=00000040
1,089,937 UART: WDT Expired
1,090,146 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2A6 ra=0x00008132 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = Yes
87,050 UART: [state] Starting the WD Timer 1000000 cycles
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,534 UART: [kat] SHA2-256
902,474 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
917,019 UART: [kat] HMAC-384Kdf
921,711 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,363 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
1,090,802 UART: WDT Expired
1,091,011 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000782A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
191,602 UART:
191,977 UART: Running Caliptra ROM ...
193,049 UART:
193,201 UART: [state] CFI Enabled
265,470 UART: [state] LifecycleState = Unprovisioned
267,890 UART: [state] DebugLocked = Yes
269,857 UART: [state] Starting the WD Timer 40000000 cycles
275,226 UART: [kat] SHA2-256
457,231 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,726 UART: [kat] ++
469,336 UART: [kat] sha1
479,591 UART: [kat] SHA2-256
482,614 UART: [kat] SHA2-384
489,169 UART: [kat] SHA2-512-ACC
491,790 UART: [kat] ECC-384
3,775,758 UART: [kat] HMAC-384Kdf
3,801,519 UART: [kat] LMS
4,874,688 UART: [kat] --
4,878,844 UART: [cold-reset] ++
4,881,678 UART: [fht] FHT @ 0x50003400
4,893,234 UART: [idev] ++
4,893,948 UART: [idev] CDI.KEYID = 6
4,895,124 UART: [idev] SUBJECT.KEYID = 7
4,896,288 UART: [idev] UDS.KEYID = 0
4,899,427 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,040,266 UART: [idev] Erasing UDS.KEYID = 0
8,241,416 UART: [idev] Sha1 KeyId Algorithm
8,262,385 UART: [idev] --
8,265,340 UART: [ldev] ++
8,265,919 UART: [ldev] CDI.KEYID = 6
8,267,103 UART: [ldev] SUBJECT.KEYID = 5
8,268,277 UART: [ldev] AUTHORITY.KEYID = 7
8,269,380 UART: [ldev] FE.KEYID = 1
8,316,070 UART: [ldev] Erasing FE.KEYID = 1
11,650,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,299 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,978,641 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,994,652 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,010,760 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,032,172 UART: [ldev] --
14,037,079 UART: [fwproc] Wait for Commands...
14,040,052 UART: [fwproc] Recv command 0x46574c44
14,042,372 UART: [fwproc] Recv'd Img size: 111688 bytes
18,086,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,162,124 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,222,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,539,653 >>> mbox cmd response: success
18,544,399 UART: [afmc] ++
18,545,012 UART: [afmc] CDI.KEYID = 6
18,546,257 UART: [afmc] SUBJECT.KEYID = 7
18,547,410 UART: [afmc] AUTHORITY.KEYID = 5
21,900,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,198,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,200,978 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,217,190 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,233,292 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,249,381 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,272,192 UART: [afmc] --
24,276,639 UART: [cold-reset] --
24,280,393 UART: [state] Locking Datavault
24,284,588 UART: [state] Locking PCR0, PCR1 and PCR31
24,286,295 UART: [state] Locking ICCM
24,288,789 UART: [exit] Launching FMC @ 0x40000000
24,297,423 UART:
24,297,665 UART: Running Caliptra FMC ...
24,298,805 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
4,785,724 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,332,069 >>> mbox cmd response: success
24,035,215 UART:
24,035,598 UART: Running Caliptra FMC ...
24,036,814 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
191,955 UART:
192,324 UART: Running Caliptra ROM ...
193,448 UART:
603,153 UART: [state] CFI Enabled
613,215 UART: [state] LifecycleState = Unprovisioned
615,582 UART: [state] DebugLocked = Yes
617,382 UART: [state] Starting the WD Timer 40000000 cycles
622,288 UART: [kat] SHA2-256
804,292 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,817 UART: [kat] ++
816,440 UART: [kat] sha1
827,560 UART: [kat] SHA2-256
830,616 UART: [kat] SHA2-384
836,465 UART: [kat] SHA2-512-ACC
839,074 UART: [kat] ECC-384
4,096,306 UART: [kat] HMAC-384Kdf
4,108,065 UART: [kat] LMS
5,181,260 UART: [kat] --
5,184,792 UART: [cold-reset] ++
5,187,483 UART: [fht] FHT @ 0x50003400
5,199,937 UART: [idev] ++
5,200,677 UART: [idev] CDI.KEYID = 6
5,201,846 UART: [idev] SUBJECT.KEYID = 7
5,203,304 UART: [idev] UDS.KEYID = 0
5,206,662 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,347,178 UART: [idev] Erasing UDS.KEYID = 0
8,488,219 UART: [idev] Sha1 KeyId Algorithm
8,511,080 UART: [idev] --
8,515,804 UART: [ldev] ++
8,516,374 UART: [ldev] CDI.KEYID = 6
8,517,610 UART: [ldev] SUBJECT.KEYID = 5
8,518,711 UART: [ldev] AUTHORITY.KEYID = 7
8,519,936 UART: [ldev] FE.KEYID = 1
8,531,013 UART: [ldev] Erasing FE.KEYID = 1
11,820,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,948 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,128,267 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,144,267 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,160,359 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,180,595 UART: [ldev] --
14,184,502 UART: [fwproc] Wait for Commands...
14,186,321 UART: [fwproc] Recv command 0x46574c44
14,188,684 UART: [fwproc] Recv'd Img size: 111688 bytes
18,230,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,302,864 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,363,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,680,887 >>> mbox cmd response: success
18,685,663 UART: [afmc] ++
18,686,266 UART: [afmc] CDI.KEYID = 6
18,687,420 UART: [afmc] SUBJECT.KEYID = 7
18,688,573 UART: [afmc] AUTHORITY.KEYID = 5
22,004,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,298,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,300,602 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,316,758 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,332,849 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,348,990 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,372,118 UART: [afmc] --
24,375,623 UART: [cold-reset] --
24,381,379 UART: [state] Locking Datavault
24,385,006 UART: [state] Locking PCR0, PCR1 and PCR31
24,386,722 UART: [state] Locking ICCM
24,388,109 UART: [exit] Launching FMC @ 0x40000000
24,396,740 UART:
24,396,981 UART: Running Caliptra FMC ...
24,398,119 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
5,105,266 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,505,474 >>> mbox cmd response: success
24,146,453 UART:
24,146,838 UART: Running Caliptra FMC ...
24,148,024 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
191,586 UART:
191,959 UART: Running Caliptra ROM ...
193,133 UART:
193,285 UART: [state] CFI Enabled
262,526 UART: [state] LifecycleState = Unprovisioned
264,381 UART: [state] DebugLocked = Yes
265,667 UART: [state] Starting the WD Timer 40000000 cycles
271,051 UART: [kat] SHA2-256
450,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,810 UART: [kat] ++
462,372 UART: [kat] sha1
473,495 UART: [kat] SHA2-256
476,521 UART: [kat] SHA2-384
481,640 UART: [kat] SHA2-512-ACC
484,613 UART: [kat] ECC-384
2,949,924 UART: [kat] HMAC-384Kdf
2,974,818 UART: [kat] LMS
3,504,319 UART: [kat] --
3,507,056 UART: [cold-reset] ++
3,509,385 UART: [fht] FHT @ 0x50003400
3,520,013 UART: [idev] ++
3,520,578 UART: [idev] CDI.KEYID = 6
3,521,492 UART: [idev] SUBJECT.KEYID = 7
3,522,730 UART: [idev] UDS.KEYID = 0
3,525,880 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,667,041 UART: [idev] Erasing UDS.KEYID = 0
6,029,663 UART: [idev] Sha1 KeyId Algorithm
6,052,429 UART: [idev] --
6,056,210 UART: [ldev] ++
6,056,783 UART: [ldev] CDI.KEYID = 6
6,057,671 UART: [ldev] SUBJECT.KEYID = 5
6,058,889 UART: [ldev] AUTHORITY.KEYID = 7
6,060,188 UART: [ldev] FE.KEYID = 1
6,103,049 UART: [ldev] Erasing FE.KEYID = 1
8,609,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,960 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,966 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,786 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,368 UART: [ldev] --
10,415,990 UART: [fwproc] Wait for Commands...
10,418,629 UART: [fwproc] Recv command 0x46574c44
10,420,723 UART: [fwproc] Recv'd Img size: 112032 bytes
13,790,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,856,722 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,917,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,235,894 >>> mbox cmd response: success
14,239,497 UART: [afmc] ++
14,240,116 UART: [afmc] CDI.KEYID = 6
14,241,078 UART: [afmc] SUBJECT.KEYID = 7
14,242,219 UART: [afmc] AUTHORITY.KEYID = 5
16,767,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,492,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,494,655 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,510,859 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,526,796 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,542,684 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,564,598 UART: [afmc] --
18,568,034 UART: [cold-reset] --
18,572,818 UART: [state] Locking Datavault
18,579,103 UART: [state] Locking PCR0, PCR1 and PCR31
18,580,783 UART: [state] Locking ICCM
18,583,527 UART: [exit] Launching FMC @ 0x40000000
18,591,893 UART:
18,592,184 UART: Running Caliptra FMC ...
18,593,337 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,382,638 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,048,743 >>> mbox cmd response: success
18,344,235 UART:
18,344,631 UART: Running Caliptra FMC ...
18,345,890 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,221 writing to cptra_bootfsm_go
192,854 UART:
193,214 UART: Running Caliptra ROM ...
194,385 UART:
604,084 UART: [state] CFI Enabled
615,163 UART: [state] LifecycleState = Unprovisioned
617,043 UART: [state] DebugLocked = Yes
618,489 UART: [state] Starting the WD Timer 40000000 cycles
623,366 UART: [kat] SHA2-256
802,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,107 UART: [kat] ++
814,727 UART: [kat] sha1
824,887 UART: [kat] SHA2-256
827,915 UART: [kat] SHA2-384
835,018 UART: [kat] SHA2-512-ACC
837,942 UART: [kat] ECC-384
3,279,998 UART: [kat] HMAC-384Kdf
3,293,180 UART: [kat] LMS
3,822,701 UART: [kat] --
3,828,715 UART: [cold-reset] ++
3,830,732 UART: [fht] FHT @ 0x50003400
3,841,862 UART: [idev] ++
3,842,424 UART: [idev] CDI.KEYID = 6
3,843,698 UART: [idev] SUBJECT.KEYID = 7
3,844,811 UART: [idev] UDS.KEYID = 0
3,847,783 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,988,606 UART: [idev] Erasing UDS.KEYID = 0
6,315,321 UART: [idev] Sha1 KeyId Algorithm
6,337,890 UART: [idev] --
6,342,064 UART: [ldev] ++
6,342,652 UART: [ldev] CDI.KEYID = 6
6,343,574 UART: [ldev] SUBJECT.KEYID = 5
6,344,733 UART: [ldev] AUTHORITY.KEYID = 7
6,345,959 UART: [ldev] FE.KEYID = 1
6,358,872 UART: [ldev] Erasing FE.KEYID = 1
8,833,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,358 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,334 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,159 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,090 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,085 UART: [ldev] --
10,623,699 UART: [fwproc] Wait for Commands...
10,626,957 UART: [fwproc] Recv command 0x46574c44
10,628,995 UART: [fwproc] Recv'd Img size: 112032 bytes
13,994,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,067,241 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,127,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,445,429 >>> mbox cmd response: success
14,449,284 UART: [afmc] ++
14,449,896 UART: [afmc] CDI.KEYID = 6
14,450,843 UART: [afmc] SUBJECT.KEYID = 7
14,451,976 UART: [afmc] AUTHORITY.KEYID = 5
16,952,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,676,155 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,692,076 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,707,926 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,723,910 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,747,856 UART: [afmc] --
18,752,195 UART: [cold-reset] --
18,756,362 UART: [state] Locking Datavault
18,761,790 UART: [state] Locking PCR0, PCR1 and PCR31
18,763,502 UART: [state] Locking ICCM
18,765,337 UART: [exit] Launching FMC @ 0x40000000
18,773,707 UART:
18,774,122 UART: Running Caliptra FMC ...
18,775,265 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,701,453 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,229,467 >>> mbox cmd response: success
18,476,737 UART:
18,477,125 UART: Running Caliptra FMC ...
18,478,279 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
191,670 UART:
192,041 UART: Running Caliptra ROM ...
193,214 UART:
193,364 UART: [state] CFI Enabled
264,079 UART: [state] LifecycleState = Unprovisioned
265,950 UART: [state] DebugLocked = Yes
267,524 UART: [state] Starting the WD Timer 40000000 cycles
271,783 UART: [kat] SHA2-256
450,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,493 UART: [kat] ++
462,973 UART: [kat] sha1
473,958 UART: [kat] SHA2-256
476,987 UART: [kat] SHA2-384
482,575 UART: [kat] SHA2-512-ACC
485,510 UART: [kat] ECC-384
2,945,002 UART: [kat] HMAC-384Kdf
2,970,774 UART: [kat] LMS
3,500,262 UART: [kat] --
3,503,201 UART: [cold-reset] ++
3,504,968 UART: [fht] FHT @ 0x50003400
3,515,446 UART: [idev] ++
3,516,044 UART: [idev] CDI.KEYID = 6
3,517,003 UART: [idev] SUBJECT.KEYID = 7
3,518,124 UART: [idev] UDS.KEYID = 0
3,521,392 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,662,429 UART: [idev] Erasing UDS.KEYID = 0
6,026,770 UART: [idev] Sha1 KeyId Algorithm
6,049,087 UART: [idev] --
6,051,632 UART: [ldev] ++
6,052,208 UART: [ldev] CDI.KEYID = 6
6,053,101 UART: [ldev] SUBJECT.KEYID = 5
6,054,182 UART: [ldev] AUTHORITY.KEYID = 7
6,055,530 UART: [ldev] FE.KEYID = 1
6,099,642 UART: [ldev] Erasing FE.KEYID = 1
8,604,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,697 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,672 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,543 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,504 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,724 UART: [ldev] --
10,413,518 UART: [fwproc] Wait for Commands...
10,416,105 UART: [fwproc] Recv command 0x46574c44
10,418,201 UART: [fwproc] Recv'd Img size: 112032 bytes
13,792,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,815 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,928,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,246,205 >>> mbox cmd response: success
14,250,899 UART: [afmc] ++
14,251,505 UART: [afmc] CDI.KEYID = 6
14,252,478 UART: [afmc] SUBJECT.KEYID = 7
14,253,616 UART: [afmc] AUTHORITY.KEYID = 5
16,789,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,547 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,549,753 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,565,661 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,581,590 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,604,373 UART: [afmc] --
18,607,404 UART: [cold-reset] --
18,610,023 UART: [state] Locking Datavault
18,614,127 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,865 UART: [state] Locking ICCM
18,618,471 UART: [exit] Launching FMC @ 0x40000000
18,626,876 UART:
18,627,126 UART: Running Caliptra FMC ...
18,628,193 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,383,249 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
13,998,623 >>> mbox cmd response: success
18,282,257 UART:
18,282,637 UART: Running Caliptra FMC ...
18,283,814 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
191,847 UART:
192,226 UART: Running Caliptra ROM ...
193,383 UART:
603,179 UART: [state] CFI Enabled
616,321 UART: [state] LifecycleState = Unprovisioned
618,238 UART: [state] DebugLocked = Yes
619,787 UART: [state] Starting the WD Timer 40000000 cycles
624,756 UART: [kat] SHA2-256
803,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,443 UART: [kat] ++
815,918 UART: [kat] sha1
827,644 UART: [kat] SHA2-256
830,681 UART: [kat] SHA2-384
837,176 UART: [kat] SHA2-512-ACC
840,090 UART: [kat] ECC-384
3,282,555 UART: [kat] HMAC-384Kdf
3,293,713 UART: [kat] LMS
3,823,201 UART: [kat] --
3,829,301 UART: [cold-reset] ++
3,831,512 UART: [fht] FHT @ 0x50003400
3,842,355 UART: [idev] ++
3,842,922 UART: [idev] CDI.KEYID = 6
3,843,836 UART: [idev] SUBJECT.KEYID = 7
3,845,039 UART: [idev] UDS.KEYID = 0
3,848,140 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,990,343 UART: [idev] Erasing UDS.KEYID = 0
6,320,886 UART: [idev] Sha1 KeyId Algorithm
6,343,574 UART: [idev] --
6,348,002 UART: [ldev] ++
6,348,576 UART: [ldev] CDI.KEYID = 6
6,349,484 UART: [ldev] SUBJECT.KEYID = 5
6,350,698 UART: [ldev] AUTHORITY.KEYID = 7
6,351,926 UART: [ldev] FE.KEYID = 1
6,362,245 UART: [ldev] Erasing FE.KEYID = 1
8,838,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,056 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,574,064 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,589,892 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,605,826 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,627,128 UART: [ldev] --
10,632,348 UART: [fwproc] Wait for Commands...
10,634,226 UART: [fwproc] Recv command 0x46574c44
10,636,320 UART: [fwproc] Recv'd Img size: 112032 bytes
14,010,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,469 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,140,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,459,839 >>> mbox cmd response: success
14,464,582 UART: [afmc] ++
14,465,184 UART: [afmc] CDI.KEYID = 6
14,466,144 UART: [afmc] SUBJECT.KEYID = 7
14,467,272 UART: [afmc] AUTHORITY.KEYID = 5
16,971,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,691,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,693,502 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,709,696 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,725,609 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,741,529 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,764,828 UART: [afmc] --
18,767,898 UART: [cold-reset] --
18,772,223 UART: [state] Locking Datavault
18,777,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,779,011 UART: [state] Locking ICCM
18,781,535 UART: [exit] Launching FMC @ 0x40000000
18,789,926 UART:
18,790,173 UART: Running Caliptra FMC ...
18,791,311 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,694,058 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,233,673 >>> mbox cmd response: success
18,481,272 UART:
18,481,660 UART: Running Caliptra FMC ...
18,482,901 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = Yes
86,867 UART: [state] Starting the WD Timer 40000000 cycles
88,404 UART: [kat] SHA2-256
891,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,083 UART: [kat] ++
896,235 UART: [kat] sha1
900,639 UART: [kat] SHA2-256
902,579 UART: [kat] SHA2-384
905,436 UART: [kat] SHA2-512-ACC
907,337 UART: [kat] ECC-384
917,214 UART: [kat] HMAC-384Kdf
921,878 UART: [kat] LMS
1,170,190 UART: [kat] --
1,171,099 UART: [cold-reset] ++
1,171,446 UART: [fht] FHT @ 0x50003400
1,174,206 UART: [idev] ++
1,174,374 UART: [idev] CDI.KEYID = 6
1,174,735 UART: [idev] SUBJECT.KEYID = 7
1,175,160 UART: [idev] UDS.KEYID = 0
1,175,506 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,297 UART: [idev] Erasing UDS.KEYID = 0
1,200,356 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,316 UART: [ldev] ++
1,210,484 UART: [ldev] CDI.KEYID = 6
1,210,848 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,216,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,331 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,201 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,907 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,043 UART: [ldev] --
1,282,541 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,853 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,957 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,513 >>> mbox cmd response: success
2,743,573 UART: [afmc] ++
2,743,741 UART: [afmc] CDI.KEYID = 6
2,744,104 UART: [afmc] SUBJECT.KEYID = 7
2,744,530 UART: [afmc] AUTHORITY.KEYID = 5
2,779,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,695 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,408 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,279 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,989 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,821 UART: [afmc] --
2,822,706 UART: [cold-reset] --
2,823,392 UART: [state] Locking Datavault
2,824,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,253 UART: [state] Locking ICCM
2,825,765 UART: [exit] Launching FMC @ 0x40000000
2,831,062 UART:
2,831,078 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,267 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,941 >>> mbox cmd response: success
2,655,537 UART:
2,655,553 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,886 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = Yes
87,182 UART: [state] Starting the WD Timer 40000000 cycles
88,831 UART: [kat] SHA2-256
892,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,510 UART: [kat] ++
896,662 UART: [kat] sha1
900,972 UART: [kat] SHA2-256
902,912 UART: [kat] SHA2-384
905,427 UART: [kat] SHA2-512-ACC
907,328 UART: [kat] ECC-384
917,127 UART: [kat] HMAC-384Kdf
921,801 UART: [kat] LMS
1,170,113 UART: [kat] --
1,170,916 UART: [cold-reset] ++
1,171,377 UART: [fht] FHT @ 0x50003400
1,173,887 UART: [idev] ++
1,174,055 UART: [idev] CDI.KEYID = 6
1,174,416 UART: [idev] SUBJECT.KEYID = 7
1,174,841 UART: [idev] UDS.KEYID = 0
1,175,187 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,965 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,685 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,272 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,428 UART: [ldev] --
1,282,804 UART: [fwproc] Wait for Commands...
1,283,431 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,434 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,068 >>> mbox cmd response: success
2,744,206 UART: [afmc] ++
2,744,374 UART: [afmc] CDI.KEYID = 6
2,744,737 UART: [afmc] SUBJECT.KEYID = 7
2,745,163 UART: [afmc] AUTHORITY.KEYID = 5
2,780,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,294 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,804,007 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,809,878 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,815,588 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,823,242 UART: [afmc] --
2,824,207 UART: [cold-reset] --
2,824,897 UART: [state] Locking Datavault
2,826,116 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,720 UART: [state] Locking ICCM
2,827,332 UART: [exit] Launching FMC @ 0x40000000
2,832,629 UART:
2,832,645 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,944 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,256 >>> mbox cmd response: success
2,654,236 UART:
2,654,252 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = Yes
86,793 UART: [state] Starting the WD Timer 40000000 cycles
88,502 UART: [kat] SHA2-256
892,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,181 UART: [kat] ++
896,333 UART: [kat] sha1
900,571 UART: [kat] SHA2-256
902,511 UART: [kat] SHA2-384
905,392 UART: [kat] SHA2-512-ACC
907,293 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,312 UART: [kat] LMS
1,169,624 UART: [kat] --
1,170,235 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,174,978 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,215,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,235 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,105 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,811 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,931 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,975 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,549 >>> mbox cmd response: success
2,742,743 UART: [afmc] ++
2,742,911 UART: [afmc] CDI.KEYID = 6
2,743,274 UART: [afmc] SUBJECT.KEYID = 7
2,743,700 UART: [afmc] AUTHORITY.KEYID = 5
2,779,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,655 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,368 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,239 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,949 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,753 UART: [afmc] --
2,822,758 UART: [cold-reset] --
2,823,572 UART: [state] Locking Datavault
2,824,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,293 UART: [state] Locking ICCM
2,825,733 UART: [exit] Launching FMC @ 0x40000000
2,831,030 UART:
2,831,046 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,927 >>> mbox cmd response: success
2,653,241 UART:
2,653,257 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = Yes
86,568 UART: [state] Starting the WD Timer 40000000 cycles
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,174,507 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,477 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,216,091 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,818 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,688 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,394 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,508 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,479 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,986 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,656 >>> mbox cmd response: success
2,743,858 UART: [afmc] ++
2,744,026 UART: [afmc] CDI.KEYID = 6
2,744,389 UART: [afmc] SUBJECT.KEYID = 7
2,744,815 UART: [afmc] AUTHORITY.KEYID = 5
2,780,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,138 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,803,851 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,809,722 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,815,432 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,823,236 UART: [afmc] --
2,824,297 UART: [cold-reset] --
2,825,291 UART: [state] Locking Datavault
2,826,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,954 UART: [state] Locking ICCM
2,827,382 UART: [exit] Launching FMC @ 0x40000000
2,832,679 UART:
2,832,695 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,790 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,306 >>> mbox cmd response: success
2,655,718 UART:
2,655,734 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = Yes
86,647 UART: [state] Starting the WD Timer 40000000 cycles
88,290 UART: [kat] SHA2-256
891,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,969 UART: [kat] ++
896,121 UART: [kat] sha1
900,351 UART: [kat] SHA2-256
902,291 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,174,078 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,942 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,863 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,557 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,427 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,133 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,129 UART: [ldev] --
1,280,533 UART: [fwproc] Wait for Commands...
1,281,262 UART: [fwproc] Recv command 0x46574c44
1,281,995 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,667 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,261 >>> mbox cmd response: success
2,743,387 UART: [afmc] ++
2,743,555 UART: [afmc] CDI.KEYID = 6
2,743,918 UART: [afmc] SUBJECT.KEYID = 7
2,744,344 UART: [afmc] AUTHORITY.KEYID = 5
2,779,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,881 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,594 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,465 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,814,175 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,919 UART: [afmc] --
2,822,842 UART: [cold-reset] --
2,823,836 UART: [state] Locking Datavault
2,824,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,409 UART: [state] Locking ICCM
2,826,071 UART: [exit] Launching FMC @ 0x40000000
2,831,368 UART:
2,831,384 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,861 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,783 >>> mbox cmd response: success
2,656,075 UART:
2,656,091 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = Yes
86,872 UART: [state] Starting the WD Timer 40000000 cycles
88,533 UART: [kat] SHA2-256
892,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,212 UART: [kat] ++
896,364 UART: [kat] sha1
900,550 UART: [kat] SHA2-256
902,490 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,703 UART: [kat] HMAC-384Kdf
921,339 UART: [kat] LMS
1,169,651 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,174,927 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,887 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,480 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,350 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,056 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,128 UART: [ldev] --
1,282,532 UART: [fwproc] Wait for Commands...
1,283,119 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,480 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,090 >>> mbox cmd response: success
2,745,108 UART: [afmc] ++
2,745,276 UART: [afmc] CDI.KEYID = 6
2,745,639 UART: [afmc] SUBJECT.KEYID = 7
2,746,065 UART: [afmc] AUTHORITY.KEYID = 5
2,781,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,706 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,804,419 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,810,290 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,816,000 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,823,744 UART: [afmc] --
2,824,819 UART: [cold-reset] --
2,825,615 UART: [state] Locking Datavault
2,826,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,474 UART: [state] Locking ICCM
2,827,962 UART: [exit] Launching FMC @ 0x40000000
2,833,259 UART:
2,833,275 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,828 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,260 >>> mbox cmd response: success
2,654,662 UART:
2,654,678 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,282 UART:
192,655 UART: Running Caliptra ROM ...
193,832 UART:
193,986 UART: [state] CFI Enabled
261,426 UART: [state] LifecycleState = Unprovisioned
263,799 UART: [state] DebugLocked = No
266,153 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,430 UART:
192,797 UART: Running Caliptra ROM ...
193,968 UART:
603,629 UART: [state] CFI Enabled
616,793 UART: [state] LifecycleState = Unprovisioned
619,142 UART: [state] DebugLocked = No
620,624 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,164 UART:
192,558 UART: Running Caliptra ROM ...
193,743 UART:
193,917 UART: [state] CFI Enabled
266,251 UART: [state] LifecycleState = Unprovisioned
268,173 UART: [state] DebugLocked = No
270,590 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
192,654 UART:
193,744 UART: Running Caliptra ROM ...
194,953 UART:
603,645 UART: [state] CFI Enabled
616,274 UART: [state] LifecycleState = Unprovisioned
618,210 UART: [state] DebugLocked = No
620,408 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,338 UART:
192,726 UART: Running Caliptra ROM ...
193,909 UART:
194,064 UART: [state] CFI Enabled
261,763 UART: [state] LifecycleState = Unprovisioned
263,654 UART: [state] DebugLocked = No
264,820 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,418 UART:
192,807 UART: Running Caliptra ROM ...
193,939 UART:
603,330 UART: [state] CFI Enabled
616,045 UART: [state] LifecycleState = Unprovisioned
617,898 UART: [state] DebugLocked = No
620,481 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,345 UART:
192,707 UART: Running Caliptra ROM ...
193,920 UART:
194,086 UART: [state] CFI Enabled
263,147 UART: [state] LifecycleState = Unprovisioned
265,559 UART: [state] DebugLocked = No
267,427 UART: [state] WD Timer not started. Device not locked for debugging
271,739 UART: [kat] SHA2-256
453,651 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,175 UART: [kat] ++
465,758 UART: [kat] sha1
476,178 UART: [kat] SHA2-256
479,169 UART: [kat] SHA2-384
483,640 UART: [kat] SHA2-512-ACC
486,253 UART: [kat] ECC-384
3,771,635 UART: [kat] HMAC-384Kdf
3,800,023 UART: [kat] LMS
4,873,176 UART: [kat] --
4,876,602 UART: [cold-reset] ++
4,879,347 UART: [fht] FHT @ 0x50003400
4,891,240 UART: [idev] ++
4,891,975 UART: [idev] CDI.KEYID = 6
4,893,151 UART: [idev] SUBJECT.KEYID = 7
4,894,306 UART: [idev] UDS.KEYID = 0
4,928,237 UART: [idev] Erasing UDS.KEYID = 0
8,241,542 UART: [idev] Sha1 KeyId Algorithm
8,260,351 UART: [idev] CSR upload begun
8,265,822 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,572,269 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,588,602 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,604,658 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,620,690 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,645,279 UART: [idev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
10,791,366 UART: [idev] CSR uploaded
10,806,475 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,806,961 UART: [idev] --
10,810,696 UART: [ldev] ++
10,811,254 UART: [ldev] CDI.KEYID = 6
10,812,157 UART: [ldev] SUBJECT.KEYID = 5
10,813,335 UART: [ldev] AUTHORITY.KEYID = 7
10,814,587 UART: [ldev] FE.KEYID = 1
10,855,048 UART: [ldev] Erasing FE.KEYID = 1
14,189,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,502,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,551,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,572,529 UART: [ldev] --
16,578,013 UART: [fwproc] Wait for Commands...
16,580,107 UART: [fwproc] Recv command 0x49444352
16,595,547 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
10,475,478 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,185,652 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,574 UART:
192,945 UART: Running Caliptra ROM ...
194,097 UART:
603,893 UART: [state] CFI Enabled
618,262 UART: [state] LifecycleState = Unprovisioned
620,625 UART: [state] DebugLocked = No
623,569 UART: [state] WD Timer not started. Device not locked for debugging
628,092 UART: [kat] SHA2-256
810,091 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,633 UART: [kat] ++
822,224 UART: [kat] sha1
833,803 UART: [kat] SHA2-256
836,853 UART: [kat] SHA2-384
842,895 UART: [kat] SHA2-512-ACC
845,516 UART: [kat] ECC-384
4,102,924 UART: [kat] HMAC-384Kdf
4,115,991 UART: [kat] LMS
5,189,133 UART: [kat] --
5,193,362 UART: [cold-reset] ++
5,194,541 UART: [fht] FHT @ 0x50003400
5,205,843 UART: [idev] ++
5,206,518 UART: [idev] CDI.KEYID = 6
5,207,749 UART: [idev] SUBJECT.KEYID = 7
5,209,175 UART: [idev] UDS.KEYID = 0
5,228,012 UART: [idev] Erasing UDS.KEYID = 0
8,499,835 UART: [idev] Sha1 KeyId Algorithm
8,520,703 UART: [idev] CSR upload begun
8,526,175 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,816,551 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,832,907 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,848,968 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,865,000 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,889,553 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
11,035,570 UART: [idev] CSR uploaded
11,050,734 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,051,168 UART: [idev] --
11,055,141 UART: [ldev] ++
11,055,748 UART: [ldev] CDI.KEYID = 6
11,056,664 UART: [ldev] SUBJECT.KEYID = 5
11,057,836 UART: [ldev] AUTHORITY.KEYID = 7
11,059,012 UART: [ldev] FE.KEYID = 1
11,071,816 UART: [ldev] Erasing FE.KEYID = 1
14,360,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,654,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,670,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,686,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,702,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,723,430 UART: [ldev] --
16,727,983 UART: [fwproc] Wait for Commands...
16,729,478 UART: [fwproc] Recv command 0x49444352
16,744,615 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
10,729,322 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,344,732 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,047 UART:
192,438 UART: Running Caliptra ROM ...
193,520 UART:
193,658 UART: [state] CFI Enabled
260,580 UART: [state] LifecycleState = Unprovisioned
262,495 UART: [state] DebugLocked = No
263,899 UART: [state] WD Timer not started. Device not locked for debugging
268,434 UART: [kat] SHA2-256
447,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,138 UART: [kat] ++
459,584 UART: [kat] sha1
470,025 UART: [kat] SHA2-256
473,058 UART: [kat] SHA2-384
479,039 UART: [kat] SHA2-512-ACC
482,030 UART: [kat] ECC-384
2,945,608 UART: [kat] HMAC-384Kdf
2,968,327 UART: [kat] LMS
3,497,767 UART: [kat] --
3,501,474 UART: [cold-reset] ++
3,503,252 UART: [fht] FHT @ 0x50003400
3,514,345 UART: [idev] ++
3,514,910 UART: [idev] CDI.KEYID = 6
3,515,821 UART: [idev] SUBJECT.KEYID = 7
3,517,033 UART: [idev] UDS.KEYID = 0
3,540,970 UART: [idev] Erasing UDS.KEYID = 0
6,024,099 UART: [idev] Sha1 KeyId Algorithm
6,044,741 UART: [idev] CSR upload begun
6,049,454 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,776,814 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,792,867 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,808,809 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,824,676 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,848,491 UART: [idev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
7,993,545 UART: [idev] CSR uploaded
8,009,683 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,010,114 UART: [idev] --
8,013,801 UART: [ldev] ++
8,014,377 UART: [ldev] CDI.KEYID = 6
8,015,472 UART: [ldev] SUBJECT.KEYID = 5
8,016,639 UART: [ldev] AUTHORITY.KEYID = 7
8,017,738 UART: [ldev] FE.KEYID = 1
8,059,895 UART: [ldev] Erasing FE.KEYID = 1
10,563,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,369,637 UART: [ldev] --
12,373,603 UART: [fwproc] Wait for Commands...
12,375,382 UART: [fwproc] Recv command 0x49444352
12,390,502 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
7,687,882 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,965,792 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,434 UART:
192,821 UART: Running Caliptra ROM ...
194,000 UART:
603,527 UART: [state] CFI Enabled
616,512 UART: [state] LifecycleState = Unprovisioned
618,381 UART: [state] DebugLocked = No
620,266 UART: [state] WD Timer not started. Device not locked for debugging
623,398 UART: [kat] SHA2-256
802,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,079 UART: [kat] ++
814,532 UART: [kat] sha1
825,082 UART: [kat] SHA2-256
828,089 UART: [kat] SHA2-384
834,118 UART: [kat] SHA2-512-ACC
837,107 UART: [kat] ECC-384
3,280,975 UART: [kat] HMAC-384Kdf
3,293,619 UART: [kat] LMS
3,823,088 UART: [kat] --
3,827,666 UART: [cold-reset] ++
3,829,700 UART: [fht] FHT @ 0x50003400
3,840,238 UART: [idev] ++
3,840,798 UART: [idev] CDI.KEYID = 6
3,841,808 UART: [idev] SUBJECT.KEYID = 7
3,842,954 UART: [idev] UDS.KEYID = 0
3,860,988 UART: [idev] Erasing UDS.KEYID = 0
6,319,413 UART: [idev] Sha1 KeyId Algorithm
6,340,319 UART: [idev] CSR upload begun
6,345,012 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,060,930 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,077,033 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,092,995 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,108,831 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,132,660 UART: [idev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
8,277,786 UART: [idev] CSR uploaded
8,293,916 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,294,399 UART: [idev] --
8,296,782 UART: [ldev] ++
8,297,344 UART: [ldev] CDI.KEYID = 6
8,298,255 UART: [ldev] SUBJECT.KEYID = 5
8,299,453 UART: [ldev] AUTHORITY.KEYID = 7
8,300,688 UART: [ldev] FE.KEYID = 1
8,310,196 UART: [ldev] Erasing FE.KEYID = 1
10,783,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,504,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,520,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,536,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,552,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,573,208 UART: [ldev] --
12,577,840 UART: [fwproc] Wait for Commands...
12,580,216 UART: [fwproc] Recv command 0x49444352
12,595,383 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
7,943,736 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,182,785 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,052 UART:
192,448 UART: Running Caliptra ROM ...
193,576 UART:
193,722 UART: [state] CFI Enabled
260,782 UART: [state] LifecycleState = Unprovisioned
262,668 UART: [state] DebugLocked = No
263,946 UART: [state] WD Timer not started. Device not locked for debugging
267,248 UART: [kat] SHA2-256
446,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,974 UART: [kat] ++
458,424 UART: [kat] sha1
468,541 UART: [kat] SHA2-256
471,612 UART: [kat] SHA2-384
478,667 UART: [kat] SHA2-512-ACC
481,655 UART: [kat] ECC-384
2,945,215 UART: [kat] HMAC-384Kdf
2,968,636 UART: [kat] LMS
3,498,069 UART: [kat] --
3,502,554 UART: [cold-reset] ++
3,503,624 UART: [fht] FHT @ 0x50003400
3,515,741 UART: [idev] ++
3,516,332 UART: [idev] CDI.KEYID = 6
3,517,295 UART: [idev] SUBJECT.KEYID = 7
3,518,452 UART: [idev] UDS.KEYID = 0
3,540,589 UART: [idev] Erasing UDS.KEYID = 0
6,023,708 UART: [idev] Sha1 KeyId Algorithm
6,044,291 UART: [idev] CSR upload begun
6,048,996 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,777,702 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,793,811 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,809,711 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,825,581 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,849,381 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,994,582 UART: [idev] CSR uploaded
8,010,655 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,011,135 UART: [idev] --
8,014,606 UART: [ldev] ++
8,015,191 UART: [ldev] CDI.KEYID = 6
8,016,074 UART: [ldev] SUBJECT.KEYID = 5
8,017,283 UART: [ldev] AUTHORITY.KEYID = 7
8,018,521 UART: [ldev] FE.KEYID = 1
8,057,955 UART: [ldev] Erasing FE.KEYID = 1
10,559,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,297,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,313,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,329,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,344,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,365,174 UART: [ldev] --
12,369,395 UART: [fwproc] Wait for Commands...
12,372,250 UART: [fwproc] Recv command 0x49444352
12,387,369 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
7,665,088 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,963,685 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,599 UART:
192,985 UART: Running Caliptra ROM ...
194,061 UART:
603,681 UART: [state] CFI Enabled
618,305 UART: [state] LifecycleState = Unprovisioned
620,137 UART: [state] DebugLocked = No
621,321 UART: [state] WD Timer not started. Device not locked for debugging
624,960 UART: [kat] SHA2-256
804,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,638 UART: [kat] ++
816,080 UART: [kat] sha1
827,713 UART: [kat] SHA2-256
830,768 UART: [kat] SHA2-384
835,280 UART: [kat] SHA2-512-ACC
838,259 UART: [kat] ECC-384
3,280,737 UART: [kat] HMAC-384Kdf
3,293,348 UART: [kat] LMS
3,822,813 UART: [kat] --
3,827,125 UART: [cold-reset] ++
3,828,244 UART: [fht] FHT @ 0x50003400
3,838,789 UART: [idev] ++
3,839,356 UART: [idev] CDI.KEYID = 6
3,840,277 UART: [idev] SUBJECT.KEYID = 7
3,841,504 UART: [idev] UDS.KEYID = 0
3,859,208 UART: [idev] Erasing UDS.KEYID = 0
6,316,074 UART: [idev] Sha1 KeyId Algorithm
6,338,290 UART: [idev] CSR upload begun
6,342,961 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,059,979 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,076,064 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,092,002 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,107,816 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,131,655 UART: [idev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
8,276,837 UART: [idev] CSR uploaded
8,292,965 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,293,435 UART: [idev] --
8,297,443 UART: [ldev] ++
8,298,007 UART: [ldev] CDI.KEYID = 6
8,298,917 UART: [ldev] SUBJECT.KEYID = 5
8,300,135 UART: [ldev] AUTHORITY.KEYID = 7
8,301,371 UART: [ldev] FE.KEYID = 1
8,310,613 UART: [ldev] Erasing FE.KEYID = 1
10,783,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,502,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,518,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,534,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,550,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,570,158 UART: [ldev] --
12,575,575 UART: [fwproc] Wait for Commands...
12,577,288 UART: [fwproc] Recv command 0x49444352
12,592,402 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
7,941,494 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,173,128 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
891,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,878 UART: [kat] HMAC-384Kdf
921,544 UART: [kat] LMS
1,169,856 UART: [kat] --
1,170,679 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,737 UART: [idev] ++
1,173,905 UART: [idev] CDI.KEYID = 6
1,174,266 UART: [idev] SUBJECT.KEYID = 7
1,174,691 UART: [idev] UDS.KEYID = 0
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,200,025 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] CSR upload begun
1,210,072 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,407 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,115 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,000 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,706 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,135 UART: [idev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
1,297,632 UART: [idev] CSR uploaded
1,300,677 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,846 UART: [idev] --
1,302,039 UART: [ldev] ++
1,302,207 UART: [ldev] CDI.KEYID = 6
1,302,571 UART: [ldev] SUBJECT.KEYID = 5
1,302,998 UART: [ldev] AUTHORITY.KEYID = 7
1,303,461 UART: [ldev] FE.KEYID = 1
1,308,649 UART: [ldev] Erasing FE.KEYID = 1
1,334,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,853 UART: [ldev] --
1,373,231 UART: [fwproc] Wait for Commands...
1,373,898 UART: [fwproc] Recv command 0x49444352
1,379,027 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,422 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,952 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] CSR upload begun
1,209,959 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,812 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,520 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,405 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,111 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,540 UART: [idev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
1,298,037 UART: [idev] CSR uploaded
1,301,082 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,251 UART: [idev] --
1,302,284 UART: [ldev] ++
1,302,452 UART: [ldev] CDI.KEYID = 6
1,302,816 UART: [ldev] SUBJECT.KEYID = 5
1,303,243 UART: [ldev] AUTHORITY.KEYID = 7
1,303,706 UART: [ldev] FE.KEYID = 1
1,308,810 UART: [ldev] Erasing FE.KEYID = 1
1,334,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,076 UART: [ldev] --
1,373,384 UART: [fwproc] Wait for Commands...
1,374,027 UART: [fwproc] Recv command 0x49444352
1,379,156 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,281 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,357 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,168,991 UART: [cold-reset] ++
1,169,565 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,206,529 UART: [idev] CSR upload begun
1,208,308 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,961 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,669 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,554 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,260 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,689 UART: [idev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
1,296,186 UART: [idev] CSR uploaded
1,299,231 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,400 UART: [idev] --
1,300,553 UART: [ldev] ++
1,300,721 UART: [ldev] CDI.KEYID = 6
1,301,085 UART: [ldev] SUBJECT.KEYID = 5
1,301,512 UART: [ldev] AUTHORITY.KEYID = 7
1,301,975 UART: [ldev] FE.KEYID = 1
1,306,953 UART: [ldev] Erasing FE.KEYID = 1
1,332,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,455 UART: [ldev] --
1,371,885 UART: [fwproc] Wait for Commands...
1,372,468 UART: [fwproc] Recv command 0x49444352
1,377,597 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,628 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,464 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,172,934 UART: [idev] ++
1,173,102 UART: [idev] CDI.KEYID = 6
1,173,463 UART: [idev] SUBJECT.KEYID = 7
1,173,888 UART: [idev] UDS.KEYID = 0
1,181,584 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,026 UART: [idev] CSR upload begun
1,208,805 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,120 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,828 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,713 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,419 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,848 UART: [idev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
1,296,345 UART: [idev] CSR uploaded
1,299,390 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,559 UART: [idev] --
1,300,552 UART: [ldev] ++
1,300,720 UART: [ldev] CDI.KEYID = 6
1,301,084 UART: [ldev] SUBJECT.KEYID = 5
1,301,511 UART: [ldev] AUTHORITY.KEYID = 7
1,301,974 UART: [ldev] FE.KEYID = 1
1,307,166 UART: [ldev] Erasing FE.KEYID = 1
1,334,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,754 UART: [ldev] --
1,373,196 UART: [fwproc] Wait for Commands...
1,373,997 UART: [fwproc] Recv command 0x49444352
1,379,126 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,525 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,161,757 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,430 UART: [kat] LMS
1,168,742 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,182,071 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,206,905 UART: [idev] CSR upload begun
1,208,684 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,485 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,193 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,078 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,784 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,213 UART: [idev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
1,296,710 UART: [idev] CSR uploaded
1,299,755 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,924 UART: [idev] --
1,300,785 UART: [ldev] ++
1,300,953 UART: [ldev] CDI.KEYID = 6
1,301,317 UART: [ldev] SUBJECT.KEYID = 5
1,301,744 UART: [ldev] AUTHORITY.KEYID = 7
1,302,207 UART: [ldev] FE.KEYID = 1
1,307,525 UART: [ldev] Erasing FE.KEYID = 1
1,333,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,783 UART: [ldev] --
1,373,129 UART: [fwproc] Wait for Commands...
1,373,732 UART: [fwproc] Recv command 0x49444352
1,378,861 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,692 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,024 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Unprovisioned
85,570 UART: [state] DebugLocked = No
86,074 UART: [state] WD Timer not started. Device not locked for debugging
87,225 UART: [kat] SHA2-256
890,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,094 UART: [idev] CSR upload begun
1,208,873 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,312 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,020 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,905 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,611 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,040 UART: [idev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
1,296,537 UART: [idev] CSR uploaded
1,299,582 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,751 UART: [idev] --
1,300,640 UART: [ldev] ++
1,300,808 UART: [ldev] CDI.KEYID = 6
1,301,172 UART: [ldev] SUBJECT.KEYID = 5
1,301,599 UART: [ldev] AUTHORITY.KEYID = 7
1,302,062 UART: [ldev] FE.KEYID = 1
1,307,080 UART: [ldev] Erasing FE.KEYID = 1
1,333,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,288 UART: [ldev] --
1,372,552 UART: [fwproc] Wait for Commands...
1,373,259 UART: [fwproc] Recv command 0x49444352
1,378,388 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,255 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,741 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,124 UART:
192,510 UART: Running Caliptra ROM ...
193,728 UART:
193,878 UART: [state] CFI Enabled
262,818 UART: [state] LifecycleState = Unprovisioned
265,176 UART: [state] DebugLocked = No
267,787 UART: [state] WD Timer not started. Device not locked for debugging
271,966 UART: [kat] SHA2-256
453,880 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,428 UART: [kat] ++
465,870 UART: [kat] sha1
475,994 UART: [kat] SHA2-256
479,065 UART: [kat] SHA2-384
486,338 UART: [kat] SHA2-512-ACC
488,946 UART: [kat] ECC-384
3,774,537 UART: [kat] HMAC-384Kdf
3,801,317 UART: [kat] LMS
4,874,504 UART: [kat] --
4,879,419 UART: [cold-reset] ++
4,881,031 UART: [fht] FHT @ 0x50003400
4,892,986 UART: [idev] ++
4,893,658 UART: [idev] CDI.KEYID = 6
4,894,895 UART: [idev] SUBJECT.KEYID = 7
4,896,000 UART: [idev] UDS.KEYID = 0
4,896,955 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
4,928,916 UART: [idev] Erasing UDS.KEYID = 0
8,244,598 UART: [idev] Sha1 KeyId Algorithm
8,267,623 UART: [idev] --
8,271,835 UART: [ldev] ++
8,272,445 UART: [ldev] CDI.KEYID = 6
8,273,631 UART: [ldev] SUBJECT.KEYID = 5
8,274,729 UART: [ldev] AUTHORITY.KEYID = 7
8,276,007 UART: [ldev] FE.KEYID = 1
8,316,206 UART: [ldev] Erasing FE.KEYID = 1
11,648,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,442 UART: [ldev] --
14,013,250 UART: [fwproc] Wait for Commands...
14,015,637 UART: [fwproc] Recv command 0x49444352
14,022,166 UART: ROM Fatal Error: 0x0102000A
14,025,473 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
4,780,227 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
13,810,060 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,491 UART:
192,856 UART: Running Caliptra ROM ...
194,090 UART:
603,636 UART: [state] CFI Enabled
619,789 UART: [state] LifecycleState = Unprovisioned
622,107 UART: [state] DebugLocked = No
623,481 UART: [state] WD Timer not started. Device not locked for debugging
628,335 UART: [kat] SHA2-256
810,352 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,898 UART: [kat] ++
822,482 UART: [kat] sha1
831,956 UART: [kat] SHA2-256
835,007 UART: [kat] SHA2-384
840,220 UART: [kat] SHA2-512-ACC
842,832 UART: [kat] ECC-384
4,096,725 UART: [kat] HMAC-384Kdf
4,107,264 UART: [kat] LMS
5,180,397 UART: [kat] --
5,184,639 UART: [cold-reset] ++
5,187,119 UART: [fht] FHT @ 0x50003400
5,198,160 UART: [idev] ++
5,198,870 UART: [idev] CDI.KEYID = 6
5,199,981 UART: [idev] SUBJECT.KEYID = 7
5,201,463 UART: [idev] UDS.KEYID = 0
5,202,688 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
5,218,217 UART: [idev] Erasing UDS.KEYID = 0
8,489,206 UART: [idev] Sha1 KeyId Algorithm
8,511,526 UART: [idev] --
8,514,657 UART: [ldev] ++
8,515,229 UART: [ldev] CDI.KEYID = 6
8,516,467 UART: [ldev] SUBJECT.KEYID = 5
8,517,900 UART: [ldev] AUTHORITY.KEYID = 7
8,519,505 UART: [ldev] FE.KEYID = 1
8,532,955 UART: [ldev] Erasing FE.KEYID = 1
11,825,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,402 UART: [ldev] --
14,191,662 UART: [fwproc] Wait for Commands...
14,194,671 UART: [fwproc] Recv command 0x49444352
14,200,871 UART: ROM Fatal Error: 0x0102000A
14,204,233 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
5,104,597 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
14,018,837 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,216 UART:
192,605 UART: Running Caliptra ROM ...
193,911 UART:
194,071 UART: [state] CFI Enabled
263,587 UART: [state] LifecycleState = Unprovisioned
265,432 UART: [state] DebugLocked = No
267,837 UART: [state] WD Timer not started. Device not locked for debugging
272,483 UART: [kat] SHA2-256
451,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,182 UART: [kat] ++
463,717 UART: [kat] sha1
475,299 UART: [kat] SHA2-256
478,306 UART: [kat] SHA2-384
484,173 UART: [kat] SHA2-512-ACC
487,160 UART: [kat] ECC-384
2,947,964 UART: [kat] HMAC-384Kdf
2,970,314 UART: [kat] LMS
3,499,755 UART: [kat] --
3,502,907 UART: [cold-reset] ++
3,505,545 UART: [fht] FHT @ 0x50003400
3,516,315 UART: [idev] ++
3,516,886 UART: [idev] CDI.KEYID = 6
3,517,812 UART: [idev] SUBJECT.KEYID = 7
3,519,028 UART: [idev] UDS.KEYID = 0
3,520,021 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,542,325 UART: [idev] Erasing UDS.KEYID = 0
6,024,271 UART: [idev] Sha1 KeyId Algorithm
6,047,571 UART: [idev] --
6,052,592 UART: [ldev] ++
6,053,166 UART: [ldev] CDI.KEYID = 6
6,054,056 UART: [ldev] SUBJECT.KEYID = 5
6,055,280 UART: [ldev] AUTHORITY.KEYID = 7
6,056,516 UART: [ldev] FE.KEYID = 1
6,090,041 UART: [ldev] Erasing FE.KEYID = 1
8,590,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,441 UART: [ldev] --
10,382,193 UART: [fwproc] Wait for Commands...
10,385,148 UART: [fwproc] Recv command 0x49444352
10,391,730 UART: ROM Fatal Error: 0x0102000A
10,394,825 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,382,051 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,226,118 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,592 UART:
192,963 UART: Running Caliptra ROM ...
194,050 UART:
603,836 UART: [state] CFI Enabled
620,871 UART: [state] LifecycleState = Unprovisioned
622,783 UART: [state] DebugLocked = No
625,212 UART: [state] WD Timer not started. Device not locked for debugging
628,179 UART: [kat] SHA2-256
807,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,873 UART: [kat] ++
819,320 UART: [kat] sha1
829,816 UART: [kat] SHA2-256
832,874 UART: [kat] SHA2-384
839,383 UART: [kat] SHA2-512-ACC
842,308 UART: [kat] ECC-384
3,283,928 UART: [kat] HMAC-384Kdf
3,297,791 UART: [kat] LMS
3,827,250 UART: [kat] --
3,833,345 UART: [cold-reset] ++
3,835,378 UART: [fht] FHT @ 0x50003400
3,846,452 UART: [idev] ++
3,847,009 UART: [idev] CDI.KEYID = 6
3,847,979 UART: [idev] SUBJECT.KEYID = 7
3,849,077 UART: [idev] UDS.KEYID = 0
3,850,111 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,867,422 UART: [idev] Erasing UDS.KEYID = 0
6,324,318 UART: [idev] Sha1 KeyId Algorithm
6,347,784 UART: [idev] --
6,352,002 UART: [ldev] ++
6,352,575 UART: [ldev] CDI.KEYID = 6
6,353,541 UART: [ldev] SUBJECT.KEYID = 5
6,354,713 UART: [ldev] AUTHORITY.KEYID = 7
6,355,946 UART: [ldev] FE.KEYID = 1
6,366,795 UART: [ldev] Erasing FE.KEYID = 1
8,845,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,745 UART: [ldev] --
10,636,209 UART: [fwproc] Wait for Commands...
10,638,042 UART: [fwproc] Recv command 0x49444352
10,645,811 UART: ROM Fatal Error: 0x0102000A
10,648,911 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,695,507 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,407,734 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,145 UART:
192,516 UART: Running Caliptra ROM ...
193,625 UART:
193,772 UART: [state] CFI Enabled
260,532 UART: [state] LifecycleState = Unprovisioned
262,405 UART: [state] DebugLocked = No
264,006 UART: [state] WD Timer not started. Device not locked for debugging
267,857 UART: [kat] SHA2-256
446,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,555 UART: [kat] ++
459,090 UART: [kat] sha1
469,976 UART: [kat] SHA2-256
472,976 UART: [kat] SHA2-384
479,059 UART: [kat] SHA2-512-ACC
482,050 UART: [kat] ECC-384
2,946,949 UART: [kat] HMAC-384Kdf
2,971,095 UART: [kat] LMS
3,500,580 UART: [kat] --
3,505,433 UART: [cold-reset] ++
3,506,820 UART: [fht] FHT @ 0x50003400
3,518,015 UART: [idev] ++
3,518,584 UART: [idev] CDI.KEYID = 6
3,519,499 UART: [idev] SUBJECT.KEYID = 7
3,520,722 UART: [idev] UDS.KEYID = 0
3,521,702 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,541,938 UART: [idev] Erasing UDS.KEYID = 0
6,028,128 UART: [idev] Sha1 KeyId Algorithm
6,051,258 UART: [idev] --
6,055,424 UART: [ldev] ++
6,056,037 UART: [ldev] CDI.KEYID = 6
6,056,955 UART: [ldev] SUBJECT.KEYID = 5
6,058,123 UART: [ldev] AUTHORITY.KEYID = 7
6,059,357 UART: [ldev] FE.KEYID = 1
6,099,657 UART: [ldev] Erasing FE.KEYID = 1
8,603,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,125 UART: [ldev] --
10,414,304 UART: [fwproc] Wait for Commands...
10,416,252 UART: [fwproc] Recv command 0x49444352
10,421,862 UART: ROM Fatal Error: 0x0102000A
10,424,960 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,380,735 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,227,068 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,561 UART:
192,935 UART: Running Caliptra ROM ...
194,047 UART:
603,557 UART: [state] CFI Enabled
616,698 UART: [state] LifecycleState = Unprovisioned
618,587 UART: [state] DebugLocked = No
621,374 UART: [state] WD Timer not started. Device not locked for debugging
624,784 UART: [kat] SHA2-256
803,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,489 UART: [kat] ++
815,985 UART: [kat] sha1
827,243 UART: [kat] SHA2-256
830,240 UART: [kat] SHA2-384
837,085 UART: [kat] SHA2-512-ACC
840,016 UART: [kat] ECC-384
3,280,916 UART: [kat] HMAC-384Kdf
3,294,982 UART: [kat] LMS
3,824,480 UART: [kat] --
3,829,927 UART: [cold-reset] ++
3,832,531 UART: [fht] FHT @ 0x50003400
3,843,508 UART: [idev] ++
3,844,087 UART: [idev] CDI.KEYID = 6
3,845,019 UART: [idev] SUBJECT.KEYID = 7
3,846,239 UART: [idev] UDS.KEYID = 0
3,847,213 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,863,353 UART: [idev] Erasing UDS.KEYID = 0
6,321,325 UART: [idev] Sha1 KeyId Algorithm
6,344,803 UART: [idev] --
6,347,943 UART: [ldev] ++
6,348,538 UART: [ldev] CDI.KEYID = 6
6,349,426 UART: [ldev] SUBJECT.KEYID = 5
6,350,588 UART: [ldev] AUTHORITY.KEYID = 7
6,351,821 UART: [ldev] FE.KEYID = 1
6,362,696 UART: [ldev] Erasing FE.KEYID = 1
8,833,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,404 UART: [ldev] --
10,625,789 UART: [fwproc] Wait for Commands...
10,627,558 UART: [fwproc] Recv command 0x49444352
10,633,993 UART: ROM Fatal Error: 0x0102000A
10,637,135 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,695,733 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,412,450 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
919,916 UART: [kat] LMS
1,168,228 UART: [kat] --
1,169,025 UART: [cold-reset] ++
1,169,605 UART: [fht] FHT @ 0x50003400
1,172,259 UART: [idev] ++
1,172,427 UART: [idev] CDI.KEYID = 6
1,172,788 UART: [idev] SUBJECT.KEYID = 7
1,173,213 UART: [idev] UDS.KEYID = 0
1,173,559 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,455 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,505 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,269 UART: [fwproc] Recv command 0x49444352
1,282,781 UART: ROM Fatal Error: 0x0102000A
1,283,942 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,618 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,832 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,703 UART: [kat] HMAC-384Kdf
921,549 UART: [kat] LMS
1,169,861 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,238 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,998 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,282,948 UART: [fwproc] Recv command 0x49444352
1,284,732 UART: ROM Fatal Error: 0x0102000A
1,285,893 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,323 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,799 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,823 UART: [kat] ++
894,975 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,276 UART: [kat] HMAC-384Kdf
919,786 UART: [kat] LMS
1,168,098 UART: [kat] --
1,168,989 UART: [cold-reset] ++
1,169,413 UART: [fht] FHT @ 0x50003400
1,172,133 UART: [idev] ++
1,172,301 UART: [idev] CDI.KEYID = 6
1,172,662 UART: [idev] SUBJECT.KEYID = 7
1,173,087 UART: [idev] UDS.KEYID = 0
1,173,433 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,180,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,035 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,402 UART: [ldev] Erasing FE.KEYID = 1
1,240,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,246 UART: [ldev] --
1,279,758 UART: [fwproc] Wait for Commands...
1,280,365 UART: [fwproc] Recv command 0x49444352
1,281,917 UART: ROM Fatal Error: 0x0102000A
1,283,078 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,292 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,342 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,823 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,175,020 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,199 UART: [ldev] ++
1,209,367 UART: [ldev] CDI.KEYID = 6
1,209,731 UART: [ldev] SUBJECT.KEYID = 5
1,210,158 UART: [ldev] AUTHORITY.KEYID = 7
1,210,621 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,913 UART: [fwproc] Wait for Commands...
1,283,566 UART: [fwproc] Recv command 0x49444352
1,285,210 UART: ROM Fatal Error: 0x0102000A
1,286,371 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,577 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,189 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,174,497 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,115 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,354 UART: [ldev] Erasing FE.KEYID = 1
1,241,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x49444352
1,283,063 UART: ROM Fatal Error: 0x0102000A
1,284,224 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,134 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,974 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,585 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x49444352
1,283,804 UART: ROM Fatal Error: 0x0102000A
1,284,965 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,091 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,917 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,068 UART:
192,463 UART: Running Caliptra ROM ...
193,671 UART:
193,828 UART: [state] CFI Enabled
268,224 UART: [state] LifecycleState = Unprovisioned
270,228 UART: [state] DebugLocked = No
272,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,847 UART: [kat] SHA2-256
447,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,062 UART: [kat] ++
458,556 UART: [kat] sha1
469,433 UART: [kat] SHA2-256
472,153 UART: [kat] SHA2-384
477,084 UART: [kat] SHA2-512-ACC
479,454 UART: [kat] ECC-384
2,768,202 UART: [kat] HMAC-384Kdf
2,781,576 UART: [kat] LMS
3,971,855 UART: [kat] --
3,977,002 UART: [cold-reset] ++
3,978,811 UART: [fht] Storing FHT @ 0x50003400
3,990,365 UART: [idev] ++
3,990,933 UART: [idev] CDI.KEYID = 6
3,991,965 UART: [idev] SUBJECT.KEYID = 7
3,993,136 UART: [idev] UDS.KEYID = 0
3,994,094 ready_for_fw is high
3,994,282 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,814 UART: [idev] Erasing UDS.KEYID = 0
7,329,093 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,687 UART: [idev] --
7,354,195 UART: [ldev] ++
7,354,761 UART: [ldev] CDI.KEYID = 6
7,355,732 UART: [ldev] SUBJECT.KEYID = 5
7,356,945 UART: [ldev] AUTHORITY.KEYID = 7
7,358,194 UART: [ldev] FE.KEYID = 1
7,403,451 UART: [ldev] Erasing FE.KEYID = 1
10,735,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,368 UART: [ldev] --
13,095,715 UART: [fwproc] Waiting for Commands...
13,098,018 UART: [fwproc] Received command 0x46574c44
13,100,216 UART: [fwproc] Received Image of size 114124 bytes
17,152,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,227,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,296,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,614,316 >>> mbox cmd response: success
17,618,798 UART: [afmc] ++
17,619,421 UART: [afmc] CDI.KEYID = 6
17,620,340 UART: [afmc] SUBJECT.KEYID = 7
17,621,558 UART: [afmc] AUTHORITY.KEYID = 5
20,991,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,335 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,593 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,019 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,863 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,290 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,458 UART: [afmc] --
23,358,025 UART: [cold-reset] --
23,361,076 UART: [state] Locking Datavault
23,366,057 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,810 UART: [state] Locking ICCM
23,369,237 UART: [exit] Launching FMC @ 0x40000130
23,377,644 UART:
23,377,938 UART: Running Caliptra FMC ...
23,378,973 UART:
23,379,124 UART: [state] CFI Enabled
23,447,028 UART: [fht] FMC Alias Private Key: 7
25,784,537 UART: [art] Extend RT PCRs Done
25,785,756 UART: [art] Lock RT PCRs Done
25,787,299 UART: [art] Populate DV Done
25,792,819 UART: [fht] FMC Alias Private Key: 7
25,794,302 UART: [art] Derive CDI
25,795,037 UART: [art] Store in in slot 0x4
25,855,216 UART: [art] Derive Key Pair
25,856,259 UART: [art] Store priv key in slot 0x5
29,148,726 UART: [art] Derive Key Pair - Done
29,161,612 UART: [art] Signing Cert with AUTHO
29,162,922 UART: RITY.KEYID = 7
31,450,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,974 UART: [art] PUB.X = 4B3CBDDC456095A97D6642D4BE1AC7BE13D944C9EED4BB5414037A779A6B25B382E3E491512F0202075718A9EB4C0442
31,459,236 UART: [art] PUB.Y = C2EFD456B2F7742D2D3344E17B501E4C82DCF71448E2CBC7E78F9C63CF9F59E830ADB992206CA802F9BEF9884F05DFAD
31,466,441 UART: [art] SIG.R = A9465DBDB685EF94225B2EF1DE2EAFE7D1E86206565F7F0D45A6CA4A17CD9C8A1D6DD1C61EA6C190B59A7BB3054C8FAD
31,473,847 UART: [art] SIG.S = 7191661F34DCAAD984A44F999FA79826E5674A9E5AA2B0D23205693F41EFAB9472332887CBDCBEEFB735DFAABCE6A8B7
32,778,848 UART: Caliptra RT
32,779,546 UART: [state] CFI Enabled
32,940,031 UART: [rt] RT listening for mailbox commands...
32,942,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,097,875 UART: [rt]cmd =0x41544d4e, len=14344
38,333,686 >>> mbox cmd response data (8 bytes)
38,334,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,365,015 UART: [rt]cmd =0x41545348, len=116
38,385,317 >>> mbox cmd response data (12 bytes)
40,516,973 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,662,140 UART:
40,662,507 UART: Running Caliptra ROM ...
40,663,560 UART:
40,663,713 UART: [state] CFI Enabled
40,725,149 UART: [state] LifecycleState = Unprovisioned
40,727,054 UART: [state] DebugLocked = No
40,729,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,734,769 UART: [kat] SHA2-256
40,904,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,914,947 UART: [kat] ++
40,915,454 UART: [kat] sha1
40,925,804 UART: [kat] SHA2-256
40,928,509 UART: [kat] SHA2-384
40,933,762 UART: [kat] SHA2-512-ACC
40,936,114 UART: [kat] ECC-384
43,228,226 UART: [kat] HMAC-384Kdf
43,240,137 UART: [kat] LMS
44,430,452 UART: [kat] --
44,434,951 UART: [update-reset] ++
48,569,508 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,573,127 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,955,396 >>> mbox cmd response: success
48,960,088 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,960,706 UART: [update-reset] Copying MAN_2 To MAN_1
48,978,357 UART: [update-reset Success] --
48,984,116 UART: [state] Locking Datavault
48,986,140 UART: [state] Locking PCR0, PCR1 and PCR31
48,987,846 UART: [state] Locking ICCM
48,989,516 UART: [exit] Launching FMC @ 0x40000130
48,997,915 UART:
48,998,152 UART: Running Caliptra FMC ...
48,999,252 UART:
48,999,409 UART: [state] CFI Enabled
49,095,848 UART: [art] Extend RT PCRs Done
49,097,042 UART: [art] Lock RT PCRs Done
49,098,400 UART: [art] Populate DV Done
49,103,877 UART: [fht] FMC Alias Private Key: 7
49,105,635 UART: [art] Derive CDI
49,106,452 UART: [art] Store in in slot 0x4
49,165,131 UART: [art] Derive Key Pair
49,166,177 UART: [art] Store priv key in slot 0x5
52,459,848 UART: [art] Derive Key Pair - Done
52,472,751 UART: [art] Signing Cert with AUTHO
52,474,059 UART: RITY.KEYID = 7
54,761,716 UART: [art] Erasing AUTHORITY.KEYID = 7
54,763,227 UART: [art] PUB.X = E8B3CE0518BF6DB8FCF52AF47753DF57CBF1D1694AA144CC24534FBB9E0F47F41830A945CFF768E51EBE100635E7D4A7
54,770,446 UART: [art] PUB.Y = D53F5285B851FE0FCB1DABF20C33844503BC3C0D5BC814DBDAD438C41AF7EF8F25FDC0936472585A5EC93150245E6EC2
54,777,744 UART: [art] SIG.R = DEC0990A75171D764D99208F4B3893E895D33E8D05DC04B50B160E891ADD7760230B24078E8E1A3CEB14B38384AF0E1F
54,785,097 UART: [art] SIG.S = 932D93F20EBD88699CEA8851D2CD151D1435E7DFB1AD1A8D3AF6EE4C027C9C895B05414C627D1BE7D2BB20D18CC3097E
56,090,302 UART: Caliptra RT
56,091,004 UART: [state] CFI Enabled
56,420,580 UART: [rt] RT listening for mailbox commands...
56,452,610 UART: [rt]cmd =0x41545348, len=116
56,472,787 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,806,751 ready_for_fw is high
3,807,121 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,019 >>> mbox cmd response: success
23,568,021 UART:
23,568,439 UART: Running Caliptra FMC ...
23,569,562 UART:
23,569,736 UART: [state] CFI Enabled
23,639,634 UART: [fht] FMC Alias Private Key: 7
25,977,288 UART: [art] Extend RT PCRs Done
25,978,517 UART: [art] Lock RT PCRs Done
25,980,283 UART: [art] Populate DV Done
25,985,650 UART: [fht] FMC Alias Private Key: 7
25,987,130 UART: [art] Derive CDI
25,987,871 UART: [art] Store in in slot 0x4
26,048,690 UART: [art] Derive Key Pair
26,049,691 UART: [art] Store priv key in slot 0x5
29,342,731 UART: [art] Derive Key Pair - Done
29,355,782 UART: [art] Signing Cert with AUTHO
29,357,117 UART: RITY.KEYID = 7
31,644,010 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,522 UART: [art] PUB.X = 0DF290B431D5F7EE689762E02EABCD084BC8B43A38A53624BFE3BCFCEB187DFF49D5713E51CD5557C77231F4B46FFF26
31,652,781 UART: [art] PUB.Y = 9F82A2B6F9A3AD7B2D6F813320C7B7D7BBDB1AADF3C302393F6491EED213109436D5AFF3CD9B91EA92EE2A200A4BC567
31,660,060 UART: [art] SIG.R = 59AD24C05A6B2CE399D21FCC4219F870241592EEFEA725EE22067C72EB78C02C9A884DE2BB7A050DE35EEE09EBBAA9E2
31,667,455 UART: [art] SIG.S = FB868F5F797CE4E27D76F50444FFB145061AB36978E3AE0F3EC9CCE8FEDE246B6B6FD580C4D89DE4C1B7667CFABFBC5B
32,972,655 UART: Caliptra RT
32,973,364 UART: [state] CFI Enabled
33,135,087 UART: [rt] RT listening for mailbox commands...
33,137,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,292,902 UART: [rt]cmd =0x41544d4e, len=14344
38,528,596 >>> mbox cmd response data (8 bytes)
38,529,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,559,878 UART: [rt]cmd =0x41545348, len=116
38,579,140 >>> mbox cmd response data (12 bytes)
40,710,084 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,423,299 >>> mbox cmd response: success
49,423,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,457,974 UART:
49,458,317 UART: Running Caliptra FMC ...
49,459,359 UART:
49,459,515 UART: [state] CFI Enabled
49,548,322 UART: [art] Extend RT PCRs Done
49,549,521 UART: [art] Lock RT PCRs Done
49,550,816 UART: [art] Populate DV Done
49,556,064 UART: [fht] FMC Alias Private Key: 7
49,557,717 UART: [art] Derive CDI
49,558,534 UART: [art] Store in in slot 0x4
49,617,064 UART: [art] Derive Key Pair
49,618,112 UART: [art] Store priv key in slot 0x5
52,911,382 UART: [art] Derive Key Pair - Done
52,924,078 UART: [art] Signing Cert with AUTHO
52,925,390 UART: RITY.KEYID = 7
55,213,380 UART: [art] Erasing AUTHORITY.KEYID = 7
55,214,887 UART: [art] PUB.X = 2B0B006EC35B7027B5BA2053E034D68EAE9ED79A35FFF3ECC70712C2F7EC44C8B1D79E35E4AD8BD3803881853BCE6BAD
55,222,143 UART: [art] PUB.Y = 75AAA5037B372A05E38DBA3D446D4B6A15789520111A2F079BC15281A109E74511201A6285766479AD8224ADC66F2315
55,229,373 UART: [art] SIG.R = 75F0CF046AEEE2C9ECFB14FCD5EF7F9B3F02DF541E1506288490CE366160F6C5A7557DF12FFB56B7488C49C07BAC6B62
55,236,759 UART: [art] SIG.S = 83497E018F47C3B8F329576442944727404174E2C46F46BC8C74A622DA6629010871C7B8979C06E88F515DC9DF412EA3
56,542,151 UART: Caliptra RT
56,542,844 UART: [state] CFI Enabled
56,873,992 UART: [rt] RT listening for mailbox commands...
56,905,913 UART: [rt]cmd =0x41545348, len=116
56,925,992 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,519 UART:
192,883 UART: Running Caliptra ROM ...
194,096 UART:
603,829 UART: [state] CFI Enabled
621,042 UART: [state] LifecycleState = Unprovisioned
622,994 UART: [state] DebugLocked = No
624,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,534 UART: [kat] SHA2-256
798,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,839 UART: [kat] ++
809,280 UART: [kat] sha1
821,000 UART: [kat] SHA2-256
823,719 UART: [kat] SHA2-384
829,349 UART: [kat] SHA2-512-ACC
831,718 UART: [kat] ECC-384
3,113,641 UART: [kat] HMAC-384Kdf
3,124,909 UART: [kat] LMS
4,314,996 UART: [kat] --
4,319,248 UART: [cold-reset] ++
4,320,507 UART: [fht] Storing FHT @ 0x50003400
4,332,072 UART: [idev] ++
4,332,650 UART: [idev] CDI.KEYID = 6
4,333,555 UART: [idev] SUBJECT.KEYID = 7
4,334,816 UART: [idev] UDS.KEYID = 0
4,335,821 ready_for_fw is high
4,336,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,408 UART: [idev] Erasing UDS.KEYID = 0
7,617,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,188 UART: [idev] --
7,643,715 UART: [ldev] ++
7,644,276 UART: [ldev] CDI.KEYID = 6
7,645,211 UART: [ldev] SUBJECT.KEYID = 5
7,646,464 UART: [ldev] AUTHORITY.KEYID = 7
7,647,740 UART: [ldev] FE.KEYID = 1
7,657,706 UART: [ldev] Erasing FE.KEYID = 1
10,945,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,879 UART: [ldev] --
13,305,273 UART: [fwproc] Waiting for Commands...
13,307,201 UART: [fwproc] Received command 0x46574c44
13,309,427 UART: [fwproc] Received Image of size 114124 bytes
17,361,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,599 >>> mbox cmd response: success
17,826,964 UART: [afmc] ++
17,827,549 UART: [afmc] CDI.KEYID = 6
17,828,511 UART: [afmc] SUBJECT.KEYID = 7
17,829,718 UART: [afmc] AUTHORITY.KEYID = 5
21,146,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,112 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,480 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,307 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,720 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,049 UART: [afmc] --
23,512,072 UART: [cold-reset] --
23,514,903 UART: [state] Locking Datavault
23,520,582 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,353 UART: [state] Locking ICCM
23,523,582 UART: [exit] Launching FMC @ 0x40000130
23,531,976 UART:
23,532,203 UART: Running Caliptra FMC ...
23,533,299 UART:
23,533,459 UART: [state] CFI Enabled
23,541,747 UART: [fht] FMC Alias Private Key: 7
25,872,479 UART: [art] Extend RT PCRs Done
25,873,695 UART: [art] Lock RT PCRs Done
25,875,171 UART: [art] Populate DV Done
25,880,530 UART: [fht] FMC Alias Private Key: 7
25,882,119 UART: [art] Derive CDI
25,882,926 UART: [art] Store in in slot 0x4
25,925,197 UART: [art] Derive Key Pair
25,926,233 UART: [art] Store priv key in slot 0x5
29,168,717 UART: [art] Derive Key Pair - Done
29,181,789 UART: [art] Signing Cert with AUTHO
29,183,094 UART: RITY.KEYID = 7
31,462,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,449 UART: [art] PUB.X = F5F216749FEBBF35E53108C840A979D4DCB3E29F2005750744A8F46F782EC309D86E51518148C85BD3E0B4B2A103924F
31,471,690 UART: [art] PUB.Y = BC5C15234537D36281CB6F5B0DA3111F0CFFC4258483D1725F88C902533B8F0CFEE039AACF984335156FE65EADF4B0DC
31,478,908 UART: [art] SIG.R = 9F58DA6D4125BCF3F387BBFD152D0DE75716E316676E0B0AE2290911B8E40F50527A8B40F9F7E013526DBDE2D660E507
31,486,319 UART: [art] SIG.S = AEBD963B059CA86DFA3B8DE59774E92D3125C4CAECFF0A7F1CD9A36A749BC31B603D2C2BF29BDE53E5C270C42AE91C56
32,791,919 UART: Caliptra RT
32,792,606 UART: [state] CFI Enabled
32,909,969 UART: [rt] RT listening for mailbox commands...
32,912,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,067,752 UART: [rt]cmd =0x41544d4e, len=14344
38,303,876 >>> mbox cmd response data (8 bytes)
38,304,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,335,031 UART: [rt]cmd =0x41545348, len=116
38,354,772 >>> mbox cmd response data (12 bytes)
40,409,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,554,195 UART:
40,554,564 UART: Running Caliptra ROM ...
40,555,618 UART:
40,555,788 UART: [state] CFI Enabled
40,569,200 UART: [state] LifecycleState = Unprovisioned
40,571,112 UART: [state] DebugLocked = No
40,573,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,578,124 UART: [kat] SHA2-256
40,747,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,758,405 UART: [kat] ++
40,758,856 UART: [kat] sha1
40,768,980 UART: [kat] SHA2-256
40,771,665 UART: [kat] SHA2-384
40,776,996 UART: [kat] SHA2-512-ACC
40,779,390 UART: [kat] ECC-384
43,062,728 UART: [kat] HMAC-384Kdf
43,074,527 UART: [kat] LMS
44,264,617 UART: [kat] --
44,268,901 UART: [update-reset] ++
48,403,048 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,406,185 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,788,454 >>> mbox cmd response: success
48,793,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,793,715 UART: [update-reset] Copying MAN_2 To MAN_1
48,811,814 UART: [update-reset Success] --
48,815,496 UART: [state] Locking Datavault
48,818,319 UART: [state] Locking PCR0, PCR1 and PCR31
48,820,072 UART: [state] Locking ICCM
48,821,361 UART: [exit] Launching FMC @ 0x40000130
48,829,806 UART:
48,830,033 UART: Running Caliptra FMC ...
48,831,153 UART:
48,831,316 UART: [state] CFI Enabled
48,875,270 UART: [art] Extend RT PCRs Done
48,876,653 UART: [art] Lock RT PCRs Done
48,877,951 UART: [art] Populate DV Done
48,883,455 UART: [fht] FMC Alias Private Key: 7
48,884,989 UART: [art] Derive CDI
48,885,799 UART: [art] Store in in slot 0x4
48,928,381 UART: [art] Derive Key Pair
48,929,376 UART: [art] Store priv key in slot 0x5
52,171,301 UART: [art] Derive Key Pair - Done
52,184,104 UART: [art] Signing Cert with AUTHO
52,185,402 UART: RITY.KEYID = 7
54,464,768 UART: [art] Erasing AUTHORITY.KEYID = 7
54,466,278 UART: [art] PUB.X = F12D5A3DA8B702C43A722AC3E4B9A497DC6FE19C21AD98A3CD206CC6082D6A6BDC6B88983E4A157C16E8B0F0ACED7303
54,473,575 UART: [art] PUB.Y = B30729B5A00F3FA68E26692609D90B074EFB5DA44D142D0A6AA607E5103EC4D730B5522A79AF84B39DCA693205B7D434
54,480,857 UART: [art] SIG.R = 548D0577D9ED822CCCB3FCCD8D42C3285A4FC611CCC677298F83128892B92C033A711383909D34E5C04A36DDDC4CB39B
54,488,205 UART: [art] SIG.S = 9C18F2AFD731BBCC14BA71FCCED62906A352D10A14326A316EBBEF6182F342C0E4DF97FC1D525BC138903F30C50C3892
55,793,520 UART: Caliptra RT
55,794,206 UART: [state] CFI Enabled
56,082,111 UART: [rt] RT listening for mailbox commands...
56,113,825 UART: [rt]cmd =0x41545348, len=116
56,134,370 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,126,211 ready_for_fw is high
4,126,843 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,632 >>> mbox cmd response: success
23,720,937 UART:
23,721,357 UART: Running Caliptra FMC ...
23,722,467 UART:
23,722,630 UART: [state] CFI Enabled
23,730,941 UART: [fht] FMC Alias Private Key: 7
26,061,988 UART: [art] Extend RT PCRs Done
26,063,221 UART: [art] Lock RT PCRs Done
26,065,066 UART: [art] Populate DV Done
26,070,428 UART: [fht] FMC Alias Private Key: 7
26,072,080 UART: [art] Derive CDI
26,072,901 UART: [art] Store in in slot 0x4
26,115,765 UART: [art] Derive Key Pair
26,116,762 UART: [art] Store priv key in slot 0x5
29,358,844 UART: [art] Derive Key Pair - Done
29,371,597 UART: [art] Signing Cert with AUTHO
29,372,912 UART: RITY.KEYID = 7
31,652,326 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,831 UART: [art] PUB.X = 7C49EFC5C8220ED06B77BD8D78B8DEC1827A47D18B7F5D87F4C4DEA9A31058425F9D147903447B5D806945F3682ED593
31,661,131 UART: [art] PUB.Y = 06F4402983165645D2A0681578CB1D75A2151DDBB92A7D7F260EC84E6DEA016DEAF33E8938B10BC4FE8B2D4B0FDD80C8
31,668,325 UART: [art] SIG.R = 4B92306535C0B5C5BF390D4781B5DCB8F569BFAA5CE52A35A4D551B385C3BD38F77B33E159D93ED6E3EA149E64B1768D
31,675,708 UART: [art] SIG.S = 85E151EF871DD180189916680174AD852292A889D518D834D521B1868A2F185300C3B6A1CBB559B9A63FCF010917372C
32,980,856 UART: Caliptra RT
32,981,570 UART: [state] CFI Enabled
33,099,839 UART: [rt] RT listening for mailbox commands...
33,102,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,257,567 UART: [rt]cmd =0x41544d4e, len=14344
38,492,794 >>> mbox cmd response data (8 bytes)
38,493,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,524,171 UART: [rt]cmd =0x41545348, len=116
38,543,089 >>> mbox cmd response data (12 bytes)
40,597,104 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,254,604 >>> mbox cmd response: success
49,255,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,289,955 UART:
49,290,241 UART: Running Caliptra FMC ...
49,291,273 UART:
49,291,415 UART: [state] CFI Enabled
49,335,604 UART: [art] Extend RT PCRs Done
49,336,799 UART: [art] Lock RT PCRs Done
49,338,333 UART: [art] Populate DV Done
49,343,898 UART: [fht] FMC Alias Private Key: 7
49,345,402 UART: [art] Derive CDI
49,346,133 UART: [art] Store in in slot 0x4
49,388,778 UART: [art] Derive Key Pair
49,389,775 UART: [art] Store priv key in slot 0x5
52,632,019 UART: [art] Derive Key Pair - Done
52,645,296 UART: [art] Signing Cert with AUTHO
52,646,599 UART: RITY.KEYID = 7
54,926,171 UART: [art] Erasing AUTHORITY.KEYID = 7
54,927,680 UART: [art] PUB.X = AD5A9618411B594404B50293A448FFA2BF30833AA8DA5715F7D44806DB49FE2ADB1667901CD41CF20A6175E77F9A935F
54,934,936 UART: [art] PUB.Y = E2B883C3770A4AE1A5507502DBB09FEE67B87C37DAB0084B4227CB5BA0369170907BA3A0835BEE6F1F3587B5D2EAFA1A
54,942,161 UART: [art] SIG.R = 2BC61B58FCA99D5A4062FCD015CAD8D07BF9BD4CF0C73E239BDB131F64D4D16960721F317389A38E20EFC18778503126
54,949,546 UART: [art] SIG.S = B1EA18638A7C7CBD2C327F136842A567734684E73EEED333651510678F6DC08E46FD3DF09FDDD4728622227DD9DCBDB1
56,254,454 UART: Caliptra RT
56,255,157 UART: [state] CFI Enabled
56,544,224 UART: [rt] RT listening for mailbox commands...
56,575,965 UART: [rt]cmd =0x41545348, len=116
56,596,427 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,088 UART:
192,466 UART: Running Caliptra ROM ...
193,572 UART:
193,715 UART: [state] CFI Enabled
265,289 UART: [state] LifecycleState = Unprovisioned
267,148 UART: [state] DebugLocked = No
269,586 UART: [state] WD Timer not started. Device not locked for debugging
272,744 UART: [kat] SHA2-256
451,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,416 UART: [kat] ++
463,885 UART: [kat] sha1
475,330 UART: [kat] SHA2-256
478,404 UART: [kat] SHA2-384
485,098 UART: [kat] SHA2-512-ACC
488,111 UART: [kat] ECC-384
2,948,441 UART: [kat] HMAC-384Kdf
2,970,264 UART: [kat] LMS
3,499,711 UART: [kat] --
3,503,421 UART: [cold-reset] ++
3,505,487 UART: [fht] FHT @ 0x50003400
3,516,745 UART: [idev] ++
3,517,310 UART: [idev] CDI.KEYID = 6
3,518,262 UART: [idev] SUBJECT.KEYID = 7
3,519,430 UART: [idev] UDS.KEYID = 0
3,520,433 ready_for_fw is high
3,520,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,550 UART: [idev] Erasing UDS.KEYID = 0
6,023,855 UART: [idev] Sha1 KeyId Algorithm
6,047,179 UART: [idev] --
6,051,522 UART: [ldev] ++
6,052,097 UART: [ldev] CDI.KEYID = 6
6,053,010 UART: [ldev] SUBJECT.KEYID = 5
6,054,172 UART: [ldev] AUTHORITY.KEYID = 7
6,055,405 UART: [ldev] FE.KEYID = 1
6,101,355 UART: [ldev] Erasing FE.KEYID = 1
8,603,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,234 UART: [ldev] --
10,414,146 UART: [fwproc] Wait for Commands...
10,416,043 UART: [fwproc] Recv command 0x46574c44
10,418,145 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,987 >>> mbox cmd response: success
14,281,299 UART: [afmc] ++
14,281,896 UART: [afmc] CDI.KEYID = 6
14,282,806 UART: [afmc] SUBJECT.KEYID = 7
14,283,968 UART: [afmc] AUTHORITY.KEYID = 5
16,824,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,350 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,191 UART: [afmc] --
18,628,332 UART: [cold-reset] --
18,632,135 UART: [state] Locking Datavault
18,637,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,922 UART: [state] Locking ICCM
18,640,748 UART: [exit] Launching FMC @ 0x40000130
18,649,200 UART:
18,649,433 UART: Running Caliptra FMC ...
18,650,532 UART:
18,650,693 UART: [state] CFI Enabled
18,707,983 UART: [fht] FMC Alias Private Key: 7
20,472,642 UART: [art] Extend RT PCRs Done
20,473,860 UART: [art] Lock RT PCRs Done
20,475,754 UART: [art] Populate DV Done
20,480,797 UART: [fht] FMC Alias Private Key: 7
20,482,549 UART: [art] Derive CDI
20,483,383 UART: [art] Store in in slot 0x4
20,541,814 UART: [art] Derive Key Pair
20,542,856 UART: [art] Store priv key in slot 0x5
23,005,316 UART: [art] Derive Key Pair - Done
23,018,589 UART: [art] Signing Cert with AUTHO
23,019,895 UART: RITY.KEYID = 7
24,731,759 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,261 UART: [art] PUB.X = A28AEF9529C3D54E93444FB85A2DD0D32C47E61918FB228E974EE41EBE822C6D54ACC7FB9DA26E752D9690216CB7C406
24,740,503 UART: [art] PUB.Y = 28C082847718DBA4B3E5EC743D9D6429AC9BD587BA5BACABF6A61639C180769C96F8A2384D7501C9AB727CE65DD4A822
24,747,785 UART: [art] SIG.R = FDF30D3FE384FC7A9C962DCC0FDB87B4B58495E02D1F571367A4603792499F3E77EAA4BF7B687AA77AEE85399F8A4417
24,755,230 UART: [art] SIG.S = 447365FA77A7ED833C4AF26A1430001CA100AA5F09CD9B94B8C41D73BCD262038A7013455571BBC80155FAE1FC945532
25,734,706 UART: Caliptra RT
25,735,413 UART: [state] CFI Enabled
25,901,088 UART: [rt] RT listening for mailbox commands...
25,903,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,873 UART: [rt]cmd =0x41544d4e, len=14344
29,990,939 >>> mbox cmd response data (8 bytes)
29,991,519 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,022,356 UART: [rt]cmd =0x41545348, len=116
30,041,726 >>> mbox cmd response data (12 bytes)
32,097,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,242,749 UART:
32,243,137 UART: Running Caliptra ROM ...
32,244,185 UART:
32,244,346 UART: [state] CFI Enabled
32,302,447 UART: [state] LifecycleState = Unprovisioned
32,304,339 UART: [state] DebugLocked = No
32,307,031 UART: [state] WD Timer not started. Device not locked for debugging
32,311,242 UART: [kat] SHA2-256
32,490,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,501,944 UART: [kat] ++
32,502,481 UART: [kat] sha1
32,513,915 UART: [kat] SHA2-256
32,516,920 UART: [kat] SHA2-384
32,523,129 UART: [kat] SHA2-512-ACC
32,526,073 UART: [kat] ECC-384
34,986,736 UART: [kat] HMAC-384Kdf
35,010,398 UART: [kat] LMS
35,539,839 UART: [kat] --
35,543,079 UART: [update-reset] ++
38,976,913 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,981,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,364,466 >>> mbox cmd response: success
39,364,904 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,365,369 UART: [update-reset] Copying MAN_2 To MAN_1
39,387,430 UART: [update-reset Success] --
39,390,750 UART: [state] Locking Datavault
39,394,044 UART: [state] Locking PCR0, PCR1 and PCR31
39,395,701 UART: [state] Locking ICCM
39,398,292 UART: [exit] Launching FMC @ 0x40000130
39,406,744 UART:
39,406,979 UART: Running Caliptra FMC ...
39,408,078 UART:
39,408,242 UART: [state] CFI Enabled
39,502,317 UART: [art] Extend RT PCRs Done
39,503,496 UART: [art] Lock RT PCRs Done
39,505,271 UART: [art] Populate DV Done
39,510,624 UART: [fht] FMC Alias Private Key: 7
39,512,262 UART: [art] Derive CDI
39,513,071 UART: [art] Store in in slot 0x4
39,571,344 UART: [art] Derive Key Pair
39,572,449 UART: [art] Store priv key in slot 0x5
42,034,820 UART: [art] Derive Key Pair - Done
42,047,834 UART: [art] Signing Cert with AUTHO
42,049,133 UART: RITY.KEYID = 7
43,761,005 UART: [art] Erasing AUTHORITY.KEYID = 7
43,762,521 UART: [art] PUB.X = B623B52FB28984ADAB47C9CFC118CB34AA7A967A609BC06B73A6941B0F42A1005098F10ADF30848CA7AB477943F24C0D
43,769,772 UART: [art] PUB.Y = DEAECC8079B8F6B946CB3C37FDE5F2550AB70CD5640727775802CB639740BC571DFE94D0D383578D9F07F54DB3DA419F
43,776,999 UART: [art] SIG.R = 52F202B27202BAAFA88176A4FC87243C95446DDEC3BEE2594879EFF19457AF41A1F064AF2CA0CE9299C74228548A74CD
43,784,390 UART: [art] SIG.S = 92A18A62E8A3762757AEFB48733C4CD7B74CC532CAC3D996A2DF5704F6B25798032DFB251E48ACB1BDB1E43DC362C913
44,763,330 UART: Caliptra RT
44,764,032 UART: [state] CFI Enabled
45,100,030 UART: [rt] RT listening for mailbox commands...
45,131,674 UART: [rt]cmd =0x41545348, len=116
45,152,162 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,384,184 ready_for_fw is high
3,384,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,972 >>> mbox cmd response: success
18,368,897 UART:
18,369,296 UART: Running Caliptra FMC ...
18,370,400 UART:
18,370,551 UART: [state] CFI Enabled
18,433,636 UART: [fht] FMC Alias Private Key: 7
20,196,704 UART: [art] Extend RT PCRs Done
20,197,919 UART: [art] Lock RT PCRs Done
20,199,625 UART: [art] Populate DV Done
20,204,864 UART: [fht] FMC Alias Private Key: 7
20,206,537 UART: [art] Derive CDI
20,207,279 UART: [art] Store in in slot 0x4
20,266,649 UART: [art] Derive Key Pair
20,267,689 UART: [art] Store priv key in slot 0x5
22,730,903 UART: [art] Derive Key Pair - Done
22,743,974 UART: [art] Signing Cert with AUTHO
22,745,280 UART: RITY.KEYID = 7
24,455,918 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,419 UART: [art] PUB.X = 06C610645DDDBBF5F16787116CD9F361F5951A04CF04233394F9F4A8EB47458117F3161549FB508A77B592413417402D
24,464,685 UART: [art] PUB.Y = BC03994D015316129D15B574DC0FC633A6F96243C720DD96247D54F368E01EA15BD1E4BC772091F7B4DCA9683C312D55
24,471,943 UART: [art] SIG.R = 2324EDD0B544FE9FAB91C43044DABDBA8B2D51777513E2EFA8E6EFF91C897EE4B5E704973A7340F92CC8D34C3ECF7CCC
24,479,352 UART: [art] SIG.S = 3407BC0ADE1279CC228BDDC218B28827BCF01A9EE84F1593951575C1D81FD420CAA786CFAE4F700E46234A1234320546
25,458,288 UART: Caliptra RT
25,458,988 UART: [state] CFI Enabled
25,623,348 UART: [rt] RT listening for mailbox commands...
25,625,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,782,013 UART: [rt]cmd =0x41544d4e, len=14344
29,712,669 >>> mbox cmd response data (8 bytes)
29,713,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,744,149 UART: [rt]cmd =0x41545348, len=116
29,764,009 >>> mbox cmd response data (12 bytes)
31,818,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,946,249 >>> mbox cmd response: success
38,946,813 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,980,371 UART:
38,980,700 UART: Running Caliptra FMC ...
38,981,828 UART:
38,981,992 UART: [state] CFI Enabled
39,072,066 UART: [art] Extend RT PCRs Done
39,073,257 UART: [art] Lock RT PCRs Done
39,074,718 UART: [art] Populate DV Done
39,080,292 UART: [fht] FMC Alias Private Key: 7
39,081,944 UART: [art] Derive CDI
39,082,764 UART: [art] Store in in slot 0x4
39,141,411 UART: [art] Derive Key Pair
39,142,449 UART: [art] Store priv key in slot 0x5
41,604,865 UART: [art] Derive Key Pair - Done
41,617,222 UART: [art] Signing Cert with AUTHO
41,618,530 UART: RITY.KEYID = 7
43,331,259 UART: [art] Erasing AUTHORITY.KEYID = 7
43,332,759 UART: [art] PUB.X = 3B74899892E4C7C487398924B3AFE1B9249672D4DA35019ABA7957BD7ADC4BD331AE0531E6B6D648037699A30A2D2775
43,340,025 UART: [art] PUB.Y = 3267CC3832D21A495F7441AB64162D9E2A57CCE2672511A7343E7FC9EB2ECD587CA5FCD6EBB5D3559EB91C2ADA1CE9B7
43,347,324 UART: [art] SIG.R = 0EB31F1BF2B7C965FE348C380E6B41085C4DED9168C9C9A223F7E97CE3D72B1ECD6677F9B2A499CE2E74E62E5D0F75C3
43,354,767 UART: [art] SIG.S = 5D2C6572A4A60B6099521C951D5A58A63FC83609ED5FCD19B647C5F44B562CCAC5E7309CFDCEA0417FB72F8F02332FE3
44,333,583 UART: Caliptra RT
44,334,277 UART: [state] CFI Enabled
44,669,647 UART: [rt] RT listening for mailbox commands...
44,701,766 UART: [rt]cmd =0x41545348, len=116
44,722,315 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,490 UART:
192,854 UART: Running Caliptra ROM ...
193,943 UART:
603,450 UART: [state] CFI Enabled
618,485 UART: [state] LifecycleState = Unprovisioned
620,315 UART: [state] DebugLocked = No
621,644 UART: [state] WD Timer not started. Device not locked for debugging
625,663 UART: [kat] SHA2-256
804,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,358 UART: [kat] ++
816,803 UART: [kat] sha1
827,101 UART: [kat] SHA2-256
830,099 UART: [kat] SHA2-384
835,799 UART: [kat] SHA2-512-ACC
838,736 UART: [kat] ECC-384
3,281,003 UART: [kat] HMAC-384Kdf
3,293,522 UART: [kat] LMS
3,823,007 UART: [kat] --
3,827,444 UART: [cold-reset] ++
3,829,722 UART: [fht] FHT @ 0x50003400
3,840,832 UART: [idev] ++
3,841,398 UART: [idev] CDI.KEYID = 6
3,842,316 UART: [idev] SUBJECT.KEYID = 7
3,843,554 UART: [idev] UDS.KEYID = 0
3,844,476 ready_for_fw is high
3,844,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,384 UART: [idev] Erasing UDS.KEYID = 0
6,319,481 UART: [idev] Sha1 KeyId Algorithm
6,342,755 UART: [idev] --
6,345,345 UART: [ldev] ++
6,345,910 UART: [ldev] CDI.KEYID = 6
6,346,864 UART: [ldev] SUBJECT.KEYID = 5
6,348,013 UART: [ldev] AUTHORITY.KEYID = 7
6,349,293 UART: [ldev] FE.KEYID = 1
6,358,623 UART: [ldev] Erasing FE.KEYID = 1
8,834,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,622 UART: [ldev] --
10,625,459 UART: [fwproc] Wait for Commands...
10,628,577 UART: [fwproc] Recv command 0x46574c44
10,630,669 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,562 >>> mbox cmd response: success
14,496,771 UART: [afmc] ++
14,497,366 UART: [afmc] CDI.KEYID = 6
14,498,277 UART: [afmc] SUBJECT.KEYID = 7
14,499,432 UART: [afmc] AUTHORITY.KEYID = 5
17,002,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,049 UART: [afmc] --
18,804,398 UART: [cold-reset] --
18,807,443 UART: [state] Locking Datavault
18,815,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,708 UART: [state] Locking ICCM
18,818,581 UART: [exit] Launching FMC @ 0x40000130
18,826,970 UART:
18,827,198 UART: Running Caliptra FMC ...
18,828,293 UART:
18,828,444 UART: [state] CFI Enabled
18,836,696 UART: [fht] FMC Alias Private Key: 7
20,593,736 UART: [art] Extend RT PCRs Done
20,594,970 UART: [art] Lock RT PCRs Done
20,596,652 UART: [art] Populate DV Done
20,602,002 UART: [fht] FMC Alias Private Key: 7
20,603,483 UART: [art] Derive CDI
20,604,237 UART: [art] Store in in slot 0x4
20,646,772 UART: [art] Derive Key Pair
20,647,801 UART: [art] Store priv key in slot 0x5
23,074,394 UART: [art] Derive Key Pair - Done
23,087,553 UART: [art] Signing Cert with AUTHO
23,088,857 UART: RITY.KEYID = 7
24,794,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,999 UART: [art] PUB.X = D3A8A65576F141832490F006D32CB25F0D0C8F76AA0C65AF40948D1BAE13A1B8CECAAD47D5E5A8A2160CBDA514E6CBF2
24,803,281 UART: [art] PUB.Y = F7E1179367E7E5739517CDB7CF49465C77256EAC9738C3455B58B05731F6D1905A4A605899896A349A2E38176724C58E
24,810,496 UART: [art] SIG.R = 7B282342D59767F9774255579A8A540F289847DD70CE7083A3E92F2A8D924E075806FAE5098156EDFDCD4CDFB6A63077
24,817,869 UART: [art] SIG.S = 7B24D6C020F9DD66F160FCECC451CBCC369CAAA72B4411A2110F323903541195560CC7A4043D57FE64032C8A07A0ACC4
25,796,776 UART: Caliptra RT
25,797,493 UART: [state] CFI Enabled
25,914,308 UART: [rt] RT listening for mailbox commands...
25,916,688 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,072,031 UART: [rt]cmd =0x41544d4e, len=14344
30,002,851 >>> mbox cmd response data (8 bytes)
30,003,419 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,034,091 UART: [rt]cmd =0x41545348, len=116
30,054,073 >>> mbox cmd response data (12 bytes)
32,107,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,253,847 UART:
32,254,242 UART: Running Caliptra ROM ...
32,255,283 UART:
32,255,461 UART: [state] CFI Enabled
32,269,649 UART: [state] LifecycleState = Unprovisioned
32,271,488 UART: [state] DebugLocked = No
32,274,134 UART: [state] WD Timer not started. Device not locked for debugging
32,277,813 UART: [kat] SHA2-256
32,457,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,468,571 UART: [kat] ++
32,469,020 UART: [kat] sha1
32,481,194 UART: [kat] SHA2-256
32,484,209 UART: [kat] SHA2-384
32,490,837 UART: [kat] SHA2-512-ACC
32,493,822 UART: [kat] ECC-384
34,934,365 UART: [kat] HMAC-384Kdf
34,948,379 UART: [kat] LMS
35,477,894 UART: [kat] --
35,480,258 UART: [update-reset] ++
38,904,427 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,907,698 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,291,033 >>> mbox cmd response: success
39,291,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,292,896 UART: [update-reset] Copying MAN_2 To MAN_1
39,315,278 UART: [update-reset Success] --
39,318,959 UART: [state] Locking Datavault
39,322,531 UART: [state] Locking PCR0, PCR1 and PCR31
39,324,226 UART: [state] Locking ICCM
39,325,748 UART: [exit] Launching FMC @ 0x40000130
39,334,205 UART:
39,334,481 UART: Running Caliptra FMC ...
39,335,503 UART:
39,335,642 UART: [state] CFI Enabled
39,380,024 UART: [art] Extend RT PCRs Done
39,381,162 UART: [art] Lock RT PCRs Done
39,382,701 UART: [art] Populate DV Done
39,388,047 UART: [fht] FMC Alias Private Key: 7
39,389,737 UART: [art] Derive CDI
39,390,465 UART: [art] Store in in slot 0x4
39,432,923 UART: [art] Derive Key Pair
39,434,021 UART: [art] Store priv key in slot 0x5
41,860,593 UART: [art] Derive Key Pair - Done
41,873,750 UART: [art] Signing Cert with AUTHO
41,875,046 UART: RITY.KEYID = 7
43,580,667 UART: [art] Erasing AUTHORITY.KEYID = 7
43,582,191 UART: [art] PUB.X = 51ED4653101FA543295B0C5C489C7E014137A90628B4F697F58231949BCFD3F3A508E750FA48A3505CA729E7B8BE6AE7
43,589,440 UART: [art] PUB.Y = 7839E6BF57A1153456EAE75AE17AE1AD640D3745BE3D3C0FD31E997380A2888186EADA326171A649EDDD08C10761DC3A
43,596,655 UART: [art] SIG.R = 21116789FCE6A1FA3C7101AA293F04724E8C54A13BA4D5EFA12082546D53FC9983D6344B73D6570172F6272A0B8F13B3
43,604,034 UART: [art] SIG.S = 3B9903DAFB35CF8D9A9C9F61F1988E94C4406416C21E551B1B1727E1323E27A62AADEB2ADBB6A5C44FCAE7633D3151AE
44,583,599 UART: Caliptra RT
44,584,290 UART: [state] CFI Enabled
44,872,581 UART: [rt] RT listening for mailbox commands...
44,904,343 UART: [rt]cmd =0x41545348, len=116
44,924,246 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,695,950 ready_for_fw is high
3,696,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,770 >>> mbox cmd response: success
18,517,490 UART:
18,517,908 UART: Running Caliptra FMC ...
18,519,121 UART:
18,519,289 UART: [state] CFI Enabled
18,527,403 UART: [fht] FMC Alias Private Key: 7
20,284,416 UART: [art] Extend RT PCRs Done
20,285,653 UART: [art] Lock RT PCRs Done
20,287,227 UART: [art] Populate DV Done
20,292,679 UART: [fht] FMC Alias Private Key: 7
20,294,277 UART: [art] Derive CDI
20,295,090 UART: [art] Store in in slot 0x4
20,338,133 UART: [art] Derive Key Pair
20,339,174 UART: [art] Store priv key in slot 0x5
22,766,136 UART: [art] Derive Key Pair - Done
22,779,029 UART: [art] Signing Cert with AUTHO
22,780,326 UART: RITY.KEYID = 7
24,485,303 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,806 UART: [art] PUB.X = 11C21F8804191F83D450F6D73A8562897EC86A17BF46C4EC2ED3413AE37A17D19E711ED2472A6B20F54623AA4D3872F8
24,494,106 UART: [art] PUB.Y = 5B853867F75525F0B344B6FC4AEB59EA92BA83521C2D6891F16BB0C032B3DC7BB6A2DD4C5505A5EE0B9BABF512DB48E3
24,501,353 UART: [art] SIG.R = 621B11354504DF675D87A8C48B9B4DC0E9A6AB778F100CDA34366008CBFCE7D6B6C5515C66BA5D6F4F6BB0CA081D42FB
24,508,792 UART: [art] SIG.S = C022025CA70AEBBFC5288400D54C952DF9BFB7261098E3E020D110F1F4B95D52C6CA564CFA8A9B8D76685A9D93D1AEF6
25,487,781 UART: Caliptra RT
25,488,493 UART: [state] CFI Enabled
25,605,522 UART: [rt] RT listening for mailbox commands...
25,607,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,763,038 UART: [rt]cmd =0x41544d4e, len=14344
29,693,872 >>> mbox cmd response data (8 bytes)
29,694,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,724,893 UART: [rt]cmd =0x41545348, len=116
29,744,966 >>> mbox cmd response data (12 bytes)
31,800,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,844,372 >>> mbox cmd response: success
38,844,980 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,878,860 UART:
38,879,186 UART: Running Caliptra FMC ...
38,880,309 UART:
38,880,464 UART: [state] CFI Enabled
38,924,499 UART: [art] Extend RT PCRs Done
38,925,645 UART: [art] Lock RT PCRs Done
38,927,196 UART: [art] Populate DV Done
38,932,539 UART: [fht] FMC Alias Private Key: 7
38,934,120 UART: [art] Derive CDI
38,934,934 UART: [art] Store in in slot 0x4
38,977,841 UART: [art] Derive Key Pair
38,978,872 UART: [art] Store priv key in slot 0x5
41,405,217 UART: [art] Derive Key Pair - Done
41,418,193 UART: [art] Signing Cert with AUTHO
41,419,498 UART: RITY.KEYID = 7
43,125,353 UART: [art] Erasing AUTHORITY.KEYID = 7
43,126,874 UART: [art] PUB.X = 55ABA19EF5DFC0E71B86F7056CE570B729EDA691763E881173F65B0CDAB98FCBDB294EB3A34DF18E21CD790D48106FBC
43,134,180 UART: [art] PUB.Y = 1327EA4E2DE78520F8FBEDB54EB93EC405FA5DB01B5670EBBF94905AC48689AB4476D476106D89AE8C9A65B762396663
43,141,407 UART: [art] SIG.R = 4B7626E22EE5886E32312BB0127991151FD2DBE8EB0FEFC4613CBE683B9A4D8BADF15D792512511C6CA507A8E91EE445
43,148,788 UART: [art] SIG.S = FB5E1694D4103B31586F997362BFA617EF2241115415C22E3E308BB8FB8923B08D896CDF08EE561DC6DEC3C599C4B22A
44,127,438 UART: Caliptra RT
44,128,149 UART: [state] CFI Enabled
44,412,967 UART: [rt] RT listening for mailbox commands...
44,444,813 UART: [rt]cmd =0x41545348, len=116
44,464,433 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,193 UART:
192,543 UART: Running Caliptra ROM ...
193,765 UART:
193,916 UART: [state] CFI Enabled
264,515 UART: [state] LifecycleState = Unprovisioned
266,913 UART: [state] DebugLocked = No
268,367 UART: [state] WD Timer not started. Device not locked for debugging
272,887 UART: [kat] SHA2-256
462,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,532 UART: [kat] ++
473,985 UART: [kat] sha1
485,922 UART: [kat] SHA2-256
488,928 UART: [kat] SHA2-384
494,562 UART: [kat] SHA2-512-ACC
497,142 UART: [kat] ECC-384
2,946,328 UART: [kat] HMAC-384Kdf
2,971,669 UART: [kat] LMS
3,503,431 UART: [kat] --
3,507,728 UART: [cold-reset] ++
3,509,663 UART: [fht] FHT @ 0x50003400
3,521,504 UART: [idev] ++
3,522,179 UART: [idev] CDI.KEYID = 6
3,523,171 UART: [idev] SUBJECT.KEYID = 7
3,524,343 UART: [idev] UDS.KEYID = 0
3,525,270 ready_for_fw is high
3,525,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,328 UART: [idev] Erasing UDS.KEYID = 0
6,029,588 UART: [idev] Sha1 KeyId Algorithm
6,051,315 UART: [idev] --
6,057,094 UART: [ldev] ++
6,057,775 UART: [ldev] CDI.KEYID = 6
6,058,689 UART: [ldev] SUBJECT.KEYID = 5
6,059,905 UART: [ldev] AUTHORITY.KEYID = 7
6,061,080 UART: [ldev] FE.KEYID = 1
6,099,352 UART: [ldev] Erasing FE.KEYID = 1
8,608,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,564 UART: [ldev] --
10,414,331 UART: [fwproc] Wait for Commands...
10,416,802 UART: [fwproc] Recv command 0x46574c44
10,419,104 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,602,678 >>> mbox cmd response: success
14,607,026 UART: [afmc] ++
14,607,733 UART: [afmc] CDI.KEYID = 6
14,608,938 UART: [afmc] SUBJECT.KEYID = 7
14,610,373 UART: [afmc] AUTHORITY.KEYID = 5
17,147,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,458 UART: [afmc] --
18,948,891 UART: [cold-reset] --
18,953,523 UART: [state] Locking Datavault
18,959,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,185 UART: [state] Locking ICCM
18,963,660 UART: [exit] Launching FMC @ 0x40000130
18,972,336 UART:
18,972,570 UART: Running Caliptra FMC ...
18,973,688 UART:
18,973,848 UART: [state] CFI Enabled
19,029,834 UART: [fht] FMC Alias Private Key: 7
20,792,994 UART: [art] Extend RT PCRs Done
20,794,208 UART: [art] Lock RT PCRs Done
20,795,747 UART: [art] Populate DV Done
20,801,124 UART: [fht] FMC Alias Private Key: 7
20,802,772 UART: [art] Derive CDI
20,803,587 UART: [art] Store in in slot 0x4
20,862,361 UART: [art] Derive Key Pair
20,863,353 UART: [art] Store priv key in slot 0x5
23,326,513 UART: [art] Derive Key Pair - Done
23,339,022 UART: [art] Signing Cert with AUTHO
23,340,329 UART: RITY.KEYID = 7
25,052,482 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,983 UART: [art] PUB.X = 8E740F1804CB1FB25914D433CE8972FBBD8DBE9BF0B1546444FB41099B71707E23511AE7470D6BED33D250118CF7396D
25,061,294 UART: [art] PUB.Y = 3AF4F63D41E03BABEF68495F70EED837180197386DA27CF4DB28BD3C14147589710E4A37916979C272675EC1F93A12C1
25,068,530 UART: [art] SIG.R = ED822AA4DF7C7DA011132A4F5E70DF8FE8841A490161CE56B62EBD0A7F704977F7F7DFC5BD2DED8A0E702146D639CD85
25,075,916 UART: [art] SIG.S = 73B22E8FF433844EC99344CD1977EEFF29D551EA69E2F460C36E38C45D33F7CDE65FCD7DA783CFF8384C5B2A7CD3ED3A
26,055,414 UART: Caliptra RT
26,056,118 UART: [state] CFI Enabled
26,220,689 UART: [rt] RT listening for mailbox commands...
26,223,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,379,628 UART: [rt]cmd =0x41544d4e, len=14344
30,310,594 >>> mbox cmd response data (8 bytes)
30,311,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,341,785 UART: [rt]cmd =0x41545348, len=116
30,362,169 >>> mbox cmd response data (12 bytes)
32,417,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,563,046 UART:
32,563,419 UART: Running Caliptra ROM ...
32,564,549 UART:
32,564,716 UART: [state] CFI Enabled
32,622,894 UART: [state] LifecycleState = Unprovisioned
32,624,911 UART: [state] DebugLocked = No
32,626,506 UART: [state] WD Timer not started. Device not locked for debugging
32,631,480 UART: [kat] SHA2-256
32,821,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,832,094 UART: [kat] ++
32,832,562 UART: [kat] sha1
32,844,534 UART: [kat] SHA2-256
32,847,501 UART: [kat] SHA2-384
32,854,425 UART: [kat] SHA2-512-ACC
32,857,020 UART: [kat] ECC-384
35,310,519 UART: [kat] HMAC-384Kdf
35,331,835 UART: [kat] LMS
35,863,420 UART: [kat] --
35,868,059 UART: [update-reset] ++
39,335,826 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,339,862 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,948,149 >>> mbox cmd response: success
39,952,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,953,280 UART: [update-reset] Copying MAN_2 To MAN_1
39,987,122 UART: [update-reset Success] --
39,991,262 UART: [state] Locking Datavault
39,994,709 UART: [state] Locking PCR0, PCR1 and PCR31
39,996,905 UART: [state] Locking ICCM
39,998,260 UART: [exit] Launching FMC @ 0x40000130
40,006,937 UART:
40,007,180 UART: Running Caliptra FMC ...
40,008,287 UART:
40,008,455 UART: [state] CFI Enabled
40,098,635 UART: [art] Extend RT PCRs Done
40,099,833 UART: [art] Lock RT PCRs Done
40,101,291 UART: [art] Populate DV Done
40,106,699 UART: [fht] FMC Alias Private Key: 7
40,108,347 UART: [art] Derive CDI
40,109,158 UART: [art] Store in in slot 0x4
40,167,753 UART: [art] Derive Key Pair
40,168,867 UART: [art] Store priv key in slot 0x5
42,631,879 UART: [art] Derive Key Pair - Done
42,645,088 UART: [art] Signing Cert with AUTHO
42,646,402 UART: RITY.KEYID = 7
44,357,336 UART: [art] Erasing AUTHORITY.KEYID = 7
44,358,835 UART: [art] PUB.X = 52F7C2BBB0D89DDF710E2F500E90A32DCCA6C9CD0A88AF2145574BFAE9B3E3F6A59478AC92DD43ABC325EAFC2AFCAE6C
44,366,127 UART: [art] PUB.Y = 3E74CCFC4C34A49573E693AFD18D38A60A3F7CD6A5EB8746F3D7F9B97ED9C4DCCFDDAB9F2B1416B87EBDEF2F2D2EA3E0
44,373,404 UART: [art] SIG.R = 619F4CF3767E47F912FC8CCB8874817561CAB2DD3C38E4B0D5C2FF2BDBC104EE46F473ABEAF659132CE5E4FB4178415A
44,380,838 UART: [art] SIG.S = 5CAD4FAAD4BF6A7DD6AA63E482C0C4A80DDBEFC0904674D4BED8DA25F27EB5D731B23FCD5DB4531C738D3C2BC42ABD88
45,360,258 UART: Caliptra RT
45,360,975 UART: [state] CFI Enabled
45,692,815 UART: [rt] RT listening for mailbox commands...
45,724,521 UART: [rt]cmd =0x41545348, len=116
45,744,857 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,443,101 ready_for_fw is high
3,443,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,762,408 >>> mbox cmd response: success
19,077,139 UART:
19,077,519 UART: Running Caliptra FMC ...
19,078,715 UART:
19,078,889 UART: [state] CFI Enabled
19,140,388 UART: [fht] FMC Alias Private Key: 7
20,904,437 UART: [art] Extend RT PCRs Done
20,905,655 UART: [art] Lock RT PCRs Done
20,907,230 UART: [art] Populate DV Done
20,912,709 UART: [fht] FMC Alias Private Key: 7
20,914,318 UART: [art] Derive CDI
20,915,136 UART: [art] Store in in slot 0x4
20,973,269 UART: [art] Derive Key Pair
20,974,308 UART: [art] Store priv key in slot 0x5
23,437,347 UART: [art] Derive Key Pair - Done
23,450,502 UART: [art] Signing Cert with AUTHO
23,451,804 UART: RITY.KEYID = 7
25,163,334 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,977 UART: [art] PUB.X = 34C4775A6DCC6766050192B869425AABF6564FC6C4D91005B5060CD6173160795CC90A9E526FB6DDA6DD5CDEF55DDBFA
25,172,131 UART: [art] PUB.Y = A2E7F3ED5D4330FDB01B4DA9470E8FDF615F6DF16A016EB5990A82D3C47F0CC996B4AF77F6ECADAC5835533AE97B78FB
25,179,383 UART: [art] SIG.R = 8325C8F82102726B1B9193E79D4866B39549009A75890C44D589AA61E2D7CB40849472AD9B9D838E4E432ECBD60C694D
25,186,771 UART: [art] SIG.S = 82372BE631AEC773796955D10B91E46E52F674BAC0DA086353FC387F63E67A2B17E569E81D0C435642D4D0C66C8F61AE
26,165,931 UART: Caliptra RT
26,166,640 UART: [state] CFI Enabled
26,331,399 UART: [rt] RT listening for mailbox commands...
26,333,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,490,002 UART: [rt]cmd =0x41544d4e, len=14344
30,420,575 >>> mbox cmd response data (8 bytes)
30,421,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,451,733 UART: [rt]cmd =0x41545348, len=116
30,472,112 >>> mbox cmd response data (12 bytes)
32,538,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,365,304 >>> mbox cmd response: success
40,365,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,401,643 UART:
40,401,937 UART: Running Caliptra FMC ...
40,402,997 UART:
40,403,151 UART: [state] CFI Enabled
40,509,296 UART: [art] Extend RT PCRs Done
40,510,488 UART: [art] Lock RT PCRs Done
40,512,029 UART: [art] Populate DV Done
40,517,496 UART: [fht] FMC Alias Private Key: 7
40,519,092 UART: [art] Derive CDI
40,519,829 UART: [art] Store in in slot 0x4
40,578,746 UART: [art] Derive Key Pair
40,579,786 UART: [art] Store priv key in slot 0x5
43,042,288 UART: [art] Derive Key Pair - Done
43,055,399 UART: [art] Signing Cert with AUTHO
43,056,705 UART: RITY.KEYID = 7
44,768,543 UART: [art] Erasing AUTHORITY.KEYID = 7
44,770,050 UART: [art] PUB.X = 53B444F7CBE7A1A1198857C1C6D5AF28EB6A88FF43D47A25C284A01CE508F0006C1BDA33C201D1A4A2C50F288487459B
44,777,304 UART: [art] PUB.Y = 396CBD1ECE75E46FEFC5DBAC06938FF6C0476513DCF603B86081C07286C49E4F06FD3E743769134518FB4DA21C2E9589
44,784,552 UART: [art] SIG.R = 7B18BD6E6AF9F2999D4DC97ECD397FFBA237BEC8C7607A5DCF7B6007F1D2E7D91C14E3E59E1B04A9CA28EED140089440
44,791,996 UART: [art] SIG.S = 81F8EABC142F4B48E864F23876B332EB25DFDDC6130D33B887620EC311C19196F16CBF3577447E3A9E183D6865367B94
45,771,064 UART: Caliptra RT
45,771,863 UART: [state] CFI Enabled
46,107,307 UART: [rt] RT listening for mailbox commands...
46,139,474 UART: [rt]cmd =0x41545348, len=116
46,159,354 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,442 UART:
192,811 UART: Running Caliptra ROM ...
193,948 UART:
603,549 UART: [state] CFI Enabled
620,432 UART: [state] LifecycleState = Unprovisioned
622,792 UART: [state] DebugLocked = No
624,805 UART: [state] WD Timer not started. Device not locked for debugging
628,534 UART: [kat] SHA2-256
818,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,979 UART: [kat] ++
829,491 UART: [kat] sha1
839,882 UART: [kat] SHA2-256
842,870 UART: [kat] SHA2-384
849,291 UART: [kat] SHA2-512-ACC
851,870 UART: [kat] ECC-384
3,295,284 UART: [kat] HMAC-384Kdf
3,308,800 UART: [kat] LMS
3,840,659 UART: [kat] --
3,845,925 UART: [cold-reset] ++
3,848,196 UART: [fht] FHT @ 0x50003400
3,859,369 UART: [idev] ++
3,859,994 UART: [idev] CDI.KEYID = 6
3,860,942 UART: [idev] SUBJECT.KEYID = 7
3,862,170 UART: [idev] UDS.KEYID = 0
3,863,090 ready_for_fw is high
3,863,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,107 UART: [idev] Erasing UDS.KEYID = 0
6,335,565 UART: [idev] Sha1 KeyId Algorithm
6,357,399 UART: [idev] --
6,362,494 UART: [ldev] ++
6,363,176 UART: [ldev] CDI.KEYID = 6
6,364,055 UART: [ldev] SUBJECT.KEYID = 5
6,365,255 UART: [ldev] AUTHORITY.KEYID = 7
6,366,480 UART: [ldev] FE.KEYID = 1
6,377,441 UART: [ldev] Erasing FE.KEYID = 1
8,859,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,339 UART: [ldev] --
10,650,193 UART: [fwproc] Wait for Commands...
10,653,142 UART: [fwproc] Recv command 0x46574c44
10,655,439 UART: [fwproc] Recv'd Img size: 114448 bytes
14,101,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,840,019 >>> mbox cmd response: success
14,844,628 UART: [afmc] ++
14,845,329 UART: [afmc] CDI.KEYID = 6
14,846,563 UART: [afmc] SUBJECT.KEYID = 7
14,847,999 UART: [afmc] AUTHORITY.KEYID = 5
17,351,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,776 UART: [afmc] --
19,145,526 UART: [cold-reset] --
19,148,323 UART: [state] Locking Datavault
19,154,278 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,511 UART: [state] Locking ICCM
19,157,808 UART: [exit] Launching FMC @ 0x40000130
19,166,487 UART:
19,166,714 UART: Running Caliptra FMC ...
19,167,807 UART:
19,167,957 UART: [state] CFI Enabled
19,176,210 UART: [fht] FMC Alias Private Key: 7
20,933,157 UART: [art] Extend RT PCRs Done
20,934,353 UART: [art] Lock RT PCRs Done
20,936,073 UART: [art] Populate DV Done
20,941,638 UART: [fht] FMC Alias Private Key: 7
20,943,222 UART: [art] Derive CDI
20,944,028 UART: [art] Store in in slot 0x4
20,986,992 UART: [art] Derive Key Pair
20,988,005 UART: [art] Store priv key in slot 0x5
23,414,361 UART: [art] Derive Key Pair - Done
23,427,406 UART: [art] Signing Cert with AUTHO
23,428,700 UART: RITY.KEYID = 7
25,134,317 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,796 UART: [art] PUB.X = 7A494E6847C5267109FFF1E65A710BA419F08F10842DCBECF421862F99F476667B17A9DA89027B12409B676409CD8692
25,143,009 UART: [art] PUB.Y = 782BDC5336619E42581ABE80701CB5E2EE3E4ED7C3DE664E5021EB47D7C88E2CE44CB56E7B750FD5F2C24A41063AD1A0
25,150,334 UART: [art] SIG.R = DB080A5E7FEC7C109178D0D171721BF79AFFEE46FF87A0B4CB3AE1D7622DB0534A04E06D32A439159A169DFBA837481F
25,157,733 UART: [art] SIG.S = DB9D7540B8DBCC9703ECAA2225765A90B745D8DB21B81EACA426305E88CE879C180A5BEDE20FF840897CB97A772D0B22
26,136,618 UART: Caliptra RT
26,137,324 UART: [state] CFI Enabled
26,254,270 UART: [rt] RT listening for mailbox commands...
26,256,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,411,907 UART: [rt]cmd =0x41544d4e, len=14344
30,343,078 >>> mbox cmd response data (8 bytes)
30,343,653 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,374,621 UART: [rt]cmd =0x41545348, len=116
30,394,453 >>> mbox cmd response data (12 bytes)
32,449,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,594,916 UART:
32,595,287 UART: Running Caliptra ROM ...
32,596,500 UART:
32,596,657 UART: [state] CFI Enabled
32,612,775 UART: [state] LifecycleState = Unprovisioned
32,614,676 UART: [state] DebugLocked = No
32,616,709 UART: [state] WD Timer not started. Device not locked for debugging
32,620,764 UART: [kat] SHA2-256
32,810,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,821,402 UART: [kat] ++
32,821,915 UART: [kat] sha1
32,834,583 UART: [kat] SHA2-256
32,837,626 UART: [kat] SHA2-384
32,844,838 UART: [kat] SHA2-512-ACC
32,847,417 UART: [kat] ECC-384
35,290,652 UART: [kat] HMAC-384Kdf
35,304,452 UART: [kat] LMS
35,836,051 UART: [kat] --
35,840,113 UART: [update-reset] ++
39,297,885 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,300,663 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,908,884 >>> mbox cmd response: success
39,913,607 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,914,206 UART: [update-reset] Copying MAN_2 To MAN_1
39,948,259 UART: [update-reset Success] --
39,951,474 UART: [state] Locking Datavault
39,955,828 UART: [state] Locking PCR0, PCR1 and PCR31
39,957,688 UART: [state] Locking ICCM
39,958,987 UART: [exit] Launching FMC @ 0x40000130
39,967,660 UART:
39,967,886 UART: Running Caliptra FMC ...
39,968,977 UART:
39,969,128 UART: [state] CFI Enabled
40,013,566 UART: [art] Extend RT PCRs Done
40,014,710 UART: [art] Lock RT PCRs Done
40,015,884 UART: [art] Populate DV Done
40,021,359 UART: [fht] FMC Alias Private Key: 7
40,023,008 UART: [art] Derive CDI
40,023,823 UART: [art] Store in in slot 0x4
40,066,432 UART: [art] Derive Key Pair
40,067,534 UART: [art] Store priv key in slot 0x5
42,494,084 UART: [art] Derive Key Pair - Done
42,506,872 UART: [art] Signing Cert with AUTHO
42,508,171 UART: RITY.KEYID = 7
44,213,606 UART: [art] Erasing AUTHORITY.KEYID = 7
44,215,109 UART: [art] PUB.X = 1C44D150985F2EFDBD3BC0953CBB271BE9CB37D8243317580FC8B3EC0B7AEC1F7952DA97B5AEE955D8AC0B19E4E1A53A
44,222,401 UART: [art] PUB.Y = 286E686C650343D8F6B54B83483B5081500DCC09C6E16B6F9C4729F623D2087A9B945FA02AFADC3130BF70559E07E93D
44,229,670 UART: [art] SIG.R = C845DD80357C89A417911EE940A115624F365774012A8F3FA0294091EF7B7F5C50D48D55A175417298F9494910CF24A5
44,236,999 UART: [art] SIG.S = 772D54DBAF660C798A63D9BA74562910F8CAA6687FDC1C86AE57598F2865F26FF81C325C112CD7A677B96E9CD2A052BB
45,215,683 UART: Caliptra RT
45,216,380 UART: [state] CFI Enabled
45,501,026 UART: [rt] RT listening for mailbox commands...
45,533,048 UART: [rt]cmd =0x41545348, len=116
45,552,999 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,752,015 ready_for_fw is high
3,752,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,091 >>> mbox cmd response: success
19,207,269 UART:
19,207,674 UART: Running Caliptra FMC ...
19,208,779 UART:
19,208,924 UART: [state] CFI Enabled
19,217,195 UART: [fht] FMC Alias Private Key: 7
20,974,307 UART: [art] Extend RT PCRs Done
20,975,532 UART: [art] Lock RT PCRs Done
20,977,398 UART: [art] Populate DV Done
20,982,700 UART: [fht] FMC Alias Private Key: 7
20,984,235 UART: [art] Derive CDI
20,984,964 UART: [art] Store in in slot 0x4
21,027,442 UART: [art] Derive Key Pair
21,028,441 UART: [art] Store priv key in slot 0x5
23,455,043 UART: [art] Derive Key Pair - Done
23,468,091 UART: [art] Signing Cert with AUTHO
23,469,390 UART: RITY.KEYID = 7
25,174,820 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,326 UART: [art] PUB.X = 4900175BBB0ED7BD02BD2E18A595A77FCA13126AFBB816DB9438EDFF11363F628C60411EE035487A432C8618498B0336
25,183,552 UART: [art] PUB.Y = 75BD1E1800B79AB4832A8258B49139157884DC66C3F4E1050925D3D489B91316982A148B6F47C7F7DA0616BF91293E05
25,190,785 UART: [art] SIG.R = 06916F6A5CA2D9B2E42B17FE8E4801903F04739B138A2981BF41ADFEF78EB80A2851E0085A6D89BF63919D0E439BDCE7
25,198,198 UART: [art] SIG.S = E3317EC8191315A21E2A1E497D9F417DC3E394388F91352018DE27EB3FF1DC2B64DF5E5C3CF69920DA4B552A7D8C5372
26,177,113 UART: Caliptra RT
26,177,823 UART: [state] CFI Enabled
26,295,583 UART: [rt] RT listening for mailbox commands...
26,297,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,453,289 UART: [rt]cmd =0x41544d4e, len=14344
30,383,665 >>> mbox cmd response data (8 bytes)
30,384,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,414,862 UART: [rt]cmd =0x41545348, len=116
30,434,865 >>> mbox cmd response data (12 bytes)
32,488,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,230,520 >>> mbox cmd response: success
40,231,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,265,658 UART:
40,265,994 UART: Running Caliptra FMC ...
40,267,029 UART:
40,267,175 UART: [state] CFI Enabled
40,311,294 UART: [art] Extend RT PCRs Done
40,312,449 UART: [art] Lock RT PCRs Done
40,313,919 UART: [art] Populate DV Done
40,319,435 UART: [fht] FMC Alias Private Key: 7
40,321,062 UART: [art] Derive CDI
40,321,803 UART: [art] Store in in slot 0x4
40,364,608 UART: [art] Derive Key Pair
40,365,613 UART: [art] Store priv key in slot 0x5
42,791,949 UART: [art] Derive Key Pair - Done
42,804,799 UART: [art] Signing Cert with AUTHO
42,806,133 UART: RITY.KEYID = 7
44,511,614 UART: [art] Erasing AUTHORITY.KEYID = 7
44,513,100 UART: [art] PUB.X = 6E92FCA200E68E5158B0FA38151C4739D8DD004B5F0617EAF29406557D98708DB5D447BC59147DB9F878322EF43ADAD7
44,520,333 UART: [art] PUB.Y = 1D3D1DEB07AB25C43EDBD27B09FCE4568621DF93598A002E8AB6D0CF127AA34F773F5176FF6740A2D84E57ABFB52B450
44,527,606 UART: [art] SIG.R = F915431DFD2A9CD26EF1776583DF58E9A2DD7A5D5C9B1C17F4F7A5D91CBCA89EE6FBF86B9ABB021C40FF96D4DBF75963
44,535,052 UART: [art] SIG.S = 78F7A41E405B7D328C990142635FE120C030D2EF7AA929A297C3CB0A813C1E51E14897A58FCA22253717430704879721
45,513,938 UART: Caliptra RT
45,514,659 UART: [state] CFI Enabled
45,802,460 UART: [rt] RT listening for mailbox commands...
45,834,367 UART: [rt]cmd =0x41545348, len=116
45,855,149 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,737 UART: [kat] SHA2-256
881,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,783 UART: [kat] ++
885,935 UART: [kat] sha1
890,139 UART: [kat] SHA2-256
892,077 UART: [kat] SHA2-384
894,852 UART: [kat] SHA2-512-ACC
896,753 UART: [kat] ECC-384
902,090 UART: [kat] HMAC-384Kdf
906,644 UART: [kat] LMS
1,474,840 UART: [kat] --
1,475,847 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,479,052 UART: [idev] ++
1,479,220 UART: [idev] CDI.KEYID = 6
1,479,580 UART: [idev] SUBJECT.KEYID = 7
1,480,004 UART: [idev] UDS.KEYID = 0
1,480,349 ready_for_fw is high
1,480,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,212 UART: [idev] Erasing UDS.KEYID = 0
1,505,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,515,027 UART: [ldev] ++
1,515,195 UART: [ldev] CDI.KEYID = 6
1,515,558 UART: [ldev] SUBJECT.KEYID = 5
1,515,984 UART: [ldev] AUTHORITY.KEYID = 7
1,516,447 UART: [ldev] FE.KEYID = 1
1,521,503 UART: [ldev] Erasing FE.KEYID = 1
1,546,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,704 UART: [ldev] --
1,585,985 UART: [fwproc] Waiting for Commands...
1,586,642 UART: [fwproc] Received command 0x46574c44
1,587,433 UART: [fwproc] Received Image of size 114448 bytes
2,887,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,624 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,105 >>> mbox cmd response: success
3,081,195 UART: [afmc] ++
3,081,363 UART: [afmc] CDI.KEYID = 6
3,081,725 UART: [afmc] SUBJECT.KEYID = 7
3,082,150 UART: [afmc] AUTHORITY.KEYID = 5
3,117,395 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,653 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,046 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,736 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,739 UART: [afmc] --
3,160,767 UART: [cold-reset] --
3,161,673 UART: [state] Locking Datavault
3,162,842 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,446 UART: [state] Locking ICCM
3,164,060 UART: [exit] Launching FMC @ 0x40000130
3,169,389 UART:
3,169,405 UART: Running Caliptra FMC ...
3,169,813 UART:
3,169,867 UART: [state] CFI Enabled
3,179,936 UART: [fht] FMC Alias Private Key: 7
3,287,975 UART: [art] Extend RT PCRs Done
3,288,403 UART: [art] Lock RT PCRs Done
3,290,017 UART: [art] Populate DV Done
3,298,228 UART: [fht] FMC Alias Private Key: 7
3,299,262 UART: [art] Derive CDI
3,299,542 UART: [art] Store in in slot 0x4
3,384,991 UART: [art] Derive Key Pair
3,385,351 UART: [art] Store priv key in slot 0x5
3,398,545 UART: [art] Derive Key Pair - Done
3,413,090 UART: [art] Signing Cert with AUTHO
3,413,570 UART: RITY.KEYID = 7
3,428,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,361 UART: [art] PUB.X = 847DFD8AAD9C2E7F53DF2B6D77AAFB7BB2E178643CA5D37C31053C97C6D2AB41F66AC820DA70F827C9E46EC6038EBC85
3,436,147 UART: [art] PUB.Y = 3A9AEF539ED2658EE5700479DD944B8537447F8E4338BF7C9505FE7447E17CA631150B32F499CB9EF59FADB49B7FC294
3,443,094 UART: [art] SIG.R = 7DBC210D5D7FC9175164EC49122714667D57ECB3DCE15C3CBD1C186C949F18D961FC39059FBE4148510D63BD4DFEA246
3,449,865 UART: [art] SIG.S = 84D728C3794DC736B25FFAB85F5E0EACBDF41B16595F1246B6474485770D15ADF02F111B59F198A1AA9B8E3FA591B303
3,473,777 UART: Caliptra RT
3,474,030 UART: [state] CFI Enabled
3,581,763 UART: [rt] RT listening for mailbox commands...
3,582,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,423 UART: [rt]cmd =0x41544d4e, len=14344
3,849,699 >>> mbox cmd response data (8 bytes)
3,849,700 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,969 UART: [rt]cmd =0x41545348, len=116
3,901,243 >>> mbox cmd response data (12 bytes)
3,901,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,060 UART:
3,902,076 UART: Running Caliptra ROM ...
3,902,484 UART:
3,902,538 UART: [state] CFI Enabled
3,905,290 UART: [state] LifecycleState = Unprovisioned
3,905,945 UART: [state] DebugLocked = No
3,906,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,908,116 UART: [kat] SHA2-256
4,702,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,706,162 UART: [kat] ++
4,706,314 UART: [kat] sha1
4,710,706 UART: [kat] SHA2-256
4,712,644 UART: [kat] SHA2-384
4,715,261 UART: [kat] SHA2-512-ACC
4,717,161 UART: [kat] ECC-384
4,722,570 UART: [kat] HMAC-384Kdf
4,727,158 UART: [kat] LMS
5,295,354 UART: [kat] --
5,296,403 UART: [update-reset] ++
6,632,454 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,633,646 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,783,696 >>> mbox cmd response: success
6,783,696 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,783,987 UART: [update-reset] Copying MAN_2 To MAN_1
6,792,001 UART: [update-reset Success] --
6,793,096 UART: [state] Locking Datavault
6,793,720 UART: [state] Locking PCR0, PCR1 and PCR31
6,794,324 UART: [state] Locking ICCM
6,794,962 UART: [exit] Launching FMC @ 0x40000130
6,800,291 UART:
6,800,307 UART: Running Caliptra FMC ...
6,800,715 UART:
6,800,769 UART: [state] CFI Enabled
6,890,084 UART: [art] Extend RT PCRs Done
6,890,512 UART: [art] Lock RT PCRs Done
6,892,037 UART: [art] Populate DV Done
6,900,490 UART: [fht] FMC Alias Private Key: 7
6,901,672 UART: [art] Derive CDI
6,901,952 UART: [art] Store in in slot 0x4
6,987,589 UART: [art] Derive Key Pair
6,987,949 UART: [art] Store priv key in slot 0x5
7,001,281 UART: [art] Derive Key Pair - Done
7,016,079 UART: [art] Signing Cert with AUTHO
7,016,559 UART: RITY.KEYID = 7
7,031,751 UART: [art] Erasing AUTHORITY.KEYID = 7
7,032,516 UART: [art] PUB.X = 3B931439566073A55C8A5560CF6363058FFB49783F1506DB8C70AC13AE26894D4C95BBA0128E7CF2F60C2CB4DF6735FF
7,039,281 UART: [art] PUB.Y = 8917B52DAE3786C640CBA13C537ABD6C38800B68BAD18F4C4920B4935E38F3618A558DEBA8F6146A4D69EFA20B082141
7,046,228 UART: [art] SIG.R = 6EF3707DEB4C8CC7F0F736AB07A5E7C6E81D70DC6D7731B3E5D6034210A106D49CCA299A99ACC6A4860EC49EDD4BA317
7,053,004 UART: [art] SIG.S = BA0A791BADA38E43D63D7DC4EBFACAF8420486C2C2F264EE55BE58480492542FB668A8C906CCDADB1E69CCCB60F26033
7,076,229 UART: Caliptra RT
7,076,482 UART: [state] CFI Enabled
7,361,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,392,194 UART: [rt]cmd =0x41545348, len=116
7,413,628 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,667 >>> mbox cmd response: success
2,988,939 UART:
2,988,955 UART: Running Caliptra FMC ...
2,989,363 UART:
2,989,417 UART: [state] CFI Enabled
3,000,082 UART: [fht] FMC Alias Private Key: 7
3,107,855 UART: [art] Extend RT PCRs Done
3,108,283 UART: [art] Lock RT PCRs Done
3,109,581 UART: [art] Populate DV Done
3,117,770 UART: [fht] FMC Alias Private Key: 7
3,118,912 UART: [art] Derive CDI
3,119,192 UART: [art] Store in in slot 0x4
3,204,861 UART: [art] Derive Key Pair
3,205,221 UART: [art] Store priv key in slot 0x5
3,218,541 UART: [art] Derive Key Pair - Done
3,233,091 UART: [art] Signing Cert with AUTHO
3,233,571 UART: RITY.KEYID = 7
3,248,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,400 UART: [art] PUB.X = 40B7D81B5D23C7E0EDBEA723ABE3B4F1473F17F1D82F8C8677E86E5D098479E582F8D9B913E59E4CDAB2CF6FC12FCBD8
3,256,189 UART: [art] PUB.Y = C993F14C7667A2A8391EE61289405A4A5F221F594B7C41F31D7127D48788A2B058707EF2F1BF1D32E09462C76E18C488
3,263,133 UART: [art] SIG.R = AE1E8FA72D34206C37EB9C08BCCCCE6B4A7F9FA274BD05FF3526920E63AC50780C702B562266410FFDAC800FCE7DBE8F
3,269,907 UART: [art] SIG.S = ABAFB43FCB7BA077E7A19C223F64CD2A3820D76482499FC857991CA7935DD91F8D0D43F27D17515FD215F93C9C8F01E3
3,293,618 UART: Caliptra RT
3,293,871 UART: [state] CFI Enabled
3,402,571 UART: [rt] RT listening for mailbox commands...
3,403,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,023 UART: [rt]cmd =0x41544d4e, len=14344
3,671,175 >>> mbox cmd response data (8 bytes)
3,671,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,041 UART: [rt]cmd =0x41545348, len=116
3,723,211 >>> mbox cmd response data (12 bytes)
3,723,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,806 >>> mbox cmd response: success
6,485,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,499,417 UART:
6,499,433 UART: Running Caliptra FMC ...
6,499,841 UART:
6,499,895 UART: [state] CFI Enabled
6,588,954 UART: [art] Extend RT PCRs Done
6,589,382 UART: [art] Lock RT PCRs Done
6,590,813 UART: [art] Populate DV Done
6,598,896 UART: [fht] FMC Alias Private Key: 7
6,600,040 UART: [art] Derive CDI
6,600,320 UART: [art] Store in in slot 0x4
6,685,625 UART: [art] Derive Key Pair
6,685,985 UART: [art] Store priv key in slot 0x5
6,699,351 UART: [art] Derive Key Pair - Done
6,714,163 UART: [art] Signing Cert with AUTHO
6,714,643 UART: RITY.KEYID = 7
6,730,117 UART: [art] Erasing AUTHORITY.KEYID = 7
6,730,882 UART: [art] PUB.X = 1A96F35740B6F8CD06342A3000FC4EED4C9FF5957B87FC609EF07FC93345B6D17FE7259F452E36E6E25BAB7ABCAAE834
6,737,643 UART: [art] PUB.Y = DEB1F141D4D10283B9E6572084905DB12F0F7F6115BBA2F19BCD8CCEA8F39C43DC0D1419993C35EAF0E03BAB11A987CB
6,744,602 UART: [art] SIG.R = 2D4CAA826AFFD8C22AA7567B970AA67EC93657EDDC053FF4130C4F65F66D0781E5C12FEBAEA964EAE4453734BE309F53
6,751,378 UART: [art] SIG.S = 1AE1D1896490260FE607DCD96223DD9D479497D84AE4287C5B16CE5C1409A78F539935DDB0ED453A92258A6A8029E30A
6,775,693 UART: Caliptra RT
6,775,946 UART: [state] CFI Enabled
7,052,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,083,293 UART: [rt]cmd =0x41545348, len=116
7,105,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,970 UART: [kat] SHA2-256
881,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,016 UART: [kat] ++
886,168 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,491 UART: [kat] LMS
1,475,687 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,300 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 ready_for_fw is high
1,481,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,899 UART: [idev] Erasing UDS.KEYID = 0
1,506,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,579 UART: [idev] --
1,515,716 UART: [ldev] ++
1,515,884 UART: [ldev] CDI.KEYID = 6
1,516,247 UART: [ldev] SUBJECT.KEYID = 5
1,516,673 UART: [ldev] AUTHORITY.KEYID = 7
1,517,136 UART: [ldev] FE.KEYID = 1
1,522,592 UART: [ldev] Erasing FE.KEYID = 1
1,547,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,919 UART: [ldev] --
1,587,334 UART: [fwproc] Waiting for Commands...
1,588,095 UART: [fwproc] Received command 0x46574c44
1,588,886 UART: [fwproc] Received Image of size 114448 bytes
2,888,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,796 >>> mbox cmd response: success
3,081,926 UART: [afmc] ++
3,082,094 UART: [afmc] CDI.KEYID = 6
3,082,456 UART: [afmc] SUBJECT.KEYID = 7
3,082,881 UART: [afmc] AUTHORITY.KEYID = 5
3,118,142 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,629 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,319 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,120 UART: [afmc] --
3,161,110 UART: [cold-reset] --
3,161,822 UART: [state] Locking Datavault
3,162,957 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,561 UART: [state] Locking ICCM
3,164,073 UART: [exit] Launching FMC @ 0x40000130
3,169,402 UART:
3,169,418 UART: Running Caliptra FMC ...
3,169,826 UART:
3,169,969 UART: [state] CFI Enabled
3,180,560 UART: [fht] FMC Alias Private Key: 7
3,288,331 UART: [art] Extend RT PCRs Done
3,288,759 UART: [art] Lock RT PCRs Done
3,290,091 UART: [art] Populate DV Done
3,298,314 UART: [fht] FMC Alias Private Key: 7
3,299,306 UART: [art] Derive CDI
3,299,586 UART: [art] Store in in slot 0x4
3,385,199 UART: [art] Derive Key Pair
3,385,559 UART: [art] Store priv key in slot 0x5
3,399,331 UART: [art] Derive Key Pair - Done
3,413,771 UART: [art] Signing Cert with AUTHO
3,414,251 UART: RITY.KEYID = 7
3,429,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,082 UART: [art] PUB.X = B6E818BFC76DF84EEC8E858FEEE7F87F9537A79CF39773DAE5E92A3E5D37118EFA7E7575CB4CE697D5B83C7A321C6BE2
3,436,874 UART: [art] PUB.Y = A200D0C97B72BBC5E21370A67D9168BE67916ECEBBD6A5D5BE0F7FCB5A6E635FADE846D894CC11383EAAC0D84CF5A8DB
3,443,827 UART: [art] SIG.R = 70BF52F1F2D7EAF2B28F57604CF2EDC5D951DBB9813C0FE933D60BDDBE4D419C1764D695915E98F071030ACC02EDDE57
3,450,600 UART: [art] SIG.S = 1DDA4702CC846602A38AC5083D88F4422C45262B298894620DAA28CC2EC4F3588AC1F47DAFC8386CB3C050B389E95F14
3,474,739 UART: Caliptra RT
3,475,084 UART: [state] CFI Enabled
3,582,832 UART: [rt] RT listening for mailbox commands...
3,583,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,662 UART: [rt]cmd =0x41544d4e, len=14344
3,851,798 >>> mbox cmd response data (8 bytes)
3,851,799 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,950 UART: [rt]cmd =0x41545348, len=116
3,904,188 >>> mbox cmd response data (12 bytes)
3,904,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,191 UART:
3,905,207 UART: Running Caliptra ROM ...
3,905,615 UART:
3,905,756 UART: [state] CFI Enabled
3,908,506 UART: [state] LifecycleState = Unprovisioned
3,909,161 UART: [state] DebugLocked = No
3,909,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,911,532 UART: [kat] SHA2-256
4,705,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,709,578 UART: [kat] ++
4,709,730 UART: [kat] sha1
4,713,966 UART: [kat] SHA2-256
4,715,904 UART: [kat] SHA2-384
4,718,713 UART: [kat] SHA2-512-ACC
4,720,613 UART: [kat] ECC-384
4,726,520 UART: [kat] HMAC-384Kdf
4,731,228 UART: [kat] LMS
5,299,424 UART: [kat] --
5,300,159 UART: [update-reset] ++
6,635,954 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,637,112 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,787,162 >>> mbox cmd response: success
6,787,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,787,353 UART: [update-reset] Copying MAN_2 To MAN_1
6,795,367 UART: [update-reset Success] --
6,796,368 UART: [state] Locking Datavault
6,797,150 UART: [state] Locking PCR0, PCR1 and PCR31
6,797,754 UART: [state] Locking ICCM
6,798,266 UART: [exit] Launching FMC @ 0x40000130
6,803,595 UART:
6,803,611 UART: Running Caliptra FMC ...
6,804,019 UART:
6,804,162 UART: [state] CFI Enabled
6,893,465 UART: [art] Extend RT PCRs Done
6,893,893 UART: [art] Lock RT PCRs Done
6,895,020 UART: [art] Populate DV Done
6,903,261 UART: [fht] FMC Alias Private Key: 7
6,904,279 UART: [art] Derive CDI
6,904,559 UART: [art] Store in in slot 0x4
6,990,486 UART: [art] Derive Key Pair
6,990,846 UART: [art] Store priv key in slot 0x5
7,004,592 UART: [art] Derive Key Pair - Done
7,019,268 UART: [art] Signing Cert with AUTHO
7,019,748 UART: RITY.KEYID = 7
7,034,838 UART: [art] Erasing AUTHORITY.KEYID = 7
7,035,603 UART: [art] PUB.X = 8E0B2DA0C7FC1071FC787345BFC138657B524DDBAA1EE316DF027483AAFCC43D4CB0691BDD0AD55B88E22A365C208093
7,042,380 UART: [art] PUB.Y = 38CD0C54EA6E05DDCB6D6A0058B2528EAEAB8DD9B175C33C130C1265AD12514D1ACF99B00B43C05289F5AE494D837121
7,049,308 UART: [art] SIG.R = F0E9691B3C9F11FAB21AC2DD7C3D721EDE06927CDC50174722C6B31AD37E8FE04306D8D5ACF0894100D56D2B5DB14652
7,056,062 UART: [art] SIG.S = 8459DFE3650C4431EC6A64205CF6E4573B83ACB049798E96F7540539650BFB469DBF7A6CDBCF2F7EAAAF9FE920E732E1
7,080,156 UART: Caliptra RT
7,080,501 UART: [state] CFI Enabled
7,360,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,392,038 UART: [rt]cmd =0x41545348, len=116
7,413,904 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,260 ready_for_fw is high
1,362,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,778 >>> mbox cmd response: success
2,990,850 UART:
2,990,866 UART: Running Caliptra FMC ...
2,991,274 UART:
2,991,417 UART: [state] CFI Enabled
3,002,152 UART: [fht] FMC Alias Private Key: 7
3,110,229 UART: [art] Extend RT PCRs Done
3,110,657 UART: [art] Lock RT PCRs Done
3,112,211 UART: [art] Populate DV Done
3,120,568 UART: [fht] FMC Alias Private Key: 7
3,121,596 UART: [art] Derive CDI
3,121,876 UART: [art] Store in in slot 0x4
3,207,369 UART: [art] Derive Key Pair
3,207,729 UART: [art] Store priv key in slot 0x5
3,220,465 UART: [art] Derive Key Pair - Done
3,235,303 UART: [art] Signing Cert with AUTHO
3,235,783 UART: RITY.KEYID = 7
3,251,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,892 UART: [art] PUB.X = 3F91FAC5D92C7F23012E7AFA8E4EBAA777A21AAED2FC7E639F47BACF946C53BB4417B1382BD0782F73B1CB9E30BEC786
3,258,683 UART: [art] PUB.Y = 78DA5C6FC2A83B13C3C474CBC046842FA7A7942BCBE7D70F177B5AD0CC5773258B3A2E32C10387F9C5204BDA66E1EBB2
3,265,643 UART: [art] SIG.R = 1BD6AD4E66812605452C1E4C5421FBEAF4A9AD5CC7CAAA0FB27285ACD9F869E127823783F04F8B35A717C297B2A68C7D
3,272,421 UART: [art] SIG.S = E278F6E7C0253780B0E39168CA15BFFBE055260DBD1E62A0EEC30775ABFF4F782151A4E3A196B57E41F8AC998D39EFA4
3,296,156 UART: Caliptra RT
3,296,501 UART: [state] CFI Enabled
3,404,298 UART: [rt] RT listening for mailbox commands...
3,404,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,790 UART: [rt]cmd =0x41544d4e, len=14344
3,672,522 >>> mbox cmd response data (8 bytes)
3,672,523 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,568 UART: [rt]cmd =0x41545348, len=116
3,724,442 >>> mbox cmd response data (12 bytes)
3,724,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,487,138 >>> mbox cmd response: success
6,487,138 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,500,435 UART:
6,500,451 UART: Running Caliptra FMC ...
6,500,859 UART:
6,501,002 UART: [state] CFI Enabled
6,590,029 UART: [art] Extend RT PCRs Done
6,590,457 UART: [art] Lock RT PCRs Done
6,591,560 UART: [art] Populate DV Done
6,599,943 UART: [fht] FMC Alias Private Key: 7
6,601,021 UART: [art] Derive CDI
6,601,301 UART: [art] Store in in slot 0x4
6,687,130 UART: [art] Derive Key Pair
6,687,490 UART: [art] Store priv key in slot 0x5
6,701,088 UART: [art] Derive Key Pair - Done
6,715,659 UART: [art] Signing Cert with AUTHO
6,716,139 UART: RITY.KEYID = 7
6,731,251 UART: [art] Erasing AUTHORITY.KEYID = 7
6,732,016 UART: [art] PUB.X = EA83959A369DA28A2D6DE58BC36098162F3488954A2A8AC4F1F6AAEFB50B77DEF8171FAC315C61AE1DF0F1778F799023
6,738,795 UART: [art] PUB.Y = BE46422EFE5C81C3BC6A178905EA95C39021B460CBB5DF390C433423E9DC9B5B74117E0DF1C7F94052571D22BC91EF11
6,745,744 UART: [art] SIG.R = C2397A0DB9D33955F3C53D0A2016A2D114C94CB7985C6249A45A681BF255AF84F4DA60BEDA3BCB0B7928092FEBB4EC74
6,752,516 UART: [art] SIG.S = 15DC7BEB67B06350E730B0D7EED8D8EB82543E66ECD329CE229A2E787F850F707AEE777ED9B5F4F617665B010EB04AC8
6,776,636 UART: Caliptra RT
6,776,981 UART: [state] CFI Enabled
7,056,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,135 UART: [rt]cmd =0x41545348, len=116
7,109,435 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,169 UART: [kat] SHA2-256
904,109 UART: [kat] SHA2-384
907,040 UART: [kat] SHA2-512-ACC
908,941 UART: [kat] ECC-384
918,574 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,463 UART: [cold-reset] ++
1,172,817 UART: [fht] FHT @ 0x50003400
1,175,376 UART: [idev] ++
1,175,544 UART: [idev] CDI.KEYID = 6
1,175,904 UART: [idev] SUBJECT.KEYID = 7
1,176,328 UART: [idev] UDS.KEYID = 0
1,176,673 ready_for_fw is high
1,176,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,339 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,970 UART: [ldev] SUBJECT.KEYID = 5
1,211,396 UART: [ldev] AUTHORITY.KEYID = 7
1,211,859 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,244,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,906 >>> mbox cmd response: success
2,778,040 UART: [afmc] ++
2,778,208 UART: [afmc] CDI.KEYID = 6
2,778,570 UART: [afmc] SUBJECT.KEYID = 7
2,778,995 UART: [afmc] AUTHORITY.KEYID = 5
2,814,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,137 UART: [afmc] --
2,858,157 UART: [cold-reset] --
2,859,009 UART: [state] Locking Datavault
2,860,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,704 UART: [state] Locking ICCM
2,861,146 UART: [exit] Launching FMC @ 0x40000130
2,866,475 UART:
2,866,491 UART: Running Caliptra FMC ...
2,866,899 UART:
2,866,953 UART: [state] CFI Enabled
2,877,408 UART: [fht] FMC Alias Private Key: 7
2,984,945 UART: [art] Extend RT PCRs Done
2,985,373 UART: [art] Lock RT PCRs Done
2,987,347 UART: [art] Populate DV Done
2,995,504 UART: [fht] FMC Alias Private Key: 7
2,996,454 UART: [art] Derive CDI
2,996,734 UART: [art] Store in in slot 0x4
3,082,675 UART: [art] Derive Key Pair
3,083,035 UART: [art] Store priv key in slot 0x5
3,095,651 UART: [art] Derive Key Pair - Done
3,110,683 UART: [art] Signing Cert with AUTHO
3,111,163 UART: RITY.KEYID = 7
3,126,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,860 UART: [art] PUB.X = 9147E7CBAE2C7187BF71C96C0C63B886C5C46766C99767B8FC573A2D66D134B90729365984F29AACA4C72CCE894CBF45
3,133,630 UART: [art] PUB.Y = 3456D04BC3EC8BC65BFFE12D56402C5520559ECAD0626248FACB39DCA453249F8764ADF91B30D792520A6D73E65440A4
3,140,583 UART: [art] SIG.R = 9BFFA8458F1BE851B5A52E9003FFB8299C304C1B368154C33079DB717EA18DBFA26EBCC33DFEFF0924BE69218F44A5A3
3,147,363 UART: [art] SIG.S = F56FAD150CD0D04ED1AADCD6C2A1AC05E0947957CD175B41BC3A4480F92ABF1F2E421C5C3CBA764DFBC6F35D80B5B1F4
3,171,330 UART: Caliptra RT
3,171,583 UART: [state] CFI Enabled
3,279,259 UART: [rt] RT listening for mailbox commands...
3,279,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,773 UART: [rt]cmd =0x41544d4e, len=14344
3,547,817 >>> mbox cmd response data (8 bytes)
3,547,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,191 UART: [rt]cmd =0x41545348, len=116
3,599,759 >>> mbox cmd response data (12 bytes)
3,599,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,551 UART:
3,600,567 UART: Running Caliptra ROM ...
3,600,975 UART:
3,601,030 UART: [state] CFI Enabled
3,603,804 UART: [state] LifecycleState = Unprovisioned
3,604,459 UART: [state] DebugLocked = No
3,605,167 UART: [state] WD Timer not started. Device not locked for debugging
3,606,459 UART: [kat] SHA2-256
4,412,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,416,234 UART: [kat] ++
4,416,386 UART: [kat] sha1
4,420,556 UART: [kat] SHA2-256
4,422,496 UART: [kat] SHA2-384
4,425,147 UART: [kat] SHA2-512-ACC
4,427,047 UART: [kat] ECC-384
4,436,524 UART: [kat] HMAC-384Kdf
4,441,096 UART: [kat] LMS
4,689,424 UART: [kat] --
4,690,402 UART: [update-reset] ++
6,004,777 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,005,744 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,155,742 >>> mbox cmd response: success
6,155,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,156,063 UART: [update-reset] Copying MAN_2 To MAN_1
6,164,077 UART: [update-reset Success] --
6,165,158 UART: [state] Locking Datavault
6,166,178 UART: [state] Locking PCR0, PCR1 and PCR31
6,166,782 UART: [state] Locking ICCM
6,167,274 UART: [exit] Launching FMC @ 0x40000130
6,172,603 UART:
6,172,619 UART: Running Caliptra FMC ...
6,173,027 UART:
6,173,081 UART: [state] CFI Enabled
6,262,386 UART: [art] Extend RT PCRs Done
6,262,814 UART: [art] Lock RT PCRs Done
6,263,891 UART: [art] Populate DV Done
6,272,138 UART: [fht] FMC Alias Private Key: 7
6,273,256 UART: [art] Derive CDI
6,273,536 UART: [art] Store in in slot 0x4
6,358,995 UART: [art] Derive Key Pair
6,359,355 UART: [art] Store priv key in slot 0x5
6,371,857 UART: [art] Derive Key Pair - Done
6,386,880 UART: [art] Signing Cert with AUTHO
6,387,360 UART: RITY.KEYID = 7
6,402,168 UART: [art] Erasing AUTHORITY.KEYID = 7
6,402,933 UART: [art] PUB.X = 72CB8FF42A9CD4FD4B871305998B4FEC2BD744FFF98338B5FCA85582FA26FC58810464E453A6B5169E2AD18C41927068
6,409,703 UART: [art] PUB.Y = 097B2544C6BCB62DF29F078CC335527A90E6317EEB6E75DE507D41D16A35132F8C443D607106BB132D2CBC11706D9270
6,416,644 UART: [art] SIG.R = D9D6FB9CB21E3B65B0078DBF871029696BE2DE9EDF6C993617073B7E2B351E97C0541D866B6EBF595268DEB22B9E8507
6,423,413 UART: [art] SIG.S = 3768927F61BCF965327EF982956593C465E5B77F42EA4F60B1051F44EE0672059C0910CB7E4966E2B49F0598E1D8AD21
6,447,133 UART: Caliptra RT
6,447,386 UART: [state] CFI Enabled
6,731,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,762,664 UART: [rt]cmd =0x41545348, len=116
6,784,292 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,815 ready_for_fw is high
1,059,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,475 >>> mbox cmd response: success
2,688,837 UART:
2,688,853 UART: Running Caliptra FMC ...
2,689,261 UART:
2,689,315 UART: [state] CFI Enabled
2,699,752 UART: [fht] FMC Alias Private Key: 7
2,807,335 UART: [art] Extend RT PCRs Done
2,807,763 UART: [art] Lock RT PCRs Done
2,809,585 UART: [art] Populate DV Done
2,817,866 UART: [fht] FMC Alias Private Key: 7
2,818,934 UART: [art] Derive CDI
2,819,214 UART: [art] Store in in slot 0x4
2,904,765 UART: [art] Derive Key Pair
2,905,125 UART: [art] Store priv key in slot 0x5
2,918,463 UART: [art] Derive Key Pair - Done
2,933,227 UART: [art] Signing Cert with AUTHO
2,933,707 UART: RITY.KEYID = 7
2,948,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,556 UART: [art] PUB.X = DFD305F54BF878010F81C8D5EE7563E3638E014853CE6E9F655D2F4AAB10C5DA901FA0AC8E6E8ADC6A91D7B4F12FF171
2,956,332 UART: [art] PUB.Y = 143F0D5A57A70E6BF97D9C06266666A0E39EDD045DC948F11569EC85542724AC08E3C05FEBF3A29EF4272D49D9D2C2E1
2,963,275 UART: [art] SIG.R = CD3106A7CC2A343FA964AB2D2D13707864D942FF31698C3A7B5279A968CFEFDA7CCF5E9954D267E4068B0CC5E55E96C7
2,970,048 UART: [art] SIG.S = 7B3FC298660B31F58C578DF5B62E9DB08D9B3E03ED3B0EE8C9431B7DE355FB6B252713359E12CA9F55EC6BFCBFC08196
2,993,462 UART: Caliptra RT
2,993,715 UART: [state] CFI Enabled
3,100,600 UART: [rt] RT listening for mailbox commands...
3,101,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,188 UART: [rt]cmd =0x41544d4e, len=14344
3,368,964 >>> mbox cmd response data (8 bytes)
3,368,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,282 UART: [rt]cmd =0x41545348, len=116
3,421,888 >>> mbox cmd response data (12 bytes)
3,421,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,859,994 >>> mbox cmd response: success
5,859,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,873,570 UART:
5,873,586 UART: Running Caliptra FMC ...
5,873,994 UART:
5,874,048 UART: [state] CFI Enabled
5,963,085 UART: [art] Extend RT PCRs Done
5,963,513 UART: [art] Lock RT PCRs Done
5,964,980 UART: [art] Populate DV Done
5,973,383 UART: [fht] FMC Alias Private Key: 7
5,974,333 UART: [art] Derive CDI
5,974,613 UART: [art] Store in in slot 0x4
6,059,962 UART: [art] Derive Key Pair
6,060,322 UART: [art] Store priv key in slot 0x5
6,073,376 UART: [art] Derive Key Pair - Done
6,088,421 UART: [art] Signing Cert with AUTHO
6,088,901 UART: RITY.KEYID = 7
6,104,491 UART: [art] Erasing AUTHORITY.KEYID = 7
6,105,256 UART: [art] PUB.X = 5284C53BC169F97033E4A96E992A6B54FFAC14AB120E3EB904DA88D8A4337668A0A41E7113A52F389AE78ECC40D26F10
6,112,026 UART: [art] PUB.Y = 43F4C2EE05E0371296A16DC7682836B226CB810AD20AE62FBA09D4A51D00F97E59FA2908EE919BA713E16C3EA82EE47A
6,118,949 UART: [art] SIG.R = 4AB0DAE4671EF8F19A8E02FFF142296486EE38C45AFDCACF6CEA6127AF7767259B00D26D4D0E420D993714D94D70772C
6,125,700 UART: [art] SIG.S = D2A4490528FEE1160185C34ED51340322A61046290A52EAD567DA84D88CC10742BF022DD36E8443E88F199E78D4BFD1D
6,150,168 UART: Caliptra RT
6,150,421 UART: [state] CFI Enabled
6,429,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,460,663 UART: [rt]cmd =0x41545348, len=116
6,482,863 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
893,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,024 UART: [kat] ++
898,176 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,287 UART: [kat] SHA2-512-ACC
909,188 UART: [kat] ECC-384
919,157 UART: [kat] HMAC-384Kdf
923,821 UART: [kat] LMS
1,172,149 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,062 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 ready_for_fw is high
1,177,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,201,946 UART: [idev] Sha1 KeyId Algorithm
1,210,494 UART: [idev] --
1,211,466 UART: [ldev] ++
1,211,634 UART: [ldev] CDI.KEYID = 6
1,211,997 UART: [ldev] SUBJECT.KEYID = 5
1,212,423 UART: [ldev] AUTHORITY.KEYID = 7
1,212,886 UART: [ldev] FE.KEYID = 1
1,218,474 UART: [ldev] Erasing FE.KEYID = 1
1,245,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,536 UART: [ldev] --
1,284,981 UART: [fwproc] Wait for Commands...
1,285,581 UART: [fwproc] Recv command 0x46574c44
1,286,309 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,539 >>> mbox cmd response: success
2,778,593 UART: [afmc] ++
2,778,761 UART: [afmc] CDI.KEYID = 6
2,779,123 UART: [afmc] SUBJECT.KEYID = 7
2,779,548 UART: [afmc] AUTHORITY.KEYID = 5
2,814,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,138 UART: [afmc] --
2,858,124 UART: [cold-reset] --
2,858,842 UART: [state] Locking Datavault
2,859,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,587 UART: [state] Locking ICCM
2,861,011 UART: [exit] Launching FMC @ 0x40000130
2,866,340 UART:
2,866,356 UART: Running Caliptra FMC ...
2,866,764 UART:
2,866,907 UART: [state] CFI Enabled
2,877,514 UART: [fht] FMC Alias Private Key: 7
2,985,649 UART: [art] Extend RT PCRs Done
2,986,077 UART: [art] Lock RT PCRs Done
2,987,681 UART: [art] Populate DV Done
2,995,720 UART: [fht] FMC Alias Private Key: 7
2,996,746 UART: [art] Derive CDI
2,997,026 UART: [art] Store in in slot 0x4
3,082,683 UART: [art] Derive Key Pair
3,083,043 UART: [art] Store priv key in slot 0x5
3,096,695 UART: [art] Derive Key Pair - Done
3,111,373 UART: [art] Signing Cert with AUTHO
3,111,853 UART: RITY.KEYID = 7
3,127,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,974 UART: [art] PUB.X = 26FC0AE4BFD6EC5FA32D0096D7515123C110819267EFB9BD6671FA81B4F3A2598F99A93DE7D6B1150D28CE6C2EB4AD78
3,134,730 UART: [art] PUB.Y = F01CDC4195EEE2701CBDA8D1E50BEAEF85EEC3E479A0F27E5901281DED240CCC0ABEF4782F486856F1F0B5579D5B5128
3,141,688 UART: [art] SIG.R = B2203F96F69E875809985E6EFE872E29D6602CCFFB62091E92666049F78AC07B9CC46A6F8F49204514F64A9A12BBA28A
3,148,454 UART: [art] SIG.S = CE7D8CB840B7B8B52A7CAF8D18744CAB4A8593038003D13499429C38E7A8E87C4ACD07B3A019C9C08E85F143753C60E1
3,171,730 UART: Caliptra RT
3,172,075 UART: [state] CFI Enabled
3,279,631 UART: [rt] RT listening for mailbox commands...
3,280,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,435 UART: [rt]cmd =0x41544d4e, len=14344
3,547,959 >>> mbox cmd response data (8 bytes)
3,547,960 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,057 UART: [rt]cmd =0x41545348, len=116
3,599,863 >>> mbox cmd response data (12 bytes)
3,599,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,333 UART:
3,600,349 UART: Running Caliptra ROM ...
3,600,757 UART:
3,600,899 UART: [state] CFI Enabled
3,603,793 UART: [state] LifecycleState = Unprovisioned
3,604,448 UART: [state] DebugLocked = No
3,605,074 UART: [state] WD Timer not started. Device not locked for debugging
3,606,340 UART: [kat] SHA2-256
4,411,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,416,115 UART: [kat] ++
4,416,267 UART: [kat] sha1
4,420,405 UART: [kat] SHA2-256
4,422,345 UART: [kat] SHA2-384
4,425,248 UART: [kat] SHA2-512-ACC
4,427,148 UART: [kat] ECC-384
4,436,963 UART: [kat] HMAC-384Kdf
4,441,433 UART: [kat] LMS
4,689,761 UART: [kat] --
4,690,725 UART: [update-reset] ++
6,005,238 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,006,405 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,156,403 >>> mbox cmd response: success
6,156,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,156,582 UART: [update-reset] Copying MAN_2 To MAN_1
6,164,596 UART: [update-reset Success] --
6,165,657 UART: [state] Locking Datavault
6,166,573 UART: [state] Locking PCR0, PCR1 and PCR31
6,167,177 UART: [state] Locking ICCM
6,167,709 UART: [exit] Launching FMC @ 0x40000130
6,173,038 UART:
6,173,054 UART: Running Caliptra FMC ...
6,173,462 UART:
6,173,605 UART: [state] CFI Enabled
6,263,290 UART: [art] Extend RT PCRs Done
6,263,718 UART: [art] Lock RT PCRs Done
6,264,921 UART: [art] Populate DV Done
6,272,980 UART: [fht] FMC Alias Private Key: 7
6,274,056 UART: [art] Derive CDI
6,274,336 UART: [art] Store in in slot 0x4
6,360,223 UART: [art] Derive Key Pair
6,360,583 UART: [art] Store priv key in slot 0x5
6,373,999 UART: [art] Derive Key Pair - Done
6,388,699 UART: [art] Signing Cert with AUTHO
6,389,179 UART: RITY.KEYID = 7
6,404,187 UART: [art] Erasing AUTHORITY.KEYID = 7
6,404,952 UART: [art] PUB.X = 41CC7642C629C8E65405EF24395C2674C58C54351CC2AD2CEADCFBC710D0B7259E38FC552B7EFFFDA6A34C944DF017D8
6,411,735 UART: [art] PUB.Y = 51925C2D1F26F167EC375DEF71A90E32F1AA2156FBA5F3009151F9F44F8BFAE5777CF9F1DE6393B15C8ECF96B131FAA6
6,418,676 UART: [art] SIG.R = A5EC99BF5F512C483B59CE625DA1AFFA80C19985B3082DD31B20A836A20B77BDBE962B191BD19A7572CB6378C576F574
6,425,450 UART: [art] SIG.S = B7226B03E24491586E86BC764F0C744F2BBCCA4C0066705F82CC5CCB658F48EDBFABB83E7D4A1CD79A2784CDD7F039BF
6,448,983 UART: Caliptra RT
6,449,328 UART: [state] CFI Enabled
6,727,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,613 UART: [rt]cmd =0x41545348, len=116
6,780,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 ready_for_fw is high
1,060,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,200 >>> mbox cmd response: success
2,691,684 UART:
2,691,700 UART: Running Caliptra FMC ...
2,692,108 UART:
2,692,251 UART: [state] CFI Enabled
2,702,508 UART: [fht] FMC Alias Private Key: 7
2,810,975 UART: [art] Extend RT PCRs Done
2,811,403 UART: [art] Lock RT PCRs Done
2,812,839 UART: [art] Populate DV Done
2,821,226 UART: [fht] FMC Alias Private Key: 7
2,822,154 UART: [art] Derive CDI
2,822,434 UART: [art] Store in in slot 0x4
2,907,959 UART: [art] Derive Key Pair
2,908,319 UART: [art] Store priv key in slot 0x5
2,921,733 UART: [art] Derive Key Pair - Done
2,936,792 UART: [art] Signing Cert with AUTHO
2,937,272 UART: RITY.KEYID = 7
2,952,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,333 UART: [art] PUB.X = EF56227DEFA913F84846843337CB0EFFCD4BF18D577E1560C987DC4E04E1293250325BA69C839BD5E0ADC77B3F09F67C
2,960,104 UART: [art] PUB.Y = 36B648A6394E0076F06346141DEEE865E5382DDAB4541DA5EA7C979F19B09D4DDCB9006911D89CB6E405DBD047D02081
2,967,011 UART: [art] SIG.R = 232A00740B9DDE013F9FBB062E98696D3DF300AD3DEB8C9B62F723E40F37C90074D6C0B5570FD23D02297622612B0539
2,973,694 UART: [art] SIG.S = C1ACF668696C7F11141447BB1D44DB15650CD1480E591EACEC0DA604D16DF4595E754D05F5F9A58A23DD9C49C87E1349
2,997,662 UART: Caliptra RT
2,998,007 UART: [state] CFI Enabled
3,104,558 UART: [rt] RT listening for mailbox commands...
3,105,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,218 UART: [rt]cmd =0x41544d4e, len=14344
3,372,740 >>> mbox cmd response data (8 bytes)
3,372,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,786 UART: [rt]cmd =0x41545348, len=116
3,423,946 >>> mbox cmd response data (12 bytes)
3,423,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,864,517 >>> mbox cmd response: success
5,864,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,878,101 UART:
5,878,117 UART: Running Caliptra FMC ...
5,878,525 UART:
5,878,668 UART: [state] CFI Enabled
5,967,383 UART: [art] Extend RT PCRs Done
5,967,811 UART: [art] Lock RT PCRs Done
5,969,124 UART: [art] Populate DV Done
5,977,055 UART: [fht] FMC Alias Private Key: 7
5,978,219 UART: [art] Derive CDI
5,978,499 UART: [art] Store in in slot 0x4
6,063,894 UART: [art] Derive Key Pair
6,064,254 UART: [art] Store priv key in slot 0x5
6,078,012 UART: [art] Derive Key Pair - Done
6,092,849 UART: [art] Signing Cert with AUTHO
6,093,329 UART: RITY.KEYID = 7
6,108,649 UART: [art] Erasing AUTHORITY.KEYID = 7
6,109,414 UART: [art] PUB.X = 3638FD8F730B28DA907330B5B36F5D042F06755F6EAF121032195121F108849C1F410F102F21E47FC10F37F4C9F32CD4
6,116,162 UART: [art] PUB.Y = 461E05A9AEC1631CB4652B7C5019B42EB6E9C32912772D8D086A29C9D08251A603B97591651E69650E5F90B8BE6E460E
6,123,093 UART: [art] SIG.R = 327E9F2E57DF2C541F528F1B8F797C66D195672FD1AEA14640D98A9C9A49CAE1C10D0B1746C0AB11C7096BB6AE233629
6,129,862 UART: [art] SIG.S = 4B6A8E74BC99615EBAE14678F38C97BDAFFE3AF86D3D1F75C059B3F011A3C1FE679649F89B0596F1C1A38801F25BE702
6,153,366 UART: Caliptra RT
6,153,711 UART: [state] CFI Enabled
6,432,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,807 UART: [rt]cmd =0x41545348, len=116
6,485,963 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,474 UART: [state] LifecycleState = Unprovisioned
85,129 UART: [state] DebugLocked = No
85,613 UART: [state] WD Timer not started. Device not locked for debugging
86,770 UART: [kat] SHA2-256
890,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,449 UART: [kat] ++
894,601 UART: [kat] sha1
898,845 UART: [kat] SHA2-256
900,785 UART: [kat] SHA2-384
903,772 UART: [kat] SHA2-512-ACC
905,673 UART: [kat] ECC-384
915,380 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,168,961 UART: [cold-reset] ++
1,169,513 UART: [fht] FHT @ 0x50003400
1,172,273 UART: [idev] ++
1,172,441 UART: [idev] CDI.KEYID = 6
1,172,802 UART: [idev] SUBJECT.KEYID = 7
1,173,227 UART: [idev] UDS.KEYID = 0
1,173,573 ready_for_fw is high
1,173,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,281,005 UART: [fwproc] Recv command 0x46574c44
1,281,738 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,152 >>> mbox cmd response: success
2,772,309 UART: [afmc] ++
2,772,477 UART: [afmc] CDI.KEYID = 6
2,772,840 UART: [afmc] SUBJECT.KEYID = 7
2,773,266 UART: [afmc] AUTHORITY.KEYID = 5
2,808,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,248 UART: [afmc] --
2,852,376 UART: [cold-reset] --
2,853,326 UART: [state] Locking Datavault
2,854,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,937 UART: [state] Locking ICCM
2,855,409 UART: [exit] Launching FMC @ 0x40000130
2,860,738 UART:
2,860,754 UART: Running Caliptra FMC ...
2,861,162 UART:
2,861,216 UART: [state] CFI Enabled
2,871,333 UART: [fht] FMC Alias Private Key: 7
2,979,110 UART: [art] Extend RT PCRs Done
2,979,538 UART: [art] Lock RT PCRs Done
2,980,844 UART: [art] Populate DV Done
2,989,033 UART: [fht] FMC Alias Private Key: 7
2,990,141 UART: [art] Derive CDI
2,990,421 UART: [art] Store in in slot 0x4
3,075,920 UART: [art] Derive Key Pair
3,076,280 UART: [art] Store priv key in slot 0x5
3,089,754 UART: [art] Derive Key Pair - Done
3,104,455 UART: [art] Signing Cert with AUTHO
3,104,935 UART: RITY.KEYID = 7
3,120,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,054 UART: [art] PUB.X = BF23C9B668031E347FE4915A44C05A54C94666EAC888FEA6C3CFF20EE07A781BF0D43C033A7C9DBF71B2048EB03DC6EB
3,127,830 UART: [art] PUB.Y = 4E8542B012F947A78B3DC5EEBD01B749861C6A198464E7F15CA2890E914457F1D6913DB1D68072E359EA55FBED42CF8E
3,134,780 UART: [art] SIG.R = 8CBDBADC571EC6F57573B516267DFAC24115F6E0B1100B15A480450684112C574AA6481537FC58C325C1DA2C40837054
3,141,542 UART: [art] SIG.S = DF876CBBADF1E98BEDF62A3A4AF6CD54528E1ACA9F987C0ADDCBA47B8A6714948075FC8FB54227478615DC6872AFDC82
3,165,262 UART: Caliptra RT
3,165,515 UART: [state] CFI Enabled
3,273,865 UART: [rt] RT listening for mailbox commands...
3,274,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,363 UART: [rt]cmd =0x41544d4e, len=14344
3,542,031 >>> mbox cmd response data (8 bytes)
3,542,032 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,933 UART: [rt]cmd =0x41545348, len=116
3,593,561 >>> mbox cmd response data (12 bytes)
3,593,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,415 UART:
3,594,431 UART: Running Caliptra ROM ...
3,594,839 UART:
3,594,894 UART: [state] CFI Enabled
3,597,806 UART: [state] LifecycleState = Unprovisioned
3,598,461 UART: [state] DebugLocked = No
3,599,169 UART: [state] WD Timer not started. Device not locked for debugging
3,600,339 UART: [kat] SHA2-256
4,403,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,408,018 UART: [kat] ++
4,408,170 UART: [kat] sha1
4,412,290 UART: [kat] SHA2-256
4,414,230 UART: [kat] SHA2-384
4,416,943 UART: [kat] SHA2-512-ACC
4,418,843 UART: [kat] ECC-384
4,428,126 UART: [kat] HMAC-384Kdf
4,432,758 UART: [kat] LMS
4,681,070 UART: [kat] --
4,682,006 UART: [update-reset] ++
5,996,212 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,997,219 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,147,217 >>> mbox cmd response: success
6,147,217 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,526 UART: [update-reset] Copying MAN_2 To MAN_1
6,155,540 UART: [update-reset Success] --
6,156,605 UART: [state] Locking Datavault
6,157,315 UART: [state] Locking PCR0, PCR1 and PCR31
6,157,919 UART: [state] Locking ICCM
6,158,553 UART: [exit] Launching FMC @ 0x40000130
6,163,882 UART:
6,163,898 UART: Running Caliptra FMC ...
6,164,306 UART:
6,164,360 UART: [state] CFI Enabled
6,253,679 UART: [art] Extend RT PCRs Done
6,254,107 UART: [art] Lock RT PCRs Done
6,255,384 UART: [art] Populate DV Done
6,263,481 UART: [fht] FMC Alias Private Key: 7
6,264,491 UART: [art] Derive CDI
6,264,771 UART: [art] Store in in slot 0x4
6,350,274 UART: [art] Derive Key Pair
6,350,634 UART: [art] Store priv key in slot 0x5
6,363,138 UART: [art] Derive Key Pair - Done
6,377,860 UART: [art] Signing Cert with AUTHO
6,378,340 UART: RITY.KEYID = 7
6,393,436 UART: [art] Erasing AUTHORITY.KEYID = 7
6,394,201 UART: [art] PUB.X = 58AEDD62E20EB35830F90C1437D183F6C80DDDDFEAE5F322D2590F327CD48B2A04B9C799DE3D802BDAA44E89C58B21D9
6,400,974 UART: [art] PUB.Y = 4F25F49672093E3B3B6C5A555FEF8C2087BDC89535B5A306B9780E81CBE6F5518F89F2D32F3204DFE198392DB71ABFFC
6,407,922 UART: [art] SIG.R = 41129C3676AE54A246728425010BFE7DC31767ADA0C7AA046F9EA761097CDCC3C46458306E110545349073D1777A2F32
6,414,669 UART: [art] SIG.S = 346DE880E861CFF6E3A7EB0A679ECF91555B649BBA22FD3073932ABB5A4F06CD7FA2D0F6B40A1C85B8963DD2A8064DDB
6,438,272 UART: Caliptra RT
6,438,525 UART: [state] CFI Enabled
6,718,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,749,411 UART: [rt]cmd =0x41545348, len=116
6,771,709 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,442 ready_for_fw is high
1,056,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,370 >>> mbox cmd response: success
2,684,210 UART:
2,684,226 UART: Running Caliptra FMC ...
2,684,634 UART:
2,684,688 UART: [state] CFI Enabled
2,695,349 UART: [fht] FMC Alias Private Key: 7
2,803,440 UART: [art] Extend RT PCRs Done
2,803,868 UART: [art] Lock RT PCRs Done
2,805,350 UART: [art] Populate DV Done
2,813,639 UART: [fht] FMC Alias Private Key: 7
2,814,663 UART: [art] Derive CDI
2,814,943 UART: [art] Store in in slot 0x4
2,900,498 UART: [art] Derive Key Pair
2,900,858 UART: [art] Store priv key in slot 0x5
2,913,734 UART: [art] Derive Key Pair - Done
2,928,526 UART: [art] Signing Cert with AUTHO
2,929,006 UART: RITY.KEYID = 7
2,944,342 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,107 UART: [art] PUB.X = 94A5BF412C5B6670FE79727F7ED75577109FDB65CC15077FCC284DF5F844736304F38F8ECABF5F0E456625384C2B443D
2,951,872 UART: [art] PUB.Y = FBC7ED12B4D0FB4530A5C3612719AFCE0162DD7400CC94495AFD0B2800F33AFF5E241F1CC244B2CD30EE67C2A5BEC357
2,958,792 UART: [art] SIG.R = E95BED68388279292529A44C49B5DC4F0BE41BD94640AAD42DD0909EC691C2652BA4E90167035B5806CA3A5D2D2BCD33
2,965,556 UART: [art] SIG.S = E468DD7E77B97E8B35F082FA42A21DC5180CA4181AD8230FF7F936E75C44B1B7FD19684115BE046CB018CCED9803A150
2,989,357 UART: Caliptra RT
2,989,610 UART: [state] CFI Enabled
3,096,452 UART: [rt] RT listening for mailbox commands...
3,097,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,106 UART: [rt]cmd =0x41544d4e, len=14344
3,364,880 >>> mbox cmd response data (8 bytes)
3,364,881 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,948 UART: [rt]cmd =0x41545348, len=116
3,416,542 >>> mbox cmd response data (12 bytes)
3,416,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,851,275 >>> mbox cmd response: success
5,851,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,864,551 UART:
5,864,567 UART: Running Caliptra FMC ...
5,864,975 UART:
5,865,029 UART: [state] CFI Enabled
5,953,972 UART: [art] Extend RT PCRs Done
5,954,400 UART: [art] Lock RT PCRs Done
5,955,657 UART: [art] Populate DV Done
5,963,760 UART: [fht] FMC Alias Private Key: 7
5,964,744 UART: [art] Derive CDI
5,965,024 UART: [art] Store in in slot 0x4
6,050,329 UART: [art] Derive Key Pair
6,050,689 UART: [art] Store priv key in slot 0x5
6,063,633 UART: [art] Derive Key Pair - Done
6,078,512 UART: [art] Signing Cert with AUTHO
6,078,992 UART: RITY.KEYID = 7
6,094,066 UART: [art] Erasing AUTHORITY.KEYID = 7
6,094,831 UART: [art] PUB.X = 0310957306514A7C4CEE05BD83C18B6093D258E4CAFCF1328ACA1B593617F32EFC80A1A87D77EAB75A1D780508EA5D76
6,101,594 UART: [art] PUB.Y = C613CA203AA22C695D487E1731AF45D38A68FE9C6EF001A9A07A0CDCC6B70E8A36451D751998B775FBFBEDD4CBF9BBDC
6,108,559 UART: [art] SIG.R = E02BB632844667AC76867460598D5719479CD5AE545BC3D2A93B9ABC951107B81CD2F22858D7C7C4CACB278EF22FCCFE
6,115,336 UART: [art] SIG.S = F3FB8ED2C68D0E5166CBD345D04724B5538824913578FE9A878A52921A4C5CB8BED71C1ADBC89CCD522232DCD7049913
6,139,427 UART: Caliptra RT
6,139,680 UART: [state] CFI Enabled
6,419,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,450,159 UART: [rt]cmd =0x41545348, len=116
6,472,265 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,174,868 ready_for_fw is high
1,174,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,238 UART: [fwproc] Recv command 0x46574c44
1,283,971 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,149 >>> mbox cmd response: success
2,776,250 UART: [afmc] ++
2,776,418 UART: [afmc] CDI.KEYID = 6
2,776,781 UART: [afmc] SUBJECT.KEYID = 7
2,777,207 UART: [afmc] AUTHORITY.KEYID = 5
2,813,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,655 UART: [afmc] --
2,856,747 UART: [cold-reset] --
2,857,447 UART: [state] Locking Datavault
2,858,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,234 UART: [state] Locking ICCM
2,859,720 UART: [exit] Launching FMC @ 0x40000130
2,865,049 UART:
2,865,065 UART: Running Caliptra FMC ...
2,865,473 UART:
2,865,616 UART: [state] CFI Enabled
2,876,633 UART: [fht] FMC Alias Private Key: 7
2,984,438 UART: [art] Extend RT PCRs Done
2,984,866 UART: [art] Lock RT PCRs Done
2,986,742 UART: [art] Populate DV Done
2,995,039 UART: [fht] FMC Alias Private Key: 7
2,995,985 UART: [art] Derive CDI
2,996,265 UART: [art] Store in in slot 0x4
3,082,306 UART: [art] Derive Key Pair
3,082,666 UART: [art] Store priv key in slot 0x5
3,096,320 UART: [art] Derive Key Pair - Done
3,111,150 UART: [art] Signing Cert with AUTHO
3,111,630 UART: RITY.KEYID = 7
3,126,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,571 UART: [art] PUB.X = AA86A193E1C1E5EB827F5BBF785F586C74C46DB2F388C669AAF34F3A9C246BA77F5B605EA38A7165D1BF09E4853F3AFB
3,134,356 UART: [art] PUB.Y = DC5842B36C2B4847CA42BECA84D85814B9AF99946628C97434422AF99616C8955FD0326A86E145D4890373D9F0478E99
3,141,295 UART: [art] SIG.R = 8017FB8B825899A7E9E9624F7B4FC5B75EA8F2064AC8B9B8B786AE199F2AA81DFD39FB45B014F2FA3A0855FBB892D577
3,148,073 UART: [art] SIG.S = 5F7FFBF66FC6528E8ED6774ACCEB6C3D0B433DB18860B751818DBAD70B2406005393086B0D32CAC805DC5D471FB0512B
3,171,680 UART: Caliptra RT
3,172,025 UART: [state] CFI Enabled
3,279,936 UART: [rt] RT listening for mailbox commands...
3,280,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,406 UART: [rt]cmd =0x41544d4e, len=14344
3,547,930 >>> mbox cmd response data (8 bytes)
3,547,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,220 UART: [rt]cmd =0x41545348, len=116
3,600,202 >>> mbox cmd response data (12 bytes)
3,600,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,854 UART:
3,600,870 UART: Running Caliptra ROM ...
3,601,278 UART:
3,601,420 UART: [state] CFI Enabled
3,604,396 UART: [state] LifecycleState = Unprovisioned
3,605,051 UART: [state] DebugLocked = No
3,605,603 UART: [state] WD Timer not started. Device not locked for debugging
3,606,751 UART: [kat] SHA2-256
4,410,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,414,430 UART: [kat] ++
4,414,582 UART: [kat] sha1
4,418,710 UART: [kat] SHA2-256
4,420,650 UART: [kat] SHA2-384
4,423,363 UART: [kat] SHA2-512-ACC
4,425,263 UART: [kat] ECC-384
4,435,014 UART: [kat] HMAC-384Kdf
4,439,654 UART: [kat] LMS
4,687,966 UART: [kat] --
4,688,842 UART: [update-reset] ++
6,002,052 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,003,101 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,153,099 >>> mbox cmd response: success
6,153,099 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,153,454 UART: [update-reset] Copying MAN_2 To MAN_1
6,161,468 UART: [update-reset Success] --
6,162,571 UART: [state] Locking Datavault
6,163,529 UART: [state] Locking PCR0, PCR1 and PCR31
6,164,133 UART: [state] Locking ICCM
6,164,737 UART: [exit] Launching FMC @ 0x40000130
6,170,066 UART:
6,170,082 UART: Running Caliptra FMC ...
6,170,490 UART:
6,170,633 UART: [state] CFI Enabled
6,259,678 UART: [art] Extend RT PCRs Done
6,260,106 UART: [art] Lock RT PCRs Done
6,261,331 UART: [art] Populate DV Done
6,269,504 UART: [fht] FMC Alias Private Key: 7
6,270,536 UART: [art] Derive CDI
6,270,816 UART: [art] Store in in slot 0x4
6,356,647 UART: [art] Derive Key Pair
6,357,007 UART: [art] Store priv key in slot 0x5
6,370,509 UART: [art] Derive Key Pair - Done
6,385,357 UART: [art] Signing Cert with AUTHO
6,385,837 UART: RITY.KEYID = 7
6,400,921 UART: [art] Erasing AUTHORITY.KEYID = 7
6,401,686 UART: [art] PUB.X = 8C205F16161DE682383BB40657EFB5137E5831736618D3BA071FE8712C63C39D7115341ABE2091AA3916AC9673D2C5C2
6,408,444 UART: [art] PUB.Y = FAFB56E96B48F12A2D778FE85813478BD46103352DB41E5AD4AA8E74C3B581C17477387497EA26AAEF12D8A9EFAD9052
6,415,401 UART: [art] SIG.R = 84D13EBB7EA4F81A371F0CE25F7BC686181015D6A310890C9A3CA7D6F9EF37879E785358B38D9DB0F307429BD9D56888
6,422,166 UART: [art] SIG.S = 70214BECDCC65B288A08B276F1EB63732E49686971A383F0DAE057A0A8D5C664F46556EA6DA98E29935F9CAD055DC81E
6,445,581 UART: Caliptra RT
6,445,926 UART: [state] CFI Enabled
6,724,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,755,576 UART: [rt]cmd =0x41545348, len=116
6,776,822 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,551 ready_for_fw is high
1,056,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,297 >>> mbox cmd response: success
2,688,779 UART:
2,688,795 UART: Running Caliptra FMC ...
2,689,203 UART:
2,689,346 UART: [state] CFI Enabled
2,700,077 UART: [fht] FMC Alias Private Key: 7
2,808,286 UART: [art] Extend RT PCRs Done
2,808,714 UART: [art] Lock RT PCRs Done
2,810,464 UART: [art] Populate DV Done
2,818,409 UART: [fht] FMC Alias Private Key: 7
2,819,369 UART: [art] Derive CDI
2,819,649 UART: [art] Store in in slot 0x4
2,905,206 UART: [art] Derive Key Pair
2,905,566 UART: [art] Store priv key in slot 0x5
2,918,782 UART: [art] Derive Key Pair - Done
2,933,496 UART: [art] Signing Cert with AUTHO
2,933,976 UART: RITY.KEYID = 7
2,948,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,509 UART: [art] PUB.X = F2D3B3812F7E133F94CF0998253123E26BA0762EA8BD9398E94C8847AC738F4528879590C66F7B537433C7EF8376BE5C
2,956,272 UART: [art] PUB.Y = 1E61A5EDF8286A87FC17FECCF27DEE51617CBECB66164DE8B1315DBB13F48BBDEAE3C78270B65AAE478E3DCAF92B968A
2,963,252 UART: [art] SIG.R = 590FE1F513DE3E7DC1124BA3D66F7C6A5516677871D48BD576952D0400901C4C8696E55AB29843E3CFF9D14FE80AE2B2
2,969,995 UART: [art] SIG.S = 46CE4293D00E70183A21DD95E0175CCA92448C581D44CED0A0EA2A568353BDFAFA7972C675988EDC4AA158C039F473EB
2,993,541 UART: Caliptra RT
2,993,886 UART: [state] CFI Enabled
3,101,467 UART: [rt] RT listening for mailbox commands...
3,102,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,181 UART: [rt]cmd =0x41544d4e, len=14344
3,369,901 >>> mbox cmd response data (8 bytes)
3,369,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,841 UART: [rt]cmd =0x41545348, len=116
3,421,129 >>> mbox cmd response data (12 bytes)
3,421,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,856,359 >>> mbox cmd response: success
5,856,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,870,019 UART:
5,870,035 UART: Running Caliptra FMC ...
5,870,443 UART:
5,870,586 UART: [state] CFI Enabled
5,960,625 UART: [art] Extend RT PCRs Done
5,961,053 UART: [art] Lock RT PCRs Done
5,962,172 UART: [art] Populate DV Done
5,970,331 UART: [fht] FMC Alias Private Key: 7
5,971,291 UART: [art] Derive CDI
5,971,571 UART: [art] Store in in slot 0x4
6,056,910 UART: [art] Derive Key Pair
6,057,270 UART: [art] Store priv key in slot 0x5
6,070,754 UART: [art] Derive Key Pair - Done
6,085,404 UART: [art] Signing Cert with AUTHO
6,085,884 UART: RITY.KEYID = 7
6,100,456 UART: [art] Erasing AUTHORITY.KEYID = 7
6,101,221 UART: [art] PUB.X = 1D8263B30090D97AFDBEEAEC69177F8D31C0245A7E326FDC7E2B6A8D5C500DF2915296BFD84D248DCA88899F15D439A5
6,107,978 UART: [art] PUB.Y = EB3827CA4CB957BA72FF2ACB6F797F753FD744A7DA64D1F92CC313E04C015985F1147E3531AB36C24CB9B6B8EDF0A7EB
6,114,945 UART: [art] SIG.R = AF22702A127D350462416D0858BEDD37E670ECD492E2B5FCEF9C8C51052B73214CB840400A9288372BAB450BFEF81BA9
6,121,706 UART: [art] SIG.S = 28BB018DF5AC950B14523E582228A567E766C0642F93600FE05797CE799CE6F7E7B518DA3C7A0020CDD8CFC1D4201B11
6,145,598 UART: Caliptra RT
6,145,943 UART: [state] CFI Enabled
6,426,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,457,037 UART: [rt]cmd =0x41545348, len=116
6,478,957 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,185 UART:
192,542 UART: Running Caliptra ROM ...
193,759 UART:
193,916 UART: [state] CFI Enabled
265,799 UART: [state] LifecycleState = Unprovisioned
267,711 UART: [state] DebugLocked = No
269,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,964 UART: [kat] SHA2-256
444,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,150 UART: [kat] ++
455,631 UART: [kat] sha1
467,504 UART: [kat] SHA2-256
470,156 UART: [kat] SHA2-384
475,876 UART: [kat] SHA2-512-ACC
478,183 UART: [kat] ECC-384
2,769,801 UART: [kat] HMAC-384Kdf
2,800,223 UART: [kat] LMS
3,990,517 UART: [kat] --
3,996,234 UART: [cold-reset] ++
3,998,603 UART: [fht] Storing FHT @ 0x50003400
4,010,293 UART: [idev] ++
4,010,867 UART: [idev] CDI.KEYID = 6
4,011,758 UART: [idev] SUBJECT.KEYID = 7
4,012,997 UART: [idev] UDS.KEYID = 0
4,014,080 ready_for_fw is high
4,014,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,256 UART: [idev] Erasing UDS.KEYID = 0
7,348,099 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,659 UART: [idev] --
7,373,690 UART: [ldev] ++
7,374,268 UART: [ldev] CDI.KEYID = 6
7,375,236 UART: [ldev] SUBJECT.KEYID = 5
7,376,448 UART: [ldev] AUTHORITY.KEYID = 7
7,377,631 UART: [ldev] FE.KEYID = 1
7,423,763 UART: [ldev] Erasing FE.KEYID = 1
10,755,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,752 UART: [ldev] --
13,138,530 UART: [fwproc] Waiting for Commands...
13,141,214 UART: [fwproc] Received command 0x46574c44
13,143,397 UART: [fwproc] Received Image of size 114124 bytes
17,201,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,511 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,660,773 >>> mbox cmd response: success
17,665,501 UART: [afmc] ++
17,666,097 UART: [afmc] CDI.KEYID = 6
17,667,013 UART: [afmc] SUBJECT.KEYID = 7
17,668,298 UART: [afmc] AUTHORITY.KEYID = 5
21,025,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,786 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,063 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,567 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,282 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,704 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,115 UART: [afmc] --
23,396,087 UART: [cold-reset] --
23,399,959 UART: [state] Locking Datavault
23,405,216 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,992 UART: [state] Locking ICCM
23,409,092 UART: [exit] Launching FMC @ 0x40000130
23,417,496 UART:
23,417,738 UART: Running Caliptra FMC ...
23,418,837 UART:
23,418,996 UART: [state] CFI Enabled
23,486,939 UART: [fht] FMC Alias Private Key: 7
25,825,125 UART: [art] Extend RT PCRs Done
25,826,353 UART: [art] Lock RT PCRs Done
25,828,114 UART: [art] Populate DV Done
25,833,471 UART: [fht] FMC Alias Private Key: 7
25,834,952 UART: [art] Derive CDI
25,835,688 UART: [art] Store in in slot 0x4
25,895,592 UART: [art] Derive Key Pair
25,896,629 UART: [art] Store priv key in slot 0x5
29,188,631 UART: [art] Derive Key Pair - Done
29,201,894 UART: [art] Signing Cert with AUTHO
29,203,195 UART: RITY.KEYID = 7
31,490,551 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,062 UART: [art] PUB.X = 3DEFD40B57AC4B8AA5AD995DCCC5BA002F6C5C74F34363788EB938884F95E33B7401FCDB13A4D442F6D48DE5A9A95DF8
31,499,267 UART: [art] PUB.Y = 2299E72A4FBB516EB7CD00F32273F8636CF765E92707C11C0405947E8376753279BB5BAC5C8B36DACEE62E91DC99E6DE
31,506,519 UART: [art] SIG.R = 3130881965E72E8C67B9302A16C1255D1B87EAA8BB0D411F143AFB9E4EED5AA71F2854653456A7ADF0945815F41C60F4
31,513,931 UART: [art] SIG.S = 1785D94F2B28EF20415B4A5ACF307161B288721D2F1E6E522016E909A92DF75A4F417E95A4124396C044AC1609841201
32,819,885 UART: Caliptra RT
32,820,581 UART: [state] CFI Enabled
32,982,047 UART: [rt] RT listening for mailbox commands...
32,984,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,139,793 UART: [rt]cmd =0x41544d4e, len=14344
38,374,865 >>> mbox cmd response data (8 bytes)
38,375,510 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,406,297 UART: [rt]cmd =0x41545348, len=116
38,408,634 >>> mbox cmd response data (12 bytes)
40,541,215 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,686,485 UART:
40,686,836 UART: Running Caliptra ROM ...
40,687,972 UART:
40,688,143 UART: [state] CFI Enabled
40,754,252 UART: [state] LifecycleState = Unprovisioned
40,756,150 UART: [state] DebugLocked = No
40,758,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,762,976 UART: [kat] SHA2-256
40,932,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,943,164 UART: [kat] ++
40,943,709 UART: [kat] sha1
40,954,448 UART: [kat] SHA2-256
40,957,089 UART: [kat] SHA2-384
40,962,703 UART: [kat] SHA2-512-ACC
40,965,107 UART: [kat] ECC-384
43,253,232 UART: [kat] HMAC-384Kdf
43,285,286 UART: [kat] LMS
44,475,622 UART: [kat] --
44,481,029 UART: [update-reset] ++
48,626,339 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,630,280 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
49,012,555 >>> mbox cmd response: success
49,017,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,017,815 UART: [update-reset] Copying MAN_2 To MAN_1
49,036,380 UART: [update-reset Success] --
49,041,584 UART: [state] Locking Datavault
49,045,321 UART: [state] Locking PCR0, PCR1 and PCR31
49,047,026 UART: [state] Locking ICCM
49,048,117 UART: [exit] Launching FMC @ 0x40000130
49,056,517 UART:
49,056,752 UART: Running Caliptra FMC ...
49,057,854 UART:
49,058,016 UART: [state] CFI Enabled
49,162,438 UART: [art] Extend RT PCRs Done
49,163,632 UART: [art] Lock RT PCRs Done
49,165,196 UART: [art] Populate DV Done
49,170,611 UART: [fht] FMC Alias Private Key: 7
49,172,176 UART: [art] Derive CDI
49,173,000 UART: [art] Store in in slot 0x4
49,231,424 UART: [art] Derive Key Pair
49,232,421 UART: [art] Store priv key in slot 0x5
52,525,162 UART: [art] Derive Key Pair - Done
52,538,278 UART: [art] Signing Cert with AUTHO
52,539,578 UART: RITY.KEYID = 7
54,827,040 UART: [art] Erasing AUTHORITY.KEYID = 7
54,828,548 UART: [art] PUB.X = 4ECFB9A30B778EC2B2EC09019880DC3E1276FE7B9E6EB004ACFAACBD4A257EDFA710767D386CC3FE9FBA36734726854E
54,835,820 UART: [art] PUB.Y = D043BDAA467858A9F12B0A3308F2D713EEC01D18778F388979DE37918A681BEA9138D34D4C4E268FD67878993988841D
54,843,045 UART: [art] SIG.R = 838668156FBCEB5DFE2BFD2CCED2D23FA31116BE9E2E9DA05F11262E83094FCC2C9C7D6751EAFE05BEF9B4EECCA5D448
54,850,451 UART: [art] SIG.S = 78EE2F9626B10D30FD0C1BD2D6AC29C961E6EAEA68331AA6F18E4C29B39DDE3B9B6ADBD20347262E57CF7D3B804ADBB8
56,156,101 UART: Caliptra RT
56,156,909 UART: [state] CFI Enabled
56,495,269 UART: [rt] RT listening for mailbox commands...
56,527,117 UART: [rt]cmd =0x41545348, len=116
56,529,679 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,784,809 ready_for_fw is high
3,785,224 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,879,598 >>> mbox cmd response: success
23,567,692 UART:
23,568,085 UART: Running Caliptra FMC ...
23,569,282 UART:
23,569,449 UART: [state] CFI Enabled
23,636,782 UART: [fht] FMC Alias Private Key: 7
25,975,133 UART: [art] Extend RT PCRs Done
25,976,360 UART: [art] Lock RT PCRs Done
25,978,481 UART: [art] Populate DV Done
25,983,898 UART: [fht] FMC Alias Private Key: 7
25,985,441 UART: [art] Derive CDI
25,986,261 UART: [art] Store in in slot 0x4
26,045,655 UART: [art] Derive Key Pair
26,046,703 UART: [art] Store priv key in slot 0x5
29,339,550 UART: [art] Derive Key Pair - Done
29,352,441 UART: [art] Signing Cert with AUTHO
29,353,747 UART: RITY.KEYID = 7
31,641,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,711 UART: [art] PUB.X = 85ED6B700770CE86B4BABE3B130647F3AA8F860EBAE6555C76CA82AE4531F5EEBBEF934062AF12472E0F5E6C2016B21E
31,649,958 UART: [art] PUB.Y = 0FA985C2CF4E569C719B1F350DB340C2602215903EA7A7B06C83537CB54D19CF8285E76FF6D5DD468C2F92E344E0D383
31,657,223 UART: [art] SIG.R = 9ACE970B20D5C778119698A9642733A15FA2225A22DE139D33D538C09BBA7879E1395B08B82B4A12D72CD5A75A6F21B6
31,664,565 UART: [art] SIG.S = 2B3BDDA9C36E21714A5F9F48B9930A44A0688A13126408F659BC2EAFDBA9A7B682DEBF1CD1E7750CD2A3585B0F0D197E
32,970,358 UART: Caliptra RT
32,971,077 UART: [state] CFI Enabled
33,130,840 UART: [rt] RT listening for mailbox commands...
33,133,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,288,572 UART: [rt]cmd =0x41544d4e, len=14344
38,524,501 >>> mbox cmd response data (8 bytes)
38,525,098 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,555,834 UART: [rt]cmd =0x41545348, len=116
38,557,991 >>> mbox cmd response data (12 bytes)
40,690,454 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,404,120 >>> mbox cmd response: success
49,405,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,439,723 UART:
49,440,015 UART: Running Caliptra FMC ...
49,441,053 UART:
49,441,201 UART: [state] CFI Enabled
49,528,241 UART: [art] Extend RT PCRs Done
49,529,458 UART: [art] Lock RT PCRs Done
49,530,783 UART: [art] Populate DV Done
49,536,037 UART: [fht] FMC Alias Private Key: 7
49,537,574 UART: [art] Derive CDI
49,538,311 UART: [art] Store in in slot 0x4
49,597,547 UART: [art] Derive Key Pair
49,598,587 UART: [art] Store priv key in slot 0x5
52,891,289 UART: [art] Derive Key Pair - Done
52,904,089 UART: [art] Signing Cert with AUTHO
52,905,401 UART: RITY.KEYID = 7
55,193,117 UART: [art] Erasing AUTHORITY.KEYID = 7
55,194,624 UART: [art] PUB.X = A0FB678CF368E0DF1C27AA5AF600A495FFD8BB9F490332E775D33C97287E6DC1E8795F187310E93A61BC480AE91B9338
55,201,821 UART: [art] PUB.Y = 5417E543A6572AB03EE4EB8CE7B7C5654A6120379EC717D3DF508B93E5FD7F60918A162263FBDAE148FF9B9ACCDF3121
55,209,102 UART: [art] SIG.R = 0FDF6374EC046203E1BE00FF0FF845F7D64A3947CFB4E28CC90EB6879144D1CD366382F1E126682C6941626FA8D77B57
55,216,438 UART: [art] SIG.S = 2A1A26D5D0DA775F73446679BDCC29957030E925BC0818D102D9A527C0DF5E27FA5D112612411077207051848D48A9F4
56,521,480 UART: Caliptra RT
56,522,204 UART: [state] CFI Enabled
56,856,175 UART: [rt] RT listening for mailbox commands...
56,888,319 UART: [rt]cmd =0x41545348, len=116
56,890,896 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,633 UART:
193,009 UART: Running Caliptra ROM ...
194,223 UART:
603,622 UART: [state] CFI Enabled
620,556 UART: [state] LifecycleState = Unprovisioned
622,525 UART: [state] DebugLocked = No
623,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,763 UART: [kat] SHA2-256
798,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,080 UART: [kat] ++
809,610 UART: [kat] sha1
821,333 UART: [kat] SHA2-256
824,054 UART: [kat] SHA2-384
829,941 UART: [kat] SHA2-512-ACC
832,313 UART: [kat] ECC-384
3,117,370 UART: [kat] HMAC-384Kdf
3,128,102 UART: [kat] LMS
4,318,227 UART: [kat] --
4,323,104 UART: [cold-reset] ++
4,325,108 UART: [fht] Storing FHT @ 0x50003400
4,335,525 UART: [idev] ++
4,336,104 UART: [idev] CDI.KEYID = 6
4,337,056 UART: [idev] SUBJECT.KEYID = 7
4,338,300 UART: [idev] UDS.KEYID = 0
4,339,226 ready_for_fw is high
4,339,410 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,729 UART: [idev] Erasing UDS.KEYID = 0
7,626,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,687 UART: [idev] --
7,650,839 UART: [ldev] ++
7,651,403 UART: [ldev] CDI.KEYID = 6
7,652,334 UART: [ldev] SUBJECT.KEYID = 5
7,653,588 UART: [ldev] AUTHORITY.KEYID = 7
7,654,865 UART: [ldev] FE.KEYID = 1
7,666,827 UART: [ldev] Erasing FE.KEYID = 1
10,953,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,602 UART: [ldev] --
13,313,764 UART: [fwproc] Waiting for Commands...
13,316,395 UART: [fwproc] Received command 0x46574c44
13,318,634 UART: [fwproc] Received Image of size 114124 bytes
17,369,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,624 >>> mbox cmd response: success
17,840,143 UART: [afmc] ++
17,840,734 UART: [afmc] CDI.KEYID = 6
17,841,642 UART: [afmc] SUBJECT.KEYID = 7
17,842,907 UART: [afmc] AUTHORITY.KEYID = 5
21,159,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,715 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,077 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,919 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,344 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,452 UART: [afmc] --
23,523,906 UART: [cold-reset] --
23,527,220 UART: [state] Locking Datavault
23,530,356 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,106 UART: [state] Locking ICCM
23,533,230 UART: [exit] Launching FMC @ 0x40000130
23,541,623 UART:
23,541,855 UART: Running Caliptra FMC ...
23,543,128 UART:
23,543,320 UART: [state] CFI Enabled
23,551,234 UART: [fht] FMC Alias Private Key: 7
25,881,860 UART: [art] Extend RT PCRs Done
25,883,081 UART: [art] Lock RT PCRs Done
25,884,359 UART: [art] Populate DV Done
25,889,653 UART: [fht] FMC Alias Private Key: 7
25,891,297 UART: [art] Derive CDI
25,892,105 UART: [art] Store in in slot 0x4
25,934,316 UART: [art] Derive Key Pair
25,935,312 UART: [art] Store priv key in slot 0x5
29,177,261 UART: [art] Derive Key Pair - Done
29,190,165 UART: [art] Signing Cert with AUTHO
29,191,464 UART: RITY.KEYID = 7
31,470,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,403 UART: [art] PUB.X = 4C7C9BFFA4357E1D356D6105FC9E05064838E56541EA9F7A44C4FA0950362FF2E6E76C5E8816743887D8A93DE61E1019
31,479,609 UART: [art] PUB.Y = 2D5485DDBBA793C42AA4E66F6569B2FDE708D219D6BEF24EEBA0B7239F3E69B490D6C8F22FBC3D063FD43BEB495A574B
31,486,903 UART: [art] SIG.R = FEB713893D3696AE02F44B3AE98BAC6ACD9CBAC11EF35B247DFDDCC38D6EE3C337644E5EE7998A8D0717665D741ACFCB
31,494,280 UART: [art] SIG.S = 6BAD7D3D5BA51412902BC2A1E8300949CA765393BAEEBD3E2F05DC1356B928A47775F7DF6D8AB9657F73243C62429814
32,799,025 UART: Caliptra RT
32,799,731 UART: [state] CFI Enabled
32,916,906 UART: [rt] RT listening for mailbox commands...
32,919,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,074,870 UART: [rt]cmd =0x41544d4e, len=14344
38,310,976 >>> mbox cmd response data (8 bytes)
38,311,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,342,360 UART: [rt]cmd =0x41545348, len=116
38,344,534 >>> mbox cmd response data (12 bytes)
40,398,645 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,543,511 UART:
40,543,904 UART: Running Caliptra ROM ...
40,545,037 UART:
40,545,203 UART: [state] CFI Enabled
40,558,443 UART: [state] LifecycleState = Unprovisioned
40,560,325 UART: [state] DebugLocked = No
40,561,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,566,507 UART: [kat] SHA2-256
40,736,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,746,774 UART: [kat] ++
40,747,313 UART: [kat] sha1
40,758,363 UART: [kat] SHA2-256
40,761,054 UART: [kat] SHA2-384
40,767,201 UART: [kat] SHA2-512-ACC
40,769,598 UART: [kat] ECC-384
43,054,386 UART: [kat] HMAC-384Kdf
43,065,798 UART: [kat] LMS
44,255,847 UART: [kat] --
44,257,968 UART: [update-reset] ++
48,396,822 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,400,351 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,782,654 >>> mbox cmd response: success
48,787,371 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,787,973 UART: [update-reset] Copying MAN_2 To MAN_1
48,806,608 UART: [update-reset Success] --
48,812,410 UART: [state] Locking Datavault
48,814,527 UART: [state] Locking PCR0, PCR1 and PCR31
48,816,276 UART: [state] Locking ICCM
48,818,347 UART: [exit] Launching FMC @ 0x40000130
48,826,759 UART:
48,827,040 UART: Running Caliptra FMC ...
48,828,072 UART:
48,828,217 UART: [state] CFI Enabled
48,872,284 UART: [art] Extend RT PCRs Done
48,873,424 UART: [art] Lock RT PCRs Done
48,874,622 UART: [art] Populate DV Done
48,880,248 UART: [fht] FMC Alias Private Key: 7
48,881,884 UART: [art] Derive CDI
48,882,611 UART: [art] Store in in slot 0x4
48,925,024 UART: [art] Derive Key Pair
48,926,072 UART: [art] Store priv key in slot 0x5
52,167,959 UART: [art] Derive Key Pair - Done
52,180,749 UART: [art] Signing Cert with AUTHO
52,182,045 UART: RITY.KEYID = 7
54,461,436 UART: [art] Erasing AUTHORITY.KEYID = 7
54,462,979 UART: [art] PUB.X = 3BAC5741D56817F2248CEF25118B93C36BBB27AB1CCDD15051A0DB644255C4C33458D91684F07870E925C1FDECC3B829
54,470,178 UART: [art] PUB.Y = C1DA87BA4F7074A2EE4315E91342C9F259E70B570875537F141EF22BC3D6EA2ECD656CBFFEBE938FDC36436BB259F795
54,477,405 UART: [art] SIG.R = 76A70FB5A5C3AD1E9EA1640F20A39A35AB0584AEB98563F294DE0A48D716C70FF05EE08689C48AE197B0F9AAC0B54164
54,484,785 UART: [art] SIG.S = AA43A81D99EBFF3B60369BC9C044E1C87DBD857AABBB34C72E351CDCD6ED4E006C5F65D9023278FB17D808781C0876AC
55,789,441 UART: Caliptra RT
55,790,139 UART: [state] CFI Enabled
56,080,072 UART: [rt] RT listening for mailbox commands...
56,111,750 UART: [rt]cmd =0x41545348, len=116
56,114,120 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
4,125,105 ready_for_fw is high
4,125,479 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,982 >>> mbox cmd response: success
23,709,672 UART:
23,710,061 UART: Running Caliptra FMC ...
23,711,273 UART:
23,711,443 UART: [state] CFI Enabled
23,719,705 UART: [fht] FMC Alias Private Key: 7
26,050,010 UART: [art] Extend RT PCRs Done
26,051,242 UART: [art] Lock RT PCRs Done
26,053,002 UART: [art] Populate DV Done
26,058,270 UART: [fht] FMC Alias Private Key: 7
26,059,928 UART: [art] Derive CDI
26,060,740 UART: [art] Store in in slot 0x4
26,103,888 UART: [art] Derive Key Pair
26,104,930 UART: [art] Store priv key in slot 0x5
29,346,776 UART: [art] Derive Key Pair - Done
29,359,557 UART: [art] Signing Cert with AUTHO
29,360,898 UART: RITY.KEYID = 7
31,640,323 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,826 UART: [art] PUB.X = 49FF64D7FE16209D67FADFC1B63F45469E6D69BEF491D2D8415A6A996941E59F24AD362D8785AEE3D137FA50BC002298
31,649,111 UART: [art] PUB.Y = 2B39A84D80485024DEEFAB6DAD787B5D57115CCC7760E9DDBF05D9555C3CFF099C1F0BE5AA1D134B58F288862A82DCE3
31,656,356 UART: [art] SIG.R = 44F342230663079700F095A500221EDD702AD06049D9AA57BC57D341497ADFAD8F419A21AB2CDB55696475DA820A16CD
31,663,670 UART: [art] SIG.S = 7FB0294D296D51707F3CD379CC8022EAA39107747E4EE747C0A4BF44C3A4BC81BD0087EFE9481C247792D1DC0B7E4602
32,969,323 UART: Caliptra RT
32,970,017 UART: [state] CFI Enabled
33,087,106 UART: [rt] RT listening for mailbox commands...
33,089,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,244,664 UART: [rt]cmd =0x41544d4e, len=14344
38,480,218 >>> mbox cmd response data (8 bytes)
38,480,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,511,691 UART: [rt]cmd =0x41545348, len=116
38,513,945 >>> mbox cmd response data (12 bytes)
40,571,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,220,221 >>> mbox cmd response: success
49,221,020 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,254,047 UART:
49,254,348 UART: Running Caliptra FMC ...
49,255,387 UART:
49,255,529 UART: [state] CFI Enabled
49,299,023 UART: [art] Extend RT PCRs Done
49,300,227 UART: [art] Lock RT PCRs Done
49,301,421 UART: [art] Populate DV Done
49,307,104 UART: [fht] FMC Alias Private Key: 7
49,308,690 UART: [art] Derive CDI
49,309,500 UART: [art] Store in in slot 0x4
49,351,872 UART: [art] Derive Key Pair
49,352,870 UART: [art] Store priv key in slot 0x5
52,594,921 UART: [art] Derive Key Pair - Done
52,607,813 UART: [art] Signing Cert with AUTHO
52,609,115 UART: RITY.KEYID = 7
54,888,476 UART: [art] Erasing AUTHORITY.KEYID = 7
54,889,982 UART: [art] PUB.X = F976E9CD1EAAAD3C0FF7C64B208F378EF150FCF07FCE91165F12224E26D16A1BA346299A4F2082D740E03C0ACE452D27
54,897,230 UART: [art] PUB.Y = 897883A898C15BECF46530D8C7E34374B78469914417C74742E6DD265D0C1EA664BAEEAD816933283D4331997AA096E4
54,904,456 UART: [art] SIG.R = 3E83E819EC3303C32F959F4C0F6A51016135121ED326334A644D1AC12A8EE2AB97A6DF33F8C9A5A2B1C357C0092814C1
54,911,840 UART: [art] SIG.S = 4FFDE94C0A344899F743954B278C4D0BF3E42A134781BFEB28EFFD73E10500443ECDE871540403EDAE5AF8C63653674A
56,217,158 UART: Caliptra RT
56,217,872 UART: [state] CFI Enabled
56,508,089 UART: [rt] RT listening for mailbox commands...
56,540,055 UART: [rt]cmd =0x41545348, len=116
56,542,412 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,040 UART:
192,420 UART: Running Caliptra ROM ...
193,531 UART:
193,675 UART: [state] CFI Enabled
265,520 UART: [state] LifecycleState = Unprovisioned
267,370 UART: [state] DebugLocked = No
269,818 UART: [state] WD Timer not started. Device not locked for debugging
273,487 UART: [kat] SHA2-256
452,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,220 UART: [kat] ++
464,700 UART: [kat] sha1
475,929 UART: [kat] SHA2-256
479,005 UART: [kat] SHA2-384
485,139 UART: [kat] SHA2-512-ACC
488,071 UART: [kat] ECC-384
2,950,717 UART: [kat] HMAC-384Kdf
2,972,386 UART: [kat] LMS
3,501,817 UART: [kat] --
3,506,610 UART: [cold-reset] ++
3,508,681 UART: [fht] FHT @ 0x50003400
3,520,790 UART: [idev] ++
3,521,360 UART: [idev] CDI.KEYID = 6
3,522,344 UART: [idev] SUBJECT.KEYID = 7
3,523,515 UART: [idev] UDS.KEYID = 0
3,524,442 ready_for_fw is high
3,524,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,660 UART: [idev] Erasing UDS.KEYID = 0
6,025,775 UART: [idev] Sha1 KeyId Algorithm
6,048,843 UART: [idev] --
6,053,483 UART: [ldev] ++
6,054,057 UART: [ldev] CDI.KEYID = 6
6,054,971 UART: [ldev] SUBJECT.KEYID = 5
6,056,245 UART: [ldev] AUTHORITY.KEYID = 7
6,057,396 UART: [ldev] FE.KEYID = 1
6,102,272 UART: [ldev] Erasing FE.KEYID = 1
8,606,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,887 UART: [ldev] --
10,412,555 UART: [fwproc] Wait for Commands...
10,414,105 UART: [fwproc] Recv command 0x46574c44
10,416,184 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,094 >>> mbox cmd response: success
14,280,166 UART: [afmc] ++
14,280,787 UART: [afmc] CDI.KEYID = 6
14,281,701 UART: [afmc] SUBJECT.KEYID = 7
14,282,807 UART: [afmc] AUTHORITY.KEYID = 5
16,810,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,370 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,452 UART: [afmc] --
18,606,477 UART: [cold-reset] --
18,610,068 UART: [state] Locking Datavault
18,614,452 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,148 UART: [state] Locking ICCM
18,618,660 UART: [exit] Launching FMC @ 0x40000130
18,627,060 UART:
18,627,314 UART: Running Caliptra FMC ...
18,628,419 UART:
18,628,582 UART: [state] CFI Enabled
18,691,078 UART: [fht] FMC Alias Private Key: 7
20,455,203 UART: [art] Extend RT PCRs Done
20,457,179 UART: [art] Lock RT PCRs Done
20,458,330 UART: [art] Populate DV Done
20,464,093 UART: [fht] FMC Alias Private Key: 7
20,465,706 UART: [art] Derive CDI
20,466,502 UART: [art] Store in in slot 0x4
20,528,900 UART: [art] Derive Key Pair
20,530,245 UART: [art] Store priv key in slot 0x5
22,994,845 UART: [art] Derive Key Pair - Done
23,007,970 UART: [art] Signing Cert with AUTHO
23,009,305 UART: RITY.KEYID = 7
24,727,259 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,243 UART: [art] PUB.X = 20C1B31B0B14E68BA490DF09B7065557745421BB1B3F1A555880A8D3D9E806EB4A117C0471008DB62072381981B48950
24,736,030 UART: [art] PUB.Y = 1243147A72CAD571FCC87FC63D528A017F7826524C38C1BE81000CA4435D00894DF653765859051E44A0F8ABDC6546F7
24,743,223 UART: [art] SIG.R = 0CD8F2B1EA4879FFF47A81E8F2E63D5273047A9751F1AAEE0A16B3938DAE42EBC1930DB780F44D2A49B7917D14EB9CA6
24,750,612 UART: [art] SIG.S = A95915A5EA352582E4C0836D908EB124671E74FE8D8DDA0048C4183E10425FFECDEC1CCDB33E774560B58A4A90B8F009
25,729,364 UART: Caliptra RT
25,730,052 UART: [state] CFI Enabled
25,899,978 UART: [rt] RT listening for mailbox commands...
25,902,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,058,530 UART: [rt]cmd =0x41544d4e, len=14344
29,989,416 >>> mbox cmd response data (8 bytes)
29,990,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,020,908 UART: [rt]cmd =0x41545348, len=116
30,023,421 >>> mbox cmd response data (12 bytes)
32,087,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,233,098 UART:
32,233,456 UART: Running Caliptra ROM ...
32,234,593 UART:
32,234,761 UART: [state] CFI Enabled
32,299,923 UART: [state] LifecycleState = Unprovisioned
32,301,802 UART: [state] DebugLocked = No
32,303,434 UART: [state] WD Timer not started. Device not locked for debugging
32,307,828 UART: [kat] SHA2-256
32,486,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,498,552 UART: [kat] ++
32,499,013 UART: [kat] sha1
32,510,711 UART: [kat] SHA2-256
32,513,728 UART: [kat] SHA2-384
32,521,550 UART: [kat] SHA2-512-ACC
32,524,525 UART: [kat] ECC-384
34,987,676 UART: [kat] HMAC-384Kdf
35,009,456 UART: [kat] LMS
35,538,887 UART: [kat] --
35,541,415 UART: [update-reset] ++
38,965,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,967,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,351,162 >>> mbox cmd response: success
39,351,635 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,352,357 UART: [update-reset] Copying MAN_2 To MAN_1
39,374,697 UART: [update-reset Success] --
39,378,314 UART: [state] Locking Datavault
39,380,978 UART: [state] Locking PCR0, PCR1 and PCR31
39,382,677 UART: [state] Locking ICCM
39,384,316 UART: [exit] Launching FMC @ 0x40000130
39,392,767 UART:
39,393,020 UART: Running Caliptra FMC ...
39,394,128 UART:
39,394,285 UART: [state] CFI Enabled
39,498,301 UART: [art] Extend RT PCRs Done
39,499,484 UART: [art] Lock RT PCRs Done
39,500,721 UART: [art] Populate DV Done
39,506,131 UART: [fht] FMC Alias Private Key: 7
39,507,723 UART: [art] Derive CDI
39,508,532 UART: [art] Store in in slot 0x4
39,568,145 UART: [art] Derive Key Pair
39,569,230 UART: [art] Store priv key in slot 0x5
42,032,294 UART: [art] Derive Key Pair - Done
42,045,346 UART: [art] Signing Cert with AUTHO
42,046,654 UART: RITY.KEYID = 7
43,757,563 UART: [art] Erasing AUTHORITY.KEYID = 7
43,759,064 UART: [art] PUB.X = 2793267136556D62E8367D400CE87F8A268CED88BA66E0C85F609F7B830D0D41E3CB415B6F93E899EDCDBA06A036DB47
43,766,338 UART: [art] PUB.Y = 8D55933843B7C433DB72AB388CB68A0CC42DC0AB8DF52CED2D8851E9FB9C25B69D20F9F4F78B52DBA9D4736E496ABA2B
43,773,620 UART: [art] SIG.R = 3FC40CD782558135ADBAC3E3D5BC72AABBBB9D072067E055A5527D4D15BA94461FBB9468308B9DC5F91C466C10CD2C67
43,781,056 UART: [art] SIG.S = EB187F37E35CF6D35DF9106FB17E197C9D9350DE8A93B5E568585E581CF8E429DA127BDEFF61AA0A57C318655A68D062
44,759,468 UART: Caliptra RT
44,760,153 UART: [state] CFI Enabled
45,094,307 UART: [rt] RT listening for mailbox commands...
45,126,178 UART: [rt]cmd =0x41545348, len=116
45,128,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,360,940 ready_for_fw is high
3,361,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,317 >>> mbox cmd response: success
18,363,386 UART:
18,363,772 UART: Running Caliptra FMC ...
18,364,869 UART:
18,365,019 UART: [state] CFI Enabled
18,431,667 UART: [fht] FMC Alias Private Key: 7
20,194,847 UART: [art] Extend RT PCRs Done
20,196,069 UART: [art] Lock RT PCRs Done
20,197,640 UART: [art] Populate DV Done
20,202,835 UART: [fht] FMC Alias Private Key: 7
20,204,537 UART: [art] Derive CDI
20,205,355 UART: [art] Store in in slot 0x4
20,264,566 UART: [art] Derive Key Pair
20,265,566 UART: [art] Store priv key in slot 0x5
22,727,831 UART: [art] Derive Key Pair - Done
22,740,826 UART: [art] Signing Cert with AUTHO
22,742,127 UART: RITY.KEYID = 7
24,454,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,907 UART: [art] PUB.X = A6AA740A05D20845C5E503DFE137C0A786EDD1E7371C55AAD48F1C53802B54BF503ED5368849DFA53C567CD1A86131CB
24,463,175 UART: [art] PUB.Y = 6D34014455EB34B6FC33986ACDF52AF3A63D7DDB9AF94810341BDA7D91F689FF2D39E2A6C11E9D6A96B4497B51831FAF
24,470,447 UART: [art] SIG.R = 61735492F8F640C9177C253CDF6A1876DEB29C22C5A7AC67BE85229AD82CC1A08CE0C341007D4131B2E7E465E9AF18E5
24,477,844 UART: [art] SIG.S = F09AC1FE0B93F016576404A08DD58EA83EF9E01EF38813EB73A7D50621B14F9EC06BC55394C9BD5871EF2E4CFE1B0475
25,455,990 UART: Caliptra RT
25,456,679 UART: [state] CFI Enabled
25,622,956 UART: [rt] RT listening for mailbox commands...
25,625,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,781,377 UART: [rt]cmd =0x41544d4e, len=14344
29,712,364 >>> mbox cmd response data (8 bytes)
29,712,942 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,743,895 UART: [rt]cmd =0x41545348, len=116
29,745,806 >>> mbox cmd response data (12 bytes)
31,798,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,927,518 >>> mbox cmd response: success
38,928,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,964,769 UART:
38,965,074 UART: Running Caliptra FMC ...
38,966,216 UART:
38,966,382 UART: [state] CFI Enabled
39,053,087 UART: [art] Extend RT PCRs Done
39,054,290 UART: [art] Lock RT PCRs Done
39,055,695 UART: [art] Populate DV Done
39,061,103 UART: [fht] FMC Alias Private Key: 7
39,062,690 UART: [art] Derive CDI
39,063,507 UART: [art] Store in in slot 0x4
39,122,214 UART: [art] Derive Key Pair
39,123,255 UART: [art] Store priv key in slot 0x5
41,587,095 UART: [art] Derive Key Pair - Done
41,599,768 UART: [art] Signing Cert with AUTHO
41,601,064 UART: RITY.KEYID = 7
43,313,163 UART: [art] Erasing AUTHORITY.KEYID = 7
43,314,822 UART: [art] PUB.X = ECF4BB4F50C0AD1BA1A2C79A289579669E5E092A4191A7AA53618DA40AFE4F5BD8760DB8AC0BB543D3E27B3964292949
43,322,003 UART: [art] PUB.Y = 70E6F922E226C404AC514A2341420F4AF65230C605C9898814019803F02640585CB3254C7C84632F977466C6CEF5FD55
43,329,218 UART: [art] SIG.R = EDDBD8187ABEA5CC4D7BFDF590FB6ADAA4C4B912A6B86C6BA26DC92C1B4B45F19A5E2856FD2D6C32CC2FF734A993D3D7
43,336,617 UART: [art] SIG.S = 97088B42BF82CA8DD20FA151FFECB1588B583D81FD418E909AC2316A0C7AFD24BC0422B86E1B84CDEE1656C77A3DEB18
44,315,687 UART: Caliptra RT
44,316,374 UART: [state] CFI Enabled
44,654,357 UART: [rt] RT listening for mailbox commands...
44,686,275 UART: [rt]cmd =0x41545348, len=116
44,688,601 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,353 UART:
192,711 UART: Running Caliptra ROM ...
193,860 UART:
603,593 UART: [state] CFI Enabled
618,320 UART: [state] LifecycleState = Unprovisioned
620,197 UART: [state] DebugLocked = No
622,492 UART: [state] WD Timer not started. Device not locked for debugging
625,600 UART: [kat] SHA2-256
804,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,342 UART: [kat] ++
816,793 UART: [kat] sha1
827,800 UART: [kat] SHA2-256
830,802 UART: [kat] SHA2-384
837,593 UART: [kat] SHA2-512-ACC
840,498 UART: [kat] ECC-384
3,282,967 UART: [kat] HMAC-384Kdf
3,294,069 UART: [kat] LMS
3,823,589 UART: [kat] --
3,830,147 UART: [cold-reset] ++
3,831,012 UART: [fht] FHT @ 0x50003400
3,843,043 UART: [idev] ++
3,843,599 UART: [idev] CDI.KEYID = 6
3,844,472 UART: [idev] SUBJECT.KEYID = 7
3,845,672 UART: [idev] UDS.KEYID = 0
3,846,653 ready_for_fw is high
3,846,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,573 UART: [idev] Erasing UDS.KEYID = 0
6,321,992 UART: [idev] Sha1 KeyId Algorithm
6,345,927 UART: [idev] --
6,349,970 UART: [ldev] ++
6,350,533 UART: [ldev] CDI.KEYID = 6
6,351,409 UART: [ldev] SUBJECT.KEYID = 5
6,352,612 UART: [ldev] AUTHORITY.KEYID = 7
6,353,897 UART: [ldev] FE.KEYID = 1
6,367,165 UART: [ldev] Erasing FE.KEYID = 1
8,837,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,047 UART: [ldev] --
10,626,909 UART: [fwproc] Wait for Commands...
10,629,050 UART: [fwproc] Recv command 0x46574c44
10,631,139 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,223 >>> mbox cmd response: success
14,497,298 UART: [afmc] ++
14,497,888 UART: [afmc] CDI.KEYID = 6
14,498,765 UART: [afmc] SUBJECT.KEYID = 7
14,499,975 UART: [afmc] AUTHORITY.KEYID = 5
17,001,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,894 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,797 UART: [afmc] --
18,796,280 UART: [cold-reset] --
18,800,947 UART: [state] Locking Datavault
18,806,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,374 UART: [state] Locking ICCM
18,810,030 UART: [exit] Launching FMC @ 0x40000130
18,818,482 UART:
18,818,714 UART: Running Caliptra FMC ...
18,819,806 UART:
18,819,956 UART: [state] CFI Enabled
18,827,836 UART: [fht] FMC Alias Private Key: 7
20,584,287 UART: [art] Extend RT PCRs Done
20,585,480 UART: [art] Lock RT PCRs Done
20,586,951 UART: [art] Populate DV Done
20,592,465 UART: [fht] FMC Alias Private Key: 7
20,594,102 UART: [art] Derive CDI
20,594,908 UART: [art] Store in in slot 0x4
20,637,373 UART: [art] Derive Key Pair
20,638,389 UART: [art] Store priv key in slot 0x5
23,064,478 UART: [art] Derive Key Pair - Done
23,077,530 UART: [art] Signing Cert with AUTHO
23,078,857 UART: RITY.KEYID = 7
24,784,353 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,840 UART: [art] PUB.X = 89A5219A00748B590F8D58C7FD3D228342DCEAE1D534D82EFBF00903326873C6A5B32C347D97D8F3A3B48DF40CE8F85F
24,793,107 UART: [art] PUB.Y = A73A1F7201D8E8F09FA9C9CDE1B2C037129A1C1831A76FB21558059D5ED13360B94701FCB9E843DCC4CC38B9C5ADD0B9
24,800,377 UART: [art] SIG.R = A62086D945BA36D1858F96F908AA887D0326C3BC31F223D414B4B59F180FA66048EEA2173A1F216150C73FE65134D276
24,807,694 UART: [art] SIG.S = 560765E658D1722B9A134A55C12590BC1C9DFA7993695186DBAB352FD613917F1D9F4C8390619414DC9D4E790A478262
25,787,249 UART: Caliptra RT
25,787,950 UART: [state] CFI Enabled
25,904,858 UART: [rt] RT listening for mailbox commands...
25,907,260 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,062,408 UART: [rt]cmd =0x41544d4e, len=14344
29,992,462 >>> mbox cmd response data (8 bytes)
29,993,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,023,829 UART: [rt]cmd =0x41545348, len=116
30,026,246 >>> mbox cmd response data (12 bytes)
32,079,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,224,766 UART:
32,225,132 UART: Running Caliptra ROM ...
32,226,186 UART:
32,226,330 UART: [state] CFI Enabled
32,241,491 UART: [state] LifecycleState = Unprovisioned
32,243,328 UART: [state] DebugLocked = No
32,245,165 UART: [state] WD Timer not started. Device not locked for debugging
32,249,327 UART: [kat] SHA2-256
32,428,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,440,052 UART: [kat] ++
32,440,591 UART: [kat] sha1
32,451,861 UART: [kat] SHA2-256
32,454,919 UART: [kat] SHA2-384
32,461,444 UART: [kat] SHA2-512-ACC
32,464,379 UART: [kat] ECC-384
34,906,121 UART: [kat] HMAC-384Kdf
34,918,302 UART: [kat] LMS
35,447,805 UART: [kat] --
35,453,757 UART: [update-reset] ++
38,888,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,891,854 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,275,195 >>> mbox cmd response: success
39,275,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,276,127 UART: [update-reset] Copying MAN_2 To MAN_1
39,298,460 UART: [update-reset Success] --
39,303,558 UART: [state] Locking Datavault
39,307,453 UART: [state] Locking PCR0, PCR1 and PCR31
39,309,089 UART: [state] Locking ICCM
39,311,726 UART: [exit] Launching FMC @ 0x40000130
39,320,199 UART:
39,320,471 UART: Running Caliptra FMC ...
39,321,576 UART:
39,321,727 UART: [state] CFI Enabled
39,365,627 UART: [art] Extend RT PCRs Done
39,366,765 UART: [art] Lock RT PCRs Done
39,368,042 UART: [art] Populate DV Done
39,373,792 UART: [fht] FMC Alias Private Key: 7
39,375,383 UART: [art] Derive CDI
39,376,192 UART: [art] Store in in slot 0x4
39,418,510 UART: [art] Derive Key Pair
39,419,615 UART: [art] Store priv key in slot 0x5
41,846,324 UART: [art] Derive Key Pair - Done
41,859,327 UART: [art] Signing Cert with AUTHO
41,860,621 UART: RITY.KEYID = 7
43,565,872 UART: [art] Erasing AUTHORITY.KEYID = 7
43,567,363 UART: [art] PUB.X = CDC007174BCE812C7A77DD2CCDCB623196E8CEEFDBA5D16AE236C81FD6EF7791069C0ED9AE3B486BD5EC72A9A4D08946
43,574,705 UART: [art] PUB.Y = 5CD0DD4199AF48B7BB9B39C49F8DEBAA7B59BA305090251722E46674DB277812A5A08F4766B64CA37DF2DBB5F4741AF2
43,581,978 UART: [art] SIG.R = BDBDACFE532DAED087A9E9FCA3CC31A206CEBCDC379F1DB8040C450C91D3016AFE886C5E00A7CB5925F14622246D4F2F
43,589,358 UART: [art] SIG.S = 7D6E55AD4E6C6C41E3A5204D45E85A554B2C55CBD6238E7AA3BFCEFC17BC60CC56AF5F369BB77B42DA0F31602E2C852D
44,568,586 UART: Caliptra RT
44,569,301 UART: [state] CFI Enabled
44,855,139 UART: [rt] RT listening for mailbox commands...
44,886,845 UART: [rt]cmd =0x41545348, len=116
44,889,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,695,465 ready_for_fw is high
3,696,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,382 >>> mbox cmd response: success
18,528,435 UART:
18,528,824 UART: Running Caliptra FMC ...
18,530,017 UART:
18,530,179 UART: [state] CFI Enabled
18,538,084 UART: [fht] FMC Alias Private Key: 7
20,295,122 UART: [art] Extend RT PCRs Done
20,296,335 UART: [art] Lock RT PCRs Done
20,297,929 UART: [art] Populate DV Done
20,303,376 UART: [fht] FMC Alias Private Key: 7
20,305,018 UART: [art] Derive CDI
20,305,829 UART: [art] Store in in slot 0x4
20,348,266 UART: [art] Derive Key Pair
20,349,314 UART: [art] Store priv key in slot 0x5
22,776,251 UART: [art] Derive Key Pair - Done
22,789,094 UART: [art] Signing Cert with AUTHO
22,790,393 UART: RITY.KEYID = 7
24,495,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,393 UART: [art] PUB.X = 718CC657C595579CDC9FB66961E8AC8752A0BA9FBC7763878EFD67F3BA34A013B595154807C76E44F984B6489F034A99
24,504,618 UART: [art] PUB.Y = 81CB092F1659068DD35C9F5B23921FA23E57E6F62597E4652553ADA47E1A6F18B6ACE26FF061AFA5DF247C91CCEB1471
24,511,923 UART: [art] SIG.R = 87BB634A5D5FE59D6E0CD3476678BAAAF62CBF3931A3E3BA7E5FC23F38B62EF10B2FF586575E04C414BDBF0519B7C4C4
24,519,377 UART: [art] SIG.S = 7FCA88BB47E09F4BD91394FA798E76C9DB545F39C40B57466554A7705F0D2A81EFE95C6CC6A79BEFC37F5D391A95BA93
25,497,990 UART: Caliptra RT
25,498,704 UART: [state] CFI Enabled
25,615,560 UART: [rt] RT listening for mailbox commands...
25,617,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,773,253 UART: [rt]cmd =0x41544d4e, len=14344
29,703,640 >>> mbox cmd response data (8 bytes)
29,704,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,734,882 UART: [rt]cmd =0x41545348, len=116
29,737,356 >>> mbox cmd response data (12 bytes)
31,794,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,849,568 >>> mbox cmd response: success
38,850,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,884,810 UART:
38,885,140 UART: Running Caliptra FMC ...
38,886,166 UART:
38,886,306 UART: [state] CFI Enabled
38,929,930 UART: [art] Extend RT PCRs Done
38,931,076 UART: [art] Lock RT PCRs Done
38,932,770 UART: [art] Populate DV Done
38,938,272 UART: [fht] FMC Alias Private Key: 7
38,939,907 UART: [art] Derive CDI
38,940,640 UART: [art] Store in in slot 0x4
38,982,957 UART: [art] Derive Key Pair
38,983,996 UART: [art] Store priv key in slot 0x5
41,410,090 UART: [art] Derive Key Pair - Done
41,422,876 UART: [art] Signing Cert with AUTHO
41,424,177 UART: RITY.KEYID = 7
43,129,483 UART: [art] Erasing AUTHORITY.KEYID = 7
43,130,992 UART: [art] PUB.X = E58B80365287F6427337F80C9C7F60BD33F8E50E828E1EDC696F38578099A453BCF82007E857D4B54F00A28E9BE21AB3
43,138,192 UART: [art] PUB.Y = 803C89E9397BDD451D2C1866234357EFA5420EA022FDA8B71B7D13888631D461730DD163A06489EB640A79C88D53CDAE
43,145,477 UART: [art] SIG.R = E1EC417CC61DE0E8BA2DD84083A9692CB9A7EBED2FCA6A3A9C0CDB6834D40D0573C0230AD4C0EF09EFACE027946934AE
43,152,859 UART: [art] SIG.S = FB792D42E9E0C47BAE1F16BA045A48AF9D681525FF3176B240A496826CAC03435F00F6EFA5E19F9F3956AA6B15B691A8
44,132,205 UART: Caliptra RT
44,132,916 UART: [state] CFI Enabled
44,421,028 UART: [rt] RT listening for mailbox commands...
44,452,878 UART: [rt]cmd =0x41545348, len=116
44,455,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,203 UART:
192,578 UART: Running Caliptra ROM ...
193,693 UART:
193,834 UART: [state] CFI Enabled
264,092 UART: [state] LifecycleState = Unprovisioned
266,548 UART: [state] DebugLocked = No
269,409 UART: [state] WD Timer not started. Device not locked for debugging
274,158 UART: [kat] SHA2-256
464,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,823 UART: [kat] ++
475,316 UART: [kat] sha1
487,826 UART: [kat] SHA2-256
490,784 UART: [kat] SHA2-384
495,613 UART: [kat] SHA2-512-ACC
498,202 UART: [kat] ECC-384
2,951,142 UART: [kat] HMAC-384Kdf
2,973,185 UART: [kat] LMS
3,504,964 UART: [kat] --
3,509,539 UART: [cold-reset] ++
3,510,475 UART: [fht] FHT @ 0x50003400
3,521,660 UART: [idev] ++
3,522,289 UART: [idev] CDI.KEYID = 6
3,523,422 UART: [idev] SUBJECT.KEYID = 7
3,524,524 UART: [idev] UDS.KEYID = 0
3,525,450 ready_for_fw is high
3,525,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,672 UART: [idev] Erasing UDS.KEYID = 0
6,031,269 UART: [idev] Sha1 KeyId Algorithm
6,053,050 UART: [idev] --
6,057,697 UART: [ldev] ++
6,058,377 UART: [ldev] CDI.KEYID = 6
6,059,260 UART: [ldev] SUBJECT.KEYID = 5
6,060,491 UART: [ldev] AUTHORITY.KEYID = 7
6,061,673 UART: [ldev] FE.KEYID = 1
6,101,583 UART: [ldev] Erasing FE.KEYID = 1
8,608,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,138 UART: [ldev] --
10,413,685 UART: [fwproc] Wait for Commands...
10,416,353 UART: [fwproc] Recv command 0x46574c44
10,418,661 UART: [fwproc] Recv'd Img size: 114448 bytes
13,868,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,094 >>> mbox cmd response: success
14,611,698 UART: [afmc] ++
14,612,409 UART: [afmc] CDI.KEYID = 6
14,613,519 UART: [afmc] SUBJECT.KEYID = 7
14,615,057 UART: [afmc] AUTHORITY.KEYID = 5
17,151,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,030 UART: [afmc] --
18,947,568 UART: [cold-reset] --
18,951,432 UART: [state] Locking Datavault
18,958,139 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,278 UART: [state] Locking ICCM
18,962,247 UART: [exit] Launching FMC @ 0x40000130
18,970,938 UART:
18,971,219 UART: Running Caliptra FMC ...
18,972,252 UART:
18,972,402 UART: [state] CFI Enabled
19,029,250 UART: [fht] FMC Alias Private Key: 7
20,793,126 UART: [art] Extend RT PCRs Done
20,794,337 UART: [art] Lock RT PCRs Done
20,796,360 UART: [art] Populate DV Done
20,801,928 UART: [fht] FMC Alias Private Key: 7
20,803,624 UART: [art] Derive CDI
20,804,359 UART: [art] Store in in slot 0x4
20,861,863 UART: [art] Derive Key Pair
20,862,914 UART: [art] Store priv key in slot 0x5
23,325,965 UART: [art] Derive Key Pair - Done
23,338,792 UART: [art] Signing Cert with AUTHO
23,340,088 UART: RITY.KEYID = 7
25,051,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,894 UART: [art] PUB.X = 1E634933ABED4904663574B60EF52859ADE9C4866FD002D5282F6E313AF8A9DA642F7784B62E8CF5276834C1EDCD45E6
25,060,190 UART: [art] PUB.Y = 47D8E4D28D3F14846EF6C4C0CE5F90AB86BE200134960F5E3EAA6C6C00A84AF66CB8495550F50B7E476231429CF3D281
25,067,415 UART: [art] SIG.R = A6A987E50EA25BEC065E6F3AF726A04949C702C083C6081774BEC3BEF0E412A933ABECC0E11842DAD323BCF37124C196
25,074,809 UART: [art] SIG.S = C4AAFA1B65CA3F2FF237AF3FE9607C60C44E4BDB51BAC94D7EC8187E1DDED6F30EAA36844C12FC163F40A3FEF2ECCA7D
26,053,800 UART: Caliptra RT
26,054,512 UART: [state] CFI Enabled
26,218,819 UART: [rt] RT listening for mailbox commands...
26,221,203 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,377,365 UART: [rt]cmd =0x41544d4e, len=14344
30,307,793 >>> mbox cmd response data (8 bytes)
30,308,357 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,338,821 UART: [rt]cmd =0x41545348, len=116
30,340,942 >>> mbox cmd response data (12 bytes)
32,397,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,542,455 UART:
32,542,832 UART: Running Caliptra ROM ...
32,543,926 UART:
32,544,091 UART: [state] CFI Enabled
32,621,031 UART: [state] LifecycleState = Unprovisioned
32,623,095 UART: [state] DebugLocked = No
32,624,701 UART: [state] WD Timer not started. Device not locked for debugging
32,629,573 UART: [kat] SHA2-256
32,819,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,830,216 UART: [kat] ++
32,830,697 UART: [kat] sha1
32,841,913 UART: [kat] SHA2-256
32,844,907 UART: [kat] SHA2-384
32,851,822 UART: [kat] SHA2-512-ACC
32,854,402 UART: [kat] ECC-384
35,302,167 UART: [kat] HMAC-384Kdf
35,326,649 UART: [kat] LMS
35,858,217 UART: [kat] --
35,864,107 UART: [update-reset] ++
39,328,000 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,331,825 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,940,080 >>> mbox cmd response: success
39,944,522 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,945,130 UART: [update-reset] Copying MAN_2 To MAN_1
39,978,476 UART: [update-reset Success] --
39,982,295 UART: [state] Locking Datavault
39,984,802 UART: [state] Locking PCR0, PCR1 and PCR31
39,986,995 UART: [state] Locking ICCM
39,988,801 UART: [exit] Launching FMC @ 0x40000130
39,997,473 UART:
39,997,704 UART: Running Caliptra FMC ...
39,998,739 UART:
39,998,887 UART: [state] CFI Enabled
40,095,725 UART: [art] Extend RT PCRs Done
40,096,933 UART: [art] Lock RT PCRs Done
40,098,207 UART: [art] Populate DV Done
40,103,680 UART: [fht] FMC Alias Private Key: 7
40,105,325 UART: [art] Derive CDI
40,106,056 UART: [art] Store in in slot 0x4
40,164,580 UART: [art] Derive Key Pair
40,165,657 UART: [art] Store priv key in slot 0x5
42,628,490 UART: [art] Derive Key Pair - Done
42,641,278 UART: [art] Signing Cert with AUTHO
42,642,575 UART: RITY.KEYID = 7
44,354,584 UART: [art] Erasing AUTHORITY.KEYID = 7
44,356,729 UART: [art] PUB.X = C48C750F3F0FF1FB73B370B6CD3D8ACB6A99F7DFC3DFD772452400D498694129D2B02C30561DB429FF8081E494DCB144
44,363,439 UART: [art] PUB.Y = 05189FD1990800063A0EB4B148DA4E0A269136F5B20AFF886AC390DB59F2D808E8988988F3AAE9176957E9B68F623763
44,370,565 UART: [art] SIG.R = 2004F7C6DAF74F53E17AA48F8C3FD921A564175D6269DD9C975A7E1B80E5644FA3251E97751111725B2900A33FB7CD67
44,377,958 UART: [art] SIG.S = 1205403595599C0FC43F4762ED5B85D0C655CB91D8825768FEDB1938A203432AF8F27928D2A6EBF6F153CF261A589D07
45,356,580 UART: Caliptra RT
45,357,908 UART: [state] CFI Enabled
45,698,797 UART: [rt] RT listening for mailbox commands...
45,730,778 UART: [rt]cmd =0x41545348, len=116
45,733,181 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,438,344 ready_for_fw is high
3,438,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,760,874 >>> mbox cmd response: success
19,049,915 UART:
19,050,302 UART: Running Caliptra FMC ...
19,051,453 UART:
19,051,616 UART: [state] CFI Enabled
19,114,837 UART: [fht] FMC Alias Private Key: 7
20,878,505 UART: [art] Extend RT PCRs Done
20,879,741 UART: [art] Lock RT PCRs Done
20,881,182 UART: [art] Populate DV Done
20,886,591 UART: [fht] FMC Alias Private Key: 7
20,888,188 UART: [art] Derive CDI
20,889,026 UART: [art] Store in in slot 0x4
20,947,053 UART: [art] Derive Key Pair
20,948,104 UART: [art] Store priv key in slot 0x5
23,410,741 UART: [art] Derive Key Pair - Done
23,423,683 UART: [art] Signing Cert with AUTHO
23,424,988 UART: RITY.KEYID = 7
25,136,056 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,564 UART: [art] PUB.X = A4A79B09139A415BCDFABB982B4E739DF059E04FAB6452DBF00DDF2E8E11A49D126639E0A7A5541ABE0FD629463258AB
25,144,822 UART: [art] PUB.Y = 84BC3863F6BE494BD9EC09EEAB5D2D56C4961190507F97E84A3AC030413EDAE0AC65B2AF3C9092FC7B4367D7BCE53273
25,152,080 UART: [art] SIG.R = 5C54A0698535F483AE7CD7558A2EC455646E675F036E0CD125783F7BC24054106FFBF16B0E9923ACA7EF78ED51EDA1A0
25,159,471 UART: [art] SIG.S = 685CFD7A087DE32E1DA21EDEBF9A3AE2655F69A9838DE99A3B34B12E530969F417CE64F1D49F6431936ADBD561EF8CC5
26,138,471 UART: Caliptra RT
26,139,170 UART: [state] CFI Enabled
26,303,531 UART: [rt] RT listening for mailbox commands...
26,305,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,461,808 UART: [rt]cmd =0x41544d4e, len=14344
30,392,346 >>> mbox cmd response data (8 bytes)
30,392,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,423,655 UART: [rt]cmd =0x41545348, len=116
30,425,891 >>> mbox cmd response data (12 bytes)
32,479,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,293,807 >>> mbox cmd response: success
40,294,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,326,501 UART:
40,326,788 UART: Running Caliptra FMC ...
40,327,829 UART:
40,327,977 UART: [state] CFI Enabled
40,435,450 UART: [art] Extend RT PCRs Done
40,436,652 UART: [art] Lock RT PCRs Done
40,438,245 UART: [art] Populate DV Done
40,443,330 UART: [fht] FMC Alias Private Key: 7
40,444,972 UART: [art] Derive CDI
40,445,709 UART: [art] Store in in slot 0x4
40,504,075 UART: [art] Derive Key Pair
40,505,114 UART: [art] Store priv key in slot 0x5
42,967,949 UART: [art] Derive Key Pair - Done
42,980,945 UART: [art] Signing Cert with AUTHO
42,982,276 UART: RITY.KEYID = 7
44,694,092 UART: [art] Erasing AUTHORITY.KEYID = 7
44,695,607 UART: [art] PUB.X = 52B289526B2F090B1218F5B62367F4656E4F8E6AEB655A648BE31C1048888EB747DF935CB8FDB5B47E2754811D430C33
44,702,801 UART: [art] PUB.Y = 6BFE04C3A248D1F258B072A382421FCE509EBDAB8E75DF3BFB84B706588FF33CDA1D7DAC52DB9A9FC6DDC4F15AE29D4C
44,710,146 UART: [art] SIG.R = D21955602413B129E0D2F1BF8804F78C28199BBC94D724404E38215F351E3AFE07AC11855B951E2FDF7D04EE39009773
44,717,481 UART: [art] SIG.S = 5D5B248B40134CEFA803E04EE95EC82003F10BD640C140EE608D360188F536DFA4418DA3C8B2983E1A3B0DF260AEC91B
45,696,553 UART: Caliptra RT
45,697,275 UART: [state] CFI Enabled
46,034,747 UART: [rt] RT listening for mailbox commands...
46,066,660 UART: [rt]cmd =0x41545348, len=116
46,068,861 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,440 UART:
192,807 UART: Running Caliptra ROM ...
194,004 UART:
603,441 UART: [state] CFI Enabled
615,155 UART: [state] LifecycleState = Unprovisioned
617,536 UART: [state] DebugLocked = No
619,696 UART: [state] WD Timer not started. Device not locked for debugging
623,510 UART: [kat] SHA2-256
813,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,202 UART: [kat] ++
824,797 UART: [kat] sha1
836,381 UART: [kat] SHA2-256
839,447 UART: [kat] SHA2-384
844,005 UART: [kat] SHA2-512-ACC
846,591 UART: [kat] ECC-384
3,288,968 UART: [kat] HMAC-384Kdf
3,302,136 UART: [kat] LMS
3,833,939 UART: [kat] --
3,836,604 UART: [cold-reset] ++
3,837,643 UART: [fht] FHT @ 0x50003400
3,849,261 UART: [idev] ++
3,849,971 UART: [idev] CDI.KEYID = 6
3,850,877 UART: [idev] SUBJECT.KEYID = 7
3,852,113 UART: [idev] UDS.KEYID = 0
3,853,052 ready_for_fw is high
3,853,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,996,962 UART: [idev] Erasing UDS.KEYID = 0
6,328,809 UART: [idev] Sha1 KeyId Algorithm
6,352,410 UART: [idev] --
6,356,880 UART: [ldev] ++
6,357,553 UART: [ldev] CDI.KEYID = 6
6,358,481 UART: [ldev] SUBJECT.KEYID = 5
6,359,680 UART: [ldev] AUTHORITY.KEYID = 7
6,360,903 UART: [ldev] FE.KEYID = 1
6,371,676 UART: [ldev] Erasing FE.KEYID = 1
8,850,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,962 UART: [ldev] --
10,642,533 UART: [fwproc] Wait for Commands...
10,644,416 UART: [fwproc] Recv command 0x46574c44
10,646,664 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,833,587 >>> mbox cmd response: success
14,838,004 UART: [afmc] ++
14,838,709 UART: [afmc] CDI.KEYID = 6
14,839,814 UART: [afmc] SUBJECT.KEYID = 7
14,841,359 UART: [afmc] AUTHORITY.KEYID = 5
17,339,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,322 UART: [afmc] --
19,134,554 UART: [cold-reset] --
19,139,720 UART: [state] Locking Datavault
19,145,029 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,173 UART: [state] Locking ICCM
19,150,187 UART: [exit] Launching FMC @ 0x40000130
19,158,871 UART:
19,159,098 UART: Running Caliptra FMC ...
19,160,192 UART:
19,160,341 UART: [state] CFI Enabled
19,168,702 UART: [fht] FMC Alias Private Key: 7
20,925,927 UART: [art] Extend RT PCRs Done
20,927,120 UART: [art] Lock RT PCRs Done
20,929,006 UART: [art] Populate DV Done
20,934,271 UART: [fht] FMC Alias Private Key: 7
20,935,867 UART: [art] Derive CDI
20,936,678 UART: [art] Store in in slot 0x4
20,979,255 UART: [art] Derive Key Pair
20,980,298 UART: [art] Store priv key in slot 0x5
23,407,417 UART: [art] Derive Key Pair - Done
23,420,572 UART: [art] Signing Cert with AUTHO
23,421,867 UART: RITY.KEYID = 7
25,127,328 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,819 UART: [art] PUB.X = 9950A9D9AC7818E18061BBCC35DD478A3761B44AE3F6A0D98A4226C6EACCAD6168DC5546E28E28BB2043DE53D09EF885
25,136,100 UART: [art] PUB.Y = 137CEDB0FC05947CB36954DC2284565B929B6F23D12F103B90009F0CAC28FE2C26C58CA0C48B7DFB3A8877E5A7619291
25,143,365 UART: [art] SIG.R = 2A78FCBA73F8D1D87C9FE52E039B75230D71260EDAF0B2938059E016E0B6ECF902D4FA181EF3449974683751B37402AA
25,150,748 UART: [art] SIG.S = 43A39E2D468D052B38ECF6B4CEF7FEE56A6E3E455A503EEA911483724A47952A9D0AC604552BA1364864D032AD126BB1
26,129,657 UART: Caliptra RT
26,130,366 UART: [state] CFI Enabled
26,248,472 UART: [rt] RT listening for mailbox commands...
26,250,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,406,038 UART: [rt]cmd =0x41544d4e, len=14344
30,336,492 >>> mbox cmd response data (8 bytes)
30,337,090 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,368,077 UART: [rt]cmd =0x41545348, len=116
30,370,288 >>> mbox cmd response data (12 bytes)
32,425,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,570,950 UART:
32,571,309 UART: Running Caliptra ROM ...
32,572,351 UART:
32,572,606 UART: [state] CFI Enabled
32,585,659 UART: [state] LifecycleState = Unprovisioned
32,587,551 UART: [state] DebugLocked = No
32,590,354 UART: [state] WD Timer not started. Device not locked for debugging
32,594,305 UART: [kat] SHA2-256
32,784,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,794,966 UART: [kat] ++
32,795,478 UART: [kat] sha1
32,807,097 UART: [kat] SHA2-256
32,810,087 UART: [kat] SHA2-384
32,816,677 UART: [kat] SHA2-512-ACC
32,819,250 UART: [kat] ECC-384
35,261,215 UART: [kat] HMAC-384Kdf
35,274,765 UART: [kat] LMS
35,806,410 UART: [kat] --
35,810,748 UART: [update-reset] ++
39,272,797 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,275,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,883,839 >>> mbox cmd response: success
39,888,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,889,114 UART: [update-reset] Copying MAN_2 To MAN_1
39,921,980 UART: [update-reset Success] --
39,927,070 UART: [state] Locking Datavault
39,929,353 UART: [state] Locking PCR0, PCR1 and PCR31
39,931,489 UART: [state] Locking ICCM
39,933,904 UART: [exit] Launching FMC @ 0x40000130
39,942,568 UART:
39,942,794 UART: Running Caliptra FMC ...
39,943,885 UART:
39,944,055 UART: [state] CFI Enabled
39,988,660 UART: [art] Extend RT PCRs Done
39,989,801 UART: [art] Lock RT PCRs Done
39,991,563 UART: [art] Populate DV Done
39,997,329 UART: [fht] FMC Alias Private Key: 7
39,998,914 UART: [art] Derive CDI
39,999,680 UART: [art] Store in in slot 0x4
40,041,774 UART: [art] Derive Key Pair
40,042,830 UART: [art] Store priv key in slot 0x5
42,469,342 UART: [art] Derive Key Pair - Done
42,482,126 UART: [art] Signing Cert with AUTHO
42,483,453 UART: RITY.KEYID = 7
44,189,055 UART: [art] Erasing AUTHORITY.KEYID = 7
44,190,564 UART: [art] PUB.X = AB32E130B7C4ACA87A5FBD06C32939AE74139F56604764F1B2B7B46B109EBD17A67715AC737148D9EB62F9BA9E6B0644
44,197,862 UART: [art] PUB.Y = B864E4967C92FFCC7A6C9DB0B33D38411FF40A4974CA1F12FD408A99287E1CE2944BD83D353D06961E03BCBFE83AE05C
44,205,134 UART: [art] SIG.R = 01C2AECCBCFF5B32E3335C2F65E97B4ACE33AC76781AD989F6BB8F0298CF0A8467260ACEC4A63F74E8100DA6C396CF99
44,212,537 UART: [art] SIG.S = 20764490E19E64B6DF697CA8237F1655FDD8F4025F05C38215D9FBD0672C4D41ACF635C2CDB7444282D6777F896F92E1
45,191,607 UART: Caliptra RT
45,192,294 UART: [state] CFI Enabled
45,481,520 UART: [rt] RT listening for mailbox commands...
45,513,363 UART: [rt]cmd =0x41545348, len=116
45,515,977 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,755,411 ready_for_fw is high
3,755,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,233 >>> mbox cmd response: success
19,213,455 UART:
19,213,845 UART: Running Caliptra FMC ...
19,214,939 UART:
19,215,086 UART: [state] CFI Enabled
19,222,804 UART: [fht] FMC Alias Private Key: 7
20,979,974 UART: [art] Extend RT PCRs Done
20,981,195 UART: [art] Lock RT PCRs Done
20,982,845 UART: [art] Populate DV Done
20,988,243 UART: [fht] FMC Alias Private Key: 7
20,989,941 UART: [art] Derive CDI
20,990,669 UART: [art] Store in in slot 0x4
21,033,334 UART: [art] Derive Key Pair
21,034,379 UART: [art] Store priv key in slot 0x5
23,461,549 UART: [art] Derive Key Pair - Done
23,474,449 UART: [art] Signing Cert with AUTHO
23,475,751 UART: RITY.KEYID = 7
25,181,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,604 UART: [art] PUB.X = 6EDBA0BC8D2C5D563CFDF745A513644725A1098097EDEB55E9C3702FD1B10686537618904E4E468DD85F2611C4530C70
25,189,825 UART: [art] PUB.Y = 38DDF42CFEB7147EA203CEB690377A0FF5DC3C2598920C64F4903D207421DDB8DAE2DEBBE97B2C0108CB68413EBF703F
25,197,114 UART: [art] SIG.R = 785FCFEBBEDF39500443CDBCE5440F87CF9A296C539561C9FEA07D0A0DB2FCD83E25D4C5DF50401979084A8816F76F34
25,204,513 UART: [art] SIG.S = 272BD398557122DDFF93BFF0847F8B5414BC2BD9D209E3D05E0E484995C4AD57448675B79AA3883C917134D2F98117EC
26,184,358 UART: Caliptra RT
26,185,054 UART: [state] CFI Enabled
26,302,674 UART: [rt] RT listening for mailbox commands...
26,305,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,460,266 UART: [rt]cmd =0x41544d4e, len=14344
30,390,501 >>> mbox cmd response data (8 bytes)
30,391,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,421,952 UART: [rt]cmd =0x41545348, len=116
30,424,214 >>> mbox cmd response data (12 bytes)
32,477,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,203,952 >>> mbox cmd response: success
40,204,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,237,164 UART:
40,237,483 UART: Running Caliptra FMC ...
40,238,604 UART:
40,238,760 UART: [state] CFI Enabled
40,282,546 UART: [art] Extend RT PCRs Done
40,283,704 UART: [art] Lock RT PCRs Done
40,285,310 UART: [art] Populate DV Done
40,290,820 UART: [fht] FMC Alias Private Key: 7
40,292,313 UART: [art] Derive CDI
40,293,073 UART: [art] Store in in slot 0x4
40,336,160 UART: [art] Derive Key Pair
40,337,199 UART: [art] Store priv key in slot 0x5
42,764,386 UART: [art] Derive Key Pair - Done
42,777,173 UART: [art] Signing Cert with AUTHO
42,778,470 UART: RITY.KEYID = 7
44,484,118 UART: [art] Erasing AUTHORITY.KEYID = 7
44,485,641 UART: [art] PUB.X = D2B100C90C28F0C3A1207AA38DE083782AF3AE3FD14404828F5003334ABB4F490FB6C4ED23FE1D1039FE96CD36CC4043
44,492,890 UART: [art] PUB.Y = 99E76E43554E5FBEBB7F9662404445872A1ECF86387C36D42A7406AD8FB7AC956160216D194F11DBBD61070786C078DE
44,500,123 UART: [art] SIG.R = B947296D61A668DE1540FD24D85600B9A9DDC7D5C09CAEFAE194E663365AEBCE16E6A12AD38F823AC643DA1D85A90E13
44,507,513 UART: [art] SIG.S = 0532164A131F1C39893799011E65E59375821CFA7E552992771DE425B6EF68B17305FF43681621363FD68671A4FA7A17
45,487,015 UART: Caliptra RT
45,487,742 UART: [state] CFI Enabled
45,777,862 UART: [rt] RT listening for mailbox commands...
45,809,838 UART: [rt]cmd =0x41545348, len=116
45,812,244 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,473 UART: [kat] SHA2-256
882,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,519 UART: [kat] ++
886,671 UART: [kat] sha1
891,153 UART: [kat] SHA2-256
893,091 UART: [kat] SHA2-384
895,794 UART: [kat] SHA2-512-ACC
897,695 UART: [kat] ECC-384
903,250 UART: [kat] HMAC-384Kdf
907,894 UART: [kat] LMS
1,476,090 UART: [kat] --
1,476,921 UART: [cold-reset] ++
1,477,279 UART: [fht] Storing FHT @ 0x50003400
1,480,182 UART: [idev] ++
1,480,350 UART: [idev] CDI.KEYID = 6
1,480,710 UART: [idev] SUBJECT.KEYID = 7
1,481,134 UART: [idev] UDS.KEYID = 0
1,481,479 ready_for_fw is high
1,481,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,026 UART: [idev] Erasing UDS.KEYID = 0
1,505,544 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,304 UART: [idev] --
1,515,421 UART: [ldev] ++
1,515,589 UART: [ldev] CDI.KEYID = 6
1,515,952 UART: [ldev] SUBJECT.KEYID = 5
1,516,378 UART: [ldev] AUTHORITY.KEYID = 7
1,516,841 UART: [ldev] FE.KEYID = 1
1,522,207 UART: [ldev] Erasing FE.KEYID = 1
1,547,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,436 UART: [ldev] --
1,586,933 UART: [fwproc] Waiting for Commands...
1,587,768 UART: [fwproc] Received command 0x46574c44
1,588,559 UART: [fwproc] Received Image of size 114448 bytes
2,888,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,852 >>> mbox cmd response: success
3,082,100 UART: [afmc] ++
3,082,268 UART: [afmc] CDI.KEYID = 6
3,082,630 UART: [afmc] SUBJECT.KEYID = 7
3,083,055 UART: [afmc] AUTHORITY.KEYID = 5
3,118,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,858 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,471 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,161 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,854 UART: [afmc] --
3,160,748 UART: [cold-reset] --
3,161,556 UART: [state] Locking Datavault
3,162,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,199 UART: [state] Locking ICCM
3,163,649 UART: [exit] Launching FMC @ 0x40000130
3,168,978 UART:
3,168,994 UART: Running Caliptra FMC ...
3,169,402 UART:
3,169,456 UART: [state] CFI Enabled
3,180,009 UART: [fht] FMC Alias Private Key: 7
3,287,410 UART: [art] Extend RT PCRs Done
3,287,838 UART: [art] Lock RT PCRs Done
3,289,422 UART: [art] Populate DV Done
3,297,525 UART: [fht] FMC Alias Private Key: 7
3,298,543 UART: [art] Derive CDI
3,298,823 UART: [art] Store in in slot 0x4
3,384,366 UART: [art] Derive Key Pair
3,384,726 UART: [art] Store priv key in slot 0x5
3,397,448 UART: [art] Derive Key Pair - Done
3,411,962 UART: [art] Signing Cert with AUTHO
3,412,442 UART: RITY.KEYID = 7
3,427,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,471 UART: [art] PUB.X = D7F87F89A3298F08AF03455291B424F02F0D4030F43AEAD0D175C3D5030CD5CF9F9D0FA00EE5877188871FF5A50B8EDB
3,435,227 UART: [art] PUB.Y = 1AFC8D9B0C34B345326EEA7CBE94975149E3FFDC2A2B24157617DC875D1F129BFA25491DE9DB361EA0D3DD6F228F103D
3,442,190 UART: [art] SIG.R = 08CE6FB06C3EDC09A817C6B53145A1F9DA0683F81407DFE04613675A6347D96679E9ECB1B26B5DAEDE5B8E61491EBCFE
3,448,964 UART: [art] SIG.S = 00A7473339E76DBAD9F548EB9439AB9B7EED03451050B0863D8D88378E08D4BDE9C533FDADF263D5FD424977650B6FA0
3,472,464 UART: Caliptra RT
3,472,717 UART: [state] CFI Enabled
3,581,188 UART: [rt] RT listening for mailbox commands...
3,581,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,688 UART: [rt]cmd =0x41544d4e, len=14344
3,849,344 >>> mbox cmd response data (8 bytes)
3,849,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,662 UART: [rt]cmd =0x41545348, len=116
3,881,628 >>> mbox cmd response data (12 bytes)
3,881,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,541 UART:
3,882,557 UART: Running Caliptra ROM ...
3,882,965 UART:
3,883,019 UART: [state] CFI Enabled
3,885,697 UART: [state] LifecycleState = Unprovisioned
3,886,352 UART: [state] DebugLocked = No
3,887,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,888,597 UART: [kat] SHA2-256
4,682,528 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,686,643 UART: [kat] ++
4,686,795 UART: [kat] sha1
4,690,909 UART: [kat] SHA2-256
4,692,847 UART: [kat] SHA2-384
4,695,384 UART: [kat] SHA2-512-ACC
4,697,284 UART: [kat] ECC-384
4,702,823 UART: [kat] HMAC-384Kdf
4,707,557 UART: [kat] LMS
5,275,753 UART: [kat] --
5,276,598 UART: [update-reset] ++
6,612,109 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,613,251 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,763,301 >>> mbox cmd response: success
6,763,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,763,560 UART: [update-reset] Copying MAN_2 To MAN_1
6,771,574 UART: [update-reset Success] --
6,772,735 UART: [state] Locking Datavault
6,773,721 UART: [state] Locking PCR0, PCR1 and PCR31
6,774,325 UART: [state] Locking ICCM
6,774,833 UART: [exit] Launching FMC @ 0x40000130
6,780,162 UART:
6,780,178 UART: Running Caliptra FMC ...
6,780,586 UART:
6,780,640 UART: [state] CFI Enabled
6,870,061 UART: [art] Extend RT PCRs Done
6,870,489 UART: [art] Lock RT PCRs Done
6,871,608 UART: [art] Populate DV Done
6,879,927 UART: [fht] FMC Alias Private Key: 7
6,881,043 UART: [art] Derive CDI
6,881,323 UART: [art] Store in in slot 0x4
6,967,004 UART: [art] Derive Key Pair
6,967,364 UART: [art] Store priv key in slot 0x5
6,981,344 UART: [art] Derive Key Pair - Done
6,995,790 UART: [art] Signing Cert with AUTHO
6,996,270 UART: RITY.KEYID = 7
7,011,172 UART: [art] Erasing AUTHORITY.KEYID = 7
7,011,937 UART: [art] PUB.X = 392829A278D6BF741B933EC8E3758C19B24AFD2E35FC356B02D507C02ABF952024812D745E6709A43197026BF17BB0AC
7,018,695 UART: [art] PUB.Y = E72C8486B1967EE4C343D7A859DB9A48A290F0ABE9A4B6F1B6AED90618007D9974EB17EF9C03B629E7A12FAC2F1AEF6A
7,025,635 UART: [art] SIG.R = 7B116B91C6E6CC89C528B7D6E515AE099C32803D9A742496770917D1C0404BC6232A78ECA6F0EAAF460D45A23F53EE67
7,032,400 UART: [art] SIG.S = CC6DF9B58C5418C15F607A93000CB09041E7FCC630AE0F5FB58D7E065F0C9A65B3DF3BD1FAD10C07C04BA555C374CBA2
7,056,571 UART: Caliptra RT
7,056,824 UART: [state] CFI Enabled
7,333,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,364,616 UART: [rt]cmd =0x41545348, len=116
7,366,368 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 ready_for_fw is high
1,362,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,649 >>> mbox cmd response: success
2,991,769 UART:
2,991,785 UART: Running Caliptra FMC ...
2,992,193 UART:
2,992,247 UART: [state] CFI Enabled
3,002,504 UART: [fht] FMC Alias Private Key: 7
3,111,111 UART: [art] Extend RT PCRs Done
3,111,539 UART: [art] Lock RT PCRs Done
3,113,039 UART: [art] Populate DV Done
3,121,274 UART: [fht] FMC Alias Private Key: 7
3,122,230 UART: [art] Derive CDI
3,122,510 UART: [art] Store in in slot 0x4
3,208,233 UART: [art] Derive Key Pair
3,208,593 UART: [art] Store priv key in slot 0x5
3,221,927 UART: [art] Derive Key Pair - Done
3,236,732 UART: [art] Signing Cert with AUTHO
3,237,212 UART: RITY.KEYID = 7
3,252,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,189 UART: [art] PUB.X = F2BBC675687FB71E0DD1977082A6088192055E2A93ED3E6390E0EF3D186A47F88EE997E1A4CA097B40B94A64B9AFABE5
3,259,957 UART: [art] PUB.Y = FB01FA0C7E5A88BD6EDB854436D08D9992E767BDCF1A8978B00EA852459945926F966384CA1BE16F0C7AC29E8C22A70B
3,266,902 UART: [art] SIG.R = 65F79EF33AA331B86AFEF3701FB26E4A8FDDA42DF6DDBE5516CFC2E1DB744C486493FA94AE05FFC30CEB6077A7886889
3,273,688 UART: [art] SIG.S = 49B6055E568846612505063AD38F3AC6232B8831A57FC5CB80A3662ACAF52EC8625BFF6407609D2B1336A497E461B6EF
3,297,427 UART: Caliptra RT
3,297,680 UART: [state] CFI Enabled
3,405,554 UART: [rt] RT listening for mailbox commands...
3,406,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,256 UART: [rt]cmd =0x41544d4e, len=14344
3,674,594 >>> mbox cmd response data (8 bytes)
3,674,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,796 UART: [rt]cmd =0x41545348, len=116
3,706,552 >>> mbox cmd response data (12 bytes)
3,706,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,351 >>> mbox cmd response: success
6,470,351 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,483,706 UART:
6,483,722 UART: Running Caliptra FMC ...
6,484,130 UART:
6,484,184 UART: [state] CFI Enabled
6,572,873 UART: [art] Extend RT PCRs Done
6,573,301 UART: [art] Lock RT PCRs Done
6,574,720 UART: [art] Populate DV Done
6,582,747 UART: [fht] FMC Alias Private Key: 7
6,583,797 UART: [art] Derive CDI
6,584,077 UART: [art] Store in in slot 0x4
6,669,696 UART: [art] Derive Key Pair
6,670,056 UART: [art] Store priv key in slot 0x5
6,683,750 UART: [art] Derive Key Pair - Done
6,698,496 UART: [art] Signing Cert with AUTHO
6,698,976 UART: RITY.KEYID = 7
6,714,410 UART: [art] Erasing AUTHORITY.KEYID = 7
6,715,175 UART: [art] PUB.X = A57465D2A7F30616B6C6F26F3E6F28C91CFBA342275E5D139E32D53C129DBA67A1AAEA4E2BBD4167E823648E1B2B4A29
6,721,954 UART: [art] PUB.Y = E1E1D28B4C17B87B110E27E587765BB488855BFE785414C344FA7A85791DC94BBB4020E159E2DB3ADB4A9EDBFFF4A451
6,728,915 UART: [art] SIG.R = F12B1D4835D0A61593F8012A9BB38E491C3223BF8B4E87BA4B33379BDD85D5BC22F58A68F4B5B993E6ADF8CA9259BBD4
6,735,696 UART: [art] SIG.S = A70AE1F0DB71A7331715C4FA4340BCA480C6201E69B858968BD6794638A522F5B408ACF0D099E5D98A7AFFFCA1789C03
6,759,564 UART: Caliptra RT
6,759,817 UART: [state] CFI Enabled
7,047,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,136 UART: [rt]cmd =0x41545348, len=116
7,080,076 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
903,047 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,477,136 UART: [cold-reset] ++
1,477,574 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,031 UART: [idev] Erasing UDS.KEYID = 0
1,506,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,909 UART: [idev] --
1,515,924 UART: [ldev] ++
1,516,092 UART: [ldev] CDI.KEYID = 6
1,516,455 UART: [ldev] SUBJECT.KEYID = 5
1,516,881 UART: [ldev] AUTHORITY.KEYID = 7
1,517,344 UART: [ldev] FE.KEYID = 1
1,522,528 UART: [ldev] Erasing FE.KEYID = 1
1,548,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,787 UART: [ldev] --
1,588,238 UART: [fwproc] Waiting for Commands...
1,588,875 UART: [fwproc] Received command 0x46574c44
1,589,666 UART: [fwproc] Received Image of size 114448 bytes
2,889,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,110 >>> mbox cmd response: success
3,083,246 UART: [afmc] ++
3,083,414 UART: [afmc] CDI.KEYID = 6
3,083,776 UART: [afmc] SUBJECT.KEYID = 7
3,084,201 UART: [afmc] AUTHORITY.KEYID = 5
3,119,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,080 UART: [afmc] --
3,163,020 UART: [cold-reset] --
3,164,048 UART: [state] Locking Datavault
3,165,253 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,857 UART: [state] Locking ICCM
3,166,449 UART: [exit] Launching FMC @ 0x40000130
3,171,778 UART:
3,171,794 UART: Running Caliptra FMC ...
3,172,202 UART:
3,172,345 UART: [state] CFI Enabled
3,182,968 UART: [fht] FMC Alias Private Key: 7
3,291,399 UART: [art] Extend RT PCRs Done
3,291,827 UART: [art] Lock RT PCRs Done
3,293,505 UART: [art] Populate DV Done
3,301,758 UART: [fht] FMC Alias Private Key: 7
3,302,740 UART: [art] Derive CDI
3,303,020 UART: [art] Store in in slot 0x4
3,389,215 UART: [art] Derive Key Pair
3,389,575 UART: [art] Store priv key in slot 0x5
3,403,129 UART: [art] Derive Key Pair - Done
3,417,539 UART: [art] Signing Cert with AUTHO
3,418,019 UART: RITY.KEYID = 7
3,433,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,102 UART: [art] PUB.X = BFE74CBA92B8EA869DA93B5E78D661DE386227D3902A5AC865289D964A4FB39C39296B7529770D396CB14069C19E4E1D
3,440,873 UART: [art] PUB.Y = 359BE82D2FFDD8449AB6D0DD0FCB21240B773433ADE78A735EBD2317B21854F1427FB40D80CD040D23027C12C1E123EC
3,447,815 UART: [art] SIG.R = 006D7F9EA44BC1C73C7A0005DA0F654585E3DCD9E9CEC7C6577929F9666D13294283F1FDCBB370B76F259D60B2223F4E
3,454,543 UART: [art] SIG.S = 244F2D9538B571239BD30CAFAF9BEEE024B1B5BC79775F7115302F3249D19A99623E9C70C02EAE29A40D1805EFB91B03
3,477,964 UART: Caliptra RT
3,478,309 UART: [state] CFI Enabled
3,587,712 UART: [rt] RT listening for mailbox commands...
3,588,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,468 UART: [rt]cmd =0x41544d4e, len=14344
3,856,296 >>> mbox cmd response data (8 bytes)
3,856,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,336 UART: [rt]cmd =0x41545348, len=116
3,888,144 >>> mbox cmd response data (12 bytes)
3,888,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,861 UART:
3,888,877 UART: Running Caliptra ROM ...
3,889,285 UART:
3,889,426 UART: [state] CFI Enabled
3,892,084 UART: [state] LifecycleState = Unprovisioned
3,892,739 UART: [state] DebugLocked = No
3,893,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,894,882 UART: [kat] SHA2-256
4,688,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,692,928 UART: [kat] ++
4,693,080 UART: [kat] sha1
4,697,540 UART: [kat] SHA2-256
4,699,478 UART: [kat] SHA2-384
4,702,137 UART: [kat] SHA2-512-ACC
4,704,037 UART: [kat] ECC-384
4,709,500 UART: [kat] HMAC-384Kdf
4,714,140 UART: [kat] LMS
5,282,336 UART: [kat] --
5,283,245 UART: [update-reset] ++
6,619,392 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,620,434 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,770,484 >>> mbox cmd response: success
6,770,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,770,621 UART: [update-reset] Copying MAN_2 To MAN_1
6,778,635 UART: [update-reset Success] --
6,779,618 UART: [state] Locking Datavault
6,780,604 UART: [state] Locking PCR0, PCR1 and PCR31
6,781,208 UART: [state] Locking ICCM
6,781,744 UART: [exit] Launching FMC @ 0x40000130
6,787,073 UART:
6,787,089 UART: Running Caliptra FMC ...
6,787,497 UART:
6,787,640 UART: [state] CFI Enabled
6,877,265 UART: [art] Extend RT PCRs Done
6,877,693 UART: [art] Lock RT PCRs Done
6,878,674 UART: [art] Populate DV Done
6,886,777 UART: [fht] FMC Alias Private Key: 7
6,887,859 UART: [art] Derive CDI
6,888,139 UART: [art] Store in in slot 0x4
6,974,146 UART: [art] Derive Key Pair
6,974,506 UART: [art] Store priv key in slot 0x5
6,988,022 UART: [art] Derive Key Pair - Done
7,002,678 UART: [art] Signing Cert with AUTHO
7,003,158 UART: RITY.KEYID = 7
7,018,554 UART: [art] Erasing AUTHORITY.KEYID = 7
7,019,319 UART: [art] PUB.X = C081C60949219ED7D9ED2612EB252F34ED975A057738EC821DC686A9A7FCE4C7324F24BB138FD7CFB65A6A7E261ABBAA
7,026,099 UART: [art] PUB.Y = 55D199E659C4051AA763CACCDF50C830ACE59D7CB2435C4C646624CC695B3BB662A8CAC7AF12D08B49750FF66FBC2259
7,033,057 UART: [art] SIG.R = 589672E07C4FF3E460A6CAA760FCA59766D6E821427253C7D9252B3B183D5C409CDF7C28083D337A575CFC2FE53ACEDF
7,039,834 UART: [art] SIG.S = 138AB87E5A957D0F271286C20F66F89CFD2907342AA385A61D4A9320526F2FFBC30EB2FF07B25679D4A8561EBBF78458
7,063,478 UART: Caliptra RT
7,063,823 UART: [state] CFI Enabled
7,342,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,373,650 UART: [rt]cmd =0x41545348, len=116
7,375,336 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,212 ready_for_fw is high
1,363,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,952 >>> mbox cmd response: success
2,992,252 UART:
2,992,268 UART: Running Caliptra FMC ...
2,992,676 UART:
2,992,819 UART: [state] CFI Enabled
3,003,640 UART: [fht] FMC Alias Private Key: 7
3,111,147 UART: [art] Extend RT PCRs Done
3,111,575 UART: [art] Lock RT PCRs Done
3,112,979 UART: [art] Populate DV Done
3,121,240 UART: [fht] FMC Alias Private Key: 7
3,122,336 UART: [art] Derive CDI
3,122,616 UART: [art] Store in in slot 0x4
3,208,513 UART: [art] Derive Key Pair
3,208,873 UART: [art] Store priv key in slot 0x5
3,222,059 UART: [art] Derive Key Pair - Done
3,236,920 UART: [art] Signing Cert with AUTHO
3,237,400 UART: RITY.KEYID = 7
3,252,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,743 UART: [art] PUB.X = 1DCE1E3DF3CA2AE6523AC25236C2707478C736A57312BED6D349690224303D91EC623755C359D369E53F078B361D8F6F
3,260,505 UART: [art] PUB.Y = 07FAD77A1AACA1CE76A6682898E2FA400B16CE94D64B58D81B61F6BB88342A2B0853863E92E3B9E0CE56E707CB6A34E4
3,267,455 UART: [art] SIG.R = 3DEDC9619A05F123B373FCE22E3EE0C3B96918CC9F45DEBF71243B92B482462B9DDFBAC41FEFBEE4C32222616C6D5DE7
3,274,244 UART: [art] SIG.S = 3C60FEA334EA1E1A8BED0B4EBB6D1B832124BFA81FFDEBEA28D777DF53AB1AE4A292B5C35967325C52A87E3D2B213208
3,298,063 UART: Caliptra RT
3,298,408 UART: [state] CFI Enabled
3,407,306 UART: [rt] RT listening for mailbox commands...
3,407,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,990 UART: [rt]cmd =0x41544d4e, len=14344
3,675,096 >>> mbox cmd response data (8 bytes)
3,675,097 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,208 UART: [rt]cmd =0x41545348, len=116
3,707,012 >>> mbox cmd response data (12 bytes)
3,707,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,286 >>> mbox cmd response: success
6,471,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,484,751 UART:
6,484,767 UART: Running Caliptra FMC ...
6,485,175 UART:
6,485,318 UART: [state] CFI Enabled
6,574,987 UART: [art] Extend RT PCRs Done
6,575,415 UART: [art] Lock RT PCRs Done
6,576,892 UART: [art] Populate DV Done
6,585,049 UART: [fht] FMC Alias Private Key: 7
6,586,197 UART: [art] Derive CDI
6,586,477 UART: [art] Store in in slot 0x4
6,671,958 UART: [art] Derive Key Pair
6,672,318 UART: [art] Store priv key in slot 0x5
6,685,250 UART: [art] Derive Key Pair - Done
6,700,053 UART: [art] Signing Cert with AUTHO
6,700,533 UART: RITY.KEYID = 7
6,715,857 UART: [art] Erasing AUTHORITY.KEYID = 7
6,716,622 UART: [art] PUB.X = 24C5CB34DCC53DF5A419FF6C9079EDF775056C4E32A73330315468296672066783D21B0CE8F2340D7FE46911AE55657E
6,723,376 UART: [art] PUB.Y = CCFE39D0BC0C0C6F486F0CBE0DC3B28B395F50E631511B0339AC3F26EECF2BAA075F2AA4C962FC5B057C1D42B4D8B754
6,730,329 UART: [art] SIG.R = 7241B51D46C0565F2913BF8B38DDBD778718362825A4404A4118016145E7A453DB8F94239EC79938EF0B8B08188FF409
6,737,077 UART: [art] SIG.S = 76C7E76698D453161A3AF1238CCE921D52050F805F0126CFABC4B2193406394D3619DBBD112B62F79C0971A0301352AE
6,761,105 UART: Caliptra RT
6,761,450 UART: [state] CFI Enabled
7,043,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,074,673 UART: [rt]cmd =0x41545348, len=116
7,076,881 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,750 UART: [kat] LMS
1,171,078 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,174,958 UART: [idev] ++
1,175,126 UART: [idev] CDI.KEYID = 6
1,175,486 UART: [idev] SUBJECT.KEYID = 7
1,175,910 UART: [idev] UDS.KEYID = 0
1,176,255 ready_for_fw is high
1,176,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,487 UART: [idev] Sha1 KeyId Algorithm
1,208,865 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,426 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,462 UART: [fwproc] Wait for Commands...
1,283,212 UART: [fwproc] Recv command 0x46574c44
1,283,940 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,250 >>> mbox cmd response: success
2,776,312 UART: [afmc] ++
2,776,480 UART: [afmc] CDI.KEYID = 6
2,776,842 UART: [afmc] SUBJECT.KEYID = 7
2,777,267 UART: [afmc] AUTHORITY.KEYID = 5
2,812,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,026 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,745 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,705 UART: [afmc] --
2,856,675 UART: [cold-reset] --
2,857,335 UART: [state] Locking Datavault
2,858,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,138 UART: [state] Locking ICCM
2,859,766 UART: [exit] Launching FMC @ 0x40000130
2,865,095 UART:
2,865,111 UART: Running Caliptra FMC ...
2,865,519 UART:
2,865,573 UART: [state] CFI Enabled
2,876,128 UART: [fht] FMC Alias Private Key: 7
2,984,037 UART: [art] Extend RT PCRs Done
2,984,465 UART: [art] Lock RT PCRs Done
2,986,029 UART: [art] Populate DV Done
2,994,196 UART: [fht] FMC Alias Private Key: 7
2,995,364 UART: [art] Derive CDI
2,995,644 UART: [art] Store in in slot 0x4
3,081,369 UART: [art] Derive Key Pair
3,081,729 UART: [art] Store priv key in slot 0x5
3,095,301 UART: [art] Derive Key Pair - Done
3,109,741 UART: [art] Signing Cert with AUTHO
3,110,221 UART: RITY.KEYID = 7
3,125,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,214 UART: [art] PUB.X = 8B8CFE08D70024107353E48E9E759B34D279EE048A355EBD9C548BD7FA4A5CD2FE90C7D4CACFF73D66496017D40DFDCC
3,132,971 UART: [art] PUB.Y = 14185DEA9B70CC5AA744C84BB80116C8E00F1C3284FB7B60A9A4ED152BC6BA6A04FA5D0778AD027B7DDE3DA39FBEE700
3,139,906 UART: [art] SIG.R = 59FEB3DB99CDE1A08EEFA9A661160B42ABA219C76CD45B98E9073598DA1EA761A734358E494782F6748453A074BF4011
3,146,674 UART: [art] SIG.S = 651599FEDC9C7D12DB6177FDD33AE99948A6CE64FF2DABB6507F2CD42D1EF6159E5454749C794B77EE92E5BD3CB152EE
3,170,219 UART: Caliptra RT
3,170,472 UART: [state] CFI Enabled
3,278,259 UART: [rt] RT listening for mailbox commands...
3,278,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,799 UART: [rt]cmd =0x41544d4e, len=14344
3,546,409 >>> mbox cmd response data (8 bytes)
3,546,410 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,359 UART: [rt]cmd =0x41545348, len=116
3,578,099 >>> mbox cmd response data (12 bytes)
3,578,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,881 UART:
3,578,897 UART: Running Caliptra ROM ...
3,579,305 UART:
3,579,360 UART: [state] CFI Enabled
3,581,586 UART: [state] LifecycleState = Unprovisioned
3,582,241 UART: [state] DebugLocked = No
3,582,797 UART: [state] WD Timer not started. Device not locked for debugging
3,583,955 UART: [kat] SHA2-256
4,389,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,393,730 UART: [kat] ++
4,393,882 UART: [kat] sha1
4,398,064 UART: [kat] SHA2-256
4,400,004 UART: [kat] SHA2-384
4,402,931 UART: [kat] SHA2-512-ACC
4,404,831 UART: [kat] ECC-384
4,414,704 UART: [kat] HMAC-384Kdf
4,419,474 UART: [kat] LMS
4,667,802 UART: [kat] --
4,668,866 UART: [update-reset] ++
5,982,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,984,134 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,134,132 >>> mbox cmd response: success
6,134,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,134,409 UART: [update-reset] Copying MAN_2 To MAN_1
6,142,423 UART: [update-reset Success] --
6,143,562 UART: [state] Locking Datavault
6,144,344 UART: [state] Locking PCR0, PCR1 and PCR31
6,144,948 UART: [state] Locking ICCM
6,145,424 UART: [exit] Launching FMC @ 0x40000130
6,150,753 UART:
6,150,769 UART: Running Caliptra FMC ...
6,151,177 UART:
6,151,231 UART: [state] CFI Enabled
6,240,030 UART: [art] Extend RT PCRs Done
6,240,458 UART: [art] Lock RT PCRs Done
6,241,807 UART: [art] Populate DV Done
6,250,064 UART: [fht] FMC Alias Private Key: 7
6,251,168 UART: [art] Derive CDI
6,251,448 UART: [art] Store in in slot 0x4
6,336,933 UART: [art] Derive Key Pair
6,337,293 UART: [art] Store priv key in slot 0x5
6,350,663 UART: [art] Derive Key Pair - Done
6,365,381 UART: [art] Signing Cert with AUTHO
6,365,861 UART: RITY.KEYID = 7
6,380,569 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,334 UART: [art] PUB.X = 2FBD85AA14A72F75050E939E8C99C8DA7D5A7E74257B7FB6AFBA0754D81ACDA7BBED76F2E6F2645B67A62B5764FDDF51
6,388,117 UART: [art] PUB.Y = F6DC179F6122BAD712024630CDD163A497D885087038F6C06DA9366923A6A865E3FA6FF29132C5EC04ABF2181CD2968F
6,395,060 UART: [art] SIG.R = A5F785820F911CDE507B288DAA6F29A6F1EC1099619EB15371E1DA68DD19466C43E1AE481972B4E402756D7E9227914A
6,401,824 UART: [art] SIG.S = E965AED06633988F187D7B60FB43570DD10336B2BA3D4CF25FF23253ABE8AC99723BEEBBB632DF9836D28228A6DDF9C4
6,425,815 UART: Caliptra RT
6,426,068 UART: [state] CFI Enabled
6,708,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,739,199 UART: [rt]cmd =0x41545348, len=116
6,741,133 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,989 >>> mbox cmd response: success
2,689,303 UART:
2,689,319 UART: Running Caliptra FMC ...
2,689,727 UART:
2,689,781 UART: [state] CFI Enabled
2,699,756 UART: [fht] FMC Alias Private Key: 7
2,807,949 UART: [art] Extend RT PCRs Done
2,808,377 UART: [art] Lock RT PCRs Done
2,809,965 UART: [art] Populate DV Done
2,818,110 UART: [fht] FMC Alias Private Key: 7
2,819,044 UART: [art] Derive CDI
2,819,324 UART: [art] Store in in slot 0x4
2,905,169 UART: [art] Derive Key Pair
2,905,529 UART: [art] Store priv key in slot 0x5
2,918,673 UART: [art] Derive Key Pair - Done
2,933,918 UART: [art] Signing Cert with AUTHO
2,934,398 UART: RITY.KEYID = 7
2,949,910 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,675 UART: [art] PUB.X = F58DF62D1DA2644F8FE10EAB8067C6C8D835260313D88DCA09C69D845F4DEDBBE8A409205FEC5A1B6A5BE3C0DFA4CA6D
2,957,459 UART: [art] PUB.Y = 3E073662C8012226356A1FA629A0572C659CE45DD237320C42E46409F22EC8F812523175450EBB5355A92A413EC30974
2,964,377 UART: [art] SIG.R = 7A41B3374668201CCAA2CAE5D751A8247095D696E122BAE623B45D2C299EC1550F61A336615CA1047D46477391428E7C
2,971,135 UART: [art] SIG.S = 303B46483E9D1AC66B2802980B21FC0C43263726F639CFBC1A35881B0066C382FE24EFC3F90C95A0C04B2DA46BDB9CEF
2,994,824 UART: Caliptra RT
2,995,077 UART: [state] CFI Enabled
3,102,992 UART: [rt] RT listening for mailbox commands...
3,103,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,770 UART: [rt]cmd =0x41544d4e, len=14344
3,371,616 >>> mbox cmd response data (8 bytes)
3,371,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,672 UART: [rt]cmd =0x41545348, len=116
3,403,630 >>> mbox cmd response data (12 bytes)
3,403,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,488 >>> mbox cmd response: success
5,842,488 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,855,756 UART:
5,855,772 UART: Running Caliptra FMC ...
5,856,180 UART:
5,856,234 UART: [state] CFI Enabled
5,945,013 UART: [art] Extend RT PCRs Done
5,945,441 UART: [art] Lock RT PCRs Done
5,946,534 UART: [art] Populate DV Done
5,954,707 UART: [fht] FMC Alias Private Key: 7
5,955,867 UART: [art] Derive CDI
5,956,147 UART: [art] Store in in slot 0x4
6,041,680 UART: [art] Derive Key Pair
6,042,040 UART: [art] Store priv key in slot 0x5
6,055,420 UART: [art] Derive Key Pair - Done
6,070,357 UART: [art] Signing Cert with AUTHO
6,070,837 UART: RITY.KEYID = 7
6,086,031 UART: [art] Erasing AUTHORITY.KEYID = 7
6,086,796 UART: [art] PUB.X = 2DE2C6F907898A661196DBC30800AA61B69B83A27190188A58F38E49FF9A7752F7B315BAAECA0A3752881EFB8D7C7A75
6,093,541 UART: [art] PUB.Y = 59CAFB01B4C7B033093F792C8B553C6EFDB41EEA6FB0751537A481CD9D4AE111FA25482A4CFEFA75A1997435730BC024
6,100,494 UART: [art] SIG.R = 6EC3C91DCF32C1EC3F96EB4E3CD92B27B2914DE3494278CEBCF848814D535A4BF81A45A229B531689A5BD77C5922FFD3
6,107,278 UART: [art] SIG.S = E0A24F8CF484871D98E87FE28D12274343CE95E1A0230AA5071BEAC856590F968998921D5D7B85D0728DD33C77CCE428
6,130,696 UART: Caliptra RT
6,130,949 UART: [state] CFI Enabled
6,412,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,442,965 UART: [rt]cmd =0x41545348, len=116
6,444,625 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
893,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,056 UART: [kat] ++
898,208 UART: [kat] sha1
902,474 UART: [kat] SHA2-256
904,414 UART: [kat] SHA2-384
907,213 UART: [kat] SHA2-512-ACC
909,114 UART: [kat] ECC-384
919,699 UART: [kat] HMAC-384Kdf
924,233 UART: [kat] LMS
1,172,561 UART: [kat] --
1,173,562 UART: [cold-reset] ++
1,174,052 UART: [fht] FHT @ 0x50003400
1,176,799 UART: [idev] ++
1,176,967 UART: [idev] CDI.KEYID = 6
1,177,327 UART: [idev] SUBJECT.KEYID = 7
1,177,751 UART: [idev] UDS.KEYID = 0
1,178,096 ready_for_fw is high
1,178,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,775 UART: [idev] Erasing UDS.KEYID = 0
1,202,866 UART: [idev] Sha1 KeyId Algorithm
1,211,368 UART: [idev] --
1,212,388 UART: [ldev] ++
1,212,556 UART: [ldev] CDI.KEYID = 6
1,212,919 UART: [ldev] SUBJECT.KEYID = 5
1,213,345 UART: [ldev] AUTHORITY.KEYID = 7
1,213,808 UART: [ldev] FE.KEYID = 1
1,218,774 UART: [ldev] Erasing FE.KEYID = 1
1,245,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,272 UART: [ldev] --
1,284,621 UART: [fwproc] Wait for Commands...
1,285,273 UART: [fwproc] Recv command 0x46574c44
1,286,001 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,081 >>> mbox cmd response: success
2,777,113 UART: [afmc] ++
2,777,281 UART: [afmc] CDI.KEYID = 6
2,777,643 UART: [afmc] SUBJECT.KEYID = 7
2,778,068 UART: [afmc] AUTHORITY.KEYID = 5
2,813,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,404 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,962 UART: [afmc] --
2,856,964 UART: [cold-reset] --
2,857,854 UART: [state] Locking Datavault
2,858,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,381 UART: [state] Locking ICCM
2,859,859 UART: [exit] Launching FMC @ 0x40000130
2,865,188 UART:
2,865,204 UART: Running Caliptra FMC ...
2,865,612 UART:
2,865,755 UART: [state] CFI Enabled
2,876,282 UART: [fht] FMC Alias Private Key: 7
2,983,971 UART: [art] Extend RT PCRs Done
2,984,399 UART: [art] Lock RT PCRs Done
2,985,687 UART: [art] Populate DV Done
2,994,102 UART: [fht] FMC Alias Private Key: 7
2,995,160 UART: [art] Derive CDI
2,995,440 UART: [art] Store in in slot 0x4
3,081,069 UART: [art] Derive Key Pair
3,081,429 UART: [art] Store priv key in slot 0x5
3,094,049 UART: [art] Derive Key Pair - Done
3,109,048 UART: [art] Signing Cert with AUTHO
3,109,528 UART: RITY.KEYID = 7
3,124,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,553 UART: [art] PUB.X = E352DDDC4A3F64FAD7826B07E10EC4AB351CA4A90512D91377B3A6253D34900D67383E757C0A831F0309F5162358735B
3,132,300 UART: [art] PUB.Y = 5654905175D8BC3E0413EEE5202BFB96362FB6007CA52503F53A969876497CEE6321F929D87F8A8355277776E8FF935B
3,139,214 UART: [art] SIG.R = 3E864C4DE855E4E953AD10CD256D0A2DE72BF2BD30CC226371B3FD8D14240EE9815A20A4C23749F4AFDEFA0D72CF3063
3,145,991 UART: [art] SIG.S = ADEBC5F7D9D96AF919E87626350499202FE863E791143293757C06B5F85075EF81453EC8C14F26A1BD09C064261ED7F2
3,169,657 UART: Caliptra RT
3,170,002 UART: [state] CFI Enabled
3,278,149 UART: [rt] RT listening for mailbox commands...
3,278,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,057 UART: [rt]cmd =0x41544d4e, len=14344
3,547,507 >>> mbox cmd response data (8 bytes)
3,547,508 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,473 UART: [rt]cmd =0x41545348, len=116
3,579,531 >>> mbox cmd response data (12 bytes)
3,579,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,359 UART:
3,580,375 UART: Running Caliptra ROM ...
3,580,783 UART:
3,580,925 UART: [state] CFI Enabled
3,584,073 UART: [state] LifecycleState = Unprovisioned
3,584,728 UART: [state] DebugLocked = No
3,585,342 UART: [state] WD Timer not started. Device not locked for debugging
3,586,464 UART: [kat] SHA2-256
4,392,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,396,239 UART: [kat] ++
4,396,391 UART: [kat] sha1
4,400,391 UART: [kat] SHA2-256
4,402,331 UART: [kat] SHA2-384
4,405,172 UART: [kat] SHA2-512-ACC
4,407,072 UART: [kat] ECC-384
4,416,977 UART: [kat] HMAC-384Kdf
4,421,499 UART: [kat] LMS
4,669,827 UART: [kat] --
4,670,879 UART: [update-reset] ++
5,984,308 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,985,429 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,135,427 >>> mbox cmd response: success
6,135,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,135,774 UART: [update-reset] Copying MAN_2 To MAN_1
6,143,788 UART: [update-reset Success] --
6,144,867 UART: [state] Locking Datavault
6,145,661 UART: [state] Locking PCR0, PCR1 and PCR31
6,146,265 UART: [state] Locking ICCM
6,146,769 UART: [exit] Launching FMC @ 0x40000130
6,152,098 UART:
6,152,114 UART: Running Caliptra FMC ...
6,152,522 UART:
6,152,665 UART: [state] CFI Enabled
6,242,070 UART: [art] Extend RT PCRs Done
6,242,498 UART: [art] Lock RT PCRs Done
6,243,671 UART: [art] Populate DV Done
6,251,780 UART: [fht] FMC Alias Private Key: 7
6,252,956 UART: [art] Derive CDI
6,253,236 UART: [art] Store in in slot 0x4
6,339,017 UART: [art] Derive Key Pair
6,339,377 UART: [art] Store priv key in slot 0x5
6,352,513 UART: [art] Derive Key Pair - Done
6,367,454 UART: [art] Signing Cert with AUTHO
6,367,934 UART: RITY.KEYID = 7
6,383,324 UART: [art] Erasing AUTHORITY.KEYID = 7
6,384,089 UART: [art] PUB.X = F98299C7BB73F49B8B7123267280F12A6A1FB9A0F06819C411D9FEC4213462BC4D89E2F3510BA22117CDCD574B19CFF2
6,390,862 UART: [art] PUB.Y = EF4219E7FCD600CEDB8FC429DC840AD0093ED70447946A0BEDC0B16CBF5DCE172777509662D9EC670A1D6764810B12BD
6,397,786 UART: [art] SIG.R = 52896E4E21AED90D7B84DD47846B69A91274AA748B14C18130156677492A71BFAADE609AC19F7109D746FD94E77380D5
6,404,548 UART: [art] SIG.S = 58CA2CBF457D8C146BC448ADA6B0F4AD3E8AFC35F0661351AF8F6D8B421826A3B4DD6B95557AE770A380A04BCFD9EB43
6,428,477 UART: Caliptra RT
6,428,822 UART: [state] CFI Enabled
6,710,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,741,800 UART: [rt]cmd =0x41545348, len=116
6,743,970 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,258 ready_for_fw is high
1,060,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,106 >>> mbox cmd response: success
2,689,368 UART:
2,689,384 UART: Running Caliptra FMC ...
2,689,792 UART:
2,689,935 UART: [state] CFI Enabled
2,700,230 UART: [fht] FMC Alias Private Key: 7
2,808,081 UART: [art] Extend RT PCRs Done
2,808,509 UART: [art] Lock RT PCRs Done
2,810,221 UART: [art] Populate DV Done
2,818,496 UART: [fht] FMC Alias Private Key: 7
2,819,528 UART: [art] Derive CDI
2,819,808 UART: [art] Store in in slot 0x4
2,905,407 UART: [art] Derive Key Pair
2,905,767 UART: [art] Store priv key in slot 0x5
2,918,711 UART: [art] Derive Key Pair - Done
2,933,238 UART: [art] Signing Cert with AUTHO
2,933,718 UART: RITY.KEYID = 7
2,948,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,563 UART: [art] PUB.X = C64A1BABBC15CFF1A1CCEEE4DBBBBCDD320B80A01D9A948324DEBEB52F44C2BEB03DBC516146D67E4CE9871B4B855534
2,956,362 UART: [art] PUB.Y = CFDC46B286E822109BEF07DBB5BCB727A9319FC1E330A0BEF1B2B3B50B5237C91D6DD9E3C657D409DCB775FCD6FDAB32
2,963,329 UART: [art] SIG.R = D41B715BDE6ADE3D52C5651CB908CBBB25D0104C20EE97D62E9E0E322020BF0EA9D67C9E00C1EDCF44C758D5296B5C66
2,970,086 UART: [art] SIG.S = B732E69D9AA7BB179A05E335B69C8491C7160E6A727FDE73195EEDF083E57E6E53622666655DA262B43272CA5B46FADF
2,994,101 UART: Caliptra RT
2,994,446 UART: [state] CFI Enabled
3,102,304 UART: [rt] RT listening for mailbox commands...
3,102,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,002 UART: [rt]cmd =0x41544d4e, len=14344
3,370,368 >>> mbox cmd response data (8 bytes)
3,370,369 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,452 UART: [rt]cmd =0x41545348, len=116
3,402,506 >>> mbox cmd response data (12 bytes)
3,402,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,843,381 >>> mbox cmd response: success
5,843,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,856,637 UART:
5,856,653 UART: Running Caliptra FMC ...
5,857,061 UART:
5,857,204 UART: [state] CFI Enabled
5,946,351 UART: [art] Extend RT PCRs Done
5,946,779 UART: [art] Lock RT PCRs Done
5,948,110 UART: [art] Populate DV Done
5,956,253 UART: [fht] FMC Alias Private Key: 7
5,957,223 UART: [art] Derive CDI
5,957,503 UART: [art] Store in in slot 0x4
6,043,274 UART: [art] Derive Key Pair
6,043,634 UART: [art] Store priv key in slot 0x5
6,057,012 UART: [art] Derive Key Pair - Done
6,071,752 UART: [art] Signing Cert with AUTHO
6,072,232 UART: RITY.KEYID = 7
6,087,372 UART: [art] Erasing AUTHORITY.KEYID = 7
6,088,137 UART: [art] PUB.X = 5D482D6FF33AEE1692E439D6C4FE5382FB5907024906023D16D8E1087CD5670C45A72809B785EBD68A18129E4709909C
6,094,877 UART: [art] PUB.Y = 0D1806324178D62D38C7F0C87EFAA9C66FE8039BEEEB0173FAE9B9FEF6EBB1C60182A6F1F143A67F0C99F3FFE4065360
6,101,822 UART: [art] SIG.R = D01E16F9B8A03BC9B756E99B8D0EF82063177E41BD0E51E02A0801F1E153E67C11F9B2849431E573B50150FA39D5CF25
6,108,579 UART: [art] SIG.S = D136F8D14D3836A6723E6AE4779066413F882300E1FF85ED2ABDF672874752E65B9DF4105E31400F415175494334E1CD
6,132,497 UART: Caliptra RT
6,132,842 UART: [state] CFI Enabled
6,414,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,445,581 UART: [rt]cmd =0x41545348, len=116
6,447,151 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 ready_for_fw is high
1,174,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,200,137 UART: [idev] Sha1 KeyId Algorithm
1,209,207 UART: [idev] --
1,210,206 UART: [ldev] ++
1,210,374 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,165 UART: [ldev] AUTHORITY.KEYID = 7
1,211,628 UART: [ldev] FE.KEYID = 1
1,216,724 UART: [ldev] Erasing FE.KEYID = 1
1,242,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,472 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,465 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,862 >>> mbox cmd response: success
2,776,005 UART: [afmc] ++
2,776,173 UART: [afmc] CDI.KEYID = 6
2,776,536 UART: [afmc] SUBJECT.KEYID = 7
2,776,962 UART: [afmc] AUTHORITY.KEYID = 5
2,812,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,606 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,094 UART: [afmc] --
2,856,146 UART: [cold-reset] --
2,857,294 UART: [state] Locking Datavault
2,858,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,969 UART: [state] Locking ICCM
2,859,509 UART: [exit] Launching FMC @ 0x40000130
2,864,838 UART:
2,864,854 UART: Running Caliptra FMC ...
2,865,262 UART:
2,865,316 UART: [state] CFI Enabled
2,875,793 UART: [fht] FMC Alias Private Key: 7
2,983,304 UART: [art] Extend RT PCRs Done
2,983,732 UART: [art] Lock RT PCRs Done
2,985,516 UART: [art] Populate DV Done
2,993,637 UART: [fht] FMC Alias Private Key: 7
2,994,701 UART: [art] Derive CDI
2,994,981 UART: [art] Store in in slot 0x4
3,080,750 UART: [art] Derive Key Pair
3,081,110 UART: [art] Store priv key in slot 0x5
3,094,386 UART: [art] Derive Key Pair - Done
3,109,185 UART: [art] Signing Cert with AUTHO
3,109,665 UART: RITY.KEYID = 7
3,125,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,808 UART: [art] PUB.X = 723AC3BB509D9D13C219529614ABC0D84F55A9725197193CE97C6229643E6DA79A51B708F6E63AB56157FE846F991548
3,132,569 UART: [art] PUB.Y = 8C728F74F8A4CAA92B3F43FA07051F68E188247586F56101EFF2B7CE950BE60691C4BE872BADF5F4D795D87501CF9DA1
3,139,511 UART: [art] SIG.R = 3CF17615E7BB13CA7EDA594C33ED561BAD6AC508AF01E8C5BBCCFA271711E5E447D99E89F2010770E3E35B5E644CE9F8
3,146,287 UART: [art] SIG.S = 25E7858FA52B8CDFCBB6AEBB44F55DAAA83D33279B18E73469DAFA72A4F176776AAA01947019ACFCDDF42D9D666194B2
3,170,581 UART: Caliptra RT
3,170,834 UART: [state] CFI Enabled
3,278,727 UART: [rt] RT listening for mailbox commands...
3,279,397 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,179 UART: [rt]cmd =0x41544d4e, len=14344
3,546,997 >>> mbox cmd response data (8 bytes)
3,546,998 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,059 UART: [rt]cmd =0x41545348, len=116
3,578,967 >>> mbox cmd response data (12 bytes)
3,578,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,761 UART:
3,579,777 UART: Running Caliptra ROM ...
3,580,185 UART:
3,580,240 UART: [state] CFI Enabled
3,582,958 UART: [state] LifecycleState = Unprovisioned
3,583,613 UART: [state] DebugLocked = No
3,584,349 UART: [state] WD Timer not started. Device not locked for debugging
3,585,605 UART: [kat] SHA2-256
4,389,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,393,284 UART: [kat] ++
4,393,436 UART: [kat] sha1
4,397,530 UART: [kat] SHA2-256
4,399,470 UART: [kat] SHA2-384
4,402,237 UART: [kat] SHA2-512-ACC
4,404,137 UART: [kat] ECC-384
4,413,422 UART: [kat] HMAC-384Kdf
4,418,010 UART: [kat] LMS
4,666,322 UART: [kat] --
4,667,040 UART: [update-reset] ++
5,979,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,089 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,131,087 >>> mbox cmd response: success
6,131,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,131,430 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,444 UART: [update-reset Success] --
6,140,383 UART: [state] Locking Datavault
6,140,993 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,597 UART: [state] Locking ICCM
6,142,111 UART: [exit] Launching FMC @ 0x40000130
6,147,440 UART:
6,147,456 UART: Running Caliptra FMC ...
6,147,864 UART:
6,147,918 UART: [state] CFI Enabled
6,237,461 UART: [art] Extend RT PCRs Done
6,237,889 UART: [art] Lock RT PCRs Done
6,239,132 UART: [art] Populate DV Done
6,247,499 UART: [fht] FMC Alias Private Key: 7
6,248,621 UART: [art] Derive CDI
6,248,901 UART: [art] Store in in slot 0x4
6,334,566 UART: [art] Derive Key Pair
6,334,926 UART: [art] Store priv key in slot 0x5
6,348,230 UART: [art] Derive Key Pair - Done
6,363,167 UART: [art] Signing Cert with AUTHO
6,363,647 UART: RITY.KEYID = 7
6,378,791 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,556 UART: [art] PUB.X = BB089D1B75849EBFA17D0CEC6FE3752627C1BCDCB9D0B441D6889A3D5848186DA9A4DA79F57528B8F1C653FBB2E3941D
6,386,336 UART: [art] PUB.Y = 62E63E3B23766B165F03FC8D7020E6F634A29BAED1F4FC4F4A9B13F6D00A174BD84CC61C2820CD10DC7D0170D8F12C75
6,393,289 UART: [art] SIG.R = D8ABD42D06FCBA803CA8EF892B7813E29E59F14EBE3E039114E5669C506F4520400AE80E45AA339DDC4DC63DE0F7CAD1
6,400,065 UART: [art] SIG.S = 5B1D2E2107A72F430D3713B121EEB2BB174E9C00F82FA16E6610703A2AB4E77343D74303955508F7DA8B9C9BE89EEB50
6,424,196 UART: Caliptra RT
6,424,449 UART: [state] CFI Enabled
6,707,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,737,867 UART: [rt]cmd =0x41545348, len=116
6,739,641 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 ready_for_fw is high
1,055,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,650 >>> mbox cmd response: success
2,685,546 UART:
2,685,562 UART: Running Caliptra FMC ...
2,685,970 UART:
2,686,024 UART: [state] CFI Enabled
2,696,595 UART: [fht] FMC Alias Private Key: 7
2,804,658 UART: [art] Extend RT PCRs Done
2,805,086 UART: [art] Lock RT PCRs Done
2,806,594 UART: [art] Populate DV Done
2,814,845 UART: [fht] FMC Alias Private Key: 7
2,815,833 UART: [art] Derive CDI
2,816,113 UART: [art] Store in in slot 0x4
2,901,552 UART: [art] Derive Key Pair
2,901,912 UART: [art] Store priv key in slot 0x5
2,915,038 UART: [art] Derive Key Pair - Done
2,929,906 UART: [art] Signing Cert with AUTHO
2,930,386 UART: RITY.KEYID = 7
2,945,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,979 UART: [art] PUB.X = C992B6EF399183A0EEDEA8F2742D168E3D05BF4A426B2BF6AF904FFA48B7A56C5943C9F84B6D8853033FBFB3A7C5266A
2,952,759 UART: [art] PUB.Y = EB709FC053771477198F2FFC1BEB7CD6726938EBFB3503BDEC18089F046142B7D4F9B1540215C927E4540CC3626DF3D1
2,959,698 UART: [art] SIG.R = ED866AAAF31B27D001F10D77E1E036FB1A468D302F4788FAE98A09C4A7726666F07BD2079498AA9823393BF9729559C6
2,966,456 UART: [art] SIG.S = FF0B276E67F134D442FABA1C527C87138340F8158FDCD1EFFD374452D96EB0706B547693C9A59881EFE77A58F6CC96EA
2,990,222 UART: Caliptra RT
2,990,475 UART: [state] CFI Enabled
3,097,947 UART: [rt] RT listening for mailbox commands...
3,098,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,719 UART: [rt]cmd =0x41544d4e, len=14344
3,366,325 >>> mbox cmd response data (8 bytes)
3,366,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,407 UART: [rt]cmd =0x41545348, len=116
3,398,409 >>> mbox cmd response data (12 bytes)
3,398,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,832,890 >>> mbox cmd response: success
5,832,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,846,410 UART:
5,846,426 UART: Running Caliptra FMC ...
5,846,834 UART:
5,846,888 UART: [state] CFI Enabled
5,936,245 UART: [art] Extend RT PCRs Done
5,936,673 UART: [art] Lock RT PCRs Done
5,938,044 UART: [art] Populate DV Done
5,946,405 UART: [fht] FMC Alias Private Key: 7
5,947,523 UART: [art] Derive CDI
5,947,803 UART: [art] Store in in slot 0x4
6,033,502 UART: [art] Derive Key Pair
6,033,862 UART: [art] Store priv key in slot 0x5
6,046,852 UART: [art] Derive Key Pair - Done
6,061,786 UART: [art] Signing Cert with AUTHO
6,062,266 UART: RITY.KEYID = 7
6,077,294 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,059 UART: [art] PUB.X = E8B99059FDA6F1098068F7440CE6D1B015B75A0E32E4F353509253659D9F04FA22C875E8A25D1825996928E7A6523585
6,084,807 UART: [art] PUB.Y = F4573FE4994BA32147842C86D2AC365828EBF3377C085B669A69A3EC6C2554D5D279CBAB68A6AEF075F9C2B59D784063
6,091,758 UART: [art] SIG.R = ED608E15AB58BDE2221910A71907DCCBB5FBF4CC00807E80C65AE71316CF659D1942FF3DAD5DFE3BD7ECAB5B692C1BE6
6,098,529 UART: [art] SIG.S = 19349FA9DBABE3B9E2456DDD21515126D6F5E163BF2351D3D7DD9DB10FE4304C9548C88E6ACDFDCF007C98997A441495
6,122,511 UART: Caliptra RT
6,122,764 UART: [state] CFI Enabled
6,400,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,431,426 UART: [rt]cmd =0x41545348, len=116
6,433,162 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 ready_for_fw is high
1,174,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,208,228 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,277 UART: [fwproc] Wait for Commands...
1,283,100 UART: [fwproc] Recv command 0x46574c44
1,283,833 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,087 >>> mbox cmd response: success
2,776,258 UART: [afmc] ++
2,776,426 UART: [afmc] CDI.KEYID = 6
2,776,789 UART: [afmc] SUBJECT.KEYID = 7
2,777,215 UART: [afmc] AUTHORITY.KEYID = 5
2,812,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,858 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,175 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,147 UART: [state] Locking Datavault
2,857,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,942 UART: [state] Locking ICCM
2,858,562 UART: [exit] Launching FMC @ 0x40000130
2,863,891 UART:
2,863,907 UART: Running Caliptra FMC ...
2,864,315 UART:
2,864,458 UART: [state] CFI Enabled
2,874,849 UART: [fht] FMC Alias Private Key: 7
2,982,616 UART: [art] Extend RT PCRs Done
2,983,044 UART: [art] Lock RT PCRs Done
2,984,514 UART: [art] Populate DV Done
2,992,437 UART: [fht] FMC Alias Private Key: 7
2,993,515 UART: [art] Derive CDI
2,993,795 UART: [art] Store in in slot 0x4
3,079,650 UART: [art] Derive Key Pair
3,080,010 UART: [art] Store priv key in slot 0x5
3,093,680 UART: [art] Derive Key Pair - Done
3,108,451 UART: [art] Signing Cert with AUTHO
3,108,931 UART: RITY.KEYID = 7
3,123,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,646 UART: [art] PUB.X = 58E9B49725677661641C48A21F9DF6CB756A1697818C01737C67D20145BEE8475B626B8AF6DE4A42BED1458A95EAC0A5
3,131,410 UART: [art] PUB.Y = 990ED55604E68DBB9BAD69140CA0639EA6982B9084D1070249BB3134D9399E6C62403C5B1EDE67F98556EB3044DCD282
3,138,345 UART: [art] SIG.R = 1432BD23FD2F20937E6DCBF82C39BB988C456216631D1C1736AE81819EB1B501B92D52D702BD2324E9F87C4A65E4379E
3,145,111 UART: [art] SIG.S = 0B6E0793215763F8FE67390D75839E983038AEFC7F784B2C6D43A122319899B4F8D12AAE52F64B327A82155790287883
3,169,015 UART: Caliptra RT
3,169,360 UART: [state] CFI Enabled
3,277,625 UART: [rt] RT listening for mailbox commands...
3,278,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,439 UART: [rt]cmd =0x41544d4e, len=14344
3,545,971 >>> mbox cmd response data (8 bytes)
3,545,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,013 UART: [rt]cmd =0x41545348, len=116
3,578,037 >>> mbox cmd response data (12 bytes)
3,578,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,923 UART:
3,578,939 UART: Running Caliptra ROM ...
3,579,347 UART:
3,579,489 UART: [state] CFI Enabled
3,582,439 UART: [state] LifecycleState = Unprovisioned
3,583,094 UART: [state] DebugLocked = No
3,583,794 UART: [state] WD Timer not started. Device not locked for debugging
3,585,096 UART: [kat] SHA2-256
4,388,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,392,775 UART: [kat] ++
4,392,927 UART: [kat] sha1
4,397,181 UART: [kat] SHA2-256
4,399,121 UART: [kat] SHA2-384
4,401,776 UART: [kat] SHA2-512-ACC
4,403,676 UART: [kat] ECC-384
4,413,573 UART: [kat] HMAC-384Kdf
4,418,303 UART: [kat] LMS
4,666,615 UART: [kat] --
4,667,783 UART: [update-reset] ++
5,980,415 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,470 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,131,468 >>> mbox cmd response: success
6,131,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,131,683 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,697 UART: [update-reset Success] --
6,140,666 UART: [state] Locking Datavault
6,141,414 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,018 UART: [state] Locking ICCM
6,142,646 UART: [exit] Launching FMC @ 0x40000130
6,147,975 UART:
6,147,991 UART: Running Caliptra FMC ...
6,148,399 UART:
6,148,542 UART: [state] CFI Enabled
6,237,737 UART: [art] Extend RT PCRs Done
6,238,165 UART: [art] Lock RT PCRs Done
6,239,508 UART: [art] Populate DV Done
6,247,677 UART: [fht] FMC Alias Private Key: 7
6,248,807 UART: [art] Derive CDI
6,249,087 UART: [art] Store in in slot 0x4
6,334,676 UART: [art] Derive Key Pair
6,335,036 UART: [art] Store priv key in slot 0x5
6,348,468 UART: [art] Derive Key Pair - Done
6,362,951 UART: [art] Signing Cert with AUTHO
6,363,431 UART: RITY.KEYID = 7
6,378,515 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,280 UART: [art] PUB.X = 30E66B755B7DC853CD2118E4C4FA889E41021F2FBB80934835FF706C69CECE8E9AED8E0A862FF80AD21560960B3E949C
6,386,048 UART: [art] PUB.Y = 4EF1B634C0A4520CAC4D9E16BCDC443D5B302401F9BD2EBB2F7FFBB2A929F38293D31EF66B1F430A33B57EB9C25FA0EE
6,393,013 UART: [art] SIG.R = 4CAA212DDAD3A3749B1D8CAFBE82D22CF83AD0476B37246C27FE9DEE54C7F958255DC6C68175ED23E259597D99292DFE
6,399,799 UART: [art] SIG.S = 82FB1AF76CF6D82E0210657A9E9FBA1A1A6426AEF74062B30952296FFC25DBC73C2CD2685D608217C17AE8266DF012D5
6,424,406 UART: Caliptra RT
6,424,751 UART: [state] CFI Enabled
6,705,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,245 UART: [rt]cmd =0x41545348, len=116
6,737,799 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,493 ready_for_fw is high
1,056,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,659 >>> mbox cmd response: success
2,688,437 UART:
2,688,453 UART: Running Caliptra FMC ...
2,688,861 UART:
2,689,004 UART: [state] CFI Enabled
2,699,687 UART: [fht] FMC Alias Private Key: 7
2,807,630 UART: [art] Extend RT PCRs Done
2,808,058 UART: [art] Lock RT PCRs Done
2,809,764 UART: [art] Populate DV Done
2,818,031 UART: [fht] FMC Alias Private Key: 7
2,819,103 UART: [art] Derive CDI
2,819,383 UART: [art] Store in in slot 0x4
2,904,742 UART: [art] Derive Key Pair
2,905,102 UART: [art] Store priv key in slot 0x5
2,918,116 UART: [art] Derive Key Pair - Done
2,933,191 UART: [art] Signing Cert with AUTHO
2,933,671 UART: RITY.KEYID = 7
2,949,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,036 UART: [art] PUB.X = F2800318D49F7189165F9FA2C6A7DA7839B8878CDB547982E35A512430CAFF4DF4802619F09D26758E6623EC8E14AA7C
2,956,803 UART: [art] PUB.Y = 6B9EB8A52CBDFFA7E3820F0FB338AC80DB77306C2A9EBCD39EC099E94EC7633F5AD5026049A068A7B84AA320E80D0418
2,963,754 UART: [art] SIG.R = 9966A26473815F86395DC5B72D3AB651F55D102C286FDA207BA0F46F4068317AD5E7AF52E30C15FC144F170D347285DB
2,970,518 UART: [art] SIG.S = F3CC87733FBCED846AD0CC4ADFC5D3AAA8D532DE52554D5225612852DBCBA7C3DD5187B94409CAE8B9363081C8910C1E
2,994,335 UART: Caliptra RT
2,994,680 UART: [state] CFI Enabled
3,102,828 UART: [rt] RT listening for mailbox commands...
3,103,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,470 UART: [rt]cmd =0x41544d4e, len=14344
3,370,950 >>> mbox cmd response data (8 bytes)
3,370,951 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,078 UART: [rt]cmd =0x41545348, len=116
3,402,946 >>> mbox cmd response data (12 bytes)
3,402,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,150 >>> mbox cmd response: success
5,838,150 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,851,154 UART:
5,851,170 UART: Running Caliptra FMC ...
5,851,578 UART:
5,851,721 UART: [state] CFI Enabled
5,941,154 UART: [art] Extend RT PCRs Done
5,941,582 UART: [art] Lock RT PCRs Done
5,942,817 UART: [art] Populate DV Done
5,950,876 UART: [fht] FMC Alias Private Key: 7
5,951,870 UART: [art] Derive CDI
5,952,150 UART: [art] Store in in slot 0x4
6,037,575 UART: [art] Derive Key Pair
6,037,935 UART: [art] Store priv key in slot 0x5
6,051,687 UART: [art] Derive Key Pair - Done
6,066,246 UART: [art] Signing Cert with AUTHO
6,066,726 UART: RITY.KEYID = 7
6,082,142 UART: [art] Erasing AUTHORITY.KEYID = 7
6,082,907 UART: [art] PUB.X = 9E3A1F1201A631AC9877E8066DA9B6DC158033C39B6BCA4E90ABD22935663035C1B16EDC5FA2C4BB82517B07F4291779
6,089,672 UART: [art] PUB.Y = 49C658F9B6A26866A738AC154EE342FDE905D3888A1E6992EAC6BEAE9A57C37A1481A2EADCD0B53DAC26BDC0E630BE31
6,096,639 UART: [art] SIG.R = EAE841B9C780495CF1D3495C879844CFE1D1E07CCE53C4A0A0AD1CCE83D9CDE8B4E21AE498CC08B5F26B12173E69297E
6,103,424 UART: [art] SIG.S = 465B1F93AD9F2E0CA098FD8B639F98B7E3E99CA559F77BC28142A7FBB345DBC6082027D9098DEC31D371E5DE18D5D885
6,127,094 UART: Caliptra RT
6,127,439 UART: [state] CFI Enabled
6,407,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,437,917 UART: [rt]cmd =0x41545348, len=116
6,440,083 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,188 UART:
192,554 UART: Running Caliptra ROM ...
193,785 UART:
193,945 UART: [state] CFI Enabled
261,946 UART: [state] LifecycleState = Unprovisioned
263,864 UART: [state] DebugLocked = No
265,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,754 UART: [kat] SHA2-256
440,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,985 UART: [kat] ++
451,437 UART: [kat] sha1
463,181 UART: [kat] SHA2-256
465,868 UART: [kat] SHA2-384
471,509 UART: [kat] SHA2-512-ACC
473,879 UART: [kat] ECC-384
2,766,823 UART: [kat] HMAC-384Kdf
2,799,469 UART: [kat] LMS
3,989,792 UART: [kat] --
3,993,227 UART: [cold-reset] ++
3,994,172 UART: [fht] Storing FHT @ 0x50003400
4,004,375 UART: [idev] ++
4,004,947 UART: [idev] CDI.KEYID = 6
4,005,986 UART: [idev] SUBJECT.KEYID = 7
4,007,170 UART: [idev] UDS.KEYID = 0
4,008,133 ready_for_fw is high
4,008,329 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,884 UART: [idev] Erasing UDS.KEYID = 0
7,345,903 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,334 UART: [idev] --
7,371,482 UART: [ldev] ++
7,372,047 UART: [ldev] CDI.KEYID = 6
7,373,033 UART: [ldev] SUBJECT.KEYID = 5
7,374,192 UART: [ldev] AUTHORITY.KEYID = 7
7,375,479 UART: [ldev] FE.KEYID = 1
7,420,708 UART: [ldev] Erasing FE.KEYID = 1
10,753,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,394 UART: [ldev] --
13,136,711 UART: [fwproc] Waiting for Commands...
13,139,129 UART: [fwproc] Received command 0x46574c44
13,141,310 UART: [fwproc] Received Image of size 114124 bytes
17,198,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,346,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,664,384 >>> mbox cmd response: success
17,668,457 UART: [afmc] ++
17,669,051 UART: [afmc] CDI.KEYID = 6
17,669,943 UART: [afmc] SUBJECT.KEYID = 7
17,671,219 UART: [afmc] AUTHORITY.KEYID = 5
21,044,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,789 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,365,211 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,380,028 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,394,516 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,416,003 UART: [afmc] --
23,420,374 UART: [cold-reset] --
23,425,057 UART: [state] Locking Datavault
23,431,188 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,900 UART: [state] Locking ICCM
23,435,370 UART: [exit] Launching FMC @ 0x40000130
23,443,767 UART:
23,444,004 UART: Running Caliptra FMC ...
23,445,112 UART:
23,445,277 UART: [state] CFI Enabled
23,505,707 UART: [fht] FMC Alias Private Key: 7
25,844,084 UART: [art] Extend RT PCRs Done
25,845,315 UART: [art] Lock RT PCRs Done
25,846,999 UART: [art] Populate DV Done
25,852,793 UART: [fht] FMC Alias Private Key: 7
25,854,439 UART: [art] Derive CDI
25,855,260 UART: [art] Store in in slot 0x4
25,914,907 UART: [art] Derive Key Pair
25,915,945 UART: [art] Store priv key in slot 0x5
29,209,351 UART: [art] Derive Key Pair - Done
29,222,777 UART: [art] Signing Cert with AUTHO
29,224,099 UART: RITY.KEYID = 7
31,511,066 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,582 UART: [art] PUB.X = E94177B2420B751B545518664BE8B8355CFE3781FEC7CF76560CB19F0E4584309ABEE05373138CAB72A62E6A5134AC6A
31,519,788 UART: [art] PUB.Y = 4194BB19F0B88188C9C03AA7CC1AE278D972BA595AFDDFE5137D02224AF1445B8447CC199F838D0B958C78B1CF0D3FB7
31,527,030 UART: [art] SIG.R = 9AEEA54163312B323C0CCB6F20D48459125F92DFEBEECD186A7390E4225673336271CB35F3BC10F295DFC0B2D1DCA2BF
31,534,433 UART: [art] SIG.S = A6207A99909689C3BB63B097292ECF97525EC5E4FBD88B70980664AA37CEB78CD75162B6D56824974B6B8DA2088529A8
32,839,213 UART: Caliptra RT
32,839,923 UART: [state] CFI Enabled
33,002,047 UART: [rt] RT listening for mailbox commands...
33,004,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,159,938 UART: [rt]cmd =0x41544d4e, len=14344
38,395,568 >>> mbox cmd response data (8 bytes)
38,396,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,426,931 UART: [rt]cmd =0x41545348, len=116
38,446,363 >>> mbox cmd response data (12 bytes)
38,447,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,478,423 UART: [rt]cmd =0x41545348, len=116
38,480,392 >>> mbox cmd response data (12 bytes)
40,610,536 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,755,641 UART:
40,756,002 UART: Running Caliptra ROM ...
40,757,058 UART:
40,757,215 UART: [state] CFI Enabled
40,832,653 UART: [state] LifecycleState = Unprovisioned
40,834,593 UART: [state] DebugLocked = No
40,836,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,842,029 UART: [kat] SHA2-256
41,011,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,022,254 UART: [kat] ++
41,022,804 UART: [kat] sha1
41,034,837 UART: [kat] SHA2-256
41,037,532 UART: [kat] SHA2-384
41,042,228 UART: [kat] SHA2-512-ACC
41,044,577 UART: [kat] ECC-384
43,335,648 UART: [kat] HMAC-384Kdf
43,366,250 UART: [kat] LMS
44,556,592 UART: [kat] --
44,560,866 UART: [update-reset] ++
48,697,504 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,701,025 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
49,083,304 >>> mbox cmd response: success
49,088,068 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,088,670 UART: [update-reset] Copying MAN_2 To MAN_1
49,106,057 UART: [update-reset Success] --
49,110,829 UART: [state] Locking Datavault
49,114,303 UART: [state] Locking PCR0, PCR1 and PCR31
49,116,064 UART: [state] Locking ICCM
49,117,249 UART: [exit] Launching FMC @ 0x40000130
49,125,700 UART:
49,125,944 UART: Running Caliptra FMC ...
49,127,045 UART:
49,127,207 UART: [state] CFI Enabled
49,222,414 UART: [art] Extend RT PCRs Done
49,223,602 UART: [art] Lock RT PCRs Done
49,225,286 UART: [art] Populate DV Done
49,230,878 UART: [fht] FMC Alias Private Key: 7
49,232,578 UART: [art] Derive CDI
49,233,389 UART: [art] Store in in slot 0x4
49,291,467 UART: [art] Derive Key Pair
49,292,512 UART: [art] Store priv key in slot 0x5
52,585,780 UART: [art] Derive Key Pair - Done
52,599,162 UART: [art] Signing Cert with AUTHO
52,600,463 UART: RITY.KEYID = 7
54,887,564 UART: [art] Erasing AUTHORITY.KEYID = 7
54,889,084 UART: [art] PUB.X = 05B0D7D4A51D0BDDC3F89114943591AC77EDEC7B6495FA3953D2A926E336348B139F91BBCA3E1E842975EB6EEE60BBE3
54,896,301 UART: [art] PUB.Y = F9593323F34C15B35B2167BF4B71F5F6997131D370DEF85610D261EF1DE29D908731AE174145EA26B690CAD2EB888841
54,903,550 UART: [art] SIG.R = E6469DC5B0650EA6B0EE4370080FFE988B6D157408C0AC09DF8F1BBC681904021A5AF18E5A8A5BFDC54E507ED5AE6C77
54,910,962 UART: [art] SIG.S = 04699507D2A65B2C00F0EA508EDA433EFEBDC305301523643727B833C935DA0E1CE1E9EF6C2BDC6E1EE5B19F15704909
56,215,914 UART: Caliptra RT
56,216,626 UART: [state] CFI Enabled
56,548,111 UART: [rt] RT listening for mailbox commands...
56,579,873 UART: [rt]cmd =0x41545348, len=116
56,599,620 >>> mbox cmd response data (12 bytes)
56,600,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,631,365 UART: [rt]cmd =0x41545348, len=116
56,633,492 >>> mbox cmd response data (12 bytes)
60,818,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,974,343 UART: [rt]cmd =0x41544d4e, len=14344
66,209,524 >>> mbox cmd response data (8 bytes)
66,210,078 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,240,884 UART: [rt]cmd =0x41545348, len=116
66,260,084 >>> mbox cmd response data (12 bytes)
66,260,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,291,246 UART: [rt]cmd =0x41545348, len=116
66,293,284 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,785,169 ready_for_fw is high
3,785,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,852,249 >>> mbox cmd response: success
23,548,030 UART:
23,548,438 UART: Running Caliptra FMC ...
23,549,550 UART:
23,549,700 UART: [state] CFI Enabled
23,618,453 UART: [fht] FMC Alias Private Key: 7
25,956,777 UART: [art] Extend RT PCRs Done
25,958,003 UART: [art] Lock RT PCRs Done
25,959,722 UART: [art] Populate DV Done
25,965,099 UART: [fht] FMC Alias Private Key: 7
25,966,597 UART: [art] Derive CDI
25,967,334 UART: [art] Store in in slot 0x4
26,027,248 UART: [art] Derive Key Pair
26,028,292 UART: [art] Store priv key in slot 0x5
29,321,336 UART: [art] Derive Key Pair - Done
29,334,387 UART: [art] Signing Cert with AUTHO
29,335,690 UART: RITY.KEYID = 7
31,622,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,037 UART: [art] PUB.X = FAD0FF562E06D6C95016EBE479703C1C6B0C97406C3B9E90E2F8D47668D1E7672A6674567F6249154C5E0077749F3862
31,631,289 UART: [art] PUB.Y = 318907B07CD60CE9DF9E6B5746913BDD4F4300CCEE2F63EBB269A9623E7F67611E1C6FE9117777E4ACA858706D5CBB5B
31,638,489 UART: [art] SIG.R = 083D105D60AF5A5A70D42780647C2D6030892636E28A8163F1967CB9ACDF5636C4D318385DF9665EC2364F0FC5EA4524
31,645,879 UART: [art] SIG.S = 762597AEA4D7ECEB8BB1153E5F2CAC8B5E3BF35F291AFEBFED35936CB9BF7B46E42B55FDF33F05772DE1D51115894F8E
32,951,226 UART: Caliptra RT
32,951,933 UART: [state] CFI Enabled
33,113,465 UART: [rt] RT listening for mailbox commands...
33,115,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,271,073 UART: [rt]cmd =0x41544d4e, len=14344
38,505,946 >>> mbox cmd response data (8 bytes)
38,506,523 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,537,197 UART: [rt]cmd =0x41545348, len=116
38,557,058 >>> mbox cmd response data (12 bytes)
38,558,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,589,264 UART: [rt]cmd =0x41545348, len=116
38,591,502 >>> mbox cmd response data (12 bytes)
40,722,144 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,444,486 >>> mbox cmd response: success
49,445,045 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,480,131 UART:
49,480,454 UART: Running Caliptra FMC ...
49,481,659 UART:
49,481,824 UART: [state] CFI Enabled
49,572,955 UART: [art] Extend RT PCRs Done
49,574,141 UART: [art] Lock RT PCRs Done
49,575,605 UART: [art] Populate DV Done
49,581,230 UART: [fht] FMC Alias Private Key: 7
49,582,711 UART: [art] Derive CDI
49,583,475 UART: [art] Store in in slot 0x4
49,641,734 UART: [art] Derive Key Pair
49,642,776 UART: [art] Store priv key in slot 0x5
52,935,713 UART: [art] Derive Key Pair - Done
52,948,657 UART: [art] Signing Cert with AUTHO
52,949,956 UART: RITY.KEYID = 7
55,237,824 UART: [art] Erasing AUTHORITY.KEYID = 7
55,239,338 UART: [art] PUB.X = AC29C4CA7897731F4B023DEDE37965AA718E6CC077BE13F8F4AFFB98CD9C10DDF2F3048168B06C58809B437D930C458E
55,246,593 UART: [art] PUB.Y = 0A8F46061B4F76F533678695CEDD53C6A14898EB94E6530B5E080FA0E7F68B4BD699F8BF72C32149E71C48A2A46E12EE
55,253,881 UART: [art] SIG.R = 139733E737F3AB1AAA389765FE9A56F9A2D5487F3D00F3BA9A7436884282E9D977ED2A4427226880178F76707A31EF61
55,261,225 UART: [art] SIG.S = CB95D1E40DE8C584419D2028F88372798206966667177957298ED171511F9F0ADA0956FF4EB1CDD2AD195025FCF5ED5D
56,566,770 UART: Caliptra RT
56,567,485 UART: [state] CFI Enabled
56,896,697 UART: [rt] RT listening for mailbox commands...
56,928,607 UART: [rt]cmd =0x41545348, len=116
56,949,163 >>> mbox cmd response data (12 bytes)
56,950,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,980,889 UART: [rt]cmd =0x41545348, len=116
56,982,960 >>> mbox cmd response data (12 bytes)
61,161,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,316,972 UART: [rt]cmd =0x41544d4e, len=14344
66,552,785 >>> mbox cmd response data (8 bytes)
66,553,328 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,584,019 UART: [rt]cmd =0x41545348, len=116
66,604,247 >>> mbox cmd response data (12 bytes)
66,604,683 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,635,343 UART: [rt]cmd =0x41545348, len=116
66,637,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,454 UART:
192,801 UART: Running Caliptra ROM ...
194,002 UART:
603,484 UART: [state] CFI Enabled
620,061 UART: [state] LifecycleState = Unprovisioned
621,937 UART: [state] DebugLocked = No
624,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,599 UART: [kat] SHA2-256
799,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,889 UART: [kat] ++
810,364 UART: [kat] sha1
821,798 UART: [kat] SHA2-256
824,449 UART: [kat] SHA2-384
829,301 UART: [kat] SHA2-512-ACC
831,661 UART: [kat] ECC-384
3,116,848 UART: [kat] HMAC-384Kdf
3,128,102 UART: [kat] LMS
4,318,197 UART: [kat] --
4,324,485 UART: [cold-reset] ++
4,326,917 UART: [fht] Storing FHT @ 0x50003400
4,338,529 UART: [idev] ++
4,339,156 UART: [idev] CDI.KEYID = 6
4,340,032 UART: [idev] SUBJECT.KEYID = 7
4,341,342 UART: [idev] UDS.KEYID = 0
4,342,262 ready_for_fw is high
4,342,449 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,751 UART: [idev] Erasing UDS.KEYID = 0
7,629,115 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,233 UART: [idev] --
7,656,281 UART: [ldev] ++
7,656,843 UART: [ldev] CDI.KEYID = 6
7,657,773 UART: [ldev] SUBJECT.KEYID = 5
7,659,046 UART: [ldev] AUTHORITY.KEYID = 7
7,660,274 UART: [ldev] FE.KEYID = 1
7,670,835 UART: [ldev] Erasing FE.KEYID = 1
10,957,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,954 UART: [ldev] --
13,316,508 UART: [fwproc] Waiting for Commands...
13,319,400 UART: [fwproc] Received command 0x46574c44
13,321,635 UART: [fwproc] Received Image of size 114124 bytes
17,373,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,651 >>> mbox cmd response: success
17,838,475 UART: [afmc] ++
17,839,093 UART: [afmc] CDI.KEYID = 6
17,840,011 UART: [afmc] SUBJECT.KEYID = 7
17,841,228 UART: [afmc] AUTHORITY.KEYID = 5
21,158,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,053 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,315 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,699 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,516 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,986 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,959 UART: [afmc] --
23,521,921 UART: [cold-reset] --
23,526,817 UART: [state] Locking Datavault
23,531,200 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,958 UART: [state] Locking ICCM
23,535,482 UART: [exit] Launching FMC @ 0x40000130
23,543,891 UART:
23,544,121 UART: Running Caliptra FMC ...
23,545,220 UART:
23,545,377 UART: [state] CFI Enabled
23,553,605 UART: [fht] FMC Alias Private Key: 7
25,884,757 UART: [art] Extend RT PCRs Done
25,885,975 UART: [art] Lock RT PCRs Done
25,887,627 UART: [art] Populate DV Done
25,893,194 UART: [fht] FMC Alias Private Key: 7
25,894,673 UART: [art] Derive CDI
25,895,409 UART: [art] Store in in slot 0x4
25,938,201 UART: [art] Derive Key Pair
25,939,248 UART: [art] Store priv key in slot 0x5
29,181,614 UART: [art] Derive Key Pair - Done
29,194,988 UART: [art] Signing Cert with AUTHO
29,196,466 UART: RITY.KEYID = 7
31,475,715 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,227 UART: [art] PUB.X = 5DE6E651534EC5D250B2DA166D4C18A4CBCCF5AF7C60B6B72BCD15577B4BF02FCB9945C745A1A9CE640954818105913B
31,484,461 UART: [art] PUB.Y = 98597FCD5D03C1CB419BADDD955318DE0310A8505CDE097B27C61A945000CE153C3B2C5E78A553D079F097A6D1EE81ED
31,491,731 UART: [art] SIG.R = A7277566841E02338611299D2C51FB34074088F119119C06127FDEE1A689DB8EAAE626AA56BEC79F6E4CEC135CDEC75A
31,499,105 UART: [art] SIG.S = 1AF34E8E8B6298C253F618A17C542264C05B38F8CADF8B780E08E71D053985C47EDA2AD9D0018CD7338D3F4A6FFC5ECC
32,804,469 UART: Caliptra RT
32,805,153 UART: [state] CFI Enabled
32,923,015 UART: [rt] RT listening for mailbox commands...
32,925,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,080,666 UART: [rt]cmd =0x41544d4e, len=14344
38,316,336 >>> mbox cmd response data (8 bytes)
38,316,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,347,329 UART: [rt]cmd =0x41545348, len=116
38,367,943 >>> mbox cmd response data (12 bytes)
38,369,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,399,720 UART: [rt]cmd =0x41545348, len=116
38,402,018 >>> mbox cmd response data (12 bytes)
40,455,260 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,600,463 UART:
40,600,838 UART: Running Caliptra ROM ...
40,601,884 UART:
40,602,094 UART: [state] CFI Enabled
40,614,638 UART: [state] LifecycleState = Unprovisioned
40,616,585 UART: [state] DebugLocked = No
40,618,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,623,989 UART: [kat] SHA2-256
40,793,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,804,235 UART: [kat] ++
40,804,782 UART: [kat] sha1
40,815,725 UART: [kat] SHA2-256
40,818,470 UART: [kat] SHA2-384
40,823,261 UART: [kat] SHA2-512-ACC
40,825,655 UART: [kat] ECC-384
43,110,480 UART: [kat] HMAC-384Kdf
43,121,746 UART: [kat] LMS
44,311,773 UART: [kat] --
44,316,985 UART: [update-reset] ++
48,464,746 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,468,701 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,850,964 >>> mbox cmd response: success
48,855,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,856,342 UART: [update-reset] Copying MAN_2 To MAN_1
48,874,356 UART: [update-reset Success] --
48,878,496 UART: [state] Locking Datavault
48,882,104 UART: [state] Locking PCR0, PCR1 and PCR31
48,883,859 UART: [state] Locking ICCM
48,886,435 UART: [exit] Launching FMC @ 0x40000130
48,894,823 UART:
48,895,054 UART: Running Caliptra FMC ...
48,896,150 UART:
48,896,307 UART: [state] CFI Enabled
48,940,638 UART: [art] Extend RT PCRs Done
48,941,778 UART: [art] Lock RT PCRs Done
48,943,242 UART: [art] Populate DV Done
48,948,755 UART: [fht] FMC Alias Private Key: 7
48,950,359 UART: [art] Derive CDI
48,951,171 UART: [art] Store in in slot 0x4
48,993,649 UART: [art] Derive Key Pair
48,994,713 UART: [art] Store priv key in slot 0x5
52,236,482 UART: [art] Derive Key Pair - Done
52,249,547 UART: [art] Signing Cert with AUTHO
52,250,854 UART: RITY.KEYID = 7
54,530,212 UART: [art] Erasing AUTHORITY.KEYID = 7
54,531,720 UART: [art] PUB.X = CDC9AC51E2BB58A5A4E05574E21BFA8F77DF2E5303D046EB3C46B03C989EAB7D761486912FC9942D3ABE26A9F70493F6
54,539,020 UART: [art] PUB.Y = 05034FCEE3524E29A00C62FE76F0D7059A44AFF4CEAF1F7E4BA23E9F9F823145FD5FCDE88589F8172ED7F907AC84F91F
54,546,253 UART: [art] SIG.R = EA24EE9298433EFAE812864D35EB58B3442FA9D69064784547392D32A2F1E4155A194C1F730DDC552EC907AB0BE24394
54,553,643 UART: [art] SIG.S = 284B250542A6125E70854C5EFDC0DE025D4DAE6DF02D1769730A0398364C69D2FB79158E8CC645B8AA3103376E5D2377
55,858,133 UART: Caliptra RT
55,858,842 UART: [state] CFI Enabled
56,148,033 UART: [rt] RT listening for mailbox commands...
56,179,878 UART: [rt]cmd =0x41545348, len=116
56,199,235 >>> mbox cmd response data (12 bytes)
56,200,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,230,682 UART: [rt]cmd =0x41545348, len=116
56,233,103 >>> mbox cmd response data (12 bytes)
60,255,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,411,169 UART: [rt]cmd =0x41544d4e, len=14344
65,646,833 >>> mbox cmd response data (8 bytes)
65,647,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,678,158 UART: [rt]cmd =0x41545348, len=116
65,698,492 >>> mbox cmd response data (12 bytes)
65,698,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,729,688 UART: [rt]cmd =0x41545348, len=116
65,731,873 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,131,590 ready_for_fw is high
4,131,964 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,288 >>> mbox cmd response: success
23,719,715 UART:
23,720,095 UART: Running Caliptra FMC ...
23,721,196 UART:
23,721,366 UART: [state] CFI Enabled
23,729,246 UART: [fht] FMC Alias Private Key: 7
26,060,390 UART: [art] Extend RT PCRs Done
26,061,620 UART: [art] Lock RT PCRs Done
26,062,903 UART: [art] Populate DV Done
26,068,321 UART: [fht] FMC Alias Private Key: 7
26,069,981 UART: [art] Derive CDI
26,070,794 UART: [art] Store in in slot 0x4
26,113,398 UART: [art] Derive Key Pair
26,114,444 UART: [art] Store priv key in slot 0x5
29,356,781 UART: [art] Derive Key Pair - Done
29,369,616 UART: [art] Signing Cert with AUTHO
29,370,917 UART: RITY.KEYID = 7
31,650,513 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,019 UART: [art] PUB.X = 20486302F7177CFC8F9FD5228DEB5813E03966E4AAC79242F7CF7EE0B8405D2A8371F6D195B151242AC0213BD6960663
31,659,243 UART: [art] PUB.Y = 52E39A52D6A9184898E4C94ACF874F409FF4134979AFDBABC73C0BA9482714B66153AA2138802BDD189412F271D8CFC3
31,666,481 UART: [art] SIG.R = 01CD3F137FE33DD60AAEFC1E362181BE91D49F625C18CF8968BF87B37722DF3B72BBB6D60B4B091EC0DF971041BEB6AD
31,673,970 UART: [art] SIG.S = 426C071160ED66BE9E7034D64E06F3B059B56DAD70188380DA4EFC7C53D47BF9F631512DB2A5B2788C354717CFBCC9C1
32,978,769 UART: Caliptra RT
32,979,489 UART: [state] CFI Enabled
33,097,585 UART: [rt] RT listening for mailbox commands...
33,100,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,255,488 UART: [rt]cmd =0x41544d4e, len=14344
38,491,146 >>> mbox cmd response data (8 bytes)
38,491,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,522,632 UART: [rt]cmd =0x41545348, len=116
38,542,266 >>> mbox cmd response data (12 bytes)
38,543,483 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,574,179 UART: [rt]cmd =0x41545348, len=116
38,576,411 >>> mbox cmd response data (12 bytes)
40,628,684 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,289,600 >>> mbox cmd response: success
49,290,259 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,324,350 UART:
49,324,631 UART: Running Caliptra FMC ...
49,325,834 UART:
49,325,996 UART: [state] CFI Enabled
49,370,304 UART: [art] Extend RT PCRs Done
49,371,495 UART: [art] Lock RT PCRs Done
49,373,001 UART: [art] Populate DV Done
49,378,522 UART: [fht] FMC Alias Private Key: 7
49,380,163 UART: [art] Derive CDI
49,380,972 UART: [art] Store in in slot 0x4
49,423,095 UART: [art] Derive Key Pair
49,424,092 UART: [art] Store priv key in slot 0x5
52,666,452 UART: [art] Derive Key Pair - Done
52,679,442 UART: [art] Signing Cert with AUTHO
52,680,741 UART: RITY.KEYID = 7
54,960,219 UART: [art] Erasing AUTHORITY.KEYID = 7
54,961,730 UART: [art] PUB.X = 5C66079F954B20BA639073BEB0387A4769399193983BF07C854AAB3067B8F66AD7C92301E2DFBBAA953BE251EB160E7D
54,968,996 UART: [art] PUB.Y = 0143D36E84AD246161DF468D1BF95CF75BF98635186B44BF52B15EE4B5E0805F47B43CE39C3E7D278D1BF3CCFE07B46F
54,976,229 UART: [art] SIG.R = 5C02FDAD1318E04464F5189A14FE70192025A5F5DD6C33B2C07CB73E97B00ABAA6CE7E61267CEABA624D1AD1B77644E3
54,983,614 UART: [art] SIG.S = B3DEED69742B15EAE124F7A9F915362B0D11E73E12119A9CB0980E7ACCF6F453AB75168F0EA5FEE86E3BCC0FF1BC96D4
56,288,657 UART: Caliptra RT
56,289,358 UART: [state] CFI Enabled
56,575,145 UART: [rt] RT listening for mailbox commands...
56,607,212 UART: [rt]cmd =0x41545348, len=116
56,627,325 >>> mbox cmd response data (12 bytes)
56,628,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,659,045 UART: [rt]cmd =0x41545348, len=116
56,661,440 >>> mbox cmd response data (12 bytes)
60,685,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,840,623 UART: [rt]cmd =0x41544d4e, len=14344
66,075,679 >>> mbox cmd response data (8 bytes)
66,076,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,107,163 UART: [rt]cmd =0x41545348, len=116
66,126,651 >>> mbox cmd response data (12 bytes)
66,127,077 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,157,753 UART: [rt]cmd =0x41545348, len=116
66,159,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,079 UART:
192,451 UART: Running Caliptra ROM ...
193,651 UART:
193,803 UART: [state] CFI Enabled
264,378 UART: [state] LifecycleState = Unprovisioned
266,241 UART: [state] DebugLocked = No
269,185 UART: [state] WD Timer not started. Device not locked for debugging
272,610 UART: [kat] SHA2-256
451,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,349 UART: [kat] ++
463,820 UART: [kat] sha1
475,193 UART: [kat] SHA2-256
478,273 UART: [kat] SHA2-384
485,397 UART: [kat] SHA2-512-ACC
488,401 UART: [kat] ECC-384
2,946,943 UART: [kat] HMAC-384Kdf
2,970,969 UART: [kat] LMS
3,500,457 UART: [kat] --
3,504,521 UART: [cold-reset] ++
3,505,668 UART: [fht] FHT @ 0x50003400
3,515,220 UART: [idev] ++
3,515,787 UART: [idev] CDI.KEYID = 6
3,516,700 UART: [idev] SUBJECT.KEYID = 7
3,517,945 UART: [idev] UDS.KEYID = 0
3,518,868 ready_for_fw is high
3,519,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,509 UART: [idev] Erasing UDS.KEYID = 0
6,027,634 UART: [idev] Sha1 KeyId Algorithm
6,049,540 UART: [idev] --
6,053,900 UART: [ldev] ++
6,054,481 UART: [ldev] CDI.KEYID = 6
6,055,395 UART: [ldev] SUBJECT.KEYID = 5
6,056,557 UART: [ldev] AUTHORITY.KEYID = 7
6,057,790 UART: [ldev] FE.KEYID = 1
6,098,848 UART: [ldev] Erasing FE.KEYID = 1
8,604,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,642 UART: [ldev] --
10,409,442 UART: [fwproc] Wait for Commands...
10,411,388 UART: [fwproc] Recv command 0x46574c44
10,413,492 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,848 >>> mbox cmd response: success
14,280,377 UART: [afmc] ++
14,280,970 UART: [afmc] CDI.KEYID = 6
14,281,881 UART: [afmc] SUBJECT.KEYID = 7
14,283,042 UART: [afmc] AUTHORITY.KEYID = 5
16,805,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,847 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,987 UART: [afmc] --
18,606,603 UART: [cold-reset] --
18,610,737 UART: [state] Locking Datavault
18,617,010 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,663 UART: [state] Locking ICCM
18,619,841 UART: [exit] Launching FMC @ 0x40000130
18,628,281 UART:
18,628,524 UART: Running Caliptra FMC ...
18,629,626 UART:
18,629,789 UART: [state] CFI Enabled
18,689,028 UART: [fht] FMC Alias Private Key: 7
20,453,354 UART: [art] Extend RT PCRs Done
20,454,557 UART: [art] Lock RT PCRs Done
20,456,120 UART: [art] Populate DV Done
20,461,476 UART: [fht] FMC Alias Private Key: 7
20,463,183 UART: [art] Derive CDI
20,464,019 UART: [art] Store in in slot 0x4
20,522,107 UART: [art] Derive Key Pair
20,523,143 UART: [art] Store priv key in slot 0x5
22,985,964 UART: [art] Derive Key Pair - Done
22,998,874 UART: [art] Signing Cert with AUTHO
23,000,205 UART: RITY.KEYID = 7
24,711,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,781 UART: [art] PUB.X = 1DE820BBB8ECC715EDC4C199DAF844E3D67F29BC289A0238ED208F8FA78F6177090CAB6C71B41A0C8D47665AAD564C2A
24,720,086 UART: [art] PUB.Y = 0765C8050AD265522BC0CB5B5BEA68FE635281F3A3E06420E6AD9C93A515256130CE4162CDFE193986D73245D2F91204
24,727,316 UART: [art] SIG.R = 28A5C342007350EE97B9846F6291807E218529CDE303962FE8932E961F5E2BE56D4A73ADE52CC50FC43BE65E80B3657F
24,734,704 UART: [art] SIG.S = 3B66920E086888B225AA7368FCE9EC56763AE15C5D9407647B6EC2B5BED0539E3D771C6D4106340172889BC1EC4586EB
25,713,610 UART: Caliptra RT
25,714,303 UART: [state] CFI Enabled
25,878,754 UART: [rt] RT listening for mailbox commands...
25,881,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,037,044 UART: [rt]cmd =0x41544d4e, len=14344
29,967,185 >>> mbox cmd response data (8 bytes)
29,967,760 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,998,437 UART: [rt]cmd =0x41545348, len=116
30,018,788 >>> mbox cmd response data (12 bytes)
30,019,765 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,050,555 UART: [rt]cmd =0x41545348, len=116
30,052,740 >>> mbox cmd response data (12 bytes)
32,121,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,267,014 UART:
32,267,382 UART: Running Caliptra ROM ...
32,268,521 UART:
32,268,693 UART: [state] CFI Enabled
32,339,226 UART: [state] LifecycleState = Unprovisioned
32,341,107 UART: [state] DebugLocked = No
32,343,848 UART: [state] WD Timer not started. Device not locked for debugging
32,347,592 UART: [kat] SHA2-256
32,526,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,538,268 UART: [kat] ++
32,538,806 UART: [kat] sha1
32,551,160 UART: [kat] SHA2-256
32,554,220 UART: [kat] SHA2-384
32,560,578 UART: [kat] SHA2-512-ACC
32,563,525 UART: [kat] ECC-384
35,029,209 UART: [kat] HMAC-384Kdf
35,050,587 UART: [kat] LMS
35,580,070 UART: [kat] --
35,582,872 UART: [update-reset] ++
39,014,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,018,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,401,696 >>> mbox cmd response: success
39,402,134 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,402,684 UART: [update-reset] Copying MAN_2 To MAN_1
39,425,014 UART: [update-reset Success] --
39,429,627 UART: [state] Locking Datavault
39,434,168 UART: [state] Locking PCR0, PCR1 and PCR31
39,435,864 UART: [state] Locking ICCM
39,438,095 UART: [exit] Launching FMC @ 0x40000130
39,446,545 UART:
39,446,779 UART: Running Caliptra FMC ...
39,447,804 UART:
39,447,948 UART: [state] CFI Enabled
39,541,548 UART: [art] Extend RT PCRs Done
39,542,731 UART: [art] Lock RT PCRs Done
39,544,429 UART: [art] Populate DV Done
39,549,798 UART: [fht] FMC Alias Private Key: 7
39,551,472 UART: [art] Derive CDI
39,552,214 UART: [art] Store in in slot 0x4
39,610,366 UART: [art] Derive Key Pair
39,611,367 UART: [art] Store priv key in slot 0x5
42,074,235 UART: [art] Derive Key Pair - Done
42,087,341 UART: [art] Signing Cert with AUTHO
42,088,646 UART: RITY.KEYID = 7
43,799,678 UART: [art] Erasing AUTHORITY.KEYID = 7
43,801,184 UART: [art] PUB.X = F71BD5FC705915233CA6B2B4E2A425D558B6D1565D777600393D8E7E21C4086347665F42140DCE602B0F265ED5D5A9D6
43,808,429 UART: [art] PUB.Y = 77C25FEE2FB26D7595AE7EDD032185B2D015207B71A54426A2A243FF1C58C76703C40DBB5673034A6403F2A76A15CB40
43,815,657 UART: [art] SIG.R = D26E02E8D403FA2963149B13B544B88353FD30BFE9572DE4B5C4A81188DB01BC3AC0E95A0DC14BD85E249CB33C5C2D02
43,823,052 UART: [art] SIG.S = F8F3366CAEA5CFD2C35594B1FD66A1FF504143BC8A7B89229A84688844CCFF58EC9041923D6E5B006C53B93BC0F6D762
44,801,852 UART: Caliptra RT
44,802,540 UART: [state] CFI Enabled
45,143,630 UART: [rt] RT listening for mailbox commands...
45,175,467 UART: [rt]cmd =0x41545348, len=116
45,195,260 >>> mbox cmd response data (12 bytes)
45,196,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,226,948 UART: [rt]cmd =0x41545348, len=116
45,228,822 >>> mbox cmd response data (12 bytes)
49,270,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,426,576 UART: [rt]cmd =0x41544d4e, len=14344
53,356,982 >>> mbox cmd response data (8 bytes)
53,357,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,388,413 UART: [rt]cmd =0x41545348, len=116
53,409,216 >>> mbox cmd response data (12 bytes)
53,409,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,440,511 UART: [rt]cmd =0x41545348, len=116
53,442,652 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,911 writing to cptra_bootfsm_go
3,361,719 ready_for_fw is high
3,362,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,959 >>> mbox cmd response: success
18,366,770 UART:
18,367,170 UART: Running Caliptra FMC ...
18,368,280 UART:
18,368,434 UART: [state] CFI Enabled
18,435,963 UART: [fht] FMC Alias Private Key: 7
20,200,211 UART: [art] Extend RT PCRs Done
20,201,429 UART: [art] Lock RT PCRs Done
20,203,243 UART: [art] Populate DV Done
20,208,906 UART: [fht] FMC Alias Private Key: 7
20,210,609 UART: [art] Derive CDI
20,211,346 UART: [art] Store in in slot 0x4
20,268,369 UART: [art] Derive Key Pair
20,269,425 UART: [art] Store priv key in slot 0x5
22,732,759 UART: [art] Derive Key Pair - Done
22,745,698 UART: [art] Signing Cert with AUTHO
22,746,998 UART: RITY.KEYID = 7
24,459,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,622 UART: [art] PUB.X = 491ABE661EFA7AF4A6CCF0B337744C87EA9AE72644539E9BF70C0F3B8CDA7935B95AA56FDF115C0AD13568096AEF8021
24,467,884 UART: [art] PUB.Y = 151B70FEDB9EAEB03BEEEE00AD70F4F36048E01F19DF8225E3B9650E58A059E3CBBC99D4DA3015E77F2E6E5E96341596
24,475,163 UART: [art] SIG.R = 9F0A5C0D91C675E3515B57E832575F38730C4E890611010CC93F1009EE82A4DF1D9B485259B6A4AE2577702AE2E85A3C
24,482,560 UART: [art] SIG.S = E5C0B0BDB234F0CE1D24A938522A14CC5F8DAFD62E7EE768A87FFEFD4F64AE312F86C6B8E568D4F58B967CE75C6653B7
25,461,508 UART: Caliptra RT
25,462,216 UART: [state] CFI Enabled
25,626,881 UART: [rt] RT listening for mailbox commands...
25,629,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,784,992 UART: [rt]cmd =0x41544d4e, len=14344
29,715,900 >>> mbox cmd response data (8 bytes)
29,716,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,747,462 UART: [rt]cmd =0x41545348, len=116
29,767,503 >>> mbox cmd response data (12 bytes)
29,768,662 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,799,553 UART: [rt]cmd =0x41545348, len=116
29,801,748 >>> mbox cmd response data (12 bytes)
31,861,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,995,410 >>> mbox cmd response: success
38,995,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,028,340 UART:
39,028,643 UART: Running Caliptra FMC ...
39,029,864 UART:
39,030,032 UART: [state] CFI Enabled
39,122,019 UART: [art] Extend RT PCRs Done
39,123,221 UART: [art] Lock RT PCRs Done
39,124,679 UART: [art] Populate DV Done
39,130,195 UART: [fht] FMC Alias Private Key: 7
39,131,943 UART: [art] Derive CDI
39,132,753 UART: [art] Store in in slot 0x4
39,191,599 UART: [art] Derive Key Pair
39,192,601 UART: [art] Store priv key in slot 0x5
41,655,159 UART: [art] Derive Key Pair - Done
41,668,157 UART: [art] Signing Cert with AUTHO
41,669,458 UART: RITY.KEYID = 7
43,381,365 UART: [art] Erasing AUTHORITY.KEYID = 7
43,382,876 UART: [art] PUB.X = A7FD5CA1000A7DE7D1861581E58D420FBC8FBC6CBE24EDB6463886A8FA4B6300E0FA8E526FFFD802CBD0810E1778D73C
43,390,129 UART: [art] PUB.Y = B9A5AD250F1D79ED51CE427D158EB826C9CFA3C154231158E5A0546FB7CFEC09E9AC2F8CA225BB9546EAC8BBCECB0DA0
43,397,427 UART: [art] SIG.R = 65494773E936DEBD6B85C150024F77157C07DA1CE072A6206AAD8462C58D9D4C02C36F825EEA01449936124C7BA9256B
43,404,821 UART: [art] SIG.S = 9B642BDB221A3D5F1EEBB2E7DBD146DF62D84E896353D52ADE4F31C5F322095F1D825A39370C9D9B3F7FC5F5E36113EC
44,383,476 UART: Caliptra RT
44,384,187 UART: [state] CFI Enabled
44,718,524 UART: [rt] RT listening for mailbox commands...
44,750,333 UART: [rt]cmd =0x41545348, len=116
44,770,491 >>> mbox cmd response data (12 bytes)
44,771,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,802,215 UART: [rt]cmd =0x41545348, len=116
44,804,296 >>> mbox cmd response data (12 bytes)
48,857,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,013,128 UART: [rt]cmd =0x41544d4e, len=14344
52,944,094 >>> mbox cmd response data (8 bytes)
52,944,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,975,195 UART: [rt]cmd =0x41545348, len=116
52,995,252 >>> mbox cmd response data (12 bytes)
52,995,683 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,026,340 UART: [rt]cmd =0x41545348, len=116
53,028,175 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,367 UART:
192,753 UART: Running Caliptra ROM ...
193,954 UART:
603,349 UART: [state] CFI Enabled
616,088 UART: [state] LifecycleState = Unprovisioned
617,901 UART: [state] DebugLocked = No
619,782 UART: [state] WD Timer not started. Device not locked for debugging
623,090 UART: [kat] SHA2-256
802,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,840 UART: [kat] ++
814,305 UART: [kat] sha1
825,738 UART: [kat] SHA2-256
828,815 UART: [kat] SHA2-384
835,295 UART: [kat] SHA2-512-ACC
838,293 UART: [kat] ECC-384
3,279,829 UART: [kat] HMAC-384Kdf
3,293,546 UART: [kat] LMS
3,823,037 UART: [kat] --
3,828,320 UART: [cold-reset] ++
3,829,178 UART: [fht] FHT @ 0x50003400
3,840,291 UART: [idev] ++
3,840,844 UART: [idev] CDI.KEYID = 6
3,841,816 UART: [idev] SUBJECT.KEYID = 7
3,842,984 UART: [idev] UDS.KEYID = 0
3,844,025 ready_for_fw is high
3,844,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,942 UART: [idev] Erasing UDS.KEYID = 0
6,313,060 UART: [idev] Sha1 KeyId Algorithm
6,336,070 UART: [idev] --
6,340,603 UART: [ldev] ++
6,341,172 UART: [ldev] CDI.KEYID = 6
6,342,076 UART: [ldev] SUBJECT.KEYID = 5
6,343,285 UART: [ldev] AUTHORITY.KEYID = 7
6,344,508 UART: [ldev] FE.KEYID = 1
6,355,092 UART: [ldev] Erasing FE.KEYID = 1
8,828,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,674 UART: [ldev] --
10,622,451 UART: [fwproc] Wait for Commands...
10,625,095 UART: [fwproc] Recv command 0x46574c44
10,627,181 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,517 >>> mbox cmd response: success
14,504,146 UART: [afmc] ++
14,504,732 UART: [afmc] CDI.KEYID = 6
14,505,609 UART: [afmc] SUBJECT.KEYID = 7
14,506,815 UART: [afmc] AUTHORITY.KEYID = 5
17,003,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,292 UART: [afmc] --
18,801,588 UART: [cold-reset] --
18,805,506 UART: [state] Locking Datavault
18,810,698 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,340 UART: [state] Locking ICCM
18,813,888 UART: [exit] Launching FMC @ 0x40000130
18,822,336 UART:
18,822,572 UART: Running Caliptra FMC ...
18,823,666 UART:
18,823,815 UART: [state] CFI Enabled
18,831,798 UART: [fht] FMC Alias Private Key: 7
20,588,676 UART: [art] Extend RT PCRs Done
20,589,908 UART: [art] Lock RT PCRs Done
20,591,373 UART: [art] Populate DV Done
20,596,576 UART: [fht] FMC Alias Private Key: 7
20,598,105 UART: [art] Derive CDI
20,598,878 UART: [art] Store in in slot 0x4
20,642,006 UART: [art] Derive Key Pair
20,643,053 UART: [art] Store priv key in slot 0x5
23,070,092 UART: [art] Derive Key Pair - Done
23,083,094 UART: [art] Signing Cert with AUTHO
23,084,443 UART: RITY.KEYID = 7
24,789,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,421 UART: [art] PUB.X = C460801EAB50D99729BF6341DCE962F96B269FD2D10601D71A4E925F079E5A65A57C8C869444C0A96E1C8966166B74C1
24,798,648 UART: [art] PUB.Y = 163AC53CB5895B486BB6732260F8CB98E9E17F9F07A062A19962E0CEE8C53DA9D3B3AFCDD8E330BA7AA2A22DD47707B3
24,805,915 UART: [art] SIG.R = 463BF5767C4ECCB140AF4622ED9246024DCA4C10C792C908B158B3B0799FA2E1AFDB13B52D4BCB3BADE4AA34DF4FB692
24,813,342 UART: [art] SIG.S = DD4C437C19D6B55DBABEBBD3FEEBB4C4B52187FA8A8E06CCE909F3A1F2C864B4F938B0E7087E82A4213B76D996F9F56C
25,793,017 UART: Caliptra RT
25,793,723 UART: [state] CFI Enabled
25,910,760 UART: [rt] RT listening for mailbox commands...
25,913,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,068,590 UART: [rt]cmd =0x41544d4e, len=14344
29,999,799 >>> mbox cmd response data (8 bytes)
30,000,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,030,884 UART: [rt]cmd =0x41545348, len=116
30,050,321 >>> mbox cmd response data (12 bytes)
30,051,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,082,391 UART: [rt]cmd =0x41545348, len=116
30,084,537 >>> mbox cmd response data (12 bytes)
32,136,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,282,253 UART:
32,282,616 UART: Running Caliptra ROM ...
32,283,902 UART:
32,284,068 UART: [state] CFI Enabled
32,298,347 UART: [state] LifecycleState = Unprovisioned
32,300,185 UART: [state] DebugLocked = No
32,301,460 UART: [state] WD Timer not started. Device not locked for debugging
32,305,962 UART: [kat] SHA2-256
32,485,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,496,748 UART: [kat] ++
32,497,283 UART: [kat] sha1
32,508,711 UART: [kat] SHA2-256
32,511,781 UART: [kat] SHA2-384
32,518,521 UART: [kat] SHA2-512-ACC
32,521,454 UART: [kat] ECC-384
34,965,177 UART: [kat] HMAC-384Kdf
34,977,561 UART: [kat] LMS
35,507,068 UART: [kat] --
35,513,234 UART: [update-reset] ++
38,936,203 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,939,395 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,322,686 >>> mbox cmd response: success
39,323,342 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,323,967 UART: [update-reset] Copying MAN_2 To MAN_1
39,346,305 UART: [update-reset Success] --
39,350,642 UART: [state] Locking Datavault
39,353,615 UART: [state] Locking PCR0, PCR1 and PCR31
39,355,250 UART: [state] Locking ICCM
39,358,014 UART: [exit] Launching FMC @ 0x40000130
39,366,459 UART:
39,366,682 UART: Running Caliptra FMC ...
39,367,773 UART:
39,367,926 UART: [state] CFI Enabled
39,412,036 UART: [art] Extend RT PCRs Done
39,413,223 UART: [art] Lock RT PCRs Done
39,414,564 UART: [art] Populate DV Done
39,420,360 UART: [fht] FMC Alias Private Key: 7
39,422,051 UART: [art] Derive CDI
39,422,854 UART: [art] Store in in slot 0x4
39,465,633 UART: [art] Derive Key Pair
39,466,629 UART: [art] Store priv key in slot 0x5
41,893,555 UART: [art] Derive Key Pair - Done
41,906,960 UART: [art] Signing Cert with AUTHO
41,908,254 UART: RITY.KEYID = 7
43,613,449 UART: [art] Erasing AUTHORITY.KEYID = 7
43,614,943 UART: [art] PUB.X = C1AE2EE7A20821174203E861F94F6E67DE9C1040F21D93B2BD18F8665BA18B1CEA1A6A691A85CCCEB09083754213F552
43,622,181 UART: [art] PUB.Y = B83D49B6C9E3C4878D3C68DB9F354C5327DD96EADD88E67C8AB6CBAF96FDACCE7569AEF9BCA0B591FFC829EF0833952C
43,629,520 UART: [art] SIG.R = 4053ABF4B23EF2900CE39B4CC1CEFC1FE9D228E472E013D8316835C50F7A63151C51555CA3D90A082B6B64CCB1F029AD
43,636,900 UART: [art] SIG.S = 32932069E98805B58614734277C710D25ED07EEF425AD2877310473782057835D7983DB4F72BB1FFBBE69CE8F9746008
44,615,382 UART: Caliptra RT
44,616,094 UART: [state] CFI Enabled
44,904,985 UART: [rt] RT listening for mailbox commands...
44,937,058 UART: [rt]cmd =0x41545348, len=116
44,957,368 >>> mbox cmd response data (12 bytes)
44,958,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,989,464 UART: [rt]cmd =0x41545348, len=116
44,991,672 >>> mbox cmd response data (12 bytes)
49,033,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,189,020 UART: [rt]cmd =0x41544d4e, len=14344
53,119,635 >>> mbox cmd response data (8 bytes)
53,120,174 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,150,844 UART: [rt]cmd =0x41545348, len=116
53,171,133 >>> mbox cmd response data (12 bytes)
53,171,601 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,202,528 UART: [rt]cmd =0x41545348, len=116
53,204,559 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,699,425 ready_for_fw is high
3,699,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,047 >>> mbox cmd response: success
18,535,103 UART:
18,535,580 UART: Running Caliptra FMC ...
18,536,710 UART:
18,536,864 UART: [state] CFI Enabled
18,544,824 UART: [fht] FMC Alias Private Key: 7
20,301,566 UART: [art] Extend RT PCRs Done
20,302,786 UART: [art] Lock RT PCRs Done
20,304,483 UART: [art] Populate DV Done
20,309,939 UART: [fht] FMC Alias Private Key: 7
20,311,581 UART: [art] Derive CDI
20,312,344 UART: [art] Store in in slot 0x4
20,354,880 UART: [art] Derive Key Pair
20,355,880 UART: [art] Store priv key in slot 0x5
22,782,251 UART: [art] Derive Key Pair - Done
22,795,084 UART: [art] Signing Cert with AUTHO
22,796,384 UART: RITY.KEYID = 7
24,502,118 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,609 UART: [art] PUB.X = 224E94E44B33C1388F5F993A7D6C17228980D16B1A42710DD9F33DC2D2E4C89A6611FFC2EB432B7AC0319806A03D9806
24,510,911 UART: [art] PUB.Y = B203BD5E15327BC00D59F165C0F989590CE1862BCFC8020C38CE388022AD70DACFD0FC270AD727D5AFA69C1AF08B81DC
24,518,152 UART: [art] SIG.R = 017787AB8342B4AB55BBAABC2BB3C2DB3466D4942B9AC3EE97DD22F08EA3820F2622A3F9FE116D688EE0CA48667289A4
24,525,591 UART: [art] SIG.S = 8B6F090D8229E288F1E8B34C52EF119A5DE1BFE166EF3FAA52681BDE9C41E93DD93AD45B8D65F9543138491DE5373314
25,504,347 UART: Caliptra RT
25,505,059 UART: [state] CFI Enabled
25,622,874 UART: [rt] RT listening for mailbox commands...
25,625,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,780,556 UART: [rt]cmd =0x41544d4e, len=14344
29,710,563 >>> mbox cmd response data (8 bytes)
29,711,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,741,659 UART: [rt]cmd =0x41545348, len=116
29,762,359 >>> mbox cmd response data (12 bytes)
29,763,679 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,794,581 UART: [rt]cmd =0x41545348, len=116
29,796,617 >>> mbox cmd response data (12 bytes)
31,850,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,893,361 >>> mbox cmd response: success
38,893,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,928,446 UART:
38,928,743 UART: Running Caliptra FMC ...
38,929,949 UART:
38,930,103 UART: [state] CFI Enabled
38,974,188 UART: [art] Extend RT PCRs Done
38,975,378 UART: [art] Lock RT PCRs Done
38,976,941 UART: [art] Populate DV Done
38,982,669 UART: [fht] FMC Alias Private Key: 7
38,984,415 UART: [art] Derive CDI
38,985,225 UART: [art] Store in in slot 0x4
39,028,058 UART: [art] Derive Key Pair
39,029,101 UART: [art] Store priv key in slot 0x5
41,456,091 UART: [art] Derive Key Pair - Done
41,469,096 UART: [art] Signing Cert with AUTHO
41,470,399 UART: RITY.KEYID = 7
43,175,724 UART: [art] Erasing AUTHORITY.KEYID = 7
43,177,232 UART: [art] PUB.X = 5C82BC6D65A6E5FD19924E589324C7D3694862237EBD7A3075FAAE5012E8A6992C211920D019F10C45EC2AB1D7B16646
43,184,473 UART: [art] PUB.Y = CCDB282BF4403A5BF015B91C44C17BB97F801F00EA8DF9F0F142DD921122F617416D8DA0F75A2B12AB1EA1E4E009B1DB
43,191,755 UART: [art] SIG.R = 621A997373CD3D049380482F761949B261B7F8C7A6066F8A25AAB7AF50A51F9B75D93D8517ABFE80566697D0037C05C4
43,199,133 UART: [art] SIG.S = 4AAD67D2DC499304E0D39DEFC995B9BCB30575EEAD13EDC98BABE044ECF5EA845624D08F947FE23352CD3A305DD968FB
44,178,262 UART: Caliptra RT
44,178,976 UART: [state] CFI Enabled
44,461,749 UART: [rt] RT listening for mailbox commands...
44,493,603 UART: [rt]cmd =0x41545348, len=116
44,513,066 >>> mbox cmd response data (12 bytes)
44,514,022 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,544,743 UART: [rt]cmd =0x41545348, len=116
44,546,813 >>> mbox cmd response data (12 bytes)
48,581,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
48,736,725 UART: [rt]cmd =0x41544d4e, len=14344
52,667,818 >>> mbox cmd response data (8 bytes)
52,668,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,699,231 UART: [rt]cmd =0x41545348, len=116
52,719,233 >>> mbox cmd response data (12 bytes)
52,719,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,750,487 UART: [rt]cmd =0x41545348, len=116
52,752,785 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,164 UART:
192,526 UART: Running Caliptra ROM ...
193,730 UART:
193,896 UART: [state] CFI Enabled
262,508 UART: [state] LifecycleState = Unprovisioned
264,850 UART: [state] DebugLocked = No
266,741 UART: [state] WD Timer not started. Device not locked for debugging
271,760 UART: [kat] SHA2-256
461,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,386 UART: [kat] ++
472,878 UART: [kat] sha1
483,398 UART: [kat] SHA2-256
486,416 UART: [kat] SHA2-384
491,768 UART: [kat] SHA2-512-ACC
494,347 UART: [kat] ECC-384
2,946,840 UART: [kat] HMAC-384Kdf
2,972,024 UART: [kat] LMS
3,503,764 UART: [kat] --
3,509,035 UART: [cold-reset] ++
3,510,044 UART: [fht] FHT @ 0x50003400
3,522,297 UART: [idev] ++
3,522,928 UART: [idev] CDI.KEYID = 6
3,523,880 UART: [idev] SUBJECT.KEYID = 7
3,525,119 UART: [idev] UDS.KEYID = 0
3,526,017 ready_for_fw is high
3,526,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,250 UART: [idev] Erasing UDS.KEYID = 0
6,030,890 UART: [idev] Sha1 KeyId Algorithm
6,052,326 UART: [idev] --
6,056,418 UART: [ldev] ++
6,057,102 UART: [ldev] CDI.KEYID = 6
6,058,045 UART: [ldev] SUBJECT.KEYID = 5
6,059,230 UART: [ldev] AUTHORITY.KEYID = 7
6,060,413 UART: [ldev] FE.KEYID = 1
6,100,393 UART: [ldev] Erasing FE.KEYID = 1
8,608,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,686 UART: [ldev] --
10,413,108 UART: [fwproc] Wait for Commands...
10,414,924 UART: [fwproc] Recv command 0x46574c44
10,417,175 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,602,143 >>> mbox cmd response: success
14,606,983 UART: [afmc] ++
14,607,691 UART: [afmc] CDI.KEYID = 6
14,608,799 UART: [afmc] SUBJECT.KEYID = 7
14,610,340 UART: [afmc] AUTHORITY.KEYID = 5
17,145,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,133 UART: [afmc] --
18,945,572 UART: [cold-reset] --
18,950,249 UART: [state] Locking Datavault
18,954,856 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,991 UART: [state] Locking ICCM
18,958,711 UART: [exit] Launching FMC @ 0x40000130
18,967,349 UART:
18,967,586 UART: Running Caliptra FMC ...
18,968,689 UART:
18,968,847 UART: [state] CFI Enabled
19,026,274 UART: [fht] FMC Alias Private Key: 7
20,790,566 UART: [art] Extend RT PCRs Done
20,791,778 UART: [art] Lock RT PCRs Done
20,793,482 UART: [art] Populate DV Done
20,799,107 UART: [fht] FMC Alias Private Key: 7
20,800,697 UART: [art] Derive CDI
20,801,511 UART: [art] Store in in slot 0x4
20,859,038 UART: [art] Derive Key Pair
20,860,074 UART: [art] Store priv key in slot 0x5
23,323,014 UART: [art] Derive Key Pair - Done
23,336,008 UART: [art] Signing Cert with AUTHO
23,337,337 UART: RITY.KEYID = 7
25,048,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,049,913 UART: [art] PUB.X = 2B2EFD8BBAC1A360D8C2B63F84EEE9EDED32F3542D4A4FD82569EE96DFB242C1C83FF34A25C27B235B43C59E34E61D20
25,057,160 UART: [art] PUB.Y = FB7AE6C51502ECA67098D812D82F8B59FC31ACD3E58F929E2B52E6BD0A1BE2DA442F032F0694238EBC1BA318BD9527B8
25,064,501 UART: [art] SIG.R = 732BA686A46F8FC80EFA7EDA68987178CB6BB6FBBB40BFB9DCB3E37948658698E5C4497689B37691F199894BFCB9D478
25,071,884 UART: [art] SIG.S = 5DD0E7C07068DC0BA7F3EAEEED680D093EAF2516B6F20B5D21767046E0480564314B79DC2B4C54C8A30EEECC1EAEDB1A
26,051,223 UART: Caliptra RT
26,051,926 UART: [state] CFI Enabled
26,216,871 UART: [rt] RT listening for mailbox commands...
26,219,263 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,374,901 UART: [rt]cmd =0x41544d4e, len=14344
30,305,017 >>> mbox cmd response data (8 bytes)
30,305,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,336,275 UART: [rt]cmd =0x41545348, len=116
30,356,621 >>> mbox cmd response data (12 bytes)
30,357,761 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,388,575 UART: [rt]cmd =0x41545348, len=116
30,390,607 >>> mbox cmd response data (12 bytes)
32,454,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,599,657 UART:
32,600,031 UART: Running Caliptra ROM ...
32,601,168 UART:
32,601,338 UART: [state] CFI Enabled
32,661,050 UART: [state] LifecycleState = Unprovisioned
32,663,157 UART: [state] DebugLocked = No
32,664,828 UART: [state] WD Timer not started. Device not locked for debugging
32,668,857 UART: [kat] SHA2-256
32,858,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,869,464 UART: [kat] ++
32,870,001 UART: [kat] sha1
32,880,467 UART: [kat] SHA2-256
32,883,429 UART: [kat] SHA2-384
32,890,230 UART: [kat] SHA2-512-ACC
32,892,794 UART: [kat] ECC-384
35,344,307 UART: [kat] HMAC-384Kdf
35,368,203 UART: [kat] LMS
35,899,775 UART: [kat] --
35,905,013 UART: [update-reset] ++
39,370,142 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,372,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,981,223 >>> mbox cmd response: success
39,985,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,986,560 UART: [update-reset] Copying MAN_2 To MAN_1
40,019,859 UART: [update-reset Success] --
40,024,154 UART: [state] Locking Datavault
40,027,634 UART: [state] Locking PCR0, PCR1 and PCR31
40,029,829 UART: [state] Locking ICCM
40,031,228 UART: [exit] Launching FMC @ 0x40000130
40,039,903 UART:
40,040,143 UART: Running Caliptra FMC ...
40,041,247 UART:
40,041,410 UART: [state] CFI Enabled
40,135,913 UART: [art] Extend RT PCRs Done
40,137,118 UART: [art] Lock RT PCRs Done
40,138,256 UART: [art] Populate DV Done
40,143,935 UART: [fht] FMC Alias Private Key: 7
40,145,706 UART: [art] Derive CDI
40,146,523 UART: [art] Store in in slot 0x4
40,204,188 UART: [art] Derive Key Pair
40,205,191 UART: [art] Store priv key in slot 0x5
42,667,668 UART: [art] Derive Key Pair - Done
42,680,456 UART: [art] Signing Cert with AUTHO
42,681,764 UART: RITY.KEYID = 7
44,393,891 UART: [art] Erasing AUTHORITY.KEYID = 7
44,395,409 UART: [art] PUB.X = C18E3E43616842BFE3CB1A1E5870281DC4CA7E28F38A350A5C2CB16337EE9A30E893A1CF7898077A7B9C1B03075CED82
44,402,667 UART: [art] PUB.Y = D3C45F5082200CEEC64D8BA28C7BFEC040B03186F80AE44C48CD90D4D56255D3A4D79C608DEFE5241268B113816B491D
44,409,945 UART: [art] SIG.R = 754E47138A93AF7D31736EA665ADC61C13D9DC702CD73E581159409DD97220C78CB9681BB2A3D15E03B47D38DB9537AE
44,417,271 UART: [art] SIG.S = D306055F9E47D9B6FDB21670AB92D5507A5ECB18EE4379D0D79F0F0E42F87CA03E30ADF4EF960AE9C24934E2AB84A8F1
45,396,660 UART: Caliptra RT
45,397,350 UART: [state] CFI Enabled
45,730,396 UART: [rt] RT listening for mailbox commands...
45,762,305 UART: [rt]cmd =0x41545348, len=116
45,782,059 >>> mbox cmd response data (12 bytes)
45,782,964 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,813,614 UART: [rt]cmd =0x41545348, len=116
45,815,735 >>> mbox cmd response data (12 bytes)
49,852,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,008,268 UART: [rt]cmd =0x41544d4e, len=14344
53,938,968 >>> mbox cmd response data (8 bytes)
53,939,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,970,176 UART: [rt]cmd =0x41545348, len=116
53,990,282 >>> mbox cmd response data (12 bytes)
53,990,754 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,021,415 UART: [rt]cmd =0x41545348, len=116
54,023,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,440,035 ready_for_fw is high
3,440,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,893 >>> mbox cmd response: success
19,024,147 UART:
19,024,535 UART: Running Caliptra FMC ...
19,025,734 UART:
19,025,908 UART: [state] CFI Enabled
19,092,659 UART: [fht] FMC Alias Private Key: 7
20,856,062 UART: [art] Extend RT PCRs Done
20,857,299 UART: [art] Lock RT PCRs Done
20,858,957 UART: [art] Populate DV Done
20,864,380 UART: [fht] FMC Alias Private Key: 7
20,866,028 UART: [art] Derive CDI
20,866,769 UART: [art] Store in in slot 0x4
20,926,000 UART: [art] Derive Key Pair
20,927,052 UART: [art] Store priv key in slot 0x5
23,389,478 UART: [art] Derive Key Pair - Done
23,402,419 UART: [art] Signing Cert with AUTHO
23,403,723 UART: RITY.KEYID = 7
25,115,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,185 UART: [art] PUB.X = 1D99B6CDD1AEAE9EAA90CF596BC4C97A2A3251279A7AB4DCD1CEBF4A112606D98E8B66BD75BECF9B6AE59EADE7EA883E
25,124,493 UART: [art] PUB.Y = 662FF9FF20253787A4B65A8D272ABF9E557F423FB0ADD0CE90B8D9FC1EDEB5AD1EC589E748D3DD47D8AE58C50B2909E0
25,131,778 UART: [art] SIG.R = AB08A9D973BCC6109263F463C7DBC828715EC49D5D17ED9B3A2B381563642418960DD18498B997DD15526189A1810AC0
25,139,138 UART: [art] SIG.S = 9307606DEC86FE06C96E1AD55A24C4666A4114C161499649C99A1B5011B8C04081A70D4AF5A10DC24D4331AF6CA87F4A
26,117,822 UART: Caliptra RT
26,118,527 UART: [state] CFI Enabled
26,284,539 UART: [rt] RT listening for mailbox commands...
26,287,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,442,720 UART: [rt]cmd =0x41544d4e, len=14344
30,373,500 >>> mbox cmd response data (8 bytes)
30,374,119 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,404,581 UART: [rt]cmd =0x41545348, len=116
30,424,153 >>> mbox cmd response data (12 bytes)
30,425,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,456,109 UART: [rt]cmd =0x41545348, len=116
30,458,158 >>> mbox cmd response data (12 bytes)
32,511,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,319,694 >>> mbox cmd response: success
40,320,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,354,729 UART:
40,355,057 UART: Running Caliptra FMC ...
40,356,194 UART:
40,356,354 UART: [state] CFI Enabled
40,459,219 UART: [art] Extend RT PCRs Done
40,460,413 UART: [art] Lock RT PCRs Done
40,461,789 UART: [art] Populate DV Done
40,466,877 UART: [fht] FMC Alias Private Key: 7
40,468,464 UART: [art] Derive CDI
40,469,202 UART: [art] Store in in slot 0x4
40,527,899 UART: [art] Derive Key Pair
40,528,943 UART: [art] Store priv key in slot 0x5
42,991,908 UART: [art] Derive Key Pair - Done
43,005,184 UART: [art] Signing Cert with AUTHO
43,006,500 UART: RITY.KEYID = 7
44,717,231 UART: [art] Erasing AUTHORITY.KEYID = 7
44,718,737 UART: [art] PUB.X = 3C4204E5ED1C1605EDC3BF2DEDA7703FEEAEFC12B044636D63D880C09FAF72F4CDA6BA7714EF7E47C8D2BBBAD8A3014F
44,726,045 UART: [art] PUB.Y = B1432E6B13475B23886E6D2E41C33935CCCE02D7771E01ADE25FEB316CDA418DD31C56E9EEFDB2638033C3C44441C4EF
44,733,341 UART: [art] SIG.R = 4248A7BAFAF0CE41F4BF2F28CB952195C4BB86117A2D3F04AF77AC3BE5AB7C99B4C888656A3DCA5DD54F4BE93EC48321
44,740,740 UART: [art] SIG.S = 5A6FFE724C82B329A850E8D7B7F920262B989ECEDD30F782007A8F7478BE64F5546C29A2F496BB5DA36238E8BBBE533B
45,719,406 UART: Caliptra RT
45,720,116 UART: [state] CFI Enabled
46,051,918 UART: [rt] RT listening for mailbox commands...
46,083,743 UART: [rt]cmd =0x41545348, len=116
46,102,970 >>> mbox cmd response data (12 bytes)
46,103,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,134,616 UART: [rt]cmd =0x41545348, len=116
46,136,664 >>> mbox cmd response data (12 bytes)
50,173,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,329,359 UART: [rt]cmd =0x41544d4e, len=14344
54,259,205 >>> mbox cmd response data (8 bytes)
54,259,749 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,290,589 UART: [rt]cmd =0x41545348, len=116
54,309,806 >>> mbox cmd response data (12 bytes)
54,310,256 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,340,845 UART: [rt]cmd =0x41545348, len=116
54,342,965 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,346 UART:
192,712 UART: Running Caliptra ROM ...
193,922 UART:
603,631 UART: [state] CFI Enabled
617,375 UART: [state] LifecycleState = Unprovisioned
619,987 UART: [state] DebugLocked = No
622,631 UART: [state] WD Timer not started. Device not locked for debugging
626,739 UART: [kat] SHA2-256
816,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,430 UART: [kat] ++
827,946 UART: [kat] sha1
839,876 UART: [kat] SHA2-256
842,946 UART: [kat] SHA2-384
849,235 UART: [kat] SHA2-512-ACC
851,884 UART: [kat] ECC-384
3,292,635 UART: [kat] HMAC-384Kdf
3,305,429 UART: [kat] LMS
3,837,287 UART: [kat] --
3,843,695 UART: [cold-reset] ++
3,845,922 UART: [fht] FHT @ 0x50003400
3,857,676 UART: [idev] ++
3,858,303 UART: [idev] CDI.KEYID = 6
3,859,273 UART: [idev] SUBJECT.KEYID = 7
3,860,509 UART: [idev] UDS.KEYID = 0
3,861,404 ready_for_fw is high
3,861,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,803 UART: [idev] Erasing UDS.KEYID = 0
6,336,461 UART: [idev] Sha1 KeyId Algorithm
6,359,249 UART: [idev] --
6,363,415 UART: [ldev] ++
6,364,087 UART: [ldev] CDI.KEYID = 6
6,364,968 UART: [ldev] SUBJECT.KEYID = 5
6,366,171 UART: [ldev] AUTHORITY.KEYID = 7
6,367,394 UART: [ldev] FE.KEYID = 1
6,378,221 UART: [ldev] Erasing FE.KEYID = 1
8,859,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,028 UART: [ldev] --
10,647,317 UART: [fwproc] Wait for Commands...
10,649,136 UART: [fwproc] Recv command 0x46574c44
10,651,436 UART: [fwproc] Recv'd Img size: 114448 bytes
14,099,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,831,038 >>> mbox cmd response: success
14,835,096 UART: [afmc] ++
14,835,810 UART: [afmc] CDI.KEYID = 6
14,837,052 UART: [afmc] SUBJECT.KEYID = 7
14,838,488 UART: [afmc] AUTHORITY.KEYID = 5
17,339,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,523 UART: [afmc] --
19,136,605 UART: [cold-reset] --
19,139,114 UART: [state] Locking Datavault
19,143,518 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,712 UART: [state] Locking ICCM
19,148,320 UART: [exit] Launching FMC @ 0x40000130
19,156,988 UART:
19,157,212 UART: Running Caliptra FMC ...
19,158,228 UART:
19,158,365 UART: [state] CFI Enabled
19,166,675 UART: [fht] FMC Alias Private Key: 7
20,923,185 UART: [art] Extend RT PCRs Done
20,924,400 UART: [art] Lock RT PCRs Done
20,925,827 UART: [art] Populate DV Done
20,931,389 UART: [fht] FMC Alias Private Key: 7
20,932,973 UART: [art] Derive CDI
20,933,781 UART: [art] Store in in slot 0x4
20,976,301 UART: [art] Derive Key Pair
20,977,332 UART: [art] Store priv key in slot 0x5
23,404,104 UART: [art] Derive Key Pair - Done
23,416,936 UART: [art] Signing Cert with AUTHO
23,418,238 UART: RITY.KEYID = 7
25,123,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,394 UART: [art] PUB.X = 8A6C47129CFCCC4F315EBBBA104114A02CCA2F46CA9A84D3DDF6353DA58EAECCFF398DDDBE5D8FB95D244F4AA26059E4
25,132,728 UART: [art] PUB.Y = B32BE147C990DCAF05EEED252FE02E5FDD3CE7915E395DD20C718BC904B78F025F80EEDB128D04DC8F6CE05BBA9AE64F
25,140,047 UART: [art] SIG.R = 1ADE86E42FD2490366D3F8EEDE7031C486D726EDE4B4F288D37714E57B783B5BCB40F6EF76B8F51E88865AAAAFEFFD2A
25,147,469 UART: [art] SIG.S = A774FA1F53583DC34FA98B2522274D7BE8470645217ABBEDBACE53EE9BFB94047980FB3C038FAAA6A2FF17C9CF7EEDBD
26,126,777 UART: Caliptra RT
26,127,474 UART: [state] CFI Enabled
26,244,650 UART: [rt] RT listening for mailbox commands...
26,247,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,402,273 UART: [rt]cmd =0x41544d4e, len=14344
30,332,654 >>> mbox cmd response data (8 bytes)
30,333,228 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,364,115 UART: [rt]cmd =0x41545348, len=116
30,383,411 >>> mbox cmd response data (12 bytes)
30,384,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,415,802 UART: [rt]cmd =0x41545348, len=116
30,417,940 >>> mbox cmd response data (12 bytes)
32,472,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,617,546 UART:
32,617,916 UART: Running Caliptra ROM ...
32,618,959 UART:
32,619,214 UART: [state] CFI Enabled
32,631,696 UART: [state] LifecycleState = Unprovisioned
32,633,555 UART: [state] DebugLocked = No
32,635,468 UART: [state] WD Timer not started. Device not locked for debugging
32,640,418 UART: [kat] SHA2-256
32,830,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,841,051 UART: [kat] ++
32,841,562 UART: [kat] sha1
32,853,040 UART: [kat] SHA2-256
32,856,057 UART: [kat] SHA2-384
32,863,288 UART: [kat] SHA2-512-ACC
32,865,893 UART: [kat] ECC-384
35,305,392 UART: [kat] HMAC-384Kdf
35,318,014 UART: [kat] LMS
35,849,653 UART: [kat] --
35,853,827 UART: [update-reset] ++
39,311,521 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,314,461 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,922,716 >>> mbox cmd response: success
39,927,567 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,928,166 UART: [update-reset] Copying MAN_2 To MAN_1
39,961,463 UART: [update-reset Success] --
39,965,375 UART: [state] Locking Datavault
39,968,307 UART: [state] Locking PCR0, PCR1 and PCR31
39,970,439 UART: [state] Locking ICCM
39,973,081 UART: [exit] Launching FMC @ 0x40000130
39,981,751 UART:
39,982,040 UART: Running Caliptra FMC ...
39,983,150 UART:
39,983,305 UART: [state] CFI Enabled
40,027,415 UART: [art] Extend RT PCRs Done
40,028,575 UART: [art] Lock RT PCRs Done
40,030,021 UART: [art] Populate DV Done
40,035,534 UART: [fht] FMC Alias Private Key: 7
40,037,227 UART: [art] Derive CDI
40,038,036 UART: [art] Store in in slot 0x4
40,080,208 UART: [art] Derive Key Pair
40,081,252 UART: [art] Store priv key in slot 0x5
42,507,512 UART: [art] Derive Key Pair - Done
42,520,358 UART: [art] Signing Cert with AUTHO
42,521,663 UART: RITY.KEYID = 7
44,227,872 UART: [art] Erasing AUTHORITY.KEYID = 7
44,229,391 UART: [art] PUB.X = 11726E1DD8DFF77BF9D224965B0AB787F8C12F7C375179E1CF34F8E25C773B01B2E4D28C09D99A3A752B57FF998FF18B
44,236,640 UART: [art] PUB.Y = 642D724C2D937D7B8763EC8E1BE13911E56C46B73791B59E7C6D7DBDA9CD9BED9C4C7FC92E8DC605486096E9038929C6
44,243,917 UART: [art] SIG.R = 753AA300C72B10E5480E9832CF3669BC0D0824B85697EF27B83E8CC845C68A42E917A5BA88BB60A3E866D457FCE454B5
44,251,241 UART: [art] SIG.S = 24C69FD2C7927F46AB272968D87CFD8595AB7E98082FE0453DD04FC3BA1622BC1B3A6EF61F7E9477C43A629DA4187F9D
45,230,396 UART: Caliptra RT
45,231,105 UART: [state] CFI Enabled
45,521,424 UART: [rt] RT listening for mailbox commands...
45,553,379 UART: [rt]cmd =0x41545348, len=116
45,573,762 >>> mbox cmd response data (12 bytes)
45,574,633 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,605,264 UART: [rt]cmd =0x41545348, len=116
45,607,283 >>> mbox cmd response data (12 bytes)
49,647,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,803,337 UART: [rt]cmd =0x41544d4e, len=14344
53,734,141 >>> mbox cmd response data (8 bytes)
53,734,668 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,765,575 UART: [rt]cmd =0x41545348, len=116
53,784,123 >>> mbox cmd response data (12 bytes)
53,784,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,815,159 UART: [rt]cmd =0x41545348, len=116
53,817,238 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,757,585 ready_for_fw is high
3,758,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,242 >>> mbox cmd response: success
19,209,547 UART:
19,209,945 UART: Running Caliptra FMC ...
19,211,037 UART:
19,211,188 UART: [state] CFI Enabled
19,219,341 UART: [fht] FMC Alias Private Key: 7
20,976,507 UART: [art] Extend RT PCRs Done
20,977,734 UART: [art] Lock RT PCRs Done
20,979,324 UART: [art] Populate DV Done
20,984,797 UART: [fht] FMC Alias Private Key: 7
20,986,282 UART: [art] Derive CDI
20,987,008 UART: [art] Store in in slot 0x4
21,029,486 UART: [art] Derive Key Pair
21,030,485 UART: [art] Store priv key in slot 0x5
23,457,208 UART: [art] Derive Key Pair - Done
23,470,262 UART: [art] Signing Cert with AUTHO
23,471,567 UART: RITY.KEYID = 7
25,177,146 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,654 UART: [art] PUB.X = 8C61CE3B7B6A0EA94E711992D0A46CD29AB1C176418A92DE3140D1EF1469933E895CDE2E5B523DC664C1961DB5BFF117
25,185,940 UART: [art] PUB.Y = 1C54CBAD606A5BD89B48799E7C63D3E56743AA84C52782A9C79151A28A58D5D22F6CA91270A806EB2541A08299786A28
25,193,180 UART: [art] SIG.R = 1F020E174A78E0C8DF1B0B5212F623F45EDCA8F4799AC4E21F59D220EA42CCED02B67C4045C3D65515A98DB27676D56C
25,200,556 UART: [art] SIG.S = CCDEEE18A24D5D82EC9122794DDCCAE45232BCDC3E02D8895E07583ECCA1B0455FD5B999CEC18EC6EE7D361AFD083573
26,179,096 UART: Caliptra RT
26,179,809 UART: [state] CFI Enabled
26,297,416 UART: [rt] RT listening for mailbox commands...
26,299,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,455,236 UART: [rt]cmd =0x41544d4e, len=14344
30,385,501 >>> mbox cmd response data (8 bytes)
30,386,080 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,416,871 UART: [rt]cmd =0x41545348, len=116
30,437,361 >>> mbox cmd response data (12 bytes)
30,438,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,469,412 UART: [rt]cmd =0x41545348, len=116
30,471,503 >>> mbox cmd response data (12 bytes)
32,524,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,259,861 >>> mbox cmd response: success
40,260,440 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,292,418 UART:
40,292,718 UART: Running Caliptra FMC ...
40,293,910 UART:
40,294,065 UART: [state] CFI Enabled
40,338,264 UART: [art] Extend RT PCRs Done
40,339,455 UART: [art] Lock RT PCRs Done
40,340,745 UART: [art] Populate DV Done
40,345,876 UART: [fht] FMC Alias Private Key: 7
40,347,463 UART: [art] Derive CDI
40,348,271 UART: [art] Store in in slot 0x4
40,391,069 UART: [art] Derive Key Pair
40,392,067 UART: [art] Store priv key in slot 0x5
42,818,963 UART: [art] Derive Key Pair - Done
42,831,852 UART: [art] Signing Cert with AUTHO
42,833,154 UART: RITY.KEYID = 7
44,538,515 UART: [art] Erasing AUTHORITY.KEYID = 7
44,540,008 UART: [art] PUB.X = EE81FA43B4649B75CFD40A184189671DB3DA25DCBBC3BE7DB314824EE4EB5E3E801267B33E54AA7ED6A90EF3550500E1
44,547,304 UART: [art] PUB.Y = AD7134A6CA6907B6B836CC6BC121989A28A24A0E0DF62BD5AD8434E36F8B092942C8F62DE7F1613B1B08E61ACFF7AC1E
44,554,579 UART: [art] SIG.R = E8CC8949917C106F312D583636DF89709D9491F1003EB39CF55F76939E8839E0F7858F10C490759D5EB0F295325887E8
44,561,904 UART: [art] SIG.S = BBE24F6D610D7A36235BA92FBC3764BF8FCA1F52C7333CE7306DA9AFA299624B8DBA3D60BDC760C14D4AA6385E2AC066
45,541,067 UART: Caliptra RT
45,541,774 UART: [state] CFI Enabled
45,827,363 UART: [rt] RT listening for mailbox commands...
45,859,425 UART: [rt]cmd =0x41545348, len=116
45,879,410 >>> mbox cmd response data (12 bytes)
45,880,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,910,992 UART: [rt]cmd =0x41545348, len=116
45,913,195 >>> mbox cmd response data (12 bytes)
49,948,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,103,920 UART: [rt]cmd =0x41544d4e, len=14344
54,033,861 >>> mbox cmd response data (8 bytes)
54,034,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,065,103 UART: [rt]cmd =0x41545348, len=116
54,085,409 >>> mbox cmd response data (12 bytes)
54,085,831 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,116,497 UART: [rt]cmd =0x41545348, len=116
54,118,833 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,596 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,601 UART: [cold-reset] ++
1,476,941 UART: [fht] Storing FHT @ 0x50003400
1,479,962 UART: [idev] ++
1,480,130 UART: [idev] CDI.KEYID = 6
1,480,490 UART: [idev] SUBJECT.KEYID = 7
1,480,914 UART: [idev] UDS.KEYID = 0
1,481,259 ready_for_fw is high
1,481,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,340 UART: [idev] Erasing UDS.KEYID = 0
1,506,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,616 UART: [idev] --
1,515,785 UART: [ldev] ++
1,515,953 UART: [ldev] CDI.KEYID = 6
1,516,316 UART: [ldev] SUBJECT.KEYID = 5
1,516,742 UART: [ldev] AUTHORITY.KEYID = 7
1,517,205 UART: [ldev] FE.KEYID = 1
1,522,313 UART: [ldev] Erasing FE.KEYID = 1
1,547,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,352 UART: [ldev] --
1,587,861 UART: [fwproc] Waiting for Commands...
1,588,702 UART: [fwproc] Received command 0x46574c44
1,589,493 UART: [fwproc] Received Image of size 114448 bytes
2,888,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,255 >>> mbox cmd response: success
3,083,443 UART: [afmc] ++
3,083,611 UART: [afmc] CDI.KEYID = 6
3,083,973 UART: [afmc] SUBJECT.KEYID = 7
3,084,398 UART: [afmc] AUTHORITY.KEYID = 5
3,119,319 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,739 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,132 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,822 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,877 UART: [afmc] --
3,162,869 UART: [cold-reset] --
3,163,707 UART: [state] Locking Datavault
3,164,734 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,338 UART: [state] Locking ICCM
3,165,850 UART: [exit] Launching FMC @ 0x40000130
3,171,179 UART:
3,171,195 UART: Running Caliptra FMC ...
3,171,603 UART:
3,171,657 UART: [state] CFI Enabled
3,182,004 UART: [fht] FMC Alias Private Key: 7
3,290,133 UART: [art] Extend RT PCRs Done
3,290,561 UART: [art] Lock RT PCRs Done
3,292,461 UART: [art] Populate DV Done
3,300,722 UART: [fht] FMC Alias Private Key: 7
3,301,816 UART: [art] Derive CDI
3,302,096 UART: [art] Store in in slot 0x4
3,387,755 UART: [art] Derive Key Pair
3,388,115 UART: [art] Store priv key in slot 0x5
3,401,289 UART: [art] Derive Key Pair - Done
3,415,989 UART: [art] Signing Cert with AUTHO
3,416,469 UART: RITY.KEYID = 7
3,431,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,030 UART: [art] PUB.X = 1BE4B5FB9C04A4AA637EA9E7F2CB3AC3FCB8D24F90DD36D835ACB07E66ABFD37575409BE34624DFBA367CD476D10EF50
3,438,820 UART: [art] PUB.Y = BA2D960D6ED84C80E78219D8AD407401FD8F8BA88E389E1F890B281074F223EAF03BBA794979C71875515B48ECE9D29B
3,445,767 UART: [art] SIG.R = 525F211ACEA20D231AEA7F076E56DBE730D37A8E638BEF0B0F5ADE064F86065F64AD68BDED1716C5D7A04C84B124D78D
3,452,537 UART: [art] SIG.S = 3E62B07BF52F2074DD998F1D0E15E0B22E9535031922C09CB764910ABE3892ACBD594912E5AEB50CC312C502F11472E4
3,476,375 UART: Caliptra RT
3,476,628 UART: [state] CFI Enabled
3,584,942 UART: [rt] RT listening for mailbox commands...
3,585,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,712 UART: [rt]cmd =0x41544d4e, len=14344
3,853,756 >>> mbox cmd response data (8 bytes)
3,853,757 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,910 UART: [rt]cmd =0x41545348, len=116
3,906,500 >>> mbox cmd response data (12 bytes)
3,906,501 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,718 UART: [rt]cmd =0x41545348, len=116
3,938,532 >>> mbox cmd response data (12 bytes)
3,938,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,301 UART:
3,939,317 UART: Running Caliptra ROM ...
3,939,725 UART:
3,939,779 UART: [state] CFI Enabled
3,941,883 UART: [state] LifecycleState = Unprovisioned
3,942,538 UART: [state] DebugLocked = No
3,943,148 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,944,625 UART: [kat] SHA2-256
4,738,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,742,671 UART: [kat] ++
4,742,823 UART: [kat] sha1
4,747,219 UART: [kat] SHA2-256
4,749,157 UART: [kat] SHA2-384
4,751,780 UART: [kat] SHA2-512-ACC
4,753,680 UART: [kat] ECC-384
4,759,541 UART: [kat] HMAC-384Kdf
4,764,137 UART: [kat] LMS
5,332,333 UART: [kat] --
5,333,134 UART: [update-reset] ++
6,669,425 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,670,615 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,820,665 >>> mbox cmd response: success
6,820,665 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,820,792 UART: [update-reset] Copying MAN_2 To MAN_1
6,828,806 UART: [update-reset Success] --
6,830,029 UART: [state] Locking Datavault
6,830,953 UART: [state] Locking PCR0, PCR1 and PCR31
6,831,557 UART: [state] Locking ICCM
6,832,065 UART: [exit] Launching FMC @ 0x40000130
6,837,394 UART:
6,837,410 UART: Running Caliptra FMC ...
6,837,818 UART:
6,837,872 UART: [state] CFI Enabled
6,927,013 UART: [art] Extend RT PCRs Done
6,927,441 UART: [art] Lock RT PCRs Done
6,928,880 UART: [art] Populate DV Done
6,937,267 UART: [fht] FMC Alias Private Key: 7
6,938,265 UART: [art] Derive CDI
6,938,545 UART: [art] Store in in slot 0x4
7,024,278 UART: [art] Derive Key Pair
7,024,638 UART: [art] Store priv key in slot 0x5
7,037,654 UART: [art] Derive Key Pair - Done
7,052,302 UART: [art] Signing Cert with AUTHO
7,052,782 UART: RITY.KEYID = 7
7,067,760 UART: [art] Erasing AUTHORITY.KEYID = 7
7,068,525 UART: [art] PUB.X = 2BAC378ACAA93046848A6C1FC4C4EE1034D130EC1CB45937E560DD501A059C1B14F73651D59FC2A0084C4BDFAE0DBBBB
7,075,306 UART: [art] PUB.Y = E279F8DC28292EEE6A90D34B3E7C6333DAF4A892A77213FBBC9A41F2EF5EA7E0572AD76D9EDF53EBE9E455DA7B5BE58E
7,082,282 UART: [art] SIG.R = 0973155477A0187BA5D89A1F2A5CFA02EDD5E155D49D5CCD2A9DCC441253D9A2D21340DF8BD4B2DF3F68B0C6B6EF1F53
7,089,064 UART: [art] SIG.S = 128049137374171AC68DC6963B82A4171483373785FED2100489CFAF1EECA57FC8D122B44F1FB48B25F1A2D246FB6491
7,113,314 UART: Caliptra RT
7,113,567 UART: [state] CFI Enabled
7,390,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,421,950 UART: [rt]cmd =0x41545348, len=116
7,443,156 >>> mbox cmd response data (12 bytes)
7,443,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,473,030 UART: [rt]cmd =0x41545348, len=116
7,475,054 >>> mbox cmd response data (12 bytes)
7,475,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,597,638 UART: [rt]cmd =0x41544d4e, len=14344
7,741,916 >>> mbox cmd response data (8 bytes)
7,741,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,772,006 UART: [rt]cmd =0x41545348, len=116
7,794,212 >>> mbox cmd response data (12 bytes)
7,794,213 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,824,446 UART: [rt]cmd =0x41545348, len=116
7,826,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,009 >>> mbox cmd response: success
2,990,675 UART:
2,990,691 UART: Running Caliptra FMC ...
2,991,099 UART:
2,991,153 UART: [state] CFI Enabled
3,001,766 UART: [fht] FMC Alias Private Key: 7
3,109,259 UART: [art] Extend RT PCRs Done
3,109,687 UART: [art] Lock RT PCRs Done
3,111,185 UART: [art] Populate DV Done
3,119,414 UART: [fht] FMC Alias Private Key: 7
3,120,394 UART: [art] Derive CDI
3,120,674 UART: [art] Store in in slot 0x4
3,206,081 UART: [art] Derive Key Pair
3,206,441 UART: [art] Store priv key in slot 0x5
3,219,325 UART: [art] Derive Key Pair - Done
3,234,322 UART: [art] Signing Cert with AUTHO
3,234,802 UART: RITY.KEYID = 7
3,249,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,573 UART: [art] PUB.X = 513D1D592A8DD0653C75DA975B9528B62B827CDD6C322AC3FCF009DF928D5006C4DD6446DCF83B4726A7E2DE05ECEC01
3,257,345 UART: [art] PUB.Y = 99AB37B1199C21892381E7703678B9195CF0624C4E1C633549E58DDBD959DD34B23CCEDA71A63ED9F57DEB0F7E024429
3,264,293 UART: [art] SIG.R = 7EF1072E07F8F64CFD59E5A00F04379A0625A19F43A73645F39504A053D55860DCE3012E6A91E2989CAD326F158471FD
3,271,040 UART: [art] SIG.S = AF9DF9E20CE57F3B4BE5230966AEA1C031004DF6C3538DB0A6A401344C693B15A0B18A5BDBE6024BA5C5619C749C4FB2
3,294,443 UART: Caliptra RT
3,294,696 UART: [state] CFI Enabled
3,402,823 UART: [rt] RT listening for mailbox commands...
3,403,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,439 UART: [rt]cmd =0x41544d4e, len=14344
3,671,555 >>> mbox cmd response data (8 bytes)
3,671,556 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,605 UART: [rt]cmd =0x41545348, len=116
3,724,629 >>> mbox cmd response data (12 bytes)
3,724,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,637 UART: [rt]cmd =0x41545348, len=116
3,756,769 >>> mbox cmd response data (12 bytes)
3,756,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,266 >>> mbox cmd response: success
6,519,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,532,767 UART:
6,532,783 UART: Running Caliptra FMC ...
6,533,191 UART:
6,533,245 UART: [state] CFI Enabled
6,622,366 UART: [art] Extend RT PCRs Done
6,622,794 UART: [art] Lock RT PCRs Done
6,624,165 UART: [art] Populate DV Done
6,632,442 UART: [fht] FMC Alias Private Key: 7
6,633,472 UART: [art] Derive CDI
6,633,752 UART: [art] Store in in slot 0x4
6,719,647 UART: [art] Derive Key Pair
6,720,007 UART: [art] Store priv key in slot 0x5
6,733,477 UART: [art] Derive Key Pair - Done
6,748,433 UART: [art] Signing Cert with AUTHO
6,748,913 UART: RITY.KEYID = 7
6,763,893 UART: [art] Erasing AUTHORITY.KEYID = 7
6,764,658 UART: [art] PUB.X = 321A985C6ED68FA8E4E2B11FF4656343D3C95AB95A72EB361F41EEE3E38E70DF0D81D826B13E539377A9227B8208439A
6,771,426 UART: [art] PUB.Y = 202FEFBEBBD602E1C9CFDD3B14A811E89585EB468280E972768397EC2A58608C7D35DDDFF4A7411C182C6035398F1826
6,778,379 UART: [art] SIG.R = 9DA8D42BC0B8274AE62AEAE7CA06E19CCD2C35188F725932841B5FB3C58E0D8782A66A229AFAC8FBB15B3DDACD35B0B7
6,785,167 UART: [art] SIG.S = F6485B7D721679486A83626EF272BA37D2F29AF722AED9889A6DEF754906C88312ECC7943AD3788D7169C978C2DBFC30
6,809,167 UART: Caliptra RT
6,809,420 UART: [state] CFI Enabled
7,091,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,122,055 UART: [rt]cmd =0x41545348, len=116
7,144,281 >>> mbox cmd response data (12 bytes)
7,144,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,174,563 UART: [rt]cmd =0x41545348, len=116
7,176,319 >>> mbox cmd response data (12 bytes)
7,176,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,298,891 UART: [rt]cmd =0x41544d4e, len=14344
7,443,621 >>> mbox cmd response data (8 bytes)
7,443,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,473,555 UART: [rt]cmd =0x41545348, len=116
7,495,179 >>> mbox cmd response data (12 bytes)
7,495,180 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,525,233 UART: [rt]cmd =0x41545348, len=116
7,527,132 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,461 UART: [kat] SHA2-512-ACC
897,362 UART: [kat] ECC-384
902,955 UART: [kat] HMAC-384Kdf
907,789 UART: [kat] LMS
1,475,985 UART: [kat] --
1,476,698 UART: [cold-reset] ++
1,477,078 UART: [fht] Storing FHT @ 0x50003400
1,479,885 UART: [idev] ++
1,480,053 UART: [idev] CDI.KEYID = 6
1,480,413 UART: [idev] SUBJECT.KEYID = 7
1,480,837 UART: [idev] UDS.KEYID = 0
1,481,182 ready_for_fw is high
1,481,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,817 UART: [idev] Erasing UDS.KEYID = 0
1,505,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,803 UART: [idev] --
1,514,832 UART: [ldev] ++
1,515,000 UART: [ldev] CDI.KEYID = 6
1,515,363 UART: [ldev] SUBJECT.KEYID = 5
1,515,789 UART: [ldev] AUTHORITY.KEYID = 7
1,516,252 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,546,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,793 UART: [ldev] --
1,586,282 UART: [fwproc] Waiting for Commands...
1,586,951 UART: [fwproc] Received command 0x46574c44
1,587,742 UART: [fwproc] Received Image of size 114448 bytes
2,886,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,166 >>> mbox cmd response: success
3,080,392 UART: [afmc] ++
3,080,560 UART: [afmc] CDI.KEYID = 6
3,080,922 UART: [afmc] SUBJECT.KEYID = 7
3,081,347 UART: [afmc] AUTHORITY.KEYID = 5
3,116,354 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,003 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,693 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,604 UART: [afmc] --
3,159,732 UART: [cold-reset] --
3,160,410 UART: [state] Locking Datavault
3,161,569 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,173 UART: [state] Locking ICCM
3,162,673 UART: [exit] Launching FMC @ 0x40000130
3,168,002 UART:
3,168,018 UART: Running Caliptra FMC ...
3,168,426 UART:
3,168,569 UART: [state] CFI Enabled
3,179,240 UART: [fht] FMC Alias Private Key: 7
3,286,933 UART: [art] Extend RT PCRs Done
3,287,361 UART: [art] Lock RT PCRs Done
3,288,803 UART: [art] Populate DV Done
3,297,136 UART: [fht] FMC Alias Private Key: 7
3,298,104 UART: [art] Derive CDI
3,298,384 UART: [art] Store in in slot 0x4
3,384,513 UART: [art] Derive Key Pair
3,384,873 UART: [art] Store priv key in slot 0x5
3,398,217 UART: [art] Derive Key Pair - Done
3,413,192 UART: [art] Signing Cert with AUTHO
3,413,672 UART: RITY.KEYID = 7
3,428,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,667 UART: [art] PUB.X = F8AA4EF5A089D2C3694E8AAAD94AFB19425440037DC0539C98C1881D3B2459F3ED867E226BB95D2A92B344740DA71C0C
3,436,436 UART: [art] PUB.Y = 8D2418B9285A23F4BCF03721C1DCDDB58DAFAE128CBF2B8D3547717229ACD8879AB587EF87D61C6E6CB51045AA6C0370
3,443,397 UART: [art] SIG.R = ED26878AB43CDA1FE38F66144958A780765121493C42456F33814DB531F6E9822E29DDA019DB7D3B6D416083359B2924
3,450,159 UART: [art] SIG.S = 034A839FAA967D4523397BB250C686326F6FF7720F8B0C25DB618907664DBF0A2813AABB9842D2C6E2A39C42150F5DF3
3,473,894 UART: Caliptra RT
3,474,239 UART: [state] CFI Enabled
3,582,664 UART: [rt] RT listening for mailbox commands...
3,583,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,642 UART: [rt]cmd =0x41544d4e, len=14344
3,851,720 >>> mbox cmd response data (8 bytes)
3,851,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,676 UART: [rt]cmd =0x41545348, len=116
3,904,196 >>> mbox cmd response data (12 bytes)
3,904,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,202 UART: [rt]cmd =0x41545348, len=116
3,935,868 >>> mbox cmd response data (12 bytes)
3,935,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,801 UART:
3,936,817 UART: Running Caliptra ROM ...
3,937,225 UART:
3,937,366 UART: [state] CFI Enabled
3,940,120 UART: [state] LifecycleState = Unprovisioned
3,940,775 UART: [state] DebugLocked = No
3,941,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,942,912 UART: [kat] SHA2-256
4,736,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,740,958 UART: [kat] ++
4,741,110 UART: [kat] sha1
4,745,318 UART: [kat] SHA2-256
4,747,256 UART: [kat] SHA2-384
4,750,001 UART: [kat] SHA2-512-ACC
4,751,901 UART: [kat] ECC-384
4,757,208 UART: [kat] HMAC-384Kdf
4,761,968 UART: [kat] LMS
5,330,164 UART: [kat] --
5,331,259 UART: [update-reset] ++
6,667,562 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,668,702 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,818,752 >>> mbox cmd response: success
6,818,752 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,818,927 UART: [update-reset] Copying MAN_2 To MAN_1
6,826,941 UART: [update-reset Success] --
6,828,038 UART: [state] Locking Datavault
6,828,776 UART: [state] Locking PCR0, PCR1 and PCR31
6,829,380 UART: [state] Locking ICCM
6,829,824 UART: [exit] Launching FMC @ 0x40000130
6,835,153 UART:
6,835,169 UART: Running Caliptra FMC ...
6,835,577 UART:
6,835,720 UART: [state] CFI Enabled
6,925,151 UART: [art] Extend RT PCRs Done
6,925,579 UART: [art] Lock RT PCRs Done
6,926,706 UART: [art] Populate DV Done
6,934,681 UART: [fht] FMC Alias Private Key: 7
6,935,677 UART: [art] Derive CDI
6,935,957 UART: [art] Store in in slot 0x4
7,021,930 UART: [art] Derive Key Pair
7,022,290 UART: [art] Store priv key in slot 0x5
7,035,540 UART: [art] Derive Key Pair - Done
7,050,291 UART: [art] Signing Cert with AUTHO
7,050,771 UART: RITY.KEYID = 7
7,066,053 UART: [art] Erasing AUTHORITY.KEYID = 7
7,066,818 UART: [art] PUB.X = ADB7550C642A51D1F251693BEBF4EF3F23AAFD7D2058B28A83D0E231F2F13C91D6034E9C523559426555B4CF12C22018
7,073,586 UART: [art] PUB.Y = F6DC2722D1BF13E78733BFADD83725A9F03673E6ECC1CE6F273B018207B72CF792B0AA4600A3AEFEBC31ED1444CEE021
7,080,526 UART: [art] SIG.R = 9B130C17FC7879B5D3AE4A4B97F9196F5DB38F6FCF2B1BFC5E34A4D5A5CE5F948740DD1AB830FB370E1F664EC66344A0
7,087,308 UART: [art] SIG.S = 4ACB58A498524E9BACF5C838EE141290C50370AAF9109082849CF434FF649E7B62A34E66A50996B399E8D318DC8C37DC
7,110,381 UART: Caliptra RT
7,110,726 UART: [state] CFI Enabled
7,389,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,420,122 UART: [rt]cmd =0x41545348, len=116
7,441,592 >>> mbox cmd response data (12 bytes)
7,441,593 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,471,782 UART: [rt]cmd =0x41545348, len=116
7,473,746 >>> mbox cmd response data (12 bytes)
7,473,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,596,180 UART: [rt]cmd =0x41544d4e, len=14344
7,741,568 >>> mbox cmd response data (8 bytes)
7,741,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,771,782 UART: [rt]cmd =0x41545348, len=116
7,794,304 >>> mbox cmd response data (12 bytes)
7,794,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,824,454 UART: [rt]cmd =0x41545348, len=116
7,826,061 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 ready_for_fw is high
1,363,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,360 >>> mbox cmd response: success
2,990,668 UART:
2,990,684 UART: Running Caliptra FMC ...
2,991,092 UART:
2,991,235 UART: [state] CFI Enabled
3,001,626 UART: [fht] FMC Alias Private Key: 7
3,109,473 UART: [art] Extend RT PCRs Done
3,109,901 UART: [art] Lock RT PCRs Done
3,111,765 UART: [art] Populate DV Done
3,120,150 UART: [fht] FMC Alias Private Key: 7
3,121,144 UART: [art] Derive CDI
3,121,424 UART: [art] Store in in slot 0x4
3,207,457 UART: [art] Derive Key Pair
3,207,817 UART: [art] Store priv key in slot 0x5
3,220,829 UART: [art] Derive Key Pair - Done
3,235,600 UART: [art] Signing Cert with AUTHO
3,236,080 UART: RITY.KEYID = 7
3,251,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,187 UART: [art] PUB.X = 054475D3D661B9CCEEF23B17A77568DF6ADC951275B5B2AE2FBE401A9BC0143DEE293688CD8A4E3E337971E7B5A69B70
3,258,966 UART: [art] PUB.Y = 257B78685E16352D343601D5C7CA0780EC49D925E136A3B67840B0BAFDBE62CA5DCC44253D97E1C4188244497DFCBD7D
3,265,916 UART: [art] SIG.R = 85DB253D35B61BD86CB7BBCBCC988D7184B96286FD11B7077E3194AFBDAA834715C487E8590D6A5BD889B262F7B3EC6E
3,272,694 UART: [art] SIG.S = 7C96815B99B41A485EA35AF04DE7DA2736A3DC6308E463C79B48A11E2F2EB6CF931D9241AC3F495BCF396DAB4BC83E16
3,296,092 UART: Caliptra RT
3,296,437 UART: [state] CFI Enabled
3,404,222 UART: [rt] RT listening for mailbox commands...
3,404,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,716 UART: [rt]cmd =0x41544d4e, len=14344
3,672,888 >>> mbox cmd response data (8 bytes)
3,672,889 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,956 UART: [rt]cmd =0x41545348, len=116
3,724,820 >>> mbox cmd response data (12 bytes)
3,724,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,060 UART: [rt]cmd =0x41545348, len=116
3,756,768 >>> mbox cmd response data (12 bytes)
3,756,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,520,408 >>> mbox cmd response: success
6,520,408 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,533,871 UART:
6,533,887 UART: Running Caliptra FMC ...
6,534,295 UART:
6,534,438 UART: [state] CFI Enabled
6,624,145 UART: [art] Extend RT PCRs Done
6,624,573 UART: [art] Lock RT PCRs Done
6,625,676 UART: [art] Populate DV Done
6,633,947 UART: [fht] FMC Alias Private Key: 7
6,634,999 UART: [art] Derive CDI
6,635,279 UART: [art] Store in in slot 0x4
6,721,082 UART: [art] Derive Key Pair
6,721,442 UART: [art] Store priv key in slot 0x5
6,734,590 UART: [art] Derive Key Pair - Done
6,749,441 UART: [art] Signing Cert with AUTHO
6,749,921 UART: RITY.KEYID = 7
6,764,873 UART: [art] Erasing AUTHORITY.KEYID = 7
6,765,638 UART: [art] PUB.X = 1C4ADAE60BD09E0A2919C464951DB6821563568A3B0089763CD0184608F0510B37662F3860C6377F0D3E5A73448E18A4
6,772,361 UART: [art] PUB.Y = 2FAC46AA7E5603E6FD864DE55918C89A6C231A8B7AC3754EEDE889367025719C0DC5760AA2BF7C35E68844DC739B9B71
6,779,310 UART: [art] SIG.R = 0B3C73C791116B39F818FC606440A8298896B4061426CB7623C91BDCD249A472E5B5F43A848C80FDD20B5BC8676C633D
6,786,069 UART: [art] SIG.S = CE4E5A431B8918F72CAF7CB786166A18A19F7CF2DBB0BA92AEBF3E12904EB290FF7E7B7D1B28D9D7309C865ACBD5BEBF
6,810,370 UART: Caliptra RT
6,810,715 UART: [state] CFI Enabled
7,094,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,125,123 UART: [rt]cmd =0x41545348, len=116
7,147,491 >>> mbox cmd response data (12 bytes)
7,147,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,177,551 UART: [rt]cmd =0x41545348, len=116
7,179,519 >>> mbox cmd response data (12 bytes)
7,179,520 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,302,277 UART: [rt]cmd =0x41544d4e, len=14344
7,446,919 >>> mbox cmd response data (8 bytes)
7,446,920 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,476,941 UART: [rt]cmd =0x41545348, len=116
7,498,721 >>> mbox cmd response data (12 bytes)
7,498,722 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,528,921 UART: [rt]cmd =0x41545348, len=116
7,530,860 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,289 UART: [kat] SHA2-256
904,229 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,788 UART: [kat] HMAC-384Kdf
923,460 UART: [kat] LMS
1,171,788 UART: [kat] --
1,172,573 UART: [cold-reset] ++
1,173,059 UART: [fht] FHT @ 0x50003400
1,175,716 UART: [idev] ++
1,175,884 UART: [idev] CDI.KEYID = 6
1,176,244 UART: [idev] SUBJECT.KEYID = 7
1,176,668 UART: [idev] UDS.KEYID = 0
1,177,013 ready_for_fw is high
1,177,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,838 UART: [idev] Erasing UDS.KEYID = 0
1,202,057 UART: [idev] Sha1 KeyId Algorithm
1,210,695 UART: [idev] --
1,211,663 UART: [ldev] ++
1,211,831 UART: [ldev] CDI.KEYID = 6
1,212,194 UART: [ldev] SUBJECT.KEYID = 5
1,212,620 UART: [ldev] AUTHORITY.KEYID = 7
1,213,083 UART: [ldev] FE.KEYID = 1
1,218,387 UART: [ldev] Erasing FE.KEYID = 1
1,244,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,475 UART: [ldev] --
1,283,968 UART: [fwproc] Wait for Commands...
1,284,632 UART: [fwproc] Recv command 0x46574c44
1,285,360 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,526 >>> mbox cmd response: success
2,778,546 UART: [afmc] ++
2,778,714 UART: [afmc] CDI.KEYID = 6
2,779,076 UART: [afmc] SUBJECT.KEYID = 7
2,779,501 UART: [afmc] AUTHORITY.KEYID = 5
2,814,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,817 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,149 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,927 UART: [afmc] --
2,857,893 UART: [cold-reset] --
2,858,931 UART: [state] Locking Datavault
2,860,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,836 UART: [state] Locking ICCM
2,861,482 UART: [exit] Launching FMC @ 0x40000130
2,866,811 UART:
2,866,827 UART: Running Caliptra FMC ...
2,867,235 UART:
2,867,289 UART: [state] CFI Enabled
2,877,602 UART: [fht] FMC Alias Private Key: 7
2,985,629 UART: [art] Extend RT PCRs Done
2,986,057 UART: [art] Lock RT PCRs Done
2,987,877 UART: [art] Populate DV Done
2,996,252 UART: [fht] FMC Alias Private Key: 7
2,997,220 UART: [art] Derive CDI
2,997,500 UART: [art] Store in in slot 0x4
3,083,279 UART: [art] Derive Key Pair
3,083,639 UART: [art] Store priv key in slot 0x5
3,096,733 UART: [art] Derive Key Pair - Done
3,111,547 UART: [art] Signing Cert with AUTHO
3,112,027 UART: RITY.KEYID = 7
3,127,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,050 UART: [art] PUB.X = B534F373D49D11C7A385297BDC5EB8889DBAABDF1FC0565367EC1E5BA9C09A119CCF397D4DEB113CEDADB3DBF63D1311
3,134,846 UART: [art] PUB.Y = DABD0DAB967B24F07E5FAE97951DE2E650D3C1C51F193751146C93F22FAAD447D3588B8DF54A225BC5104B49EC31A421
3,141,805 UART: [art] SIG.R = 5E68F57677624ECB1914B4968F422620FE363DC3F3459403F680E20B62B62A21FA07046EC8543284D30C950B932B9A32
3,148,547 UART: [art] SIG.S = 27F940CB2FF62870C7436539A48BD380807BB57E0EDE6220C89DFE916B21E27F9741F58C2D9C25F6D30FF0AB78A4C47A
3,172,492 UART: Caliptra RT
3,172,745 UART: [state] CFI Enabled
3,279,980 UART: [rt] RT listening for mailbox commands...
3,280,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,400 UART: [rt]cmd =0x41544d4e, len=14344
3,547,532 >>> mbox cmd response data (8 bytes)
3,547,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,592 UART: [rt]cmd =0x41545348, len=116
3,599,336 >>> mbox cmd response data (12 bytes)
3,599,337 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,532 UART: [rt]cmd =0x41545348, len=116
3,631,452 >>> mbox cmd response data (12 bytes)
3,631,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,148 UART:
3,632,164 UART: Running Caliptra ROM ...
3,632,572 UART:
3,632,627 UART: [state] CFI Enabled
3,634,843 UART: [state] LifecycleState = Unprovisioned
3,635,498 UART: [state] DebugLocked = No
3,636,228 UART: [state] WD Timer not started. Device not locked for debugging
3,637,428 UART: [kat] SHA2-256
4,443,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,447,203 UART: [kat] ++
4,447,355 UART: [kat] sha1
4,451,709 UART: [kat] SHA2-256
4,453,649 UART: [kat] SHA2-384
4,456,440 UART: [kat] SHA2-512-ACC
4,458,340 UART: [kat] ECC-384
4,467,649 UART: [kat] HMAC-384Kdf
4,472,255 UART: [kat] LMS
4,720,583 UART: [kat] --
4,721,491 UART: [update-reset] ++
6,036,116 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,037,215 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,187,213 >>> mbox cmd response: success
6,187,213 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,187,420 UART: [update-reset] Copying MAN_2 To MAN_1
6,195,434 UART: [update-reset Success] --
6,196,397 UART: [state] Locking Datavault
6,197,075 UART: [state] Locking PCR0, PCR1 and PCR31
6,197,679 UART: [state] Locking ICCM
6,198,199 UART: [exit] Launching FMC @ 0x40000130
6,203,528 UART:
6,203,544 UART: Running Caliptra FMC ...
6,203,952 UART:
6,204,006 UART: [state] CFI Enabled
6,293,383 UART: [art] Extend RT PCRs Done
6,293,811 UART: [art] Lock RT PCRs Done
6,295,130 UART: [art] Populate DV Done
6,303,389 UART: [fht] FMC Alias Private Key: 7
6,304,395 UART: [art] Derive CDI
6,304,675 UART: [art] Store in in slot 0x4
6,390,336 UART: [art] Derive Key Pair
6,390,696 UART: [art] Store priv key in slot 0x5
6,403,616 UART: [art] Derive Key Pair - Done
6,418,471 UART: [art] Signing Cert with AUTHO
6,418,951 UART: RITY.KEYID = 7
6,434,113 UART: [art] Erasing AUTHORITY.KEYID = 7
6,434,878 UART: [art] PUB.X = 0A2CDDA2C826EA266FDD8D41F21780163513128B9EA56520D121A698973D7B3A26AC3324BF80802ED2843CC61FCDAE24
6,441,651 UART: [art] PUB.Y = 9F8329483D070C873826B8FF0343CB49A0A332D0AAA709D8CB9C386391268B764927D15E79D9FB41CCEDF0A61A48E69F
6,448,593 UART: [art] SIG.R = BC1B6521F5200BF59E1303FFB2824DC640C90BC3B764674C1F0BC022969375E9F8465FAD1535C08D573DCAAB677759FD
6,455,357 UART: [art] SIG.S = 83D1C6FE3DA9EDF3A01010A178182B7EDF90A07862F93834FC9AE33A7C619EC566189A2C3553C7D54532281CDCF4A30C
6,479,515 UART: Caliptra RT
6,479,768 UART: [state] CFI Enabled
6,757,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,561 UART: [rt]cmd =0x41545348, len=116
6,809,999 >>> mbox cmd response data (12 bytes)
6,810,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,840,235 UART: [rt]cmd =0x41545348, len=116
6,841,869 >>> mbox cmd response data (12 bytes)
6,841,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,964,207 UART: [rt]cmd =0x41544d4e, len=14344
7,109,095 >>> mbox cmd response data (8 bytes)
7,109,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,139,313 UART: [rt]cmd =0x41545348, len=116
7,162,195 >>> mbox cmd response data (12 bytes)
7,162,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,192,179 UART: [rt]cmd =0x41545348, len=116
7,193,836 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,287 ready_for_fw is high
1,060,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,769 >>> mbox cmd response: success
2,688,295 UART:
2,688,311 UART: Running Caliptra FMC ...
2,688,719 UART:
2,688,773 UART: [state] CFI Enabled
2,699,416 UART: [fht] FMC Alias Private Key: 7
2,807,619 UART: [art] Extend RT PCRs Done
2,808,047 UART: [art] Lock RT PCRs Done
2,809,673 UART: [art] Populate DV Done
2,817,858 UART: [fht] FMC Alias Private Key: 7
2,818,834 UART: [art] Derive CDI
2,819,114 UART: [art] Store in in slot 0x4
2,904,705 UART: [art] Derive Key Pair
2,905,065 UART: [art] Store priv key in slot 0x5
2,918,327 UART: [art] Derive Key Pair - Done
2,933,033 UART: [art] Signing Cert with AUTHO
2,933,513 UART: RITY.KEYID = 7
2,948,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,154 UART: [art] PUB.X = C4408741EB8657B527F08FE6090FCB14ED8037D6E52AFA1677D7E0BBBBB77C46E115D1791C66221A95DF1EF516B8AD2E
2,955,930 UART: [art] PUB.Y = F59A521686D5B5743D33BE8367FE2B1367270B691A126C702E82D112D4BBFAACF5CF61DB890072AFF39CCFC64AC326A8
2,962,867 UART: [art] SIG.R = 10BC36952F11E8091C87B79BBDBEF203294ADD5C3F80C660C3B6967FAED9C736BE6A07AF5374DCED398DCFF80699664E
2,969,641 UART: [art] SIG.S = 38B9956544353805F97691929DE827310694B7A0466E8916246E0C9A3EA629F0363A45D9AFDF2E14AB1258A5ED0BCC65
2,993,864 UART: Caliptra RT
2,994,117 UART: [state] CFI Enabled
3,101,828 UART: [rt] RT listening for mailbox commands...
3,102,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,274 UART: [rt]cmd =0x41544d4e, len=14344
3,370,088 >>> mbox cmd response data (8 bytes)
3,370,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,276 UART: [rt]cmd =0x41545348, len=116
3,422,494 >>> mbox cmd response data (12 bytes)
3,422,495 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,704 UART: [rt]cmd =0x41545348, len=116
3,454,392 >>> mbox cmd response data (12 bytes)
3,454,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,586 >>> mbox cmd response: success
5,894,586 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,907,994 UART:
5,908,010 UART: Running Caliptra FMC ...
5,908,418 UART:
5,908,472 UART: [state] CFI Enabled
5,997,923 UART: [art] Extend RT PCRs Done
5,998,351 UART: [art] Lock RT PCRs Done
5,999,658 UART: [art] Populate DV Done
6,007,735 UART: [fht] FMC Alias Private Key: 7
6,008,859 UART: [art] Derive CDI
6,009,139 UART: [art] Store in in slot 0x4
6,095,020 UART: [art] Derive Key Pair
6,095,380 UART: [art] Store priv key in slot 0x5
6,108,354 UART: [art] Derive Key Pair - Done
6,122,952 UART: [art] Signing Cert with AUTHO
6,123,432 UART: RITY.KEYID = 7
6,138,808 UART: [art] Erasing AUTHORITY.KEYID = 7
6,139,573 UART: [art] PUB.X = 1C5C3DDF114C36130341B86E8A6042D8528533EFFE7D78274CF0752378A5A7BF7CB2D7ED27D251F46AA8D3491332B919
6,146,342 UART: [art] PUB.Y = E08F30A595CA5FE2AAEDB1BAF17216D3FB8ED1C2F29C60F67951C063B6F3F06654CDFCD6C324887E0BF764B58D776405
6,153,302 UART: [art] SIG.R = 92895D68421B123DA29E791974E1B7FB94A91527DE1698146370829EE3BB6DB8E02756A3E1E55BC2F9B39A703BB3AFA6
6,160,074 UART: [art] SIG.S = 5F7215B3D2649877D582A46C91687563F10626020506138FEC619B12E14C5B7B4E97AFEC71B1D59CB1BDAAC322081AE9
6,184,150 UART: Caliptra RT
6,184,403 UART: [state] CFI Enabled
6,462,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,643 UART: [rt]cmd =0x41545348, len=116
6,515,569 >>> mbox cmd response data (12 bytes)
6,515,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,545,643 UART: [rt]cmd =0x41545348, len=116
6,547,033 >>> mbox cmd response data (12 bytes)
6,547,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,669,573 UART: [rt]cmd =0x41544d4e, len=14344
6,814,497 >>> mbox cmd response data (8 bytes)
6,814,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,844,541 UART: [rt]cmd =0x41545348, len=116
6,866,339 >>> mbox cmd response data (12 bytes)
6,866,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,383 UART: [rt]cmd =0x41545348, len=116
6,898,172 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,793 UART: [kat] SHA2-512-ACC
908,694 UART: [kat] ECC-384
917,831 UART: [kat] HMAC-384Kdf
922,383 UART: [kat] LMS
1,170,711 UART: [kat] --
1,171,710 UART: [cold-reset] ++
1,172,288 UART: [fht] FHT @ 0x50003400
1,174,889 UART: [idev] ++
1,175,057 UART: [idev] CDI.KEYID = 6
1,175,417 UART: [idev] SUBJECT.KEYID = 7
1,175,841 UART: [idev] UDS.KEYID = 0
1,176,186 ready_for_fw is high
1,176,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,818 UART: [idev] --
1,210,838 UART: [ldev] ++
1,211,006 UART: [ldev] CDI.KEYID = 6
1,211,369 UART: [ldev] SUBJECT.KEYID = 5
1,211,795 UART: [ldev] AUTHORITY.KEYID = 7
1,212,258 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,243,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,198 UART: [ldev] --
1,283,505 UART: [fwproc] Wait for Commands...
1,284,243 UART: [fwproc] Recv command 0x46574c44
1,284,971 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,817 >>> mbox cmd response: success
2,779,047 UART: [afmc] ++
2,779,215 UART: [afmc] CDI.KEYID = 6
2,779,577 UART: [afmc] SUBJECT.KEYID = 7
2,780,002 UART: [afmc] AUTHORITY.KEYID = 5
2,816,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,777 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,332 UART: [afmc] --
2,859,244 UART: [cold-reset] --
2,859,970 UART: [state] Locking Datavault
2,861,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,629 UART: [state] Locking ICCM
2,862,133 UART: [exit] Launching FMC @ 0x40000130
2,867,462 UART:
2,867,478 UART: Running Caliptra FMC ...
2,867,886 UART:
2,868,029 UART: [state] CFI Enabled
2,878,524 UART: [fht] FMC Alias Private Key: 7
2,986,139 UART: [art] Extend RT PCRs Done
2,986,567 UART: [art] Lock RT PCRs Done
2,987,899 UART: [art] Populate DV Done
2,996,146 UART: [fht] FMC Alias Private Key: 7
2,997,128 UART: [art] Derive CDI
2,997,408 UART: [art] Store in in slot 0x4
3,083,247 UART: [art] Derive Key Pair
3,083,607 UART: [art] Store priv key in slot 0x5
3,097,235 UART: [art] Derive Key Pair - Done
3,112,006 UART: [art] Signing Cert with AUTHO
3,112,486 UART: RITY.KEYID = 7
3,127,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,459 UART: [art] PUB.X = 24B3EEE21BB13A5735E51A49B072ED0F13959386EBE7F2A72984D746E191512C9574B641B7D52F09AE83C3C04833DD6B
3,135,225 UART: [art] PUB.Y = F78AAB80755B9834C53793CF62127DD66BD039AF5DE6E9820E7A6A1A30F501721B0A9872AB3E1A918EF85D43BC9C3B7C
3,142,176 UART: [art] SIG.R = 834BA20EFD1661037A8F60EA2A65D6B7EF1D9EE5A41BF337EA23B877834BE512F75ABADF378C75F93374C38ED5225DF1
3,148,954 UART: [art] SIG.S = DF884184861BF1E65C9D8535EA968C72618C4EA51C85DE6374F72756DAF7403B8E369D30805A0865E72F3DE65BA04D9E
3,172,610 UART: Caliptra RT
3,172,955 UART: [state] CFI Enabled
3,280,661 UART: [rt] RT listening for mailbox commands...
3,281,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,265 UART: [rt]cmd =0x41544d4e, len=14344
3,548,787 >>> mbox cmd response data (8 bytes)
3,548,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,621 UART: [rt]cmd =0x41545348, len=116
3,601,157 >>> mbox cmd response data (12 bytes)
3,601,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,433 UART: [rt]cmd =0x41545348, len=116
3,633,051 >>> mbox cmd response data (12 bytes)
3,633,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,753 UART:
3,633,769 UART: Running Caliptra ROM ...
3,634,177 UART:
3,634,319 UART: [state] CFI Enabled
3,637,225 UART: [state] LifecycleState = Unprovisioned
3,637,880 UART: [state] DebugLocked = No
3,638,512 UART: [state] WD Timer not started. Device not locked for debugging
3,639,754 UART: [kat] SHA2-256
4,445,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,449,529 UART: [kat] ++
4,449,681 UART: [kat] sha1
4,454,059 UART: [kat] SHA2-256
4,455,999 UART: [kat] SHA2-384
4,458,574 UART: [kat] SHA2-512-ACC
4,460,474 UART: [kat] ECC-384
4,470,127 UART: [kat] HMAC-384Kdf
4,474,731 UART: [kat] LMS
4,723,059 UART: [kat] --
4,723,771 UART: [update-reset] ++
6,037,960 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,038,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,188,993 >>> mbox cmd response: success
6,188,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,189,152 UART: [update-reset] Copying MAN_2 To MAN_1
6,197,166 UART: [update-reset Success] --
6,197,933 UART: [state] Locking Datavault
6,198,677 UART: [state] Locking PCR0, PCR1 and PCR31
6,199,281 UART: [state] Locking ICCM
6,199,785 UART: [exit] Launching FMC @ 0x40000130
6,205,114 UART:
6,205,130 UART: Running Caliptra FMC ...
6,205,538 UART:
6,205,681 UART: [state] CFI Enabled
6,295,136 UART: [art] Extend RT PCRs Done
6,295,564 UART: [art] Lock RT PCRs Done
6,296,915 UART: [art] Populate DV Done
6,305,240 UART: [fht] FMC Alias Private Key: 7
6,306,278 UART: [art] Derive CDI
6,306,558 UART: [art] Store in in slot 0x4
6,392,487 UART: [art] Derive Key Pair
6,392,847 UART: [art] Store priv key in slot 0x5
6,406,057 UART: [art] Derive Key Pair - Done
6,420,867 UART: [art] Signing Cert with AUTHO
6,421,347 UART: RITY.KEYID = 7
6,436,419 UART: [art] Erasing AUTHORITY.KEYID = 7
6,437,184 UART: [art] PUB.X = 699B8718A11476838317304177AE6DC86DC0E2FBC6E8FB7EAAD9892DFEA7C568208CA8BD1BCEF3724C47BACB3B57DC44
6,443,972 UART: [art] PUB.Y = 72C5614D59E4A377C6600329DC423AAEA35F236527E15D8872D0FB0FBC84BCA35E0682ED21360260D45C2CDBB48F0B03
6,450,910 UART: [art] SIG.R = EF7EB9B359AF8E14BDEAE737D9F5D51C6F361B80869744C45147F888D16E06AE27DD0DA0489BD4BB4AC06EB28B6F53EC
6,457,694 UART: [art] SIG.S = 08A0C3B9786338766987F50939D3A89EB1ED84EC27B715E08E1006647DC87AAEFFD473F322457CBEF5760A0277F65A4E
6,481,432 UART: Caliptra RT
6,481,777 UART: [state] CFI Enabled
6,761,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,792,321 UART: [rt]cmd =0x41545348, len=116
6,814,939 >>> mbox cmd response data (12 bytes)
6,814,940 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,845,087 UART: [rt]cmd =0x41545348, len=116
6,846,955 >>> mbox cmd response data (12 bytes)
6,846,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,969,375 UART: [rt]cmd =0x41544d4e, len=14344
7,113,675 >>> mbox cmd response data (8 bytes)
7,113,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,143,605 UART: [rt]cmd =0x41545348, len=116
7,164,929 >>> mbox cmd response data (12 bytes)
7,164,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,955 UART: [rt]cmd =0x41545348, len=116
7,196,646 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,278 ready_for_fw is high
1,060,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,108 >>> mbox cmd response: success
2,690,866 UART:
2,690,882 UART: Running Caliptra FMC ...
2,691,290 UART:
2,691,433 UART: [state] CFI Enabled
2,702,180 UART: [fht] FMC Alias Private Key: 7
2,810,399 UART: [art] Extend RT PCRs Done
2,810,827 UART: [art] Lock RT PCRs Done
2,812,307 UART: [art] Populate DV Done
2,820,522 UART: [fht] FMC Alias Private Key: 7
2,821,620 UART: [art] Derive CDI
2,821,900 UART: [art] Store in in slot 0x4
2,907,467 UART: [art] Derive Key Pair
2,907,827 UART: [art] Store priv key in slot 0x5
2,921,263 UART: [art] Derive Key Pair - Done
2,936,149 UART: [art] Signing Cert with AUTHO
2,936,629 UART: RITY.KEYID = 7
2,951,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,486 UART: [art] PUB.X = 942B2C7E942A0AD5034BE46A553CD73FA31CA2F570A18A2B94F6D3F4A583B3834E11088CC007449132F5987FA0C3E743
2,959,246 UART: [art] PUB.Y = 58F913D5E9B63997EB381D391D43F9375A2AB4AF2DBA919EFF5369BEA616BE55BEFE475792EF2CF1EA78E3609AB4B330
2,966,212 UART: [art] SIG.R = 279BD83931E67DF367107EB8D98AD6B204ADC87A08E85577F1CDB0AA9B82CDA58CD17F399430E8B3DD613FA82D2A3CB0
2,972,992 UART: [art] SIG.S = 4F188B047E62E33B91B30CE597629C030973FB1F412712279C876B68796CA7F42BE6D9E945EDC4551C55485673EE3BC8
2,996,075 UART: Caliptra RT
2,996,420 UART: [state] CFI Enabled
3,104,039 UART: [rt] RT listening for mailbox commands...
3,104,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,067 UART: [rt]cmd =0x41544d4e, len=14344
3,373,135 >>> mbox cmd response data (8 bytes)
3,373,136 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,445 UART: [rt]cmd =0x41545348, len=116
3,425,551 >>> mbox cmd response data (12 bytes)
3,425,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,535 UART: [rt]cmd =0x41545348, len=116
3,457,389 >>> mbox cmd response data (12 bytes)
3,457,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,364 >>> mbox cmd response: success
5,899,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,912,890 UART:
5,912,906 UART: Running Caliptra FMC ...
5,913,314 UART:
5,913,457 UART: [state] CFI Enabled
6,002,732 UART: [art] Extend RT PCRs Done
6,003,160 UART: [art] Lock RT PCRs Done
6,004,575 UART: [art] Populate DV Done
6,012,666 UART: [fht] FMC Alias Private Key: 7
6,013,710 UART: [art] Derive CDI
6,013,990 UART: [art] Store in in slot 0x4
6,099,495 UART: [art] Derive Key Pair
6,099,855 UART: [art] Store priv key in slot 0x5
6,113,111 UART: [art] Derive Key Pair - Done
6,127,989 UART: [art] Signing Cert with AUTHO
6,128,469 UART: RITY.KEYID = 7
6,143,717 UART: [art] Erasing AUTHORITY.KEYID = 7
6,144,482 UART: [art] PUB.X = E2BA528668A4D9ADCD37D65CB5767CBBC4191ACD58F7DD37493D7DD9C58C6B9AEC4E68A656AE1FA3121DDD4E28801354
6,151,272 UART: [art] PUB.Y = 0B6CB7D259EA3F854CB5A4CDEBC80971FB26616F92A835BF347CC51949A52BBBEE39313ADE3C960F8EB3BC2BD59E92B8
6,158,235 UART: [art] SIG.R = 4A6A3F2132DBCE21C4E345C9245BDBD2FEEA3A71463A328ED29A8166A470CDB778A5EA23C62537EBF6A002EAFF371CA6
6,165,022 UART: [art] SIG.S = C29A3F9B3A79AE6B57351078696443DB3087E30BB0BD67E5DB1D7674D79048681A6C6C9857DC590624E21E9A4F721785
6,188,591 UART: Caliptra RT
6,188,936 UART: [state] CFI Enabled
6,471,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,502,220 UART: [rt]cmd =0x41545348, len=116
6,524,432 >>> mbox cmd response data (12 bytes)
6,524,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,554,590 UART: [rt]cmd =0x41545348, len=116
6,556,312 >>> mbox cmd response data (12 bytes)
6,556,313 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,678,882 UART: [rt]cmd =0x41544d4e, len=14344
6,823,776 >>> mbox cmd response data (8 bytes)
6,823,777 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,853,678 UART: [rt]cmd =0x41545348, len=116
6,875,776 >>> mbox cmd response data (12 bytes)
6,875,777 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,098 UART: [rt]cmd =0x41545348, len=116
6,907,859 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,174,859 ready_for_fw is high
1,174,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,415 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,399 UART: [idev] --
1,209,320 UART: [ldev] ++
1,209,488 UART: [ldev] CDI.KEYID = 6
1,209,852 UART: [ldev] SUBJECT.KEYID = 5
1,210,279 UART: [ldev] AUTHORITY.KEYID = 7
1,210,742 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,896 UART: [ldev] --
1,282,272 UART: [fwproc] Wait for Commands...
1,282,907 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,158 >>> mbox cmd response: success
2,776,217 UART: [afmc] ++
2,776,385 UART: [afmc] CDI.KEYID = 6
2,776,748 UART: [afmc] SUBJECT.KEYID = 7
2,777,174 UART: [afmc] AUTHORITY.KEYID = 5
2,813,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,978 UART: [afmc] --
2,856,946 UART: [cold-reset] --
2,857,556 UART: [state] Locking Datavault
2,858,833 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,437 UART: [state] Locking ICCM
2,860,045 UART: [exit] Launching FMC @ 0x40000130
2,865,374 UART:
2,865,390 UART: Running Caliptra FMC ...
2,865,798 UART:
2,865,852 UART: [state] CFI Enabled
2,876,339 UART: [fht] FMC Alias Private Key: 7
2,983,812 UART: [art] Extend RT PCRs Done
2,984,240 UART: [art] Lock RT PCRs Done
2,985,834 UART: [art] Populate DV Done
2,993,879 UART: [fht] FMC Alias Private Key: 7
2,994,855 UART: [art] Derive CDI
2,995,135 UART: [art] Store in in slot 0x4
3,080,816 UART: [art] Derive Key Pair
3,081,176 UART: [art] Store priv key in slot 0x5
3,094,068 UART: [art] Derive Key Pair - Done
3,109,028 UART: [art] Signing Cert with AUTHO
3,109,508 UART: RITY.KEYID = 7
3,124,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,699 UART: [art] PUB.X = 031964C4E6C869F69B3D2FB6261905AB68D9E67B9547BF5E46EFE248C3A67A8E664DFFE3B431BB3C1974BB0A4D286D03
3,132,467 UART: [art] PUB.Y = 837085F89D17CE3195713EF90AA3280FD6783E44D4F761AC9688968B53B3B85A55077A9FBB44F2970A4EEFB8EABDA131
3,139,411 UART: [art] SIG.R = 9A0F0FEDABDA6F53C9A8B3EB7DE5A1A3945D07AE4AB8832ED0314A079F83BC3ACB21D4ACD7EB8A976786E7215A977675
3,146,191 UART: [art] SIG.S = 477E9E482979A1DDB094F36BE9FB2A631E5E01813381CFA459ACD3DE00304F40418C69D373C20374B37A7B4AA8AD63D1
3,170,340 UART: Caliptra RT
3,170,593 UART: [state] CFI Enabled
3,278,930 UART: [rt] RT listening for mailbox commands...
3,279,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,638 UART: [rt]cmd =0x41544d4e, len=14344
3,547,416 >>> mbox cmd response data (8 bytes)
3,547,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,312 UART: [rt]cmd =0x41545348, len=116
3,598,792 >>> mbox cmd response data (12 bytes)
3,598,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,816 UART: [rt]cmd =0x41545348, len=116
3,630,584 >>> mbox cmd response data (12 bytes)
3,630,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,312 UART:
3,631,328 UART: Running Caliptra ROM ...
3,631,736 UART:
3,631,791 UART: [state] CFI Enabled
3,634,105 UART: [state] LifecycleState = Unprovisioned
3,634,760 UART: [state] DebugLocked = No
3,635,430 UART: [state] WD Timer not started. Device not locked for debugging
3,636,738 UART: [kat] SHA2-256
4,440,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,444,417 UART: [kat] ++
4,444,569 UART: [kat] sha1
4,448,929 UART: [kat] SHA2-256
4,450,869 UART: [kat] SHA2-384
4,453,666 UART: [kat] SHA2-512-ACC
4,455,566 UART: [kat] ECC-384
4,465,597 UART: [kat] HMAC-384Kdf
4,470,245 UART: [kat] LMS
4,718,557 UART: [kat] --
4,719,477 UART: [update-reset] ++
6,032,603 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,033,714 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,183,712 >>> mbox cmd response: success
6,183,712 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,183,837 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,851 UART: [update-reset Success] --
6,192,824 UART: [state] Locking Datavault
6,193,640 UART: [state] Locking PCR0, PCR1 and PCR31
6,194,244 UART: [state] Locking ICCM
6,194,708 UART: [exit] Launching FMC @ 0x40000130
6,200,037 UART:
6,200,053 UART: Running Caliptra FMC ...
6,200,461 UART:
6,200,515 UART: [state] CFI Enabled
6,290,008 UART: [art] Extend RT PCRs Done
6,290,436 UART: [art] Lock RT PCRs Done
6,291,561 UART: [art] Populate DV Done
6,300,032 UART: [fht] FMC Alias Private Key: 7
6,301,074 UART: [art] Derive CDI
6,301,354 UART: [art] Store in in slot 0x4
6,386,865 UART: [art] Derive Key Pair
6,387,225 UART: [art] Store priv key in slot 0x5
6,401,037 UART: [art] Derive Key Pair - Done
6,415,655 UART: [art] Signing Cert with AUTHO
6,416,135 UART: RITY.KEYID = 7
6,431,501 UART: [art] Erasing AUTHORITY.KEYID = 7
6,432,266 UART: [art] PUB.X = B056E10A7F1F2228D9A082DC66CB3A6BCF289CD69E3144999D844EBE8CAEF3D14C4EADC32556C7351C1739D76F33BF76
6,439,047 UART: [art] PUB.Y = D3A93E2307EB74A82F8BFB795D7B024F376D65E144A4D36E62D4649200AC2A40FB4DCE6D5E867CCCD2066CB49F31D79E
6,445,980 UART: [art] SIG.R = 9D8F2549664A9F782694CCF4AA18C0175F3D6494F35AF8052A59272D4EB0B0A2BA4CE528028FB9C872BADD9819E5576A
6,452,750 UART: [art] SIG.S = E238EBD7ECE80D765BAEA8E747752AD26C9936E4F591C29CDD445EB2436538CAA46840E9BA9012017E1467CF9E4205DF
6,476,648 UART: Caliptra RT
6,476,901 UART: [state] CFI Enabled
6,759,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,789,900 UART: [rt]cmd =0x41545348, len=116
6,811,820 >>> mbox cmd response data (12 bytes)
6,811,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,841,966 UART: [rt]cmd =0x41545348, len=116
6,843,702 >>> mbox cmd response data (12 bytes)
6,843,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,966,288 UART: [rt]cmd =0x41544d4e, len=14344
7,111,698 >>> mbox cmd response data (8 bytes)
7,111,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,141,690 UART: [rt]cmd =0x41545348, len=116
7,163,138 >>> mbox cmd response data (12 bytes)
7,163,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,193,290 UART: [rt]cmd =0x41545348, len=116
7,194,733 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,272 ready_for_fw is high
1,056,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,250 >>> mbox cmd response: success
2,686,278 UART:
2,686,294 UART: Running Caliptra FMC ...
2,686,702 UART:
2,686,756 UART: [state] CFI Enabled
2,697,213 UART: [fht] FMC Alias Private Key: 7
2,805,056 UART: [art] Extend RT PCRs Done
2,805,484 UART: [art] Lock RT PCRs Done
2,806,940 UART: [art] Populate DV Done
2,815,267 UART: [fht] FMC Alias Private Key: 7
2,816,267 UART: [art] Derive CDI
2,816,547 UART: [art] Store in in slot 0x4
2,902,412 UART: [art] Derive Key Pair
2,902,772 UART: [art] Store priv key in slot 0x5
2,916,216 UART: [art] Derive Key Pair - Done
2,931,110 UART: [art] Signing Cert with AUTHO
2,931,590 UART: RITY.KEYID = 7
2,946,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,577 UART: [art] PUB.X = 4B0D7A6440EAD3CEBF239CA46471595FFCDF5E98A76C27686672DE31D4D598F2DA06CFA472DC37ECC5DF21FAFCD9CCA9
2,954,369 UART: [art] PUB.Y = 3080ECA96877DBFED653B664A4211D0EEE7BA3BE2C9DF0D42395C9F30E631F19D28AD3AA5D5D29F08A2271ABEE72E7BA
2,961,335 UART: [art] SIG.R = 767C7495D08EBF9C8860FA29AA85BD86A1D5867C9E4937EEA4BF55427B9C859624DDB8A7F69D3BF77F6A6CC61FC2E82E
2,968,121 UART: [art] SIG.S = 324C0E2547EBFD1CB762C5BF4D59F79A1B0646196C0D4F00C126FAEFB02D5A9197A70D7D594980E56074D9F338D27ECF
2,991,806 UART: Caliptra RT
2,992,059 UART: [state] CFI Enabled
3,099,912 UART: [rt] RT listening for mailbox commands...
3,100,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,722 UART: [rt]cmd =0x41544d4e, len=14344
3,368,762 >>> mbox cmd response data (8 bytes)
3,368,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,062 UART: [rt]cmd =0x41545348, len=116
3,421,594 >>> mbox cmd response data (12 bytes)
3,421,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,628 UART: [rt]cmd =0x41545348, len=116
3,453,358 >>> mbox cmd response data (12 bytes)
3,453,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,827 >>> mbox cmd response: success
5,887,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,901,173 UART:
5,901,189 UART: Running Caliptra FMC ...
5,901,597 UART:
5,901,651 UART: [state] CFI Enabled
5,990,088 UART: [art] Extend RT PCRs Done
5,990,516 UART: [art] Lock RT PCRs Done
5,991,563 UART: [art] Populate DV Done
5,999,842 UART: [fht] FMC Alias Private Key: 7
6,000,844 UART: [art] Derive CDI
6,001,124 UART: [art] Store in in slot 0x4
6,086,649 UART: [art] Derive Key Pair
6,087,009 UART: [art] Store priv key in slot 0x5
6,100,127 UART: [art] Derive Key Pair - Done
6,114,993 UART: [art] Signing Cert with AUTHO
6,115,473 UART: RITY.KEYID = 7
6,130,555 UART: [art] Erasing AUTHORITY.KEYID = 7
6,131,320 UART: [art] PUB.X = 1811FC5203CE2462610A45C7F04EC764E4669FBEDF53018BB25B68E5370A84241E6F2BFF3E8F5365D68AF3AEA4FDF17B
6,138,090 UART: [art] PUB.Y = ED4818F43D30162D144805428A400371F3D3EEDB9F9B83130C38A2A3E66B1871D4764F993B89F6EA08A1CB0AFB633002
6,145,022 UART: [art] SIG.R = B7A455E53AD3FF3FDEDD3614BD6B218436093C4632A16AF0662931C6024D6C4B554DFA73BD0537EF112405D183A2DD6B
6,151,788 UART: [art] SIG.S = A3A48CFDD2EAF9DF18F88CFAFB0E9AF1068572B9169AE5D158D59B0D73B619030A5095002C400E2DD4C6B5C7ACE3C81E
6,175,259 UART: Caliptra RT
6,175,512 UART: [state] CFI Enabled
6,455,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,847 UART: [rt]cmd =0x41545348, len=116
6,507,537 >>> mbox cmd response data (12 bytes)
6,507,538 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,537,645 UART: [rt]cmd =0x41545348, len=116
6,539,579 >>> mbox cmd response data (12 bytes)
6,539,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,395 UART: [rt]cmd =0x41544d4e, len=14344
6,806,973 >>> mbox cmd response data (8 bytes)
6,806,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,836,893 UART: [rt]cmd =0x41545348, len=116
6,859,243 >>> mbox cmd response data (12 bytes)
6,859,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,889,155 UART: [rt]cmd =0x41545348, len=116
6,891,098 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 ready_for_fw is high
1,174,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,077 >>> mbox cmd response: success
2,776,286 UART: [afmc] ++
2,776,454 UART: [afmc] CDI.KEYID = 6
2,776,817 UART: [afmc] SUBJECT.KEYID = 7
2,777,243 UART: [afmc] AUTHORITY.KEYID = 5
2,812,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,865 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,477 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,196 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,951 UART: [afmc] --
2,855,887 UART: [cold-reset] --
2,856,735 UART: [state] Locking Datavault
2,857,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,314 UART: [state] Locking ICCM
2,858,862 UART: [exit] Launching FMC @ 0x40000130
2,864,191 UART:
2,864,207 UART: Running Caliptra FMC ...
2,864,615 UART:
2,864,758 UART: [state] CFI Enabled
2,875,131 UART: [fht] FMC Alias Private Key: 7
2,983,822 UART: [art] Extend RT PCRs Done
2,984,250 UART: [art] Lock RT PCRs Done
2,985,808 UART: [art] Populate DV Done
2,993,991 UART: [fht] FMC Alias Private Key: 7
2,995,011 UART: [art] Derive CDI
2,995,291 UART: [art] Store in in slot 0x4
3,080,560 UART: [art] Derive Key Pair
3,080,920 UART: [art] Store priv key in slot 0x5
3,094,670 UART: [art] Derive Key Pair - Done
3,109,742 UART: [art] Signing Cert with AUTHO
3,110,222 UART: RITY.KEYID = 7
3,125,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,147 UART: [art] PUB.X = 1CB1393F2F00555CE72755CB201615612F079091B9C16C910FF96331F813E17D91B5B859777F022E134C46F90659C56F
3,132,871 UART: [art] PUB.Y = 533815E9386C2A1C9427DDA15D7E9D7D67127A58A1622585D347CF7F13DD585DFB66684DC8A30E1B3743088E9C172910
3,139,811 UART: [art] SIG.R = 25502631682AB15652B44BCD5D25E5EB5B03D59B3D420FC8F199A35A87B998CA33E6D72EF777A1538E9B1917D378368C
3,146,575 UART: [art] SIG.S = 455C38283B2E62E26D9082150CEACEF2959C13DDB165DDF8271E83C980F3EF02121151EC4C70C9AA5EE2F0C543E444D1
3,170,094 UART: Caliptra RT
3,170,439 UART: [state] CFI Enabled
3,277,484 UART: [rt] RT listening for mailbox commands...
3,278,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,372 UART: [rt]cmd =0x41544d4e, len=14344
3,546,452 >>> mbox cmd response data (8 bytes)
3,546,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,438 UART: [rt]cmd =0x41545348, len=116
3,597,284 >>> mbox cmd response data (12 bytes)
3,597,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,338 UART: [rt]cmd =0x41545348, len=116
3,629,358 >>> mbox cmd response data (12 bytes)
3,629,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,056 UART:
3,630,072 UART: Running Caliptra ROM ...
3,630,480 UART:
3,630,622 UART: [state] CFI Enabled
3,633,306 UART: [state] LifecycleState = Unprovisioned
3,633,961 UART: [state] DebugLocked = No
3,634,459 UART: [state] WD Timer not started. Device not locked for debugging
3,635,569 UART: [kat] SHA2-256
4,439,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,443,248 UART: [kat] ++
4,443,400 UART: [kat] sha1
4,447,620 UART: [kat] SHA2-256
4,449,560 UART: [kat] SHA2-384
4,452,269 UART: [kat] SHA2-512-ACC
4,454,169 UART: [kat] ECC-384
4,463,756 UART: [kat] HMAC-384Kdf
4,468,474 UART: [kat] LMS
4,716,786 UART: [kat] --
4,717,512 UART: [update-reset] ++
6,031,056 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,032,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,182,173 >>> mbox cmd response: success
6,182,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,182,352 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,366 UART: [update-reset Success] --
6,191,279 UART: [state] Locking Datavault
6,192,003 UART: [state] Locking PCR0, PCR1 and PCR31
6,192,607 UART: [state] Locking ICCM
6,193,075 UART: [exit] Launching FMC @ 0x40000130
6,198,404 UART:
6,198,420 UART: Running Caliptra FMC ...
6,198,828 UART:
6,198,971 UART: [state] CFI Enabled
6,288,070 UART: [art] Extend RT PCRs Done
6,288,498 UART: [art] Lock RT PCRs Done
6,289,759 UART: [art] Populate DV Done
6,298,340 UART: [fht] FMC Alias Private Key: 7
6,299,360 UART: [art] Derive CDI
6,299,640 UART: [art] Store in in slot 0x4
6,385,423 UART: [art] Derive Key Pair
6,385,783 UART: [art] Store priv key in slot 0x5
6,399,449 UART: [art] Derive Key Pair - Done
6,414,334 UART: [art] Signing Cert with AUTHO
6,414,814 UART: RITY.KEYID = 7
6,429,836 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,601 UART: [art] PUB.X = 5C3287C5B15BF4510ACECA642D1350144B52DD8662E26EEEFDACEE74615C57F89DDEB2900DE4B22673F5FB95674AE564
6,437,379 UART: [art] PUB.Y = 1B2AD5532B2E752D2CAC8BBD28E14D7F5859B895C95A259F222C4CB01CE6B36386254B2CC12EFE8B4EE849063696807C
6,444,334 UART: [art] SIG.R = 69F7915035CA9312DAB2FDDC34695023829E4B84AC8B6673EDBDE7981FE902FD8B5A703DED5EBF3DA38BA1579650F80B
6,451,112 UART: [art] SIG.S = F419105F485F826543D43FD6481BB8A64CDB1D75AA17A9E5FEB67812E84CD28E21F784877DF09F77D52997C397488135
6,475,247 UART: Caliptra RT
6,475,592 UART: [state] CFI Enabled
6,754,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,616 UART: [rt]cmd =0x41545348, len=116
6,807,316 >>> mbox cmd response data (12 bytes)
6,807,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,837,390 UART: [rt]cmd =0x41545348, len=116
6,839,160 >>> mbox cmd response data (12 bytes)
6,839,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,961,862 UART: [rt]cmd =0x41544d4e, len=14344
7,106,586 >>> mbox cmd response data (8 bytes)
7,106,587 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,136,570 UART: [rt]cmd =0x41545348, len=116
7,159,112 >>> mbox cmd response data (12 bytes)
7,159,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,189,288 UART: [rt]cmd =0x41545348, len=116
7,191,135 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,489 ready_for_fw is high
1,056,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,999 >>> mbox cmd response: success
2,687,821 UART:
2,687,837 UART: Running Caliptra FMC ...
2,688,245 UART:
2,688,388 UART: [state] CFI Enabled
2,698,835 UART: [fht] FMC Alias Private Key: 7
2,807,100 UART: [art] Extend RT PCRs Done
2,807,528 UART: [art] Lock RT PCRs Done
2,809,192 UART: [art] Populate DV Done
2,817,431 UART: [fht] FMC Alias Private Key: 7
2,818,369 UART: [art] Derive CDI
2,818,649 UART: [art] Store in in slot 0x4
2,904,180 UART: [art] Derive Key Pair
2,904,540 UART: [art] Store priv key in slot 0x5
2,918,068 UART: [art] Derive Key Pair - Done
2,932,830 UART: [art] Signing Cert with AUTHO
2,933,310 UART: RITY.KEYID = 7
2,948,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,443 UART: [art] PUB.X = 46CF5C2B745DA7D2B5E65E60F2E2D7B39129132F9B6934BDFE715AFB082A9E7358ED4CCE3D3D37576C1E0109CB4EEEFE
2,956,224 UART: [art] PUB.Y = 9CA4EDE4831645A2DC83E11DE710F199A1E72DF16019CD3783797C319B7F04AE203C33B0ED2B17F6A35E286EA5018894
2,963,172 UART: [art] SIG.R = F11FFB135DE08F5135F2B61C9AA942B929BA6D32DFCCEC6E94C9FCC6E308772D4AC4AD157ED56863A649FAB928B13158
2,969,957 UART: [art] SIG.S = 4C441243B2E89138A2178A91A08ED6AF745C5E37A8304FD4F76D20245D065FF78C90124C13BB180DA9A71455541C70A2
2,993,778 UART: Caliptra RT
2,994,123 UART: [state] CFI Enabled
3,102,762 UART: [rt] RT listening for mailbox commands...
3,103,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,394 UART: [rt]cmd =0x41544d4e, len=14344
3,371,924 >>> mbox cmd response data (8 bytes)
3,371,925 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,852 UART: [rt]cmd =0x41545348, len=116
3,423,292 >>> mbox cmd response data (12 bytes)
3,423,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,242 UART: [rt]cmd =0x41545348, len=116
3,454,802 >>> mbox cmd response data (12 bytes)
3,454,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,889,248 >>> mbox cmd response: success
5,889,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,902,466 UART:
5,902,482 UART: Running Caliptra FMC ...
5,902,890 UART:
5,903,033 UART: [state] CFI Enabled
5,992,418 UART: [art] Extend RT PCRs Done
5,992,846 UART: [art] Lock RT PCRs Done
5,994,085 UART: [art] Populate DV Done
6,002,228 UART: [fht] FMC Alias Private Key: 7
6,003,284 UART: [art] Derive CDI
6,003,564 UART: [art] Store in in slot 0x4
6,089,351 UART: [art] Derive Key Pair
6,089,711 UART: [art] Store priv key in slot 0x5
6,103,043 UART: [art] Derive Key Pair - Done
6,118,066 UART: [art] Signing Cert with AUTHO
6,118,546 UART: RITY.KEYID = 7
6,133,618 UART: [art] Erasing AUTHORITY.KEYID = 7
6,134,383 UART: [art] PUB.X = BC99A5C0680360326426375A1A22C44A602F23FE5272E77E061D9CB599F2CB29F9B8CEBF1125D9466E275B2946D651DC
6,141,147 UART: [art] PUB.Y = 97DE60D948954123BB7258E1537376A36D72198DDD71E92EF600682F54E33642A7A5162F7BA8C0590DEFD20508081EAC
6,148,059 UART: [art] SIG.R = 67EEAA84CF101FF1A88C1D02A8DE8B22DCF4F3494694894CE17FFDD1AD122DD7AF08FD3F80C7C690F5BE01D448101737
6,154,838 UART: [art] SIG.S = 34682945904BDEFE52AF87DC0F1499BD060D5D71C1ED940FA09037AFD8B2BD016F5C8F394BBA461D22AB2414B375CE3C
6,178,954 UART: Caliptra RT
6,179,299 UART: [state] CFI Enabled
6,460,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,491,611 UART: [rt]cmd =0x41545348, len=116
6,513,687 >>> mbox cmd response data (12 bytes)
6,513,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,543,759 UART: [rt]cmd =0x41545348, len=116
6,545,405 >>> mbox cmd response data (12 bytes)
6,545,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,667,959 UART: [rt]cmd =0x41544d4e, len=14344
6,813,257 >>> mbox cmd response data (8 bytes)
6,813,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,843,383 UART: [rt]cmd =0x41545348, len=116
6,864,521 >>> mbox cmd response data (12 bytes)
6,864,522 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,894,715 UART: [rt]cmd =0x41545348, len=116
6,896,632 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,076 UART:
192,445 UART: Running Caliptra ROM ...
194,407 UART:
194,586 UART: [state] CFI Enabled
264,393 UART: [state] LifecycleState = Unprovisioned
266,251 UART: [state] DebugLocked = No
268,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,780 UART: [kat] SHA2-256
443,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,952 UART: [kat] ++
454,427 UART: [kat] sha1
465,871 UART: [kat] SHA2-256
468,532 UART: [kat] SHA2-384
474,117 UART: [kat] SHA2-512-ACC
476,491 UART: [kat] ECC-384
2,768,356 UART: [kat] HMAC-384Kdf
2,800,143 UART: [kat] LMS
3,990,442 UART: [kat] --
3,995,997 UART: [cold-reset] ++
3,997,286 UART: [fht] Storing FHT @ 0x50003400
4,009,968 UART: [idev] ++
4,010,545 UART: [idev] CDI.KEYID = 6
4,011,583 UART: [idev] SUBJECT.KEYID = 7
4,012,761 UART: [idev] UDS.KEYID = 0
4,013,762 ready_for_fw is high
4,013,965 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,521 UART: [idev] Erasing UDS.KEYID = 0
7,346,324 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,973 UART: [idev] --
7,371,147 UART: [ldev] ++
7,371,717 UART: [ldev] CDI.KEYID = 6
7,372,689 UART: [ldev] SUBJECT.KEYID = 5
7,373,902 UART: [ldev] AUTHORITY.KEYID = 7
7,375,183 UART: [ldev] FE.KEYID = 1
7,402,685 UART: [ldev] Erasing FE.KEYID = 1
10,733,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,861 UART: [ldev] --
13,095,380 UART: [fwproc] Waiting for Commands...
13,097,261 UART: [fwproc] Received command 0x46574c44
13,099,447 UART: [fwproc] Received Image of size 114124 bytes
17,149,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,605,181 >>> mbox cmd response: success
17,609,884 UART: [afmc] ++
17,610,506 UART: [afmc] CDI.KEYID = 6
17,611,425 UART: [afmc] SUBJECT.KEYID = 7
17,612,643 UART: [afmc] AUTHORITY.KEYID = 5
20,965,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,267,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,269,543 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,283,934 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,298,800 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,313,216 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,335,201 UART: [afmc] --
23,339,833 UART: [cold-reset] --
23,343,058 UART: [state] Locking Datavault
23,348,601 UART: [state] Locking PCR0, PCR1 and PCR31
23,350,362 UART: [state] Locking ICCM
23,351,971 UART: [exit] Launching FMC @ 0x40000130
23,360,365 UART:
23,360,613 UART: Running Caliptra FMC ...
23,361,666 UART:
23,361,818 UART: [state] CFI Enabled
23,428,161 UART: [fht] FMC Alias Private Key: 7
25,766,358 UART: [art] Extend RT PCRs Done
25,767,575 UART: [art] Lock RT PCRs Done
25,769,256 UART: [art] Populate DV Done
25,774,831 UART: [fht] FMC Alias Private Key: 7
25,776,423 UART: [art] Derive CDI
25,777,237 UART: [art] Store in in slot 0x4
25,836,792 UART: [art] Derive Key Pair
25,837,827 UART: [art] Store priv key in slot 0x5
29,130,664 UART: [art] Derive Key Pair - Done
29,143,929 UART: [art] Signing Cert with AUTHO
29,145,228 UART: RITY.KEYID = 7
31,432,094 UART: [art] Erasing AUTHORITY.KEYID = 7
31,433,601 UART: [art] PUB.X = 58F2C75753DDAC74A600DBA93AE44CFFD3AAFEABA4522A48AD2088270CC3E03D540E4235C1F227B941C950FC881CCCB2
31,440,852 UART: [art] PUB.Y = 89518A8A462496F13263DCF30700F0C78393822DAE62AB08CB270961A6D2DC8E94DC2908087757082267BE4D3EE3D01D
31,448,090 UART: [art] SIG.R = 5FCFB4A74FE86F34783FF61CAB303EDFE2A873910790B6A5BE1A380D2252195D749604A998CD81DAFDBEB692C89BC248
31,455,498 UART: [art] SIG.S = 3265DC47EC172E424A03ABEBA31E7A7DE669B37F8A2D6961D84A8F1D4BB75773C33768B6FDC787FA88F1845B91F17F6A
32,760,856 UART: Caliptra RT
32,761,557 UART: [state] CFI Enabled
32,922,008 UART: [rt] RT listening for mailbox commands...
37,098,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,254,074 UART: [rt]cmd =0x41544d4e, len=14344
42,489,174 >>> mbox cmd response data (8 bytes)
42,489,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,520,525 UART: [rt]cmd =0x41545348, len=116
42,540,231 >>> mbox cmd response data (12 bytes)
44,676,029 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
44,821,112 UART:
44,821,473 UART: Running Caliptra ROM ...
44,822,603 UART:
44,822,779 UART: [state] CFI Enabled
44,890,766 UART: [state] LifecycleState = Unprovisioned
44,892,707 UART: [state] DebugLocked = No
44,894,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,900,357 UART: [kat] SHA2-256
45,070,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,080,545 UART: [kat] ++
45,081,011 UART: [kat] sha1
45,092,387 UART: [kat] SHA2-256
45,095,084 UART: [kat] SHA2-384
45,101,671 UART: [kat] SHA2-512-ACC
45,104,073 UART: [kat] ECC-384
47,392,641 UART: [kat] HMAC-384Kdf
47,425,349 UART: [kat] LMS
48,615,674 UART: [kat] --
48,620,008 UART: [update-reset] ++
52,767,147 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,770,327 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
53,152,598 >>> mbox cmd response: success
53,157,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,157,953 UART: [update-reset] Copying MAN_2 To MAN_1
53,176,807 UART: [update-reset Success] --
53,181,903 UART: [state] Locking Datavault
53,185,816 UART: [state] Locking PCR0, PCR1 and PCR31
53,187,569 UART: [state] Locking ICCM
53,190,235 UART: [exit] Launching FMC @ 0x40000130
53,198,625 UART:
53,198,860 UART: Running Caliptra FMC ...
53,199,886 UART:
53,200,036 UART: [state] CFI Enabled
53,304,168 UART: [art] Extend RT PCRs Done
53,305,357 UART: [art] Lock RT PCRs Done
53,307,003 UART: [art] Populate DV Done
53,312,831 UART: [fht] FMC Alias Private Key: 7
53,314,424 UART: [art] Derive CDI
53,315,172 UART: [art] Store in in slot 0x4
53,373,486 UART: [art] Derive Key Pair
53,374,488 UART: [art] Store priv key in slot 0x5
56,666,887 UART: [art] Derive Key Pair - Done
56,679,670 UART: [art] Signing Cert with AUTHO
56,681,006 UART: RITY.KEYID = 7
58,968,979 UART: [art] Erasing AUTHORITY.KEYID = 7
58,970,483 UART: [art] PUB.X = 758A4780EB2D3660BAD0181AB8A1B0AD396A6F18A3654E6546271B17CFB27F969E21E687ECC44EFE2B8152502EC0EB0C
58,977,740 UART: [art] PUB.Y = F39832CA471C0A1A195C8974E1122CEC8FCE2F10B60232FBBC45B517819A2E6CDE2774E351B681484B31BD9D2F53309C
58,984,975 UART: [art] SIG.R = 56369F989E9B6FBDF300589977FB3F49B47808D3B8F8523A1BC3CEA01A5EA91E18E16EEA473A6A49DB677A57E43A9AE1
58,992,382 UART: [art] SIG.S = 80C3149FCC7D129F835F6F21C6F723FEB27ADA9BE9BEE42C65A4D798E72F2D9C7F85B121969FE82E73242F07701E82DF
60,297,587 UART: Caliptra RT
60,298,287 UART: [state] CFI Enabled
60,629,712 UART: [rt] RT listening for mailbox commands...
60,661,683 UART: [rt]cmd =0x41545348, len=116
60,681,286 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,780,757 ready_for_fw is high
3,781,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,848,538 >>> mbox cmd response: success
23,545,377 UART:
23,545,798 UART: Running Caliptra FMC ...
23,546,914 UART:
23,547,072 UART: [state] CFI Enabled
23,616,666 UART: [fht] FMC Alias Private Key: 7
25,955,132 UART: [art] Extend RT PCRs Done
25,956,359 UART: [art] Lock RT PCRs Done
25,958,127 UART: [art] Populate DV Done
25,963,390 UART: [fht] FMC Alias Private Key: 7
25,964,988 UART: [art] Derive CDI
25,965,728 UART: [art] Store in in slot 0x4
26,025,848 UART: [art] Derive Key Pair
26,026,898 UART: [art] Store priv key in slot 0x5
29,320,046 UART: [art] Derive Key Pair - Done
29,333,308 UART: [art] Signing Cert with AUTHO
29,334,642 UART: RITY.KEYID = 7
31,622,252 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,762 UART: [art] PUB.X = 8523E63D8BEB098BF3029975CB484DD6C0B9F2BBB33134B4F98DE3B3D4724DA426A55C34F41F2B7470E6D58960461DD8
31,631,021 UART: [art] PUB.Y = 1C17CDDD2B47C5B8D11640A2AC5CED359EBDA78A0484809F62A4F2BC902C346B2F6A217FEB8411D6B659BB28606FEF03
31,638,265 UART: [art] SIG.R = AD7660F82BA45EF4D68D35862D202428688E8D599D41A236524ECA8E02FB96A7523B82BBAC7FB1E8FCF75ACA172EC7E2
31,645,655 UART: [art] SIG.S = 8D60C951DE50FF1379D594B3D095206BB0A1DB5ADD589E454AD6127EED45C72C013961E47C74F8E932C61BD00F9EC465
32,950,749 UART: Caliptra RT
32,951,466 UART: [state] CFI Enabled
33,112,144 UART: [rt] RT listening for mailbox commands...
37,288,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,443,805 UART: [rt]cmd =0x41544d4e, len=14344
42,679,732 >>> mbox cmd response data (8 bytes)
42,680,319 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,711,348 UART: [rt]cmd =0x41545348, len=116
42,730,012 >>> mbox cmd response data (12 bytes)
44,861,090 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,600,766 >>> mbox cmd response: success
53,605,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,639,610 UART:
53,639,910 UART: Running Caliptra FMC ...
53,641,026 UART:
53,641,198 UART: [state] CFI Enabled
53,743,335 UART: [art] Extend RT PCRs Done
53,744,546 UART: [art] Lock RT PCRs Done
53,745,810 UART: [art] Populate DV Done
53,751,492 UART: [fht] FMC Alias Private Key: 7
53,752,978 UART: [art] Derive CDI
53,753,793 UART: [art] Store in in slot 0x4
53,812,692 UART: [art] Derive Key Pair
53,813,935 UART: [art] Store priv key in slot 0x5
57,106,659 UART: [art] Derive Key Pair - Done
57,119,762 UART: [art] Signing Cert with AUTHO
57,121,070 UART: RITY.KEYID = 7
59,409,123 UART: [art] Erasing AUTHORITY.KEYID = 7
59,410,623 UART: [art] PUB.X = 683C5FAB3BFE49069903FADE5DF8A386489B66B0D672AB81A4F36BC0E780E13304E006D09F78FBCB9F84DBE4B4B80129
59,417,951 UART: [art] PUB.Y = C5B092FDB80FFF2E440C4CC025FAFA764D125E9F8F9C70DBE665369BD3356D6918267045ACD1B669E4C5B2AE6AF6D631
59,425,202 UART: [art] SIG.R = 0373EBDB2230AA6C92294A892D67329A47E39798E4A5B93BC818BFFBFEBFB372129156BB681000F88136D84CEEA1C61B
59,432,537 UART: [art] SIG.S = 8CC7D1F63EA59D6E97EB8D6491A7F8242A6CDF8E3F21A9280B48FB6C3C1B9893EF746F31E7F3F268B9B5E0146EC191AC
60,737,705 UART: Caliptra RT
60,738,409 UART: [state] CFI Enabled
61,067,277 UART: [rt] RT listening for mailbox commands...
61,099,124 UART: [rt]cmd =0x41545348, len=116
61,118,248 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,340 UART:
192,717 UART: Running Caliptra ROM ...
193,869 UART:
603,618 UART: [state] CFI Enabled
618,617 UART: [state] LifecycleState = Unprovisioned
620,507 UART: [state] DebugLocked = No
622,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,050 UART: [kat] SHA2-256
796,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,359 UART: [kat] ++
807,799 UART: [kat] sha1
819,017 UART: [kat] SHA2-256
821,737 UART: [kat] SHA2-384
828,570 UART: [kat] SHA2-512-ACC
830,926 UART: [kat] ECC-384
3,116,244 UART: [kat] HMAC-384Kdf
3,127,148 UART: [kat] LMS
4,317,250 UART: [kat] --
4,321,791 UART: [cold-reset] ++
4,323,509 UART: [fht] Storing FHT @ 0x50003400
4,335,126 UART: [idev] ++
4,335,680 UART: [idev] CDI.KEYID = 6
4,336,629 UART: [idev] SUBJECT.KEYID = 7
4,337,859 UART: [idev] UDS.KEYID = 0
4,338,831 ready_for_fw is high
4,339,029 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,414 UART: [idev] Erasing UDS.KEYID = 0
7,622,100 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,268 UART: [idev] --
7,648,192 UART: [ldev] ++
7,648,779 UART: [ldev] CDI.KEYID = 6
7,649,752 UART: [ldev] SUBJECT.KEYID = 5
7,650,903 UART: [ldev] AUTHORITY.KEYID = 7
7,652,181 UART: [ldev] FE.KEYID = 1
7,663,057 UART: [ldev] Erasing FE.KEYID = 1
10,954,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,053 UART: [ldev] --
13,315,363 UART: [fwproc] Waiting for Commands...
13,317,995 UART: [fwproc] Received command 0x46574c44
13,320,225 UART: [fwproc] Received Image of size 114124 bytes
17,369,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,670 >>> mbox cmd response: success
17,839,607 UART: [afmc] ++
17,840,224 UART: [afmc] CDI.KEYID = 6
17,841,161 UART: [afmc] SUBJECT.KEYID = 7
17,842,377 UART: [afmc] AUTHORITY.KEYID = 5
21,152,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,333 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,725 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,552 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,044 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,538 UART: [afmc] --
23,520,044 UART: [cold-reset] --
23,523,258 UART: [state] Locking Datavault
23,530,279 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,038 UART: [state] Locking ICCM
23,534,183 UART: [exit] Launching FMC @ 0x40000130
23,542,572 UART:
23,542,805 UART: Running Caliptra FMC ...
23,543,923 UART:
23,544,085 UART: [state] CFI Enabled
23,551,863 UART: [fht] FMC Alias Private Key: 7
25,882,695 UART: [art] Extend RT PCRs Done
25,883,915 UART: [art] Lock RT PCRs Done
25,885,536 UART: [art] Populate DV Done
25,890,963 UART: [fht] FMC Alias Private Key: 7
25,892,555 UART: [art] Derive CDI
25,893,368 UART: [art] Store in in slot 0x4
25,935,900 UART: [art] Derive Key Pair
25,936,894 UART: [art] Store priv key in slot 0x5
29,178,633 UART: [art] Derive Key Pair - Done
29,191,741 UART: [art] Signing Cert with AUTHO
29,193,041 UART: RITY.KEYID = 7
31,472,224 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,729 UART: [art] PUB.X = 5EF47AB72DBE8619294BE0B6A7393366F09080C181A8AEABDF592168F31A0F2506A05ECB9E7C621A689C90F20C60A852
31,480,983 UART: [art] PUB.Y = F7FE92F8A83DE8755DD14B1F7C68CF033EDF6F0591B989B4830A998ECD1B934AAFE5064A21A93DA9E99EF5D50F322DE9
31,488,231 UART: [art] SIG.R = 08A655B5B9CBE6471903A0640D71DDC1A72BB6115017B179B4DD4F64320C27B960888BA5D4FCADDFC949898D8DEEC1AF
31,495,625 UART: [art] SIG.S = 3ECEA57FAE278D7A153C1554702D7E9FCACB82744AF9E6AF9C5DB8227D2746CA18512B180173ACEA9C6902754E147BE5
32,800,461 UART: Caliptra RT
32,801,200 UART: [state] CFI Enabled
32,919,630 UART: [rt] RT listening for mailbox commands...
36,944,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,099,683 UART: [rt]cmd =0x41544d4e, len=14344
42,335,236 >>> mbox cmd response data (8 bytes)
42,335,812 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,366,560 UART: [rt]cmd =0x41545348, len=116
42,386,023 >>> mbox cmd response data (12 bytes)
44,440,403 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
44,585,218 UART:
44,585,642 UART: Running Caliptra ROM ...
44,586,734 UART:
44,586,891 UART: [state] CFI Enabled
44,602,459 UART: [state] LifecycleState = Unprovisioned
44,604,398 UART: [state] DebugLocked = No
44,606,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,610,510 UART: [kat] SHA2-256
44,780,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,790,754 UART: [kat] ++
44,791,200 UART: [kat] sha1
44,801,913 UART: [kat] SHA2-256
44,804,611 UART: [kat] SHA2-384
44,810,703 UART: [kat] SHA2-512-ACC
44,813,071 UART: [kat] ECC-384
47,096,663 UART: [kat] HMAC-384Kdf
47,107,713 UART: [kat] LMS
48,297,736 UART: [kat] --
48,303,045 UART: [update-reset] ++
52,437,966 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,441,629 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,823,899 >>> mbox cmd response: success
52,828,396 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,829,003 UART: [update-reset] Copying MAN_2 To MAN_1
52,847,152 UART: [update-reset Success] --
52,851,330 UART: [state] Locking Datavault
52,854,180 UART: [state] Locking PCR0, PCR1 and PCR31
52,855,885 UART: [state] Locking ICCM
52,858,683 UART: [exit] Launching FMC @ 0x40000130
52,867,134 UART:
52,867,367 UART: Running Caliptra FMC ...
52,868,462 UART:
52,868,616 UART: [state] CFI Enabled
52,912,353 UART: [art] Extend RT PCRs Done
52,913,487 UART: [art] Lock RT PCRs Done
52,915,037 UART: [art] Populate DV Done
52,920,249 UART: [fht] FMC Alias Private Key: 7
52,922,007 UART: [art] Derive CDI
52,922,819 UART: [art] Store in in slot 0x4
52,965,570 UART: [art] Derive Key Pair
52,966,624 UART: [art] Store priv key in slot 0x5
56,208,274 UART: [art] Derive Key Pair - Done
56,221,187 UART: [art] Signing Cert with AUTHO
56,222,489 UART: RITY.KEYID = 7
58,501,504 UART: [art] Erasing AUTHORITY.KEYID = 7
58,503,035 UART: [art] PUB.X = 3E2CE8CCDDEA657676EF8EF659DD07BC80E5075325EFB77BA94437EB5FE83E3D38EE69B1A9086E0ED880576AB3FEA66A
58,510,296 UART: [art] PUB.Y = 5BBF5CD0EF1944EA0B6774AECA119A266157035EB95DFF266D4166C5ED50AA8EBCCACDAF115A14B3F89E7ECC9FDE36C3
58,517,578 UART: [art] SIG.R = A3246FEEF976F3E95029B815095A42F84669C3AD461F5737603A49EF3E7546F8F8ED383C17EBA320A3F81B50A0D7D56F
58,524,907 UART: [art] SIG.S = 91E7EF56B0B919DBDEEF1AA69AD57C0AE74FE9DE58EDEEF3B4FE97558E0DDD88D7F938BBC884E668B0B613FB9A274472
59,830,722 UART: Caliptra RT
59,831,432 UART: [state] CFI Enabled
60,114,643 UART: [rt] RT listening for mailbox commands...
60,146,384 UART: [rt]cmd =0x41545348, len=116
60,164,702 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,120,763 ready_for_fw is high
4,121,164 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,773 >>> mbox cmd response: success
23,706,218 UART:
23,706,616 UART: Running Caliptra FMC ...
23,707,816 UART:
23,708,000 UART: [state] CFI Enabled
23,715,954 UART: [fht] FMC Alias Private Key: 7
26,047,220 UART: [art] Extend RT PCRs Done
26,048,439 UART: [art] Lock RT PCRs Done
26,050,257 UART: [art] Populate DV Done
26,055,684 UART: [fht] FMC Alias Private Key: 7
26,057,121 UART: [art] Derive CDI
26,057,859 UART: [art] Store in in slot 0x4
26,100,580 UART: [art] Derive Key Pair
26,101,614 UART: [art] Store priv key in slot 0x5
29,343,547 UART: [art] Derive Key Pair - Done
29,356,485 UART: [art] Signing Cert with AUTHO
29,357,785 UART: RITY.KEYID = 7
31,637,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,940 UART: [art] PUB.X = 84665941026BABBA433686B36DE8347DEFB395668208A126700C9BA0B8DC979BA160126071F757400054906D1CA6DD00
31,645,822 UART: [art] PUB.Y = F3015990848B9BD9D47771E9C741A5180E0D20F6519A0294944E268015A2ECF386E5C11AB1843D0599AD3422F37F0779
31,653,061 UART: [art] SIG.R = E8CE6DF73A2BA16060AEA74E944F7045DC3375CBDD026611E1D9DF3567B7A50A4E45B47D4506A5356E642B4A0616ED93
31,660,450 UART: [art] SIG.S = 9AE8F896F907B3490985201A5FBDED3BF82B068301193B2A7D09B9D5114990967AE36D9EA0AD54AEA3CE467247D29128
32,964,864 UART: Caliptra RT
32,965,587 UART: [state] CFI Enabled
33,083,481 UART: [rt] RT listening for mailbox commands...
37,110,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,266,048 UART: [rt]cmd =0x41544d4e, len=14344
42,501,772 >>> mbox cmd response data (8 bytes)
42,502,385 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,533,232 UART: [rt]cmd =0x41545348, len=116
42,553,324 >>> mbox cmd response data (12 bytes)
44,606,689 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,257,322 >>> mbox cmd response: success
53,262,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,292,277 UART:
53,292,600 UART: Running Caliptra FMC ...
53,293,670 UART:
53,293,824 UART: [state] CFI Enabled
53,337,094 UART: [art] Extend RT PCRs Done
53,338,249 UART: [art] Lock RT PCRs Done
53,339,694 UART: [art] Populate DV Done
53,345,152 UART: [fht] FMC Alias Private Key: 7
53,346,785 UART: [art] Derive CDI
53,347,611 UART: [art] Store in in slot 0x4
53,390,293 UART: [art] Derive Key Pair
53,391,342 UART: [art] Store priv key in slot 0x5
56,633,837 UART: [art] Derive Key Pair - Done
56,646,462 UART: [art] Signing Cert with AUTHO
56,647,763 UART: RITY.KEYID = 7
58,927,359 UART: [art] Erasing AUTHORITY.KEYID = 7
58,928,866 UART: [art] PUB.X = 4116FF04B6D21B78087C78B5E12C4719F13281916138BE1CBAF593AD62E58E6782DBC489482FDCE2974A8ABB3A3D5611
58,936,120 UART: [art] PUB.Y = A48588F785EB2D0B49B05FE24F50ED1285B9B53BC704F4CFBF89257359289C478227CC429570E3DB9EB10C9B6244680A
58,943,353 UART: [art] SIG.R = D3480A559C52DF266916A80B8558AD63B89F62FDBE36253468624DCBAE4B27BE10FFEC9FB26D5B20B0DF8A73528D8795
58,950,742 UART: [art] SIG.S = 0267484D4F198F5181BC7851C617ED03658A5E833A4D8BE8B9C86C379CB8E1655BF21889CD737575339F7BDA3202A21B
60,255,959 UART: Caliptra RT
60,256,673 UART: [state] CFI Enabled
60,540,919 UART: [rt] RT listening for mailbox commands...
60,572,924 UART: [rt]cmd =0x41545348, len=116
60,592,639 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,997 UART:
192,362 UART: Running Caliptra ROM ...
193,565 UART:
193,728 UART: [state] CFI Enabled
268,428 UART: [state] LifecycleState = Unprovisioned
270,345 UART: [state] DebugLocked = No
271,775 UART: [state] WD Timer not started. Device not locked for debugging
276,234 UART: [kat] SHA2-256
455,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,947 UART: [kat] ++
467,490 UART: [kat] sha1
478,515 UART: [kat] SHA2-256
481,516 UART: [kat] SHA2-384
486,748 UART: [kat] SHA2-512-ACC
489,722 UART: [kat] ECC-384
2,948,968 UART: [kat] HMAC-384Kdf
2,971,939 UART: [kat] LMS
3,501,368 UART: [kat] --
3,505,449 UART: [cold-reset] ++
3,506,597 UART: [fht] FHT @ 0x50003400
3,517,285 UART: [idev] ++
3,517,840 UART: [idev] CDI.KEYID = 6
3,518,743 UART: [idev] SUBJECT.KEYID = 7
3,519,984 UART: [idev] UDS.KEYID = 0
3,520,883 ready_for_fw is high
3,521,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,007 UART: [idev] Erasing UDS.KEYID = 0
6,031,678 UART: [idev] Sha1 KeyId Algorithm
6,055,125 UART: [idev] --
6,059,335 UART: [ldev] ++
6,059,903 UART: [ldev] CDI.KEYID = 6
6,060,790 UART: [ldev] SUBJECT.KEYID = 5
6,062,003 UART: [ldev] AUTHORITY.KEYID = 7
6,063,190 UART: [ldev] FE.KEYID = 1
6,102,262 UART: [ldev] Erasing FE.KEYID = 1
8,606,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,560 UART: [ldev] --
10,415,868 UART: [fwproc] Wait for Commands...
10,418,772 UART: [fwproc] Recv command 0x46574c44
10,420,803 UART: [fwproc] Recv'd Img size: 114448 bytes
13,833,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,294,293 >>> mbox cmd response: success
14,298,701 UART: [afmc] ++
14,299,317 UART: [afmc] CDI.KEYID = 6
14,300,231 UART: [afmc] SUBJECT.KEYID = 7
14,301,391 UART: [afmc] AUTHORITY.KEYID = 5
16,826,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,801 UART: [afmc] --
18,628,306 UART: [cold-reset] --
18,632,982 UART: [state] Locking Datavault
18,639,952 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,648 UART: [state] Locking ICCM
18,642,982 UART: [exit] Launching FMC @ 0x40000130
18,651,439 UART:
18,651,717 UART: Running Caliptra FMC ...
18,652,823 UART:
18,652,981 UART: [state] CFI Enabled
18,712,092 UART: [fht] FMC Alias Private Key: 7
20,476,806 UART: [art] Extend RT PCRs Done
20,478,031 UART: [art] Lock RT PCRs Done
20,479,548 UART: [art] Populate DV Done
20,484,956 UART: [fht] FMC Alias Private Key: 7
20,486,488 UART: [art] Derive CDI
20,487,235 UART: [art] Store in in slot 0x4
20,544,810 UART: [art] Derive Key Pair
20,545,803 UART: [art] Store priv key in slot 0x5
23,008,804 UART: [art] Derive Key Pair - Done
23,021,533 UART: [art] Signing Cert with AUTHO
23,022,832 UART: RITY.KEYID = 7
24,735,183 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,680 UART: [art] PUB.X = 94D8F693B4047EDA052CBEE9F2BEA0E06175E182EF62317DC78449B93F6EB4A35D56DB0E11A0EC2F723178E8C756A748
24,743,976 UART: [art] PUB.Y = B714A5453A57B750350DA59B1EC259986EE331400520691A2E1EA94DB6F713B21DAFB758B3C95652851B2695E29C8A6E
24,751,198 UART: [art] SIG.R = 4CB94AC02F9ECEE74DA6FC7EABF04C47F33B43A116C1C6D608119A4D5F237AA3582027EFAC9C02977B628288E7F86712
24,758,581 UART: [art] SIG.S = 6F701A09732CB4FEC0A00B7D99E5C25BFA67B420DBE558AC944E2FF5D1F2E49A1BF3C160F8E8E392CFD9C756AA9298F4
25,737,564 UART: Caliptra RT
25,738,277 UART: [state] CFI Enabled
25,903,137 UART: [rt] RT listening for mailbox commands...
29,934,453 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,090,613 UART: [rt]cmd =0x41544d4e, len=14344
34,021,364 >>> mbox cmd response data (8 bytes)
34,021,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,052,680 UART: [rt]cmd =0x41545348, len=116
34,071,847 >>> mbox cmd response data (12 bytes)
36,133,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,278,814 UART:
36,279,190 UART: Running Caliptra ROM ...
36,280,331 UART:
36,280,525 UART: [state] CFI Enabled
36,337,593 UART: [state] LifecycleState = Unprovisioned
36,339,474 UART: [state] DebugLocked = No
36,342,048 UART: [state] WD Timer not started. Device not locked for debugging
36,346,111 UART: [kat] SHA2-256
36,525,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,536,805 UART: [kat] ++
36,537,345 UART: [kat] sha1
36,547,647 UART: [kat] SHA2-256
36,550,654 UART: [kat] SHA2-384
36,556,255 UART: [kat] SHA2-512-ACC
36,559,191 UART: [kat] ECC-384
39,024,027 UART: [kat] HMAC-384Kdf
39,046,307 UART: [kat] LMS
39,575,748 UART: [kat] --
39,579,573 UART: [update-reset] ++
43,004,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,008,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
43,391,850 >>> mbox cmd response: success
43,392,300 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,393,663 UART: [update-reset] Copying MAN_2 To MAN_1
43,415,994 UART: [update-reset Success] --
43,420,501 UART: [state] Locking Datavault
43,423,807 UART: [state] Locking PCR0, PCR1 and PCR31
43,425,505 UART: [state] Locking ICCM
43,428,093 UART: [exit] Launching FMC @ 0x40000130
43,436,551 UART:
43,436,781 UART: Running Caliptra FMC ...
43,437,880 UART:
43,438,037 UART: [state] CFI Enabled
43,537,815 UART: [art] Extend RT PCRs Done
43,539,008 UART: [art] Lock RT PCRs Done
43,540,108 UART: [art] Populate DV Done
43,545,733 UART: [fht] FMC Alias Private Key: 7
43,547,221 UART: [art] Derive CDI
43,548,033 UART: [art] Store in in slot 0x4
43,606,999 UART: [art] Derive Key Pair
43,608,148 UART: [art] Store priv key in slot 0x5
46,070,592 UART: [art] Derive Key Pair - Done
46,083,703 UART: [art] Signing Cert with AUTHO
46,085,008 UART: RITY.KEYID = 7
47,796,725 UART: [art] Erasing AUTHORITY.KEYID = 7
47,798,226 UART: [art] PUB.X = C2C7C029CA83DE6B131C3E324E6EB3F07E8A13D34B7088D1C0630666A25DB1D214F706BF5DF663353F129DBFA7D2435D
47,805,475 UART: [art] PUB.Y = 95B5D3F430380E7A3254DC98F57F8EC4F4794360130EB9D0FFC01820844F35A4BF198B7EDCB27D4DD627DD250158424F
47,812,758 UART: [art] SIG.R = B897FC24C6CF2BDE6170C89BB4B4DC05533085CCC25B91AE713356655860EFE40814AE11ACEEAA60A11DD900046EE078
47,820,090 UART: [art] SIG.S = F7E52D5B5F1EAED571D40D3B9699673015728B07CCE59AE55EBA3D436666F6A98067ED4E2EE785ACAB43898574A6E00E
48,798,871 UART: Caliptra RT
48,799,558 UART: [state] CFI Enabled
49,135,122 UART: [rt] RT listening for mailbox commands...
49,167,076 UART: [rt]cmd =0x41545348, len=116
49,187,355 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,383,090 ready_for_fw is high
3,383,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,286 >>> mbox cmd response: success
18,347,063 UART:
18,347,496 UART: Running Caliptra FMC ...
18,348,701 UART:
18,348,872 UART: [state] CFI Enabled
18,411,514 UART: [fht] FMC Alias Private Key: 7
20,175,334 UART: [art] Extend RT PCRs Done
20,176,560 UART: [art] Lock RT PCRs Done
20,177,977 UART: [art] Populate DV Done
20,183,409 UART: [fht] FMC Alias Private Key: 7
20,185,060 UART: [art] Derive CDI
20,185,879 UART: [art] Store in in slot 0x4
20,244,052 UART: [art] Derive Key Pair
20,245,057 UART: [art] Store priv key in slot 0x5
22,708,250 UART: [art] Derive Key Pair - Done
22,721,091 UART: [art] Signing Cert with AUTHO
22,722,398 UART: RITY.KEYID = 7
24,434,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,594 UART: [art] PUB.X = A0CCE097518AAB90CECACE77867C3B36F66BB14A525B39904BDCBD8786D36CE2BA6F7FD488C15A47BDD5D68FC5CC3845
24,442,858 UART: [art] PUB.Y = 6FBF49AA77ECF9FCBF48C29E600FE3E4BA75232A920F37F0B14A166FEE13FA82746FD65B37BF289A1FDADCEE35475D69
24,450,142 UART: [art] SIG.R = E2F910A0C347579C7F6388A18385451D638F77B66A7A6AD38CC2B3007F29C5670FA155F0DAEEA7FDCA616C74364EBCE7
24,457,547 UART: [art] SIG.S = 8C9D152A48348F86325A49FC67828DFFDE47F83C7B5A2D91E4203B968CDDB44CFBB43D760CB9CB7CCDBE4CCAA03F300A
25,436,056 UART: Caliptra RT
25,436,760 UART: [state] CFI Enabled
25,602,418 UART: [rt] RT listening for mailbox commands...
29,643,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,799,930 UART: [rt]cmd =0x41544d4e, len=14344
33,730,317 >>> mbox cmd response data (8 bytes)
33,730,906 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,761,661 UART: [rt]cmd =0x41545348, len=116
33,781,987 >>> mbox cmd response data (12 bytes)
35,836,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
42,962,311 >>> mbox cmd response: success
42,962,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,996,250 UART:
42,996,570 UART: Running Caliptra FMC ...
42,997,611 UART:
42,997,783 UART: [state] CFI Enabled
43,086,378 UART: [art] Extend RT PCRs Done
43,087,581 UART: [art] Lock RT PCRs Done
43,088,957 UART: [art] Populate DV Done
43,094,212 UART: [fht] FMC Alias Private Key: 7
43,095,762 UART: [art] Derive CDI
43,096,502 UART: [art] Store in in slot 0x4
43,155,791 UART: [art] Derive Key Pair
43,156,835 UART: [art] Store priv key in slot 0x5
45,619,076 UART: [art] Derive Key Pair - Done
45,631,702 UART: [art] Signing Cert with AUTHO
45,633,007 UART: RITY.KEYID = 7
47,345,217 UART: [art] Erasing AUTHORITY.KEYID = 7
47,346,728 UART: [art] PUB.X = 0E248FB1141CA7A4A1C1C94A7ACF90E52784B4398A5AA1AA27E68105E43B6FDD7CBE10CF104BB42751A1F29F5B10D89C
47,353,986 UART: [art] PUB.Y = 204EBB92E11E7EF656A5E9E602D87C0E2AB7D0D8FA5D9DB467E85E5235DEED8CE07E81BC886D95A5319E2C179C007CC2
47,361,283 UART: [art] SIG.R = C184CC17D26CCD3C051554B10752EFC21767C3791563D8EF9A438C054F92B4088B3F144B5922B676039BE6AD06ADE57F
47,368,644 UART: [art] SIG.S = DAB8FD608E0343C27D9D649A896C016BCA159D0DDC064B7E9C67BDFF9A426DDB59A543EFE1CB6C1C21278A48F9C30DE3
48,347,906 UART: Caliptra RT
48,348,611 UART: [state] CFI Enabled
48,683,043 UART: [rt] RT listening for mailbox commands...
48,715,024 UART: [rt]cmd =0x41545348, len=116
48,734,025 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,349 UART:
192,724 UART: Running Caliptra ROM ...
193,932 UART:
603,277 UART: [state] CFI Enabled
620,082 UART: [state] LifecycleState = Unprovisioned
621,967 UART: [state] DebugLocked = No
624,135 UART: [state] WD Timer not started. Device not locked for debugging
627,454 UART: [kat] SHA2-256
806,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,155 UART: [kat] ++
818,682 UART: [kat] sha1
829,365 UART: [kat] SHA2-256
832,336 UART: [kat] SHA2-384
838,398 UART: [kat] SHA2-512-ACC
841,333 UART: [kat] ECC-384
3,283,438 UART: [kat] HMAC-384Kdf
3,296,450 UART: [kat] LMS
3,825,947 UART: [kat] --
3,830,956 UART: [cold-reset] ++
3,833,450 UART: [fht] FHT @ 0x50003400
3,844,559 UART: [idev] ++
3,845,126 UART: [idev] CDI.KEYID = 6
3,846,150 UART: [idev] SUBJECT.KEYID = 7
3,847,245 UART: [idev] UDS.KEYID = 0
3,848,285 ready_for_fw is high
3,848,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,197 UART: [idev] Erasing UDS.KEYID = 0
6,318,436 UART: [idev] Sha1 KeyId Algorithm
6,340,641 UART: [idev] --
6,344,577 UART: [ldev] ++
6,345,139 UART: [ldev] CDI.KEYID = 6
6,346,147 UART: [ldev] SUBJECT.KEYID = 5
6,347,458 UART: [ldev] AUTHORITY.KEYID = 7
6,348,641 UART: [ldev] FE.KEYID = 1
6,357,630 UART: [ldev] Erasing FE.KEYID = 1
8,834,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,358 UART: [ldev] --
10,626,559 UART: [fwproc] Wait for Commands...
10,629,619 UART: [fwproc] Recv command 0x46574c44
10,631,710 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,139 >>> mbox cmd response: success
14,496,103 UART: [afmc] ++
14,496,717 UART: [afmc] CDI.KEYID = 6
14,497,645 UART: [afmc] SUBJECT.KEYID = 7
14,498,805 UART: [afmc] AUTHORITY.KEYID = 5
16,992,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,367 UART: [afmc] --
18,788,278 UART: [cold-reset] --
18,791,708 UART: [state] Locking Datavault
18,796,679 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,317 UART: [state] Locking ICCM
18,800,189 UART: [exit] Launching FMC @ 0x40000130
18,808,577 UART:
18,808,804 UART: Running Caliptra FMC ...
18,809,922 UART:
18,810,077 UART: [state] CFI Enabled
18,817,853 UART: [fht] FMC Alias Private Key: 7
20,574,462 UART: [art] Extend RT PCRs Done
20,575,684 UART: [art] Lock RT PCRs Done
20,577,193 UART: [art] Populate DV Done
20,582,436 UART: [fht] FMC Alias Private Key: 7
20,583,910 UART: [art] Derive CDI
20,584,637 UART: [art] Store in in slot 0x4
20,627,489 UART: [art] Derive Key Pair
20,628,523 UART: [art] Store priv key in slot 0x5
23,054,975 UART: [art] Derive Key Pair - Done
23,067,960 UART: [art] Signing Cert with AUTHO
23,069,334 UART: RITY.KEYID = 7
24,774,992 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,491 UART: [art] PUB.X = ED96BBB4C7DB6AFDEF389600A83CFC625946D4A62542F6032AC91A2FDE614ACF04F13CCBE792E6B36FB146CB9586F89A
24,783,796 UART: [art] PUB.Y = 3B2B58524E3E8BDE6A36D2FAE730C0C01D9E329A467A77A1A5F564C0739BCD580130B88EC5D139E13EBE1887CA578186
24,791,017 UART: [art] SIG.R = 28A7D3DCF1216CE436305CB185AE0128EDF5711885E2BA488C7BAA5AC722DB6B4F67773A0B0AF740FDAE922F7A9EA2E5
24,798,451 UART: [art] SIG.S = 8EEBF9FA2A1E0F931A019BA527BE2B3C320D83BC320891E03D91015652CC9A619A53A4680BC010F9D66478B950827704
25,778,068 UART: Caliptra RT
25,778,781 UART: [state] CFI Enabled
25,896,128 UART: [rt] RT listening for mailbox commands...
29,922,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,077,626 UART: [rt]cmd =0x41544d4e, len=14344
34,008,053 >>> mbox cmd response data (8 bytes)
34,008,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,039,286 UART: [rt]cmd =0x41545348, len=116
34,059,569 >>> mbox cmd response data (12 bytes)
36,112,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,257,989 UART:
36,258,366 UART: Running Caliptra ROM ...
36,259,453 UART:
36,259,611 UART: [state] CFI Enabled
36,272,539 UART: [state] LifecycleState = Unprovisioned
36,274,418 UART: [state] DebugLocked = No
36,277,372 UART: [state] WD Timer not started. Device not locked for debugging
36,281,063 UART: [kat] SHA2-256
36,460,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,471,823 UART: [kat] ++
36,472,277 UART: [kat] sha1
36,482,557 UART: [kat] SHA2-256
36,485,558 UART: [kat] SHA2-384
36,490,299 UART: [kat] SHA2-512-ACC
36,493,241 UART: [kat] ECC-384
38,938,396 UART: [kat] HMAC-384Kdf
38,950,788 UART: [kat] LMS
39,480,290 UART: [kat] --
39,483,519 UART: [update-reset] ++
42,912,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,915,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
43,298,590 >>> mbox cmd response: success
43,299,023 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,299,732 UART: [update-reset] Copying MAN_2 To MAN_1
43,322,023 UART: [update-reset Success] --
43,326,782 UART: [state] Locking Datavault
43,329,451 UART: [state] Locking PCR0, PCR1 and PCR31
43,331,145 UART: [state] Locking ICCM
43,333,641 UART: [exit] Launching FMC @ 0x40000130
43,342,080 UART:
43,342,314 UART: Running Caliptra FMC ...
43,343,426 UART:
43,343,578 UART: [state] CFI Enabled
43,387,151 UART: [art] Extend RT PCRs Done
43,388,324 UART: [art] Lock RT PCRs Done
43,389,580 UART: [art] Populate DV Done
43,395,245 UART: [fht] FMC Alias Private Key: 7
43,396,771 UART: [art] Derive CDI
43,397,575 UART: [art] Store in in slot 0x4
43,440,157 UART: [art] Derive Key Pair
43,441,266 UART: [art] Store priv key in slot 0x5
45,868,286 UART: [art] Derive Key Pair - Done
45,881,621 UART: [art] Signing Cert with AUTHO
45,882,921 UART: RITY.KEYID = 7
47,588,546 UART: [art] Erasing AUTHORITY.KEYID = 7
47,590,051 UART: [art] PUB.X = 1931CAC0703867A1C0602A087AED59AD370744C17D2BFCB3CEA1D089DB19891FD9A55BBF42B70A315C09F162A6B22539
47,597,349 UART: [art] PUB.Y = F0D276E44B0075EA22B32E0AD2F4D4C90F46742A9BC88002DC9840329E78927AF9D60E88C37F3C098B36FA8F168F5142
47,604,600 UART: [art] SIG.R = 102F512909CCCEA2F2212396714E3A1E393847740A625A77F67201EB3D45F80B9C695B452D299454A3E3F35D6A36083A
47,611,930 UART: [art] SIG.S = 8082550E78C69504DD14939CE5281BEB4C83383D650BFD931CA4CECA847530BCA1BC3335148E6906D11C9B179021C3F0
48,591,180 UART: Caliptra RT
48,591,892 UART: [state] CFI Enabled
48,881,836 UART: [rt] RT listening for mailbox commands...
48,913,841 UART: [rt]cmd =0x41545348, len=116
48,933,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,763 writing to cptra_bootfsm_go
3,703,578 ready_for_fw is high
3,703,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,953 >>> mbox cmd response: success
18,530,270 UART:
18,530,704 UART: Running Caliptra FMC ...
18,532,030 UART:
18,532,195 UART: [state] CFI Enabled
18,539,818 UART: [fht] FMC Alias Private Key: 7
20,296,458 UART: [art] Extend RT PCRs Done
20,297,689 UART: [art] Lock RT PCRs Done
20,299,261 UART: [art] Populate DV Done
20,305,044 UART: [fht] FMC Alias Private Key: 7
20,306,639 UART: [art] Derive CDI
20,307,367 UART: [art] Store in in slot 0x4
20,350,073 UART: [art] Derive Key Pair
20,351,121 UART: [art] Store priv key in slot 0x5
22,778,031 UART: [art] Derive Key Pair - Done
22,790,934 UART: [art] Signing Cert with AUTHO
22,792,238 UART: RITY.KEYID = 7
24,497,639 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,153 UART: [art] PUB.X = B645BA50A4F1ABACC283AA8DA9BB65144DD9D7BF97B74A4649C10B91A25275F1A7D8510EE3BEE1A0240BE8970863CA89
24,506,431 UART: [art] PUB.Y = D41B8CEB1D35D97777CB80AF37BA0CAAAAD1860A58AB418A170E9C65744CADE27882B2D88FDFEBE5CC475A9E14E0B81A
24,513,725 UART: [art] SIG.R = 3A96FE7D0C7A42A8E97A553B21EA7E047AF9AC55E9B1495F71F7D2A5689C9439B3276F8BBC4B2CE53A1F9C2BB61132FC
24,521,142 UART: [art] SIG.S = 4D9CB7DCA5D30D416CD0089BB9778676AA6073FCD801A6048D8996F2F2482623C39B780F3C22D1F42647A0872C4AEE12
25,500,066 UART: Caliptra RT
25,500,775 UART: [state] CFI Enabled
25,618,210 UART: [rt] RT listening for mailbox commands...
29,642,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,798,362 UART: [rt]cmd =0x41544d4e, len=14344
33,728,728 >>> mbox cmd response data (8 bytes)
33,729,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,760,053 UART: [rt]cmd =0x41545348, len=116
33,778,666 >>> mbox cmd response data (12 bytes)
35,832,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
42,877,763 >>> mbox cmd response: success
42,878,342 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,911,045 UART:
42,911,373 UART: Running Caliptra FMC ...
42,912,493 UART:
42,912,651 UART: [state] CFI Enabled
42,956,976 UART: [art] Extend RT PCRs Done
42,958,121 UART: [art] Lock RT PCRs Done
42,959,726 UART: [art] Populate DV Done
42,965,145 UART: [fht] FMC Alias Private Key: 7
42,966,745 UART: [art] Derive CDI
42,967,515 UART: [art] Store in in slot 0x4
43,009,884 UART: [art] Derive Key Pair
43,010,887 UART: [art] Store priv key in slot 0x5
45,437,892 UART: [art] Derive Key Pair - Done
45,450,454 UART: [art] Signing Cert with AUTHO
45,451,796 UART: RITY.KEYID = 7
47,157,285 UART: [art] Erasing AUTHORITY.KEYID = 7
47,158,793 UART: [art] PUB.X = 4A37011DB95D3EA57AC585FF987C31E4E00C4BEF25C29650E391AFD49E2BC12310E9BFB0DBE77BCC35BA60542C2AC560
47,166,090 UART: [art] PUB.Y = 1ECC727A5D41BE326AEBA31E15CC87D339004B310448F12213D6935193AD2556CD2D385A000E960C0B337353790C7A7B
47,173,262 UART: [art] SIG.R = 6BF142443564DD301FA49B586CB55D51B936339F3132D46DDEC17A67634C247CA233068D76481D8819AD156BE6F42350
47,180,646 UART: [art] SIG.S = 9FC12B70C73AB57DB12F231521561ED44D6566CDE6A34CC803DD35073ABC69C6DDCAF4C6CC4CFAB940D1985D1F968004
48,159,238 UART: Caliptra RT
48,159,939 UART: [state] CFI Enabled
48,447,455 UART: [rt] RT listening for mailbox commands...
48,479,377 UART: [rt]cmd =0x41545348, len=116
48,498,839 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,958 UART:
192,357 UART: Running Caliptra ROM ...
193,521 UART:
193,668 UART: [state] CFI Enabled
263,754 UART: [state] LifecycleState = Unprovisioned
266,095 UART: [state] DebugLocked = No
268,770 UART: [state] WD Timer not started. Device not locked for debugging
273,734 UART: [kat] SHA2-256
463,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,388 UART: [kat] ++
474,866 UART: [kat] sha1
486,665 UART: [kat] SHA2-256
489,675 UART: [kat] SHA2-384
495,451 UART: [kat] SHA2-512-ACC
498,027 UART: [kat] ECC-384
2,948,181 UART: [kat] HMAC-384Kdf
2,972,599 UART: [kat] LMS
3,504,364 UART: [kat] --
3,510,058 UART: [cold-reset] ++
3,511,703 UART: [fht] FHT @ 0x50003400
3,521,968 UART: [idev] ++
3,522,677 UART: [idev] CDI.KEYID = 6
3,523,559 UART: [idev] SUBJECT.KEYID = 7
3,524,799 UART: [idev] UDS.KEYID = 0
3,525,733 ready_for_fw is high
3,525,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,951 UART: [idev] Erasing UDS.KEYID = 0
6,028,910 UART: [idev] Sha1 KeyId Algorithm
6,051,643 UART: [idev] --
6,056,473 UART: [ldev] ++
6,057,167 UART: [ldev] CDI.KEYID = 6
6,058,055 UART: [ldev] SUBJECT.KEYID = 5
6,059,160 UART: [ldev] AUTHORITY.KEYID = 7
6,060,472 UART: [ldev] FE.KEYID = 1
6,099,944 UART: [ldev] Erasing FE.KEYID = 1
8,605,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,655 UART: [ldev] --
10,415,267 UART: [fwproc] Wait for Commands...
10,417,082 UART: [fwproc] Recv command 0x46574c44
10,419,397 UART: [fwproc] Recv'd Img size: 114448 bytes
13,876,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,613,881 >>> mbox cmd response: success
14,618,480 UART: [afmc] ++
14,619,230 UART: [afmc] CDI.KEYID = 6
14,620,426 UART: [afmc] SUBJECT.KEYID = 7
14,621,866 UART: [afmc] AUTHORITY.KEYID = 5
17,152,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,942 UART: [afmc] --
18,966,830 UART: [cold-reset] --
18,970,261 UART: [state] Locking Datavault
18,975,352 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,498 UART: [state] Locking ICCM
18,979,920 UART: [exit] Launching FMC @ 0x40000130
18,988,597 UART:
18,988,849 UART: Running Caliptra FMC ...
18,989,953 UART:
18,990,110 UART: [state] CFI Enabled
19,051,281 UART: [fht] FMC Alias Private Key: 7
20,815,485 UART: [art] Extend RT PCRs Done
20,816,694 UART: [art] Lock RT PCRs Done
20,818,643 UART: [art] Populate DV Done
20,823,886 UART: [fht] FMC Alias Private Key: 7
20,825,587 UART: [art] Derive CDI
20,826,397 UART: [art] Store in in slot 0x4
20,883,389 UART: [art] Derive Key Pair
20,884,449 UART: [art] Store priv key in slot 0x5
23,347,641 UART: [art] Derive Key Pair - Done
23,360,788 UART: [art] Signing Cert with AUTHO
23,362,087 UART: RITY.KEYID = 7
25,073,066 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,588 UART: [art] PUB.X = 86193A2C7C40D9443E9FED5E947CF362FF852D950962232F943637093D5AF4C7919303CA431FDC54EF5012EE48F6047F
25,081,839 UART: [art] PUB.Y = 55511984EB4C1A45EDE07C210C2AD7BBE17650D6420364F6C34E728D907FD6B593D1CF436BE43E21CDA993D4D66BA326
25,089,106 UART: [art] SIG.R = 26E9ED0E1191C1993690E9B7D3EC8BB879C0513BD01279CB2FE36A92E29D7F65C9E43A64420AE167277AA851CC53BA40
25,096,510 UART: [art] SIG.S = AF89CE5518A27C7514F97690397D5E17CDA8FED78A5C657D384F089562E8CDB6C881C4938E9C5B670220DAAEDD4EE1B0
26,075,321 UART: Caliptra RT
26,076,012 UART: [state] CFI Enabled
26,240,321 UART: [rt] RT listening for mailbox commands...
30,294,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,450,952 UART: [rt]cmd =0x41544d4e, len=14344
34,381,055 >>> mbox cmd response data (8 bytes)
34,381,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,412,340 UART: [rt]cmd =0x41545348, len=116
34,432,208 >>> mbox cmd response data (12 bytes)
36,499,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,645,205 UART:
36,645,593 UART: Running Caliptra ROM ...
36,646,641 UART:
36,646,795 UART: [state] CFI Enabled
36,716,733 UART: [state] LifecycleState = Unprovisioned
36,718,782 UART: [state] DebugLocked = No
36,720,795 UART: [state] WD Timer not started. Device not locked for debugging
36,725,522 UART: [kat] SHA2-256
36,915,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,926,187 UART: [kat] ++
36,926,681 UART: [kat] sha1
36,938,434 UART: [kat] SHA2-256
36,941,401 UART: [kat] SHA2-384
36,947,304 UART: [kat] SHA2-512-ACC
36,949,882 UART: [kat] ECC-384
39,397,971 UART: [kat] HMAC-384Kdf
39,422,942 UART: [kat] LMS
39,954,547 UART: [kat] --
39,958,665 UART: [update-reset] ++
43,417,502 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,421,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,029,841 >>> mbox cmd response: success
44,034,477 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,035,080 UART: [update-reset] Copying MAN_2 To MAN_1
44,068,836 UART: [update-reset Success] --
44,072,487 UART: [state] Locking Datavault
44,075,761 UART: [state] Locking PCR0, PCR1 and PCR31
44,077,908 UART: [state] Locking ICCM
44,080,315 UART: [exit] Launching FMC @ 0x40000130
44,088,994 UART:
44,089,230 UART: Running Caliptra FMC ...
44,090,261 UART:
44,090,411 UART: [state] CFI Enabled
44,189,827 UART: [art] Extend RT PCRs Done
44,191,019 UART: [art] Lock RT PCRs Done
44,192,393 UART: [art] Populate DV Done
44,197,802 UART: [fht] FMC Alias Private Key: 7
44,199,389 UART: [art] Derive CDI
44,200,134 UART: [art] Store in in slot 0x4
44,259,232 UART: [art] Derive Key Pair
44,260,405 UART: [art] Store priv key in slot 0x5
46,723,306 UART: [art] Derive Key Pair - Done
46,736,106 UART: [art] Signing Cert with AUTHO
46,737,416 UART: RITY.KEYID = 7
48,448,630 UART: [art] Erasing AUTHORITY.KEYID = 7
48,450,147 UART: [art] PUB.X = 678FF7B8A25557A592BF53972A3E24E5587E067D4AFBF6600E273DF15A71E3844DFA7AC506C8D9DE2857A987447C0880
48,457,394 UART: [art] PUB.Y = DF25AE7E7630950968FF32BBEAF20B7EE28EB64253DBDF112ADA13038384EE1F09BC0B39BC022E1FE6F3EFDB66374672
48,464,683 UART: [art] SIG.R = E6F6D9DFFEEDEE96EDD046E0B96F53C7CE5CA7ABE9421EB2FA0339A144A0E4AE87C11D9137DF7AAD816A3F74B9C5CD2C
48,472,120 UART: [art] SIG.S = 25718C04F4850CA6947B619C2D69B378C78A5CA4D9567C7E7453212C786741C06ED95829CCBA5FEAF5CAD94217F66AEA
49,451,377 UART: Caliptra RT
49,452,069 UART: [state] CFI Enabled
49,788,952 UART: [rt] RT listening for mailbox commands...
49,820,914 UART: [rt]cmd =0x41545348, len=116
49,840,255 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
3,440,763 ready_for_fw is high
3,441,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,730,031 >>> mbox cmd response: success
19,023,348 UART:
19,023,731 UART: Running Caliptra FMC ...
19,024,844 UART:
19,024,999 UART: [state] CFI Enabled
19,093,236 UART: [fht] FMC Alias Private Key: 7
20,857,245 UART: [art] Extend RT PCRs Done
20,858,458 UART: [art] Lock RT PCRs Done
20,860,111 UART: [art] Populate DV Done
20,865,517 UART: [fht] FMC Alias Private Key: 7
20,867,003 UART: [art] Derive CDI
20,867,741 UART: [art] Store in in slot 0x4
20,926,081 UART: [art] Derive Key Pair
20,927,123 UART: [art] Store priv key in slot 0x5
23,389,632 UART: [art] Derive Key Pair - Done
23,402,578 UART: [art] Signing Cert with AUTHO
23,403,885 UART: RITY.KEYID = 7
25,115,986 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,487 UART: [art] PUB.X = 08E20CED5B390C2D3DEBE2E9B5F546F8A7F91ED786B78B510899551DD54381454740B42DF17A2BF61024902C0E526FC6
25,124,753 UART: [art] PUB.Y = 70F26FAA85891C7CFBF901548D1358B13C445CB72EF5CFD41B5F1A1119A434D22A2501F17C398F262EF182B74608D655
25,131,970 UART: [art] SIG.R = D3ED8D4044B40CFA58EC93562F2A5CEB689447225F986F1D8D564BFF359CB3BCF33B8C3AD74B12A596E3CBDEDCECF93F
25,139,416 UART: [art] SIG.S = 7D2B4A06912262EE1F356639694B027BDCF8F3CBDC2D354544799003456347E28C93F75BE307075A9B21D2436585D732
26,118,719 UART: Caliptra RT
26,119,428 UART: [state] CFI Enabled
26,284,872 UART: [rt] RT listening for mailbox commands...
30,334,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,491,172 UART: [rt]cmd =0x41544d4e, len=14344
34,421,686 >>> mbox cmd response data (8 bytes)
34,422,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,453,006 UART: [rt]cmd =0x41545348, len=116
34,472,233 >>> mbox cmd response data (12 bytes)
36,528,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
44,345,272 >>> mbox cmd response: success
44,350,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,379,073 UART:
44,379,384 UART: Running Caliptra FMC ...
44,380,422 UART:
44,380,570 UART: [state] CFI Enabled
44,470,855 UART: [art] Extend RT PCRs Done
44,472,059 UART: [art] Lock RT PCRs Done
44,473,458 UART: [art] Populate DV Done
44,478,984 UART: [fht] FMC Alias Private Key: 7
44,480,466 UART: [art] Derive CDI
44,481,198 UART: [art] Store in in slot 0x4
44,539,878 UART: [art] Derive Key Pair
44,540,926 UART: [art] Store priv key in slot 0x5
47,003,876 UART: [art] Derive Key Pair - Done
47,016,881 UART: [art] Signing Cert with AUTHO
47,018,185 UART: RITY.KEYID = 7
48,729,284 UART: [art] Erasing AUTHORITY.KEYID = 7
48,730,789 UART: [art] PUB.X = 1AC3EDB7FFADA4C647F419F4761404757320DF1F46B4B8DBEB9E6E358F37B275D87D13A430067E73A2099593CB5C3215
48,738,087 UART: [art] PUB.Y = 585C2523D0026BCDCD3C9C3D4D27CBDF933AD721AF0FC8601554EC44278A9134D45E8C268796D80229348374B8E6F85C
48,745,326 UART: [art] SIG.R = C27DFD7D796E1A09DB4D8EEA67D4D06BE6AC425F90A5654278182D8323C5475BE76CE05C347A5C4A16C5AA3DFF954F9D
48,752,717 UART: [art] SIG.S = E2B0646A34814A94CEB288E63E96AE322F24BDE52B216114273744AFE55CF4413CCFA3A1CE5973798F14ADDC519B8C24
49,731,376 UART: Caliptra RT
49,732,086 UART: [state] CFI Enabled
50,069,214 UART: [rt] RT listening for mailbox commands...
50,101,234 UART: [rt]cmd =0x41545348, len=116
50,119,711 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,358 UART:
192,727 UART: Running Caliptra ROM ...
193,825 UART:
603,727 UART: [state] CFI Enabled
617,733 UART: [state] LifecycleState = Unprovisioned
620,102 UART: [state] DebugLocked = No
621,470 UART: [state] WD Timer not started. Device not locked for debugging
626,704 UART: [kat] SHA2-256
816,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,314 UART: [kat] ++
827,833 UART: [kat] sha1
839,578 UART: [kat] SHA2-256
842,653 UART: [kat] SHA2-384
848,919 UART: [kat] SHA2-512-ACC
851,488 UART: [kat] ECC-384
3,293,927 UART: [kat] HMAC-384Kdf
3,307,596 UART: [kat] LMS
3,839,382 UART: [kat] --
3,844,931 UART: [cold-reset] ++
3,846,362 UART: [fht] FHT @ 0x50003400
3,858,470 UART: [idev] ++
3,859,169 UART: [idev] CDI.KEYID = 6
3,860,145 UART: [idev] SUBJECT.KEYID = 7
3,861,329 UART: [idev] UDS.KEYID = 0
3,862,243 ready_for_fw is high
3,862,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,164 UART: [idev] Erasing UDS.KEYID = 0
6,340,576 UART: [idev] Sha1 KeyId Algorithm
6,362,621 UART: [idev] --
6,367,526 UART: [ldev] ++
6,368,250 UART: [ldev] CDI.KEYID = 6
6,369,122 UART: [ldev] SUBJECT.KEYID = 5
6,370,320 UART: [ldev] AUTHORITY.KEYID = 7
6,371,536 UART: [ldev] FE.KEYID = 1
6,380,983 UART: [ldev] Erasing FE.KEYID = 1
8,864,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,760 UART: [ldev] --
10,656,608 UART: [fwproc] Wait for Commands...
10,658,374 UART: [fwproc] Recv command 0x46574c44
10,660,866 UART: [fwproc] Recv'd Img size: 114448 bytes
14,111,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,852,526 >>> mbox cmd response: success
14,856,736 UART: [afmc] ++
14,857,456 UART: [afmc] CDI.KEYID = 6
14,858,615 UART: [afmc] SUBJECT.KEYID = 7
14,860,154 UART: [afmc] AUTHORITY.KEYID = 5
17,359,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,130 UART: [afmc] --
19,156,275 UART: [cold-reset] --
19,160,728 UART: [state] Locking Datavault
19,167,758 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,912 UART: [state] Locking ICCM
19,171,576 UART: [exit] Launching FMC @ 0x40000130
19,180,252 UART:
19,180,477 UART: Running Caliptra FMC ...
19,181,569 UART:
19,181,723 UART: [state] CFI Enabled
19,189,815 UART: [fht] FMC Alias Private Key: 7
20,946,544 UART: [art] Extend RT PCRs Done
20,948,087 UART: [art] Lock RT PCRs Done
20,949,523 UART: [art] Populate DV Done
20,954,954 UART: [fht] FMC Alias Private Key: 7
20,956,557 UART: [art] Derive CDI
20,957,286 UART: [art] Store in in slot 0x4
21,000,137 UART: [art] Derive Key Pair
21,001,176 UART: [art] Store priv key in slot 0x5
23,428,255 UART: [art] Derive Key Pair - Done
23,441,191 UART: [art] Signing Cert with AUTHO
23,442,483 UART: RITY.KEYID = 7
25,148,009 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,521 UART: [art] PUB.X = D48DE722E190C46FE84C5AF13B10E7AF607A7945453CF4E7CA519141845F4B5F6A6A0339599EDE2E226151D762439614
25,156,745 UART: [art] PUB.Y = DB10AED4F9EA07F58BF24996C9AAA68895680F6AEC69F4A55CCFFF494D4F9D949E5E05302EBD54F4B7F13792F27C65D5
25,164,059 UART: [art] SIG.R = 591EF4DC88B7360058C3893641F81DB8BED1FB270F3489BCDD84BC73E4F9E1B87B627248B8F12B429E2CC0FDEC409250
25,171,435 UART: [art] SIG.S = 1463A95478E69C0F11E42431E9A5F3E73AC41132D909E5CFB7E7918483EBD6E6A0F6052F0AE46B9BCD68CC933E118A73
26,150,503 UART: Caliptra RT
26,151,209 UART: [state] CFI Enabled
26,268,714 UART: [rt] RT listening for mailbox commands...
30,294,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,450,542 UART: [rt]cmd =0x41544d4e, len=14344
34,381,275 >>> mbox cmd response data (8 bytes)
34,381,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,412,715 UART: [rt]cmd =0x41545348, len=116
34,432,003 >>> mbox cmd response data (12 bytes)
36,485,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,631,338 UART:
36,631,703 UART: Running Caliptra ROM ...
36,632,834 UART:
36,632,991 UART: [state] CFI Enabled
36,644,841 UART: [state] LifecycleState = Unprovisioned
36,646,730 UART: [state] DebugLocked = No
36,648,966 UART: [state] WD Timer not started. Device not locked for debugging
36,653,629 UART: [kat] SHA2-256
36,843,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,854,209 UART: [kat] ++
36,854,796 UART: [kat] sha1
36,866,169 UART: [kat] SHA2-256
36,869,169 UART: [kat] SHA2-384
36,873,537 UART: [kat] SHA2-512-ACC
36,876,096 UART: [kat] ECC-384
39,318,300 UART: [kat] HMAC-384Kdf
39,330,690 UART: [kat] LMS
39,862,296 UART: [kat] --
39,864,345 UART: [update-reset] ++
43,322,745 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,325,372 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
43,933,606 >>> mbox cmd response: success
43,938,201 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,938,809 UART: [update-reset] Copying MAN_2 To MAN_1
43,971,873 UART: [update-reset Success] --
43,976,614 UART: [state] Locking Datavault
43,979,871 UART: [state] Locking PCR0, PCR1 and PCR31
43,982,063 UART: [state] Locking ICCM
43,983,672 UART: [exit] Launching FMC @ 0x40000130
43,992,339 UART:
43,992,569 UART: Running Caliptra FMC ...
43,993,661 UART:
43,993,830 UART: [state] CFI Enabled
44,037,824 UART: [art] Extend RT PCRs Done
44,039,007 UART: [art] Lock RT PCRs Done
44,040,306 UART: [art] Populate DV Done
44,045,652 UART: [fht] FMC Alias Private Key: 7
44,047,290 UART: [art] Derive CDI
44,048,097 UART: [art] Store in in slot 0x4
44,090,628 UART: [art] Derive Key Pair
44,091,768 UART: [art] Store priv key in slot 0x5
46,518,302 UART: [art] Derive Key Pair - Done
46,530,705 UART: [art] Signing Cert with AUTHO
46,531,999 UART: RITY.KEYID = 7
48,237,424 UART: [art] Erasing AUTHORITY.KEYID = 7
48,238,932 UART: [art] PUB.X = FAB0C14CF5FF169E625613376DA01795747881974D68DC4E317A4BE4D8039B748B90D203BA4D5720096473FF14C1CDBE
48,246,175 UART: [art] PUB.Y = 826C7F66AC341BA255954D8D8566F75ADFCA66417AF712D931D7DE4CE86845C88D494BEFDCC317F13F8BBE4CC955D718
48,253,451 UART: [art] SIG.R = 6445E509117171730F52E312A00903E11BDBC4A1F9C0784EFAD44C5B74F319EFF489CD67CABD395C47B8547AE5176314
48,260,898 UART: [art] SIG.S = 441CD59C23207D97C70369159FA966349DEE62620878446B6E32B2784E177D1A1B1E14C088E08B1949896DEAF80AFFD9
49,239,741 UART: Caliptra RT
49,240,449 UART: [state] CFI Enabled
49,532,730 UART: [rt] RT listening for mailbox commands...
49,564,623 UART: [rt]cmd =0x41545348, len=116
49,584,552 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,757,021 ready_for_fw is high
3,757,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,005 >>> mbox cmd response: success
19,223,020 UART:
19,223,421 UART: Running Caliptra FMC ...
19,224,550 UART:
19,224,701 UART: [state] CFI Enabled
19,232,421 UART: [fht] FMC Alias Private Key: 7
20,989,522 UART: [art] Extend RT PCRs Done
20,990,766 UART: [art] Lock RT PCRs Done
20,992,282 UART: [art] Populate DV Done
20,997,697 UART: [fht] FMC Alias Private Key: 7
20,999,237 UART: [art] Derive CDI
20,999,991 UART: [art] Store in in slot 0x4
21,042,583 UART: [art] Derive Key Pair
21,043,619 UART: [art] Store priv key in slot 0x5
23,470,580 UART: [art] Derive Key Pair - Done
23,483,358 UART: [art] Signing Cert with AUTHO
23,484,649 UART: RITY.KEYID = 7
25,190,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,539 UART: [art] PUB.X = FC6A55E15AFEDCEA4E61D05567F19C53AA8892D6D1D32D57A29BED000041194B3C0B1D59ED38C7A89F024A9A108EDECF
25,198,893 UART: [art] PUB.Y = 028CD6AD970CC2D8C54E6A1F41227C6B3975E0764FB98DF70E98155B4FB98B872D73ABD9551BB2EBECECB8C22B8ADF60
25,206,077 UART: [art] SIG.R = 60DFC86BDF5E270C4CA2D48B7E7A90F654CD9734475104358438A9E3A7CA760FA56C17D96EBF5828C81CDF7FEAA4D4AA
25,213,523 UART: [art] SIG.S = BCB8AD3335251F71D4C18FF8089112BC1F996F94BB5325FA7E4601B97C547607C5CBDDC1698FE090E5A606F64005B90E
26,192,502 UART: Caliptra RT
26,193,228 UART: [state] CFI Enabled
26,310,648 UART: [rt] RT listening for mailbox commands...
30,337,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,493,251 UART: [rt]cmd =0x41544d4e, len=14344
34,423,736 >>> mbox cmd response data (8 bytes)
34,424,307 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,454,988 UART: [rt]cmd =0x41545348, len=116
34,473,939 >>> mbox cmd response data (12 bytes)
36,529,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
44,261,608 >>> mbox cmd response: success
44,266,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,297,075 UART:
44,297,395 UART: Running Caliptra FMC ...
44,298,509 UART:
44,298,665 UART: [state] CFI Enabled
44,342,606 UART: [art] Extend RT PCRs Done
44,343,821 UART: [art] Lock RT PCRs Done
44,345,285 UART: [art] Populate DV Done
44,350,526 UART: [fht] FMC Alias Private Key: 7
44,352,162 UART: [art] Derive CDI
44,352,968 UART: [art] Store in in slot 0x4
44,395,713 UART: [art] Derive Key Pair
44,396,708 UART: [art] Store priv key in slot 0x5
46,823,312 UART: [art] Derive Key Pair - Done
46,836,643 UART: [art] Signing Cert with AUTHO
46,837,953 UART: RITY.KEYID = 7
48,542,828 UART: [art] Erasing AUTHORITY.KEYID = 7
48,544,343 UART: [art] PUB.X = C564A814F74F1D163E4241A79603BAAEF80E865BC8B118D1D0F25EE03E41D463F741C69C60872E142A2F74739756D33E
48,551,641 UART: [art] PUB.Y = BE465A0AA4FC021A21B92766497F310D79D7545C1E618569E263E2F091DF34DA2AA04FE7FCEE10365983ADD08778B388
48,558,852 UART: [art] SIG.R = 2D478308AF5C9D4FE2156AEA2456CC4BDC3EEE7A716B8FDE5677B52291AA7622946B6EAA6E33E38CA3ADE15578FAD83F
48,566,305 UART: [art] SIG.S = AAAED93FF779988F24B69904CE6282383C49AA41D3D33F0DAD39485425F75FE7D04ADCE9D3A2B3E7B896F5490F912241
49,545,611 UART: Caliptra RT
49,546,301 UART: [state] CFI Enabled
49,836,542 UART: [rt] RT listening for mailbox commands...
49,868,527 UART: [rt]cmd =0x41545348, len=116
49,887,837 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,204 UART: [kat] HMAC-384Kdf
906,774 UART: [kat] LMS
1,474,970 UART: [kat] --
1,475,653 UART: [cold-reset] ++
1,476,117 UART: [fht] Storing FHT @ 0x50003400
1,478,926 UART: [idev] ++
1,479,094 UART: [idev] CDI.KEYID = 6
1,479,454 UART: [idev] SUBJECT.KEYID = 7
1,479,878 UART: [idev] UDS.KEYID = 0
1,480,223 ready_for_fw is high
1,480,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,030 UART: [idev] Erasing UDS.KEYID = 0
1,504,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,274 UART: [idev] --
1,514,451 UART: [ldev] ++
1,514,619 UART: [ldev] CDI.KEYID = 6
1,514,982 UART: [ldev] SUBJECT.KEYID = 5
1,515,408 UART: [ldev] AUTHORITY.KEYID = 7
1,515,871 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,546,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,034 UART: [ldev] --
1,585,481 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 114448 bytes
2,886,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,757 >>> mbox cmd response: success
3,079,787 UART: [afmc] ++
3,079,955 UART: [afmc] CDI.KEYID = 6
3,080,317 UART: [afmc] SUBJECT.KEYID = 7
3,080,742 UART: [afmc] AUTHORITY.KEYID = 5
3,115,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,512 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,202 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,045 UART: [afmc] --
3,158,983 UART: [cold-reset] --
3,159,711 UART: [state] Locking Datavault
3,160,860 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,464 UART: [state] Locking ICCM
3,162,074 UART: [exit] Launching FMC @ 0x40000130
3,167,403 UART:
3,167,419 UART: Running Caliptra FMC ...
3,167,827 UART:
3,167,881 UART: [state] CFI Enabled
3,178,356 UART: [fht] FMC Alias Private Key: 7
3,286,111 UART: [art] Extend RT PCRs Done
3,286,539 UART: [art] Lock RT PCRs Done
3,288,011 UART: [art] Populate DV Done
3,296,490 UART: [fht] FMC Alias Private Key: 7
3,297,500 UART: [art] Derive CDI
3,297,780 UART: [art] Store in in slot 0x4
3,383,387 UART: [art] Derive Key Pair
3,383,747 UART: [art] Store priv key in slot 0x5
3,396,753 UART: [art] Derive Key Pair - Done
3,411,353 UART: [art] Signing Cert with AUTHO
3,411,833 UART: RITY.KEYID = 7
3,427,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,108 UART: [art] PUB.X = 97F7FB475B008DC9E436431F1100008E7BDA3D07F46CB14FBB9F33A81BE2B87CC7FC8D1FD578C64DC77805C71E2EC0BD
3,434,824 UART: [art] PUB.Y = 90E86B78D86BAE3C7FD56B463DEA2D4A13B97B30EEB538C59DF1388C20DA7D3A826D52F729A9BE5DB854E0574CCEE8E1
3,441,794 UART: [art] SIG.R = EF6B0A495628975831FA7B9A5F4241D1CCD3083963707485C638C23B8D5ED24C0D89374E959022E03138635FCE86522A
3,448,547 UART: [art] SIG.S = FD3E9820C7B9ED1EF33065D3BC11919987FBDF6FCBF8E9D76D7B41A95B7B61B8A0E4DA1D05A0628B4FEDB440F1F83C88
3,472,297 UART: Caliptra RT
3,472,550 UART: [state] CFI Enabled
3,579,700 UART: [rt] RT listening for mailbox commands...
3,580,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,314 UART: [rt]cmd =0x41544d4e, len=14344
3,847,863 >>> mbox cmd response data (8 bytes)
3,847,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,869 UART: [rt]cmd =0x41545348, len=116
3,899,471 >>> mbox cmd response data (12 bytes)
3,899,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,272 UART:
3,900,288 UART: Running Caliptra ROM ...
3,900,696 UART:
3,900,750 UART: [state] CFI Enabled
3,903,152 UART: [state] LifecycleState = Unprovisioned
3,903,807 UART: [state] DebugLocked = No
3,904,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,906,132 UART: [kat] SHA2-256
4,700,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,704,178 UART: [kat] ++
4,704,330 UART: [kat] sha1
4,708,488 UART: [kat] SHA2-256
4,710,426 UART: [kat] SHA2-384
4,713,187 UART: [kat] SHA2-512-ACC
4,715,087 UART: [kat] ECC-384
4,720,578 UART: [kat] HMAC-384Kdf
4,725,214 UART: [kat] LMS
5,293,410 UART: [kat] --
5,294,221 UART: [update-reset] ++
6,631,734 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,632,898 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,782,948 >>> mbox cmd response: success
6,782,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,783,099 UART: [update-reset] Copying MAN_2 To MAN_1
6,791,113 UART: [update-reset Success] --
6,792,144 UART: [state] Locking Datavault
6,792,922 UART: [state] Locking PCR0, PCR1 and PCR31
6,793,526 UART: [state] Locking ICCM
6,794,108 UART: [exit] Launching FMC @ 0x40000130
6,799,437 UART:
6,799,453 UART: Running Caliptra FMC ...
6,799,861 UART:
6,799,915 UART: [state] CFI Enabled
6,888,786 UART: [art] Extend RT PCRs Done
6,889,214 UART: [art] Lock RT PCRs Done
6,890,651 UART: [art] Populate DV Done
6,898,850 UART: [fht] FMC Alias Private Key: 7
6,900,000 UART: [art] Derive CDI
6,900,280 UART: [art] Store in in slot 0x4
6,986,055 UART: [art] Derive Key Pair
6,986,415 UART: [art] Store priv key in slot 0x5
7,000,337 UART: [art] Derive Key Pair - Done
7,015,429 UART: [art] Signing Cert with AUTHO
7,015,909 UART: RITY.KEYID = 7
7,031,235 UART: [art] Erasing AUTHORITY.KEYID = 7
7,032,000 UART: [art] PUB.X = D01F70D1219E6FB96D263706FEA57803229B07ED8D3E35AE7852C6B356115C4872F0A38108AB5D9CC2EF0E0BE3983BD0
7,038,758 UART: [art] PUB.Y = F2435E1D53692873DFF491BF2B1881F621EB1E03C43D05F00AE73B0D50D016F68D2A1C157B6D4E3BC613A84292D666C8
7,045,700 UART: [art] SIG.R = 8001FDD295CE2E398AC0B80708AFDB3BAE15E870A41E043413420558D93500BE976A725DE4A05F06EFB68BD662DE2AE5
7,052,440 UART: [art] SIG.S = 3A79BE206F1DC05A6184A4DC0B96CE99980050B2BE5D806E087542AE34E5978EA069D2682DFFFDB6CBBF3D9D9122F756
7,076,495 UART: Caliptra RT
7,076,748 UART: [state] CFI Enabled
7,357,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,388,508 UART: [rt]cmd =0x41545348, len=116
7,410,248 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 ready_for_fw is high
1,362,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,977 >>> mbox cmd response: success
2,991,763 UART:
2,991,779 UART: Running Caliptra FMC ...
2,992,187 UART:
2,992,241 UART: [state] CFI Enabled
3,003,078 UART: [fht] FMC Alias Private Key: 7
3,110,897 UART: [art] Extend RT PCRs Done
3,111,325 UART: [art] Lock RT PCRs Done
3,112,773 UART: [art] Populate DV Done
3,121,060 UART: [fht] FMC Alias Private Key: 7
3,122,072 UART: [art] Derive CDI
3,122,352 UART: [art] Store in in slot 0x4
3,208,107 UART: [art] Derive Key Pair
3,208,467 UART: [art] Store priv key in slot 0x5
3,221,891 UART: [art] Derive Key Pair - Done
3,236,669 UART: [art] Signing Cert with AUTHO
3,237,149 UART: RITY.KEYID = 7
3,252,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,078 UART: [art] PUB.X = B62B6B513F8D43A36BF99478AD4E964D2ACA9B5CBDF93AE7A3A71D4CECB21599CF6E81B8E68856A23B61383061AB8184
3,259,862 UART: [art] PUB.Y = A48A214676C4CC3BBD15BF86371716231268080EF21FDD8C6EB2D9245B55D8E76DCF7AA49E63B8D576C5BD61BB29A44B
3,266,818 UART: [art] SIG.R = 122F761BA45CA2B0D2545EB191B3B57242F352875963AF54C62666B2AB3C53D02AF0DB79BAFA257D856C9B4DEC92166F
3,273,596 UART: [art] SIG.S = 6A233D24C1BE02CBF8ED6740FDB92755730C6B6F7E77DDBE78E1B50069C5FF5D0F5299BA6AAFB0630668FA6377E6995C
3,297,407 UART: Caliptra RT
3,297,660 UART: [state] CFI Enabled
3,405,334 UART: [rt] RT listening for mailbox commands...
3,406,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,886 UART: [rt]cmd =0x41544d4e, len=14344
3,674,011 >>> mbox cmd response data (8 bytes)
3,674,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,171 UART: [rt]cmd =0x41545348, len=116
3,726,013 >>> mbox cmd response data (12 bytes)
3,726,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,490,074 >>> mbox cmd response: success
6,490,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,503,603 UART:
6,503,619 UART: Running Caliptra FMC ...
6,504,027 UART:
6,504,081 UART: [state] CFI Enabled
6,593,692 UART: [art] Extend RT PCRs Done
6,594,120 UART: [art] Lock RT PCRs Done
6,595,297 UART: [art] Populate DV Done
6,603,238 UART: [fht] FMC Alias Private Key: 7
6,604,180 UART: [art] Derive CDI
6,604,460 UART: [art] Store in in slot 0x4
6,690,037 UART: [art] Derive Key Pair
6,690,397 UART: [art] Store priv key in slot 0x5
6,703,235 UART: [art] Derive Key Pair - Done
6,717,590 UART: [art] Signing Cert with AUTHO
6,718,070 UART: RITY.KEYID = 7
6,733,218 UART: [art] Erasing AUTHORITY.KEYID = 7
6,733,983 UART: [art] PUB.X = 4EB152C651F804E96ECDD8D9FA3679138E05B9C41858E62B09EFA07AD468BC45614022641DBE1A64F7CE2A45FB15A9AC
6,740,756 UART: [art] PUB.Y = AA936AAAD01643474435638B1DCF982F1E02CCEB7DCCE5D07CEE446FCC6543CE27A356C0F2EE2845902DE56116020F23
6,747,709 UART: [art] SIG.R = D5BC8CD948E486C9D43181F99AA0ADF598EE339BCD0F632CB726DA3BDFD16C53AD34A411D816748C89AEA418BA492D51
6,754,494 UART: [art] SIG.S = 66BB24995BED81986AF0CA43123A0784826D45BECCD5E62FDD4F451829C355AC8FF0FBE4D691ADBE7C5550EA91CFC9B6
6,778,066 UART: Caliptra RT
6,778,319 UART: [state] CFI Enabled
7,061,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,092,719 UART: [rt]cmd =0x41545348, len=116
7,114,269 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,443 UART: [kat] SHA2-512-ACC
897,344 UART: [kat] ECC-384
903,177 UART: [kat] HMAC-384Kdf
907,749 UART: [kat] LMS
1,475,945 UART: [kat] --
1,476,712 UART: [cold-reset] ++
1,477,228 UART: [fht] Storing FHT @ 0x50003400
1,480,017 UART: [idev] ++
1,480,185 UART: [idev] CDI.KEYID = 6
1,480,545 UART: [idev] SUBJECT.KEYID = 7
1,480,969 UART: [idev] UDS.KEYID = 0
1,481,314 ready_for_fw is high
1,481,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,069 UART: [idev] Erasing UDS.KEYID = 0
1,506,243 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,739 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,474 UART: [ldev] Erasing FE.KEYID = 1
1,548,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,413 UART: [ldev] --
1,587,712 UART: [fwproc] Waiting for Commands...
1,588,505 UART: [fwproc] Received command 0x46574c44
1,589,296 UART: [fwproc] Received Image of size 114448 bytes
2,888,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,550 >>> mbox cmd response: success
3,081,584 UART: [afmc] ++
3,081,752 UART: [afmc] CDI.KEYID = 6
3,082,114 UART: [afmc] SUBJECT.KEYID = 7
3,082,539 UART: [afmc] AUTHORITY.KEYID = 5
3,117,744 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,211 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,901 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,776 UART: [afmc] --
3,160,818 UART: [cold-reset] --
3,161,680 UART: [state] Locking Datavault
3,162,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,387 UART: [state] Locking ICCM
3,163,899 UART: [exit] Launching FMC @ 0x40000130
3,169,228 UART:
3,169,244 UART: Running Caliptra FMC ...
3,169,652 UART:
3,169,795 UART: [state] CFI Enabled
3,180,324 UART: [fht] FMC Alias Private Key: 7
3,288,079 UART: [art] Extend RT PCRs Done
3,288,507 UART: [art] Lock RT PCRs Done
3,289,979 UART: [art] Populate DV Done
3,298,186 UART: [fht] FMC Alias Private Key: 7
3,299,158 UART: [art] Derive CDI
3,299,438 UART: [art] Store in in slot 0x4
3,385,297 UART: [art] Derive Key Pair
3,385,657 UART: [art] Store priv key in slot 0x5
3,399,047 UART: [art] Derive Key Pair - Done
3,413,711 UART: [art] Signing Cert with AUTHO
3,414,191 UART: RITY.KEYID = 7
3,429,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,298 UART: [art] PUB.X = 58A6808C1667E39F43BD8ECFEB9B4A3F5E36C45DBDB659D8B0F7A34201098EA30DCCF09EF6A3E605385037532F481AA9
3,437,068 UART: [art] PUB.Y = 111C09F47333434E9A43FAA66BCD68A862F28A85CC026BE30077A62CFBAD5D8FCB73B145F66D2A6751273E39D0D4A36D
3,444,000 UART: [art] SIG.R = 67D0A712A426BE900A090EDBE6325712544427DB7B0E9747CDED62E555BD802CB0F962E5BFD6F37E709FF9F3ADD3B29A
3,450,772 UART: [art] SIG.S = 9183DC4EA196075BB710850FB79EEE10483B688F7F237995C06963770026E45847C3746695CCD498AE26946E710469BF
3,474,788 UART: Caliptra RT
3,475,133 UART: [state] CFI Enabled
3,583,784 UART: [rt] RT listening for mailbox commands...
3,584,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,780 UART: [rt]cmd =0x41544d4e, len=14344
3,852,957 >>> mbox cmd response data (8 bytes)
3,852,958 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,037 UART: [rt]cmd =0x41545348, len=116
3,904,989 >>> mbox cmd response data (12 bytes)
3,904,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,548 UART:
3,905,564 UART: Running Caliptra ROM ...
3,905,972 UART:
3,906,113 UART: [state] CFI Enabled
3,908,719 UART: [state] LifecycleState = Unprovisioned
3,909,374 UART: [state] DebugLocked = No
3,910,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,911,643 UART: [kat] SHA2-256
4,705,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,709,689 UART: [kat] ++
4,709,841 UART: [kat] sha1
4,714,253 UART: [kat] SHA2-256
4,716,191 UART: [kat] SHA2-384
4,718,860 UART: [kat] SHA2-512-ACC
4,720,760 UART: [kat] ECC-384
4,726,439 UART: [kat] HMAC-384Kdf
4,730,911 UART: [kat] LMS
5,299,107 UART: [kat] --
5,300,088 UART: [update-reset] ++
6,636,197 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,637,377 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,787,427 >>> mbox cmd response: success
6,787,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,787,574 UART: [update-reset] Copying MAN_2 To MAN_1
6,795,588 UART: [update-reset Success] --
6,796,413 UART: [state] Locking Datavault
6,797,425 UART: [state] Locking PCR0, PCR1 and PCR31
6,798,029 UART: [state] Locking ICCM
6,798,599 UART: [exit] Launching FMC @ 0x40000130
6,803,928 UART:
6,803,944 UART: Running Caliptra FMC ...
6,804,352 UART:
6,804,495 UART: [state] CFI Enabled
6,893,338 UART: [art] Extend RT PCRs Done
6,893,766 UART: [art] Lock RT PCRs Done
6,895,123 UART: [art] Populate DV Done
6,903,394 UART: [fht] FMC Alias Private Key: 7
6,904,384 UART: [art] Derive CDI
6,904,664 UART: [art] Store in in slot 0x4
6,990,121 UART: [art] Derive Key Pair
6,990,481 UART: [art] Store priv key in slot 0x5
7,003,997 UART: [art] Derive Key Pair - Done
7,018,840 UART: [art] Signing Cert with AUTHO
7,019,320 UART: RITY.KEYID = 7
7,034,346 UART: [art] Erasing AUTHORITY.KEYID = 7
7,035,111 UART: [art] PUB.X = 46781BB5E1E4BA7A15A841C2EE5A987B471F00A241BC56E3666E88FBB2952A7BA03BE9CDCBF30E9618770B99401A3DF8
7,041,865 UART: [art] PUB.Y = 0C25D5A0A463D65CD09A418800709C2CC67681CEF9B29BC171181013F767E68792862073333D363244B05131DD6683CF
7,048,778 UART: [art] SIG.R = 8E9F56FDAFF31113B0DB3A983BA5BB566C8104BA705B6CA912FD3A7CFFE7D742C6BFF7ECF3F266A4E049DE2E73B9E98B
7,055,573 UART: [art] SIG.S = C03EB63BC300D6F649303BDFBEE3AB50C753F14FAD8048F2002BB97C7706159A3F949BA9CF0583A73FCBE8EA31C913CC
7,079,564 UART: Caliptra RT
7,079,909 UART: [state] CFI Enabled
7,363,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,394,354 UART: [rt]cmd =0x41545348, len=116
7,415,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,566 ready_for_fw is high
1,362,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,250 >>> mbox cmd response: success
2,992,736 UART:
2,992,752 UART: Running Caliptra FMC ...
2,993,160 UART:
2,993,303 UART: [state] CFI Enabled
3,004,318 UART: [fht] FMC Alias Private Key: 7
3,112,541 UART: [art] Extend RT PCRs Done
3,112,969 UART: [art] Lock RT PCRs Done
3,114,707 UART: [art] Populate DV Done
3,123,042 UART: [fht] FMC Alias Private Key: 7
3,123,990 UART: [art] Derive CDI
3,124,270 UART: [art] Store in in slot 0x4
3,210,037 UART: [art] Derive Key Pair
3,210,397 UART: [art] Store priv key in slot 0x5
3,223,523 UART: [art] Derive Key Pair - Done
3,238,249 UART: [art] Signing Cert with AUTHO
3,238,729 UART: RITY.KEYID = 7
3,253,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,730 UART: [art] PUB.X = FD492A6E2BA2B10F2B5AC3570C412230C218A3A9FF57F3178885F3D373D3C179F208C6376CB36EB6502B7FCB88E10ECA
3,261,498 UART: [art] PUB.Y = 135D3E3CDCFBC4B0B3855A6F8A1C05A408065E455A9AACC5A1728E20E83AE70885D05471FAA5369519D3A23F70831A03
3,268,439 UART: [art] SIG.R = 1F8BE54EBAB6D7C1600FAF90B454549587AFA5A845FA6AC61D6022A7FB47E2AB8A8CCACF9D46DC4A2874A318A07F0F7C
3,275,227 UART: [art] SIG.S = 87B38DF622224C7918244A178D029990D250E4A66BB78CFFD20A052C747170D5AC8EEB410E1FDFB154421034358E4E74
3,298,926 UART: Caliptra RT
3,299,271 UART: [state] CFI Enabled
3,407,666 UART: [rt] RT listening for mailbox commands...
3,408,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,508 UART: [rt]cmd =0x41544d4e, len=14344
3,676,741 >>> mbox cmd response data (8 bytes)
3,676,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,009 UART: [rt]cmd =0x41545348, len=116
3,728,565 >>> mbox cmd response data (12 bytes)
3,728,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,172 >>> mbox cmd response: success
6,493,172 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,506,281 UART:
6,506,297 UART: Running Caliptra FMC ...
6,506,705 UART:
6,506,848 UART: [state] CFI Enabled
6,595,925 UART: [art] Extend RT PCRs Done
6,596,353 UART: [art] Lock RT PCRs Done
6,597,650 UART: [art] Populate DV Done
6,605,869 UART: [fht] FMC Alias Private Key: 7
6,606,867 UART: [art] Derive CDI
6,607,147 UART: [art] Store in in slot 0x4
6,692,708 UART: [art] Derive Key Pair
6,693,068 UART: [art] Store priv key in slot 0x5
6,706,266 UART: [art] Derive Key Pair - Done
6,720,513 UART: [art] Signing Cert with AUTHO
6,720,993 UART: RITY.KEYID = 7
6,736,359 UART: [art] Erasing AUTHORITY.KEYID = 7
6,737,124 UART: [art] PUB.X = 27FABC1E9C7E527BFEF7C23373CB872F964C38505529A1A227FABE4D81D883786414ED59840ED513F9957E175FF8DDCC
6,743,901 UART: [art] PUB.Y = 59C93A05254C04E59B37B6D98C93BF1A38D6A0B5BA30A8C2ED97BCC44C22F25D85E51EB3A0D0DA5F2A82BA7A49AB63F7
6,750,865 UART: [art] SIG.R = 3A6FBFAB1D934759D6BB2BE698E1A29B144012D12088EA51D91DD8B366957BA9DE471E59D9672E3A7034A81F6224F34D
6,757,641 UART: [art] SIG.S = 6295A26E12C418BFD34F9A96475139C8DBD111B2ACA24E775CEAEA6E4E159C6F8C9AAA749A96253CC267579E49073624
6,781,563 UART: Caliptra RT
6,781,908 UART: [state] CFI Enabled
7,061,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,092,823 UART: [rt]cmd =0x41545348, len=116
7,114,325 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,374 UART: [kat] HMAC-384Kdf
922,904 UART: [kat] LMS
1,171,232 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 ready_for_fw is high
1,176,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,216 UART: [idev] Erasing UDS.KEYID = 0
1,201,387 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,211,135 UART: [ldev] ++
1,211,303 UART: [ldev] CDI.KEYID = 6
1,211,666 UART: [ldev] SUBJECT.KEYID = 5
1,212,092 UART: [ldev] AUTHORITY.KEYID = 7
1,212,555 UART: [ldev] FE.KEYID = 1
1,217,717 UART: [ldev] Erasing FE.KEYID = 1
1,244,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,939 UART: [ldev] --
1,284,230 UART: [fwproc] Wait for Commands...
1,285,020 UART: [fwproc] Recv command 0x46574c44
1,285,748 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,600 >>> mbox cmd response: success
2,777,792 UART: [afmc] ++
2,777,960 UART: [afmc] CDI.KEYID = 6
2,778,322 UART: [afmc] SUBJECT.KEYID = 7
2,778,747 UART: [afmc] AUTHORITY.KEYID = 5
2,814,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,716 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,435 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,405 UART: [afmc] --
2,858,357 UART: [cold-reset] --
2,859,179 UART: [state] Locking Datavault
2,860,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,020 UART: [state] Locking ICCM
2,861,680 UART: [exit] Launching FMC @ 0x40000130
2,867,009 UART:
2,867,025 UART: Running Caliptra FMC ...
2,867,433 UART:
2,867,487 UART: [state] CFI Enabled
2,877,752 UART: [fht] FMC Alias Private Key: 7
2,985,565 UART: [art] Extend RT PCRs Done
2,985,993 UART: [art] Lock RT PCRs Done
2,987,231 UART: [art] Populate DV Done
2,995,552 UART: [fht] FMC Alias Private Key: 7
2,996,696 UART: [art] Derive CDI
2,996,976 UART: [art] Store in in slot 0x4
3,082,521 UART: [art] Derive Key Pair
3,082,881 UART: [art] Store priv key in slot 0x5
3,095,755 UART: [art] Derive Key Pair - Done
3,110,961 UART: [art] Signing Cert with AUTHO
3,111,441 UART: RITY.KEYID = 7
3,126,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,190 UART: [art] PUB.X = FBC62358A6ADFAC7BC44712A44C0EE12FBF1493BD14A5B1CFB87F5C5BFBDA06EB017F4E5753F3313CF6E4807B88316C3
3,133,979 UART: [art] PUB.Y = 1C49366DC00A34F740E5097B7C8AD3902803024AE35EADDCF97E8EC3C8AAC4CF051C3FCE9142FC01F49E93D932B888CD
3,140,927 UART: [art] SIG.R = DE44ACBEE5D7DC4C67CA49DA864C6948F823304C10D7F43C38FBBF1E24952906B6FDAC6603694B9C518512149A05DBC0
3,147,700 UART: [art] SIG.S = 0524D6A2ED68B3EAB643334478603DB3540988A663B3F0D57FE41A17EB413DB6C8377676C6B46777563321FF8A54F79D
3,171,717 UART: Caliptra RT
3,171,970 UART: [state] CFI Enabled
3,279,409 UART: [rt] RT listening for mailbox commands...
3,280,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,103 UART: [rt]cmd =0x41544d4e, len=14344
3,548,416 >>> mbox cmd response data (8 bytes)
3,548,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,324 UART: [rt]cmd =0x41545348, len=116
3,599,232 >>> mbox cmd response data (12 bytes)
3,599,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,306 UART:
3,600,322 UART: Running Caliptra ROM ...
3,600,730 UART:
3,600,785 UART: [state] CFI Enabled
3,603,085 UART: [state] LifecycleState = Unprovisioned
3,603,740 UART: [state] DebugLocked = No
3,604,316 UART: [state] WD Timer not started. Device not locked for debugging
3,605,512 UART: [kat] SHA2-256
4,411,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,415,287 UART: [kat] ++
4,415,439 UART: [kat] sha1
4,419,829 UART: [kat] SHA2-256
4,421,769 UART: [kat] SHA2-384
4,424,640 UART: [kat] SHA2-512-ACC
4,426,540 UART: [kat] ECC-384
4,436,341 UART: [kat] HMAC-384Kdf
4,440,769 UART: [kat] LMS
4,689,097 UART: [kat] --
4,689,803 UART: [update-reset] ++
6,002,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,003,975 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,153,973 >>> mbox cmd response: success
6,153,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,154,224 UART: [update-reset] Copying MAN_2 To MAN_1
6,162,238 UART: [update-reset Success] --
6,163,135 UART: [state] Locking Datavault
6,163,793 UART: [state] Locking PCR0, PCR1 and PCR31
6,164,397 UART: [state] Locking ICCM
6,164,953 UART: [exit] Launching FMC @ 0x40000130
6,170,282 UART:
6,170,298 UART: Running Caliptra FMC ...
6,170,706 UART:
6,170,760 UART: [state] CFI Enabled
6,259,987 UART: [art] Extend RT PCRs Done
6,260,415 UART: [art] Lock RT PCRs Done
6,261,360 UART: [art] Populate DV Done
6,269,729 UART: [fht] FMC Alias Private Key: 7
6,270,755 UART: [art] Derive CDI
6,271,035 UART: [art] Store in in slot 0x4
6,356,548 UART: [art] Derive Key Pair
6,356,908 UART: [art] Store priv key in slot 0x5
6,370,154 UART: [art] Derive Key Pair - Done
6,385,156 UART: [art] Signing Cert with AUTHO
6,385,636 UART: RITY.KEYID = 7
6,400,838 UART: [art] Erasing AUTHORITY.KEYID = 7
6,401,603 UART: [art] PUB.X = EDF54FBC811CF3FF3CA75570CB6C1A86B53EDF0DC5B0DBAC8678BE0F270CB2D421BF9E40BB939D2AEF5B2C70E3280402
6,408,386 UART: [art] PUB.Y = 7518E2AC0A0D16944337D4E6CD0BEF4769C21C299B04C4C7385BCE5B49FADB28F403BC8FCA00172D9C027BE77A84D1B2
6,415,310 UART: [art] SIG.R = 83117561EE2FE46B4C92DD4ACD34A752D0AC7D2CF37064570F5A85906F876DBBDF19400E35D3A85DAA13DD366D9A923A
6,422,086 UART: [art] SIG.S = 87F133EF5E7018FB0613CB61F706FB3CF117C53A00B614795A2A9B9C7730D1AFAD957BC71C66CF6AD94FDEDD527B6F78
6,445,711 UART: Caliptra RT
6,445,964 UART: [state] CFI Enabled
6,724,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,755,095 UART: [rt]cmd =0x41545348, len=116
6,776,871 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,457 ready_for_fw is high
1,060,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,387 >>> mbox cmd response: success
2,690,153 UART:
2,690,169 UART: Running Caliptra FMC ...
2,690,577 UART:
2,690,631 UART: [state] CFI Enabled
2,700,798 UART: [fht] FMC Alias Private Key: 7
2,808,843 UART: [art] Extend RT PCRs Done
2,809,271 UART: [art] Lock RT PCRs Done
2,810,901 UART: [art] Populate DV Done
2,819,130 UART: [fht] FMC Alias Private Key: 7
2,820,194 UART: [art] Derive CDI
2,820,474 UART: [art] Store in in slot 0x4
2,906,229 UART: [art] Derive Key Pair
2,906,589 UART: [art] Store priv key in slot 0x5
2,919,619 UART: [art] Derive Key Pair - Done
2,934,222 UART: [art] Signing Cert with AUTHO
2,934,702 UART: RITY.KEYID = 7
2,950,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,171 UART: [art] PUB.X = 2C32FB621A7B6CB5C6E0E43DDC520D5952EDF6014C9CB5AF45CE6D013861E981F86F3B5E7EC77CC1F2A1FB46B41E01E9
2,957,949 UART: [art] PUB.Y = C463E52FD5A1A7A16025E8621220E66FC9DE946D2359EF1767AFA2BE31DA4E67EC7553B5CD739E6349B1FB02BA4D9914
2,964,906 UART: [art] SIG.R = 8189F522C140FABDA639AAF0B9CE1C704FE0AA3E6702A80E5044610C95B06637F516E3E2B265EE17F404D8CEE2188B6F
2,971,674 UART: [art] SIG.S = 7930B11D1232E8570E29348E18E20B07973D5920DAA2D3830F1604493FC65C77FFC8E5FD6DFB94FBE2DFAB61E6D73FCE
2,995,422 UART: Caliptra RT
2,995,675 UART: [state] CFI Enabled
3,103,698 UART: [rt] RT listening for mailbox commands...
3,104,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,608 UART: [rt]cmd =0x41544d4e, len=14344
3,372,229 >>> mbox cmd response data (8 bytes)
3,372,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,503 UART: [rt]cmd =0x41545348, len=116
3,422,963 >>> mbox cmd response data (12 bytes)
3,422,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,860,465 >>> mbox cmd response: success
5,860,465 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,873,683 UART:
5,873,699 UART: Running Caliptra FMC ...
5,874,107 UART:
5,874,161 UART: [state] CFI Enabled
5,963,332 UART: [art] Extend RT PCRs Done
5,963,760 UART: [art] Lock RT PCRs Done
5,964,979 UART: [art] Populate DV Done
5,972,940 UART: [fht] FMC Alias Private Key: 7
5,973,892 UART: [art] Derive CDI
5,974,172 UART: [art] Store in in slot 0x4
6,059,541 UART: [art] Derive Key Pair
6,059,901 UART: [art] Store priv key in slot 0x5
6,072,983 UART: [art] Derive Key Pair - Done
6,087,833 UART: [art] Signing Cert with AUTHO
6,088,313 UART: RITY.KEYID = 7
6,103,497 UART: [art] Erasing AUTHORITY.KEYID = 7
6,104,262 UART: [art] PUB.X = 3C67FDFBEE00E05955B9DCC0938C23738BAD6EC64A11A75FEDC1DDBC7661CA338DFF5521DC88B416D5B711EB244B364C
6,111,032 UART: [art] PUB.Y = 7929B3665C73D2B4EB9D557D23240AD5CC5A24E40243D4B213E24086E955B187D8EE8A70A42578F53EDA7982E49DCD77
6,117,978 UART: [art] SIG.R = 0179F651337A685947184F1FB09A749BC5666086E279D509E0A0D08B5F4C14223266DA7DC502080A5771CC3D87BFB4FA
6,124,729 UART: [art] SIG.S = 9AB3E2064F8993BDFFB7B3866EBA7E8A0A055EFFCF53F3A643FB2CFF2195E256512C99CB179F1724349A946136E59B35
6,149,417 UART: Caliptra RT
6,149,670 UART: [state] CFI Enabled
6,432,893 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,742 UART: [rt]cmd =0x41545348, len=116
6,485,652 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
893,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,874 UART: [kat] ++
898,026 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,583 UART: [kat] SHA2-512-ACC
908,484 UART: [kat] ECC-384
917,865 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,560 UART: [fht] FHT @ 0x50003400
1,175,209 UART: [idev] ++
1,175,377 UART: [idev] CDI.KEYID = 6
1,175,737 UART: [idev] SUBJECT.KEYID = 7
1,176,161 UART: [idev] UDS.KEYID = 0
1,176,506 ready_for_fw is high
1,176,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,076 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,748 UART: [ldev] ++
1,210,916 UART: [ldev] CDI.KEYID = 6
1,211,279 UART: [ldev] SUBJECT.KEYID = 5
1,211,705 UART: [ldev] AUTHORITY.KEYID = 7
1,212,168 UART: [ldev] FE.KEYID = 1
1,217,408 UART: [ldev] Erasing FE.KEYID = 1
1,244,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,220 UART: [ldev] --
1,283,493 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,001 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,445 >>> mbox cmd response: success
2,777,637 UART: [afmc] ++
2,777,805 UART: [afmc] CDI.KEYID = 6
2,778,167 UART: [afmc] SUBJECT.KEYID = 7
2,778,592 UART: [afmc] AUTHORITY.KEYID = 5
2,814,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,048 UART: [afmc] --
2,858,042 UART: [cold-reset] --
2,859,160 UART: [state] Locking Datavault
2,860,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,979 UART: [state] Locking ICCM
2,861,425 UART: [exit] Launching FMC @ 0x40000130
2,866,754 UART:
2,866,770 UART: Running Caliptra FMC ...
2,867,178 UART:
2,867,321 UART: [state] CFI Enabled
2,877,658 UART: [fht] FMC Alias Private Key: 7
2,984,819 UART: [art] Extend RT PCRs Done
2,985,247 UART: [art] Lock RT PCRs Done
2,987,151 UART: [art] Populate DV Done
2,995,320 UART: [fht] FMC Alias Private Key: 7
2,996,304 UART: [art] Derive CDI
2,996,584 UART: [art] Store in in slot 0x4
3,082,453 UART: [art] Derive Key Pair
3,082,813 UART: [art] Store priv key in slot 0x5
3,095,309 UART: [art] Derive Key Pair - Done
3,110,173 UART: [art] Signing Cert with AUTHO
3,110,653 UART: RITY.KEYID = 7
3,125,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,588 UART: [art] PUB.X = C75F9A6B00255E35877A9CDD7FF58E400A7D096D03F13A7D4C62FF95884EC7D1159433433552E24C85AE560B7C667608
3,133,319 UART: [art] PUB.Y = CFD7C61DC06F343A615A9DABC25C5D19E69D3343CE5E74194533AE9B2931437F6B0EA77CC104911681CF90FCD6202AC7
3,140,273 UART: [art] SIG.R = 24C43F068FD2F9FF12E03FB6D737D6992154F0CBB2A884AC388FFD7ECA651CBF8AFC5ACDEF747FB39ECAE5BB51C1832E
3,147,070 UART: [art] SIG.S = 94DDCAFFB71C3A7FC6A670704513557F7CA16A507DB4C6436E350AD04F3F51CB25F2689DBDD742718C9EFED16B5AEEDF
3,170,674 UART: Caliptra RT
3,171,019 UART: [state] CFI Enabled
3,279,114 UART: [rt] RT listening for mailbox commands...
3,279,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,694 UART: [rt]cmd =0x41544d4e, len=14344
3,547,249 >>> mbox cmd response data (8 bytes)
3,547,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,071 UART: [rt]cmd =0x41545348, len=116
3,598,625 >>> mbox cmd response data (12 bytes)
3,598,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,349 UART:
3,599,365 UART: Running Caliptra ROM ...
3,599,773 UART:
3,599,915 UART: [state] CFI Enabled
3,602,829 UART: [state] LifecycleState = Unprovisioned
3,603,484 UART: [state] DebugLocked = No
3,603,976 UART: [state] WD Timer not started. Device not locked for debugging
3,605,166 UART: [kat] SHA2-256
4,410,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,414,941 UART: [kat] ++
4,415,093 UART: [kat] sha1
4,419,387 UART: [kat] SHA2-256
4,421,327 UART: [kat] SHA2-384
4,424,064 UART: [kat] SHA2-512-ACC
4,425,964 UART: [kat] ECC-384
4,435,655 UART: [kat] HMAC-384Kdf
4,440,241 UART: [kat] LMS
4,688,569 UART: [kat] --
4,689,285 UART: [update-reset] ++
6,002,498 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,003,509 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,153,507 >>> mbox cmd response: success
6,153,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,153,844 UART: [update-reset] Copying MAN_2 To MAN_1
6,161,858 UART: [update-reset Success] --
6,162,937 UART: [state] Locking Datavault
6,163,569 UART: [state] Locking PCR0, PCR1 and PCR31
6,164,173 UART: [state] Locking ICCM
6,164,691 UART: [exit] Launching FMC @ 0x40000130
6,170,020 UART:
6,170,036 UART: Running Caliptra FMC ...
6,170,444 UART:
6,170,587 UART: [state] CFI Enabled
6,259,456 UART: [art] Extend RT PCRs Done
6,259,884 UART: [art] Lock RT PCRs Done
6,261,255 UART: [art] Populate DV Done
6,269,572 UART: [fht] FMC Alias Private Key: 7
6,270,618 UART: [art] Derive CDI
6,270,898 UART: [art] Store in in slot 0x4
6,356,657 UART: [art] Derive Key Pair
6,357,017 UART: [art] Store priv key in slot 0x5
6,370,207 UART: [art] Derive Key Pair - Done
6,385,147 UART: [art] Signing Cert with AUTHO
6,385,627 UART: RITY.KEYID = 7
6,401,093 UART: [art] Erasing AUTHORITY.KEYID = 7
6,401,858 UART: [art] PUB.X = BAEBDF5027A719A6124977B17D095B6AC3D55960955AC28A52D860779FDB3682BD5FC13DEA22861892BCD38053C72C2A
6,408,631 UART: [art] PUB.Y = 49F8AD32DCA3FFD0DAF7840DD124D1AB2B8BEE3DEECBAF4DAF236BA909738C21F941DED05D47244AEBAC5E41189D6EF2
6,415,609 UART: [art] SIG.R = 945125FBC05F2E16A6A163F8A61887A8B1C967BBF4F66FB2821251CBD28C2DD18CFD2DFF2224D34E5A4516A4153C57DF
6,422,391 UART: [art] SIG.S = B05C14309813FEACAB7A783EFEA8AA694949735464A9466E0A048677637C8846A57B8CD380EC0D11B520A1E326038C10
6,446,506 UART: Caliptra RT
6,446,851 UART: [state] CFI Enabled
6,729,689 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,760,440 UART: [rt]cmd =0x41545348, len=116
6,781,660 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,280 ready_for_fw is high
1,060,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,040 >>> mbox cmd response: success
2,690,288 UART:
2,690,304 UART: Running Caliptra FMC ...
2,690,712 UART:
2,690,855 UART: [state] CFI Enabled
2,701,832 UART: [fht] FMC Alias Private Key: 7
2,809,949 UART: [art] Extend RT PCRs Done
2,810,377 UART: [art] Lock RT PCRs Done
2,812,177 UART: [art] Populate DV Done
2,820,396 UART: [fht] FMC Alias Private Key: 7
2,821,526 UART: [art] Derive CDI
2,821,806 UART: [art] Store in in slot 0x4
2,907,795 UART: [art] Derive Key Pair
2,908,155 UART: [art] Store priv key in slot 0x5
2,921,395 UART: [art] Derive Key Pair - Done
2,936,290 UART: [art] Signing Cert with AUTHO
2,936,770 UART: RITY.KEYID = 7
2,952,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,855 UART: [art] PUB.X = DCABA4FA06AF7F2B0210361731A8164D01E0F0036CF3C5B156CA85EE88D03957F48FFEA7F3B55B8388B954D250BE7144
2,959,623 UART: [art] PUB.Y = 04249066E2B4C058C537142819D760AD70BB60E7C76D63264D37F2431FF6B27B8C9A2B9B6A1C72C5AB228135ED85C24B
2,966,570 UART: [art] SIG.R = B83E30F84CCE5BE8F622FE9512F68CD166741DE3F26012C19A519C694CBFCC1FB50E6970C3F265D587781D0F7D44B9F9
2,973,344 UART: [art] SIG.S = DFFE724E8C0F14C3ED13F3493F3009AB61E105F7290A51A7B0CD4D610C3CC17CA67ECF0C6BC29491B1FD2D59875F9E52
2,997,719 UART: Caliptra RT
2,998,064 UART: [state] CFI Enabled
3,105,804 UART: [rt] RT listening for mailbox commands...
3,106,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,702 UART: [rt]cmd =0x41544d4e, len=14344
3,374,797 >>> mbox cmd response data (8 bytes)
3,374,798 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,617 UART: [rt]cmd =0x41545348, len=116
3,426,065 >>> mbox cmd response data (12 bytes)
3,426,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,442 >>> mbox cmd response: success
5,865,442 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,879,166 UART:
5,879,182 UART: Running Caliptra FMC ...
5,879,590 UART:
5,879,733 UART: [state] CFI Enabled
5,968,938 UART: [art] Extend RT PCRs Done
5,969,366 UART: [art] Lock RT PCRs Done
5,970,873 UART: [art] Populate DV Done
5,979,108 UART: [fht] FMC Alias Private Key: 7
5,980,098 UART: [art] Derive CDI
5,980,378 UART: [art] Store in in slot 0x4
6,066,071 UART: [art] Derive Key Pair
6,066,431 UART: [art] Store priv key in slot 0x5
6,079,507 UART: [art] Derive Key Pair - Done
6,093,944 UART: [art] Signing Cert with AUTHO
6,094,424 UART: RITY.KEYID = 7
6,109,444 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,209 UART: [art] PUB.X = 48F2D9546FC704B9D6ABF297557507EC9E79BD4AE69EDE78A15642D1B0C7C4597DE865104B0415FAC793245C3A9AAD16
6,116,978 UART: [art] PUB.Y = B01675ACAD2BD45DB1FB6F0718A8933E9CE18E7C5626510EBBD1752780A920F41AF9643D0BBFDAD472804F41AACBE664
6,123,935 UART: [art] SIG.R = FFBC06F4EA9ED36C1A4A0A9826EAA14BBECF282EB87D0F9B0BCC21AFDAD7DFF4A4F66553EAA2BF1FBEABF723C484BA40
6,130,737 UART: [art] SIG.S = 7790C830803AD8E4C285790A22A60939BCA378504F1A5986F17F446462B35AF9CE562677F897B3DDC928B777C9B00DF7
6,154,515 UART: Caliptra RT
6,154,860 UART: [state] CFI Enabled
6,437,199 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,468,128 UART: [rt]cmd =0x41545348, len=116
6,489,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,174,109 ready_for_fw is high
1,174,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,305 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,938 UART: [ldev] --
1,281,286 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,290 >>> mbox cmd response: success
2,774,519 UART: [afmc] ++
2,774,687 UART: [afmc] CDI.KEYID = 6
2,775,050 UART: [afmc] SUBJECT.KEYID = 7
2,775,476 UART: [afmc] AUTHORITY.KEYID = 5
2,810,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,666 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,278 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,670 UART: [afmc] --
2,853,654 UART: [cold-reset] --
2,854,496 UART: [state] Locking Datavault
2,855,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,327 UART: [state] Locking ICCM
2,856,783 UART: [exit] Launching FMC @ 0x40000130
2,862,112 UART:
2,862,128 UART: Running Caliptra FMC ...
2,862,536 UART:
2,862,590 UART: [state] CFI Enabled
2,873,055 UART: [fht] FMC Alias Private Key: 7
2,980,802 UART: [art] Extend RT PCRs Done
2,981,230 UART: [art] Lock RT PCRs Done
2,983,010 UART: [art] Populate DV Done
2,991,369 UART: [fht] FMC Alias Private Key: 7
2,992,517 UART: [art] Derive CDI
2,992,797 UART: [art] Store in in slot 0x4
3,078,132 UART: [art] Derive Key Pair
3,078,492 UART: [art] Store priv key in slot 0x5
3,091,416 UART: [art] Derive Key Pair - Done
3,105,799 UART: [art] Signing Cert with AUTHO
3,106,279 UART: RITY.KEYID = 7
3,121,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,284 UART: [art] PUB.X = E7507FC911829EFE097FACDA0BFE255BB7537C21E46797BA4805D8008FF8DC5053D28508327743B84BE2E74AD1A8C42E
3,129,028 UART: [art] PUB.Y = 60C499EF1C8AEC0382CF68FDF92225B866682BE4CCCB654218FE11CF115CECE2EA164C06FE842D4E220FCE5D4C20DF1E
3,135,991 UART: [art] SIG.R = 16C1A7E65A0AC26B90A37BE56B5AC57FC1EAEEA21F6F143433D2607F0C04C60C58E616B35C03B9EE3BF1CDB18CD52108
3,142,761 UART: [art] SIG.S = 90514518EDEDF71F209356430BE6869B7BCB8F2C30EA9D3CC4240AC6390B03EDEEFA34DA3432FE812DDA742031B902D8
3,167,233 UART: Caliptra RT
3,167,486 UART: [state] CFI Enabled
3,275,033 UART: [rt] RT listening for mailbox commands...
3,275,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,621 UART: [rt]cmd =0x41544d4e, len=14344
3,543,858 >>> mbox cmd response data (8 bytes)
3,543,859 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,032 UART: [rt]cmd =0x41545348, len=116
3,594,906 >>> mbox cmd response data (12 bytes)
3,594,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,738 UART:
3,595,754 UART: Running Caliptra ROM ...
3,596,162 UART:
3,596,217 UART: [state] CFI Enabled
3,598,725 UART: [state] LifecycleState = Unprovisioned
3,599,380 UART: [state] DebugLocked = No
3,599,922 UART: [state] WD Timer not started. Device not locked for debugging
3,601,034 UART: [kat] SHA2-256
4,404,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,408,713 UART: [kat] ++
4,408,865 UART: [kat] sha1
4,413,093 UART: [kat] SHA2-256
4,415,033 UART: [kat] SHA2-384
4,417,692 UART: [kat] SHA2-512-ACC
4,419,592 UART: [kat] ECC-384
4,429,625 UART: [kat] HMAC-384Kdf
4,434,233 UART: [kat] LMS
4,682,545 UART: [kat] --
4,683,621 UART: [update-reset] ++
5,996,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,997,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,147,534 >>> mbox cmd response: success
6,147,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,637 UART: [update-reset] Copying MAN_2 To MAN_1
6,155,651 UART: [update-reset Success] --
6,156,908 UART: [state] Locking Datavault
6,157,614 UART: [state] Locking PCR0, PCR1 and PCR31
6,158,218 UART: [state] Locking ICCM
6,158,768 UART: [exit] Launching FMC @ 0x40000130
6,164,097 UART:
6,164,113 UART: Running Caliptra FMC ...
6,164,521 UART:
6,164,575 UART: [state] CFI Enabled
6,253,776 UART: [art] Extend RT PCRs Done
6,254,204 UART: [art] Lock RT PCRs Done
6,255,583 UART: [art] Populate DV Done
6,263,526 UART: [fht] FMC Alias Private Key: 7
6,264,558 UART: [art] Derive CDI
6,264,838 UART: [art] Store in in slot 0x4
6,350,185 UART: [art] Derive Key Pair
6,350,545 UART: [art] Store priv key in slot 0x5
6,363,363 UART: [art] Derive Key Pair - Done
6,377,785 UART: [art] Signing Cert with AUTHO
6,378,265 UART: RITY.KEYID = 7
6,393,053 UART: [art] Erasing AUTHORITY.KEYID = 7
6,393,818 UART: [art] PUB.X = ED4E5E25096F09079ADC083A02A7FCB22BF05EC92B297EA385D74BC1644A1DE4EE068CC68185595D188423795643023D
6,400,569 UART: [art] PUB.Y = DC5BD0BAE50B6EBEE4F7C60906AE42E52D16631F6EA55C57CC7B29339817A7150632FF9DA8CF861CB02B4999F6B46B32
6,407,521 UART: [art] SIG.R = 1F0F7FE014B1052C54F10C969E656BEA32E1EFD7CE4BE6E5CDD3038C42DB3BD109613A93436554CB188C3A9B63377A4B
6,414,288 UART: [art] SIG.S = AEBDE3F9108AB66B958091B807EAACD024BAABA2F6DB1E8545F180B38CECDE894A6C27BCB976C3631C22D731BBE4BFED
6,438,324 UART: Caliptra RT
6,438,577 UART: [state] CFI Enabled
6,716,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,747,683 UART: [rt]cmd =0x41545348, len=116
6,769,395 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,778 ready_for_fw is high
1,055,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,298 >>> mbox cmd response: success
2,684,274 UART:
2,684,290 UART: Running Caliptra FMC ...
2,684,698 UART:
2,684,752 UART: [state] CFI Enabled
2,694,977 UART: [fht] FMC Alias Private Key: 7
2,803,040 UART: [art] Extend RT PCRs Done
2,803,468 UART: [art] Lock RT PCRs Done
2,805,100 UART: [art] Populate DV Done
2,813,569 UART: [fht] FMC Alias Private Key: 7
2,814,535 UART: [art] Derive CDI
2,814,815 UART: [art] Store in in slot 0x4
2,900,788 UART: [art] Derive Key Pair
2,901,148 UART: [art] Store priv key in slot 0x5
2,914,930 UART: [art] Derive Key Pair - Done
2,929,608 UART: [art] Signing Cert with AUTHO
2,930,088 UART: RITY.KEYID = 7
2,945,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,061 UART: [art] PUB.X = E0D38F33445DF757C045DFC075E44276F3CC6EF871EFA562F69DB298A106EA1907524E5A11E397EDDCE645E8848EBD16
2,952,835 UART: [art] PUB.Y = F8A408D8DBDB138CF6B4BEADE878D0B25A13444E0BDFE73E441208F3D4DF728F233D4E9E30647B8AF2AAEF147FEB9853
2,959,798 UART: [art] SIG.R = C5CA20522D1E1DBCD1E2BA01FDD667D1257708485AED5752636830AAA4482EDC2D4EB3C07EF15BD2783195FAE6B0B19B
2,966,578 UART: [art] SIG.S = FFE324B515582C976FCF985D3156B74B58E1572DD22F7FA589DE8F5CFB27243BBD68A7F527A358449973FD422DE8BEB7
2,990,125 UART: Caliptra RT
2,990,378 UART: [state] CFI Enabled
3,098,164 UART: [rt] RT listening for mailbox commands...
3,098,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,006 UART: [rt]cmd =0x41544d4e, len=14344
3,366,827 >>> mbox cmd response data (8 bytes)
3,366,828 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,923 UART: [rt]cmd =0x41545348, len=116
3,418,301 >>> mbox cmd response data (12 bytes)
3,418,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,192 >>> mbox cmd response: success
5,853,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,866,586 UART:
5,866,602 UART: Running Caliptra FMC ...
5,867,010 UART:
5,867,064 UART: [state] CFI Enabled
5,956,375 UART: [art] Extend RT PCRs Done
5,956,803 UART: [art] Lock RT PCRs Done
5,958,190 UART: [art] Populate DV Done
5,966,213 UART: [fht] FMC Alias Private Key: 7
5,967,263 UART: [art] Derive CDI
5,967,543 UART: [art] Store in in slot 0x4
6,053,202 UART: [art] Derive Key Pair
6,053,562 UART: [art] Store priv key in slot 0x5
6,066,892 UART: [art] Derive Key Pair - Done
6,081,503 UART: [art] Signing Cert with AUTHO
6,081,983 UART: RITY.KEYID = 7
6,097,483 UART: [art] Erasing AUTHORITY.KEYID = 7
6,098,248 UART: [art] PUB.X = 639DD5E94878112AD5C4EC5567D507A4CFD5148F36DB5A7E26D12960590C5E78771B7CDFFBA2C70D966E14FE7BB46260
6,105,017 UART: [art] PUB.Y = 4B6FF80B1CF0103C628002E80FB7B47F9CD3B033493F3598C4B0012DC8AF47F2C76E0AA377E8103DE1E1D9185CFA2375
6,111,960 UART: [art] SIG.R = 0A4087E8B125885FF5AADA2A5D9531AC22446CDE8EE889CFD5940763F51ABC4014584A4FFF32B826CC5CB5F2622BCBF0
6,118,740 UART: [art] SIG.S = D48E4BE9B847571D95F31C68608E4446E7AE0C815680A6322870673F61961A47EC4F864DF47A727C7878A08855FF7F6F
6,142,284 UART: Caliptra RT
6,142,537 UART: [state] CFI Enabled
6,422,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,453,879 UART: [rt]cmd =0x41545348, len=116
6,475,201 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,873 UART: [kat] SHA2-512-ACC
906,774 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 ready_for_fw is high
1,174,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,455 UART: [fwproc] Wait for Commands...
1,283,214 UART: [fwproc] Recv command 0x46574c44
1,283,947 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,955 >>> mbox cmd response: success
2,777,134 UART: [afmc] ++
2,777,302 UART: [afmc] CDI.KEYID = 6
2,777,665 UART: [afmc] SUBJECT.KEYID = 7
2,778,091 UART: [afmc] AUTHORITY.KEYID = 5
2,813,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,637 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,169 UART: [afmc] --
2,857,069 UART: [cold-reset] --
2,857,879 UART: [state] Locking Datavault
2,858,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,438 UART: [state] Locking ICCM
2,859,896 UART: [exit] Launching FMC @ 0x40000130
2,865,225 UART:
2,865,241 UART: Running Caliptra FMC ...
2,865,649 UART:
2,865,792 UART: [state] CFI Enabled
2,876,461 UART: [fht] FMC Alias Private Key: 7
2,984,330 UART: [art] Extend RT PCRs Done
2,984,758 UART: [art] Lock RT PCRs Done
2,986,360 UART: [art] Populate DV Done
2,994,581 UART: [fht] FMC Alias Private Key: 7
2,995,565 UART: [art] Derive CDI
2,995,845 UART: [art] Store in in slot 0x4
3,081,268 UART: [art] Derive Key Pair
3,081,628 UART: [art] Store priv key in slot 0x5
3,094,436 UART: [art] Derive Key Pair - Done
3,109,670 UART: [art] Signing Cert with AUTHO
3,110,150 UART: RITY.KEYID = 7
3,125,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,819 UART: [art] PUB.X = D60D2A00CF060D149C030B3D6770331EAAA3A1206938DC7D289FDC177B8DE93625B4F1623D6F37A9F890AB2566B0E5EE
3,132,560 UART: [art] PUB.Y = CFF04A7F76180EC8421F30ECA7E0DB1BBAC84AF15CC8151D61DE02A249BA92D0FA31DF164C1FCCB6CC2DF86B0C27A1A2
3,139,531 UART: [art] SIG.R = 30D90E41EEE3F04EE68698DB48C4617825847BAA78968C200A17C7EB3473AC5A829C14A203D4E8E6C52860CDC9C98BBD
3,146,300 UART: [art] SIG.S = 97A46A8080BDC1C8208DDB38538C61093AFB920DCCF1B9C2F7A5F8D2B51067F3870D9B202459CB7E3A173B742A03ACF6
3,170,633 UART: Caliptra RT
3,170,978 UART: [state] CFI Enabled
3,278,205 UART: [rt] RT listening for mailbox commands...
3,278,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,765 UART: [rt]cmd =0x41544d4e, len=14344
3,546,160 >>> mbox cmd response data (8 bytes)
3,546,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,246 UART: [rt]cmd =0x41545348, len=116
3,597,916 >>> mbox cmd response data (12 bytes)
3,597,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,614 UART:
3,598,630 UART: Running Caliptra ROM ...
3,599,038 UART:
3,599,180 UART: [state] CFI Enabled
3,601,864 UART: [state] LifecycleState = Unprovisioned
3,602,519 UART: [state] DebugLocked = No
3,603,229 UART: [state] WD Timer not started. Device not locked for debugging
3,604,549 UART: [kat] SHA2-256
4,408,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,412,228 UART: [kat] ++
4,412,380 UART: [kat] sha1
4,416,742 UART: [kat] SHA2-256
4,418,682 UART: [kat] SHA2-384
4,421,363 UART: [kat] SHA2-512-ACC
4,423,263 UART: [kat] ECC-384
4,433,254 UART: [kat] HMAC-384Kdf
4,437,916 UART: [kat] LMS
4,686,228 UART: [kat] --
4,687,292 UART: [update-reset] ++
6,000,820 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,001,989 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,151,987 >>> mbox cmd response: success
6,151,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,152,102 UART: [update-reset] Copying MAN_2 To MAN_1
6,160,116 UART: [update-reset Success] --
6,160,945 UART: [state] Locking Datavault
6,161,711 UART: [state] Locking PCR0, PCR1 and PCR31
6,162,315 UART: [state] Locking ICCM
6,162,851 UART: [exit] Launching FMC @ 0x40000130
6,168,180 UART:
6,168,196 UART: Running Caliptra FMC ...
6,168,604 UART:
6,168,747 UART: [state] CFI Enabled
6,257,280 UART: [art] Extend RT PCRs Done
6,257,708 UART: [art] Lock RT PCRs Done
6,258,995 UART: [art] Populate DV Done
6,266,890 UART: [fht] FMC Alias Private Key: 7
6,267,948 UART: [art] Derive CDI
6,268,228 UART: [art] Store in in slot 0x4
6,353,873 UART: [art] Derive Key Pair
6,354,233 UART: [art] Store priv key in slot 0x5
6,367,141 UART: [art] Derive Key Pair - Done
6,381,984 UART: [art] Signing Cert with AUTHO
6,382,464 UART: RITY.KEYID = 7
6,397,782 UART: [art] Erasing AUTHORITY.KEYID = 7
6,398,547 UART: [art] PUB.X = D249E01F1BD14013CD3C4E9A012B2686F182605B84A2666FC4F82BE9D6CBF949E2926886AA697713DC54FE0ED1A4D574
6,405,317 UART: [art] PUB.Y = 4B943A172F779F250EF32BDE34DCA65854199B27C209F8CD8520CF1069170B1019D8A908F251E18ACD7A40C0DF930D89
6,412,254 UART: [art] SIG.R = B3F0A3A054AFA5CD5F27EA40C30936C9CC21ACAA852CB6D34CE72C2F40CDCC3015A9D94CCFF8202D762569AFF4D3351A
6,419,045 UART: [art] SIG.S = 9799F0EC407E6BF98B6F9B4851DC26188BCBE26F82D938762FAD92A473AAF8AB5791E1DBA6F274A98D94C6515585D6F2
6,443,202 UART: Caliptra RT
6,443,547 UART: [state] CFI Enabled
6,725,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,376 UART: [rt]cmd =0x41545348, len=116
6,777,932 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 ready_for_fw is high
1,056,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,401 >>> mbox cmd response: success
2,687,405 UART:
2,687,421 UART: Running Caliptra FMC ...
2,687,829 UART:
2,687,972 UART: [state] CFI Enabled
2,698,705 UART: [fht] FMC Alias Private Key: 7
2,806,338 UART: [art] Extend RT PCRs Done
2,806,766 UART: [art] Lock RT PCRs Done
2,808,340 UART: [art] Populate DV Done
2,816,541 UART: [fht] FMC Alias Private Key: 7
2,817,575 UART: [art] Derive CDI
2,817,855 UART: [art] Store in in slot 0x4
2,903,600 UART: [art] Derive Key Pair
2,903,960 UART: [art] Store priv key in slot 0x5
2,917,472 UART: [art] Derive Key Pair - Done
2,932,265 UART: [art] Signing Cert with AUTHO
2,932,745 UART: RITY.KEYID = 7
2,948,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,836 UART: [art] PUB.X = E3470ED0B26E84CA695862150C5ADABDB7C83A93618027B49B8B6A7FEC8AC17DD145D8D453A200E9B4DEC719EB7C9976
2,955,592 UART: [art] PUB.Y = 81040C9C426EE9E62443769FD3A6148517F4D26387506DCB0E95CDA6BF7ED5EC94AC3E4AD43788C6DC7F88EF199829EF
2,962,543 UART: [art] SIG.R = 9CA38C635D94A921F79967507118A78D256EA318A58FA93166F107B34A8B4F5D32DFA6CD558ADC06D501D130AFD6AA72
2,969,310 UART: [art] SIG.S = 47DBF13EAF41C3A535F7CAA2A00245679DD2C60EDFD12292FF2D8CFD2246E155FC83B97DC689FCE0CC2E9CD7838B54B0
2,993,435 UART: Caliptra RT
2,993,780 UART: [state] CFI Enabled
3,101,707 UART: [rt] RT listening for mailbox commands...
3,102,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,473 UART: [rt]cmd =0x41544d4e, len=14344
3,370,562 >>> mbox cmd response data (8 bytes)
3,370,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,560 UART: [rt]cmd =0x41545348, len=116
3,422,206 >>> mbox cmd response data (12 bytes)
3,422,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,857,732 >>> mbox cmd response: success
5,857,732 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,871,090 UART:
5,871,106 UART: Running Caliptra FMC ...
5,871,514 UART:
5,871,657 UART: [state] CFI Enabled
5,961,074 UART: [art] Extend RT PCRs Done
5,961,502 UART: [art] Lock RT PCRs Done
5,963,057 UART: [art] Populate DV Done
5,970,980 UART: [fht] FMC Alias Private Key: 7
5,971,910 UART: [art] Derive CDI
5,972,190 UART: [art] Store in in slot 0x4
6,057,553 UART: [art] Derive Key Pair
6,057,913 UART: [art] Store priv key in slot 0x5
6,071,683 UART: [art] Derive Key Pair - Done
6,086,165 UART: [art] Signing Cert with AUTHO
6,086,645 UART: RITY.KEYID = 7
6,101,503 UART: [art] Erasing AUTHORITY.KEYID = 7
6,102,268 UART: [art] PUB.X = AC7DE7A630AA88DFEEEA5656049A7750817E14FB6503B1853F2289726BB3CEB928139672B1F4F37BCE4CECC255ADACFB
6,109,050 UART: [art] PUB.Y = 78524E1D258C68CCBA96541D4A23AD52781384A75B9BAFA3524A4C7E1485E30D997C6109A5276F10B4E085BD9179F8A3
6,115,994 UART: [art] SIG.R = C774188F5EB1D9023EBB80BF512D786AF252C84C33D0C77F2EFC212AF1A08E72C56BE45B81C86B8140EC75A16D314C7A
6,122,773 UART: [art] SIG.S = 8F21DD287E779E48A8F9A0F505BF5E2136AE5DE5B9CFA3F678721D76A060A3822717BBBDDF186277E5CC9F04A22C6C5F
6,147,032 UART: Caliptra RT
6,147,377 UART: [state] CFI Enabled
6,426,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,457,628 UART: [rt]cmd =0x41545348, len=116
6,477,958 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
192,004 UART:
192,375 UART: Running Caliptra ROM ...
193,537 UART:
193,686 UART: [state] CFI Enabled
262,583 UART: [state] LifecycleState = Unprovisioned
264,551 UART: [state] DebugLocked = No
266,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,512 UART: [kat] SHA2-256
441,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,697 UART: [kat] ++
452,173 UART: [kat] sha1
462,767 UART: [kat] SHA2-256
465,419 UART: [kat] SHA2-384
471,334 UART: [kat] SHA2-512-ACC
473,699 UART: [kat] ECC-384
2,768,521 UART: [kat] HMAC-384Kdf
2,798,886 UART: [kat] LMS
3,989,231 UART: [kat] --
3,995,151 UART: [cold-reset] ++
3,996,866 UART: [fht] Storing FHT @ 0x50003400
4,009,478 UART: [idev] ++
4,010,056 UART: [idev] CDI.KEYID = 6
4,010,948 UART: [idev] SUBJECT.KEYID = 7
4,012,698 UART: [idev] UDS.KEYID = 0
4,013,642 ready_for_fw is high
4,013,838 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,250 UART: [idev] Erasing UDS.KEYID = 0
7,344,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,461 UART: [idev] --
7,369,425 UART: [ldev] ++
7,369,996 UART: [ldev] CDI.KEYID = 6
7,370,958 UART: [ldev] SUBJECT.KEYID = 5
7,372,286 UART: [ldev] AUTHORITY.KEYID = 7
7,373,479 UART: [ldev] FE.KEYID = 1
7,400,496 UART: [ldev] Erasing FE.KEYID = 1
10,734,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,740 UART: [ldev] --
13,118,222 UART: [fwproc] Waiting for Commands...
13,120,207 UART: [fwproc] Received command 0x46574c44
13,122,388 UART: [fwproc] Received Image of size 114124 bytes
17,171,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,684 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,362 >>> mbox cmd response: success
17,630,360 UART: [afmc] ++
17,630,960 UART: [afmc] CDI.KEYID = 6
17,631,871 UART: [afmc] SUBJECT.KEYID = 7
17,633,141 UART: [afmc] AUTHORITY.KEYID = 5
21,006,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,066 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,464 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,339 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,763 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,722 UART: [afmc] --
23,377,328 UART: [cold-reset] --
23,381,687 UART: [state] Locking Datavault
23,386,179 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,886 UART: [state] Locking ICCM
23,389,228 UART: [exit] Launching FMC @ 0x40000130
23,397,641 UART:
23,397,878 UART: Running Caliptra FMC ...
23,398,979 UART:
23,399,146 UART: [state] CFI Enabled
23,465,959 UART: [fht] FMC Alias Private Key: 7
25,803,816 UART: [art] Extend RT PCRs Done
25,805,030 UART: [art] Lock RT PCRs Done
25,806,708 UART: [art] Populate DV Done
25,811,958 UART: [fht] FMC Alias Private Key: 7
25,813,603 UART: [art] Derive CDI
25,814,414 UART: [art] Store in in slot 0x4
25,874,268 UART: [art] Derive Key Pair
25,875,300 UART: [art] Store priv key in slot 0x5
29,168,085 UART: [art] Derive Key Pair - Done
29,181,133 UART: [art] Signing Cert with AUTHO
29,182,440 UART: RITY.KEYID = 7
31,469,191 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,696 UART: [art] PUB.X = BF8D6E2C1DC64811E506EB27275AF8E88DDD8335C5A1AA53DDFB89D7962C81139B24B8A089229314FB65C9B9ED193AEA
31,477,899 UART: [art] PUB.Y = 2AFA6B4BECB3EF19E1265441F73C7024EED38B11196D3EC060E93F857FAA81D60F95E9739BA4BF8DF91816C6D806305B
31,485,203 UART: [art] SIG.R = 467AB8636FBEE48813A75071B3F89798D40636426EA26F9AD7C608F7797AB6B65EDE873E0BD16FA02EEF49DDBB2E510E
31,492,555 UART: [art] SIG.S = 747849AC83B5ED7C1B1F9F8C70CED43702C43F2C033E056F1152D9451A3B56FE2EE897E12AC4D4EA19BC89C8E4060042
32,797,718 UART: Caliptra RT
32,798,408 UART: [state] CFI Enabled
32,959,689 UART: [rt] RT listening for mailbox commands...
32,962,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,117,483 UART: [rt]cmd =0x41544d4e, len=14344
38,353,171 >>> mbox cmd response data (8 bytes)
38,353,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,384,385 UART: [rt]cmd =0x41545348, len=116
38,386,424 >>> mbox cmd response data (12 bytes)
40,517,603 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,663,445 UART:
40,663,828 UART: Running Caliptra ROM ...
40,664,903 UART:
40,665,067 UART: [state] CFI Enabled
40,728,493 UART: [state] LifecycleState = Unprovisioned
40,730,400 UART: [state] DebugLocked = No
40,732,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,737,313 UART: [kat] SHA2-256
40,907,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,917,512 UART: [kat] ++
40,917,968 UART: [kat] sha1
40,929,666 UART: [kat] SHA2-256
40,932,381 UART: [kat] SHA2-384
40,938,153 UART: [kat] SHA2-512-ACC
40,940,505 UART: [kat] ECC-384
43,231,030 UART: [kat] HMAC-384Kdf
43,263,191 UART: [kat] LMS
44,453,562 UART: [kat] --
44,456,328 UART: [update-reset] ++
48,606,009 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,608,988 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,991,225 >>> mbox cmd response: success
48,995,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,996,439 UART: [update-reset] Copying MAN_2 To MAN_1
49,014,262 UART: [update-reset Success] --
49,017,699 UART: [state] Locking Datavault
49,020,469 UART: [state] Locking PCR0, PCR1 and PCR31
49,022,173 UART: [state] Locking ICCM
49,023,414 UART: [exit] Launching FMC @ 0x40000130
49,031,819 UART:
49,032,057 UART: Running Caliptra FMC ...
49,033,166 UART:
49,033,346 UART: [state] CFI Enabled
49,138,875 UART: [art] Extend RT PCRs Done
49,140,076 UART: [art] Lock RT PCRs Done
49,141,488 UART: [art] Populate DV Done
49,146,945 UART: [fht] FMC Alias Private Key: 7
49,148,646 UART: [art] Derive CDI
49,149,455 UART: [art] Store in in slot 0x4
49,207,815 UART: [art] Derive Key Pair
49,208,836 UART: [art] Store priv key in slot 0x5
52,501,627 UART: [art] Derive Key Pair - Done
52,514,695 UART: [art] Signing Cert with AUTHO
52,516,007 UART: RITY.KEYID = 7
54,803,002 UART: [art] Erasing AUTHORITY.KEYID = 7
54,804,514 UART: [art] PUB.X = F1377FDA14AD8C2736A92908EAC97E6F318E140F9A97F5F03DE93681FD1EB3F0110142F42EEE7998E91A8311DA50E063
54,811,907 UART: [art] PUB.Y = 97989BB67203D3C684452E11053AB0C7A1399B5D6A3A0AFF5439C9ADC1747B4D254613DF17FA49B1A5060F8A08B9D8DE
54,818,999 UART: [art] SIG.R = 3C09D2352872942ACB3328FA54221DCCA53D874B9A6B6052A3095BDBE08A87E1EA3B70BFD81142413DBE1B0BF8D23D75
54,826,414 UART: [art] SIG.S = 91B12146BD6CF6FDC14410AA0098891C1B1F56A1349BB78940B4081BE5C3F365DAEA231BF6F16373B3DE5D3994E0DA99
56,131,772 UART: Caliptra RT
56,132,482 UART: [state] CFI Enabled
56,469,051 UART: [rt] RT listening for mailbox commands...
56,501,002 UART: [rt]cmd =0x41545348, len=116
56,503,174 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,801,980 ready_for_fw is high
3,802,366 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,859,107 >>> mbox cmd response: success
23,547,394 UART:
23,547,770 UART: Running Caliptra FMC ...
23,548,964 UART:
23,549,132 UART: [state] CFI Enabled
23,616,409 UART: [fht] FMC Alias Private Key: 7
25,954,009 UART: [art] Extend RT PCRs Done
25,955,275 UART: [art] Lock RT PCRs Done
25,956,928 UART: [art] Populate DV Done
25,962,398 UART: [fht] FMC Alias Private Key: 7
25,963,897 UART: [art] Derive CDI
25,964,636 UART: [art] Store in in slot 0x4
26,024,988 UART: [art] Derive Key Pair
26,026,034 UART: [art] Store priv key in slot 0x5
29,318,898 UART: [art] Derive Key Pair - Done
29,331,899 UART: [art] Signing Cert with AUTHO
29,333,202 UART: RITY.KEYID = 7
31,620,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,480 UART: [art] PUB.X = 4E527E922EE400D9EEE440BEB06DBF0BD49C456A1AC7081DD180958B5997ADB93D539AE0C9C1D0427D676189B661DF17
31,629,680 UART: [art] PUB.Y = A386034C0E697EC6835568E0B09D7F0715CB5C42C13F9EBAF83BD181952A8C2CD5A9274C7739B7BAF6AC6561E6A333EC
31,636,997 UART: [art] SIG.R = 8B051A7A1CACE8B154CDF55FADBB1D002297A9DF55055592F1DD054A017DCD3FDBFB8813E41CDD99C25218716E0BFB11
31,644,401 UART: [art] SIG.S = 62725979A97F0A6FA5C9B0B9EF6F0A625FA0EDD92FD113FFEE828B0CEC0DC25B1AD8C21B5BAC7803EAB18EEC3FE35636
32,949,595 UART: Caliptra RT
32,950,312 UART: [state] CFI Enabled
33,110,096 UART: [rt] RT listening for mailbox commands...
33,112,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,945 UART: [rt]cmd =0x41544d4e, len=14344
38,503,791 >>> mbox cmd response data (8 bytes)
38,504,347 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,534,977 UART: [rt]cmd =0x41545348, len=116
38,537,235 >>> mbox cmd response data (12 bytes)
40,674,874 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,381,251 >>> mbox cmd response: success
49,381,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,416,578 UART:
49,416,892 UART: Running Caliptra FMC ...
49,417,931 UART:
49,418,082 UART: [state] CFI Enabled
49,524,014 UART: [art] Extend RT PCRs Done
49,525,222 UART: [art] Lock RT PCRs Done
49,526,768 UART: [art] Populate DV Done
49,532,124 UART: [fht] FMC Alias Private Key: 7
49,533,718 UART: [art] Derive CDI
49,534,472 UART: [art] Store in in slot 0x4
49,593,166 UART: [art] Derive Key Pair
49,594,211 UART: [art] Store priv key in slot 0x5
52,887,007 UART: [art] Derive Key Pair - Done
52,900,121 UART: [art] Signing Cert with AUTHO
52,901,422 UART: RITY.KEYID = 7
55,189,283 UART: [art] Erasing AUTHORITY.KEYID = 7
55,190,785 UART: [art] PUB.X = 487DA260E4FA61770922C34DB34DE7085352A2DC9A67C4D98868E11C74913D4AB3EA3A35982FDCB0902053573DBC8A13
55,198,022 UART: [art] PUB.Y = 324BBA1F6B201A5B55D9397D93140E056C46831D2A757CF4E0C8D361AE397F4CD1A61D4A27517B8154414F4C78F4A6C0
55,205,210 UART: [art] SIG.R = 51A091BD0C3120A1417744E9841FF6ECCF190AE060369F6B53ECE6AA63A9FFAEBCF66032FE066B39867E405A64A8289B
55,212,599 UART: [art] SIG.S = 517A6A1E4FBBC22F3D2F5375C4B5D5E180A3643AA1B841C34506D880BA1018B5E0B6FA58CF1C9A55EB6242E75553CE97
56,516,997 UART: Caliptra RT
56,517,705 UART: [state] CFI Enabled
56,852,495 UART: [rt] RT listening for mailbox commands...
56,884,276 UART: [rt]cmd =0x41545348, len=116
56,886,655 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,279 UART:
192,644 UART: Running Caliptra ROM ...
193,845 UART:
603,331 UART: [state] CFI Enabled
616,079 UART: [state] LifecycleState = Unprovisioned
618,026 UART: [state] DebugLocked = No
620,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,410 UART: [kat] SHA2-256
794,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,723 UART: [kat] ++
805,163 UART: [kat] sha1
814,984 UART: [kat] SHA2-256
817,700 UART: [kat] SHA2-384
823,608 UART: [kat] SHA2-512-ACC
825,986 UART: [kat] ECC-384
3,110,726 UART: [kat] HMAC-384Kdf
3,121,259 UART: [kat] LMS
4,311,380 UART: [kat] --
4,315,758 UART: [cold-reset] ++
4,317,619 UART: [fht] Storing FHT @ 0x50003400
4,328,946 UART: [idev] ++
4,329,509 UART: [idev] CDI.KEYID = 6
4,330,385 UART: [idev] SUBJECT.KEYID = 7
4,331,692 UART: [idev] UDS.KEYID = 0
4,332,613 ready_for_fw is high
4,332,794 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,109 UART: [idev] Erasing UDS.KEYID = 0
7,618,052 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,429 UART: [idev] --
7,642,899 UART: [ldev] ++
7,643,488 UART: [ldev] CDI.KEYID = 6
7,644,399 UART: [ldev] SUBJECT.KEYID = 5
7,645,610 UART: [ldev] AUTHORITY.KEYID = 7
7,646,888 UART: [ldev] FE.KEYID = 1
7,657,685 UART: [ldev] Erasing FE.KEYID = 1
10,945,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,445 UART: [ldev] --
13,304,104 UART: [fwproc] Waiting for Commands...
13,305,924 UART: [fwproc] Received command 0x46574c44
13,308,150 UART: [fwproc] Received Image of size 114124 bytes
17,361,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,006 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,269 >>> mbox cmd response: success
17,831,955 UART: [afmc] ++
17,832,545 UART: [afmc] CDI.KEYID = 6
17,833,448 UART: [afmc] SUBJECT.KEYID = 7
17,834,711 UART: [afmc] AUTHORITY.KEYID = 5
21,146,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,950 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,336 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,204 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,624 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,569 UART: [afmc] --
23,511,970 UART: [cold-reset] --
23,516,526 UART: [state] Locking Datavault
23,523,615 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,383 UART: [state] Locking ICCM
23,526,448 UART: [exit] Launching FMC @ 0x40000130
23,534,839 UART:
23,535,069 UART: Running Caliptra FMC ...
23,536,166 UART:
23,536,326 UART: [state] CFI Enabled
23,544,745 UART: [fht] FMC Alias Private Key: 7
25,875,784 UART: [art] Extend RT PCRs Done
25,876,997 UART: [art] Lock RT PCRs Done
25,878,718 UART: [art] Populate DV Done
25,884,154 UART: [fht] FMC Alias Private Key: 7
25,885,749 UART: [art] Derive CDI
25,886,553 UART: [art] Store in in slot 0x4
25,929,355 UART: [art] Derive Key Pair
25,930,349 UART: [art] Store priv key in slot 0x5
29,172,382 UART: [art] Derive Key Pair - Done
29,184,969 UART: [art] Signing Cert with AUTHO
29,186,271 UART: RITY.KEYID = 7
31,465,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,721 UART: [art] PUB.X = 9B0662AC5A337103C58B993406E4F8CDB1258CD2C6C2129C645F3134371BBE19C66930A97F48E7F1E3B88DA53402F95C
31,473,946 UART: [art] PUB.Y = 1F41640F5AC2548A584267EA13FA0F7925B0D040184706BFD012AF540063717145A03FC271D3A73EB90F6FDC6BB9C194
31,481,195 UART: [art] SIG.R = AD1D0F682F25073ECF2DACA6D8E096242BC13453DC35F9C03A6696380E9D6874DF6E6582AF04678C7BEC8B5DC52B4745
31,488,593 UART: [art] SIG.S = C12C9F1A447C3FFB2E166A9E63D221CD4FCCE48C8343A5364CB2C3724EFA1E650ECAEAC363F841852962034C84EFCD75
32,793,988 UART: Caliptra RT
32,794,675 UART: [state] CFI Enabled
32,913,182 UART: [rt] RT listening for mailbox commands...
32,915,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,071,027 UART: [rt]cmd =0x41544d4e, len=14344
38,306,666 >>> mbox cmd response data (8 bytes)
38,307,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,337,981 UART: [rt]cmd =0x41545348, len=116
38,340,289 >>> mbox cmd response data (12 bytes)
40,394,491 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,539,629 UART:
40,539,994 UART: Running Caliptra ROM ...
40,541,124 UART:
40,541,289 UART: [state] CFI Enabled
40,554,793 UART: [state] LifecycleState = Unprovisioned
40,556,737 UART: [state] DebugLocked = No
40,559,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,564,795 UART: [kat] SHA2-256
40,734,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,745,056 UART: [kat] ++
40,745,541 UART: [kat] sha1
40,756,420 UART: [kat] SHA2-256
40,759,150 UART: [kat] SHA2-384
40,765,402 UART: [kat] SHA2-512-ACC
40,767,755 UART: [kat] ECC-384
43,049,497 UART: [kat] HMAC-384Kdf
43,062,381 UART: [kat] LMS
44,252,415 UART: [kat] --
44,256,213 UART: [update-reset] ++
48,403,322 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,406,507 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,788,825 >>> mbox cmd response: success
48,793,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,794,004 UART: [update-reset] Copying MAN_2 To MAN_1
48,812,627 UART: [update-reset Success] --
48,818,272 UART: [state] Locking Datavault
48,822,006 UART: [state] Locking PCR0, PCR1 and PCR31
48,823,706 UART: [state] Locking ICCM
48,825,583 UART: [exit] Launching FMC @ 0x40000130
48,833,975 UART:
48,834,213 UART: Running Caliptra FMC ...
48,835,308 UART:
48,835,463 UART: [state] CFI Enabled
48,879,589 UART: [art] Extend RT PCRs Done
48,880,787 UART: [art] Lock RT PCRs Done
48,882,024 UART: [art] Populate DV Done
48,887,440 UART: [fht] FMC Alias Private Key: 7
48,889,031 UART: [art] Derive CDI
48,889,858 UART: [art] Store in in slot 0x4
48,932,542 UART: [art] Derive Key Pair
48,933,588 UART: [art] Store priv key in slot 0x5
52,175,812 UART: [art] Derive Key Pair - Done
52,188,982 UART: [art] Signing Cert with AUTHO
52,190,290 UART: RITY.KEYID = 7
54,469,885 UART: [art] Erasing AUTHORITY.KEYID = 7
54,471,393 UART: [art] PUB.X = 20B44697A8E9367E5295E66938F463A425CA0671B8D5A7FFE295697F8355FBBCE76863D791BA3A1B703CF0D336C1A831
54,478,636 UART: [art] PUB.Y = 0D3F490920423ACD1B7AA3CE876346B019F5D4E56FB7B2B8C38E02D8D4A35C43A2DDA53B41B32325FFABA5DD397F4CA4
54,485,858 UART: [art] SIG.R = CF29F13BAD3705DF7938CA2A1D5310901AB29F90FFAF3D456BE0AD78D8FDA28285DB4F5E1469212E8A6885C7E3FFB626
54,493,246 UART: [art] SIG.S = 7B0B26497827C72BE8477B86FFA8B7044E59704B0D3B60DA2624ABABF9049989E89E7D4BB2541C928DBBF4E19D1D2959
55,798,343 UART: Caliptra RT
55,799,043 UART: [state] CFI Enabled
56,086,619 UART: [rt] RT listening for mailbox commands...
56,118,649 UART: [rt]cmd =0x41545348, len=116
56,120,974 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,129,460 ready_for_fw is high
4,129,852 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,679 >>> mbox cmd response: success
23,721,305 UART:
23,721,705 UART: Running Caliptra FMC ...
23,722,809 UART:
23,722,953 UART: [state] CFI Enabled
23,731,020 UART: [fht] FMC Alias Private Key: 7
26,062,204 UART: [art] Extend RT PCRs Done
26,063,432 UART: [art] Lock RT PCRs Done
26,064,818 UART: [art] Populate DV Done
26,070,179 UART: [fht] FMC Alias Private Key: 7
26,071,725 UART: [art] Derive CDI
26,072,458 UART: [art] Store in in slot 0x4
26,114,995 UART: [art] Derive Key Pair
26,115,994 UART: [art] Store priv key in slot 0x5
29,357,805 UART: [art] Derive Key Pair - Done
29,370,973 UART: [art] Signing Cert with AUTHO
29,372,284 UART: RITY.KEYID = 7
31,651,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,316 UART: [art] PUB.X = 47C85199790C7124CFE9A755FD31ECC8B233744FED3BE330B0C64C3506B727D8F07A1F5DDEEFDE4190C9516508139C2A
31,660,628 UART: [art] PUB.Y = 2AA817972FA754BB16BBCE250139A76F513C21770847B3CF703969D7010497AE594E28A15AE88AA08BDF7A1E1A8CEBC4
31,667,830 UART: [art] SIG.R = 656B1D0DD9618C2F1DF8930207568951CC44F0FBA0544B4923E3FA73CE52C9025A6C196DF00FC36C63115F21054A20AF
31,675,216 UART: [art] SIG.S = D82DF94F77E8123A03488460AC82D44696127E2FE75C234F34CF12D1B8DB33F8793FC0F73D2257566482351D42B28877
32,980,400 UART: Caliptra RT
32,981,088 UART: [state] CFI Enabled
33,098,726 UART: [rt] RT listening for mailbox commands...
33,101,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,256,471 UART: [rt]cmd =0x41544d4e, len=14344
38,491,766 >>> mbox cmd response data (8 bytes)
38,492,338 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,523,063 UART: [rt]cmd =0x41545348, len=116
38,525,434 >>> mbox cmd response data (12 bytes)
40,578,553 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,234,483 >>> mbox cmd response: success
49,235,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,269,827 UART:
49,270,151 UART: Running Caliptra FMC ...
49,271,276 UART:
49,271,436 UART: [state] CFI Enabled
49,315,360 UART: [art] Extend RT PCRs Done
49,316,509 UART: [art] Lock RT PCRs Done
49,317,905 UART: [art] Populate DV Done
49,323,690 UART: [fht] FMC Alias Private Key: 7
49,325,380 UART: [art] Derive CDI
49,326,188 UART: [art] Store in in slot 0x4
49,369,075 UART: [art] Derive Key Pair
49,370,122 UART: [art] Store priv key in slot 0x5
52,612,940 UART: [art] Derive Key Pair - Done
52,625,818 UART: [art] Signing Cert with AUTHO
52,627,167 UART: RITY.KEYID = 7
54,906,608 UART: [art] Erasing AUTHORITY.KEYID = 7
54,908,119 UART: [art] PUB.X = 985842F14197C8FF2876B037CFB9013EE9E7680D122B90D972A81E3490AB050AEE9256F01EBB6251CDA565AF5457AAD2
54,915,367 UART: [art] PUB.Y = A14112F51DF1BF35D5011F2CC351AB57AEB82495F88552FCC85B56426EAB5B4D0F884B59A6A292C2A82AED2E70AA30A3
54,922,591 UART: [art] SIG.R = 4DF5AB67780316C7697D2C72D5B832EDD72D415F9885B2397967C4E63FA32B2B3942545D7E1ED0C12017F8E581C18232
54,929,985 UART: [art] SIG.S = CA2750D1D2C167C09CD84C71961204C56F4CF077EAF3DCAB8957680652C4BB87C5EDBCA794E471B8BB75971D2F03C1B1
56,235,159 UART: Caliptra RT
56,235,883 UART: [state] CFI Enabled
56,525,579 UART: [rt] RT listening for mailbox commands...
56,557,348 UART: [rt]cmd =0x41545348, len=116
56,559,559 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,218 UART:
192,578 UART: Running Caliptra ROM ...
193,694 UART:
193,837 UART: [state] CFI Enabled
260,262 UART: [state] LifecycleState = Unprovisioned
262,098 UART: [state] DebugLocked = No
263,554 UART: [state] WD Timer not started. Device not locked for debugging
267,227 UART: [kat] SHA2-256
446,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,925 UART: [kat] ++
458,373 UART: [kat] sha1
468,176 UART: [kat] SHA2-256
471,249 UART: [kat] SHA2-384
478,228 UART: [kat] SHA2-512-ACC
481,170 UART: [kat] ECC-384
2,926,449 UART: [kat] HMAC-384Kdf
2,949,954 UART: [kat] LMS
3,479,384 UART: [kat] --
3,485,154 UART: [cold-reset] ++
3,487,557 UART: [fht] FHT @ 0x50003400
3,499,645 UART: [idev] ++
3,500,226 UART: [idev] CDI.KEYID = 6
3,501,139 UART: [idev] SUBJECT.KEYID = 7
3,502,320 UART: [idev] UDS.KEYID = 0
3,503,247 ready_for_fw is high
3,503,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,455 UART: [idev] Erasing UDS.KEYID = 0
6,003,015 UART: [idev] Sha1 KeyId Algorithm
6,025,118 UART: [idev] --
6,028,946 UART: [ldev] ++
6,029,511 UART: [ldev] CDI.KEYID = 6
6,030,414 UART: [ldev] SUBJECT.KEYID = 5
6,031,572 UART: [ldev] AUTHORITY.KEYID = 7
6,032,860 UART: [ldev] FE.KEYID = 1
6,078,048 UART: [ldev] Erasing FE.KEYID = 1
8,581,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,827 UART: [ldev] --
10,394,237 UART: [fwproc] Wait for Commands...
10,396,008 UART: [fwproc] Recv command 0x46574c44
10,398,108 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,265,184 >>> mbox cmd response: success
14,269,986 UART: [afmc] ++
14,270,580 UART: [afmc] CDI.KEYID = 6
14,271,493 UART: [afmc] SUBJECT.KEYID = 7
14,272,654 UART: [afmc] AUTHORITY.KEYID = 5
16,808,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,239 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,450 UART: [afmc] --
18,610,565 UART: [cold-reset] --
18,613,350 UART: [state] Locking Datavault
18,617,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,224 UART: [state] Locking ICCM
18,621,770 UART: [exit] Launching FMC @ 0x40000130
18,630,225 UART:
18,630,457 UART: Running Caliptra FMC ...
18,631,559 UART:
18,631,720 UART: [state] CFI Enabled
18,689,066 UART: [fht] FMC Alias Private Key: 7
20,453,109 UART: [art] Extend RT PCRs Done
20,454,329 UART: [art] Lock RT PCRs Done
20,455,978 UART: [art] Populate DV Done
20,461,549 UART: [fht] FMC Alias Private Key: 7
20,463,153 UART: [art] Derive CDI
20,463,970 UART: [art] Store in in slot 0x4
20,521,707 UART: [art] Derive Key Pair
20,522,697 UART: [art] Store priv key in slot 0x5
22,985,372 UART: [art] Derive Key Pair - Done
22,998,636 UART: [art] Signing Cert with AUTHO
22,999,950 UART: RITY.KEYID = 7
24,711,755 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,257 UART: [art] PUB.X = DA9CB5D34E2A174B2BADC356C7F85C7D8B36449D2AB4008C5146AD8B02FB0F813761E02412B99A309C859848CBF9E2B9
24,720,498 UART: [art] PUB.Y = 69686045D107862B874FE89E921D94E96BE71C2EDA11609BF5830F582DB3D94EAFE9E22EE02E32F262A8830F805729D9
24,727,772 UART: [art] SIG.R = E1921F0904AE121807D76A2B2A8E2AAD4B051E0B975FDE14E9158C124D9828DBBF38C5B59ACA83C959CA7A34F9CC29FF
24,735,157 UART: [art] SIG.S = B857528D06A1D0D923AC260C2C27944DD27433D69305C18940EB57F2C614DA6569D8525FB6927D5727F91F286E7B5070
25,714,266 UART: Caliptra RT
25,714,964 UART: [state] CFI Enabled
25,879,902 UART: [rt] RT listening for mailbox commands...
25,882,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,038,277 UART: [rt]cmd =0x41544d4e, len=14344
29,969,186 >>> mbox cmd response data (8 bytes)
29,969,801 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,000,701 UART: [rt]cmd =0x41545348, len=116
30,002,696 >>> mbox cmd response data (12 bytes)
32,080,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,226,275 UART:
32,226,659 UART: Running Caliptra ROM ...
32,227,741 UART:
32,227,906 UART: [state] CFI Enabled
32,305,161 UART: [state] LifecycleState = Unprovisioned
32,307,049 UART: [state] DebugLocked = No
32,308,852 UART: [state] WD Timer not started. Device not locked for debugging
32,311,743 UART: [kat] SHA2-256
32,490,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,502,466 UART: [kat] ++
32,502,925 UART: [kat] sha1
32,514,348 UART: [kat] SHA2-256
32,517,377 UART: [kat] SHA2-384
32,524,064 UART: [kat] SHA2-512-ACC
32,527,025 UART: [kat] ECC-384
34,986,861 UART: [kat] HMAC-384Kdf
35,011,243 UART: [kat] LMS
35,540,708 UART: [kat] --
35,545,470 UART: [update-reset] ++
38,971,491 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,974,436 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,357,743 >>> mbox cmd response: success
39,358,283 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,359,603 UART: [update-reset] Copying MAN_2 To MAN_1
39,381,932 UART: [update-reset Success] --
39,386,109 UART: [state] Locking Datavault
39,389,520 UART: [state] Locking PCR0, PCR1 and PCR31
39,391,163 UART: [state] Locking ICCM
39,392,912 UART: [exit] Launching FMC @ 0x40000130
39,401,372 UART:
39,401,618 UART: Running Caliptra FMC ...
39,402,722 UART:
39,402,879 UART: [state] CFI Enabled
39,504,116 UART: [art] Extend RT PCRs Done
39,505,328 UART: [art] Lock RT PCRs Done
39,506,576 UART: [art] Populate DV Done
39,511,879 UART: [fht] FMC Alias Private Key: 7
39,513,412 UART: [art] Derive CDI
39,514,224 UART: [art] Store in in slot 0x4
39,573,244 UART: [art] Derive Key Pair
39,574,370 UART: [art] Store priv key in slot 0x5
42,036,950 UART: [art] Derive Key Pair - Done
42,050,196 UART: [art] Signing Cert with AUTHO
42,051,529 UART: RITY.KEYID = 7
43,762,660 UART: [art] Erasing AUTHORITY.KEYID = 7
43,764,167 UART: [art] PUB.X = EECB89E1B358F349425673731996A49822FAF82AEDD9968376C20BAFFE8132D894F44EF0B31E36684FA60490B34FB279
43,771,410 UART: [art] PUB.Y = 44074253C0321F5320599F57B2A7A91FCDA378793C197778EAB2EDFE2D42BD5DAF837593418B82422CB99F78B8393440
43,778,634 UART: [art] SIG.R = 52AED67B6FB0378D7BB66F55646C638C99722FABA80CF3C894DCBFE435FA6EB79645BFD9294D9FE9C742393527CD231B
43,786,085 UART: [art] SIG.S = 97EEEADBEA0C99CFC00C0E40ECFD55C1F8C41AF5BB7C1527BEA2E58742A1BEFC2418C7C9ECE644920220977BB9570CB5
44,764,441 UART: Caliptra RT
44,765,124 UART: [state] CFI Enabled
45,102,944 UART: [rt] RT listening for mailbox commands...
45,135,009 UART: [rt]cmd =0x41545348, len=116
45,137,153 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,361,130 ready_for_fw is high
3,361,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,041,703 >>> mbox cmd response: success
18,324,156 UART:
18,324,551 UART: Running Caliptra FMC ...
18,325,685 UART:
18,325,844 UART: [state] CFI Enabled
18,391,325 UART: [fht] FMC Alias Private Key: 7
20,155,776 UART: [art] Extend RT PCRs Done
20,156,986 UART: [art] Lock RT PCRs Done
20,158,452 UART: [art] Populate DV Done
20,163,849 UART: [fht] FMC Alias Private Key: 7
20,165,445 UART: [art] Derive CDI
20,166,263 UART: [art] Store in in slot 0x4
20,224,020 UART: [art] Derive Key Pair
20,225,061 UART: [art] Store priv key in slot 0x5
22,688,423 UART: [art] Derive Key Pair - Done
22,701,181 UART: [art] Signing Cert with AUTHO
22,702,508 UART: RITY.KEYID = 7
24,414,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,897 UART: [art] PUB.X = C177A0FB5EC5500E431E6C901CE740A8A8483E51EAFA91D6D6C7299DFC0F8B6770902E9405A55FB2C4D3F2B79A61F0F1
24,423,161 UART: [art] PUB.Y = 6D5321F4223AC4F1775D1CCDCD824050367238EB282221DDD90BF53F8CC5E9AB81AE546F0450CA4AAE97FD717F231D27
24,430,435 UART: [art] SIG.R = 77018F5ABBCA57F709F31EC1748A8C62640F6F184FFEA42937BB007FACEC293B5258055DE1586F1C151C5D31E84B5D07
24,437,792 UART: [art] SIG.S = D6983688AA9CFAC31DACC7038480571D063D32E2AF6CBDAA02400773946C9455D65B14FCB09323FAB2187F5280DCCC8D
25,416,418 UART: Caliptra RT
25,417,106 UART: [state] CFI Enabled
25,582,279 UART: [rt] RT listening for mailbox commands...
25,584,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,740,371 UART: [rt]cmd =0x41544d4e, len=14344
29,670,973 >>> mbox cmd response data (8 bytes)
29,671,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,702,266 UART: [rt]cmd =0x41545348, len=116
29,704,585 >>> mbox cmd response data (12 bytes)
31,757,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,862,647 >>> mbox cmd response: success
38,863,261 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,898,459 UART:
38,898,775 UART: Running Caliptra FMC ...
38,899,896 UART:
38,900,054 UART: [state] CFI Enabled
38,992,170 UART: [art] Extend RT PCRs Done
38,993,364 UART: [art] Lock RT PCRs Done
38,994,872 UART: [art] Populate DV Done
39,000,450 UART: [fht] FMC Alias Private Key: 7
39,002,152 UART: [art] Derive CDI
39,002,980 UART: [art] Store in in slot 0x4
39,061,287 UART: [art] Derive Key Pair
39,062,325 UART: [art] Store priv key in slot 0x5
41,524,835 UART: [art] Derive Key Pair - Done
41,537,617 UART: [art] Signing Cert with AUTHO
41,538,917 UART: RITY.KEYID = 7
43,251,265 UART: [art] Erasing AUTHORITY.KEYID = 7
43,253,016 UART: [art] PUB.X = 689C5C3BF9ECE669C804608CC8B0C4FC47815046401EC16335C2A15A6FCDC99C94B9C025D8948976F8DEA19A7C851777
43,260,041 UART: [art] PUB.Y = 72F936B95A1FE3B3C4739FACB273C96547307DEFFA1F7ACA9F639A07E45241E78DCD6583043AA8BE736D6A771357096E
43,267,244 UART: [art] SIG.R = A6C5DFC965725AE9C25CF35E0FDCB447DB9B7F29B766118F4E86696186009203B852206248C0AF2791D5E7CBF98E0BDE
43,274,648 UART: [art] SIG.S = 29DACDCFAF1EC86CBB9F31ABF858A634239FAD0ABE6A00AC1C404FD6D68237C603F9D37CDB7015B129D18E24F79AE683
44,254,005 UART: Caliptra RT
44,254,698 UART: [state] CFI Enabled
44,589,451 UART: [rt] RT listening for mailbox commands...
44,621,499 UART: [rt]cmd =0x41545348, len=116
44,623,713 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,327 writing to cptra_bootfsm_go
193,443 UART:
193,801 UART: Running Caliptra ROM ...
194,997 UART:
604,573 UART: [state] CFI Enabled
617,323 UART: [state] LifecycleState = Unprovisioned
619,136 UART: [state] DebugLocked = No
620,448 UART: [state] WD Timer not started. Device not locked for debugging
624,750 UART: [kat] SHA2-256
803,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,469 UART: [kat] ++
816,023 UART: [kat] sha1
826,904 UART: [kat] SHA2-256
829,898 UART: [kat] SHA2-384
835,593 UART: [kat] SHA2-512-ACC
838,520 UART: [kat] ECC-384
3,281,893 UART: [kat] HMAC-384Kdf
3,294,929 UART: [kat] LMS
3,824,398 UART: [kat] --
3,828,332 UART: [cold-reset] ++
3,830,689 UART: [fht] FHT @ 0x50003400
3,841,455 UART: [idev] ++
3,842,059 UART: [idev] CDI.KEYID = 6
3,842,979 UART: [idev] SUBJECT.KEYID = 7
3,844,144 UART: [idev] UDS.KEYID = 0
3,845,063 ready_for_fw is high
3,845,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,939 UART: [idev] Erasing UDS.KEYID = 0
6,317,742 UART: [idev] Sha1 KeyId Algorithm
6,340,877 UART: [idev] --
6,344,631 UART: [ldev] ++
6,345,211 UART: [ldev] CDI.KEYID = 6
6,346,089 UART: [ldev] SUBJECT.KEYID = 5
6,347,299 UART: [ldev] AUTHORITY.KEYID = 7
6,348,577 UART: [ldev] FE.KEYID = 1
6,356,895 UART: [ldev] Erasing FE.KEYID = 1
8,831,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,545 UART: [ldev] --
10,623,505 UART: [fwproc] Wait for Commands...
10,625,238 UART: [fwproc] Recv command 0x46574c44
10,627,329 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,064 >>> mbox cmd response: success
14,496,499 UART: [afmc] ++
14,497,098 UART: [afmc] CDI.KEYID = 6
14,498,013 UART: [afmc] SUBJECT.KEYID = 7
14,499,174 UART: [afmc] AUTHORITY.KEYID = 5
16,996,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,122 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,191 UART: [afmc] --
18,792,131 UART: [cold-reset] --
18,796,094 UART: [state] Locking Datavault
18,800,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,590 UART: [state] Locking ICCM
18,804,584 UART: [exit] Launching FMC @ 0x40000130
18,812,984 UART:
18,813,213 UART: Running Caliptra FMC ...
18,814,305 UART:
18,814,458 UART: [state] CFI Enabled
18,822,875 UART: [fht] FMC Alias Private Key: 7
20,579,587 UART: [art] Extend RT PCRs Done
20,580,798 UART: [art] Lock RT PCRs Done
20,582,581 UART: [art] Populate DV Done
20,588,204 UART: [fht] FMC Alias Private Key: 7
20,589,740 UART: [art] Derive CDI
20,590,570 UART: [art] Store in in slot 0x4
20,632,837 UART: [art] Derive Key Pair
20,633,833 UART: [art] Store priv key in slot 0x5
23,060,460 UART: [art] Derive Key Pair - Done
23,073,454 UART: [art] Signing Cert with AUTHO
23,074,758 UART: RITY.KEYID = 7
24,780,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,805 UART: [art] PUB.X = FF6FB4D7B3DE9041D26324E8C8C355778B7DD37CDF87B83956DEDEC8F7B67F41A57F2909A341A51A81DC853AB77B3092
24,789,088 UART: [art] PUB.Y = 688848CA97735862B2DAE9A8093BD9FF47985BF0AB6DBCB4BA95409FBED55E7D7663854CB6676A482E23297FBF3D8DAB
24,796,358 UART: [art] SIG.R = EDE6B2F95D2768D4DAE450F4211EAAFA4F4929857938EA50FE3EED8D809EE992426A6DDD2DD7977171CB2686ECD3F9F6
24,803,817 UART: [art] SIG.S = 5C8A49661F62A503158A138A4A812CFF8AB83DA832D5652622F2EEC39464AE33391BBCDEABEDB8FD74F06FB8F01B9143
25,782,460 UART: Caliptra RT
25,783,156 UART: [state] CFI Enabled
25,900,064 UART: [rt] RT listening for mailbox commands...
25,902,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,057,564 UART: [rt]cmd =0x41544d4e, len=14344
29,987,646 >>> mbox cmd response data (8 bytes)
29,988,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,018,836 UART: [rt]cmd =0x41545348, len=116
30,020,963 >>> mbox cmd response data (12 bytes)
32,073,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,219,108 UART:
32,219,573 UART: Running Caliptra ROM ...
32,220,624 UART:
32,220,769 UART: [state] CFI Enabled
32,234,078 UART: [state] LifecycleState = Unprovisioned
32,235,970 UART: [state] DebugLocked = No
32,237,345 UART: [state] WD Timer not started. Device not locked for debugging
32,240,786 UART: [kat] SHA2-256
32,419,993 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,431,538 UART: [kat] ++
32,432,086 UART: [kat] sha1
32,442,056 UART: [kat] SHA2-256
32,445,125 UART: [kat] SHA2-384
32,450,831 UART: [kat] SHA2-512-ACC
32,453,759 UART: [kat] ECC-384
34,895,630 UART: [kat] HMAC-384Kdf
34,906,784 UART: [kat] LMS
35,436,281 UART: [kat] --
35,441,602 UART: [update-reset] ++
38,877,240 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,879,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,263,130 >>> mbox cmd response: success
39,263,608 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,264,060 UART: [update-reset] Copying MAN_2 To MAN_1
39,286,351 UART: [update-reset Success] --
39,289,977 UART: [state] Locking Datavault
39,293,396 UART: [state] Locking PCR0, PCR1 and PCR31
39,295,089 UART: [state] Locking ICCM
39,296,861 UART: [exit] Launching FMC @ 0x40000130
39,305,252 UART:
39,305,478 UART: Running Caliptra FMC ...
39,306,571 UART:
39,306,719 UART: [state] CFI Enabled
39,351,001 UART: [art] Extend RT PCRs Done
39,352,144 UART: [art] Lock RT PCRs Done
39,353,799 UART: [art] Populate DV Done
39,359,578 UART: [fht] FMC Alias Private Key: 7
39,361,215 UART: [art] Derive CDI
39,362,241 UART: [art] Store in in slot 0x4
39,405,071 UART: [art] Derive Key Pair
39,406,144 UART: [art] Store priv key in slot 0x5
41,832,938 UART: [art] Derive Key Pair - Done
41,845,869 UART: [art] Signing Cert with AUTHO
41,847,196 UART: RITY.KEYID = 7
43,552,483 UART: [art] Erasing AUTHORITY.KEYID = 7
43,553,986 UART: [art] PUB.X = D8C5605D8783B24B4FDB6E7DDD8730862FEB018FBAAABFB884931BD0C01EA8F025664EFD258E239DC91C066C706CFF3C
43,561,279 UART: [art] PUB.Y = 9AAC77B93D2ADD2C1FD69C3A35DAF7AFEE111DEC51AF33D802CE4EFFACFBFCC9F7F7362EE262F5879562082935448977
43,568,559 UART: [art] SIG.R = 9DBFDFEF48DFE9AC009C11EAAE48956C07D959A97D69CA2EFCBAC19F04882292E9EA6D99C7B0A485FA297188ABFE95DD
43,575,935 UART: [art] SIG.S = 2905B335F696B9009CB35108BB1A7AA35A9879ADC1ADF0DAA5D3AF10B003BE6B3CCAB2CC451355AC457EF5FE519415CC
44,554,738 UART: Caliptra RT
44,555,421 UART: [state] CFI Enabled
44,845,400 UART: [rt] RT listening for mailbox commands...
44,877,263 UART: [rt]cmd =0x41545348, len=116
44,879,666 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,701,877 ready_for_fw is high
3,702,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,365 >>> mbox cmd response: success
18,525,542 UART:
18,525,938 UART: Running Caliptra FMC ...
18,527,116 UART:
18,527,270 UART: [state] CFI Enabled
18,535,199 UART: [fht] FMC Alias Private Key: 7
20,291,968 UART: [art] Extend RT PCRs Done
20,293,187 UART: [art] Lock RT PCRs Done
20,294,651 UART: [art] Populate DV Done
20,300,158 UART: [fht] FMC Alias Private Key: 7
20,301,638 UART: [art] Derive CDI
20,302,394 UART: [art] Store in in slot 0x4
20,345,088 UART: [art] Derive Key Pair
20,346,090 UART: [art] Store priv key in slot 0x5
22,772,609 UART: [art] Derive Key Pair - Done
22,785,550 UART: [art] Signing Cert with AUTHO
22,786,850 UART: RITY.KEYID = 7
24,492,667 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,173 UART: [art] PUB.X = E3DB5F7D86DDF8CFAB07978C72B9BE5DE73E5E506B4BB9EFABF7E908BEC692E482947182D6F92EA222632BED31374351
24,501,436 UART: [art] PUB.Y = 0E1A903CBCCD5AA5A8CC68DEC352ED115AA96FEED35D05550AB81187C2FAEF494BFCA38E49E3F48947C94AF3247C7D86
24,508,787 UART: [art] SIG.R = 711BE21B6058A26BD5D1A87E43D2C6564A391700E5BB67FEB480804F2C877625C9D27F4BDCDD5E5F97E4C4A3616050C7
24,516,159 UART: [art] SIG.S = AE8344EF635D3CDDA32354159389C8B2E3CBF629A84973ACFBD7299AD3AE7F9559BDB59210C94A9ECC7D2311A881E348
25,494,991 UART: Caliptra RT
25,495,677 UART: [state] CFI Enabled
25,612,570 UART: [rt] RT listening for mailbox commands...
25,615,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,770,584 UART: [rt]cmd =0x41544d4e, len=14344
29,701,360 >>> mbox cmd response data (8 bytes)
29,701,940 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,732,562 UART: [rt]cmd =0x41545348, len=116
29,734,863 >>> mbox cmd response data (12 bytes)
31,789,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,829,676 >>> mbox cmd response: success
38,830,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,864,854 UART:
38,865,177 UART: Running Caliptra FMC ...
38,866,300 UART:
38,866,455 UART: [state] CFI Enabled
38,910,987 UART: [art] Extend RT PCRs Done
38,912,344 UART: [art] Lock RT PCRs Done
38,913,748 UART: [art] Populate DV Done
38,919,149 UART: [fht] FMC Alias Private Key: 7
38,920,753 UART: [art] Derive CDI
38,921,563 UART: [art] Store in in slot 0x4
38,964,367 UART: [art] Derive Key Pair
38,965,358 UART: [art] Store priv key in slot 0x5
41,392,017 UART: [art] Derive Key Pair - Done
41,404,970 UART: [art] Signing Cert with AUTHO
41,406,281 UART: RITY.KEYID = 7
43,112,107 UART: [art] Erasing AUTHORITY.KEYID = 7
43,113,584 UART: [art] PUB.X = 77F05AB071808135137C50DBA106B017690CE8E8CE3AA8F0DFA15ADFBF1B9774652A3849F6161FB50AAFEB668976AE95
43,120,868 UART: [art] PUB.Y = 0456E2E077DB7BEDAF580AECA7CB31352F9F03CF40BB88A2613EF044046B80BA39847C05DCC5DE6178DA5CF6CF59A78F
43,128,152 UART: [art] SIG.R = 6895668A5A3C96121DD75CD7F9FCF3835AD67F1A0CBF9FCC4DE9357E0F82C857C895DE4239AF0501541094EFA7961080
43,135,537 UART: [art] SIG.S = CA60AFD688BD1B0B37D8CCD5539675FEE76F961C9FD5F6C1D570529C602C3B05728A2A6BEC812B6B2206B1C2594956D6
44,114,603 UART: Caliptra RT
44,115,311 UART: [state] CFI Enabled
44,398,014 UART: [rt] RT listening for mailbox commands...
44,429,857 UART: [rt]cmd =0x41545348, len=116
44,432,004 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,065 UART:
192,428 UART: Running Caliptra ROM ...
193,631 UART:
193,787 UART: [state] CFI Enabled
268,675 UART: [state] LifecycleState = Unprovisioned
271,075 UART: [state] DebugLocked = No
273,998 UART: [state] WD Timer not started. Device not locked for debugging
279,214 UART: [kat] SHA2-256
469,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,861 UART: [kat] ++
480,356 UART: [kat] sha1
492,870 UART: [kat] SHA2-256
495,885 UART: [kat] SHA2-384
502,869 UART: [kat] SHA2-512-ACC
505,517 UART: [kat] ECC-384
2,972,544 UART: [kat] HMAC-384Kdf
2,995,365 UART: [kat] LMS
3,527,096 UART: [kat] --
3,531,589 UART: [cold-reset] ++
3,533,800 UART: [fht] FHT @ 0x50003400
3,544,349 UART: [idev] ++
3,545,050 UART: [idev] CDI.KEYID = 6
3,546,005 UART: [idev] SUBJECT.KEYID = 7
3,547,180 UART: [idev] UDS.KEYID = 0
3,548,081 ready_for_fw is high
3,548,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,692,381 UART: [idev] Erasing UDS.KEYID = 0
6,051,381 UART: [idev] Sha1 KeyId Algorithm
6,073,159 UART: [idev] --
6,077,423 UART: [ldev] ++
6,078,155 UART: [ldev] CDI.KEYID = 6
6,079,068 UART: [ldev] SUBJECT.KEYID = 5
6,080,231 UART: [ldev] AUTHORITY.KEYID = 7
6,081,463 UART: [ldev] FE.KEYID = 1
6,123,327 UART: [ldev] Erasing FE.KEYID = 1
8,626,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,446 UART: [ldev] --
10,434,657 UART: [fwproc] Wait for Commands...
10,436,392 UART: [fwproc] Recv command 0x46574c44
10,438,701 UART: [fwproc] Recv'd Img size: 114448 bytes
13,884,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,624,395 >>> mbox cmd response: success
14,629,274 UART: [afmc] ++
14,629,984 UART: [afmc] CDI.KEYID = 6
14,631,233 UART: [afmc] SUBJECT.KEYID = 7
14,632,673 UART: [afmc] AUTHORITY.KEYID = 5
17,173,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,370 UART: [afmc] --
18,970,775 UART: [cold-reset] --
18,973,933 UART: [state] Locking Datavault
18,979,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,692 UART: [state] Locking ICCM
18,984,546 UART: [exit] Launching FMC @ 0x40000130
18,993,225 UART:
18,993,457 UART: Running Caliptra FMC ...
18,994,556 UART:
18,994,714 UART: [state] CFI Enabled
19,054,329 UART: [fht] FMC Alias Private Key: 7
20,818,037 UART: [art] Extend RT PCRs Done
20,819,245 UART: [art] Lock RT PCRs Done
20,820,762 UART: [art] Populate DV Done
20,826,224 UART: [fht] FMC Alias Private Key: 7
20,827,921 UART: [art] Derive CDI
20,828,750 UART: [art] Store in in slot 0x4
20,886,931 UART: [art] Derive Key Pair
20,887,969 UART: [art] Store priv key in slot 0x5
23,350,563 UART: [art] Derive Key Pair - Done
23,363,445 UART: [art] Signing Cert with AUTHO
23,364,743 UART: RITY.KEYID = 7
25,076,499 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,120 UART: [art] PUB.X = 699A0685727660E8CCB21927E1AB5813ECC5C0C6160C2198DA15F314C4A6371CB84EF59029B95A111569CF4BD7D8265F
25,085,251 UART: [art] PUB.Y = A1C24B6AF4774F1B52159FCE9DEE85C05A6F70BFBF50F02215EDCED445230EA9FC0624384701B7BEE4E60FDCE7D52833
25,092,538 UART: [art] SIG.R = 091EEB71113CFB6CFAA3BB81C55885579051CC6E65ACC9C43F44DCD33410EC41BB1A0C83218C50E273686DF05EC155A7
25,099,926 UART: [art] SIG.S = BBF665F6215DB916323FE7449A3FF038A49E77EFDEFBAAE03C3B2CAB1B335630BC8CD2A96CAA95071C7D382A649156A3
26,078,223 UART: Caliptra RT
26,078,924 UART: [state] CFI Enabled
26,247,345 UART: [rt] RT listening for mailbox commands...
26,249,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,405,602 UART: [rt]cmd =0x41544d4e, len=14344
30,336,101 >>> mbox cmd response data (8 bytes)
30,336,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,367,398 UART: [rt]cmd =0x41545348, len=116
30,369,633 >>> mbox cmd response data (12 bytes)
32,431,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,577,220 UART:
32,577,595 UART: Running Caliptra ROM ...
32,578,734 UART:
32,578,913 UART: [state] CFI Enabled
32,645,377 UART: [state] LifecycleState = Unprovisioned
32,647,489 UART: [state] DebugLocked = No
32,649,873 UART: [state] WD Timer not started. Device not locked for debugging
32,654,101 UART: [kat] SHA2-256
32,843,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,854,700 UART: [kat] ++
32,855,199 UART: [kat] sha1
32,866,258 UART: [kat] SHA2-256
32,869,282 UART: [kat] SHA2-384
32,874,580 UART: [kat] SHA2-512-ACC
32,877,154 UART: [kat] ECC-384
35,330,183 UART: [kat] HMAC-384Kdf
35,349,657 UART: [kat] LMS
35,881,235 UART: [kat] --
35,887,553 UART: [update-reset] ++
39,343,681 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,346,534 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,954,812 >>> mbox cmd response: success
39,959,653 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,960,273 UART: [update-reset] Copying MAN_2 To MAN_1
39,994,406 UART: [update-reset Success] --
40,000,046 UART: [state] Locking Datavault
40,003,807 UART: [state] Locking PCR0, PCR1 and PCR31
40,006,008 UART: [state] Locking ICCM
40,008,421 UART: [exit] Launching FMC @ 0x40000130
40,017,090 UART:
40,017,328 UART: Running Caliptra FMC ...
40,018,429 UART:
40,018,589 UART: [state] CFI Enabled
40,117,251 UART: [art] Extend RT PCRs Done
40,118,477 UART: [art] Lock RT PCRs Done
40,120,072 UART: [art] Populate DV Done
40,125,645 UART: [fht] FMC Alias Private Key: 7
40,127,345 UART: [art] Derive CDI
40,128,160 UART: [art] Store in in slot 0x4
40,186,407 UART: [art] Derive Key Pair
40,187,484 UART: [art] Store priv key in slot 0x5
42,650,721 UART: [art] Derive Key Pair - Done
42,663,510 UART: [art] Signing Cert with AUTHO
42,664,817 UART: RITY.KEYID = 7
44,376,494 UART: [art] Erasing AUTHORITY.KEYID = 7
44,377,998 UART: [art] PUB.X = 0A78064D6690C1DAFAB2128090A2FA3B8AFFB41F5F5337354C4FA0BC6D28C43423717B8A47DB1D5773AFF24ED984CE9B
44,385,306 UART: [art] PUB.Y = D648108F71F383B8E16D6B713A4EF37B5909CD7CD3AE0D5430A2C465B8AAE40FC6702B715AFB0754A8AE68BBF4453627
44,392,579 UART: [art] SIG.R = FA7BFB035F535E4803FBC852DD92A1FE4948D212418D26CF1CC70A5E6B4814990F46D364F5E1E84F4E0C866365F9A740
44,399,965 UART: [art] SIG.S = 22FB2E234DFDC1051245CE59CB42CBD7EFA9F9E728AD4FFFB0F8FF650CA3066B34D20F2EBCF1EDF7251CB0577A981C75
45,377,950 UART: Caliptra RT
45,378,658 UART: [state] CFI Enabled
45,710,141 UART: [rt] RT listening for mailbox commands...
45,741,926 UART: [rt]cmd =0x41545348, len=116
45,744,273 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,439,971 ready_for_fw is high
3,440,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,716,403 >>> mbox cmd response: success
19,003,656 UART:
19,004,047 UART: Running Caliptra FMC ...
19,005,254 UART:
19,005,428 UART: [state] CFI Enabled
19,074,223 UART: [fht] FMC Alias Private Key: 7
20,837,897 UART: [art] Extend RT PCRs Done
20,839,130 UART: [art] Lock RT PCRs Done
20,841,135 UART: [art] Populate DV Done
20,846,765 UART: [fht] FMC Alias Private Key: 7
20,848,468 UART: [art] Derive CDI
20,849,303 UART: [art] Store in in slot 0x4
20,907,263 UART: [art] Derive Key Pair
20,908,257 UART: [art] Store priv key in slot 0x5
23,371,086 UART: [art] Derive Key Pair - Done
23,384,135 UART: [art] Signing Cert with AUTHO
23,385,433 UART: RITY.KEYID = 7
25,097,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,632 UART: [art] PUB.X = C3FEC6CB52481F053708DBD4EC6BF3CA5947CD17A5F590667ADBD7A746DBC5A5715A7F2405F6BB3D6A80C1BDAFFD0747
25,105,927 UART: [art] PUB.Y = 0F19BC09C58B8BBAED66618A03B5325E8BB7B742A0DC41D41288C9706AF1EDEB5FCFEF13A312DC4A76685C9A94686320
25,113,226 UART: [art] SIG.R = 90B2C4E07686E4221D75867A50D978BAE23BE3C66D417EF2B3F84F5FE64BD52C5EBFA54EB91AD8870FCD2780AF693C19
25,120,619 UART: [art] SIG.S = 40E239852BD6FC18EC4C61FEA6FC1F70DB373D5AFFB875F0328CE1253B24FD737F924B1F511F3F2528CCD5F655A7BA78
26,099,124 UART: Caliptra RT
26,099,828 UART: [state] CFI Enabled
26,266,065 UART: [rt] RT listening for mailbox commands...
26,268,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,424,412 UART: [rt]cmd =0x41544d4e, len=14344
30,354,847 >>> mbox cmd response data (8 bytes)
30,355,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,386,053 UART: [rt]cmd =0x41545348, len=116
30,388,074 >>> mbox cmd response data (12 bytes)
32,440,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,253,629 >>> mbox cmd response: success
40,254,199 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,288,147 UART:
40,288,479 UART: Running Caliptra FMC ...
40,289,608 UART:
40,289,774 UART: [state] CFI Enabled
40,380,082 UART: [art] Extend RT PCRs Done
40,381,271 UART: [art] Lock RT PCRs Done
40,383,019 UART: [art] Populate DV Done
40,388,274 UART: [fht] FMC Alias Private Key: 7
40,389,917 UART: [art] Derive CDI
40,390,730 UART: [art] Store in in slot 0x4
40,449,100 UART: [art] Derive Key Pair
40,450,134 UART: [art] Store priv key in slot 0x5
42,913,047 UART: [art] Derive Key Pair - Done
42,926,041 UART: [art] Signing Cert with AUTHO
42,927,376 UART: RITY.KEYID = 7
44,638,601 UART: [art] Erasing AUTHORITY.KEYID = 7
44,640,104 UART: [art] PUB.X = B8915E6057FC6EB1EC6DB8EDAB8EEB625997678A288506C32C188274C0FDC4F0F16A915C2C5614744E6F7C9357F4E54D
44,647,349 UART: [art] PUB.Y = EDF9ADA041AF2BB5264AD2351EB27107AFFC83D929D12848AE6D973984108EB674BC72F1D86E8C895E289EF2E02979CC
44,654,629 UART: [art] SIG.R = A10A45848D5928B007958CBC4166E7860D313C829A1AFA910D8B8F68B9B1430F5D3E386E2F95354A712C87EAF82E9DF4
44,662,027 UART: [art] SIG.S = 70A84FD3F8CD6D81EE4870F292D58EEE144E513E56197D5D17692AC70CA22394C6E78C6CBC777FCE0C2A83ED1E8B819B
45,640,686 UART: Caliptra RT
45,641,379 UART: [state] CFI Enabled
45,977,681 UART: [rt] RT listening for mailbox commands...
46,009,521 UART: [rt]cmd =0x41545348, len=116
46,011,950 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,427 UART:
192,816 UART: Running Caliptra ROM ...
193,956 UART:
603,477 UART: [state] CFI Enabled
618,420 UART: [state] LifecycleState = Unprovisioned
620,791 UART: [state] DebugLocked = No
623,519 UART: [state] WD Timer not started. Device not locked for debugging
628,408 UART: [kat] SHA2-256
818,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,085 UART: [kat] ++
829,683 UART: [kat] sha1
841,651 UART: [kat] SHA2-256
844,626 UART: [kat] SHA2-384
851,538 UART: [kat] SHA2-512-ACC
854,133 UART: [kat] ECC-384
3,296,800 UART: [kat] HMAC-384Kdf
3,310,163 UART: [kat] LMS
3,841,991 UART: [kat] --
3,845,209 UART: [cold-reset] ++
3,846,563 UART: [fht] FHT @ 0x50003400
3,858,532 UART: [idev] ++
3,859,237 UART: [idev] CDI.KEYID = 6
3,860,112 UART: [idev] SUBJECT.KEYID = 7
3,861,342 UART: [idev] UDS.KEYID = 0
3,862,237 ready_for_fw is high
3,862,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,116 UART: [idev] Erasing UDS.KEYID = 0
6,341,452 UART: [idev] Sha1 KeyId Algorithm
6,363,044 UART: [idev] --
6,368,741 UART: [ldev] ++
6,369,438 UART: [ldev] CDI.KEYID = 6
6,370,348 UART: [ldev] SUBJECT.KEYID = 5
6,371,497 UART: [ldev] AUTHORITY.KEYID = 7
6,372,715 UART: [ldev] FE.KEYID = 1
6,385,131 UART: [ldev] Erasing FE.KEYID = 1
8,864,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,226 UART: [ldev] --
10,654,480 UART: [fwproc] Wait for Commands...
10,657,436 UART: [fwproc] Recv command 0x46574c44
10,659,725 UART: [fwproc] Recv'd Img size: 114448 bytes
14,110,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,850,817 >>> mbox cmd response: success
14,855,571 UART: [afmc] ++
14,856,280 UART: [afmc] CDI.KEYID = 6
14,857,503 UART: [afmc] SUBJECT.KEYID = 7
14,858,958 UART: [afmc] AUTHORITY.KEYID = 5
17,362,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,473 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,783 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,912 UART: [afmc] --
19,160,247 UART: [cold-reset] --
19,164,936 UART: [state] Locking Datavault
19,171,332 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,496 UART: [state] Locking ICCM
19,175,161 UART: [exit] Launching FMC @ 0x40000130
19,183,834 UART:
19,184,062 UART: Running Caliptra FMC ...
19,185,159 UART:
19,185,314 UART: [state] CFI Enabled
19,193,360 UART: [fht] FMC Alias Private Key: 7
20,950,655 UART: [art] Extend RT PCRs Done
20,951,875 UART: [art] Lock RT PCRs Done
20,953,419 UART: [art] Populate DV Done
20,958,604 UART: [fht] FMC Alias Private Key: 7
20,960,130 UART: [art] Derive CDI
20,960,856 UART: [art] Store in in slot 0x4
21,003,390 UART: [art] Derive Key Pair
21,004,432 UART: [art] Store priv key in slot 0x5
23,431,382 UART: [art] Derive Key Pair - Done
23,444,292 UART: [art] Signing Cert with AUTHO
23,445,598 UART: RITY.KEYID = 7
25,151,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,961 UART: [art] PUB.X = 92753FCC60E1FDFE7DEB2228F3B0E23F03593DA8459D0407C1629AEB52174658FC0C9FF13E93A65B0E9CF899473D4055
25,160,077 UART: [art] PUB.Y = CB513BD6B7C6CB9714E0E808F1E2E714B9DB5F14A05FC1F5216430EA3E00BE5888BFC6121FAB908CB96A0FFB6DB70764
25,167,345 UART: [art] SIG.R = 98757892F4487CAA24BB7665E494E8CDB0BCD8E933137AD4F33B03887E0EE5DE99CC992BC7EB1D2BEFE9489276C4BA3B
25,174,770 UART: [art] SIG.S = 03EDBE53321837270EDC38F2F790E33CD4E73F63FAC630A0FFC3988F30E3169B89880FD2C1833C8E38D2E84DC9B69DF6
26,154,045 UART: Caliptra RT
26,154,747 UART: [state] CFI Enabled
26,272,089 UART: [rt] RT listening for mailbox commands...
26,274,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,429,920 UART: [rt]cmd =0x41544d4e, len=14344
30,360,039 >>> mbox cmd response data (8 bytes)
30,360,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,391,509 UART: [rt]cmd =0x41545348, len=116
30,393,809 >>> mbox cmd response data (12 bytes)
32,449,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,594,674 UART:
32,595,052 UART: Running Caliptra ROM ...
32,596,103 UART:
32,596,300 UART: [state] CFI Enabled
32,609,005 UART: [state] LifecycleState = Unprovisioned
32,610,907 UART: [state] DebugLocked = No
32,612,929 UART: [state] WD Timer not started. Device not locked for debugging
32,616,604 UART: [kat] SHA2-256
32,806,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,817,043 UART: [kat] ++
32,817,657 UART: [kat] sha1
32,828,652 UART: [kat] SHA2-256
32,831,667 UART: [kat] SHA2-384
32,836,399 UART: [kat] SHA2-512-ACC
32,838,978 UART: [kat] ECC-384
35,279,407 UART: [kat] HMAC-384Kdf
35,292,690 UART: [kat] LMS
35,824,300 UART: [kat] --
35,828,210 UART: [update-reset] ++
39,290,914 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,294,450 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,902,666 >>> mbox cmd response: success
39,907,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,908,038 UART: [update-reset] Copying MAN_2 To MAN_1
39,941,148 UART: [update-reset Success] --
39,946,519 UART: [state] Locking Datavault
39,949,397 UART: [state] Locking PCR0, PCR1 and PCR31
39,951,963 UART: [state] Locking ICCM
39,954,147 UART: [exit] Launching FMC @ 0x40000130
39,962,816 UART:
39,963,050 UART: Running Caliptra FMC ...
39,964,072 UART:
39,964,214 UART: [state] CFI Enabled
40,008,216 UART: [art] Extend RT PCRs Done
40,009,356 UART: [art] Lock RT PCRs Done
40,011,101 UART: [art] Populate DV Done
40,016,499 UART: [fht] FMC Alias Private Key: 7
40,018,088 UART: [art] Derive CDI
40,018,921 UART: [art] Store in in slot 0x4
40,061,656 UART: [art] Derive Key Pair
40,062,749 UART: [art] Store priv key in slot 0x5
42,489,933 UART: [art] Derive Key Pair - Done
42,502,937 UART: [art] Signing Cert with AUTHO
42,504,236 UART: RITY.KEYID = 7
44,210,268 UART: [art] Erasing AUTHORITY.KEYID = 7
44,211,776 UART: [art] PUB.X = A7EE7A4BFB010043A770FAF82FFBC6E6BC9CE162666F8D288FDA697BB60D6DFEF4D923013BA725A3B0342D09A7D0C5C1
44,219,014 UART: [art] PUB.Y = 40704EB90F35C61584C470098FD95529A4E3C303AC4DC910D2D0C1924A0729941426BF0643E2957DB666E2E67F1184D0
44,226,233 UART: [art] SIG.R = B129AD2748FBC182659B5103E725A073C023E91DD9B971D5E9466A95236A1A0CEAC695DAD5F06462A843F4E38E7D5F07
44,233,604 UART: [art] SIG.S = B7ECE4F3682658E0CC591F7BAE8092FC9E89160E6A5EA2A00F60AA7E53139D3A330CAD57A7CF76CFC4412B35B6768CFA
45,213,157 UART: Caliptra RT
45,213,843 UART: [state] CFI Enabled
45,499,062 UART: [rt] RT listening for mailbox commands...
45,531,009 UART: [rt]cmd =0x41545348, len=116
45,533,406 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,756,732 ready_for_fw is high
3,757,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,316 >>> mbox cmd response: success
19,217,219 UART:
19,217,605 UART: Running Caliptra FMC ...
19,218,788 UART:
19,218,957 UART: [state] CFI Enabled
19,226,611 UART: [fht] FMC Alias Private Key: 7
20,983,519 UART: [art] Extend RT PCRs Done
20,984,740 UART: [art] Lock RT PCRs Done
20,986,066 UART: [art] Populate DV Done
20,991,441 UART: [fht] FMC Alias Private Key: 7
20,992,875 UART: [art] Derive CDI
20,993,639 UART: [art] Store in in slot 0x4
21,036,330 UART: [art] Derive Key Pair
21,037,340 UART: [art] Store priv key in slot 0x5
23,464,308 UART: [art] Derive Key Pair - Done
23,477,647 UART: [art] Signing Cert with AUTHO
23,478,968 UART: RITY.KEYID = 7
25,184,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,144 UART: [art] PUB.X = 6B86BF7BC46A299C4FFC478C6C9F7736F4A17D404ABD20BFC2CE0E0BC73766A5143B583789F878248D85F21BC95FD9C9
25,193,424 UART: [art] PUB.Y = 7B32BE5CC4B399F2B423FFBB11DDDF10AAA5397D0220C25FF1D6FD68E44C29A4AB566D52A7EA2EB29720FEE00015379D
25,200,723 UART: [art] SIG.R = E4EE2A2E0EAE5C178A672BA9BE3AAA9CFB558138E8F4B6BC827D1D334D463A818E7CFF3924D1BCA595FB81CBAE2B512D
25,208,095 UART: [art] SIG.S = 36BC9E07E7ED69B691AD873386F1CAF025FD2DB3EE18CD09187F34918E73CFF5A1C17264898CDAC947A4197BA9417460
26,187,233 UART: Caliptra RT
26,187,936 UART: [state] CFI Enabled
26,305,422 UART: [rt] RT listening for mailbox commands...
26,307,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,463,188 UART: [rt]cmd =0x41544d4e, len=14344
30,394,231 >>> mbox cmd response data (8 bytes)
30,394,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,425,721 UART: [rt]cmd =0x41545348, len=116
30,427,851 >>> mbox cmd response data (12 bytes)
32,480,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,219,993 >>> mbox cmd response: success
40,220,605 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,256,810 UART:
40,257,109 UART: Running Caliptra FMC ...
40,258,222 UART:
40,258,380 UART: [state] CFI Enabled
40,302,670 UART: [art] Extend RT PCRs Done
40,303,867 UART: [art] Lock RT PCRs Done
40,305,345 UART: [art] Populate DV Done
40,310,953 UART: [fht] FMC Alias Private Key: 7
40,312,542 UART: [art] Derive CDI
40,313,276 UART: [art] Store in in slot 0x4
40,355,761 UART: [art] Derive Key Pair
40,356,791 UART: [art] Store priv key in slot 0x5
42,783,339 UART: [art] Derive Key Pair - Done
42,795,804 UART: [art] Signing Cert with AUTHO
42,797,109 UART: RITY.KEYID = 7
44,502,957 UART: [art] Erasing AUTHORITY.KEYID = 7
44,504,463 UART: [art] PUB.X = F273BEA3455EF8F41CA4E3B663BA3AF67C6FBC300B36BCDFA8C2A8BF7E500ADD403C22167A173B48BB65D49751E8FCC4
44,511,758 UART: [art] PUB.Y = CFB0883252A1ED1B17A5753D033B2CEB9557648FF91C830543C3A4C3B4F798D22E51FCEB6DD1D50F50081B01A9CEE13B
44,518,989 UART: [art] SIG.R = 7D1B22B66C02BEA7265FBD2D2841CEACF49DFB05F69C6F0373C5C03F0FA63D3E1773A6F59F62E083E8224D2FC656822E
44,526,420 UART: [art] SIG.S = 7CE15E3A57D626C3487370088F30683B6E10314A5285080E6E63EA6C8FC31F0F2AB8F0F57A84FCE6D6A6C683BD6EAEF3
45,505,503 UART: Caliptra RT
45,506,209 UART: [state] CFI Enabled
45,796,008 UART: [rt] RT listening for mailbox commands...
45,827,765 UART: [rt]cmd =0x41545348, len=116
45,829,685 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,938 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,717 UART: [cold-reset] ++
1,477,255 UART: [fht] Storing FHT @ 0x50003400
1,480,024 UART: [idev] ++
1,480,192 UART: [idev] CDI.KEYID = 6
1,480,552 UART: [idev] SUBJECT.KEYID = 7
1,480,976 UART: [idev] UDS.KEYID = 0
1,481,321 ready_for_fw is high
1,481,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,198 UART: [idev] Erasing UDS.KEYID = 0
1,505,602 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,051 UART: [ldev] ++
1,515,219 UART: [ldev] CDI.KEYID = 6
1,515,582 UART: [ldev] SUBJECT.KEYID = 5
1,516,008 UART: [ldev] AUTHORITY.KEYID = 7
1,516,471 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,536 UART: [ldev] --
1,585,933 UART: [fwproc] Waiting for Commands...
1,586,700 UART: [fwproc] Received command 0x46574c44
1,587,491 UART: [fwproc] Received Image of size 114448 bytes
2,887,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,038 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,425 >>> mbox cmd response: success
3,081,469 UART: [afmc] ++
3,081,637 UART: [afmc] CDI.KEYID = 6
3,081,999 UART: [afmc] SUBJECT.KEYID = 7
3,082,424 UART: [afmc] AUTHORITY.KEYID = 5
3,117,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,902 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,592 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,535 UART: [afmc] --
3,160,665 UART: [cold-reset] --
3,161,405 UART: [state] Locking Datavault
3,162,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,290 UART: [state] Locking ICCM
3,163,784 UART: [exit] Launching FMC @ 0x40000130
3,169,113 UART:
3,169,129 UART: Running Caliptra FMC ...
3,169,537 UART:
3,169,591 UART: [state] CFI Enabled
3,180,172 UART: [fht] FMC Alias Private Key: 7
3,287,411 UART: [art] Extend RT PCRs Done
3,287,839 UART: [art] Lock RT PCRs Done
3,289,689 UART: [art] Populate DV Done
3,297,574 UART: [fht] FMC Alias Private Key: 7
3,298,696 UART: [art] Derive CDI
3,298,976 UART: [art] Store in in slot 0x4
3,384,099 UART: [art] Derive Key Pair
3,384,459 UART: [art] Store priv key in slot 0x5
3,397,577 UART: [art] Derive Key Pair - Done
3,412,216 UART: [art] Signing Cert with AUTHO
3,412,696 UART: RITY.KEYID = 7
3,427,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,565 UART: [art] PUB.X = 6E07CC214373678B9F7408736D2C83E07E6734AC7261AC8F8411EBAE9C9E0DB2F3ED4C8BADBBCAC995C1BAF34EB08AF5
3,435,348 UART: [art] PUB.Y = D997A9A3E5274294B5682A363C077512ACE498735BE11AA0373D11244EFDFE87F0A5EB7C3E2B67A68CFB915F24210D3C
3,442,298 UART: [art] SIG.R = 424B7EE74E7BB505EEC5F5B4D607F64CD81178E5784D32B28F8A54F12A50B70B72263C78716A48FA1A0FC5A58F636DAF
3,449,066 UART: [art] SIG.S = 2E7FF2597DB3BD9508F672C76852BEFF6D77728F325BBF0644BAB1FAC16ED4E8CB3EF3657ECC94BC1AB892F692A40E55
3,473,212 UART: Caliptra RT
3,473,465 UART: [state] CFI Enabled
3,582,001 UART: [rt] RT listening for mailbox commands...
3,582,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,115 UART: [rt]cmd =0x41544d4e, len=14344
3,850,921 >>> mbox cmd response data (8 bytes)
3,850,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,945 UART: [rt]cmd =0x41545348, len=116
3,882,569 >>> mbox cmd response data (12 bytes)
3,882,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,350 UART:
3,883,366 UART: Running Caliptra ROM ...
3,883,774 UART:
3,883,828 UART: [state] CFI Enabled
3,886,288 UART: [state] LifecycleState = Unprovisioned
3,886,943 UART: [state] DebugLocked = No
3,887,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,889,218 UART: [kat] SHA2-256
4,683,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,687,264 UART: [kat] ++
4,687,416 UART: [kat] sha1
4,691,548 UART: [kat] SHA2-256
4,693,486 UART: [kat] SHA2-384
4,696,295 UART: [kat] SHA2-512-ACC
4,698,195 UART: [kat] ECC-384
4,703,684 UART: [kat] HMAC-384Kdf
4,708,302 UART: [kat] LMS
5,276,498 UART: [kat] --
5,277,221 UART: [update-reset] ++
6,613,456 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,614,728 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,764,778 >>> mbox cmd response: success
6,764,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,764,911 UART: [update-reset] Copying MAN_2 To MAN_1
6,772,925 UART: [update-reset Success] --
6,773,956 UART: [state] Locking Datavault
6,774,690 UART: [state] Locking PCR0, PCR1 and PCR31
6,775,294 UART: [state] Locking ICCM
6,775,860 UART: [exit] Launching FMC @ 0x40000130
6,781,189 UART:
6,781,205 UART: Running Caliptra FMC ...
6,781,613 UART:
6,781,667 UART: [state] CFI Enabled
6,871,300 UART: [art] Extend RT PCRs Done
6,871,728 UART: [art] Lock RT PCRs Done
6,873,057 UART: [art] Populate DV Done
6,881,266 UART: [fht] FMC Alias Private Key: 7
6,882,302 UART: [art] Derive CDI
6,882,582 UART: [art] Store in in slot 0x4
6,968,363 UART: [art] Derive Key Pair
6,968,723 UART: [art] Store priv key in slot 0x5
6,981,737 UART: [art] Derive Key Pair - Done
6,996,380 UART: [art] Signing Cert with AUTHO
6,996,860 UART: RITY.KEYID = 7
7,012,298 UART: [art] Erasing AUTHORITY.KEYID = 7
7,013,063 UART: [art] PUB.X = 290030EC24867B175832DCA8CD5ECFCED4867AF649C203E60F73B8948AE8E388D872440530CFC54FC14D4D329B20521B
7,019,806 UART: [art] PUB.Y = 656398667FFD0C5F6EBD7037065DAAFE49D7384A12B7A16504FFD4A766FE26C2AF73166BDDEFEAD8CB4830EE3351F529
7,026,763 UART: [art] SIG.R = CE0661DB7CB219B661ACEF62F7AE5B8A9FAD9C261E2CDD34DCDA318A82C0A1A39499BB8E1D1E3EEDA520B5821A8FB08A
7,033,560 UART: [art] SIG.S = FE45FEAD050245485768298F7D365937270BA1421F9137FB379A9F00FB55BC1B6140B0DCB34AC96AC6BDCFBC29D36B6B
7,057,204 UART: Caliptra RT
7,057,457 UART: [state] CFI Enabled
7,339,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,326 UART: [rt]cmd =0x41545348, len=116
7,372,142 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,899 ready_for_fw is high
1,362,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,429 >>> mbox cmd response: success
2,989,553 UART:
2,989,569 UART: Running Caliptra FMC ...
2,989,977 UART:
2,990,031 UART: [state] CFI Enabled
3,000,728 UART: [fht] FMC Alias Private Key: 7
3,107,565 UART: [art] Extend RT PCRs Done
3,107,993 UART: [art] Lock RT PCRs Done
3,109,235 UART: [art] Populate DV Done
3,117,416 UART: [fht] FMC Alias Private Key: 7
3,118,444 UART: [art] Derive CDI
3,118,724 UART: [art] Store in in slot 0x4
3,204,563 UART: [art] Derive Key Pair
3,204,923 UART: [art] Store priv key in slot 0x5
3,218,261 UART: [art] Derive Key Pair - Done
3,233,151 UART: [art] Signing Cert with AUTHO
3,233,631 UART: RITY.KEYID = 7
3,249,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,836 UART: [art] PUB.X = D9CA60929A446AD161C88574972E9A05CB3D43CF17807A1A6E5CD89DC6657B3C256AF10173B9D4A8AF21B12DE6569E68
3,256,606 UART: [art] PUB.Y = E194D8E429B25CAC74AB992B08E40299E82EE8E86CC0E2A457940070ECB6EA37E7A15CFC2373C325A3CCB10C72D4D34D
3,263,539 UART: [art] SIG.R = 8CE6E9158929C3ED290A20305AEE7B06CCC1795F6529D83D072C2FAA77AE321C4E7CFBB57F49779A002B9CB747CAFDCA
3,270,296 UART: [art] SIG.S = 660863FF117B1D5754F12D06E0690C06532FF8919CACAE65360F57EBA097D244574AC4C256EC691EA2A2FF84E0E3D945
3,293,390 UART: Caliptra RT
3,293,643 UART: [state] CFI Enabled
3,402,510 UART: [rt] RT listening for mailbox commands...
3,403,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,618 UART: [rt]cmd =0x41544d4e, len=14344
3,671,480 >>> mbox cmd response data (8 bytes)
3,671,481 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,582 UART: [rt]cmd =0x41545348, len=116
3,703,186 >>> mbox cmd response data (12 bytes)
3,703,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,971 >>> mbox cmd response: success
6,465,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,478,856 UART:
6,478,872 UART: Running Caliptra FMC ...
6,479,280 UART:
6,479,334 UART: [state] CFI Enabled
6,568,397 UART: [art] Extend RT PCRs Done
6,568,825 UART: [art] Lock RT PCRs Done
6,570,170 UART: [art] Populate DV Done
6,578,415 UART: [fht] FMC Alias Private Key: 7
6,579,405 UART: [art] Derive CDI
6,579,685 UART: [art] Store in in slot 0x4
6,665,122 UART: [art] Derive Key Pair
6,665,482 UART: [art] Store priv key in slot 0x5
6,678,226 UART: [art] Derive Key Pair - Done
6,693,194 UART: [art] Signing Cert with AUTHO
6,693,674 UART: RITY.KEYID = 7
6,709,116 UART: [art] Erasing AUTHORITY.KEYID = 7
6,709,881 UART: [art] PUB.X = 39D9C192E11F1238D672BBEB423A3842B676491CA5F16A69EF9287D95BAB148D8DB396CE9AA38409CB08F22DB13D7312
6,716,651 UART: [art] PUB.Y = 2F8BEBA60D62E2E5EAF53EF4532D68114C60E71631B50E4D7FDE5932E5D5D431D395D3124C18CAB17478C6F82EEAC418
6,723,607 UART: [art] SIG.R = A6A45EEB1892E83548F3E10CE33250CE2761516BFD8F6CBDBD38937FD22F5F1F727F757E8E932FAE0DEE2CBFE4137299
6,730,387 UART: [art] SIG.S = 4AA602AECF11AAF9C074884B0271C2287C234413EC0BC55351FC0A9626748A280B574E92FD563248592BFF0AF6F5466E
6,754,212 UART: Caliptra RT
6,754,465 UART: [state] CFI Enabled
7,035,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,065,933 UART: [rt]cmd =0x41545348, len=116
7,067,747 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,174 UART: [kat] SHA2-256
893,112 UART: [kat] SHA2-384
895,757 UART: [kat] SHA2-512-ACC
897,658 UART: [kat] ECC-384
903,461 UART: [kat] HMAC-384Kdf
908,109 UART: [kat] LMS
1,476,305 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,566 UART: [fht] Storing FHT @ 0x50003400
1,480,333 UART: [idev] ++
1,480,501 UART: [idev] CDI.KEYID = 6
1,480,861 UART: [idev] SUBJECT.KEYID = 7
1,481,285 UART: [idev] UDS.KEYID = 0
1,481,630 ready_for_fw is high
1,481,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,165 UART: [idev] Erasing UDS.KEYID = 0
1,506,247 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,839 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,236 UART: [ldev] Erasing FE.KEYID = 1
1,548,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,157 UART: [ldev] --
1,587,430 UART: [fwproc] Waiting for Commands...
1,588,161 UART: [fwproc] Received command 0x46574c44
1,588,952 UART: [fwproc] Received Image of size 114448 bytes
2,887,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,985 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,337 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,368 >>> mbox cmd response: success
3,080,384 UART: [afmc] ++
3,080,552 UART: [afmc] CDI.KEYID = 6
3,080,914 UART: [afmc] SUBJECT.KEYID = 7
3,081,339 UART: [afmc] AUTHORITY.KEYID = 5
3,116,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,173 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,863 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,770 UART: [afmc] --
3,159,782 UART: [cold-reset] --
3,160,512 UART: [state] Locking Datavault
3,161,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,295 UART: [state] Locking ICCM
3,162,801 UART: [exit] Launching FMC @ 0x40000130
3,168,130 UART:
3,168,146 UART: Running Caliptra FMC ...
3,168,554 UART:
3,168,697 UART: [state] CFI Enabled
3,179,426 UART: [fht] FMC Alias Private Key: 7
3,287,573 UART: [art] Extend RT PCRs Done
3,288,001 UART: [art] Lock RT PCRs Done
3,289,297 UART: [art] Populate DV Done
3,297,284 UART: [fht] FMC Alias Private Key: 7
3,298,408 UART: [art] Derive CDI
3,298,688 UART: [art] Store in in slot 0x4
3,384,589 UART: [art] Derive Key Pair
3,384,949 UART: [art] Store priv key in slot 0x5
3,398,309 UART: [art] Derive Key Pair - Done
3,412,634 UART: [art] Signing Cert with AUTHO
3,413,114 UART: RITY.KEYID = 7
3,428,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,031 UART: [art] PUB.X = 35FE1DCCF3974BA52072A7A8C457857C596F6E0F777C7E1EF8B82ED013726CAC230B03940FD6610AAAAA6E56D5AE4B88
3,435,800 UART: [art] PUB.Y = 82596A0A08BA14F462E09211E946FDF8600013899752EFC6A002E79130436788332A20B4B74EF5CFA822A4B9E42E4E16
3,442,713 UART: [art] SIG.R = 576D8D8A83772689DB584B5CCE34AB165AE3368A9B693DAFB56F6B521245AD50713A1F480CC9FD77B62BCDE10B9977BB
3,449,489 UART: [art] SIG.S = 8AE62B0F297F37BD307B9AC48D1FCD61F1D569E7B5397E07E6E0DB49030A63C2313047E9726450DC4BD7069927BCF430
3,473,605 UART: Caliptra RT
3,473,950 UART: [state] CFI Enabled
3,583,077 UART: [rt] RT listening for mailbox commands...
3,583,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,097 UART: [rt]cmd =0x41544d4e, len=14344
3,851,257 >>> mbox cmd response data (8 bytes)
3,851,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,383 UART: [rt]cmd =0x41545348, len=116
3,883,277 >>> mbox cmd response data (12 bytes)
3,883,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,380 UART:
3,884,396 UART: Running Caliptra ROM ...
3,884,804 UART:
3,884,945 UART: [state] CFI Enabled
3,887,879 UART: [state] LifecycleState = Unprovisioned
3,888,534 UART: [state] DebugLocked = No
3,889,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,890,891 UART: [kat] SHA2-256
4,684,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,688,937 UART: [kat] ++
4,689,089 UART: [kat] sha1
4,693,287 UART: [kat] SHA2-256
4,695,225 UART: [kat] SHA2-384
4,697,958 UART: [kat] SHA2-512-ACC
4,699,858 UART: [kat] ECC-384
4,705,639 UART: [kat] HMAC-384Kdf
4,710,233 UART: [kat] LMS
5,278,429 UART: [kat] --
5,279,482 UART: [update-reset] ++
6,616,803 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,617,967 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,768,017 >>> mbox cmd response: success
6,768,017 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,768,346 UART: [update-reset] Copying MAN_2 To MAN_1
6,776,360 UART: [update-reset Success] --
6,777,395 UART: [state] Locking Datavault
6,778,177 UART: [state] Locking PCR0, PCR1 and PCR31
6,778,781 UART: [state] Locking ICCM
6,779,355 UART: [exit] Launching FMC @ 0x40000130
6,784,684 UART:
6,784,700 UART: Running Caliptra FMC ...
6,785,108 UART:
6,785,251 UART: [state] CFI Enabled
6,874,484 UART: [art] Extend RT PCRs Done
6,874,912 UART: [art] Lock RT PCRs Done
6,876,169 UART: [art] Populate DV Done
6,884,450 UART: [fht] FMC Alias Private Key: 7
6,885,426 UART: [art] Derive CDI
6,885,706 UART: [art] Store in in slot 0x4
6,971,619 UART: [art] Derive Key Pair
6,971,979 UART: [art] Store priv key in slot 0x5
6,985,187 UART: [art] Derive Key Pair - Done
6,999,930 UART: [art] Signing Cert with AUTHO
7,000,410 UART: RITY.KEYID = 7
7,015,626 UART: [art] Erasing AUTHORITY.KEYID = 7
7,016,391 UART: [art] PUB.X = 41CEFEC74224BD188DAD92363713D813AB930A0978CC7498E64D8CA95AD62CA9B69795A179A6C0A2A2A501A67ADCC025
7,023,162 UART: [art] PUB.Y = 1AA658EF324CFDDC88146A5748D6DD1196E18D049B0226D5C9FC7B3586488412E96B6A5E50E806D71C515B0ECB86A3F0
7,030,106 UART: [art] SIG.R = 9C4D23F00CEDA86DAE98FAE533B5B942714F0DE46C33340547A42AFEA9B36D1CB548B6A2F5686C25B3218577A5C0EA84
7,036,879 UART: [art] SIG.S = 6A2933F4E8E57D2C692C445E60CB5220C7245D33370FAC1F54B09C75F6F59183A19DDBE4F0A57FE953A561BA84BD7AFC
7,060,883 UART: Caliptra RT
7,061,228 UART: [state] CFI Enabled
7,338,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,369,180 UART: [rt]cmd =0x41545348, len=116
7,370,938 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,542 ready_for_fw is high
1,362,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,996 >>> mbox cmd response: success
2,992,228 UART:
2,992,244 UART: Running Caliptra FMC ...
2,992,652 UART:
2,992,795 UART: [state] CFI Enabled
3,003,648 UART: [fht] FMC Alias Private Key: 7
3,112,083 UART: [art] Extend RT PCRs Done
3,112,511 UART: [art] Lock RT PCRs Done
3,114,065 UART: [art] Populate DV Done
3,122,080 UART: [fht] FMC Alias Private Key: 7
3,123,026 UART: [art] Derive CDI
3,123,306 UART: [art] Store in in slot 0x4
3,208,945 UART: [art] Derive Key Pair
3,209,305 UART: [art] Store priv key in slot 0x5
3,222,369 UART: [art] Derive Key Pair - Done
3,236,936 UART: [art] Signing Cert with AUTHO
3,237,416 UART: RITY.KEYID = 7
3,253,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,851 UART: [art] PUB.X = FD4B70C893F9A4ACD3F7A5B98B6CDE42156EF8ADE5CAF81A148527EBA9EE7D6E83502346553F3AA09D2477C1BA71E676
3,260,639 UART: [art] PUB.Y = 56F7757257C2FFA889B58895077AA1BDF4F8EE72E7FC58A1464CF71678025B3BB9943F9A76A4D2778106AC7286043CB4
3,267,577 UART: [art] SIG.R = 73CA2FF77E035C895E53F6295509D0B3AD1D46AE7CF6B305DDD4D49BBF87B48E895944F4A82C585EEAA0301203B64486
3,274,343 UART: [art] SIG.S = 419702F0B98879E462AA2955269141127A432344A17933548CF5CDA178B17174E1F86BF9CA647249F7FC1F0C97EE13A4
3,297,660 UART: Caliptra RT
3,298,005 UART: [state] CFI Enabled
3,405,983 UART: [rt] RT listening for mailbox commands...
3,406,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,595 UART: [rt]cmd =0x41544d4e, len=14344
3,674,045 >>> mbox cmd response data (8 bytes)
3,674,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,999 UART: [rt]cmd =0x41545348, len=116
3,705,893 >>> mbox cmd response data (12 bytes)
3,705,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,171 >>> mbox cmd response: success
6,469,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,482,788 UART:
6,482,804 UART: Running Caliptra FMC ...
6,483,212 UART:
6,483,355 UART: [state] CFI Enabled
6,571,944 UART: [art] Extend RT PCRs Done
6,572,372 UART: [art] Lock RT PCRs Done
6,573,631 UART: [art] Populate DV Done
6,581,686 UART: [fht] FMC Alias Private Key: 7
6,582,806 UART: [art] Derive CDI
6,583,086 UART: [art] Store in in slot 0x4
6,668,341 UART: [art] Derive Key Pair
6,668,701 UART: [art] Store priv key in slot 0x5
6,682,237 UART: [art] Derive Key Pair - Done
6,697,393 UART: [art] Signing Cert with AUTHO
6,697,873 UART: RITY.KEYID = 7
6,712,725 UART: [art] Erasing AUTHORITY.KEYID = 7
6,713,490 UART: [art] PUB.X = CCAF2C3F5E22DDB578144010E98C64BC6DC2D7E45FD0A2B9251FED0AE8546858DCA218C86C57028A0225CADEB1FC5E9E
6,720,273 UART: [art] PUB.Y = ED247ECD605334A0339869FCB96D9476A62995820D745E0A880A6178D31A4BF53C9A6AEB6D0F5021BC4E423C46684A64
6,727,211 UART: [art] SIG.R = D9D8579F7D7DE63228D2A6D50E4774FF82193E7FDD92FD08334F530E251DB3167B5EAED2433436064B61B4D6F9241822
6,733,969 UART: [art] SIG.S = 62359D345CD6B2AE001EB1E33CD90E748629ACAF03504F0384FA74D3127A73B48E641F4F4C0EF6D51F4783062357CF1B
6,757,927 UART: Caliptra RT
6,758,272 UART: [state] CFI Enabled
7,040,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,071,460 UART: [rt]cmd =0x41545348, len=116
7,073,148 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,228 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,172,135 UART: [cold-reset] ++
1,172,481 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 ready_for_fw is high
1,176,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,070 UART: [idev] Erasing UDS.KEYID = 0
1,201,123 UART: [idev] Sha1 KeyId Algorithm
1,209,683 UART: [idev] --
1,210,777 UART: [ldev] ++
1,210,945 UART: [ldev] CDI.KEYID = 6
1,211,308 UART: [ldev] SUBJECT.KEYID = 5
1,211,734 UART: [ldev] AUTHORITY.KEYID = 7
1,212,197 UART: [ldev] FE.KEYID = 1
1,217,605 UART: [ldev] Erasing FE.KEYID = 1
1,243,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,543 UART: [ldev] --
1,283,032 UART: [fwproc] Wait for Commands...
1,283,710 UART: [fwproc] Recv command 0x46574c44
1,284,438 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,556 >>> mbox cmd response: success
2,777,576 UART: [afmc] ++
2,777,744 UART: [afmc] CDI.KEYID = 6
2,778,106 UART: [afmc] SUBJECT.KEYID = 7
2,778,531 UART: [afmc] AUTHORITY.KEYID = 5
2,813,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,951 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,555 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,233 UART: [afmc] --
2,856,165 UART: [cold-reset] --
2,857,121 UART: [state] Locking Datavault
2,858,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,900 UART: [state] Locking ICCM
2,859,428 UART: [exit] Launching FMC @ 0x40000130
2,864,757 UART:
2,864,773 UART: Running Caliptra FMC ...
2,865,181 UART:
2,865,235 UART: [state] CFI Enabled
2,876,208 UART: [fht] FMC Alias Private Key: 7
2,984,545 UART: [art] Extend RT PCRs Done
2,984,973 UART: [art] Lock RT PCRs Done
2,986,669 UART: [art] Populate DV Done
2,994,804 UART: [fht] FMC Alias Private Key: 7
2,995,962 UART: [art] Derive CDI
2,996,242 UART: [art] Store in in slot 0x4
3,082,005 UART: [art] Derive Key Pair
3,082,365 UART: [art] Store priv key in slot 0x5
3,095,627 UART: [art] Derive Key Pair - Done
3,110,445 UART: [art] Signing Cert with AUTHO
3,110,925 UART: RITY.KEYID = 7
3,126,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,926 UART: [art] PUB.X = B82422C03FFB5B86CC7A43CB88763ED020E0430AA1A9D6C1147FDD29EF499868EFC3773744B76684F1BBB3059BA9FF31
3,133,700 UART: [art] PUB.Y = E89F0A65F2D100E3ED0E06201ADA8B1D73213E691C0D8BBE2CCF10018C426EF38E81740D53432B6047775171E0E98DC1
3,140,614 UART: [art] SIG.R = E116E90ECB5F2FA7E8EE99EC261D1295A753580BE9BC4070DF67555B1EF7F76DC085CFC81F5EAC8D512F0E2C1FD88EEA
3,147,399 UART: [art] SIG.S = E929D4BDE2683DFE8DE3E6F7F4A96FC270336B7F013473A23128628F8E22C1758578F09CDAE53FE3937D8AAAA1FA2A8D
3,171,085 UART: Caliptra RT
3,171,338 UART: [state] CFI Enabled
3,279,314 UART: [rt] RT listening for mailbox commands...
3,279,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,100 UART: [rt]cmd =0x41544d4e, len=14344
3,548,300 >>> mbox cmd response data (8 bytes)
3,548,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,330 UART: [rt]cmd =0x41545348, len=116
3,580,112 >>> mbox cmd response data (12 bytes)
3,580,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,712 UART:
3,580,728 UART: Running Caliptra ROM ...
3,581,136 UART:
3,581,191 UART: [state] CFI Enabled
3,584,189 UART: [state] LifecycleState = Unprovisioned
3,584,844 UART: [state] DebugLocked = No
3,585,348 UART: [state] WD Timer not started. Device not locked for debugging
3,586,686 UART: [kat] SHA2-256
4,392,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,396,461 UART: [kat] ++
4,396,613 UART: [kat] sha1
4,401,009 UART: [kat] SHA2-256
4,402,949 UART: [kat] SHA2-384
4,405,700 UART: [kat] SHA2-512-ACC
4,407,600 UART: [kat] ECC-384
4,417,225 UART: [kat] HMAC-384Kdf
4,421,727 UART: [kat] LMS
4,670,055 UART: [kat] --
4,671,035 UART: [update-reset] ++
5,985,482 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,986,485 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,136,483 >>> mbox cmd response: success
6,136,483 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,136,628 UART: [update-reset] Copying MAN_2 To MAN_1
6,144,642 UART: [update-reset Success] --
6,145,693 UART: [state] Locking Datavault
6,146,503 UART: [state] Locking PCR0, PCR1 and PCR31
6,147,107 UART: [state] Locking ICCM
6,147,527 UART: [exit] Launching FMC @ 0x40000130
6,152,856 UART:
6,152,872 UART: Running Caliptra FMC ...
6,153,280 UART:
6,153,334 UART: [state] CFI Enabled
6,242,487 UART: [art] Extend RT PCRs Done
6,242,915 UART: [art] Lock RT PCRs Done
6,244,178 UART: [art] Populate DV Done
6,252,293 UART: [fht] FMC Alias Private Key: 7
6,253,465 UART: [art] Derive CDI
6,253,745 UART: [art] Store in in slot 0x4
6,339,182 UART: [art] Derive Key Pair
6,339,542 UART: [art] Store priv key in slot 0x5
6,352,568 UART: [art] Derive Key Pair - Done
6,367,201 UART: [art] Signing Cert with AUTHO
6,367,681 UART: RITY.KEYID = 7
6,383,273 UART: [art] Erasing AUTHORITY.KEYID = 7
6,384,038 UART: [art] PUB.X = ECEB7220BE38AF1C2B2FB4FB9F1FDEE058C1E94A620FD75E42581BD6A6400B192F48A7B531F49F10EB8B0FD178A920ED
6,390,821 UART: [art] PUB.Y = 035FE1C1FAE64CB16AF85A6CCF187F7919A6DB0BADE1E0431C3EF635A5D471947EFB6646336F8949DB3A02C523895188
6,397,772 UART: [art] SIG.R = 067E0E54EA3B16FAE01CFA1691319CED13CE1721F84A506EB9F74C91E2E7EC472CD3C143EAE9ACCD4B35EBCE05B0FF54
6,404,559 UART: [art] SIG.S = AD0D1C920B7015E7399DE57D4DFFFF7DCEE3BB768AB60478C44864DA37FF99D26FCFCE960EE4F94B2887CDE85F9BEA42
6,428,614 UART: Caliptra RT
6,428,867 UART: [state] CFI Enabled
6,713,434 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,744,295 UART: [rt]cmd =0x41545348, len=116
6,746,353 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 ready_for_fw is high
1,060,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,665 >>> mbox cmd response: success
2,688,747 UART:
2,688,763 UART: Running Caliptra FMC ...
2,689,171 UART:
2,689,225 UART: [state] CFI Enabled
2,699,640 UART: [fht] FMC Alias Private Key: 7
2,807,621 UART: [art] Extend RT PCRs Done
2,808,049 UART: [art] Lock RT PCRs Done
2,809,797 UART: [art] Populate DV Done
2,818,116 UART: [fht] FMC Alias Private Key: 7
2,819,194 UART: [art] Derive CDI
2,819,474 UART: [art] Store in in slot 0x4
2,905,563 UART: [art] Derive Key Pair
2,905,923 UART: [art] Store priv key in slot 0x5
2,919,621 UART: [art] Derive Key Pair - Done
2,934,422 UART: [art] Signing Cert with AUTHO
2,934,902 UART: RITY.KEYID = 7
2,949,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,641 UART: [art] PUB.X = 340B2962EDEB9E92582397A8B42EDC8BE85E067A1507DF30D700C23C35A61BA38327789C977D6CE88EEDE5A6DCEA586A
2,957,392 UART: [art] PUB.Y = 4F7CCFF475776B61BFD645F91A86D300789D1F77013E02775D357870A6CF96520A4AF2AC904EA69177A7E112DF9ADF14
2,964,315 UART: [art] SIG.R = D9BB0EEDD28B2D19374CC3A93BF3F5978DB0B166BF55ED8C877BE7333C5C3693B66C43D18DD9E3924CBC55A4E70DFC17
2,971,099 UART: [art] SIG.S = F927CE85B5696255B45D7F01A44D29C295C4EDAB9FD01159AF02EB531AA080EEC4F692AD54EA7BCB88C37683CDB47612
2,994,686 UART: Caliptra RT
2,994,939 UART: [state] CFI Enabled
3,102,039 UART: [rt] RT listening for mailbox commands...
3,102,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,725 UART: [rt]cmd =0x41544d4e, len=14344
3,370,295 >>> mbox cmd response data (8 bytes)
3,370,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,401 UART: [rt]cmd =0x41545348, len=116
3,402,025 >>> mbox cmd response data (12 bytes)
3,402,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,011 >>> mbox cmd response: success
5,842,011 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,855,359 UART:
5,855,375 UART: Running Caliptra FMC ...
5,855,783 UART:
5,855,837 UART: [state] CFI Enabled
5,944,726 UART: [art] Extend RT PCRs Done
5,945,154 UART: [art] Lock RT PCRs Done
5,946,561 UART: [art] Populate DV Done
5,954,770 UART: [fht] FMC Alias Private Key: 7
5,955,808 UART: [art] Derive CDI
5,956,088 UART: [art] Store in in slot 0x4
6,041,579 UART: [art] Derive Key Pair
6,041,939 UART: [art] Store priv key in slot 0x5
6,055,647 UART: [art] Derive Key Pair - Done
6,070,813 UART: [art] Signing Cert with AUTHO
6,071,293 UART: RITY.KEYID = 7
6,086,573 UART: [art] Erasing AUTHORITY.KEYID = 7
6,087,338 UART: [art] PUB.X = 582E8E81E68B686243119B9E34DC3F27053FCEC2C2B4EFA31B84BE4A09915769381AFA1466E247DB859ED1F022C54209
6,094,101 UART: [art] PUB.Y = C6F4B2D41ADE00CB3A1B67A6282ADE08B3C5D1E53A26A1FDA6885B87B9B9CD9FEE69C43D88C0271E9E3AAC441E1A697A
6,101,050 UART: [art] SIG.R = 5B3F270AAB46F0311E9FA96296957C619A97E8B1C5FB1FA550750755FCDB95285E72BED1ABBAB2B8D1881A287BDE99CD
6,107,830 UART: [art] SIG.S = AA5E35E15F88AFC914B18C5CB9C874279B85673E072DF0366762F8FC96C932DC230948C4BBA127DC8DFA3D539712C5BB
6,131,827 UART: Caliptra RT
6,132,080 UART: [state] CFI Enabled
6,414,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,445,408 UART: [rt]cmd =0x41545348, len=116
6,446,888 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,295 UART: [kat] LMS
1,171,623 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,433 UART: [idev] ++
1,175,601 UART: [idev] CDI.KEYID = 6
1,175,961 UART: [idev] SUBJECT.KEYID = 7
1,176,385 UART: [idev] UDS.KEYID = 0
1,176,730 ready_for_fw is high
1,176,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,525 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,988 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,678 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,500 UART: [ldev] --
1,282,991 UART: [fwproc] Wait for Commands...
1,283,779 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,289 >>> mbox cmd response: success
2,778,515 UART: [afmc] ++
2,778,683 UART: [afmc] CDI.KEYID = 6
2,779,045 UART: [afmc] SUBJECT.KEYID = 7
2,779,470 UART: [afmc] AUTHORITY.KEYID = 5
2,815,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,006 UART: [afmc] --
2,859,096 UART: [cold-reset] --
2,859,806 UART: [state] Locking Datavault
2,861,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,789 UART: [state] Locking ICCM
2,862,461 UART: [exit] Launching FMC @ 0x40000130
2,867,790 UART:
2,867,806 UART: Running Caliptra FMC ...
2,868,214 UART:
2,868,357 UART: [state] CFI Enabled
2,879,264 UART: [fht] FMC Alias Private Key: 7
2,987,617 UART: [art] Extend RT PCRs Done
2,988,045 UART: [art] Lock RT PCRs Done
2,989,579 UART: [art] Populate DV Done
2,997,788 UART: [fht] FMC Alias Private Key: 7
2,998,912 UART: [art] Derive CDI
2,999,192 UART: [art] Store in in slot 0x4
3,084,425 UART: [art] Derive Key Pair
3,084,785 UART: [art] Store priv key in slot 0x5
3,097,913 UART: [art] Derive Key Pair - Done
3,112,562 UART: [art] Signing Cert with AUTHO
3,113,042 UART: RITY.KEYID = 7
3,128,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,169 UART: [art] PUB.X = C3DA8C8A459F7B7175348C6E6BC0DE8198501642E84A80D29769340A63006FA3B3713CCEF579AEB448A31F99106E201E
3,135,914 UART: [art] PUB.Y = AF4913F3DB164050ED4797B2A8290ACF90E2CCE5B13CD154054B6698D4FA93B9634C4800B915C7FB844873F2F0DC7F31
3,142,842 UART: [art] SIG.R = 252AC08EED2F6E930C89BE683CE01C3861645AD15E26F3DFED41D506C149136B84097AC36B11BD14B630D6224CAAACBA
3,149,617 UART: [art] SIG.S = 7607982C5FCED550EC4F1870160CC61CFE14AD960F0BBF6CA9A5EC451DD0DC9B08C5C6ED7EA4B90D33699186A88FAEFA
3,173,224 UART: Caliptra RT
3,173,569 UART: [state] CFI Enabled
3,281,334 UART: [rt] RT listening for mailbox commands...
3,282,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,040 UART: [rt]cmd =0x41544d4e, len=14344
3,550,048 >>> mbox cmd response data (8 bytes)
3,550,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,294 UART: [rt]cmd =0x41545348, len=116
3,581,974 >>> mbox cmd response data (12 bytes)
3,581,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,638 UART:
3,582,654 UART: Running Caliptra ROM ...
3,583,062 UART:
3,583,204 UART: [state] CFI Enabled
3,585,658 UART: [state] LifecycleState = Unprovisioned
3,586,313 UART: [state] DebugLocked = No
3,586,937 UART: [state] WD Timer not started. Device not locked for debugging
3,588,287 UART: [kat] SHA2-256
4,393,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,398,062 UART: [kat] ++
4,398,214 UART: [kat] sha1
4,402,500 UART: [kat] SHA2-256
4,404,440 UART: [kat] SHA2-384
4,407,221 UART: [kat] SHA2-512-ACC
4,409,121 UART: [kat] ECC-384
4,418,776 UART: [kat] HMAC-384Kdf
4,423,356 UART: [kat] LMS
4,671,684 UART: [kat] --
4,672,344 UART: [update-reset] ++
5,985,371 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,986,484 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,136,482 >>> mbox cmd response: success
6,136,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,136,765 UART: [update-reset] Copying MAN_2 To MAN_1
6,144,779 UART: [update-reset Success] --
6,145,784 UART: [state] Locking Datavault
6,146,516 UART: [state] Locking PCR0, PCR1 and PCR31
6,147,120 UART: [state] Locking ICCM
6,147,664 UART: [exit] Launching FMC @ 0x40000130
6,152,993 UART:
6,153,009 UART: Running Caliptra FMC ...
6,153,417 UART:
6,153,560 UART: [state] CFI Enabled
6,243,139 UART: [art] Extend RT PCRs Done
6,243,567 UART: [art] Lock RT PCRs Done
6,244,816 UART: [art] Populate DV Done
6,252,825 UART: [fht] FMC Alias Private Key: 7
6,253,837 UART: [art] Derive CDI
6,254,117 UART: [art] Store in in slot 0x4
6,340,068 UART: [art] Derive Key Pair
6,340,428 UART: [art] Store priv key in slot 0x5
6,353,944 UART: [art] Derive Key Pair - Done
6,368,819 UART: [art] Signing Cert with AUTHO
6,369,299 UART: RITY.KEYID = 7
6,384,653 UART: [art] Erasing AUTHORITY.KEYID = 7
6,385,418 UART: [art] PUB.X = D9ECA5E065D86DB63E3DFE99AB5BCB2D65CC35C31C6806948C51C56B87251DAAC454157B592D44FAFE2C6DF413C8C0A8
6,392,205 UART: [art] PUB.Y = 1AA66FB5CB2A98650920AFA803242FD6D3C1F110C7CC740DE6E44FAD8899FD71A55F5F250D0338A5C1F7C6BB315EE356
6,399,154 UART: [art] SIG.R = 33D7247EA003EB79D76BC671A9F4EC718B126CB47DAFC67F47B28B6FC23827F20DFC5A253289A3CF9DDEDA2CA4D3F8F7
6,405,940 UART: [art] SIG.S = 8C5545DDEFD5AC8B8429481FBB3E14A4B2A3D45123693967780EC22E7BCC5D9AAE05B24753672432A7C6568A3A912E62
6,429,583 UART: Caliptra RT
6,429,928 UART: [state] CFI Enabled
6,707,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,738,172 UART: [rt]cmd =0x41545348, len=116
6,740,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,390 ready_for_fw is high
1,060,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,642 >>> mbox cmd response: success
2,690,110 UART:
2,690,126 UART: Running Caliptra FMC ...
2,690,534 UART:
2,690,677 UART: [state] CFI Enabled
2,701,150 UART: [fht] FMC Alias Private Key: 7
2,809,065 UART: [art] Extend RT PCRs Done
2,809,493 UART: [art] Lock RT PCRs Done
2,811,025 UART: [art] Populate DV Done
2,819,360 UART: [fht] FMC Alias Private Key: 7
2,820,364 UART: [art] Derive CDI
2,820,644 UART: [art] Store in in slot 0x4
2,905,967 UART: [art] Derive Key Pair
2,906,327 UART: [art] Store priv key in slot 0x5
2,919,441 UART: [art] Derive Key Pair - Done
2,933,965 UART: [art] Signing Cert with AUTHO
2,934,445 UART: RITY.KEYID = 7
2,949,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,814 UART: [art] PUB.X = CFBE4EEBAA233836BB1281885CD10A7F2EA5ADD865E2F3825517F4588C43C6531EB592C7EDE51A875DDB6EAE1F9B279B
2,956,601 UART: [art] PUB.Y = 45316652A18F81E8B19867BC28DE6E7683A11B7006DD561FC9A864354F750C6A79BC51AAD83454A45A7223491ACF73D1
2,963,543 UART: [art] SIG.R = E7BB5DFAD5C2F08E856D124284B956CD6323492E69460A18C8AE67262F9E98276987D8EEE4E78827F2A75A283D808BBD
2,970,314 UART: [art] SIG.S = E6283A9E1BAAD2F0A9524FF33AC8FE918B22B4FBB1F72F030208175FBE24A724C795D22A1835A752F9309617A27A54A5
2,993,398 UART: Caliptra RT
2,993,743 UART: [state] CFI Enabled
3,102,455 UART: [rt] RT listening for mailbox commands...
3,103,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,211 UART: [rt]cmd =0x41544d4e, len=14344
3,371,397 >>> mbox cmd response data (8 bytes)
3,371,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,687 UART: [rt]cmd =0x41545348, len=116
3,403,555 >>> mbox cmd response data (12 bytes)
3,403,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,854 >>> mbox cmd response: success
5,842,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,856,346 UART:
5,856,362 UART: Running Caliptra FMC ...
5,856,770 UART:
5,856,913 UART: [state] CFI Enabled
5,945,646 UART: [art] Extend RT PCRs Done
5,946,074 UART: [art] Lock RT PCRs Done
5,947,435 UART: [art] Populate DV Done
5,955,372 UART: [fht] FMC Alias Private Key: 7
5,956,488 UART: [art] Derive CDI
5,956,768 UART: [art] Store in in slot 0x4
6,042,199 UART: [art] Derive Key Pair
6,042,559 UART: [art] Store priv key in slot 0x5
6,056,285 UART: [art] Derive Key Pair - Done
6,070,814 UART: [art] Signing Cert with AUTHO
6,071,294 UART: RITY.KEYID = 7
6,086,088 UART: [art] Erasing AUTHORITY.KEYID = 7
6,086,853 UART: [art] PUB.X = 9FBC562EEE6DFB5C3840546D39821DC811E0A3C56B5198524FA7BD9FB824F570D47BD52C21B382EA67132061D4BA7E2F
6,093,633 UART: [art] PUB.Y = E2DA54579D138748CF29C529C774B057865B0508D2B40687A3ED84D40F401285DB4499E6BF39AAEECE29A83CF3A848FA
6,100,577 UART: [art] SIG.R = 0E53740855371DE854DE07E4F6312E082D4356EFEE45789EE90F4707CC2AD6D7613413F461989957761EF1DC3CCCB8BE
6,107,331 UART: [art] SIG.S = 36F5AD360AEA3281F9A2E65394BA93B59FFA320B3A8E96AC88B26C58E988C66BF1E042EE89C5D03F3D73683981B28BFA
6,130,626 UART: Caliptra RT
6,130,971 UART: [state] CFI Enabled
6,409,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,440,561 UART: [rt]cmd =0x41545348, len=116
6,442,339 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,207,956 UART: [ldev] ++
1,208,124 UART: [ldev] CDI.KEYID = 6
1,208,488 UART: [ldev] SUBJECT.KEYID = 5
1,208,915 UART: [ldev] AUTHORITY.KEYID = 7
1,209,378 UART: [ldev] FE.KEYID = 1
1,214,610 UART: [ldev] Erasing FE.KEYID = 1
1,240,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,044 UART: [ldev] --
1,279,506 UART: [fwproc] Wait for Commands...
1,280,203 UART: [fwproc] Recv command 0x46574c44
1,280,936 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,040 >>> mbox cmd response: success
2,773,247 UART: [afmc] ++
2,773,415 UART: [afmc] CDI.KEYID = 6
2,773,778 UART: [afmc] SUBJECT.KEYID = 7
2,774,204 UART: [afmc] AUTHORITY.KEYID = 5
2,810,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,272 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,894 UART: [afmc] --
2,853,932 UART: [cold-reset] --
2,854,770 UART: [state] Locking Datavault
2,855,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,597 UART: [state] Locking ICCM
2,857,035 UART: [exit] Launching FMC @ 0x40000130
2,862,364 UART:
2,862,380 UART: Running Caliptra FMC ...
2,862,788 UART:
2,862,842 UART: [state] CFI Enabled
2,873,205 UART: [fht] FMC Alias Private Key: 7
2,981,120 UART: [art] Extend RT PCRs Done
2,981,548 UART: [art] Lock RT PCRs Done
2,983,120 UART: [art] Populate DV Done
2,991,601 UART: [fht] FMC Alias Private Key: 7
2,992,673 UART: [art] Derive CDI
2,992,953 UART: [art] Store in in slot 0x4
3,078,356 UART: [art] Derive Key Pair
3,078,716 UART: [art] Store priv key in slot 0x5
3,091,924 UART: [art] Derive Key Pair - Done
3,106,360 UART: [art] Signing Cert with AUTHO
3,106,840 UART: RITY.KEYID = 7
3,122,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,195 UART: [art] PUB.X = F2614E6A2A2BF5853E6F9795B240ACBE63CBB0A094615776938C8810478A6D45242922EF0B57C57AD616326CE880B2FB
3,129,962 UART: [art] PUB.Y = E6A330C6B2B3343AC219B111CF97E5485CD3196CF11BAB1C65FDFEF3D42CF0F140697AEEAB81D5A6CD83BED589C164EF
3,136,936 UART: [art] SIG.R = A44712BA38577AF13D63A638793E27C13565F2DFFB7C109B4E73CD779D45BC32BD380D6AE74178720A557F1E04365C9C
3,143,699 UART: [art] SIG.S = E5535D0BA84741FDBCBEAD089453AEA2BAB48CCAEEC862097E719519DC3C3E63169CAFF6A5A4AD6FEEA536BF17112F94
3,166,855 UART: Caliptra RT
3,167,108 UART: [state] CFI Enabled
3,275,410 UART: [rt] RT listening for mailbox commands...
3,276,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,216 UART: [rt]cmd =0x41544d4e, len=14344
3,544,388 >>> mbox cmd response data (8 bytes)
3,544,389 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,344 UART: [rt]cmd =0x41545348, len=116
3,576,342 >>> mbox cmd response data (12 bytes)
3,576,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,308 UART:
3,577,324 UART: Running Caliptra ROM ...
3,577,732 UART:
3,577,787 UART: [state] CFI Enabled
3,579,931 UART: [state] LifecycleState = Unprovisioned
3,580,586 UART: [state] DebugLocked = No
3,581,090 UART: [state] WD Timer not started. Device not locked for debugging
3,582,392 UART: [kat] SHA2-256
4,385,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,390,071 UART: [kat] ++
4,390,223 UART: [kat] sha1
4,394,465 UART: [kat] SHA2-256
4,396,405 UART: [kat] SHA2-384
4,399,090 UART: [kat] SHA2-512-ACC
4,400,990 UART: [kat] ECC-384
4,410,697 UART: [kat] HMAC-384Kdf
4,415,379 UART: [kat] LMS
4,663,691 UART: [kat] --
4,664,773 UART: [update-reset] ++
5,979,267 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,980,300 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,130,298 >>> mbox cmd response: success
6,130,298 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,130,615 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,629 UART: [update-reset Success] --
6,139,518 UART: [state] Locking Datavault
6,140,216 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,820 UART: [state] Locking ICCM
6,141,314 UART: [exit] Launching FMC @ 0x40000130
6,146,643 UART:
6,146,659 UART: Running Caliptra FMC ...
6,147,067 UART:
6,147,121 UART: [state] CFI Enabled
6,236,280 UART: [art] Extend RT PCRs Done
6,236,708 UART: [art] Lock RT PCRs Done
6,238,105 UART: [art] Populate DV Done
6,246,118 UART: [fht] FMC Alias Private Key: 7
6,247,294 UART: [art] Derive CDI
6,247,574 UART: [art] Store in in slot 0x4
6,333,363 UART: [art] Derive Key Pair
6,333,723 UART: [art] Store priv key in slot 0x5
6,346,625 UART: [art] Derive Key Pair - Done
6,361,239 UART: [art] Signing Cert with AUTHO
6,361,719 UART: RITY.KEYID = 7
6,376,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,516 UART: [art] PUB.X = 0B209F989BAFF2EAE9858872B904B59D10CE7E40D8F078387023C8B1C27731C0127F594BA013D70E59F8290802DE6280
6,384,267 UART: [art] PUB.Y = 2EEE03E71A24C3AD0FC455402D599B6BA624CE47C0F39CB903B10C54840CB93F5C833732B05B1CEE69A07148691B4AA8
6,391,210 UART: [art] SIG.R = 49B7DFF40DEB90F5AB440E935AEC184F41E60D7FAE4B705C97FC4B863FA3A22FE1F6A966244F40A99D5A096538D77856
6,397,980 UART: [art] SIG.S = AE2988C95E498F83D243D48A98DFB72D0D9BD1CCB191AA93C482CC10C0F637095007D7D11188FEE8AD63DEFB91D9B3FD
6,422,214 UART: Caliptra RT
6,422,467 UART: [state] CFI Enabled
6,702,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,733,709 UART: [rt]cmd =0x41545348, len=116
6,735,679 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,638 ready_for_fw is high
1,055,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,640 >>> mbox cmd response: success
2,686,724 UART:
2,686,740 UART: Running Caliptra FMC ...
2,687,148 UART:
2,687,202 UART: [state] CFI Enabled
2,697,567 UART: [fht] FMC Alias Private Key: 7
2,805,480 UART: [art] Extend RT PCRs Done
2,805,908 UART: [art] Lock RT PCRs Done
2,807,622 UART: [art] Populate DV Done
2,815,905 UART: [fht] FMC Alias Private Key: 7
2,817,023 UART: [art] Derive CDI
2,817,303 UART: [art] Store in in slot 0x4
2,903,118 UART: [art] Derive Key Pair
2,903,478 UART: [art] Store priv key in slot 0x5
2,916,726 UART: [art] Derive Key Pair - Done
2,931,221 UART: [art] Signing Cert with AUTHO
2,931,701 UART: RITY.KEYID = 7
2,946,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,292 UART: [art] PUB.X = 275F35A27E43F0BBE82E6E6EC1BADBFA6188204539C37837BDD08E24B4D766431BEE2206B3B484A4C23DACF94A890CF9
2,954,070 UART: [art] PUB.Y = B31290C2D4C8D51F57E1AD52E22C0D9BB1A0796CA7556A944C9D5902F5B46E7CE006F6F7807DEA9F9992B2793F889D46
2,961,017 UART: [art] SIG.R = D974BEF4325B59C1B46A7A462582F7F8A05B45DB189697804E58F011311EABABEBC51FF2DA4F06E107CC8D443275CEA6
2,967,793 UART: [art] SIG.S = B2FD38BD51E880329698C421770911241A36AD712074731437FB2124AB93AD3653D36BAE3F00E1779AF08A95FC36AC67
2,991,225 UART: Caliptra RT
2,991,478 UART: [state] CFI Enabled
3,099,196 UART: [rt] RT listening for mailbox commands...
3,099,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,930 UART: [rt]cmd =0x41544d4e, len=14344
3,367,538 >>> mbox cmd response data (8 bytes)
3,367,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,560 UART: [rt]cmd =0x41545348, len=116
3,399,456 >>> mbox cmd response data (12 bytes)
3,399,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,835,189 >>> mbox cmd response: success
5,835,189 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,848,719 UART:
5,848,735 UART: Running Caliptra FMC ...
5,849,143 UART:
5,849,197 UART: [state] CFI Enabled
5,938,460 UART: [art] Extend RT PCRs Done
5,938,888 UART: [art] Lock RT PCRs Done
5,939,945 UART: [art] Populate DV Done
5,948,274 UART: [fht] FMC Alias Private Key: 7
5,949,408 UART: [art] Derive CDI
5,949,688 UART: [art] Store in in slot 0x4
6,035,303 UART: [art] Derive Key Pair
6,035,663 UART: [art] Store priv key in slot 0x5
6,049,047 UART: [art] Derive Key Pair - Done
6,063,727 UART: [art] Signing Cert with AUTHO
6,064,207 UART: RITY.KEYID = 7
6,079,249 UART: [art] Erasing AUTHORITY.KEYID = 7
6,080,014 UART: [art] PUB.X = F89A0C21476B20352A4DB77463D350225B89E2683857A6C513227190F1020F640E732345064142A1550972618F2BED37
6,086,744 UART: [art] PUB.Y = 8CA2C3B2F64477E2420E1C637B803F1FA8514B8A5E8FD032911713EFCC736B0382E7173E51AA384B963BAFD7CC85576D
6,093,694 UART: [art] SIG.R = C62AC9E537CBC43F8047E65B55D1A3D43820B0E957E37CAFCA1EE3A68727F07A575AC7F616ADBFC22900548C66DB4A1B
6,100,458 UART: [art] SIG.S = 50CE4D469E138DC4152776DC0D5EDEC39B55610AD0F15C3DF468B57C62399A2165ACDB19D912CD0A4D117FCA326B6DC4
6,124,560 UART: Caliptra RT
6,124,813 UART: [state] CFI Enabled
6,410,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,441,235 UART: [rt]cmd =0x41545348, len=116
6,443,143 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,174,708 ready_for_fw is high
1,174,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,208,040 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,949 UART: [fwproc] Wait for Commands...
1,282,632 UART: [fwproc] Recv command 0x46574c44
1,283,365 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,799 >>> mbox cmd response: success
2,776,054 UART: [afmc] ++
2,776,222 UART: [afmc] CDI.KEYID = 6
2,776,585 UART: [afmc] SUBJECT.KEYID = 7
2,777,011 UART: [afmc] AUTHORITY.KEYID = 5
2,813,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,621 UART: [afmc] --
2,856,553 UART: [cold-reset] --
2,857,387 UART: [state] Locking Datavault
2,858,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,072 UART: [state] Locking ICCM
2,859,710 UART: [exit] Launching FMC @ 0x40000130
2,865,039 UART:
2,865,055 UART: Running Caliptra FMC ...
2,865,463 UART:
2,865,606 UART: [state] CFI Enabled
2,876,513 UART: [fht] FMC Alias Private Key: 7
2,984,030 UART: [art] Extend RT PCRs Done
2,984,458 UART: [art] Lock RT PCRs Done
2,985,962 UART: [art] Populate DV Done
2,994,153 UART: [fht] FMC Alias Private Key: 7
2,995,165 UART: [art] Derive CDI
2,995,445 UART: [art] Store in in slot 0x4
3,081,358 UART: [art] Derive Key Pair
3,081,718 UART: [art] Store priv key in slot 0x5
3,094,720 UART: [art] Derive Key Pair - Done
3,109,297 UART: [art] Signing Cert with AUTHO
3,109,777 UART: RITY.KEYID = 7
3,125,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,956 UART: [art] PUB.X = CA95C6DE2077EF9D9AAA29B97C75DE770179B52B48007CFFC436615980B870F0BC17525424BA478BD14045D87C7F785A
3,132,705 UART: [art] PUB.Y = E18F179A8085364579435B6179AC8CA8F8319501BAF9A9C6A71B5B770B75DBAABAFDFD540C54B879681B15F3A3140495
3,139,647 UART: [art] SIG.R = CD4BE78268B4B783611508652D200D8EE2E2FE93ABFAEBDE548FD2FE049AD78785D7A7582DD917820C0CE4AC200FA98E
3,146,415 UART: [art] SIG.S = 26C82D42C531F5938539A35DFC3299469EF9F0A54E25A92D2EF210A89C823DE6651C50BE166A975ECFFA1DCC4E136AB7
3,169,660 UART: Caliptra RT
3,170,005 UART: [state] CFI Enabled
3,277,100 UART: [rt] RT listening for mailbox commands...
3,277,770 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,530 UART: [rt]cmd =0x41544d4e, len=14344
3,544,928 >>> mbox cmd response data (8 bytes)
3,544,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,208 UART: [rt]cmd =0x41545348, len=116
3,576,674 >>> mbox cmd response data (12 bytes)
3,576,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,482 UART:
3,577,498 UART: Running Caliptra ROM ...
3,577,906 UART:
3,578,048 UART: [state] CFI Enabled
3,580,640 UART: [state] LifecycleState = Unprovisioned
3,581,295 UART: [state] DebugLocked = No
3,581,941 UART: [state] WD Timer not started. Device not locked for debugging
3,583,263 UART: [kat] SHA2-256
4,386,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,390,942 UART: [kat] ++
4,391,094 UART: [kat] sha1
4,395,286 UART: [kat] SHA2-256
4,397,226 UART: [kat] SHA2-384
4,399,939 UART: [kat] SHA2-512-ACC
4,401,839 UART: [kat] ECC-384
4,411,086 UART: [kat] HMAC-384Kdf
4,415,496 UART: [kat] LMS
4,663,808 UART: [kat] --
4,664,714 UART: [update-reset] ++
5,977,658 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,978,617 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,128,615 >>> mbox cmd response: success
6,128,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,128,902 UART: [update-reset] Copying MAN_2 To MAN_1
6,136,916 UART: [update-reset Success] --
6,137,923 UART: [state] Locking Datavault
6,138,777 UART: [state] Locking PCR0, PCR1 and PCR31
6,139,381 UART: [state] Locking ICCM
6,139,829 UART: [exit] Launching FMC @ 0x40000130
6,145,158 UART:
6,145,174 UART: Running Caliptra FMC ...
6,145,582 UART:
6,145,725 UART: [state] CFI Enabled
6,234,356 UART: [art] Extend RT PCRs Done
6,234,784 UART: [art] Lock RT PCRs Done
6,236,113 UART: [art] Populate DV Done
6,244,106 UART: [fht] FMC Alias Private Key: 7
6,245,248 UART: [art] Derive CDI
6,245,528 UART: [art] Store in in slot 0x4
6,331,463 UART: [art] Derive Key Pair
6,331,823 UART: [art] Store priv key in slot 0x5
6,345,285 UART: [art] Derive Key Pair - Done
6,360,305 UART: [art] Signing Cert with AUTHO
6,360,785 UART: RITY.KEYID = 7
6,376,161 UART: [art] Erasing AUTHORITY.KEYID = 7
6,376,926 UART: [art] PUB.X = 56F93FE156A4AF2B00C6670F017400F936EAAA302F11F1CE9474AC2D578226AF19753E1F7EED887847160F0E8616C4EB
6,383,644 UART: [art] PUB.Y = 022719355F5902644B7B9BDB9FB7AC84DB53FEA0F7D4432D50DDBE0C62381CA4939446AB78C1A8590CCF2296175A427F
6,390,588 UART: [art] SIG.R = 3E7BB14CCD5EA3E33FAFDB841660220EB8D0F66A9AB11E876F647961BCC45060DD977DFD877A693997E5219017792346
6,397,359 UART: [art] SIG.S = 126C70D8316B62DFEC6BD83FAE71F3247AB2ADE37D2826A1C6C8D19CACCA8C72EC73A1C84CBB4DCFA2AF11E7CC6AA541
6,421,066 UART: Caliptra RT
6,421,411 UART: [state] CFI Enabled
6,705,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,553 UART: [rt]cmd =0x41545348, len=116
6,738,327 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,179 ready_for_fw is high
1,056,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,661 >>> mbox cmd response: success
2,686,735 UART:
2,686,751 UART: Running Caliptra FMC ...
2,687,159 UART:
2,687,302 UART: [state] CFI Enabled
2,698,223 UART: [fht] FMC Alias Private Key: 7
2,805,956 UART: [art] Extend RT PCRs Done
2,806,384 UART: [art] Lock RT PCRs Done
2,807,878 UART: [art] Populate DV Done
2,816,095 UART: [fht] FMC Alias Private Key: 7
2,817,237 UART: [art] Derive CDI
2,817,517 UART: [art] Store in in slot 0x4
2,903,278 UART: [art] Derive Key Pair
2,903,638 UART: [art] Store priv key in slot 0x5
2,916,378 UART: [art] Derive Key Pair - Done
2,930,943 UART: [art] Signing Cert with AUTHO
2,931,423 UART: RITY.KEYID = 7
2,946,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,684 UART: [art] PUB.X = AFF204042B30A6305E1CB44B6D3E2FD0B4785137915DE94DE2919E54543BE35D67D788FB4B9A0AC1FE14F089690E5F99
2,954,448 UART: [art] PUB.Y = FB750074F8B7302BDFD5D90F568755649184941A5FF358EBC3D1EF695CAFE3DC9099301F45ABB8D66CBF02D7541712B7
2,961,378 UART: [art] SIG.R = 69CB56470D254C5EEDCEE26967A2655D0B6D13500ACBABAA347DCABBD18A2B5A9C7AB608AE94F9A50A4B8751E13D2850
2,968,153 UART: [art] SIG.S = 269D44B85D0C07C5BAF876B3961BA7F2C74EC2505A220B842DD50ACB190C5D2B103D2EF67A6C7414946EFE3F2A5ED4C6
2,991,557 UART: Caliptra RT
2,991,902 UART: [state] CFI Enabled
3,100,075 UART: [rt] RT listening for mailbox commands...
3,100,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,901 UART: [rt]cmd =0x41544d4e, len=14344
3,368,687 >>> mbox cmd response data (8 bytes)
3,368,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,863 UART: [rt]cmd =0x41545348, len=116
3,400,877 >>> mbox cmd response data (12 bytes)
3,400,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,439 >>> mbox cmd response: success
5,836,439 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,849,707 UART:
5,849,723 UART: Running Caliptra FMC ...
5,850,131 UART:
5,850,274 UART: [state] CFI Enabled
5,939,017 UART: [art] Extend RT PCRs Done
5,939,445 UART: [art] Lock RT PCRs Done
5,940,834 UART: [art] Populate DV Done
5,949,215 UART: [fht] FMC Alias Private Key: 7
5,950,277 UART: [art] Derive CDI
5,950,557 UART: [art] Store in in slot 0x4
6,035,924 UART: [art] Derive Key Pair
6,036,284 UART: [art] Store priv key in slot 0x5
6,049,980 UART: [art] Derive Key Pair - Done
6,064,607 UART: [art] Signing Cert with AUTHO
6,065,087 UART: RITY.KEYID = 7
6,080,247 UART: [art] Erasing AUTHORITY.KEYID = 7
6,081,012 UART: [art] PUB.X = C3B11E6B817F23A31E429428C315026F2560FEB988024680B081824F88463F25ECD6392CD2F62EF38CD25F42D0EA7FA3
6,087,776 UART: [art] PUB.Y = AF62E9F9451245B01C8EC5F9383346FD9BBB401C4284A824701F4920CCD5D4982D62CE4F26822BABC7F852D57A9A4EE5
6,094,734 UART: [art] SIG.R = 645AB51DC79CC7C4AEBF7044A0E4078CFE82AE5A8FB4C22490C238575C4988D07B9C3DD1F6DC69295CCC40D872ABD41A
6,101,519 UART: [art] SIG.S = 22C813DA389174E569A6A364D07C1B833EF8EF9FEAB0052BA6FCDAA359431ACD1EC5A862AA312A3B800CD78DCD9ECBFC
6,125,302 UART: Caliptra RT
6,125,647 UART: [state] CFI Enabled
6,410,212 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,440,969 UART: [rt]cmd =0x41545348, len=116
6,442,465 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,295 UART:
192,660 UART: Running Caliptra ROM ...
193,851 UART:
194,004 UART: [state] CFI Enabled
264,823 UART: [state] LifecycleState = Unprovisioned
266,751 UART: [state] DebugLocked = No
269,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,245 UART: [kat] SHA2-256
444,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,471 UART: [kat] ++
454,959 UART: [kat] sha1
466,400 UART: [kat] SHA2-256
469,059 UART: [kat] SHA2-384
474,361 UART: [kat] SHA2-512-ACC
476,659 UART: [kat] ECC-384
2,770,538 UART: [kat] HMAC-384Kdf
2,801,099 UART: [kat] LMS
3,991,399 UART: [kat] --
3,995,841 UART: [cold-reset] ++
3,998,419 UART: [fht] Storing FHT @ 0x50003400
4,010,202 UART: [idev] ++
4,010,817 UART: [idev] CDI.KEYID = 6
4,011,749 UART: [idev] SUBJECT.KEYID = 7
4,012,934 UART: [idev] UDS.KEYID = 0
4,013,928 ready_for_fw is high
4,014,136 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,599 UART: [idev] Erasing UDS.KEYID = 0
7,347,039 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,918 UART: [idev] --
7,373,312 UART: [ldev] ++
7,373,897 UART: [ldev] CDI.KEYID = 6
7,374,867 UART: [ldev] SUBJECT.KEYID = 5
7,376,077 UART: [ldev] AUTHORITY.KEYID = 7
7,377,309 UART: [ldev] FE.KEYID = 1
7,425,440 UART: [ldev] Erasing FE.KEYID = 1
10,757,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,547 UART: [ldev] --
13,136,429 UART: [fwproc] Waiting for Commands...
13,138,956 UART: [fwproc] Received command 0x46574c44
13,141,140 UART: [fwproc] Received Image of size 114124 bytes
17,188,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,202 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,651,188 >>> mbox cmd response: success
17,655,006 UART: [afmc] ++
17,655,619 UART: [afmc] CDI.KEYID = 6
17,656,537 UART: [afmc] SUBJECT.KEYID = 7
17,657,752 UART: [afmc] AUTHORITY.KEYID = 5
21,011,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,765 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,025 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,476 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,289 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,715 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,923 UART: [afmc] --
23,381,039 UART: [cold-reset] --
23,385,389 UART: [state] Locking Datavault
23,390,121 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,877 UART: [state] Locking ICCM
23,393,898 UART: [exit] Launching FMC @ 0x40000130
23,402,292 UART:
23,402,524 UART: Running Caliptra FMC ...
23,403,549 UART:
23,403,695 UART: [state] CFI Enabled
23,471,902 UART: [fht] FMC Alias Private Key: 7
25,810,227 UART: [art] Extend RT PCRs Done
25,811,443 UART: [art] Lock RT PCRs Done
25,813,097 UART: [art] Populate DV Done
25,818,619 UART: [fht] FMC Alias Private Key: 7
25,820,268 UART: [art] Derive CDI
25,821,007 UART: [art] Store in in slot 0x4
25,880,754 UART: [art] Derive Key Pair
25,881,788 UART: [art] Store priv key in slot 0x5
29,174,179 UART: [art] Derive Key Pair - Done
29,187,232 UART: [art] Signing Cert with AUTHO
29,188,530 UART: RITY.KEYID = 7
31,476,828 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,328 UART: [art] PUB.X = 9BDFEF22E5BCB89488E771DE7107A368803C30B5AE8CDEEAB7834F689B10B5B6A5397064EFC7E9B43CB5542B2F88E647
31,485,595 UART: [art] PUB.Y = 7A383241AB2EBDF55C975D748881FE3D0775C648A30E99D04A92CEED50868B40DE725DC62CF00AC2178C72FF098984C5
31,492,833 UART: [art] SIG.R = A5C157BA64B34183F6154EA22BCF54DD69FF0212DAF7CC7C7A5AE450237A5BC968F6AC73A5596BF02D8AD0A86969EB66
31,500,235 UART: [art] SIG.S = B6505CBFBDC6DCB751ECF3A375354892F4F0FFF202AB784509F34B1F5F89930269A59B536A361900AD5B805077545611
32,805,646 UART: Caliptra RT
32,806,361 UART: [state] CFI Enabled
32,968,764 UART: [rt] RT listening for mailbox commands...
32,971,150 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,001,997 UART: [rt]cmd =0x41545348, len=116
33,004,049 >>> mbox cmd response data (12 bytes)
35,135,811 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,236,624 UART:
35,236,993 UART: Running Caliptra ROM ...
35,238,083 UART:
35,238,251 UART: [state] CFI Enabled
35,311,995 UART: [state] LifecycleState = Unprovisioned
35,313,931 UART: [state] DebugLocked = No
35,316,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,320,332 UART: [kat] SHA2-256
35,490,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,500,534 UART: [kat] ++
35,500,992 UART: [kat] sha1
35,512,690 UART: [kat] SHA2-256
35,515,383 UART: [kat] SHA2-384
35,521,225 UART: [kat] SHA2-512-ACC
35,523,628 UART: [kat] ECC-384
37,816,251 UART: [kat] HMAC-384Kdf
37,847,169 UART: [kat] LMS
39,037,486 UART: [kat] --
39,041,548 UART: [update-reset] ++
42,759,199 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,763,079 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
43,021,517 >>> mbox cmd response: success
43,021,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,022,295 UART: [update-reset] Copying MAN_2 To MAN_1
43,044,736 UART: [update-reset Success] --
43,048,167 UART: [state] Locking Datavault
43,050,281 UART: [state] Locking PCR0, PCR1 and PCR31
43,051,998 UART: [state] Locking ICCM
43,054,533 UART: [exit] Launching FMC @ 0x40000130
43,062,949 UART:
43,063,189 UART: Running Caliptra FMC ...
43,064,294 UART:
43,064,457 UART: [state] CFI Enabled
43,167,561 UART: [art] Extend RT PCRs Done
43,168,748 UART: [art] Lock RT PCRs Done
43,170,099 UART: [art] Populate DV Done
43,175,454 UART: [fht] FMC Alias Private Key: 7
43,176,931 UART: [art] Derive CDI
43,177,843 UART: [art] Store in in slot 0x4
43,237,351 UART: [art] Derive Key Pair
43,238,393 UART: [art] Store priv key in slot 0x5
46,530,750 UART: [art] Derive Key Pair - Done
46,543,747 UART: [art] Signing Cert with AUTHO
46,545,054 UART: RITY.KEYID = 7
48,831,630 UART: [art] Erasing AUTHORITY.KEYID = 7
48,833,158 UART: [art] PUB.X = 0CF10204B0DDDE604B6618C405BF085008CF82A7545F413053E9FE0220DF4079EBD7EAF14C30C9576BBD0EAF5D899876
48,840,413 UART: [art] PUB.Y = AC606299C4304CA2018DF8B0189362A05923F699AA30A8771D52B3CEE2375F618CCD8C49E51EA8A9A4B2054520EB2779
48,847,659 UART: [art] SIG.R = 6C3A27D71851BA5C5715C2F7A1E7EDD6ADF772B37C23FF4136F4517EDCD1E83ECE24DBA09E0E767DF379451707EACB41
48,855,059 UART: [art] SIG.S = 1AB1BD81AE39A0C4D28DB9088B9D01235F1237B69366EA13B73358BA8FC69ACBF93BF0B75204C34730101F7041A06180
50,159,598 UART: mbox::rt_entry...
50,160,565 UART: ____ _ _ _ ____ _____
50,162,555 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,164,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,166,428 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,168,272 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,170,409 UART: |_|
50,171,229 UART:
50,457,027 UART: [rt] Runtime listening for mailbox commands...
50,459,151 >>> mbox cmd response data (48 bytes)
50,459,728 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,462,053 >>> mbox cmd response data (48 bytes)
50,462,930 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,475,512 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,925 writing to cptra_bootfsm_go
3,783,092 ready_for_fw is high
3,783,493 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,841,311 >>> mbox cmd response: success
23,539,705 UART:
23,540,084 UART: Running Caliptra FMC ...
23,541,205 UART:
23,541,357 UART: [state] CFI Enabled
23,611,700 UART: [fht] FMC Alias Private Key: 7
25,949,501 UART: [art] Extend RT PCRs Done
25,950,723 UART: [art] Lock RT PCRs Done
25,952,379 UART: [art] Populate DV Done
25,957,522 UART: [fht] FMC Alias Private Key: 7
25,959,115 UART: [art] Derive CDI
25,959,857 UART: [art] Store in in slot 0x4
26,019,922 UART: [art] Derive Key Pair
26,020,963 UART: [art] Store priv key in slot 0x5
29,313,288 UART: [art] Derive Key Pair - Done
29,326,200 UART: [art] Signing Cert with AUTHO
29,327,509 UART: RITY.KEYID = 7
31,614,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,616,166 UART: [art] PUB.X = 5869FEA491C008FFB46D6A0818BBBBBDDBC181E1ECC445B0D29EC698F7488AD86FD64EE7726B24B7ED7B4A8C350D4143
31,623,417 UART: [art] PUB.Y = 192785534DDF93578150A6602A065A5FADE44F4854C8E974D4F5CE8EEC9C8C35A0FBC295BD3903E46B53C544A59B1FFF
31,630,713 UART: [art] SIG.R = 15E309C2A4CB8E83631CAAA9AAB9C16289F5BA3C821EDAD8B8A559E98A129F6CA6DCB3371E3A08CF9D8316E030B7ACCA
31,638,114 UART: [art] SIG.S = C57F90FDF0B4D2519A30F4F6410875A8F5BD5A2AC43742EF9942109BA6B4C41211E7149ED19333AF2B24573E985ED404
32,943,804 UART: Caliptra RT
32,944,504 UART: [state] CFI Enabled
33,124,983 UART: [rt] RT listening for mailbox commands...
33,127,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,158,016 UART: [rt]cmd =0x41545348, len=116
33,160,178 >>> mbox cmd response data (12 bytes)
35,286,756 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,243,237 >>> mbox cmd response: success
43,243,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,279,186 UART:
43,279,467 UART: Running Caliptra FMC ...
43,280,585 UART:
43,280,747 UART: [state] CFI Enabled
43,374,979 UART: [art] Extend RT PCRs Done
43,376,177 UART: [art] Lock RT PCRs Done
43,377,734 UART: [art] Populate DV Done
43,383,151 UART: [fht] FMC Alias Private Key: 7
43,384,850 UART: [art] Derive CDI
43,385,663 UART: [art] Store in in slot 0x4
43,443,817 UART: [art] Derive Key Pair
43,444,857 UART: [art] Store priv key in slot 0x5
46,737,375 UART: [art] Derive Key Pair - Done
46,750,537 UART: [art] Signing Cert with AUTHO
46,751,841 UART: RITY.KEYID = 7
49,039,573 UART: [art] Erasing AUTHORITY.KEYID = 7
49,041,090 UART: [art] PUB.X = 499351947BDED4ECA39EC3D016111F6AD6159E522BE2A3AE189C98DA6C448F8310D317331B03B88C16F0CC24C31D5C64
49,048,374 UART: [art] PUB.Y = D2009E9E801C6FCE5299B58577F6C7D42D6F58307A8125474CF2AED237686DFC8A8C2900696C4C41F3E1548ADC457759
49,055,568 UART: [art] SIG.R = 48CE8CF35FBA1538DF007ABE1BAAD9996EB5674CF4A5C997BE2EB9480E37E839460FA35DB31C43251B663F50D621074E
49,062,969 UART: [art] SIG.S = 1C419A5B0AC0B505190FCD517678E34F2F86B3D8A07D8050C6B9F33E4D71B8F9D593C2FEC1DD94FDB14CC5DD5E45A1E9
50,367,442 UART: mbox::rt_entry...
50,368,405 UART: ____ _ _ _ ____ _____
50,370,389 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,372,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,374,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,376,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,378,185 UART: |_|
50,379,026 UART:
50,662,442 UART: [rt] Runtime listening for mailbox commands...
50,664,572 >>> mbox cmd response data (48 bytes)
50,665,131 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,667,451 >>> mbox cmd response data (48 bytes)
50,668,302 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,680,850 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,340 UART:
192,720 UART: Running Caliptra ROM ...
193,843 UART:
603,484 UART: [state] CFI Enabled
617,791 UART: [state] LifecycleState = Unprovisioned
619,730 UART: [state] DebugLocked = No
621,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,541 UART: [kat] SHA2-256
797,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,825 UART: [kat] ++
808,297 UART: [kat] sha1
819,408 UART: [kat] SHA2-256
822,073 UART: [kat] SHA2-384
828,300 UART: [kat] SHA2-512-ACC
830,667 UART: [kat] ECC-384
3,115,230 UART: [kat] HMAC-384Kdf
3,127,892 UART: [kat] LMS
4,317,964 UART: [kat] --
4,323,522 UART: [cold-reset] ++
4,325,802 UART: [fht] Storing FHT @ 0x50003400
4,338,451 UART: [idev] ++
4,339,041 UART: [idev] CDI.KEYID = 6
4,339,924 UART: [idev] SUBJECT.KEYID = 7
4,341,163 UART: [idev] UDS.KEYID = 0
4,342,177 ready_for_fw is high
4,342,381 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,610 UART: [idev] Erasing UDS.KEYID = 0
7,630,924 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,328 UART: [idev] --
7,656,143 UART: [ldev] ++
7,656,766 UART: [ldev] CDI.KEYID = 6
7,657,724 UART: [ldev] SUBJECT.KEYID = 5
7,658,939 UART: [ldev] AUTHORITY.KEYID = 7
7,660,113 UART: [ldev] FE.KEYID = 1
7,670,428 UART: [ldev] Erasing FE.KEYID = 1
10,958,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,141 UART: [ldev] --
13,315,995 UART: [fwproc] Waiting for Commands...
13,317,716 UART: [fwproc] Received command 0x46574c44
13,319,892 UART: [fwproc] Received Image of size 114124 bytes
17,373,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,930 >>> mbox cmd response: success
17,836,138 UART: [afmc] ++
17,836,740 UART: [afmc] CDI.KEYID = 6
17,837,679 UART: [afmc] SUBJECT.KEYID = 7
17,838,948 UART: [afmc] AUTHORITY.KEYID = 5
21,152,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,187 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,533 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,403 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,819 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,281 UART: [afmc] --
23,518,868 UART: [cold-reset] --
23,521,485 UART: [state] Locking Datavault
23,524,266 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,018 UART: [state] Locking ICCM
23,527,305 UART: [exit] Launching FMC @ 0x40000130
23,535,694 UART:
23,535,938 UART: Running Caliptra FMC ...
23,536,964 UART:
23,537,100 UART: [state] CFI Enabled
23,545,514 UART: [fht] FMC Alias Private Key: 7
25,876,644 UART: [art] Extend RT PCRs Done
25,877,861 UART: [art] Lock RT PCRs Done
25,879,271 UART: [art] Populate DV Done
25,884,570 UART: [fht] FMC Alias Private Key: 7
25,886,154 UART: [art] Derive CDI
25,886,961 UART: [art] Store in in slot 0x4
25,929,780 UART: [art] Derive Key Pair
25,930,822 UART: [art] Store priv key in slot 0x5
29,172,817 UART: [art] Derive Key Pair - Done
29,185,915 UART: [art] Signing Cert with AUTHO
29,187,210 UART: RITY.KEYID = 7
31,466,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,186 UART: [art] PUB.X = E891A7643A24AE6D7E64341878A119B54F1EFA933041B31A4570D8F34A5265E972D7E9CD75C351F9375369D9BE5C28B6
31,475,386 UART: [art] PUB.Y = E39A091003AF94A71F805946C47EF0FAF9F6A0DE7D9809D5DC690A336B3FC7C03EACA31E1197B454874865BCA2788E00
31,482,628 UART: [art] SIG.R = 66589EED35CB2ED81861A0CE7608E2163368A783822EB34EE3CCE0D533F8BA6B4EDDDCE8E06D135217414355F55EF0AF
31,490,041 UART: [art] SIG.S = 49748B62E7B9DD2C20F90DC5E3DF73078DEB60C8A9EE255FC59E37B155A91C18EE7436DA03A71AA91C1427E4907F715E
32,795,613 UART: Caliptra RT
32,796,323 UART: [state] CFI Enabled
32,914,477 UART: [rt] RT listening for mailbox commands...
32,916,802 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,947,762 UART: [rt]cmd =0x41545348, len=116
32,949,965 >>> mbox cmd response data (12 bytes)
34,998,924 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,099,339 UART:
35,099,685 UART: Running Caliptra ROM ...
35,100,826 UART:
35,100,989 UART: [state] CFI Enabled
35,115,742 UART: [state] LifecycleState = Unprovisioned
35,117,689 UART: [state] DebugLocked = No
35,120,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,124,786 UART: [kat] SHA2-256
35,294,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,305,053 UART: [kat] ++
35,305,599 UART: [kat] sha1
35,316,161 UART: [kat] SHA2-256
35,318,849 UART: [kat] SHA2-384
35,323,505 UART: [kat] SHA2-512-ACC
35,325,912 UART: [kat] ECC-384
37,609,999 UART: [kat] HMAC-384Kdf
37,621,098 UART: [kat] LMS
38,811,156 UART: [kat] --
38,816,456 UART: [update-reset] ++
42,524,404 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,528,066 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,786,507 >>> mbox cmd response: success
42,786,868 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,787,362 UART: [update-reset] Copying MAN_2 To MAN_1
42,809,750 UART: [update-reset Success] --
42,815,694 UART: [state] Locking Datavault
42,819,870 UART: [state] Locking PCR0, PCR1 and PCR31
42,821,621 UART: [state] Locking ICCM
42,823,065 UART: [exit] Launching FMC @ 0x40000130
42,831,480 UART:
42,831,715 UART: Running Caliptra FMC ...
42,832,811 UART:
42,832,962 UART: [state] CFI Enabled
42,876,699 UART: [art] Extend RT PCRs Done
42,877,834 UART: [art] Lock RT PCRs Done
42,879,546 UART: [art] Populate DV Done
42,885,157 UART: [fht] FMC Alias Private Key: 7
42,886,847 UART: [art] Derive CDI
42,887,655 UART: [art] Store in in slot 0x4
42,930,723 UART: [art] Derive Key Pair
42,931,729 UART: [art] Store priv key in slot 0x5
46,173,412 UART: [art] Derive Key Pair - Done
46,186,395 UART: [art] Signing Cert with AUTHO
46,187,698 UART: RITY.KEYID = 7
48,466,954 UART: [art] Erasing AUTHORITY.KEYID = 7
48,468,480 UART: [art] PUB.X = 3B73A369656DD2A0EC4666EF02A636BF95A8533F3CBED90E8B1A79D602A8D5B7A4B97C8ECE32996736C14252EBB84938
48,475,720 UART: [art] PUB.Y = A5C14B35208475D62E48FC23C2497FE79970C1A32A9A170323EF476E3D7AB923C901450BCE5BE3694026395D832208AE
48,482,941 UART: [art] SIG.R = B712B8774D9E6EAAB5099EA5599A3483E1912B67F677366FE3ED1EAA5B0E573A7BB3D917F299EB2AF62B651F0A8F4F6E
48,490,366 UART: [art] SIG.S = 61878933C919F922C51AC45B87D5D52B7EEE9FB43B091303F6C402DC753C7D8C4771CC14BB707FFE5D1374D87CA0AD5E
49,795,459 UART: mbox::rt_entry...
49,796,432 UART: ____ _ _ _ ____ _____
49,798,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,800,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,802,254 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,804,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,806,052 UART: |_|
49,806,859 UART:
50,090,170 UART: [rt] Runtime listening for mailbox commands...
50,092,341 >>> mbox cmd response data (48 bytes)
50,092,915 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,095,230 >>> mbox cmd response data (48 bytes)
50,096,106 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,108,686 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,124,485 ready_for_fw is high
4,124,865 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,059,539 >>> mbox cmd response: success
23,698,725 UART:
23,699,118 UART: Running Caliptra FMC ...
23,700,213 UART:
23,700,361 UART: [state] CFI Enabled
23,708,201 UART: [fht] FMC Alias Private Key: 7
26,038,819 UART: [art] Extend RT PCRs Done
26,040,046 UART: [art] Lock RT PCRs Done
26,041,594 UART: [art] Populate DV Done
26,046,885 UART: [fht] FMC Alias Private Key: 7
26,048,541 UART: [art] Derive CDI
26,049,365 UART: [art] Store in in slot 0x4
26,092,032 UART: [art] Derive Key Pair
26,093,071 UART: [art] Store priv key in slot 0x5
29,335,389 UART: [art] Derive Key Pair - Done
29,348,394 UART: [art] Signing Cert with AUTHO
29,349,709 UART: RITY.KEYID = 7
31,629,124 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,634 UART: [art] PUB.X = 4F5E7FFB97F5C3EF9DC2983E5E54FE3027B0C55518CC99AEA11B2EA54FCDAD79F32F29CEDFA6CBDAF4547932BCFE697F
31,637,895 UART: [art] PUB.Y = 1DD746547434B40797639CCE6092F19A836F774C5491CD96715051AF93F1B5BC9F9C7A0EFCCF20AFD12719E78210CC12
31,645,109 UART: [art] SIG.R = B3AA25D271A5B30C299B8A3438AF565A1C6D3A8F3C2EC1E126A2D998C69AFC332E6E017244D00A240EF0227CE085D50D
31,652,554 UART: [art] SIG.S = 51F1C6A8E0B930F0BB7F54E40C874F9B62744111DF3DA07F279FEB9F435A90EFFC26FBC9C8311A75523CA45A5982CB42
32,957,781 UART: Caliptra RT
32,958,488 UART: [state] CFI Enabled
33,075,712 UART: [rt] RT listening for mailbox commands...
33,077,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,108,828 UART: [rt]cmd =0x41545348, len=116
33,111,188 >>> mbox cmd response data (12 bytes)
35,159,220 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,044,456 >>> mbox cmd response: success
43,045,074 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,079,893 UART:
43,080,183 UART: Running Caliptra FMC ...
43,081,307 UART:
43,081,463 UART: [state] CFI Enabled
43,125,332 UART: [art] Extend RT PCRs Done
43,126,526 UART: [art] Lock RT PCRs Done
43,127,927 UART: [art] Populate DV Done
43,133,342 UART: [fht] FMC Alias Private Key: 7
43,134,985 UART: [art] Derive CDI
43,135,793 UART: [art] Store in in slot 0x4
43,178,224 UART: [art] Derive Key Pair
43,179,222 UART: [art] Store priv key in slot 0x5
46,421,260 UART: [art] Derive Key Pair - Done
46,434,315 UART: [art] Signing Cert with AUTHO
46,435,623 UART: RITY.KEYID = 7
48,714,997 UART: [art] Erasing AUTHORITY.KEYID = 7
48,716,639 UART: [art] PUB.X = 5A1CBEDC9D046A6EEB033D02CF8714321534E6170FA41781856E49C5458136D779516937A1ACE6ACD2C1A1A231EE8EA1
48,723,731 UART: [art] PUB.Y = E0563B094EC1E8B66B17F0471BB292207DFCCB9B88A51F4E27E637D99B8D20529C78334321E882B61DC54AE424FBB057
48,730,963 UART: [art] SIG.R = F0F6354B8F23F7E83DB97E92E9579866DB0321BBA46B5C700DA969E08C3EFED0D9D50C00436ED9D6D05FED2A1C3038F9
48,738,351 UART: [art] SIG.S = CAFDD93B758270851399829EF3389CE7E2B3DD84A9FFF730A532C06C45766CA595490CCC185DC484D38311D3923CE8A5
50,042,879 UART: mbox::rt_entry...
50,043,853 UART: ____ _ _ _ ____ _____
50,045,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,047,876 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,049,803 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,051,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,053,649 UART: |_|
50,054,635 UART:
50,339,647 UART: [rt] Runtime listening for mailbox commands...
50,341,788 >>> mbox cmd response data (48 bytes)
50,342,388 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,344,713 >>> mbox cmd response data (48 bytes)
50,345,590 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,358,138 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,199 UART:
192,555 UART: Running Caliptra ROM ...
193,749 UART:
193,903 UART: [state] CFI Enabled
261,800 UART: [state] LifecycleState = Unprovisioned
263,714 UART: [state] DebugLocked = No
266,236 UART: [state] WD Timer not started. Device not locked for debugging
270,702 UART: [kat] SHA2-256
449,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,378 UART: [kat] ++
461,830 UART: [kat] sha1
473,508 UART: [kat] SHA2-256
476,553 UART: [kat] SHA2-384
481,551 UART: [kat] SHA2-512-ACC
484,479 UART: [kat] ECC-384
2,949,038 UART: [kat] HMAC-384Kdf
2,970,607 UART: [kat] LMS
3,500,047 UART: [kat] --
3,504,183 UART: [cold-reset] ++
3,505,256 UART: [fht] FHT @ 0x50003400
3,517,591 UART: [idev] ++
3,518,182 UART: [idev] CDI.KEYID = 6
3,519,066 UART: [idev] SUBJECT.KEYID = 7
3,520,198 UART: [idev] UDS.KEYID = 0
3,521,188 ready_for_fw is high
3,521,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,153 UART: [idev] Erasing UDS.KEYID = 0
6,026,610 UART: [idev] Sha1 KeyId Algorithm
6,049,665 UART: [idev] --
6,054,527 UART: [ldev] ++
6,055,098 UART: [ldev] CDI.KEYID = 6
6,055,989 UART: [ldev] SUBJECT.KEYID = 5
6,057,219 UART: [ldev] AUTHORITY.KEYID = 7
6,058,452 UART: [ldev] FE.KEYID = 1
6,099,960 UART: [ldev] Erasing FE.KEYID = 1
8,598,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,262 UART: [ldev] --
10,390,550 UART: [fwproc] Wait for Commands...
10,392,856 UART: [fwproc] Recv command 0x46574c44
10,394,947 UART: [fwproc] Recv'd Img size: 114448 bytes
13,796,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,259,264 >>> mbox cmd response: success
14,264,410 UART: [afmc] ++
14,265,016 UART: [afmc] CDI.KEYID = 6
14,265,931 UART: [afmc] SUBJECT.KEYID = 7
14,267,094 UART: [afmc] AUTHORITY.KEYID = 5
16,806,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,555 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,462 UART: [afmc] --
18,604,760 UART: [cold-reset] --
18,608,996 UART: [state] Locking Datavault
18,613,968 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,609 UART: [state] Locking ICCM
18,617,490 UART: [exit] Launching FMC @ 0x40000130
18,625,912 UART:
18,626,151 UART: Running Caliptra FMC ...
18,627,247 UART:
18,627,412 UART: [state] CFI Enabled
18,688,525 UART: [fht] FMC Alias Private Key: 7
20,452,882 UART: [art] Extend RT PCRs Done
20,454,095 UART: [art] Lock RT PCRs Done
20,455,718 UART: [art] Populate DV Done
20,461,338 UART: [fht] FMC Alias Private Key: 7
20,462,868 UART: [art] Derive CDI
20,463,603 UART: [art] Store in in slot 0x4
20,521,569 UART: [art] Derive Key Pair
20,522,600 UART: [art] Store priv key in slot 0x5
22,985,763 UART: [art] Derive Key Pair - Done
22,998,968 UART: [art] Signing Cert with AUTHO
23,000,265 UART: RITY.KEYID = 7
24,711,305 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,801 UART: [art] PUB.X = 6AF348C451F78AE05B0287DFC21EE4348B993B06920271B4516780C862E0BF31F21F698921630C24112579A89909B7E0
24,720,063 UART: [art] PUB.Y = 4A09C949D4C8189446691C2FB68928E33238EF3C44BEF99D28653C1BA8B843CD36C3AA81BE4F4C6A61479499B6FEADFB
24,727,302 UART: [art] SIG.R = 19071222F0D6A6DCB9099A45669D9C89C148953C258A8BE79E9F52B2D8F07FDFD1E62A6453545F663A31AF2847639682
24,734,635 UART: [art] SIG.S = 44FC3DC2EC3C98078D0A3136B51321A7DBAEC1889C7CA48DE2134A911ACDC7C0CB59C11172CC6FC51570E361B0E4B1A5
25,713,413 UART: Caliptra RT
25,714,110 UART: [state] CFI Enabled
25,880,194 UART: [rt] RT listening for mailbox commands...
25,882,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,913,858 UART: [rt]cmd =0x41545348, len=116
25,916,264 >>> mbox cmd response data (12 bytes)
27,983,516 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,084,312 UART:
28,084,664 UART: Running Caliptra ROM ...
28,085,792 UART:
28,085,959 UART: [state] CFI Enabled
28,145,065 UART: [state] LifecycleState = Unprovisioned
28,146,903 UART: [state] DebugLocked = No
28,148,770 UART: [state] WD Timer not started. Device not locked for debugging
28,152,613 UART: [kat] SHA2-256
28,331,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,343,302 UART: [kat] ++
28,343,844 UART: [kat] sha1
28,356,141 UART: [kat] SHA2-256
28,359,168 UART: [kat] SHA2-384
28,365,152 UART: [kat] SHA2-512-ACC
28,368,086 UART: [kat] ECC-384
30,828,438 UART: [kat] HMAC-384Kdf
30,853,155 UART: [kat] LMS
31,382,620 UART: [kat] --
31,388,062 UART: [update-reset] ++
34,386,757 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,390,292 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,648,520 >>> mbox cmd response: success
34,648,878 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,649,765 UART: [update-reset] Copying MAN_2 To MAN_1
34,672,092 UART: [update-reset Success] --
34,678,213 UART: [state] Locking Datavault
34,679,844 UART: [state] Locking PCR0, PCR1 and PCR31
34,681,578 UART: [state] Locking ICCM
34,683,442 UART: [exit] Launching FMC @ 0x40000130
34,691,894 UART:
34,692,127 UART: Running Caliptra FMC ...
34,693,227 UART:
34,693,405 UART: [state] CFI Enabled
34,788,632 UART: [art] Extend RT PCRs Done
34,789,816 UART: [art] Lock RT PCRs Done
34,791,165 UART: [art] Populate DV Done
34,796,851 UART: [fht] FMC Alias Private Key: 7
34,798,312 UART: [art] Derive CDI
34,799,080 UART: [art] Store in in slot 0x4
34,857,984 UART: [art] Derive Key Pair
34,858,984 UART: [art] Store priv key in slot 0x5
37,321,854 UART: [art] Derive Key Pair - Done
37,334,690 UART: [art] Signing Cert with AUTHO
37,336,000 UART: RITY.KEYID = 7
39,047,379 UART: [art] Erasing AUTHORITY.KEYID = 7
39,048,874 UART: [art] PUB.X = 04CD8CA1F91D207122A8205DB1EF67C857FFDB14E0BE0215383BD88018EDD80F0388EE26EEB01545D1C3FFE807CE7D7A
39,056,167 UART: [art] PUB.Y = 8D90FAE9D5309EAB9219F4F1A77CB468E053637328402122CF27D2EF1787E3782A3AF89D7E28618C1E140F96987B86F3
39,063,393 UART: [art] SIG.R = CBADF45816258DB7E27D8123F748E8C82BE8591281FFD87CD2847672A1D11D8DABDB11E27F90216C83EF9F5A79C87CC4
39,070,862 UART: [art] SIG.S = F24658B7AB7E77546860BAFA3C089C7097F31D5E0A440F7773C5C5896EB503ED3C343419E15D58D3DE862D8FFEA8F52B
40,050,357 UART: mbox::rt_entry...
40,051,325 UART: ____ _ _ _ ____ _____
40,053,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,055,241 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,057,171 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,059,102 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,061,030 UART: |_|
40,061,846 UART:
40,346,731 UART: [rt] Runtime listening for mailbox commands...
40,348,899 >>> mbox cmd response data (48 bytes)
40,349,467 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,351,790 >>> mbox cmd response data (48 bytes)
40,352,650 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,365,231 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,357,241 ready_for_fw is high
3,357,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,961 >>> mbox cmd response: success
18,318,085 UART:
18,318,483 UART: Running Caliptra FMC ...
18,319,594 UART:
18,319,750 UART: [state] CFI Enabled
18,388,952 UART: [fht] FMC Alias Private Key: 7
20,153,020 UART: [art] Extend RT PCRs Done
20,154,244 UART: [art] Lock RT PCRs Done
20,156,189 UART: [art] Populate DV Done
20,161,713 UART: [fht] FMC Alias Private Key: 7
20,163,252 UART: [art] Derive CDI
20,163,986 UART: [art] Store in in slot 0x4
20,222,009 UART: [art] Derive Key Pair
20,223,055 UART: [art] Store priv key in slot 0x5
22,685,678 UART: [art] Derive Key Pair - Done
22,698,673 UART: [art] Signing Cert with AUTHO
22,699,975 UART: RITY.KEYID = 7
24,412,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,720 UART: [art] PUB.X = 7A57B8D38DD106B042A89D9BE64D11DFC81F3D7CB9E202771CF643900CFF99D3C2B44373C9397EEBC70AE2437770653B
24,420,976 UART: [art] PUB.Y = BECD8BD5BCDBE17AA505DD312D09BB3030064DE444D3171457C8E47CED3FB63F55860DBC672702AC843CC03FAEEA768E
24,428,253 UART: [art] SIG.R = DDCD4B0B3D660FCEADC2436E200E9914F1DC24083800DA366239F4377B137FA51723411547D4CA2FCBEA685F57165E31
24,435,665 UART: [art] SIG.S = 4029AF0E750E9A62E81E384EB9F6F97D82CBEBD76EB561AD53D7796CF9F75E44DC91A0E29E51F690848262C5EDC34E89
25,413,903 UART: Caliptra RT
25,414,622 UART: [state] CFI Enabled
25,579,952 UART: [rt] RT listening for mailbox commands...
25,582,459 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,614,039 UART: [rt]cmd =0x41545348, len=116
25,616,443 >>> mbox cmd response data (12 bytes)
27,671,084 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,204,331 >>> mbox cmd response: success
34,204,848 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,239,285 UART:
34,239,618 UART: Running Caliptra FMC ...
34,240,750 UART:
34,240,912 UART: [state] CFI Enabled
34,336,850 UART: [art] Extend RT PCRs Done
34,338,062 UART: [art] Lock RT PCRs Done
34,339,315 UART: [art] Populate DV Done
34,344,944 UART: [fht] FMC Alias Private Key: 7
34,346,426 UART: [art] Derive CDI
34,347,238 UART: [art] Store in in slot 0x4
34,405,607 UART: [art] Derive Key Pair
34,406,649 UART: [art] Store priv key in slot 0x5
36,869,576 UART: [art] Derive Key Pair - Done
36,882,304 UART: [art] Signing Cert with AUTHO
36,883,610 UART: RITY.KEYID = 7
38,594,714 UART: [art] Erasing AUTHORITY.KEYID = 7
38,596,227 UART: [art] PUB.X = 3BB64A5ACF076C8BCBF0F2894FAAA8FF0CC01CB2D060FDDF402F4BCF8D82A451525095DE43FC631AB8E585FF600E8DA5
38,603,474 UART: [art] PUB.Y = 28AFED685D1AEDA08AF0D920F3801815A145B45F694A7BE880DF3857C7D24CC132F16DA717B1234A7A6F5ADFA4DEA0D7
38,610,777 UART: [art] SIG.R = 3F49DBC56A27F66B5ED7A0676CEBF5BD479845029BBBACFEAAD7D7ADD846CA7CC31331DE5C336A552CD08A2ED3A0F83F
38,618,231 UART: [art] SIG.S = DD811DB263A9574419937DBDDC5FB4CEF58CB534E7DB7ADE8C0416494A310AE50E27837826ACA9AB15F4344767565573
39,597,469 UART: mbox::rt_entry...
39,598,428 UART: ____ _ _ _ ____ _____
39,600,403 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,602,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,604,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,606,156 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,608,076 UART: |_|
39,608,884 UART:
39,892,939 UART: [rt] Runtime listening for mailbox commands...
39,895,102 >>> mbox cmd response data (48 bytes)
39,895,669 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,897,981 >>> mbox cmd response data (48 bytes)
39,898,861 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,911,431 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,419 UART:
192,784 UART: Running Caliptra ROM ...
193,906 UART:
603,677 UART: [state] CFI Enabled
616,545 UART: [state] LifecycleState = Unprovisioned
618,347 UART: [state] DebugLocked = No
620,292 UART: [state] WD Timer not started. Device not locked for debugging
623,246 UART: [kat] SHA2-256
802,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,953 UART: [kat] ++
814,486 UART: [kat] sha1
823,796 UART: [kat] SHA2-256
826,789 UART: [kat] SHA2-384
833,689 UART: [kat] SHA2-512-ACC
836,626 UART: [kat] ECC-384
3,277,406 UART: [kat] HMAC-384Kdf
3,291,566 UART: [kat] LMS
3,821,063 UART: [kat] --
3,825,082 UART: [cold-reset] ++
3,826,732 UART: [fht] FHT @ 0x50003400
3,837,772 UART: [idev] ++
3,838,331 UART: [idev] CDI.KEYID = 6
3,839,273 UART: [idev] SUBJECT.KEYID = 7
3,840,508 UART: [idev] UDS.KEYID = 0
3,841,400 ready_for_fw is high
3,841,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,936 UART: [idev] Erasing UDS.KEYID = 0
6,314,224 UART: [idev] Sha1 KeyId Algorithm
6,338,245 UART: [idev] --
6,342,124 UART: [ldev] ++
6,342,685 UART: [ldev] CDI.KEYID = 6
6,343,558 UART: [ldev] SUBJECT.KEYID = 5
6,344,756 UART: [ldev] AUTHORITY.KEYID = 7
6,346,036 UART: [ldev] FE.KEYID = 1
6,357,351 UART: [ldev] Erasing FE.KEYID = 1
8,836,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,862 UART: [ldev] --
10,625,810 UART: [fwproc] Wait for Commands...
10,628,607 UART: [fwproc] Recv command 0x46574c44
10,630,699 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,117,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,505,471 >>> mbox cmd response: success
14,509,347 UART: [afmc] ++
14,509,948 UART: [afmc] CDI.KEYID = 6
14,510,858 UART: [afmc] SUBJECT.KEYID = 7
14,512,018 UART: [afmc] AUTHORITY.KEYID = 5
17,006,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,451 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,329 UART: [afmc] --
18,802,728 UART: [cold-reset] --
18,807,339 UART: [state] Locking Datavault
18,812,100 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,740 UART: [state] Locking ICCM
18,816,261 UART: [exit] Launching FMC @ 0x40000130
18,824,650 UART:
18,824,879 UART: Running Caliptra FMC ...
18,825,973 UART:
18,826,125 UART: [state] CFI Enabled
18,834,433 UART: [fht] FMC Alias Private Key: 7
20,591,103 UART: [art] Extend RT PCRs Done
20,592,318 UART: [art] Lock RT PCRs Done
20,593,823 UART: [art] Populate DV Done
20,599,340 UART: [fht] FMC Alias Private Key: 7
20,600,834 UART: [art] Derive CDI
20,601,589 UART: [art] Store in in slot 0x4
20,644,337 UART: [art] Derive Key Pair
20,645,374 UART: [art] Store priv key in slot 0x5
23,071,638 UART: [art] Derive Key Pair - Done
23,084,676 UART: [art] Signing Cert with AUTHO
23,086,004 UART: RITY.KEYID = 7
24,791,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,106 UART: [art] PUB.X = 093646DB746A989FD35ECC0AE611E9A3C1E939C30BCACDC05C5E400FF68583B503A0C2FF46B4B65FE768704E59D154E4
24,800,330 UART: [art] PUB.Y = 8B48156B0BFB37701EA6E2653A5F9ACD5011804B8B2BC0A4E06DCAA1FDD33D761EFCB47BF619B258338525C14E767101
24,807,632 UART: [art] SIG.R = 91E014DBBAF621BE714771029B9AD30AE9F1BDC45BE6CCC565186A6386AFC500484B502B1804E4A6BFA999598317A99F
24,814,994 UART: [art] SIG.S = 68681C76E141A8EF4404631EDB22F1A6EC24EED5DF8CDA49470136E2C9A7C8B1E2C7ABAAD9BB98916F2989BA833BAF92
25,793,978 UART: Caliptra RT
25,794,662 UART: [state] CFI Enabled
25,911,194 UART: [rt] RT listening for mailbox commands...
25,913,573 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,944,342 UART: [rt]cmd =0x41545348, len=116
25,946,663 >>> mbox cmd response data (12 bytes)
27,997,715 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,097,975 UART:
28,098,334 UART: Running Caliptra ROM ...
28,099,379 UART:
28,099,524 UART: [state] CFI Enabled
28,112,616 UART: [state] LifecycleState = Unprovisioned
28,114,447 UART: [state] DebugLocked = No
28,116,309 UART: [state] WD Timer not started. Device not locked for debugging
28,120,593 UART: [kat] SHA2-256
28,299,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,311,342 UART: [kat] ++
28,311,884 UART: [kat] sha1
28,322,499 UART: [kat] SHA2-256
28,325,502 UART: [kat] SHA2-384
28,331,153 UART: [kat] SHA2-512-ACC
28,334,096 UART: [kat] ECC-384
30,777,204 UART: [kat] HMAC-384Kdf
30,790,527 UART: [kat] LMS
31,320,045 UART: [kat] --
31,323,924 UART: [update-reset] ++
34,321,159 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,323,930 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,582,122 >>> mbox cmd response: success
34,582,475 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,582,751 UART: [update-reset] Copying MAN_2 To MAN_1
34,605,011 UART: [update-reset Success] --
34,610,752 UART: [state] Locking Datavault
34,614,765 UART: [state] Locking PCR0, PCR1 and PCR31
34,616,404 UART: [state] Locking ICCM
34,617,591 UART: [exit] Launching FMC @ 0x40000130
34,625,988 UART:
34,626,221 UART: Running Caliptra FMC ...
34,627,313 UART:
34,627,463 UART: [state] CFI Enabled
34,671,519 UART: [art] Extend RT PCRs Done
34,672,658 UART: [art] Lock RT PCRs Done
34,674,312 UART: [art] Populate DV Done
34,679,550 UART: [fht] FMC Alias Private Key: 7
34,681,293 UART: [art] Derive CDI
34,682,098 UART: [art] Store in in slot 0x4
34,724,448 UART: [art] Derive Key Pair
34,725,490 UART: [art] Store priv key in slot 0x5
37,152,284 UART: [art] Derive Key Pair - Done
37,165,476 UART: [art] Signing Cert with AUTHO
37,166,822 UART: RITY.KEYID = 7
38,872,005 UART: [art] Erasing AUTHORITY.KEYID = 7
38,873,491 UART: [art] PUB.X = CDE0FD8A2F2D2E5E2597719AA86B28FE4BDB55D3EED9C217A95450AE60A1E2425726D8409C8C8DD210CA162C28AB58A6
38,880,789 UART: [art] PUB.Y = 618D3A5285E95973994033D6836D1A826C61DF0DCFAD7675475D4C10ACF53ED96E05C88F461013D280B873D34BF6AD11
38,888,066 UART: [art] SIG.R = B00FE42062395C419677BAAAA2C67FE7624297B0400668D28D5C3DA0611A4C7D1765BCCBCF0DC9D882E518076EEB5F95
38,895,446 UART: [art] SIG.S = 2B3C29044AE97E9E722F8E889DA173363F387DB074E41CA8A664576EBA3B62CF1759642D23B09AC99B3FF38E2B1DB40B
39,874,372 UART: mbox::rt_entry...
39,875,335 UART: ____ _ _ _ ____ _____
39,877,260 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,879,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,881,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,883,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,885,076 UART: |_|
39,885,973 UART:
40,171,496 UART: [rt] Runtime listening for mailbox commands...
40,173,666 >>> mbox cmd response data (48 bytes)
40,174,228 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,176,538 >>> mbox cmd response data (48 bytes)
40,177,404 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,189,948 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,697,445 ready_for_fw is high
3,697,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,607 >>> mbox cmd response: success
18,530,412 UART:
18,530,789 UART: Running Caliptra FMC ...
18,531,928 UART:
18,532,076 UART: [state] CFI Enabled
18,539,863 UART: [fht] FMC Alias Private Key: 7
20,296,653 UART: [art] Extend RT PCRs Done
20,297,877 UART: [art] Lock RT PCRs Done
20,299,498 UART: [art] Populate DV Done
20,305,120 UART: [fht] FMC Alias Private Key: 7
20,306,755 UART: [art] Derive CDI
20,307,596 UART: [art] Store in in slot 0x4
20,350,412 UART: [art] Derive Key Pair
20,351,411 UART: [art] Store priv key in slot 0x5
22,778,167 UART: [art] Derive Key Pair - Done
22,791,116 UART: [art] Signing Cert with AUTHO
22,792,448 UART: RITY.KEYID = 7
24,498,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,651 UART: [art] PUB.X = 3ED0675313CA20149D178964D4A3B4A3CE5A0340639CE17AB9DEED4DECD71D77DD356FE8E940BE838A871329E5DEC8AF
24,506,939 UART: [art] PUB.Y = 6E8817BC531C96112917C8C19E25D8EDFCA9B1951329E8220314413942458E629FC4B4131D10C4EFF039F38389116333
24,514,182 UART: [art] SIG.R = 4FBD086F34C76216443B4E2C56E3BE3B5AAB255D7F65BC486AA259BC0B42D997ACADB39CACF07106F70910F80841E2FB
24,521,561 UART: [art] SIG.S = 7AA1F372FEDD3F1168B4B2560FD634748921E6933EC997DD10ADAE57F75186263D9424BCA2A79DE0EBD7E81D7D9A800F
25,500,589 UART: Caliptra RT
25,501,305 UART: [state] CFI Enabled
25,617,944 UART: [rt] RT listening for mailbox commands...
25,620,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,651,229 UART: [rt]cmd =0x41545348, len=116
25,653,399 >>> mbox cmd response data (12 bytes)
27,703,077 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,136,419 >>> mbox cmd response: success
34,136,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,172,248 UART:
34,172,573 UART: Running Caliptra FMC ...
34,173,690 UART:
34,173,843 UART: [state] CFI Enabled
34,217,908 UART: [art] Extend RT PCRs Done
34,219,045 UART: [art] Lock RT PCRs Done
34,220,632 UART: [art] Populate DV Done
34,226,143 UART: [fht] FMC Alias Private Key: 7
34,227,709 UART: [art] Derive CDI
34,228,441 UART: [art] Store in in slot 0x4
34,271,023 UART: [art] Derive Key Pair
34,272,018 UART: [art] Store priv key in slot 0x5
36,698,921 UART: [art] Derive Key Pair - Done
36,712,077 UART: [art] Signing Cert with AUTHO
36,713,406 UART: RITY.KEYID = 7
38,419,032 UART: [art] Erasing AUTHORITY.KEYID = 7
38,420,545 UART: [art] PUB.X = 40D33AEF9FEAE7E0AFEAA7B846EE18E676EBC883C8D1D6EB9736FAD30E38E1BBEF0DE959709B19275074E605E240DADC
38,427,845 UART: [art] PUB.Y = 5D3C9DF33091285AB26E4BACB68AA56720D142B6456CBD03BF7F6000A3B0B40EAD2806511FE722CB0AB0804FC7E64DA2
38,435,068 UART: [art] SIG.R = C4FE59FB56E8DAA232C9256D0DC61CC60EB20DCEF662B51E7EA194E5813B7691C9C5B22FEFB777C256292DE87EBFF300
38,442,514 UART: [art] SIG.S = 0B715126FFF38108B5B291DCDB042505F4971CBDC7C227B7FEE097F1B50B46D068CA77243E72E6EC14AB75EF3FEC6E0E
39,420,330 UART: mbox::rt_entry...
39,421,266 UART: ____ _ _ _ ____ _____
39,423,422 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,425,429 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,427,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,429,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,431,238 UART: |_|
39,432,036 UART:
39,714,343 UART: [rt] Runtime listening for mailbox commands...
39,716,502 >>> mbox cmd response data (48 bytes)
39,717,088 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,719,404 >>> mbox cmd response data (48 bytes)
39,720,285 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,732,823 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,136 UART:
192,482 UART: Running Caliptra ROM ...
193,672 UART:
193,828 UART: [state] CFI Enabled
264,602 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
268,978 UART: [state] WD Timer not started. Device not locked for debugging
272,727 UART: [kat] SHA2-256
462,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,353 UART: [kat] ++
473,803 UART: [kat] sha1
484,961 UART: [kat] SHA2-256
487,978 UART: [kat] SHA2-384
493,896 UART: [kat] SHA2-512-ACC
496,472 UART: [kat] ECC-384
2,947,829 UART: [kat] HMAC-384Kdf
2,974,487 UART: [kat] LMS
3,506,258 UART: [kat] --
3,511,193 UART: [cold-reset] ++
3,513,127 UART: [fht] FHT @ 0x50003400
3,525,452 UART: [idev] ++
3,526,091 UART: [idev] CDI.KEYID = 6
3,527,123 UART: [idev] SUBJECT.KEYID = 7
3,528,293 UART: [idev] UDS.KEYID = 0
3,529,478 ready_for_fw is high
3,529,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,776 UART: [idev] Erasing UDS.KEYID = 0
6,033,515 UART: [idev] Sha1 KeyId Algorithm
6,057,050 UART: [idev] --
6,062,408 UART: [ldev] ++
6,063,088 UART: [ldev] CDI.KEYID = 6
6,064,048 UART: [ldev] SUBJECT.KEYID = 5
6,065,154 UART: [ldev] AUTHORITY.KEYID = 7
6,066,385 UART: [ldev] FE.KEYID = 1
6,104,447 UART: [ldev] Erasing FE.KEYID = 1
8,614,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,026 UART: [ldev] --
10,418,017 UART: [fwproc] Wait for Commands...
10,420,655 UART: [fwproc] Recv command 0x46574c44
10,422,962 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,611,183 >>> mbox cmd response: success
14,615,430 UART: [afmc] ++
14,616,134 UART: [afmc] CDI.KEYID = 6
14,617,323 UART: [afmc] SUBJECT.KEYID = 7
14,618,756 UART: [afmc] AUTHORITY.KEYID = 5
17,155,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,879,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,896,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,911,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,926,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,386 UART: [afmc] --
18,952,959 UART: [cold-reset] --
18,955,811 UART: [state] Locking Datavault
18,961,444 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,635 UART: [state] Locking ICCM
18,965,447 UART: [exit] Launching FMC @ 0x40000130
18,974,124 UART:
18,974,363 UART: Running Caliptra FMC ...
18,975,391 UART:
18,975,538 UART: [state] CFI Enabled
19,035,308 UART: [fht] FMC Alias Private Key: 7
20,799,538 UART: [art] Extend RT PCRs Done
20,800,751 UART: [art] Lock RT PCRs Done
20,802,619 UART: [art] Populate DV Done
20,808,080 UART: [fht] FMC Alias Private Key: 7
20,809,563 UART: [art] Derive CDI
20,810,297 UART: [art] Store in in slot 0x4
20,867,981 UART: [art] Derive Key Pair
20,869,019 UART: [art] Store priv key in slot 0x5
23,331,941 UART: [art] Derive Key Pair - Done
23,344,883 UART: [art] Signing Cert with AUTHO
23,346,213 UART: RITY.KEYID = 7
25,057,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,367 UART: [art] PUB.X = EBC48AEEE0FD03364B31FCF38C73FC2C7D7E0B1973C2C8F25F4A372A13DEC06D9533CA37CDFC28CD24C61585EB5EA3CE
25,066,666 UART: [art] PUB.Y = 3FFFF3A2C02E8B5E1A2D99A416788318E2DCF881C684D3F5DFBD44C292A875F810BFBA80D07963EAF76DBA19E60A91B5
25,073,994 UART: [art] SIG.R = AC946EFBDC8440AA1CF77CEF26AE0131F700AE7948E7FD9ECB6DD966E56BA666D549239C2D60991C20DBBB41E1ADD971
25,081,383 UART: [art] SIG.S = 0D255D2E713D7606D820BF4FD5530C9060158A8F26A54AE739B27C86721089B6C5305299D3E357C2C3586D578082C867
26,060,845 UART: Caliptra RT
26,061,534 UART: [state] CFI Enabled
26,225,922 UART: [rt] RT listening for mailbox commands...
26,228,229 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,259,397 UART: [rt]cmd =0x41545348, len=116
26,261,626 >>> mbox cmd response data (12 bytes)
28,322,549 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,423,214 UART:
28,423,570 UART: Running Caliptra ROM ...
28,424,702 UART:
28,424,873 UART: [state] CFI Enabled
28,487,329 UART: [state] LifecycleState = Unprovisioned
28,489,368 UART: [state] DebugLocked = No
28,491,292 UART: [state] WD Timer not started. Device not locked for debugging
28,495,259 UART: [kat] SHA2-256
28,685,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,695,892 UART: [kat] ++
28,696,396 UART: [kat] sha1
28,708,580 UART: [kat] SHA2-256
28,711,589 UART: [kat] SHA2-384
28,718,552 UART: [kat] SHA2-512-ACC
28,721,174 UART: [kat] ECC-384
31,172,918 UART: [kat] HMAC-384Kdf
31,197,344 UART: [kat] LMS
31,728,872 UART: [kat] --
31,735,122 UART: [update-reset] ++
34,753,302 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,756,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,150,132 >>> mbox cmd response: success
35,150,490 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,150,940 UART: [update-reset] Copying MAN_2 To MAN_1
35,188,521 UART: [update-reset Success] --
35,193,384 UART: [state] Locking Datavault
35,196,544 UART: [state] Locking PCR0, PCR1 and PCR31
35,198,686 UART: [state] Locking ICCM
35,200,082 UART: [exit] Launching FMC @ 0x40000130
35,208,758 UART:
35,208,997 UART: Running Caliptra FMC ...
35,210,118 UART:
35,210,279 UART: [state] CFI Enabled
35,302,895 UART: [art] Extend RT PCRs Done
35,304,079 UART: [art] Lock RT PCRs Done
35,305,430 UART: [art] Populate DV Done
35,311,051 UART: [fht] FMC Alias Private Key: 7
35,312,756 UART: [art] Derive CDI
35,313,567 UART: [art] Store in in slot 0x4
35,371,385 UART: [art] Derive Key Pair
35,372,419 UART: [art] Store priv key in slot 0x5
37,835,459 UART: [art] Derive Key Pair - Done
37,848,505 UART: [art] Signing Cert with AUTHO
37,849,807 UART: RITY.KEYID = 7
39,560,643 UART: [art] Erasing AUTHORITY.KEYID = 7
39,562,144 UART: [art] PUB.X = 9A9B258C6F4ADEF94E20C33E860BFCE71C4440145C2BC0FD1F1264FD848AC7B7547EC93B33C19426981FD0A443290CD1
39,569,450 UART: [art] PUB.Y = 6C1E7273079B90DD541208CCF22B161024265BBDEB319E2948C21EAD33583B52C930FB2B2149828C1A9C1A77836DCDD1
39,576,693 UART: [art] SIG.R = E0606D2D530A2AA9FE032297C0AA9E8AD6C69FB56D4E54D074A5C0A1DADA34A1DD4BB3FDFC97407FC27E98DA69372555
39,584,136 UART: [art] SIG.S = CDDC161E3D68A8D69BC47C561B431381663FC9FBEAE9CE318BE69EE13DC5806C3B79EF1982C546B60063C33C548931D0
40,562,472 UART: mbox::rt_entry...
40,563,421 UART: ____ _ _ _ ____ _____
40,565,401 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,567,401 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,569,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,571,254 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,573,183 UART: |_|
40,573,990 UART:
40,858,220 UART: [rt] Runtime listening for mailbox commands...
40,860,358 >>> mbox cmd response data (48 bytes)
40,860,924 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,863,286 >>> mbox cmd response data (48 bytes)
40,864,153 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,876,864 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,440,518 ready_for_fw is high
3,440,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,398 >>> mbox cmd response: success
19,030,635 UART:
19,031,022 UART: Running Caliptra FMC ...
19,032,129 UART:
19,032,285 UART: [state] CFI Enabled
19,095,528 UART: [fht] FMC Alias Private Key: 7
20,859,431 UART: [art] Extend RT PCRs Done
20,860,651 UART: [art] Lock RT PCRs Done
20,862,467 UART: [art] Populate DV Done
20,867,876 UART: [fht] FMC Alias Private Key: 7
20,869,523 UART: [art] Derive CDI
20,870,262 UART: [art] Store in in slot 0x4
20,928,009 UART: [art] Derive Key Pair
20,929,052 UART: [art] Store priv key in slot 0x5
23,392,057 UART: [art] Derive Key Pair - Done
23,404,886 UART: [art] Signing Cert with AUTHO
23,406,192 UART: RITY.KEYID = 7
25,118,474 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,983 UART: [art] PUB.X = ECFAC2189787584E539121C35F06A28EAD1636F1B26EB7100EA74D60C7C9FB2FAE5F8E37DCEBA7AB1B45986AB3E6B5E2
25,127,289 UART: [art] PUB.Y = EB65A6F70564A0977C69E8C66E056A042E6887128998D590C99F5E563578FE1E9038C523DD04122F87817FE87175028E
25,134,489 UART: [art] SIG.R = 344CB7775C53745FF27F95017D2CC20E4B6234FACCDF4FB46ECF3FA72D2785774751293F66D788F0F93311AE802E1552
25,141,883 UART: [art] SIG.S = A44318451FF68C8074DDFFF07C5D36CA4FCBDF5A6C0E0DF13630B581A7503152DBA945A0A43535BA44C32CE79D863868
26,119,996 UART: Caliptra RT
26,120,712 UART: [state] CFI Enabled
26,286,403 UART: [rt] RT listening for mailbox commands...
26,288,632 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,320,166 UART: [rt]cmd =0x41545348, len=116
26,322,295 >>> mbox cmd response data (12 bytes)
28,370,445 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,375,736 >>> mbox cmd response: success
35,376,173 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,411,036 UART:
35,411,418 UART: Running Caliptra FMC ...
35,412,463 UART:
35,412,616 UART: [state] CFI Enabled
35,514,771 UART: [art] Extend RT PCRs Done
35,515,962 UART: [art] Lock RT PCRs Done
35,517,626 UART: [art] Populate DV Done
35,523,309 UART: [fht] FMC Alias Private Key: 7
35,525,009 UART: [art] Derive CDI
35,525,827 UART: [art] Store in in slot 0x4
35,583,880 UART: [art] Derive Key Pair
35,584,915 UART: [art] Store priv key in slot 0x5
38,047,923 UART: [art] Derive Key Pair - Done
38,060,761 UART: [art] Signing Cert with AUTHO
38,062,083 UART: RITY.KEYID = 7
39,774,703 UART: [art] Erasing AUTHORITY.KEYID = 7
39,776,208 UART: [art] PUB.X = FC51408B9B4CA0C795EDC6532CB74F8B41731778C6F4B15CB49A573DE040285E6B6F2A5E1CA8F9155F67DBFCB9DD61E0
39,783,461 UART: [art] PUB.Y = 24AE5796462EFE06FD6A3762F83537F040D4346EC62666AAE13D7A41924E1382B20BD5C69290C51DC61D750751B5D5A4
39,790,693 UART: [art] SIG.R = 8FF9E62D8E116889B6C9957FF682E79502EC15EEC6DE93F3FB0F5B97D3EA0806E7B2450932BBA88FE8E809C1F21EF773
39,798,123 UART: [art] SIG.S = C0A62F0A2A81C69AA8B9FB8FAC3013A0E682C1E567168A48A6E7121FFEF228E7CBA0EC6A35E2055E1F24EA163806225B
40,776,617 UART: mbox::rt_entry...
40,777,579 UART: ____ _ _ _ ____ _____
40,779,563 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,781,566 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,783,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,785,424 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,787,353 UART: |_|
40,788,190 UART:
41,071,562 UART: [rt] Runtime listening for mailbox commands...
41,073,747 >>> mbox cmd response data (48 bytes)
41,074,333 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,076,662 >>> mbox cmd response data (48 bytes)
41,077,541 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,090,094 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,305 UART:
192,671 UART: Running Caliptra ROM ...
194,052 UART:
603,582 UART: [state] CFI Enabled
618,369 UART: [state] LifecycleState = Unprovisioned
620,737 UART: [state] DebugLocked = No
622,766 UART: [state] WD Timer not started. Device not locked for debugging
627,000 UART: [kat] SHA2-256
816,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,636 UART: [kat] ++
828,177 UART: [kat] sha1
840,056 UART: [kat] SHA2-256
843,025 UART: [kat] SHA2-384
849,587 UART: [kat] SHA2-512-ACC
852,173 UART: [kat] ECC-384
3,296,445 UART: [kat] HMAC-384Kdf
3,309,540 UART: [kat] LMS
3,841,370 UART: [kat] --
3,845,530 UART: [cold-reset] ++
3,847,247 UART: [fht] FHT @ 0x50003400
3,859,144 UART: [idev] ++
3,859,843 UART: [idev] CDI.KEYID = 6
3,860,885 UART: [idev] SUBJECT.KEYID = 7
3,861,981 UART: [idev] UDS.KEYID = 0
3,862,901 ready_for_fw is high
3,863,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,811 UART: [idev] Erasing UDS.KEYID = 0
6,338,377 UART: [idev] Sha1 KeyId Algorithm
6,361,270 UART: [idev] --
6,365,889 UART: [ldev] ++
6,366,581 UART: [ldev] CDI.KEYID = 6
6,367,489 UART: [ldev] SUBJECT.KEYID = 5
6,368,640 UART: [ldev] AUTHORITY.KEYID = 7
6,369,860 UART: [ldev] FE.KEYID = 1
6,381,358 UART: [ldev] Erasing FE.KEYID = 1
8,861,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,039 UART: [ldev] --
10,650,733 UART: [fwproc] Wait for Commands...
10,653,739 UART: [fwproc] Recv command 0x46574c44
10,656,042 UART: [fwproc] Recv'd Img size: 114448 bytes
14,111,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,195,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,855,357 >>> mbox cmd response: success
14,859,154 UART: [afmc] ++
14,859,865 UART: [afmc] CDI.KEYID = 6
14,861,107 UART: [afmc] SUBJECT.KEYID = 7
14,862,540 UART: [afmc] AUTHORITY.KEYID = 5
17,366,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,105,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,120,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,135,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,126 UART: [afmc] --
19,162,113 UART: [cold-reset] --
19,166,577 UART: [state] Locking Datavault
19,171,289 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,484 UART: [state] Locking ICCM
19,175,360 UART: [exit] Launching FMC @ 0x40000130
19,184,039 UART:
19,184,278 UART: Running Caliptra FMC ...
19,185,373 UART:
19,185,526 UART: [state] CFI Enabled
19,193,672 UART: [fht] FMC Alias Private Key: 7
20,950,561 UART: [art] Extend RT PCRs Done
20,951,795 UART: [art] Lock RT PCRs Done
20,953,532 UART: [art] Populate DV Done
20,958,884 UART: [fht] FMC Alias Private Key: 7
20,960,520 UART: [art] Derive CDI
20,961,323 UART: [art] Store in in slot 0x4
21,004,128 UART: [art] Derive Key Pair
21,005,167 UART: [art] Store priv key in slot 0x5
23,431,706 UART: [art] Derive Key Pair - Done
23,444,759 UART: [art] Signing Cert with AUTHO
23,446,062 UART: RITY.KEYID = 7
25,151,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,951 UART: [art] PUB.X = 9050C7DB82D5BEBD6D5E6539A92C8B09C735596E73F2678924FB38300576CA4D7272308A9D49C2DD8923EA0B0C96FBB3
25,160,263 UART: [art] PUB.Y = 1F4014B4E9E9F8CF10227A7BE9586DA7BEFADA782BF8C381C4A9FADF7C0FDD527F77CD2F06995913F7C662524D2E1D5E
25,167,485 UART: [art] SIG.R = 011AD173F4DACBCBC9A88D26BB5D58BF7CE58D56A87935B652B389B9BC67663331DB64C8A8F6331F95879563DAE7E8A3
25,174,914 UART: [art] SIG.S = 329C7938547E553A434B6DB9399A50FFD8538274081744B75F07E0CE8C9A1B3D357EF70E5A73803DCB1B23D645EE1D84
26,153,974 UART: Caliptra RT
26,154,714 UART: [state] CFI Enabled
26,271,837 UART: [rt] RT listening for mailbox commands...
26,274,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,305,021 UART: [rt]cmd =0x41545348, len=116
26,307,175 >>> mbox cmd response data (12 bytes)
28,356,921 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,457,950 UART:
28,458,290 UART: Running Caliptra ROM ...
28,459,412 UART:
28,459,575 UART: [state] CFI Enabled
28,468,980 UART: [state] LifecycleState = Unprovisioned
28,470,863 UART: [state] DebugLocked = No
28,473,392 UART: [state] WD Timer not started. Device not locked for debugging
28,477,845 UART: [kat] SHA2-256
28,667,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,678,448 UART: [kat] ++
28,679,058 UART: [kat] sha1
28,690,757 UART: [kat] SHA2-256
28,693,767 UART: [kat] SHA2-384
28,699,964 UART: [kat] SHA2-512-ACC
28,702,533 UART: [kat] ECC-384
31,145,331 UART: [kat] HMAC-384Kdf
31,158,299 UART: [kat] LMS
31,689,875 UART: [kat] --
31,695,904 UART: [update-reset] ++
34,717,284 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,719,783 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,113,616 >>> mbox cmd response: success
35,114,013 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,114,780 UART: [update-reset] Copying MAN_2 To MAN_1
35,152,343 UART: [update-reset Success] --
35,155,895 UART: [state] Locking Datavault
35,160,290 UART: [state] Locking PCR0, PCR1 and PCR31
35,162,486 UART: [state] Locking ICCM
35,164,577 UART: [exit] Launching FMC @ 0x40000130
35,173,239 UART:
35,173,466 UART: Running Caliptra FMC ...
35,174,554 UART:
35,174,703 UART: [state] CFI Enabled
35,218,703 UART: [art] Extend RT PCRs Done
35,219,840 UART: [art] Lock RT PCRs Done
35,221,548 UART: [art] Populate DV Done
35,227,051 UART: [fht] FMC Alias Private Key: 7
35,228,796 UART: [art] Derive CDI
35,229,624 UART: [art] Store in in slot 0x4
35,272,136 UART: [art] Derive Key Pair
35,273,176 UART: [art] Store priv key in slot 0x5
37,699,902 UART: [art] Derive Key Pair - Done
37,712,741 UART: [art] Signing Cert with AUTHO
37,714,219 UART: RITY.KEYID = 7
39,419,790 UART: [art] Erasing AUTHORITY.KEYID = 7
39,421,288 UART: [art] PUB.X = F125B03A07E59C6C632BC6A4A80E8D12DF99EE5E4266527EA6975E1B67D29236F6B927985CED0201732FDEFFACD006CA
39,428,576 UART: [art] PUB.Y = 59200E5E28F0A71B40EA810D8330FBCB1437CF4371F0211F71A47F3A4687B69AF9DD855088BC050B3F299B9C8FD62A85
39,435,849 UART: [art] SIG.R = AB73DACA6AD517323510C26BAFD906FF1FAFB5EB9EF315B1F2B0697BCD1B29EBEF1A0DBE19B4DB9C602983A093CD7848
39,443,232 UART: [art] SIG.S = 16D27C8A9CC18162312C6EA8D0ADEDF00F29A664AF9676821EAEAA8E133FFDA2BFF6BE366BD95DF20922428A5602B18F
40,421,973 UART: mbox::rt_entry...
40,422,923 UART: ____ _ _ _ ____ _____
40,424,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,426,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,428,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,430,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,432,648 UART: |_|
40,433,654 UART:
40,720,998 UART: [rt] Runtime listening for mailbox commands...
40,723,108 >>> mbox cmd response data (48 bytes)
40,723,687 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,726,041 >>> mbox cmd response data (48 bytes)
40,726,900 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,739,442 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,757,047 ready_for_fw is high
3,757,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,975,101 >>> mbox cmd response: success
19,229,636 UART:
19,230,049 UART: Running Caliptra FMC ...
19,231,188 UART:
19,231,343 UART: [state] CFI Enabled
19,239,133 UART: [fht] FMC Alias Private Key: 7
20,996,289 UART: [art] Extend RT PCRs Done
20,997,513 UART: [art] Lock RT PCRs Done
20,999,025 UART: [art] Populate DV Done
21,004,226 UART: [fht] FMC Alias Private Key: 7
21,005,772 UART: [art] Derive CDI
21,006,520 UART: [art] Store in in slot 0x4
21,048,736 UART: [art] Derive Key Pair
21,049,738 UART: [art] Store priv key in slot 0x5
23,476,941 UART: [art] Derive Key Pair - Done
23,489,840 UART: [art] Signing Cert with AUTHO
23,491,171 UART: RITY.KEYID = 7
25,197,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,701 UART: [art] PUB.X = CAD04C60706A94E298352377BF4A0B31F7166A34F66ACF1735D924788167B8A1AA842E43AAAA86F3054CD94E599705B0
25,205,987 UART: [art] PUB.Y = FE6CE8D477876863139F3BF7BF9278547490AD2B897531EDB98073D81B586243F9924DFC7A9D102F2078D72F9C3E81B2
25,213,193 UART: [art] SIG.R = 84BECB2F2FB469EE6902E7203058CBA9492C1730FE75DF263F4843A477F229A6F89815A2A004B6B1F5E2225B4B104F38
25,220,618 UART: [art] SIG.S = 5D87D95D8FE095C46951586A3FDA2DB6FA3290ECA9932918D4CBAB3E183978A9A8368FE4AE4B6ABF19A8E0954C6A0FBA
26,199,485 UART: Caliptra RT
26,200,177 UART: [state] CFI Enabled
26,317,955 UART: [rt] RT listening for mailbox commands...
26,320,312 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,351,067 UART: [rt]cmd =0x41545348, len=116
26,353,220 >>> mbox cmd response data (12 bytes)
28,402,601 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,325,310 >>> mbox cmd response: success
35,325,779 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,360,097 UART:
35,360,378 UART: Running Caliptra FMC ...
35,361,403 UART:
35,361,542 UART: [state] CFI Enabled
35,405,350 UART: [art] Extend RT PCRs Done
35,406,537 UART: [art] Lock RT PCRs Done
35,408,225 UART: [art] Populate DV Done
35,413,872 UART: [fht] FMC Alias Private Key: 7
35,415,579 UART: [art] Derive CDI
35,416,306 UART: [art] Store in in slot 0x4
35,459,001 UART: [art] Derive Key Pair
35,459,996 UART: [art] Store priv key in slot 0x5
37,886,963 UART: [art] Derive Key Pair - Done
37,899,857 UART: [art] Signing Cert with AUTHO
37,901,152 UART: RITY.KEYID = 7
39,606,964 UART: [art] Erasing AUTHORITY.KEYID = 7
39,608,464 UART: [art] PUB.X = ECB4E1EE1F6B6E790C067F3D5C4171D0241B73F06367ED908D3053F9F47F06ED7689B9D377428E6B78AF8DF76083832D
39,615,707 UART: [art] PUB.Y = 2EFC106CCC1CAF97E11B7B1CAB0805793E9D73F1F0904EF81139301D682BDD7D3153D84982C1D965C5A5D5510A232269
39,622,985 UART: [art] SIG.R = C1568B97623910D5EC64481491A8AC47AE5828EEAB9B293BF53A23724F0458DC94B352136BFEBEE6BA6E82392447074D
39,630,367 UART: [art] SIG.S = F6A674FFFEC17A213915C1176D08439F106766A26955E91B8B0FC79346268B2CE946BF3B82E28662726861FFEB1389B2
40,609,497 UART: mbox::rt_entry...
40,610,447 UART: ____ _ _ _ ____ _____
40,612,342 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,614,353 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,616,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,618,327 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,620,172 UART: |_|
40,620,983 UART:
40,900,504 UART: [rt] Runtime listening for mailbox commands...
40,902,701 >>> mbox cmd response data (48 bytes)
40,903,262 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,905,570 >>> mbox cmd response data (48 bytes)
40,906,419 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,918,955 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,254 UART: [kat] LMS
1,475,450 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 ready_for_fw is high
1,480,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,376 UART: [idev] Erasing UDS.KEYID = 0
1,504,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,450 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,520,789 UART: [ldev] Erasing FE.KEYID = 1
1,545,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,882 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,198 UART: [fwproc] Received command 0x46574c44
1,586,989 UART: [fwproc] Received Image of size 114448 bytes
2,887,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,824 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,263 >>> mbox cmd response: success
3,080,507 UART: [afmc] ++
3,080,675 UART: [afmc] CDI.KEYID = 6
3,081,037 UART: [afmc] SUBJECT.KEYID = 7
3,081,462 UART: [afmc] AUTHORITY.KEYID = 5
3,116,389 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,073 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,466 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,156 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,965 UART: [afmc] --
3,160,079 UART: [cold-reset] --
3,160,839 UART: [state] Locking Datavault
3,161,876 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,480 UART: [state] Locking ICCM
3,163,046 UART: [exit] Launching FMC @ 0x40000130
3,168,375 UART:
3,168,391 UART: Running Caliptra FMC ...
3,168,799 UART:
3,168,853 UART: [state] CFI Enabled
3,179,072 UART: [fht] FMC Alias Private Key: 7
3,286,901 UART: [art] Extend RT PCRs Done
3,287,329 UART: [art] Lock RT PCRs Done
3,288,771 UART: [art] Populate DV Done
3,296,994 UART: [fht] FMC Alias Private Key: 7
3,297,922 UART: [art] Derive CDI
3,298,202 UART: [art] Store in in slot 0x4
3,383,819 UART: [art] Derive Key Pair
3,384,179 UART: [art] Store priv key in slot 0x5
3,397,287 UART: [art] Derive Key Pair - Done
3,412,031 UART: [art] Signing Cert with AUTHO
3,412,511 UART: RITY.KEYID = 7
3,427,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,522 UART: [art] PUB.X = 09B241AC892D184CA14BD48455E39F6148BEBB87ECE277D18A1DB6E9863EA317A7D169ED63A4B4446A6D106E7551C3A4
3,435,297 UART: [art] PUB.Y = B0A07FEFC4428C087DE4E4B78EC4911434CA2FFBAC7C371E2DE2C0E74F3CFF7BD9DB4DF2854E017CE13274EF43C421EE
3,442,267 UART: [art] SIG.R = 0C075B40E7BC8E769342C8837350618532B533269D714DFEEC0F5D59E88B66D8A863624EF692152469E220B9A49996EF
3,449,020 UART: [art] SIG.S = B5EC715961B382C691B2A9A699CF13F2F4D01F52C6224097A18A0084F31E07D3B9CD61EA9E09CE463D2404D4880C91DB
3,472,977 UART: Caliptra RT
3,473,230 UART: [state] CFI Enabled
3,581,355 UART: [rt] RT listening for mailbox commands...
3,582,025 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,599 UART: [rt]cmd =0x41545348, len=116
3,614,319 >>> mbox cmd response data (12 bytes)
3,614,320 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,008 UART:
3,615,024 UART: Running Caliptra ROM ...
3,615,432 UART:
3,615,486 UART: [state] CFI Enabled
3,618,214 UART: [state] LifecycleState = Unprovisioned
3,618,869 UART: [state] DebugLocked = No
3,619,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,192 UART: [kat] SHA2-256
4,415,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,238 UART: [kat] ++
4,419,390 UART: [kat] sha1
4,423,582 UART: [kat] SHA2-256
4,425,520 UART: [kat] SHA2-384
4,428,185 UART: [kat] SHA2-512-ACC
4,430,085 UART: [kat] ECC-384
4,435,600 UART: [kat] HMAC-384Kdf
4,440,076 UART: [kat] LMS
5,008,272 UART: [kat] --
5,008,979 UART: [update-reset] ++
5,936,431 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,937,519 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,033,953 >>> mbox cmd response: success
6,033,953 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,034,290 UART: [update-reset] Copying MAN_2 To MAN_1
6,042,304 UART: [update-reset Success] --
6,043,345 UART: [state] Locking Datavault
6,043,987 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,591 UART: [state] Locking ICCM
6,045,049 UART: [exit] Launching FMC @ 0x40000130
6,050,378 UART:
6,050,394 UART: Running Caliptra FMC ...
6,050,802 UART:
6,050,856 UART: [state] CFI Enabled
6,140,009 UART: [art] Extend RT PCRs Done
6,140,437 UART: [art] Lock RT PCRs Done
6,141,598 UART: [art] Populate DV Done
6,149,951 UART: [fht] FMC Alias Private Key: 7
6,151,007 UART: [art] Derive CDI
6,151,287 UART: [art] Store in in slot 0x4
6,236,996 UART: [art] Derive Key Pair
6,237,356 UART: [art] Store priv key in slot 0x5
6,250,780 UART: [art] Derive Key Pair - Done
6,265,495 UART: [art] Signing Cert with AUTHO
6,265,975 UART: RITY.KEYID = 7
6,281,295 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,060 UART: [art] PUB.X = B75835DA97D2C2F6D7DEA5443A3A20FBB20AE890B0F1086918B04DA2B5E106C3C2F44B668D649E05589FAA9970A1E909
6,288,823 UART: [art] PUB.Y = 5F581D0BE00F45B9871C7EE81C532C5D1FAAC4A585EC3C1248EF818EED57E921274FBF0A4BFD7BE26B697CA4ACF60B3B
6,295,785 UART: [art] SIG.R = 7C959884D51B6BB806D36060148E8CDFCE36B6CEA32B2F7E99E91590201856AAD8915E58F3EB7099E4080EED99CFEDD9
6,302,556 UART: [art] SIG.S = 5A8A08882EA618DABBD8D5D9EA8BB1154300227F57CB4148829B3352CF0BE0FCBD3B034D64D6F91DC5B1D85480A404AA
6,325,955 UART: mbox::rt_entry...
6,326,327 UART: ____ _ _ _ ____ _____
6,327,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,327,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,328,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,215 UART: |_|
6,330,527 UART:
6,615,220 UART: [rt] Runtime listening for mailbox commands...
6,616,410 >>> mbox cmd response data (48 bytes)
6,616,411 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,619,194 >>> mbox cmd response data (48 bytes)
6,619,195 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,632,133 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,745 ready_for_fw is high
1,362,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,211 >>> mbox cmd response: success
2,991,343 UART:
2,991,359 UART: Running Caliptra FMC ...
2,991,767 UART:
2,991,821 UART: [state] CFI Enabled
3,002,192 UART: [fht] FMC Alias Private Key: 7
3,110,661 UART: [art] Extend RT PCRs Done
3,111,089 UART: [art] Lock RT PCRs Done
3,112,695 UART: [art] Populate DV Done
3,120,900 UART: [fht] FMC Alias Private Key: 7
3,122,014 UART: [art] Derive CDI
3,122,294 UART: [art] Store in in slot 0x4
3,208,091 UART: [art] Derive Key Pair
3,208,451 UART: [art] Store priv key in slot 0x5
3,221,263 UART: [art] Derive Key Pair - Done
3,236,038 UART: [art] Signing Cert with AUTHO
3,236,518 UART: RITY.KEYID = 7
3,251,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,627 UART: [art] PUB.X = 2BA046D34749BBDD705CF778AD259EC4C8FE3EEA1349ABB4FAD48C514E332E02078851D36C31E3665CF8F29D1EFCAC24
3,259,409 UART: [art] PUB.Y = 7F4DC45280705DFEEF3ED5A271E0B2CD2C9D6BF0D941E781CA9E5D6F9AC4539ABD400603B07C22E2CC1A265F3A796BC7
3,266,373 UART: [art] SIG.R = 82C93DEB3FA639CB036E0D84BA82B081118CD529940DD0B97397706A5B4A7D702FF309173395501A02A07743AD167AE5
3,273,126 UART: [art] SIG.S = CF8E0B3493691A7B1B9B9F5FBD15AD2CD2216BBF2F9155955D5960D8E992EE7B617F0BD5F95DA435794331F092D047E9
3,296,833 UART: Caliptra RT
3,297,086 UART: [state] CFI Enabled
3,404,890 UART: [rt] RT listening for mailbox commands...
3,405,560 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,290 UART: [rt]cmd =0x41545348, len=116
3,437,934 >>> mbox cmd response data (12 bytes)
3,437,935 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,739,422 >>> mbox cmd response: success
5,739,422 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,752,995 UART:
5,753,011 UART: Running Caliptra FMC ...
5,753,419 UART:
5,753,473 UART: [state] CFI Enabled
5,842,678 UART: [art] Extend RT PCRs Done
5,843,106 UART: [art] Lock RT PCRs Done
5,844,307 UART: [art] Populate DV Done
5,852,746 UART: [fht] FMC Alias Private Key: 7
5,853,768 UART: [art] Derive CDI
5,854,048 UART: [art] Store in in slot 0x4
5,939,627 UART: [art] Derive Key Pair
5,939,987 UART: [art] Store priv key in slot 0x5
5,952,751 UART: [art] Derive Key Pair - Done
5,967,589 UART: [art] Signing Cert with AUTHO
5,968,069 UART: RITY.KEYID = 7
5,983,577 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,342 UART: [art] PUB.X = C2EC828AAB876D729C085935C019514DBC29CCB9D5CCFCE90B0553C68D4EB91A144C473853A94DCAF112947D594BAED3
5,991,117 UART: [art] PUB.Y = AACCA53F6F7BFEA9D63742D2D6F236BF905810E67C442E1712838726A436BC4617F1ACA105E3F9401523F958E3F90110
5,998,063 UART: [art] SIG.R = 342AC6FF04453CA529AD2F97F02F82D5FCDB7D42B9B3F3FBE146A7B7C79D035E7FF3CA4370670A8E4004FEEFFAB897E3
6,004,843 UART: [art] SIG.S = EB0B0FC9A08932659FC7A38BBBCAA64D6B983627852EE43C6E6F3269BBA23E69381C961D45EC3037BC1267EE04EFD6AB
6,028,791 UART: mbox::rt_entry...
6,029,163 UART: ____ _ _ _ ____ _____
6,029,947 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,747 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,031,515 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,032,283 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,033,051 UART: |_|
6,033,363 UART:
6,317,917 UART: [rt] Runtime listening for mailbox commands...
6,319,107 >>> mbox cmd response data (48 bytes)
6,319,108 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,321,891 >>> mbox cmd response data (48 bytes)
6,321,892 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,334,830 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,916 UART: [kat] SHA2-256
881,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,962 UART: [kat] ++
886,114 UART: [kat] sha1
890,252 UART: [kat] SHA2-256
892,190 UART: [kat] SHA2-384
894,799 UART: [kat] SHA2-512-ACC
896,700 UART: [kat] ECC-384
902,435 UART: [kat] HMAC-384Kdf
906,955 UART: [kat] LMS
1,475,151 UART: [kat] --
1,475,910 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,249 UART: [idev] ++
1,479,417 UART: [idev] CDI.KEYID = 6
1,479,777 UART: [idev] SUBJECT.KEYID = 7
1,480,201 UART: [idev] UDS.KEYID = 0
1,480,546 ready_for_fw is high
1,480,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,597 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,547,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,135 UART: [ldev] --
1,586,456 UART: [fwproc] Waiting for Commands...
1,587,167 UART: [fwproc] Received command 0x46574c44
1,587,958 UART: [fwproc] Received Image of size 114448 bytes
2,886,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,049 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,401 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,416 >>> mbox cmd response: success
3,080,446 UART: [afmc] ++
3,080,614 UART: [afmc] CDI.KEYID = 6
3,080,976 UART: [afmc] SUBJECT.KEYID = 7
3,081,401 UART: [afmc] AUTHORITY.KEYID = 5
3,116,990 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,491 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,181 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,086 UART: [afmc] --
3,159,974 UART: [cold-reset] --
3,160,900 UART: [state] Locking Datavault
3,162,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,659 UART: [state] Locking ICCM
3,163,105 UART: [exit] Launching FMC @ 0x40000130
3,168,434 UART:
3,168,450 UART: Running Caliptra FMC ...
3,168,858 UART:
3,169,001 UART: [state] CFI Enabled
3,179,668 UART: [fht] FMC Alias Private Key: 7
3,287,851 UART: [art] Extend RT PCRs Done
3,288,279 UART: [art] Lock RT PCRs Done
3,289,633 UART: [art] Populate DV Done
3,297,846 UART: [fht] FMC Alias Private Key: 7
3,298,826 UART: [art] Derive CDI
3,299,106 UART: [art] Store in in slot 0x4
3,384,895 UART: [art] Derive Key Pair
3,385,255 UART: [art] Store priv key in slot 0x5
3,398,793 UART: [art] Derive Key Pair - Done
3,414,023 UART: [art] Signing Cert with AUTHO
3,414,503 UART: RITY.KEYID = 7
3,429,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,396 UART: [art] PUB.X = 322A5665513D212285104D52EAC2BAC1689F10E5A4312878327C27C6536968CB8634B86EC4BBAA5F2D6510BF12A8A0A1
3,437,164 UART: [art] PUB.Y = 08029ECF404EC2A121CD65FFD721C3A1C914CD48E95B5DEE1DBA38B55086DC5BC761FC669D6D0997D5ABE33088D4C449
3,444,121 UART: [art] SIG.R = 8DCF8B60C7BDEA09B48002A01F52099D57D91409C649A5A37858CF39AC874E12DB85A41BD14779A4736F92ABB1EC38C9
3,450,887 UART: [art] SIG.S = B13D3270E52EAB46E0A47C6EBDF239701CD0CA3C5186677135848368A8C964410E7B0183462E4BA5E939FDD21F691466
3,474,486 UART: Caliptra RT
3,474,831 UART: [state] CFI Enabled
3,582,973 UART: [rt] RT listening for mailbox commands...
3,583,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,007 UART: [rt]cmd =0x41545348, len=116
3,615,829 >>> mbox cmd response data (12 bytes)
3,615,830 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,922 UART:
3,616,938 UART: Running Caliptra ROM ...
3,617,346 UART:
3,617,487 UART: [state] CFI Enabled
3,620,123 UART: [state] LifecycleState = Unprovisioned
3,620,778 UART: [state] DebugLocked = No
3,621,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,623,083 UART: [kat] SHA2-256
4,417,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,421,129 UART: [kat] ++
4,421,281 UART: [kat] sha1
4,425,497 UART: [kat] SHA2-256
4,427,435 UART: [kat] SHA2-384
4,429,960 UART: [kat] SHA2-512-ACC
4,431,860 UART: [kat] ECC-384
4,437,625 UART: [kat] HMAC-384Kdf
4,442,111 UART: [kat] LMS
5,010,307 UART: [kat] --
5,011,264 UART: [update-reset] ++
5,938,957 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,940,037 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,036,471 >>> mbox cmd response: success
6,036,471 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,036,774 UART: [update-reset] Copying MAN_2 To MAN_1
6,044,788 UART: [update-reset Success] --
6,045,991 UART: [state] Locking Datavault
6,046,739 UART: [state] Locking PCR0, PCR1 and PCR31
6,047,343 UART: [state] Locking ICCM
6,047,893 UART: [exit] Launching FMC @ 0x40000130
6,053,222 UART:
6,053,238 UART: Running Caliptra FMC ...
6,053,646 UART:
6,053,789 UART: [state] CFI Enabled
6,142,808 UART: [art] Extend RT PCRs Done
6,143,236 UART: [art] Lock RT PCRs Done
6,144,441 UART: [art] Populate DV Done
6,152,556 UART: [fht] FMC Alias Private Key: 7
6,153,670 UART: [art] Derive CDI
6,153,950 UART: [art] Store in in slot 0x4
6,239,617 UART: [art] Derive Key Pair
6,239,977 UART: [art] Store priv key in slot 0x5
6,253,169 UART: [art] Derive Key Pair - Done
6,267,653 UART: [art] Signing Cert with AUTHO
6,268,133 UART: RITY.KEYID = 7
6,283,291 UART: [art] Erasing AUTHORITY.KEYID = 7
6,284,056 UART: [art] PUB.X = FE70F19E9E4AE6C5CF276DD43FBA863417D16DBAC0BDF5C317E3F0CD77437F3659E54B3F79587AC20F27079C13B5D13D
6,290,836 UART: [art] PUB.Y = 1C2295CFFBB0D3A292329E7EA2864A81DFCAAEE36D39B49A78C37101CA339B626CF33B2D3D88F5F56BE314B2DF2D26E9
6,297,801 UART: [art] SIG.R = E8F463A682949BC43E6AF04C6DE9FFA82F1D5B1AB86890C27D06A95623DE131F3225DE7D3F3599B174A9137BD2E2C840
6,304,576 UART: [art] SIG.S = 95C8BEC791859539E3ACF45686A9CF1E96E94AC31746032627A7390DB63A6BAF18C1B607A87D964B0BF757D6B73CA420
6,328,709 UART: mbox::rt_entry...
6,329,081 UART: ____ _ _ _ ____ _____
6,329,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,330,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,331,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,332,201 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,332,969 UART: |_|
6,333,281 UART:
6,617,978 UART: [rt] Runtime listening for mailbox commands...
6,619,168 >>> mbox cmd response data (48 bytes)
6,619,169 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,621,952 >>> mbox cmd response data (48 bytes)
6,621,953 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,634,891 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,272 ready_for_fw is high
1,363,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,224 >>> mbox cmd response: success
2,993,034 UART:
2,993,050 UART: Running Caliptra FMC ...
2,993,458 UART:
2,993,601 UART: [state] CFI Enabled
3,004,734 UART: [fht] FMC Alias Private Key: 7
3,112,375 UART: [art] Extend RT PCRs Done
3,112,803 UART: [art] Lock RT PCRs Done
3,114,377 UART: [art] Populate DV Done
3,122,512 UART: [fht] FMC Alias Private Key: 7
3,123,678 UART: [art] Derive CDI
3,123,958 UART: [art] Store in in slot 0x4
3,209,611 UART: [art] Derive Key Pair
3,209,971 UART: [art] Store priv key in slot 0x5
3,222,751 UART: [art] Derive Key Pair - Done
3,237,172 UART: [art] Signing Cert with AUTHO
3,237,652 UART: RITY.KEYID = 7
3,253,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,799 UART: [art] PUB.X = 73D0469452428F11E4F038C86CEBAA001FDD1246BB2D843F4B131B3740615F3FB1FFCA24955345FA945387BB8132BAE1
3,260,551 UART: [art] PUB.Y = FBBE6C005CEE04F0AD0C8CB0CEABC33C823A349DC3D5902305F22A9CFFD6BB8D05C5F24204F3EED709AFB53CA12D8559
3,267,489 UART: [art] SIG.R = 1400FA5EF259A0A398976EBE659F84A73A3EDA477CAE530E4BEED93A94568A2CF059C9315AB97FF0DD23095BA6480BB5
3,274,242 UART: [art] SIG.S = 70924237690DC03EDB135F65C37125E5905345454740DB3F2834282C97003B64FFEEB81FBC682249A54DEAB44D6CEA39
3,297,820 UART: Caliptra RT
3,298,165 UART: [state] CFI Enabled
3,406,333 UART: [rt] RT listening for mailbox commands...
3,407,003 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,313 UART: [rt]cmd =0x41545348, len=116
3,439,147 >>> mbox cmd response data (12 bytes)
3,439,148 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,740,672 >>> mbox cmd response: success
5,740,672 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,754,157 UART:
5,754,173 UART: Running Caliptra FMC ...
5,754,581 UART:
5,754,724 UART: [state] CFI Enabled
5,843,637 UART: [art] Extend RT PCRs Done
5,844,065 UART: [art] Lock RT PCRs Done
5,845,508 UART: [art] Populate DV Done
5,853,683 UART: [fht] FMC Alias Private Key: 7
5,854,653 UART: [art] Derive CDI
5,854,933 UART: [art] Store in in slot 0x4
5,940,916 UART: [art] Derive Key Pair
5,941,276 UART: [art] Store priv key in slot 0x5
5,954,998 UART: [art] Derive Key Pair - Done
5,969,660 UART: [art] Signing Cert with AUTHO
5,970,140 UART: RITY.KEYID = 7
5,985,316 UART: [art] Erasing AUTHORITY.KEYID = 7
5,986,081 UART: [art] PUB.X = 73990DF00D6030D6892E71B6BD152936FD557F14210B4057F627F4BA99F9146D67DC125ED042859C8058274FF10BCFF4
5,992,835 UART: [art] PUB.Y = 1B5C1DE6B1BCF562AC96D790165F1E2D22C9C6CB10275792D9591D1B90EAD7969F5C42C97F919E0AAA2F245398EB783C
5,999,792 UART: [art] SIG.R = 31189B0D2A0588165FCB2934B4AC47B85372853D68BD3F03E21C759BEBEF384FEFE6B412E448A38A841D2EDAE0EEC11F
6,006,567 UART: [art] SIG.S = A32BB3C8D8F571ADBBDD01034CFC111553D7A7F0C3A770CED467146C1A6CFE84B7A696BFF8E97EE322AA485C344A19CC
6,030,568 UART: mbox::rt_entry...
6,030,940 UART: ____ _ _ _ ____ _____
6,031,724 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,032,524 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,033,292 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,034,060 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,034,828 UART: |_|
6,035,140 UART:
6,318,450 UART: [rt] Runtime listening for mailbox commands...
6,319,640 >>> mbox cmd response data (48 bytes)
6,319,641 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,322,424 >>> mbox cmd response data (48 bytes)
6,322,425 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,335,363 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,742 UART: [state] LifecycleState = Unprovisioned
86,397 UART: [state] DebugLocked = No
86,911 UART: [state] WD Timer not started. Device not locked for debugging
88,214 UART: [kat] SHA2-256
893,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,989 UART: [kat] ++
898,141 UART: [kat] sha1
902,539 UART: [kat] SHA2-256
904,479 UART: [kat] SHA2-384
907,090 UART: [kat] SHA2-512-ACC
908,991 UART: [kat] ECC-384
918,590 UART: [kat] HMAC-384Kdf
923,310 UART: [kat] LMS
1,171,638 UART: [kat] --
1,172,677 UART: [cold-reset] ++
1,173,027 UART: [fht] FHT @ 0x50003400
1,175,730 UART: [idev] ++
1,175,898 UART: [idev] CDI.KEYID = 6
1,176,258 UART: [idev] SUBJECT.KEYID = 7
1,176,682 UART: [idev] UDS.KEYID = 0
1,177,027 ready_for_fw is high
1,177,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,838 UART: [idev] Erasing UDS.KEYID = 0
1,201,647 UART: [idev] Sha1 KeyId Algorithm
1,210,201 UART: [idev] --
1,211,231 UART: [ldev] ++
1,211,399 UART: [ldev] CDI.KEYID = 6
1,211,762 UART: [ldev] SUBJECT.KEYID = 5
1,212,188 UART: [ldev] AUTHORITY.KEYID = 7
1,212,651 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,244,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,821 UART: [ldev] --
1,283,118 UART: [fwproc] Wait for Commands...
1,283,910 UART: [fwproc] Recv command 0x46574c44
1,284,638 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,158 >>> mbox cmd response: success
2,779,168 UART: [afmc] ++
2,779,336 UART: [afmc] CDI.KEYID = 6
2,779,698 UART: [afmc] SUBJECT.KEYID = 7
2,780,123 UART: [afmc] AUTHORITY.KEYID = 5
2,815,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,704 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,423 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,245 UART: [afmc] --
2,859,225 UART: [cold-reset] --
2,859,839 UART: [state] Locking Datavault
2,861,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,862 UART: [state] Locking ICCM
2,862,448 UART: [exit] Launching FMC @ 0x40000130
2,867,777 UART:
2,867,793 UART: Running Caliptra FMC ...
2,868,201 UART:
2,868,255 UART: [state] CFI Enabled
2,878,890 UART: [fht] FMC Alias Private Key: 7
2,986,645 UART: [art] Extend RT PCRs Done
2,987,073 UART: [art] Lock RT PCRs Done
2,988,737 UART: [art] Populate DV Done
2,996,792 UART: [fht] FMC Alias Private Key: 7
2,997,948 UART: [art] Derive CDI
2,998,228 UART: [art] Store in in slot 0x4
3,084,005 UART: [art] Derive Key Pair
3,084,365 UART: [art] Store priv key in slot 0x5
3,097,623 UART: [art] Derive Key Pair - Done
3,112,570 UART: [art] Signing Cert with AUTHO
3,113,050 UART: RITY.KEYID = 7
3,128,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,145 UART: [art] PUB.X = 24F7A12081AAC60692DEC22A0CE0473AE7F535CC695929C34871DF32502BF98F0280C34C872EEEC4E743C1B464D55B3A
3,135,912 UART: [art] PUB.Y = D2D2F3802EB6A483E9F1E87DB88265B9333AA10A9021EC52B681E9F97E52B6C5B53FEA829AD0B8E33858A8C7F4A6155F
3,142,869 UART: [art] SIG.R = C399E3E956A978A5EEBD3AE9CEB0B9D42FF6DDD7AFCE322D48AF6BC593162B87DAA36012E04766EE0317D3615C15149F
3,149,654 UART: [art] SIG.S = 07F22A15CA5F8D301A47FE52730A92144EA69A07AA2F2D5ADBA46399C85936EB31C6F3C5EEA874F870374526BB33FC45
3,173,636 UART: Caliptra RT
3,173,889 UART: [state] CFI Enabled
3,281,038 UART: [rt] RT listening for mailbox commands...
3,281,708 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,414 UART: [rt]cmd =0x41545348, len=116
3,314,352 >>> mbox cmd response data (12 bytes)
3,314,353 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,340 UART:
3,315,356 UART: Running Caliptra ROM ...
3,315,764 UART:
3,315,819 UART: [state] CFI Enabled
3,318,095 UART: [state] LifecycleState = Unprovisioned
3,318,750 UART: [state] DebugLocked = No
3,319,342 UART: [state] WD Timer not started. Device not locked for debugging
3,320,578 UART: [kat] SHA2-256
4,126,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,353 UART: [kat] ++
4,130,505 UART: [kat] sha1
4,134,587 UART: [kat] SHA2-256
4,136,527 UART: [kat] SHA2-384
4,139,226 UART: [kat] SHA2-512-ACC
4,141,126 UART: [kat] ECC-384
4,150,659 UART: [kat] HMAC-384Kdf
4,155,313 UART: [kat] LMS
4,403,641 UART: [kat] --
4,404,657 UART: [update-reset] ++
5,309,187 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,310,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,406,690 >>> mbox cmd response: success
5,406,690 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,406,931 UART: [update-reset] Copying MAN_2 To MAN_1
5,414,945 UART: [update-reset Success] --
5,415,876 UART: [state] Locking Datavault
5,416,540 UART: [state] Locking PCR0, PCR1 and PCR31
5,417,144 UART: [state] Locking ICCM
5,417,660 UART: [exit] Launching FMC @ 0x40000130
5,422,989 UART:
5,423,005 UART: Running Caliptra FMC ...
5,423,413 UART:
5,423,467 UART: [state] CFI Enabled
5,512,850 UART: [art] Extend RT PCRs Done
5,513,278 UART: [art] Lock RT PCRs Done
5,514,411 UART: [art] Populate DV Done
5,522,476 UART: [fht] FMC Alias Private Key: 7
5,523,476 UART: [art] Derive CDI
5,523,756 UART: [art] Store in in slot 0x4
5,609,275 UART: [art] Derive Key Pair
5,609,635 UART: [art] Store priv key in slot 0x5
5,622,541 UART: [art] Derive Key Pair - Done
5,637,235 UART: [art] Signing Cert with AUTHO
5,637,715 UART: RITY.KEYID = 7
5,652,815 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,580 UART: [art] PUB.X = FCB8DAAF53C39536708650E7E71ADF377C711D524DA40A6D89052FDAB6CF1B1FCBEF956AFE8D39D8E965171340921CFF
5,660,362 UART: [art] PUB.Y = 0D2AD2C958F230A56E89E572D53CC036909FCB86AB2B2AB3115675802902E11253F87EC98CE52332C2141ACB9D454DB5
5,667,308 UART: [art] SIG.R = A62D82B0E167A0F07BF1F7C3E2C2DCB89F3A67E1EC9AB5B85E20684167D2BC80258B8E456290982AB0D3C1E79BBCD5DD
5,674,096 UART: [art] SIG.S = 78363A1194F3FD5D6DAA9ABE5815B2CFBD48A30B5E7BBB7F0FE585F7487EA542CB9F13FB01B2CD5DB84B830F8246C79C
5,697,703 UART: mbox::rt_entry...
5,698,075 UART: ____ _ _ _ ____ _____
5,698,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,699,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,700,427 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,701,195 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,701,963 UART: |_|
5,702,275 UART:
5,979,895 UART: [rt] Runtime listening for mailbox commands...
5,981,085 >>> mbox cmd response data (48 bytes)
5,981,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,983,869 >>> mbox cmd response data (48 bytes)
5,983,870 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,996,808 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,841 ready_for_fw is high
1,060,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,957 >>> mbox cmd response: success
2,689,739 UART:
2,689,755 UART: Running Caliptra FMC ...
2,690,163 UART:
2,690,217 UART: [state] CFI Enabled
2,700,852 UART: [fht] FMC Alias Private Key: 7
2,808,537 UART: [art] Extend RT PCRs Done
2,808,965 UART: [art] Lock RT PCRs Done
2,810,403 UART: [art] Populate DV Done
2,818,742 UART: [fht] FMC Alias Private Key: 7
2,819,906 UART: [art] Derive CDI
2,820,186 UART: [art] Store in in slot 0x4
2,905,763 UART: [art] Derive Key Pair
2,906,123 UART: [art] Store priv key in slot 0x5
2,919,729 UART: [art] Derive Key Pair - Done
2,934,582 UART: [art] Signing Cert with AUTHO
2,935,062 UART: RITY.KEYID = 7
2,950,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,919 UART: [art] PUB.X = EC61CF00ACD7847A2D5BDEC10C8D5F9EAAC79B7F9561BD41C7B61623A8421BF3118540CFBEF0F2869B1FE9F7EC687BF9
2,957,688 UART: [art] PUB.Y = 91C6787FB0134442052C4E9452404F76C47FF2FCCC33E0A9F74A12A1CDE03395FE746FDF06E5D969C2AECF79EDC86914
2,964,642 UART: [art] SIG.R = 5C11C7D5EDDDAC40653BCA994A2F8EBF28444ED8C0402A4B5948BC38165CCCB9A4274362668B423D58C0568AF4A05E2A
2,971,424 UART: [art] SIG.S = 114B11350C4ECF608455160B2FFFA976F683BC43E39996BD1CA6F02E2912FB5EA9198DFD0863793B7E521820B4AA2231
2,995,300 UART: Caliptra RT
2,995,553 UART: [state] CFI Enabled
3,103,984 UART: [rt] RT listening for mailbox commands...
3,104,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,350 UART: [rt]cmd =0x41545348, len=116
3,137,042 >>> mbox cmd response data (12 bytes)
3,137,043 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,953 >>> mbox cmd response: success
5,111,953 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,125,289 UART:
5,125,305 UART: Running Caliptra FMC ...
5,125,713 UART:
5,125,767 UART: [state] CFI Enabled
5,214,550 UART: [art] Extend RT PCRs Done
5,214,978 UART: [art] Lock RT PCRs Done
5,216,273 UART: [art] Populate DV Done
5,224,382 UART: [fht] FMC Alias Private Key: 7
5,225,402 UART: [art] Derive CDI
5,225,682 UART: [art] Store in in slot 0x4
5,311,641 UART: [art] Derive Key Pair
5,312,001 UART: [art] Store priv key in slot 0x5
5,325,399 UART: [art] Derive Key Pair - Done
5,340,150 UART: [art] Signing Cert with AUTHO
5,340,630 UART: RITY.KEYID = 7
5,355,282 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,047 UART: [art] PUB.X = DB483AA20877F427A38BC5E8563A1A4A97B75A9C72197D8B95070580973FF3750DB4017E7ED3BF713F713B24AB164C4D
5,362,804 UART: [art] PUB.Y = 560A354760578256F47E49295EDCA8D6CD19C5647274376BFEDF2FF7078503E7E4B5FFC1BA8CC7449A5688489DCA085A
5,369,746 UART: [art] SIG.R = 75500E71B4573C9491AE0627D9E124CB0B3638120DF6CDB51CDB55CE01B12F40082081CFDE46810054A6B38175304DA3
5,376,474 UART: [art] SIG.S = 5AF18A44C40A736782D8747A1EBA45B7CC73B60C99B5A825C54AB4BFE9EBE1913DAF4304F577ED86E8AA7D073F967C6A
5,400,861 UART: mbox::rt_entry...
5,401,233 UART: ____ _ _ _ ____ _____
5,402,017 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,817 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,585 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,353 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,121 UART: |_|
5,405,433 UART:
5,687,745 UART: [rt] Runtime listening for mailbox commands...
5,688,935 >>> mbox cmd response data (48 bytes)
5,688,936 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,691,719 >>> mbox cmd response data (48 bytes)
5,691,720 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,704,658 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,341 UART: [kat] LMS
1,171,669 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,645 UART: [idev] ++
1,175,813 UART: [idev] CDI.KEYID = 6
1,176,173 UART: [idev] SUBJECT.KEYID = 7
1,176,597 UART: [idev] UDS.KEYID = 0
1,176,942 ready_for_fw is high
1,176,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,815 UART: [idev] Erasing UDS.KEYID = 0
1,201,688 UART: [idev] Sha1 KeyId Algorithm
1,210,176 UART: [idev] --
1,211,248 UART: [ldev] ++
1,211,416 UART: [ldev] CDI.KEYID = 6
1,211,779 UART: [ldev] SUBJECT.KEYID = 5
1,212,205 UART: [ldev] AUTHORITY.KEYID = 7
1,212,668 UART: [ldev] FE.KEYID = 1
1,217,902 UART: [ldev] Erasing FE.KEYID = 1
1,244,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,095 UART: [fwproc] Wait for Commands...
1,284,919 UART: [fwproc] Recv command 0x46574c44
1,285,647 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,365 >>> mbox cmd response: success
2,778,619 UART: [afmc] ++
2,778,787 UART: [afmc] CDI.KEYID = 6
2,779,149 UART: [afmc] SUBJECT.KEYID = 7
2,779,574 UART: [afmc] AUTHORITY.KEYID = 5
2,814,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,400 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,114 UART: [afmc] --
2,858,120 UART: [cold-reset] --
2,858,958 UART: [state] Locking Datavault
2,860,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,735 UART: [state] Locking ICCM
2,861,403 UART: [exit] Launching FMC @ 0x40000130
2,866,732 UART:
2,866,748 UART: Running Caliptra FMC ...
2,867,156 UART:
2,867,299 UART: [state] CFI Enabled
2,878,202 UART: [fht] FMC Alias Private Key: 7
2,986,335 UART: [art] Extend RT PCRs Done
2,986,763 UART: [art] Lock RT PCRs Done
2,988,475 UART: [art] Populate DV Done
2,996,948 UART: [fht] FMC Alias Private Key: 7
2,998,022 UART: [art] Derive CDI
2,998,302 UART: [art] Store in in slot 0x4
3,083,347 UART: [art] Derive Key Pair
3,083,707 UART: [art] Store priv key in slot 0x5
3,097,267 UART: [art] Derive Key Pair - Done
3,112,226 UART: [art] Signing Cert with AUTHO
3,112,706 UART: RITY.KEYID = 7
3,128,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,911 UART: [art] PUB.X = 8CDD3D95B2A126CB48D5B0A58460371EE78B473A609B86CA3C75AD48DED114F391AEA34DC288B5919BA9F35288D1A8B1
3,135,693 UART: [art] PUB.Y = D1A8451387B63B01208EAC5B3FAE32E881A65F130853D4C46AF25B37A52EA81AB356F1244938954B9FDAD6BFD65234C7
3,142,643 UART: [art] SIG.R = 585C8065D9C5D7F961C4C575EA1A3803DB431035D9B6592425EBADB7E7A03DB2FD4AECB80A7F5CECBFAF36A58C695723
3,149,425 UART: [art] SIG.S = DA88AFE73211F11AC5C79B0E898EC9654F7B726B62356E1EA6CE6027BB09BADD1C50FCF6E93EC4040821950167FD2546
3,173,321 UART: Caliptra RT
3,173,666 UART: [state] CFI Enabled
3,282,015 UART: [rt] RT listening for mailbox commands...
3,282,685 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,293 UART: [rt]cmd =0x41545348, len=116
3,314,899 >>> mbox cmd response data (12 bytes)
3,314,900 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,999 UART:
3,316,015 UART: Running Caliptra ROM ...
3,316,423 UART:
3,316,565 UART: [state] CFI Enabled
3,319,365 UART: [state] LifecycleState = Unprovisioned
3,320,020 UART: [state] DebugLocked = No
3,320,534 UART: [state] WD Timer not started. Device not locked for debugging
3,321,728 UART: [kat] SHA2-256
4,127,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,131,503 UART: [kat] ++
4,131,655 UART: [kat] sha1
4,135,725 UART: [kat] SHA2-256
4,137,665 UART: [kat] SHA2-384
4,140,336 UART: [kat] SHA2-512-ACC
4,142,236 UART: [kat] ECC-384
4,152,075 UART: [kat] HMAC-384Kdf
4,156,585 UART: [kat] LMS
4,404,913 UART: [kat] --
4,405,637 UART: [update-reset] ++
5,310,081 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,311,124 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,407,506 >>> mbox cmd response: success
5,407,506 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,407,667 UART: [update-reset] Copying MAN_2 To MAN_1
5,415,681 UART: [update-reset Success] --
5,416,734 UART: [state] Locking Datavault
5,417,688 UART: [state] Locking PCR0, PCR1 and PCR31
5,418,292 UART: [state] Locking ICCM
5,418,824 UART: [exit] Launching FMC @ 0x40000130
5,424,153 UART:
5,424,169 UART: Running Caliptra FMC ...
5,424,577 UART:
5,424,720 UART: [state] CFI Enabled
5,513,245 UART: [art] Extend RT PCRs Done
5,513,673 UART: [art] Lock RT PCRs Done
5,514,818 UART: [art] Populate DV Done
5,522,861 UART: [fht] FMC Alias Private Key: 7
5,523,907 UART: [art] Derive CDI
5,524,187 UART: [art] Store in in slot 0x4
5,609,792 UART: [art] Derive Key Pair
5,610,152 UART: [art] Store priv key in slot 0x5
5,623,524 UART: [art] Derive Key Pair - Done
5,638,328 UART: [art] Signing Cert with AUTHO
5,638,808 UART: RITY.KEYID = 7
5,654,160 UART: [art] Erasing AUTHORITY.KEYID = 7
5,654,925 UART: [art] PUB.X = 312D44B14AB1519FAE43C80027576EB7F31D41F9A94C52E2DE7F8E0A8B8268BE240373A708C9E6B8AC9D432B82CCD88C
5,661,674 UART: [art] PUB.Y = 8375054593BA4D2E7E6AAB2154041FD148A764FD2A12D4EBCB6E404DF0A7E2713E1FCB00BEB6945E2F36170ABD26FD14
5,668,607 UART: [art] SIG.R = 8B8E64CF5CFF54BFF2938CC5C87C34F03098BBAC06935948D4CA40F4E4854524A873DC514520F07B537247BBBA4AAF0D
5,675,383 UART: [art] SIG.S = D3A08ADC694E4EF31511BB3D0200D0A19F9272160DE28CF15873168430019C9275409DE6EACF62AFCA94975B5DBAB33F
5,699,125 UART: mbox::rt_entry...
5,699,497 UART: ____ _ _ _ ____ _____
5,700,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,701,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,701,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,702,617 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,703,385 UART: |_|
5,703,697 UART:
5,983,538 UART: [rt] Runtime listening for mailbox commands...
5,984,728 >>> mbox cmd response data (48 bytes)
5,984,729 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,987,512 >>> mbox cmd response data (48 bytes)
5,987,513 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,000,451 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,232 ready_for_fw is high
1,060,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,152 >>> mbox cmd response: success
2,689,130 UART:
2,689,146 UART: Running Caliptra FMC ...
2,689,554 UART:
2,689,697 UART: [state] CFI Enabled
2,700,516 UART: [fht] FMC Alias Private Key: 7
2,808,559 UART: [art] Extend RT PCRs Done
2,808,987 UART: [art] Lock RT PCRs Done
2,810,591 UART: [art] Populate DV Done
2,818,948 UART: [fht] FMC Alias Private Key: 7
2,820,090 UART: [art] Derive CDI
2,820,370 UART: [art] Store in in slot 0x4
2,905,623 UART: [art] Derive Key Pair
2,905,983 UART: [art] Store priv key in slot 0x5
2,919,081 UART: [art] Derive Key Pair - Done
2,933,696 UART: [art] Signing Cert with AUTHO
2,934,176 UART: RITY.KEYID = 7
2,949,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,949 UART: [art] PUB.X = 0372F168D3788DBF436CEF749B76B6DB1A6C318FFB64AE4EBE2EE12B5473ED984F2358CF8F8574B9BC8F5D8F615FB564
2,956,732 UART: [art] PUB.Y = 2D211C8E9F22B1405D8A1C04FAB020ED027F569BC91ED5FD7602E0FB3FB94633C99E0FF3DF3C7DDEA54446806A498718
2,963,682 UART: [art] SIG.R = 9E2D0D5A402B16626322458C2E8FB6C2ED84C704062FCEEA8D93AA492D104302B936B742D6E3DC018BDC8A665A6E8384
2,970,443 UART: [art] SIG.S = 4A2AB00B796A269FCA0FE1597375479D0761C2D9891C2560980D002E33EA695AF6C2B0B6807340FC63D7B12F3FCA90E7
2,993,796 UART: Caliptra RT
2,994,141 UART: [state] CFI Enabled
3,102,150 UART: [rt] RT listening for mailbox commands...
3,102,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,312 UART: [rt]cmd =0x41545348, len=116
3,135,112 >>> mbox cmd response data (12 bytes)
3,135,113 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,112,473 >>> mbox cmd response: success
5,112,473 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,125,795 UART:
5,125,811 UART: Running Caliptra FMC ...
5,126,219 UART:
5,126,362 UART: [state] CFI Enabled
5,215,185 UART: [art] Extend RT PCRs Done
5,215,613 UART: [art] Lock RT PCRs Done
5,216,876 UART: [art] Populate DV Done
5,225,093 UART: [fht] FMC Alias Private Key: 7
5,226,119 UART: [art] Derive CDI
5,226,399 UART: [art] Store in in slot 0x4
5,311,866 UART: [art] Derive Key Pair
5,312,226 UART: [art] Store priv key in slot 0x5
5,326,096 UART: [art] Derive Key Pair - Done
5,341,005 UART: [art] Signing Cert with AUTHO
5,341,485 UART: RITY.KEYID = 7
5,356,591 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,356 UART: [art] PUB.X = 45EE3D9EFA8129818B58FACAF67A2D841961CFD3532AD1D50BD5EC77D3738233C8AA382762FD147E6933947CDB500F29
5,364,128 UART: [art] PUB.Y = E5B8BE6F855F5256E551EB6C0583B80CB995AE8470B1EF3AE68CE273C8F862F748B117782D8F2644ABB07A68E97BD0D7
5,371,082 UART: [art] SIG.R = C9D2AD37CBD5B701EB024DD3EC0D850C0433B16D77BB2CABF26C381898FE3DE652F7C1833269A2FDADC11752CE91C15C
5,377,857 UART: [art] SIG.S = 11AA52E847E519A0B4F2BE797E6CCBED0DEDA1CBDA9E74D31969B6190FD9EB347B37268602A15CD7D5CC4F081871254D
5,401,656 UART: mbox::rt_entry...
5,402,028 UART: ____ _ _ _ ____ _____
5,402,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,403,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,380 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,405,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,916 UART: |_|
5,406,228 UART:
5,684,278 UART: [rt] Runtime listening for mailbox commands...
5,685,468 >>> mbox cmd response data (48 bytes)
5,685,469 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,688,252 >>> mbox cmd response data (48 bytes)
5,688,253 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,701,191 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,919 UART: [state] WD Timer not started. Device not locked for debugging
88,262 UART: [kat] SHA2-256
891,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,941 UART: [kat] ++
896,093 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,174,331 ready_for_fw is high
1,174,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,357 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,539 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,214,896 UART: [ldev] Erasing FE.KEYID = 1
1,241,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,281,136 UART: [fwproc] Wait for Commands...
1,281,785 UART: [fwproc] Recv command 0x46574c44
1,282,518 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,344 >>> mbox cmd response: success
2,775,585 UART: [afmc] ++
2,775,753 UART: [afmc] CDI.KEYID = 6
2,776,116 UART: [afmc] SUBJECT.KEYID = 7
2,776,542 UART: [afmc] AUTHORITY.KEYID = 5
2,812,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,930 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,649 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,634 UART: [afmc] --
2,855,690 UART: [cold-reset] --
2,856,746 UART: [state] Locking Datavault
2,858,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,881 UART: [state] Locking ICCM
2,859,373 UART: [exit] Launching FMC @ 0x40000130
2,864,702 UART:
2,864,718 UART: Running Caliptra FMC ...
2,865,126 UART:
2,865,180 UART: [state] CFI Enabled
2,875,877 UART: [fht] FMC Alias Private Key: 7
2,984,296 UART: [art] Extend RT PCRs Done
2,984,724 UART: [art] Lock RT PCRs Done
2,986,264 UART: [art] Populate DV Done
2,994,203 UART: [fht] FMC Alias Private Key: 7
2,995,303 UART: [art] Derive CDI
2,995,583 UART: [art] Store in in slot 0x4
3,081,472 UART: [art] Derive Key Pair
3,081,832 UART: [art] Store priv key in slot 0x5
3,094,494 UART: [art] Derive Key Pair - Done
3,109,305 UART: [art] Signing Cert with AUTHO
3,109,785 UART: RITY.KEYID = 7
3,125,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,236 UART: [art] PUB.X = EE6105979FAE01124FDA708F460F72BD364E6856A19A6A56C874F9F3C2665A100B7EB1F1C865BE017DCBB39528851687
3,132,993 UART: [art] PUB.Y = 214787D430907CB951BF09E9E05635D73840F04B68B4FE35E1203368CCF27038B7814258587E937B9045D43A16F46C6C
3,139,928 UART: [art] SIG.R = FCC1D676C7E423EED33029EA586EF6AAA2E08BE9E0802D01FC8322AFA7CF2175EF7608EAB3E566A13EA8015645B8ECE0
3,146,709 UART: [art] SIG.S = 7D3EA4A02C9BA713AE009232E90BCD94C240E44887CA811C5A1F63407EC8249395747082BA12700E5B939D80C3276245
3,169,872 UART: Caliptra RT
3,170,125 UART: [state] CFI Enabled
3,278,118 UART: [rt] RT listening for mailbox commands...
3,278,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,632 UART: [rt]cmd =0x41545348, len=116
3,311,378 >>> mbox cmd response data (12 bytes)
3,311,379 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,208 UART:
3,312,224 UART: Running Caliptra ROM ...
3,312,632 UART:
3,312,687 UART: [state] CFI Enabled
3,315,283 UART: [state] LifecycleState = Unprovisioned
3,315,938 UART: [state] DebugLocked = No
3,316,548 UART: [state] WD Timer not started. Device not locked for debugging
3,317,760 UART: [kat] SHA2-256
4,121,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,439 UART: [kat] ++
4,125,591 UART: [kat] sha1
4,130,021 UART: [kat] SHA2-256
4,131,961 UART: [kat] SHA2-384
4,134,672 UART: [kat] SHA2-512-ACC
4,136,572 UART: [kat] ECC-384
4,146,205 UART: [kat] HMAC-384Kdf
4,150,753 UART: [kat] LMS
4,399,065 UART: [kat] --
4,399,835 UART: [update-reset] ++
5,304,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,855 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,237 >>> mbox cmd response: success
5,402,237 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,402,450 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,464 UART: [update-reset Success] --
5,411,469 UART: [state] Locking Datavault
5,412,217 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,821 UART: [state] Locking ICCM
5,413,423 UART: [exit] Launching FMC @ 0x40000130
5,418,752 UART:
5,418,768 UART: Running Caliptra FMC ...
5,419,176 UART:
5,419,230 UART: [state] CFI Enabled
5,508,129 UART: [art] Extend RT PCRs Done
5,508,557 UART: [art] Lock RT PCRs Done
5,509,740 UART: [art] Populate DV Done
5,517,977 UART: [fht] FMC Alias Private Key: 7
5,518,975 UART: [art] Derive CDI
5,519,255 UART: [art] Store in in slot 0x4
5,604,536 UART: [art] Derive Key Pair
5,604,896 UART: [art] Store priv key in slot 0x5
5,618,120 UART: [art] Derive Key Pair - Done
5,632,719 UART: [art] Signing Cert with AUTHO
5,633,199 UART: RITY.KEYID = 7
5,648,081 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,846 UART: [art] PUB.X = 22FE02B899F90B02E37C04246743CC85F0B8A6E1C51640E54924DDA9FA584B95CEFC19D17C84C04CECDAA7CBB46573BF
5,655,620 UART: [art] PUB.Y = D3D0C351954599DB8FEA13580C42789DF4E08A4447A0B66CF1CA4F39F280B1884208FA80D2B0AD6CC83EEECE4C5FE47A
5,662,580 UART: [art] SIG.R = 781825B374D742FF6FC556BA63E754BE6B5D4688F5554380832CCBBA5167C3AA2BB04F456BF4C896A3BB92B2E1AE6F90
5,669,360 UART: [art] SIG.S = 33B1799C161EE7B4DE33C04895696036B90F1FF3CBDD902E3B0CA6783D72B54E3C96B238C04A2DC5F6111F0FA29F5D67
5,693,570 UART: mbox::rt_entry...
5,693,942 UART: ____ _ _ _ ____ _____
5,694,726 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,697,062 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,830 UART: |_|
5,698,142 UART:
5,981,220 UART: [rt] Runtime listening for mailbox commands...
5,982,410 >>> mbox cmd response data (48 bytes)
5,982,411 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,985,194 >>> mbox cmd response data (48 bytes)
5,985,195 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,998,133 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,520 >>> mbox cmd response: success
2,684,664 UART:
2,684,680 UART: Running Caliptra FMC ...
2,685,088 UART:
2,685,142 UART: [state] CFI Enabled
2,695,247 UART: [fht] FMC Alias Private Key: 7
2,802,892 UART: [art] Extend RT PCRs Done
2,803,320 UART: [art] Lock RT PCRs Done
2,805,010 UART: [art] Populate DV Done
2,813,035 UART: [fht] FMC Alias Private Key: 7
2,814,209 UART: [art] Derive CDI
2,814,489 UART: [art] Store in in slot 0x4
2,900,308 UART: [art] Derive Key Pair
2,900,668 UART: [art] Store priv key in slot 0x5
2,913,660 UART: [art] Derive Key Pair - Done
2,928,483 UART: [art] Signing Cert with AUTHO
2,928,963 UART: RITY.KEYID = 7
2,943,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,586 UART: [art] PUB.X = 3010053274FCFC72B9AC54FE7941C6596936DF5FDF5FB0A27C30387145E9879206BE9648D603F2B13FA06C648035ADFA
2,951,349 UART: [art] PUB.Y = 5759579A8317DC8802BB56462497AA96EE22AB30A3D90E9545A7FC97762A5B5BD84108DA1A771CA9B4EE842D36B4C752
2,958,292 UART: [art] SIG.R = C0B13FA4B8B2807AB0E91DFDF09757A4DD0C6558D2944CC0AC8F13940E75531DCEAC770BECC833499B2CC69A9AFC086C
2,965,070 UART: [art] SIG.S = A42E9B92FE3BCE4D46E98BEEEC8242E01037D249D0E5B02A8EB061ACCEDD688DBB7EE2E8EBB6A29B4821C220C2C43B75
2,988,407 UART: Caliptra RT
2,988,660 UART: [state] CFI Enabled
3,096,892 UART: [rt] RT listening for mailbox commands...
3,097,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,302 UART: [rt]cmd =0x41545348, len=116
3,130,016 >>> mbox cmd response data (12 bytes)
3,130,017 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,798 >>> mbox cmd response: success
5,102,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,116,066 UART:
5,116,082 UART: Running Caliptra FMC ...
5,116,490 UART:
5,116,544 UART: [state] CFI Enabled
5,205,707 UART: [art] Extend RT PCRs Done
5,206,135 UART: [art] Lock RT PCRs Done
5,207,720 UART: [art] Populate DV Done
5,216,157 UART: [fht] FMC Alias Private Key: 7
5,217,287 UART: [art] Derive CDI
5,217,567 UART: [art] Store in in slot 0x4
5,303,178 UART: [art] Derive Key Pair
5,303,538 UART: [art] Store priv key in slot 0x5
5,317,546 UART: [art] Derive Key Pair - Done
5,332,424 UART: [art] Signing Cert with AUTHO
5,332,904 UART: RITY.KEYID = 7
5,347,702 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,467 UART: [art] PUB.X = 6C7ACDB136784CF4F4ABAE35FE77C6905BFD0F49A95281C49FF0A8FABBF3921DC03C7CFD2DCD038EFD468D2369ADCA6B
5,355,263 UART: [art] PUB.Y = 0F074B955811E44DA86F6E14D319A44561C551997567DE216CB9B4FC959819551B811DD15BAD5D3168A6EE9A027EC4A9
5,362,204 UART: [art] SIG.R = 0E142183407C865925F84022F7E11209404D43B707DAB5A4722405B4550D94C1CACBE7BA84654D0185D5436ADD73F837
5,368,948 UART: [art] SIG.S = A89DFA0C715EF128CD331EF8E087C3824BE1BDD5DD9A733B373302BCB9671118BDAFAB65C576560349E611E47AC7DF45
5,392,710 UART: mbox::rt_entry...
5,393,082 UART: ____ _ _ _ ____ _____
5,393,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,394,666 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,395,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,396,202 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,970 UART: |_|
5,397,282 UART:
5,673,186 UART: [rt] Runtime listening for mailbox commands...
5,674,376 >>> mbox cmd response data (48 bytes)
5,674,377 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,677,160 >>> mbox cmd response data (48 bytes)
5,677,161 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,690,099 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 ready_for_fw is high
1,174,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,772 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,309 UART: [ldev] Erasing FE.KEYID = 1
1,240,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,983 UART: [ldev] --
1,280,247 UART: [fwproc] Wait for Commands...
1,281,050 UART: [fwproc] Recv command 0x46574c44
1,281,783 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,001 >>> mbox cmd response: success
2,774,084 UART: [afmc] ++
2,774,252 UART: [afmc] CDI.KEYID = 6
2,774,615 UART: [afmc] SUBJECT.KEYID = 7
2,775,041 UART: [afmc] AUTHORITY.KEYID = 5
2,811,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,053 UART: [afmc] --
2,855,143 UART: [cold-reset] --
2,855,837 UART: [state] Locking Datavault
2,857,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,636 UART: [state] Locking ICCM
2,858,300 UART: [exit] Launching FMC @ 0x40000130
2,863,629 UART:
2,863,645 UART: Running Caliptra FMC ...
2,864,053 UART:
2,864,196 UART: [state] CFI Enabled
2,874,807 UART: [fht] FMC Alias Private Key: 7
2,982,286 UART: [art] Extend RT PCRs Done
2,982,714 UART: [art] Lock RT PCRs Done
2,984,256 UART: [art] Populate DV Done
2,992,563 UART: [fht] FMC Alias Private Key: 7
2,993,553 UART: [art] Derive CDI
2,993,833 UART: [art] Store in in slot 0x4
3,079,050 UART: [art] Derive Key Pair
3,079,410 UART: [art] Store priv key in slot 0x5
3,091,938 UART: [art] Derive Key Pair - Done
3,106,484 UART: [art] Signing Cert with AUTHO
3,106,964 UART: RITY.KEYID = 7
3,121,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,665 UART: [art] PUB.X = CA98E5C61091B2CC23FB0D95A724B2EA94F55370FE82DEF76946796444BCDFFADA59ACFE5F9EE691188821FEED74E519
3,129,450 UART: [art] PUB.Y = E3A3E3C7F0567F9904C1DEF51748878A42692B6E7ADF3BEE7772D7D3FAB8C30040ACCD4E056B4692CA39EE742BDF69C8
3,136,388 UART: [art] SIG.R = 6DDE507527134EB43BED1C8B53FD4FA14632C5CAD32C3B7156514640F85102F01E461F232931C7B873B49998FAD303C7
3,143,152 UART: [art] SIG.S = FCBE0B712CB2696E4D22E0D9B484F860AD612D4813E61E4DEDDF3CB41FD7A4F1CF689761E9547D55E7195EFBC71F3F1F
3,167,434 UART: Caliptra RT
3,167,779 UART: [state] CFI Enabled
3,275,064 UART: [rt] RT listening for mailbox commands...
3,275,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,370 UART: [rt]cmd =0x41545348, len=116
3,308,166 >>> mbox cmd response data (12 bytes)
3,308,167 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,038 UART:
3,309,054 UART: Running Caliptra ROM ...
3,309,462 UART:
3,309,604 UART: [state] CFI Enabled
3,312,134 UART: [state] LifecycleState = Unprovisioned
3,312,789 UART: [state] DebugLocked = No
3,313,499 UART: [state] WD Timer not started. Device not locked for debugging
3,314,657 UART: [kat] SHA2-256
4,118,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,336 UART: [kat] ++
4,122,488 UART: [kat] sha1
4,126,770 UART: [kat] SHA2-256
4,128,710 UART: [kat] SHA2-384
4,131,557 UART: [kat] SHA2-512-ACC
4,133,457 UART: [kat] ECC-384
4,143,046 UART: [kat] HMAC-384Kdf
4,147,656 UART: [kat] LMS
4,395,968 UART: [kat] --
4,396,698 UART: [update-reset] ++
5,301,019 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,398,424 >>> mbox cmd response: success
5,398,424 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,398,741 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,755 UART: [update-reset Success] --
5,407,778 UART: [state] Locking Datavault
5,408,668 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,272 UART: [state] Locking ICCM
5,409,714 UART: [exit] Launching FMC @ 0x40000130
5,415,043 UART:
5,415,059 UART: Running Caliptra FMC ...
5,415,467 UART:
5,415,610 UART: [state] CFI Enabled
5,504,609 UART: [art] Extend RT PCRs Done
5,505,037 UART: [art] Lock RT PCRs Done
5,506,570 UART: [art] Populate DV Done
5,515,031 UART: [fht] FMC Alias Private Key: 7
5,516,059 UART: [art] Derive CDI
5,516,339 UART: [art] Store in in slot 0x4
5,602,040 UART: [art] Derive Key Pair
5,602,400 UART: [art] Store priv key in slot 0x5
5,616,648 UART: [art] Derive Key Pair - Done
5,631,469 UART: [art] Signing Cert with AUTHO
5,631,949 UART: RITY.KEYID = 7
5,647,403 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,168 UART: [art] PUB.X = F1DD27B80E5403FFB38F44C2B91FB3D660D612E6B7BA40698A432702CDE777D21858D71819C4A92FC62052FB6DAD70A9
5,654,937 UART: [art] PUB.Y = 684118E1BF4C0004E279DABA8C01DE5F372C225801CF6041199D6FA66C84DE1C18C25DE44D18117573A5AF55552BB247
5,661,858 UART: [art] SIG.R = FE2A6B3CFCA48E6B92DFDE3A288865B35B8914898CCE1AF98CA5F3BE1B2D3E57F85E217A761A313B4A668197D223652B
5,668,642 UART: [art] SIG.S = 43FDA652B7AAC471F2C8D337448310D5E48C21C80F8D01EEBE7E4E7D4429E8C5F84758B204C0129A509E26F670B84C89
5,692,416 UART: mbox::rt_entry...
5,692,788 UART: ____ _ _ _ ____ _____
5,693,572 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,372 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,140 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,908 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,676 UART: |_|
5,696,988 UART:
5,972,788 UART: [rt] Runtime listening for mailbox commands...
5,973,978 >>> mbox cmd response data (48 bytes)
5,973,979 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,976,762 >>> mbox cmd response data (48 bytes)
5,976,763 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,989,701 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,885 ready_for_fw is high
1,055,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,411 >>> mbox cmd response: success
2,685,329 UART:
2,685,345 UART: Running Caliptra FMC ...
2,685,753 UART:
2,685,896 UART: [state] CFI Enabled
2,696,343 UART: [fht] FMC Alias Private Key: 7
2,804,074 UART: [art] Extend RT PCRs Done
2,804,502 UART: [art] Lock RT PCRs Done
2,805,908 UART: [art] Populate DV Done
2,814,071 UART: [fht] FMC Alias Private Key: 7
2,815,141 UART: [art] Derive CDI
2,815,421 UART: [art] Store in in slot 0x4
2,901,666 UART: [art] Derive Key Pair
2,902,026 UART: [art] Store priv key in slot 0x5
2,915,100 UART: [art] Derive Key Pair - Done
2,929,791 UART: [art] Signing Cert with AUTHO
2,930,271 UART: RITY.KEYID = 7
2,945,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,404 UART: [art] PUB.X = 20E678C591F7135AE95D55799744D5CADF27875A281F62967E591C45F6B81A0840EAD91F8051C380E34F68978BA53777
2,953,163 UART: [art] PUB.Y = A62BB9100F9E5078195ACC62FFF427BF2D86CF2A3B27A0860E229CCA675C1A8763C066186AD55786100AB609D337A109
2,960,100 UART: [art] SIG.R = AF79ACEA5B81AD9F65CFA61BE878AF40668680F05642693D463CC9B9AA0C68928854B628D645D4364B0356B991F0EC41
2,966,868 UART: [art] SIG.S = 188CBF4F2ED68AB6A49823C5560CC2D58A34E4A19DD0E262865F2E545106BA95E31AA749340ECFD8A63980830B32E2A5
2,990,857 UART: Caliptra RT
2,991,202 UART: [state] CFI Enabled
3,098,299 UART: [rt] RT listening for mailbox commands...
3,098,969 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,481 UART: [rt]cmd =0x41545348, len=116
3,131,429 >>> mbox cmd response data (12 bytes)
3,131,430 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,810 >>> mbox cmd response: success
5,103,810 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,117,086 UART:
5,117,102 UART: Running Caliptra FMC ...
5,117,510 UART:
5,117,653 UART: [state] CFI Enabled
5,207,000 UART: [art] Extend RT PCRs Done
5,207,428 UART: [art] Lock RT PCRs Done
5,208,511 UART: [art] Populate DV Done
5,216,930 UART: [fht] FMC Alias Private Key: 7
5,218,010 UART: [art] Derive CDI
5,218,290 UART: [art] Store in in slot 0x4
5,303,861 UART: [art] Derive Key Pair
5,304,221 UART: [art] Store priv key in slot 0x5
5,317,469 UART: [art] Derive Key Pair - Done
5,332,388 UART: [art] Signing Cert with AUTHO
5,332,868 UART: RITY.KEYID = 7
5,347,966 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,731 UART: [art] PUB.X = 99F9DF2B8E7D2835AB268F294DF9577553DACAC51DE3BC8FC8F8F5EE1483EA1368685ED7163EFD3BCBDF6EA614B15852
5,355,521 UART: [art] PUB.Y = 7310EB32EA0C089A2BF88F659FF88279AFFB9F622926599E810765DE21199D60CF6F061FE7AF368B8D0E353BB9A9758C
5,362,462 UART: [art] SIG.R = 2D61E2648664F87009EA23F1C16DE7ADEDC703E23B7CBE43D44114D38E67E96662567A4FF5FB17933D6B9FA39682AFF7
5,369,234 UART: [art] SIG.S = 3F68194D0B0E0871228310BA20EB44D3F0EF6AF2BA4CF06843E67F1A91DDADEE18A0FBD0764BC8D34154B507C35E136F
5,393,555 UART: mbox::rt_entry...
5,393,927 UART: ____ _ _ _ ____ _____
5,394,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,395,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,396,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,397,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,397,815 UART: |_|
5,398,127 UART:
5,681,009 UART: [rt] Runtime listening for mailbox commands...
5,682,199 >>> mbox cmd response data (48 bytes)
5,682,200 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,684,983 >>> mbox cmd response data (48 bytes)
5,684,984 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,697,922 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,254 UART:
192,612 UART: Running Caliptra ROM ...
193,792 UART:
193,950 UART: [state] CFI Enabled
267,277 UART: [state] LifecycleState = Unprovisioned
269,190 UART: [state] DebugLocked = No
272,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,954 UART: [kat] SHA2-256
446,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,129 UART: [kat] ++
457,735 UART: [kat] sha1
468,050 UART: [kat] SHA2-256
470,705 UART: [kat] SHA2-384
477,609 UART: [kat] SHA2-512-ACC
479,977 UART: [kat] ECC-384
2,768,038 UART: [kat] HMAC-384Kdf
2,799,651 UART: [kat] LMS
3,989,916 UART: [kat] --
3,994,911 UART: [cold-reset] ++
3,997,343 UART: [fht] Storing FHT @ 0x50003400
4,009,173 UART: [idev] ++
4,009,752 UART: [idev] CDI.KEYID = 6
4,010,753 UART: [idev] SUBJECT.KEYID = 7
4,011,872 UART: [idev] UDS.KEYID = 0
4,012,988 ready_for_fw is high
4,013,198 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,214 UART: [idev] Erasing UDS.KEYID = 0
7,347,773 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,372 UART: [idev] --
7,373,370 UART: [ldev] ++
7,373,942 UART: [ldev] CDI.KEYID = 6
7,374,916 UART: [ldev] SUBJECT.KEYID = 5
7,376,073 UART: [ldev] AUTHORITY.KEYID = 7
7,377,415 UART: [ldev] FE.KEYID = 1
7,422,301 UART: [ldev] Erasing FE.KEYID = 1
10,756,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,136 UART: [ldev] --
13,117,623 UART: [fwproc] Waiting for Commands...
13,120,586 UART: [fwproc] Received command 0x46574c44
13,122,825 UART: [fwproc] Received Image of size 114124 bytes
17,176,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,298 >>> mbox cmd response: success
17,639,529 UART: [afmc] ++
17,640,133 UART: [afmc] CDI.KEYID = 6
17,641,018 UART: [afmc] SUBJECT.KEYID = 7
17,642,294 UART: [afmc] AUTHORITY.KEYID = 5
21,017,035 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,317,062 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,319,319 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,333,731 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,348,545 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,362,961 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,384,667 UART: [afmc] --
23,388,695 UART: [cold-reset] --
23,392,122 UART: [state] Locking Datavault
23,396,082 UART: [state] Locking PCR0, PCR1 and PCR31
23,397,836 UART: [state] Locking ICCM
23,400,259 UART: [exit] Launching FMC @ 0x40000130
23,408,664 UART:
23,408,943 UART: Running Caliptra FMC ...
23,410,054 UART:
23,410,218 UART: [state] CFI Enabled
23,476,020 UART: [fht] FMC Alias Private Key: 7
25,813,819 UART: [art] Extend RT PCRs Done
25,815,040 UART: [art] Lock RT PCRs Done
25,816,803 UART: [art] Populate DV Done
25,822,116 UART: [fht] FMC Alias Private Key: 7
25,823,650 UART: [art] Derive CDI
25,824,464 UART: [art] Store in in slot 0x4
25,885,884 UART: [art] Derive Key Pair
25,886,911 UART: [art] Store priv key in slot 0x5
29,179,127 UART: [art] Derive Key Pair - Done
29,191,964 UART: [art] Signing Cert with AUTHO
29,193,265 UART: RITY.KEYID = 7
31,480,664 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,171 UART: [art] PUB.X = 10F335AC5A19990C69D71411C859BAEEF424297F3349B7B899286BE84EB94002C43CA8308250BD6E45BBB684C6089F18
31,489,450 UART: [art] PUB.Y = 2A03A8C02B9B54CA9DF5D3F6ED89D71BF4F65B2F0EE3F61F22F21475B2298A4CC8A74EA0D4207FBDE47BD679E0896382
31,496,700 UART: [art] SIG.R = FFA6E06E68EC924227495EB41F157F6E04454F6D8B045BE83DA10B7B2B10E72E6AE42FAFC7A85B9F727BA991B1E4350E
31,504,060 UART: [art] SIG.S = 13EB2F1BEDA956E283ED211DC13A5C8E56B9BBD76987C1F78562CDE0770C606A3054FFCD47D0BCE4ECDC247A6A4CE7E5
32,809,558 UART: Caliptra RT
32,810,253 UART: [state] CFI Enabled
32,991,463 UART: [rt] RT listening for mailbox commands...
37,166,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,321,457 UART: [rt]cmd =0x41544d4e, len=14344
42,556,730 >>> mbox cmd response data (8 bytes)
42,557,349 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,588,095 UART: [rt]cmd =0x41545348, len=116
42,590,415 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,805,371 ready_for_fw is high
3,805,880 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,866,871 >>> mbox cmd response: success
23,566,695 UART:
23,567,082 UART: Running Caliptra FMC ...
23,568,219 UART:
23,568,376 UART: [state] CFI Enabled
23,633,480 UART: [fht] FMC Alias Private Key: 7
25,970,742 UART: [art] Extend RT PCRs Done
25,971,967 UART: [art] Lock RT PCRs Done
25,974,005 UART: [art] Populate DV Done
25,979,545 UART: [fht] FMC Alias Private Key: 7
25,981,139 UART: [art] Derive CDI
25,981,956 UART: [art] Store in in slot 0x4
26,042,535 UART: [art] Derive Key Pair
26,043,590 UART: [art] Store priv key in slot 0x5
29,336,804 UART: [art] Derive Key Pair - Done
29,349,959 UART: [art] Signing Cert with AUTHO
29,351,293 UART: RITY.KEYID = 7
31,638,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,530 UART: [art] PUB.X = E3189D47915061D3EF5D2ACE3EB5626329650DE6C54D903C8F75477ED79E3B16E1481EFB1571053464960E7B33610850
31,646,725 UART: [art] PUB.Y = C9738A419A68DF1DAD4A93EC391786B21400869A6B5DCDF0C60961320E6C2EEAE133C877FF97C6E222182FD4C7B3AF16
31,653,963 UART: [art] SIG.R = 4ACF67EF108C8F058439504F64BD0B24B95E2D68407FCC59975FA74A68FDBE8104F6539BE39BA42CBCAB1BFDC127A927
31,661,354 UART: [art] SIG.S = 6EE4BA390FEFDDCF4DF823BB226A4D61BF43E3801D3A869CEC9123477A63EAC481425CD819F593B8EC49F3ED89F1F600
32,966,664 UART: Caliptra RT
32,967,375 UART: [state] CFI Enabled
33,128,487 UART: [rt] RT listening for mailbox commands...
37,302,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,458,676 UART: [rt]cmd =0x41544d4e, len=14344
42,693,702 >>> mbox cmd response data (8 bytes)
42,694,412 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,725,166 UART: [rt]cmd =0x41545348, len=116
42,727,161 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,591 UART:
192,944 UART: Running Caliptra ROM ...
194,139 UART:
603,874 UART: [state] CFI Enabled
618,831 UART: [state] LifecycleState = Unprovisioned
620,782 UART: [state] DebugLocked = No
623,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,447 UART: [kat] SHA2-256
798,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,739 UART: [kat] ++
809,202 UART: [kat] sha1
819,784 UART: [kat] SHA2-256
822,495 UART: [kat] SHA2-384
828,263 UART: [kat] SHA2-512-ACC
830,628 UART: [kat] ECC-384
3,112,730 UART: [kat] HMAC-384Kdf
3,123,845 UART: [kat] LMS
4,313,994 UART: [kat] --
4,319,344 UART: [cold-reset] ++
4,320,872 UART: [fht] Storing FHT @ 0x50003400
4,331,643 UART: [idev] ++
4,332,215 UART: [idev] CDI.KEYID = 6
4,333,119 UART: [idev] SUBJECT.KEYID = 7
4,334,359 UART: [idev] UDS.KEYID = 0
4,335,395 ready_for_fw is high
4,335,588 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,934 UART: [idev] Erasing UDS.KEYID = 0
7,624,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,616 UART: [idev] --
7,649,221 UART: [ldev] ++
7,649,835 UART: [ldev] CDI.KEYID = 6
7,650,762 UART: [ldev] SUBJECT.KEYID = 5
7,651,904 UART: [ldev] AUTHORITY.KEYID = 7
7,653,240 UART: [ldev] FE.KEYID = 1
7,665,527 UART: [ldev] Erasing FE.KEYID = 1
10,951,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,339 UART: [ldev] --
13,312,870 UART: [fwproc] Waiting for Commands...
13,314,707 UART: [fwproc] Received command 0x46574c44
13,316,886 UART: [fwproc] Received Image of size 114124 bytes
17,364,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,670 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,742 >>> mbox cmd response: success
17,835,005 UART: [afmc] ++
17,835,643 UART: [afmc] CDI.KEYID = 6
17,836,533 UART: [afmc] SUBJECT.KEYID = 7
17,837,573 UART: [afmc] AUTHORITY.KEYID = 5
21,145,613 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,411 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,820 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,634 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,108 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,899 UART: [afmc] --
23,509,897 UART: [cold-reset] --
23,513,698 UART: [state] Locking Datavault
23,519,665 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,457 UART: [state] Locking ICCM
23,524,146 UART: [exit] Launching FMC @ 0x40000130
23,532,545 UART:
23,532,772 UART: Running Caliptra FMC ...
23,533,865 UART:
23,534,019 UART: [state] CFI Enabled
23,542,233 UART: [fht] FMC Alias Private Key: 7
25,873,160 UART: [art] Extend RT PCRs Done
25,874,377 UART: [art] Lock RT PCRs Done
25,876,264 UART: [art] Populate DV Done
25,881,831 UART: [fht] FMC Alias Private Key: 7
25,883,306 UART: [art] Derive CDI
25,884,078 UART: [art] Store in in slot 0x4
25,926,892 UART: [art] Derive Key Pair
25,927,926 UART: [art] Store priv key in slot 0x5
29,169,840 UART: [art] Derive Key Pair - Done
29,182,835 UART: [art] Signing Cert with AUTHO
29,184,139 UART: RITY.KEYID = 7
31,463,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,842 UART: [art] PUB.X = 3788137F78AFF77180A4B8AFD03BE0CB399A09F2C0EDC0499FBAFCF0DE24637E1E449AF438489D38346A0A9B7ED85EFF
31,472,119 UART: [art] PUB.Y = 691D6AC4236E6E4005890429E69C0BBDB6EE8653CD6F71DE514670785DFAFB05FBACC1F73DD3A0D7A7C56CE56CDEF254
31,479,384 UART: [art] SIG.R = ACBB4B12FD1C08F3B7E774FC86C6417D39C1FA7B530AEFC4CB27DD7A619D98A1BDB99BB1D502A760742961C71FAB921D
31,486,800 UART: [art] SIG.S = 2A7FAC98F8A4B1BC8C58FF9877F729928D3782DD19D5BAE6185DE2A565DD24231C5E7069EE9C93A47B5002CEBAAEC971
32,792,080 UART: Caliptra RT
32,792,778 UART: [state] CFI Enabled
32,909,370 UART: [rt] RT listening for mailbox commands...
36,928,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,084,421 UART: [rt]cmd =0x41544d4e, len=14344
42,320,140 >>> mbox cmd response data (8 bytes)
42,320,751 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,351,435 UART: [rt]cmd =0x41545348, len=116
42,353,643 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
4,126,514 ready_for_fw is high
4,126,914 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,351 >>> mbox cmd response: success
23,707,675 UART:
23,708,086 UART: Running Caliptra FMC ...
23,709,232 UART:
23,709,392 UART: [state] CFI Enabled
23,716,891 UART: [fht] FMC Alias Private Key: 7
26,047,928 UART: [art] Extend RT PCRs Done
26,049,160 UART: [art] Lock RT PCRs Done
26,050,677 UART: [art] Populate DV Done
26,056,270 UART: [fht] FMC Alias Private Key: 7
26,057,798 UART: [art] Derive CDI
26,058,573 UART: [art] Store in in slot 0x4
26,101,387 UART: [art] Derive Key Pair
26,102,382 UART: [art] Store priv key in slot 0x5
29,344,802 UART: [art] Derive Key Pair - Done
29,358,238 UART: [art] Signing Cert with AUTHO
29,359,545 UART: RITY.KEYID = 7
31,639,043 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,558 UART: [art] PUB.X = 8E8130978E7A04BEE1073A463F12F8B981FB196230886DE7C2795E1D29B6AE75AD7EBF664F2FEEAFE8C60220B9822561
31,647,829 UART: [art] PUB.Y = 3973BE62A46BAF364AF122CEF54D466F80CD77D56F30D8DB795C1AD8035F41C7E9019095F8318624473E577C426FE239
31,655,036 UART: [art] SIG.R = D7BB0690173E2C3F90E14ADF12705C2F3DE13346772C9CF6EB0223B48E1E87E0CE9B6185BEFEAE99AF728163258D060B
31,662,441 UART: [art] SIG.S = 534CDA040B8C373A37297596C591141A91CF364A25B6858002B486BE7FD8160469443CCBA2F736D9BF65F1EA932E433A
32,966,583 UART: Caliptra RT
32,967,285 UART: [state] CFI Enabled
33,083,703 UART: [rt] RT listening for mailbox commands...
37,102,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,257,766 UART: [rt]cmd =0x41544d4e, len=14344
42,493,289 >>> mbox cmd response data (8 bytes)
42,493,878 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,524,546 UART: [rt]cmd =0x41545348, len=116
42,526,804 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,029 UART:
192,401 UART: Running Caliptra ROM ...
193,528 UART:
193,675 UART: [state] CFI Enabled
261,672 UART: [state] LifecycleState = Unprovisioned
263,535 UART: [state] DebugLocked = No
265,141 UART: [state] WD Timer not started. Device not locked for debugging
269,097 UART: [kat] SHA2-256
448,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,789 UART: [kat] ++
460,317 UART: [kat] sha1
471,554 UART: [kat] SHA2-256
474,553 UART: [kat] SHA2-384
481,885 UART: [kat] SHA2-512-ACC
484,816 UART: [kat] ECC-384
2,948,643 UART: [kat] HMAC-384Kdf
2,974,111 UART: [kat] LMS
3,503,621 UART: [kat] --
3,509,036 UART: [cold-reset] ++
3,510,898 UART: [fht] FHT @ 0x50003400
3,521,592 UART: [idev] ++
3,522,169 UART: [idev] CDI.KEYID = 6
3,523,096 UART: [idev] SUBJECT.KEYID = 7
3,524,274 UART: [idev] UDS.KEYID = 0
3,525,372 ready_for_fw is high
3,525,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,455 UART: [idev] Erasing UDS.KEYID = 0
6,028,643 UART: [idev] Sha1 KeyId Algorithm
6,051,070 UART: [idev] --
6,055,993 UART: [ldev] ++
6,056,567 UART: [ldev] CDI.KEYID = 6
6,057,479 UART: [ldev] SUBJECT.KEYID = 5
6,058,643 UART: [ldev] AUTHORITY.KEYID = 7
6,059,877 UART: [ldev] FE.KEYID = 1
6,102,821 UART: [ldev] Erasing FE.KEYID = 1
8,604,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,215 UART: [ldev] --
10,415,995 UART: [fwproc] Wait for Commands...
10,418,035 UART: [fwproc] Recv command 0x46574c44
10,420,079 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,210 >>> mbox cmd response: success
14,284,118 UART: [afmc] ++
14,284,723 UART: [afmc] CDI.KEYID = 6
14,285,638 UART: [afmc] SUBJECT.KEYID = 7
14,286,795 UART: [afmc] AUTHORITY.KEYID = 5
16,830,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,930 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,680 UART: [afmc] --
18,628,977 UART: [cold-reset] --
18,632,511 UART: [state] Locking Datavault
18,638,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,935 UART: [state] Locking ICCM
18,641,323 UART: [exit] Launching FMC @ 0x40000130
18,649,726 UART:
18,650,001 UART: Running Caliptra FMC ...
18,651,115 UART:
18,651,282 UART: [state] CFI Enabled
18,711,206 UART: [fht] FMC Alias Private Key: 7
20,474,991 UART: [art] Extend RT PCRs Done
20,476,214 UART: [art] Lock RT PCRs Done
20,477,782 UART: [art] Populate DV Done
20,483,191 UART: [fht] FMC Alias Private Key: 7
20,484,882 UART: [art] Derive CDI
20,485,900 UART: [art] Store in in slot 0x4
20,544,011 UART: [art] Derive Key Pair
20,545,015 UART: [art] Store priv key in slot 0x5
23,007,891 UART: [art] Derive Key Pair - Done
23,020,506 UART: [art] Signing Cert with AUTHO
23,021,801 UART: RITY.KEYID = 7
24,733,794 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,304 UART: [art] PUB.X = 3D91C8C454199BE7EA3DB9DAAFF2588E68DB7D509D5209BF2E680D80D5FD6EDBA7C5AFA14FFA5674F5C9EA73727CB7DB
24,742,602 UART: [art] PUB.Y = AEA014BE3B8F984C1E824F7405576697C40709A4253EC28A6C46F3611C0F8D0E90DD6C4718569C8D4B972C6151C92B79
24,749,833 UART: [art] SIG.R = 4765EEC90693EDA4A9D7345163D904F0B4E76FD88D00E11B7B4AA0C4F6AC77B75838FFB50842D7FCD2D5801FB0443BE0
24,757,220 UART: [art] SIG.S = 3732D025E0D619E7CAD200BE860F438A6B7DC6C3A3B22962100D6DEAA21FF5FE7D19E1299619A567386430AFDD8E68B1
25,735,879 UART: Caliptra RT
25,736,582 UART: [state] CFI Enabled
25,901,316 UART: [rt] RT listening for mailbox commands...
29,949,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,105,375 UART: [rt]cmd =0x41544d4e, len=14344
34,036,046 >>> mbox cmd response data (8 bytes)
34,036,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,067,524 UART: [rt]cmd =0x41545348, len=116
34,069,570 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,379,678 ready_for_fw is high
3,380,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,915 >>> mbox cmd response: success
18,340,959 UART:
18,341,347 UART: Running Caliptra FMC ...
18,342,536 UART:
18,342,726 UART: [state] CFI Enabled
18,410,306 UART: [fht] FMC Alias Private Key: 7
20,174,458 UART: [art] Extend RT PCRs Done
20,175,659 UART: [art] Lock RT PCRs Done
20,177,123 UART: [art] Populate DV Done
20,182,263 UART: [fht] FMC Alias Private Key: 7
20,183,816 UART: [art] Derive CDI
20,184,636 UART: [art] Store in in slot 0x4
20,243,411 UART: [art] Derive Key Pair
20,244,442 UART: [art] Store priv key in slot 0x5
22,707,397 UART: [art] Derive Key Pair - Done
22,720,020 UART: [art] Signing Cert with AUTHO
22,721,324 UART: RITY.KEYID = 7
24,433,597 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,099 UART: [art] PUB.X = 1BF2F66C857577E0F172B5FF5CCA027270C1F66900A9255FBC8BF36CD702D2E8E25368583B30E3C58D9234B1772599A6
24,442,317 UART: [art] PUB.Y = 5BC6B5E0541795494C2ECC9F9F717C0F31B7A7D0033FB75B519127FEAFA6619E644BC4BE932E9AA4E664270919F9BDE8
24,449,582 UART: [art] SIG.R = B5FE071CF8BA09D9366A2219612A73649F562907CC3F6CD96E508E2AA9710EA0D1189C95703F8CAA8CA4402ADE670561
24,456,983 UART: [art] SIG.S = 11E8EE6E6344FCE37EA0A553BFCCF7B63F8235900157B06A36A16B9A4CE007EB13FDB7FAD4CCD4896B4CDE2947A9B154
25,436,388 UART: Caliptra RT
25,437,105 UART: [state] CFI Enabled
25,601,629 UART: [rt] RT listening for mailbox commands...
29,622,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,778,237 UART: [rt]cmd =0x41544d4e, len=14344
33,708,133 >>> mbox cmd response data (8 bytes)
33,708,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,739,508 UART: [rt]cmd =0x41545348, len=116
33,741,749 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,258 UART:
192,645 UART: Running Caliptra ROM ...
193,748 UART:
603,247 UART: [state] CFI Enabled
616,205 UART: [state] LifecycleState = Unprovisioned
618,082 UART: [state] DebugLocked = No
619,669 UART: [state] WD Timer not started. Device not locked for debugging
623,413 UART: [kat] SHA2-256
802,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,153 UART: [kat] ++
814,682 UART: [kat] sha1
826,617 UART: [kat] SHA2-256
829,617 UART: [kat] SHA2-384
834,623 UART: [kat] SHA2-512-ACC
837,556 UART: [kat] ECC-384
3,280,641 UART: [kat] HMAC-384Kdf
3,293,986 UART: [kat] LMS
3,823,491 UART: [kat] --
3,826,983 UART: [cold-reset] ++
3,829,256 UART: [fht] FHT @ 0x50003400
3,839,366 UART: [idev] ++
3,839,926 UART: [idev] CDI.KEYID = 6
3,840,872 UART: [idev] SUBJECT.KEYID = 7
3,842,101 UART: [idev] UDS.KEYID = 0
3,842,993 ready_for_fw is high
3,843,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,017 UART: [idev] Erasing UDS.KEYID = 0
6,311,120 UART: [idev] Sha1 KeyId Algorithm
6,334,569 UART: [idev] --
6,338,505 UART: [ldev] ++
6,339,082 UART: [ldev] CDI.KEYID = 6
6,339,992 UART: [ldev] SUBJECT.KEYID = 5
6,341,207 UART: [ldev] AUTHORITY.KEYID = 7
6,342,435 UART: [ldev] FE.KEYID = 1
6,352,152 UART: [ldev] Erasing FE.KEYID = 1
8,826,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,468 UART: [ldev] --
10,617,431 UART: [fwproc] Wait for Commands...
10,620,540 UART: [fwproc] Recv command 0x46574c44
10,622,621 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,605 >>> mbox cmd response: success
14,490,183 UART: [afmc] ++
14,490,784 UART: [afmc] CDI.KEYID = 6
14,491,688 UART: [afmc] SUBJECT.KEYID = 7
14,492,842 UART: [afmc] AUTHORITY.KEYID = 5
16,988,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,993 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,743 UART: [afmc] --
18,784,947 UART: [cold-reset] --
18,790,203 UART: [state] Locking Datavault
18,795,093 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,738 UART: [state] Locking ICCM
18,798,641 UART: [exit] Launching FMC @ 0x40000130
18,807,103 UART:
18,807,376 UART: Running Caliptra FMC ...
18,808,477 UART:
18,808,635 UART: [state] CFI Enabled
18,816,568 UART: [fht] FMC Alias Private Key: 7
20,573,108 UART: [art] Extend RT PCRs Done
20,574,310 UART: [art] Lock RT PCRs Done
20,575,965 UART: [art] Populate DV Done
20,581,314 UART: [fht] FMC Alias Private Key: 7
20,582,844 UART: [art] Derive CDI
20,583,568 UART: [art] Store in in slot 0x4
20,626,040 UART: [art] Derive Key Pair
20,627,034 UART: [art] Store priv key in slot 0x5
23,053,958 UART: [art] Derive Key Pair - Done
23,066,682 UART: [art] Signing Cert with AUTHO
23,067,987 UART: RITY.KEYID = 7
24,773,349 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,845 UART: [art] PUB.X = FCE1BAF5283CB343D9E31CE05C3DE15A8F5775A7837217BEF2B60EFE2DB97F8EA66AC048CC4DC62987D9AE7582EFEA7B
24,782,114 UART: [art] PUB.Y = FC07FDBC1BF1438784DF49EA0AF0CE51B4103A370F921B3AECC84F3F64D48AEF666191EE6379C34296DFCED71EA628BF
24,789,449 UART: [art] SIG.R = 824F1C6C64DF3C6CE319707CADE2BA60214C633954EC6EB807189595355D7D030BDB11740BD04437360D0409B9D958F9
24,796,796 UART: [art] SIG.S = 85A27C48024B3790F17728DD32ED58DA5AB54B7DB7490AE49EC361D8B40EF7FCA7753688B42F62096E94EEF2A11F4AE9
25,776,147 UART: Caliptra RT
25,776,860 UART: [state] CFI Enabled
25,892,842 UART: [rt] RT listening for mailbox commands...
29,916,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,072,203 UART: [rt]cmd =0x41544d4e, len=14344
34,002,716 >>> mbox cmd response data (8 bytes)
34,003,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,034,221 UART: [rt]cmd =0x41545348, len=116
34,036,158 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
3,693,013 ready_for_fw is high
3,693,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,059 >>> mbox cmd response: success
18,531,254 UART:
18,531,706 UART: Running Caliptra FMC ...
18,532,816 UART:
18,532,971 UART: [state] CFI Enabled
18,541,028 UART: [fht] FMC Alias Private Key: 7
20,297,747 UART: [art] Extend RT PCRs Done
20,298,975 UART: [art] Lock RT PCRs Done
20,300,514 UART: [art] Populate DV Done
20,306,038 UART: [fht] FMC Alias Private Key: 7
20,307,579 UART: [art] Derive CDI
20,308,336 UART: [art] Store in in slot 0x4
20,351,037 UART: [art] Derive Key Pair
20,352,078 UART: [art] Store priv key in slot 0x5
22,778,915 UART: [art] Derive Key Pair - Done
22,792,023 UART: [art] Signing Cert with AUTHO
22,793,331 UART: RITY.KEYID = 7
24,499,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,508 UART: [art] PUB.X = 6AFBD3533F84A52340562AECA240B52C42B005895CF201A647C8045B005961F428F95DDEB059086DF3969E3F6D305816
24,507,736 UART: [art] PUB.Y = 13497A88A6D7B6FF14D3821B45571F74AC5D7C5B1C586972E5B0758360414777F63E19BB5EB9E4F8E6087DE3279A8480
24,514,968 UART: [art] SIG.R = E1400D3C18B75E595233F37DB5F62732794B77F85C8A9CD2378778E47C1C3F8E8E307D2DBEA57CE6B6FEA89F45710917
24,522,346 UART: [art] SIG.S = E6C05FC5677CF171A7E1BB80E513A981557EE81F4C610A3DA1BFB15ABEDBF29831BF8566583236C3622093905EC8EBCD
25,501,268 UART: Caliptra RT
25,501,982 UART: [state] CFI Enabled
25,619,351 UART: [rt] RT listening for mailbox commands...
29,643,674 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,799,262 UART: [rt]cmd =0x41544d4e, len=14344
33,729,745 >>> mbox cmd response data (8 bytes)
33,730,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,761,111 UART: [rt]cmd =0x41545348, len=116
33,763,374 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,196 UART:
192,562 UART: Running Caliptra ROM ...
193,715 UART:
193,866 UART: [state] CFI Enabled
267,864 UART: [state] LifecycleState = Unprovisioned
270,276 UART: [state] DebugLocked = No
271,810 UART: [state] WD Timer not started. Device not locked for debugging
276,936 UART: [kat] SHA2-256
466,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,548 UART: [kat] ++
478,028 UART: [kat] sha1
488,979 UART: [kat] SHA2-256
491,983 UART: [kat] SHA2-384
497,472 UART: [kat] SHA2-512-ACC
500,050 UART: [kat] ECC-384
2,948,937 UART: [kat] HMAC-384Kdf
2,973,234 UART: [kat] LMS
3,504,949 UART: [kat] --
3,508,091 UART: [cold-reset] ++
3,510,094 UART: [fht] FHT @ 0x50003400
3,521,725 UART: [idev] ++
3,522,395 UART: [idev] CDI.KEYID = 6
3,523,434 UART: [idev] SUBJECT.KEYID = 7
3,524,561 UART: [idev] UDS.KEYID = 0
3,525,496 ready_for_fw is high
3,525,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,534 UART: [idev] Erasing UDS.KEYID = 0
6,032,761 UART: [idev] Sha1 KeyId Algorithm
6,056,489 UART: [idev] --
6,062,383 UART: [ldev] ++
6,063,074 UART: [ldev] CDI.KEYID = 6
6,063,994 UART: [ldev] SUBJECT.KEYID = 5
6,065,210 UART: [ldev] AUTHORITY.KEYID = 7
6,066,389 UART: [ldev] FE.KEYID = 1
6,102,077 UART: [ldev] Erasing FE.KEYID = 1
8,607,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,770 UART: [ldev] --
10,415,854 UART: [fwproc] Wait for Commands...
10,419,077 UART: [fwproc] Recv command 0x46574c44
10,421,334 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,111 >>> mbox cmd response: success
14,608,847 UART: [afmc] ++
14,609,559 UART: [afmc] CDI.KEYID = 6
14,610,664 UART: [afmc] SUBJECT.KEYID = 7
14,612,208 UART: [afmc] AUTHORITY.KEYID = 5
17,150,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,390 UART: [afmc] --
18,950,085 UART: [cold-reset] --
18,954,431 UART: [state] Locking Datavault
18,961,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,660 UART: [state] Locking ICCM
18,965,880 UART: [exit] Launching FMC @ 0x40000130
18,974,554 UART:
18,974,788 UART: Running Caliptra FMC ...
18,975,889 UART:
18,976,046 UART: [state] CFI Enabled
19,033,819 UART: [fht] FMC Alias Private Key: 7
20,797,034 UART: [art] Extend RT PCRs Done
20,798,261 UART: [art] Lock RT PCRs Done
20,800,233 UART: [art] Populate DV Done
20,805,544 UART: [fht] FMC Alias Private Key: 7
20,807,146 UART: [art] Derive CDI
20,807,959 UART: [art] Store in in slot 0x4
20,866,563 UART: [art] Derive Key Pair
20,867,560 UART: [art] Store priv key in slot 0x5
23,330,702 UART: [art] Derive Key Pair - Done
23,343,750 UART: [art] Signing Cert with AUTHO
23,345,053 UART: RITY.KEYID = 7
25,056,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,046 UART: [art] PUB.X = 8197D06006D36E2A1579978694FF9A3FC1F0524746F0BE5A17017C449BE4727CC841D3FA4755EAB37808817FD38246AA
25,065,295 UART: [art] PUB.Y = AD68C1A318870F4B400FE8FB65177D8AA240A2757457E8CD799CC929174B0744845D2255918F59EE0226317F4C503DB4
25,072,523 UART: [art] SIG.R = 076AD2031EF444437FFB19B22C003F9A76440CD832A93D7E3E1A8E8D01C11440FC8A9B8055EC0AF6BD269EFAC5D6D7DA
25,079,909 UART: [art] SIG.S = 8F983293219527880E9B03912F5DCC5A5103B7AC36DB10471668AC828C231B410CD1D7FA14073EC7C2F88B8FF271B9B9
26,059,312 UART: Caliptra RT
26,060,002 UART: [state] CFI Enabled
26,226,065 UART: [rt] RT listening for mailbox commands...
30,246,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,402,287 UART: [rt]cmd =0x41544d4e, len=14344
34,333,005 >>> mbox cmd response data (8 bytes)
34,333,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,364,459 UART: [rt]cmd =0x41545348, len=116
34,366,883 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,441,664 ready_for_fw is high
3,442,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,758,285 >>> mbox cmd response: success
19,049,029 UART:
19,049,410 UART: Running Caliptra FMC ...
19,050,567 UART:
19,050,739 UART: [state] CFI Enabled
19,118,198 UART: [fht] FMC Alias Private Key: 7
20,881,919 UART: [art] Extend RT PCRs Done
20,883,148 UART: [art] Lock RT PCRs Done
20,884,907 UART: [art] Populate DV Done
20,890,544 UART: [fht] FMC Alias Private Key: 7
20,892,190 UART: [art] Derive CDI
20,892,927 UART: [art] Store in in slot 0x4
20,950,734 UART: [art] Derive Key Pair
20,951,752 UART: [art] Store priv key in slot 0x5
23,414,825 UART: [art] Derive Key Pair - Done
23,427,607 UART: [art] Signing Cert with AUTHO
23,428,906 UART: RITY.KEYID = 7
25,140,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,200 UART: [art] PUB.X = 3C3133E53F8C4C6D0DB63E5C826AC6299D9E098C0299154EB48C629B93CB40CB1152B66EE6D76D8481A1D1F81AE124FE
25,149,438 UART: [art] PUB.Y = B2718DD4CC1B4E6AA0E208A7EDE64EACF3CBF014096253CE21591541179F906DD19412EF9B01FDE2F30B7EBF6A053344
25,156,747 UART: [art] SIG.R = E5D702B83B2237F09C12F83C37D08B206E0BB674A8BC8CBE093FC16540D020909F63F1CACA48E13B178DD2AD436822F0
25,164,134 UART: [art] SIG.S = 801C6FFB83948E8AC3A5F93B35ECAAF31777DC1D51920B3B1A19F82D6DFF55095BEA28B994C52D8E2BACAA05B7AC855B
26,144,019 UART: Caliptra RT
26,144,732 UART: [state] CFI Enabled
26,308,022 UART: [rt] RT listening for mailbox commands...
30,336,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,492,602 UART: [rt]cmd =0x41544d4e, len=14344
34,423,257 >>> mbox cmd response data (8 bytes)
34,423,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,454,625 UART: [rt]cmd =0x41545348, len=116
34,456,613 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,273 UART:
192,638 UART: Running Caliptra ROM ...
193,781 UART:
603,514 UART: [state] CFI Enabled
621,080 UART: [state] LifecycleState = Unprovisioned
623,458 UART: [state] DebugLocked = No
624,841 UART: [state] WD Timer not started. Device not locked for debugging
630,147 UART: [kat] SHA2-256
820,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,766 UART: [kat] ++
831,279 UART: [kat] sha1
843,293 UART: [kat] SHA2-256
846,264 UART: [kat] SHA2-384
852,112 UART: [kat] SHA2-512-ACC
854,751 UART: [kat] ECC-384
3,298,639 UART: [kat] HMAC-384Kdf
3,311,083 UART: [kat] LMS
3,842,897 UART: [kat] --
3,847,058 UART: [cold-reset] ++
3,848,085 UART: [fht] FHT @ 0x50003400
3,859,341 UART: [idev] ++
3,859,970 UART: [idev] CDI.KEYID = 6
3,860,961 UART: [idev] SUBJECT.KEYID = 7
3,862,129 UART: [idev] UDS.KEYID = 0
3,863,167 ready_for_fw is high
3,863,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,174 UART: [idev] Erasing UDS.KEYID = 0
6,338,956 UART: [idev] Sha1 KeyId Algorithm
6,362,207 UART: [idev] --
6,367,141 UART: [ldev] ++
6,367,816 UART: [ldev] CDI.KEYID = 6
6,368,696 UART: [ldev] SUBJECT.KEYID = 5
6,369,855 UART: [ldev] AUTHORITY.KEYID = 7
6,371,050 UART: [ldev] FE.KEYID = 1
6,382,118 UART: [ldev] Erasing FE.KEYID = 1
8,862,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,735 UART: [ldev] --
10,654,611 UART: [fwproc] Wait for Commands...
10,656,582 UART: [fwproc] Recv command 0x46574c44
10,658,880 UART: [fwproc] Recv'd Img size: 114448 bytes
14,114,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,851,871 >>> mbox cmd response: success
14,855,650 UART: [afmc] ++
14,856,368 UART: [afmc] CDI.KEYID = 6
14,857,552 UART: [afmc] SUBJECT.KEYID = 7
14,859,003 UART: [afmc] AUTHORITY.KEYID = 5
17,360,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,086,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,088,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,103,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,158,530 UART: [afmc] --
19,162,916 UART: [cold-reset] --
19,164,765 UART: [state] Locking Datavault
19,169,280 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,475 UART: [state] Locking ICCM
19,173,500 UART: [exit] Launching FMC @ 0x40000130
19,182,119 UART:
19,182,347 UART: Running Caliptra FMC ...
19,183,366 UART:
19,183,526 UART: [state] CFI Enabled
19,191,683 UART: [fht] FMC Alias Private Key: 7
20,949,034 UART: [art] Extend RT PCRs Done
20,950,255 UART: [art] Lock RT PCRs Done
20,951,789 UART: [art] Populate DV Done
20,957,358 UART: [fht] FMC Alias Private Key: 7
20,958,897 UART: [art] Derive CDI
20,959,625 UART: [art] Store in in slot 0x4
21,001,996 UART: [art] Derive Key Pair
21,003,036 UART: [art] Store priv key in slot 0x5
23,429,640 UART: [art] Derive Key Pair - Done
23,442,571 UART: [art] Signing Cert with AUTHO
23,443,859 UART: RITY.KEYID = 7
25,149,180 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,683 UART: [art] PUB.X = E62AE832CC01E6403A28995A095AD8CDF9540D652798D9D23586B6434B875BABA9C40B183C6F30754F8F1F7CFF1502B7
25,157,955 UART: [art] PUB.Y = 4CE07C6FCDC603A613B9E8FBD915E1965B82A8923F741EFA231EE4A3E9BA5E16C5E1059C525C606A96029A916E833A3D
25,165,272 UART: [art] SIG.R = 11833AA359A8B5651B36CA96423A3A988C80633E59BCB23342FAF7862EDB064460148283AFAE1F2CA4690767D1C9380D
25,172,615 UART: [art] SIG.S = DDCD4ECCC58382E33AFD61F54A11A791F08FCBFC302E3A161CAA1EB70901E8A5E0D85EE6E789184C7E48505DC6CB710A
26,151,470 UART: Caliptra RT
26,152,154 UART: [state] CFI Enabled
26,268,986 UART: [rt] RT listening for mailbox commands...
30,288,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,444,226 UART: [rt]cmd =0x41544d4e, len=14344
34,374,910 >>> mbox cmd response data (8 bytes)
34,375,471 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,406,199 UART: [rt]cmd =0x41545348, len=116
34,408,185 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,756,167 ready_for_fw is high
3,756,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,926 >>> mbox cmd response: success
19,221,678 UART:
19,222,086 UART: Running Caliptra FMC ...
19,223,217 UART:
19,223,370 UART: [state] CFI Enabled
19,231,194 UART: [fht] FMC Alias Private Key: 7
20,988,071 UART: [art] Extend RT PCRs Done
20,989,302 UART: [art] Lock RT PCRs Done
20,991,085 UART: [art] Populate DV Done
20,996,600 UART: [fht] FMC Alias Private Key: 7
20,998,301 UART: [art] Derive CDI
20,999,109 UART: [art] Store in in slot 0x4
21,041,763 UART: [art] Derive Key Pair
21,042,765 UART: [art] Store priv key in slot 0x5
23,469,687 UART: [art] Derive Key Pair - Done
23,482,578 UART: [art] Signing Cert with AUTHO
23,483,879 UART: RITY.KEYID = 7
25,189,440 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,952 UART: [art] PUB.X = 58B337CC972C17C1956A398F57E94AAE7B6E7CBCE1EFA3A72DC2CC42E792568E2487D7875340389F8C5838537ED874FA
25,198,182 UART: [art] PUB.Y = F500DBF281936616E21AFD92F7C7999ED94373B6FA6D50D8DE742B15C9AA666D5B38BE7819AC934810BDFB75D65331D2
25,205,410 UART: [art] SIG.R = 51F1EA02460D0E1BAFE8BA6C84D34E0C1DBD19472E6E58C48D13FB50232D235D7F2AE3FB3EB6C04C1EC64C27C557272C
25,212,840 UART: [art] SIG.S = F3DBC36AF9B8B7DB452E1590B68A7EA47319107037613EAE02534BE51600E3E8484ECACE7855BA791DCB380A5A0D481C
26,191,403 UART: Caliptra RT
26,192,124 UART: [state] CFI Enabled
26,309,190 UART: [rt] RT listening for mailbox commands...
30,344,226 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,500,167 UART: [rt]cmd =0x41544d4e, len=14344
34,431,359 >>> mbox cmd response data (8 bytes)
34,431,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,462,721 UART: [rt]cmd =0x41545348, len=116
34,464,975 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,407 UART: [kat] SHA2-256
882,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,453 UART: [kat] ++
886,605 UART: [kat] sha1
890,987 UART: [kat] SHA2-256
892,925 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
903,254 UART: [kat] HMAC-384Kdf
907,818 UART: [kat] LMS
1,476,014 UART: [kat] --
1,476,843 UART: [cold-reset] ++
1,477,381 UART: [fht] Storing FHT @ 0x50003400
1,480,052 UART: [idev] ++
1,480,220 UART: [idev] CDI.KEYID = 6
1,480,580 UART: [idev] SUBJECT.KEYID = 7
1,481,004 UART: [idev] UDS.KEYID = 0
1,481,349 ready_for_fw is high
1,481,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,164 UART: [idev] Erasing UDS.KEYID = 0
1,505,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,410 UART: [idev] --
1,515,477 UART: [ldev] ++
1,515,645 UART: [ldev] CDI.KEYID = 6
1,516,008 UART: [ldev] SUBJECT.KEYID = 5
1,516,434 UART: [ldev] AUTHORITY.KEYID = 7
1,516,897 UART: [ldev] FE.KEYID = 1
1,522,201 UART: [ldev] Erasing FE.KEYID = 1
1,547,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,916 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,190 UART: [fwproc] Received command 0x46574c44
1,587,981 UART: [fwproc] Received Image of size 114448 bytes
2,887,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,518 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,921 >>> mbox cmd response: success
3,080,943 UART: [afmc] ++
3,081,111 UART: [afmc] CDI.KEYID = 6
3,081,473 UART: [afmc] SUBJECT.KEYID = 7
3,081,898 UART: [afmc] AUTHORITY.KEYID = 5
3,117,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,298 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,988 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,033 UART: [afmc] --
3,161,019 UART: [cold-reset] --
3,162,091 UART: [state] Locking Datavault
3,163,448 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,052 UART: [state] Locking ICCM
3,164,694 UART: [exit] Launching FMC @ 0x40000130
3,170,023 UART:
3,170,039 UART: Running Caliptra FMC ...
3,170,447 UART:
3,170,501 UART: [state] CFI Enabled
3,181,010 UART: [fht] FMC Alias Private Key: 7
3,289,341 UART: [art] Extend RT PCRs Done
3,289,769 UART: [art] Lock RT PCRs Done
3,291,225 UART: [art] Populate DV Done
3,299,462 UART: [fht] FMC Alias Private Key: 7
3,300,456 UART: [art] Derive CDI
3,300,736 UART: [art] Store in in slot 0x4
3,386,189 UART: [art] Derive Key Pair
3,386,549 UART: [art] Store priv key in slot 0x5
3,400,057 UART: [art] Derive Key Pair - Done
3,414,740 UART: [art] Signing Cert with AUTHO
3,415,220 UART: RITY.KEYID = 7
3,430,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,289 UART: [art] PUB.X = 74838DC3CEA578C5BB8D2D128C001DB295E5FB3F568D1C06220A76FD1B2556CE306097775AD9B3120D7ACD2799E12EE0
3,438,036 UART: [art] PUB.Y = 104DE67363D688F125E39240088346168AF665F82879D22686BFE1F6C27265B183ED009BE284A49E95B495B0D76A3821
3,444,949 UART: [art] SIG.R = 0870775971B1D319AF0797339431D098422C1810697D7D5A7423E7862CE60B4C362372801BAE42AAF41B8F1CD54DFA77
3,451,702 UART: [art] SIG.S = C1C50B316F30820CB8F2549BC40EAF301F0A91F9DFE27D674D83F45BB57481BA2B036D51B4B48C328F7681FF2CD60572
3,475,535 UART: Caliptra RT
3,475,788 UART: [state] CFI Enabled
3,584,529 UART: [rt] RT listening for mailbox commands...
3,585,199 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,417 UART: [rt]cmd =0x41544d4e, len=14344
3,853,086 >>> mbox cmd response data (8 bytes)
3,853,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,234 UART: [rt]cmd =0x41545348, len=116
3,884,797 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,337 ready_for_fw is high
1,362,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,443 >>> mbox cmd response: success
2,992,373 UART:
2,992,389 UART: Running Caliptra FMC ...
2,992,797 UART:
2,992,851 UART: [state] CFI Enabled
3,003,476 UART: [fht] FMC Alias Private Key: 7
3,110,633 UART: [art] Extend RT PCRs Done
3,111,061 UART: [art] Lock RT PCRs Done
3,112,777 UART: [art] Populate DV Done
3,121,190 UART: [fht] FMC Alias Private Key: 7
3,122,352 UART: [art] Derive CDI
3,122,632 UART: [art] Store in in slot 0x4
3,208,549 UART: [art] Derive Key Pair
3,208,909 UART: [art] Store priv key in slot 0x5
3,222,413 UART: [art] Derive Key Pair - Done
3,236,851 UART: [art] Signing Cert with AUTHO
3,237,331 UART: RITY.KEYID = 7
3,252,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,790 UART: [art] PUB.X = 0FE0A1956C1EDEC968BC72461E6AFFD32BF5382F534FACA8E19E6FB1F12B8B64ED0FC129974425344C0FB71A74B0CD45
3,259,569 UART: [art] PUB.Y = 9A1B4DFE7B7849BFD75CAE0D433AA628A3863DEB6A26E2EA7305386EBD408ED6858B5CF7B6F0DC327D8E7693AABEDCB6
3,266,539 UART: [art] SIG.R = 5A5FD559C239FDB60D67B3DD26B3CDEE969299BAFD4A9284D446976D729DB42B5D4C6EF17A497B65F0D73D22404B0BD2
3,273,317 UART: [art] SIG.S = 98F5D1C6EE9290E40021DD9D282231DE8DB7B708A2EDEF3C9ED8690739F00533AF3C24EA5614799490C6C6B0416C4A84
3,297,071 UART: Caliptra RT
3,297,324 UART: [state] CFI Enabled
3,406,113 UART: [rt] RT listening for mailbox commands...
3,406,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,807 UART: [rt]cmd =0x41544d4e, len=14344
3,674,426 >>> mbox cmd response data (8 bytes)
3,674,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,444 UART: [rt]cmd =0x41545348, len=116
3,706,295 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,230 UART: [cold-reset] ++
1,476,572 UART: [fht] Storing FHT @ 0x50003400
1,479,377 UART: [idev] ++
1,479,545 UART: [idev] CDI.KEYID = 6
1,479,905 UART: [idev] SUBJECT.KEYID = 7
1,480,329 UART: [idev] UDS.KEYID = 0
1,480,674 ready_for_fw is high
1,480,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,517 UART: [idev] Erasing UDS.KEYID = 0
1,505,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,375 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,116 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,539 UART: [ldev] --
1,587,010 UART: [fwproc] Waiting for Commands...
1,587,639 UART: [fwproc] Received command 0x46574c44
1,588,430 UART: [fwproc] Received Image of size 114448 bytes
2,887,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,312 >>> mbox cmd response: success
3,081,470 UART: [afmc] ++
3,081,638 UART: [afmc] CDI.KEYID = 6
3,082,000 UART: [afmc] SUBJECT.KEYID = 7
3,082,425 UART: [afmc] AUTHORITY.KEYID = 5
3,118,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,679 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,369 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,270 UART: [afmc] --
3,161,326 UART: [cold-reset] --
3,162,338 UART: [state] Locking Datavault
3,163,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,023 UART: [state] Locking ICCM
3,164,509 UART: [exit] Launching FMC @ 0x40000130
3,169,838 UART:
3,169,854 UART: Running Caliptra FMC ...
3,170,262 UART:
3,170,405 UART: [state] CFI Enabled
3,180,770 UART: [fht] FMC Alias Private Key: 7
3,288,789 UART: [art] Extend RT PCRs Done
3,289,217 UART: [art] Lock RT PCRs Done
3,291,001 UART: [art] Populate DV Done
3,299,290 UART: [fht] FMC Alias Private Key: 7
3,300,388 UART: [art] Derive CDI
3,300,668 UART: [art] Store in in slot 0x4
3,386,421 UART: [art] Derive Key Pair
3,386,781 UART: [art] Store priv key in slot 0x5
3,399,981 UART: [art] Derive Key Pair - Done
3,414,585 UART: [art] Signing Cert with AUTHO
3,415,065 UART: RITY.KEYID = 7
3,430,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,156 UART: [art] PUB.X = C0184172341CECEC0D4DCDDA12D773F31BCDA9F7A9F6CAF7AFAC3934835641A34C754B5B156C1745F9E62AD43B611161
3,437,937 UART: [art] PUB.Y = 502D82D48DE41C27930D8EBD519F46AED185710646A509110E527AA12F8DD86A914D900413EDB3DB441A2B2B115D7D3A
3,444,876 UART: [art] SIG.R = A9ECEC92743D12156063BAF491594DEAA5F1432FC260F2C165DA178687EC766901B1E7651334770B2683B0D0C149250F
3,451,633 UART: [art] SIG.S = 042AD5BBBA29CC30C2D439D1983B888194D75128B471881229F69E609A5E1D7B19C7FA8B9899BB6EA7E12905A2BA2A1A
3,475,452 UART: Caliptra RT
3,475,797 UART: [state] CFI Enabled
3,583,910 UART: [rt] RT listening for mailbox commands...
3,584,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,520 UART: [rt]cmd =0x41544d4e, len=14344
3,852,381 >>> mbox cmd response data (8 bytes)
3,852,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,581 UART: [rt]cmd =0x41545348, len=116
3,884,394 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 ready_for_fw is high
1,363,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,432 >>> mbox cmd response: success
2,991,136 UART:
2,991,152 UART: Running Caliptra FMC ...
2,991,560 UART:
2,991,703 UART: [state] CFI Enabled
3,002,032 UART: [fht] FMC Alias Private Key: 7
3,110,607 UART: [art] Extend RT PCRs Done
3,111,035 UART: [art] Lock RT PCRs Done
3,112,559 UART: [art] Populate DV Done
3,120,940 UART: [fht] FMC Alias Private Key: 7
3,121,964 UART: [art] Derive CDI
3,122,244 UART: [art] Store in in slot 0x4
3,208,061 UART: [art] Derive Key Pair
3,208,421 UART: [art] Store priv key in slot 0x5
3,221,843 UART: [art] Derive Key Pair - Done
3,236,446 UART: [art] Signing Cert with AUTHO
3,236,926 UART: RITY.KEYID = 7
3,252,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,011 UART: [art] PUB.X = 5FACB8D68E692DE3831313EA26481FB75C36D37BA1993FE6BD7F64C29C150BE17B4BC636E5A6A8A106F5020660932F3E
3,259,777 UART: [art] PUB.Y = 9C2B031FC06497C4B42E78B8B6544B780EF99D33DB3667D30B83EC37AE36B8842D5EE0FF9410717336D36697F879AD45
3,266,718 UART: [art] SIG.R = DD04B379BE17B715626EFF2BCE722A019E8BF68585B2F81317AFCEE5520BDA587D0C2C6867E70FD17476FF728241D361
3,273,481 UART: [art] SIG.S = B29940C4D6DDBDBDAF35F840E21F63FF9816B2FA2193A964173A835D78A951C2D4E2E0F8257E88C9DBFC06F54B1C71AB
3,296,943 UART: Caliptra RT
3,297,288 UART: [state] CFI Enabled
3,405,184 UART: [rt] RT listening for mailbox commands...
3,405,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,766 UART: [rt]cmd =0x41544d4e, len=14344
3,673,229 >>> mbox cmd response data (8 bytes)
3,673,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,185 UART: [rt]cmd =0x41545348, len=116
3,705,030 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,230 UART: [kat] SHA2-512-ACC
908,131 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,622 UART: [kat] LMS
1,170,950 UART: [kat] --
1,171,673 UART: [cold-reset] ++
1,172,207 UART: [fht] FHT @ 0x50003400
1,174,942 UART: [idev] ++
1,175,110 UART: [idev] CDI.KEYID = 6
1,175,470 UART: [idev] SUBJECT.KEYID = 7
1,175,894 UART: [idev] UDS.KEYID = 0
1,176,239 ready_for_fw is high
1,176,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,201,035 UART: [idev] Sha1 KeyId Algorithm
1,209,279 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,460 UART: [ldev] AUTHORITY.KEYID = 7
1,211,923 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,442 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,788 >>> mbox cmd response: success
2,775,918 UART: [afmc] ++
2,776,086 UART: [afmc] CDI.KEYID = 6
2,776,448 UART: [afmc] SUBJECT.KEYID = 7
2,776,873 UART: [afmc] AUTHORITY.KEYID = 5
2,812,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,467 UART: [afmc] --
2,855,577 UART: [cold-reset] --
2,856,443 UART: [state] Locking Datavault
2,857,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,990 UART: [state] Locking ICCM
2,858,658 UART: [exit] Launching FMC @ 0x40000130
2,863,987 UART:
2,864,003 UART: Running Caliptra FMC ...
2,864,411 UART:
2,864,465 UART: [state] CFI Enabled
2,874,778 UART: [fht] FMC Alias Private Key: 7
2,982,507 UART: [art] Extend RT PCRs Done
2,982,935 UART: [art] Lock RT PCRs Done
2,984,521 UART: [art] Populate DV Done
2,992,676 UART: [fht] FMC Alias Private Key: 7
2,993,774 UART: [art] Derive CDI
2,994,054 UART: [art] Store in in slot 0x4
3,079,913 UART: [art] Derive Key Pair
3,080,273 UART: [art] Store priv key in slot 0x5
3,093,417 UART: [art] Derive Key Pair - Done
3,108,075 UART: [art] Signing Cert with AUTHO
3,108,555 UART: RITY.KEYID = 7
3,123,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,702 UART: [art] PUB.X = 4B015C953DDF76453EB43585FBA2C8A2371DC3418ABFB159447007C78DC651CB43BC38D24AC50F87C92301165C2F67BD
3,131,466 UART: [art] PUB.Y = FDE2DAC56504819D02B1ED920AB63DB41E036969AA2801E7EFD9353C8B78D2F4DA1881E61C029CCD7218F5F0A261BF42
3,138,410 UART: [art] SIG.R = C8AF31AC1AF0F682824782E264E1136D2995EB29B39ACF1078A1196A71A71163128672CA28B9EF493445A84354E272FD
3,145,176 UART: [art] SIG.S = 21A278340DAA10CD90F4E6237B17BD3ED47881CAE0A227028CA934F5FC51739FCE47EBBC949BD213E9BCDC4FCF1096FA
3,169,045 UART: Caliptra RT
3,169,298 UART: [state] CFI Enabled
3,277,149 UART: [rt] RT listening for mailbox commands...
3,277,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,629 UART: [rt]cmd =0x41544d4e, len=14344
3,545,608 >>> mbox cmd response data (8 bytes)
3,545,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,384 UART: [rt]cmd =0x41545348, len=116
3,577,025 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,223 ready_for_fw is high
1,060,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,365 >>> mbox cmd response: success
2,691,447 UART:
2,691,463 UART: Running Caliptra FMC ...
2,691,871 UART:
2,691,925 UART: [state] CFI Enabled
2,702,360 UART: [fht] FMC Alias Private Key: 7
2,810,527 UART: [art] Extend RT PCRs Done
2,810,955 UART: [art] Lock RT PCRs Done
2,812,797 UART: [art] Populate DV Done
2,821,024 UART: [fht] FMC Alias Private Key: 7
2,822,162 UART: [art] Derive CDI
2,822,442 UART: [art] Store in in slot 0x4
2,908,003 UART: [art] Derive Key Pair
2,908,363 UART: [art] Store priv key in slot 0x5
2,921,563 UART: [art] Derive Key Pair - Done
2,936,480 UART: [art] Signing Cert with AUTHO
2,936,960 UART: RITY.KEYID = 7
2,952,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,041 UART: [art] PUB.X = BCEB5E4AAE61E30C26A63E2054CDE4381270E475E880BB1661C9000E9873D687C969E1FA80BA6EBA98AF9CCA46A98849
2,959,795 UART: [art] PUB.Y = 37D77010BCAF838DB622C18D9C6959B79D4F881AB8343144F80C67A864FF96E6B9C2E228432FBF9AEC5473B1E4A4A781
2,966,748 UART: [art] SIG.R = 89FB232F6EF37A0FE3E7C815913A2106B6074C376E573FA8040F176C500295718F423DFC328207B926A17F4F415FC828
2,973,491 UART: [art] SIG.S = DF21DCDF749319DE73A3DC9A9319071CDA8790DC9CA71C0135925CF562B56548D2945E8A65F0B4F8676D6897B84440E0
2,997,624 UART: Caliptra RT
2,997,877 UART: [state] CFI Enabled
3,105,707 UART: [rt] RT listening for mailbox commands...
3,106,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,199 UART: [rt]cmd =0x41544d4e, len=14344
3,373,544 >>> mbox cmd response data (8 bytes)
3,373,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,578 UART: [rt]cmd =0x41545348, len=116
3,405,301 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
893,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,376 UART: [kat] ++
897,528 UART: [kat] sha1
901,662 UART: [kat] SHA2-256
903,602 UART: [kat] SHA2-384
906,467 UART: [kat] SHA2-512-ACC
908,368 UART: [kat] ECC-384
918,155 UART: [kat] HMAC-384Kdf
922,733 UART: [kat] LMS
1,171,061 UART: [kat] --
1,171,822 UART: [cold-reset] ++
1,172,184 UART: [fht] FHT @ 0x50003400
1,174,889 UART: [idev] ++
1,175,057 UART: [idev] CDI.KEYID = 6
1,175,417 UART: [idev] SUBJECT.KEYID = 7
1,175,841 UART: [idev] UDS.KEYID = 0
1,176,186 ready_for_fw is high
1,176,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,237 UART: [idev] Erasing UDS.KEYID = 0
1,201,064 UART: [idev] Sha1 KeyId Algorithm
1,209,522 UART: [idev] --
1,210,606 UART: [ldev] ++
1,210,774 UART: [ldev] CDI.KEYID = 6
1,211,137 UART: [ldev] SUBJECT.KEYID = 5
1,211,563 UART: [ldev] AUTHORITY.KEYID = 7
1,212,026 UART: [ldev] FE.KEYID = 1
1,217,230 UART: [ldev] Erasing FE.KEYID = 1
1,244,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,792 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,917 UART: [fwproc] Recv command 0x46574c44
1,284,645 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,669 >>> mbox cmd response: success
2,776,921 UART: [afmc] ++
2,777,089 UART: [afmc] CDI.KEYID = 6
2,777,451 UART: [afmc] SUBJECT.KEYID = 7
2,777,876 UART: [afmc] AUTHORITY.KEYID = 5
2,813,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,740 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,010 UART: [afmc] --
2,856,974 UART: [cold-reset] --
2,857,838 UART: [state] Locking Datavault
2,859,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,755 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,876,846 UART: [fht] FMC Alias Private Key: 7
2,985,181 UART: [art] Extend RT PCRs Done
2,985,609 UART: [art] Lock RT PCRs Done
2,987,021 UART: [art] Populate DV Done
2,995,510 UART: [fht] FMC Alias Private Key: 7
2,996,592 UART: [art] Derive CDI
2,996,872 UART: [art] Store in in slot 0x4
3,082,831 UART: [art] Derive Key Pair
3,083,191 UART: [art] Store priv key in slot 0x5
3,096,625 UART: [art] Derive Key Pair - Done
3,111,373 UART: [art] Signing Cert with AUTHO
3,111,853 UART: RITY.KEYID = 7
3,127,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,170 UART: [art] PUB.X = 20CCC3DB1F03C44FF28855298CA278EDFA79C7109C4E5A50BB2746E55F607C22FAF58D875BFE238ABC378908F01E445A
3,134,946 UART: [art] PUB.Y = 02D0CF72B8B9ABEC193E29879F4EA498AEA0A951AF94C7BC31930FC8867F11700BCD621E16DA47D372D286EE24FD262E
3,141,901 UART: [art] SIG.R = 7345CDC9CCFB8F88B5D11862951D16B5A339274518104C0C750D888DA53AECE1DDE2966A76D16FA6BC15CA56A3190A47
3,148,670 UART: [art] SIG.S = 63A26855C66859ED1E0A8EB42985391D34FD72B396FA0CCE971704FC1CCA84D4FA3FF0F62CAF82F84CBFE04AD2FB33D2
3,172,950 UART: Caliptra RT
3,173,295 UART: [state] CFI Enabled
3,280,830 UART: [rt] RT listening for mailbox commands...
3,281,500 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,382 UART: [rt]cmd =0x41544d4e, len=14344
3,548,471 >>> mbox cmd response data (8 bytes)
3,548,472 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,617 UART: [rt]cmd =0x41545348, len=116
3,580,212 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 ready_for_fw is high
1,060,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,036 >>> mbox cmd response: success
2,688,384 UART:
2,688,400 UART: Running Caliptra FMC ...
2,688,808 UART:
2,688,951 UART: [state] CFI Enabled
2,699,448 UART: [fht] FMC Alias Private Key: 7
2,807,571 UART: [art] Extend RT PCRs Done
2,807,999 UART: [art] Lock RT PCRs Done
2,809,511 UART: [art] Populate DV Done
2,817,836 UART: [fht] FMC Alias Private Key: 7
2,818,878 UART: [art] Derive CDI
2,819,158 UART: [art] Store in in slot 0x4
2,904,831 UART: [art] Derive Key Pair
2,905,191 UART: [art] Store priv key in slot 0x5
2,918,037 UART: [art] Derive Key Pair - Done
2,932,746 UART: [art] Signing Cert with AUTHO
2,933,226 UART: RITY.KEYID = 7
2,948,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,283 UART: [art] PUB.X = F89A06C5ED1E43E4362BF2DE73D4848648293C3710912B5B25342687F37817FC1E61A4C1620F638C95070FA4006DECCC
2,956,017 UART: [art] PUB.Y = C04AEEB1A0CEE5F65C84A841EEE3D96C59F445E7F63CE841C6DFA5BD23713EC324D3EC91EFE037838D562A968DB96544
2,962,985 UART: [art] SIG.R = 2280B980A707199153EB94C4CB0E6C1F9B4E7C70F4942B31B2771594C3A986B6C9F318E67A53E9715D55AE7E77FC0907
2,969,741 UART: [art] SIG.S = 17ABCAE587378B736539DF4AF46834565240B8403166FF6FFACF10D091366D4639A25556F7CC644EFF055F7F7E18EBA0
2,993,309 UART: Caliptra RT
2,993,654 UART: [state] CFI Enabled
3,101,351 UART: [rt] RT listening for mailbox commands...
3,102,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,011 UART: [rt]cmd =0x41544d4e, len=14344
3,369,960 >>> mbox cmd response data (8 bytes)
3,369,961 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,968 UART: [rt]cmd =0x41545348, len=116
3,401,801 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,929 UART: [kat] ++
895,081 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,060 UART: [kat] SHA2-512-ACC
905,961 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,782 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,765 UART: [fwproc] Recv command 0x46574c44
1,282,498 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,880 >>> mbox cmd response: success
2,775,055 UART: [afmc] ++
2,775,223 UART: [afmc] CDI.KEYID = 6
2,775,586 UART: [afmc] SUBJECT.KEYID = 7
2,776,012 UART: [afmc] AUTHORITY.KEYID = 5
2,810,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,904 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,633 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,516 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,235 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,006 UART: [afmc] --
2,854,016 UART: [cold-reset] --
2,854,916 UART: [state] Locking Datavault
2,856,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,609 UART: [state] Locking ICCM
2,857,199 UART: [exit] Launching FMC @ 0x40000130
2,862,528 UART:
2,862,544 UART: Running Caliptra FMC ...
2,862,952 UART:
2,863,006 UART: [state] CFI Enabled
2,873,759 UART: [fht] FMC Alias Private Key: 7
2,980,790 UART: [art] Extend RT PCRs Done
2,981,218 UART: [art] Lock RT PCRs Done
2,982,876 UART: [art] Populate DV Done
2,991,331 UART: [fht] FMC Alias Private Key: 7
2,992,413 UART: [art] Derive CDI
2,992,693 UART: [art] Store in in slot 0x4
3,078,114 UART: [art] Derive Key Pair
3,078,474 UART: [art] Store priv key in slot 0x5
3,092,248 UART: [art] Derive Key Pair - Done
3,106,769 UART: [art] Signing Cert with AUTHO
3,107,249 UART: RITY.KEYID = 7
3,123,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,884 UART: [art] PUB.X = E8A9ECDCA6ADEEEACE587ACDE83D92C21D3F89F7177693F8D14AF29509FCB03FF0182C03773DF664074F71391A472256
3,130,659 UART: [art] PUB.Y = 720E13FD8987F219D4D645D376A23759308F5416CE72DDBE2086273A17818A4CF5E9795B8FE06774671C304755395640
3,137,592 UART: [art] SIG.R = 377B6C0FB4BC63C08C45002D2F0FE14D2AE2932EE9F2E6F93A9A4DEC81EC9FCF3FA963F8CE0518D300D88EBDE229C4AB
3,144,335 UART: [art] SIG.S = A78E23014930D9E0AA280347AEC5E3ED7A372DB4412933AB0FF5CD10CCCC87AE68252DDC30463C05DCBC5312CC596571
3,168,118 UART: Caliptra RT
3,168,371 UART: [state] CFI Enabled
3,276,542 UART: [rt] RT listening for mailbox commands...
3,277,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,332 UART: [rt]cmd =0x41544d4e, len=14344
3,545,085 >>> mbox cmd response data (8 bytes)
3,545,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,357 UART: [rt]cmd =0x41545348, len=116
3,577,196 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 ready_for_fw is high
1,055,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,168 >>> mbox cmd response: success
2,685,452 UART:
2,685,468 UART: Running Caliptra FMC ...
2,685,876 UART:
2,685,930 UART: [state] CFI Enabled
2,696,571 UART: [fht] FMC Alias Private Key: 7
2,804,564 UART: [art] Extend RT PCRs Done
2,804,992 UART: [art] Lock RT PCRs Done
2,806,736 UART: [art] Populate DV Done
2,814,727 UART: [fht] FMC Alias Private Key: 7
2,815,851 UART: [art] Derive CDI
2,816,131 UART: [art] Store in in slot 0x4
2,901,848 UART: [art] Derive Key Pair
2,902,208 UART: [art] Store priv key in slot 0x5
2,915,634 UART: [art] Derive Key Pair - Done
2,930,064 UART: [art] Signing Cert with AUTHO
2,930,544 UART: RITY.KEYID = 7
2,945,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,309 UART: [art] PUB.X = A6485A7DAC371CCDDE5031B69AEE85EFBC25321F285E35267BEAF95C2577B7BF049EBADDCB00E03C8CD92438379BA49E
2,953,076 UART: [art] PUB.Y = A98193A573B4D818EC3AF2C06AE4D0535E492D720B0AAF468E1A62B5E5D10992851E1D0EBBA2CCABB9CD0FC801A6F3DD
2,960,030 UART: [art] SIG.R = C1B6C2105C49D45A5DAE50BE218B7CB8F65F20B99D6B1035D8E984ED9D5A6E7ABEED182AD61CC4866F446BD5F9510458
2,966,813 UART: [art] SIG.S = EAC297D71F3DD1781E12C90A58EDB16F57F191A3D6DEC929F32E55495F35507AA221CA14E43B0CA40C453F3FFE6FF362
2,990,343 UART: Caliptra RT
2,990,596 UART: [state] CFI Enabled
3,098,440 UART: [rt] RT listening for mailbox commands...
3,099,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,004 UART: [rt]cmd =0x41544d4e, len=14344
3,366,491 >>> mbox cmd response data (8 bytes)
3,366,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,541 UART: [rt]cmd =0x41545348, len=116
3,398,472 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 ready_for_fw is high
1,174,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,207,802 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,787 UART: [ldev] --
1,281,171 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,737 >>> mbox cmd response: success
2,774,800 UART: [afmc] ++
2,774,968 UART: [afmc] CDI.KEYID = 6
2,775,331 UART: [afmc] SUBJECT.KEYID = 7
2,775,757 UART: [afmc] AUTHORITY.KEYID = 5
2,811,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,809 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,991 UART: [afmc] --
2,855,101 UART: [cold-reset] --
2,855,903 UART: [state] Locking Datavault
2,857,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,648 UART: [state] Locking ICCM
2,858,088 UART: [exit] Launching FMC @ 0x40000130
2,863,417 UART:
2,863,433 UART: Running Caliptra FMC ...
2,863,841 UART:
2,863,984 UART: [state] CFI Enabled
2,874,957 UART: [fht] FMC Alias Private Key: 7
2,983,054 UART: [art] Extend RT PCRs Done
2,983,482 UART: [art] Lock RT PCRs Done
2,985,062 UART: [art] Populate DV Done
2,993,155 UART: [fht] FMC Alias Private Key: 7
2,994,157 UART: [art] Derive CDI
2,994,437 UART: [art] Store in in slot 0x4
3,079,752 UART: [art] Derive Key Pair
3,080,112 UART: [art] Store priv key in slot 0x5
3,093,258 UART: [art] Derive Key Pair - Done
3,107,987 UART: [art] Signing Cert with AUTHO
3,108,467 UART: RITY.KEYID = 7
3,123,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,048 UART: [art] PUB.X = C1FD5D3D0BAC4E21ADF045E8C950D3B39AF1A9F97A4FC9371D47A65A30E60DA1F66589017CD1675F096B7256CBE70469
3,130,815 UART: [art] PUB.Y = 84A17284B6F13384E5BF082EA37093F9DAE1148CF8D1879375A61880CB3465E8B0B60AF23B2EE566712F4875711D0CD6
3,137,754 UART: [art] SIG.R = 731592372B58167B5C220A1150FF3C80712B9958826BEBDC0E2D302C4FD5E3C36AFE9BB71D3515526F08B5768FCB046D
3,144,514 UART: [art] SIG.S = D416448DF1B4DA8AD3C0A090BC32F1D83E6553A3B379921E23C276BD449EB71A48393DC2889F72805439974F39732151
3,168,523 UART: Caliptra RT
3,168,868 UART: [state] CFI Enabled
3,276,997 UART: [rt] RT listening for mailbox commands...
3,277,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,785 UART: [rt]cmd =0x41544d4e, len=14344
3,545,308 >>> mbox cmd response data (8 bytes)
3,545,309 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,466 UART: [rt]cmd =0x41545348, len=116
3,577,103 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,601 ready_for_fw is high
1,056,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,429 >>> mbox cmd response: success
2,688,927 UART:
2,688,943 UART: Running Caliptra FMC ...
2,689,351 UART:
2,689,494 UART: [state] CFI Enabled
2,699,949 UART: [fht] FMC Alias Private Key: 7
2,807,914 UART: [art] Extend RT PCRs Done
2,808,342 UART: [art] Lock RT PCRs Done
2,810,084 UART: [art] Populate DV Done
2,818,305 UART: [fht] FMC Alias Private Key: 7
2,819,349 UART: [art] Derive CDI
2,819,629 UART: [art] Store in in slot 0x4
2,905,398 UART: [art] Derive Key Pair
2,905,758 UART: [art] Store priv key in slot 0x5
2,919,760 UART: [art] Derive Key Pair - Done
2,934,549 UART: [art] Signing Cert with AUTHO
2,935,029 UART: RITY.KEYID = 7
2,949,573 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,338 UART: [art] PUB.X = 4DBFFCB1E6160BA8FA3AE0F063A1B580A12E1124BF64259B12B246353C80865E02098824C4A0FF42EF7A8E34509E796F
2,957,105 UART: [art] PUB.Y = 2A9583BE58961E97BBA861A56A6A2973F8C607438FC78086107D5CA337A8CC0FA0069427B3AE7D7918443091FF81C1C8
2,964,044 UART: [art] SIG.R = 84A4D21C3BBEA4BE0A7FE83057EDAC2D7141A2B7482FED15C426765AEA29AC8C58654E4864EB22AC099CF8D5D7EF2F04
2,970,825 UART: [art] SIG.S = F75794B7974FB0ECB36640F4E31F1B204F6F16A815C7B68DA42E10E837607F92AAC90B32DA3F34FD4C44AA344295DB17
2,995,305 UART: Caliptra RT
2,995,650 UART: [state] CFI Enabled
3,103,910 UART: [rt] RT listening for mailbox commands...
3,104,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,774 UART: [rt]cmd =0x41544d4e, len=14344
3,372,623 >>> mbox cmd response data (8 bytes)
3,372,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,695 UART: [rt]cmd =0x41545348, len=116
3,404,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,995 UART:
192,360 UART: Running Caliptra ROM ...
193,473 UART:
193,619 UART: [state] CFI Enabled
267,676 UART: [state] LifecycleState = Unprovisioned
269,590 UART: [state] DebugLocked = No
271,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,753 UART: [kat] SHA2-256
446,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,963 UART: [kat] ++
457,419 UART: [kat] sha1
468,580 UART: [kat] SHA2-256
471,303 UART: [kat] SHA2-384
476,370 UART: [kat] SHA2-512-ACC
478,745 UART: [kat] ECC-384
2,769,807 UART: [kat] HMAC-384Kdf
2,800,713 UART: [kat] LMS
3,991,035 UART: [kat] --
3,996,353 UART: [cold-reset] ++
3,998,287 UART: [fht] Storing FHT @ 0x50003400
4,009,132 UART: [idev] ++
4,009,705 UART: [idev] CDI.KEYID = 6
4,010,743 UART: [idev] SUBJECT.KEYID = 7
4,011,921 UART: [idev] UDS.KEYID = 0
4,012,992 ready_for_fw is high
4,013,206 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,846 UART: [idev] Erasing UDS.KEYID = 0
7,349,988 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,202 UART: [idev] --
7,375,466 UART: [ldev] ++
7,376,038 UART: [ldev] CDI.KEYID = 6
7,376,980 UART: [ldev] SUBJECT.KEYID = 5
7,378,236 UART: [ldev] AUTHORITY.KEYID = 7
7,379,469 UART: [ldev] FE.KEYID = 1
7,423,569 UART: [ldev] Erasing FE.KEYID = 1
10,757,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,403 UART: [ldev] --
13,118,447 UART: [fwproc] Waiting for Commands...
13,121,834 UART: [fwproc] Received command 0x46574c44
13,124,019 UART: [fwproc] Received Image of size 114124 bytes
17,182,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,643,064 >>> mbox cmd response: success
17,646,412 UART: [afmc] ++
17,647,012 UART: [afmc] CDI.KEYID = 6
17,647,953 UART: [afmc] SUBJECT.KEYID = 7
17,649,171 UART: [afmc] AUTHORITY.KEYID = 5
21,012,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,937 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,352 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,172 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,649 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,808 UART: [afmc] --
23,381,971 UART: [cold-reset] --
23,385,025 UART: [state] Locking Datavault
23,391,138 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,893 UART: [state] Locking ICCM
23,395,263 UART: [exit] Launching FMC @ 0x40000130
23,403,669 UART:
23,403,942 UART: Running Caliptra FMC ...
23,405,069 UART:
23,405,242 UART: [state] CFI Enabled
23,470,633 UART: [fht] FMC Alias Private Key: 7
25,809,224 UART: [art] Extend RT PCRs Done
25,810,445 UART: [art] Lock RT PCRs Done
25,812,205 UART: [art] Populate DV Done
25,817,725 UART: [fht] FMC Alias Private Key: 7
25,819,425 UART: [art] Derive CDI
25,820,238 UART: [art] Store in in slot 0x4
25,879,116 UART: [art] Derive Key Pair
25,880,320 UART: [art] Store priv key in slot 0x5
29,173,478 UART: [art] Derive Key Pair - Done
29,186,197 UART: [art] Signing Cert with AUTHO
29,187,502 UART: RITY.KEYID = 7
31,474,307 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,817 UART: [art] PUB.X = CE123B707F8E12CFF183930B201A2966802A0A63FFE32379DD126F7F0D7545BC933065424C7FE69BAF95B052487B62DD
31,483,061 UART: [art] PUB.Y = 95AE0B0622D4EA9F0EA8AB015B10984842165353B532116B900347E9055089E1B22E70CA8F28D1E4E90B63E7DA7C03CC
31,490,258 UART: [art] SIG.R = 50175CD82480D542EBF719F42C6C8838B1C4E83D76E34B816DE66C80D0D6AFFBD2423ED3D9A953913C09175597C3CDA1
31,497,611 UART: [art] SIG.S = 72D3D2E63144BDF058D015666426DE394CEA698C16BA5249E826416CEEBE7AF23D751B1DCEE3C14F212B9B2B157D5336
32,803,195 UART: Caliptra RT
32,803,911 UART: [state] CFI Enabled
32,985,463 UART: [rt] RT listening for mailbox commands...
37,158,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,314,833 UART: [rt]cmd =0x41544d4e, len=14344
42,550,360 >>> mbox cmd response data (8 bytes)
42,550,937 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,581,943 UART: [rt]cmd =0x41545348, len=116
42,584,425 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,806,628 ready_for_fw is high
3,807,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,847,888 >>> mbox cmd response: success
23,544,159 UART:
23,544,576 UART: Running Caliptra FMC ...
23,545,705 UART:
23,545,869 UART: [state] CFI Enabled
23,595,984 UART: [fht] FMC Alias Private Key: 7
25,934,093 UART: [art] Extend RT PCRs Done
25,935,337 UART: [art] Lock RT PCRs Done
25,936,995 UART: [art] Populate DV Done
25,942,418 UART: [fht] FMC Alias Private Key: 7
25,943,963 UART: [art] Derive CDI
25,944,702 UART: [art] Store in in slot 0x4
26,004,726 UART: [art] Derive Key Pair
26,005,775 UART: [art] Store priv key in slot 0x5
29,297,474 UART: [art] Derive Key Pair - Done
29,310,267 UART: [art] Signing Cert with AUTHO
29,311,600 UART: RITY.KEYID = 7
31,599,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,600,529 UART: [art] PUB.X = 79EC9933CDE268EA32B12984667A6A7883EDEAA15AFD1C3F33AC928B45C18F211B2537DE617063DD281E058B101A20F4
31,607,793 UART: [art] PUB.Y = 2393FDEC25B9734CCDE69EA091AA5DD129A9538CAF438B24249E77903D9AFBEAE62078A8686FE489C60ECD4A9A4588BF
31,615,054 UART: [art] SIG.R = ED03190E369E822B462C505B2B46603B1AB05D61E61B020E684D13CB560DB7B9FC4C9F91A11E232A13FC8F00BF0D0CB8
31,622,402 UART: [art] SIG.S = 4DCFC7D67D4C4B0751FBD73FA547D0557DD80A597F06D3B558BDFACA0484126FEDA74D6489FC09EB6BA08080EA749BF2
32,927,525 UART: Caliptra RT
32,928,230 UART: [state] CFI Enabled
33,090,528 UART: [rt] RT listening for mailbox commands...
37,262,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,417,645 UART: [rt]cmd =0x41544d4e, len=14344
42,652,636 >>> mbox cmd response data (8 bytes)
42,653,224 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,684,073 UART: [rt]cmd =0x41545348, len=116
42,686,449 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,512 UART:
192,877 UART: Running Caliptra ROM ...
193,969 UART:
603,855 UART: [state] CFI Enabled
618,717 UART: [state] LifecycleState = Unprovisioned
620,592 UART: [state] DebugLocked = No
623,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,974 UART: [kat] SHA2-256
797,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,253 UART: [kat] ++
808,695 UART: [kat] sha1
820,911 UART: [kat] SHA2-256
823,630 UART: [kat] SHA2-384
829,828 UART: [kat] SHA2-512-ACC
832,191 UART: [kat] ECC-384
3,115,421 UART: [kat] HMAC-384Kdf
3,125,894 UART: [kat] LMS
4,315,974 UART: [kat] --
4,319,170 UART: [cold-reset] ++
4,321,032 UART: [fht] Storing FHT @ 0x50003400
4,333,078 UART: [idev] ++
4,333,722 UART: [idev] CDI.KEYID = 6
4,334,629 UART: [idev] SUBJECT.KEYID = 7
4,335,868 UART: [idev] UDS.KEYID = 0
4,336,912 ready_for_fw is high
4,337,122 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,496 UART: [idev] Erasing UDS.KEYID = 0
7,622,412 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,783 UART: [idev] --
7,648,668 UART: [ldev] ++
7,649,230 UART: [ldev] CDI.KEYID = 6
7,650,163 UART: [ldev] SUBJECT.KEYID = 5
7,651,441 UART: [ldev] AUTHORITY.KEYID = 7
7,652,670 UART: [ldev] FE.KEYID = 1
7,663,122 UART: [ldev] Erasing FE.KEYID = 1
10,950,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,108 UART: [ldev] --
13,310,449 UART: [fwproc] Waiting for Commands...
13,312,370 UART: [fwproc] Received command 0x46574c44
13,314,543 UART: [fwproc] Received Image of size 114124 bytes
17,366,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,088 >>> mbox cmd response: success
17,835,990 UART: [afmc] ++
17,836,655 UART: [afmc] CDI.KEYID = 6
17,837,558 UART: [afmc] SUBJECT.KEYID = 7
17,838,767 UART: [afmc] AUTHORITY.KEYID = 5
21,149,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,261 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,566 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,940 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,766 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,174 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,294 UART: [afmc] --
23,513,978 UART: [cold-reset] --
23,516,671 UART: [state] Locking Datavault
23,519,816 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,567 UART: [state] Locking ICCM
23,523,386 UART: [exit] Launching FMC @ 0x40000130
23,531,743 UART:
23,531,975 UART: Running Caliptra FMC ...
23,533,070 UART:
23,533,226 UART: [state] CFI Enabled
23,540,943 UART: [fht] FMC Alias Private Key: 7
25,871,824 UART: [art] Extend RT PCRs Done
25,873,042 UART: [art] Lock RT PCRs Done
25,874,667 UART: [art] Populate DV Done
25,880,235 UART: [fht] FMC Alias Private Key: 7
25,881,873 UART: [art] Derive CDI
25,882,680 UART: [art] Store in in slot 0x4
25,925,277 UART: [art] Derive Key Pair
25,926,335 UART: [art] Store priv key in slot 0x5
29,168,283 UART: [art] Derive Key Pair - Done
29,181,105 UART: [art] Signing Cert with AUTHO
29,182,408 UART: RITY.KEYID = 7
31,461,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,286 UART: [art] PUB.X = 4B844224EA90312BA19CB3FA99B33EF2729D69FA3E43ABE549C40E8BB41346639D029657063A837798227FC33B545A91
31,470,511 UART: [art] PUB.Y = 2E06864C446E22AB68D7B48342A73C238576C5A0B8ED4C62BFFABE62FDF54205E4C9960B26CA19DE7CF6A725717DEF64
31,477,776 UART: [art] SIG.R = CABA14AACA7080556D783AD9488AACDE2124829798D3C38CA80CD8F3099ADB507E8A4F6A6684E808E06FB7981B569204
31,485,163 UART: [art] SIG.S = 0F8DBC8007E83115DAE63BA8936F45FAABC05A5DF51D4C9C30DDFC5693236CEC5D24E85D8B3424EDAA0C535EF06218BC
32,791,082 UART: Caliptra RT
32,791,796 UART: [state] CFI Enabled
32,908,316 UART: [rt] RT listening for mailbox commands...
36,928,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,084,049 UART: [rt]cmd =0x41544d4e, len=14344
42,319,537 >>> mbox cmd response data (8 bytes)
42,320,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,350,638 UART: [rt]cmd =0x41545348, len=116
42,352,895 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,130,281 ready_for_fw is high
4,130,900 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,357 >>> mbox cmd response: success
23,710,212 UART:
23,710,633 UART: Running Caliptra FMC ...
23,711,738 UART:
23,711,894 UART: [state] CFI Enabled
23,719,810 UART: [fht] FMC Alias Private Key: 7
26,051,032 UART: [art] Extend RT PCRs Done
26,052,266 UART: [art] Lock RT PCRs Done
26,053,651 UART: [art] Populate DV Done
26,059,240 UART: [fht] FMC Alias Private Key: 7
26,060,731 UART: [art] Derive CDI
26,061,463 UART: [art] Store in in slot 0x4
26,103,995 UART: [art] Derive Key Pair
26,104,995 UART: [art] Store priv key in slot 0x5
29,346,850 UART: [art] Derive Key Pair - Done
29,360,028 UART: [art] Signing Cert with AUTHO
29,361,337 UART: RITY.KEYID = 7
31,641,308 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,815 UART: [art] PUB.X = A2F8004F55DB8FAE5007F5B57A4E9CBE0586DE3601F608AAF2144316819675A54CB80B2EB3D6C6ABF8EF56FCF9A68E35
31,650,080 UART: [art] PUB.Y = ECE879B3D0F539A129143B840DBC6F2F72F61552E6DF04821754EBEC3E55CC64C3A30C0DFC1CC18FC3B5796DCAB26551
31,657,364 UART: [art] SIG.R = 2CB7949D583852740B0E6C1170195C77C9ED8B4497F5A4AD82498421AA221D93B054B50DB7077272BC9954E1C939184F
31,664,690 UART: [art] SIG.S = F7AAE91F881FFB09396278C0C245595427CEE947239580CB63892705B45335552468036EB8003370BADB06F3322166DB
32,969,670 UART: Caliptra RT
32,970,384 UART: [state] CFI Enabled
33,088,710 UART: [rt] RT listening for mailbox commands...
37,106,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,262,612 UART: [rt]cmd =0x41544d4e, len=14344
42,498,046 >>> mbox cmd response data (8 bytes)
42,498,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,529,172 UART: [rt]cmd =0x41545348, len=116
42,531,412 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,052 UART:
192,417 UART: Running Caliptra ROM ...
193,614 UART:
193,767 UART: [state] CFI Enabled
262,423 UART: [state] LifecycleState = Unprovisioned
264,335 UART: [state] DebugLocked = No
266,297 UART: [state] WD Timer not started. Device not locked for debugging
270,907 UART: [kat] SHA2-256
450,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,579 UART: [kat] ++
462,110 UART: [kat] sha1
472,420 UART: [kat] SHA2-256
475,420 UART: [kat] SHA2-384
481,013 UART: [kat] SHA2-512-ACC
483,976 UART: [kat] ECC-384
2,948,146 UART: [kat] HMAC-384Kdf
2,971,839 UART: [kat] LMS
3,501,287 UART: [kat] --
3,506,580 UART: [cold-reset] ++
3,509,082 UART: [fht] FHT @ 0x50003400
3,520,291 UART: [idev] ++
3,520,905 UART: [idev] CDI.KEYID = 6
3,521,838 UART: [idev] SUBJECT.KEYID = 7
3,522,945 UART: [idev] UDS.KEYID = 0
3,523,995 ready_for_fw is high
3,524,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,040 UART: [idev] Erasing UDS.KEYID = 0
6,024,533 UART: [idev] Sha1 KeyId Algorithm
6,047,863 UART: [idev] --
6,052,240 UART: [ldev] ++
6,052,838 UART: [ldev] CDI.KEYID = 6
6,053,736 UART: [ldev] SUBJECT.KEYID = 5
6,054,855 UART: [ldev] AUTHORITY.KEYID = 7
6,056,147 UART: [ldev] FE.KEYID = 1
6,100,050 UART: [ldev] Erasing FE.KEYID = 1
8,601,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,538 UART: [ldev] --
10,411,539 UART: [fwproc] Wait for Commands...
10,413,467 UART: [fwproc] Recv command 0x46574c44
10,415,556 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,717 >>> mbox cmd response: success
14,288,103 UART: [afmc] ++
14,288,697 UART: [afmc] CDI.KEYID = 6
14,289,610 UART: [afmc] SUBJECT.KEYID = 7
14,290,775 UART: [afmc] AUTHORITY.KEYID = 5
16,826,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,002 UART: [afmc] --
18,625,598 UART: [cold-reset] --
18,629,833 UART: [state] Locking Datavault
18,635,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,106 UART: [state] Locking ICCM
18,638,758 UART: [exit] Launching FMC @ 0x40000130
18,647,215 UART:
18,647,450 UART: Running Caliptra FMC ...
18,648,479 UART:
18,648,627 UART: [state] CFI Enabled
18,708,721 UART: [fht] FMC Alias Private Key: 7
20,472,200 UART: [art] Extend RT PCRs Done
20,473,418 UART: [art] Lock RT PCRs Done
20,475,508 UART: [art] Populate DV Done
20,480,853 UART: [fht] FMC Alias Private Key: 7
20,482,349 UART: [art] Derive CDI
20,483,114 UART: [art] Store in in slot 0x4
20,540,968 UART: [art] Derive Key Pair
20,541,966 UART: [art] Store priv key in slot 0x5
23,004,599 UART: [art] Derive Key Pair - Done
23,017,778 UART: [art] Signing Cert with AUTHO
23,019,090 UART: RITY.KEYID = 7
24,730,055 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,558 UART: [art] PUB.X = 23872440F35E2761E76C38CEA54003C40F1B3FF697EED2ED42E3604F86051B65D1FCA091D50D45959134C367377BF5DC
24,738,803 UART: [art] PUB.Y = 617643E383144914B666F66953218886147FB427F5A6AB84B82A6F75F3BD3E042F33D701864F0B4DD7145FA240C115D1
24,746,086 UART: [art] SIG.R = 3152A1E330496C6BF0621A3934816EF983C0DF80BF8B92CF85D999D1E251E70CF46856398C5B26D05E20F36A2C68787E
24,753,420 UART: [art] SIG.S = 430EC5552E470BF9717C7B721C8B50745C2990DABE1282C167457DA742466B277419EE1C0E61B95C661B576B942E0FBC
25,732,965 UART: Caliptra RT
25,733,660 UART: [state] CFI Enabled
25,897,913 UART: [rt] RT listening for mailbox commands...
29,927,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,083,421 UART: [rt]cmd =0x41544d4e, len=14344
34,014,228 >>> mbox cmd response data (8 bytes)
34,014,838 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,045,582 UART: [rt]cmd =0x41545348, len=116
34,047,684 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,381,310 ready_for_fw is high
3,381,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,099 >>> mbox cmd response: success
18,349,318 UART:
18,349,731 UART: Running Caliptra FMC ...
18,350,842 UART:
18,350,996 UART: [state] CFI Enabled
18,412,784 UART: [fht] FMC Alias Private Key: 7
20,177,159 UART: [art] Extend RT PCRs Done
20,178,398 UART: [art] Lock RT PCRs Done
20,180,322 UART: [art] Populate DV Done
20,185,732 UART: [fht] FMC Alias Private Key: 7
20,187,432 UART: [art] Derive CDI
20,188,170 UART: [art] Store in in slot 0x4
20,245,329 UART: [art] Derive Key Pair
20,246,371 UART: [art] Store priv key in slot 0x5
22,709,701 UART: [art] Derive Key Pair - Done
22,722,587 UART: [art] Signing Cert with AUTHO
22,723,884 UART: RITY.KEYID = 7
24,435,272 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,777 UART: [art] PUB.X = 6791448666388A6AAC97CCA86C70C5B529EDFF003DE6AD6B76FA8A58BA9BE2198D5C0A6D0812B440BBA1A06304C6330E
24,444,037 UART: [art] PUB.Y = CB4383D937422C960982F791E9D309BF62A15A417ADDCA02BD1A53073CCA732136F36FF880069C7F62217BFE6585E042
24,451,245 UART: [art] SIG.R = 8CF9262AEA5D451CD36901114C06214C70EB8F1746B45647C086A8E831A6AE42D55BE6F19325AE314C57A10817B9A662
24,458,700 UART: [art] SIG.S = DC463DDEDA211DA65F3323625DC3795BC0C4CE7DB768CBD490A416DFF7AD21A7AD95AB976E0CDCFD5B63575AE78BB274
25,437,859 UART: Caliptra RT
25,438,573 UART: [state] CFI Enabled
25,602,762 UART: [rt] RT listening for mailbox commands...
29,641,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,798,055 UART: [rt]cmd =0x41544d4e, len=14344
33,728,493 >>> mbox cmd response data (8 bytes)
33,729,116 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,759,662 UART: [rt]cmd =0x41545348, len=116
33,761,906 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,461 UART:
192,831 UART: Running Caliptra ROM ...
193,946 UART:
603,593 UART: [state] CFI Enabled
620,018 UART: [state] LifecycleState = Unprovisioned
621,828 UART: [state] DebugLocked = No
623,198 UART: [state] WD Timer not started. Device not locked for debugging
626,429 UART: [kat] SHA2-256
805,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,112 UART: [kat] ++
817,632 UART: [kat] sha1
829,140 UART: [kat] SHA2-256
832,207 UART: [kat] SHA2-384
839,552 UART: [kat] SHA2-512-ACC
842,448 UART: [kat] ECC-384
3,285,909 UART: [kat] HMAC-384Kdf
3,297,786 UART: [kat] LMS
3,827,297 UART: [kat] --
3,831,783 UART: [cold-reset] ++
3,833,916 UART: [fht] FHT @ 0x50003400
3,846,231 UART: [idev] ++
3,846,777 UART: [idev] CDI.KEYID = 6
3,847,652 UART: [idev] SUBJECT.KEYID = 7
3,848,880 UART: [idev] UDS.KEYID = 0
3,849,864 ready_for_fw is high
3,850,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,178 UART: [idev] Erasing UDS.KEYID = 0
6,315,621 UART: [idev] Sha1 KeyId Algorithm
6,339,730 UART: [idev] --
6,342,906 UART: [ldev] ++
6,343,467 UART: [ldev] CDI.KEYID = 6
6,344,402 UART: [ldev] SUBJECT.KEYID = 5
6,345,603 UART: [ldev] AUTHORITY.KEYID = 7
6,346,826 UART: [ldev] FE.KEYID = 1
6,358,090 UART: [ldev] Erasing FE.KEYID = 1
8,832,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,663 UART: [ldev] --
10,624,141 UART: [fwproc] Wait for Commands...
10,626,942 UART: [fwproc] Recv command 0x46574c44
10,629,025 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,056 >>> mbox cmd response: success
14,496,883 UART: [afmc] ++
14,497,493 UART: [afmc] CDI.KEYID = 6
14,498,400 UART: [afmc] SUBJECT.KEYID = 7
14,499,551 UART: [afmc] AUTHORITY.KEYID = 5
16,996,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,819 UART: [afmc] --
18,793,711 UART: [cold-reset] --
18,798,752 UART: [state] Locking Datavault
18,805,391 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,036 UART: [state] Locking ICCM
18,808,371 UART: [exit] Launching FMC @ 0x40000130
18,816,817 UART:
18,817,041 UART: Running Caliptra FMC ...
18,818,137 UART:
18,818,286 UART: [state] CFI Enabled
18,826,704 UART: [fht] FMC Alias Private Key: 7
20,583,573 UART: [art] Extend RT PCRs Done
20,584,790 UART: [art] Lock RT PCRs Done
20,586,572 UART: [art] Populate DV Done
20,591,997 UART: [fht] FMC Alias Private Key: 7
20,593,641 UART: [art] Derive CDI
20,594,448 UART: [art] Store in in slot 0x4
20,637,246 UART: [art] Derive Key Pair
20,638,278 UART: [art] Store priv key in slot 0x5
23,064,619 UART: [art] Derive Key Pair - Done
23,077,780 UART: [art] Signing Cert with AUTHO
23,079,110 UART: RITY.KEYID = 7
24,784,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,057 UART: [art] PUB.X = 8087A1B3421B138B1A426517A67E10EF395F8DE85C76E1072EA436A15A4698251585DD59C54CF7CB529753589B79C701
24,793,335 UART: [art] PUB.Y = 3C94479F75C338D165060577DCBF7F7198380FF7BAC56551D36C55996949DD47C244C35D0FB588A8CC75B4FFFF9A0819
24,800,601 UART: [art] SIG.R = 6C1F7DF05196E6FEB81BE50ACE293CCB969495B70214315DC190EA92DD57C47EF404DECCBB51884245B7C6EB293A0D4E
24,807,975 UART: [art] SIG.S = B23414EB51C058EFCCA46E7FB2DC83A45DF08EC2DBCF80C874B5EA7C0D49299EFFA37305F2F9C23ABD0EE34AF55FE389
25,786,065 UART: Caliptra RT
25,786,762 UART: [state] CFI Enabled
25,903,414 UART: [rt] RT listening for mailbox commands...
29,924,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,080,470 UART: [rt]cmd =0x41544d4e, len=14344
34,010,734 >>> mbox cmd response data (8 bytes)
34,011,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,041,927 UART: [rt]cmd =0x41545348, len=116
34,044,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,696,244 ready_for_fw is high
3,696,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,288,119 >>> mbox cmd response: success
18,537,877 UART:
18,538,278 UART: Running Caliptra FMC ...
18,539,480 UART:
18,539,638 UART: [state] CFI Enabled
18,547,411 UART: [fht] FMC Alias Private Key: 7
20,304,244 UART: [art] Extend RT PCRs Done
20,305,468 UART: [art] Lock RT PCRs Done
20,306,988 UART: [art] Populate DV Done
20,312,554 UART: [fht] FMC Alias Private Key: 7
20,314,139 UART: [art] Derive CDI
20,314,948 UART: [art] Store in in slot 0x4
20,357,706 UART: [art] Derive Key Pair
20,358,747 UART: [art] Store priv key in slot 0x5
22,785,873 UART: [art] Derive Key Pair - Done
22,798,495 UART: [art] Signing Cert with AUTHO
22,799,802 UART: RITY.KEYID = 7
24,505,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,346 UART: [art] PUB.X = 9EA9B1DA4002BF7C07FBB4A9A12C24179F337186FFD865D164B3A4D981D8E56C598C38168CBCE2AF5EF5A75F4EFDF20C
24,514,638 UART: [art] PUB.Y = 546D6A67F60321FF1A0633638E68CFC2AD66E1F37659C830CF80E5BADB0C07B40484941808E27E91443F681136E1799A
24,521,873 UART: [art] SIG.R = A36D6023EE46F3B4A7FE8B88E88B7F512BA725738D40D6B61907D74320F3FDA4477CFE5B797561B8D602D6E09CD8B3DF
24,529,257 UART: [art] SIG.S = 1E16B56DB4A8C41689CB20016CC781F6436848F12259DE100721E0629D2C9C27179BBAB1430C5853AA1DB1C8FCBA2CC7
25,507,937 UART: Caliptra RT
25,508,649 UART: [state] CFI Enabled
25,625,756 UART: [rt] RT listening for mailbox commands...
29,647,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,803,380 UART: [rt]cmd =0x41544d4e, len=14344
33,733,930 >>> mbox cmd response data (8 bytes)
33,734,574 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,765,301 UART: [rt]cmd =0x41545348, len=116
33,767,822 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,002 UART:
192,367 UART: Running Caliptra ROM ...
193,569 UART:
193,723 UART: [state] CFI Enabled
263,691 UART: [state] LifecycleState = Unprovisioned
266,118 UART: [state] DebugLocked = No
268,434 UART: [state] WD Timer not started. Device not locked for debugging
273,251 UART: [kat] SHA2-256
463,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,902 UART: [kat] ++
474,396 UART: [kat] sha1
486,619 UART: [kat] SHA2-256
489,698 UART: [kat] SHA2-384
495,758 UART: [kat] SHA2-512-ACC
498,338 UART: [kat] ECC-384
2,948,512 UART: [kat] HMAC-384Kdf
2,971,906 UART: [kat] LMS
3,503,694 UART: [kat] --
3,507,923 UART: [cold-reset] ++
3,509,568 UART: [fht] FHT @ 0x50003400
3,521,557 UART: [idev] ++
3,522,272 UART: [idev] CDI.KEYID = 6
3,523,187 UART: [idev] SUBJECT.KEYID = 7
3,524,431 UART: [idev] UDS.KEYID = 0
3,525,355 ready_for_fw is high
3,525,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,490 UART: [idev] Erasing UDS.KEYID = 0
6,029,001 UART: [idev] Sha1 KeyId Algorithm
6,053,076 UART: [idev] --
6,057,875 UART: [ldev] ++
6,058,565 UART: [ldev] CDI.KEYID = 6
6,059,480 UART: [ldev] SUBJECT.KEYID = 5
6,060,641 UART: [ldev] AUTHORITY.KEYID = 7
6,061,874 UART: [ldev] FE.KEYID = 1
6,101,034 UART: [ldev] Erasing FE.KEYID = 1
8,603,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,616 UART: [ldev] --
10,413,608 UART: [fwproc] Wait for Commands...
10,415,208 UART: [fwproc] Recv command 0x46574c44
10,417,511 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,372 >>> mbox cmd response: success
14,608,825 UART: [afmc] ++
14,609,529 UART: [afmc] CDI.KEYID = 6
14,610,638 UART: [afmc] SUBJECT.KEYID = 7
14,612,178 UART: [afmc] AUTHORITY.KEYID = 5
17,152,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,623 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,830 UART: [afmc] --
18,968,609 UART: [cold-reset] --
18,971,338 UART: [state] Locking Datavault
18,977,775 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,917 UART: [state] Locking ICCM
18,982,501 UART: [exit] Launching FMC @ 0x40000130
18,991,167 UART:
18,991,399 UART: Running Caliptra FMC ...
18,992,495 UART:
18,992,648 UART: [state] CFI Enabled
19,051,998 UART: [fht] FMC Alias Private Key: 7
20,816,115 UART: [art] Extend RT PCRs Done
20,817,328 UART: [art] Lock RT PCRs Done
20,818,946 UART: [art] Populate DV Done
20,824,678 UART: [fht] FMC Alias Private Key: 7
20,826,382 UART: [art] Derive CDI
20,827,193 UART: [art] Store in in slot 0x4
20,883,960 UART: [art] Derive Key Pair
20,885,001 UART: [art] Store priv key in slot 0x5
23,348,241 UART: [art] Derive Key Pair - Done
23,361,297 UART: [art] Signing Cert with AUTHO
23,362,603 UART: RITY.KEYID = 7
25,073,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,501 UART: [art] PUB.X = 3443484BEDB4D9C363AD7E7E1F80E96DEE533B580BAB56D927A7642B8ED4404835BF50E9159CFF217DF593352EAA4C85
25,082,840 UART: [art] PUB.Y = 70750E6FD46305854163827EBD5E435182F33BF2512A8A34FC895D33B43A0EBE6EEDAC2DBAFA65FC32D9608A2AAD055B
25,090,079 UART: [art] SIG.R = 96B99387F61D5EF590F5706A9256FD0F7503A6591762008A1DBC0CB4B608065D19F38BBC76A3AAEC60B19F664AB268C4
25,097,496 UART: [art] SIG.S = 3CF4F91472B1A0EB29078536BBD52CE63CB1449B658D1081569F86A47FB3ADD36161398C4AEB9B0F4C903EA7E8268844
26,075,797 UART: Caliptra RT
26,076,491 UART: [state] CFI Enabled
26,242,908 UART: [rt] RT listening for mailbox commands...
30,279,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,435,597 UART: [rt]cmd =0x41544d4e, len=14344
34,365,884 >>> mbox cmd response data (8 bytes)
34,366,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,397,243 UART: [rt]cmd =0x41545348, len=116
34,399,610 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,440,086 ready_for_fw is high
3,440,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,431 >>> mbox cmd response: success
19,007,467 UART:
19,007,855 UART: Running Caliptra FMC ...
19,009,059 UART:
19,009,235 UART: [state] CFI Enabled
19,076,217 UART: [fht] FMC Alias Private Key: 7
20,840,167 UART: [art] Extend RT PCRs Done
20,841,384 UART: [art] Lock RT PCRs Done
20,843,414 UART: [art] Populate DV Done
20,848,879 UART: [fht] FMC Alias Private Key: 7
20,850,370 UART: [art] Derive CDI
20,851,101 UART: [art] Store in in slot 0x4
20,908,722 UART: [art] Derive Key Pair
20,909,715 UART: [art] Store priv key in slot 0x5
23,372,617 UART: [art] Derive Key Pair - Done
23,385,623 UART: [art] Signing Cert with AUTHO
23,386,927 UART: RITY.KEYID = 7
25,098,820 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,328 UART: [art] PUB.X = 28E98060CB00E296FD3A59C525D45B06F0CA93CCFB33DE9662A84A86D4490292E7382CB711D5CCBF2CA7DF5163A90EFB
25,107,583 UART: [art] PUB.Y = BBE881F81764CEA0B611F153A71109F47E5243D1B70EAD0CA7285BBCC667EE3E3E635529BA364B14C776F96D2EF80808
25,114,883 UART: [art] SIG.R = 30C5B54AD2392927BC7A808C106CB81CC18A555F29EDB903D49E8CFA1DFD0A1874C586DF728CA5B89B3C9B4DF26F0991
25,122,267 UART: [art] SIG.S = B7667A1F790253DE4F4B255EB5764226C6341B30370887AE3F43D457C1A777C935828593A7EF2B169F38B89A84DD23AF
26,101,084 UART: Caliptra RT
26,101,776 UART: [state] CFI Enabled
26,269,051 UART: [rt] RT listening for mailbox commands...
30,300,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,456,448 UART: [rt]cmd =0x41544d4e, len=14344
34,386,650 >>> mbox cmd response data (8 bytes)
34,387,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,418,223 UART: [rt]cmd =0x41545348, len=116
34,420,483 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,529 UART:
192,894 UART: Running Caliptra ROM ...
194,086 UART:
603,773 UART: [state] CFI Enabled
620,188 UART: [state] LifecycleState = Unprovisioned
622,593 UART: [state] DebugLocked = No
625,033 UART: [state] WD Timer not started. Device not locked for debugging
629,637 UART: [kat] SHA2-256
819,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,265 UART: [kat] ++
830,774 UART: [kat] sha1
842,133 UART: [kat] SHA2-256
845,132 UART: [kat] SHA2-384
852,038 UART: [kat] SHA2-512-ACC
854,612 UART: [kat] ECC-384
3,294,773 UART: [kat] HMAC-384Kdf
3,308,573 UART: [kat] LMS
3,840,426 UART: [kat] --
3,846,903 UART: [cold-reset] ++
3,849,040 UART: [fht] FHT @ 0x50003400
3,860,241 UART: [idev] ++
3,860,954 UART: [idev] CDI.KEYID = 6
3,861,978 UART: [idev] SUBJECT.KEYID = 7
3,863,074 UART: [idev] UDS.KEYID = 0
3,863,997 ready_for_fw is high
3,864,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,890 UART: [idev] Erasing UDS.KEYID = 0
6,339,395 UART: [idev] Sha1 KeyId Algorithm
6,362,250 UART: [idev] --
6,367,051 UART: [ldev] ++
6,367,726 UART: [ldev] CDI.KEYID = 6
6,368,685 UART: [ldev] SUBJECT.KEYID = 5
6,369,834 UART: [ldev] AUTHORITY.KEYID = 7
6,371,054 UART: [ldev] FE.KEYID = 1
6,382,393 UART: [ldev] Erasing FE.KEYID = 1
8,863,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,759 UART: [ldev] --
10,654,445 UART: [fwproc] Wait for Commands...
10,656,053 UART: [fwproc] Recv command 0x46574c44
10,658,301 UART: [fwproc] Recv'd Img size: 114448 bytes
14,109,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,195,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,312,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,855,330 >>> mbox cmd response: success
14,858,483 UART: [afmc] ++
14,859,190 UART: [afmc] CDI.KEYID = 6
14,860,433 UART: [afmc] SUBJECT.KEYID = 7
14,861,859 UART: [afmc] AUTHORITY.KEYID = 5
17,367,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,105,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,120,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,135,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,236 UART: [afmc] --
19,163,307 UART: [cold-reset] --
19,167,053 UART: [state] Locking Datavault
19,172,354 UART: [state] Locking PCR0, PCR1 and PCR31
19,174,718 UART: [state] Locking ICCM
19,177,471 UART: [exit] Launching FMC @ 0x40000130
19,186,155 UART:
19,186,394 UART: Running Caliptra FMC ...
19,187,410 UART:
19,187,548 UART: [state] CFI Enabled
19,195,713 UART: [fht] FMC Alias Private Key: 7
20,952,022 UART: [art] Extend RT PCRs Done
20,953,225 UART: [art] Lock RT PCRs Done
20,954,921 UART: [art] Populate DV Done
20,960,532 UART: [fht] FMC Alias Private Key: 7
20,962,056 UART: [art] Derive CDI
20,962,784 UART: [art] Store in in slot 0x4
21,005,260 UART: [art] Derive Key Pair
21,006,260 UART: [art] Store priv key in slot 0x5
23,433,261 UART: [art] Derive Key Pair - Done
23,446,206 UART: [art] Signing Cert with AUTHO
23,447,512 UART: RITY.KEYID = 7
25,152,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,494 UART: [art] PUB.X = 6E388DB7D65A1523DD6AB5E44FC3F95B7C2C6EBA242FAD9D6C4A38225B48FBAD6C06AAA901F21F57439D4E0E997917CE
25,161,759 UART: [art] PUB.Y = B9067005B82C53B67FC19D985C4B1B15DDEB49BAFC984610272DA9AFC3443370D11A544D04B838189D146707E1D27498
25,169,023 UART: [art] SIG.R = 345164E26EE766913D69243E288210849F5DD2074EA5D71A55FD1E0470EC71D18DD77FE6F7C6548CBA5AE4A1836EE667
25,176,399 UART: [art] SIG.S = 017418D969DF7B511A0A72CCDDD60256B77A245588251757D300BB70501F810AC207CF386AF7CD613F6D3F055331B052
26,155,264 UART: Caliptra RT
26,155,977 UART: [state] CFI Enabled
26,272,992 UART: [rt] RT listening for mailbox commands...
30,294,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,450,414 UART: [rt]cmd =0x41544d4e, len=14344
34,380,674 >>> mbox cmd response data (8 bytes)
34,381,241 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,411,757 UART: [rt]cmd =0x41545348, len=116
34,414,179 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,756,044 ready_for_fw is high
3,756,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,493 >>> mbox cmd response: success
19,218,235 UART:
19,218,623 UART: Running Caliptra FMC ...
19,219,753 UART:
19,219,903 UART: [state] CFI Enabled
19,227,877 UART: [fht] FMC Alias Private Key: 7
20,985,013 UART: [art] Extend RT PCRs Done
20,986,233 UART: [art] Lock RT PCRs Done
20,987,884 UART: [art] Populate DV Done
20,993,300 UART: [fht] FMC Alias Private Key: 7
20,994,946 UART: [art] Derive CDI
20,995,758 UART: [art] Store in in slot 0x4
21,038,254 UART: [art] Derive Key Pair
21,039,300 UART: [art] Store priv key in slot 0x5
23,465,680 UART: [art] Derive Key Pair - Done
23,478,627 UART: [art] Signing Cert with AUTHO
23,479,935 UART: RITY.KEYID = 7
25,185,156 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,648 UART: [art] PUB.X = 98876814CEE6B34E71FBD7ADF38933093C4E76E22A3EF59D0A9781495725628245BFC8C4E70261923F2272BE49AA6D52
25,193,941 UART: [art] PUB.Y = 5DD4A548ADFEC5F717C60AE1215E63E8CB5CCB62D25386E012D9A482DFC65AC2B725B9F336E04A8063892BDE0237F23C
25,201,197 UART: [art] SIG.R = 6B8CBEE1580571ACB1FCB7659A24A815F874C035D671C23617C78035A7342E9A97A6C23AD258FF296A301BCB9837EA60
25,208,577 UART: [art] SIG.S = F00E5E842698D9755C2D91C6B047D10D65D6DA26DA4E85587759B65F82BBB036E1300F9F281B784006AECBEDE29EC6EE
26,187,343 UART: Caliptra RT
26,188,034 UART: [state] CFI Enabled
26,304,635 UART: [rt] RT listening for mailbox commands...
30,338,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,493,997 UART: [rt]cmd =0x41544d4e, len=14344
34,424,750 >>> mbox cmd response data (8 bytes)
34,425,336 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,455,799 UART: [rt]cmd =0x41545348, len=116
34,458,223 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,835 UART: [kat] SHA2-256
892,773 UART: [kat] SHA2-384
895,682 UART: [kat] SHA2-512-ACC
897,583 UART: [kat] ECC-384
903,300 UART: [kat] HMAC-384Kdf
907,860 UART: [kat] LMS
1,476,056 UART: [kat] --
1,476,931 UART: [cold-reset] ++
1,477,263 UART: [fht] Storing FHT @ 0x50003400
1,480,038 UART: [idev] ++
1,480,206 UART: [idev] CDI.KEYID = 6
1,480,566 UART: [idev] SUBJECT.KEYID = 7
1,480,990 UART: [idev] UDS.KEYID = 0
1,481,335 ready_for_fw is high
1,481,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,004 UART: [idev] Erasing UDS.KEYID = 0
1,505,782 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,506 UART: [idev] --
1,515,467 UART: [ldev] ++
1,515,635 UART: [ldev] CDI.KEYID = 6
1,515,998 UART: [ldev] SUBJECT.KEYID = 5
1,516,424 UART: [ldev] AUTHORITY.KEYID = 7
1,516,887 UART: [ldev] FE.KEYID = 1
1,522,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,550 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 114448 bytes
2,886,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,961 >>> mbox cmd response: success
3,081,065 UART: [afmc] ++
3,081,233 UART: [afmc] CDI.KEYID = 6
3,081,595 UART: [afmc] SUBJECT.KEYID = 7
3,082,020 UART: [afmc] AUTHORITY.KEYID = 5
3,117,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,231 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,624 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,314 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,989 UART: [afmc] --
3,159,953 UART: [cold-reset] --
3,160,617 UART: [state] Locking Datavault
3,161,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,254 UART: [state] Locking ICCM
3,162,754 UART: [exit] Launching FMC @ 0x40000130
3,168,083 UART:
3,168,099 UART: Running Caliptra FMC ...
3,168,507 UART:
3,168,561 UART: [state] CFI Enabled
3,179,278 UART: [fht] FMC Alias Private Key: 7
3,286,579 UART: [art] Extend RT PCRs Done
3,287,007 UART: [art] Lock RT PCRs Done
3,288,547 UART: [art] Populate DV Done
3,296,916 UART: [fht] FMC Alias Private Key: 7
3,298,052 UART: [art] Derive CDI
3,298,332 UART: [art] Store in in slot 0x4
3,383,905 UART: [art] Derive Key Pair
3,384,265 UART: [art] Store priv key in slot 0x5
3,397,353 UART: [art] Derive Key Pair - Done
3,412,246 UART: [art] Signing Cert with AUTHO
3,412,726 UART: RITY.KEYID = 7
3,428,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,835 UART: [art] PUB.X = 4935ACE91C82096BF8ADD207D5718CD3BD64E422BFEE09C64C33BCE8CD92DCCB18747FE0ACBF26AE7034BBABC7D0B840
3,435,624 UART: [art] PUB.Y = F7E23A4D8423165FB9CFA30355E96E7E3EA51A460C912475E9FE1ABD380B33F98C8A79B2BAD7E3B7B4038E33967F586F
3,442,572 UART: [art] SIG.R = 40DB24B953A42C224DC18164FE8E01B706E8F5880DE6E0D130613D8A5E2DDA4833CB8414BFF6B3DB2113DAC2E1568C07
3,449,340 UART: [art] SIG.S = 117DB36B1EF9577FA80D93A17DF2AEB901F6F4ED38483061BD8528B67AF3CEB9C283731344B0F86BF19792F6C200EDA6
3,473,233 UART: Caliptra RT
3,473,486 UART: [state] CFI Enabled
3,582,144 UART: [rt] RT listening for mailbox commands...
3,582,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,792 UART: [rt]cmd =0x41544d4e, len=14344
3,850,493 >>> mbox cmd response data (8 bytes)
3,850,494 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,703 UART: [rt]cmd =0x41545348, len=116
3,882,507 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 ready_for_fw is high
1,362,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,305 >>> mbox cmd response: success
2,989,631 UART:
2,989,647 UART: Running Caliptra FMC ...
2,990,055 UART:
2,990,109 UART: [state] CFI Enabled
3,000,780 UART: [fht] FMC Alias Private Key: 7
3,108,527 UART: [art] Extend RT PCRs Done
3,108,955 UART: [art] Lock RT PCRs Done
3,110,479 UART: [art] Populate DV Done
3,118,766 UART: [fht] FMC Alias Private Key: 7
3,119,814 UART: [art] Derive CDI
3,120,094 UART: [art] Store in in slot 0x4
3,206,135 UART: [art] Derive Key Pair
3,206,495 UART: [art] Store priv key in slot 0x5
3,219,531 UART: [art] Derive Key Pair - Done
3,234,318 UART: [art] Signing Cert with AUTHO
3,234,798 UART: RITY.KEYID = 7
3,250,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,267 UART: [art] PUB.X = B268E5E5E6C5C46A432E9C1B239FAAD0DC35924A370B0C9AE98EED5155DBF11A35761950A3D0A8870FA2C0E312086EF6
3,258,037 UART: [art] PUB.Y = D2E2935BCC08E43CA77E562C8E8A20F08461176C7D1E05AE7B7F545D7932F6B9979A04765F1D746F7DFCA14AE9D9AEBF
3,264,992 UART: [art] SIG.R = CF0C24167962FDC6B21E22F595CEC589B107867D424FFC48CCF739C2B402A5E834F7BD5109DB9AF1AE606F2A7FA2520E
3,271,761 UART: [art] SIG.S = 5AE3770CBF43B662A7C0C47268D038813EAD617753696A9E53136542C2FCC058C7190EBD927DED33A7D454415E208A82
3,295,180 UART: Caliptra RT
3,295,433 UART: [state] CFI Enabled
3,403,848 UART: [rt] RT listening for mailbox commands...
3,404,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,670 UART: [rt]cmd =0x41544d4e, len=14344
3,671,931 >>> mbox cmd response data (8 bytes)
3,671,932 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,089 UART: [rt]cmd =0x41545348, len=116
3,703,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,955 UART: [kat] HMAC-384Kdf
907,659 UART: [kat] LMS
1,475,855 UART: [kat] --
1,476,764 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,480,113 UART: [idev] ++
1,480,281 UART: [idev] CDI.KEYID = 6
1,480,641 UART: [idev] SUBJECT.KEYID = 7
1,481,065 UART: [idev] UDS.KEYID = 0
1,481,410 ready_for_fw is high
1,481,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,143 UART: [idev] Erasing UDS.KEYID = 0
1,505,547 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,059 UART: [idev] --
1,515,098 UART: [ldev] ++
1,515,266 UART: [ldev] CDI.KEYID = 6
1,515,629 UART: [ldev] SUBJECT.KEYID = 5
1,516,055 UART: [ldev] AUTHORITY.KEYID = 7
1,516,518 UART: [ldev] FE.KEYID = 1
1,521,526 UART: [ldev] Erasing FE.KEYID = 1
1,546,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,943 UART: [ldev] --
1,586,410 UART: [fwproc] Waiting for Commands...
1,587,157 UART: [fwproc] Received command 0x46574c44
1,587,948 UART: [fwproc] Received Image of size 114448 bytes
2,888,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,589 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,040 >>> mbox cmd response: success
3,083,302 UART: [afmc] ++
3,083,470 UART: [afmc] CDI.KEYID = 6
3,083,832 UART: [afmc] SUBJECT.KEYID = 7
3,084,257 UART: [afmc] AUTHORITY.KEYID = 5
3,119,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,336 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,116 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,729 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,419 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,292 UART: [afmc] --
3,162,172 UART: [cold-reset] --
3,163,016 UART: [state] Locking Datavault
3,164,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,739 UART: [state] Locking ICCM
3,165,413 UART: [exit] Launching FMC @ 0x40000130
3,170,742 UART:
3,170,758 UART: Running Caliptra FMC ...
3,171,166 UART:
3,171,309 UART: [state] CFI Enabled
3,182,000 UART: [fht] FMC Alias Private Key: 7
3,290,547 UART: [art] Extend RT PCRs Done
3,290,975 UART: [art] Lock RT PCRs Done
3,292,711 UART: [art] Populate DV Done
3,300,894 UART: [fht] FMC Alias Private Key: 7
3,302,058 UART: [art] Derive CDI
3,302,338 UART: [art] Store in in slot 0x4
3,388,385 UART: [art] Derive Key Pair
3,388,745 UART: [art] Store priv key in slot 0x5
3,401,903 UART: [art] Derive Key Pair - Done
3,417,192 UART: [art] Signing Cert with AUTHO
3,417,672 UART: RITY.KEYID = 7
3,432,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,467 UART: [art] PUB.X = 032472E5B3ECF90F6E9A92E9256940A0DF1DB0FF78080A9FF230F471AF19C4D852BEB25BA6A1F5788CFA0495580BC4FB
3,440,233 UART: [art] PUB.Y = 9EEF3713913911739A7336EC61FF30C9FC05E887C998127C41592AB27C9D72C737FA90EB837B8A02F2C73F57D5E962EB
3,447,179 UART: [art] SIG.R = B39AB098BAC348DAB88FDB772481DD12ECB75CFFB88B08EDA35291D17DF068A6D9000A7DAC8D1AA83AB557917A376D3C
3,453,943 UART: [art] SIG.S = 1A98A0FB238910DCF0ACC0D25BBEBEA526CEE219AFB5E45A05E42A7BA4D9A3821F25ACAB9BE0A506C8DA51DFB304689C
3,478,271 UART: Caliptra RT
3,478,616 UART: [state] CFI Enabled
3,586,803 UART: [rt] RT listening for mailbox commands...
3,587,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,433 UART: [rt]cmd =0x41544d4e, len=14344
3,855,128 >>> mbox cmd response data (8 bytes)
3,855,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,190 UART: [rt]cmd =0x41545348, len=116
3,887,160 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 ready_for_fw is high
1,363,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,542 >>> mbox cmd response: success
2,992,530 UART:
2,992,546 UART: Running Caliptra FMC ...
2,992,954 UART:
2,993,097 UART: [state] CFI Enabled
3,003,952 UART: [fht] FMC Alias Private Key: 7
3,112,237 UART: [art] Extend RT PCRs Done
3,112,665 UART: [art] Lock RT PCRs Done
3,114,323 UART: [art] Populate DV Done
3,122,266 UART: [fht] FMC Alias Private Key: 7
3,123,396 UART: [art] Derive CDI
3,123,676 UART: [art] Store in in slot 0x4
3,209,505 UART: [art] Derive Key Pair
3,209,865 UART: [art] Store priv key in slot 0x5
3,223,329 UART: [art] Derive Key Pair - Done
3,238,160 UART: [art] Signing Cert with AUTHO
3,238,640 UART: RITY.KEYID = 7
3,253,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,503 UART: [art] PUB.X = 41FC4D84CC938D0AA8751601962E4013B6072F9B7D92057F9D94E60507E074DD2B9B42CF662FDF807840BD6AECD603D4
3,261,256 UART: [art] PUB.Y = CCADFB57F1FBAA5C6BCF4C0BA7F1BA92F5A5148EA1D589200E3378ED18E20807F683EC3FC4712F47CD671B434EB2EF06
3,268,215 UART: [art] SIG.R = C4A1025E8A4865B49ED14F2154F5CF4ED1AC16335F4266CE643BDED940250D475F2D5019B9820BC259BE3E0850F37F35
3,274,977 UART: [art] SIG.S = 6D72FAC74A95B1381BF496B4A2F53E6D3D22147F99559095C62943F9DD36B24957151924F0259B025A24ADC44CB87081
3,298,955 UART: Caliptra RT
3,299,300 UART: [state] CFI Enabled
3,407,261 UART: [rt] RT listening for mailbox commands...
3,407,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,909 UART: [rt]cmd =0x41544d4e, len=14344
3,676,016 >>> mbox cmd response data (8 bytes)
3,676,017 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,270 UART: [rt]cmd =0x41545348, len=116
3,707,900 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,570 UART: [state] LifecycleState = Unprovisioned
85,225 UART: [state] DebugLocked = No
85,709 UART: [state] WD Timer not started. Device not locked for debugging
86,924 UART: [kat] SHA2-256
892,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,699 UART: [kat] ++
896,851 UART: [kat] sha1
901,021 UART: [kat] SHA2-256
902,961 UART: [kat] SHA2-384
905,658 UART: [kat] SHA2-512-ACC
907,559 UART: [kat] ECC-384
917,442 UART: [kat] HMAC-384Kdf
921,946 UART: [kat] LMS
1,170,274 UART: [kat] --
1,171,061 UART: [cold-reset] ++
1,171,511 UART: [fht] FHT @ 0x50003400
1,174,166 UART: [idev] ++
1,174,334 UART: [idev] CDI.KEYID = 6
1,174,694 UART: [idev] SUBJECT.KEYID = 7
1,175,118 UART: [idev] UDS.KEYID = 0
1,175,463 ready_for_fw is high
1,175,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,331 UART: [ldev] ++
1,210,499 UART: [ldev] CDI.KEYID = 6
1,210,862 UART: [ldev] SUBJECT.KEYID = 5
1,211,288 UART: [ldev] AUTHORITY.KEYID = 7
1,211,751 UART: [ldev] FE.KEYID = 1
1,216,941 UART: [ldev] Erasing FE.KEYID = 1
1,243,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,260 UART: [fwproc] Recv command 0x46574c44
1,283,988 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,590 >>> mbox cmd response: success
2,776,662 UART: [afmc] ++
2,776,830 UART: [afmc] CDI.KEYID = 6
2,777,192 UART: [afmc] SUBJECT.KEYID = 7
2,777,617 UART: [afmc] AUTHORITY.KEYID = 5
2,813,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,019 UART: [afmc] --
2,856,977 UART: [cold-reset] --
2,857,513 UART: [state] Locking Datavault
2,858,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,236 UART: [state] Locking ICCM
2,859,908 UART: [exit] Launching FMC @ 0x40000130
2,865,237 UART:
2,865,253 UART: Running Caliptra FMC ...
2,865,661 UART:
2,865,715 UART: [state] CFI Enabled
2,876,474 UART: [fht] FMC Alias Private Key: 7
2,984,097 UART: [art] Extend RT PCRs Done
2,984,525 UART: [art] Lock RT PCRs Done
2,985,881 UART: [art] Populate DV Done
2,994,040 UART: [fht] FMC Alias Private Key: 7
2,994,998 UART: [art] Derive CDI
2,995,278 UART: [art] Store in in slot 0x4
3,080,865 UART: [art] Derive Key Pair
3,081,225 UART: [art] Store priv key in slot 0x5
3,094,561 UART: [art] Derive Key Pair - Done
3,109,534 UART: [art] Signing Cert with AUTHO
3,110,014 UART: RITY.KEYID = 7
3,124,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,731 UART: [art] PUB.X = 92EBF0587F808E38FFF3B629CF60884ABE8195DB7975BE55E4D10C53150AB4091207CD100DBC248F93FF06FD5ADB53E7
3,132,495 UART: [art] PUB.Y = 9CF703EFA29FC412D65FB88FCF759B3000454F18B9F8DD9DF61BE45547A7F417F0D60910BD00B87D1284D74FAB6F8AAC
3,139,411 UART: [art] SIG.R = 58D94D60DD663CE518EF53A7BEB64F04C2772D4409E23BA214FFFAF22D2CD46C43C669B10145BF1590CE5CFE051C13E5
3,146,183 UART: [art] SIG.S = 61EB87EBD97C2A4F6FB62422871567461438942EA36E0B40223C3409DBD5B20BA1D1F5276F7351B008D6EF596BF6D35F
3,169,944 UART: Caliptra RT
3,170,197 UART: [state] CFI Enabled
3,277,602 UART: [rt] RT listening for mailbox commands...
3,278,272 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,196 UART: [rt]cmd =0x41544d4e, len=14344
3,545,819 >>> mbox cmd response data (8 bytes)
3,545,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,947 UART: [rt]cmd =0x41545348, len=116
3,577,859 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 ready_for_fw is high
1,060,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,901 >>> mbox cmd response: success
2,690,373 UART:
2,690,389 UART: Running Caliptra FMC ...
2,690,797 UART:
2,690,851 UART: [state] CFI Enabled
2,701,274 UART: [fht] FMC Alias Private Key: 7
2,809,165 UART: [art] Extend RT PCRs Done
2,809,593 UART: [art] Lock RT PCRs Done
2,810,929 UART: [art] Populate DV Done
2,819,012 UART: [fht] FMC Alias Private Key: 7
2,819,944 UART: [art] Derive CDI
2,820,224 UART: [art] Store in in slot 0x4
2,906,033 UART: [art] Derive Key Pair
2,906,393 UART: [art] Store priv key in slot 0x5
2,919,567 UART: [art] Derive Key Pair - Done
2,934,127 UART: [art] Signing Cert with AUTHO
2,934,607 UART: RITY.KEYID = 7
2,950,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,776 UART: [art] PUB.X = E6BA263CF1C9FEF53BC06D5F78EB9E9D92DF4F094884DD7AE8D9E8BC5B7D5F4EFBD91E135FC2DB056C5D0E08EFE7AFE1
2,957,570 UART: [art] PUB.Y = A446697436E1413828BE47642C05A90CEF85C723B93E471222E151F419650606BF328D28382FFB8BD051A02F2CB18DB2
2,964,502 UART: [art] SIG.R = 7BC3AAFAE9B6A78C7DDC1E9B00359D83A23DD3BCF829F9220BB14A0A3841B2D4E54EFFC99B5FF2D8EFB2486776BE6577
2,971,268 UART: [art] SIG.S = 6E5C61FF48BEB9480129BE82C5B7CC61B8F8644BDE71BDFB0D93FF193381AC855C13AAF7270643FECE1CA3A25393D04F
2,994,670 UART: Caliptra RT
2,994,923 UART: [state] CFI Enabled
3,101,828 UART: [rt] RT listening for mailbox commands...
3,102,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,694 UART: [rt]cmd =0x41544d4e, len=14344
3,370,315 >>> mbox cmd response data (8 bytes)
3,370,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,477 UART: [rt]cmd =0x41545348, len=116
3,402,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
893,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,056 UART: [kat] ++
898,208 UART: [kat] sha1
902,680 UART: [kat] SHA2-256
904,620 UART: [kat] SHA2-384
907,247 UART: [kat] SHA2-512-ACC
909,148 UART: [kat] ECC-384
919,261 UART: [kat] HMAC-384Kdf
924,045 UART: [kat] LMS
1,172,373 UART: [kat] --
1,173,400 UART: [cold-reset] ++
1,173,848 UART: [fht] FHT @ 0x50003400
1,176,691 UART: [idev] ++
1,176,859 UART: [idev] CDI.KEYID = 6
1,177,219 UART: [idev] SUBJECT.KEYID = 7
1,177,643 UART: [idev] UDS.KEYID = 0
1,177,988 ready_for_fw is high
1,177,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,961 UART: [idev] Erasing UDS.KEYID = 0
1,203,372 UART: [idev] Sha1 KeyId Algorithm
1,211,764 UART: [idev] --
1,212,938 UART: [ldev] ++
1,213,106 UART: [ldev] CDI.KEYID = 6
1,213,469 UART: [ldev] SUBJECT.KEYID = 5
1,213,895 UART: [ldev] AUTHORITY.KEYID = 7
1,214,358 UART: [ldev] FE.KEYID = 1
1,219,762 UART: [ldev] Erasing FE.KEYID = 1
1,246,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,472 UART: [ldev] --
1,285,899 UART: [fwproc] Wait for Commands...
1,286,723 UART: [fwproc] Recv command 0x46574c44
1,287,451 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,905 >>> mbox cmd response: success
2,779,995 UART: [afmc] ++
2,780,163 UART: [afmc] CDI.KEYID = 6
2,780,525 UART: [afmc] SUBJECT.KEYID = 7
2,780,950 UART: [afmc] AUTHORITY.KEYID = 5
2,816,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,160 UART: [afmc] --
2,860,104 UART: [cold-reset] --
2,860,974 UART: [state] Locking Datavault
2,862,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,755 UART: [state] Locking ICCM
2,863,179 UART: [exit] Launching FMC @ 0x40000130
2,868,508 UART:
2,868,524 UART: Running Caliptra FMC ...
2,868,932 UART:
2,869,075 UART: [state] CFI Enabled
2,879,766 UART: [fht] FMC Alias Private Key: 7
2,987,593 UART: [art] Extend RT PCRs Done
2,988,021 UART: [art] Lock RT PCRs Done
2,989,785 UART: [art] Populate DV Done
2,998,374 UART: [fht] FMC Alias Private Key: 7
2,999,360 UART: [art] Derive CDI
2,999,640 UART: [art] Store in in slot 0x4
3,085,345 UART: [art] Derive Key Pair
3,085,705 UART: [art] Store priv key in slot 0x5
3,099,563 UART: [art] Derive Key Pair - Done
3,114,424 UART: [art] Signing Cert with AUTHO
3,114,904 UART: RITY.KEYID = 7
3,129,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,763 UART: [art] PUB.X = 19AF0CD426CB4794F0054F9C716613FC29A6FB649CD890F18D62BA633638DF1122AFEE65DBD2C63AAB13C848D83A0808
3,137,531 UART: [art] PUB.Y = FAE27D6C9A5438FA9012A66B0A500FE2D3042714E133554528013C9AC673059CF3FB7FD519EC32A1A06493E55DC1FBF8
3,144,472 UART: [art] SIG.R = A7731ED947EA4A4722502991409692EF8F5781D5B3348A9E80C1E8461F5CCF687DDA22A90EFAC4409B5B76662AFA16F2
3,151,243 UART: [art] SIG.S = 44398A63179FC40DC87FC8788803344C4D8AFE5694D6D8A5B8416B081D16DB77C703BFADC3CA42E05E7AC8B6A054D9F4
3,175,684 UART: Caliptra RT
3,176,029 UART: [state] CFI Enabled
3,284,082 UART: [rt] RT listening for mailbox commands...
3,284,752 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,626 UART: [rt]cmd =0x41544d4e, len=14344
3,552,301 >>> mbox cmd response data (8 bytes)
3,552,302 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,215 UART: [rt]cmd =0x41545348, len=116
3,584,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 ready_for_fw is high
1,061,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,570 >>> mbox cmd response: success
2,690,188 UART:
2,690,204 UART: Running Caliptra FMC ...
2,690,612 UART:
2,690,755 UART: [state] CFI Enabled
2,701,292 UART: [fht] FMC Alias Private Key: 7
2,809,417 UART: [art] Extend RT PCRs Done
2,809,845 UART: [art] Lock RT PCRs Done
2,811,185 UART: [art] Populate DV Done
2,819,464 UART: [fht] FMC Alias Private Key: 7
2,820,546 UART: [art] Derive CDI
2,820,826 UART: [art] Store in in slot 0x4
2,906,675 UART: [art] Derive Key Pair
2,907,035 UART: [art] Store priv key in slot 0x5
2,920,631 UART: [art] Derive Key Pair - Done
2,935,641 UART: [art] Signing Cert with AUTHO
2,936,121 UART: RITY.KEYID = 7
2,951,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,214 UART: [art] PUB.X = D0428455AF6EE4709BA8A613510A50C1FDE4BD05AB5D4B64EA7C2F1FC28A750D46F9A9BE26CA663C577F3F44735F711E
2,958,989 UART: [art] PUB.Y = AB948FC19728D81AD3683690099E196673486E60F790FAE539BE15FAE545490F5B6CAF66435F189A4DFFBF9D178D64A6
2,965,937 UART: [art] SIG.R = B8FCF7742277B2026A4B5C7E90AAC55E56A4CD151AF7844C31F7651B253B6FE85EDC3F0C49ABD6835E0808DC7EE8AFA9
2,972,713 UART: [art] SIG.S = B4C14050BFE8140931DEF87682EBE9882F32F2A9CE1A95DD96EE3D931ECFD69273221585DCC0904FADDF24C8EB1D2BB1
2,996,419 UART: Caliptra RT
2,996,764 UART: [state] CFI Enabled
3,104,152 UART: [rt] RT listening for mailbox commands...
3,104,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,548 UART: [rt]cmd =0x41544d4e, len=14344
3,372,477 >>> mbox cmd response data (8 bytes)
3,372,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,531 UART: [rt]cmd =0x41545348, len=116
3,404,517 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,174,365 ready_for_fw is high
1,174,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,214,790 UART: [ldev] Erasing FE.KEYID = 1
1,240,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,482 UART: [ldev] --
1,279,916 UART: [fwproc] Wait for Commands...
1,280,663 UART: [fwproc] Recv command 0x46574c44
1,281,396 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,688 >>> mbox cmd response: success
2,773,795 UART: [afmc] ++
2,773,963 UART: [afmc] CDI.KEYID = 6
2,774,326 UART: [afmc] SUBJECT.KEYID = 7
2,774,752 UART: [afmc] AUTHORITY.KEYID = 5
2,810,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,752 UART: [afmc] --
2,853,750 UART: [cold-reset] --
2,854,488 UART: [state] Locking Datavault
2,855,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,291 UART: [state] Locking ICCM
2,856,751 UART: [exit] Launching FMC @ 0x40000130
2,862,080 UART:
2,862,096 UART: Running Caliptra FMC ...
2,862,504 UART:
2,862,558 UART: [state] CFI Enabled
2,873,105 UART: [fht] FMC Alias Private Key: 7
2,981,468 UART: [art] Extend RT PCRs Done
2,981,896 UART: [art] Lock RT PCRs Done
2,983,550 UART: [art] Populate DV Done
2,991,651 UART: [fht] FMC Alias Private Key: 7
2,992,603 UART: [art] Derive CDI
2,992,883 UART: [art] Store in in slot 0x4
3,078,288 UART: [art] Derive Key Pair
3,078,648 UART: [art] Store priv key in slot 0x5
3,092,340 UART: [art] Derive Key Pair - Done
3,107,066 UART: [art] Signing Cert with AUTHO
3,107,546 UART: RITY.KEYID = 7
3,122,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,259 UART: [art] PUB.X = AEEF81F7C2378AD8A7B56A3D7BB869533A44C79389615EBD9EE74BD7D9D417F750339709FF66E28F9C77855AACD7D25E
3,130,038 UART: [art] PUB.Y = 810C649C36143F68B26B24502B84712A40AD94AB80714B943597119FC30444D0E841C0E5011E34636B468F306068962D
3,136,961 UART: [art] SIG.R = 58264CEEB0B11DB49F1189D17CBF89237709277C8E93D7B6BDC30C98E9DADBC1C9093A221108366B249A617170AD0752
3,143,718 UART: [art] SIG.S = ED7CA26F7495012D5D6CE0E0266803012DC1C6FFA0292A80083F31FA9B3592F1281F2AD195D345EF1091858894F2DA47
3,167,619 UART: Caliptra RT
3,167,872 UART: [state] CFI Enabled
3,275,983 UART: [rt] RT listening for mailbox commands...
3,276,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,827 UART: [rt]cmd =0x41544d4e, len=14344
3,544,496 >>> mbox cmd response data (8 bytes)
3,544,497 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,752 UART: [rt]cmd =0x41545348, len=116
3,576,648 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,004 ready_for_fw is high
1,056,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,306 >>> mbox cmd response: success
2,687,150 UART:
2,687,166 UART: Running Caliptra FMC ...
2,687,574 UART:
2,687,628 UART: [state] CFI Enabled
2,698,173 UART: [fht] FMC Alias Private Key: 7
2,806,238 UART: [art] Extend RT PCRs Done
2,806,666 UART: [art] Lock RT PCRs Done
2,808,262 UART: [art] Populate DV Done
2,816,295 UART: [fht] FMC Alias Private Key: 7
2,817,363 UART: [art] Derive CDI
2,817,643 UART: [art] Store in in slot 0x4
2,902,852 UART: [art] Derive Key Pair
2,903,212 UART: [art] Store priv key in slot 0x5
2,916,386 UART: [art] Derive Key Pair - Done
2,930,906 UART: [art] Signing Cert with AUTHO
2,931,386 UART: RITY.KEYID = 7
2,946,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,817 UART: [art] PUB.X = C34A4050728F2A7A3403E63FE6A133A4FA2037F289999472EF1DA57A74B272A52AAC1F7EFA52DE4FC9D6942EEC39EBD4
2,953,598 UART: [art] PUB.Y = B8FC14EC204AC4D53D5FCAEBFE2017533F35340F342C866C1428ABA11715B22D88891BAB2F6E257DFB281286A6A33424
2,960,553 UART: [art] SIG.R = 3FBC49D9E12E0A75277E03048D7357F93AC86986F9E3EEE23E4C174BC661F6FC89FF87A293796E6025B04F198CAAC09A
2,967,322 UART: [art] SIG.S = 4EAF31E41F8FACA574B0B40398C8C0E3C64DF15697B497C221B104F209CF557B159C5A5538EF0A1930E2A75D5BF82F36
2,991,061 UART: Caliptra RT
2,991,314 UART: [state] CFI Enabled
3,099,289 UART: [rt] RT listening for mailbox commands...
3,099,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,877 UART: [rt]cmd =0x41544d4e, len=14344
3,367,490 >>> mbox cmd response data (8 bytes)
3,367,491 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,502 UART: [rt]cmd =0x41545348, len=116
3,399,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,157 UART: [state] LifecycleState = Unprovisioned
86,812 UART: [state] DebugLocked = No
87,388 UART: [state] WD Timer not started. Device not locked for debugging
88,581 UART: [kat] SHA2-256
892,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,260 UART: [kat] ++
896,412 UART: [kat] sha1
900,526 UART: [kat] SHA2-256
902,466 UART: [kat] SHA2-384
905,247 UART: [kat] SHA2-512-ACC
907,148 UART: [kat] ECC-384
917,177 UART: [kat] HMAC-384Kdf
921,915 UART: [kat] LMS
1,170,227 UART: [kat] --
1,171,128 UART: [cold-reset] ++
1,171,614 UART: [fht] FHT @ 0x50003400
1,174,312 UART: [idev] ++
1,174,480 UART: [idev] CDI.KEYID = 6
1,174,841 UART: [idev] SUBJECT.KEYID = 7
1,175,266 UART: [idev] UDS.KEYID = 0
1,175,612 ready_for_fw is high
1,175,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,278 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,575 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,483 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,697 >>> mbox cmd response: success
2,775,954 UART: [afmc] ++
2,776,122 UART: [afmc] CDI.KEYID = 6
2,776,485 UART: [afmc] SUBJECT.KEYID = 7
2,776,911 UART: [afmc] AUTHORITY.KEYID = 5
2,813,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,267 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,879 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,381 UART: [afmc] --
2,856,307 UART: [cold-reset] --
2,857,401 UART: [state] Locking Datavault
2,858,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,038 UART: [state] Locking ICCM
2,859,602 UART: [exit] Launching FMC @ 0x40000130
2,864,931 UART:
2,864,947 UART: Running Caliptra FMC ...
2,865,355 UART:
2,865,498 UART: [state] CFI Enabled
2,875,789 UART: [fht] FMC Alias Private Key: 7
2,984,072 UART: [art] Extend RT PCRs Done
2,984,500 UART: [art] Lock RT PCRs Done
2,986,250 UART: [art] Populate DV Done
2,994,475 UART: [fht] FMC Alias Private Key: 7
2,995,443 UART: [art] Derive CDI
2,995,723 UART: [art] Store in in slot 0x4
3,081,324 UART: [art] Derive Key Pair
3,081,684 UART: [art] Store priv key in slot 0x5
3,094,684 UART: [art] Derive Key Pair - Done
3,109,197 UART: [art] Signing Cert with AUTHO
3,109,677 UART: RITY.KEYID = 7
3,125,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,936 UART: [art] PUB.X = 91BA0F17F971E2B753DF065AEBC725C9864F9B4B9F6A6BB7CED54D09E7CFA70A98ED64A7630ED5A719AD8BCD8D344578
3,132,711 UART: [art] PUB.Y = 2A1113998D1C2A43E4D7D44F3B324313E3BD28AFB47DBE0F6DA05F60F4C41C73B6D6B76F28D5D4DBD33987C6195AF0B1
3,139,672 UART: [art] SIG.R = 3C087A69A2B087507C1AD7D0D66366CBE1B11A6E8154AE74E0AC066F4F6F7A1A1F7019381A33E3C745F73022AD35B27C
3,146,442 UART: [art] SIG.S = 610397AD3E05E96DD5794AFD57A7D2701EB0D952904365F913F7B2992B28F5EC57CE15EEEFD04D5E4FF8DBC4E029CEAD
3,169,733 UART: Caliptra RT
3,170,078 UART: [state] CFI Enabled
3,277,957 UART: [rt] RT listening for mailbox commands...
3,278,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,861 UART: [rt]cmd =0x41544d4e, len=14344
3,547,374 >>> mbox cmd response data (8 bytes)
3,547,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,420 UART: [rt]cmd =0x41545348, len=116
3,579,142 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,611 ready_for_fw is high
1,056,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,913 >>> mbox cmd response: success
2,688,145 UART:
2,688,161 UART: Running Caliptra FMC ...
2,688,569 UART:
2,688,712 UART: [state] CFI Enabled
2,699,539 UART: [fht] FMC Alias Private Key: 7
2,807,138 UART: [art] Extend RT PCRs Done
2,807,566 UART: [art] Lock RT PCRs Done
2,809,122 UART: [art] Populate DV Done
2,817,421 UART: [fht] FMC Alias Private Key: 7
2,818,577 UART: [art] Derive CDI
2,818,857 UART: [art] Store in in slot 0x4
2,904,416 UART: [art] Derive Key Pair
2,904,776 UART: [art] Store priv key in slot 0x5
2,918,486 UART: [art] Derive Key Pair - Done
2,933,297 UART: [art] Signing Cert with AUTHO
2,933,777 UART: RITY.KEYID = 7
2,948,681 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,446 UART: [art] PUB.X = 5790F6AC570EBF095ECBB835D5AF3B3E662720DE6A3B8CDC7B31D89F711A194B712290F9888DD7BD782EA8387A625E74
2,956,220 UART: [art] PUB.Y = 57CDB1F58765B8404423AB80D15B66D2CCF495B3B3D46441E783CE1FD0AABB8D2F487E7B2997BFE39DFBD7365D557E9E
2,963,186 UART: [art] SIG.R = 30ED35CE7A851C40310C89336B3D216712F882797C2ED8AEF6CFDBE59B02C79ED83B44349B06C3062A2FF353DFB1FE06
2,969,951 UART: [art] SIG.S = A2D76824D26C93C8092B0DD004EFE7D511BD650DD437175C3C6E7E1872581577399447887E4FA4C850C5E1579B04C33F
2,993,913 UART: Caliptra RT
2,994,258 UART: [state] CFI Enabled
3,103,021 UART: [rt] RT listening for mailbox commands...
3,103,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,709 UART: [rt]cmd =0x41544d4e, len=14344
3,371,968 >>> mbox cmd response data (8 bytes)
3,371,969 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,206 UART: [rt]cmd =0x41545348, len=116
3,404,004 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,980 UART:
192,355 UART: Running Caliptra ROM ...
193,494 UART:
193,639 UART: [state] CFI Enabled
264,293 UART: [state] LifecycleState = Unprovisioned
266,213 UART: [state] DebugLocked = No
267,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,250 UART: [kat] SHA2-256
442,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,478 UART: [kat] ++
452,930 UART: [kat] sha1
464,958 UART: [kat] SHA2-256
467,682 UART: [kat] SHA2-384
473,246 UART: [kat] SHA2-512-ACC
475,610 UART: [kat] ECC-384
2,765,639 UART: [kat] HMAC-384Kdf
2,778,933 UART: [kat] LMS
3,969,261 UART: [kat] --
3,972,635 UART: [cold-reset] ++
3,974,641 UART: [fht] Storing FHT @ 0x50003400
3,985,902 UART: [idev] ++
3,986,471 UART: [idev] CDI.KEYID = 6
3,987,381 UART: [idev] SUBJECT.KEYID = 7
3,988,627 UART: [idev] UDS.KEYID = 0
3,989,666 ready_for_fw is high
3,989,866 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,415 UART: [idev] Erasing UDS.KEYID = 0
7,325,036 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,233 UART: [idev] --
7,349,789 UART: [ldev] ++
7,350,356 UART: [ldev] CDI.KEYID = 6
7,351,298 UART: [ldev] SUBJECT.KEYID = 5
7,352,563 UART: [ldev] AUTHORITY.KEYID = 7
7,353,793 UART: [ldev] FE.KEYID = 1
7,401,033 UART: [ldev] Erasing FE.KEYID = 1
10,735,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,505 UART: [ldev] --
13,113,149 UART: [fwproc] Waiting for Commands...
13,115,512 UART: [fwproc] Received command 0x46574c44
13,117,714 UART: [fwproc] Received Image of size 114124 bytes
17,168,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,624,194 >>> mbox cmd response: success
17,627,983 UART: [afmc] ++
17,628,577 UART: [afmc] CDI.KEYID = 6
17,629,489 UART: [afmc] SUBJECT.KEYID = 7
17,630,766 UART: [afmc] AUTHORITY.KEYID = 5
21,006,181 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,895 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,296 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,138 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,582 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,844 UART: [afmc] --
23,375,669 UART: [cold-reset] --
23,377,747 UART: [state] Locking Datavault
23,381,869 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,629 UART: [state] Locking ICCM
23,384,866 UART: [exit] Launching FMC @ 0x40000130
23,393,263 UART:
23,393,497 UART: Running Caliptra FMC ...
23,394,598 UART:
23,394,759 UART: [state] CFI Enabled
23,463,520 UART: [fht] FMC Alias Private Key: 7
25,801,398 UART: [art] Extend RT PCRs Done
25,802,621 UART: [art] Lock RT PCRs Done
25,804,545 UART: [art] Populate DV Done
25,809,727 UART: [fht] FMC Alias Private Key: 7
25,811,434 UART: [art] Derive CDI
25,812,171 UART: [art] Store in in slot 0x4
25,871,181 UART: [art] Derive Key Pair
25,872,185 UART: [art] Store priv key in slot 0x5
29,165,130 UART: [art] Derive Key Pair - Done
29,178,291 UART: [art] Signing Cert with AUTHO
29,179,594 UART: RITY.KEYID = 7
31,465,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,286 UART: [art] PUB.X = 86902739A67E3DC7199EB8B8126999FDE33A1BA249BB9700812F9F4AE6FCF58D58E04D2C3C68061B5E3CD1C6B03D3943
31,474,545 UART: [art] PUB.Y = 5F08B72F107831E97D9920CA0FC474F624C831CCF3ECE6EA6C44363AA2E371EE9FB899A129A1F50AB0CBF5F791CA4099
31,481,836 UART: [art] SIG.R = 9D103419044B3A8F1E1E9ED98E93CD4A83CD841051A4847B82C46D189A2D8BF6C2D85442239BACB198EB0BA39F4957C0
31,489,219 UART: [art] SIG.S = 86B6601ED0BF030C94A9E4A138AC0E7669C5B8566DA873A7975C286EACB394566D9E56592E0733C1603034E060EA4BD1
32,794,453 UART: Caliptra RT
32,795,151 UART: [state] CFI Enabled
32,955,959 UART: [rt] RT listening for mailbox commands...
37,130,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,286,429 UART: [rt]cmd =0x41544d4e, len=14344
42,521,440 >>> mbox cmd response data (8 bytes)
42,522,033 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,552,898 UART: [rt]cmd =0x41545348, len=116
42,555,361 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,780,613 ready_for_fw is high
3,781,434 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,830,910 >>> mbox cmd response: success
23,543,310 UART:
23,543,707 UART: Running Caliptra FMC ...
23,544,832 UART:
23,544,998 UART: [state] CFI Enabled
23,610,029 UART: [fht] FMC Alias Private Key: 7
25,947,668 UART: [art] Extend RT PCRs Done
25,948,893 UART: [art] Lock RT PCRs Done
25,950,794 UART: [art] Populate DV Done
25,956,422 UART: [fht] FMC Alias Private Key: 7
25,957,963 UART: [art] Derive CDI
25,958,735 UART: [art] Store in in slot 0x4
26,018,646 UART: [art] Derive Key Pair
26,019,691 UART: [art] Store priv key in slot 0x5
29,313,012 UART: [art] Derive Key Pair - Done
29,326,067 UART: [art] Signing Cert with AUTHO
29,327,378 UART: RITY.KEYID = 7
31,614,068 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,575 UART: [art] PUB.X = EADCA9EEABAE53EB98B2D35C012FD9793E4E9AF2F7757212A5FAD707F20CFB063B0AC531CCE0B69B4374324CEA751FE7
31,622,902 UART: [art] PUB.Y = 2098F12A32757F2C1347E52399DCD23537D63A09011CB31664F89555EC8523A69CEF7362BB2C03A6FB7D3903864CE0A1
31,630,096 UART: [art] SIG.R = A3CE02CA308405AF2B5B225318B40BDA28A84F7CE4E20EC853A1380CF19B3E132918CAB37CA39AD7A20F07E6E8C0C3B3
31,637,497 UART: [art] SIG.S = BE5DF382866966244C87E419FC8E123B4AE6BFCCDD661EAF848500AA647F1E2B2C067EAEA8C0C83F387DF7BB9A921163
32,942,542 UART: Caliptra RT
32,943,256 UART: [state] CFI Enabled
33,104,464 UART: [rt] RT listening for mailbox commands...
37,284,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,440,304 UART: [rt]cmd =0x41544d4e, len=14344
42,675,542 >>> mbox cmd response data (8 bytes)
42,676,110 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,706,800 UART: [rt]cmd =0x41545348, len=116
42,709,208 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,426 UART:
192,795 UART: Running Caliptra ROM ...
193,989 UART:
603,661 UART: [state] CFI Enabled
617,818 UART: [state] LifecycleState = Unprovisioned
619,752 UART: [state] DebugLocked = No
621,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,461 UART: [kat] SHA2-256
796,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,789 UART: [kat] ++
807,229 UART: [kat] sha1
817,450 UART: [kat] SHA2-256
820,103 UART: [kat] SHA2-384
825,943 UART: [kat] SHA2-512-ACC
828,308 UART: [kat] ECC-384
3,112,151 UART: [kat] HMAC-384Kdf
3,123,251 UART: [kat] LMS
4,313,374 UART: [kat] --
4,317,457 UART: [cold-reset] ++
4,319,894 UART: [fht] Storing FHT @ 0x50003400
4,332,149 UART: [idev] ++
4,332,729 UART: [idev] CDI.KEYID = 6
4,333,633 UART: [idev] SUBJECT.KEYID = 7
4,334,870 UART: [idev] UDS.KEYID = 0
4,335,840 ready_for_fw is high
4,336,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,346 UART: [idev] Erasing UDS.KEYID = 0
7,617,930 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,605 UART: [idev] --
7,642,645 UART: [ldev] ++
7,643,205 UART: [ldev] CDI.KEYID = 6
7,644,160 UART: [ldev] SUBJECT.KEYID = 5
7,645,365 UART: [ldev] AUTHORITY.KEYID = 7
7,646,641 UART: [ldev] FE.KEYID = 1
7,656,412 UART: [ldev] Erasing FE.KEYID = 1
10,946,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,262 UART: [ldev] --
13,303,472 UART: [fwproc] Waiting for Commands...
13,306,693 UART: [fwproc] Received command 0x46574c44
13,308,869 UART: [fwproc] Received Image of size 114124 bytes
17,367,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,024 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,379 >>> mbox cmd response: success
17,835,443 UART: [afmc] ++
17,836,093 UART: [afmc] CDI.KEYID = 6
17,837,007 UART: [afmc] SUBJECT.KEYID = 7
17,838,220 UART: [afmc] AUTHORITY.KEYID = 5
21,145,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,977 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,321 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,153 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,591 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,106 UART: [afmc] --
23,512,522 UART: [cold-reset] --
23,517,031 UART: [state] Locking Datavault
23,522,760 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,509 UART: [state] Locking ICCM
23,525,713 UART: [exit] Launching FMC @ 0x40000130
23,534,110 UART:
23,534,338 UART: Running Caliptra FMC ...
23,535,359 UART:
23,535,498 UART: [state] CFI Enabled
23,543,540 UART: [fht] FMC Alias Private Key: 7
25,874,332 UART: [art] Extend RT PCRs Done
25,875,552 UART: [art] Lock RT PCRs Done
25,877,197 UART: [art] Populate DV Done
25,882,606 UART: [fht] FMC Alias Private Key: 7
25,884,301 UART: [art] Derive CDI
25,885,032 UART: [art] Store in in slot 0x4
25,927,834 UART: [art] Derive Key Pair
25,928,873 UART: [art] Store priv key in slot 0x5
29,170,537 UART: [art] Derive Key Pair - Done
29,183,646 UART: [art] Signing Cert with AUTHO
29,184,980 UART: RITY.KEYID = 7
31,464,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,222 UART: [art] PUB.X = 2A95ABC80D75038BDB89198F08407E34D47008F486181D646974497B175AB159EDB064DAB6F48787B368270E794E2F20
31,473,454 UART: [art] PUB.Y = 37B50AB5A39588EC6511DDB6D97E168319DE1BB51955120FEE6792C3443365E35C40D95525CB5AEF10981F95A47E8809
31,480,676 UART: [art] SIG.R = 59B21E6F4395BD2BBD7C260BF1E7EAEB461EB53C3CDD6C78AD6486746B3CA1D454802C5A9F179C4F9BDCD2A2580BCA4C
31,488,108 UART: [art] SIG.S = 5866F8BFB10A2EF620793BCFEACA506E4857934C5AB72625B877CA2EEE8D6966AC6C4DD6C4846E6832CD961321238404
32,792,866 UART: Caliptra RT
32,793,585 UART: [state] CFI Enabled
32,911,204 UART: [rt] RT listening for mailbox commands...
36,930,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,086,166 UART: [rt]cmd =0x41544d4e, len=14344
42,321,596 >>> mbox cmd response data (8 bytes)
42,322,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,352,792 UART: [rt]cmd =0x41545348, len=116
42,354,894 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
4,126,360 ready_for_fw is high
4,126,747 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,070 >>> mbox cmd response: success
23,707,319 UART:
23,707,711 UART: Running Caliptra FMC ...
23,708,849 UART:
23,709,007 UART: [state] CFI Enabled
23,717,029 UART: [fht] FMC Alias Private Key: 7
26,047,865 UART: [art] Extend RT PCRs Done
26,049,088 UART: [art] Lock RT PCRs Done
26,050,616 UART: [art] Populate DV Done
26,056,135 UART: [fht] FMC Alias Private Key: 7
26,057,674 UART: [art] Derive CDI
26,058,487 UART: [art] Store in in slot 0x4
26,100,821 UART: [art] Derive Key Pair
26,101,857 UART: [art] Store priv key in slot 0x5
29,344,337 UART: [art] Derive Key Pair - Done
29,357,554 UART: [art] Signing Cert with AUTHO
29,358,865 UART: RITY.KEYID = 7
31,637,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,307 UART: [art] PUB.X = 31B1C0863469049E65694815844A5A32467C4C114A76D6A89BED74716773B4389752D61168D009E3B7C8E5C29F1FE25B
31,646,522 UART: [art] PUB.Y = 5E13BDDBE88B3A9BC20C8AC528DF353A7C99D84531087107E4AFCCC0106CAC0EA0CF05C1D9AB862F24AA411C347040E3
31,653,803 UART: [art] SIG.R = AC3EE4BAE047AB4F5B89F64044173773B7187DC9FA8259159165FEABE668D9D07C3F030305537066A2F758945AC9D585
31,661,163 UART: [art] SIG.S = 725082B7985BF0ECC3189681A4E7B5DAB00B523879892B4D3FE252F4DAB30CA8A51E398E5E642B017E7DF46578E6EECE
32,966,984 UART: Caliptra RT
32,967,681 UART: [state] CFI Enabled
33,085,464 UART: [rt] RT listening for mailbox commands...
37,103,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,259,078 UART: [rt]cmd =0x41544d4e, len=14344
42,494,425 >>> mbox cmd response data (8 bytes)
42,495,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,525,857 UART: [rt]cmd =0x41545348, len=116
42,527,961 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,078 UART:
192,433 UART: Running Caliptra ROM ...
193,567 UART:
193,717 UART: [state] CFI Enabled
266,004 UART: [state] LifecycleState = Unprovisioned
267,883 UART: [state] DebugLocked = No
270,060 UART: [state] WD Timer not started. Device not locked for debugging
273,886 UART: [kat] SHA2-256
453,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,553 UART: [kat] ++
465,086 UART: [kat] sha1
476,827 UART: [kat] SHA2-256
479,839 UART: [kat] SHA2-384
485,186 UART: [kat] SHA2-512-ACC
488,292 UART: [kat] ECC-384
2,949,806 UART: [kat] HMAC-384Kdf
2,971,497 UART: [kat] LMS
3,500,963 UART: [kat] --
3,504,527 UART: [cold-reset] ++
3,505,739 UART: [fht] FHT @ 0x50003400
3,517,017 UART: [idev] ++
3,517,584 UART: [idev] CDI.KEYID = 6
3,518,465 UART: [idev] SUBJECT.KEYID = 7
3,519,705 UART: [idev] UDS.KEYID = 0
3,520,604 ready_for_fw is high
3,520,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,772 UART: [idev] Erasing UDS.KEYID = 0
6,026,785 UART: [idev] Sha1 KeyId Algorithm
6,050,069 UART: [idev] --
6,053,848 UART: [ldev] ++
6,054,418 UART: [ldev] CDI.KEYID = 6
6,055,363 UART: [ldev] SUBJECT.KEYID = 5
6,056,523 UART: [ldev] AUTHORITY.KEYID = 7
6,057,808 UART: [ldev] FE.KEYID = 1
6,101,521 UART: [ldev] Erasing FE.KEYID = 1
8,604,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,218 UART: [ldev] --
10,415,201 UART: [fwproc] Wait for Commands...
10,417,737 UART: [fwproc] Recv command 0x46574c44
10,419,776 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,590 >>> mbox cmd response: success
14,288,315 UART: [afmc] ++
14,288,923 UART: [afmc] CDI.KEYID = 6
14,289,838 UART: [afmc] SUBJECT.KEYID = 7
14,290,948 UART: [afmc] AUTHORITY.KEYID = 5
16,828,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,354 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,149 UART: [afmc] --
18,628,197 UART: [cold-reset] --
18,632,765 UART: [state] Locking Datavault
18,637,522 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,162 UART: [state] Locking ICCM
18,641,582 UART: [exit] Launching FMC @ 0x40000130
18,649,982 UART:
18,650,296 UART: Running Caliptra FMC ...
18,651,332 UART:
18,651,488 UART: [state] CFI Enabled
18,714,394 UART: [fht] FMC Alias Private Key: 7
20,478,291 UART: [art] Extend RT PCRs Done
20,479,500 UART: [art] Lock RT PCRs Done
20,481,064 UART: [art] Populate DV Done
20,486,369 UART: [fht] FMC Alias Private Key: 7
20,488,028 UART: [art] Derive CDI
20,489,049 UART: [art] Store in in slot 0x4
20,547,134 UART: [art] Derive Key Pair
20,548,127 UART: [art] Store priv key in slot 0x5
23,011,378 UART: [art] Derive Key Pair - Done
23,024,116 UART: [art] Signing Cert with AUTHO
23,025,423 UART: RITY.KEYID = 7
24,737,792 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,297 UART: [art] PUB.X = 4E9E16E1586652F91E3805F98C8E50011CAE0E979749334585B5766CA92501BA188BE0FB1B59F6F221B5C4A265FCCEF0
24,746,541 UART: [art] PUB.Y = 9D9B43C70A9B89DF0060D8D8F2A2F0C9E7164B3FC072EE666BA832DEB314C89D0556D59AAF8818610CC5CA1050BA03F5
24,753,825 UART: [art] SIG.R = B8AEB22B370707A6D8A39611F30D262B3601BE05C639C6DE59068C1D614CECCCF6262E5406BF4ACA9D8F801796DB7775
24,761,210 UART: [art] SIG.S = 3A1908F9F000994843E43395F7A4A88966CD4E312122A0F84C7658F8D6A60AFEFF7983332213DBCEB350CC3A83850A56
25,739,516 UART: Caliptra RT
25,740,227 UART: [state] CFI Enabled
25,905,460 UART: [rt] RT listening for mailbox commands...
29,928,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,084,894 UART: [rt]cmd =0x41544d4e, len=14344
34,015,363 >>> mbox cmd response data (8 bytes)
34,015,955 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,046,708 UART: [rt]cmd =0x41545348, len=116
34,048,696 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,380,271 ready_for_fw is high
3,380,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,917 >>> mbox cmd response: success
18,346,178 UART:
18,346,565 UART: Running Caliptra FMC ...
18,347,679 UART:
18,347,838 UART: [state] CFI Enabled
18,413,106 UART: [fht] FMC Alias Private Key: 7
20,177,076 UART: [art] Extend RT PCRs Done
20,178,313 UART: [art] Lock RT PCRs Done
20,179,803 UART: [art] Populate DV Done
20,185,375 UART: [fht] FMC Alias Private Key: 7
20,186,912 UART: [art] Derive CDI
20,187,728 UART: [art] Store in in slot 0x4
20,246,016 UART: [art] Derive Key Pair
20,247,064 UART: [art] Store priv key in slot 0x5
22,710,023 UART: [art] Derive Key Pair - Done
22,722,974 UART: [art] Signing Cert with AUTHO
22,724,284 UART: RITY.KEYID = 7
24,436,149 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,631 UART: [art] PUB.X = D375EB7C3D9E5105228A40512A12F61AB6583E6ABCE4B1FC47B2C0C5F1E466EEF7AA20DF5293831EA2077C3FA2A21D32
24,444,958 UART: [art] PUB.Y = 94C0D1D09FFB08F7EDE7547B7D936310330434A7FADD2F54053101BE138D4A5039942FA3A06F89FF068C87A8295BD8AB
24,452,186 UART: [art] SIG.R = E77FAE2C7DC9D11BB90AA80A1D73B040521AA7283F377B5C97E99F269CFA3A360D5CF78ACAF5E4661AEF8372DF1703A6
24,459,594 UART: [art] SIG.S = ED6799269927A809091232AAB0AD99E471D290BD46C2F8535D84DDCC7E815394B7241F55087A856B763CC7DF339DFF28
25,437,868 UART: Caliptra RT
25,438,600 UART: [state] CFI Enabled
25,603,841 UART: [rt] RT listening for mailbox commands...
29,643,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,799,394 UART: [rt]cmd =0x41544d4e, len=14344
33,729,970 >>> mbox cmd response data (8 bytes)
33,730,601 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,761,240 UART: [rt]cmd =0x41545348, len=116
33,763,340 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,277 UART:
192,651 UART: Running Caliptra ROM ...
193,766 UART:
603,486 UART: [state] CFI Enabled
618,510 UART: [state] LifecycleState = Unprovisioned
620,402 UART: [state] DebugLocked = No
621,710 UART: [state] WD Timer not started. Device not locked for debugging
625,521 UART: [kat] SHA2-256
804,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,218 UART: [kat] ++
816,664 UART: [kat] sha1
826,393 UART: [kat] SHA2-256
829,390 UART: [kat] SHA2-384
836,011 UART: [kat] SHA2-512-ACC
838,941 UART: [kat] ECC-384
3,280,681 UART: [kat] HMAC-384Kdf
3,292,701 UART: [kat] LMS
3,822,225 UART: [kat] --
3,826,085 UART: [cold-reset] ++
3,828,081 UART: [fht] FHT @ 0x50003400
3,839,903 UART: [idev] ++
3,840,465 UART: [idev] CDI.KEYID = 6
3,841,368 UART: [idev] SUBJECT.KEYID = 7
3,842,603 UART: [idev] UDS.KEYID = 0
3,843,522 ready_for_fw is high
3,843,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,824 UART: [idev] Erasing UDS.KEYID = 0
6,313,282 UART: [idev] Sha1 KeyId Algorithm
6,336,558 UART: [idev] --
6,342,213 UART: [ldev] ++
6,342,776 UART: [ldev] CDI.KEYID = 6
6,343,649 UART: [ldev] SUBJECT.KEYID = 5
6,344,854 UART: [ldev] AUTHORITY.KEYID = 7
6,346,127 UART: [ldev] FE.KEYID = 1
6,357,295 UART: [ldev] Erasing FE.KEYID = 1
8,827,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,341 UART: [ldev] --
10,618,445 UART: [fwproc] Wait for Commands...
10,620,634 UART: [fwproc] Recv command 0x46574c44
10,622,714 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,838 >>> mbox cmd response: success
14,501,774 UART: [afmc] ++
14,502,370 UART: [afmc] CDI.KEYID = 6
14,503,269 UART: [afmc] SUBJECT.KEYID = 7
14,504,369 UART: [afmc] AUTHORITY.KEYID = 5
17,007,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,729 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,401 UART: [afmc] --
18,801,448 UART: [cold-reset] --
18,804,545 UART: [state] Locking Datavault
18,810,864 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,502 UART: [state] Locking ICCM
18,814,455 UART: [exit] Launching FMC @ 0x40000130
18,822,897 UART:
18,823,121 UART: Running Caliptra FMC ...
18,824,158 UART:
18,824,301 UART: [state] CFI Enabled
18,832,727 UART: [fht] FMC Alias Private Key: 7
20,589,612 UART: [art] Extend RT PCRs Done
20,590,822 UART: [art] Lock RT PCRs Done
20,592,630 UART: [art] Populate DV Done
20,598,086 UART: [fht] FMC Alias Private Key: 7
20,599,780 UART: [art] Derive CDI
20,600,510 UART: [art] Store in in slot 0x4
20,643,434 UART: [art] Derive Key Pair
20,644,472 UART: [art] Store priv key in slot 0x5
23,071,428 UART: [art] Derive Key Pair - Done
23,084,147 UART: [art] Signing Cert with AUTHO
23,085,625 UART: RITY.KEYID = 7
24,791,038 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,547 UART: [art] PUB.X = 29469F93897970F1597707B6A316FD96EFB15A83276FF0082A93414D890C76832884BF807890DC89CA8F86ECB0506161
24,799,799 UART: [art] PUB.Y = 0466C65AA6551043CF5F98203DEA88C9D705E5A5A50EF9FE570865BE69FF6B8F3B473717779561ADD7D6B55E0AB3837E
24,807,066 UART: [art] SIG.R = 16B06894136B1EE7CD8F029915AFB94F243F93D1E58B4DE846F1DA0F410D31B4CC4B06DC18214C332A962DFB83F9FA29
24,814,456 UART: [art] SIG.S = C2307902EF020F862418F2AD9A2106844897748DAEE0ABF148D792254041892B2771B2C1496B0310F9894E8CC072A876
25,793,644 UART: Caliptra RT
25,794,333 UART: [state] CFI Enabled
25,911,082 UART: [rt] RT listening for mailbox commands...
29,941,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,097,315 UART: [rt]cmd =0x41544d4e, len=14344
34,027,928 >>> mbox cmd response data (8 bytes)
34,028,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,059,201 UART: [rt]cmd =0x41545348, len=116
34,061,766 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,699,572 ready_for_fw is high
3,699,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,442 >>> mbox cmd response: success
18,524,543 UART:
18,524,948 UART: Running Caliptra FMC ...
18,526,086 UART:
18,526,251 UART: [state] CFI Enabled
18,534,516 UART: [fht] FMC Alias Private Key: 7
20,292,181 UART: [art] Extend RT PCRs Done
20,293,407 UART: [art] Lock RT PCRs Done
20,295,078 UART: [art] Populate DV Done
20,300,431 UART: [fht] FMC Alias Private Key: 7
20,302,020 UART: [art] Derive CDI
20,302,830 UART: [art] Store in in slot 0x4
20,345,396 UART: [art] Derive Key Pair
20,346,444 UART: [art] Store priv key in slot 0x5
22,773,481 UART: [art] Derive Key Pair - Done
22,786,753 UART: [art] Signing Cert with AUTHO
22,788,056 UART: RITY.KEYID = 7
24,493,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,646 UART: [art] PUB.X = 6F34AA9431F8BD4090FA3E13DC12A17FCC1A0AE3403E04B365FE5BB1E491BD6F9E2C282C4CBEBD12D104C776DE2F4E51
24,501,971 UART: [art] PUB.Y = 5EDE665D2C512563BA0F455E96B15361B39733753C919A1E57716F27FD5D2264D39C8D0BB4F23A18EC6464576677AFC1
24,509,234 UART: [art] SIG.R = C8F01D742F73AA7AF08D50DE82956965D99B5BEA1014A983FAE715E8E3CABB3E711A0E3681A3162DFB03D86A7B42C643
24,516,615 UART: [art] SIG.S = DAE121163CC2850A8E1279D7BF26ACCB35F2397E9822DB3DDCDD9A643D33F4A1FA281A8CA3F96499BF2AA5DA037E3B8D
25,495,918 UART: Caliptra RT
25,496,635 UART: [state] CFI Enabled
25,614,309 UART: [rt] RT listening for mailbox commands...
29,635,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,791,028 UART: [rt]cmd =0x41544d4e, len=14344
33,721,113 >>> mbox cmd response data (8 bytes)
33,721,705 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,752,184 UART: [rt]cmd =0x41545348, len=116
33,754,319 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,343 UART:
192,717 UART: Running Caliptra ROM ...
193,916 UART:
194,071 UART: [state] CFI Enabled
264,999 UART: [state] LifecycleState = Unprovisioned
267,405 UART: [state] DebugLocked = No
269,507 UART: [state] WD Timer not started. Device not locked for debugging
274,954 UART: [kat] SHA2-256
464,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,589 UART: [kat] ++
476,122 UART: [kat] sha1
487,076 UART: [kat] SHA2-256
490,086 UART: [kat] SHA2-384
496,948 UART: [kat] SHA2-512-ACC
499,527 UART: [kat] ECC-384
2,946,958 UART: [kat] HMAC-384Kdf
2,971,637 UART: [kat] LMS
3,503,432 UART: [kat] --
3,506,427 UART: [cold-reset] ++
3,507,581 UART: [fht] FHT @ 0x50003400
3,519,923 UART: [idev] ++
3,520,660 UART: [idev] CDI.KEYID = 6
3,521,595 UART: [idev] SUBJECT.KEYID = 7
3,522,767 UART: [idev] UDS.KEYID = 0
3,523,689 ready_for_fw is high
3,523,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,675 UART: [idev] Erasing UDS.KEYID = 0
6,026,762 UART: [idev] Sha1 KeyId Algorithm
6,049,557 UART: [idev] --
6,055,032 UART: [ldev] ++
6,055,719 UART: [ldev] CDI.KEYID = 6
6,056,631 UART: [ldev] SUBJECT.KEYID = 5
6,057,846 UART: [ldev] AUTHORITY.KEYID = 7
6,059,025 UART: [ldev] FE.KEYID = 1
6,099,332 UART: [ldev] Erasing FE.KEYID = 1
8,607,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,339 UART: [ldev] --
10,414,500 UART: [fwproc] Wait for Commands...
10,416,264 UART: [fwproc] Recv command 0x46574c44
10,418,571 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,428 >>> mbox cmd response: success
14,603,672 UART: [afmc] ++
14,604,375 UART: [afmc] CDI.KEYID = 6
14,605,612 UART: [afmc] SUBJECT.KEYID = 7
14,607,045 UART: [afmc] AUTHORITY.KEYID = 5
17,149,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,202 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,961,901 UART: [afmc] --
18,966,047 UART: [cold-reset] --
18,968,890 UART: [state] Locking Datavault
18,975,184 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,320 UART: [state] Locking ICCM
18,980,230 UART: [exit] Launching FMC @ 0x40000130
18,988,906 UART:
18,989,135 UART: Running Caliptra FMC ...
18,990,238 UART:
18,990,402 UART: [state] CFI Enabled
19,050,128 UART: [fht] FMC Alias Private Key: 7
20,813,872 UART: [art] Extend RT PCRs Done
20,815,075 UART: [art] Lock RT PCRs Done
20,816,640 UART: [art] Populate DV Done
20,822,101 UART: [fht] FMC Alias Private Key: 7
20,823,633 UART: [art] Derive CDI
20,824,443 UART: [art] Store in in slot 0x4
20,882,891 UART: [art] Derive Key Pair
20,883,918 UART: [art] Store priv key in slot 0x5
23,346,811 UART: [art] Derive Key Pair - Done
23,359,886 UART: [art] Signing Cert with AUTHO
23,361,212 UART: RITY.KEYID = 7
25,072,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,226 UART: [art] PUB.X = 5B905DB54856D995FDB86988615A18F54A52A2391DE926188874F6297C1EE58992D89E0905F0B3DA8BA5840B93D4771F
25,081,473 UART: [art] PUB.Y = 2490926440872ABD79AA26094A9F626ED8FCF933DE37056F69ACDCCFBDD032B28DF4046F6FCA6EDAEF595F491CA4F7AD
25,088,761 UART: [art] SIG.R = 114774640021C11875760FF676BF529B2995052C07F90FB1E174A4C821B88C79ED601A2743D8248A5EFF5DDCCA2D42FC
25,096,151 UART: [art] SIG.S = 7C5ECBFA07EAA11911735BE355AACECBDACF4C41C1214E3DC15240A7E5B07B1B7B25FB4DA9C213F3AC718392C5B84365
26,075,004 UART: Caliptra RT
26,075,717 UART: [state] CFI Enabled
26,242,144 UART: [rt] RT listening for mailbox commands...
30,269,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,425,680 UART: [rt]cmd =0x41544d4e, len=14344
34,356,539 >>> mbox cmd response data (8 bytes)
34,357,105 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,387,684 UART: [rt]cmd =0x41545348, len=116
34,389,793 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,442,599 ready_for_fw is high
3,443,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,726 >>> mbox cmd response: success
19,051,743 UART:
19,052,141 UART: Running Caliptra FMC ...
19,053,332 UART:
19,053,511 UART: [state] CFI Enabled
19,117,499 UART: [fht] FMC Alias Private Key: 7
20,881,572 UART: [art] Extend RT PCRs Done
20,882,789 UART: [art] Lock RT PCRs Done
20,884,630 UART: [art] Populate DV Done
20,889,986 UART: [fht] FMC Alias Private Key: 7
20,891,481 UART: [art] Derive CDI
20,892,244 UART: [art] Store in in slot 0x4
20,950,418 UART: [art] Derive Key Pair
20,951,451 UART: [art] Store priv key in slot 0x5
23,414,403 UART: [art] Derive Key Pair - Done
23,427,626 UART: [art] Signing Cert with AUTHO
23,428,951 UART: RITY.KEYID = 7
25,140,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,892 UART: [art] PUB.X = 210BE85C375EDC7159C0958A03CF65561753AD5AEB9EC5BE4CA375329F0EA4BF77BACE72F4F8268801859A95DDA85E1D
25,149,146 UART: [art] PUB.Y = BC964145AD6A7E9263E607DFAB76CA0564EC07A06E598042E965F87006BBFBA533D737B6DB5F4718C23BC53968606E89
25,156,400 UART: [art] SIG.R = DA369D89820DD508EBF91E3A0A761C8FF4D20512D634B0E3C7E14926600BD6823FAB373BA730D0B62C6129AA616E144F
25,163,784 UART: [art] SIG.S = 9C14052905AB3467C68153E6E67823FC09F1344ECF2CE900E34D74F46301703FC174CE5F9A6BA76C1A22A11F28A3B055
26,142,681 UART: Caliptra RT
26,143,393 UART: [state] CFI Enabled
26,309,331 UART: [rt] RT listening for mailbox commands...
30,361,135 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,517,202 UART: [rt]cmd =0x41544d4e, len=14344
34,448,082 >>> mbox cmd response data (8 bytes)
34,448,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,479,338 UART: [rt]cmd =0x41545348, len=116
34,481,652 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,446 UART:
192,814 UART: Running Caliptra ROM ...
194,018 UART:
603,589 UART: [state] CFI Enabled
613,841 UART: [state] LifecycleState = Unprovisioned
616,249 UART: [state] DebugLocked = No
619,150 UART: [state] WD Timer not started. Device not locked for debugging
623,404 UART: [kat] SHA2-256
813,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,127 UART: [kat] ++
824,598 UART: [kat] sha1
836,815 UART: [kat] SHA2-256
839,818 UART: [kat] SHA2-384
846,013 UART: [kat] SHA2-512-ACC
848,590 UART: [kat] ECC-384
3,288,941 UART: [kat] HMAC-384Kdf
3,301,306 UART: [kat] LMS
3,833,163 UART: [kat] --
3,837,082 UART: [cold-reset] ++
3,839,217 UART: [fht] FHT @ 0x50003400
3,850,326 UART: [idev] ++
3,851,023 UART: [idev] CDI.KEYID = 6
3,852,070 UART: [idev] SUBJECT.KEYID = 7
3,853,172 UART: [idev] UDS.KEYID = 0
3,854,090 ready_for_fw is high
3,854,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,997,974 UART: [idev] Erasing UDS.KEYID = 0
6,331,406 UART: [idev] Sha1 KeyId Algorithm
6,353,607 UART: [idev] --
6,357,921 UART: [ldev] ++
6,358,595 UART: [ldev] CDI.KEYID = 6
6,359,553 UART: [ldev] SUBJECT.KEYID = 5
6,360,704 UART: [ldev] AUTHORITY.KEYID = 7
6,361,927 UART: [ldev] FE.KEYID = 1
6,372,018 UART: [ldev] Erasing FE.KEYID = 1
8,853,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,587 UART: [ldev] --
10,643,520 UART: [fwproc] Wait for Commands...
10,645,336 UART: [fwproc] Recv command 0x46574c44
10,647,646 UART: [fwproc] Recv'd Img size: 114448 bytes
14,105,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,651 >>> mbox cmd response: success
14,850,371 UART: [afmc] ++
14,851,075 UART: [afmc] CDI.KEYID = 6
14,852,265 UART: [afmc] SUBJECT.KEYID = 7
14,853,696 UART: [afmc] AUTHORITY.KEYID = 5
17,355,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,043 UART: [afmc] --
19,151,531 UART: [cold-reset] --
19,156,254 UART: [state] Locking Datavault
19,161,449 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,591 UART: [state] Locking ICCM
19,165,577 UART: [exit] Launching FMC @ 0x40000130
19,174,250 UART:
19,174,478 UART: Running Caliptra FMC ...
19,175,695 UART:
19,175,851 UART: [state] CFI Enabled
19,183,649 UART: [fht] FMC Alias Private Key: 7
20,940,196 UART: [art] Extend RT PCRs Done
20,941,434 UART: [art] Lock RT PCRs Done
20,942,997 UART: [art] Populate DV Done
20,948,084 UART: [fht] FMC Alias Private Key: 7
20,949,791 UART: [art] Derive CDI
20,950,599 UART: [art] Store in in slot 0x4
20,993,564 UART: [art] Derive Key Pair
20,994,556 UART: [art] Store priv key in slot 0x5
23,421,417 UART: [art] Derive Key Pair - Done
23,434,416 UART: [art] Signing Cert with AUTHO
23,435,708 UART: RITY.KEYID = 7
25,141,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,052 UART: [art] PUB.X = CB597E8839D88A598EACD3424C9D1AEE257E50105AF3CAFB0BB580BD5B5BF8C4213B94699A1025EC1FFE2BC916246631
25,150,307 UART: [art] PUB.Y = 12C737AEE3EFC458319F0711BFB3CC41F8EC760937836A71CE6A2D1E65C75A2DE141B0D59479933D2DB2EEC9CAE8A16D
25,157,619 UART: [art] SIG.R = F142C4FA57CA45EEF7340687D79B9E4E5BAF5A3C2EC4474B59F1C4DEDB0CF267A45597F50407E2E72BC2DE1DA590DE0E
25,165,039 UART: [art] SIG.S = BEB00B547F7C442BF60B3E757D1C9DD23B7C229BC41C54A5E9C2FD8E0B8E3E1D907375F2E2E98108C9A96E3D09F1703C
26,144,015 UART: Caliptra RT
26,144,728 UART: [state] CFI Enabled
26,261,359 UART: [rt] RT listening for mailbox commands...
30,290,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,446,048 UART: [rt]cmd =0x41544d4e, len=14344
34,376,341 >>> mbox cmd response data (8 bytes)
34,376,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,407,430 UART: [rt]cmd =0x41545348, len=116
34,409,689 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,750,818 ready_for_fw is high
3,751,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,812 >>> mbox cmd response: success
19,211,676 UART:
19,212,054 UART: Running Caliptra FMC ...
19,213,188 UART:
19,213,337 UART: [state] CFI Enabled
19,221,171 UART: [fht] FMC Alias Private Key: 7
20,977,737 UART: [art] Extend RT PCRs Done
20,978,977 UART: [art] Lock RT PCRs Done
20,980,598 UART: [art] Populate DV Done
20,986,214 UART: [fht] FMC Alias Private Key: 7
20,987,802 UART: [art] Derive CDI
20,988,766 UART: [art] Store in in slot 0x4
21,031,100 UART: [art] Derive Key Pair
21,032,093 UART: [art] Store priv key in slot 0x5
23,458,953 UART: [art] Derive Key Pair - Done
23,472,097 UART: [art] Signing Cert with AUTHO
23,473,422 UART: RITY.KEYID = 7
25,179,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,730 UART: [art] PUB.X = 58AF3D40C1689253FCB606FDC8842D52B4D6E743BE868980F9768FA9890D14B295933D90EFB6DE59E6E09DCE9E320FF9
25,187,960 UART: [art] PUB.Y = 6E1D58D1F9536E9EA66514957283CDE7D6E3DF0FEEE4E80B912B7B0855E1EE3E9258EFB38D8051FC3D5ABEAB02EE652C
25,195,270 UART: [art] SIG.R = 4D5742F038FAC78F36341A65028CFAFF812C8D35FF52310C672200873A63C06FB82759738B5749F8E9D46F15CFD6864A
25,202,627 UART: [art] SIG.S = CC754230BCAB43C5061A2466E12402B5EEC7FFEF99F99F08EC4B0BABA560A18D880C7C189E5103620770094646AC280D
26,181,157 UART: Caliptra RT
26,181,859 UART: [state] CFI Enabled
26,299,832 UART: [rt] RT listening for mailbox commands...
30,320,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,475,802 UART: [rt]cmd =0x41544d4e, len=14344
34,406,276 >>> mbox cmd response data (8 bytes)
34,406,855 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,437,330 UART: [rt]cmd =0x41545348, len=116
34,439,680 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,147 UART: [kat] SHA2-256
892,085 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,238 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,475,745 UART: [cold-reset] ++
1,476,195 UART: [fht] Storing FHT @ 0x50003400
1,478,976 UART: [idev] ++
1,479,144 UART: [idev] CDI.KEYID = 6
1,479,504 UART: [idev] SUBJECT.KEYID = 7
1,479,928 UART: [idev] UDS.KEYID = 0
1,480,273 ready_for_fw is high
1,480,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,850 UART: [idev] Erasing UDS.KEYID = 0
1,504,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,920 UART: [idev] --
1,513,803 UART: [ldev] ++
1,513,971 UART: [ldev] CDI.KEYID = 6
1,514,334 UART: [ldev] SUBJECT.KEYID = 5
1,514,760 UART: [ldev] AUTHORITY.KEYID = 7
1,515,223 UART: [ldev] FE.KEYID = 1
1,520,433 UART: [ldev] Erasing FE.KEYID = 1
1,545,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,898 UART: [ldev] --
1,585,293 UART: [fwproc] Waiting for Commands...
1,586,116 UART: [fwproc] Received command 0x46574c44
1,586,907 UART: [fwproc] Received Image of size 114448 bytes
2,886,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,829 >>> mbox cmd response: success
3,079,861 UART: [afmc] ++
3,080,029 UART: [afmc] CDI.KEYID = 6
3,080,391 UART: [afmc] SUBJECT.KEYID = 7
3,080,816 UART: [afmc] AUTHORITY.KEYID = 5
3,116,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,667 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,060 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,750 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,599 UART: [afmc] --
3,159,537 UART: [cold-reset] --
3,160,161 UART: [state] Locking Datavault
3,161,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,970 UART: [state] Locking ICCM
3,162,396 UART: [exit] Launching FMC @ 0x40000130
3,167,725 UART:
3,167,741 UART: Running Caliptra FMC ...
3,168,149 UART:
3,168,203 UART: [state] CFI Enabled
3,178,816 UART: [fht] FMC Alias Private Key: 7
3,286,307 UART: [art] Extend RT PCRs Done
3,286,735 UART: [art] Lock RT PCRs Done
3,288,599 UART: [art] Populate DV Done
3,296,882 UART: [fht] FMC Alias Private Key: 7
3,297,852 UART: [art] Derive CDI
3,298,132 UART: [art] Store in in slot 0x4
3,383,511 UART: [art] Derive Key Pair
3,383,871 UART: [art] Store priv key in slot 0x5
3,397,131 UART: [art] Derive Key Pair - Done
3,411,711 UART: [art] Signing Cert with AUTHO
3,412,191 UART: RITY.KEYID = 7
3,427,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,346 UART: [art] PUB.X = D6D8902D400C5450A675B41411E000181D9104DFEDAAA59139078FE5DCBD478FA43A300D94409FAF47DB7053944A4237
3,435,082 UART: [art] PUB.Y = 207C868785CAD9F3AFF138F6EAADED6B63D03E751EE221C39A565A0675281E316B30B37782DC02B9DDB0A9F8A5B189CC
3,442,040 UART: [art] SIG.R = 8B0C87C306EC9CCCE8828C1132CFE358386336D0CFCB6B170E16D2E59EEEE1C768213610BC4664965A227FB678EF6965
3,448,807 UART: [art] SIG.S = 17D9256637AFA1B7A65FC38F5F67968D615BC600F2022E668EAA97BBB5EFB17BAD7B837309E8A2C588AE0B35EC124783
3,472,405 UART: Caliptra RT
3,472,658 UART: [state] CFI Enabled
3,581,277 UART: [rt] RT listening for mailbox commands...
3,581,947 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,121 UART: [rt]cmd =0x41544d4e, len=14344
3,850,276 >>> mbox cmd response data (8 bytes)
3,850,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,238 UART: [rt]cmd =0x41545348, len=116
3,882,136 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,761 ready_for_fw is high
1,362,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,051 >>> mbox cmd response: success
2,990,859 UART:
2,990,875 UART: Running Caliptra FMC ...
2,991,283 UART:
2,991,337 UART: [state] CFI Enabled
3,001,552 UART: [fht] FMC Alias Private Key: 7
3,109,683 UART: [art] Extend RT PCRs Done
3,110,111 UART: [art] Lock RT PCRs Done
3,111,487 UART: [art] Populate DV Done
3,119,618 UART: [fht] FMC Alias Private Key: 7
3,120,588 UART: [art] Derive CDI
3,120,868 UART: [art] Store in in slot 0x4
3,206,085 UART: [art] Derive Key Pair
3,206,445 UART: [art] Store priv key in slot 0x5
3,219,747 UART: [art] Derive Key Pair - Done
3,234,596 UART: [art] Signing Cert with AUTHO
3,235,076 UART: RITY.KEYID = 7
3,250,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,163 UART: [art] PUB.X = 427D61B38CEE6ED0F4CE216682DFC9B97F4FBBF5CA836AF1DE26E666D7C47D4CB367FC8F63B743501DD6824EC498060E
3,257,945 UART: [art] PUB.Y = C4BECB09E9160ECCA9426D36AF3B6177CAB4B8005CF61B5697855523A3A33589640F7033EC9B86E116866EA5657255FB
3,264,866 UART: [art] SIG.R = F9519ED323DFA8752D44C64281D1B15B31A2695F16748F63C1B08F3F72283DB68C222998170C82750D2C1DCF32A732EF
3,271,628 UART: [art] SIG.S = E2FD48233DAD378C6F651681623E3D3B039C9D6EB1ED77ECE839859E3799C50FA1493F8AD0961AB5F273C802E82A8880
3,295,266 UART: Caliptra RT
3,295,519 UART: [state] CFI Enabled
3,403,899 UART: [rt] RT listening for mailbox commands...
3,404,569 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,959 UART: [rt]cmd =0x41544d4e, len=14344
3,672,904 >>> mbox cmd response data (8 bytes)
3,672,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,196 UART: [rt]cmd =0x41545348, len=116
3,704,830 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,116 UART: [kat] SHA2-256
882,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,162 UART: [kat] ++
886,314 UART: [kat] sha1
890,464 UART: [kat] SHA2-256
892,402 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,029 UART: [kat] LMS
1,475,225 UART: [kat] --
1,476,198 UART: [cold-reset] ++
1,476,538 UART: [fht] Storing FHT @ 0x50003400
1,479,317 UART: [idev] ++
1,479,485 UART: [idev] CDI.KEYID = 6
1,479,845 UART: [idev] SUBJECT.KEYID = 7
1,480,269 UART: [idev] UDS.KEYID = 0
1,480,614 ready_for_fw is high
1,480,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,967 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,407 UART: [idev] --
1,514,488 UART: [ldev] ++
1,514,656 UART: [ldev] CDI.KEYID = 6
1,515,019 UART: [ldev] SUBJECT.KEYID = 5
1,515,445 UART: [ldev] AUTHORITY.KEYID = 7
1,515,908 UART: [ldev] FE.KEYID = 1
1,521,234 UART: [ldev] Erasing FE.KEYID = 1
1,547,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,675 UART: [ldev] --
1,587,174 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 114448 bytes
2,887,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,620 >>> mbox cmd response: success
3,081,718 UART: [afmc] ++
3,081,886 UART: [afmc] CDI.KEYID = 6
3,082,248 UART: [afmc] SUBJECT.KEYID = 7
3,082,673 UART: [afmc] AUTHORITY.KEYID = 5
3,117,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,150 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,543 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,233 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,140 UART: [afmc] --
3,161,068 UART: [cold-reset] --
3,162,060 UART: [state] Locking Datavault
3,163,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,829 UART: [state] Locking ICCM
3,164,479 UART: [exit] Launching FMC @ 0x40000130
3,169,808 UART:
3,169,824 UART: Running Caliptra FMC ...
3,170,232 UART:
3,170,375 UART: [state] CFI Enabled
3,180,808 UART: [fht] FMC Alias Private Key: 7
3,288,479 UART: [art] Extend RT PCRs Done
3,288,907 UART: [art] Lock RT PCRs Done
3,290,667 UART: [art] Populate DV Done
3,299,052 UART: [fht] FMC Alias Private Key: 7
3,300,006 UART: [art] Derive CDI
3,300,286 UART: [art] Store in in slot 0x4
3,386,203 UART: [art] Derive Key Pair
3,386,563 UART: [art] Store priv key in slot 0x5
3,400,213 UART: [art] Derive Key Pair - Done
3,415,233 UART: [art] Signing Cert with AUTHO
3,415,713 UART: RITY.KEYID = 7
3,431,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,802 UART: [art] PUB.X = D77716FF7A7F127520CF6CA7942C61EC1B4F08DA8D3F81E433DD2A3A5F6840027742264B8296F17FA56F5A952E825B12
3,438,568 UART: [art] PUB.Y = C8CC7DCC8B4A4D21811B6CE05C0F15731FDFA98D338E01F1052525FE5E4EBEEEDC0770BDF906A04DC22C773CD394FFF7
3,445,527 UART: [art] SIG.R = 7270E0DFF1940EA3243FDA01FCF70E137EC5C72957A5C3816F74EC95340C2384CE3BCB72244D980FDD26E2109115D475
3,452,286 UART: [art] SIG.S = 34D874596992D07A4000EA0A468351A0D52E6AF9384124366408F97E43C38E16A979B48CD690229FD3EADCB460CDBD1E
3,476,429 UART: Caliptra RT
3,476,774 UART: [state] CFI Enabled
3,584,860 UART: [rt] RT listening for mailbox commands...
3,585,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,594 UART: [rt]cmd =0x41544d4e, len=14344
3,853,889 >>> mbox cmd response data (8 bytes)
3,853,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,835 UART: [rt]cmd =0x41545348, len=116
3,885,827 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,704 >>> mbox cmd response: success
2,993,606 UART:
2,993,622 UART: Running Caliptra FMC ...
2,994,030 UART:
2,994,173 UART: [state] CFI Enabled
3,004,612 UART: [fht] FMC Alias Private Key: 7
3,112,489 UART: [art] Extend RT PCRs Done
3,112,917 UART: [art] Lock RT PCRs Done
3,114,637 UART: [art] Populate DV Done
3,122,906 UART: [fht] FMC Alias Private Key: 7
3,124,076 UART: [art] Derive CDI
3,124,356 UART: [art] Store in in slot 0x4
3,210,235 UART: [art] Derive Key Pair
3,210,595 UART: [art] Store priv key in slot 0x5
3,223,925 UART: [art] Derive Key Pair - Done
3,239,018 UART: [art] Signing Cert with AUTHO
3,239,498 UART: RITY.KEYID = 7
3,254,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,567 UART: [art] PUB.X = 1B9D0D26D1D46CC49727C00E731B1037FAC56E7DF8E4903F49B3345BDF192D0B6D82AD899FC2F24005A7DA22D082037F
3,262,330 UART: [art] PUB.Y = 3926AB16CFFDB50BCE88A8258B3A4E756149DACE6BABC605F61F3228070C7EA7700797DFA314FC715CFC7E9658703BCB
3,269,281 UART: [art] SIG.R = 13E1B001B5E27F3C5786B28AD6CF182518DEEE69051F9BF17FF3CA976610DBE9E511BD5678C29833C7EE80CBE30349C0
3,276,052 UART: [art] SIG.S = AE08918B616082AC8E0579651C4F11F7AC4A91DC3660B7468A5CA2CF77342263286A63B2A33A3893F71C79CAD5C7A7E1
3,299,637 UART: Caliptra RT
3,299,982 UART: [state] CFI Enabled
3,408,899 UART: [rt] RT listening for mailbox commands...
3,409,569 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,743 UART: [rt]cmd =0x41544d4e, len=14344
3,677,872 >>> mbox cmd response data (8 bytes)
3,677,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,870 UART: [rt]cmd =0x41545348, len=116
3,709,328 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,866 UART: [kat] SHA2-512-ACC
908,767 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 ready_for_fw is high
1,176,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,453 UART: [idev] Sha1 KeyId Algorithm
1,208,973 UART: [idev] --
1,210,197 UART: [ldev] ++
1,210,365 UART: [ldev] CDI.KEYID = 6
1,210,728 UART: [ldev] SUBJECT.KEYID = 5
1,211,154 UART: [ldev] AUTHORITY.KEYID = 7
1,211,617 UART: [ldev] FE.KEYID = 1
1,216,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,720 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,174 >>> mbox cmd response: success
2,776,210 UART: [afmc] ++
2,776,378 UART: [afmc] CDI.KEYID = 6
2,776,740 UART: [afmc] SUBJECT.KEYID = 7
2,777,165 UART: [afmc] AUTHORITY.KEYID = 5
2,813,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,785 UART: [afmc] --
2,856,815 UART: [cold-reset] --
2,857,657 UART: [state] Locking Datavault
2,858,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,130 UART: [state] Locking ICCM
2,859,670 UART: [exit] Launching FMC @ 0x40000130
2,864,999 UART:
2,865,015 UART: Running Caliptra FMC ...
2,865,423 UART:
2,865,477 UART: [state] CFI Enabled
2,876,110 UART: [fht] FMC Alias Private Key: 7
2,984,495 UART: [art] Extend RT PCRs Done
2,984,923 UART: [art] Lock RT PCRs Done
2,986,669 UART: [art] Populate DV Done
2,994,910 UART: [fht] FMC Alias Private Key: 7
2,995,854 UART: [art] Derive CDI
2,996,134 UART: [art] Store in in slot 0x4
3,081,905 UART: [art] Derive Key Pair
3,082,265 UART: [art] Store priv key in slot 0x5
3,095,879 UART: [art] Derive Key Pair - Done
3,110,769 UART: [art] Signing Cert with AUTHO
3,111,249 UART: RITY.KEYID = 7
3,126,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,912 UART: [art] PUB.X = 0165346706371247D7574E7696C10BADDEFA540CD8BBFB7F6644A70D0F662CB1204A500A32593445E83A12CFB603308D
3,133,656 UART: [art] PUB.Y = 98EA7A5B243CF1D0FE67DBB1DD173AB5BD50CA28917A124B1DFDAC4FC2C4D401B0DF922A8FD9186A635DD6C9B42AE67B
3,140,631 UART: [art] SIG.R = 2FCB84CD528675190D7227ECF7354FCAD87917AEC74F7B396E7306018FC81089AA9875B45A5E4E81528F4CFB51236A75
3,147,394 UART: [art] SIG.S = 51510F1CC80C0A5B77CFDD2BBFA0001EA149BCF9DFBFE9E7DFDEC9C46586D8DDF1F45936F4D694B07747F2558B412CBC
3,171,106 UART: Caliptra RT
3,171,359 UART: [state] CFI Enabled
3,280,436 UART: [rt] RT listening for mailbox commands...
3,281,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,468 UART: [rt]cmd =0x41544d4e, len=14344
3,549,653 >>> mbox cmd response data (8 bytes)
3,549,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,777 UART: [rt]cmd =0x41545348, len=116
3,581,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,745 >>> mbox cmd response: success
2,691,673 UART:
2,691,689 UART: Running Caliptra FMC ...
2,692,097 UART:
2,692,151 UART: [state] CFI Enabled
2,702,758 UART: [fht] FMC Alias Private Key: 7
2,810,855 UART: [art] Extend RT PCRs Done
2,811,283 UART: [art] Lock RT PCRs Done
2,812,813 UART: [art] Populate DV Done
2,821,060 UART: [fht] FMC Alias Private Key: 7
2,822,002 UART: [art] Derive CDI
2,822,282 UART: [art] Store in in slot 0x4
2,907,555 UART: [art] Derive Key Pair
2,907,915 UART: [art] Store priv key in slot 0x5
2,921,361 UART: [art] Derive Key Pair - Done
2,936,251 UART: [art] Signing Cert with AUTHO
2,936,731 UART: RITY.KEYID = 7
2,952,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,776 UART: [art] PUB.X = 9C4F5A757F137A7F2C6A7686560509788CFB3CEB43323A1535320BDD901C0C8E65D27D5FFD390A211CCB4DECE994124E
2,959,539 UART: [art] PUB.Y = DA5D6E658A6B4E9CD40384491798870B0FEA2F74B70834FE505AAC6901F6217D90F12077E1F7EB65C00AEEC45D765D2C
2,966,479 UART: [art] SIG.R = 59DD32C7F82361D07EE2876EE7CC01A5EBA86D22104D07C3994D25AF873B19B70AA535BCD65632429F582AD183A19EDF
2,973,248 UART: [art] SIG.S = A6D30BCF5BA8B07522B9BDDAE0F0FAA0FF1B677CC5D7B143D694C8F3078A6ABAB07D360D489FEE178D4871518C378B79
2,997,034 UART: Caliptra RT
2,997,287 UART: [state] CFI Enabled
3,104,314 UART: [rt] RT listening for mailbox commands...
3,104,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,206 UART: [rt]cmd =0x41544d4e, len=14344
3,372,971 >>> mbox cmd response data (8 bytes)
3,372,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,003 UART: [rt]cmd =0x41545348, len=116
3,404,881 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
894,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,244 UART: [kat] ++
898,396 UART: [kat] sha1
902,698 UART: [kat] SHA2-256
904,638 UART: [kat] SHA2-384
907,567 UART: [kat] SHA2-512-ACC
909,468 UART: [kat] ECC-384
919,313 UART: [kat] HMAC-384Kdf
923,927 UART: [kat] LMS
1,172,255 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,412 UART: [fht] FHT @ 0x50003400
1,175,953 UART: [idev] ++
1,176,121 UART: [idev] CDI.KEYID = 6
1,176,481 UART: [idev] SUBJECT.KEYID = 7
1,176,905 UART: [idev] UDS.KEYID = 0
1,177,250 ready_for_fw is high
1,177,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,235 UART: [idev] Erasing UDS.KEYID = 0
1,202,024 UART: [idev] Sha1 KeyId Algorithm
1,210,652 UART: [idev] --
1,211,596 UART: [ldev] ++
1,211,764 UART: [ldev] CDI.KEYID = 6
1,212,127 UART: [ldev] SUBJECT.KEYID = 5
1,212,553 UART: [ldev] AUTHORITY.KEYID = 7
1,213,016 UART: [ldev] FE.KEYID = 1
1,218,574 UART: [ldev] Erasing FE.KEYID = 1
1,245,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,228 UART: [ldev] --
1,284,737 UART: [fwproc] Wait for Commands...
1,285,561 UART: [fwproc] Recv command 0x46574c44
1,286,289 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,029 >>> mbox cmd response: success
2,779,235 UART: [afmc] ++
2,779,403 UART: [afmc] CDI.KEYID = 6
2,779,765 UART: [afmc] SUBJECT.KEYID = 7
2,780,190 UART: [afmc] AUTHORITY.KEYID = 5
2,815,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,544 UART: [afmc] --
2,858,584 UART: [cold-reset] --
2,859,334 UART: [state] Locking Datavault
2,860,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,239 UART: [state] Locking ICCM
2,861,809 UART: [exit] Launching FMC @ 0x40000130
2,867,138 UART:
2,867,154 UART: Running Caliptra FMC ...
2,867,562 UART:
2,867,705 UART: [state] CFI Enabled
2,878,458 UART: [fht] FMC Alias Private Key: 7
2,986,975 UART: [art] Extend RT PCRs Done
2,987,403 UART: [art] Lock RT PCRs Done
2,988,887 UART: [art] Populate DV Done
2,997,182 UART: [fht] FMC Alias Private Key: 7
2,998,174 UART: [art] Derive CDI
2,998,454 UART: [art] Store in in slot 0x4
3,084,027 UART: [art] Derive Key Pair
3,084,387 UART: [art] Store priv key in slot 0x5
3,097,765 UART: [art] Derive Key Pair - Done
3,112,612 UART: [art] Signing Cert with AUTHO
3,113,092 UART: RITY.KEYID = 7
3,128,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,865 UART: [art] PUB.X = 5312820F419E06D8B43FEF5A58977F861F388F881D6AF6F97F2C24D2B6DE5AFF426A1B013E235BE5288D93CBA9ADEA0D
3,135,637 UART: [art] PUB.Y = D571EE2358900F964AE67E503C2648394383006456509FA89352427E3BC49B4197C608DE9268CB016591710D98525B43
3,142,533 UART: [art] SIG.R = 06E29FB1F132766BEDF884B3C5364F9D5C07A642A55762303FEC07182EF233733D763A425F30FA27AF47D6436A6BBE18
3,149,296 UART: [art] SIG.S = 3B6DF0D79C44D2EB60828BE2A75AFBC814DFA1901BC5C1659131DA9E9DF60FEF982D667BF22F9E2E8B93A735AF930985
3,173,287 UART: Caliptra RT
3,173,632 UART: [state] CFI Enabled
3,281,661 UART: [rt] RT listening for mailbox commands...
3,282,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,499 UART: [rt]cmd =0x41544d4e, len=14344
3,550,084 >>> mbox cmd response data (8 bytes)
3,550,085 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,058 UART: [rt]cmd =0x41545348, len=116
3,581,816 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,184 ready_for_fw is high
1,060,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,536 >>> mbox cmd response: success
2,689,664 UART:
2,689,680 UART: Running Caliptra FMC ...
2,690,088 UART:
2,690,231 UART: [state] CFI Enabled
2,701,032 UART: [fht] FMC Alias Private Key: 7
2,808,671 UART: [art] Extend RT PCRs Done
2,809,099 UART: [art] Lock RT PCRs Done
2,810,843 UART: [art] Populate DV Done
2,818,844 UART: [fht] FMC Alias Private Key: 7
2,819,864 UART: [art] Derive CDI
2,820,144 UART: [art] Store in in slot 0x4
2,905,745 UART: [art] Derive Key Pair
2,906,105 UART: [art] Store priv key in slot 0x5
2,919,329 UART: [art] Derive Key Pair - Done
2,934,315 UART: [art] Signing Cert with AUTHO
2,934,795 UART: RITY.KEYID = 7
2,949,749 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,514 UART: [art] PUB.X = 88F38D050EC93C0C0D9EE62D745B2B416AE73B89E025A1A038130DDBFF78C97F08CB23A0FF803ABB5ED6F0E44AC39120
2,957,282 UART: [art] PUB.Y = 2D32527C1E9B41411A61B38C3B6B3EDEE730C07540AD4D6F198A1D24CE57463036D11CFEEC019DB90B3D4DBA7E0B552A
2,964,237 UART: [art] SIG.R = 82950A018793ACD42D81DE30E65E830D29D992D8B92D6C7E41C45D957460117B2545626FB53E939DAE1DC748F5668EB6
2,970,996 UART: [art] SIG.S = 46F6EB0FB383119C2152B2B5D5F6FA4B3204520287CD038929F736E2690BD987494844D09674321E808931010E6CA05D
2,994,950 UART: Caliptra RT
2,995,295 UART: [state] CFI Enabled
3,103,102 UART: [rt] RT listening for mailbox commands...
3,103,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,764 UART: [rt]cmd =0x41544d4e, len=14344
3,371,867 >>> mbox cmd response data (8 bytes)
3,371,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,949 UART: [rt]cmd =0x41545348, len=116
3,403,543 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 ready_for_fw is high
1,174,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,203 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,655 UART: [fwproc] Recv command 0x46574c44
1,282,388 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,196 >>> mbox cmd response: success
2,774,397 UART: [afmc] ++
2,774,565 UART: [afmc] CDI.KEYID = 6
2,774,928 UART: [afmc] SUBJECT.KEYID = 7
2,775,354 UART: [afmc] AUTHORITY.KEYID = 5
2,811,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,852 UART: [afmc] --
2,854,794 UART: [cold-reset] --
2,855,730 UART: [state] Locking Datavault
2,856,505 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,109 UART: [state] Locking ICCM
2,857,559 UART: [exit] Launching FMC @ 0x40000130
2,862,888 UART:
2,862,904 UART: Running Caliptra FMC ...
2,863,312 UART:
2,863,366 UART: [state] CFI Enabled
2,873,789 UART: [fht] FMC Alias Private Key: 7
2,982,168 UART: [art] Extend RT PCRs Done
2,982,596 UART: [art] Lock RT PCRs Done
2,984,156 UART: [art] Populate DV Done
2,992,653 UART: [fht] FMC Alias Private Key: 7
2,993,641 UART: [art] Derive CDI
2,993,921 UART: [art] Store in in slot 0x4
3,080,012 UART: [art] Derive Key Pair
3,080,372 UART: [art] Store priv key in slot 0x5
3,093,952 UART: [art] Derive Key Pair - Done
3,108,774 UART: [art] Signing Cert with AUTHO
3,109,254 UART: RITY.KEYID = 7
3,124,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,299 UART: [art] PUB.X = 1AD81D616996136090A8F6321F2176F5193DB093CB96CC52283544DC3A7501E8B52A400E9EE209B52AE58303192CA0D4
3,132,051 UART: [art] PUB.Y = 176D5058F99B0095268BBE903AF6522556C98BC20E78136D431DA57060FB262A385D394E88A554644C846CF9AAF420B2
3,138,970 UART: [art] SIG.R = 533B9A68F6F10F76C5A7FDE18D9A349E76312484912D8D323CDC7848951792370819BF9C822F51D0D2CC76B23DB15612
3,145,730 UART: [art] SIG.S = 9FE92AEFB5A020A76B9AB6FC1E32E0BF03D752414CEBE2803C38F43E4E81E3545BC739EC73C1736B81C912B0775188B2
3,169,558 UART: Caliptra RT
3,169,811 UART: [state] CFI Enabled
3,277,588 UART: [rt] RT listening for mailbox commands...
3,278,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,084 UART: [rt]cmd =0x41544d4e, len=14344
3,546,081 >>> mbox cmd response data (8 bytes)
3,546,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,209 UART: [rt]cmd =0x41545348, len=116
3,577,853 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,130 ready_for_fw is high
1,056,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,132 >>> mbox cmd response: success
2,686,060 UART:
2,686,076 UART: Running Caliptra FMC ...
2,686,484 UART:
2,686,538 UART: [state] CFI Enabled
2,696,717 UART: [fht] FMC Alias Private Key: 7
2,805,198 UART: [art] Extend RT PCRs Done
2,805,626 UART: [art] Lock RT PCRs Done
2,806,744 UART: [art] Populate DV Done
2,814,813 UART: [fht] FMC Alias Private Key: 7
2,815,939 UART: [art] Derive CDI
2,816,219 UART: [art] Store in in slot 0x4
2,901,356 UART: [art] Derive Key Pair
2,901,716 UART: [art] Store priv key in slot 0x5
2,914,834 UART: [art] Derive Key Pair - Done
2,929,672 UART: [art] Signing Cert with AUTHO
2,930,152 UART: RITY.KEYID = 7
2,945,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,913 UART: [art] PUB.X = E585C8414075869439E8EC72981256057E3E9837DE41BF26E37078C4429EC576DBE8CAECB9CC9E27A1CAB1252258C374
2,952,680 UART: [art] PUB.Y = EDA45D055834398BA0AC5930E15E880D737D8AF1A4297142FA23BB0C35212020E7DBF06EEA114093A18968CDEB3278D4
2,959,625 UART: [art] SIG.R = 0C4967EBC42B3DB48509A356D69E20EF1503526296AADC7D3EA484D2CA60EC5777FDA1D52780143151635132A1D93879
2,966,384 UART: [art] SIG.S = 457F9E83AE7AB9DD313B61C7BD058113876076BF2F43BC5E98842523C5300F57457BD647D2759061E8FC0DE0BCF7AA40
2,989,866 UART: Caliptra RT
2,990,119 UART: [state] CFI Enabled
3,099,172 UART: [rt] RT listening for mailbox commands...
3,099,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,858 UART: [rt]cmd =0x41544d4e, len=14344
3,367,799 >>> mbox cmd response data (8 bytes)
3,367,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,819 UART: [rt]cmd =0x41545348, len=116
3,399,761 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,864 UART: [fht] FHT @ 0x50003400
1,173,696 UART: [idev] ++
1,173,864 UART: [idev] CDI.KEYID = 6
1,174,225 UART: [idev] SUBJECT.KEYID = 7
1,174,650 UART: [idev] UDS.KEYID = 0
1,174,996 ready_for_fw is high
1,174,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,366 UART: [idev] Sha1 KeyId Algorithm
1,209,340 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,244,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,971 UART: [ldev] --
1,283,461 UART: [fwproc] Wait for Commands...
1,284,062 UART: [fwproc] Recv command 0x46574c44
1,284,795 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,593 >>> mbox cmd response: success
2,776,798 UART: [afmc] ++
2,776,966 UART: [afmc] CDI.KEYID = 6
2,777,329 UART: [afmc] SUBJECT.KEYID = 7
2,777,755 UART: [afmc] AUTHORITY.KEYID = 5
2,813,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,251 UART: [afmc] --
2,857,353 UART: [cold-reset] --
2,858,365 UART: [state] Locking Datavault
2,859,688 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,292 UART: [state] Locking ICCM
2,860,790 UART: [exit] Launching FMC @ 0x40000130
2,866,119 UART:
2,866,135 UART: Running Caliptra FMC ...
2,866,543 UART:
2,866,686 UART: [state] CFI Enabled
2,877,683 UART: [fht] FMC Alias Private Key: 7
2,985,738 UART: [art] Extend RT PCRs Done
2,986,166 UART: [art] Lock RT PCRs Done
2,987,416 UART: [art] Populate DV Done
2,995,589 UART: [fht] FMC Alias Private Key: 7
2,996,759 UART: [art] Derive CDI
2,997,039 UART: [art] Store in in slot 0x4
3,082,418 UART: [art] Derive Key Pair
3,082,778 UART: [art] Store priv key in slot 0x5
3,095,994 UART: [art] Derive Key Pair - Done
3,110,926 UART: [art] Signing Cert with AUTHO
3,111,406 UART: RITY.KEYID = 7
3,126,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,477 UART: [art] PUB.X = EAC81C8EA3399A5F0A41DFAC319AB4C675C7A9D02BD7068DE8DA88380978454D5055BEF5555F8709222FCE72C2EEC5C7
3,134,249 UART: [art] PUB.Y = A64111DF7007A4CFCB65FD2D48CC495D71220F00A52E02613C6533B77FE593C5428E07565B09EC6881280D45479A20CB
3,141,157 UART: [art] SIG.R = D95F85BB8846B9F3A2D92FFC9FD7FD745A08F2B568244B024B5A324CF6CC80833CE50AD5848FB184CB61AA943D909671
3,147,928 UART: [art] SIG.S = D41F40F9790B1AF390786263D92B1A1D4830932DDF12F021BF9587E516F719167E454ADD0F139E204B2820A2908828CA
3,171,655 UART: Caliptra RT
3,172,000 UART: [state] CFI Enabled
3,279,502 UART: [rt] RT listening for mailbox commands...
3,280,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,990 UART: [rt]cmd =0x41544d4e, len=14344
3,547,981 >>> mbox cmd response data (8 bytes)
3,547,982 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,129 UART: [rt]cmd =0x41545348, len=116
3,579,797 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,903 ready_for_fw is high
1,056,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,377 >>> mbox cmd response: success
2,688,107 UART:
2,688,123 UART: Running Caliptra FMC ...
2,688,531 UART:
2,688,674 UART: [state] CFI Enabled
2,699,317 UART: [fht] FMC Alias Private Key: 7
2,807,092 UART: [art] Extend RT PCRs Done
2,807,520 UART: [art] Lock RT PCRs Done
2,808,838 UART: [art] Populate DV Done
2,816,991 UART: [fht] FMC Alias Private Key: 7
2,818,135 UART: [art] Derive CDI
2,818,415 UART: [art] Store in in slot 0x4
2,904,100 UART: [art] Derive Key Pair
2,904,460 UART: [art] Store priv key in slot 0x5
2,916,794 UART: [art] Derive Key Pair - Done
2,931,399 UART: [art] Signing Cert with AUTHO
2,931,879 UART: RITY.KEYID = 7
2,947,457 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,222 UART: [art] PUB.X = C9B9EDB9B2E0556A08316E6F537A8DD58A694F0FA2CBAB3E4CBC8945989009885D955409C6D39090861FBF567198F199
2,954,982 UART: [art] PUB.Y = 4155FA1C42580EF8B39BA3360971C58F1029315DE440ABB353C4DF25BB3C93974975002E59D5D22E426B31290C93CB03
2,961,894 UART: [art] SIG.R = B2A9392C226C3B246F1ECD22DD5EA5F179C5F40792172BC1FC4E311A5FC9A4DF9378DBF58A0885040C329981B6981116
2,968,656 UART: [art] SIG.S = 518D036CF2187637A1EC4A506DCD389601AC255C9C8505984EA8AF0B0939A6DF4EA182AAD09776E9913149FE038916CD
2,992,279 UART: Caliptra RT
2,992,624 UART: [state] CFI Enabled
3,100,943 UART: [rt] RT listening for mailbox commands...
3,101,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,501 UART: [rt]cmd =0x41544d4e, len=14344
3,369,920 >>> mbox cmd response data (8 bytes)
3,369,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,974 UART: [rt]cmd =0x41545348, len=116
3,401,664 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,253 UART:
192,600 UART: Running Caliptra ROM ...
193,780 UART:
193,959 UART: [state] CFI Enabled
266,334 UART: [state] LifecycleState = Unprovisioned
268,297 UART: [state] DebugLocked = No
269,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,755 UART: [kat] SHA2-256
444,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,967 UART: [kat] ++
455,458 UART: [kat] sha1
466,404 UART: [kat] SHA2-256
469,060 UART: [kat] SHA2-384
475,976 UART: [kat] SHA2-512-ACC
478,377 UART: [kat] ECC-384
2,771,447 UART: [kat] HMAC-384Kdf
2,783,992 UART: [kat] LMS
3,974,277 UART: [kat] --
3,979,837 UART: [cold-reset] ++
3,980,819 UART: [fht] Storing FHT @ 0x50003400
3,992,234 UART: [idev] ++
3,992,807 UART: [idev] CDI.KEYID = 6
3,993,805 UART: [idev] SUBJECT.KEYID = 7
3,994,982 UART: [idev] UDS.KEYID = 0
3,996,087 ready_for_fw is high
3,996,319 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,139,980 UART: [idev] Erasing UDS.KEYID = 0
7,329,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,949 UART: [idev] --
7,355,511 UART: [ldev] ++
7,356,077 UART: [ldev] CDI.KEYID = 6
7,357,049 UART: [ldev] SUBJECT.KEYID = 5
7,358,465 UART: [ldev] AUTHORITY.KEYID = 7
7,359,659 UART: [ldev] FE.KEYID = 1
7,405,031 UART: [ldev] Erasing FE.KEYID = 1
10,735,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,164 UART: [ldev] --
13,097,759 UART: [fwproc] Waiting for Commands...
13,100,937 UART: [fwproc] Received command 0x46574c44
13,103,115 UART: [fwproc] Received Image of size 114124 bytes
17,156,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,187 >>> mbox cmd response: success
17,623,454 UART: [afmc] ++
17,624,061 UART: [afmc] CDI.KEYID = 6
17,624,980 UART: [afmc] SUBJECT.KEYID = 7
17,626,271 UART: [afmc] AUTHORITY.KEYID = 5
20,986,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,053 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,441 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,304 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,736 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,286 UART: [afmc] --
23,361,759 UART: [cold-reset] --
23,365,320 UART: [state] Locking Datavault
23,369,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,676 UART: [state] Locking ICCM
23,373,483 UART: [exit] Launching FMC @ 0x40000130
23,381,874 UART:
23,382,103 UART: Running Caliptra FMC ...
23,383,140 UART:
23,383,308 UART: [state] CFI Enabled
23,447,248 UART: [fht] FMC Alias Private Key: 7
25,785,610 UART: [art] Extend RT PCRs Done
25,786,836 UART: [art] Lock RT PCRs Done
25,788,438 UART: [art] Populate DV Done
25,793,850 UART: [fht] FMC Alias Private Key: 7
25,795,380 UART: [art] Derive CDI
25,796,114 UART: [art] Store in in slot 0x4
25,858,400 UART: [art] Derive Key Pair
25,859,435 UART: [art] Store priv key in slot 0x5
29,152,208 UART: [art] Derive Key Pair - Done
29,165,317 UART: [art] Signing Cert with AUTHO
29,166,630 UART: RITY.KEYID = 7
31,453,212 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,719 UART: [art] PUB.X = 6B55FBB97406A962BB4DE6751425C0CD342E393003FBA4E5390B18437B3BFAF8561EC90798BC72FE2BA913906438C1AD
31,461,976 UART: [art] PUB.Y = 0C1AEA7689C8CB38BF1478D440C3FBF49CA765880BC0733AE158CF0A4D6FC8DA09174099222CFFF54EB20CB122FE35D4
31,469,238 UART: [art] SIG.R = 9ED710948DEA7A2363C435C26601E307236499D80CD05F89EA20418A660FDDB62837AAFE33D9828DDB349745B5586018
31,476,584 UART: [art] SIG.S = D9506682898A91EBCA94792280D8CAF555DCCF8E5428CA7DC74A39D45EC116452A42448915A044E605DBB96732B1D888
32,781,255 UART: Caliptra RT
32,781,956 UART: [state] CFI Enabled
32,941,975 UART: [rt] RT listening for mailbox commands...
37,119,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,274,443 UART: [rt]cmd =0x41544d4e, len=14344
42,509,979 >>> mbox cmd response data (8 bytes)
42,510,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,541,560 UART: [rt]cmd =0x41545348, len=116
42,561,893 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,208 UART:
192,570 UART: Running Caliptra ROM ...
193,746 UART:
193,899 UART: [state] CFI Enabled
267,984 UART: [state] LifecycleState = Unprovisioned
269,953 UART: [state] DebugLocked = No
271,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,495 UART: [kat] SHA2-256
446,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,683 UART: [kat] ++
457,319 UART: [kat] sha1
468,011 UART: [kat] SHA2-256
470,740 UART: [kat] SHA2-384
477,932 UART: [kat] SHA2-512-ACC
480,296 UART: [kat] ECC-384
2,768,337 UART: [kat] HMAC-384Kdf
2,800,247 UART: [kat] LMS
3,990,562 UART: [kat] --
3,994,791 UART: [cold-reset] ++
3,997,362 UART: [fht] Storing FHT @ 0x50003400
4,009,691 UART: [idev] ++
4,010,259 UART: [idev] CDI.KEYID = 6
4,011,259 UART: [idev] SUBJECT.KEYID = 7
4,012,504 UART: [idev] UDS.KEYID = 0
4,013,469 ready_for_fw is high
4,013,667 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,251 UART: [idev] Erasing UDS.KEYID = 0
7,347,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,379 UART: [idev] --
7,374,074 UART: [ldev] ++
7,374,645 UART: [ldev] CDI.KEYID = 6
7,375,611 UART: [ldev] SUBJECT.KEYID = 5
7,376,692 UART: [ldev] AUTHORITY.KEYID = 7
7,378,032 UART: [ldev] FE.KEYID = 1
7,423,473 UART: [ldev] Erasing FE.KEYID = 1
10,755,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,914 UART: [ldev] --
13,116,911 UART: [fwproc] Waiting for Commands...
13,119,868 UART: [fwproc] Received command 0x46574c44
13,122,123 UART: [fwproc] Received Image of size 114124 bytes
17,173,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,309 >>> mbox cmd response: success
17,639,708 UART: [afmc] ++
17,640,357 UART: [afmc] CDI.KEYID = 6
17,641,252 UART: [afmc] SUBJECT.KEYID = 7
17,642,297 UART: [afmc] AUTHORITY.KEYID = 5
21,009,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,712 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,971 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,420 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,230 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,658 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,909 UART: [afmc] --
23,377,124 UART: [cold-reset] --
23,381,256 UART: [state] Locking Datavault
23,386,091 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,837 UART: [state] Locking ICCM
23,389,538 UART: [exit] Launching FMC @ 0x40000130
23,397,936 UART:
23,398,172 UART: Running Caliptra FMC ...
23,399,273 UART:
23,399,429 UART: [state] CFI Enabled
23,466,766 UART: [fht] FMC Alias Private Key: 7
25,804,444 UART: [art] Extend RT PCRs Done
25,805,669 UART: [art] Lock RT PCRs Done
25,807,479 UART: [art] Populate DV Done
25,812,946 UART: [fht] FMC Alias Private Key: 7
25,814,495 UART: [art] Derive CDI
25,815,258 UART: [art] Store in in slot 0x4
25,875,431 UART: [art] Derive Key Pair
25,876,471 UART: [art] Store priv key in slot 0x5
29,168,792 UART: [art] Derive Key Pair - Done
29,181,999 UART: [art] Signing Cert with AUTHO
29,183,293 UART: RITY.KEYID = 7
31,470,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,139 UART: [art] PUB.X = 80D5C32E0B1545491288617AE97D80B47B138265BB0AB8C5C408D6096BE2F1EF3DA90126EDA0837ADAA73DF44236002E
31,479,343 UART: [art] PUB.Y = 90D22FF33BCBB45F96A0B76AAFCA5D7A772F274466F9A064005A68A11512E572AB0C88F3F6C3CD5F92A75B6D97C62212
31,486,638 UART: [art] SIG.R = B27DAD4886BB72595F5457F874E20FB5944D866B22AFD10414BAC511AC3048AFB5386DF85FEA607D7A7B4A8A2E1A1874
31,493,986 UART: [art] SIG.S = 6CB42F3B7C9AEF3015D75E19A8DF162673C01233A420B4D380EE3FE3921543934A6B76508305EE829A7A88048AD56E93
32,798,874 UART: Caliptra RT
32,799,578 UART: [state] CFI Enabled
32,960,998 UART: [rt] RT listening for mailbox commands...
32,963,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,118,876 UART: [rt]cmd =0x41544d4e, len=14344
38,354,658 >>> mbox cmd response data (8 bytes)
38,355,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,385,913 UART: [rt]cmd =0x41545348, len=116
38,388,334 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,789,068 ready_for_fw is high
3,789,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,881,394 >>> mbox cmd response: success
23,569,208 UART:
23,569,611 UART: Running Caliptra FMC ...
23,570,729 UART:
23,570,892 UART: [state] CFI Enabled
23,640,632 UART: [fht] FMC Alias Private Key: 7
25,978,267 UART: [art] Extend RT PCRs Done
25,979,498 UART: [art] Lock RT PCRs Done
25,981,123 UART: [art] Populate DV Done
25,986,272 UART: [fht] FMC Alias Private Key: 7
25,987,776 UART: [art] Derive CDI
25,988,543 UART: [art] Store in in slot 0x4
26,048,720 UART: [art] Derive Key Pair
26,049,763 UART: [art] Store priv key in slot 0x5
29,342,292 UART: [art] Derive Key Pair - Done
29,355,072 UART: [art] Signing Cert with AUTHO
29,356,377 UART: RITY.KEYID = 7
31,642,965 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,484 UART: [art] PUB.X = 5D04A272E8EDD234387E6DBCE0761694D33FD66ED052EB19CFB60B1EA670C1398D2A60FD0A1C39BF54B26932DBC53650
31,651,685 UART: [art] PUB.Y = E0FD8EA5F455732299A9769CD8F4340B1C103089E391B9BA8F0FE0F8AC8016C8D9839A494E1AC0B066506DD23C4832D7
31,658,965 UART: [art] SIG.R = 742216129572156AD09A868782CDD833BFD2E0DA54718C1844CEB2E679D2DD41AE93582842E9A0DE4B52FFEE188ECE09
31,666,305 UART: [art] SIG.S = 06000B7B160535D71167D2DAD2E83E70D340BAECA357B7079149D52C0073306B5D1A061BDC8C8AF710520BAAFCE06DF4
32,971,797 UART: Caliptra RT
32,972,512 UART: [state] CFI Enabled
33,153,704 UART: [rt] RT listening for mailbox commands...
37,330,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,486,368 UART: [rt]cmd =0x41544d4e, len=14344
42,722,054 >>> mbox cmd response data (8 bytes)
42,722,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,753,411 UART: [rt]cmd =0x41545348, len=116
42,773,635 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,802,287 ready_for_fw is high
3,802,668 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,862,194 >>> mbox cmd response: success
23,547,657 UART:
23,548,079 UART: Running Caliptra FMC ...
23,549,185 UART:
23,549,338 UART: [state] CFI Enabled
23,617,470 UART: [fht] FMC Alias Private Key: 7
25,954,940 UART: [art] Extend RT PCRs Done
25,956,173 UART: [art] Lock RT PCRs Done
25,957,943 UART: [art] Populate DV Done
25,963,494 UART: [fht] FMC Alias Private Key: 7
25,965,040 UART: [art] Derive CDI
25,965,781 UART: [art] Store in in slot 0x4
26,026,178 UART: [art] Derive Key Pair
26,027,224 UART: [art] Store priv key in slot 0x5
29,319,982 UART: [art] Derive Key Pair - Done
29,333,135 UART: [art] Signing Cert with AUTHO
29,334,441 UART: RITY.KEYID = 7
31,622,523 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,044 UART: [art] PUB.X = B03CC7EA27DA22433871EF1E95F7FA91EB9EA4EA5FC55AE2EBF8ED3DAE164EF954B3F47EE392BED7C058690116A16946
31,631,299 UART: [art] PUB.Y = DB2A2BE8C363E1844993F2F12511C134059D5BA08E8B5158B2F005A0C725014C9499CEE89A49CE98042F383F62633738
31,638,513 UART: [art] SIG.R = D6A8726FEAE804DBD8BB3322984DBF8376CEF8B8CBA66826E5978F789BC986D579AE611A2BA559AFDB130676E61396C6
31,645,905 UART: [art] SIG.S = 3A6B76776262294ADFBE5CC392B4CE30B554F2B0629377FB0679ED3F17C8C2285BB1CC378FDD2E089169FA9A4D48748A
32,951,145 UART: Caliptra RT
32,951,848 UART: [state] CFI Enabled
33,113,064 UART: [rt] RT listening for mailbox commands...
33,115,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,270,954 UART: [rt]cmd =0x41544d4e, len=14344
38,506,578 >>> mbox cmd response data (8 bytes)
38,507,155 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,538,003 UART: [rt]cmd =0x41545348, len=116
38,540,218 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,439 UART:
192,806 UART: Running Caliptra ROM ...
194,011 UART:
603,839 UART: [state] CFI Enabled
622,602 UART: [state] LifecycleState = Unprovisioned
624,594 UART: [state] DebugLocked = No
627,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,259 UART: [kat] SHA2-256
802,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,586 UART: [kat] ++
813,028 UART: [kat] sha1
823,896 UART: [kat] SHA2-256
826,609 UART: [kat] SHA2-384
832,381 UART: [kat] SHA2-512-ACC
834,754 UART: [kat] ECC-384
3,118,788 UART: [kat] HMAC-384Kdf
3,129,882 UART: [kat] LMS
4,320,035 UART: [kat] --
4,325,993 UART: [cold-reset] ++
4,328,069 UART: [fht] Storing FHT @ 0x50003400
4,340,466 UART: [idev] ++
4,341,021 UART: [idev] CDI.KEYID = 6
4,341,976 UART: [idev] SUBJECT.KEYID = 7
4,343,211 UART: [idev] UDS.KEYID = 0
4,344,185 ready_for_fw is high
4,344,391 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,152 UART: [idev] Erasing UDS.KEYID = 0
7,627,820 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,509 UART: [idev] --
7,651,342 UART: [ldev] ++
7,651,910 UART: [ldev] CDI.KEYID = 6
7,652,848 UART: [ldev] SUBJECT.KEYID = 5
7,654,022 UART: [ldev] AUTHORITY.KEYID = 7
7,655,353 UART: [ldev] FE.KEYID = 1
7,665,664 UART: [ldev] Erasing FE.KEYID = 1
10,951,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,451 UART: [ldev] --
13,311,064 UART: [fwproc] Waiting for Commands...
13,313,965 UART: [fwproc] Received command 0x46574c44
13,316,139 UART: [fwproc] Received Image of size 114124 bytes
17,357,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,381 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,073 >>> mbox cmd response: success
17,827,572 UART: [afmc] ++
17,828,159 UART: [afmc] CDI.KEYID = 6
17,829,108 UART: [afmc] SUBJECT.KEYID = 7
17,830,319 UART: [afmc] AUTHORITY.KEYID = 5
21,142,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,562 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,953 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,784 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,259 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,195 UART: [afmc] --
23,506,801 UART: [cold-reset] --
23,511,364 UART: [state] Locking Datavault
23,517,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,791 UART: [state] Locking ICCM
23,521,418 UART: [exit] Launching FMC @ 0x40000130
23,529,812 UART:
23,530,049 UART: Running Caliptra FMC ...
23,531,170 UART:
23,531,330 UART: [state] CFI Enabled
23,539,372 UART: [fht] FMC Alias Private Key: 7
25,870,343 UART: [art] Extend RT PCRs Done
25,871,569 UART: [art] Lock RT PCRs Done
25,873,336 UART: [art] Populate DV Done
25,878,908 UART: [fht] FMC Alias Private Key: 7
25,880,491 UART: [art] Derive CDI
25,881,218 UART: [art] Store in in slot 0x4
25,923,644 UART: [art] Derive Key Pair
25,924,688 UART: [art] Store priv key in slot 0x5
29,166,697 UART: [art] Derive Key Pair - Done
29,179,611 UART: [art] Signing Cert with AUTHO
29,180,925 UART: RITY.KEYID = 7
31,460,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,890 UART: [art] PUB.X = 42A46AC743232908FF89E8FD5056D413826DFA1B4E0CC804F216BAB18D2545D3B3392A4A95143B99CC435D0DC202452F
31,469,147 UART: [art] PUB.Y = E234A8FDBC03B382FA6BA2F488971D5AA0E6B11A4EBB1BB37178E6CB7C2764A7AAFFEBA883107504B8D37A20D3539865
31,476,419 UART: [art] SIG.R = 67A6DF97013F3EC9D6564AC86806E952FBC2F804B0981210939D9027A0A25BD05F9B88ED44D221CCDEC6263A3034CD8B
31,483,795 UART: [art] SIG.S = D6E79DA999C8532CC7CB96ED31A481E8EEA8FD2F1EFEC333BC5BF630F100017EC8B130AEB0F4294F4D35C9D6E0500B4F
32,789,316 UART: Caliptra RT
32,790,020 UART: [state] CFI Enabled
32,906,916 UART: [rt] RT listening for mailbox commands...
36,933,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,089,224 UART: [rt]cmd =0x41544d4e, len=14344
42,324,997 >>> mbox cmd response data (8 bytes)
42,325,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,356,419 UART: [rt]cmd =0x41545348, len=116
42,375,819 >>> mbox cmd response data (12 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,535 UART:
192,894 UART: Running Caliptra ROM ...
194,064 UART:
603,949 UART: [state] CFI Enabled
619,821 UART: [state] LifecycleState = Unprovisioned
621,754 UART: [state] DebugLocked = No
623,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,693 UART: [kat] SHA2-256
798,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,985 UART: [kat] ++
809,480 UART: [kat] sha1
821,862 UART: [kat] SHA2-256
824,562 UART: [kat] SHA2-384
830,838 UART: [kat] SHA2-512-ACC
833,199 UART: [kat] ECC-384
3,118,065 UART: [kat] HMAC-384Kdf
3,130,508 UART: [kat] LMS
4,320,602 UART: [kat] --
4,325,469 UART: [cold-reset] ++
4,326,551 UART: [fht] Storing FHT @ 0x50003400
4,338,687 UART: [idev] ++
4,339,357 UART: [idev] CDI.KEYID = 6
4,340,268 UART: [idev] SUBJECT.KEYID = 7
4,341,503 UART: [idev] UDS.KEYID = 0
4,342,563 ready_for_fw is high
4,342,761 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,950 UART: [idev] Erasing UDS.KEYID = 0
7,624,903 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,943 UART: [idev] --
7,651,007 UART: [ldev] ++
7,651,572 UART: [ldev] CDI.KEYID = 6
7,652,528 UART: [ldev] SUBJECT.KEYID = 5
7,653,732 UART: [ldev] AUTHORITY.KEYID = 7
7,655,006 UART: [ldev] FE.KEYID = 1
7,666,028 UART: [ldev] Erasing FE.KEYID = 1
10,953,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,031 UART: [ldev] --
13,313,523 UART: [fwproc] Waiting for Commands...
13,316,548 UART: [fwproc] Received command 0x46574c44
13,318,784 UART: [fwproc] Received Image of size 114124 bytes
17,367,624 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,101 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,144 >>> mbox cmd response: success
17,838,785 UART: [afmc] ++
17,839,454 UART: [afmc] CDI.KEYID = 6
17,840,372 UART: [afmc] SUBJECT.KEYID = 7
17,841,537 UART: [afmc] AUTHORITY.KEYID = 5
21,157,653 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,374 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,714 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,537 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,980 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,240 UART: [afmc] --
23,521,156 UART: [cold-reset] --
23,525,230 UART: [state] Locking Datavault
23,531,767 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,596 UART: [state] Locking ICCM
23,534,570 UART: [exit] Launching FMC @ 0x40000130
23,542,966 UART:
23,543,201 UART: Running Caliptra FMC ...
23,544,299 UART:
23,544,455 UART: [state] CFI Enabled
23,552,872 UART: [fht] FMC Alias Private Key: 7
25,883,684 UART: [art] Extend RT PCRs Done
25,884,920 UART: [art] Lock RT PCRs Done
25,886,406 UART: [art] Populate DV Done
25,891,764 UART: [fht] FMC Alias Private Key: 7
25,893,245 UART: [art] Derive CDI
25,893,975 UART: [art] Store in in slot 0x4
25,936,779 UART: [art] Derive Key Pair
25,937,814 UART: [art] Store priv key in slot 0x5
29,179,975 UART: [art] Derive Key Pair - Done
29,192,808 UART: [art] Signing Cert with AUTHO
29,194,109 UART: RITY.KEYID = 7
31,473,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,007 UART: [art] PUB.X = C625AB20B0BA1649825DE80AE2AEF3ABAB7AB81282155A912000EDB8D1BDB993ED433B7890B00E056DBDBB6E84FE3166
31,482,305 UART: [art] PUB.Y = D899EF1190B6D09EDD715620DF31A83E1915EAC5FDD5DA15F3F60E5A16D8E9BF92C9609DEAB288FC152636679E7296C7
31,489,573 UART: [art] SIG.R = A71AB27210A7CBD581D90812F28B659A360E239B423A3B572CA0E27D5EBBF2C604C60DAED15941F580B50A4C75ED0705
31,496,944 UART: [art] SIG.S = 5425F3E9E209D64C48C2F2415C245B1588A7250ACC6F673EFE5A7F47242514A7C953D7EE61D536C3E2316DE96D2C6BF3
32,802,219 UART: Caliptra RT
32,802,955 UART: [state] CFI Enabled
32,920,184 UART: [rt] RT listening for mailbox commands...
32,922,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,078,327 UART: [rt]cmd =0x41544d4e, len=14344
38,314,208 >>> mbox cmd response data (8 bytes)
38,314,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,345,494 UART: [rt]cmd =0x41545348, len=116
38,347,511 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,133,174 ready_for_fw is high
4,133,821 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,081,452 >>> mbox cmd response: success
23,719,400 UART:
23,719,785 UART: Running Caliptra FMC ...
23,720,888 UART:
23,721,033 UART: [state] CFI Enabled
23,729,102 UART: [fht] FMC Alias Private Key: 7
26,060,314 UART: [art] Extend RT PCRs Done
26,061,536 UART: [art] Lock RT PCRs Done
26,063,029 UART: [art] Populate DV Done
26,068,387 UART: [fht] FMC Alias Private Key: 7
26,070,031 UART: [art] Derive CDI
26,070,786 UART: [art] Store in in slot 0x4
26,113,827 UART: [art] Derive Key Pair
26,114,869 UART: [art] Store priv key in slot 0x5
29,357,470 UART: [art] Derive Key Pair - Done
29,370,538 UART: [art] Signing Cert with AUTHO
29,371,846 UART: RITY.KEYID = 7
31,651,091 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,606 UART: [art] PUB.X = 49896BC03B7F9C2E017C729B9AE730CA777FFB14CD1BC837E7BDC1F2C771071F7752E3F197FA82B39AA8E1C636C82EEA
31,659,882 UART: [art] PUB.Y = 246F6020BB34BDADA559351EF63A70CE140A8DB17C11B1F91760E3D8F3EBE625C076E84186D74E1F324C28D71A0FC9B9
31,667,160 UART: [art] SIG.R = 9275891D81E7614C190C7B48E749C1607C46AD1B671A78C4F0B0BD2A7A1431A81E0C92151C96013E81A777CE6E7B5B9C
31,674,508 UART: [art] SIG.S = 55208BA1EBF509C2CDB69BD3D7AB2EA38488236541A37C28A84CDE7820A0C76E0997EF95B47AEAC8E51AB6FB5802B89F
32,979,566 UART: Caliptra RT
32,980,271 UART: [state] CFI Enabled
33,098,398 UART: [rt] RT listening for mailbox commands...
37,124,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,280,379 UART: [rt]cmd =0x41544d4e, len=14344
42,516,317 >>> mbox cmd response data (8 bytes)
42,517,422 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,547,935 UART: [rt]cmd =0x41545348, len=116
42,567,317 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,125,058 ready_for_fw is high
4,125,495 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,931 >>> mbox cmd response: success
23,699,844 UART:
23,700,280 UART: Running Caliptra FMC ...
23,701,419 UART:
23,701,575 UART: [state] CFI Enabled
23,709,415 UART: [fht] FMC Alias Private Key: 7
26,039,756 UART: [art] Extend RT PCRs Done
26,040,992 UART: [art] Lock RT PCRs Done
26,042,510 UART: [art] Populate DV Done
26,047,692 UART: [fht] FMC Alias Private Key: 7
26,049,398 UART: [art] Derive CDI
26,050,213 UART: [art] Store in in slot 0x4
26,092,831 UART: [art] Derive Key Pair
26,093,900 UART: [art] Store priv key in slot 0x5
29,336,762 UART: [art] Derive Key Pair - Done
29,349,651 UART: [art] Signing Cert with AUTHO
29,350,961 UART: RITY.KEYID = 7
31,630,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,053 UART: [art] PUB.X = 242B294AF3591AAAFD0E555BBB6B8F44E0A020E1E07D105F1B70304A37DFA0B03B551E748ED8883DFC8D4566FF18A98E
31,639,306 UART: [art] PUB.Y = B1CD4CC95D6394C9874AC1E2E5E0DA04C4DD26DD13E155566B6E549D98BBF2169E9B780FBDCEF28385C06C2E9F30244E
31,646,564 UART: [art] SIG.R = 9945CBDAD0C97F78F4D466C7D3697DA5892AF807FF0335F4F5236DA451570A5433EF55D9CB423214753B8DA1AC06841B
31,653,954 UART: [art] SIG.S = D1E0F02754FCE7B192FF38BD9A4BE83E0EDD345B2CCEA026E3EB358D681BB8CC147AAACCB52739076B69BC088FD9FC40
32,959,707 UART: Caliptra RT
32,960,420 UART: [state] CFI Enabled
33,077,918 UART: [rt] RT listening for mailbox commands...
33,080,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,235,420 UART: [rt]cmd =0x41544d4e, len=14344
38,471,191 >>> mbox cmd response data (8 bytes)
38,471,798 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,502,588 UART: [rt]cmd =0x41545348, len=116
38,505,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,187 UART:
192,563 UART: Running Caliptra ROM ...
193,703 UART:
193,847 UART: [state] CFI Enabled
265,796 UART: [state] LifecycleState = Unprovisioned
267,711 UART: [state] DebugLocked = No
269,390 UART: [state] WD Timer not started. Device not locked for debugging
273,286 UART: [kat] SHA2-256
452,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,011 UART: [kat] ++
464,463 UART: [kat] sha1
475,261 UART: [kat] SHA2-256
478,275 UART: [kat] SHA2-384
484,546 UART: [kat] SHA2-512-ACC
487,498 UART: [kat] ECC-384
2,948,028 UART: [kat] HMAC-384Kdf
2,971,407 UART: [kat] LMS
3,500,921 UART: [kat] --
3,504,210 UART: [cold-reset] ++
3,506,277 UART: [fht] FHT @ 0x50003400
3,518,528 UART: [idev] ++
3,519,099 UART: [idev] CDI.KEYID = 6
3,519,993 UART: [idev] SUBJECT.KEYID = 7
3,521,236 UART: [idev] UDS.KEYID = 0
3,522,138 ready_for_fw is high
3,522,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,360 UART: [idev] Erasing UDS.KEYID = 0
6,025,518 UART: [idev] Sha1 KeyId Algorithm
6,048,696 UART: [idev] --
6,052,418 UART: [ldev] ++
6,053,011 UART: [ldev] CDI.KEYID = 6
6,053,941 UART: [ldev] SUBJECT.KEYID = 5
6,055,103 UART: [ldev] AUTHORITY.KEYID = 7
6,056,331 UART: [ldev] FE.KEYID = 1
6,100,899 UART: [ldev] Erasing FE.KEYID = 1
8,604,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,431 UART: [ldev] --
10,415,054 UART: [fwproc] Wait for Commands...
10,417,676 UART: [fwproc] Recv command 0x46574c44
10,419,716 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,663 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,291,432 >>> mbox cmd response: success
14,295,993 UART: [afmc] ++
14,296,584 UART: [afmc] CDI.KEYID = 6
14,297,494 UART: [afmc] SUBJECT.KEYID = 7
14,298,708 UART: [afmc] AUTHORITY.KEYID = 5
16,828,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,987 UART: [afmc] --
18,627,252 UART: [cold-reset] --
18,629,111 UART: [state] Locking Datavault
18,636,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,451 UART: [state] Locking ICCM
18,640,442 UART: [exit] Launching FMC @ 0x40000130
18,648,839 UART:
18,649,073 UART: Running Caliptra FMC ...
18,650,176 UART:
18,650,335 UART: [state] CFI Enabled
18,707,391 UART: [fht] FMC Alias Private Key: 7
20,471,663 UART: [art] Extend RT PCRs Done
20,472,874 UART: [art] Lock RT PCRs Done
20,474,927 UART: [art] Populate DV Done
20,480,337 UART: [fht] FMC Alias Private Key: 7
20,481,988 UART: [art] Derive CDI
20,482,804 UART: [art] Store in in slot 0x4
20,539,579 UART: [art] Derive Key Pair
20,540,616 UART: [art] Store priv key in slot 0x5
23,003,112 UART: [art] Derive Key Pair - Done
23,015,789 UART: [art] Signing Cert with AUTHO
23,017,096 UART: RITY.KEYID = 7
24,729,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,304 UART: [art] PUB.X = 2A99C0A2E5D8A9A4A47962AE758820CA83D5BE8075C8AD27994DDF2C099C7EBEC23DBAE33B21AAB28C1B011F25A89493
24,738,407 UART: [art] PUB.Y = 869B82A0C7518928F0D6A5259AD514F9FBFE6714A483DC342161F0689C8AB162D235225D9F5AE7F3D5260459F9C037CD
24,745,647 UART: [art] SIG.R = B266CB0ECE0121DB9ECCC6DC5058E5DDADD618EC3C1455A61F259BCCA1A92151B21533EB5788281A8F5F41B7BADBC5A2
24,753,089 UART: [art] SIG.S = FC96A93003AAFF63169494B3A1537AEFC164ECA74D8253A860F4AAECF1D000E654CF967FCEEBDF7C87D5C138A5819744
25,732,054 UART: Caliptra RT
25,732,764 UART: [state] CFI Enabled
25,898,218 UART: [rt] RT listening for mailbox commands...
29,945,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,101,839 UART: [rt]cmd =0x41544d4e, len=14344
34,032,242 >>> mbox cmd response data (8 bytes)
34,032,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,063,552 UART: [rt]cmd =0x41545348, len=116
34,083,207 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,174 UART:
192,534 UART: Running Caliptra ROM ...
193,697 UART:
193,853 UART: [state] CFI Enabled
260,026 UART: [state] LifecycleState = Unprovisioned
261,949 UART: [state] DebugLocked = No
264,762 UART: [state] WD Timer not started. Device not locked for debugging
268,587 UART: [kat] SHA2-256
447,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,284 UART: [kat] ++
459,820 UART: [kat] sha1
470,001 UART: [kat] SHA2-256
473,007 UART: [kat] SHA2-384
478,505 UART: [kat] SHA2-512-ACC
481,508 UART: [kat] ECC-384
2,948,267 UART: [kat] HMAC-384Kdf
2,969,958 UART: [kat] LMS
3,499,421 UART: [kat] --
3,503,919 UART: [cold-reset] ++
3,505,842 UART: [fht] FHT @ 0x50003400
3,517,242 UART: [idev] ++
3,517,800 UART: [idev] CDI.KEYID = 6
3,518,718 UART: [idev] SUBJECT.KEYID = 7
3,519,889 UART: [idev] UDS.KEYID = 0
3,520,944 ready_for_fw is high
3,521,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,088 UART: [idev] Erasing UDS.KEYID = 0
6,024,398 UART: [idev] Sha1 KeyId Algorithm
6,046,922 UART: [idev] --
6,050,270 UART: [ldev] ++
6,050,842 UART: [ldev] CDI.KEYID = 6
6,051,754 UART: [ldev] SUBJECT.KEYID = 5
6,052,935 UART: [ldev] AUTHORITY.KEYID = 7
6,054,284 UART: [ldev] FE.KEYID = 1
6,098,346 UART: [ldev] Erasing FE.KEYID = 1
8,601,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,050 UART: [ldev] --
10,411,924 UART: [fwproc] Wait for Commands...
10,414,557 UART: [fwproc] Recv command 0x46574c44
10,416,647 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,247 >>> mbox cmd response: success
14,286,540 UART: [afmc] ++
14,287,199 UART: [afmc] CDI.KEYID = 6
14,288,121 UART: [afmc] SUBJECT.KEYID = 7
14,289,141 UART: [afmc] AUTHORITY.KEYID = 5
16,830,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,300 UART: [afmc] --
18,630,213 UART: [cold-reset] --
18,634,046 UART: [state] Locking Datavault
18,639,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,158 UART: [state] Locking ICCM
18,642,387 UART: [exit] Launching FMC @ 0x40000130
18,650,833 UART:
18,651,064 UART: Running Caliptra FMC ...
18,652,164 UART:
18,652,328 UART: [state] CFI Enabled
18,712,111 UART: [fht] FMC Alias Private Key: 7
20,475,825 UART: [art] Extend RT PCRs Done
20,477,017 UART: [art] Lock RT PCRs Done
20,479,018 UART: [art] Populate DV Done
20,484,485 UART: [fht] FMC Alias Private Key: 7
20,486,022 UART: [art] Derive CDI
20,486,854 UART: [art] Store in in slot 0x4
20,544,593 UART: [art] Derive Key Pair
20,545,642 UART: [art] Store priv key in slot 0x5
23,008,875 UART: [art] Derive Key Pair - Done
23,021,816 UART: [art] Signing Cert with AUTHO
23,023,141 UART: RITY.KEYID = 7
24,734,658 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,143 UART: [art] PUB.X = B508D87E68B04974E20FC0747173951F4F100C26118F09CB66E3A3440D07B4B3AD4BEB9A0C33F3661FBEC78366F9B6AC
24,743,381 UART: [art] PUB.Y = 8F81A7001492154363AE4AFFC21E625353DE4963D5C246ACD87C768E2EE268FDF12B310B392EF98DE8AC429D3AD12EFF
24,750,661 UART: [art] SIG.R = D0D1FC709FC81EEDC9D7AE7B226E650AE3664FDBC0063CF0D9A6C9F58B905AE5859FF5670AB7EAC4B7154D46916FFC81
24,758,098 UART: [art] SIG.S = BA8468B084897F5CCFFCE040E546D2FA668DA5C9BDB18B42A3FF665711B5F0B2991B570F68ED1B3DA14A1A1E6923214B
25,736,902 UART: Caliptra RT
25,737,611 UART: [state] CFI Enabled
25,903,758 UART: [rt] RT listening for mailbox commands...
25,906,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,510 UART: [rt]cmd =0x41544d4e, len=14344
29,992,296 >>> mbox cmd response data (8 bytes)
29,992,880 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,023,678 UART: [rt]cmd =0x41545348, len=116
30,025,894 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,355,753 ready_for_fw is high
3,356,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,009,230 >>> mbox cmd response: success
18,302,420 UART:
18,302,828 UART: Running Caliptra FMC ...
18,304,022 UART:
18,304,190 UART: [state] CFI Enabled
18,365,594 UART: [fht] FMC Alias Private Key: 7
20,129,295 UART: [art] Extend RT PCRs Done
20,130,517 UART: [art] Lock RT PCRs Done
20,131,929 UART: [art] Populate DV Done
20,137,193 UART: [fht] FMC Alias Private Key: 7
20,138,844 UART: [art] Derive CDI
20,139,670 UART: [art] Store in in slot 0x4
20,197,979 UART: [art] Derive Key Pair
20,199,022 UART: [art] Store priv key in slot 0x5
22,662,367 UART: [art] Derive Key Pair - Done
22,675,321 UART: [art] Signing Cert with AUTHO
22,676,622 UART: RITY.KEYID = 7
24,388,216 UART: [art] Erasing AUTHORITY.KEYID = 7
24,389,737 UART: [art] PUB.X = B6C66279865CECC83CB91AB919BD1F9CE9DBF102F2FC18D39D17E892DD568BC6B6F4B62CC18E479440EF4C7F5577F645
24,397,005 UART: [art] PUB.Y = D0C4F17B26837FDD2A30D59C730E72DA950DCF0C241F41DD55C131DEADA96647216DB05422DDE8CB33B8993DBEACAF68
24,404,233 UART: [art] SIG.R = C30AAD5AE468E51C1D675E95BD37711B3C8C8BB6D24C5AC35A67FF5E86EC4E6CFCED5BD5A423E7E1C56C8B8A2C1D8444
24,411,686 UART: [art] SIG.S = D6C874920F517A7D92F14A3035F7C2B62A21696687EE5C5C4DFB4733ADCE2E1C760A5A027736528E9542056763D75DB2
25,390,838 UART: Caliptra RT
25,391,537 UART: [state] CFI Enabled
25,556,316 UART: [rt] RT listening for mailbox commands...
29,584,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,741,246 UART: [rt]cmd =0x41544d4e, len=14344
33,671,316 >>> mbox cmd response data (8 bytes)
33,671,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,702,651 UART: [rt]cmd =0x41545348, len=116
33,721,850 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,381,146 ready_for_fw is high
3,381,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,171 >>> mbox cmd response: success
18,367,455 UART:
18,367,862 UART: Running Caliptra FMC ...
18,368,995 UART:
18,369,151 UART: [state] CFI Enabled
18,431,749 UART: [fht] FMC Alias Private Key: 7
20,195,986 UART: [art] Extend RT PCRs Done
20,197,208 UART: [art] Lock RT PCRs Done
20,198,533 UART: [art] Populate DV Done
20,203,728 UART: [fht] FMC Alias Private Key: 7
20,205,267 UART: [art] Derive CDI
20,206,003 UART: [art] Store in in slot 0x4
20,264,133 UART: [art] Derive Key Pair
20,265,194 UART: [art] Store priv key in slot 0x5
22,727,918 UART: [art] Derive Key Pair - Done
22,740,919 UART: [art] Signing Cert with AUTHO
22,742,256 UART: RITY.KEYID = 7
24,453,054 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,562 UART: [art] PUB.X = F46058547180301E75A78381EC614D82B92F344B796967DBF19CB0FEC4FC70F1FDA2EC09F9AF83043C035397CED82FEE
24,461,817 UART: [art] PUB.Y = AE65EA98086242FB3C1927579BF3D56E710FD8E39633273466BA4FF47969C22FDCF74D8DBAFC84C548F52300634B68DB
24,469,091 UART: [art] SIG.R = EBCBA42BFCDA42EB1036C58AFF9AF6F269824D73923FB9A48C5FE17469ACD842D3ED94F0F18FAE6C8E8D142F98E4727F
24,476,499 UART: [art] SIG.S = AF8929886C1677046917A9DE7AFBC3CEBF3561114A95AEDED451670FBF5E6133C2F2B34EFCCC6AE69C7F3CCBEF2A69B1
25,455,265 UART: Caliptra RT
25,455,965 UART: [state] CFI Enabled
25,620,877 UART: [rt] RT listening for mailbox commands...
25,623,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,778,468 UART: [rt]cmd =0x41544d4e, len=14344
29,708,628 >>> mbox cmd response data (8 bytes)
29,709,199 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,740,001 UART: [rt]cmd =0x41545348, len=116
29,742,540 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,521 UART:
192,925 UART: Running Caliptra ROM ...
194,113 UART:
603,833 UART: [state] CFI Enabled
616,327 UART: [state] LifecycleState = Unprovisioned
618,237 UART: [state] DebugLocked = No
620,108 UART: [state] WD Timer not started. Device not locked for debugging
623,565 UART: [kat] SHA2-256
802,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,316 UART: [kat] ++
814,757 UART: [kat] sha1
824,481 UART: [kat] SHA2-256
827,482 UART: [kat] SHA2-384
832,539 UART: [kat] SHA2-512-ACC
835,471 UART: [kat] ECC-384
3,279,527 UART: [kat] HMAC-384Kdf
3,290,774 UART: [kat] LMS
3,820,260 UART: [kat] --
3,825,242 UART: [cold-reset] ++
3,827,802 UART: [fht] FHT @ 0x50003400
3,838,836 UART: [idev] ++
3,839,394 UART: [idev] CDI.KEYID = 6
3,840,341 UART: [idev] SUBJECT.KEYID = 7
3,841,570 UART: [idev] UDS.KEYID = 0
3,842,500 ready_for_fw is high
3,842,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,879 UART: [idev] Erasing UDS.KEYID = 0
6,311,031 UART: [idev] Sha1 KeyId Algorithm
6,333,888 UART: [idev] --
6,337,127 UART: [ldev] ++
6,337,689 UART: [ldev] CDI.KEYID = 6
6,338,592 UART: [ldev] SUBJECT.KEYID = 5
6,339,795 UART: [ldev] AUTHORITY.KEYID = 7
6,341,051 UART: [ldev] FE.KEYID = 1
6,353,566 UART: [ldev] Erasing FE.KEYID = 1
8,822,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,169 UART: [ldev] --
10,613,772 UART: [fwproc] Wait for Commands...
10,616,574 UART: [fwproc] Recv command 0x46574c44
10,618,669 UART: [fwproc] Recv'd Img size: 114448 bytes
14,013,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,149,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,467,543 >>> mbox cmd response: success
14,472,580 UART: [afmc] ++
14,473,196 UART: [afmc] CDI.KEYID = 6
14,474,107 UART: [afmc] SUBJECT.KEYID = 7
14,475,263 UART: [afmc] AUTHORITY.KEYID = 5
16,975,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,661 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,769,559 UART: [afmc] --
18,772,481 UART: [cold-reset] --
18,776,283 UART: [state] Locking Datavault
18,781,210 UART: [state] Locking PCR0, PCR1 and PCR31
18,782,849 UART: [state] Locking ICCM
18,783,856 UART: [exit] Launching FMC @ 0x40000130
18,792,244 UART:
18,792,494 UART: Running Caliptra FMC ...
18,793,587 UART:
18,793,753 UART: [state] CFI Enabled
18,801,445 UART: [fht] FMC Alias Private Key: 7
20,558,789 UART: [art] Extend RT PCRs Done
20,560,009 UART: [art] Lock RT PCRs Done
20,561,879 UART: [art] Populate DV Done
20,567,394 UART: [fht] FMC Alias Private Key: 7
20,568,976 UART: [art] Derive CDI
20,569,705 UART: [art] Store in in slot 0x4
20,612,295 UART: [art] Derive Key Pair
20,613,323 UART: [art] Store priv key in slot 0x5
23,039,316 UART: [art] Derive Key Pair - Done
23,052,263 UART: [art] Signing Cert with AUTHO
23,053,567 UART: RITY.KEYID = 7
24,759,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,774 UART: [art] PUB.X = 0778672C71D810CB52611181670088058BD874911A21F5C82872F4959970ACEE3C2C52EADC2E8F5614D5416E1AD2A36D
24,767,997 UART: [art] PUB.Y = 7319E69F61352D7AF897F058CEE37AA4F98D846159EE434D18F305F8D2B456F7BCDCD47B46C9473CD8491887523B656B
24,775,247 UART: [art] SIG.R = 1BD38FEBFFBAB00D21F021ACE202C9EF3FE1F8771B35B8AFAD4EC1BB7EA59E35A253CE7ADB30289796EAF5983E95FF46
24,782,684 UART: [art] SIG.S = C07D3E01380D3BE1DB86E8C34883C4BB11F0CF4D6E031B8697AB3967649F6CEBFEF87C29A3CC2E70F664794FF96BF6D8
25,761,556 UART: Caliptra RT
25,762,263 UART: [state] CFI Enabled
25,878,836 UART: [rt] RT listening for mailbox commands...
29,906,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,062,244 UART: [rt]cmd =0x41544d4e, len=14344
33,992,957 >>> mbox cmd response data (8 bytes)
33,993,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,024,059 UART: [rt]cmd =0x41545348, len=116
34,043,923 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,455 UART:
192,826 UART: Running Caliptra ROM ...
193,996 UART:
603,781 UART: [state] CFI Enabled
616,410 UART: [state] LifecycleState = Unprovisioned
618,241 UART: [state] DebugLocked = No
620,341 UART: [state] WD Timer not started. Device not locked for debugging
624,233 UART: [kat] SHA2-256
803,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,975 UART: [kat] ++
815,508 UART: [kat] sha1
826,524 UART: [kat] SHA2-256
829,528 UART: [kat] SHA2-384
836,786 UART: [kat] SHA2-512-ACC
839,712 UART: [kat] ECC-384
3,280,445 UART: [kat] HMAC-384Kdf
3,292,890 UART: [kat] LMS
3,822,379 UART: [kat] --
3,825,663 UART: [cold-reset] ++
3,827,747 UART: [fht] FHT @ 0x50003400
3,838,291 UART: [idev] ++
3,838,841 UART: [idev] CDI.KEYID = 6
3,839,712 UART: [idev] SUBJECT.KEYID = 7
3,840,941 UART: [idev] UDS.KEYID = 0
3,841,907 ready_for_fw is high
3,842,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,182 UART: [idev] Erasing UDS.KEYID = 0
6,315,180 UART: [idev] Sha1 KeyId Algorithm
6,337,920 UART: [idev] --
6,341,370 UART: [ldev] ++
6,341,937 UART: [ldev] CDI.KEYID = 6
6,342,836 UART: [ldev] SUBJECT.KEYID = 5
6,344,039 UART: [ldev] AUTHORITY.KEYID = 7
6,345,263 UART: [ldev] FE.KEYID = 1
6,353,902 UART: [ldev] Erasing FE.KEYID = 1
8,827,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,781 UART: [ldev] --
10,620,130 UART: [fwproc] Wait for Commands...
10,622,545 UART: [fwproc] Recv command 0x46574c44
10,624,633 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,117,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,504,618 >>> mbox cmd response: success
14,508,987 UART: [afmc] ++
14,509,645 UART: [afmc] CDI.KEYID = 6
14,510,568 UART: [afmc] SUBJECT.KEYID = 7
14,511,673 UART: [afmc] AUTHORITY.KEYID = 5
17,012,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,734,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,834 UART: [afmc] --
18,811,388 UART: [cold-reset] --
18,815,836 UART: [state] Locking Datavault
18,821,887 UART: [state] Locking PCR0, PCR1 and PCR31
18,823,581 UART: [state] Locking ICCM
18,825,203 UART: [exit] Launching FMC @ 0x40000130
18,833,651 UART:
18,833,878 UART: Running Caliptra FMC ...
18,834,972 UART:
18,835,125 UART: [state] CFI Enabled
18,843,376 UART: [fht] FMC Alias Private Key: 7
20,600,367 UART: [art] Extend RT PCRs Done
20,601,586 UART: [art] Lock RT PCRs Done
20,602,934 UART: [art] Populate DV Done
20,608,465 UART: [fht] FMC Alias Private Key: 7
20,610,092 UART: [art] Derive CDI
20,610,830 UART: [art] Store in in slot 0x4
20,653,253 UART: [art] Derive Key Pair
20,654,245 UART: [art] Store priv key in slot 0x5
23,081,060 UART: [art] Derive Key Pair - Done
23,094,047 UART: [art] Signing Cert with AUTHO
23,095,396 UART: RITY.KEYID = 7
24,800,714 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,214 UART: [art] PUB.X = 10DF28F5A7BB950A6F16118F7C6A8B1821EBE09287E823676C9D3F67A21CD515D28AA412B3C92273548AED45759BF301
24,809,440 UART: [art] PUB.Y = 2356DD4A7A7E5BA768006D118081BE723EAA74146DD3594051CCEC0AEF7D32D9E143FE39B9DBD8130074C14B0CDD336A
24,816,707 UART: [art] SIG.R = 185F029B4A6232467AA8B20664C02931A66A5D015D66FCC133A0DA1877C321C0A81B64CC030D6B0F12CE32BB90C5B674
24,824,078 UART: [art] SIG.S = 2B1C85D6D255E1DF7519709CFA5438A859B5CE36CF0425EB850AEA60DEE4B676B8DBAB92A0DD2EF8EA7D3C926D1CECF0
25,803,089 UART: Caliptra RT
25,803,776 UART: [state] CFI Enabled
25,921,062 UART: [rt] RT listening for mailbox commands...
25,923,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,078,747 UART: [rt]cmd =0x41544d4e, len=14344
30,009,190 >>> mbox cmd response data (8 bytes)
30,009,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,040,633 UART: [rt]cmd =0x41545348, len=116
30,043,049 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,705,285 ready_for_fw is high
3,705,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,888 >>> mbox cmd response: success
18,533,161 UART:
18,533,562 UART: Running Caliptra FMC ...
18,534,744 UART:
18,534,910 UART: [state] CFI Enabled
18,543,057 UART: [fht] FMC Alias Private Key: 7
20,300,418 UART: [art] Extend RT PCRs Done
20,301,641 UART: [art] Lock RT PCRs Done
20,303,488 UART: [art] Populate DV Done
20,308,674 UART: [fht] FMC Alias Private Key: 7
20,310,267 UART: [art] Derive CDI
20,311,074 UART: [art] Store in in slot 0x4
20,353,665 UART: [art] Derive Key Pair
20,354,664 UART: [art] Store priv key in slot 0x5
22,781,356 UART: [art] Derive Key Pair - Done
22,794,512 UART: [art] Signing Cert with AUTHO
22,795,822 UART: RITY.KEYID = 7
24,501,044 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,553 UART: [art] PUB.X = 78E67DF49EEE77859A07DC5CC6D2EDA4EDF4C470F16A48428B6C42E2977D87DC56623ED58453DF347778D21EA2167C94
24,509,846 UART: [art] PUB.Y = ED327E1C823CD1542B524A00583BB8842A62954F1CBD6AED8B02B9AB71270DCD2367250209B42B81FA5E158FFB063BE5
24,517,038 UART: [art] SIG.R = 0E6B72761F5B946D2DEE8E79A79339DE221010F5A496B24E8DF6A88869A80E68A9E839240C77ACE6AD68F042F8730469
24,524,417 UART: [art] SIG.S = 5C7240A368F76D82E8FB238BB27940E91A2A9BC1102AACBBA1636082C77DA27DA366AFD5CB71270770814C3C9AB09B27
25,503,577 UART: Caliptra RT
25,504,277 UART: [state] CFI Enabled
25,621,497 UART: [rt] RT listening for mailbox commands...
29,652,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,807,795 UART: [rt]cmd =0x41544d4e, len=14344
33,738,573 >>> mbox cmd response data (8 bytes)
33,739,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,769,797 UART: [rt]cmd =0x41545348, len=116
33,789,708 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,703,976 ready_for_fw is high
3,704,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,897 >>> mbox cmd response: success
18,533,180 UART:
18,533,595 UART: Running Caliptra FMC ...
18,534,752 UART:
18,534,904 UART: [state] CFI Enabled
18,542,725 UART: [fht] FMC Alias Private Key: 7
20,299,589 UART: [art] Extend RT PCRs Done
20,300,820 UART: [art] Lock RT PCRs Done
20,302,553 UART: [art] Populate DV Done
20,307,962 UART: [fht] FMC Alias Private Key: 7
20,309,557 UART: [art] Derive CDI
20,310,368 UART: [art] Store in in slot 0x4
20,352,588 UART: [art] Derive Key Pair
20,353,622 UART: [art] Store priv key in slot 0x5
22,779,914 UART: [art] Derive Key Pair - Done
22,792,912 UART: [art] Signing Cert with AUTHO
22,794,220 UART: RITY.KEYID = 7
24,499,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,137 UART: [art] PUB.X = 8BA494260610404D04273F2C4CFD455CB114CBAB7FE2367BB0E9D3112CB2B51BC509D95331701DEAFEDA11592B464325
24,508,369 UART: [art] PUB.Y = 15296ECA1FBEC375856D973E04922421173662125A803EE2F637C0818B32152F896FDA2652B33210D0266092E18D7710
24,515,624 UART: [art] SIG.R = F5678E1DDB95A6DB9341519149FBE825A31FE84C75941108BB2B230C43EB51D2DB71923436A441D478A8E5B10395EB2F
24,522,996 UART: [art] SIG.S = 12562711DE98BD6B34DD38EF59FB5D6774FDA567CEDEB2A91600D33EE0FEDF311A11390D15344F94EB195E17BBEE5E00
25,501,801 UART: Caliptra RT
25,502,504 UART: [state] CFI Enabled
25,620,326 UART: [rt] RT listening for mailbox commands...
25,622,752 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,778,019 UART: [rt]cmd =0x41544d4e, len=14344
29,708,362 >>> mbox cmd response data (8 bytes)
29,708,947 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,739,512 UART: [rt]cmd =0x41545348, len=116
29,741,660 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,086 UART:
192,458 UART: Running Caliptra ROM ...
193,581 UART:
193,732 UART: [state] CFI Enabled
266,476 UART: [state] LifecycleState = Unprovisioned
268,875 UART: [state] DebugLocked = No
270,125 UART: [state] WD Timer not started. Device not locked for debugging
274,605 UART: [kat] SHA2-256
464,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,249 UART: [kat] ++
475,696 UART: [kat] sha1
487,633 UART: [kat] SHA2-256
490,640 UART: [kat] SHA2-384
497,576 UART: [kat] SHA2-512-ACC
500,198 UART: [kat] ECC-384
2,947,681 UART: [kat] HMAC-384Kdf
2,972,466 UART: [kat] LMS
3,504,291 UART: [kat] --
3,508,082 UART: [cold-reset] ++
3,509,586 UART: [fht] FHT @ 0x50003400
3,520,201 UART: [idev] ++
3,520,833 UART: [idev] CDI.KEYID = 6
3,521,858 UART: [idev] SUBJECT.KEYID = 7
3,523,048 UART: [idev] UDS.KEYID = 0
3,524,029 ready_for_fw is high
3,524,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,316 UART: [idev] Erasing UDS.KEYID = 0
6,028,111 UART: [idev] Sha1 KeyId Algorithm
6,050,849 UART: [idev] --
6,057,438 UART: [ldev] ++
6,058,115 UART: [ldev] CDI.KEYID = 6
6,059,054 UART: [ldev] SUBJECT.KEYID = 5
6,060,216 UART: [ldev] AUTHORITY.KEYID = 7
6,061,451 UART: [ldev] FE.KEYID = 1
6,101,620 UART: [ldev] Erasing FE.KEYID = 1
8,603,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,061 UART: [ldev] --
10,414,890 UART: [fwproc] Wait for Commands...
10,417,417 UART: [fwproc] Recv command 0x46574c44
10,419,603 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,453 >>> mbox cmd response: success
14,604,878 UART: [afmc] ++
14,605,585 UART: [afmc] CDI.KEYID = 6
14,606,751 UART: [afmc] SUBJECT.KEYID = 7
14,608,234 UART: [afmc] AUTHORITY.KEYID = 5
17,154,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,343 UART: [afmc] --
18,972,278 UART: [cold-reset] --
18,977,602 UART: [state] Locking Datavault
18,983,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,268 UART: [state] Locking ICCM
18,987,828 UART: [exit] Launching FMC @ 0x40000130
18,996,498 UART:
18,996,734 UART: Running Caliptra FMC ...
18,997,832 UART:
18,997,987 UART: [state] CFI Enabled
19,054,174 UART: [fht] FMC Alias Private Key: 7
20,818,557 UART: [art] Extend RT PCRs Done
20,819,773 UART: [art] Lock RT PCRs Done
20,821,875 UART: [art] Populate DV Done
20,827,229 UART: [fht] FMC Alias Private Key: 7
20,828,767 UART: [art] Derive CDI
20,829,501 UART: [art] Store in in slot 0x4
20,887,180 UART: [art] Derive Key Pair
20,888,171 UART: [art] Store priv key in slot 0x5
23,351,208 UART: [art] Derive Key Pair - Done
23,364,039 UART: [art] Signing Cert with AUTHO
23,365,331 UART: RITY.KEYID = 7
25,077,027 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,536 UART: [art] PUB.X = C2943C32766745BFF0E169ABB0BC5A3BCA1A343A808EBDF9452BBC10C6C0F68EC6F8A4E69C1C9F6C0FDA6E4088D812E1
25,085,842 UART: [art] PUB.Y = 8E8CDA205D7BBE2182965905BF1EDD37906938B98D855F23A063867EDB81EEF1362975A370425438C23420E0E7066B70
25,093,069 UART: [art] SIG.R = 3275417EA108FE4EF6C7C1E929B471405E4A0A5BA3047612FFEA255B2C6C003BA3414B8F9762CD31142FC8AD2242024B
25,100,456 UART: [art] SIG.S = FC5B062273C08AC3DD1504A28FCE0E5F084067806D4BA5980BD1D7C7D0BC49FC4107888FA80A2596EB53230EE61E6AB1
26,079,298 UART: Caliptra RT
26,080,008 UART: [state] CFI Enabled
26,244,950 UART: [rt] RT listening for mailbox commands...
30,286,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,442,480 UART: [rt]cmd =0x41544d4e, len=14344
34,373,056 >>> mbox cmd response data (8 bytes)
34,373,717 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,404,418 UART: [rt]cmd =0x41545348, len=116
34,424,681 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
193,177 UART:
193,533 UART: Running Caliptra ROM ...
194,721 UART:
194,875 UART: [state] CFI Enabled
263,776 UART: [state] LifecycleState = Unprovisioned
266,195 UART: [state] DebugLocked = No
268,159 UART: [state] WD Timer not started. Device not locked for debugging
272,964 UART: [kat] SHA2-256
462,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,589 UART: [kat] ++
474,065 UART: [kat] sha1
484,544 UART: [kat] SHA2-256
487,592 UART: [kat] SHA2-384
492,592 UART: [kat] SHA2-512-ACC
495,181 UART: [kat] ECC-384
2,948,817 UART: [kat] HMAC-384Kdf
2,973,072 UART: [kat] LMS
3,504,849 UART: [kat] --
3,509,688 UART: [cold-reset] ++
3,511,968 UART: [fht] FHT @ 0x50003400
3,522,804 UART: [idev] ++
3,523,636 UART: [idev] CDI.KEYID = 6
3,524,556 UART: [idev] SUBJECT.KEYID = 7
3,525,661 UART: [idev] UDS.KEYID = 0
3,526,587 ready_for_fw is high
3,526,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,590 UART: [idev] Erasing UDS.KEYID = 0
6,028,266 UART: [idev] Sha1 KeyId Algorithm
6,050,583 UART: [idev] --
6,055,661 UART: [ldev] ++
6,056,342 UART: [ldev] CDI.KEYID = 6
6,057,275 UART: [ldev] SUBJECT.KEYID = 5
6,058,437 UART: [ldev] AUTHORITY.KEYID = 7
6,059,665 UART: [ldev] FE.KEYID = 1
6,101,919 UART: [ldev] Erasing FE.KEYID = 1
8,609,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,399 UART: [ldev] --
10,413,054 UART: [fwproc] Wait for Commands...
10,414,732 UART: [fwproc] Recv command 0x46574c44
10,417,045 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,615,302 >>> mbox cmd response: success
14,619,449 UART: [afmc] ++
14,620,106 UART: [afmc] CDI.KEYID = 6
14,621,036 UART: [afmc] SUBJECT.KEYID = 7
14,622,152 UART: [afmc] AUTHORITY.KEYID = 5
17,153,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,599 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,641 UART: [afmc] --
18,951,446 UART: [cold-reset] --
18,955,095 UART: [state] Locking Datavault
18,960,567 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,758 UART: [state] Locking ICCM
18,965,772 UART: [exit] Launching FMC @ 0x40000130
18,974,470 UART:
18,974,705 UART: Running Caliptra FMC ...
18,975,806 UART:
18,975,965 UART: [state] CFI Enabled
19,036,000 UART: [fht] FMC Alias Private Key: 7
20,800,090 UART: [art] Extend RT PCRs Done
20,801,307 UART: [art] Lock RT PCRs Done
20,803,249 UART: [art] Populate DV Done
20,808,537 UART: [fht] FMC Alias Private Key: 7
20,810,083 UART: [art] Derive CDI
20,810,897 UART: [art] Store in in slot 0x4
20,868,275 UART: [art] Derive Key Pair
20,869,277 UART: [art] Store priv key in slot 0x5
23,333,566 UART: [art] Derive Key Pair - Done
23,346,497 UART: [art] Signing Cert with AUTHO
23,347,800 UART: RITY.KEYID = 7
25,059,415 UART: [art] Erasing AUTHORITY.KEYID = 7
25,060,921 UART: [art] PUB.X = 88CC5B8284392A77F0C035608875833D62FA9BC08B7C7DF93FB8A11A5478E244C425BA82EE3DEAB5FD3512B97EEA80B8
25,068,167 UART: [art] PUB.Y = CBF6D5D2AC8DA82BD035C341825377A642CCAD2E74DE3164785AC2C84E3DCC34E40A12AFB9E66FB02D08F6EB71B48457
25,075,457 UART: [art] SIG.R = 4B4CB9F152D29A79785ACB99171BE56352BB77591754F39B701E4BEE204150C70E27DFEF6D98488C0795030BAF28CAF6
25,082,847 UART: [art] SIG.S = CD4BA40659619BB16F87345479922A4D79B9FAFD5A7EA6D3657B75FB8D8FC4E0E1B9577DC9F7A6E25F2C5C492349857A
26,062,109 UART: Caliptra RT
26,062,795 UART: [state] CFI Enabled
26,226,547 UART: [rt] RT listening for mailbox commands...
26,228,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,384,283 UART: [rt]cmd =0x41544d4e, len=14344
30,314,702 >>> mbox cmd response data (8 bytes)
30,315,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,346,113 UART: [rt]cmd =0x41545348, len=116
30,348,346 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,439,084 ready_for_fw is high
3,439,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,016 >>> mbox cmd response: success
19,030,246 UART:
19,030,632 UART: Running Caliptra FMC ...
19,031,823 UART:
19,031,996 UART: [state] CFI Enabled
19,094,413 UART: [fht] FMC Alias Private Key: 7
20,858,765 UART: [art] Extend RT PCRs Done
20,859,993 UART: [art] Lock RT PCRs Done
20,861,803 UART: [art] Populate DV Done
20,867,425 UART: [fht] FMC Alias Private Key: 7
20,868,918 UART: [art] Derive CDI
20,869,673 UART: [art] Store in in slot 0x4
20,927,038 UART: [art] Derive Key Pair
20,928,040 UART: [art] Store priv key in slot 0x5
23,390,488 UART: [art] Derive Key Pair - Done
23,403,864 UART: [art] Signing Cert with AUTHO
23,405,171 UART: RITY.KEYID = 7
25,116,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,264 UART: [art] PUB.X = 859916F5B86A2FB8D7C77E6C64D29F373BFC86F35CE8E753CA4628342927A2CF758B1D1DD95F4C6F2B0B9243C177BFE8
25,125,520 UART: [art] PUB.Y = C030E46331EE25410501C5A369CE78B64D24314BE52979244E9DC601B1B7E8A59A9D2067150E247A777D5BCB43036EE4
25,132,767 UART: [art] SIG.R = 47155E92D95C943CB9AFF1D9932811450FED4452F6DD85FF211B3788AE94DCCE0CF0D528C2EADD9A6287BAD374B45468
25,140,097 UART: [art] SIG.S = CA98CD85DBC36B7DF41E11247897A62109786B4E2E44BE6E8BBF14AE7A337D7674DCB589ABA8CF87FE09F248F9DB4F6A
26,119,111 UART: Caliptra RT
26,119,815 UART: [state] CFI Enabled
26,284,553 UART: [rt] RT listening for mailbox commands...
30,331,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,486,899 UART: [rt]cmd =0x41544d4e, len=14344
34,417,177 >>> mbox cmd response data (8 bytes)
34,417,784 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,448,775 UART: [rt]cmd =0x41545348, len=116
34,469,257 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,438,266 ready_for_fw is high
3,438,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,692 >>> mbox cmd response: success
19,027,345 UART:
19,027,750 UART: Running Caliptra FMC ...
19,028,864 UART:
19,029,023 UART: [state] CFI Enabled
19,094,452 UART: [fht] FMC Alias Private Key: 7
20,858,791 UART: [art] Extend RT PCRs Done
20,860,009 UART: [art] Lock RT PCRs Done
20,861,723 UART: [art] Populate DV Done
20,867,000 UART: [fht] FMC Alias Private Key: 7
20,868,551 UART: [art] Derive CDI
20,869,308 UART: [art] Store in in slot 0x4
20,927,490 UART: [art] Derive Key Pair
20,928,529 UART: [art] Store priv key in slot 0x5
23,391,472 UART: [art] Derive Key Pair - Done
23,404,194 UART: [art] Signing Cert with AUTHO
23,405,496 UART: RITY.KEYID = 7
25,117,569 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,074 UART: [art] PUB.X = B42E34CF4834EBF26A855935D5F94ED1543AA5B5A886BFB9685F4C93DF393D25D9868C75618CBF430B2C5CADBCE065D5
25,126,326 UART: [art] PUB.Y = 633E93791CF2C000C0891FDEE588E6D65C68D530F17690CA082301CE081B4075AAFE340FC2722C61AF84F69315D720E3
25,133,579 UART: [art] SIG.R = B744BB407BA01A92A538C861E6F7E87A22F7F15C1FB71649913AD1E1943754B20CDB6BD3A4B0DD377483AFCA39FFFEE5
25,140,970 UART: [art] SIG.S = 39C30CB42296C1CE7D5E7C0EABDEFC1CF623A49EB24AC93A0C2AC61BCAB1A3C37653757D1F970356D2A05EF12E13C334
26,120,304 UART: Caliptra RT
26,120,995 UART: [state] CFI Enabled
26,285,736 UART: [rt] RT listening for mailbox commands...
26,288,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,459 UART: [rt]cmd =0x41544d4e, len=14344
30,373,880 >>> mbox cmd response data (8 bytes)
30,374,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,405,343 UART: [rt]cmd =0x41545348, len=116
30,407,600 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,612 UART:
192,971 UART: Running Caliptra ROM ...
194,162 UART:
603,894 UART: [state] CFI Enabled
619,898 UART: [state] LifecycleState = Unprovisioned
622,271 UART: [state] DebugLocked = No
624,704 UART: [state] WD Timer not started. Device not locked for debugging
630,139 UART: [kat] SHA2-256
819,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,807 UART: [kat] ++
831,252 UART: [kat] sha1
843,682 UART: [kat] SHA2-256
846,676 UART: [kat] SHA2-384
853,219 UART: [kat] SHA2-512-ACC
855,857 UART: [kat] ECC-384
3,297,728 UART: [kat] HMAC-384Kdf
3,312,083 UART: [kat] LMS
3,843,868 UART: [kat] --
3,849,376 UART: [cold-reset] ++
3,850,534 UART: [fht] FHT @ 0x50003400
3,862,212 UART: [idev] ++
3,862,908 UART: [idev] CDI.KEYID = 6
3,863,885 UART: [idev] SUBJECT.KEYID = 7
3,865,047 UART: [idev] UDS.KEYID = 0
3,865,966 ready_for_fw is high
3,866,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,961 UART: [idev] Erasing UDS.KEYID = 0
6,345,699 UART: [idev] Sha1 KeyId Algorithm
6,368,163 UART: [idev] --
6,373,067 UART: [ldev] ++
6,373,740 UART: [ldev] CDI.KEYID = 6
6,374,699 UART: [ldev] SUBJECT.KEYID = 5
6,375,793 UART: [ldev] AUTHORITY.KEYID = 7
6,377,068 UART: [ldev] FE.KEYID = 1
6,387,444 UART: [ldev] Erasing FE.KEYID = 1
8,864,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,842 UART: [ldev] --
10,654,126 UART: [fwproc] Wait for Commands...
10,656,541 UART: [fwproc] Recv command 0x46574c44
10,658,843 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,697 >>> mbox cmd response: success
14,851,422 UART: [afmc] ++
14,852,126 UART: [afmc] CDI.KEYID = 6
14,853,366 UART: [afmc] SUBJECT.KEYID = 7
14,854,796 UART: [afmc] AUTHORITY.KEYID = 5
17,362,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,083,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,085,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,896 UART: [afmc] --
19,157,727 UART: [cold-reset] --
19,162,945 UART: [state] Locking Datavault
19,168,260 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,458 UART: [state] Locking ICCM
19,171,744 UART: [exit] Launching FMC @ 0x40000130
19,180,414 UART:
19,180,653 UART: Running Caliptra FMC ...
19,181,743 UART:
19,181,894 UART: [state] CFI Enabled
19,189,718 UART: [fht] FMC Alias Private Key: 7
20,946,466 UART: [art] Extend RT PCRs Done
20,947,681 UART: [art] Lock RT PCRs Done
20,949,509 UART: [art] Populate DV Done
20,954,916 UART: [fht] FMC Alias Private Key: 7
20,956,496 UART: [art] Derive CDI
20,957,239 UART: [art] Store in in slot 0x4
20,999,716 UART: [art] Derive Key Pair
21,000,702 UART: [art] Store priv key in slot 0x5
23,427,731 UART: [art] Derive Key Pair - Done
23,440,667 UART: [art] Signing Cert with AUTHO
23,441,996 UART: RITY.KEYID = 7
25,147,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,734 UART: [art] PUB.X = 2D004222AA0AD7959275CD16CAA1162FD3F4ECCDAC930AA1461D463CF3580AB920CC3CFAB4C6D1FA1C96F4F7B9461A7C
25,156,069 UART: [art] PUB.Y = 4E1B213F0C9238B590B51C5D7A44D88D5C25DCAFC22B9739EDE09419CC05A1B5E68AD08707934E6CE4C1BA4D4110EFC8
25,163,332 UART: [art] SIG.R = 830E22E52BD3B17DC6507BDB04758A897BFCDFF422C63242CBE8428A89697E5ACB74E8B9F6818662F0CDCD82785C4E7B
25,170,701 UART: [art] SIG.S = BD41F8A2EFF3989A8BEBAB9EF7E428B7A862FA0540E455FFF050F4CC9866512FF12264D44721DD45FBC808DFEF9D33A2
26,149,744 UART: Caliptra RT
26,150,427 UART: [state] CFI Enabled
26,268,304 UART: [rt] RT listening for mailbox commands...
30,296,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,451,839 UART: [rt]cmd =0x41544d4e, len=14344
34,382,264 >>> mbox cmd response data (8 bytes)
34,382,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,413,597 UART: [rt]cmd =0x41545348, len=116
34,433,443 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,435 UART:
192,820 UART: Running Caliptra ROM ...
193,934 UART:
603,418 UART: [state] CFI Enabled
617,656 UART: [state] LifecycleState = Unprovisioned
620,037 UART: [state] DebugLocked = No
622,985 UART: [state] WD Timer not started. Device not locked for debugging
628,223 UART: [kat] SHA2-256
818,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,922 UART: [kat] ++
829,524 UART: [kat] sha1
841,251 UART: [kat] SHA2-256
844,323 UART: [kat] SHA2-384
851,254 UART: [kat] SHA2-512-ACC
853,830 UART: [kat] ECC-384
3,296,793 UART: [kat] HMAC-384Kdf
3,311,505 UART: [kat] LMS
3,843,302 UART: [kat] --
3,847,225 UART: [cold-reset] ++
3,849,359 UART: [fht] FHT @ 0x50003400
3,860,608 UART: [idev] ++
3,861,311 UART: [idev] CDI.KEYID = 6
3,862,437 UART: [idev] SUBJECT.KEYID = 7
3,863,530 UART: [idev] UDS.KEYID = 0
3,864,443 ready_for_fw is high
3,864,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,299 UART: [idev] Erasing UDS.KEYID = 0
6,339,216 UART: [idev] Sha1 KeyId Algorithm
6,360,655 UART: [idev] --
6,365,442 UART: [ldev] ++
6,366,154 UART: [ldev] CDI.KEYID = 6
6,367,064 UART: [ldev] SUBJECT.KEYID = 5
6,368,216 UART: [ldev] AUTHORITY.KEYID = 7
6,369,457 UART: [ldev] FE.KEYID = 1
6,381,985 UART: [ldev] Erasing FE.KEYID = 1
8,860,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,940 UART: [ldev] --
10,649,924 UART: [fwproc] Wait for Commands...
10,653,152 UART: [fwproc] Recv command 0x46574c44
10,655,399 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,718 >>> mbox cmd response: success
14,841,034 UART: [afmc] ++
14,841,811 UART: [afmc] CDI.KEYID = 6
14,843,178 UART: [afmc] SUBJECT.KEYID = 7
14,844,462 UART: [afmc] AUTHORITY.KEYID = 5
17,355,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,641 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,297 UART: [afmc] --
19,151,132 UART: [cold-reset] --
19,153,745 UART: [state] Locking Datavault
19,158,849 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,990 UART: [state] Locking ICCM
19,163,156 UART: [exit] Launching FMC @ 0x40000130
19,171,804 UART:
19,172,038 UART: Running Caliptra FMC ...
19,173,060 UART:
19,173,201 UART: [state] CFI Enabled
19,181,378 UART: [fht] FMC Alias Private Key: 7
20,938,540 UART: [art] Extend RT PCRs Done
20,939,764 UART: [art] Lock RT PCRs Done
20,941,448 UART: [art] Populate DV Done
20,946,907 UART: [fht] FMC Alias Private Key: 7
20,948,388 UART: [art] Derive CDI
20,949,143 UART: [art] Store in in slot 0x4
20,991,774 UART: [art] Derive Key Pair
20,992,769 UART: [art] Store priv key in slot 0x5
23,418,843 UART: [art] Derive Key Pair - Done
23,431,895 UART: [art] Signing Cert with AUTHO
23,433,197 UART: RITY.KEYID = 7
25,138,787 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,279 UART: [art] PUB.X = 1919CC072268765EB5431B269FE5DD7278C155754B7DB66D34F4BEC50AB2A1BB5FC4F37D5C3538ED7550C8925F091864
25,147,548 UART: [art] PUB.Y = 26498A58ACA8C861C8F65D57FCAEAB37BEEEE00637D1A5BDE030F6418977F13F5BD2F7CB9D895F45AA91362C81388E9C
25,154,805 UART: [art] SIG.R = 74846B7887C9FC73D8AE7FBC03D7C45BECBFD7D1E85A41231F6857DEECA70E06314A25651F7C529C1E790E6045FB20AC
25,162,365 UART: [art] SIG.S = 7A7C886DBBA2FA8134F3B7DF9F96B0C4DD2791294589A6BBC192D691034611BD179B0EA95D21C65D54DFE6B0C0FA834C
26,141,169 UART: Caliptra RT
26,141,869 UART: [state] CFI Enabled
26,259,271 UART: [rt] RT listening for mailbox commands...
26,261,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,417,066 UART: [rt]cmd =0x41544d4e, len=14344
30,347,762 >>> mbox cmd response data (8 bytes)
30,348,360 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,379,100 UART: [rt]cmd =0x41545348, len=116
30,381,515 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,756,369 ready_for_fw is high
3,756,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,470 >>> mbox cmd response: success
19,208,776 UART:
19,209,167 UART: Running Caliptra FMC ...
19,210,292 UART:
19,210,444 UART: [state] CFI Enabled
19,218,497 UART: [fht] FMC Alias Private Key: 7
20,975,443 UART: [art] Extend RT PCRs Done
20,976,647 UART: [art] Lock RT PCRs Done
20,977,991 UART: [art] Populate DV Done
20,983,237 UART: [fht] FMC Alias Private Key: 7
20,984,792 UART: [art] Derive CDI
20,985,604 UART: [art] Store in in slot 0x4
21,028,365 UART: [art] Derive Key Pair
21,029,354 UART: [art] Store priv key in slot 0x5
23,455,676 UART: [art] Derive Key Pair - Done
23,468,731 UART: [art] Signing Cert with AUTHO
23,470,032 UART: RITY.KEYID = 7
25,175,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,156 UART: [art] PUB.X = 67273632578C0ED03342657F26211184E5DC2DF5558EFE63119066B5B3D4E41B40BC914192E4C8EE2662844ABA9719F7
25,184,420 UART: [art] PUB.Y = EA11FE71F596B1711B0DEC3333F5F12C72C760667FD0624FB7BBDE926BC8DAFB9ABFC6B2987F153F070131A290A106ED
25,191,706 UART: [art] SIG.R = 51FBD69D818C28C5925EA35D9004C2B17A76ADE14E567312546916EE8B12AA4D6F505A0B1778EC6F6A28BDD7A74B88D0
25,199,056 UART: [art] SIG.S = 73395D84F4866825D1EEBAAEEAD9FFD3AFF6F3C68F3C17D9088966156402EC00BCA28534EADE8BB81B93BB454CEE69B0
26,178,389 UART: Caliptra RT
26,179,087 UART: [state] CFI Enabled
26,296,313 UART: [rt] RT listening for mailbox commands...
30,352,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,508,142 UART: [rt]cmd =0x41544d4e, len=14344
34,438,488 >>> mbox cmd response data (8 bytes)
34,439,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,469,848 UART: [rt]cmd =0x41545348, len=116
34,489,634 >>> mbox cmd response data (12 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,756,926 ready_for_fw is high
3,757,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,711 >>> mbox cmd response: success
19,212,942 UART:
19,213,417 UART: Running Caliptra FMC ...
19,214,528 UART:
19,214,684 UART: [state] CFI Enabled
19,222,700 UART: [fht] FMC Alias Private Key: 7
20,979,106 UART: [art] Extend RT PCRs Done
20,980,327 UART: [art] Lock RT PCRs Done
20,982,330 UART: [art] Populate DV Done
20,987,784 UART: [fht] FMC Alias Private Key: 7
20,989,430 UART: [art] Derive CDI
20,990,256 UART: [art] Store in in slot 0x4
21,032,470 UART: [art] Derive Key Pair
21,033,472 UART: [art] Store priv key in slot 0x5
23,460,157 UART: [art] Derive Key Pair - Done
23,472,774 UART: [art] Signing Cert with AUTHO
23,474,088 UART: RITY.KEYID = 7
25,179,643 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,156 UART: [art] PUB.X = 21818CD5777E6744381F1A5AEFE9CB98EC83616250F90160AD984DDBB971C9BFC4FF85DC9E3D5A00F25FF60086495FFE
25,188,397 UART: [art] PUB.Y = AF3180FBAAA66CAEDC9465433946427BE959C30203C033F115D6D95C8CC9E907FFBDC8EB74F45BF1E595AB168967D9C6
25,195,638 UART: [art] SIG.R = 54FDC9F15A8B70A36FB5EC405C31445A3B0A828230DC89AC944BE7A5FD06A8CDC723E6B8BFC51185FF05933E2B881BD2
25,203,105 UART: [art] SIG.S = 7787FF0CCDF9DD50F2376507BD285417794BC0C50ED831356391D3B2C8F7DC6560E4748FB0B319079934B4DB2DCB5099
26,182,287 UART: Caliptra RT
26,182,993 UART: [state] CFI Enabled
26,299,675 UART: [rt] RT listening for mailbox commands...
26,302,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,457,733 UART: [rt]cmd =0x41544d4e, len=14344
30,388,215 >>> mbox cmd response data (8 bytes)
30,388,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,419,442 UART: [rt]cmd =0x41545348, len=116
30,421,623 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,877 UART: [kat] SHA2-256
881,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,923 UART: [kat] ++
886,075 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,254 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,475,999 UART: [cold-reset] ++
1,476,333 UART: [fht] Storing FHT @ 0x50003400
1,479,332 UART: [idev] ++
1,479,500 UART: [idev] CDI.KEYID = 6
1,479,860 UART: [idev] SUBJECT.KEYID = 7
1,480,284 UART: [idev] UDS.KEYID = 0
1,480,629 ready_for_fw is high
1,480,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,442 UART: [idev] Erasing UDS.KEYID = 0
1,504,548 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,240 UART: [idev] --
1,514,209 UART: [ldev] ++
1,514,377 UART: [ldev] CDI.KEYID = 6
1,514,740 UART: [ldev] SUBJECT.KEYID = 5
1,515,166 UART: [ldev] AUTHORITY.KEYID = 7
1,515,629 UART: [ldev] FE.KEYID = 1
1,521,045 UART: [ldev] Erasing FE.KEYID = 1
1,546,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,910 UART: [ldev] --
1,585,195 UART: [fwproc] Waiting for Commands...
1,585,832 UART: [fwproc] Received command 0x46574c44
1,586,623 UART: [fwproc] Received Image of size 114448 bytes
2,886,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,568 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,065 >>> mbox cmd response: success
3,080,187 UART: [afmc] ++
3,080,355 UART: [afmc] CDI.KEYID = 6
3,080,717 UART: [afmc] SUBJECT.KEYID = 7
3,081,142 UART: [afmc] AUTHORITY.KEYID = 5
3,115,925 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,151 UART: [afmc] --
3,159,259 UART: [cold-reset] --
3,160,261 UART: [state] Locking Datavault
3,161,662 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,266 UART: [state] Locking ICCM
3,162,716 UART: [exit] Launching FMC @ 0x40000130
3,168,045 UART:
3,168,061 UART: Running Caliptra FMC ...
3,168,469 UART:
3,168,523 UART: [state] CFI Enabled
3,178,884 UART: [fht] FMC Alias Private Key: 7
3,286,877 UART: [art] Extend RT PCRs Done
3,287,305 UART: [art] Lock RT PCRs Done
3,288,747 UART: [art] Populate DV Done
3,297,100 UART: [fht] FMC Alias Private Key: 7
3,298,246 UART: [art] Derive CDI
3,298,526 UART: [art] Store in in slot 0x4
3,383,987 UART: [art] Derive Key Pair
3,384,347 UART: [art] Store priv key in slot 0x5
3,397,457 UART: [art] Derive Key Pair - Done
3,412,134 UART: [art] Signing Cert with AUTHO
3,412,614 UART: RITY.KEYID = 7
3,427,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,271 UART: [art] PUB.X = 2E698560B83D60F91BC5F6E42EFC3DE593568F925E74C98422A9A692A7218F9590D6EB022111157FC551C8C01888D3F8
3,435,034 UART: [art] PUB.Y = 1F78B306A575CC548B84F139879C0F89F67547885FF11B2AFF02FDB857F368F2B8C514C6B9A9358F328511858622B1B1
3,441,971 UART: [art] SIG.R = 49A4C8619C14FE9DFE9197447E0E64DF355A282B07CB471CDABC91395D8962D27DB0CF21F94C31E5E4AB99A3858424A9
3,448,743 UART: [art] SIG.S = FC6E1E3F6890DA1419BABA1EC9E5A47FA94EAA4C52A3E9EE76653CCEB4D1C38D132A750D8AA96F6A28F68FE2CFE471F6
3,472,905 UART: Caliptra RT
3,473,158 UART: [state] CFI Enabled
3,581,181 UART: [rt] RT listening for mailbox commands...
3,581,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,765 UART: [rt]cmd =0x41544d4e, len=14344
3,849,604 >>> mbox cmd response data (8 bytes)
3,849,605 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,692 UART: [rt]cmd =0x41545348, len=116
3,901,314 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,419 UART: [kat] SHA2-256
882,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,465 UART: [kat] ++
886,617 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,521 UART: [cold-reset] ++
1,476,887 UART: [fht] Storing FHT @ 0x50003400
1,479,714 UART: [idev] ++
1,479,882 UART: [idev] CDI.KEYID = 6
1,480,242 UART: [idev] SUBJECT.KEYID = 7
1,480,666 UART: [idev] UDS.KEYID = 0
1,481,011 ready_for_fw is high
1,481,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,458 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,148 UART: [idev] --
1,515,339 UART: [ldev] ++
1,515,507 UART: [ldev] CDI.KEYID = 6
1,515,870 UART: [ldev] SUBJECT.KEYID = 5
1,516,296 UART: [ldev] AUTHORITY.KEYID = 7
1,516,759 UART: [ldev] FE.KEYID = 1
1,521,959 UART: [ldev] Erasing FE.KEYID = 1
1,547,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,350 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,466 UART: [fwproc] Received command 0x46574c44
1,588,257 UART: [fwproc] Received Image of size 114448 bytes
2,888,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,218 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,573 >>> mbox cmd response: success
3,081,705 UART: [afmc] ++
3,081,873 UART: [afmc] CDI.KEYID = 6
3,082,235 UART: [afmc] SUBJECT.KEYID = 7
3,082,660 UART: [afmc] AUTHORITY.KEYID = 5
3,117,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,520 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,210 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,943 UART: [afmc] --
3,160,989 UART: [cold-reset] --
3,161,759 UART: [state] Locking Datavault
3,162,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,498 UART: [state] Locking ICCM
3,163,942 UART: [exit] Launching FMC @ 0x40000130
3,169,271 UART:
3,169,287 UART: Running Caliptra FMC ...
3,169,695 UART:
3,169,749 UART: [state] CFI Enabled
3,180,042 UART: [fht] FMC Alias Private Key: 7
3,288,115 UART: [art] Extend RT PCRs Done
3,288,543 UART: [art] Lock RT PCRs Done
3,289,931 UART: [art] Populate DV Done
3,297,898 UART: [fht] FMC Alias Private Key: 7
3,299,058 UART: [art] Derive CDI
3,299,338 UART: [art] Store in in slot 0x4
3,385,421 UART: [art] Derive Key Pair
3,385,781 UART: [art] Store priv key in slot 0x5
3,398,627 UART: [art] Derive Key Pair - Done
3,413,068 UART: [art] Signing Cert with AUTHO
3,413,548 UART: RITY.KEYID = 7
3,428,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,519 UART: [art] PUB.X = 2BCB6250CE866D0B6FBA0E060927A8219EF1E35338E45542D4EF06AAD1D424B4A32DE9EC251400A784C611440954E1F6
3,436,253 UART: [art] PUB.Y = 869381860535DB083C4F42CAF784BE53A7C20AE5D2E3FA9D103B908541E00443E5A5E59C665734E1BD66E6BA3C457B74
3,443,193 UART: [art] SIG.R = A47E14FE0392941DFE6A6956E6676608785F18E93B1DEE1C93C768F31C14A59FCA090B16B6A73A41861497740FE52FCE
3,449,950 UART: [art] SIG.S = 75D2EC567714BCD3BFF2DC5DC09A8390B40E6F3584063572A4140E5C58424C92F4CE70E63FFBBCE4E7398646F7B49577
3,474,042 UART: Caliptra RT
3,474,295 UART: [state] CFI Enabled
3,582,690 UART: [rt] RT listening for mailbox commands...
3,583,360 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,236 UART: [rt]cmd =0x41544d4e, len=14344
3,851,252 >>> mbox cmd response data (8 bytes)
3,851,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,182 UART: [rt]cmd =0x41545348, len=116
3,883,090 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,275 ready_for_fw is high
1,362,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,299 >>> mbox cmd response: success
2,989,619 UART:
2,989,635 UART: Running Caliptra FMC ...
2,990,043 UART:
2,990,097 UART: [state] CFI Enabled
3,000,676 UART: [fht] FMC Alias Private Key: 7
3,108,527 UART: [art] Extend RT PCRs Done
3,108,955 UART: [art] Lock RT PCRs Done
3,110,707 UART: [art] Populate DV Done
3,118,880 UART: [fht] FMC Alias Private Key: 7
3,119,904 UART: [art] Derive CDI
3,120,184 UART: [art] Store in in slot 0x4
3,205,553 UART: [art] Derive Key Pair
3,205,913 UART: [art] Store priv key in slot 0x5
3,218,347 UART: [art] Derive Key Pair - Done
3,233,376 UART: [art] Signing Cert with AUTHO
3,233,856 UART: RITY.KEYID = 7
3,249,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,771 UART: [art] PUB.X = FA317C8598E7EF6342303A25BF9AD9CFC2F3AC4C2A0D9E3BBBCD78E2442DD53764DF43EBB2A8304A6FF8A01B7753A0DA
3,256,562 UART: [art] PUB.Y = 1673D10FAC16F567562ECA62BB2163F8BDFDC51B812B81A2190EDD1ADBAC3BABDC8DA8BE2D2591889506494B7ADE9475
3,263,523 UART: [art] SIG.R = B212201B88190BC41AAF43F0E52AD36CBD2060A5C48E3DF938EC3546253D0922E47805F74B861290F7D63EFD889628C3
3,270,284 UART: [art] SIG.S = DCA3672BAD6A41E3D2723C8D8593C440BBB958091BD19A39C9FF2DEDA12ECFC7AF85930DE3482861881AD208E32F8381
3,294,056 UART: Caliptra RT
3,294,309 UART: [state] CFI Enabled
3,403,333 UART: [rt] RT listening for mailbox commands...
3,404,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,077 UART: [rt]cmd =0x41544d4e, len=14344
3,671,944 >>> mbox cmd response data (8 bytes)
3,671,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,836 UART: [rt]cmd =0x41545348, len=116
3,723,346 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,429 ready_for_fw is high
1,362,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,025 >>> mbox cmd response: success
2,991,169 UART:
2,991,185 UART: Running Caliptra FMC ...
2,991,593 UART:
2,991,647 UART: [state] CFI Enabled
3,002,246 UART: [fht] FMC Alias Private Key: 7
3,109,949 UART: [art] Extend RT PCRs Done
3,110,377 UART: [art] Lock RT PCRs Done
3,111,967 UART: [art] Populate DV Done
3,120,064 UART: [fht] FMC Alias Private Key: 7
3,121,134 UART: [art] Derive CDI
3,121,414 UART: [art] Store in in slot 0x4
3,207,017 UART: [art] Derive Key Pair
3,207,377 UART: [art] Store priv key in slot 0x5
3,220,351 UART: [art] Derive Key Pair - Done
3,234,902 UART: [art] Signing Cert with AUTHO
3,235,382 UART: RITY.KEYID = 7
3,251,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,875 UART: [art] PUB.X = BA7915706A5AFC4371D388E491DD2A106CC2C50CC53E2F007AF2FE5DA6C6463469D41455B9E3E7C0EF5320AC4ADCB211
3,258,634 UART: [art] PUB.Y = CA3D1C458150C43C48E0D17EED9DB3D85F1AB5E1E79F9574A14DC55E8DD7BD86CC5FE54B5FC2DA0D1588B19E7548E94B
3,265,603 UART: [art] SIG.R = FFA5F86F99D2252C35D2633F981F08B48A650B7C6E884D0E9B3D0092A194F2074B22EF64B2D403BDF91C1D806D29C2DC
3,272,344 UART: [art] SIG.S = 523FB47077C35E7DAE968CC38DDFF9DD02353133CDF7E00D284A50724504B9647A914B3AEF6B83A74F7708B813E25924
3,296,195 UART: Caliptra RT
3,296,448 UART: [state] CFI Enabled
3,404,459 UART: [rt] RT listening for mailbox commands...
3,405,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,115 UART: [rt]cmd =0x41544d4e, len=14344
3,672,859 >>> mbox cmd response data (8 bytes)
3,672,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,147 UART: [rt]cmd =0x41545348, len=116
3,705,045 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,351 UART: [kat] SHA2-512-ACC
897,252 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,373 UART: [kat] LMS
1,475,569 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,627 UART: [idev] ++
1,479,795 UART: [idev] CDI.KEYID = 6
1,480,155 UART: [idev] SUBJECT.KEYID = 7
1,480,579 UART: [idev] UDS.KEYID = 0
1,480,924 ready_for_fw is high
1,480,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,701 UART: [idev] --
1,514,656 UART: [ldev] ++
1,514,824 UART: [ldev] CDI.KEYID = 6
1,515,187 UART: [ldev] SUBJECT.KEYID = 5
1,515,613 UART: [ldev] AUTHORITY.KEYID = 7
1,516,076 UART: [ldev] FE.KEYID = 1
1,521,606 UART: [ldev] Erasing FE.KEYID = 1
1,546,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,633 UART: [ldev] --
1,586,066 UART: [fwproc] Waiting for Commands...
1,586,835 UART: [fwproc] Received command 0x46574c44
1,587,626 UART: [fwproc] Received Image of size 114448 bytes
2,886,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,087 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,414 >>> mbox cmd response: success
3,080,586 UART: [afmc] ++
3,080,754 UART: [afmc] CDI.KEYID = 6
3,081,116 UART: [afmc] SUBJECT.KEYID = 7
3,081,541 UART: [afmc] AUTHORITY.KEYID = 5
3,116,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,120 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,513 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,203 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,148 UART: [afmc] --
3,160,238 UART: [cold-reset] --
3,160,812 UART: [state] Locking Datavault
3,162,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,765 UART: [state] Locking ICCM
3,163,289 UART: [exit] Launching FMC @ 0x40000130
3,168,618 UART:
3,168,634 UART: Running Caliptra FMC ...
3,169,042 UART:
3,169,185 UART: [state] CFI Enabled
3,179,780 UART: [fht] FMC Alias Private Key: 7
3,287,611 UART: [art] Extend RT PCRs Done
3,288,039 UART: [art] Lock RT PCRs Done
3,289,465 UART: [art] Populate DV Done
3,297,716 UART: [fht] FMC Alias Private Key: 7
3,298,828 UART: [art] Derive CDI
3,299,108 UART: [art] Store in in slot 0x4
3,384,991 UART: [art] Derive Key Pair
3,385,351 UART: [art] Store priv key in slot 0x5
3,398,803 UART: [art] Derive Key Pair - Done
3,413,678 UART: [art] Signing Cert with AUTHO
3,414,158 UART: RITY.KEYID = 7
3,429,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,439 UART: [art] PUB.X = 0A7440E6BD897D18080C7072C917493915C999850F5B5A6626141A9FBAEFA802205A79A8046B8D5397B1AD25696856B3
3,437,181 UART: [art] PUB.Y = B188C0A41A9F07C81F10E50C81EB58AB9C272F2CE4415E34056F3AAE7F913965888A3FB8D7775FBF633BD52D1F34A82B
3,444,132 UART: [art] SIG.R = 726DE99E3E09B70DB601B8C792F9C762E1BBFCA92B7363DA5E4A955EAB93D09CB8D76F977E6115DBBC7FC25D7309938D
3,450,906 UART: [art] SIG.S = 96D6430F06AF6C3B412946BA2AAECF1E9F26F133B0EA54BACD77EC1B21D0A208A6E2E75623291A058C8A5E7B7F4B0AC8
3,474,700 UART: Caliptra RT
3,475,045 UART: [state] CFI Enabled
3,583,956 UART: [rt] RT listening for mailbox commands...
3,584,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,042 UART: [rt]cmd =0x41544d4e, len=14344
3,852,945 >>> mbox cmd response data (8 bytes)
3,852,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,023 UART: [rt]cmd =0x41545348, len=116
3,904,917 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,117 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,498 UART: [fht] Storing FHT @ 0x50003400
1,480,281 UART: [idev] ++
1,480,449 UART: [idev] CDI.KEYID = 6
1,480,809 UART: [idev] SUBJECT.KEYID = 7
1,481,233 UART: [idev] UDS.KEYID = 0
1,481,578 ready_for_fw is high
1,481,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,895 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,601 UART: [idev] --
1,515,514 UART: [ldev] ++
1,515,682 UART: [ldev] CDI.KEYID = 6
1,516,045 UART: [ldev] SUBJECT.KEYID = 5
1,516,471 UART: [ldev] AUTHORITY.KEYID = 7
1,516,934 UART: [ldev] FE.KEYID = 1
1,522,024 UART: [ldev] Erasing FE.KEYID = 1
1,546,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,933 UART: [ldev] --
1,586,328 UART: [fwproc] Waiting for Commands...
1,587,039 UART: [fwproc] Received command 0x46574c44
1,587,830 UART: [fwproc] Received Image of size 114448 bytes
2,886,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,576 >>> mbox cmd response: success
3,079,684 UART: [afmc] ++
3,079,852 UART: [afmc] CDI.KEYID = 6
3,080,214 UART: [afmc] SUBJECT.KEYID = 7
3,080,639 UART: [afmc] AUTHORITY.KEYID = 5
3,115,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,540 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,933 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,623 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,544 UART: [afmc] --
3,158,576 UART: [cold-reset] --
3,159,560 UART: [state] Locking Datavault
3,160,591 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,195 UART: [state] Locking ICCM
3,161,803 UART: [exit] Launching FMC @ 0x40000130
3,167,132 UART:
3,167,148 UART: Running Caliptra FMC ...
3,167,556 UART:
3,167,699 UART: [state] CFI Enabled
3,178,482 UART: [fht] FMC Alias Private Key: 7
3,286,439 UART: [art] Extend RT PCRs Done
3,286,867 UART: [art] Lock RT PCRs Done
3,288,405 UART: [art] Populate DV Done
3,296,558 UART: [fht] FMC Alias Private Key: 7
3,297,564 UART: [art] Derive CDI
3,297,844 UART: [art] Store in in slot 0x4
3,383,337 UART: [art] Derive Key Pair
3,383,697 UART: [art] Store priv key in slot 0x5
3,397,107 UART: [art] Derive Key Pair - Done
3,411,741 UART: [art] Signing Cert with AUTHO
3,412,221 UART: RITY.KEYID = 7
3,427,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,188 UART: [art] PUB.X = 142A470EF3266C8AF47B816D24C4DF05DCE9616B8FD5EA9CB6D6A7160C1B95B22A230A05A740037548307E7DB806F8AC
3,434,945 UART: [art] PUB.Y = 0BE9FD8B61F28CD158288E34A71FCE16A1F002FEA94C5126A7EE0EB7D2A6455D3AB9322B95EE07D94B8C7374177D25C4
3,441,895 UART: [art] SIG.R = E76CE081F4540EB41CF3C5AEE7FB4396010E7AF23D9E0A3B149E40D17CD22AAE43CF8D489EB402C8A216C2AAAD6337D1
3,448,670 UART: [art] SIG.S = 33B6B19BA96EB31B226B3EB10FE4F6B151FE05D33B507DD7F9213E72DCAF84EE5F77C3D9182D1C19F461C340A5EB7D5C
3,472,203 UART: Caliptra RT
3,472,548 UART: [state] CFI Enabled
3,581,273 UART: [rt] RT listening for mailbox commands...
3,581,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,811 UART: [rt]cmd =0x41544d4e, len=14344
3,849,597 >>> mbox cmd response data (8 bytes)
3,849,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,745 UART: [rt]cmd =0x41545348, len=116
3,881,853 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,928 ready_for_fw is high
1,362,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,356 >>> mbox cmd response: success
2,992,006 UART:
2,992,022 UART: Running Caliptra FMC ...
2,992,430 UART:
2,992,573 UART: [state] CFI Enabled
3,003,002 UART: [fht] FMC Alias Private Key: 7
3,110,785 UART: [art] Extend RT PCRs Done
3,111,213 UART: [art] Lock RT PCRs Done
3,112,983 UART: [art] Populate DV Done
3,121,272 UART: [fht] FMC Alias Private Key: 7
3,122,364 UART: [art] Derive CDI
3,122,644 UART: [art] Store in in slot 0x4
3,208,517 UART: [art] Derive Key Pair
3,208,877 UART: [art] Store priv key in slot 0x5
3,222,271 UART: [art] Derive Key Pair - Done
3,237,279 UART: [art] Signing Cert with AUTHO
3,237,759 UART: RITY.KEYID = 7
3,253,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,766 UART: [art] PUB.X = 617E8FC7B5AD3DE57C4D1093386E4FBDEB15DDA54C451F13C72EF11B4FD7AE291124B844CA8AACF8F3E1869DCBD38C1B
3,260,562 UART: [art] PUB.Y = CBDD03E269FCB68E90462364EF332A584C5D41651708F064AAB8CA2ADA60C309B57AB8CC0571C7DE2225803AD22B3C5C
3,267,512 UART: [art] SIG.R = 6496B98D68CCE3D1C49EF5B9F5AEFF9F38B98C4A104B5E6B52B3817CCB433F8D8C48076FF8302A06B8B43E1AF2F74A3E
3,274,294 UART: [art] SIG.S = 417E512D8E105469D0F877F0FFB2F7989A019BD4CC78C3956C34F94813E52AB291EE586216C532FC7483C42D602999EE
3,298,150 UART: Caliptra RT
3,298,495 UART: [state] CFI Enabled
3,406,303 UART: [rt] RT listening for mailbox commands...
3,406,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,791 UART: [rt]cmd =0x41544d4e, len=14344
3,674,302 >>> mbox cmd response data (8 bytes)
3,674,303 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,490 UART: [rt]cmd =0x41545348, len=116
3,726,468 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,206 >>> mbox cmd response: success
2,992,016 UART:
2,992,032 UART: Running Caliptra FMC ...
2,992,440 UART:
2,992,583 UART: [state] CFI Enabled
3,003,290 UART: [fht] FMC Alias Private Key: 7
3,110,805 UART: [art] Extend RT PCRs Done
3,111,233 UART: [art] Lock RT PCRs Done
3,113,001 UART: [art] Populate DV Done
3,121,264 UART: [fht] FMC Alias Private Key: 7
3,122,226 UART: [art] Derive CDI
3,122,506 UART: [art] Store in in slot 0x4
3,208,173 UART: [art] Derive Key Pair
3,208,533 UART: [art] Store priv key in slot 0x5
3,221,547 UART: [art] Derive Key Pair - Done
3,236,476 UART: [art] Signing Cert with AUTHO
3,236,956 UART: RITY.KEYID = 7
3,251,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,609 UART: [art] PUB.X = B5AF4DD78749C968F5C62EDEE4FFE9A6E94F9B945B2416950747507D7620AE4B8B01751B890691B409B30F509CBF05DA
3,259,367 UART: [art] PUB.Y = 26A07E12A2361204C6527028FBB4313575D45F337982FE43A94F2FAB2496C7A3499AFF4B1CA65C119ED4A5EECC5ADA4C
3,266,324 UART: [art] SIG.R = 75ABAF576D8C4E07BC71DEDD59F95C25CDAA08FE11C5817243559067E81B489843916B981B1F676CB7B7254F53566992
3,273,088 UART: [art] SIG.S = 66BDA5CDFD508FD58B39D233283769AE4E5ED3E4BA8651E498F6BB82BEDB8080159C6CA07484BEEB1636779F4EF59CB7
3,296,689 UART: Caliptra RT
3,297,034 UART: [state] CFI Enabled
3,405,360 UART: [rt] RT listening for mailbox commands...
3,406,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,952 UART: [rt]cmd =0x41544d4e, len=14344
3,674,348 >>> mbox cmd response data (8 bytes)
3,674,349 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,520 UART: [rt]cmd =0x41545348, len=116
3,706,378 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,321 UART: [fht] FHT @ 0x50003400
1,174,936 UART: [idev] ++
1,175,104 UART: [idev] CDI.KEYID = 6
1,175,464 UART: [idev] SUBJECT.KEYID = 7
1,175,888 UART: [idev] UDS.KEYID = 0
1,176,233 ready_for_fw is high
1,176,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,609 UART: [idev] Sha1 KeyId Algorithm
1,209,055 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,598 UART: [ldev] SUBJECT.KEYID = 5
1,211,024 UART: [ldev] AUTHORITY.KEYID = 7
1,211,487 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,002 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,732 >>> mbox cmd response: success
2,775,882 UART: [afmc] ++
2,776,050 UART: [afmc] CDI.KEYID = 6
2,776,412 UART: [afmc] SUBJECT.KEYID = 7
2,776,837 UART: [afmc] AUTHORITY.KEYID = 5
2,812,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,503 UART: [afmc] --
2,855,427 UART: [cold-reset] --
2,856,217 UART: [state] Locking Datavault
2,857,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,380 UART: [state] Locking ICCM
2,858,954 UART: [exit] Launching FMC @ 0x40000130
2,864,283 UART:
2,864,299 UART: Running Caliptra FMC ...
2,864,707 UART:
2,864,761 UART: [state] CFI Enabled
2,874,900 UART: [fht] FMC Alias Private Key: 7
2,982,833 UART: [art] Extend RT PCRs Done
2,983,261 UART: [art] Lock RT PCRs Done
2,984,979 UART: [art] Populate DV Done
2,993,018 UART: [fht] FMC Alias Private Key: 7
2,994,168 UART: [art] Derive CDI
2,994,448 UART: [art] Store in in slot 0x4
3,079,913 UART: [art] Derive Key Pair
3,080,273 UART: [art] Store priv key in slot 0x5
3,093,559 UART: [art] Derive Key Pair - Done
3,108,599 UART: [art] Signing Cert with AUTHO
3,109,079 UART: RITY.KEYID = 7
3,123,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,624 UART: [art] PUB.X = C9FCAD366E731F21441171A335A0C57D25C6240CC05A0C21E1BF1C58C54F4DDAE59E5437357ACF5FE657118A42D019F1
3,131,396 UART: [art] PUB.Y = 2B6C24F2E7D639DA8653255DE028598518AE16583B3D0FEA3D5AC078632A6A1DC576D01E7F39A558F46D03B81725198F
3,138,340 UART: [art] SIG.R = D43C7C348D6A89076C1BB679BC4FF33C28B437652EE629BA50DDE572231746310651D437C50A985E6A98BCD255C724A3
3,145,101 UART: [art] SIG.S = DD2E28752C1247396D6AF39ED9F046D1938A10C1BA9959EC250C7EFEB1609AAA40C48FFB32654980E880896FDE80357C
3,168,545 UART: Caliptra RT
3,168,798 UART: [state] CFI Enabled
3,277,240 UART: [rt] RT listening for mailbox commands...
3,277,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,084 UART: [rt]cmd =0x41544d4e, len=14344
3,546,003 >>> mbox cmd response data (8 bytes)
3,546,004 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,063 UART: [rt]cmd =0x41545348, len=116
3,598,267 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,602 UART: [kat] SHA2-512-ACC
908,503 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,255 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 ready_for_fw is high
1,176,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,317 UART: [idev] --
1,210,381 UART: [ldev] ++
1,210,549 UART: [ldev] CDI.KEYID = 6
1,210,912 UART: [ldev] SUBJECT.KEYID = 5
1,211,338 UART: [ldev] AUTHORITY.KEYID = 7
1,211,801 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,816 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,968 >>> mbox cmd response: success
2,776,134 UART: [afmc] ++
2,776,302 UART: [afmc] CDI.KEYID = 6
2,776,664 UART: [afmc] SUBJECT.KEYID = 7
2,777,089 UART: [afmc] AUTHORITY.KEYID = 5
2,812,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,993 UART: [afmc] --
2,855,909 UART: [cold-reset] --
2,856,685 UART: [state] Locking Datavault
2,857,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,492 UART: [state] Locking ICCM
2,859,010 UART: [exit] Launching FMC @ 0x40000130
2,864,339 UART:
2,864,355 UART: Running Caliptra FMC ...
2,864,763 UART:
2,864,817 UART: [state] CFI Enabled
2,875,412 UART: [fht] FMC Alias Private Key: 7
2,983,407 UART: [art] Extend RT PCRs Done
2,983,835 UART: [art] Lock RT PCRs Done
2,985,335 UART: [art] Populate DV Done
2,993,682 UART: [fht] FMC Alias Private Key: 7
2,994,822 UART: [art] Derive CDI
2,995,102 UART: [art] Store in in slot 0x4
3,080,923 UART: [art] Derive Key Pair
3,081,283 UART: [art] Store priv key in slot 0x5
3,094,417 UART: [art] Derive Key Pair - Done
3,109,090 UART: [art] Signing Cert with AUTHO
3,109,570 UART: RITY.KEYID = 7
3,124,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,621 UART: [art] PUB.X = ACACEB9797591C96B92EFD0C22BC7F83A1616BEF621EF41373CFE64DBDD87643832F4533763CEBA5653F6BAB0FAC8DCD
3,132,409 UART: [art] PUB.Y = 9AF88D979713A3E3E3B5FBD10CD181AA117E258968BF2D52BD3AA923405C8F2A8B8CD67F6514918FA959AE2BF35110E5
3,139,366 UART: [art] SIG.R = E5B2F64AE4AF742DE4F8E79BF99C9C76C2F5F24A4FF437D6E59E1D260906DD0C74538D2CB3BBD193AC9B08418543B7D8
3,146,140 UART: [art] SIG.S = 14E26173A910F265A09EA48223DD3836B4132F81504CF476869F4558586EAA3D0263BE5E4A1718E76A1368F177CABD3B
3,169,968 UART: Caliptra RT
3,170,221 UART: [state] CFI Enabled
3,277,668 UART: [rt] RT listening for mailbox commands...
3,278,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,600 UART: [rt]cmd =0x41544d4e, len=14344
3,546,466 >>> mbox cmd response data (8 bytes)
3,546,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,304 UART: [rt]cmd =0x41545348, len=116
3,578,302 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,349 ready_for_fw is high
1,060,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,371 >>> mbox cmd response: success
2,690,003 UART:
2,690,019 UART: Running Caliptra FMC ...
2,690,427 UART:
2,690,481 UART: [state] CFI Enabled
2,700,946 UART: [fht] FMC Alias Private Key: 7
2,809,501 UART: [art] Extend RT PCRs Done
2,809,929 UART: [art] Lock RT PCRs Done
2,811,683 UART: [art] Populate DV Done
2,819,724 UART: [fht] FMC Alias Private Key: 7
2,820,736 UART: [art] Derive CDI
2,821,016 UART: [art] Store in in slot 0x4
2,906,771 UART: [art] Derive Key Pair
2,907,131 UART: [art] Store priv key in slot 0x5
2,920,421 UART: [art] Derive Key Pair - Done
2,935,203 UART: [art] Signing Cert with AUTHO
2,935,683 UART: RITY.KEYID = 7
2,951,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,118 UART: [art] PUB.X = DD096029812534F0033A325F3D30CC8F862CBD39A6284F65C89A938280F3D57C9FC51A81D68880AF8683442280CCC7E9
2,958,878 UART: [art] PUB.Y = E44CCC2EF89B9EC32CBE5E68B180377ECE8B72443FB2C8244ED9533BAF8396B656B486B429349D4641C6747AD9C269F4
2,965,836 UART: [art] SIG.R = AB0AFCAEDBC790041FBC71148EB3C7357330299E323A4B89FE2A261EAD9415433FD66E1A440BFABBE4DA8B02D7FC9E58
2,972,616 UART: [art] SIG.S = 8E7F95491EA63FCCDA7729198BC9B1F4CCBEB4F3AF926043BE7DCED53E3D5C8919B35AD6F320BEAF798B29500E948C2C
2,996,400 UART: Caliptra RT
2,996,653 UART: [state] CFI Enabled
3,103,843 UART: [rt] RT listening for mailbox commands...
3,104,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,511 UART: [rt]cmd =0x41544d4e, len=14344
3,372,518 >>> mbox cmd response data (8 bytes)
3,372,519 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,514 UART: [rt]cmd =0x41545348, len=116
3,424,208 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,647 ready_for_fw is high
1,059,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,815 >>> mbox cmd response: success
2,690,849 UART:
2,690,865 UART: Running Caliptra FMC ...
2,691,273 UART:
2,691,327 UART: [state] CFI Enabled
2,701,794 UART: [fht] FMC Alias Private Key: 7
2,809,635 UART: [art] Extend RT PCRs Done
2,810,063 UART: [art] Lock RT PCRs Done
2,811,497 UART: [art] Populate DV Done
2,819,664 UART: [fht] FMC Alias Private Key: 7
2,820,690 UART: [art] Derive CDI
2,820,970 UART: [art] Store in in slot 0x4
2,906,633 UART: [art] Derive Key Pair
2,906,993 UART: [art] Store priv key in slot 0x5
2,920,887 UART: [art] Derive Key Pair - Done
2,935,687 UART: [art] Signing Cert with AUTHO
2,936,167 UART: RITY.KEYID = 7
2,950,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,466 UART: [art] PUB.X = D4C268696C3238E92D5761ABAE7115BD50AAA67BAA214B0DA51CD64D1DC158A348346DDEAC33D6BDB9C4253CACC33A8D
2,958,255 UART: [art] PUB.Y = 7EE5ECD174FD055E4904BC2DB38508B4927D7F1B1A8225329B5C9D10A3AD0817B0CDF4E4CF6B95711EF4F00E9C9711CD
2,965,204 UART: [art] SIG.R = 21AEAE6012B4D31712E691CF4AE55E64D6C7B0AD759CAC1E788E7E65AC01A98A87EFD1B7EBFA4C0AF083822672FAA0BB
2,971,992 UART: [art] SIG.S = 1C3884FC64D05060CDAF107C361E182FA77796A4B80EE8EC50E64BA256CD26982AE2D846FD536BE1D06B2BB32AE3B84E
2,995,320 UART: Caliptra RT
2,995,573 UART: [state] CFI Enabled
3,103,012 UART: [rt] RT listening for mailbox commands...
3,103,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,746 UART: [rt]cmd =0x41544d4e, len=14344
3,371,818 >>> mbox cmd response data (8 bytes)
3,371,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,994 UART: [rt]cmd =0x41545348, len=116
3,403,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,268 UART: [kat] SHA2-256
904,208 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
918,731 UART: [kat] HMAC-384Kdf
923,357 UART: [kat] LMS
1,171,685 UART: [kat] --
1,172,594 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,633 UART: [idev] ++
1,175,801 UART: [idev] CDI.KEYID = 6
1,176,161 UART: [idev] SUBJECT.KEYID = 7
1,176,585 UART: [idev] UDS.KEYID = 0
1,176,930 ready_for_fw is high
1,176,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,201,334 UART: [idev] Sha1 KeyId Algorithm
1,209,734 UART: [idev] --
1,210,732 UART: [ldev] ++
1,210,900 UART: [ldev] CDI.KEYID = 6
1,211,263 UART: [ldev] SUBJECT.KEYID = 5
1,211,689 UART: [ldev] AUTHORITY.KEYID = 7
1,212,152 UART: [ldev] FE.KEYID = 1
1,217,736 UART: [ldev] Erasing FE.KEYID = 1
1,244,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,194 UART: [ldev] --
1,283,519 UART: [fwproc] Wait for Commands...
1,284,261 UART: [fwproc] Recv command 0x46574c44
1,284,989 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,307 >>> mbox cmd response: success
2,777,383 UART: [afmc] ++
2,777,551 UART: [afmc] CDI.KEYID = 6
2,777,913 UART: [afmc] SUBJECT.KEYID = 7
2,778,338 UART: [afmc] AUTHORITY.KEYID = 5
2,814,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,643 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,362 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,216 UART: [afmc] --
2,857,146 UART: [cold-reset] --
2,858,182 UART: [state] Locking Datavault
2,859,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,797 UART: [state] Locking ICCM
2,860,259 UART: [exit] Launching FMC @ 0x40000130
2,865,588 UART:
2,865,604 UART: Running Caliptra FMC ...
2,866,012 UART:
2,866,155 UART: [state] CFI Enabled
2,876,696 UART: [fht] FMC Alias Private Key: 7
2,984,499 UART: [art] Extend RT PCRs Done
2,984,927 UART: [art] Lock RT PCRs Done
2,986,211 UART: [art] Populate DV Done
2,994,494 UART: [fht] FMC Alias Private Key: 7
2,995,482 UART: [art] Derive CDI
2,995,762 UART: [art] Store in in slot 0x4
3,081,181 UART: [art] Derive Key Pair
3,081,541 UART: [art] Store priv key in slot 0x5
3,095,205 UART: [art] Derive Key Pair - Done
3,110,181 UART: [art] Signing Cert with AUTHO
3,110,661 UART: RITY.KEYID = 7
3,125,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,360 UART: [art] PUB.X = 21709F94B40F5AA4801B2A4825AAB67798D228E4B0DFB24EBB86F615AD6C4B986A1C2338209FC8E915AFD0E0FB0283FC
3,133,136 UART: [art] PUB.Y = 9BC38753ECAB7FF07CB992EEA06FB678C440AD3D9BB5FA6D60AC5B5F401C1EBDC2813B90A06AB6FB44243C8CE7B0778B
3,140,112 UART: [art] SIG.R = 4C2ED556569071756894D1CEC82CE062B15A1F7942CBE90426670B8CD4447EA33100B188C0C36804E209E19A9B4D2C2E
3,146,846 UART: [art] SIG.S = 97CA8CEFFFF92E2A337B2EEB7C4711F25505C8BE1399FB5BFC03B9FA949BDCAA13EFA4680DC5FE8DCCD5FBC719E41EA4
3,170,222 UART: Caliptra RT
3,170,567 UART: [state] CFI Enabled
3,279,526 UART: [rt] RT listening for mailbox commands...
3,280,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,372 UART: [rt]cmd =0x41544d4e, len=14344
3,548,255 >>> mbox cmd response data (8 bytes)
3,548,256 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,369 UART: [rt]cmd =0x41545348, len=116
3,599,955 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,846 UART: [kat] SHA2-256
903,786 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,825 UART: [kat] HMAC-384Kdf
923,503 UART: [kat] LMS
1,171,831 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,629 UART: [idev] ++
1,175,797 UART: [idev] CDI.KEYID = 6
1,176,157 UART: [idev] SUBJECT.KEYID = 7
1,176,581 UART: [idev] UDS.KEYID = 0
1,176,926 ready_for_fw is high
1,176,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,201,648 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,211,188 UART: [ldev] ++
1,211,356 UART: [ldev] CDI.KEYID = 6
1,211,719 UART: [ldev] SUBJECT.KEYID = 5
1,212,145 UART: [ldev] AUTHORITY.KEYID = 7
1,212,608 UART: [ldev] FE.KEYID = 1
1,217,860 UART: [ldev] Erasing FE.KEYID = 1
1,244,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,424 UART: [ldev] --
1,283,931 UART: [fwproc] Wait for Commands...
1,284,621 UART: [fwproc] Recv command 0x46574c44
1,285,349 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,613 >>> mbox cmd response: success
2,777,775 UART: [afmc] ++
2,777,943 UART: [afmc] CDI.KEYID = 6
2,778,305 UART: [afmc] SUBJECT.KEYID = 7
2,778,730 UART: [afmc] AUTHORITY.KEYID = 5
2,814,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,630 UART: [afmc] --
2,857,538 UART: [cold-reset] --
2,858,576 UART: [state] Locking Datavault
2,859,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,215 UART: [state] Locking ICCM
2,860,687 UART: [exit] Launching FMC @ 0x40000130
2,866,016 UART:
2,866,032 UART: Running Caliptra FMC ...
2,866,440 UART:
2,866,583 UART: [state] CFI Enabled
2,877,170 UART: [fht] FMC Alias Private Key: 7
2,985,971 UART: [art] Extend RT PCRs Done
2,986,399 UART: [art] Lock RT PCRs Done
2,988,147 UART: [art] Populate DV Done
2,996,326 UART: [fht] FMC Alias Private Key: 7
2,997,358 UART: [art] Derive CDI
2,997,638 UART: [art] Store in in slot 0x4
3,083,927 UART: [art] Derive Key Pair
3,084,287 UART: [art] Store priv key in slot 0x5
3,097,859 UART: [art] Derive Key Pair - Done
3,112,604 UART: [art] Signing Cert with AUTHO
3,113,084 UART: RITY.KEYID = 7
3,128,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,189 UART: [art] PUB.X = C6167C49272763D9554D2542D21DAE9389CE8964401D4264EAFDB989AA1D25C848CBF9DE7F4427A63BB03BF3BD293C94
3,135,965 UART: [art] PUB.Y = 53823FBB8B1ECB49B97658604CAC96624A2BC6D3DB6D25A6269436FC14C0B9310CF4F248940452E8AFA3AC86B42D1B45
3,142,917 UART: [art] SIG.R = 1DF6DF81D0B2D51751F75317FA7DCFC2830193AF6C2E9A8B34C2EF5882DD4F77135B6EC5932C287C419C20767B4DCBA9
3,149,696 UART: [art] SIG.S = 27528F258C8FF92D1D70EE73CB194429D5AD23C0594A321DF7CFCA82BB87D192E97EE7D87DADA24C41A3E4E2473799E6
3,173,931 UART: Caliptra RT
3,174,276 UART: [state] CFI Enabled
3,282,111 UART: [rt] RT listening for mailbox commands...
3,282,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,667 UART: [rt]cmd =0x41544d4e, len=14344
3,550,543 >>> mbox cmd response data (8 bytes)
3,550,544 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,611 UART: [rt]cmd =0x41545348, len=116
3,582,345 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,950 ready_for_fw is high
1,060,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,552 >>> mbox cmd response: success
2,691,730 UART:
2,691,746 UART: Running Caliptra FMC ...
2,692,154 UART:
2,692,297 UART: [state] CFI Enabled
2,702,594 UART: [fht] FMC Alias Private Key: 7
2,811,357 UART: [art] Extend RT PCRs Done
2,811,785 UART: [art] Lock RT PCRs Done
2,813,311 UART: [art] Populate DV Done
2,821,346 UART: [fht] FMC Alias Private Key: 7
2,822,488 UART: [art] Derive CDI
2,822,768 UART: [art] Store in in slot 0x4
2,908,095 UART: [art] Derive Key Pair
2,908,455 UART: [art] Store priv key in slot 0x5
2,922,187 UART: [art] Derive Key Pair - Done
2,937,150 UART: [art] Signing Cert with AUTHO
2,937,630 UART: RITY.KEYID = 7
2,953,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,875 UART: [art] PUB.X = 1AE9F5ED14133951AF61ADC3CCDAFC87FD339AFC97C7EAF6D4AFF9175D5AEC90E0B5684DA4C32F55DDD11CFB230F584D
2,960,674 UART: [art] PUB.Y = EC0D70605FD41EE0661F2E987178504A9FBB7D8BA379E67CE3B18F32858D88D90FDC18DDD9EBCF736940AB184A3E248C
2,967,632 UART: [art] SIG.R = ABAE5DD0D722680513B3BE20BFD2B9ED58FF24F834DB41C6BCCB9B70A5D76DBCBA0B95E79C6C0B0D0FBB1A9E4053C7E1
2,974,419 UART: [art] SIG.S = CBC4E0EA9C815CE7F5FD5333B752095FE90B990FB4C660C6A96B0F19A9E074AB6F91933A98A46C2B30D10A447C3BDAEA
2,998,449 UART: Caliptra RT
2,998,794 UART: [state] CFI Enabled
3,107,252 UART: [rt] RT listening for mailbox commands...
3,107,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,904 UART: [rt]cmd =0x41544d4e, len=14344
3,376,087 >>> mbox cmd response data (8 bytes)
3,376,088 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,243 UART: [rt]cmd =0x41545348, len=116
3,427,755 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,348 ready_for_fw is high
1,060,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,550 >>> mbox cmd response: success
2,691,908 UART:
2,691,924 UART: Running Caliptra FMC ...
2,692,332 UART:
2,692,475 UART: [state] CFI Enabled
2,703,334 UART: [fht] FMC Alias Private Key: 7
2,811,779 UART: [art] Extend RT PCRs Done
2,812,207 UART: [art] Lock RT PCRs Done
2,813,735 UART: [art] Populate DV Done
2,821,892 UART: [fht] FMC Alias Private Key: 7
2,823,006 UART: [art] Derive CDI
2,823,286 UART: [art] Store in in slot 0x4
2,908,907 UART: [art] Derive Key Pair
2,909,267 UART: [art] Store priv key in slot 0x5
2,922,329 UART: [art] Derive Key Pair - Done
2,937,329 UART: [art] Signing Cert with AUTHO
2,937,809 UART: RITY.KEYID = 7
2,953,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,866 UART: [art] PUB.X = C071AFBA2C089A2086C06622A398DE8210AB3E8D9A1FCE903F7B1B45A6C4AB1CECB2AF8EB216677A28A6E54F23D39017
2,960,649 UART: [art] PUB.Y = 2AE9396470782DEE29E73F854B875B2BA841B8A023F8E387C10F78F86EDC0BE2A3D7E63FF1BBC4849ED7B60D5FC52189
2,967,602 UART: [art] SIG.R = 6C3133F6DBAB3229E1010D554DA46E5EF9C96D73712C2485408B908F2A5D218EBC4B772113E400BF4E23E521F79E4B22
2,974,346 UART: [art] SIG.S = 47375DD004EC72D94F3501AA6926B69897C3D524278C1B41C13DC1BEDD6EE9A1D7682A3F11FD6E530A46DE613C8A65E3
2,998,054 UART: Caliptra RT
2,998,399 UART: [state] CFI Enabled
3,106,434 UART: [rt] RT listening for mailbox commands...
3,107,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,244 UART: [rt]cmd =0x41544d4e, len=14344
3,375,014 >>> mbox cmd response data (8 bytes)
3,375,015 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,162 UART: [rt]cmd =0x41545348, len=116
3,406,924 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,320 UART: [kat] LMS
1,168,632 UART: [kat] --
1,169,227 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,483 UART: [idev] ++
1,172,651 UART: [idev] CDI.KEYID = 6
1,173,012 UART: [idev] SUBJECT.KEYID = 7
1,173,437 UART: [idev] UDS.KEYID = 0
1,173,783 ready_for_fw is high
1,173,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,494 UART: [ldev] ++
1,208,662 UART: [ldev] CDI.KEYID = 6
1,209,026 UART: [ldev] SUBJECT.KEYID = 5
1,209,453 UART: [ldev] AUTHORITY.KEYID = 7
1,209,916 UART: [ldev] FE.KEYID = 1
1,214,962 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,737 UART: [fwproc] Recv command 0x46574c44
1,281,470 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,014 >>> mbox cmd response: success
2,776,173 UART: [afmc] ++
2,776,341 UART: [afmc] CDI.KEYID = 6
2,776,704 UART: [afmc] SUBJECT.KEYID = 7
2,777,130 UART: [afmc] AUTHORITY.KEYID = 5
2,812,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,328 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,047 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,722 UART: [afmc] --
2,855,816 UART: [cold-reset] --
2,856,398 UART: [state] Locking Datavault
2,857,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,265 UART: [state] Locking ICCM
2,858,701 UART: [exit] Launching FMC @ 0x40000130
2,864,030 UART:
2,864,046 UART: Running Caliptra FMC ...
2,864,454 UART:
2,864,508 UART: [state] CFI Enabled
2,875,027 UART: [fht] FMC Alias Private Key: 7
2,982,224 UART: [art] Extend RT PCRs Done
2,982,652 UART: [art] Lock RT PCRs Done
2,984,274 UART: [art] Populate DV Done
2,992,549 UART: [fht] FMC Alias Private Key: 7
2,993,489 UART: [art] Derive CDI
2,993,769 UART: [art] Store in in slot 0x4
3,079,376 UART: [art] Derive Key Pair
3,079,736 UART: [art] Store priv key in slot 0x5
3,092,704 UART: [art] Derive Key Pair - Done
3,107,615 UART: [art] Signing Cert with AUTHO
3,108,095 UART: RITY.KEYID = 7
3,123,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,000 UART: [art] PUB.X = 346EE7EE53DE0581E6A53481BB232D9860953997806538FC0BC507C5B3C864CE262D09C941EACE525DAD62C101010FC3
3,130,751 UART: [art] PUB.Y = F1551F213B2D5683AD60A5D401A6958F8DF4A7B13F5C40DAA2A8D827509FCF6B0D0DB336D123A4A34CE0E8CD07C832BC
3,137,705 UART: [art] SIG.R = 88264A8CFC4C5CA436C0A087F02E1C68DAE4B17994A72FADF94B5528E7E144CA544698CBAD2D4E724C3E71C205D3DA18
3,144,486 UART: [art] SIG.S = 646A2C6BD62551EC1E98C4E89D7DF08F92894FA914C1F7C0A4DCE22FFD1A3981D15D0E422444B51FDD57260B6F7BA19E
3,168,107 UART: Caliptra RT
3,168,360 UART: [state] CFI Enabled
3,276,673 UART: [rt] RT listening for mailbox commands...
3,277,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,575 UART: [rt]cmd =0x41544d4e, len=14344
3,544,866 >>> mbox cmd response data (8 bytes)
3,544,867 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,876 UART: [rt]cmd =0x41545348, len=116
3,596,126 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,597 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,743 UART: [idev] ++
1,173,911 UART: [idev] CDI.KEYID = 6
1,174,272 UART: [idev] SUBJECT.KEYID = 7
1,174,697 UART: [idev] UDS.KEYID = 0
1,175,043 ready_for_fw is high
1,175,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,715 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,208,972 UART: [ldev] ++
1,209,140 UART: [ldev] CDI.KEYID = 6
1,209,504 UART: [ldev] SUBJECT.KEYID = 5
1,209,931 UART: [ldev] AUTHORITY.KEYID = 7
1,210,394 UART: [ldev] FE.KEYID = 1
1,215,656 UART: [ldev] Erasing FE.KEYID = 1
1,242,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,129 UART: [fwproc] Recv command 0x46574c44
1,282,862 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,866 >>> mbox cmd response: success
2,776,003 UART: [afmc] ++
2,776,171 UART: [afmc] CDI.KEYID = 6
2,776,534 UART: [afmc] SUBJECT.KEYID = 7
2,776,960 UART: [afmc] AUTHORITY.KEYID = 5
2,812,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,366 UART: [afmc] --
2,856,404 UART: [cold-reset] --
2,856,994 UART: [state] Locking Datavault
2,858,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,807 UART: [state] Locking ICCM
2,859,299 UART: [exit] Launching FMC @ 0x40000130
2,864,628 UART:
2,864,644 UART: Running Caliptra FMC ...
2,865,052 UART:
2,865,106 UART: [state] CFI Enabled
2,875,653 UART: [fht] FMC Alias Private Key: 7
2,983,042 UART: [art] Extend RT PCRs Done
2,983,470 UART: [art] Lock RT PCRs Done
2,985,242 UART: [art] Populate DV Done
2,993,541 UART: [fht] FMC Alias Private Key: 7
2,994,585 UART: [art] Derive CDI
2,994,865 UART: [art] Store in in slot 0x4
3,080,028 UART: [art] Derive Key Pair
3,080,388 UART: [art] Store priv key in slot 0x5
3,093,758 UART: [art] Derive Key Pair - Done
3,108,447 UART: [art] Signing Cert with AUTHO
3,108,927 UART: RITY.KEYID = 7
3,123,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,674 UART: [art] PUB.X = A11A6F7C3C23CC84FAD500408E63E59313896F494310DA88D6EE5964B361F6FF202D67A40259BED8DA73215156C3EDAE
3,131,425 UART: [art] PUB.Y = E893DDBE7C874CEFB76C9883915AE9AC090F850636DF6BB8B362EA7E9F5300CF8D52F5AE575F9B005AC7590875EAFD1E
3,138,337 UART: [art] SIG.R = BF406C57E1DF71DD71F2220B9329C4E2E2175C612078D42172B84E8304DE9ECDDB14196303306538073398B7D43F15A4
3,145,089 UART: [art] SIG.S = F6B390E915CADC637EB27D78F0547C7F28A882FA608F119457B07CADAAAAB88701CDB02905F61CFC436BC0F0F2EE0E08
3,168,712 UART: Caliptra RT
3,168,965 UART: [state] CFI Enabled
3,276,441 UART: [rt] RT listening for mailbox commands...
3,277,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,123 UART: [rt]cmd =0x41544d4e, len=14344
3,545,005 >>> mbox cmd response data (8 bytes)
3,545,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,163 UART: [rt]cmd =0x41545348, len=116
3,577,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,500 ready_for_fw is high
1,055,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,420 >>> mbox cmd response: success
2,684,422 UART:
2,684,438 UART: Running Caliptra FMC ...
2,684,846 UART:
2,684,900 UART: [state] CFI Enabled
2,695,517 UART: [fht] FMC Alias Private Key: 7
2,803,260 UART: [art] Extend RT PCRs Done
2,803,688 UART: [art] Lock RT PCRs Done
2,805,054 UART: [art] Populate DV Done
2,813,443 UART: [fht] FMC Alias Private Key: 7
2,814,515 UART: [art] Derive CDI
2,814,795 UART: [art] Store in in slot 0x4
2,900,478 UART: [art] Derive Key Pair
2,900,838 UART: [art] Store priv key in slot 0x5
2,914,268 UART: [art] Derive Key Pair - Done
2,929,029 UART: [art] Signing Cert with AUTHO
2,929,509 UART: RITY.KEYID = 7
2,944,591 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,356 UART: [art] PUB.X = BD484DDFF7C41006D618CF3AB2C31C6D2DA486D22024265BDEDE068998D2B32D662A9687424FC5F888ED58577F008B6B
2,952,106 UART: [art] PUB.Y = 5102968ECECB8E9192F1B03618839785632D63BD2E5DA301257B871CA92C0BB59B39E366D294D18CA957B06483D24FAF
2,959,047 UART: [art] SIG.R = 3AE76FF11317F56592293DA994EB1DA1F25C155AC0F7151FE483D60FFD900178D6FCE34F516AFD9052D861B1B6BC2813
2,965,819 UART: [art] SIG.S = C7927F86EBE163762F9E944EA4D51F4ED1FEA89CE70D456A07937825DBDDD45FB0189181EC0A49D2D9C3AB5FDCE35634
2,989,421 UART: Caliptra RT
2,989,674 UART: [state] CFI Enabled
3,097,139 UART: [rt] RT listening for mailbox commands...
3,097,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,619 UART: [rt]cmd =0x41544d4e, len=14344
3,365,582 >>> mbox cmd response data (8 bytes)
3,365,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,794 UART: [rt]cmd =0x41545348, len=116
3,417,444 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,374 ready_for_fw is high
1,055,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,432 >>> mbox cmd response: success
2,687,302 UART:
2,687,318 UART: Running Caliptra FMC ...
2,687,726 UART:
2,687,780 UART: [state] CFI Enabled
2,698,167 UART: [fht] FMC Alias Private Key: 7
2,805,352 UART: [art] Extend RT PCRs Done
2,805,780 UART: [art] Lock RT PCRs Done
2,807,278 UART: [art] Populate DV Done
2,815,407 UART: [fht] FMC Alias Private Key: 7
2,816,557 UART: [art] Derive CDI
2,816,837 UART: [art] Store in in slot 0x4
2,902,790 UART: [art] Derive Key Pair
2,903,150 UART: [art] Store priv key in slot 0x5
2,916,276 UART: [art] Derive Key Pair - Done
2,930,965 UART: [art] Signing Cert with AUTHO
2,931,445 UART: RITY.KEYID = 7
2,946,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,472 UART: [art] PUB.X = 8479AA2DEB50543F3C153DCDE6EDECE6E17C770BED3E806E9FD5B233007F232D8E816F9B1E12400E6CE5D2804069EB03
2,954,225 UART: [art] PUB.Y = 84A3B66D3970644C1E6EC462969F8E289351CB67C8090D43DE1054A57D5EBBCE547457665C088C188D2B3518C9AA2AEC
2,961,168 UART: [art] SIG.R = 31A690C49D774CED434A1AF255C62B8CF56B9387BC5A6C0BF56A9AB4AAD2317C753490653C619EC7D324C093352DE40E
2,967,940 UART: [art] SIG.S = B7A9ACBBCB6A5F6934DE53AC387380EB31E17C3FA9CA05887EEE510436ABC2E65ADA13921BCAA8E5AE17A736AE5FE0BA
2,991,695 UART: Caliptra RT
2,991,948 UART: [state] CFI Enabled
3,100,241 UART: [rt] RT listening for mailbox commands...
3,100,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,967 UART: [rt]cmd =0x41544d4e, len=14344
3,368,885 >>> mbox cmd response data (8 bytes)
3,368,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,891 UART: [rt]cmd =0x41545348, len=116
3,400,811 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 ready_for_fw is high
1,174,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,099 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,823 >>> mbox cmd response: success
2,774,084 UART: [afmc] ++
2,774,252 UART: [afmc] CDI.KEYID = 6
2,774,615 UART: [afmc] SUBJECT.KEYID = 7
2,775,041 UART: [afmc] AUTHORITY.KEYID = 5
2,810,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,237 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,691 UART: [afmc] --
2,853,703 UART: [cold-reset] --
2,854,551 UART: [state] Locking Datavault
2,855,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,088 UART: [state] Locking ICCM
2,856,522 UART: [exit] Launching FMC @ 0x40000130
2,861,851 UART:
2,861,867 UART: Running Caliptra FMC ...
2,862,275 UART:
2,862,418 UART: [state] CFI Enabled
2,872,969 UART: [fht] FMC Alias Private Key: 7
2,980,332 UART: [art] Extend RT PCRs Done
2,980,760 UART: [art] Lock RT PCRs Done
2,982,290 UART: [art] Populate DV Done
2,990,589 UART: [fht] FMC Alias Private Key: 7
2,991,577 UART: [art] Derive CDI
2,991,857 UART: [art] Store in in slot 0x4
3,077,468 UART: [art] Derive Key Pair
3,077,828 UART: [art] Store priv key in slot 0x5
3,091,082 UART: [art] Derive Key Pair - Done
3,105,547 UART: [art] Signing Cert with AUTHO
3,106,027 UART: RITY.KEYID = 7
3,121,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,164 UART: [art] PUB.X = EE0AF9992F62C29E00FCAF57AFCAEE4D12CEAB8F10E46E09D5A05AE44CC5720F082EE5A41E99B88F3F50F71654A38E85
3,128,922 UART: [art] PUB.Y = BFE40B38849FEDC4910C4C0EAD15A69F9A0981DD6F380D726A132A4F70FB50F7228CD1C3F1F39B99DEA874ED9EDBF9F4
3,135,879 UART: [art] SIG.R = F9C8FDF61B9AACC61024DEC23E116827F546E5EC5393B2C65ACA96D458105CB327300BBD74619AB1B409888369D9C5FA
3,142,653 UART: [art] SIG.S = 7C688573DD2A92FE7E5190C915D54A4226D28175A3DF3C16D1A1A8FAD022E6063FDB94FE734E7A54BF29168B59C7A68B
3,166,837 UART: Caliptra RT
3,167,182 UART: [state] CFI Enabled
3,274,503 UART: [rt] RT listening for mailbox commands...
3,275,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,941 UART: [rt]cmd =0x41544d4e, len=14344
3,542,852 >>> mbox cmd response data (8 bytes)
3,542,853 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,864 UART: [rt]cmd =0x41545348, len=116
3,594,862 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,174,696 ready_for_fw is high
1,174,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,291 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,147 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,533 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,631 >>> mbox cmd response: success
2,776,816 UART: [afmc] ++
2,776,984 UART: [afmc] CDI.KEYID = 6
2,777,347 UART: [afmc] SUBJECT.KEYID = 7
2,777,773 UART: [afmc] AUTHORITY.KEYID = 5
2,813,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,561 UART: [afmc] --
2,856,495 UART: [cold-reset] --
2,857,371 UART: [state] Locking Datavault
2,858,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,962 UART: [state] Locking ICCM
2,859,576 UART: [exit] Launching FMC @ 0x40000130
2,864,905 UART:
2,864,921 UART: Running Caliptra FMC ...
2,865,329 UART:
2,865,472 UART: [state] CFI Enabled
2,876,099 UART: [fht] FMC Alias Private Key: 7
2,984,018 UART: [art] Extend RT PCRs Done
2,984,446 UART: [art] Lock RT PCRs Done
2,985,924 UART: [art] Populate DV Done
2,994,259 UART: [fht] FMC Alias Private Key: 7
2,995,273 UART: [art] Derive CDI
2,995,553 UART: [art] Store in in slot 0x4
3,081,406 UART: [art] Derive Key Pair
3,081,766 UART: [art] Store priv key in slot 0x5
3,094,906 UART: [art] Derive Key Pair - Done
3,109,514 UART: [art] Signing Cert with AUTHO
3,109,994 UART: RITY.KEYID = 7
3,125,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,315 UART: [art] PUB.X = 486505A9C20EC4803BD4E2C18BE694401ECB8B5607F75A12CF4851AD73876D9E82B9C9CF3CDBDDD4EC3C6636B4E6A6D2
3,133,092 UART: [art] PUB.Y = C6C8AA5D756225E73E5BDF09FCCE942351DBCFB7C2078FF2063807ABFC3C06AD9FADBC31CEE37061D8CE0D78A794F12F
3,140,050 UART: [art] SIG.R = A0E5770AB5698C3B2D45AB87D6A09A4EE49B000AD12A8EF7311C67375CAA41D25F7DE4A59A8C81A723F45FEDF701AE6F
3,146,807 UART: [art] SIG.S = 4DE6F1574103BDC6CD80852C2F6342F752BE7D6CF3A107968EB79F18654B9442C5FC66E421C5818EC6158CC47F8A11AE
3,170,030 UART: Caliptra RT
3,170,375 UART: [state] CFI Enabled
3,277,854 UART: [rt] RT listening for mailbox commands...
3,278,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,722 UART: [rt]cmd =0x41544d4e, len=14344
3,546,746 >>> mbox cmd response data (8 bytes)
3,546,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,940 UART: [rt]cmd =0x41545348, len=116
3,578,618 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,629 ready_for_fw is high
1,056,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,677 >>> mbox cmd response: success
2,686,749 UART:
2,686,765 UART: Running Caliptra FMC ...
2,687,173 UART:
2,687,316 UART: [state] CFI Enabled
2,697,807 UART: [fht] FMC Alias Private Key: 7
2,805,938 UART: [art] Extend RT PCRs Done
2,806,366 UART: [art] Lock RT PCRs Done
2,808,146 UART: [art] Populate DV Done
2,816,537 UART: [fht] FMC Alias Private Key: 7
2,817,635 UART: [art] Derive CDI
2,817,915 UART: [art] Store in in slot 0x4
2,903,332 UART: [art] Derive Key Pair
2,903,692 UART: [art] Store priv key in slot 0x5
2,917,250 UART: [art] Derive Key Pair - Done
2,931,703 UART: [art] Signing Cert with AUTHO
2,932,183 UART: RITY.KEYID = 7
2,947,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,204 UART: [art] PUB.X = 55CBC66C5788E9809C6FE5872000063C385695CDA7161BB9F9EF223F12D0EB46C6851A2840735092667DAAB570A6AE94
2,954,947 UART: [art] PUB.Y = 8FEB45AA9B36C62644DC8BA79FF03F8F7470F0A1E1E1F53DFF15CC067590A69453E0FC525A62FDF97800DA744144BC6A
2,961,886 UART: [art] SIG.R = 44BCCC1E30D0AD0546C79EB251BBAF9CBF5023428F906ED0F72276BF6814B2589B33297EDE93A6E1DAE4074558B96267
2,968,658 UART: [art] SIG.S = 3C12A134D9B512DB0D0B812CCCDC690C0EAAF3B603A65D475D94D03A1206658481A899EC2B27F0F1E9EC63A840431109
2,992,420 UART: Caliptra RT
2,992,765 UART: [state] CFI Enabled
3,100,386 UART: [rt] RT listening for mailbox commands...
3,101,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,084 UART: [rt]cmd =0x41544d4e, len=14344
3,368,761 >>> mbox cmd response data (8 bytes)
3,368,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,859 UART: [rt]cmd =0x41545348, len=116
3,420,757 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 ready_for_fw is high
1,056,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,963 >>> mbox cmd response: success
2,687,665 UART:
2,687,681 UART: Running Caliptra FMC ...
2,688,089 UART:
2,688,232 UART: [state] CFI Enabled
2,699,039 UART: [fht] FMC Alias Private Key: 7
2,807,228 UART: [art] Extend RT PCRs Done
2,807,656 UART: [art] Lock RT PCRs Done
2,809,362 UART: [art] Populate DV Done
2,817,383 UART: [fht] FMC Alias Private Key: 7
2,818,483 UART: [art] Derive CDI
2,818,763 UART: [art] Store in in slot 0x4
2,904,250 UART: [art] Derive Key Pair
2,904,610 UART: [art] Store priv key in slot 0x5
2,917,438 UART: [art] Derive Key Pair - Done
2,932,246 UART: [art] Signing Cert with AUTHO
2,932,726 UART: RITY.KEYID = 7
2,948,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,773 UART: [art] PUB.X = 0167EB1B069EA888FC67D7E06D83927FB1C83F3A82C057E9D22721CB5CE86FF31ACC4ABF5166CB847392054A071F02CF
2,955,538 UART: [art] PUB.Y = 8434684FA1867F6A06C49D5FB11DAB0EC894A84D8AF4D6CC7F79DC135A41C5B9120A92656E4AABECC2173867557C311F
2,962,489 UART: [art] SIG.R = EF13DAFD46B6EE3C11B7EEB49F11C02922BA941724DB89825331FEC3C1B98CE1DE3ECCB9760304748971ED38F8F190D6
2,969,267 UART: [art] SIG.S = AABE4C4B8675854C87EF37DCC2419ED888221FFC8552D843B405C88013346FDA34F9FFA45E2588C013AAA260B62628D2
2,993,071 UART: Caliptra RT
2,993,416 UART: [state] CFI Enabled
3,100,802 UART: [rt] RT listening for mailbox commands...
3,101,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,418 UART: [rt]cmd =0x41544d4e, len=14344
3,369,652 >>> mbox cmd response data (8 bytes)
3,369,653 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,636 UART: [rt]cmd =0x41545348, len=116
3,401,480 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,210 UART:
192,574 UART: Running Caliptra ROM ...
193,767 UART:
193,925 UART: [state] CFI Enabled
262,229 UART: [state] LifecycleState = Unprovisioned
264,147 UART: [state] DebugLocked = No
265,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,907 UART: [kat] SHA2-256
439,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,134 UART: [kat] ++
450,612 UART: [kat] sha1
462,766 UART: [kat] SHA2-256
465,434 UART: [kat] SHA2-384
470,146 UART: [kat] SHA2-512-ACC
472,450 UART: [kat] ECC-384
2,766,109 UART: [kat] HMAC-384Kdf
2,779,286 UART: [kat] LMS
3,969,620 UART: [kat] --
3,974,856 UART: [cold-reset] ++
3,976,725 UART: [fht] Storing FHT @ 0x50003400
3,988,842 UART: [idev] ++
3,989,477 UART: [idev] CDI.KEYID = 6
3,990,387 UART: [idev] SUBJECT.KEYID = 7
3,991,635 UART: [idev] UDS.KEYID = 0
3,992,732 ready_for_fw is high
3,992,947 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,417 UART: [idev] Erasing UDS.KEYID = 0
7,324,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,213 UART: [idev] --
7,351,486 UART: [ldev] ++
7,352,098 UART: [ldev] CDI.KEYID = 6
7,353,019 UART: [ldev] SUBJECT.KEYID = 5
7,354,238 UART: [ldev] AUTHORITY.KEYID = 7
7,355,467 UART: [ldev] FE.KEYID = 1
7,401,959 UART: [ldev] Erasing FE.KEYID = 1
10,733,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,927 UART: [ldev] --
13,095,949 UART: [fwproc] Waiting for Commands...
13,097,987 UART: [fwproc] Received command 0x46574c44
13,100,167 UART: [fwproc] Received Image of size 114124 bytes
17,149,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,228,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,296,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,614,431 >>> mbox cmd response: success
17,618,305 UART: [afmc] ++
17,618,902 UART: [afmc] CDI.KEYID = 6
17,619,791 UART: [afmc] SUBJECT.KEYID = 7
17,621,061 UART: [afmc] AUTHORITY.KEYID = 5
20,988,709 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,220 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,606 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,477 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,903 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,462 UART: [afmc] --
23,355,667 UART: [cold-reset] --
23,360,743 UART: [state] Locking Datavault
23,365,940 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,642 UART: [state] Locking ICCM
23,368,902 UART: [exit] Launching FMC @ 0x40000130
23,377,288 UART:
23,377,522 UART: Running Caliptra FMC ...
23,378,546 UART:
23,378,693 UART: [state] CFI Enabled
23,435,700 UART: [fht] FMC Alias Private Key: 7
25,773,291 UART: [art] Extend RT PCRs Done
25,774,513 UART: [art] Lock RT PCRs Done
25,776,384 UART: [art] Populate DV Done
25,781,910 UART: [fht] FMC Alias Private Key: 7
25,783,407 UART: [art] Derive CDI
25,784,173 UART: [art] Store in in slot 0x4
25,845,711 UART: [art] Derive Key Pair
25,846,769 UART: [art] Store priv key in slot 0x5
29,139,616 UART: [art] Derive Key Pair - Done
29,152,993 UART: [art] Signing Cert with AUTHO
29,154,295 UART: RITY.KEYID = 7
31,441,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,442,624 UART: [art] PUB.X = EFF041497EC2853FB3B226D367E1DC4B5639866405AF4EAA8F731B738352011B6FA10C06B7318B45911537E65989459C
31,449,870 UART: [art] PUB.Y = 9533E8528CBECB8B12F55F894FB582A572AA2D5276CE682CE8821CFD91485C0E311066051C02C3B202B17BB3E0B960B7
31,457,071 UART: [art] SIG.R = 0C7057619826F1AA7F894378F7E31E8015D8473EF60DEC36DF034E6A9BE1F970A964D6A1E09C2B792FC32A7CC2FBA565
31,464,487 UART: [art] SIG.S = 46F17E9597DB44C036284A68522852D962F4D777AB4221058EC2F43121AC146F9C8E67AA4A725445DDB5F0225C933C6F
32,770,270 UART: Caliptra RT
32,770,989 UART: [state] CFI Enabled
32,931,269 UART: [rt] RT listening for mailbox commands...
37,110,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,266,623 UART: [rt]cmd =0x41544d4e, len=14344
42,501,947 >>> mbox cmd response data (8 bytes)
42,502,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,533,628 UART: [rt]cmd =0x41545348, len=116
42,553,201 >>> mbox cmd response data (12 bytes)
44,675,453 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
44,776,749 UART:
44,777,114 UART: Running Caliptra ROM ...
44,778,159 UART:
44,778,310 UART: [state] CFI Enabled
44,835,708 UART: [state] LifecycleState = Unprovisioned
44,837,654 UART: [state] DebugLocked = No
44,839,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,844,777 UART: [kat] SHA2-256
45,014,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,024,965 UART: [kat] ++
45,025,421 UART: [kat] sha1
45,037,562 UART: [kat] SHA2-256
45,040,304 UART: [kat] SHA2-384
45,046,846 UART: [kat] SHA2-512-ACC
45,049,198 UART: [kat] ECC-384
47,338,711 UART: [kat] HMAC-384Kdf
47,370,756 UART: [kat] LMS
48,561,095 UART: [kat] --
48,566,327 UART: [update-reset] ++
52,279,422 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,283,101 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
52,541,543 >>> mbox cmd response: success
52,541,919 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,543,455 UART: [update-reset] Copying MAN_2 To MAN_1
52,565,916 UART: [update-reset Success] --
52,571,131 UART: [state] Locking Datavault
52,573,795 UART: [state] Locking PCR0, PCR1 and PCR31
52,575,496 UART: [state] Locking ICCM
52,577,081 UART: [exit] Launching FMC @ 0x40000130
52,585,528 UART:
52,585,770 UART: Running Caliptra FMC ...
52,586,796 UART:
52,586,945 UART: [state] CFI Enabled
52,674,279 UART: [art] Extend RT PCRs Done
52,675,464 UART: [art] Lock RT PCRs Done
52,676,898 UART: [art] Populate DV Done
52,682,310 UART: [fht] FMC Alias Private Key: 7
52,683,960 UART: [art] Derive CDI
52,684,773 UART: [art] Store in in slot 0x4
52,743,519 UART: [art] Derive Key Pair
52,744,560 UART: [art] Store priv key in slot 0x5
56,037,425 UART: [art] Derive Key Pair - Done
56,050,488 UART: [art] Signing Cert with AUTHO
56,051,802 UART: RITY.KEYID = 7
58,339,354 UART: [art] Erasing AUTHORITY.KEYID = 7
58,340,864 UART: [art] PUB.X = 2F153A5DC33406647A1F5653CB59AD3285653BC0064BA52A203ADA0D8FF8A792543BF17933FD716960469171B9C89624
58,348,124 UART: [art] PUB.Y = 30FED02F4D2BBB28EAE72CEC1306C583585BC43AD48FACDC0A229FEA5E441652E0814DBD7BD67829FE13AD26E6D4493A
58,355,368 UART: [art] SIG.R = A421E014381DE2FDE8C6A68345D47AF1FB47D79747D578331CB6DFCBAA1B922BBA29F256C9E879BDB0DCA8C7311D8AD4
58,362,767 UART: [art] SIG.S = B18F50B10CCF881BBDBD3971245EC688490BA10DA498482154601D32441FD6D8893D8E612C317A14C0BA66A6F22C27D7
59,667,757 UART: mbox::rt_entry...
59,668,735 UART: ____ _ _ _ ____ _____
59,670,719 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,672,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,674,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,676,675 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,678,595 UART: |_|
59,679,406 UART:
59,965,680 UART: [rt] Runtime listening for mailbox commands...
59,967,851 >>> mbox cmd response data (48 bytes)
59,968,433 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,970,754 >>> mbox cmd response data (48 bytes)
59,971,660 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,985,504 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,806,286 ready_for_fw is high
3,806,702 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,855,765 >>> mbox cmd response: success
23,554,239 UART:
23,554,659 UART: Running Caliptra FMC ...
23,555,772 UART:
23,555,937 UART: [state] CFI Enabled
23,619,360 UART: [fht] FMC Alias Private Key: 7
25,957,836 UART: [art] Extend RT PCRs Done
25,959,070 UART: [art] Lock RT PCRs Done
25,960,709 UART: [art] Populate DV Done
25,966,072 UART: [fht] FMC Alias Private Key: 7
25,967,711 UART: [art] Derive CDI
25,968,535 UART: [art] Store in in slot 0x4
26,028,060 UART: [art] Derive Key Pair
26,029,069 UART: [art] Store priv key in slot 0x5
29,322,001 UART: [art] Derive Key Pair - Done
29,335,054 UART: [art] Signing Cert with AUTHO
29,336,398 UART: RITY.KEYID = 7
31,624,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,753 UART: [art] PUB.X = 8259A5D721F3E60043462185C7BAE5D48F3651B4B603429DE06775D28C6BDE22D9B47201329B4BE66318C9807B9D2ABB
31,632,949 UART: [art] PUB.Y = FD46CA2E18D71222A639F537781B00BA51B2478C764D0B0D426B3372140121421A1B897DC089109010052B81B39EF4E5
31,640,140 UART: [art] SIG.R = BA9468C0D7D354935F123D358D192FB8616672FEEA38456198300451E8416CF32E2C85587ADCDF44F3F5F78F9DE98A7C
31,647,577 UART: [art] SIG.S = 4E190F938A6F78A1FD2E1E056B2D3A82DD5DE76DDD011E63026D5DD56EEF3AE65B0428C66D12033E7260A1C22E996296
32,952,254 UART: Caliptra RT
32,952,960 UART: [state] CFI Enabled
33,115,397 UART: [rt] RT listening for mailbox commands...
37,297,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,453,126 UART: [rt]cmd =0x41544d4e, len=14344
42,689,098 >>> mbox cmd response data (8 bytes)
42,689,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,720,541 UART: [rt]cmd =0x41545348, len=116
42,739,925 >>> mbox cmd response data (12 bytes)
44,862,716 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,826,244 >>> mbox cmd response: success
52,826,720 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,861,095 UART:
52,861,409 UART: Running Caliptra FMC ...
52,862,533 UART:
52,862,701 UART: [state] CFI Enabled
52,962,073 UART: [art] Extend RT PCRs Done
52,963,259 UART: [art] Lock RT PCRs Done
52,964,556 UART: [art] Populate DV Done
52,969,804 UART: [fht] FMC Alias Private Key: 7
52,971,349 UART: [art] Derive CDI
52,972,166 UART: [art] Store in in slot 0x4
53,031,451 UART: [art] Derive Key Pair
53,032,488 UART: [art] Store priv key in slot 0x5
56,325,445 UART: [art] Derive Key Pair - Done
56,338,122 UART: [art] Signing Cert with AUTHO
56,339,423 UART: RITY.KEYID = 7
58,627,303 UART: [art] Erasing AUTHORITY.KEYID = 7
58,628,809 UART: [art] PUB.X = BC95E3EA6749E142EF01A3364A5756E08ED785775AE2006866B38173004A287B7BFC46838A3574D7A4AA46BBE1ED1ADF
58,636,001 UART: [art] PUB.Y = 6B7C4BF3897106337A828D883045F71A2519CFEB68D803ADF930B5CFC0FF019D0015BD8286AA2283AE8F32F285B50392
58,643,237 UART: [art] SIG.R = 86AAF131CFF5A15AA593981DCED80AD76015DEB1BDB292DB1D05700D0A9CDEC2CCD10675A5DBACEFD65F4FD9DF21CBDD
58,650,675 UART: [art] SIG.S = 681D12839BD3DDE7B98678738B8F8474248244726252BE323DF10481FD724A982F30FA7C7EBE0F548A0495EEB5A7EB70
59,955,397 UART: mbox::rt_entry...
59,956,372 UART: ____ _ _ _ ____ _____
59,958,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,960,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,962,256 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,964,387 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,966,399 UART: |_|
59,967,219 UART:
60,249,073 UART: [rt] Runtime listening for mailbox commands...
60,251,195 >>> mbox cmd response data (48 bytes)
60,251,756 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,254,083 >>> mbox cmd response data (48 bytes)
60,254,966 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,268,817 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,559 UART:
192,947 UART: Running Caliptra ROM ...
194,089 UART:
603,949 UART: [state] CFI Enabled
618,755 UART: [state] LifecycleState = Unprovisioned
620,623 UART: [state] DebugLocked = No
622,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,872 UART: [kat] SHA2-256
796,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,180 UART: [kat] ++
807,640 UART: [kat] sha1
817,014 UART: [kat] SHA2-256
819,707 UART: [kat] SHA2-384
825,628 UART: [kat] SHA2-512-ACC
827,987 UART: [kat] ECC-384
3,111,429 UART: [kat] HMAC-384Kdf
3,124,863 UART: [kat] LMS
4,314,919 UART: [kat] --
4,317,565 UART: [cold-reset] ++
4,319,281 UART: [fht] Storing FHT @ 0x50003400
4,330,541 UART: [idev] ++
4,331,241 UART: [idev] CDI.KEYID = 6
4,332,127 UART: [idev] SUBJECT.KEYID = 7
4,333,241 UART: [idev] UDS.KEYID = 0
4,334,378 ready_for_fw is high
4,334,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,477 UART: [idev] Erasing UDS.KEYID = 0
7,623,582 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,316 UART: [idev] --
7,649,556 UART: [ldev] ++
7,650,125 UART: [ldev] CDI.KEYID = 6
7,651,058 UART: [ldev] SUBJECT.KEYID = 5
7,652,318 UART: [ldev] AUTHORITY.KEYID = 7
7,653,519 UART: [ldev] FE.KEYID = 1
7,664,608 UART: [ldev] Erasing FE.KEYID = 1
10,952,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,334 UART: [ldev] --
13,315,466 UART: [fwproc] Waiting for Commands...
13,317,409 UART: [fwproc] Received command 0x46574c44
13,319,595 UART: [fwproc] Received Image of size 114124 bytes
17,372,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,191 >>> mbox cmd response: success
17,829,919 UART: [afmc] ++
17,830,521 UART: [afmc] CDI.KEYID = 6
17,831,424 UART: [afmc] SUBJECT.KEYID = 7
17,832,690 UART: [afmc] AUTHORITY.KEYID = 5
21,146,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,276 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,663 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,479 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,932 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,788 UART: [afmc] --
23,511,462 UART: [cold-reset] --
23,515,814 UART: [state] Locking Datavault
23,521,437 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,193 UART: [state] Locking ICCM
23,524,364 UART: [exit] Launching FMC @ 0x40000130
23,532,758 UART:
23,532,997 UART: Running Caliptra FMC ...
23,534,097 UART:
23,534,252 UART: [state] CFI Enabled
23,542,280 UART: [fht] FMC Alias Private Key: 7
25,873,537 UART: [art] Extend RT PCRs Done
25,874,765 UART: [art] Lock RT PCRs Done
25,876,441 UART: [art] Populate DV Done
25,882,012 UART: [fht] FMC Alias Private Key: 7
25,883,724 UART: [art] Derive CDI
25,884,559 UART: [art] Store in in slot 0x4
25,926,774 UART: [art] Derive Key Pair
25,927,770 UART: [art] Store priv key in slot 0x5
29,170,257 UART: [art] Derive Key Pair - Done
29,183,411 UART: [art] Signing Cert with AUTHO
29,184,716 UART: RITY.KEYID = 7
31,464,196 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,707 UART: [art] PUB.X = 8BD8388BA8596D6021170069CDDE943B48DA4A71E5051E2798F5F9E85EFFABF5A8D2972B4A0B88BCFAA5B92513B2824A
31,472,971 UART: [art] PUB.Y = 203B3935EA721B11C05908241C1C59DB10FE1CC3FC4205B3EE5BC4A888BFCA6311D98E4054C7B6D017A7319DC19F5A15
31,480,244 UART: [art] SIG.R = 71A4FCEA3F3D39C39A3CDCD062D67530BACC059CEB388258D09E49B97850DEF25DEC9F4EF69E82FEAFCD330A104732F7
31,487,623 UART: [art] SIG.S = 659ACABB307B653D77A007D3B43D84BA9BF14F83D664E1EBBCC504C0D51C9CC84354289E9CB4546E583DF90039810665
32,793,144 UART: Caliptra RT
32,793,839 UART: [state] CFI Enabled
32,911,832 UART: [rt] RT listening for mailbox commands...
36,942,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,097,872 UART: [rt]cmd =0x41544d4e, len=14344
42,332,917 >>> mbox cmd response data (8 bytes)
42,333,666 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,364,313 UART: [rt]cmd =0x41545348, len=116
42,384,448 >>> mbox cmd response data (12 bytes)
44,430,132 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
44,530,612 UART:
44,530,968 UART: Running Caliptra ROM ...
44,532,010 UART:
44,532,269 UART: [state] CFI Enabled
44,546,118 UART: [state] LifecycleState = Unprovisioned
44,548,011 UART: [state] DebugLocked = No
44,550,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,556,643 UART: [kat] SHA2-256
44,726,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,736,862 UART: [kat] ++
44,737,312 UART: [kat] sha1
44,747,814 UART: [kat] SHA2-256
44,750,551 UART: [kat] SHA2-384
44,755,021 UART: [kat] SHA2-512-ACC
44,757,384 UART: [kat] ECC-384
47,039,503 UART: [kat] HMAC-384Kdf
47,050,926 UART: [kat] LMS
48,240,970 UART: [kat] --
48,245,955 UART: [update-reset] ++
51,958,546 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,963,135 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
52,221,563 >>> mbox cmd response: success
52,221,940 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,222,400 UART: [update-reset] Copying MAN_2 To MAN_1
52,244,843 UART: [update-reset Success] --
52,247,070 UART: [state] Locking Datavault
52,249,515 UART: [state] Locking PCR0, PCR1 and PCR31
52,251,263 UART: [state] Locking ICCM
52,252,517 UART: [exit] Launching FMC @ 0x40000130
52,260,915 UART:
52,261,203 UART: Running Caliptra FMC ...
52,262,226 UART:
52,262,366 UART: [state] CFI Enabled
52,306,589 UART: [art] Extend RT PCRs Done
52,307,723 UART: [art] Lock RT PCRs Done
52,309,080 UART: [art] Populate DV Done
52,314,553 UART: [fht] FMC Alias Private Key: 7
52,316,250 UART: [art] Derive CDI
52,317,059 UART: [art] Store in in slot 0x4
52,359,578 UART: [art] Derive Key Pair
52,360,620 UART: [art] Store priv key in slot 0x5
55,602,699 UART: [art] Derive Key Pair - Done
55,615,204 UART: [art] Signing Cert with AUTHO
55,616,713 UART: RITY.KEYID = 7
57,895,853 UART: [art] Erasing AUTHORITY.KEYID = 7
57,897,747 UART: [art] PUB.X = 68CACA22C723B426B291788131E83E181A3B86A344B2D77215AD5E06C2B6C76C4ABDB6E668AE4AE3F1F4A250B2BC4179
57,904,632 UART: [art] PUB.Y = CCECDAFBE0F1B2581113917FDF0DF03515B3946D6C42C9297ECE902B032324DBA694EE4F73DB6086FCFCB0257D0E6133
57,911,873 UART: [art] SIG.R = 1509A3B092E89B6C5948AC90B941D1486EDEE8F14404C49131A9C36370C42C902C005D4807663E468B5766878FA8F87A
57,919,213 UART: [art] SIG.S = 69D5858A2611E248AF569923C4A5406E77C65B8744EC579E29B80A4AD4B2990A904AC35DD02A47D02AC0AFDE41C1F635
59,224,029 UART: mbox::rt_entry...
59,225,026 UART: ____ _ _ _ ____ _____
59,227,011 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,229,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,230,946 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,232,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,234,813 UART: |_|
59,235,625 UART:
59,518,560 UART: [rt] Runtime listening for mailbox commands...
59,520,677 >>> mbox cmd response data (48 bytes)
59,521,337 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,523,682 >>> mbox cmd response data (48 bytes)
59,524,563 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,538,461 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,126,979 ready_for_fw is high
4,127,561 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,343 >>> mbox cmd response: success
23,717,464 UART:
23,717,889 UART: Running Caliptra FMC ...
23,719,208 UART:
23,719,376 UART: [state] CFI Enabled
23,726,906 UART: [fht] FMC Alias Private Key: 7
26,058,070 UART: [art] Extend RT PCRs Done
26,059,298 UART: [art] Lock RT PCRs Done
26,060,772 UART: [art] Populate DV Done
26,066,029 UART: [fht] FMC Alias Private Key: 7
26,067,622 UART: [art] Derive CDI
26,068,437 UART: [art] Store in in slot 0x4
26,111,144 UART: [art] Derive Key Pair
26,112,184 UART: [art] Store priv key in slot 0x5
29,354,262 UART: [art] Derive Key Pair - Done
29,367,175 UART: [art] Signing Cert with AUTHO
29,368,480 UART: RITY.KEYID = 7
31,647,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,431 UART: [art] PUB.X = 34CD66601B0A6050FD9C7000E8196F81CBBD8F2A1715FF97851274918536B323C87BAB50E3D9DA4D7336F5580D718544
31,656,641 UART: [art] PUB.Y = 4DC329118743FEE09CE6D91191269F8C59963C9E1E582A1D8E155D8192AAB6E3990410D6FA4D3BD39F51FB1D93DE5BC3
31,663,890 UART: [art] SIG.R = 3220F291BF18BADFDF72E8DDFCE5504A447FBA5F64B3573C4EF30309B82C3E907D22C2BE04795E449D2955DA398E5A1C
31,671,324 UART: [art] SIG.S = 16ABDDC0DBEFF2AE72A09E53BCDDAFBB84534A19317F5E20ECE7406B4569BB138CCEF3994E0321B353D97324A257825C
32,976,329 UART: Caliptra RT
32,977,044 UART: [state] CFI Enabled
33,094,485 UART: [rt] RT listening for mailbox commands...
37,127,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,282,886 UART: [rt]cmd =0x41544d4e, len=14344
42,518,708 >>> mbox cmd response data (8 bytes)
42,519,503 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,550,145 UART: [rt]cmd =0x41545348, len=116
42,569,352 >>> mbox cmd response data (12 bytes)
44,614,286 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,507,845 >>> mbox cmd response: success
52,508,392 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,541,465 UART:
52,541,751 UART: Running Caliptra FMC ...
52,542,869 UART:
52,543,023 UART: [state] CFI Enabled
52,586,842 UART: [art] Extend RT PCRs Done
52,588,036 UART: [art] Lock RT PCRs Done
52,589,497 UART: [art] Populate DV Done
52,594,850 UART: [fht] FMC Alias Private Key: 7
52,596,401 UART: [art] Derive CDI
52,597,164 UART: [art] Store in in slot 0x4
52,640,150 UART: [art] Derive Key Pair
52,641,212 UART: [art] Store priv key in slot 0x5
55,883,063 UART: [art] Derive Key Pair - Done
55,895,736 UART: [art] Signing Cert with AUTHO
55,897,035 UART: RITY.KEYID = 7
58,176,362 UART: [art] Erasing AUTHORITY.KEYID = 7
58,177,868 UART: [art] PUB.X = DE4ED34A10D3A6F4027AC01D3F2F77FBE52B11D4B8B41823DC36B994942691C2AD4B89DC11D3C60D80E1653E39BF2DA1
58,185,115 UART: [art] PUB.Y = D916D2FD04832A471D4E83A1031635F347691B1582C763D5703115AC3E61949F5E03241DD533ABAB1FF3332D34D94BCD
58,192,346 UART: [art] SIG.R = 53C3D3DD2377BD8DA89D03A196F5C2A47EF455305484110D0CC804D67F93DDD8169587FE40925E19C23FE0E8495724EE
58,199,732 UART: [art] SIG.S = 16213D02636A353885E581413E7E902CE07D7E6EEA5EE7178A432BE459271AB95DFF142E629D1011ED4997D6ACCC9A1B
59,504,810 UART: mbox::rt_entry...
59,505,783 UART: ____ _ _ _ ____ _____
59,507,716 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,509,717 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,511,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,513,510 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,516,149 UART: |_|
59,517,010 UART:
59,804,533 UART: [rt] Runtime listening for mailbox commands...
59,806,728 >>> mbox cmd response data (48 bytes)
59,807,308 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,809,623 >>> mbox cmd response data (48 bytes)
59,810,525 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,824,358 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,113 UART:
192,480 UART: Running Caliptra ROM ...
193,619 UART:
193,768 UART: [state] CFI Enabled
265,338 UART: [state] LifecycleState = Unprovisioned
267,254 UART: [state] DebugLocked = No
268,711 UART: [state] WD Timer not started. Device not locked for debugging
272,530 UART: [kat] SHA2-256
451,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,231 UART: [kat] ++
463,772 UART: [kat] sha1
475,222 UART: [kat] SHA2-256
478,227 UART: [kat] SHA2-384
484,355 UART: [kat] SHA2-512-ACC
487,285 UART: [kat] ECC-384
2,949,159 UART: [kat] HMAC-384Kdf
2,973,259 UART: [kat] LMS
3,502,618 UART: [kat] --
3,506,494 UART: [cold-reset] ++
3,507,295 UART: [fht] FHT @ 0x50003400
3,518,200 UART: [idev] ++
3,518,768 UART: [idev] CDI.KEYID = 6
3,519,798 UART: [idev] SUBJECT.KEYID = 7
3,520,897 UART: [idev] UDS.KEYID = 0
3,521,824 ready_for_fw is high
3,522,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,973 UART: [idev] Erasing UDS.KEYID = 0
6,026,935 UART: [idev] Sha1 KeyId Algorithm
6,048,914 UART: [idev] --
6,053,604 UART: [ldev] ++
6,054,186 UART: [ldev] CDI.KEYID = 6
6,055,102 UART: [ldev] SUBJECT.KEYID = 5
6,056,264 UART: [ldev] AUTHORITY.KEYID = 7
6,057,556 UART: [ldev] FE.KEYID = 1
6,104,177 UART: [ldev] Erasing FE.KEYID = 1
8,609,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,963 UART: [ldev] --
10,415,386 UART: [fwproc] Wait for Commands...
10,418,466 UART: [fwproc] Recv command 0x46574c44
10,420,568 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,215 >>> mbox cmd response: success
14,280,731 UART: [afmc] ++
14,281,322 UART: [afmc] CDI.KEYID = 6
14,282,238 UART: [afmc] SUBJECT.KEYID = 7
14,283,398 UART: [afmc] AUTHORITY.KEYID = 5
16,812,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,496 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,275 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,704 UART: [afmc] --
18,631,915 UART: [cold-reset] --
18,637,664 UART: [state] Locking Datavault
18,643,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,882 UART: [state] Locking ICCM
18,647,577 UART: [exit] Launching FMC @ 0x40000130
18,655,987 UART:
18,656,272 UART: Running Caliptra FMC ...
18,657,383 UART:
18,657,542 UART: [state] CFI Enabled
18,712,967 UART: [fht] FMC Alias Private Key: 7
20,476,655 UART: [art] Extend RT PCRs Done
20,477,868 UART: [art] Lock RT PCRs Done
20,479,358 UART: [art] Populate DV Done
20,484,941 UART: [fht] FMC Alias Private Key: 7
20,486,635 UART: [art] Derive CDI
20,487,468 UART: [art] Store in in slot 0x4
20,544,859 UART: [art] Derive Key Pair
20,545,925 UART: [art] Store priv key in slot 0x5
23,008,737 UART: [art] Derive Key Pair - Done
23,021,796 UART: [art] Signing Cert with AUTHO
23,023,104 UART: RITY.KEYID = 7
24,733,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,962 UART: [art] PUB.X = 615314FB4236AA468D2AC29BFAB25DFBBEAC2918C5131A81A15A1534EA172746159B1568C8548B16482EF620E1565F40
24,742,211 UART: [art] PUB.Y = 3F9541A79C6067C55110FD5697148AAFD573D8907B8B4D74ED372C293D90287F6E35C23F9B7E2A2A3F4D198BAEC77260
24,749,439 UART: [art] SIG.R = B58D78141E02264188DF69D22F86092C3452030ADFCEC7370C1BEA796C8D7AEAFDFB9614EB113ACEA5BC7AD7BA903E93
24,756,819 UART: [art] SIG.S = E87C2DF382E96B1C9FBEFE43BA77E8CC1B3AF7733756C54DD63A4F36E34155FCC00E9429A1B958333E21C774C0B62A30
25,736,123 UART: Caliptra RT
25,736,830 UART: [state] CFI Enabled
25,899,779 UART: [rt] RT listening for mailbox commands...
29,967,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,123,371 UART: [rt]cmd =0x41544d4e, len=14344
34,053,876 >>> mbox cmd response data (8 bytes)
34,054,608 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,085,687 UART: [rt]cmd =0x41545348, len=116
34,105,319 >>> mbox cmd response data (12 bytes)
36,173,676 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,274,270 UART:
36,274,629 UART: Running Caliptra ROM ...
36,275,760 UART:
36,275,928 UART: [state] CFI Enabled
36,354,370 UART: [state] LifecycleState = Unprovisioned
36,356,248 UART: [state] DebugLocked = No
36,358,830 UART: [state] WD Timer not started. Device not locked for debugging
36,362,868 UART: [kat] SHA2-256
36,541,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,553,570 UART: [kat] ++
36,554,115 UART: [kat] sha1
36,564,739 UART: [kat] SHA2-256
36,567,759 UART: [kat] SHA2-384
36,574,130 UART: [kat] SHA2-512-ACC
36,577,112 UART: [kat] ECC-384
39,038,396 UART: [kat] HMAC-384Kdf
39,057,911 UART: [kat] LMS
39,587,374 UART: [kat] --
39,591,146 UART: [update-reset] ++
42,588,217 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,592,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
42,850,404 >>> mbox cmd response: success
42,850,763 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,851,496 UART: [update-reset] Copying MAN_2 To MAN_1
42,873,832 UART: [update-reset Success] --
42,879,037 UART: [state] Locking Datavault
42,883,328 UART: [state] Locking PCR0, PCR1 and PCR31
42,884,973 UART: [state] Locking ICCM
42,886,179 UART: [exit] Launching FMC @ 0x40000130
42,894,638 UART:
42,894,912 UART: Running Caliptra FMC ...
42,895,943 UART:
42,896,088 UART: [state] CFI Enabled
42,995,794 UART: [art] Extend RT PCRs Done
42,996,972 UART: [art] Lock RT PCRs Done
42,998,456 UART: [art] Populate DV Done
43,004,290 UART: [fht] FMC Alias Private Key: 7
43,005,785 UART: [art] Derive CDI
43,006,527 UART: [art] Store in in slot 0x4
43,065,452 UART: [art] Derive Key Pair
43,066,627 UART: [art] Store priv key in slot 0x5
45,529,053 UART: [art] Derive Key Pair - Done
45,541,971 UART: [art] Signing Cert with AUTHO
45,543,303 UART: RITY.KEYID = 7
47,254,566 UART: [art] Erasing AUTHORITY.KEYID = 7
47,256,072 UART: [art] PUB.X = 8A42AD86AF9F966A08A467985CB7E236DCA570A861A816779D05444440D640AB2D66CB5DA40B6D2A85A73421F9BD1995
47,263,374 UART: [art] PUB.Y = 1C3E09DBF62EDA0E79B102936A94735E75CD7205C6622106A28E89AC5ECCBA1D833FFC8AB72AB3C8D54B461424E66C7C
47,270,597 UART: [art] SIG.R = 44C879F3B827B800F72759FD6152C953E27A26AD1BE069CC32AC5F655F114B1DE0F2596D2B46F5EC2D2ABB90F4DBE616
47,277,980 UART: [art] SIG.S = A04D9FF3286221CB709609DA45EDD7DE5397D4087198BC7C514C05B16CD6823B09746B1D69D7D8D2E3774F63574CD055
48,256,456 UART: mbox::rt_entry...
48,257,401 UART: ____ _ _ _ ____ _____
48,259,326 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,261,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,263,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,265,186 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,267,128 UART: |_|
48,268,132 UART:
48,554,797 UART: [rt] Runtime listening for mailbox commands...
48,556,938 >>> mbox cmd response data (48 bytes)
48,557,512 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,559,869 >>> mbox cmd response data (48 bytes)
48,560,783 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,574,685 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,383,181 ready_for_fw is high
3,383,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,076,448 >>> mbox cmd response: success
18,373,681 UART:
18,374,068 UART: Running Caliptra FMC ...
18,375,225 UART:
18,375,389 UART: [state] CFI Enabled
18,439,062 UART: [fht] FMC Alias Private Key: 7
20,202,399 UART: [art] Extend RT PCRs Done
20,203,629 UART: [art] Lock RT PCRs Done
20,204,947 UART: [art] Populate DV Done
20,210,470 UART: [fht] FMC Alias Private Key: 7
20,212,072 UART: [art] Derive CDI
20,212,891 UART: [art] Store in in slot 0x4
20,271,400 UART: [art] Derive Key Pair
20,272,440 UART: [art] Store priv key in slot 0x5
22,735,200 UART: [art] Derive Key Pair - Done
22,748,044 UART: [art] Signing Cert with AUTHO
22,749,358 UART: RITY.KEYID = 7
24,461,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,462,553 UART: [art] PUB.X = 4790970E41792FA0FC84085260A3C8942904C585A2A485C435B53D038A40932AF3E2D526FA497B663C134E74F5C01AC7
24,469,809 UART: [art] PUB.Y = F9832731E26DEE8DD283458D523C51F9B307C811A997EB62483A9F9DA7EA757D0E2AF1441DD59AF1E6E727FEDB40E0C5
24,477,082 UART: [art] SIG.R = 7096AD11FDAE8699348EEB79FA602C1D20635CBE4A47C9C7EE29F8FF325604DAC462E6F00D58D7DEF4307E1FA2788629
24,484,484 UART: [art] SIG.S = 61966BC5FBE854E33BBCF4F8D44CFD474F9E64426CC15711D4BF37D7DEB5395194FC20F3DB34728C457B16409473CC5C
25,463,163 UART: Caliptra RT
25,463,866 UART: [state] CFI Enabled
25,628,903 UART: [rt] RT listening for mailbox commands...
29,695,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,851,132 UART: [rt]cmd =0x41544d4e, len=14344
33,781,443 >>> mbox cmd response data (8 bytes)
33,782,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,813,007 UART: [rt]cmd =0x41545348, len=116
33,832,513 >>> mbox cmd response data (12 bytes)
35,877,066 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,399,823 >>> mbox cmd response: success
42,400,295 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,436,456 UART:
42,436,795 UART: Running Caliptra FMC ...
42,437,947 UART:
42,438,114 UART: [state] CFI Enabled
42,536,340 UART: [art] Extend RT PCRs Done
42,537,530 UART: [art] Lock RT PCRs Done
42,538,659 UART: [art] Populate DV Done
42,544,016 UART: [fht] FMC Alias Private Key: 7
42,545,672 UART: [art] Derive CDI
42,546,489 UART: [art] Store in in slot 0x4
42,605,354 UART: [art] Derive Key Pair
42,606,393 UART: [art] Store priv key in slot 0x5
45,069,520 UART: [art] Derive Key Pair - Done
45,082,578 UART: [art] Signing Cert with AUTHO
45,083,889 UART: RITY.KEYID = 7
46,795,067 UART: [art] Erasing AUTHORITY.KEYID = 7
46,796,580 UART: [art] PUB.X = AD6C928F7044A9478E8338703BF6C5A892D908FE61F761FB6C33C66AA45065E5565FDE3A06F763268FDE1C0FE8054ACB
46,803,840 UART: [art] PUB.Y = E046138AF6C7644ECBDFFF1FC1BF369F0CE10E3C5419DB9FEF31B3E4D05CA9BA95789E297E3324C95ACACE24D668916F
46,811,096 UART: [art] SIG.R = DFACB59D80198CE5ED056DDFD12A232EA174A7FFD088F7B821A3FB1AB2207AC9EF48B192BBE81D27388BB749B693CACE
46,818,604 UART: [art] SIG.S = 8A44901F8A916D79D2202D2E46D1AC6C40D387D942753B69B1C6C7C1B703D9201C40DCDD6A3D819545F140F7C16E87A2
47,796,464 UART: mbox::rt_entry...
47,797,417 UART: ____ _ _ _ ____ _____
47,799,348 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,801,353 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,803,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,805,126 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,807,044 UART: |_|
47,807,851 UART:
48,093,054 UART: [rt] Runtime listening for mailbox commands...
48,095,182 >>> mbox cmd response data (48 bytes)
48,095,749 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,098,068 >>> mbox cmd response data (48 bytes)
48,098,966 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,112,863 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,508 UART:
192,884 UART: Running Caliptra ROM ...
194,076 UART:
603,747 UART: [state] CFI Enabled
616,859 UART: [state] LifecycleState = Unprovisioned
618,757 UART: [state] DebugLocked = No
621,480 UART: [state] WD Timer not started. Device not locked for debugging
625,142 UART: [kat] SHA2-256
804,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,808 UART: [kat] ++
816,250 UART: [kat] sha1
828,393 UART: [kat] SHA2-256
831,391 UART: [kat] SHA2-384
837,865 UART: [kat] SHA2-512-ACC
840,860 UART: [kat] ECC-384
3,283,786 UART: [kat] HMAC-384Kdf
3,295,176 UART: [kat] LMS
3,824,651 UART: [kat] --
3,829,500 UART: [cold-reset] ++
3,830,956 UART: [fht] FHT @ 0x50003400
3,842,287 UART: [idev] ++
3,842,842 UART: [idev] CDI.KEYID = 6
3,843,744 UART: [idev] SUBJECT.KEYID = 7
3,844,911 UART: [idev] UDS.KEYID = 0
3,845,950 ready_for_fw is high
3,846,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,860 UART: [idev] Erasing UDS.KEYID = 0
6,317,140 UART: [idev] Sha1 KeyId Algorithm
6,339,667 UART: [idev] --
6,344,900 UART: [ldev] ++
6,345,470 UART: [ldev] CDI.KEYID = 6
6,346,370 UART: [ldev] SUBJECT.KEYID = 5
6,347,522 UART: [ldev] AUTHORITY.KEYID = 7
6,348,798 UART: [ldev] FE.KEYID = 1
6,357,492 UART: [ldev] Erasing FE.KEYID = 1
8,829,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,672 UART: [ldev] --
10,620,043 UART: [fwproc] Wait for Commands...
10,621,742 UART: [fwproc] Recv command 0x46574c44
10,623,843 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,528 >>> mbox cmd response: success
14,493,261 UART: [afmc] ++
14,493,856 UART: [afmc] CDI.KEYID = 6
14,494,759 UART: [afmc] SUBJECT.KEYID = 7
14,495,933 UART: [afmc] AUTHORITY.KEYID = 5
16,996,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,734 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,567 UART: [afmc] --
18,794,166 UART: [cold-reset] --
18,799,209 UART: [state] Locking Datavault
18,803,368 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,069 UART: [state] Locking ICCM
18,806,839 UART: [exit] Launching FMC @ 0x40000130
18,815,233 UART:
18,815,461 UART: Running Caliptra FMC ...
18,816,553 UART:
18,816,727 UART: [state] CFI Enabled
18,825,363 UART: [fht] FMC Alias Private Key: 7
20,581,740 UART: [art] Extend RT PCRs Done
20,582,960 UART: [art] Lock RT PCRs Done
20,585,013 UART: [art] Populate DV Done
20,590,368 UART: [fht] FMC Alias Private Key: 7
20,592,007 UART: [art] Derive CDI
20,592,817 UART: [art] Store in in slot 0x4
20,635,581 UART: [art] Derive Key Pair
20,636,621 UART: [art] Store priv key in slot 0x5
23,063,403 UART: [art] Derive Key Pair - Done
23,076,345 UART: [art] Signing Cert with AUTHO
23,077,638 UART: RITY.KEYID = 7
24,783,262 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,772 UART: [art] PUB.X = 01FA3EFFF1F214FA05CE8AB55F2F1DD118206BC40F5B4360329FF06CC36435616E57E3A73572DF12F9BD425520F1FB9C
24,792,056 UART: [art] PUB.Y = 3BF3E77FEF9FD479F59F79D7805F41D9FA6A7E05A8DD877C599F6875536504117BE555A2406DD69CA7DBBD89AF1446EE
24,799,343 UART: [art] SIG.R = 4C54F8B46E3C04012E885EE021B7CF09EBD45C66A002A20F33C8B678CDF5326BEC240169AC80E7E16518202958CAD138
24,806,752 UART: [art] SIG.S = 442B08BE13219E4B4B9087EEB755C90346B26E613A2FA91D21F6DBB4E473251311906AA5FD7613233592983682476321
25,785,798 UART: Caliptra RT
25,786,539 UART: [state] CFI Enabled
25,903,837 UART: [rt] RT listening for mailbox commands...
29,934,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,090,397 UART: [rt]cmd =0x41544d4e, len=14344
34,021,084 >>> mbox cmd response data (8 bytes)
34,021,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,052,497 UART: [rt]cmd =0x41545348, len=116
34,072,500 >>> mbox cmd response data (12 bytes)
36,119,482 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,220,172 UART:
36,220,532 UART: Running Caliptra ROM ...
36,221,654 UART:
36,221,820 UART: [state] CFI Enabled
36,236,888 UART: [state] LifecycleState = Unprovisioned
36,238,717 UART: [state] DebugLocked = No
36,241,492 UART: [state] WD Timer not started. Device not locked for debugging
36,244,687 UART: [kat] SHA2-256
36,423,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,435,403 UART: [kat] ++
36,435,854 UART: [kat] sha1
36,446,620 UART: [kat] SHA2-256
36,449,626 UART: [kat] SHA2-384
36,457,066 UART: [kat] SHA2-512-ACC
36,460,049 UART: [kat] ECC-384
38,900,978 UART: [kat] HMAC-384Kdf
38,913,883 UART: [kat] LMS
39,443,386 UART: [kat] --
39,448,558 UART: [update-reset] ++
42,441,911 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,444,918 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
42,703,087 >>> mbox cmd response: success
42,703,441 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,703,710 UART: [update-reset] Copying MAN_2 To MAN_1
42,725,783 UART: [update-reset Success] --
42,729,521 UART: [state] Locking Datavault
42,732,504 UART: [state] Locking PCR0, PCR1 and PCR31
42,734,203 UART: [state] Locking ICCM
42,735,940 UART: [exit] Launching FMC @ 0x40000130
42,744,376 UART:
42,744,602 UART: Running Caliptra FMC ...
42,745,616 UART:
42,745,772 UART: [state] CFI Enabled
42,790,222 UART: [art] Extend RT PCRs Done
42,791,430 UART: [art] Lock RT PCRs Done
42,792,636 UART: [art] Populate DV Done
42,798,211 UART: [fht] FMC Alias Private Key: 7
42,799,794 UART: [art] Derive CDI
42,800,521 UART: [art] Store in in slot 0x4
42,843,487 UART: [art] Derive Key Pair
42,844,618 UART: [art] Store priv key in slot 0x5
45,271,126 UART: [art] Derive Key Pair - Done
45,284,302 UART: [art] Signing Cert with AUTHO
45,285,600 UART: RITY.KEYID = 7
46,991,057 UART: [art] Erasing AUTHORITY.KEYID = 7
46,992,561 UART: [art] PUB.X = 1EFE217D669942A1A11BE734C4AAEE773D325EDC8E450DFA044A115952F2571AA47B1327BE14BE701623ADEB043A12B2
46,999,861 UART: [art] PUB.Y = 297F6D4413599AAA0C406F6FB206F03FE3D817C3FA53FBCAAA17A00CCC9711DDCB90391E4D0874AF253431C5BC2F6B9C
47,007,139 UART: [art] SIG.R = E960438C3D444BA10FC077B4134878623B6F5D489DCA0B784671D86F4C0053D4E90E3430B2623ADEE5227146E59EF9AE
47,014,489 UART: [art] SIG.S = 3FABDA60640C68034F1B2EB05BA1A4C9C2DBB5BFBEB6663FB9CB712835D242ADB3479F5FBEFA64E86D93C4F6AF5543FB
47,992,886 UART: mbox::rt_entry...
47,993,859 UART: ____ _ _ _ ____ _____
47,995,787 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,997,783 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,999,708 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,001,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,003,551 UART: |_|
48,004,381 UART:
48,287,622 UART: [rt] Runtime listening for mailbox commands...
48,289,792 >>> mbox cmd response data (48 bytes)
48,290,394 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,292,709 >>> mbox cmd response data (48 bytes)
48,293,598 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,307,454 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,700,771 ready_for_fw is high
3,701,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,214 >>> mbox cmd response: success
18,528,387 UART:
18,528,807 UART: Running Caliptra FMC ...
18,530,114 UART:
18,530,273 UART: [state] CFI Enabled
18,537,879 UART: [fht] FMC Alias Private Key: 7
20,294,560 UART: [art] Extend RT PCRs Done
20,295,792 UART: [art] Lock RT PCRs Done
20,297,635 UART: [art] Populate DV Done
20,303,004 UART: [fht] FMC Alias Private Key: 7
20,304,493 UART: [art] Derive CDI
20,305,249 UART: [art] Store in in slot 0x4
20,347,733 UART: [art] Derive Key Pair
20,348,763 UART: [art] Store priv key in slot 0x5
22,776,216 UART: [art] Derive Key Pair - Done
22,789,109 UART: [art] Signing Cert with AUTHO
22,790,425 UART: RITY.KEYID = 7
24,495,357 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,987 UART: [art] PUB.X = 924F4B8DF0B29C3042502B442DB37EE10DCC19C476F90A04ABDF6730CCE69F281011A965EEDEC9A86588F5572263BB7F
24,504,149 UART: [art] PUB.Y = DB0B012F618BA5E63DDFCDC8B7167ABD722E639B62D4B2AFC750A0AB77C79C3B798AF0562BA212A036A4FADBCAE4D1D6
24,511,420 UART: [art] SIG.R = A7771832878D178BB62103F95CDD4DD52895B2B6A6463055A9A03D805F82BB23D76CE750AD874A322686569932BF9C14
24,518,797 UART: [art] SIG.S = EF1C62AA39059854AA060A28E2FED29BA9996ABF4398D18A68A0B6564EC294A0ADE53FCCF0145475FD353E1B334E01D3
25,497,592 UART: Caliptra RT
25,498,287 UART: [state] CFI Enabled
25,615,723 UART: [rt] RT listening for mailbox commands...
29,647,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,803,331 UART: [rt]cmd =0x41544d4e, len=14344
33,734,032 >>> mbox cmd response data (8 bytes)
33,734,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,765,385 UART: [rt]cmd =0x41545348, len=116
33,785,869 >>> mbox cmd response data (12 bytes)
35,830,495 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,268,553 >>> mbox cmd response: success
42,269,193 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,304,049 UART:
42,304,343 UART: Running Caliptra FMC ...
42,305,451 UART:
42,305,602 UART: [state] CFI Enabled
42,349,664 UART: [art] Extend RT PCRs Done
42,350,854 UART: [art] Lock RT PCRs Done
42,352,411 UART: [art] Populate DV Done
42,357,975 UART: [fht] FMC Alias Private Key: 7
42,359,665 UART: [art] Derive CDI
42,360,468 UART: [art] Store in in slot 0x4
42,402,802 UART: [art] Derive Key Pair
42,403,788 UART: [art] Store priv key in slot 0x5
44,830,845 UART: [art] Derive Key Pair - Done
44,843,851 UART: [art] Signing Cert with AUTHO
44,845,158 UART: RITY.KEYID = 7
46,550,407 UART: [art] Erasing AUTHORITY.KEYID = 7
46,551,906 UART: [art] PUB.X = 166342E25167EF06AEAE84AB151BA4FB45CCAA59493AD92EA8EFCEBDC7CD18E056A6AC62394FE105527901A9795304CE
46,559,201 UART: [art] PUB.Y = B4730627147ECB30F7A948702F5F96A225D29B076E332285F0F369D7C007077FC981AA9BD21A6B609416C9D3C3A3FC58
46,566,482 UART: [art] SIG.R = 5EB37DE3FEADB40E8805B7ABC0BFCACE772DBE62A694EB213E9B1B69E06236D12D0796EDF56EE60179F42A211F111AE4
46,573,865 UART: [art] SIG.S = EE3AD0F822FE50246091968C976ED9C2BE72A5A5ADF5190AC07647518EB80042BF284DD7792A80DD13D04642C047F94F
47,552,626 UART: mbox::rt_entry...
47,553,576 UART: ____ _ _ _ ____ _____
47,555,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,557,554 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,559,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,561,408 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,563,316 UART: |_|
47,564,110 UART:
47,845,574 UART: [rt] Runtime listening for mailbox commands...
47,847,688 >>> mbox cmd response data (48 bytes)
47,848,267 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
47,850,579 >>> mbox cmd response data (48 bytes)
47,851,466 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
47,865,325 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,148 UART:
192,510 UART: Running Caliptra ROM ...
193,699 UART:
193,855 UART: [state] CFI Enabled
267,500 UART: [state] LifecycleState = Unprovisioned
269,553 UART: [state] DebugLocked = No
271,020 UART: [state] WD Timer not started. Device not locked for debugging
275,503 UART: [kat] SHA2-256
465,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,188 UART: [kat] ++
476,673 UART: [kat] sha1
486,716 UART: [kat] SHA2-256
489,738 UART: [kat] SHA2-384
496,300 UART: [kat] SHA2-512-ACC
498,947 UART: [kat] ECC-384
2,947,223 UART: [kat] HMAC-384Kdf
2,973,315 UART: [kat] LMS
3,505,120 UART: [kat] --
3,508,418 UART: [cold-reset] ++
3,510,635 UART: [fht] FHT @ 0x50003400
3,523,525 UART: [idev] ++
3,524,243 UART: [idev] CDI.KEYID = 6
3,525,153 UART: [idev] SUBJECT.KEYID = 7
3,526,413 UART: [idev] UDS.KEYID = 0
3,527,339 ready_for_fw is high
3,527,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,459 UART: [idev] Erasing UDS.KEYID = 0
6,030,728 UART: [idev] Sha1 KeyId Algorithm
6,054,274 UART: [idev] --
6,060,268 UART: [ldev] ++
6,060,944 UART: [ldev] CDI.KEYID = 6
6,061,856 UART: [ldev] SUBJECT.KEYID = 5
6,063,016 UART: [ldev] AUTHORITY.KEYID = 7
6,064,251 UART: [ldev] FE.KEYID = 1
6,101,528 UART: [ldev] Erasing FE.KEYID = 1
8,612,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,163 UART: [ldev] --
10,417,027 UART: [fwproc] Wait for Commands...
10,418,691 UART: [fwproc] Recv command 0x46574c44
10,420,996 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,186 >>> mbox cmd response: success
14,612,648 UART: [afmc] ++
14,613,351 UART: [afmc] CDI.KEYID = 6
14,614,591 UART: [afmc] SUBJECT.KEYID = 7
14,616,023 UART: [afmc] AUTHORITY.KEYID = 5
17,151,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,425 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,821 UART: [afmc] --
18,948,606 UART: [cold-reset] --
18,953,078 UART: [state] Locking Datavault
18,957,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,499 UART: [state] Locking ICCM
18,962,247 UART: [exit] Launching FMC @ 0x40000130
18,970,869 UART:
18,971,102 UART: Running Caliptra FMC ...
18,972,200 UART:
18,972,358 UART: [state] CFI Enabled
19,033,906 UART: [fht] FMC Alias Private Key: 7
20,798,043 UART: [art] Extend RT PCRs Done
20,799,245 UART: [art] Lock RT PCRs Done
20,801,074 UART: [art] Populate DV Done
20,806,480 UART: [fht] FMC Alias Private Key: 7
20,808,172 UART: [art] Derive CDI
20,808,981 UART: [art] Store in in slot 0x4
20,866,773 UART: [art] Derive Key Pair
20,867,765 UART: [art] Store priv key in slot 0x5
23,330,276 UART: [art] Derive Key Pair - Done
23,343,371 UART: [art] Signing Cert with AUTHO
23,344,667 UART: RITY.KEYID = 7
25,056,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,367 UART: [art] PUB.X = F53BB3A5AB2E096344F845ECD5394701D947F5EC6EC0AF56DD0A5081E2738E08677D0D2977A5CFC7505EFBA919C1C293
25,065,665 UART: [art] PUB.Y = 5E773F788CF792D7ADCA3C7FE980917B31E98CB2EB194C0CD3D3706E7DE0D44F5FA54614CAEE553D52B6E7183CC9AD46
25,072,940 UART: [art] SIG.R = C00AF03662BC53A568A6F22A2793F466D173D70BEC9251D5E2E9EA0276D77740A4E741B6836EF2000155500D81C563D3
25,080,272 UART: [art] SIG.S = 0F14172153E505DF26DC67584C2BA29D7B7EB50BF4D60F76618227D33F7F12A284CCE995D061EBCA0062B68C55B5D639
26,059,809 UART: Caliptra RT
26,060,497 UART: [state] CFI Enabled
26,225,743 UART: [rt] RT listening for mailbox commands...
30,260,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,416,899 UART: [rt]cmd =0x41544d4e, len=14344
34,347,239 >>> mbox cmd response data (8 bytes)
34,347,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,378,761 UART: [rt]cmd =0x41545348, len=116
34,397,950 >>> mbox cmd response data (12 bytes)
36,445,661 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,546,463 UART:
36,546,813 UART: Running Caliptra ROM ...
36,547,881 UART:
36,548,039 UART: [state] CFI Enabled
36,614,892 UART: [state] LifecycleState = Unprovisioned
36,616,946 UART: [state] DebugLocked = No
36,619,473 UART: [state] WD Timer not started. Device not locked for debugging
36,623,671 UART: [kat] SHA2-256
36,813,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,824,270 UART: [kat] ++
36,824,808 UART: [kat] sha1
36,837,701 UART: [kat] SHA2-256
36,840,724 UART: [kat] SHA2-384
36,845,956 UART: [kat] SHA2-512-ACC
36,848,521 UART: [kat] ECC-384
39,297,366 UART: [kat] HMAC-384Kdf
39,322,511 UART: [kat] LMS
39,854,092 UART: [kat] --
39,858,330 UART: [update-reset] ++
42,875,669 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,879,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
43,273,682 >>> mbox cmd response: success
43,274,045 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,274,389 UART: [update-reset] Copying MAN_2 To MAN_1
43,311,949 UART: [update-reset Success] --
43,314,343 UART: [state] Locking Datavault
43,318,407 UART: [state] Locking PCR0, PCR1 and PCR31
43,320,602 UART: [state] Locking ICCM
43,322,535 UART: [exit] Launching FMC @ 0x40000130
43,331,154 UART:
43,331,385 UART: Running Caliptra FMC ...
43,332,480 UART:
43,332,632 UART: [state] CFI Enabled
43,429,251 UART: [art] Extend RT PCRs Done
43,430,433 UART: [art] Lock RT PCRs Done
43,431,935 UART: [art] Populate DV Done
43,437,398 UART: [fht] FMC Alias Private Key: 7
43,439,110 UART: [art] Derive CDI
43,439,924 UART: [art] Store in in slot 0x4
43,498,561 UART: [art] Derive Key Pair
43,499,682 UART: [art] Store priv key in slot 0x5
45,963,138 UART: [art] Derive Key Pair - Done
45,976,084 UART: [art] Signing Cert with AUTHO
45,977,394 UART: RITY.KEYID = 7
47,688,091 UART: [art] Erasing AUTHORITY.KEYID = 7
47,689,584 UART: [art] PUB.X = 5B0B61312193D088526DC10D9443A9C45A0D821A72E93A2909696446F29451F7A704696A8E363D2E7E56C3971361E8DB
47,696,825 UART: [art] PUB.Y = 6FB489343EFB342BF30A8140E8587D4604BD2EF01942703EA11A05978EF3335FD32D6C5F69F856C49FE17BAE5C218A1D
47,704,043 UART: [art] SIG.R = C995DAE5BA7FCFE4FB96640A7F6159464C1A5F34BA5C608EED510A00F1EEE838CD2B551CE6935E1D709F0A6E8E80773F
47,711,483 UART: [art] SIG.S = 6D219C55335398C054D27067855FB2478E9F8891AAD6F6D9D1A71DBB6B277B538696763D72BF3BDA8C32E4703E88817B
48,690,106 UART: mbox::rt_entry...
48,691,067 UART: ____ _ _ _ ____ _____
48,693,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,695,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,697,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,698,945 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,700,880 UART: |_|
48,701,690 UART:
48,984,998 UART: [rt] Runtime listening for mailbox commands...
48,987,169 >>> mbox cmd response data (48 bytes)
48,987,738 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,990,150 >>> mbox cmd response data (48 bytes)
48,991,035 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,005,118 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,439,030 ready_for_fw is high
3,439,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,611 >>> mbox cmd response: success
19,049,791 UART:
19,050,186 UART: Running Caliptra FMC ...
19,051,313 UART:
19,051,480 UART: [state] CFI Enabled
19,115,648 UART: [fht] FMC Alias Private Key: 7
20,879,773 UART: [art] Extend RT PCRs Done
20,880,993 UART: [art] Lock RT PCRs Done
20,882,695 UART: [art] Populate DV Done
20,887,991 UART: [fht] FMC Alias Private Key: 7
20,889,634 UART: [art] Derive CDI
20,890,372 UART: [art] Store in in slot 0x4
20,948,900 UART: [art] Derive Key Pair
20,949,944 UART: [art] Store priv key in slot 0x5
23,412,709 UART: [art] Derive Key Pair - Done
23,425,596 UART: [art] Signing Cert with AUTHO
23,426,891 UART: RITY.KEYID = 7
25,138,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,531 UART: [art] PUB.X = 6482393A04C00DEF8AB59E551257997943700B2F4337861EDEAD93E5DB0FA202499FD4575EBEA74E166824199DA23D65
25,146,778 UART: [art] PUB.Y = D8537ED6A662285536A742A916BBFB233FA226F24E86CE5B4B6827BA9F4E6170430A0C2BCA410C2F4CC12AE1A1F14940
25,154,030 UART: [art] SIG.R = 7A418A0634154974217FFEFFF57F57D56EFEF4371665A02E77F0277209B7B698DD77585BAE831C578D5E75FF63D7D3E4
25,161,431 UART: [art] SIG.S = 064BA77661EA81120845F15E6FE3A0A66988AA961082F64D0FBA400613EC7A9B2F14399EAF9D00258BED6D1F391E0FF5
26,140,955 UART: Caliptra RT
26,141,667 UART: [state] CFI Enabled
26,305,169 UART: [rt] RT listening for mailbox commands...
30,366,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,522,684 UART: [rt]cmd =0x41544d4e, len=14344
34,452,891 >>> mbox cmd response data (8 bytes)
34,453,634 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,484,272 UART: [rt]cmd =0x41545348, len=116
34,504,255 >>> mbox cmd response data (12 bytes)
36,553,782 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,538,033 >>> mbox cmd response: success
43,538,569 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,574,369 UART:
43,574,694 UART: Running Caliptra FMC ...
43,575,822 UART:
43,575,990 UART: [state] CFI Enabled
43,674,740 UART: [art] Extend RT PCRs Done
43,675,978 UART: [art] Lock RT PCRs Done
43,677,376 UART: [art] Populate DV Done
43,682,835 UART: [fht] FMC Alias Private Key: 7
43,684,424 UART: [art] Derive CDI
43,685,162 UART: [art] Store in in slot 0x4
43,744,218 UART: [art] Derive Key Pair
43,745,270 UART: [art] Store priv key in slot 0x5
46,207,988 UART: [art] Derive Key Pair - Done
46,220,764 UART: [art] Signing Cert with AUTHO
46,222,093 UART: RITY.KEYID = 7
47,934,081 UART: [art] Erasing AUTHORITY.KEYID = 7
47,935,588 UART: [art] PUB.X = 8551A8F0A76F677F4B1EF6BBAED2097EC7AD95793A4482DF152E6FFD59B12D041BD0D574910086FD1AFEA2CE82BB9C34
47,942,883 UART: [art] PUB.Y = 0BD32C2C773D887132B522BCC76CF010867CD93E7F434C5D791A465A1A3DE02C40E53CB60E7F5693E1FB1EBF376A865B
47,950,164 UART: [art] SIG.R = 2726BD9C91095F4ED8975EC3B781BAA2BF37AFE95F41B9187495A0A8FF07845077F5C109C156D6FD158D1DD114F336E0
47,957,555 UART: [art] SIG.S = BF8347844D2B7147F8B1830F9099CE5A0467AE5E8DB0D31C786ABF253CD65ECF245D42B97809BB98D7C492F7F46E7692
48,935,677 UART: mbox::rt_entry...
48,936,629 UART: ____ _ _ _ ____ _____
48,938,631 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,940,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,942,574 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,944,499 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,946,470 UART: |_|
48,947,283 UART:
49,230,065 UART: [rt] Runtime listening for mailbox commands...
49,232,235 >>> mbox cmd response data (48 bytes)
49,232,792 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,235,149 >>> mbox cmd response data (48 bytes)
49,236,044 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,249,977 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,398 UART:
192,755 UART: Running Caliptra ROM ...
193,936 UART:
603,483 UART: [state] CFI Enabled
615,371 UART: [state] LifecycleState = Unprovisioned
617,738 UART: [state] DebugLocked = No
620,461 UART: [state] WD Timer not started. Device not locked for debugging
624,845 UART: [kat] SHA2-256
814,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,530 UART: [kat] ++
826,128 UART: [kat] sha1
837,709 UART: [kat] SHA2-256
840,777 UART: [kat] SHA2-384
846,470 UART: [kat] SHA2-512-ACC
849,039 UART: [kat] ECC-384
3,289,188 UART: [kat] HMAC-384Kdf
3,302,618 UART: [kat] LMS
3,834,432 UART: [kat] --
3,840,079 UART: [cold-reset] ++
3,841,512 UART: [fht] FHT @ 0x50003400
3,852,479 UART: [idev] ++
3,853,116 UART: [idev] CDI.KEYID = 6
3,854,136 UART: [idev] SUBJECT.KEYID = 7
3,855,298 UART: [idev] UDS.KEYID = 0
3,856,230 ready_for_fw is high
3,856,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,173 UART: [idev] Erasing UDS.KEYID = 0
6,333,616 UART: [idev] Sha1 KeyId Algorithm
6,354,888 UART: [idev] --
6,358,707 UART: [ldev] ++
6,359,377 UART: [ldev] CDI.KEYID = 6
6,360,277 UART: [ldev] SUBJECT.KEYID = 5
6,361,476 UART: [ldev] AUTHORITY.KEYID = 7
6,362,698 UART: [ldev] FE.KEYID = 1
6,374,577 UART: [ldev] Erasing FE.KEYID = 1
8,848,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,762 UART: [ldev] --
10,638,725 UART: [fwproc] Wait for Commands...
10,641,738 UART: [fwproc] Recv command 0x46574c44
10,643,993 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,937 >>> mbox cmd response: success
14,840,719 UART: [afmc] ++
14,841,423 UART: [afmc] CDI.KEYID = 6
14,842,583 UART: [afmc] SUBJECT.KEYID = 7
14,844,070 UART: [afmc] AUTHORITY.KEYID = 5
17,347,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,545 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,006 UART: [afmc] --
19,142,117 UART: [cold-reset] --
19,145,976 UART: [state] Locking Datavault
19,150,745 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,895 UART: [state] Locking ICCM
19,154,180 UART: [exit] Launching FMC @ 0x40000130
19,162,519 UART:
19,162,755 UART: Running Caliptra FMC ...
19,163,844 UART:
19,163,993 UART: [state] CFI Enabled
19,172,513 UART: [fht] FMC Alias Private Key: 7
20,929,890 UART: [art] Extend RT PCRs Done
20,931,108 UART: [art] Lock RT PCRs Done
20,932,643 UART: [art] Populate DV Done
20,938,101 UART: [fht] FMC Alias Private Key: 7
20,939,595 UART: [art] Derive CDI
20,940,353 UART: [art] Store in in slot 0x4
20,982,831 UART: [art] Derive Key Pair
20,983,869 UART: [art] Store priv key in slot 0x5
23,410,383 UART: [art] Derive Key Pair - Done
23,423,365 UART: [art] Signing Cert with AUTHO
23,424,663 UART: RITY.KEYID = 7
25,130,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,591 UART: [art] PUB.X = 1C7CE6CFDAFFBF15443BD59875BF9537BD5841BEA5DA7E7B50736CCF7FB4C68C6C410700D7EFD9172DF8CE3056F45832
25,138,881 UART: [art] PUB.Y = B41AFDD68727505D2C36CC416A25266BF499AB6C8B49C598E1A95D94D2FFC2F9911CCFB8FC5415E4DD49BCC730B35609
25,146,139 UART: [art] SIG.R = 3C663FD8CD145D9FCD93F947CC5F09DC402DD9F8D451944C73C0DB00E7617BFB1CAB7491538AC5A3A0822332BC821CA1
25,153,566 UART: [art] SIG.S = CEDA126FF6096235E5C004D8F89BA8EDA79E68F38992E42510EC094590028CDADFBCBBC770E3C42423101B502F23352B
26,132,588 UART: Caliptra RT
26,133,272 UART: [state] CFI Enabled
26,250,928 UART: [rt] RT listening for mailbox commands...
30,283,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,439,028 UART: [rt]cmd =0x41544d4e, len=14344
34,369,531 >>> mbox cmd response data (8 bytes)
34,370,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,400,867 UART: [rt]cmd =0x41545348, len=116
34,420,019 >>> mbox cmd response data (12 bytes)
36,464,798 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,565,222 UART:
36,565,603 UART: Running Caliptra ROM ...
36,566,649 UART:
36,566,854 UART: [state] CFI Enabled
36,581,669 UART: [state] LifecycleState = Unprovisioned
36,583,556 UART: [state] DebugLocked = No
36,585,087 UART: [state] WD Timer not started. Device not locked for debugging
36,589,646 UART: [kat] SHA2-256
36,779,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,790,257 UART: [kat] ++
36,790,767 UART: [kat] sha1
36,800,780 UART: [kat] SHA2-256
36,803,790 UART: [kat] SHA2-384
36,810,903 UART: [kat] SHA2-512-ACC
36,813,465 UART: [kat] ECC-384
39,255,794 UART: [kat] HMAC-384Kdf
39,270,294 UART: [kat] LMS
39,801,929 UART: [kat] --
39,805,866 UART: [update-reset] ++
42,830,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,835,080 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
43,228,853 >>> mbox cmd response: success
43,229,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,229,988 UART: [update-reset] Copying MAN_2 To MAN_1
43,267,543 UART: [update-reset Success] --
43,272,185 UART: [state] Locking Datavault
43,276,255 UART: [state] Locking PCR0, PCR1 and PCR31
43,278,444 UART: [state] Locking ICCM
43,279,709 UART: [exit] Launching FMC @ 0x40000130
43,288,367 UART:
43,288,594 UART: Running Caliptra FMC ...
43,289,608 UART:
43,289,744 UART: [state] CFI Enabled
43,333,419 UART: [art] Extend RT PCRs Done
43,334,550 UART: [art] Lock RT PCRs Done
43,335,958 UART: [art] Populate DV Done
43,341,570 UART: [fht] FMC Alias Private Key: 7
43,343,262 UART: [art] Derive CDI
43,344,009 UART: [art] Store in in slot 0x4
43,386,986 UART: [art] Derive Key Pair
43,388,180 UART: [art] Store priv key in slot 0x5
45,815,300 UART: [art] Derive Key Pair - Done
45,828,557 UART: [art] Signing Cert with AUTHO
45,829,884 UART: RITY.KEYID = 7
47,535,210 UART: [art] Erasing AUTHORITY.KEYID = 7
47,536,712 UART: [art] PUB.X = FB500F786E9AFC9743F32A74DC0BBEF345B203BC45E1084B61C12E2B9A4916502EC2C6B8E314E629AE121793A9340526
47,543,945 UART: [art] PUB.Y = 68049C03B1C8CDFAC4784E6BE536F0CDB369C36D0480CE57C532775D1827F404D31A467C4999AEBFB6B36FE60CBF2342
47,551,217 UART: [art] SIG.R = F755C122892736E3C83C8D7D00417E12AF8F13302C9B7E75A6124412F57C47B11E094E83758CB2F0862DA01FBF8BE617
47,558,596 UART: [art] SIG.S = A13179CE5141052F60F5ED36573A9EFBCB196E0E47ECDCA009FE0D975EEAEB087E21CDF57B6E7603B223497092E5BBEF
48,537,349 UART: mbox::rt_entry...
48,538,290 UART: ____ _ _ _ ____ _____
48,540,257 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,542,252 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,544,167 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,546,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,548,025 UART: |_|
48,549,008 UART:
48,833,193 UART: [rt] Runtime listening for mailbox commands...
48,835,362 >>> mbox cmd response data (48 bytes)
48,835,924 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,838,242 >>> mbox cmd response data (48 bytes)
48,839,134 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,853,061 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,758,361 ready_for_fw is high
3,758,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,930 >>> mbox cmd response: success
19,219,328 UART:
19,219,745 UART: Running Caliptra FMC ...
19,220,934 UART:
19,221,091 UART: [state] CFI Enabled
19,228,718 UART: [fht] FMC Alias Private Key: 7
20,985,793 UART: [art] Extend RT PCRs Done
20,987,022 UART: [art] Lock RT PCRs Done
20,989,190 UART: [art] Populate DV Done
20,994,544 UART: [fht] FMC Alias Private Key: 7
20,996,032 UART: [art] Derive CDI
20,996,791 UART: [art] Store in in slot 0x4
21,038,951 UART: [art] Derive Key Pair
21,039,994 UART: [art] Store priv key in slot 0x5
23,466,647 UART: [art] Derive Key Pair - Done
23,479,426 UART: [art] Signing Cert with AUTHO
23,480,731 UART: RITY.KEYID = 7
25,186,749 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,930 UART: [art] PUB.X = D6C9791A915A62E437C33D662A8C817F59F36B511A84A702974AE5AC6F3EC6E293B24F0471D6009E0523CA9E4DC66200
25,195,564 UART: [art] PUB.Y = 2C1CEC128FA2B7DB6E0A47605633F6395688FEB2A2EE5982D954131394608D339A1B41F7F1913B7FEC61E20B48F1D621
25,202,744 UART: [art] SIG.R = 86E482E97AAE192021D6523A77D8B64929B90C0FC6CC57B2B42A24F2DC28BC750894A3EC65229A5E917D6F7CF25852CD
25,210,125 UART: [art] SIG.S = 8FE92282A045F6A086545E7BFCF372B4CA46C7B6E73D47E3F81945318284374FA16981A5BB10BB3C77F15A495359F4C7
26,188,809 UART: Caliptra RT
26,190,072 UART: [state] CFI Enabled
26,306,848 UART: [rt] RT listening for mailbox commands...
30,361,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,517,605 UART: [rt]cmd =0x41544d4e, len=14344
34,448,205 >>> mbox cmd response data (8 bytes)
34,449,018 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,479,887 UART: [rt]cmd =0x41545348, len=116
34,500,235 >>> mbox cmd response data (12 bytes)
36,546,894 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,475,824 >>> mbox cmd response: success
43,476,302 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,510,022 UART:
43,510,305 UART: Running Caliptra FMC ...
43,511,417 UART:
43,511,573 UART: [state] CFI Enabled
43,555,232 UART: [art] Extend RT PCRs Done
43,556,413 UART: [art] Lock RT PCRs Done
43,557,974 UART: [art] Populate DV Done
43,563,700 UART: [fht] FMC Alias Private Key: 7
43,565,338 UART: [art] Derive CDI
43,566,145 UART: [art] Store in in slot 0x4
43,608,747 UART: [art] Derive Key Pair
43,609,785 UART: [art] Store priv key in slot 0x5
46,036,288 UART: [art] Derive Key Pair - Done
46,049,290 UART: [art] Signing Cert with AUTHO
46,050,604 UART: RITY.KEYID = 7
47,755,755 UART: [art] Erasing AUTHORITY.KEYID = 7
47,757,243 UART: [art] PUB.X = EE45CE8CBF0AAFE8311371C7B603BD20DDAABE7DD886103AEE7E39C0001E9D6A6212BBCFE3CF9ECF841B685A1A5F35D9
47,764,537 UART: [art] PUB.Y = AF62D876189EEEE56D426ED2CBB651BED7F62495D38916D9C44B697CDEBD987D123C0CCBF763B755EF25C1AF538C9606
47,771,809 UART: [art] SIG.R = 9C9D887D846DB196A50A5D7BEA3A8E03FDED8C6F944C419EAD88391070778875E99C5358074370DF5BB3CC684B88E1EF
47,779,186 UART: [art] SIG.S = D3EE82712189B6CDB3DF91FEF6B5C31649BB8591C6AD9880E3E1F8BC5186A4148F9627B64D8DA9CA97D53C13B1C9B7C2
48,757,267 UART: mbox::rt_entry...
48,758,234 UART: ____ _ _ _ ____ _____
48,760,212 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,762,326 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,764,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,766,092 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,768,048 UART: |_|
48,768,856 UART:
49,052,516 UART: [rt] Runtime listening for mailbox commands...
49,054,681 >>> mbox cmd response data (48 bytes)
49,055,256 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,057,570 >>> mbox cmd response data (48 bytes)
49,058,450 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,072,571 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
890,075 UART: [kat] SHA2-256
892,013 UART: [kat] SHA2-384
894,630 UART: [kat] SHA2-512-ACC
896,531 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
906,746 UART: [kat] LMS
1,474,942 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,607 UART: [fht] Storing FHT @ 0x50003400
1,479,294 UART: [idev] ++
1,479,462 UART: [idev] CDI.KEYID = 6
1,479,822 UART: [idev] SUBJECT.KEYID = 7
1,480,246 UART: [idev] UDS.KEYID = 0
1,480,591 ready_for_fw is high
1,480,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,338 UART: [idev] --
1,514,357 UART: [ldev] ++
1,514,525 UART: [ldev] CDI.KEYID = 6
1,514,888 UART: [ldev] SUBJECT.KEYID = 5
1,515,314 UART: [ldev] AUTHORITY.KEYID = 7
1,515,777 UART: [ldev] FE.KEYID = 1
1,520,645 UART: [ldev] Erasing FE.KEYID = 1
1,545,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,562 UART: [ldev] --
1,584,923 UART: [fwproc] Waiting for Commands...
1,585,720 UART: [fwproc] Received command 0x46574c44
1,586,511 UART: [fwproc] Received Image of size 114448 bytes
2,886,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,471 >>> mbox cmd response: success
3,080,597 UART: [afmc] ++
3,080,765 UART: [afmc] CDI.KEYID = 6
3,081,127 UART: [afmc] SUBJECT.KEYID = 7
3,081,552 UART: [afmc] AUTHORITY.KEYID = 5
3,116,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,834 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,524 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,467 UART: [afmc] --
3,160,487 UART: [cold-reset] --
3,161,189 UART: [state] Locking Datavault
3,162,380 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,984 UART: [state] Locking ICCM
3,163,612 UART: [exit] Launching FMC @ 0x40000130
3,168,941 UART:
3,168,957 UART: Running Caliptra FMC ...
3,169,365 UART:
3,169,419 UART: [state] CFI Enabled
3,179,688 UART: [fht] FMC Alias Private Key: 7
3,287,197 UART: [art] Extend RT PCRs Done
3,287,625 UART: [art] Lock RT PCRs Done
3,289,353 UART: [art] Populate DV Done
3,297,698 UART: [fht] FMC Alias Private Key: 7
3,298,746 UART: [art] Derive CDI
3,299,026 UART: [art] Store in in slot 0x4
3,384,617 UART: [art] Derive Key Pair
3,384,977 UART: [art] Store priv key in slot 0x5
3,398,743 UART: [art] Derive Key Pair - Done
3,413,739 UART: [art] Signing Cert with AUTHO
3,414,219 UART: RITY.KEYID = 7
3,429,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,360 UART: [art] PUB.X = 7C776BF7E49A6A8ADE8A42D133F54987A6D22C50596221363FB51B71EEDC2282A0C734E891851BBFAC282B9B0E3FCA19
3,437,137 UART: [art] PUB.Y = 0CD1936652B5A9E93744F6DD2D10D57606CA554BB96976942738C158D5D75286D1F7BB2CFB5F08312A1F50B5867B0906
3,444,068 UART: [art] SIG.R = 5F6014C9B443D901A9E1B792352831EADCCE7E8684B66364840AFB355F6525572DED61B8D5E10E516C8B410B92E49F26
3,450,826 UART: [art] SIG.S = 63ED16362536C86F5EF0AD45BEF20C9CC74D58D229C406AEA81A5BB4778046D573960B760FBADA3CAE19D40EC06B7549
3,474,810 UART: Caliptra RT
3,475,063 UART: [state] CFI Enabled
3,582,133 UART: [rt] RT listening for mailbox commands...
3,582,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,873 UART: [rt]cmd =0x41544d4e, len=14344
3,850,400 >>> mbox cmd response data (8 bytes)
3,850,401 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,526 UART: [rt]cmd =0x41545348, len=116
3,901,354 >>> mbox cmd response data (12 bytes)
3,901,355 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,901,987 UART:
3,902,003 UART: Running Caliptra ROM ...
3,902,411 UART:
3,902,465 UART: [state] CFI Enabled
3,904,555 UART: [state] LifecycleState = Unprovisioned
3,905,210 UART: [state] DebugLocked = No
3,905,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,907,415 UART: [kat] SHA2-256
4,701,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,705,461 UART: [kat] ++
4,705,613 UART: [kat] sha1
4,709,929 UART: [kat] SHA2-256
4,711,867 UART: [kat] SHA2-384
4,714,548 UART: [kat] SHA2-512-ACC
4,716,448 UART: [kat] ECC-384
4,722,025 UART: [kat] HMAC-384Kdf
4,726,595 UART: [kat] LMS
5,294,791 UART: [kat] --
5,295,862 UART: [update-reset] ++
6,223,322 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,224,426 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,320,860 >>> mbox cmd response: success
6,320,860 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,320,993 UART: [update-reset] Copying MAN_2 To MAN_1
6,329,007 UART: [update-reset Success] --
6,329,986 UART: [state] Locking Datavault
6,330,658 UART: [state] Locking PCR0, PCR1 and PCR31
6,331,262 UART: [state] Locking ICCM
6,331,850 UART: [exit] Launching FMC @ 0x40000130
6,337,179 UART:
6,337,195 UART: Running Caliptra FMC ...
6,337,603 UART:
6,337,657 UART: [state] CFI Enabled
6,426,304 UART: [art] Extend RT PCRs Done
6,426,732 UART: [art] Lock RT PCRs Done
6,428,189 UART: [art] Populate DV Done
6,436,394 UART: [fht] FMC Alias Private Key: 7
6,437,510 UART: [art] Derive CDI
6,437,790 UART: [art] Store in in slot 0x4
6,523,103 UART: [art] Derive Key Pair
6,523,463 UART: [art] Store priv key in slot 0x5
6,535,953 UART: [art] Derive Key Pair - Done
6,550,787 UART: [art] Signing Cert with AUTHO
6,551,267 UART: RITY.KEYID = 7
6,566,357 UART: [art] Erasing AUTHORITY.KEYID = 7
6,567,122 UART: [art] PUB.X = CEF17A3136073CFD3F039AC8A36FB1BE1B51307E8648C234A103879948DE189BE3326D3B38E7D88F416C1A34C2D5A63F
6,573,889 UART: [art] PUB.Y = F2C8674A46265456DE951CDE0CD5043FDB9855C3C754C43CAA748B5DEB1B969DF8CF3D09A33C4E10EA7C86E1BF389D83
6,580,846 UART: [art] SIG.R = DC08F5C48C87363E0CD0946997A1A86B3A3DBE491B51536FB9235A14BA8A07AC46FC090620F3305320FB15625F9730F6
6,587,601 UART: [art] SIG.S = 919044733151218A637A6B013B2EC9CD5CEA02559266FCF095913677B3F1DD6ABF0ED0A213C21BEA228DB09F59FB0F3C
6,611,830 UART: mbox::rt_entry...
6,612,202 UART: ____ _ _ _ ____ _____
6,612,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,613,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,614,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,615,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,616,090 UART: |_|
6,616,402 UART:
6,895,179 UART: [rt] Runtime listening for mailbox commands...
6,896,369 >>> mbox cmd response data (48 bytes)
6,896,370 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,899,153 >>> mbox cmd response data (48 bytes)
6,899,154 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,914,291 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,855 ready_for_fw is high
1,362,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,615 >>> mbox cmd response: success
2,988,965 UART:
2,988,981 UART: Running Caliptra FMC ...
2,989,389 UART:
2,989,443 UART: [state] CFI Enabled
3,000,102 UART: [fht] FMC Alias Private Key: 7
3,107,641 UART: [art] Extend RT PCRs Done
3,108,069 UART: [art] Lock RT PCRs Done
3,109,665 UART: [art] Populate DV Done
3,117,822 UART: [fht] FMC Alias Private Key: 7
3,118,980 UART: [art] Derive CDI
3,119,260 UART: [art] Store in in slot 0x4
3,204,957 UART: [art] Derive Key Pair
3,205,317 UART: [art] Store priv key in slot 0x5
3,218,301 UART: [art] Derive Key Pair - Done
3,232,741 UART: [art] Signing Cert with AUTHO
3,233,221 UART: RITY.KEYID = 7
3,248,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,394 UART: [art] PUB.X = BB616EA20C25B93722EA50FB5E89E3BC3E96C1793EDE967E160CD753417F64986A412143E9FC41A8396B63332C9D0AF7
3,256,159 UART: [art] PUB.Y = AE4521A39B571B2FCB072267A85752512A4F5B1A6187B7330CB2B235E7E012715568AA25C4A448E63C8CD79FB89C1D3C
3,263,105 UART: [art] SIG.R = 2A603A6A43F6B9ED1642FE12DD6FB660A9969FF128BE47971FB93751875BCB43B27D640073DA6B6288527CA8CC8DF389
3,269,859 UART: [art] SIG.S = 7082913B6D462D95F9C95DEA90616C7FCA5ADC034EE5729AACD5E6A59B28FD3B514E51291F5A59E7B4DB801068659264
3,293,447 UART: Caliptra RT
3,293,700 UART: [state] CFI Enabled
3,402,086 UART: [rt] RT listening for mailbox commands...
3,402,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,886 UART: [rt]cmd =0x41544d4e, len=14344
3,670,999 >>> mbox cmd response data (8 bytes)
3,671,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,909 UART: [rt]cmd =0x41545348, len=116
3,722,157 >>> mbox cmd response data (12 bytes)
3,722,158 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,885 >>> mbox cmd response: success
6,021,885 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,035,234 UART:
6,035,250 UART: Running Caliptra FMC ...
6,035,658 UART:
6,035,712 UART: [state] CFI Enabled
6,124,867 UART: [art] Extend RT PCRs Done
6,125,295 UART: [art] Lock RT PCRs Done
6,126,562 UART: [art] Populate DV Done
6,134,725 UART: [fht] FMC Alias Private Key: 7
6,135,673 UART: [art] Derive CDI
6,135,953 UART: [art] Store in in slot 0x4
6,221,986 UART: [art] Derive Key Pair
6,222,346 UART: [art] Store priv key in slot 0x5
6,235,876 UART: [art] Derive Key Pair - Done
6,250,752 UART: [art] Signing Cert with AUTHO
6,251,232 UART: RITY.KEYID = 7
6,266,340 UART: [art] Erasing AUTHORITY.KEYID = 7
6,267,105 UART: [art] PUB.X = 70587CFABA52D7E8095F07FCAA4AF5906E81DC87E7E5592890A90467AF5D1148695F0429C79BD0BE16B833390403542A
6,273,857 UART: [art] PUB.Y = EEC40BD02FD435CE36059C05E769B684EEB99915B543FD361E8C7E316671067271D58F663D78EDA60190CF971D36E1EF
6,280,796 UART: [art] SIG.R = 18D0212363525EAE4F8A3B01933FC913F569752E93E4725A45161DDE7D3A20E3EBC425934A990DA85BC549973ED40BB8
6,287,557 UART: [art] SIG.S = 09A75D9D690DD0A54459AFF4B356C82077F51CAE0B9E2FEBD8FE9D9CAD0AEB3031AF522AE65A9B9993625A37FE1C3A99
6,310,830 UART: mbox::rt_entry...
6,311,202 UART: ____ _ _ _ ____ _____
6,311,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,312,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,313,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,314,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,315,090 UART: |_|
6,315,402 UART:
6,597,395 UART: [rt] Runtime listening for mailbox commands...
6,598,585 >>> mbox cmd response data (48 bytes)
6,598,586 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,601,369 >>> mbox cmd response data (48 bytes)
6,601,370 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,616,507 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,300 UART: [fht] Storing FHT @ 0x50003400
1,480,185 UART: [idev] ++
1,480,353 UART: [idev] CDI.KEYID = 6
1,480,713 UART: [idev] SUBJECT.KEYID = 7
1,481,137 UART: [idev] UDS.KEYID = 0
1,481,482 ready_for_fw is high
1,481,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,143 UART: [idev] Erasing UDS.KEYID = 0
1,505,759 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,501 UART: [idev] --
1,515,706 UART: [ldev] ++
1,515,874 UART: [ldev] CDI.KEYID = 6
1,516,237 UART: [ldev] SUBJECT.KEYID = 5
1,516,663 UART: [ldev] AUTHORITY.KEYID = 7
1,517,126 UART: [ldev] FE.KEYID = 1
1,522,396 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,097 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,179 UART: [fwproc] Received command 0x46574c44
1,587,970 UART: [fwproc] Received Image of size 114448 bytes
2,887,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,127 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,536 >>> mbox cmd response: success
3,081,544 UART: [afmc] ++
3,081,712 UART: [afmc] CDI.KEYID = 6
3,082,074 UART: [afmc] SUBJECT.KEYID = 7
3,082,499 UART: [afmc] AUTHORITY.KEYID = 5
3,117,444 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,626 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,019 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,709 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,632 UART: [afmc] --
3,160,750 UART: [cold-reset] --
3,161,460 UART: [state] Locking Datavault
3,162,603 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,207 UART: [state] Locking ICCM
3,163,849 UART: [exit] Launching FMC @ 0x40000130
3,169,178 UART:
3,169,194 UART: Running Caliptra FMC ...
3,169,602 UART:
3,169,745 UART: [state] CFI Enabled
3,180,276 UART: [fht] FMC Alias Private Key: 7
3,287,657 UART: [art] Extend RT PCRs Done
3,288,085 UART: [art] Lock RT PCRs Done
3,289,893 UART: [art] Populate DV Done
3,298,040 UART: [fht] FMC Alias Private Key: 7
3,299,210 UART: [art] Derive CDI
3,299,490 UART: [art] Store in in slot 0x4
3,384,781 UART: [art] Derive Key Pair
3,385,141 UART: [art] Store priv key in slot 0x5
3,398,265 UART: [art] Derive Key Pair - Done
3,413,196 UART: [art] Signing Cert with AUTHO
3,413,676 UART: RITY.KEYID = 7
3,428,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,503 UART: [art] PUB.X = 9FE5B02DC62E7592CCEF19E0D08A7D4ED999ED60B5C46698C9223D211563E959E8879403AD9EEF041D54E39DE20764D2
3,436,270 UART: [art] PUB.Y = 3A8F316D6DF826717E2189484DCFDDEFEEF6BC87BBBFB084FF312279A3837B45EF778C7481C917B247D6EB43283DEDC4
3,443,236 UART: [art] SIG.R = 608ABB769F81B1F5A660F052361A8A39D64E7C02E8C3F0CDC9F6EAA001B7DFBAEFA53C69023182A554EED435EF4A64BE
3,450,017 UART: [art] SIG.S = F5B74367EDCA797BE5496870DBE7871B821C5A001D59DA694EA029F1D3D311F9A89003DFF5852A458B518F171B4C3F0E
3,473,562 UART: Caliptra RT
3,473,907 UART: [state] CFI Enabled
3,582,308 UART: [rt] RT listening for mailbox commands...
3,582,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,704 UART: [rt]cmd =0x41544d4e, len=14344
3,850,577 >>> mbox cmd response data (8 bytes)
3,850,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,787 UART: [rt]cmd =0x41545348, len=116
3,902,409 >>> mbox cmd response data (12 bytes)
3,902,410 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,278 UART:
3,903,294 UART: Running Caliptra ROM ...
3,903,702 UART:
3,903,843 UART: [state] CFI Enabled
3,907,129 UART: [state] LifecycleState = Unprovisioned
3,907,784 UART: [state] DebugLocked = No
3,908,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,910,077 UART: [kat] SHA2-256
4,704,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,708,123 UART: [kat] ++
4,708,275 UART: [kat] sha1
4,712,365 UART: [kat] SHA2-256
4,714,303 UART: [kat] SHA2-384
4,717,132 UART: [kat] SHA2-512-ACC
4,719,032 UART: [kat] ECC-384
4,724,721 UART: [kat] HMAC-384Kdf
4,729,359 UART: [kat] LMS
5,297,555 UART: [kat] --
5,298,358 UART: [update-reset] ++
6,225,130 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,226,268 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,322,702 >>> mbox cmd response: success
6,322,702 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,323,029 UART: [update-reset] Copying MAN_2 To MAN_1
6,331,043 UART: [update-reset Success] --
6,331,962 UART: [state] Locking Datavault
6,332,702 UART: [state] Locking PCR0, PCR1 and PCR31
6,333,306 UART: [state] Locking ICCM
6,333,796 UART: [exit] Launching FMC @ 0x40000130
6,339,125 UART:
6,339,141 UART: Running Caliptra FMC ...
6,339,549 UART:
6,339,692 UART: [state] CFI Enabled
6,428,803 UART: [art] Extend RT PCRs Done
6,429,231 UART: [art] Lock RT PCRs Done
6,430,472 UART: [art] Populate DV Done
6,438,413 UART: [fht] FMC Alias Private Key: 7
6,439,403 UART: [art] Derive CDI
6,439,683 UART: [art] Store in in slot 0x4
6,525,508 UART: [art] Derive Key Pair
6,525,868 UART: [art] Store priv key in slot 0x5
6,538,878 UART: [art] Derive Key Pair - Done
6,553,780 UART: [art] Signing Cert with AUTHO
6,554,260 UART: RITY.KEYID = 7
6,569,098 UART: [art] Erasing AUTHORITY.KEYID = 7
6,569,863 UART: [art] PUB.X = C928C4833C7CE9C71ABAB1D98E3246C73A2975304B361063B29433D527032EE4BDB30D3DA8505D73B338FF9B50FAD3B1
6,576,633 UART: [art] PUB.Y = 7B81927844555C21314AFBFC6B7873D2073926F8637262475775DF3CA3F64A2195BDF3DCB6FD0520BF7F884BD9396016
6,583,573 UART: [art] SIG.R = 0544467B89D342C63BF343FB15DA8DE8194D6DA3B6911587C0C9413A332DE5B24BD06A88A775F520F65254342A6469BF
6,590,338 UART: [art] SIG.S = 6C90B4501EB9708DEB28DC58F0C7639E5D58B275FB3AB3E53315180BA2B9772AF6C55FC9C290EF141F0EA0B224E6B31B
6,614,301 UART: mbox::rt_entry...
6,614,673 UART: ____ _ _ _ ____ _____
6,615,457 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,616,257 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,617,025 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,617,793 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,618,561 UART: |_|
6,618,873 UART:
6,897,570 UART: [rt] Runtime listening for mailbox commands...
6,898,760 >>> mbox cmd response data (48 bytes)
6,898,761 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,901,544 >>> mbox cmd response data (48 bytes)
6,901,545 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,916,682 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,006 >>> mbox cmd response: success
2,991,484 UART:
2,991,500 UART: Running Caliptra FMC ...
2,991,908 UART:
2,992,051 UART: [state] CFI Enabled
3,002,482 UART: [fht] FMC Alias Private Key: 7
3,110,491 UART: [art] Extend RT PCRs Done
3,110,919 UART: [art] Lock RT PCRs Done
3,112,745 UART: [art] Populate DV Done
3,120,934 UART: [fht] FMC Alias Private Key: 7
3,121,998 UART: [art] Derive CDI
3,122,278 UART: [art] Store in in slot 0x4
3,208,155 UART: [art] Derive Key Pair
3,208,515 UART: [art] Store priv key in slot 0x5
3,221,731 UART: [art] Derive Key Pair - Done
3,236,415 UART: [art] Signing Cert with AUTHO
3,236,895 UART: RITY.KEYID = 7
3,252,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,012 UART: [art] PUB.X = 39BC757E90A3728F4AB36F800E514270C66B1701F61232B3E5CEB0A614C46D673289BEC511993CB2BE8F7FA75DB31C86
3,259,780 UART: [art] PUB.Y = F1A100FE826ECF2C04871E546DEAF3904CFF4D6D38E9847A11064D69A941F91E8AE2F68D7782570F58E93A08BDFB0D83
3,266,703 UART: [art] SIG.R = F025B372580D972731F9C44451CBDB37F448462A02CC03B08D3F221027AEDB4EC4ACA1AF4C8F61DCA1D593079BDEAAD1
3,273,477 UART: [art] SIG.S = 41E4917618E81476D589A77801471D37310C95DA3BA1C22083CF067E06CE85F733F832118977F45888A216C5AF5FF3FD
3,297,164 UART: Caliptra RT
3,297,509 UART: [state] CFI Enabled
3,405,882 UART: [rt] RT listening for mailbox commands...
3,406,552 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,492 UART: [rt]cmd =0x41544d4e, len=14344
3,674,225 >>> mbox cmd response data (8 bytes)
3,674,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,361 UART: [rt]cmd =0x41545348, len=116
3,725,991 >>> mbox cmd response data (12 bytes)
3,725,992 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,026,692 >>> mbox cmd response: success
6,026,692 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,039,729 UART:
6,039,745 UART: Running Caliptra FMC ...
6,040,153 UART:
6,040,296 UART: [state] CFI Enabled
6,129,877 UART: [art] Extend RT PCRs Done
6,130,305 UART: [art] Lock RT PCRs Done
6,131,478 UART: [art] Populate DV Done
6,139,809 UART: [fht] FMC Alias Private Key: 7
6,140,951 UART: [art] Derive CDI
6,141,231 UART: [art] Store in in slot 0x4
6,227,446 UART: [art] Derive Key Pair
6,227,806 UART: [art] Store priv key in slot 0x5
6,241,172 UART: [art] Derive Key Pair - Done
6,255,830 UART: [art] Signing Cert with AUTHO
6,256,310 UART: RITY.KEYID = 7
6,271,406 UART: [art] Erasing AUTHORITY.KEYID = 7
6,272,171 UART: [art] PUB.X = 6C1261DD323902EBC618F4C29B863F0A1E8075D00F9875CCFEA60DEB2DC3D28165C24BFEC5239E8CAA6997D087C31198
6,278,939 UART: [art] PUB.Y = 28F630A73410F177E127AC5825954F04B4F8076FCB0C31D53C4DA59FF71205E24DE0157E1865A832ABE2014EBC4EB8A9
6,285,878 UART: [art] SIG.R = 893B324FB8D353D96E202216F81F6DB7071E14FEB57296D6B6C5A2A9E8BB9057D4E944CB9F2723F68051D7859F359D21
6,292,645 UART: [art] SIG.S = 6B7F86C9D1FD863A2EAAAC8ED0837B7DC05F44F24E6DFDAED9D5A076E2AF09949EAC8528E1072B051CD51D08B8B56859
6,316,402 UART: mbox::rt_entry...
6,316,774 UART: ____ _ _ _ ____ _____
6,317,558 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,318,358 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,319,126 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,319,894 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,320,662 UART: |_|
6,320,974 UART:
6,604,134 UART: [rt] Runtime listening for mailbox commands...
6,605,324 >>> mbox cmd response data (48 bytes)
6,605,325 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,608,108 >>> mbox cmd response data (48 bytes)
6,608,109 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,623,246 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,983 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
893,770 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,895 UART: [kat] ++
898,047 UART: [kat] sha1
902,141 UART: [kat] SHA2-256
904,081 UART: [kat] SHA2-384
906,902 UART: [kat] SHA2-512-ACC
908,803 UART: [kat] ECC-384
918,228 UART: [kat] HMAC-384Kdf
922,712 UART: [kat] LMS
1,171,040 UART: [kat] --
1,171,959 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 ready_for_fw is high
1,176,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,201,201 UART: [idev] Sha1 KeyId Algorithm
1,209,517 UART: [idev] --
1,210,681 UART: [ldev] ++
1,210,849 UART: [ldev] CDI.KEYID = 6
1,211,212 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,237 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,435 UART: [ldev] --
1,282,714 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,642 >>> mbox cmd response: success
2,776,652 UART: [afmc] ++
2,776,820 UART: [afmc] CDI.KEYID = 6
2,777,182 UART: [afmc] SUBJECT.KEYID = 7
2,777,607 UART: [afmc] AUTHORITY.KEYID = 5
2,813,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,776 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,495 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,267 UART: [afmc] --
2,856,153 UART: [cold-reset] --
2,857,095 UART: [state] Locking Datavault
2,858,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,044 UART: [state] Locking ICCM
2,859,494 UART: [exit] Launching FMC @ 0x40000130
2,864,823 UART:
2,864,839 UART: Running Caliptra FMC ...
2,865,247 UART:
2,865,301 UART: [state] CFI Enabled
2,875,960 UART: [fht] FMC Alias Private Key: 7
2,983,889 UART: [art] Extend RT PCRs Done
2,984,317 UART: [art] Lock RT PCRs Done
2,986,173 UART: [art] Populate DV Done
2,994,256 UART: [fht] FMC Alias Private Key: 7
2,995,232 UART: [art] Derive CDI
2,995,512 UART: [art] Store in in slot 0x4
3,080,903 UART: [art] Derive Key Pair
3,081,263 UART: [art] Store priv key in slot 0x5
3,094,625 UART: [art] Derive Key Pair - Done
3,109,195 UART: [art] Signing Cert with AUTHO
3,109,675 UART: RITY.KEYID = 7
3,125,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,918 UART: [art] PUB.X = 58531CF79DC8E7F9F0A72944B8FA5818BC331B25570B824DA1D91E980EA9F63DABB6449FD47EB51B10AD388042D5A2C2
3,132,692 UART: [art] PUB.Y = CB6BB813EF552C4C7DD2D15DE67E9BA48EAB51E3410DA236079FE621610562F2C7FF3B1C1E65A91A6C20801B8E97B6CC
3,139,649 UART: [art] SIG.R = C50277CB9603596AFF03E3AF4DFE27C6B395C6CC4D8B2A41CB0F56873510A86B3F4BFACC89C2AC82D5E006ECFDB479E5
3,146,426 UART: [art] SIG.S = 9B0848929D76E9FB8D82E738D8B507A900C3B9B11BFC9A65AC838E3ACD03BCEFD6B7ADD16C711A2BE1EF540B292E9157
3,169,807 UART: Caliptra RT
3,170,060 UART: [state] CFI Enabled
3,278,604 UART: [rt] RT listening for mailbox commands...
3,279,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,392 UART: [rt]cmd =0x41544d4e, len=14344
3,547,445 >>> mbox cmd response data (8 bytes)
3,547,446 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,587 UART: [rt]cmd =0x41545348, len=116
3,599,107 >>> mbox cmd response data (12 bytes)
3,599,108 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,927 UART:
3,599,943 UART: Running Caliptra ROM ...
3,600,351 UART:
3,600,406 UART: [state] CFI Enabled
3,602,848 UART: [state] LifecycleState = Unprovisioned
3,603,503 UART: [state] DebugLocked = No
3,604,019 UART: [state] WD Timer not started. Device not locked for debugging
3,605,359 UART: [kat] SHA2-256
4,411,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,415,134 UART: [kat] ++
4,415,286 UART: [kat] sha1
4,419,462 UART: [kat] SHA2-256
4,421,402 UART: [kat] SHA2-384
4,424,281 UART: [kat] SHA2-512-ACC
4,426,181 UART: [kat] ECC-384
4,435,506 UART: [kat] HMAC-384Kdf
4,439,956 UART: [kat] LMS
4,688,284 UART: [kat] --
4,688,978 UART: [update-reset] ++
5,593,272 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,594,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,690,845 >>> mbox cmd response: success
5,690,845 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,691,074 UART: [update-reset] Copying MAN_2 To MAN_1
5,699,088 UART: [update-reset Success] --
5,700,221 UART: [state] Locking Datavault
5,700,849 UART: [state] Locking PCR0, PCR1 and PCR31
5,701,453 UART: [state] Locking ICCM
5,702,037 UART: [exit] Launching FMC @ 0x40000130
5,707,366 UART:
5,707,382 UART: Running Caliptra FMC ...
5,707,790 UART:
5,707,844 UART: [state] CFI Enabled
5,797,005 UART: [art] Extend RT PCRs Done
5,797,433 UART: [art] Lock RT PCRs Done
5,798,546 UART: [art] Populate DV Done
5,806,953 UART: [fht] FMC Alias Private Key: 7
5,808,049 UART: [art] Derive CDI
5,808,329 UART: [art] Store in in slot 0x4
5,893,906 UART: [art] Derive Key Pair
5,894,266 UART: [art] Store priv key in slot 0x5
5,907,146 UART: [art] Derive Key Pair - Done
5,921,788 UART: [art] Signing Cert with AUTHO
5,922,268 UART: RITY.KEYID = 7
5,937,244 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,009 UART: [art] PUB.X = E53E6E746D27A78A126FDF1F98B006F5B9CDB74F4986447A66ABA1EDA56188D1ECC70099437859C534D1F1B6AE891948
5,944,760 UART: [art] PUB.Y = 85DB998A3CBB0911A0F8CA4B741DFA654DD4E03F5426CCCE3E2E858D0BF034EA46395714AA58027C423CDF1319F7792E
5,951,713 UART: [art] SIG.R = BDDE1B68CA332415A7EAD3C4D0E3F8A0A27BF17482E8541863A41056C11A79DE085B6D23A96D0F7CB968DB58069112C8
5,958,482 UART: [art] SIG.S = A8B58019DB6148B44BAA1E7E384557E732809C9ABD4447AD09789FD5A2BCC41E02B17A0E504ECF41688024CDDBD07C87
5,982,634 UART: mbox::rt_entry...
5,983,006 UART: ____ _ _ _ ____ _____
5,983,790 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,984,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,985,358 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,986,126 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,894 UART: |_|
5,987,206 UART:
6,266,133 UART: [rt] Runtime listening for mailbox commands...
6,267,323 >>> mbox cmd response data (48 bytes)
6,267,324 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,270,107 >>> mbox cmd response data (48 bytes)
6,270,108 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,285,245 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,637 ready_for_fw is high
1,059,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,887 >>> mbox cmd response: success
2,689,139 UART:
2,689,155 UART: Running Caliptra FMC ...
2,689,563 UART:
2,689,617 UART: [state] CFI Enabled
2,700,178 UART: [fht] FMC Alias Private Key: 7
2,807,949 UART: [art] Extend RT PCRs Done
2,808,377 UART: [art] Lock RT PCRs Done
2,809,653 UART: [art] Populate DV Done
2,817,760 UART: [fht] FMC Alias Private Key: 7
2,818,858 UART: [art] Derive CDI
2,819,138 UART: [art] Store in in slot 0x4
2,904,543 UART: [art] Derive Key Pair
2,904,903 UART: [art] Store priv key in slot 0x5
2,917,663 UART: [art] Derive Key Pair - Done
2,932,537 UART: [art] Signing Cert with AUTHO
2,933,017 UART: RITY.KEYID = 7
2,948,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,972 UART: [art] PUB.X = E98DA5433295C5CC958D576E8734CB051FAEF95B29B8CA2D20E8198C8FD1A1D61BE413E3E6A24E5CAF6E29EA69B09BAA
2,955,759 UART: [art] PUB.Y = 53F2578E71B65B376A6FC32499DB28F459C806E9F2D997E62A83D1EE7C896D2B8CF14F3F821818E72D932C2DC2013037
2,962,703 UART: [art] SIG.R = 1F030924DFCB0AD9AD806509957778800F4DF8B2650AF911EE9A29B32C683D14731D234D9238FC5E54082EA37A9A6F65
2,969,452 UART: [art] SIG.S = CA60F5ABC7D1C8296390859E0AEA2C92A5184A7B8D3540B4B008636272FDE3B7C86F390FDA95E24B3A28DA88D452CF95
2,993,132 UART: Caliptra RT
2,993,385 UART: [state] CFI Enabled
3,101,898 UART: [rt] RT listening for mailbox commands...
3,102,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,588 UART: [rt]cmd =0x41544d4e, len=14344
3,370,299 >>> mbox cmd response data (8 bytes)
3,370,300 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,479 UART: [rt]cmd =0x41545348, len=116
3,422,105 >>> mbox cmd response data (12 bytes)
3,422,106 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,398,522 >>> mbox cmd response: success
5,398,522 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,411,976 UART:
5,411,992 UART: Running Caliptra FMC ...
5,412,400 UART:
5,412,454 UART: [state] CFI Enabled
5,501,583 UART: [art] Extend RT PCRs Done
5,502,011 UART: [art] Lock RT PCRs Done
5,503,044 UART: [art] Populate DV Done
5,511,349 UART: [fht] FMC Alias Private Key: 7
5,512,321 UART: [art] Derive CDI
5,512,601 UART: [art] Store in in slot 0x4
5,598,326 UART: [art] Derive Key Pair
5,598,686 UART: [art] Store priv key in slot 0x5
5,611,318 UART: [art] Derive Key Pair - Done
5,625,800 UART: [art] Signing Cert with AUTHO
5,626,280 UART: RITY.KEYID = 7
5,641,850 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,615 UART: [art] PUB.X = 83C40C094EB94F0B08D50AD1EE2E66077E8198E3D94FB7AFD6DC0AEFCFA53175D8B0E06DF3493D619B71A93DE2294E2F
5,649,382 UART: [art] PUB.Y = EC9E5DB355BB21CB124AB7062FA3F278C5E7236F0D61B194477A6EAD715D4A09F9AF15193F904B8CB234174C62657F46
5,656,329 UART: [art] SIG.R = 03656A33330FDA3879B5534E703AFDD56BB074B90ED764FFAFA261CCD71993F189606F039340B70CF0DF9015771861D3
5,663,084 UART: [art] SIG.S = 043A03CF6DFE9E5D593936FA6ABDE5C666ABFBACCE6E30B5EE4B78FECB26375152A60B20848D7330F5448B9DD3C25506
5,686,913 UART: mbox::rt_entry...
5,687,285 UART: ____ _ _ _ ____ _____
5,688,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,637 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,691,173 UART: |_|
5,691,485 UART:
5,969,661 UART: [rt] Runtime listening for mailbox commands...
5,970,851 >>> mbox cmd response data (48 bytes)
5,970,852 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,973,635 >>> mbox cmd response data (48 bytes)
5,973,636 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,988,773 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,489 UART: [kat] SHA2-512-ACC
908,390 UART: [kat] ECC-384
918,123 UART: [kat] HMAC-384Kdf
922,693 UART: [kat] LMS
1,171,021 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 ready_for_fw is high
1,176,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,201,074 UART: [idev] Sha1 KeyId Algorithm
1,209,476 UART: [idev] --
1,210,620 UART: [ldev] ++
1,210,788 UART: [ldev] CDI.KEYID = 6
1,211,151 UART: [ldev] SUBJECT.KEYID = 5
1,211,577 UART: [ldev] AUTHORITY.KEYID = 7
1,212,040 UART: [ldev] FE.KEYID = 1
1,217,600 UART: [ldev] Erasing FE.KEYID = 1
1,244,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,622 UART: [ldev] --
1,284,109 UART: [fwproc] Wait for Commands...
1,284,761 UART: [fwproc] Recv command 0x46574c44
1,285,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,383 >>> mbox cmd response: success
2,778,581 UART: [afmc] ++
2,778,749 UART: [afmc] CDI.KEYID = 6
2,779,111 UART: [afmc] SUBJECT.KEYID = 7
2,779,536 UART: [afmc] AUTHORITY.KEYID = 5
2,814,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,880 UART: [afmc] --
2,857,772 UART: [cold-reset] --
2,858,498 UART: [state] Locking Datavault
2,859,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,389 UART: [state] Locking ICCM
2,860,821 UART: [exit] Launching FMC @ 0x40000130
2,866,150 UART:
2,866,166 UART: Running Caliptra FMC ...
2,866,574 UART:
2,866,717 UART: [state] CFI Enabled
2,877,262 UART: [fht] FMC Alias Private Key: 7
2,984,621 UART: [art] Extend RT PCRs Done
2,985,049 UART: [art] Lock RT PCRs Done
2,986,597 UART: [art] Populate DV Done
2,994,742 UART: [fht] FMC Alias Private Key: 7
2,995,778 UART: [art] Derive CDI
2,996,058 UART: [art] Store in in slot 0x4
3,082,075 UART: [art] Derive Key Pair
3,082,435 UART: [art] Store priv key in slot 0x5
3,095,347 UART: [art] Derive Key Pair - Done
3,110,466 UART: [art] Signing Cert with AUTHO
3,110,946 UART: RITY.KEYID = 7
3,126,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,061 UART: [art] PUB.X = 9AF830A6E5B01FA0AEF14BB46D6354DD4DC838432D73A904CA58D2D5D87BE8D0317E1B2E77D3162E8EEFEED452E28682
3,133,844 UART: [art] PUB.Y = CC98041AFC08F60662D12F676FA96239F0B753FE0BCEA1A6F001AE958F7A2ADD85BBA0751337389E67FCBEB1B1AE47B5
3,140,797 UART: [art] SIG.R = DBDD98EFECC5C3864D46B84953D56E2D907C689F5E4CA957129F4F197BA0477155606BB1803B9B5AB27EEB84EBEBB3BE
3,147,585 UART: [art] SIG.S = DDA0944F372BD84CAF99DD6B543BDA8FCB5E56F8EAFF1DF938D9257144446EFCCEC2015090E4EDE181EA10BAD9D785BF
3,171,413 UART: Caliptra RT
3,171,758 UART: [state] CFI Enabled
3,279,634 UART: [rt] RT listening for mailbox commands...
3,280,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,466 UART: [rt]cmd =0x41544d4e, len=14344
3,548,505 >>> mbox cmd response data (8 bytes)
3,548,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,705 UART: [rt]cmd =0x41545348, len=116
3,600,305 >>> mbox cmd response data (12 bytes)
3,600,306 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,601,365 UART:
3,601,381 UART: Running Caliptra ROM ...
3,601,789 UART:
3,601,931 UART: [state] CFI Enabled
3,604,701 UART: [state] LifecycleState = Unprovisioned
3,605,356 UART: [state] DebugLocked = No
3,605,964 UART: [state] WD Timer not started. Device not locked for debugging
3,607,164 UART: [kat] SHA2-256
4,412,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,416,939 UART: [kat] ++
4,417,091 UART: [kat] sha1
4,421,529 UART: [kat] SHA2-256
4,423,469 UART: [kat] SHA2-384
4,426,260 UART: [kat] SHA2-512-ACC
4,428,160 UART: [kat] ECC-384
4,437,865 UART: [kat] HMAC-384Kdf
4,442,393 UART: [kat] LMS
4,690,721 UART: [kat] --
4,691,781 UART: [update-reset] ++
5,596,895 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,598,068 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,694,450 >>> mbox cmd response: success
5,694,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,694,687 UART: [update-reset] Copying MAN_2 To MAN_1
5,702,701 UART: [update-reset Success] --
5,703,850 UART: [state] Locking Datavault
5,704,498 UART: [state] Locking PCR0, PCR1 and PCR31
5,705,102 UART: [state] Locking ICCM
5,705,666 UART: [exit] Launching FMC @ 0x40000130
5,710,995 UART:
5,711,011 UART: Running Caliptra FMC ...
5,711,419 UART:
5,711,562 UART: [state] CFI Enabled
5,800,607 UART: [art] Extend RT PCRs Done
5,801,035 UART: [art] Lock RT PCRs Done
5,802,424 UART: [art] Populate DV Done
5,810,709 UART: [fht] FMC Alias Private Key: 7
5,811,685 UART: [art] Derive CDI
5,811,965 UART: [art] Store in in slot 0x4
5,897,580 UART: [art] Derive Key Pair
5,897,940 UART: [art] Store priv key in slot 0x5
5,911,222 UART: [art] Derive Key Pair - Done
5,926,094 UART: [art] Signing Cert with AUTHO
5,926,574 UART: RITY.KEYID = 7
5,941,780 UART: [art] Erasing AUTHORITY.KEYID = 7
5,942,545 UART: [art] PUB.X = 4CDC9F21B60E2E1DF9BF99E20C45521ECEC7BCE2C602AC4A8008A172833F50D1CA2331B730B0F4D2F4F16FB381DAF329
5,949,321 UART: [art] PUB.Y = 4E208917AD872499BAA5B540D5E177A18F3E21E48621D21E14EAFDCD8BB6AA56269528E890617A20BC0F8E20BAE0896C
5,956,276 UART: [art] SIG.R = A96EB9F003AFD6D3A1FD03B2A1F80B487BD2ED0491D77535D69ECA821993EFA213AEBC0405A6DCE5C3C2C7B4D06AEA1E
5,963,054 UART: [art] SIG.S = F8FABE0D36601B6CA7C41CD1A86C019501A74B84A0A21B9B793140ED6857FD3A93232F7640035C64D4AF0A7FF6D79102
5,986,963 UART: mbox::rt_entry...
5,987,335 UART: ____ _ _ _ ____ _____
5,988,119 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,988,919 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,989,687 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,990,455 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,991,223 UART: |_|
5,991,535 UART:
6,275,142 UART: [rt] Runtime listening for mailbox commands...
6,276,332 >>> mbox cmd response data (48 bytes)
6,276,333 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,279,116 >>> mbox cmd response data (48 bytes)
6,279,117 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,294,254 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,318 ready_for_fw is high
1,060,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,790 >>> mbox cmd response: success
2,691,406 UART:
2,691,422 UART: Running Caliptra FMC ...
2,691,830 UART:
2,691,973 UART: [state] CFI Enabled
2,702,576 UART: [fht] FMC Alias Private Key: 7
2,810,575 UART: [art] Extend RT PCRs Done
2,811,003 UART: [art] Lock RT PCRs Done
2,812,519 UART: [art] Populate DV Done
2,820,554 UART: [fht] FMC Alias Private Key: 7
2,821,558 UART: [art] Derive CDI
2,821,838 UART: [art] Store in in slot 0x4
2,907,329 UART: [art] Derive Key Pair
2,907,689 UART: [art] Store priv key in slot 0x5
2,920,991 UART: [art] Derive Key Pair - Done
2,935,599 UART: [art] Signing Cert with AUTHO
2,936,079 UART: RITY.KEYID = 7
2,951,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,076 UART: [art] PUB.X = 68C922B12E4C364F5A38B7B973F9D88CE0C258FCB321761881165A1E7E2C411BD1CF816E02F8205C6EFF6629374EC89F
2,958,847 UART: [art] PUB.Y = 29A2BF9BB399D28A2814BD83B81403A843F4EEB90516E2C6C41703B7B77B0EB770A65B0CB927A17B327296BB1652FF15
2,965,786 UART: [art] SIG.R = B52532C3803F196CCB23F15B7C023C239302475BE7A970C9803DE1BE6454958FE3FA7DA2EFAF716FB40B9BD6E106F36F
2,972,554 UART: [art] SIG.S = CEA83BDF3865AE99613B3E5ED3018BFE9249DD345BBB944518ED4D83A324D518C679FA9523F29F9A81D9B33001168FA5
2,996,455 UART: Caliptra RT
2,996,800 UART: [state] CFI Enabled
3,105,656 UART: [rt] RT listening for mailbox commands...
3,106,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,104 UART: [rt]cmd =0x41544d4e, len=14344
3,373,967 >>> mbox cmd response data (8 bytes)
3,373,968 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,993 UART: [rt]cmd =0x41545348, len=116
3,425,801 >>> mbox cmd response data (12 bytes)
3,425,802 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,403,227 >>> mbox cmd response: success
5,403,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,721 UART:
5,416,737 UART: Running Caliptra FMC ...
5,417,145 UART:
5,417,288 UART: [state] CFI Enabled
5,505,883 UART: [art] Extend RT PCRs Done
5,506,311 UART: [art] Lock RT PCRs Done
5,507,758 UART: [art] Populate DV Done
5,515,925 UART: [fht] FMC Alias Private Key: 7
5,517,035 UART: [art] Derive CDI
5,517,315 UART: [art] Store in in slot 0x4
5,603,234 UART: [art] Derive Key Pair
5,603,594 UART: [art] Store priv key in slot 0x5
5,616,830 UART: [art] Derive Key Pair - Done
5,631,784 UART: [art] Signing Cert with AUTHO
5,632,264 UART: RITY.KEYID = 7
5,647,354 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,119 UART: [art] PUB.X = ABA3FFF6D442D5753E219938105DF8C862CE98A209A556A120660725884DAB211A80EA2093C9F3E8C88A2B41058160EA
5,654,880 UART: [art] PUB.Y = F4AD2245F3B14F252C7658830E286CB337093825F048B67D58D47ECBD2AA2F67E743409200BCC60E6A05AA33493A6366
5,661,794 UART: [art] SIG.R = FB72CD044F32DE3D0BF4040096344ED2781779CB472B8010C1FF1D350A1E1D7A79E9D50562CB0B4C22CC0F2AD3A26331
5,668,529 UART: [art] SIG.S = C22455F0F7B6BF25B9669007D87202C3C5446E26219AC7A98980553623E8D93DC7CFA0A0A4C19248586523BD843D6929
5,692,382 UART: mbox::rt_entry...
5,692,754 UART: ____ _ _ _ ____ _____
5,693,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,874 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,642 UART: |_|
5,696,954 UART:
5,976,393 UART: [rt] Runtime listening for mailbox commands...
5,977,583 >>> mbox cmd response data (48 bytes)
5,977,584 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,980,367 >>> mbox cmd response data (48 bytes)
5,980,368 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,995,505 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,831 UART: [fht] FHT @ 0x50003400
1,172,449 UART: [idev] ++
1,172,617 UART: [idev] CDI.KEYID = 6
1,172,978 UART: [idev] SUBJECT.KEYID = 7
1,173,403 UART: [idev] UDS.KEYID = 0
1,173,749 ready_for_fw is high
1,173,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,357 UART: [idev] Sha1 KeyId Algorithm
1,207,189 UART: [idev] --
1,208,082 UART: [ldev] ++
1,208,250 UART: [ldev] CDI.KEYID = 6
1,208,614 UART: [ldev] SUBJECT.KEYID = 5
1,209,041 UART: [ldev] AUTHORITY.KEYID = 7
1,209,504 UART: [ldev] FE.KEYID = 1
1,214,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,856 UART: [ldev] --
1,280,210 UART: [fwproc] Wait for Commands...
1,280,893 UART: [fwproc] Recv command 0x46574c44
1,281,626 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,350 >>> mbox cmd response: success
2,773,521 UART: [afmc] ++
2,773,689 UART: [afmc] CDI.KEYID = 6
2,774,052 UART: [afmc] SUBJECT.KEYID = 7
2,774,478 UART: [afmc] AUTHORITY.KEYID = 5
2,809,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,706 UART: [afmc] --
2,852,624 UART: [cold-reset] --
2,853,458 UART: [state] Locking Datavault
2,854,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,079 UART: [state] Locking ICCM
2,855,661 UART: [exit] Launching FMC @ 0x40000130
2,860,990 UART:
2,861,006 UART: Running Caliptra FMC ...
2,861,414 UART:
2,861,468 UART: [state] CFI Enabled
2,871,889 UART: [fht] FMC Alias Private Key: 7
2,979,284 UART: [art] Extend RT PCRs Done
2,979,712 UART: [art] Lock RT PCRs Done
2,981,320 UART: [art] Populate DV Done
2,989,643 UART: [fht] FMC Alias Private Key: 7
2,990,811 UART: [art] Derive CDI
2,991,091 UART: [art] Store in in slot 0x4
3,076,828 UART: [art] Derive Key Pair
3,077,188 UART: [art] Store priv key in slot 0x5
3,090,018 UART: [art] Derive Key Pair - Done
3,104,962 UART: [art] Signing Cert with AUTHO
3,105,442 UART: RITY.KEYID = 7
3,120,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,315 UART: [art] PUB.X = 804C6C66B4D335D7644927A8B7BD4B4000D0CD9EC1D468B5AD98F29E026868468A1E553F6C903000DA1BD01FE371E9AA
3,128,044 UART: [art] PUB.Y = 7DC7FEF99457A94060194F54AA52B3459398321A54222BFDA2DB0209C1DC7EB002306F7F70F4789B74DC7246A7C32770
3,134,983 UART: [art] SIG.R = 73BF700928F485ED3F1B572F3F651322F833D7F45ABD9E6226DC179922B59E19012674F2D741DB649D49B506EAF54357
3,141,740 UART: [art] SIG.S = FEEE1F37494BA39A26169D06841196DF25AB4C4EC8FE1027CED3AFF8DF3B8290E495572324BF30BCB0E4C9B68E3DD6AE
3,165,268 UART: Caliptra RT
3,165,521 UART: [state] CFI Enabled
3,272,644 UART: [rt] RT listening for mailbox commands...
3,273,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,412 UART: [rt]cmd =0x41544d4e, len=14344
3,541,355 >>> mbox cmd response data (8 bytes)
3,541,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,339 UART: [rt]cmd =0x41545348, len=116
3,592,841 >>> mbox cmd response data (12 bytes)
3,592,842 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,761 UART:
3,593,777 UART: Running Caliptra ROM ...
3,594,185 UART:
3,594,240 UART: [state] CFI Enabled
3,597,220 UART: [state] LifecycleState = Unprovisioned
3,597,875 UART: [state] DebugLocked = No
3,598,369 UART: [state] WD Timer not started. Device not locked for debugging
3,599,531 UART: [kat] SHA2-256
4,403,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,407,210 UART: [kat] ++
4,407,362 UART: [kat] sha1
4,411,528 UART: [kat] SHA2-256
4,413,468 UART: [kat] SHA2-384
4,416,267 UART: [kat] SHA2-512-ACC
4,418,167 UART: [kat] ECC-384
4,428,402 UART: [kat] HMAC-384Kdf
4,432,828 UART: [kat] LMS
4,681,140 UART: [kat] --
4,681,842 UART: [update-reset] ++
5,586,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,587,798 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,684,180 >>> mbox cmd response: success
5,684,180 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,684,363 UART: [update-reset] Copying MAN_2 To MAN_1
5,692,377 UART: [update-reset Success] --
5,693,372 UART: [state] Locking Datavault
5,694,362 UART: [state] Locking PCR0, PCR1 and PCR31
5,694,966 UART: [state] Locking ICCM
5,695,564 UART: [exit] Launching FMC @ 0x40000130
5,700,893 UART:
5,700,909 UART: Running Caliptra FMC ...
5,701,317 UART:
5,701,371 UART: [state] CFI Enabled
5,790,198 UART: [art] Extend RT PCRs Done
5,790,626 UART: [art] Lock RT PCRs Done
5,791,909 UART: [art] Populate DV Done
5,800,294 UART: [fht] FMC Alias Private Key: 7
5,801,356 UART: [art] Derive CDI
5,801,636 UART: [art] Store in in slot 0x4
5,887,299 UART: [art] Derive Key Pair
5,887,659 UART: [art] Store priv key in slot 0x5
5,901,415 UART: [art] Derive Key Pair - Done
5,916,082 UART: [art] Signing Cert with AUTHO
5,916,562 UART: RITY.KEYID = 7
5,931,954 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,719 UART: [art] PUB.X = 037640982E2ECE5097E92CCAE22FC2B54D53D167F002B8EF777609100BEE910FC883B21B9B7FAA661103043471DE995E
5,939,470 UART: [art] PUB.Y = 132BC17F31C58FDE3E8A8A18CE2419181D1DA898BA4F0802006C8250B2FE44B05EF41EBC06F709FA3FFA14973441661C
5,946,394 UART: [art] SIG.R = 255627F6190669D3942E626644E39F97016979FDFC28CD47E62C0B72041BB47281EDD9C1FD7AF5A42218EE5FC6435C94
5,953,150 UART: [art] SIG.S = A0784BC62896E6D2A4261FF03EBD84F097543DC5063661FDE98D855259A763C6F16908450149F7C8FF37D521287F715A
5,976,996 UART: mbox::rt_entry...
5,977,368 UART: ____ _ _ _ ____ _____
5,978,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,980,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,981,256 UART: |_|
5,981,568 UART:
6,259,144 UART: [rt] Runtime listening for mailbox commands...
6,260,334 >>> mbox cmd response data (48 bytes)
6,260,335 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,263,118 >>> mbox cmd response data (48 bytes)
6,263,119 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,278,256 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,550 ready_for_fw is high
1,056,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,390 >>> mbox cmd response: success
2,686,146 UART:
2,686,162 UART: Running Caliptra FMC ...
2,686,570 UART:
2,686,624 UART: [state] CFI Enabled
2,696,985 UART: [fht] FMC Alias Private Key: 7
2,804,926 UART: [art] Extend RT PCRs Done
2,805,354 UART: [art] Lock RT PCRs Done
2,806,512 UART: [art] Populate DV Done
2,815,019 UART: [fht] FMC Alias Private Key: 7
2,816,153 UART: [art] Derive CDI
2,816,433 UART: [art] Store in in slot 0x4
2,901,788 UART: [art] Derive Key Pair
2,902,148 UART: [art] Store priv key in slot 0x5
2,915,440 UART: [art] Derive Key Pair - Done
2,930,170 UART: [art] Signing Cert with AUTHO
2,930,650 UART: RITY.KEYID = 7
2,945,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,703 UART: [art] PUB.X = E35DECE23AA26B636669EF180250B100F83747CEECBE09201B8FE6A8B276E0C5631745F92EC203408B3C69B59FEFC7D5
2,953,452 UART: [art] PUB.Y = AA51A56A95814AA5A2E50B29275EBD41020AC7615791EA7659E791C9C73A19A377D5EA9B5C1E7F45E954DEE29FA42C25
2,960,401 UART: [art] SIG.R = 51781DCBD7B441A0562F940469034220D7977B0A1F7DBFFE0DE7FD21A42DD2F5F69D37F751D2B914715B2DC2A8B35041
2,967,165 UART: [art] SIG.S = 6B1074F5E323FACC6FB61713D00FC7EDE916F52E12D4D2C56A274B8E2C33408425C862C2D4184FDE97ACC30902A9F17D
2,991,143 UART: Caliptra RT
2,991,396 UART: [state] CFI Enabled
3,098,533 UART: [rt] RT listening for mailbox commands...
3,099,203 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,325 UART: [rt]cmd =0x41544d4e, len=14344
3,367,030 >>> mbox cmd response data (8 bytes)
3,367,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,258 UART: [rt]cmd =0x41545348, len=116
3,418,782 >>> mbox cmd response data (12 bytes)
3,418,783 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,389,876 >>> mbox cmd response: success
5,389,876 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,403,098 UART:
5,403,114 UART: Running Caliptra FMC ...
5,403,522 UART:
5,403,576 UART: [state] CFI Enabled
5,493,021 UART: [art] Extend RT PCRs Done
5,493,449 UART: [art] Lock RT PCRs Done
5,494,338 UART: [art] Populate DV Done
5,502,421 UART: [fht] FMC Alias Private Key: 7
5,503,589 UART: [art] Derive CDI
5,503,869 UART: [art] Store in in slot 0x4
5,589,508 UART: [art] Derive Key Pair
5,589,868 UART: [art] Store priv key in slot 0x5
5,602,544 UART: [art] Derive Key Pair - Done
5,617,276 UART: [art] Signing Cert with AUTHO
5,617,756 UART: RITY.KEYID = 7
5,633,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,633,915 UART: [art] PUB.X = 44257336E93C24316F922962798212F88994EFCDFAC04B8CE07F63966F11EFF343FC456440000D98CDB6B9A25E3D602F
5,640,658 UART: [art] PUB.Y = D4469247CD92E41D9BF352ADFA0D1D31DE90FD79FB0D324C14F177B81F8F6E252FD2EE64CDF8F96A94321EB8D4FA6959
5,647,620 UART: [art] SIG.R = 03D17C3AE4FFAEBE7974A55976F488FECE880507E908B40C399B36475E15D74647616DBF43C9BB0AE4CAC8719C5A2298
5,654,380 UART: [art] SIG.S = 9BE938E0A467C04F0EFBE7A7AC4C4364753F6D0C9ECF2AB3F25B0325C5D6A5C53C6EB02C7DD348C2489CF57306321ED8
5,678,165 UART: mbox::rt_entry...
5,678,537 UART: ____ _ _ _ ____ _____
5,679,321 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,680,121 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,680,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,681,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,682,425 UART: |_|
5,682,737 UART:
5,963,793 UART: [rt] Runtime listening for mailbox commands...
5,964,983 >>> mbox cmd response data (48 bytes)
5,964,984 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,967,767 >>> mbox cmd response data (48 bytes)
5,967,768 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,982,905 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,174,580 ready_for_fw is high
1,174,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,243,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,235 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,803 >>> mbox cmd response: success
2,776,934 UART: [afmc] ++
2,777,102 UART: [afmc] CDI.KEYID = 6
2,777,465 UART: [afmc] SUBJECT.KEYID = 7
2,777,891 UART: [afmc] AUTHORITY.KEYID = 5
2,813,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,575 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,089 UART: [afmc] --
2,857,075 UART: [cold-reset] --
2,857,827 UART: [state] Locking Datavault
2,859,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,654 UART: [state] Locking ICCM
2,860,216 UART: [exit] Launching FMC @ 0x40000130
2,865,545 UART:
2,865,561 UART: Running Caliptra FMC ...
2,865,969 UART:
2,866,112 UART: [state] CFI Enabled
2,876,771 UART: [fht] FMC Alias Private Key: 7
2,984,470 UART: [art] Extend RT PCRs Done
2,984,898 UART: [art] Lock RT PCRs Done
2,986,274 UART: [art] Populate DV Done
2,994,321 UART: [fht] FMC Alias Private Key: 7
2,995,253 UART: [art] Derive CDI
2,995,533 UART: [art] Store in in slot 0x4
3,081,120 UART: [art] Derive Key Pair
3,081,480 UART: [art] Store priv key in slot 0x5
3,093,918 UART: [art] Derive Key Pair - Done
3,108,740 UART: [art] Signing Cert with AUTHO
3,109,220 UART: RITY.KEYID = 7
3,124,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,153 UART: [art] PUB.X = 61025F2721153FC1B12F479BDFFAECE99696884D50EBFAAA588BAEF30910BE56649CBA70C3C43793E043829D3D8EA567
3,131,927 UART: [art] PUB.Y = 537D3EB7E9215E2657B2F7D0D19D2514DF1CF223DF7CFABAD6C0D72A1D2AA2D98EAB23AED56EF9F801E8A11242C06607
3,138,891 UART: [art] SIG.R = BAA37DCDD349B857CE9BA5EB26E79864124A1EE424E5493185E58C6C6290572C56B93D4A4222E6F8D4128D6869B3745B
3,145,663 UART: [art] SIG.S = B011A8CBF91D3277DBA650404ACB5E284BE9A5B947574C6B7D5E5C20CF407B9B7746FB85AB13EF744BCD8CC985CC2C7C
3,169,400 UART: Caliptra RT
3,169,745 UART: [state] CFI Enabled
3,277,669 UART: [rt] RT listening for mailbox commands...
3,278,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,505 UART: [rt]cmd =0x41544d4e, len=14344
3,546,804 >>> mbox cmd response data (8 bytes)
3,546,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,972 UART: [rt]cmd =0x41545348, len=116
3,598,518 >>> mbox cmd response data (12 bytes)
3,598,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,406 UART:
3,599,422 UART: Running Caliptra ROM ...
3,599,830 UART:
3,599,972 UART: [state] CFI Enabled
3,603,000 UART: [state] LifecycleState = Unprovisioned
3,603,655 UART: [state] DebugLocked = No
3,604,221 UART: [state] WD Timer not started. Device not locked for debugging
3,605,543 UART: [kat] SHA2-256
4,409,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,413,222 UART: [kat] ++
4,413,374 UART: [kat] sha1
4,417,532 UART: [kat] SHA2-256
4,419,472 UART: [kat] SHA2-384
4,422,095 UART: [kat] SHA2-512-ACC
4,423,995 UART: [kat] ECC-384
4,433,600 UART: [kat] HMAC-384Kdf
4,438,342 UART: [kat] LMS
4,686,654 UART: [kat] --
4,687,590 UART: [update-reset] ++
5,591,809 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,592,926 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,689,308 >>> mbox cmd response: success
5,689,308 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,689,593 UART: [update-reset] Copying MAN_2 To MAN_1
5,697,607 UART: [update-reset Success] --
5,698,654 UART: [state] Locking Datavault
5,699,428 UART: [state] Locking PCR0, PCR1 and PCR31
5,700,032 UART: [state] Locking ICCM
5,700,508 UART: [exit] Launching FMC @ 0x40000130
5,705,837 UART:
5,705,853 UART: Running Caliptra FMC ...
5,706,261 UART:
5,706,404 UART: [state] CFI Enabled
5,795,273 UART: [art] Extend RT PCRs Done
5,795,701 UART: [art] Lock RT PCRs Done
5,796,990 UART: [art] Populate DV Done
5,805,289 UART: [fht] FMC Alias Private Key: 7
5,806,241 UART: [art] Derive CDI
5,806,521 UART: [art] Store in in slot 0x4
5,892,372 UART: [art] Derive Key Pair
5,892,732 UART: [art] Store priv key in slot 0x5
5,905,726 UART: [art] Derive Key Pair - Done
5,920,784 UART: [art] Signing Cert with AUTHO
5,921,264 UART: RITY.KEYID = 7
5,936,620 UART: [art] Erasing AUTHORITY.KEYID = 7
5,937,385 UART: [art] PUB.X = 970150C4DA009D6F48164CD9E9A46EB814C33C56B638C133E1C39FDB75A865DC8F26438136B591275C892CF1C05D6B42
5,944,130 UART: [art] PUB.Y = 86093148228F8B46F0B60675548921DDB8EF7D7D40081EE346718359054A37170B259FB3F5A38D9DF4D007288F74BEA1
5,951,054 UART: [art] SIG.R = C243AD3B4F36504B59222A668BA9466189335717898D9A0F05B6AEB6AA2D30FA647ABDDA53D6EACD0A1C2DD3B2357197
5,957,825 UART: [art] SIG.S = 1CA18869DE6740FB02146E351B5F66D3F13EFC31E1C094697462C0D4B9360319A07985B817D3275C5BF324F1E99A0571
5,982,027 UART: mbox::rt_entry...
5,982,399 UART: ____ _ _ _ ____ _____
5,983,183 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,983,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,984,751 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,985,519 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,287 UART: |_|
5,986,599 UART:
6,266,103 UART: [rt] Runtime listening for mailbox commands...
6,267,293 >>> mbox cmd response data (48 bytes)
6,267,294 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,270,077 >>> mbox cmd response data (48 bytes)
6,270,078 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,285,215 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,797 ready_for_fw is high
1,055,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,207 >>> mbox cmd response: success
2,686,003 UART:
2,686,019 UART: Running Caliptra FMC ...
2,686,427 UART:
2,686,570 UART: [state] CFI Enabled
2,697,153 UART: [fht] FMC Alias Private Key: 7
2,805,558 UART: [art] Extend RT PCRs Done
2,805,986 UART: [art] Lock RT PCRs Done
2,807,148 UART: [art] Populate DV Done
2,815,295 UART: [fht] FMC Alias Private Key: 7
2,816,433 UART: [art] Derive CDI
2,816,713 UART: [art] Store in in slot 0x4
2,902,060 UART: [art] Derive Key Pair
2,902,420 UART: [art] Store priv key in slot 0x5
2,915,938 UART: [art] Derive Key Pair - Done
2,930,415 UART: [art] Signing Cert with AUTHO
2,930,895 UART: RITY.KEYID = 7
2,946,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,830 UART: [art] PUB.X = C1C12F83FD4BD3746686C32BD719E863FDCDC61ADCFBAC54923D1A57DA04FDA5F4569560B78894CC795DDE7A2813971E
2,953,613 UART: [art] PUB.Y = 33FFCC541B35799D0A86CFCAE19E90FA50B778F0CE63CA04F458168BFC1896F67C68EC912059880F9C69C32C42565E20
2,960,560 UART: [art] SIG.R = A0665F37ABC5992F9138709D205C8927443EE7919B04BC6C201CFB516ADD3E6737DA3DE85616E5F4E86DFE084B2003FB
2,967,327 UART: [art] SIG.S = 5945C11BCA472E7610E5AC5BAF6BE5CE89696E7228221504C368B75ABFEA3DC8950F97D06BC1132D860043B64CEE9073
2,990,918 UART: Caliptra RT
2,991,263 UART: [state] CFI Enabled
3,099,478 UART: [rt] RT listening for mailbox commands...
3,100,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,122 UART: [rt]cmd =0x41544d4e, len=14344
3,368,549 >>> mbox cmd response data (8 bytes)
3,368,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,721 UART: [rt]cmd =0x41545348, len=116
3,418,865 >>> mbox cmd response data (12 bytes)
3,418,866 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,392,708 >>> mbox cmd response: success
5,392,708 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,405,662 UART:
5,405,678 UART: Running Caliptra FMC ...
5,406,086 UART:
5,406,229 UART: [state] CFI Enabled
5,495,626 UART: [art] Extend RT PCRs Done
5,496,054 UART: [art] Lock RT PCRs Done
5,497,185 UART: [art] Populate DV Done
5,505,286 UART: [fht] FMC Alias Private Key: 7
5,506,416 UART: [art] Derive CDI
5,506,696 UART: [art] Store in in slot 0x4
5,592,501 UART: [art] Derive Key Pair
5,592,861 UART: [art] Store priv key in slot 0x5
5,606,257 UART: [art] Derive Key Pair - Done
5,621,194 UART: [art] Signing Cert with AUTHO
5,621,674 UART: RITY.KEYID = 7
5,637,056 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,821 UART: [art] PUB.X = 1B0CB270514C685C7B11823D869FA5D787E178A30FE6D3F63A340E91AF73A38E5C3510C937468F6D26A11C579E22A3CB
5,644,584 UART: [art] PUB.Y = 9ED047CF5E0B2AB3AAFF33784305F42CC95A2A9B702C7591D7C894986DF8D32B699448F2053C5AA62CBF50B2FD9FB850
5,651,537 UART: [art] SIG.R = 0B80BEDEBF260919E9A5494B3DB771CC2372AD86A2D0409F0FF0B6B89E9E320872A6798ACB0D9C8AB372264484A1DFD1
5,658,304 UART: [art] SIG.S = 17CC5623176CDFE3787C77F2289C60E78547025F881AFBB0E21E36C50DE774DD5D95B08F37B7CA61F46EF2D466C22914
5,681,707 UART: mbox::rt_entry...
5,682,079 UART: ____ _ _ _ ____ _____
5,682,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,683,663 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,684,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,685,199 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,685,967 UART: |_|
5,686,279 UART:
5,967,923 UART: [rt] Runtime listening for mailbox commands...
5,969,113 >>> mbox cmd response data (48 bytes)
5,969,114 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,971,897 >>> mbox cmd response data (48 bytes)
5,971,898 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,987,035 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
191,954 UART:
192,315 UART: Running Caliptra ROM ...
193,447 UART:
193,591 UART: [state] CFI Enabled
266,086 UART: [state] LifecycleState = Unprovisioned
268,075 UART: [state] DebugLocked = No
269,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,831 UART: [kat] SHA2-256
443,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,977 UART: [kat] ++
454,582 UART: [kat] sha1
465,958 UART: [kat] SHA2-256
468,607 UART: [kat] SHA2-384
474,874 UART: [kat] SHA2-512-ACC
477,243 UART: [kat] ECC-384
2,768,343 UART: [kat] HMAC-384Kdf
2,799,253 UART: [kat] LMS
3,989,546 UART: [kat] --
3,992,298 UART: [cold-reset] ++
3,993,375 UART: [fht] Storing FHT @ 0x50003400
4,004,638 UART: [idev] ++
4,005,219 UART: [idev] CDI.KEYID = 6
4,006,111 UART: [idev] SUBJECT.KEYID = 7
4,007,356 UART: [idev] UDS.KEYID = 0
4,008,324 ready_for_fw is high
4,008,522 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,058 UART: [idev] Erasing UDS.KEYID = 0
7,345,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,793 UART: [idev] --
7,371,833 UART: [ldev] ++
7,372,396 UART: [ldev] CDI.KEYID = 6
7,373,331 UART: [ldev] SUBJECT.KEYID = 5
7,374,594 UART: [ldev] AUTHORITY.KEYID = 7
7,375,750 UART: [ldev] FE.KEYID = 1
7,420,360 UART: [ldev] Erasing FE.KEYID = 1
10,753,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,661 UART: [ldev] --
13,115,203 UART: [fwproc] Waiting for Commands...
13,118,267 UART: [fwproc] Received command 0x46574c44
13,120,445 UART: [fwproc] Received Image of size 114124 bytes
17,174,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,642,777 >>> mbox cmd response: success
17,646,578 UART: [afmc] ++
17,647,175 UART: [afmc] CDI.KEYID = 6
17,648,106 UART: [afmc] SUBJECT.KEYID = 7
17,649,324 UART: [afmc] AUTHORITY.KEYID = 5
21,005,517 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,168 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,633 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,395 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,880 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,347 UART: [afmc] --
23,376,027 UART: [cold-reset] --
23,380,325 UART: [state] Locking Datavault
23,384,877 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,630 UART: [state] Locking ICCM
23,388,240 UART: [exit] Launching FMC @ 0x40000130
23,396,639 UART:
23,396,877 UART: Running Caliptra FMC ...
23,397,997 UART:
23,398,158 UART: [state] CFI Enabled
23,465,698 UART: [fht] FMC Alias Private Key: 7
25,803,054 UART: [art] Extend RT PCRs Done
25,804,269 UART: [art] Lock RT PCRs Done
25,806,029 UART: [art] Populate DV Done
25,811,383 UART: [fht] FMC Alias Private Key: 7
25,812,971 UART: [art] Derive CDI
25,813,711 UART: [art] Store in in slot 0x4
25,874,524 UART: [art] Derive Key Pair
25,875,521 UART: [art] Store priv key in slot 0x5
29,168,975 UART: [art] Derive Key Pair - Done
29,181,757 UART: [art] Signing Cert with AUTHO
29,183,064 UART: RITY.KEYID = 7
31,470,521 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,029 UART: [art] PUB.X = C5C27971D716BFBAA4D30B8F67916514A453889D420E5115A68B48DC988579C0CA5A226A6F50AF8D9D516AE1EF678579
31,479,266 UART: [art] PUB.Y = F1996A1CF1F628CDB8359A9753E72CD273A1C07F42AD27DE642F5A5D67ABC8A1BA19DCCD287ABD2852EFBCA0506EC1C1
31,486,542 UART: [art] SIG.R = B227F98A77AE0BF7F843B8BDD57A8C29C84B7A0BBE3BA5BFDE93825447140AF9C7171C909AE8007E61AFC1E2C38DC427
31,493,900 UART: [art] SIG.S = A4521964B017483281B184816F63477E40AE5C600D8C32847DC31DE78F07380D0DDAC3BCA9786FEFF45C40E0094BDCB9
32,799,417 UART: Caliptra RT
32,800,138 UART: [state] CFI Enabled
32,962,238 UART: [rt] RT listening for mailbox commands...
37,141,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,297,604 UART: [rt]cmd =0x41544d4e, len=14344
42,533,154 >>> mbox cmd response data (8 bytes)
42,533,730 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,564,373 UART: [rt]cmd =0x41545348, len=116
42,584,507 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,784,730 ready_for_fw is high
3,785,347 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,164 >>> mbox cmd response: success
23,566,773 UART:
23,567,157 UART: Running Caliptra FMC ...
23,568,310 UART:
23,568,473 UART: [state] CFI Enabled
23,636,992 UART: [fht] FMC Alias Private Key: 7
25,975,943 UART: [art] Extend RT PCRs Done
25,977,180 UART: [art] Lock RT PCRs Done
25,978,964 UART: [art] Populate DV Done
25,984,280 UART: [fht] FMC Alias Private Key: 7
25,985,776 UART: [art] Derive CDI
25,986,513 UART: [art] Store in in slot 0x4
26,046,062 UART: [art] Derive Key Pair
26,047,111 UART: [art] Store priv key in slot 0x5
29,340,082 UART: [art] Derive Key Pair - Done
29,353,139 UART: [art] Signing Cert with AUTHO
29,354,448 UART: RITY.KEYID = 7
31,640,587 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,092 UART: [art] PUB.X = F50DEED79639703F2D454BCE306580EEF4FA695E6F23F463E1B4E960145AA79EBA24A9BDFAC83B0F31BB4B7461C507FD
31,649,364 UART: [art] PUB.Y = 881B41D0621EE5CFF64C0E31AEC495B5B5AD9092E3259A322300FFA43D5D16C76AF420175877BA41FCF4D90444E1489C
31,656,608 UART: [art] SIG.R = 8900914CB02300DD6604A77372FD42BC8A75DB53D84C2FBCAC9AE09C0D2C9FBEC24390B4C84BE150E18B032B66C6136D
31,663,957 UART: [art] SIG.S = E72889E5820EDE29FDDBE7F00C10C5BFB033678C712D81EC754B28CEBDC2B05337FAC5D4C4433F83ED0558CC822C1E67
32,968,965 UART: Caliptra RT
32,969,664 UART: [state] CFI Enabled
33,129,453 UART: [rt] RT listening for mailbox commands...
37,302,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,457,645 UART: [rt]cmd =0x41544d4e, len=14344
42,693,428 >>> mbox cmd response data (8 bytes)
42,694,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,724,691 UART: [rt]cmd =0x41545348, len=116
42,744,083 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,283 UART:
192,651 UART: Running Caliptra ROM ...
193,841 UART:
603,552 UART: [state] CFI Enabled
618,100 UART: [state] LifecycleState = Unprovisioned
620,048 UART: [state] DebugLocked = No
621,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,285 UART: [kat] SHA2-256
797,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,604 UART: [kat] ++
808,080 UART: [kat] sha1
818,029 UART: [kat] SHA2-256
820,762 UART: [kat] SHA2-384
825,611 UART: [kat] SHA2-512-ACC
827,975 UART: [kat] ECC-384
3,111,835 UART: [kat] HMAC-384Kdf
3,124,940 UART: [kat] LMS
4,315,069 UART: [kat] --
4,320,385 UART: [cold-reset] ++
4,323,027 UART: [fht] Storing FHT @ 0x50003400
4,334,455 UART: [idev] ++
4,335,097 UART: [idev] CDI.KEYID = 6
4,335,981 UART: [idev] SUBJECT.KEYID = 7
4,337,220 UART: [idev] UDS.KEYID = 0
4,338,208 ready_for_fw is high
4,338,416 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,820 UART: [idev] Erasing UDS.KEYID = 0
7,625,169 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,219 UART: [idev] --
7,652,495 UART: [ldev] ++
7,653,068 UART: [ldev] CDI.KEYID = 6
7,654,035 UART: [ldev] SUBJECT.KEYID = 5
7,655,245 UART: [ldev] AUTHORITY.KEYID = 7
7,656,468 UART: [ldev] FE.KEYID = 1
7,668,563 UART: [ldev] Erasing FE.KEYID = 1
10,956,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,569 UART: [ldev] --
13,316,984 UART: [fwproc] Waiting for Commands...
13,319,236 UART: [fwproc] Received command 0x46574c44
13,321,412 UART: [fwproc] Received Image of size 114124 bytes
17,374,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,002 >>> mbox cmd response: success
17,841,846 UART: [afmc] ++
17,842,457 UART: [afmc] CDI.KEYID = 6
17,843,366 UART: [afmc] SUBJECT.KEYID = 7
17,844,696 UART: [afmc] AUTHORITY.KEYID = 5
21,161,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,722 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,092 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,933 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,345 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,649 UART: [afmc] --
23,523,591 UART: [cold-reset] --
23,526,211 UART: [state] Locking Datavault
23,532,745 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,495 UART: [state] Locking ICCM
23,537,179 UART: [exit] Launching FMC @ 0x40000130
23,545,571 UART:
23,545,807 UART: Running Caliptra FMC ...
23,546,904 UART:
23,547,062 UART: [state] CFI Enabled
23,555,084 UART: [fht] FMC Alias Private Key: 7
25,885,756 UART: [art] Extend RT PCRs Done
25,886,988 UART: [art] Lock RT PCRs Done
25,888,695 UART: [art] Populate DV Done
25,894,052 UART: [fht] FMC Alias Private Key: 7
25,895,704 UART: [art] Derive CDI
25,896,435 UART: [art] Store in in slot 0x4
25,939,177 UART: [art] Derive Key Pair
25,940,170 UART: [art] Store priv key in slot 0x5
29,182,705 UART: [art] Derive Key Pair - Done
29,195,496 UART: [art] Signing Cert with AUTHO
29,196,797 UART: RITY.KEYID = 7
31,476,436 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,942 UART: [art] PUB.X = 187FFE45CB10BB64CF6688F37CE8C2378DE3020FD80399E7CD4507189FF83757B49DE4716527FAFE0B0D7BE19FA4B412
31,485,168 UART: [art] PUB.Y = 8F42CE2FAFDA6B92FA4032B5DDCA384A63EE2A16AC29F328A700B3428A37681CAC80D986F3B1DDAD2940E1CA2FE3DDC4
31,492,442 UART: [art] SIG.R = A801C390650F66E9AF6E659889A484CE5B555E868D491743FC0B1ABDBA8748F034F5943F473A0BC784B3D63FA363B24C
31,499,838 UART: [art] SIG.S = C47578C8D315FF2D565D8C9487738E68C1CD186A04F73D4B01A5825637ABC8A2FBD1AEB6B39F755C8A3AE0410AC14427
32,805,270 UART: Caliptra RT
32,805,998 UART: [state] CFI Enabled
32,923,351 UART: [rt] RT listening for mailbox commands...
36,943,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,099,476 UART: [rt]cmd =0x41544d4e, len=14344
42,334,818 >>> mbox cmd response data (8 bytes)
42,335,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,366,157 UART: [rt]cmd =0x41545348, len=116
42,386,124 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,126,698 ready_for_fw is high
4,127,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,021 >>> mbox cmd response: success
23,716,695 UART:
23,717,097 UART: Running Caliptra FMC ...
23,718,206 UART:
23,718,353 UART: [state] CFI Enabled
23,726,252 UART: [fht] FMC Alias Private Key: 7
26,056,129 UART: [art] Extend RT PCRs Done
26,057,367 UART: [art] Lock RT PCRs Done
26,059,348 UART: [art] Populate DV Done
26,064,609 UART: [fht] FMC Alias Private Key: 7
26,066,207 UART: [art] Derive CDI
26,067,022 UART: [art] Store in in slot 0x4
26,109,685 UART: [art] Derive Key Pair
26,110,724 UART: [art] Store priv key in slot 0x5
29,352,526 UART: [art] Derive Key Pair - Done
29,365,602 UART: [art] Signing Cert with AUTHO
29,366,905 UART: RITY.KEYID = 7
31,646,018 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,533 UART: [art] PUB.X = C024007EEBA5261D848BC93AB93BE3DF0024E3BFCD86A9DC24D256903EB4A61E69B7FA062952F9761688114AC73C8B5B
31,654,772 UART: [art] PUB.Y = B67B370F37B71824FCC5F61E98639688F2FF362F6C50B831F80B5ED2842604212D809BDECD6ABE3DC3407BD4FF48EEF0
31,662,050 UART: [art] SIG.R = E80B8A71DA5BEC3D4D1E8EF061E7956ADCFDE782687324B8A1DFC9BD8173D6F49977468AB3404FC852EAECF34D51962B
31,669,407 UART: [art] SIG.S = C85AF280FF25DCD61C6E21516548B9CA40D9D28FC448B2903BE02C148F21CAD1824B6B1CB73727787C9CB800E0A7EE1F
32,974,656 UART: Caliptra RT
32,975,374 UART: [state] CFI Enabled
33,093,159 UART: [rt] RT listening for mailbox commands...
37,111,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,321 UART: [rt]cmd =0x41544d4e, len=14344
42,503,532 >>> mbox cmd response data (8 bytes)
42,504,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,535,076 UART: [rt]cmd =0x41545348, len=116
42,554,203 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,322 UART:
192,671 UART: Running Caliptra ROM ...
193,866 UART:
194,021 UART: [state] CFI Enabled
260,901 UART: [state] LifecycleState = Unprovisioned
262,736 UART: [state] DebugLocked = No
265,634 UART: [state] WD Timer not started. Device not locked for debugging
270,020 UART: [kat] SHA2-256
449,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,712 UART: [kat] ++
461,247 UART: [kat] sha1
471,916 UART: [kat] SHA2-256
474,995 UART: [kat] SHA2-384
480,339 UART: [kat] SHA2-512-ACC
483,343 UART: [kat] ECC-384
2,947,042 UART: [kat] HMAC-384Kdf
2,969,654 UART: [kat] LMS
3,499,100 UART: [kat] --
3,502,945 UART: [cold-reset] ++
3,503,738 UART: [fht] FHT @ 0x50003400
3,513,935 UART: [idev] ++
3,514,505 UART: [idev] CDI.KEYID = 6
3,515,440 UART: [idev] SUBJECT.KEYID = 7
3,516,612 UART: [idev] UDS.KEYID = 0
3,517,661 ready_for_fw is high
3,517,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,779 UART: [idev] Erasing UDS.KEYID = 0
6,024,683 UART: [idev] Sha1 KeyId Algorithm
6,048,446 UART: [idev] --
6,051,356 UART: [ldev] ++
6,051,938 UART: [ldev] CDI.KEYID = 6
6,052,852 UART: [ldev] SUBJECT.KEYID = 5
6,054,067 UART: [ldev] AUTHORITY.KEYID = 7
6,055,358 UART: [ldev] FE.KEYID = 1
6,100,424 UART: [ldev] Erasing FE.KEYID = 1
8,603,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,618 UART: [ldev] --
10,391,513 UART: [fwproc] Wait for Commands...
10,394,749 UART: [fwproc] Recv command 0x46574c44
10,396,845 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,238 >>> mbox cmd response: success
14,261,019 UART: [afmc] ++
14,261,618 UART: [afmc] CDI.KEYID = 6
14,262,530 UART: [afmc] SUBJECT.KEYID = 7
14,263,694 UART: [afmc] AUTHORITY.KEYID = 5
16,786,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,585,403 UART: [afmc] --
18,588,774 UART: [cold-reset] --
18,591,983 UART: [state] Locking Datavault
18,597,664 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,362 UART: [state] Locking ICCM
18,601,116 UART: [exit] Launching FMC @ 0x40000130
18,609,508 UART:
18,609,741 UART: Running Caliptra FMC ...
18,610,835 UART:
18,610,991 UART: [state] CFI Enabled
18,670,178 UART: [fht] FMC Alias Private Key: 7
20,433,941 UART: [art] Extend RT PCRs Done
20,435,159 UART: [art] Lock RT PCRs Done
20,436,834 UART: [art] Populate DV Done
20,442,144 UART: [fht] FMC Alias Private Key: 7
20,443,841 UART: [art] Derive CDI
20,444,655 UART: [art] Store in in slot 0x4
20,502,456 UART: [art] Derive Key Pair
20,503,492 UART: [art] Store priv key in slot 0x5
22,966,083 UART: [art] Derive Key Pair - Done
22,978,918 UART: [art] Signing Cert with AUTHO
22,980,221 UART: RITY.KEYID = 7
24,692,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,133 UART: [art] PUB.X = A7304BC57F470C40914BB74C0ABFC6C70BBE6E06594835A8EE9FEC9514A22EF7B9D99C266122F478D9D92ADEE2D65EDD
24,701,489 UART: [art] PUB.Y = 5A9EFE018D22884FC9DE8B959EF8742F96629A553CE41B44F29A1BEBEFB8E0A98B450514A30B8C09BE54E2A652ADEB0E
24,708,733 UART: [art] SIG.R = 2F6DCD8B763BE93B48F403C2F6E389923CF857D5736E735167A835152C2AC584422725BE7C3CF4DF6720CAC8959E6823
24,716,138 UART: [art] SIG.S = 4741073B232B62226A61F4EA9B8DDAB681395557B0D5D9D3877777CD834A5353205BAB339D919F8FDE90696D084C7125
25,695,295 UART: Caliptra RT
25,696,018 UART: [state] CFI Enabled
25,860,088 UART: [rt] RT listening for mailbox commands...
29,893,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,049,529 UART: [rt]cmd =0x41544d4e, len=14344
33,979,971 >>> mbox cmd response data (8 bytes)
33,980,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,011,008 UART: [rt]cmd =0x41545348, len=116
34,030,880 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,380,297 ready_for_fw is high
3,380,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,112 >>> mbox cmd response: success
18,366,938 UART:
18,367,328 UART: Running Caliptra FMC ...
18,368,595 UART:
18,368,760 UART: [state] CFI Enabled
18,434,442 UART: [fht] FMC Alias Private Key: 7
20,198,262 UART: [art] Extend RT PCRs Done
20,199,479 UART: [art] Lock RT PCRs Done
20,201,215 UART: [art] Populate DV Done
20,206,251 UART: [fht] FMC Alias Private Key: 7
20,207,899 UART: [art] Derive CDI
20,208,945 UART: [art] Store in in slot 0x4
20,267,090 UART: [art] Derive Key Pair
20,268,088 UART: [art] Store priv key in slot 0x5
22,731,100 UART: [art] Derive Key Pair - Done
22,744,319 UART: [art] Signing Cert with AUTHO
22,745,619 UART: RITY.KEYID = 7
24,458,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,601 UART: [art] PUB.X = CDBA6DD7446613167AF7D15023154A957133AF6293E7780B11FF18B03245269BC3809014561F484305DC2D1143B85A0E
24,466,801 UART: [art] PUB.Y = 0A0D249FDC4D4B80B4258E9855A88B4CEAE63D45EB4AB766D7FE627CF57C9BCC08B366D9904A90AE2697E2E7E7A61E5C
24,474,088 UART: [art] SIG.R = CDADBB894E590362B37331A46CEBFB7725575138BC6776C51E22600D5E0018C138C2D3CD80B64969CEF98F09050BF546
24,481,490 UART: [art] SIG.S = F5E1253ACA35F1048DFF587F3445FC4B7252490BA091FB8A92F638ED87687A2CEB37D90E758DF0F4CCC1F30C30FD0354
25,460,749 UART: Caliptra RT
25,461,449 UART: [state] CFI Enabled
25,625,389 UART: [rt] RT listening for mailbox commands...
29,681,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,837,969 UART: [rt]cmd =0x41544d4e, len=14344
33,768,756 >>> mbox cmd response data (8 bytes)
33,769,361 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,800,098 UART: [rt]cmd =0x41545348, len=116
33,819,056 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,190 UART:
192,594 UART: Running Caliptra ROM ...
193,791 UART:
603,342 UART: [state] CFI Enabled
618,281 UART: [state] LifecycleState = Unprovisioned
620,149 UART: [state] DebugLocked = No
622,087 UART: [state] WD Timer not started. Device not locked for debugging
625,480 UART: [kat] SHA2-256
804,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,153 UART: [kat] ++
816,594 UART: [kat] sha1
828,450 UART: [kat] SHA2-256
831,447 UART: [kat] SHA2-384
837,995 UART: [kat] SHA2-512-ACC
840,950 UART: [kat] ECC-384
3,283,104 UART: [kat] HMAC-384Kdf
3,295,194 UART: [kat] LMS
3,824,716 UART: [kat] --
3,828,648 UART: [cold-reset] ++
3,830,313 UART: [fht] FHT @ 0x50003400
3,842,063 UART: [idev] ++
3,842,628 UART: [idev] CDI.KEYID = 6
3,843,647 UART: [idev] SUBJECT.KEYID = 7
3,844,735 UART: [idev] UDS.KEYID = 0
3,845,773 ready_for_fw is high
3,845,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,683 UART: [idev] Erasing UDS.KEYID = 0
6,318,404 UART: [idev] Sha1 KeyId Algorithm
6,342,657 UART: [idev] --
6,346,534 UART: [ldev] ++
6,347,099 UART: [ldev] CDI.KEYID = 6
6,348,007 UART: [ldev] SUBJECT.KEYID = 5
6,349,214 UART: [ldev] AUTHORITY.KEYID = 7
6,350,434 UART: [ldev] FE.KEYID = 1
6,359,776 UART: [ldev] Erasing FE.KEYID = 1
8,831,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,532 UART: [ldev] --
10,620,930 UART: [fwproc] Wait for Commands...
10,623,715 UART: [fwproc] Recv command 0x46574c44
10,625,795 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,784 >>> mbox cmd response: success
14,488,286 UART: [afmc] ++
14,488,880 UART: [afmc] CDI.KEYID = 6
14,489,759 UART: [afmc] SUBJECT.KEYID = 7
14,490,988 UART: [afmc] AUTHORITY.KEYID = 5
16,991,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,414 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,575 UART: [afmc] --
18,786,811 UART: [cold-reset] --
18,791,589 UART: [state] Locking Datavault
18,796,554 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,190 UART: [state] Locking ICCM
18,800,585 UART: [exit] Launching FMC @ 0x40000130
18,808,972 UART:
18,809,207 UART: Running Caliptra FMC ...
18,810,299 UART:
18,810,469 UART: [state] CFI Enabled
18,818,565 UART: [fht] FMC Alias Private Key: 7
20,575,247 UART: [art] Extend RT PCRs Done
20,576,463 UART: [art] Lock RT PCRs Done
20,578,265 UART: [art] Populate DV Done
20,583,720 UART: [fht] FMC Alias Private Key: 7
20,585,246 UART: [art] Derive CDI
20,585,972 UART: [art] Store in in slot 0x4
20,629,040 UART: [art] Derive Key Pair
20,630,077 UART: [art] Store priv key in slot 0x5
23,056,770 UART: [art] Derive Key Pair - Done
23,070,026 UART: [art] Signing Cert with AUTHO
23,071,328 UART: RITY.KEYID = 7
24,776,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,086 UART: [art] PUB.X = 0ACB08F40C7D39E65E390B5393963946C7B14C1F11B66D0B5FB1B37A71FC449EAEB86274E80F3AF7E9632580B9A8DDD7
24,785,427 UART: [art] PUB.Y = 4847DBB692D9A095ACB1230B603900C66D0F0DFE51BA9B643166ADA7325213EFC9EE744FA6624BDF17088995DE1E318B
24,792,651 UART: [art] SIG.R = D2511534E41FEC38227A111BB087FF3D4A98A7D41F603783CBA882F34D86F1866319D8564B36F802D5EB20FE47906DE2
24,800,036 UART: [art] SIG.S = A13F588C739F32A2258E7B1BEEA893C1711FF976B8A95591E1BB655D656A9492496828246EC17269A5D66366572738F1
25,778,477 UART: Caliptra RT
25,779,171 UART: [state] CFI Enabled
25,896,509 UART: [rt] RT listening for mailbox commands...
29,917,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,073,258 UART: [rt]cmd =0x41544d4e, len=14344
34,003,999 >>> mbox cmd response data (8 bytes)
34,004,591 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,035,159 UART: [rt]cmd =0x41545348, len=116
34,054,447 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,702,068 ready_for_fw is high
3,702,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,674 >>> mbox cmd response: success
18,525,556 UART:
18,525,945 UART: Running Caliptra FMC ...
18,527,123 UART:
18,527,278 UART: [state] CFI Enabled
18,534,822 UART: [fht] FMC Alias Private Key: 7
20,291,721 UART: [art] Extend RT PCRs Done
20,292,951 UART: [art] Lock RT PCRs Done
20,294,619 UART: [art] Populate DV Done
20,300,303 UART: [fht] FMC Alias Private Key: 7
20,301,790 UART: [art] Derive CDI
20,302,523 UART: [art] Store in in slot 0x4
20,344,891 UART: [art] Derive Key Pair
20,345,886 UART: [art] Store priv key in slot 0x5
22,772,637 UART: [art] Derive Key Pair - Done
22,785,550 UART: [art] Signing Cert with AUTHO
22,786,858 UART: RITY.KEYID = 7
24,492,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,834 UART: [art] PUB.X = 369B131B1268A24F4E8F48F8C64EEFB78D216E2F12824218AF2C75A378F86855D05F641E5950A9F296A792D540202048
24,501,122 UART: [art] PUB.Y = FA5936693F78EE3EF7AA953AE4BE87D1E8E8229627373B7A79911B73A558F2D8009FF85A15080B4C4B3F7146ED3C8F14
24,508,347 UART: [art] SIG.R = 5C1F34FFCDC015C97FA6D33E67278FE929DA373650847AC60CE7E6B56FEA4E04C3EA5DE895CD35262430AEF55ACED2DE
24,515,775 UART: [art] SIG.S = 4269F14AF5A6B4268D32E214445F41A30297834833F48CB59D3D3645C60A6B5127A17BF2162999C7DB789F2083A37ED7
25,495,034 UART: Caliptra RT
25,495,736 UART: [state] CFI Enabled
25,612,382 UART: [rt] RT listening for mailbox commands...
29,645,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,802,673 UART: [rt]cmd =0x41544d4e, len=14344
33,732,917 >>> mbox cmd response data (8 bytes)
33,734,384 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,764,988 UART: [rt]cmd =0x41545348, len=116
33,783,751 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
192,069 UART:
192,453 UART: Running Caliptra ROM ...
193,665 UART:
193,821 UART: [state] CFI Enabled
266,388 UART: [state] LifecycleState = Unprovisioned
268,793 UART: [state] DebugLocked = No
270,682 UART: [state] WD Timer not started. Device not locked for debugging
274,851 UART: [kat] SHA2-256
464,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,489 UART: [kat] ++
475,938 UART: [kat] sha1
488,446 UART: [kat] SHA2-256
491,456 UART: [kat] SHA2-384
496,592 UART: [kat] SHA2-512-ACC
499,170 UART: [kat] ECC-384
2,948,271 UART: [kat] HMAC-384Kdf
2,972,718 UART: [kat] LMS
3,504,545 UART: [kat] --
3,509,924 UART: [cold-reset] ++
3,510,797 UART: [fht] FHT @ 0x50003400
3,521,979 UART: [idev] ++
3,522,681 UART: [idev] CDI.KEYID = 6
3,523,564 UART: [idev] SUBJECT.KEYID = 7
3,524,805 UART: [idev] UDS.KEYID = 0
3,525,705 ready_for_fw is high
3,525,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,852 UART: [idev] Erasing UDS.KEYID = 0
6,028,887 UART: [idev] Sha1 KeyId Algorithm
6,051,724 UART: [idev] --
6,058,017 UART: [ldev] ++
6,058,706 UART: [ldev] CDI.KEYID = 6
6,059,623 UART: [ldev] SUBJECT.KEYID = 5
6,060,785 UART: [ldev] AUTHORITY.KEYID = 7
6,061,961 UART: [ldev] FE.KEYID = 1
6,100,288 UART: [ldev] Erasing FE.KEYID = 1
8,608,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,154 UART: [ldev] --
10,411,985 UART: [fwproc] Wait for Commands...
10,413,590 UART: [fwproc] Recv command 0x46574c44
10,415,896 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,072 >>> mbox cmd response: success
14,610,113 UART: [afmc] ++
14,610,823 UART: [afmc] CDI.KEYID = 6
14,612,080 UART: [afmc] SUBJECT.KEYID = 7
14,613,517 UART: [afmc] AUTHORITY.KEYID = 5
17,150,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,111 UART: [afmc] --
18,948,800 UART: [cold-reset] --
18,952,232 UART: [state] Locking Datavault
18,957,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,994 UART: [state] Locking ICCM
18,962,184 UART: [exit] Launching FMC @ 0x40000130
18,970,860 UART:
18,971,090 UART: Running Caliptra FMC ...
18,972,149 UART:
18,972,300 UART: [state] CFI Enabled
19,030,830 UART: [fht] FMC Alias Private Key: 7
20,795,270 UART: [art] Extend RT PCRs Done
20,796,485 UART: [art] Lock RT PCRs Done
20,798,135 UART: [art] Populate DV Done
20,803,650 UART: [fht] FMC Alias Private Key: 7
20,805,185 UART: [art] Derive CDI
20,805,945 UART: [art] Store in in slot 0x4
20,863,744 UART: [art] Derive Key Pair
20,864,780 UART: [art] Store priv key in slot 0x5
23,328,050 UART: [art] Derive Key Pair - Done
23,341,312 UART: [art] Signing Cert with AUTHO
23,342,610 UART: RITY.KEYID = 7
25,053,945 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,438 UART: [art] PUB.X = ECDCE132F683387A45972EA41D629EE97B40314C8D7406AD429493AA3AE5B383550114B53301EF02AE57B53101099570
25,062,757 UART: [art] PUB.Y = 5888BCBA51F85F4AC6D92CF87A9B801DC4C07D18567E739DD2AD84E195FB467B3447CB9389223D2F3AA7A1ACD3D912E6
25,069,996 UART: [art] SIG.R = FFBA443EF071828DB9BFF5A7F306923BCE11B41A5E1369082510494B662368B859C5A399AD40EC81678DE961DD16C3B3
25,077,386 UART: [art] SIG.S = 78EFEA844810E3EFD6CF6171BEFA7585540C7069086222230312E99A1892D191A50791302FC47C264992B5F0915CD8B9
26,056,755 UART: Caliptra RT
26,057,462 UART: [state] CFI Enabled
26,222,970 UART: [rt] RT listening for mailbox commands...
30,266,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,422,770 UART: [rt]cmd =0x41544d4e, len=14344
34,353,033 >>> mbox cmd response data (8 bytes)
34,353,593 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,384,284 UART: [rt]cmd =0x41545348, len=116
34,403,794 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,439,316 ready_for_fw is high
3,439,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,872 >>> mbox cmd response: success
19,026,668 UART:
19,027,057 UART: Running Caliptra FMC ...
19,028,169 UART:
19,028,324 UART: [state] CFI Enabled
19,096,540 UART: [fht] FMC Alias Private Key: 7
20,860,289 UART: [art] Extend RT PCRs Done
20,861,505 UART: [art] Lock RT PCRs Done
20,863,321 UART: [art] Populate DV Done
20,868,830 UART: [fht] FMC Alias Private Key: 7
20,870,428 UART: [art] Derive CDI
20,871,170 UART: [art] Store in in slot 0x4
20,929,626 UART: [art] Derive Key Pair
20,930,671 UART: [art] Store priv key in slot 0x5
23,393,758 UART: [art] Derive Key Pair - Done
23,406,821 UART: [art] Signing Cert with AUTHO
23,408,132 UART: RITY.KEYID = 7
25,119,233 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,744 UART: [art] PUB.X = 51000339DB00597A70D86A594C4C6079A703F20E3472547F86B0A2D459C2DFCECDEC136B0A4B40AE338D8FFDD520E449
25,127,998 UART: [art] PUB.Y = 8698122FEF8F812A60C32402938C0186F51793001A98DD4758BCC6F8C82802E19013C148181CD552660FCAA72CF4D9B7
25,135,193 UART: [art] SIG.R = C871BE59F5D27230BA57B320E980D233BC0AAF2DF7188C5F1E25BA111E0EFA7B6973E01A7AC119A7877CDA21E6C00EEF
25,142,734 UART: [art] SIG.S = E4F92A481039B9CF3187CCD9A1118FF58B1B8102EB6FCB5A1D2D9086C3F218AD3000369B91EBFA11B0D93E72F90B88B9
26,121,511 UART: Caliptra RT
26,122,194 UART: [state] CFI Enabled
26,287,579 UART: [rt] RT listening for mailbox commands...
30,322,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,478,845 UART: [rt]cmd =0x41544d4e, len=14344
34,409,027 >>> mbox cmd response data (8 bytes)
34,409,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,440,312 UART: [rt]cmd =0x41545348, len=116
34,459,394 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,376 UART:
192,805 UART: Running Caliptra ROM ...
193,935 UART:
603,573 UART: [state] CFI Enabled
615,679 UART: [state] LifecycleState = Unprovisioned
618,053 UART: [state] DebugLocked = No
620,003 UART: [state] WD Timer not started. Device not locked for debugging
624,888 UART: [kat] SHA2-256
814,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,516 UART: [kat] ++
826,108 UART: [kat] sha1
837,977 UART: [kat] SHA2-256
840,988 UART: [kat] SHA2-384
846,796 UART: [kat] SHA2-512-ACC
849,446 UART: [kat] ECC-384
3,286,727 UART: [kat] HMAC-384Kdf
3,301,222 UART: [kat] LMS
3,833,012 UART: [kat] --
3,838,311 UART: [cold-reset] ++
3,840,117 UART: [fht] FHT @ 0x50003400
3,851,800 UART: [idev] ++
3,852,509 UART: [idev] CDI.KEYID = 6
3,853,420 UART: [idev] SUBJECT.KEYID = 7
3,854,655 UART: [idev] UDS.KEYID = 0
3,855,553 ready_for_fw is high
3,855,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,528 UART: [idev] Erasing UDS.KEYID = 0
6,332,291 UART: [idev] Sha1 KeyId Algorithm
6,354,054 UART: [idev] --
6,359,721 UART: [ldev] ++
6,360,498 UART: [ldev] CDI.KEYID = 6
6,361,577 UART: [ldev] SUBJECT.KEYID = 5
6,362,681 UART: [ldev] AUTHORITY.KEYID = 7
6,363,850 UART: [ldev] FE.KEYID = 1
6,373,404 UART: [ldev] Erasing FE.KEYID = 1
8,851,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,603 UART: [ldev] --
10,641,914 UART: [fwproc] Wait for Commands...
10,644,388 UART: [fwproc] Recv command 0x46574c44
10,646,634 UART: [fwproc] Recv'd Img size: 114448 bytes
14,089,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,279,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,822,405 >>> mbox cmd response: success
14,827,132 UART: [afmc] ++
14,827,832 UART: [afmc] CDI.KEYID = 6
14,829,018 UART: [afmc] SUBJECT.KEYID = 7
14,830,526 UART: [afmc] AUTHORITY.KEYID = 5
17,340,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,150 UART: [afmc] --
19,136,575 UART: [cold-reset] --
19,140,707 UART: [state] Locking Datavault
19,148,284 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,478 UART: [state] Locking ICCM
19,152,676 UART: [exit] Launching FMC @ 0x40000130
19,161,303 UART:
19,161,575 UART: Running Caliptra FMC ...
19,162,674 UART:
19,162,845 UART: [state] CFI Enabled
19,171,267 UART: [fht] FMC Alias Private Key: 7
20,928,701 UART: [art] Extend RT PCRs Done
20,929,913 UART: [art] Lock RT PCRs Done
20,931,532 UART: [art] Populate DV Done
20,936,775 UART: [fht] FMC Alias Private Key: 7
20,938,468 UART: [art] Derive CDI
20,939,272 UART: [art] Store in in slot 0x4
20,981,916 UART: [art] Derive Key Pair
20,982,904 UART: [art] Store priv key in slot 0x5
23,409,703 UART: [art] Derive Key Pair - Done
23,422,757 UART: [art] Signing Cert with AUTHO
23,424,059 UART: RITY.KEYID = 7
25,128,938 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,438 UART: [art] PUB.X = B7133711C327A4034A642BF597684861406E837C6CFD074D34F4A7CF8EE454B122FC9D5B61E93BC83E9206CDC0688487
25,137,670 UART: [art] PUB.Y = 54D1FD6AF0D39DA3E8DB92309BC71D05C9A1962EF8B8A8B1EAB9AE7B2BAFCB6EDEB28C4EF009B043316959AFB11C57CA
25,144,951 UART: [art] SIG.R = 51928ADB3C21058722A0EE2DB2D1928BEB1BBE73DEBDCACF6CDD8E3EEE6F5E690971C92D66D7796CF97F97F4DED7588C
25,152,378 UART: [art] SIG.S = 16C84E6E8C3B06ABDA696CA527CA0EA26AFE40894F4C199424A5749B8156230B2D5C76687368A65AEE3788FAAB76C0E3
26,131,746 UART: Caliptra RT
26,132,432 UART: [state] CFI Enabled
26,249,913 UART: [rt] RT listening for mailbox commands...
30,277,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,433,373 UART: [rt]cmd =0x41544d4e, len=14344
34,363,666 >>> mbox cmd response data (8 bytes)
34,364,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,395,027 UART: [rt]cmd =0x41545348, len=116
34,414,136 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,757,606 ready_for_fw is high
3,758,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,621 >>> mbox cmd response: success
19,219,683 UART:
19,220,073 UART: Running Caliptra FMC ...
19,221,174 UART:
19,221,321 UART: [state] CFI Enabled
19,229,533 UART: [fht] FMC Alias Private Key: 7
20,986,568 UART: [art] Extend RT PCRs Done
20,987,789 UART: [art] Lock RT PCRs Done
20,989,488 UART: [art] Populate DV Done
20,994,786 UART: [fht] FMC Alias Private Key: 7
20,996,266 UART: [art] Derive CDI
20,997,021 UART: [art] Store in in slot 0x4
21,039,963 UART: [art] Derive Key Pair
21,041,008 UART: [art] Store priv key in slot 0x5
23,467,747 UART: [art] Derive Key Pair - Done
23,480,583 UART: [art] Signing Cert with AUTHO
23,481,881 UART: RITY.KEYID = 7
25,187,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,740 UART: [art] PUB.X = A0DC69C55EB7E55B2BF9BA819DA341D060681EE6D3F0F1946F448D8FA10603B3E79DD7EA26947EE6959A330D7D322745
25,196,052 UART: [art] PUB.Y = 735AD8A7738AE90083DD75DF39EC61D890B0472247A66F2D2E895187BC11C82C5525ADA8B8579690DE1DB4615CD839E1
25,203,243 UART: [art] SIG.R = B73FE10EE10951298AD3EF2BC27CE12AB7F3353C9AB921923FBB6912C33C01FC8E2C0D8FF782B3182AF09E7F00F4BE19
25,210,613 UART: [art] SIG.S = C186EA4705846BE9D952291459C38D3C84DB3D33ED9C1FC82BCD4BDDD189B218D3F2DDF3285498A83B6119EAA4070CFA
26,188,999 UART: Caliptra RT
26,189,705 UART: [state] CFI Enabled
26,307,572 UART: [rt] RT listening for mailbox commands...
30,329,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,485,006 UART: [rt]cmd =0x41544d4e, len=14344
34,415,477 >>> mbox cmd response data (8 bytes)
34,416,063 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,446,633 UART: [rt]cmd =0x41545348, len=116
34,465,744 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,070 UART: [kat] SHA2-512-ACC
896,971 UART: [kat] ECC-384
902,712 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,099 UART: [cold-reset] ++
1,476,569 UART: [fht] Storing FHT @ 0x50003400
1,479,294 UART: [idev] ++
1,479,462 UART: [idev] CDI.KEYID = 6
1,479,822 UART: [idev] SUBJECT.KEYID = 7
1,480,246 UART: [idev] UDS.KEYID = 0
1,480,591 ready_for_fw is high
1,480,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,867 UART: [ldev] ++
1,515,035 UART: [ldev] CDI.KEYID = 6
1,515,398 UART: [ldev] SUBJECT.KEYID = 5
1,515,824 UART: [ldev] AUTHORITY.KEYID = 7
1,516,287 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,418 UART: [ldev] --
1,585,741 UART: [fwproc] Waiting for Commands...
1,586,568 UART: [fwproc] Received command 0x46574c44
1,587,359 UART: [fwproc] Received Image of size 114448 bytes
2,885,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,313 >>> mbox cmd response: success
3,079,355 UART: [afmc] ++
3,079,523 UART: [afmc] CDI.KEYID = 6
3,079,885 UART: [afmc] SUBJECT.KEYID = 7
3,080,310 UART: [afmc] AUTHORITY.KEYID = 5
3,115,657 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,276 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,966 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,751 UART: [afmc] --
3,158,697 UART: [cold-reset] --
3,159,421 UART: [state] Locking Datavault
3,160,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,146 UART: [state] Locking ICCM
3,161,736 UART: [exit] Launching FMC @ 0x40000130
3,167,065 UART:
3,167,081 UART: Running Caliptra FMC ...
3,167,489 UART:
3,167,543 UART: [state] CFI Enabled
3,178,218 UART: [fht] FMC Alias Private Key: 7
3,286,439 UART: [art] Extend RT PCRs Done
3,286,867 UART: [art] Lock RT PCRs Done
3,288,615 UART: [art] Populate DV Done
3,296,944 UART: [fht] FMC Alias Private Key: 7
3,298,116 UART: [art] Derive CDI
3,298,396 UART: [art] Store in in slot 0x4
3,384,057 UART: [art] Derive Key Pair
3,384,417 UART: [art] Store priv key in slot 0x5
3,397,373 UART: [art] Derive Key Pair - Done
3,411,954 UART: [art] Signing Cert with AUTHO
3,412,434 UART: RITY.KEYID = 7
3,427,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,135 UART: [art] PUB.X = E556BA56946F9A9ABC08BB326E667044CB484B1CF03EF8529C8A0A7F6443F218E35CE289BC33AE80B9C51C55EFF27BE1
3,434,913 UART: [art] PUB.Y = D652CC882130B4B9C38E255EEB3A80FC743C251C48E2755E4500E9EAF0A96335E17A0240557256593E6AE4C46811DCD1
3,441,838 UART: [art] SIG.R = 60818D4BE35340D926603BA92565884CD18C8FA18A551D45BCD4E9561B37991F0B85E912CC75D87A82A072937ACECF40
3,448,605 UART: [art] SIG.S = CDC8B581087DC25A83242F54910744965E59F86B036F5503E0A8FB2DFA856AC158A951F5EE7DC4BB0474D982DC2BB276
3,472,199 UART: Caliptra RT
3,472,452 UART: [state] CFI Enabled
3,580,997 UART: [rt] RT listening for mailbox commands...
3,581,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,973 UART: [rt]cmd =0x41544d4e, len=14344
3,849,416 >>> mbox cmd response data (8 bytes)
3,849,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,496 UART: [rt]cmd =0x41545348, len=116
3,900,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,679 ready_for_fw is high
1,361,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,343 >>> mbox cmd response: success
2,989,289 UART:
2,989,305 UART: Running Caliptra FMC ...
2,989,713 UART:
2,989,767 UART: [state] CFI Enabled
2,999,974 UART: [fht] FMC Alias Private Key: 7
3,107,829 UART: [art] Extend RT PCRs Done
3,108,257 UART: [art] Lock RT PCRs Done
3,110,027 UART: [art] Populate DV Done
3,117,928 UART: [fht] FMC Alias Private Key: 7
3,119,096 UART: [art] Derive CDI
3,119,376 UART: [art] Store in in slot 0x4
3,205,255 UART: [art] Derive Key Pair
3,205,615 UART: [art] Store priv key in slot 0x5
3,219,219 UART: [art] Derive Key Pair - Done
3,234,141 UART: [art] Signing Cert with AUTHO
3,234,621 UART: RITY.KEYID = 7
3,249,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,992 UART: [art] PUB.X = 3BE589C5DD359671C252211DB94E7A3D37B11DB0080EC0E84AFF6539BF947CB415B3428F31EC2840C3B094BD206035A6
3,256,760 UART: [art] PUB.Y = 9FD2544B802D79268986537F4F3DB01B3B350A589F44C65E44B0D741FB7095C79440CE10CB64E257FC765B658E901FA8
3,263,705 UART: [art] SIG.R = 439B02115921FC91413F1A953E012340E474517231DB7A2EEFF01CB103596E6600EAC82AB5EF1DDFAABB503AA5798E13
3,270,450 UART: [art] SIG.S = 809F96BFB8268FA54057B73CCD8B0687B97F0F821F7591547C6369A31D259E1DE138AFB1EEB64B267C9528FEAD216CEE
3,294,263 UART: Caliptra RT
3,294,516 UART: [state] CFI Enabled
3,402,219 UART: [rt] RT listening for mailbox commands...
3,402,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,797 UART: [rt]cmd =0x41544d4e, len=14344
3,670,960 >>> mbox cmd response data (8 bytes)
3,670,961 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,030 UART: [rt]cmd =0x41545348, len=116
3,722,324 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,858 UART: [kat] SHA2-256
882,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,904 UART: [kat] ++
887,056 UART: [kat] sha1
891,382 UART: [kat] SHA2-256
893,320 UART: [kat] SHA2-384
895,973 UART: [kat] SHA2-512-ACC
897,874 UART: [kat] ECC-384
903,493 UART: [kat] HMAC-384Kdf
908,035 UART: [kat] LMS
1,476,231 UART: [kat] --
1,477,064 UART: [cold-reset] ++
1,477,448 UART: [fht] Storing FHT @ 0x50003400
1,480,351 UART: [idev] ++
1,480,519 UART: [idev] CDI.KEYID = 6
1,480,879 UART: [idev] SUBJECT.KEYID = 7
1,481,303 UART: [idev] UDS.KEYID = 0
1,481,648 ready_for_fw is high
1,481,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,061 UART: [idev] Erasing UDS.KEYID = 0
1,506,167 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,709 UART: [idev] --
1,515,660 UART: [ldev] ++
1,515,828 UART: [ldev] CDI.KEYID = 6
1,516,191 UART: [ldev] SUBJECT.KEYID = 5
1,516,617 UART: [ldev] AUTHORITY.KEYID = 7
1,517,080 UART: [ldev] FE.KEYID = 1
1,522,482 UART: [ldev] Erasing FE.KEYID = 1
1,548,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,143 UART: [ldev] --
1,587,446 UART: [fwproc] Waiting for Commands...
1,588,293 UART: [fwproc] Received command 0x46574c44
1,589,084 UART: [fwproc] Received Image of size 114448 bytes
2,887,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,976 >>> mbox cmd response: success
3,081,072 UART: [afmc] ++
3,081,240 UART: [afmc] CDI.KEYID = 6
3,081,602 UART: [afmc] SUBJECT.KEYID = 7
3,082,027 UART: [afmc] AUTHORITY.KEYID = 5
3,117,210 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,163 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,853 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,614 UART: [afmc] --
3,160,670 UART: [cold-reset] --
3,161,436 UART: [state] Locking Datavault
3,162,449 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,053 UART: [state] Locking ICCM
3,163,563 UART: [exit] Launching FMC @ 0x40000130
3,168,892 UART:
3,168,908 UART: Running Caliptra FMC ...
3,169,316 UART:
3,169,459 UART: [state] CFI Enabled
3,180,112 UART: [fht] FMC Alias Private Key: 7
3,287,353 UART: [art] Extend RT PCRs Done
3,287,781 UART: [art] Lock RT PCRs Done
3,289,203 UART: [art] Populate DV Done
3,297,428 UART: [fht] FMC Alias Private Key: 7
3,298,382 UART: [art] Derive CDI
3,298,662 UART: [art] Store in in slot 0x4
3,384,547 UART: [art] Derive Key Pair
3,384,907 UART: [art] Store priv key in slot 0x5
3,398,553 UART: [art] Derive Key Pair - Done
3,413,144 UART: [art] Signing Cert with AUTHO
3,413,624 UART: RITY.KEYID = 7
3,428,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,189 UART: [art] PUB.X = B418AD35A2302E60418165524B424E32329267241FB8B1E631EF3B09BD34287DE70ACFF650E7A6458E3C7E8482AC8DAB
3,435,955 UART: [art] PUB.Y = 5AAF064591CB51F46010ABA783F1DE248C379B510AD38F34AAF069E76E11D5708E7DAF4D186C586F77DAE2215E5060AF
3,442,909 UART: [art] SIG.R = 152A89D40967D7DBB553955A84DB3BF92895A3CA3B53D1DF70400BAF54FB3AD3F82AC393E58DC63B56FFF83A90446CC8
3,449,687 UART: [art] SIG.S = 56AE9692A175E9C91F7AED504D221058061C7570F8302413A35DA572F1F25A1685472904922A9855E0310E667DF2A073
3,473,621 UART: Caliptra RT
3,473,966 UART: [state] CFI Enabled
3,581,302 UART: [rt] RT listening for mailbox commands...
3,581,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,914 UART: [rt]cmd =0x41544d4e, len=14344
3,849,817 >>> mbox cmd response data (8 bytes)
3,849,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,907 UART: [rt]cmd =0x41545348, len=116
3,901,407 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,868 >>> mbox cmd response: success
2,991,498 UART:
2,991,514 UART: Running Caliptra FMC ...
2,991,922 UART:
2,992,065 UART: [state] CFI Enabled
3,002,806 UART: [fht] FMC Alias Private Key: 7
3,111,219 UART: [art] Extend RT PCRs Done
3,111,647 UART: [art] Lock RT PCRs Done
3,113,051 UART: [art] Populate DV Done
3,121,300 UART: [fht] FMC Alias Private Key: 7
3,122,424 UART: [art] Derive CDI
3,122,704 UART: [art] Store in in slot 0x4
3,208,383 UART: [art] Derive Key Pair
3,208,743 UART: [art] Store priv key in slot 0x5
3,222,177 UART: [art] Derive Key Pair - Done
3,236,806 UART: [art] Signing Cert with AUTHO
3,237,286 UART: RITY.KEYID = 7
3,252,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,439 UART: [art] PUB.X = B230E4873473DE6B58825EDA7E560F40E346C8AD59F9950722934D1439D9F466D631626D5580F2CBFA9C8938FB37F1E8
3,260,201 UART: [art] PUB.Y = 74B279809B7DE107E5BCC03A9F4B19136FD25EE8C7A1779D2436DF2B291F92EC6B5B1A66E36AD46D2BFE96E1C77DD880
3,267,162 UART: [art] SIG.R = 1C6BD64D1A4F0779A67FB1F2E360D595946F28FAD32C5B597112369A4C524EA7843786535D838562BBC66B3FCA440695
3,273,924 UART: [art] SIG.S = 14ABE2E01C7ACF5A17607CD420B701CCB049A41F1B6C02A40394A9E49BDA957CDD82D8D88FFB046145F8CCEC81385437
3,297,459 UART: Caliptra RT
3,297,804 UART: [state] CFI Enabled
3,405,642 UART: [rt] RT listening for mailbox commands...
3,406,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,422 UART: [rt]cmd =0x41544d4e, len=14344
3,674,151 >>> mbox cmd response data (8 bytes)
3,674,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,403 UART: [rt]cmd =0x41545348, len=116
3,725,999 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
917,682 UART: [kat] HMAC-384Kdf
922,172 UART: [kat] LMS
1,170,500 UART: [kat] --
1,171,577 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,742 UART: [idev] ++
1,174,910 UART: [idev] CDI.KEYID = 6
1,175,270 UART: [idev] SUBJECT.KEYID = 7
1,175,694 UART: [idev] UDS.KEYID = 0
1,176,039 ready_for_fw is high
1,176,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,347 UART: [idev] Sha1 KeyId Algorithm
1,208,863 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,454 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,933 UART: [ldev] --
1,281,328 UART: [fwproc] Wait for Commands...
1,282,002 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,990 >>> mbox cmd response: success
2,775,014 UART: [afmc] ++
2,775,182 UART: [afmc] CDI.KEYID = 6
2,775,544 UART: [afmc] SUBJECT.KEYID = 7
2,775,969 UART: [afmc] AUTHORITY.KEYID = 5
2,811,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,215 UART: [afmc] --
2,854,231 UART: [cold-reset] --
2,854,799 UART: [state] Locking Datavault
2,855,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,344 UART: [state] Locking ICCM
2,856,956 UART: [exit] Launching FMC @ 0x40000130
2,862,285 UART:
2,862,301 UART: Running Caliptra FMC ...
2,862,709 UART:
2,862,763 UART: [state] CFI Enabled
2,873,418 UART: [fht] FMC Alias Private Key: 7
2,981,531 UART: [art] Extend RT PCRs Done
2,981,959 UART: [art] Lock RT PCRs Done
2,983,301 UART: [art] Populate DV Done
2,991,512 UART: [fht] FMC Alias Private Key: 7
2,992,468 UART: [art] Derive CDI
2,992,748 UART: [art] Store in in slot 0x4
3,078,359 UART: [art] Derive Key Pair
3,078,719 UART: [art] Store priv key in slot 0x5
3,091,589 UART: [art] Derive Key Pair - Done
3,106,166 UART: [art] Signing Cert with AUTHO
3,106,646 UART: RITY.KEYID = 7
3,121,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,635 UART: [art] PUB.X = 81EE8F749797A0D5D2693449C3FD08AC4280E5CB737D95FF6403E2D33D94F77FF106DABBA9D1079248391D56AD1603CA
3,129,396 UART: [art] PUB.Y = F2E24E95309A0FD2C06107EF44E7FB742221D5992099225E986CF710F5B14A781F54C4E2E329E1E3F1AC264A75674AF2
3,136,340 UART: [art] SIG.R = F271FFF6B637A0F0D83D009CBE60471EB1407264D671B9783EA89CC33E54825A02CB68A991A7C6925507A9E931372CA2
3,143,082 UART: [art] SIG.S = E263595395E245AABAE35426C1C675F1CB7B2AB743FD1803B147C8EDCA8A6402DA0B57C01A37E8371786E25327667C86
3,166,544 UART: Caliptra RT
3,166,797 UART: [state] CFI Enabled
3,274,777 UART: [rt] RT listening for mailbox commands...
3,275,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,681 UART: [rt]cmd =0x41544d4e, len=14344
3,543,696 >>> mbox cmd response data (8 bytes)
3,543,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,584 UART: [rt]cmd =0x41545348, len=116
3,595,258 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 ready_for_fw is high
1,060,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,049 >>> mbox cmd response: success
2,691,477 UART:
2,691,493 UART: Running Caliptra FMC ...
2,691,901 UART:
2,691,955 UART: [state] CFI Enabled
2,702,784 UART: [fht] FMC Alias Private Key: 7
2,810,425 UART: [art] Extend RT PCRs Done
2,810,853 UART: [art] Lock RT PCRs Done
2,812,675 UART: [art] Populate DV Done
2,821,012 UART: [fht] FMC Alias Private Key: 7
2,822,146 UART: [art] Derive CDI
2,822,426 UART: [art] Store in in slot 0x4
2,908,185 UART: [art] Derive Key Pair
2,908,545 UART: [art] Store priv key in slot 0x5
2,922,043 UART: [art] Derive Key Pair - Done
2,936,956 UART: [art] Signing Cert with AUTHO
2,937,436 UART: RITY.KEYID = 7
2,953,322 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,087 UART: [art] PUB.X = 71B9005461F719527988205F89BCADEF85F6FCB1ADC979DA86D4590C20BB451B2DA1ED31BDCF28DBE9E459E568CB9291
2,960,846 UART: [art] PUB.Y = 3278C4B1DA9D05D0A06FBD3C16880228941F7E76FB5721717DE12EAC0719DF93C90F3C5106E8CB047ECAAE59BED39ECD
2,967,794 UART: [art] SIG.R = 4724AE00FACAEDFC27D970423881BB8562BF515588628E237FC678690E6ED6AE67897CBF618D2DDD87E5F294393F9331
2,974,543 UART: [art] SIG.S = CD480C8FD5158BDEF1858DD1796B819C79E738713AEFB623C3E596F59DADA8388A123A1076CFC4DDED1580CD59D33632
2,997,959 UART: Caliptra RT
2,998,212 UART: [state] CFI Enabled
3,105,431 UART: [rt] RT listening for mailbox commands...
3,106,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,217 UART: [rt]cmd =0x41544d4e, len=14344
3,374,750 >>> mbox cmd response data (8 bytes)
3,374,751 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,816 UART: [rt]cmd =0x41545348, len=116
3,426,224 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,701 UART: [kat] SHA2-512-ACC
908,602 UART: [kat] ECC-384
918,763 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,747 UART: [idev] ++
1,175,915 UART: [idev] CDI.KEYID = 6
1,176,275 UART: [idev] SUBJECT.KEYID = 7
1,176,699 UART: [idev] UDS.KEYID = 0
1,177,044 ready_for_fw is high
1,177,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,687 UART: [idev] Erasing UDS.KEYID = 0
1,202,064 UART: [idev] Sha1 KeyId Algorithm
1,210,482 UART: [idev] --
1,211,434 UART: [ldev] ++
1,211,602 UART: [ldev] CDI.KEYID = 6
1,211,965 UART: [ldev] SUBJECT.KEYID = 5
1,212,391 UART: [ldev] AUTHORITY.KEYID = 7
1,212,854 UART: [ldev] FE.KEYID = 1
1,218,050 UART: [ldev] Erasing FE.KEYID = 1
1,244,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,726 UART: [ldev] --
1,284,147 UART: [fwproc] Wait for Commands...
1,284,837 UART: [fwproc] Recv command 0x46574c44
1,285,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,339 >>> mbox cmd response: success
2,778,355 UART: [afmc] ++
2,778,523 UART: [afmc] CDI.KEYID = 6
2,778,885 UART: [afmc] SUBJECT.KEYID = 7
2,779,310 UART: [afmc] AUTHORITY.KEYID = 5
2,815,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,372 UART: [afmc] --
2,859,294 UART: [cold-reset] --
2,860,274 UART: [state] Locking Datavault
2,861,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,003 UART: [state] Locking ICCM
2,862,559 UART: [exit] Launching FMC @ 0x40000130
2,867,888 UART:
2,867,904 UART: Running Caliptra FMC ...
2,868,312 UART:
2,868,455 UART: [state] CFI Enabled
2,879,026 UART: [fht] FMC Alias Private Key: 7
2,986,871 UART: [art] Extend RT PCRs Done
2,987,299 UART: [art] Lock RT PCRs Done
2,988,985 UART: [art] Populate DV Done
2,997,276 UART: [fht] FMC Alias Private Key: 7
2,998,236 UART: [art] Derive CDI
2,998,516 UART: [art] Store in in slot 0x4
3,084,367 UART: [art] Derive Key Pair
3,084,727 UART: [art] Store priv key in slot 0x5
3,097,985 UART: [art] Derive Key Pair - Done
3,113,001 UART: [art] Signing Cert with AUTHO
3,113,481 UART: RITY.KEYID = 7
3,128,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,186 UART: [art] PUB.X = BAC4FAAEAAAF55D222BB169565DEEBED54353FB251812ED4FB20FC0810C6F97CDEC05325373F863E423B00185E1BB639
3,135,949 UART: [art] PUB.Y = 488C779EE43A487045A103446B3396350F0C797C4600B72F0433C1E49189C16A2023960434A7B785FCA239CC93C6E649
3,142,848 UART: [art] SIG.R = E0A9C73CFC3829458BD73AA3C4260470EABA477C5E8175B1BEBC48FB59385712C1207CFE182BF4025DFFF0E1EB7BF475
3,149,628 UART: [art] SIG.S = C938795AB921B2A9E00050AB31FE04753B623DCB985EB09A30A2BFD241F117FC4DD4020B48FAB83B0BF29D6B9F47FEEC
3,172,793 UART: Caliptra RT
3,173,138 UART: [state] CFI Enabled
3,281,728 UART: [rt] RT listening for mailbox commands...
3,282,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,514 UART: [rt]cmd =0x41544d4e, len=14344
3,550,631 >>> mbox cmd response data (8 bytes)
3,550,632 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,801 UART: [rt]cmd =0x41545348, len=116
3,601,931 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,566 ready_for_fw is high
1,060,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,946 >>> mbox cmd response: success
2,692,068 UART:
2,692,084 UART: Running Caliptra FMC ...
2,692,492 UART:
2,692,635 UART: [state] CFI Enabled
2,703,114 UART: [fht] FMC Alias Private Key: 7
2,811,947 UART: [art] Extend RT PCRs Done
2,812,375 UART: [art] Lock RT PCRs Done
2,813,919 UART: [art] Populate DV Done
2,822,196 UART: [fht] FMC Alias Private Key: 7
2,823,172 UART: [art] Derive CDI
2,823,452 UART: [art] Store in in slot 0x4
2,909,425 UART: [art] Derive Key Pair
2,909,785 UART: [art] Store priv key in slot 0x5
2,923,173 UART: [art] Derive Key Pair - Done
2,938,298 UART: [art] Signing Cert with AUTHO
2,938,778 UART: RITY.KEYID = 7
2,954,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,965 UART: [art] PUB.X = EB5C888671BF67BCE9D5FCBD55094B42C120CE6112F899100F77483BB25600A10AF0BADD5D8A988C87C606A3148C4E50
2,961,709 UART: [art] PUB.Y = 934724615536E9FB48B1A2D25C19245D0C05E5BDFD83AAD7E6E20C5CAF1033C4184B2AD0E8641976AF8B86EAC5FD5F53
2,968,662 UART: [art] SIG.R = FAB1AEA281193FE2C687C92505AB2BE350E9C77AEED3D48DE564CE968087EE46BC5A5D8AF032BC10FC065F6722DA2206
2,975,441 UART: [art] SIG.S = DC8837CEE534BD84BD9F9C3CED7F4368452BDB4A53B86BE00864008FC03B71BD255C91F4702E7A7B736C8CAE9B37E1FE
2,999,743 UART: Caliptra RT
3,000,088 UART: [state] CFI Enabled
3,107,090 UART: [rt] RT listening for mailbox commands...
3,107,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,550 UART: [rt]cmd =0x41544d4e, len=14344
3,374,935 >>> mbox cmd response data (8 bytes)
3,374,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,061 UART: [rt]cmd =0x41545348, len=116
3,426,661 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,953 UART: [kat] ++
895,105 UART: [kat] sha1
899,403 UART: [kat] SHA2-256
901,343 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 ready_for_fw is high
1,174,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,489 UART: [idev] Erasing UDS.KEYID = 0
1,198,511 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] --
1,208,304 UART: [ldev] ++
1,208,472 UART: [ldev] CDI.KEYID = 6
1,208,836 UART: [ldev] SUBJECT.KEYID = 5
1,209,263 UART: [ldev] AUTHORITY.KEYID = 7
1,209,726 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,326 UART: [ldev] --
1,280,812 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,496 >>> mbox cmd response: success
2,774,677 UART: [afmc] ++
2,774,845 UART: [afmc] CDI.KEYID = 6
2,775,208 UART: [afmc] SUBJECT.KEYID = 7
2,775,634 UART: [afmc] AUTHORITY.KEYID = 5
2,810,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,198 UART: [afmc] --
2,854,090 UART: [cold-reset] --
2,854,986 UART: [state] Locking Datavault
2,855,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,585 UART: [state] Locking ICCM
2,857,011 UART: [exit] Launching FMC @ 0x40000130
2,862,340 UART:
2,862,356 UART: Running Caliptra FMC ...
2,862,764 UART:
2,862,818 UART: [state] CFI Enabled
2,873,197 UART: [fht] FMC Alias Private Key: 7
2,981,148 UART: [art] Extend RT PCRs Done
2,981,576 UART: [art] Lock RT PCRs Done
2,983,048 UART: [art] Populate DV Done
2,991,397 UART: [fht] FMC Alias Private Key: 7
2,992,507 UART: [art] Derive CDI
2,992,787 UART: [art] Store in in slot 0x4
3,078,870 UART: [art] Derive Key Pair
3,079,230 UART: [art] Store priv key in slot 0x5
3,091,612 UART: [art] Derive Key Pair - Done
3,106,313 UART: [art] Signing Cert with AUTHO
3,106,793 UART: RITY.KEYID = 7
3,121,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,706 UART: [art] PUB.X = FC72D84BCC2E33B9B3242091E5206B4C47A447E71B11D0D929794318AEF0E699C511D5D23D4506FFC05FE1D95E8416F6
3,129,477 UART: [art] PUB.Y = BEB4437D7B92D2308F90FB462336EA7E565C6B976E1B508CF130398A32B6FA675217421E3A8EBBC95ED65E962DD3341D
3,136,433 UART: [art] SIG.R = E2147F1B4BB417BC1B29FC2C56784BA204737B0563BEDF24CB5CF54584CFF191D84E21C9259F8686F6E6129AFFCE2793
3,143,207 UART: [art] SIG.S = 3CC93A5FBDB2B0DAA9461F57D873DCDF1D9015427F4EF8B159FE92DA68422ED4B57528EB65313A59158C889A273412E8
3,166,942 UART: Caliptra RT
3,167,195 UART: [state] CFI Enabled
3,275,348 UART: [rt] RT listening for mailbox commands...
3,276,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,254 UART: [rt]cmd =0x41544d4e, len=14344
3,543,887 >>> mbox cmd response data (8 bytes)
3,543,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,005 UART: [rt]cmd =0x41545348, len=116
3,594,677 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,972 ready_for_fw is high
1,055,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,069 >>> mbox cmd response: success
2,686,133 UART:
2,686,149 UART: Running Caliptra FMC ...
2,686,557 UART:
2,686,611 UART: [state] CFI Enabled
2,696,710 UART: [fht] FMC Alias Private Key: 7
2,805,119 UART: [art] Extend RT PCRs Done
2,805,547 UART: [art] Lock RT PCRs Done
2,807,239 UART: [art] Populate DV Done
2,815,394 UART: [fht] FMC Alias Private Key: 7
2,816,512 UART: [art] Derive CDI
2,816,792 UART: [art] Store in in slot 0x4
2,902,431 UART: [art] Derive Key Pair
2,902,791 UART: [art] Store priv key in slot 0x5
2,915,545 UART: [art] Derive Key Pair - Done
2,930,263 UART: [art] Signing Cert with AUTHO
2,930,743 UART: RITY.KEYID = 7
2,946,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,778 UART: [art] PUB.X = E1DF5F3E69968306C8DB1C078A98DFD58C92480B5DCBF8EA579BE53F9572ECDDD97F7866A9A7BE8191ED5F6DC69B9E30
2,953,559 UART: [art] PUB.Y = 5ED5BE5F671443FE3627C2ED1D089E00B72358D769986241E648B2D099085C82584A1537A9038CC5E7B2254973C209B3
2,960,465 UART: [art] SIG.R = 143958234251CC398D4ED2A2407EA1BD88C3C82AFCA7D8CBC9145E8CBC5B1CEA7E9ED4E8B31249EC53014A8356188D60
2,967,244 UART: [art] SIG.S = 257AAB4D41499BE26481EFF866D6C5EBDE4AAC81ED4E89D74B23CBE83B90C267317BAD83B3CE92260031C5DF53A66A36
2,990,965 UART: Caliptra RT
2,991,218 UART: [state] CFI Enabled
3,099,363 UART: [rt] RT listening for mailbox commands...
3,100,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,271 UART: [rt]cmd =0x41544d4e, len=14344
3,368,268 >>> mbox cmd response data (8 bytes)
3,368,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,360 UART: [rt]cmd =0x41545348, len=116
3,419,836 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,673 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,174,802 ready_for_fw is high
1,174,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,641 UART: [ldev] --
1,280,991 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x46574c44
1,282,327 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,591 >>> mbox cmd response: success
2,775,766 UART: [afmc] ++
2,775,934 UART: [afmc] CDI.KEYID = 6
2,776,297 UART: [afmc] SUBJECT.KEYID = 7
2,776,723 UART: [afmc] AUTHORITY.KEYID = 5
2,812,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,225 UART: [afmc] --
2,856,127 UART: [cold-reset] --
2,856,831 UART: [state] Locking Datavault
2,857,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,364 UART: [state] Locking ICCM
2,858,904 UART: [exit] Launching FMC @ 0x40000130
2,864,233 UART:
2,864,249 UART: Running Caliptra FMC ...
2,864,657 UART:
2,864,800 UART: [state] CFI Enabled
2,875,485 UART: [fht] FMC Alias Private Key: 7
2,984,236 UART: [art] Extend RT PCRs Done
2,984,664 UART: [art] Lock RT PCRs Done
2,986,356 UART: [art] Populate DV Done
2,994,621 UART: [fht] FMC Alias Private Key: 7
2,995,787 UART: [art] Derive CDI
2,996,067 UART: [art] Store in in slot 0x4
3,081,580 UART: [art] Derive Key Pair
3,081,940 UART: [art] Store priv key in slot 0x5
3,095,466 UART: [art] Derive Key Pair - Done
3,110,203 UART: [art] Signing Cert with AUTHO
3,110,683 UART: RITY.KEYID = 7
3,125,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,514 UART: [art] PUB.X = E3AAD849DF3F1CC6FFC6A00440002D5C2C0B772DAFDD3E840BE636A837C4CCBDEB0912F02E1E4EB9E426B6910F41A8DA
3,133,273 UART: [art] PUB.Y = 00EFA536DDE978BD918D62A25D418F4AE2045C96FC1EAFD0DA3365544691EF873C26A9C75CEBE90B0CD587AD3DC8D1C0
3,140,212 UART: [art] SIG.R = D9107339EE1A7AD204B459A587A9F40290703AF005FB60C660DEEDC5BB4675C5A07CAEC2B1204CEB58691A1126341950
3,146,977 UART: [art] SIG.S = 0988FFCCE111C4AD658E30D936CC4C8BC7D012F254041C9B04338B142D55F5E92EABF1EC863D70F2D317925F983B9EDB
3,170,463 UART: Caliptra RT
3,170,808 UART: [state] CFI Enabled
3,278,237 UART: [rt] RT listening for mailbox commands...
3,278,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,879 UART: [rt]cmd =0x41544d4e, len=14344
3,546,558 >>> mbox cmd response data (8 bytes)
3,546,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,486 UART: [rt]cmd =0x41545348, len=116
3,598,106 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,825 ready_for_fw is high
1,056,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,741 >>> mbox cmd response: success
2,686,047 UART:
2,686,063 UART: Running Caliptra FMC ...
2,686,471 UART:
2,686,614 UART: [state] CFI Enabled
2,697,307 UART: [fht] FMC Alias Private Key: 7
2,805,594 UART: [art] Extend RT PCRs Done
2,806,022 UART: [art] Lock RT PCRs Done
2,807,434 UART: [art] Populate DV Done
2,815,565 UART: [fht] FMC Alias Private Key: 7
2,816,545 UART: [art] Derive CDI
2,816,825 UART: [art] Store in in slot 0x4
2,902,404 UART: [art] Derive Key Pair
2,902,764 UART: [art] Store priv key in slot 0x5
2,916,572 UART: [art] Derive Key Pair - Done
2,931,229 UART: [art] Signing Cert with AUTHO
2,931,709 UART: RITY.KEYID = 7
2,947,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,134 UART: [art] PUB.X = 0D388964B63973D3F7131144106DEC6B992BA0B402F13D9B8AEEEF839524B7B6CB58A868A13F049403C9C20ED1E657F4
2,954,891 UART: [art] PUB.Y = 6E634E639A7EA990233E71FBD966B134C2A1CAB2BF2DED2DFCC52DC5486C23493D4535FB1DF6EC8CB0CD1BAC0F725952
2,961,860 UART: [art] SIG.R = B11A332C773E3AB5A4C11DBF63DCF236F142EE0C608813F7F39874CB5401A1498F3CF5151C514049268BA1703A77A925
2,968,624 UART: [art] SIG.S = 9837E765BF99AAF5B5D48DB9841FB2C6CDF7160C7164F01E70E5F63ECFC3B91D7D43C5D7433ED56BC73ADE5A537537A5
2,992,924 UART: Caliptra RT
2,993,269 UART: [state] CFI Enabled
3,101,577 UART: [rt] RT listening for mailbox commands...
3,102,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,329 UART: [rt]cmd =0x41544d4e, len=14344
3,369,436 >>> mbox cmd response data (8 bytes)
3,369,437 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,462 UART: [rt]cmd =0x41545348, len=116
3,421,114 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,027 UART:
192,371 UART: Running Caliptra ROM ...
193,588 UART:
193,741 UART: [state] CFI Enabled
264,462 UART: [state] LifecycleState = Unprovisioned
266,428 UART: [state] DebugLocked = No
269,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,505 UART: [kat] SHA2-256
443,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,708 UART: [kat] ++
454,159 UART: [kat] sha1
464,538 UART: [kat] SHA2-256
467,192 UART: [kat] SHA2-384
473,050 UART: [kat] SHA2-512-ACC
475,419 UART: [kat] ECC-384
2,769,255 UART: [kat] HMAC-384Kdf
2,801,381 UART: [kat] LMS
3,991,659 UART: [kat] --
3,995,173 UART: [cold-reset] ++
3,996,822 UART: [fht] Storing FHT @ 0x50003400
4,008,870 UART: [idev] ++
4,009,437 UART: [idev] CDI.KEYID = 6
4,010,398 UART: [idev] SUBJECT.KEYID = 7
4,011,644 UART: [idev] UDS.KEYID = 0
4,012,576 ready_for_fw is high
4,012,785 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,920 UART: [idev] Erasing UDS.KEYID = 0
7,347,543 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,534 UART: [idev] --
7,372,908 UART: [ldev] ++
7,373,486 UART: [ldev] CDI.KEYID = 6
7,374,453 UART: [ldev] SUBJECT.KEYID = 5
7,375,666 UART: [ldev] AUTHORITY.KEYID = 7
7,376,898 UART: [ldev] FE.KEYID = 1
7,422,980 UART: [ldev] Erasing FE.KEYID = 1
10,759,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,099 UART: [ldev] --
13,135,680 UART: [fwproc] Waiting for Commands...
13,137,887 UART: [fwproc] Received command 0x46574c44
13,140,125 UART: [fwproc] Received Image of size 114124 bytes
17,200,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,349,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,667,266 >>> mbox cmd response: success
17,671,342 UART: [afmc] ++
17,671,945 UART: [afmc] CDI.KEYID = 6
17,672,919 UART: [afmc] SUBJECT.KEYID = 7
17,674,132 UART: [afmc] AUTHORITY.KEYID = 5
21,027,576 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,372 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,639 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,031 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,897 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,346 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,746 UART: [afmc] --
23,399,692 UART: [cold-reset] --
23,406,008 UART: [state] Locking Datavault
23,409,426 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,132 UART: [state] Locking ICCM
23,412,557 UART: [exit] Launching FMC @ 0x40000130
23,420,947 UART:
23,421,179 UART: Running Caliptra FMC ...
23,422,207 UART:
23,422,354 UART: [state] CFI Enabled
23,489,676 UART: [fht] FMC Alias Private Key: 7
25,827,739 UART: [art] Extend RT PCRs Done
25,828,960 UART: [art] Lock RT PCRs Done
25,830,127 UART: [art] Populate DV Done
25,835,592 UART: [fht] FMC Alias Private Key: 7
25,837,309 UART: [art] Derive CDI
25,838,047 UART: [art] Store in in slot 0x4
25,897,194 UART: [art] Derive Key Pair
25,898,229 UART: [art] Store priv key in slot 0x5
29,190,351 UART: [art] Derive Key Pair - Done
29,203,898 UART: [art] Signing Cert with AUTHO
29,205,208 UART: RITY.KEYID = 7
31,491,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,289 UART: [art] PUB.X = E84CF2C09AD22A010C6E73F2A09D00571F798104610CD7883AD7BACE04B92A6EFFDC21164B0648A68B70EBB68F48B2F3
31,500,490 UART: [art] PUB.Y = ED502E745354D766C09B76C6B956F53451AEDCFE7CBF2E239DC2FE323C457C12D0AFEED82195C753694A384A8B1C328B
31,507,794 UART: [art] SIG.R = E90A89529D6A545485FCC0D953210C69216DBBD03E81065FD446ECC4E583376B2CAD9BA5935BC1B4EEB948CD5FA643FB
31,515,195 UART: [art] SIG.S = 4C4039B7054EC16DB6C83D1D87AA6E18856807867604AFD382335F2C01DA50902A79327C27D10B0CB21DCA1EEF971F05
32,820,379 UART: Caliptra RT
32,821,067 UART: [state] CFI Enabled
32,981,507 UART: [rt] RT listening for mailbox commands...
32,983,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,139,547 UART: [rt]cmd =0x41544d4e, len=14344
38,374,636 >>> mbox cmd response data (8 bytes)
38,375,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,945 UART: [rt]cmd =0x41545348, len=116
38,425,866 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,789,217 ready_for_fw is high
3,789,827 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,529 >>> mbox cmd response: success
23,563,626 UART:
23,564,006 UART: Running Caliptra FMC ...
23,565,241 UART:
23,565,415 UART: [state] CFI Enabled
23,635,083 UART: [fht] FMC Alias Private Key: 7
25,972,811 UART: [art] Extend RT PCRs Done
25,974,035 UART: [art] Lock RT PCRs Done
25,975,941 UART: [art] Populate DV Done
25,981,475 UART: [fht] FMC Alias Private Key: 7
25,983,126 UART: [art] Derive CDI
25,983,946 UART: [art] Store in in slot 0x4
26,042,993 UART: [art] Derive Key Pair
26,044,039 UART: [art] Store priv key in slot 0x5
29,336,635 UART: [art] Derive Key Pair - Done
29,349,690 UART: [art] Signing Cert with AUTHO
29,350,996 UART: RITY.KEYID = 7
31,638,248 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,781 UART: [art] PUB.X = DCF08E903084B5AC463581952281851EA6F3467058EB7417E16B94CEB8D4F6E63A8045BAE84FAE90100008AB5B8D44D9
31,647,000 UART: [art] PUB.Y = EFCF60765303642A2A2042234A73443FC7347A0E4D3703BBF98269D0701BE2C05C5BC31DC509C790691A603B8532F7EA
31,654,228 UART: [art] SIG.R = 45F413EC1CC5DC5A3101076E73E7CC5B608C39FB6DB5D4967ADAEFBFFD899AD0870381D6ED526C7E8E8690BBD0E77A64
31,661,684 UART: [art] SIG.S = FC289C0720DE040862B27E03149F6145526BFD4E77DE1EF5C534C11CC2A941D9C135B69E4E1E89773B56C8BDE7CA3D8A
32,966,320 UART: Caliptra RT
32,967,014 UART: [state] CFI Enabled
33,128,832 UART: [rt] RT listening for mailbox commands...
33,131,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,286,427 UART: [rt]cmd =0x41544d4e, len=14344
38,521,732 >>> mbox cmd response data (8 bytes)
38,522,325 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,553,069 UART: [rt]cmd =0x41545348, len=116
38,573,263 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,414 UART:
192,781 UART: Running Caliptra ROM ...
193,979 UART:
603,699 UART: [state] CFI Enabled
617,736 UART: [state] LifecycleState = Unprovisioned
619,706 UART: [state] DebugLocked = No
621,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,949 UART: [kat] SHA2-256
796,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,248 UART: [kat] ++
807,775 UART: [kat] sha1
818,507 UART: [kat] SHA2-256
821,172 UART: [kat] SHA2-384
827,795 UART: [kat] SHA2-512-ACC
830,167 UART: [kat] ECC-384
3,113,019 UART: [kat] HMAC-384Kdf
3,124,925 UART: [kat] LMS
4,314,975 UART: [kat] --
4,318,470 UART: [cold-reset] ++
4,320,477 UART: [fht] Storing FHT @ 0x50003400
4,331,593 UART: [idev] ++
4,332,232 UART: [idev] CDI.KEYID = 6
4,333,140 UART: [idev] SUBJECT.KEYID = 7
4,334,380 UART: [idev] UDS.KEYID = 0
4,335,339 ready_for_fw is high
4,335,550 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,941 UART: [idev] Erasing UDS.KEYID = 0
7,622,945 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,033 UART: [idev] --
7,647,892 UART: [ldev] ++
7,648,460 UART: [ldev] CDI.KEYID = 6
7,649,416 UART: [ldev] SUBJECT.KEYID = 5
7,650,620 UART: [ldev] AUTHORITY.KEYID = 7
7,651,894 UART: [ldev] FE.KEYID = 1
7,664,092 UART: [ldev] Erasing FE.KEYID = 1
10,953,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,547 UART: [ldev] --
13,313,505 UART: [fwproc] Waiting for Commands...
13,315,265 UART: [fwproc] Received command 0x46574c44
13,317,492 UART: [fwproc] Received Image of size 114124 bytes
17,370,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,963 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,402 >>> mbox cmd response: success
17,834,026 UART: [afmc] ++
17,834,631 UART: [afmc] CDI.KEYID = 6
17,835,513 UART: [afmc] SUBJECT.KEYID = 7
17,836,777 UART: [afmc] AUTHORITY.KEYID = 5
21,150,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,449 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,717 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,070 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,912 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,533 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,270 UART: [afmc] --
23,518,346 UART: [cold-reset] --
23,522,985 UART: [state] Locking Datavault
23,527,424 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,122 UART: [state] Locking ICCM
23,531,133 UART: [exit] Launching FMC @ 0x40000130
23,539,523 UART:
23,539,760 UART: Running Caliptra FMC ...
23,540,852 UART:
23,541,010 UART: [state] CFI Enabled
23,549,108 UART: [fht] FMC Alias Private Key: 7
25,879,667 UART: [art] Extend RT PCRs Done
25,880,876 UART: [art] Lock RT PCRs Done
25,882,794 UART: [art] Populate DV Done
25,888,362 UART: [fht] FMC Alias Private Key: 7
25,889,853 UART: [art] Derive CDI
25,890,587 UART: [art] Store in in slot 0x4
25,933,221 UART: [art] Derive Key Pair
25,934,290 UART: [art] Store priv key in slot 0x5
29,176,108 UART: [art] Derive Key Pair - Done
29,189,275 UART: [art] Signing Cert with AUTHO
29,190,571 UART: RITY.KEYID = 7
31,470,105 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,608 UART: [art] PUB.X = 83056FF3C5990991532030A312FFB2942FDAEBFA4764EFD5C0AEB5CC93E18B79033D6C7AF6E4A3B70FE4C345F11683FC
31,478,831 UART: [art] PUB.Y = DE6A9D3B988116145AF35FDD48B7F18A00AB488F2BF36C1C4728D1204AF6BCACBD7656BC7D1417FA0BEA0B169DCBC437
31,486,107 UART: [art] SIG.R = 5D490EC5D6CA1B2566E9604CC2DB9ABF83C3ED067D233D175574CC433E163308AE2A11D26400AF2FB0445D83C92304EB
31,493,513 UART: [art] SIG.S = 670562F9AC4996F7EC2F717267C830464E6FC827C5189EABCBB8BCBF45B4101E9756DD4777FE00483A3759A615114742
32,798,381 UART: Caliptra RT
32,799,092 UART: [state] CFI Enabled
32,918,042 UART: [rt] RT listening for mailbox commands...
32,920,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,075,930 UART: [rt]cmd =0x41544d4e, len=14344
38,311,844 >>> mbox cmd response data (8 bytes)
38,312,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,343,204 UART: [rt]cmd =0x41545348, len=116
38,363,716 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
4,129,656 ready_for_fw is high
4,130,070 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,527 >>> mbox cmd response: success
23,712,216 UART:
23,712,600 UART: Running Caliptra FMC ...
23,713,801 UART:
23,713,964 UART: [state] CFI Enabled
23,721,788 UART: [fht] FMC Alias Private Key: 7
26,052,441 UART: [art] Extend RT PCRs Done
26,053,674 UART: [art] Lock RT PCRs Done
26,055,409 UART: [art] Populate DV Done
26,060,767 UART: [fht] FMC Alias Private Key: 7
26,062,308 UART: [art] Derive CDI
26,063,122 UART: [art] Store in in slot 0x4
26,105,605 UART: [art] Derive Key Pair
26,106,606 UART: [art] Store priv key in slot 0x5
29,348,891 UART: [art] Derive Key Pair - Done
29,361,909 UART: [art] Signing Cert with AUTHO
29,363,214 UART: RITY.KEYID = 7
31,642,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,132 UART: [art] PUB.X = 43B3EC63B8D8F55BA6168DC1C41469AF4E531BAB67F2864846E75A5EEC2D86CB4982617CB0927F8C4858B6AB12E2B498
31,651,406 UART: [art] PUB.Y = EFC339DABD9D5BBD6C476877CE844284405791DB6DC66B9F44C58AE188096D28F13C847AF53F129508667C8A5B20CA71
31,658,594 UART: [art] SIG.R = 4FEAA7C45E5DAE71309DE26645E922CD02E3C1A083924B0489040AACD68BB1276FC1FFBA1C3FE0EED07AD9D0411171A0
31,666,027 UART: [art] SIG.S = 2C6BFAB07780D3899AD08436233D640D724D785A073CC0D64272C78E8910850C0A6E340BC4A8FD1A4C1FD79DF39912E9
32,971,235 UART: Caliptra RT
32,971,947 UART: [state] CFI Enabled
33,089,874 UART: [rt] RT listening for mailbox commands...
33,092,315 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,247,681 UART: [rt]cmd =0x41544d4e, len=14344
38,482,974 >>> mbox cmd response data (8 bytes)
38,483,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,514,441 UART: [rt]cmd =0x41545348, len=116
38,534,322 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,260 UART:
192,615 UART: Running Caliptra ROM ...
193,834 UART:
193,989 UART: [state] CFI Enabled
262,101 UART: [state] LifecycleState = Unprovisioned
264,017 UART: [state] DebugLocked = No
266,336 UART: [state] WD Timer not started. Device not locked for debugging
269,581 UART: [kat] SHA2-256
448,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,284 UART: [kat] ++
460,815 UART: [kat] sha1
470,627 UART: [kat] SHA2-256
473,631 UART: [kat] SHA2-384
478,904 UART: [kat] SHA2-512-ACC
481,917 UART: [kat] ECC-384
2,925,781 UART: [kat] HMAC-384Kdf
2,950,258 UART: [kat] LMS
3,479,718 UART: [kat] --
3,485,202 UART: [cold-reset] ++
3,487,554 UART: [fht] FHT @ 0x50003400
3,497,648 UART: [idev] ++
3,498,264 UART: [idev] CDI.KEYID = 6
3,499,185 UART: [idev] SUBJECT.KEYID = 7
3,500,361 UART: [idev] UDS.KEYID = 0
3,501,285 ready_for_fw is high
3,501,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,253 UART: [idev] Erasing UDS.KEYID = 0
6,004,905 UART: [idev] Sha1 KeyId Algorithm
6,028,780 UART: [idev] --
6,032,498 UART: [ldev] ++
6,033,063 UART: [ldev] CDI.KEYID = 6
6,033,999 UART: [ldev] SUBJECT.KEYID = 5
6,035,086 UART: [ldev] AUTHORITY.KEYID = 7
6,036,424 UART: [ldev] FE.KEYID = 1
6,080,364 UART: [ldev] Erasing FE.KEYID = 1
8,584,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,262 UART: [ldev] --
10,394,669 UART: [fwproc] Wait for Commands...
10,396,283 UART: [fwproc] Recv command 0x46574c44
10,398,376 UART: [fwproc] Recv'd Img size: 114448 bytes
13,806,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,265,057 >>> mbox cmd response: success
14,268,732 UART: [afmc] ++
14,269,327 UART: [afmc] CDI.KEYID = 6
14,270,209 UART: [afmc] SUBJECT.KEYID = 7
14,271,422 UART: [afmc] AUTHORITY.KEYID = 5
16,804,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,620 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,752 UART: [afmc] --
18,603,798 UART: [cold-reset] --
18,606,573 UART: [state] Locking Datavault
18,609,604 UART: [state] Locking PCR0, PCR1 and PCR31
18,611,244 UART: [state] Locking ICCM
18,613,952 UART: [exit] Launching FMC @ 0x40000130
18,622,360 UART:
18,622,638 UART: Running Caliptra FMC ...
18,623,746 UART:
18,623,906 UART: [state] CFI Enabled
18,688,697 UART: [fht] FMC Alias Private Key: 7
20,453,000 UART: [art] Extend RT PCRs Done
20,454,220 UART: [art] Lock RT PCRs Done
20,455,817 UART: [art] Populate DV Done
20,461,251 UART: [fht] FMC Alias Private Key: 7
20,462,759 UART: [art] Derive CDI
20,463,495 UART: [art] Store in in slot 0x4
20,521,342 UART: [art] Derive Key Pair
20,522,335 UART: [art] Store priv key in slot 0x5
22,985,736 UART: [art] Derive Key Pair - Done
22,998,561 UART: [art] Signing Cert with AUTHO
22,999,886 UART: RITY.KEYID = 7
24,711,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,625 UART: [art] PUB.X = F24DBECE4442068E85BEDEBD1695387C44167A7C0D2B417F5C88DD8C21FC7AB2BCA24096724A14633E8DA5E60583C57D
24,719,930 UART: [art] PUB.Y = B3F1984BF96440BA7A2F4534A37860F43A08B428B64E18C59BB883165FE97FEDE85345B9DF8F856A60D5F0AFD3F5B414
24,727,213 UART: [art] SIG.R = 1D078B733C51E2DC919C8A21C3E0E9E66689AF47FA09ECA97DE7ED637812406D2A855AA63CE9CDBADBA2F1BA821FB23C
24,734,595 UART: [art] SIG.S = 199766DDCEEA2AC18E7A2556F06138BE238ABED7891D22F83A5CFBB2E0A6F2FE05FBEE3E3BD421BEDF4C2565EA59FFE2
25,713,486 UART: Caliptra RT
25,714,172 UART: [state] CFI Enabled
25,890,984 UART: [rt] RT listening for mailbox commands...
25,893,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,049,561 UART: [rt]cmd =0x41544d4e, len=14344
29,980,177 >>> mbox cmd response data (8 bytes)
29,980,750 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,011,489 UART: [rt]cmd =0x41545348, len=116
30,030,977 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,381,275 ready_for_fw is high
3,381,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,672 >>> mbox cmd response: success
18,367,647 UART:
18,368,048 UART: Running Caliptra FMC ...
18,369,160 UART:
18,369,310 UART: [state] CFI Enabled
18,431,727 UART: [fht] FMC Alias Private Key: 7
20,195,892 UART: [art] Extend RT PCRs Done
20,197,104 UART: [art] Lock RT PCRs Done
20,198,889 UART: [art] Populate DV Done
20,204,452 UART: [fht] FMC Alias Private Key: 7
20,205,993 UART: [art] Derive CDI
20,206,780 UART: [art] Store in in slot 0x4
20,264,262 UART: [art] Derive Key Pair
20,265,302 UART: [art] Store priv key in slot 0x5
22,729,057 UART: [art] Derive Key Pair - Done
22,742,103 UART: [art] Signing Cert with AUTHO
22,743,440 UART: RITY.KEYID = 7
24,454,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,698 UART: [art] PUB.X = C1B425B92C65D56DA6F15835FA14B21442FE5CDE23AC8ECEC87FD4A9E4618F9EA0DE13277834119951CA19B809405835
24,462,951 UART: [art] PUB.Y = C8A765AD000781DB4C2EAA68CB44512E90D34E6356BD15D8EC138FA410E5064523F5570D5EA453A352FD08CBFD1EC785
24,470,224 UART: [art] SIG.R = 25734BF5092DFE109AAE7F82B8661E911997BFD9E4E0B10638E643EE1BBC32F5023600E3F31B0D565553B61A64E6689B
24,477,615 UART: [art] SIG.S = AAB660CE38F9A6BD5C4C5692362BBC3462DFF0ED48B879418E78C0E73B24EC962D8F22E2C0A910DF7F3F1C4B145CD9D5
25,456,559 UART: Caliptra RT
25,457,266 UART: [state] CFI Enabled
25,622,008 UART: [rt] RT listening for mailbox commands...
25,624,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,780,492 UART: [rt]cmd =0x41544d4e, len=14344
29,711,337 >>> mbox cmd response data (8 bytes)
29,711,914 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,742,642 UART: [rt]cmd =0x41545348, len=116
29,762,072 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,580 UART:
192,969 UART: Running Caliptra ROM ...
194,157 UART:
603,701 UART: [state] CFI Enabled
618,567 UART: [state] LifecycleState = Unprovisioned
620,440 UART: [state] DebugLocked = No
622,034 UART: [state] WD Timer not started. Device not locked for debugging
626,125 UART: [kat] SHA2-256
805,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,855 UART: [kat] ++
817,381 UART: [kat] sha1
828,214 UART: [kat] SHA2-256
831,258 UART: [kat] SHA2-384
838,310 UART: [kat] SHA2-512-ACC
841,305 UART: [kat] ECC-384
3,281,435 UART: [kat] HMAC-384Kdf
3,293,243 UART: [kat] LMS
3,822,766 UART: [kat] --
3,829,534 UART: [cold-reset] ++
3,830,757 UART: [fht] FHT @ 0x50003400
3,842,366 UART: [idev] ++
3,842,919 UART: [idev] CDI.KEYID = 6
3,843,818 UART: [idev] SUBJECT.KEYID = 7
3,845,052 UART: [idev] UDS.KEYID = 0
3,845,967 ready_for_fw is high
3,846,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,859 UART: [idev] Erasing UDS.KEYID = 0
6,317,224 UART: [idev] Sha1 KeyId Algorithm
6,340,016 UART: [idev] --
6,343,356 UART: [ldev] ++
6,344,119 UART: [ldev] CDI.KEYID = 6
6,345,035 UART: [ldev] SUBJECT.KEYID = 5
6,346,127 UART: [ldev] AUTHORITY.KEYID = 7
6,347,312 UART: [ldev] FE.KEYID = 1
6,358,706 UART: [ldev] Erasing FE.KEYID = 1
8,834,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,185 UART: [ldev] --
10,623,532 UART: [fwproc] Wait for Commands...
10,625,457 UART: [fwproc] Recv command 0x46574c44
10,627,537 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,275 >>> mbox cmd response: success
14,501,768 UART: [afmc] ++
14,502,387 UART: [afmc] CDI.KEYID = 6
14,503,296 UART: [afmc] SUBJECT.KEYID = 7
14,504,524 UART: [afmc] AUTHORITY.KEYID = 5
17,006,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,483 UART: [afmc] --
18,803,136 UART: [cold-reset] --
18,807,045 UART: [state] Locking Datavault
18,812,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,091 UART: [state] Locking ICCM
18,815,800 UART: [exit] Launching FMC @ 0x40000130
18,824,192 UART:
18,824,493 UART: Running Caliptra FMC ...
18,825,601 UART:
18,825,757 UART: [state] CFI Enabled
18,833,747 UART: [fht] FMC Alias Private Key: 7
20,590,540 UART: [art] Extend RT PCRs Done
20,591,756 UART: [art] Lock RT PCRs Done
20,593,542 UART: [art] Populate DV Done
20,598,889 UART: [fht] FMC Alias Private Key: 7
20,600,580 UART: [art] Derive CDI
20,601,383 UART: [art] Store in in slot 0x4
20,643,749 UART: [art] Derive Key Pair
20,644,740 UART: [art] Store priv key in slot 0x5
23,071,955 UART: [art] Derive Key Pair - Done
23,085,225 UART: [art] Signing Cert with AUTHO
23,086,529 UART: RITY.KEYID = 7
24,792,346 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,871 UART: [art] PUB.X = 11861B5460EB4F1E570160D4AB2EC5C2DCCBF845CFD198BE3EB212C684355ED619D0BE5F8FC17E2BEE60063E9A456EE1
24,801,165 UART: [art] PUB.Y = FAA66F5F3336BCDDD3C7CDBA0350415B6C664B38B0818793B3D52C7292C6D25B78E2C5B00467DEB5CF8F6003EAD57ED7
24,808,431 UART: [art] SIG.R = 240A3F164BEA020708D880143196404F301BC0FEA1C9EB20BFA4CD3BBD331D8081C4E6A5AFD7CE768B67A0176DFB39E3
24,815,860 UART: [art] SIG.S = C4218A0DE7103E1FCA7441726C839F7EE7B2F0D7BE85A08DC16859DBB84076901A5E3D6AB7646ED682BA78EB4FF749C5
25,794,670 UART: Caliptra RT
25,795,360 UART: [state] CFI Enabled
25,913,150 UART: [rt] RT listening for mailbox commands...
25,915,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,071,058 UART: [rt]cmd =0x41544d4e, len=14344
30,001,770 >>> mbox cmd response data (8 bytes)
30,002,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,032,934 UART: [rt]cmd =0x41545348, len=116
30,053,206 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,699,315 ready_for_fw is high
3,699,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,300 >>> mbox cmd response: success
18,528,461 UART:
18,528,870 UART: Running Caliptra FMC ...
18,530,004 UART:
18,530,165 UART: [state] CFI Enabled
18,538,093 UART: [fht] FMC Alias Private Key: 7
20,294,530 UART: [art] Extend RT PCRs Done
20,295,730 UART: [art] Lock RT PCRs Done
20,297,158 UART: [art] Populate DV Done
20,302,660 UART: [fht] FMC Alias Private Key: 7
20,304,358 UART: [art] Derive CDI
20,305,170 UART: [art] Store in in slot 0x4
20,347,809 UART: [art] Derive Key Pair
20,348,876 UART: [art] Store priv key in slot 0x5
22,775,567 UART: [art] Derive Key Pair - Done
22,788,402 UART: [art] Signing Cert with AUTHO
22,789,702 UART: RITY.KEYID = 7
24,495,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,730 UART: [art] PUB.X = 1F8AD8BF2749E2B9D6AFABFB8A6A7AA4C552AD811B6498760734EA47411E4C642CE6158891A5E601147C1656B1C43D14
24,503,966 UART: [art] PUB.Y = C9475C2B749BE808AADD215CCB48851549351986E7660B85EE882D7BFCA5349F8106B264B79977E090CE7B8CBB56B577
24,511,206 UART: [art] SIG.R = 6E4594BB5FA2DEB524D73E913FB600E8A3C7AAF38A5E13D3A86908905255F5A76EBD9AB4C35819FAD47FA9466C6F3744
24,518,580 UART: [art] SIG.S = 528D50688C6CC971AC936C825B59634EA51CAF9E161C390002BE98E071730E60E983C039C566B5C1AEE6669C51C672F3
25,497,410 UART: Caliptra RT
25,498,104 UART: [state] CFI Enabled
25,615,452 UART: [rt] RT listening for mailbox commands...
25,617,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,773,028 UART: [rt]cmd =0x41544d4e, len=14344
29,703,463 >>> mbox cmd response data (8 bytes)
29,704,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,734,711 UART: [rt]cmd =0x41545348, len=116
29,754,411 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,104 UART:
192,494 UART: Running Caliptra ROM ...
193,650 UART:
193,800 UART: [state] CFI Enabled
264,784 UART: [state] LifecycleState = Unprovisioned
267,209 UART: [state] DebugLocked = No
268,875 UART: [state] WD Timer not started. Device not locked for debugging
272,625 UART: [kat] SHA2-256
462,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,049 UART: [kat] ++
473,501 UART: [kat] sha1
485,723 UART: [kat] SHA2-256
488,799 UART: [kat] SHA2-384
496,090 UART: [kat] SHA2-512-ACC
498,709 UART: [kat] ECC-384
2,947,850 UART: [kat] HMAC-384Kdf
2,972,385 UART: [kat] LMS
3,504,130 UART: [kat] --
3,508,503 UART: [cold-reset] ++
3,510,011 UART: [fht] FHT @ 0x50003400
3,522,837 UART: [idev] ++
3,523,551 UART: [idev] CDI.KEYID = 6
3,524,581 UART: [idev] SUBJECT.KEYID = 7
3,525,682 UART: [idev] UDS.KEYID = 0
3,526,610 ready_for_fw is high
3,526,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,755 UART: [idev] Erasing UDS.KEYID = 0
6,029,253 UART: [idev] Sha1 KeyId Algorithm
6,052,277 UART: [idev] --
6,056,647 UART: [ldev] ++
6,057,322 UART: [ldev] CDI.KEYID = 6
6,058,209 UART: [ldev] SUBJECT.KEYID = 5
6,059,423 UART: [ldev] AUTHORITY.KEYID = 7
6,060,678 UART: [ldev] FE.KEYID = 1
6,100,754 UART: [ldev] Erasing FE.KEYID = 1
8,607,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,844 UART: [ldev] --
10,413,334 UART: [fwproc] Wait for Commands...
10,416,494 UART: [fwproc] Recv command 0x46574c44
10,418,810 UART: [fwproc] Recv'd Img size: 114448 bytes
13,869,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,614,262 >>> mbox cmd response: success
14,618,539 UART: [afmc] ++
14,619,263 UART: [afmc] CDI.KEYID = 6
14,620,456 UART: [afmc] SUBJECT.KEYID = 7
14,621,894 UART: [afmc] AUTHORITY.KEYID = 5
17,151,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,728 UART: [afmc] --
18,951,150 UART: [cold-reset] --
18,954,256 UART: [state] Locking Datavault
18,959,560 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,754 UART: [state] Locking ICCM
18,963,685 UART: [exit] Launching FMC @ 0x40000130
18,972,310 UART:
18,972,605 UART: Running Caliptra FMC ...
18,973,719 UART:
18,973,877 UART: [state] CFI Enabled
19,032,503 UART: [fht] FMC Alias Private Key: 7
20,796,111 UART: [art] Extend RT PCRs Done
20,797,333 UART: [art] Lock RT PCRs Done
20,799,051 UART: [art] Populate DV Done
20,804,576 UART: [fht] FMC Alias Private Key: 7
20,806,217 UART: [art] Derive CDI
20,806,954 UART: [art] Store in in slot 0x4
20,865,297 UART: [art] Derive Key Pair
20,866,334 UART: [art] Store priv key in slot 0x5
23,329,430 UART: [art] Derive Key Pair - Done
23,342,377 UART: [art] Signing Cert with AUTHO
23,343,679 UART: RITY.KEYID = 7
25,055,650 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,175 UART: [art] PUB.X = 04FDA668A586DF6DC318B785E15B5602314659CA531B36CE9BC7DD3B5192EFC649344D13E298D5EA0E20C4B58B3560CE
25,064,423 UART: [art] PUB.Y = 7139F9C939DF32D621E112959903F4E264A4606956BF0FBD04CCCF1F7D2D32672C8D6CA04DE5F7E1519C42D25275D158
25,071,708 UART: [art] SIG.R = 0E99F70F8194760773AF87995157324B3151EC2D624DD6B73FADF1BDFA2AD11547174A22F7A7E0D70843AB7BA235DB5B
25,079,041 UART: [art] SIG.S = 83852CCB43A7676D68835C1EE1FD1782BDB52014283A15783FFE25A3D68A8534E6786ED0A2B28C79C171EFD5D0ABE9DB
26,058,484 UART: Caliptra RT
26,059,189 UART: [state] CFI Enabled
26,223,429 UART: [rt] RT listening for mailbox commands...
26,225,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,727 UART: [rt]cmd =0x41544d4e, len=14344
30,312,418 >>> mbox cmd response data (8 bytes)
30,312,997 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,343,572 UART: [rt]cmd =0x41545348, len=116
30,363,788 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,437,091 ready_for_fw is high
3,437,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,485 >>> mbox cmd response: success
19,026,086 UART:
19,026,480 UART: Running Caliptra FMC ...
19,027,675 UART:
19,027,854 UART: [state] CFI Enabled
19,094,228 UART: [fht] FMC Alias Private Key: 7
20,857,358 UART: [art] Extend RT PCRs Done
20,858,599 UART: [art] Lock RT PCRs Done
20,860,067 UART: [art] Populate DV Done
20,865,701 UART: [fht] FMC Alias Private Key: 7
20,867,243 UART: [art] Derive CDI
20,868,007 UART: [art] Store in in slot 0x4
20,926,365 UART: [art] Derive Key Pair
20,927,405 UART: [art] Store priv key in slot 0x5
23,390,432 UART: [art] Derive Key Pair - Done
23,403,708 UART: [art] Signing Cert with AUTHO
23,405,041 UART: RITY.KEYID = 7
25,116,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,723 UART: [art] PUB.X = 7D3E047B64D0EA7E7B6DD6AFEF752A557F172DCFD696B22E23E87D9E9DAD20C7EE28DDF7990290D803FC4D01781E8FD9
25,125,020 UART: [art] PUB.Y = 1E9879D303435EBF38E4CB0245E149FA6ED8D930D35DEAFA8DDFF004C74ECA2771E3ECB37036F193756B5E2946345EDB
25,132,284 UART: [art] SIG.R = BC97EB18B3C3A2E05F7063C1A4F10A48413D76F23CE76AE67B4361A2D57DFDEE5FFBF8EC9119BFDCCE768B4ECF232E36
25,139,734 UART: [art] SIG.S = 251382B7C5BD844C1F7E8B6C3E8A96595431E72A136B5EEF081749A09C0DFF3EDFCD2FDD5C90E871A654EB685126BBF3
26,118,523 UART: Caliptra RT
26,119,241 UART: [state] CFI Enabled
26,283,926 UART: [rt] RT listening for mailbox commands...
26,286,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,442,021 UART: [rt]cmd =0x41544d4e, len=14344
30,372,195 >>> mbox cmd response data (8 bytes)
30,373,566 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,404,533 UART: [rt]cmd =0x41545348, len=116
30,423,588 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,335 UART:
192,699 UART: Running Caliptra ROM ...
193,806 UART:
603,662 UART: [state] CFI Enabled
617,257 UART: [state] LifecycleState = Unprovisioned
619,622 UART: [state] DebugLocked = No
622,127 UART: [state] WD Timer not started. Device not locked for debugging
627,065 UART: [kat] SHA2-256
816,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,746 UART: [kat] ++
828,195 UART: [kat] sha1
839,861 UART: [kat] SHA2-256
842,877 UART: [kat] SHA2-384
850,000 UART: [kat] SHA2-512-ACC
852,579 UART: [kat] ECC-384
3,293,728 UART: [kat] HMAC-384Kdf
3,308,339 UART: [kat] LMS
3,840,180 UART: [kat] --
3,845,692 UART: [cold-reset] ++
3,846,771 UART: [fht] FHT @ 0x50003400
3,857,810 UART: [idev] ++
3,858,517 UART: [idev] CDI.KEYID = 6
3,859,424 UART: [idev] SUBJECT.KEYID = 7
3,860,658 UART: [idev] UDS.KEYID = 0
3,861,577 ready_for_fw is high
3,861,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,469 UART: [idev] Erasing UDS.KEYID = 0
6,341,877 UART: [idev] Sha1 KeyId Algorithm
6,363,803 UART: [idev] --
6,369,659 UART: [ldev] ++
6,370,392 UART: [ldev] CDI.KEYID = 6
6,371,293 UART: [ldev] SUBJECT.KEYID = 5
6,372,443 UART: [ldev] AUTHORITY.KEYID = 7
6,373,664 UART: [ldev] FE.KEYID = 1
6,386,625 UART: [ldev] Erasing FE.KEYID = 1
8,862,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,496 UART: [ldev] --
10,651,317 UART: [fwproc] Wait for Commands...
10,653,569 UART: [fwproc] Recv command 0x46574c44
10,655,836 UART: [fwproc] Recv'd Img size: 114448 bytes
14,112,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,853,205 >>> mbox cmd response: success
14,857,336 UART: [afmc] ++
14,858,035 UART: [afmc] CDI.KEYID = 6
14,859,229 UART: [afmc] SUBJECT.KEYID = 7
14,860,664 UART: [afmc] AUTHORITY.KEYID = 5
17,364,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,087,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,089,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,104,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,119,773 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,134,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,685 UART: [afmc] --
19,161,845 UART: [cold-reset] --
19,164,738 UART: [state] Locking Datavault
19,171,073 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,220 UART: [state] Locking ICCM
19,175,752 UART: [exit] Launching FMC @ 0x40000130
19,184,432 UART:
19,184,660 UART: Running Caliptra FMC ...
19,185,753 UART:
19,185,903 UART: [state] CFI Enabled
19,194,101 UART: [fht] FMC Alias Private Key: 7
20,951,055 UART: [art] Extend RT PCRs Done
20,952,277 UART: [art] Lock RT PCRs Done
20,953,681 UART: [art] Populate DV Done
20,958,932 UART: [fht] FMC Alias Private Key: 7
20,960,624 UART: [art] Derive CDI
20,961,435 UART: [art] Store in in slot 0x4
21,003,580 UART: [art] Derive Key Pair
21,004,659 UART: [art] Store priv key in slot 0x5
23,430,676 UART: [art] Derive Key Pair - Done
23,443,343 UART: [art] Signing Cert with AUTHO
23,444,635 UART: RITY.KEYID = 7
25,149,960 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,461 UART: [art] PUB.X = 2D19E19E93CBED94520EDC5916097650BD2BC0E48A993EE468DFC4C846855A9DA53A1F1B011DC423F94A93B8397E5AD2
25,158,736 UART: [art] PUB.Y = 4D4B9DD8796D9C517AE721CF8F45A8F455F599B7698C50B32D67A4A61C9752AE343B8EB6255263B7F2B433FAB9D1977D
25,166,004 UART: [art] SIG.R = E851AD813A6FD94BA1E18D0884B8FA6C262D1B568938DF0674FE591818E88C3A13574461BF88A56C7CDB909A8F6911C5
25,173,432 UART: [art] SIG.S = 84B340A8D2DF9CD99EBB45B37D88B03FA281191F47596EE952021FE9E678A85F12E8E11FAFF54DD45E9E4FEE79AFADCC
26,151,982 UART: Caliptra RT
26,152,702 UART: [state] CFI Enabled
26,269,464 UART: [rt] RT listening for mailbox commands...
26,271,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,427,259 UART: [rt]cmd =0x41544d4e, len=14344
30,358,179 >>> mbox cmd response data (8 bytes)
30,358,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,389,546 UART: [rt]cmd =0x41545348, len=116
30,409,024 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,755,003 ready_for_fw is high
3,755,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,667 >>> mbox cmd response: success
19,220,777 UART:
19,221,189 UART: Running Caliptra FMC ...
19,222,290 UART:
19,222,444 UART: [state] CFI Enabled
19,230,534 UART: [fht] FMC Alias Private Key: 7
20,986,908 UART: [art] Extend RT PCRs Done
20,988,131 UART: [art] Lock RT PCRs Done
20,989,728 UART: [art] Populate DV Done
20,995,082 UART: [fht] FMC Alias Private Key: 7
20,996,745 UART: [art] Derive CDI
20,997,560 UART: [art] Store in in slot 0x4
21,040,366 UART: [art] Derive Key Pair
21,041,363 UART: [art] Store priv key in slot 0x5
23,467,936 UART: [art] Derive Key Pair - Done
23,480,602 UART: [art] Signing Cert with AUTHO
23,481,900 UART: RITY.KEYID = 7
25,187,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,934 UART: [art] PUB.X = 74E83501A577D02E6130442B11308ABC83DFBEC8AC6391104B9D55BD27F41341E056E6294D012B45E072C64799573548
25,196,161 UART: [art] PUB.Y = 53257BB2C48AAA2F48305FD557D9D32A291EFC4E9683F568F9E7749DEF50EB7A00759C31D15FCE78195727A62078297D
25,203,391 UART: [art] SIG.R = 1241F94CC9D543233B2230D0A6E10041F40E7DAE63D139CBA846BF5112610085EE07D3E17D2D91A4692A7620FB3B3513
25,210,804 UART: [art] SIG.S = 527D69E1B33419FEBEAAE04E0FB1526BF770F7611CFE12A4349ACD9DC9137F9EB404669333046F8B054FAB184E6C3733
26,189,485 UART: Caliptra RT
26,190,182 UART: [state] CFI Enabled
26,307,097 UART: [rt] RT listening for mailbox commands...
26,309,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,039 UART: [rt]cmd =0x41544d4e, len=14344
30,395,941 >>> mbox cmd response data (8 bytes)
30,396,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,427,323 UART: [rt]cmd =0x41545348, len=116
30,447,381 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,356 UART: [kat] SHA2-512-ACC
897,257 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,689 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,986 UART: [idev] ++
1,480,154 UART: [idev] CDI.KEYID = 6
1,480,514 UART: [idev] SUBJECT.KEYID = 7
1,480,938 UART: [idev] UDS.KEYID = 0
1,481,283 ready_for_fw is high
1,481,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,505,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,080 UART: [idev] --
1,515,015 UART: [ldev] ++
1,515,183 UART: [ldev] CDI.KEYID = 6
1,515,546 UART: [ldev] SUBJECT.KEYID = 5
1,515,972 UART: [ldev] AUTHORITY.KEYID = 7
1,516,435 UART: [ldev] FE.KEYID = 1
1,521,523 UART: [ldev] Erasing FE.KEYID = 1
1,547,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,294 UART: [ldev] --
1,586,669 UART: [fwproc] Waiting for Commands...
1,587,408 UART: [fwproc] Received command 0x46574c44
1,588,199 UART: [fwproc] Received Image of size 114448 bytes
2,887,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,584 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,027 >>> mbox cmd response: success
3,081,151 UART: [afmc] ++
3,081,319 UART: [afmc] CDI.KEYID = 6
3,081,681 UART: [afmc] SUBJECT.KEYID = 7
3,082,106 UART: [afmc] AUTHORITY.KEYID = 5
3,117,059 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,910 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,600 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,487 UART: [afmc] --
3,160,467 UART: [cold-reset] --
3,161,245 UART: [state] Locking Datavault
3,162,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,364 UART: [state] Locking ICCM
3,163,902 UART: [exit] Launching FMC @ 0x40000130
3,169,231 UART:
3,169,247 UART: Running Caliptra FMC ...
3,169,655 UART:
3,169,709 UART: [state] CFI Enabled
3,180,422 UART: [fht] FMC Alias Private Key: 7
3,288,083 UART: [art] Extend RT PCRs Done
3,288,511 UART: [art] Lock RT PCRs Done
3,290,013 UART: [art] Populate DV Done
3,298,150 UART: [fht] FMC Alias Private Key: 7
3,299,100 UART: [art] Derive CDI
3,299,380 UART: [art] Store in in slot 0x4
3,385,113 UART: [art] Derive Key Pair
3,385,473 UART: [art] Store priv key in slot 0x5
3,398,811 UART: [art] Derive Key Pair - Done
3,413,478 UART: [art] Signing Cert with AUTHO
3,413,958 UART: RITY.KEYID = 7
3,429,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,159 UART: [art] PUB.X = B218A4FCA574C68B423849576ED1AF19951A4B108838511EF3AF23736E6A9E8F7648B6EE7A8C3AA4A47693527A1EF936
3,436,931 UART: [art] PUB.Y = F1767DB319383D95F36672F159257568A1A54E8FDBFCA78F7A65E39634273B3C834A342E20139DA7587FDC59E0FBF713
3,443,881 UART: [art] SIG.R = 7DCADEEF369C568918FFF62A9B8EBD3302C87F415FDA990935659347911B7B74294EF75051624E5185FB8BCA6AA8492C
3,450,651 UART: [art] SIG.S = 7B741FC81176AA0520361FC728B7A959ACE99B4FFC404BCF746AF9306FBD6BE864645AB638657064589731A7DFCF2B4D
3,474,623 UART: Caliptra RT
3,474,876 UART: [state] CFI Enabled
3,583,324 UART: [rt] RT listening for mailbox commands...
3,583,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,972 UART: [rt]cmd =0x41544d4e, len=14344
3,851,430 >>> mbox cmd response data (8 bytes)
3,851,431 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,444 UART: [rt]cmd =0x41545348, len=116
3,903,520 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,205 ready_for_fw is high
1,363,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,567 >>> mbox cmd response: success
2,990,437 UART:
2,990,453 UART: Running Caliptra FMC ...
2,990,861 UART:
2,990,915 UART: [state] CFI Enabled
3,001,330 UART: [fht] FMC Alias Private Key: 7
3,108,863 UART: [art] Extend RT PCRs Done
3,109,291 UART: [art] Lock RT PCRs Done
3,111,121 UART: [art] Populate DV Done
3,119,356 UART: [fht] FMC Alias Private Key: 7
3,120,454 UART: [art] Derive CDI
3,120,734 UART: [art] Store in in slot 0x4
3,206,263 UART: [art] Derive Key Pair
3,206,623 UART: [art] Store priv key in slot 0x5
3,220,107 UART: [art] Derive Key Pair - Done
3,234,901 UART: [art] Signing Cert with AUTHO
3,235,381 UART: RITY.KEYID = 7
3,250,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,222 UART: [art] PUB.X = DDC8BE4B0BFA48742E3E1323463882EF53930B1373399C90D2FA449A19536701DCABE01571FDB86951912F12FEDE0306
3,257,979 UART: [art] PUB.Y = D9E5232B3FE92A3A68726A9A23E27DA3EEDD9E43DA82F51041F1C0956E38B0B6CE53A1CFE5E342A0DF325A1CE1931D4D
3,264,947 UART: [art] SIG.R = 9949AA9D370D43D275A89E4BDDC4AFCE1C7BE817CA35D44D8F3EDA60581FEBD0AB29C0643492389097424ACF10FF498A
3,271,730 UART: [art] SIG.S = 6A2EF49A07ECD18494A5CDC40D107E103106902A0B890E4A761B19335268C257C316DA5C0F936869045FAD2702FF125C
3,295,515 UART: Caliptra RT
3,295,768 UART: [state] CFI Enabled
3,403,747 UART: [rt] RT listening for mailbox commands...
3,404,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,427 UART: [rt]cmd =0x41544d4e, len=14344
3,672,067 >>> mbox cmd response data (8 bytes)
3,672,068 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,167 UART: [rt]cmd =0x41545348, len=116
3,724,559 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,882 UART: [kat] SHA2-256
881,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,928 UART: [kat] ++
886,080 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,081 UART: [kat] SHA2-512-ACC
896,982 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,131 UART: [kat] LMS
1,475,327 UART: [kat] --
1,476,314 UART: [cold-reset] ++
1,476,676 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 ready_for_fw is high
1,480,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,353 UART: [idev] Erasing UDS.KEYID = 0
1,505,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,080 UART: [ldev] ++
1,515,248 UART: [ldev] CDI.KEYID = 6
1,515,611 UART: [ldev] SUBJECT.KEYID = 5
1,516,037 UART: [ldev] AUTHORITY.KEYID = 7
1,516,500 UART: [ldev] FE.KEYID = 1
1,521,880 UART: [ldev] Erasing FE.KEYID = 1
1,547,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,309 UART: [ldev] --
1,586,740 UART: [fwproc] Waiting for Commands...
1,587,583 UART: [fwproc] Received command 0x46574c44
1,588,374 UART: [fwproc] Received Image of size 114448 bytes
2,887,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,271 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,623 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,642 >>> mbox cmd response: success
3,080,904 UART: [afmc] ++
3,081,072 UART: [afmc] CDI.KEYID = 6
3,081,434 UART: [afmc] SUBJECT.KEYID = 7
3,081,859 UART: [afmc] AUTHORITY.KEYID = 5
3,116,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,656 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,269 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,959 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,000 UART: [afmc] --
3,159,954 UART: [cold-reset] --
3,160,874 UART: [state] Locking Datavault
3,161,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,559 UART: [state] Locking ICCM
3,163,001 UART: [exit] Launching FMC @ 0x40000130
3,168,330 UART:
3,168,346 UART: Running Caliptra FMC ...
3,168,754 UART:
3,168,897 UART: [state] CFI Enabled
3,179,422 UART: [fht] FMC Alias Private Key: 7
3,287,305 UART: [art] Extend RT PCRs Done
3,287,733 UART: [art] Lock RT PCRs Done
3,289,309 UART: [art] Populate DV Done
3,297,572 UART: [fht] FMC Alias Private Key: 7
3,298,730 UART: [art] Derive CDI
3,299,010 UART: [art] Store in in slot 0x4
3,385,247 UART: [art] Derive Key Pair
3,385,607 UART: [art] Store priv key in slot 0x5
3,399,173 UART: [art] Derive Key Pair - Done
3,414,333 UART: [art] Signing Cert with AUTHO
3,414,813 UART: RITY.KEYID = 7
3,429,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,554 UART: [art] PUB.X = 72BD7801C9DE2773D2857285E8EACBE9399DD5B858A38741C8255A9DCDF9800C2F8792FB49E6DB259470D3986CAE5C7E
3,437,326 UART: [art] PUB.Y = E0DDB84D05FDC3EBB4A96B5971CA63579B0E51D45FB169D7EA08AB95713822C5CC59BF777D433671D18CE874CE1BF594
3,444,281 UART: [art] SIG.R = 0E15A6B5E989ECF0179548BEB4156F623CAB4BC4C2F63C6ED1B31D26DA5FD9A7DED6ED7F8A7645ED8C7355FDCF71E729
3,451,072 UART: [art] SIG.S = 3ACC25E5D8F3C2F8A13654FAD00A41C9E662C82829BEA3B046D3ACD262993084D0FAA145BA49628FD126CF2583ED2A7E
3,474,938 UART: Caliptra RT
3,475,283 UART: [state] CFI Enabled
3,582,891 UART: [rt] RT listening for mailbox commands...
3,583,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,673 UART: [rt]cmd =0x41544d4e, len=14344
3,851,807 >>> mbox cmd response data (8 bytes)
3,851,808 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,839 UART: [rt]cmd =0x41545348, len=116
3,903,675 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,678 ready_for_fw is high
1,362,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,802 >>> mbox cmd response: success
2,991,702 UART:
2,991,718 UART: Running Caliptra FMC ...
2,992,126 UART:
2,992,269 UART: [state] CFI Enabled
3,002,530 UART: [fht] FMC Alias Private Key: 7
3,110,745 UART: [art] Extend RT PCRs Done
3,111,173 UART: [art] Lock RT PCRs Done
3,112,645 UART: [art] Populate DV Done
3,121,156 UART: [fht] FMC Alias Private Key: 7
3,122,266 UART: [art] Derive CDI
3,122,546 UART: [art] Store in in slot 0x4
3,208,579 UART: [art] Derive Key Pair
3,208,939 UART: [art] Store priv key in slot 0x5
3,222,309 UART: [art] Derive Key Pair - Done
3,237,255 UART: [art] Signing Cert with AUTHO
3,237,735 UART: RITY.KEYID = 7
3,252,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,224 UART: [art] PUB.X = 4930D3776BAEB2791E7CC98B0864DE985AA62C52F1ED5EC743E1E2B6BE64E661B9966395A145238B2964A532EA68423F
3,259,993 UART: [art] PUB.Y = 72170C4176669EA2D2F43E6BBBB3D4EDCBE0AB8F841193C8C67347E37D54BCA42878F1B702C72E07B93B72CB83769404
3,266,937 UART: [art] SIG.R = C55D18CFC7949A56BAB6C800D1EAE791BABE426760AC0FD39B2F84074088F63B980271510DD5C6D6A78C05E0F67816CF
3,273,680 UART: [art] SIG.S = 6C5290D61A18A36493D087741F9D8EAF72D422A14A747C7708A179CE028108D218048D0DE63613A1A1DAA3C65557C32F
3,297,762 UART: Caliptra RT
3,298,107 UART: [state] CFI Enabled
3,407,202 UART: [rt] RT listening for mailbox commands...
3,407,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,770 UART: [rt]cmd =0x41544d4e, len=14344
3,676,138 >>> mbox cmd response data (8 bytes)
3,676,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,432 UART: [rt]cmd =0x41545348, len=116
3,727,524 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
901,941 UART: [kat] SHA2-256
903,881 UART: [kat] SHA2-384
906,768 UART: [kat] SHA2-512-ACC
908,669 UART: [kat] ECC-384
918,574 UART: [kat] HMAC-384Kdf
923,380 UART: [kat] LMS
1,171,708 UART: [kat] --
1,172,533 UART: [cold-reset] ++
1,173,093 UART: [fht] FHT @ 0x50003400
1,175,772 UART: [idev] ++
1,175,940 UART: [idev] CDI.KEYID = 6
1,176,300 UART: [idev] SUBJECT.KEYID = 7
1,176,724 UART: [idev] UDS.KEYID = 0
1,177,069 ready_for_fw is high
1,177,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,806 UART: [idev] Erasing UDS.KEYID = 0
1,201,425 UART: [idev] Sha1 KeyId Algorithm
1,209,959 UART: [idev] --
1,210,877 UART: [ldev] ++
1,211,045 UART: [ldev] CDI.KEYID = 6
1,211,408 UART: [ldev] SUBJECT.KEYID = 5
1,211,834 UART: [ldev] AUTHORITY.KEYID = 7
1,212,297 UART: [ldev] FE.KEYID = 1
1,217,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,598 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,978 >>> mbox cmd response: success
2,776,234 UART: [afmc] ++
2,776,402 UART: [afmc] CDI.KEYID = 6
2,776,764 UART: [afmc] SUBJECT.KEYID = 7
2,777,189 UART: [afmc] AUTHORITY.KEYID = 5
2,812,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,323 UART: [afmc] --
2,856,359 UART: [cold-reset] --
2,857,321 UART: [state] Locking Datavault
2,858,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,076 UART: [state] Locking ICCM
2,859,532 UART: [exit] Launching FMC @ 0x40000130
2,864,861 UART:
2,864,877 UART: Running Caliptra FMC ...
2,865,285 UART:
2,865,339 UART: [state] CFI Enabled
2,876,036 UART: [fht] FMC Alias Private Key: 7
2,983,515 UART: [art] Extend RT PCRs Done
2,983,943 UART: [art] Lock RT PCRs Done
2,985,363 UART: [art] Populate DV Done
2,993,402 UART: [fht] FMC Alias Private Key: 7
2,994,424 UART: [art] Derive CDI
2,994,704 UART: [art] Store in in slot 0x4
3,080,435 UART: [art] Derive Key Pair
3,080,795 UART: [art] Store priv key in slot 0x5
3,093,707 UART: [art] Derive Key Pair - Done
3,108,521 UART: [art] Signing Cert with AUTHO
3,109,001 UART: RITY.KEYID = 7
3,124,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,566 UART: [art] PUB.X = 0B844590EC837575EFC33AF76A5A0AF46EB962ACD2E9299AF3FB6CA7400ECFA72FD229BA9199E4FCCB636DABA4696A70
3,132,349 UART: [art] PUB.Y = 46E87BC33582646BE0780BC01E1A9BE1C64854E5DC87508A6B810775340487E98785997C57BAF9917A328EF0470130B8
3,139,277 UART: [art] SIG.R = BA8506C46ECBD8AAB29E160748FFC016572F78A4C0BB630D1B3FDC7F5E8AEA62DDD688112DBC5D986C1FCF66623AB844
3,146,060 UART: [art] SIG.S = 91B3EE2E8EA3B321E2A088E9B8C501A5B801C697F325F2E83A0123D72519676B6C33798CE755DE99265270DDDF31DEA0
3,169,870 UART: Caliptra RT
3,170,123 UART: [state] CFI Enabled
3,277,891 UART: [rt] RT listening for mailbox commands...
3,278,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,323 UART: [rt]cmd =0x41544d4e, len=14344
3,546,561 >>> mbox cmd response data (8 bytes)
3,546,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,769 UART: [rt]cmd =0x41545348, len=116
3,599,143 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,793 ready_for_fw is high
1,060,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,523 >>> mbox cmd response: success
2,691,835 UART:
2,691,851 UART: Running Caliptra FMC ...
2,692,259 UART:
2,692,313 UART: [state] CFI Enabled
2,702,694 UART: [fht] FMC Alias Private Key: 7
2,810,765 UART: [art] Extend RT PCRs Done
2,811,193 UART: [art] Lock RT PCRs Done
2,813,091 UART: [art] Populate DV Done
2,821,256 UART: [fht] FMC Alias Private Key: 7
2,822,392 UART: [art] Derive CDI
2,822,672 UART: [art] Store in in slot 0x4
2,908,185 UART: [art] Derive Key Pair
2,908,545 UART: [art] Store priv key in slot 0x5
2,921,813 UART: [art] Derive Key Pair - Done
2,936,531 UART: [art] Signing Cert with AUTHO
2,937,011 UART: RITY.KEYID = 7
2,952,305 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,070 UART: [art] PUB.X = 4AC0F55F9FD1F1066EA90DDC46641B12F09CFD2181C2AEC3073DDE7B0AB3C2F80E380420DD6EC837B272EDC8AABE0125
2,959,841 UART: [art] PUB.Y = 38B48407AAC2746944FD192C5E8D9CD9AC6E3CED82862EFE124E39CAA84F489DDA90CE5C7BEE0CF7E4DC8F5D46F80A3B
2,966,808 UART: [art] SIG.R = F9DD71C456E861A9C7BCEC8E7F673B28EFD59ADF9716CEF75A5A66652BCEED1BC018117A3CE0C604324DB2A9CEF16E02
2,973,596 UART: [art] SIG.S = 12AD8B75A311AE70E9B375E74F4EBDAEF778340727FDB8294146F040172285524B98C14B5B51CCCFEA3E02B2B72ED486
2,997,257 UART: Caliptra RT
2,997,510 UART: [state] CFI Enabled
3,105,551 UART: [rt] RT listening for mailbox commands...
3,106,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,139 UART: [rt]cmd =0x41544d4e, len=14344
3,374,039 >>> mbox cmd response data (8 bytes)
3,374,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,951 UART: [rt]cmd =0x41545348, len=116
3,426,375 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,613 UART: [kat] LMS
1,170,941 UART: [kat] --
1,171,772 UART: [cold-reset] ++
1,172,140 UART: [fht] FHT @ 0x50003400
1,174,817 UART: [idev] ++
1,174,985 UART: [idev] CDI.KEYID = 6
1,175,345 UART: [idev] SUBJECT.KEYID = 7
1,175,769 UART: [idev] UDS.KEYID = 0
1,176,114 ready_for_fw is high
1,176,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,889 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,574 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,174 UART: [ldev] Erasing FE.KEYID = 1
1,243,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,038 UART: [ldev] --
1,283,317 UART: [fwproc] Wait for Commands...
1,284,019 UART: [fwproc] Recv command 0x46574c44
1,284,747 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,985 >>> mbox cmd response: success
2,779,053 UART: [afmc] ++
2,779,221 UART: [afmc] CDI.KEYID = 6
2,779,583 UART: [afmc] SUBJECT.KEYID = 7
2,780,008 UART: [afmc] AUTHORITY.KEYID = 5
2,815,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,216 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,988 UART: [afmc] --
2,858,920 UART: [cold-reset] --
2,859,884 UART: [state] Locking Datavault
2,861,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,627 UART: [state] Locking ICCM
2,862,263 UART: [exit] Launching FMC @ 0x40000130
2,867,592 UART:
2,867,608 UART: Running Caliptra FMC ...
2,868,016 UART:
2,868,159 UART: [state] CFI Enabled
2,878,826 UART: [fht] FMC Alias Private Key: 7
2,987,089 UART: [art] Extend RT PCRs Done
2,987,517 UART: [art] Lock RT PCRs Done
2,988,973 UART: [art] Populate DV Done
2,997,272 UART: [fht] FMC Alias Private Key: 7
2,998,364 UART: [art] Derive CDI
2,998,644 UART: [art] Store in in slot 0x4
3,084,109 UART: [art] Derive Key Pair
3,084,469 UART: [art] Store priv key in slot 0x5
3,097,599 UART: [art] Derive Key Pair - Done
3,112,095 UART: [art] Signing Cert with AUTHO
3,112,575 UART: RITY.KEYID = 7
3,128,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,936 UART: [art] PUB.X = 9E714E9A254DA243FAB9654A26ECDB0BC28055BC3B8380EA2F08AA4311A72BEBC08099FE25ED5ED144DDFEABB120C931
3,135,722 UART: [art] PUB.Y = A4231D382F19AACEA7776C4777CDD8C9DEDFC818202D3682935B65A825A7568B2EC90A1E85D2830BAF4518828F4141ED
3,142,672 UART: [art] SIG.R = 78F4521088B97545C184D0313F4D4B3465837AE630CC1B5C1942A2C4CABEC0977A0DCD6A3776991AFAF70FF82C026322
3,149,435 UART: [art] SIG.S = DBB456810B6E30A6509B3B7654760C801081E4C72CDF0C4959AF2533B02057A94FA048297D36975BF265EF98B6B93EA1
3,173,183 UART: Caliptra RT
3,173,528 UART: [state] CFI Enabled
3,280,581 UART: [rt] RT listening for mailbox commands...
3,281,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,245 UART: [rt]cmd =0x41544d4e, len=14344
3,549,057 >>> mbox cmd response data (8 bytes)
3,549,058 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,927 UART: [rt]cmd =0x41545348, len=116
3,601,465 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 ready_for_fw is high
1,060,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,342 >>> mbox cmd response: success
2,691,440 UART:
2,691,456 UART: Running Caliptra FMC ...
2,691,864 UART:
2,692,007 UART: [state] CFI Enabled
2,702,316 UART: [fht] FMC Alias Private Key: 7
2,810,801 UART: [art] Extend RT PCRs Done
2,811,229 UART: [art] Lock RT PCRs Done
2,812,553 UART: [art] Populate DV Done
2,820,756 UART: [fht] FMC Alias Private Key: 7
2,821,712 UART: [art] Derive CDI
2,821,992 UART: [art] Store in in slot 0x4
2,908,069 UART: [art] Derive Key Pair
2,908,429 UART: [art] Store priv key in slot 0x5
2,921,807 UART: [art] Derive Key Pair - Done
2,936,548 UART: [art] Signing Cert with AUTHO
2,937,028 UART: RITY.KEYID = 7
2,951,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,365 UART: [art] PUB.X = D683AFAAE7E356EC8462380C1D39037349BAD0E3796CCBA34CA182419E2D11C49AEC170C9D21D00712BB66E74FD4EF78
2,959,135 UART: [art] PUB.Y = 0BD44CD8031A1D84ECEBD79A6B9169A32E13C454499F7D96023B31FFDF67EA03318186BDD9583B2102F5D895F372E156
2,966,074 UART: [art] SIG.R = 22D354D6489674CA48ECD1AF4D152B6E512A27F38C2B02310C14851307F30E81E69B9749FFA9845C18DA81424BF73F3C
2,972,832 UART: [art] SIG.S = D98F438F104704E68363DAFE044D109D16C3A1A1E8F543B288A53B0277927AB2392C7F7B9282A949E54C8865E3954E26
2,996,346 UART: Caliptra RT
2,996,691 UART: [state] CFI Enabled
3,104,634 UART: [rt] RT listening for mailbox commands...
3,105,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,578 UART: [rt]cmd =0x41544d4e, len=14344
3,372,886 >>> mbox cmd response data (8 bytes)
3,372,887 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,082 UART: [rt]cmd =0x41545348, len=116
3,424,958 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
914,928 UART: [kat] HMAC-384Kdf
919,564 UART: [kat] LMS
1,167,876 UART: [kat] --
1,168,893 UART: [cold-reset] ++
1,169,419 UART: [fht] FHT @ 0x50003400
1,172,077 UART: [idev] ++
1,172,245 UART: [idev] CDI.KEYID = 6
1,172,606 UART: [idev] SUBJECT.KEYID = 7
1,173,031 UART: [idev] UDS.KEYID = 0
1,173,377 ready_for_fw is high
1,173,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,597 UART: [idev] Erasing UDS.KEYID = 0
1,197,059 UART: [idev] Sha1 KeyId Algorithm
1,206,055 UART: [idev] --
1,207,204 UART: [ldev] ++
1,207,372 UART: [ldev] CDI.KEYID = 6
1,207,736 UART: [ldev] SUBJECT.KEYID = 5
1,208,163 UART: [ldev] AUTHORITY.KEYID = 7
1,208,626 UART: [ldev] FE.KEYID = 1
1,213,932 UART: [ldev] Erasing FE.KEYID = 1
1,239,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,269,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,276,874 UART: [ldev] --
1,278,250 UART: [fwproc] Wait for Commands...
1,278,977 UART: [fwproc] Recv command 0x46574c44
1,279,710 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,024 >>> mbox cmd response: success
2,772,171 UART: [afmc] ++
2,772,339 UART: [afmc] CDI.KEYID = 6
2,772,702 UART: [afmc] SUBJECT.KEYID = 7
2,773,128 UART: [afmc] AUTHORITY.KEYID = 5
2,808,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,050 UART: [afmc] --
2,852,170 UART: [cold-reset] --
2,853,080 UART: [state] Locking Datavault
2,854,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,731 UART: [state] Locking ICCM
2,855,317 UART: [exit] Launching FMC @ 0x40000130
2,860,646 UART:
2,860,662 UART: Running Caliptra FMC ...
2,861,070 UART:
2,861,124 UART: [state] CFI Enabled
2,871,741 UART: [fht] FMC Alias Private Key: 7
2,979,476 UART: [art] Extend RT PCRs Done
2,979,904 UART: [art] Lock RT PCRs Done
2,981,738 UART: [art] Populate DV Done
2,990,029 UART: [fht] FMC Alias Private Key: 7
2,991,131 UART: [art] Derive CDI
2,991,411 UART: [art] Store in in slot 0x4
3,077,326 UART: [art] Derive Key Pair
3,077,686 UART: [art] Store priv key in slot 0x5
3,090,834 UART: [art] Derive Key Pair - Done
3,105,496 UART: [art] Signing Cert with AUTHO
3,105,976 UART: RITY.KEYID = 7
3,121,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,161 UART: [art] PUB.X = 2E6598922668895740A0E99092AF09891A350412F3B0DC55B6A8AC5F6D75457E97BF29F81CC7C959A8DF000BA06D0F80
3,128,895 UART: [art] PUB.Y = 530D542D0E9DA31F28FA60D0EACAE8A1B43CF6D750B9AA0B26E9B70C2657401E3ED9ED153CA91814B01F7B48091D82CB
3,135,846 UART: [art] SIG.R = 294355FE670163E9814F55404EE4ADA5E8E755BD097DDD43A6E2E6BA0FFC6FB85C7625B46A7B612FFBED208B390636E8
3,142,616 UART: [art] SIG.S = D9FC9CA7E5F3E474805E53C5E68B916ABF443D63954A8CA334BB1A47AE3B03A3AC0C3B6C25603E94C212253FFDF5E7E9
3,166,855 UART: Caliptra RT
3,167,108 UART: [state] CFI Enabled
3,274,417 UART: [rt] RT listening for mailbox commands...
3,275,087 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,095 UART: [rt]cmd =0x41544d4e, len=14344
3,542,951 >>> mbox cmd response data (8 bytes)
3,542,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,209 UART: [rt]cmd =0x41545348, len=116
3,595,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,768 >>> mbox cmd response: success
2,685,142 UART:
2,685,158 UART: Running Caliptra FMC ...
2,685,566 UART:
2,685,620 UART: [state] CFI Enabled
2,695,849 UART: [fht] FMC Alias Private Key: 7
2,803,186 UART: [art] Extend RT PCRs Done
2,803,614 UART: [art] Lock RT PCRs Done
2,805,034 UART: [art] Populate DV Done
2,813,097 UART: [fht] FMC Alias Private Key: 7
2,814,109 UART: [art] Derive CDI
2,814,389 UART: [art] Store in in slot 0x4
2,900,306 UART: [art] Derive Key Pair
2,900,666 UART: [art] Store priv key in slot 0x5
2,913,172 UART: [art] Derive Key Pair - Done
2,927,972 UART: [art] Signing Cert with AUTHO
2,928,452 UART: RITY.KEYID = 7
2,943,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,067 UART: [art] PUB.X = AA257B0F7C5665F2FBE7F72AA3A24FBFB4E7B6B3C63499534D7419EE0FBBE3EFF1405B37A70A2EDE5AFEDEE99A740FB5
2,950,855 UART: [art] PUB.Y = CDC799C9948E7708105E4A34F56F92919AC1EC299D063BA7F700D833B3CE3A37F99B983D6BFE99E2D78AE843DAB39233
2,957,785 UART: [art] SIG.R = 4AC31BEB20B4DE455B1B27BB54248E2C0B99FDE7A942365EC6B65718EE1D360F8858A8650895D2BF79BA360F17A47824
2,964,549 UART: [art] SIG.S = F62F525EA79B74D7AF14EC2E043CD67784530EFA6770E2A525736F48602A611DB9193D83D07052F2F0AE88506D241B1F
2,988,556 UART: Caliptra RT
2,988,809 UART: [state] CFI Enabled
3,096,784 UART: [rt] RT listening for mailbox commands...
3,097,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,638 UART: [rt]cmd =0x41544d4e, len=14344
3,365,900 >>> mbox cmd response data (8 bytes)
3,365,901 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,836 UART: [rt]cmd =0x41545348, len=116
3,417,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,401 UART: [kat] SHA2-256
891,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,080 UART: [kat] ++
896,232 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 ready_for_fw is high
1,174,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,096 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,255 UART: [ldev] ++
1,209,423 UART: [ldev] CDI.KEYID = 6
1,209,787 UART: [ldev] SUBJECT.KEYID = 5
1,210,214 UART: [ldev] AUTHORITY.KEYID = 7
1,210,677 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,879 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,282,028 UART: [fwproc] Recv command 0x46574c44
1,282,761 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,909 >>> mbox cmd response: success
2,776,128 UART: [afmc] ++
2,776,296 UART: [afmc] CDI.KEYID = 6
2,776,659 UART: [afmc] SUBJECT.KEYID = 7
2,777,085 UART: [afmc] AUTHORITY.KEYID = 5
2,812,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,711 UART: [afmc] --
2,855,677 UART: [cold-reset] --
2,856,395 UART: [state] Locking Datavault
2,857,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,102 UART: [state] Locking ICCM
2,858,648 UART: [exit] Launching FMC @ 0x40000130
2,863,977 UART:
2,863,993 UART: Running Caliptra FMC ...
2,864,401 UART:
2,864,544 UART: [state] CFI Enabled
2,875,353 UART: [fht] FMC Alias Private Key: 7
2,983,484 UART: [art] Extend RT PCRs Done
2,983,912 UART: [art] Lock RT PCRs Done
2,985,402 UART: [art] Populate DV Done
2,993,937 UART: [fht] FMC Alias Private Key: 7
2,994,975 UART: [art] Derive CDI
2,995,255 UART: [art] Store in in slot 0x4
3,080,872 UART: [art] Derive Key Pair
3,081,232 UART: [art] Store priv key in slot 0x5
3,094,576 UART: [art] Derive Key Pair - Done
3,109,405 UART: [art] Signing Cert with AUTHO
3,109,885 UART: RITY.KEYID = 7
3,125,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,090 UART: [art] PUB.X = 0F19051C427FC233A9EAC18330BC107412FC9AC9998A9193A23168CDCDA11819EB738B581B15631B412858B315C4ADF1
3,132,854 UART: [art] PUB.Y = 7292771FD1579C7FB73BF54A1ED743C9E0944B2FB85E40515304696F5A954959FC2FAE26831F53043C11DC1E829B9F04
3,139,793 UART: [art] SIG.R = 3430FC202CE01515071DC9F1C75779A3B5B5FED4217C605A140A95AE3819A8E66E507AA094D7C8C10756A5502321D4E5
3,146,552 UART: [art] SIG.S = 8667C9B5F4B62AEB972E8EAC68FEEAD24A4C1166744DD2DF7A390590ECE9187FB258514DEBB777849253D2A39F0BFCE9
3,170,651 UART: Caliptra RT
3,170,996 UART: [state] CFI Enabled
3,278,967 UART: [rt] RT listening for mailbox commands...
3,279,637 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,463 UART: [rt]cmd =0x41544d4e, len=14344
3,547,511 >>> mbox cmd response data (8 bytes)
3,547,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,439 UART: [rt]cmd =0x41545348, len=116
3,599,017 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,429 ready_for_fw is high
1,056,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,575 >>> mbox cmd response: success
2,687,063 UART:
2,687,079 UART: Running Caliptra FMC ...
2,687,487 UART:
2,687,630 UART: [state] CFI Enabled
2,698,629 UART: [fht] FMC Alias Private Key: 7
2,806,620 UART: [art] Extend RT PCRs Done
2,807,048 UART: [art] Lock RT PCRs Done
2,808,392 UART: [art] Populate DV Done
2,816,715 UART: [fht] FMC Alias Private Key: 7
2,817,785 UART: [art] Derive CDI
2,818,065 UART: [art] Store in in slot 0x4
2,904,096 UART: [art] Derive Key Pair
2,904,456 UART: [art] Store priv key in slot 0x5
2,918,122 UART: [art] Derive Key Pair - Done
2,932,916 UART: [art] Signing Cert with AUTHO
2,933,396 UART: RITY.KEYID = 7
2,948,380 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,145 UART: [art] PUB.X = 8D21C667AB38D13FF735B9E240B8A33E2D3A45AE88D92DEAB35175065DD6FA5D243616422DCA53D39E03AC52CB3ED3CC
2,955,925 UART: [art] PUB.Y = B438BBEE918DFA16C32E5366B5277778ABA706875F6A308776FC1F2BD8028EB4E4ECE476B460F28384FE6D637F1B6CA9
2,962,879 UART: [art] SIG.R = 379CE48FE24C6DB0E48398D7DB02F6311B63775D1D69795E52C49E23FA8E2B421A43D500BAE69DAD9FCB2F5B11A26A6B
2,969,638 UART: [art] SIG.S = 9A8A997EFC6FD13FFDEF20B429CA41ADF089F549E9BCE1CD6C156AA5905102A8E10CEE93EB5557458A4A302C02E0DBFE
2,994,150 UART: Caliptra RT
2,994,495 UART: [state] CFI Enabled
3,102,108 UART: [rt] RT listening for mailbox commands...
3,102,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,038 UART: [rt]cmd =0x41544d4e, len=14344
3,370,974 >>> mbox cmd response data (8 bytes)
3,370,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,868 UART: [rt]cmd =0x41545348, len=116
3,422,802 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,219 UART:
192,581 UART: Running Caliptra ROM ...
193,782 UART:
193,938 UART: [state] CFI Enabled
263,013 UART: [state] LifecycleState = Unprovisioned
264,883 UART: [state] DebugLocked = No
266,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,758 UART: [kat] SHA2-256
441,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,891 UART: [kat] ++
452,510 UART: [kat] sha1
462,756 UART: [kat] SHA2-256
465,479 UART: [kat] SHA2-384
470,829 UART: [kat] SHA2-512-ACC
473,193 UART: [kat] ECC-384
2,767,180 UART: [kat] HMAC-384Kdf
2,800,936 UART: [kat] LMS
3,991,181 UART: [kat] --
3,995,688 UART: [cold-reset] ++
3,998,261 UART: [fht] Storing FHT @ 0x50003400
4,009,748 UART: [idev] ++
4,010,317 UART: [idev] CDI.KEYID = 6
4,011,226 UART: [idev] SUBJECT.KEYID = 7
4,012,474 UART: [idev] UDS.KEYID = 0
4,013,434 ready_for_fw is high
4,013,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,192 UART: [idev] Erasing UDS.KEYID = 0
7,345,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,690 UART: [idev] --
7,373,812 UART: [ldev] ++
7,374,432 UART: [ldev] CDI.KEYID = 6
7,375,446 UART: [ldev] SUBJECT.KEYID = 5
7,376,602 UART: [ldev] AUTHORITY.KEYID = 7
7,377,826 UART: [ldev] FE.KEYID = 1
7,423,204 UART: [ldev] Erasing FE.KEYID = 1
10,759,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,433 UART: [ldev] --
13,135,394 UART: [fwproc] Waiting for Commands...
13,138,369 UART: [fwproc] Received command 0x46574c44
13,140,551 UART: [fwproc] Received Image of size 114124 bytes
17,197,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,661,945 >>> mbox cmd response: success
17,665,886 UART: [afmc] ++
17,666,486 UART: [afmc] CDI.KEYID = 6
17,667,401 UART: [afmc] SUBJECT.KEYID = 7
17,668,671 UART: [afmc] AUTHORITY.KEYID = 5
21,025,925 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,584 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,984 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,848 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,272 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,587 UART: [afmc] --
23,398,601 UART: [cold-reset] --
23,403,020 UART: [state] Locking Datavault
23,409,621 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,318 UART: [state] Locking ICCM
23,413,119 UART: [exit] Launching FMC @ 0x40000130
23,421,507 UART:
23,421,744 UART: Running Caliptra FMC ...
23,422,784 UART:
23,422,931 UART: [state] CFI Enabled
23,487,255 UART: [fht] FMC Alias Private Key: 7
25,824,968 UART: [art] Extend RT PCRs Done
25,826,188 UART: [art] Lock RT PCRs Done
25,827,566 UART: [art] Populate DV Done
25,832,817 UART: [fht] FMC Alias Private Key: 7
25,834,349 UART: [art] Derive CDI
25,835,107 UART: [art] Store in in slot 0x4
25,895,225 UART: [art] Derive Key Pair
25,896,263 UART: [art] Store priv key in slot 0x5
29,188,990 UART: [art] Derive Key Pair - Done
29,201,872 UART: [art] Signing Cert with AUTHO
29,203,176 UART: RITY.KEYID = 7
31,490,897 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,403 UART: [art] PUB.X = 9BB2DC8710C3E98442C9E88F29CDBEFE6B86A5CC7066213966545BFB8758A1BD83FF256CE6ED71261CE40AFFBFE3426C
31,499,654 UART: [art] PUB.Y = D44259EF0F6B19927191ED69A6F52933CC57FAD1E357B563CB7F52029C7E4667E3F30E97000BC851E19375F6DE4ADA86
31,506,902 UART: [art] SIG.R = A7BB5AA205A9A1AE4BAC1A098CF9E2A5A70E08318CCB2A521DFFC93A0D507B63DECD4F2D5E7704073763A976238003A2
31,514,319 UART: [art] SIG.S = 891A0C2E153C776B311618D56A519655CB353C4267510F04D5C65355BC62E92E735AB2480675921660EE4BA368EAD0AF
32,818,948 UART: Caliptra RT
32,819,638 UART: [state] CFI Enabled
32,982,083 UART: [rt] RT listening for mailbox commands...
32,984,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,140,368 UART: [rt]cmd =0x41544d4e, len=14344
38,375,508 >>> mbox cmd response data (8 bytes)
38,376,137 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,406,765 UART: [rt]cmd =0x41545348, len=116
38,426,144 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,786,810 ready_for_fw is high
3,787,210 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,858,606 >>> mbox cmd response: success
23,549,363 UART:
23,549,753 UART: Running Caliptra FMC ...
23,550,889 UART:
23,551,049 UART: [state] CFI Enabled
23,618,005 UART: [fht] FMC Alias Private Key: 7
25,956,280 UART: [art] Extend RT PCRs Done
25,957,655 UART: [art] Lock RT PCRs Done
25,959,309 UART: [art] Populate DV Done
25,964,836 UART: [fht] FMC Alias Private Key: 7
25,966,539 UART: [art] Derive CDI
25,967,353 UART: [art] Store in in slot 0x4
26,026,875 UART: [art] Derive Key Pair
26,027,877 UART: [art] Store priv key in slot 0x5
29,320,763 UART: [art] Derive Key Pair - Done
29,333,978 UART: [art] Signing Cert with AUTHO
29,335,280 UART: RITY.KEYID = 7
31,622,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,244 UART: [art] PUB.X = 0A116FB00D44418B37A1BD35627CCD4C2608171A7CD374FE31F3256021B0C2AF9931220A5C4616BA934DE2568F6F6F4B
31,631,500 UART: [art] PUB.Y = F220BBE842862B251073C9C734BCFA945C4311FA9371008C3E3F386E5A8DAE627FEF6417931466EF36B157DA39A0B814
31,638,739 UART: [art] SIG.R = 3E5813807461B2EADA17D6FFDB31DD6F1FA5922386250CF36E54689F61D0526B8A84591188FCD1DD61232EC93F1DC696
31,646,092 UART: [art] SIG.S = FEE054D9E1A69479D19F55B24BF702E8E39D65B8764D7D1AEC4E062C08921A2C786A8E4B9BCD22E4EBF67D9EC5631B68
32,951,624 UART: Caliptra RT
32,952,334 UART: [state] CFI Enabled
33,113,403 UART: [rt] RT listening for mailbox commands...
33,115,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,271,087 UART: [rt]cmd =0x41544d4e, len=14344
38,506,580 >>> mbox cmd response data (8 bytes)
38,507,143 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,537,780 UART: [rt]cmd =0x41545348, len=116
38,557,947 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,418 UART:
192,782 UART: Running Caliptra ROM ...
193,923 UART:
603,782 UART: [state] CFI Enabled
617,090 UART: [state] LifecycleState = Unprovisioned
619,040 UART: [state] DebugLocked = No
621,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,268 UART: [kat] SHA2-256
797,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,525 UART: [kat] ++
808,004 UART: [kat] sha1
819,324 UART: [kat] SHA2-256
822,085 UART: [kat] SHA2-384
826,941 UART: [kat] SHA2-512-ACC
829,304 UART: [kat] ECC-384
3,115,637 UART: [kat] HMAC-384Kdf
3,128,430 UART: [kat] LMS
4,318,526 UART: [kat] --
4,324,206 UART: [cold-reset] ++
4,326,066 UART: [fht] Storing FHT @ 0x50003400
4,337,503 UART: [idev] ++
4,338,108 UART: [idev] CDI.KEYID = 6
4,338,996 UART: [idev] SUBJECT.KEYID = 7
4,340,237 UART: [idev] UDS.KEYID = 0
4,341,317 ready_for_fw is high
4,341,511 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,703 UART: [idev] Erasing UDS.KEYID = 0
7,627,925 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,564 UART: [idev] --
7,652,911 UART: [ldev] ++
7,653,476 UART: [ldev] CDI.KEYID = 6
7,654,440 UART: [ldev] SUBJECT.KEYID = 5
7,655,644 UART: [ldev] AUTHORITY.KEYID = 7
7,656,921 UART: [ldev] FE.KEYID = 1
7,670,364 UART: [ldev] Erasing FE.KEYID = 1
10,958,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,429 UART: [ldev] --
13,318,843 UART: [fwproc] Waiting for Commands...
13,321,416 UART: [fwproc] Received command 0x46574c44
13,323,643 UART: [fwproc] Received Image of size 114124 bytes
17,373,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,370 >>> mbox cmd response: success
17,838,144 UART: [afmc] ++
17,838,746 UART: [afmc] CDI.KEYID = 6
17,839,732 UART: [afmc] SUBJECT.KEYID = 7
17,840,938 UART: [afmc] AUTHORITY.KEYID = 5
21,158,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,853 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,235 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,055 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,491 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,924 UART: [afmc] --
23,527,010 UART: [cold-reset] --
23,530,114 UART: [state] Locking Datavault
23,533,642 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,385 UART: [state] Locking ICCM
23,536,943 UART: [exit] Launching FMC @ 0x40000130
23,545,340 UART:
23,545,577 UART: Running Caliptra FMC ...
23,546,695 UART:
23,546,852 UART: [state] CFI Enabled
23,554,952 UART: [fht] FMC Alias Private Key: 7
25,885,819 UART: [art] Extend RT PCRs Done
25,887,037 UART: [art] Lock RT PCRs Done
25,888,686 UART: [art] Populate DV Done
25,894,260 UART: [fht] FMC Alias Private Key: 7
25,895,905 UART: [art] Derive CDI
25,896,713 UART: [art] Store in in slot 0x4
25,939,503 UART: [art] Derive Key Pair
25,940,550 UART: [art] Store priv key in slot 0x5
29,182,252 UART: [art] Derive Key Pair - Done
29,195,040 UART: [art] Signing Cert with AUTHO
29,196,344 UART: RITY.KEYID = 7
31,475,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,483 UART: [art] PUB.X = C40D249F48106922F977AA4067ACE0CDF66CD7CD6347D73437D8E081135C5ADBCE756773FE4AE1925E6A6CB9AAF8405B
31,484,772 UART: [art] PUB.Y = 109C2CBE233CE70796CD12AAF0A15369B5FE04051D121C57402A97793BA52904D482F35AE97062A5D66F1D4DE8B21531
31,491,988 UART: [art] SIG.R = BB77E9EF178EE1AB84C55789007578CA5EAF286B49DD56D70CFA6E02F423F34D46BE45E5BC3CC5941B13DA82531B29E3
31,499,363 UART: [art] SIG.S = 75AC3D905C135901FCAD980E1CD223DF9B97C8F16F29111EDDEDAEEC6F74D9A9546B853E5A57ECE330E7185AA7A623F1
32,805,239 UART: Caliptra RT
32,805,925 UART: [state] CFI Enabled
32,923,540 UART: [rt] RT listening for mailbox commands...
32,925,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,081,430 UART: [rt]cmd =0x41544d4e, len=14344
38,317,026 >>> mbox cmd response data (8 bytes)
38,317,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,348,405 UART: [rt]cmd =0x41545348, len=116
38,368,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,130,383 ready_for_fw is high
4,130,752 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,251 >>> mbox cmd response: success
23,720,544 UART:
23,720,952 UART: Running Caliptra FMC ...
23,722,153 UART:
23,722,312 UART: [state] CFI Enabled
23,729,758 UART: [fht] FMC Alias Private Key: 7
26,060,366 UART: [art] Extend RT PCRs Done
26,061,604 UART: [art] Lock RT PCRs Done
26,063,347 UART: [art] Populate DV Done
26,068,488 UART: [fht] FMC Alias Private Key: 7
26,070,026 UART: [art] Derive CDI
26,070,776 UART: [art] Store in in slot 0x4
26,113,319 UART: [art] Derive Key Pair
26,114,320 UART: [art] Store priv key in slot 0x5
29,356,548 UART: [art] Derive Key Pair - Done
29,369,655 UART: [art] Signing Cert with AUTHO
29,370,983 UART: RITY.KEYID = 7
31,650,489 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,996 UART: [art] PUB.X = BAAE05096AEF20DBDF3C113AD2185DE23CBC81ADAABFF871269E3202B32FFC8460C8D1397D6798009981705109AE9280
31,659,246 UART: [art] PUB.Y = 01491623AB80F0E4F06B9A02DCF69E040DEE4836B78F8A87AA9DB70DB0028D45A96D83DA7C8A6434FA2197A389FCA0A6
31,666,490 UART: [art] SIG.R = B9942757ADFFE75C120A9B4BE4541C48E58AE96B22B7C9EE4B0EF2BDE874FB9360766E25509D046A80438F37329C47F8
31,673,912 UART: [art] SIG.S = 6FEF8D388D37ABADE16DFD5848A4FCB0C40CA1D85F0553980C4C1E822473AE9B72A6543CD2D65E4D5D1DEC1FCB78B95A
32,978,955 UART: Caliptra RT
32,979,640 UART: [state] CFI Enabled
33,097,023 UART: [rt] RT listening for mailbox commands...
33,099,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,255,017 UART: [rt]cmd =0x41544d4e, len=14344
38,490,393 >>> mbox cmd response data (8 bytes)
38,490,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,521,873 UART: [rt]cmd =0x41545348, len=116
38,542,003 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,171 UART:
192,543 UART: Running Caliptra ROM ...
193,659 UART:
193,802 UART: [state] CFI Enabled
266,110 UART: [state] LifecycleState = Unprovisioned
268,036 UART: [state] DebugLocked = No
269,564 UART: [state] WD Timer not started. Device not locked for debugging
272,525 UART: [kat] SHA2-256
451,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,257 UART: [kat] ++
463,704 UART: [kat] sha1
475,356 UART: [kat] SHA2-256
478,405 UART: [kat] SHA2-384
484,757 UART: [kat] SHA2-512-ACC
487,691 UART: [kat] ECC-384
2,947,049 UART: [kat] HMAC-384Kdf
2,970,441 UART: [kat] LMS
3,499,952 UART: [kat] --
3,501,976 UART: [cold-reset] ++
3,503,695 UART: [fht] FHT @ 0x50003400
3,514,799 UART: [idev] ++
3,515,444 UART: [idev] CDI.KEYID = 6
3,516,364 UART: [idev] SUBJECT.KEYID = 7
3,517,471 UART: [idev] UDS.KEYID = 0
3,518,392 ready_for_fw is high
3,518,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,383 UART: [idev] Erasing UDS.KEYID = 0
6,024,136 UART: [idev] Sha1 KeyId Algorithm
6,046,501 UART: [idev] --
6,050,223 UART: [ldev] ++
6,050,798 UART: [ldev] CDI.KEYID = 6
6,051,709 UART: [ldev] SUBJECT.KEYID = 5
6,052,870 UART: [ldev] AUTHORITY.KEYID = 7
6,054,100 UART: [ldev] FE.KEYID = 1
6,099,003 UART: [ldev] Erasing FE.KEYID = 1
8,600,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,101 UART: [ldev] --
10,411,356 UART: [fwproc] Wait for Commands...
10,414,261 UART: [fwproc] Recv command 0x46574c44
10,416,353 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,288,830 >>> mbox cmd response: success
14,293,817 UART: [afmc] ++
14,294,409 UART: [afmc] CDI.KEYID = 6
14,295,324 UART: [afmc] SUBJECT.KEYID = 7
14,296,483 UART: [afmc] AUTHORITY.KEYID = 5
16,824,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,950 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,429 UART: [afmc] --
18,625,561 UART: [cold-reset] --
18,629,155 UART: [state] Locking Datavault
18,632,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,419 UART: [state] Locking ICCM
18,637,059 UART: [exit] Launching FMC @ 0x40000130
18,645,458 UART:
18,645,692 UART: Running Caliptra FMC ...
18,646,792 UART:
18,646,951 UART: [state] CFI Enabled
18,709,146 UART: [fht] FMC Alias Private Key: 7
20,473,377 UART: [art] Extend RT PCRs Done
20,474,583 UART: [art] Lock RT PCRs Done
20,476,233 UART: [art] Populate DV Done
20,481,529 UART: [fht] FMC Alias Private Key: 7
20,483,115 UART: [art] Derive CDI
20,483,925 UART: [art] Store in in slot 0x4
20,542,963 UART: [art] Derive Key Pair
20,543,955 UART: [art] Store priv key in slot 0x5
23,007,224 UART: [art] Derive Key Pair - Done
23,020,093 UART: [art] Signing Cert with AUTHO
23,021,403 UART: RITY.KEYID = 7
24,732,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,352 UART: [art] PUB.X = 57B2F7C3400A5302D2A20090045BD1D73081C52C4F6EE0A910247D598D6E9216D103EEF1ABADE33660ABAAF350EA7648
24,741,596 UART: [art] PUB.Y = E91659D52D84BFC5FB290759C81A328D2AA271B51ED0FE89862D3532244E17B530DED2824EAF43B10EDA8A623A392043
24,748,876 UART: [art] SIG.R = 5FA57B1EB266EE713641DF7F27A28F1A4E21CAB9F72836636FDFDF77021D92E62DE152E01D198F4546E33FD777630A95
24,756,275 UART: [art] SIG.S = 233773925F69C2930E0E68CEAEA15DE28A45F0E96647C557C2DC524CAE0D7F08374435C132CCDFF6C1C85B133419B493
25,736,195 UART: Caliptra RT
25,736,878 UART: [state] CFI Enabled
25,900,621 UART: [rt] RT listening for mailbox commands...
25,903,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,018 UART: [rt]cmd =0x41544d4e, len=14344
29,989,433 >>> mbox cmd response data (8 bytes)
29,990,059 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,020,961 UART: [rt]cmd =0x41545348, len=116
30,040,560 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,358,309 ready_for_fw is high
3,358,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,044,460 >>> mbox cmd response: success
18,345,654 UART:
18,346,051 UART: Running Caliptra FMC ...
18,347,187 UART:
18,347,351 UART: [state] CFI Enabled
18,411,573 UART: [fht] FMC Alias Private Key: 7
20,175,626 UART: [art] Extend RT PCRs Done
20,176,846 UART: [art] Lock RT PCRs Done
20,178,401 UART: [art] Populate DV Done
20,183,980 UART: [fht] FMC Alias Private Key: 7
20,185,573 UART: [art] Derive CDI
20,186,311 UART: [art] Store in in slot 0x4
20,244,543 UART: [art] Derive Key Pair
20,245,581 UART: [art] Store priv key in slot 0x5
22,708,497 UART: [art] Derive Key Pair - Done
22,721,385 UART: [art] Signing Cert with AUTHO
22,722,687 UART: RITY.KEYID = 7
24,434,462 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,976 UART: [art] PUB.X = 8E1093CF949E15397487246512DEB77BFB58D7D59B192DC34060DB84EE8E532604813758D281AD4256F43FC4FFD950FB
24,443,180 UART: [art] PUB.Y = E2CEBB0709ED9F2F034A1BCADC179B303FBE00B7036FC0DB11E097D282A7ED04C888800977DC20E1B58D95C65E1CDE58
24,450,452 UART: [art] SIG.R = E81B2DC9D5048CBBCA5BF4F1576A50A827C2534C3604BE46667BD2177F0C3B477FF9C12BDD256592D662B6BBE72AFA4D
24,458,003 UART: [art] SIG.S = 7598BCBC8C0A924706E3C6409D53B7756488BF0CB2BA20E587069754F893D5A0B3AB55DEB54F1447367EBE0CDB7536C7
25,436,343 UART: Caliptra RT
25,437,027 UART: [state] CFI Enabled
25,602,359 UART: [rt] RT listening for mailbox commands...
25,604,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,760,806 UART: [rt]cmd =0x41544d4e, len=14344
29,690,499 >>> mbox cmd response data (8 bytes)
29,691,073 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,721,964 UART: [rt]cmd =0x41545348, len=116
29,740,965 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,224 UART:
192,592 UART: Running Caliptra ROM ...
193,698 UART:
603,319 UART: [state] CFI Enabled
619,605 UART: [state] LifecycleState = Unprovisioned
621,435 UART: [state] DebugLocked = No
622,820 UART: [state] WD Timer not started. Device not locked for debugging
626,913 UART: [kat] SHA2-256
806,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,621 UART: [kat] ++
818,153 UART: [kat] sha1
830,022 UART: [kat] SHA2-256
833,018 UART: [kat] SHA2-384
838,927 UART: [kat] SHA2-512-ACC
841,860 UART: [kat] ECC-384
3,280,825 UART: [kat] HMAC-384Kdf
3,292,617 UART: [kat] LMS
3,822,141 UART: [kat] --
3,827,133 UART: [cold-reset] ++
3,829,552 UART: [fht] FHT @ 0x50003400
3,839,420 UART: [idev] ++
3,840,028 UART: [idev] CDI.KEYID = 6
3,840,914 UART: [idev] SUBJECT.KEYID = 7
3,842,025 UART: [idev] UDS.KEYID = 0
3,843,078 ready_for_fw is high
3,843,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,894 UART: [idev] Erasing UDS.KEYID = 0
6,311,750 UART: [idev] Sha1 KeyId Algorithm
6,333,904 UART: [idev] --
6,336,810 UART: [ldev] ++
6,337,370 UART: [ldev] CDI.KEYID = 6
6,338,298 UART: [ldev] SUBJECT.KEYID = 5
6,339,444 UART: [ldev] AUTHORITY.KEYID = 7
6,340,716 UART: [ldev] FE.KEYID = 1
6,353,971 UART: [ldev] Erasing FE.KEYID = 1
8,828,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,898 UART: [ldev] --
10,621,340 UART: [fwproc] Wait for Commands...
10,623,042 UART: [fwproc] Recv command 0x46574c44
10,625,129 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,239 >>> mbox cmd response: success
14,501,959 UART: [afmc] ++
14,502,546 UART: [afmc] CDI.KEYID = 6
14,503,418 UART: [afmc] SUBJECT.KEYID = 7
14,504,623 UART: [afmc] AUTHORITY.KEYID = 5
17,002,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,980 UART: [afmc] --
18,801,175 UART: [cold-reset] --
18,803,143 UART: [state] Locking Datavault
18,808,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,762 UART: [state] Locking ICCM
18,810,828 UART: [exit] Launching FMC @ 0x40000130
18,819,217 UART:
18,819,445 UART: Running Caliptra FMC ...
18,820,536 UART:
18,820,683 UART: [state] CFI Enabled
18,828,886 UART: [fht] FMC Alias Private Key: 7
20,585,460 UART: [art] Extend RT PCRs Done
20,586,673 UART: [art] Lock RT PCRs Done
20,588,422 UART: [art] Populate DV Done
20,593,827 UART: [fht] FMC Alias Private Key: 7
20,595,463 UART: [art] Derive CDI
20,596,191 UART: [art] Store in in slot 0x4
20,638,991 UART: [art] Derive Key Pair
20,640,023 UART: [art] Store priv key in slot 0x5
23,066,791 UART: [art] Derive Key Pair - Done
23,079,838 UART: [art] Signing Cert with AUTHO
23,081,136 UART: RITY.KEYID = 7
24,786,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,123 UART: [art] PUB.X = E4D51986D328DA7C0F1B31890D9A203FF31FA3CFAB4D0E5B881A92269BA516068EC669C0B7C59DC58AEBE87D273D249A
24,795,431 UART: [art] PUB.Y = 115CBB5960E65B50339E7C23DB46996EBE0CC932E1A51D5195FA27E3493568C4E181E873DD490B8434B991B8338A413E
24,802,654 UART: [art] SIG.R = EC140844E8D8EDCA2ACEF7E181CF2BE236CAB6CF25DE83E30FF3CA86C84C66E21AD09F8429BC2F79BB6C0D1FF82ACD2C
24,810,094 UART: [art] SIG.S = 9B857D6D96C2FA0DD7FCBC70DCEEBD43C4C287F61619C985722A6E6B662AF85F265AC0504F67DF1A780952A2C6D2CE16
25,788,466 UART: Caliptra RT
25,789,163 UART: [state] CFI Enabled
25,905,230 UART: [rt] RT listening for mailbox commands...
25,907,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,063,221 UART: [rt]cmd =0x41544d4e, len=14344
29,993,614 >>> mbox cmd response data (8 bytes)
29,994,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,024,966 UART: [rt]cmd =0x41545348, len=116
30,044,716 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,692,552 ready_for_fw is high
3,693,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,535 >>> mbox cmd response: success
18,514,400 UART:
18,514,788 UART: Running Caliptra FMC ...
18,515,886 UART:
18,516,030 UART: [state] CFI Enabled
18,523,818 UART: [fht] FMC Alias Private Key: 7
20,280,566 UART: [art] Extend RT PCRs Done
20,281,784 UART: [art] Lock RT PCRs Done
20,283,542 UART: [art] Populate DV Done
20,289,101 UART: [fht] FMC Alias Private Key: 7
20,290,679 UART: [art] Derive CDI
20,291,414 UART: [art] Store in in slot 0x4
20,334,218 UART: [art] Derive Key Pair
20,335,232 UART: [art] Store priv key in slot 0x5
22,761,700 UART: [art] Derive Key Pair - Done
22,774,608 UART: [art] Signing Cert with AUTHO
22,775,933 UART: RITY.KEYID = 7
24,481,164 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,668 UART: [art] PUB.X = 03015D3284A39825125E86332B65DF6333BC3ECD34FF72CDD568C8C24F726FA03061363A56870BE91BE194E446263408
24,489,888 UART: [art] PUB.Y = 14E8C3B5F13C45C4BF23B467C1339572A572F07F0E8A4F19F031A81D019E6C49CA6E140017E25F9100704593883DE439
24,497,083 UART: [art] SIG.R = 525E54C23B6C99AE2E3D37250AC1C940289DB68C9364B34A9F8BD2319E2D34A5943338543A5DDBFB098E19B477A8419A
24,504,516 UART: [art] SIG.S = 47D3FF40E6C03C82A0C7733095B2887A774CC0635ACE6339F436AAB2B56475383E5A70C93AC2458BF0B147C64E45143D
25,483,669 UART: Caliptra RT
25,484,351 UART: [state] CFI Enabled
25,600,933 UART: [rt] RT listening for mailbox commands...
25,603,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,758,734 UART: [rt]cmd =0x41544d4e, len=14344
29,689,007 >>> mbox cmd response data (8 bytes)
29,689,576 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,720,375 UART: [rt]cmd =0x41545348, len=116
29,740,249 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,108 UART:
192,458 UART: Running Caliptra ROM ...
193,675 UART:
193,846 UART: [state] CFI Enabled
261,586 UART: [state] LifecycleState = Unprovisioned
264,006 UART: [state] DebugLocked = No
266,114 UART: [state] WD Timer not started. Device not locked for debugging
270,290 UART: [kat] SHA2-256
460,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,949 UART: [kat] ++
471,398 UART: [kat] sha1
483,520 UART: [kat] SHA2-256
486,506 UART: [kat] SHA2-384
492,217 UART: [kat] SHA2-512-ACC
494,794 UART: [kat] ECC-384
2,947,238 UART: [kat] HMAC-384Kdf
2,971,707 UART: [kat] LMS
3,503,458 UART: [kat] --
3,508,876 UART: [cold-reset] ++
3,510,162 UART: [fht] FHT @ 0x50003400
3,521,659 UART: [idev] ++
3,522,362 UART: [idev] CDI.KEYID = 6
3,523,284 UART: [idev] SUBJECT.KEYID = 7
3,524,466 UART: [idev] UDS.KEYID = 0
3,525,392 ready_for_fw is high
3,525,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,407 UART: [idev] Erasing UDS.KEYID = 0
6,031,587 UART: [idev] Sha1 KeyId Algorithm
6,054,986 UART: [idev] --
6,059,198 UART: [ldev] ++
6,059,884 UART: [ldev] CDI.KEYID = 6
6,060,796 UART: [ldev] SUBJECT.KEYID = 5
6,061,957 UART: [ldev] AUTHORITY.KEYID = 7
6,063,189 UART: [ldev] FE.KEYID = 1
6,100,131 UART: [ldev] Erasing FE.KEYID = 1
8,604,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,999 UART: [ldev] --
10,414,918 UART: [fwproc] Wait for Commands...
10,417,063 UART: [fwproc] Recv command 0x46574c44
10,419,321 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,593,006 >>> mbox cmd response: success
14,596,515 UART: [afmc] ++
14,597,229 UART: [afmc] CDI.KEYID = 6
14,598,418 UART: [afmc] SUBJECT.KEYID = 7
14,599,853 UART: [afmc] AUTHORITY.KEYID = 5
17,131,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,417 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,076 UART: [afmc] --
18,926,721 UART: [cold-reset] --
18,930,800 UART: [state] Locking Datavault
18,936,102 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,298 UART: [state] Locking ICCM
18,940,972 UART: [exit] Launching FMC @ 0x40000130
18,949,636 UART:
18,949,867 UART: Running Caliptra FMC ...
18,950,890 UART:
18,951,037 UART: [state] CFI Enabled
19,011,206 UART: [fht] FMC Alias Private Key: 7
20,775,479 UART: [art] Extend RT PCRs Done
20,776,694 UART: [art] Lock RT PCRs Done
20,778,396 UART: [art] Populate DV Done
20,783,912 UART: [fht] FMC Alias Private Key: 7
20,785,455 UART: [art] Derive CDI
20,786,216 UART: [art] Store in in slot 0x4
20,843,423 UART: [art] Derive Key Pair
20,844,460 UART: [art] Store priv key in slot 0x5
23,307,384 UART: [art] Derive Key Pair - Done
23,320,209 UART: [art] Signing Cert with AUTHO
23,321,506 UART: RITY.KEYID = 7
25,033,100 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,604 UART: [art] PUB.X = AA867F4F8D14644F9EEDBC64BA198AE3B5B57FB18A61F4FC523D023CE1A26E6B3CDE39C13628A6BDC9D3E5E75CC64585
25,041,942 UART: [art] PUB.Y = 36DB2571DFC88454443AABDD78B874B3161A8D05CAB044C3CB3F1B78086D452F3FE484B4B3BF4C138982E78A9F1E0A25
25,049,184 UART: [art] SIG.R = 29FBF12BDD9B0A16571673C6F98718E97CADDA2258CED74A77FDCF4D479BB85FA1737D1A5131A3E123AAC042B02B2B2E
25,056,648 UART: [art] SIG.S = E7CE9C4D894573AA09A7FF632F9D81B3BE7F5BB02C928FB38F050B7A4D7F8E9E9E93BF3D9396A4AFF9FC30B7ACCE5302
26,035,161 UART: Caliptra RT
26,035,859 UART: [state] CFI Enabled
26,203,886 UART: [rt] RT listening for mailbox commands...
26,206,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,361,999 UART: [rt]cmd =0x41544d4e, len=14344
30,292,516 >>> mbox cmd response data (8 bytes)
30,293,095 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,323,838 UART: [rt]cmd =0x41545348, len=116
30,344,541 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,439,724 ready_for_fw is high
3,440,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,627 >>> mbox cmd response: success
19,026,092 UART:
19,026,480 UART: Running Caliptra FMC ...
19,027,593 UART:
19,027,752 UART: [state] CFI Enabled
19,093,976 UART: [fht] FMC Alias Private Key: 7
20,858,118 UART: [art] Extend RT PCRs Done
20,859,342 UART: [art] Lock RT PCRs Done
20,861,080 UART: [art] Populate DV Done
20,866,486 UART: [fht] FMC Alias Private Key: 7
20,868,083 UART: [art] Derive CDI
20,868,900 UART: [art] Store in in slot 0x4
20,927,053 UART: [art] Derive Key Pair
20,928,096 UART: [art] Store priv key in slot 0x5
23,391,127 UART: [art] Derive Key Pair - Done
23,404,457 UART: [art] Signing Cert with AUTHO
23,405,762 UART: RITY.KEYID = 7
25,116,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,072 UART: [art] PUB.X = E422BFCD43F3B710273A44D6819EF77BCF96C18583E7E9F7DEEBA16EC2C75D545399DB959407BCBD2BC6C55D5BC7610C
25,125,330 UART: [art] PUB.Y = E00EEAE60A5203FAA8B2525A0478823AD5447DC43CEC4C28410153BFB9974DC6792DC69AA4AB5BC8F91AC3009FB20B4D
25,132,583 UART: [art] SIG.R = BB2C834842957071B588D7FCAC8CCAB130602D918F3A22DDA70809BEE5FC86714FB0A012E762B10213C35F62AE835A87
25,139,971 UART: [art] SIG.S = D48D22109CC533ADDBA301249BAE0B730801FFE02CAEE28B28C7688F1B1A007899B5EAC9B9B53DC3B4C53A6CEBACA254
26,118,929 UART: Caliptra RT
26,119,630 UART: [state] CFI Enabled
26,284,480 UART: [rt] RT listening for mailbox commands...
26,286,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,442,748 UART: [rt]cmd =0x41544d4e, len=14344
30,373,301 >>> mbox cmd response data (8 bytes)
30,373,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,404,500 UART: [rt]cmd =0x41545348, len=116
30,424,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,167 UART:
192,536 UART: Running Caliptra ROM ...
193,666 UART:
603,442 UART: [state] CFI Enabled
614,837 UART: [state] LifecycleState = Unprovisioned
617,201 UART: [state] DebugLocked = No
618,585 UART: [state] WD Timer not started. Device not locked for debugging
623,385 UART: [kat] SHA2-256
813,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,057 UART: [kat] ++
824,663 UART: [kat] sha1
836,038 UART: [kat] SHA2-256
839,102 UART: [kat] SHA2-384
844,870 UART: [kat] SHA2-512-ACC
847,452 UART: [kat] ECC-384
3,288,041 UART: [kat] HMAC-384Kdf
3,301,801 UART: [kat] LMS
3,833,668 UART: [kat] --
3,837,742 UART: [cold-reset] ++
3,839,259 UART: [fht] FHT @ 0x50003400
3,850,586 UART: [idev] ++
3,851,298 UART: [idev] CDI.KEYID = 6
3,852,173 UART: [idev] SUBJECT.KEYID = 7
3,853,401 UART: [idev] UDS.KEYID = 0
3,854,322 ready_for_fw is high
3,854,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,216 UART: [idev] Erasing UDS.KEYID = 0
6,329,269 UART: [idev] Sha1 KeyId Algorithm
6,352,308 UART: [idev] --
6,356,327 UART: [ldev] ++
6,357,005 UART: [ldev] CDI.KEYID = 6
6,357,916 UART: [ldev] SUBJECT.KEYID = 5
6,359,062 UART: [ldev] AUTHORITY.KEYID = 7
6,360,288 UART: [ldev] FE.KEYID = 1
6,371,570 UART: [ldev] Erasing FE.KEYID = 1
8,851,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,464 UART: [ldev] --
10,642,774 UART: [fwproc] Wait for Commands...
10,644,376 UART: [fwproc] Recv command 0x46574c44
10,646,622 UART: [fwproc] Recv'd Img size: 114448 bytes
14,097,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,834,439 >>> mbox cmd response: success
14,838,099 UART: [afmc] ++
14,838,810 UART: [afmc] CDI.KEYID = 6
14,839,998 UART: [afmc] SUBJECT.KEYID = 7
14,841,452 UART: [afmc] AUTHORITY.KEYID = 5
17,347,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,217 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,419 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,305 UART: [afmc] --
19,144,559 UART: [cold-reset] --
19,148,156 UART: [state] Locking Datavault
19,153,623 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,772 UART: [state] Locking ICCM
19,157,755 UART: [exit] Launching FMC @ 0x40000130
19,166,401 UART:
19,166,641 UART: Running Caliptra FMC ...
19,167,735 UART:
19,167,912 UART: [state] CFI Enabled
19,175,796 UART: [fht] FMC Alias Private Key: 7
20,932,307 UART: [art] Extend RT PCRs Done
20,933,515 UART: [art] Lock RT PCRs Done
20,934,969 UART: [art] Populate DV Done
20,940,331 UART: [fht] FMC Alias Private Key: 7
20,941,867 UART: [art] Derive CDI
20,942,620 UART: [art] Store in in slot 0x4
20,985,090 UART: [art] Derive Key Pair
20,986,136 UART: [art] Store priv key in slot 0x5
23,412,494 UART: [art] Derive Key Pair - Done
23,425,439 UART: [art] Signing Cert with AUTHO
23,426,736 UART: RITY.KEYID = 7
25,132,347 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,854 UART: [art] PUB.X = 9C58A5095DBE04D6A2D5BC0B30596B55AB781F7DB7DCAB795B6B29E94CA372B63C66E21F56B0B518B812507340F1A8C4
25,141,145 UART: [art] PUB.Y = 4E53E010EEB178CADBA7AC8335CE7DD3922AC91BA804A744BCC065A6705C2ED2359D1C56466F98033888B08905251AF5
25,148,384 UART: [art] SIG.R = E13001636BC17C4385C46CBF8EF611BC0AA7BB6D5B00684E2D055820A5E0FF392ED31D98DC83BE95D03581D2A52964F9
25,155,770 UART: [art] SIG.S = AC69DF411DD5907876B535AD88CDE52341DC4A2F44B4530D7F79416207A4CFF8CBE92A3879F3B78EED4DEBA9D6BB62FF
26,134,715 UART: Caliptra RT
26,135,408 UART: [state] CFI Enabled
26,251,308 UART: [rt] RT listening for mailbox commands...
26,253,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,409,104 UART: [rt]cmd =0x41544d4e, len=14344
30,339,350 >>> mbox cmd response data (8 bytes)
30,339,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,370,539 UART: [rt]cmd =0x41545348, len=116
30,390,393 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,759,563 ready_for_fw is high
3,760,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,973,251 >>> mbox cmd response: success
19,217,392 UART:
19,217,803 UART: Running Caliptra FMC ...
19,218,903 UART:
19,219,048 UART: [state] CFI Enabled
19,226,543 UART: [fht] FMC Alias Private Key: 7
20,983,796 UART: [art] Extend RT PCRs Done
20,985,019 UART: [art] Lock RT PCRs Done
20,987,153 UART: [art] Populate DV Done
20,992,364 UART: [fht] FMC Alias Private Key: 7
20,993,956 UART: [art] Derive CDI
20,994,692 UART: [art] Store in in slot 0x4
21,037,448 UART: [art] Derive Key Pair
21,038,491 UART: [art] Store priv key in slot 0x5
23,465,036 UART: [art] Derive Key Pair - Done
23,477,918 UART: [art] Signing Cert with AUTHO
23,479,271 UART: RITY.KEYID = 7
25,184,663 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,137 UART: [art] PUB.X = 7B21AE7EB4E8AAFDBBB1114D7004E52AB529B3BEF5548E1A0CD4CD7770EE231F4194060865067EE9D50FE4A0BC70CD8B
25,193,473 UART: [art] PUB.Y = 775CE9CA6C5CA5453F25A86A302950548C938DD8986054283E41A6729C73FAA3F2E49BCDD8E654B51C71A6D40A67F771
25,200,716 UART: [art] SIG.R = EEF15FEBE5AC77DB545183CC44633064D7A00C26D07134E9C28867FFB9AF11FC44BB1E3A749D976F51A2A1922BA1C9E5
25,208,088 UART: [art] SIG.S = 022A78B8142BB4F485C5326371F7673C666EA72DBC8A27EB31D907D8A20C963E4CA7C29FAF263484382FA9440FE40913
26,186,590 UART: Caliptra RT
26,187,302 UART: [state] CFI Enabled
26,304,543 UART: [rt] RT listening for mailbox commands...
26,306,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,462,441 UART: [rt]cmd =0x41544d4e, len=14344
30,392,532 >>> mbox cmd response data (8 bytes)
30,393,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,423,774 UART: [rt]cmd =0x41545348, len=116
30,443,643 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,829 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,389 UART: [kat] SHA2-256
882,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,435 UART: [kat] ++
886,587 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,604 UART: [kat] SHA2-512-ACC
897,505 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,476,943 UART: [fht] Storing FHT @ 0x50003400
1,479,740 UART: [idev] ++
1,479,908 UART: [idev] CDI.KEYID = 6
1,480,268 UART: [idev] SUBJECT.KEYID = 7
1,480,692 UART: [idev] UDS.KEYID = 0
1,481,037 ready_for_fw is high
1,481,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,740 UART: [idev] --
1,514,675 UART: [ldev] ++
1,514,843 UART: [ldev] CDI.KEYID = 6
1,515,206 UART: [ldev] SUBJECT.KEYID = 5
1,515,632 UART: [ldev] AUTHORITY.KEYID = 7
1,516,095 UART: [ldev] FE.KEYID = 1
1,521,187 UART: [ldev] Erasing FE.KEYID = 1
1,545,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,812 UART: [ldev] --
1,585,299 UART: [fwproc] Waiting for Commands...
1,585,932 UART: [fwproc] Received command 0x46574c44
1,586,723 UART: [fwproc] Received Image of size 114448 bytes
2,886,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,473 >>> mbox cmd response: success
3,079,631 UART: [afmc] ++
3,079,799 UART: [afmc] CDI.KEYID = 6
3,080,161 UART: [afmc] SUBJECT.KEYID = 7
3,080,586 UART: [afmc] AUTHORITY.KEYID = 5
3,115,467 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,128 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,818 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,837 UART: [afmc] --
3,158,797 UART: [cold-reset] --
3,159,635 UART: [state] Locking Datavault
3,160,666 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,270 UART: [state] Locking ICCM
3,161,766 UART: [exit] Launching FMC @ 0x40000130
3,167,095 UART:
3,167,111 UART: Running Caliptra FMC ...
3,167,519 UART:
3,167,573 UART: [state] CFI Enabled
3,177,990 UART: [fht] FMC Alias Private Key: 7
3,285,823 UART: [art] Extend RT PCRs Done
3,286,251 UART: [art] Lock RT PCRs Done
3,287,563 UART: [art] Populate DV Done
3,296,060 UART: [fht] FMC Alias Private Key: 7
3,297,094 UART: [art] Derive CDI
3,297,374 UART: [art] Store in in slot 0x4
3,383,017 UART: [art] Derive Key Pair
3,383,377 UART: [art] Store priv key in slot 0x5
3,396,667 UART: [art] Derive Key Pair - Done
3,411,548 UART: [art] Signing Cert with AUTHO
3,412,028 UART: RITY.KEYID = 7
3,426,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,757 UART: [art] PUB.X = 36E381385195B501C67513A5B0975A7FAECE9450C02015E98A6C852E03A22CF3EF072358D95F4A4CAC1BDE419A5BA8CE
3,434,526 UART: [art] PUB.Y = E252BD48D3B6E16F8F6A71F42DB263A92766E608827B8C4C2E996C9F82FF8DE7466A74B834836A957514D63E5A54BFCB
3,441,479 UART: [art] SIG.R = 77BD1CB9E8155150BBAF4C94A1789CD33E954DD882C4CE0BFB01D891B581B7AB8FB4CD6D52E0488196237CA8ED0B65D5
3,448,256 UART: [art] SIG.S = D00FB787D3FB0BFABCCC7F132E64401A0C7FD7637A55AE0C811402390FA6D980C641598200871F2AF0695C378E989FC5
3,471,945 UART: Caliptra RT
3,472,198 UART: [state] CFI Enabled
3,580,401 UART: [rt] RT listening for mailbox commands...
3,581,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,029 UART: [rt]cmd =0x41544d4e, len=14344
3,848,771 >>> mbox cmd response data (8 bytes)
3,848,772 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,699 UART: [rt]cmd =0x41545348, len=116
3,899,985 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 ready_for_fw is high
1,362,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,647 >>> mbox cmd response: success
2,989,673 UART:
2,989,689 UART: Running Caliptra FMC ...
2,990,097 UART:
2,990,151 UART: [state] CFI Enabled
3,000,438 UART: [fht] FMC Alias Private Key: 7
3,108,649 UART: [art] Extend RT PCRs Done
3,109,077 UART: [art] Lock RT PCRs Done
3,110,749 UART: [art] Populate DV Done
3,118,774 UART: [fht] FMC Alias Private Key: 7
3,119,828 UART: [art] Derive CDI
3,120,108 UART: [art] Store in in slot 0x4
3,205,879 UART: [art] Derive Key Pair
3,206,239 UART: [art] Store priv key in slot 0x5
3,219,189 UART: [art] Derive Key Pair - Done
3,234,047 UART: [art] Signing Cert with AUTHO
3,234,527 UART: RITY.KEYID = 7
3,249,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,528 UART: [art] PUB.X = 455B730AC1556105758A7C064645EA087C54D8EB22E3F2BC942D8659DB25B767C15B6F199AD31545D65D98C796FF791D
3,257,284 UART: [art] PUB.Y = 7970F0D6BDBCD17B889EA04E8F90A6BF73D26704B92685F611869D95308EE2B5F360FD3B2CDC327666B8BF01DEE27C57
3,264,238 UART: [art] SIG.R = 16634F7B6BC1FD76B5D5E340E3F0299442371D58CE71438D64DC03A7A641D59E6A961BA82CA3A217C37F92C15CDC481E
3,271,011 UART: [art] SIG.S = 70EE19DE8F43EE41CD93A0DAA56CB8D7609CEDEA6A6D4A2A7C85C5747752DB9D1942C92F6B545F792E14D282E6CF8950
3,294,564 UART: Caliptra RT
3,294,817 UART: [state] CFI Enabled
3,402,635 UART: [rt] RT listening for mailbox commands...
3,403,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,571 UART: [rt]cmd =0x41544d4e, len=14344
3,670,835 >>> mbox cmd response data (8 bytes)
3,670,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,657 UART: [rt]cmd =0x41545348, len=116
3,721,743 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,686 UART: [kat] SHA2-256
892,624 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,173 UART: [kat] LMS
1,475,369 UART: [kat] --
1,476,198 UART: [cold-reset] ++
1,476,728 UART: [fht] Storing FHT @ 0x50003400
1,479,515 UART: [idev] ++
1,479,683 UART: [idev] CDI.KEYID = 6
1,480,043 UART: [idev] SUBJECT.KEYID = 7
1,480,467 UART: [idev] UDS.KEYID = 0
1,480,812 ready_for_fw is high
1,480,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,277 UART: [idev] Erasing UDS.KEYID = 0
1,504,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,133 UART: [idev] --
1,514,126 UART: [ldev] ++
1,514,294 UART: [ldev] CDI.KEYID = 6
1,514,657 UART: [ldev] SUBJECT.KEYID = 5
1,515,083 UART: [ldev] AUTHORITY.KEYID = 7
1,515,546 UART: [ldev] FE.KEYID = 1
1,520,830 UART: [ldev] Erasing FE.KEYID = 1
1,546,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,521 UART: [ldev] --
1,585,966 UART: [fwproc] Waiting for Commands...
1,586,771 UART: [fwproc] Received command 0x46574c44
1,587,562 UART: [fwproc] Received Image of size 114448 bytes
2,887,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,126 >>> mbox cmd response: success
3,081,158 UART: [afmc] ++
3,081,326 UART: [afmc] CDI.KEYID = 6
3,081,688 UART: [afmc] SUBJECT.KEYID = 7
3,082,113 UART: [afmc] AUTHORITY.KEYID = 5
3,116,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,262 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,042 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,655 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,345 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,206 UART: [afmc] --
3,160,256 UART: [cold-reset] --
3,161,018 UART: [state] Locking Datavault
3,162,081 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,685 UART: [state] Locking ICCM
3,163,163 UART: [exit] Launching FMC @ 0x40000130
3,168,492 UART:
3,168,508 UART: Running Caliptra FMC ...
3,168,916 UART:
3,169,059 UART: [state] CFI Enabled
3,179,464 UART: [fht] FMC Alias Private Key: 7
3,287,307 UART: [art] Extend RT PCRs Done
3,287,735 UART: [art] Lock RT PCRs Done
3,289,601 UART: [art] Populate DV Done
3,297,746 UART: [fht] FMC Alias Private Key: 7
3,298,926 UART: [art] Derive CDI
3,299,206 UART: [art] Store in in slot 0x4
3,385,147 UART: [art] Derive Key Pair
3,385,507 UART: [art] Store priv key in slot 0x5
3,398,477 UART: [art] Derive Key Pair - Done
3,413,478 UART: [art] Signing Cert with AUTHO
3,413,958 UART: RITY.KEYID = 7
3,429,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,875 UART: [art] PUB.X = A1C7126AC6F02AAD0B36BDA30711323A49C2F8B5060FB789191308BC379F39521902DA464F838ABB9F4A1F6B0B4BF91E
3,436,632 UART: [art] PUB.Y = 1EAD95743F2F0380D70A1D782D3216175928DA04E7297F47BCC7A269D91F6E85E9AF01992881F3948CA2EBF01983E9C1
3,443,570 UART: [art] SIG.R = BE0D0C4A5D0FEBDE9EDD11D2D3C7E9B966656EE5427F88DF5123493DE26A6D2B8F2A8C70DFA091078237068348C658BF
3,450,339 UART: [art] SIG.S = 8F4B504B7F0A9F25BCCB866F4436D2ACE39AE820716DB747DA91E86268403AA698173449F1E633F81C087AD6C22C2B19
3,473,260 UART: Caliptra RT
3,473,605 UART: [state] CFI Enabled
3,581,313 UART: [rt] RT listening for mailbox commands...
3,581,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,837 UART: [rt]cmd =0x41544d4e, len=14344
3,849,339 >>> mbox cmd response data (8 bytes)
3,849,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,373 UART: [rt]cmd =0x41545348, len=116
3,901,669 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,188 ready_for_fw is high
1,362,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,720 >>> mbox cmd response: success
2,993,540 UART:
2,993,556 UART: Running Caliptra FMC ...
2,993,964 UART:
2,994,107 UART: [state] CFI Enabled
3,004,970 UART: [fht] FMC Alias Private Key: 7
3,112,607 UART: [art] Extend RT PCRs Done
3,113,035 UART: [art] Lock RT PCRs Done
3,114,387 UART: [art] Populate DV Done
3,122,476 UART: [fht] FMC Alias Private Key: 7
3,123,604 UART: [art] Derive CDI
3,123,884 UART: [art] Store in in slot 0x4
3,209,453 UART: [art] Derive Key Pair
3,209,813 UART: [art] Store priv key in slot 0x5
3,223,181 UART: [art] Derive Key Pair - Done
3,237,655 UART: [art] Signing Cert with AUTHO
3,238,135 UART: RITY.KEYID = 7
3,253,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,998 UART: [art] PUB.X = F38A5392445BBF0C0796300A5DA7ABC7B002ED24031D0DA5C620222D3DAA56D55BBC6428A4DBA1AC7A9955DD4887B29C
3,260,764 UART: [art] PUB.Y = FB6EA2029656151ECC45890F25A4394621B8180C6846967BBE4AECEF26FE1E21FC4E62C058234EE2EB44A14FD5627DAC
3,267,715 UART: [art] SIG.R = ACB229D3AB7DB854DD345CE337E2DBBCF1E0FA0918CC6DC3E711C641958A9DB360C6A330FD44215A31DB46C0871B48A7
3,274,500 UART: [art] SIG.S = A390E6CD10479FF1CEFE17C6E377102614FAC2E0631DFCD0ADF7787B8244871984855CDFB75B90149FC673644F45E23F
3,298,355 UART: Caliptra RT
3,298,700 UART: [state] CFI Enabled
3,406,300 UART: [rt] RT listening for mailbox commands...
3,406,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,884 UART: [rt]cmd =0x41544d4e, len=14344
3,674,896 >>> mbox cmd response data (8 bytes)
3,674,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,954 UART: [rt]cmd =0x41545348, len=116
3,726,938 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
893,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,177 UART: [kat] ++
897,329 UART: [kat] sha1
901,487 UART: [kat] SHA2-256
903,427 UART: [kat] SHA2-384
905,990 UART: [kat] SHA2-512-ACC
907,891 UART: [kat] ECC-384
917,426 UART: [kat] HMAC-384Kdf
921,966 UART: [kat] LMS
1,170,294 UART: [kat] --
1,171,143 UART: [cold-reset] ++
1,171,689 UART: [fht] FHT @ 0x50003400
1,174,280 UART: [idev] ++
1,174,448 UART: [idev] CDI.KEYID = 6
1,174,808 UART: [idev] SUBJECT.KEYID = 7
1,175,232 UART: [idev] UDS.KEYID = 0
1,175,577 ready_for_fw is high
1,175,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,208,565 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,182 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,281,932 UART: [fwproc] Wait for Commands...
1,282,706 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,302 >>> mbox cmd response: success
2,775,508 UART: [afmc] ++
2,775,676 UART: [afmc] CDI.KEYID = 6
2,776,038 UART: [afmc] SUBJECT.KEYID = 7
2,776,463 UART: [afmc] AUTHORITY.KEYID = 5
2,811,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,219 UART: [afmc] --
2,855,251 UART: [cold-reset] --
2,856,129 UART: [state] Locking Datavault
2,857,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,912 UART: [state] Locking ICCM
2,858,442 UART: [exit] Launching FMC @ 0x40000130
2,863,771 UART:
2,863,787 UART: Running Caliptra FMC ...
2,864,195 UART:
2,864,249 UART: [state] CFI Enabled
2,875,098 UART: [fht] FMC Alias Private Key: 7
2,982,891 UART: [art] Extend RT PCRs Done
2,983,319 UART: [art] Lock RT PCRs Done
2,984,811 UART: [art] Populate DV Done
2,992,992 UART: [fht] FMC Alias Private Key: 7
2,993,952 UART: [art] Derive CDI
2,994,232 UART: [art] Store in in slot 0x4
3,079,995 UART: [art] Derive Key Pair
3,080,355 UART: [art] Store priv key in slot 0x5
3,093,645 UART: [art] Derive Key Pair - Done
3,108,444 UART: [art] Signing Cert with AUTHO
3,108,924 UART: RITY.KEYID = 7
3,124,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,815 UART: [art] PUB.X = 2CE4D20B8D4D23F9143B75A642870E520171D1D8E2B234792E2039DAF3EC15C135C1B304E4457DBC5A5D6B9D58481677
3,131,573 UART: [art] PUB.Y = D0D0BB6F5211B6F6371A85EE8F6C476AD93A7C2CC985498CBDEEA8D7456F556456C681B9BA949084168268FF64EC9832
3,138,529 UART: [art] SIG.R = 551603480D57896F43DDCBAC80AC6A15C217DFB74F0F7C20E16131CB6DD8884C6CF65B417EB04D7C459EB0D16F8B017C
3,145,299 UART: [art] SIG.S = 413F3965BEE00B608DDE43DA30B77F1F3D9EC87B5F04294E3E77E15F788CEE764ED4D3AE980A56CD56EEA0EF896DCEFF
3,168,979 UART: Caliptra RT
3,169,232 UART: [state] CFI Enabled
3,276,291 UART: [rt] RT listening for mailbox commands...
3,276,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,067 UART: [rt]cmd =0x41544d4e, len=14344
3,544,563 >>> mbox cmd response data (8 bytes)
3,544,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,461 UART: [rt]cmd =0x41545348, len=116
3,595,993 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,899 ready_for_fw is high
1,059,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,079 >>> mbox cmd response: success
2,688,965 UART:
2,688,981 UART: Running Caliptra FMC ...
2,689,389 UART:
2,689,443 UART: [state] CFI Enabled
2,699,956 UART: [fht] FMC Alias Private Key: 7
2,808,785 UART: [art] Extend RT PCRs Done
2,809,213 UART: [art] Lock RT PCRs Done
2,810,625 UART: [art] Populate DV Done
2,818,902 UART: [fht] FMC Alias Private Key: 7
2,819,954 UART: [art] Derive CDI
2,820,234 UART: [art] Store in in slot 0x4
2,906,027 UART: [art] Derive Key Pair
2,906,387 UART: [art] Store priv key in slot 0x5
2,919,843 UART: [art] Derive Key Pair - Done
2,934,912 UART: [art] Signing Cert with AUTHO
2,935,392 UART: RITY.KEYID = 7
2,950,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,389 UART: [art] PUB.X = 06135047D5E3ACE14A4DDB921EC463EE9984BEBC5F1DDEEBFA6CCE9636AE084276BA83901B7F84C40B50F8F017407835
2,958,164 UART: [art] PUB.Y = 7757AAB2F5398FA1243042DC8DF318EF8BF9E0AAEF81C681211CA1BCCD710668B0213B57C1E27C385E183FEF5F387E8D
2,965,125 UART: [art] SIG.R = 74F7DDAB851E0BE86130B1A8D5DDA18BB77A6B910AA2B292C6699303C6FD7D1309664EEC504339F4762A5A00CAF07138
2,971,869 UART: [art] SIG.S = F71AED44E1BB5DF017A6B595631B23F34F98A761FFC6F40D203988AB73C69CDEC45ADF56221565275C37F27CBBC84086
2,995,765 UART: Caliptra RT
2,996,018 UART: [state] CFI Enabled
3,103,689 UART: [rt] RT listening for mailbox commands...
3,104,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,505 UART: [rt]cmd =0x41544d4e, len=14344
3,372,223 >>> mbox cmd response data (8 bytes)
3,372,224 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,367 UART: [rt]cmd =0x41545348, len=116
3,424,207 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,768 UART: [kat] SHA2-256
903,708 UART: [kat] SHA2-384
906,473 UART: [kat] SHA2-512-ACC
908,374 UART: [kat] ECC-384
918,227 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,172,218 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 ready_for_fw is high
1,176,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,308 UART: [idev] Sha1 KeyId Algorithm
1,209,794 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,964 UART: [ldev] Erasing FE.KEYID = 1
1,244,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,888 UART: [ldev] --
1,284,317 UART: [fwproc] Wait for Commands...
1,284,943 UART: [fwproc] Recv command 0x46574c44
1,285,671 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,499 >>> mbox cmd response: success
2,777,703 UART: [afmc] ++
2,777,871 UART: [afmc] CDI.KEYID = 6
2,778,233 UART: [afmc] SUBJECT.KEYID = 7
2,778,658 UART: [afmc] AUTHORITY.KEYID = 5
2,814,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,872 UART: [afmc] --
2,857,990 UART: [cold-reset] --
2,858,788 UART: [state] Locking Datavault
2,860,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,739 UART: [state] Locking ICCM
2,861,325 UART: [exit] Launching FMC @ 0x40000130
2,866,654 UART:
2,866,670 UART: Running Caliptra FMC ...
2,867,078 UART:
2,867,221 UART: [state] CFI Enabled
2,877,886 UART: [fht] FMC Alias Private Key: 7
2,985,905 UART: [art] Extend RT PCRs Done
2,986,333 UART: [art] Lock RT PCRs Done
2,988,143 UART: [art] Populate DV Done
2,996,200 UART: [fht] FMC Alias Private Key: 7
2,997,184 UART: [art] Derive CDI
2,997,464 UART: [art] Store in in slot 0x4
3,083,089 UART: [art] Derive Key Pair
3,083,449 UART: [art] Store priv key in slot 0x5
3,097,017 UART: [art] Derive Key Pair - Done
3,111,850 UART: [art] Signing Cert with AUTHO
3,112,330 UART: RITY.KEYID = 7
3,127,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,679 UART: [art] PUB.X = ADAB20FE84058AEDAC02FB00231E79C3FF314B0142E1E94DA88698B63E800A68C68F11E6A8D216E9F50A515A8F88C7AC
3,135,426 UART: [art] PUB.Y = F7C0F1F38DAF9480A1C68288EB6AC2597FC7FEC3DFB38D4D9E291B5E19D892B1FE185420D671336F936AF8931B138A1E
3,142,388 UART: [art] SIG.R = 39E21AEBCDC97A69E2FA1BB4E5A371876251C65199471CF229A7390A9E326B6057D56042F84B3408614142C2C68DF4FF
3,149,152 UART: [art] SIG.S = 2D5E6DCC17E6536637F62F613F591D530F7AFB880A6D18C8617FF7EE22954B396B32F88AB0AD40EAA3B7F3E2BDB3E90B
3,172,862 UART: Caliptra RT
3,173,207 UART: [state] CFI Enabled
3,280,436 UART: [rt] RT listening for mailbox commands...
3,281,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,220 UART: [rt]cmd =0x41544d4e, len=14344
3,548,746 >>> mbox cmd response data (8 bytes)
3,548,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,828 UART: [rt]cmd =0x41545348, len=116
3,600,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,564 >>> mbox cmd response: success
2,690,442 UART:
2,690,458 UART: Running Caliptra FMC ...
2,690,866 UART:
2,691,009 UART: [state] CFI Enabled
2,701,650 UART: [fht] FMC Alias Private Key: 7
2,809,173 UART: [art] Extend RT PCRs Done
2,809,601 UART: [art] Lock RT PCRs Done
2,811,133 UART: [art] Populate DV Done
2,819,334 UART: [fht] FMC Alias Private Key: 7
2,820,506 UART: [art] Derive CDI
2,820,786 UART: [art] Store in in slot 0x4
2,906,255 UART: [art] Derive Key Pair
2,906,615 UART: [art] Store priv key in slot 0x5
2,920,023 UART: [art] Derive Key Pair - Done
2,934,511 UART: [art] Signing Cert with AUTHO
2,934,991 UART: RITY.KEYID = 7
2,950,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,074 UART: [art] PUB.X = C196F9483C30BAB4E722F6E2D7667C77E86C47E0240BC913CFC407C7B371E4A8204C788960A72612C8529EF210BFF399
2,957,838 UART: [art] PUB.Y = E289760443525271158AFF66D0A4CFD5FAA3C5F6FE5A0D18FFD857C36860D9F3882B0AC063414DDA9CA95A3AB05BEE41
2,964,793 UART: [art] SIG.R = BF7316F86796FA8E639050A6B558659D96710761FEB5AECEDBC4F31EFC37B39D82D8574E37A5219CD157F9DAEF392171
2,971,568 UART: [art] SIG.S = AC3422F261254EDBDD1F5062FC825FA4E4ADFEDB099E16E6347B8FF53E5A9D44B934B5D773DD7E61DBA1F220E956E7E8
2,995,326 UART: Caliptra RT
2,995,671 UART: [state] CFI Enabled
3,103,029 UART: [rt] RT listening for mailbox commands...
3,103,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,901 UART: [rt]cmd =0x41544d4e, len=14344
3,371,543 >>> mbox cmd response data (8 bytes)
3,371,544 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,729 UART: [rt]cmd =0x41545348, len=116
3,423,781 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Unprovisioned
86,297 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,192 UART: [kat] SHA2-256
891,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,871 UART: [kat] ++
896,023 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,902 UART: [kat] SHA2-512-ACC
906,803 UART: [kat] ECC-384
916,720 UART: [kat] HMAC-384Kdf
921,222 UART: [kat] LMS
1,169,534 UART: [kat] --
1,170,537 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,633 UART: [idev] ++
1,173,801 UART: [idev] CDI.KEYID = 6
1,174,162 UART: [idev] SUBJECT.KEYID = 7
1,174,587 UART: [idev] UDS.KEYID = 0
1,174,933 ready_for_fw is high
1,174,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,452 UART: [fwproc] Wait for Commands...
1,281,135 UART: [fwproc] Recv command 0x46574c44
1,281,868 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,930 >>> mbox cmd response: success
2,773,953 UART: [afmc] ++
2,774,121 UART: [afmc] CDI.KEYID = 6
2,774,484 UART: [afmc] SUBJECT.KEYID = 7
2,774,910 UART: [afmc] AUTHORITY.KEYID = 5
2,810,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,876 UART: [afmc] --
2,853,980 UART: [cold-reset] --
2,854,722 UART: [state] Locking Datavault
2,855,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,305 UART: [state] Locking ICCM
2,856,727 UART: [exit] Launching FMC @ 0x40000130
2,862,056 UART:
2,862,072 UART: Running Caliptra FMC ...
2,862,480 UART:
2,862,534 UART: [state] CFI Enabled
2,873,009 UART: [fht] FMC Alias Private Key: 7
2,980,648 UART: [art] Extend RT PCRs Done
2,981,076 UART: [art] Lock RT PCRs Done
2,982,824 UART: [art] Populate DV Done
2,991,039 UART: [fht] FMC Alias Private Key: 7
2,992,125 UART: [art] Derive CDI
2,992,405 UART: [art] Store in in slot 0x4
3,077,808 UART: [art] Derive Key Pair
3,078,168 UART: [art] Store priv key in slot 0x5
3,091,538 UART: [art] Derive Key Pair - Done
3,106,279 UART: [art] Signing Cert with AUTHO
3,106,759 UART: RITY.KEYID = 7
3,122,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,860 UART: [art] PUB.X = 3A7DF71EA6AAEF1C0021B6EC0AB1FEA8C1D18486D9A21DBD0C5FF7A5F11C59FB4553A5EBEA8978C5070E69371C1D6A63
3,129,620 UART: [art] PUB.Y = BB7B677133D539412EFFD0E1E51424889D592D4052A3CFF0EECD28E6AC043BC87B40EC209F4CDEAC7F2C41873B3DBF86
3,136,585 UART: [art] SIG.R = FCFBE2AFE45346B7A7BE46D633024143EB521E5477C3D9AF0308C13C755D40DC7D708FA2AFE4DC0E85B7B158651A1306
3,143,352 UART: [art] SIG.S = E9B87EA4C472031B906710060F9A424501FB8C7FE68311B2B3BB88A2C2DE59592271877589F8718EA813B2C21470DDBE
3,167,173 UART: Caliptra RT
3,167,426 UART: [state] CFI Enabled
3,274,490 UART: [rt] RT listening for mailbox commands...
3,275,160 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,254 UART: [rt]cmd =0x41544d4e, len=14344
3,543,080 >>> mbox cmd response data (8 bytes)
3,543,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,084 UART: [rt]cmd =0x41545348, len=116
3,595,078 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,620 ready_for_fw is high
1,055,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,444 >>> mbox cmd response: success
2,685,638 UART:
2,685,654 UART: Running Caliptra FMC ...
2,686,062 UART:
2,686,116 UART: [state] CFI Enabled
2,696,033 UART: [fht] FMC Alias Private Key: 7
2,803,556 UART: [art] Extend RT PCRs Done
2,803,984 UART: [art] Lock RT PCRs Done
2,805,624 UART: [art] Populate DV Done
2,813,531 UART: [fht] FMC Alias Private Key: 7
2,814,671 UART: [art] Derive CDI
2,814,951 UART: [art] Store in in slot 0x4
2,900,332 UART: [art] Derive Key Pair
2,900,692 UART: [art] Store priv key in slot 0x5
2,914,124 UART: [art] Derive Key Pair - Done
2,928,652 UART: [art] Signing Cert with AUTHO
2,929,132 UART: RITY.KEYID = 7
2,944,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,295 UART: [art] PUB.X = E7C50F192C7B7CA157436CF7509EFA2572EBAFD97EE2463A77CF7AB03ED186327843C6211448BB0948A1BE0C868D37D9
2,952,064 UART: [art] PUB.Y = 1775E87C824495BE2431FD23AA581E6E278E29BFF2557B1431C8BB24D678ABB911C399FD5474D190E313BF10DE2E09E7
2,959,015 UART: [art] SIG.R = 6C03F4D625C39379CCB671BD566152654BD5634BA5BD8227D1650D7A3D53C3B56B0E9B76FF583C11570554577069424D
2,965,767 UART: [art] SIG.S = 65F6E4033B26192E7FAB9EAC2F3062C52D4A94F61D10C87C4A8FBDB339096E25304FACCF926CD2EF62D79EDBBA604782
2,989,830 UART: Caliptra RT
2,990,083 UART: [state] CFI Enabled
3,097,010 UART: [rt] RT listening for mailbox commands...
3,097,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,874 UART: [rt]cmd =0x41544d4e, len=14344
3,365,698 >>> mbox cmd response data (8 bytes)
3,365,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,904 UART: [rt]cmd =0x41545348, len=116
3,417,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 ready_for_fw is high
1,174,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,706 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,091 UART: [ldev] Erasing FE.KEYID = 1
1,242,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,169 >>> mbox cmd response: success
2,777,328 UART: [afmc] ++
2,777,496 UART: [afmc] CDI.KEYID = 6
2,777,859 UART: [afmc] SUBJECT.KEYID = 7
2,778,285 UART: [afmc] AUTHORITY.KEYID = 5
2,813,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,489 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,101 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,820 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,787 UART: [afmc] --
2,857,737 UART: [cold-reset] --
2,858,523 UART: [state] Locking Datavault
2,859,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,422 UART: [state] Locking ICCM
2,861,086 UART: [exit] Launching FMC @ 0x40000130
2,866,415 UART:
2,866,431 UART: Running Caliptra FMC ...
2,866,839 UART:
2,866,982 UART: [state] CFI Enabled
2,877,665 UART: [fht] FMC Alias Private Key: 7
2,986,276 UART: [art] Extend RT PCRs Done
2,986,704 UART: [art] Lock RT PCRs Done
2,988,138 UART: [art] Populate DV Done
2,996,393 UART: [fht] FMC Alias Private Key: 7
2,997,321 UART: [art] Derive CDI
2,997,601 UART: [art] Store in in slot 0x4
3,083,060 UART: [art] Derive Key Pair
3,083,420 UART: [art] Store priv key in slot 0x5
3,096,582 UART: [art] Derive Key Pair - Done
3,111,470 UART: [art] Signing Cert with AUTHO
3,111,950 UART: RITY.KEYID = 7
3,127,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,953 UART: [art] PUB.X = B0FCD944EC87B6AE239C3939D1A5B36D3FC8BA434B496A812B981845D0AE289836585941ED1F53DB767A5BFE931E138D
3,134,731 UART: [art] PUB.Y = BFE1957D38114E9C9F9A6315853FA0D4E50442BE592902757599BDF9E6791A3ECBC8AA8D036E2C9FFE4F58607809597D
3,141,673 UART: [art] SIG.R = 93E4E9675B0275D39567E4E412566FCB6778FF870C63E075C6C59FD0933B8778D815F4C8FABDB05EDB1712292DF0844D
3,148,439 UART: [art] SIG.S = FF0515BA067510004D3BA954F45022CB51F045D860DB98C80C592B345C193095A109469386898CC0E79A25603A75CE68
3,172,666 UART: Caliptra RT
3,173,011 UART: [state] CFI Enabled
3,280,953 UART: [rt] RT listening for mailbox commands...
3,281,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,749 UART: [rt]cmd =0x41544d4e, len=14344
3,549,923 >>> mbox cmd response data (8 bytes)
3,549,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,123 UART: [rt]cmd =0x41545348, len=116
3,602,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,583 ready_for_fw is high
1,057,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,967 >>> mbox cmd response: success
2,689,083 UART:
2,689,099 UART: Running Caliptra FMC ...
2,689,507 UART:
2,689,650 UART: [state] CFI Enabled
2,700,611 UART: [fht] FMC Alias Private Key: 7
2,809,168 UART: [art] Extend RT PCRs Done
2,809,596 UART: [art] Lock RT PCRs Done
2,811,274 UART: [art] Populate DV Done
2,819,787 UART: [fht] FMC Alias Private Key: 7
2,820,785 UART: [art] Derive CDI
2,821,065 UART: [art] Store in in slot 0x4
2,907,098 UART: [art] Derive Key Pair
2,907,458 UART: [art] Store priv key in slot 0x5
2,921,084 UART: [art] Derive Key Pair - Done
2,936,185 UART: [art] Signing Cert with AUTHO
2,936,665 UART: RITY.KEYID = 7
2,951,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,566 UART: [art] PUB.X = 7845678BDF442435565CB0EC49E2974E5B9527F7BCE68B23104D5EA90CBA3716A4BB3BF0B447489C39A046928D9E6725
2,959,333 UART: [art] PUB.Y = 85C1777E45D34C8144A2CA8F34690AE9A0627F069960535042032204AE2E92321891F38DAA280D382677149547C6DA65
2,966,252 UART: [art] SIG.R = 2E54B415CE676335A966451C1DCC4E6665F8FFF134191CD6D9C0B0A36A155B5D400587C50256F2924C842F28956F7581
2,973,010 UART: [art] SIG.S = 2F92A882553E393D12FDB2EBA987621A854EC8E4562045549EA323BD9A0A1CD6E8D365D12E2FD25D9C7A4717E99768FC
2,997,244 UART: Caliptra RT
2,997,589 UART: [state] CFI Enabled
3,105,674 UART: [rt] RT listening for mailbox commands...
3,106,344 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,326 UART: [rt]cmd =0x41544d4e, len=14344
3,373,940 >>> mbox cmd response data (8 bytes)
3,373,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,922 UART: [rt]cmd =0x41545348, len=116
3,424,992 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,051 UART:
192,402 UART: Running Caliptra ROM ...
193,579 UART:
193,738 UART: [state] CFI Enabled
263,050 UART: [state] LifecycleState = Unprovisioned
265,026 UART: [state] DebugLocked = No
267,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,497 UART: [kat] SHA2-256
442,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,709 UART: [kat] ++
453,207 UART: [kat] sha1
463,389 UART: [kat] SHA2-256
466,088 UART: [kat] SHA2-384
472,939 UART: [kat] SHA2-512-ACC
475,325 UART: [kat] ECC-384
2,766,697 UART: [kat] HMAC-384Kdf
2,799,830 UART: [kat] LMS
3,990,127 UART: [kat] --
3,994,693 UART: [cold-reset] ++
3,997,137 UART: [fht] Storing FHT @ 0x50003400
4,007,694 UART: [idev] ++
4,008,266 UART: [idev] CDI.KEYID = 6
4,009,194 UART: [idev] SUBJECT.KEYID = 7
4,010,450 UART: [idev] UDS.KEYID = 0
4,011,508 ready_for_fw is high
4,011,721 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,051,794 UART: [idev] Erasing UDS.KEYID = 0
7,356,323 UART: [idev] Using Sha1 for KeyId Algorithm
7,378,626 UART: [idev] --
7,382,083 UART: [ldev] ++
7,382,679 UART: [ldev] CDI.KEYID = 6
7,383,648 UART: [ldev] SUBJECT.KEYID = 5
7,384,811 UART: [ldev] AUTHORITY.KEYID = 7
7,386,094 UART: [ldev] FE.KEYID = 1
7,412,522 UART: [ldev] Erasing FE.KEYID = 1
10,744,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,956 UART: [ldev] --
13,107,467 UART: [fwproc] Waiting for Commands...
13,109,129 UART: [fwproc] Received command 0x46574c44
13,111,310 UART: [fwproc] Received Image of size 31676 bytes
16,161,989 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,241,870 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,310,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,338,688 >>> mbox cmd response: success
16,342,447 UART: [afmc] ++
16,343,074 UART: [afmc] CDI.KEYID = 6
16,344,062 UART: [afmc] SUBJECT.KEYID = 7
16,345,152 UART: [afmc] AUTHORITY.KEYID = 5
19,718,047 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,015,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,018,144 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,032,544 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,047,394 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,061,844 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,083,262 UART: [afmc] --
22,087,392 UART: [cold-reset] --
22,091,527 UART: [state] Locking Datavault
22,098,012 UART: [state] Locking PCR0, PCR1 and PCR31
22,099,809 UART: [state] Locking ICCM
22,101,728 UART: [exit] Launching FMC @ 0x40000130
22,110,115 UART:
22,110,358 UART: Running Caliptra FMC ...
22,111,421 UART:
22,111,576 UART: [state] CFI Enabled
22,177,371 UART: [fht] FMC Alias Private Key: 7
24,515,372 UART: [art] Extend RT PCRs Done
24,516,636 UART: [art] Lock RT PCRs Done
24,518,251 UART: [art] Populate DV Done
24,523,769 UART: [fht] FMC Alias Private Key: 7
24,525,430 UART: [art] Derive CDI
24,526,199 UART: [art] Store in in slot 0x4
24,585,987 UART: [art] Derive Key Pair
24,587,091 UART: [art] Store priv key in slot 0x5
27,879,750 UART: [art] Derive Key Pair - Done
27,892,548 UART: [art] Signing Cert with AUTHO
27,893,886 UART: RITY.KEYID = 7
30,181,659 UART: [art] Erasing AUTHORITY.KEYID = 7
30,183,216 UART: [art] PUB.X = 6474421F78B14F060A1896CFA61F3DE3D016C4999F44C3BC3ADACAD43B03A43610C9ACA5868CBFB6418900AB97331357
30,190,439 UART: [art] PUB.Y = 7C97B98DBB2BFE8628D8E7F78F6E60C52194ABC1F9706DE4EC2BF4469F9EADDE64998FDA64E49737D5882472A67EA072
30,197,664 UART: [art] SIG.R = B845FAA8E37E726B533BA1E81D491D3EE04B8FFDEAE706330EAF958F56AEC2BACC1E4D51C35C07E6D1FCF6D7FACB5741
30,205,157 UART: [art] SIG.S = D49E54C946EB89FA23F43A4B53990E678649603F9C4E038C0E5464554D3BEB6F8B9F0F274C8B1D0DCCFD51831407B0F5
31,509,697 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,809,692 ready_for_fw is high
3,810,080 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,220,041 >>> mbox cmd response: success
21,904,882 UART:
21,905,284 UART: Running Caliptra FMC ...
21,906,436 UART:
21,906,599 UART: [state] CFI Enabled
21,974,062 UART: [fht] FMC Alias Private Key: 7
24,311,444 UART: [art] Extend RT PCRs Done
24,312,722 UART: [art] Lock RT PCRs Done
24,314,319 UART: [art] Populate DV Done
24,319,781 UART: [fht] FMC Alias Private Key: 7
24,321,257 UART: [art] Derive CDI
24,322,061 UART: [art] Store in in slot 0x4
24,381,951 UART: [art] Derive Key Pair
24,383,039 UART: [art] Store priv key in slot 0x5
27,675,969 UART: [art] Derive Key Pair - Done
27,689,241 UART: [art] Signing Cert with AUTHO
27,690,576 UART: RITY.KEYID = 7
29,977,996 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,558 UART: [art] PUB.X = 0E8D7ACE7EB1F9E9BF93626FD0FA4C95C696D5BA37B4B00BE0F0560359545D01001B9AAF9C255BB83F1A4107F42902F2
29,986,787 UART: [art] PUB.Y = E8B30E08F9A03A5FFA3E02A97EF8BB98808A9A8E766A594AC403E2786FE1712E8787D848DBF48E0E7CA7B60829646274
29,994,020 UART: [art] SIG.R = 1DDFE5FFD66194D871770459EDE550415E66E1CC7A9AA8E599C6077942E996D49F1C9B5C10E1E4D8ABE4F7A71BC6417D
30,001,438 UART: [art] SIG.S = 12A684B3CC9C4AB5065E6EAC1E556C6E220A7D6B28C1D795C38B34102CE7F77FBC43F34CEA6B3E1904ADE855E52C7AD4
31,306,464 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,147 UART:
192,534 UART: Running Caliptra ROM ...
193,665 UART:
603,427 UART: [state] CFI Enabled
619,510 UART: [state] LifecycleState = Unprovisioned
621,380 UART: [state] DebugLocked = No
623,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,762 UART: [kat] SHA2-256
798,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,052 UART: [kat] ++
809,656 UART: [kat] sha1
821,406 UART: [kat] SHA2-256
824,169 UART: [kat] SHA2-384
831,011 UART: [kat] SHA2-512-ACC
833,372 UART: [kat] ECC-384
3,116,381 UART: [kat] HMAC-384Kdf
3,128,545 UART: [kat] LMS
4,318,670 UART: [kat] --
4,325,384 UART: [cold-reset] ++
4,326,248 UART: [fht] Storing FHT @ 0x50003400
4,339,211 UART: [idev] ++
4,339,768 UART: [idev] CDI.KEYID = 6
4,340,849 UART: [idev] SUBJECT.KEYID = 7
4,341,967 UART: [idev] UDS.KEYID = 0
4,342,907 ready_for_fw is high
4,343,097 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,383,024 UART: [idev] Erasing UDS.KEYID = 0
7,630,686 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,028 UART: [idev] --
7,656,132 UART: [ldev] ++
7,656,750 UART: [ldev] CDI.KEYID = 6
7,657,690 UART: [ldev] SUBJECT.KEYID = 5
7,658,897 UART: [ldev] AUTHORITY.KEYID = 7
7,660,196 UART: [ldev] FE.KEYID = 1
7,670,000 UART: [ldev] Erasing FE.KEYID = 1
10,961,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,784 UART: [ldev] --
13,323,568 UART: [fwproc] Waiting for Commands...
13,325,818 UART: [fwproc] Received command 0x46574c44
13,328,027 UART: [fwproc] Received Image of size 31676 bytes
16,371,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,446,362 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,515,289 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,544,485 >>> mbox cmd response: success
16,549,370 UART: [afmc] ++
16,549,996 UART: [afmc] CDI.KEYID = 6
16,551,032 UART: [afmc] SUBJECT.KEYID = 7
16,552,175 UART: [afmc] AUTHORITY.KEYID = 5
19,866,755 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,161,043 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,163,290 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,177,680 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,192,500 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,206,974 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,228,971 UART: [afmc] --
22,232,203 UART: [cold-reset] --
22,235,462 UART: [state] Locking Datavault
22,240,395 UART: [state] Locking PCR0, PCR1 and PCR31
22,242,138 UART: [state] Locking ICCM
22,244,274 UART: [exit] Launching FMC @ 0x40000130
22,252,649 UART:
22,252,908 UART: Running Caliptra FMC ...
22,254,056 UART:
22,254,225 UART: [state] CFI Enabled
22,262,106 UART: [fht] FMC Alias Private Key: 7
24,593,730 UART: [art] Extend RT PCRs Done
24,594,989 UART: [art] Lock RT PCRs Done
24,596,652 UART: [art] Populate DV Done
24,602,308 UART: [fht] FMC Alias Private Key: 7
24,603,769 UART: [art] Derive CDI
24,604,561 UART: [art] Store in in slot 0x4
24,647,243 UART: [art] Derive Key Pair
24,648,295 UART: [art] Store priv key in slot 0x5
27,890,105 UART: [art] Derive Key Pair - Done
27,903,317 UART: [art] Signing Cert with AUTHO
27,904,653 UART: RITY.KEYID = 7
30,184,413 UART: [art] Erasing AUTHORITY.KEYID = 7
30,186,001 UART: [art] PUB.X = 1DEB7125836AF85FF94E4AF0977B34F65CE0031F697C56E159BB25BDDB9FB157863F4923DA8240DCBA28EDE5B21356AE
30,193,152 UART: [art] PUB.Y = B2389474C32F579AF4947E675733259593CE02F4FD67EF4DF1D4EDF62D65C0865294236743F0396C733520A372FE9E66
30,200,391 UART: [art] SIG.R = 586D602EA9CBB18AEE53EACAB1567F999635D9609944D1554001457D21FF13CA380B38C5F005195C2FC07A4A0E2710CE
30,207,804 UART: [art] SIG.S = 5CB7C57CE9B5B65C5163A257EE95825E24B818A5EF2BF2F6A76F21C6DA7261C5A73EFC4AAFC74EA88F6976F4A0331246
31,512,837 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,131,093 ready_for_fw is high
4,131,618 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,393,621 >>> mbox cmd response: success
22,031,547 UART:
22,031,932 UART: Running Caliptra FMC ...
22,033,042 UART:
22,033,191 UART: [state] CFI Enabled
22,041,286 UART: [fht] FMC Alias Private Key: 7
24,371,540 UART: [art] Extend RT PCRs Done
24,372,814 UART: [art] Lock RT PCRs Done
24,374,428 UART: [art] Populate DV Done
24,379,877 UART: [fht] FMC Alias Private Key: 7
24,381,422 UART: [art] Derive CDI
24,382,190 UART: [art] Store in in slot 0x4
24,424,749 UART: [art] Derive Key Pair
24,425,816 UART: [art] Store priv key in slot 0x5
27,667,540 UART: [art] Derive Key Pair - Done
27,680,255 UART: [art] Signing Cert with AUTHO
27,681,595 UART: RITY.KEYID = 7
29,961,571 UART: [art] Erasing AUTHORITY.KEYID = 7
29,963,140 UART: [art] PUB.X = DF1712EB8C74C0FEC3CE1B75726767CADF362ADDD4F9D023D3D56C82B22B5BCED9930911CB342D916AA02266C5E56E4E
29,970,379 UART: [art] PUB.Y = FCDA7ACD90408C7DDF82498C8AEC1C2CB379F2819577A21B0978B6A32C2F48B65643387B07FA69B4CDAF5BB1B8B59FA9
29,977,641 UART: [art] SIG.R = 7E3D8100EA2810D048C0D09E0CB556A2DB977E6B171EE245E0D997071ACD3581A65D93B882F9F82FCA139118F6A5D1ED
29,984,978 UART: [art] SIG.S = 627C67F436EE223D48C48523B27A02F7FC433B70E1C196087D5FB0DE1A063E887DDD1A1F21A9AF44203759946F9C3472
31,289,844 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,171 UART:
192,526 UART: Running Caliptra ROM ...
193,672 UART:
193,822 UART: [state] CFI Enabled
264,938 UART: [state] LifecycleState = Unprovisioned
266,840 UART: [state] DebugLocked = No
268,250 UART: [state] WD Timer not started. Device not locked for debugging
271,576 UART: [kat] SHA2-256
450,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,284 UART: [kat] ++
462,814 UART: [kat] sha1
473,268 UART: [kat] SHA2-256
476,277 UART: [kat] SHA2-384
482,974 UART: [kat] SHA2-512-ACC
485,977 UART: [kat] ECC-384
2,948,551 UART: [kat] HMAC-384Kdf
2,971,512 UART: [kat] LMS
3,501,006 UART: [kat] --
3,505,714 UART: [cold-reset] ++
3,507,000 UART: [fht] FHT @ 0x50003400
3,519,329 UART: [idev] ++
3,519,901 UART: [idev] CDI.KEYID = 6
3,520,828 UART: [idev] SUBJECT.KEYID = 7
3,522,003 UART: [idev] UDS.KEYID = 0
3,522,931 ready_for_fw is high
3,523,118 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,563,333 UART: [idev] Erasing UDS.KEYID = 0
6,027,896 UART: [idev] Sha1 KeyId Algorithm
6,050,416 UART: [idev] --
6,054,278 UART: [ldev] ++
6,054,906 UART: [ldev] CDI.KEYID = 6
6,055,801 UART: [ldev] SUBJECT.KEYID = 5
6,056,907 UART: [ldev] AUTHORITY.KEYID = 7
6,058,204 UART: [ldev] FE.KEYID = 1
6,099,882 UART: [ldev] Erasing FE.KEYID = 1
8,605,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,225 UART: [ldev] --
10,414,784 UART: [fwproc] Wait for Commands...
10,418,007 UART: [fwproc] Recv command 0x46574c44
10,420,047 UART: [fwproc] Recv'd Img size: 31656 bytes
12,815,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,889,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,958,037 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,985,671 >>> mbox cmd response: success
12,990,562 UART: [afmc] ++
12,991,180 UART: [afmc] CDI.KEYID = 6
12,992,135 UART: [afmc] SUBJECT.KEYID = 7
12,993,284 UART: [afmc] AUTHORITY.KEYID = 5
15,524,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,250,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,252,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,268,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,284,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,300,248 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,323,567 UART: [afmc] --
17,328,143 UART: [cold-reset] --
17,332,214 UART: [state] Locking Datavault
17,336,193 UART: [state] Locking PCR0, PCR1 and PCR31
17,337,866 UART: [state] Locking ICCM
17,340,526 UART: [exit] Launching FMC @ 0x40000130
17,348,921 UART:
17,349,163 UART: Running Caliptra FMC ...
17,350,225 UART:
17,350,377 UART: [state] CFI Enabled
17,407,608 UART: [fht] FMC Alias Private Key: 7
19,171,398 UART: [art] Extend RT PCRs Done
19,172,674 UART: [art] Lock RT PCRs Done
19,173,993 UART: [art] Populate DV Done
19,179,526 UART: [fht] FMC Alias Private Key: 7
19,181,047 UART: [art] Derive CDI
19,181,816 UART: [art] Store in in slot 0x4
19,239,376 UART: [art] Derive Key Pair
19,240,462 UART: [art] Store priv key in slot 0x5
21,703,335 UART: [art] Derive Key Pair - Done
21,716,416 UART: [art] Signing Cert with AUTHO
21,717,935 UART: RITY.KEYID = 7
23,428,434 UART: [art] Erasing AUTHORITY.KEYID = 7
23,429,987 UART: [art] PUB.X = 76DDDB90C93A4A12F0A3E92095E570A4C20860BEE9D2AA88AE77F2ACAEC23D080F00E0B707BB8FADDBD0042264CCC7F7
23,437,208 UART: [art] PUB.Y = FC8EAE6B534FC278B291FD53FD1B73636CC61B385F30D9A475C1AACB9785913B1A0F2AF917D5252392216C2E5E41A74F
23,444,444 UART: [art] SIG.R = 75558826027A113CDCA22075A85BAE3B7C3062D844E9476FD46AD9B01399DCA6718C9542D54FB4A42531A617C2108E17
23,451,846 UART: [art] SIG.S = D9DB8879D6FAF4240E7DBE7B66BA6DC12A64A59297D3A8A895F9939AADEF74A71ACAB171CE5E4C4B507A551E09C1B965
24,430,285 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,360,339 ready_for_fw is high
3,360,766 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,736,179 >>> mbox cmd response: success
17,019,619 UART:
17,020,005 UART: Running Caliptra FMC ...
17,021,214 UART:
17,021,384 UART: [state] CFI Enabled
17,090,252 UART: [fht] FMC Alias Private Key: 7
18,854,439 UART: [art] Extend RT PCRs Done
18,855,700 UART: [art] Lock RT PCRs Done
18,857,069 UART: [art] Populate DV Done
18,862,331 UART: [fht] FMC Alias Private Key: 7
18,863,924 UART: [art] Derive CDI
18,864,781 UART: [art] Store in in slot 0x4
18,923,332 UART: [art] Derive Key Pair
18,924,421 UART: [art] Store priv key in slot 0x5
21,387,497 UART: [art] Derive Key Pair - Done
21,400,386 UART: [art] Signing Cert with AUTHO
21,401,729 UART: RITY.KEYID = 7
23,112,913 UART: [art] Erasing AUTHORITY.KEYID = 7
23,114,476 UART: [art] PUB.X = EB13DFCDB718CBB1474C4DED13CBD4CE208A5EEAC255546145DD3564301CB0C5F4D8A0AB3A3FB551C1986C434BE96396
23,121,689 UART: [art] PUB.Y = 0016C516AD59740A2A33CB402476CEF1F0C58F301BE4ADDC682A0A5AF4B2F0B61960133932CC71BE9B3D31F2CB99F62A
23,129,023 UART: [art] SIG.R = BC25EFB6335C9E8AC4A82EEA1BD4989D119FAFB89E27CFF694DF368463F2E14A39EFF50771CE52BC8FB755A6CD4AF9FD
23,136,447 UART: [art] SIG.S = 62A25A2F7C9F2A16F07BDECA537530B6F545714B0079792998EE741A8E57ED331CC6EE49E7E3DA57597D35084D3F9480
24,114,949 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,320 UART:
192,699 UART: Running Caliptra ROM ...
193,832 UART:
603,610 UART: [state] CFI Enabled
618,971 UART: [state] LifecycleState = Unprovisioned
620,834 UART: [state] DebugLocked = No
622,709 UART: [state] WD Timer not started. Device not locked for debugging
626,799 UART: [kat] SHA2-256
805,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,509 UART: [kat] ++
818,034 UART: [kat] sha1
829,412 UART: [kat] SHA2-256
832,434 UART: [kat] SHA2-384
837,685 UART: [kat] SHA2-512-ACC
840,623 UART: [kat] ECC-384
3,284,321 UART: [kat] HMAC-384Kdf
3,297,623 UART: [kat] LMS
3,827,079 UART: [kat] --
3,833,039 UART: [cold-reset] ++
3,834,008 UART: [fht] FHT @ 0x50003400
3,845,198 UART: [idev] ++
3,845,750 UART: [idev] CDI.KEYID = 6
3,846,651 UART: [idev] SUBJECT.KEYID = 7
3,847,883 UART: [idev] UDS.KEYID = 0
3,848,804 ready_for_fw is high
3,849,021 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,889,172 UART: [idev] Erasing UDS.KEYID = 0
6,321,456 UART: [idev] Sha1 KeyId Algorithm
6,344,630 UART: [idev] --
6,348,616 UART: [ldev] ++
6,349,179 UART: [ldev] CDI.KEYID = 6
6,350,429 UART: [ldev] SUBJECT.KEYID = 5
6,351,564 UART: [ldev] AUTHORITY.KEYID = 7
6,352,739 UART: [ldev] FE.KEYID = 1
6,363,093 UART: [ldev] Erasing FE.KEYID = 1
8,836,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,822 UART: [ldev] --
10,625,568 UART: [fwproc] Wait for Commands...
10,628,520 UART: [fwproc] Recv command 0x46574c44
10,630,604 UART: [fwproc] Recv'd Img size: 31656 bytes
13,023,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,094,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,162,875 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,191,529 >>> mbox cmd response: success
13,196,563 UART: [afmc] ++
13,197,177 UART: [afmc] CDI.KEYID = 6
13,198,196 UART: [afmc] SUBJECT.KEYID = 7
13,199,358 UART: [afmc] AUTHORITY.KEYID = 5
15,696,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,418,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,419,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,435,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,451,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,467,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,491,165 UART: [afmc] --
17,494,614 UART: [cold-reset] --
17,497,665 UART: [state] Locking Datavault
17,503,073 UART: [state] Locking PCR0, PCR1 and PCR31
17,504,753 UART: [state] Locking ICCM
17,507,020 UART: [exit] Launching FMC @ 0x40000130
17,515,465 UART:
17,515,703 UART: Running Caliptra FMC ...
17,516,841 UART:
17,517,018 UART: [state] CFI Enabled
17,525,293 UART: [fht] FMC Alias Private Key: 7
19,282,874 UART: [art] Extend RT PCRs Done
19,284,133 UART: [art] Lock RT PCRs Done
19,285,342 UART: [art] Populate DV Done
19,291,057 UART: [fht] FMC Alias Private Key: 7
19,292,710 UART: [art] Derive CDI
19,293,552 UART: [art] Store in in slot 0x4
19,336,265 UART: [art] Derive Key Pair
19,337,333 UART: [art] Store priv key in slot 0x5
21,763,711 UART: [art] Derive Key Pair - Done
21,776,503 UART: [art] Signing Cert with AUTHO
21,777,838 UART: RITY.KEYID = 7
23,483,441 UART: [art] Erasing AUTHORITY.KEYID = 7
23,485,002 UART: [art] PUB.X = 6FA77D3E58F495C3BB133671833CEB5D1C573DA4EC7CD8462DC43197F3B1A5B103A747F4291B2E7800CCBC7924F77674
23,492,258 UART: [art] PUB.Y = 0E418F8CCBCB498CE8FC82E690D9F0A73A660E6AE07C922452E56B9877FD849BAF467D07B2FD469F229B38AC1D64237F
23,499,531 UART: [art] SIG.R = FA179ECA0D47F243CC0C87DABEC763EEF1A49083D76E281B5CE188EB54953607F9B3FF339F35628BE6ADE970F75247FD
23,506,869 UART: [art] SIG.S = 82B43D4062B2DD761F29D79F10A8F313C88C9E98D6CAC6CE9C1D3EB2EFCEC9BAC70A42F85BF77128CDF55AAC8E7D7135
24,485,584 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,691,662 ready_for_fw is high
3,692,221 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,967,588 >>> mbox cmd response: success
17,221,015 UART:
17,221,399 UART: Running Caliptra FMC ...
17,222,536 UART:
17,222,692 UART: [state] CFI Enabled
17,231,177 UART: [fht] FMC Alias Private Key: 7
18,988,714 UART: [art] Extend RT PCRs Done
18,990,008 UART: [art] Lock RT PCRs Done
18,991,492 UART: [art] Populate DV Done
18,996,883 UART: [fht] FMC Alias Private Key: 7
18,998,404 UART: [art] Derive CDI
18,999,167 UART: [art] Store in in slot 0x4
19,041,790 UART: [art] Derive Key Pair
19,042,830 UART: [art] Store priv key in slot 0x5
21,469,346 UART: [art] Derive Key Pair - Done
21,482,508 UART: [art] Signing Cert with AUTHO
21,483,846 UART: RITY.KEYID = 7
23,189,783 UART: [art] Erasing AUTHORITY.KEYID = 7
23,191,341 UART: [art] PUB.X = 8D9A89BBF430D654A419F5F1872C5B8FB994B9A76C9CCE6F8B1F78113C27751EEB45A1B7F5961896FB98752A05A3D11D
23,198,595 UART: [art] PUB.Y = 2D8D3FCA10363D317D0BF2ED58601062F96ED8BE64FD26C00F304F14C18CC341EAEF99BEFD895DA4C4863EF1AD9236C2
23,205,847 UART: [art] SIG.R = AC396713228C0D8ADEB4E8219CBC03C779454A461228E5B1623189DF3D77096E1FD0658A7CC9AFA8582C4D2EA23999DC
23,213,272 UART: [art] SIG.S = 39557A3EE9176FA08108398A1EF467034E308C96161D24A1D329B2E159593FBB0E71B3B748951C38AE1AFF6938F00621
24,191,873 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,046 UART:
192,413 UART: Running Caliptra ROM ...
193,504 UART:
193,648 UART: [state] CFI Enabled
266,085 UART: [state] LifecycleState = Unprovisioned
268,500 UART: [state] DebugLocked = No
270,470 UART: [state] WD Timer not started. Device not locked for debugging
275,570 UART: [kat] SHA2-256
465,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,249 UART: [kat] ++
476,698 UART: [kat] sha1
486,935 UART: [kat] SHA2-256
489,941 UART: [kat] SHA2-384
494,560 UART: [kat] SHA2-512-ACC
497,084 UART: [kat] ECC-384
2,948,556 UART: [kat] HMAC-384Kdf
2,970,543 UART: [kat] LMS
3,502,317 UART: [kat] --
3,507,945 UART: [cold-reset] ++
3,509,589 UART: [fht] FHT @ 0x50003400
3,520,066 UART: [idev] ++
3,520,777 UART: [idev] CDI.KEYID = 6
3,521,717 UART: [idev] SUBJECT.KEYID = 7
3,522,895 UART: [idev] UDS.KEYID = 0
3,523,822 ready_for_fw is high
3,524,009 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,564,257 UART: [idev] Erasing UDS.KEYID = 0
6,031,268 UART: [idev] Sha1 KeyId Algorithm
6,053,373 UART: [idev] --
6,057,709 UART: [ldev] ++
6,058,392 UART: [ldev] CDI.KEYID = 6
6,059,314 UART: [ldev] SUBJECT.KEYID = 5
6,060,477 UART: [ldev] AUTHORITY.KEYID = 7
6,061,709 UART: [ldev] FE.KEYID = 1
6,100,069 UART: [ldev] Erasing FE.KEYID = 1
8,604,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,214 UART: [ldev] --
10,413,386 UART: [fwproc] Wait for Commands...
10,416,550 UART: [fwproc] Recv command 0x46574c44
10,418,864 UART: [fwproc] Recv'd Img size: 31656 bytes
12,847,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,924,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,040,451 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,086,111 >>> mbox cmd response: success
13,089,581 UART: [afmc] ++
13,090,204 UART: [afmc] CDI.KEYID = 6
13,091,438 UART: [afmc] SUBJECT.KEYID = 7
13,092,781 UART: [afmc] AUTHORITY.KEYID = 5
15,634,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,359,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,361,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,376,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,391,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,406,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,431,063 UART: [afmc] --
17,434,507 UART: [cold-reset] --
17,439,601 UART: [state] Locking Datavault
17,445,018 UART: [state] Locking PCR0, PCR1 and PCR31
17,447,231 UART: [state] Locking ICCM
17,449,460 UART: [exit] Launching FMC @ 0x40000130
17,458,176 UART:
17,458,431 UART: Running Caliptra FMC ...
17,459,576 UART:
17,459,741 UART: [state] CFI Enabled
17,515,519 UART: [fht] FMC Alias Private Key: 7
19,278,964 UART: [art] Extend RT PCRs Done
19,280,248 UART: [art] Lock RT PCRs Done
19,281,959 UART: [art] Populate DV Done
19,287,545 UART: [fht] FMC Alias Private Key: 7
19,289,136 UART: [art] Derive CDI
19,289,992 UART: [art] Store in in slot 0x4
19,347,920 UART: [art] Derive Key Pair
19,348,970 UART: [art] Store priv key in slot 0x5
21,811,932 UART: [art] Derive Key Pair - Done
21,824,772 UART: [art] Signing Cert with AUTHO
21,826,103 UART: RITY.KEYID = 7
23,537,297 UART: [art] Erasing AUTHORITY.KEYID = 7
23,538,851 UART: [art] PUB.X = 2C43E60A600F9F848F8FBB4B982F1BC65BF49B740EEB289983FE010632B9636BB385F10AF03A85A06BB3489ADA58B6C2
23,546,071 UART: [art] PUB.Y = 58AAB02BBF03621800FAE8E084D46C7425A249B80BFEEA20EF5D23FED682EB04E7CDCC88153F92DE21D31F3BF86F7B44
23,553,303 UART: [art] SIG.R = 699F52F50EA7239357AAE24B8A153512CDE8BB79919D80FC525D61A7C12190B38BEC40A22D4AE405EC8380DA56A1F75C
23,560,707 UART: [art] SIG.S = 775F1BB1569FA1E1641D96AD68F8B007AF2CC93B3B56F4F10EA8753A480ED1E35C3D152CF7691BED901E2D9205B2C4D8
24,539,035 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,436,863 ready_for_fw is high
3,437,232 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,969,728 >>> mbox cmd response: success
17,250,044 UART:
17,250,436 UART: Running Caliptra FMC ...
17,251,591 UART:
17,251,765 UART: [state] CFI Enabled
17,320,401 UART: [fht] FMC Alias Private Key: 7
19,083,853 UART: [art] Extend RT PCRs Done
19,085,129 UART: [art] Lock RT PCRs Done
19,086,707 UART: [art] Populate DV Done
19,091,965 UART: [fht] FMC Alias Private Key: 7
19,093,424 UART: [art] Derive CDI
19,094,232 UART: [art] Store in in slot 0x4
19,152,848 UART: [art] Derive Key Pair
19,153,947 UART: [art] Store priv key in slot 0x5
21,616,739 UART: [art] Derive Key Pair - Done
21,629,941 UART: [art] Signing Cert with AUTHO
21,631,271 UART: RITY.KEYID = 7
23,342,398 UART: [art] Erasing AUTHORITY.KEYID = 7
23,343,958 UART: [art] PUB.X = 034590D62A876BCD50B9EDBC8C720E55C8B38569583E72F63165AF82A0D3BD2ED76AC0FB44A85D27D637C0D03035FEFD
23,351,192 UART: [art] PUB.Y = 9FAC957BF6926B72395B45B16019050935BFCC58F60F86F47AB54F72F4242ACE0B773FA9352F541F697CD811C97BB812
23,358,419 UART: [art] SIG.R = 56DB9D838832270DF36A336D0CFB1D4BC4C5FEB02583C075F8D5F3ABFFAFE28AA2BE8853F9B257541B765C2984F20B6A
23,365,817 UART: [art] SIG.S = 9C53F5681B797C8EE1C1B1DFDB4EA89B934EE8B6C72086B0B17AF38463DFEB37FA6A1CE747063B67ECD044D507F2C3F2
24,344,668 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,450 UART:
192,803 UART: Running Caliptra ROM ...
193,970 UART:
603,761 UART: [state] CFI Enabled
617,985 UART: [state] LifecycleState = Unprovisioned
620,335 UART: [state] DebugLocked = No
622,485 UART: [state] WD Timer not started. Device not locked for debugging
627,085 UART: [kat] SHA2-256
816,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,781 UART: [kat] ++
828,226 UART: [kat] sha1
839,588 UART: [kat] SHA2-256
842,589 UART: [kat] SHA2-384
848,074 UART: [kat] SHA2-512-ACC
850,648 UART: [kat] ECC-384
3,292,459 UART: [kat] HMAC-384Kdf
3,304,682 UART: [kat] LMS
3,836,528 UART: [kat] --
3,839,953 UART: [cold-reset] ++
3,842,157 UART: [fht] FHT @ 0x50003400
3,853,834 UART: [idev] ++
3,854,539 UART: [idev] CDI.KEYID = 6
3,855,514 UART: [idev] SUBJECT.KEYID = 7
3,856,697 UART: [idev] UDS.KEYID = 0
3,857,616 ready_for_fw is high
3,857,795 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,897,688 UART: [idev] Erasing UDS.KEYID = 0
6,332,111 UART: [idev] Sha1 KeyId Algorithm
6,354,201 UART: [idev] --
6,358,136 UART: [ldev] ++
6,358,809 UART: [ldev] CDI.KEYID = 6
6,359,718 UART: [ldev] SUBJECT.KEYID = 5
6,360,920 UART: [ldev] AUTHORITY.KEYID = 7
6,362,141 UART: [ldev] FE.KEYID = 1
6,372,538 UART: [ldev] Erasing FE.KEYID = 1
8,852,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,270 UART: [ldev] --
10,642,002 UART: [fwproc] Wait for Commands...
10,645,070 UART: [fwproc] Recv command 0x46574c44
10,647,327 UART: [fwproc] Recv'd Img size: 31656 bytes
13,074,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,148,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,264,721 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,310,333 >>> mbox cmd response: success
13,315,108 UART: [afmc] ++
13,315,762 UART: [afmc] CDI.KEYID = 6
13,316,913 UART: [afmc] SUBJECT.KEYID = 7
13,318,407 UART: [afmc] AUTHORITY.KEYID = 5
15,819,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,544,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,546,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,561,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,576,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,591,888 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,615,739 UART: [afmc] --
17,618,717 UART: [cold-reset] --
17,623,853 UART: [state] Locking Datavault
17,629,624 UART: [state] Locking PCR0, PCR1 and PCR31
17,631,824 UART: [state] Locking ICCM
17,633,270 UART: [exit] Launching FMC @ 0x40000130
17,641,907 UART:
17,642,143 UART: Running Caliptra FMC ...
17,643,279 UART:
17,643,433 UART: [state] CFI Enabled
17,651,441 UART: [fht] FMC Alias Private Key: 7
19,408,733 UART: [art] Extend RT PCRs Done
19,409,993 UART: [art] Lock RT PCRs Done
19,411,677 UART: [art] Populate DV Done
19,417,275 UART: [fht] FMC Alias Private Key: 7
19,418,869 UART: [art] Derive CDI
19,419,718 UART: [art] Store in in slot 0x4
19,461,946 UART: [art] Derive Key Pair
19,463,032 UART: [art] Store priv key in slot 0x5
21,889,479 UART: [art] Derive Key Pair - Done
21,902,329 UART: [art] Signing Cert with AUTHO
21,903,662 UART: RITY.KEYID = 7
23,609,006 UART: [art] Erasing AUTHORITY.KEYID = 7
23,610,578 UART: [art] PUB.X = 88074C3028C0F5CAFE504F03C829EFCF0412D1D03FD5D69E6037DD8E91637E2A1C88ADF2F5E671EDD3198DDBC6C68683
23,617,823 UART: [art] PUB.Y = 11D4292E65D226865470A69E918BF790B9ACD6187E64E6BF5F2B77DBF54014AD9B941DFA0B0EFA1DEB611FC8BF51F5EC
23,625,077 UART: [art] SIG.R = 8252012359D78EC68A25D85313EA3A4C52DA7FD37ACF17A459A5EBE10A82059995CE8ACBD3942F267233D7FA3F24D1CF
23,632,516 UART: [art] SIG.S = 651F408856D8499251FE1C9E3663AABCF580F453B2E3047DB5022ACD89563A2B247C4B08D865466A7613FCF9CC8CE6FB
24,611,134 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,757,568 ready_for_fw is high
3,758,022 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,181,339 >>> mbox cmd response: success
17,431,628 UART:
17,432,025 UART: Running Caliptra FMC ...
17,433,177 UART:
17,433,330 UART: [state] CFI Enabled
17,441,411 UART: [fht] FMC Alias Private Key: 7
19,198,474 UART: [art] Extend RT PCRs Done
19,199,746 UART: [art] Lock RT PCRs Done
19,201,774 UART: [art] Populate DV Done
19,207,163 UART: [fht] FMC Alias Private Key: 7
19,208,830 UART: [art] Derive CDI
19,209,594 UART: [art] Store in in slot 0x4
19,252,465 UART: [art] Derive Key Pair
19,253,550 UART: [art] Store priv key in slot 0x5
21,679,982 UART: [art] Derive Key Pair - Done
21,692,946 UART: [art] Signing Cert with AUTHO
21,694,277 UART: RITY.KEYID = 7
23,399,180 UART: [art] Erasing AUTHORITY.KEYID = 7
23,400,732 UART: [art] PUB.X = BC17F2A7F0BE5CAB33C4ACCB9665444E60AE98D1EB9CBE58787C2B8ADF9E314270CD62C2F0A569FD9278B76659EF1A39
23,408,006 UART: [art] PUB.Y = DA88276F256EA2583ED26DE1A2835202A66D105499E45044E436C829C1295F80E800D890D4D913E74674B53DD12A7E1A
23,415,161 UART: [art] SIG.R = 5F181F1FA3C9CC2548FF6EFA550617C3BE75BCE4E1FCFD987E617AE7917F5F7EAD6A9A7D774383C200404DDD6DC9F7CB
23,422,589 UART: [art] SIG.S = FA1F36F721C01B192749BF311B4C6B5DB6964E4710C6AD8B2111273F3CEFF4884DC54CA6A1672EF67B920DBAFC289162
24,401,200 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,307 UART: [kat] SHA2-256
892,245 UART: [kat] SHA2-384
895,028 UART: [kat] SHA2-512-ACC
896,929 UART: [kat] ECC-384
902,262 UART: [kat] HMAC-384Kdf
906,784 UART: [kat] LMS
1,474,980 UART: [kat] --
1,475,757 UART: [cold-reset] ++
1,476,217 UART: [fht] Storing FHT @ 0x50003400
1,479,028 UART: [idev] ++
1,479,196 UART: [idev] CDI.KEYID = 6
1,479,556 UART: [idev] SUBJECT.KEYID = 7
1,479,980 UART: [idev] UDS.KEYID = 0
1,480,325 ready_for_fw is high
1,480,325 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,487,692 UART: [idev] Erasing UDS.KEYID = 0
1,504,028 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,588 UART: [idev] --
1,513,631 UART: [ldev] ++
1,513,799 UART: [ldev] CDI.KEYID = 6
1,514,162 UART: [ldev] SUBJECT.KEYID = 5
1,514,588 UART: [ldev] AUTHORITY.KEYID = 7
1,515,051 UART: [ldev] FE.KEYID = 1
1,519,939 UART: [ldev] Erasing FE.KEYID = 1
1,545,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,984 UART: [ldev] --
1,584,497 UART: [fwproc] Waiting for Commands...
1,585,286 UART: [fwproc] Received command 0x46574c44
1,586,077 UART: [fwproc] Received Image of size 31656 bytes
1,936,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,963,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,993,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,004,845 >>> mbox cmd response: success
2,006,099 UART: [afmc] ++
2,006,267 UART: [afmc] CDI.KEYID = 6
2,006,629 UART: [afmc] SUBJECT.KEYID = 7
2,007,054 UART: [afmc] AUTHORITY.KEYID = 5
2,041,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,057,653 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,058,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,064,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,070,046 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,075,736 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,083,595 UART: [afmc] --
2,084,671 UART: [cold-reset] --
2,085,531 UART: [state] Locking Datavault
2,086,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,087,202 UART: [state] Locking ICCM
2,087,698 UART: [exit] Launching FMC @ 0x40000130
2,093,027 UART:
2,093,043 UART: Running Caliptra FMC ...
2,093,451 UART:
2,093,505 UART: [state] CFI Enabled
2,103,888 UART: [fht] FMC Alias Private Key: 7
2,211,749 UART: [art] Extend RT PCRs Done
2,212,177 UART: [art] Lock RT PCRs Done
2,213,529 UART: [art] Populate DV Done
2,221,764 UART: [fht] FMC Alias Private Key: 7
2,222,910 UART: [art] Derive CDI
2,223,190 UART: [art] Store in in slot 0x4
2,308,463 UART: [art] Derive Key Pair
2,308,823 UART: [art] Store priv key in slot 0x5
2,322,191 UART: [art] Derive Key Pair - Done
2,337,190 UART: [art] Signing Cert with AUTHO
2,337,670 UART: RITY.KEYID = 7
2,352,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,353,535 UART: [art] PUB.X = 716D328FB83F97AC600A29AB08CB77A4DC6794CB68C1A0768F3CA3D55B99FA79CF725F2961052C777CBC8BFAEB2AD40D
2,360,311 UART: [art] PUB.Y = 878CE81C4D924262F6BD7D61F03A93ED34C8F12BBE6F2C5EAE43C690DC8FB150A4F9BC4AD33C95854640ABEB4508D559
2,367,274 UART: [art] SIG.R = E312CA807BB79353DDEA57F4978D50BDAD68A27E599BC76AC5A59C583C3ECB97A124F30D504B042E5FEDC23AC15570B4
2,374,054 UART: [art] SIG.S = 06C47CB89497CF73695018F8063F58DD158ED53FAFFF27B0FBE494A82C8B5D4912A5862D34BEB10544B32C7EACAC9A96
2,397,895 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,199 ready_for_fw is high
1,363,199 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,583 >>> mbox cmd response: success
1,919,295 UART:
1,919,311 UART: Running Caliptra FMC ...
1,919,719 UART:
1,919,773 UART: [state] CFI Enabled
1,930,072 UART: [fht] FMC Alias Private Key: 7
2,038,189 UART: [art] Extend RT PCRs Done
2,038,617 UART: [art] Lock RT PCRs Done
2,039,979 UART: [art] Populate DV Done
2,048,320 UART: [fht] FMC Alias Private Key: 7
2,049,418 UART: [art] Derive CDI
2,049,698 UART: [art] Store in in slot 0x4
2,135,531 UART: [art] Derive Key Pair
2,135,891 UART: [art] Store priv key in slot 0x5
2,148,775 UART: [art] Derive Key Pair - Done
2,163,488 UART: [art] Signing Cert with AUTHO
2,163,968 UART: RITY.KEYID = 7
2,179,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,983 UART: [art] PUB.X = 6087BB52DC5C193FA6D054A7ADC3C53AA8D0CACA81E72F3C7241D0277B888555C6BB4217235243D1E7AD5DAC42CC626F
2,186,767 UART: [art] PUB.Y = B7742C3DC9F3EAC1CF3C85D508B3C1C7A3CDC1FB85C91F03D9FF2BC6A9C7016FC60BA757F84EE8A206B52B5FA0347201
2,193,721 UART: [art] SIG.R = A90614F12AD2CD83FFDD9250CC7FCCA23010572968659494153E906874B74FAEF3B0AE8CA5759F7E4D3CB443DD82AD90
2,200,498 UART: [art] SIG.S = 7D010214AEAA533BA85DBD20E0691E28FA85902F470BE2DE56394F6FEC69CFD60A39A25400BD463999A846A8F68DE7CB
2,224,672 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,766 UART: [kat] SHA2-256
881,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,812 UART: [kat] ++
885,964 UART: [kat] sha1
890,240 UART: [kat] SHA2-256
892,178 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,533 UART: [kat] HMAC-384Kdf
907,169 UART: [kat] LMS
1,475,365 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,870 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,791 UART: [idev] Erasing UDS.KEYID = 0
1,505,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,545 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,522,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,005 UART: [ldev] --
1,586,446 UART: [fwproc] Waiting for Commands...
1,587,133 UART: [fwproc] Received command 0x46574c44
1,587,924 UART: [fwproc] Received Image of size 31656 bytes
1,939,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,996 >>> mbox cmd response: success
2,009,010 UART: [afmc] ++
2,009,178 UART: [afmc] CDI.KEYID = 6
2,009,540 UART: [afmc] SUBJECT.KEYID = 7
2,009,965 UART: [afmc] AUTHORITY.KEYID = 5
2,045,690 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,146 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,539 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,229 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,956 UART: [afmc] --
2,088,996 UART: [cold-reset] --
2,089,838 UART: [state] Locking Datavault
2,090,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,555 UART: [state] Locking ICCM
2,092,135 UART: [exit] Launching FMC @ 0x40000130
2,097,464 UART:
2,097,480 UART: Running Caliptra FMC ...
2,097,888 UART:
2,098,031 UART: [state] CFI Enabled
2,108,694 UART: [fht] FMC Alias Private Key: 7
2,216,229 UART: [art] Extend RT PCRs Done
2,216,657 UART: [art] Lock RT PCRs Done
2,218,073 UART: [art] Populate DV Done
2,226,320 UART: [fht] FMC Alias Private Key: 7
2,227,346 UART: [art] Derive CDI
2,227,626 UART: [art] Store in in slot 0x4
2,313,469 UART: [art] Derive Key Pair
2,313,829 UART: [art] Store priv key in slot 0x5
2,327,583 UART: [art] Derive Key Pair - Done
2,342,327 UART: [art] Signing Cert with AUTHO
2,342,807 UART: RITY.KEYID = 7
2,358,005 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,770 UART: [art] PUB.X = 4C75BEB85609F2E30D5618E755032DF29F210E6698F8D77403DA80AEB6A34DCADD2F53663F501456A6C5895BC48FA250
2,365,529 UART: [art] PUB.Y = 7743E94D03F9A68C5F657832811B999F66A3D4FF6B7ABDFB5E3B11192D2845C777C801B2C630676FD022499F304024DF
2,372,471 UART: [art] SIG.R = B529B724DFA962E8BDC9ACF17525B16512F560D2C078A2DF69203D46758CE6C1E9B1C8D1D0D2AAF68FE099E5046EE4A9
2,379,252 UART: [art] SIG.S = 3334DE17B80B25F8D9BCBB1A3C5F31B221EDDF1A3F6E93590C35BE061866345F7E2A9D266DC1256BCE02737B31CEEFB8
2,403,134 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,610 >>> mbox cmd response: success
1,918,794 UART:
1,918,810 UART: Running Caliptra FMC ...
1,919,218 UART:
1,919,361 UART: [state] CFI Enabled
1,930,154 UART: [fht] FMC Alias Private Key: 7
2,037,947 UART: [art] Extend RT PCRs Done
2,038,375 UART: [art] Lock RT PCRs Done
2,039,847 UART: [art] Populate DV Done
2,048,140 UART: [fht] FMC Alias Private Key: 7
2,049,076 UART: [art] Derive CDI
2,049,356 UART: [art] Store in in slot 0x4
2,134,689 UART: [art] Derive Key Pair
2,135,049 UART: [art] Store priv key in slot 0x5
2,148,263 UART: [art] Derive Key Pair - Done
2,163,111 UART: [art] Signing Cert with AUTHO
2,163,591 UART: RITY.KEYID = 7
2,178,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,472 UART: [art] PUB.X = 16EE87D9E612C858D6E4E867F836B6A7AB61E60194AC2ABA353555810C89CEEB2B12E9A456D3067471A8A475A5673CBC
2,186,239 UART: [art] PUB.Y = F99CAB05854FB9F24216A5C4C0A42F558E4A6ADF39EFD03AF30F2A934C2A891BCE0737F271893EF3F314CAEB494C3141
2,193,194 UART: [art] SIG.R = 68C5E013DDB8FFA148B4122FE20256697603990D01D0A02A73B4806E2BE09697548E429201869D41CE860819ECC623F7
2,199,938 UART: [art] SIG.S = 1097BCE0B2D90CCC1C894ABE1DDA6522584221A8F85087A9DB7E812EA23BC961C771E064845873AF4D269702E6E6E5EE
2,223,778 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,663 UART: [kat] SHA2-256
903,603 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
917,434 UART: [kat] HMAC-384Kdf
921,842 UART: [kat] LMS
1,170,170 UART: [kat] --
1,171,171 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,438 UART: [idev] ++
1,174,606 UART: [idev] CDI.KEYID = 6
1,174,966 UART: [idev] SUBJECT.KEYID = 7
1,175,390 UART: [idev] UDS.KEYID = 0
1,175,735 ready_for_fw is high
1,175,735 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,194 UART: [idev] Erasing UDS.KEYID = 0
1,200,127 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,102 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,658,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,199 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,699,878 >>> mbox cmd response: success
1,701,048 UART: [afmc] ++
1,701,216 UART: [afmc] CDI.KEYID = 6
1,701,578 UART: [afmc] SUBJECT.KEYID = 7
1,702,003 UART: [afmc] AUTHORITY.KEYID = 5
1,737,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,754,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,779,875 UART: [afmc] --
1,780,921 UART: [cold-reset] --
1,781,773 UART: [state] Locking Datavault
1,782,986 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,590 UART: [state] Locking ICCM
1,784,264 UART: [exit] Launching FMC @ 0x40000130
1,789,593 UART:
1,789,609 UART: Running Caliptra FMC ...
1,790,017 UART:
1,790,071 UART: [state] CFI Enabled
1,800,728 UART: [fht] FMC Alias Private Key: 7
1,908,763 UART: [art] Extend RT PCRs Done
1,909,191 UART: [art] Lock RT PCRs Done
1,911,025 UART: [art] Populate DV Done
1,919,124 UART: [fht] FMC Alias Private Key: 7
1,920,060 UART: [art] Derive CDI
1,920,340 UART: [art] Store in in slot 0x4
2,005,673 UART: [art] Derive Key Pair
2,006,033 UART: [art] Store priv key in slot 0x5
2,018,747 UART: [art] Derive Key Pair - Done
2,033,696 UART: [art] Signing Cert with AUTHO
2,034,176 UART: RITY.KEYID = 7
2,049,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,111 UART: [art] PUB.X = 6C257D9B15CFE9BC74904358DCD8FB6BDF20F01A3E778B73B3105514C302ADC9CB9BACE613FC8B73E7D350B550875792
2,056,890 UART: [art] PUB.Y = 972D29745B23AD9AAF15DC9A2EEF519C4D954502E2435DBBF7B089DFD61763BA1F13E021240536C0BC419669BAD51A27
2,063,842 UART: [art] SIG.R = 11D02C3A6650142C9AAB0402863F4839BE37030A34F9CA60C6B2B37ED4B57985DA3E83A0F04538BD7EDAA685C41A896A
2,070,606 UART: [art] SIG.S = AB8CB1AE0C12602439B91ADAD425287E3E181910F8A321B01AA1EF7D23BF3412A4AA355C19C02E63CAE69E0571C47EEA
2,094,276 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,599 ready_for_fw is high
1,060,599 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,467 >>> mbox cmd response: success
1,617,385 UART:
1,617,401 UART: Running Caliptra FMC ...
1,617,809 UART:
1,617,863 UART: [state] CFI Enabled
1,628,390 UART: [fht] FMC Alias Private Key: 7
1,735,665 UART: [art] Extend RT PCRs Done
1,736,093 UART: [art] Lock RT PCRs Done
1,737,669 UART: [art] Populate DV Done
1,745,826 UART: [fht] FMC Alias Private Key: 7
1,746,822 UART: [art] Derive CDI
1,747,102 UART: [art] Store in in slot 0x4
1,832,529 UART: [art] Derive Key Pair
1,832,889 UART: [art] Store priv key in slot 0x5
1,846,135 UART: [art] Derive Key Pair - Done
1,860,634 UART: [art] Signing Cert with AUTHO
1,861,114 UART: RITY.KEYID = 7
1,876,192 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,957 UART: [art] PUB.X = 23184AEDE90F4CBB90FE3D7ACC37382EB28700F6BD89FBE78E72623AEBF5ACEC22B6694E2B2A98E83813E8C25CBB52D3
1,883,724 UART: [art] PUB.Y = F2DD7378B1E1E61B8064F60737DBC4620C6F3183E72C9E0E071D8D5E2F2264CA191CD1DB3A956008299F159FD0BCB3DF
1,890,669 UART: [art] SIG.R = 0665A31FFFC80AEAE91DDF4B7DA46D09EC028324C82923135E22E00A7EDE12BA3466E9D16FFC5FCA8069A2222E768B56
1,897,438 UART: [art] SIG.S = DD5A6F148BBC069325A3976B54C1BD55BC38B16627A2C27194A09F907BC6A8C9D9AF9BF98534FAFA69902C21C8C4EC6C
1,921,103 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,701 UART: [kat] SHA2-512-ACC
908,602 UART: [kat] ECC-384
918,271 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,006 UART: [cold-reset] ++
1,172,474 UART: [fht] FHT @ 0x50003400
1,174,939 UART: [idev] ++
1,175,107 UART: [idev] CDI.KEYID = 6
1,175,467 UART: [idev] SUBJECT.KEYID = 7
1,175,891 UART: [idev] UDS.KEYID = 0
1,176,236 ready_for_fw is high
1,176,236 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,235 UART: [idev] Erasing UDS.KEYID = 0
1,200,244 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,633 UART: [ldev] AUTHORITY.KEYID = 7
1,211,096 UART: [ldev] FE.KEYID = 1
1,216,348 UART: [ldev] Erasing FE.KEYID = 1
1,242,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,806 UART: [ldev] --
1,282,139 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,626 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,429 >>> mbox cmd response: success
1,704,527 UART: [afmc] ++
1,704,695 UART: [afmc] CDI.KEYID = 6
1,705,057 UART: [afmc] SUBJECT.KEYID = 7
1,705,482 UART: [afmc] AUTHORITY.KEYID = 5
1,741,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,316 UART: [afmc] --
1,784,310 UART: [cold-reset] --
1,785,214 UART: [state] Locking Datavault
1,786,501 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,105 UART: [state] Locking ICCM
1,787,743 UART: [exit] Launching FMC @ 0x40000130
1,793,072 UART:
1,793,088 UART: Running Caliptra FMC ...
1,793,496 UART:
1,793,639 UART: [state] CFI Enabled
1,804,356 UART: [fht] FMC Alias Private Key: 7
1,911,775 UART: [art] Extend RT PCRs Done
1,912,203 UART: [art] Lock RT PCRs Done
1,913,823 UART: [art] Populate DV Done
1,921,802 UART: [fht] FMC Alias Private Key: 7
1,922,928 UART: [art] Derive CDI
1,923,208 UART: [art] Store in in slot 0x4
2,009,319 UART: [art] Derive Key Pair
2,009,679 UART: [art] Store priv key in slot 0x5
2,022,929 UART: [art] Derive Key Pair - Done
2,037,784 UART: [art] Signing Cert with AUTHO
2,038,264 UART: RITY.KEYID = 7
2,053,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,511 UART: [art] PUB.X = A82A029D4BD2CFA961DDBB6A5B074F1827AAB5F081E74FC187AFA1F6E9EC287B231EDB3F2C313E33BD1BF55BA08EC12B
2,061,303 UART: [art] PUB.Y = B020CDD8F47BAFC7094F61489BEE89CF817A38FD473EF03A1D4F9600AEE4A8DAF331491ACAF79690A9B8A6CE72EC96CA
2,068,252 UART: [art] SIG.R = 08AA43354D8DCB830FDF63D683792E994F4A1119EDD5F7867FA296C4B09EE53A7A29BDCABFCA637394C9A896DB7952A1
2,075,030 UART: [art] SIG.S = 72680118037798DC7C55FFBBECEA1FF273480A86A1CA7F8BFCB37C3543B7CD2A177F85FB77DE12243DA6B8F3FF3C6C77
2,098,199 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,062,012 ready_for_fw is high
1,062,012 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,606 >>> mbox cmd response: success
1,619,828 UART:
1,619,844 UART: Running Caliptra FMC ...
1,620,252 UART:
1,620,395 UART: [state] CFI Enabled
1,631,040 UART: [fht] FMC Alias Private Key: 7
1,739,023 UART: [art] Extend RT PCRs Done
1,739,451 UART: [art] Lock RT PCRs Done
1,740,553 UART: [art] Populate DV Done
1,748,638 UART: [fht] FMC Alias Private Key: 7
1,749,668 UART: [art] Derive CDI
1,749,948 UART: [art] Store in in slot 0x4
1,835,425 UART: [art] Derive Key Pair
1,835,785 UART: [art] Store priv key in slot 0x5
1,849,351 UART: [art] Derive Key Pair - Done
1,864,053 UART: [art] Signing Cert with AUTHO
1,864,533 UART: RITY.KEYID = 7
1,879,907 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,672 UART: [art] PUB.X = 76C10232F295D00C6C6584A2EF9A77950C30E0EC39568096FF5A38738080F7F91A62C8FD237DEADC8F4388139E97C5BC
1,887,435 UART: [art] PUB.Y = 8236524117AEB56AE4E1F0100F3EA0CD9E07E1239484E174B11580850A2E383A9129F4DEDCAF85EA37C0AB4A9CA74D0F
1,894,383 UART: [art] SIG.R = 3704B424F1984F887B53B8BD715756888EE483A186B559E598BDDB5B9D9B4D0A1BE34142C4DAC7F64F8D4C6BF4FCB52D
1,901,159 UART: [art] SIG.S = 0AFD2DCA31B46A5388C2E2DB40B839C25A9B600E58987BC20C4F43BF7EF5E0BDD4677029569DB7E28BB524794FE8B366
1,924,940 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,800 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,169,843 UART: [fht] FHT @ 0x50003400
1,172,355 UART: [idev] ++
1,172,523 UART: [idev] CDI.KEYID = 6
1,172,884 UART: [idev] SUBJECT.KEYID = 7
1,173,309 UART: [idev] UDS.KEYID = 0
1,173,655 ready_for_fw is high
1,173,655 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,275 UART: [idev] --
1,208,146 UART: [ldev] ++
1,208,314 UART: [ldev] CDI.KEYID = 6
1,208,678 UART: [ldev] SUBJECT.KEYID = 5
1,209,105 UART: [ldev] AUTHORITY.KEYID = 7
1,209,568 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,336 UART: [fwproc] Wait for Commands...
1,281,133 UART: [fwproc] Recv command 0x46574c44
1,281,866 UART: [fwproc] Recv'd Img size: 31656 bytes
1,631,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,084 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,800 >>> mbox cmd response: success
1,701,905 UART: [afmc] ++
1,702,073 UART: [afmc] CDI.KEYID = 6
1,702,436 UART: [afmc] SUBJECT.KEYID = 7
1,702,862 UART: [afmc] AUTHORITY.KEYID = 5
1,738,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,022 UART: [afmc] --
1,782,056 UART: [cold-reset] --
1,782,768 UART: [state] Locking Datavault
1,783,865 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,469 UART: [state] Locking ICCM
1,785,075 UART: [exit] Launching FMC @ 0x40000130
1,790,404 UART:
1,790,420 UART: Running Caliptra FMC ...
1,790,828 UART:
1,790,882 UART: [state] CFI Enabled
1,801,611 UART: [fht] FMC Alias Private Key: 7
1,910,048 UART: [art] Extend RT PCRs Done
1,910,476 UART: [art] Lock RT PCRs Done
1,911,824 UART: [art] Populate DV Done
1,920,113 UART: [fht] FMC Alias Private Key: 7
1,921,243 UART: [art] Derive CDI
1,921,523 UART: [art] Store in in slot 0x4
2,007,140 UART: [art] Derive Key Pair
2,007,500 UART: [art] Store priv key in slot 0x5
2,020,968 UART: [art] Derive Key Pair - Done
2,035,748 UART: [art] Signing Cert with AUTHO
2,036,228 UART: RITY.KEYID = 7
2,051,260 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,025 UART: [art] PUB.X = 58C541E46B851D908F3FAECA57345F89F1111DDC32173378F171364D85F7E0DF43D33F80C665147FC2D97EC2298A7485
2,058,793 UART: [art] PUB.Y = 47C3BB4BAB45FC2E47309341C9B5BE8E7DF05A10B753FA1CB2CA44EE7BB03CBCC8478B330806BB1B8248716E5519404D
2,065,751 UART: [art] SIG.R = 5C54D85146F82D522AFD6ABDDAA3347C83B3783F5E2D8DF2E3BFDF3F0C5FE16F161C6BE39D4A3881564436964E1F479B
2,072,532 UART: [art] SIG.S = A48FBEF678D60719713ED4A4C2AE3D22E88AF2D9FFD87F1AE7276B40F090AF967951ED6D95B5E1E1ECA95A3B0DA3A22E
2,096,190 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,376 ready_for_fw is high
1,056,376 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,030 >>> mbox cmd response: success
1,613,114 UART:
1,613,130 UART: Running Caliptra FMC ...
1,613,538 UART:
1,613,592 UART: [state] CFI Enabled
1,624,161 UART: [fht] FMC Alias Private Key: 7
1,732,514 UART: [art] Extend RT PCRs Done
1,732,942 UART: [art] Lock RT PCRs Done
1,734,044 UART: [art] Populate DV Done
1,742,323 UART: [fht] FMC Alias Private Key: 7
1,743,445 UART: [art] Derive CDI
1,743,725 UART: [art] Store in in slot 0x4
1,828,992 UART: [art] Derive Key Pair
1,829,352 UART: [art] Store priv key in slot 0x5
1,842,758 UART: [art] Derive Key Pair - Done
1,857,612 UART: [art] Signing Cert with AUTHO
1,858,092 UART: RITY.KEYID = 7
1,873,290 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,055 UART: [art] PUB.X = 39635904D082C65AD7E971374DF96E132050009B7A853C489EF44E7C2F9DF05853D75AA7A17A9A338A346074E4120408
1,880,784 UART: [art] PUB.Y = 2C75DA0E0BCD935CB6F83D547A8B46A10FDCFF4B4D1EEAB57AD5E5AD49DD9E5BB7F136F7D33225307281C7B2D376336B
1,887,747 UART: [art] SIG.R = 5547F51CF1B9A8FE612620A9484139D3C972BF320DB8605840941241827C928FFA2D6B1FA1C2794A7211A558B4186F25
1,894,506 UART: [art] SIG.S = 656E0A04D310B3EEF6E274E6A9029630154671EF006982D79A3FBABE051A18553110693FDA921E3B761E53A5F396111E
1,917,874 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 ready_for_fw is high
1,174,264 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,928 UART: [idev] Erasing UDS.KEYID = 0
1,199,022 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,853 UART: [ldev] ++
1,209,021 UART: [ldev] CDI.KEYID = 6
1,209,385 UART: [ldev] SUBJECT.KEYID = 5
1,209,812 UART: [ldev] AUTHORITY.KEYID = 7
1,210,275 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,241,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,985 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x46574c44
1,282,979 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,159 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,891 >>> mbox cmd response: success
1,701,982 UART: [afmc] ++
1,702,150 UART: [afmc] CDI.KEYID = 6
1,702,513 UART: [afmc] SUBJECT.KEYID = 7
1,702,939 UART: [afmc] AUTHORITY.KEYID = 5
1,738,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,495 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,224 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,826 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,751 UART: [afmc] --
1,781,691 UART: [cold-reset] --
1,782,599 UART: [state] Locking Datavault
1,783,798 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,402 UART: [state] Locking ICCM
1,784,860 UART: [exit] Launching FMC @ 0x40000130
1,790,189 UART:
1,790,205 UART: Running Caliptra FMC ...
1,790,613 UART:
1,790,756 UART: [state] CFI Enabled
1,801,359 UART: [fht] FMC Alias Private Key: 7
1,909,856 UART: [art] Extend RT PCRs Done
1,910,284 UART: [art] Lock RT PCRs Done
1,911,848 UART: [art] Populate DV Done
1,920,253 UART: [fht] FMC Alias Private Key: 7
1,921,315 UART: [art] Derive CDI
1,921,595 UART: [art] Store in in slot 0x4
2,007,126 UART: [art] Derive Key Pair
2,007,486 UART: [art] Store priv key in slot 0x5
2,020,890 UART: [art] Derive Key Pair - Done
2,035,628 UART: [art] Signing Cert with AUTHO
2,036,108 UART: RITY.KEYID = 7
2,050,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,739 UART: [art] PUB.X = 0319E111DD216178A4A3D9300A273332D0A9A8DDD3E85C412A0216E9BF80BD138FD9B0183DFEB404457874F556014410
2,058,490 UART: [art] PUB.Y = CDA79929A7E3D186E70D62ABD01CC480627804BBC16FE8855ED828B428A076874E40D09E7674F6C42CE6EA444652DFFE
2,065,442 UART: [art] SIG.R = F38528C6A105E35CF35B41E8A3FFA82A4311689811593E960FC436C933664AA2A0F6BA8EC09D2F4DB40A5AE6CEE07B0F
2,072,212 UART: [art] SIG.S = 8F56110BE6CF3A5F83780E5FA265830529BDDF6F84A9E4E989FA81D7DA8536FD5C110423AEA0B8ABCCAC50037671C9FB
2,096,031 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,201 ready_for_fw is high
1,056,201 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,829 >>> mbox cmd response: success
1,612,921 UART:
1,612,937 UART: Running Caliptra FMC ...
1,613,345 UART:
1,613,488 UART: [state] CFI Enabled
1,624,003 UART: [fht] FMC Alias Private Key: 7
1,732,100 UART: [art] Extend RT PCRs Done
1,732,528 UART: [art] Lock RT PCRs Done
1,734,282 UART: [art] Populate DV Done
1,742,303 UART: [fht] FMC Alias Private Key: 7
1,743,423 UART: [art] Derive CDI
1,743,703 UART: [art] Store in in slot 0x4
1,829,224 UART: [art] Derive Key Pair
1,829,584 UART: [art] Store priv key in slot 0x5
1,842,790 UART: [art] Derive Key Pair - Done
1,857,918 UART: [art] Signing Cert with AUTHO
1,858,398 UART: RITY.KEYID = 7
1,873,756 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,521 UART: [art] PUB.X = 537D1E91DDF7184D886AE69A4121FCCC5A881B6E6039F8CE62356852D28C72ED1F7C064755D3580A98D57B1DB7816DE4
1,881,289 UART: [art] PUB.Y = CCA68CBD4B04DF7DD76B609F83A6E7C4E4E6E934E94F380E73834417CFD8A01D39FB41A4A603CB9DB8C70E794A472BDE
1,888,247 UART: [art] SIG.R = 3607E5AC8341B92D9B83EC183A0725A87B6CCB28093BA98EBAB783E8A6D92F710FE87899B017C0DBF75F1425E357F49C
1,895,013 UART: [art] SIG.S = F18E14ED8A8940987D4692A78AA195F811185A53C8F50E2F4F24C320113E4834279045440FB212E014C964F0AB4302CC
1,918,800 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,172 UART:
192,548 UART: Running Caliptra ROM ...
193,699 UART:
193,851 UART: [state] CFI Enabled
264,733 UART: [state] LifecycleState = Unprovisioned
266,735 UART: [state] DebugLocked = No
268,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,365 UART: [kat] SHA2-256
443,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,569 UART: [kat] ++
454,014 UART: [kat] sha1
465,531 UART: [kat] SHA2-256
468,247 UART: [kat] SHA2-384
474,733 UART: [kat] SHA2-512-ACC
477,108 UART: [kat] ECC-384
2,768,048 UART: [kat] HMAC-384Kdf
2,800,104 UART: [kat] LMS
3,990,360 UART: [kat] --
3,995,757 UART: [cold-reset] ++
3,996,774 UART: [fht] Storing FHT @ 0x50003400
4,008,181 UART: [idev] ++
4,008,753 UART: [idev] CDI.KEYID = 6
4,009,744 UART: [idev] SUBJECT.KEYID = 7
4,010,922 UART: [idev] UDS.KEYID = 0
4,011,982 ready_for_fw is high
4,012,191 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,111,347 UART: [idev] Erasing UDS.KEYID = 0
7,347,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,441 UART: [idev] --
7,373,460 UART: [ldev] ++
7,374,033 UART: [ldev] CDI.KEYID = 6
7,374,950 UART: [ldev] SUBJECT.KEYID = 5
7,376,160 UART: [ldev] AUTHORITY.KEYID = 7
7,377,439 UART: [ldev] FE.KEYID = 1
7,422,290 UART: [ldev] Erasing FE.KEYID = 1
10,753,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,583 UART: [ldev] --
13,115,789 UART: [fwproc] Waiting for Commands...
13,117,617 UART: [fwproc] Received command 0x46574c44
13,119,797 UART: [fwproc] Received Image of size 78740 bytes
16,747,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,827,256 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,896,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,089,354 >>> mbox cmd response: success
17,089,817 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,094,005 UART: [afmc] ++
17,094,616 UART: [afmc] CDI.KEYID = 6
17,095,531 UART: [afmc] SUBJECT.KEYID = 7
17,096,754 UART: [afmc] AUTHORITY.KEYID = 5
20,455,645 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,755,231 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,757,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,771,937 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,786,792 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,801,208 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,822,087 UART: [afmc] --
22,825,302 UART: [cold-reset] --
22,828,568 UART: [state] Locking Datavault
22,833,179 UART: [state] Locking PCR0, PCR1 and PCR31
22,834,914 UART: [state] Locking ICCM
22,836,127 UART: [exit] Launching FMC @ 0x40000130
22,844,522 UART:
22,844,787 UART: Running Caliptra FMC ...
22,845,817 UART:
22,845,963 UART: [state] CFI Enabled
22,914,562 UART: [fht] FMC Alias Private Key: 7
25,252,962 UART: [art] Extend RT PCRs Done
25,254,179 UART: [art] Lock RT PCRs Done
25,255,999 UART: [art] Populate DV Done
25,261,306 UART: [fht] FMC Alias Private Key: 7
25,263,008 UART: [art] Derive CDI
25,263,750 UART: [art] Store in in slot 0x4
25,323,031 UART: [art] Derive Key Pair
25,324,073 UART: [art] Store priv key in slot 0x5
28,617,216 UART: [art] Derive Key Pair - Done
28,630,220 UART: [art] Signing Cert with AUTHO
28,631,575 UART: RITY.KEYID = 7
30,919,287 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,813 UART: [art] PUB.X = AAD7169A0ED077F1AF7924F3BBAD0D519812FB2F446B230BF2AB478A4DEC3012AD8D33858CEC1D09F4D54453F7AD1257
30,928,085 UART: [art] PUB.Y = 9A4B12228E63C2E4614B87A25051DC87A2D6FB5BB03D9DF0AC410441BF5465FF6CB5F39FC7E5586C431B85F36FECCABA
30,935,329 UART: [art] SIG.R = AB1472DCA02E348B9E513076B4FEA8C007C67A99008CE30E81E4CE709152A2DD05E9E563EBAD38BDB4CFAE20279DDDBB
30,942,741 UART: [art] SIG.S = FC04D92FD8A626ECEA633134527BE167E2792FA97E9050DCB5EEF18E49E92D4F325CAB4F5B55105193602225EEDCA6F8
32,248,149 UART: mbox::rt_entry...
32,249,112 UART: ____ _ _ _ ____ _____
32,251,097 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,992 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,848 UART: |_|
32,259,651 UART:
32,372,960 UART: [rt] Runtime listening for mailbox commands...
32,375,079 >>> mbox cmd response data (48 bytes)
32,375,680 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,378,005 >>> mbox cmd response data (48 bytes)
32,378,877 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,391,424 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,804,864 ready_for_fw is high
3,805,434 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,150,481 >>> mbox cmd response: success
17,151,075 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,844,789 UART:
22,845,155 UART: Running Caliptra FMC ...
22,846,291 UART:
22,846,450 UART: [state] CFI Enabled
22,914,382 UART: [fht] FMC Alias Private Key: 7
25,252,495 UART: [art] Extend RT PCRs Done
25,253,710 UART: [art] Lock RT PCRs Done
25,255,585 UART: [art] Populate DV Done
25,260,957 UART: [fht] FMC Alias Private Key: 7
25,262,496 UART: [art] Derive CDI
25,263,257 UART: [art] Store in in slot 0x4
25,324,704 UART: [art] Derive Key Pair
25,325,773 UART: [art] Store priv key in slot 0x5
28,618,832 UART: [art] Derive Key Pair - Done
28,632,046 UART: [art] Signing Cert with AUTHO
28,633,358 UART: RITY.KEYID = 7
30,919,696 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,203 UART: [art] PUB.X = 86F561447CCB0C5483EC3FD1F112CE691E602CF2C6E459980B8B9E007156C24DC7C4355ECE193F4BF8BBE9BFACFF90C1
30,928,452 UART: [art] PUB.Y = 1054C49FC10F0AFC4B1907B104CF191EDB5DD49CB1530DB88B4300BEE1FB9C8A0C6DD8906DBC23E91CCBBF4BC05E6649
30,935,751 UART: [art] SIG.R = 85135A2FB32E396FF629D8BC54A7DB15C567E7C0C49E12414DC09C8A3A024C4B3BC20124C0531DFDC7EA7F161C54C6DA
30,943,162 UART: [art] SIG.S = ED492F7B060535008B5BB2D1A02DB2571D4A607D42C6DC58F5AE58FF37C960B4F276B42BF57FB1BA0E31DC046767CE99
32,248,326 UART: mbox::rt_entry...
32,249,294 UART: ____ _ _ _ ____ _____
32,251,222 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,077 UART: |_|
32,259,916 UART:
32,372,586 UART: [rt] Runtime listening for mailbox commands...
32,374,759 >>> mbox cmd response data (48 bytes)
32,375,354 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,377,676 >>> mbox cmd response data (48 bytes)
32,378,514 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,391,065 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,449 UART:
192,803 UART: Running Caliptra ROM ...
194,002 UART:
603,740 UART: [state] CFI Enabled
616,000 UART: [state] LifecycleState = Unprovisioned
617,960 UART: [state] DebugLocked = No
619,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,343 UART: [kat] SHA2-256
795,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,663 UART: [kat] ++
806,203 UART: [kat] sha1
817,787 UART: [kat] SHA2-256
820,498 UART: [kat] SHA2-384
826,766 UART: [kat] SHA2-512-ACC
829,139 UART: [kat] ECC-384
3,113,962 UART: [kat] HMAC-384Kdf
3,127,099 UART: [kat] LMS
4,317,236 UART: [kat] --
4,321,092 UART: [cold-reset] ++
4,322,809 UART: [fht] Storing FHT @ 0x50003400
4,333,429 UART: [idev] ++
4,333,986 UART: [idev] CDI.KEYID = 6
4,334,937 UART: [idev] SUBJECT.KEYID = 7
4,336,175 UART: [idev] UDS.KEYID = 0
4,337,202 ready_for_fw is high
4,337,396 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,436,391 UART: [idev] Erasing UDS.KEYID = 0
7,619,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,068 UART: [idev] --
7,647,549 UART: [ldev] ++
7,648,114 UART: [ldev] CDI.KEYID = 6
7,649,093 UART: [ldev] SUBJECT.KEYID = 5
7,650,303 UART: [ldev] AUTHORITY.KEYID = 7
7,651,527 UART: [ldev] FE.KEYID = 1
7,663,841 UART: [ldev] Erasing FE.KEYID = 1
10,953,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,317 UART: [ldev] --
13,316,466 UART: [fwproc] Waiting for Commands...
13,319,256 UART: [fwproc] Received command 0x46574c44
13,321,431 UART: [fwproc] Received Image of size 78740 bytes
16,946,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,022,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,091,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,285,680 >>> mbox cmd response: success
17,286,183 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,290,258 UART: [afmc] ++
17,290,901 UART: [afmc] CDI.KEYID = 6
17,291,806 UART: [afmc] SUBJECT.KEYID = 7
17,293,069 UART: [afmc] AUTHORITY.KEYID = 5
20,605,723 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,899,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,902,007 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,916,424 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,931,257 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,945,696 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,967,697 UART: [afmc] --
22,970,921 UART: [cold-reset] --
22,974,671 UART: [state] Locking Datavault
22,979,645 UART: [state] Locking PCR0, PCR1 and PCR31
22,981,413 UART: [state] Locking ICCM
22,984,100 UART: [exit] Launching FMC @ 0x40000130
22,992,493 UART:
22,992,732 UART: Running Caliptra FMC ...
22,993,832 UART:
22,993,984 UART: [state] CFI Enabled
23,002,028 UART: [fht] FMC Alias Private Key: 7
25,332,573 UART: [art] Extend RT PCRs Done
25,333,796 UART: [art] Lock RT PCRs Done
25,335,091 UART: [art] Populate DV Done
25,340,671 UART: [fht] FMC Alias Private Key: 7
25,342,202 UART: [art] Derive CDI
25,342,932 UART: [art] Store in in slot 0x4
25,385,040 UART: [art] Derive Key Pair
25,386,084 UART: [art] Store priv key in slot 0x5
28,628,328 UART: [art] Derive Key Pair - Done
28,641,526 UART: [art] Signing Cert with AUTHO
28,642,841 UART: RITY.KEYID = 7
30,922,447 UART: [art] Erasing AUTHORITY.KEYID = 7
30,923,953 UART: [art] PUB.X = 08DFC378E16BFA103DF5DFC83FF8A3CB2943AEE133242E3B3DF99F89B0F5BAA0F0DD2D1E2368A6EDEA179D1504CAA6C5
30,931,246 UART: [art] PUB.Y = 1C0691574537535106AA8D063B7907C02A5B7F974FA82175FD0B2682C6D93DA3176F7402CEF862869374B00EA82E9446
30,938,478 UART: [art] SIG.R = 2ABFC4F7F3756B39A9204562C4F4B545F95FD42FE7E3CA57B0276F79C1A29FE59606BB6A5076C1DB294BF46E25D1C6D8
30,945,855 UART: [art] SIG.S = 4F136CD3D725AE69AFE0E5F9131D62579DCDCADF79BBCD6FBC6EBB8C5DEA21697FDC521BE34049E8B865691F0FD38EA7
32,250,295 UART: mbox::rt_entry...
32,251,260 UART: ____ _ _ _ ____ _____
32,253,185 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,255,185 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,257,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,259,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,260,959 UART: |_|
32,261,761 UART:
32,375,630 UART: [rt] Runtime listening for mailbox commands...
32,377,802 >>> mbox cmd response data (48 bytes)
32,378,403 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,380,743 >>> mbox cmd response data (48 bytes)
32,381,591 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,394,155 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
4,127,440 ready_for_fw is high
4,127,819 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,346,604 >>> mbox cmd response: success
17,347,228 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,985,991 UART:
22,986,382 UART: Running Caliptra FMC ...
22,987,511 UART:
22,987,663 UART: [state] CFI Enabled
22,995,547 UART: [fht] FMC Alias Private Key: 7
25,326,434 UART: [art] Extend RT PCRs Done
25,327,661 UART: [art] Lock RT PCRs Done
25,329,526 UART: [art] Populate DV Done
25,334,680 UART: [fht] FMC Alias Private Key: 7
25,336,331 UART: [art] Derive CDI
25,337,140 UART: [art] Store in in slot 0x4
25,379,415 UART: [art] Derive Key Pair
25,380,469 UART: [art] Store priv key in slot 0x5
28,622,727 UART: [art] Derive Key Pair - Done
28,635,460 UART: [art] Signing Cert with AUTHO
28,636,800 UART: RITY.KEYID = 7
30,916,293 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,800 UART: [art] PUB.X = AC67176BDED77B0E43A9B2E83EB11546C696F504BD5916DFF680DC1822CB19AC176059164977A98985DE1DE68A775151
30,925,054 UART: [art] PUB.Y = 5E6BD30BAC0A9A05CDD78B9300781B733B846520395E4A01CCF22A401805D60A1B8A332D8A4D36C7DA5A18D03AF2F28D
30,932,294 UART: [art] SIG.R = 744FA34048B0897242BCFAD329A7C75315ED486077BA0F36085D124A48A54B0216DD83BBD3A32A8EAB3E491A67E37F22
30,939,681 UART: [art] SIG.S = D6D101E7EF70BEBC34CEE8030760E53C0BB20297EA53E27EE61D938E74D796FCDE011464F28874A4C0A2707F2A513462
32,244,311 UART: mbox::rt_entry...
32,245,279 UART: ____ _ _ _ ____ _____
32,247,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,202 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,049 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,007 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,254,890 UART: |_|
32,255,794 UART:
32,368,927 UART: [rt] Runtime listening for mailbox commands...
32,371,088 >>> mbox cmd response data (48 bytes)
32,371,692 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,374,016 >>> mbox cmd response data (48 bytes)
32,374,868 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,387,411 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,181 UART:
192,543 UART: Running Caliptra ROM ...
193,640 UART:
193,781 UART: [state] CFI Enabled
265,212 UART: [state] LifecycleState = Unprovisioned
267,057 UART: [state] DebugLocked = No
269,437 UART: [state] WD Timer not started. Device not locked for debugging
273,960 UART: [kat] SHA2-256
453,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,638 UART: [kat] ++
465,090 UART: [kat] sha1
476,676 UART: [kat] SHA2-256
479,717 UART: [kat] SHA2-384
485,940 UART: [kat] SHA2-512-ACC
488,883 UART: [kat] ECC-384
2,947,482 UART: [kat] HMAC-384Kdf
2,972,364 UART: [kat] LMS
3,501,812 UART: [kat] --
3,506,507 UART: [cold-reset] ++
3,507,657 UART: [fht] FHT @ 0x50003400
3,518,781 UART: [idev] ++
3,519,386 UART: [idev] CDI.KEYID = 6
3,520,301 UART: [idev] SUBJECT.KEYID = 7
3,521,475 UART: [idev] UDS.KEYID = 0
3,522,419 ready_for_fw is high
3,522,618 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,731 UART: [idev] Erasing UDS.KEYID = 0
6,029,239 UART: [idev] Sha1 KeyId Algorithm
6,052,031 UART: [idev] --
6,055,214 UART: [ldev] ++
6,055,782 UART: [ldev] CDI.KEYID = 6
6,056,672 UART: [ldev] SUBJECT.KEYID = 5
6,057,890 UART: [ldev] AUTHORITY.KEYID = 7
6,059,121 UART: [ldev] FE.KEYID = 1
6,100,955 UART: [ldev] Erasing FE.KEYID = 1
8,603,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,881 UART: [ldev] --
10,396,982 UART: [fwproc] Wait for Commands...
10,399,172 UART: [fwproc] Recv command 0x46574c44
10,401,276 UART: [fwproc] Recv'd Img size: 78704 bytes
13,364,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,438,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,507,003 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,699,804 >>> mbox cmd response: success
13,700,281 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,703,798 UART: [afmc] ++
13,704,403 UART: [afmc] CDI.KEYID = 6
13,705,313 UART: [afmc] SUBJECT.KEYID = 7
13,706,475 UART: [afmc] AUTHORITY.KEYID = 5
16,235,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,960,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,962,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,977,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,993,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,009,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,033,608 UART: [afmc] --
18,037,909 UART: [cold-reset] --
18,042,692 UART: [state] Locking Datavault
18,049,234 UART: [state] Locking PCR0, PCR1 and PCR31
18,050,881 UART: [state] Locking ICCM
18,053,412 UART: [exit] Launching FMC @ 0x40000130
18,061,808 UART:
18,062,053 UART: Running Caliptra FMC ...
18,063,159 UART:
18,063,321 UART: [state] CFI Enabled
18,119,797 UART: [fht] FMC Alias Private Key: 7
19,884,064 UART: [art] Extend RT PCRs Done
19,885,284 UART: [art] Lock RT PCRs Done
19,887,191 UART: [art] Populate DV Done
19,892,602 UART: [fht] FMC Alias Private Key: 7
19,894,292 UART: [art] Derive CDI
19,895,100 UART: [art] Store in in slot 0x4
19,953,077 UART: [art] Derive Key Pair
19,954,126 UART: [art] Store priv key in slot 0x5
22,416,602 UART: [art] Derive Key Pair - Done
22,429,645 UART: [art] Signing Cert with AUTHO
22,430,943 UART: RITY.KEYID = 7
24,142,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,144,219 UART: [art] PUB.X = 15E300E7201D35C8788B96F62F4697C6C17407863FFB278E30A86A35027170A786B72BA0F5A5812A113526598C70A01E
24,151,457 UART: [art] PUB.Y = EA3F9CF7E095EB05BD86665579D2C47E20559B2E7EB4CB207968B49A86B835258EDD2549C4B80D78E9949CE909105920
24,158,718 UART: [art] SIG.R = DCA9AB8D31452CE3CAF2A7B50EB5D82DD6BEBDABB04E45CF62EBA90C00AF1DC201C3B9B1FB446302E08972BDF329EF20
24,166,124 UART: [art] SIG.S = 70577A20C48ED0F30CE47E28B9552FDA2A842E763B091B60A0989A737D2098150FEB7ACDE827C739D128E99C87C69C37
25,144,278 UART: mbox::rt_entry...
25,145,239 UART: ____ _ _ _ ____ _____
25,147,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,149,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,151,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,153,099 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,155,027 UART: |_|
25,155,837 UART:
25,269,020 UART: [rt] Runtime listening for mailbox commands...
25,271,176 >>> mbox cmd response data (48 bytes)
25,271,816 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,274,199 >>> mbox cmd response data (48 bytes)
25,275,045 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,287,606 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,360,980 ready_for_fw is high
3,361,528 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,501,714 >>> mbox cmd response: success
13,502,308 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,787,921 UART:
17,788,312 UART: Running Caliptra FMC ...
17,789,416 UART:
17,789,568 UART: [state] CFI Enabled
17,855,313 UART: [fht] FMC Alias Private Key: 7
19,618,633 UART: [art] Extend RT PCRs Done
19,619,851 UART: [art] Lock RT PCRs Done
19,621,401 UART: [art] Populate DV Done
19,626,814 UART: [fht] FMC Alias Private Key: 7
19,628,304 UART: [art] Derive CDI
19,629,041 UART: [art] Store in in slot 0x4
19,687,739 UART: [art] Derive Key Pair
19,688,774 UART: [art] Store priv key in slot 0x5
22,151,618 UART: [art] Derive Key Pair - Done
22,164,842 UART: [art] Signing Cert with AUTHO
22,166,149 UART: RITY.KEYID = 7
23,877,420 UART: [art] Erasing AUTHORITY.KEYID = 7
23,878,920 UART: [art] PUB.X = 74207C67CAFB121591BEBDBD85AD735B763977E604B2E0127D50B5642492F251538BF3FED695416E6532092DD297546F
23,886,172 UART: [art] PUB.Y = 23F4A2BA34603575D7E87940E765CC3B4B3C61F39311AE75D5F085B53A094E271E5CCAD917D7504CA27590C563399C61
23,893,456 UART: [art] SIG.R = BE2CA8CC279519405613C2E9A885D939B4679CF30908F4D86A89C4827B313C663F1B71DF0265AD2B78DBFA444FC3B6A4
23,900,804 UART: [art] SIG.S = 422A03D285707C97E0BD259022DFAB5842378C3AE4E14075391F53757D462BE42EBF438AE52D3ECB16C52B813A6668DA
24,879,473 UART: mbox::rt_entry...
24,880,424 UART: ____ _ _ _ ____ _____
24,882,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,884,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,886,337 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,888,294 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,890,225 UART: |_|
24,891,068 UART:
25,003,921 UART: [rt] Runtime listening for mailbox commands...
25,006,123 >>> mbox cmd response data (48 bytes)
25,006,738 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,009,265 >>> mbox cmd response data (48 bytes)
25,010,126 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,022,719 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,381 UART:
192,763 UART: Running Caliptra ROM ...
193,865 UART:
603,515 UART: [state] CFI Enabled
614,121 UART: [state] LifecycleState = Unprovisioned
615,993 UART: [state] DebugLocked = No
618,782 UART: [state] WD Timer not started. Device not locked for debugging
622,732 UART: [kat] SHA2-256
801,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,505 UART: [kat] ++
814,034 UART: [kat] sha1
825,758 UART: [kat] SHA2-256
828,759 UART: [kat] SHA2-384
834,524 UART: [kat] SHA2-512-ACC
837,449 UART: [kat] ECC-384
3,279,625 UART: [kat] HMAC-384Kdf
3,291,895 UART: [kat] LMS
3,821,350 UART: [kat] --
3,826,794 UART: [cold-reset] ++
3,828,543 UART: [fht] FHT @ 0x50003400
3,839,811 UART: [idev] ++
3,840,435 UART: [idev] CDI.KEYID = 6
3,841,322 UART: [idev] SUBJECT.KEYID = 7
3,842,436 UART: [idev] UDS.KEYID = 0
3,843,413 ready_for_fw is high
3,843,610 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,942,518 UART: [idev] Erasing UDS.KEYID = 0
6,312,649 UART: [idev] Sha1 KeyId Algorithm
6,335,230 UART: [idev] --
6,338,146 UART: [ldev] ++
6,338,708 UART: [ldev] CDI.KEYID = 6
6,339,719 UART: [ldev] SUBJECT.KEYID = 5
6,340,818 UART: [ldev] AUTHORITY.KEYID = 7
6,342,098 UART: [ldev] FE.KEYID = 1
6,354,798 UART: [ldev] Erasing FE.KEYID = 1
8,825,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,494 UART: [ldev] --
10,616,566 UART: [fwproc] Wait for Commands...
10,618,062 UART: [fwproc] Recv command 0x46574c44
10,620,149 UART: [fwproc] Recv'd Img size: 78704 bytes
13,594,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,661,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,729,998 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,923,079 >>> mbox cmd response: success
13,923,627 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,926,626 UART: [afmc] ++
13,927,206 UART: [afmc] CDI.KEYID = 6
13,928,107 UART: [afmc] SUBJECT.KEYID = 7
13,929,318 UART: [afmc] AUTHORITY.KEYID = 5
16,430,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,150,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,152,516 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,168,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,184,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,200,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,221,246 UART: [afmc] --
18,225,108 UART: [cold-reset] --
18,229,111 UART: [state] Locking Datavault
18,234,089 UART: [state] Locking PCR0, PCR1 and PCR31
18,235,729 UART: [state] Locking ICCM
18,237,980 UART: [exit] Launching FMC @ 0x40000130
18,246,422 UART:
18,246,654 UART: Running Caliptra FMC ...
18,247,751 UART:
18,247,904 UART: [state] CFI Enabled
18,255,885 UART: [fht] FMC Alias Private Key: 7
20,013,011 UART: [art] Extend RT PCRs Done
20,014,221 UART: [art] Lock RT PCRs Done
20,015,749 UART: [art] Populate DV Done
20,020,889 UART: [fht] FMC Alias Private Key: 7
20,022,527 UART: [art] Derive CDI
20,023,336 UART: [art] Store in in slot 0x4
20,065,793 UART: [art] Derive Key Pair
20,067,012 UART: [art] Store priv key in slot 0x5
22,493,602 UART: [art] Derive Key Pair - Done
22,506,333 UART: [art] Signing Cert with AUTHO
22,507,632 UART: RITY.KEYID = 7
24,213,069 UART: [art] Erasing AUTHORITY.KEYID = 7
24,214,551 UART: [art] PUB.X = 7DBD28DD361797ABA006EE66FFEAC3F7FC8F215F225889AC7DCCA8D054A8964C4AE1E3F2BC976EABC4EDEEC4AAA7927A
24,221,886 UART: [art] PUB.Y = FFBCDF24BA2A19D34ACADAEC765A99172EC6E35F02013E4B6524F3CA0C336F29F78FF20B6983EBF4C459D4EB72811BB8
24,229,185 UART: [art] SIG.R = 9026AB82056D81F66BD28027BC09B8BB88A1D19C7EF1FB14FD4742955FDEE48708324B356CEDF759039F57F59FA1C353
24,236,585 UART: [art] SIG.S = 19A08137DE0A027AC2854693416E06D8454B4EC21E110AFA31E6E38BF749BA1FC7D0EE5DB7CA71E41B6603AB820FC0BB
25,214,163 UART: mbox::rt_entry...
25,215,111 UART: ____ _ _ _ ____ _____
25,217,051 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,219,060 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,220,986 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,222,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,224,824 UART: |_|
25,225,800 UART:
25,337,949 UART: [rt] Runtime listening for mailbox commands...
25,340,105 >>> mbox cmd response data (48 bytes)
25,340,717 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,343,032 >>> mbox cmd response data (48 bytes)
25,343,879 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,356,828 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,694,622 ready_for_fw is high
3,695,155 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,706,585 >>> mbox cmd response: success
13,707,193 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,961,019 UART:
17,961,417 UART: Running Caliptra FMC ...
17,962,612 UART:
17,962,771 UART: [state] CFI Enabled
17,970,651 UART: [fht] FMC Alias Private Key: 7
19,727,715 UART: [art] Extend RT PCRs Done
19,728,926 UART: [art] Lock RT PCRs Done
19,730,523 UART: [art] Populate DV Done
19,735,987 UART: [fht] FMC Alias Private Key: 7
19,737,579 UART: [art] Derive CDI
19,738,391 UART: [art] Store in in slot 0x4
19,781,035 UART: [art] Derive Key Pair
19,782,077 UART: [art] Store priv key in slot 0x5
22,209,012 UART: [art] Derive Key Pair - Done
22,222,056 UART: [art] Signing Cert with AUTHO
22,223,358 UART: RITY.KEYID = 7
23,928,903 UART: [art] Erasing AUTHORITY.KEYID = 7
23,930,404 UART: [art] PUB.X = EE6504C7604460C42A4790739634F60EEFEECFB4797C1849A9A851EBFE6EF0873E27B6DC3662C452F13FD278B5AEFE6B
23,937,699 UART: [art] PUB.Y = 1285CE36133669EEE0F96A94949B8B10F7B3963BDD2A4CFBD951E484569F6AC34234FECB7489728010AEF51F90737BD9
23,944,986 UART: [art] SIG.R = 614D8C8DA6A4920411B8E3BA8D665BBE2E2B5004DB70DB4413A4CB4DF5F9E3C7D5018DFADC77ABBB800CD7F1B5EE59C1
23,952,367 UART: [art] SIG.S = EFCCD5E94FEA895C49E9756EC09CE0F8F3B7D0247A4B2BF45E2ACAE065D309A5C776CCF353F3574ECCFA849B820CE2B8
24,931,187 UART: mbox::rt_entry...
24,932,125 UART: ____ _ _ _ ____ _____
24,934,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,936,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,938,028 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,939,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,941,831 UART: |_|
24,942,622 UART:
25,055,212 UART: [rt] Runtime listening for mailbox commands...
25,057,341 >>> mbox cmd response data (48 bytes)
25,057,933 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,060,300 >>> mbox cmd response data (48 bytes)
25,061,148 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,073,698 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,304 UART:
192,651 UART: Running Caliptra ROM ...
193,851 UART:
194,024 UART: [state] CFI Enabled
260,870 UART: [state] LifecycleState = Unprovisioned
263,223 UART: [state] DebugLocked = No
265,458 UART: [state] WD Timer not started. Device not locked for debugging
269,413 UART: [kat] SHA2-256
459,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,063 UART: [kat] ++
470,557 UART: [kat] sha1
482,851 UART: [kat] SHA2-256
485,932 UART: [kat] SHA2-384
492,700 UART: [kat] SHA2-512-ACC
495,346 UART: [kat] ECC-384
2,947,340 UART: [kat] HMAC-384Kdf
2,971,502 UART: [kat] LMS
3,503,269 UART: [kat] --
3,510,039 UART: [cold-reset] ++
3,511,735 UART: [fht] FHT @ 0x50003400
3,523,994 UART: [idev] ++
3,524,630 UART: [idev] CDI.KEYID = 6
3,525,660 UART: [idev] SUBJECT.KEYID = 7
3,526,833 UART: [idev] UDS.KEYID = 0
3,527,758 ready_for_fw is high
3,527,955 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,627,076 UART: [idev] Erasing UDS.KEYID = 0
6,029,353 UART: [idev] Sha1 KeyId Algorithm
6,051,241 UART: [idev] --
6,055,779 UART: [ldev] ++
6,056,462 UART: [ldev] CDI.KEYID = 6
6,057,433 UART: [ldev] SUBJECT.KEYID = 5
6,058,533 UART: [ldev] AUTHORITY.KEYID = 7
6,059,814 UART: [ldev] FE.KEYID = 1
6,099,733 UART: [ldev] Erasing FE.KEYID = 1
8,606,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,660 UART: [ldev] --
10,413,493 UART: [fwproc] Wait for Commands...
10,416,345 UART: [fwproc] Recv command 0x46574c44
10,418,596 UART: [fwproc] Recv'd Img size: 78704 bytes
13,431,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,507,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,624,080 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,952,952 >>> mbox cmd response: success
13,953,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,957,238 UART: [afmc] ++
13,957,970 UART: [afmc] CDI.KEYID = 6
13,959,102 UART: [afmc] SUBJECT.KEYID = 7
13,960,604 UART: [afmc] AUTHORITY.KEYID = 5
16,485,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,211,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,212,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,228,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,243,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,258,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,281,327 UART: [afmc] --
18,284,871 UART: [cold-reset] --
18,288,734 UART: [state] Locking Datavault
18,293,498 UART: [state] Locking PCR0, PCR1 and PCR31
18,295,631 UART: [state] Locking ICCM
18,297,239 UART: [exit] Launching FMC @ 0x40000130
18,305,923 UART:
18,306,214 UART: Running Caliptra FMC ...
18,307,347 UART:
18,307,507 UART: [state] CFI Enabled
18,368,885 UART: [fht] FMC Alias Private Key: 7
20,133,662 UART: [art] Extend RT PCRs Done
20,134,873 UART: [art] Lock RT PCRs Done
20,136,443 UART: [art] Populate DV Done
20,141,906 UART: [fht] FMC Alias Private Key: 7
20,143,442 UART: [art] Derive CDI
20,144,254 UART: [art] Store in in slot 0x4
20,201,581 UART: [art] Derive Key Pair
20,202,591 UART: [art] Store priv key in slot 0x5
22,665,987 UART: [art] Derive Key Pair - Done
22,678,771 UART: [art] Signing Cert with AUTHO
22,680,071 UART: RITY.KEYID = 7
24,391,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,972 UART: [art] PUB.X = 9AECEDB8E55F2460C970B543E02CE5949CEA9F21D991A5E0694A5DA54AE43E2D9B7F83004436D212A5C7860C37C1A885
24,400,281 UART: [art] PUB.Y = EE14E0B8D20857D2501BE0D072674A57EEFDF466815FF698C3E15D05BF670D9B049AEF97E9740F25A950C47DE2FB7B27
24,407,565 UART: [art] SIG.R = 24A825C992889F313B2E46790BA94B3A3140A78C3AB2C9232C60A4CFBFBAD6D5E6C641B4766FBC08F74DDF25B84770E2
24,414,954 UART: [art] SIG.S = 2509C5E0EBAF834859124181223BCA3FD4839DED7BE0F7151614B1743015AED9A06F81D7C47EED0FB98C9D6D9330106A
25,393,536 UART: mbox::rt_entry...
25,394,505 UART: ____ _ _ _ ____ _____
25,396,492 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,398,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,400,498 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,402,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,404,333 UART: |_|
25,405,143 UART:
25,517,979 UART: [rt] Runtime listening for mailbox commands...
25,520,097 >>> mbox cmd response data (48 bytes)
25,520,696 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,523,016 >>> mbox cmd response data (48 bytes)
25,523,875 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,536,440 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,440,558 ready_for_fw is high
3,440,993 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,975,913 >>> mbox cmd response: success
13,976,461 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,257,475 UART:
18,257,876 UART: Running Caliptra FMC ...
18,259,011 UART:
18,259,177 UART: [state] CFI Enabled
18,325,895 UART: [fht] FMC Alias Private Key: 7
20,090,138 UART: [art] Extend RT PCRs Done
20,091,358 UART: [art] Lock RT PCRs Done
20,092,986 UART: [art] Populate DV Done
20,098,623 UART: [fht] FMC Alias Private Key: 7
20,100,176 UART: [art] Derive CDI
20,100,993 UART: [art] Store in in slot 0x4
20,158,507 UART: [art] Derive Key Pair
20,159,539 UART: [art] Store priv key in slot 0x5
22,622,823 UART: [art] Derive Key Pair - Done
22,635,813 UART: [art] Signing Cert with AUTHO
22,637,149 UART: RITY.KEYID = 7
24,348,273 UART: [art] Erasing AUTHORITY.KEYID = 7
24,349,771 UART: [art] PUB.X = CFA03DB9ABBF0A795B8925B5BFDF2652614393B3E6FEC5435436B06EF8FBE1F2731EDABF312D2339662E219DA7EE879E
24,357,021 UART: [art] PUB.Y = FE4105651BCFCB0220C415477C7CCF831CBA4152782B4A1C5FB7A8A60B315506D57011D5AF7A5C8F514EE09DC47CAEAF
24,364,309 UART: [art] SIG.R = 7C0A4D22D0AE119E3358077BA53D6C0B9FF0467A8B45767E6BBDD8DA07D69467A61CBC3FD76FA60F77E80A77E7267FA0
24,371,698 UART: [art] SIG.S = FDEC39D31EFE2E9587CA2CCFC077256532E11E060B376A542DA8375977A6A1E8F7332D633D16B52128130E19E0CA89E7
25,349,772 UART: mbox::rt_entry...
25,350,724 UART: ____ _ _ _ ____ _____
25,352,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,354,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,356,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,358,609 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,360,542 UART: |_|
25,361,380 UART:
25,474,241 UART: [rt] Runtime listening for mailbox commands...
25,476,351 >>> mbox cmd response data (48 bytes)
25,476,981 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,479,321 >>> mbox cmd response data (48 bytes)
25,480,183 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,492,726 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,402 UART:
192,761 UART: Running Caliptra ROM ...
193,878 UART:
603,706 UART: [state] CFI Enabled
618,430 UART: [state] LifecycleState = Unprovisioned
620,799 UART: [state] DebugLocked = No
622,170 UART: [state] WD Timer not started. Device not locked for debugging
627,412 UART: [kat] SHA2-256
817,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,035 UART: [kat] ++
828,552 UART: [kat] sha1
840,437 UART: [kat] SHA2-256
843,341 UART: [kat] SHA2-384
848,406 UART: [kat] SHA2-512-ACC
850,980 UART: [kat] ECC-384
3,295,887 UART: [kat] HMAC-384Kdf
3,308,272 UART: [kat] LMS
3,840,120 UART: [kat] --
3,842,654 UART: [cold-reset] ++
3,844,517 UART: [fht] FHT @ 0x50003400
3,855,843 UART: [idev] ++
3,856,541 UART: [idev] CDI.KEYID = 6
3,857,512 UART: [idev] SUBJECT.KEYID = 7
3,858,693 UART: [idev] UDS.KEYID = 0
3,859,613 ready_for_fw is high
3,859,804 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,958,723 UART: [idev] Erasing UDS.KEYID = 0
6,333,835 UART: [idev] Sha1 KeyId Algorithm
6,356,464 UART: [idev] --
6,362,178 UART: [ldev] ++
6,362,888 UART: [ldev] CDI.KEYID = 6
6,363,767 UART: [ldev] SUBJECT.KEYID = 5
6,364,911 UART: [ldev] AUTHORITY.KEYID = 7
6,366,186 UART: [ldev] FE.KEYID = 1
6,378,954 UART: [ldev] Erasing FE.KEYID = 1
8,854,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,184 UART: [ldev] --
10,645,549 UART: [fwproc] Wait for Commands...
10,647,474 UART: [fwproc] Recv command 0x46574c44
10,649,773 UART: [fwproc] Recv'd Img size: 78704 bytes
13,655,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,729,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,845,954 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,175,164 >>> mbox cmd response: success
14,175,639 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,178,673 UART: [afmc] ++
14,179,365 UART: [afmc] CDI.KEYID = 6
14,180,468 UART: [afmc] SUBJECT.KEYID = 7
14,182,002 UART: [afmc] AUTHORITY.KEYID = 5
16,688,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,409,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,410,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,426,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,441,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,456,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,479,972 UART: [afmc] --
18,483,075 UART: [cold-reset] --
18,486,624 UART: [state] Locking Datavault
18,493,004 UART: [state] Locking PCR0, PCR1 and PCR31
18,495,141 UART: [state] Locking ICCM
18,496,483 UART: [exit] Launching FMC @ 0x40000130
18,505,153 UART:
18,505,381 UART: Running Caliptra FMC ...
18,506,469 UART:
18,506,617 UART: [state] CFI Enabled
18,514,544 UART: [fht] FMC Alias Private Key: 7
20,271,477 UART: [art] Extend RT PCRs Done
20,272,708 UART: [art] Lock RT PCRs Done
20,274,546 UART: [art] Populate DV Done
20,280,172 UART: [fht] FMC Alias Private Key: 7
20,281,585 UART: [art] Derive CDI
20,282,321 UART: [art] Store in in slot 0x4
20,324,745 UART: [art] Derive Key Pair
20,325,746 UART: [art] Store priv key in slot 0x5
22,752,525 UART: [art] Derive Key Pair - Done
22,765,461 UART: [art] Signing Cert with AUTHO
22,766,791 UART: RITY.KEYID = 7
24,472,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,098 UART: [art] PUB.X = 7604481483C869168950CB4E284560DBEFEE83A9247D36C689275C69EE27ED63C43454D012686B4E2361307E3C984B9A
24,481,336 UART: [art] PUB.Y = 7E0E2BA9CF009A24400C5E0D030768A6E134470A35B9DA418EE3FE1706A685B0B97265EE72A9D889DE9025E02B89638F
24,488,557 UART: [art] SIG.R = 75610F55E478A2C8238DDD2E4DF65A3DA18100C141B7D4C6243448732551EF0B68C7235F22BCD4FB1CC86B6A88E39498
24,495,947 UART: [art] SIG.S = 26FC8AB6F2805DFB3FD28FAF13C37C0F6F81E2D2AF6F4C8C23E6C681F3A143836090897CA8A706942C8675D9D3258F0C
25,474,362 UART: mbox::rt_entry...
25,475,330 UART: ____ _ _ _ ____ _____
25,477,307 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,479,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,481,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,483,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,485,291 UART: |_|
25,486,090 UART:
25,599,258 UART: [rt] Runtime listening for mailbox commands...
25,601,360 >>> mbox cmd response data (48 bytes)
25,601,961 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,604,317 >>> mbox cmd response data (48 bytes)
25,605,133 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,617,677 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,755,445 ready_for_fw is high
3,755,978 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,191,987 >>> mbox cmd response: success
14,192,583 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,442,089 UART:
18,442,482 UART: Running Caliptra FMC ...
18,443,673 UART:
18,443,847 UART: [state] CFI Enabled
18,451,630 UART: [fht] FMC Alias Private Key: 7
20,208,183 UART: [art] Extend RT PCRs Done
20,209,737 UART: [art] Lock RT PCRs Done
20,211,256 UART: [art] Populate DV Done
20,216,555 UART: [fht] FMC Alias Private Key: 7
20,218,098 UART: [art] Derive CDI
20,219,125 UART: [art] Store in in slot 0x4
20,261,448 UART: [art] Derive Key Pair
20,262,449 UART: [art] Store priv key in slot 0x5
22,688,910 UART: [art] Derive Key Pair - Done
22,701,728 UART: [art] Signing Cert with AUTHO
22,703,068 UART: RITY.KEYID = 7
24,408,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,409,984 UART: [art] PUB.X = E66025A5DDC7D2A9D75D1C522D049885CF798E32A9D8932A25BC3F2FF7C56680B48B4F45F1BB879C25ED908D3D15AEBE
24,416,904 UART: [art] PUB.Y = C05B8C515A0555081B9A40A4D5445C8E52E18ED2BCCB10674E4B626CC3EAA7AC0B82D65F9603F8D2A706952541AD78C7
24,424,197 UART: [art] SIG.R = 6CE7C80386BC92AF81C9AFA2BF58A60E47940B698F10541B198E8CD6EBE51ABD0EEC94BE6B10D51824F682AD9DC6CFD5
24,431,584 UART: [art] SIG.S = 7BDE0E7C3E563DE6EA536CBBA048DAE019A219CE37F90BD8D88478C782BA3B1204E0E229ECAEFDD0525919998AB6A825
25,409,810 UART: mbox::rt_entry...
25,410,795 UART: ____ _ _ _ ____ _____
25,412,770 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,414,773 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,416,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,418,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,420,847 UART: |_|
25,421,678 UART:
25,533,669 UART: [rt] Runtime listening for mailbox commands...
25,535,830 >>> mbox cmd response data (48 bytes)
25,536,475 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,538,811 >>> mbox cmd response data (48 bytes)
25,539,656 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,552,201 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,489 UART: [kat] SHA2-256
882,420 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,535 UART: [kat] ++
886,687 UART: [kat] sha1
891,001 UART: [kat] SHA2-256
892,939 UART: [kat] SHA2-384
895,512 UART: [kat] SHA2-512-ACC
897,413 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,438 UART: [kat] LMS
1,475,634 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 ready_for_fw is high
1,480,755 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,504,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,178 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,921 UART: [ldev] Erasing FE.KEYID = 1
1,546,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,417 UART: [fwproc] Waiting for Commands...
1,586,262 UART: [fwproc] Received command 0x46574c44
1,587,053 UART: [fwproc] Received Image of size 78704 bytes
2,476,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,047 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,912 >>> mbox cmd response: success
2,615,912 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,617,130 UART: [afmc] ++
2,617,298 UART: [afmc] CDI.KEYID = 6
2,617,660 UART: [afmc] SUBJECT.KEYID = 7
2,618,085 UART: [afmc] AUTHORITY.KEYID = 5
2,652,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,127 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,817 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,804 UART: [afmc] --
2,695,740 UART: [cold-reset] --
2,696,628 UART: [state] Locking Datavault
2,697,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,325 UART: [state] Locking ICCM
2,698,955 UART: [exit] Launching FMC @ 0x40000130
2,704,284 UART:
2,704,300 UART: Running Caliptra FMC ...
2,704,708 UART:
2,704,762 UART: [state] CFI Enabled
2,715,317 UART: [fht] FMC Alias Private Key: 7
2,823,282 UART: [art] Extend RT PCRs Done
2,823,710 UART: [art] Lock RT PCRs Done
2,825,168 UART: [art] Populate DV Done
2,833,335 UART: [fht] FMC Alias Private Key: 7
2,834,271 UART: [art] Derive CDI
2,834,551 UART: [art] Store in in slot 0x4
2,920,240 UART: [art] Derive Key Pair
2,920,600 UART: [art] Store priv key in slot 0x5
2,933,246 UART: [art] Derive Key Pair - Done
2,947,836 UART: [art] Signing Cert with AUTHO
2,948,316 UART: RITY.KEYID = 7
2,963,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,985 UART: [art] PUB.X = 3DB0639F402D81B586031F9DFE13CA7A2CB88599E419681F8FE2BF797873628EFA0434BC2DBB0E77E342A33E95C58E6F
2,970,754 UART: [art] PUB.Y = 6FD3FACB8E02ABAEEE1F5CB0758EC70CAC2AFDA24632BCEF4C921F63882F0144367D9E67D2CE077DAC6CB63E39AB75FF
2,977,724 UART: [art] SIG.R = 004691340440A01B68E45311B10C9491546362F9B6F1D8E43995BAC26B87377A7CC4501A2B0E1529C8A7D2538A07BB98
2,984,450 UART: [art] SIG.S = CD5F696BE9F2BCC3D2EBA8AFD13FA652AF761A9A79A6F93187004955F9BAABF543EC22E8972D6DDB046990CECABC4B9B
3,008,502 UART: mbox::rt_entry...
3,008,874 UART: ____ _ _ _ ____ _____
3,009,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,458 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,226 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,762 UART: |_|
3,013,074 UART:
3,120,380 UART: [rt] Runtime listening for mailbox commands...
3,121,561 >>> mbox cmd response data (48 bytes)
3,121,562 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,124,345 >>> mbox cmd response data (48 bytes)
3,124,346 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,137,284 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 ready_for_fw is high
1,362,319 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,302 >>> mbox cmd response: success
2,466,302 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,528,296 UART:
2,528,312 UART: Running Caliptra FMC ...
2,528,720 UART:
2,528,774 UART: [state] CFI Enabled
2,539,149 UART: [fht] FMC Alias Private Key: 7
2,646,262 UART: [art] Extend RT PCRs Done
2,646,690 UART: [art] Lock RT PCRs Done
2,648,060 UART: [art] Populate DV Done
2,656,327 UART: [fht] FMC Alias Private Key: 7
2,657,301 UART: [art] Derive CDI
2,657,581 UART: [art] Store in in slot 0x4
2,743,302 UART: [art] Derive Key Pair
2,743,662 UART: [art] Store priv key in slot 0x5
2,757,000 UART: [art] Derive Key Pair - Done
2,771,556 UART: [art] Signing Cert with AUTHO
2,772,036 UART: RITY.KEYID = 7
2,787,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,047 UART: [art] PUB.X = 263ADCC55AE65926DDB97A213528959252E2C04AB85C0F03F59047E3C44F671B5147BAB5BB1BB1BF25116A99FA62F10F
2,794,816 UART: [art] PUB.Y = 65FC33E34F116118549B762DD13AD05F873153ED6247F8983CDA00CDDAE4C7EB5872270EFDE75DBBEF31D35C927999F7
2,801,751 UART: [art] SIG.R = AAEC6254EE27CD9A3C8C1DDECF1426CA09110B17D18D259DC077D34EE1834F5027BD014E2E4E42635EB40D6FD66DA61D
2,808,527 UART: [art] SIG.S = 27BB508D3B7045EEC5D54C25EEA3F258F4A8A125A076745ABA5CB8679B35E205CC0A5AE1FD6EBD3AD287CCF491A734A7
2,832,060 UART: mbox::rt_entry...
2,832,432 UART: ____ _ _ _ ____ _____
2,833,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,784 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,552 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,320 UART: |_|
2,836,632 UART:
2,943,800 UART: [rt] Runtime listening for mailbox commands...
2,944,981 >>> mbox cmd response data (48 bytes)
2,944,982 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,947,765 >>> mbox cmd response data (48 bytes)
2,947,766 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,960,704 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,771 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,126 UART: [fht] Storing FHT @ 0x50003400
1,479,911 UART: [idev] ++
1,480,079 UART: [idev] CDI.KEYID = 6
1,480,439 UART: [idev] SUBJECT.KEYID = 7
1,480,863 UART: [idev] UDS.KEYID = 0
1,481,208 ready_for_fw is high
1,481,208 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,001 UART: [idev] --
1,515,030 UART: [ldev] ++
1,515,198 UART: [ldev] CDI.KEYID = 6
1,515,561 UART: [ldev] SUBJECT.KEYID = 5
1,515,987 UART: [ldev] AUTHORITY.KEYID = 7
1,516,450 UART: [ldev] FE.KEYID = 1
1,521,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,053 UART: [ldev] --
1,586,362 UART: [fwproc] Waiting for Commands...
1,587,217 UART: [fwproc] Received command 0x46574c44
1,588,008 UART: [fwproc] Received Image of size 78704 bytes
2,478,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,411 >>> mbox cmd response: success
2,617,411 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,618,569 UART: [afmc] ++
2,618,737 UART: [afmc] CDI.KEYID = 6
2,619,099 UART: [afmc] SUBJECT.KEYID = 7
2,619,524 UART: [afmc] AUTHORITY.KEYID = 5
2,654,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,228 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,918 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,895 UART: [afmc] --
2,697,949 UART: [cold-reset] --
2,698,969 UART: [state] Locking Datavault
2,700,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,716 UART: [state] Locking ICCM
2,701,380 UART: [exit] Launching FMC @ 0x40000130
2,706,709 UART:
2,706,725 UART: Running Caliptra FMC ...
2,707,133 UART:
2,707,276 UART: [state] CFI Enabled
2,717,675 UART: [fht] FMC Alias Private Key: 7
2,825,782 UART: [art] Extend RT PCRs Done
2,826,210 UART: [art] Lock RT PCRs Done
2,828,126 UART: [art] Populate DV Done
2,836,363 UART: [fht] FMC Alias Private Key: 7
2,837,443 UART: [art] Derive CDI
2,837,723 UART: [art] Store in in slot 0x4
2,923,402 UART: [art] Derive Key Pair
2,923,762 UART: [art] Store priv key in slot 0x5
2,937,018 UART: [art] Derive Key Pair - Done
2,951,698 UART: [art] Signing Cert with AUTHO
2,952,178 UART: RITY.KEYID = 7
2,967,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,065 UART: [art] PUB.X = C37B984519FE60FA7E2EA2DD49EB3467402D6152B9EE2E97D144FC95B3A22576545F798CFB891F0266EA849C761ABBED
2,974,842 UART: [art] PUB.Y = C75CCAAA009B8DAEC3E8E7A8BB327C920273AFD804422B1B1C33B7B9DC09BA6308E8F7682A1325BE75B3F5F52048098C
2,981,769 UART: [art] SIG.R = 04401E598A5149D6128D090C4F92EFB83C4F9580DE49F0BA27782D9EACF8D301BAF9999043064F2C3FF0960FE1A88E95
2,988,525 UART: [art] SIG.S = 824A891FA8E08C5552DC6F9FE64B1654320ABEC969A15AE0CDEA6F485980B185B0A1FD0A1B419920F17162394E253595
3,012,390 UART: mbox::rt_entry...
3,012,762 UART: ____ _ _ _ ____ _____
3,013,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,650 UART: |_|
3,016,962 UART:
3,123,996 UART: [rt] Runtime listening for mailbox commands...
3,125,177 >>> mbox cmd response data (48 bytes)
3,125,178 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,127,961 >>> mbox cmd response data (48 bytes)
3,127,962 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,140,900 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 ready_for_fw is high
1,363,204 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,469,341 >>> mbox cmd response: success
2,469,341 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,531,591 UART:
2,531,607 UART: Running Caliptra FMC ...
2,532,015 UART:
2,532,158 UART: [state] CFI Enabled
2,542,847 UART: [fht] FMC Alias Private Key: 7
2,650,542 UART: [art] Extend RT PCRs Done
2,650,970 UART: [art] Lock RT PCRs Done
2,652,432 UART: [art] Populate DV Done
2,660,825 UART: [fht] FMC Alias Private Key: 7
2,661,791 UART: [art] Derive CDI
2,662,071 UART: [art] Store in in slot 0x4
2,747,822 UART: [art] Derive Key Pair
2,748,182 UART: [art] Store priv key in slot 0x5
2,761,936 UART: [art] Derive Key Pair - Done
2,777,101 UART: [art] Signing Cert with AUTHO
2,777,581 UART: RITY.KEYID = 7
2,792,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,793,242 UART: [art] PUB.X = B190A4C6DECE754B00B5405351D792F75E1B426F5EBF7E496540CD8B1D589B37E264277C60A7ACBC2A7CEEBDCA62199B
2,800,006 UART: [art] PUB.Y = B1BFBF7EA27DEF90D7424744F2FB5DDF4202196DC630E192A754C1B3EF8673AFCDBD0173110322F7E384DEB0A95A411E
2,806,963 UART: [art] SIG.R = 0C009A743E1F2282C8D14BAD90CDB83BB84F12D127D08C37B3BA8DFE358610F31B15043D89076BCD73ECD54DC2342DEB
2,813,716 UART: [art] SIG.S = D1D067A13EF6352903C2A58D4C288B60CBE13329BD24C9EEED4DB9EF9650AC4D062A34A6041E39BF1170DA84CA51BC57
2,837,086 UART: mbox::rt_entry...
2,837,458 UART: ____ _ _ _ ____ _____
2,838,242 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,839,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,578 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,346 UART: |_|
2,841,658 UART:
2,948,998 UART: [rt] Runtime listening for mailbox commands...
2,950,179 >>> mbox cmd response data (48 bytes)
2,950,180 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,952,963 >>> mbox cmd response data (48 bytes)
2,952,964 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,965,902 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
892,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,053 UART: [kat] ++
897,205 UART: [kat] sha1
901,335 UART: [kat] SHA2-256
903,275 UART: [kat] SHA2-384
906,026 UART: [kat] SHA2-512-ACC
907,927 UART: [kat] ECC-384
917,302 UART: [kat] HMAC-384Kdf
921,908 UART: [kat] LMS
1,170,236 UART: [kat] --
1,171,225 UART: [cold-reset] ++
1,171,745 UART: [fht] FHT @ 0x50003400
1,174,488 UART: [idev] ++
1,174,656 UART: [idev] CDI.KEYID = 6
1,175,016 UART: [idev] SUBJECT.KEYID = 7
1,175,440 UART: [idev] UDS.KEYID = 0
1,175,785 ready_for_fw is high
1,175,785 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,820 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,727 UART: [idev] --
1,210,851 UART: [ldev] ++
1,211,019 UART: [ldev] CDI.KEYID = 6
1,211,382 UART: [ldev] SUBJECT.KEYID = 5
1,211,808 UART: [ldev] AUTHORITY.KEYID = 7
1,212,271 UART: [ldev] FE.KEYID = 1
1,217,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,487 UART: [ldev] --
1,282,892 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,616 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,075 >>> mbox cmd response: success
2,313,075 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,175 UART: [afmc] ++
2,314,343 UART: [afmc] CDI.KEYID = 6
2,314,705 UART: [afmc] SUBJECT.KEYID = 7
2,315,130 UART: [afmc] AUTHORITY.KEYID = 5
2,351,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,444 UART: [afmc] --
2,394,490 UART: [cold-reset] --
2,395,198 UART: [state] Locking Datavault
2,396,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,915 UART: [state] Locking ICCM
2,397,467 UART: [exit] Launching FMC @ 0x40000130
2,402,796 UART:
2,402,812 UART: Running Caliptra FMC ...
2,403,220 UART:
2,403,274 UART: [state] CFI Enabled
2,413,435 UART: [fht] FMC Alias Private Key: 7
2,521,940 UART: [art] Extend RT PCRs Done
2,522,368 UART: [art] Lock RT PCRs Done
2,523,726 UART: [art] Populate DV Done
2,531,897 UART: [fht] FMC Alias Private Key: 7
2,532,849 UART: [art] Derive CDI
2,533,129 UART: [art] Store in in slot 0x4
2,618,086 UART: [art] Derive Key Pair
2,618,446 UART: [art] Store priv key in slot 0x5
2,631,312 UART: [art] Derive Key Pair - Done
2,645,941 UART: [art] Signing Cert with AUTHO
2,646,421 UART: RITY.KEYID = 7
2,661,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,214 UART: [art] PUB.X = 4ED96EB839FE7E3CCCEE99851BBF24B31170506BEE0D2D07BF791BA03AEE9AE0873850A56E79CE3E971367AA392940CF
2,668,994 UART: [art] PUB.Y = 912038BFC70210EB0F8F45F2168182E7199AA5488A313D1DAD54E1D5D2A5907D2B3DA26FEEEF5DDB1C34F365291094AC
2,675,948 UART: [art] SIG.R = D4892A23BB8C53D57D05DE3818F8830B25BD666B2FE117B3E51B131DE7489732FDDBE73B3004FBFD44BA1348D90F5EF7
2,682,718 UART: [art] SIG.S = A97CF17AC0DD19100636161CF4CE671758EBC623E17C5191BED0D2BE25BCCC37EF4324D454E6CD0A198E190E01616279
2,706,491 UART: mbox::rt_entry...
2,706,863 UART: ____ _ _ _ ____ _____
2,707,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,751 UART: |_|
2,711,063 UART:
2,816,856 UART: [rt] Runtime listening for mailbox commands...
2,818,037 >>> mbox cmd response data (48 bytes)
2,818,038 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,821 >>> mbox cmd response data (48 bytes)
2,820,822 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,760 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 ready_for_fw is high
1,059,979 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,440 >>> mbox cmd response: success
2,163,440 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,980 UART:
2,225,996 UART: Running Caliptra FMC ...
2,226,404 UART:
2,226,458 UART: [state] CFI Enabled
2,236,875 UART: [fht] FMC Alias Private Key: 7
2,344,582 UART: [art] Extend RT PCRs Done
2,345,010 UART: [art] Lock RT PCRs Done
2,346,140 UART: [art] Populate DV Done
2,354,525 UART: [fht] FMC Alias Private Key: 7
2,355,475 UART: [art] Derive CDI
2,355,755 UART: [art] Store in in slot 0x4
2,441,330 UART: [art] Derive Key Pair
2,441,690 UART: [art] Store priv key in slot 0x5
2,455,032 UART: [art] Derive Key Pair - Done
2,469,916 UART: [art] Signing Cert with AUTHO
2,470,396 UART: RITY.KEYID = 7
2,485,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,069 UART: [art] PUB.X = 6890DD71179B331BFEC0CBD3EF1AADBBEDC30E3EBCBBF65A7B7D50CABF4E318B24641F113C5EB8A8F118C529DB015B18
2,492,863 UART: [art] PUB.Y = 6462A04AF4778AB1A8FD2E5FE3E0484EE31BAB3863AEBB0C59B9F2C219D4C59F48CB0658D004FA94E647E15A54EB6B5B
2,499,822 UART: [art] SIG.R = 47142861E6B11EB88F5223DCEB28AC3F70DF6FE429DF2A087DC25C9CC0E6B4694388972C967E5FF4675840E88EC6AA87
2,506,597 UART: [art] SIG.S = C5562CCFDAFDA41BE44EB4945F42C336349918D556E5F94BA39D8D9307D019B82385208DCF219968F70D0434F73D7A17
2,530,747 UART: mbox::rt_entry...
2,531,119 UART: ____ _ _ _ ____ _____
2,531,903 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,239 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,007 UART: |_|
2,535,319 UART:
2,641,745 UART: [rt] Runtime listening for mailbox commands...
2,642,926 >>> mbox cmd response data (48 bytes)
2,642,927 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,710 >>> mbox cmd response data (48 bytes)
2,645,711 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,649 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
919,047 UART: [kat] HMAC-384Kdf
923,721 UART: [kat] LMS
1,172,049 UART: [kat] --
1,173,064 UART: [cold-reset] ++
1,173,516 UART: [fht] FHT @ 0x50003400
1,176,207 UART: [idev] ++
1,176,375 UART: [idev] CDI.KEYID = 6
1,176,735 UART: [idev] SUBJECT.KEYID = 7
1,177,159 UART: [idev] UDS.KEYID = 0
1,177,504 ready_for_fw is high
1,177,504 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,619 UART: [idev] Erasing UDS.KEYID = 0
1,200,984 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,560 UART: [ldev] ++
1,210,728 UART: [ldev] CDI.KEYID = 6
1,211,091 UART: [ldev] SUBJECT.KEYID = 5
1,211,517 UART: [ldev] AUTHORITY.KEYID = 7
1,211,980 UART: [ldev] FE.KEYID = 1
1,217,304 UART: [ldev] Erasing FE.KEYID = 1
1,243,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,206 UART: [ldev] --
1,282,537 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,631 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,064 >>> mbox cmd response: success
2,313,064 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,188 UART: [afmc] ++
2,314,356 UART: [afmc] CDI.KEYID = 6
2,314,718 UART: [afmc] SUBJECT.KEYID = 7
2,315,143 UART: [afmc] AUTHORITY.KEYID = 5
2,351,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,474 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,913 UART: [afmc] --
2,394,957 UART: [cold-reset] --
2,395,767 UART: [state] Locking Datavault
2,397,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,644 UART: [state] Locking ICCM
2,398,240 UART: [exit] Launching FMC @ 0x40000130
2,403,569 UART:
2,403,585 UART: Running Caliptra FMC ...
2,403,993 UART:
2,404,136 UART: [state] CFI Enabled
2,414,991 UART: [fht] FMC Alias Private Key: 7
2,523,288 UART: [art] Extend RT PCRs Done
2,523,716 UART: [art] Lock RT PCRs Done
2,525,114 UART: [art] Populate DV Done
2,533,185 UART: [fht] FMC Alias Private Key: 7
2,534,295 UART: [art] Derive CDI
2,534,575 UART: [art] Store in in slot 0x4
2,620,508 UART: [art] Derive Key Pair
2,620,868 UART: [art] Store priv key in slot 0x5
2,633,690 UART: [art] Derive Key Pair - Done
2,648,107 UART: [art] Signing Cert with AUTHO
2,648,587 UART: RITY.KEYID = 7
2,663,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,744 UART: [art] PUB.X = 195F249B3C10408BE968AD8B0A881D28B845D57647F61745FE49FDADCC48D5F4A0E6ACBD93E6651C92150A2D30EC5886
2,671,516 UART: [art] PUB.Y = 996D6CF23FEF47EEA02B0CD17B38718E30D25BB138435703E9D89F999BFC4AF43AF17882CC23C8FCCE4233130417C1E8
2,678,467 UART: [art] SIG.R = 8A8684F58261ED99A27038DC5E40973F2560B028450E67C79C7AA10B18C50FB825B410663518A5A6BFC32FF78A84C9BA
2,685,228 UART: [art] SIG.S = E84E3B793C20780E7065C4CB220670AC7D8C7BEB888BE3D12C5B408673072E2B9FA788772A50EF7193241F555D0DCED3
2,708,553 UART: mbox::rt_entry...
2,708,925 UART: ____ _ _ _ ____ _____
2,709,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,045 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,813 UART: |_|
2,713,125 UART:
2,818,482 UART: [rt] Runtime listening for mailbox commands...
2,819,663 >>> mbox cmd response data (48 bytes)
2,819,664 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,447 >>> mbox cmd response data (48 bytes)
2,822,448 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,386 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 ready_for_fw is high
1,060,670 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,611 >>> mbox cmd response: success
2,166,611 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,617 UART:
2,228,633 UART: Running Caliptra FMC ...
2,229,041 UART:
2,229,184 UART: [state] CFI Enabled
2,239,531 UART: [fht] FMC Alias Private Key: 7
2,347,386 UART: [art] Extend RT PCRs Done
2,347,814 UART: [art] Lock RT PCRs Done
2,349,490 UART: [art] Populate DV Done
2,357,407 UART: [fht] FMC Alias Private Key: 7
2,358,579 UART: [art] Derive CDI
2,358,859 UART: [art] Store in in slot 0x4
2,444,734 UART: [art] Derive Key Pair
2,445,094 UART: [art] Store priv key in slot 0x5
2,458,814 UART: [art] Derive Key Pair - Done
2,473,574 UART: [art] Signing Cert with AUTHO
2,474,054 UART: RITY.KEYID = 7
2,489,258 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,023 UART: [art] PUB.X = B04BBE541249C6CC20178AF9DB6E9D5E453D8435D8A416AE6293C9028A53A92A34B76C11092CF36627DD28B056ABE026
2,496,791 UART: [art] PUB.Y = 4BF0405AF7365C671BEB0BA8518F4FCE65C6FBE7EBBCFBF1B111201E31D4A89BDE7088753007FF7D69075E81FF268787
2,503,746 UART: [art] SIG.R = 7392DF0FE96C406A7F8CAC7AF0E87FE1CE56D567C935438ABB03F41FE4CA6D0BBE84DF963F6FF0AC7579940A61B11690
2,510,522 UART: [art] SIG.S = CDFED23CE592C546C4682379F7EC2425D9B627B2773C4E921DAD057DD0DD766FAAE9B99601285D889E1C0AD2E3241523
2,534,316 UART: mbox::rt_entry...
2,534,688 UART: ____ _ _ _ ____ _____
2,535,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,576 UART: |_|
2,538,888 UART:
2,645,570 UART: [rt] Runtime listening for mailbox commands...
2,646,751 >>> mbox cmd response data (48 bytes)
2,646,752 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,649,535 >>> mbox cmd response data (48 bytes)
2,649,536 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,662,474 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,174,375 ready_for_fw is high
1,174,375 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,312 UART: [ldev] ++
1,209,480 UART: [ldev] CDI.KEYID = 6
1,209,844 UART: [ldev] SUBJECT.KEYID = 5
1,210,271 UART: [ldev] AUTHORITY.KEYID = 7
1,210,734 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,070 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,023 UART: [fwproc] Recv command 0x46574c44
1,282,756 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,065 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,441 >>> mbox cmd response: success
2,311,441 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,638 UART: [afmc] ++
2,312,806 UART: [afmc] CDI.KEYID = 6
2,313,169 UART: [afmc] SUBJECT.KEYID = 7
2,313,595 UART: [afmc] AUTHORITY.KEYID = 5
2,349,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,359 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,901 UART: [afmc] --
2,392,873 UART: [cold-reset] --
2,393,665 UART: [state] Locking Datavault
2,394,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,330 UART: [state] Locking ICCM
2,395,880 UART: [exit] Launching FMC @ 0x40000130
2,401,209 UART:
2,401,225 UART: Running Caliptra FMC ...
2,401,633 UART:
2,401,687 UART: [state] CFI Enabled
2,412,222 UART: [fht] FMC Alias Private Key: 7
2,520,103 UART: [art] Extend RT PCRs Done
2,520,531 UART: [art] Lock RT PCRs Done
2,522,469 UART: [art] Populate DV Done
2,530,752 UART: [fht] FMC Alias Private Key: 7
2,531,874 UART: [art] Derive CDI
2,532,154 UART: [art] Store in in slot 0x4
2,617,797 UART: [art] Derive Key Pair
2,618,157 UART: [art] Store priv key in slot 0x5
2,631,029 UART: [art] Derive Key Pair - Done
2,646,128 UART: [art] Signing Cert with AUTHO
2,646,608 UART: RITY.KEYID = 7
2,661,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,273 UART: [art] PUB.X = C4E54D771D8A89C5762AA60D0FE60EE3E49D89D7B9F3F8E9A345954C4BADEC371FFFA41CBE9EED0DF03FF40ED956FB05
2,669,053 UART: [art] PUB.Y = E6E28078CBB00BC0CA28809EFDB1BE24EB7545EF01841FC50B69B612CE4B2F7B5929AF8B9418F7F1446DFE1CFCBCEED6
2,676,020 UART: [art] SIG.R = C4F9AA693AACC16B0AADA85FABA3218DCB08246115412DAACED54B19D84E3816B9068B80C02D876E006FC479287E3595
2,682,771 UART: [art] SIG.S = 9E4365CF1E9C718DC13B2D11DBFCDCE0BA3AAE65C9D6B01218B2280600DC4A2E5334327797CD1803CB9DB23305E2751C
2,706,323 UART: mbox::rt_entry...
2,706,695 UART: ____ _ _ _ ____ _____
2,707,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,279 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,047 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,815 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,583 UART: |_|
2,710,895 UART:
2,817,102 UART: [rt] Runtime listening for mailbox commands...
2,818,283 >>> mbox cmd response data (48 bytes)
2,818,284 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,821,067 >>> mbox cmd response data (48 bytes)
2,821,068 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,834,006 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,172 ready_for_fw is high
1,056,172 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,699 >>> mbox cmd response: success
2,159,699 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,222,089 UART:
2,222,105 UART: Running Caliptra FMC ...
2,222,513 UART:
2,222,567 UART: [state] CFI Enabled
2,233,308 UART: [fht] FMC Alias Private Key: 7
2,341,159 UART: [art] Extend RT PCRs Done
2,341,587 UART: [art] Lock RT PCRs Done
2,343,471 UART: [art] Populate DV Done
2,351,636 UART: [fht] FMC Alias Private Key: 7
2,352,744 UART: [art] Derive CDI
2,353,024 UART: [art] Store in in slot 0x4
2,438,139 UART: [art] Derive Key Pair
2,438,499 UART: [art] Store priv key in slot 0x5
2,452,359 UART: [art] Derive Key Pair - Done
2,467,052 UART: [art] Signing Cert with AUTHO
2,467,532 UART: RITY.KEYID = 7
2,482,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,389 UART: [art] PUB.X = 68B3DFC3324B048AD4808117CE2773A269058955F0586B3C7870442356D6D170F1154FB008ADF720E35347F151927D2E
2,490,138 UART: [art] PUB.Y = AF9DAD5C0E0CF7435CA16F2740B680B1ACBD200F9100A6833B9FFF8D5582C7E3F68A38122F7E1E5885807BD7B22B8830
2,497,067 UART: [art] SIG.R = 4191E8DACD83F33D83FD15F1907D97C50E93824F0B854F267A04D0848A69DC9655057F92F6CBCD9FF843B91006DD84C2
2,503,826 UART: [art] SIG.S = E7DC4EE60163FD85A423627D5B876A361E2FB01273FA71510FBF11C3E6B68409E3DB8120BB832EF2306668EB27E596BB
2,527,366 UART: mbox::rt_entry...
2,527,738 UART: ____ _ _ _ ____ _____
2,528,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,858 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,626 UART: |_|
2,531,938 UART:
2,638,246 UART: [rt] Runtime listening for mailbox commands...
2,639,427 >>> mbox cmd response data (48 bytes)
2,639,428 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,642,211 >>> mbox cmd response data (48 bytes)
2,642,212 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,655,150 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,578 UART: [idev] ++
1,173,746 UART: [idev] CDI.KEYID = 6
1,174,107 UART: [idev] SUBJECT.KEYID = 7
1,174,532 UART: [idev] UDS.KEYID = 0
1,174,878 ready_for_fw is high
1,174,878 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,209,865 UART: [ldev] ++
1,210,033 UART: [ldev] CDI.KEYID = 6
1,210,397 UART: [ldev] SUBJECT.KEYID = 5
1,210,824 UART: [ldev] AUTHORITY.KEYID = 7
1,211,287 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,497 UART: [ldev] --
1,282,899 UART: [fwproc] Wait for Commands...
1,283,620 UART: [fwproc] Recv command 0x46574c44
1,284,353 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,522 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,774 >>> mbox cmd response: success
2,313,774 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,967 UART: [afmc] ++
2,315,135 UART: [afmc] CDI.KEYID = 6
2,315,498 UART: [afmc] SUBJECT.KEYID = 7
2,315,924 UART: [afmc] AUTHORITY.KEYID = 5
2,351,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,569 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,482 UART: [afmc] --
2,394,422 UART: [cold-reset] --
2,395,262 UART: [state] Locking Datavault
2,396,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,933 UART: [state] Locking ICCM
2,397,497 UART: [exit] Launching FMC @ 0x40000130
2,402,826 UART:
2,402,842 UART: Running Caliptra FMC ...
2,403,250 UART:
2,403,393 UART: [state] CFI Enabled
2,414,110 UART: [fht] FMC Alias Private Key: 7
2,522,185 UART: [art] Extend RT PCRs Done
2,522,613 UART: [art] Lock RT PCRs Done
2,524,247 UART: [art] Populate DV Done
2,532,376 UART: [fht] FMC Alias Private Key: 7
2,533,474 UART: [art] Derive CDI
2,533,754 UART: [art] Store in in slot 0x4
2,619,697 UART: [art] Derive Key Pair
2,620,057 UART: [art] Store priv key in slot 0x5
2,633,663 UART: [art] Derive Key Pair - Done
2,648,411 UART: [art] Signing Cert with AUTHO
2,648,891 UART: RITY.KEYID = 7
2,664,699 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,464 UART: [art] PUB.X = AF21B12966491085DD0BAFD06E70ACDB09114B799748A6D9291624E0E99F7AADEEC676AC22D5B8C1576E54D5F05EDF8A
2,672,242 UART: [art] PUB.Y = FFE536BEC07D35A814036DF8440E586C69A2787D66B0B21959D34D92E1FE3E13C4092E3F73F7FBE40052BF7C7E437828
2,679,165 UART: [art] SIG.R = EA25F043AFCFF9DF9A3188247533F27842AC8351E737E8CC5301A21280247E3BAEC509C3E6AC1D6E38F0FDF16785711E
2,685,937 UART: [art] SIG.S = 7B33DAEDA815D5EE93B820B074495A3BDE689A2266A72E55F4D23F1DB44A311B197DB0A02E0B62BA2F902E8C85B05A52
2,709,753 UART: mbox::rt_entry...
2,710,125 UART: ____ _ _ _ ____ _____
2,710,909 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,709 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,245 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,013 UART: |_|
2,714,325 UART:
2,821,943 UART: [rt] Runtime listening for mailbox commands...
2,823,124 >>> mbox cmd response data (48 bytes)
2,823,125 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,825,908 >>> mbox cmd response data (48 bytes)
2,825,909 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,838,847 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,295 ready_for_fw is high
1,057,295 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,032 >>> mbox cmd response: success
2,162,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,224,362 UART:
2,224,378 UART: Running Caliptra FMC ...
2,224,786 UART:
2,224,929 UART: [state] CFI Enabled
2,235,408 UART: [fht] FMC Alias Private Key: 7
2,343,937 UART: [art] Extend RT PCRs Done
2,344,365 UART: [art] Lock RT PCRs Done
2,345,799 UART: [art] Populate DV Done
2,353,870 UART: [fht] FMC Alias Private Key: 7
2,354,996 UART: [art] Derive CDI
2,355,276 UART: [art] Store in in slot 0x4
2,440,851 UART: [art] Derive Key Pair
2,441,211 UART: [art] Store priv key in slot 0x5
2,455,051 UART: [art] Derive Key Pair - Done
2,469,932 UART: [art] Signing Cert with AUTHO
2,470,412 UART: RITY.KEYID = 7
2,485,904 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,669 UART: [art] PUB.X = 85DE68D3E232E0A9A91A3607B3B25A0A4B6738A43C42ACD1A513FEE607111F89A65FDBBEC227D823C0D832D42219E717
2,493,438 UART: [art] PUB.Y = C8108548C91D019274273C1C75F05ECBC275B9BE1F3A9BA8A0C259FD640C1785A51CD50F7C8FE133A274E12E60BE92BD
2,500,389 UART: [art] SIG.R = 4E0BD0657EA401E061BE45D0C300162FA705A4FC5AF565484594295A138CC2B597FD4B1442C90490925F5BE6F20E2F11
2,507,122 UART: [art] SIG.S = E8633FCC7216F0EAD3BA270E5412A3C4E06ECBDD14DB4F9D94090BBF9B906705C1B1307DF54EA3822AEAB08FF47A6915
2,531,001 UART: mbox::rt_entry...
2,531,373 UART: ____ _ _ _ ____ _____
2,532,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,261 UART: |_|
2,535,573 UART:
2,641,561 UART: [rt] Runtime listening for mailbox commands...
2,642,742 >>> mbox cmd response data (48 bytes)
2,642,743 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,526 >>> mbox cmd response data (48 bytes)
2,645,527 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,465 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,247 UART:
192,628 UART: Running Caliptra ROM ...
193,821 UART:
193,978 UART: [state] CFI Enabled
263,639 UART: [state] LifecycleState = Unprovisioned
265,622 UART: [state] DebugLocked = No
267,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,724 UART: [kat] SHA2-256
442,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,923 UART: [kat] ++
453,377 UART: [kat] sha1
465,103 UART: [kat] SHA2-256
467,753 UART: [kat] SHA2-384
473,563 UART: [kat] SHA2-512-ACC
475,975 UART: [kat] ECC-384
2,766,995 UART: [kat] HMAC-384Kdf
2,799,127 UART: [kat] LMS
3,989,452 UART: [kat] --
3,994,131 UART: [cold-reset] ++
3,995,307 UART: [fht] Storing FHT @ 0x50003400
4,006,293 UART: [idev] ++
4,006,867 UART: [idev] CDI.KEYID = 6
4,007,904 UART: [idev] SUBJECT.KEYID = 7
4,009,087 UART: [idev] UDS.KEYID = 0
4,010,155 ready_for_fw is high
4,010,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,966 UART: [idev] Erasing UDS.KEYID = 0
7,347,064 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,490 UART: [idev] --
7,371,067 UART: [ldev] ++
7,371,649 UART: [ldev] CDI.KEYID = 6
7,372,625 UART: [ldev] SUBJECT.KEYID = 5
7,373,843 UART: [ldev] AUTHORITY.KEYID = 7
7,375,076 UART: [ldev] FE.KEYID = 1
7,401,174 UART: [ldev] Erasing FE.KEYID = 1
10,731,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,040 UART: [ldev] --
13,095,388 UART: [fwproc] Waiting for Commands...
13,098,299 UART: [fwproc] Received command 0x46574c44
13,100,484 UART: [fwproc] Received Image of size 114124 bytes
17,155,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,620,975 >>> mbox cmd response: success
17,625,336 UART: [afmc] ++
17,625,944 UART: [afmc] CDI.KEYID = 6
17,626,996 UART: [afmc] SUBJECT.KEYID = 7
17,628,105 UART: [afmc] AUTHORITY.KEYID = 5
20,999,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,151 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,406 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,798 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,679 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,099 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,119 UART: [afmc] --
23,371,449 UART: [cold-reset] --
23,375,532 UART: [state] Locking Datavault
23,379,001 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,705 UART: [state] Locking ICCM
23,381,992 UART: [exit] Launching FMC @ 0x40000130
23,390,391 UART:
23,390,627 UART: Running Caliptra FMC ...
23,391,727 UART:
23,391,884 UART: [state] CFI Enabled
23,459,184 UART: [fht] FMC Alias Private Key: 7
25,796,956 UART: [art] Extend RT PCRs Done
25,798,176 UART: [art] Lock RT PCRs Done
25,799,644 UART: [art] Populate DV Done
25,805,075 UART: [fht] FMC Alias Private Key: 7
25,806,573 UART: [art] Derive CDI
25,807,312 UART: [art] Store in in slot 0x4
25,867,648 UART: [art] Derive Key Pair
25,868,690 UART: [art] Store priv key in slot 0x5
29,161,667 UART: [art] Derive Key Pair - Done
29,174,728 UART: [art] Signing Cert with AUTHO
29,176,030 UART: RITY.KEYID = 7
31,463,917 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,430 UART: [art] PUB.X = A6F531833F1313EC6404CEAB4525F40D3708DF02937B8507B2AC0881A11DCD96AF7511E4B8246BAE52B5A0C49DCDA1B1
31,472,635 UART: [art] PUB.Y = 5186F4B22C9CDABBF34BB39467FA4A5561478BF5651C95E746BC6EE695005D0EED9610CE80FD16B4FDF149984394533E
31,479,882 UART: [art] SIG.R = 52C8229D1E698049752C5B53D59921DDB9926ADE7F684E4446D31B98217756AD726B097AB2E51FB2CA5CADC4AF172360
31,487,301 UART: [art] SIG.S = 080EBC3DB57597A8A355259B093B2A517B6F682D1E3ACE58CE84467EB12C813AFD56A9920BD6D00FA5D47FE12B146030
32,792,235 UART: Caliptra RT
32,792,942 UART: [state] CFI Enabled
32,955,294 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,785,053 ready_for_fw is high
3,785,457 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,565 >>> mbox cmd response: success
23,565,950 UART:
23,566,344 UART: Running Caliptra FMC ...
23,567,478 UART:
23,567,642 UART: [state] CFI Enabled
23,637,868 UART: [fht] FMC Alias Private Key: 7
25,974,780 UART: [art] Extend RT PCRs Done
25,976,007 UART: [art] Lock RT PCRs Done
25,977,835 UART: [art] Populate DV Done
25,983,215 UART: [fht] FMC Alias Private Key: 7
25,984,695 UART: [art] Derive CDI
25,985,474 UART: [art] Store in in slot 0x4
26,046,680 UART: [art] Derive Key Pair
26,047,688 UART: [art] Store priv key in slot 0x5
29,340,678 UART: [art] Derive Key Pair - Done
29,353,900 UART: [art] Signing Cert with AUTHO
29,355,235 UART: RITY.KEYID = 7
31,642,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,118 UART: [art] PUB.X = 810A3299C2E4DBBC6C4A053AD7EA935C4D8530FA550EEC5008432BE17EFDEA836FB77BFFFB22F91DD03076CAD1EA04FB
31,651,369 UART: [art] PUB.Y = 58D3F9FE430233B2E03E4785E329AAB25BAECC74AA618183D8132A961EFF20C449C81C56240A9E59CB8CD47660483DF9
31,658,654 UART: [art] SIG.R = 9A62F499008281FA781784C0E0BCB154CB65D88DCA30A276FB134E59362BCD67AD01092334FCE7F48F87DEEC88CA1DFF
31,666,041 UART: [art] SIG.S = D09A03B54B2DA800732057D40BAA3CBB6387C8763ECDCA5406F7C64E2DD8CD1488D675AD241412B9278AE4921E1A1C69
32,971,390 UART: Caliptra RT
32,972,098 UART: [state] CFI Enabled
33,132,785 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,407 UART:
192,795 UART: Running Caliptra ROM ...
193,915 UART:
603,644 UART: [state] CFI Enabled
619,221 UART: [state] LifecycleState = Unprovisioned
621,175 UART: [state] DebugLocked = No
622,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,052 UART: [kat] SHA2-256
797,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,362 UART: [kat] ++
808,808 UART: [kat] sha1
818,156 UART: [kat] SHA2-256
820,854 UART: [kat] SHA2-384
826,632 UART: [kat] SHA2-512-ACC
828,995 UART: [kat] ECC-384
3,115,601 UART: [kat] HMAC-384Kdf
3,126,847 UART: [kat] LMS
4,316,974 UART: [kat] --
4,321,317 UART: [cold-reset] ++
4,323,948 UART: [fht] Storing FHT @ 0x50003400
4,336,216 UART: [idev] ++
4,336,823 UART: [idev] CDI.KEYID = 6
4,337,739 UART: [idev] SUBJECT.KEYID = 7
4,338,980 UART: [idev] UDS.KEYID = 0
4,340,016 ready_for_fw is high
4,340,227 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,428 UART: [idev] Erasing UDS.KEYID = 0
7,628,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,756 UART: [idev] --
7,654,422 UART: [ldev] ++
7,654,983 UART: [ldev] CDI.KEYID = 6
7,655,941 UART: [ldev] SUBJECT.KEYID = 5
7,657,197 UART: [ldev] AUTHORITY.KEYID = 7
7,658,474 UART: [ldev] FE.KEYID = 1
7,672,711 UART: [ldev] Erasing FE.KEYID = 1
10,960,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,127 UART: [ldev] --
13,320,038 UART: [fwproc] Waiting for Commands...
13,322,073 UART: [fwproc] Received command 0x46574c44
13,324,249 UART: [fwproc] Received Image of size 114124 bytes
17,382,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,419 >>> mbox cmd response: success
17,845,417 UART: [afmc] ++
17,846,033 UART: [afmc] CDI.KEYID = 6
17,846,946 UART: [afmc] SUBJECT.KEYID = 7
17,848,158 UART: [afmc] AUTHORITY.KEYID = 5
21,165,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,753 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,062 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,252 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,689 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,450 UART: [afmc] --
23,531,965 UART: [cold-reset] --
23,535,075 UART: [state] Locking Datavault
23,540,473 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,227 UART: [state] Locking ICCM
23,543,560 UART: [exit] Launching FMC @ 0x40000130
23,551,954 UART:
23,552,203 UART: Running Caliptra FMC ...
23,553,301 UART:
23,553,455 UART: [state] CFI Enabled
23,561,525 UART: [fht] FMC Alias Private Key: 7
25,893,190 UART: [art] Extend RT PCRs Done
25,894,404 UART: [art] Lock RT PCRs Done
25,895,644 UART: [art] Populate DV Done
25,901,269 UART: [fht] FMC Alias Private Key: 7
25,902,908 UART: [art] Derive CDI
25,903,715 UART: [art] Store in in slot 0x4
25,946,101 UART: [art] Derive Key Pair
25,947,140 UART: [art] Store priv key in slot 0x5
29,188,991 UART: [art] Derive Key Pair - Done
29,201,944 UART: [art] Signing Cert with AUTHO
29,203,238 UART: RITY.KEYID = 7
31,482,867 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,391 UART: [art] PUB.X = 8487214AFEFB8DC9DFCC3F0480018A9EA06D1DFDB67E7FE1DA9F5F91C42E910B905CDC4B73AFAD5E5286AF073BED2330
31,491,682 UART: [art] PUB.Y = BD8F1D61A9337E571DE9BC69DCF1F0FDB1DEA315FF5B575486F6899B1BC5927735768D0C60EB6E4250C8EE9219450EEE
31,498,899 UART: [art] SIG.R = C5D982A20EC822D29B5AB9F48E13DD5B2FDB8F61F6E950B3FBC5D5D4CEB171B8C6A26D629C1EB0E68EF42AC04CC0F31A
31,506,328 UART: [art] SIG.S = 98932102E4EABD9E71A19F071393E35477416B4EA4781303320C79E94BAF2F693A706A52C9EDF75B95AC59056A1BAFBC
32,811,278 UART: Caliptra RT
32,811,999 UART: [state] CFI Enabled
32,930,057 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,131,520 ready_for_fw is high
4,131,920 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,849 >>> mbox cmd response: success
23,704,375 UART:
23,704,917 UART: Running Caliptra FMC ...
23,706,057 UART:
23,706,238 UART: [state] CFI Enabled
23,714,359 UART: [fht] FMC Alias Private Key: 7
26,045,173 UART: [art] Extend RT PCRs Done
26,046,470 UART: [art] Lock RT PCRs Done
26,048,291 UART: [art] Populate DV Done
26,053,482 UART: [fht] FMC Alias Private Key: 7
26,055,188 UART: [art] Derive CDI
26,056,004 UART: [art] Store in in slot 0x4
26,098,549 UART: [art] Derive Key Pair
26,099,555 UART: [art] Store priv key in slot 0x5
29,341,661 UART: [art] Derive Key Pair - Done
29,354,552 UART: [art] Signing Cert with AUTHO
29,355,843 UART: RITY.KEYID = 7
31,635,167 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,674 UART: [art] PUB.X = 82B3D02A32261F65312D20DF35B46FB541E84002325EE7DAAE1F8584BE94A1A4D4B61115F31096FC509F04D0E2259B4C
31,643,910 UART: [art] PUB.Y = 5F9E3E3050DAB065F6EB1BEB5DE7B5230A2AB411BFD63CC23999C52C7206D09AFCC57223F55F387DDADC9F74EE5C0DB2
31,651,146 UART: [art] SIG.R = D995ACE56349C527E445FA2D61A606D916E9F84F9781FD0A4205C3BDFAC52D9EE00BEB3DC660F8E0BB255D82F8712D7F
31,658,585 UART: [art] SIG.S = FD2336CF1222B78BA0BDEED74E84C4996B809130BD1A19B25489D5449BEADBD9601E4BC6A6997CC6307E70B28AA3132F
32,963,847 UART: Caliptra RT
32,964,570 UART: [state] CFI Enabled
33,082,210 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,012 UART:
192,374 UART: Running Caliptra ROM ...
193,469 UART:
193,611 UART: [state] CFI Enabled
264,458 UART: [state] LifecycleState = Unprovisioned
266,363 UART: [state] DebugLocked = No
268,808 UART: [state] WD Timer not started. Device not locked for debugging
273,402 UART: [kat] SHA2-256
452,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,116 UART: [kat] ++
464,570 UART: [kat] sha1
474,590 UART: [kat] SHA2-256
477,595 UART: [kat] SHA2-384
482,943 UART: [kat] SHA2-512-ACC
485,947 UART: [kat] ECC-384
2,949,186 UART: [kat] HMAC-384Kdf
2,973,228 UART: [kat] LMS
3,502,717 UART: [kat] --
3,509,262 UART: [cold-reset] ++
3,510,840 UART: [fht] FHT @ 0x50003400
3,520,970 UART: [idev] ++
3,521,527 UART: [idev] CDI.KEYID = 6
3,522,553 UART: [idev] SUBJECT.KEYID = 7
3,523,653 UART: [idev] UDS.KEYID = 0
3,524,580 ready_for_fw is high
3,524,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,226 UART: [idev] Erasing UDS.KEYID = 0
6,028,870 UART: [idev] Sha1 KeyId Algorithm
6,051,769 UART: [idev] --
6,055,851 UART: [ldev] ++
6,056,476 UART: [ldev] CDI.KEYID = 6
6,057,368 UART: [ldev] SUBJECT.KEYID = 5
6,058,418 UART: [ldev] AUTHORITY.KEYID = 7
6,059,768 UART: [ldev] FE.KEYID = 1
6,101,658 UART: [ldev] Erasing FE.KEYID = 1
8,605,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,664 UART: [ldev] --
10,415,891 UART: [fwproc] Wait for Commands...
10,417,766 UART: [fwproc] Recv command 0x46574c44
10,419,855 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,280 >>> mbox cmd response: success
14,291,415 UART: [afmc] ++
14,292,006 UART: [afmc] CDI.KEYID = 6
14,292,898 UART: [afmc] SUBJECT.KEYID = 7
14,294,109 UART: [afmc] AUTHORITY.KEYID = 5
16,830,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,391 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,252 UART: [afmc] --
18,629,876 UART: [cold-reset] --
18,633,194 UART: [state] Locking Datavault
18,639,946 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,647 UART: [state] Locking ICCM
18,643,579 UART: [exit] Launching FMC @ 0x40000130
18,651,973 UART:
18,652,201 UART: Running Caliptra FMC ...
18,653,297 UART:
18,653,454 UART: [state] CFI Enabled
18,711,059 UART: [fht] FMC Alias Private Key: 7
20,475,398 UART: [art] Extend RT PCRs Done
20,476,664 UART: [art] Lock RT PCRs Done
20,478,316 UART: [art] Populate DV Done
20,483,725 UART: [fht] FMC Alias Private Key: 7
20,485,223 UART: [art] Derive CDI
20,485,956 UART: [art] Store in in slot 0x4
20,543,478 UART: [art] Derive Key Pair
20,544,514 UART: [art] Store priv key in slot 0x5
23,006,835 UART: [art] Derive Key Pair - Done
23,019,937 UART: [art] Signing Cert with AUTHO
23,021,237 UART: RITY.KEYID = 7
24,731,888 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,393 UART: [art] PUB.X = 8020C1AD15155471A4E5D588B4F964DC3D913FE760DD0A11B25D56B26A458BB012B98572768C3706C7BD89A99C1D3AE0
24,740,630 UART: [art] PUB.Y = AB498142886CDDF9DDE2A0A1BA502058840F4E49533823B6B46A4A4C1273AD4F70E91787F52076D2D80613C5D54DAE3C
24,747,913 UART: [art] SIG.R = E85F967816E9B8AA84BF90224631CBBD8E08824BFA5FC57E43CBC8A6ED6D3610B2002A088590D556884A83A7E3C73A72
24,755,296 UART: [art] SIG.S = FCB39D6A8EB2FADC44BD650CEA53B3D1C5BC32817E27E1AAE03D96E6D5E006B05CC6AC724311A852E8189DE9079AE86D
25,733,827 UART: Caliptra RT
25,734,526 UART: [state] CFI Enabled
25,899,911 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,380,460 ready_for_fw is high
3,380,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,939 >>> mbox cmd response: success
18,360,083 UART:
18,360,478 UART: Running Caliptra FMC ...
18,361,650 UART:
18,361,812 UART: [state] CFI Enabled
18,429,059 UART: [fht] FMC Alias Private Key: 7
20,192,670 UART: [art] Extend RT PCRs Done
20,193,886 UART: [art] Lock RT PCRs Done
20,195,292 UART: [art] Populate DV Done
20,200,872 UART: [fht] FMC Alias Private Key: 7
20,202,415 UART: [art] Derive CDI
20,203,231 UART: [art] Store in in slot 0x4
20,260,274 UART: [art] Derive Key Pair
20,261,309 UART: [art] Store priv key in slot 0x5
22,724,499 UART: [art] Derive Key Pair - Done
22,737,550 UART: [art] Signing Cert with AUTHO
22,738,853 UART: RITY.KEYID = 7
24,450,230 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,708 UART: [art] PUB.X = A63A97B6E079A26A8266AA16DF08B0B9A2BD17D099D8E8D39FCFB116E79753C6E271687BCDA6AAED09A72DD1FEB1C046
24,459,058 UART: [art] PUB.Y = EAE8F458AD4E4FDAA9577495469443DCE0CE4150971BF60662FD0A5027E5BD2E32F5745C8138E6A8E9F2BDCB7B76A30E
24,466,291 UART: [art] SIG.R = 6B6CE2DD4CB5E84F03610AFFE90F6A110C15F50C646521620D12E1F1E619D2B57BBDC846B014B4869AD0DE4168721B29
24,473,689 UART: [art] SIG.S = 7FA21F135064CC1304B08260D107723AE0CAC6EBCCBF97871A970E83BA72F2568D1E2C4C9FE3C38CCDD16FE72316CB8E
25,452,935 UART: Caliptra RT
25,453,643 UART: [state] CFI Enabled
25,616,713 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,365 UART:
192,733 UART: Running Caliptra ROM ...
193,915 UART:
603,381 UART: [state] CFI Enabled
616,626 UART: [state] LifecycleState = Unprovisioned
618,509 UART: [state] DebugLocked = No
620,103 UART: [state] WD Timer not started. Device not locked for debugging
623,995 UART: [kat] SHA2-256
803,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,736 UART: [kat] ++
815,266 UART: [kat] sha1
824,790 UART: [kat] SHA2-256
827,760 UART: [kat] SHA2-384
834,286 UART: [kat] SHA2-512-ACC
837,220 UART: [kat] ECC-384
3,277,080 UART: [kat] HMAC-384Kdf
3,289,719 UART: [kat] LMS
3,819,204 UART: [kat] --
3,823,620 UART: [cold-reset] ++
3,825,141 UART: [fht] FHT @ 0x50003400
3,835,326 UART: [idev] ++
3,835,877 UART: [idev] CDI.KEYID = 6
3,836,821 UART: [idev] SUBJECT.KEYID = 7
3,837,982 UART: [idev] UDS.KEYID = 0
3,838,978 ready_for_fw is high
3,839,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,934 UART: [idev] Erasing UDS.KEYID = 0
6,310,767 UART: [idev] Sha1 KeyId Algorithm
6,333,775 UART: [idev] --
6,337,342 UART: [ldev] ++
6,337,901 UART: [ldev] CDI.KEYID = 6
6,338,809 UART: [ldev] SUBJECT.KEYID = 5
6,340,011 UART: [ldev] AUTHORITY.KEYID = 7
6,341,236 UART: [ldev] FE.KEYID = 1
6,350,363 UART: [ldev] Erasing FE.KEYID = 1
8,826,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,487 UART: [ldev] --
10,618,662 UART: [fwproc] Wait for Commands...
10,621,673 UART: [fwproc] Recv command 0x46574c44
10,623,759 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,943 >>> mbox cmd response: success
14,482,478 UART: [afmc] ++
14,483,065 UART: [afmc] CDI.KEYID = 6
14,483,974 UART: [afmc] SUBJECT.KEYID = 7
14,485,201 UART: [afmc] AUTHORITY.KEYID = 5
16,986,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,575 UART: [afmc] --
18,785,597 UART: [cold-reset] --
18,788,803 UART: [state] Locking Datavault
18,795,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,467 UART: [state] Locking ICCM
18,799,232 UART: [exit] Launching FMC @ 0x40000130
18,807,628 UART:
18,807,855 UART: Running Caliptra FMC ...
18,808,946 UART:
18,809,119 UART: [state] CFI Enabled
18,817,324 UART: [fht] FMC Alias Private Key: 7
20,573,918 UART: [art] Extend RT PCRs Done
20,575,148 UART: [art] Lock RT PCRs Done
20,576,818 UART: [art] Populate DV Done
20,582,341 UART: [fht] FMC Alias Private Key: 7
20,583,819 UART: [art] Derive CDI
20,584,573 UART: [art] Store in in slot 0x4
20,627,446 UART: [art] Derive Key Pair
20,628,487 UART: [art] Store priv key in slot 0x5
23,055,468 UART: [art] Derive Key Pair - Done
23,068,515 UART: [art] Signing Cert with AUTHO
23,069,842 UART: RITY.KEYID = 7
24,775,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,897 UART: [art] PUB.X = 7623C62E49F0B27ABE1AE6E5C5BEF4DF155E16AFA3F379614A1C04218F88D2E078DC982C3F375C4B9EF5922A18B8C5F0
24,784,181 UART: [art] PUB.Y = 03676DF19AC40CA61DF81842949FC8DD448D5FC2E3814CBF31FDEFC29A8A12716D14073A1B5722294F320F1386E1DD67
24,791,407 UART: [art] SIG.R = 5164EB5CF33EE93F62F4EF459A08EA18C8B4D3E72DE98F126C44817F89B7BB3394660C08A23885F30D43D75BBEB428C5
24,798,786 UART: [art] SIG.S = 3B4D9DBE31D76A1539CB88A69E4B7B08D4C562FFB2BFB281F6257B6227C438E60587D018BF68A84A6A8BC44646C906C3
25,778,239 UART: Caliptra RT
25,778,955 UART: [state] CFI Enabled
25,897,161 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,690,914 ready_for_fw is high
3,691,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,083 >>> mbox cmd response: success
18,529,177 UART:
18,530,031 UART: Running Caliptra FMC ...
18,531,148 UART:
18,531,367 UART: [state] CFI Enabled
18,538,404 UART: [fht] FMC Alias Private Key: 7
20,295,235 UART: [art] Extend RT PCRs Done
20,296,479 UART: [art] Lock RT PCRs Done
20,298,069 UART: [art] Populate DV Done
20,303,331 UART: [fht] FMC Alias Private Key: 7
20,304,813 UART: [art] Derive CDI
20,305,539 UART: [art] Store in in slot 0x4
20,348,066 UART: [art] Derive Key Pair
20,349,059 UART: [art] Store priv key in slot 0x5
22,776,074 UART: [art] Derive Key Pair - Done
22,789,134 UART: [art] Signing Cert with AUTHO
22,790,433 UART: RITY.KEYID = 7
24,496,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,827 UART: [art] PUB.X = 1B97307A5A5432365BB869CEC7B02437E713A4380A29D8FC41410BE3BAB680E571D1336B87455F3206F9741A994C2B34
24,505,059 UART: [art] PUB.Y = AD8BFD792C2F8A49E1988EE19005006973BC48D5FF90578EFBDB0F18CDF76952FC872D386286DEE9E8C53D7180F85326
24,512,331 UART: [art] SIG.R = 9D27AC8BADB86C5A93E4D201A774EE7701CFFB3107F167511499680F28370CD98F06C8574F17150F698705DF78F4FA07
24,519,691 UART: [art] SIG.S = FAF79D70420A056F940CE0F8F25C3F8CD3E73EC1F00A5720C76F32A8E6E40A6EF094F12D531A888C5EB59536D6A8DA95
25,498,837 UART: Caliptra RT
25,499,548 UART: [state] CFI Enabled
25,617,263 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,088 UART:
192,448 UART: Running Caliptra ROM ...
193,629 UART:
193,782 UART: [state] CFI Enabled
263,922 UART: [state] LifecycleState = Unprovisioned
266,401 UART: [state] DebugLocked = No
268,640 UART: [state] WD Timer not started. Device not locked for debugging
273,182 UART: [kat] SHA2-256
463,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,782 UART: [kat] ++
474,440 UART: [kat] sha1
484,542 UART: [kat] SHA2-256
487,554 UART: [kat] SHA2-384
494,325 UART: [kat] SHA2-512-ACC
496,898 UART: [kat] ECC-384
2,951,442 UART: [kat] HMAC-384Kdf
2,972,935 UART: [kat] LMS
3,504,750 UART: [kat] --
3,507,825 UART: [cold-reset] ++
3,509,748 UART: [fht] FHT @ 0x50003400
3,520,930 UART: [idev] ++
3,521,631 UART: [idev] CDI.KEYID = 6
3,522,661 UART: [idev] SUBJECT.KEYID = 7
3,523,764 UART: [idev] UDS.KEYID = 0
3,524,710 ready_for_fw is high
3,524,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,942 UART: [idev] Erasing UDS.KEYID = 0
6,029,545 UART: [idev] Sha1 KeyId Algorithm
6,053,204 UART: [idev] --
6,057,719 UART: [ldev] ++
6,058,402 UART: [ldev] CDI.KEYID = 6
6,059,320 UART: [ldev] SUBJECT.KEYID = 5
6,060,528 UART: [ldev] AUTHORITY.KEYID = 7
6,061,704 UART: [ldev] FE.KEYID = 1
6,101,461 UART: [ldev] Erasing FE.KEYID = 1
8,609,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,030 UART: [ldev] --
10,417,188 UART: [fwproc] Wait for Commands...
10,418,809 UART: [fwproc] Recv command 0x46574c44
10,421,065 UART: [fwproc] Recv'd Img size: 114448 bytes
13,874,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,611,613 >>> mbox cmd response: success
14,615,996 UART: [afmc] ++
14,616,727 UART: [afmc] CDI.KEYID = 6
14,617,920 UART: [afmc] SUBJECT.KEYID = 7
14,619,353 UART: [afmc] AUTHORITY.KEYID = 5
17,154,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,988 UART: [afmc] --
18,972,126 UART: [cold-reset] --
18,977,716 UART: [state] Locking Datavault
18,982,425 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,565 UART: [state] Locking ICCM
18,987,361 UART: [exit] Launching FMC @ 0x40000130
18,996,029 UART:
18,996,263 UART: Running Caliptra FMC ...
18,997,364 UART:
18,997,523 UART: [state] CFI Enabled
19,054,148 UART: [fht] FMC Alias Private Key: 7
20,818,131 UART: [art] Extend RT PCRs Done
20,819,350 UART: [art] Lock RT PCRs Done
20,821,163 UART: [art] Populate DV Done
20,826,463 UART: [fht] FMC Alias Private Key: 7
20,827,991 UART: [art] Derive CDI
20,828,774 UART: [art] Store in in slot 0x4
20,886,247 UART: [art] Derive Key Pair
20,887,289 UART: [art] Store priv key in slot 0x5
23,350,034 UART: [art] Derive Key Pair - Done
23,362,754 UART: [art] Signing Cert with AUTHO
23,364,046 UART: RITY.KEYID = 7
25,075,463 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,963 UART: [art] PUB.X = C9EBD9183A310FA44ECE19E4A12512D260692F5D12DE5912E98C4A7A65986E4D48CB4B2F3112D05BCBFCF88F58425B81
25,084,203 UART: [art] PUB.Y = 8C2F9F30B5B53084D613AB0AFB08AB4FE7539B50F9CC479698FB4463F514C45C0F909479402A6D913C0ED2C8C237D14B
25,091,479 UART: [art] SIG.R = A8753B9C68742B370EF0B0DA1BE875322B581D71B1452A4274CE815E5583305C28DB084CAE13CDDC79044835EEFA40C5
25,098,904 UART: [art] SIG.S = 682299FAD030081C6A86D82F07D007944A9B92FB348F8497E98EE3E7EFF1DF254C05AC43691952DD1316166F4C3B9B91
26,077,766 UART: Caliptra RT
26,078,485 UART: [state] CFI Enabled
26,243,358 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,454,090 ready_for_fw is high
3,454,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,867 >>> mbox cmd response: success
19,020,574 UART:
19,020,953 UART: Running Caliptra FMC ...
19,022,093 UART:
19,022,261 UART: [state] CFI Enabled
19,086,484 UART: [fht] FMC Alias Private Key: 7
20,851,161 UART: [art] Extend RT PCRs Done
20,852,383 UART: [art] Lock RT PCRs Done
20,853,958 UART: [art] Populate DV Done
20,859,149 UART: [fht] FMC Alias Private Key: 7
20,860,635 UART: [art] Derive CDI
20,861,371 UART: [art] Store in in slot 0x4
20,918,791 UART: [art] Derive Key Pair
20,919,833 UART: [art] Store priv key in slot 0x5
23,382,783 UART: [art] Derive Key Pair - Done
23,395,881 UART: [art] Signing Cert with AUTHO
23,397,189 UART: RITY.KEYID = 7
25,108,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,438 UART: [art] PUB.X = 7AF8219AE01F869B6DB110A6200C581A57D9FB6B86CF7F1692DED4EDECAA62DAAAD21366FA3ED828121940D000581112
25,117,681 UART: [art] PUB.Y = 57043A8F162373976E86501873E70A7FE4BFCF79D2E72050706FAB975745E38EB0A0C8EEE9725434571A3CE7797B4B72
25,124,934 UART: [art] SIG.R = FBD8F0AA9973CEEA5C1B8F58F2BCD147065D6E441F79BDB3A6CAB12BA4D989CF53B2FFC4CDBA3DEE74262FE89ECF2328
25,132,387 UART: [art] SIG.S = 9B962DB57401BD9540EF91964776CF78D62AC4DF694E366DA0AC71E82C48F2668F8012B0AB66921B560F96C7B010BE85
26,111,065 UART: Caliptra RT
26,111,759 UART: [state] CFI Enabled
26,275,117 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,441 UART:
192,817 UART: Running Caliptra ROM ...
193,994 UART:
603,726 UART: [state] CFI Enabled
621,789 UART: [state] LifecycleState = Unprovisioned
624,155 UART: [state] DebugLocked = No
626,123 UART: [state] WD Timer not started. Device not locked for debugging
630,005 UART: [kat] SHA2-256
819,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,661 UART: [kat] ++
831,179 UART: [kat] sha1
843,739 UART: [kat] SHA2-256
846,782 UART: [kat] SHA2-384
851,848 UART: [kat] SHA2-512-ACC
854,431 UART: [kat] ECC-384
3,295,504 UART: [kat] HMAC-384Kdf
3,308,525 UART: [kat] LMS
3,840,372 UART: [kat] --
3,846,071 UART: [cold-reset] ++
3,848,700 UART: [fht] FHT @ 0x50003400
3,859,956 UART: [idev] ++
3,860,653 UART: [idev] CDI.KEYID = 6
3,861,532 UART: [idev] SUBJECT.KEYID = 7
3,862,762 UART: [idev] UDS.KEYID = 0
3,863,655 ready_for_fw is high
3,863,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,639 UART: [idev] Erasing UDS.KEYID = 0
6,342,579 UART: [idev] Sha1 KeyId Algorithm
6,364,013 UART: [idev] --
6,367,976 UART: [ldev] ++
6,368,663 UART: [ldev] CDI.KEYID = 6
6,369,568 UART: [ldev] SUBJECT.KEYID = 5
6,370,793 UART: [ldev] AUTHORITY.KEYID = 7
6,371,971 UART: [ldev] FE.KEYID = 1
6,383,795 UART: [ldev] Erasing FE.KEYID = 1
8,861,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,555 UART: [ldev] --
10,652,138 UART: [fwproc] Wait for Commands...
10,655,194 UART: [fwproc] Recv command 0x46574c44
10,657,494 UART: [fwproc] Recv'd Img size: 114448 bytes
14,105,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,848,331 >>> mbox cmd response: success
14,852,247 UART: [afmc] ++
14,852,948 UART: [afmc] CDI.KEYID = 6
14,854,132 UART: [afmc] SUBJECT.KEYID = 7
14,855,623 UART: [afmc] AUTHORITY.KEYID = 5
17,358,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,844 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,557 UART: [afmc] --
19,155,818 UART: [cold-reset] --
19,159,514 UART: [state] Locking Datavault
19,163,964 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,144 UART: [state] Locking ICCM
19,168,817 UART: [exit] Launching FMC @ 0x40000130
19,177,451 UART:
19,177,685 UART: Running Caliptra FMC ...
19,178,781 UART:
19,178,931 UART: [state] CFI Enabled
19,187,060 UART: [fht] FMC Alias Private Key: 7
20,943,942 UART: [art] Extend RT PCRs Done
20,945,162 UART: [art] Lock RT PCRs Done
20,947,182 UART: [art] Populate DV Done
20,952,537 UART: [fht] FMC Alias Private Key: 7
20,954,231 UART: [art] Derive CDI
20,954,960 UART: [art] Store in in slot 0x4
20,997,327 UART: [art] Derive Key Pair
20,998,317 UART: [art] Store priv key in slot 0x5
23,425,327 UART: [art] Derive Key Pair - Done
23,438,208 UART: [art] Signing Cert with AUTHO
23,439,506 UART: RITY.KEYID = 7
25,144,775 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,284 UART: [art] PUB.X = 3B93F20E45FA021319FD824595DFD4CF30D727EC6FC5EB7709BF96A6D5FCC5F8AC7A792FF529F1737CD9A7E44E0FB533
25,153,554 UART: [art] PUB.Y = 6E000AC42A20BE0EDAF523DB9C3DBF53CE0984EA182A60A3536F76477CB662E910AE3936DDD9EA043C14044A28310210
25,160,819 UART: [art] SIG.R = ABF1BF7E465B524DF6F5A7E489C9DAC05E586A36465FCF9774AFEDDDA020B0EFCABDBEAE52329808840EF150B8079334
25,168,225 UART: [art] SIG.S = 6B2002C2B7A90BACE3727ABA69BC7D77A9FCA9B25630C3FC0585B86F0E1AF5EED8AE97C5482F1437BE2EC8951A5CD219
26,147,662 UART: Caliptra RT
26,148,362 UART: [state] CFI Enabled
26,264,558 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,756,911 ready_for_fw is high
3,757,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,893 >>> mbox cmd response: success
19,205,649 UART:
19,206,052 UART: Running Caliptra FMC ...
19,207,189 UART:
19,207,341 UART: [state] CFI Enabled
19,215,375 UART: [fht] FMC Alias Private Key: 7
20,972,489 UART: [art] Extend RT PCRs Done
20,973,698 UART: [art] Lock RT PCRs Done
20,975,262 UART: [art] Populate DV Done
20,980,833 UART: [fht] FMC Alias Private Key: 7
20,982,310 UART: [art] Derive CDI
20,983,067 UART: [art] Store in in slot 0x4
21,025,783 UART: [art] Derive Key Pair
21,026,824 UART: [art] Store priv key in slot 0x5
23,453,593 UART: [art] Derive Key Pair - Done
23,466,760 UART: [art] Signing Cert with AUTHO
23,468,073 UART: RITY.KEYID = 7
25,173,585 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,075 UART: [art] PUB.X = DD224F30B2D121B65EDFB5AC2C33B291512CAC8C85747297A7989EED094EB2487A4C5D2EB7264A7E9B969C380FDFBABC
25,182,362 UART: [art] PUB.Y = 9669B6ABBC9B0A7263A6EA6CF5D52330E74C9D56290650C7BA851955589E4892352937633560D361C85FDD19AFF2163B
25,189,594 UART: [art] SIG.R = 594E4F89521D56F807ED62038C99411EACD449A0C8D620633F386F0505B6143C6FE15FA142099D7C369C643F065069C3
25,196,970 UART: [art] SIG.S = 6A2F6A770A433E902D6F3E2055C4CAB58913FA58E4687DD4F45776A6908ED68CF3B05F037E032444C839953E6AB5F91A
26,175,870 UART: Caliptra RT
26,176,595 UART: [state] CFI Enabled
26,293,139 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,370 UART: [state] LifecycleState = Unprovisioned
85,025 UART: [state] DebugLocked = No
85,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,339 UART: [kat] SHA2-256
881,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,385 UART: [kat] ++
885,537 UART: [kat] sha1
889,831 UART: [kat] SHA2-256
891,769 UART: [kat] SHA2-384
894,524 UART: [kat] SHA2-512-ACC
896,425 UART: [kat] ECC-384
902,042 UART: [kat] HMAC-384Kdf
906,582 UART: [kat] LMS
1,474,778 UART: [kat] --
1,475,723 UART: [cold-reset] ++
1,476,277 UART: [fht] Storing FHT @ 0x50003400
1,478,884 UART: [idev] ++
1,479,052 UART: [idev] CDI.KEYID = 6
1,479,412 UART: [idev] SUBJECT.KEYID = 7
1,479,836 UART: [idev] UDS.KEYID = 0
1,480,181 ready_for_fw is high
1,480,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,371 UART: [ldev] ++
1,514,539 UART: [ldev] CDI.KEYID = 6
1,514,902 UART: [ldev] SUBJECT.KEYID = 5
1,515,328 UART: [ldev] AUTHORITY.KEYID = 7
1,515,791 UART: [ldev] FE.KEYID = 1
1,520,903 UART: [ldev] Erasing FE.KEYID = 1
1,546,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,642 UART: [ldev] --
1,585,997 UART: [fwproc] Waiting for Commands...
1,586,640 UART: [fwproc] Received command 0x46574c44
1,587,431 UART: [fwproc] Received Image of size 114448 bytes
2,886,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,085 >>> mbox cmd response: success
3,080,265 UART: [afmc] ++
3,080,433 UART: [afmc] CDI.KEYID = 6
3,080,795 UART: [afmc] SUBJECT.KEYID = 7
3,081,220 UART: [afmc] AUTHORITY.KEYID = 5
3,116,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,646 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,336 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,287 UART: [afmc] --
3,160,403 UART: [cold-reset] --
3,161,125 UART: [state] Locking Datavault
3,162,056 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,660 UART: [state] Locking ICCM
3,163,166 UART: [exit] Launching FMC @ 0x40000130
3,168,495 UART:
3,168,511 UART: Running Caliptra FMC ...
3,168,919 UART:
3,168,973 UART: [state] CFI Enabled
3,179,216 UART: [fht] FMC Alias Private Key: 7
3,286,683 UART: [art] Extend RT PCRs Done
3,287,111 UART: [art] Lock RT PCRs Done
3,288,441 UART: [art] Populate DV Done
3,296,844 UART: [fht] FMC Alias Private Key: 7
3,297,900 UART: [art] Derive CDI
3,298,180 UART: [art] Store in in slot 0x4
3,383,447 UART: [art] Derive Key Pair
3,383,807 UART: [art] Store priv key in slot 0x5
3,396,947 UART: [art] Derive Key Pair - Done
3,412,183 UART: [art] Signing Cert with AUTHO
3,412,663 UART: RITY.KEYID = 7
3,428,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,092 UART: [art] PUB.X = 315BA7F4D21E9366CC6D73DCFE689A1342639F3833B991367AFDFB79936AC31EF597967A984EFC8F62AF55E0C8EEB348
3,435,872 UART: [art] PUB.Y = 4F01F463E253AFE867B26FC6F2BB11806A9BC39CF49A9A5EF6FD0A0EC26CB795F1D45D12C5FC47A2FD50B446EE7BEACA
3,442,841 UART: [art] SIG.R = F108FF0F04BAC9E5B66FAD12E620AB1B6BF49FCFC8057F92AD5D03D5167F41DD628825D4AC9571E43BC12D17895A4EAC
3,449,616 UART: [art] SIG.S = D6C08B557DA439FC5CEF5F6B70EA45CFD7D31720D262F758A1845E1D5407CCEF979E3DD65A39C57B1A8C9506FA571ABD
3,473,599 UART: Caliptra RT
3,473,852 UART: [state] CFI Enabled
3,582,580 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 ready_for_fw is high
1,362,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,909 >>> mbox cmd response: success
2,990,853 UART:
2,990,869 UART: Running Caliptra FMC ...
2,991,277 UART:
2,991,331 UART: [state] CFI Enabled
3,001,750 UART: [fht] FMC Alias Private Key: 7
3,109,765 UART: [art] Extend RT PCRs Done
3,110,193 UART: [art] Lock RT PCRs Done
3,111,409 UART: [art] Populate DV Done
3,119,764 UART: [fht] FMC Alias Private Key: 7
3,120,770 UART: [art] Derive CDI
3,121,050 UART: [art] Store in in slot 0x4
3,206,811 UART: [art] Derive Key Pair
3,207,171 UART: [art] Store priv key in slot 0x5
3,220,173 UART: [art] Derive Key Pair - Done
3,235,055 UART: [art] Signing Cert with AUTHO
3,235,535 UART: RITY.KEYID = 7
3,250,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,736 UART: [art] PUB.X = F523697750BE60CAB68FE4F6F4DDBC99F601BDB10116261FB9E642BC12F69DEF450CF70C9D237345E920ED298AB9EFAB
3,258,512 UART: [art] PUB.Y = C260F15BF37F4CFFB45F59AB46A260960C27DB2F981EDB3725FE4732FE469C0E7F18A0D610BE9B2837ADC91444A9B592
3,265,468 UART: [art] SIG.R = 1C41B9DA29D1199FF20FB7F4642C120F196CB71807247E3ED39CF67D8BB4842936651817C2850D9727D07FF8EB69D765
3,272,224 UART: [art] SIG.S = F2BAB7240C8E725FA5014B8DEC71CA752CD3ED6268CE4E9D9E609879094751ACAA8AFCE18A7E3E594749342EC6321B04
3,295,591 UART: Caliptra RT
3,295,844 UART: [state] CFI Enabled
3,403,797 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,636 UART: [kat] SHA2-256
882,567 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,682 UART: [kat] ++
886,834 UART: [kat] sha1
891,186 UART: [kat] SHA2-256
893,124 UART: [kat] SHA2-384
895,927 UART: [kat] SHA2-512-ACC
897,828 UART: [kat] ECC-384
903,307 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,476,902 UART: [cold-reset] ++
1,477,446 UART: [fht] Storing FHT @ 0x50003400
1,480,367 UART: [idev] ++
1,480,535 UART: [idev] CDI.KEYID = 6
1,480,895 UART: [idev] SUBJECT.KEYID = 7
1,481,319 UART: [idev] UDS.KEYID = 0
1,481,664 ready_for_fw is high
1,481,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,581 UART: [idev] Erasing UDS.KEYID = 0
1,507,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,549 UART: [idev] --
1,516,594 UART: [ldev] ++
1,516,762 UART: [ldev] CDI.KEYID = 6
1,517,125 UART: [ldev] SUBJECT.KEYID = 5
1,517,551 UART: [ldev] AUTHORITY.KEYID = 7
1,518,014 UART: [ldev] FE.KEYID = 1
1,523,474 UART: [ldev] Erasing FE.KEYID = 1
1,549,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,527 UART: [ldev] --
1,588,934 UART: [fwproc] Waiting for Commands...
1,589,763 UART: [fwproc] Received command 0x46574c44
1,590,554 UART: [fwproc] Received Image of size 114448 bytes
2,889,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,152 >>> mbox cmd response: success
3,083,388 UART: [afmc] ++
3,083,556 UART: [afmc] CDI.KEYID = 6
3,083,918 UART: [afmc] SUBJECT.KEYID = 7
3,084,343 UART: [afmc] AUTHORITY.KEYID = 5
3,120,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,163 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,853 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,874 UART: [afmc] --
3,163,776 UART: [cold-reset] --
3,164,696 UART: [state] Locking Datavault
3,166,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,715 UART: [state] Locking ICCM
3,167,193 UART: [exit] Launching FMC @ 0x40000130
3,172,522 UART:
3,172,538 UART: Running Caliptra FMC ...
3,172,946 UART:
3,173,089 UART: [state] CFI Enabled
3,183,624 UART: [fht] FMC Alias Private Key: 7
3,291,935 UART: [art] Extend RT PCRs Done
3,292,363 UART: [art] Lock RT PCRs Done
3,294,141 UART: [art] Populate DV Done
3,302,330 UART: [fht] FMC Alias Private Key: 7
3,303,416 UART: [art] Derive CDI
3,303,696 UART: [art] Store in in slot 0x4
3,389,285 UART: [art] Derive Key Pair
3,389,645 UART: [art] Store priv key in slot 0x5
3,402,963 UART: [art] Derive Key Pair - Done
3,417,691 UART: [art] Signing Cert with AUTHO
3,418,171 UART: RITY.KEYID = 7
3,433,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,918 UART: [art] PUB.X = 6ED86B6F3C5B21F4DCADA46B8016C8E834DDA96B0E466F7BFBD9602B38946779B08C668DA082EB0773916421FD71A00B
3,440,689 UART: [art] PUB.Y = 6BE7EA33A2DA40E7C3E54FED7594285B42DA3A16D2510F67420CA57408288B943CD461947E3CF417F5A36C2D3550A428
3,447,632 UART: [art] SIG.R = 09B68E5FC66C3B5415DABD4F3253189741298CF008C3CE2BB8E7AAA748D55C44926D620F473DA1E56C428AF2530E4A09
3,454,393 UART: [art] SIG.S = 97F4B2ABA7CDD17BAD3A9D29BADB0BF1265AEB24BFC54110445C800E8717D5548299D47AE84A36DC69BBF454039AA963
3,478,623 UART: Caliptra RT
3,478,968 UART: [state] CFI Enabled
3,587,307 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,640 ready_for_fw is high
1,363,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,986 >>> mbox cmd response: success
2,991,964 UART:
2,991,980 UART: Running Caliptra FMC ...
2,992,388 UART:
2,992,531 UART: [state] CFI Enabled
3,003,192 UART: [fht] FMC Alias Private Key: 7
3,111,145 UART: [art] Extend RT PCRs Done
3,111,573 UART: [art] Lock RT PCRs Done
3,113,153 UART: [art] Populate DV Done
3,121,240 UART: [fht] FMC Alias Private Key: 7
3,122,320 UART: [art] Derive CDI
3,122,600 UART: [art] Store in in slot 0x4
3,208,363 UART: [art] Derive Key Pair
3,208,723 UART: [art] Store priv key in slot 0x5
3,222,003 UART: [art] Derive Key Pair - Done
3,236,679 UART: [art] Signing Cert with AUTHO
3,237,159 UART: RITY.KEYID = 7
3,252,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,354 UART: [art] PUB.X = CE270DBC71ABA66D4119C999596825202E758744716F5355F19091CF83B3028482F70E99B0486BC11ADFA17A6A23CFD2
3,260,113 UART: [art] PUB.Y = 503454C36B0713190DB659EA5E6DCB8023272407D5ABF2F9E96A75308219419C6C7DD1CE446CDE6036614F9C76655D59
3,267,050 UART: [art] SIG.R = A77C893C22125EC7372A9C7CFC9E56E0ABCAEC4AA2C8EA432B13066EAAA7546E6BE1B35DB79265CF907D7EBA71828C63
3,273,837 UART: [art] SIG.S = 575E3F80D8B5CB478C5EFAA71B24B3A51AE1D2AA7D3D6594533F9E823069B27C8F801596920E6EA434F0459238F94C9E
3,297,283 UART: Caliptra RT
3,297,628 UART: [state] CFI Enabled
3,405,437 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [kat] SHA2-256
893,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,789 UART: [kat] ++
897,941 UART: [kat] sha1
902,367 UART: [kat] SHA2-256
904,307 UART: [kat] SHA2-384
907,162 UART: [kat] SHA2-512-ACC
909,063 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,774 UART: [kat] LMS
1,171,102 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,657 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,201,223 UART: [idev] Sha1 KeyId Algorithm
1,209,759 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,731 UART: [ldev] --
1,283,240 UART: [fwproc] Wait for Commands...
1,283,824 UART: [fwproc] Recv command 0x46574c44
1,284,552 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,014 >>> mbox cmd response: success
2,777,250 UART: [afmc] ++
2,777,418 UART: [afmc] CDI.KEYID = 6
2,777,780 UART: [afmc] SUBJECT.KEYID = 7
2,778,205 UART: [afmc] AUTHORITY.KEYID = 5
2,813,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,619 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,535 UART: [afmc] --
2,856,621 UART: [cold-reset] --
2,857,501 UART: [state] Locking Datavault
2,858,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,194 UART: [state] Locking ICCM
2,859,808 UART: [exit] Launching FMC @ 0x40000130
2,865,137 UART:
2,865,153 UART: Running Caliptra FMC ...
2,865,561 UART:
2,865,615 UART: [state] CFI Enabled
2,876,016 UART: [fht] FMC Alias Private Key: 7
2,983,925 UART: [art] Extend RT PCRs Done
2,984,353 UART: [art] Lock RT PCRs Done
2,985,831 UART: [art] Populate DV Done
2,994,036 UART: [fht] FMC Alias Private Key: 7
2,995,096 UART: [art] Derive CDI
2,995,376 UART: [art] Store in in slot 0x4
3,080,887 UART: [art] Derive Key Pair
3,081,247 UART: [art] Store priv key in slot 0x5
3,094,443 UART: [art] Derive Key Pair - Done
3,109,243 UART: [art] Signing Cert with AUTHO
3,109,723 UART: RITY.KEYID = 7
3,125,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,904 UART: [art] PUB.X = CE3EE9C924558B34EA80AC3AA5010372D67AE494D334932A6E95059E1AEF1FE2886A272D2651A4FA7A333557A7C334D2
3,132,669 UART: [art] PUB.Y = 9CC7053FBCEA5E0310AAD3000B980FD3B1FC29B3A9E3ED3068A39C9CE7CDEB5D5A037E818D33327C82F4494AF3A895F6
3,139,600 UART: [art] SIG.R = 386D410ADCBDF062C5CD26B543901AD084FDB5C10470D01C6FC305CC2FDE4B4638D75F0685414E8D3AF1BD808A3AF28E
3,146,374 UART: [art] SIG.S = B282F0532A490EFE73B1C6BA930FA659D0D4C9D0C71BA942A1B8B71DC36CA6F15150801D58496E6A8A887796AF3337A3
3,170,375 UART: Caliptra RT
3,170,628 UART: [state] CFI Enabled
3,278,879 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 ready_for_fw is high
1,059,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,571 >>> mbox cmd response: success
2,689,355 UART:
2,689,371 UART: Running Caliptra FMC ...
2,689,779 UART:
2,689,833 UART: [state] CFI Enabled
2,700,264 UART: [fht] FMC Alias Private Key: 7
2,807,893 UART: [art] Extend RT PCRs Done
2,808,321 UART: [art] Lock RT PCRs Done
2,810,191 UART: [art] Populate DV Done
2,818,390 UART: [fht] FMC Alias Private Key: 7
2,819,480 UART: [art] Derive CDI
2,819,760 UART: [art] Store in in slot 0x4
2,905,561 UART: [art] Derive Key Pair
2,905,921 UART: [art] Store priv key in slot 0x5
2,918,597 UART: [art] Derive Key Pair - Done
2,933,318 UART: [art] Signing Cert with AUTHO
2,933,798 UART: RITY.KEYID = 7
2,948,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,543 UART: [art] PUB.X = C78909F1DAF82B521B6F2ECF262A4CF28E1F5A2CA7E49E48E5B8A1FBA7DD3D4E9599E213AE60D89196E99E1BFFD14E05
2,956,329 UART: [art] PUB.Y = F675A4E6D7595B941AC7A4177557D5AD103B971F7E59858A7D38106DA76839536B884F3C5AAE078B204A239A6557587F
2,963,270 UART: [art] SIG.R = 2B45DA5CDCC38EDF453EF3DE24424C5BF24D67CE70A48D1E41EE84EBC7164BF2E17AE70C54A2A613BA1B9782FBD9A045
2,970,061 UART: [art] SIG.S = 629B9BCFEE59443D5326082422BB757E13662E031127C54AF767A3BA6BADA28B6B8BB321997C76B1B31723678A65965A
2,993,214 UART: Caliptra RT
2,993,467 UART: [state] CFI Enabled
3,100,176 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
893,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,386 UART: [kat] ++
897,538 UART: [kat] sha1
901,604 UART: [kat] SHA2-256
903,544 UART: [kat] SHA2-384
906,313 UART: [kat] SHA2-512-ACC
908,214 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,469 UART: [idev] ++
1,175,637 UART: [idev] CDI.KEYID = 6
1,175,997 UART: [idev] SUBJECT.KEYID = 7
1,176,421 UART: [idev] UDS.KEYID = 0
1,176,766 ready_for_fw is high
1,176,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,495 UART: [idev] Erasing UDS.KEYID = 0
1,201,186 UART: [idev] Sha1 KeyId Algorithm
1,209,774 UART: [idev] --
1,210,842 UART: [ldev] ++
1,211,010 UART: [ldev] CDI.KEYID = 6
1,211,373 UART: [ldev] SUBJECT.KEYID = 5
1,211,799 UART: [ldev] AUTHORITY.KEYID = 7
1,212,262 UART: [ldev] FE.KEYID = 1
1,217,348 UART: [ldev] Erasing FE.KEYID = 1
1,243,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,358 UART: [ldev] --
1,282,751 UART: [fwproc] Wait for Commands...
1,283,347 UART: [fwproc] Recv command 0x46574c44
1,284,075 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,457 >>> mbox cmd response: success
2,777,675 UART: [afmc] ++
2,777,843 UART: [afmc] CDI.KEYID = 6
2,778,205 UART: [afmc] SUBJECT.KEYID = 7
2,778,630 UART: [afmc] AUTHORITY.KEYID = 5
2,813,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,542 UART: [afmc] --
2,857,586 UART: [cold-reset] --
2,858,480 UART: [state] Locking Datavault
2,859,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,383 UART: [state] Locking ICCM
2,860,861 UART: [exit] Launching FMC @ 0x40000130
2,866,190 UART:
2,866,206 UART: Running Caliptra FMC ...
2,866,614 UART:
2,866,757 UART: [state] CFI Enabled
2,877,334 UART: [fht] FMC Alias Private Key: 7
2,985,907 UART: [art] Extend RT PCRs Done
2,986,335 UART: [art] Lock RT PCRs Done
2,987,685 UART: [art] Populate DV Done
2,996,084 UART: [fht] FMC Alias Private Key: 7
2,997,184 UART: [art] Derive CDI
2,997,464 UART: [art] Store in in slot 0x4
3,083,043 UART: [art] Derive Key Pair
3,083,403 UART: [art] Store priv key in slot 0x5
3,096,957 UART: [art] Derive Key Pair - Done
3,111,650 UART: [art] Signing Cert with AUTHO
3,112,130 UART: RITY.KEYID = 7
3,127,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,287 UART: [art] PUB.X = 709908CB1A67EBFDEEE686DED4481F479A32F000802A5F107C1168858C5F444D5F8839C3CCA5D6D47E91847ED3E21729
3,135,036 UART: [art] PUB.Y = 9262EEA9EF1FE070E240F5414150EC7789FE04D14CD6E836D3BDFFB03DA928FCACC657258A919AF87CF5CC2B80368CBF
3,142,003 UART: [art] SIG.R = E0AF24C82A786D3C8BE4406ABBC12CDA9FA28310197CEABCCC6CAB3AB74CE3AEFA50866592150235261EBC2B03E3F04C
3,148,791 UART: [art] SIG.S = E6DE7273978DC4C12E0B5D439B5FE96ED50F6F67CD55A83545DEEBEA65691338796409B5F8EF9C167D2D92CAE3AB34A9
3,172,601 UART: Caliptra RT
3,172,946 UART: [state] CFI Enabled
3,280,068 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,332 ready_for_fw is high
1,061,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,166 >>> mbox cmd response: success
2,690,656 UART:
2,690,672 UART: Running Caliptra FMC ...
2,691,080 UART:
2,691,223 UART: [state] CFI Enabled
2,702,044 UART: [fht] FMC Alias Private Key: 7
2,809,557 UART: [art] Extend RT PCRs Done
2,809,985 UART: [art] Lock RT PCRs Done
2,811,643 UART: [art] Populate DV Done
2,819,838 UART: [fht] FMC Alias Private Key: 7
2,820,966 UART: [art] Derive CDI
2,821,246 UART: [art] Store in in slot 0x4
2,907,011 UART: [art] Derive Key Pair
2,907,371 UART: [art] Store priv key in slot 0x5
2,920,793 UART: [art] Derive Key Pair - Done
2,935,727 UART: [art] Signing Cert with AUTHO
2,936,207 UART: RITY.KEYID = 7
2,951,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,098 UART: [art] PUB.X = 234AD1AA913E549CE5675BB7273EEADAF9A3510612169D2AB1EFFDFB2644CB995AEB89A2DB2D9BBF7DAA47767B4CDB17
2,958,891 UART: [art] PUB.Y = EA764B0F7FD5031D39D520BFBD98778C59B877BA85F20704061A2B1DABA5078668EE69AEF1207CE4263289B9BF188E67
2,965,829 UART: [art] SIG.R = F358004CF62AA5D667A0A38E36C77194C6B1A9AA540C6352E0D54ED75FAE7B154DE0DA0C361632BAFEA751D1787C35C1
2,972,583 UART: [art] SIG.S = 8CC96AF9398EDA4CA880D3974EB7B327D8B2D7672C229539F130E709ED0C72F4CB2EB9DC526FB20143F9FBB6B2BD509B
2,996,909 UART: Caliptra RT
2,997,254 UART: [state] CFI Enabled
3,104,334 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,168,993 UART: [cold-reset] ++
1,169,513 UART: [fht] FHT @ 0x50003400
1,172,293 UART: [idev] ++
1,172,461 UART: [idev] CDI.KEYID = 6
1,172,822 UART: [idev] SUBJECT.KEYID = 7
1,173,247 UART: [idev] UDS.KEYID = 0
1,173,593 ready_for_fw is high
1,173,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,831 UART: [fwproc] Recv command 0x46574c44
1,281,564 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,486 >>> mbox cmd response: success
2,773,625 UART: [afmc] ++
2,773,793 UART: [afmc] CDI.KEYID = 6
2,774,156 UART: [afmc] SUBJECT.KEYID = 7
2,774,582 UART: [afmc] AUTHORITY.KEYID = 5
2,810,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,642 UART: [afmc] --
2,853,640 UART: [cold-reset] --
2,854,532 UART: [state] Locking Datavault
2,855,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,167 UART: [state] Locking ICCM
2,856,617 UART: [exit] Launching FMC @ 0x40000130
2,861,946 UART:
2,861,962 UART: Running Caliptra FMC ...
2,862,370 UART:
2,862,424 UART: [state] CFI Enabled
2,873,057 UART: [fht] FMC Alias Private Key: 7
2,980,930 UART: [art] Extend RT PCRs Done
2,981,358 UART: [art] Lock RT PCRs Done
2,983,180 UART: [art] Populate DV Done
2,991,425 UART: [fht] FMC Alias Private Key: 7
2,992,479 UART: [art] Derive CDI
2,992,759 UART: [art] Store in in slot 0x4
3,077,870 UART: [art] Derive Key Pair
3,078,230 UART: [art] Store priv key in slot 0x5
3,091,354 UART: [art] Derive Key Pair - Done
3,105,912 UART: [art] Signing Cert with AUTHO
3,106,392 UART: RITY.KEYID = 7
3,121,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,381 UART: [art] PUB.X = A3AB3DB9DCD35E4BCC9B1BD70B63795DAB50EC78CA463E6E23E1CA37EFA153C2EE86CBF0FA1DD637F03812A5CC6A8261
3,129,178 UART: [art] PUB.Y = DFF9610C8A90F5795F60E31A9ADEF783A56992EFC8542F3521B8C29E4073C2AC7054A7615F750B652B54893392DE038A
3,136,119 UART: [art] SIG.R = D0B27C6B6926ACF9E8C9B4E19DE6561E98C12F57370FA369172ED4A05F33C6EB66287AACEC288971494FCF68FF0616DA
3,142,895 UART: [art] SIG.S = D6EDACBDC27D8B428AA211EEAA3EE399FD6A3CD1EFFE7571590556112CB94D8F9B37EDE3819F83F43CC74C6F22908BAF
3,167,075 UART: Caliptra RT
3,167,328 UART: [state] CFI Enabled
3,274,446 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,186 ready_for_fw is high
1,056,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,574 >>> mbox cmd response: success
2,685,280 UART:
2,685,296 UART: Running Caliptra FMC ...
2,685,704 UART:
2,685,758 UART: [state] CFI Enabled
2,695,773 UART: [fht] FMC Alias Private Key: 7
2,804,072 UART: [art] Extend RT PCRs Done
2,804,500 UART: [art] Lock RT PCRs Done
2,806,176 UART: [art] Populate DV Done
2,814,403 UART: [fht] FMC Alias Private Key: 7
2,815,467 UART: [art] Derive CDI
2,815,747 UART: [art] Store in in slot 0x4
2,901,674 UART: [art] Derive Key Pair
2,902,034 UART: [art] Store priv key in slot 0x5
2,914,910 UART: [art] Derive Key Pair - Done
2,929,889 UART: [art] Signing Cert with AUTHO
2,930,369 UART: RITY.KEYID = 7
2,945,881 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,646 UART: [art] PUB.X = ABAB0213381D67F61932C113BEA3CCC26E45A3995E5F40C357A18FF05B7A41EA888CF81B55C6468F956F0F21BC1E1577
2,953,418 UART: [art] PUB.Y = CF761811508F97F4373DB2AEB721561469F42F77E66807AFF3EC0D30622D88E9A6F004C1302BF4D35F914D53840E39ED
2,960,356 UART: [art] SIG.R = DE37B6E4A418B1795D83CAF7D872B7865ECFA1449038D54245ADC68E860F1D748B5064AA9592E5A4CB457A6268DF3603
2,967,124 UART: [art] SIG.S = 5467719377C67330EB874299DD255AB44C01454F96493C74571CA88B22047A79ACF26B0844F00DF82346B322DCB95F72
2,991,131 UART: Caliptra RT
2,991,384 UART: [state] CFI Enabled
3,099,683 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
891,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,082 UART: [kat] ++
896,234 UART: [kat] sha1
900,404 UART: [kat] SHA2-256
902,344 UART: [kat] SHA2-384
905,211 UART: [kat] SHA2-512-ACC
907,112 UART: [kat] ECC-384
917,463 UART: [kat] HMAC-384Kdf
921,915 UART: [kat] LMS
1,170,227 UART: [kat] --
1,171,032 UART: [cold-reset] ++
1,171,510 UART: [fht] FHT @ 0x50003400
1,174,220 UART: [idev] ++
1,174,388 UART: [idev] CDI.KEYID = 6
1,174,749 UART: [idev] SUBJECT.KEYID = 7
1,175,174 UART: [idev] UDS.KEYID = 0
1,175,520 ready_for_fw is high
1,175,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,764 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,857 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,223 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,799 >>> mbox cmd response: success
2,777,856 UART: [afmc] ++
2,778,024 UART: [afmc] CDI.KEYID = 6
2,778,387 UART: [afmc] SUBJECT.KEYID = 7
2,778,813 UART: [afmc] AUTHORITY.KEYID = 5
2,814,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,405 UART: [afmc] --
2,858,489 UART: [cold-reset] --
2,859,231 UART: [state] Locking Datavault
2,860,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,984 UART: [state] Locking ICCM
2,861,594 UART: [exit] Launching FMC @ 0x40000130
2,866,923 UART:
2,866,939 UART: Running Caliptra FMC ...
2,867,347 UART:
2,867,490 UART: [state] CFI Enabled
2,878,505 UART: [fht] FMC Alias Private Key: 7
2,986,516 UART: [art] Extend RT PCRs Done
2,986,944 UART: [art] Lock RT PCRs Done
2,988,518 UART: [art] Populate DV Done
2,996,779 UART: [fht] FMC Alias Private Key: 7
2,997,835 UART: [art] Derive CDI
2,998,115 UART: [art] Store in in slot 0x4
3,083,852 UART: [art] Derive Key Pair
3,084,212 UART: [art] Store priv key in slot 0x5
3,098,214 UART: [art] Derive Key Pair - Done
3,112,809 UART: [art] Signing Cert with AUTHO
3,113,289 UART: RITY.KEYID = 7
3,128,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,556 UART: [art] PUB.X = 7B6CFC8C3DABFC7A575B9CD186B645EAD7D3EE6D151D8F6D58E940D9950BE1D7433F8F2D4C8B6D54530478242527DC41
3,136,334 UART: [art] PUB.Y = 5D2F49DECFB4E2059072E205F6DB414E1FD5758870A4741D76D7EFF81A08895E93CB103D76345E237C23F4ADB2733349
3,143,277 UART: [art] SIG.R = 470C824BA4CAE71F43F8540125270042E74DDF8FA38312CED1C4F8604980B0396C9B08AC78C2C4408FCF48E192E375B6
3,150,018 UART: [art] SIG.S = EFB4A9BEFC367B6CCC7EF5360C235EFFD13E681DABEF6B87312789627E0641615EC5EA153F74169A35A78B213E93C9A8
3,174,257 UART: Caliptra RT
3,174,602 UART: [state] CFI Enabled
3,282,203 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,981 ready_for_fw is high
1,055,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,793 >>> mbox cmd response: success
2,686,119 UART:
2,686,135 UART: Running Caliptra FMC ...
2,686,543 UART:
2,686,686 UART: [state] CFI Enabled
2,697,231 UART: [fht] FMC Alias Private Key: 7
2,806,306 UART: [art] Extend RT PCRs Done
2,806,734 UART: [art] Lock RT PCRs Done
2,808,432 UART: [art] Populate DV Done
2,816,509 UART: [fht] FMC Alias Private Key: 7
2,817,485 UART: [art] Derive CDI
2,817,765 UART: [art] Store in in slot 0x4
2,903,296 UART: [art] Derive Key Pair
2,903,656 UART: [art] Store priv key in slot 0x5
2,917,416 UART: [art] Derive Key Pair - Done
2,932,336 UART: [art] Signing Cert with AUTHO
2,932,816 UART: RITY.KEYID = 7
2,948,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,803 UART: [art] PUB.X = 44CB0AB75C7E0EBC6AD2113F008785ADB0FF09EE541ACA9F060947842CB2DA70F3B057E67CDAECCA5B4DE292ACF04C97
2,955,562 UART: [art] PUB.Y = BC2F4DED595B56DF2043D1CDD0F9B393BAEB8BE56D97557FE725B625964D771274DF55D58DDA54BE1918633C92A71529
2,962,522 UART: [art] SIG.R = 1D882DC3B9671674C00522341891D3D753DDBE8907FA46CB7CA85548B23CA23E2C90E942344071692F805E19D1071FBE
2,969,279 UART: [art] SIG.S = 16C6EC1F6DF29AD5AA27CCAF907A0EAE15CE5C3E2253EDF4DC6819933A96B560EB84B82AA8A75F2C98DB8EA5E655FF37
2,993,359 UART: Caliptra RT
2,993,704 UART: [state] CFI Enabled
3,101,029 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,283,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,284,481 UART:
2,284,739 UART: Running Caliptra ROM ...
2,285,821 UART:
2,285,972 UART: [state] CFI Enabled
2,286,862 UART: [state] LifecycleState = Unprovisioned
2,288,523 UART: [state] DebugLocked = No
2,289,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,292,890 UART: [kat] SHA2-256
2,293,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,296,580 UART: [kat] ++
2,297,035 UART: [kat] sha1
2,297,558 UART: [kat] SHA2-256
2,298,215 UART: [kat] SHA2-384
2,298,874 UART: [kat] SHA2-512-ACC
2,299,675 UART: [kat] ECC-384
2,766,498 UART: [kat] HMAC-384Kdf
2,796,494 UART: [kat] LMS
3,986,778 UART: [kat] --
3,989,981 UART: [cold-reset] ++
3,991,763 UART: [fht] Storing FHT @ 0x50003400
4,003,148 UART: [idev] ++
4,003,760 UART: [idev] CDI.KEYID = 6
4,004,687 UART: [idev] SUBJECT.KEYID = 7
4,005,908 UART: [idev] UDS.KEYID = 0
4,030,855 UART: [idev] Erasing UDS.KEYID = 0
7,343,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,695 UART: [idev] --
7,368,111 UART: [ldev] ++
7,368,697 UART: [ldev] CDI.KEYID = 6
7,369,637 UART: [ldev] SUBJECT.KEYID = 5
7,370,765 UART: [ldev] AUTHORITY.KEYID = 7
7,372,099 UART: [ldev] FE.KEYID = 1
7,417,892 UART: [ldev] Erasing FE.KEYID = 1
10,752,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,861 UART: [ldev] --
13,132,332 UART: [fwproc] Waiting for Commands...
13,134,380 UART: [fwproc] Received command 0x4d454153
13,143,292 >>> mbox cmd response data (12 bytes)
13,145,679 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
13,245,339 UART: [fwproc] Received command 0x46574c44
13,247,601 UART: [fwproc] Received Image of size 78740 bytes
16,868,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,943,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,012,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,205,822 >>> mbox cmd response: success
17,210,225 UART: [afmc] ++
17,210,863 UART: [afmc] CDI.KEYID = 6
17,211,750 UART: [afmc] SUBJECT.KEYID = 7
17,213,024 UART: [afmc] AUTHORITY.KEYID = 5
20,576,958 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,876,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,878,411 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,892,802 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,907,635 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,922,106 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,943,557 UART: [afmc] --
22,948,024 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,948,381 UART: [cold-reset] --
22,952,496 UART: [state] Locking Datavault
22,957,864 UART: [state] Locking PCR0, PCR1 and PCR31
22,959,606 UART: [state] Locking ICCM
22,961,979 UART: [exit] Launching FMC @ 0x40000130
22,970,335 UART:
22,970,567 UART: Running Caliptra FMC ...
22,971,594 UART:
22,971,740 UART: [state] CFI Enabled
23,036,394 UART: [fht] FMC Alias Private Key: 7
25,374,972 UART: [art] Extend RT PCRs Done
25,376,191 UART: [art] Lock RT PCRs Done
25,377,642 UART: [art] Populate DV Done
25,383,106 UART: [fht] FMC Alias Private Key: 7
25,384,692 UART: [art] Derive CDI
25,385,431 UART: [art] Store in in slot 0x4
25,444,869 UART: [art] Derive Key Pair
25,445,907 UART: [art] Store priv key in slot 0x5
28,739,275 UART: [art] Derive Key Pair - Done
28,752,267 UART: [art] Signing Cert with AUTHO
28,753,575 UART: RITY.KEYID = 7
31,040,221 UART: [art] Erasing AUTHORITY.KEYID = 7
31,041,729 UART: [art] PUB.X = C8BEE97567D159BFF239D1C323DD019145D076258E5349727504FD98CB5E0538B346848B1DDC85E9A8313509A6E148BE
31,048,941 UART: [art] PUB.Y = 4150B838C75C54114B3813300C3E110FDC071A51AD9D908039AAA15E22A01E2291E19050DBCC1380651C43E70D6458EB
31,056,181 UART: [art] SIG.R = B88923C166A53E5E25C92A25B728B6EBDDF3DB0ACB9D21E640B085FE2AB0C9FA8AC550107A128BFAFC0826244EF712DE
31,063,594 UART: [art] SIG.S = 1B8A9630A23F53BA95595DADE3D8C2755A175E210FFD056978C4B3C8A03277C45F9742531D7E382F7AFF004CFF6F1B72
32,368,203 UART: mbox::rt_entry...
32,369,174 UART: ____ _ _ _ ____ _____
32,371,130 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,373,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,374,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,376,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,378,780 UART: |_|
32,379,659 UART:
32,506,045 UART: [rt] Runtime listening for mailbox commands...
32,508,158 >>> mbox cmd response data (48 bytes)
32,508,676 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,510,998 >>> mbox cmd response data (48 bytes)
32,511,872 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,525,710 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
2,282,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,870,451 >>> mbox cmd response data (12 bytes)
12,873,051 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,289,146 >>> mbox cmd response: success
22,978,177 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,994,064 UART:
22,994,396 UART: Running Caliptra FMC ...
22,995,566 UART:
22,995,762 UART: [state] CFI Enabled
23,061,763 UART: [fht] FMC Alias Private Key: 7
25,399,634 UART: [art] Extend RT PCRs Done
25,400,859 UART: [art] Lock RT PCRs Done
25,402,707 UART: [art] Populate DV Done
25,408,059 UART: [fht] FMC Alias Private Key: 7
25,409,662 UART: [art] Derive CDI
25,410,481 UART: [art] Store in in slot 0x4
25,470,701 UART: [art] Derive Key Pair
25,471,765 UART: [art] Store priv key in slot 0x5
28,764,609 UART: [art] Derive Key Pair - Done
28,777,714 UART: [art] Signing Cert with AUTHO
28,779,049 UART: RITY.KEYID = 7
31,067,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,068,671 UART: [art] PUB.X = 45E539694069D41E68A4F838603DDA87ED0A2DE227935A5686B22DEA3575AAA33813DB29828E474B371ADF057B1DB832
31,075,927 UART: [art] PUB.Y = 8C205DDE3E83D77EB0C31DF43F24628888D28A6520D670B15B5952DD5C6AC29F5770D56834FC107ACAFB9765256CD979
31,083,187 UART: [art] SIG.R = D1D4F6CEFB38B43E48FE0421C3FDC85D4BE9F8D64291565C1B713F9D9DFB4D750E38BFCB475D1A7EAAA999D4C6461F8E
31,090,567 UART: [art] SIG.S = CF324EE0919E5D659710A5991F5E8A4F35AFB2C14D0F6BB41C01DF176A3515CC67D64BE3FF5744D6A63B9ED64B6E3F50
32,394,825 UART: mbox::rt_entry...
32,395,795 UART: ____ _ _ _ ____ _____
32,397,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,399,741 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,401,599 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,403,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,405,642 UART: |_|
32,406,458 UART:
32,530,880 UART: [rt] Runtime listening for mailbox commands...
32,533,026 >>> mbox cmd response data (48 bytes)
32,533,570 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,535,898 >>> mbox cmd response data (48 bytes)
32,536,762 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,550,646 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
2,212,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,535 UART:
2,213,792 UART: Running Caliptra ROM ...
2,214,862 UART:
2,215,004 UART: [state] CFI Enabled
2,215,899 UART: [state] LifecycleState = Unprovisioned
2,217,481 UART: [state] DebugLocked = No
2,218,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,221,930 UART: [kat] SHA2-256
2,222,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,225,597 UART: [kat] ++
2,226,042 UART: [kat] sha1
2,226,551 UART: [kat] SHA2-256
2,227,281 UART: [kat] SHA2-384
2,227,941 UART: [kat] SHA2-512-ACC
2,228,748 UART: [kat] ECC-384
3,113,436 UART: [kat] HMAC-384Kdf
3,124,860 UART: [kat] LMS
4,315,013 UART: [kat] --
4,318,621 UART: [cold-reset] ++
4,320,720 UART: [fht] Storing FHT @ 0x50003400
4,332,576 UART: [idev] ++
4,333,138 UART: [idev] CDI.KEYID = 6
4,334,176 UART: [idev] SUBJECT.KEYID = 7
4,335,333 UART: [idev] UDS.KEYID = 0
4,349,820 UART: [idev] Erasing UDS.KEYID = 0
7,620,539 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,439 UART: [idev] --
7,647,684 UART: [ldev] ++
7,648,286 UART: [ldev] CDI.KEYID = 6
7,649,303 UART: [ldev] SUBJECT.KEYID = 5
7,650,458 UART: [ldev] AUTHORITY.KEYID = 7
7,651,684 UART: [ldev] FE.KEYID = 1
7,664,704 UART: [ldev] Erasing FE.KEYID = 1
10,951,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,678 UART: [ldev] --
13,310,808 UART: [fwproc] Waiting for Commands...
13,313,496 UART: [fwproc] Received command 0x4d454153
13,322,384 >>> mbox cmd response data (12 bytes)
13,325,097 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
13,424,560 UART: [fwproc] Received command 0x46574c44
13,426,825 UART: [fwproc] Received Image of size 78740 bytes
17,045,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,119,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,188,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,381,636 >>> mbox cmd response: success
17,385,733 UART: [afmc] ++
17,386,319 UART: [afmc] CDI.KEYID = 6
17,387,197 UART: [afmc] SUBJECT.KEYID = 7
17,388,460 UART: [afmc] AUTHORITY.KEYID = 5
20,701,297 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,999,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,001,737 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,016,138 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,030,983 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,045,432 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,066,796 UART: [afmc] --
23,070,931 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,071,289 UART: [cold-reset] --
23,074,049 UART: [state] Locking Datavault
23,081,449 UART: [state] Locking PCR0, PCR1 and PCR31
23,083,203 UART: [state] Locking ICCM
23,085,244 UART: [exit] Launching FMC @ 0x40000130
23,093,634 UART:
23,093,880 UART: Running Caliptra FMC ...
23,094,914 UART:
23,095,054 UART: [state] CFI Enabled
23,102,802 UART: [fht] FMC Alias Private Key: 7
25,432,931 UART: [art] Extend RT PCRs Done
25,434,145 UART: [art] Lock RT PCRs Done
25,435,684 UART: [art] Populate DV Done
25,441,305 UART: [fht] FMC Alias Private Key: 7
25,443,054 UART: [art] Derive CDI
25,443,790 UART: [art] Store in in slot 0x4
25,486,266 UART: [art] Derive Key Pair
25,487,299 UART: [art] Store priv key in slot 0x5
28,728,911 UART: [art] Derive Key Pair - Done
28,742,390 UART: [art] Signing Cert with AUTHO
28,743,690 UART: RITY.KEYID = 7
31,023,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,024,736 UART: [art] PUB.X = B035991818E354B675DB43951AD0888B28A2A60F159EC2F141AA8210652F1DFA34261F24B2FAA62F6D146D4C0B689347
31,031,927 UART: [art] PUB.Y = 3700870F9300A5497CE4F05D880B7A7A8F32520128C22561FF385E410450ECC383EE11ABD3C3648FC9FEBBB03F74CBF3
31,039,149 UART: [art] SIG.R = 8F587D8F152D7301105C454CA6A1A7D305511A4CA1B1839A61387553E67C9BE51E2073A8ED38FA7A18E43DB4D9648A3D
31,046,559 UART: [art] SIG.S = DE7851D4D92A70A1503D30C7545B9AEC262573A0DEBDE5D599A3466B458F921C5C2048C1E341ED306C078C315B46CEF6
32,350,626 UART: mbox::rt_entry...
32,351,575 UART: ____ _ _ _ ____ _____
32,353,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,355,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,357,344 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,359,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,361,148 UART: |_|
32,362,027 UART:
32,487,374 UART: [rt] Runtime listening for mailbox commands...
32,489,539 >>> mbox cmd response data (48 bytes)
32,490,077 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,492,395 >>> mbox cmd response data (48 bytes)
32,493,284 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,507,128 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,215,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,051,732 >>> mbox cmd response data (12 bytes)
13,054,736 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,476,485 >>> mbox cmd response: success
23,103,825 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,116,314 UART:
23,116,666 UART: Running Caliptra FMC ...
23,117,757 UART:
23,117,904 UART: [state] CFI Enabled
23,125,755 UART: [fht] FMC Alias Private Key: 7
25,456,342 UART: [art] Extend RT PCRs Done
25,457,567 UART: [art] Lock RT PCRs Done
25,459,326 UART: [art] Populate DV Done
25,464,723 UART: [fht] FMC Alias Private Key: 7
25,466,313 UART: [art] Derive CDI
25,467,122 UART: [art] Store in in slot 0x4
25,509,627 UART: [art] Derive Key Pair
25,510,834 UART: [art] Store priv key in slot 0x5
28,752,846 UART: [art] Derive Key Pair - Done
28,765,628 UART: [art] Signing Cert with AUTHO
28,766,928 UART: RITY.KEYID = 7
31,046,357 UART: [art] Erasing AUTHORITY.KEYID = 7
31,047,868 UART: [art] PUB.X = 26A01593774D9BDCBAC358732D6D6E3D5FC2C9B754F2B85A0D6BC0EC163460370B8BFE91377944E9EFE6CC40320C6F66
31,055,120 UART: [art] PUB.Y = 659D32D1EEF8C6C140255A379037D697369518B52408A0DF9AEE145D180E4A513DCC80AFF3E103460EB319215424893A
31,062,352 UART: [art] SIG.R = F5185621DCB0DF3EC0087D2023649F7EF199F51EF93763F7ECCCFF6A10B4472A1DA0278C8F5517F32D4C505D318D0B61
31,069,686 UART: [art] SIG.S = D9D40FDB30774935BF8E5681EC7262491D81868033A9DC10245E92AAA6D6ED84837EFE85B851F6265D78F9A33FAE9D99
32,374,140 UART: mbox::rt_entry...
32,375,084 UART: ____ _ _ _ ____ _____
32,377,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,379,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,380,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,382,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,384,931 UART: |_|
32,385,733 UART:
32,510,064 UART: [rt] Runtime listening for mailbox commands...
32,512,179 >>> mbox cmd response data (48 bytes)
32,512,744 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,515,094 >>> mbox cmd response data (48 bytes)
32,515,973 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,529,847 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,214,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,430 UART:
2,216,694 UART: Running Caliptra ROM ...
2,217,770 UART:
2,217,923 UART: [state] CFI Enabled
2,218,815 UART: [state] LifecycleState = Unprovisioned
2,220,487 UART: [state] DebugLocked = No
2,221,514 UART: [state] WD Timer not started. Device not locked for debugging
2,223,979 UART: [kat] SHA2-256
2,224,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,645 UART: [kat] ++
2,228,096 UART: [kat] sha1
2,228,613 UART: [kat] SHA2-256
2,229,269 UART: [kat] SHA2-384
2,229,923 UART: [kat] SHA2-512-ACC
2,230,724 UART: [kat] ECC-384
2,950,559 UART: [kat] HMAC-384Kdf
2,971,533 UART: [kat] LMS
3,500,994 UART: [kat] --
3,507,313 UART: [cold-reset] ++
3,509,132 UART: [fht] FHT @ 0x50003400
3,519,950 UART: [idev] ++
3,520,510 UART: [idev] CDI.KEYID = 6
3,521,581 UART: [idev] SUBJECT.KEYID = 7
3,522,687 UART: [idev] UDS.KEYID = 0
3,544,458 UART: [idev] Erasing UDS.KEYID = 0
6,027,220 UART: [idev] Sha1 KeyId Algorithm
6,050,454 UART: [idev] --
6,053,598 UART: [ldev] ++
6,054,170 UART: [ldev] CDI.KEYID = 6
6,055,234 UART: [ldev] SUBJECT.KEYID = 5
6,056,343 UART: [ldev] AUTHORITY.KEYID = 7
6,057,539 UART: [ldev] FE.KEYID = 1
6,099,365 UART: [ldev] Erasing FE.KEYID = 1
8,604,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,601 UART: [ldev] --
10,414,080 UART: [fwproc] Wait for Commands...
10,416,127 UART: [fwproc] Recv command 0x4d454153
10,424,646 >>> mbox cmd response data (12 bytes)
10,427,481 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,526,952 UART: [fwproc] Recv command 0x46574c44
10,529,068 UART: [fwproc] Recv'd Img size: 78704 bytes
13,492,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,566,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,635,200 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,828,784 >>> mbox cmd response: success
13,833,448 UART: [afmc] ++
13,834,032 UART: [afmc] CDI.KEYID = 6
13,834,945 UART: [afmc] SUBJECT.KEYID = 7
13,836,099 UART: [afmc] AUTHORITY.KEYID = 5
16,364,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,106,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,108,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,124,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,140,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,155,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,177,984 UART: [afmc] --
18,181,909 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,182,281 UART: [cold-reset] --
18,185,745 UART: [state] Locking Datavault
18,190,962 UART: [state] Locking PCR0, PCR1 and PCR31
18,192,610 UART: [state] Locking ICCM
18,194,680 UART: [exit] Launching FMC @ 0x40000130
18,203,126 UART:
18,203,364 UART: Running Caliptra FMC ...
18,204,462 UART:
18,204,624 UART: [state] CFI Enabled
18,264,534 UART: [fht] FMC Alias Private Key: 7
20,028,243 UART: [art] Extend RT PCRs Done
20,029,463 UART: [art] Lock RT PCRs Done
20,031,523 UART: [art] Populate DV Done
20,036,880 UART: [fht] FMC Alias Private Key: 7
20,038,524 UART: [art] Derive CDI
20,039,335 UART: [art] Store in in slot 0x4
20,097,324 UART: [art] Derive Key Pair
20,098,361 UART: [art] Store priv key in slot 0x5
22,561,553 UART: [art] Derive Key Pair - Done
22,574,603 UART: [art] Signing Cert with AUTHO
22,575,903 UART: RITY.KEYID = 7
24,287,586 UART: [art] Erasing AUTHORITY.KEYID = 7
24,289,061 UART: [art] PUB.X = A881C0B791648F66771AF8CB91F2DDE0349D649C3BDE385029BCCE2D5BFECAEA2357FB3328885DF0DFCC7128ED55A728
24,296,353 UART: [art] PUB.Y = 5C463732002EEBFD7FA384C8E2BB5CFE1C8EE06B6461A83FBFA8E73CA2D3C3FA4478A3CE9EEA4DEF42F3A99F77736816
24,303,695 UART: [art] SIG.R = 7D717F02A75757C8638D54A19389F48EA4AFC920AF734ED4B5432030D954B112F8E523D94A4810A6F69F1266E7475718
24,311,023 UART: [art] SIG.S = 342CD276356DEB40919F8AC605E13DCD8730B3357951360E0A8BFD3DBCF7BD86464A94CF87AD3464D5295E004F6ADB18
25,289,548 UART: mbox::rt_entry...
25,290,518 UART: ____ _ _ _ ____ _____
25,292,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,294,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,296,423 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,298,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,300,497 UART: |_|
25,301,304 UART:
25,425,687 UART: [rt] Runtime listening for mailbox commands...
25,427,850 >>> mbox cmd response data (48 bytes)
25,428,391 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,430,718 >>> mbox cmd response data (48 bytes)
25,431,607 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,445,510 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,013 writing to cptra_bootfsm_go
2,235,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,183,784 >>> mbox cmd response data (12 bytes)
10,185,988 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,586,541 >>> mbox cmd response: success
17,860,025 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,876,404 UART:
17,876,733 UART: Running Caliptra FMC ...
17,877,815 UART:
17,877,965 UART: [state] CFI Enabled
17,944,531 UART: [fht] FMC Alias Private Key: 7
19,708,007 UART: [art] Extend RT PCRs Done
19,709,234 UART: [art] Lock RT PCRs Done
19,710,779 UART: [art] Populate DV Done
19,716,351 UART: [fht] FMC Alias Private Key: 7
19,718,046 UART: [art] Derive CDI
19,718,786 UART: [art] Store in in slot 0x4
19,777,540 UART: [art] Derive Key Pair
19,778,581 UART: [art] Store priv key in slot 0x5
22,242,016 UART: [art] Derive Key Pair - Done
22,255,289 UART: [art] Signing Cert with AUTHO
22,256,590 UART: RITY.KEYID = 7
23,967,741 UART: [art] Erasing AUTHORITY.KEYID = 7
23,969,244 UART: [art] PUB.X = A543FC4D5293DF1532BB8695525729203187F538205F665E9A23A487E883C7757514D89920CD4CF56909BE4055026AFB
23,976,502 UART: [art] PUB.Y = 0892CA92C15395596CE773B40B3006B158CAF6B13A9BEE8487B47EE1F19C3C5372DF4863D0D69A8EE5C1B9EEBE2618D1
23,983,745 UART: [art] SIG.R = 2C19EEE989CE47067EDB8AA838EBB37317852BC1228A0D44864CEB392D83306D4A46676A23F571502F407E2B3E7CFCA6
23,991,141 UART: [art] SIG.S = 8CBD136E46DB940FE9E3ADD2689353B6EA6323157B3ED2CA01B8C91B8BDB46E34B5BBF3F504B31F5D6A5752DCFF07A3D
24,969,988 UART: mbox::rt_entry...
24,970,951 UART: ____ _ _ _ ____ _____
24,972,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,974,891 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,976,825 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,978,812 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,980,743 UART: |_|
24,981,727 UART:
25,106,102 UART: [rt] Runtime listening for mailbox commands...
25,108,262 >>> mbox cmd response data (48 bytes)
25,108,819 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,111,143 >>> mbox cmd response data (48 bytes)
25,112,041 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,125,911 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,213,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,214,719 UART:
2,214,969 UART: Running Caliptra ROM ...
2,216,064 UART:
2,216,213 UART: [state] CFI Enabled
2,217,103 UART: [state] LifecycleState = Unprovisioned
2,218,778 UART: [state] DebugLocked = No
2,219,899 UART: [state] WD Timer not started. Device not locked for debugging
2,222,374 UART: [kat] SHA2-256
2,223,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,226,047 UART: [kat] ++
2,226,544 UART: [kat] sha1
2,227,052 UART: [kat] SHA2-256
2,227,704 UART: [kat] SHA2-384
2,228,349 UART: [kat] SHA2-512-ACC
2,229,174 UART: [kat] ECC-384
3,276,170 UART: [kat] HMAC-384Kdf
3,288,776 UART: [kat] LMS
3,818,305 UART: [kat] --
3,822,523 UART: [cold-reset] ++
3,823,533 UART: [fht] FHT @ 0x50003400
3,834,781 UART: [idev] ++
3,835,361 UART: [idev] CDI.KEYID = 6
3,836,375 UART: [idev] SUBJECT.KEYID = 7
3,837,472 UART: [idev] UDS.KEYID = 0
3,853,021 UART: [idev] Erasing UDS.KEYID = 0
6,309,781 UART: [idev] Sha1 KeyId Algorithm
6,331,439 UART: [idev] --
6,334,598 UART: [ldev] ++
6,335,174 UART: [ldev] CDI.KEYID = 6
6,336,078 UART: [ldev] SUBJECT.KEYID = 5
6,337,288 UART: [ldev] AUTHORITY.KEYID = 7
6,338,510 UART: [ldev] FE.KEYID = 1
6,350,230 UART: [ldev] Erasing FE.KEYID = 1
8,826,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,591 UART: [ldev] --
10,614,987 UART: [fwproc] Wait for Commands...
10,617,242 UART: [fwproc] Recv command 0x4d454153
10,625,767 >>> mbox cmd response data (12 bytes)
10,628,514 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,727,764 UART: [fwproc] Recv command 0x46574c44
10,729,936 UART: [fwproc] Recv'd Img size: 78704 bytes
13,698,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,772,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,841,245 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,034,918 >>> mbox cmd response: success
14,038,783 UART: [afmc] ++
14,039,370 UART: [afmc] CDI.KEYID = 6
14,040,254 UART: [afmc] SUBJECT.KEYID = 7
14,041,467 UART: [afmc] AUTHORITY.KEYID = 5
16,541,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,262,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,264,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,280,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,296,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,311,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,334,467 UART: [afmc] --
18,339,024 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,339,390 UART: [cold-reset] --
18,343,609 UART: [state] Locking Datavault
18,348,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,350,275 UART: [state] Locking ICCM
18,352,961 UART: [exit] Launching FMC @ 0x40000130
18,361,352 UART:
18,361,591 UART: Running Caliptra FMC ...
18,362,685 UART:
18,362,857 UART: [state] CFI Enabled
18,370,738 UART: [fht] FMC Alias Private Key: 7
20,127,459 UART: [art] Extend RT PCRs Done
20,128,680 UART: [art] Lock RT PCRs Done
20,130,481 UART: [art] Populate DV Done
20,136,099 UART: [fht] FMC Alias Private Key: 7
20,137,736 UART: [art] Derive CDI
20,138,462 UART: [art] Store in in slot 0x4
20,181,318 UART: [art] Derive Key Pair
20,182,355 UART: [art] Store priv key in slot 0x5
22,608,676 UART: [art] Derive Key Pair - Done
22,621,839 UART: [art] Signing Cert with AUTHO
22,623,144 UART: RITY.KEYID = 7
24,328,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,329,858 UART: [art] PUB.X = 55F5D967BA7984D799412949FDCCBF904649C932A83B5B8F14F93D9DFC447D0AAB1F115F21317C6976932BDB4C87DAE0
24,337,119 UART: [art] PUB.Y = B315A9A6CD8601B9EF8A7FFEF334C429F6AD2D5E413D5F9680E5B67753D2EFC6E5E0687C84A6A253C79BA3D42CCD060F
24,344,425 UART: [art] SIG.R = DD1BA1CA8CC59BD6E6C946E282F4FDAF4ECA35220FD1D5E58AA1BC481878906C282EACCB8824FDE2ED65DAC2BC3419D3
24,351,859 UART: [art] SIG.S = 2CA9B219300CD84B8DB6A9DCCC430E1A3CEF19FBBF990C8657C46651117624E8AC326E18F291D8D1AAC9E0FB155F2CFB
25,330,894 UART: mbox::rt_entry...
25,331,843 UART: ____ _ _ _ ____ _____
25,333,765 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,335,760 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,337,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,339,597 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,341,515 UART: |_|
25,342,500 UART:
25,466,281 UART: [rt] Runtime listening for mailbox commands...
25,468,440 >>> mbox cmd response data (48 bytes)
25,468,989 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,471,307 >>> mbox cmd response data (48 bytes)
25,472,181 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,486,071 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
2,206,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,407,464 >>> mbox cmd response data (12 bytes)
10,409,701 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,808,110 >>> mbox cmd response: success
18,044,254 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,061,903 UART:
18,062,257 UART: Running Caliptra FMC ...
18,063,459 UART:
18,063,619 UART: [state] CFI Enabled
18,071,595 UART: [fht] FMC Alias Private Key: 7
19,828,995 UART: [art] Extend RT PCRs Done
19,830,217 UART: [art] Lock RT PCRs Done
19,831,859 UART: [art] Populate DV Done
19,837,484 UART: [fht] FMC Alias Private Key: 7
19,839,018 UART: [art] Derive CDI
19,839,775 UART: [art] Store in in slot 0x4
19,882,681 UART: [art] Derive Key Pair
19,883,672 UART: [art] Store priv key in slot 0x5
22,309,840 UART: [art] Derive Key Pair - Done
22,323,053 UART: [art] Signing Cert with AUTHO
22,324,371 UART: RITY.KEYID = 7
24,030,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,031,704 UART: [art] PUB.X = 2C82D8D8E23B7228CC07C890183A5190291FCB67B7A8E462B14F2A6519B830E492B4612C7CF0810934820D4DC8617DBC
24,038,943 UART: [art] PUB.Y = DC950CD4A941C31ECA60CB4E00136896A200B9D4F8519C02A17C667C29AE20C87FDA3630D6311B654A80A24348BCF5CF
24,046,182 UART: [art] SIG.R = 6FB69484B6D8B2D514EEB70B9AF36821E2BAFCBDAD2F7CAD47CBC6A7C30E05ACE3CAEE316D86FB0429119A985F51462E
24,053,626 UART: [art] SIG.S = 9984FDC6A61C1805643012BA620AB462BCBD8BD63DF54379D3F6D8F58899405BFB298F1856A2C7C0B88AF376874D1F38
25,032,065 UART: mbox::rt_entry...
25,033,028 UART: ____ _ _ _ ____ _____
25,035,013 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,037,019 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,038,951 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,040,944 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,042,796 UART: |_|
25,043,621 UART:
25,169,057 UART: [rt] Runtime listening for mailbox commands...
25,171,171 >>> mbox cmd response data (48 bytes)
25,171,783 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,174,110 >>> mbox cmd response data (48 bytes)
25,175,003 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,188,867 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
2,205,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,207,194 UART:
2,207,462 UART: Running Caliptra ROM ...
2,208,541 UART:
2,208,696 UART: [state] CFI Enabled
2,209,700 UART: [state] LifecycleState = Unprovisioned
2,211,609 UART: [state] DebugLocked = No
2,212,735 UART: [state] WD Timer not started. Device not locked for debugging
2,215,237 UART: [kat] SHA2-256
2,215,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,218,924 UART: [kat] ++
2,219,373 UART: [kat] sha1
2,219,883 UART: [kat] SHA2-256
2,220,540 UART: [kat] SHA2-384
2,221,201 UART: [kat] SHA2-512-ACC
2,222,084 UART: [kat] ECC-384
2,946,501 UART: [kat] HMAC-384Kdf
2,970,217 UART: [kat] LMS
3,502,027 UART: [kat] --
3,506,847 UART: [cold-reset] ++
3,509,428 UART: [fht] FHT @ 0x50003400
3,520,896 UART: [idev] ++
3,521,632 UART: [idev] CDI.KEYID = 6
3,522,546 UART: [idev] SUBJECT.KEYID = 7
3,523,781 UART: [idev] UDS.KEYID = 0
3,543,166 UART: [idev] Erasing UDS.KEYID = 0
6,026,063 UART: [idev] Sha1 KeyId Algorithm
6,048,189 UART: [idev] --
6,051,985 UART: [ldev] ++
6,052,602 UART: [ldev] CDI.KEYID = 6
6,053,524 UART: [ldev] SUBJECT.KEYID = 5
6,054,638 UART: [ldev] AUTHORITY.KEYID = 7
6,055,872 UART: [ldev] FE.KEYID = 1
6,097,311 UART: [ldev] Erasing FE.KEYID = 1
8,605,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,956 UART: [ldev] --
10,411,732 UART: [fwproc] Wait for Commands...
10,414,858 UART: [fwproc] Recv command 0x4d454153
10,424,580 >>> mbox cmd response data (12 bytes)
10,427,193 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,526,602 UART: [fwproc] Recv command 0x46574c44
10,528,609 UART: [fwproc] Recv'd Img size: 78704 bytes
13,541,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,617,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,733,298 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,062,029 >>> mbox cmd response: success
14,065,715 UART: [afmc] ++
14,066,418 UART: [afmc] CDI.KEYID = 6
14,067,665 UART: [afmc] SUBJECT.KEYID = 7
14,069,108 UART: [afmc] AUTHORITY.KEYID = 5
16,614,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,337,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,339,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,354,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,370,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,385,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,408,833 UART: [afmc] --
18,412,432 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,412,798 UART: [cold-reset] --
18,417,173 UART: [state] Locking Datavault
18,422,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,424,610 UART: [state] Locking ICCM
18,426,848 UART: [exit] Launching FMC @ 0x40000130
18,435,517 UART:
18,435,749 UART: Running Caliptra FMC ...
18,436,847 UART:
18,437,005 UART: [state] CFI Enabled
18,495,780 UART: [fht] FMC Alias Private Key: 7
20,259,752 UART: [art] Extend RT PCRs Done
20,260,964 UART: [art] Lock RT PCRs Done
20,262,540 UART: [art] Populate DV Done
20,268,007 UART: [fht] FMC Alias Private Key: 7
20,269,600 UART: [art] Derive CDI
20,270,415 UART: [art] Store in in slot 0x4
20,328,672 UART: [art] Derive Key Pair
20,329,713 UART: [art] Store priv key in slot 0x5
22,792,183 UART: [art] Derive Key Pair - Done
22,805,008 UART: [art] Signing Cert with AUTHO
22,806,310 UART: RITY.KEYID = 7
24,518,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,520,167 UART: [art] PUB.X = 3CEB41778CCEB103D713D77FBED37C7974A4A1D9F91955575D457853543C28057002BB584809A5D7BCFF957A24A3985F
24,527,408 UART: [art] PUB.Y = 77CA1ED37F0DD07013FCECFD23B1FD4ED7C57AE15ECE88A26936BEC70528616B87C78D82A709BAF63D617BC054F62C56
24,534,675 UART: [art] SIG.R = 059F640223FCE79CE9D1F4ED0B19A8E5EA37B7DB1D7A455E6C10356A92F4F017970DDCAA49D1CBD998F47F90D5C66DF2
24,542,127 UART: [art] SIG.S = 5878A99AFF8B5F0705C2238721DBB1AD5C293B11D14CD9C4EB3A54C9D0120863BA5286BF2DB59E960263D90B5F3F0D7B
25,521,019 UART: mbox::rt_entry...
25,521,971 UART: ____ _ _ _ ____ _____
25,523,950 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,525,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,527,878 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,529,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,531,729 UART: |_|
25,532,539 UART:
25,657,221 UART: [rt] Runtime listening for mailbox commands...
25,659,328 >>> mbox cmd response data (48 bytes)
25,659,878 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,662,230 >>> mbox cmd response data (48 bytes)
25,663,116 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,677,045 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,210,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,266,983 >>> mbox cmd response data (12 bytes)
10,270,041 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,088,235 >>> mbox cmd response: success
18,368,126 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,382,433 UART:
18,382,753 UART: Running Caliptra FMC ...
18,383,938 UART:
18,384,110 UART: [state] CFI Enabled
18,450,999 UART: [fht] FMC Alias Private Key: 7
20,215,813 UART: [art] Extend RT PCRs Done
20,217,021 UART: [art] Lock RT PCRs Done
20,218,433 UART: [art] Populate DV Done
20,223,895 UART: [fht] FMC Alias Private Key: 7
20,225,565 UART: [art] Derive CDI
20,226,385 UART: [art] Store in in slot 0x4
20,284,015 UART: [art] Derive Key Pair
20,285,034 UART: [art] Store priv key in slot 0x5
22,747,849 UART: [art] Derive Key Pair - Done
22,760,571 UART: [art] Signing Cert with AUTHO
22,761,875 UART: RITY.KEYID = 7
24,473,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,055 UART: [art] PUB.X = D3941144547F2CE559787CD94767B7587F2E611E5CEB5FDEB13423C8E7E8854FAC6441567EFBD49B8448C77FD481385B
24,482,325 UART: [art] PUB.Y = 440246145CF751F8BF2CC3001E6E7D38B7BB468A7FC7A30957B93E5A73094D4931E5CF5AAAC8F934F51E8253EB48D5AB
24,489,607 UART: [art] SIG.R = 8B13C2CF83A6CEAE4DC151365D1BC2BFBC4ACE76AEC2F72A48EA53D30794D7F5A8C638EFE4D4B7781CED0E44E3B95FCA
24,496,995 UART: [art] SIG.S = 1CFFAB16B791CC6F8ED1B778F1959C04D877E53A857FB0AB756E1E23FB8AC8CEA03F14E70959FB26ADD0C16BC47AAF4E
25,475,605 UART: mbox::rt_entry...
25,476,552 UART: ____ _ _ _ ____ _____
25,478,525 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,480,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,482,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,484,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,486,377 UART: |_|
25,487,188 UART:
25,610,761 UART: [rt] Runtime listening for mailbox commands...
25,612,927 >>> mbox cmd response data (48 bytes)
25,613,522 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,615,850 >>> mbox cmd response data (48 bytes)
25,616,733 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,630,653 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,213,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,214,855 UART:
2,215,109 UART: Running Caliptra ROM ...
2,216,167 UART:
2,216,305 UART: [state] CFI Enabled
2,217,182 UART: [state] LifecycleState = Unprovisioned
2,218,839 UART: [state] DebugLocked = No
2,219,954 UART: [state] WD Timer not started. Device not locked for debugging
2,222,418 UART: [kat] SHA2-256
2,223,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,226,110 UART: [kat] ++
2,226,555 UART: [kat] sha1
2,227,054 UART: [kat] SHA2-256
2,227,703 UART: [kat] SHA2-384
2,228,350 UART: [kat] SHA2-512-ACC
2,229,230 UART: [kat] ECC-384
3,288,683 UART: [kat] HMAC-384Kdf
3,302,436 UART: [kat] LMS
3,834,246 UART: [kat] --
3,838,689 UART: [cold-reset] ++
3,840,022 UART: [fht] FHT @ 0x50003400
3,852,795 UART: [idev] ++
3,853,519 UART: [idev] CDI.KEYID = 6
3,854,401 UART: [idev] SUBJECT.KEYID = 7
3,855,671 UART: [idev] UDS.KEYID = 0
3,874,587 UART: [idev] Erasing UDS.KEYID = 0
6,336,283 UART: [idev] Sha1 KeyId Algorithm
6,359,418 UART: [idev] --
6,364,223 UART: [ldev] ++
6,364,896 UART: [ldev] CDI.KEYID = 6
6,365,771 UART: [ldev] SUBJECT.KEYID = 5
6,366,976 UART: [ldev] AUTHORITY.KEYID = 7
6,368,199 UART: [ldev] FE.KEYID = 1
6,378,999 UART: [ldev] Erasing FE.KEYID = 1
8,859,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,165 UART: [ldev] --
10,648,046 UART: [fwproc] Wait for Commands...
10,650,864 UART: [fwproc] Recv command 0x4d454153
10,660,646 >>> mbox cmd response data (12 bytes)
10,663,443 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,763,489 UART: [fwproc] Recv command 0x46574c44
10,765,493 UART: [fwproc] Recv'd Img size: 78704 bytes
13,764,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,840,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,876 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,286,082 >>> mbox cmd response: success
14,290,995 UART: [afmc] ++
14,291,714 UART: [afmc] CDI.KEYID = 6
14,292,952 UART: [afmc] SUBJECT.KEYID = 7
14,294,382 UART: [afmc] AUTHORITY.KEYID = 5
16,797,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,522,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,523,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,539,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,554,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,569,300 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,593,556 UART: [afmc] --
18,597,923 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,598,294 UART: [cold-reset] --
18,600,244 UART: [state] Locking Datavault
18,605,813 UART: [state] Locking PCR0, PCR1 and PCR31
18,607,997 UART: [state] Locking ICCM
18,610,068 UART: [exit] Launching FMC @ 0x40000130
18,618,786 UART:
18,619,021 UART: Running Caliptra FMC ...
18,620,116 UART:
18,620,266 UART: [state] CFI Enabled
18,628,409 UART: [fht] FMC Alias Private Key: 7
20,386,068 UART: [art] Extend RT PCRs Done
20,387,792 UART: [art] Lock RT PCRs Done
20,388,857 UART: [art] Populate DV Done
20,394,027 UART: [fht] FMC Alias Private Key: 7
20,395,612 UART: [art] Derive CDI
20,396,342 UART: [art] Store in in slot 0x4
20,438,585 UART: [art] Derive Key Pair
20,439,683 UART: [art] Store priv key in slot 0x5
22,866,741 UART: [art] Derive Key Pair - Done
22,879,623 UART: [art] Signing Cert with AUTHO
22,880,925 UART: RITY.KEYID = 7
24,586,276 UART: [art] Erasing AUTHORITY.KEYID = 7
24,587,767 UART: [art] PUB.X = 9CBF274A81B3271143D07C42D0A4BF4345D22F47A8EF9A86A326AA1C8782E8328986860E975CFCE7B911DD8FD770E0BC
24,595,059 UART: [art] PUB.Y = 5DF8FF1C404D0475744C0D85B4E58BE7767D24A5786E03C7E5625AA4A5DE2AD6F572072DABC64630E1901FA8A20CDE20
24,602,338 UART: [art] SIG.R = DA85BC9B8E41EAE35556237C4BC86AF92EF5CCD7C4812C22DD6B865471E0B3C32E2316E1509509DF332F15A83730D1C4
24,609,711 UART: [art] SIG.S = 6E9185F19943989D83D70F3021391F9CF7D44DACAE0C052AB1F7EA14AF740C7B691794FDBC5EEE611ADAB674F59B3B24
25,588,349 UART: mbox::rt_entry...
25,589,300 UART: ____ _ _ _ ____ _____
25,591,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,593,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,595,168 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,597,089 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,599,010 UART: |_|
25,599,812 UART:
25,724,230 UART: [rt] Runtime listening for mailbox commands...
25,726,400 >>> mbox cmd response data (48 bytes)
25,727,035 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,729,409 >>> mbox cmd response data (48 bytes)
25,730,289 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,744,188 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,212,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,031 >>> mbox cmd response data (12 bytes)
10,479,101 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,307,904 >>> mbox cmd response: success
18,539,487 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,550,511 UART:
18,550,835 UART: Running Caliptra FMC ...
18,551,981 UART:
18,552,161 UART: [state] CFI Enabled
18,560,266 UART: [fht] FMC Alias Private Key: 7
20,316,598 UART: [art] Extend RT PCRs Done
20,317,820 UART: [art] Lock RT PCRs Done
20,319,361 UART: [art] Populate DV Done
20,324,623 UART: [fht] FMC Alias Private Key: 7
20,326,364 UART: [art] Derive CDI
20,327,102 UART: [art] Store in in slot 0x4
20,369,648 UART: [art] Derive Key Pair
20,370,644 UART: [art] Store priv key in slot 0x5
22,797,003 UART: [art] Derive Key Pair - Done
22,810,107 UART: [art] Signing Cert with AUTHO
22,811,435 UART: RITY.KEYID = 7
24,516,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,518,228 UART: [art] PUB.X = 1648303CDE1FC6DF6D73E480416AFB3397F2FDAD03E57B3C520E9004653025D60DBD765CBEF6A9416409ECB928944806
24,525,517 UART: [art] PUB.Y = 91927034A5FBD6B1ACE5775E73F8210C2E8F6A1796BADDDB01392380FAEF36887065E71F7FEC54CAFD73F451D05D87D1
24,532,815 UART: [art] SIG.R = 90B162D1EB55A3594EFD34E844FA72390605F599EAC91208F9B694CA7BFD2E7ED3DCAC696951E171281618B817DA4418
24,540,203 UART: [art] SIG.S = 5439F58792630820564A46969D62B99457A5DD339E641E7E243F9164D97F366CB7C2594C3FEB550AE92C92289338A9B0
25,518,483 UART: mbox::rt_entry...
25,519,434 UART: ____ _ _ _ ____ _____
25,521,326 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,523,500 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,525,458 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,527,440 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,529,289 UART: |_|
25,530,164 UART:
25,655,654 UART: [rt] Runtime listening for mailbox commands...
25,657,807 >>> mbox cmd response data (48 bytes)
25,658,347 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,660,658 >>> mbox cmd response data (48 bytes)
25,661,545 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,675,439 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,719 UART: [kat] SHA2-256
881,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,765 UART: [kat] ++
885,917 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,170 UART: [kat] LMS
1,475,366 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,548 UART: [idev] ++
1,479,716 UART: [idev] CDI.KEYID = 6
1,480,076 UART: [idev] SUBJECT.KEYID = 7
1,480,500 UART: [idev] UDS.KEYID = 0
1,488,162 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,402 UART: [idev] --
1,514,463 UART: [ldev] ++
1,514,631 UART: [ldev] CDI.KEYID = 6
1,514,994 UART: [ldev] SUBJECT.KEYID = 5
1,515,420 UART: [ldev] AUTHORITY.KEYID = 7
1,515,883 UART: [ldev] FE.KEYID = 1
1,520,969 UART: [ldev] Erasing FE.KEYID = 1
1,546,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,096 UART: [ldev] --
1,585,557 UART: [fwproc] Waiting for Commands...
1,586,258 UART: [fwproc] Received command 0x4d454153
1,590,322 >>> mbox cmd response data (12 bytes)
1,590,323 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,590,395 UART: [fwproc] Received command 0x46574c44
1,591,186 UART: [fwproc] Received Image of size 78704 bytes
2,482,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,510,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,539,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,622,223 >>> mbox cmd response: success
2,623,335 UART: [afmc] ++
2,623,503 UART: [afmc] CDI.KEYID = 6
2,623,865 UART: [afmc] SUBJECT.KEYID = 7
2,624,290 UART: [afmc] AUTHORITY.KEYID = 5
2,659,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,675,409 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,676,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,681,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,687,802 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,693,492 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,701,253 UART: [afmc] --
2,702,241 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,702,263 UART: [cold-reset] --
2,703,171 UART: [state] Locking Datavault
2,704,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,705,040 UART: [state] Locking ICCM
2,705,624 UART: [exit] Launching FMC @ 0x40000130
2,710,953 UART:
2,710,969 UART: Running Caliptra FMC ...
2,711,377 UART:
2,711,431 UART: [state] CFI Enabled
2,721,798 UART: [fht] FMC Alias Private Key: 7
2,830,069 UART: [art] Extend RT PCRs Done
2,830,497 UART: [art] Lock RT PCRs Done
2,832,125 UART: [art] Populate DV Done
2,840,424 UART: [fht] FMC Alias Private Key: 7
2,841,424 UART: [art] Derive CDI
2,841,704 UART: [art] Store in in slot 0x4
2,927,577 UART: [art] Derive Key Pair
2,927,937 UART: [art] Store priv key in slot 0x5
2,941,379 UART: [art] Derive Key Pair - Done
2,955,799 UART: [art] Signing Cert with AUTHO
2,956,279 UART: RITY.KEYID = 7
2,971,467 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,232 UART: [art] PUB.X = 04BA0338EDDF2C62601DAEC3F62C0378FD558957ED0A0D922E533FA1EDF9708F2A6CFB54E389C25E8A048597393D383D
2,978,994 UART: [art] PUB.Y = 8F3FB5A9E71667C4B658C9ACB05C0D70054A321C70639D452C5886D5241CD1A4F676A823473CD36F36FBDF15163FD577
2,985,940 UART: [art] SIG.R = DA9EB98DBEC94C2FC1F53BE2202E1D9F3BA7643E0A214A6B6FE8B8C57BF99300043570C14E3E407DBE7141EEBB879572
2,992,698 UART: [art] SIG.S = 603E979C0687F930B6E3EBD19FDD85840E9F13A44ED7B4EA2BE1D1CB1126375665F98D7BE991D34A2EA6A784B7B7F180
3,016,307 UART: mbox::rt_entry...
3,016,679 UART: ____ _ _ _ ____ _____
3,017,463 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,018,263 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,019,031 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,019,799 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,020,567 UART: |_|
3,020,879 UART:
3,139,418 UART: [rt] Runtime listening for mailbox commands...
3,140,599 >>> mbox cmd response data (48 bytes)
3,140,600 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,143,383 >>> mbox cmd response data (48 bytes)
3,143,384 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,158,521 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,515 >>> mbox cmd response data (12 bytes)
1,444,516 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,470,581 >>> mbox cmd response: success
2,526,496 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,532,759 UART:
2,532,775 UART: Running Caliptra FMC ...
2,533,183 UART:
2,533,237 UART: [state] CFI Enabled
2,543,398 UART: [fht] FMC Alias Private Key: 7
2,651,173 UART: [art] Extend RT PCRs Done
2,651,601 UART: [art] Lock RT PCRs Done
2,653,239 UART: [art] Populate DV Done
2,661,394 UART: [fht] FMC Alias Private Key: 7
2,662,340 UART: [art] Derive CDI
2,662,620 UART: [art] Store in in slot 0x4
2,747,927 UART: [art] Derive Key Pair
2,748,287 UART: [art] Store priv key in slot 0x5
2,761,459 UART: [art] Derive Key Pair - Done
2,775,885 UART: [art] Signing Cert with AUTHO
2,776,365 UART: RITY.KEYID = 7
2,791,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,950 UART: [art] PUB.X = 3E79851ABC9728A4DC4C37A371F2B513DF54A8C386883819621FBCA4385C6478A2D7E0E1961F3D4976B05F8BE1A2684F
2,798,722 UART: [art] PUB.Y = A232EE82D52CF05988891E57E49CA434C4FA19F13CB247BBCC06686E3EC44A5D6B0C91FD7F739FABD05441E70A2AB023
2,805,677 UART: [art] SIG.R = A788C67DAE2212520E48E78F7522D24B584821421E1CA122810E5043883CE685FD7F67E34197B0B2DC8F674C7FDC7A97
2,812,439 UART: [art] SIG.S = 456DF3C88A1AE031DF10A3B06E26EB439B440CB963BA5C4927523D043190636C469626BED9902010928F832310D5575D
2,836,402 UART: mbox::rt_entry...
2,836,774 UART: ____ _ _ _ ____ _____
2,837,558 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,358 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,126 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,894 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,662 UART: |_|
2,840,974 UART:
2,960,037 UART: [rt] Runtime listening for mailbox commands...
2,961,218 >>> mbox cmd response data (48 bytes)
2,961,219 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,964,002 >>> mbox cmd response data (48 bytes)
2,964,003 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,979,140 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,729 UART: [kat] LMS
1,475,925 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,446 UART: [fht] Storing FHT @ 0x50003400
1,480,367 UART: [idev] ++
1,480,535 UART: [idev] CDI.KEYID = 6
1,480,895 UART: [idev] SUBJECT.KEYID = 7
1,481,319 UART: [idev] UDS.KEYID = 0
1,489,427 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,944 UART: [ldev] Erasing FE.KEYID = 1
1,546,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,421 UART: [ldev] --
1,585,818 UART: [fwproc] Waiting for Commands...
1,586,683 UART: [fwproc] Received command 0x4d454153
1,590,747 >>> mbox cmd response data (12 bytes)
1,590,748 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,590,888 UART: [fwproc] Received command 0x46574c44
1,591,679 UART: [fwproc] Received Image of size 78704 bytes
2,482,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,509,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,538,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,621,230 >>> mbox cmd response: success
2,622,436 UART: [afmc] ++
2,622,604 UART: [afmc] CDI.KEYID = 6
2,622,966 UART: [afmc] SUBJECT.KEYID = 7
2,623,391 UART: [afmc] AUTHORITY.KEYID = 5
2,658,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,674,138 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,674,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,680,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,686,531 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,221 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,699,996 UART: [afmc] --
2,701,064 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,701,086 UART: [cold-reset] --
2,702,022 UART: [state] Locking Datavault
2,703,275 UART: [state] Locking PCR0, PCR1 and PCR31
2,703,879 UART: [state] Locking ICCM
2,704,383 UART: [exit] Launching FMC @ 0x40000130
2,709,712 UART:
2,709,728 UART: Running Caliptra FMC ...
2,710,136 UART:
2,710,279 UART: [state] CFI Enabled
2,720,988 UART: [fht] FMC Alias Private Key: 7
2,828,269 UART: [art] Extend RT PCRs Done
2,828,697 UART: [art] Lock RT PCRs Done
2,830,625 UART: [art] Populate DV Done
2,839,074 UART: [fht] FMC Alias Private Key: 7
2,840,076 UART: [art] Derive CDI
2,840,356 UART: [art] Store in in slot 0x4
2,925,993 UART: [art] Derive Key Pair
2,926,353 UART: [art] Store priv key in slot 0x5
2,939,907 UART: [art] Derive Key Pair - Done
2,954,631 UART: [art] Signing Cert with AUTHO
2,955,111 UART: RITY.KEYID = 7
2,970,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,971,154 UART: [art] PUB.X = 3FD0AEB0A4DDA20EB7C81963D2B0E1C3BF31D4E9BD1C07E861D17EE3B68CF1860CEACD8D5DCA1518528C502712010D26
2,977,929 UART: [art] PUB.Y = 42684A9CABFEB04F403916ACEF3D1CE6CF3E36A354AEDFB191DBCAEA3036C5F083B601C4B66514B8E62C924099C7915B
2,984,894 UART: [art] SIG.R = 1FFBCF97F5440B144BB74434D045A3C95E0C9B41915A9E7A5138DBDAD012A595D8CC4E01D7392F49D3ED53F9354EF62F
2,991,667 UART: [art] SIG.S = 0A611BBD92E6D819B4F60EF4CBEE5E1381041BBB650C0D518878E4BC1685B80EA305BFCA7BFDFFB84CCA813A43D5566A
3,015,215 UART: mbox::rt_entry...
3,015,587 UART: ____ _ _ _ ____ _____
3,016,371 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,017,171 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,939 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,018,707 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,019,475 UART: |_|
3,019,787 UART:
3,139,325 UART: [rt] Runtime listening for mailbox commands...
3,140,506 >>> mbox cmd response data (48 bytes)
3,140,507 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,143,290 >>> mbox cmd response data (48 bytes)
3,143,291 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,158,428 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,472 >>> mbox cmd response data (12 bytes)
1,444,473 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,640 >>> mbox cmd response: success
2,523,833 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,946 UART:
2,529,962 UART: Running Caliptra FMC ...
2,530,370 UART:
2,530,513 UART: [state] CFI Enabled
2,541,094 UART: [fht] FMC Alias Private Key: 7
2,648,907 UART: [art] Extend RT PCRs Done
2,649,335 UART: [art] Lock RT PCRs Done
2,650,767 UART: [art] Populate DV Done
2,659,200 UART: [fht] FMC Alias Private Key: 7
2,660,256 UART: [art] Derive CDI
2,660,536 UART: [art] Store in in slot 0x4
2,746,163 UART: [art] Derive Key Pair
2,746,523 UART: [art] Store priv key in slot 0x5
2,759,561 UART: [art] Derive Key Pair - Done
2,774,491 UART: [art] Signing Cert with AUTHO
2,774,971 UART: RITY.KEYID = 7
2,789,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,738 UART: [art] PUB.X = 922DDCEBD34DC815E6C7227913A0753C3E665DD1DAD15CB01D553095816D95249E07CFF3773AA0C57BD96676AA27E123
2,797,511 UART: [art] PUB.Y = 9A149439192F65C8DD91867FFBC22A7DC7D016CCD95D8C1D5C3181EB29BB1C756E6AD4069F3722F356D7FF772A54E78E
2,804,468 UART: [art] SIG.R = 1D5FF51ABD1079CB38D8B11CA8D625ADCAC683E84EAFEDBE733319680031A87D582A1EDCA4A888989BCD9F6607CE4DC9
2,811,235 UART: [art] SIG.S = 079CAA631E43788BBA17EC48F260E6243C33FA557E532609130F79FC5A3F7C1233B5DEB75E4EB2A7E57E80CF02283391
2,834,716 UART: mbox::rt_entry...
2,835,088 UART: ____ _ _ _ ____ _____
2,835,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,672 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,440 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,208 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,976 UART: |_|
2,839,288 UART:
2,957,904 UART: [rt] Runtime listening for mailbox commands...
2,959,085 >>> mbox cmd response data (48 bytes)
2,959,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,961,869 >>> mbox cmd response data (48 bytes)
2,961,870 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,977,007 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,422 UART: [kat] SHA2-512-ACC
908,323 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,472 UART: [kat] LMS
1,170,800 UART: [kat] --
1,171,639 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,894 UART: [idev] ++
1,175,062 UART: [idev] CDI.KEYID = 6
1,175,422 UART: [idev] SUBJECT.KEYID = 7
1,175,846 UART: [idev] UDS.KEYID = 0
1,183,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,097 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,218 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,337 UART: [ldev] --
1,282,770 UART: [fwproc] Wait for Commands...
1,283,370 UART: [fwproc] Recv command 0x4d454153
1,287,379 >>> mbox cmd response data (12 bytes)
1,287,380 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,287,585 UART: [fwproc] Recv command 0x46574c44
1,288,313 UART: [fwproc] Recv'd Img size: 78704 bytes
2,179,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,235,701 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,318,120 >>> mbox cmd response: success
2,319,288 UART: [afmc] ++
2,319,456 UART: [afmc] CDI.KEYID = 6
2,319,818 UART: [afmc] SUBJECT.KEYID = 7
2,320,243 UART: [afmc] AUTHORITY.KEYID = 5
2,355,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,372,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,372,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,378,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,384,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,390,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,398,049 UART: [afmc] --
2,399,029 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,399,051 UART: [cold-reset] --
2,399,863 UART: [state] Locking Datavault
2,401,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,401,616 UART: [state] Locking ICCM
2,402,162 UART: [exit] Launching FMC @ 0x40000130
2,407,491 UART:
2,407,507 UART: Running Caliptra FMC ...
2,407,915 UART:
2,407,969 UART: [state] CFI Enabled
2,417,988 UART: [fht] FMC Alias Private Key: 7
2,525,353 UART: [art] Extend RT PCRs Done
2,525,781 UART: [art] Lock RT PCRs Done
2,527,481 UART: [art] Populate DV Done
2,535,712 UART: [fht] FMC Alias Private Key: 7
2,536,770 UART: [art] Derive CDI
2,537,050 UART: [art] Store in in slot 0x4
2,622,781 UART: [art] Derive Key Pair
2,623,141 UART: [art] Store priv key in slot 0x5
2,636,449 UART: [art] Derive Key Pair - Done
2,651,215 UART: [art] Signing Cert with AUTHO
2,651,695 UART: RITY.KEYID = 7
2,666,985 UART: [art] Erasing AUTHORITY.KEYID = 7
2,667,750 UART: [art] PUB.X = B71C3C3EB5E710B6EF0E335AAACB490AAFEA1D3DED9F3962D000E466C4A83D6F66A2E9935CA0BA01FFCF009EA78A6E4C
2,674,497 UART: [art] PUB.Y = DC1B6C310D15CBB80A4A11A3287402BB7D168A2C6F189BA34B9259367785F980CB502805CF273BB2CE484CA2E5AD8FB7
2,681,445 UART: [art] SIG.R = B57CA752DB99B13417EA952D38D834791EAE7999409E6EF14BBC578345E79FC5F5C38D060B551A2AA855559AB14BD797
2,688,213 UART: [art] SIG.S = 2BE532000748F5407BC26CDC8F98266E62C9E342F9C3302FFB4A3596D82C8C8A225CA63AC00EC2E52A1967CBDEEDB1C6
2,711,744 UART: mbox::rt_entry...
2,712,116 UART: ____ _ _ _ ____ _____
2,712,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,713,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,714,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,715,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,716,004 UART: |_|
2,716,316 UART:
2,835,355 UART: [rt] Runtime listening for mailbox commands...
2,836,536 >>> mbox cmd response data (48 bytes)
2,836,537 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,839,320 >>> mbox cmd response data (48 bytes)
2,839,321 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,854,458 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,967 >>> mbox cmd response data (12 bytes)
1,141,968 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,425 >>> mbox cmd response: success
2,222,766 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,229,119 UART:
2,229,135 UART: Running Caliptra FMC ...
2,229,543 UART:
2,229,597 UART: [state] CFI Enabled
2,240,140 UART: [fht] FMC Alias Private Key: 7
2,348,611 UART: [art] Extend RT PCRs Done
2,349,039 UART: [art] Lock RT PCRs Done
2,350,613 UART: [art] Populate DV Done
2,358,760 UART: [fht] FMC Alias Private Key: 7
2,359,796 UART: [art] Derive CDI
2,360,076 UART: [art] Store in in slot 0x4
2,445,887 UART: [art] Derive Key Pair
2,446,247 UART: [art] Store priv key in slot 0x5
2,458,891 UART: [art] Derive Key Pair - Done
2,473,753 UART: [art] Signing Cert with AUTHO
2,474,233 UART: RITY.KEYID = 7
2,489,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,866 UART: [art] PUB.X = 9E0316C74098FC2F0588E69ACD02E02B125D07C25366C2CA5DEFAD02A316771432C8CC1B697D946D67039F551C1193F4
2,496,618 UART: [art] PUB.Y = C9A195C0E5EACAF9CC0EF015AE2D2EEBD58107261417880BFB2DF3E5DF5BCC8A9BB3C7352D4C02307C2E34B7905C03CE
2,503,577 UART: [art] SIG.R = 08A906367571986C7816C86E7B9B4CA64CC26D8825EC10C8B24E2073C4CC91BEA921E4A66B3A8BE04081D3082E992CCB
2,510,342 UART: [art] SIG.S = FB713708E6133FBC3EB90B9B6992B07ABEE495A2EC83633AFD73F931281243624CAF1D1B8896C5FC46977A61BBEE1B97
2,533,659 UART: mbox::rt_entry...
2,534,031 UART: ____ _ _ _ ____ _____
2,534,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,615 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,383 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,151 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,919 UART: |_|
2,538,231 UART:
2,656,086 UART: [rt] Runtime listening for mailbox commands...
2,657,267 >>> mbox cmd response data (48 bytes)
2,657,268 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,660,051 >>> mbox cmd response data (48 bytes)
2,660,052 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,675,189 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,879 UART: [kat] SHA2-512-ACC
908,780 UART: [kat] ECC-384
918,593 UART: [kat] HMAC-384Kdf
923,151 UART: [kat] LMS
1,171,479 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,904 UART: [fht] FHT @ 0x50003400
1,175,507 UART: [idev] ++
1,175,675 UART: [idev] CDI.KEYID = 6
1,176,035 UART: [idev] SUBJECT.KEYID = 7
1,176,459 UART: [idev] UDS.KEYID = 0
1,184,635 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,210,056 UART: [idev] --
1,211,088 UART: [ldev] ++
1,211,256 UART: [ldev] CDI.KEYID = 6
1,211,619 UART: [ldev] SUBJECT.KEYID = 5
1,212,045 UART: [ldev] AUTHORITY.KEYID = 7
1,212,508 UART: [ldev] FE.KEYID = 1
1,217,990 UART: [ldev] Erasing FE.KEYID = 1
1,244,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,282 UART: [ldev] --
1,283,665 UART: [fwproc] Wait for Commands...
1,284,319 UART: [fwproc] Recv command 0x4d454153
1,288,328 >>> mbox cmd response data (12 bytes)
1,288,329 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,288,456 UART: [fwproc] Recv command 0x46574c44
1,289,184 UART: [fwproc] Recv'd Img size: 78704 bytes
2,179,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,235,902 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,318,365 >>> mbox cmd response: success
2,319,559 UART: [afmc] ++
2,319,727 UART: [afmc] CDI.KEYID = 6
2,320,089 UART: [afmc] SUBJECT.KEYID = 7
2,320,514 UART: [afmc] AUTHORITY.KEYID = 5
2,356,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,379,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,385,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,391,452 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,399,378 UART: [afmc] --
2,400,282 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,400,304 UART: [cold-reset] --
2,401,188 UART: [state] Locking Datavault
2,402,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,997 UART: [state] Locking ICCM
2,403,483 UART: [exit] Launching FMC @ 0x40000130
2,408,812 UART:
2,408,828 UART: Running Caliptra FMC ...
2,409,236 UART:
2,409,379 UART: [state] CFI Enabled
2,420,126 UART: [fht] FMC Alias Private Key: 7
2,528,073 UART: [art] Extend RT PCRs Done
2,528,501 UART: [art] Lock RT PCRs Done
2,529,995 UART: [art] Populate DV Done
2,538,364 UART: [fht] FMC Alias Private Key: 7
2,539,406 UART: [art] Derive CDI
2,539,686 UART: [art] Store in in slot 0x4
2,625,067 UART: [art] Derive Key Pair
2,625,427 UART: [art] Store priv key in slot 0x5
2,638,857 UART: [art] Derive Key Pair - Done
2,653,700 UART: [art] Signing Cert with AUTHO
2,654,180 UART: RITY.KEYID = 7
2,669,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,669,861 UART: [art] PUB.X = D8F0E942FAF9F90E359A0F8FF348FB86286D4CCE356E9527FF4ECC3F3FA297CF5FFDB2040D8F73109457FBFC31EFC64D
2,676,643 UART: [art] PUB.Y = D5CC9C5CD9B0EC17AEF613701BFAB09D7C8919F931C5FF1EC5B6FFC0E12D736B7BFF3B4124FF626373B81A509A15CFC4
2,683,617 UART: [art] SIG.R = 21CF7FDCC08ABD882C98BE725BFC6ECFE068FD009EA97E7D9A61AA3727433B4D5404D557FE504EBB671FC57F3B4CFEF8
2,690,388 UART: [art] SIG.S = B5248931DF68FF6A4F81B04E99CD9332051415E2084F6099ABC25CD5AF0C97FC24667FF85E9E26DFF59131DE933EBCEA
2,713,908 UART: mbox::rt_entry...
2,714,280 UART: ____ _ _ _ ____ _____
2,715,064 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,715,864 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,716,632 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,717,400 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,718,168 UART: |_|
2,718,480 UART:
2,838,103 UART: [rt] Runtime listening for mailbox commands...
2,839,284 >>> mbox cmd response data (48 bytes)
2,839,285 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,842,068 >>> mbox cmd response data (48 bytes)
2,842,069 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,857,206 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,348 >>> mbox cmd response data (12 bytes)
1,143,349 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,169,704 >>> mbox cmd response: success
2,226,557 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,232,626 UART:
2,232,642 UART: Running Caliptra FMC ...
2,233,050 UART:
2,233,193 UART: [state] CFI Enabled
2,244,210 UART: [fht] FMC Alias Private Key: 7
2,352,107 UART: [art] Extend RT PCRs Done
2,352,535 UART: [art] Lock RT PCRs Done
2,353,951 UART: [art] Populate DV Done
2,362,358 UART: [fht] FMC Alias Private Key: 7
2,363,286 UART: [art] Derive CDI
2,363,566 UART: [art] Store in in slot 0x4
2,449,417 UART: [art] Derive Key Pair
2,449,777 UART: [art] Store priv key in slot 0x5
2,462,699 UART: [art] Derive Key Pair - Done
2,477,445 UART: [art] Signing Cert with AUTHO
2,477,925 UART: RITY.KEYID = 7
2,493,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,493,932 UART: [art] PUB.X = 9D3719588C7AE820E10F3267232209C0F9F48A6E8464A7DA60504A798F64F22EB8C1DB4C21F65E7E03185DC9C4D6E3CC
2,500,697 UART: [art] PUB.Y = DADB5D94AAE228FC661D3E7E8FABC7581734BEA32EEC3937678EBE70D14685EB5661015BF101C54E88159348EF714D90
2,507,651 UART: [art] SIG.R = C5EA2BCFE240B610B1CEB5D36AE622A83DAEA897E1A529D60A7125A6CDC83B4C4EEAA06D6EEC36872F83A22F463072D4
2,514,440 UART: [art] SIG.S = 751E71CFA4F1E621C4EF77BFBFD7CF45A404B9A5A8EC512BA062B664149F815A53AC9EB5123C88995A9876618DB58F41
2,538,830 UART: mbox::rt_entry...
2,539,202 UART: ____ _ _ _ ____ _____
2,539,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,540,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,541,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,542,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,543,090 UART: |_|
2,543,402 UART:
2,661,467 UART: [rt] Runtime listening for mailbox commands...
2,662,648 >>> mbox cmd response data (48 bytes)
2,662,649 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,665,432 >>> mbox cmd response data (48 bytes)
2,665,433 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,680,570 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,649 UART: [idev] ++
1,172,817 UART: [idev] CDI.KEYID = 6
1,173,178 UART: [idev] SUBJECT.KEYID = 7
1,173,603 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,318 UART: [ldev] ++
1,208,486 UART: [ldev] CDI.KEYID = 6
1,208,850 UART: [ldev] SUBJECT.KEYID = 5
1,209,277 UART: [ldev] AUTHORITY.KEYID = 7
1,209,740 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,240,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,540 UART: [ldev] --
1,279,846 UART: [fwproc] Wait for Commands...
1,280,543 UART: [fwproc] Recv command 0x4d454153
1,284,570 >>> mbox cmd response data (12 bytes)
1,284,571 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,284,828 UART: [fwproc] Recv command 0x46574c44
1,285,561 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,994 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,346 >>> mbox cmd response: success
2,315,557 UART: [afmc] ++
2,315,725 UART: [afmc] CDI.KEYID = 6
2,316,088 UART: [afmc] SUBJECT.KEYID = 7
2,316,514 UART: [afmc] AUTHORITY.KEYID = 5
2,351,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,808 UART: [afmc] --
2,394,664 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,394,686 UART: [cold-reset] --
2,395,504 UART: [state] Locking Datavault
2,396,573 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,177 UART: [state] Locking ICCM
2,397,759 UART: [exit] Launching FMC @ 0x40000130
2,403,088 UART:
2,403,104 UART: Running Caliptra FMC ...
2,403,512 UART:
2,403,566 UART: [state] CFI Enabled
2,414,323 UART: [fht] FMC Alias Private Key: 7
2,521,722 UART: [art] Extend RT PCRs Done
2,522,150 UART: [art] Lock RT PCRs Done
2,523,596 UART: [art] Populate DV Done
2,531,777 UART: [fht] FMC Alias Private Key: 7
2,532,779 UART: [art] Derive CDI
2,533,059 UART: [art] Store in in slot 0x4
2,618,718 UART: [art] Derive Key Pair
2,619,078 UART: [art] Store priv key in slot 0x5
2,632,828 UART: [art] Derive Key Pair - Done
2,647,463 UART: [art] Signing Cert with AUTHO
2,647,943 UART: RITY.KEYID = 7
2,662,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,424 UART: [art] PUB.X = 7A250C6467246EEA82C5DB2D537727F3EE532166EE8ACB347020F72461EF605ED738A3E18A35B668C18E8E5723A9F4EE
2,670,195 UART: [art] PUB.Y = ED67CA2F9FCDB332CDB1F62633C48865E38BB9209DAEBBB4278A0BE1F74477D799135FD4A546C30AD0CB452D28D681AE
2,677,157 UART: [art] SIG.R = 93275B3ECB3ADF9FD721182C58ACB0210D08DA9EB09C3ADB11511CDA97C9AFFA46BA32F93D187D372C3D311C14C9A88F
2,683,941 UART: [art] SIG.S = 5608E8A9950DE987E8EDF707643CAC0743EB00AF6F5D1C1F8D8C7AB65F122509A31BCD0D2388808DD8D7FD29B361C6A3
2,707,204 UART: mbox::rt_entry...
2,707,576 UART: ____ _ _ _ ____ _____
2,708,360 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,160 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,928 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,696 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,464 UART: |_|
2,711,776 UART:
2,830,933 UART: [rt] Runtime listening for mailbox commands...
2,832,114 >>> mbox cmd response data (48 bytes)
2,832,115 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,834,898 >>> mbox cmd response data (48 bytes)
2,834,899 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,036 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,562 >>> mbox cmd response data (12 bytes)
1,138,563 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,267 >>> mbox cmd response: success
2,219,064 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,795 UART:
2,225,811 UART: Running Caliptra FMC ...
2,226,219 UART:
2,226,273 UART: [state] CFI Enabled
2,236,892 UART: [fht] FMC Alias Private Key: 7
2,344,697 UART: [art] Extend RT PCRs Done
2,345,125 UART: [art] Lock RT PCRs Done
2,346,849 UART: [art] Populate DV Done
2,354,890 UART: [fht] FMC Alias Private Key: 7
2,355,858 UART: [art] Derive CDI
2,356,138 UART: [art] Store in in slot 0x4
2,441,801 UART: [art] Derive Key Pair
2,442,161 UART: [art] Store priv key in slot 0x5
2,455,637 UART: [art] Derive Key Pair - Done
2,470,682 UART: [art] Signing Cert with AUTHO
2,471,162 UART: RITY.KEYID = 7
2,486,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,187 UART: [art] PUB.X = 4EDBC557CBEB7D1F5A77133A02EE877E5A9F27642AAD65D0CD95D814E7C4C1AE3D910982FA6DC568C86BCA9A9F3D6088
2,493,971 UART: [art] PUB.Y = 848135DC330E76EF252EDA502281ECA5FD4A4992B9BEBA56FFB0739C4AA62D5F575F3093F74E8D8DF67BF6A75208A344
2,500,927 UART: [art] SIG.R = EA056F5D4A46343F4836AA1C6373F491C16EEF839753C8732C94F961370A22100E59EC97810CB3EBCC18BE86E9455B5B
2,507,687 UART: [art] SIG.S = 165D724C5301950DEFDC555B4135BE201876BA09A6475325167A97FD5E58D2BDAD66A5B8545144E020269CA9C66D1DC3
2,531,089 UART: mbox::rt_entry...
2,531,461 UART: ____ _ _ _ ____ _____
2,532,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,045 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,813 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,349 UART: |_|
2,535,661 UART:
2,654,026 UART: [rt] Runtime listening for mailbox commands...
2,655,207 >>> mbox cmd response data (48 bytes)
2,655,208 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,657,991 >>> mbox cmd response data (48 bytes)
2,657,992 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,673,129 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,281,863 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x4d454153
1,286,465 >>> mbox cmd response data (12 bytes)
1,286,466 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,286,779 UART: [fwproc] Recv command 0x46574c44
1,287,512 UART: [fwproc] Recv'd Img size: 78704 bytes
2,177,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,140 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,506 >>> mbox cmd response: success
2,316,565 UART: [afmc] ++
2,316,733 UART: [afmc] CDI.KEYID = 6
2,317,096 UART: [afmc] SUBJECT.KEYID = 7
2,317,522 UART: [afmc] AUTHORITY.KEYID = 5
2,353,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,370,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,396,026 UART: [afmc] --
2,397,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,397,108 UART: [cold-reset] --
2,398,046 UART: [state] Locking Datavault
2,399,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,671 UART: [state] Locking ICCM
2,400,169 UART: [exit] Launching FMC @ 0x40000130
2,405,498 UART:
2,405,514 UART: Running Caliptra FMC ...
2,405,922 UART:
2,406,065 UART: [state] CFI Enabled
2,416,984 UART: [fht] FMC Alias Private Key: 7
2,524,877 UART: [art] Extend RT PCRs Done
2,525,305 UART: [art] Lock RT PCRs Done
2,526,865 UART: [art] Populate DV Done
2,535,084 UART: [fht] FMC Alias Private Key: 7
2,536,262 UART: [art] Derive CDI
2,536,542 UART: [art] Store in in slot 0x4
2,621,889 UART: [art] Derive Key Pair
2,622,249 UART: [art] Store priv key in slot 0x5
2,635,431 UART: [art] Derive Key Pair - Done
2,650,066 UART: [art] Signing Cert with AUTHO
2,650,546 UART: RITY.KEYID = 7
2,665,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,719 UART: [art] PUB.X = 288D10F0702F1684549B305906103CBA9C8524E7C673BE0C03E088AE23B6D6786743D286200B90BEF3397115457989FD
2,673,465 UART: [art] PUB.Y = 73599DA894A563736DFDA5760B11ADD362219F7663B7B6E31414A80257EB56356A22510F212B61D5C27438114B28B9BA
2,680,398 UART: [art] SIG.R = A14A6E79988C96F4C090EE573A15F864460E03133D65D5967032EE31F4DF39378A6FEC5B9435C421B24403E169BAFFFF
2,687,161 UART: [art] SIG.S = 95AAF6032C17DCD4F796CB277C6F52A0BBC5AFA5EB742A0B285AB754B91065B6B93EE1F9A987DD55FAC454DE3707D06B
2,711,173 UART: mbox::rt_entry...
2,711,545 UART: ____ _ _ _ ____ _____
2,712,329 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,713,129 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,897 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,665 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,715,433 UART: |_|
2,715,745 UART:
2,834,425 UART: [rt] Runtime listening for mailbox commands...
2,835,606 >>> mbox cmd response data (48 bytes)
2,835,607 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,390 >>> mbox cmd response data (48 bytes)
2,838,391 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,528 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,727 >>> mbox cmd response data (12 bytes)
1,140,728 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,260 >>> mbox cmd response: success
2,221,169 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,226,908 UART:
2,226,924 UART: Running Caliptra FMC ...
2,227,332 UART:
2,227,475 UART: [state] CFI Enabled
2,238,302 UART: [fht] FMC Alias Private Key: 7
2,346,507 UART: [art] Extend RT PCRs Done
2,346,935 UART: [art] Lock RT PCRs Done
2,348,523 UART: [art] Populate DV Done
2,356,532 UART: [fht] FMC Alias Private Key: 7
2,357,688 UART: [art] Derive CDI
2,357,968 UART: [art] Store in in slot 0x4
2,443,903 UART: [art] Derive Key Pair
2,444,263 UART: [art] Store priv key in slot 0x5
2,458,123 UART: [art] Derive Key Pair - Done
2,472,955 UART: [art] Signing Cert with AUTHO
2,473,435 UART: RITY.KEYID = 7
2,488,507 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,272 UART: [art] PUB.X = 0C8F0CEA559D0B4DDDCA470EAD39408AE232D1534BF870E592C53235E1164BCAED828CA0D058ACD175E227C7482717FD
2,496,044 UART: [art] PUB.Y = B618BCF9F7569742357D296685EEACC46BD4C1C363E2E7025FF030D76277407F77C3C106AB5E48520298F7CD1844782C
2,502,983 UART: [art] SIG.R = 18A87C1B98214C857DE54CFFCDE0CB9472A2426BDE8D39C4756950770860DE3344DF9658517C704FCC91DF35D01DD80F
2,509,753 UART: [art] SIG.S = 2FA093623C3DF36B929ABFC1487C96F55232CF049B038132525B4950EE32E2F37935A0002757E8957D4AF4DF1B2C6537
2,533,318 UART: mbox::rt_entry...
2,533,690 UART: ____ _ _ _ ____ _____
2,534,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,274 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,042 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,810 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,578 UART: |_|
2,537,890 UART:
2,656,443 UART: [rt] Runtime listening for mailbox commands...
2,657,624 >>> mbox cmd response data (48 bytes)
2,657,625 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,660,408 >>> mbox cmd response data (48 bytes)
2,660,409 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,675,546 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,083 UART:
192,448 UART: Running Caliptra ROM ...
193,640 UART:
193,798 UART: [state] CFI Enabled
260,543 UART: [state] LifecycleState = Unprovisioned
262,444 UART: [state] DebugLocked = No
265,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,262 UART: [kat] SHA2-256
439,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,500 UART: [kat] ++
451,031 UART: [kat] sha1
461,919 UART: [kat] SHA2-256
464,643 UART: [kat] SHA2-384
470,930 UART: [kat] SHA2-512-ACC
473,260 UART: [kat] ECC-384
2,766,906 UART: [kat] HMAC-384Kdf
2,798,898 UART: [kat] LMS
3,989,240 UART: [kat] --
3,994,230 UART: [cold-reset] ++
3,996,515 UART: [fht] Storing FHT @ 0x50003400
4,008,017 UART: [idev] ++
4,008,628 UART: [idev] CDI.KEYID = 6
4,009,555 UART: [idev] SUBJECT.KEYID = 7
4,010,736 UART: [idev] UDS.KEYID = 0
4,011,772 ready_for_fw is high
4,011,977 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,052,282 UART: [idev] Erasing UDS.KEYID = 0
7,346,206 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,895 UART: [idev] --
7,371,270 UART: [ldev] ++
7,371,865 UART: [ldev] CDI.KEYID = 6
7,372,888 UART: [ldev] SUBJECT.KEYID = 5
7,373,990 UART: [ldev] AUTHORITY.KEYID = 7
7,375,275 UART: [ldev] FE.KEYID = 1
7,421,625 UART: [ldev] Erasing FE.KEYID = 1
10,753,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,265 UART: [ldev] --
13,112,661 UART: [fwproc] Waiting for Commands...
13,114,323 UART: [fwproc] Received command 0x46574c44
13,116,506 UART: [fwproc] Received Image of size 31852 bytes
16,160,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,234,504 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,303,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,331,787 >>> mbox cmd response: success
16,335,304 UART: [afmc] ++
16,335,924 UART: [afmc] CDI.KEYID = 6
16,336,830 UART: [afmc] SUBJECT.KEYID = 7
16,338,093 UART: [afmc] AUTHORITY.KEYID = 5
19,704,239 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,004,736 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,006,960 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,021,370 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,036,251 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,050,668 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,072,726 UART: [afmc] --
22,075,886 UART: [cold-reset] --
22,079,160 UART: [state] Locking Datavault
22,083,594 UART: [state] Locking PCR0, PCR1 and PCR31
22,085,377 UART: [state] Locking ICCM
22,087,056 UART: [exit] Launching FMC @ 0x40000130
22,095,442 UART:
22,095,700 UART: Running Caliptra FMC ...
22,096,844 UART:
22,097,009 UART: [state] CFI Enabled
22,165,433 UART: [fht] FMC Alias Private Key: 7
24,503,656 UART: [art] Extend RT PCRs Done
24,504,913 UART: [art] Lock RT PCRs Done
24,506,246 UART: [art] Populate DV Done
24,511,972 UART: [fht] FMC Alias Private Key: 7
24,513,422 UART: [art] Derive CDI
24,514,189 UART: [art] Store in in slot 0x4
24,573,085 UART: [art] Derive Key Pair
24,574,162 UART: [art] Store priv key in slot 0x5
27,867,137 UART: [art] Derive Key Pair - Done
27,880,282 UART: [art] Signing Cert with AUTHO
27,881,625 UART: RITY.KEYID = 7
30,168,188 UART: [art] Erasing AUTHORITY.KEYID = 7
30,169,742 UART: [art] PUB.X = 15A893AD8680F85A7C6AFAB5CFEBD14D21D3AB3F85583D7142A88B68DFF7804B93C5ECFABF9EBFB9FBE08567ADAEC4E5
30,177,047 UART: [art] PUB.Y = 6841CEB5072FCE05E25CFF8BD61CBE86CF5604411BF097E5A2730C84612E4F5EE20EEA24536443B38090BAFA77073C32
30,184,267 UART: [art] SIG.R = 03B5F1568B4C5224D3FF5B32B8EDB469E6D3EF27120E987993E7DC380C11A20F3C0393A6C187F529A375A212502298C5
30,191,669 UART: [art] SIG.S = 891B98BCD9B06449C5DF745D6168D6F354DD3EE1E4A55039FA721C2FE57DC860ED5A54A77AE16D989EC4E99FA8106FE4
31,496,763 UART: persistent_rt::test_persistent_data_layout...[ok]
31,499,019 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,805,164 ready_for_fw is high
3,805,565 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,217,194 >>> mbox cmd response: success
21,903,992 UART:
21,904,366 UART: Running Caliptra FMC ...
21,905,568 UART:
21,905,747 UART: [state] CFI Enabled
21,973,338 UART: [fht] FMC Alias Private Key: 7
24,311,350 UART: [art] Extend RT PCRs Done
24,312,672 UART: [art] Lock RT PCRs Done
24,314,476 UART: [art] Populate DV Done
24,320,144 UART: [fht] FMC Alias Private Key: 7
24,321,608 UART: [art] Derive CDI
24,322,409 UART: [art] Store in in slot 0x4
24,382,334 UART: [art] Derive Key Pair
24,383,428 UART: [art] Store priv key in slot 0x5
27,675,821 UART: [art] Derive Key Pair - Done
27,688,972 UART: [art] Signing Cert with AUTHO
27,690,326 UART: RITY.KEYID = 7
29,977,866 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,422 UART: [art] PUB.X = 2ED35AF00D66563AAB3CCC957C87A4252DFB909349F99823065F89CF8080090F389BB9645EADCD923590CA64BF2175C8
29,986,649 UART: [art] PUB.Y = 783C314A02AB8D789CE67DD4B1EC6A01D6EDB592119188C4D9B10C1090D7F897D6BC6195C20D0C4B74CB24DC9B5C3F9A
29,993,889 UART: [art] SIG.R = 397EABD60D29FE4CCE800862F534625D22C9AABF2EFFB7CD08AB099128D743B7B6702F7726270DBD3FC9B6010D2998FD
30,001,322 UART: [art] SIG.S = 4AA4A9E37743F6B1F27C8B2612932684F473ACB02983E883B3943647A4F09A70B9E38809786BAC9A336D93F3B6F0D595
31,306,029 UART: persistent_rt::test_persistent_data_layout...[ok]
31,308,303 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,381 UART:
192,740 UART: Running Caliptra ROM ...
193,927 UART:
603,561 UART: [state] CFI Enabled
617,945 UART: [state] LifecycleState = Unprovisioned
619,882 UART: [state] DebugLocked = No
621,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,963 UART: [kat] SHA2-256
796,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,220 UART: [kat] ++
807,693 UART: [kat] sha1
819,483 UART: [kat] SHA2-256
822,205 UART: [kat] SHA2-384
826,983 UART: [kat] SHA2-512-ACC
829,292 UART: [kat] ECC-384
3,111,515 UART: [kat] HMAC-384Kdf
3,122,899 UART: [kat] LMS
4,313,006 UART: [kat] --
4,318,237 UART: [cold-reset] ++
4,320,807 UART: [fht] Storing FHT @ 0x50003400
4,331,638 UART: [idev] ++
4,332,195 UART: [idev] CDI.KEYID = 6
4,333,151 UART: [idev] SUBJECT.KEYID = 7
4,334,382 UART: [idev] UDS.KEYID = 0
4,335,336 ready_for_fw is high
4,335,514 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,375,835 UART: [idev] Erasing UDS.KEYID = 0
7,621,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,631 UART: [idev] --
7,647,722 UART: [ldev] ++
7,648,371 UART: [ldev] CDI.KEYID = 6
7,649,285 UART: [ldev] SUBJECT.KEYID = 5
7,650,495 UART: [ldev] AUTHORITY.KEYID = 7
7,651,723 UART: [ldev] FE.KEYID = 1
7,662,845 UART: [ldev] Erasing FE.KEYID = 1
10,950,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,870 UART: [ldev] --
13,309,936 UART: [fwproc] Waiting for Commands...
13,311,651 UART: [fwproc] Received command 0x46574c44
13,313,889 UART: [fwproc] Received Image of size 31852 bytes
16,360,371 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,429,242 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,498,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,527,840 >>> mbox cmd response: success
16,531,260 UART: [afmc] ++
16,531,886 UART: [afmc] CDI.KEYID = 6
16,532,809 UART: [afmc] SUBJECT.KEYID = 7
16,534,073 UART: [afmc] AUTHORITY.KEYID = 5
19,850,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,141,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,144,083 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,158,469 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,173,288 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,187,762 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,209,556 UART: [afmc] --
22,213,604 UART: [cold-reset] --
22,219,068 UART: [state] Locking Datavault
22,225,525 UART: [state] Locking PCR0, PCR1 and PCR31
22,227,345 UART: [state] Locking ICCM
22,228,932 UART: [exit] Launching FMC @ 0x40000130
22,237,312 UART:
22,237,552 UART: Running Caliptra FMC ...
22,238,682 UART:
22,238,845 UART: [state] CFI Enabled
22,246,772 UART: [fht] FMC Alias Private Key: 7
24,577,288 UART: [art] Extend RT PCRs Done
24,578,542 UART: [art] Lock RT PCRs Done
24,580,237 UART: [art] Populate DV Done
24,585,535 UART: [fht] FMC Alias Private Key: 7
24,587,186 UART: [art] Derive CDI
24,588,025 UART: [art] Store in in slot 0x4
24,630,877 UART: [art] Derive Key Pair
24,631,942 UART: [art] Store priv key in slot 0x5
27,873,400 UART: [art] Derive Key Pair - Done
27,886,199 UART: [art] Signing Cert with AUTHO
27,887,545 UART: RITY.KEYID = 7
30,167,043 UART: [art] Erasing AUTHORITY.KEYID = 7
30,168,604 UART: [art] PUB.X = DF9E99A5BB9C42FB9370EB7E849DBC188A89A7CD7AAC2E5B375CC7B663E81F2C9995DA8482605C72803755E7C6B2DE30
30,175,831 UART: [art] PUB.Y = 3E41C05BD3E7B362B474048D3936911BD39F399275A56870C4D0A2708AF42FB9EA08DF42BD767A7B0E2C87E73B93ACEC
30,183,060 UART: [art] SIG.R = 7E7FE1115BB941E980586EE308B10B2C950C4810E267F635742C1761BDE54725FCF059338D9DBDFCAE8DB664A92E8D80
30,190,478 UART: [art] SIG.S = 3E1C74AB79F89D76F2E4C497939B4D6D4D0CD2A903F1F439C72FB2FDB74BB3A544DF672543350955A9E07228C5538883
31,495,534 UART: persistent_rt::test_persistent_data_layout...[ok]
31,497,793 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,936 writing to cptra_bootfsm_go
4,129,323 ready_for_fw is high
4,129,733 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,408,115 >>> mbox cmd response: success
22,048,161 UART:
22,048,604 UART: Running Caliptra FMC ...
22,049,719 UART:
22,049,872 UART: [state] CFI Enabled
22,057,514 UART: [fht] FMC Alias Private Key: 7
24,388,492 UART: [art] Extend RT PCRs Done
24,389,777 UART: [art] Lock RT PCRs Done
24,391,639 UART: [art] Populate DV Done
24,397,093 UART: [fht] FMC Alias Private Key: 7
24,398,835 UART: [art] Derive CDI
24,399,688 UART: [art] Store in in slot 0x4
24,441,817 UART: [art] Derive Key Pair
24,442,907 UART: [art] Store priv key in slot 0x5
27,684,929 UART: [art] Derive Key Pair - Done
27,697,821 UART: [art] Signing Cert with AUTHO
27,699,174 UART: RITY.KEYID = 7
29,978,424 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,988 UART: [art] PUB.X = CB989514C36C86BEDD75ABD7F4F503CD210C9E5D1E68F6878DA9B4EFE771BED0260ED9F2C416BB5BA0623AFFFA93AC16
29,987,225 UART: [art] PUB.Y = E51666D1A5991731785CAE19C071436C259BC997C1C9E2D432AEC533D9F92A2B82214A2FB494B2E239B53C953A00005E
29,994,453 UART: [art] SIG.R = 858B488454322CA4BBB0C928BE5E7A2877A81A9E2B6BB06B90968CA5817378D56356F595A8C0C26485424AA0F9B5E093
30,001,874 UART: [art] SIG.S = 1D833577350C5FCE4E57D0CEA7181FDE20FEA18C462F2773B9771353BAFDCDCFD62839122C66D419B11C67540B509426
31,306,181 UART: persistent_rt::test_persistent_data_layout...[ok]
31,308,430 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
191,968 UART:
192,332 UART: Running Caliptra ROM ...
193,460 UART:
193,607 UART: [state] CFI Enabled
265,016 UART: [state] LifecycleState = Unprovisioned
266,916 UART: [state] DebugLocked = No
269,084 UART: [state] WD Timer not started. Device not locked for debugging
272,544 UART: [kat] SHA2-256
451,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,244 UART: [kat] ++
463,771 UART: [kat] sha1
475,076 UART: [kat] SHA2-256
478,147 UART: [kat] SHA2-384
483,073 UART: [kat] SHA2-512-ACC
486,012 UART: [kat] ECC-384
2,950,566 UART: [kat] HMAC-384Kdf
2,973,177 UART: [kat] LMS
3,502,663 UART: [kat] --
3,506,181 UART: [cold-reset] ++
3,507,263 UART: [fht] FHT @ 0x50003400
3,518,751 UART: [idev] ++
3,519,325 UART: [idev] CDI.KEYID = 6
3,520,357 UART: [idev] SUBJECT.KEYID = 7
3,521,460 UART: [idev] UDS.KEYID = 0
3,522,385 ready_for_fw is high
3,522,586 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,563,022 UART: [idev] Erasing UDS.KEYID = 0
6,028,118 UART: [idev] Sha1 KeyId Algorithm
6,050,639 UART: [idev] --
6,054,581 UART: [ldev] ++
6,055,152 UART: [ldev] CDI.KEYID = 6
6,056,064 UART: [ldev] SUBJECT.KEYID = 5
6,057,227 UART: [ldev] AUTHORITY.KEYID = 7
6,058,512 UART: [ldev] FE.KEYID = 1
6,099,308 UART: [ldev] Erasing FE.KEYID = 1
8,605,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,613 UART: [ldev] --
10,412,682 UART: [fwproc] Wait for Commands...
10,415,281 UART: [fwproc] Recv command 0x46574c44
10,417,359 UART: [fwproc] Recv'd Img size: 31832 bytes
12,816,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,895,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,964,714 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
12,994,159 >>> mbox cmd response: success
12,997,781 UART: [afmc] ++
12,998,407 UART: [afmc] CDI.KEYID = 6
12,999,402 UART: [afmc] SUBJECT.KEYID = 7
13,000,562 UART: [afmc] AUTHORITY.KEYID = 5
15,524,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,250,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,252,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,268,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,284,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,300,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,322,806 UART: [afmc] --
17,326,659 UART: [cold-reset] --
17,330,308 UART: [state] Locking Datavault
17,334,994 UART: [state] Locking PCR0, PCR1 and PCR31
17,336,680 UART: [state] Locking ICCM
17,338,051 UART: [exit] Launching FMC @ 0x40000130
17,346,438 UART:
17,346,687 UART: Running Caliptra FMC ...
17,347,824 UART:
17,347,998 UART: [state] CFI Enabled
17,408,363 UART: [fht] FMC Alias Private Key: 7
19,172,872 UART: [art] Extend RT PCRs Done
19,174,128 UART: [art] Lock RT PCRs Done
19,175,550 UART: [art] Populate DV Done
19,181,272 UART: [fht] FMC Alias Private Key: 7
19,182,715 UART: [art] Derive CDI
19,183,662 UART: [art] Store in in slot 0x4
19,241,577 UART: [art] Derive Key Pair
19,242,653 UART: [art] Store priv key in slot 0x5
21,705,577 UART: [art] Derive Key Pair - Done
21,718,287 UART: [art] Signing Cert with AUTHO
21,719,620 UART: RITY.KEYID = 7
23,431,815 UART: [art] Erasing AUTHORITY.KEYID = 7
23,433,352 UART: [art] PUB.X = 45886D245C9166EC204EE09834B68DC6B42CEBBF17B6DE73C5B5B6EC1425DC5F59C759783F4F2A5B72308366D2E0F477
23,440,568 UART: [art] PUB.Y = 16EE72FECAD393B12E7DAED8F8A7AA6FAF78B94FF13630D742EFA18E538E02C79A33936512DD8B7BB7750B8A59F46596
23,447,884 UART: [art] SIG.R = 94A574B1C1E450D2594AF8CF259330BD3699294620885AF405DFAA796222884C6BAC10DFAC5E8FACD9C6940D32BE3339
23,455,324 UART: [art] SIG.S = F7DF57931DD0C056AB0C39C24EBE43920DE30207EF8CA3D2BD035FD786F05FC44D98D70F87EB3997338ECE2A4F1B7AF8
24,433,527 UART: persistent_rt::test_persistent_data_layout...[ok]
24,435,798 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,359,247 ready_for_fw is high
3,359,782 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,715,357 >>> mbox cmd response: success
16,996,600 UART:
16,997,012 UART: Running Caliptra FMC ...
16,998,152 UART:
16,998,310 UART: [state] CFI Enabled
17,066,833 UART: [fht] FMC Alias Private Key: 7
18,830,381 UART: [art] Extend RT PCRs Done
18,831,646 UART: [art] Lock RT PCRs Done
18,833,059 UART: [art] Populate DV Done
18,838,445 UART: [fht] FMC Alias Private Key: 7
18,839,902 UART: [art] Derive CDI
18,840,670 UART: [art] Store in in slot 0x4
18,900,109 UART: [art] Derive Key Pair
18,901,191 UART: [art] Store priv key in slot 0x5
21,363,622 UART: [art] Derive Key Pair - Done
21,376,187 UART: [art] Signing Cert with AUTHO
21,377,535 UART: RITY.KEYID = 7
23,089,917 UART: [art] Erasing AUTHORITY.KEYID = 7
23,091,476 UART: [art] PUB.X = 98B1A1A36E26EC3FBC4E9EB5AE6E7A8B4D56FD2BE0453E8E96012D2FA9EE1AEDF01A0937597588BC05B4AE52511F08FA
23,098,695 UART: [art] PUB.Y = 1E8D6B20577A9F2CE172E3EECF2656234A578181B6AC7709DD7271B2B837477210517191022FD8E5E16C3C5EA379C7AB
23,106,011 UART: [art] SIG.R = 027369FB652CBD2ACB8D85AC9315C410BEC162B7081AF0D42B32E1964649E72D4964F976A4D7BD9A1A33866FA8A7ED68
23,113,443 UART: [art] SIG.S = D4274433A95E8146F5D40A32455773E77AA7C783BAE09B5E7E0F3C7788FB814AB48E60D7A28DDCAA9251E1744CECCE2D
24,091,891 UART: persistent_rt::test_persistent_data_layout...[ok]
24,094,158 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,473 UART:
192,850 UART: Running Caliptra ROM ...
193,983 UART:
603,773 UART: [state] CFI Enabled
617,795 UART: [state] LifecycleState = Unprovisioned
619,659 UART: [state] DebugLocked = No
621,381 UART: [state] WD Timer not started. Device not locked for debugging
625,330 UART: [kat] SHA2-256
804,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,996 UART: [kat] ++
816,595 UART: [kat] sha1
828,128 UART: [kat] SHA2-256
831,191 UART: [kat] SHA2-384
837,591 UART: [kat] SHA2-512-ACC
840,533 UART: [kat] ECC-384
3,279,386 UART: [kat] HMAC-384Kdf
3,292,041 UART: [kat] LMS
3,821,582 UART: [kat] --
3,824,155 UART: [cold-reset] ++
3,826,291 UART: [fht] FHT @ 0x50003400
3,837,895 UART: [idev] ++
3,838,457 UART: [idev] CDI.KEYID = 6
3,839,427 UART: [idev] SUBJECT.KEYID = 7
3,840,590 UART: [idev] UDS.KEYID = 0
3,841,505 ready_for_fw is high
3,841,698 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,881,999 UART: [idev] Erasing UDS.KEYID = 0
6,311,829 UART: [idev] Sha1 KeyId Algorithm
6,335,216 UART: [idev] --
6,338,014 UART: [ldev] ++
6,338,577 UART: [ldev] CDI.KEYID = 6
6,339,454 UART: [ldev] SUBJECT.KEYID = 5
6,340,573 UART: [ldev] AUTHORITY.KEYID = 7
6,341,895 UART: [ldev] FE.KEYID = 1
6,353,477 UART: [ldev] Erasing FE.KEYID = 1
8,821,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,836 UART: [ldev] --
10,610,645 UART: [fwproc] Wait for Commands...
10,613,386 UART: [fwproc] Recv command 0x46574c44
10,615,494 UART: [fwproc] Recv'd Img size: 31832 bytes
13,009,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,079,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,147,922 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,176,173 >>> mbox cmd response: success
13,181,203 UART: [afmc] ++
13,181,811 UART: [afmc] CDI.KEYID = 6
13,182,738 UART: [afmc] SUBJECT.KEYID = 7
13,183,888 UART: [afmc] AUTHORITY.KEYID = 5
15,683,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,403,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,405,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,421,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,437,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,453,156 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,477,103 UART: [afmc] --
17,480,531 UART: [cold-reset] --
17,483,617 UART: [state] Locking Datavault
17,487,554 UART: [state] Locking PCR0, PCR1 and PCR31
17,489,229 UART: [state] Locking ICCM
17,491,223 UART: [exit] Launching FMC @ 0x40000130
17,499,618 UART:
17,499,855 UART: Running Caliptra FMC ...
17,500,990 UART:
17,501,148 UART: [state] CFI Enabled
17,509,207 UART: [fht] FMC Alias Private Key: 7
19,265,843 UART: [art] Extend RT PCRs Done
19,267,098 UART: [art] Lock RT PCRs Done
19,268,701 UART: [art] Populate DV Done
19,274,002 UART: [fht] FMC Alias Private Key: 7
19,275,664 UART: [art] Derive CDI
19,276,424 UART: [art] Store in in slot 0x4
19,319,196 UART: [art] Derive Key Pair
19,320,223 UART: [art] Store priv key in slot 0x5
21,746,915 UART: [art] Derive Key Pair - Done
21,759,830 UART: [art] Signing Cert with AUTHO
21,761,157 UART: RITY.KEYID = 7
23,466,583 UART: [art] Erasing AUTHORITY.KEYID = 7
23,468,148 UART: [art] PUB.X = B6A7F2FA59032E05F99242D9F54899E1F1E1DD7E94DCCDE345C5A9124CD3853CDB95AFE9472EB1DB15DF4469EAF34693
23,475,392 UART: [art] PUB.Y = 18DB444220610D9A509052125C5F21C1CC70941D4827A933C609B634FBA270DBCACA824176FDCE078C38757067D07408
23,482,652 UART: [art] SIG.R = 4F5D6878761C4C951E8DB5FE6A71673D0DDCF61F7DD18D27269D21F1DF3611F630D9019F96FE7A202021FD9E80284B55
23,490,008 UART: [art] SIG.S = 8963B4410E7FA13B33946981E82ECA077701B561CDCCBF9E34D415B6557B23C4CF80968038BF62452BCE050A8D01A642
24,468,225 UART: persistent_rt::test_persistent_data_layout...[ok]
24,470,457 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,700,523 ready_for_fw is high
3,701,114 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,970,832 >>> mbox cmd response: success
17,226,522 UART:
17,226,904 UART: Running Caliptra FMC ...
17,228,094 UART:
17,228,262 UART: [state] CFI Enabled
17,236,028 UART: [fht] FMC Alias Private Key: 7
18,992,509 UART: [art] Extend RT PCRs Done
18,993,791 UART: [art] Lock RT PCRs Done
18,995,443 UART: [art] Populate DV Done
19,000,687 UART: [fht] FMC Alias Private Key: 7
19,002,289 UART: [art] Derive CDI
19,003,139 UART: [art] Store in in slot 0x4
19,045,568 UART: [art] Derive Key Pair
19,046,602 UART: [art] Store priv key in slot 0x5
21,473,604 UART: [art] Derive Key Pair - Done
21,486,657 UART: [art] Signing Cert with AUTHO
21,488,028 UART: RITY.KEYID = 7
23,193,504 UART: [art] Erasing AUTHORITY.KEYID = 7
23,195,063 UART: [art] PUB.X = 7D048C1EFD13DEFB09674811616DE06B297F4AE79F43A5826A5981E4DEADD53BA49DC653554D40F98890BB77E5F2472C
23,202,223 UART: [art] PUB.Y = FF0562B39786D39302DC8F53A7F88630452C1D24BD4636114FBC973E6D2E9C7FFDF9FC17D0ED02740FDABC506F3A1DC4
23,209,572 UART: [art] SIG.R = A838C65B350D10990391488D7E10A59851EDE7F7304CC6E0041D89A62DDF9A09BCD7264CDFF8325D74828C39EDF6ED5E
23,216,932 UART: [art] SIG.S = B7A01792A6DA2624436EE1E201EF70C5CF4A21FA0722A5ABDDA3AAB5BF2AF0C64AB9DC37963433300CC9D7667E942C0A
24,195,535 UART: persistent_rt::test_persistent_data_layout...[ok]
24,197,803 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,014 UART:
192,381 UART: Running Caliptra ROM ...
193,514 UART:
193,666 UART: [state] CFI Enabled
263,519 UART: [state] LifecycleState = Unprovisioned
265,868 UART: [state] DebugLocked = No
268,612 UART: [state] WD Timer not started. Device not locked for debugging
273,008 UART: [kat] SHA2-256
462,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,708 UART: [kat] ++
474,183 UART: [kat] sha1
486,126 UART: [kat] SHA2-256
489,139 UART: [kat] SHA2-384
493,992 UART: [kat] SHA2-512-ACC
496,569 UART: [kat] ECC-384
2,945,772 UART: [kat] HMAC-384Kdf
2,971,593 UART: [kat] LMS
3,503,357 UART: [kat] --
3,507,067 UART: [cold-reset] ++
3,509,137 UART: [fht] FHT @ 0x50003400
3,521,956 UART: [idev] ++
3,522,668 UART: [idev] CDI.KEYID = 6
3,523,649 UART: [idev] SUBJECT.KEYID = 7
3,524,820 UART: [idev] UDS.KEYID = 0
3,525,759 ready_for_fw is high
3,525,962 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,566,440 UART: [idev] Erasing UDS.KEYID = 0
6,025,174 UART: [idev] Sha1 KeyId Algorithm
6,046,958 UART: [idev] --
6,051,923 UART: [ldev] ++
6,052,605 UART: [ldev] CDI.KEYID = 6
6,053,546 UART: [ldev] SUBJECT.KEYID = 5
6,054,704 UART: [ldev] AUTHORITY.KEYID = 7
6,055,862 UART: [ldev] FE.KEYID = 1
6,099,106 UART: [ldev] Erasing FE.KEYID = 1
8,607,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,783 UART: [ldev] --
10,415,073 UART: [fwproc] Wait for Commands...
10,416,626 UART: [fwproc] Recv command 0x46574c44
10,418,934 UART: [fwproc] Recv'd Img size: 31832 bytes
12,853,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,927,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,043,485 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,091,421 >>> mbox cmd response: success
13,094,699 UART: [afmc] ++
13,095,322 UART: [afmc] CDI.KEYID = 6
13,096,518 UART: [afmc] SUBJECT.KEYID = 7
13,098,019 UART: [afmc] AUTHORITY.KEYID = 5
15,639,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,360,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,362,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,377,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,392,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,407,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,432,400 UART: [afmc] --
17,435,633 UART: [cold-reset] --
17,438,729 UART: [state] Locking Datavault
17,444,578 UART: [state] Locking PCR0, PCR1 and PCR31
17,446,783 UART: [state] Locking ICCM
17,449,004 UART: [exit] Launching FMC @ 0x40000130
17,457,652 UART:
17,457,896 UART: Running Caliptra FMC ...
17,459,034 UART:
17,459,204 UART: [state] CFI Enabled
17,517,440 UART: [fht] FMC Alias Private Key: 7
19,281,307 UART: [art] Extend RT PCRs Done
19,282,572 UART: [art] Lock RT PCRs Done
19,284,497 UART: [art] Populate DV Done
19,290,112 UART: [fht] FMC Alias Private Key: 7
19,291,850 UART: [art] Derive CDI
19,292,693 UART: [art] Store in in slot 0x4
19,349,696 UART: [art] Derive Key Pair
19,350,771 UART: [art] Store priv key in slot 0x5
21,813,578 UART: [art] Derive Key Pair - Done
21,826,485 UART: [art] Signing Cert with AUTHO
21,827,815 UART: RITY.KEYID = 7
23,538,968 UART: [art] Erasing AUTHORITY.KEYID = 7
23,540,518 UART: [art] PUB.X = 9825F9C1F2C84827D0DDB1B083C29ECE24E5A0EE3EAAE7E24A28626DC45ED591C032E6AE8DAF0D4451F7A45D39E3F760
23,547,743 UART: [art] PUB.Y = F5869667CEDB6391BD1D4FD47A9B999FC1E61B676C5833F133DDFC509695D05BAE569E9BFF713E7CDEE5A55206B475E5
23,554,983 UART: [art] SIG.R = 90F387B4DBFAD3711471E06705E45657CDDCB6A56C09814ED2778F9452DE832363003D2CAA96E1C1DA2C1FEF208699A9
23,562,384 UART: [art] SIG.S = 2E3988DFD4670C19BF3A47110E618B4D055B014BB3F8C8C93159618DCBEBDE47D9B6C69FB19BBBAE1CEB2079B750F7FD
24,541,197 UART: persistent_rt::test_persistent_data_layout...[ok]
24,543,436 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,439,095 ready_for_fw is high
3,439,489 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,961,932 >>> mbox cmd response: success
17,251,189 UART:
17,251,580 UART: Running Caliptra FMC ...
17,252,683 UART:
17,252,837 UART: [state] CFI Enabled
17,321,974 UART: [fht] FMC Alias Private Key: 7
19,085,252 UART: [art] Extend RT PCRs Done
19,086,525 UART: [art] Lock RT PCRs Done
19,088,094 UART: [art] Populate DV Done
19,093,278 UART: [fht] FMC Alias Private Key: 7
19,094,875 UART: [art] Derive CDI
19,095,655 UART: [art] Store in in slot 0x4
19,153,949 UART: [art] Derive Key Pair
19,155,042 UART: [art] Store priv key in slot 0x5
21,617,686 UART: [art] Derive Key Pair - Done
21,630,759 UART: [art] Signing Cert with AUTHO
21,632,104 UART: RITY.KEYID = 7
23,342,953 UART: [art] Erasing AUTHORITY.KEYID = 7
23,344,516 UART: [art] PUB.X = 742E497A06CEA4BC1150BCA65028389FBB8C5CB90FFEDD061F5E3FEC246BDC28EF91019157D8209CC6D9BA53E08DF2DC
23,351,741 UART: [art] PUB.Y = 206F00CF34FD3056BC28F99F0FF730D0BDA0BC62D1A78CCFAC9A652C160DA800C51495AB2E5FD84356D2115675394814
23,358,961 UART: [art] SIG.R = F4E5E40FFC4A0CBC49373930DDC4E0FDFC68A6CF29F9344FF0C9B697D2A6851DD9F9876E8F28FCA63E4283B71FB2B3BE
23,366,375 UART: [art] SIG.S = 0E0C6950824D8E88AAD803C2CB1BF56DB8F44BF652E906CBED886249567317946D135DBD31297AA8FD7A286E931BE5E3
24,344,964 UART: persistent_rt::test_persistent_data_layout...[ok]
24,347,225 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,479 UART:
192,843 UART: Running Caliptra ROM ...
194,025 UART:
603,593 UART: [state] CFI Enabled
616,500 UART: [state] LifecycleState = Unprovisioned
618,866 UART: [state] DebugLocked = No
621,528 UART: [state] WD Timer not started. Device not locked for debugging
625,694 UART: [kat] SHA2-256
815,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,381 UART: [kat] ++
826,911 UART: [kat] sha1
838,001 UART: [kat] SHA2-256
841,006 UART: [kat] SHA2-384
848,128 UART: [kat] SHA2-512-ACC
850,709 UART: [kat] ECC-384
3,291,159 UART: [kat] HMAC-384Kdf
3,303,808 UART: [kat] LMS
3,835,671 UART: [kat] --
3,839,728 UART: [cold-reset] ++
3,842,002 UART: [fht] FHT @ 0x50003400
3,852,760 UART: [idev] ++
3,853,395 UART: [idev] CDI.KEYID = 6
3,854,368 UART: [idev] SUBJECT.KEYID = 7
3,855,604 UART: [idev] UDS.KEYID = 0
3,856,519 ready_for_fw is high
3,856,719 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,896,831 UART: [idev] Erasing UDS.KEYID = 0
6,331,269 UART: [idev] Sha1 KeyId Algorithm
6,353,755 UART: [idev] --
6,358,771 UART: [ldev] ++
6,359,441 UART: [ldev] CDI.KEYID = 6
6,360,353 UART: [ldev] SUBJECT.KEYID = 5
6,361,555 UART: [ldev] AUTHORITY.KEYID = 7
6,362,774 UART: [ldev] FE.KEYID = 1
6,373,736 UART: [ldev] Erasing FE.KEYID = 1
8,853,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,641 UART: [ldev] --
10,642,441 UART: [fwproc] Wait for Commands...
10,645,237 UART: [fwproc] Recv command 0x46574c44
10,647,484 UART: [fwproc] Recv'd Img size: 31832 bytes
13,078,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,159,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,275,218 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,322,516 >>> mbox cmd response: success
13,326,299 UART: [afmc] ++
13,326,909 UART: [afmc] CDI.KEYID = 6
13,328,105 UART: [afmc] SUBJECT.KEYID = 7
13,329,594 UART: [afmc] AUTHORITY.KEYID = 5
15,836,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,558,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,560,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,575,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,590,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,605,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,629,221 UART: [afmc] --
17,633,141 UART: [cold-reset] --
17,637,728 UART: [state] Locking Datavault
17,642,673 UART: [state] Locking PCR0, PCR1 and PCR31
17,644,873 UART: [state] Locking ICCM
17,646,332 UART: [exit] Launching FMC @ 0x40000130
17,654,975 UART:
17,655,211 UART: Running Caliptra FMC ...
17,656,348 UART:
17,656,499 UART: [state] CFI Enabled
17,664,303 UART: [fht] FMC Alias Private Key: 7
19,420,455 UART: [art] Extend RT PCRs Done
19,421,712 UART: [art] Lock RT PCRs Done
19,423,420 UART: [art] Populate DV Done
19,428,888 UART: [fht] FMC Alias Private Key: 7
19,430,578 UART: [art] Derive CDI
19,431,641 UART: [art] Store in in slot 0x4
19,473,984 UART: [art] Derive Key Pair
19,475,012 UART: [art] Store priv key in slot 0x5
21,901,566 UART: [art] Derive Key Pair - Done
21,914,655 UART: [art] Signing Cert with AUTHO
21,916,023 UART: RITY.KEYID = 7
23,621,381 UART: [art] Erasing AUTHORITY.KEYID = 7
23,622,933 UART: [art] PUB.X = CA4C4BF43832981EACB5DA8B0AE6E2B7F84319815E9A0AD91765D016C43363C8C13C7F9812F5A26EE0CD05FF14CF22E4
23,630,173 UART: [art] PUB.Y = 120CDBF2C39E10854F6E43233973C0D0552EFC7C3102EFC7FD46B3F793B7BB04F6A9C28972B5337B8CE1A4337E76BBD3
23,637,410 UART: [art] SIG.R = F7D446569B8A984349BC34768364E7CDFB91502DEA23CC6ECA5C9DCB04E494457B9541ED948C467D58D92624E314E9CA
23,644,842 UART: [art] SIG.S = 0BE9C147D2B3EFAEF355771DE02897059B680E28A35CC13436A4FA5394768DD320A3CA60C1ED93E365A1E059A29262FC
24,623,548 UART: persistent_rt::test_persistent_data_layout...[ok]
24,625,785 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,753,073 ready_for_fw is high
3,753,464 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
13,194,364 >>> mbox cmd response: success
17,450,168 UART:
17,450,543 UART: Running Caliptra FMC ...
17,451,654 UART:
17,451,801 UART: [state] CFI Enabled
17,459,838 UART: [fht] FMC Alias Private Key: 7
19,216,314 UART: [art] Extend RT PCRs Done
19,217,579 UART: [art] Lock RT PCRs Done
19,219,058 UART: [art] Populate DV Done
19,224,371 UART: [fht] FMC Alias Private Key: 7
19,225,962 UART: [art] Derive CDI
19,226,727 UART: [art] Store in in slot 0x4
19,269,519 UART: [art] Derive Key Pair
19,270,593 UART: [art] Store priv key in slot 0x5
21,696,602 UART: [art] Derive Key Pair - Done
21,709,520 UART: [art] Signing Cert with AUTHO
21,710,872 UART: RITY.KEYID = 7
23,416,114 UART: [art] Erasing AUTHORITY.KEYID = 7
23,417,664 UART: [art] PUB.X = 7D1113092BD4D930578CEFFEB0425AE3C2BD059DA94B2895719872E2DDDCE490E4EBF543F4341E210A27F53661B1336B
23,424,936 UART: [art] PUB.Y = F0519DE16549873582A9E97F0DB0C39E0DE83DEB3F44DB4FFE518F9379AFD7E6BDB03CDE1A2615776FEF47D6E81D4DA2
23,432,205 UART: [art] SIG.R = D04DB6719AD8D577C4B4A54F5F80990D92E2EE2EB34F742202D980FE0A05F2ECD2F925349F7CEFE5AD4AF11BD12CFB10
23,439,641 UART: [art] SIG.S = DF98A074E9B658DCC2D7EF036A459684793C16FA3828D4A5D682FAD32F09F2A71E41C2D60C4AAA1EB71FA7B31CAAE15F
24,417,889 UART: persistent_rt::test_persistent_data_layout...[ok]
24,420,127 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,897 UART: [kat] SHA2-256
892,835 UART: [kat] SHA2-384
895,676 UART: [kat] SHA2-512-ACC
897,577 UART: [kat] ECC-384
903,262 UART: [kat] HMAC-384Kdf
907,894 UART: [kat] LMS
1,476,090 UART: [kat] --
1,476,717 UART: [cold-reset] ++
1,477,177 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 ready_for_fw is high
1,481,153 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,020 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,667 UART: [ldev] ++
1,514,835 UART: [ldev] CDI.KEYID = 6
1,515,198 UART: [ldev] SUBJECT.KEYID = 5
1,515,624 UART: [ldev] AUTHORITY.KEYID = 7
1,516,087 UART: [ldev] FE.KEYID = 1
1,521,421 UART: [ldev] Erasing FE.KEYID = 1
1,546,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,686 UART: [ldev] --
1,586,149 UART: [fwproc] Waiting for Commands...
1,586,946 UART: [fwproc] Received command 0x46574c44
1,587,737 UART: [fwproc] Received Image of size 31832 bytes
1,940,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,009,817 >>> mbox cmd response: success
2,010,879 UART: [afmc] ++
2,011,047 UART: [afmc] CDI.KEYID = 6
2,011,409 UART: [afmc] SUBJECT.KEYID = 7
2,011,834 UART: [afmc] AUTHORITY.KEYID = 5
2,046,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,513 UART: [afmc] --
2,089,449 UART: [cold-reset] --
2,090,281 UART: [state] Locking Datavault
2,091,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,666 UART: [state] Locking ICCM
2,092,134 UART: [exit] Launching FMC @ 0x40000130
2,097,463 UART:
2,097,479 UART: Running Caliptra FMC ...
2,097,887 UART:
2,097,941 UART: [state] CFI Enabled
2,108,342 UART: [fht] FMC Alias Private Key: 7
2,216,217 UART: [art] Extend RT PCRs Done
2,216,645 UART: [art] Lock RT PCRs Done
2,218,375 UART: [art] Populate DV Done
2,226,642 UART: [fht] FMC Alias Private Key: 7
2,227,636 UART: [art] Derive CDI
2,227,916 UART: [art] Store in in slot 0x4
2,313,503 UART: [art] Derive Key Pair
2,313,863 UART: [art] Store priv key in slot 0x5
2,327,095 UART: [art] Derive Key Pair - Done
2,341,905 UART: [art] Signing Cert with AUTHO
2,342,385 UART: RITY.KEYID = 7
2,357,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,386 UART: [art] PUB.X = 8329C65138A3FF4ECF365D6166A20DC909AB464768E2AD558538F62DAE01AB3EE23725CC71988C3D2A8A13A157303859
2,365,147 UART: [art] PUB.Y = DBF88FC923DA8396373B47BFEC8C941314C1ADDBD9536FF7B9EE89151551B2292BCF2E24AD214984189586712F20F0C3
2,372,103 UART: [art] SIG.R = 51B486C4B4B78C5D52A44896DE3E14507D04D0F356EAED8B1856D24095B8E60CB0976E842A4B9B9CAE3E94BE9A1DE4D9
2,378,879 UART: [art] SIG.S = E7DDE2068CF6695E693A202F5D8207820F6C60140120D2D98F33C40C39EA578B2BE8FC042BC529FC725F814188632D8B
2,402,481 UART: persistent_rt::test_persistent_data_layout...[ok]
2,403,724 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,091 ready_for_fw is high
1,362,091 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,857,371 >>> mbox cmd response: success
1,920,445 UART:
1,920,461 UART: Running Caliptra FMC ...
1,920,869 UART:
1,920,923 UART: [state] CFI Enabled
1,931,108 UART: [fht] FMC Alias Private Key: 7
2,039,301 UART: [art] Extend RT PCRs Done
2,039,729 UART: [art] Lock RT PCRs Done
2,041,155 UART: [art] Populate DV Done
2,049,354 UART: [fht] FMC Alias Private Key: 7
2,050,342 UART: [art] Derive CDI
2,050,622 UART: [art] Store in in slot 0x4
2,136,369 UART: [art] Derive Key Pair
2,136,729 UART: [art] Store priv key in slot 0x5
2,149,911 UART: [art] Derive Key Pair - Done
2,164,687 UART: [art] Signing Cert with AUTHO
2,165,167 UART: RITY.KEYID = 7
2,180,683 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,448 UART: [art] PUB.X = 29CFF3171483ED400C92C04222802138D3ABADC7CA334B0C0B898B3873BA45C2203EC584B87DE91B2489E19AE2241E8F
2,188,213 UART: [art] PUB.Y = 89661560A5ED52726C40913D15CDF3AEE730EAC8754E182DFE00E697AF854FED91ED588ED34AA95A93190BFA214F1B77
2,195,148 UART: [art] SIG.R = F80835C2A2B00A864FE0E90D184AF673DA39BED9122C443A3F7432F10A20DDB8B14E57E44B4C246E09B4EBDC10DE646B
2,201,917 UART: [art] SIG.S = 488EC374A749CA81FC411EAB4AD37DC24445741C07E405BDE3FAE38742728C1F5CBEF2C6A41431A37CF7B6DB2A2D36E8
2,225,755 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,998 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,762 UART: [kat] SHA2-256
882,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,808 UART: [kat] ++
886,960 UART: [kat] sha1
891,212 UART: [kat] SHA2-256
893,150 UART: [kat] SHA2-384
895,853 UART: [kat] SHA2-512-ACC
897,754 UART: [kat] ECC-384
903,489 UART: [kat] HMAC-384Kdf
907,973 UART: [kat] LMS
1,476,169 UART: [kat] --
1,477,062 UART: [cold-reset] ++
1,477,434 UART: [fht] Storing FHT @ 0x50003400
1,480,201 UART: [idev] ++
1,480,369 UART: [idev] CDI.KEYID = 6
1,480,729 UART: [idev] SUBJECT.KEYID = 7
1,481,153 UART: [idev] UDS.KEYID = 0
1,481,498 ready_for_fw is high
1,481,498 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,522,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,633 UART: [ldev] --
1,585,906 UART: [fwproc] Waiting for Commands...
1,586,533 UART: [fwproc] Received command 0x46574c44
1,587,324 UART: [fwproc] Received Image of size 31832 bytes
1,939,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,157 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,636 >>> mbox cmd response: success
2,009,782 UART: [afmc] ++
2,009,950 UART: [afmc] CDI.KEYID = 6
2,010,312 UART: [afmc] SUBJECT.KEYID = 7
2,010,737 UART: [afmc] AUTHORITY.KEYID = 5
2,046,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,191 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,881 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,802 UART: [afmc] --
2,089,836 UART: [cold-reset] --
2,090,554 UART: [state] Locking Datavault
2,091,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,271 UART: [state] Locking ICCM
2,092,729 UART: [exit] Launching FMC @ 0x40000130
2,098,058 UART:
2,098,074 UART: Running Caliptra FMC ...
2,098,482 UART:
2,098,625 UART: [state] CFI Enabled
2,109,480 UART: [fht] FMC Alias Private Key: 7
2,217,631 UART: [art] Extend RT PCRs Done
2,218,059 UART: [art] Lock RT PCRs Done
2,219,909 UART: [art] Populate DV Done
2,228,300 UART: [fht] FMC Alias Private Key: 7
2,229,282 UART: [art] Derive CDI
2,229,562 UART: [art] Store in in slot 0x4
2,315,629 UART: [art] Derive Key Pair
2,315,989 UART: [art] Store priv key in slot 0x5
2,329,755 UART: [art] Derive Key Pair - Done
2,344,462 UART: [art] Signing Cert with AUTHO
2,344,942 UART: RITY.KEYID = 7
2,360,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,001 UART: [art] PUB.X = BE8DB0883896087959E6F8309427DA34814526A88F7382BE989B043A3011ADA0D465F57D553D8A52504F92934E0768E1
2,367,750 UART: [art] PUB.Y = 4A1B372326959351388535F6311399DC70AA517F86CB050B84391F26FDDE5596055D9CDF4130C5F5EA1F667BE589FF3A
2,374,689 UART: [art] SIG.R = 89601B125E947B5BEF5F58C3778F8577BBB14FF0566EA506EC0D2925646F82361272D80E626836C652AC54C1B4EFF9A0
2,381,450 UART: [art] SIG.S = EFB1BC32E572E6146CD40C9362C99397AF02F392C7606C79618B070C5D9E9D47849BD842C496A3A5E87B2A675A6B1A10
2,405,274 UART: persistent_rt::test_persistent_data_layout...[ok]
2,406,517 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 ready_for_fw is high
1,363,248 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,860,306 >>> mbox cmd response: success
1,922,150 UART:
1,922,166 UART: Running Caliptra FMC ...
1,922,574 UART:
1,922,717 UART: [state] CFI Enabled
1,933,360 UART: [fht] FMC Alias Private Key: 7
2,041,581 UART: [art] Extend RT PCRs Done
2,042,009 UART: [art] Lock RT PCRs Done
2,043,641 UART: [art] Populate DV Done
2,051,802 UART: [fht] FMC Alias Private Key: 7
2,052,864 UART: [art] Derive CDI
2,053,144 UART: [art] Store in in slot 0x4
2,138,907 UART: [art] Derive Key Pair
2,139,267 UART: [art] Store priv key in slot 0x5
2,152,703 UART: [art] Derive Key Pair - Done
2,167,420 UART: [art] Signing Cert with AUTHO
2,167,900 UART: RITY.KEYID = 7
2,183,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,183,925 UART: [art] PUB.X = 9AF6DB18473D1A1FB5D5D3659669ACB66F2E0162A02E56F8DD31229582E807E54181E164B06FEB6AED050F6E08CC71B8
2,190,688 UART: [art] PUB.Y = 984AE3F68C7DC5C7FB29252C49834ABEA52C7EBD1DBE912C1AF426B175A90D1BA88697227DE8623EA8AA5FBC3C8DA0C8
2,197,657 UART: [art] SIG.R = B74F18D95CD6697946AAAB1C1B01C95BBECF0DA8EC1545F1ABB567D794EC0CACD0D5BF83007A128EF447C0B4AC014EBC
2,204,421 UART: [art] SIG.S = 054D6285AEAC62AA6161FEF113E7ADA606EDC31F3D96820583E6FA2F32A9153969C6600B1E5025B16159040D2A912B19
2,228,817 UART: persistent_rt::test_persistent_data_layout...[ok]
2,230,060 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,610 UART: [kat] HMAC-384Kdf
922,164 UART: [kat] LMS
1,170,492 UART: [kat] --
1,171,435 UART: [cold-reset] ++
1,171,867 UART: [fht] FHT @ 0x50003400
1,174,424 UART: [idev] ++
1,174,592 UART: [idev] CDI.KEYID = 6
1,174,952 UART: [idev] SUBJECT.KEYID = 7
1,175,376 UART: [idev] UDS.KEYID = 0
1,175,721 ready_for_fw is high
1,175,721 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,393 UART: [idev] Sha1 KeyId Algorithm
1,208,943 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,546 UART: [ldev] SUBJECT.KEYID = 5
1,210,972 UART: [ldev] AUTHORITY.KEYID = 7
1,211,435 UART: [ldev] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,192 UART: [fwproc] Recv command 0x46574c44
1,283,920 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,969 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,898 >>> mbox cmd response: success
1,705,906 UART: [afmc] ++
1,706,074 UART: [afmc] CDI.KEYID = 6
1,706,436 UART: [afmc] SUBJECT.KEYID = 7
1,706,861 UART: [afmc] AUTHORITY.KEYID = 5
1,742,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,867 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,763 UART: [afmc] --
1,785,799 UART: [cold-reset] --
1,786,717 UART: [state] Locking Datavault
1,788,116 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,720 UART: [state] Locking ICCM
1,789,192 UART: [exit] Launching FMC @ 0x40000130
1,794,521 UART:
1,794,537 UART: Running Caliptra FMC ...
1,794,945 UART:
1,794,999 UART: [state] CFI Enabled
1,805,416 UART: [fht] FMC Alias Private Key: 7
1,912,615 UART: [art] Extend RT PCRs Done
1,913,043 UART: [art] Lock RT PCRs Done
1,914,657 UART: [art] Populate DV Done
1,922,882 UART: [fht] FMC Alias Private Key: 7
1,924,038 UART: [art] Derive CDI
1,924,318 UART: [art] Store in in slot 0x4
2,009,915 UART: [art] Derive Key Pair
2,010,275 UART: [art] Store priv key in slot 0x5
2,022,923 UART: [art] Derive Key Pair - Done
2,037,497 UART: [art] Signing Cert with AUTHO
2,037,977 UART: RITY.KEYID = 7
2,053,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,064 UART: [art] PUB.X = 7A9407FAAFEB8B5767FE80BAC3A9AC0DFD52B989D3A2996292A807E251D52DBB1D0B6B79DAC5326075610AEE8EEF2A8A
2,060,841 UART: [art] PUB.Y = 317D73945653C68E2E08B6F5F6BF0E8D59C31F57BF0A0FCAA824EA7940E125BFBDC4A1E39D7E1FC2277266ABCF6C1CDC
2,067,801 UART: [art] SIG.R = 092633F862634EBF051BC3B178187D9B0378943B528861D7E1E237E2CCA6B9F75A3EF5DB5A7E05FBD3435483356DCB5E
2,074,563 UART: [art] SIG.S = 1D48370AC8B61ECE5A84B7A4203EACB645671963C0F8A00DAEC3F1ED9CDD5A5221E22AF3B60B1772C43F36546354993B
2,098,598 UART: persistent_rt::test_persistent_data_layout...[ok]
2,099,841 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 ready_for_fw is high
1,060,381 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,555,919 >>> mbox cmd response: success
1,617,633 UART:
1,617,649 UART: Running Caliptra FMC ...
1,618,057 UART:
1,618,111 UART: [state] CFI Enabled
1,628,242 UART: [fht] FMC Alias Private Key: 7
1,735,915 UART: [art] Extend RT PCRs Done
1,736,343 UART: [art] Lock RT PCRs Done
1,738,041 UART: [art] Populate DV Done
1,746,082 UART: [fht] FMC Alias Private Key: 7
1,747,178 UART: [art] Derive CDI
1,747,458 UART: [art] Store in in slot 0x4
1,833,519 UART: [art] Derive Key Pair
1,833,879 UART: [art] Store priv key in slot 0x5
1,846,955 UART: [art] Derive Key Pair - Done
1,861,727 UART: [art] Signing Cert with AUTHO
1,862,207 UART: RITY.KEYID = 7
1,877,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,252 UART: [art] PUB.X = 8A3F83D3A656549D89A754737B58A1B0424ADCB0BBFE053B5EEB4CD173F4420CA5882D32969E453CA38FE8C287CEBB7E
1,885,030 UART: [art] PUB.Y = 28F7F889BA9C596E9990C9C5766EFB3D0C2B0474D883F855794972E6C07F704B1271AA322DD03EEF297FD4C5133188B6
1,891,974 UART: [art] SIG.R = 13CC7EFDF47722231408C0B9D57EA8A03017D551982A03B9BBD78AE5C16275A6C36893F26AB605F5FE3DDC86F685EFA4
1,898,745 UART: [art] SIG.S = 0202578DD8895CA71EABE5C6A3EE297F30385F8160C48B1F4E6B9ED290DD6FF4D7CB74A827DC17EF98386C00DF060D53
1,922,629 UART: persistent_rt::test_persistent_data_layout...[ok]
1,923,872 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
917,843 UART: [kat] HMAC-384Kdf
922,337 UART: [kat] LMS
1,170,665 UART: [kat] --
1,171,352 UART: [cold-reset] ++
1,171,874 UART: [fht] FHT @ 0x50003400
1,174,569 UART: [idev] ++
1,174,737 UART: [idev] CDI.KEYID = 6
1,175,097 UART: [idev] SUBJECT.KEYID = 7
1,175,521 UART: [idev] UDS.KEYID = 0
1,175,866 ready_for_fw is high
1,175,866 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,699 UART: [idev] Erasing UDS.KEYID = 0
1,200,826 UART: [idev] Sha1 KeyId Algorithm
1,209,142 UART: [idev] --
1,210,158 UART: [ldev] ++
1,210,326 UART: [ldev] CDI.KEYID = 6
1,210,689 UART: [ldev] SUBJECT.KEYID = 5
1,211,115 UART: [ldev] AUTHORITY.KEYID = 7
1,211,578 UART: [ldev] FE.KEYID = 1
1,216,652 UART: [ldev] Erasing FE.KEYID = 1
1,242,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,944 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,283,149 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,736 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,705,861 >>> mbox cmd response: success
1,707,121 UART: [afmc] ++
1,707,289 UART: [afmc] CDI.KEYID = 6
1,707,651 UART: [afmc] SUBJECT.KEYID = 7
1,708,076 UART: [afmc] AUTHORITY.KEYID = 5
1,743,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,767,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,470 UART: [afmc] --
1,787,492 UART: [cold-reset] --
1,788,308 UART: [state] Locking Datavault
1,789,471 UART: [state] Locking PCR0, PCR1 and PCR31
1,790,075 UART: [state] Locking ICCM
1,790,717 UART: [exit] Launching FMC @ 0x40000130
1,796,046 UART:
1,796,062 UART: Running Caliptra FMC ...
1,796,470 UART:
1,796,613 UART: [state] CFI Enabled
1,807,410 UART: [fht] FMC Alias Private Key: 7
1,915,495 UART: [art] Extend RT PCRs Done
1,915,923 UART: [art] Lock RT PCRs Done
1,917,711 UART: [art] Populate DV Done
1,925,870 UART: [fht] FMC Alias Private Key: 7
1,927,046 UART: [art] Derive CDI
1,927,326 UART: [art] Store in in slot 0x4
2,012,905 UART: [art] Derive Key Pair
2,013,265 UART: [art] Store priv key in slot 0x5
2,026,449 UART: [art] Derive Key Pair - Done
2,041,294 UART: [art] Signing Cert with AUTHO
2,041,774 UART: RITY.KEYID = 7
2,056,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,603 UART: [art] PUB.X = 0BDD8F875848CC12BFD747651048AF2C9F9A7414F7CF94EF1D0D7DA359F7840150E329CECF85AB3585FDDD52B6BD7A9D
2,064,382 UART: [art] PUB.Y = DD2787E4FCEB0F81CF9323E83E5D896B438012D3F25391E34F88919D29D1E3F5ADB191025183B8751770E973C8569B64
2,071,322 UART: [art] SIG.R = 77574A30592692265C76822C1E5654E759F5272C73BC0F2B5691B1B0995D64F21F66546A29D097D0CF5223D429E68311
2,078,073 UART: [art] SIG.S = AD05A40898DC2F77F91796171F79CFC6136C24989E44C205571388F7CD58A8278B464AAE1FE240993A2BF7CA90EFD4C0
2,101,528 UART: persistent_rt::test_persistent_data_layout...[ok]
2,102,771 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,518 ready_for_fw is high
1,061,518 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,558,042 >>> mbox cmd response: success
1,621,110 UART:
1,621,126 UART: Running Caliptra FMC ...
1,621,534 UART:
1,621,677 UART: [state] CFI Enabled
1,632,122 UART: [fht] FMC Alias Private Key: 7
1,739,853 UART: [art] Extend RT PCRs Done
1,740,281 UART: [art] Lock RT PCRs Done
1,741,919 UART: [art] Populate DV Done
1,750,096 UART: [fht] FMC Alias Private Key: 7
1,751,200 UART: [art] Derive CDI
1,751,480 UART: [art] Store in in slot 0x4
1,836,989 UART: [art] Derive Key Pair
1,837,349 UART: [art] Store priv key in slot 0x5
1,850,441 UART: [art] Derive Key Pair - Done
1,865,279 UART: [art] Signing Cert with AUTHO
1,865,759 UART: RITY.KEYID = 7
1,881,065 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,830 UART: [art] PUB.X = F80C193115C90009EAC5D4304A09202FB81CE29AECAAD0FAB3EBA969A94594339AB7BC040B59C3CED43111169CEF6726
1,888,575 UART: [art] PUB.Y = B863670E55BD83C2DFE7742867BF570096B18C94BEE2CE0F9D50327447990E156A0D7B7CD31BF535C8F42E0AA267011C
1,895,489 UART: [art] SIG.R = F593E3DEA6F24E236EF0319FB33A9FA948D75FDF4D22BD8126940F3AA47E2A520996C1923C5D89E1B2D06BA027B43A89
1,902,263 UART: [art] SIG.S = 1D77FE7B78ED9A7EA206BB683332E9E7A00035FD0FCAF02D0E84C504866439141F77676E091A26FC817B7642AAECC28C
1,925,890 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,133 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,174,671 ready_for_fw is high
1,174,671 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,241,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,202 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,328 >>> mbox cmd response: success
1,704,511 UART: [afmc] ++
1,704,679 UART: [afmc] CDI.KEYID = 6
1,705,042 UART: [afmc] SUBJECT.KEYID = 7
1,705,468 UART: [afmc] AUTHORITY.KEYID = 5
1,740,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,735 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,698 UART: [afmc] --
1,783,622 UART: [cold-reset] --
1,784,596 UART: [state] Locking Datavault
1,785,865 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,469 UART: [state] Locking ICCM
1,787,117 UART: [exit] Launching FMC @ 0x40000130
1,792,446 UART:
1,792,462 UART: Running Caliptra FMC ...
1,792,870 UART:
1,792,924 UART: [state] CFI Enabled
1,803,081 UART: [fht] FMC Alias Private Key: 7
1,910,874 UART: [art] Extend RT PCRs Done
1,911,302 UART: [art] Lock RT PCRs Done
1,912,892 UART: [art] Populate DV Done
1,921,493 UART: [fht] FMC Alias Private Key: 7
1,922,581 UART: [art] Derive CDI
1,922,861 UART: [art] Store in in slot 0x4
2,008,546 UART: [art] Derive Key Pair
2,008,906 UART: [art] Store priv key in slot 0x5
2,021,872 UART: [art] Derive Key Pair - Done
2,036,566 UART: [art] Signing Cert with AUTHO
2,037,046 UART: RITY.KEYID = 7
2,052,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,277 UART: [art] PUB.X = 9F0B1F58ED808BC75EF59627A76CF71D2566BE2637190106DE9F23EC79C40117C6C865F39508294E389D333196BB61F9
2,060,028 UART: [art] PUB.Y = F3781A390EC80F542232CE4CD0610A05A82F4F9E871B6703760B1037C572A07E854EA43B9A5D90F1BE56DF7A712CCE9D
2,066,966 UART: [art] SIG.R = 31835F15BF868C886F86644E58BCEAE245239C3FAE389F5F196B3EE676264AADD8213A10B5774EED5EF3F7B9E96BC48F
2,073,748 UART: [art] SIG.S = 68AACDEC1FB8A162CAC615015A79517B9A4FA5DE5B8603B5D7F823EFE7039927F50400F2014BEFB3712208DC262C0965
2,097,583 UART: persistent_rt::test_persistent_data_layout...[ok]
2,098,826 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,132 ready_for_fw is high
1,056,132 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,551,274 >>> mbox cmd response: success
1,612,802 UART:
1,612,818 UART: Running Caliptra FMC ...
1,613,226 UART:
1,613,280 UART: [state] CFI Enabled
1,623,763 UART: [fht] FMC Alias Private Key: 7
1,731,808 UART: [art] Extend RT PCRs Done
1,732,236 UART: [art] Lock RT PCRs Done
1,733,990 UART: [art] Populate DV Done
1,742,517 UART: [fht] FMC Alias Private Key: 7
1,743,547 UART: [art] Derive CDI
1,743,827 UART: [art] Store in in slot 0x4
1,829,472 UART: [art] Derive Key Pair
1,829,832 UART: [art] Store priv key in slot 0x5
1,842,474 UART: [art] Derive Key Pair - Done
1,856,987 UART: [art] Signing Cert with AUTHO
1,857,467 UART: RITY.KEYID = 7
1,872,595 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,360 UART: [art] PUB.X = AC2F91007E5690E8579D63C10DB013DC04BEFDC621DB92B16031743B1E15EDCD154F32B25B51FAE5A56AB735F88BCB26
1,880,116 UART: [art] PUB.Y = A4EDC5BC0B8A7F573C6C06C7AAD10ECA373910FBA12CCD8D7A4811174BC820C5F9FC6FBBC7B89C4C8EAC5188872F8AE4
1,887,085 UART: [art] SIG.R = E724F38E2AC8409BCBB1568303F22CB922847151F9B9D20ABB823289FE48AD8FC618CB3248BD89F9D952935DAA566BC6
1,893,857 UART: [art] SIG.S = C6A782E0E04D26BDCF2232B7896CB8D57817343D3F6EF00B9603AD01581323FAB1D15406F237273A4E58B561BF49FF0D
1,917,806 UART: persistent_rt::test_persistent_data_layout...[ok]
1,919,049 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
890,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,065 UART: [kat] SHA2-512-ACC
905,966 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 ready_for_fw is high
1,174,318 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,100 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,306 UART: [fwproc] Recv command 0x46574c44
1,283,039 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,043 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,705,191 >>> mbox cmd response: success
1,706,458 UART: [afmc] ++
1,706,626 UART: [afmc] CDI.KEYID = 6
1,706,989 UART: [afmc] SUBJECT.KEYID = 7
1,707,415 UART: [afmc] AUTHORITY.KEYID = 5
1,744,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,795 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,541 UART: [afmc] --
1,787,571 UART: [cold-reset] --
1,788,505 UART: [state] Locking Datavault
1,789,600 UART: [state] Locking PCR0, PCR1 and PCR31
1,790,204 UART: [state] Locking ICCM
1,790,768 UART: [exit] Launching FMC @ 0x40000130
1,796,097 UART:
1,796,113 UART: Running Caliptra FMC ...
1,796,521 UART:
1,796,664 UART: [state] CFI Enabled
1,807,191 UART: [fht] FMC Alias Private Key: 7
1,915,236 UART: [art] Extend RT PCRs Done
1,915,664 UART: [art] Lock RT PCRs Done
1,916,952 UART: [art] Populate DV Done
1,925,339 UART: [fht] FMC Alias Private Key: 7
1,926,335 UART: [art] Derive CDI
1,926,615 UART: [art] Store in in slot 0x4
2,013,042 UART: [art] Derive Key Pair
2,013,402 UART: [art] Store priv key in slot 0x5
2,026,302 UART: [art] Derive Key Pair - Done
2,040,793 UART: [art] Signing Cert with AUTHO
2,041,273 UART: RITY.KEYID = 7
2,056,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,422 UART: [art] PUB.X = 827ABFC4449F8D3B8929FE4DD18E05106AF4047701B6A1F544881A5BAA4014BE82472053D88878C6C2F63241F0FE750F
2,064,180 UART: [art] PUB.Y = 5BDB9F8F5CB1FE1ACEE7CF99D512C16080FAE29113007D2655E125A9A31B0293F09711A55325B02525ECBE49DAC5F1D7
2,071,117 UART: [art] SIG.R = 0130C27EB016DB0A37E7B3E87926A0A24A67CA834BF23422CD6EDB37FA1AE2DC6B58B7843E948ED7F7CB0C9B3756F593
2,077,892 UART: [art] SIG.S = 89FB059C25B8620A103E2CADF52BB2151AB641B830A13DA264EEF11BB24BE40747398C50C262EA835DB61D47DFB3238B
2,101,985 UART: persistent_rt::test_persistent_data_layout...[ok]
2,103,228 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,005 ready_for_fw is high
1,057,005 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,552,815 >>> mbox cmd response: success
1,614,349 UART:
1,614,365 UART: Running Caliptra FMC ...
1,614,773 UART:
1,614,916 UART: [state] CFI Enabled
1,625,559 UART: [fht] FMC Alias Private Key: 7
1,733,210 UART: [art] Extend RT PCRs Done
1,733,638 UART: [art] Lock RT PCRs Done
1,735,206 UART: [art] Populate DV Done
1,743,433 UART: [fht] FMC Alias Private Key: 7
1,744,409 UART: [art] Derive CDI
1,744,689 UART: [art] Store in in slot 0x4
1,830,352 UART: [art] Derive Key Pair
1,830,712 UART: [art] Store priv key in slot 0x5
1,844,232 UART: [art] Derive Key Pair - Done
1,858,807 UART: [art] Signing Cert with AUTHO
1,859,287 UART: RITY.KEYID = 7
1,874,243 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,008 UART: [art] PUB.X = D6E5E556FA234EE44224D068844CA201FA04BDA97E848569A3F5F4E8EED80FE5BC797F78C5C773D5A6E0500183D93389
1,881,772 UART: [art] PUB.Y = 2DC85DA52F37765D9740E7CCFDAA8DB8F0E30EF2D4DDA6D91C21C71B2348F1536D00B03FBB5EF59914B0D4636EB0A96F
1,888,717 UART: [art] SIG.R = 3A3DB0F27F58E05693FF838AA9250855673C638CE9CEB3435C787091368449E4E8F405700A746EFFA3F01B9D0E2A503C
1,895,475 UART: [art] SIG.S = 3025CA8DF36C65C73AFE61C707E6D3778590E089F65DA00BA7E1DC37133766BD307C37EE5A10B376B1C565923273082A
1,919,216 UART: persistent_rt::test_persistent_data_layout...[ok]
1,920,459 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,066 UART:
192,430 UART: Running Caliptra ROM ...
193,629 UART:
193,784 UART: [state] CFI Enabled
266,831 UART: [state] LifecycleState = Unprovisioned
268,802 UART: [state] DebugLocked = No
270,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,988 UART: [kat] SHA2-256
444,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,226 UART: [kat] ++
455,695 UART: [kat] sha1
466,361 UART: [kat] SHA2-256
469,102 UART: [kat] SHA2-384
474,389 UART: [kat] SHA2-512-ACC
476,754 UART: [kat] ECC-384
2,768,489 UART: [kat] HMAC-384Kdf
2,799,637 UART: [kat] LMS
3,989,963 UART: [kat] --
3,995,313 UART: [cold-reset] ++
3,997,600 UART: [fht] Storing FHT @ 0x50003400
4,008,804 UART: [idev] ++
4,009,378 UART: [idev] CDI.KEYID = 6
4,010,270 UART: [idev] SUBJECT.KEYID = 7
4,011,512 UART: [idev] UDS.KEYID = 0
4,012,501 ready_for_fw is high
4,012,712 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,357 UART: [idev] Erasing UDS.KEYID = 0
7,345,843 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,305 UART: [idev] --
7,370,948 UART: [ldev] ++
7,371,568 UART: [ldev] CDI.KEYID = 6
7,372,481 UART: [ldev] SUBJECT.KEYID = 5
7,373,695 UART: [ldev] AUTHORITY.KEYID = 7
7,374,974 UART: [ldev] FE.KEYID = 1
7,421,968 UART: [ldev] Erasing FE.KEYID = 1
10,755,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,067 UART: [ldev] --
13,134,251 UART: [fwproc] Waiting for Commands...
13,136,576 UART: [fwproc] Received command 0x46574c44
13,138,757 UART: [fwproc] Received Image of size 114124 bytes
17,193,417 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,715 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,657,037 >>> mbox cmd response: success
17,661,853 UART: [afmc] ++
17,662,445 UART: [afmc] CDI.KEYID = 6
17,663,470 UART: [afmc] SUBJECT.KEYID = 7
17,664,625 UART: [afmc] AUTHORITY.KEYID = 5
21,025,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,611 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,462 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,881 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,537 UART: [afmc] --
23,397,621 UART: [cold-reset] --
23,400,458 UART: [state] Locking Datavault
23,407,159 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,866 UART: [state] Locking ICCM
23,411,506 UART: [exit] Launching FMC @ 0x40000130
23,419,898 UART:
23,420,128 UART: Running Caliptra FMC ...
23,421,228 UART:
23,421,384 UART: [state] CFI Enabled
23,486,615 UART: [fht] FMC Alias Private Key: 7
25,824,013 UART: [art] Extend RT PCRs Done
25,825,240 UART: [art] Lock RT PCRs Done
25,826,890 UART: [art] Populate DV Done
25,832,462 UART: [fht] FMC Alias Private Key: 7
25,834,062 UART: [art] Derive CDI
25,834,898 UART: [art] Store in in slot 0x4
25,895,355 UART: [art] Derive Key Pair
25,896,393 UART: [art] Store priv key in slot 0x5
29,188,884 UART: [art] Derive Key Pair - Done
29,201,768 UART: [art] Signing Cert with AUTHO
29,203,066 UART: RITY.KEYID = 7
31,491,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,215 UART: [art] PUB.X = 0C78A4611CFC092302A0FDA618DA0E89D6BFC4896A8F9A794EC354663D7AF5EC7A44D2486E6C97A391482572B6AA6735
31,500,476 UART: [art] PUB.Y = 0201DE5F6A4914BFFBD929DDBD2188DF97E60A5E2D7C625C78BD0EBD35A7BDE8AA52910AD98409F015082717AA65E385
31,507,714 UART: [art] SIG.R = 3034847E6022C2B1D94DEE6D4EC1F190103CF68FE812507BEED577D60E2BF7DE4DF14DE5ACEDEB3775C1B799F1246F28
31,515,118 UART: [art] SIG.S = B47022029FF757484F2BC734AD007A43135D386EB831DF8F4D54F55BE3DFED31CD432DCF1B54C9B70147E3A7C7C2AF84
32,819,503 UART: Caliptra RT
32,820,213 UART: [state] CFI Enabled
32,982,459 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,782,583 ready_for_fw is high
3,783,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,854,479 >>> mbox cmd response: success
23,544,647 UART:
23,545,034 UART: Running Caliptra FMC ...
23,546,182 UART:
23,546,348 UART: [state] CFI Enabled
23,614,097 UART: [fht] FMC Alias Private Key: 7
25,952,428 UART: [art] Extend RT PCRs Done
25,953,672 UART: [art] Lock RT PCRs Done
25,955,091 UART: [art] Populate DV Done
25,960,462 UART: [fht] FMC Alias Private Key: 7
25,962,165 UART: [art] Derive CDI
25,962,984 UART: [art] Store in in slot 0x4
26,022,315 UART: [art] Derive Key Pair
26,023,357 UART: [art] Store priv key in slot 0x5
29,315,757 UART: [art] Derive Key Pair - Done
29,328,596 UART: [art] Signing Cert with AUTHO
29,329,909 UART: RITY.KEYID = 7
31,617,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,672 UART: [art] PUB.X = 58BC039990C160DE81B5645A65633BDB396302EEB56D9303DBBD0612D7F673ECEC17D84519D2CEEDE7E6FCA21A212873
31,625,912 UART: [art] PUB.Y = D9F6F1B6CBCE5ECA6D45522E00194244A28A22D9CF6439A999BA8E03489B900F480C170D1E00BDBCD341F66765BD4CA8
31,633,140 UART: [art] SIG.R = B4D5F94B094B99B04E4EF7C715D309699AA94C2AE0618348C7E0A2081EF175CBD3900A8BE76F0F276D92E1B126258F5A
31,640,531 UART: [art] SIG.S = 78B54E9D9AC7994C4D35421598524B97AFE86EB5601837D082E41C437098DC318C428BE6D948CEC14B61FFB2D7765E94
32,945,060 UART: Caliptra RT
32,945,803 UART: [state] CFI Enabled
33,106,588 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,397 UART:
192,761 UART: Running Caliptra ROM ...
193,893 UART:
603,426 UART: [state] CFI Enabled
618,944 UART: [state] LifecycleState = Unprovisioned
620,828 UART: [state] DebugLocked = No
623,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,353 UART: [kat] SHA2-256
799,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,635 UART: [kat] ++
810,108 UART: [kat] sha1
821,783 UART: [kat] SHA2-256
824,540 UART: [kat] SHA2-384
830,969 UART: [kat] SHA2-512-ACC
833,333 UART: [kat] ECC-384
3,118,058 UART: [kat] HMAC-384Kdf
3,130,294 UART: [kat] LMS
4,320,433 UART: [kat] --
4,324,708 UART: [cold-reset] ++
4,325,779 UART: [fht] Storing FHT @ 0x50003400
4,336,773 UART: [idev] ++
4,337,326 UART: [idev] CDI.KEYID = 6
4,338,273 UART: [idev] SUBJECT.KEYID = 7
4,339,511 UART: [idev] UDS.KEYID = 0
4,340,518 ready_for_fw is high
4,340,718 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,882 UART: [idev] Erasing UDS.KEYID = 0
7,626,306 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,286 UART: [idev] --
7,652,713 UART: [ldev] ++
7,653,287 UART: [ldev] CDI.KEYID = 6
7,654,296 UART: [ldev] SUBJECT.KEYID = 5
7,655,452 UART: [ldev] AUTHORITY.KEYID = 7
7,656,726 UART: [ldev] FE.KEYID = 1
7,668,256 UART: [ldev] Erasing FE.KEYID = 1
10,953,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,661 UART: [ldev] --
13,313,634 UART: [fwproc] Waiting for Commands...
13,316,905 UART: [fwproc] Received command 0x46574c44
13,319,130 UART: [fwproc] Received Image of size 114124 bytes
17,362,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,055 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,614 >>> mbox cmd response: success
17,831,581 UART: [afmc] ++
17,832,174 UART: [afmc] CDI.KEYID = 6
17,833,138 UART: [afmc] SUBJECT.KEYID = 7
17,834,346 UART: [afmc] AUTHORITY.KEYID = 5
21,148,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,143 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,563 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,331 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,777 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,220 UART: [afmc] --
23,514,670 UART: [cold-reset] --
23,518,146 UART: [state] Locking Datavault
23,524,033 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,785 UART: [state] Locking ICCM
23,528,360 UART: [exit] Launching FMC @ 0x40000130
23,536,753 UART:
23,536,983 UART: Running Caliptra FMC ...
23,538,078 UART:
23,538,239 UART: [state] CFI Enabled
23,546,534 UART: [fht] FMC Alias Private Key: 7
25,876,935 UART: [art] Extend RT PCRs Done
25,878,167 UART: [art] Lock RT PCRs Done
25,879,732 UART: [art] Populate DV Done
25,885,160 UART: [fht] FMC Alias Private Key: 7
25,886,759 UART: [art] Derive CDI
25,887,570 UART: [art] Store in in slot 0x4
25,929,995 UART: [art] Derive Key Pair
25,930,995 UART: [art] Store priv key in slot 0x5
29,173,240 UART: [art] Derive Key Pair - Done
29,186,187 UART: [art] Signing Cert with AUTHO
29,187,493 UART: RITY.KEYID = 7
31,467,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,593 UART: [art] PUB.X = 6C6D4CE43DC6CA3541ACA7900901651C6F4641A8C83DFD811AECA9372E4D21E95DC948FB13DD68120E9086011D204F79
31,475,829 UART: [art] PUB.Y = 861422FCD5BA8CC7091CA0EBBB8D9B43B24ABD9B2A5A7011594EBBDAF37F12FEE3A959C43DC6CFD2CF0D7B7147B3D30E
31,483,164 UART: [art] SIG.R = 993C70DBB2DD4586DD5A9BD9C02FA464AA1D45D332E59BD6BD70090C18DC282B4EC59A22B62B646F00A1848D60CE821A
31,490,499 UART: [art] SIG.S = FFD12DF13AB008708ED26002A6D1DABB691DB32AF1DE9575458E5B8673829D28413DE99764F46050B0304E18A1AC7215
32,795,640 UART: Caliptra RT
32,796,354 UART: [state] CFI Enabled
32,915,054 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,130,269 ready_for_fw is high
4,130,912 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,068,452 >>> mbox cmd response: success
23,711,532 UART:
23,711,944 UART: Running Caliptra FMC ...
23,713,057 UART:
23,713,213 UART: [state] CFI Enabled
23,721,168 UART: [fht] FMC Alias Private Key: 7
26,051,544 UART: [art] Extend RT PCRs Done
26,052,774 UART: [art] Lock RT PCRs Done
26,054,512 UART: [art] Populate DV Done
26,059,600 UART: [fht] FMC Alias Private Key: 7
26,061,145 UART: [art] Derive CDI
26,061,908 UART: [art] Store in in slot 0x4
26,104,304 UART: [art] Derive Key Pair
26,105,375 UART: [art] Store priv key in slot 0x5
29,348,004 UART: [art] Derive Key Pair - Done
29,360,587 UART: [art] Signing Cert with AUTHO
29,361,949 UART: RITY.KEYID = 7
31,641,768 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,275 UART: [art] PUB.X = 3A61019DE353D6B190862FD69A0A553F53A6DC86B803D1104926565A600CD229E73E427066F443FFA9764B93977A8114
31,650,528 UART: [art] PUB.Y = 4FB7DB2DD58FDD107D6AB7F4A0AAA81C7788219AC0DF1C1FE26216B800EDEF2A43A15F0884CEBA2C4A5071ECF57357EB
31,657,769 UART: [art] SIG.R = B3DD21DD1290E507F246B685EE944B214D32A7EB47BC61CA82A861337FC28D62068CA1C53467E45FF47C6D4329483022
31,665,166 UART: [art] SIG.S = 06545383A1680AF51DB8BA6CC2406B8E66EEF824A708186C987178EB75FD89865DEBCAFCA6E9885CDCE2CCAE3A023144
32,970,077 UART: Caliptra RT
32,970,802 UART: [state] CFI Enabled
33,088,033 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,262 UART:
192,689 UART: Running Caliptra ROM ...
193,922 UART:
194,077 UART: [state] CFI Enabled
270,355 UART: [state] LifecycleState = Unprovisioned
272,272 UART: [state] DebugLocked = No
273,950 UART: [state] WD Timer not started. Device not locked for debugging
277,776 UART: [kat] SHA2-256
456,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,437 UART: [kat] ++
468,971 UART: [kat] sha1
480,063 UART: [kat] SHA2-256
483,139 UART: [kat] SHA2-384
489,346 UART: [kat] SHA2-512-ACC
492,282 UART: [kat] ECC-384
2,949,066 UART: [kat] HMAC-384Kdf
2,972,603 UART: [kat] LMS
3,502,072 UART: [kat] --
3,504,878 UART: [cold-reset] ++
3,506,387 UART: [fht] FHT @ 0x50003400
3,516,161 UART: [idev] ++
3,516,772 UART: [idev] CDI.KEYID = 6
3,517,664 UART: [idev] SUBJECT.KEYID = 7
3,518,786 UART: [idev] UDS.KEYID = 0
3,519,778 ready_for_fw is high
3,519,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,944 UART: [idev] Erasing UDS.KEYID = 0
6,025,957 UART: [idev] Sha1 KeyId Algorithm
6,048,205 UART: [idev] --
6,052,927 UART: [ldev] ++
6,053,505 UART: [ldev] CDI.KEYID = 6
6,054,417 UART: [ldev] SUBJECT.KEYID = 5
6,055,579 UART: [ldev] AUTHORITY.KEYID = 7
6,056,838 UART: [ldev] FE.KEYID = 1
6,101,540 UART: [ldev] Erasing FE.KEYID = 1
8,604,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,760 UART: [ldev] --
10,408,703 UART: [fwproc] Wait for Commands...
10,411,172 UART: [fwproc] Recv command 0x46574c44
10,413,207 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,393 >>> mbox cmd response: success
14,283,755 UART: [afmc] ++
14,284,558 UART: [afmc] CDI.KEYID = 6
14,285,478 UART: [afmc] SUBJECT.KEYID = 7
14,286,594 UART: [afmc] AUTHORITY.KEYID = 5
16,822,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,911 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,448 UART: [afmc] --
18,623,965 UART: [cold-reset] --
18,629,448 UART: [state] Locking Datavault
18,633,776 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,419 UART: [state] Locking ICCM
18,637,704 UART: [exit] Launching FMC @ 0x40000130
18,646,095 UART:
18,646,360 UART: Running Caliptra FMC ...
18,647,464 UART:
18,647,622 UART: [state] CFI Enabled
18,702,948 UART: [fht] FMC Alias Private Key: 7
20,467,330 UART: [art] Extend RT PCRs Done
20,468,545 UART: [art] Lock RT PCRs Done
20,470,233 UART: [art] Populate DV Done
20,475,754 UART: [fht] FMC Alias Private Key: 7
20,477,346 UART: [art] Derive CDI
20,478,083 UART: [art] Store in in slot 0x4
20,535,945 UART: [art] Derive Key Pair
20,536,984 UART: [art] Store priv key in slot 0x5
22,999,962 UART: [art] Derive Key Pair - Done
23,013,058 UART: [art] Signing Cert with AUTHO
23,014,401 UART: RITY.KEYID = 7
24,726,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,613 UART: [art] PUB.X = 6526CD62165FBAA38E436092782AF314952F1C8F69E4815C022221062B63345D162E724680BD1ADE1490A18F0B92FAA9
24,734,854 UART: [art] PUB.Y = B45CC04D50F1A74D020253DD03040BC0730B0B892F5D6092466E77B30542D0E5467AE0E5726730B839738C124F508C13
24,742,085 UART: [art] SIG.R = B8203D28C80EC50195460EAEA02B0730B7C65DFF3AAE601A12D92C187F8F191E0DDFA8BC3856D50847CD473B97755A23
24,749,507 UART: [art] SIG.S = 0FEDAC5A4CDAFC1342ABFAF0F17049BB0EA46764260F6649F11D685C755970753297F2D1A4579B8BCA0986D35D146CC2
25,728,815 UART: Caliptra RT
25,729,512 UART: [state] CFI Enabled
25,893,165 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,383,410 ready_for_fw is high
3,383,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,290 >>> mbox cmd response: success
18,345,625 UART:
18,346,026 UART: Running Caliptra FMC ...
18,347,193 UART:
18,347,360 UART: [state] CFI Enabled
18,412,836 UART: [fht] FMC Alias Private Key: 7
20,176,541 UART: [art] Extend RT PCRs Done
20,177,766 UART: [art] Lock RT PCRs Done
20,179,284 UART: [art] Populate DV Done
20,184,486 UART: [fht] FMC Alias Private Key: 7
20,186,082 UART: [art] Derive CDI
20,186,900 UART: [art] Store in in slot 0x4
20,245,747 UART: [art] Derive Key Pair
20,246,791 UART: [art] Store priv key in slot 0x5
22,709,593 UART: [art] Derive Key Pair - Done
22,722,646 UART: [art] Signing Cert with AUTHO
22,723,942 UART: RITY.KEYID = 7
24,435,504 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,012 UART: [art] PUB.X = 6AFAFC19FCE689B626EF5CDAA6650A73FA34D840206E97C25BBB1ED0FDCB43E98478E5CA930BCE10A1586FEEAEEDEAE0
24,444,331 UART: [art] PUB.Y = 1487E6CC758079FE4962184FB97B848505961B068871F65C7790C46F5C40BB6B53C8AE8B86EF3F29C429ABBEC7D0F68A
24,451,589 UART: [art] SIG.R = FC8961A4ADC81F5B4E9658B9579AC5477282D668D482AF4FB173256B02903ABA1C1570FE08538C04DB56D5F5B5B8779C
24,459,001 UART: [art] SIG.S = 41E904F278ABDE221757E7A173C97AC35145C0125F4384B6ADAF7FEDD12DFA86293B953CC9C77A9F4544D92B0B049B1E
25,437,522 UART: Caliptra RT
25,438,233 UART: [state] CFI Enabled
25,603,890 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,359 UART:
192,729 UART: Running Caliptra ROM ...
193,937 UART:
603,540 UART: [state] CFI Enabled
619,906 UART: [state] LifecycleState = Unprovisioned
621,771 UART: [state] DebugLocked = No
623,646 UART: [state] WD Timer not started. Device not locked for debugging
627,813 UART: [kat] SHA2-256
806,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,493 UART: [kat] ++
819,024 UART: [kat] sha1
829,690 UART: [kat] SHA2-256
832,689 UART: [kat] SHA2-384
839,259 UART: [kat] SHA2-512-ACC
842,161 UART: [kat] ECC-384
3,282,603 UART: [kat] HMAC-384Kdf
3,295,492 UART: [kat] LMS
3,825,003 UART: [kat] --
3,829,303 UART: [cold-reset] ++
3,830,807 UART: [fht] FHT @ 0x50003400
3,841,633 UART: [idev] ++
3,842,265 UART: [idev] CDI.KEYID = 6
3,843,145 UART: [idev] SUBJECT.KEYID = 7
3,844,312 UART: [idev] UDS.KEYID = 0
3,845,209 ready_for_fw is high
3,845,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,616 UART: [idev] Erasing UDS.KEYID = 0
6,316,537 UART: [idev] Sha1 KeyId Algorithm
6,340,888 UART: [idev] --
6,344,877 UART: [ldev] ++
6,345,443 UART: [ldev] CDI.KEYID = 6
6,346,320 UART: [ldev] SUBJECT.KEYID = 5
6,347,526 UART: [ldev] AUTHORITY.KEYID = 7
6,348,750 UART: [ldev] FE.KEYID = 1
6,356,815 UART: [ldev] Erasing FE.KEYID = 1
8,834,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,744 UART: [ldev] --
10,624,459 UART: [fwproc] Wait for Commands...
10,627,475 UART: [fwproc] Recv command 0x46574c44
10,629,562 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,364 >>> mbox cmd response: success
14,500,371 UART: [afmc] ++
14,500,974 UART: [afmc] CDI.KEYID = 6
14,501,903 UART: [afmc] SUBJECT.KEYID = 7
14,503,062 UART: [afmc] AUTHORITY.KEYID = 5
17,003,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,044 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,927 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,484 UART: [afmc] --
18,801,129 UART: [cold-reset] --
18,805,518 UART: [state] Locking Datavault
18,810,813 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,500 UART: [state] Locking ICCM
18,814,104 UART: [exit] Launching FMC @ 0x40000130
18,822,493 UART:
18,822,765 UART: Running Caliptra FMC ...
18,823,814 UART:
18,823,960 UART: [state] CFI Enabled
18,832,109 UART: [fht] FMC Alias Private Key: 7
20,589,134 UART: [art] Extend RT PCRs Done
20,590,339 UART: [art] Lock RT PCRs Done
20,591,883 UART: [art] Populate DV Done
20,597,203 UART: [fht] FMC Alias Private Key: 7
20,598,852 UART: [art] Derive CDI
20,599,592 UART: [art] Store in in slot 0x4
20,642,347 UART: [art] Derive Key Pair
20,643,343 UART: [art] Store priv key in slot 0x5
23,070,025 UART: [art] Derive Key Pair - Done
23,083,079 UART: [art] Signing Cert with AUTHO
23,084,419 UART: RITY.KEYID = 7
24,790,189 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,696 UART: [art] PUB.X = D8A8AF3531D7F4CCABCBEDD7AAA8FBEBE1AAF2E8CD868676AB8C255498A511C99ED2AB3DCA532B60114BA35A7D31E47F
24,799,007 UART: [art] PUB.Y = D3B539422DB32E610687DCDFF03A41C0ECB0AAA3AAA998939860D421B3C72DAB4CC89A4B03B963E0956C985DC24C98CF
24,806,305 UART: [art] SIG.R = 07A58BF25348C0308804BF9B42877B2E65FC3E1D19A05EA458ACDD776428D0CA896799028740FA633555AC3EBE9AE2A3
24,813,688 UART: [art] SIG.S = 364516DCF405D65F61D7593DA1B93CDDCD767339BBB9264D6926AC3E95C37FD5BC7C5A963D5E77C7D1072C803EFA5332
25,792,250 UART: Caliptra RT
25,792,954 UART: [state] CFI Enabled
25,909,382 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,703,391 ready_for_fw is high
3,703,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,888 >>> mbox cmd response: success
18,531,055 UART:
18,531,439 UART: Running Caliptra FMC ...
18,532,625 UART:
18,532,780 UART: [state] CFI Enabled
18,540,460 UART: [fht] FMC Alias Private Key: 7
20,298,221 UART: [art] Extend RT PCRs Done
20,299,445 UART: [art] Lock RT PCRs Done
20,301,227 UART: [art] Populate DV Done
20,306,469 UART: [fht] FMC Alias Private Key: 7
20,308,113 UART: [art] Derive CDI
20,308,919 UART: [art] Store in in slot 0x4
20,351,509 UART: [art] Derive Key Pair
20,352,502 UART: [art] Store priv key in slot 0x5
22,779,424 UART: [art] Derive Key Pair - Done
22,792,345 UART: [art] Signing Cert with AUTHO
22,793,649 UART: RITY.KEYID = 7
24,498,640 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,138 UART: [art] PUB.X = 2D14CD69E233F7BB3FD735541D6101F7013F069661418AAF23AAD73ADDCB2EA10C256F91DA63FC03BFCB99DA8C97D333
24,507,438 UART: [art] PUB.Y = 3F65D4B05F63381CDFD3E6746DC90C197D858A9D3DFDC43DA6861FDA3AF064EFBD6FE9E9606BE8B987B1A5FDA0383A71
24,514,740 UART: [art] SIG.R = 83C0C2A6AC9186767E194904268A3982303577E70A1291293813CDA3CDAC12C09503C3A7FBDC858A8381BF1F3483FD69
24,522,067 UART: [art] SIG.S = 4E46146BDF8EF5AD1B48E981A8B6FCDCAB0181DBD06C48F940A8844922846B211C0689D2A9FF9DDF10EE07527E3200C5
25,501,281 UART: Caliptra RT
25,501,976 UART: [state] CFI Enabled
25,619,527 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,108 UART:
192,469 UART: Running Caliptra ROM ...
193,651 UART:
193,802 UART: [state] CFI Enabled
264,972 UART: [state] LifecycleState = Unprovisioned
267,373 UART: [state] DebugLocked = No
269,190 UART: [state] WD Timer not started. Device not locked for debugging
273,011 UART: [kat] SHA2-256
462,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,692 UART: [kat] ++
474,147 UART: [kat] sha1
485,803 UART: [kat] SHA2-256
488,888 UART: [kat] SHA2-384
495,166 UART: [kat] SHA2-512-ACC
497,816 UART: [kat] ECC-384
2,950,837 UART: [kat] HMAC-384Kdf
2,972,801 UART: [kat] LMS
3,504,594 UART: [kat] --
3,508,513 UART: [cold-reset] ++
3,510,010 UART: [fht] FHT @ 0x50003400
3,521,129 UART: [idev] ++
3,521,846 UART: [idev] CDI.KEYID = 6
3,522,762 UART: [idev] SUBJECT.KEYID = 7
3,523,937 UART: [idev] UDS.KEYID = 0
3,524,980 ready_for_fw is high
3,525,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,994 UART: [idev] Erasing UDS.KEYID = 0
6,029,975 UART: [idev] Sha1 KeyId Algorithm
6,053,583 UART: [idev] --
6,058,108 UART: [ldev] ++
6,058,786 UART: [ldev] CDI.KEYID = 6
6,059,670 UART: [ldev] SUBJECT.KEYID = 5
6,060,885 UART: [ldev] AUTHORITY.KEYID = 7
6,062,116 UART: [ldev] FE.KEYID = 1
6,101,164 UART: [ldev] Erasing FE.KEYID = 1
8,604,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,147 UART: [ldev] --
10,414,272 UART: [fwproc] Wait for Commands...
10,416,422 UART: [fwproc] Recv command 0x46574c44
10,418,725 UART: [fwproc] Recv'd Img size: 114448 bytes
13,869,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,589 >>> mbox cmd response: success
14,611,359 UART: [afmc] ++
14,612,068 UART: [afmc] CDI.KEYID = 6
14,613,256 UART: [afmc] SUBJECT.KEYID = 7
14,614,746 UART: [afmc] AUTHORITY.KEYID = 5
17,151,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,413 UART: [afmc] --
18,951,724 UART: [cold-reset] --
18,956,655 UART: [state] Locking Datavault
18,963,644 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,847 UART: [state] Locking ICCM
18,967,571 UART: [exit] Launching FMC @ 0x40000130
18,976,253 UART:
18,976,490 UART: Running Caliptra FMC ...
18,977,597 UART:
18,977,761 UART: [state] CFI Enabled
19,031,688 UART: [fht] FMC Alias Private Key: 7
20,796,071 UART: [art] Extend RT PCRs Done
20,797,287 UART: [art] Lock RT PCRs Done
20,799,177 UART: [art] Populate DV Done
20,804,425 UART: [fht] FMC Alias Private Key: 7
20,806,037 UART: [art] Derive CDI
20,806,859 UART: [art] Store in in slot 0x4
20,864,596 UART: [art] Derive Key Pair
20,865,591 UART: [art] Store priv key in slot 0x5
23,328,407 UART: [art] Derive Key Pair - Done
23,341,452 UART: [art] Signing Cert with AUTHO
23,342,747 UART: RITY.KEYID = 7
25,054,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,632 UART: [art] PUB.X = FD49075B85EB6E3EA13F81A8B25E73E39E8CEFDE898954FA60A1F6F59CFBD763B9F53C36E89AA5F79CEBE3D7A0443FD3
25,062,935 UART: [art] PUB.Y = 86B347DD5BE9A56D1FEFA91CA6F0520E4DF14066F3468A89EA8281E69E92390419F5C6CA67B0F072DD7FE46D5B8D05AF
25,070,160 UART: [art] SIG.R = 46D0B280D96E7795BADB790A9D702131E297B29A47A5061DC2334B4B2361093FA1FD892FF23071981DB85D52438EDCAC
25,077,547 UART: [art] SIG.S = 8017A7E949753ECB324570D6ED3ED434CCA1D4B91A382FEF4BE9FF99849F8F23F8CB117808A7FF430FAB049234700113
26,056,175 UART: Caliptra RT
26,056,882 UART: [state] CFI Enabled
26,221,944 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,437,979 ready_for_fw is high
3,438,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,564 >>> mbox cmd response: success
19,048,351 UART:
19,048,844 UART: Running Caliptra FMC ...
19,049,963 UART:
19,050,146 UART: [state] CFI Enabled
19,113,890 UART: [fht] FMC Alias Private Key: 7
20,878,376 UART: [art] Extend RT PCRs Done
20,879,603 UART: [art] Lock RT PCRs Done
20,881,395 UART: [art] Populate DV Done
20,886,931 UART: [fht] FMC Alias Private Key: 7
20,888,518 UART: [art] Derive CDI
20,889,261 UART: [art] Store in in slot 0x4
20,946,623 UART: [art] Derive Key Pair
20,947,627 UART: [art] Store priv key in slot 0x5
23,410,431 UART: [art] Derive Key Pair - Done
23,423,588 UART: [art] Signing Cert with AUTHO
23,424,889 UART: RITY.KEYID = 7
25,136,048 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,555 UART: [art] PUB.X = 4532B2DA27E94E8454B57669A336AFA2DEF68C0FD3DF01B7F1044863F5FC9E98E4CD804385C3B27902F954166CF0839C
25,144,795 UART: [art] PUB.Y = 407740BBD310B85FA24AF3485650F7992827CBAB689A7CF9B5A367B0753400B8AA8EC06D7A153AF0359F211F6ABC4D75
25,152,055 UART: [art] SIG.R = 3AC27B632AC3C4803E53BCBE7E90C0C38AF57C49FFFC810D9E0AFDBD7CC8DE76A9538DE1DFC7A0DED6233FDF857F08C3
25,159,501 UART: [art] SIG.S = 1987BFC81F5A5D08FF787E83350D2F3DD506626798356ED7BDC6CEAD33C10171CEEFFB8A69CF636F75663C4FDE439A5F
26,137,733 UART: Caliptra RT
26,138,440 UART: [state] CFI Enabled
26,303,354 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,439 UART:
192,849 UART: Running Caliptra ROM ...
193,995 UART:
603,711 UART: [state] CFI Enabled
617,366 UART: [state] LifecycleState = Unprovisioned
619,747 UART: [state] DebugLocked = No
622,691 UART: [state] WD Timer not started. Device not locked for debugging
627,884 UART: [kat] SHA2-256
817,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,555 UART: [kat] ++
829,083 UART: [kat] sha1
840,094 UART: [kat] SHA2-256
843,100 UART: [kat] SHA2-384
848,299 UART: [kat] SHA2-512-ACC
850,865 UART: [kat] ECC-384
3,294,786 UART: [kat] HMAC-384Kdf
3,308,140 UART: [kat] LMS
3,839,903 UART: [kat] --
3,843,468 UART: [cold-reset] ++
3,845,956 UART: [fht] FHT @ 0x50003400
3,857,648 UART: [idev] ++
3,858,387 UART: [idev] CDI.KEYID = 6
3,859,292 UART: [idev] SUBJECT.KEYID = 7
3,860,550 UART: [idev] UDS.KEYID = 0
3,861,472 ready_for_fw is high
3,861,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,240 UART: [idev] Erasing UDS.KEYID = 0
6,335,526 UART: [idev] Sha1 KeyId Algorithm
6,356,754 UART: [idev] --
6,361,658 UART: [ldev] ++
6,362,383 UART: [ldev] CDI.KEYID = 6
6,363,288 UART: [ldev] SUBJECT.KEYID = 5
6,364,441 UART: [ldev] AUTHORITY.KEYID = 7
6,365,663 UART: [ldev] FE.KEYID = 1
6,378,242 UART: [ldev] Erasing FE.KEYID = 1
8,855,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,096 UART: [ldev] --
10,647,488 UART: [fwproc] Wait for Commands...
10,650,221 UART: [fwproc] Recv command 0x46574c44
10,652,680 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,414 >>> mbox cmd response: success
14,840,498 UART: [afmc] ++
14,841,208 UART: [afmc] CDI.KEYID = 6
14,842,365 UART: [afmc] SUBJECT.KEYID = 7
14,843,904 UART: [afmc] AUTHORITY.KEYID = 5
17,346,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,656 UART: [afmc] --
19,143,532 UART: [cold-reset] --
19,148,156 UART: [state] Locking Datavault
19,155,938 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,124 UART: [state] Locking ICCM
19,160,806 UART: [exit] Launching FMC @ 0x40000130
19,169,471 UART:
19,169,699 UART: Running Caliptra FMC ...
19,170,791 UART:
19,170,939 UART: [state] CFI Enabled
19,178,651 UART: [fht] FMC Alias Private Key: 7
20,935,678 UART: [art] Extend RT PCRs Done
20,936,888 UART: [art] Lock RT PCRs Done
20,938,744 UART: [art] Populate DV Done
20,943,930 UART: [fht] FMC Alias Private Key: 7
20,945,407 UART: [art] Derive CDI
20,946,135 UART: [art] Store in in slot 0x4
20,989,112 UART: [art] Derive Key Pair
20,990,153 UART: [art] Store priv key in slot 0x5
23,416,892 UART: [art] Derive Key Pair - Done
23,429,986 UART: [art] Signing Cert with AUTHO
23,431,283 UART: RITY.KEYID = 7
25,137,126 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,627 UART: [art] PUB.X = 3389980876E4A3910D8E3725D45800E420EA3E919EB239071A130590FE77B43D73E82163255F3C252A331EC047676AF4
25,145,861 UART: [art] PUB.Y = E8CE531C43DA1DF72123516005744D159F3793767E0A88D581F314F870234A476EA6E6D0CBDBE9C5B175CA2B21103A6A
25,153,134 UART: [art] SIG.R = 079A5F72ADAC85C6DEF1586D52874F33489A73BED788DE2E5F6670CCFF76A74D37FB960D84A76E71ABA7BD694E76169D
25,160,514 UART: [art] SIG.S = 04A1CF47461D76649466A38805221C1310575DC820FFF7E4A9F0E53AA5D7A0DCBEE9DAF4FCBF5C35C48F228AE1D0D547
26,140,043 UART: Caliptra RT
26,140,733 UART: [state] CFI Enabled
26,257,718 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,755,386 ready_for_fw is high
3,755,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,083 >>> mbox cmd response: success
19,226,088 UART:
19,226,496 UART: Running Caliptra FMC ...
19,227,690 UART:
19,227,848 UART: [state] CFI Enabled
19,235,780 UART: [fht] FMC Alias Private Key: 7
20,993,026 UART: [art] Extend RT PCRs Done
20,994,260 UART: [art] Lock RT PCRs Done
20,995,937 UART: [art] Populate DV Done
21,001,667 UART: [fht] FMC Alias Private Key: 7
21,003,263 UART: [art] Derive CDI
21,004,078 UART: [art] Store in in slot 0x4
21,046,590 UART: [art] Derive Key Pair
21,047,638 UART: [art] Store priv key in slot 0x5
23,473,876 UART: [art] Derive Key Pair - Done
23,486,930 UART: [art] Signing Cert with AUTHO
23,488,234 UART: RITY.KEYID = 7
25,193,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,180 UART: [art] PUB.X = 9F99A3F34AAE0869DF95BB6614D72BD4B39D64A3D99CA34C9A38DBA1A32D848494676E13A3C1A02B1D93B17FAA6C045F
25,202,486 UART: [art] PUB.Y = 5FFC6406B827523DB237E925F5B0E499725A0A1D608701433A6A9F7EB0B271BD97A6B07966DF6178AF137CC1425A93CE
25,209,736 UART: [art] SIG.R = 62E9F474673940FBFFC05B2A86609B3F12149828DECD69B79CFEA54C19978A76AD4B2B090888BA28E9424B9488E35B78
25,217,129 UART: [art] SIG.S = DEE7D87309EE6C349BF7CEB9E0EDF8BD8A40CC87ED8561C723B1BFABCE5E8D8B8732A51F0F44925ABEE8FA25A1E8C7FE
26,195,908 UART: Caliptra RT
26,196,618 UART: [state] CFI Enabled
26,314,339 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,609 UART: [kat] SHA2-256
892,547 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
906,756 UART: [kat] LMS
1,474,952 UART: [kat] --
1,475,749 UART: [cold-reset] ++
1,476,329 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,480,425 ready_for_fw is high
1,480,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,894 UART: [idev] Erasing UDS.KEYID = 0
1,504,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,858 UART: [idev] --
1,513,915 UART: [ldev] ++
1,514,083 UART: [ldev] CDI.KEYID = 6
1,514,446 UART: [ldev] SUBJECT.KEYID = 5
1,514,872 UART: [ldev] AUTHORITY.KEYID = 7
1,515,335 UART: [ldev] FE.KEYID = 1
1,520,421 UART: [ldev] Erasing FE.KEYID = 1
1,545,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,542 UART: [ldev] --
1,585,043 UART: [fwproc] Waiting for Commands...
1,585,710 UART: [fwproc] Received command 0x46574c44
1,586,501 UART: [fwproc] Received Image of size 114448 bytes
2,884,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,208 >>> mbox cmd response: success
3,078,328 UART: [afmc] ++
3,078,496 UART: [afmc] CDI.KEYID = 6
3,078,858 UART: [afmc] SUBJECT.KEYID = 7
3,079,283 UART: [afmc] AUTHORITY.KEYID = 5
3,114,408 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,300 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,693 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,383 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,246 UART: [afmc] --
3,157,310 UART: [cold-reset] --
3,158,208 UART: [state] Locking Datavault
3,159,581 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,185 UART: [state] Locking ICCM
3,160,727 UART: [exit] Launching FMC @ 0x40000130
3,166,056 UART:
3,166,072 UART: Running Caliptra FMC ...
3,166,480 UART:
3,166,534 UART: [state] CFI Enabled
3,176,801 UART: [fht] FMC Alias Private Key: 7
3,284,756 UART: [art] Extend RT PCRs Done
3,285,184 UART: [art] Lock RT PCRs Done
3,286,752 UART: [art] Populate DV Done
3,294,967 UART: [fht] FMC Alias Private Key: 7
3,295,993 UART: [art] Derive CDI
3,296,273 UART: [art] Store in in slot 0x4
3,382,398 UART: [art] Derive Key Pair
3,382,758 UART: [art] Store priv key in slot 0x5
3,396,860 UART: [art] Derive Key Pair - Done
3,411,602 UART: [art] Signing Cert with AUTHO
3,412,082 UART: RITY.KEYID = 7
3,426,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,743 UART: [art] PUB.X = 1CB1202C1669F436E4034C65996D3E4A7D88BF290246998901F3907AF95A1F6DFA23816F53C439407F7B96AB18B988E9
3,434,498 UART: [art] PUB.Y = 120CA960C5349EC1D0B9C71ED80CBCB92338F6865368F53A406243BBA3F36B53D28149B1EDE0046D15419F16DB5AB896
3,441,443 UART: [art] SIG.R = BF2EC374F5A519471E153CEC2499AE4129F8CA26ED9DA9BCB957DB16951CDD508742D3DAA616B04C5DFDB8004C42DEB2
3,448,211 UART: [art] SIG.S = B93486A99EA2D0D8E6F0F4B967030700E36528E46D7A2E4C8D38E51DB6E44861CD51D8C869024747DC115A6DFC283CAC
3,472,235 UART: Caliptra RT
3,472,488 UART: [state] CFI Enabled
3,581,150 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,449 ready_for_fw is high
1,362,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,263 >>> mbox cmd response: success
2,990,353 UART:
2,990,369 UART: Running Caliptra FMC ...
2,990,777 UART:
2,990,831 UART: [state] CFI Enabled
3,001,626 UART: [fht] FMC Alias Private Key: 7
3,109,747 UART: [art] Extend RT PCRs Done
3,110,175 UART: [art] Lock RT PCRs Done
3,111,907 UART: [art] Populate DV Done
3,120,136 UART: [fht] FMC Alias Private Key: 7
3,121,270 UART: [art] Derive CDI
3,121,550 UART: [art] Store in in slot 0x4
3,207,333 UART: [art] Derive Key Pair
3,207,693 UART: [art] Store priv key in slot 0x5
3,220,623 UART: [art] Derive Key Pair - Done
3,235,480 UART: [art] Signing Cert with AUTHO
3,235,960 UART: RITY.KEYID = 7
3,251,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,395 UART: [art] PUB.X = F1854D6DDA78865C2601F5D7F21617D97860BD54D20C3E769C0813452D91B3BE8FEDA9F9FD504271B0E7205F7AA30DB1
3,259,159 UART: [art] PUB.Y = 21461E96C55344296333F567EEDA7C7F71FE2F4EF554704CF04E3BC8B1D0054C3E4D851E8A242A839DC275020437A010
3,266,098 UART: [art] SIG.R = ECBC56C0DC60B912D4FCC981FE027E2D080BAF8EB1AA5ED1BA40A059AF969408E94A5D72511EBF63BDE5327FE6434B90
3,272,878 UART: [art] SIG.S = 1B011E2FE1AA63F88A43BB17EE4ED70FB3F82E6A5AD01EC53FF719B16958E4B0147B00B8DDADB2AC76ED54C994B8607F
3,296,575 UART: Caliptra RT
3,296,828 UART: [state] CFI Enabled
3,405,027 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,220 UART: [kat] SHA2-256
882,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,266 UART: [kat] ++
886,418 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,248 UART: [fht] Storing FHT @ 0x50003400
1,479,827 UART: [idev] ++
1,479,995 UART: [idev] CDI.KEYID = 6
1,480,355 UART: [idev] SUBJECT.KEYID = 7
1,480,779 UART: [idev] UDS.KEYID = 0
1,481,124 ready_for_fw is high
1,481,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,505,453 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,065 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,083 UART: [ldev] --
1,586,458 UART: [fwproc] Waiting for Commands...
1,587,305 UART: [fwproc] Received command 0x46574c44
1,588,096 UART: [fwproc] Received Image of size 114448 bytes
2,887,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,087 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,524 >>> mbox cmd response: success
3,081,658 UART: [afmc] ++
3,081,826 UART: [afmc] CDI.KEYID = 6
3,082,188 UART: [afmc] SUBJECT.KEYID = 7
3,082,613 UART: [afmc] AUTHORITY.KEYID = 5
3,118,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,133 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,823 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,914 UART: [afmc] --
3,161,806 UART: [cold-reset] --
3,162,676 UART: [state] Locking Datavault
3,163,939 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,543 UART: [state] Locking ICCM
3,165,189 UART: [exit] Launching FMC @ 0x40000130
3,170,518 UART:
3,170,534 UART: Running Caliptra FMC ...
3,170,942 UART:
3,171,085 UART: [state] CFI Enabled
3,181,486 UART: [fht] FMC Alias Private Key: 7
3,289,645 UART: [art] Extend RT PCRs Done
3,290,073 UART: [art] Lock RT PCRs Done
3,291,575 UART: [art] Populate DV Done
3,299,874 UART: [fht] FMC Alias Private Key: 7
3,300,912 UART: [art] Derive CDI
3,301,192 UART: [art] Store in in slot 0x4
3,386,815 UART: [art] Derive Key Pair
3,387,175 UART: [art] Store priv key in slot 0x5
3,400,745 UART: [art] Derive Key Pair - Done
3,415,356 UART: [art] Signing Cert with AUTHO
3,415,836 UART: RITY.KEYID = 7
3,431,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,013 UART: [art] PUB.X = 7FAEE7C75B6639D71BD65E36DB0273973CD8EC2BE3B17239E6D2541F23C5A061C498E3BF7022A3C350EC5490A4985798
3,438,784 UART: [art] PUB.Y = 4B253CC41FA3C2146749B172C383352559031E93C31112C3055ECFEB6D17E6E5A90305337BCD77657C38BE9B5606A1ED
3,445,717 UART: [art] SIG.R = 4FCC89FAB2282CAEDFF15C3DBECC6D791612057ABC88C89E67751A7DE6A4F1CD8EA446DCF2EE6485F1B20EDCC0AEA1A0
3,452,515 UART: [art] SIG.S = 11D7934DD2DED348B3A8D0092A37741B238E5C8C35229F5EE06BB757D46A2CEF0991D715418E152DE985207455069095
3,476,201 UART: Caliptra RT
3,476,546 UART: [state] CFI Enabled
3,585,482 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,556 ready_for_fw is high
1,362,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,442 >>> mbox cmd response: success
2,990,930 UART:
2,990,946 UART: Running Caliptra FMC ...
2,991,354 UART:
2,991,497 UART: [state] CFI Enabled
3,001,868 UART: [fht] FMC Alias Private Key: 7
3,109,345 UART: [art] Extend RT PCRs Done
3,109,773 UART: [art] Lock RT PCRs Done
3,111,059 UART: [art] Populate DV Done
3,119,574 UART: [fht] FMC Alias Private Key: 7
3,120,668 UART: [art] Derive CDI
3,120,948 UART: [art] Store in in slot 0x4
3,206,419 UART: [art] Derive Key Pair
3,206,779 UART: [art] Store priv key in slot 0x5
3,220,033 UART: [art] Derive Key Pair - Done
3,234,704 UART: [art] Signing Cert with AUTHO
3,235,184 UART: RITY.KEYID = 7
3,249,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,619 UART: [art] PUB.X = 47EF26FFDE1D3A5144E56BF69A3F61F6284D841B14DA7A8DB921D5D603B166F941A970A5F888784ADD0AC10C8233F437
3,257,388 UART: [art] PUB.Y = C81914CBB5B13B4B6BDDAEDA84D4EBA1E6D8588E9334E079DC8E57CC7DB87CF256440BB0D966965C687247A42F1CC9B5
3,264,353 UART: [art] SIG.R = 5F4F00B671DCC902CD92197110CEDED638017A9A06450020ECEBBB83B1FA41CF95335FEEC0F35D26D62F8F264A439EB5
3,271,084 UART: [art] SIG.S = 607EEDB2D77B149382DA30BA76BB9E2E2950FD57D448D1BF359A7EB051B8C3908B95CB71BB9E4726162DB441AD55DC0E
3,294,984 UART: Caliptra RT
3,295,329 UART: [state] CFI Enabled
3,403,087 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
892,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,043 UART: [kat] ++
897,195 UART: [kat] sha1
901,267 UART: [kat] SHA2-256
903,207 UART: [kat] SHA2-384
906,016 UART: [kat] SHA2-512-ACC
907,917 UART: [kat] ECC-384
917,736 UART: [kat] HMAC-384Kdf
922,188 UART: [kat] LMS
1,170,516 UART: [kat] --
1,171,513 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,600 UART: [idev] ++
1,174,768 UART: [idev] CDI.KEYID = 6
1,175,128 UART: [idev] SUBJECT.KEYID = 7
1,175,552 UART: [idev] UDS.KEYID = 0
1,175,897 ready_for_fw is high
1,175,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,093 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,573 UART: [ldev] ++
1,209,741 UART: [ldev] CDI.KEYID = 6
1,210,104 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,116 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,752 >>> mbox cmd response: success
2,773,926 UART: [afmc] ++
2,774,094 UART: [afmc] CDI.KEYID = 6
2,774,456 UART: [afmc] SUBJECT.KEYID = 7
2,774,881 UART: [afmc] AUTHORITY.KEYID = 5
2,810,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,785 UART: [afmc] --
2,853,707 UART: [cold-reset] --
2,854,567 UART: [state] Locking Datavault
2,855,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,484 UART: [state] Locking ICCM
2,856,928 UART: [exit] Launching FMC @ 0x40000130
2,862,257 UART:
2,862,273 UART: Running Caliptra FMC ...
2,862,681 UART:
2,862,735 UART: [state] CFI Enabled
2,873,676 UART: [fht] FMC Alias Private Key: 7
2,981,549 UART: [art] Extend RT PCRs Done
2,981,977 UART: [art] Lock RT PCRs Done
2,983,329 UART: [art] Populate DV Done
2,991,388 UART: [fht] FMC Alias Private Key: 7
2,992,416 UART: [art] Derive CDI
2,992,696 UART: [art] Store in in slot 0x4
3,078,405 UART: [art] Derive Key Pair
3,078,765 UART: [art] Store priv key in slot 0x5
3,092,643 UART: [art] Derive Key Pair - Done
3,107,691 UART: [art] Signing Cert with AUTHO
3,108,171 UART: RITY.KEYID = 7
3,123,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,754 UART: [art] PUB.X = 12C40BC735C64D414C62E4A689BD60DD24F7BF00FB935A832D8ACAC62A3DB7D910DCDD35CD981BB2DCF1CF5FDB50BB77
3,131,527 UART: [art] PUB.Y = 714BA471FCB4BE270ACDFFA017094A30A5B591AF985851C5C4FE13E42C1344F1A25C8CC439692D33C2673B160C08A0FD
3,138,475 UART: [art] SIG.R = AB483EF741B253DA0CB8FE504FE320B1B39FC3CBC547493F38BD136552B1EBE4DF52B5EA16661B89E2B431274470848D
3,145,252 UART: [art] SIG.S = 8797D117B8BD4C8C7F715D97E225A0183CB0FAFF9645B8355A42ACFDD45D86667CBA9E8519F29D69B9E69A4938E7ED5C
3,169,127 UART: Caliptra RT
3,169,380 UART: [state] CFI Enabled
3,276,754 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 ready_for_fw is high
1,060,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,953 >>> mbox cmd response: success
2,689,983 UART:
2,689,999 UART: Running Caliptra FMC ...
2,690,407 UART:
2,690,461 UART: [state] CFI Enabled
2,700,952 UART: [fht] FMC Alias Private Key: 7
2,808,423 UART: [art] Extend RT PCRs Done
2,808,851 UART: [art] Lock RT PCRs Done
2,810,407 UART: [art] Populate DV Done
2,818,730 UART: [fht] FMC Alias Private Key: 7
2,819,890 UART: [art] Derive CDI
2,820,170 UART: [art] Store in in slot 0x4
2,905,587 UART: [art] Derive Key Pair
2,905,947 UART: [art] Store priv key in slot 0x5
2,918,973 UART: [art] Derive Key Pair - Done
2,934,213 UART: [art] Signing Cert with AUTHO
2,934,693 UART: RITY.KEYID = 7
2,949,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,580 UART: [art] PUB.X = EAAC6D70A44A4D1BF913FDCA562213EE8564C6EF2501DA2555EF74194395EABF5BE9901DCFABCEF3B5CABCA3CB5560D7
2,957,377 UART: [art] PUB.Y = C46123D15EE87C4E671A37209741604CEE259FBC3ABF2DAEF0D4865A05592CC71FC0D57FC9A2111A2D69C7B959399907
2,964,327 UART: [art] SIG.R = 095C46E27312DE0DC0670484A1950CC570743864CDE3E1B916B63A9D509421C9ABC45FB6E664A1A46E3EC5D85870361E
2,971,085 UART: [art] SIG.S = 7243C451A9191BAE49D8A99D66769D0FB752120FBF233FCDF6DF2927107F3696320F1E6CCE6915472CDE31DB80D1DA8B
2,994,959 UART: Caliptra RT
2,995,212 UART: [state] CFI Enabled
3,103,127 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,071 UART: [state] LifecycleState = Unprovisioned
86,726 UART: [state] DebugLocked = No
87,392 UART: [state] WD Timer not started. Device not locked for debugging
88,681 UART: [kat] SHA2-256
894,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,456 UART: [kat] ++
898,608 UART: [kat] sha1
902,798 UART: [kat] SHA2-256
904,738 UART: [kat] SHA2-384
907,425 UART: [kat] SHA2-512-ACC
909,326 UART: [kat] ECC-384
919,505 UART: [kat] HMAC-384Kdf
924,097 UART: [kat] LMS
1,172,425 UART: [kat] --
1,173,172 UART: [cold-reset] ++
1,173,510 UART: [fht] FHT @ 0x50003400
1,176,123 UART: [idev] ++
1,176,291 UART: [idev] CDI.KEYID = 6
1,176,651 UART: [idev] SUBJECT.KEYID = 7
1,177,075 UART: [idev] UDS.KEYID = 0
1,177,420 ready_for_fw is high
1,177,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,193 UART: [idev] Erasing UDS.KEYID = 0
1,202,040 UART: [idev] Sha1 KeyId Algorithm
1,210,470 UART: [idev] --
1,211,502 UART: [ldev] ++
1,211,670 UART: [ldev] CDI.KEYID = 6
1,212,033 UART: [ldev] SUBJECT.KEYID = 5
1,212,459 UART: [ldev] AUTHORITY.KEYID = 7
1,212,922 UART: [ldev] FE.KEYID = 1
1,218,204 UART: [ldev] Erasing FE.KEYID = 1
1,244,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,660 UART: [ldev] --
1,284,019 UART: [fwproc] Wait for Commands...
1,284,599 UART: [fwproc] Recv command 0x46574c44
1,285,327 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,743 >>> mbox cmd response: success
2,777,927 UART: [afmc] ++
2,778,095 UART: [afmc] CDI.KEYID = 6
2,778,457 UART: [afmc] SUBJECT.KEYID = 7
2,778,882 UART: [afmc] AUTHORITY.KEYID = 5
2,814,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,575 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,922 UART: [afmc] --
2,857,996 UART: [cold-reset] --
2,858,966 UART: [state] Locking Datavault
2,860,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,671 UART: [state] Locking ICCM
2,861,335 UART: [exit] Launching FMC @ 0x40000130
2,866,664 UART:
2,866,680 UART: Running Caliptra FMC ...
2,867,088 UART:
2,867,231 UART: [state] CFI Enabled
2,877,970 UART: [fht] FMC Alias Private Key: 7
2,985,483 UART: [art] Extend RT PCRs Done
2,985,911 UART: [art] Lock RT PCRs Done
2,987,733 UART: [art] Populate DV Done
2,995,778 UART: [fht] FMC Alias Private Key: 7
2,996,882 UART: [art] Derive CDI
2,997,162 UART: [art] Store in in slot 0x4
3,082,539 UART: [art] Derive Key Pair
3,082,899 UART: [art] Store priv key in slot 0x5
3,096,193 UART: [art] Derive Key Pair - Done
3,111,023 UART: [art] Signing Cert with AUTHO
3,111,503 UART: RITY.KEYID = 7
3,126,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,474 UART: [art] PUB.X = C91F930408B34B8264632264574BA25142558D840AFBC6B620BADB201C63C882B2295522271C37BBA9BE1B1155595FA4
3,134,229 UART: [art] PUB.Y = 584849CC95A92D1993A6F0EB622C80885EFE0E96E5B2F4BFD810E35DEA3523979853C79271F425849C6AB19E23016374
3,141,169 UART: [art] SIG.R = 6272DD4493AEE5CCB1CA2224E30F9399CA213C2B073AFD766EEABC284EB1B555F47383509AA0F15FB7ADE7D8DF404F43
3,147,951 UART: [art] SIG.S = 6F455BB9678A96E42F7F7A4AEF991B5EC7D728EBCEF57788C335BDD2E99D77539580F18144090CF1A1298F4D84243C98
3,172,146 UART: Caliptra RT
3,172,491 UART: [state] CFI Enabled
3,280,004 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,764 ready_for_fw is high
1,060,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,078 >>> mbox cmd response: success
2,691,318 UART:
2,691,334 UART: Running Caliptra FMC ...
2,691,742 UART:
2,691,885 UART: [state] CFI Enabled
2,702,614 UART: [fht] FMC Alias Private Key: 7
2,810,979 UART: [art] Extend RT PCRs Done
2,811,407 UART: [art] Lock RT PCRs Done
2,812,621 UART: [art] Populate DV Done
2,820,680 UART: [fht] FMC Alias Private Key: 7
2,821,840 UART: [art] Derive CDI
2,822,120 UART: [art] Store in in slot 0x4
2,907,807 UART: [art] Derive Key Pair
2,908,167 UART: [art] Store priv key in slot 0x5
2,921,821 UART: [art] Derive Key Pair - Done
2,936,716 UART: [art] Signing Cert with AUTHO
2,937,196 UART: RITY.KEYID = 7
2,952,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,357 UART: [art] PUB.X = 09FAAF8FFBF0BEE6E22B0582CFD8652023C9758CA89A469D5B66E8E24EE465B30FEE69B5FB5B3DAB1B9E7434565A0931
2,960,133 UART: [art] PUB.Y = 5B7956C06F7A696BECB5F57E908014273FBE806F95EFB74B3931F5F5FF84F0E52266FF2FC093B0C5BC25556663B48524
2,967,087 UART: [art] SIG.R = FD8F1AFF0EB56013C09BE5C45522C4592B34C9F7470292B7D4236EC376138BECA3AB8B2F99EA4F6015AE492F0246815C
2,973,856 UART: [art] SIG.S = 59C6FE9A9E2E5E5BEED5069B0BC97C8A0E2AC96DC4B04D95A499368255AA7632D4B320C523048C0C1C2D5C59D22FE259
2,997,992 UART: Caliptra RT
2,998,337 UART: [state] CFI Enabled
3,106,676 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,621 UART: [idev] ++
1,172,789 UART: [idev] CDI.KEYID = 6
1,173,150 UART: [idev] SUBJECT.KEYID = 7
1,173,575 UART: [idev] UDS.KEYID = 0
1,173,921 ready_for_fw is high
1,173,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,490 UART: [ldev] --
1,280,936 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,444 >>> mbox cmd response: success
2,774,637 UART: [afmc] ++
2,774,805 UART: [afmc] CDI.KEYID = 6
2,775,168 UART: [afmc] SUBJECT.KEYID = 7
2,775,594 UART: [afmc] AUTHORITY.KEYID = 5
2,810,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,832 UART: [afmc] --
2,853,880 UART: [cold-reset] --
2,854,638 UART: [state] Locking Datavault
2,855,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,431 UART: [state] Locking ICCM
2,856,929 UART: [exit] Launching FMC @ 0x40000130
2,862,258 UART:
2,862,274 UART: Running Caliptra FMC ...
2,862,682 UART:
2,862,736 UART: [state] CFI Enabled
2,873,291 UART: [fht] FMC Alias Private Key: 7
2,981,088 UART: [art] Extend RT PCRs Done
2,981,516 UART: [art] Lock RT PCRs Done
2,983,036 UART: [art] Populate DV Done
2,991,207 UART: [fht] FMC Alias Private Key: 7
2,992,153 UART: [art] Derive CDI
2,992,433 UART: [art] Store in in slot 0x4
3,078,104 UART: [art] Derive Key Pair
3,078,464 UART: [art] Store priv key in slot 0x5
3,091,996 UART: [art] Derive Key Pair - Done
3,106,445 UART: [art] Signing Cert with AUTHO
3,106,925 UART: RITY.KEYID = 7
3,122,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,860 UART: [art] PUB.X = 65189106E563A8D898A122BE9E278D806CDBDDA72694A8FB677162724493DD60CE7A0B4EC09095D042638E70A5EE1111
3,129,622 UART: [art] PUB.Y = 463AE825DC60F0967FF6D7D3822BE75AC31559157E5515DFE7FC6E8B71583E769F5F1A7DB344AAA348BA49BB5D7C0E95
3,136,581 UART: [art] SIG.R = 94E0217F422CC34AD112CA9D2E481DCAB5AAEFBBB329799E64106E8E761A0F1E537A12BE64429E3492733DF615EB649D
3,143,358 UART: [art] SIG.S = F5F0C89A54CACED3329088D4C4C6689A2AB4A0D15160205273FFE5E96CDC1BD51C4A746595D5DD1962BF3FE11B2A117F
3,167,117 UART: Caliptra RT
3,167,370 UART: [state] CFI Enabled
3,275,406 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,978 ready_for_fw is high
1,056,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,362 >>> mbox cmd response: success
2,685,684 UART:
2,685,700 UART: Running Caliptra FMC ...
2,686,108 UART:
2,686,162 UART: [state] CFI Enabled
2,696,655 UART: [fht] FMC Alias Private Key: 7
2,804,062 UART: [art] Extend RT PCRs Done
2,804,490 UART: [art] Lock RT PCRs Done
2,805,990 UART: [art] Populate DV Done
2,814,213 UART: [fht] FMC Alias Private Key: 7
2,815,361 UART: [art] Derive CDI
2,815,641 UART: [art] Store in in slot 0x4
2,901,186 UART: [art] Derive Key Pair
2,901,546 UART: [art] Store priv key in slot 0x5
2,914,576 UART: [art] Derive Key Pair - Done
2,929,621 UART: [art] Signing Cert with AUTHO
2,930,101 UART: RITY.KEYID = 7
2,945,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,072 UART: [art] PUB.X = FFFFC670158F5F5480D2F554C6D8F997090755968BE7678594410A47F213CBEFFE491B21F820CD4F0E93344A6923C1BB
2,952,832 UART: [art] PUB.Y = A5144026CC779AF485C52F9E38631BA28584EFEB2951859544CDC74E0233CFFEE3896DC92AD8C5B78F3D31445F864944
2,959,781 UART: [art] SIG.R = F67133E97559B400DC083FE13CABE2E06FE22F96CF1163D0093C691715B74567450C01351F6CF5F80868D6B30C16E3CF
2,966,511 UART: [art] SIG.S = D427BF957F42F969DBFEFA1FBF2DE598661BF18CE41B362C82C2C864FB94C2E2AC2104A6F37A685581E00F8B40E4AA40
2,989,658 UART: Caliptra RT
2,989,911 UART: [state] CFI Enabled
3,097,055 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,962 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,955 >>> mbox cmd response: success
2,777,020 UART: [afmc] ++
2,777,188 UART: [afmc] CDI.KEYID = 6
2,777,551 UART: [afmc] SUBJECT.KEYID = 7
2,777,977 UART: [afmc] AUTHORITY.KEYID = 5
2,813,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,405 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,124 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,133 UART: [afmc] --
2,857,171 UART: [cold-reset] --
2,857,877 UART: [state] Locking Datavault
2,859,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,736 UART: [state] Locking ICCM
2,860,228 UART: [exit] Launching FMC @ 0x40000130
2,865,557 UART:
2,865,573 UART: Running Caliptra FMC ...
2,865,981 UART:
2,866,124 UART: [state] CFI Enabled
2,876,747 UART: [fht] FMC Alias Private Key: 7
2,984,962 UART: [art] Extend RT PCRs Done
2,985,390 UART: [art] Lock RT PCRs Done
2,986,964 UART: [art] Populate DV Done
2,995,225 UART: [fht] FMC Alias Private Key: 7
2,996,271 UART: [art] Derive CDI
2,996,551 UART: [art] Store in in slot 0x4
3,082,372 UART: [art] Derive Key Pair
3,082,732 UART: [art] Store priv key in slot 0x5
3,095,926 UART: [art] Derive Key Pair - Done
3,110,607 UART: [art] Signing Cert with AUTHO
3,111,087 UART: RITY.KEYID = 7
3,126,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,384 UART: [art] PUB.X = 97A583BC2CF0E5C97192B9122CD39ABF82D065EB02C2FF0608DE2C4D80AE335931F1B313E22334EB5B958C2A27CC7FAC
3,134,159 UART: [art] PUB.Y = 1BB4DC855CA9C22093C3C48F9E454E45158D5652A63BC2DDA88ECAD04846B103A06A3BBFF6654BCBF9ED9C68C3DAC243
3,141,126 UART: [art] SIG.R = C921CC45F69CDBD3E162342EACC64057ECCC6B4583903C9CCFCC23EB10212CAC2AE8E8D0708063BE22177D19D7E537ED
3,147,914 UART: [art] SIG.S = E0760FF1E2F8E535766961DB878867EF1DD9AB35119F78E94812DD9E208E40BB069EF47F215B6247C8F3F7DF0B053D1E
3,171,739 UART: Caliptra RT
3,172,084 UART: [state] CFI Enabled
3,279,110 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,529 ready_for_fw is high
1,056,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,839 >>> mbox cmd response: success
2,685,109 UART:
2,685,125 UART: Running Caliptra FMC ...
2,685,533 UART:
2,685,676 UART: [state] CFI Enabled
2,696,105 UART: [fht] FMC Alias Private Key: 7
2,804,306 UART: [art] Extend RT PCRs Done
2,804,734 UART: [art] Lock RT PCRs Done
2,806,252 UART: [art] Populate DV Done
2,814,617 UART: [fht] FMC Alias Private Key: 7
2,815,785 UART: [art] Derive CDI
2,816,065 UART: [art] Store in in slot 0x4
2,901,936 UART: [art] Derive Key Pair
2,902,296 UART: [art] Store priv key in slot 0x5
2,915,458 UART: [art] Derive Key Pair - Done
2,930,229 UART: [art] Signing Cert with AUTHO
2,930,709 UART: RITY.KEYID = 7
2,945,831 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,596 UART: [art] PUB.X = 5887F6EDC19F49315C3CD99CDA2A506A8E32D60CC480BB4F3E61256C717E31BD73DC55DB9E1EAF6A78222240B390A24D
2,953,375 UART: [art] PUB.Y = 610E68A06BE7313778BD00094AAFC1BE2F6F3993BF3320B5DE1621088188FA059A020342B0B50BDE42EA28D3C6AA31C2
2,960,288 UART: [art] SIG.R = 6AA07BF3184F229C5EF4988D80425F34599B200ECCF1FCC991FC79161EBA588DFAB410377057C4B8F2DEB55928B9BABA
2,967,069 UART: [art] SIG.S = C4F735B923C2AA376E51319316E2C506169C3811BBF15EB54202753B3058A2F916D2C6F37A877DEF8E279C6EF4EC20A8
2,990,700 UART: Caliptra RT
2,991,045 UART: [state] CFI Enabled
3,099,134 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
Truncated 1347973 bytes from beginning
UART: [art] Extend RT PCRs Done
3,633,844,303 UART: [art] Lock RT PCRs Done
3,633,845,627 UART: [art] Populate DV Done
3,633,851,089 UART: [fht] FMC Alias Private Key: 7
3,633,852,752 UART: [art] Derive CDI
3,633,853,495 UART: [art] Store in in slot 0x4
3,633,912,639 UART: [art] Derive Key Pair
3,633,913,678 UART: [art] Store priv key in slot 0x5
3,637,205,968 UART: [art] Derive Key Pair - Done
3,637,218,589 UART: [art] Signing Cert with AUTHO
3,637,219,900 UART: RITY.KEYID = 7
3,639,508,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,639,509,645 UART: [art] PUB.X = 185E3BEDD678E27FBFF4E9554968114C1919B01D3323F63DF9DFD9405EEE847E3589BA1809B99B6931D7FB56D633200E
3,639,516,941 UART: [art] PUB.Y = 870B1832B01DE0A55A7079CB35C10972268371C6831768D6ADF3BCB208107603BC93C38DF0215F1004EDBFEF37A60738
3,639,524,134 UART: [art] SIG.R = D8B9E127826C665F30B869F0A84FD71C07B2CD451291154A7D9DD328CCE54FE81448FB553F87239F761F310EE5EA66D1
3,639,531,484 UART: [art] SIG.S = F836DAE17C8CD698DBD25E61C347B809F4124D26BBC61E1EDFECA304BDACDBBE9BBD3057852EE42F46952FDB3F65F239
3,640,836,860 UART: Caliptra RT
3,640,837,550 UART: [state] CFI Enabled
3,641,171,898 UART: [rt] RT listening for mailbox commands...
3,641,173,768 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,641,318,691 UART:
3,641,319,014 UART: Running Caliptra ROM ...
3,641,320,150 UART:
3,641,320,316 UART: [state] CFI Enabled
3,641,386,879 UART: [state] LifecycleState = Unprovisioned
3,641,388,817 UART: [state] DebugLocked = No
3,641,390,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,641,394,302 UART: [kat] SHA2-256
3,641,564,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,641,574,492 UART: [kat] ++
3,641,574,982 UART: [kat] sha1
3,641,584,845 UART: [kat] SHA2-256
3,641,587,538 UART: [kat] SHA2-384
3,641,593,084 UART: [kat] SHA2-512-ACC
3,641,595,476 UART: [kat] ECC-384
3,643,889,740 UART: [kat] HMAC-384Kdf
3,643,902,341 UART: [kat] LMS
3,645,092,661 UART: [kat] --
3,645,096,077 UART: [update-reset] ++
3,649,236,836 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,649,239,861 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,649,622,160 >>> mbox cmd response: success
3,649,622,832 UART: [update-reset] Copying MAN_2 To MAN_1
3,649,645,244 UART: [update-reset Success] --
3,649,649,811 UART: [state] Locking Datavault
3,649,652,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,649,654,281 UART: [state] Locking ICCM
3,649,655,438 UART: [exit] Launching FMC @ 0x40000130
3,649,663,887 UART:
3,649,664,134 UART: Running Caliptra FMC ...
3,649,665,241 UART:
3,649,665,401 UART: [state] CFI Enabled
3,649,758,785 UART: [art] Extend RT PCRs Done
3,649,759,979 UART: [art] Lock RT PCRs Done
3,649,761,442 UART: [art] Populate DV Done
3,649,767,180 UART: [fht] FMC Alias Private Key: 7
3,649,768,896 UART: [art] Derive CDI
3,649,769,714 UART: [art] Store in in slot 0x4
3,649,827,620 UART: [art] Derive Key Pair
3,649,828,641 UART: [art] Store priv key in slot 0x5
3,653,121,911 UART: [art] Derive Key Pair - Done
3,653,134,962 UART: [art] Signing Cert with AUTHO
3,653,136,266 UART: RITY.KEYID = 7
3,655,422,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,424,241 UART: [art] PUB.X = A9F096406FA65F98A082B3FEBE8060F357D9EB71EC14705C6C6451635462A7A75B0962B7177F227A8856A91CACF81F1E
3,655,431,498 UART: [art] PUB.Y = 46D8C162D395E84956FBAFB00E5ECE1FD3D311DC4A4126CDF2788670E5F7D6F3B6BBB5EF75DEABC46006D137C4EE3712
3,655,438,737 UART: [art] SIG.R = F74C39085C4C475D10E082F78366EB77FE60295C4BD1818410C4066A0E866D8FB13591DBBCABDD3379B2DFD3C6E3B694
3,655,446,106 UART: [art] SIG.S = 28A7606DF162F1D4475CCC0D32FF5A1BDB919D18CF1BF0938955C82FE15711250367A65E1EB9138575A70AD3DC523405
3,656,751,560 UART: Caliptra RT
3,656,752,278 UART: [state] CFI Enabled
3,657,085,986 UART: [rt] RT listening for mailbox commands...
3,657,087,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,657,232,226 UART:
3,657,232,538 UART: Running Caliptra ROM ...
3,657,233,576 UART:
3,657,233,751 UART: [state] CFI Enabled
3,657,304,365 UART: [state] LifecycleState = Unprovisioned
3,657,306,298 UART: [state] DebugLocked = No
3,657,308,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,657,314,280 UART: [kat] SHA2-256
3,657,483,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,657,494,484 UART: [kat] ++
3,657,494,944 UART: [kat] sha1
3,657,505,723 UART: [kat] SHA2-256
3,657,508,417 UART: [kat] SHA2-384
3,657,513,373 UART: [kat] SHA2-512-ACC
3,657,515,763 UART: [kat] ECC-384
3,659,805,005 UART: [kat] HMAC-384Kdf
3,659,836,413 UART: [kat] LMS
3,661,026,742 UART: [kat] --
3,661,032,377 UART: [update-reset] ++
3,665,168,156 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,665,172,308 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,665,554,578 >>> mbox cmd response: success
3,665,556,033 UART: [update-reset] Copying MAN_2 To MAN_1
3,665,578,425 UART: [update-reset Success] --
3,665,583,846 UART: [state] Locking Datavault
3,665,586,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,665,588,488 UART: [state] Locking ICCM
3,665,590,494 UART: [exit] Launching FMC @ 0x40000130
3,665,598,945 UART:
3,665,599,196 UART: Running Caliptra FMC ...
3,665,600,255 UART:
3,665,600,414 UART: [state] CFI Enabled
3,665,694,958 UART: [art] Extend RT PCRs Done
3,665,696,140 UART: [art] Lock RT PCRs Done
3,665,697,518 UART: [art] Populate DV Done
3,665,702,845 UART: [fht] FMC Alias Private Key: 7
3,665,704,443 UART: [art] Derive CDI
3,665,705,187 UART: [art] Store in in slot 0x4
3,665,763,468 UART: [art] Derive Key Pair
3,665,764,507 UART: [art] Store priv key in slot 0x5
3,669,056,486 UART: [art] Derive Key Pair - Done
3,669,069,930 UART: [art] Signing Cert with AUTHO
3,669,071,249 UART: RITY.KEYID = 7
3,671,358,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,360,167 UART: [art] PUB.X = 185E3BEDD678E27FBFF4E9554968114C1919B01D3323F63DF9DFD9405EEE847E3589BA1809B99B6931D7FB56D633200E
3,671,367,382 UART: [art] PUB.Y = 870B1832B01DE0A55A7079CB35C10972268371C6831768D6ADF3BCB208107603BC93C38DF0215F1004EDBFEF37A60738
3,671,374,623 UART: [art] SIG.R = D8B9E127826C665F30B869F0A84FD71C07B2CD451291154A7D9DD328CCE54FE81448FB553F87239F761F310EE5EA66D1
3,671,382,032 UART: [art] SIG.S = F836DAE17C8CD698DBD25E61C347B809F4124D26BBC61E1EDFECA304BDACDBBE9BBD3057852EE42F46952FDB3F65F239
3,672,687,340 UART: Caliptra RT
3,672,688,052 UART: [state] CFI Enabled
3,673,017,550 UART: [rt] RT listening for mailbox commands...
3,673,019,442 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,673,164,127 UART:
3,673,164,438 UART: Running Caliptra ROM ...
3,673,165,556 UART:
3,673,165,723 UART: [state] CFI Enabled
3,673,232,976 UART: [state] LifecycleState = Unprovisioned
3,673,234,908 UART: [state] DebugLocked = No
3,673,237,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,673,242,174 UART: [kat] SHA2-256
3,673,411,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,673,422,356 UART: [kat] ++
3,673,422,895 UART: [kat] sha1
3,673,435,037 UART: [kat] SHA2-256
3,673,437,715 UART: [kat] SHA2-384
3,673,442,951 UART: [kat] SHA2-512-ACC
3,673,445,302 UART: [kat] ECC-384
3,675,736,716 UART: [kat] HMAC-384Kdf
3,675,768,332 UART: [kat] LMS
3,676,958,684 UART: [kat] --
3,676,964,373 UART: [update-reset] ++
3,681,106,323 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,681,109,343 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,681,491,592 >>> mbox cmd response: success
3,681,493,011 UART: [update-reset] Copying MAN_2 To MAN_1
3,681,515,468 UART: [update-reset Success] --
3,681,517,638 UART: [state] Locking Datavault
3,681,520,319 UART: [state] Locking PCR0, PCR1 and PCR31
3,681,522,030 UART: [state] Locking ICCM
3,681,523,704 UART: [exit] Launching FMC @ 0x40000130
3,681,532,161 UART:
3,681,532,403 UART: Running Caliptra FMC ...
3,681,533,509 UART:
3,681,533,693 UART: [state] CFI Enabled
3,681,623,704 UART: [art] Extend RT PCRs Done
3,681,624,895 UART: [art] Lock RT PCRs Done
3,681,626,683 UART: [art] Populate DV Done
3,681,632,262 UART: [fht] FMC Alias Private Key: 7
3,681,633,798 UART: [art] Derive CDI
3,681,634,614 UART: [art] Store in in slot 0x4
3,681,692,734 UART: [art] Derive Key Pair
3,681,693,773 UART: [art] Store priv key in slot 0x5
3,684,986,401 UART: [art] Derive Key Pair - Done
3,684,999,294 UART: [art] Signing Cert with AUTHO
3,685,000,606 UART: RITY.KEYID = 7
3,687,287,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,687,288,609 UART: [art] PUB.X = A9F096406FA65F98A082B3FEBE8060F357D9EB71EC14705C6C6451635462A7A75B0962B7177F227A8856A91CACF81F1E
3,687,295,825 UART: [art] PUB.Y = 46D8C162D395E84956FBAFB00E5ECE1FD3D311DC4A4126CDF2788670E5F7D6F3B6BBB5EF75DEABC46006D137C4EE3712
3,687,303,121 UART: [art] SIG.R = F74C39085C4C475D10E082F78366EB77FE60295C4BD1818410C4066A0E866D8FB13591DBBCABDD3379B2DFD3C6E3B694
3,687,310,498 UART: [art] SIG.S = 28A7606DF162F1D4475CCC0D32FF5A1BDB919D18CF1BF0938955C82FE15711250367A65E1EB9138575A70AD3DC523405
3,688,615,289 UART: Caliptra RT
3,688,615,983 UART: [state] CFI Enabled
3,688,944,261 UART: [rt] RT listening for mailbox commands...
3,688,946,145 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,689,090,728 UART:
3,689,091,046 UART: Running Caliptra ROM ...
3,689,092,172 UART:
3,689,092,346 UART: [state] CFI Enabled
3,689,161,902 UART: [state] LifecycleState = Unprovisioned
3,689,163,841 UART: [state] DebugLocked = No
3,689,165,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,689,171,172 UART: [kat] SHA2-256
3,689,340,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,689,351,348 UART: [kat] ++
3,689,351,838 UART: [kat] sha1
3,689,363,480 UART: [kat] SHA2-256
3,689,366,145 UART: [kat] SHA2-384
3,689,371,811 UART: [kat] SHA2-512-ACC
3,689,374,165 UART: [kat] ECC-384
3,691,665,295 UART: [kat] HMAC-384Kdf
3,691,697,274 UART: [kat] LMS
3,692,887,605 UART: [kat] --
3,692,892,299 UART: [update-reset] ++
3,697,028,987 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,697,032,493 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,697,414,786 >>> mbox cmd response: success
3,697,416,697 UART: [update-reset] Copying MAN_2 To MAN_1
3,697,439,103 UART: [update-reset Success] --
3,697,444,680 UART: [state] Locking Datavault
3,697,447,464 UART: [state] Locking PCR0, PCR1 and PCR31
3,697,449,174 UART: [state] Locking ICCM
3,697,451,973 UART: [exit] Launching FMC @ 0x40000130
3,697,460,427 UART:
3,697,460,678 UART: Running Caliptra FMC ...
3,697,461,787 UART:
3,697,461,954 UART: [state] CFI Enabled
3,697,552,939 UART: [art] Extend RT PCRs Done
3,697,554,129 UART: [art] Lock RT PCRs Done
3,697,555,480 UART: [art] Populate DV Done
3,697,560,996 UART: [fht] FMC Alias Private Key: 7
3,697,562,700 UART: [art] Derive CDI
3,697,563,520 UART: [art] Store in in slot 0x4
3,697,621,700 UART: [art] Derive Key Pair
3,697,622,745 UART: [art] Store priv key in slot 0x5
3,700,915,293 UART: [art] Derive Key Pair - Done
3,700,927,911 UART: [art] Signing Cert with AUTHO
3,700,929,218 UART: RITY.KEYID = 7
3,703,216,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,703,217,766 UART: [art] PUB.X = 185E3BEDD678E27FBFF4E9554968114C1919B01D3323F63DF9DFD9405EEE847E3589BA1809B99B6931D7FB56D633200E
3,703,225,033 UART: [art] PUB.Y = 870B1832B01DE0A55A7079CB35C10972268371C6831768D6ADF3BCB208107603BC93C38DF0215F1004EDBFEF37A60738
3,703,232,232 UART: [art] SIG.R = D8B9E127826C665F30B869F0A84FD71C07B2CD451291154A7D9DD328CCE54FE81448FB553F87239F761F310EE5EA66D1
3,703,239,582 UART: [art] SIG.S = F836DAE17C8CD698DBD25E61C347B809F4124D26BBC61E1EDFECA304BDACDBBE9BBD3057852EE42F46952FDB3F65F239
3,704,544,747 UART: Caliptra RT
3,704,545,468 UART: [state] CFI Enabled
3,704,895,534 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 400.32s
Truncated 716409 bytes from beginning
590A4B33765E52741B47D7902413C9A
3,704,904,971 UART: [art] SIG.R = 1C71D111958F759473CA880BD65222BBA5359C09050EC0DFA7980DAF71DA539F6B5FE7F8FCF3C16FD219B10035ED6DAC
3,704,912,409 UART: [art] SIG.S = 246EBDE6C10DC4559366D646BBDE2C6675F0FE6A444D74944A8C05D4776C7DF2FB31243D81A9BE30B8C1059D04FE38B8
3,706,217,509 UART: Caliptra RT
3,706,218,219 UART: [state] CFI Enabled
3,706,545,785 UART: [rt] RT listening for mailbox commands...
3,706,547,688 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,715,293,279 >>> mbox cmd response: success
3,715,326,007 UART:
3,715,326,328 UART: Running Caliptra FMC ...
3,715,327,382 UART:
3,715,327,539 UART: [state] CFI Enabled
3,715,415,819 UART: [art] Extend RT PCRs Done
3,715,417,008 UART: [art] Lock RT PCRs Done
3,715,418,772 UART: [art] Populate DV Done
3,715,424,027 UART: [fht] FMC Alias Private Key: 7
3,715,425,733 UART: [art] Derive CDI
3,715,426,475 UART: [art] Store in in slot 0x4
3,715,485,191 UART: [art] Derive Key Pair
3,715,486,235 UART: [art] Store priv key in slot 0x5
3,718,778,874 UART: [art] Derive Key Pair - Done
3,718,791,944 UART: [art] Signing Cert with AUTHO
3,718,793,278 UART: RITY.KEYID = 7
3,721,081,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,082,541 UART: [art] PUB.X = 9643ED228F58C3903374713F8AA80EFDBF2A9727C9CF86BF49F8CE6E8592411F1BB1707C9E29B1E7DE183FA3D9BD8C2B
3,721,089,813 UART: [art] PUB.Y = AED8846E93D1C81D151CAAD8B903911C709804680374E9A1DADF1AE37BBE63DC87A520575E97504D2F1928D1AAB287EB
3,721,097,012 UART: [art] SIG.R = 387A67A7B9D45C55299218F5C6FDE8B61ACE4A7115D7CC693F9D22682D40A25952C223C12718B6210F55A96C848F39D5
3,721,104,369 UART: [art] SIG.S = 181D2AFBFB03A0EECD1BC31CEAA12420259A5684AE1E02293D55D58AE8E091B57F6823C79C571863A2F817DC816E9C8E
3,722,409,337 UART: Caliptra RT
3,722,410,042 UART: [state] CFI Enabled
3,722,746,141 UART: [rt] RT listening for mailbox commands...
3,722,748,034 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,731,482,298 >>> mbox cmd response: success
3,731,518,851 UART:
3,731,519,126 UART: Running Caliptra FMC ...
3,731,520,242 UART:
3,731,520,409 UART: [state] CFI Enabled
3,731,624,218 UART: [art] Extend RT PCRs Done
3,731,625,428 UART: [art] Lock RT PCRs Done
3,731,626,840 UART: [art] Populate DV Done
3,731,632,532 UART: [fht] FMC Alias Private Key: 7
3,731,634,172 UART: [art] Derive CDI
3,731,635,001 UART: [art] Store in in slot 0x4
3,731,693,295 UART: [art] Derive Key Pair
3,731,694,298 UART: [art] Store priv key in slot 0x5
3,734,986,663 UART: [art] Derive Key Pair - Done
3,734,999,824 UART: [art] Signing Cert with AUTHO
3,735,001,157 UART: RITY.KEYID = 7
3,737,289,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,290,545 UART: [art] PUB.X = 5ABB049A884F4A5B490D3F0E159CD8C765B804E7265DEEB8B6C2B09E6BDB8A7D40C5373A411AED5190E985C49541C2B0
3,737,297,801 UART: [art] PUB.Y = E2B7533E317B944BF360747A10A589EACCEB4E2DDB51A22248BFC53FD14E3FB3F590A4B33765E52741B47D7902413C9A
3,737,305,036 UART: [art] SIG.R = 1C71D111958F759473CA880BD65222BBA5359C09050EC0DFA7980DAF71DA539F6B5FE7F8FCF3C16FD219B10035ED6DAC
3,737,312,427 UART: [art] SIG.S = 246EBDE6C10DC4559366D646BBDE2C6675F0FE6A444D74944A8C05D4776C7DF2FB31243D81A9BE30B8C1059D04FE38B8
3,738,617,339 UART: Caliptra RT
3,738,618,078 UART: [state] CFI Enabled
3,738,948,348 UART: [rt] RT listening for mailbox commands...
3,738,950,236 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,747,693,201 >>> mbox cmd response: success
3,747,727,588 UART:
3,747,727,890 UART: Running Caliptra FMC ...
3,747,729,015 UART:
3,747,729,188 UART: [state] CFI Enabled
3,747,834,666 UART: [art] Extend RT PCRs Done
3,747,835,867 UART: [art] Lock RT PCRs Done
3,747,837,176 UART: [art] Populate DV Done
3,747,842,642 UART: [fht] FMC Alias Private Key: 7
3,747,844,244 UART: [art] Derive CDI
3,747,845,070 UART: [art] Store in in slot 0x4
3,747,903,581 UART: [art] Derive Key Pair
3,747,904,623 UART: [art] Store priv key in slot 0x5
3,751,197,298 UART: [art] Derive Key Pair - Done
3,751,210,035 UART: [art] Signing Cert with AUTHO
3,751,211,347 UART: RITY.KEYID = 7
3,753,498,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,753,499,873 UART: [art] PUB.X = 9643ED228F58C3903374713F8AA80EFDBF2A9727C9CF86BF49F8CE6E8592411F1BB1707C9E29B1E7DE183FA3D9BD8C2B
3,753,507,128 UART: [art] PUB.Y = AED8846E93D1C81D151CAAD8B903911C709804680374E9A1DADF1AE37BBE63DC87A520575E97504D2F1928D1AAB287EB
3,753,514,363 UART: [art] SIG.R = 387A67A7B9D45C55299218F5C6FDE8B61ACE4A7115D7CC693F9D22682D40A25952C223C12718B6210F55A96C848F39D5
3,753,521,760 UART: [art] SIG.S = 181D2AFBFB03A0EECD1BC31CEAA12420259A5684AE1E02293D55D58AE8E091B57F6823C79C571863A2F817DC816E9C8E
3,754,827,386 UART: Caliptra RT
3,754,828,103 UART: [state] CFI Enabled
3,755,181,286 UART: [rt] RT listening for mailbox commands...
3,755,183,167 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,763,928,277 >>> mbox cmd response: success
3,763,964,673 UART:
3,763,964,974 UART: Running Caliptra FMC ...
3,763,966,103 UART:
3,763,966,296 UART: [state] CFI Enabled
3,764,065,068 UART: [art] Extend RT PCRs Done
3,764,066,269 UART: [art] Lock RT PCRs Done
3,764,067,733 UART: [art] Populate DV Done
3,764,072,878 UART: [fht] FMC Alias Private Key: 7
3,764,074,432 UART: [art] Derive CDI
3,764,075,257 UART: [art] Store in in slot 0x4
3,764,133,768 UART: [art] Derive Key Pair
3,764,134,813 UART: [art] Store priv key in slot 0x5
3,767,427,621 UART: [art] Derive Key Pair - Done
3,767,440,299 UART: [art] Signing Cert with AUTHO
3,767,441,606 UART: RITY.KEYID = 7
3,769,728,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,769,730,199 UART: [art] PUB.X = 5ABB049A884F4A5B490D3F0E159CD8C765B804E7265DEEB8B6C2B09E6BDB8A7D40C5373A411AED5190E985C49541C2B0
3,769,737,391 UART: [art] PUB.Y = E2B7533E317B944BF360747A10A589EACCEB4E2DDB51A22248BFC53FD14E3FB3F590A4B33765E52741B47D7902413C9A
3,769,744,682 UART: [art] SIG.R = 1C71D111958F759473CA880BD65222BBA5359C09050EC0DFA7980DAF71DA539F6B5FE7F8FCF3C16FD219B10035ED6DAC
3,769,752,037 UART: [art] SIG.S = 246EBDE6C10DC4559366D646BBDE2C6675F0FE6A444D74944A8C05D4776C7DF2FB31243D81A9BE30B8C1059D04FE38B8
3,771,057,137 UART: Caliptra RT
3,771,057,859 UART: [state] CFI Enabled
3,771,387,140 UART: [rt] RT listening for mailbox commands...
3,771,389,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,780,128,983 >>> mbox cmd response: success
3,780,164,176 UART:
3,780,164,456 UART: Running Caliptra FMC ...
3,780,165,501 UART:
3,780,165,655 UART: [state] CFI Enabled
3,780,253,619 UART: [art] Extend RT PCRs Done
3,780,254,814 UART: [art] Lock RT PCRs Done
3,780,256,467 UART: [art] Populate DV Done
3,780,262,207 UART: [fht] FMC Alias Private Key: 7
3,780,263,756 UART: [art] Derive CDI
3,780,264,497 UART: [art] Store in in slot 0x4
3,780,323,021 UART: [art] Derive Key Pair
3,780,324,075 UART: [art] Store priv key in slot 0x5
3,783,616,734 UART: [art] Derive Key Pair - Done
3,783,629,580 UART: [art] Signing Cert with AUTHO
3,783,630,926 UART: RITY.KEYID = 7
3,785,918,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,785,919,762 UART: [art] PUB.X = 9643ED228F58C3903374713F8AA80EFDBF2A9727C9CF86BF49F8CE6E8592411F1BB1707C9E29B1E7DE183FA3D9BD8C2B
3,785,927,018 UART: [art] PUB.Y = AED8846E93D1C81D151CAAD8B903911C709804680374E9A1DADF1AE37BBE63DC87A520575E97504D2F1928D1AAB287EB
3,785,934,311 UART: [art] SIG.R = 387A67A7B9D45C55299218F5C6FDE8B61ACE4A7115D7CC693F9D22682D40A25952C223C12718B6210F55A96C848F39D5
3,785,941,651 UART: [art] SIG.S = 181D2AFBFB03A0EECD1BC31CEAA12420259A5684AE1E02293D55D58AE8E091B57F6823C79C571863A2F817DC816E9C8E
3,787,246,891 UART: Caliptra RT
3,787,247,599 UART: [state] CFI Enabled
3,787,577,896 UART: [rt] RT listening for mailbox commands...
3,787,579,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,796,327,541 >>> mbox cmd response: success
3,796,363,055 UART:
3,796,363,385 UART: Running Caliptra FMC ...
3,796,364,431 UART:
3,796,364,590 UART: [state] CFI Enabled
3,796,461,258 UART: [art] Extend RT PCRs Done
3,796,462,454 UART: [art] Lock RT PCRs Done
3,796,463,674 UART: [art] Populate DV Done
3,796,469,132 UART: [fht] FMC Alias Private Key: 7
3,796,470,732 UART: [art] Derive CDI
3,796,471,478 UART: [art] Store in in slot 0x4
3,796,530,585 UART: [art] Derive Key Pair
3,796,531,629 UART: [art] Store priv key in slot 0x5
3,799,824,297 UART: [art] Derive Key Pair - Done
3,799,837,460 UART: [art] Signing Cert with AUTHO
3,799,838,776 UART: RITY.KEYID = 7
3,802,125,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,802,127,370 UART: [art] PUB.X = 5ABB049A884F4A5B490D3F0E159CD8C765B804E7265DEEB8B6C2B09E6BDB8A7D40C5373A411AED5190E985C49541C2B0
3,802,134,638 UART: [art] PUB.Y = E2B7533E317B944BF360747A10A589EACCEB4E2DDB51A22248BFC53FD14E3FB3F590A4B33765E52741B47D7902413C9A
3,802,141,829 UART: [art] SIG.R = 1C71D111958F759473CA880BD65222BBA5359C09050EC0DFA7980DAF71DA539F6B5FE7F8FCF3C16FD219B10035ED6DAC
3,802,149,217 UART: [art] SIG.S = 246EBDE6C10DC4559366D646BBDE2C6675F0FE6A444D74944A8C05D4776C7DF2FB31243D81A9BE30B8C1059D04FE38B8
3,803,454,309 UART: Caliptra RT
3,803,455,029 UART: [state] CFI Enabled
3,803,787,731 UART: [rt] RT listening for mailbox commands...
3,803,789,785 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,812,499,355 >>> mbox cmd response: success
3,812,533,575 UART:
3,812,533,873 UART: Running Caliptra FMC ...
3,812,534,915 UART:
3,812,535,071 UART: [state] CFI Enabled
3,812,627,471 UART: [art] Extend RT PCRs Done
3,812,628,663 UART: [art] Lock RT PCRs Done
3,812,630,205 UART: [art] Populate DV Done
3,812,636,044 UART: [fht] FMC Alias Private Key: 7
3,812,637,604 UART: [art] Derive CDI
3,812,638,350 UART: [art] Store in in slot 0x4
3,812,696,480 UART: [art] Derive Key Pair
3,812,697,526 UART: [art] Store priv key in slot 0x5
3,815,990,116 UART: [art] Derive Key Pair - Done
3,816,002,953 UART: [art] Signing Cert with AUTHO
3,816,004,271 UART: RITY.KEYID = 7
3,818,292,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,818,294,113 UART: [art] PUB.X = 9643ED228F58C3903374713F8AA80EFDBF2A9727C9CF86BF49F8CE6E8592411F1BB1707C9E29B1E7DE183FA3D9BD8C2B
3,818,301,312 UART: [art] PUB.Y = AED8846E93D1C81D151CAAD8B903911C709804680374E9A1DADF1AE37BBE63DC87A520575E97504D2F1928D1AAB287EB
3,818,308,615 UART: [art] SIG.R = 387A67A7B9D45C55299218F5C6FDE8B61ACE4A7115D7CC693F9D22682D40A25952C223C12718B6210F55A96C848F39D5
3,818,315,954 UART: [art] SIG.S = 181D2AFBFB03A0EECD1BC31CEAA12420259A5684AE1E02293D55D58AE8E091B57F6823C79C571863A2F817DC816E9C8E
3,819,620,841 UART: Caliptra RT
3,819,621,545 UART: [state] CFI Enabled
3,819,960,712 UART: [rt] RT listening for mailbox commands...
3,819,962,580 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,828,695,720 >>> mbox cmd response: success
3,828,728,111 UART:
3,828,728,389 UART: Running Caliptra FMC ...
3,828,729,431 UART:
3,828,729,587 UART: [state] CFI Enabled
3,828,820,101 UART: [art] Extend RT PCRs Done
3,828,821,295 UART: [art] Lock RT PCRs Done
3,828,822,679 UART: [art] Populate DV Done
3,828,828,144 UART: [fht] FMC Alias Private Key: 7
3,828,829,741 UART: [art] Derive CDI
3,828,830,519 UART: [art] Store in in slot 0x4
3,828,888,657 UART: [art] Derive Key Pair
3,828,889,669 UART: [art] Store priv key in slot 0x5
3,832,182,609 UART: [art] Derive Key Pair - Done
3,832,195,767 UART: [art] Signing Cert with AUTHO
3,832,197,099 UART: RITY.KEYID = 7
3,834,484,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,834,486,408 UART: [art] PUB.X = 5ABB049A884F4A5B490D3F0E159CD8C765B804E7265DEEB8B6C2B09E6BDB8A7D40C5373A411AED5190E985C49541C2B0
3,834,493,660 UART: [art] PUB.Y = E2B7533E317B944BF360747A10A589EACCEB4E2DDB51A22248BFC53FD14E3FB3F590A4B33765E52741B47D7902413C9A
3,834,500,951 UART: [art] SIG.R = 1C71D111958F759473CA880BD65222BBA5359C09050EC0DFA7980DAF71DA539F6B5FE7F8FCF3C16FD219B10035ED6DAC
3,834,508,285 UART: [art] SIG.S = 246EBDE6C10DC4559366D646BBDE2C6675F0FE6A444D74944A8C05D4776C7DF2FB31243D81A9BE30B8C1059D04FE38B8
3,835,813,581 UART: Caliptra RT
3,835,814,302 UART: [state] CFI Enabled
3,836,166,471 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 406.88s
Truncated 1347769 bytes from beginning
UART: [art] Extend RT PCRs Done
3,517,853,025 UART: [art] Lock RT PCRs Done
3,517,854,229 UART: [art] Populate DV Done
3,517,859,903 UART: [fht] FMC Alias Private Key: 7
3,517,861,435 UART: [art] Derive CDI
3,517,862,178 UART: [art] Store in in slot 0x4
3,517,904,715 UART: [art] Derive Key Pair
3,517,905,716 UART: [art] Store priv key in slot 0x5
3,521,147,293 UART: [art] Derive Key Pair - Done
3,521,160,458 UART: [art] Signing Cert with AUTHO
3,521,161,771 UART: RITY.KEYID = 7
3,523,441,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,442,585 UART: [art] PUB.X = 29352C593B459D1888942F742F0D96C7B52B48DE78E1B3CAB68A69625CE403F986F8FEBCA95FDE33382BBA2A08E03361
3,523,449,831 UART: [art] PUB.Y = E14EC5558BA28E761B9F01AAC6F767B527CDE9F8963723106AAF390C1E0E88C87309161EB9D482C12B862B8D6C85557E
3,523,457,059 UART: [art] SIG.R = 6DF0DC836112453053E2CBE4221D3B529200330D30F89D055556035216811B9880C8E5A3687F5E89CC0CF216CD879041
3,523,464,475 UART: [art] SIG.S = 1609D34CDB26AE333B3B89714D32D6EC1383B17A3852AE5D032DBE1D2737D5BDBB96A202E5502882A6DA32ED4D8CF294
3,524,769,688 UART: Caliptra RT
3,524,770,388 UART: [state] CFI Enabled
3,525,056,276 UART: [rt] RT listening for mailbox commands...
3,525,058,282 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,525,202,662 UART:
3,525,202,960 UART: Running Caliptra ROM ...
3,525,203,994 UART:
3,525,204,302 UART: [state] CFI Enabled
3,525,219,663 UART: [state] LifecycleState = Unprovisioned
3,525,221,643 UART: [state] DebugLocked = No
3,525,224,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,525,229,900 UART: [kat] SHA2-256
3,525,399,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,525,410,138 UART: [kat] ++
3,525,410,594 UART: [kat] sha1
3,525,422,778 UART: [kat] SHA2-256
3,525,425,493 UART: [kat] SHA2-384
3,525,431,260 UART: [kat] SHA2-512-ACC
3,525,433,602 UART: [kat] ECC-384
3,527,715,907 UART: [kat] HMAC-384Kdf
3,527,727,424 UART: [kat] LMS
3,528,917,472 UART: [kat] --
3,528,921,845 UART: [update-reset] ++
3,533,058,367 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,533,062,751 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,533,445,012 >>> mbox cmd response: success
3,533,446,964 UART: [update-reset] Copying MAN_2 To MAN_1
3,533,469,404 UART: [update-reset Success] --
3,533,473,243 UART: [state] Locking Datavault
3,533,477,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,533,478,803 UART: [state] Locking ICCM
3,533,481,635 UART: [exit] Launching FMC @ 0x40000130
3,533,490,045 UART:
3,533,490,297 UART: Running Caliptra FMC ...
3,533,491,345 UART:
3,533,491,491 UART: [state] CFI Enabled
3,533,535,875 UART: [art] Extend RT PCRs Done
3,533,537,016 UART: [art] Lock RT PCRs Done
3,533,538,420 UART: [art] Populate DV Done
3,533,543,789 UART: [fht] FMC Alias Private Key: 7
3,533,545,380 UART: [art] Derive CDI
3,533,546,192 UART: [art] Store in in slot 0x4
3,533,588,783 UART: [art] Derive Key Pair
3,533,589,783 UART: [art] Store priv key in slot 0x5
3,536,831,554 UART: [art] Derive Key Pair - Done
3,536,844,398 UART: [art] Signing Cert with AUTHO
3,536,845,707 UART: RITY.KEYID = 7
3,539,124,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,539,126,442 UART: [art] PUB.X = 73952DFF9302D7ABE094691E56D1BCBAFADC784758EA5D6887BA954B26511FC4909D6E32B04DE8D4F4F95CD8FD646775
3,539,133,704 UART: [art] PUB.Y = 784E23D5F3EB0C990515D029A5E3F70BACBA8C2D628B8D4A30BA21AA8CB57A3372DD9CAC987BBF8027045005C2296859
3,539,140,890 UART: [art] SIG.R = 5B9432B4DB500EA669030DDF1DFFDD8AD0C74C6B31EEB9A926E62128AE4A9141E61645578BD1F2AFBA3B023C5B429ED0
3,539,148,296 UART: [art] SIG.S = 65FE7F74A5B85540D7D4323000A51B6E8DBE664B8E0466EB45EA7423660A9B209ADF6768D65EEA872443AA37F4D15ADA
3,540,453,476 UART: Caliptra RT
3,540,454,193 UART: [state] CFI Enabled
3,540,743,771 UART: [rt] RT listening for mailbox commands...
3,540,745,648 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,540,889,795 UART:
3,540,890,102 UART: Running Caliptra ROM ...
3,540,891,222 UART:
3,540,891,440 UART: [state] CFI Enabled
3,540,907,711 UART: [state] LifecycleState = Unprovisioned
3,540,909,637 UART: [state] DebugLocked = No
3,540,912,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,540,917,979 UART: [kat] SHA2-256
3,541,087,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,541,098,219 UART: [kat] ++
3,541,098,766 UART: [kat] sha1
3,541,109,985 UART: [kat] SHA2-256
3,541,112,673 UART: [kat] SHA2-384
3,541,117,904 UART: [kat] SHA2-512-ACC
3,541,120,251 UART: [kat] ECC-384
3,543,406,024 UART: [kat] HMAC-384Kdf
3,543,418,035 UART: [kat] LMS
3,544,608,072 UART: [kat] --
3,544,613,227 UART: [update-reset] ++
3,548,758,962 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,548,762,906 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,549,145,166 >>> mbox cmd response: success
3,549,146,308 UART: [update-reset] Copying MAN_2 To MAN_1
3,549,168,748 UART: [update-reset Success] --
3,549,171,702 UART: [state] Locking Datavault
3,549,173,929 UART: [state] Locking PCR0, PCR1 and PCR31
3,549,175,683 UART: [state] Locking ICCM
3,549,178,073 UART: [exit] Launching FMC @ 0x40000130
3,549,186,523 UART:
3,549,186,756 UART: Running Caliptra FMC ...
3,549,187,792 UART:
3,549,187,937 UART: [state] CFI Enabled
3,549,231,801 UART: [art] Extend RT PCRs Done
3,549,232,978 UART: [art] Lock RT PCRs Done
3,549,234,568 UART: [art] Populate DV Done
3,549,240,355 UART: [fht] FMC Alias Private Key: 7
3,549,242,064 UART: [art] Derive CDI
3,549,242,885 UART: [art] Store in in slot 0x4
3,549,285,585 UART: [art] Derive Key Pair
3,549,286,583 UART: [art] Store priv key in slot 0x5
3,552,528,132 UART: [art] Derive Key Pair - Done
3,552,541,196 UART: [art] Signing Cert with AUTHO
3,552,542,509 UART: RITY.KEYID = 7
3,554,821,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,823,050 UART: [art] PUB.X = 29352C593B459D1888942F742F0D96C7B52B48DE78E1B3CAB68A69625CE403F986F8FEBCA95FDE33382BBA2A08E03361
3,554,830,354 UART: [art] PUB.Y = E14EC5558BA28E761B9F01AAC6F767B527CDE9F8963723106AAF390C1E0E88C87309161EB9D482C12B862B8D6C85557E
3,554,837,596 UART: [art] SIG.R = 6DF0DC836112453053E2CBE4221D3B529200330D30F89D055556035216811B9880C8E5A3687F5E89CC0CF216CD879041
3,554,844,933 UART: [art] SIG.S = 1609D34CDB26AE333B3B89714D32D6EC1383B17A3852AE5D032DBE1D2737D5BDBB96A202E5502882A6DA32ED4D8CF294
3,556,150,511 UART: Caliptra RT
3,556,151,215 UART: [state] CFI Enabled
3,556,440,030 UART: [rt] RT listening for mailbox commands...
3,556,441,926 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,556,586,703 UART:
3,556,587,033 UART: Running Caliptra ROM ...
3,556,588,158 UART:
3,556,588,320 UART: [state] CFI Enabled
3,556,604,869 UART: [state] LifecycleState = Unprovisioned
3,556,606,760 UART: [state] DebugLocked = No
3,556,609,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,556,615,196 UART: [kat] SHA2-256
3,556,784,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,556,795,386 UART: [kat] ++
3,556,795,868 UART: [kat] sha1
3,556,808,370 UART: [kat] SHA2-256
3,556,811,059 UART: [kat] SHA2-384
3,556,816,941 UART: [kat] SHA2-512-ACC
3,556,819,281 UART: [kat] ECC-384
3,559,103,218 UART: [kat] HMAC-384Kdf
3,559,115,933 UART: [kat] LMS
3,560,305,977 UART: [kat] --
3,560,309,651 UART: [update-reset] ++
3,564,446,573 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,564,450,380 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,564,832,649 >>> mbox cmd response: success
3,564,834,283 UART: [update-reset] Copying MAN_2 To MAN_1
3,564,856,722 UART: [update-reset Success] --
3,564,860,134 UART: [state] Locking Datavault
3,564,863,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,564,865,470 UART: [state] Locking ICCM
3,564,867,078 UART: [exit] Launching FMC @ 0x40000130
3,564,875,533 UART:
3,564,875,765 UART: Running Caliptra FMC ...
3,564,876,862 UART:
3,564,877,019 UART: [state] CFI Enabled
3,564,921,157 UART: [art] Extend RT PCRs Done
3,564,922,367 UART: [art] Lock RT PCRs Done
3,564,923,724 UART: [art] Populate DV Done
3,564,928,921 UART: [fht] FMC Alias Private Key: 7
3,564,930,531 UART: [art] Derive CDI
3,564,931,346 UART: [art] Store in in slot 0x4
3,564,973,993 UART: [art] Derive Key Pair
3,564,974,993 UART: [art] Store priv key in slot 0x5
3,568,216,496 UART: [art] Derive Key Pair - Done
3,568,229,176 UART: [art] Signing Cert with AUTHO
3,568,230,477 UART: RITY.KEYID = 7
3,570,509,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,511,265 UART: [art] PUB.X = 73952DFF9302D7ABE094691E56D1BCBAFADC784758EA5D6887BA954B26511FC4909D6E32B04DE8D4F4F95CD8FD646775
3,570,518,510 UART: [art] PUB.Y = 784E23D5F3EB0C990515D029A5E3F70BACBA8C2D628B8D4A30BA21AA8CB57A3372DD9CAC987BBF8027045005C2296859
3,570,525,753 UART: [art] SIG.R = 5B9432B4DB500EA669030DDF1DFFDD8AD0C74C6B31EEB9A926E62128AE4A9141E61645578BD1F2AFBA3B023C5B429ED0
3,570,533,142 UART: [art] SIG.S = 65FE7F74A5B85540D7D4323000A51B6E8DBE664B8E0466EB45EA7423660A9B209ADF6768D65EEA872443AA37F4D15ADA
3,571,838,545 UART: Caliptra RT
3,571,839,267 UART: [state] CFI Enabled
3,572,127,813 UART: [rt] RT listening for mailbox commands...
3,572,129,687 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,572,274,048 UART:
3,572,274,366 UART: Running Caliptra ROM ...
3,572,275,488 UART:
3,572,275,708 UART: [state] CFI Enabled
3,572,291,325 UART: [state] LifecycleState = Unprovisioned
3,572,293,217 UART: [state] DebugLocked = No
3,572,296,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,572,301,819 UART: [kat] SHA2-256
3,572,471,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,572,482,058 UART: [kat] ++
3,572,482,513 UART: [kat] sha1
3,572,492,259 UART: [kat] SHA2-256
3,572,494,995 UART: [kat] SHA2-384
3,572,499,899 UART: [kat] SHA2-512-ACC
3,572,502,298 UART: [kat] ECC-384
3,574,785,263 UART: [kat] HMAC-384Kdf
3,574,797,730 UART: [kat] LMS
3,575,987,795 UART: [kat] --
3,575,992,727 UART: [update-reset] ++
3,580,134,856 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,580,139,133 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,580,521,388 >>> mbox cmd response: success
3,580,522,266 UART: [update-reset] Copying MAN_2 To MAN_1
3,580,544,708 UART: [update-reset Success] --
3,580,550,504 UART: [state] Locking Datavault
3,580,554,519 UART: [state] Locking PCR0, PCR1 and PCR31
3,580,556,220 UART: [state] Locking ICCM
3,580,558,343 UART: [exit] Launching FMC @ 0x40000130
3,580,566,792 UART:
3,580,567,023 UART: Running Caliptra FMC ...
3,580,568,052 UART:
3,580,568,201 UART: [state] CFI Enabled
3,580,612,451 UART: [art] Extend RT PCRs Done
3,580,613,701 UART: [art] Lock RT PCRs Done
3,580,615,192 UART: [art] Populate DV Done
3,580,620,432 UART: [fht] FMC Alias Private Key: 7
3,580,621,925 UART: [art] Derive CDI
3,580,622,890 UART: [art] Store in in slot 0x4
3,580,665,313 UART: [art] Derive Key Pair
3,580,666,352 UART: [art] Store priv key in slot 0x5
3,583,908,220 UART: [art] Derive Key Pair - Done
3,583,921,439 UART: [art] Signing Cert with AUTHO
3,583,922,740 UART: RITY.KEYID = 7
3,586,201,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,586,203,292 UART: [art] PUB.X = 29352C593B459D1888942F742F0D96C7B52B48DE78E1B3CAB68A69625CE403F986F8FEBCA95FDE33382BBA2A08E03361
3,586,210,545 UART: [art] PUB.Y = E14EC5558BA28E761B9F01AAC6F767B527CDE9F8963723106AAF390C1E0E88C87309161EB9D482C12B862B8D6C85557E
3,586,217,774 UART: [art] SIG.R = 6DF0DC836112453053E2CBE4221D3B529200330D30F89D055556035216811B9880C8E5A3687F5E89CC0CF216CD879041
3,586,225,167 UART: [art] SIG.S = 1609D34CDB26AE333B3B89714D32D6EC1383B17A3852AE5D032DBE1D2737D5BDBB96A202E5502882A6DA32ED4D8CF294
3,587,529,764 UART: Caliptra RT
3,587,530,463 UART: [state] CFI Enabled
3,587,819,542 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 394.46s
Truncated 716351 bytes from beginning
4F6DBBD8F2FA1489773A4A70BF59EA6
3,631,420,042 UART: [art] SIG.R = 3277F7B805CFD31C78D9BC69761258AD4DBE3E31AB9C2202723F594D1F363C1921E5121AA8B68C9212DC8DDB2B614A8C
3,631,427,434 UART: [art] SIG.S = F01B30E439AF995104E99D83FCFCD0DC0A822A23288649FDC408A108D8ABFA044428BFB0880F1DA9D2940FC7D38E2B32
3,632,732,818 UART: Caliptra RT
3,632,733,516 UART: [state] CFI Enabled
3,633,020,856 UART: [rt] RT listening for mailbox commands...
3,633,022,723 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,641,682,661 >>> mbox cmd response: success
3,641,719,858 UART:
3,641,720,161 UART: Running Caliptra FMC ...
3,641,721,286 UART:
3,641,721,454 UART: [state] CFI Enabled
3,641,765,573 UART: [art] Extend RT PCRs Done
3,641,766,721 UART: [art] Lock RT PCRs Done
3,641,768,012 UART: [art] Populate DV Done
3,641,773,545 UART: [fht] FMC Alias Private Key: 7
3,641,775,109 UART: [art] Derive CDI
3,641,775,883 UART: [art] Store in in slot 0x4
3,641,818,909 UART: [art] Derive Key Pair
3,641,819,911 UART: [art] Store priv key in slot 0x5
3,645,062,340 UART: [art] Derive Key Pair - Done
3,645,075,234 UART: [art] Signing Cert with AUTHO
3,645,076,550 UART: RITY.KEYID = 7
3,647,355,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,357,058 UART: [art] PUB.X = C0498C0F37DCAC65E62C2EBCB19B5776E881A91565E865A75F59B1F197065C0B524AA69E1A0B25C98CB2F7474BF1FDBB
3,647,364,345 UART: [art] PUB.Y = 7B12FBD782DAE237E586239DB25B3BA975A7450483E618F06BE3C9714A61A163C11B6A27BD4346E75CFC6DF98DA5732A
3,647,371,570 UART: [art] SIG.R = 3F0112DC45B34B4C828FCD7856D79ED0A8AFC06A4F7477B735718BCDDE84CED9FAB6900A80428890AD432916B6DBA518
3,647,378,938 UART: [art] SIG.S = CDD2D26F436A78E453856948D089B0D031E30FC0F142932E4DE01B49F3D533A7CD91FDB0D2022431A00D869DF3530D2F
3,648,684,253 UART: Caliptra RT
3,648,684,973 UART: [state] CFI Enabled
3,648,972,272 UART: [rt] RT listening for mailbox commands...
3,648,974,153 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,658,148,088 >>> mbox cmd response: success
3,658,181,310 UART:
3,658,181,614 UART: Running Caliptra FMC ...
3,658,182,733 UART:
3,658,182,896 UART: [state] CFI Enabled
3,658,227,019 UART: [art] Extend RT PCRs Done
3,658,228,167 UART: [art] Lock RT PCRs Done
3,658,229,452 UART: [art] Populate DV Done
3,658,234,705 UART: [fht] FMC Alias Private Key: 7
3,658,236,403 UART: [art] Derive CDI
3,658,237,217 UART: [art] Store in in slot 0x4
3,658,280,198 UART: [art] Derive Key Pair
3,658,281,241 UART: [art] Store priv key in slot 0x5
3,661,523,061 UART: [art] Derive Key Pair - Done
3,661,535,961 UART: [art] Signing Cert with AUTHO
3,661,537,302 UART: RITY.KEYID = 7
3,663,816,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,818,548 UART: [art] PUB.X = 0E39B6C1B40C23D77E604D8E9EACF9F74AB7F29634B6C1F8FBFBB907A834F97378D897D8D6B33C8254EE976496F8D0E6
3,663,825,582 UART: [art] PUB.Y = 4E9F27C1317EFAA9A60DDAE328518328F8BAE64F7DB0D1C7DCDB6A25047C8C4F94F6DBBD8F2FA1489773A4A70BF59EA6
3,663,832,871 UART: [art] SIG.R = 3277F7B805CFD31C78D9BC69761258AD4DBE3E31AB9C2202723F594D1F363C1921E5121AA8B68C9212DC8DDB2B614A8C
3,663,840,221 UART: [art] SIG.S = F01B30E439AF995104E99D83FCFCD0DC0A822A23288649FDC408A108D8ABFA044428BFB0880F1DA9D2940FC7D38E2B32
3,665,145,175 UART: Caliptra RT
3,665,146,052 UART: [state] CFI Enabled
3,665,431,873 UART: [rt] RT listening for mailbox commands...
3,665,433,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,674,102,626 >>> mbox cmd response: success
3,674,135,621 UART:
3,674,135,901 UART: Running Caliptra FMC ...
3,674,136,931 UART:
3,674,137,075 UART: [state] CFI Enabled
3,674,181,321 UART: [art] Extend RT PCRs Done
3,674,182,540 UART: [art] Lock RT PCRs Done
3,674,183,941 UART: [art] Populate DV Done
3,674,189,423 UART: [fht] FMC Alias Private Key: 7
3,674,191,069 UART: [art] Derive CDI
3,674,191,809 UART: [art] Store in in slot 0x4
3,674,234,508 UART: [art] Derive Key Pair
3,674,235,507 UART: [art] Store priv key in slot 0x5
3,677,476,763 UART: [art] Derive Key Pair - Done
3,677,489,557 UART: [art] Signing Cert with AUTHO
3,677,490,858 UART: RITY.KEYID = 7
3,679,770,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,771,758 UART: [art] PUB.X = C0498C0F37DCAC65E62C2EBCB19B5776E881A91565E865A75F59B1F197065C0B524AA69E1A0B25C98CB2F7474BF1FDBB
3,679,778,898 UART: [art] PUB.Y = 7B12FBD782DAE237E586239DB25B3BA975A7450483E618F06BE3C9714A61A163C11B6A27BD4346E75CFC6DF98DA5732A
3,679,786,136 UART: [art] SIG.R = 3F0112DC45B34B4C828FCD7856D79ED0A8AFC06A4F7477B735718BCDDE84CED9FAB6900A80428890AD432916B6DBA518
3,679,793,471 UART: [art] SIG.S = CDD2D26F436A78E453856948D089B0D031E30FC0F142932E4DE01B49F3D533A7CD91FDB0D2022431A00D869DF3530D2F
3,681,098,638 UART: Caliptra RT
3,681,099,331 UART: [state] CFI Enabled
3,681,388,042 UART: [rt] RT listening for mailbox commands...
3,681,389,947 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,690,049,744 >>> mbox cmd response: success
3,690,084,054 UART:
3,690,084,337 UART: Running Caliptra FMC ...
3,690,085,457 UART:
3,690,085,622 UART: [state] CFI Enabled
3,690,129,417 UART: [art] Extend RT PCRs Done
3,690,130,605 UART: [art] Lock RT PCRs Done
3,690,131,987 UART: [art] Populate DV Done
3,690,137,616 UART: [fht] FMC Alias Private Key: 7
3,690,139,157 UART: [art] Derive CDI
3,690,139,894 UART: [art] Store in in slot 0x4
3,690,183,136 UART: [art] Derive Key Pair
3,690,184,179 UART: [art] Store priv key in slot 0x5
3,693,426,555 UART: [art] Derive Key Pair - Done
3,693,439,582 UART: [art] Signing Cert with AUTHO
3,693,440,896 UART: RITY.KEYID = 7
3,695,720,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,695,722,058 UART: [art] PUB.X = 0E39B6C1B40C23D77E604D8E9EACF9F74AB7F29634B6C1F8FBFBB907A834F97378D897D8D6B33C8254EE976496F8D0E6
3,695,729,312 UART: [art] PUB.Y = 4E9F27C1317EFAA9A60DDAE328518328F8BAE64F7DB0D1C7DCDB6A25047C8C4F94F6DBBD8F2FA1489773A4A70BF59EA6
3,695,736,599 UART: [art] SIG.R = 3277F7B805CFD31C78D9BC69761258AD4DBE3E31AB9C2202723F594D1F363C1921E5121AA8B68C9212DC8DDB2B614A8C
3,695,743,990 UART: [art] SIG.S = F01B30E439AF995104E99D83FCFCD0DC0A822A23288649FDC408A108D8ABFA044428BFB0880F1DA9D2940FC7D38E2B32
3,697,050,182 UART: Caliptra RT
3,697,051,038 UART: [state] CFI Enabled
3,697,335,687 UART: [rt] RT listening for mailbox commands...
3,697,337,559 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,705,995,423 >>> mbox cmd response: success
3,706,032,025 UART:
3,706,032,341 UART: Running Caliptra FMC ...
3,706,033,467 UART:
3,706,033,634 UART: [state] CFI Enabled
3,706,077,569 UART: [art] Extend RT PCRs Done
3,706,078,727 UART: [art] Lock RT PCRs Done
3,706,080,127 UART: [art] Populate DV Done
3,706,085,755 UART: [fht] FMC Alias Private Key: 7
3,706,087,346 UART: [art] Derive CDI
3,706,088,161 UART: [art] Store in in slot 0x4
3,706,130,673 UART: [art] Derive Key Pair
3,706,131,717 UART: [art] Store priv key in slot 0x5
3,709,373,631 UART: [art] Derive Key Pair - Done
3,709,386,368 UART: [art] Signing Cert with AUTHO
3,709,387,667 UART: RITY.KEYID = 7
3,711,667,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,711,668,924 UART: [art] PUB.X = C0498C0F37DCAC65E62C2EBCB19B5776E881A91565E865A75F59B1F197065C0B524AA69E1A0B25C98CB2F7474BF1FDBB
3,711,676,174 UART: [art] PUB.Y = 7B12FBD782DAE237E586239DB25B3BA975A7450483E618F06BE3C9714A61A163C11B6A27BD4346E75CFC6DF98DA5732A
3,711,683,405 UART: [art] SIG.R = 3F0112DC45B34B4C828FCD7856D79ED0A8AFC06A4F7477B735718BCDDE84CED9FAB6900A80428890AD432916B6DBA518
3,711,690,942 UART: [art] SIG.S = CDD2D26F436A78E453856948D089B0D031E30FC0F142932E4DE01B49F3D533A7CD91FDB0D2022431A00D869DF3530D2F
3,712,996,046 UART: Caliptra RT
3,712,996,763 UART: [state] CFI Enabled
3,713,283,689 UART: [rt] RT listening for mailbox commands...
3,713,285,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,721,941,597 >>> mbox cmd response: success
3,721,977,836 UART:
3,721,978,112 UART: Running Caliptra FMC ...
3,721,979,227 UART:
3,721,979,391 UART: [state] CFI Enabled
3,722,023,362 UART: [art] Extend RT PCRs Done
3,722,024,558 UART: [art] Lock RT PCRs Done
3,722,025,805 UART: [art] Populate DV Done
3,722,031,270 UART: [fht] FMC Alias Private Key: 7
3,722,032,873 UART: [art] Derive CDI
3,722,033,619 UART: [art] Store in in slot 0x4
3,722,076,381 UART: [art] Derive Key Pair
3,722,077,406 UART: [art] Store priv key in slot 0x5
3,725,319,577 UART: [art] Derive Key Pair - Done
3,725,332,310 UART: [art] Signing Cert with AUTHO
3,725,333,618 UART: RITY.KEYID = 7
3,727,613,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,614,827 UART: [art] PUB.X = 0E39B6C1B40C23D77E604D8E9EACF9F74AB7F29634B6C1F8FBFBB907A834F97378D897D8D6B33C8254EE976496F8D0E6
3,727,622,076 UART: [art] PUB.Y = 4E9F27C1317EFAA9A60DDAE328518328F8BAE64F7DB0D1C7DCDB6A25047C8C4F94F6DBBD8F2FA1489773A4A70BF59EA6
3,727,629,361 UART: [art] SIG.R = 3277F7B805CFD31C78D9BC69761258AD4DBE3E31AB9C2202723F594D1F363C1921E5121AA8B68C9212DC8DDB2B614A8C
3,727,636,704 UART: [art] SIG.S = F01B30E439AF995104E99D83FCFCD0DC0A822A23288649FDC408A108D8ABFA044428BFB0880F1DA9D2940FC7D38E2B32
3,728,941,998 UART: Caliptra RT
3,728,942,706 UART: [state] CFI Enabled
3,729,228,282 UART: [rt] RT listening for mailbox commands...
3,729,230,181 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,738,371,895 >>> mbox cmd response: success
3,738,408,026 UART:
3,738,408,303 UART: Running Caliptra FMC ...
3,738,409,357 UART:
3,738,409,506 UART: [state] CFI Enabled
3,738,452,996 UART: [art] Extend RT PCRs Done
3,738,454,188 UART: [art] Lock RT PCRs Done
3,738,455,618 UART: [art] Populate DV Done
3,738,461,137 UART: [fht] FMC Alias Private Key: 7
3,738,462,841 UART: [art] Derive CDI
3,738,463,572 UART: [art] Store in in slot 0x4
3,738,506,276 UART: [art] Derive Key Pair
3,738,507,316 UART: [art] Store priv key in slot 0x5
3,741,749,240 UART: [art] Derive Key Pair - Done
3,741,762,185 UART: [art] Signing Cert with AUTHO
3,741,763,484 UART: RITY.KEYID = 7
3,744,043,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,044,618 UART: [art] PUB.X = C0498C0F37DCAC65E62C2EBCB19B5776E881A91565E865A75F59B1F197065C0B524AA69E1A0B25C98CB2F7474BF1FDBB
3,744,051,817 UART: [art] PUB.Y = 7B12FBD782DAE237E586239DB25B3BA975A7450483E618F06BE3C9714A61A163C11B6A27BD4346E75CFC6DF98DA5732A
3,744,059,085 UART: [art] SIG.R = 3F0112DC45B34B4C828FCD7856D79ED0A8AFC06A4F7477B735718BCDDE84CED9FAB6900A80428890AD432916B6DBA518
3,744,066,490 UART: [art] SIG.S = CDD2D26F436A78E453856948D089B0D031E30FC0F142932E4DE01B49F3D533A7CD91FDB0D2022431A00D869DF3530D2F
3,745,370,903 UART: Caliptra RT
3,745,371,597 UART: [state] CFI Enabled
3,745,660,662 UART: [rt] RT listening for mailbox commands...
3,745,662,538 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,754,317,214 >>> mbox cmd response: success
3,754,352,300 UART:
3,754,352,652 UART: Running Caliptra FMC ...
3,754,353,693 UART:
3,754,353,843 UART: [state] CFI Enabled
3,754,398,231 UART: [art] Extend RT PCRs Done
3,754,399,382 UART: [art] Lock RT PCRs Done
3,754,400,782 UART: [art] Populate DV Done
3,754,406,298 UART: [fht] FMC Alias Private Key: 7
3,754,407,837 UART: [art] Derive CDI
3,754,408,673 UART: [art] Store in in slot 0x4
3,754,451,552 UART: [art] Derive Key Pair
3,754,452,598 UART: [art] Store priv key in slot 0x5
3,757,694,465 UART: [art] Derive Key Pair - Done
3,757,707,350 UART: [art] Signing Cert with AUTHO
3,757,708,658 UART: RITY.KEYID = 7
3,759,988,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,759,989,645 UART: [art] PUB.X = 0E39B6C1B40C23D77E604D8E9EACF9F74AB7F29634B6C1F8FBFBB907A834F97378D897D8D6B33C8254EE976496F8D0E6
3,759,996,906 UART: [art] PUB.Y = 4E9F27C1317EFAA9A60DDAE328518328F8BAE64F7DB0D1C7DCDB6A25047C8C4F94F6DBBD8F2FA1489773A4A70BF59EA6
3,760,004,143 UART: [art] SIG.R = 3277F7B805CFD31C78D9BC69761258AD4DBE3E31AB9C2202723F594D1F363C1921E5121AA8B68C9212DC8DDB2B614A8C
3,760,011,587 UART: [art] SIG.S = F01B30E439AF995104E99D83FCFCD0DC0A822A23288649FDC408A108D8ABFA044428BFB0880F1DA9D2940FC7D38E2B32
3,761,316,810 UART: Caliptra RT
3,761,317,531 UART: [state] CFI Enabled
3,761,606,278 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 403.15s
Truncated 1329512 bytes from beginning
RT:
2,178,467,614 UART: Running Caliptra FMC ...
2,178,468,945 UART:
2,178,469,118 UART: [state] CFI Enabled
2,178,566,042 UART: [art] Extend RT PCRs Done
2,178,567,231 UART: [art] Lock RT PCRs Done
2,178,568,903 UART: [art] Populate DV Done
2,178,574,202 UART: [fht] FMC Alias Private Key: 7
2,178,575,897 UART: [art] Derive CDI
2,178,576,714 UART: [art] Store in in slot 0x4
2,178,635,069 UART: [art] Derive Key Pair
2,178,636,115 UART: [art] Store priv key in slot 0x5
2,181,099,051 UART: [art] Derive Key Pair - Done
2,181,112,266 UART: [art] Signing Cert with AUTHO
2,181,113,597 UART: RITY.KEYID = 7
2,182,824,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,182,826,575 UART: [art] PUB.X = 031B4042DC6E4E0073875638FDCAEADB2DE58B5C2B597CBA34410C07C517F2F85714AD81A159A29C5D7462EEFFCEEBA6
2,182,833,507 UART: [art] PUB.Y = 2E0459F1DF5F5FB4528247BB0FA7E7EB78A808183607FA50A35F05D6EBDCC12C095A7444A6C3165B8B360D73F0C807A9
2,182,840,774 UART: [art] SIG.R = 23B9E1FAA24F884767EBF38EC90087F0A7DCFD632878F4FD43EC148431DFF4A2D242A67C5E57D22E20D89FA6D22B22C2
2,182,848,117 UART: [art] SIG.S = 5AEE21E11083C02AC9F577D8AFC36D256AAFD41CF7497A54B4C8AEE885E2273FF964E54280957D95DDABA8FED70F776F
2,183,826,940 UART: Caliptra RT
2,183,827,682 UART: [state] CFI Enabled
2,184,168,081 UART: [rt] RT listening for mailbox commands...
2,184,169,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,184,314,958 UART:
2,184,315,259 UART: Running Caliptra ROM ...
2,184,316,298 UART:
2,184,316,453 UART: [state] CFI Enabled
2,184,380,145 UART: [state] LifecycleState = Unprovisioned
2,184,381,982 UART: [state] DebugLocked = No
2,184,384,150 UART: [state] WD Timer not started. Device not locked for debugging
2,184,388,434 UART: [kat] SHA2-256
2,184,567,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,579,062 UART: [kat] ++
2,184,579,547 UART: [kat] sha1
2,184,590,761 UART: [kat] SHA2-256
2,184,593,770 UART: [kat] SHA2-384
2,184,599,058 UART: [kat] SHA2-512-ACC
2,184,602,001 UART: [kat] ECC-384
2,187,065,386 UART: [kat] HMAC-384Kdf
2,187,088,518 UART: [kat] LMS
2,187,617,971 UART: [kat] --
2,187,622,142 UART: [update-reset] ++
2,191,045,688 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,191,049,841 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,191,433,166 >>> mbox cmd response: success
2,191,433,592 UART: [update-reset] Copying MAN_2 To MAN_1
2,191,455,932 UART: [update-reset Success] --
2,191,462,167 UART: [state] Locking Datavault
2,191,464,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,191,465,747 UART: [state] Locking ICCM
2,191,468,334 UART: [exit] Launching FMC @ 0x40000130
2,191,476,790 UART:
2,191,477,028 UART: Running Caliptra FMC ...
2,191,478,137 UART:
2,191,478,303 UART: [state] CFI Enabled
2,191,578,911 UART: [art] Extend RT PCRs Done
2,191,580,102 UART: [art] Lock RT PCRs Done
2,191,581,665 UART: [art] Populate DV Done
2,191,587,133 UART: [fht] FMC Alias Private Key: 7
2,191,588,649 UART: [art] Derive CDI
2,191,589,443 UART: [art] Store in in slot 0x4
2,191,647,949 UART: [art] Derive Key Pair
2,191,648,955 UART: [art] Store priv key in slot 0x5
2,194,111,707 UART: [art] Derive Key Pair - Done
2,194,124,648 UART: [art] Signing Cert with AUTHO
2,194,125,972 UART: RITY.KEYID = 7
2,195,837,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,195,839,244 UART: [art] PUB.X = 8E5D0BF8B96BCB23B6C38C4748083D8EFC5EB7CA7C8BE34C8E776BE81250E62CA424DDB4F785C36E58383C4C4798C7B5
2,195,846,497 UART: [art] PUB.Y = 143C0F33492CC189D5A080D40A4C7C33D2D008980BC8C9B54A8B59DF74511C1F97D35B8F639EE2C4E9DA9E937B7206BC
2,195,853,786 UART: [art] SIG.R = 221300260ED81C3A2D34DC5A62E45BAFE589D0A6D1DA80A35F2778CFFBA5FD0B904228994A49CA13023F2B7FE51B26CF
2,195,861,131 UART: [art] SIG.S = 9D4D654B649B30175B63B8FB12631B19AED7D82B0CC800CFAB50DBBE6B7D9305DE723CD84D83D6087D35D0D6F5ADEBAF
2,196,840,363 UART: Caliptra RT
2,196,841,073 UART: [state] CFI Enabled
2,197,181,732 UART: [rt] RT listening for mailbox commands...
2,197,183,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,197,328,591 UART:
2,197,328,889 UART: Running Caliptra ROM ...
2,197,330,010 UART:
2,197,330,180 UART: [state] CFI Enabled
2,197,396,400 UART: [state] LifecycleState = Unprovisioned
2,197,398,281 UART: [state] DebugLocked = No
2,197,399,533 UART: [state] WD Timer not started. Device not locked for debugging
2,197,403,334 UART: [kat] SHA2-256
2,197,582,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,197,594,042 UART: [kat] ++
2,197,594,505 UART: [kat] sha1
2,197,605,666 UART: [kat] SHA2-256
2,197,608,686 UART: [kat] SHA2-384
2,197,614,785 UART: [kat] SHA2-512-ACC
2,197,617,727 UART: [kat] ECC-384
2,200,081,037 UART: [kat] HMAC-384Kdf
2,200,101,643 UART: [kat] LMS
2,200,631,100 UART: [kat] --
2,200,636,404 UART: [update-reset] ++
2,204,065,649 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,204,068,988 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,204,452,294 >>> mbox cmd response: success
2,204,452,690 UART: [update-reset] Copying MAN_2 To MAN_1
2,204,474,915 UART: [update-reset Success] --
2,204,480,047 UART: [state] Locking Datavault
2,204,481,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,204,483,458 UART: [state] Locking ICCM
2,204,485,508 UART: [exit] Launching FMC @ 0x40000130
2,204,493,909 UART:
2,204,494,144 UART: Running Caliptra FMC ...
2,204,495,251 UART:
2,204,495,412 UART: [state] CFI Enabled
2,204,593,409 UART: [art] Extend RT PCRs Done
2,204,594,623 UART: [art] Lock RT PCRs Done
2,204,596,032 UART: [art] Populate DV Done
2,204,601,611 UART: [fht] FMC Alias Private Key: 7
2,204,603,259 UART: [art] Derive CDI
2,204,604,074 UART: [art] Store in in slot 0x4
2,204,662,203 UART: [art] Derive Key Pair
2,204,663,250 UART: [art] Store priv key in slot 0x5
2,207,125,951 UART: [art] Derive Key Pair - Done
2,207,139,161 UART: [art] Signing Cert with AUTHO
2,207,140,462 UART: RITY.KEYID = 7
2,208,851,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,208,853,098 UART: [art] PUB.X = 031B4042DC6E4E0073875638FDCAEADB2DE58B5C2B597CBA34410C07C517F2F85714AD81A159A29C5D7462EEFFCEEBA6
2,208,860,406 UART: [art] PUB.Y = 2E0459F1DF5F5FB4528247BB0FA7E7EB78A808183607FA50A35F05D6EBDCC12C095A7444A6C3165B8B360D73F0C807A9
2,208,867,642 UART: [art] SIG.R = 23B9E1FAA24F884767EBF38EC90087F0A7DCFD632878F4FD43EC148431DFF4A2D242A67C5E57D22E20D89FA6D22B22C2
2,208,875,071 UART: [art] SIG.S = 5AEE21E11083C02AC9F577D8AFC36D256AAFD41CF7497A54B4C8AEE885E2273FF964E54280957D95DDABA8FED70F776F
2,209,854,610 UART: Caliptra RT
2,209,855,369 UART: [state] CFI Enabled
2,210,190,819 UART: [rt] RT listening for mailbox commands...
2,210,192,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,210,337,375 UART:
2,210,337,679 UART: Running Caliptra ROM ...
2,210,338,735 UART:
2,210,338,891 UART: [state] CFI Enabled
2,210,410,910 UART: [state] LifecycleState = Unprovisioned
2,210,412,790 UART: [state] DebugLocked = No
2,210,414,772 UART: [state] WD Timer not started. Device not locked for debugging
2,210,418,954 UART: [kat] SHA2-256
2,210,598,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,609,647 UART: [kat] ++
2,210,610,110 UART: [kat] sha1
2,210,621,649 UART: [kat] SHA2-256
2,210,624,721 UART: [kat] SHA2-384
2,210,632,540 UART: [kat] SHA2-512-ACC
2,210,635,533 UART: [kat] ECC-384
2,213,088,828 UART: [kat] HMAC-384Kdf
2,213,113,215 UART: [kat] LMS
2,213,642,659 UART: [kat] --
2,213,648,178 UART: [update-reset] ++
2,217,082,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,217,086,109 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,217,469,398 >>> mbox cmd response: success
2,217,470,286 UART: [update-reset] Copying MAN_2 To MAN_1
2,217,492,570 UART: [update-reset Success] --
2,217,497,562 UART: [state] Locking Datavault
2,217,499,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,217,501,230 UART: [state] Locking ICCM
2,217,503,708 UART: [exit] Launching FMC @ 0x40000130
2,217,512,167 UART:
2,217,512,444 UART: Running Caliptra FMC ...
2,217,513,558 UART:
2,217,513,730 UART: [state] CFI Enabled
2,217,606,058 UART: [art] Extend RT PCRs Done
2,217,607,247 UART: [art] Lock RT PCRs Done
2,217,608,346 UART: [art] Populate DV Done
2,217,613,923 UART: [fht] FMC Alias Private Key: 7
2,217,615,632 UART: [art] Derive CDI
2,217,616,455 UART: [art] Store in in slot 0x4
2,217,675,016 UART: [art] Derive Key Pair
2,217,676,063 UART: [art] Store priv key in slot 0x5
2,220,138,657 UART: [art] Derive Key Pair - Done
2,220,151,596 UART: [art] Signing Cert with AUTHO
2,220,152,938 UART: RITY.KEYID = 7
2,221,864,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,221,866,353 UART: [art] PUB.X = 8E5D0BF8B96BCB23B6C38C4748083D8EFC5EB7CA7C8BE34C8E776BE81250E62CA424DDB4F785C36E58383C4C4798C7B5
2,221,873,656 UART: [art] PUB.Y = 143C0F33492CC189D5A080D40A4C7C33D2D008980BC8C9B54A8B59DF74511C1F97D35B8F639EE2C4E9DA9E937B7206BC
2,221,880,896 UART: [art] SIG.R = 221300260ED81C3A2D34DC5A62E45BAFE589D0A6D1DA80A35F2778CFFBA5FD0B904228994A49CA13023F2B7FE51B26CF
2,221,888,288 UART: [art] SIG.S = 9D4D654B649B30175B63B8FB12631B19AED7D82B0CC800CFAB50DBBE6B7D9305DE723CD84D83D6087D35D0D6F5ADEBAF
2,222,867,762 UART: Caliptra RT
2,222,868,492 UART: [state] CFI Enabled
2,223,208,672 UART: [rt] RT listening for mailbox commands...
2,223,210,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,223,355,971 UART:
2,223,356,304 UART: Running Caliptra ROM ...
2,223,357,432 UART:
2,223,357,594 UART: [state] CFI Enabled
2,223,421,984 UART: [state] LifecycleState = Unprovisioned
2,223,423,827 UART: [state] DebugLocked = No
2,223,424,993 UART: [state] WD Timer not started. Device not locked for debugging
2,223,429,127 UART: [kat] SHA2-256
2,223,608,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,619,792 UART: [kat] ++
2,223,620,331 UART: [kat] sha1
2,223,632,205 UART: [kat] SHA2-256
2,223,635,222 UART: [kat] SHA2-384
2,223,639,860 UART: [kat] SHA2-512-ACC
2,223,642,823 UART: [kat] ECC-384
2,226,106,579 UART: [kat] HMAC-384Kdf
2,226,129,657 UART: [kat] LMS
2,226,659,120 UART: [kat] --
2,226,664,240 UART: [update-reset] ++
2,230,095,625 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,230,099,665 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,230,482,981 >>> mbox cmd response: success
2,230,483,915 UART: [update-reset] Copying MAN_2 To MAN_1
2,230,506,199 UART: [update-reset Success] --
2,230,510,490 UART: [state] Locking Datavault
2,230,513,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,230,515,501 UART: [state] Locking ICCM
2,230,517,064 UART: [exit] Launching FMC @ 0x40000130
2,230,525,465 UART:
2,230,525,702 UART: Running Caliptra FMC ...
2,230,526,825 UART:
2,230,526,991 UART: [state] CFI Enabled
2,230,620,836 UART: [art] Extend RT PCRs Done
2,230,622,022 UART: [art] Lock RT PCRs Done
2,230,623,538 UART: [art] Populate DV Done
2,230,629,215 UART: [fht] FMC Alias Private Key: 7
2,230,630,633 UART: [art] Derive CDI
2,230,631,408 UART: [art] Store in in slot 0x4
2,230,689,642 UART: [art] Derive Key Pair
2,230,690,636 UART: [art] Store priv key in slot 0x5
2,233,154,344 UART: [art] Derive Key Pair - Done
2,233,167,337 UART: [art] Signing Cert with AUTHO
2,233,168,640 UART: RITY.KEYID = 7
2,234,879,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,234,881,386 UART: [art] PUB.X = 031B4042DC6E4E0073875638FDCAEADB2DE58B5C2B597CBA34410C07C517F2F85714AD81A159A29C5D7462EEFFCEEBA6
2,234,888,630 UART: [art] PUB.Y = 2E0459F1DF5F5FB4528247BB0FA7E7EB78A808183607FA50A35F05D6EBDCC12C095A7444A6C3165B8B360D73F0C807A9
2,234,895,888 UART: [art] SIG.R = 23B9E1FAA24F884767EBF38EC90087F0A7DCFD632878F4FD43EC148431DFF4A2D242A67C5E57D22E20D89FA6D22B22C2
2,234,903,284 UART: [art] SIG.S = 5AEE21E11083C02AC9F577D8AFC36D256AAFD41CF7497A54B4C8AEE885E2273FF964E54280957D95DDABA8FED70F776F
2,235,882,140 UART: Caliptra RT
2,235,882,856 UART: [state] CFI Enabled
2,236,219,439 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 326.88s
Truncated 714807 bytes from beginning
5FE31F9AD4034FE3B12B055CD58685B
2,057,699,735 UART: [art] SIG.R = E1F8DF06D4613CD6B404E3B5185FF6337D6B7E528ED65ACD5A1AAEC482E901E6E53B66EB77D4FF5C06BAE5209AB4BF49
2,057,707,161 UART: [art] SIG.S = 04D938010C8FA844BCB282BFFF27EE65DC83375250C55382FD740F1FE94024981D377E62EEA4A5D392871EEDC136C59A
2,058,685,871 UART: Caliptra RT
2,058,686,563 UART: [state] CFI Enabled
2,059,023,053 UART: [rt] RT listening for mailbox commands...
2,059,024,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,066,165,154 >>> mbox cmd response: success
2,066,200,518 UART:
2,066,200,825 UART: Running Caliptra FMC ...
2,066,201,956 UART:
2,066,202,123 UART: [state] CFI Enabled
2,066,288,890 UART: [art] Extend RT PCRs Done
2,066,290,071 UART: [art] Lock RT PCRs Done
2,066,291,589 UART: [art] Populate DV Done
2,066,297,217 UART: [fht] FMC Alias Private Key: 7
2,066,298,926 UART: [art] Derive CDI
2,066,299,750 UART: [art] Store in in slot 0x4
2,066,358,324 UART: [art] Derive Key Pair
2,066,359,369 UART: [art] Store priv key in slot 0x5
2,068,822,023 UART: [art] Derive Key Pair - Done
2,068,834,751 UART: [art] Signing Cert with AUTHO
2,068,836,064 UART: RITY.KEYID = 7
2,070,548,336 UART: [art] Erasing AUTHORITY.KEYID = 7
2,070,549,850 UART: [art] PUB.X = 743535607601C14EEDFEDE27BA7EB4327997EB241ED4E67FA9B11D74ED166C86563F1140A39F046F747C3881D5F7AE76
2,070,557,111 UART: [art] PUB.Y = 5E17B5434197AF6C83A55B5FD142DAB7ED44AB77E05446ECF6537D4F96663637CFB28D4A160B38FF64B32BA9728A39F1
2,070,564,320 UART: [art] SIG.R = 2FE3F3B92AFB9B5EFADF2586D9079A4C24D9665B1AFECEBEF255A6DB243C631B7E82A9E90D1E1F3C7E4725247F258458
2,070,571,780 UART: [art] SIG.S = 15A1C4452634A9FF5253A5AEF78286FBBEA1CC703F7441EE633A2C82CBEB71ABAFA33A67A60A586617387D07BF608C41
2,071,550,966 UART: Caliptra RT
2,071,551,678 UART: [state] CFI Enabled
2,071,889,666 UART: [rt] RT listening for mailbox commands...
2,071,891,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,079,014,313 >>> mbox cmd response: success
2,079,047,096 UART:
2,079,047,417 UART: Running Caliptra FMC ...
2,079,048,466 UART:
2,079,048,626 UART: [state] CFI Enabled
2,079,153,191 UART: [art] Extend RT PCRs Done
2,079,154,381 UART: [art] Lock RT PCRs Done
2,079,156,035 UART: [art] Populate DV Done
2,079,161,506 UART: [fht] FMC Alias Private Key: 7
2,079,163,050 UART: [art] Derive CDI
2,079,163,795 UART: [art] Store in in slot 0x4
2,079,222,289 UART: [art] Derive Key Pair
2,079,223,333 UART: [art] Store priv key in slot 0x5
2,081,686,326 UART: [art] Derive Key Pair - Done
2,081,699,331 UART: [art] Signing Cert with AUTHO
2,081,700,641 UART: RITY.KEYID = 7
2,083,412,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,083,413,521 UART: [art] PUB.X = 80BC70507E3998EDE369A9F7068C50B78FFBC03F3A729E96D6DE8AFEB08A24D46E921A1522D7BD495311B99CEEC25EC8
2,083,420,807 UART: [art] PUB.Y = F7B31B0979CF1569EA4B7652A28F9625A785F947B4403185268207BFE92E1A1C25FE31F9AD4034FE3B12B055CD58685B
2,083,428,060 UART: [art] SIG.R = E1F8DF06D4613CD6B404E3B5185FF6337D6B7E528ED65ACD5A1AAEC482E901E6E53B66EB77D4FF5C06BAE5209AB4BF49
2,083,435,473 UART: [art] SIG.S = 04D938010C8FA844BCB282BFFF27EE65DC83375250C55382FD740F1FE94024981D377E62EEA4A5D392871EEDC136C59A
2,084,414,218 UART: Caliptra RT
2,084,414,915 UART: [state] CFI Enabled
2,084,749,483 UART: [rt] RT listening for mailbox commands...
2,084,751,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,091,865,500 >>> mbox cmd response: success
2,091,901,567 UART:
2,091,901,842 UART: Running Caliptra FMC ...
2,091,902,881 UART:
2,091,903,036 UART: [state] CFI Enabled
2,091,992,132 UART: [art] Extend RT PCRs Done
2,091,993,325 UART: [art] Lock RT PCRs Done
2,091,994,811 UART: [art] Populate DV Done
2,092,000,382 UART: [fht] FMC Alias Private Key: 7
2,092,002,000 UART: [art] Derive CDI
2,092,002,756 UART: [art] Store in in slot 0x4
2,092,061,812 UART: [art] Derive Key Pair
2,092,062,874 UART: [art] Store priv key in slot 0x5
2,094,525,714 UART: [art] Derive Key Pair - Done
2,094,538,287 UART: [art] Signing Cert with AUTHO
2,094,539,593 UART: RITY.KEYID = 7
2,096,251,225 UART: [art] Erasing AUTHORITY.KEYID = 7
2,096,252,733 UART: [art] PUB.X = 743535607601C14EEDFEDE27BA7EB4327997EB241ED4E67FA9B11D74ED166C86563F1140A39F046F747C3881D5F7AE76
2,096,259,997 UART: [art] PUB.Y = 5E17B5434197AF6C83A55B5FD142DAB7ED44AB77E05446ECF6537D4F96663637CFB28D4A160B38FF64B32BA9728A39F1
2,096,267,252 UART: [art] SIG.R = 2FE3F3B92AFB9B5EFADF2586D9079A4C24D9665B1AFECEBEF255A6DB243C631B7E82A9E90D1E1F3C7E4725247F258458
2,096,274,663 UART: [art] SIG.S = 15A1C4452634A9FF5253A5AEF78286FBBEA1CC703F7441EE633A2C82CBEB71ABAFA33A67A60A586617387D07BF608C41
2,097,253,466 UART: Caliptra RT
2,097,254,184 UART: [state] CFI Enabled
2,097,586,545 UART: [rt] RT listening for mailbox commands...
2,097,588,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,104,727,122 >>> mbox cmd response: success
2,104,764,015 UART:
2,104,764,294 UART: Running Caliptra FMC ...
2,104,765,335 UART:
2,104,765,485 UART: [state] CFI Enabled
2,104,855,227 UART: [art] Extend RT PCRs Done
2,104,856,420 UART: [art] Lock RT PCRs Done
2,104,857,958 UART: [art] Populate DV Done
2,104,863,424 UART: [fht] FMC Alias Private Key: 7
2,104,864,971 UART: [art] Derive CDI
2,104,865,710 UART: [art] Store in in slot 0x4
2,104,924,376 UART: [art] Derive Key Pair
2,104,925,419 UART: [art] Store priv key in slot 0x5
2,107,388,353 UART: [art] Derive Key Pair - Done
2,107,401,351 UART: [art] Signing Cert with AUTHO
2,107,402,664 UART: RITY.KEYID = 7
2,109,114,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,109,115,923 UART: [art] PUB.X = 80BC70507E3998EDE369A9F7068C50B78FFBC03F3A729E96D6DE8AFEB08A24D46E921A1522D7BD495311B99CEEC25EC8
2,109,123,198 UART: [art] PUB.Y = F7B31B0979CF1569EA4B7652A28F9625A785F947B4403185268207BFE92E1A1C25FE31F9AD4034FE3B12B055CD58685B
2,109,130,473 UART: [art] SIG.R = E1F8DF06D4613CD6B404E3B5185FF6337D6B7E528ED65ACD5A1AAEC482E901E6E53B66EB77D4FF5C06BAE5209AB4BF49
2,109,137,888 UART: [art] SIG.S = 04D938010C8FA844BCB282BFFF27EE65DC83375250C55382FD740F1FE94024981D377E62EEA4A5D392871EEDC136C59A
2,110,117,187 UART: Caliptra RT
2,110,117,901 UART: [state] CFI Enabled
2,110,450,554 UART: [rt] RT listening for mailbox commands...
2,110,452,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,117,570,184 >>> mbox cmd response: success
2,117,604,676 UART:
2,117,604,943 UART: Running Caliptra FMC ...
2,117,605,981 UART:
2,117,606,135 UART: [state] CFI Enabled
2,117,695,315 UART: [art] Extend RT PCRs Done
2,117,696,501 UART: [art] Lock RT PCRs Done
2,117,698,083 UART: [art] Populate DV Done
2,117,703,186 UART: [fht] FMC Alias Private Key: 7
2,117,704,779 UART: [art] Derive CDI
2,117,705,599 UART: [art] Store in in slot 0x4
2,117,764,591 UART: [art] Derive Key Pair
2,117,765,591 UART: [art] Store priv key in slot 0x5
2,120,228,201 UART: [art] Derive Key Pair - Done
2,120,240,984 UART: [art] Signing Cert with AUTHO
2,120,242,288 UART: RITY.KEYID = 7
2,121,953,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,121,955,205 UART: [art] PUB.X = 743535607601C14EEDFEDE27BA7EB4327997EB241ED4E67FA9B11D74ED166C86563F1140A39F046F747C3881D5F7AE76
2,121,962,460 UART: [art] PUB.Y = 5E17B5434197AF6C83A55B5FD142DAB7ED44AB77E05446ECF6537D4F96663637CFB28D4A160B38FF64B32BA9728A39F1
2,121,969,759 UART: [art] SIG.R = 2FE3F3B92AFB9B5EFADF2586D9079A4C24D9665B1AFECEBEF255A6DB243C631B7E82A9E90D1E1F3C7E4725247F258458
2,121,977,172 UART: [art] SIG.S = 15A1C4452634A9FF5253A5AEF78286FBBEA1CC703F7441EE633A2C82CBEB71ABAFA33A67A60A586617387D07BF608C41
2,122,956,057 UART: Caliptra RT
2,122,956,745 UART: [state] CFI Enabled
2,123,296,210 UART: [rt] RT listening for mailbox commands...
2,123,298,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,130,428,321 >>> mbox cmd response: success
2,130,462,200 UART:
2,130,462,480 UART: Running Caliptra FMC ...
2,130,463,598 UART:
2,130,463,764 UART: [state] CFI Enabled
2,130,557,013 UART: [art] Extend RT PCRs Done
2,130,558,205 UART: [art] Lock RT PCRs Done
2,130,559,497 UART: [art] Populate DV Done
2,130,564,876 UART: [fht] FMC Alias Private Key: 7
2,130,566,526 UART: [art] Derive CDI
2,130,567,558 UART: [art] Store in in slot 0x4
2,130,626,292 UART: [art] Derive Key Pair
2,130,627,296 UART: [art] Store priv key in slot 0x5
2,133,089,962 UART: [art] Derive Key Pair - Done
2,133,102,603 UART: [art] Signing Cert with AUTHO
2,133,103,906 UART: RITY.KEYID = 7
2,134,816,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,134,817,523 UART: [art] PUB.X = 80BC70507E3998EDE369A9F7068C50B78FFBC03F3A729E96D6DE8AFEB08A24D46E921A1522D7BD495311B99CEEC25EC8
2,134,824,780 UART: [art] PUB.Y = F7B31B0979CF1569EA4B7652A28F9625A785F947B4403185268207BFE92E1A1C25FE31F9AD4034FE3B12B055CD58685B
2,134,832,024 UART: [art] SIG.R = E1F8DF06D4613CD6B404E3B5185FF6337D6B7E528ED65ACD5A1AAEC482E901E6E53B66EB77D4FF5C06BAE5209AB4BF49
2,134,839,486 UART: [art] SIG.S = 04D938010C8FA844BCB282BFFF27EE65DC83375250C55382FD740F1FE94024981D377E62EEA4A5D392871EEDC136C59A
2,135,818,375 UART: Caliptra RT
2,135,819,062 UART: [state] CFI Enabled
2,136,159,384 UART: [rt] RT listening for mailbox commands...
2,136,161,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,143,299,268 >>> mbox cmd response: success
2,143,334,744 UART:
2,143,335,022 UART: Running Caliptra FMC ...
2,143,336,147 UART:
2,143,336,310 UART: [state] CFI Enabled
2,143,442,088 UART: [art] Extend RT PCRs Done
2,143,443,281 UART: [art] Lock RT PCRs Done
2,143,444,738 UART: [art] Populate DV Done
2,143,449,976 UART: [fht] FMC Alias Private Key: 7
2,143,451,714 UART: [art] Derive CDI
2,143,452,460 UART: [art] Store in in slot 0x4
2,143,511,888 UART: [art] Derive Key Pair
2,143,512,891 UART: [art] Store priv key in slot 0x5
2,145,975,830 UART: [art] Derive Key Pair - Done
2,145,988,723 UART: [art] Signing Cert with AUTHO
2,145,990,030 UART: RITY.KEYID = 7
2,147,701,951 UART: [art] Erasing AUTHORITY.KEYID = 7
2,147,703,450 UART: [art] PUB.X = 743535607601C14EEDFEDE27BA7EB4327997EB241ED4E67FA9B11D74ED166C86563F1140A39F046F747C3881D5F7AE76
2,147,710,714 UART: [art] PUB.Y = 5E17B5434197AF6C83A55B5FD142DAB7ED44AB77E05446ECF6537D4F96663637CFB28D4A160B38FF64B32BA9728A39F1
2,147,717,964 UART: [art] SIG.R = 2FE3F3B92AFB9B5EFADF2586D9079A4C24D9665B1AFECEBEF255A6DB243C631B7E82A9E90D1E1F3C7E4725247F258458
2,147,725,368 UART: [art] SIG.S = 15A1C4452634A9FF5253A5AEF78286FBBEA1CC703F7441EE633A2C82CBEB71ABAFA33A67A60A586617387D07BF608C41
2,148,704,314 UART: Caliptra RT
2,148,705,008 UART: [state] CFI Enabled
2,149,040,385 UART: [rt] RT listening for mailbox commands...
2,149,042,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,156,175,620 >>> mbox cmd response: success
2,156,210,547 UART:
2,156,210,822 UART: Running Caliptra FMC ...
2,156,211,860 UART:
2,156,212,011 UART: [state] CFI Enabled
2,156,307,102 UART: [art] Extend RT PCRs Done
2,156,308,287 UART: [art] Lock RT PCRs Done
2,156,309,614 UART: [art] Populate DV Done
2,156,314,974 UART: [fht] FMC Alias Private Key: 7
2,156,316,669 UART: [art] Derive CDI
2,156,317,407 UART: [art] Store in in slot 0x4
2,156,375,857 UART: [art] Derive Key Pair
2,156,376,918 UART: [art] Store priv key in slot 0x5
2,158,840,181 UART: [art] Derive Key Pair - Done
2,158,852,962 UART: [art] Signing Cert with AUTHO
2,158,854,269 UART: RITY.KEYID = 7
2,160,566,716 UART: [art] Erasing AUTHORITY.KEYID = 7
2,160,568,352 UART: [art] PUB.X = 80BC70507E3998EDE369A9F7068C50B78FFBC03F3A729E96D6DE8AFEB08A24D46E921A1522D7BD495311B99CEEC25EC8
2,160,575,509 UART: [art] PUB.Y = F7B31B0979CF1569EA4B7652A28F9625A785F947B4403185268207BFE92E1A1C25FE31F9AD4034FE3B12B055CD58685B
2,160,582,755 UART: [art] SIG.R = E1F8DF06D4613CD6B404E3B5185FF6337D6B7E528ED65ACD5A1AAEC482E901E6E53B66EB77D4FF5C06BAE5209AB4BF49
2,160,590,159 UART: [art] SIG.S = 04D938010C8FA844BCB282BFFF27EE65DC83375250C55382FD740F1FE94024981D377E62EEA4A5D392871EEDC136C59A
2,161,568,692 UART: Caliptra RT
2,161,569,408 UART: [state] CFI Enabled
2,161,905,353 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 323.17s
Truncated 1329910 bytes from beginning
RT:
2,357,837,264 UART: Running Caliptra FMC ...
2,357,838,361 UART:
2,357,838,517 UART: [state] CFI Enabled
2,357,882,711 UART: [art] Extend RT PCRs Done
2,357,883,856 UART: [art] Lock RT PCRs Done
2,357,885,246 UART: [art] Populate DV Done
2,357,890,647 UART: [fht] FMC Alias Private Key: 7
2,357,892,330 UART: [art] Derive CDI
2,357,893,149 UART: [art] Store in in slot 0x4
2,357,935,805 UART: [art] Derive Key Pair
2,357,936,804 UART: [art] Store priv key in slot 0x5
2,360,363,443 UART: [art] Derive Key Pair - Done
2,360,376,441 UART: [art] Signing Cert with AUTHO
2,360,377,783 UART: RITY.KEYID = 7
2,362,083,593 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,085,095 UART: [art] PUB.X = 9825703125876CC8176DA71E42CA5882217007B40105C6754CDBE0223050101FA50D97DB418E382DDCC7DF3650ABED8F
2,362,092,351 UART: [art] PUB.Y = BD0D1A49C92E90882BA02110D0710D7BB335F05599B34F6BD104637DBF9E1BA3B4645070F3C5F5CE9780FCC54C13D638
2,362,099,581 UART: [art] SIG.R = B8EF45AE4FB50ADEF8EF2D100869770E0270FC87EB43A6EAAC6C1BDD898F81518E2DD15B2B16609CC89FCC0E2ABB6B48
2,362,106,966 UART: [art] SIG.S = 20AC548F183F28995EB60E52EB80CB2C143D3502DDE0E997DE2D433C3E86CF4297569E69EA68F1520D0E6B516DBAE5FF
2,363,086,120 UART: Caliptra RT
2,363,086,950 UART: [state] CFI Enabled
2,363,378,542 UART: [rt] RT listening for mailbox commands...
2,363,380,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,363,525,185 UART:
2,363,525,483 UART: Running Caliptra ROM ...
2,363,526,514 UART:
2,363,526,714 UART: [state] CFI Enabled
2,365,357,952 UART: [state] LifecycleState = Unprovisioned
2,365,359,855 UART: [state] DebugLocked = No
2,365,362,755 UART: [state] WD Timer not started. Device not locked for debugging
2,365,366,121 UART: [kat] SHA2-256
2,365,545,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,556,855 UART: [kat] ++
2,365,557,395 UART: [kat] sha1
2,365,567,646 UART: [kat] SHA2-256
2,365,570,659 UART: [kat] SHA2-384
2,365,576,931 UART: [kat] SHA2-512-ACC
2,365,579,875 UART: [kat] ECC-384
2,368,022,349 UART: [kat] HMAC-384Kdf
2,368,034,729 UART: [kat] LMS
2,368,564,294 UART: [kat] --
2,368,569,950 UART: [update-reset] ++
2,371,997,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,001,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,372,384,720 >>> mbox cmd response: success
2,372,386,140 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,408,475 UART: [update-reset Success] --
2,372,414,110 UART: [state] Locking Datavault
2,372,417,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,418,886 UART: [state] Locking ICCM
2,372,420,872 UART: [exit] Launching FMC @ 0x40000130
2,372,429,289 UART:
2,372,429,534 UART: Running Caliptra FMC ...
2,372,430,586 UART:
2,372,430,736 UART: [state] CFI Enabled
2,372,474,779 UART: [art] Extend RT PCRs Done
2,372,475,970 UART: [art] Lock RT PCRs Done
2,372,477,348 UART: [art] Populate DV Done
2,372,482,594 UART: [fht] FMC Alias Private Key: 7
2,372,484,236 UART: [art] Derive CDI
2,372,485,046 UART: [art] Store in in slot 0x4
2,372,527,804 UART: [art] Derive Key Pair
2,372,528,836 UART: [art] Store priv key in slot 0x5
2,374,955,564 UART: [art] Derive Key Pair - Done
2,374,968,878 UART: [art] Signing Cert with AUTHO
2,374,970,178 UART: RITY.KEYID = 7
2,376,675,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,677,492 UART: [art] PUB.X = A4C98245527B0E9D1CC754967690BEE84021B3D0ADDDA2F68EFB33A0F604320A650FD8CDBD871B2E1ACC4A394C8FF419
2,376,684,747 UART: [art] PUB.Y = 732C24772591A5DD91ACDBD21BCD868D0135C29D735CDAEC3958F806E8E94FC54A112B30FAA729EBB939FB3C8C23F48D
2,376,692,021 UART: [art] SIG.R = 89F553D13816AD66F3B7AAF92EB272F504A795EDE6807D24255B6617DEC4BBAEB1DDD1CC3B9FE6918CE724C2CAD3D3B3
2,376,699,443 UART: [art] SIG.S = 92336CD42644DC4D7C16422EA73BAB5E6E7321F300F6AFCC29E110B4A334E21714D0E7F1CDC9EC157A01807D6DBA6853
2,377,677,883 UART: Caliptra RT
2,377,678,577 UART: [state] CFI Enabled
2,377,968,459 UART: [rt] RT listening for mailbox commands...
2,377,970,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,378,114,917 UART:
2,378,115,212 UART: Running Caliptra ROM ...
2,378,116,327 UART:
2,378,116,482 UART: [state] CFI Enabled
2,378,127,617 UART: [state] LifecycleState = Unprovisioned
2,378,129,484 UART: [state] DebugLocked = No
2,378,132,435 UART: [state] WD Timer not started. Device not locked for debugging
2,378,135,969 UART: [kat] SHA2-256
2,378,315,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,326,744 UART: [kat] ++
2,378,327,232 UART: [kat] sha1
2,378,338,278 UART: [kat] SHA2-256
2,378,341,352 UART: [kat] SHA2-384
2,378,347,613 UART: [kat] SHA2-512-ACC
2,378,350,559 UART: [kat] ECC-384
2,380,791,674 UART: [kat] HMAC-384Kdf
2,380,803,679 UART: [kat] LMS
2,381,333,142 UART: [kat] --
2,381,336,968 UART: [update-reset] ++
2,384,770,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,384,774,795 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,385,158,115 >>> mbox cmd response: success
2,385,158,501 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,180,672 UART: [update-reset Success] --
2,385,185,346 UART: [state] Locking Datavault
2,385,188,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,190,208 UART: [state] Locking ICCM
2,385,192,089 UART: [exit] Launching FMC @ 0x40000130
2,385,200,514 UART:
2,385,200,809 UART: Running Caliptra FMC ...
2,385,201,868 UART:
2,385,202,023 UART: [state] CFI Enabled
2,385,246,589 UART: [art] Extend RT PCRs Done
2,385,247,928 UART: [art] Lock RT PCRs Done
2,385,249,283 UART: [art] Populate DV Done
2,385,254,907 UART: [fht] FMC Alias Private Key: 7
2,385,256,600 UART: [art] Derive CDI
2,385,257,411 UART: [art] Store in in slot 0x4
2,385,299,947 UART: [art] Derive Key Pair
2,385,300,944 UART: [art] Store priv key in slot 0x5
2,387,727,549 UART: [art] Derive Key Pair - Done
2,387,740,756 UART: [art] Signing Cert with AUTHO
2,387,742,060 UART: RITY.KEYID = 7
2,389,447,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,448,597 UART: [art] PUB.X = 9825703125876CC8176DA71E42CA5882217007B40105C6754CDBE0223050101FA50D97DB418E382DDCC7DF3650ABED8F
2,389,455,841 UART: [art] PUB.Y = BD0D1A49C92E90882BA02110D0710D7BB335F05599B34F6BD104637DBF9E1BA3B4645070F3C5F5CE9780FCC54C13D638
2,389,463,069 UART: [art] SIG.R = B8EF45AE4FB50ADEF8EF2D100869770E0270FC87EB43A6EAAC6C1BDD898F81518E2DD15B2B16609CC89FCC0E2ABB6B48
2,389,470,517 UART: [art] SIG.S = 20AC548F183F28995EB60E52EB80CB2C143D3502DDE0E997DE2D433C3E86CF4297569E69EA68F1520D0E6B516DBAE5FF
2,390,449,325 UART: Caliptra RT
2,390,450,021 UART: [state] CFI Enabled
2,390,735,208 UART: [rt] RT listening for mailbox commands...
2,390,737,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,390,882,066 UART:
2,390,882,391 UART: Running Caliptra ROM ...
2,390,883,512 UART:
2,390,883,672 UART: [state] CFI Enabled
2,390,893,903 UART: [state] LifecycleState = Unprovisioned
2,390,895,732 UART: [state] DebugLocked = No
2,390,898,512 UART: [state] WD Timer not started. Device not locked for debugging
2,390,901,977 UART: [kat] SHA2-256
2,391,081,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,391,092,750 UART: [kat] ++
2,391,093,297 UART: [kat] sha1
2,391,104,732 UART: [kat] SHA2-256
2,391,107,744 UART: [kat] SHA2-384
2,391,113,621 UART: [kat] SHA2-512-ACC
2,391,116,570 UART: [kat] ECC-384
2,393,558,013 UART: [kat] HMAC-384Kdf
2,393,570,448 UART: [kat] LMS
2,394,099,957 UART: [kat] --
2,394,103,895 UART: [update-reset] ++
2,397,527,323 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,397,530,294 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,397,913,593 >>> mbox cmd response: success
2,397,914,570 UART: [update-reset] Copying MAN_2 To MAN_1
2,397,936,906 UART: [update-reset Success] --
2,397,941,295 UART: [state] Locking Datavault
2,397,945,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,946,771 UART: [state] Locking ICCM
2,397,948,567 UART: [exit] Launching FMC @ 0x40000130
2,397,957,020 UART:
2,397,957,253 UART: Running Caliptra FMC ...
2,397,958,272 UART:
2,397,958,414 UART: [state] CFI Enabled
2,398,002,644 UART: [art] Extend RT PCRs Done
2,398,003,834 UART: [art] Lock RT PCRs Done
2,398,005,431 UART: [art] Populate DV Done
2,398,010,891 UART: [fht] FMC Alias Private Key: 7
2,398,012,552 UART: [art] Derive CDI
2,398,013,290 UART: [art] Store in in slot 0x4
2,398,056,316 UART: [art] Derive Key Pair
2,398,057,358 UART: [art] Store priv key in slot 0x5
2,400,483,811 UART: [art] Derive Key Pair - Done
2,400,496,753 UART: [art] Signing Cert with AUTHO
2,400,498,053 UART: RITY.KEYID = 7
2,402,203,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,204,854 UART: [art] PUB.X = A4C98245527B0E9D1CC754967690BEE84021B3D0ADDDA2F68EFB33A0F604320A650FD8CDBD871B2E1ACC4A394C8FF419
2,402,212,160 UART: [art] PUB.Y = 732C24772591A5DD91ACDBD21BCD868D0135C29D735CDAEC3958F806E8E94FC54A112B30FAA729EBB939FB3C8C23F48D
2,402,219,461 UART: [art] SIG.R = 89F553D13816AD66F3B7AAF92EB272F504A795EDE6807D24255B6617DEC4BBAEB1DDD1CC3B9FE6918CE724C2CAD3D3B3
2,402,226,849 UART: [art] SIG.S = 92336CD42644DC4D7C16422EA73BAB5E6E7321F300F6AFCC29E110B4A334E21714D0E7F1CDC9EC157A01807D6DBA6853
2,403,205,553 UART: Caliptra RT
2,403,206,244 UART: [state] CFI Enabled
2,403,495,429 UART: [rt] RT listening for mailbox commands...
2,403,497,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,403,641,944 UART:
2,403,642,244 UART: Running Caliptra ROM ...
2,403,643,362 UART:
2,403,643,522 UART: [state] CFI Enabled
2,405,475,770 UART: [state] LifecycleState = Unprovisioned
2,405,477,678 UART: [state] DebugLocked = No
2,405,480,039 UART: [state] WD Timer not started. Device not locked for debugging
2,405,483,680 UART: [kat] SHA2-256
2,405,662,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,405,674,405 UART: [kat] ++
2,405,674,942 UART: [kat] sha1
2,405,685,287 UART: [kat] SHA2-256
2,405,688,347 UART: [kat] SHA2-384
2,405,695,465 UART: [kat] SHA2-512-ACC
2,405,698,402 UART: [kat] ECC-384
2,408,138,302 UART: [kat] HMAC-384Kdf
2,408,151,081 UART: [kat] LMS
2,408,680,643 UART: [kat] --
2,408,684,789 UART: [update-reset] ++
2,412,113,091 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,115,928 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,412,499,255 >>> mbox cmd response: success
2,412,500,772 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,523,110 UART: [update-reset Success] --
2,412,527,873 UART: [state] Locking Datavault
2,412,531,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,533,620 UART: [state] Locking ICCM
2,412,534,932 UART: [exit] Launching FMC @ 0x40000130
2,412,543,380 UART:
2,412,543,614 UART: Running Caliptra FMC ...
2,412,544,709 UART:
2,412,544,863 UART: [state] CFI Enabled
2,412,588,189 UART: [art] Extend RT PCRs Done
2,412,589,336 UART: [art] Lock RT PCRs Done
2,412,590,728 UART: [art] Populate DV Done
2,412,596,129 UART: [fht] FMC Alias Private Key: 7
2,412,597,713 UART: [art] Derive CDI
2,412,598,520 UART: [art] Store in in slot 0x4
2,412,641,111 UART: [art] Derive Key Pair
2,412,642,154 UART: [art] Store priv key in slot 0x5
2,415,068,957 UART: [art] Derive Key Pair - Done
2,415,081,849 UART: [art] Signing Cert with AUTHO
2,415,083,149 UART: RITY.KEYID = 7
2,416,788,421 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,789,937 UART: [art] PUB.X = 9825703125876CC8176DA71E42CA5882217007B40105C6754CDBE0223050101FA50D97DB418E382DDCC7DF3650ABED8F
2,416,797,180 UART: [art] PUB.Y = BD0D1A49C92E90882BA02110D0710D7BB335F05599B34F6BD104637DBF9E1BA3B4645070F3C5F5CE9780FCC54C13D638
2,416,804,468 UART: [art] SIG.R = B8EF45AE4FB50ADEF8EF2D100869770E0270FC87EB43A6EAAC6C1BDD898F81518E2DD15B2B16609CC89FCC0E2ABB6B48
2,416,811,858 UART: [art] SIG.S = 20AC548F183F28995EB60E52EB80CB2C143D3502DDE0E997DE2D433C3E86CF4297569E69EA68F1520D0E6B516DBAE5FF
2,417,790,421 UART: Caliptra RT
2,417,791,123 UART: [state] CFI Enabled
2,418,079,644 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.97s
Truncated 715075 bytes from beginning
26BC269EB5BAE6228F9ED07E92A769D
2,309,039,262 UART: [art] SIG.R = 92899A3660A0E27345B0E259F8FD1DE852A278D238781E8B9181AF82E3A09588CB86AC8F62DC5ED2F03FB58901133B6A
2,309,046,652 UART: [art] SIG.S = 06FD5455885B3569CBD4C5BED369A228CD0C62F4C95A95AF5C52260F74B02D9D49BA26A37EE0C020033D4A71551D6E93
2,310,025,543 UART: Caliptra RT
2,310,026,270 UART: [state] CFI Enabled
2,310,313,087 UART: [rt] RT listening for mailbox commands...
2,310,314,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,317,368,944 >>> mbox cmd response: success
2,317,403,288 UART:
2,317,403,585 UART: Running Caliptra FMC ...
2,317,404,618 UART:
2,317,404,765 UART: [state] CFI Enabled
2,317,449,112 UART: [art] Extend RT PCRs Done
2,317,450,261 UART: [art] Lock RT PCRs Done
2,317,451,709 UART: [art] Populate DV Done
2,317,457,078 UART: [fht] FMC Alias Private Key: 7
2,317,458,780 UART: [art] Derive CDI
2,317,459,594 UART: [art] Store in in slot 0x4
2,317,502,413 UART: [art] Derive Key Pair
2,317,503,462 UART: [art] Store priv key in slot 0x5
2,319,929,656 UART: [art] Derive Key Pair - Done
2,319,942,774 UART: [art] Signing Cert with AUTHO
2,319,944,077 UART: RITY.KEYID = 7
2,321,650,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,651,658 UART: [art] PUB.X = 179275F80AE62F00553625452277F116A6AE55D70E4B4AEBB62B1AD9587E96C3A0EBCFE533AD41521EA63A026BFD6D53
2,321,658,915 UART: [art] PUB.Y = F49FB772B62AA5851BFB90AE46E71B83590F01E5702F21F2AA76ADBF4C57B9387EB20704C3908A6156D18CECD3647505
2,321,666,162 UART: [art] SIG.R = 2D699D447A4C4D27093979B9297BD64F5B18EE081539D2BAE105B3D8CD711F6FF33F63ADD4AB16C71358A32A3A9703D2
2,321,673,559 UART: [art] SIG.S = 21B0E0FA229F9B2A60CAF98E95AEA391D99E7AEEB33F19CB3C31B227C6D4470C19D1456908548F9EBED7D9CA04338282
2,322,652,347 UART: Caliptra RT
2,322,653,073 UART: [state] CFI Enabled
2,322,944,158 UART: [rt] RT listening for mailbox commands...
2,322,946,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,332,249,564 >>> mbox cmd response: success
2,332,284,316 UART:
2,332,284,616 UART: Running Caliptra FMC ...
2,332,285,649 UART:
2,332,285,793 UART: [state] CFI Enabled
2,332,330,194 UART: [art] Extend RT PCRs Done
2,332,331,340 UART: [art] Lock RT PCRs Done
2,332,333,004 UART: [art] Populate DV Done
2,332,338,578 UART: [fht] FMC Alias Private Key: 7
2,332,340,225 UART: [art] Derive CDI
2,332,341,037 UART: [art] Store in in slot 0x4
2,332,383,526 UART: [art] Derive Key Pair
2,332,384,568 UART: [art] Store priv key in slot 0x5
2,334,811,322 UART: [art] Derive Key Pair - Done
2,334,824,174 UART: [art] Signing Cert with AUTHO
2,334,825,494 UART: RITY.KEYID = 7
2,336,531,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,532,749 UART: [art] PUB.X = 9D4816E861CB1145F8B3B82F4A245E29D2CD300A0DD6EE0C64D08361224070B54059F27B6195D5760A5B91D53C30F198
2,336,539,996 UART: [art] PUB.Y = 4AA172AA21722CC4B417748FCB7B2E6173ECDCA4DE23D528B67008DBEE41A63A026BC269EB5BAE6228F9ED07E92A769D
2,336,547,281 UART: [art] SIG.R = 92899A3660A0E27345B0E259F8FD1DE852A278D238781E8B9181AF82E3A09588CB86AC8F62DC5ED2F03FB58901133B6A
2,336,554,689 UART: [art] SIG.S = 06FD5455885B3569CBD4C5BED369A228CD0C62F4C95A95AF5C52260F74B02D9D49BA26A37EE0C020033D4A71551D6E93
2,337,533,425 UART: Caliptra RT
2,337,534,126 UART: [state] CFI Enabled
2,337,817,476 UART: [rt] RT listening for mailbox commands...
2,337,819,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,344,864,955 >>> mbox cmd response: success
2,344,899,770 UART:
2,344,900,032 UART: Running Caliptra FMC ...
2,344,901,153 UART:
2,344,901,314 UART: [state] CFI Enabled
2,344,945,044 UART: [art] Extend RT PCRs Done
2,344,946,255 UART: [art] Lock RT PCRs Done
2,344,947,739 UART: [art] Populate DV Done
2,344,953,371 UART: [fht] FMC Alias Private Key: 7
2,344,955,062 UART: [art] Derive CDI
2,344,955,801 UART: [art] Store in in slot 0x4
2,344,998,126 UART: [art] Derive Key Pair
2,344,999,165 UART: [art] Store priv key in slot 0x5
2,347,425,555 UART: [art] Derive Key Pair - Done
2,347,438,499 UART: [art] Signing Cert with AUTHO
2,347,439,804 UART: RITY.KEYID = 7
2,349,145,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,146,649 UART: [art] PUB.X = 179275F80AE62F00553625452277F116A6AE55D70E4B4AEBB62B1AD9587E96C3A0EBCFE533AD41521EA63A026BFD6D53
2,349,153,892 UART: [art] PUB.Y = F49FB772B62AA5851BFB90AE46E71B83590F01E5702F21F2AA76ADBF4C57B9387EB20704C3908A6156D18CECD3647505
2,349,161,154 UART: [art] SIG.R = 2D699D447A4C4D27093979B9297BD64F5B18EE081539D2BAE105B3D8CD711F6FF33F63ADD4AB16C71358A32A3A9703D2
2,349,168,554 UART: [art] SIG.S = 21B0E0FA229F9B2A60CAF98E95AEA391D99E7AEEB33F19CB3C31B227C6D4470C19D1456908548F9EBED7D9CA04338282
2,350,147,674 UART: Caliptra RT
2,350,148,412 UART: [state] CFI Enabled
2,350,436,320 UART: [rt] RT listening for mailbox commands...
2,350,438,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,357,490,790 >>> mbox cmd response: success
2,357,524,368 UART:
2,357,524,644 UART: Running Caliptra FMC ...
2,357,525,764 UART:
2,357,525,925 UART: [state] CFI Enabled
2,357,570,048 UART: [art] Extend RT PCRs Done
2,357,571,237 UART: [art] Lock RT PCRs Done
2,357,572,312 UART: [art] Populate DV Done
2,357,577,721 UART: [fht] FMC Alias Private Key: 7
2,357,579,312 UART: [art] Derive CDI
2,357,580,127 UART: [art] Store in in slot 0x4
2,357,622,726 UART: [art] Derive Key Pair
2,357,623,727 UART: [art] Store priv key in slot 0x5
2,360,051,092 UART: [art] Derive Key Pair - Done
2,360,064,153 UART: [art] Signing Cert with AUTHO
2,360,065,462 UART: RITY.KEYID = 7
2,361,771,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,772,682 UART: [art] PUB.X = 9D4816E861CB1145F8B3B82F4A245E29D2CD300A0DD6EE0C64D08361224070B54059F27B6195D5760A5B91D53C30F198
2,361,779,978 UART: [art] PUB.Y = 4AA172AA21722CC4B417748FCB7B2E6173ECDCA4DE23D528B67008DBEE41A63A026BC269EB5BAE6228F9ED07E92A769D
2,361,787,272 UART: [art] SIG.R = 92899A3660A0E27345B0E259F8FD1DE852A278D238781E8B9181AF82E3A09588CB86AC8F62DC5ED2F03FB58901133B6A
2,361,794,609 UART: [art] SIG.S = 06FD5455885B3569CBD4C5BED369A228CD0C62F4C95A95AF5C52260F74B02D9D49BA26A37EE0C020033D4A71551D6E93
2,362,773,549 UART: Caliptra RT
2,362,774,270 UART: [state] CFI Enabled
2,363,065,656 UART: [rt] RT listening for mailbox commands...
2,363,067,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,372,374,040 >>> mbox cmd response: success
2,372,409,686 UART:
2,372,409,961 UART: Running Caliptra FMC ...
2,372,411,074 UART:
2,372,411,266 UART: [state] CFI Enabled
2,372,454,650 UART: [art] Extend RT PCRs Done
2,372,455,845 UART: [art] Lock RT PCRs Done
2,372,457,466 UART: [art] Populate DV Done
2,372,462,982 UART: [fht] FMC Alias Private Key: 7
2,372,464,622 UART: [art] Derive CDI
2,372,465,435 UART: [art] Store in in slot 0x4
2,372,508,032 UART: [art] Derive Key Pair
2,372,509,032 UART: [art] Store priv key in slot 0x5
2,374,935,909 UART: [art] Derive Key Pair - Done
2,374,948,811 UART: [art] Signing Cert with AUTHO
2,374,950,116 UART: RITY.KEYID = 7
2,376,655,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,656,831 UART: [art] PUB.X = 179275F80AE62F00553625452277F116A6AE55D70E4B4AEBB62B1AD9587E96C3A0EBCFE533AD41521EA63A026BFD6D53
2,376,664,124 UART: [art] PUB.Y = F49FB772B62AA5851BFB90AE46E71B83590F01E5702F21F2AA76ADBF4C57B9387EB20704C3908A6156D18CECD3647505
2,376,671,358 UART: [art] SIG.R = 2D699D447A4C4D27093979B9297BD64F5B18EE081539D2BAE105B3D8CD711F6FF33F63ADD4AB16C71358A32A3A9703D2
2,376,678,798 UART: [art] SIG.S = 21B0E0FA229F9B2A60CAF98E95AEA391D99E7AEEB33F19CB3C31B227C6D4470C19D1456908548F9EBED7D9CA04338282
2,377,658,339 UART: Caliptra RT
2,377,659,049 UART: [state] CFI Enabled
2,377,946,668 UART: [rt] RT listening for mailbox commands...
2,377,948,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,385,005,445 >>> mbox cmd response: success
2,385,040,532 UART:
2,385,040,802 UART: Running Caliptra FMC ...
2,385,041,834 UART:
2,385,041,984 UART: [state] CFI Enabled
2,385,086,122 UART: [art] Extend RT PCRs Done
2,385,087,317 UART: [art] Lock RT PCRs Done
2,385,088,478 UART: [art] Populate DV Done
2,385,094,069 UART: [fht] FMC Alias Private Key: 7
2,385,095,674 UART: [art] Derive CDI
2,385,096,491 UART: [art] Store in in slot 0x4
2,385,139,377 UART: [art] Derive Key Pair
2,385,140,385 UART: [art] Store priv key in slot 0x5
2,387,566,599 UART: [art] Derive Key Pair - Done
2,387,579,329 UART: [art] Signing Cert with AUTHO
2,387,580,638 UART: RITY.KEYID = 7
2,389,286,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,287,637 UART: [art] PUB.X = 9D4816E861CB1145F8B3B82F4A245E29D2CD300A0DD6EE0C64D08361224070B54059F27B6195D5760A5B91D53C30F198
2,389,294,885 UART: [art] PUB.Y = 4AA172AA21722CC4B417748FCB7B2E6173ECDCA4DE23D528B67008DBEE41A63A026BC269EB5BAE6228F9ED07E92A769D
2,389,302,192 UART: [art] SIG.R = 92899A3660A0E27345B0E259F8FD1DE852A278D238781E8B9181AF82E3A09588CB86AC8F62DC5ED2F03FB58901133B6A
2,389,309,578 UART: [art] SIG.S = 06FD5455885B3569CBD4C5BED369A228CD0C62F4C95A95AF5C52260F74B02D9D49BA26A37EE0C020033D4A71551D6E93
2,390,288,384 UART: Caliptra RT
2,390,289,107 UART: [state] CFI Enabled
2,390,572,629 UART: [rt] RT listening for mailbox commands...
2,390,574,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,397,616,912 >>> mbox cmd response: success
2,397,651,839 UART:
2,397,652,160 UART: Running Caliptra FMC ...
2,397,653,283 UART:
2,397,653,447 UART: [state] CFI Enabled
2,397,697,457 UART: [art] Extend RT PCRs Done
2,397,698,606 UART: [art] Lock RT PCRs Done
2,397,700,106 UART: [art] Populate DV Done
2,397,705,619 UART: [fht] FMC Alias Private Key: 7
2,397,707,367 UART: [art] Derive CDI
2,397,708,178 UART: [art] Store in in slot 0x4
2,397,750,936 UART: [art] Derive Key Pair
2,397,751,983 UART: [art] Store priv key in slot 0x5
2,400,178,631 UART: [art] Derive Key Pair - Done
2,400,192,013 UART: [art] Signing Cert with AUTHO
2,400,193,323 UART: RITY.KEYID = 7
2,401,898,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,401,900,489 UART: [art] PUB.X = 179275F80AE62F00553625452277F116A6AE55D70E4B4AEBB62B1AD9587E96C3A0EBCFE533AD41521EA63A026BFD6D53
2,401,907,751 UART: [art] PUB.Y = F49FB772B62AA5851BFB90AE46E71B83590F01E5702F21F2AA76ADBF4C57B9387EB20704C3908A6156D18CECD3647505
2,401,914,980 UART: [art] SIG.R = 2D699D447A4C4D27093979B9297BD64F5B18EE081539D2BAE105B3D8CD711F6FF33F63ADD4AB16C71358A32A3A9703D2
2,401,922,376 UART: [art] SIG.S = 21B0E0FA229F9B2A60CAF98E95AEA391D99E7AEEB33F19CB3C31B227C6D4470C19D1456908548F9EBED7D9CA04338282
2,402,901,993 UART: Caliptra RT
2,402,902,711 UART: [state] CFI Enabled
2,403,193,079 UART: [rt] RT listening for mailbox commands...
2,403,194,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,412,493,310 >>> mbox cmd response: success
2,412,529,206 UART:
2,412,529,506 UART: Running Caliptra FMC ...
2,412,530,539 UART:
2,412,530,685 UART: [state] CFI Enabled
2,412,574,919 UART: [art] Extend RT PCRs Done
2,412,576,067 UART: [art] Lock RT PCRs Done
2,412,577,704 UART: [art] Populate DV Done
2,412,583,212 UART: [fht] FMC Alias Private Key: 7
2,412,584,922 UART: [art] Derive CDI
2,412,585,656 UART: [art] Store in in slot 0x4
2,412,628,196 UART: [art] Derive Key Pair
2,412,629,236 UART: [art] Store priv key in slot 0x5
2,415,056,146 UART: [art] Derive Key Pair - Done
2,415,068,873 UART: [art] Signing Cert with AUTHO
2,415,070,175 UART: RITY.KEYID = 7
2,416,775,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,777,255 UART: [art] PUB.X = 9D4816E861CB1145F8B3B82F4A245E29D2CD300A0DD6EE0C64D08361224070B54059F27B6195D5760A5B91D53C30F198
2,416,784,492 UART: [art] PUB.Y = 4AA172AA21722CC4B417748FCB7B2E6173ECDCA4DE23D528B67008DBEE41A63A026BC269EB5BAE6228F9ED07E92A769D
2,416,791,777 UART: [art] SIG.R = 92899A3660A0E27345B0E259F8FD1DE852A278D238781E8B9181AF82E3A09588CB86AC8F62DC5ED2F03FB58901133B6A
2,416,799,167 UART: [art] SIG.S = 06FD5455885B3569CBD4C5BED369A228CD0C62F4C95A95AF5C52260F74B02D9D49BA26A37EE0C020033D4A71551D6E93
2,417,778,624 UART: Caliptra RT
2,417,779,339 UART: [state] CFI Enabled
2,418,066,572 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.97s
Truncated 1329834 bytes from beginning
RT:
2,316,855,399 UART: Running Caliptra FMC ...
2,316,856,432 UART:
2,316,856,583 UART: [state] CFI Enabled
2,316,948,691 UART: [art] Extend RT PCRs Done
2,316,949,875 UART: [art] Lock RT PCRs Done
2,316,951,366 UART: [art] Populate DV Done
2,316,956,825 UART: [fht] FMC Alias Private Key: 7
2,316,958,362 UART: [art] Derive CDI
2,316,959,179 UART: [art] Store in in slot 0x4
2,317,017,811 UART: [art] Derive Key Pair
2,317,018,860 UART: [art] Store priv key in slot 0x5
2,319,481,847 UART: [art] Derive Key Pair - Done
2,319,494,691 UART: [art] Signing Cert with AUTHO
2,319,495,993 UART: RITY.KEYID = 7
2,321,207,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,208,845 UART: [art] PUB.X = DB99DC9393EAB2AEE43993EC311E3299105357852F6612141820A5CB6A0C9055947F62D82BAAD62FB1FDCF91D249F663
2,321,216,086 UART: [art] PUB.Y = 3D994490C1F7BDDE232D6BE8CA0E6F525B993DA1864AD743E199133A080F8BA9C1A61C42EC83F944DEBCF9CF98CF8C2A
2,321,223,390 UART: [art] SIG.R = 95C09914AE1A27F3751C395CF7746D1FC444D9B60AFF90639B7BCD1251CD9664F36B14A149A4E621ED26B1B80E50CDB4
2,321,230,816 UART: [art] SIG.S = 3AB822636B2D69A3D961403B82BCE31EFB7446AD37E439888B2755801C50ACC4EC161C222881FD3DD4A0874E110CAA1B
2,322,209,856 UART: Caliptra RT
2,322,210,570 UART: [state] CFI Enabled
2,322,551,098 UART: [rt] RT listening for mailbox commands...
2,322,552,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,322,697,970 UART:
2,322,698,276 UART: Running Caliptra ROM ...
2,322,699,416 UART:
2,322,699,582 UART: [state] CFI Enabled
2,322,764,775 UART: [state] LifecycleState = Unprovisioned
2,322,766,831 UART: [state] DebugLocked = No
2,322,768,227 UART: [state] WD Timer not started. Device not locked for debugging
2,322,772,105 UART: [kat] SHA2-256
2,322,961,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,322,972,734 UART: [kat] ++
2,322,973,204 UART: [kat] sha1
2,322,985,068 UART: [kat] SHA2-256
2,322,988,051 UART: [kat] SHA2-384
2,322,993,769 UART: [kat] SHA2-512-ACC
2,322,996,403 UART: [kat] ECC-384
2,325,447,896 UART: [kat] HMAC-384Kdf
2,325,468,915 UART: [kat] LMS
2,326,000,492 UART: [kat] --
2,326,005,910 UART: [update-reset] ++
2,329,468,728 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,329,472,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,330,080,890 >>> mbox cmd response: success
2,330,082,257 UART: [update-reset] Copying MAN_2 To MAN_1
2,330,119,812 UART: [update-reset Success] --
2,330,122,301 UART: [state] Locking Datavault
2,330,125,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,330,127,605 UART: [state] Locking ICCM
2,330,129,926 UART: [exit] Launching FMC @ 0x40000130
2,330,138,560 UART:
2,330,138,797 UART: Running Caliptra FMC ...
2,330,139,900 UART:
2,330,140,066 UART: [state] CFI Enabled
2,330,238,011 UART: [art] Extend RT PCRs Done
2,330,239,220 UART: [art] Lock RT PCRs Done
2,330,240,698 UART: [art] Populate DV Done
2,330,246,163 UART: [fht] FMC Alias Private Key: 7
2,330,247,646 UART: [art] Derive CDI
2,330,248,463 UART: [art] Store in in slot 0x4
2,330,307,183 UART: [art] Derive Key Pair
2,330,308,226 UART: [art] Store priv key in slot 0x5
2,332,772,585 UART: [art] Derive Key Pair - Done
2,332,785,481 UART: [art] Signing Cert with AUTHO
2,332,786,787 UART: RITY.KEYID = 7
2,334,498,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,334,500,127 UART: [art] PUB.X = 75721409D3BD57B46A3CCEC516BA61E8666B115DC2019486E36E1326D4A0CBCF25D21CC8F6B98A0A9B83E1C60B162484
2,334,507,792 UART: [art] PUB.Y = 0AF84650779F574FC8C571EB2F6DB151FD9261598F18541ED655BA9ACEA6E4CF312A378B1D06FDA4DF2495CF7B10B2AA
2,334,514,717 UART: [art] SIG.R = C52CC725C3A56950493E1782A5334204783E4210974603DC600CCA726B4334AFEF6BC79A339EB19950272FB8A1AE9598
2,334,522,054 UART: [art] SIG.S = 744C714D8509705CBC7A27AE185626A08FFC40FA3E58E93F3524D807EE93D6BFD4A912AC94CB8D5F5C568227ADAAB701
2,335,500,951 UART: Caliptra RT
2,335,501,654 UART: [state] CFI Enabled
2,335,834,362 UART: [rt] RT listening for mailbox commands...
2,335,836,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,335,981,114 UART:
2,335,981,416 UART: Running Caliptra ROM ...
2,335,982,456 UART:
2,335,982,611 UART: [state] CFI Enabled
2,336,051,858 UART: [state] LifecycleState = Unprovisioned
2,336,053,999 UART: [state] DebugLocked = No
2,336,055,257 UART: [state] WD Timer not started. Device not locked for debugging
2,336,060,167 UART: [kat] SHA2-256
2,336,250,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,336,260,754 UART: [kat] ++
2,336,261,248 UART: [kat] sha1
2,336,271,759 UART: [kat] SHA2-256
2,336,274,760 UART: [kat] SHA2-384
2,336,279,825 UART: [kat] SHA2-512-ACC
2,336,282,420 UART: [kat] ECC-384
2,338,737,999 UART: [kat] HMAC-384Kdf
2,338,761,464 UART: [kat] LMS
2,339,293,054 UART: [kat] --
2,339,298,016 UART: [update-reset] ++
2,342,761,346 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,342,764,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,343,373,045 >>> mbox cmd response: success
2,343,373,664 UART: [update-reset] Copying MAN_2 To MAN_1
2,343,411,236 UART: [update-reset Success] --
2,343,414,373 UART: [state] Locking Datavault
2,343,418,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,343,420,804 UART: [state] Locking ICCM
2,343,423,724 UART: [exit] Launching FMC @ 0x40000130
2,343,432,398 UART:
2,343,432,636 UART: Running Caliptra FMC ...
2,343,433,760 UART:
2,343,433,924 UART: [state] CFI Enabled
2,343,528,464 UART: [art] Extend RT PCRs Done
2,343,529,653 UART: [art] Lock RT PCRs Done
2,343,531,112 UART: [art] Populate DV Done
2,343,536,901 UART: [fht] FMC Alias Private Key: 7
2,343,538,440 UART: [art] Derive CDI
2,343,539,204 UART: [art] Store in in slot 0x4
2,343,597,754 UART: [art] Derive Key Pair
2,343,598,794 UART: [art] Store priv key in slot 0x5
2,346,061,758 UART: [art] Derive Key Pair - Done
2,346,074,748 UART: [art] Signing Cert with AUTHO
2,346,076,056 UART: RITY.KEYID = 7
2,347,788,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,347,789,867 UART: [art] PUB.X = DB99DC9393EAB2AEE43993EC311E3299105357852F6612141820A5CB6A0C9055947F62D82BAAD62FB1FDCF91D249F663
2,347,797,117 UART: [art] PUB.Y = 3D994490C1F7BDDE232D6BE8CA0E6F525B993DA1864AD743E199133A080F8BA9C1A61C42EC83F944DEBCF9CF98CF8C2A
2,347,804,411 UART: [art] SIG.R = 95C09914AE1A27F3751C395CF7746D1FC444D9B60AFF90639B7BCD1251CD9664F36B14A149A4E621ED26B1B80E50CDB4
2,347,811,815 UART: [art] SIG.S = 3AB822636B2D69A3D961403B82BCE31EFB7446AD37E439888B2755801C50ACC4EC161C222881FD3DD4A0874E110CAA1B
2,348,790,799 UART: Caliptra RT
2,348,791,484 UART: [state] CFI Enabled
2,349,129,100 UART: [rt] RT listening for mailbox commands...
2,349,130,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,349,275,697 UART:
2,349,276,002 UART: Running Caliptra ROM ...
2,349,277,138 UART:
2,349,277,309 UART: [state] CFI Enabled
2,349,342,731 UART: [state] LifecycleState = Unprovisioned
2,349,344,825 UART: [state] DebugLocked = No
2,349,347,079 UART: [state] WD Timer not started. Device not locked for debugging
2,349,351,492 UART: [kat] SHA2-256
2,349,541,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,349,552,101 UART: [kat] ++
2,349,552,584 UART: [kat] sha1
2,349,564,992 UART: [kat] SHA2-256
2,349,567,965 UART: [kat] SHA2-384
2,349,574,549 UART: [kat] SHA2-512-ACC
2,349,577,124 UART: [kat] ECC-384
2,352,030,938 UART: [kat] HMAC-384Kdf
2,352,052,898 UART: [kat] LMS
2,352,584,446 UART: [kat] --
2,352,587,528 UART: [update-reset] ++
2,356,042,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,356,046,410 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,356,654,652 >>> mbox cmd response: success
2,356,656,166 UART: [update-reset] Copying MAN_2 To MAN_1
2,356,693,730 UART: [update-reset Success] --
2,356,697,512 UART: [state] Locking Datavault
2,356,701,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,356,703,490 UART: [state] Locking ICCM
2,356,704,842 UART: [exit] Launching FMC @ 0x40000130
2,356,713,470 UART:
2,356,713,708 UART: Running Caliptra FMC ...
2,356,714,810 UART:
2,356,714,975 UART: [state] CFI Enabled
2,356,821,873 UART: [art] Extend RT PCRs Done
2,356,823,055 UART: [art] Lock RT PCRs Done
2,356,824,466 UART: [art] Populate DV Done
2,356,829,988 UART: [fht] FMC Alias Private Key: 7
2,356,831,572 UART: [art] Derive CDI
2,356,832,401 UART: [art] Store in in slot 0x4
2,356,891,059 UART: [art] Derive Key Pair
2,356,892,063 UART: [art] Store priv key in slot 0x5
2,359,355,412 UART: [art] Derive Key Pair - Done
2,359,368,205 UART: [art] Signing Cert with AUTHO
2,359,369,538 UART: RITY.KEYID = 7
2,361,080,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,082,399 UART: [art] PUB.X = 75721409D3BD57B46A3CCEC516BA61E8666B115DC2019486E36E1326D4A0CBCF25D21CC8F6B98A0A9B83E1C60B162484
2,361,089,683 UART: [art] PUB.Y = 0AF84650779F574FC8C571EB2F6DB151FD9261598F18541ED655BA9ACEA6E4CF312A378B1D06FDA4DF2495CF7B10B2AA
2,361,096,925 UART: [art] SIG.R = C52CC725C3A56950493E1782A5334204783E4210974603DC600CCA726B4334AFEF6BC79A339EB19950272FB8A1AE9598
2,361,104,317 UART: [art] SIG.S = 744C714D8509705CBC7A27AE185626A08FFC40FA3E58E93F3524D807EE93D6BFD4A912AC94CB8D5F5C568227ADAAB701
2,362,083,265 UART: Caliptra RT
2,362,083,981 UART: [state] CFI Enabled
2,362,419,318 UART: [rt] RT listening for mailbox commands...
2,362,421,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,362,566,266 UART:
2,362,566,583 UART: Running Caliptra ROM ...
2,362,567,701 UART:
2,362,567,863 UART: [state] CFI Enabled
2,362,633,109 UART: [state] LifecycleState = Unprovisioned
2,362,635,205 UART: [state] DebugLocked = No
2,362,636,667 UART: [state] WD Timer not started. Device not locked for debugging
2,362,641,353 UART: [kat] SHA2-256
2,362,831,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,362,841,988 UART: [kat] ++
2,362,842,480 UART: [kat] sha1
2,362,854,343 UART: [kat] SHA2-256
2,362,857,317 UART: [kat] SHA2-384
2,362,864,070 UART: [kat] SHA2-512-ACC
2,362,866,644 UART: [kat] ECC-384
2,365,318,192 UART: [kat] HMAC-384Kdf
2,365,342,453 UART: [kat] LMS
2,365,874,001 UART: [kat] --
2,365,879,851 UART: [update-reset] ++
2,369,342,084 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,369,345,846 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,369,954,078 >>> mbox cmd response: success
2,369,954,938 UART: [update-reset] Copying MAN_2 To MAN_1
2,369,992,466 UART: [update-reset Success] --
2,369,996,598 UART: [state] Locking Datavault
2,370,000,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,370,002,435 UART: [state] Locking ICCM
2,370,004,167 UART: [exit] Launching FMC @ 0x40000130
2,370,012,850 UART:
2,370,013,093 UART: Running Caliptra FMC ...
2,370,014,201 UART:
2,370,014,367 UART: [state] CFI Enabled
2,370,110,139 UART: [art] Extend RT PCRs Done
2,370,111,339 UART: [art] Lock RT PCRs Done
2,370,112,743 UART: [art] Populate DV Done
2,370,118,151 UART: [fht] FMC Alias Private Key: 7
2,370,119,853 UART: [art] Derive CDI
2,370,120,667 UART: [art] Store in in slot 0x4
2,370,179,133 UART: [art] Derive Key Pair
2,370,180,139 UART: [art] Store priv key in slot 0x5
2,372,643,336 UART: [art] Derive Key Pair - Done
2,372,656,005 UART: [art] Signing Cert with AUTHO
2,372,657,317 UART: RITY.KEYID = 7
2,374,368,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,374,370,486 UART: [art] PUB.X = DB99DC9393EAB2AEE43993EC311E3299105357852F6612141820A5CB6A0C9055947F62D82BAAD62FB1FDCF91D249F663
2,374,377,730 UART: [art] PUB.Y = 3D994490C1F7BDDE232D6BE8CA0E6F525B993DA1864AD743E199133A080F8BA9C1A61C42EC83F944DEBCF9CF98CF8C2A
2,374,385,027 UART: [art] SIG.R = 95C09914AE1A27F3751C395CF7746D1FC444D9B60AFF90639B7BCD1251CD9664F36B14A149A4E621ED26B1B80E50CDB4
2,374,392,421 UART: [art] SIG.S = 3AB822636B2D69A3D961403B82BCE31EFB7446AD37E439888B2755801C50ACC4EC161C222881FD3DD4A0874E110CAA1B
2,375,370,770 UART: Caliptra RT
2,375,371,470 UART: [state] CFI Enabled
2,375,706,058 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 333.85s
Truncated 715201 bytes from beginning
AFC3BB920987E91BAB1525D15721B8C
2,398,018,491 UART: [art] SIG.R = D1A158B9B09C531B50D290898DEB1F49BA43BEE9866BA040A8139BF89F98E5363EE0B854B6B08177E8E5CA77671E7A11
2,398,025,884 UART: [art] SIG.S = 518E7C89738A4546B46E3C7F790E49D3B04AF445F9EAADD2A859241E807CF95825BE2A2548D2049B79724ECB2F508DF8
2,399,004,509 UART: Caliptra RT
2,399,005,207 UART: [state] CFI Enabled
2,399,341,838 UART: [rt] RT listening for mailbox commands...
2,399,343,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,407,184,172 >>> mbox cmd response: success
2,407,215,914 UART:
2,407,216,184 UART: Running Caliptra FMC ...
2,407,217,317 UART:
2,407,217,485 UART: [state] CFI Enabled
2,407,324,044 UART: [art] Extend RT PCRs Done
2,407,325,236 UART: [art] Lock RT PCRs Done
2,407,326,640 UART: [art] Populate DV Done
2,407,332,265 UART: [fht] FMC Alias Private Key: 7
2,407,333,895 UART: [art] Derive CDI
2,407,334,738 UART: [art] Store in in slot 0x4
2,407,392,754 UART: [art] Derive Key Pair
2,407,393,757 UART: [art] Store priv key in slot 0x5
2,409,857,279 UART: [art] Derive Key Pair - Done
2,409,870,445 UART: [art] Signing Cert with AUTHO
2,409,871,748 UART: RITY.KEYID = 7
2,411,583,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,411,584,536 UART: [art] PUB.X = C0D5680969561B4313C4E87AD7FCD97FFAE687D43D14DC37D6E75EDAFADB54F988DB2A75A8179DB03D31A5141B5B0250
2,411,591,789 UART: [art] PUB.Y = DB99E5775A598A47A217B7DA0A21F4C1FA8541336B5DA457FCB54DE7109E669627CA1B34946E074E484B451CA8788853
2,411,599,048 UART: [art] SIG.R = 3EFF2FBABC5D6225EDD59B5F6794E9FC467403176F11848ADA8386784CE0ADFA572C5FCAAD20150570E2CF0D51006291
2,411,606,451 UART: [art] SIG.S = F8AB0308A70BE366A1AED25C46D20F51AC624A292F7369AAB066C54C5A6D355B10A5A0F27A4FCF0053ACBF3F178C853A
2,412,585,553 UART: Caliptra RT
2,412,586,272 UART: [state] CFI Enabled
2,412,923,259 UART: [rt] RT listening for mailbox commands...
2,412,925,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,420,747,226 >>> mbox cmd response: success
2,420,782,747 UART:
2,420,783,048 UART: Running Caliptra FMC ...
2,420,784,177 UART:
2,420,784,345 UART: [state] CFI Enabled
2,420,870,537 UART: [art] Extend RT PCRs Done
2,420,871,730 UART: [art] Lock RT PCRs Done
2,420,873,165 UART: [art] Populate DV Done
2,420,878,634 UART: [fht] FMC Alias Private Key: 7
2,420,880,171 UART: [art] Derive CDI
2,420,880,928 UART: [art] Store in in slot 0x4
2,420,939,811 UART: [art] Derive Key Pair
2,420,940,855 UART: [art] Store priv key in slot 0x5
2,423,404,157 UART: [art] Derive Key Pair - Done
2,423,416,988 UART: [art] Signing Cert with AUTHO
2,423,418,330 UART: RITY.KEYID = 7
2,425,129,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,425,131,136 UART: [art] PUB.X = EDDE844906558EA83F2C0F2A698553224C1A6B49DB4E1AAFB7CE6C79EF2BCC02D852FEC4CE22A65B3BEB78321F134876
2,425,138,435 UART: [art] PUB.Y = E9582985AED11F0B200DAEE22AA8F0D2E292F3EBEA2E86226530C0441500D766AAFC3BB920987E91BAB1525D15721B8C
2,425,145,668 UART: [art] SIG.R = D1A158B9B09C531B50D290898DEB1F49BA43BEE9866BA040A8139BF89F98E5363EE0B854B6B08177E8E5CA77671E7A11
2,425,153,059 UART: [art] SIG.S = 518E7C89738A4546B46E3C7F790E49D3B04AF445F9EAADD2A859241E807CF95825BE2A2548D2049B79724ECB2F508DF8
2,426,131,678 UART: Caliptra RT
2,426,132,369 UART: [state] CFI Enabled
2,426,467,507 UART: [rt] RT listening for mailbox commands...
2,426,469,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,292,374 >>> mbox cmd response: success
2,434,326,296 UART:
2,434,326,599 UART: Running Caliptra FMC ...
2,434,327,725 UART:
2,434,327,889 UART: [state] CFI Enabled
2,434,417,738 UART: [art] Extend RT PCRs Done
2,434,418,921 UART: [art] Lock RT PCRs Done
2,434,420,386 UART: [art] Populate DV Done
2,434,425,960 UART: [fht] FMC Alias Private Key: 7
2,434,427,554 UART: [art] Derive CDI
2,434,428,367 UART: [art] Store in in slot 0x4
2,434,486,648 UART: [art] Derive Key Pair
2,434,487,689 UART: [art] Store priv key in slot 0x5
2,436,950,341 UART: [art] Derive Key Pair - Done
2,436,963,239 UART: [art] Signing Cert with AUTHO
2,436,964,549 UART: RITY.KEYID = 7
2,438,676,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,438,678,250 UART: [art] PUB.X = C0D5680969561B4313C4E87AD7FCD97FFAE687D43D14DC37D6E75EDAFADB54F988DB2A75A8179DB03D31A5141B5B0250
2,438,685,546 UART: [art] PUB.Y = DB99E5775A598A47A217B7DA0A21F4C1FA8541336B5DA457FCB54DE7109E669627CA1B34946E074E484B451CA8788853
2,438,692,775 UART: [art] SIG.R = 3EFF2FBABC5D6225EDD59B5F6794E9FC467403176F11848ADA8386784CE0ADFA572C5FCAAD20150570E2CF0D51006291
2,438,700,199 UART: [art] SIG.S = F8AB0308A70BE366A1AED25C46D20F51AC624A292F7369AAB066C54C5A6D355B10A5A0F27A4FCF0053ACBF3F178C853A
2,439,678,926 UART: Caliptra RT
2,439,679,644 UART: [state] CFI Enabled
2,440,015,801 UART: [rt] RT listening for mailbox commands...
2,440,017,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,447,834,231 >>> mbox cmd response: success
2,447,869,218 UART:
2,447,869,486 UART: Running Caliptra FMC ...
2,447,870,600 UART:
2,447,870,764 UART: [state] CFI Enabled
2,447,964,818 UART: [art] Extend RT PCRs Done
2,447,965,993 UART: [art] Lock RT PCRs Done
2,447,967,389 UART: [art] Populate DV Done
2,447,973,086 UART: [fht] FMC Alias Private Key: 7
2,447,974,727 UART: [art] Derive CDI
2,447,975,571 UART: [art] Store in in slot 0x4
2,448,033,853 UART: [art] Derive Key Pair
2,448,034,854 UART: [art] Store priv key in slot 0x5
2,450,497,799 UART: [art] Derive Key Pair - Done
2,450,510,410 UART: [art] Signing Cert with AUTHO
2,450,511,714 UART: RITY.KEYID = 7
2,452,223,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,452,225,008 UART: [art] PUB.X = EDDE844906558EA83F2C0F2A698553224C1A6B49DB4E1AAFB7CE6C79EF2BCC02D852FEC4CE22A65B3BEB78321F134876
2,452,232,264 UART: [art] PUB.Y = E9582985AED11F0B200DAEE22AA8F0D2E292F3EBEA2E86226530C0441500D766AAFC3BB920987E91BAB1525D15721B8C
2,452,239,491 UART: [art] SIG.R = D1A158B9B09C531B50D290898DEB1F49BA43BEE9866BA040A8139BF89F98E5363EE0B854B6B08177E8E5CA77671E7A11
2,452,246,891 UART: [art] SIG.S = 518E7C89738A4546B46E3C7F790E49D3B04AF445F9EAADD2A859241E807CF95825BE2A2548D2049B79724ECB2F508DF8
2,453,226,008 UART: Caliptra RT
2,453,226,697 UART: [state] CFI Enabled
2,453,566,775 UART: [rt] RT listening for mailbox commands...
2,453,568,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,363,500 >>> mbox cmd response: success
2,461,397,774 UART:
2,461,398,043 UART: Running Caliptra FMC ...
2,461,399,162 UART:
2,461,399,330 UART: [state] CFI Enabled
2,461,502,184 UART: [art] Extend RT PCRs Done
2,461,503,382 UART: [art] Lock RT PCRs Done
2,461,505,002 UART: [art] Populate DV Done
2,461,510,412 UART: [fht] FMC Alias Private Key: 7
2,461,511,950 UART: [art] Derive CDI
2,461,512,719 UART: [art] Store in in slot 0x4
2,461,571,970 UART: [art] Derive Key Pair
2,461,572,962 UART: [art] Store priv key in slot 0x5
2,464,035,710 UART: [art] Derive Key Pair - Done
2,464,049,033 UART: [art] Signing Cert with AUTHO
2,464,050,368 UART: RITY.KEYID = 7
2,465,761,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,465,762,909 UART: [art] PUB.X = C0D5680969561B4313C4E87AD7FCD97FFAE687D43D14DC37D6E75EDAFADB54F988DB2A75A8179DB03D31A5141B5B0250
2,465,769,865 UART: [art] PUB.Y = DB99E5775A598A47A217B7DA0A21F4C1FA8541336B5DA457FCB54DE7109E669627CA1B34946E074E484B451CA8788853
2,465,777,100 UART: [art] SIG.R = 3EFF2FBABC5D6225EDD59B5F6794E9FC467403176F11848ADA8386784CE0ADFA572C5FCAAD20150570E2CF0D51006291
2,465,784,492 UART: [art] SIG.S = F8AB0308A70BE366A1AED25C46D20F51AC624A292F7369AAB066C54C5A6D355B10A5A0F27A4FCF0053ACBF3F178C853A
2,466,763,505 UART: Caliptra RT
2,466,764,242 UART: [state] CFI Enabled
2,467,102,680 UART: [rt] RT listening for mailbox commands...
2,467,104,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,474,923,065 >>> mbox cmd response: success
2,474,957,391 UART:
2,474,957,690 UART: Running Caliptra FMC ...
2,474,958,816 UART:
2,474,958,984 UART: [state] CFI Enabled
2,475,048,445 UART: [art] Extend RT PCRs Done
2,475,049,647 UART: [art] Lock RT PCRs Done
2,475,051,272 UART: [art] Populate DV Done
2,475,056,833 UART: [fht] FMC Alias Private Key: 7
2,475,058,432 UART: [art] Derive CDI
2,475,059,257 UART: [art] Store in in slot 0x4
2,475,116,905 UART: [art] Derive Key Pair
2,475,117,943 UART: [art] Store priv key in slot 0x5
2,477,580,975 UART: [art] Derive Key Pair - Done
2,477,593,714 UART: [art] Signing Cert with AUTHO
2,477,595,019 UART: RITY.KEYID = 7
2,479,307,285 UART: [art] Erasing AUTHORITY.KEYID = 7
2,479,308,796 UART: [art] PUB.X = EDDE844906558EA83F2C0F2A698553224C1A6B49DB4E1AAFB7CE6C79EF2BCC02D852FEC4CE22A65B3BEB78321F134876
2,479,316,046 UART: [art] PUB.Y = E9582985AED11F0B200DAEE22AA8F0D2E292F3EBEA2E86226530C0441500D766AAFC3BB920987E91BAB1525D15721B8C
2,479,323,277 UART: [art] SIG.R = D1A158B9B09C531B50D290898DEB1F49BA43BEE9866BA040A8139BF89F98E5363EE0B854B6B08177E8E5CA77671E7A11
2,479,330,669 UART: [art] SIG.S = 518E7C89738A4546B46E3C7F790E49D3B04AF445F9EAADD2A859241E807CF95825BE2A2548D2049B79724ECB2F508DF8
2,480,309,157 UART: Caliptra RT
2,480,309,863 UART: [state] CFI Enabled
2,480,647,215 UART: [rt] RT listening for mailbox commands...
2,480,649,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,488,480,301 >>> mbox cmd response: success
2,488,515,503 UART:
2,488,515,775 UART: Running Caliptra FMC ...
2,488,516,889 UART:
2,488,517,048 UART: [state] CFI Enabled
2,488,616,172 UART: [art] Extend RT PCRs Done
2,488,617,374 UART: [art] Lock RT PCRs Done
2,488,618,940 UART: [art] Populate DV Done
2,488,624,242 UART: [fht] FMC Alias Private Key: 7
2,488,625,784 UART: [art] Derive CDI
2,488,626,599 UART: [art] Store in in slot 0x4
2,488,685,047 UART: [art] Derive Key Pair
2,488,686,055 UART: [art] Store priv key in slot 0x5
2,491,148,649 UART: [art] Derive Key Pair - Done
2,491,161,700 UART: [art] Signing Cert with AUTHO
2,491,163,004 UART: RITY.KEYID = 7
2,492,875,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,492,876,801 UART: [art] PUB.X = C0D5680969561B4313C4E87AD7FCD97FFAE687D43D14DC37D6E75EDAFADB54F988DB2A75A8179DB03D31A5141B5B0250
2,492,884,043 UART: [art] PUB.Y = DB99E5775A598A47A217B7DA0A21F4C1FA8541336B5DA457FCB54DE7109E669627CA1B34946E074E484B451CA8788853
2,492,891,333 UART: [art] SIG.R = 3EFF2FBABC5D6225EDD59B5F6794E9FC467403176F11848ADA8386784CE0ADFA572C5FCAAD20150570E2CF0D51006291
2,492,898,671 UART: [art] SIG.S = F8AB0308A70BE366A1AED25C46D20F51AC624A292F7369AAB066C54C5A6D355B10A5A0F27A4FCF0053ACBF3F178C853A
2,493,877,435 UART: Caliptra RT
2,493,878,151 UART: [state] CFI Enabled
2,494,211,661 UART: [rt] RT listening for mailbox commands...
2,494,213,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,502,042,327 >>> mbox cmd response: success
2,502,078,710 UART:
2,502,079,008 UART: Running Caliptra FMC ...
2,502,080,140 UART:
2,502,080,333 UART: [state] CFI Enabled
2,502,181,651 UART: [art] Extend RT PCRs Done
2,502,182,832 UART: [art] Lock RT PCRs Done
2,502,184,183 UART: [art] Populate DV Done
2,502,189,652 UART: [fht] FMC Alias Private Key: 7
2,502,191,404 UART: [art] Derive CDI
2,502,192,223 UART: [art] Store in in slot 0x4
2,502,251,171 UART: [art] Derive Key Pair
2,502,252,212 UART: [art] Store priv key in slot 0x5
2,504,715,447 UART: [art] Derive Key Pair - Done
2,504,728,174 UART: [art] Signing Cert with AUTHO
2,504,729,475 UART: RITY.KEYID = 7
2,506,440,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,506,442,408 UART: [art] PUB.X = EDDE844906558EA83F2C0F2A698553224C1A6B49DB4E1AAFB7CE6C79EF2BCC02D852FEC4CE22A65B3BEB78321F134876
2,506,449,713 UART: [art] PUB.Y = E9582985AED11F0B200DAEE22AA8F0D2E292F3EBEA2E86226530C0441500D766AAFC3BB920987E91BAB1525D15721B8C
2,506,456,979 UART: [art] SIG.R = D1A158B9B09C531B50D290898DEB1F49BA43BEE9866BA040A8139BF89F98E5363EE0B854B6B08177E8E5CA77671E7A11
2,506,464,346 UART: [art] SIG.S = 518E7C89738A4546B46E3C7F790E49D3B04AF445F9EAADD2A859241E807CF95825BE2A2548D2049B79724ECB2F508DF8
2,507,442,604 UART: Caliptra RT
2,507,443,294 UART: [state] CFI Enabled
2,507,784,400 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 340.46s
Truncated 1329932 bytes from beginning
RT:
2,359,049,289 UART: Running Caliptra FMC ...
2,359,050,315 UART:
2,359,050,460 UART: [state] CFI Enabled
2,359,094,810 UART: [art] Extend RT PCRs Done
2,359,096,004 UART: [art] Lock RT PCRs Done
2,359,097,655 UART: [art] Populate DV Done
2,359,103,064 UART: [fht] FMC Alias Private Key: 7
2,359,104,819 UART: [art] Derive CDI
2,359,105,557 UART: [art] Store in in slot 0x4
2,359,147,719 UART: [art] Derive Key Pair
2,359,148,753 UART: [art] Store priv key in slot 0x5
2,361,575,750 UART: [art] Derive Key Pair - Done
2,361,588,744 UART: [art] Signing Cert with AUTHO
2,361,590,049 UART: RITY.KEYID = 7
2,363,295,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,297,231 UART: [art] PUB.X = D722E58A048D4B279EAA4D0D40DA98FAB2534833B677C47897E041C8ED1A25B48C36401FA845F0F7C39AA4D4981AEE7C
2,363,304,319 UART: [art] PUB.Y = CDD0D664C0C1DC8C0D7BC5F3DE613A55495635B0B2B4E95294D33A8E7FA409B7ECCBF66ABE29AFA32854E20DFF8A65DE
2,363,311,660 UART: [art] SIG.R = E2D68B9D0532AFD0EDBD9B54B6C5895ACAA87148E7786046E812301F72B8654359696A3F127DFF50E0B2C92423853736
2,363,319,049 UART: [art] SIG.S = 4E29CAA8C41C22F45D03B2955972B524C9E4E14EFD1C7BF23ABD354B618B2AA447C44989D8BE5705420DF47C42B3AB82
2,364,297,810 UART: Caliptra RT
2,364,298,525 UART: [state] CFI Enabled
2,364,588,166 UART: [rt] RT listening for mailbox commands...
2,364,590,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,364,734,847 UART:
2,364,735,144 UART: Running Caliptra ROM ...
2,364,736,177 UART:
2,364,736,544 UART: [state] CFI Enabled
2,365,705,160 UART: [state] LifecycleState = Unprovisioned
2,365,707,132 UART: [state] DebugLocked = No
2,365,709,087 UART: [state] WD Timer not started. Device not locked for debugging
2,365,713,066 UART: [kat] SHA2-256
2,365,903,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,913,726 UART: [kat] ++
2,365,914,245 UART: [kat] sha1
2,365,926,596 UART: [kat] SHA2-256
2,365,929,610 UART: [kat] SHA2-384
2,365,936,088 UART: [kat] SHA2-512-ACC
2,365,938,663 UART: [kat] ECC-384
2,368,381,518 UART: [kat] HMAC-384Kdf
2,368,394,070 UART: [kat] LMS
2,368,925,674 UART: [kat] --
2,368,928,262 UART: [update-reset] ++
2,372,385,583 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,388,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,372,997,230 >>> mbox cmd response: success
2,372,998,093 UART: [update-reset] Copying MAN_2 To MAN_1
2,373,035,668 UART: [update-reset Success] --
2,373,040,798 UART: [state] Locking Datavault
2,373,044,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,373,046,696 UART: [state] Locking ICCM
2,373,049,719 UART: [exit] Launching FMC @ 0x40000130
2,373,058,337 UART:
2,373,058,615 UART: Running Caliptra FMC ...
2,373,059,726 UART:
2,373,059,890 UART: [state] CFI Enabled
2,373,104,287 UART: [art] Extend RT PCRs Done
2,373,105,430 UART: [art] Lock RT PCRs Done
2,373,106,902 UART: [art] Populate DV Done
2,373,112,250 UART: [fht] FMC Alias Private Key: 7
2,373,113,893 UART: [art] Derive CDI
2,373,114,631 UART: [art] Store in in slot 0x4
2,373,157,112 UART: [art] Derive Key Pair
2,373,158,157 UART: [art] Store priv key in slot 0x5
2,375,585,010 UART: [art] Derive Key Pair - Done
2,375,598,231 UART: [art] Signing Cert with AUTHO
2,375,599,538 UART: RITY.KEYID = 7
2,377,305,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,306,697 UART: [art] PUB.X = DCAE82269CB3B7F06B1F1A085F82B517C14938911E0354BE746C60CA654D50F0C4EEE83EEAB339A3755DF03E805DFF63
2,377,313,940 UART: [art] PUB.Y = 58747DA7EB6A1DD2BB828D9E909FF45515E98DA70634F91FF70193AFEC2EEDCC4EA52974FF47DBBA9F992968278CFD1B
2,377,321,232 UART: [art] SIG.R = 992BE5EBA6000DAB4FC2759F9FCF4467BFE26BDB1DCE77BAA2A80283F9C86FDA13899AC99D48E113CF71E9C5FAF54191
2,377,328,613 UART: [art] SIG.S = C025D2361955A0C2707C7E63DA1D8F8A5EC56833CC700A948861D266ED27130CF46EA97AFDAAF2B307E8C3FEC1D07AC2
2,378,307,463 UART: Caliptra RT
2,378,308,178 UART: [state] CFI Enabled
2,378,599,425 UART: [rt] RT listening for mailbox commands...
2,378,601,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,378,746,088 UART:
2,378,746,389 UART: Running Caliptra ROM ...
2,378,747,505 UART:
2,378,747,721 UART: [state] CFI Enabled
2,378,762,922 UART: [state] LifecycleState = Unprovisioned
2,378,764,814 UART: [state] DebugLocked = No
2,378,767,110 UART: [state] WD Timer not started. Device not locked for debugging
2,378,770,968 UART: [kat] SHA2-256
2,378,960,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,971,646 UART: [kat] ++
2,378,972,130 UART: [kat] sha1
2,378,982,695 UART: [kat] SHA2-256
2,378,985,701 UART: [kat] SHA2-384
2,378,992,347 UART: [kat] SHA2-512-ACC
2,378,994,915 UART: [kat] ECC-384
2,381,433,833 UART: [kat] HMAC-384Kdf
2,381,445,459 UART: [kat] LMS
2,381,977,046 UART: [kat] --
2,381,980,304 UART: [update-reset] ++
2,385,439,905 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,443,618 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,386,051,862 >>> mbox cmd response: success
2,386,053,293 UART: [update-reset] Copying MAN_2 To MAN_1
2,386,090,875 UART: [update-reset Success] --
2,386,095,279 UART: [state] Locking Datavault
2,386,098,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,386,100,573 UART: [state] Locking ICCM
2,386,101,865 UART: [exit] Launching FMC @ 0x40000130
2,386,110,539 UART:
2,386,110,774 UART: Running Caliptra FMC ...
2,386,111,873 UART:
2,386,112,043 UART: [state] CFI Enabled
2,386,156,380 UART: [art] Extend RT PCRs Done
2,386,157,518 UART: [art] Lock RT PCRs Done
2,386,158,961 UART: [art] Populate DV Done
2,386,164,417 UART: [fht] FMC Alias Private Key: 7
2,386,166,080 UART: [art] Derive CDI
2,386,166,895 UART: [art] Store in in slot 0x4
2,386,209,318 UART: [art] Derive Key Pair
2,386,210,357 UART: [art] Store priv key in slot 0x5
2,388,637,179 UART: [art] Derive Key Pair - Done
2,388,650,328 UART: [art] Signing Cert with AUTHO
2,388,651,627 UART: RITY.KEYID = 7
2,390,357,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,359,108 UART: [art] PUB.X = D722E58A048D4B279EAA4D0D40DA98FAB2534833B677C47897E041C8ED1A25B48C36401FA845F0F7C39AA4D4981AEE7C
2,390,366,416 UART: [art] PUB.Y = CDD0D664C0C1DC8C0D7BC5F3DE613A55495635B0B2B4E95294D33A8E7FA409B7ECCBF66ABE29AFA32854E20DFF8A65DE
2,390,373,697 UART: [art] SIG.R = E2D68B9D0532AFD0EDBD9B54B6C5895ACAA87148E7786046E812301F72B8654359696A3F127DFF50E0B2C92423853736
2,390,381,078 UART: [art] SIG.S = 4E29CAA8C41C22F45D03B2955972B524C9E4E14EFD1C7BF23ABD354B618B2AA447C44989D8BE5705420DF47C42B3AB82
2,391,359,915 UART: Caliptra RT
2,391,360,605 UART: [state] CFI Enabled
2,391,648,176 UART: [rt] RT listening for mailbox commands...
2,391,650,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,391,795,115 UART:
2,391,795,416 UART: Running Caliptra ROM ...
2,391,796,448 UART:
2,391,796,760 UART: [state] CFI Enabled
2,391,812,487 UART: [state] LifecycleState = Unprovisioned
2,391,814,375 UART: [state] DebugLocked = No
2,391,816,918 UART: [state] WD Timer not started. Device not locked for debugging
2,391,821,313 UART: [kat] SHA2-256
2,392,011,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,392,021,892 UART: [kat] ++
2,392,022,411 UART: [kat] sha1
2,392,034,324 UART: [kat] SHA2-256
2,392,037,345 UART: [kat] SHA2-384
2,392,044,420 UART: [kat] SHA2-512-ACC
2,392,046,996 UART: [kat] ECC-384
2,394,487,183 UART: [kat] HMAC-384Kdf
2,394,499,861 UART: [kat] LMS
2,395,031,443 UART: [kat] --
2,395,035,824 UART: [update-reset] ++
2,398,493,228 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,497,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,399,105,663 >>> mbox cmd response: success
2,399,107,019 UART: [update-reset] Copying MAN_2 To MAN_1
2,399,144,581 UART: [update-reset Success] --
2,399,148,696 UART: [state] Locking Datavault
2,399,151,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,153,296 UART: [state] Locking ICCM
2,399,155,755 UART: [exit] Launching FMC @ 0x40000130
2,399,164,425 UART:
2,399,164,654 UART: Running Caliptra FMC ...
2,399,165,676 UART:
2,399,165,819 UART: [state] CFI Enabled
2,399,209,900 UART: [art] Extend RT PCRs Done
2,399,211,046 UART: [art] Lock RT PCRs Done
2,399,212,520 UART: [art] Populate DV Done
2,399,218,138 UART: [fht] FMC Alias Private Key: 7
2,399,219,877 UART: [art] Derive CDI
2,399,220,620 UART: [art] Store in in slot 0x4
2,399,263,269 UART: [art] Derive Key Pair
2,399,264,269 UART: [art] Store priv key in slot 0x5
2,401,691,820 UART: [art] Derive Key Pair - Done
2,401,704,539 UART: [art] Signing Cert with AUTHO
2,401,705,867 UART: RITY.KEYID = 7
2,403,411,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,412,762 UART: [art] PUB.X = DCAE82269CB3B7F06B1F1A085F82B517C14938911E0354BE746C60CA654D50F0C4EEE83EEAB339A3755DF03E805DFF63
2,403,420,060 UART: [art] PUB.Y = 58747DA7EB6A1DD2BB828D9E909FF45515E98DA70634F91FF70193AFEC2EEDCC4EA52974FF47DBBA9F992968278CFD1B
2,403,427,311 UART: [art] SIG.R = 992BE5EBA6000DAB4FC2759F9FCF4467BFE26BDB1DCE77BAA2A80283F9C86FDA13899AC99D48E113CF71E9C5FAF54191
2,403,434,695 UART: [art] SIG.S = C025D2361955A0C2707C7E63DA1D8F8A5EC56833CC700A948861D266ED27130CF46EA97AFDAAF2B307E8C3FEC1D07AC2
2,404,413,485 UART: Caliptra RT
2,404,414,184 UART: [state] CFI Enabled
2,404,703,809 UART: [rt] RT listening for mailbox commands...
2,404,705,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,404,851,007 UART:
2,404,851,332 UART: Running Caliptra ROM ...
2,404,852,371 UART:
2,404,852,628 UART: [state] CFI Enabled
2,405,829,942 UART: [state] LifecycleState = Unprovisioned
2,405,831,833 UART: [state] DebugLocked = No
2,405,833,893 UART: [state] WD Timer not started. Device not locked for debugging
2,405,838,678 UART: [kat] SHA2-256
2,406,028,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,406,039,296 UART: [kat] ++
2,406,039,838 UART: [kat] sha1
2,406,050,403 UART: [kat] SHA2-256
2,406,053,399 UART: [kat] SHA2-384
2,406,060,851 UART: [kat] SHA2-512-ACC
2,406,063,419 UART: [kat] ECC-384
2,408,504,222 UART: [kat] HMAC-384Kdf
2,408,517,539 UART: [kat] LMS
2,409,049,185 UART: [kat] --
2,409,053,202 UART: [update-reset] ++
2,412,523,689 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,527,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,413,135,437 >>> mbox cmd response: success
2,413,136,267 UART: [update-reset] Copying MAN_2 To MAN_1
2,413,173,834 UART: [update-reset Success] --
2,413,179,169 UART: [state] Locking Datavault
2,413,183,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,413,185,663 UART: [state] Locking ICCM
2,413,188,411 UART: [exit] Launching FMC @ 0x40000130
2,413,197,051 UART:
2,413,197,296 UART: Running Caliptra FMC ...
2,413,198,395 UART:
2,413,198,550 UART: [state] CFI Enabled
2,413,242,408 UART: [art] Extend RT PCRs Done
2,413,243,592 UART: [art] Lock RT PCRs Done
2,413,245,237 UART: [art] Populate DV Done
2,413,250,589 UART: [fht] FMC Alias Private Key: 7
2,413,252,179 UART: [art] Derive CDI
2,413,252,988 UART: [art] Store in in slot 0x4
2,413,295,851 UART: [art] Derive Key Pair
2,413,296,853 UART: [art] Store priv key in slot 0x5
2,415,723,659 UART: [art] Derive Key Pair - Done
2,415,736,817 UART: [art] Signing Cert with AUTHO
2,415,738,122 UART: RITY.KEYID = 7
2,417,443,692 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,445,222 UART: [art] PUB.X = D722E58A048D4B279EAA4D0D40DA98FAB2534833B677C47897E041C8ED1A25B48C36401FA845F0F7C39AA4D4981AEE7C
2,417,452,467 UART: [art] PUB.Y = CDD0D664C0C1DC8C0D7BC5F3DE613A55495635B0B2B4E95294D33A8E7FA409B7ECCBF66ABE29AFA32854E20DFF8A65DE
2,417,459,787 UART: [art] SIG.R = E2D68B9D0532AFD0EDBD9B54B6C5895ACAA87148E7786046E812301F72B8654359696A3F127DFF50E0B2C92423853736
2,417,467,132 UART: [art] SIG.S = 4E29CAA8C41C22F45D03B2955972B524C9E4E14EFD1C7BF23ABD354B618B2AA447C44989D8BE5705420DF47C42B3AB82
2,418,446,305 UART: Caliptra RT
2,418,446,996 UART: [state] CFI Enabled
2,418,737,237 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 336.00s
Truncated 715103 bytes from beginning
B8CBC09E216DFEA34A94AB2FC9BA4C2
2,311,020,946 UART: [art] SIG.R = 3B2F1B3DB44A6ECC9F2C9B0FDD6529237DB30C897B6F545F7B68117DD32ED6AE711B612B7AC1AF3F46BF8F28A57B7035
2,311,028,415 UART: [art] SIG.S = 93F33E6FC83D76D37AB24B7E9A9B84AAB9B07652D837F59B2863DF3D34774B6A1B6E7B708E8C6BF20C4F4064DD875E8A
2,312,007,750 UART: Caliptra RT
2,312,008,444 UART: [state] CFI Enabled
2,312,295,465 UART: [rt] RT listening for mailbox commands...
2,312,297,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,320,026,377 >>> mbox cmd response: success
2,320,061,414 UART:
2,320,061,695 UART: Running Caliptra FMC ...
2,320,062,803 UART:
2,320,062,963 UART: [state] CFI Enabled
2,320,107,305 UART: [art] Extend RT PCRs Done
2,320,108,494 UART: [art] Lock RT PCRs Done
2,320,110,063 UART: [art] Populate DV Done
2,320,115,422 UART: [fht] FMC Alias Private Key: 7
2,320,116,954 UART: [art] Derive CDI
2,320,117,767 UART: [art] Store in in slot 0x4
2,320,160,039 UART: [art] Derive Key Pair
2,320,161,090 UART: [art] Store priv key in slot 0x5
2,322,588,138 UART: [art] Derive Key Pair - Done
2,322,601,621 UART: [art] Signing Cert with AUTHO
2,322,602,917 UART: RITY.KEYID = 7
2,324,308,342 UART: [art] Erasing AUTHORITY.KEYID = 7
2,324,309,846 UART: [art] PUB.X = 95E4F4929ED9156CDC7CCF5BB5B17F30F51792C2C69D07CFFC2D46C6FDE309AF872F57A7AA30B64DF0360ADB1864CF1C
2,324,317,217 UART: [art] PUB.Y = 82EA7AB1B6548CEC9318FFB8FEB8D1D87049F8DA30709B9D10400EA2C582901E4E466811228F55432B5C65FDBE2C1976
2,324,324,462 UART: [art] SIG.R = EAF2DF13C4EDAAC299A3F3C7ADEAFF9A95E31D6D07ED387AB7624BF53B418245D6F57F4B102D48318BA267AF69D56741
2,324,331,851 UART: [art] SIG.S = B164A9C9BE42CC05B0F404F913BDE599AB60BBB129B96EF100BA5F85B6A7FBFA63DA05E48A332263ED61856C290C1F44
2,325,310,174 UART: Caliptra RT
2,325,310,874 UART: [state] CFI Enabled
2,325,602,056 UART: [rt] RT listening for mailbox commands...
2,325,603,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,333,525,342 >>> mbox cmd response: success
2,333,558,967 UART:
2,333,559,259 UART: Running Caliptra FMC ...
2,333,560,379 UART:
2,333,560,539 UART: [state] CFI Enabled
2,333,604,958 UART: [art] Extend RT PCRs Done
2,333,606,144 UART: [art] Lock RT PCRs Done
2,333,607,383 UART: [art] Populate DV Done
2,333,612,635 UART: [fht] FMC Alias Private Key: 7
2,333,614,345 UART: [art] Derive CDI
2,333,615,164 UART: [art] Store in in slot 0x4
2,333,657,551 UART: [art] Derive Key Pair
2,333,658,547 UART: [art] Store priv key in slot 0x5
2,336,084,927 UART: [art] Derive Key Pair - Done
2,336,097,726 UART: [art] Signing Cert with AUTHO
2,336,099,040 UART: RITY.KEYID = 7
2,337,804,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,337,805,621 UART: [art] PUB.X = E9AF0FC7E68AEFE78A15F32A68FA2A3471D1712BA92A77F3E39BBCDE6646B1E16619B31ECFF2452B7647BC283B40CD8C
2,337,812,943 UART: [art] PUB.Y = 5A35F824A6C552878B3168CFFAB6DC0C15B52696105B88113AA13DD07EBAECA58B8CBC09E216DFEA34A94AB2FC9BA4C2
2,337,820,227 UART: [art] SIG.R = 3B2F1B3DB44A6ECC9F2C9B0FDD6529237DB30C897B6F545F7B68117DD32ED6AE711B612B7AC1AF3F46BF8F28A57B7035
2,337,827,610 UART: [art] SIG.S = 93F33E6FC83D76D37AB24B7E9A9B84AAB9B07652D837F59B2863DF3D34774B6A1B6E7B708E8C6BF20C4F4064DD875E8A
2,338,806,262 UART: Caliptra RT
2,338,806,978 UART: [state] CFI Enabled
2,339,092,377 UART: [rt] RT listening for mailbox commands...
2,339,094,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,346,824,674 >>> mbox cmd response: success
2,346,861,589 UART:
2,346,861,853 UART: Running Caliptra FMC ...
2,346,862,879 UART:
2,346,863,025 UART: [state] CFI Enabled
2,346,907,000 UART: [art] Extend RT PCRs Done
2,346,908,195 UART: [art] Lock RT PCRs Done
2,346,909,472 UART: [art] Populate DV Done
2,346,914,887 UART: [fht] FMC Alias Private Key: 7
2,346,916,493 UART: [art] Derive CDI
2,346,917,233 UART: [art] Store in in slot 0x4
2,346,959,984 UART: [art] Derive Key Pair
2,346,961,021 UART: [art] Store priv key in slot 0x5
2,349,387,401 UART: [art] Derive Key Pair - Done
2,349,400,290 UART: [art] Signing Cert with AUTHO
2,349,401,592 UART: RITY.KEYID = 7
2,351,107,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,351,108,739 UART: [art] PUB.X = 95E4F4929ED9156CDC7CCF5BB5B17F30F51792C2C69D07CFFC2D46C6FDE309AF872F57A7AA30B64DF0360ADB1864CF1C
2,351,116,213 UART: [art] PUB.Y = 82EA7AB1B6548CEC9318FFB8FEB8D1D87049F8DA30709B9D10400EA2C582901E4E466811228F55432B5C65FDBE2C1976
2,351,123,286 UART: [art] SIG.R = EAF2DF13C4EDAAC299A3F3C7ADEAFF9A95E31D6D07ED387AB7624BF53B418245D6F57F4B102D48318BA267AF69D56741
2,351,130,725 UART: [art] SIG.S = B164A9C9BE42CC05B0F404F913BDE599AB60BBB129B96EF100BA5F85B6A7FBFA63DA05E48A332263ED61856C290C1F44
2,352,109,892 UART: Caliptra RT
2,352,110,605 UART: [state] CFI Enabled
2,352,397,927 UART: [rt] RT listening for mailbox commands...
2,352,399,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,360,123,105 >>> mbox cmd response: success
2,360,157,486 UART:
2,360,157,794 UART: Running Caliptra FMC ...
2,360,158,914 UART:
2,360,159,079 UART: [state] CFI Enabled
2,360,203,039 UART: [art] Extend RT PCRs Done
2,360,204,181 UART: [art] Lock RT PCRs Done
2,360,205,736 UART: [art] Populate DV Done
2,360,211,195 UART: [fht] FMC Alias Private Key: 7
2,360,212,729 UART: [art] Derive CDI
2,360,213,541 UART: [art] Store in in slot 0x4
2,360,256,571 UART: [art] Derive Key Pair
2,360,257,610 UART: [art] Store priv key in slot 0x5
2,362,684,438 UART: [art] Derive Key Pair - Done
2,362,697,656 UART: [art] Signing Cert with AUTHO
2,362,698,954 UART: RITY.KEYID = 7
2,364,404,674 UART: [art] Erasing AUTHORITY.KEYID = 7
2,364,406,177 UART: [art] PUB.X = E9AF0FC7E68AEFE78A15F32A68FA2A3471D1712BA92A77F3E39BBCDE6646B1E16619B31ECFF2452B7647BC283B40CD8C
2,364,413,467 UART: [art] PUB.Y = 5A35F824A6C552878B3168CFFAB6DC0C15B52696105B88113AA13DD07EBAECA58B8CBC09E216DFEA34A94AB2FC9BA4C2
2,364,420,754 UART: [art] SIG.R = 3B2F1B3DB44A6ECC9F2C9B0FDD6529237DB30C897B6F545F7B68117DD32ED6AE711B612B7AC1AF3F46BF8F28A57B7035
2,364,428,189 UART: [art] SIG.S = 93F33E6FC83D76D37AB24B7E9A9B84AAB9B07652D837F59B2863DF3D34774B6A1B6E7B708E8C6BF20C4F4064DD875E8A
2,365,407,448 UART: Caliptra RT
2,365,408,161 UART: [state] CFI Enabled
2,365,694,571 UART: [rt] RT listening for mailbox commands...
2,365,696,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,373,665,419 >>> mbox cmd response: success
2,373,702,976 UART:
2,373,703,266 UART: Running Caliptra FMC ...
2,373,704,386 UART:
2,373,704,545 UART: [state] CFI Enabled
2,373,748,181 UART: [art] Extend RT PCRs Done
2,373,749,318 UART: [art] Lock RT PCRs Done
2,373,750,888 UART: [art] Populate DV Done
2,373,756,190 UART: [fht] FMC Alias Private Key: 7
2,373,757,868 UART: [art] Derive CDI
2,373,758,641 UART: [art] Store in in slot 0x4
2,373,801,177 UART: [art] Derive Key Pair
2,373,802,170 UART: [art] Store priv key in slot 0x5
2,376,228,787 UART: [art] Derive Key Pair - Done
2,376,241,618 UART: [art] Signing Cert with AUTHO
2,376,242,950 UART: RITY.KEYID = 7
2,377,948,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,949,922 UART: [art] PUB.X = 95E4F4929ED9156CDC7CCF5BB5B17F30F51792C2C69D07CFFC2D46C6FDE309AF872F57A7AA30B64DF0360ADB1864CF1C
2,377,957,212 UART: [art] PUB.Y = 82EA7AB1B6548CEC9318FFB8FEB8D1D87049F8DA30709B9D10400EA2C582901E4E466811228F55432B5C65FDBE2C1976
2,377,964,489 UART: [art] SIG.R = EAF2DF13C4EDAAC299A3F3C7ADEAFF9A95E31D6D07ED387AB7624BF53B418245D6F57F4B102D48318BA267AF69D56741
2,377,971,887 UART: [art] SIG.S = B164A9C9BE42CC05B0F404F913BDE599AB60BBB129B96EF100BA5F85B6A7FBFA63DA05E48A332263ED61856C290C1F44
2,378,950,706 UART: Caliptra RT
2,378,951,397 UART: [state] CFI Enabled
2,379,237,074 UART: [rt] RT listening for mailbox commands...
2,379,238,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,386,971,948 >>> mbox cmd response: success
2,387,006,684 UART:
2,387,006,979 UART: Running Caliptra FMC ...
2,387,008,018 UART:
2,387,008,174 UART: [state] CFI Enabled
2,387,052,526 UART: [art] Extend RT PCRs Done
2,387,053,718 UART: [art] Lock RT PCRs Done
2,387,055,310 UART: [art] Populate DV Done
2,387,060,703 UART: [fht] FMC Alias Private Key: 7
2,387,062,248 UART: [art] Derive CDI
2,387,062,984 UART: [art] Store in in slot 0x4
2,387,105,680 UART: [art] Derive Key Pair
2,387,106,676 UART: [art] Store priv key in slot 0x5
2,389,533,634 UART: [art] Derive Key Pair - Done
2,389,546,869 UART: [art] Signing Cert with AUTHO
2,389,548,178 UART: RITY.KEYID = 7
2,391,253,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,391,255,275 UART: [art] PUB.X = E9AF0FC7E68AEFE78A15F32A68FA2A3471D1712BA92A77F3E39BBCDE6646B1E16619B31ECFF2452B7647BC283B40CD8C
2,391,262,518 UART: [art] PUB.Y = 5A35F824A6C552878B3168CFFAB6DC0C15B52696105B88113AA13DD07EBAECA58B8CBC09E216DFEA34A94AB2FC9BA4C2
2,391,269,804 UART: [art] SIG.R = 3B2F1B3DB44A6ECC9F2C9B0FDD6529237DB30C897B6F545F7B68117DD32ED6AE711B612B7AC1AF3F46BF8F28A57B7035
2,391,277,279 UART: [art] SIG.S = 93F33E6FC83D76D37AB24B7E9A9B84AAB9B07652D837F59B2863DF3D34774B6A1B6E7B708E8C6BF20C4F4064DD875E8A
2,392,256,486 UART: Caliptra RT
2,392,257,202 UART: [state] CFI Enabled
2,392,540,348 UART: [rt] RT listening for mailbox commands...
2,392,542,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,400,282,650 >>> mbox cmd response: success
2,400,317,445 UART:
2,400,317,763 UART: Running Caliptra FMC ...
2,400,318,844 UART:
2,400,318,993 UART: [state] CFI Enabled
2,400,363,105 UART: [art] Extend RT PCRs Done
2,400,364,252 UART: [art] Lock RT PCRs Done
2,400,365,838 UART: [art] Populate DV Done
2,400,371,238 UART: [fht] FMC Alias Private Key: 7
2,400,372,935 UART: [art] Derive CDI
2,400,373,668 UART: [art] Store in in slot 0x4
2,400,416,317 UART: [art] Derive Key Pair
2,400,417,361 UART: [art] Store priv key in slot 0x5
2,402,843,781 UART: [art] Derive Key Pair - Done
2,402,856,826 UART: [art] Signing Cert with AUTHO
2,402,858,127 UART: RITY.KEYID = 7
2,404,563,388 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,564,888 UART: [art] PUB.X = 95E4F4929ED9156CDC7CCF5BB5B17F30F51792C2C69D07CFFC2D46C6FDE309AF872F57A7AA30B64DF0360ADB1864CF1C
2,404,572,182 UART: [art] PUB.Y = 82EA7AB1B6548CEC9318FFB8FEB8D1D87049F8DA30709B9D10400EA2C582901E4E466811228F55432B5C65FDBE2C1976
2,404,579,463 UART: [art] SIG.R = EAF2DF13C4EDAAC299A3F3C7ADEAFF9A95E31D6D07ED387AB7624BF53B418245D6F57F4B102D48318BA267AF69D56741
2,404,586,907 UART: [art] SIG.S = B164A9C9BE42CC05B0F404F913BDE599AB60BBB129B96EF100BA5F85B6A7FBFA63DA05E48A332263ED61856C290C1F44
2,405,566,265 UART: Caliptra RT
2,405,566,959 UART: [state] CFI Enabled
2,405,859,653 UART: [rt] RT listening for mailbox commands...
2,405,861,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,413,782,985 >>> mbox cmd response: success
2,413,818,608 UART:
2,413,818,883 UART: Running Caliptra FMC ...
2,413,819,991 UART:
2,413,820,150 UART: [state] CFI Enabled
2,413,864,711 UART: [art] Extend RT PCRs Done
2,413,865,899 UART: [art] Lock RT PCRs Done
2,413,867,410 UART: [art] Populate DV Done
2,413,872,659 UART: [fht] FMC Alias Private Key: 7
2,413,874,210 UART: [art] Derive CDI
2,413,874,974 UART: [art] Store in in slot 0x4
2,413,918,270 UART: [art] Derive Key Pair
2,413,919,320 UART: [art] Store priv key in slot 0x5
2,416,345,975 UART: [art] Derive Key Pair - Done
2,416,358,870 UART: [art] Signing Cert with AUTHO
2,416,360,170 UART: RITY.KEYID = 7
2,418,065,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,418,067,049 UART: [art] PUB.X = E9AF0FC7E68AEFE78A15F32A68FA2A3471D1712BA92A77F3E39BBCDE6646B1E16619B31ECFF2452B7647BC283B40CD8C
2,418,074,345 UART: [art] PUB.Y = 5A35F824A6C552878B3168CFFAB6DC0C15B52696105B88113AA13DD07EBAECA58B8CBC09E216DFEA34A94AB2FC9BA4C2
2,418,081,661 UART: [art] SIG.R = 3B2F1B3DB44A6ECC9F2C9B0FDD6529237DB30C897B6F545F7B68117DD32ED6AE711B612B7AC1AF3F46BF8F28A57B7035
2,418,089,071 UART: [art] SIG.S = 93F33E6FC83D76D37AB24B7E9A9B84AAB9B07652D837F59B2863DF3D34774B6A1B6E7B708E8C6BF20C4F4064DD875E8A
2,419,068,412 UART: Caliptra RT
2,419,069,128 UART: [state] CFI Enabled
2,419,354,323 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 336.04s
Truncated 1358308 bytes from beginning
7 UART: [art] Store in in slot 0x4
1,718,077,386 UART: [art] Derive Key Pair
1,718,077,746 UART: [art] Store priv key in slot 0x5
1,718,090,870 UART: [art] Derive Key Pair - Done
1,718,105,746 UART: [art] Signing Cert with AUTHO
1,718,106,226 UART: RITY.KEYID = 7
1,718,121,334 UART: [art] Erasing AUTHORITY.KEYID = 7
1,718,122,099 UART: [art] PUB.X = 260B81BEE10547CAFCA8218BFE355AEB2B63E2E92BEC80521DAA9CD85811E0DFCB0F9C39C556A7F739740D9A65D1F208
1,718,128,872 UART: [art] PUB.Y = DBA92F33F337906CCEEFA928AE0C9A40F81B637C441A55AC8FB1234C47BB5664DC86F345F4C2910A4599175E3FBF9A25
1,718,135,828 UART: [art] SIG.R = 2390D16E5072C82753C9E7A321A655726A39A190AF64B60E07B949F1598F5A51EF80C3F7057BA56DB12EFCDDA225CD28
1,718,142,593 UART: [art] SIG.S = 485928ADD728C0A891CB2FD06FB2C7CCA56699E6530C3CBE5FB9B413B6A0A7D5179C481C657AA7295D91379C1FA0F100
1,718,165,817 UART: Caliptra RT
1,718,166,070 UART: [state] CFI Enabled
1,718,448,720 UART: [rt] RT listening for mailbox commands...
1,718,449,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,450,510 UART:
1,718,450,526 UART: Running Caliptra ROM ...
1,718,450,934 UART:
1,718,450,988 UART: [state] CFI Enabled
1,718,453,574 UART: [state] LifecycleState = Unprovisioned
1,718,454,229 UART: [state] DebugLocked = No
1,718,454,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,456,578 UART: [kat] SHA2-256
1,719,250,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,254,624 UART: [kat] ++
1,719,254,776 UART: [kat] sha1
1,719,259,054 UART: [kat] SHA2-256
1,719,260,992 UART: [kat] SHA2-384
1,719,263,821 UART: [kat] SHA2-512-ACC
1,719,265,721 UART: [kat] ECC-384
1,719,271,412 UART: [kat] HMAC-384Kdf
1,719,276,066 UART: [kat] LMS
1,719,844,262 UART: [kat] --
1,719,845,107 UART: [update-reset] ++
1,721,181,938 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,183,022 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,721,333,072 >>> mbox cmd response: success
1,721,333,259 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,341,273 UART: [update-reset Success] --
1,721,342,142 UART: [state] Locking Datavault
1,721,343,006 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,343,610 UART: [state] Locking ICCM
1,721,344,128 UART: [exit] Launching FMC @ 0x40000130
1,721,349,457 UART:
1,721,349,473 UART: Running Caliptra FMC ...
1,721,349,881 UART:
1,721,349,935 UART: [state] CFI Enabled
1,721,439,294 UART: [art] Extend RT PCRs Done
1,721,439,722 UART: [art] Lock RT PCRs Done
1,721,440,855 UART: [art] Populate DV Done
1,721,449,082 UART: [fht] FMC Alias Private Key: 7
1,721,450,040 UART: [art] Derive CDI
1,721,450,320 UART: [art] Store in in slot 0x4
1,721,535,459 UART: [art] Derive Key Pair
1,721,535,819 UART: [art] Store priv key in slot 0x5
1,721,549,105 UART: [art] Derive Key Pair - Done
1,721,564,407 UART: [art] Signing Cert with AUTHO
1,721,564,887 UART: RITY.KEYID = 7
1,721,579,789 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,580,554 UART: [art] PUB.X = 88CA55FF4274CE4298AF300FA02135E760EDBE4BFE6BA21439465DFDAF01D1E36D517EAC2041BDF957B2063E3B26A265
1,721,587,329 UART: [art] PUB.Y = 73A4910E6ADC789A709B28351242B4D39FE30F1C3147F8EFD05203CF9412D664C9C07DAA09554F572569F083D9E1D323
1,721,594,265 UART: [art] SIG.R = 2C70D020CC4A90A70C1D3A65332052703B4F3B11EE46C0A22DF967DD88206009F9F1DDD3682EDAA0F132AA17E134BE88
1,721,601,037 UART: [art] SIG.S = E1E83A133D1CD1FCF7773735C12603A278B0A11EE503F8A200A2CDAFA1F8F42F9528F349CA7EDD804CBA16746666A90C
1,721,624,851 UART: Caliptra RT
1,721,625,104 UART: [state] CFI Enabled
1,721,906,205 UART: [rt] RT listening for mailbox commands...
1,721,906,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,907,929 UART:
1,721,907,945 UART: Running Caliptra ROM ...
1,721,908,353 UART:
1,721,908,407 UART: [state] CFI Enabled
1,721,911,035 UART: [state] LifecycleState = Unprovisioned
1,721,911,690 UART: [state] DebugLocked = No
1,721,912,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,913,993 UART: [kat] SHA2-256
1,722,707,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,712,039 UART: [kat] ++
1,722,712,191 UART: [kat] sha1
1,722,716,347 UART: [kat] SHA2-256
1,722,718,285 UART: [kat] SHA2-384
1,722,721,116 UART: [kat] SHA2-512-ACC
1,722,723,016 UART: [kat] ECC-384
1,722,728,625 UART: [kat] HMAC-384Kdf
1,722,733,243 UART: [kat] LMS
1,723,301,439 UART: [kat] --
1,723,302,158 UART: [update-reset] ++
1,724,638,967 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,724,640,239 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,724,790,289 >>> mbox cmd response: success
1,724,790,504 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,798,518 UART: [update-reset Success] --
1,724,799,365 UART: [state] Locking Datavault
1,724,800,071 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,800,675 UART: [state] Locking ICCM
1,724,801,215 UART: [exit] Launching FMC @ 0x40000130
1,724,806,544 UART:
1,724,806,560 UART: Running Caliptra FMC ...
1,724,806,968 UART:
1,724,807,022 UART: [state] CFI Enabled
1,724,896,027 UART: [art] Extend RT PCRs Done
1,724,896,455 UART: [art] Lock RT PCRs Done
1,724,897,728 UART: [art] Populate DV Done
1,724,906,209 UART: [fht] FMC Alias Private Key: 7
1,724,907,385 UART: [art] Derive CDI
1,724,907,665 UART: [art] Store in in slot 0x4
1,724,993,470 UART: [art] Derive Key Pair
1,724,993,830 UART: [art] Store priv key in slot 0x5
1,725,006,790 UART: [art] Derive Key Pair - Done
1,725,021,488 UART: [art] Signing Cert with AUTHO
1,725,021,968 UART: RITY.KEYID = 7
1,725,037,184 UART: [art] Erasing AUTHORITY.KEYID = 7
1,725,037,949 UART: [art] PUB.X = 260B81BEE10547CAFCA8218BFE355AEB2B63E2E92BEC80521DAA9CD85811E0DFCB0F9C39C556A7F739740D9A65D1F208
1,725,044,722 UART: [art] PUB.Y = DBA92F33F337906CCEEFA928AE0C9A40F81B637C441A55AC8FB1234C47BB5664DC86F345F4C2910A4599175E3FBF9A25
1,725,051,678 UART: [art] SIG.R = 2390D16E5072C82753C9E7A321A655726A39A190AF64B60E07B949F1598F5A51EF80C3F7057BA56DB12EFCDDA225CD28
1,725,058,443 UART: [art] SIG.S = 485928ADD728C0A891CB2FD06FB2C7CCA56699E6530C3CBE5FB9B413B6A0A7D5179C481C657AA7295D91379C1FA0F100
1,725,081,537 UART: Caliptra RT
1,725,081,790 UART: [state] CFI Enabled
1,725,363,080 UART: [rt] RT listening for mailbox commands...
1,725,363,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,364,678 UART:
1,725,364,694 UART: Running Caliptra ROM ...
1,725,365,102 UART:
1,725,365,156 UART: [state] CFI Enabled
1,725,368,116 UART: [state] LifecycleState = Unprovisioned
1,725,368,771 UART: [state] DebugLocked = No
1,725,369,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,370,848 UART: [kat] SHA2-256
1,726,164,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,168,894 UART: [kat] ++
1,726,169,046 UART: [kat] sha1
1,726,173,312 UART: [kat] SHA2-256
1,726,175,250 UART: [kat] SHA2-384
1,726,178,065 UART: [kat] SHA2-512-ACC
1,726,179,965 UART: [kat] ECC-384
1,726,185,650 UART: [kat] HMAC-384Kdf
1,726,190,136 UART: [kat] LMS
1,726,758,332 UART: [kat] --
1,726,759,219 UART: [update-reset] ++
1,728,095,280 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,728,096,458 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,728,246,508 >>> mbox cmd response: success
1,728,246,681 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,254,695 UART: [update-reset Success] --
1,728,255,666 UART: [state] Locking Datavault
1,728,256,292 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,256,896 UART: [state] Locking ICCM
1,728,257,566 UART: [exit] Launching FMC @ 0x40000130
1,728,262,895 UART:
1,728,262,911 UART: Running Caliptra FMC ...
1,728,263,319 UART:
1,728,263,373 UART: [state] CFI Enabled
1,728,352,562 UART: [art] Extend RT PCRs Done
1,728,352,990 UART: [art] Lock RT PCRs Done
1,728,354,395 UART: [art] Populate DV Done
1,728,362,722 UART: [fht] FMC Alias Private Key: 7
1,728,363,896 UART: [art] Derive CDI
1,728,364,176 UART: [art] Store in in slot 0x4
1,728,449,659 UART: [art] Derive Key Pair
1,728,450,019 UART: [art] Store priv key in slot 0x5
1,728,463,505 UART: [art] Derive Key Pair - Done
1,728,478,099 UART: [art] Signing Cert with AUTHO
1,728,478,579 UART: RITY.KEYID = 7
1,728,493,741 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,494,506 UART: [art] PUB.X = 88CA55FF4274CE4298AF300FA02135E760EDBE4BFE6BA21439465DFDAF01D1E36D517EAC2041BDF957B2063E3B26A265
1,728,501,281 UART: [art] PUB.Y = 73A4910E6ADC789A709B28351242B4D39FE30F1C3147F8EFD05203CF9412D664C9C07DAA09554F572569F083D9E1D323
1,728,508,217 UART: [art] SIG.R = 2C70D020CC4A90A70C1D3A65332052703B4F3B11EE46C0A22DF967DD88206009F9F1DDD3682EDAA0F132AA17E134BE88
1,728,514,989 UART: [art] SIG.S = E1E83A133D1CD1FCF7773735C12603A278B0A11EE503F8A200A2CDAFA1F8F42F9528F349CA7EDD804CBA16746666A90C
1,728,539,523 UART: Caliptra RT
1,728,539,776 UART: [state] CFI Enabled
1,728,819,821 UART: [rt] RT listening for mailbox commands...
1,728,820,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,821,445 UART:
1,728,821,461 UART: Running Caliptra ROM ...
1,728,821,869 UART:
1,728,821,923 UART: [state] CFI Enabled
1,728,824,507 UART: [state] LifecycleState = Unprovisioned
1,728,825,162 UART: [state] DebugLocked = No
1,728,825,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,827,321 UART: [kat] SHA2-256
1,729,621,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,729,625,367 UART: [kat] ++
1,729,625,519 UART: [kat] sha1
1,729,629,793 UART: [kat] SHA2-256
1,729,631,731 UART: [kat] SHA2-384
1,729,634,642 UART: [kat] SHA2-512-ACC
1,729,636,542 UART: [kat] ECC-384
1,729,642,097 UART: [kat] HMAC-384Kdf
1,729,646,619 UART: [kat] LMS
1,730,214,815 UART: [kat] --
1,730,215,738 UART: [update-reset] ++
1,731,550,767 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,731,551,947 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,731,701,997 >>> mbox cmd response: success
1,731,702,152 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,710,166 UART: [update-reset Success] --
1,731,711,227 UART: [state] Locking Datavault
1,731,712,035 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,712,639 UART: [state] Locking ICCM
1,731,713,227 UART: [exit] Launching FMC @ 0x40000130
1,731,718,556 UART:
1,731,718,572 UART: Running Caliptra FMC ...
1,731,718,980 UART:
1,731,719,034 UART: [state] CFI Enabled
1,731,807,867 UART: [art] Extend RT PCRs Done
1,731,808,295 UART: [art] Lock RT PCRs Done
1,731,809,444 UART: [art] Populate DV Done
1,731,817,827 UART: [fht] FMC Alias Private Key: 7
1,731,818,951 UART: [art] Derive CDI
1,731,819,231 UART: [art] Store in in slot 0x4
1,731,904,774 UART: [art] Derive Key Pair
1,731,905,134 UART: [art] Store priv key in slot 0x5
1,731,918,118 UART: [art] Derive Key Pair - Done
1,731,932,722 UART: [art] Signing Cert with AUTHO
1,731,933,202 UART: RITY.KEYID = 7
1,731,948,016 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,948,781 UART: [art] PUB.X = 260B81BEE10547CAFCA8218BFE355AEB2B63E2E92BEC80521DAA9CD85811E0DFCB0F9C39C556A7F739740D9A65D1F208
1,731,955,554 UART: [art] PUB.Y = DBA92F33F337906CCEEFA928AE0C9A40F81B637C441A55AC8FB1234C47BB5664DC86F345F4C2910A4599175E3FBF9A25
1,731,962,510 UART: [art] SIG.R = 2390D16E5072C82753C9E7A321A655726A39A190AF64B60E07B949F1598F5A51EF80C3F7057BA56DB12EFCDDA225CD28
1,731,969,275 UART: [art] SIG.S = 485928ADD728C0A891CB2FD06FB2C7CCA56699E6530C3CBE5FB9B413B6A0A7D5179C481C657AA7295D91379C1FA0F100
1,731,993,099 UART: Caliptra RT
1,731,993,352 UART: [state] CFI Enabled
1,732,273,954 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 332.07s
Truncated 735002 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,375,034 >>> mbox cmd response: success
1,647,388,609 UART:
1,647,388,625 UART: Running Caliptra FMC ...
1,647,389,033 UART:
1,647,389,087 UART: [state] CFI Enabled
1,647,477,612 UART: [art] Extend RT PCRs Done
1,647,478,040 UART: [art] Lock RT PCRs Done
1,647,479,255 UART: [art] Populate DV Done
1,647,487,736 UART: [fht] FMC Alias Private Key: 7
1,647,488,698 UART: [art] Derive CDI
1,647,488,978 UART: [art] Store in in slot 0x4
1,647,574,393 UART: [art] Derive Key Pair
1,647,574,753 UART: [art] Store priv key in slot 0x5
1,647,587,787 UART: [art] Derive Key Pair - Done
1,647,602,648 UART: [art] Signing Cert with AUTHO
1,647,603,128 UART: RITY.KEYID = 7
1,647,618,142 UART: [art] Erasing AUTHORITY.KEYID = 7
1,647,618,907 UART: [art] PUB.X = DB533993522DECA039AEDA015E4F940A9CA417E78BCEFEE6E8FA536984F9024EBB805C367FBCBD43FF21A63365FEE138
1,647,625,688 UART: [art] PUB.Y = 1E35E285F58E2B240F0167219B4ABFE503718CB55F5D614C63DDD97EF888BDBB6D47439F0074F2C54F469C8631339498
1,647,632,607 UART: [art] SIG.R = DF2785E0DAF24C10A97E755052A00140986E180ACDBA27F13FFF2FC2740A92B4135DB05B5BBCC5E1868DE1140086957E
1,647,639,354 UART: [art] SIG.S = 19646DB914A268B0BFD745026C6FA7F99A24D720003607FF0634B4E72385D022B5BA1AD700A942360F13C70E4C110C4E
1,647,662,309 UART: Caliptra RT
1,647,662,562 UART: [state] CFI Enabled
1,647,941,077 UART: [rt] RT listening for mailbox commands...
1,647,941,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,650,705,269 >>> mbox cmd response: success
1,650,718,648 UART:
1,650,718,664 UART: Running Caliptra FMC ...
1,650,719,072 UART:
1,650,719,126 UART: [state] CFI Enabled
1,650,807,253 UART: [art] Extend RT PCRs Done
1,650,807,681 UART: [art] Lock RT PCRs Done
1,650,808,940 UART: [art] Populate DV Done
1,650,817,263 UART: [fht] FMC Alias Private Key: 7
1,650,818,193 UART: [art] Derive CDI
1,650,818,473 UART: [art] Store in in slot 0x4
1,650,903,866 UART: [art] Derive Key Pair
1,650,904,226 UART: [art] Store priv key in slot 0x5
1,650,917,174 UART: [art] Derive Key Pair - Done
1,650,931,679 UART: [art] Signing Cert with AUTHO
1,650,932,159 UART: RITY.KEYID = 7
1,650,946,905 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,947,670 UART: [art] PUB.X = 0B4F08E692EB9C7D5117B9732A215EAA9EE020AA3690866FC47F13BC21D8FC59041093D0563A50B842208606821DE3F6
1,650,954,426 UART: [art] PUB.Y = 43B622021CE4BCF64AFF68B0DA5C547FBE8472E7AD5F5F3FE3797F2252997EBA0A86E9B6C6744E4582D62C81B7E44D62
1,650,961,382 UART: [art] SIG.R = DFB1B7816C341B8481D07F328C5D4F24407888EE4E9F09F1D7C7BF00734798395D817467CB3F832FDBBA450B688FA925
1,650,968,126 UART: [art] SIG.S = BDD00DC83ED519EDE307D0A977A310F5FD68A04B34B29C513906B800BE24B0259FADAC5B807D3585B610A29E9DC167B8
1,650,991,994 UART: Caliptra RT
1,650,992,247 UART: [state] CFI Enabled
1,651,275,083 UART: [rt] RT listening for mailbox commands...
1,651,275,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,654,041,045 >>> mbox cmd response: success
1,654,054,438 UART:
1,654,054,454 UART: Running Caliptra FMC ...
1,654,054,862 UART:
1,654,054,916 UART: [state] CFI Enabled
1,654,143,773 UART: [art] Extend RT PCRs Done
1,654,144,201 UART: [art] Lock RT PCRs Done
1,654,145,518 UART: [art] Populate DV Done
1,654,153,825 UART: [fht] FMC Alias Private Key: 7
1,654,154,769 UART: [art] Derive CDI
1,654,155,049 UART: [art] Store in in slot 0x4
1,654,240,832 UART: [art] Derive Key Pair
1,654,241,192 UART: [art] Store priv key in slot 0x5
1,654,254,472 UART: [art] Derive Key Pair - Done
1,654,268,875 UART: [art] Signing Cert with AUTHO
1,654,269,355 UART: RITY.KEYID = 7
1,654,284,479 UART: [art] Erasing AUTHORITY.KEYID = 7
1,654,285,244 UART: [art] PUB.X = DB533993522DECA039AEDA015E4F940A9CA417E78BCEFEE6E8FA536984F9024EBB805C367FBCBD43FF21A63365FEE138
1,654,292,025 UART: [art] PUB.Y = 1E35E285F58E2B240F0167219B4ABFE503718CB55F5D614C63DDD97EF888BDBB6D47439F0074F2C54F469C8631339498
1,654,298,944 UART: [art] SIG.R = DF2785E0DAF24C10A97E755052A00140986E180ACDBA27F13FFF2FC2740A92B4135DB05B5BBCC5E1868DE1140086957E
1,654,305,691 UART: [art] SIG.S = 19646DB914A268B0BFD745026C6FA7F99A24D720003607FF0634B4E72385D022B5BA1AD700A942360F13C70E4C110C4E
1,654,329,032 UART: Caliptra RT
1,654,329,285 UART: [state] CFI Enabled
1,654,608,970 UART: [rt] RT listening for mailbox commands...
1,654,609,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,375,420 >>> mbox cmd response: success
1,657,388,773 UART:
1,657,388,789 UART: Running Caliptra FMC ...
1,657,389,197 UART:
1,657,389,251 UART: [state] CFI Enabled
1,657,478,852 UART: [art] Extend RT PCRs Done
1,657,479,280 UART: [art] Lock RT PCRs Done
1,657,480,335 UART: [art] Populate DV Done
1,657,488,644 UART: [fht] FMC Alias Private Key: 7
1,657,489,722 UART: [art] Derive CDI
1,657,490,002 UART: [art] Store in in slot 0x4
1,657,575,465 UART: [art] Derive Key Pair
1,657,575,825 UART: [art] Store priv key in slot 0x5
1,657,588,939 UART: [art] Derive Key Pair - Done
1,657,603,956 UART: [art] Signing Cert with AUTHO
1,657,604,436 UART: RITY.KEYID = 7
1,657,619,722 UART: [art] Erasing AUTHORITY.KEYID = 7
1,657,620,487 UART: [art] PUB.X = 0B4F08E692EB9C7D5117B9732A215EAA9EE020AA3690866FC47F13BC21D8FC59041093D0563A50B842208606821DE3F6
1,657,627,243 UART: [art] PUB.Y = 43B622021CE4BCF64AFF68B0DA5C547FBE8472E7AD5F5F3FE3797F2252997EBA0A86E9B6C6744E4582D62C81B7E44D62
1,657,634,199 UART: [art] SIG.R = DFB1B7816C341B8481D07F328C5D4F24407888EE4E9F09F1D7C7BF00734798395D817467CB3F832FDBBA450B688FA925
1,657,640,943 UART: [art] SIG.S = BDD00DC83ED519EDE307D0A977A310F5FD68A04B34B29C513906B800BE24B0259FADAC5B807D3585B610A29E9DC167B8
1,657,664,785 UART: Caliptra RT
1,657,665,038 UART: [state] CFI Enabled
1,657,947,726 UART: [rt] RT listening for mailbox commands...
1,657,948,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,660,712,136 >>> mbox cmd response: success
1,660,725,533 UART:
1,660,725,549 UART: Running Caliptra FMC ...
1,660,725,957 UART:
1,660,726,011 UART: [state] CFI Enabled
1,660,814,914 UART: [art] Extend RT PCRs Done
1,660,815,342 UART: [art] Lock RT PCRs Done
1,660,816,925 UART: [art] Populate DV Done
1,660,825,212 UART: [fht] FMC Alias Private Key: 7
1,660,826,148 UART: [art] Derive CDI
1,660,826,428 UART: [art] Store in in slot 0x4
1,660,912,787 UART: [art] Derive Key Pair
1,660,913,147 UART: [art] Store priv key in slot 0x5
1,660,926,429 UART: [art] Derive Key Pair - Done
1,660,941,262 UART: [art] Signing Cert with AUTHO
1,660,941,742 UART: RITY.KEYID = 7
1,660,957,614 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,958,379 UART: [art] PUB.X = DB533993522DECA039AEDA015E4F940A9CA417E78BCEFEE6E8FA536984F9024EBB805C367FBCBD43FF21A63365FEE138
1,660,965,160 UART: [art] PUB.Y = 1E35E285F58E2B240F0167219B4ABFE503718CB55F5D614C63DDD97EF888BDBB6D47439F0074F2C54F469C8631339498
1,660,972,079 UART: [art] SIG.R = DF2785E0DAF24C10A97E755052A00140986E180ACDBA27F13FFF2FC2740A92B4135DB05B5BBCC5E1868DE1140086957E
1,660,978,826 UART: [art] SIG.S = 19646DB914A268B0BFD745026C6FA7F99A24D720003607FF0634B4E72385D022B5BA1AD700A942360F13C70E4C110C4E
1,661,001,777 UART: Caliptra RT
1,661,002,030 UART: [state] CFI Enabled
1,661,284,729 UART: [rt] RT listening for mailbox commands...
1,661,285,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,664,049,285 >>> mbox cmd response: success
1,664,062,718 UART:
1,664,062,734 UART: Running Caliptra FMC ...
1,664,063,142 UART:
1,664,063,196 UART: [state] CFI Enabled
1,664,151,811 UART: [art] Extend RT PCRs Done
1,664,152,239 UART: [art] Lock RT PCRs Done
1,664,153,440 UART: [art] Populate DV Done
1,664,161,723 UART: [fht] FMC Alias Private Key: 7
1,664,162,865 UART: [art] Derive CDI
1,664,163,145 UART: [art] Store in in slot 0x4
1,664,248,664 UART: [art] Derive Key Pair
1,664,249,024 UART: [art] Store priv key in slot 0x5
1,664,262,214 UART: [art] Derive Key Pair - Done
1,664,276,991 UART: [art] Signing Cert with AUTHO
1,664,277,471 UART: RITY.KEYID = 7
1,664,292,637 UART: [art] Erasing AUTHORITY.KEYID = 7
1,664,293,402 UART: [art] PUB.X = 0B4F08E692EB9C7D5117B9732A215EAA9EE020AA3690866FC47F13BC21D8FC59041093D0563A50B842208606821DE3F6
1,664,300,158 UART: [art] PUB.Y = 43B622021CE4BCF64AFF68B0DA5C547FBE8472E7AD5F5F3FE3797F2252997EBA0A86E9B6C6744E4582D62C81B7E44D62
1,664,307,114 UART: [art] SIG.R = DFB1B7816C341B8481D07F328C5D4F24407888EE4E9F09F1D7C7BF00734798395D817467CB3F832FDBBA450B688FA925
1,664,313,858 UART: [art] SIG.S = BDD00DC83ED519EDE307D0A977A310F5FD68A04B34B29C513906B800BE24B0259FADAC5B807D3585B610A29E9DC167B8
1,664,337,770 UART: Caliptra RT
1,664,338,023 UART: [state] CFI Enabled
1,664,625,895 UART: [rt] RT listening for mailbox commands...
1,664,626,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,390,813 >>> mbox cmd response: success
1,667,404,428 UART:
1,667,404,444 UART: Running Caliptra FMC ...
1,667,404,852 UART:
1,667,404,906 UART: [state] CFI Enabled
1,667,493,989 UART: [art] Extend RT PCRs Done
1,667,494,417 UART: [art] Lock RT PCRs Done
1,667,495,634 UART: [art] Populate DV Done
1,667,503,925 UART: [fht] FMC Alias Private Key: 7
1,667,504,875 UART: [art] Derive CDI
1,667,505,155 UART: [art] Store in in slot 0x4
1,667,590,612 UART: [art] Derive Key Pair
1,667,590,972 UART: [art] Store priv key in slot 0x5
1,667,603,892 UART: [art] Derive Key Pair - Done
1,667,618,849 UART: [art] Signing Cert with AUTHO
1,667,619,329 UART: RITY.KEYID = 7
1,667,634,507 UART: [art] Erasing AUTHORITY.KEYID = 7
1,667,635,272 UART: [art] PUB.X = DB533993522DECA039AEDA015E4F940A9CA417E78BCEFEE6E8FA536984F9024EBB805C367FBCBD43FF21A63365FEE138
1,667,642,053 UART: [art] PUB.Y = 1E35E285F58E2B240F0167219B4ABFE503718CB55F5D614C63DDD97EF888BDBB6D47439F0074F2C54F469C8631339498
1,667,648,972 UART: [art] SIG.R = DF2785E0DAF24C10A97E755052A00140986E180ACDBA27F13FFF2FC2740A92B4135DB05B5BBCC5E1868DE1140086957E
1,667,655,719 UART: [art] SIG.S = 19646DB914A268B0BFD745026C6FA7F99A24D720003607FF0634B4E72385D022B5BA1AD700A942360F13C70E4C110C4E
1,667,679,570 UART: Caliptra RT
1,667,679,823 UART: [state] CFI Enabled
1,667,958,908 UART: [rt] RT listening for mailbox commands...
1,667,959,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,670,723,764 >>> mbox cmd response: success
1,670,736,885 UART:
1,670,736,901 UART: Running Caliptra FMC ...
1,670,737,309 UART:
1,670,737,363 UART: [state] CFI Enabled
1,670,825,858 UART: [art] Extend RT PCRs Done
1,670,826,286 UART: [art] Lock RT PCRs Done
1,670,827,743 UART: [art] Populate DV Done
1,670,836,094 UART: [fht] FMC Alias Private Key: 7
1,670,837,090 UART: [art] Derive CDI
1,670,837,370 UART: [art] Store in in slot 0x4
1,670,923,181 UART: [art] Derive Key Pair
1,670,923,541 UART: [art] Store priv key in slot 0x5
1,670,937,001 UART: [art] Derive Key Pair - Done
1,670,951,860 UART: [art] Signing Cert with AUTHO
1,670,952,340 UART: RITY.KEYID = 7
1,670,967,794 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,968,559 UART: [art] PUB.X = 0B4F08E692EB9C7D5117B9732A215EAA9EE020AA3690866FC47F13BC21D8FC59041093D0563A50B842208606821DE3F6
1,670,975,315 UART: [art] PUB.Y = 43B622021CE4BCF64AFF68B0DA5C547FBE8472E7AD5F5F3FE3797F2252997EBA0A86E9B6C6744E4582D62C81B7E44D62
1,670,982,271 UART: [art] SIG.R = DFB1B7816C341B8481D07F328C5D4F24407888EE4E9F09F1D7C7BF00734798395D817467CB3F832FDBBA450B688FA925
1,670,989,015 UART: [art] SIG.S = BDD00DC83ED519EDE307D0A977A310F5FD68A04B34B29C513906B800BE24B0259FADAC5B807D3585B610A29E9DC167B8
1,671,012,909 UART: Caliptra RT
1,671,013,162 UART: [state] CFI Enabled
1,671,296,460 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 323.78s
Truncated 1358308 bytes from beginning
3 UART: [art] Store in in slot 0x4
1,718,662,430 UART: [art] Derive Key Pair
1,718,662,790 UART: [art] Store priv key in slot 0x5
1,718,675,878 UART: [art] Derive Key Pair - Done
1,718,690,569 UART: [art] Signing Cert with AUTHO
1,718,691,049 UART: RITY.KEYID = 7
1,718,706,353 UART: [art] Erasing AUTHORITY.KEYID = 7
1,718,707,118 UART: [art] PUB.X = 134EE3B3584A2DE4C7C8473D170EC5FEEDD4179E49F4FC6EF288F32EC2840B98E7B024FEAFE757E12B6D0392A59945F0
1,718,713,893 UART: [art] PUB.Y = 456667A6A74276EE4C8CC696B0C204A156ECEC5F0B8724114E039AB8ED2B351004F58051B0C791348F7ED872DBE0B035
1,718,720,833 UART: [art] SIG.R = 8D7DE5F9F8ABD609424A2BC0CD22557BAB9ADE9DE1ABCD561FC07BAB20BBB28D42FFD9408F750DA910788435259126B9
1,718,727,617 UART: [art] SIG.S = A32BB4CD2613020581E0857925AE568DD54A3074FD1320A63DD03EB904B3F353D701E24A4312C368D58A425A8B39F99D
1,718,751,248 UART: Caliptra RT
1,718,751,593 UART: [state] CFI Enabled
1,719,035,815 UART: [rt] RT listening for mailbox commands...
1,719,036,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,719,037,341 UART:
1,719,037,357 UART: Running Caliptra ROM ...
1,719,037,765 UART:
1,719,037,906 UART: [state] CFI Enabled
1,719,040,556 UART: [state] LifecycleState = Unprovisioned
1,719,041,211 UART: [state] DebugLocked = No
1,719,041,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,719,043,366 UART: [kat] SHA2-256
1,719,837,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,841,412 UART: [kat] ++
1,719,841,564 UART: [kat] sha1
1,719,845,694 UART: [kat] SHA2-256
1,719,847,632 UART: [kat] SHA2-384
1,719,850,217 UART: [kat] SHA2-512-ACC
1,719,852,117 UART: [kat] ECC-384
1,719,857,574 UART: [kat] HMAC-384Kdf
1,719,861,988 UART: [kat] LMS
1,720,430,184 UART: [kat] --
1,720,431,087 UART: [update-reset] ++
1,721,766,874 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,768,108 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,721,918,158 >>> mbox cmd response: success
1,721,918,269 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,926,283 UART: [update-reset Success] --
1,721,927,576 UART: [state] Locking Datavault
1,721,928,522 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,929,126 UART: [state] Locking ICCM
1,721,929,696 UART: [exit] Launching FMC @ 0x40000130
1,721,935,025 UART:
1,721,935,041 UART: Running Caliptra FMC ...
1,721,935,449 UART:
1,721,935,592 UART: [state] CFI Enabled
1,722,024,865 UART: [art] Extend RT PCRs Done
1,722,025,293 UART: [art] Lock RT PCRs Done
1,722,026,532 UART: [art] Populate DV Done
1,722,034,839 UART: [fht] FMC Alias Private Key: 7
1,722,035,805 UART: [art] Derive CDI
1,722,036,085 UART: [art] Store in in slot 0x4
1,722,121,692 UART: [art] Derive Key Pair
1,722,122,052 UART: [art] Store priv key in slot 0x5
1,722,135,540 UART: [art] Derive Key Pair - Done
1,722,150,342 UART: [art] Signing Cert with AUTHO
1,722,150,822 UART: RITY.KEYID = 7
1,722,166,108 UART: [art] Erasing AUTHORITY.KEYID = 7
1,722,166,873 UART: [art] PUB.X = 83A57D339DFF996586051C0C11E6982FFC66B416732F9E37C1082AE2AD83FBF6CF5B8CC7A7D2ABF46070E33A97DEFD9E
1,722,173,650 UART: [art] PUB.Y = 5D7B775432534ACEAC50E02039B3D042B692B3D19A1501AC9A1BFC8960F1D8643BF5FC46400951EA2985AA759282733D
1,722,180,594 UART: [art] SIG.R = 882AAC9DFC520412C6185C135370587E4210CB5A7A7661E5FDC3CA1EFC3BE4DFC73756CE7ABB1FFCD3AA2F98BA162347
1,722,187,381 UART: [art] SIG.S = D3009E891545367DCFBB52FC9DD37BF6B372A616C16A86A9C819592AACC9518EF34FC39BDB4616BB6D102F7DC418598A
1,722,211,312 UART: Caliptra RT
1,722,211,657 UART: [state] CFI Enabled
1,722,494,067 UART: [rt] RT listening for mailbox commands...
1,722,494,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,722,495,691 UART:
1,722,495,707 UART: Running Caliptra ROM ...
1,722,496,115 UART:
1,722,496,256 UART: [state] CFI Enabled
1,722,499,310 UART: [state] LifecycleState = Unprovisioned
1,722,499,965 UART: [state] DebugLocked = No
1,722,500,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,722,502,076 UART: [kat] SHA2-256
1,723,296,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,723,300,122 UART: [kat] ++
1,723,300,274 UART: [kat] sha1
1,723,304,462 UART: [kat] SHA2-256
1,723,306,400 UART: [kat] SHA2-384
1,723,309,203 UART: [kat] SHA2-512-ACC
1,723,311,103 UART: [kat] ECC-384
1,723,316,848 UART: [kat] HMAC-384Kdf
1,723,321,606 UART: [kat] LMS
1,723,889,802 UART: [kat] --
1,723,890,541 UART: [update-reset] ++
1,725,226,442 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,725,227,696 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,725,377,746 >>> mbox cmd response: success
1,725,378,077 UART: [update-reset] Copying MAN_2 To MAN_1
1,725,386,091 UART: [update-reset Success] --
1,725,387,138 UART: [state] Locking Datavault
1,725,387,918 UART: [state] Locking PCR0, PCR1 and PCR31
1,725,388,522 UART: [state] Locking ICCM
1,725,389,074 UART: [exit] Launching FMC @ 0x40000130
1,725,394,403 UART:
1,725,394,419 UART: Running Caliptra FMC ...
1,725,394,827 UART:
1,725,394,970 UART: [state] CFI Enabled
1,725,484,071 UART: [art] Extend RT PCRs Done
1,725,484,499 UART: [art] Lock RT PCRs Done
1,725,485,670 UART: [art] Populate DV Done
1,725,493,659 UART: [fht] FMC Alias Private Key: 7
1,725,494,615 UART: [art] Derive CDI
1,725,494,895 UART: [art] Store in in slot 0x4
1,725,580,428 UART: [art] Derive Key Pair
1,725,580,788 UART: [art] Store priv key in slot 0x5
1,725,593,634 UART: [art] Derive Key Pair - Done
1,725,608,287 UART: [art] Signing Cert with AUTHO
1,725,608,767 UART: RITY.KEYID = 7
1,725,623,547 UART: [art] Erasing AUTHORITY.KEYID = 7
1,725,624,312 UART: [art] PUB.X = 134EE3B3584A2DE4C7C8473D170EC5FEEDD4179E49F4FC6EF288F32EC2840B98E7B024FEAFE757E12B6D0392A59945F0
1,725,631,087 UART: [art] PUB.Y = 456667A6A74276EE4C8CC696B0C204A156ECEC5F0B8724114E039AB8ED2B351004F58051B0C791348F7ED872DBE0B035
1,725,638,027 UART: [art] SIG.R = 8D7DE5F9F8ABD609424A2BC0CD22557BAB9ADE9DE1ABCD561FC07BAB20BBB28D42FFD9408F750DA910788435259126B9
1,725,644,811 UART: [art] SIG.S = A32BB4CD2613020581E0857925AE568DD54A3074FD1320A63DD03EB904B3F353D701E24A4312C368D58A425A8B39F99D
1,725,668,172 UART: Caliptra RT
1,725,668,517 UART: [state] CFI Enabled
1,725,951,397 UART: [rt] RT listening for mailbox commands...
1,725,952,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,953,115 UART:
1,725,953,131 UART: Running Caliptra ROM ...
1,725,953,539 UART:
1,725,953,680 UART: [state] CFI Enabled
1,725,956,218 UART: [state] LifecycleState = Unprovisioned
1,725,956,873 UART: [state] DebugLocked = No
1,725,957,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,959,006 UART: [kat] SHA2-256
1,726,752,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,757,052 UART: [kat] ++
1,726,757,204 UART: [kat] sha1
1,726,761,420 UART: [kat] SHA2-256
1,726,763,358 UART: [kat] SHA2-384
1,726,766,003 UART: [kat] SHA2-512-ACC
1,726,767,903 UART: [kat] ECC-384
1,726,773,442 UART: [kat] HMAC-384Kdf
1,726,777,936 UART: [kat] LMS
1,727,346,132 UART: [kat] --
1,727,346,797 UART: [update-reset] ++
1,728,682,792 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,728,683,878 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,728,833,928 >>> mbox cmd response: success
1,728,834,087 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,842,101 UART: [update-reset Success] --
1,728,843,210 UART: [state] Locking Datavault
1,728,843,924 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,844,528 UART: [state] Locking ICCM
1,728,845,194 UART: [exit] Launching FMC @ 0x40000130
1,728,850,523 UART:
1,728,850,539 UART: Running Caliptra FMC ...
1,728,850,947 UART:
1,728,851,090 UART: [state] CFI Enabled
1,728,940,511 UART: [art] Extend RT PCRs Done
1,728,940,939 UART: [art] Lock RT PCRs Done
1,728,942,186 UART: [art] Populate DV Done
1,728,950,491 UART: [fht] FMC Alias Private Key: 7
1,728,951,589 UART: [art] Derive CDI
1,728,951,869 UART: [art] Store in in slot 0x4
1,729,037,462 UART: [art] Derive Key Pair
1,729,037,822 UART: [art] Store priv key in slot 0x5
1,729,051,294 UART: [art] Derive Key Pair - Done
1,729,065,998 UART: [art] Signing Cert with AUTHO
1,729,066,478 UART: RITY.KEYID = 7
1,729,081,508 UART: [art] Erasing AUTHORITY.KEYID = 7
1,729,082,273 UART: [art] PUB.X = 83A57D339DFF996586051C0C11E6982FFC66B416732F9E37C1082AE2AD83FBF6CF5B8CC7A7D2ABF46070E33A97DEFD9E
1,729,089,050 UART: [art] PUB.Y = 5D7B775432534ACEAC50E02039B3D042B692B3D19A1501AC9A1BFC8960F1D8643BF5FC46400951EA2985AA759282733D
1,729,095,994 UART: [art] SIG.R = 882AAC9DFC520412C6185C135370587E4210CB5A7A7661E5FDC3CA1EFC3BE4DFC73756CE7ABB1FFCD3AA2F98BA162347
1,729,102,781 UART: [art] SIG.S = D3009E891545367DCFBB52FC9DD37BF6B372A616C16A86A9C819592AACC9518EF34FC39BDB4616BB6D102F7DC418598A
1,729,126,682 UART: Caliptra RT
1,729,127,027 UART: [state] CFI Enabled
1,729,410,097 UART: [rt] RT listening for mailbox commands...
1,729,410,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,729,411,487 UART:
1,729,411,503 UART: Running Caliptra ROM ...
1,729,411,911 UART:
1,729,412,052 UART: [state] CFI Enabled
1,729,414,452 UART: [state] LifecycleState = Unprovisioned
1,729,415,107 UART: [state] DebugLocked = No
1,729,415,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,729,417,190 UART: [kat] SHA2-256
1,730,211,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,730,215,236 UART: [kat] ++
1,730,215,388 UART: [kat] sha1
1,730,219,642 UART: [kat] SHA2-256
1,730,221,580 UART: [kat] SHA2-384
1,730,224,101 UART: [kat] SHA2-512-ACC
1,730,226,001 UART: [kat] ECC-384
1,730,231,412 UART: [kat] HMAC-384Kdf
1,730,236,100 UART: [kat] LMS
1,730,804,296 UART: [kat] --
1,730,805,251 UART: [update-reset] ++
1,732,142,204 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,732,143,408 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,732,293,458 >>> mbox cmd response: success
1,732,293,635 UART: [update-reset] Copying MAN_2 To MAN_1
1,732,301,649 UART: [update-reset Success] --
1,732,302,874 UART: [state] Locking Datavault
1,732,303,698 UART: [state] Locking PCR0, PCR1 and PCR31
1,732,304,302 UART: [state] Locking ICCM
1,732,304,942 UART: [exit] Launching FMC @ 0x40000130
1,732,310,271 UART:
1,732,310,287 UART: Running Caliptra FMC ...
1,732,310,695 UART:
1,732,310,838 UART: [state] CFI Enabled
1,732,399,831 UART: [art] Extend RT PCRs Done
1,732,400,259 UART: [art] Lock RT PCRs Done
1,732,401,402 UART: [art] Populate DV Done
1,732,409,763 UART: [fht] FMC Alias Private Key: 7
1,732,410,745 UART: [art] Derive CDI
1,732,411,025 UART: [art] Store in in slot 0x4
1,732,496,510 UART: [art] Derive Key Pair
1,732,496,870 UART: [art] Store priv key in slot 0x5
1,732,509,816 UART: [art] Derive Key Pair - Done
1,732,524,517 UART: [art] Signing Cert with AUTHO
1,732,524,997 UART: RITY.KEYID = 7
1,732,540,585 UART: [art] Erasing AUTHORITY.KEYID = 7
1,732,541,350 UART: [art] PUB.X = 134EE3B3584A2DE4C7C8473D170EC5FEEDD4179E49F4FC6EF288F32EC2840B98E7B024FEAFE757E12B6D0392A59945F0
1,732,548,125 UART: [art] PUB.Y = 456667A6A74276EE4C8CC696B0C204A156ECEC5F0B8724114E039AB8ED2B351004F58051B0C791348F7ED872DBE0B035
1,732,555,065 UART: [art] SIG.R = 8D7DE5F9F8ABD609424A2BC0CD22557BAB9ADE9DE1ABCD561FC07BAB20BBB28D42FFD9408F750DA910788435259126B9
1,732,561,849 UART: [art] SIG.S = A32BB4CD2613020581E0857925AE568DD54A3074FD1320A63DD03EB904B3F353D701E24A4312C368D58A425A8B39F99D
1,732,585,650 UART: Caliptra RT
1,732,585,995 UART: [state] CFI Enabled
1,732,865,537 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 332.00s
Truncated 735002 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,857,285 >>> mbox cmd response: success
1,647,870,600 UART:
1,647,870,616 UART: Running Caliptra FMC ...
1,647,871,024 UART:
1,647,871,167 UART: [state] CFI Enabled
1,647,961,094 UART: [art] Extend RT PCRs Done
1,647,961,522 UART: [art] Lock RT PCRs Done
1,647,962,821 UART: [art] Populate DV Done
1,647,971,012 UART: [fht] FMC Alias Private Key: 7
1,647,972,008 UART: [art] Derive CDI
1,647,972,288 UART: [art] Store in in slot 0x4
1,648,057,625 UART: [art] Derive Key Pair
1,648,057,985 UART: [art] Store priv key in slot 0x5
1,648,071,675 UART: [art] Derive Key Pair - Done
1,648,086,202 UART: [art] Signing Cert with AUTHO
1,648,086,682 UART: RITY.KEYID = 7
1,648,101,780 UART: [art] Erasing AUTHORITY.KEYID = 7
1,648,102,545 UART: [art] PUB.X = 693B4F58BDEF88F3D105060832B01320D17965B24ABC24C876F65F6B2F393F9ADB0F0040DE46E73E0F3B1C22A4FC720A
1,648,109,283 UART: [art] PUB.Y = FA8159A836E005B57FBF249DDF1FDD263BBD7A33A438F02291D16304808373FA9CFBEA33A2876E0FA4B9546A9FD36F8D
1,648,116,238 UART: [art] SIG.R = 9ABF022099822E028D98A6C43FECEC8C2D2CED1DBDA49D147583010F666E61E6AE9E84158C4AC5A34CB4A3086652C296
1,648,123,003 UART: [art] SIG.S = 582BA058434B351985A92C3D32E4BBDF3B56752F2D496711E169AFE85B9782C79C037FACDD13046E31106E9B9BFF9B37
1,648,146,810 UART: Caliptra RT
1,648,147,155 UART: [state] CFI Enabled
1,648,429,516 UART: [rt] RT listening for mailbox commands...
1,648,430,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,651,194,961 >>> mbox cmd response: success
1,651,208,258 UART:
1,651,208,274 UART: Running Caliptra FMC ...
1,651,208,682 UART:
1,651,208,825 UART: [state] CFI Enabled
1,651,298,034 UART: [art] Extend RT PCRs Done
1,651,298,462 UART: [art] Lock RT PCRs Done
1,651,299,861 UART: [art] Populate DV Done
1,651,308,304 UART: [fht] FMC Alias Private Key: 7
1,651,309,370 UART: [art] Derive CDI
1,651,309,650 UART: [art] Store in in slot 0x4
1,651,395,597 UART: [art] Derive Key Pair
1,651,395,957 UART: [art] Store priv key in slot 0x5
1,651,408,869 UART: [art] Derive Key Pair - Done
1,651,423,742 UART: [art] Signing Cert with AUTHO
1,651,424,222 UART: RITY.KEYID = 7
1,651,439,546 UART: [art] Erasing AUTHORITY.KEYID = 7
1,651,440,311 UART: [art] PUB.X = B1C991BF44F76F34F29677D25EA7D365EA9A0960E55F62F4574955CBB34267D6F956F12974788D3D39BCCA739B6C3C13
1,651,447,080 UART: [art] PUB.Y = 7003650BCFCAC6E92A8A513DF0C39E2A7C352D18844F7BD8B878117FB1F0332F2817428429DB2D638E042D7C32FD89DE
1,651,454,027 UART: [art] SIG.R = CA8F7595FBDA91A229D3BFD7652416D575F21809E8DA110636BD822C547EC19D3A4BCE89387247AA4025EC3D9D3D22EA
1,651,460,801 UART: [art] SIG.S = 10309CE469A94F9396AADB95D64F28FF20C36CACC9A10943123068FD62022B8CFCB76CA73DDB65671DE5F24E9C742C24
1,651,484,028 UART: Caliptra RT
1,651,484,373 UART: [state] CFI Enabled
1,651,763,602 UART: [rt] RT listening for mailbox commands...
1,651,764,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,654,528,553 >>> mbox cmd response: success
1,654,541,900 UART:
1,654,541,916 UART: Running Caliptra FMC ...
1,654,542,324 UART:
1,654,542,467 UART: [state] CFI Enabled
1,654,631,118 UART: [art] Extend RT PCRs Done
1,654,631,546 UART: [art] Lock RT PCRs Done
1,654,632,699 UART: [art] Populate DV Done
1,654,641,216 UART: [fht] FMC Alias Private Key: 7
1,654,642,190 UART: [art] Derive CDI
1,654,642,470 UART: [art] Store in in slot 0x4
1,654,728,475 UART: [art] Derive Key Pair
1,654,728,835 UART: [art] Store priv key in slot 0x5
1,654,742,131 UART: [art] Derive Key Pair - Done
1,654,757,064 UART: [art] Signing Cert with AUTHO
1,654,757,544 UART: RITY.KEYID = 7
1,654,772,910 UART: [art] Erasing AUTHORITY.KEYID = 7
1,654,773,675 UART: [art] PUB.X = 693B4F58BDEF88F3D105060832B01320D17965B24ABC24C876F65F6B2F393F9ADB0F0040DE46E73E0F3B1C22A4FC720A
1,654,780,413 UART: [art] PUB.Y = FA8159A836E005B57FBF249DDF1FDD263BBD7A33A438F02291D16304808373FA9CFBEA33A2876E0FA4B9546A9FD36F8D
1,654,787,368 UART: [art] SIG.R = 9ABF022099822E028D98A6C43FECEC8C2D2CED1DBDA49D147583010F666E61E6AE9E84158C4AC5A34CB4A3086652C296
1,654,794,133 UART: [art] SIG.S = 582BA058434B351985A92C3D32E4BBDF3B56752F2D496711E169AFE85B9782C79C037FACDD13046E31106E9B9BFF9B37
1,654,817,870 UART: Caliptra RT
1,654,818,215 UART: [state] CFI Enabled
1,655,102,674 UART: [rt] RT listening for mailbox commands...
1,655,103,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,866,527 >>> mbox cmd response: success
1,657,880,052 UART:
1,657,880,068 UART: Running Caliptra FMC ...
1,657,880,476 UART:
1,657,880,619 UART: [state] CFI Enabled
1,657,969,864 UART: [art] Extend RT PCRs Done
1,657,970,292 UART: [art] Lock RT PCRs Done
1,657,971,667 UART: [art] Populate DV Done
1,657,979,806 UART: [fht] FMC Alias Private Key: 7
1,657,980,816 UART: [art] Derive CDI
1,657,981,096 UART: [art] Store in in slot 0x4
1,658,066,737 UART: [art] Derive Key Pair
1,658,067,097 UART: [art] Store priv key in slot 0x5
1,658,080,943 UART: [art] Derive Key Pair - Done
1,658,095,492 UART: [art] Signing Cert with AUTHO
1,658,095,972 UART: RITY.KEYID = 7
1,658,110,702 UART: [art] Erasing AUTHORITY.KEYID = 7
1,658,111,467 UART: [art] PUB.X = B1C991BF44F76F34F29677D25EA7D365EA9A0960E55F62F4574955CBB34267D6F956F12974788D3D39BCCA739B6C3C13
1,658,118,236 UART: [art] PUB.Y = 7003650BCFCAC6E92A8A513DF0C39E2A7C352D18844F7BD8B878117FB1F0332F2817428429DB2D638E042D7C32FD89DE
1,658,125,183 UART: [art] SIG.R = CA8F7595FBDA91A229D3BFD7652416D575F21809E8DA110636BD822C547EC19D3A4BCE89387247AA4025EC3D9D3D22EA
1,658,131,957 UART: [art] SIG.S = 10309CE469A94F9396AADB95D64F28FF20C36CACC9A10943123068FD62022B8CFCB76CA73DDB65671DE5F24E9C742C24
1,658,156,052 UART: Caliptra RT
1,658,156,397 UART: [state] CFI Enabled
1,658,436,142 UART: [rt] RT listening for mailbox commands...
1,658,436,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,661,200,341 >>> mbox cmd response: success
1,661,213,846 UART:
1,661,213,862 UART: Running Caliptra FMC ...
1,661,214,270 UART:
1,661,214,413 UART: [state] CFI Enabled
1,661,303,398 UART: [art] Extend RT PCRs Done
1,661,303,826 UART: [art] Lock RT PCRs Done
1,661,305,377 UART: [art] Populate DV Done
1,661,313,758 UART: [fht] FMC Alias Private Key: 7
1,661,314,896 UART: [art] Derive CDI
1,661,315,176 UART: [art] Store in in slot 0x4
1,661,400,743 UART: [art] Derive Key Pair
1,661,401,103 UART: [art] Store priv key in slot 0x5
1,661,414,519 UART: [art] Derive Key Pair - Done
1,661,429,152 UART: [art] Signing Cert with AUTHO
1,661,429,632 UART: RITY.KEYID = 7
1,661,445,212 UART: [art] Erasing AUTHORITY.KEYID = 7
1,661,445,977 UART: [art] PUB.X = 693B4F58BDEF88F3D105060832B01320D17965B24ABC24C876F65F6B2F393F9ADB0F0040DE46E73E0F3B1C22A4FC720A
1,661,452,715 UART: [art] PUB.Y = FA8159A836E005B57FBF249DDF1FDD263BBD7A33A438F02291D16304808373FA9CFBEA33A2876E0FA4B9546A9FD36F8D
1,661,459,670 UART: [art] SIG.R = 9ABF022099822E028D98A6C43FECEC8C2D2CED1DBDA49D147583010F666E61E6AE9E84158C4AC5A34CB4A3086652C296
1,661,466,435 UART: [art] SIG.S = 582BA058434B351985A92C3D32E4BBDF3B56752F2D496711E169AFE85B9782C79C037FACDD13046E31106E9B9BFF9B37
1,661,490,178 UART: Caliptra RT
1,661,490,523 UART: [state] CFI Enabled
1,661,770,030 UART: [rt] RT listening for mailbox commands...
1,661,770,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,664,535,275 >>> mbox cmd response: success
1,664,548,254 UART:
1,664,548,270 UART: Running Caliptra FMC ...
1,664,548,678 UART:
1,664,548,821 UART: [state] CFI Enabled
1,664,637,974 UART: [art] Extend RT PCRs Done
1,664,638,402 UART: [art] Lock RT PCRs Done
1,664,639,939 UART: [art] Populate DV Done
1,664,647,882 UART: [fht] FMC Alias Private Key: 7
1,664,649,012 UART: [art] Derive CDI
1,664,649,292 UART: [art] Store in in slot 0x4
1,664,735,065 UART: [art] Derive Key Pair
1,664,735,425 UART: [art] Store priv key in slot 0x5
1,664,749,361 UART: [art] Derive Key Pair - Done
1,664,764,262 UART: [art] Signing Cert with AUTHO
1,664,764,742 UART: RITY.KEYID = 7
1,664,779,726 UART: [art] Erasing AUTHORITY.KEYID = 7
1,664,780,491 UART: [art] PUB.X = B1C991BF44F76F34F29677D25EA7D365EA9A0960E55F62F4574955CBB34267D6F956F12974788D3D39BCCA739B6C3C13
1,664,787,260 UART: [art] PUB.Y = 7003650BCFCAC6E92A8A513DF0C39E2A7C352D18844F7BD8B878117FB1F0332F2817428429DB2D638E042D7C32FD89DE
1,664,794,207 UART: [art] SIG.R = CA8F7595FBDA91A229D3BFD7652416D575F21809E8DA110636BD822C547EC19D3A4BCE89387247AA4025EC3D9D3D22EA
1,664,800,981 UART: [art] SIG.S = 10309CE469A94F9396AADB95D64F28FF20C36CACC9A10943123068FD62022B8CFCB76CA73DDB65671DE5F24E9C742C24
1,664,825,190 UART: Caliptra RT
1,664,825,535 UART: [state] CFI Enabled
1,665,108,676 UART: [rt] RT listening for mailbox commands...
1,665,109,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,873,465 >>> mbox cmd response: success
1,667,886,834 UART:
1,667,886,850 UART: Running Caliptra FMC ...
1,667,887,258 UART:
1,667,887,401 UART: [state] CFI Enabled
1,667,976,550 UART: [art] Extend RT PCRs Done
1,667,976,978 UART: [art] Lock RT PCRs Done
1,667,978,033 UART: [art] Populate DV Done
1,667,985,906 UART: [fht] FMC Alias Private Key: 7
1,667,987,052 UART: [art] Derive CDI
1,667,987,332 UART: [art] Store in in slot 0x4
1,668,072,799 UART: [art] Derive Key Pair
1,668,073,159 UART: [art] Store priv key in slot 0x5
1,668,086,579 UART: [art] Derive Key Pair - Done
1,668,101,116 UART: [art] Signing Cert with AUTHO
1,668,101,596 UART: RITY.KEYID = 7
1,668,116,834 UART: [art] Erasing AUTHORITY.KEYID = 7
1,668,117,599 UART: [art] PUB.X = 693B4F58BDEF88F3D105060832B01320D17965B24ABC24C876F65F6B2F393F9ADB0F0040DE46E73E0F3B1C22A4FC720A
1,668,124,337 UART: [art] PUB.Y = FA8159A836E005B57FBF249DDF1FDD263BBD7A33A438F02291D16304808373FA9CFBEA33A2876E0FA4B9546A9FD36F8D
1,668,131,292 UART: [art] SIG.R = 9ABF022099822E028D98A6C43FECEC8C2D2CED1DBDA49D147583010F666E61E6AE9E84158C4AC5A34CB4A3086652C296
1,668,138,057 UART: [art] SIG.S = 582BA058434B351985A92C3D32E4BBDF3B56752F2D496711E169AFE85B9782C79C037FACDD13046E31106E9B9BFF9B37
1,668,161,834 UART: Caliptra RT
1,668,162,179 UART: [state] CFI Enabled
1,668,441,068 UART: [rt] RT listening for mailbox commands...
1,668,441,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,671,203,803 >>> mbox cmd response: success
1,671,216,812 UART:
1,671,216,828 UART: Running Caliptra FMC ...
1,671,217,236 UART:
1,671,217,379 UART: [state] CFI Enabled
1,671,306,828 UART: [art] Extend RT PCRs Done
1,671,307,256 UART: [art] Lock RT PCRs Done
1,671,308,719 UART: [art] Populate DV Done
1,671,316,986 UART: [fht] FMC Alias Private Key: 7
1,671,317,992 UART: [art] Derive CDI
1,671,318,272 UART: [art] Store in in slot 0x4
1,671,403,741 UART: [art] Derive Key Pair
1,671,404,101 UART: [art] Store priv key in slot 0x5
1,671,417,279 UART: [art] Derive Key Pair - Done
1,671,432,292 UART: [art] Signing Cert with AUTHO
1,671,432,772 UART: RITY.KEYID = 7
1,671,448,002 UART: [art] Erasing AUTHORITY.KEYID = 7
1,671,448,767 UART: [art] PUB.X = B1C991BF44F76F34F29677D25EA7D365EA9A0960E55F62F4574955CBB34267D6F956F12974788D3D39BCCA739B6C3C13
1,671,455,536 UART: [art] PUB.Y = 7003650BCFCAC6E92A8A513DF0C39E2A7C352D18844F7BD8B878117FB1F0332F2817428429DB2D638E042D7C32FD89DE
1,671,462,483 UART: [art] SIG.R = CA8F7595FBDA91A229D3BFD7652416D575F21809E8DA110636BD822C547EC19D3A4BCE89387247AA4025EC3D9D3D22EA
1,671,469,257 UART: [art] SIG.S = 10309CE469A94F9396AADB95D64F28FF20C36CACC9A10943123068FD62022B8CFCB76CA73DDB65671DE5F24E9C742C24
1,671,493,190 UART: Caliptra RT
1,671,493,535 UART: [state] CFI Enabled
1,671,776,844 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 346.96s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,555,507,700 UART: [fht] FMC Alias Private Key: 7
1,555,508,856 UART: [art] Derive CDI
1,555,509,136 UART: [art] Store in in slot 0x4
1,555,594,931 UART: [art] Derive Key Pair
1,555,595,291 UART: [art] Store priv key in slot 0x5
1,555,608,153 UART: [art] Derive Key Pair - Done
1,555,622,538 UART: [art] Signing Cert with AUTHO
1,555,623,018 UART: RITY.KEYID = 7
1,555,637,882 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,638,647 UART: [art] PUB.X = 7E731F0E14B0070107CEBB375A7EF219C1871055205F9C9AA367DE53F0865C88EDD0DC7A0A6B0C25E9EC37D17E148ECB
1,555,645,411 UART: [art] PUB.Y = 2B2A44320C461F63732A7BD0473E1649CD72E10404F0471EB31D589A5DC40A49386A8FC8F035B05DE0C4EE0C2C3601F9
1,555,652,345 UART: [art] SIG.R = 1E16994E7DCA97EAC2A6885525B372E8234F31D9D93E8B50A7173E2DDF85E37FFE5D8E2900CA3C1F736C3147A20B63B2
1,555,659,098 UART: [art] SIG.S = BDC98BCA05A91B794C34341423879002E8BA5238867B3061C25EFBC2A42D2928E452D7C7ED29D74D9CBE6EB3FDDFB135
1,555,683,047 UART: Caliptra RT
1,555,683,300 UART: [state] CFI Enabled
1,555,963,365 UART: [rt] RT listening for mailbox commands...
1,555,964,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,964,962 UART:
1,555,964,978 UART: Running Caliptra ROM ...
1,555,965,386 UART:
1,555,965,441 UART: [state] CFI Enabled
1,555,968,101 UART: [state] LifecycleState = Unprovisioned
1,555,968,756 UART: [state] DebugLocked = No
1,555,969,348 UART: [state] WD Timer not started. Device not locked for debugging
1,555,970,676 UART: [kat] SHA2-256
1,556,776,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,780,451 UART: [kat] ++
1,556,780,603 UART: [kat] sha1
1,556,784,679 UART: [kat] SHA2-256
1,556,786,619 UART: [kat] SHA2-384
1,556,789,362 UART: [kat] SHA2-512-ACC
1,556,791,262 UART: [kat] ECC-384
1,556,801,351 UART: [kat] HMAC-384Kdf
1,556,806,093 UART: [kat] LMS
1,557,054,421 UART: [kat] --
1,557,055,195 UART: [update-reset] ++
1,558,369,826 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,370,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,558,520,913 >>> mbox cmd response: success
1,558,521,194 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,529,208 UART: [update-reset Success] --
1,558,530,109 UART: [state] Locking Datavault
1,558,530,789 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,531,393 UART: [state] Locking ICCM
1,558,531,979 UART: [exit] Launching FMC @ 0x40000130
1,558,537,308 UART:
1,558,537,324 UART: Running Caliptra FMC ...
1,558,537,732 UART:
1,558,537,786 UART: [state] CFI Enabled
1,558,626,557 UART: [art] Extend RT PCRs Done
1,558,626,985 UART: [art] Lock RT PCRs Done
1,558,628,502 UART: [art] Populate DV Done
1,558,636,651 UART: [fht] FMC Alias Private Key: 7
1,558,637,587 UART: [art] Derive CDI
1,558,637,867 UART: [art] Store in in slot 0x4
1,558,723,534 UART: [art] Derive Key Pair
1,558,723,894 UART: [art] Store priv key in slot 0x5
1,558,736,854 UART: [art] Derive Key Pair - Done
1,558,751,650 UART: [art] Signing Cert with AUTHO
1,558,752,130 UART: RITY.KEYID = 7
1,558,767,364 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,768,129 UART: [art] PUB.X = 884C3E32C027D253B10ECA9DD47470022E0E1CB2CC50FE493C98B19F9DF8E3DEF0A5050E4FB5C1F9A8E769023771B131
1,558,774,891 UART: [art] PUB.Y = D470B52E40A62DE72EDF91170484F93190917BC5B8F5A606B455CB122192EBF2311F274B94393788569554EB8BD43624
1,558,781,827 UART: [art] SIG.R = 88A8BFCF7A981CDEE0CCE730DD3287A61CAF2B49E51C7EF19F65AAF2ABA4D7C88054E22310D616612435A4B83BE80F6A
1,558,788,614 UART: [art] SIG.S = 3A678F75CFF510D6B8AE054DBA753C11AD36D6DAF7A1AF60268D4AD58F203C9D5861B2A17B97A28D9751916727EB2846
1,558,812,136 UART: Caliptra RT
1,558,812,389 UART: [state] CFI Enabled
1,559,093,964 UART: [rt] RT listening for mailbox commands...
1,559,094,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,095,413 UART:
1,559,095,429 UART: Running Caliptra ROM ...
1,559,095,837 UART:
1,559,095,892 UART: [state] CFI Enabled
1,559,098,406 UART: [state] LifecycleState = Unprovisioned
1,559,099,061 UART: [state] DebugLocked = No
1,559,099,565 UART: [state] WD Timer not started. Device not locked for debugging
1,559,100,885 UART: [kat] SHA2-256
1,559,906,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,910,660 UART: [kat] ++
1,559,910,812 UART: [kat] sha1
1,559,914,976 UART: [kat] SHA2-256
1,559,916,916 UART: [kat] SHA2-384
1,559,919,629 UART: [kat] SHA2-512-ACC
1,559,921,529 UART: [kat] ECC-384
1,559,931,380 UART: [kat] HMAC-384Kdf
1,559,936,026 UART: [kat] LMS
1,560,184,354 UART: [kat] --
1,560,185,048 UART: [update-reset] ++
1,561,499,593 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,500,596 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,561,650,594 >>> mbox cmd response: success
1,561,650,767 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,658,781 UART: [update-reset Success] --
1,561,659,670 UART: [state] Locking Datavault
1,561,660,542 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,661,146 UART: [state] Locking ICCM
1,561,661,762 UART: [exit] Launching FMC @ 0x40000130
1,561,667,091 UART:
1,561,667,107 UART: Running Caliptra FMC ...
1,561,667,515 UART:
1,561,667,569 UART: [state] CFI Enabled
1,561,756,742 UART: [art] Extend RT PCRs Done
1,561,757,170 UART: [art] Lock RT PCRs Done
1,561,758,313 UART: [art] Populate DV Done
1,561,766,604 UART: [fht] FMC Alias Private Key: 7
1,561,767,710 UART: [art] Derive CDI
1,561,767,990 UART: [art] Store in in slot 0x4
1,561,853,907 UART: [art] Derive Key Pair
1,561,854,267 UART: [art] Store priv key in slot 0x5
1,561,867,629 UART: [art] Derive Key Pair - Done
1,561,882,414 UART: [art] Signing Cert with AUTHO
1,561,882,894 UART: RITY.KEYID = 7
1,561,898,446 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,899,211 UART: [art] PUB.X = 7E731F0E14B0070107CEBB375A7EF219C1871055205F9C9AA367DE53F0865C88EDD0DC7A0A6B0C25E9EC37D17E148ECB
1,561,905,975 UART: [art] PUB.Y = 2B2A44320C461F63732A7BD0473E1649CD72E10404F0471EB31D589A5DC40A49386A8FC8F035B05DE0C4EE0C2C3601F9
1,561,912,909 UART: [art] SIG.R = 1E16994E7DCA97EAC2A6885525B372E8234F31D9D93E8B50A7173E2DDF85E37FFE5D8E2900CA3C1F736C3147A20B63B2
1,561,919,662 UART: [art] SIG.S = BDC98BCA05A91B794C34341423879002E8BA5238867B3061C25EFBC2A42D2928E452D7C7ED29D74D9CBE6EB3FDDFB135
1,561,943,401 UART: Caliptra RT
1,561,943,654 UART: [state] CFI Enabled
1,562,222,619 UART: [rt] RT listening for mailbox commands...
1,562,223,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,224,140 UART:
1,562,224,156 UART: Running Caliptra ROM ...
1,562,224,564 UART:
1,562,224,619 UART: [state] CFI Enabled
1,562,226,807 UART: [state] LifecycleState = Unprovisioned
1,562,227,462 UART: [state] DebugLocked = No
1,562,228,194 UART: [state] WD Timer not started. Device not locked for debugging
1,562,229,542 UART: [kat] SHA2-256
1,563,035,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,563,039,317 UART: [kat] ++
1,563,039,469 UART: [kat] sha1
1,563,043,575 UART: [kat] SHA2-256
1,563,045,515 UART: [kat] SHA2-384
1,563,048,300 UART: [kat] SHA2-512-ACC
1,563,050,200 UART: [kat] ECC-384
1,563,059,983 UART: [kat] HMAC-384Kdf
1,563,064,527 UART: [kat] LMS
1,563,312,855 UART: [kat] --
1,563,313,641 UART: [update-reset] ++
1,564,628,322 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,629,435 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,564,779,433 >>> mbox cmd response: success
1,564,779,766 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,787,780 UART: [update-reset Success] --
1,564,788,591 UART: [state] Locking Datavault
1,564,789,311 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,789,915 UART: [state] Locking ICCM
1,564,790,343 UART: [exit] Launching FMC @ 0x40000130
1,564,795,672 UART:
1,564,795,688 UART: Running Caliptra FMC ...
1,564,796,096 UART:
1,564,796,150 UART: [state] CFI Enabled
1,564,884,725 UART: [art] Extend RT PCRs Done
1,564,885,153 UART: [art] Lock RT PCRs Done
1,564,886,536 UART: [art] Populate DV Done
1,564,895,005 UART: [fht] FMC Alias Private Key: 7
1,564,896,055 UART: [art] Derive CDI
1,564,896,335 UART: [art] Store in in slot 0x4
1,564,982,048 UART: [art] Derive Key Pair
1,564,982,408 UART: [art] Store priv key in slot 0x5
1,564,995,052 UART: [art] Derive Key Pair - Done
1,565,009,536 UART: [art] Signing Cert with AUTHO
1,565,010,016 UART: RITY.KEYID = 7
1,565,025,098 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,025,863 UART: [art] PUB.X = 884C3E32C027D253B10ECA9DD47470022E0E1CB2CC50FE493C98B19F9DF8E3DEF0A5050E4FB5C1F9A8E769023771B131
1,565,032,625 UART: [art] PUB.Y = D470B52E40A62DE72EDF91170484F93190917BC5B8F5A606B455CB122192EBF2311F274B94393788569554EB8BD43624
1,565,039,561 UART: [art] SIG.R = 88A8BFCF7A981CDEE0CCE730DD3287A61CAF2B49E51C7EF19F65AAF2ABA4D7C88054E22310D616612435A4B83BE80F6A
1,565,046,348 UART: [art] SIG.S = 3A678F75CFF510D6B8AE054DBA753C11AD36D6DAF7A1AF60268D4AD58F203C9D5861B2A17B97A28D9751916727EB2846
1,565,070,154 UART: Caliptra RT
1,565,070,407 UART: [state] CFI Enabled
1,565,351,462 UART: [rt] RT listening for mailbox commands...
1,565,352,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,353,097 UART:
1,565,353,113 UART: Running Caliptra ROM ...
1,565,353,521 UART:
1,565,353,576 UART: [state] CFI Enabled
1,565,355,994 UART: [state] LifecycleState = Unprovisioned
1,565,356,649 UART: [state] DebugLocked = No
1,565,357,271 UART: [state] WD Timer not started. Device not locked for debugging
1,565,358,569 UART: [kat] SHA2-256
1,566,164,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,566,168,344 UART: [kat] ++
1,566,168,496 UART: [kat] sha1
1,566,172,664 UART: [kat] SHA2-256
1,566,174,604 UART: [kat] SHA2-384
1,566,177,301 UART: [kat] SHA2-512-ACC
1,566,179,201 UART: [kat] ECC-384
1,566,189,040 UART: [kat] HMAC-384Kdf
1,566,193,608 UART: [kat] LMS
1,566,441,936 UART: [kat] --
1,566,442,620 UART: [update-reset] ++
1,567,757,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,758,222 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,567,908,220 >>> mbox cmd response: success
1,567,908,441 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,916,455 UART: [update-reset Success] --
1,567,917,390 UART: [state] Locking Datavault
1,567,918,250 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,918,854 UART: [state] Locking ICCM
1,567,919,490 UART: [exit] Launching FMC @ 0x40000130
1,567,924,819 UART:
1,567,924,835 UART: Running Caliptra FMC ...
1,567,925,243 UART:
1,567,925,297 UART: [state] CFI Enabled
1,568,014,378 UART: [art] Extend RT PCRs Done
1,568,014,806 UART: [art] Lock RT PCRs Done
1,568,016,217 UART: [art] Populate DV Done
1,568,024,530 UART: [fht] FMC Alias Private Key: 7
1,568,025,576 UART: [art] Derive CDI
1,568,025,856 UART: [art] Store in in slot 0x4
1,568,111,725 UART: [art] Derive Key Pair
1,568,112,085 UART: [art] Store priv key in slot 0x5
1,568,125,743 UART: [art] Derive Key Pair - Done
1,568,140,806 UART: [art] Signing Cert with AUTHO
1,568,141,286 UART: RITY.KEYID = 7
1,568,156,638 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,157,403 UART: [art] PUB.X = 7E731F0E14B0070107CEBB375A7EF219C1871055205F9C9AA367DE53F0865C88EDD0DC7A0A6B0C25E9EC37D17E148ECB
1,568,164,167 UART: [art] PUB.Y = 2B2A44320C461F63732A7BD0473E1649CD72E10404F0471EB31D589A5DC40A49386A8FC8F035B05DE0C4EE0C2C3601F9
1,568,171,101 UART: [art] SIG.R = 1E16994E7DCA97EAC2A6885525B372E8234F31D9D93E8B50A7173E2DDF85E37FFE5D8E2900CA3C1F736C3147A20B63B2
1,568,177,854 UART: [art] SIG.S = BDC98BCA05A91B794C34341423879002E8BA5238867B3061C25EFBC2A42D2928E452D7C7ED29D74D9CBE6EB3FDDFB135
1,568,201,431 UART: Caliptra RT
1,568,201,684 UART: [state] CFI Enabled
1,568,484,303 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 315.26s
Truncated 733352 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,835,736 >>> mbox cmd response: success
1,486,849,554 UART:
1,486,849,570 UART: Running Caliptra FMC ...
1,486,849,978 UART:
1,486,850,032 UART: [state] CFI Enabled
1,486,938,831 UART: [art] Extend RT PCRs Done
1,486,939,259 UART: [art] Lock RT PCRs Done
1,486,940,538 UART: [art] Populate DV Done
1,486,948,807 UART: [fht] FMC Alias Private Key: 7
1,486,949,819 UART: [art] Derive CDI
1,486,950,099 UART: [art] Store in in slot 0x4
1,487,035,946 UART: [art] Derive Key Pair
1,487,036,306 UART: [art] Store priv key in slot 0x5
1,487,049,560 UART: [art] Derive Key Pair - Done
1,487,064,079 UART: [art] Signing Cert with AUTHO
1,487,064,559 UART: RITY.KEYID = 7
1,487,079,691 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,080,456 UART: [art] PUB.X = 7F8F338869018020D2906DE596F8802244200C1046E594B8AAEEBEF1BA55B48712A21F6001D8ECEB4FBD27A96ED3AC29
1,487,087,223 UART: [art] PUB.Y = 4E4E3DBA2CF04E1CC95CF5FA65CDD15036B10239F4AEEB0F930CCBEF2DE889E6C139CD79020FD508AF9AA1359787885A
1,487,094,177 UART: [art] SIG.R = 9B57DB0FE16A74D735D936A4FD037A2D46EDD60D7868C68ACBAF48D5091582C465C30C73BFE4F92192EE4FC3D039350C
1,487,100,941 UART: [art] SIG.S = DCA9B10FB15C4DA13B99BD0E98FF3117874D832B7719D4E032F537F8400E74BC6F76A33B70A1F74B37A7C3E6317FA90E
1,487,124,146 UART: Caliptra RT
1,487,124,399 UART: [state] CFI Enabled
1,487,407,809 UART: [rt] RT listening for mailbox commands...
1,487,408,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,847,044 >>> mbox cmd response: success
1,489,860,344 UART:
1,489,860,360 UART: Running Caliptra FMC ...
1,489,860,768 UART:
1,489,860,822 UART: [state] CFI Enabled
1,489,949,923 UART: [art] Extend RT PCRs Done
1,489,950,351 UART: [art] Lock RT PCRs Done
1,489,951,398 UART: [art] Populate DV Done
1,489,959,659 UART: [fht] FMC Alias Private Key: 7
1,489,960,665 UART: [art] Derive CDI
1,489,960,945 UART: [art] Store in in slot 0x4
1,490,046,614 UART: [art] Derive Key Pair
1,490,046,974 UART: [art] Store priv key in slot 0x5
1,490,060,020 UART: [art] Derive Key Pair - Done
1,490,074,852 UART: [art] Signing Cert with AUTHO
1,490,075,332 UART: RITY.KEYID = 7
1,490,090,082 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,090,847 UART: [art] PUB.X = B804A06FE8E2D9EBEF3B9DB05699103AD5261B95689F86DDD54422A70BCECB4EE6C400DFEF8E80D9B467ABDCF295473D
1,490,097,611 UART: [art] PUB.Y = 27242AF347904FC49D8174DB3441CA9EACBD5CDA9E5E9A3754A6B9BD1A3E7762D5A18CF594FD3BB81A1B46C66403EB07
1,490,104,571 UART: [art] SIG.R = 6E97057405BD6745B195F2417E7F4DC58C8427B39F6264C9A0E7638A74F42D974F64F1C00242EA7CE759F27E3931BD89
1,490,111,328 UART: [art] SIG.S = 4A9B5382615E30E234A43FE67CC974A42E1F04E1B5930AFC3A1DEA150AF75843CF20DE92A4B936A634AD5CBDB11B2F5F
1,490,135,338 UART: Caliptra RT
1,490,135,591 UART: [state] CFI Enabled
1,490,417,648 UART: [rt] RT listening for mailbox commands...
1,490,418,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,857,119 >>> mbox cmd response: success
1,492,870,771 UART:
1,492,870,787 UART: Running Caliptra FMC ...
1,492,871,195 UART:
1,492,871,249 UART: [state] CFI Enabled
1,492,960,198 UART: [art] Extend RT PCRs Done
1,492,960,626 UART: [art] Lock RT PCRs Done
1,492,961,899 UART: [art] Populate DV Done
1,492,970,090 UART: [fht] FMC Alias Private Key: 7
1,492,971,078 UART: [art] Derive CDI
1,492,971,358 UART: [art] Store in in slot 0x4
1,493,057,477 UART: [art] Derive Key Pair
1,493,057,837 UART: [art] Store priv key in slot 0x5
1,493,071,425 UART: [art] Derive Key Pair - Done
1,493,086,244 UART: [art] Signing Cert with AUTHO
1,493,086,724 UART: RITY.KEYID = 7
1,493,101,726 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,102,491 UART: [art] PUB.X = 7F8F338869018020D2906DE596F8802244200C1046E594B8AAEEBEF1BA55B48712A21F6001D8ECEB4FBD27A96ED3AC29
1,493,109,258 UART: [art] PUB.Y = 4E4E3DBA2CF04E1CC95CF5FA65CDD15036B10239F4AEEB0F930CCBEF2DE889E6C139CD79020FD508AF9AA1359787885A
1,493,116,212 UART: [art] SIG.R = 9B57DB0FE16A74D735D936A4FD037A2D46EDD60D7868C68ACBAF48D5091582C465C30C73BFE4F92192EE4FC3D039350C
1,493,122,976 UART: [art] SIG.S = DCA9B10FB15C4DA13B99BD0E98FF3117874D832B7719D4E032F537F8400E74BC6F76A33B70A1F74B37A7C3E6317FA90E
1,493,146,607 UART: Caliptra RT
1,493,146,860 UART: [state] CFI Enabled
1,493,428,988 UART: [rt] RT listening for mailbox commands...
1,493,429,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,868,175 >>> mbox cmd response: success
1,495,881,683 UART:
1,495,881,699 UART: Running Caliptra FMC ...
1,495,882,107 UART:
1,495,882,161 UART: [state] CFI Enabled
1,495,971,170 UART: [art] Extend RT PCRs Done
1,495,971,598 UART: [art] Lock RT PCRs Done
1,495,972,681 UART: [art] Populate DV Done
1,495,981,072 UART: [fht] FMC Alias Private Key: 7
1,495,982,090 UART: [art] Derive CDI
1,495,982,370 UART: [art] Store in in slot 0x4
1,496,067,757 UART: [art] Derive Key Pair
1,496,068,117 UART: [art] Store priv key in slot 0x5
1,496,081,269 UART: [art] Derive Key Pair - Done
1,496,095,837 UART: [art] Signing Cert with AUTHO
1,496,096,317 UART: RITY.KEYID = 7
1,496,111,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,112,252 UART: [art] PUB.X = B804A06FE8E2D9EBEF3B9DB05699103AD5261B95689F86DDD54422A70BCECB4EE6C400DFEF8E80D9B467ABDCF295473D
1,496,119,016 UART: [art] PUB.Y = 27242AF347904FC49D8174DB3441CA9EACBD5CDA9E5E9A3754A6B9BD1A3E7762D5A18CF594FD3BB81A1B46C66403EB07
1,496,125,976 UART: [art] SIG.R = 6E97057405BD6745B195F2417E7F4DC58C8427B39F6264C9A0E7638A74F42D974F64F1C00242EA7CE759F27E3931BD89
1,496,132,733 UART: [art] SIG.S = 4A9B5382615E30E234A43FE67CC974A42E1F04E1B5930AFC3A1DEA150AF75843CF20DE92A4B936A634AD5CBDB11B2F5F
1,496,156,247 UART: Caliptra RT
1,496,156,500 UART: [state] CFI Enabled
1,496,438,815 UART: [rt] RT listening for mailbox commands...
1,496,439,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,879,606 >>> mbox cmd response: success
1,498,892,910 UART:
1,498,892,926 UART: Running Caliptra FMC ...
1,498,893,334 UART:
1,498,893,388 UART: [state] CFI Enabled
1,498,982,445 UART: [art] Extend RT PCRs Done
1,498,982,873 UART: [art] Lock RT PCRs Done
1,498,984,122 UART: [art] Populate DV Done
1,498,991,987 UART: [fht] FMC Alias Private Key: 7
1,498,993,161 UART: [art] Derive CDI
1,498,993,441 UART: [art] Store in in slot 0x4
1,499,078,974 UART: [art] Derive Key Pair
1,499,079,334 UART: [art] Store priv key in slot 0x5
1,499,092,264 UART: [art] Derive Key Pair - Done
1,499,107,149 UART: [art] Signing Cert with AUTHO
1,499,107,629 UART: RITY.KEYID = 7
1,499,123,223 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,123,988 UART: [art] PUB.X = 7F8F338869018020D2906DE596F8802244200C1046E594B8AAEEBEF1BA55B48712A21F6001D8ECEB4FBD27A96ED3AC29
1,499,130,755 UART: [art] PUB.Y = 4E4E3DBA2CF04E1CC95CF5FA65CDD15036B10239F4AEEB0F930CCBEF2DE889E6C139CD79020FD508AF9AA1359787885A
1,499,137,709 UART: [art] SIG.R = 9B57DB0FE16A74D735D936A4FD037A2D46EDD60D7868C68ACBAF48D5091582C465C30C73BFE4F92192EE4FC3D039350C
1,499,144,473 UART: [art] SIG.S = DCA9B10FB15C4DA13B99BD0E98FF3117874D832B7719D4E032F537F8400E74BC6F76A33B70A1F74B37A7C3E6317FA90E
1,499,167,662 UART: Caliptra RT
1,499,167,915 UART: [state] CFI Enabled
1,499,449,645 UART: [rt] RT listening for mailbox commands...
1,499,450,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,890,378 >>> mbox cmd response: success
1,501,903,654 UART:
1,501,903,670 UART: Running Caliptra FMC ...
1,501,904,078 UART:
1,501,904,132 UART: [state] CFI Enabled
1,501,993,121 UART: [art] Extend RT PCRs Done
1,501,993,549 UART: [art] Lock RT PCRs Done
1,501,994,768 UART: [art] Populate DV Done
1,502,002,837 UART: [fht] FMC Alias Private Key: 7
1,502,003,965 UART: [art] Derive CDI
1,502,004,245 UART: [art] Store in in slot 0x4
1,502,090,246 UART: [art] Derive Key Pair
1,502,090,606 UART: [art] Store priv key in slot 0x5
1,502,103,806 UART: [art] Derive Key Pair - Done
1,502,118,666 UART: [art] Signing Cert with AUTHO
1,502,119,146 UART: RITY.KEYID = 7
1,502,134,362 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,135,127 UART: [art] PUB.X = B804A06FE8E2D9EBEF3B9DB05699103AD5261B95689F86DDD54422A70BCECB4EE6C400DFEF8E80D9B467ABDCF295473D
1,502,141,891 UART: [art] PUB.Y = 27242AF347904FC49D8174DB3441CA9EACBD5CDA9E5E9A3754A6B9BD1A3E7762D5A18CF594FD3BB81A1B46C66403EB07
1,502,148,851 UART: [art] SIG.R = 6E97057405BD6745B195F2417E7F4DC58C8427B39F6264C9A0E7638A74F42D974F64F1C00242EA7CE759F27E3931BD89
1,502,155,608 UART: [art] SIG.S = 4A9B5382615E30E234A43FE67CC974A42E1F04E1B5930AFC3A1DEA150AF75843CF20DE92A4B936A634AD5CBDB11B2F5F
1,502,179,196 UART: Caliptra RT
1,502,179,449 UART: [state] CFI Enabled
1,502,465,300 UART: [rt] RT listening for mailbox commands...
1,502,465,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,906,047 >>> mbox cmd response: success
1,504,919,675 UART:
1,504,919,691 UART: Running Caliptra FMC ...
1,504,920,099 UART:
1,504,920,153 UART: [state] CFI Enabled
1,505,008,810 UART: [art] Extend RT PCRs Done
1,505,009,238 UART: [art] Lock RT PCRs Done
1,505,010,361 UART: [art] Populate DV Done
1,505,018,674 UART: [fht] FMC Alias Private Key: 7
1,505,019,800 UART: [art] Derive CDI
1,505,020,080 UART: [art] Store in in slot 0x4
1,505,105,681 UART: [art] Derive Key Pair
1,505,106,041 UART: [art] Store priv key in slot 0x5
1,505,118,623 UART: [art] Derive Key Pair - Done
1,505,133,682 UART: [art] Signing Cert with AUTHO
1,505,134,162 UART: RITY.KEYID = 7
1,505,149,324 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,150,089 UART: [art] PUB.X = 7F8F338869018020D2906DE596F8802244200C1046E594B8AAEEBEF1BA55B48712A21F6001D8ECEB4FBD27A96ED3AC29
1,505,156,856 UART: [art] PUB.Y = 4E4E3DBA2CF04E1CC95CF5FA65CDD15036B10239F4AEEB0F930CCBEF2DE889E6C139CD79020FD508AF9AA1359787885A
1,505,163,810 UART: [art] SIG.R = 9B57DB0FE16A74D735D936A4FD037A2D46EDD60D7868C68ACBAF48D5091582C465C30C73BFE4F92192EE4FC3D039350C
1,505,170,574 UART: [art] SIG.S = DCA9B10FB15C4DA13B99BD0E98FF3117874D832B7719D4E032F537F8400E74BC6F76A33B70A1F74B37A7C3E6317FA90E
1,505,193,963 UART: Caliptra RT
1,505,194,216 UART: [state] CFI Enabled
1,505,473,670 UART: [rt] RT listening for mailbox commands...
1,505,474,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,913,509 >>> mbox cmd response: success
1,507,926,717 UART:
1,507,926,733 UART: Running Caliptra FMC ...
1,507,927,141 UART:
1,507,927,195 UART: [state] CFI Enabled
1,508,015,856 UART: [art] Extend RT PCRs Done
1,508,016,284 UART: [art] Lock RT PCRs Done
1,508,017,613 UART: [art] Populate DV Done
1,508,025,574 UART: [fht] FMC Alias Private Key: 7
1,508,026,534 UART: [art] Derive CDI
1,508,026,814 UART: [art] Store in in slot 0x4
1,508,112,693 UART: [art] Derive Key Pair
1,508,113,053 UART: [art] Store priv key in slot 0x5
1,508,126,057 UART: [art] Derive Key Pair - Done
1,508,140,689 UART: [art] Signing Cert with AUTHO
1,508,141,169 UART: RITY.KEYID = 7
1,508,156,409 UART: [art] Erasing AUTHORITY.KEYID = 7
1,508,157,174 UART: [art] PUB.X = B804A06FE8E2D9EBEF3B9DB05699103AD5261B95689F86DDD54422A70BCECB4EE6C400DFEF8E80D9B467ABDCF295473D
1,508,163,938 UART: [art] PUB.Y = 27242AF347904FC49D8174DB3441CA9EACBD5CDA9E5E9A3754A6B9BD1A3E7762D5A18CF594FD3BB81A1B46C66403EB07
1,508,170,898 UART: [art] SIG.R = 6E97057405BD6745B195F2417E7F4DC58C8427B39F6264C9A0E7638A74F42D974F64F1C00242EA7CE759F27E3931BD89
1,508,177,655 UART: [art] SIG.S = 4A9B5382615E30E234A43FE67CC974A42E1F04E1B5930AFC3A1DEA150AF75843CF20DE92A4B936A634AD5CBDB11B2F5F
1,508,201,591 UART: Caliptra RT
1,508,201,844 UART: [state] CFI Enabled
1,508,483,933 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 304.09s
Truncated 1339597 bytes from beginning
[art] Populate DV Done
1,556,108,250 UART: [fht] FMC Alias Private Key: 7
1,556,109,352 UART: [art] Derive CDI
1,556,109,632 UART: [art] Store in in slot 0x4
1,556,195,257 UART: [art] Derive Key Pair
1,556,195,617 UART: [art] Store priv key in slot 0x5
1,556,209,385 UART: [art] Derive Key Pair - Done
1,556,224,094 UART: [art] Signing Cert with AUTHO
1,556,224,574 UART: RITY.KEYID = 7
1,556,239,954 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,240,719 UART: [art] PUB.X = F9EBCA2B4E36678A6A89126A1ABCA730EFEF59BB5D86CDE605CF77FD50B0DE60DCC75EA7E2E7B547DF54B37616C590FE
1,556,247,514 UART: [art] PUB.Y = A8FE63A073CFF61B39F2E74F1E502C88AC9AD0FAF639B4C46F729AB68BC9F5B33F32ACDCA2E2C216E7447FD31C98975C
1,556,254,486 UART: [art] SIG.R = E039FCA258571415154D6A5B3AC931AC34361619F858037C49E895A47367B8068B27B5E5510B3A4CCC231D15288D8491
1,556,261,237 UART: [art] SIG.S = 246C30FE29D34AC269EA898E7AEE3ADA25CCA9E83A52897CE4354808A482726A73E6B702889C53C0D5A6ED0917E945F1
1,556,285,485 UART: Caliptra RT
1,556,285,830 UART: [state] CFI Enabled
1,556,571,781 UART: [rt] RT listening for mailbox commands...
1,556,572,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,573,268 UART:
1,556,573,284 UART: Running Caliptra ROM ...
1,556,573,692 UART:
1,556,573,834 UART: [state] CFI Enabled
1,556,576,540 UART: [state] LifecycleState = Unprovisioned
1,556,577,195 UART: [state] DebugLocked = No
1,556,577,751 UART: [state] WD Timer not started. Device not locked for debugging
1,556,579,103 UART: [kat] SHA2-256
1,557,384,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,557,388,878 UART: [kat] ++
1,557,389,030 UART: [kat] sha1
1,557,393,278 UART: [kat] SHA2-256
1,557,395,218 UART: [kat] SHA2-384
1,557,398,061 UART: [kat] SHA2-512-ACC
1,557,399,961 UART: [kat] ECC-384
1,557,409,714 UART: [kat] HMAC-384Kdf
1,557,414,144 UART: [kat] LMS
1,557,662,472 UART: [kat] --
1,557,663,262 UART: [update-reset] ++
1,558,976,977 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,977,988 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,559,127,986 >>> mbox cmd response: success
1,559,128,227 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,136,241 UART: [update-reset Success] --
1,559,137,164 UART: [state] Locking Datavault
1,559,137,876 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,138,480 UART: [state] Locking ICCM
1,559,139,140 UART: [exit] Launching FMC @ 0x40000130
1,559,144,469 UART:
1,559,144,485 UART: Running Caliptra FMC ...
1,559,144,893 UART:
1,559,145,036 UART: [state] CFI Enabled
1,559,233,747 UART: [art] Extend RT PCRs Done
1,559,234,175 UART: [art] Lock RT PCRs Done
1,559,235,672 UART: [art] Populate DV Done
1,559,244,007 UART: [fht] FMC Alias Private Key: 7
1,559,244,993 UART: [art] Derive CDI
1,559,245,273 UART: [art] Store in in slot 0x4
1,559,330,726 UART: [art] Derive Key Pair
1,559,331,086 UART: [art] Store priv key in slot 0x5
1,559,344,076 UART: [art] Derive Key Pair - Done
1,559,358,725 UART: [art] Signing Cert with AUTHO
1,559,359,205 UART: RITY.KEYID = 7
1,559,374,513 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,375,278 UART: [art] PUB.X = D44EA4041A5BDE4CB7F9435729881BD5EF2FD8DC8C594C9DD6C1D55AB7F02D3B6392F47CD7AF140A6CA63BD5EABC46A4
1,559,382,068 UART: [art] PUB.Y = 2A16ABF50583901CED986D2326203CBDA967390D08520857EE3E6FAC198BC473C1ADF268D349FADCEF443066F4A3FE65
1,559,389,016 UART: [art] SIG.R = A8CAA6C43CA5F561502A13F02E39A8714B49DEAC2F0D649FAE2187F5B06BE85DB42B5219B439375976E2F12632B42FAE
1,559,395,793 UART: [art] SIG.S = 774D1CDB7AF3C3B7AC16989A40DDA8C34FE9CA24B8F4BDCAEB4BCDDFC86349D66D25D1D9186416615BE846FC0FFE2434
1,559,419,271 UART: Caliptra RT
1,559,419,616 UART: [state] CFI Enabled
1,559,697,051 UART: [rt] RT listening for mailbox commands...
1,559,697,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,698,862 UART:
1,559,698,878 UART: Running Caliptra ROM ...
1,559,699,286 UART:
1,559,699,428 UART: [state] CFI Enabled
1,559,702,260 UART: [state] LifecycleState = Unprovisioned
1,559,702,915 UART: [state] DebugLocked = No
1,559,703,643 UART: [state] WD Timer not started. Device not locked for debugging
1,559,704,815 UART: [kat] SHA2-256
1,560,510,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,560,514,590 UART: [kat] ++
1,560,514,742 UART: [kat] sha1
1,560,519,116 UART: [kat] SHA2-256
1,560,521,056 UART: [kat] SHA2-384
1,560,523,639 UART: [kat] SHA2-512-ACC
1,560,525,539 UART: [kat] ECC-384
1,560,535,440 UART: [kat] HMAC-384Kdf
1,560,540,142 UART: [kat] LMS
1,560,788,470 UART: [kat] --
1,560,789,172 UART: [update-reset] ++
1,562,104,645 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,105,714 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,562,255,712 >>> mbox cmd response: success
1,562,256,039 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,264,053 UART: [update-reset Success] --
1,562,264,926 UART: [state] Locking Datavault
1,562,265,814 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,266,418 UART: [state] Locking ICCM
1,562,266,862 UART: [exit] Launching FMC @ 0x40000130
1,562,272,191 UART:
1,562,272,207 UART: Running Caliptra FMC ...
1,562,272,615 UART:
1,562,272,758 UART: [state] CFI Enabled
1,562,361,949 UART: [art] Extend RT PCRs Done
1,562,362,377 UART: [art] Lock RT PCRs Done
1,562,363,784 UART: [art] Populate DV Done
1,562,372,147 UART: [fht] FMC Alias Private Key: 7
1,562,373,243 UART: [art] Derive CDI
1,562,373,523 UART: [art] Store in in slot 0x4
1,562,458,826 UART: [art] Derive Key Pair
1,562,459,186 UART: [art] Store priv key in slot 0x5
1,562,472,180 UART: [art] Derive Key Pair - Done
1,562,487,449 UART: [art] Signing Cert with AUTHO
1,562,487,929 UART: RITY.KEYID = 7
1,562,503,029 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,503,794 UART: [art] PUB.X = F9EBCA2B4E36678A6A89126A1ABCA730EFEF59BB5D86CDE605CF77FD50B0DE60DCC75EA7E2E7B547DF54B37616C590FE
1,562,510,589 UART: [art] PUB.Y = A8FE63A073CFF61B39F2E74F1E502C88AC9AD0FAF639B4C46F729AB68BC9F5B33F32ACDCA2E2C216E7447FD31C98975C
1,562,517,561 UART: [art] SIG.R = E039FCA258571415154D6A5B3AC931AC34361619F858037C49E895A47367B8068B27B5E5510B3A4CCC231D15288D8491
1,562,524,312 UART: [art] SIG.S = 246C30FE29D34AC269EA898E7AEE3ADA25CCA9E83A52897CE4354808A482726A73E6B702889C53C0D5A6ED0917E945F1
1,562,548,434 UART: Caliptra RT
1,562,548,779 UART: [state] CFI Enabled
1,562,828,540 UART: [rt] RT listening for mailbox commands...
1,562,829,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,830,025 UART:
1,562,830,041 UART: Running Caliptra ROM ...
1,562,830,449 UART:
1,562,830,591 UART: [state] CFI Enabled
1,562,833,283 UART: [state] LifecycleState = Unprovisioned
1,562,833,938 UART: [state] DebugLocked = No
1,562,834,658 UART: [state] WD Timer not started. Device not locked for debugging
1,562,835,930 UART: [kat] SHA2-256
1,563,641,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,563,645,705 UART: [kat] ++
1,563,645,857 UART: [kat] sha1
1,563,650,123 UART: [kat] SHA2-256
1,563,652,063 UART: [kat] SHA2-384
1,563,654,662 UART: [kat] SHA2-512-ACC
1,563,656,562 UART: [kat] ECC-384
1,563,666,565 UART: [kat] HMAC-384Kdf
1,563,671,221 UART: [kat] LMS
1,563,919,549 UART: [kat] --
1,563,920,285 UART: [update-reset] ++
1,565,233,468 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,234,539 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,565,384,537 >>> mbox cmd response: success
1,565,384,838 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,392,852 UART: [update-reset Success] --
1,565,393,945 UART: [state] Locking Datavault
1,565,394,803 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,395,407 UART: [state] Locking ICCM
1,565,395,907 UART: [exit] Launching FMC @ 0x40000130
1,565,401,236 UART:
1,565,401,252 UART: Running Caliptra FMC ...
1,565,401,660 UART:
1,565,401,803 UART: [state] CFI Enabled
1,565,490,988 UART: [art] Extend RT PCRs Done
1,565,491,416 UART: [art] Lock RT PCRs Done
1,565,492,499 UART: [art] Populate DV Done
1,565,500,666 UART: [fht] FMC Alias Private Key: 7
1,565,501,760 UART: [art] Derive CDI
1,565,502,040 UART: [art] Store in in slot 0x4
1,565,587,961 UART: [art] Derive Key Pair
1,565,588,321 UART: [art] Store priv key in slot 0x5
1,565,601,605 UART: [art] Derive Key Pair - Done
1,565,616,284 UART: [art] Signing Cert with AUTHO
1,565,616,764 UART: RITY.KEYID = 7
1,565,631,988 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,632,753 UART: [art] PUB.X = D44EA4041A5BDE4CB7F9435729881BD5EF2FD8DC8C594C9DD6C1D55AB7F02D3B6392F47CD7AF140A6CA63BD5EABC46A4
1,565,639,543 UART: [art] PUB.Y = 2A16ABF50583901CED986D2326203CBDA967390D08520857EE3E6FAC198BC473C1ADF268D349FADCEF443066F4A3FE65
1,565,646,491 UART: [art] SIG.R = A8CAA6C43CA5F561502A13F02E39A8714B49DEAC2F0D649FAE2187F5B06BE85DB42B5219B439375976E2F12632B42FAE
1,565,653,268 UART: [art] SIG.S = 774D1CDB7AF3C3B7AC16989A40DDA8C34FE9CA24B8F4BDCAEB4BCDDFC86349D66D25D1D9186416615BE846FC0FFE2434
1,565,676,970 UART: Caliptra RT
1,565,677,315 UART: [state] CFI Enabled
1,565,956,614 UART: [rt] RT listening for mailbox commands...
1,565,957,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,958,123 UART:
1,565,958,139 UART: Running Caliptra ROM ...
1,565,958,547 UART:
1,565,958,689 UART: [state] CFI Enabled
1,565,962,053 UART: [state] LifecycleState = Unprovisioned
1,565,962,708 UART: [state] DebugLocked = No
1,565,963,288 UART: [state] WD Timer not started. Device not locked for debugging
1,565,964,588 UART: [kat] SHA2-256
1,566,770,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,566,774,363 UART: [kat] ++
1,566,774,515 UART: [kat] sha1
1,566,778,723 UART: [kat] SHA2-256
1,566,780,663 UART: [kat] SHA2-384
1,566,783,560 UART: [kat] SHA2-512-ACC
1,566,785,460 UART: [kat] ECC-384
1,566,795,447 UART: [kat] HMAC-384Kdf
1,566,799,949 UART: [kat] LMS
1,567,048,277 UART: [kat] --
1,567,049,227 UART: [update-reset] ++
1,568,362,910 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,568,363,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,568,513,913 >>> mbox cmd response: success
1,568,514,026 UART: [update-reset] Copying MAN_2 To MAN_1
1,568,522,040 UART: [update-reset Success] --
1,568,523,165 UART: [state] Locking Datavault
1,568,523,849 UART: [state] Locking PCR0, PCR1 and PCR31
1,568,524,453 UART: [state] Locking ICCM
1,568,524,943 UART: [exit] Launching FMC @ 0x40000130
1,568,530,272 UART:
1,568,530,288 UART: Running Caliptra FMC ...
1,568,530,696 UART:
1,568,530,839 UART: [state] CFI Enabled
1,568,620,326 UART: [art] Extend RT PCRs Done
1,568,620,754 UART: [art] Lock RT PCRs Done
1,568,621,953 UART: [art] Populate DV Done
1,568,630,198 UART: [fht] FMC Alias Private Key: 7
1,568,631,326 UART: [art] Derive CDI
1,568,631,606 UART: [art] Store in in slot 0x4
1,568,717,297 UART: [art] Derive Key Pair
1,568,717,657 UART: [art] Store priv key in slot 0x5
1,568,731,207 UART: [art] Derive Key Pair - Done
1,568,746,152 UART: [art] Signing Cert with AUTHO
1,568,746,632 UART: RITY.KEYID = 7
1,568,761,654 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,762,419 UART: [art] PUB.X = F9EBCA2B4E36678A6A89126A1ABCA730EFEF59BB5D86CDE605CF77FD50B0DE60DCC75EA7E2E7B547DF54B37616C590FE
1,568,769,214 UART: [art] PUB.Y = A8FE63A073CFF61B39F2E74F1E502C88AC9AD0FAF639B4C46F729AB68BC9F5B33F32ACDCA2E2C216E7447FD31C98975C
1,568,776,186 UART: [art] SIG.R = E039FCA258571415154D6A5B3AC931AC34361619F858037C49E895A47367B8068B27B5E5510B3A4CCC231D15288D8491
1,568,782,937 UART: [art] SIG.S = 246C30FE29D34AC269EA898E7AEE3ADA25CCA9E83A52897CE4354808A482726A73E6B702889C53C0D5A6ED0917E945F1
1,568,807,099 UART: Caliptra RT
1,568,807,444 UART: [state] CFI Enabled
1,569,090,353 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 318.48s
Truncated 733356 bytes from beginning
9 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,461,395 >>> mbox cmd response: success
1,487,474,737 UART:
1,487,474,753 UART: Running Caliptra FMC ...
1,487,475,161 UART:
1,487,475,304 UART: [state] CFI Enabled
1,487,564,903 UART: [art] Extend RT PCRs Done
1,487,565,331 UART: [art] Lock RT PCRs Done
1,487,566,710 UART: [art] Populate DV Done
1,487,575,015 UART: [fht] FMC Alias Private Key: 7
1,487,576,173 UART: [art] Derive CDI
1,487,576,453 UART: [art] Store in in slot 0x4
1,487,662,082 UART: [art] Derive Key Pair
1,487,662,442 UART: [art] Store priv key in slot 0x5
1,487,676,154 UART: [art] Derive Key Pair - Done
1,487,691,208 UART: [art] Signing Cert with AUTHO
1,487,691,688 UART: RITY.KEYID = 7
1,487,706,982 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,707,747 UART: [art] PUB.X = 9423D5C37E41BA52451B117D9623D6648619C618CF0C7FD603CF6F8B99B3854AEE1DA3403EA2ACD8FAF51ED1CD4E653D
1,487,714,525 UART: [art] PUB.Y = 29B9999092B10A0608EE02D1F8299007F9ACE0B441F620C0F28BF7F7AB2A1E53E26AAC3C3200E10AFE94CBF75F3C2B31
1,487,721,447 UART: [art] SIG.R = 990F78A793850EC4D4E8E8A575EDB0BA4B141EF616DC81C7EB818D9271C34CD0EF0122C7AE7613D5E481CC96AC377794
1,487,728,218 UART: [art] SIG.S = 70C8A59CDF1E9CE72469A6C3B79018011C4477C5406C755446069510DD95F63581405364C8C6C337CF5B2D1275FD1C3B
1,487,752,473 UART: Caliptra RT
1,487,752,818 UART: [state] CFI Enabled
1,488,031,949 UART: [rt] RT listening for mailbox commands...
1,488,032,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,471,221 >>> mbox cmd response: success
1,490,484,727 UART:
1,490,484,743 UART: Running Caliptra FMC ...
1,490,485,151 UART:
1,490,485,294 UART: [state] CFI Enabled
1,490,574,405 UART: [art] Extend RT PCRs Done
1,490,574,833 UART: [art] Lock RT PCRs Done
1,490,576,258 UART: [art] Populate DV Done
1,490,584,681 UART: [fht] FMC Alias Private Key: 7
1,490,585,719 UART: [art] Derive CDI
1,490,585,999 UART: [art] Store in in slot 0x4
1,490,671,724 UART: [art] Derive Key Pair
1,490,672,084 UART: [art] Store priv key in slot 0x5
1,490,685,152 UART: [art] Derive Key Pair - Done
1,490,700,016 UART: [art] Signing Cert with AUTHO
1,490,700,496 UART: RITY.KEYID = 7
1,490,715,854 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,716,619 UART: [art] PUB.X = 06306E3B5D4EC974B1BB2E901F8F9516C5A18E8548AF68B6F47F1A05464BE70B87A7D3BFCCD0C3B744ABFC4C190C9675
1,490,723,391 UART: [art] PUB.Y = 50C297EBADBF5E953AAE53669F49C1EA2C8D85814E07A7505B3C224B686F5512BAAC3EA9E3C04604F1DE588DFF72C717
1,490,730,349 UART: [art] SIG.R = 808CBB3FF90CF617E3767E10D55654C183D137ABBDC6F3ABFD36A100EC2ECF873D7B796E8E005B283677B2C448EC69E3
1,490,737,086 UART: [art] SIG.S = 1C51A58A1056343EC079A17D9FE60FEB0FDDB14D63C4D20CC235A0FF81304592B824F03524D96DF3EFE20F2F5C5685DC
1,490,760,949 UART: Caliptra RT
1,490,761,294 UART: [state] CFI Enabled
1,491,045,239 UART: [rt] RT listening for mailbox commands...
1,491,045,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,485,315 >>> mbox cmd response: success
1,493,498,845 UART:
1,493,498,861 UART: Running Caliptra FMC ...
1,493,499,269 UART:
1,493,499,412 UART: [state] CFI Enabled
1,493,588,421 UART: [art] Extend RT PCRs Done
1,493,588,849 UART: [art] Lock RT PCRs Done
1,493,590,394 UART: [art] Populate DV Done
1,493,598,729 UART: [fht] FMC Alias Private Key: 7
1,493,599,731 UART: [art] Derive CDI
1,493,600,011 UART: [art] Store in in slot 0x4
1,493,686,102 UART: [art] Derive Key Pair
1,493,686,462 UART: [art] Store priv key in slot 0x5
1,493,699,958 UART: [art] Derive Key Pair - Done
1,493,714,706 UART: [art] Signing Cert with AUTHO
1,493,715,186 UART: RITY.KEYID = 7
1,493,730,932 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,731,697 UART: [art] PUB.X = 9423D5C37E41BA52451B117D9623D6648619C618CF0C7FD603CF6F8B99B3854AEE1DA3403EA2ACD8FAF51ED1CD4E653D
1,493,738,475 UART: [art] PUB.Y = 29B9999092B10A0608EE02D1F8299007F9ACE0B441F620C0F28BF7F7AB2A1E53E26AAC3C3200E10AFE94CBF75F3C2B31
1,493,745,397 UART: [art] SIG.R = 990F78A793850EC4D4E8E8A575EDB0BA4B141EF616DC81C7EB818D9271C34CD0EF0122C7AE7613D5E481CC96AC377794
1,493,752,168 UART: [art] SIG.S = 70C8A59CDF1E9CE72469A6C3B79018011C4477C5406C755446069510DD95F63581405364C8C6C337CF5B2D1275FD1C3B
1,493,775,577 UART: Caliptra RT
1,493,775,922 UART: [state] CFI Enabled
1,494,055,809 UART: [rt] RT listening for mailbox commands...
1,494,056,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,496,203 >>> mbox cmd response: success
1,496,509,485 UART:
1,496,509,501 UART: Running Caliptra FMC ...
1,496,509,909 UART:
1,496,510,052 UART: [state] CFI Enabled
1,496,599,567 UART: [art] Extend RT PCRs Done
1,496,599,995 UART: [art] Lock RT PCRs Done
1,496,601,242 UART: [art] Populate DV Done
1,496,609,587 UART: [fht] FMC Alias Private Key: 7
1,496,610,533 UART: [art] Derive CDI
1,496,610,813 UART: [art] Store in in slot 0x4
1,496,696,288 UART: [art] Derive Key Pair
1,496,696,648 UART: [art] Store priv key in slot 0x5
1,496,709,716 UART: [art] Derive Key Pair - Done
1,496,724,492 UART: [art] Signing Cert with AUTHO
1,496,724,972 UART: RITY.KEYID = 7
1,496,740,332 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,741,097 UART: [art] PUB.X = 06306E3B5D4EC974B1BB2E901F8F9516C5A18E8548AF68B6F47F1A05464BE70B87A7D3BFCCD0C3B744ABFC4C190C9675
1,496,747,869 UART: [art] PUB.Y = 50C297EBADBF5E953AAE53669F49C1EA2C8D85814E07A7505B3C224B686F5512BAAC3EA9E3C04604F1DE588DFF72C717
1,496,754,827 UART: [art] SIG.R = 808CBB3FF90CF617E3767E10D55654C183D137ABBDC6F3ABFD36A100EC2ECF873D7B796E8E005B283677B2C448EC69E3
1,496,761,564 UART: [art] SIG.S = 1C51A58A1056343EC079A17D9FE60FEB0FDDB14D63C4D20CC235A0FF81304592B824F03524D96DF3EFE20F2F5C5685DC
1,496,785,069 UART: Caliptra RT
1,496,785,414 UART: [state] CFI Enabled
1,497,069,201 UART: [rt] RT listening for mailbox commands...
1,497,069,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,509,693 >>> mbox cmd response: success
1,499,522,965 UART:
1,499,522,981 UART: Running Caliptra FMC ...
1,499,523,389 UART:
1,499,523,532 UART: [state] CFI Enabled
1,499,612,241 UART: [art] Extend RT PCRs Done
1,499,612,669 UART: [art] Lock RT PCRs Done
1,499,613,890 UART: [art] Populate DV Done
1,499,622,077 UART: [fht] FMC Alias Private Key: 7
1,499,623,039 UART: [art] Derive CDI
1,499,623,319 UART: [art] Store in in slot 0x4
1,499,709,046 UART: [art] Derive Key Pair
1,499,709,406 UART: [art] Store priv key in slot 0x5
1,499,722,312 UART: [art] Derive Key Pair - Done
1,499,737,236 UART: [art] Signing Cert with AUTHO
1,499,737,716 UART: RITY.KEYID = 7
1,499,752,800 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,753,565 UART: [art] PUB.X = 9423D5C37E41BA52451B117D9623D6648619C618CF0C7FD603CF6F8B99B3854AEE1DA3403EA2ACD8FAF51ED1CD4E653D
1,499,760,343 UART: [art] PUB.Y = 29B9999092B10A0608EE02D1F8299007F9ACE0B441F620C0F28BF7F7AB2A1E53E26AAC3C3200E10AFE94CBF75F3C2B31
1,499,767,265 UART: [art] SIG.R = 990F78A793850EC4D4E8E8A575EDB0BA4B141EF616DC81C7EB818D9271C34CD0EF0122C7AE7613D5E481CC96AC377794
1,499,774,036 UART: [art] SIG.S = 70C8A59CDF1E9CE72469A6C3B79018011C4477C5406C755446069510DD95F63581405364C8C6C337CF5B2D1275FD1C3B
1,499,797,775 UART: Caliptra RT
1,499,798,120 UART: [state] CFI Enabled
1,500,081,693 UART: [rt] RT listening for mailbox commands...
1,500,082,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,523,377 >>> mbox cmd response: success
1,502,536,549 UART:
1,502,536,565 UART: Running Caliptra FMC ...
1,502,536,973 UART:
1,502,537,116 UART: [state] CFI Enabled
1,502,626,023 UART: [art] Extend RT PCRs Done
1,502,626,451 UART: [art] Lock RT PCRs Done
1,502,627,710 UART: [art] Populate DV Done
1,502,636,101 UART: [fht] FMC Alias Private Key: 7
1,502,637,221 UART: [art] Derive CDI
1,502,637,501 UART: [art] Store in in slot 0x4
1,502,723,058 UART: [art] Derive Key Pair
1,502,723,418 UART: [art] Store priv key in slot 0x5
1,502,736,918 UART: [art] Derive Key Pair - Done
1,502,751,628 UART: [art] Signing Cert with AUTHO
1,502,752,108 UART: RITY.KEYID = 7
1,502,767,378 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,768,143 UART: [art] PUB.X = 06306E3B5D4EC974B1BB2E901F8F9516C5A18E8548AF68B6F47F1A05464BE70B87A7D3BFCCD0C3B744ABFC4C190C9675
1,502,774,915 UART: [art] PUB.Y = 50C297EBADBF5E953AAE53669F49C1EA2C8D85814E07A7505B3C224B686F5512BAAC3EA9E3C04604F1DE588DFF72C717
1,502,781,873 UART: [art] SIG.R = 808CBB3FF90CF617E3767E10D55654C183D137ABBDC6F3ABFD36A100EC2ECF873D7B796E8E005B283677B2C448EC69E3
1,502,788,610 UART: [art] SIG.S = 1C51A58A1056343EC079A17D9FE60FEB0FDDB14D63C4D20CC235A0FF81304592B824F03524D96DF3EFE20F2F5C5685DC
1,502,811,991 UART: Caliptra RT
1,502,812,336 UART: [state] CFI Enabled
1,503,094,341 UART: [rt] RT listening for mailbox commands...
1,503,095,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,534,629 >>> mbox cmd response: success
1,505,548,087 UART:
1,505,548,103 UART: Running Caliptra FMC ...
1,505,548,511 UART:
1,505,548,654 UART: [state] CFI Enabled
1,505,637,593 UART: [art] Extend RT PCRs Done
1,505,638,021 UART: [art] Lock RT PCRs Done
1,505,639,328 UART: [art] Populate DV Done
1,505,647,463 UART: [fht] FMC Alias Private Key: 7
1,505,648,393 UART: [art] Derive CDI
1,505,648,673 UART: [art] Store in in slot 0x4
1,505,734,366 UART: [art] Derive Key Pair
1,505,734,726 UART: [art] Store priv key in slot 0x5
1,505,748,032 UART: [art] Derive Key Pair - Done
1,505,762,570 UART: [art] Signing Cert with AUTHO
1,505,763,050 UART: RITY.KEYID = 7
1,505,778,150 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,778,915 UART: [art] PUB.X = 9423D5C37E41BA52451B117D9623D6648619C618CF0C7FD603CF6F8B99B3854AEE1DA3403EA2ACD8FAF51ED1CD4E653D
1,505,785,693 UART: [art] PUB.Y = 29B9999092B10A0608EE02D1F8299007F9ACE0B441F620C0F28BF7F7AB2A1E53E26AAC3C3200E10AFE94CBF75F3C2B31
1,505,792,615 UART: [art] SIG.R = 990F78A793850EC4D4E8E8A575EDB0BA4B141EF616DC81C7EB818D9271C34CD0EF0122C7AE7613D5E481CC96AC377794
1,505,799,386 UART: [art] SIG.S = 70C8A59CDF1E9CE72469A6C3B79018011C4477C5406C755446069510DD95F63581405364C8C6C337CF5B2D1275FD1C3B
1,505,822,839 UART: Caliptra RT
1,505,823,184 UART: [state] CFI Enabled
1,506,106,323 UART: [rt] RT listening for mailbox commands...
1,506,106,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,508,546,929 >>> mbox cmd response: success
1,508,560,293 UART:
1,508,560,309 UART: Running Caliptra FMC ...
1,508,560,717 UART:
1,508,560,860 UART: [state] CFI Enabled
1,508,650,397 UART: [art] Extend RT PCRs Done
1,508,650,825 UART: [art] Lock RT PCRs Done
1,508,651,968 UART: [art] Populate DV Done
1,508,660,099 UART: [fht] FMC Alias Private Key: 7
1,508,661,217 UART: [art] Derive CDI
1,508,661,497 UART: [art] Store in in slot 0x4
1,508,747,058 UART: [art] Derive Key Pair
1,508,747,418 UART: [art] Store priv key in slot 0x5
1,508,759,502 UART: [art] Derive Key Pair - Done
1,508,774,272 UART: [art] Signing Cert with AUTHO
1,508,774,752 UART: RITY.KEYID = 7
1,508,790,242 UART: [art] Erasing AUTHORITY.KEYID = 7
1,508,791,007 UART: [art] PUB.X = 06306E3B5D4EC974B1BB2E901F8F9516C5A18E8548AF68B6F47F1A05464BE70B87A7D3BFCCD0C3B744ABFC4C190C9675
1,508,797,779 UART: [art] PUB.Y = 50C297EBADBF5E953AAE53669F49C1EA2C8D85814E07A7505B3C224B686F5512BAAC3EA9E3C04604F1DE588DFF72C717
1,508,804,737 UART: [art] SIG.R = 808CBB3FF90CF617E3767E10D55654C183D137ABBDC6F3ABFD36A100EC2ECF873D7B796E8E005B283677B2C448EC69E3
1,508,811,474 UART: [art] SIG.S = 1C51A58A1056343EC079A17D9FE60FEB0FDDB14D63C4D20CC235A0FF81304592B824F03524D96DF3EFE20F2F5C5685DC
1,508,835,093 UART: Caliptra RT
1,508,835,438 UART: [state] CFI Enabled
1,509,119,311 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 309.97s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,355,850 UART: [fht] FMC Alias Private Key: 7
1,554,356,894 UART: [art] Derive CDI
1,554,357,174 UART: [art] Store in in slot 0x4
1,554,442,661 UART: [art] Derive Key Pair
1,554,443,021 UART: [art] Store priv key in slot 0x5
1,554,456,227 UART: [art] Derive Key Pair - Done
1,554,471,226 UART: [art] Signing Cert with AUTHO
1,554,471,706 UART: RITY.KEYID = 7
1,554,486,356 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,487,121 UART: [art] PUB.X = 1F0EF5AC292CA0A8FD300FAF1110BDC6D17C2D5A602855E8C3840B0A7CAE1188ED59883783FEFC0EDFBF6174ADFD0C2C
1,554,493,899 UART: [art] PUB.Y = 1E36CF0BF86BF4CF8050621B03EED5164F66CF3672C05D398F0E0D78BDF446C79F4A69DF8507EA139002549C77D30A7D
1,554,500,836 UART: [art] SIG.R = 22AFCC0E4086B1B322975297CA279EA6004186D4093B7C44677B091CE2C77405DE95A0A4FD93218DFE736AB7860AAFE3
1,554,507,573 UART: [art] SIG.S = 6CD87D1705304813AF245341E1167DBF80D6ECE955FC312461E9357218884D2ABCF939CB092C7BD1453FD278D03D905E
1,554,531,568 UART: Caliptra RT
1,554,531,821 UART: [state] CFI Enabled
1,554,816,422 UART: [rt] RT listening for mailbox commands...
1,554,817,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,818,283 UART:
1,554,818,299 UART: Running Caliptra ROM ...
1,554,818,707 UART:
1,554,818,762 UART: [state] CFI Enabled
1,554,821,642 UART: [state] LifecycleState = Unprovisioned
1,554,822,297 UART: [state] DebugLocked = No
1,554,823,011 UART: [state] WD Timer not started. Device not locked for debugging
1,554,824,369 UART: [kat] SHA2-256
1,555,627,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,555,632,048 UART: [kat] ++
1,555,632,200 UART: [kat] sha1
1,555,636,430 UART: [kat] SHA2-256
1,555,638,370 UART: [kat] SHA2-384
1,555,641,101 UART: [kat] SHA2-512-ACC
1,555,643,001 UART: [kat] ECC-384
1,555,652,394 UART: [kat] HMAC-384Kdf
1,555,657,096 UART: [kat] LMS
1,555,905,408 UART: [kat] --
1,555,906,278 UART: [update-reset] ++
1,557,218,916 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,219,993 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,557,369,991 >>> mbox cmd response: success
1,557,370,216 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,378,230 UART: [update-reset Success] --
1,557,379,413 UART: [state] Locking Datavault
1,557,380,075 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,380,679 UART: [state] Locking ICCM
1,557,381,297 UART: [exit] Launching FMC @ 0x40000130
1,557,386,626 UART:
1,557,386,642 UART: Running Caliptra FMC ...
1,557,387,050 UART:
1,557,387,104 UART: [state] CFI Enabled
1,557,476,127 UART: [art] Extend RT PCRs Done
1,557,476,555 UART: [art] Lock RT PCRs Done
1,557,477,668 UART: [art] Populate DV Done
1,557,485,793 UART: [fht] FMC Alias Private Key: 7
1,557,486,967 UART: [art] Derive CDI
1,557,487,247 UART: [art] Store in in slot 0x4
1,557,572,978 UART: [art] Derive Key Pair
1,557,573,338 UART: [art] Store priv key in slot 0x5
1,557,586,528 UART: [art] Derive Key Pair - Done
1,557,601,654 UART: [art] Signing Cert with AUTHO
1,557,602,134 UART: RITY.KEYID = 7
1,557,616,804 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,617,569 UART: [art] PUB.X = FD93F4D3741C137B65999D0B82D434A6C7A90300B54E3AB3591B20EED4D2394A0A84CF46B6114484E357BF6F21645DEB
1,557,624,312 UART: [art] PUB.Y = 3FCBBF8973A2923E4B4B857287D3E657D5AE17DC83B7C8CDFAB14F0D4DC8EB0118ABD5B1E688DCD4C72918BEE3959017
1,557,631,276 UART: [art] SIG.R = C04986944076FB9FE3D0CF31C5B20BEBC3BAC47DFC79B303171898556D2E74CAE2200E6F0F53FA9ABAB07D2812CC6F59
1,557,638,050 UART: [art] SIG.S = 29A223DA315A10C41B610CA9F2B0DF03B094E66EC117CEF5FF6076C672CB378A93E28A0D3E7EBEBC35DF5D6A53DD5773
1,557,661,634 UART: Caliptra RT
1,557,661,887 UART: [state] CFI Enabled
1,557,941,268 UART: [rt] RT listening for mailbox commands...
1,557,941,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,942,755 UART:
1,557,942,771 UART: Running Caliptra ROM ...
1,557,943,179 UART:
1,557,943,234 UART: [state] CFI Enabled
1,557,945,558 UART: [state] LifecycleState = Unprovisioned
1,557,946,213 UART: [state] DebugLocked = No
1,557,946,825 UART: [state] WD Timer not started. Device not locked for debugging
1,557,948,019 UART: [kat] SHA2-256
1,558,751,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,558,755,698 UART: [kat] ++
1,558,755,850 UART: [kat] sha1
1,558,760,246 UART: [kat] SHA2-256
1,558,762,186 UART: [kat] SHA2-384
1,558,764,821 UART: [kat] SHA2-512-ACC
1,558,766,721 UART: [kat] ECC-384
1,558,776,710 UART: [kat] HMAC-384Kdf
1,558,781,386 UART: [kat] LMS
1,559,029,698 UART: [kat] --
1,559,030,464 UART: [update-reset] ++
1,560,343,390 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,344,463 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,560,494,461 >>> mbox cmd response: success
1,560,494,586 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,502,600 UART: [update-reset Success] --
1,560,503,761 UART: [state] Locking Datavault
1,560,504,487 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,505,091 UART: [state] Locking ICCM
1,560,505,579 UART: [exit] Launching FMC @ 0x40000130
1,560,510,908 UART:
1,560,510,924 UART: Running Caliptra FMC ...
1,560,511,332 UART:
1,560,511,386 UART: [state] CFI Enabled
1,560,600,157 UART: [art] Extend RT PCRs Done
1,560,600,585 UART: [art] Lock RT PCRs Done
1,560,601,778 UART: [art] Populate DV Done
1,560,609,925 UART: [fht] FMC Alias Private Key: 7
1,560,610,935 UART: [art] Derive CDI
1,560,611,215 UART: [art] Store in in slot 0x4
1,560,696,866 UART: [art] Derive Key Pair
1,560,697,226 UART: [art] Store priv key in slot 0x5
1,560,711,074 UART: [art] Derive Key Pair - Done
1,560,725,943 UART: [art] Signing Cert with AUTHO
1,560,726,423 UART: RITY.KEYID = 7
1,560,741,441 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,742,206 UART: [art] PUB.X = 1F0EF5AC292CA0A8FD300FAF1110BDC6D17C2D5A602855E8C3840B0A7CAE1188ED59883783FEFC0EDFBF6174ADFD0C2C
1,560,748,984 UART: [art] PUB.Y = 1E36CF0BF86BF4CF8050621B03EED5164F66CF3672C05D398F0E0D78BDF446C79F4A69DF8507EA139002549C77D30A7D
1,560,755,921 UART: [art] SIG.R = 22AFCC0E4086B1B322975297CA279EA6004186D4093B7C44677B091CE2C77405DE95A0A4FD93218DFE736AB7860AAFE3
1,560,762,658 UART: [art] SIG.S = 6CD87D1705304813AF245341E1167DBF80D6ECE955FC312461E9357218884D2ABCF939CB092C7BD1453FD278D03D905E
1,560,786,617 UART: Caliptra RT
1,560,786,870 UART: [state] CFI Enabled
1,561,066,697 UART: [rt] RT listening for mailbox commands...
1,561,067,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,068,510 UART:
1,561,068,526 UART: Running Caliptra ROM ...
1,561,068,934 UART:
1,561,068,989 UART: [state] CFI Enabled
1,561,071,273 UART: [state] LifecycleState = Unprovisioned
1,561,071,928 UART: [state] DebugLocked = No
1,561,072,550 UART: [state] WD Timer not started. Device not locked for debugging
1,561,073,832 UART: [kat] SHA2-256
1,561,877,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,881,511 UART: [kat] ++
1,561,881,663 UART: [kat] sha1
1,561,885,899 UART: [kat] SHA2-256
1,561,887,839 UART: [kat] SHA2-384
1,561,890,430 UART: [kat] SHA2-512-ACC
1,561,892,330 UART: [kat] ECC-384
1,561,902,233 UART: [kat] HMAC-384Kdf
1,561,906,845 UART: [kat] LMS
1,562,155,157 UART: [kat] --
1,562,155,673 UART: [update-reset] ++
1,563,469,559 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,470,552 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,563,620,550 >>> mbox cmd response: success
1,563,620,715 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,628,729 UART: [update-reset Success] --
1,563,629,742 UART: [state] Locking Datavault
1,563,630,594 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,631,198 UART: [state] Locking ICCM
1,563,631,674 UART: [exit] Launching FMC @ 0x40000130
1,563,637,003 UART:
1,563,637,019 UART: Running Caliptra FMC ...
1,563,637,427 UART:
1,563,637,481 UART: [state] CFI Enabled
1,563,726,982 UART: [art] Extend RT PCRs Done
1,563,727,410 UART: [art] Lock RT PCRs Done
1,563,728,597 UART: [art] Populate DV Done
1,563,736,830 UART: [fht] FMC Alias Private Key: 7
1,563,737,858 UART: [art] Derive CDI
1,563,738,138 UART: [art] Store in in slot 0x4
1,563,823,311 UART: [art] Derive Key Pair
1,563,823,671 UART: [art] Store priv key in slot 0x5
1,563,837,583 UART: [art] Derive Key Pair - Done
1,563,852,413 UART: [art] Signing Cert with AUTHO
1,563,852,893 UART: RITY.KEYID = 7
1,563,868,361 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,869,126 UART: [art] PUB.X = FD93F4D3741C137B65999D0B82D434A6C7A90300B54E3AB3591B20EED4D2394A0A84CF46B6114484E357BF6F21645DEB
1,563,875,869 UART: [art] PUB.Y = 3FCBBF8973A2923E4B4B857287D3E657D5AE17DC83B7C8CDFAB14F0D4DC8EB0118ABD5B1E688DCD4C72918BEE3959017
1,563,882,833 UART: [art] SIG.R = C04986944076FB9FE3D0CF31C5B20BEBC3BAC47DFC79B303171898556D2E74CAE2200E6F0F53FA9ABAB07D2812CC6F59
1,563,889,607 UART: [art] SIG.S = 29A223DA315A10C41B610CA9F2B0DF03B094E66EC117CEF5FF6076C672CB378A93E28A0D3E7EBEBC35DF5D6A53DD5773
1,563,913,457 UART: Caliptra RT
1,563,913,710 UART: [state] CFI Enabled
1,564,191,237 UART: [rt] RT listening for mailbox commands...
1,564,191,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,192,720 UART:
1,564,192,736 UART: Running Caliptra ROM ...
1,564,193,144 UART:
1,564,193,199 UART: [state] CFI Enabled
1,564,195,707 UART: [state] LifecycleState = Unprovisioned
1,564,196,362 UART: [state] DebugLocked = No
1,564,197,086 UART: [state] WD Timer not started. Device not locked for debugging
1,564,198,240 UART: [kat] SHA2-256
1,565,001,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,565,005,919 UART: [kat] ++
1,565,006,071 UART: [kat] sha1
1,565,010,131 UART: [kat] SHA2-256
1,565,012,071 UART: [kat] SHA2-384
1,565,014,836 UART: [kat] SHA2-512-ACC
1,565,016,736 UART: [kat] ECC-384
1,565,026,653 UART: [kat] HMAC-384Kdf
1,565,031,247 UART: [kat] LMS
1,565,279,559 UART: [kat] --
1,565,280,641 UART: [update-reset] ++
1,566,594,023 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,595,148 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,566,745,146 >>> mbox cmd response: success
1,566,745,489 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,753,503 UART: [update-reset Success] --
1,566,754,350 UART: [state] Locking Datavault
1,566,755,032 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,755,636 UART: [state] Locking ICCM
1,566,756,262 UART: [exit] Launching FMC @ 0x40000130
1,566,761,591 UART:
1,566,761,607 UART: Running Caliptra FMC ...
1,566,762,015 UART:
1,566,762,069 UART: [state] CFI Enabled
1,566,850,824 UART: [art] Extend RT PCRs Done
1,566,851,252 UART: [art] Lock RT PCRs Done
1,566,852,545 UART: [art] Populate DV Done
1,566,860,452 UART: [fht] FMC Alias Private Key: 7
1,566,861,494 UART: [art] Derive CDI
1,566,861,774 UART: [art] Store in in slot 0x4
1,566,947,369 UART: [art] Derive Key Pair
1,566,947,729 UART: [art] Store priv key in slot 0x5
1,566,961,063 UART: [art] Derive Key Pair - Done
1,566,975,892 UART: [art] Signing Cert with AUTHO
1,566,976,372 UART: RITY.KEYID = 7
1,566,991,492 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,992,257 UART: [art] PUB.X = 1F0EF5AC292CA0A8FD300FAF1110BDC6D17C2D5A602855E8C3840B0A7CAE1188ED59883783FEFC0EDFBF6174ADFD0C2C
1,566,999,035 UART: [art] PUB.Y = 1E36CF0BF86BF4CF8050621B03EED5164F66CF3672C05D398F0E0D78BDF446C79F4A69DF8507EA139002549C77D30A7D
1,567,005,972 UART: [art] SIG.R = 22AFCC0E4086B1B322975297CA279EA6004186D4093B7C44677B091CE2C77405DE95A0A4FD93218DFE736AB7860AAFE3
1,567,012,709 UART: [art] SIG.S = 6CD87D1705304813AF245341E1167DBF80D6ECE955FC312461E9357218884D2ABCF939CB092C7BD1453FD278D03D905E
1,567,035,964 UART: Caliptra RT
1,567,036,217 UART: [state] CFI Enabled
1,567,314,998 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 316.05s
Truncated 733352 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,734,130 >>> mbox cmd response: success
1,484,747,736 UART:
1,484,747,752 UART: Running Caliptra FMC ...
1,484,748,160 UART:
1,484,748,214 UART: [state] CFI Enabled
1,484,837,423 UART: [art] Extend RT PCRs Done
1,484,837,851 UART: [art] Lock RT PCRs Done
1,484,839,024 UART: [art] Populate DV Done
1,484,847,143 UART: [fht] FMC Alias Private Key: 7
1,484,848,273 UART: [art] Derive CDI
1,484,848,553 UART: [art] Store in in slot 0x4
1,484,934,286 UART: [art] Derive Key Pair
1,484,934,646 UART: [art] Store priv key in slot 0x5
1,484,947,528 UART: [art] Derive Key Pair - Done
1,484,962,586 UART: [art] Signing Cert with AUTHO
1,484,963,066 UART: RITY.KEYID = 7
1,484,978,338 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,979,103 UART: [art] PUB.X = 766F5F2F329FECF4CD649BD68EEB011750F8631EF0FFA3603A7DE7BC64DA103B8EC45193DCBF9B7EF4EC681C9AA0F725
1,484,985,894 UART: [art] PUB.Y = AC0AAD57302EC4562440C3E577EF7468BD6086A9E650772B88F16A14C97305DAAE0823A824C1B672CBF5D796ECCF4D15
1,484,992,843 UART: [art] SIG.R = 888D1C6C24C87430C23E4E31F7CDA73BA768B733E080394BEBF5B1537ACAD92FF0DC8D97FAC3BF428B96F6B240E68853
1,484,999,627 UART: [art] SIG.S = 623DA84793EC96C76E930B5FE501E46EBA768967EF1770CE56B5C71133EADB09A4CCEED13B9172FE93B5D8F5ED095670
1,485,023,412 UART: Caliptra RT
1,485,023,665 UART: [state] CFI Enabled
1,485,305,630 UART: [rt] RT listening for mailbox commands...
1,485,306,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,740,738 >>> mbox cmd response: success
1,487,754,062 UART:
1,487,754,078 UART: Running Caliptra FMC ...
1,487,754,486 UART:
1,487,754,540 UART: [state] CFI Enabled
1,487,843,703 UART: [art] Extend RT PCRs Done
1,487,844,131 UART: [art] Lock RT PCRs Done
1,487,845,418 UART: [art] Populate DV Done
1,487,853,667 UART: [fht] FMC Alias Private Key: 7
1,487,854,669 UART: [art] Derive CDI
1,487,854,949 UART: [art] Store in in slot 0x4
1,487,940,482 UART: [art] Derive Key Pair
1,487,940,842 UART: [art] Store priv key in slot 0x5
1,487,953,742 UART: [art] Derive Key Pair - Done
1,487,968,500 UART: [art] Signing Cert with AUTHO
1,487,968,980 UART: RITY.KEYID = 7
1,487,984,114 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,984,879 UART: [art] PUB.X = 676317A4D484A5A4648E4C9E7B66CE7E98C8FFFF076637EAF5FD17E17A082855B2C66B4B028C6F0984CC134354983BCC
1,487,991,643 UART: [art] PUB.Y = 25D75D046B3DFEB65BAC735EBDA13E19871232A4FFB245C8F03AF557BCCE9DEAE88A631FF1CAAA3EE3D0BDC57CF4A182
1,487,998,622 UART: [art] SIG.R = C53CC3335F18C8941F7B580212F48A836315BD8A08D92A145B3ADF864B3CB476ACC657C93C2E51BCE088DFAC252B8DC1
1,488,005,398 UART: [art] SIG.S = 58244E73B4AA1318CD82FA6CBDF1F7C931DF23BA4C83303A02D91C2B791B64671150744D7EA2E695D00F911524F637E7
1,488,029,485 UART: Caliptra RT
1,488,029,738 UART: [state] CFI Enabled
1,488,308,391 UART: [rt] RT listening for mailbox commands...
1,488,309,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,743,799 >>> mbox cmd response: success
1,490,757,215 UART:
1,490,757,231 UART: Running Caliptra FMC ...
1,490,757,639 UART:
1,490,757,693 UART: [state] CFI Enabled
1,490,847,070 UART: [art] Extend RT PCRs Done
1,490,847,498 UART: [art] Lock RT PCRs Done
1,490,848,839 UART: [art] Populate DV Done
1,490,856,980 UART: [fht] FMC Alias Private Key: 7
1,490,858,068 UART: [art] Derive CDI
1,490,858,348 UART: [art] Store in in slot 0x4
1,490,944,105 UART: [art] Derive Key Pair
1,490,944,465 UART: [art] Store priv key in slot 0x5
1,490,958,083 UART: [art] Derive Key Pair - Done
1,490,972,973 UART: [art] Signing Cert with AUTHO
1,490,973,453 UART: RITY.KEYID = 7
1,490,988,559 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,989,324 UART: [art] PUB.X = 766F5F2F329FECF4CD649BD68EEB011750F8631EF0FFA3603A7DE7BC64DA103B8EC45193DCBF9B7EF4EC681C9AA0F725
1,490,996,115 UART: [art] PUB.Y = AC0AAD57302EC4562440C3E577EF7468BD6086A9E650772B88F16A14C97305DAAE0823A824C1B672CBF5D796ECCF4D15
1,491,003,064 UART: [art] SIG.R = 888D1C6C24C87430C23E4E31F7CDA73BA768B733E080394BEBF5B1537ACAD92FF0DC8D97FAC3BF428B96F6B240E68853
1,491,009,848 UART: [art] SIG.S = 623DA84793EC96C76E930B5FE501E46EBA768967EF1770CE56B5C71133EADB09A4CCEED13B9172FE93B5D8F5ED095670
1,491,033,767 UART: Caliptra RT
1,491,034,020 UART: [state] CFI Enabled
1,491,318,083 UART: [rt] RT listening for mailbox commands...
1,491,318,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,752,849 >>> mbox cmd response: success
1,493,766,327 UART:
1,493,766,343 UART: Running Caliptra FMC ...
1,493,766,751 UART:
1,493,766,805 UART: [state] CFI Enabled
1,493,855,892 UART: [art] Extend RT PCRs Done
1,493,856,320 UART: [art] Lock RT PCRs Done
1,493,857,475 UART: [art] Populate DV Done
1,493,865,760 UART: [fht] FMC Alias Private Key: 7
1,493,866,908 UART: [art] Derive CDI
1,493,867,188 UART: [art] Store in in slot 0x4
1,493,952,795 UART: [art] Derive Key Pair
1,493,953,155 UART: [art] Store priv key in slot 0x5
1,493,966,623 UART: [art] Derive Key Pair - Done
1,493,981,785 UART: [art] Signing Cert with AUTHO
1,493,982,265 UART: RITY.KEYID = 7
1,493,997,789 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,998,554 UART: [art] PUB.X = 676317A4D484A5A4648E4C9E7B66CE7E98C8FFFF076637EAF5FD17E17A082855B2C66B4B028C6F0984CC134354983BCC
1,494,005,318 UART: [art] PUB.Y = 25D75D046B3DFEB65BAC735EBDA13E19871232A4FFB245C8F03AF557BCCE9DEAE88A631FF1CAAA3EE3D0BDC57CF4A182
1,494,012,297 UART: [art] SIG.R = C53CC3335F18C8941F7B580212F48A836315BD8A08D92A145B3ADF864B3CB476ACC657C93C2E51BCE088DFAC252B8DC1
1,494,019,073 UART: [art] SIG.S = 58244E73B4AA1318CD82FA6CBDF1F7C931DF23BA4C83303A02D91C2B791B64671150744D7EA2E695D00F911524F637E7
1,494,042,702 UART: Caliptra RT
1,494,042,955 UART: [state] CFI Enabled
1,494,324,462 UART: [rt] RT listening for mailbox commands...
1,494,325,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,760,828 >>> mbox cmd response: success
1,496,774,064 UART:
1,496,774,080 UART: Running Caliptra FMC ...
1,496,774,488 UART:
1,496,774,542 UART: [state] CFI Enabled
1,496,863,375 UART: [art] Extend RT PCRs Done
1,496,863,803 UART: [art] Lock RT PCRs Done
1,496,865,130 UART: [art] Populate DV Done
1,496,873,239 UART: [fht] FMC Alias Private Key: 7
1,496,874,261 UART: [art] Derive CDI
1,496,874,541 UART: [art] Store in in slot 0x4
1,496,959,876 UART: [art] Derive Key Pair
1,496,960,236 UART: [art] Store priv key in slot 0x5
1,496,973,188 UART: [art] Derive Key Pair - Done
1,496,987,962 UART: [art] Signing Cert with AUTHO
1,496,988,442 UART: RITY.KEYID = 7
1,497,003,412 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,004,177 UART: [art] PUB.X = 766F5F2F329FECF4CD649BD68EEB011750F8631EF0FFA3603A7DE7BC64DA103B8EC45193DCBF9B7EF4EC681C9AA0F725
1,497,010,968 UART: [art] PUB.Y = AC0AAD57302EC4562440C3E577EF7468BD6086A9E650772B88F16A14C97305DAAE0823A824C1B672CBF5D796ECCF4D15
1,497,017,917 UART: [art] SIG.R = 888D1C6C24C87430C23E4E31F7CDA73BA768B733E080394BEBF5B1537ACAD92FF0DC8D97FAC3BF428B96F6B240E68853
1,497,024,701 UART: [art] SIG.S = 623DA84793EC96C76E930B5FE501E46EBA768967EF1770CE56B5C71133EADB09A4CCEED13B9172FE93B5D8F5ED095670
1,497,048,342 UART: Caliptra RT
1,497,048,595 UART: [state] CFI Enabled
1,497,328,608 UART: [rt] RT listening for mailbox commands...
1,497,329,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,765,500 >>> mbox cmd response: success
1,499,778,744 UART:
1,499,778,760 UART: Running Caliptra FMC ...
1,499,779,168 UART:
1,499,779,222 UART: [state] CFI Enabled
1,499,868,761 UART: [art] Extend RT PCRs Done
1,499,869,189 UART: [art] Lock RT PCRs Done
1,499,870,696 UART: [art] Populate DV Done
1,499,878,869 UART: [fht] FMC Alias Private Key: 7
1,499,879,865 UART: [art] Derive CDI
1,499,880,145 UART: [art] Store in in slot 0x4
1,499,965,824 UART: [art] Derive Key Pair
1,499,966,184 UART: [art] Store priv key in slot 0x5
1,499,979,534 UART: [art] Derive Key Pair - Done
1,499,994,276 UART: [art] Signing Cert with AUTHO
1,499,994,756 UART: RITY.KEYID = 7
1,500,009,662 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,010,427 UART: [art] PUB.X = 676317A4D484A5A4648E4C9E7B66CE7E98C8FFFF076637EAF5FD17E17A082855B2C66B4B028C6F0984CC134354983BCC
1,500,017,191 UART: [art] PUB.Y = 25D75D046B3DFEB65BAC735EBDA13E19871232A4FFB245C8F03AF557BCCE9DEAE88A631FF1CAAA3EE3D0BDC57CF4A182
1,500,024,170 UART: [art] SIG.R = C53CC3335F18C8941F7B580212F48A836315BD8A08D92A145B3ADF864B3CB476ACC657C93C2E51BCE088DFAC252B8DC1
1,500,030,946 UART: [art] SIG.S = 58244E73B4AA1318CD82FA6CBDF1F7C931DF23BA4C83303A02D91C2B791B64671150744D7EA2E695D00F911524F637E7
1,500,054,199 UART: Caliptra RT
1,500,054,452 UART: [state] CFI Enabled
1,500,339,043 UART: [rt] RT listening for mailbox commands...
1,500,339,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,775,163 >>> mbox cmd response: success
1,502,788,611 UART:
1,502,788,627 UART: Running Caliptra FMC ...
1,502,789,035 UART:
1,502,789,089 UART: [state] CFI Enabled
1,502,878,568 UART: [art] Extend RT PCRs Done
1,502,878,996 UART: [art] Lock RT PCRs Done
1,502,880,187 UART: [art] Populate DV Done
1,502,888,212 UART: [fht] FMC Alias Private Key: 7
1,502,889,374 UART: [art] Derive CDI
1,502,889,654 UART: [art] Store in in slot 0x4
1,502,975,425 UART: [art] Derive Key Pair
1,502,975,785 UART: [art] Store priv key in slot 0x5
1,502,989,067 UART: [art] Derive Key Pair - Done
1,503,003,723 UART: [art] Signing Cert with AUTHO
1,503,004,203 UART: RITY.KEYID = 7
1,503,019,225 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,019,990 UART: [art] PUB.X = 766F5F2F329FECF4CD649BD68EEB011750F8631EF0FFA3603A7DE7BC64DA103B8EC45193DCBF9B7EF4EC681C9AA0F725
1,503,026,781 UART: [art] PUB.Y = AC0AAD57302EC4562440C3E577EF7468BD6086A9E650772B88F16A14C97305DAAE0823A824C1B672CBF5D796ECCF4D15
1,503,033,730 UART: [art] SIG.R = 888D1C6C24C87430C23E4E31F7CDA73BA768B733E080394BEBF5B1537ACAD92FF0DC8D97FAC3BF428B96F6B240E68853
1,503,040,514 UART: [art] SIG.S = 623DA84793EC96C76E930B5FE501E46EBA768967EF1770CE56B5C71133EADB09A4CCEED13B9172FE93B5D8F5ED095670
1,503,064,307 UART: Caliptra RT
1,503,064,560 UART: [state] CFI Enabled
1,503,346,453 UART: [rt] RT listening for mailbox commands...
1,503,347,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,781,739 >>> mbox cmd response: success
1,505,794,827 UART:
1,505,794,843 UART: Running Caliptra FMC ...
1,505,795,251 UART:
1,505,795,305 UART: [state] CFI Enabled
1,505,884,156 UART: [art] Extend RT PCRs Done
1,505,884,584 UART: [art] Lock RT PCRs Done
1,505,885,985 UART: [art] Populate DV Done
1,505,894,324 UART: [fht] FMC Alias Private Key: 7
1,505,895,296 UART: [art] Derive CDI
1,505,895,576 UART: [art] Store in in slot 0x4
1,505,981,175 UART: [art] Derive Key Pair
1,505,981,535 UART: [art] Store priv key in slot 0x5
1,505,994,785 UART: [art] Derive Key Pair - Done
1,506,009,431 UART: [art] Signing Cert with AUTHO
1,506,009,911 UART: RITY.KEYID = 7
1,506,024,803 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,025,568 UART: [art] PUB.X = 676317A4D484A5A4648E4C9E7B66CE7E98C8FFFF076637EAF5FD17E17A082855B2C66B4B028C6F0984CC134354983BCC
1,506,032,332 UART: [art] PUB.Y = 25D75D046B3DFEB65BAC735EBDA13E19871232A4FFB245C8F03AF557BCCE9DEAE88A631FF1CAAA3EE3D0BDC57CF4A182
1,506,039,311 UART: [art] SIG.R = C53CC3335F18C8941F7B580212F48A836315BD8A08D92A145B3ADF864B3CB476ACC657C93C2E51BCE088DFAC252B8DC1
1,506,046,087 UART: [art] SIG.S = 58244E73B4AA1318CD82FA6CBDF1F7C931DF23BA4C83303A02D91C2B791B64671150744D7EA2E695D00F911524F637E7
1,506,069,954 UART: Caliptra RT
1,506,070,207 UART: [state] CFI Enabled
1,506,357,516 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 305.07s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,835,137 UART: [fht] FMC Alias Private Key: 7
1,554,836,145 UART: [art] Derive CDI
1,554,836,425 UART: [art] Store in in slot 0x4
1,554,921,780 UART: [art] Derive Key Pair
1,554,922,140 UART: [art] Store priv key in slot 0x5
1,554,935,294 UART: [art] Derive Key Pair - Done
1,554,950,088 UART: [art] Signing Cert with AUTHO
1,554,950,568 UART: RITY.KEYID = 7
1,554,965,532 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,966,297 UART: [art] PUB.X = C5A028F996302C60374B87F3D6F8B46442FB8D88A25B081840211FC4C8851606C71F96CA1B0D6A28715AF95746B822AE
1,554,973,054 UART: [art] PUB.Y = 6A4F4510112A0039C625E7B8ADA98669F051F93D900E809965D06A0BA026603E16F7BAE76DCC67967F3560DBF1BD0999
1,554,979,973 UART: [art] SIG.R = A428A6A5777D3D975079F54DB2046175C216EAF596D3AA9EE30C18CCE7F0C55FB30BDD89A6A8872ADE403A0913C145AF
1,554,986,743 UART: [art] SIG.S = 7F1BFDF47E10990F91BCCF9B9C74ADF096DD9C18D806E1C31418184B048FF267B10560FC81FF1044C1FD98CD6F2B9D13
1,555,009,858 UART: Caliptra RT
1,555,010,203 UART: [state] CFI Enabled
1,555,292,906 UART: [rt] RT listening for mailbox commands...
1,555,293,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,294,485 UART:
1,555,294,501 UART: Running Caliptra ROM ...
1,555,294,909 UART:
1,555,295,051 UART: [state] CFI Enabled
1,555,297,905 UART: [state] LifecycleState = Unprovisioned
1,555,298,560 UART: [state] DebugLocked = No
1,555,299,166 UART: [state] WD Timer not started. Device not locked for debugging
1,555,300,290 UART: [kat] SHA2-256
1,556,103,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,556,107,969 UART: [kat] ++
1,556,108,121 UART: [kat] sha1
1,556,112,479 UART: [kat] SHA2-256
1,556,114,419 UART: [kat] SHA2-384
1,556,117,178 UART: [kat] SHA2-512-ACC
1,556,119,078 UART: [kat] ECC-384
1,556,129,097 UART: [kat] HMAC-384Kdf
1,556,133,923 UART: [kat] LMS
1,556,382,235 UART: [kat] --
1,556,383,043 UART: [update-reset] ++
1,557,696,223 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,697,380 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,557,847,378 >>> mbox cmd response: success
1,557,847,701 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,855,715 UART: [update-reset Success] --
1,557,856,600 UART: [state] Locking Datavault
1,557,857,454 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,858,058 UART: [state] Locking ICCM
1,557,858,720 UART: [exit] Launching FMC @ 0x40000130
1,557,864,049 UART:
1,557,864,065 UART: Running Caliptra FMC ...
1,557,864,473 UART:
1,557,864,616 UART: [state] CFI Enabled
1,557,953,643 UART: [art] Extend RT PCRs Done
1,557,954,071 UART: [art] Lock RT PCRs Done
1,557,955,436 UART: [art] Populate DV Done
1,557,963,951 UART: [fht] FMC Alias Private Key: 7
1,557,965,011 UART: [art] Derive CDI
1,557,965,291 UART: [art] Store in in slot 0x4
1,558,051,070 UART: [art] Derive Key Pair
1,558,051,430 UART: [art] Store priv key in slot 0x5
1,558,064,958 UART: [art] Derive Key Pair - Done
1,558,079,914 UART: [art] Signing Cert with AUTHO
1,558,080,394 UART: RITY.KEYID = 7
1,558,095,118 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,095,883 UART: [art] PUB.X = C6A0BC4DF10C6AB0741A43A91382B63B45CBAC207D220FFD571D1132E0E89AC93ACECE3BEAEB2292E311123B18FE4954
1,558,102,665 UART: [art] PUB.Y = D6EE6168CDC8D309504257A8930C4293C44734594356816D610C45CBE6B9A605E0BED0D0B35D34D70C1FC6F2AA1F8060
1,558,109,602 UART: [art] SIG.R = 5F8A3DF22AEDEE813CDCD2AA175FD9D13A3DA7D0A71F8EBD993951B22FC916B532579CACB7BB6DA2EE1F77449B6E4591
1,558,116,398 UART: [art] SIG.S = 4FDFDCB26BF0AA77A18C093B7A731069444B1CAD1DC30FD43866488BF2FA9FEB327D0E5136970EA917B9B25D926ADB61
1,558,139,711 UART: Caliptra RT
1,558,140,056 UART: [state] CFI Enabled
1,558,423,245 UART: [rt] RT listening for mailbox commands...
1,558,423,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,424,942 UART:
1,558,424,958 UART: Running Caliptra ROM ...
1,558,425,366 UART:
1,558,425,508 UART: [state] CFI Enabled
1,558,428,512 UART: [state] LifecycleState = Unprovisioned
1,558,429,167 UART: [state] DebugLocked = No
1,558,429,893 UART: [state] WD Timer not started. Device not locked for debugging
1,558,431,097 UART: [kat] SHA2-256
1,559,234,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,559,238,776 UART: [kat] ++
1,559,238,928 UART: [kat] sha1
1,559,243,068 UART: [kat] SHA2-256
1,559,245,008 UART: [kat] SHA2-384
1,559,247,795 UART: [kat] SHA2-512-ACC
1,559,249,695 UART: [kat] ECC-384
1,559,259,380 UART: [kat] HMAC-384Kdf
1,559,264,120 UART: [kat] LMS
1,559,512,432 UART: [kat] --
1,559,513,070 UART: [update-reset] ++
1,560,828,092 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,829,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,560,979,135 >>> mbox cmd response: success
1,560,979,324 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,987,338 UART: [update-reset Success] --
1,560,988,081 UART: [state] Locking Datavault
1,560,988,983 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,989,587 UART: [state] Locking ICCM
1,560,990,071 UART: [exit] Launching FMC @ 0x40000130
1,560,995,400 UART:
1,560,995,416 UART: Running Caliptra FMC ...
1,560,995,824 UART:
1,560,995,967 UART: [state] CFI Enabled
1,561,084,656 UART: [art] Extend RT PCRs Done
1,561,085,084 UART: [art] Lock RT PCRs Done
1,561,086,223 UART: [art] Populate DV Done
1,561,094,414 UART: [fht] FMC Alias Private Key: 7
1,561,095,584 UART: [art] Derive CDI
1,561,095,864 UART: [art] Store in in slot 0x4
1,561,181,621 UART: [art] Derive Key Pair
1,561,181,981 UART: [art] Store priv key in slot 0x5
1,561,195,321 UART: [art] Derive Key Pair - Done
1,561,210,015 UART: [art] Signing Cert with AUTHO
1,561,210,495 UART: RITY.KEYID = 7
1,561,225,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,226,252 UART: [art] PUB.X = C5A028F996302C60374B87F3D6F8B46442FB8D88A25B081840211FC4C8851606C71F96CA1B0D6A28715AF95746B822AE
1,561,233,009 UART: [art] PUB.Y = 6A4F4510112A0039C625E7B8ADA98669F051F93D900E809965D06A0BA026603E16F7BAE76DCC67967F3560DBF1BD0999
1,561,239,928 UART: [art] SIG.R = A428A6A5777D3D975079F54DB2046175C216EAF596D3AA9EE30C18CCE7F0C55FB30BDD89A6A8872ADE403A0913C145AF
1,561,246,698 UART: [art] SIG.S = 7F1BFDF47E10990F91BCCF9B9C74ADF096DD9C18D806E1C31418184B048FF267B10560FC81FF1044C1FD98CD6F2B9D13
1,561,270,575 UART: Caliptra RT
1,561,270,920 UART: [state] CFI Enabled
1,561,555,083 UART: [rt] RT listening for mailbox commands...
1,561,555,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,557,080 UART:
1,561,557,096 UART: Running Caliptra ROM ...
1,561,557,504 UART:
1,561,557,646 UART: [state] CFI Enabled
1,561,560,700 UART: [state] LifecycleState = Unprovisioned
1,561,561,355 UART: [state] DebugLocked = No
1,561,561,943 UART: [state] WD Timer not started. Device not locked for debugging
1,561,563,237 UART: [kat] SHA2-256
1,562,366,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,562,370,916 UART: [kat] ++
1,562,371,068 UART: [kat] sha1
1,562,375,274 UART: [kat] SHA2-256
1,562,377,214 UART: [kat] SHA2-384
1,562,379,957 UART: [kat] SHA2-512-ACC
1,562,381,857 UART: [kat] ECC-384
1,562,391,266 UART: [kat] HMAC-384Kdf
1,562,396,058 UART: [kat] LMS
1,562,644,370 UART: [kat] --
1,562,645,226 UART: [update-reset] ++
1,563,959,110 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,960,153 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,564,110,151 >>> mbox cmd response: success
1,564,110,480 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,118,494 UART: [update-reset Success] --
1,564,119,391 UART: [state] Locking Datavault
1,564,120,125 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,120,729 UART: [state] Locking ICCM
1,564,121,275 UART: [exit] Launching FMC @ 0x40000130
1,564,126,604 UART:
1,564,126,620 UART: Running Caliptra FMC ...
1,564,127,028 UART:
1,564,127,171 UART: [state] CFI Enabled
1,564,216,140 UART: [art] Extend RT PCRs Done
1,564,216,568 UART: [art] Lock RT PCRs Done
1,564,217,757 UART: [art] Populate DV Done
1,564,225,974 UART: [fht] FMC Alias Private Key: 7
1,564,227,028 UART: [art] Derive CDI
1,564,227,308 UART: [art] Store in in slot 0x4
1,564,312,949 UART: [art] Derive Key Pair
1,564,313,309 UART: [art] Store priv key in slot 0x5
1,564,326,423 UART: [art] Derive Key Pair - Done
1,564,341,123 UART: [art] Signing Cert with AUTHO
1,564,341,603 UART: RITY.KEYID = 7
1,564,356,499 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,357,264 UART: [art] PUB.X = C6A0BC4DF10C6AB0741A43A91382B63B45CBAC207D220FFD571D1132E0E89AC93ACECE3BEAEB2292E311123B18FE4954
1,564,364,046 UART: [art] PUB.Y = D6EE6168CDC8D309504257A8930C4293C44734594356816D610C45CBE6B9A605E0BED0D0B35D34D70C1FC6F2AA1F8060
1,564,370,983 UART: [art] SIG.R = 5F8A3DF22AEDEE813CDCD2AA175FD9D13A3DA7D0A71F8EBD993951B22FC916B532579CACB7BB6DA2EE1F77449B6E4591
1,564,377,779 UART: [art] SIG.S = 4FDFDCB26BF0AA77A18C093B7A731069444B1CAD1DC30FD43866488BF2FA9FEB327D0E5136970EA917B9B25D926ADB61
1,564,401,726 UART: Caliptra RT
1,564,402,071 UART: [state] CFI Enabled
1,564,683,390 UART: [rt] RT listening for mailbox commands...
1,564,684,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,684,991 UART:
1,564,685,007 UART: Running Caliptra ROM ...
1,564,685,415 UART:
1,564,685,557 UART: [state] CFI Enabled
1,564,688,181 UART: [state] LifecycleState = Unprovisioned
1,564,688,836 UART: [state] DebugLocked = No
1,564,689,370 UART: [state] WD Timer not started. Device not locked for debugging
1,564,690,584 UART: [kat] SHA2-256
1,565,494,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,565,498,263 UART: [kat] ++
1,565,498,415 UART: [kat] sha1
1,565,502,513 UART: [kat] SHA2-256
1,565,504,453 UART: [kat] SHA2-384
1,565,507,264 UART: [kat] SHA2-512-ACC
1,565,509,164 UART: [kat] ECC-384
1,565,518,561 UART: [kat] HMAC-384Kdf
1,565,523,237 UART: [kat] LMS
1,565,771,549 UART: [kat] --
1,565,772,373 UART: [update-reset] ++
1,567,085,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,086,614 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,567,236,612 >>> mbox cmd response: success
1,567,236,743 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,244,757 UART: [update-reset Success] --
1,567,245,650 UART: [state] Locking Datavault
1,567,246,308 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,246,912 UART: [state] Locking ICCM
1,567,247,348 UART: [exit] Launching FMC @ 0x40000130
1,567,252,677 UART:
1,567,252,693 UART: Running Caliptra FMC ...
1,567,253,101 UART:
1,567,253,244 UART: [state] CFI Enabled
1,567,342,739 UART: [art] Extend RT PCRs Done
1,567,343,167 UART: [art] Lock RT PCRs Done
1,567,344,138 UART: [art] Populate DV Done
1,567,352,315 UART: [fht] FMC Alias Private Key: 7
1,567,353,413 UART: [art] Derive CDI
1,567,353,693 UART: [art] Store in in slot 0x4
1,567,439,080 UART: [art] Derive Key Pair
1,567,439,440 UART: [art] Store priv key in slot 0x5
1,567,453,262 UART: [art] Derive Key Pair - Done
1,567,467,982 UART: [art] Signing Cert with AUTHO
1,567,468,462 UART: RITY.KEYID = 7
1,567,483,818 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,484,583 UART: [art] PUB.X = C5A028F996302C60374B87F3D6F8B46442FB8D88A25B081840211FC4C8851606C71F96CA1B0D6A28715AF95746B822AE
1,567,491,340 UART: [art] PUB.Y = 6A4F4510112A0039C625E7B8ADA98669F051F93D900E809965D06A0BA026603E16F7BAE76DCC67967F3560DBF1BD0999
1,567,498,259 UART: [art] SIG.R = A428A6A5777D3D975079F54DB2046175C216EAF596D3AA9EE30C18CCE7F0C55FB30BDD89A6A8872ADE403A0913C145AF
1,567,505,029 UART: [art] SIG.S = 7F1BFDF47E10990F91BCCF9B9C74ADF096DD9C18D806E1C31418184B048FF267B10560FC81FF1044C1FD98CD6F2B9D13
1,567,528,810 UART: Caliptra RT
1,567,529,155 UART: [state] CFI Enabled
1,567,815,180 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 325.73s
Truncated 733352 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,211,735 >>> mbox cmd response: success
1,485,225,033 UART:
1,485,225,049 UART: Running Caliptra FMC ...
1,485,225,457 UART:
1,485,225,600 UART: [state] CFI Enabled
1,485,314,575 UART: [art] Extend RT PCRs Done
1,485,315,003 UART: [art] Lock RT PCRs Done
1,485,316,334 UART: [art] Populate DV Done
1,485,324,275 UART: [fht] FMC Alias Private Key: 7
1,485,325,335 UART: [art] Derive CDI
1,485,325,615 UART: [art] Store in in slot 0x4
1,485,411,104 UART: [art] Derive Key Pair
1,485,411,464 UART: [art] Store priv key in slot 0x5
1,485,424,744 UART: [art] Derive Key Pair - Done
1,485,439,958 UART: [art] Signing Cert with AUTHO
1,485,440,438 UART: RITY.KEYID = 7
1,485,455,576 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,456,341 UART: [art] PUB.X = 8449C162285771DD150D68FEDF17EEBE1B57B488159C28FA443BECF5E26598B0D16C2C50C3D08C6A0811BE2AF5283EB3
1,485,463,115 UART: [art] PUB.Y = B4AD4D0CF79F5AA30EE38B1D42BDDBEB14F3D7FB64597FB93F75281428263B58E60DDFCC1204A72D87166F1130FCA10F
1,485,470,068 UART: [art] SIG.R = 0FABE3F1DB4D79E5D629CE802539E5242F4AECF396E784E3C28F34A0E1ECFE67278B599599841D91BB80B3AEC407DDAB
1,485,476,850 UART: [art] SIG.S = 6AEA06ABB6E6BAD68507B2CDC62BF2627F54A462B6801E6154E53475D69D3B7E937DCEB1DEC5A0AEAF31525797A807C6
1,485,500,768 UART: Caliptra RT
1,485,501,113 UART: [state] CFI Enabled
1,485,788,082 UART: [rt] RT listening for mailbox commands...
1,485,788,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,223,409 >>> mbox cmd response: success
1,488,236,959 UART:
1,488,236,975 UART: Running Caliptra FMC ...
1,488,237,383 UART:
1,488,237,526 UART: [state] CFI Enabled
1,488,326,979 UART: [art] Extend RT PCRs Done
1,488,327,407 UART: [art] Lock RT PCRs Done
1,488,328,534 UART: [art] Populate DV Done
1,488,336,827 UART: [fht] FMC Alias Private Key: 7
1,488,337,929 UART: [art] Derive CDI
1,488,338,209 UART: [art] Store in in slot 0x4
1,488,423,540 UART: [art] Derive Key Pair
1,488,423,900 UART: [art] Store priv key in slot 0x5
1,488,437,040 UART: [art] Derive Key Pair - Done
1,488,451,488 UART: [art] Signing Cert with AUTHO
1,488,451,968 UART: RITY.KEYID = 7
1,488,467,216 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,467,981 UART: [art] PUB.X = 896B7090C30D49C8601873EF2B8326F5AE0BA6BE3830D641D9503E2A63F476E5FBD233479F3C19DA12432BB90F9D60DD
1,488,474,746 UART: [art] PUB.Y = 13F0166B7EA7697F97826760FCC5F9ECB16D4E0B712745A4C01913A7AE582172802265F7B60B0C2AE68584D20FD8150F
1,488,481,679 UART: [art] SIG.R = 8C6D4E6B8E0E1E0860DC54ECC62865C7B432F0EF26961E2FD2954807832C9A0482F718B6BB4C0260190BF22C2176CBA4
1,488,488,435 UART: [art] SIG.S = 41E828726FDCB76050BAB0009C4368A201BA9742706AB5DE48F465CAE05CD355B4EF2A09B9A0619CE1DB304FEC653144
1,488,512,346 UART: Caliptra RT
1,488,512,691 UART: [state] CFI Enabled
1,488,789,692 UART: [rt] RT listening for mailbox commands...
1,488,790,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,225,195 >>> mbox cmd response: success
1,491,238,657 UART:
1,491,238,673 UART: Running Caliptra FMC ...
1,491,239,081 UART:
1,491,239,224 UART: [state] CFI Enabled
1,491,328,441 UART: [art] Extend RT PCRs Done
1,491,328,869 UART: [art] Lock RT PCRs Done
1,491,330,042 UART: [art] Populate DV Done
1,491,338,155 UART: [fht] FMC Alias Private Key: 7
1,491,339,275 UART: [art] Derive CDI
1,491,339,555 UART: [art] Store in in slot 0x4
1,491,425,492 UART: [art] Derive Key Pair
1,491,425,852 UART: [art] Store priv key in slot 0x5
1,491,439,048 UART: [art] Derive Key Pair - Done
1,491,453,908 UART: [art] Signing Cert with AUTHO
1,491,454,388 UART: RITY.KEYID = 7
1,491,469,246 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,470,011 UART: [art] PUB.X = 8449C162285771DD150D68FEDF17EEBE1B57B488159C28FA443BECF5E26598B0D16C2C50C3D08C6A0811BE2AF5283EB3
1,491,476,785 UART: [art] PUB.Y = B4AD4D0CF79F5AA30EE38B1D42BDDBEB14F3D7FB64597FB93F75281428263B58E60DDFCC1204A72D87166F1130FCA10F
1,491,483,738 UART: [art] SIG.R = 0FABE3F1DB4D79E5D629CE802539E5242F4AECF396E784E3C28F34A0E1ECFE67278B599599841D91BB80B3AEC407DDAB
1,491,490,520 UART: [art] SIG.S = 6AEA06ABB6E6BAD68507B2CDC62BF2627F54A462B6801E6154E53475D69D3B7E937DCEB1DEC5A0AEAF31525797A807C6
1,491,514,442 UART: Caliptra RT
1,491,514,787 UART: [state] CFI Enabled
1,491,798,176 UART: [rt] RT listening for mailbox commands...
1,491,798,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,234,393 >>> mbox cmd response: success
1,494,247,805 UART:
1,494,247,821 UART: Running Caliptra FMC ...
1,494,248,229 UART:
1,494,248,372 UART: [state] CFI Enabled
1,494,337,683 UART: [art] Extend RT PCRs Done
1,494,338,111 UART: [art] Lock RT PCRs Done
1,494,339,536 UART: [art] Populate DV Done
1,494,347,749 UART: [fht] FMC Alias Private Key: 7
1,494,348,893 UART: [art] Derive CDI
1,494,349,173 UART: [art] Store in in slot 0x4
1,494,434,732 UART: [art] Derive Key Pair
1,494,435,092 UART: [art] Store priv key in slot 0x5
1,494,448,358 UART: [art] Derive Key Pair - Done
1,494,463,272 UART: [art] Signing Cert with AUTHO
1,494,463,752 UART: RITY.KEYID = 7
1,494,478,802 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,479,567 UART: [art] PUB.X = 896B7090C30D49C8601873EF2B8326F5AE0BA6BE3830D641D9503E2A63F476E5FBD233479F3C19DA12432BB90F9D60DD
1,494,486,332 UART: [art] PUB.Y = 13F0166B7EA7697F97826760FCC5F9ECB16D4E0B712745A4C01913A7AE582172802265F7B60B0C2AE68584D20FD8150F
1,494,493,265 UART: [art] SIG.R = 8C6D4E6B8E0E1E0860DC54ECC62865C7B432F0EF26961E2FD2954807832C9A0482F718B6BB4C0260190BF22C2176CBA4
1,494,500,021 UART: [art] SIG.S = 41E828726FDCB76050BAB0009C4368A201BA9742706AB5DE48F465CAE05CD355B4EF2A09B9A0619CE1DB304FEC653144
1,494,523,550 UART: Caliptra RT
1,494,523,895 UART: [state] CFI Enabled
1,494,806,748 UART: [rt] RT listening for mailbox commands...
1,494,807,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,244,155 >>> mbox cmd response: success
1,497,257,457 UART:
1,497,257,473 UART: Running Caliptra FMC ...
1,497,257,881 UART:
1,497,258,024 UART: [state] CFI Enabled
1,497,347,395 UART: [art] Extend RT PCRs Done
1,497,347,823 UART: [art] Lock RT PCRs Done
1,497,349,104 UART: [art] Populate DV Done
1,497,357,287 UART: [fht] FMC Alias Private Key: 7
1,497,358,303 UART: [art] Derive CDI
1,497,358,583 UART: [art] Store in in slot 0x4
1,497,444,434 UART: [art] Derive Key Pair
1,497,444,794 UART: [art] Store priv key in slot 0x5
1,497,457,638 UART: [art] Derive Key Pair - Done
1,497,472,254 UART: [art] Signing Cert with AUTHO
1,497,472,734 UART: RITY.KEYID = 7
1,497,487,848 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,488,613 UART: [art] PUB.X = 8449C162285771DD150D68FEDF17EEBE1B57B488159C28FA443BECF5E26598B0D16C2C50C3D08C6A0811BE2AF5283EB3
1,497,495,387 UART: [art] PUB.Y = B4AD4D0CF79F5AA30EE38B1D42BDDBEB14F3D7FB64597FB93F75281428263B58E60DDFCC1204A72D87166F1130FCA10F
1,497,502,340 UART: [art] SIG.R = 0FABE3F1DB4D79E5D629CE802539E5242F4AECF396E784E3C28F34A0E1ECFE67278B599599841D91BB80B3AEC407DDAB
1,497,509,122 UART: [art] SIG.S = 6AEA06ABB6E6BAD68507B2CDC62BF2627F54A462B6801E6154E53475D69D3B7E937DCEB1DEC5A0AEAF31525797A807C6
1,497,532,464 UART: Caliptra RT
1,497,532,809 UART: [state] CFI Enabled
1,497,814,318 UART: [rt] RT listening for mailbox commands...
1,497,814,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,249,753 >>> mbox cmd response: success
1,500,262,971 UART:
1,500,262,987 UART: Running Caliptra FMC ...
1,500,263,395 UART:
1,500,263,538 UART: [state] CFI Enabled
1,500,352,723 UART: [art] Extend RT PCRs Done
1,500,353,151 UART: [art] Lock RT PCRs Done
1,500,354,220 UART: [art] Populate DV Done
1,500,362,529 UART: [fht] FMC Alias Private Key: 7
1,500,363,655 UART: [art] Derive CDI
1,500,363,935 UART: [art] Store in in slot 0x4
1,500,449,560 UART: [art] Derive Key Pair
1,500,449,920 UART: [art] Store priv key in slot 0x5
1,500,462,884 UART: [art] Derive Key Pair - Done
1,500,477,428 UART: [art] Signing Cert with AUTHO
1,500,477,908 UART: RITY.KEYID = 7
1,500,493,362 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,494,127 UART: [art] PUB.X = 896B7090C30D49C8601873EF2B8326F5AE0BA6BE3830D641D9503E2A63F476E5FBD233479F3C19DA12432BB90F9D60DD
1,500,500,892 UART: [art] PUB.Y = 13F0166B7EA7697F97826760FCC5F9ECB16D4E0B712745A4C01913A7AE582172802265F7B60B0C2AE68584D20FD8150F
1,500,507,825 UART: [art] SIG.R = 8C6D4E6B8E0E1E0860DC54ECC62865C7B432F0EF26961E2FD2954807832C9A0482F718B6BB4C0260190BF22C2176CBA4
1,500,514,581 UART: [art] SIG.S = 41E828726FDCB76050BAB0009C4368A201BA9742706AB5DE48F465CAE05CD355B4EF2A09B9A0619CE1DB304FEC653144
1,500,538,812 UART: Caliptra RT
1,500,539,157 UART: [state] CFI Enabled
1,500,820,924 UART: [rt] RT listening for mailbox commands...
1,500,821,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,257,537 >>> mbox cmd response: success
1,503,270,873 UART:
1,503,270,889 UART: Running Caliptra FMC ...
1,503,271,297 UART:
1,503,271,440 UART: [state] CFI Enabled
1,503,360,267 UART: [art] Extend RT PCRs Done
1,503,360,695 UART: [art] Lock RT PCRs Done
1,503,362,138 UART: [art] Populate DV Done
1,503,370,661 UART: [fht] FMC Alias Private Key: 7
1,503,371,775 UART: [art] Derive CDI
1,503,372,055 UART: [art] Store in in slot 0x4
1,503,458,108 UART: [art] Derive Key Pair
1,503,458,468 UART: [art] Store priv key in slot 0x5
1,503,471,592 UART: [art] Derive Key Pair - Done
1,503,486,554 UART: [art] Signing Cert with AUTHO
1,503,487,034 UART: RITY.KEYID = 7
1,503,502,476 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,503,241 UART: [art] PUB.X = 8449C162285771DD150D68FEDF17EEBE1B57B488159C28FA443BECF5E26598B0D16C2C50C3D08C6A0811BE2AF5283EB3
1,503,510,015 UART: [art] PUB.Y = B4AD4D0CF79F5AA30EE38B1D42BDDBEB14F3D7FB64597FB93F75281428263B58E60DDFCC1204A72D87166F1130FCA10F
1,503,516,968 UART: [art] SIG.R = 0FABE3F1DB4D79E5D629CE802539E5242F4AECF396E784E3C28F34A0E1ECFE67278B599599841D91BB80B3AEC407DDAB
1,503,523,750 UART: [art] SIG.S = 6AEA06ABB6E6BAD68507B2CDC62BF2627F54A462B6801E6154E53475D69D3B7E937DCEB1DEC5A0AEAF31525797A807C6
1,503,547,152 UART: Caliptra RT
1,503,547,497 UART: [state] CFI Enabled
1,503,831,352 UART: [rt] RT listening for mailbox commands...
1,503,832,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,506,268,743 >>> mbox cmd response: success
1,506,282,127 UART:
1,506,282,143 UART: Running Caliptra FMC ...
1,506,282,551 UART:
1,506,282,694 UART: [state] CFI Enabled
1,506,371,833 UART: [art] Extend RT PCRs Done
1,506,372,261 UART: [art] Lock RT PCRs Done
1,506,373,268 UART: [art] Populate DV Done
1,506,381,259 UART: [fht] FMC Alias Private Key: 7
1,506,382,437 UART: [art] Derive CDI
1,506,382,717 UART: [art] Store in in slot 0x4
1,506,468,616 UART: [art] Derive Key Pair
1,506,468,976 UART: [art] Store priv key in slot 0x5
1,506,482,670 UART: [art] Derive Key Pair - Done
1,506,497,712 UART: [art] Signing Cert with AUTHO
1,506,498,192 UART: RITY.KEYID = 7
1,506,513,870 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,514,635 UART: [art] PUB.X = 896B7090C30D49C8601873EF2B8326F5AE0BA6BE3830D641D9503E2A63F476E5FBD233479F3C19DA12432BB90F9D60DD
1,506,521,400 UART: [art] PUB.Y = 13F0166B7EA7697F97826760FCC5F9ECB16D4E0B712745A4C01913A7AE582172802265F7B60B0C2AE68584D20FD8150F
1,506,528,333 UART: [art] SIG.R = 8C6D4E6B8E0E1E0860DC54ECC62865C7B432F0EF26961E2FD2954807832C9A0482F718B6BB4C0260190BF22C2176CBA4
1,506,535,089 UART: [art] SIG.S = 41E828726FDCB76050BAB0009C4368A201BA9742706AB5DE48F465CAE05CD355B4EF2A09B9A0619CE1DB304FEC653144
1,506,558,854 UART: Caliptra RT
1,506,559,199 UART: [state] CFI Enabled
1,506,841,094 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 312.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,108 UART:
192,507 UART: Running Caliptra ROM ...
193,625 UART:
193,797 UART: [state] CFI Enabled
251,373 UART: [state] LifecycleState = Unprovisioned
254,548 UART: [state] DebugLocked = No
255,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,342 UART: [kat] SHA2-256
429,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,520 UART: [kat] ++
440,040 UART: [kat] sha1
451,002 UART: [kat] SHA2-256
453,743 UART: [kat] SHA2-384
460,161 UART: [kat] SHA2-512-ACC
462,528 UART: [kat] ECC-384
2,758,589 UART: [kat] HMAC-384Kdf
2,772,106 UART: [kat] LMS
3,962,439 UART: [kat] --
3,967,664 UART: [cold-reset] ++
3,969,691 UART: [fht] Storing FHT @ 0x50003400
3,980,541 UART: [idev] ++
3,981,175 UART: [idev] CDI.KEYID = 6
3,982,101 UART: [idev] SUBJECT.KEYID = 7
3,983,343 UART: [idev] UDS.KEYID = 0
3,984,494 ready_for_fw is high
3,984,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,128,421 UART: [idev] Erasing UDS.KEYID = 0
7,317,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,338,745 UART: [idev] --
7,343,334 UART: [ldev] ++
7,343,900 UART: [ldev] CDI.KEYID = 6
7,344,867 UART: [ldev] SUBJECT.KEYID = 5
7,346,076 UART: [ldev] AUTHORITY.KEYID = 7
7,347,309 UART: [ldev] FE.KEYID = 1
7,395,547 UART: [ldev] Erasing FE.KEYID = 1
10,727,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,035,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,064,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,676 UART: [ldev] --
13,088,725 UART: [fwproc] Waiting for Commands...
13,091,466 UART: [fwproc] Received command 0x46574c44
13,093,657 UART: [fwproc] Received Image of size 114124 bytes
17,146,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,610,305 >>> mbox cmd response: success
17,610,832 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,754,371 UART: [afmc] ++
17,755,011 UART: [afmc] CDI.KEYID = 6
17,755,922 UART: [afmc] SUBJECT.KEYID = 7
17,756,971 UART: [afmc] AUTHORITY.KEYID = 5
20,976,970 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,318 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,297,712 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,312,581 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,010 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,201 UART: [afmc] --
23,352,960 UART: [cold-reset] --
23,356,548 UART: [state] Locking Datavault
23,362,927 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,681 UART: [state] Locking ICCM
23,366,776 UART: [exit] Launching FMC @ 0x40000130
23,375,134 UART:
23,375,408 UART: Running Caliptra FMC ...
23,376,539 UART:
23,376,701 UART: [state] CFI Enabled
23,438,431 UART: [fht] FMC Alias Private Key: 7
25,776,466 UART: [art] Extend RT PCRs Done
25,777,699 UART: [art] Lock RT PCRs Done
25,779,379 UART: [art] Populate DV Done
25,784,801 UART: [fht] FMC Alias Private Key: 7
25,786,286 UART: [art] Derive CDI
25,787,051 UART: [art] Store in in slot 0x4
25,846,557 UART: [art] Derive Key Pair
25,847,561 UART: [art] Store priv key in slot 0x5
29,140,260 UART: [art] Derive Key Pair - Done
29,152,821 UART: [art] Signing Cert with AUTHO
29,154,123 UART: RITY.KEYID = 7
31,441,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,443,046 UART: [art] PUB.X = 1567453923FF89154AC6803266027328B9531C2BD447DF39095A98D7220BFC1DDB0E302D4F9E530F974ED4DACE2352B6
31,450,266 UART: [art] PUB.Y = CE0575604B38432EF6C021D69000E9D1D8C62FD55B8396A4E38C2E05C5B7010721D9D98B7E9C3757B4E1B28B9CEC3335
31,457,489 UART: [art] SIG.R = 0AE37DC0ABCC57D42BF4CD12E7E90308F424C1CE742ACA656D2A4E7C12E70623C190B4D1A5517ABB8E49708F5292BE6D
31,464,909 UART: [art] SIG.S = A8E8366D0DB6D22E86238B12B97480A451F1AD2D3A41EB0BB387D2DF6984341B838972ED5A1CD7F79A8C2F47B50D23BE
32,770,612 UART: Caliptra RT
32,771,320 UART: [state] CFI Enabled
32,931,343 UART: [rt] RT listening for mailbox commands...
32,934,299 UART:
32,934,466 UART: Running Caliptra ROM ...
32,935,531 UART:
32,935,697 UART: [state] CFI Enabled
32,996,620 UART: [state] LifecycleState = Unprovisioned
32,998,550 UART: [state] DebugLocked = No
33,001,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,006,215 UART: [kat] SHA2-256
33,175,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,186,408 UART: [kat] ++
33,186,888 UART: [kat] sha1
33,198,043 UART: [kat] SHA2-256
33,200,736 UART: [kat] SHA2-384
33,206,451 UART: [kat] SHA2-512-ACC
33,208,801 UART: [kat] ECC-384
35,500,109 UART: [kat] HMAC-384Kdf
35,533,445 UART: [kat] LMS
36,723,777 UART: [kat] --
36,727,461 UART: [update-reset] ++
40,867,143 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,871,033 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
41,253,322 >>> mbox cmd response: success
41,254,914 UART: [update-reset] Copying MAN_2 To MAN_1
41,277,360 UART: [update-reset Success] --
41,281,159 UART: [state] Locking Datavault
41,284,465 UART: [state] Locking PCR0, PCR1 and PCR31
41,286,236 UART: [state] Locking ICCM
41,287,525 UART: [exit] Launching FMC @ 0x40000130
41,295,926 UART:
41,296,202 UART: Running Caliptra FMC ...
41,297,310 UART:
41,297,470 UART: [state] CFI Enabled
41,389,588 UART: [art] Extend RT PCRs Done
41,390,772 UART: [art] Lock RT PCRs Done
41,392,395 UART: [art] Populate DV Done
41,397,855 UART: [fht] FMC Alias Private Key: 7
41,399,494 UART: [art] Derive CDI
41,400,302 UART: [art] Store in in slot 0x4
41,459,040 UART: [art] Derive Key Pair
41,460,078 UART: [art] Store priv key in slot 0x5
44,752,793 UART: [art] Derive Key Pair - Done
44,765,741 UART: [art] Signing Cert with AUTHO
44,767,071 UART: RITY.KEYID = 7
47,054,124 UART: [art] Erasing AUTHORITY.KEYID = 7
47,055,635 UART: [art] PUB.X = 04DBD3A5D43397A2B62F86B2C41297EE560094C675CFF46350C6DEB7865D51D332CF90783D131EFDCC3A182533BD3DD7
47,062,894 UART: [art] PUB.Y = C580F20B5E1BB5B4EA25E8EEB48518BD44807E219D899DB24A74D9A7C1EDF0DDAD7B1CBF5B4C2FA0C10F00D34A32ACCE
47,070,151 UART: [art] SIG.R = D3898B33991B727DB9C2E6A0BE75D984AA518463394B1E3F5F26AAF92D12613C80787C278270147B863E8A50B91B0924
47,077,561 UART: [art] SIG.S = 9C7EED3B83E8B405A0904A245D46BDE883ADE5E78535B0C7DEE814B7AE7ABF413252E818B8F5A53F0D914BA7F8D2A921
48,383,083 UART: Caliptra RT
48,383,788 UART: [state] CFI Enabled
48,717,330 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,782,360 ready_for_fw is high
3,782,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,123 >>> mbox cmd response: success
17,872,226 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,566,041 UART:
23,566,462 UART: Running Caliptra FMC ...
23,567,620 UART:
23,567,776 UART: [state] CFI Enabled
23,635,235 UART: [fht] FMC Alias Private Key: 7
25,973,412 UART: [art] Extend RT PCRs Done
25,974,772 UART: [art] Lock RT PCRs Done
25,976,473 UART: [art] Populate DV Done
25,981,736 UART: [fht] FMC Alias Private Key: 7
25,983,246 UART: [art] Derive CDI
25,983,986 UART: [art] Store in in slot 0x4
26,043,425 UART: [art] Derive Key Pair
26,044,426 UART: [art] Store priv key in slot 0x5
29,336,759 UART: [art] Derive Key Pair - Done
29,350,132 UART: [art] Signing Cert with AUTHO
29,351,445 UART: RITY.KEYID = 7
31,638,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,770 UART: [art] PUB.X = 34F8956A15EA9FB7BD43B3549A27859704A2AF71E67AF4ABBC30DC330113419AACA80098E3E0B529640C0D111D78FC56
31,647,017 UART: [art] PUB.Y = 0F1E1BB82549851FE895E82585811D0D7079C3EE9157CB276F9E9417D6246264DCF60ABAE24A62CC73A7E6AA7B526984
31,654,275 UART: [art] SIG.R = 4EB2765B0639D63CADFEA9F518EF76F6C0A93B26D7FA788D6FD81F9B46A1F05C8EEC15D55F0FAD69A076A16C870035C1
31,661,656 UART: [art] SIG.S = 2D72DDA2C02629B256FE2E02A71CE7FC4B5BA58FEBA4C442EADD65CD7E465953EEF70AE9CFB6BA4368C5D24251DDB5DB
32,966,730 UART: Caliptra RT
32,967,441 UART: [state] CFI Enabled
33,127,141 UART: [rt] RT listening for mailbox commands...
41,718,753 >>> mbox cmd response: success
41,754,838 UART:
41,755,137 UART: Running Caliptra FMC ...
41,756,260 UART:
41,756,423 UART: [state] CFI Enabled
41,842,543 UART: [art] Extend RT PCRs Done
41,843,725 UART: [art] Lock RT PCRs Done
41,845,265 UART: [art] Populate DV Done
41,850,628 UART: [fht] FMC Alias Private Key: 7
41,852,170 UART: [art] Derive CDI
41,852,906 UART: [art] Store in in slot 0x4
41,911,567 UART: [art] Derive Key Pair
41,912,605 UART: [art] Store priv key in slot 0x5
45,205,656 UART: [art] Derive Key Pair - Done
45,218,708 UART: [art] Signing Cert with AUTHO
45,220,023 UART: RITY.KEYID = 7
47,507,107 UART: [art] Erasing AUTHORITY.KEYID = 7
47,508,623 UART: [art] PUB.X = 56EFA2E2CD76BF404784781DFBF3E09E0E6D9F38D4577BB5880180A609850F8C9E634B9E8A8761A01D9199ECACF6DE37
47,515,820 UART: [art] PUB.Y = EB4328EC42B92BB1108447F5DAF7A4C3A998CBEB5FCB6E40B62739FD9BE837ED74B6A2CB6F063DD1A29D285DE7F3E082
47,523,104 UART: [art] SIG.R = FC203CED6302E0489E14E73E6C44612282C8B3A080C584B1801E27F72C81D41F38F1A75913CE30FAAA3B9720D853225B
47,530,497 UART: [art] SIG.S = 1B2C4B8BA1281DB39D1C590071A61E34F8B5AB0118168948DF5FEF2C806F0CB9C3FE6D6236D9E535F3E35C406A64564A
48,835,488 UART: Caliptra RT
48,836,199 UART: [state] CFI Enabled
49,169,587 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,417 UART:
192,811 UART: Running Caliptra ROM ...
193,894 UART:
603,730 UART: [state] CFI Enabled
615,636 UART: [state] LifecycleState = Unprovisioned
617,588 UART: [state] DebugLocked = No
619,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,620 UART: [kat] SHA2-256
794,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,943 UART: [kat] ++
805,473 UART: [kat] sha1
816,560 UART: [kat] SHA2-256
819,280 UART: [kat] SHA2-384
824,412 UART: [kat] SHA2-512-ACC
826,776 UART: [kat] ECC-384
3,112,560 UART: [kat] HMAC-384Kdf
3,125,057 UART: [kat] LMS
4,315,179 UART: [kat] --
4,320,221 UART: [cold-reset] ++
4,322,083 UART: [fht] Storing FHT @ 0x50003400
4,334,552 UART: [idev] ++
4,335,114 UART: [idev] CDI.KEYID = 6
4,336,097 UART: [idev] SUBJECT.KEYID = 7
4,337,339 UART: [idev] UDS.KEYID = 0
4,338,481 ready_for_fw is high
4,338,721 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,170 UART: [idev] Erasing UDS.KEYID = 0
7,627,170 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,003 UART: [idev] --
7,652,265 UART: [ldev] ++
7,652,870 UART: [ldev] CDI.KEYID = 6
7,653,777 UART: [ldev] SUBJECT.KEYID = 5
7,654,941 UART: [ldev] AUTHORITY.KEYID = 7
7,656,274 UART: [ldev] FE.KEYID = 1
7,666,700 UART: [ldev] Erasing FE.KEYID = 1
10,949,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,224 UART: [ldev] --
13,310,424 UART: [fwproc] Waiting for Commands...
13,313,549 UART: [fwproc] Received command 0x46574c44
13,315,721 UART: [fwproc] Received Image of size 114124 bytes
17,368,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,940 >>> mbox cmd response: success
17,826,539 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,969,746 UART: [afmc] ++
17,970,641 UART: [afmc] CDI.KEYID = 6
17,971,734 UART: [afmc] SUBJECT.KEYID = 7
17,972,843 UART: [afmc] AUTHORITY.KEYID = 5
21,151,802 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,239 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,507 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,873 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,715 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,382 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,508 UART: [afmc] --
23,516,079 UART: [cold-reset] --
23,520,208 UART: [state] Locking Datavault
23,526,583 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,339 UART: [state] Locking ICCM
23,530,615 UART: [exit] Launching FMC @ 0x40000130
23,538,954 UART:
23,539,185 UART: Running Caliptra FMC ...
23,540,278 UART:
23,540,434 UART: [state] CFI Enabled
23,548,634 UART: [fht] FMC Alias Private Key: 7
25,879,509 UART: [art] Extend RT PCRs Done
25,880,737 UART: [art] Lock RT PCRs Done
25,882,062 UART: [art] Populate DV Done
25,887,581 UART: [fht] FMC Alias Private Key: 7
25,889,058 UART: [art] Derive CDI
25,889,789 UART: [art] Store in in slot 0x4
25,932,630 UART: [art] Derive Key Pair
25,933,644 UART: [art] Store priv key in slot 0x5
29,176,366 UART: [art] Derive Key Pair - Done
29,189,255 UART: [art] Signing Cert with AUTHO
29,190,575 UART: RITY.KEYID = 7
31,469,914 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,419 UART: [art] PUB.X = A6D4D2FB1399175028902E6857573C04F749C3EFD7C4F3D257A1C8EF6E21A7A9C402DD3974BC6705BCBD815127BF9F94
31,478,661 UART: [art] PUB.Y = 58B21FFD5C04D01F3D8531B363762797C28780DEE58EAFE1D6F8DB905A66A4D9140728EA3128D5C57040CDB58C6C69D0
31,485,938 UART: [art] SIG.R = 0CE544E466C06FE542156B1BCCA858865341237C9A65EA0DEF89368ACD380B5AF7B98178C13F36235ACF1E9D0E3F7533
31,493,313 UART: [art] SIG.S = 4CF0BD14AD8899E4044EF8D5733A7333A48F994B44B041663B3C0BEAF7D151F0C138C7F193CF9A120A17AE13B3FED958
32,798,608 UART: Caliptra RT
32,799,296 UART: [state] CFI Enabled
32,916,977 UART: [rt] RT listening for mailbox commands...
32,919,988 UART:
32,920,148 UART: Running Caliptra ROM ...
32,921,246 UART:
32,921,615 UART: [state] CFI Enabled
32,934,340 UART: [state] LifecycleState = Unprovisioned
32,936,258 UART: [state] DebugLocked = No
32,938,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,943,832 UART: [kat] SHA2-256
33,113,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,124,082 UART: [kat] ++
33,124,536 UART: [kat] sha1
33,135,358 UART: [kat] SHA2-256
33,138,094 UART: [kat] SHA2-384
33,144,133 UART: [kat] SHA2-512-ACC
33,146,473 UART: [kat] ECC-384
35,429,647 UART: [kat] HMAC-384Kdf
35,442,467 UART: [kat] LMS
36,632,508 UART: [kat] --
36,635,580 UART: [update-reset] ++
40,781,367 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,785,523 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
41,167,783 >>> mbox cmd response: success
41,168,567 UART: [update-reset] Copying MAN_2 To MAN_1
41,190,945 UART: [update-reset Success] --
41,196,594 UART: [state] Locking Datavault
41,199,039 UART: [state] Locking PCR0, PCR1 and PCR31
41,200,790 UART: [state] Locking ICCM
41,202,501 UART: [exit] Launching FMC @ 0x40000130
41,210,951 UART:
41,211,183 UART: Running Caliptra FMC ...
41,212,280 UART:
41,212,435 UART: [state] CFI Enabled
41,256,231 UART: [art] Extend RT PCRs Done
41,257,412 UART: [art] Lock RT PCRs Done
41,259,030 UART: [art] Populate DV Done
41,264,492 UART: [fht] FMC Alias Private Key: 7
41,266,185 UART: [art] Derive CDI
41,266,993 UART: [art] Store in in slot 0x4
41,309,367 UART: [art] Derive Key Pair
41,310,383 UART: [art] Store priv key in slot 0x5
44,552,777 UART: [art] Derive Key Pair - Done
44,565,493 UART: [art] Signing Cert with AUTHO
44,566,802 UART: RITY.KEYID = 7
46,846,381 UART: [art] Erasing AUTHORITY.KEYID = 7
46,847,889 UART: [art] PUB.X = 7443353883E928AEAACA70A45AE3498D8CE586BB5F637C76A7E8FE540D796E75AF336C1F259545DD7B58ECB415A2F671
46,855,165 UART: [art] PUB.Y = 66869E548BB6550ADDC88542F4EC1A35963C1145C9ECA0F2E8F6985E2B79D1D68641FFE20FF90FC1B8C90F338A400F56
46,862,346 UART: [art] SIG.R = 72981252BE12F31425869151F89196C08AA0A109F156367C0EE2699A9A13A79930E7A2064B1F4DA2C3316BEB961F353F
46,869,744 UART: [art] SIG.S = 6D0479B896E1165764E099FBE1B9FE3BD4DD9189CD972CE4ACDD4FA540566FAC1383DCF5D475A25505F1EADC3EAE8DD6
48,175,255 UART: Caliptra RT
48,175,964 UART: [state] CFI Enabled
48,465,706 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
4,121,093 ready_for_fw is high
4,121,735 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,053,974 >>> mbox cmd response: success
18,054,625 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,695,065 UART:
23,695,473 UART: Running Caliptra FMC ...
23,696,629 UART:
23,696,782 UART: [state] CFI Enabled
23,704,978 UART: [fht] FMC Alias Private Key: 7
26,036,106 UART: [art] Extend RT PCRs Done
26,037,333 UART: [art] Lock RT PCRs Done
26,039,098 UART: [art] Populate DV Done
26,044,413 UART: [fht] FMC Alias Private Key: 7
26,045,934 UART: [art] Derive CDI
26,046,675 UART: [art] Store in in slot 0x4
26,089,109 UART: [art] Derive Key Pair
26,090,109 UART: [art] Store priv key in slot 0x5
29,332,347 UART: [art] Derive Key Pair - Done
29,345,455 UART: [art] Signing Cert with AUTHO
29,346,755 UART: RITY.KEYID = 7
31,626,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,906 UART: [art] PUB.X = F39532BE150B808CF9C22457C2482ADFB9AD22D26DEADBFA295D5ACA4B3FB9D12BE8D255DF89A577EDA4EB0FA4992E0D
31,635,233 UART: [art] PUB.Y = 0E56ED1184212D7641388C53BB1D6C8277975046F8769EA4278A2AF3690470455D2E5D11EA85B937D408E7D6265C937A
31,642,399 UART: [art] SIG.R = FA70C0949C4AA82A11BDDF855B11600DC8D2C9D1D2B6AAE377F1E156AD996BDEE7A47FB2E5A049BA4A9D1186FD93EF09
31,649,803 UART: [art] SIG.S = 61EC32C90F572ABA4400AF5CF1F3E4CA69B0682A87A7799629650EBF76542C0B45BA2DC145970421A1A383038DE42B7D
32,954,844 UART: Caliptra RT
32,955,552 UART: [state] CFI Enabled
33,074,015 UART: [rt] RT listening for mailbox commands...
41,598,283 >>> mbox cmd response: success
41,635,297 UART:
41,635,569 UART: Running Caliptra FMC ...
41,636,606 UART:
41,636,749 UART: [state] CFI Enabled
41,680,780 UART: [art] Extend RT PCRs Done
41,681,964 UART: [art] Lock RT PCRs Done
41,683,547 UART: [art] Populate DV Done
41,689,101 UART: [fht] FMC Alias Private Key: 7
41,690,802 UART: [art] Derive CDI
41,691,556 UART: [art] Store in in slot 0x4
41,734,263 UART: [art] Derive Key Pair
41,735,302 UART: [art] Store priv key in slot 0x5
44,977,645 UART: [art] Derive Key Pair - Done
44,990,429 UART: [art] Signing Cert with AUTHO
44,991,730 UART: RITY.KEYID = 7
47,270,834 UART: [art] Erasing AUTHORITY.KEYID = 7
47,272,343 UART: [art] PUB.X = EFC90D50F691B2D62224D9EF7F19164663224F8A382ECD99D649C9508CB2C2D9B29B29A85500DD59CD3FBFC74E4B112D
47,279,545 UART: [art] PUB.Y = AB92CB7C63ECCBF826514C3233F9672ECA589FB4F577CF0D115077C5508AD3743556A916EEF7C5D35D00931FD39B7F1B
47,286,783 UART: [art] SIG.R = 7FA24D060909FFC846A82AC3061A29C28D3A8C7ED29AC7254721216268E8F5BA2A945865025419C2FAAA3B51E684D12C
47,294,172 UART: [art] SIG.S = DCAD7642A4F302D023CC778D9FE978EEC6CF822C25D6A3A4AD93083EE67D3DF73BD6193C87A07C936DBD4CF08612F266
48,599,318 UART: Caliptra RT
48,600,032 UART: [state] CFI Enabled
48,884,343 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
192,977 UART:
193,341 UART: Running Caliptra ROM ...
194,534 UART:
194,690 UART: [state] CFI Enabled
264,127 UART: [state] LifecycleState = Unprovisioned
265,974 UART: [state] DebugLocked = No
267,438 UART: [state] WD Timer not started. Device not locked for debugging
270,618 UART: [kat] SHA2-256
449,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,280 UART: [kat] ++
461,812 UART: [kat] sha1
472,836 UART: [kat] SHA2-256
475,840 UART: [kat] SHA2-384
482,313 UART: [kat] SHA2-512-ACC
485,222 UART: [kat] ECC-384
2,945,388 UART: [kat] HMAC-384Kdf
2,971,276 UART: [kat] LMS
3,500,665 UART: [kat] --
3,506,228 UART: [cold-reset] ++
3,508,092 UART: [fht] FHT @ 0x50003400
3,519,499 UART: [idev] ++
3,520,060 UART: [idev] CDI.KEYID = 6
3,521,146 UART: [idev] SUBJECT.KEYID = 7
3,522,272 UART: [idev] UDS.KEYID = 0
3,523,196 ready_for_fw is high
3,523,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,383 UART: [idev] Erasing UDS.KEYID = 0
6,026,175 UART: [idev] Sha1 KeyId Algorithm
6,047,849 UART: [idev] --
6,051,789 UART: [ldev] ++
6,052,356 UART: [ldev] CDI.KEYID = 6
6,053,242 UART: [ldev] SUBJECT.KEYID = 5
6,054,453 UART: [ldev] AUTHORITY.KEYID = 7
6,055,687 UART: [ldev] FE.KEYID = 1
6,100,715 UART: [ldev] Erasing FE.KEYID = 1
8,605,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,237 UART: [ldev] --
10,413,349 UART: [fwproc] Wait for Commands...
10,415,441 UART: [fwproc] Recv command 0x46574c44
10,417,531 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,213 >>> mbox cmd response: success
14,284,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,429,038 UART: [afmc] ++
14,429,706 UART: [afmc] CDI.KEYID = 6
14,430,607 UART: [afmc] SUBJECT.KEYID = 7
14,431,680 UART: [afmc] AUTHORITY.KEYID = 5
16,830,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,363 UART: [afmc] --
18,628,851 UART: [cold-reset] --
18,632,706 UART: [state] Locking Datavault
18,639,892 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,687 UART: [state] Locking ICCM
18,643,386 UART: [exit] Launching FMC @ 0x40000130
18,651,786 UART:
18,652,022 UART: Running Caliptra FMC ...
18,653,124 UART:
18,653,300 UART: [state] CFI Enabled
18,711,984 UART: [fht] FMC Alias Private Key: 7
20,475,606 UART: [art] Extend RT PCRs Done
20,476,829 UART: [art] Lock RT PCRs Done
20,478,478 UART: [art] Populate DV Done
20,483,893 UART: [fht] FMC Alias Private Key: 7
20,485,525 UART: [art] Derive CDI
20,486,269 UART: [art] Store in in slot 0x4
20,544,688 UART: [art] Derive Key Pair
20,545,687 UART: [art] Store priv key in slot 0x5
23,008,980 UART: [art] Derive Key Pair - Done
23,022,036 UART: [art] Signing Cert with AUTHO
23,023,343 UART: RITY.KEYID = 7
24,734,972 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,481 UART: [art] PUB.X = 808159BEDDC61BEAB524655FA260FEF40062915CE21111E3DE3537AF12C471B961D5F0761BDE6529E332ECF46083E598
24,743,717 UART: [art] PUB.Y = ABA1E48E96FC6FFA1453C9E75105D7A0F7A3A70FA4159D5899F7192630B0DC0050EB732580421B76D0D50985EB250AF9
24,750,967 UART: [art] SIG.R = 4951B89F858FBEF56FF972AF2D5FDACB3CCB8A7F9A4FAE908C47B40FBE040BEE5B7321F6D3E3CED2DB8AAF25CB430020
24,758,349 UART: [art] SIG.S = 666BC901A43ABA188944CD05B8D6ABC8C7B07B7EAF9A0CF3A0582EFC402A80AEF4A78FCBAEF3E0DC190FED6F961F356A
25,737,432 UART: Caliptra RT
25,738,133 UART: [state] CFI Enabled
25,903,636 UART: [rt] RT listening for mailbox commands...
25,906,552 UART:
25,906,722 UART: Running Caliptra ROM ...
25,907,831 UART:
25,907,986 UART: [state] CFI Enabled
25,970,769 UART: [state] LifecycleState = Unprovisioned
25,972,642 UART: [state] DebugLocked = No
25,974,865 UART: [state] WD Timer not started. Device not locked for debugging
25,978,928 UART: [kat] SHA2-256
26,158,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,169,646 UART: [kat] ++
26,170,193 UART: [kat] sha1
26,181,486 UART: [kat] SHA2-256
26,184,507 UART: [kat] SHA2-384
26,191,629 UART: [kat] SHA2-512-ACC
26,194,563 UART: [kat] ECC-384
28,656,290 UART: [kat] HMAC-384Kdf
28,678,068 UART: [kat] LMS
29,207,526 UART: [kat] --
29,210,647 UART: [update-reset] ++
32,641,935 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,644,671 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,027,973 >>> mbox cmd response: success
33,029,025 UART: [update-reset] Copying MAN_2 To MAN_1
33,051,361 UART: [update-reset Success] --
33,055,246 UART: [state] Locking Datavault
33,060,021 UART: [state] Locking PCR0, PCR1 and PCR31
33,061,670 UART: [state] Locking ICCM
33,063,953 UART: [exit] Launching FMC @ 0x40000130
33,072,349 UART:
33,072,587 UART: Running Caliptra FMC ...
33,073,688 UART:
33,073,849 UART: [state] CFI Enabled
33,168,878 UART: [art] Extend RT PCRs Done
33,170,060 UART: [art] Lock RT PCRs Done
33,171,516 UART: [art] Populate DV Done
33,176,865 UART: [fht] FMC Alias Private Key: 7
33,178,450 UART: [art] Derive CDI
33,179,257 UART: [art] Store in in slot 0x4
33,238,719 UART: [art] Derive Key Pair
33,239,749 UART: [art] Store priv key in slot 0x5
35,702,484 UART: [art] Derive Key Pair - Done
35,715,962 UART: [art] Signing Cert with AUTHO
35,717,260 UART: RITY.KEYID = 7
37,428,534 UART: [art] Erasing AUTHORITY.KEYID = 7
37,430,036 UART: [art] PUB.X = D598EB38B40263E9D24902A6B9EFC1570F27FC514E9B483C082206093CDAAC1D543B870E2A23B398E8B85C99C7DF7187
37,437,343 UART: [art] PUB.Y = A1DDACA184B1CD1AE4FA5B6DAA13F0918AE58E612A655E498114ED9EA47A5542686ACF74AE09AFDE32BD6B78A95012D0
37,444,603 UART: [art] SIG.R = 2937F3BF843BCDABCF5489D0508CAB84982CC749BC0B4ABD899867F7E9A7B99B4454FCFBFB033D1DA4479DC00B36E671
37,452,058 UART: [art] SIG.S = DDF60DF06DA62CB6063A41F03FEE3A8D0D95F6A65492BBE795C2FD66EF7B1A702DD9CB01ACC0FC8974D98BE12F8D1AC3
38,430,559 UART: Caliptra RT
38,431,271 UART: [state] CFI Enabled
38,770,778 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,379,924 ready_for_fw is high
3,380,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,982 >>> mbox cmd response: success
14,073,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,368,913 UART:
18,369,328 UART: Running Caliptra FMC ...
18,370,522 UART:
18,370,693 UART: [state] CFI Enabled
18,434,219 UART: [fht] FMC Alias Private Key: 7
20,198,391 UART: [art] Extend RT PCRs Done
20,199,604 UART: [art] Lock RT PCRs Done
20,201,332 UART: [art] Populate DV Done
20,207,008 UART: [fht] FMC Alias Private Key: 7
20,208,662 UART: [art] Derive CDI
20,209,424 UART: [art] Store in in slot 0x4
20,267,460 UART: [art] Derive Key Pair
20,268,511 UART: [art] Store priv key in slot 0x5
22,731,774 UART: [art] Derive Key Pair - Done
22,744,799 UART: [art] Signing Cert with AUTHO
22,746,136 UART: RITY.KEYID = 7
24,457,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,804 UART: [art] PUB.X = 1EFE048B539298B6D1517CBE8DD5AAADDF352A00E1EF81799985CB60C02057AA7ED52DE7C38E424215449464ED92F4A8
24,466,068 UART: [art] PUB.Y = 32898D4B5A1BE5FC315C2A36CE24FA51B13050FCEE13AD5D4EE73C5B166FF81E732C459B1DAD83A922061F225FADF2FC
24,473,359 UART: [art] SIG.R = AD04D8EDF5661FFFF687C5784C759364349B43F0C72486E458321F8C3F3D32E64305F1D92EC2FDFB3DFCB929FED2AA17
24,480,751 UART: [art] SIG.S = BE12BACFA429DD5E5EA3B3296D83634F3D4D3897FCB10A417A72BF80B4B35EF083DF1433A1F3BA4D40EE13E20034FCE1
25,459,344 UART: Caliptra RT
25,460,056 UART: [state] CFI Enabled
25,626,847 UART: [rt] RT listening for mailbox commands...
32,603,299 >>> mbox cmd response: success
32,638,851 UART:
32,639,128 UART: Running Caliptra FMC ...
32,640,169 UART:
32,640,326 UART: [state] CFI Enabled
32,742,680 UART: [art] Extend RT PCRs Done
32,743,883 UART: [art] Lock RT PCRs Done
32,745,551 UART: [art] Populate DV Done
32,750,977 UART: [fht] FMC Alias Private Key: 7
32,752,518 UART: [art] Derive CDI
32,753,333 UART: [art] Store in in slot 0x4
32,811,884 UART: [art] Derive Key Pair
32,812,881 UART: [art] Store priv key in slot 0x5
35,275,605 UART: [art] Derive Key Pair - Done
35,288,383 UART: [art] Signing Cert with AUTHO
35,289,680 UART: RITY.KEYID = 7
37,001,815 UART: [art] Erasing AUTHORITY.KEYID = 7
37,003,326 UART: [art] PUB.X = B5DCD5FD2D4517208F0889B40501D47599CB2E3B13BAD373166BE8B93D404B8989ACEDAE9CDF57437C33981381B36BE2
37,010,579 UART: [art] PUB.Y = B7EAD7A693EB372C347FF37EE67F0F89961580CA2223D11D5546097143EA856D982B563705DB94D56732D816CEAAC9CC
37,017,833 UART: [art] SIG.R = CB2AB26318473B5142493802BF0340EBCF4FE0B842D01F4F1C19378A8FAA85779B8D82A17D92D0FFB6C63B6F416CFCB9
37,025,241 UART: [art] SIG.S = 44537E98266D78285BFD92CE24C11C39DD8FEC1033968DBB0DA8A51E7622A2D6B0BDBB17FDCB8637771D6E9F10B654EE
38,004,081 UART: Caliptra RT
38,004,804 UART: [state] CFI Enabled
38,341,979 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,340 UART:
192,711 UART: Running Caliptra ROM ...
194,026 UART:
603,404 UART: [state] CFI Enabled
619,168 UART: [state] LifecycleState = Unprovisioned
621,048 UART: [state] DebugLocked = No
623,202 UART: [state] WD Timer not started. Device not locked for debugging
626,443 UART: [kat] SHA2-256
805,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,189 UART: [kat] ++
817,710 UART: [kat] sha1
829,858 UART: [kat] SHA2-256
832,923 UART: [kat] SHA2-384
839,567 UART: [kat] SHA2-512-ACC
842,539 UART: [kat] ECC-384
3,285,295 UART: [kat] HMAC-384Kdf
3,297,871 UART: [kat] LMS
3,827,335 UART: [kat] --
3,830,904 UART: [cold-reset] ++
3,833,485 UART: [fht] FHT @ 0x50003400
3,845,163 UART: [idev] ++
3,845,716 UART: [idev] CDI.KEYID = 6
3,846,661 UART: [idev] SUBJECT.KEYID = 7
3,847,891 UART: [idev] UDS.KEYID = 0
3,848,785 ready_for_fw is high
3,849,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,854 UART: [idev] Erasing UDS.KEYID = 0
6,320,603 UART: [idev] Sha1 KeyId Algorithm
6,343,355 UART: [idev] --
6,346,204 UART: [ldev] ++
6,346,775 UART: [ldev] CDI.KEYID = 6
6,347,654 UART: [ldev] SUBJECT.KEYID = 5
6,348,773 UART: [ldev] AUTHORITY.KEYID = 7
6,350,095 UART: [ldev] FE.KEYID = 1
6,362,334 UART: [ldev] Erasing FE.KEYID = 1
8,832,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,881 UART: [ldev] --
10,622,045 UART: [fwproc] Wait for Commands...
10,624,024 UART: [fwproc] Recv command 0x46574c44
10,626,113 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,953 >>> mbox cmd response: success
14,498,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,643,137 UART: [afmc] ++
14,643,792 UART: [afmc] CDI.KEYID = 6
14,644,680 UART: [afmc] SUBJECT.KEYID = 7
14,645,692 UART: [afmc] AUTHORITY.KEYID = 5
17,001,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,890 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,352 UART: [afmc] --
18,796,728 UART: [cold-reset] --
18,799,505 UART: [state] Locking Datavault
18,804,048 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,771 UART: [state] Locking ICCM
18,808,302 UART: [exit] Launching FMC @ 0x40000130
18,816,750 UART:
18,816,980 UART: Running Caliptra FMC ...
18,818,076 UART:
18,818,230 UART: [state] CFI Enabled
18,826,592 UART: [fht] FMC Alias Private Key: 7
20,583,072 UART: [art] Extend RT PCRs Done
20,584,294 UART: [art] Lock RT PCRs Done
20,586,149 UART: [art] Populate DV Done
20,591,771 UART: [fht] FMC Alias Private Key: 7
20,593,298 UART: [art] Derive CDI
20,594,023 UART: [art] Store in in slot 0x4
20,636,608 UART: [art] Derive Key Pair
20,637,642 UART: [art] Store priv key in slot 0x5
23,064,548 UART: [art] Derive Key Pair - Done
23,077,616 UART: [art] Signing Cert with AUTHO
23,079,099 UART: RITY.KEYID = 7
24,784,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,995 UART: [art] PUB.X = 7B9033F281A5CE443B1C4C4EFC202CE9493F9C97533C94CDA936D5D9024C53ABE813BA296039C3099E174254911B4B32
24,793,224 UART: [art] PUB.Y = 610AE8E3BBA8762B521199A6032B98861B58A4BB47C1A3806FC40053D3B83264C4196094289B4649011B9A188E442946
24,800,449 UART: [art] SIG.R = 1CB571B5566F8E5BED1A667EF6C6896FEC8D5B99B51E0E98670EBF7CFF010F4BF40311E85C65CC6731B9E24866675A48
24,807,824 UART: [art] SIG.S = 2C5931875522B55B280ACD13F76CF25C2302E90732181ABF4A31033DBE5AB023806B6BB5CFB5A092E7AD3B27E4AF438D
25,786,490 UART: Caliptra RT
25,787,203 UART: [state] CFI Enabled
25,903,641 UART: [rt] RT listening for mailbox commands...
25,906,541 UART:
25,906,788 UART: Running Caliptra ROM ...
25,907,886 UART:
25,908,094 UART: [state] CFI Enabled
25,922,783 UART: [state] LifecycleState = Unprovisioned
25,924,614 UART: [state] DebugLocked = No
25,926,926 UART: [state] WD Timer not started. Device not locked for debugging
25,931,045 UART: [kat] SHA2-256
26,110,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,121,797 UART: [kat] ++
26,122,331 UART: [kat] sha1
26,133,377 UART: [kat] SHA2-256
26,136,434 UART: [kat] SHA2-384
26,141,163 UART: [kat] SHA2-512-ACC
26,144,094 UART: [kat] ECC-384
28,583,098 UART: [kat] HMAC-384Kdf
28,596,073 UART: [kat] LMS
29,125,618 UART: [kat] --
29,130,465 UART: [update-reset] ++
32,558,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,562,642 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
32,945,925 >>> mbox cmd response: success
32,947,057 UART: [update-reset] Copying MAN_2 To MAN_1
32,969,397 UART: [update-reset Success] --
32,971,468 UART: [state] Locking Datavault
32,973,851 UART: [state] Locking PCR0, PCR1 and PCR31
32,975,547 UART: [state] Locking ICCM
32,976,530 UART: [exit] Launching FMC @ 0x40000130
32,984,972 UART:
32,985,200 UART: Running Caliptra FMC ...
32,986,221 UART:
32,986,361 UART: [state] CFI Enabled
33,030,314 UART: [art] Extend RT PCRs Done
33,031,495 UART: [art] Lock RT PCRs Done
33,032,651 UART: [art] Populate DV Done
33,038,269 UART: [fht] FMC Alias Private Key: 7
33,039,800 UART: [art] Derive CDI
33,040,527 UART: [art] Store in in slot 0x4
33,083,402 UART: [art] Derive Key Pair
33,084,440 UART: [art] Store priv key in slot 0x5
35,511,258 UART: [art] Derive Key Pair - Done
35,524,132 UART: [art] Signing Cert with AUTHO
35,525,435 UART: RITY.KEYID = 7
37,231,244 UART: [art] Erasing AUTHORITY.KEYID = 7
37,232,748 UART: [art] PUB.X = FBC2AD02587269CFDEA0ED3311EEA2B8724F4E3221B474434AC63B0BD286D227D354269B62F64623813AD2C68DCCF21A
37,240,012 UART: [art] PUB.Y = 76CC7102E0AEB44348B422F012868424D3D7FB6E0E650B37C033174945335EDB2E82D518456F454064DF75FADB1B0110
37,247,247 UART: [art] SIG.R = 33C2ACCA5FB71050C21AB9D983B126613BB89864328020C678B1121FE5DD119EB8DFB35B7110C02635684D964203BAA7
37,254,637 UART: [art] SIG.S = 97295ADD091C6400626ECE8A9DE4488BAF9BC0443B89CE645BE5D1338D63C4DC3BA34F1B24CAF3FE6FA4E436128DE26A
38,233,691 UART: Caliptra RT
38,234,404 UART: [state] CFI Enabled
38,519,767 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,697,742 ready_for_fw is high
3,698,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,014 >>> mbox cmd response: success
14,285,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,533,044 UART:
18,533,471 UART: Running Caliptra FMC ...
18,534,612 UART:
18,534,768 UART: [state] CFI Enabled
18,543,145 UART: [fht] FMC Alias Private Key: 7
20,299,578 UART: [art] Extend RT PCRs Done
20,300,829 UART: [art] Lock RT PCRs Done
20,302,562 UART: [art] Populate DV Done
20,308,206 UART: [fht] FMC Alias Private Key: 7
20,309,905 UART: [art] Derive CDI
20,310,719 UART: [art] Store in in slot 0x4
20,353,222 UART: [art] Derive Key Pair
20,354,264 UART: [art] Store priv key in slot 0x5
22,781,642 UART: [art] Derive Key Pair - Done
22,794,854 UART: [art] Signing Cert with AUTHO
22,796,151 UART: RITY.KEYID = 7
24,501,778 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,280 UART: [art] PUB.X = A316CDEA8222F9F1ABDBE3B28439D2A2989A869FFEA526C5AC68C7EDC677B8074E5F0892982ED4BFFDCBBED27C4C4BAC
24,510,756 UART: [art] PUB.Y = F8E958737DDBF65160EDA0C7C4C6201F4086A0345F32F8777C8C2B3F7BBCE99EB5FCD4EDD53BDC7135094C2119A360FC
24,517,865 UART: [art] SIG.R = 14D2D25EC6B1EDE98458A57BCB94C1ACDFC0B466BA6ED4B6CE8AA604582E00A071B2DCB1FDB2B54D870FBC30A12380B5
24,525,306 UART: [art] SIG.S = A0269A88D3345AA246AE8251A3331DD55F6A455890A456192D4783F04C4898551C9B0B31B44B64BE509562F27072B4C0
25,504,020 UART: Caliptra RT
25,504,742 UART: [state] CFI Enabled
25,622,076 UART: [rt] RT listening for mailbox commands...
32,537,567 >>> mbox cmd response: success
32,572,720 UART:
32,572,985 UART: Running Caliptra FMC ...
32,574,014 UART:
32,574,159 UART: [state] CFI Enabled
32,618,235 UART: [art] Extend RT PCRs Done
32,619,419 UART: [art] Lock RT PCRs Done
32,620,677 UART: [art] Populate DV Done
32,626,075 UART: [fht] FMC Alias Private Key: 7
32,627,716 UART: [art] Derive CDI
32,628,444 UART: [art] Store in in slot 0x4
32,671,137 UART: [art] Derive Key Pair
32,672,193 UART: [art] Store priv key in slot 0x5
35,098,719 UART: [art] Derive Key Pair - Done
35,111,516 UART: [art] Signing Cert with AUTHO
35,112,819 UART: RITY.KEYID = 7
36,818,038 UART: [art] Erasing AUTHORITY.KEYID = 7
36,819,541 UART: [art] PUB.X = 7620E63304629A1D2213D462E501AE7FA5B33A112EB045FDF858AB33D904D9E2A3349C4EE6D3E6181C1DEABDDB44859B
36,826,774 UART: [art] PUB.Y = A28EEE6912BFB64B541FDBE3EEC9E68B4881C3A07F6C7B7B6FC6E1B98AF51155141E0D7D34EAA7601B22E2D0E5512C88
36,834,097 UART: [art] SIG.R = 76F113A5C94C5A4C7592B8B0C01D1AAABFF8694E1747BF5822F14E3B56B3BBC7B105A218A505E48E9735FAF15CDDEF19
36,841,494 UART: [art] SIG.S = 621BD2467807FCEA3BF015968A806F0162927C7FF22B63F38F26E217C9F27DF1E47B850790B0E8B4D25BC3EA22861C3E
37,819,834 UART: Caliptra RT
37,820,535 UART: [state] CFI Enabled
38,110,853 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,057 UART:
192,440 UART: Running Caliptra ROM ...
193,615 UART:
193,765 UART: [state] CFI Enabled
274,944 UART: [state] LifecycleState = Unprovisioned
277,372 UART: [state] DebugLocked = No
279,109 UART: [state] WD Timer not started. Device not locked for debugging
283,912 UART: [kat] SHA2-256
473,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
484,590 UART: [kat] ++
485,040 UART: [kat] sha1
496,062 UART: [kat] SHA2-256
499,071 UART: [kat] SHA2-384
504,095 UART: [kat] SHA2-512-ACC
506,650 UART: [kat] ECC-384
2,958,898 UART: [kat] HMAC-384Kdf
2,983,973 UART: [kat] LMS
3,515,796 UART: [kat] --
3,522,213 UART: [cold-reset] ++
3,524,146 UART: [fht] FHT @ 0x50003400
3,535,407 UART: [idev] ++
3,536,131 UART: [idev] CDI.KEYID = 6
3,537,055 UART: [idev] SUBJECT.KEYID = 7
3,538,230 UART: [idev] UDS.KEYID = 0
3,539,150 ready_for_fw is high
3,539,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,683,430 UART: [idev] Erasing UDS.KEYID = 0
6,038,806 UART: [idev] Sha1 KeyId Algorithm
6,060,964 UART: [idev] --
6,064,744 UART: [ldev] ++
6,065,426 UART: [ldev] CDI.KEYID = 6
6,066,338 UART: [ldev] SUBJECT.KEYID = 5
6,067,498 UART: [ldev] AUTHORITY.KEYID = 7
6,068,730 UART: [ldev] FE.KEYID = 1
6,114,918 UART: [ldev] Erasing FE.KEYID = 1
8,618,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,580 UART: [ldev] --
10,428,397 UART: [fwproc] Wait for Commands...
10,430,710 UART: [fwproc] Recv command 0x46574c44
10,433,017 UART: [fwproc] Recv'd Img size: 114448 bytes
13,879,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,615,174 >>> mbox cmd response: success
14,615,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,760,248 UART: [afmc] ++
14,760,896 UART: [afmc] CDI.KEYID = 6
14,761,783 UART: [afmc] SUBJECT.KEYID = 7
14,762,832 UART: [afmc] AUTHORITY.KEYID = 5
17,160,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,886,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,888,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,903,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,918,536 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,933,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,957,518 UART: [afmc] --
18,961,171 UART: [cold-reset] --
18,966,061 UART: [state] Locking Datavault
18,971,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,101 UART: [state] Locking ICCM
18,976,262 UART: [exit] Launching FMC @ 0x40000130
18,984,952 UART:
18,985,227 UART: Running Caliptra FMC ...
18,986,257 UART:
18,986,404 UART: [state] CFI Enabled
19,044,297 UART: [fht] FMC Alias Private Key: 7
20,807,920 UART: [art] Extend RT PCRs Done
20,809,136 UART: [art] Lock RT PCRs Done
20,810,787 UART: [art] Populate DV Done
20,816,033 UART: [fht] FMC Alias Private Key: 7
20,817,628 UART: [art] Derive CDI
20,818,369 UART: [art] Store in in slot 0x4
20,876,103 UART: [art] Derive Key Pair
20,877,142 UART: [art] Store priv key in slot 0x5
23,340,314 UART: [art] Derive Key Pair - Done
23,353,037 UART: [art] Signing Cert with AUTHO
23,354,344 UART: RITY.KEYID = 7
25,066,197 UART: [art] Erasing AUTHORITY.KEYID = 7
25,067,704 UART: [art] PUB.X = 6A5488B7B7FEA1643664AF5B1E6C402C839F3EF23F23A053D401A98340EBBB43299DFCF3017DE5E30381F81666D3B801
25,074,944 UART: [art] PUB.Y = CC8E1BBE602D1EC741762D0BE07406C0DD8E75E2D11BE92AF6F99CAF42E5412FEFF96EE835C9ADB9EAD87DD9C7F3CF97
25,082,288 UART: [art] SIG.R = 4EA0C55DCC80BAB0120DCEC7D0FB863775074E6248EB3D3B44AE418F741931277321F16714399CA9DA6453B20BD71810
25,089,644 UART: [art] SIG.S = 193E75D624AECD97F6B48199F91363F12C1EEBE989446F8FF2587A4B55FB63D0ED06CD2578E77808E21E867061180664
26,069,196 UART: Caliptra RT
26,069,916 UART: [state] CFI Enabled
26,234,251 UART: [rt] RT listening for mailbox commands...
26,237,259 UART:
26,237,505 UART: Running Caliptra ROM ...
26,238,530 UART:
26,238,678 UART: [state] CFI Enabled
26,302,113 UART: [state] LifecycleState = Unprovisioned
26,304,204 UART: [state] DebugLocked = No
26,307,101 UART: [state] WD Timer not started. Device not locked for debugging
26,312,308 UART: [kat] SHA2-256
26,502,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,512,905 UART: [kat] ++
26,513,443 UART: [kat] sha1
26,525,469 UART: [kat] SHA2-256
26,528,453 UART: [kat] SHA2-384
26,535,848 UART: [kat] SHA2-512-ACC
26,538,470 UART: [kat] ECC-384
28,985,031 UART: [kat] HMAC-384Kdf
29,009,790 UART: [kat] LMS
29,541,331 UART: [kat] --
29,545,750 UART: [update-reset] ++
33,008,549 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,012,797 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,621,008 >>> mbox cmd response: success
33,621,694 UART: [update-reset] Copying MAN_2 To MAN_1
33,659,237 UART: [update-reset Success] --
33,662,561 UART: [state] Locking Datavault
33,666,198 UART: [state] Locking PCR0, PCR1 and PCR31
33,668,393 UART: [state] Locking ICCM
33,670,277 UART: [exit] Launching FMC @ 0x40000130
33,678,921 UART:
33,679,165 UART: Running Caliptra FMC ...
33,680,267 UART:
33,680,425 UART: [state] CFI Enabled
33,777,894 UART: [art] Extend RT PCRs Done
33,779,076 UART: [art] Lock RT PCRs Done
33,780,533 UART: [art] Populate DV Done
33,785,839 UART: [fht] FMC Alias Private Key: 7
33,787,573 UART: [art] Derive CDI
33,788,396 UART: [art] Store in in slot 0x4
33,847,113 UART: [art] Derive Key Pair
33,848,110 UART: [art] Store priv key in slot 0x5
36,310,950 UART: [art] Derive Key Pair - Done
36,323,812 UART: [art] Signing Cert with AUTHO
36,325,117 UART: RITY.KEYID = 7
38,036,616 UART: [art] Erasing AUTHORITY.KEYID = 7
38,038,149 UART: [art] PUB.X = 7C89F99784C7D4038C9CF5B359A6AB78758582F7320AA61728A014116A6E31BE9BC8C1294D1153AD63F051A175BC1F41
38,045,349 UART: [art] PUB.Y = 984E0DC70206FD4AAB569515C5936426AACC7CBC161F521DA4D283A650832545BED40977969494B95164B658940FD226
38,052,583 UART: [art] SIG.R = 1272C3123D2C38932BC9145AD7F760F21DB263FE00C46E228A0E7248267F0B48D37A4C972E2F12E23D39EE77BCC33FED
38,059,976 UART: [art] SIG.S = 6507D8E81E95FC32FF690FE5E61F7938300A43F638E91FB381F09A0535FF4C22B7B2648C9815A286837BF86FE03A0167
39,038,975 UART: Caliptra RT
39,039,667 UART: [state] CFI Enabled
39,376,869 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,416,116 ready_for_fw is high
3,416,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,711,041 >>> mbox cmd response: success
14,711,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,006,771 UART:
19,007,176 UART: Running Caliptra FMC ...
19,008,322 UART:
19,008,491 UART: [state] CFI Enabled
19,075,229 UART: [fht] FMC Alias Private Key: 7
20,839,343 UART: [art] Extend RT PCRs Done
20,840,566 UART: [art] Lock RT PCRs Done
20,841,982 UART: [art] Populate DV Done
20,847,546 UART: [fht] FMC Alias Private Key: 7
20,849,084 UART: [art] Derive CDI
20,849,821 UART: [art] Store in in slot 0x4
20,908,023 UART: [art] Derive Key Pair
20,909,026 UART: [art] Store priv key in slot 0x5
23,371,727 UART: [art] Derive Key Pair - Done
23,384,901 UART: [art] Signing Cert with AUTHO
23,386,197 UART: RITY.KEYID = 7
25,097,301 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,810 UART: [art] PUB.X = 8EA43E06D2285A09ECC4F62504E974849FD0A301A187CCB57C4C73CBE4CADDB43F08C13D6701AFCD01603D5577372248
25,106,110 UART: [art] PUB.Y = 0E491406F72B966C8F4ED199FA0AE5689CB76D49E6591184D21C32F29DDCAE7AF42A9ABEBCF6E499CA1D6C10E81610DA
25,113,362 UART: [art] SIG.R = 6FDE51DEBA51EFFA21A5811D8B3FAEEE8D91DA1A134BC49BF3609B3712859B27846EE18CDD08B48A1AB8E383BD7DE1D6
25,120,803 UART: [art] SIG.S = 81AB2991D9464B702468632A33B0EB53A01B304F4701B7AE08F031ABBC166B3ED715487A2D578033E7FF35B7CE44B3E9
26,099,554 UART: Caliptra RT
26,100,261 UART: [state] CFI Enabled
26,264,278 UART: [rt] RT listening for mailbox commands...
33,941,462 >>> mbox cmd response: success
33,976,346 UART:
33,976,641 UART: Running Caliptra FMC ...
33,977,680 UART:
33,977,833 UART: [state] CFI Enabled
34,082,448 UART: [art] Extend RT PCRs Done
34,083,655 UART: [art] Lock RT PCRs Done
34,084,931 UART: [art] Populate DV Done
34,090,435 UART: [fht] FMC Alias Private Key: 7
34,091,989 UART: [art] Derive CDI
34,092,807 UART: [art] Store in in slot 0x4
34,151,641 UART: [art] Derive Key Pair
34,152,674 UART: [art] Store priv key in slot 0x5
36,615,599 UART: [art] Derive Key Pair - Done
36,628,378 UART: [art] Signing Cert with AUTHO
36,629,686 UART: RITY.KEYID = 7
38,341,210 UART: [art] Erasing AUTHORITY.KEYID = 7
38,342,719 UART: [art] PUB.X = FFEC3EF22195B88ED890116AA0A17770112BCFF9A143CDBA4251BCABD07D1F70A2A2A44199696912A7F0A9FDBF3FE916
38,350,022 UART: [art] PUB.Y = 79FB8D32E0922F83A218EE9772C257942B3A6CEDC0DE9C10686B39563FB2432E669534BDF946E1BE42A8A71D8DCC3747
38,357,299 UART: [art] SIG.R = 701D4953B4127552A590865219EF4A2A83509E044C328E3723B9595FF63B99A1F30C7EC3372782B7770446F0527B99E0
38,364,647 UART: [art] SIG.S = C23B44D44E677A1C7DFC7E47BB5545B839F3F3A0F246E438DCEF328E01FB8499884786B622DD50F7653172E531D094F3
39,343,143 UART: Caliptra RT
39,343,855 UART: [state] CFI Enabled
39,678,927 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,440 UART:
192,843 UART: Running Caliptra ROM ...
193,928 UART:
603,541 UART: [state] CFI Enabled
616,816 UART: [state] LifecycleState = Unprovisioned
619,233 UART: [state] DebugLocked = No
620,492 UART: [state] WD Timer not started. Device not locked for debugging
624,950 UART: [kat] SHA2-256
814,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,665 UART: [kat] ++
826,209 UART: [kat] sha1
838,302 UART: [kat] SHA2-256
841,205 UART: [kat] SHA2-384
847,977 UART: [kat] SHA2-512-ACC
850,552 UART: [kat] ECC-384
3,293,964 UART: [kat] HMAC-384Kdf
3,307,385 UART: [kat] LMS
3,839,239 UART: [kat] --
3,844,822 UART: [cold-reset] ++
3,846,110 UART: [fht] FHT @ 0x50003400
3,858,709 UART: [idev] ++
3,859,365 UART: [idev] CDI.KEYID = 6
3,860,391 UART: [idev] SUBJECT.KEYID = 7
3,861,556 UART: [idev] UDS.KEYID = 0
3,862,475 ready_for_fw is high
3,862,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,565 UART: [idev] Erasing UDS.KEYID = 0
6,336,974 UART: [idev] Sha1 KeyId Algorithm
6,359,389 UART: [idev] --
6,364,441 UART: [ldev] ++
6,365,120 UART: [ldev] CDI.KEYID = 6
6,366,025 UART: [ldev] SUBJECT.KEYID = 5
6,367,122 UART: [ldev] AUTHORITY.KEYID = 7
6,368,402 UART: [ldev] FE.KEYID = 1
6,380,772 UART: [ldev] Erasing FE.KEYID = 1
8,861,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,096 UART: [ldev] --
10,652,282 UART: [fwproc] Wait for Commands...
10,654,800 UART: [fwproc] Recv command 0x46574c44
10,657,047 UART: [fwproc] Recv'd Img size: 114448 bytes
14,105,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,841,044 >>> mbox cmd response: success
14,841,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,985,159 UART: [afmc] ++
14,985,788 UART: [afmc] CDI.KEYID = 6
14,986,701 UART: [afmc] SUBJECT.KEYID = 7
14,987,800 UART: [afmc] AUTHORITY.KEYID = 5
17,354,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,723 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,321 UART: [afmc] --
19,152,852 UART: [cold-reset] --
19,156,653 UART: [state] Locking Datavault
19,160,544 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,785 UART: [state] Locking ICCM
19,164,839 UART: [exit] Launching FMC @ 0x40000130
19,173,511 UART:
19,173,737 UART: Running Caliptra FMC ...
19,174,831 UART:
19,174,987 UART: [state] CFI Enabled
19,183,104 UART: [fht] FMC Alias Private Key: 7
20,940,159 UART: [art] Extend RT PCRs Done
20,941,379 UART: [art] Lock RT PCRs Done
20,943,210 UART: [art] Populate DV Done
20,948,565 UART: [fht] FMC Alias Private Key: 7
20,950,149 UART: [art] Derive CDI
20,950,957 UART: [art] Store in in slot 0x4
20,993,544 UART: [art] Derive Key Pair
20,994,540 UART: [art] Store priv key in slot 0x5
23,421,435 UART: [art] Derive Key Pair - Done
23,434,273 UART: [art] Signing Cert with AUTHO
23,435,572 UART: RITY.KEYID = 7
25,141,013 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,513 UART: [art] PUB.X = 11C168C08317916EE7A7F4C8171875DBCD492FD94848AA3B88BB3EAAA9BA6642A78F3A4351C7D6AC75E11D77282D08B5
25,149,802 UART: [art] PUB.Y = 2FEA4D6E422B98F30BEFAB825D51B314E3E2AB6EEFACF840B6B358A58D20D1C6D3B8218ADF201129FC8FEF163C6DD172
25,157,074 UART: [art] SIG.R = 8D6866FA8501CED253F0E76ABC5278067206EEF1C7400CF106331C435FCD3F3B9C562F89053748BD9A188FAF5337FA45
25,164,526 UART: [art] SIG.S = F7B117294D6379AE42EC8FF25D25F1CC30A1C90656995C2801B520C42FAC4B5FD8C1602AFEDBAE283598B925AD8074F4
26,142,748 UART: Caliptra RT
26,143,462 UART: [state] CFI Enabled
26,261,118 UART: [rt] RT listening for mailbox commands...
26,264,232 UART:
26,264,392 UART: Running Caliptra ROM ...
26,265,428 UART:
26,265,841 UART: [state] CFI Enabled
26,277,888 UART: [state] LifecycleState = Unprovisioned
26,279,787 UART: [state] DebugLocked = No
26,282,550 UART: [state] WD Timer not started. Device not locked for debugging
26,287,432 UART: [kat] SHA2-256
26,477,349 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,488,102 UART: [kat] ++
26,488,615 UART: [kat] sha1
26,500,251 UART: [kat] SHA2-256
26,503,287 UART: [kat] SHA2-384
26,509,327 UART: [kat] SHA2-512-ACC
26,511,891 UART: [kat] ECC-384
28,953,087 UART: [kat] HMAC-384Kdf
28,966,494 UART: [kat] LMS
29,498,100 UART: [kat] --
29,502,618 UART: [update-reset] ++
32,972,131 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,975,770 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,584,034 >>> mbox cmd response: success
33,584,705 UART: [update-reset] Copying MAN_2 To MAN_1
33,622,267 UART: [update-reset Success] --
33,626,495 UART: [state] Locking Datavault
33,629,797 UART: [state] Locking PCR0, PCR1 and PCR31
33,631,987 UART: [state] Locking ICCM
33,633,865 UART: [exit] Launching FMC @ 0x40000130
33,642,500 UART:
33,642,773 UART: Running Caliptra FMC ...
33,643,872 UART:
33,644,029 UART: [state] CFI Enabled
33,688,309 UART: [art] Extend RT PCRs Done
33,689,441 UART: [art] Lock RT PCRs Done
33,691,041 UART: [art] Populate DV Done
33,696,606 UART: [fht] FMC Alias Private Key: 7
33,698,350 UART: [art] Derive CDI
33,699,156 UART: [art] Store in in slot 0x4
33,742,390 UART: [art] Derive Key Pair
33,743,420 UART: [art] Store priv key in slot 0x5
36,170,372 UART: [art] Derive Key Pair - Done
36,183,564 UART: [art] Signing Cert with AUTHO
36,184,862 UART: RITY.KEYID = 7
37,890,409 UART: [art] Erasing AUTHORITY.KEYID = 7
37,891,933 UART: [art] PUB.X = C81EBD9E1608342A8903A093DCC8E8F534A85E50970480F2C36DBEF5ED60D35B431A6C44C36C776A1DB7D7DFA1AA5AF1
37,899,169 UART: [art] PUB.Y = DC87667EA1CFFBF0B81B3E5EC22FE787F72863E3AAAFCC101C447D338627440632DBBBDE01ED20EA9140BD18DC304EBB
37,906,501 UART: [art] SIG.R = 8A57D473C4D45255ABDDACD82529B01EC4C370DC946684DBEB286F1F2A3F3616DF7601D07DAB214CA07252D00668A001
37,913,891 UART: [art] SIG.S = 921054129794165C633084EB704600F4F3C3AD12F0BC52B6505545485BEE9F76DA675D02D9A7CA63A217814BC9CC78CE
38,892,702 UART: Caliptra RT
38,893,375 UART: [state] CFI Enabled
39,176,455 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,757,645 ready_for_fw is high
3,758,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,664 >>> mbox cmd response: success
14,956,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,209,008 UART:
19,209,421 UART: Running Caliptra FMC ...
19,210,549 UART:
19,210,702 UART: [state] CFI Enabled
19,218,363 UART: [fht] FMC Alias Private Key: 7
20,975,834 UART: [art] Extend RT PCRs Done
20,977,061 UART: [art] Lock RT PCRs Done
20,978,746 UART: [art] Populate DV Done
20,984,095 UART: [fht] FMC Alias Private Key: 7
20,985,752 UART: [art] Derive CDI
20,986,568 UART: [art] Store in in slot 0x4
21,029,055 UART: [art] Derive Key Pair
21,030,094 UART: [art] Store priv key in slot 0x5
23,456,757 UART: [art] Derive Key Pair - Done
23,469,861 UART: [art] Signing Cert with AUTHO
23,471,158 UART: RITY.KEYID = 7
25,176,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,175 UART: [art] PUB.X = 91439556EAF118BD3AEB8386F877B252DF6820BD522971EE9C2DF8503762FAF7ED037D2D3C413FDB739D3B7424A89975
25,185,466 UART: [art] PUB.Y = 6EDAAE022FF9E17DE1ED9EB0EA38A11147608AED114B5B8EFE5387330E114E99EA08A00643EB7B4850895EB896A43908
25,192,712 UART: [art] SIG.R = E7FE17BD2F8453C187835920C6839F060391014A83C987B405CFDA39300C80D372714DC14C0266EDF8E02C6322B79F38
25,200,102 UART: [art] SIG.S = A28B572007E1AE93FAE465F91FB100B1D1BAC067F754CDF4CA7B39B04A6CE2B8F1187D79549DCE76ACBDFFFE4591C0BD
26,179,302 UART: Caliptra RT
26,179,998 UART: [state] CFI Enabled
26,296,701 UART: [rt] RT listening for mailbox commands...
33,889,293 >>> mbox cmd response: success
33,922,329 UART:
33,922,597 UART: Running Caliptra FMC ...
33,923,704 UART:
33,923,854 UART: [state] CFI Enabled
33,968,107 UART: [art] Extend RT PCRs Done
33,969,287 UART: [art] Lock RT PCRs Done
33,970,846 UART: [art] Populate DV Done
33,976,383 UART: [fht] FMC Alias Private Key: 7
33,977,917 UART: [art] Derive CDI
33,978,728 UART: [art] Store in in slot 0x4
34,021,640 UART: [art] Derive Key Pair
34,022,638 UART: [art] Store priv key in slot 0x5
36,449,387 UART: [art] Derive Key Pair - Done
36,462,276 UART: [art] Signing Cert with AUTHO
36,463,574 UART: RITY.KEYID = 7
38,168,870 UART: [art] Erasing AUTHORITY.KEYID = 7
38,170,371 UART: [art] PUB.X = 8D81DF24CBAB07D139C27A0BE6180310F9869A959E0466F56B37B58171315059D4FFA2911CC5A545A7D4A66F249B1B5F
38,177,605 UART: [art] PUB.Y = F42755A8D575645F420A9AB5D1E7CB1ABA68DEFE96B9BDD64D7FA261A0EAA630B53E033FA8520B469DF8448C10A140CF
38,184,880 UART: [art] SIG.R = DDC491787CA643870F8181708ADD31A2DB582E9809AF9486E6758F50617001C17109F8927240410042F5B3A7D3752633
38,192,209 UART: [art] SIG.S = 39BFD17CE1813E17590018091B7DFF1E4DB0F7253D22A48A70D5D51B4FDC40517B297EFE1AC241A7A43EBF66B14F432B
39,171,298 UART: Caliptra RT
39,172,009 UART: [state] CFI Enabled
39,463,630 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,566 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,031 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 ready_for_fw is high
1,480,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,682 UART: [idev] Erasing UDS.KEYID = 0
1,504,742 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,520,927 UART: [ldev] Erasing FE.KEYID = 1
1,546,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,408 UART: [ldev] --
1,585,765 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 114448 bytes
2,886,710 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,227 >>> mbox cmd response: success
3,080,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,081,427 UART: [afmc] ++
3,081,595 UART: [afmc] CDI.KEYID = 6
3,081,957 UART: [afmc] SUBJECT.KEYID = 7
3,082,382 UART: [afmc] AUTHORITY.KEYID = 5
3,116,987 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,832 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,522 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,407 UART: [afmc] --
3,160,357 UART: [cold-reset] --
3,161,051 UART: [state] Locking Datavault
3,162,170 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,774 UART: [state] Locking ICCM
3,163,416 UART: [exit] Launching FMC @ 0x40000130
3,168,745 UART:
3,168,761 UART: Running Caliptra FMC ...
3,169,169 UART:
3,169,223 UART: [state] CFI Enabled
3,179,636 UART: [fht] FMC Alias Private Key: 7
3,287,045 UART: [art] Extend RT PCRs Done
3,287,473 UART: [art] Lock RT PCRs Done
3,289,059 UART: [art] Populate DV Done
3,297,410 UART: [fht] FMC Alias Private Key: 7
3,298,352 UART: [art] Derive CDI
3,298,632 UART: [art] Store in in slot 0x4
3,384,247 UART: [art] Derive Key Pair
3,384,607 UART: [art] Store priv key in slot 0x5
3,398,153 UART: [art] Derive Key Pair - Done
3,413,330 UART: [art] Signing Cert with AUTHO
3,413,810 UART: RITY.KEYID = 7
3,428,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,505 UART: [art] PUB.X = 96B5F2B14F81D6102B74B9A5E693C422B609F87D370DD96A540D63F8B79DECCA5C36B24B6E06B3165CB0459709924BFB
3,436,266 UART: [art] PUB.Y = A1EA493D3771AC0C1A57480083C92420D96E708CE568E83AAD6AB29F7C1833B37A5D1E8AC3C477E58C57C3BA92664EB7
3,443,199 UART: [art] SIG.R = ACBF0A60E766A1956C8A93B90D7498A9946E1BD315E0DAF10A4224F484499497C8154342CA300429B4BBECF5B13FDDDE
3,449,967 UART: [art] SIG.S = F09FD6FA89790285DB009DB4DCFD1492BFBDCDB7C1B03C545C067BA67E51FD51137CD847EDC0FEEFF363AEC3B7DD9D0D
3,474,169 UART: Caliptra RT
3,474,422 UART: [state] CFI Enabled
3,581,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,411 UART:
3,583,427 UART: Running Caliptra ROM ...
3,583,835 UART:
3,583,889 UART: [state] CFI Enabled
3,586,455 UART: [state] LifecycleState = Unprovisioned
3,587,110 UART: [state] DebugLocked = No
3,587,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,183 UART: [kat] SHA2-256
4,383,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,229 UART: [kat] ++
4,387,381 UART: [kat] sha1
4,391,521 UART: [kat] SHA2-256
4,393,459 UART: [kat] SHA2-384
4,396,166 UART: [kat] SHA2-512-ACC
4,398,066 UART: [kat] ECC-384
4,403,703 UART: [kat] HMAC-384Kdf
4,408,323 UART: [kat] LMS
4,976,519 UART: [kat] --
4,977,382 UART: [update-reset] ++
6,313,059 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,314,099 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,464,149 >>> mbox cmd response: success
6,464,310 UART: [update-reset] Copying MAN_2 To MAN_1
6,472,324 UART: [update-reset Success] --
6,473,319 UART: [state] Locking Datavault
6,474,015 UART: [state] Locking PCR0, PCR1 and PCR31
6,474,619 UART: [state] Locking ICCM
6,475,167 UART: [exit] Launching FMC @ 0x40000130
6,480,496 UART:
6,480,512 UART: Running Caliptra FMC ...
6,480,920 UART:
6,480,974 UART: [state] CFI Enabled
6,570,393 UART: [art] Extend RT PCRs Done
6,570,821 UART: [art] Lock RT PCRs Done
6,572,148 UART: [art] Populate DV Done
6,580,333 UART: [fht] FMC Alias Private Key: 7
6,581,355 UART: [art] Derive CDI
6,581,635 UART: [art] Store in in slot 0x4
6,667,686 UART: [art] Derive Key Pair
6,668,046 UART: [art] Store priv key in slot 0x5
6,681,190 UART: [art] Derive Key Pair - Done
6,696,112 UART: [art] Signing Cert with AUTHO
6,696,592 UART: RITY.KEYID = 7
6,712,106 UART: [art] Erasing AUTHORITY.KEYID = 7
6,712,871 UART: [art] PUB.X = FBFEFB853BD40675A198262CAD0FDCB22A8FB621B51706DAB20A2420A583ACC0E7B4CBB8334CBFD1C7E70B4F3EACD07B
6,719,656 UART: [art] PUB.Y = F13702E76160BE856762ABEE4F284827199EA8A81DEEE5C82B9B05688EDF3533874DCEEC2ECA9E544790E777FD441429
6,726,606 UART: [art] SIG.R = FB6B43BFA0B6EA95CB84EBC4EB86BC2FFFE9EDBE3586698846FCAFFED3CC4BC517E6F31F5DAF4501391F296E664C30E9
6,733,405 UART: [art] SIG.S = 28BCBF9467F29A4EC972847C524DDE060F6B01B6F911DF3BAE987C2DA4E97AA81C38B09EC6565DB755DB385F647C77A6
6,757,437 UART: Caliptra RT
6,757,690 UART: [state] CFI Enabled
7,042,323 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,163 ready_for_fw is high
1,363,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,227 >>> mbox cmd response: success
2,930,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,173 UART:
2,991,189 UART: Running Caliptra FMC ...
2,991,597 UART:
2,991,651 UART: [state] CFI Enabled
3,002,022 UART: [fht] FMC Alias Private Key: 7
3,109,867 UART: [art] Extend RT PCRs Done
3,110,295 UART: [art] Lock RT PCRs Done
3,111,969 UART: [art] Populate DV Done
3,120,242 UART: [fht] FMC Alias Private Key: 7
3,121,356 UART: [art] Derive CDI
3,121,636 UART: [art] Store in in slot 0x4
3,207,317 UART: [art] Derive Key Pair
3,207,677 UART: [art] Store priv key in slot 0x5
3,220,549 UART: [art] Derive Key Pair - Done
3,235,037 UART: [art] Signing Cert with AUTHO
3,235,517 UART: RITY.KEYID = 7
3,250,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,432 UART: [art] PUB.X = F1E7275880AECF5BE35274390F2E7F488FA250324F8B18B3A2A28FF35C2E7397E613AC5940326291DCD201E6150351FA
3,258,193 UART: [art] PUB.Y = 59015BFC7661B8E6701D6FE0CF60647EBB98DF8C40D134546A0B1B144911BF0C5FBD3020AF4C307ABEB2E4A4D8F6608C
3,265,148 UART: [art] SIG.R = DF7100B27F44740F99FA6BF29F6996B14404C6E052732141E2BA5AC484343796C6561FE34FDD814E1416B23C01D781DB
3,271,885 UART: [art] SIG.S = 020B0D78075F0CF361EF2F8F27A08B1B1E2CA4A0228E8208052C4EE627090EDEFA3CDDB18BD14B4FDFB6EED9CB1E46F7
3,295,007 UART: Caliptra RT
3,295,260 UART: [state] CFI Enabled
3,403,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,558 >>> mbox cmd response: success
6,181,849 UART:
6,181,865 UART: Running Caliptra FMC ...
6,182,273 UART:
6,182,327 UART: [state] CFI Enabled
6,271,302 UART: [art] Extend RT PCRs Done
6,271,730 UART: [art] Lock RT PCRs Done
6,272,941 UART: [art] Populate DV Done
6,281,212 UART: [fht] FMC Alias Private Key: 7
6,282,164 UART: [art] Derive CDI
6,282,444 UART: [art] Store in in slot 0x4
6,368,199 UART: [art] Derive Key Pair
6,368,559 UART: [art] Store priv key in slot 0x5
6,381,903 UART: [art] Derive Key Pair - Done
6,396,885 UART: [art] Signing Cert with AUTHO
6,397,365 UART: RITY.KEYID = 7
6,412,417 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,182 UART: [art] PUB.X = D0EAE018B2855EBD8709F0F15292E49FAA152F8B8DA6C07904EB51BE380C16816B9A62D1451D7C4B9329D58F5E071A2A
6,419,948 UART: [art] PUB.Y = 0CE378ED1DFE08E26A00B81112B20678F370667D1BD9E8309420C7DA75607B27106E97A066EA773F55D36720560CBDF4
6,426,862 UART: [art] SIG.R = 3262FD41C2C1C2090F7A040E41FC420612163A6F9F0127A0185FBE687E9AE96E433F9C913059F4F7013A295ACD94E077
6,433,609 UART: [art] SIG.S = 5C4A0D5603A3113D30202DC0FA94D54FA1512720ABF3E18392A1DA7D2DB7AA803740BAA1834621F04D28D742003FFDAF
6,457,772 UART: Caliptra RT
6,458,025 UART: [state] CFI Enabled
6,735,619 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
903,069 UART: [kat] HMAC-384Kdf
907,799 UART: [kat] LMS
1,475,995 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,296 UART: [fht] Storing FHT @ 0x50003400
1,480,047 UART: [idev] ++
1,480,215 UART: [idev] CDI.KEYID = 6
1,480,575 UART: [idev] SUBJECT.KEYID = 7
1,480,999 UART: [idev] UDS.KEYID = 0
1,481,344 ready_for_fw is high
1,481,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,263 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,002 UART: [ldev] Erasing FE.KEYID = 1
1,547,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,295 UART: [ldev] --
1,586,618 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 114448 bytes
2,887,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,253 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,654 >>> mbox cmd response: success
3,079,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,080,790 UART: [afmc] ++
3,080,958 UART: [afmc] CDI.KEYID = 6
3,081,320 UART: [afmc] SUBJECT.KEYID = 7
3,081,745 UART: [afmc] AUTHORITY.KEYID = 5
3,116,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,423 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,113 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,850 UART: [afmc] --
3,159,822 UART: [cold-reset] --
3,160,876 UART: [state] Locking Datavault
3,161,939 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,543 UART: [state] Locking ICCM
3,163,045 UART: [exit] Launching FMC @ 0x40000130
3,168,374 UART:
3,168,390 UART: Running Caliptra FMC ...
3,168,798 UART:
3,168,941 UART: [state] CFI Enabled
3,179,776 UART: [fht] FMC Alias Private Key: 7
3,287,479 UART: [art] Extend RT PCRs Done
3,287,907 UART: [art] Lock RT PCRs Done
3,289,701 UART: [art] Populate DV Done
3,297,980 UART: [fht] FMC Alias Private Key: 7
3,298,932 UART: [art] Derive CDI
3,299,212 UART: [art] Store in in slot 0x4
3,384,933 UART: [art] Derive Key Pair
3,385,293 UART: [art] Store priv key in slot 0x5
3,398,777 UART: [art] Derive Key Pair - Done
3,413,566 UART: [art] Signing Cert with AUTHO
3,414,046 UART: RITY.KEYID = 7
3,429,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,945 UART: [art] PUB.X = E6242D63057961609E85AD4E325A58743144BEC4BC319AA7EA192003196105B58409BCD3503C9D97BBA4530EBABFDA55
3,436,702 UART: [art] PUB.Y = 777D293E89684CDBE1BC05FB8C6FF6DEDDAABDD3D354CC4FA9D4EC1A71C7467A29F8588EBD3BCAD591129FE408638063
3,443,670 UART: [art] SIG.R = 51396338F239C7BB1DC5D43691B8B2DDADF709CCD017757480E3C45A83740EC9537C1A394A340C887928E7308585D705
3,450,422 UART: [art] SIG.S = F7448E21DC6A579D4B5A7CB4C366AAF2FC251E8932CBA5C292EAFF02298B2A375A3447D0DC70969B7A5781E73A3C6CC4
3,474,490 UART: Caliptra RT
3,474,835 UART: [state] CFI Enabled
3,583,212 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,885 UART:
3,584,901 UART: Running Caliptra ROM ...
3,585,309 UART:
3,585,450 UART: [state] CFI Enabled
3,588,324 UART: [state] LifecycleState = Unprovisioned
3,588,979 UART: [state] DebugLocked = No
3,589,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,172 UART: [kat] SHA2-256
4,385,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,218 UART: [kat] ++
4,389,370 UART: [kat] sha1
4,393,782 UART: [kat] SHA2-256
4,395,720 UART: [kat] SHA2-384
4,398,555 UART: [kat] SHA2-512-ACC
4,400,455 UART: [kat] ECC-384
4,406,168 UART: [kat] HMAC-384Kdf
4,410,700 UART: [kat] LMS
4,978,896 UART: [kat] --
4,979,579 UART: [update-reset] ++
6,315,218 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,316,428 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,466,478 >>> mbox cmd response: success
6,466,619 UART: [update-reset] Copying MAN_2 To MAN_1
6,474,633 UART: [update-reset Success] --
6,475,710 UART: [state] Locking Datavault
6,476,648 UART: [state] Locking PCR0, PCR1 and PCR31
6,477,252 UART: [state] Locking ICCM
6,477,740 UART: [exit] Launching FMC @ 0x40000130
6,483,069 UART:
6,483,085 UART: Running Caliptra FMC ...
6,483,493 UART:
6,483,636 UART: [state] CFI Enabled
6,572,977 UART: [art] Extend RT PCRs Done
6,573,405 UART: [art] Lock RT PCRs Done
6,574,872 UART: [art] Populate DV Done
6,583,047 UART: [fht] FMC Alias Private Key: 7
6,584,039 UART: [art] Derive CDI
6,584,319 UART: [art] Store in in slot 0x4
6,669,780 UART: [art] Derive Key Pair
6,670,140 UART: [art] Store priv key in slot 0x5
6,683,606 UART: [art] Derive Key Pair - Done
6,698,692 UART: [art] Signing Cert with AUTHO
6,699,172 UART: RITY.KEYID = 7
6,714,544 UART: [art] Erasing AUTHORITY.KEYID = 7
6,715,309 UART: [art] PUB.X = 9B2CB56D6298487E80DF49565933EEB4D02ADC9B125CD0D1DE2B605B26F9F65437365D9E1AF9C4D89A34C756167D9252
6,722,083 UART: [art] PUB.Y = A030B6249807914DE2C943108319075C479D6E1A92129A819BCF534189EFB1EE8900E628D4EF4F5A781BD6B0F07CE283
6,729,003 UART: [art] SIG.R = 25DFA2EB536CC3A2467384877FEAA6DB187DD4A260614AC446712763F95BDC0BB495D41B4A0E8A1653122F7B9874343A
6,735,771 UART: [art] SIG.S = CA902270F1D7952F879E746F184CAB6BC258ED4C3F0ECEB899DFE7CCF45DA1CD02D8430F88BF4AA1E179BE06C9BE4DBA
6,760,398 UART: Caliptra RT
6,760,743 UART: [state] CFI Enabled
7,038,558 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,492 ready_for_fw is high
1,363,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,452 >>> mbox cmd response: success
2,931,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,993,032 UART:
2,993,048 UART: Running Caliptra FMC ...
2,993,456 UART:
2,993,599 UART: [state] CFI Enabled
3,004,154 UART: [fht] FMC Alias Private Key: 7
3,112,427 UART: [art] Extend RT PCRs Done
3,112,855 UART: [art] Lock RT PCRs Done
3,114,409 UART: [art] Populate DV Done
3,122,862 UART: [fht] FMC Alias Private Key: 7
3,123,832 UART: [art] Derive CDI
3,124,112 UART: [art] Store in in slot 0x4
3,209,511 UART: [art] Derive Key Pair
3,209,871 UART: [art] Store priv key in slot 0x5
3,223,467 UART: [art] Derive Key Pair - Done
3,238,661 UART: [art] Signing Cert with AUTHO
3,239,141 UART: RITY.KEYID = 7
3,254,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,176 UART: [art] PUB.X = 78F5476DA4FC26252A146A756C5540F5EE3D51287DD6268E8809B4587669F2A73D47846DEFD50395472FB3A10B42A19A
3,261,933 UART: [art] PUB.Y = 191EBC0576B4656DF104C8D9A27216247556A72ECC5AA28C3A29F5D98E59406539D7F1776DE33F3862EB8335B5526C7A
3,268,875 UART: [art] SIG.R = 010D1FB558AB414E769CB8B547234F4051C8903BE61534544D2EE680A4014FE6CB842B13AA8B41FFF2F090386AE46291
3,275,636 UART: [art] SIG.S = F793F84E8C778BB812C01DB9A74BF6170E6142EFCD398BDD4AAEF46592F7B2DFC2633C1028B8B8D5BC256F65767BCE21
3,299,428 UART: Caliptra RT
3,299,773 UART: [state] CFI Enabled
3,407,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,574 >>> mbox cmd response: success
6,185,171 UART:
6,185,187 UART: Running Caliptra FMC ...
6,185,595 UART:
6,185,738 UART: [state] CFI Enabled
6,275,143 UART: [art] Extend RT PCRs Done
6,275,571 UART: [art] Lock RT PCRs Done
6,276,690 UART: [art] Populate DV Done
6,284,753 UART: [fht] FMC Alias Private Key: 7
6,285,703 UART: [art] Derive CDI
6,285,983 UART: [art] Store in in slot 0x4
6,371,688 UART: [art] Derive Key Pair
6,372,048 UART: [art] Store priv key in slot 0x5
6,385,682 UART: [art] Derive Key Pair - Done
6,400,372 UART: [art] Signing Cert with AUTHO
6,400,852 UART: RITY.KEYID = 7
6,416,186 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,951 UART: [art] PUB.X = B98DF497BBE2AD8A17CB91D7ABC3C25837938BE30595C6F91D8BC20A10954B7D53A95587360A7B662A5A7C4079FCD675
6,423,720 UART: [art] PUB.Y = CDFF00355DF1740ABE1535A5500FBFD9BD34B25B511CCFD1C6C4C2471C614532EBCF700084DDAD8564437ED5D4911979
6,430,632 UART: [art] SIG.R = A713DB46721A0A89BF737AE9A629EB1B2C76B6C761C23EA4ADE2DCDC941652C1C1DE37F5D84A9569DA2F609997F9995A
6,437,413 UART: [art] SIG.S = 7EFAC21078A9FC66AB0404C369686B16E351AC720A6CED0F63F661009DA06605F29EC1970795BA8FE2E8E0340527EC04
6,461,342 UART: Caliptra RT
6,461,687 UART: [state] CFI Enabled
6,746,588 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
86,937 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
893,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,951 UART: [kat] ++
898,103 UART: [kat] sha1
902,205 UART: [kat] SHA2-256
904,145 UART: [kat] SHA2-384
906,928 UART: [kat] SHA2-512-ACC
908,829 UART: [kat] ECC-384
918,464 UART: [kat] HMAC-384Kdf
923,208 UART: [kat] LMS
1,171,536 UART: [kat] --
1,172,361 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,498 UART: [idev] ++
1,175,666 UART: [idev] CDI.KEYID = 6
1,176,026 UART: [idev] SUBJECT.KEYID = 7
1,176,450 UART: [idev] UDS.KEYID = 0
1,176,795 ready_for_fw is high
1,176,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,264 UART: [idev] Erasing UDS.KEYID = 0
1,201,465 UART: [idev] Sha1 KeyId Algorithm
1,210,087 UART: [idev] --
1,210,931 UART: [ldev] ++
1,211,099 UART: [ldev] CDI.KEYID = 6
1,211,462 UART: [ldev] SUBJECT.KEYID = 5
1,211,888 UART: [ldev] AUTHORITY.KEYID = 7
1,212,351 UART: [ldev] FE.KEYID = 1
1,217,359 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,619 UART: [ldev] --
1,283,054 UART: [fwproc] Wait for Commands...
1,283,874 UART: [fwproc] Recv command 0x46574c44
1,284,602 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,584 >>> mbox cmd response: success
2,775,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,626 UART: [afmc] ++
2,776,794 UART: [afmc] CDI.KEYID = 6
2,777,156 UART: [afmc] SUBJECT.KEYID = 7
2,777,581 UART: [afmc] AUTHORITY.KEYID = 5
2,812,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,463 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,321 UART: [afmc] --
2,855,211 UART: [cold-reset] --
2,856,135 UART: [state] Locking Datavault
2,857,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,988 UART: [state] Locking ICCM
2,858,530 UART: [exit] Launching FMC @ 0x40000130
2,863,859 UART:
2,863,875 UART: Running Caliptra FMC ...
2,864,283 UART:
2,864,337 UART: [state] CFI Enabled
2,875,042 UART: [fht] FMC Alias Private Key: 7
2,983,199 UART: [art] Extend RT PCRs Done
2,983,627 UART: [art] Lock RT PCRs Done
2,985,301 UART: [art] Populate DV Done
2,993,736 UART: [fht] FMC Alias Private Key: 7
2,994,722 UART: [art] Derive CDI
2,995,002 UART: [art] Store in in slot 0x4
3,081,019 UART: [art] Derive Key Pair
3,081,379 UART: [art] Store priv key in slot 0x5
3,094,411 UART: [art] Derive Key Pair - Done
3,109,415 UART: [art] Signing Cert with AUTHO
3,109,895 UART: RITY.KEYID = 7
3,124,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,694 UART: [art] PUB.X = 2701CEA4EEECF87FB0D1CF769D0C19F78FD7D88CB4D2DA5B8B9828D4CC329FC815107E0ED5951078F845F8DB1088B267
3,132,471 UART: [art] PUB.Y = 7CF4FFEA7174EAD0E0F2C5A8FFE44AFD4DB8487E6E84EB1A0204EB54A09D35C73DC9645AED59176E21ABB60A4D277E89
3,139,436 UART: [art] SIG.R = B7E3D909266018044C08977694CA2286EF6020FF2FFE2C0801D085583D3D5AA773BB2C65FD8CE8B7D40C29CF57FB498A
3,146,194 UART: [art] SIG.S = D665F67E4E82A713B37166699E1737D5068858047D37400B8B04DF5CA8F42C7AB29AD14DC6AB9EC5DD7E38F0249DFF43
3,170,173 UART: Caliptra RT
3,170,426 UART: [state] CFI Enabled
3,278,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,772 UART:
3,280,788 UART: Running Caliptra ROM ...
3,281,196 UART:
3,281,251 UART: [state] CFI Enabled
3,283,871 UART: [state] LifecycleState = Unprovisioned
3,284,526 UART: [state] DebugLocked = No
3,285,216 UART: [state] WD Timer not started. Device not locked for debugging
3,286,498 UART: [kat] SHA2-256
4,092,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,273 UART: [kat] ++
4,096,425 UART: [kat] sha1
4,100,495 UART: [kat] SHA2-256
4,102,435 UART: [kat] SHA2-384
4,105,094 UART: [kat] SHA2-512-ACC
4,106,994 UART: [kat] ECC-384
4,116,879 UART: [kat] HMAC-384Kdf
4,121,507 UART: [kat] LMS
4,369,835 UART: [kat] --
4,370,889 UART: [update-reset] ++
5,686,622 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,687,629 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,837,627 >>> mbox cmd response: success
5,837,878 UART: [update-reset] Copying MAN_2 To MAN_1
5,845,892 UART: [update-reset Success] --
5,846,833 UART: [state] Locking Datavault
5,847,571 UART: [state] Locking PCR0, PCR1 and PCR31
5,848,175 UART: [state] Locking ICCM
5,848,669 UART: [exit] Launching FMC @ 0x40000130
5,853,998 UART:
5,854,014 UART: Running Caliptra FMC ...
5,854,422 UART:
5,854,476 UART: [state] CFI Enabled
5,942,987 UART: [art] Extend RT PCRs Done
5,943,415 UART: [art] Lock RT PCRs Done
5,944,470 UART: [art] Populate DV Done
5,952,671 UART: [fht] FMC Alias Private Key: 7
5,953,661 UART: [art] Derive CDI
5,953,941 UART: [art] Store in in slot 0x4
6,039,684 UART: [art] Derive Key Pair
6,040,044 UART: [art] Store priv key in slot 0x5
6,053,002 UART: [art] Derive Key Pair - Done
6,068,148 UART: [art] Signing Cert with AUTHO
6,068,628 UART: RITY.KEYID = 7
6,083,712 UART: [art] Erasing AUTHORITY.KEYID = 7
6,084,477 UART: [art] PUB.X = 2E1CE89A978CB537E7A2C3E957BA5924220AC41828E3A37517A9DD1549809968A964EB434F066E0C217895374BF1E56D
6,091,234 UART: [art] PUB.Y = 494BAAC1E72A0E57C47A7547BDD7ACA09A479A926C18065822282BA96034EF15200045F391F59F22072C937CEC81FB0D
6,098,152 UART: [art] SIG.R = FA1A24295AAB97BBCDCAD3AA651813ABA3A1DA45604A073B57D45F2861A26564C70E23F05ECF75E42B6EC90401F598E6
6,104,924 UART: [art] SIG.S = E8DAA9ADFE83C7E5198FE207223B3AC949AFA09BE09EDF890443DEE808ECDA551AFF17A4EE846F7523CA39D1FE7B9E80
6,128,822 UART: Caliptra RT
6,129,075 UART: [state] CFI Enabled
6,413,531 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 ready_for_fw is high
1,059,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,321 >>> mbox cmd response: success
2,628,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,690,371 UART:
2,690,387 UART: Running Caliptra FMC ...
2,690,795 UART:
2,690,849 UART: [state] CFI Enabled
2,700,802 UART: [fht] FMC Alias Private Key: 7
2,808,797 UART: [art] Extend RT PCRs Done
2,809,225 UART: [art] Lock RT PCRs Done
2,811,165 UART: [art] Populate DV Done
2,819,270 UART: [fht] FMC Alias Private Key: 7
2,820,228 UART: [art] Derive CDI
2,820,508 UART: [art] Store in in slot 0x4
2,905,649 UART: [art] Derive Key Pair
2,906,009 UART: [art] Store priv key in slot 0x5
2,919,287 UART: [art] Derive Key Pair - Done
2,934,371 UART: [art] Signing Cert with AUTHO
2,934,851 UART: RITY.KEYID = 7
2,950,027 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,792 UART: [art] PUB.X = 8A8D4A6D0B7456A3AB0B25E542932EAD6E8E8FCA461E7B20E1DC515A2759F8C657C7A587F1ED1495F40DC843F20AEC06
2,957,561 UART: [art] PUB.Y = B6E53F1EB97201D4FAC649D9BA9AA167D064DEA0F14F24F2FD7A27FBBB4270BEC46829B5E7138901A93D2D0CF092416F
2,964,518 UART: [art] SIG.R = 74A5DC2E4F028CC8F4011FA04B0C9F9EAE232FC74C0F3D20839C616D86F04996FE22DAA599A7F0DBF8DD03CDDDCED356
2,971,297 UART: [art] SIG.S = 58FA90CCDB85F55417CB6572D5042C6D523D9F5804A84CC5DEFAEF0EDAFB4A792F2C014568EB1BED44187A97FE294944
2,994,606 UART: Caliptra RT
2,994,859 UART: [state] CFI Enabled
3,102,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,543,046 >>> mbox cmd response: success
5,556,284 UART:
5,556,300 UART: Running Caliptra FMC ...
5,556,708 UART:
5,556,762 UART: [state] CFI Enabled
5,645,477 UART: [art] Extend RT PCRs Done
5,645,905 UART: [art] Lock RT PCRs Done
5,647,114 UART: [art] Populate DV Done
5,655,487 UART: [fht] FMC Alias Private Key: 7
5,656,563 UART: [art] Derive CDI
5,656,843 UART: [art] Store in in slot 0x4
5,742,420 UART: [art] Derive Key Pair
5,742,780 UART: [art] Store priv key in slot 0x5
5,755,686 UART: [art] Derive Key Pair - Done
5,770,311 UART: [art] Signing Cert with AUTHO
5,770,791 UART: RITY.KEYID = 7
5,785,823 UART: [art] Erasing AUTHORITY.KEYID = 7
5,786,588 UART: [art] PUB.X = 9D687135AA7BCB4F1A3965D72CC1BAB333EB3A2F14BB6827CE88F2AE14EB9F71C7B1DE3519671EB4E3FDBF3EF924FAFE
5,793,386 UART: [art] PUB.Y = 5B1D07FE6C2000130F0760B08FE2096065C744101282E0E5732D61576D48BC74ED13C48B0251E1A61BA3847DE7024FF2
5,800,290 UART: [art] SIG.R = 8EC7BD7301B372339B6979BCC23ECB48C03C15894ECA6560F403D2D8ADBE9BE1DA4DB89CFF5AF0229DBE71D8F209CE72
5,807,073 UART: [art] SIG.S = 5B6AD9F82A21FC77EEF6BA9E7BA00C8F046264979A45C5F0BAE4B422DBC28C560EB927FFA085797EBD845412F8DFEEE0
5,830,227 UART: Caliptra RT
5,830,480 UART: [state] CFI Enabled
6,112,423 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,143 UART: [kat] SHA2-512-ACC
909,044 UART: [kat] ECC-384
919,013 UART: [kat] HMAC-384Kdf
923,631 UART: [kat] LMS
1,171,959 UART: [kat] --
1,172,962 UART: [cold-reset] ++
1,173,454 UART: [fht] FHT @ 0x50003400
1,176,297 UART: [idev] ++
1,176,465 UART: [idev] CDI.KEYID = 6
1,176,825 UART: [idev] SUBJECT.KEYID = 7
1,177,249 UART: [idev] UDS.KEYID = 0
1,177,594 ready_for_fw is high
1,177,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,395 UART: [idev] Erasing UDS.KEYID = 0
1,202,366 UART: [idev] Sha1 KeyId Algorithm
1,210,818 UART: [idev] --
1,211,876 UART: [ldev] ++
1,212,044 UART: [ldev] CDI.KEYID = 6
1,212,407 UART: [ldev] SUBJECT.KEYID = 5
1,212,833 UART: [ldev] AUTHORITY.KEYID = 7
1,213,296 UART: [ldev] FE.KEYID = 1
1,218,512 UART: [ldev] Erasing FE.KEYID = 1
1,245,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,484 UART: [ldev] --
1,284,963 UART: [fwproc] Wait for Commands...
1,285,597 UART: [fwproc] Recv command 0x46574c44
1,286,325 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,395 >>> mbox cmd response: success
2,777,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,778,621 UART: [afmc] ++
2,778,789 UART: [afmc] CDI.KEYID = 6
2,779,151 UART: [afmc] SUBJECT.KEYID = 7
2,779,576 UART: [afmc] AUTHORITY.KEYID = 5
2,815,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,648 UART: [afmc] --
2,858,680 UART: [cold-reset] --
2,859,730 UART: [state] Locking Datavault
2,860,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,291 UART: [state] Locking ICCM
2,861,777 UART: [exit] Launching FMC @ 0x40000130
2,867,106 UART:
2,867,122 UART: Running Caliptra FMC ...
2,867,530 UART:
2,867,673 UART: [state] CFI Enabled
2,878,158 UART: [fht] FMC Alias Private Key: 7
2,986,693 UART: [art] Extend RT PCRs Done
2,987,121 UART: [art] Lock RT PCRs Done
2,988,791 UART: [art] Populate DV Done
2,997,000 UART: [fht] FMC Alias Private Key: 7
2,998,106 UART: [art] Derive CDI
2,998,386 UART: [art] Store in in slot 0x4
3,084,239 UART: [art] Derive Key Pair
3,084,599 UART: [art] Store priv key in slot 0x5
3,097,683 UART: [art] Derive Key Pair - Done
3,112,562 UART: [art] Signing Cert with AUTHO
3,113,042 UART: RITY.KEYID = 7
3,128,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,345 UART: [art] PUB.X = EE432D34BF8A6A4830ED2C584896CC4F7CAAC454CB0ED7860BD68FEFFE210E7AE87205EA613ABCC8D803058859B45CCB
3,136,119 UART: [art] PUB.Y = E9689EB9EBCFFC9E3D4F6A8718F08677545179743EBBC8FD3D3DC2F3EDCC2EF659206323499DA41594EBE8CC16E09A0D
3,143,084 UART: [art] SIG.R = 8F271EA36EAD1B179473C6720F7664590C81F25AC0507FDF1396133A966AE4B8BA93F6618D62D26749DE64E7F74274BB
3,149,848 UART: [art] SIG.S = 026DCCF6AFAA15ED048F6C156CB3FA1E8AA0EE4359A9F155471178BED692AA31E83AE52875E952449985B64E5655E374
3,173,633 UART: Caliptra RT
3,173,978 UART: [state] CFI Enabled
3,281,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,577 UART:
3,283,593 UART: Running Caliptra ROM ...
3,284,001 UART:
3,284,143 UART: [state] CFI Enabled
3,287,073 UART: [state] LifecycleState = Unprovisioned
3,287,728 UART: [state] DebugLocked = No
3,288,464 UART: [state] WD Timer not started. Device not locked for debugging
3,289,706 UART: [kat] SHA2-256
4,095,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,099,481 UART: [kat] ++
4,099,633 UART: [kat] sha1
4,103,701 UART: [kat] SHA2-256
4,105,641 UART: [kat] SHA2-384
4,108,354 UART: [kat] SHA2-512-ACC
4,110,254 UART: [kat] ECC-384
4,119,995 UART: [kat] HMAC-384Kdf
4,124,609 UART: [kat] LMS
4,372,937 UART: [kat] --
4,373,649 UART: [update-reset] ++
5,688,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,689,277 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,839,275 >>> mbox cmd response: success
5,839,478 UART: [update-reset] Copying MAN_2 To MAN_1
5,847,492 UART: [update-reset Success] --
5,848,509 UART: [state] Locking Datavault
5,849,467 UART: [state] Locking PCR0, PCR1 and PCR31
5,850,071 UART: [state] Locking ICCM
5,850,739 UART: [exit] Launching FMC @ 0x40000130
5,856,068 UART:
5,856,084 UART: Running Caliptra FMC ...
5,856,492 UART:
5,856,635 UART: [state] CFI Enabled
5,946,004 UART: [art] Extend RT PCRs Done
5,946,432 UART: [art] Lock RT PCRs Done
5,947,989 UART: [art] Populate DV Done
5,955,842 UART: [fht] FMC Alias Private Key: 7
5,956,932 UART: [art] Derive CDI
5,957,212 UART: [art] Store in in slot 0x4
6,043,371 UART: [art] Derive Key Pair
6,043,731 UART: [art] Store priv key in slot 0x5
6,056,583 UART: [art] Derive Key Pair - Done
6,071,553 UART: [art] Signing Cert with AUTHO
6,072,033 UART: RITY.KEYID = 7
6,087,579 UART: [art] Erasing AUTHORITY.KEYID = 7
6,088,344 UART: [art] PUB.X = 1A9A7FB84E0F49274297776715250BB0EB87763CE32EFFBC7E0246AF818EB3BA8EA2F0E9369768B75FDA0105826CF14E
6,095,107 UART: [art] PUB.Y = 55531910AE8E99D98101A28A53E74B1FCFC9CC77029247E4E9D0D80B775A2C2276826554776B276E6F5ADE4FC7456DF9
6,102,048 UART: [art] SIG.R = 6E03CF9F76B39BD404693C52161D7BC5BE52633A64F5149AF26A99313CF80B4F08867E2744B51641495D4C5501E3C61B
6,108,799 UART: [art] SIG.S = 257E2DD67E19974A7B35D42C06751512AA553D08292CB3B89A30DF33890806D3938C3C36E876F6B8FEF060C7F2D40CA4
6,133,011 UART: Caliptra RT
6,133,356 UART: [state] CFI Enabled
6,414,507 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,078 ready_for_fw is high
1,060,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,988 >>> mbox cmd response: success
2,628,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,692,232 UART:
2,692,248 UART: Running Caliptra FMC ...
2,692,656 UART:
2,692,799 UART: [state] CFI Enabled
2,703,458 UART: [fht] FMC Alias Private Key: 7
2,812,199 UART: [art] Extend RT PCRs Done
2,812,627 UART: [art] Lock RT PCRs Done
2,814,013 UART: [art] Populate DV Done
2,822,268 UART: [fht] FMC Alias Private Key: 7
2,823,298 UART: [art] Derive CDI
2,823,578 UART: [art] Store in in slot 0x4
2,909,645 UART: [art] Derive Key Pair
2,910,005 UART: [art] Store priv key in slot 0x5
2,923,789 UART: [art] Derive Key Pair - Done
2,938,654 UART: [art] Signing Cert with AUTHO
2,939,134 UART: RITY.KEYID = 7
2,954,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,909 UART: [art] PUB.X = 77776C0FC122AAC586E66CE1B6F8A47525C7A2C61348E285225680D889E9EDCF06352450F3602576B18B1CC076371BC5
2,961,669 UART: [art] PUB.Y = E6BE463135D43A4BF70AB2F2C7FB2FEC9F7E4D21FA2B8FA5E0AEAB9137D4B210FAF0C55874325F7E3DDB368C2E6A3772
2,968,640 UART: [art] SIG.R = 7D06D0EB5E0788427C82BF53499D67A314F9A1F56C525AA2F8C0635A17345B7F9C323DAFA17E2FDE24F954D937CF9948
2,975,410 UART: [art] SIG.S = 16CFB811CBE989EDC716CE4E1A86ABDEE562204B559C8282CAEB735A33D7C004CB90847D0203B2F85A224A0C962EB5A7
2,999,337 UART: Caliptra RT
2,999,682 UART: [state] CFI Enabled
3,108,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,549,644 >>> mbox cmd response: success
5,563,182 UART:
5,563,198 UART: Running Caliptra FMC ...
5,563,606 UART:
5,563,749 UART: [state] CFI Enabled
5,653,180 UART: [art] Extend RT PCRs Done
5,653,608 UART: [art] Lock RT PCRs Done
5,654,737 UART: [art] Populate DV Done
5,662,918 UART: [fht] FMC Alias Private Key: 7
5,663,978 UART: [art] Derive CDI
5,664,258 UART: [art] Store in in slot 0x4
5,750,289 UART: [art] Derive Key Pair
5,750,649 UART: [art] Store priv key in slot 0x5
5,763,043 UART: [art] Derive Key Pair - Done
5,777,682 UART: [art] Signing Cert with AUTHO
5,778,162 UART: RITY.KEYID = 7
5,792,894 UART: [art] Erasing AUTHORITY.KEYID = 7
5,793,659 UART: [art] PUB.X = 8BEE2ACACD4395B5EB834D4BDCBE1AC64853D4D68291183B11885A3104932BA90F8AF450DBA7487D65D0FAC76D3DC155
5,800,439 UART: [art] PUB.Y = E60A74E79C4E0F75CF89681350087E71681A56E53BE688F96A9FBE682838A12BE777DC9BBAD3FB26B20D839211C79E15
5,807,381 UART: [art] SIG.R = C215132B36903D9A3D3149BA66ED2A25C51F2EB9247FFCA408B91C1458C7047D80978B8F0B4ACB742D55CAC43B9C42C9
5,814,150 UART: [art] SIG.S = 5C51D1E7EF3297FEB659DFFACE2A1728389D7FAA1594C6E1E72D829B55A9E8FF9B8DC9BFEA455BBDA392E786EAB24C09
5,837,686 UART: Caliptra RT
5,838,031 UART: [state] CFI Enabled
6,119,144 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,240,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,618 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,789 UART: [fwproc] Recv command 0x46574c44
1,281,522 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,948 >>> mbox cmd response: success
2,772,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,774,191 UART: [afmc] ++
2,774,359 UART: [afmc] CDI.KEYID = 6
2,774,722 UART: [afmc] SUBJECT.KEYID = 7
2,775,148 UART: [afmc] AUTHORITY.KEYID = 5
2,810,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,086 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,252 UART: [afmc] --
2,854,234 UART: [cold-reset] --
2,855,064 UART: [state] Locking Datavault
2,855,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,591 UART: [state] Locking ICCM
2,857,109 UART: [exit] Launching FMC @ 0x40000130
2,862,438 UART:
2,862,454 UART: Running Caliptra FMC ...
2,862,862 UART:
2,862,916 UART: [state] CFI Enabled
2,873,349 UART: [fht] FMC Alias Private Key: 7
2,981,424 UART: [art] Extend RT PCRs Done
2,981,852 UART: [art] Lock RT PCRs Done
2,983,550 UART: [art] Populate DV Done
2,991,953 UART: [fht] FMC Alias Private Key: 7
2,993,031 UART: [art] Derive CDI
2,993,311 UART: [art] Store in in slot 0x4
3,079,050 UART: [art] Derive Key Pair
3,079,410 UART: [art] Store priv key in slot 0x5
3,092,324 UART: [art] Derive Key Pair - Done
3,107,159 UART: [art] Signing Cert with AUTHO
3,107,639 UART: RITY.KEYID = 7
3,122,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,728 UART: [art] PUB.X = A41B12D92DD89A2DBEDAA3B76CAB62EEA908D3390A4CCE81851E7B169482E9BFF2E8678AC41ACA08725AD0F628DE767D
3,130,511 UART: [art] PUB.Y = 21EB837FFE6F44CDF2FA3824C8D2AD7CF9C1BFF46B9FB794694207DBBB82F204606136D3B00A6DD7E3CD4485621FA7CC
3,137,472 UART: [art] SIG.R = C9A9A61D0773E12157C82AD6231A3CDD9C7EE7173B2C58A272E9CC7922C6B24F2A91A44E96E0D19AE778ABB6676B32D8
3,144,249 UART: [art] SIG.S = 945B20C1B16F838F09C1DB26A2F0CA8AB7141D483522F7B4420166761D0B1965DC4748DDD927DD3222038C93675A7539
3,168,244 UART: Caliptra RT
3,168,497 UART: [state] CFI Enabled
3,275,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,973 UART:
3,277,989 UART: Running Caliptra ROM ...
3,278,397 UART:
3,278,452 UART: [state] CFI Enabled
3,281,242 UART: [state] LifecycleState = Unprovisioned
3,281,897 UART: [state] DebugLocked = No
3,282,541 UART: [state] WD Timer not started. Device not locked for debugging
3,283,809 UART: [kat] SHA2-256
4,087,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,488 UART: [kat] ++
4,091,640 UART: [kat] sha1
4,095,828 UART: [kat] SHA2-256
4,097,768 UART: [kat] SHA2-384
4,100,567 UART: [kat] SHA2-512-ACC
4,102,467 UART: [kat] ECC-384
4,112,178 UART: [kat] HMAC-384Kdf
4,116,728 UART: [kat] LMS
4,365,040 UART: [kat] --
4,365,790 UART: [update-reset] ++
5,678,224 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,211 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,829,209 >>> mbox cmd response: success
5,829,450 UART: [update-reset] Copying MAN_2 To MAN_1
5,837,464 UART: [update-reset Success] --
5,838,351 UART: [state] Locking Datavault
5,839,207 UART: [state] Locking PCR0, PCR1 and PCR31
5,839,811 UART: [state] Locking ICCM
5,840,357 UART: [exit] Launching FMC @ 0x40000130
5,845,686 UART:
5,845,702 UART: Running Caliptra FMC ...
5,846,110 UART:
5,846,164 UART: [state] CFI Enabled
5,935,735 UART: [art] Extend RT PCRs Done
5,936,163 UART: [art] Lock RT PCRs Done
5,937,610 UART: [art] Populate DV Done
5,945,855 UART: [fht] FMC Alias Private Key: 7
5,946,973 UART: [art] Derive CDI
5,947,253 UART: [art] Store in in slot 0x4
6,032,650 UART: [art] Derive Key Pair
6,033,010 UART: [art] Store priv key in slot 0x5
6,046,094 UART: [art] Derive Key Pair - Done
6,060,625 UART: [art] Signing Cert with AUTHO
6,061,105 UART: RITY.KEYID = 7
6,076,179 UART: [art] Erasing AUTHORITY.KEYID = 7
6,076,944 UART: [art] PUB.X = ABD8E79D0436A1DD3D04959D8FA3AC22312B4AD277F1B64FA98C47C9B5A95BB85D62BEC28878E25F9BD3C4639CD62689
6,083,722 UART: [art] PUB.Y = A837F3239DE2744F1C473C1F733178831F78DEA447FE745520B124BF0F4831BB905D2B6E2D5E53F1A47843F722E931B4
6,090,667 UART: [art] SIG.R = B5274580FF25B5942960CE930D43442384E7F9F548FDF530FD14B544B39BED11465461938A6A09139A3CD9613F9415FC
6,097,425 UART: [art] SIG.S = 44F61BDA85EC6315679A5B14E3B09D76E4FABE98901C25D0B703C49158C95E29B819B4B5865E042F9D47A6AA03FF43CA
6,121,513 UART: Caliptra RT
6,121,766 UART: [state] CFI Enabled
6,402,597 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,452 ready_for_fw is high
1,056,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,488 >>> mbox cmd response: success
2,623,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,868 UART:
2,685,884 UART: Running Caliptra FMC ...
2,686,292 UART:
2,686,346 UART: [state] CFI Enabled
2,696,905 UART: [fht] FMC Alias Private Key: 7
2,805,200 UART: [art] Extend RT PCRs Done
2,805,628 UART: [art] Lock RT PCRs Done
2,807,002 UART: [art] Populate DV Done
2,815,223 UART: [fht] FMC Alias Private Key: 7
2,816,251 UART: [art] Derive CDI
2,816,531 UART: [art] Store in in slot 0x4
2,902,568 UART: [art] Derive Key Pair
2,902,928 UART: [art] Store priv key in slot 0x5
2,916,528 UART: [art] Derive Key Pair - Done
2,931,189 UART: [art] Signing Cert with AUTHO
2,931,669 UART: RITY.KEYID = 7
2,946,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,466 UART: [art] PUB.X = FDCFDDEC8653ACE53515C842A131D1C0B760C581D063A1F6A4466A45CB699611CF206F0DACC7FB8D8972C1121D0B76D4
2,954,244 UART: [art] PUB.Y = 9C2801792BE498B8B6955A5EA178D350F2030B802F3CC33983DADDCDADF3A2B9F1A61888B4B7E51A991317FA856C74FC
2,961,195 UART: [art] SIG.R = 3F0FFCB773EEE30B53BAC366DD77FC99C848716BA43F021548040852BF32158D85180C6D6D2B44CFD883F915DC3B2515
2,967,953 UART: [art] SIG.S = AE085CF1855354B5512EF77161D8341E18B0DC7EC28E2ABF5D13185D324B328AFACC2263F07887EC6280FA8966045D35
2,991,920 UART: Caliptra RT
2,992,173 UART: [state] CFI Enabled
3,100,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,536,635 >>> mbox cmd response: success
5,550,227 UART:
5,550,243 UART: Running Caliptra FMC ...
5,550,651 UART:
5,550,705 UART: [state] CFI Enabled
5,639,840 UART: [art] Extend RT PCRs Done
5,640,268 UART: [art] Lock RT PCRs Done
5,641,547 UART: [art] Populate DV Done
5,649,648 UART: [fht] FMC Alias Private Key: 7
5,650,726 UART: [art] Derive CDI
5,651,006 UART: [art] Store in in slot 0x4
5,736,287 UART: [art] Derive Key Pair
5,736,647 UART: [art] Store priv key in slot 0x5
5,749,815 UART: [art] Derive Key Pair - Done
5,764,662 UART: [art] Signing Cert with AUTHO
5,765,142 UART: RITY.KEYID = 7
5,780,270 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,035 UART: [art] PUB.X = A467B71A21D014C7A010FE9B0ADC211C8A72BFF159E1C78AC002269EEA18D3C87687812CEEA3762DF19C8CEA28BD7FDB
5,787,819 UART: [art] PUB.Y = 33E2E1951BE8E4B05E0DDCE30CB667DE06DA0CA08976973EBF7A21EC4B74FE0623A835B8BD75F6E253A5E917E4136117
5,794,766 UART: [art] SIG.R = 4D5EC4AC6143261988452664FB091DA80B8B8C94894B69232120FBBB7EA3B6F162F27DCC2AF0738E6B9063809B5DA7BB
5,801,536 UART: [art] SIG.S = DDC5A2157A594F6F6B188DD2472A7F12880EAE136EA21FBC98F9EC16281CD8FD537813DE0F19DD96710AE78FAE80EE69
5,825,088 UART: Caliptra RT
5,825,341 UART: [state] CFI Enabled
6,105,476 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,550 UART: [idev] ++
1,172,718 UART: [idev] CDI.KEYID = 6
1,173,079 UART: [idev] SUBJECT.KEYID = 7
1,173,504 UART: [idev] UDS.KEYID = 0
1,173,850 ready_for_fw is high
1,173,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,198,624 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,529 UART: [ldev] ++
1,208,697 UART: [ldev] CDI.KEYID = 6
1,209,061 UART: [ldev] SUBJECT.KEYID = 5
1,209,488 UART: [ldev] AUTHORITY.KEYID = 7
1,209,951 UART: [ldev] FE.KEYID = 1
1,215,209 UART: [ldev] Erasing FE.KEYID = 1
1,241,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,613 UART: [ldev] --
1,280,967 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,789 >>> mbox cmd response: success
2,774,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,028 UART: [afmc] ++
2,776,196 UART: [afmc] CDI.KEYID = 6
2,776,559 UART: [afmc] SUBJECT.KEYID = 7
2,776,985 UART: [afmc] AUTHORITY.KEYID = 5
2,812,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,624 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,977 UART: [afmc] --
2,855,881 UART: [cold-reset] --
2,857,003 UART: [state] Locking Datavault
2,857,904 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,508 UART: [state] Locking ICCM
2,859,154 UART: [exit] Launching FMC @ 0x40000130
2,864,483 UART:
2,864,499 UART: Running Caliptra FMC ...
2,864,907 UART:
2,865,050 UART: [state] CFI Enabled
2,875,731 UART: [fht] FMC Alias Private Key: 7
2,983,660 UART: [art] Extend RT PCRs Done
2,984,088 UART: [art] Lock RT PCRs Done
2,985,390 UART: [art] Populate DV Done
2,993,603 UART: [fht] FMC Alias Private Key: 7
2,994,723 UART: [art] Derive CDI
2,995,003 UART: [art] Store in in slot 0x4
3,080,636 UART: [art] Derive Key Pair
3,080,996 UART: [art] Store priv key in slot 0x5
3,094,444 UART: [art] Derive Key Pair - Done
3,109,023 UART: [art] Signing Cert with AUTHO
3,109,503 UART: RITY.KEYID = 7
3,124,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,306 UART: [art] PUB.X = 9A80F4538594BAAF841B4B1C6F7C3B4689F2C500F9B5D1D45522868E1F478EEFC55EC42732A19DEAA2AFFC1E6DCEE875
3,132,072 UART: [art] PUB.Y = 85E7B44FD05CE9C82F75FC585AD65C96A9031E35FF1F9AC4383E3F6C54E19DD5F8B73C9A6D1AA69AF3C27C3C27CE374A
3,139,039 UART: [art] SIG.R = 16F2992D9B886B358A526A18F997BDFF12CA8D7193D0954B87957ADDDD1CE4B1949836FC7F0E2AAFC3E39357E929DFCC
3,145,820 UART: [art] SIG.S = EA671CE978D779FB275A6B25E0E4E8DE810D72677EC79F7BEC9C636B33A80B87CBCEC9869BD48F70D2B994B29188A429
3,169,341 UART: Caliptra RT
3,169,686 UART: [state] CFI Enabled
3,278,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,573 UART:
3,280,589 UART: Running Caliptra ROM ...
3,280,997 UART:
3,281,139 UART: [state] CFI Enabled
3,283,791 UART: [state] LifecycleState = Unprovisioned
3,284,446 UART: [state] DebugLocked = No
3,285,134 UART: [state] WD Timer not started. Device not locked for debugging
3,286,352 UART: [kat] SHA2-256
4,089,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,094,031 UART: [kat] ++
4,094,183 UART: [kat] sha1
4,098,449 UART: [kat] SHA2-256
4,100,389 UART: [kat] SHA2-384
4,103,150 UART: [kat] SHA2-512-ACC
4,105,050 UART: [kat] ECC-384
4,114,711 UART: [kat] HMAC-384Kdf
4,119,211 UART: [kat] LMS
4,367,523 UART: [kat] --
4,368,245 UART: [update-reset] ++
5,681,355 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,332 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,832,330 >>> mbox cmd response: success
5,832,617 UART: [update-reset] Copying MAN_2 To MAN_1
5,840,631 UART: [update-reset Success] --
5,841,572 UART: [state] Locking Datavault
5,842,568 UART: [state] Locking PCR0, PCR1 and PCR31
5,843,172 UART: [state] Locking ICCM
5,843,832 UART: [exit] Launching FMC @ 0x40000130
5,849,161 UART:
5,849,177 UART: Running Caliptra FMC ...
5,849,585 UART:
5,849,728 UART: [state] CFI Enabled
5,938,835 UART: [art] Extend RT PCRs Done
5,939,263 UART: [art] Lock RT PCRs Done
5,940,314 UART: [art] Populate DV Done
5,948,397 UART: [fht] FMC Alias Private Key: 7
5,949,513 UART: [art] Derive CDI
5,949,793 UART: [art] Store in in slot 0x4
6,035,586 UART: [art] Derive Key Pair
6,035,946 UART: [art] Store priv key in slot 0x5
6,049,184 UART: [art] Derive Key Pair - Done
6,063,672 UART: [art] Signing Cert with AUTHO
6,064,152 UART: RITY.KEYID = 7
6,078,864 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,629 UART: [art] PUB.X = 9CA69491F51F4F7FACAE5256260ADE76F4704D4578C8E7DE5130B7EAF6EED64D5944AFCE5D7D606F7493AB0DF52578DD
6,086,411 UART: [art] PUB.Y = 6F04D8AB20822BAD723E8F89DC9DF00DA3801BE46A1424C2EF13A3016090161985C13C6A57772899CBB54B56631BD6E7
6,093,354 UART: [art] SIG.R = 355C2D9ED2BA92EFB47E273CA6F1F62266B461F5515DEDA33B8F56419B73BA84C792717726B2539BC7A821006D8AE966
6,100,106 UART: [art] SIG.S = 075556B98D7E91376D371475CE280195C33B4D2711BCE6D205FD357A3DE44A53656B2DC00035B49E74EAC7287A4DFDDE
6,123,194 UART: Caliptra RT
6,123,539 UART: [state] CFI Enabled
6,404,870 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 ready_for_fw is high
1,056,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,487 >>> mbox cmd response: success
2,623,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,731 UART:
2,685,747 UART: Running Caliptra FMC ...
2,686,155 UART:
2,686,298 UART: [state] CFI Enabled
2,697,223 UART: [fht] FMC Alias Private Key: 7
2,804,984 UART: [art] Extend RT PCRs Done
2,805,412 UART: [art] Lock RT PCRs Done
2,807,004 UART: [art] Populate DV Done
2,815,155 UART: [fht] FMC Alias Private Key: 7
2,816,143 UART: [art] Derive CDI
2,816,423 UART: [art] Store in in slot 0x4
2,902,216 UART: [art] Derive Key Pair
2,902,576 UART: [art] Store priv key in slot 0x5
2,916,038 UART: [art] Derive Key Pair - Done
2,930,653 UART: [art] Signing Cert with AUTHO
2,931,133 UART: RITY.KEYID = 7
2,946,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,168 UART: [art] PUB.X = D31386259411056B868AA276B77646FD8DDAD0DA12158D08CEC2B8BAE057ED461489E39FD45282C7E4F786B13AD7B847
2,953,936 UART: [art] PUB.Y = 9CCDA7E5152AAD6A63787D2F8E3B0FE40A9DC79CC43AC2ABDE8C05ACB24E85CE28C5DED947E719BD28140A495E498EBC
2,960,902 UART: [art] SIG.R = 332613E1BA99C5A7D9D908C93602C7146E952F01BF9393FE4ADBB6DC06FE4C3918C95E91F22F5B7A251DE459CE13F711
2,967,668 UART: [art] SIG.S = 8990E0F815553A6DD75304EFDCFF8679061A7EC1A8F445D3E2D9AD7CCE07F51680D5346AE7C608C72EB1CEC4BC84508A
2,991,729 UART: Caliptra RT
2,992,074 UART: [state] CFI Enabled
3,098,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,761 >>> mbox cmd response: success
5,547,777 UART:
5,547,793 UART: Running Caliptra FMC ...
5,548,201 UART:
5,548,344 UART: [state] CFI Enabled
5,636,843 UART: [art] Extend RT PCRs Done
5,637,271 UART: [art] Lock RT PCRs Done
5,638,214 UART: [art] Populate DV Done
5,646,497 UART: [fht] FMC Alias Private Key: 7
5,647,559 UART: [art] Derive CDI
5,647,839 UART: [art] Store in in slot 0x4
5,733,906 UART: [art] Derive Key Pair
5,734,266 UART: [art] Store priv key in slot 0x5
5,747,966 UART: [art] Derive Key Pair - Done
5,762,754 UART: [art] Signing Cert with AUTHO
5,763,234 UART: RITY.KEYID = 7
5,778,418 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,183 UART: [art] PUB.X = 5F934AE2AA0707362B380BB0DA35C2A6B2BC1BC4F8F7340F41D6E279ADD0813BAFB11A6C76FB8FC8B83DCD925F09869E
5,785,958 UART: [art] PUB.Y = CE55F7EFDCAE5C7629D9B2EB98D873C5F114A5ACCECF5B25ECE6893816F0A647914A669A3FC3B00B62388EB70F10B5D5
5,792,922 UART: [art] SIG.R = 69A8EA61F91D7205FD01984C3B0CB71B036FD4CB30B67FDCC8C3EFF06059624EE70F81DF6A1E0358FB5DFAFA33E9E70B
5,799,693 UART: [art] SIG.S = 1692219EAC91F75DDF385A3FB16B235C12A046CAA8D5138361A1D1514ADD133260993D63F240F6B832F335C49A7A27FE
5,823,130 UART: Caliptra RT
5,823,475 UART: [state] CFI Enabled
6,109,338 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,046 UART:
192,415 UART: Running Caliptra ROM ...
193,510 UART:
193,652 UART: [state] CFI Enabled
263,900 UART: [state] LifecycleState = Unprovisioned
265,803 UART: [state] DebugLocked = No
268,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,418 UART: [kat] SHA2-256
442,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,662 UART: [kat] ++
453,146 UART: [kat] sha1
463,101 UART: [kat] SHA2-256
465,832 UART: [kat] SHA2-384
472,033 UART: [kat] SHA2-512-ACC
474,402 UART: [kat] ECC-384
2,767,848 UART: [kat] HMAC-384Kdf
2,799,054 UART: [kat] LMS
3,989,365 UART: [kat] --
3,993,713 UART: [cold-reset] ++
3,995,142 UART: [fht] Storing FHT @ 0x50003400
4,006,123 UART: [idev] ++
4,006,701 UART: [idev] CDI.KEYID = 6
4,007,659 UART: [idev] SUBJECT.KEYID = 7
4,008,901 UART: [idev] UDS.KEYID = 0
4,009,895 ready_for_fw is high
4,010,103 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,636 UART: [idev] Erasing UDS.KEYID = 0
7,346,793 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,738 UART: [idev] --
7,372,948 UART: [ldev] ++
7,373,518 UART: [ldev] CDI.KEYID = 6
7,374,504 UART: [ldev] SUBJECT.KEYID = 5
7,375,668 UART: [ldev] AUTHORITY.KEYID = 7
7,376,955 UART: [ldev] FE.KEYID = 1
7,423,063 UART: [ldev] Erasing FE.KEYID = 1
10,756,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,075 UART: [ldev] --
13,137,074 UART: [fwproc] Waiting for Commands...
13,140,414 UART: [fwproc] Received command 0x46574c44
13,142,596 UART: [fwproc] Received Image of size 114124 bytes
17,187,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,648,175 >>> mbox cmd response: success
17,651,619 UART: [afmc] ++
17,652,217 UART: [afmc] CDI.KEYID = 6
17,653,184 UART: [afmc] SUBJECT.KEYID = 7
17,654,397 UART: [afmc] AUTHORITY.KEYID = 5
21,031,319 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,307 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,595 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,997 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,862 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,281 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,119 UART: [afmc] --
23,402,658 UART: [cold-reset] --
23,406,783 UART: [state] Locking Datavault
23,411,826 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,528 UART: [state] Locking ICCM
23,415,051 UART: [exit] Launching FMC @ 0x40000130
23,423,453 UART:
23,423,694 UART: Running Caliptra FMC ...
23,424,793 UART:
23,424,954 UART: [state] CFI Enabled
23,490,408 UART: [fht] FMC Alias Private Key: 7
25,828,751 UART: [art] Extend RT PCRs Done
25,829,974 UART: [art] Lock RT PCRs Done
25,831,468 UART: [art] Populate DV Done
25,837,202 UART: [fht] FMC Alias Private Key: 7
25,838,683 UART: [art] Derive CDI
25,839,421 UART: [art] Store in in slot 0x4
25,899,487 UART: [art] Derive Key Pair
25,900,527 UART: [art] Store priv key in slot 0x5
29,193,091 UART: [art] Derive Key Pair - Done
29,205,774 UART: [art] Signing Cert with AUTHO
29,207,095 UART: RITY.KEYID = 7
31,495,784 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,298 UART: [art] PUB.X = 6CDEC9F25874DFEF72CF414F7CB5C713913701C4CBB9D8957976BC2149E219702F9F1E8BBC007C8D14A05EFAFE9E5A20
31,504,559 UART: [art] PUB.Y = 2D8214838F88773025F7F6D07C693ED607B7D3A9D1EC352851129666CE806660724B2294EA824D60654D9CCDC895C825
31,511,757 UART: [art] SIG.R = FFB09302BB1C765DDF4F3342E673EB414ABA4A55E16CEBA9D06D81D0378A85F23F3DC59EB4E8D59DA38907A0EF47A38B
31,519,163 UART: [art] SIG.S = 2D6F5D022884FEAE4B178DCCB04E939A0811FCF1743620054E7D4F83DA6438F6018771E433B7B7D144BEFBA6DE174687
32,824,043 UART: Caliptra RT
32,824,752 UART: [state] CFI Enabled
32,986,239 UART: [rt] RT listening for mailbox commands...
32,988,128 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,018,382 UART: [rt]cmd =0x434b4558, len=80
38,771,775 >>> mbox cmd response data (6280 bytes)
38,805,730 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,836,182 UART: [rt]cmd =0x414c544e, len=41
38,838,575 >>> mbox cmd response data (8 bytes)
38,839,178 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,869,473 UART: [rt]cmd =0x434b4558, len=80
44,615,729 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,808,301 ready_for_fw is high
3,808,733 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,576 >>> mbox cmd response: success
23,572,040 UART:
23,572,435 UART: Running Caliptra FMC ...
23,573,579 UART:
23,573,743 UART: [state] CFI Enabled
23,640,304 UART: [fht] FMC Alias Private Key: 7
25,977,124 UART: [art] Extend RT PCRs Done
25,978,351 UART: [art] Lock RT PCRs Done
25,980,145 UART: [art] Populate DV Done
25,985,568 UART: [fht] FMC Alias Private Key: 7
25,987,283 UART: [art] Derive CDI
25,988,104 UART: [art] Store in in slot 0x4
26,049,333 UART: [art] Derive Key Pair
26,050,376 UART: [art] Store priv key in slot 0x5
29,343,346 UART: [art] Derive Key Pair - Done
29,356,575 UART: [art] Signing Cert with AUTHO
29,357,882 UART: RITY.KEYID = 7
31,646,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,025 UART: [art] PUB.X = 66E9C1E65CE981C54CA5868D384584A8AC767F2118911BF9EE1D468E24B872E18ED9E21467388CDF402F5EF61BCFB38E
31,655,280 UART: [art] PUB.Y = 3B4C6E5CA533A8FFC25C3B1A7F066968E060B6C508631FFEE2B8C45C6A5CC42F4D56F054830F10A8063D99F1309D6F0F
31,662,568 UART: [art] SIG.R = 711768ABACBCE81A52E3F2D5EDCF2AA3E79120D433808CFD7CEFE0DFCA2A59C05CB03DB741AB046CD27A4345E8E441C3
31,669,962 UART: [art] SIG.S = 93372A960092FB77A4EED8987804A8C250E436AC405BC09E0229949C275F7DE43F6F50FBA98D873289B7DE06F21AE278
32,974,983 UART: Caliptra RT
32,975,684 UART: [state] CFI Enabled
33,136,029 UART: [rt] RT listening for mailbox commands...
33,137,928 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,168,508 UART: [rt]cmd =0x434b4558, len=80
38,921,708 >>> mbox cmd response data (6280 bytes)
38,955,595 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,985,715 UART: [rt]cmd =0x414c544e, len=41
38,988,239 >>> mbox cmd response data (8 bytes)
38,988,729 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,019,096 UART: [rt]cmd =0x434b4558, len=80
44,766,947 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,360 UART:
192,719 UART: Running Caliptra ROM ...
193,876 UART:
603,693 UART: [state] CFI Enabled
614,155 UART: [state] LifecycleState = Unprovisioned
616,099 UART: [state] DebugLocked = No
618,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,627 UART: [kat] SHA2-256
793,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,930 UART: [kat] ++
804,408 UART: [kat] sha1
814,708 UART: [kat] SHA2-256
817,426 UART: [kat] SHA2-384
823,555 UART: [kat] SHA2-512-ACC
825,930 UART: [kat] ECC-384
3,108,998 UART: [kat] HMAC-384Kdf
3,120,379 UART: [kat] LMS
4,310,439 UART: [kat] --
4,315,946 UART: [cold-reset] ++
4,317,309 UART: [fht] Storing FHT @ 0x50003400
4,329,428 UART: [idev] ++
4,330,067 UART: [idev] CDI.KEYID = 6
4,330,972 UART: [idev] SUBJECT.KEYID = 7
4,332,211 UART: [idev] UDS.KEYID = 0
4,333,189 ready_for_fw is high
4,333,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,683 UART: [idev] Erasing UDS.KEYID = 0
7,620,894 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,619 UART: [idev] --
7,646,828 UART: [ldev] ++
7,647,390 UART: [ldev] CDI.KEYID = 6
7,648,344 UART: [ldev] SUBJECT.KEYID = 5
7,649,547 UART: [ldev] AUTHORITY.KEYID = 7
7,650,829 UART: [ldev] FE.KEYID = 1
7,662,084 UART: [ldev] Erasing FE.KEYID = 1
10,948,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,300 UART: [ldev] --
13,309,209 UART: [fwproc] Waiting for Commands...
13,311,999 UART: [fwproc] Received command 0x46574c44
13,314,172 UART: [fwproc] Received Image of size 114124 bytes
17,372,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,718 >>> mbox cmd response: success
17,835,856 UART: [afmc] ++
17,836,447 UART: [afmc] CDI.KEYID = 6
17,837,483 UART: [afmc] SUBJECT.KEYID = 7
17,838,643 UART: [afmc] AUTHORITY.KEYID = 5
21,149,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,537 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,893 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,721 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,162 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,176 UART: [afmc] --
23,515,484 UART: [cold-reset] --
23,519,406 UART: [state] Locking Datavault
23,524,322 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,073 UART: [state] Locking ICCM
23,527,843 UART: [exit] Launching FMC @ 0x40000130
23,536,238 UART:
23,536,477 UART: Running Caliptra FMC ...
23,537,593 UART:
23,537,758 UART: [state] CFI Enabled
23,545,651 UART: [fht] FMC Alias Private Key: 7
25,876,774 UART: [art] Extend RT PCRs Done
25,877,992 UART: [art] Lock RT PCRs Done
25,879,851 UART: [art] Populate DV Done
25,885,425 UART: [fht] FMC Alias Private Key: 7
25,886,902 UART: [art] Derive CDI
25,887,630 UART: [art] Store in in slot 0x4
25,930,218 UART: [art] Derive Key Pair
25,931,262 UART: [art] Store priv key in slot 0x5
29,172,965 UART: [art] Derive Key Pair - Done
29,186,116 UART: [art] Signing Cert with AUTHO
29,187,420 UART: RITY.KEYID = 7
31,466,971 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,484 UART: [art] PUB.X = B5CC87ECB979D162787FF065DDFFBA04F8AB06CA7548883BCED1F8215C108B63F2AEF59B5B1DC5AA351539C2421A31C9
31,475,722 UART: [art] PUB.Y = FD4AF1D6F061F528C0AADE47EB391479DC87BADE67119D660192DB1B9A5A6AC19802FC9EF47B1DAE71E24BCC5109E93A
31,483,006 UART: [art] SIG.R = 995C232F16F9E7EE5D3EB993BF3A6A9F3DC539E96DDAE5724F3B425688DB325170DF5963DD3CA4187FB29935B1D2B206
31,490,387 UART: [art] SIG.S = 22AC94795A71715F920AFA45E4FC96E30ADB1BBCB7FAEBF96D75D6DFFF3174E52FACEC6969E7D239EB3E22009D306C37
32,796,060 UART: Caliptra RT
32,796,773 UART: [state] CFI Enabled
32,913,835 UART: [rt] RT listening for mailbox commands...
32,915,727 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,946,262 UART: [rt]cmd =0x434b4558, len=80
38,605,941 >>> mbox cmd response data (6280 bytes)
38,639,874 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,669,992 UART: [rt]cmd =0x414c544e, len=41
38,672,445 >>> mbox cmd response data (8 bytes)
38,673,026 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,703,281 UART: [rt]cmd =0x434b4558, len=80
44,362,136 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,126,353 ready_for_fw is high
4,126,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,059,440 >>> mbox cmd response: success
23,692,161 UART:
23,692,566 UART: Running Caliptra FMC ...
23,693,758 UART:
23,693,925 UART: [state] CFI Enabled
23,701,484 UART: [fht] FMC Alias Private Key: 7
26,032,422 UART: [art] Extend RT PCRs Done
26,033,649 UART: [art] Lock RT PCRs Done
26,035,391 UART: [art] Populate DV Done
26,040,594 UART: [fht] FMC Alias Private Key: 7
26,042,094 UART: [art] Derive CDI
26,042,858 UART: [art] Store in in slot 0x4
26,085,581 UART: [art] Derive Key Pair
26,086,625 UART: [art] Store priv key in slot 0x5
29,329,215 UART: [art] Derive Key Pair - Done
29,342,058 UART: [art] Signing Cert with AUTHO
29,343,395 UART: RITY.KEYID = 7
31,622,689 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,221 UART: [art] PUB.X = 0821B20F3A1316DCFCF615EAC6379C5595FA08015453D15735B852FD4D40796F131B3B5AA6EC0A53B184F7DC5B1510A1
31,631,409 UART: [art] PUB.Y = 89910D9A3C462F035C63EEB5643960A18100861FC1176D827B7B0C496D8555E99470BB3CF66424742A2B63FD04C76701
31,638,638 UART: [art] SIG.R = 4DDC23EE9855B584351C52B0BA1C0F0A2C404ED7CCABA84E1EC9C76A49A989DB87D4B05401F808ADEB367F7F68F4C151
31,646,074 UART: [art] SIG.S = D7E2F05ED385ACA1BB59BDBB297C4F40B2D8612EFDE577519270E57320939600958CC94CB7DFAEFB56647731C87A0273
32,951,514 UART: Caliptra RT
32,952,210 UART: [state] CFI Enabled
33,069,984 UART: [rt] RT listening for mailbox commands...
33,071,877 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,102,339 UART: [rt]cmd =0x434b4558, len=80
38,761,596 >>> mbox cmd response data (6280 bytes)
38,795,495 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,825,625 UART: [rt]cmd =0x414c544e, len=41
38,828,137 >>> mbox cmd response data (8 bytes)
38,828,621 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,859,135 UART: [rt]cmd =0x434b4558, len=80
44,519,205 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
191,909 UART:
192,273 UART: Running Caliptra ROM ...
193,442 UART:
193,594 UART: [state] CFI Enabled
266,907 UART: [state] LifecycleState = Unprovisioned
268,749 UART: [state] DebugLocked = No
271,636 UART: [state] WD Timer not started. Device not locked for debugging
275,964 UART: [kat] SHA2-256
455,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,639 UART: [kat] ++
467,096 UART: [kat] sha1
479,330 UART: [kat] SHA2-256
482,343 UART: [kat] SHA2-384
488,756 UART: [kat] SHA2-512-ACC
491,759 UART: [kat] ECC-384
2,949,288 UART: [kat] HMAC-384Kdf
2,974,759 UART: [kat] LMS
3,504,227 UART: [kat] --
3,509,447 UART: [cold-reset] ++
3,510,590 UART: [fht] FHT @ 0x50003400
3,523,057 UART: [idev] ++
3,523,628 UART: [idev] CDI.KEYID = 6
3,524,542 UART: [idev] SUBJECT.KEYID = 7
3,525,714 UART: [idev] UDS.KEYID = 0
3,526,759 ready_for_fw is high
3,526,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,988 UART: [idev] Erasing UDS.KEYID = 0
6,025,908 UART: [idev] Sha1 KeyId Algorithm
6,049,631 UART: [idev] --
6,053,516 UART: [ldev] ++
6,054,087 UART: [ldev] CDI.KEYID = 6
6,055,001 UART: [ldev] SUBJECT.KEYID = 5
6,056,220 UART: [ldev] AUTHORITY.KEYID = 7
6,057,450 UART: [ldev] FE.KEYID = 1
6,101,617 UART: [ldev] Erasing FE.KEYID = 1
8,605,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,385 UART: [ldev] --
10,414,508 UART: [fwproc] Wait for Commands...
10,417,680 UART: [fwproc] Recv command 0x46574c44
10,419,756 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,291,285 >>> mbox cmd response: success
14,294,787 UART: [afmc] ++
14,295,391 UART: [afmc] CDI.KEYID = 6
14,296,327 UART: [afmc] SUBJECT.KEYID = 7
14,297,497 UART: [afmc] AUTHORITY.KEYID = 5
16,828,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,453 UART: [afmc] --
18,629,587 UART: [cold-reset] --
18,633,392 UART: [state] Locking Datavault
18,637,879 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,574 UART: [state] Locking ICCM
18,641,185 UART: [exit] Launching FMC @ 0x40000130
18,649,578 UART:
18,649,810 UART: Running Caliptra FMC ...
18,650,930 UART:
18,651,104 UART: [state] CFI Enabled
18,713,041 UART: [fht] FMC Alias Private Key: 7
20,476,961 UART: [art] Extend RT PCRs Done
20,478,179 UART: [art] Lock RT PCRs Done
20,479,802 UART: [art] Populate DV Done
20,485,153 UART: [fht] FMC Alias Private Key: 7
20,486,685 UART: [art] Derive CDI
20,487,493 UART: [art] Store in in slot 0x4
20,545,503 UART: [art] Derive Key Pair
20,546,537 UART: [art] Store priv key in slot 0x5
23,009,647 UART: [art] Derive Key Pair - Done
23,022,482 UART: [art] Signing Cert with AUTHO
23,023,782 UART: RITY.KEYID = 7
24,735,507 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,169 UART: [art] PUB.X = A9569AFC77CDFBB97EA52AB23BD80E27036BFB2F1FBED7BDC12DC67DA8D539C50B68675E2FA78399777C3FEAF5159A31
24,744,349 UART: [art] PUB.Y = B6B64D4825C329D85EAE200E927CBC3385B8A02A67C72850B78D876996D8B11C004FF9B84F8EC361D349990FEB7A33A1
24,751,532 UART: [art] SIG.R = 0D6E50158181B6BE384D92CAC65732B908E9C5FDC716C7E2E2E888000469DA0E30537157F612A723F7D51951AD8BF8E5
24,758,867 UART: [art] SIG.S = FEA027EB9052DCD430AC8B1B0457E44CA0615C593DE2006E48BE9CD493A0CA1640911249D82376F64697BCAF93378BA0
25,737,628 UART: Caliptra RT
25,738,327 UART: [state] CFI Enabled
25,904,543 UART: [rt] RT listening for mailbox commands...
25,906,464 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,937,465 UART: [rt]cmd =0x434b4558, len=80
30,276,623 >>> mbox cmd response data (6280 bytes)
30,310,368 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,340,540 UART: [rt]cmd =0x414c544e, len=41
30,342,913 >>> mbox cmd response data (8 bytes)
30,343,512 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,373,928 UART: [rt]cmd =0x434b4558, len=80
34,713,772 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,360,558 ready_for_fw is high
3,360,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,393 >>> mbox cmd response: success
18,340,494 UART:
18,340,873 UART: Running Caliptra FMC ...
18,341,984 UART:
18,342,139 UART: [state] CFI Enabled
18,408,804 UART: [fht] FMC Alias Private Key: 7
20,172,937 UART: [art] Extend RT PCRs Done
20,174,167 UART: [art] Lock RT PCRs Done
20,175,765 UART: [art] Populate DV Done
20,180,950 UART: [fht] FMC Alias Private Key: 7
20,182,594 UART: [art] Derive CDI
20,183,333 UART: [art] Store in in slot 0x4
20,241,726 UART: [art] Derive Key Pair
20,242,768 UART: [art] Store priv key in slot 0x5
22,705,765 UART: [art] Derive Key Pair - Done
22,718,713 UART: [art] Signing Cert with AUTHO
22,720,019 UART: RITY.KEYID = 7
24,432,250 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,734 UART: [art] PUB.X = 22801ADD61DE7DDCBFC11D7EF803C86359E4D720136C3FB8A7EE3F286FE85A91D6EA1C3FF59965A30F45CC909A28A42A
24,441,048 UART: [art] PUB.Y = 0C48AF3B60634D353D313CC14B1C81CBFFB0347373E39D2DCD491041CC80DC55CD47EF8E14B851B4AB20A2BBB26E0B31
24,448,326 UART: [art] SIG.R = 4E14E1094B4B802EB80EA5B13436BAEDEE8CDD2BA8C2131D347EB405E0C1372569A5AEABE873B544D126E465767E90CC
24,455,733 UART: [art] SIG.S = D1997BE30BE8E7D177BF5F40FE085B2D72F8790834E96E8135A9FBFC396ABF9F9B5B2A608F2C58AE36B183529F6C40EC
25,434,742 UART: Caliptra RT
25,435,478 UART: [state] CFI Enabled
25,599,838 UART: [rt] RT listening for mailbox commands...
25,601,740 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,632,734 UART: [rt]cmd =0x434b4558, len=80
29,959,163 >>> mbox cmd response data (6280 bytes)
29,993,080 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,023,377 UART: [rt]cmd =0x414c544e, len=41
30,025,623 >>> mbox cmd response data (8 bytes)
30,026,138 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,056,658 UART: [rt]cmd =0x434b4558, len=80
34,396,143 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,498 UART:
192,861 UART: Running Caliptra ROM ...
194,043 UART:
603,792 UART: [state] CFI Enabled
613,582 UART: [state] LifecycleState = Unprovisioned
615,610 UART: [state] DebugLocked = No
617,098 UART: [state] WD Timer not started. Device not locked for debugging
619,946 UART: [kat] SHA2-256
799,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,693 UART: [kat] ++
811,135 UART: [kat] sha1
822,778 UART: [kat] SHA2-256
825,785 UART: [kat] SHA2-384
832,550 UART: [kat] SHA2-512-ACC
835,477 UART: [kat] ECC-384
3,279,656 UART: [kat] HMAC-384Kdf
3,293,512 UART: [kat] LMS
3,822,966 UART: [kat] --
3,829,181 UART: [cold-reset] ++
3,830,982 UART: [fht] FHT @ 0x50003400
3,841,810 UART: [idev] ++
3,842,363 UART: [idev] CDI.KEYID = 6
3,843,235 UART: [idev] SUBJECT.KEYID = 7
3,844,467 UART: [idev] UDS.KEYID = 0
3,845,359 ready_for_fw is high
3,845,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,334 UART: [idev] Erasing UDS.KEYID = 0
6,314,303 UART: [idev] Sha1 KeyId Algorithm
6,338,335 UART: [idev] --
6,342,106 UART: [ldev] ++
6,342,668 UART: [ldev] CDI.KEYID = 6
6,343,586 UART: [ldev] SUBJECT.KEYID = 5
6,344,789 UART: [ldev] AUTHORITY.KEYID = 7
6,346,006 UART: [ldev] FE.KEYID = 1
6,354,837 UART: [ldev] Erasing FE.KEYID = 1
8,825,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,022 UART: [ldev] --
10,616,962 UART: [fwproc] Wait for Commands...
10,618,926 UART: [fwproc] Recv command 0x46574c44
10,621,017 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,464 >>> mbox cmd response: success
14,490,924 UART: [afmc] ++
14,491,524 UART: [afmc] CDI.KEYID = 6
14,492,428 UART: [afmc] SUBJECT.KEYID = 7
14,493,599 UART: [afmc] AUTHORITY.KEYID = 5
16,987,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,569 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,802 UART: [afmc] --
18,785,699 UART: [cold-reset] --
18,788,590 UART: [state] Locking Datavault
18,793,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,146 UART: [state] Locking ICCM
18,797,123 UART: [exit] Launching FMC @ 0x40000130
18,805,513 UART:
18,805,739 UART: Running Caliptra FMC ...
18,806,831 UART:
18,807,001 UART: [state] CFI Enabled
18,815,211 UART: [fht] FMC Alias Private Key: 7
20,572,004 UART: [art] Extend RT PCRs Done
20,573,218 UART: [art] Lock RT PCRs Done
20,574,922 UART: [art] Populate DV Done
20,580,326 UART: [fht] FMC Alias Private Key: 7
20,581,799 UART: [art] Derive CDI
20,582,527 UART: [art] Store in in slot 0x4
20,624,840 UART: [art] Derive Key Pair
20,625,870 UART: [art] Store priv key in slot 0x5
23,053,169 UART: [art] Derive Key Pair - Done
23,065,994 UART: [art] Signing Cert with AUTHO
23,067,299 UART: RITY.KEYID = 7
24,772,830 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,327 UART: [art] PUB.X = 8A463A7CC024BC2925BE886A0C53E127CBAFFB198788A91FD68BA949D1040A26854566E0B173DB7AC9D64F9D8CFDB86C
24,781,679 UART: [art] PUB.Y = 27B1CE1779F9A71E3FDB10F1192AAEFB68D3AD78CDF8EDE2DFD099E676E4244B4DD5450813098CAA693CE686FFAD3C5C
24,788,921 UART: [art] SIG.R = B8BEB455FDD0FDCB5A854FC33FE5BCD41AB115E2CEA16E4BEFA1510AD4603312B994C69CE5C817D66E75E3B3D13E90F1
24,796,357 UART: [art] SIG.S = 6947FE83C0E14E70D1A754EE443F5BF5A4F68C7146D41C318AA445EB8DA9B1088C6E0C5FFCB49AF57007E80075792009
25,775,753 UART: Caliptra RT
25,776,446 UART: [state] CFI Enabled
25,894,740 UART: [rt] RT listening for mailbox commands...
25,896,754 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,927,113 UART: [rt]cmd =0x434b4558, len=80
30,197,542 >>> mbox cmd response data (6280 bytes)
30,231,561 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,261,794 UART: [rt]cmd =0x414c544e, len=41
30,264,235 >>> mbox cmd response data (8 bytes)
30,264,724 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,294,913 UART: [rt]cmd =0x434b4558, len=80
34,564,379 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,699,002 ready_for_fw is high
3,699,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,025 >>> mbox cmd response: success
18,537,974 UART:
18,538,362 UART: Running Caliptra FMC ...
18,539,488 UART:
18,539,641 UART: [state] CFI Enabled
18,547,696 UART: [fht] FMC Alias Private Key: 7
20,304,374 UART: [art] Extend RT PCRs Done
20,305,600 UART: [art] Lock RT PCRs Done
20,307,413 UART: [art] Populate DV Done
20,312,980 UART: [fht] FMC Alias Private Key: 7
20,314,512 UART: [art] Derive CDI
20,315,246 UART: [art] Store in in slot 0x4
20,357,728 UART: [art] Derive Key Pair
20,358,769 UART: [art] Store priv key in slot 0x5
22,785,363 UART: [art] Derive Key Pair - Done
22,798,521 UART: [art] Signing Cert with AUTHO
22,799,825 UART: RITY.KEYID = 7
24,505,680 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,184 UART: [art] PUB.X = 36E32FEECF6BD797E3B954C04DB473FDD11BDC4FFF6489A2CAD3F13FDB4CEB1F269BA53BA92D05BB48F90A6B5E58D153
24,514,460 UART: [art] PUB.Y = EBEB550AE2D3F6F680D77D48D7C84D657DE89FEC2303A60A90E65C817CF2E0F871FA7AD45848938A31CAFBA1FF14B8F6
24,521,752 UART: [art] SIG.R = A9A25C79DAFF2FA588350C2FA96F58CB4B706941FE0348E5A417035668ADC145EEFCE821D687F78A86A54B424787115E
24,529,134 UART: [art] SIG.S = CB4F6C8AA1ECDE6AE5F1641D1892765E87B4355795428DA2DFF54A868342FE3F50066B306EDEC77D0A323C077D27E9C5
25,508,729 UART: Caliptra RT
25,509,431 UART: [state] CFI Enabled
25,626,125 UART: [rt] RT listening for mailbox commands...
25,628,013 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,658,583 UART: [rt]cmd =0x434b4558, len=80
29,928,427 >>> mbox cmd response data (6280 bytes)
29,962,388 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
29,992,613 UART: [rt]cmd =0x414c544e, len=41
29,994,960 >>> mbox cmd response data (8 bytes)
29,995,422 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,025,866 UART: [rt]cmd =0x434b4558, len=80
34,295,432 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,137 UART:
192,506 UART: Running Caliptra ROM ...
193,636 UART:
193,782 UART: [state] CFI Enabled
265,414 UART: [state] LifecycleState = Unprovisioned
267,877 UART: [state] DebugLocked = No
269,430 UART: [state] WD Timer not started. Device not locked for debugging
273,254 UART: [kat] SHA2-256
463,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,959 UART: [kat] ++
474,435 UART: [kat] sha1
484,816 UART: [kat] SHA2-256
487,824 UART: [kat] SHA2-384
494,884 UART: [kat] SHA2-512-ACC
497,464 UART: [kat] ECC-384
2,949,190 UART: [kat] HMAC-384Kdf
2,972,648 UART: [kat] LMS
3,504,394 UART: [kat] --
3,509,242 UART: [cold-reset] ++
3,510,179 UART: [fht] FHT @ 0x50003400
3,521,862 UART: [idev] ++
3,522,572 UART: [idev] CDI.KEYID = 6
3,523,600 UART: [idev] SUBJECT.KEYID = 7
3,524,698 UART: [idev] UDS.KEYID = 0
3,525,621 ready_for_fw is high
3,525,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,720 UART: [idev] Erasing UDS.KEYID = 0
6,029,733 UART: [idev] Sha1 KeyId Algorithm
6,051,081 UART: [idev] --
6,057,184 UART: [ldev] ++
6,057,865 UART: [ldev] CDI.KEYID = 6
6,058,855 UART: [ldev] SUBJECT.KEYID = 5
6,059,967 UART: [ldev] AUTHORITY.KEYID = 7
6,061,202 UART: [ldev] FE.KEYID = 1
6,100,532 UART: [ldev] Erasing FE.KEYID = 1
8,610,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,384 UART: [ldev] --
10,413,813 UART: [fwproc] Wait for Commands...
10,415,258 UART: [fwproc] Recv command 0x46574c44
10,417,244 UART: [fwproc] Recv'd Img size: 114448 bytes
13,872,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,671 >>> mbox cmd response: success
14,610,825 UART: [afmc] ++
14,611,526 UART: [afmc] CDI.KEYID = 6
14,612,639 UART: [afmc] SUBJECT.KEYID = 7
14,614,180 UART: [afmc] AUTHORITY.KEYID = 5
17,149,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,595 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,071 UART: [afmc] --
18,950,264 UART: [cold-reset] --
18,953,964 UART: [state] Locking Datavault
18,959,751 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,938 UART: [state] Locking ICCM
18,964,539 UART: [exit] Launching FMC @ 0x40000130
18,973,213 UART:
18,973,446 UART: Running Caliptra FMC ...
18,974,548 UART:
18,974,705 UART: [state] CFI Enabled
19,030,802 UART: [fht] FMC Alias Private Key: 7
20,794,235 UART: [art] Extend RT PCRs Done
20,795,451 UART: [art] Lock RT PCRs Done
20,797,136 UART: [art] Populate DV Done
20,802,274 UART: [fht] FMC Alias Private Key: 7
20,803,968 UART: [art] Derive CDI
20,804,780 UART: [art] Store in in slot 0x4
20,863,387 UART: [art] Derive Key Pair
20,864,421 UART: [art] Store priv key in slot 0x5
23,327,934 UART: [art] Derive Key Pair - Done
23,340,600 UART: [art] Signing Cert with AUTHO
23,341,915 UART: RITY.KEYID = 7
25,054,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,556 UART: [art] PUB.X = C4483B725C42C3B7A6AFD8ECF533DA070FBA90BEAFFC5A931C02A5A49AE0C97FF42A201FA186F920B1663689FDD4F197
25,062,804 UART: [art] PUB.Y = 932357BE89C095330BB2AD15AA7C9892487335F7152D4440580B89E4B88D12F70A078BF15D4BC5992BDD2BAF68A5D7E0
25,070,077 UART: [art] SIG.R = 7C643A04D62307585FEA4D9B0214D424C9944AC61C83ADE6C1C340A9FBC77B6C0B2D9DD91C623817491839BE6DDB049E
25,077,436 UART: [art] SIG.S = A5DAA1A9EF6A07E7B6BA6418E4729B7796E73A17EDDDB27468D3C6C4AB2F840F6EC6762CF0D38A0731899F8CD4F6E6F4
26,055,822 UART: Caliptra RT
26,056,533 UART: [state] CFI Enabled
26,222,528 UART: [rt] RT listening for mailbox commands...
26,224,416 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,255,299 UART: [rt]cmd =0x434b4558, len=80
30,601,703 >>> mbox cmd response data (6280 bytes)
30,635,333 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,665,450 UART: [rt]cmd =0x414c544e, len=41
30,667,846 >>> mbox cmd response data (8 bytes)
30,668,398 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,698,817 UART: [rt]cmd =0x434b4558, len=80
35,039,089 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,438,908 ready_for_fw is high
3,439,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,036 >>> mbox cmd response: success
19,046,709 UART:
19,047,108 UART: Running Caliptra FMC ...
19,048,217 UART:
19,048,391 UART: [state] CFI Enabled
19,115,324 UART: [fht] FMC Alias Private Key: 7
20,880,177 UART: [art] Extend RT PCRs Done
20,881,400 UART: [art] Lock RT PCRs Done
20,882,997 UART: [art] Populate DV Done
20,888,517 UART: [fht] FMC Alias Private Key: 7
20,890,007 UART: [art] Derive CDI
20,890,778 UART: [art] Store in in slot 0x4
20,948,195 UART: [art] Derive Key Pair
20,949,233 UART: [art] Store priv key in slot 0x5
23,412,169 UART: [art] Derive Key Pair - Done
23,424,988 UART: [art] Signing Cert with AUTHO
23,426,336 UART: RITY.KEYID = 7
25,138,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,061 UART: [art] PUB.X = 0FF23873A9D525404C06101C53F76859BCA1B3EFE704D50E8BC2FDE5D61615B6C88D36C4C86FD3A8FB3DD51873BADD5A
25,147,308 UART: [art] PUB.Y = A10D16003B9AAD4B0953C2706FD2D8206C48AA659FB2E47D55B1BE2DD6C0237A4504CA40A111F4FA5ED23B59D53A28F6
25,154,582 UART: [art] SIG.R = 61AD287E1F67B8BA1BE27B828C84AF0C93FA8D507129A9C0054C3D3458444564920D53A3521E9D33BD40730A9EB50552
25,161,978 UART: [art] SIG.S = A5F17201550864950B6899F4A94853FB7CBE2A2AAB224B9D5EAC396DEEBED3B759DE2989716EB5C0FC84692467E51D17
26,141,183 UART: Caliptra RT
26,141,886 UART: [state] CFI Enabled
26,306,954 UART: [rt] RT listening for mailbox commands...
26,308,842 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,339,906 UART: [rt]cmd =0x434b4558, len=80
30,687,229 >>> mbox cmd response data (6280 bytes)
30,720,903 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,751,449 UART: [rt]cmd =0x414c544e, len=41
30,753,948 >>> mbox cmd response data (8 bytes)
30,754,450 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,784,745 UART: [rt]cmd =0x434b4558, len=80
35,124,799 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,415 UART:
192,776 UART: Running Caliptra ROM ...
193,866 UART:
603,721 UART: [state] CFI Enabled
615,484 UART: [state] LifecycleState = Unprovisioned
617,860 UART: [state] DebugLocked = No
619,725 UART: [state] WD Timer not started. Device not locked for debugging
625,041 UART: [kat] SHA2-256
814,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,759 UART: [kat] ++
826,356 UART: [kat] sha1
837,014 UART: [kat] SHA2-256
840,012 UART: [kat] SHA2-384
846,700 UART: [kat] SHA2-512-ACC
849,341 UART: [kat] ECC-384
3,290,823 UART: [kat] HMAC-384Kdf
3,303,546 UART: [kat] LMS
3,835,369 UART: [kat] --
3,838,437 UART: [cold-reset] ++
3,839,785 UART: [fht] FHT @ 0x50003400
3,851,040 UART: [idev] ++
3,851,736 UART: [idev] CDI.KEYID = 6
3,852,677 UART: [idev] SUBJECT.KEYID = 7
3,853,923 UART: [idev] UDS.KEYID = 0
3,854,819 ready_for_fw is high
3,854,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,709 UART: [idev] Erasing UDS.KEYID = 0
6,325,533 UART: [idev] Sha1 KeyId Algorithm
6,346,567 UART: [idev] --
6,351,474 UART: [ldev] ++
6,352,148 UART: [ldev] CDI.KEYID = 6
6,353,024 UART: [ldev] SUBJECT.KEYID = 5
6,354,228 UART: [ldev] AUTHORITY.KEYID = 7
6,355,449 UART: [ldev] FE.KEYID = 1
6,364,894 UART: [ldev] Erasing FE.KEYID = 1
8,840,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,988 UART: [ldev] --
10,630,517 UART: [fwproc] Wait for Commands...
10,632,701 UART: [fwproc] Recv command 0x46574c44
10,634,970 UART: [fwproc] Recv'd Img size: 114448 bytes
14,075,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,266,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,809,736 >>> mbox cmd response: success
14,813,921 UART: [afmc] ++
14,814,624 UART: [afmc] CDI.KEYID = 6
14,815,870 UART: [afmc] SUBJECT.KEYID = 7
14,817,306 UART: [afmc] AUTHORITY.KEYID = 5
17,321,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,046,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,048,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,063,394 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,078,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,093,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,116,750 UART: [afmc] --
19,120,062 UART: [cold-reset] --
19,122,913 UART: [state] Locking Datavault
19,128,273 UART: [state] Locking PCR0, PCR1 and PCR31
19,130,479 UART: [state] Locking ICCM
19,132,194 UART: [exit] Launching FMC @ 0x40000130
19,140,867 UART:
19,141,095 UART: Running Caliptra FMC ...
19,142,191 UART:
19,142,343 UART: [state] CFI Enabled
19,150,597 UART: [fht] FMC Alias Private Key: 7
20,907,464 UART: [art] Extend RT PCRs Done
20,908,688 UART: [art] Lock RT PCRs Done
20,910,519 UART: [art] Populate DV Done
20,915,934 UART: [fht] FMC Alias Private Key: 7
20,917,414 UART: [art] Derive CDI
20,918,142 UART: [art] Store in in slot 0x4
20,960,361 UART: [art] Derive Key Pair
20,961,398 UART: [art] Store priv key in slot 0x5
23,387,977 UART: [art] Derive Key Pair - Done
23,401,137 UART: [art] Signing Cert with AUTHO
23,402,434 UART: RITY.KEYID = 7
25,108,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,674 UART: [art] PUB.X = 89DA0720727358C5B9EE515C8FA13C5DAE7DA1D5D1307BA2B5046DC1A2DE6560756529BDC69D6C023441FC681FC48C89
25,116,971 UART: [art] PUB.Y = 51856741517D508607315C592D05559F8B7E1261796BEAEC010912E0577E3F7B575B91D5E7327668FB095DCD6B99BC61
25,124,192 UART: [art] SIG.R = 08BE75C6B495773C4C7EE3393076BDA46B1D13A7FD72CEB15453D157B780E58967CA09109637D708D19ACA31B27AC8BA
25,131,603 UART: [art] SIG.S = 79091383841944056C37ED52D2C338008D897EEA52DDFE6494BCE2FCE5D5D29ED3297C437B28D5803FA67D484850B433
26,110,606 UART: Caliptra RT
26,111,318 UART: [state] CFI Enabled
26,229,312 UART: [rt] RT listening for mailbox commands...
26,231,197 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,261,530 UART: [rt]cmd =0x434b4558, len=80
30,531,079 >>> mbox cmd response data (6280 bytes)
30,565,051 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,595,345 UART: [rt]cmd =0x414c544e, len=41
30,597,738 >>> mbox cmd response data (8 bytes)
30,598,233 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,628,429 UART: [rt]cmd =0x434b4558, len=80
34,898,359 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,752,858 ready_for_fw is high
3,753,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,959,666 >>> mbox cmd response: success
19,209,801 UART:
19,210,172 UART: Running Caliptra FMC ...
19,211,301 UART:
19,211,447 UART: [state] CFI Enabled
19,219,600 UART: [fht] FMC Alias Private Key: 7
20,977,268 UART: [art] Extend RT PCRs Done
20,978,480 UART: [art] Lock RT PCRs Done
20,980,073 UART: [art] Populate DV Done
20,985,427 UART: [fht] FMC Alias Private Key: 7
20,986,910 UART: [art] Derive CDI
20,987,636 UART: [art] Store in in slot 0x4
21,030,015 UART: [art] Derive Key Pair
21,031,063 UART: [art] Store priv key in slot 0x5
23,458,035 UART: [art] Derive Key Pair - Done
23,470,763 UART: [art] Signing Cert with AUTHO
23,472,061 UART: RITY.KEYID = 7
25,177,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,574 UART: [art] PUB.X = 63A03EDE2B8256D376C3B5B5599260ADC86EDD6AE96E181B5C6B8B4C455A390C15E3F31F581C4BFEF88A47C8E74BA4FD
25,185,855 UART: [art] PUB.Y = 5E4EB668A59A2B572F3E75F6016746DB69185EF35DCD13645120F2D412DA902E622F504733D8480DE1605536CAA4C5E4
25,193,114 UART: [art] SIG.R = B73210DE7CDF55A8E9F737901522E6C9D16E39CFF76B18F9D92C4CCBBC8BC80D12B9C1D08972190ED0CEC1DFC4D5CFCB
25,200,497 UART: [art] SIG.S = A9F90C871080E0BD91E7CA2583D8EC76F61CC98BFAEF8DC1B269D3B3CC045C80821C65B83AB6B4F10F2E2ABFDEBA6152
26,179,429 UART: Caliptra RT
26,180,141 UART: [state] CFI Enabled
26,297,382 UART: [rt] RT listening for mailbox commands...
26,299,286 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,329,706 UART: [rt]cmd =0x434b4558, len=80
30,599,757 >>> mbox cmd response data (6280 bytes)
30,633,487 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,663,900 UART: [rt]cmd =0x414c544e, len=41
30,666,184 >>> mbox cmd response data (8 bytes)
30,666,779 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,697,063 UART: [rt]cmd =0x434b4558, len=80
34,966,541 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,645 UART: [kat] SHA2-256
881,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,691 UART: [kat] ++
885,843 UART: [kat] sha1
890,263 UART: [kat] SHA2-256
892,201 UART: [kat] SHA2-384
895,032 UART: [kat] SHA2-512-ACC
896,933 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,737 UART: [fht] Storing FHT @ 0x50003400
1,479,476 UART: [idev] ++
1,479,644 UART: [idev] CDI.KEYID = 6
1,480,004 UART: [idev] SUBJECT.KEYID = 7
1,480,428 UART: [idev] UDS.KEYID = 0
1,480,773 ready_for_fw is high
1,480,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,462 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,839 UART: [ldev] ++
1,515,007 UART: [ldev] CDI.KEYID = 6
1,515,370 UART: [ldev] SUBJECT.KEYID = 5
1,515,796 UART: [ldev] AUTHORITY.KEYID = 7
1,516,259 UART: [ldev] FE.KEYID = 1
1,521,331 UART: [ldev] Erasing FE.KEYID = 1
1,546,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,725 UART: [fwproc] Waiting for Commands...
1,586,462 UART: [fwproc] Received command 0x46574c44
1,587,253 UART: [fwproc] Received Image of size 114448 bytes
2,885,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,311 >>> mbox cmd response: success
3,080,375 UART: [afmc] ++
3,080,543 UART: [afmc] CDI.KEYID = 6
3,080,905 UART: [afmc] SUBJECT.KEYID = 7
3,081,330 UART: [afmc] AUTHORITY.KEYID = 5
3,116,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,038 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,728 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,451 UART: [afmc] --
3,159,579 UART: [cold-reset] --
3,160,275 UART: [state] Locking Datavault
3,161,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,726 UART: [state] Locking ICCM
3,162,346 UART: [exit] Launching FMC @ 0x40000130
3,167,675 UART:
3,167,691 UART: Running Caliptra FMC ...
3,168,099 UART:
3,168,153 UART: [state] CFI Enabled
3,178,786 UART: [fht] FMC Alias Private Key: 7
3,286,337 UART: [art] Extend RT PCRs Done
3,286,765 UART: [art] Lock RT PCRs Done
3,288,409 UART: [art] Populate DV Done
3,296,560 UART: [fht] FMC Alias Private Key: 7
3,297,576 UART: [art] Derive CDI
3,297,856 UART: [art] Store in in slot 0x4
3,383,771 UART: [art] Derive Key Pair
3,384,131 UART: [art] Store priv key in slot 0x5
3,396,775 UART: [art] Derive Key Pair - Done
3,411,789 UART: [art] Signing Cert with AUTHO
3,412,269 UART: RITY.KEYID = 7
3,428,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,780 UART: [art] PUB.X = 1465E0537AE083FA8F7BCCBC3D33134D72B3D878D430F7B96C90479C8B0BD32A8EAAB82DFAD4067E20289A5E7B1DCFB2
3,435,562 UART: [art] PUB.Y = D9303E83F535F95AA87225686F381677984A1711DFE9A79605168BADC3A201E77E085DC5AF7F886A508AA83D81E410FC
3,442,503 UART: [art] SIG.R = B35E9A262267661EEB9AE9AF8428C66F15ACB397DB2135DA93567C5FF3246ABD7B6783BDB1AA650470CD26B4DECAF38E
3,449,288 UART: [art] SIG.S = 248FFC374436C2D690B72FEF84606D4D6F000D74B2A8D538E6371ACDB65FC2C1A4797A0C5E4D1BF7C7B591CD11E2A5B9
3,473,477 UART: Caliptra RT
3,473,730 UART: [state] CFI Enabled
3,580,627 UART: [rt] RT listening for mailbox commands...
3,581,297 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,881 UART: [rt]cmd =0x434b4558, len=80
3,780,657 >>> mbox cmd response data (6280 bytes)
3,780,658 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,400 UART: [rt]cmd =0x414c544e, len=41
3,812,390 >>> mbox cmd response data (8 bytes)
3,812,391 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,290 UART: [rt]cmd =0x434b4558, len=80
4,011,816 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,827 ready_for_fw is high
1,362,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,327 >>> mbox cmd response: success
2,989,269 UART:
2,989,285 UART: Running Caliptra FMC ...
2,989,693 UART:
2,989,747 UART: [state] CFI Enabled
3,000,216 UART: [fht] FMC Alias Private Key: 7
3,108,461 UART: [art] Extend RT PCRs Done
3,108,889 UART: [art] Lock RT PCRs Done
3,110,399 UART: [art] Populate DV Done
3,118,646 UART: [fht] FMC Alias Private Key: 7
3,119,772 UART: [art] Derive CDI
3,120,052 UART: [art] Store in in slot 0x4
3,205,581 UART: [art] Derive Key Pair
3,205,941 UART: [art] Store priv key in slot 0x5
3,218,837 UART: [art] Derive Key Pair - Done
3,233,622 UART: [art] Signing Cert with AUTHO
3,234,102 UART: RITY.KEYID = 7
3,249,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,877 UART: [art] PUB.X = 051C33FD19ABD27F085CF1929DC18871F90A0B1306F688A2B47514F4710BF4144B159DEC26828A5FCA177173C05E2746
3,256,627 UART: [art] PUB.Y = 665B1B065BDE8FF9E0AE0F6467DBA2C21076882A7CF2BF1EC1D4AB1F599179EDCE07488E0E7ECD0CE466168915AAA3A1
3,263,582 UART: [art] SIG.R = 4AE980C1275D0B599CF1C44702F3123D4EDAD86AF2E6BC2B105FC064C520971F5187304C89246D9FF2C37710F8B2DA80
3,270,350 UART: [art] SIG.S = AE577671590543CA3D95F0AD28976CDABBCC409845375091B18CFC9A2097A6B9757A65AAD5EBC7C7A7494530B949487C
3,293,566 UART: Caliptra RT
3,293,819 UART: [state] CFI Enabled
3,402,250 UART: [rt] RT listening for mailbox commands...
3,402,920 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,214 UART: [rt]cmd =0x434b4558, len=80
3,601,376 >>> mbox cmd response data (6280 bytes)
3,601,377 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,015 UART: [rt]cmd =0x414c544e, len=41
3,632,967 >>> mbox cmd response data (8 bytes)
3,632,968 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,533 UART: [rt]cmd =0x434b4558, len=80
3,830,841 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,640 UART: [kat] SHA2-256
882,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,686 UART: [kat] ++
886,838 UART: [kat] sha1
891,094 UART: [kat] SHA2-256
893,032 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
903,557 UART: [kat] HMAC-384Kdf
908,223 UART: [kat] LMS
1,476,419 UART: [kat] --
1,477,452 UART: [cold-reset] ++
1,477,898 UART: [fht] Storing FHT @ 0x50003400
1,480,647 UART: [idev] ++
1,480,815 UART: [idev] CDI.KEYID = 6
1,481,175 UART: [idev] SUBJECT.KEYID = 7
1,481,599 UART: [idev] UDS.KEYID = 0
1,481,944 ready_for_fw is high
1,481,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,037 UART: [idev] Erasing UDS.KEYID = 0
1,506,857 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,383 UART: [idev] --
1,516,568 UART: [ldev] ++
1,516,736 UART: [ldev] CDI.KEYID = 6
1,517,099 UART: [ldev] SUBJECT.KEYID = 5
1,517,525 UART: [ldev] AUTHORITY.KEYID = 7
1,517,988 UART: [ldev] FE.KEYID = 1
1,523,358 UART: [ldev] Erasing FE.KEYID = 1
1,548,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,981 UART: [ldev] --
1,588,372 UART: [fwproc] Waiting for Commands...
1,589,035 UART: [fwproc] Received command 0x46574c44
1,589,826 UART: [fwproc] Received Image of size 114448 bytes
2,889,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,083,490 >>> mbox cmd response: success
3,084,694 UART: [afmc] ++
3,084,862 UART: [afmc] CDI.KEYID = 6
3,085,224 UART: [afmc] SUBJECT.KEYID = 7
3,085,649 UART: [afmc] AUTHORITY.KEYID = 5
3,121,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,137,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,505 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,155,195 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,163,060 UART: [afmc] --
3,163,986 UART: [cold-reset] --
3,164,844 UART: [state] Locking Datavault
3,165,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,457 UART: [state] Locking ICCM
3,166,961 UART: [exit] Launching FMC @ 0x40000130
3,172,290 UART:
3,172,306 UART: Running Caliptra FMC ...
3,172,714 UART:
3,172,857 UART: [state] CFI Enabled
3,183,596 UART: [fht] FMC Alias Private Key: 7
3,292,131 UART: [art] Extend RT PCRs Done
3,292,559 UART: [art] Lock RT PCRs Done
3,294,123 UART: [art] Populate DV Done
3,302,182 UART: [fht] FMC Alias Private Key: 7
3,303,174 UART: [art] Derive CDI
3,303,454 UART: [art] Store in in slot 0x4
3,389,295 UART: [art] Derive Key Pair
3,389,655 UART: [art] Store priv key in slot 0x5
3,402,365 UART: [art] Derive Key Pair - Done
3,417,501 UART: [art] Signing Cert with AUTHO
3,417,981 UART: RITY.KEYID = 7
3,433,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,240 UART: [art] PUB.X = AD2C3A0A513DD0E363E5EBABAA800DE3829727CD8D4A05E723A1CFCBC8A526D0B8C8B6CECACC19088E290EEC5FC0B34F
3,441,027 UART: [art] PUB.Y = E174A60E98EC201F20191611CB6863373E9ED048F81741CC74301DF26653EA15A7AA184572E4D00D9D9E71D42604D02D
3,447,964 UART: [art] SIG.R = F758246FA7036C81D620F4E8AA68FEC4D14BCF030A8F25E1A40EC6083CC5C1CB67F32D8AB9A7A3E8981302B89028C102
3,454,723 UART: [art] SIG.S = 98CD4EFB94E9DA7F54903DB3FA9D889F219F3AF59E32A6C1215939797A4239CA2F27912169706F09E4C78F99AE2429EE
3,478,031 UART: Caliptra RT
3,478,376 UART: [state] CFI Enabled
3,586,884 UART: [rt] RT listening for mailbox commands...
3,587,554 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,784 UART: [rt]cmd =0x434b4558, len=80
3,787,132 >>> mbox cmd response data (6280 bytes)
3,787,133 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,631 UART: [rt]cmd =0x414c544e, len=41
3,818,451 >>> mbox cmd response data (8 bytes)
3,818,452 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,848,415 UART: [rt]cmd =0x434b4558, len=80
4,016,687 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,234 >>> mbox cmd response: success
2,992,234 UART:
2,992,250 UART: Running Caliptra FMC ...
2,992,658 UART:
2,992,801 UART: [state] CFI Enabled
3,003,704 UART: [fht] FMC Alias Private Key: 7
3,111,711 UART: [art] Extend RT PCRs Done
3,112,139 UART: [art] Lock RT PCRs Done
3,113,631 UART: [art] Populate DV Done
3,122,032 UART: [fht] FMC Alias Private Key: 7
3,123,146 UART: [art] Derive CDI
3,123,426 UART: [art] Store in in slot 0x4
3,208,915 UART: [art] Derive Key Pair
3,209,275 UART: [art] Store priv key in slot 0x5
3,222,885 UART: [art] Derive Key Pair - Done
3,237,935 UART: [art] Signing Cert with AUTHO
3,238,415 UART: RITY.KEYID = 7
3,253,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,430 UART: [art] PUB.X = B8756F59942E819A98CE9FF27E220395FAE576F1E04D9C0F36EDE998383E5BE89A6A7345EDFED7D32388EA59E56D0BF2
3,261,203 UART: [art] PUB.Y = 080EBC8CF8B7A9A2CF3B5DD8A153AD2A86BB4D4598654FF70CA7B83946D1527CAAD4C13D6BB66FB408BB68CF7632F6D6
3,268,163 UART: [art] SIG.R = D8290B1A6111454E74D66B7BE25D0FCCFD23409050CE23F35A74C288C76DCC4CD1DC809040723D12339F7C382CC5D70D
3,274,930 UART: [art] SIG.S = 7EB5B153EA888A6E5DEA906ED4F086171D76D4F9E36554652B489795A7B8919786A97A9F943BF14ED0361B6BDAEFA5A6
3,299,177 UART: Caliptra RT
3,299,522 UART: [state] CFI Enabled
3,407,971 UART: [rt] RT listening for mailbox commands...
3,408,641 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,879 UART: [rt]cmd =0x434b4558, len=80
3,607,569 >>> mbox cmd response data (6280 bytes)
3,607,570 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,962 UART: [rt]cmd =0x414c544e, len=41
3,638,910 >>> mbox cmd response data (8 bytes)
3,638,911 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,850 UART: [rt]cmd =0x434b4558, len=80
3,837,206 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,780 UART: [kat] SHA2-512-ACC
908,681 UART: [kat] ECC-384
918,202 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,172,235 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,472 UART: [idev] ++
1,175,640 UART: [idev] CDI.KEYID = 6
1,176,000 UART: [idev] SUBJECT.KEYID = 7
1,176,424 UART: [idev] UDS.KEYID = 0
1,176,769 ready_for_fw is high
1,176,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,154 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,661 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,264 UART: [ldev] SUBJECT.KEYID = 5
1,211,690 UART: [ldev] AUTHORITY.KEYID = 7
1,212,153 UART: [ldev] FE.KEYID = 1
1,217,279 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,078 >>> mbox cmd response: success
2,777,154 UART: [afmc] ++
2,777,322 UART: [afmc] CDI.KEYID = 6
2,777,684 UART: [afmc] SUBJECT.KEYID = 7
2,778,109 UART: [afmc] AUTHORITY.KEYID = 5
2,813,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,293 UART: [afmc] --
2,857,273 UART: [cold-reset] --
2,858,327 UART: [state] Locking Datavault
2,859,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,150 UART: [state] Locking ICCM
2,860,810 UART: [exit] Launching FMC @ 0x40000130
2,866,139 UART:
2,866,155 UART: Running Caliptra FMC ...
2,866,563 UART:
2,866,617 UART: [state] CFI Enabled
2,876,704 UART: [fht] FMC Alias Private Key: 7
2,985,343 UART: [art] Extend RT PCRs Done
2,985,771 UART: [art] Lock RT PCRs Done
2,987,645 UART: [art] Populate DV Done
2,995,982 UART: [fht] FMC Alias Private Key: 7
2,996,950 UART: [art] Derive CDI
2,997,230 UART: [art] Store in in slot 0x4
3,082,707 UART: [art] Derive Key Pair
3,083,067 UART: [art] Store priv key in slot 0x5
3,096,203 UART: [art] Derive Key Pair - Done
3,111,167 UART: [art] Signing Cert with AUTHO
3,111,647 UART: RITY.KEYID = 7
3,126,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,704 UART: [art] PUB.X = 28F337E4AFA01DB60B12569BEA6D74E1FA525F3D52C2FE2AE70DBA1954B2EB05F52D59E13C0338A4C1B105BC9248849F
3,134,473 UART: [art] PUB.Y = E4F35E44B3381D295371C323F3BF758F48696AAA565A377E0A9127EF7CA17D95461A4B7F58195B5C2999C2022283BAC6
3,141,415 UART: [art] SIG.R = D5FC6EA42611D9CE4A803DC6CAA77EFD32BB38CF912F9E5C0D08252B9295E3ECC7EBD1F64E4A560052E4DED7A173867A
3,148,179 UART: [art] SIG.S = 0A51A14C2E455F4E72E3B1EAD0B1EB07AA1F9903A3CE908FDC4FC84A100706DC9AC20757D0F044BD15A9B91554F675C3
3,171,646 UART: Caliptra RT
3,171,899 UART: [state] CFI Enabled
3,280,600 UART: [rt] RT listening for mailbox commands...
3,281,270 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,516 UART: [rt]cmd =0x434b4558, len=80
3,479,919 >>> mbox cmd response data (6280 bytes)
3,479,920 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,452 UART: [rt]cmd =0x414c544e, len=41
3,511,430 >>> mbox cmd response data (8 bytes)
3,511,431 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,218 UART: [rt]cmd =0x434b4558, len=80
3,710,241 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,849 >>> mbox cmd response: success
2,688,049 UART:
2,688,065 UART: Running Caliptra FMC ...
2,688,473 UART:
2,688,527 UART: [state] CFI Enabled
2,699,068 UART: [fht] FMC Alias Private Key: 7
2,806,891 UART: [art] Extend RT PCRs Done
2,807,319 UART: [art] Lock RT PCRs Done
2,808,627 UART: [art] Populate DV Done
2,816,944 UART: [fht] FMC Alias Private Key: 7
2,818,038 UART: [art] Derive CDI
2,818,318 UART: [art] Store in in slot 0x4
2,903,825 UART: [art] Derive Key Pair
2,904,185 UART: [art] Store priv key in slot 0x5
2,917,339 UART: [art] Derive Key Pair - Done
2,931,971 UART: [art] Signing Cert with AUTHO
2,932,451 UART: RITY.KEYID = 7
2,947,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,484 UART: [art] PUB.X = 6E9EC96D43DE58CD0E2C40A07B8695480A3077076239B02F16AB1338E7792F2E247E6B85A8ED16E94B26112236CA10A3
2,955,243 UART: [art] PUB.Y = B3350943CB01C834B47481DCE2A84982348A16D24ED7CF63843F794C73CC549348DF3F01A1406055849311B887E0D244
2,962,174 UART: [art] SIG.R = AD564BD9FC280803FD400C318611236829BD26D956634B54095172F5B9177CE663243C33A9AFB160CC68E720CC5FCF0B
2,968,929 UART: [art] SIG.S = C7569A388B9311AFC40A48FD6817D76597A639895D7029295866265C9269B8C20227870A532EEA61CDFB256DA81AFCBA
2,992,171 UART: Caliptra RT
2,992,424 UART: [state] CFI Enabled
3,100,940 UART: [rt] RT listening for mailbox commands...
3,101,610 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,090 UART: [rt]cmd =0x434b4558, len=80
3,300,979 >>> mbox cmd response data (6280 bytes)
3,300,980 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,434 UART: [rt]cmd =0x414c544e, len=41
3,332,376 >>> mbox cmd response data (8 bytes)
3,332,377 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,104 UART: [rt]cmd =0x434b4558, len=80
3,530,339 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
901,862 UART: [kat] SHA2-256
903,802 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
918,099 UART: [kat] HMAC-384Kdf
922,897 UART: [kat] LMS
1,171,225 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,174,973 UART: [idev] ++
1,175,141 UART: [idev] CDI.KEYID = 6
1,175,501 UART: [idev] SUBJECT.KEYID = 7
1,175,925 UART: [idev] UDS.KEYID = 0
1,176,270 ready_for_fw is high
1,176,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,785 UART: [idev] Erasing UDS.KEYID = 0
1,200,518 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,210,020 UART: [ldev] ++
1,210,188 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,977 UART: [ldev] AUTHORITY.KEYID = 7
1,211,440 UART: [ldev] FE.KEYID = 1
1,216,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,836 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,443 >>> mbox cmd response: success
2,776,539 UART: [afmc] ++
2,776,707 UART: [afmc] CDI.KEYID = 6
2,777,069 UART: [afmc] SUBJECT.KEYID = 7
2,777,494 UART: [afmc] AUTHORITY.KEYID = 5
2,813,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,451 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,864 UART: [afmc] --
2,856,972 UART: [cold-reset] --
2,857,720 UART: [state] Locking Datavault
2,858,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,471 UART: [state] Locking ICCM
2,860,003 UART: [exit] Launching FMC @ 0x40000130
2,865,332 UART:
2,865,348 UART: Running Caliptra FMC ...
2,865,756 UART:
2,865,899 UART: [state] CFI Enabled
2,877,082 UART: [fht] FMC Alias Private Key: 7
2,985,135 UART: [art] Extend RT PCRs Done
2,985,563 UART: [art] Lock RT PCRs Done
2,987,265 UART: [art] Populate DV Done
2,995,568 UART: [fht] FMC Alias Private Key: 7
2,996,518 UART: [art] Derive CDI
2,996,798 UART: [art] Store in in slot 0x4
3,082,681 UART: [art] Derive Key Pair
3,083,041 UART: [art] Store priv key in slot 0x5
3,096,753 UART: [art] Derive Key Pair - Done
3,111,561 UART: [art] Signing Cert with AUTHO
3,112,041 UART: RITY.KEYID = 7
3,127,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,306 UART: [art] PUB.X = FD9D1A51ECC68D5405F5822D90E2258443DD68C934B0406F411437D4B28A7345D5F2C93A8D67F49165160FA7E45AD267
3,135,068 UART: [art] PUB.Y = EF002011176928D89C93A2F8C88AE88EDD40905B467B25AC7C580700384625E41839A12340DA9114E886761F50A24AA0
3,141,961 UART: [art] SIG.R = BC21DFA53B8BBE17ACF6B7A65D84EF207D6B6DB08228369581E00603974F341A535A49A5D2BFF24A2D6D36290C8A2C7D
3,148,734 UART: [art] SIG.S = BA3B08AE811F9BE0E5260E1248E275FC596AE664282DECBFF942BD76C0BB7A2947F338435B57CD20BA7A38828F5E440D
3,172,420 UART: Caliptra RT
3,172,765 UART: [state] CFI Enabled
3,280,329 UART: [rt] RT listening for mailbox commands...
3,280,999 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,427 UART: [rt]cmd =0x434b4558, len=80
3,479,680 >>> mbox cmd response data (6280 bytes)
3,479,681 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,149 UART: [rt]cmd =0x414c544e, len=41
3,511,013 >>> mbox cmd response data (8 bytes)
3,511,014 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,937 UART: [rt]cmd =0x434b4558, len=80
3,710,662 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 ready_for_fw is high
1,060,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,770 >>> mbox cmd response: success
2,690,440 UART:
2,690,456 UART: Running Caliptra FMC ...
2,690,864 UART:
2,691,007 UART: [state] CFI Enabled
2,701,840 UART: [fht] FMC Alias Private Key: 7
2,809,917 UART: [art] Extend RT PCRs Done
2,810,345 UART: [art] Lock RT PCRs Done
2,812,035 UART: [art] Populate DV Done
2,820,462 UART: [fht] FMC Alias Private Key: 7
2,821,472 UART: [art] Derive CDI
2,821,752 UART: [art] Store in in slot 0x4
2,907,049 UART: [art] Derive Key Pair
2,907,409 UART: [art] Store priv key in slot 0x5
2,921,421 UART: [art] Derive Key Pair - Done
2,936,039 UART: [art] Signing Cert with AUTHO
2,936,519 UART: RITY.KEYID = 7
2,951,887 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,652 UART: [art] PUB.X = AF13C98F0568A398D13539FAC4430F8788F80694C1BF5BF77841E0991A2DD0444E099A86972023CCBEE803E30447DD33
2,959,402 UART: [art] PUB.Y = 8AE624A09A38C75271A30189A308C3DE4DA5644259516D084A186CA223B84052DF7691D9255F99CA9D4B2A060E0B1FD4
2,966,332 UART: [art] SIG.R = E523642D570A5EB7998563CC05C685A2AD69314217A468112648C541DDDF800A5C8DA90AAD44FE33178FB18EE42E4995
2,973,090 UART: [art] SIG.S = 36101B80E6D3A70C311C29609AA0C8A1BD76914EF1EB25CCF9335A96F564F1D62EBEEA8D09F60E972325A1896446BD15
2,996,978 UART: Caliptra RT
2,997,323 UART: [state] CFI Enabled
3,104,830 UART: [rt] RT listening for mailbox commands...
3,105,500 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,966 UART: [rt]cmd =0x434b4558, len=80
3,305,247 >>> mbox cmd response data (6280 bytes)
3,305,248 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,896 UART: [rt]cmd =0x414c544e, len=41
3,336,668 >>> mbox cmd response data (8 bytes)
3,336,669 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,468 UART: [rt]cmd =0x434b4558, len=80
3,535,699 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,174,009 ready_for_fw is high
1,174,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,489 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,539 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,426 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x46574c44
1,282,256 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,918 >>> mbox cmd response: success
2,774,127 UART: [afmc] ++
2,774,295 UART: [afmc] CDI.KEYID = 6
2,774,658 UART: [afmc] SUBJECT.KEYID = 7
2,775,084 UART: [afmc] AUTHORITY.KEYID = 5
2,810,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,280 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,892 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,611 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,630 UART: [afmc] --
2,853,632 UART: [cold-reset] --
2,854,574 UART: [state] Locking Datavault
2,855,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,215 UART: [state] Locking ICCM
2,856,823 UART: [exit] Launching FMC @ 0x40000130
2,862,152 UART:
2,862,168 UART: Running Caliptra FMC ...
2,862,576 UART:
2,862,630 UART: [state] CFI Enabled
2,872,949 UART: [fht] FMC Alias Private Key: 7
2,980,916 UART: [art] Extend RT PCRs Done
2,981,344 UART: [art] Lock RT PCRs Done
2,982,628 UART: [art] Populate DV Done
2,991,009 UART: [fht] FMC Alias Private Key: 7
2,992,153 UART: [art] Derive CDI
2,992,433 UART: [art] Store in in slot 0x4
3,078,254 UART: [art] Derive Key Pair
3,078,614 UART: [art] Store priv key in slot 0x5
3,091,738 UART: [art] Derive Key Pair - Done
3,106,341 UART: [art] Signing Cert with AUTHO
3,106,821 UART: RITY.KEYID = 7
3,122,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,790 UART: [art] PUB.X = 78E01B5678F54D0C78671724B40D9CF3A0514AB08C85D3117021C63D16DCC68473677F238BFBC6DDD05E421D6AAC044A
3,129,555 UART: [art] PUB.Y = 82B80DDA912C65ECF0166E05CAA12F0EE6DC9342E503960A6318BB2581D48401C6D96E5A22B438591E06E956FF2EA482
3,136,488 UART: [art] SIG.R = 0C3FE09ED2609955E6590F187741368B835D52D91F7FA784CF3FD3D9DE75C9ACA0AF0283F365CE95BF2D66160DF9D9B8
3,143,256 UART: [art] SIG.S = 332974A8A9117B99D5A40655C6C87DC546F67E13073CDF81E034CDBD36940B2B454AB9903754F62E9C4268AEFEA1736F
3,167,218 UART: Caliptra RT
3,167,471 UART: [state] CFI Enabled
3,275,138 UART: [rt] RT listening for mailbox commands...
3,275,808 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,244 UART: [rt]cmd =0x434b4558, len=80
3,475,258 >>> mbox cmd response data (6280 bytes)
3,475,259 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,831 UART: [rt]cmd =0x414c544e, len=41
3,506,731 >>> mbox cmd response data (8 bytes)
3,506,732 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,403 UART: [rt]cmd =0x434b4558, len=80
3,704,571 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,660 ready_for_fw is high
1,055,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,152 >>> mbox cmd response: success
2,685,420 UART:
2,685,436 UART: Running Caliptra FMC ...
2,685,844 UART:
2,685,898 UART: [state] CFI Enabled
2,696,121 UART: [fht] FMC Alias Private Key: 7
2,804,186 UART: [art] Extend RT PCRs Done
2,804,614 UART: [art] Lock RT PCRs Done
2,805,982 UART: [art] Populate DV Done
2,814,561 UART: [fht] FMC Alias Private Key: 7
2,815,663 UART: [art] Derive CDI
2,815,943 UART: [art] Store in in slot 0x4
2,901,472 UART: [art] Derive Key Pair
2,901,832 UART: [art] Store priv key in slot 0x5
2,915,104 UART: [art] Derive Key Pair - Done
2,929,721 UART: [art] Signing Cert with AUTHO
2,930,201 UART: RITY.KEYID = 7
2,945,187 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,952 UART: [art] PUB.X = 081D990A28FA8A059E8D125862CEF3EB2E22512A1530BECEAEF1FE38847CE0B95EDAD7D9D5C6BA1686A281C1C8DD00D6
2,952,711 UART: [art] PUB.Y = 9FE5D303673398FE575B148CEFAB641F86441256507ED385782310AB53162EB5593B3CA1F7AA118A01730E2D626E16E6
2,959,648 UART: [art] SIG.R = F9A9897402FA9A919146E8A7A6CF4A4384A9DFDB760DAA70BDBAE27A7CA973F99331D1FE06D7CA417E45E6C56A1A29EE
2,966,429 UART: [art] SIG.S = 1DF8CE74BE8EF636984B85AF5C6ECD938139795545D7BE444B341EF5C1189DBF832B3C17160084F9809D43AAC9F95730
2,990,390 UART: Caliptra RT
2,990,643 UART: [state] CFI Enabled
3,098,160 UART: [rt] RT listening for mailbox commands...
3,098,830 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,952 UART: [rt]cmd =0x434b4558, len=80
3,296,581 >>> mbox cmd response data (6280 bytes)
3,296,582 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,076 UART: [rt]cmd =0x414c544e, len=41
3,328,082 >>> mbox cmd response data (8 bytes)
3,328,083 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,022 UART: [rt]cmd =0x434b4558, len=80
3,527,539 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
891,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,195 UART: [kat] LMS
1,168,507 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,174,088 ready_for_fw is high
1,174,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,744 UART: [idev] Erasing UDS.KEYID = 0
1,198,628 UART: [idev] Sha1 KeyId Algorithm
1,207,462 UART: [idev] --
1,208,549 UART: [ldev] ++
1,208,717 UART: [ldev] CDI.KEYID = 6
1,209,081 UART: [ldev] SUBJECT.KEYID = 5
1,209,508 UART: [ldev] AUTHORITY.KEYID = 7
1,209,971 UART: [ldev] FE.KEYID = 1
1,215,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,465 >>> mbox cmd response: success
2,775,644 UART: [afmc] ++
2,775,812 UART: [afmc] CDI.KEYID = 6
2,776,175 UART: [afmc] SUBJECT.KEYID = 7
2,776,601 UART: [afmc] AUTHORITY.KEYID = 5
2,811,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,981 UART: [afmc] --
2,854,949 UART: [cold-reset] --
2,855,817 UART: [state] Locking Datavault
2,857,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,872 UART: [state] Locking ICCM
2,858,314 UART: [exit] Launching FMC @ 0x40000130
2,863,643 UART:
2,863,659 UART: Running Caliptra FMC ...
2,864,067 UART:
2,864,210 UART: [state] CFI Enabled
2,874,873 UART: [fht] FMC Alias Private Key: 7
2,983,216 UART: [art] Extend RT PCRs Done
2,983,644 UART: [art] Lock RT PCRs Done
2,985,166 UART: [art] Populate DV Done
2,993,439 UART: [fht] FMC Alias Private Key: 7
2,994,375 UART: [art] Derive CDI
2,994,655 UART: [art] Store in in slot 0x4
3,080,490 UART: [art] Derive Key Pair
3,080,850 UART: [art] Store priv key in slot 0x5
3,093,768 UART: [art] Derive Key Pair - Done
3,108,360 UART: [art] Signing Cert with AUTHO
3,108,840 UART: RITY.KEYID = 7
3,124,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,223 UART: [art] PUB.X = 838B5DEBEA7FEC623D29632517C3CDD99E1C7D808670A635038AA69DC66B58DD4F79E143F67A892590D77122FD5629A3
3,131,994 UART: [art] PUB.Y = EF8EE32EA3D332CEADA61EA09BAE8D7D4434B4F6B43E7C456458F91A72F721BDDBF730C6802244A72912A5CEDF41CC8D
3,138,966 UART: [art] SIG.R = FB16DACB54770CC06CCCCBBE1C3AC7BB4A833516C62F8356C43CA1B6EFA5F2608A25B550FE99F14BC1B5D69BDCBCFCAF
3,145,769 UART: [art] SIG.S = 23D27F2CDF5F75270E672805AD81037B0DBE86883C091CC0AE99438BA4A335926C7D7E6189D2FF36BFC2C29B019BF81D
3,169,650 UART: Caliptra RT
3,169,995 UART: [state] CFI Enabled
3,277,320 UART: [rt] RT listening for mailbox commands...
3,277,990 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,164 UART: [rt]cmd =0x434b4558, len=80
3,477,249 >>> mbox cmd response data (6280 bytes)
3,477,250 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,726 UART: [rt]cmd =0x414c544e, len=41
3,508,578 >>> mbox cmd response data (8 bytes)
3,508,579 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,512 UART: [rt]cmd =0x434b4558, len=80
3,707,919 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,189 ready_for_fw is high
1,056,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,297 >>> mbox cmd response: success
2,685,873 UART:
2,685,889 UART: Running Caliptra FMC ...
2,686,297 UART:
2,686,440 UART: [state] CFI Enabled
2,697,361 UART: [fht] FMC Alias Private Key: 7
2,805,026 UART: [art] Extend RT PCRs Done
2,805,454 UART: [art] Lock RT PCRs Done
2,807,130 UART: [art] Populate DV Done
2,815,661 UART: [fht] FMC Alias Private Key: 7
2,816,733 UART: [art] Derive CDI
2,817,013 UART: [art] Store in in slot 0x4
2,903,058 UART: [art] Derive Key Pair
2,903,418 UART: [art] Store priv key in slot 0x5
2,916,902 UART: [art] Derive Key Pair - Done
2,931,529 UART: [art] Signing Cert with AUTHO
2,932,009 UART: RITY.KEYID = 7
2,947,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,124 UART: [art] PUB.X = C0246B430DC5C4C0AF543BE7825175C26628065EA65CAAC898C0003CEE42C767723A4A75C530CE3C3C130743E392906F
2,954,863 UART: [art] PUB.Y = 84641F3E1DCAC11AA868CC23F72374D57788693CAE39A8ACFB9B3F6C4918C709E0228D7C231E60EFB9FBD04D137062CA
2,961,822 UART: [art] SIG.R = 8C352486546527E286AEFACB9503055D0EBC9DB0F4A7D3BBC15A7AE9C2C729CAFF4AE957E19AC0C609AA8BE04D3FF2AF
2,968,606 UART: [art] SIG.S = 00F6C0AF0F11E107FAF5FF598C5BBEDD475E91580E4D32E6C8EA052B7BB3FEFFCFB494F0BCE38485D3D16B90CF526938
2,992,611 UART: Caliptra RT
2,992,956 UART: [state] CFI Enabled
3,101,148 UART: [rt] RT listening for mailbox commands...
3,101,818 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,254 UART: [rt]cmd =0x434b4558, len=80
3,300,815 >>> mbox cmd response data (6280 bytes)
3,300,816 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,406 UART: [rt]cmd =0x414c544e, len=41
3,332,264 >>> mbox cmd response data (8 bytes)
3,332,265 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,108 UART: [rt]cmd =0x434b4558, len=80
3,531,901 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,337 UART:
192,688 UART: Running Caliptra ROM ...
193,901 UART:
194,060 UART: [state] CFI Enabled
266,349 UART: [state] LifecycleState = Unprovisioned
268,258 UART: [state] DebugLocked = No
271,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,682 UART: [kat] SHA2-256
446,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,911 UART: [kat] ++
457,447 UART: [kat] sha1
467,975 UART: [kat] SHA2-256
470,710 UART: [kat] SHA2-384
476,979 UART: [kat] SHA2-512-ACC
479,347 UART: [kat] ECC-384
2,767,160 UART: [kat] HMAC-384Kdf
2,799,309 UART: [kat] LMS
3,989,635 UART: [kat] --
3,993,510 UART: [cold-reset] ++
3,995,163 UART: [fht] Storing FHT @ 0x50003400
4,007,424 UART: [idev] ++
4,007,993 UART: [idev] CDI.KEYID = 6
4,009,016 UART: [idev] SUBJECT.KEYID = 7
4,010,199 UART: [idev] UDS.KEYID = 0
4,011,193 ready_for_fw is high
4,011,410 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,357 UART: [idev] Erasing UDS.KEYID = 0
7,344,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,845 UART: [idev] --
7,370,652 UART: [ldev] ++
7,371,223 UART: [ldev] CDI.KEYID = 6
7,372,242 UART: [ldev] SUBJECT.KEYID = 5
7,373,403 UART: [ldev] AUTHORITY.KEYID = 7
7,374,635 UART: [ldev] FE.KEYID = 1
7,420,662 UART: [ldev] Erasing FE.KEYID = 1
10,753,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,533 UART: [ldev] --
13,113,796 UART: [fwproc] Waiting for Commands...
13,116,648 UART: [fwproc] Received command 0x46574c44
13,118,826 UART: [fwproc] Received Image of size 114124 bytes
17,170,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,350 >>> mbox cmd response: success
17,638,713 UART: [afmc] ++
17,639,314 UART: [afmc] CDI.KEYID = 6
17,640,232 UART: [afmc] SUBJECT.KEYID = 7
17,641,499 UART: [afmc] AUTHORITY.KEYID = 5
21,003,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,717 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,001 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,400 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,681 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,223 UART: [afmc] --
23,378,576 UART: [cold-reset] --
23,381,250 UART: [state] Locking Datavault
23,386,719 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,478 UART: [state] Locking ICCM
23,389,875 UART: [exit] Launching FMC @ 0x40000130
23,398,224 UART:
23,398,461 UART: Running Caliptra FMC ...
23,399,566 UART:
23,399,735 UART: [state] CFI Enabled
23,464,172 UART: [fht] FMC Alias Private Key: 7
25,801,375 UART: [art] Extend RT PCRs Done
25,802,629 UART: [art] Lock RT PCRs Done
25,804,069 UART: [art] Populate DV Done
25,809,213 UART: [fht] FMC Alias Private Key: 7
25,810,908 UART: [art] Derive CDI
25,811,646 UART: [art] Store in in slot 0x4
25,871,993 UART: [art] Derive Key Pair
25,873,036 UART: [art] Store priv key in slot 0x5
29,165,537 UART: [art] Derive Key Pair - Done
29,178,158 UART: [art] Signing Cert with AUTHO
29,179,498 UART: RITY.KEYID = 7
31,467,228 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,732 UART: [art] PUB.X = 6592C5C19E9DDD001E39525DB512F4897FEB91786AB207643B25C922C9C34D34B37F982E392EFA21AE66E3CA136DCAC1
31,475,987 UART: [art] PUB.Y = AEC84A1C3485C88C6C311FA3E9DD953A55E91EBDFE757700F6960B37E59BFF32F4206F59D0AAEEF339FA310E6C2271C8
31,483,235 UART: [art] SIG.R = 91D1381FADBAA96F067FD7A394698DA465DC86BCDEF4784969EDF5BF14905CED2D632DC24CECB6C4DEDE3BE73D074FE2
31,490,699 UART: [art] SIG.S = C7FDD3B13555C0F2B9EE608ACA2CD351F90A46E36C7E0DE3BE9346933D2677CCCB81BB7DA402B33EE6105AE26A90E5E7
32,795,470 UART: Caliptra RT
32,796,187 UART: [state] CFI Enabled
32,958,452 UART: [rt] RT listening for mailbox commands...
32,960,344 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,990,502 UART: [rt]cmd =0x414c544e, len=41
32,992,927 >>> mbox cmd response data (8 bytes)
32,993,975 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,024,401 UART: [rt]cmd =0x434b4558, len=80
38,763,390 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,782,141 ready_for_fw is high
3,782,528 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,886,430 >>> mbox cmd response: success
23,585,411 UART:
23,585,782 UART: Running Caliptra FMC ...
23,586,884 UART:
23,587,037 UART: [state] CFI Enabled
23,655,892 UART: [fht] FMC Alias Private Key: 7
25,993,560 UART: [art] Extend RT PCRs Done
25,994,785 UART: [art] Lock RT PCRs Done
25,996,599 UART: [art] Populate DV Done
26,002,062 UART: [fht] FMC Alias Private Key: 7
26,003,725 UART: [art] Derive CDI
26,004,470 UART: [art] Store in in slot 0x4
26,064,269 UART: [art] Derive Key Pair
26,065,267 UART: [art] Store priv key in slot 0x5
29,357,625 UART: [art] Derive Key Pair - Done
29,370,679 UART: [art] Signing Cert with AUTHO
29,371,989 UART: RITY.KEYID = 7
31,659,010 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,532 UART: [art] PUB.X = BD45A3410943799D67DA17DDE3F11C1359131C30EF9C2311F23FD3303303496A0F17F9DD314E0560BB0D1E6C46B758B4
31,667,738 UART: [art] PUB.Y = 131403406E229603125FD62370E7C5AD19B67D0AC3A8F7F8DCE44545289CCC949B692C846DAA58EF509423E24F388DA4
31,674,949 UART: [art] SIG.R = 1CF89F17015CA95474CCC46CF0D595D2D85DAC820DC030A25FC60134FCA4786A5CCDA7D5869284AEFBA912C7F50024B7
31,682,346 UART: [art] SIG.S = DF88FF10D539CCF4F6A1DE76252F4D61481FF450B63E1D7551AA667E04385826FB4884D15637B94FE611C743D5CC9FF5
32,986,877 UART: Caliptra RT
32,987,587 UART: [state] CFI Enabled
33,148,584 UART: [rt] RT listening for mailbox commands...
33,150,478 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,180,796 UART: [rt]cmd =0x414c544e, len=41
33,183,118 >>> mbox cmd response data (8 bytes)
33,183,952 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,214,551 UART: [rt]cmd =0x434b4558, len=80
38,954,744 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
192,811 UART:
193,210 UART: Running Caliptra ROM ...
194,375 UART:
604,095 UART: [state] CFI Enabled
615,707 UART: [state] LifecycleState = Unprovisioned
617,582 UART: [state] DebugLocked = No
619,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,744 UART: [kat] SHA2-256
794,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,063 UART: [kat] ++
805,511 UART: [kat] sha1
818,177 UART: [kat] SHA2-256
820,864 UART: [kat] SHA2-384
826,284 UART: [kat] SHA2-512-ACC
828,656 UART: [kat] ECC-384
3,113,247 UART: [kat] HMAC-384Kdf
3,124,428 UART: [kat] LMS
4,314,556 UART: [kat] --
4,319,289 UART: [cold-reset] ++
4,320,158 UART: [fht] Storing FHT @ 0x50003400
4,331,419 UART: [idev] ++
4,331,991 UART: [idev] CDI.KEYID = 6
4,333,045 UART: [idev] SUBJECT.KEYID = 7
4,334,154 UART: [idev] UDS.KEYID = 0
4,335,139 ready_for_fw is high
4,335,334 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,672 UART: [idev] Erasing UDS.KEYID = 0
7,618,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,680 UART: [idev] --
7,644,883 UART: [ldev] ++
7,645,496 UART: [ldev] CDI.KEYID = 6
7,646,431 UART: [ldev] SUBJECT.KEYID = 5
7,647,631 UART: [ldev] AUTHORITY.KEYID = 7
7,648,933 UART: [ldev] FE.KEYID = 1
7,659,601 UART: [ldev] Erasing FE.KEYID = 1
10,947,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,854 UART: [ldev] --
13,307,698 UART: [fwproc] Waiting for Commands...
13,309,841 UART: [fwproc] Received command 0x46574c44
13,312,071 UART: [fwproc] Received Image of size 114124 bytes
17,364,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,424 >>> mbox cmd response: success
17,829,287 UART: [afmc] ++
17,829,958 UART: [afmc] CDI.KEYID = 6
17,830,866 UART: [afmc] SUBJECT.KEYID = 7
17,832,074 UART: [afmc] AUTHORITY.KEYID = 5
21,146,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,740 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,115 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,952 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,404 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,281 UART: [afmc] --
23,513,627 UART: [cold-reset] --
23,517,215 UART: [state] Locking Datavault
23,522,248 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,946 UART: [state] Locking ICCM
23,525,551 UART: [exit] Launching FMC @ 0x40000130
23,533,945 UART:
23,534,192 UART: Running Caliptra FMC ...
23,535,294 UART:
23,535,451 UART: [state] CFI Enabled
23,543,641 UART: [fht] FMC Alias Private Key: 7
25,874,505 UART: [art] Extend RT PCRs Done
25,875,732 UART: [art] Lock RT PCRs Done
25,876,922 UART: [art] Populate DV Done
25,882,166 UART: [fht] FMC Alias Private Key: 7
25,883,811 UART: [art] Derive CDI
25,884,623 UART: [art] Store in in slot 0x4
25,927,534 UART: [art] Derive Key Pair
25,928,532 UART: [art] Store priv key in slot 0x5
29,170,581 UART: [art] Derive Key Pair - Done
29,183,420 UART: [art] Signing Cert with AUTHO
29,184,730 UART: RITY.KEYID = 7
31,464,351 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,879 UART: [art] PUB.X = 6F3A3EDB13100B4027F9AA139CDECEB9C7D3B0D6B7CF45E02B626D7A1720684CED5B35E4EB5858F70A2CA9FE468A6A5F
31,473,110 UART: [art] PUB.Y = 7BDB6ED110DA1477D510509A165A9E8508D9CE5D8F7EA859E7A858257F7C1E347996E508031FAB83C0AF4E9F842B25BE
31,480,377 UART: [art] SIG.R = A0ECE080EB016DF20A364488147B5EAA3107D5F957CEFA5634AA7DEE0B2E206015232DD3089E3D6DD3636E4022B05DCA
31,487,757 UART: [art] SIG.S = EA9E46CAE3B97D6056553051AD584453381603BD98C8095A23ECB10927EA272BDAB828A7D5357D416EE94D7864B0D080
32,792,001 UART: Caliptra RT
32,792,707 UART: [state] CFI Enabled
32,910,970 UART: [rt] RT listening for mailbox commands...
32,912,896 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,942,996 UART: [rt]cmd =0x414c544e, len=41
32,945,365 >>> mbox cmd response data (8 bytes)
32,946,063 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,976,534 UART: [rt]cmd =0x434b4558, len=80
38,639,116 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,131,048 ready_for_fw is high
4,131,667 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,370 >>> mbox cmd response: success
23,725,916 UART:
23,726,324 UART: Running Caliptra FMC ...
23,727,426 UART:
23,727,593 UART: [state] CFI Enabled
23,735,659 UART: [fht] FMC Alias Private Key: 7
26,066,123 UART: [art] Extend RT PCRs Done
26,067,350 UART: [art] Lock RT PCRs Done
26,068,950 UART: [art] Populate DV Done
26,074,419 UART: [fht] FMC Alias Private Key: 7
26,075,903 UART: [art] Derive CDI
26,076,633 UART: [art] Store in in slot 0x4
26,118,800 UART: [art] Derive Key Pair
26,119,843 UART: [art] Store priv key in slot 0x5
29,361,971 UART: [art] Derive Key Pair - Done
29,374,984 UART: [art] Signing Cert with AUTHO
29,376,333 UART: RITY.KEYID = 7
31,655,931 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,435 UART: [art] PUB.X = 4F1F3D48DB43FB628943412904FB6F7F9933FCCD42820E539E80B11D7EEEBC3E808B57852521BC6BCAB603A78C305546
31,664,672 UART: [art] PUB.Y = 7DDB4D854BFAC698372DE8F47B98EE8089714B17F96F192BB9989C5693F3638E7EA9A6AC2711A111FAC3D5B64108C874
31,671,913 UART: [art] SIG.R = A4F7FDB77178A54DFF0464FD80E481EA25946594410233FF11E842211786CB740A52E77CE31DF8C310EA8E958A038590
31,679,298 UART: [art] SIG.S = 95E8E81A3D9C74665623C44AA83563C51CC9FD9443E4F217DF7FEDA4B429D17B3A17AA9F5634E7692632D1BE215F30E2
32,984,336 UART: Caliptra RT
32,985,041 UART: [state] CFI Enabled
33,101,892 UART: [rt] RT listening for mailbox commands...
33,103,783 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,133,941 UART: [rt]cmd =0x414c544e, len=41
33,136,397 >>> mbox cmd response data (8 bytes)
33,137,379 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,167,731 UART: [rt]cmd =0x434b4558, len=80
38,829,633 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
191,975 UART:
192,339 UART: Running Caliptra ROM ...
193,487 UART:
193,636 UART: [state] CFI Enabled
263,212 UART: [state] LifecycleState = Unprovisioned
265,067 UART: [state] DebugLocked = No
267,681 UART: [state] WD Timer not started. Device not locked for debugging
270,868 UART: [kat] SHA2-256
449,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,525 UART: [kat] ++
461,976 UART: [kat] sha1
473,273 UART: [kat] SHA2-256
476,282 UART: [kat] SHA2-384
482,768 UART: [kat] SHA2-512-ACC
485,699 UART: [kat] ECC-384
2,949,744 UART: [kat] HMAC-384Kdf
2,972,808 UART: [kat] LMS
3,502,266 UART: [kat] --
3,505,715 UART: [cold-reset] ++
3,508,077 UART: [fht] FHT @ 0x50003400
3,519,126 UART: [idev] ++
3,519,686 UART: [idev] CDI.KEYID = 6
3,520,635 UART: [idev] SUBJECT.KEYID = 7
3,521,806 UART: [idev] UDS.KEYID = 0
3,522,779 ready_for_fw is high
3,522,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,958 UART: [idev] Erasing UDS.KEYID = 0
6,025,798 UART: [idev] Sha1 KeyId Algorithm
6,047,550 UART: [idev] --
6,052,687 UART: [ldev] ++
6,053,295 UART: [ldev] CDI.KEYID = 6
6,054,220 UART: [ldev] SUBJECT.KEYID = 5
6,055,401 UART: [ldev] AUTHORITY.KEYID = 7
6,056,638 UART: [ldev] FE.KEYID = 1
6,102,010 UART: [ldev] Erasing FE.KEYID = 1
8,604,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,345 UART: [ldev] --
10,416,551 UART: [fwproc] Wait for Commands...
10,418,696 UART: [fwproc] Recv command 0x46574c44
10,420,732 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,042 >>> mbox cmd response: success
14,296,852 UART: [afmc] ++
14,297,446 UART: [afmc] CDI.KEYID = 6
14,298,360 UART: [afmc] SUBJECT.KEYID = 7
14,299,526 UART: [afmc] AUTHORITY.KEYID = 5
16,828,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,500 UART: [afmc] --
18,628,937 UART: [cold-reset] --
18,632,469 UART: [state] Locking Datavault
18,637,388 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,082 UART: [state] Locking ICCM
18,640,377 UART: [exit] Launching FMC @ 0x40000130
18,648,792 UART:
18,649,035 UART: Running Caliptra FMC ...
18,650,140 UART:
18,650,301 UART: [state] CFI Enabled
18,710,456 UART: [fht] FMC Alias Private Key: 7
20,474,501 UART: [art] Extend RT PCRs Done
20,475,719 UART: [art] Lock RT PCRs Done
20,477,638 UART: [art] Populate DV Done
20,482,890 UART: [fht] FMC Alias Private Key: 7
20,484,422 UART: [art] Derive CDI
20,485,154 UART: [art] Store in in slot 0x4
20,542,893 UART: [art] Derive Key Pair
20,543,930 UART: [art] Store priv key in slot 0x5
23,006,328 UART: [art] Derive Key Pair - Done
23,018,936 UART: [art] Signing Cert with AUTHO
23,020,260 UART: RITY.KEYID = 7
24,733,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,509 UART: [art] PUB.X = CA5F750ACACF9C92A8732754786FFC576DB6223040B08E2D4E5B349B10A01938F0145D85064C636D4252AFE4D395849E
24,741,756 UART: [art] PUB.Y = B2829AD9A665CD41295109FC52F5AD48896589715E1545A3DC42654FCAD796250EBD6E489CA9C881CABD4D674675A34A
24,749,037 UART: [art] SIG.R = AB1ECDC040CDC4EC502E6AF13042A79613AE124F0C8F3D6879B61C990975FDC8516DF38402C32B8AF2178B3252EE0EE0
24,756,437 UART: [art] SIG.S = F632CCF846DBE4FD64C302963C26B258B8E8753FE1A50D1B1CE8824D9910DB2F58B7F407A926AC2159D8AD71ED4DB8E9
25,735,707 UART: Caliptra RT
25,736,399 UART: [state] CFI Enabled
25,902,428 UART: [rt] RT listening for mailbox commands...
25,904,319 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,935,092 UART: [rt]cmd =0x414c544e, len=41
25,937,551 >>> mbox cmd response data (8 bytes)
25,938,438 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,968,852 UART: [rt]cmd =0x434b4558, len=80
30,303,343 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,362,402 ready_for_fw is high
3,362,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,264 >>> mbox cmd response: success
18,343,323 UART:
18,343,738 UART: Running Caliptra FMC ...
18,344,884 UART:
18,345,049 UART: [state] CFI Enabled
18,411,607 UART: [fht] FMC Alias Private Key: 7
20,175,554 UART: [art] Extend RT PCRs Done
20,176,778 UART: [art] Lock RT PCRs Done
20,178,376 UART: [art] Populate DV Done
20,183,680 UART: [fht] FMC Alias Private Key: 7
20,185,273 UART: [art] Derive CDI
20,186,026 UART: [art] Store in in slot 0x4
20,243,654 UART: [art] Derive Key Pair
20,244,667 UART: [art] Store priv key in slot 0x5
22,707,709 UART: [art] Derive Key Pair - Done
22,720,432 UART: [art] Signing Cert with AUTHO
22,721,737 UART: RITY.KEYID = 7
24,432,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,176 UART: [art] PUB.X = AEF80005099E7DC91A481E4C8DCEC6B5642FE114C79CA16D455C5AA8254796BDA87D52BF68398CA8EB0D056801353ED8
24,441,439 UART: [art] PUB.Y = DD27170C76AE60C75D1947D2325F41E1DB3E8FFBD0D182387174ABA543DFA43070C927DA7E5726ACC614C759CEC8E921
24,448,663 UART: [art] SIG.R = AD64AC48103F809D7E86EB00B11E2165ADA609E1ED55A1C5FE7F624929477137843E156D2D99ACF11AAA32EB30A4379A
24,456,075 UART: [art] SIG.S = 58664CE35EE853095B4B38FF6F9127FE5FC8CA701D98C25A13B480E20E643A24FE2A0A9E8AA0B8E804BAB09EF36B8C60
25,434,670 UART: Caliptra RT
25,435,362 UART: [state] CFI Enabled
25,601,352 UART: [rt] RT listening for mailbox commands...
25,603,252 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,633,884 UART: [rt]cmd =0x414c544e, len=41
25,636,430 >>> mbox cmd response data (8 bytes)
25,637,219 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,667,629 UART: [rt]cmd =0x434b4558, len=80
30,001,677 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,319 UART:
192,685 UART: Running Caliptra ROM ...
193,871 UART:
603,498 UART: [state] CFI Enabled
618,938 UART: [state] LifecycleState = Unprovisioned
620,804 UART: [state] DebugLocked = No
623,323 UART: [state] WD Timer not started. Device not locked for debugging
627,773 UART: [kat] SHA2-256
806,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,426 UART: [kat] ++
819,038 UART: [kat] sha1
830,982 UART: [kat] SHA2-256
833,981 UART: [kat] SHA2-384
839,535 UART: [kat] SHA2-512-ACC
842,481 UART: [kat] ECC-384
3,285,225 UART: [kat] HMAC-384Kdf
3,297,855 UART: [kat] LMS
3,827,274 UART: [kat] --
3,831,896 UART: [cold-reset] ++
3,833,462 UART: [fht] FHT @ 0x50003400
3,845,720 UART: [idev] ++
3,846,329 UART: [idev] CDI.KEYID = 6
3,847,242 UART: [idev] SUBJECT.KEYID = 7
3,848,405 UART: [idev] UDS.KEYID = 0
3,849,444 ready_for_fw is high
3,849,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,271 UART: [idev] Erasing UDS.KEYID = 0
6,325,954 UART: [idev] Sha1 KeyId Algorithm
6,348,754 UART: [idev] --
6,353,067 UART: [ldev] ++
6,353,657 UART: [ldev] CDI.KEYID = 6
6,354,560 UART: [ldev] SUBJECT.KEYID = 5
6,355,707 UART: [ldev] AUTHORITY.KEYID = 7
6,356,985 UART: [ldev] FE.KEYID = 1
6,368,321 UART: [ldev] Erasing FE.KEYID = 1
8,844,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,746 UART: [ldev] --
10,635,780 UART: [fwproc] Wait for Commands...
10,637,594 UART: [fwproc] Recv command 0x46574c44
10,639,676 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,740 >>> mbox cmd response: success
14,500,486 UART: [afmc] ++
14,501,077 UART: [afmc] CDI.KEYID = 6
14,501,983 UART: [afmc] SUBJECT.KEYID = 7
14,503,137 UART: [afmc] AUTHORITY.KEYID = 5
16,996,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,181 UART: [afmc] --
18,789,873 UART: [cold-reset] --
18,792,861 UART: [state] Locking Datavault
18,797,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,948 UART: [state] Locking ICCM
18,800,731 UART: [exit] Launching FMC @ 0x40000130
18,809,128 UART:
18,809,358 UART: Running Caliptra FMC ...
18,810,453 UART:
18,810,606 UART: [state] CFI Enabled
18,818,917 UART: [fht] FMC Alias Private Key: 7
20,575,919 UART: [art] Extend RT PCRs Done
20,577,136 UART: [art] Lock RT PCRs Done
20,578,858 UART: [art] Populate DV Done
20,584,155 UART: [fht] FMC Alias Private Key: 7
20,585,849 UART: [art] Derive CDI
20,586,659 UART: [art] Store in in slot 0x4
20,628,764 UART: [art] Derive Key Pair
20,629,760 UART: [art] Store priv key in slot 0x5
23,057,023 UART: [art] Derive Key Pair - Done
23,069,670 UART: [art] Signing Cert with AUTHO
23,070,966 UART: RITY.KEYID = 7
24,776,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,898 UART: [art] PUB.X = F6A3BBD6AA5A22F9B8564CA53983AC7C4D3B97F1F63D46194E4BF98D90B7B61E191ECC3648EA0FEE2A979C7E3BCCF190
24,785,176 UART: [art] PUB.Y = 0BBC6186F53777FCC03EB13175D64D92D9DA4A86DC41F855B8ADE3814B7305381C9BE9114E03EFF31A7D72F80EE05EAE
24,792,438 UART: [art] SIG.R = A1438814070A515AE869F30E84DFC82481E3DD11CDBF1425C96D99FC77157CA54CD1243BE8A784B50451ADEB2CE7AB47
24,799,893 UART: [art] SIG.S = 1F31CE245F62720C4F96BF47AB84CB645D4070B3ACFEC517B2D8989CB0D874FC8E7B737D305281926FCAA7E23242AF0B
25,779,352 UART: Caliptra RT
25,780,058 UART: [state] CFI Enabled
25,897,983 UART: [rt] RT listening for mailbox commands...
25,899,863 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,930,048 UART: [rt]cmd =0x414c544e, len=41
25,932,551 >>> mbox cmd response data (8 bytes)
25,933,296 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,963,597 UART: [rt]cmd =0x434b4558, len=80
30,237,030 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,695,436 ready_for_fw is high
3,695,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,868 >>> mbox cmd response: success
18,527,650 UART:
18,528,088 UART: Running Caliptra FMC ...
18,529,225 UART:
18,529,401 UART: [state] CFI Enabled
18,537,220 UART: [fht] FMC Alias Private Key: 7
20,294,167 UART: [art] Extend RT PCRs Done
20,295,382 UART: [art] Lock RT PCRs Done
20,297,115 UART: [art] Populate DV Done
20,302,525 UART: [fht] FMC Alias Private Key: 7
20,304,171 UART: [art] Derive CDI
20,305,160 UART: [art] Store in in slot 0x4
20,347,678 UART: [art] Derive Key Pair
20,348,677 UART: [art] Store priv key in slot 0x5
22,775,818 UART: [art] Derive Key Pair - Done
22,788,877 UART: [art] Signing Cert with AUTHO
22,790,209 UART: RITY.KEYID = 7
24,495,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,349 UART: [art] PUB.X = 0FBD2B7D1FB1E8DB0A659671F1161822149FA55D64E0941521DB0539CC782025F75C54FD08E0892BC29E5170A8BC2C67
24,504,628 UART: [art] PUB.Y = 570D97D85F77235DA6275F84EF4971CF59A972AD89FCC692DBFFE656B35074BA0CEE3FC287C87976C834AA5AD8020B9F
24,511,896 UART: [art] SIG.R = 0F7E7F66FDB0E45CFB7D8130B76445C9151179C3136D8DE9AE57AA3C0D19910B703CD1FA0B7F85A14E88B99CB6C323C1
24,519,279 UART: [art] SIG.S = 2AF7630FAD148C3877DA720152A788128FEDE6CC2ECEE9A35A3C6F891DE656CCA97502224FDFFA17DDE7894A87F303A4
25,498,306 UART: Caliptra RT
25,499,020 UART: [state] CFI Enabled
25,616,692 UART: [rt] RT listening for mailbox commands...
25,618,594 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,648,747 UART: [rt]cmd =0x414c544e, len=41
25,651,061 >>> mbox cmd response data (8 bytes)
25,652,111 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,682,647 UART: [rt]cmd =0x434b4558, len=80
29,954,540 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,169 UART:
192,546 UART: Running Caliptra ROM ...
193,695 UART:
193,843 UART: [state] CFI Enabled
264,817 UART: [state] LifecycleState = Unprovisioned
267,219 UART: [state] DebugLocked = No
270,103 UART: [state] WD Timer not started. Device not locked for debugging
274,203 UART: [kat] SHA2-256
464,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,858 UART: [kat] ++
475,335 UART: [kat] sha1
487,060 UART: [kat] SHA2-256
490,082 UART: [kat] SHA2-384
494,905 UART: [kat] SHA2-512-ACC
497,490 UART: [kat] ECC-384
2,947,787 UART: [kat] HMAC-384Kdf
2,971,277 UART: [kat] LMS
3,503,048 UART: [kat] --
3,507,252 UART: [cold-reset] ++
3,508,189 UART: [fht] FHT @ 0x50003400
3,520,512 UART: [idev] ++
3,521,152 UART: [idev] CDI.KEYID = 6
3,522,146 UART: [idev] SUBJECT.KEYID = 7
3,523,323 UART: [idev] UDS.KEYID = 0
3,524,247 ready_for_fw is high
3,524,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,457 UART: [idev] Erasing UDS.KEYID = 0
6,027,989 UART: [idev] Sha1 KeyId Algorithm
6,050,729 UART: [idev] --
6,054,346 UART: [ldev] ++
6,055,030 UART: [ldev] CDI.KEYID = 6
6,055,918 UART: [ldev] SUBJECT.KEYID = 5
6,057,149 UART: [ldev] AUTHORITY.KEYID = 7
6,058,385 UART: [ldev] FE.KEYID = 1
6,098,182 UART: [ldev] Erasing FE.KEYID = 1
8,602,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,265 UART: [ldev] --
10,411,796 UART: [fwproc] Wait for Commands...
10,414,358 UART: [fwproc] Recv command 0x46574c44
10,416,675 UART: [fwproc] Recv'd Img size: 114448 bytes
13,861,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,594,310 >>> mbox cmd response: success
14,598,657 UART: [afmc] ++
14,599,365 UART: [afmc] CDI.KEYID = 6
14,600,609 UART: [afmc] SUBJECT.KEYID = 7
14,602,043 UART: [afmc] AUTHORITY.KEYID = 5
17,149,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,111 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,765 UART: [afmc] --
18,948,247 UART: [cold-reset] --
18,951,628 UART: [state] Locking Datavault
18,957,262 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,452 UART: [state] Locking ICCM
18,961,554 UART: [exit] Launching FMC @ 0x40000130
18,970,207 UART:
18,970,489 UART: Running Caliptra FMC ...
18,971,522 UART:
18,971,668 UART: [state] CFI Enabled
19,031,048 UART: [fht] FMC Alias Private Key: 7
20,794,767 UART: [art] Extend RT PCRs Done
20,795,964 UART: [art] Lock RT PCRs Done
20,797,477 UART: [art] Populate DV Done
20,803,053 UART: [fht] FMC Alias Private Key: 7
20,804,644 UART: [art] Derive CDI
20,805,458 UART: [art] Store in in slot 0x4
20,864,926 UART: [art] Derive Key Pair
20,865,968 UART: [art] Store priv key in slot 0x5
23,328,724 UART: [art] Derive Key Pair - Done
23,341,441 UART: [art] Signing Cert with AUTHO
23,342,743 UART: RITY.KEYID = 7
25,054,482 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,974 UART: [art] PUB.X = 613D9BDA794AA3F2D5DE6E0E25B64C8041D7FDF1D0E8A8B4DA53B4B8617B674DC7B5CB2F499219FB0905B67E62A3F68E
25,063,271 UART: [art] PUB.Y = 8D18FB2E53264763BA8F0791A6970DA7BC48AA7F87CBD7953E15C5AECE073A46F7E560E9EA65427784155DF3326F9F00
25,070,500 UART: [art] SIG.R = E5880EC27B3BA2C44F3C01A6CB91B44736E40B8F0FFA2B231EFE96BC80B3E91E55F05AB079A3AB5C2532E0F74D62455F
25,077,949 UART: [art] SIG.S = B9522A9F2D5538531983CA8FE9949FDCD07836C288A6AF19AA372BC75E47288393B6931BE57FD575AC29484546331B26
26,056,429 UART: Caliptra RT
26,057,132 UART: [state] CFI Enabled
26,222,901 UART: [rt] RT listening for mailbox commands...
26,224,786 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,255,392 UART: [rt]cmd =0x414c544e, len=41
26,257,870 >>> mbox cmd response data (8 bytes)
26,258,710 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,289,074 UART: [rt]cmd =0x434b4558, len=80
30,623,690 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,437,860 ready_for_fw is high
3,438,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,326 >>> mbox cmd response: success
19,048,956 UART:
19,049,360 UART: Running Caliptra FMC ...
19,050,557 UART:
19,050,727 UART: [state] CFI Enabled
19,116,448 UART: [fht] FMC Alias Private Key: 7
20,880,591 UART: [art] Extend RT PCRs Done
20,881,806 UART: [art] Lock RT PCRs Done
20,883,267 UART: [art] Populate DV Done
20,888,565 UART: [fht] FMC Alias Private Key: 7
20,890,268 UART: [art] Derive CDI
20,891,087 UART: [art] Store in in slot 0x4
20,948,728 UART: [art] Derive Key Pair
20,949,765 UART: [art] Store priv key in slot 0x5
23,412,635 UART: [art] Derive Key Pair - Done
23,425,733 UART: [art] Signing Cert with AUTHO
23,427,032 UART: RITY.KEYID = 7
25,138,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,936 UART: [art] PUB.X = 4D606D01981F7B087CE10AA0AE2A992AA9C8C4891DD593E5409ED90A66E2FF52630EFB6936A53A97049C536E5A1AE276
25,147,181 UART: [art] PUB.Y = 5E4D79294739F86D9E11B1F0325E882B60BF10F082AC852AF54E1480C32378CB894EFB65C976F1636AEAACED8CE5CD84
25,154,434 UART: [art] SIG.R = EA20BE956130BA1927387FA5B7E9ECE3CC676B8299D5CFE56564F3061FBFB8F0F05E9F79801D30BBF4205B5FCF37B395
25,161,865 UART: [art] SIG.S = DB52A876D72B5D4308E0D4CC4D0B2A1F957B2C3EFD917B528CB5860245674421BB3F8FA17E6E58B166781B99B64C8654
26,140,483 UART: Caliptra RT
26,141,186 UART: [state] CFI Enabled
26,304,955 UART: [rt] RT listening for mailbox commands...
26,306,846 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,337,576 UART: [rt]cmd =0x414c544e, len=41
26,339,994 >>> mbox cmd response data (8 bytes)
26,340,769 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,371,211 UART: [rt]cmd =0x434b4558, len=80
30,706,914 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,473 UART:
192,843 UART: Running Caliptra ROM ...
193,997 UART:
603,480 UART: [state] CFI Enabled
614,670 UART: [state] LifecycleState = Unprovisioned
617,090 UART: [state] DebugLocked = No
619,348 UART: [state] WD Timer not started. Device not locked for debugging
624,308 UART: [kat] SHA2-256
814,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,937 UART: [kat] ++
825,529 UART: [kat] sha1
837,468 UART: [kat] SHA2-256
840,531 UART: [kat] SHA2-384
846,838 UART: [kat] SHA2-512-ACC
849,461 UART: [kat] ECC-384
3,291,255 UART: [kat] HMAC-384Kdf
3,303,851 UART: [kat] LMS
3,835,672 UART: [kat] --
3,839,143 UART: [cold-reset] ++
3,840,642 UART: [fht] FHT @ 0x50003400
3,852,607 UART: [idev] ++
3,853,314 UART: [idev] CDI.KEYID = 6
3,854,337 UART: [idev] SUBJECT.KEYID = 7
3,855,500 UART: [idev] UDS.KEYID = 0
3,856,421 ready_for_fw is high
3,856,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,461 UART: [idev] Erasing UDS.KEYID = 0
6,328,039 UART: [idev] Sha1 KeyId Algorithm
6,349,866 UART: [idev] --
6,355,478 UART: [ldev] ++
6,356,149 UART: [ldev] CDI.KEYID = 6
6,357,026 UART: [ldev] SUBJECT.KEYID = 5
6,358,224 UART: [ldev] AUTHORITY.KEYID = 7
6,359,365 UART: [ldev] FE.KEYID = 1
6,369,994 UART: [ldev] Erasing FE.KEYID = 1
8,844,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,637 UART: [ldev] --
10,635,304 UART: [fwproc] Wait for Commands...
10,637,334 UART: [fwproc] Recv command 0x46574c44
10,639,632 UART: [fwproc] Recv'd Img size: 114448 bytes
14,083,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,278,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,822,298 >>> mbox cmd response: success
14,825,655 UART: [afmc] ++
14,826,353 UART: [afmc] CDI.KEYID = 6
14,827,549 UART: [afmc] SUBJECT.KEYID = 7
14,829,037 UART: [afmc] AUTHORITY.KEYID = 5
17,335,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,057,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,059,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,074,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,089,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,104,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,128,673 UART: [afmc] --
19,132,529 UART: [cold-reset] --
19,135,363 UART: [state] Locking Datavault
19,141,636 UART: [state] Locking PCR0, PCR1 and PCR31
19,143,843 UART: [state] Locking ICCM
19,146,046 UART: [exit] Launching FMC @ 0x40000130
19,154,725 UART:
19,154,953 UART: Running Caliptra FMC ...
19,155,990 UART:
19,156,131 UART: [state] CFI Enabled
19,164,608 UART: [fht] FMC Alias Private Key: 7
20,921,712 UART: [art] Extend RT PCRs Done
20,922,921 UART: [art] Lock RT PCRs Done
20,924,567 UART: [art] Populate DV Done
20,929,924 UART: [fht] FMC Alias Private Key: 7
20,931,497 UART: [art] Derive CDI
20,932,225 UART: [art] Store in in slot 0x4
20,974,651 UART: [art] Derive Key Pair
20,975,648 UART: [art] Store priv key in slot 0x5
23,402,265 UART: [art] Derive Key Pair - Done
23,415,216 UART: [art] Signing Cert with AUTHO
23,416,538 UART: RITY.KEYID = 7
25,121,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,005 UART: [art] PUB.X = BFF670F83AF7C3C55FF703DBB00DF6737C2CEAFB0DE486B0B37B0B9959F563E66213FDA6D6FD88E68405263DD1BCD937
25,130,304 UART: [art] PUB.Y = 40F80B3511010F658676E4ACF9BB3EEDED95DD03390B4E7523B1DEC8DAF037694F53733D2BB1DB4F2304455451A3A007
25,137,510 UART: [art] SIG.R = BD93DC5CE34B174FFA2BA5193AA2D235056D2B9999E8E91DBB800E149C87AF6BA8EC0A0D6899AA527F90E65FBA89AE7E
25,144,934 UART: [art] SIG.S = 1D03C328414D4DAFDA7D2FC33EA495C2259B39961ED78729B1BBCB76A6CB5FB0E3686DA109BB219C264B3DED6400D7BA
26,124,429 UART: Caliptra RT
26,125,112 UART: [state] CFI Enabled
26,242,462 UART: [rt] RT listening for mailbox commands...
26,244,340 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,274,266 UART: [rt]cmd =0x414c544e, len=41
26,276,523 >>> mbox cmd response data (8 bytes)
26,277,249 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,307,578 UART: [rt]cmd =0x434b4558, len=80
30,580,510 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,753,680 ready_for_fw is high
3,754,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,521 >>> mbox cmd response: success
19,202,904 UART:
19,203,318 UART: Running Caliptra FMC ...
19,204,509 UART:
19,204,667 UART: [state] CFI Enabled
19,212,716 UART: [fht] FMC Alias Private Key: 7
20,969,826 UART: [art] Extend RT PCRs Done
20,971,054 UART: [art] Lock RT PCRs Done
20,972,624 UART: [art] Populate DV Done
20,978,201 UART: [fht] FMC Alias Private Key: 7
20,979,742 UART: [art] Derive CDI
20,980,552 UART: [art] Store in in slot 0x4
21,022,888 UART: [art] Derive Key Pair
21,023,932 UART: [art] Store priv key in slot 0x5
23,450,624 UART: [art] Derive Key Pair - Done
23,463,410 UART: [art] Signing Cert with AUTHO
23,464,720 UART: RITY.KEYID = 7
25,170,263 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,789 UART: [art] PUB.X = 2519BD9F6E3833D6850B0D1DCC389A3746D2962AA717A92EBA389745BABC88ACBA0CC3E40C2BA3D59301857DD837D929
25,179,067 UART: [art] PUB.Y = 68CACEDC213DCDBFA3320E9007754416C034D73BD0338C760EFDBADC00E13D13A1A23AEAA95AFB9D8BF3AC08FCDB01D7
25,186,331 UART: [art] SIG.R = 62F379D4D71B43094991BFF15E5DCEAEFE44B4CB6FBCE25E9EAE66E6A1A1FD0AB4D58DD47C817CBCEFFF1BB036B96F5C
25,193,759 UART: [art] SIG.S = CA8993A2A41FE941C3804722F10D03951869FCC2AE40464B7001432C511B0FCE1EAAB85757EE744BD8C3927E13239F86
26,173,173 UART: Caliptra RT
26,173,882 UART: [state] CFI Enabled
26,291,344 UART: [rt] RT listening for mailbox commands...
26,293,231 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,323,263 UART: [rt]cmd =0x414c544e, len=41
26,325,684 >>> mbox cmd response data (8 bytes)
26,326,564 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,357,260 UART: [rt]cmd =0x434b4558, len=80
30,629,545 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,737 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
1,480,689 ready_for_fw is high
1,480,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,406 UART: [idev] --
1,514,369 UART: [ldev] ++
1,514,537 UART: [ldev] CDI.KEYID = 6
1,514,900 UART: [ldev] SUBJECT.KEYID = 5
1,515,326 UART: [ldev] AUTHORITY.KEYID = 7
1,515,789 UART: [ldev] FE.KEYID = 1
1,521,011 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 114448 bytes
2,886,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,953 >>> mbox cmd response: success
3,080,137 UART: [afmc] ++
3,080,305 UART: [afmc] CDI.KEYID = 6
3,080,667 UART: [afmc] SUBJECT.KEYID = 7
3,081,092 UART: [afmc] AUTHORITY.KEYID = 5
3,116,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,875 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,268 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,958 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,943 UART: [afmc] --
3,160,037 UART: [cold-reset] --
3,160,765 UART: [state] Locking Datavault
3,161,970 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,574 UART: [state] Locking ICCM
3,163,088 UART: [exit] Launching FMC @ 0x40000130
3,168,417 UART:
3,168,433 UART: Running Caliptra FMC ...
3,168,841 UART:
3,168,895 UART: [state] CFI Enabled
3,179,692 UART: [fht] FMC Alias Private Key: 7
3,287,353 UART: [art] Extend RT PCRs Done
3,287,781 UART: [art] Lock RT PCRs Done
3,289,529 UART: [art] Populate DV Done
3,297,748 UART: [fht] FMC Alias Private Key: 7
3,298,838 UART: [art] Derive CDI
3,299,118 UART: [art] Store in in slot 0x4
3,384,703 UART: [art] Derive Key Pair
3,385,063 UART: [art] Store priv key in slot 0x5
3,398,275 UART: [art] Derive Key Pair - Done
3,413,347 UART: [art] Signing Cert with AUTHO
3,413,827 UART: RITY.KEYID = 7
3,428,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,708 UART: [art] PUB.X = 17A184BEA049C763AAA45BCAA2E06CBCCDE0F576AC2CFD8F2463D397F944792969DD98F22B48D4048D6EF9FD56F412EB
3,436,495 UART: [art] PUB.Y = 30E066EB73ACE7138CE7198B57D3AAE3E6B727DAEA77949DB99BEF0CFA2ACD74BDB64570E97A05A7547290B0F85C9B56
3,443,457 UART: [art] SIG.R = 375550696EB9E0F7B631B64FFCB4A8C23B89BB86F67FF006745600EA3D822267F03CF72EFCBCD139DEB88E3707D9F8D6
3,450,211 UART: [art] SIG.S = A1E9E3CDC66CC6DD74120B148BFC2567470EA8AE90545A33849E3256DF68BF9B37D2A737BB873335F953535340A5DA4A
3,473,824 UART: Caliptra RT
3,474,077 UART: [state] CFI Enabled
3,583,084 UART: [rt] RT listening for mailbox commands...
3,583,754 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,861 UART: [rt]cmd =0x414c544e, len=41
3,615,589 >>> mbox cmd response data (8 bytes)
3,615,590 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,575 UART: [rt]cmd =0x434b4558, len=80
3,816,209 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 ready_for_fw is high
1,362,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,903 >>> mbox cmd response: success
2,988,939 UART:
2,988,955 UART: Running Caliptra FMC ...
2,989,363 UART:
2,989,417 UART: [state] CFI Enabled
2,999,892 UART: [fht] FMC Alias Private Key: 7
3,108,077 UART: [art] Extend RT PCRs Done
3,108,505 UART: [art] Lock RT PCRs Done
3,110,007 UART: [art] Populate DV Done
3,118,248 UART: [fht] FMC Alias Private Key: 7
3,119,280 UART: [art] Derive CDI
3,119,560 UART: [art] Store in in slot 0x4
3,205,833 UART: [art] Derive Key Pair
3,206,193 UART: [art] Store priv key in slot 0x5
3,219,927 UART: [art] Derive Key Pair - Done
3,234,513 UART: [art] Signing Cert with AUTHO
3,234,993 UART: RITY.KEYID = 7
3,250,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,044 UART: [art] PUB.X = 5DF76751B7EA9AFE6DA6FF5F1ADAE511AE47DB78BCE9ED5E4D012F42B75B1966FC2948CAB6BFA7AB26E6767EA627BA6F
3,257,843 UART: [art] PUB.Y = F223B35F4F5A4FD31C1CB3277B77670586EC3EAFD1B3B197B8EEF34E47C1231BDBEB1E4D082681AD8C5D4AADA527E2D5
3,264,809 UART: [art] SIG.R = 6FC79D5066C88E8ED444A6CF4E8A4815DFE7E13D7DB88D9AA46E090F7F060BC8155B758CFBF60A4AC19B6D16C22C780E
3,271,579 UART: [art] SIG.S = F2D861CE88794FFE6BC083D5F19EBBFE328517A4EF5080D1FF20A56094E35221C6B7CF3882A95AC62355FEB7A779F647
3,295,484 UART: Caliptra RT
3,295,737 UART: [state] CFI Enabled
3,404,190 UART: [rt] RT listening for mailbox commands...
3,404,860 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,855 UART: [rt]cmd =0x414c544e, len=41
3,436,747 >>> mbox cmd response data (8 bytes)
3,436,748 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,747 UART: [rt]cmd =0x434b4558, len=80
3,637,384 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,496 UART: [kat] SHA2-256
892,434 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,767 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,170 UART: [fht] Storing FHT @ 0x50003400
1,479,833 UART: [idev] ++
1,480,001 UART: [idev] CDI.KEYID = 6
1,480,361 UART: [idev] SUBJECT.KEYID = 7
1,480,785 UART: [idev] UDS.KEYID = 0
1,481,130 ready_for_fw is high
1,481,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,505,587 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,402 UART: [ldev] ++
1,515,570 UART: [ldev] CDI.KEYID = 6
1,515,933 UART: [ldev] SUBJECT.KEYID = 5
1,516,359 UART: [ldev] AUTHORITY.KEYID = 7
1,516,822 UART: [ldev] FE.KEYID = 1
1,522,046 UART: [ldev] Erasing FE.KEYID = 1
1,547,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,453 UART: [ldev] --
1,586,786 UART: [fwproc] Waiting for Commands...
1,587,441 UART: [fwproc] Received command 0x46574c44
1,588,232 UART: [fwproc] Received Image of size 114448 bytes
2,887,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,080 >>> mbox cmd response: success
3,081,240 UART: [afmc] ++
3,081,408 UART: [afmc] CDI.KEYID = 6
3,081,770 UART: [afmc] SUBJECT.KEYID = 7
3,082,195 UART: [afmc] AUTHORITY.KEYID = 5
3,117,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,506 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,391 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,081 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,990 UART: [afmc] --
3,160,902 UART: [cold-reset] --
3,161,606 UART: [state] Locking Datavault
3,162,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,313 UART: [state] Locking ICCM
3,163,961 UART: [exit] Launching FMC @ 0x40000130
3,169,290 UART:
3,169,306 UART: Running Caliptra FMC ...
3,169,714 UART:
3,169,857 UART: [state] CFI Enabled
3,180,396 UART: [fht] FMC Alias Private Key: 7
3,287,975 UART: [art] Extend RT PCRs Done
3,288,403 UART: [art] Lock RT PCRs Done
3,289,951 UART: [art] Populate DV Done
3,298,408 UART: [fht] FMC Alias Private Key: 7
3,299,508 UART: [art] Derive CDI
3,299,788 UART: [art] Store in in slot 0x4
3,385,381 UART: [art] Derive Key Pair
3,385,741 UART: [art] Store priv key in slot 0x5
3,399,615 UART: [art] Derive Key Pair - Done
3,414,511 UART: [art] Signing Cert with AUTHO
3,414,991 UART: RITY.KEYID = 7
3,430,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,316 UART: [art] PUB.X = CD0CCD7F55E8DB1423010B283DF65A0C7CCB78439913DF0C80A2931BB0220B83B7E6A59BA71E72F7146B49D413AA16F4
3,438,078 UART: [art] PUB.Y = E4D3E6CAAD892BBDE75B144A27AEE674B96B8BE0521B2AF7E28C78CE6E87DE247282A712559E0B5DA366BA2F2071E527
3,445,041 UART: [art] SIG.R = BA272E7E0F62A2247434282EB003B1F8465718C9BB1204C45B6EFDABF187B20AA596315D59C4017A093BC1ACADA1C927
3,451,801 UART: [art] SIG.S = F1027B3A8D413D1B603D0FC7D7D54A7D20BBDAA191DF1D90FA8217274A23E0B1CF162F5ECF34393CC25925A105398413
3,475,489 UART: Caliptra RT
3,475,834 UART: [state] CFI Enabled
3,585,694 UART: [rt] RT listening for mailbox commands...
3,586,364 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,447 UART: [rt]cmd =0x414c544e, len=41
3,618,431 >>> mbox cmd response data (8 bytes)
3,618,432 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,367 UART: [rt]cmd =0x434b4558, len=80
3,818,860 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,856 ready_for_fw is high
1,363,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,370 >>> mbox cmd response: success
2,990,776 UART:
2,990,792 UART: Running Caliptra FMC ...
2,991,200 UART:
2,991,343 UART: [state] CFI Enabled
3,001,542 UART: [fht] FMC Alias Private Key: 7
3,109,839 UART: [art] Extend RT PCRs Done
3,110,267 UART: [art] Lock RT PCRs Done
3,112,019 UART: [art] Populate DV Done
3,120,262 UART: [fht] FMC Alias Private Key: 7
3,121,392 UART: [art] Derive CDI
3,121,672 UART: [art] Store in in slot 0x4
3,207,643 UART: [art] Derive Key Pair
3,208,003 UART: [art] Store priv key in slot 0x5
3,222,199 UART: [art] Derive Key Pair - Done
3,236,772 UART: [art] Signing Cert with AUTHO
3,237,252 UART: RITY.KEYID = 7
3,252,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,499 UART: [art] PUB.X = 6DA72F00195578F6FEA2DDD664762AD2E579E82F680CF9092AAC559875F2F96D7C458A5A523D9F628C0EC66CC7B7A0EC
3,260,250 UART: [art] PUB.Y = EB471AC7B1BBDD8D821455EF1EF9E42FE74E075A2A8A19D2367145C9DEC624AD3B1C6B535D7CBB4844D4DBBAAA1022F2
3,267,221 UART: [art] SIG.R = 45C7B7BD6A6E09F2266BBD70F6CE158345F35EA2A10BB8467231020059419570D8FC7AF87C01B6F57A54602D87DE7AB8
3,273,961 UART: [art] SIG.S = C55422925A81227AA8056966C34A9C05CB640C6DA07D6FDC27CCE7155663AEC73CAED9511499B317CD6CAF837A334EE4
3,298,029 UART: Caliptra RT
3,298,374 UART: [state] CFI Enabled
3,406,289 UART: [rt] RT listening for mailbox commands...
3,406,959 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,802 UART: [rt]cmd =0x414c544e, len=41
3,438,772 >>> mbox cmd response data (8 bytes)
3,438,773 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,598 UART: [rt]cmd =0x434b4558, len=80
3,639,848 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,244 UART: [kat] SHA2-256
892,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,019 UART: [kat] ++
897,171 UART: [kat] sha1
901,511 UART: [kat] SHA2-256
903,451 UART: [kat] SHA2-384
906,244 UART: [kat] SHA2-512-ACC
908,145 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,148 UART: [kat] LMS
1,170,476 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 ready_for_fw is high
1,176,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,889 UART: [idev] Sha1 KeyId Algorithm
1,209,391 UART: [idev] --
1,210,409 UART: [ldev] ++
1,210,577 UART: [ldev] CDI.KEYID = 6
1,210,940 UART: [ldev] SUBJECT.KEYID = 5
1,211,366 UART: [ldev] AUTHORITY.KEYID = 7
1,211,829 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,468 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,890 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,330 >>> mbox cmd response: success
2,776,586 UART: [afmc] ++
2,776,754 UART: [afmc] CDI.KEYID = 6
2,777,116 UART: [afmc] SUBJECT.KEYID = 7
2,777,541 UART: [afmc] AUTHORITY.KEYID = 5
2,812,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,611 UART: [afmc] --
2,855,657 UART: [cold-reset] --
2,856,507 UART: [state] Locking Datavault
2,857,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,128 UART: [state] Locking ICCM
2,858,732 UART: [exit] Launching FMC @ 0x40000130
2,864,061 UART:
2,864,077 UART: Running Caliptra FMC ...
2,864,485 UART:
2,864,539 UART: [state] CFI Enabled
2,875,120 UART: [fht] FMC Alias Private Key: 7
2,982,719 UART: [art] Extend RT PCRs Done
2,983,147 UART: [art] Lock RT PCRs Done
2,984,503 UART: [art] Populate DV Done
2,992,326 UART: [fht] FMC Alias Private Key: 7
2,993,436 UART: [art] Derive CDI
2,993,716 UART: [art] Store in in slot 0x4
3,079,599 UART: [art] Derive Key Pair
3,079,959 UART: [art] Store priv key in slot 0x5
3,093,351 UART: [art] Derive Key Pair - Done
3,108,304 UART: [art] Signing Cert with AUTHO
3,108,784 UART: RITY.KEYID = 7
3,123,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,693 UART: [art] PUB.X = E5F9EFC31B515FAE2225E0468CB93035A36E922FA55BD0E7DE220E001078E16FA486EDA21590722FE5657BD74786E0B0
3,131,444 UART: [art] PUB.Y = 3063D84E88D9CDD07D30D94F580B264F4457E32B4B324E15A0AEB28311AF096E044636AE91B15A9B050141698CC0CA19
3,138,379 UART: [art] SIG.R = B9219121915A7D92E162E496E8977F96CE3BE5B8F929BAEB16BD19377DC2F3CD0EE2D81B947E4D0E0027C3E575C87B6A
3,145,131 UART: [art] SIG.S = B75F0F94A186295CAAB2E0BD5009DBD43AFD16AC457EEC0567DA72FD1C7C37D343367591CB3A88A2060AE72C0CE0499E
3,168,998 UART: Caliptra RT
3,169,251 UART: [state] CFI Enabled
3,276,999 UART: [rt] RT listening for mailbox commands...
3,277,669 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,696 UART: [rt]cmd =0x414c544e, len=41
3,309,428 >>> mbox cmd response data (8 bytes)
3,309,429 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,460 UART: [rt]cmd =0x434b4558, len=80
3,511,587 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 ready_for_fw is high
1,060,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,493 >>> mbox cmd response: success
2,690,325 UART:
2,690,341 UART: Running Caliptra FMC ...
2,690,749 UART:
2,690,803 UART: [state] CFI Enabled
2,701,056 UART: [fht] FMC Alias Private Key: 7
2,808,115 UART: [art] Extend RT PCRs Done
2,808,543 UART: [art] Lock RT PCRs Done
2,810,145 UART: [art] Populate DV Done
2,818,462 UART: [fht] FMC Alias Private Key: 7
2,819,456 UART: [art] Derive CDI
2,819,736 UART: [art] Store in in slot 0x4
2,905,577 UART: [art] Derive Key Pair
2,905,937 UART: [art] Store priv key in slot 0x5
2,919,217 UART: [art] Derive Key Pair - Done
2,934,037 UART: [art] Signing Cert with AUTHO
2,934,517 UART: RITY.KEYID = 7
2,949,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,572 UART: [art] PUB.X = F2C17F13EDA141036385B8792A9094204089F2F3208A0E600E7E182F0538093AFC4C2C9C8B2F5F058015E94C43B12C21
2,957,318 UART: [art] PUB.Y = 0E16D46A79E89507481E7A20D157FF00B721CD8C257F548A5314B1C7BC34C2897F55F9A8661E18F89083AD19352886B5
2,964,234 UART: [art] SIG.R = 7B04B5D6B3B9DAB9C03B36688B23BFC951B42B89E65617FBD8A74084A4B693F9C5EA12A74F05B4B2BF7E35184CDB0116
2,971,007 UART: [art] SIG.S = 47AA770D8C8737EAFCC71AB801F3E121AE0A701EEFFACE3B21AE6B90F3BE650D027D49444ED4A4A759ECB6DAEE92AD9F
2,994,967 UART: Caliptra RT
2,995,220 UART: [state] CFI Enabled
3,102,423 UART: [rt] RT listening for mailbox commands...
3,103,093 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,906 UART: [rt]cmd =0x414c544e, len=41
3,134,978 >>> mbox cmd response data (8 bytes)
3,134,979 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,832 UART: [rt]cmd =0x434b4558, len=80
3,335,890 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,422 UART: [kat] SHA2-256
904,362 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,800 UART: [cold-reset] ++
1,173,182 UART: [fht] FHT @ 0x50003400
1,175,977 UART: [idev] ++
1,176,145 UART: [idev] CDI.KEYID = 6
1,176,505 UART: [idev] SUBJECT.KEYID = 7
1,176,929 UART: [idev] UDS.KEYID = 0
1,177,274 ready_for_fw is high
1,177,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,009 UART: [idev] Erasing UDS.KEYID = 0
1,202,268 UART: [idev] Sha1 KeyId Algorithm
1,210,896 UART: [idev] --
1,211,758 UART: [ldev] ++
1,211,926 UART: [ldev] CDI.KEYID = 6
1,212,289 UART: [ldev] SUBJECT.KEYID = 5
1,212,715 UART: [ldev] AUTHORITY.KEYID = 7
1,213,178 UART: [ldev] FE.KEYID = 1
1,218,398 UART: [ldev] Erasing FE.KEYID = 1
1,244,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,216 UART: [ldev] --
1,283,529 UART: [fwproc] Wait for Commands...
1,284,335 UART: [fwproc] Recv command 0x46574c44
1,285,063 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,607 >>> mbox cmd response: success
2,777,623 UART: [afmc] ++
2,777,791 UART: [afmc] CDI.KEYID = 6
2,778,153 UART: [afmc] SUBJECT.KEYID = 7
2,778,578 UART: [afmc] AUTHORITY.KEYID = 5
2,814,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,712 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,982 UART: [afmc] --
2,857,876 UART: [cold-reset] --
2,858,542 UART: [state] Locking Datavault
2,859,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,085 UART: [state] Locking ICCM
2,860,705 UART: [exit] Launching FMC @ 0x40000130
2,866,034 UART:
2,866,050 UART: Running Caliptra FMC ...
2,866,458 UART:
2,866,601 UART: [state] CFI Enabled
2,877,418 UART: [fht] FMC Alias Private Key: 7
2,985,705 UART: [art] Extend RT PCRs Done
2,986,133 UART: [art] Lock RT PCRs Done
2,987,711 UART: [art] Populate DV Done
2,995,986 UART: [fht] FMC Alias Private Key: 7
2,997,088 UART: [art] Derive CDI
2,997,368 UART: [art] Store in in slot 0x4
3,083,075 UART: [art] Derive Key Pair
3,083,435 UART: [art] Store priv key in slot 0x5
3,096,803 UART: [art] Derive Key Pair - Done
3,111,578 UART: [art] Signing Cert with AUTHO
3,112,058 UART: RITY.KEYID = 7
3,127,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,261 UART: [art] PUB.X = 603838DB1D78506AD325CC5A0BD981FBDD670DF68709A48C3371F69086FF786CAFC38E812E119367524DFB75A02E217A
3,135,026 UART: [art] PUB.Y = D19D879EADD3208233B935C0BFF3043A5F80298975F78344D8F93A24C19643EBA64A1D7CED20BF2C37F2578E191CAC24
3,141,979 UART: [art] SIG.R = 3227FF308E7FF28430CC44C9196F11345EEC488536B9E788122F7554E6F5B79ECE7DD8D739893B946088755506445129
3,148,734 UART: [art] SIG.S = 4F45247E2B286DBC752B22898C213E0EA2F3258C472AE1F46BCC2299AF669BFAE82EC491CA39988EFE529136B52B507B
3,173,144 UART: Caliptra RT
3,173,489 UART: [state] CFI Enabled
3,281,824 UART: [rt] RT listening for mailbox commands...
3,282,494 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,449 UART: [rt]cmd =0x414c544e, len=41
3,314,397 >>> mbox cmd response data (8 bytes)
3,314,398 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,325 UART: [rt]cmd =0x434b4558, len=80
3,515,145 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,444 ready_for_fw is high
1,060,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,484 >>> mbox cmd response: success
2,690,848 UART:
2,690,864 UART: Running Caliptra FMC ...
2,691,272 UART:
2,691,415 UART: [state] CFI Enabled
2,702,090 UART: [fht] FMC Alias Private Key: 7
2,809,587 UART: [art] Extend RT PCRs Done
2,810,015 UART: [art] Lock RT PCRs Done
2,811,781 UART: [art] Populate DV Done
2,819,946 UART: [fht] FMC Alias Private Key: 7
2,820,998 UART: [art] Derive CDI
2,821,278 UART: [art] Store in in slot 0x4
2,907,007 UART: [art] Derive Key Pair
2,907,367 UART: [art] Store priv key in slot 0x5
2,920,351 UART: [art] Derive Key Pair - Done
2,935,160 UART: [art] Signing Cert with AUTHO
2,935,640 UART: RITY.KEYID = 7
2,950,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,673 UART: [art] PUB.X = 68A78B799818B587CF6148FDED7787A94FD9B74B0AF8B69A90816AD96B937E41DEDF5F779C511EC21ED751577DDDB3FF
2,958,454 UART: [art] PUB.Y = 186163E4DF0407D1A4F4ABEB7F25EAE0187744B00F9531B8447B1A6A10FC08E1BC4BCBEA29D71132BDE30DAC86060562
2,965,395 UART: [art] SIG.R = D128FDA40A48F5100F6C69AC6AB45AE3DE72C2646AB32A791B42B5A66B0B6EC075FD461BED3BF3CCBEC1DDC4615EBBBD
2,972,188 UART: [art] SIG.S = 8D43C79E9906C104FE016C8877A0E7FB4ADA631D497310EDEAA29B13AC86F0223BA459E8FFBD515CF093C9EFFE3E9700
2,995,960 UART: Caliptra RT
2,996,305 UART: [state] CFI Enabled
3,104,115 UART: [rt] RT listening for mailbox commands...
3,104,785 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,928 UART: [rt]cmd =0x414c544e, len=41
3,136,790 >>> mbox cmd response data (8 bytes)
3,136,791 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,610 UART: [rt]cmd =0x434b4558, len=80
3,338,136 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,314 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,535 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,898 >>> mbox cmd response: success
2,774,013 UART: [afmc] ++
2,774,181 UART: [afmc] CDI.KEYID = 6
2,774,544 UART: [afmc] SUBJECT.KEYID = 7
2,774,970 UART: [afmc] AUTHORITY.KEYID = 5
2,810,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,442 UART: [afmc] --
2,853,390 UART: [cold-reset] --
2,854,044 UART: [state] Locking Datavault
2,855,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,999 UART: [state] Locking ICCM
2,856,551 UART: [exit] Launching FMC @ 0x40000130
2,861,880 UART:
2,861,896 UART: Running Caliptra FMC ...
2,862,304 UART:
2,862,358 UART: [state] CFI Enabled
2,873,073 UART: [fht] FMC Alias Private Key: 7
2,980,866 UART: [art] Extend RT PCRs Done
2,981,294 UART: [art] Lock RT PCRs Done
2,982,854 UART: [art] Populate DV Done
2,991,347 UART: [fht] FMC Alias Private Key: 7
2,992,321 UART: [art] Derive CDI
2,992,601 UART: [art] Store in in slot 0x4
3,078,328 UART: [art] Derive Key Pair
3,078,688 UART: [art] Store priv key in slot 0x5
3,091,456 UART: [art] Derive Key Pair - Done
3,105,696 UART: [art] Signing Cert with AUTHO
3,106,176 UART: RITY.KEYID = 7
3,121,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,411 UART: [art] PUB.X = 605EA58C7510B78FA8E1A2B0527162794A0B56FB6DDA9F65B0624F340C30DFD313F6E23D46A0461F9DBFFADC728F5013
3,129,185 UART: [art] PUB.Y = A77EE7C8533943F4F99239E0E3958D51FC45D39CD1084267C179021DEA61E4C6ED93EE6300B63AD5417A97F27FF704D8
3,136,106 UART: [art] SIG.R = 0B8856EE4B7CDE309B9E1E1B108812E4CF6C1F3DA52A2A969290EB87CE4525DD3B62A4A4546B5BD80761349A0EB20697
3,142,872 UART: [art] SIG.S = 11569DC5B09FD2674A0B7A3D1611ED94CBA9578CAA8047ACB19EF9DAB759AE728A5E2FE3D089C3F1A3B2D96104EB61D9
3,166,617 UART: Caliptra RT
3,166,870 UART: [state] CFI Enabled
3,273,651 UART: [rt] RT listening for mailbox commands...
3,274,321 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,472 UART: [rt]cmd =0x414c544e, len=41
3,306,378 >>> mbox cmd response data (8 bytes)
3,306,379 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,182 UART: [rt]cmd =0x434b4558, len=80
3,507,237 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,412 >>> mbox cmd response: success
2,688,276 UART:
2,688,292 UART: Running Caliptra FMC ...
2,688,700 UART:
2,688,754 UART: [state] CFI Enabled
2,699,167 UART: [fht] FMC Alias Private Key: 7
2,806,924 UART: [art] Extend RT PCRs Done
2,807,352 UART: [art] Lock RT PCRs Done
2,808,718 UART: [art] Populate DV Done
2,816,837 UART: [fht] FMC Alias Private Key: 7
2,817,921 UART: [art] Derive CDI
2,818,201 UART: [art] Store in in slot 0x4
2,904,328 UART: [art] Derive Key Pair
2,904,688 UART: [art] Store priv key in slot 0x5
2,918,146 UART: [art] Derive Key Pair - Done
2,933,102 UART: [art] Signing Cert with AUTHO
2,933,582 UART: RITY.KEYID = 7
2,948,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,237 UART: [art] PUB.X = 3E734BF61E2F1F1E7C6F71ED078D7C55BD2FC43F7EE859E5D1C6B2CB60E1D81ECC37A6B477E00CA92B924CC05DF2A278
2,956,023 UART: [art] PUB.Y = 9A47A42563EF5602A67FE26368FBCEC917550B485E5B6C91DD895FDDA71A31A20FCFF1499258E7A4F0520D5A4FECDFF7
2,962,977 UART: [art] SIG.R = 771BD52FC0FD02C4A2EE0C8ED1B92466CC1255B57BE5A447BD4B54D5328CCD9ADFFAF1C0D2F75A1D4A3507DC00F1EAF8
2,969,744 UART: [art] SIG.S = 9DA3C4F8C99FA27B86F3BCEECA1F12E351D6A38FE5E64397B8A7501079F3C3084CDBD805EB698E2EE63DBBD265E90985
2,993,338 UART: Caliptra RT
2,993,591 UART: [state] CFI Enabled
3,101,814 UART: [rt] RT listening for mailbox commands...
3,102,484 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,331 UART: [rt]cmd =0x414c544e, len=41
3,134,171 >>> mbox cmd response data (8 bytes)
3,134,172 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,043 UART: [rt]cmd =0x434b4558, len=80
3,334,884 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 ready_for_fw is high
1,174,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,221 UART: [ldev] SUBJECT.KEYID = 5
1,210,648 UART: [ldev] AUTHORITY.KEYID = 7
1,211,111 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,369 >>> mbox cmd response: success
2,775,522 UART: [afmc] ++
2,775,690 UART: [afmc] CDI.KEYID = 6
2,776,053 UART: [afmc] SUBJECT.KEYID = 7
2,776,479 UART: [afmc] AUTHORITY.KEYID = 5
2,811,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,777 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,215 UART: [afmc] --
2,855,237 UART: [cold-reset] --
2,855,865 UART: [state] Locking Datavault
2,857,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,666 UART: [state] Locking ICCM
2,858,280 UART: [exit] Launching FMC @ 0x40000130
2,863,609 UART:
2,863,625 UART: Running Caliptra FMC ...
2,864,033 UART:
2,864,176 UART: [state] CFI Enabled
2,874,503 UART: [fht] FMC Alias Private Key: 7
2,981,984 UART: [art] Extend RT PCRs Done
2,982,412 UART: [art] Lock RT PCRs Done
2,983,824 UART: [art] Populate DV Done
2,992,245 UART: [fht] FMC Alias Private Key: 7
2,993,417 UART: [art] Derive CDI
2,993,697 UART: [art] Store in in slot 0x4
3,079,312 UART: [art] Derive Key Pair
3,079,672 UART: [art] Store priv key in slot 0x5
3,092,942 UART: [art] Derive Key Pair - Done
3,107,841 UART: [art] Signing Cert with AUTHO
3,108,321 UART: RITY.KEYID = 7
3,123,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,732 UART: [art] PUB.X = 928365206C7193614337FB7B44D1051CB5541FB2CCD9938BF60CA84ECECD991D0F1DC8B641B933B5F4EB6B6FFFD9FEC3
3,131,509 UART: [art] PUB.Y = 9E56CEDDC9734004BB29722086E42EA22632B2D108AF5D92BDBA62CBAA015D7FB54B1149204EC763EC2D355FF87BF1C6
3,138,464 UART: [art] SIG.R = FBFD011EE88FC9B00CDE5DE3ED523ED318C57C6F980688A55929AEF9D0427AEE002CE9012F2DF8534FBFC4B8F36E05B9
3,145,219 UART: [art] SIG.S = FF3974EA0C7456E9D0C8CA341A4AFF205369A2C32E8712A5ADCD540EEC7A6658F7EC57B4AFDBF80A1972EF9436DFBD16
3,168,727 UART: Caliptra RT
3,169,072 UART: [state] CFI Enabled
3,277,192 UART: [rt] RT listening for mailbox commands...
3,277,862 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,033 UART: [rt]cmd =0x414c544e, len=41
3,309,889 >>> mbox cmd response data (8 bytes)
3,309,890 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,729 UART: [rt]cmd =0x434b4558, len=80
3,511,073 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,777 ready_for_fw is high
1,055,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,637 >>> mbox cmd response: success
2,684,921 UART:
2,684,937 UART: Running Caliptra FMC ...
2,685,345 UART:
2,685,488 UART: [state] CFI Enabled
2,696,007 UART: [fht] FMC Alias Private Key: 7
2,803,590 UART: [art] Extend RT PCRs Done
2,804,018 UART: [art] Lock RT PCRs Done
2,805,320 UART: [art] Populate DV Done
2,813,503 UART: [fht] FMC Alias Private Key: 7
2,814,549 UART: [art] Derive CDI
2,814,829 UART: [art] Store in in slot 0x4
2,900,716 UART: [art] Derive Key Pair
2,901,076 UART: [art] Store priv key in slot 0x5
2,914,636 UART: [art] Derive Key Pair - Done
2,929,526 UART: [art] Signing Cert with AUTHO
2,930,006 UART: RITY.KEYID = 7
2,945,004 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,769 UART: [art] PUB.X = 45C1783929C33E1C02506C623D67D0BA872DD7A6C92516E0273EFC69094D5D87849712105F07B74F9CAFA3807077F563
2,952,522 UART: [art] PUB.Y = BD8F805D1A68012C7C806B1681CDB8D023CB79D73D223B239BD38F08F974A5B5ABC777E8B40D78F3B2557FF9FC609B04
2,959,470 UART: [art] SIG.R = C19A65609431B57DFC5CBEC80F2747F67985F86E8A2073EBF7411775EE16770B55E1B59F3384E201B603F0F46B497389
2,966,224 UART: [art] SIG.S = 99014B432C74280387BCB89B22F9330C2B8882C7FE5739403F0DC9E241676FA7849C2F705C86929A156186A63B633128
2,990,435 UART: Caliptra RT
2,990,780 UART: [state] CFI Enabled
3,098,058 UART: [rt] RT listening for mailbox commands...
3,098,728 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,097 UART: [rt]cmd =0x414c544e, len=41
3,130,955 >>> mbox cmd response data (8 bytes)
3,130,956 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,733 UART: [rt]cmd =0x434b4558, len=80
3,331,641 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,959 UART:
193,322 UART: Running Caliptra ROM ...
194,522 UART:
194,686 UART: [state] CFI Enabled
262,357 UART: [state] LifecycleState = Unprovisioned
264,272 UART: [state] DebugLocked = No
267,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,382 UART: [kat] SHA2-256
442,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,631 UART: [kat] ++
453,136 UART: [kat] sha1
465,013 UART: [kat] SHA2-256
467,740 UART: [kat] SHA2-384
472,733 UART: [kat] SHA2-512-ACC
475,100 UART: [kat] ECC-384
2,767,679 UART: [kat] HMAC-384Kdf
2,799,300 UART: [kat] LMS
3,989,591 UART: [kat] --
3,992,884 UART: [cold-reset] ++
3,994,679 UART: [fht] Storing FHT @ 0x50003400
4,005,196 UART: [idev] ++
4,005,825 UART: [idev] CDI.KEYID = 6
4,006,750 UART: [idev] SUBJECT.KEYID = 7
4,007,988 UART: [idev] UDS.KEYID = 0
4,008,961 ready_for_fw is high
4,009,164 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,598 UART: [idev] Erasing UDS.KEYID = 0
7,347,079 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,124 UART: [idev] --
7,372,688 UART: [ldev] ++
7,373,319 UART: [ldev] CDI.KEYID = 6
7,374,203 UART: [ldev] SUBJECT.KEYID = 5
7,375,471 UART: [ldev] AUTHORITY.KEYID = 7
7,376,709 UART: [ldev] FE.KEYID = 1
7,424,460 UART: [ldev] Erasing FE.KEYID = 1
10,757,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,594 UART: [ldev] --
13,136,729 UART: [fwproc] Waiting for Commands...
13,138,843 UART: [fwproc] Received command 0x46574c44
13,141,035 UART: [fwproc] Received Image of size 114124 bytes
17,193,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,364 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,660,507 >>> mbox cmd response: success
17,663,952 UART: [afmc] ++
17,664,558 UART: [afmc] CDI.KEYID = 6
17,665,476 UART: [afmc] SUBJECT.KEYID = 7
17,666,691 UART: [afmc] AUTHORITY.KEYID = 5
21,026,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,404 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,801 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,609 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,091 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,553 UART: [afmc] --
23,399,942 UART: [cold-reset] --
23,403,591 UART: [state] Locking Datavault
23,409,651 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,403 UART: [state] Locking ICCM
23,412,539 UART: [exit] Launching FMC @ 0x40000130
23,420,933 UART:
23,421,176 UART: Running Caliptra FMC ...
23,422,277 UART:
23,422,440 UART: [state] CFI Enabled
23,486,937 UART: [fht] FMC Alias Private Key: 7
25,824,673 UART: [art] Extend RT PCRs Done
25,825,893 UART: [art] Lock RT PCRs Done
25,827,410 UART: [art] Populate DV Done
25,832,886 UART: [fht] FMC Alias Private Key: 7
25,834,534 UART: [art] Derive CDI
25,835,369 UART: [art] Store in in slot 0x4
25,895,499 UART: [art] Derive Key Pair
25,896,539 UART: [art] Store priv key in slot 0x5
29,189,116 UART: [art] Derive Key Pair - Done
29,201,728 UART: [art] Signing Cert with AUTHO
29,203,217 UART: RITY.KEYID = 7
31,490,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,017 UART: [art] PUB.X = 57AA30820984561CF105AC86FDEDC5361F6B569811ADE237BA6DCB2859ACE56511013EE87BA1FF00D329AD3D356BA4C9
31,499,280 UART: [art] PUB.Y = 6851529176C86EAC87770772D39A2FF2F32AC39B682F6D30C5F880F93CB0819C65877AC2BB35BEE2D44E8DA3B7ED73CB
31,506,525 UART: [art] SIG.R = E390A2422F18F6F704DD3C755B1CA0CFA17BB30C93FC6B7FF3DC29BC3E285EEBB9769F3B8EC748D68D765CA695C80682
31,513,933 UART: [art] SIG.S = 921F2059238F0705AF6BC2EECB12570F5B39BDCB92EF8D2C60F9B7DA6A1BABFD4241D6A31C451D44C9C6BD287CB1BEDD
32,819,277 UART: Caliptra RT
32,819,971 UART: [state] CFI Enabled
32,999,925 UART: [rt] RT listening for mailbox commands...
33,001,815 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,031,735 UART: [rt]cmd =0x414c544e, len=20
33,033,409 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,806,871 ready_for_fw is high
3,807,237 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,889,283 >>> mbox cmd response: success
23,590,275 UART:
23,590,683 UART: Running Caliptra FMC ...
23,591,842 UART:
23,592,006 UART: [state] CFI Enabled
23,656,485 UART: [fht] FMC Alias Private Key: 7
25,994,491 UART: [art] Extend RT PCRs Done
25,995,712 UART: [art] Lock RT PCRs Done
25,997,350 UART: [art] Populate DV Done
26,003,042 UART: [fht] FMC Alias Private Key: 7
26,004,643 UART: [art] Derive CDI
26,005,470 UART: [art] Store in in slot 0x4
26,065,173 UART: [art] Derive Key Pair
26,066,220 UART: [art] Store priv key in slot 0x5
29,358,664 UART: [art] Derive Key Pair - Done
29,371,668 UART: [art] Signing Cert with AUTHO
29,372,974 UART: RITY.KEYID = 7
31,660,544 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,046 UART: [art] PUB.X = ECD97A9932427F36569CBCBCE3AB305C523C7B49BE3A9815337D992F60CEF313C3A6D0566534933C41E88EAAFFE2159E
31,669,347 UART: [art] PUB.Y = 45FBAD1011B3547358DA956E613501E6A750CD0DEE935FBE3FF22411B24F5AE8F4AEBE079E0B20B1049E09CC4871D503
31,676,538 UART: [art] SIG.R = C8ABBC3A4D491C2B66A8FE184C63909577AD7E40FD17CD605275A37D86832FA03A57C3379970E879417E1E3CCFE94305
31,683,878 UART: [art] SIG.S = 99553F59176A0550010C8033FAFFEC011272047E17C52E4A9EEE9A0B3BF802C3149B3B62A3B7B486F2D0A879EF7F0F4B
32,988,505 UART: Caliptra RT
32,989,219 UART: [state] CFI Enabled
33,149,239 UART: [rt] RT listening for mailbox commands...
33,151,132 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,180,736 UART: [rt]cmd =0x414c544e, len=20
33,182,391 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,354 UART:
192,725 UART: Running Caliptra ROM ...
193,824 UART:
603,605 UART: [state] CFI Enabled
621,173 UART: [state] LifecycleState = Unprovisioned
623,114 UART: [state] DebugLocked = No
625,434 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,948 UART: [kat] SHA2-256
799,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,258 UART: [kat] ++
810,708 UART: [kat] sha1
821,102 UART: [kat] SHA2-256
823,864 UART: [kat] SHA2-384
828,657 UART: [kat] SHA2-512-ACC
831,025 UART: [kat] ECC-384
3,115,908 UART: [kat] HMAC-384Kdf
3,127,714 UART: [kat] LMS
4,317,854 UART: [kat] --
4,322,054 UART: [cold-reset] ++
4,324,264 UART: [fht] Storing FHT @ 0x50003400
4,334,241 UART: [idev] ++
4,334,796 UART: [idev] CDI.KEYID = 6
4,335,840 UART: [idev] SUBJECT.KEYID = 7
4,336,947 UART: [idev] UDS.KEYID = 0
4,338,072 ready_for_fw is high
4,338,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,498 UART: [idev] Erasing UDS.KEYID = 0
7,622,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,103 UART: [idev] --
7,647,927 UART: [ldev] ++
7,648,488 UART: [ldev] CDI.KEYID = 6
7,649,552 UART: [ldev] SUBJECT.KEYID = 5
7,650,705 UART: [ldev] AUTHORITY.KEYID = 7
7,651,928 UART: [ldev] FE.KEYID = 1
7,662,350 UART: [ldev] Erasing FE.KEYID = 1
10,948,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,522 UART: [ldev] --
13,310,795 UART: [fwproc] Waiting for Commands...
13,312,884 UART: [fwproc] Received command 0x46574c44
13,315,112 UART: [fwproc] Received Image of size 114124 bytes
17,361,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,666 >>> mbox cmd response: success
17,831,724 UART: [afmc] ++
17,832,319 UART: [afmc] CDI.KEYID = 6
17,833,226 UART: [afmc] SUBJECT.KEYID = 7
17,834,490 UART: [afmc] AUTHORITY.KEYID = 5
21,149,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,035 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,320 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,739 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,538 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,964 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,920 UART: [afmc] --
23,516,053 UART: [cold-reset] --
23,519,592 UART: [state] Locking Datavault
23,523,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,398 UART: [state] Locking ICCM
23,527,055 UART: [exit] Launching FMC @ 0x40000130
23,535,457 UART:
23,535,688 UART: Running Caliptra FMC ...
23,536,786 UART:
23,536,947 UART: [state] CFI Enabled
23,545,242 UART: [fht] FMC Alias Private Key: 7
25,876,065 UART: [art] Extend RT PCRs Done
25,877,303 UART: [art] Lock RT PCRs Done
25,879,084 UART: [art] Populate DV Done
25,884,223 UART: [fht] FMC Alias Private Key: 7
25,885,756 UART: [art] Derive CDI
25,886,510 UART: [art] Store in in slot 0x4
25,929,096 UART: [art] Derive Key Pair
25,930,086 UART: [art] Store priv key in slot 0x5
29,172,203 UART: [art] Derive Key Pair - Done
29,185,157 UART: [art] Signing Cert with AUTHO
29,186,452 UART: RITY.KEYID = 7
31,466,066 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,576 UART: [art] PUB.X = BAA5DF766DA433986605DA260818DE3DEE5DFD0C3398F59129ACEABC2F2C3590246F79EA7699A9A7D8997F988A3E955F
31,474,805 UART: [art] PUB.Y = C86C19A7124FC3616ECED85B74776AF7B58841219486D1054AE0C39A3F7BF7963A77BE5C1158A45C339440011DD4DB81
31,482,080 UART: [art] SIG.R = AB730A6C7D73F7527531C1C2EDD03E176F5F0BAE2DF023E7CD5421D4C081D99BA25B901059FBEB528FE721D2A3288F15
31,489,458 UART: [art] SIG.S = E537F142285A1858D3E9AC152D726D283E04556CBD56516BF01799144FF5824396DD62C2187FC19C06C5A04F16D4F4F8
32,795,011 UART: Caliptra RT
32,795,744 UART: [state] CFI Enabled
32,913,920 UART: [rt] RT listening for mailbox commands...
32,915,797 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,945,750 UART: [rt]cmd =0x414c544e, len=20
32,947,456 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,228 ready_for_fw is high
4,128,780 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,068,963 >>> mbox cmd response: success
23,715,842 UART:
23,716,252 UART: Running Caliptra FMC ...
23,717,452 UART:
23,717,613 UART: [state] CFI Enabled
23,725,780 UART: [fht] FMC Alias Private Key: 7
26,056,602 UART: [art] Extend RT PCRs Done
26,057,837 UART: [art] Lock RT PCRs Done
26,059,421 UART: [art] Populate DV Done
26,064,808 UART: [fht] FMC Alias Private Key: 7
26,066,512 UART: [art] Derive CDI
26,067,289 UART: [art] Store in in slot 0x4
26,109,940 UART: [art] Derive Key Pair
26,110,942 UART: [art] Store priv key in slot 0x5
29,352,854 UART: [art] Derive Key Pair - Done
29,365,591 UART: [art] Signing Cert with AUTHO
29,366,898 UART: RITY.KEYID = 7
31,646,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,123 UART: [art] PUB.X = 0BD4341F88CD317DF3B30535C398106A99F57910100CFC41CDBDF143963341EEFAD5BBFE77699F399663E4BF0A4A5462
31,655,361 UART: [art] PUB.Y = 789A7231900A521CC663277485E53B4227900BFE561FB7EEC510A15B84F9F005401E6C636A49D7D2CABA63A98D88F002
31,662,585 UART: [art] SIG.R = 1B2627E4AFEF3BAAC095DD9816DC8FD974E7C164D688D230DA0744BDA737609A5D48F7C3F8FC59EF0F4C7C0960855B68
31,670,012 UART: [art] SIG.S = D8933027E1CAB3CA2453413E6AEEC10F57C237C5C4ED5B59B56B1198F0E723977CAF716D98520C79DC9F9C3087B5F8ED
32,975,252 UART: Caliptra RT
32,975,970 UART: [state] CFI Enabled
33,093,419 UART: [rt] RT listening for mailbox commands...
33,095,330 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,125,029 UART: [rt]cmd =0x414c544e, len=20
33,126,823 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,991 UART:
192,367 UART: Running Caliptra ROM ...
193,559 UART:
193,714 UART: [state] CFI Enabled
266,604 UART: [state] LifecycleState = Unprovisioned
268,525 UART: [state] DebugLocked = No
270,487 UART: [state] WD Timer not started. Device not locked for debugging
273,536 UART: [kat] SHA2-256
452,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,236 UART: [kat] ++
464,766 UART: [kat] sha1
474,295 UART: [kat] SHA2-256
477,365 UART: [kat] SHA2-384
482,926 UART: [kat] SHA2-512-ACC
485,929 UART: [kat] ECC-384
2,930,961 UART: [kat] HMAC-384Kdf
2,954,718 UART: [kat] LMS
3,484,208 UART: [kat] --
3,488,438 UART: [cold-reset] ++
3,490,300 UART: [fht] FHT @ 0x50003400
3,501,721 UART: [idev] ++
3,502,292 UART: [idev] CDI.KEYID = 6
3,503,223 UART: [idev] SUBJECT.KEYID = 7
3,504,392 UART: [idev] UDS.KEYID = 0
3,505,388 ready_for_fw is high
3,505,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,649,556 UART: [idev] Erasing UDS.KEYID = 0
6,008,316 UART: [idev] Sha1 KeyId Algorithm
6,030,948 UART: [idev] --
6,034,383 UART: [ldev] ++
6,034,969 UART: [ldev] CDI.KEYID = 6
6,035,881 UART: [ldev] SUBJECT.KEYID = 5
6,037,046 UART: [ldev] AUTHORITY.KEYID = 7
6,038,281 UART: [ldev] FE.KEYID = 1
6,081,279 UART: [ldev] Erasing FE.KEYID = 1
8,583,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,056 UART: [ldev] --
10,395,078 UART: [fwproc] Wait for Commands...
10,397,768 UART: [fwproc] Recv command 0x46574c44
10,399,860 UART: [fwproc] Recv'd Img size: 114448 bytes
13,809,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,494 >>> mbox cmd response: success
14,278,395 UART: [afmc] ++
14,278,989 UART: [afmc] CDI.KEYID = 6
14,279,898 UART: [afmc] SUBJECT.KEYID = 7
14,281,114 UART: [afmc] AUTHORITY.KEYID = 5
16,814,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,785 UART: [afmc] --
18,630,803 UART: [cold-reset] --
18,634,658 UART: [state] Locking Datavault
18,639,896 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,534 UART: [state] Locking ICCM
18,643,118 UART: [exit] Launching FMC @ 0x40000130
18,651,561 UART:
18,651,794 UART: Running Caliptra FMC ...
18,652,820 UART:
18,653,176 UART: [state] CFI Enabled
18,714,062 UART: [fht] FMC Alias Private Key: 7
20,477,822 UART: [art] Extend RT PCRs Done
20,479,042 UART: [art] Lock RT PCRs Done
20,480,749 UART: [art] Populate DV Done
20,485,835 UART: [fht] FMC Alias Private Key: 7
20,487,379 UART: [art] Derive CDI
20,488,143 UART: [art] Store in in slot 0x4
20,546,373 UART: [art] Derive Key Pair
20,547,407 UART: [art] Store priv key in slot 0x5
23,010,557 UART: [art] Derive Key Pair - Done
23,023,825 UART: [art] Signing Cert with AUTHO
23,025,136 UART: RITY.KEYID = 7
24,736,784 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,285 UART: [art] PUB.X = B76404BDCD52300EDB93CF8E7C0983B3757AA06203D9BFF3F72A57EC37614603F7794B5D8CEAC3A7A14EB9D755A1864C
24,745,579 UART: [art] PUB.Y = C58A4B4DA63136D995CFD9B7BD046E4FA28D9E236BF556B911FB5A7CE5A3D3E0102E27BAA5EF91D4668297FE54E028CB
24,752,861 UART: [art] SIG.R = 1F42BC4D5ABE8EF274B2CB0905EB9D30B7B9408B3ED0FE7048B57A40145A39570005F5F3D337A1F3A747FB141DF64FA3
24,760,261 UART: [art] SIG.S = 6DA89EDD4B8BC92547564822102CA443553659DAE2BB6A7B102A1E18D5AF9717A356175252900634366A9172BBF9D040
25,739,280 UART: Caliptra RT
25,739,978 UART: [state] CFI Enabled
25,904,939 UART: [rt] RT listening for mailbox commands...
25,906,816 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,937,217 UART: [rt]cmd =0x414c544e, len=20
25,938,862 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,360,565 ready_for_fw is high
3,361,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,084 >>> mbox cmd response: success
18,362,498 UART:
18,362,900 UART: Running Caliptra FMC ...
18,364,012 UART:
18,364,170 UART: [state] CFI Enabled
18,432,603 UART: [fht] FMC Alias Private Key: 7
20,196,072 UART: [art] Extend RT PCRs Done
20,197,297 UART: [art] Lock RT PCRs Done
20,198,840 UART: [art] Populate DV Done
20,204,323 UART: [fht] FMC Alias Private Key: 7
20,205,815 UART: [art] Derive CDI
20,206,583 UART: [art] Store in in slot 0x4
20,265,630 UART: [art] Derive Key Pair
20,266,635 UART: [art] Store priv key in slot 0x5
22,730,069 UART: [art] Derive Key Pair - Done
22,743,135 UART: [art] Signing Cert with AUTHO
22,744,448 UART: RITY.KEYID = 7
24,455,548 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,061 UART: [art] PUB.X = FE8E8E3E5BCD13C7DAD4BCA3C3646474E696AEB0C7D1CF12648BAF29C7B24D26BEBF5DE437443ADF74C239C5E088713A
24,464,332 UART: [art] PUB.Y = CD259B13965D22D4BBB05DD463B2F41882CA22D9A4905052AEF3625A93F78E44B48D939F1943443F4D06374A9653E5A0
24,471,605 UART: [art] SIG.R = 0F8F3BBBC4A545737C42DDB7659E10FDF23F139A6688B06626A27457C4C97AD7CF9C439737516FB5A233BD078CE9E98C
24,478,971 UART: [art] SIG.S = 4529BA55D321EA75DA475CAFD1DD76D25CE20B0504007815293EA09AB49471CE276A017BD9F981C0F3A7334724595493
25,458,608 UART: Caliptra RT
25,459,311 UART: [state] CFI Enabled
25,623,786 UART: [rt] RT listening for mailbox commands...
25,625,696 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,656,294 UART: [rt]cmd =0x414c544e, len=20
25,658,106 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,401 UART:
192,944 UART: Running Caliptra ROM ...
194,097 UART:
603,427 UART: [state] CFI Enabled
616,514 UART: [state] LifecycleState = Unprovisioned
618,313 UART: [state] DebugLocked = No
620,044 UART: [state] WD Timer not started. Device not locked for debugging
623,876 UART: [kat] SHA2-256
803,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,579 UART: [kat] ++
815,026 UART: [kat] sha1
826,276 UART: [kat] SHA2-256
829,317 UART: [kat] SHA2-384
835,301 UART: [kat] SHA2-512-ACC
838,255 UART: [kat] ECC-384
3,282,473 UART: [kat] HMAC-384Kdf
3,294,638 UART: [kat] LMS
3,824,151 UART: [kat] --
3,829,278 UART: [cold-reset] ++
3,831,699 UART: [fht] FHT @ 0x50003400
3,842,877 UART: [idev] ++
3,843,428 UART: [idev] CDI.KEYID = 6
3,844,302 UART: [idev] SUBJECT.KEYID = 7
3,845,535 UART: [idev] UDS.KEYID = 0
3,846,428 ready_for_fw is high
3,846,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,864 UART: [idev] Erasing UDS.KEYID = 0
6,315,233 UART: [idev] Sha1 KeyId Algorithm
6,338,286 UART: [idev] --
6,341,675 UART: [ldev] ++
6,342,298 UART: [ldev] CDI.KEYID = 6
6,343,179 UART: [ldev] SUBJECT.KEYID = 5
6,344,282 UART: [ldev] AUTHORITY.KEYID = 7
6,345,566 UART: [ldev] FE.KEYID = 1
6,356,720 UART: [ldev] Erasing FE.KEYID = 1
8,830,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,536 UART: [ldev] --
10,621,709 UART: [fwproc] Wait for Commands...
10,624,655 UART: [fwproc] Recv command 0x46574c44
10,626,743 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,751 >>> mbox cmd response: success
14,505,440 UART: [afmc] ++
14,506,043 UART: [afmc] CDI.KEYID = 6
14,506,923 UART: [afmc] SUBJECT.KEYID = 7
14,508,132 UART: [afmc] AUTHORITY.KEYID = 5
17,007,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,409 UART: [afmc] --
18,807,731 UART: [cold-reset] --
18,811,586 UART: [state] Locking Datavault
18,815,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,516 UART: [state] Locking ICCM
18,819,613 UART: [exit] Launching FMC @ 0x40000130
18,827,997 UART:
18,828,252 UART: Running Caliptra FMC ...
18,829,349 UART:
18,829,498 UART: [state] CFI Enabled
18,837,917 UART: [fht] FMC Alias Private Key: 7
20,594,769 UART: [art] Extend RT PCRs Done
20,595,997 UART: [art] Lock RT PCRs Done
20,597,614 UART: [art] Populate DV Done
20,603,341 UART: [fht] FMC Alias Private Key: 7
20,605,035 UART: [art] Derive CDI
20,605,843 UART: [art] Store in in slot 0x4
20,648,157 UART: [art] Derive Key Pair
20,649,152 UART: [art] Store priv key in slot 0x5
23,076,130 UART: [art] Derive Key Pair - Done
23,089,097 UART: [art] Signing Cert with AUTHO
23,090,408 UART: RITY.KEYID = 7
24,795,660 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,162 UART: [art] PUB.X = 274EBB738ADC43C82D12BBE31ED9605D6BB4F2BE186FD46672D0E80C12153BD1955315B0FA2230DCCAC94C2F1753EF9B
24,804,447 UART: [art] PUB.Y = 6AA760020AD4FEF420FF70B21587C5CA2E8F2FB0B766F435D025E14CD74DEAFAF617C7C1EDD3B3C092AC1026F8A6D58E
24,811,765 UART: [art] SIG.R = 32E28E80C090352071D8880EB05486009B8378F98EA5CCB555BBCCFBD24FBE52B98D6D77A37072867C34580F1475955F
24,819,084 UART: [art] SIG.S = BFACFFB049F681284ECECB7A2D4865B71BBA10569E08A9605B50578364C670CC46C9669F148340C9924E038FE78AC146
25,797,985 UART: Caliptra RT
25,798,685 UART: [state] CFI Enabled
25,915,636 UART: [rt] RT listening for mailbox commands...
25,917,501 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,947,462 UART: [rt]cmd =0x414c544e, len=20
25,949,135 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,696,756 ready_for_fw is high
3,697,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,108 >>> mbox cmd response: success
18,516,559 UART:
18,516,944 UART: Running Caliptra FMC ...
18,518,129 UART:
18,518,284 UART: [state] CFI Enabled
18,526,217 UART: [fht] FMC Alias Private Key: 7
20,283,485 UART: [art] Extend RT PCRs Done
20,284,702 UART: [art] Lock RT PCRs Done
20,286,383 UART: [art] Populate DV Done
20,291,513 UART: [fht] FMC Alias Private Key: 7
20,293,122 UART: [art] Derive CDI
20,293,932 UART: [art] Store in in slot 0x4
20,335,932 UART: [art] Derive Key Pair
20,336,970 UART: [art] Store priv key in slot 0x5
22,763,561 UART: [art] Derive Key Pair - Done
22,776,506 UART: [art] Signing Cert with AUTHO
22,777,809 UART: RITY.KEYID = 7
24,483,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,037 UART: [art] PUB.X = 7670241A74A8DF6F2556D5AF3CD83909973608F487317F7D4AC209CA20CF12486FF4D94A511AD5884348CBBCD02F7514
24,492,334 UART: [art] PUB.Y = 20F03F5251A0E657AC14970E8A17F5A3A75DC56ED37F937B218C399C9C837C35D9DC0F35A4E4CFF01C372482E430F3D8
24,499,560 UART: [art] SIG.R = FCECE87012F1C90C72635FEA0CC596CD8CA0C7525FE581BA4A79CFD7B50638165FC9C77BB1CFFB8739C466716BEC6AEA
24,506,993 UART: [art] SIG.S = 90BC256017F0036D614B298D86D75A1DB316A5D18C154C5C3D656D4D210668FEA16349E0E7D032E14A36EB9FA70A29C2
25,485,730 UART: Caliptra RT
25,486,449 UART: [state] CFI Enabled
25,603,265 UART: [rt] RT listening for mailbox commands...
25,605,162 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,635,137 UART: [rt]cmd =0x414c544e, len=20
25,636,898 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,242 UART:
192,585 UART: Running Caliptra ROM ...
193,784 UART:
193,944 UART: [state] CFI Enabled
264,268 UART: [state] LifecycleState = Unprovisioned
266,662 UART: [state] DebugLocked = No
269,115 UART: [state] WD Timer not started. Device not locked for debugging
273,790 UART: [kat] SHA2-256
463,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,408 UART: [kat] ++
474,900 UART: [kat] sha1
485,750 UART: [kat] SHA2-256
488,810 UART: [kat] SHA2-384
494,313 UART: [kat] SHA2-512-ACC
496,963 UART: [kat] ECC-384
2,948,185 UART: [kat] HMAC-384Kdf
2,971,737 UART: [kat] LMS
3,503,553 UART: [kat] --
3,508,135 UART: [cold-reset] ++
3,509,148 UART: [fht] FHT @ 0x50003400
3,520,864 UART: [idev] ++
3,521,540 UART: [idev] CDI.KEYID = 6
3,522,533 UART: [idev] SUBJECT.KEYID = 7
3,523,707 UART: [idev] UDS.KEYID = 0
3,524,633 ready_for_fw is high
3,524,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,625 UART: [idev] Erasing UDS.KEYID = 0
6,028,255 UART: [idev] Sha1 KeyId Algorithm
6,051,047 UART: [idev] --
6,056,501 UART: [ldev] ++
6,057,186 UART: [ldev] CDI.KEYID = 6
6,058,097 UART: [ldev] SUBJECT.KEYID = 5
6,059,257 UART: [ldev] AUTHORITY.KEYID = 7
6,060,493 UART: [ldev] FE.KEYID = 1
6,099,282 UART: [ldev] Erasing FE.KEYID = 1
8,603,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,853 UART: [ldev] --
10,415,481 UART: [fwproc] Wait for Commands...
10,417,416 UART: [fwproc] Recv command 0x46574c44
10,419,747 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,594,085 >>> mbox cmd response: success
14,597,889 UART: [afmc] ++
14,598,592 UART: [afmc] CDI.KEYID = 6
14,599,704 UART: [afmc] SUBJECT.KEYID = 7
14,601,245 UART: [afmc] AUTHORITY.KEYID = 5
17,128,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,282 UART: [afmc] --
18,927,897 UART: [cold-reset] --
18,932,623 UART: [state] Locking Datavault
18,938,625 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,811 UART: [state] Locking ICCM
18,943,803 UART: [exit] Launching FMC @ 0x40000130
18,952,462 UART:
18,952,693 UART: Running Caliptra FMC ...
18,953,789 UART:
18,953,946 UART: [state] CFI Enabled
19,008,360 UART: [fht] FMC Alias Private Key: 7
20,772,419 UART: [art] Extend RT PCRs Done
20,773,637 UART: [art] Lock RT PCRs Done
20,775,504 UART: [art] Populate DV Done
20,780,969 UART: [fht] FMC Alias Private Key: 7
20,782,504 UART: [art] Derive CDI
20,783,318 UART: [art] Store in in slot 0x4
20,840,819 UART: [art] Derive Key Pair
20,841,855 UART: [art] Store priv key in slot 0x5
23,304,720 UART: [art] Derive Key Pair - Done
23,317,451 UART: [art] Signing Cert with AUTHO
23,318,753 UART: RITY.KEYID = 7
25,030,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,851 UART: [art] PUB.X = 75051E1EF22C0C7957A60032BC16DA1B4E90DE49685428724DBCE8835189501600A2BDAE81DA9B4BB26740F0B729F20E
25,039,071 UART: [art] PUB.Y = B85A38D46B4A2CA84B03AB097320A5500F8DB1C01F932ECFC29A7E9A4223BE44EC6221EAE0857F0A69F127F020C39EBD
25,046,374 UART: [art] SIG.R = 31413EA3608C11BD08D5A6B5CB7FD4F817366AAF753032915FD91CBE262B778E5E7F206E315C3C309EAFEADCBF1DB361
25,053,764 UART: [art] SIG.S = 72DF838C39605E3D8AE72BE5D8E888ED1FF03D24CFE41A379B2BA042604C86CF7A3148978984F1A527EEEB0CFBBE7E7F
26,032,417 UART: Caliptra RT
26,033,108 UART: [state] CFI Enabled
26,198,784 UART: [rt] RT listening for mailbox commands...
26,200,662 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,231,248 UART: [rt]cmd =0x414c544e, len=20
26,232,928 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,438,862 ready_for_fw is high
3,439,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,676 >>> mbox cmd response: success
19,048,172 UART:
19,048,565 UART: Running Caliptra FMC ...
19,049,765 UART:
19,049,974 UART: [state] CFI Enabled
19,118,904 UART: [fht] FMC Alias Private Key: 7
20,882,656 UART: [art] Extend RT PCRs Done
20,883,864 UART: [art] Lock RT PCRs Done
20,885,814 UART: [art] Populate DV Done
20,891,172 UART: [fht] FMC Alias Private Key: 7
20,892,874 UART: [art] Derive CDI
20,893,688 UART: [art] Store in in slot 0x4
20,951,230 UART: [art] Derive Key Pair
20,952,296 UART: [art] Store priv key in slot 0x5
23,415,352 UART: [art] Derive Key Pair - Done
23,428,731 UART: [art] Signing Cert with AUTHO
23,430,030 UART: RITY.KEYID = 7
25,142,283 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,793 UART: [art] PUB.X = 56DCA1A3DBA9D47B6109CDAAA35C1F4E87A5E282AE4FE6D262DEE900EAD15C1443AF33D08294938C7FBC0881668A24DE
25,151,041 UART: [art] PUB.Y = 2B051C4BB98154D03CB9DD0BC3BA3D21ED74F9CE8309B2B9B98976484602B2DFAFF552CB9C20352DD879F9C177E9BE85
25,158,319 UART: [art] SIG.R = 4339116DE6229AD166332D795D0FEFD9791D5495C9FC90289B8D0EB17A23C233B558C2B15046BA052B3C2D1819153366
25,165,756 UART: [art] SIG.S = 9DC606B7E6465C322128CFD89EF3BEF61430D51B2BDB0AE027B2AE22F4DF411085EBBAA41FACEBF41FFE02E66CF27031
26,144,737 UART: Caliptra RT
26,145,433 UART: [state] CFI Enabled
26,309,891 UART: [rt] RT listening for mailbox commands...
26,311,766 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,342,188 UART: [rt]cmd =0x414c544e, len=20
26,343,982 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,485 UART:
192,857 UART: Running Caliptra ROM ...
194,047 UART:
603,613 UART: [state] CFI Enabled
618,545 UART: [state] LifecycleState = Unprovisioned
620,916 UART: [state] DebugLocked = No
623,495 UART: [state] WD Timer not started. Device not locked for debugging
627,307 UART: [kat] SHA2-256
817,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,982 UART: [kat] ++
828,421 UART: [kat] sha1
840,278 UART: [kat] SHA2-256
843,271 UART: [kat] SHA2-384
848,891 UART: [kat] SHA2-512-ACC
851,467 UART: [kat] ECC-384
3,294,447 UART: [kat] HMAC-384Kdf
3,306,699 UART: [kat] LMS
3,838,540 UART: [kat] --
3,843,096 UART: [cold-reset] ++
3,844,025 UART: [fht] FHT @ 0x50003400
3,854,285 UART: [idev] ++
3,854,987 UART: [idev] CDI.KEYID = 6
3,856,006 UART: [idev] SUBJECT.KEYID = 7
3,857,103 UART: [idev] UDS.KEYID = 0
3,858,024 ready_for_fw is high
3,858,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,911 UART: [idev] Erasing UDS.KEYID = 0
6,338,259 UART: [idev] Sha1 KeyId Algorithm
6,360,406 UART: [idev] --
6,363,889 UART: [ldev] ++
6,364,573 UART: [ldev] CDI.KEYID = 6
6,365,502 UART: [ldev] SUBJECT.KEYID = 5
6,366,657 UART: [ldev] AUTHORITY.KEYID = 7
6,367,878 UART: [ldev] FE.KEYID = 1
6,378,353 UART: [ldev] Erasing FE.KEYID = 1
8,857,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,909 UART: [ldev] --
10,652,763 UART: [fwproc] Wait for Commands...
10,655,548 UART: [fwproc] Recv command 0x46574c44
10,657,846 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,839,846 >>> mbox cmd response: success
14,843,666 UART: [afmc] ++
14,844,372 UART: [afmc] CDI.KEYID = 6
14,845,536 UART: [afmc] SUBJECT.KEYID = 7
14,847,074 UART: [afmc] AUTHORITY.KEYID = 5
17,350,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,124 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,536 UART: [afmc] --
19,148,619 UART: [cold-reset] --
19,153,023 UART: [state] Locking Datavault
19,157,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,394 UART: [state] Locking ICCM
19,161,129 UART: [exit] Launching FMC @ 0x40000130
19,169,805 UART:
19,170,034 UART: Running Caliptra FMC ...
19,171,130 UART:
19,171,279 UART: [state] CFI Enabled
19,179,211 UART: [fht] FMC Alias Private Key: 7
20,936,092 UART: [art] Extend RT PCRs Done
20,937,301 UART: [art] Lock RT PCRs Done
20,939,188 UART: [art] Populate DV Done
20,944,667 UART: [fht] FMC Alias Private Key: 7
20,946,310 UART: [art] Derive CDI
20,947,043 UART: [art] Store in in slot 0x4
20,989,309 UART: [art] Derive Key Pair
20,990,343 UART: [art] Store priv key in slot 0x5
23,416,686 UART: [art] Derive Key Pair - Done
23,429,510 UART: [art] Signing Cert with AUTHO
23,430,823 UART: RITY.KEYID = 7
25,136,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,077 UART: [art] PUB.X = DABEA732E9B863C0D72EA77C4792612419CB1844B7DAE89DE647DF34DE9D12E8DDDA260B123CC39BADA37B9AB4686E82
25,145,434 UART: [art] PUB.Y = 9BE2790AD131115DAB50B8D657FCF1455DFDA2FCB23A78C57C865ACE90CF389401F03CCA94BBD69704232656AE40A8E3
25,152,706 UART: [art] SIG.R = 2A189754091691FFC1987AA25AF1C026C885E8FE12B1B842F6610D46840ACE36FA311052606558591918AD6911BEF4DA
25,160,030 UART: [art] SIG.S = 4CA1270866B6D70578652B248ACD357BF858309C1778D2B6DD35477C8AF04CFFFEA43DDB11833802DEA3B82D75C0EF2F
26,138,954 UART: Caliptra RT
26,139,635 UART: [state] CFI Enabled
26,256,338 UART: [rt] RT listening for mailbox commands...
26,258,204 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,287,936 UART: [rt]cmd =0x414c544e, len=20
26,289,720 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,751,965 ready_for_fw is high
3,752,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,455 >>> mbox cmd response: success
19,205,321 UART:
19,205,713 UART: Running Caliptra FMC ...
19,206,901 UART:
19,207,069 UART: [state] CFI Enabled
19,214,983 UART: [fht] FMC Alias Private Key: 7
20,971,159 UART: [art] Extend RT PCRs Done
20,972,412 UART: [art] Lock RT PCRs Done
20,973,956 UART: [art] Populate DV Done
20,979,668 UART: [fht] FMC Alias Private Key: 7
20,981,151 UART: [art] Derive CDI
20,981,941 UART: [art] Store in in slot 0x4
21,024,911 UART: [art] Derive Key Pair
21,025,914 UART: [art] Store priv key in slot 0x5
23,453,557 UART: [art] Derive Key Pair - Done
23,466,447 UART: [art] Signing Cert with AUTHO
23,467,787 UART: RITY.KEYID = 7
25,173,118 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,621 UART: [art] PUB.X = 23BF430F5108E6977FA058B27B4104F5CFA3124B453BB4895062A9288EA89476543340A700F0B188AD643B42B1B9091A
25,181,853 UART: [art] PUB.Y = 497C2187080D41A27D0040E3524C0DC1FAC7E766F21A81729089D1EA310A3A23FE4D68CD354FB3967E78BEDE3DD8766A
25,189,079 UART: [art] SIG.R = 052F74117C646DAD663B5BABA98014D301BB6A5CFBF583E56B97AC032484948C4BF2C398FB4F8334046A7E0B3F120B41
25,196,482 UART: [art] SIG.S = 282F6FBC0618C1ED0C57E6C9FBD18BB08A8D930169DF3BB10D57D2B54902A2B71692329F457231ACEF0CD55403D5E2E8
26,175,907 UART: Caliptra RT
26,176,596 UART: [state] CFI Enabled
26,294,079 UART: [rt] RT listening for mailbox commands...
26,296,025 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,325,725 UART: [rt]cmd =0x414c544e, len=20
26,327,373 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
901,972 UART: [kat] HMAC-384Kdf
906,552 UART: [kat] LMS
1,474,748 UART: [kat] --
1,475,533 UART: [cold-reset] ++
1,475,941 UART: [fht] Storing FHT @ 0x50003400
1,478,604 UART: [idev] ++
1,478,772 UART: [idev] CDI.KEYID = 6
1,479,132 UART: [idev] SUBJECT.KEYID = 7
1,479,556 UART: [idev] UDS.KEYID = 0
1,479,901 ready_for_fw is high
1,479,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,662 UART: [idev] Erasing UDS.KEYID = 0
1,503,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,410 UART: [idev] --
1,513,547 UART: [ldev] ++
1,513,715 UART: [ldev] CDI.KEYID = 6
1,514,078 UART: [ldev] SUBJECT.KEYID = 5
1,514,504 UART: [ldev] AUTHORITY.KEYID = 7
1,514,967 UART: [ldev] FE.KEYID = 1
1,519,949 UART: [ldev] Erasing FE.KEYID = 1
1,545,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,730 UART: [ldev] --
1,585,105 UART: [fwproc] Waiting for Commands...
1,585,820 UART: [fwproc] Received command 0x46574c44
1,586,611 UART: [fwproc] Received Image of size 114448 bytes
2,885,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,826 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,209 >>> mbox cmd response: success
3,080,315 UART: [afmc] ++
3,080,483 UART: [afmc] CDI.KEYID = 6
3,080,845 UART: [afmc] SUBJECT.KEYID = 7
3,081,270 UART: [afmc] AUTHORITY.KEYID = 5
3,116,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,834 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,524 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,457 UART: [afmc] --
3,159,517 UART: [cold-reset] --
3,160,323 UART: [state] Locking Datavault
3,161,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,982 UART: [state] Locking ICCM
3,162,588 UART: [exit] Launching FMC @ 0x40000130
3,167,917 UART:
3,167,933 UART: Running Caliptra FMC ...
3,168,341 UART:
3,168,395 UART: [state] CFI Enabled
3,178,754 UART: [fht] FMC Alias Private Key: 7
3,286,153 UART: [art] Extend RT PCRs Done
3,286,581 UART: [art] Lock RT PCRs Done
3,288,457 UART: [art] Populate DV Done
3,296,796 UART: [fht] FMC Alias Private Key: 7
3,297,780 UART: [art] Derive CDI
3,298,060 UART: [art] Store in in slot 0x4
3,383,731 UART: [art] Derive Key Pair
3,384,091 UART: [art] Store priv key in slot 0x5
3,397,757 UART: [art] Derive Key Pair - Done
3,412,549 UART: [art] Signing Cert with AUTHO
3,413,029 UART: RITY.KEYID = 7
3,428,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,098 UART: [art] PUB.X = B854FD68EECBB3AD1549BD7CF14D724B22EDC30E34B92D4713C5FE99B1FBA7C78665FB20E5CE590E5C03A59D6B1EF7FF
3,435,885 UART: [art] PUB.Y = 09FCF2A3C7BC655148F0913A7FA115742AE25600CA3F6F5B476A62053C60BF41E0F3B27F458CEF84ED4C3DB5FD1A205C
3,442,821 UART: [art] SIG.R = 6B5D81EE25C750CAEF6EDAC79B9157EC75EDBDEABE372B0CD6757EAFB5551A8437D26A9953ADF406653A38F3D5196203
3,449,600 UART: [art] SIG.S = BDB3ADC41A179BDCFA0A7BBDB251127507CFD8960E90C5D84A3F130E352B9309AE955778CD40BE34CFDD2C499393BDC6
3,473,476 UART: Caliptra RT
3,473,729 UART: [state] CFI Enabled
3,583,108 UART: [rt] RT listening for mailbox commands...
3,583,778 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,610 UART: [rt]cmd =0x414c544e, len=20
3,614,747 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,435 ready_for_fw is high
1,362,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,183 >>> mbox cmd response: success
2,991,167 UART:
2,991,183 UART: Running Caliptra FMC ...
2,991,591 UART:
2,991,645 UART: [state] CFI Enabled
3,001,940 UART: [fht] FMC Alias Private Key: 7
3,110,177 UART: [art] Extend RT PCRs Done
3,110,605 UART: [art] Lock RT PCRs Done
3,112,083 UART: [art] Populate DV Done
3,120,232 UART: [fht] FMC Alias Private Key: 7
3,121,216 UART: [art] Derive CDI
3,121,496 UART: [art] Store in in slot 0x4
3,207,217 UART: [art] Derive Key Pair
3,207,577 UART: [art] Store priv key in slot 0x5
3,221,067 UART: [art] Derive Key Pair - Done
3,235,710 UART: [art] Signing Cert with AUTHO
3,236,190 UART: RITY.KEYID = 7
3,251,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,429 UART: [art] PUB.X = EBF4462EDE0BF3016CF05AC17BD38ED9DA761F1AFB1B9F2D121433B16EEBAF40B542E26B9CB8FEBA91D75F0D2BA9C0DF
3,259,224 UART: [art] PUB.Y = 577C96CA096C688E562749A7FA3902CC920C122C96CFF02276C94353E9F16E58EA2515F9045F6BC8A6BDCDFCA7AEBB5A
3,266,176 UART: [art] SIG.R = 559FEC491A0625B5CFAECEA40AB0DA313EDB5B6F5CDC023D04DA6D5FFC949D3A626C3DF4799E210B60C776B4BF6E0F39
3,272,954 UART: [art] SIG.S = E410150F274085604E142F1DCC8D208BCF418C7B522D2CF40D5BEAD943A70D4D96865B19260C0CE73F2AED0FA3CD0B7E
3,296,648 UART: Caliptra RT
3,296,901 UART: [state] CFI Enabled
3,405,336 UART: [rt] RT listening for mailbox commands...
3,406,006 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,922 UART: [rt]cmd =0x414c544e, len=20
3,437,353 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,793 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,807 UART: [idev] ++
1,479,975 UART: [idev] CDI.KEYID = 6
1,480,335 UART: [idev] SUBJECT.KEYID = 7
1,480,759 UART: [idev] UDS.KEYID = 0
1,481,104 ready_for_fw is high
1,481,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,935 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,247 UART: [ldev] --
1,587,514 UART: [fwproc] Waiting for Commands...
1,588,339 UART: [fwproc] Received command 0x46574c44
1,589,130 UART: [fwproc] Received Image of size 114448 bytes
2,888,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,967 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,344 >>> mbox cmd response: success
3,082,586 UART: [afmc] ++
3,082,754 UART: [afmc] CDI.KEYID = 6
3,083,116 UART: [afmc] SUBJECT.KEYID = 7
3,083,541 UART: [afmc] AUTHORITY.KEYID = 5
3,119,110 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,153 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,843 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,738 UART: [afmc] --
3,162,790 UART: [cold-reset] --
3,163,622 UART: [state] Locking Datavault
3,164,703 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,307 UART: [state] Locking ICCM
3,165,797 UART: [exit] Launching FMC @ 0x40000130
3,171,126 UART:
3,171,142 UART: Running Caliptra FMC ...
3,171,550 UART:
3,171,693 UART: [state] CFI Enabled
3,182,614 UART: [fht] FMC Alias Private Key: 7
3,290,603 UART: [art] Extend RT PCRs Done
3,291,031 UART: [art] Lock RT PCRs Done
3,292,941 UART: [art] Populate DV Done
3,300,994 UART: [fht] FMC Alias Private Key: 7
3,302,020 UART: [art] Derive CDI
3,302,300 UART: [art] Store in in slot 0x4
3,387,859 UART: [art] Derive Key Pair
3,388,219 UART: [art] Store priv key in slot 0x5
3,401,547 UART: [art] Derive Key Pair - Done
3,416,234 UART: [art] Signing Cert with AUTHO
3,416,714 UART: RITY.KEYID = 7
3,432,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,825 UART: [art] PUB.X = 98EAFE1301CCFA49DD8EC31EB898D8EFE5A23C4083B5B9F389D8B20DD8CADD02567E3A393074ACC7684352D4AD1CBB61
3,439,608 UART: [art] PUB.Y = 5E13B2169E5FC712CCE5E06221F0D08E8D5CFDDF9B8A72282667BFBAF2183B1E25C65BD87E3B971E9AB5B28A390860EF
3,446,571 UART: [art] SIG.R = 782E1B51C661BB230C8C50FE35AEDECD12D1E98F40006367E76F0B6DFA7F89D5F04F63A72A6A47F3D3E8CEFBFF44429D
3,453,333 UART: [art] SIG.S = 3EB3B42F85D4E937942710179A083581D8059B4CC284BA1F032B5DD2A38DCFD1C9D558B92799B274626D397DE67293F2
3,477,039 UART: Caliptra RT
3,477,384 UART: [state] CFI Enabled
3,586,318 UART: [rt] RT listening for mailbox commands...
3,586,988 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,842 UART: [rt]cmd =0x414c544e, len=20
3,618,285 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,562 ready_for_fw is high
1,362,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,586 >>> mbox cmd response: success
2,989,966 UART:
2,989,982 UART: Running Caliptra FMC ...
2,990,390 UART:
2,990,533 UART: [state] CFI Enabled
3,001,100 UART: [fht] FMC Alias Private Key: 7
3,108,653 UART: [art] Extend RT PCRs Done
3,109,081 UART: [art] Lock RT PCRs Done
3,110,775 UART: [art] Populate DV Done
3,118,888 UART: [fht] FMC Alias Private Key: 7
3,119,958 UART: [art] Derive CDI
3,120,238 UART: [art] Store in in slot 0x4
3,205,895 UART: [art] Derive Key Pair
3,206,255 UART: [art] Store priv key in slot 0x5
3,220,111 UART: [art] Derive Key Pair - Done
3,235,055 UART: [art] Signing Cert with AUTHO
3,235,535 UART: RITY.KEYID = 7
3,250,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,556 UART: [art] PUB.X = C03CF2DE122A9AE9B8A2836862E6F3D458F43294F463AA0B303FCE1B8C93A42D7446BB584E8CB5743E320E3371D0C045
3,258,326 UART: [art] PUB.Y = 7335E32FAD5E6B90EBCAF9F887ACE1829B97324B9C969703CB04470100257BAB9C8631B9A91AE2286BE44C30119A3ACD
3,265,253 UART: [art] SIG.R = C11E6FD7FDE9D9B5BA4DD88D3E076DF47CAD9568F83FD5F3C54D750FDB35B66C1E668AB88A77116EE992B70A04C8F0AD
3,272,035 UART: [art] SIG.S = 787D055004F9F672BCE3BA0C3DEC911294B31D175909AB69643CB7EBC71470F149B7B2B47103D5CF6F1369B0F1C13EBA
3,295,669 UART: Caliptra RT
3,296,014 UART: [state] CFI Enabled
3,405,389 UART: [rt] RT listening for mailbox commands...
3,406,059 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,865 UART: [rt]cmd =0x414c544e, len=20
3,437,368 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,764 UART: [kat] HMAC-384Kdf
922,222 UART: [kat] LMS
1,170,550 UART: [kat] --
1,171,627 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,844 UART: [idev] ++
1,175,012 UART: [idev] CDI.KEYID = 6
1,175,372 UART: [idev] SUBJECT.KEYID = 7
1,175,796 UART: [idev] UDS.KEYID = 0
1,176,141 ready_for_fw is high
1,176,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,933 UART: [idev] Sha1 KeyId Algorithm
1,209,453 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,420 >>> mbox cmd response: success
2,776,532 UART: [afmc] ++
2,776,700 UART: [afmc] CDI.KEYID = 6
2,777,062 UART: [afmc] SUBJECT.KEYID = 7
2,777,487 UART: [afmc] AUTHORITY.KEYID = 5
2,813,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,877 UART: [afmc] --
2,856,801 UART: [cold-reset] --
2,857,613 UART: [state] Locking Datavault
2,858,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,316 UART: [state] Locking ICCM
2,859,990 UART: [exit] Launching FMC @ 0x40000130
2,865,319 UART:
2,865,335 UART: Running Caliptra FMC ...
2,865,743 UART:
2,865,797 UART: [state] CFI Enabled
2,876,420 UART: [fht] FMC Alias Private Key: 7
2,984,181 UART: [art] Extend RT PCRs Done
2,984,609 UART: [art] Lock RT PCRs Done
2,985,801 UART: [art] Populate DV Done
2,993,966 UART: [fht] FMC Alias Private Key: 7
2,995,008 UART: [art] Derive CDI
2,995,288 UART: [art] Store in in slot 0x4
3,081,157 UART: [art] Derive Key Pair
3,081,517 UART: [art] Store priv key in slot 0x5
3,094,477 UART: [art] Derive Key Pair - Done
3,109,307 UART: [art] Signing Cert with AUTHO
3,109,787 UART: RITY.KEYID = 7
3,124,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,440 UART: [art] PUB.X = 317967B0B22005FE7686CBD24F6768DBB6E71CFAD3B154FDAD28BC2E6D201BCCF5CF16354A43195A8068729B4A29B7F2
3,132,219 UART: [art] PUB.Y = D0015219C5EB238CE90CAD5DC8566581DCAC8223654B2D07EFAAF22F632AE5958425599B5612198BA04E9CB7E671D88C
3,139,166 UART: [art] SIG.R = F4F18EEF755B0F005CE56163CA54989BB8615BDAF374B88A9598911031CB7D5351468A9E961219D08AA18D2C90BEA630
3,145,913 UART: [art] SIG.S = 1D5B29D809039A1A3E9BA471E31BB007C65E6C80BD2B8FEE6F4C8B93A29561270D6465CFA15811CC148C76ECB2C19B9F
3,169,382 UART: Caliptra RT
3,169,635 UART: [state] CFI Enabled
3,277,798 UART: [rt] RT listening for mailbox commands...
3,278,468 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,716 UART: [rt]cmd =0x414c544e, len=20
3,309,867 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 ready_for_fw is high
1,060,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,685 >>> mbox cmd response: success
2,687,989 UART:
2,688,005 UART: Running Caliptra FMC ...
2,688,413 UART:
2,688,467 UART: [state] CFI Enabled
2,698,998 UART: [fht] FMC Alias Private Key: 7
2,807,105 UART: [art] Extend RT PCRs Done
2,807,533 UART: [art] Lock RT PCRs Done
2,808,875 UART: [art] Populate DV Done
2,817,012 UART: [fht] FMC Alias Private Key: 7
2,818,104 UART: [art] Derive CDI
2,818,384 UART: [art] Store in in slot 0x4
2,904,009 UART: [art] Derive Key Pair
2,904,369 UART: [art] Store priv key in slot 0x5
2,917,001 UART: [art] Derive Key Pair - Done
2,931,614 UART: [art] Signing Cert with AUTHO
2,932,094 UART: RITY.KEYID = 7
2,947,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,927 UART: [art] PUB.X = 983465AB658752388A2F4B643C5B4D0259255E8D9587DD4804C3C11C87A865F3D34B7D1D8546F8604233E72C7D69EDD7
2,954,685 UART: [art] PUB.Y = 79BA6594489E13A839C184CDDD985C549E290B27D67975E564E576AA4FD3078B302331991C889F21DB07C4003579F769
2,961,594 UART: [art] SIG.R = 2D32953A3B6A018F424C2784341E734EBD1C61BFF5C7ACA07A4CD55D3614D25CD2DBBC1A1CD371B1A68E388CAD89DBEC
2,968,383 UART: [art] SIG.S = 67F6EA5904E6971192217914D21CF22B629663593C7A437172F422E6B54BF5912B232389623170B03377C1F2DD525ABA
2,992,505 UART: Caliptra RT
2,992,758 UART: [state] CFI Enabled
3,099,931 UART: [rt] RT listening for mailbox commands...
3,100,601 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,583 UART: [rt]cmd =0x414c544e, len=20
3,131,850 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
893,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,082 UART: [kat] ++
898,234 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
919,101 UART: [kat] HMAC-384Kdf
923,645 UART: [kat] LMS
1,171,973 UART: [kat] --
1,172,936 UART: [cold-reset] ++
1,173,330 UART: [fht] FHT @ 0x50003400
1,176,015 UART: [idev] ++
1,176,183 UART: [idev] CDI.KEYID = 6
1,176,543 UART: [idev] SUBJECT.KEYID = 7
1,176,967 UART: [idev] UDS.KEYID = 0
1,177,312 ready_for_fw is high
1,177,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,363 UART: [idev] Erasing UDS.KEYID = 0
1,202,302 UART: [idev] Sha1 KeyId Algorithm
1,210,890 UART: [idev] --
1,211,916 UART: [ldev] ++
1,212,084 UART: [ldev] CDI.KEYID = 6
1,212,447 UART: [ldev] SUBJECT.KEYID = 5
1,212,873 UART: [ldev] AUTHORITY.KEYID = 7
1,213,336 UART: [ldev] FE.KEYID = 1
1,218,466 UART: [ldev] Erasing FE.KEYID = 1
1,244,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,838 UART: [ldev] --
1,284,343 UART: [fwproc] Wait for Commands...
1,285,087 UART: [fwproc] Recv command 0x46574c44
1,285,815 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,683 >>> mbox cmd response: success
2,777,839 UART: [afmc] ++
2,778,007 UART: [afmc] CDI.KEYID = 6
2,778,369 UART: [afmc] SUBJECT.KEYID = 7
2,778,794 UART: [afmc] AUTHORITY.KEYID = 5
2,814,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,406 UART: [afmc] --
2,858,304 UART: [cold-reset] --
2,859,100 UART: [state] Locking Datavault
2,860,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,957 UART: [state] Locking ICCM
2,861,399 UART: [exit] Launching FMC @ 0x40000130
2,866,728 UART:
2,866,744 UART: Running Caliptra FMC ...
2,867,152 UART:
2,867,295 UART: [state] CFI Enabled
2,878,056 UART: [fht] FMC Alias Private Key: 7
2,985,891 UART: [art] Extend RT PCRs Done
2,986,319 UART: [art] Lock RT PCRs Done
2,987,523 UART: [art] Populate DV Done
2,995,434 UART: [fht] FMC Alias Private Key: 7
2,996,450 UART: [art] Derive CDI
2,996,730 UART: [art] Store in in slot 0x4
3,081,921 UART: [art] Derive Key Pair
3,082,281 UART: [art] Store priv key in slot 0x5
3,095,213 UART: [art] Derive Key Pair - Done
3,109,996 UART: [art] Signing Cert with AUTHO
3,110,476 UART: RITY.KEYID = 7
3,125,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,671 UART: [art] PUB.X = 18C49CCBD14070B6043EA426DFD93B1E6C82B13461EFD687FA45E9DF10D1D2BEBB205E2C00E6C837BDA52AED75659CA8
3,133,436 UART: [art] PUB.Y = E4B0DC13E12436EE6848B22552DD3CECC154A7C51A0A7D69055528E79D72FF140305CED5970D1F1BD1C23D6B735930F0
3,140,377 UART: [art] SIG.R = FF1C4C1174A8BA4DBF28F5D7CA6D053E007E6C7347476CB87B85657BF8B2BA4DB3107E60BA0C63508248A7963158B088
3,147,125 UART: [art] SIG.S = D5659E1E8C1E8E844059A1D2F4F17CE259FAC82652CBC81ADCADB5B39297B39365DBA0F1B6E41FC25E048417E9D3C7B8
3,171,191 UART: Caliptra RT
3,171,536 UART: [state] CFI Enabled
3,279,946 UART: [rt] RT listening for mailbox commands...
3,280,616 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,668 UART: [rt]cmd =0x414c544e, len=20
3,311,919 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,804 ready_for_fw is high
1,060,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,671 >>> mbox cmd response: success
2,692,151 UART:
2,692,167 UART: Running Caliptra FMC ...
2,692,575 UART:
2,692,718 UART: [state] CFI Enabled
2,703,405 UART: [fht] FMC Alias Private Key: 7
2,811,220 UART: [art] Extend RT PCRs Done
2,811,648 UART: [art] Lock RT PCRs Done
2,812,992 UART: [art] Populate DV Done
2,821,181 UART: [fht] FMC Alias Private Key: 7
2,822,233 UART: [art] Derive CDI
2,822,513 UART: [art] Store in in slot 0x4
2,908,066 UART: [art] Derive Key Pair
2,908,426 UART: [art] Store priv key in slot 0x5
2,920,944 UART: [art] Derive Key Pair - Done
2,935,459 UART: [art] Signing Cert with AUTHO
2,935,939 UART: RITY.KEYID = 7
2,951,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,198 UART: [art] PUB.X = 9FE6E13652A2C5105EFD53E190DF346504CEC3E6535BDC695F6F078C70395A4C3A125F8D855E90F87321277A26D2DDFF
2,958,968 UART: [art] PUB.Y = ACD134CCFFE8626E0986EAA9F25A864117472AFD6BA6B8215E8496161C3D5674F50A418377B2491B63086FF0D71BC969
2,965,911 UART: [art] SIG.R = D901843502C74528899C83806F370F996BE9103B659AEE9B0B1171352A7D09E0548D7D690544361D0332CD9832FA96EB
2,972,648 UART: [art] SIG.S = E4066B0D773E6328884DC3157C09027DE4BBDDF5BAD910A34AFBCE36346F4A6D81FE8899713D5D08CC4E7B7058F41CCA
2,996,476 UART: Caliptra RT
2,996,821 UART: [state] CFI Enabled
3,103,717 UART: [rt] RT listening for mailbox commands...
3,104,387 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,041 UART: [rt]cmd =0x414c544e, len=20
3,135,324 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,389 UART: [idev] ++
1,173,557 UART: [idev] CDI.KEYID = 6
1,173,918 UART: [idev] SUBJECT.KEYID = 7
1,174,343 UART: [idev] UDS.KEYID = 0
1,174,689 ready_for_fw is high
1,174,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,535 UART: [idev] --
1,209,636 UART: [ldev] ++
1,209,804 UART: [ldev] CDI.KEYID = 6
1,210,168 UART: [ldev] SUBJECT.KEYID = 5
1,210,595 UART: [ldev] AUTHORITY.KEYID = 7
1,211,058 UART: [ldev] FE.KEYID = 1
1,216,450 UART: [ldev] Erasing FE.KEYID = 1
1,243,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,084 UART: [ldev] --
1,282,348 UART: [fwproc] Wait for Commands...
1,282,993 UART: [fwproc] Recv command 0x46574c44
1,283,726 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,450 >>> mbox cmd response: success
2,776,653 UART: [afmc] ++
2,776,821 UART: [afmc] CDI.KEYID = 6
2,777,184 UART: [afmc] SUBJECT.KEYID = 7
2,777,610 UART: [afmc] AUTHORITY.KEYID = 5
2,812,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,462 UART: [afmc] --
2,856,358 UART: [cold-reset] --
2,857,232 UART: [state] Locking Datavault
2,858,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,121 UART: [state] Locking ICCM
2,859,655 UART: [exit] Launching FMC @ 0x40000130
2,864,984 UART:
2,865,000 UART: Running Caliptra FMC ...
2,865,408 UART:
2,865,462 UART: [state] CFI Enabled
2,876,113 UART: [fht] FMC Alias Private Key: 7
2,984,514 UART: [art] Extend RT PCRs Done
2,984,942 UART: [art] Lock RT PCRs Done
2,986,548 UART: [art] Populate DV Done
2,994,919 UART: [fht] FMC Alias Private Key: 7
2,995,919 UART: [art] Derive CDI
2,996,199 UART: [art] Store in in slot 0x4
3,081,576 UART: [art] Derive Key Pair
3,081,936 UART: [art] Store priv key in slot 0x5
3,094,950 UART: [art] Derive Key Pair - Done
3,109,605 UART: [art] Signing Cert with AUTHO
3,110,085 UART: RITY.KEYID = 7
3,125,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,310 UART: [art] PUB.X = D3F44E14B0005D8B55A19B57A25F3796D766E0F86C8CFB5C9BFCE1F870886612454AED1E5A1DAC8CFFFA64B7126DE5DF
3,133,078 UART: [art] PUB.Y = 88896904B443837D392293051183D8C417921A19EF29D80EB3B27E8687875C120104D66A16DBBDC9B5956CD274E8AEB1
3,140,005 UART: [art] SIG.R = 9953FB5BF55C286C8E33A27CAEBA8D81A312FBB163A8FB3C6783791EC4EE853FDD17990F878EF38B0B8C61D6919A4721
3,146,781 UART: [art] SIG.S = 7838DBF06A572924F3E278910965558F9FF6E5734036486C2E837B000242C71E3124933533B2CD06AC6AAC504D4F030C
3,171,047 UART: Caliptra RT
3,171,300 UART: [state] CFI Enabled
3,279,227 UART: [rt] RT listening for mailbox commands...
3,279,897 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,641 UART: [rt]cmd =0x414c544e, len=20
3,310,958 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,112 ready_for_fw is high
1,056,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,804 >>> mbox cmd response: success
2,686,516 UART:
2,686,532 UART: Running Caliptra FMC ...
2,686,940 UART:
2,686,994 UART: [state] CFI Enabled
2,697,593 UART: [fht] FMC Alias Private Key: 7
2,805,960 UART: [art] Extend RT PCRs Done
2,806,388 UART: [art] Lock RT PCRs Done
2,807,922 UART: [art] Populate DV Done
2,816,305 UART: [fht] FMC Alias Private Key: 7
2,817,319 UART: [art] Derive CDI
2,817,599 UART: [art] Store in in slot 0x4
2,903,292 UART: [art] Derive Key Pair
2,903,652 UART: [art] Store priv key in slot 0x5
2,916,712 UART: [art] Derive Key Pair - Done
2,931,444 UART: [art] Signing Cert with AUTHO
2,931,924 UART: RITY.KEYID = 7
2,947,430 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,195 UART: [art] PUB.X = 9BDB50BE956DACA7B15C4B82D7AFB9609EE6011157BEFE61A29D039EF96EBF52CEB41823F68AA20A4A4CC263EF1C3163
2,954,978 UART: [art] PUB.Y = F68F397B63EF80DDE7B83583BD8E832D7A76EA4C953613692CB8E34E049FF8D739BEF0B2D3E204B4E682C6BF30107110
2,961,930 UART: [art] SIG.R = 685CF1CC77E9C46C2EEDFA69F47F3C39C5A272562EF86743B295F8B383252DC7385A41D425B99F6FA89D89EF9325AB93
2,968,708 UART: [art] SIG.S = DBAD998520BE77D0782885794C6D37011892698E650AE6A6EC8FDD048D920B75C3FED1FB487F27140EF612E9F94F7857
2,992,770 UART: Caliptra RT
2,993,023 UART: [state] CFI Enabled
3,101,870 UART: [rt] RT listening for mailbox commands...
3,102,540 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,430 UART: [rt]cmd =0x414c544e, len=20
3,133,851 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 ready_for_fw is high
1,174,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,185 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,886 >>> mbox cmd response: success
2,775,929 UART: [afmc] ++
2,776,097 UART: [afmc] CDI.KEYID = 6
2,776,460 UART: [afmc] SUBJECT.KEYID = 7
2,776,886 UART: [afmc] AUTHORITY.KEYID = 5
2,812,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,422 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,036 UART: [afmc] --
2,855,920 UART: [cold-reset] --
2,856,852 UART: [state] Locking Datavault
2,858,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,609 UART: [state] Locking ICCM
2,859,195 UART: [exit] Launching FMC @ 0x40000130
2,864,524 UART:
2,864,540 UART: Running Caliptra FMC ...
2,864,948 UART:
2,865,091 UART: [state] CFI Enabled
2,875,642 UART: [fht] FMC Alias Private Key: 7
2,984,015 UART: [art] Extend RT PCRs Done
2,984,443 UART: [art] Lock RT PCRs Done
2,985,889 UART: [art] Populate DV Done
2,994,022 UART: [fht] FMC Alias Private Key: 7
2,995,178 UART: [art] Derive CDI
2,995,458 UART: [art] Store in in slot 0x4
3,080,945 UART: [art] Derive Key Pair
3,081,305 UART: [art] Store priv key in slot 0x5
3,094,371 UART: [art] Derive Key Pair - Done
3,109,196 UART: [art] Signing Cert with AUTHO
3,109,676 UART: RITY.KEYID = 7
3,124,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,311 UART: [art] PUB.X = BA5BF91614337A27DD7B2C23B477F78B91C1DC3BE44268B6B77ED993FA59CE94DD352689E995D35C32E7BBAF9CE617D9
3,132,095 UART: [art] PUB.Y = EFBF38B6602F76115953A4CA18BF50B7A812620F8CFCA85B9C988C88DB8180B506ECC37BEECA83368DEF6022D41A4DD9
3,139,055 UART: [art] SIG.R = 93A16B855DEEE5FAB303463EBBF76D6A05524B3DC4ED676095D6CBFCD7018A29708E7DB5015665DFAC7365949607CD85
3,145,820 UART: [art] SIG.S = 96BA9B319FF8423CD9F24DCEA7D1035BFF0AB6DE339C988FDAAE64E50319D7E243704523229FF1B79BE456465A62F668
3,169,898 UART: Caliptra RT
3,170,243 UART: [state] CFI Enabled
3,277,293 UART: [rt] RT listening for mailbox commands...
3,277,963 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,743 UART: [rt]cmd =0x414c544e, len=20
3,308,980 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 ready_for_fw is high
1,056,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,693 >>> mbox cmd response: success
2,685,729 UART:
2,685,745 UART: Running Caliptra FMC ...
2,686,153 UART:
2,686,296 UART: [state] CFI Enabled
2,697,309 UART: [fht] FMC Alias Private Key: 7
2,805,992 UART: [art] Extend RT PCRs Done
2,806,420 UART: [art] Lock RT PCRs Done
2,807,978 UART: [art] Populate DV Done
2,816,245 UART: [fht] FMC Alias Private Key: 7
2,817,245 UART: [art] Derive CDI
2,817,525 UART: [art] Store in in slot 0x4
2,903,106 UART: [art] Derive Key Pair
2,903,466 UART: [art] Store priv key in slot 0x5
2,916,722 UART: [art] Derive Key Pair - Done
2,931,616 UART: [art] Signing Cert with AUTHO
2,932,096 UART: RITY.KEYID = 7
2,947,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,279 UART: [art] PUB.X = 2D532F0326177C4EDCF05EA07CFC13CD4F91828A8DAEB31CCFE292DA96411D8BF6FBAB14779BC25E7DFFA933A41B447E
2,955,070 UART: [art] PUB.Y = 93144AC9566936326298E57B7248ABE74829E24D367B1535182014B2E4C8612B13E69E8EFAEA33D47D67936627FF44B0
2,962,010 UART: [art] SIG.R = F0D26FE79D997393E10AE6C568C118A1B266B73C015BCBAC8E8AF6F3485D996BC177B00F057CE7B39018E653EBF9C66D
2,968,780 UART: [art] SIG.S = 93E2519FABD8D40616C2CC86FDF9A280C32E176640B3059AD2E37B74B4846F482412ECB42E49A20CFCFF3A9822D7467F
2,992,472 UART: Caliptra RT
2,992,817 UART: [state] CFI Enabled
3,100,173 UART: [rt] RT listening for mailbox commands...
3,100,843 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,663 UART: [rt]cmd =0x414c544e, len=20
3,132,146 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,517,464 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,216 UART: [state] Locking ICCM
23,521,475 UART: [exit] Launching FMC @ 0x40000130
23,529,824 UART:
23,530,058 UART: Running Caliptra FMC ...
23,531,165 UART:
23,531,345 UART: [state] CFI Enabled
23,597,443 UART: [fht] FMC Alias Private Key: 7
25,936,751 UART: [art] Extend RT PCRs Done
25,937,991 UART: [art] Lock RT PCRs Done
25,939,668 UART: [art] Populate DV Done
25,945,296 UART: [fht] FMC Alias Private Key: 7
25,946,892 UART: [art] Derive CDI
25,947,923 UART: [art] Store in in slot 0x4
26,006,514 UART: [art] Derive Key Pair
26,007,526 UART: [art] Store priv key in slot 0x5
29,300,401 UART: [art] Derive Key Pair - Done
29,313,459 UART: [art] Signing Cert with AUTHO
29,314,801 UART: RITY.KEYID = 7
31,601,309 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,817 UART: [art] PUB.X = 611B0C4668165583508D03C446F675C4DBAC5CE24EB0DF1AD9244F8EE61C08F5EE4B58C5E8A709E146047D2610D96ACA
31,610,017 UART: [art] PUB.Y = 4FD51B8CCAC55845ED2073C2213641249D294B7805923F4666934CEF327F71BC70E1B74ED520777FD8AF2CA00392FB5C
31,617,292 UART: [art] SIG.R = CCBACFE38C085CA14BC36FA0DECE63711C250A74EC261F9A562BBE00CD0956876403BA44A18EE64E71094D6C110F8DAC
31,624,636 UART: [art] SIG.S = 60215CEE3C1B5D7DBC901A484A8A57612DCCE92F66DB8C59F3797B23CD2604D8DE2D9742D9A6CD23F95A0FC197AF91A5
32,930,063 UART: Caliptra RT
32,930,767 UART: [state] CFI Enabled
33,102,316 UART: [rt] RT listening for mailbox commands...
33,134,349 UART: [rt]cmd =0x44504543, len=92
38,888,672 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,126 writing to cptra_bootfsm_go
190,252 UART:
190,545 UART: Running Caliptra ROM ...
191,655 UART:
191,809 UART: [state] CFI Enabled
250,571 UART: [state] LifecycleState = Unprovisioned
252,504 UART: [state] DebugLocked = No
255,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,538 UART: [kat] SHA2-256
429,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,739 UART: [kat] ++
440,189 UART: [kat] sha1
451,847 UART: [kat] SHA2-256
454,495 UART: [kat] SHA2-384
459,773 UART: [kat] SHA2-512-ACC
462,151 UART: [kat] ECC-384
2,754,476 UART: [kat] HMAC-384Kdf
2,767,345 UART: [kat] LMS
3,957,694 UART: [kat] --
3,961,207 UART: [cold-reset] ++
3,963,709 UART: [fht] Storing FHT @ 0x50003400
3,974,409 UART: [idev] ++
3,974,970 UART: [idev] CDI.KEYID = 6
3,975,853 UART: [idev] SUBJECT.KEYID = 7
3,977,191 UART: [idev] UDS.KEYID = 0
3,978,097 ready_for_fw is high
3,978,294 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,121,752 UART: [idev] Erasing UDS.KEYID = 0
7,311,075 UART: [idev] Using Sha1 for KeyId Algorithm
7,332,511 UART: [idev] --
7,336,725 UART: [ldev] ++
7,337,302 UART: [ldev] CDI.KEYID = 6
7,338,242 UART: [ldev] SUBJECT.KEYID = 5
7,339,508 UART: [ldev] AUTHORITY.KEYID = 7
7,340,667 UART: [ldev] FE.KEYID = 1
7,389,307 UART: [ldev] Erasing FE.KEYID = 1
10,721,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,017,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,061,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,810 UART: [ldev] --
13,083,939 UART: [fwproc] Waiting for Commands...
13,086,800 UART: [fwproc] Received command 0x46574c44
13,088,986 UART: [fwproc] Received Image of size 114124 bytes
17,136,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,214,810 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,283,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,600,994 >>> mbox cmd response: success
17,601,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,604,542 UART: [afmc] ++
17,605,171 UART: [afmc] CDI.KEYID = 6
17,606,084 UART: [afmc] SUBJECT.KEYID = 7
17,607,303 UART: [afmc] AUTHORITY.KEYID = 5
20,975,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,272,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,275,021 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,289,433 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,304,289 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,318,708 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,341,220 UART: [afmc] --
23,344,598 UART: [cold-reset] --
23,347,858 UART: [state] Locking Datavault
23,351,674 UART: [state] Locking PCR0, PCR1 and PCR31
23,353,402 UART: [state] Locking ICCM
23,355,452 UART: [exit] Launching FMC @ 0x40000130
23,363,846 UART:
23,364,088 UART: Running Caliptra FMC ...
23,365,195 UART:
23,365,356 UART: [state] CFI Enabled
23,433,207 UART: [fht] FMC Alias Private Key: 7
25,771,420 UART: [art] Extend RT PCRs Done
25,772,666 UART: [art] Lock RT PCRs Done
25,774,405 UART: [art] Populate DV Done
25,780,040 UART: [fht] FMC Alias Private Key: 7
25,781,690 UART: [art] Derive CDI
25,782,508 UART: [art] Store in in slot 0x4
25,841,150 UART: [art] Derive Key Pair
25,842,191 UART: [art] Store priv key in slot 0x5
29,134,617 UART: [art] Derive Key Pair - Done
29,147,719 UART: [art] Signing Cert with AUTHO
29,149,030 UART: RITY.KEYID = 7
31,436,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,437,993 UART: [art] PUB.X = 611B0C4668165583508D03C446F675C4DBAC5CE24EB0DF1AD9244F8EE61C08F5EE4B58C5E8A709E146047D2610D96ACA
31,445,283 UART: [art] PUB.Y = 4FD51B8CCAC55845ED2073C2213641249D294B7805923F4666934CEF327F71BC70E1B74ED520777FD8AF2CA00392FB5C
31,452,475 UART: [art] SIG.R = CCBACFE38C085CA14BC36FA0DECE63711C250A74EC261F9A562BBE00CD0956876403BA44A18EE64E71094D6C110F8DAC
31,459,890 UART: [art] SIG.S = 60215CEE3C1B5D7DBC901A484A8A57612DCCE92F66DB8C59F3797B23CD2604D8DE2D9742D9A6CD23F95A0FC197AF91A5
32,765,045 UART: Caliptra RT
32,765,781 UART: [state] CFI Enabled
32,925,969 UART: [rt] RT listening for mailbox commands...
32,958,185 UART: [rt]cmd =0x4d454153, len=108
32,976,488 >>> mbox cmd response data (12 bytes)
32,977,019 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,007,609 UART: [rt]cmd =0x44504543, len=92
38,768,202 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,059 writing to cptra_bootfsm_go
190,190 UART:
190,478 UART: Running Caliptra ROM ...
191,589 UART:
191,741 UART: [state] CFI Enabled
254,689 UART: [state] LifecycleState = Unprovisioned
256,620 UART: [state] DebugLocked = No
258,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,273 UART: [kat] SHA2-256
433,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,507 UART: [kat] ++
445,036 UART: [kat] sha1
455,286 UART: [kat] SHA2-256
457,934 UART: [kat] SHA2-384
464,141 UART: [kat] SHA2-512-ACC
466,510 UART: [kat] ECC-384
2,756,166 UART: [kat] HMAC-384Kdf
2,787,281 UART: [kat] LMS
3,977,593 UART: [kat] --
3,982,599 UART: [cold-reset] ++
3,984,895 UART: [fht] Storing FHT @ 0x50003400
3,995,828 UART: [idev] ++
3,996,427 UART: [idev] CDI.KEYID = 6
3,997,315 UART: [idev] SUBJECT.KEYID = 7
3,998,660 UART: [idev] UDS.KEYID = 0
3,999,562 ready_for_fw is high
3,999,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,143,048 UART: [idev] Erasing UDS.KEYID = 0
7,334,638 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,325 UART: [idev] --
7,360,824 UART: [ldev] ++
7,361,407 UART: [ldev] CDI.KEYID = 6
7,362,346 UART: [ldev] SUBJECT.KEYID = 5
7,363,559 UART: [ldev] AUTHORITY.KEYID = 7
7,364,851 UART: [ldev] FE.KEYID = 1
7,407,446 UART: [ldev] Erasing FE.KEYID = 1
10,737,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,709 UART: [ldev] --
13,103,546 UART: [fwproc] Waiting for Commands...
13,105,920 UART: [fwproc] Received command 0x46574c44
13,108,101 UART: [fwproc] Received Image of size 114124 bytes
17,162,768 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,526 >>> mbox cmd response: success
17,625,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,630,304 UART: [afmc] ++
17,630,882 UART: [afmc] CDI.KEYID = 6
17,631,764 UART: [afmc] SUBJECT.KEYID = 7
17,632,975 UART: [afmc] AUTHORITY.KEYID = 5
20,992,629 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,102 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,496 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,355 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,771 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,029 UART: [afmc] --
23,360,341 UART: [cold-reset] --
23,363,565 UART: [state] Locking Datavault
23,368,381 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,134 UART: [state] Locking ICCM
23,372,500 UART: [exit] Launching FMC @ 0x40000130
23,380,893 UART:
23,381,136 UART: Running Caliptra FMC ...
23,382,242 UART:
23,382,398 UART: [state] CFI Enabled
23,449,970 UART: [fht] FMC Alias Private Key: 7
25,787,794 UART: [art] Extend RT PCRs Done
25,789,029 UART: [art] Lock RT PCRs Done
25,790,791 UART: [art] Populate DV Done
25,796,364 UART: [fht] FMC Alias Private Key: 7
25,798,115 UART: [art] Derive CDI
25,798,855 UART: [art] Store in in slot 0x4
25,858,737 UART: [art] Derive Key Pair
25,859,778 UART: [art] Store priv key in slot 0x5
29,153,326 UART: [art] Derive Key Pair - Done
29,166,383 UART: [art] Signing Cert with AUTHO
29,167,689 UART: RITY.KEYID = 7
31,454,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,439 UART: [art] PUB.X = 611B0C4668165583508D03C446F675C4DBAC5CE24EB0DF1AD9244F8EE61C08F5EE4B58C5E8A709E146047D2610D96ACA
31,463,645 UART: [art] PUB.Y = 4FD51B8CCAC55845ED2073C2213641249D294B7805923F4666934CEF327F71BC70E1B74ED520777FD8AF2CA00392FB5C
31,470,887 UART: [art] SIG.R = CCBACFE38C085CA14BC36FA0DECE63711C250A74EC261F9A562BBE00CD0956876403BA44A18EE64E71094D6C110F8DAC
31,478,292 UART: [art] SIG.S = 60215CEE3C1B5D7DBC901A484A8A57612DCCE92F66DB8C59F3797B23CD2604D8DE2D9742D9A6CD23F95A0FC197AF91A5
32,783,631 UART: Caliptra RT
32,784,363 UART: [state] CFI Enabled
32,947,549 UART: [rt] RT listening for mailbox commands...
32,979,443 UART: [rt]cmd =0x44504543, len=96
33,010,725 >>> mbox cmd response data (56 bytes)
33,011,555 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,042,170 UART: [rt]cmd =0x44504543, len=92
38,807,774 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,849,493 >>> mbox cmd response data (12 bytes)
12,850,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,026,226 >>> mbox cmd response: success
18,026,711 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,714,274 UART:
23,714,646 UART: Running Caliptra FMC ...
23,715,893 UART:
23,716,064 UART: [state] CFI Enabled
23,783,579 UART: [fht] FMC Alias Private Key: 7
26,121,458 UART: [art] Extend RT PCRs Done
26,122,713 UART: [art] Lock RT PCRs Done
26,124,344 UART: [art] Populate DV Done
26,129,550 UART: [fht] FMC Alias Private Key: 7
26,131,264 UART: [art] Derive CDI
26,132,080 UART: [art] Store in in slot 0x4
26,192,134 UART: [art] Derive Key Pair
26,193,175 UART: [art] Store priv key in slot 0x5
29,486,214 UART: [art] Derive Key Pair - Done
29,498,829 UART: [art] Signing Cert with AUTHO
29,500,127 UART: RITY.KEYID = 7
31,787,116 UART: [art] Erasing AUTHORITY.KEYID = 7
31,788,613 UART: [art] PUB.X = 09B4EEFC944664735BD04604535AA0BBB3404F9D66F5424A322CB5F1F1700DF1C9C782FA7D6823DE1E52B93FC39536A6
31,795,859 UART: [art] PUB.Y = DBB82E906610E5595A3A7807DFF9D68F6D533F41F063859C0FDE781CE2337E3C5A0A7CA6F6579D273706E6CC9849BC14
31,803,083 UART: [art] SIG.R = 905A5F492FE1D65B647BC000B798D91356F36D9A06020CA1A5BD233CD131E1FDCE343D8B2A957489CA3F30CAEAE0BFE4
31,810,483 UART: [art] SIG.S = 96DB3AD1AA6B2DEF89B7F5BF1F403E53472250A2222269086428980544C4FBB22D94F40B13EC17203A18B876F2B574AF
33,115,177 UART: Caliptra RT
33,115,883 UART: [state] CFI Enabled
33,289,669 UART: [rt] RT listening for mailbox commands...
33,321,676 UART: [rt]cmd =0x44504543, len=92
39,077,196 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,076 writing to cptra_bootfsm_go
3,795,379 ready_for_fw is high
3,795,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,049 >>> mbox cmd response: success
17,868,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,555,490 UART:
23,555,809 UART: Running Caliptra FMC ...
23,556,940 UART:
23,557,104 UART: [state] CFI Enabled
23,625,376 UART: [fht] FMC Alias Private Key: 7
25,964,354 UART: [art] Extend RT PCRs Done
25,965,570 UART: [art] Lock RT PCRs Done
25,967,196 UART: [art] Populate DV Done
25,972,661 UART: [fht] FMC Alias Private Key: 7
25,974,254 UART: [art] Derive CDI
25,975,069 UART: [art] Store in in slot 0x4
26,034,893 UART: [art] Derive Key Pair
26,035,926 UART: [art] Store priv key in slot 0x5
29,328,865 UART: [art] Derive Key Pair - Done
29,341,590 UART: [art] Signing Cert with AUTHO
29,342,900 UART: RITY.KEYID = 7
31,630,490 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,996 UART: [art] PUB.X = 09B4EEFC944664735BD04604535AA0BBB3404F9D66F5424A322CB5F1F1700DF1C9C782FA7D6823DE1E52B93FC39536A6
31,639,242 UART: [art] PUB.Y = DBB82E906610E5595A3A7807DFF9D68F6D533F41F063859C0FDE781CE2337E3C5A0A7CA6F6579D273706E6CC9849BC14
31,646,478 UART: [art] SIG.R = 905A5F492FE1D65B647BC000B798D91356F36D9A06020CA1A5BD233CD131E1FDCE343D8B2A957489CA3F30CAEAE0BFE4
31,653,882 UART: [art] SIG.S = 96DB3AD1AA6B2DEF89B7F5BF1F403E53472250A2222269086428980544C4FBB22D94F40B13EC17203A18B876F2B574AF
32,959,048 UART: Caliptra RT
32,959,765 UART: [state] CFI Enabled
33,121,739 UART: [rt] RT listening for mailbox commands...
33,154,013 UART: [rt]cmd =0x4d454153, len=108
33,172,654 >>> mbox cmd response data (12 bytes)
33,173,143 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,203,780 UART: [rt]cmd =0x44504543, len=92
38,963,214 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,043 writing to cptra_bootfsm_go
3,785,646 ready_for_fw is high
3,785,997 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,849,470 >>> mbox cmd response: success
17,850,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,548,249 UART:
23,548,586 UART: Running Caliptra FMC ...
23,549,679 UART:
23,549,839 UART: [state] CFI Enabled
23,617,947 UART: [fht] FMC Alias Private Key: 7
25,956,080 UART: [art] Extend RT PCRs Done
25,957,341 UART: [art] Lock RT PCRs Done
25,959,256 UART: [art] Populate DV Done
25,964,677 UART: [fht] FMC Alias Private Key: 7
25,966,327 UART: [art] Derive CDI
25,967,070 UART: [art] Store in in slot 0x4
26,026,682 UART: [art] Derive Key Pair
26,027,744 UART: [art] Store priv key in slot 0x5
29,319,771 UART: [art] Derive Key Pair - Done
29,332,504 UART: [art] Signing Cert with AUTHO
29,333,807 UART: RITY.KEYID = 7
31,621,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,310 UART: [art] PUB.X = 09B4EEFC944664735BD04604535AA0BBB3404F9D66F5424A322CB5F1F1700DF1C9C782FA7D6823DE1E52B93FC39536A6
31,630,580 UART: [art] PUB.Y = DBB82E906610E5595A3A7807DFF9D68F6D533F41F063859C0FDE781CE2337E3C5A0A7CA6F6579D273706E6CC9849BC14
31,637,795 UART: [art] SIG.R = 905A5F492FE1D65B647BC000B798D91356F36D9A06020CA1A5BD233CD131E1FDCE343D8B2A957489CA3F30CAEAE0BFE4
31,645,207 UART: [art] SIG.S = 96DB3AD1AA6B2DEF89B7F5BF1F403E53472250A2222269086428980544C4FBB22D94F40B13EC17203A18B876F2B574AF
32,950,277 UART: Caliptra RT
32,950,992 UART: [state] CFI Enabled
33,112,959 UART: [rt] RT listening for mailbox commands...
33,145,077 UART: [rt]cmd =0x44504543, len=96
33,176,487 >>> mbox cmd response data (56 bytes)
33,177,348 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,207,681 UART: [rt]cmd =0x44504543, len=92
38,975,452 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,680,692 UART: [state] Locking PCR0, PCR1 and PCR31
23,682,466 UART: [state] Locking ICCM
23,684,607 UART: [exit] Launching FMC @ 0x40000130
23,693,004 UART:
23,693,240 UART: Running Caliptra FMC ...
23,694,338 UART:
23,694,499 UART: [state] CFI Enabled
23,703,035 UART: [fht] FMC Alias Private Key: 7
26,033,548 UART: [art] Extend RT PCRs Done
26,034,769 UART: [art] Lock RT PCRs Done
26,036,251 UART: [art] Populate DV Done
26,041,882 UART: [fht] FMC Alias Private Key: 7
26,043,525 UART: [art] Derive CDI
26,044,258 UART: [art] Store in in slot 0x4
26,086,796 UART: [art] Derive Key Pair
26,087,844 UART: [art] Store priv key in slot 0x5
29,329,898 UART: [art] Derive Key Pair - Done
29,342,997 UART: [art] Signing Cert with AUTHO
29,344,338 UART: RITY.KEYID = 7
31,623,935 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,442 UART: [art] PUB.X = 26266E1EA015882892F1000B5B3797D989D8CA1E01CA3AC9C380A474C70C468FD869FA12589B353AC9CE60A9B8EC58A5
31,632,687 UART: [art] PUB.Y = 3FE9AFCA8BCDB2D0EC0E001B97EFEDF97DD9830F59C1376945F6471BBABD4361C14A833DC41733DFF87131E0B60A31D1
31,639,970 UART: [art] SIG.R = 33258C5FF1CC4A5B13BE7EF443E400AEF377166B9AAB375ED41601B6673D042973E82863E79CB786AA8FA497B4DBD182
31,647,298 UART: [art] SIG.S = A541A9198F9F765722DD796D3A09C3F76AE112604613421CCE2EE5906CA89C68483060BB3C9C21FD6F8D17595419762C
32,953,110 UART: Caliptra RT
32,953,819 UART: [state] CFI Enabled
33,082,165 UART: [rt] RT listening for mailbox commands...
33,114,009 UART: [rt]cmd =0x44504543, len=92
38,794,864 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,116 writing to cptra_bootfsm_go
190,195 UART:
190,510 UART: Running Caliptra ROM ...
191,560 UART:
1,709,748 UART: [state] CFI Enabled
1,726,522 UART: [state] LifecycleState = Unprovisioned
1,728,442 UART: [state] DebugLocked = No
1,730,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,735,173 UART: [kat] SHA2-256
1,904,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,915,456 UART: [kat] ++
1,915,943 UART: [kat] sha1
1,925,716 UART: [kat] SHA2-256
1,928,456 UART: [kat] SHA2-384
1,934,387 UART: [kat] SHA2-512-ACC
1,936,764 UART: [kat] ECC-384
4,220,359 UART: [kat] HMAC-384Kdf
4,232,162 UART: [kat] LMS
5,422,300 UART: [kat] --
5,427,270 UART: [cold-reset] ++
5,429,145 UART: [fht] Storing FHT @ 0x50003400
5,441,263 UART: [idev] ++
5,441,895 UART: [idev] CDI.KEYID = 6
5,442,774 UART: [idev] SUBJECT.KEYID = 7
5,444,086 UART: [idev] UDS.KEYID = 0
5,444,982 ready_for_fw is high
5,445,157 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,588,410 UART: [idev] Erasing UDS.KEYID = 0
8,732,805 UART: [idev] Using Sha1 for KeyId Algorithm
8,755,537 UART: [idev] --
8,759,402 UART: [ldev] ++
8,759,981 UART: [ldev] CDI.KEYID = 6
8,760,918 UART: [ldev] SUBJECT.KEYID = 5
8,762,186 UART: [ldev] AUTHORITY.KEYID = 7
8,763,336 UART: [ldev] FE.KEYID = 1
8,773,478 UART: [ldev] Erasing FE.KEYID = 1
12,061,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,351,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,366,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,381,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,395,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,414,400 UART: [ldev] --
14,419,549 UART: [fwproc] Waiting for Commands...
14,421,588 UART: [fwproc] Received command 0x46574c44
14,423,769 UART: [fwproc] Received Image of size 114124 bytes
18,482,951 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,556,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,624,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
18,941,610 >>> mbox cmd response: success
18,942,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,946,469 UART: [afmc] ++
18,947,066 UART: [afmc] CDI.KEYID = 6
18,947,978 UART: [afmc] SUBJECT.KEYID = 7
18,949,248 UART: [afmc] AUTHORITY.KEYID = 5
22,259,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,557,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,559,273 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,573,643 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,588,483 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,602,990 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,625,143 UART: [afmc] --
24,629,271 UART: [cold-reset] --
24,632,967 UART: [state] Locking Datavault
24,636,695 UART: [state] Locking PCR0, PCR1 and PCR31
24,638,447 UART: [state] Locking ICCM
24,640,050 UART: [exit] Launching FMC @ 0x40000130
24,648,443 UART:
24,648,696 UART: Running Caliptra FMC ...
24,649,796 UART:
24,649,955 UART: [state] CFI Enabled
24,658,052 UART: [fht] FMC Alias Private Key: 7
26,988,989 UART: [art] Extend RT PCRs Done
26,990,220 UART: [art] Lock RT PCRs Done
26,991,517 UART: [art] Populate DV Done
26,996,884 UART: [fht] FMC Alias Private Key: 7
26,998,579 UART: [art] Derive CDI
26,999,390 UART: [art] Store in in slot 0x4
27,041,929 UART: [art] Derive Key Pair
27,042,932 UART: [art] Store priv key in slot 0x5
30,285,415 UART: [art] Derive Key Pair - Done
30,298,372 UART: [art] Signing Cert with AUTHO
30,299,668 UART: RITY.KEYID = 7
32,578,826 UART: [art] Erasing AUTHORITY.KEYID = 7
32,580,359 UART: [art] PUB.X = 26266E1EA015882892F1000B5B3797D989D8CA1E01CA3AC9C380A474C70C468FD869FA12589B353AC9CE60A9B8EC58A5
32,587,556 UART: [art] PUB.Y = 3FE9AFCA8BCDB2D0EC0E001B97EFEDF97DD9830F59C1376945F6471BBABD4361C14A833DC41733DFF87131E0B60A31D1
32,594,815 UART: [art] SIG.R = 33258C5FF1CC4A5B13BE7EF443E400AEF377166B9AAB375ED41601B6673D042973E82863E79CB786AA8FA497B4DBD182
32,602,210 UART: [art] SIG.S = A541A9198F9F765722DD796D3A09C3F76AE112604613421CCE2EE5906CA89C68483060BB3C9C21FD6F8D17595419762C
33,907,903 UART: Caliptra RT
33,908,614 UART: [state] CFI Enabled
34,026,645 UART: [rt] RT listening for mailbox commands...
34,058,752 UART: [rt]cmd =0x4d454153, len=108
34,076,586 >>> mbox cmd response data (12 bytes)
34,077,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,107,587 UART: [rt]cmd =0x44504543, len=92
39,787,110 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,085 writing to cptra_bootfsm_go
190,151 UART:
190,439 UART: Running Caliptra ROM ...
191,480 UART:
2,012,329 UART: [state] CFI Enabled
2,026,692 UART: [state] LifecycleState = Unprovisioned
2,028,609 UART: [state] DebugLocked = No
2,031,130 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,035,537 UART: [kat] SHA2-256
2,205,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,215,840 UART: [kat] ++
2,216,294 UART: [kat] sha1
2,227,027 UART: [kat] SHA2-256
2,229,763 UART: [kat] SHA2-384
2,236,328 UART: [kat] SHA2-512-ACC
2,238,706 UART: [kat] ECC-384
4,522,035 UART: [kat] HMAC-384Kdf
4,534,002 UART: [kat] LMS
5,724,075 UART: [kat] --
5,729,683 UART: [cold-reset] ++
5,731,980 UART: [fht] Storing FHT @ 0x50003400
5,744,229 UART: [idev] ++
5,744,805 UART: [idev] CDI.KEYID = 6
5,745,685 UART: [idev] SUBJECT.KEYID = 7
5,746,994 UART: [idev] UDS.KEYID = 0
5,747,888 ready_for_fw is high
5,748,064 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,891,252 UART: [idev] Erasing UDS.KEYID = 0
9,034,730 UART: [idev] Using Sha1 for KeyId Algorithm
9,056,230 UART: [idev] --
9,059,202 UART: [ldev] ++
9,059,773 UART: [ldev] CDI.KEYID = 6
9,060,736 UART: [ldev] SUBJECT.KEYID = 5
9,061,863 UART: [ldev] AUTHORITY.KEYID = 7
9,063,136 UART: [ldev] FE.KEYID = 1
9,075,952 UART: [ldev] Erasing FE.KEYID = 1
12,366,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,657,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,672,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,687,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,701,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,720,554 UART: [ldev] --
14,725,654 UART: [fwproc] Waiting for Commands...
14,727,697 UART: [fwproc] Received command 0x46574c44
14,729,884 UART: [fwproc] Received Image of size 114124 bytes
18,784,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,858,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,927,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,244,455 >>> mbox cmd response: success
19,244,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,248,991 UART: [afmc] ++
19,249,590 UART: [afmc] CDI.KEYID = 6
19,250,498 UART: [afmc] SUBJECT.KEYID = 7
19,251,767 UART: [afmc] AUTHORITY.KEYID = 5
22,564,739 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,860,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,863,239 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,877,607 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,892,435 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,906,880 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,928,402 UART: [afmc] --
24,932,913 UART: [cold-reset] --
24,935,785 UART: [state] Locking Datavault
24,942,715 UART: [state] Locking PCR0, PCR1 and PCR31
24,944,419 UART: [state] Locking ICCM
24,946,036 UART: [exit] Launching FMC @ 0x40000130
24,954,424 UART:
24,954,673 UART: Running Caliptra FMC ...
24,955,775 UART:
24,955,935 UART: [state] CFI Enabled
24,964,033 UART: [fht] FMC Alias Private Key: 7
27,295,414 UART: [art] Extend RT PCRs Done
27,296,632 UART: [art] Lock RT PCRs Done
27,298,279 UART: [art] Populate DV Done
27,303,956 UART: [fht] FMC Alias Private Key: 7
27,305,594 UART: [art] Derive CDI
27,306,324 UART: [art] Store in in slot 0x4
27,349,022 UART: [art] Derive Key Pair
27,350,060 UART: [art] Store priv key in slot 0x5
30,592,504 UART: [art] Derive Key Pair - Done
30,605,389 UART: [art] Signing Cert with AUTHO
30,606,689 UART: RITY.KEYID = 7
32,886,154 UART: [art] Erasing AUTHORITY.KEYID = 7
32,887,675 UART: [art] PUB.X = 26266E1EA015882892F1000B5B3797D989D8CA1E01CA3AC9C380A474C70C468FD869FA12589B353AC9CE60A9B8EC58A5
32,894,919 UART: [art] PUB.Y = 3FE9AFCA8BCDB2D0EC0E001B97EFEDF97DD9830F59C1376945F6471BBABD4361C14A833DC41733DFF87131E0B60A31D1
32,902,136 UART: [art] SIG.R = 33258C5FF1CC4A5B13BE7EF443E400AEF377166B9AAB375ED41601B6673D042973E82863E79CB786AA8FA497B4DBD182
32,909,524 UART: [art] SIG.S = A541A9198F9F765722DD796D3A09C3F76AE112604613421CCE2EE5906CA89C68483060BB3C9C21FD6F8D17595419762C
34,214,589 UART: Caliptra RT
34,215,301 UART: [state] CFI Enabled
34,333,606 UART: [rt] RT listening for mailbox commands...
34,365,396 UART: [rt]cmd =0x44504543, len=96
34,395,909 >>> mbox cmd response data (56 bytes)
34,396,849 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,427,641 UART: [rt]cmd =0x44504543, len=92
40,107,486 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
4,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,046,330 >>> mbox cmd response data (12 bytes)
13,047,977 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,225,818 >>> mbox cmd response: success
18,226,326 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,868,156 UART:
23,868,553 UART: Running Caliptra FMC ...
23,869,798 UART:
23,869,975 UART: [state] CFI Enabled
23,877,953 UART: [fht] FMC Alias Private Key: 7
26,208,520 UART: [art] Extend RT PCRs Done
26,209,752 UART: [art] Lock RT PCRs Done
26,211,486 UART: [art] Populate DV Done
26,216,954 UART: [fht] FMC Alias Private Key: 7
26,218,489 UART: [art] Derive CDI
26,219,303 UART: [art] Store in in slot 0x4
26,261,848 UART: [art] Derive Key Pair
26,262,907 UART: [art] Store priv key in slot 0x5
29,504,832 UART: [art] Derive Key Pair - Done
29,517,832 UART: [art] Signing Cert with AUTHO
29,519,130 UART: RITY.KEYID = 7
31,798,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,800,361 UART: [art] PUB.X = B31718461FF436C9C9E794EAD3447090FBAF19D84F31ACC8228B776E03EE2E2035E7C7D24E9026CD2B0AE6D80236D7A6
31,807,559 UART: [art] PUB.Y = B07C1F9702C84A418118AD73E89AB3A7BB11E62F7DF35632B8C9896AF81559DF14BB6CCFFBB8D446845D2B1A7348D05F
31,814,856 UART: [art] SIG.R = ED4F4D97D1F1505C7E12B2560DC6EBD4145CEAC682DAA0E7C9E217F193F89C90E4952964238757C6CCA65077FBB41CC9
31,822,246 UART: [art] SIG.S = B739C6555F1736BACE86D00C54F5AFB1A32D66B9A53BCBDA93B7C1482F14295D4DFA35615BAE0DA08AD8D632642952C2
33,127,882 UART: Caliptra RT
33,128,602 UART: [state] CFI Enabled
33,256,912 UART: [rt] RT listening for mailbox commands...
33,289,413 UART: [rt]cmd =0x44504543, len=92
38,969,259 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,159 writing to cptra_bootfsm_go
5,046,598 ready_for_fw is high
5,047,315 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,989,482 >>> mbox cmd response: success
18,990,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,634,239 UART:
24,634,590 UART: Running Caliptra FMC ...
24,635,661 UART:
24,635,810 UART: [state] CFI Enabled
24,643,798 UART: [fht] FMC Alias Private Key: 7
26,973,952 UART: [art] Extend RT PCRs Done
26,975,236 UART: [art] Lock RT PCRs Done
26,976,780 UART: [art] Populate DV Done
26,982,138 UART: [fht] FMC Alias Private Key: 7
26,983,790 UART: [art] Derive CDI
26,984,601 UART: [art] Store in in slot 0x4
27,027,095 UART: [art] Derive Key Pair
27,028,142 UART: [art] Store priv key in slot 0x5
30,270,271 UART: [art] Derive Key Pair - Done
30,283,369 UART: [art] Signing Cert with AUTHO
30,284,665 UART: RITY.KEYID = 7
32,564,141 UART: [art] Erasing AUTHORITY.KEYID = 7
32,565,645 UART: [art] PUB.X = B31718461FF436C9C9E794EAD3447090FBAF19D84F31ACC8228B776E03EE2E2035E7C7D24E9026CD2B0AE6D80236D7A6
32,572,903 UART: [art] PUB.Y = B07C1F9702C84A418118AD73E89AB3A7BB11E62F7DF35632B8C9896AF81559DF14BB6CCFFBB8D446845D2B1A7348D05F
32,580,130 UART: [art] SIG.R = ED4F4D97D1F1505C7E12B2560DC6EBD4145CEAC682DAA0E7C9E217F193F89C90E4952964238757C6CCA65077FBB41CC9
32,587,513 UART: [art] SIG.S = B739C6555F1736BACE86D00C54F5AFB1A32D66B9A53BCBDA93B7C1482F14295D4DFA35615BAE0DA08AD8D632642952C2
33,892,645 UART: Caliptra RT
33,893,362 UART: [state] CFI Enabled
34,010,929 UART: [rt] RT listening for mailbox commands...
34,043,213 UART: [rt]cmd =0x4d454153, len=108
34,062,898 >>> mbox cmd response data (12 bytes)
34,063,520 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,094,181 UART: [rt]cmd =0x44504543, len=92
39,773,905 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,110 writing to cptra_bootfsm_go
5,364,423 ready_for_fw is high
5,364,771 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,315,418 >>> mbox cmd response: success
19,315,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,956,460 UART:
24,956,787 UART: Running Caliptra FMC ...
24,957,848 UART:
24,957,996 UART: [state] CFI Enabled
24,966,228 UART: [fht] FMC Alias Private Key: 7
27,297,293 UART: [art] Extend RT PCRs Done
27,298,523 UART: [art] Lock RT PCRs Done
27,300,116 UART: [art] Populate DV Done
27,305,534 UART: [fht] FMC Alias Private Key: 7
27,307,178 UART: [art] Derive CDI
27,307,916 UART: [art] Store in in slot 0x4
27,350,397 UART: [art] Derive Key Pair
27,351,391 UART: [art] Store priv key in slot 0x5
30,593,687 UART: [art] Derive Key Pair - Done
30,606,740 UART: [art] Signing Cert with AUTHO
30,608,044 UART: RITY.KEYID = 7
32,886,977 UART: [art] Erasing AUTHORITY.KEYID = 7
32,888,489 UART: [art] PUB.X = B31718461FF436C9C9E794EAD3447090FBAF19D84F31ACC8228B776E03EE2E2035E7C7D24E9026CD2B0AE6D80236D7A6
32,895,786 UART: [art] PUB.Y = B07C1F9702C84A418118AD73E89AB3A7BB11E62F7DF35632B8C9896AF81559DF14BB6CCFFBB8D446845D2B1A7348D05F
32,902,973 UART: [art] SIG.R = ED4F4D97D1F1505C7E12B2560DC6EBD4145CEAC682DAA0E7C9E217F193F89C90E4952964238757C6CCA65077FBB41CC9
32,910,375 UART: [art] SIG.S = B739C6555F1736BACE86D00C54F5AFB1A32D66B9A53BCBDA93B7C1482F14295D4DFA35615BAE0DA08AD8D632642952C2
34,215,633 UART: Caliptra RT
34,216,356 UART: [state] CFI Enabled
34,334,629 UART: [rt] RT listening for mailbox commands...
34,366,965 UART: [rt]cmd =0x44504543, len=96
34,397,892 >>> mbox cmd response data (56 bytes)
34,398,674 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,429,114 UART: [rt]cmd =0x44504543, len=92
40,109,489 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.06s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,771,797 UART: [afmc] --
18,776,400 UART: [cold-reset] --
18,779,129 UART: [state] Locking Datavault
18,784,482 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,133 UART: [state] Locking ICCM
18,788,112 UART: [exit] Launching FMC @ 0x40000130
18,796,565 UART:
18,796,800 UART: Running Caliptra FMC ...
18,797,899 UART:
18,798,060 UART: [state] CFI Enabled
18,855,696 UART: [fht] FMC Alias Private Key: 7
20,619,834 UART: [art] Extend RT PCRs Done
20,621,048 UART: [art] Lock RT PCRs Done
20,622,889 UART: [art] Populate DV Done
20,628,243 UART: [fht] FMC Alias Private Key: 7
20,629,896 UART: [art] Derive CDI
20,630,712 UART: [art] Store in in slot 0x4
20,688,454 UART: [art] Derive Key Pair
20,689,489 UART: [art] Store priv key in slot 0x5
23,152,713 UART: [art] Derive Key Pair - Done
23,165,816 UART: [art] Signing Cert with AUTHO
23,167,309 UART: RITY.KEYID = 7
24,877,993 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,491 UART: [art] PUB.X = A100753F86F447CCF212E2F365628A4CB92F0141CDDF8AA4B5B6117888FC4BB9DD51C0E0C001CE01667603C24885283A
24,886,735 UART: [art] PUB.Y = A263D7784E8208A64A6D5FEB86CFE7CBA59DC06D1F11DB758EEB27D5AC4A7D1500D778DBDAE8CCACF9330F9A271E89C1
24,894,014 UART: [art] SIG.R = 7588136697937A3AA697913A2D65FF747E6588CA012D4D298FDFE2E46761A34D44BBE769BA10D391D155A53D4E598116
24,901,403 UART: [art] SIG.S = F5A80529487E2C79CC4B35138298B35C91C9AEABAD71F6E06CC90EB3F93DBC883518CBAD4054C7D67C9B51E367787A54
25,880,547 UART: Caliptra RT
25,881,243 UART: [state] CFI Enabled
26,056,331 UART: [rt] RT listening for mailbox commands...
26,088,183 UART: [rt]cmd =0x44504543, len=92
30,439,005 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,118 writing to cptra_bootfsm_go
190,193 UART:
190,485 UART: Running Caliptra ROM ...
191,514 UART:
191,651 UART: [state] CFI Enabled
248,158 UART: [state] LifecycleState = Unprovisioned
250,016 UART: [state] DebugLocked = No
251,625 UART: [state] WD Timer not started. Device not locked for debugging
254,977 UART: [kat] SHA2-256
434,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
445,687 UART: [kat] ++
446,221 UART: [kat] sha1
457,393 UART: [kat] SHA2-256
460,440 UART: [kat] SHA2-384
465,442 UART: [kat] SHA2-512-ACC
468,382 UART: [kat] ECC-384
2,914,988 UART: [kat] HMAC-384Kdf
2,936,529 UART: [kat] LMS
3,465,944 UART: [kat] --
3,469,818 UART: [cold-reset] ++
3,472,390 UART: [fht] FHT @ 0x50003400
3,484,858 UART: [idev] ++
3,485,425 UART: [idev] CDI.KEYID = 6
3,486,455 UART: [idev] SUBJECT.KEYID = 7
3,487,558 UART: [idev] UDS.KEYID = 0
3,488,484 ready_for_fw is high
3,488,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,632,571 UART: [idev] Erasing UDS.KEYID = 0
5,990,481 UART: [idev] Sha1 KeyId Algorithm
6,013,598 UART: [idev] --
6,017,590 UART: [ldev] ++
6,018,156 UART: [ldev] CDI.KEYID = 6
6,019,041 UART: [ldev] SUBJECT.KEYID = 5
6,020,259 UART: [ldev] AUTHORITY.KEYID = 7
6,021,421 UART: [ldev] FE.KEYID = 1
6,065,727 UART: [ldev] Erasing FE.KEYID = 1
8,570,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,151 UART: [ldev] --
10,378,053 UART: [fwproc] Wait for Commands...
10,379,760 UART: [fwproc] Recv command 0x46574c44
10,381,864 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,181 >>> mbox cmd response: success
14,257,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,262,230 UART: [afmc] ++
14,262,803 UART: [afmc] CDI.KEYID = 6
14,263,685 UART: [afmc] SUBJECT.KEYID = 7
14,264,948 UART: [afmc] AUTHORITY.KEYID = 5
16,794,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,332 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,674 UART: [afmc] --
18,611,121 UART: [cold-reset] --
18,615,622 UART: [state] Locking Datavault
18,622,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,695 UART: [state] Locking ICCM
18,624,746 UART: [exit] Launching FMC @ 0x40000130
18,633,201 UART:
18,633,434 UART: Running Caliptra FMC ...
18,634,531 UART:
18,634,688 UART: [state] CFI Enabled
18,694,424 UART: [fht] FMC Alias Private Key: 7
20,458,055 UART: [art] Extend RT PCRs Done
20,459,272 UART: [art] Lock RT PCRs Done
20,460,702 UART: [art] Populate DV Done
20,466,296 UART: [fht] FMC Alias Private Key: 7
20,467,833 UART: [art] Derive CDI
20,468,566 UART: [art] Store in in slot 0x4
20,526,921 UART: [art] Derive Key Pair
20,527,916 UART: [art] Store priv key in slot 0x5
22,990,627 UART: [art] Derive Key Pair - Done
23,003,561 UART: [art] Signing Cert with AUTHO
23,004,870 UART: RITY.KEYID = 7
24,716,881 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,388 UART: [art] PUB.X = A100753F86F447CCF212E2F365628A4CB92F0141CDDF8AA4B5B6117888FC4BB9DD51C0E0C001CE01667603C24885283A
24,725,634 UART: [art] PUB.Y = A263D7784E8208A64A6D5FEB86CFE7CBA59DC06D1F11DB758EEB27D5AC4A7D1500D778DBDAE8CCACF9330F9A271E89C1
24,732,912 UART: [art] SIG.R = 7588136697937A3AA697913A2D65FF747E6588CA012D4D298FDFE2E46761A34D44BBE769BA10D391D155A53D4E598116
24,740,300 UART: [art] SIG.S = F5A80529487E2C79CC4B35138298B35C91C9AEABAD71F6E06CC90EB3F93DBC883518CBAD4054C7D67C9B51E367787A54
25,718,961 UART: Caliptra RT
25,719,669 UART: [state] CFI Enabled
25,885,889 UART: [rt] RT listening for mailbox commands...
25,918,064 UART: [rt]cmd =0x4d454153, len=108
25,935,839 >>> mbox cmd response data (12 bytes)
25,936,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,967,024 UART: [rt]cmd =0x44504543, len=92
30,321,839 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,067 writing to cptra_bootfsm_go
190,181 UART:
190,473 UART: Running Caliptra ROM ...
191,497 UART:
191,634 UART: [state] CFI Enabled
250,106 UART: [state] LifecycleState = Unprovisioned
251,932 UART: [state] DebugLocked = No
253,877 UART: [state] WD Timer not started. Device not locked for debugging
258,292 UART: [kat] SHA2-256
437,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
448,953 UART: [kat] ++
449,406 UART: [kat] sha1
460,773 UART: [kat] SHA2-256
463,775 UART: [kat] SHA2-384
470,189 UART: [kat] SHA2-512-ACC
473,130 UART: [kat] ECC-384
2,933,672 UART: [kat] HMAC-384Kdf
2,959,181 UART: [kat] LMS
3,488,612 UART: [kat] --
3,492,620 UART: [cold-reset] ++
3,495,267 UART: [fht] FHT @ 0x50003400
3,505,605 UART: [idev] ++
3,506,169 UART: [idev] CDI.KEYID = 6
3,507,227 UART: [idev] SUBJECT.KEYID = 7
3,508,331 UART: [idev] UDS.KEYID = 0
3,509,259 ready_for_fw is high
3,509,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,653,317 UART: [idev] Erasing UDS.KEYID = 0
6,015,448 UART: [idev] Sha1 KeyId Algorithm
6,038,832 UART: [idev] --
6,042,320 UART: [ldev] ++
6,042,894 UART: [ldev] CDI.KEYID = 6
6,043,782 UART: [ldev] SUBJECT.KEYID = 5
6,044,997 UART: [ldev] AUTHORITY.KEYID = 7
6,046,229 UART: [ldev] FE.KEYID = 1
6,088,240 UART: [ldev] Erasing FE.KEYID = 1
8,591,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,798 UART: [ldev] --
10,401,324 UART: [fwproc] Wait for Commands...
10,403,149 UART: [fwproc] Recv command 0x46574c44
10,405,242 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,280,183 >>> mbox cmd response: success
14,280,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,284,606 UART: [afmc] ++
14,285,183 UART: [afmc] CDI.KEYID = 6
14,286,066 UART: [afmc] SUBJECT.KEYID = 7
14,287,282 UART: [afmc] AUTHORITY.KEYID = 5
16,814,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,613,260 UART: [afmc] --
18,617,822 UART: [cold-reset] --
18,620,542 UART: [state] Locking Datavault
18,625,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,627,587 UART: [state] Locking ICCM
18,630,305 UART: [exit] Launching FMC @ 0x40000130
18,638,757 UART:
18,638,989 UART: Running Caliptra FMC ...
18,640,016 UART:
18,640,166 UART: [state] CFI Enabled
18,700,908 UART: [fht] FMC Alias Private Key: 7
20,464,941 UART: [art] Extend RT PCRs Done
20,466,153 UART: [art] Lock RT PCRs Done
20,467,858 UART: [art] Populate DV Done
20,473,233 UART: [fht] FMC Alias Private Key: 7
20,474,876 UART: [art] Derive CDI
20,475,618 UART: [art] Store in in slot 0x4
20,533,722 UART: [art] Derive Key Pair
20,534,759 UART: [art] Store priv key in slot 0x5
22,997,363 UART: [art] Derive Key Pair - Done
23,010,784 UART: [art] Signing Cert with AUTHO
23,012,079 UART: RITY.KEYID = 7
24,723,946 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,445 UART: [art] PUB.X = A100753F86F447CCF212E2F365628A4CB92F0141CDDF8AA4B5B6117888FC4BB9DD51C0E0C001CE01667603C24885283A
24,732,684 UART: [art] PUB.Y = A263D7784E8208A64A6D5FEB86CFE7CBA59DC06D1F11DB758EEB27D5AC4A7D1500D778DBDAE8CCACF9330F9A271E89C1
24,739,970 UART: [art] SIG.R = 7588136697937A3AA697913A2D65FF747E6588CA012D4D298FDFE2E46761A34D44BBE769BA10D391D155A53D4E598116
24,747,383 UART: [art] SIG.S = F5A80529487E2C79CC4B35138298B35C91C9AEABAD71F6E06CC90EB3F93DBC883518CBAD4054C7D67C9B51E367787A54
25,726,494 UART: Caliptra RT
25,727,179 UART: [state] CFI Enabled
25,892,651 UART: [rt] RT listening for mailbox commands...
25,924,399 UART: [rt]cmd =0x44504543, len=96
25,955,492 >>> mbox cmd response data (56 bytes)
25,956,321 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,986,809 UART: [rt]cmd =0x44504543, len=92
30,349,667 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,201,686 >>> mbox cmd response data (12 bytes)
10,203,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,212,509 >>> mbox cmd response: success
14,212,991 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,504,852 UART:
18,505,238 UART: Running Caliptra FMC ...
18,506,487 UART:
18,506,652 UART: [state] CFI Enabled
18,574,970 UART: [fht] FMC Alias Private Key: 7
20,338,664 UART: [art] Extend RT PCRs Done
20,339,880 UART: [art] Lock RT PCRs Done
20,341,559 UART: [art] Populate DV Done
20,347,083 UART: [fht] FMC Alias Private Key: 7
20,348,629 UART: [art] Derive CDI
20,349,393 UART: [art] Store in in slot 0x4
20,407,505 UART: [art] Derive Key Pair
20,408,553 UART: [art] Store priv key in slot 0x5
22,872,007 UART: [art] Derive Key Pair - Done
22,884,800 UART: [art] Signing Cert with AUTHO
22,886,108 UART: RITY.KEYID = 7
24,597,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,599,498 UART: [art] PUB.X = 9A154345CFB1CD522A85AD3C75B414D7F2A7AA3EEFBCE0B67CBE4BB2EA44CE95BB9FE394F51E1108F980FED374848852
24,606,655 UART: [art] PUB.Y = EA07719562037909F6C5073243EAE98C37583D05A2EC075FEA80C181FEC7F3052FD1BCA6DACB3B76667F82522551A0E9
24,613,900 UART: [art] SIG.R = B8F758FAE9EA3B4B4EFD1E878EA4EBC2E55F610CE4922F7643C9885FE9C9E28A2A7B7BEF5790F474A53FF53343E33F17
24,621,307 UART: [art] SIG.S = A3D9138043BC8BA88FE0178BA92C45BBACA12FB859794AAD96D990B7F2D918D3B13E6E75F8363991E9D074EFDC596B43
25,600,684 UART: Caliptra RT
25,601,386 UART: [state] CFI Enabled
25,778,254 UART: [rt] RT listening for mailbox commands...
25,810,478 UART: [rt]cmd =0x44504543, len=92
30,159,858 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,113 writing to cptra_bootfsm_go
3,365,967 ready_for_fw is high
3,366,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,340 >>> mbox cmd response: success
14,063,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,351,534 UART:
18,351,865 UART: Running Caliptra FMC ...
18,352,911 UART:
18,353,062 UART: [state] CFI Enabled
18,419,900 UART: [fht] FMC Alias Private Key: 7
20,183,222 UART: [art] Extend RT PCRs Done
20,184,444 UART: [art] Lock RT PCRs Done
20,185,879 UART: [art] Populate DV Done
20,191,130 UART: [fht] FMC Alias Private Key: 7
20,192,667 UART: [art] Derive CDI
20,193,402 UART: [art] Store in in slot 0x4
20,252,041 UART: [art] Derive Key Pair
20,253,084 UART: [art] Store priv key in slot 0x5
22,715,644 UART: [art] Derive Key Pair - Done
22,728,862 UART: [art] Signing Cert with AUTHO
22,730,354 UART: RITY.KEYID = 7
24,441,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,442,567 UART: [art] PUB.X = 9A154345CFB1CD522A85AD3C75B414D7F2A7AA3EEFBCE0B67CBE4BB2EA44CE95BB9FE394F51E1108F980FED374848852
24,449,821 UART: [art] PUB.Y = EA07719562037909F6C5073243EAE98C37583D05A2EC075FEA80C181FEC7F3052FD1BCA6DACB3B76667F82522551A0E9
24,457,111 UART: [art] SIG.R = B8F758FAE9EA3B4B4EFD1E878EA4EBC2E55F610CE4922F7643C9885FE9C9E28A2A7B7BEF5790F474A53FF53343E33F17
24,464,509 UART: [art] SIG.S = A3D9138043BC8BA88FE0178BA92C45BBACA12FB859794AAD96D990B7F2D918D3B13E6E75F8363991E9D074EFDC596B43
25,443,676 UART: Caliptra RT
25,444,388 UART: [state] CFI Enabled
25,608,578 UART: [rt] RT listening for mailbox commands...
25,640,614 UART: [rt]cmd =0x4d454153, len=108
25,659,167 >>> mbox cmd response data (12 bytes)
25,659,697 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,690,294 UART: [rt]cmd =0x44504543, len=92
30,044,839 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,066 writing to cptra_bootfsm_go
3,371,386 ready_for_fw is high
3,371,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,108 >>> mbox cmd response: success
14,069,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,355,757 UART:
18,356,114 UART: Running Caliptra FMC ...
18,357,160 UART:
18,357,306 UART: [state] CFI Enabled
18,423,863 UART: [fht] FMC Alias Private Key: 7
20,187,295 UART: [art] Extend RT PCRs Done
20,188,518 UART: [art] Lock RT PCRs Done
20,190,070 UART: [art] Populate DV Done
20,195,279 UART: [fht] FMC Alias Private Key: 7
20,196,934 UART: [art] Derive CDI
20,197,775 UART: [art] Store in in slot 0x4
20,256,592 UART: [art] Derive Key Pair
20,257,635 UART: [art] Store priv key in slot 0x5
22,720,716 UART: [art] Derive Key Pair - Done
22,734,088 UART: [art] Signing Cert with AUTHO
22,735,388 UART: RITY.KEYID = 7
24,446,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,448,309 UART: [art] PUB.X = 9A154345CFB1CD522A85AD3C75B414D7F2A7AA3EEFBCE0B67CBE4BB2EA44CE95BB9FE394F51E1108F980FED374848852
24,455,566 UART: [art] PUB.Y = EA07719562037909F6C5073243EAE98C37583D05A2EC075FEA80C181FEC7F3052FD1BCA6DACB3B76667F82522551A0E9
24,462,811 UART: [art] SIG.R = B8F758FAE9EA3B4B4EFD1E878EA4EBC2E55F610CE4922F7643C9885FE9C9E28A2A7B7BEF5790F474A53FF53343E33F17
24,470,211 UART: [art] SIG.S = A3D9138043BC8BA88FE0178BA92C45BBACA12FB859794AAD96D990B7F2D918D3B13E6E75F8363991E9D074EFDC596B43
25,448,987 UART: Caliptra RT
25,449,674 UART: [state] CFI Enabled
25,614,116 UART: [rt] RT listening for mailbox commands...
25,646,227 UART: [rt]cmd =0x44504543, len=96
25,678,095 >>> mbox cmd response data (56 bytes)
25,678,936 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,709,321 UART: [rt]cmd =0x44504543, len=92
30,071,178 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.63s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,960,320 UART: [afmc] --
18,963,958 UART: [cold-reset] --
18,967,326 UART: [state] Locking Datavault
18,970,101 UART: [state] Locking PCR0, PCR1 and PCR31
18,971,796 UART: [state] Locking ICCM
18,974,400 UART: [exit] Launching FMC @ 0x40000130
18,982,783 UART:
18,983,007 UART: Running Caliptra FMC ...
18,984,103 UART:
18,984,249 UART: [state] CFI Enabled
18,992,557 UART: [fht] FMC Alias Private Key: 7
20,749,388 UART: [art] Extend RT PCRs Done
20,750,599 UART: [art] Lock RT PCRs Done
20,752,536 UART: [art] Populate DV Done
20,757,780 UART: [fht] FMC Alias Private Key: 7
20,759,253 UART: [art] Derive CDI
20,760,006 UART: [art] Store in in slot 0x4
20,802,541 UART: [art] Derive Key Pair
20,803,568 UART: [art] Store priv key in slot 0x5
23,230,174 UART: [art] Derive Key Pair - Done
23,243,226 UART: [art] Signing Cert with AUTHO
23,244,524 UART: RITY.KEYID = 7
24,950,033 UART: [art] Erasing AUTHORITY.KEYID = 7
24,951,536 UART: [art] PUB.X = DB2688BCF34AFF422850741EEA08B6EECEB3B7E2E8F4C76CC3FFDD95033286CB913CD761333CE073CA5E834D86E9997F
24,958,820 UART: [art] PUB.Y = 5E344943493D8E862AD84AF1843018F71D78E10291B1E9C69A886C3381CB8E437B26CCC683FC0C143304B3F886661FDE
24,966,106 UART: [art] SIG.R = 2D545562BCE43B58419C37F1C999D1DDDD0926D5999E0C781CDBE2E6C026D5B64E4C6FCDF899EB8DE41AAFC168EF43C6
24,973,483 UART: [art] SIG.S = 63B9C786D0BB0E5E029903A166CA75E606423136712CFC9BA1B8C31C82AA989AAA2506278E09D40482311CDD9705A5E8
25,952,763 UART: Caliptra RT
25,953,464 UART: [state] CFI Enabled
26,082,413 UART: [rt] RT listening for mailbox commands...
26,114,311 UART: [rt]cmd =0x44504543, len=92
30,405,713 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,097 writing to cptra_bootfsm_go
190,214 UART:
190,524 UART: Running Caliptra ROM ...
191,633 UART:
10,093,895 UART: [state] CFI Enabled
10,106,548 UART: [state] LifecycleState = Unprovisioned
10,108,459 UART: [state] DebugLocked = No
10,111,073 UART: [state] WD Timer not started. Device not locked for debugging
10,114,436 UART: [kat] SHA2-256
10,293,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,305,158 UART: [kat] ++
10,305,612 UART: [kat] sha1
10,316,913 UART: [kat] SHA2-256
10,319,992 UART: [kat] SHA2-384
10,326,141 UART: [kat] SHA2-512-ACC
10,329,079 UART: [kat] ECC-384
12,771,955 UART: [kat] HMAC-384Kdf
12,786,027 UART: [kat] LMS
13,315,491 UART: [kat] --
13,319,553 UART: [cold-reset] ++
13,320,842 UART: [fht] FHT @ 0x50003400
13,332,596 UART: [idev] ++
13,333,147 UART: [idev] CDI.KEYID = 6
13,334,169 UART: [idev] SUBJECT.KEYID = 7
13,335,283 UART: [idev] UDS.KEYID = 0
13,336,261 ready_for_fw is high
13,336,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,480,089 UART: [idev] Erasing UDS.KEYID = 0
15,808,598 UART: [idev] Sha1 KeyId Algorithm
15,832,417 UART: [idev] --
15,836,732 UART: [ldev] ++
15,837,295 UART: [ldev] CDI.KEYID = 6
15,838,192 UART: [ldev] SUBJECT.KEYID = 5
15,839,396 UART: [ldev] AUTHORITY.KEYID = 7
15,840,640 UART: [ldev] FE.KEYID = 1
15,850,792 UART: [ldev] Erasing FE.KEYID = 1
18,328,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,046,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,062,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,077,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,093,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,113,291 UART: [ldev] --
20,118,469 UART: [fwproc] Wait for Commands...
20,121,534 UART: [fwproc] Recv command 0x46574c44
20,123,573 UART: [fwproc] Recv'd Img size: 114448 bytes
23,533,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,598,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,667,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,986,472 >>> mbox cmd response: success
23,986,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,991,412 UART: [afmc] ++
23,992,021 UART: [afmc] CDI.KEYID = 6
23,992,906 UART: [afmc] SUBJECT.KEYID = 7
23,994,116 UART: [afmc] AUTHORITY.KEYID = 5
26,495,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,217,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,219,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,235,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,251,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,267,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,288,512 UART: [afmc] --
28,292,744 UART: [cold-reset] --
28,295,635 UART: [state] Locking Datavault
28,298,878 UART: [state] Locking PCR0, PCR1 and PCR31
28,300,528 UART: [state] Locking ICCM
28,303,159 UART: [exit] Launching FMC @ 0x40000130
28,311,566 UART:
28,311,797 UART: Running Caliptra FMC ...
28,312,891 UART:
28,313,038 UART: [state] CFI Enabled
28,321,348 UART: [fht] FMC Alias Private Key: 7
30,078,573 UART: [art] Extend RT PCRs Done
30,079,796 UART: [art] Lock RT PCRs Done
30,081,739 UART: [art] Populate DV Done
30,087,420 UART: [fht] FMC Alias Private Key: 7
30,088,953 UART: [art] Derive CDI
30,089,763 UART: [art] Store in in slot 0x4
30,132,136 UART: [art] Derive Key Pair
30,133,172 UART: [art] Store priv key in slot 0x5
32,559,825 UART: [art] Derive Key Pair - Done
32,572,829 UART: [art] Signing Cert with AUTHO
32,574,135 UART: RITY.KEYID = 7
34,279,653 UART: [art] Erasing AUTHORITY.KEYID = 7
34,281,152 UART: [art] PUB.X = DB2688BCF34AFF422850741EEA08B6EECEB3B7E2E8F4C76CC3FFDD95033286CB913CD761333CE073CA5E834D86E9997F
34,288,385 UART: [art] PUB.Y = 5E344943493D8E862AD84AF1843018F71D78E10291B1E9C69A886C3381CB8E437B26CCC683FC0C143304B3F886661FDE
34,295,662 UART: [art] SIG.R = 2D545562BCE43B58419C37F1C999D1DDDD0926D5999E0C781CDBE2E6C026D5B64E4C6FCDF899EB8DE41AAFC168EF43C6
34,303,093 UART: [art] SIG.S = 63B9C786D0BB0E5E029903A166CA75E606423136712CFC9BA1B8C31C82AA989AAA2506278E09D40482311CDD9705A5E8
35,282,035 UART: Caliptra RT
35,282,744 UART: [state] CFI Enabled
35,399,820 UART: [rt] RT listening for mailbox commands...
35,431,774 UART: [rt]cmd =0x4d454153, len=108
35,449,675 >>> mbox cmd response data (12 bytes)
35,450,233 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,480,770 UART: [rt]cmd =0x44504543, len=92
39,771,934 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,091 writing to cptra_bootfsm_go
190,171 UART:
190,475 UART: Running Caliptra ROM ...
191,585 UART:
10,415,019 UART: [state] CFI Enabled
10,427,874 UART: [state] LifecycleState = Unprovisioned
10,429,722 UART: [state] DebugLocked = No
10,432,033 UART: [state] WD Timer not started. Device not locked for debugging
10,436,525 UART: [kat] SHA2-256
10,615,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,627,215 UART: [kat] ++
10,627,665 UART: [kat] sha1
10,638,819 UART: [kat] SHA2-256
10,641,837 UART: [kat] SHA2-384
10,647,334 UART: [kat] SHA2-512-ACC
10,650,348 UART: [kat] ECC-384
13,089,627 UART: [kat] HMAC-384Kdf
13,102,362 UART: [kat] LMS
13,631,845 UART: [kat] --
13,635,993 UART: [cold-reset] ++
13,636,931 UART: [fht] FHT @ 0x50003400
13,647,685 UART: [idev] ++
13,648,233 UART: [idev] CDI.KEYID = 6
13,649,177 UART: [idev] SUBJECT.KEYID = 7
13,650,412 UART: [idev] UDS.KEYID = 0
13,651,302 ready_for_fw is high
13,651,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,795,141 UART: [idev] Erasing UDS.KEYID = 0
16,121,425 UART: [idev] Sha1 KeyId Algorithm
16,143,880 UART: [idev] --
16,149,360 UART: [ldev] ++
16,149,935 UART: [ldev] CDI.KEYID = 6
16,150,811 UART: [ldev] SUBJECT.KEYID = 5
16,152,067 UART: [ldev] AUTHORITY.KEYID = 7
16,153,312 UART: [ldev] FE.KEYID = 1
16,162,983 UART: [ldev] Erasing FE.KEYID = 1
18,638,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,358,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,374,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,389,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,405,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,425,755 UART: [ldev] --
20,431,121 UART: [fwproc] Wait for Commands...
20,432,674 UART: [fwproc] Recv command 0x46574c44
20,434,767 UART: [fwproc] Recv'd Img size: 114448 bytes
23,843,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,913,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,982,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
24,301,690 >>> mbox cmd response: success
24,302,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,306,672 UART: [afmc] ++
24,307,247 UART: [afmc] CDI.KEYID = 6
24,308,150 UART: [afmc] SUBJECT.KEYID = 7
24,309,359 UART: [afmc] AUTHORITY.KEYID = 5
26,813,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,534,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,536,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,552,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,568,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,584,362 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,607,077 UART: [afmc] --
28,610,983 UART: [cold-reset] --
28,613,167 UART: [state] Locking Datavault
28,617,703 UART: [state] Locking PCR0, PCR1 and PCR31
28,619,410 UART: [state] Locking ICCM
28,621,231 UART: [exit] Launching FMC @ 0x40000130
28,629,644 UART:
28,629,884 UART: Running Caliptra FMC ...
28,630,981 UART:
28,631,131 UART: [state] CFI Enabled
28,639,008 UART: [fht] FMC Alias Private Key: 7
30,395,612 UART: [art] Extend RT PCRs Done
30,396,830 UART: [art] Lock RT PCRs Done
30,398,448 UART: [art] Populate DV Done
30,403,909 UART: [fht] FMC Alias Private Key: 7
30,405,604 UART: [art] Derive CDI
30,406,411 UART: [art] Store in in slot 0x4
30,449,166 UART: [art] Derive Key Pair
30,450,158 UART: [art] Store priv key in slot 0x5
32,876,540 UART: [art] Derive Key Pair - Done
32,889,860 UART: [art] Signing Cert with AUTHO
32,891,163 UART: RITY.KEYID = 7
34,596,806 UART: [art] Erasing AUTHORITY.KEYID = 7
34,598,309 UART: [art] PUB.X = DB2688BCF34AFF422850741EEA08B6EECEB3B7E2E8F4C76CC3FFDD95033286CB913CD761333CE073CA5E834D86E9997F
34,605,600 UART: [art] PUB.Y = 5E344943493D8E862AD84AF1843018F71D78E10291B1E9C69A886C3381CB8E437B26CCC683FC0C143304B3F886661FDE
34,612,877 UART: [art] SIG.R = 2D545562BCE43B58419C37F1C999D1DDDD0926D5999E0C781CDBE2E6C026D5B64E4C6FCDF899EB8DE41AAFC168EF43C6
34,620,285 UART: [art] SIG.S = 63B9C786D0BB0E5E029903A166CA75E606423136712CFC9BA1B8C31C82AA989AAA2506278E09D40482311CDD9705A5E8
35,598,725 UART: Caliptra RT
35,599,408 UART: [state] CFI Enabled
35,716,708 UART: [rt] RT listening for mailbox commands...
35,748,799 UART: [rt]cmd =0x44504543, len=96
35,780,734 >>> mbox cmd response data (56 bytes)
35,781,545 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,812,069 UART: [rt]cmd =0x44504543, len=92
40,103,589 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,411,521 >>> mbox cmd response data (12 bytes)
10,412,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,427,124 >>> mbox cmd response: success
14,427,615 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,679,652 UART:
18,680,045 UART: Running Caliptra FMC ...
18,681,202 UART:
18,681,370 UART: [state] CFI Enabled
18,689,352 UART: [fht] FMC Alias Private Key: 7
20,446,215 UART: [art] Extend RT PCRs Done
20,447,437 UART: [art] Lock RT PCRs Done
20,449,118 UART: [art] Populate DV Done
20,454,591 UART: [fht] FMC Alias Private Key: 7
20,456,121 UART: [art] Derive CDI
20,456,929 UART: [art] Store in in slot 0x4
20,499,738 UART: [art] Derive Key Pair
20,500,731 UART: [art] Store priv key in slot 0x5
22,927,893 UART: [art] Derive Key Pair - Done
22,940,739 UART: [art] Signing Cert with AUTHO
22,942,035 UART: RITY.KEYID = 7
24,648,007 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,520 UART: [art] PUB.X = C712581D9E00168F0B43BD91A12DF08928E0B19E7E3EFA48B91EACD5463398913204CCE35FB64DF9F60082AAC7431758
24,656,760 UART: [art] PUB.Y = 033B3BEC624A010055E0E86558BBCA126AFDD7E8E55BDBD328C0410DD247EA53063303225C320433EEB4C5122AF0B582
24,664,001 UART: [art] SIG.R = C727161B6F928280E0781F17A6D898E9D14B01A9C40D5025113FA8996F56DB46F23176A4966F63A5AC3E3EDB8B420573
24,671,497 UART: [art] SIG.S = 2862B372E6ADF970C679201E06F68CF7B6EC851B43262203965C6DAB803D4AC2C10CA78A77A66CB74A3929202C39F6EE
25,649,931 UART: Caliptra RT
25,650,632 UART: [state] CFI Enabled
25,780,434 UART: [rt] RT listening for mailbox commands...
25,812,704 UART: [rt]cmd =0x44504543, len=92
30,103,020 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,115 writing to cptra_bootfsm_go
13,481,235 ready_for_fw is high
13,481,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,051,485 >>> mbox cmd response: success
24,052,171 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,303,519 UART:
28,303,881 UART: Running Caliptra FMC ...
28,304,921 UART:
28,305,089 UART: [state] CFI Enabled
28,312,818 UART: [fht] FMC Alias Private Key: 7
30,070,483 UART: [art] Extend RT PCRs Done
30,071,827 UART: [art] Lock RT PCRs Done
30,073,399 UART: [art] Populate DV Done
30,078,904 UART: [fht] FMC Alias Private Key: 7
30,080,589 UART: [art] Derive CDI
30,081,350 UART: [art] Store in in slot 0x4
30,124,107 UART: [art] Derive Key Pair
30,125,103 UART: [art] Store priv key in slot 0x5
32,551,641 UART: [art] Derive Key Pair - Done
32,564,689 UART: [art] Signing Cert with AUTHO
32,565,983 UART: RITY.KEYID = 7
34,271,300 UART: [art] Erasing AUTHORITY.KEYID = 7
34,272,783 UART: [art] PUB.X = C712581D9E00168F0B43BD91A12DF08928E0B19E7E3EFA48B91EACD5463398913204CCE35FB64DF9F60082AAC7431758
34,280,014 UART: [art] PUB.Y = 033B3BEC624A010055E0E86558BBCA126AFDD7E8E55BDBD328C0410DD247EA53063303225C320433EEB4C5122AF0B582
34,287,260 UART: [art] SIG.R = C727161B6F928280E0781F17A6D898E9D14B01A9C40D5025113FA8996F56DB46F23176A4966F63A5AC3E3EDB8B420573
34,294,648 UART: [art] SIG.S = 2862B372E6ADF970C679201E06F68CF7B6EC851B43262203965C6DAB803D4AC2C10CA78A77A66CB74A3929202C39F6EE
35,273,794 UART: Caliptra RT
35,274,505 UART: [state] CFI Enabled
35,391,838 UART: [rt] RT listening for mailbox commands...
35,423,730 UART: [rt]cmd =0x4d454153, len=108
35,442,092 >>> mbox cmd response data (12 bytes)
35,442,663 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,473,138 UART: [rt]cmd =0x44504543, len=92
39,764,702 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,089 writing to cptra_bootfsm_go
13,808,981 ready_for_fw is high
13,809,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,393,063 >>> mbox cmd response: success
24,393,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,647,484 UART:
28,647,824 UART: Running Caliptra FMC ...
28,648,863 UART:
28,649,011 UART: [state] CFI Enabled
28,657,030 UART: [fht] FMC Alias Private Key: 7
30,413,805 UART: [art] Extend RT PCRs Done
30,415,081 UART: [art] Lock RT PCRs Done
30,416,898 UART: [art] Populate DV Done
30,422,257 UART: [fht] FMC Alias Private Key: 7
30,423,787 UART: [art] Derive CDI
30,424,513 UART: [art] Store in in slot 0x4
30,467,432 UART: [art] Derive Key Pair
30,468,443 UART: [art] Store priv key in slot 0x5
32,894,684 UART: [art] Derive Key Pair - Done
32,907,457 UART: [art] Signing Cert with AUTHO
32,908,787 UART: RITY.KEYID = 7
34,614,301 UART: [art] Erasing AUTHORITY.KEYID = 7
34,615,798 UART: [art] PUB.X = C712581D9E00168F0B43BD91A12DF08928E0B19E7E3EFA48B91EACD5463398913204CCE35FB64DF9F60082AAC7431758
34,623,043 UART: [art] PUB.Y = 033B3BEC624A010055E0E86558BBCA126AFDD7E8E55BDBD328C0410DD247EA53063303225C320433EEB4C5122AF0B582
34,630,271 UART: [art] SIG.R = C727161B6F928280E0781F17A6D898E9D14B01A9C40D5025113FA8996F56DB46F23176A4966F63A5AC3E3EDB8B420573
34,637,601 UART: [art] SIG.S = 2862B372E6ADF970C679201E06F68CF7B6EC851B43262203965C6DAB803D4AC2C10CA78A77A66CB74A3929202C39F6EE
35,616,871 UART: Caliptra RT
35,617,560 UART: [state] CFI Enabled
35,734,363 UART: [rt] RT listening for mailbox commands...
35,766,583 UART: [rt]cmd =0x44504543, len=96
35,798,436 >>> mbox cmd response data (56 bytes)
35,799,274 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,829,809 UART: [rt]cmd =0x44504543, len=92
40,120,531 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.62s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,096,438 UART: [afmc] --
19,100,141 UART: [cold-reset] --
19,102,835 UART: [state] Locking Datavault
19,109,069 UART: [state] Locking PCR0, PCR1 and PCR31
19,111,212 UART: [state] Locking ICCM
19,113,904 UART: [exit] Launching FMC @ 0x40000130
19,122,632 UART:
19,122,865 UART: Running Caliptra FMC ...
19,123,966 UART:
19,124,123 UART: [state] CFI Enabled
19,180,465 UART: [fht] FMC Alias Private Key: 7
20,945,261 UART: [art] Extend RT PCRs Done
20,946,475 UART: [art] Lock RT PCRs Done
20,948,284 UART: [art] Populate DV Done
20,953,591 UART: [fht] FMC Alias Private Key: 7
20,955,292 UART: [art] Derive CDI
20,956,028 UART: [art] Store in in slot 0x4
21,013,056 UART: [art] Derive Key Pair
21,014,117 UART: [art] Store priv key in slot 0x5
23,476,606 UART: [art] Derive Key Pair - Done
23,489,387 UART: [art] Signing Cert with AUTHO
23,490,692 UART: RITY.KEYID = 7
25,202,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,774 UART: [art] PUB.X = 3EEF61CC3E5613DA121784D6141A2E1DA62700E0464241B52143F3588B5AFFE3533244BDBB97A560B439A7948BA8E70D
25,211,020 UART: [art] PUB.Y = D8FBFAE1CF2B9367A7061AA20A3EF0445D3F20E31D4CD8F1065A5074650110A80700875DDE038DDE9EEBAFF8512A1BF7
25,218,242 UART: [art] SIG.R = A5A3F359DF49597379D7CE61EBABF35D3BBFBD526DEC63D7E53CA15E273239417C3715E8B56430E48B88397449A36292
25,225,637 UART: [art] SIG.S = 368A73FED46FCBD61FD6568AFE67169DD43751D845DDD9CF50CDB6557E96981999494EEED6D94B6286AE5FF48B019F35
26,204,859 UART: Caliptra RT
26,205,549 UART: [state] CFI Enabled
26,380,856 UART: [rt] RT listening for mailbox commands...
26,412,867 UART: [rt]cmd =0x44504543, len=92
30,762,268 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,118 writing to cptra_bootfsm_go
190,265 UART:
190,561 UART: Running Caliptra ROM ...
191,673 UART:
191,827 UART: [state] CFI Enabled
249,080 UART: [state] LifecycleState = Unprovisioned
251,469 UART: [state] DebugLocked = No
254,337 UART: [state] WD Timer not started. Device not locked for debugging
258,111 UART: [kat] SHA2-256
447,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,561 UART: [kat] ++
459,195 UART: [kat] sha1
469,089 UART: [kat] SHA2-256
472,097 UART: [kat] SHA2-384
477,028 UART: [kat] SHA2-512-ACC
479,625 UART: [kat] ECC-384
2,935,047 UART: [kat] HMAC-384Kdf
2,956,961 UART: [kat] LMS
3,488,775 UART: [kat] --
3,492,865 UART: [cold-reset] ++
3,494,304 UART: [fht] FHT @ 0x50003400
3,504,496 UART: [idev] ++
3,505,204 UART: [idev] CDI.KEYID = 6
3,506,235 UART: [idev] SUBJECT.KEYID = 7
3,507,339 UART: [idev] UDS.KEYID = 0
3,508,338 ready_for_fw is high
3,508,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,652,411 UART: [idev] Erasing UDS.KEYID = 0
6,015,762 UART: [idev] Sha1 KeyId Algorithm
6,038,245 UART: [idev] --
6,042,598 UART: [ldev] ++
6,043,286 UART: [ldev] CDI.KEYID = 6
6,044,200 UART: [ldev] SUBJECT.KEYID = 5
6,045,436 UART: [ldev] AUTHORITY.KEYID = 7
6,046,627 UART: [ldev] FE.KEYID = 1
6,085,400 UART: [ldev] Erasing FE.KEYID = 1
8,593,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,294 UART: [ldev] --
10,399,945 UART: [fwproc] Wait for Commands...
10,402,745 UART: [fwproc] Recv command 0x46574c44
10,405,007 UART: [fwproc] Recv'd Img size: 114448 bytes
13,855,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,592,512 >>> mbox cmd response: success
14,592,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,595,985 UART: [afmc] ++
14,596,677 UART: [afmc] CDI.KEYID = 6
14,597,921 UART: [afmc] SUBJECT.KEYID = 7
14,599,353 UART: [afmc] AUTHORITY.KEYID = 5
17,136,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,742 UART: [afmc] --
18,951,685 UART: [cold-reset] --
18,955,232 UART: [state] Locking Datavault
18,960,379 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,519 UART: [state] Locking ICCM
18,964,366 UART: [exit] Launching FMC @ 0x40000130
18,972,989 UART:
18,973,231 UART: Running Caliptra FMC ...
18,974,330 UART:
18,974,487 UART: [state] CFI Enabled
19,036,429 UART: [fht] FMC Alias Private Key: 7
20,800,639 UART: [art] Extend RT PCRs Done
20,801,848 UART: [art] Lock RT PCRs Done
20,803,447 UART: [art] Populate DV Done
20,808,914 UART: [fht] FMC Alias Private Key: 7
20,810,557 UART: [art] Derive CDI
20,811,294 UART: [art] Store in in slot 0x4
20,868,805 UART: [art] Derive Key Pair
20,869,841 UART: [art] Store priv key in slot 0x5
23,332,699 UART: [art] Derive Key Pair - Done
23,345,902 UART: [art] Signing Cert with AUTHO
23,347,219 UART: RITY.KEYID = 7
25,059,400 UART: [art] Erasing AUTHORITY.KEYID = 7
25,060,904 UART: [art] PUB.X = 3EEF61CC3E5613DA121784D6141A2E1DA62700E0464241B52143F3588B5AFFE3533244BDBB97A560B439A7948BA8E70D
25,068,173 UART: [art] PUB.Y = D8FBFAE1CF2B9367A7061AA20A3EF0445D3F20E31D4CD8F1065A5074650110A80700875DDE038DDE9EEBAFF8512A1BF7
25,075,418 UART: [art] SIG.R = A5A3F359DF49597379D7CE61EBABF35D3BBFBD526DEC63D7E53CA15E273239417C3715E8B56430E48B88397449A36292
25,082,757 UART: [art] SIG.S = 368A73FED46FCBD61FD6568AFE67169DD43751D845DDD9CF50CDB6557E96981999494EEED6D94B6286AE5FF48B019F35
26,061,787 UART: Caliptra RT
26,062,473 UART: [state] CFI Enabled
26,226,652 UART: [rt] RT listening for mailbox commands...
26,258,980 UART: [rt]cmd =0x4d454153, len=108
26,277,365 >>> mbox cmd response data (12 bytes)
26,277,905 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,308,497 UART: [rt]cmd =0x44504543, len=92
30,662,925 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,039 writing to cptra_bootfsm_go
190,129 UART:
190,420 UART: Running Caliptra ROM ...
191,478 UART:
191,628 UART: [state] CFI Enabled
253,571 UART: [state] LifecycleState = Unprovisioned
255,923 UART: [state] DebugLocked = No
257,743 UART: [state] WD Timer not started. Device not locked for debugging
262,163 UART: [kat] SHA2-256
452,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
462,877 UART: [kat] ++
463,354 UART: [kat] sha1
473,594 UART: [kat] SHA2-256
476,605 UART: [kat] SHA2-384
482,669 UART: [kat] SHA2-512-ACC
485,253 UART: [kat] ECC-384
2,937,196 UART: [kat] HMAC-384Kdf
2,960,458 UART: [kat] LMS
3,492,213 UART: [kat] --
3,496,075 UART: [cold-reset] ++
3,497,369 UART: [fht] FHT @ 0x50003400
3,508,560 UART: [idev] ++
3,509,275 UART: [idev] CDI.KEYID = 6
3,510,186 UART: [idev] SUBJECT.KEYID = 7
3,511,432 UART: [idev] UDS.KEYID = 0
3,512,359 ready_for_fw is high
3,512,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,656,410 UART: [idev] Erasing UDS.KEYID = 0
6,015,876 UART: [idev] Sha1 KeyId Algorithm
6,038,792 UART: [idev] --
6,045,000 UART: [ldev] ++
6,045,693 UART: [ldev] CDI.KEYID = 6
6,046,607 UART: [ldev] SUBJECT.KEYID = 5
6,047,789 UART: [ldev] AUTHORITY.KEYID = 7
6,049,028 UART: [ldev] FE.KEYID = 1
6,087,679 UART: [ldev] Erasing FE.KEYID = 1
8,594,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,472 UART: [ldev] --
10,402,845 UART: [fwproc] Wait for Commands...
10,405,763 UART: [fwproc] Recv command 0x46574c44
10,408,025 UART: [fwproc] Recv'd Img size: 114448 bytes
13,848,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,594,272 >>> mbox cmd response: success
14,594,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,598,481 UART: [afmc] ++
14,599,186 UART: [afmc] CDI.KEYID = 6
14,600,375 UART: [afmc] SUBJECT.KEYID = 7
14,601,804 UART: [afmc] AUTHORITY.KEYID = 5
17,137,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,861,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,863,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,878,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,893,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,908,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,931,751 UART: [afmc] --
18,934,407 UART: [cold-reset] --
18,939,358 UART: [state] Locking Datavault
18,943,214 UART: [state] Locking PCR0, PCR1 and PCR31
18,945,408 UART: [state] Locking ICCM
18,948,068 UART: [exit] Launching FMC @ 0x40000130
18,956,743 UART:
18,956,976 UART: Running Caliptra FMC ...
18,958,077 UART:
18,958,238 UART: [state] CFI Enabled
19,017,710 UART: [fht] FMC Alias Private Key: 7
20,780,974 UART: [art] Extend RT PCRs Done
20,782,200 UART: [art] Lock RT PCRs Done
20,783,721 UART: [art] Populate DV Done
20,789,188 UART: [fht] FMC Alias Private Key: 7
20,790,784 UART: [art] Derive CDI
20,791,601 UART: [art] Store in in slot 0x4
20,850,998 UART: [art] Derive Key Pair
20,852,037 UART: [art] Store priv key in slot 0x5
23,314,402 UART: [art] Derive Key Pair - Done
23,327,348 UART: [art] Signing Cert with AUTHO
23,328,677 UART: RITY.KEYID = 7
25,040,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,042,465 UART: [art] PUB.X = 3EEF61CC3E5613DA121784D6141A2E1DA62700E0464241B52143F3588B5AFFE3533244BDBB97A560B439A7948BA8E70D
25,049,703 UART: [art] PUB.Y = D8FBFAE1CF2B9367A7061AA20A3EF0445D3F20E31D4CD8F1065A5074650110A80700875DDE038DDE9EEBAFF8512A1BF7
25,056,984 UART: [art] SIG.R = A5A3F359DF49597379D7CE61EBABF35D3BBFBD526DEC63D7E53CA15E273239417C3715E8B56430E48B88397449A36292
25,064,377 UART: [art] SIG.S = 368A73FED46FCBD61FD6568AFE67169DD43751D845DDD9CF50CDB6557E96981999494EEED6D94B6286AE5FF48B019F35
26,042,876 UART: Caliptra RT
26,043,592 UART: [state] CFI Enabled
26,208,379 UART: [rt] RT listening for mailbox commands...
26,240,386 UART: [rt]cmd =0x44504543, len=96
26,271,677 >>> mbox cmd response data (56 bytes)
26,272,457 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,302,739 UART: [rt]cmd =0x44504543, len=92
30,645,530 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,254,302 >>> mbox cmd response data (12 bytes)
10,255,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,894,960 >>> mbox cmd response: success
14,895,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,189,102 UART:
19,189,497 UART: Running Caliptra FMC ...
19,190,688 UART:
19,190,849 UART: [state] CFI Enabled
19,258,148 UART: [fht] FMC Alias Private Key: 7
21,022,450 UART: [art] Extend RT PCRs Done
21,023,668 UART: [art] Lock RT PCRs Done
21,025,456 UART: [art] Populate DV Done
21,030,770 UART: [fht] FMC Alias Private Key: 7
21,032,366 UART: [art] Derive CDI
21,033,184 UART: [art] Store in in slot 0x4
21,091,092 UART: [art] Derive Key Pair
21,092,140 UART: [art] Store priv key in slot 0x5
23,555,135 UART: [art] Derive Key Pair - Done
23,567,910 UART: [art] Signing Cert with AUTHO
23,569,226 UART: RITY.KEYID = 7
25,280,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,039 UART: [art] PUB.X = 9AD1823A7B2ED12B4987DE6AAC529FF88E50975DA77EAD808F8E1BCF968174F91CF9C7D6EFEAF54C098E706118F9F988
25,289,283 UART: [art] PUB.Y = B45C329ACB3D38A7359C37428308E71B9E81232A930DC8BF7DAA2FC8CE0BE2242AAD8D7E3571E471981C9408BC3F90A9
25,296,577 UART: [art] SIG.R = 0531CB73681B468874D8828594E5142BEE1DC8FD8A0DF8951F74A08545C70C550D9C7CBDE125710EF5E66101561B3257
25,303,913 UART: [art] SIG.S = 99B0C111914BE23AFAD60481B0C7B99BCE056EE7B313B37FE4CD41C155C44E27C2D33FEDFC9EC2993C721363EEF5B98F
26,282,788 UART: Caliptra RT
26,283,481 UART: [state] CFI Enabled
26,466,719 UART: [rt] RT listening for mailbox commands...
26,498,942 UART: [rt]cmd =0x44504543, len=92
30,849,351 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,105 writing to cptra_bootfsm_go
3,425,347 ready_for_fw is high
3,425,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,242 >>> mbox cmd response: success
14,724,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,009,505 UART:
19,009,844 UART: Running Caliptra FMC ...
19,010,924 UART:
19,011,089 UART: [state] CFI Enabled
19,081,159 UART: [fht] FMC Alias Private Key: 7
20,844,785 UART: [art] Extend RT PCRs Done
20,846,258 UART: [art] Lock RT PCRs Done
20,847,587 UART: [art] Populate DV Done
20,853,130 UART: [fht] FMC Alias Private Key: 7
20,854,662 UART: [art] Derive CDI
20,855,475 UART: [art] Store in in slot 0x4
20,914,424 UART: [art] Derive Key Pair
20,915,464 UART: [art] Store priv key in slot 0x5
23,378,638 UART: [art] Derive Key Pair - Done
23,391,432 UART: [art] Signing Cert with AUTHO
23,392,797 UART: RITY.KEYID = 7
25,104,271 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,766 UART: [art] PUB.X = 9AD1823A7B2ED12B4987DE6AAC529FF88E50975DA77EAD808F8E1BCF968174F91CF9C7D6EFEAF54C098E706118F9F988
25,113,065 UART: [art] PUB.Y = B45C329ACB3D38A7359C37428308E71B9E81232A930DC8BF7DAA2FC8CE0BE2242AAD8D7E3571E471981C9408BC3F90A9
25,120,363 UART: [art] SIG.R = 0531CB73681B468874D8828594E5142BEE1DC8FD8A0DF8951F74A08545C70C550D9C7CBDE125710EF5E66101561B3257
25,127,703 UART: [art] SIG.S = 99B0C111914BE23AFAD60481B0C7B99BCE056EE7B313B37FE4CD41C155C44E27C2D33FEDFC9EC2993C721363EEF5B98F
26,105,780 UART: Caliptra RT
26,106,489 UART: [state] CFI Enabled
26,271,550 UART: [rt] RT listening for mailbox commands...
26,303,776 UART: [rt]cmd =0x4d454153, len=108
26,322,277 >>> mbox cmd response data (12 bytes)
26,322,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,353,596 UART: [rt]cmd =0x44504543, len=92
30,709,475 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,223 writing to cptra_bootfsm_go
3,428,248 ready_for_fw is high
3,429,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,994 >>> mbox cmd response: success
14,739,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,028,971 UART:
19,029,713 UART: Running Caliptra FMC ...
19,030,770 UART:
19,030,928 UART: [state] CFI Enabled
19,097,613 UART: [fht] FMC Alias Private Key: 7
20,861,117 UART: [art] Extend RT PCRs Done
20,862,343 UART: [art] Lock RT PCRs Done
20,864,098 UART: [art] Populate DV Done
20,869,309 UART: [fht] FMC Alias Private Key: 7
20,870,958 UART: [art] Derive CDI
20,871,771 UART: [art] Store in in slot 0x4
20,929,879 UART: [art] Derive Key Pair
20,930,937 UART: [art] Store priv key in slot 0x5
23,394,145 UART: [art] Derive Key Pair - Done
23,406,824 UART: [art] Signing Cert with AUTHO
23,408,136 UART: RITY.KEYID = 7
25,119,704 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,204 UART: [art] PUB.X = 9AD1823A7B2ED12B4987DE6AAC529FF88E50975DA77EAD808F8E1BCF968174F91CF9C7D6EFEAF54C098E706118F9F988
25,128,449 UART: [art] PUB.Y = B45C329ACB3D38A7359C37428308E71B9E81232A930DC8BF7DAA2FC8CE0BE2242AAD8D7E3571E471981C9408BC3F90A9
25,135,734 UART: [art] SIG.R = 0531CB73681B468874D8828594E5142BEE1DC8FD8A0DF8951F74A08545C70C550D9C7CBDE125710EF5E66101561B3257
25,143,084 UART: [art] SIG.S = 99B0C111914BE23AFAD60481B0C7B99BCE056EE7B313B37FE4CD41C155C44E27C2D33FEDFC9EC2993C721363EEF5B98F
26,122,145 UART: Caliptra RT
26,122,852 UART: [state] CFI Enabled
26,287,732 UART: [rt] RT listening for mailbox commands...
26,319,472 UART: [rt]cmd =0x44504543, len=96
26,351,057 >>> mbox cmd response data (56 bytes)
26,352,074 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,382,499 UART: [rt]cmd =0x44504543, len=92
30,745,045 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.73s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,299,374 UART: [afmc] --
19,302,126 UART: [cold-reset] --
19,305,292 UART: [state] Locking Datavault
19,313,454 UART: [state] Locking PCR0, PCR1 and PCR31
19,315,599 UART: [state] Locking ICCM
19,318,180 UART: [exit] Launching FMC @ 0x40000130
19,326,853 UART:
19,327,083 UART: Running Caliptra FMC ...
19,328,176 UART:
19,328,330 UART: [state] CFI Enabled
19,336,696 UART: [fht] FMC Alias Private Key: 7
21,093,233 UART: [art] Extend RT PCRs Done
21,094,442 UART: [art] Lock RT PCRs Done
21,096,222 UART: [art] Populate DV Done
21,101,685 UART: [fht] FMC Alias Private Key: 7
21,103,165 UART: [art] Derive CDI
21,104,074 UART: [art] Store in in slot 0x4
21,146,618 UART: [art] Derive Key Pair
21,147,650 UART: [art] Store priv key in slot 0x5
23,574,353 UART: [art] Derive Key Pair - Done
23,587,482 UART: [art] Signing Cert with AUTHO
23,588,783 UART: RITY.KEYID = 7
25,294,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,295,522 UART: [art] PUB.X = 4B4E844A3AAE12363AB8F5675CDF5DD1A296ACD1251686271E1C3374988B10628A8D93E4A23A15D4E924F378753F2FCE
25,302,807 UART: [art] PUB.Y = 9060E67ADAA94E3FE8F081564F151579E6BF4CA9089A3A4B502A7EA660685A5E5BAA0FA7278030ADFFA76B7DF1BC16D4
25,310,078 UART: [art] SIG.R = F89F0FA22D3C069E0F62F021458D62DF2CA78F7032E7CF1E91723EB892A68561F2F5E4B374C8BCAD590B550BA5330510
25,317,469 UART: [art] SIG.S = F9753112ACECB903F24B01B15A63CC728F8EABB8724175212B5FE9A871610F78168233114F050949DECB47EE30D73DB1
26,296,572 UART: Caliptra RT
26,297,283 UART: [state] CFI Enabled
26,425,041 UART: [rt] RT listening for mailbox commands...
26,456,945 UART: [rt]cmd =0x44504543, len=92
30,747,520 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,116 writing to cptra_bootfsm_go
190,241 UART:
190,537 UART: Running Caliptra ROM ...
191,667 UART:
9,749,707 UART: [state] CFI Enabled
9,762,073 UART: [state] LifecycleState = Unprovisioned
9,764,428 UART: [state] DebugLocked = No
9,766,887 UART: [state] WD Timer not started. Device not locked for debugging
9,771,241 UART: [kat] SHA2-256
9,961,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,971,950 UART: [kat] ++
9,972,554 UART: [kat] sha1
9,984,720 UART: [kat] SHA2-256
9,987,725 UART: [kat] SHA2-384
9,994,425 UART: [kat] SHA2-512-ACC
9,997,021 UART: [kat] ECC-384
12,436,137 UART: [kat] HMAC-384Kdf
12,450,354 UART: [kat] LMS
12,982,227 UART: [kat] --
12,988,223 UART: [cold-reset] ++
12,989,865 UART: [fht] FHT @ 0x50003400
13,002,540 UART: [idev] ++
13,003,250 UART: [idev] CDI.KEYID = 6
13,004,276 UART: [idev] SUBJECT.KEYID = 7
13,005,375 UART: [idev] UDS.KEYID = 0
13,006,296 ready_for_fw is high
13,006,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,150,134 UART: [idev] Erasing UDS.KEYID = 0
15,479,458 UART: [idev] Sha1 KeyId Algorithm
15,501,615 UART: [idev] --
15,507,817 UART: [ldev] ++
15,508,487 UART: [ldev] CDI.KEYID = 6
15,509,380 UART: [ldev] SUBJECT.KEYID = 5
15,510,582 UART: [ldev] AUTHORITY.KEYID = 7
15,511,806 UART: [ldev] FE.KEYID = 1
15,521,977 UART: [ldev] Erasing FE.KEYID = 1
17,999,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,718,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,733,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,748,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,764,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,783,686 UART: [ldev] --
19,788,661 UART: [fwproc] Wait for Commands...
19,791,192 UART: [fwproc] Recv command 0x46574c44
19,793,453 UART: [fwproc] Recv'd Img size: 114448 bytes
23,242,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,321,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,437,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,980,998 >>> mbox cmd response: success
23,981,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,984,721 UART: [afmc] ++
23,985,436 UART: [afmc] CDI.KEYID = 6
23,986,626 UART: [afmc] SUBJECT.KEYID = 7
23,988,114 UART: [afmc] AUTHORITY.KEYID = 5
26,491,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,212,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,214,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,229,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,244,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,259,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,283,623 UART: [afmc] --
28,287,492 UART: [cold-reset] --
28,291,727 UART: [state] Locking Datavault
28,296,159 UART: [state] Locking PCR0, PCR1 and PCR31
28,298,345 UART: [state] Locking ICCM
28,301,115 UART: [exit] Launching FMC @ 0x40000130
28,309,786 UART:
28,310,038 UART: Running Caliptra FMC ...
28,311,140 UART:
28,311,293 UART: [state] CFI Enabled
28,319,010 UART: [fht] FMC Alias Private Key: 7
30,076,089 UART: [art] Extend RT PCRs Done
30,077,313 UART: [art] Lock RT PCRs Done
30,079,117 UART: [art] Populate DV Done
30,084,305 UART: [fht] FMC Alias Private Key: 7
30,085,849 UART: [art] Derive CDI
30,086,577 UART: [art] Store in in slot 0x4
30,128,902 UART: [art] Derive Key Pair
30,129,973 UART: [art] Store priv key in slot 0x5
32,556,185 UART: [art] Derive Key Pair - Done
32,569,225 UART: [art] Signing Cert with AUTHO
32,570,524 UART: RITY.KEYID = 7
34,275,671 UART: [art] Erasing AUTHORITY.KEYID = 7
34,277,190 UART: [art] PUB.X = 4B4E844A3AAE12363AB8F5675CDF5DD1A296ACD1251686271E1C3374988B10628A8D93E4A23A15D4E924F378753F2FCE
34,284,492 UART: [art] PUB.Y = 9060E67ADAA94E3FE8F081564F151579E6BF4CA9089A3A4B502A7EA660685A5E5BAA0FA7278030ADFFA76B7DF1BC16D4
34,291,772 UART: [art] SIG.R = F89F0FA22D3C069E0F62F021458D62DF2CA78F7032E7CF1E91723EB892A68561F2F5E4B374C8BCAD590B550BA5330510
34,299,148 UART: [art] SIG.S = F9753112ACECB903F24B01B15A63CC728F8EABB8724175212B5FE9A871610F78168233114F050949DECB47EE30D73DB1
35,278,389 UART: Caliptra RT
35,279,087 UART: [state] CFI Enabled
35,396,268 UART: [rt] RT listening for mailbox commands...
35,428,480 UART: [rt]cmd =0x4d454153, len=108
35,446,319 >>> mbox cmd response data (12 bytes)
35,446,907 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,477,342 UART: [rt]cmd =0x44504543, len=92
39,767,917 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,095 writing to cptra_bootfsm_go
190,216 UART:
190,507 UART: Running Caliptra ROM ...
191,547 UART:
10,072,104 UART: [state] CFI Enabled
10,087,463 UART: [state] LifecycleState = Unprovisioned
10,089,812 UART: [state] DebugLocked = No
10,092,055 UART: [state] WD Timer not started. Device not locked for debugging
10,097,266 UART: [kat] SHA2-256
10,287,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,297,966 UART: [kat] ++
10,298,580 UART: [kat] sha1
10,309,422 UART: [kat] SHA2-256
10,312,480 UART: [kat] SHA2-384
10,317,839 UART: [kat] SHA2-512-ACC
10,320,435 UART: [kat] ECC-384
12,758,171 UART: [kat] HMAC-384Kdf
12,772,443 UART: [kat] LMS
13,304,258 UART: [kat] --
13,308,568 UART: [cold-reset] ++
13,310,780 UART: [fht] FHT @ 0x50003400
13,322,461 UART: [idev] ++
13,323,166 UART: [idev] CDI.KEYID = 6
13,324,139 UART: [idev] SUBJECT.KEYID = 7
13,325,307 UART: [idev] UDS.KEYID = 0
13,326,223 ready_for_fw is high
13,326,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,470,044 UART: [idev] Erasing UDS.KEYID = 0
15,800,095 UART: [idev] Sha1 KeyId Algorithm
15,822,784 UART: [idev] --
15,828,176 UART: [ldev] ++
15,828,942 UART: [ldev] CDI.KEYID = 6
15,829,822 UART: [ldev] SUBJECT.KEYID = 5
15,830,972 UART: [ldev] AUTHORITY.KEYID = 7
15,832,194 UART: [ldev] FE.KEYID = 1
15,846,037 UART: [ldev] Erasing FE.KEYID = 1
18,322,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,042,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,057,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,072,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,087,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,108,991 UART: [ldev] --
20,113,716 UART: [fwproc] Wait for Commands...
20,116,405 UART: [fwproc] Recv command 0x46574c44
20,118,659 UART: [fwproc] Recv'd Img size: 114448 bytes
23,562,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,646,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,762,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
24,306,626 >>> mbox cmd response: success
24,307,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,311,319 UART: [afmc] ++
24,312,021 UART: [afmc] CDI.KEYID = 6
24,313,202 UART: [afmc] SUBJECT.KEYID = 7
24,314,684 UART: [afmc] AUTHORITY.KEYID = 5
26,816,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,540,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,542,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,557,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,572,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,587,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,611,933 UART: [afmc] --
28,614,646 UART: [cold-reset] --
28,618,120 UART: [state] Locking Datavault
28,621,903 UART: [state] Locking PCR0, PCR1 and PCR31
28,624,044 UART: [state] Locking ICCM
28,625,689 UART: [exit] Launching FMC @ 0x40000130
28,634,377 UART:
28,634,632 UART: Running Caliptra FMC ...
28,635,726 UART:
28,635,872 UART: [state] CFI Enabled
28,643,694 UART: [fht] FMC Alias Private Key: 7
30,401,086 UART: [art] Extend RT PCRs Done
30,402,296 UART: [art] Lock RT PCRs Done
30,403,717 UART: [art] Populate DV Done
30,409,233 UART: [fht] FMC Alias Private Key: 7
30,410,828 UART: [art] Derive CDI
30,411,634 UART: [art] Store in in slot 0x4
30,454,001 UART: [art] Derive Key Pair
30,454,999 UART: [art] Store priv key in slot 0x5
32,882,019 UART: [art] Derive Key Pair - Done
32,894,636 UART: [art] Signing Cert with AUTHO
32,895,931 UART: RITY.KEYID = 7
34,601,418 UART: [art] Erasing AUTHORITY.KEYID = 7
34,602,939 UART: [art] PUB.X = 4B4E844A3AAE12363AB8F5675CDF5DD1A296ACD1251686271E1C3374988B10628A8D93E4A23A15D4E924F378753F2FCE
34,610,177 UART: [art] PUB.Y = 9060E67ADAA94E3FE8F081564F151579E6BF4CA9089A3A4B502A7EA660685A5E5BAA0FA7278030ADFFA76B7DF1BC16D4
34,617,448 UART: [art] SIG.R = F89F0FA22D3C069E0F62F021458D62DF2CA78F7032E7CF1E91723EB892A68561F2F5E4B374C8BCAD590B550BA5330510
34,625,030 UART: [art] SIG.S = F9753112ACECB903F24B01B15A63CC728F8EABB8724175212B5FE9A871610F78168233114F050949DECB47EE30D73DB1
35,603,500 UART: Caliptra RT
35,604,184 UART: [state] CFI Enabled
35,721,668 UART: [rt] RT listening for mailbox commands...
35,753,822 UART: [rt]cmd =0x44504543, len=96
35,786,027 >>> mbox cmd response data (56 bytes)
35,786,813 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,817,295 UART: [rt]cmd =0x44504543, len=92
40,108,884 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,478,422 >>> mbox cmd response data (12 bytes)
10,479,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,122,432 >>> mbox cmd response: success
15,122,899 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,374,223 UART:
19,374,611 UART: Running Caliptra FMC ...
19,375,842 UART:
19,375,999 UART: [state] CFI Enabled
19,383,792 UART: [fht] FMC Alias Private Key: 7
21,140,604 UART: [art] Extend RT PCRs Done
21,141,827 UART: [art] Lock RT PCRs Done
21,143,829 UART: [art] Populate DV Done
21,149,074 UART: [fht] FMC Alias Private Key: 7
21,150,632 UART: [art] Derive CDI
21,151,445 UART: [art] Store in in slot 0x4
21,194,162 UART: [art] Derive Key Pair
21,195,232 UART: [art] Store priv key in slot 0x5
23,621,704 UART: [art] Derive Key Pair - Done
23,634,857 UART: [art] Signing Cert with AUTHO
23,636,163 UART: RITY.KEYID = 7
25,342,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,343,654 UART: [art] PUB.X = 1429C70DC8F3CE4D742DE4DC6FC2136C6C29A8A0AC0237B25AAF8A20BB26C4E9B46EFC9776756CD516366B9CCCA9835B
25,350,946 UART: [art] PUB.Y = A1120709382204020AF4271C35308ECEF8799F0D8ECFAB950A9B6633F60B803DF2BCF1D31481CB913A919998ED6909A2
25,358,170 UART: [art] SIG.R = 5BAA34C78574151AFA77ABE184B44AA3A8AD0048B412802E81E244AF26F72292512BA96D07976BA685041DCE74472F3A
25,365,554 UART: [art] SIG.S = 009AD5ED64AD9B429ADA3B42B19D71B5707DD96481393DC43F19777535B588BEBE50568A7F29BE405304027F1C735D65
26,344,641 UART: Caliptra RT
26,345,358 UART: [state] CFI Enabled
26,474,101 UART: [rt] RT listening for mailbox commands...
26,506,541 UART: [rt]cmd =0x44504543, len=92
30,796,993 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,104 writing to cptra_bootfsm_go
12,862,452 ready_for_fw is high
12,863,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,066,186 >>> mbox cmd response: success
24,067,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,318,077 UART:
28,318,764 UART: Running Caliptra FMC ...
28,319,806 UART:
28,319,952 UART: [state] CFI Enabled
28,327,969 UART: [fht] FMC Alias Private Key: 7
30,085,604 UART: [art] Extend RT PCRs Done
30,087,110 UART: [art] Lock RT PCRs Done
30,088,603 UART: [art] Populate DV Done
30,094,082 UART: [fht] FMC Alias Private Key: 7
30,095,576 UART: [art] Derive CDI
30,096,319 UART: [art] Store in in slot 0x4
30,139,397 UART: [art] Derive Key Pair
30,140,393 UART: [art] Store priv key in slot 0x5
32,567,655 UART: [art] Derive Key Pair - Done
32,580,747 UART: [art] Signing Cert with AUTHO
32,582,080 UART: RITY.KEYID = 7
34,287,713 UART: [art] Erasing AUTHORITY.KEYID = 7
34,289,208 UART: [art] PUB.X = 1429C70DC8F3CE4D742DE4DC6FC2136C6C29A8A0AC0237B25AAF8A20BB26C4E9B46EFC9776756CD516366B9CCCA9835B
34,296,498 UART: [art] PUB.Y = A1120709382204020AF4271C35308ECEF8799F0D8ECFAB950A9B6633F60B803DF2BCF1D31481CB913A919998ED6909A2
34,303,778 UART: [art] SIG.R = 5BAA34C78574151AFA77ABE184B44AA3A8AD0048B412802E81E244AF26F72292512BA96D07976BA685041DCE74472F3A
34,311,101 UART: [art] SIG.S = 009AD5ED64AD9B429ADA3B42B19D71B5707DD96481393DC43F19777535B588BEBE50568A7F29BE405304027F1C735D65
35,290,094 UART: Caliptra RT
35,290,815 UART: [state] CFI Enabled
35,407,986 UART: [rt] RT listening for mailbox commands...
35,440,102 UART: [rt]cmd =0x4d454153, len=108
35,458,233 >>> mbox cmd response data (12 bytes)
35,458,958 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,489,508 UART: [rt]cmd =0x44504543, len=92
39,780,597 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,098 writing to cptra_bootfsm_go
13,176,454 ready_for_fw is high
13,176,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,377,807 >>> mbox cmd response: success
24,378,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,627,324 UART:
28,627,662 UART: Running Caliptra FMC ...
28,628,731 UART:
28,628,877 UART: [state] CFI Enabled
28,637,402 UART: [fht] FMC Alias Private Key: 7
30,394,083 UART: [art] Extend RT PCRs Done
30,395,326 UART: [art] Lock RT PCRs Done
30,396,861 UART: [art] Populate DV Done
30,402,162 UART: [fht] FMC Alias Private Key: 7
30,403,638 UART: [art] Derive CDI
30,404,393 UART: [art] Store in in slot 0x4
30,447,089 UART: [art] Derive Key Pair
30,448,133 UART: [art] Store priv key in slot 0x5
32,874,948 UART: [art] Derive Key Pair - Done
32,888,099 UART: [art] Signing Cert with AUTHO
32,889,393 UART: RITY.KEYID = 7
34,594,748 UART: [art] Erasing AUTHORITY.KEYID = 7
34,596,256 UART: [art] PUB.X = 1429C70DC8F3CE4D742DE4DC6FC2136C6C29A8A0AC0237B25AAF8A20BB26C4E9B46EFC9776756CD516366B9CCCA9835B
34,603,568 UART: [art] PUB.Y = A1120709382204020AF4271C35308ECEF8799F0D8ECFAB950A9B6633F60B803DF2BCF1D31481CB913A919998ED6909A2
34,610,740 UART: [art] SIG.R = 5BAA34C78574151AFA77ABE184B44AA3A8AD0048B412802E81E244AF26F72292512BA96D07976BA685041DCE74472F3A
34,618,115 UART: [art] SIG.S = 009AD5ED64AD9B429ADA3B42B19D71B5707DD96481393DC43F19777535B588BEBE50568A7F29BE405304027F1C735D65
35,596,971 UART: Caliptra RT
35,597,696 UART: [state] CFI Enabled
35,715,570 UART: [rt] RT listening for mailbox commands...
35,747,297 UART: [rt]cmd =0x44504543, len=96
35,779,064 >>> mbox cmd response data (56 bytes)
35,779,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,810,376 UART: [rt]cmd =0x44504543, len=92
40,102,059 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.65s
Truncated 5006 bytes from beginning
5B737DEB08D43B00F2842AE85A2DA5D91A54A
3,439,040 UART: [art] PUB.Y = ABE0723DDDCE234D8A12CF4D1696ED400C7EE21BD8FD6F8C3666B5FF4909C73867EF83D55864424FD3EC2BBAFF2F0234
3,446,001 UART: [art] SIG.R = 3B4071ED77CEE8667EC612E7306589B48F64F9435FA1E31C9B0C145BC1750453CA9B727882ACCB7832A30AC0DB7B3865
3,452,766 UART: [art] SIG.S = E667348D385DD43461919E434423F3D58BC96A4A8DA05A1D3A62A985C08005B735CF493258A66E1FB518B87BC5C9F4E9
3,476,268 UART: Caliptra RT
3,476,521 UART: [state] CFI Enabled
3,596,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,182 UART: [rt]cmd =0x44504543, len=92
3,819,516 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,382 UART: [kat] SHA2-512-ACC
897,283 UART: [kat] ECC-384
903,136 UART: [kat] HMAC-384Kdf
907,622 UART: [kat] LMS
1,475,818 UART: [kat] --
1,476,757 UART: [cold-reset] ++
1,477,187 UART: [fht] Storing FHT @ 0x50003400
1,479,876 UART: [idev] ++
1,480,044 UART: [idev] CDI.KEYID = 6
1,480,404 UART: [idev] SUBJECT.KEYID = 7
1,480,828 UART: [idev] UDS.KEYID = 0
1,481,173 ready_for_fw is high
1,481,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,620 UART: [idev] Erasing UDS.KEYID = 0
1,504,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,467 UART: [ldev] ++
1,514,635 UART: [ldev] CDI.KEYID = 6
1,514,998 UART: [ldev] SUBJECT.KEYID = 5
1,515,424 UART: [ldev] AUTHORITY.KEYID = 7
1,515,887 UART: [ldev] FE.KEYID = 1
1,521,067 UART: [ldev] Erasing FE.KEYID = 1
1,546,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,808 UART: [ldev] --
1,586,247 UART: [fwproc] Waiting for Commands...
1,586,960 UART: [fwproc] Received command 0x46574c44
1,587,751 UART: [fwproc] Received Image of size 114448 bytes
2,888,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,052 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,099 >>> mbox cmd response: success
3,081,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,082,299 UART: [afmc] ++
3,082,467 UART: [afmc] CDI.KEYID = 6
3,082,829 UART: [afmc] SUBJECT.KEYID = 7
3,083,254 UART: [afmc] AUTHORITY.KEYID = 5
3,118,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,966 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,656 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,599 UART: [afmc] --
3,161,709 UART: [cold-reset] --
3,162,503 UART: [state] Locking Datavault
3,163,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,954 UART: [state] Locking ICCM
3,164,546 UART: [exit] Launching FMC @ 0x40000130
3,169,875 UART:
3,169,891 UART: Running Caliptra FMC ...
3,170,299 UART:
3,170,353 UART: [state] CFI Enabled
3,181,190 UART: [fht] FMC Alias Private Key: 7
3,289,153 UART: [art] Extend RT PCRs Done
3,289,581 UART: [art] Lock RT PCRs Done
3,291,179 UART: [art] Populate DV Done
3,299,362 UART: [fht] FMC Alias Private Key: 7
3,300,290 UART: [art] Derive CDI
3,300,570 UART: [art] Store in in slot 0x4
3,385,823 UART: [art] Derive Key Pair
3,386,183 UART: [art] Store priv key in slot 0x5
3,399,027 UART: [art] Derive Key Pair - Done
3,413,753 UART: [art] Signing Cert with AUTHO
3,414,233 UART: RITY.KEYID = 7
3,429,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,926 UART: [art] PUB.X = 4D8CF74F34ED5EB0E8BD3A210C34E227BC463BBE1590CBE90F5DB3FBCD45B737DEB08D43B00F2842AE85A2DA5D91A54A
3,436,713 UART: [art] PUB.Y = ABE0723DDDCE234D8A12CF4D1696ED400C7EE21BD8FD6F8C3666B5FF4909C73867EF83D55864424FD3EC2BBAFF2F0234
3,443,674 UART: [art] SIG.R = 3B4071ED77CEE8667EC612E7306589B48F64F9435FA1E31C9B0C145BC1750453CA9B727882ACCB7832A30AC0DB7B3865
3,450,439 UART: [art] SIG.S = E667348D385DD43461919E434423F3D58BC96A4A8DA05A1D3A62A985C08005B735CF493258A66E1FB518B87BC5C9F4E9
3,474,327 UART: Caliptra RT
3,474,580 UART: [state] CFI Enabled
3,582,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,659 UART: [rt]cmd =0x4d454153, len=108
3,634,533 >>> mbox cmd response data (12 bytes)
3,634,534 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,279 UART: [rt]cmd =0x44504543, len=92
3,855,345 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,337 UART: [kat] SHA2-256
882,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,383 UART: [kat] ++
886,535 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,432 UART: [kat] SHA2-512-ACC
897,333 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,621 UART: [cold-reset] ++
1,477,007 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 ready_for_fw is high
1,481,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,772 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,062 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,809 UART: [ldev] Erasing FE.KEYID = 1
1,547,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,688 UART: [ldev] --
1,587,025 UART: [fwproc] Waiting for Commands...
1,587,858 UART: [fwproc] Received command 0x46574c44
1,588,649 UART: [fwproc] Received Image of size 114448 bytes
2,887,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,227 >>> mbox cmd response: success
3,081,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,082,385 UART: [afmc] ++
3,082,553 UART: [afmc] CDI.KEYID = 6
3,082,915 UART: [afmc] SUBJECT.KEYID = 7
3,083,340 UART: [afmc] AUTHORITY.KEYID = 5
3,118,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,079 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,472 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,162 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,995 UART: [afmc] --
3,162,037 UART: [cold-reset] --
3,163,053 UART: [state] Locking Datavault
3,164,264 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,868 UART: [state] Locking ICCM
3,165,342 UART: [exit] Launching FMC @ 0x40000130
3,170,671 UART:
3,170,687 UART: Running Caliptra FMC ...
3,171,095 UART:
3,171,149 UART: [state] CFI Enabled
3,181,526 UART: [fht] FMC Alias Private Key: 7
3,289,551 UART: [art] Extend RT PCRs Done
3,289,979 UART: [art] Lock RT PCRs Done
3,291,401 UART: [art] Populate DV Done
3,299,594 UART: [fht] FMC Alias Private Key: 7
3,300,590 UART: [art] Derive CDI
3,300,870 UART: [art] Store in in slot 0x4
3,386,661 UART: [art] Derive Key Pair
3,387,021 UART: [art] Store priv key in slot 0x5
3,400,199 UART: [art] Derive Key Pair - Done
3,414,987 UART: [art] Signing Cert with AUTHO
3,415,467 UART: RITY.KEYID = 7
3,431,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,894 UART: [art] PUB.X = 4D8CF74F34ED5EB0E8BD3A210C34E227BC463BBE1590CBE90F5DB3FBCD45B737DEB08D43B00F2842AE85A2DA5D91A54A
3,438,681 UART: [art] PUB.Y = ABE0723DDDCE234D8A12CF4D1696ED400C7EE21BD8FD6F8C3666B5FF4909C73867EF83D55864424FD3EC2BBAFF2F0234
3,445,642 UART: [art] SIG.R = 3B4071ED77CEE8667EC612E7306589B48F64F9435FA1E31C9B0C145BC1750453CA9B727882ACCB7832A30AC0DB7B3865
3,452,407 UART: [art] SIG.S = E667348D385DD43461919E434423F3D58BC96A4A8DA05A1D3A62A985C08005B735CF493258A66E1FB518B87BC5C9F4E9
3,476,843 UART: Caliptra RT
3,477,096 UART: [state] CFI Enabled
3,584,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,111 UART: [rt]cmd =0x44504543, len=96
3,649,461 >>> mbox cmd response data (56 bytes)
3,649,462 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,145 UART: [rt]cmd =0x44504543, len=92
3,870,955 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,609 >>> mbox cmd response data (12 bytes)
1,444,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,933,058 >>> mbox cmd response: success
2,933,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,994,558 UART:
2,994,574 UART: Running Caliptra FMC ...
2,994,982 UART:
2,995,036 UART: [state] CFI Enabled
3,005,287 UART: [fht] FMC Alias Private Key: 7
3,113,058 UART: [art] Extend RT PCRs Done
3,113,486 UART: [art] Lock RT PCRs Done
3,115,098 UART: [art] Populate DV Done
3,123,447 UART: [fht] FMC Alias Private Key: 7
3,124,447 UART: [art] Derive CDI
3,124,727 UART: [art] Store in in slot 0x4
3,210,382 UART: [art] Derive Key Pair
3,210,742 UART: [art] Store priv key in slot 0x5
3,224,166 UART: [art] Derive Key Pair - Done
3,238,716 UART: [art] Signing Cert with AUTHO
3,239,196 UART: RITY.KEYID = 7
3,254,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,211 UART: [art] PUB.X = DC0A64A1C6E1321834EE0360C9EED20F64BF3E65F0E8E42779DB38443C075CAA63C7964D9622C371AE971D7EFEE61686
3,261,977 UART: [art] PUB.Y = CC18FFF2CEA6FF37959A16C9E0E3BC434734C19B7177027CD368DF326A14B385E0C35569BDE6FEC954C0666BE489EEAE
3,268,940 UART: [art] SIG.R = 6BF995EF8EBE6FCA33B807DDBC3B06EE510D73C5B0056A3E85DAB624804E1D2FCB5EB5755688E8CEB46BB803187371ED
3,275,715 UART: [art] SIG.S = 5364783DDB6CD47C838509B519A3341DF348F20D35F721891B28232C7316E2A8FABC03707C2B390C5B89D7C4574F050E
3,299,872 UART: Caliptra RT
3,300,125 UART: [state] CFI Enabled
3,419,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,963 UART: [rt]cmd =0x44504543, len=92
3,642,292 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,107 ready_for_fw is high
1,363,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,311 >>> mbox cmd response: success
2,929,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,990,207 UART:
2,990,223 UART: Running Caliptra FMC ...
2,990,631 UART:
2,990,685 UART: [state] CFI Enabled
3,001,482 UART: [fht] FMC Alias Private Key: 7
3,109,467 UART: [art] Extend RT PCRs Done
3,109,895 UART: [art] Lock RT PCRs Done
3,111,397 UART: [art] Populate DV Done
3,119,468 UART: [fht] FMC Alias Private Key: 7
3,120,562 UART: [art] Derive CDI
3,120,842 UART: [art] Store in in slot 0x4
3,206,301 UART: [art] Derive Key Pair
3,206,661 UART: [art] Store priv key in slot 0x5
3,219,685 UART: [art] Derive Key Pair - Done
3,234,449 UART: [art] Signing Cert with AUTHO
3,234,929 UART: RITY.KEYID = 7
3,249,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,764 UART: [art] PUB.X = DC0A64A1C6E1321834EE0360C9EED20F64BF3E65F0E8E42779DB38443C075CAA63C7964D9622C371AE971D7EFEE61686
3,257,530 UART: [art] PUB.Y = CC18FFF2CEA6FF37959A16C9E0E3BC434734C19B7177027CD368DF326A14B385E0C35569BDE6FEC954C0666BE489EEAE
3,264,493 UART: [art] SIG.R = 6BF995EF8EBE6FCA33B807DDBC3B06EE510D73C5B0056A3E85DAB624804E1D2FCB5EB5755688E8CEB46BB803187371ED
3,271,268 UART: [art] SIG.S = 5364783DDB6CD47C838509B519A3341DF348F20D35F721891B28232C7316E2A8FABC03707C2B390C5B89D7C4574F050E
3,295,179 UART: Caliptra RT
3,295,432 UART: [state] CFI Enabled
3,403,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,432 UART: [rt]cmd =0x4d454153, len=108
3,455,248 >>> mbox cmd response data (12 bytes)
3,455,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,078 UART: [rt]cmd =0x44504543, len=92
3,675,729 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,889 ready_for_fw is high
1,362,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,143 >>> mbox cmd response: success
2,930,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,992,637 UART:
2,992,653 UART: Running Caliptra FMC ...
2,993,061 UART:
2,993,115 UART: [state] CFI Enabled
3,003,530 UART: [fht] FMC Alias Private Key: 7
3,111,389 UART: [art] Extend RT PCRs Done
3,111,817 UART: [art] Lock RT PCRs Done
3,113,341 UART: [art] Populate DV Done
3,121,564 UART: [fht] FMC Alias Private Key: 7
3,122,688 UART: [art] Derive CDI
3,122,968 UART: [art] Store in in slot 0x4
3,208,773 UART: [art] Derive Key Pair
3,209,133 UART: [art] Store priv key in slot 0x5
3,222,631 UART: [art] Derive Key Pair - Done
3,237,399 UART: [art] Signing Cert with AUTHO
3,237,879 UART: RITY.KEYID = 7
3,253,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,786 UART: [art] PUB.X = DC0A64A1C6E1321834EE0360C9EED20F64BF3E65F0E8E42779DB38443C075CAA63C7964D9622C371AE971D7EFEE61686
3,260,552 UART: [art] PUB.Y = CC18FFF2CEA6FF37959A16C9E0E3BC434734C19B7177027CD368DF326A14B385E0C35569BDE6FEC954C0666BE489EEAE
3,267,515 UART: [art] SIG.R = 6BF995EF8EBE6FCA33B807DDBC3B06EE510D73C5B0056A3E85DAB624804E1D2FCB5EB5755688E8CEB46BB803187371ED
3,274,290 UART: [art] SIG.S = 5364783DDB6CD47C838509B519A3341DF348F20D35F721891B28232C7316E2A8FABC03707C2B390C5B89D7C4574F050E
3,298,075 UART: Caliptra RT
3,298,328 UART: [state] CFI Enabled
3,406,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,454 UART: [rt]cmd =0x44504543, len=96
3,470,708 >>> mbox cmd response data (56 bytes)
3,470,709 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,852 UART: [rt]cmd =0x44504543, len=92
3,691,485 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.78s
Truncated 5006 bytes from beginning
64D46AFD847623699DC0D5D091EEB5A13EA64
3,441,222 UART: [art] PUB.Y = 8861E49D3D5D3688E54F8437B46427398F78A111B941FAE6E90A8BD90CE18AD37F2EDE6B4E71408162CC602C8EE840A9
3,448,170 UART: [art] SIG.R = 5E7A10EDF983010B6749CC7C91EA04AB88B593DAD07B97C68F2030A0F869049963D4D6D3F41F76DD52E466AE7E2FA59D
3,454,938 UART: [art] SIG.S = 7C44E2507D3B087FD0319E8AE1E89FC95CD0D417DDF18C4F257DFB285C538C061E4C98D6D21EE0D45591398F31F8264A
3,478,323 UART: Caliptra RT
3,478,668 UART: [state] CFI Enabled
3,599,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,162 UART: [rt]cmd =0x44504543, len=92
3,822,755 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,073 UART: [state] LifecycleState = Unprovisioned
86,728 UART: [state] DebugLocked = No
87,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,838 UART: [kat] SHA2-256
882,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,884 UART: [kat] ++
887,036 UART: [kat] sha1
891,264 UART: [kat] SHA2-256
893,202 UART: [kat] SHA2-384
895,923 UART: [kat] SHA2-512-ACC
897,824 UART: [kat] ECC-384
903,493 UART: [kat] HMAC-384Kdf
908,191 UART: [kat] LMS
1,476,387 UART: [kat] --
1,477,406 UART: [cold-reset] ++
1,477,960 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,591 UART: [idev] Erasing UDS.KEYID = 0
1,506,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,963 UART: [idev] --
1,516,112 UART: [ldev] ++
1,516,280 UART: [ldev] CDI.KEYID = 6
1,516,643 UART: [ldev] SUBJECT.KEYID = 5
1,517,069 UART: [ldev] AUTHORITY.KEYID = 7
1,517,532 UART: [ldev] FE.KEYID = 1
1,522,648 UART: [ldev] Erasing FE.KEYID = 1
1,547,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,847 UART: [ldev] --
1,587,164 UART: [fwproc] Waiting for Commands...
1,588,013 UART: [fwproc] Received command 0x46574c44
1,588,804 UART: [fwproc] Received Image of size 114448 bytes
2,887,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,762 >>> mbox cmd response: success
3,079,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,080,856 UART: [afmc] ++
3,081,024 UART: [afmc] CDI.KEYID = 6
3,081,386 UART: [afmc] SUBJECT.KEYID = 7
3,081,811 UART: [afmc] AUTHORITY.KEYID = 5
3,116,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,580 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,973 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,663 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,714 UART: [afmc] --
3,160,676 UART: [cold-reset] --
3,161,684 UART: [state] Locking Datavault
3,163,049 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,653 UART: [state] Locking ICCM
3,164,231 UART: [exit] Launching FMC @ 0x40000130
3,169,560 UART:
3,169,576 UART: Running Caliptra FMC ...
3,169,984 UART:
3,170,127 UART: [state] CFI Enabled
3,180,688 UART: [fht] FMC Alias Private Key: 7
3,288,931 UART: [art] Extend RT PCRs Done
3,289,359 UART: [art] Lock RT PCRs Done
3,290,973 UART: [art] Populate DV Done
3,299,184 UART: [fht] FMC Alias Private Key: 7
3,300,328 UART: [art] Derive CDI
3,300,608 UART: [art] Store in in slot 0x4
3,386,027 UART: [art] Derive Key Pair
3,386,387 UART: [art] Store priv key in slot 0x5
3,399,469 UART: [art] Derive Key Pair - Done
3,413,975 UART: [art] Signing Cert with AUTHO
3,414,455 UART: RITY.KEYID = 7
3,429,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,516 UART: [art] PUB.X = 84FED7C25DCF3AD119D623D91F18CA9F1223F088BEC8F99460C1874603564D46AFD847623699DC0D5D091EEB5A13EA64
3,437,285 UART: [art] PUB.Y = 8861E49D3D5D3688E54F8437B46427398F78A111B941FAE6E90A8BD90CE18AD37F2EDE6B4E71408162CC602C8EE840A9
3,444,233 UART: [art] SIG.R = 5E7A10EDF983010B6749CC7C91EA04AB88B593DAD07B97C68F2030A0F869049963D4D6D3F41F76DD52E466AE7E2FA59D
3,451,001 UART: [art] SIG.S = 7C44E2507D3B087FD0319E8AE1E89FC95CD0D417DDF18C4F257DFB285C538C061E4C98D6D21EE0D45591398F31F8264A
3,475,354 UART: Caliptra RT
3,475,699 UART: [state] CFI Enabled
3,584,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,777 UART: [rt]cmd =0x4d454153, len=108
3,636,831 >>> mbox cmd response data (12 bytes)
3,636,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,717 UART: [rt]cmd =0x44504543, len=92
3,858,684 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,652 UART: [kat] SHA2-256
882,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,698 UART: [kat] ++
886,850 UART: [kat] sha1
891,170 UART: [kat] SHA2-256
893,108 UART: [kat] SHA2-384
895,851 UART: [kat] SHA2-512-ACC
897,752 UART: [kat] ECC-384
903,681 UART: [kat] HMAC-384Kdf
908,387 UART: [kat] LMS
1,476,583 UART: [kat] --
1,477,452 UART: [cold-reset] ++
1,477,878 UART: [fht] Storing FHT @ 0x50003400
1,480,529 UART: [idev] ++
1,480,697 UART: [idev] CDI.KEYID = 6
1,481,057 UART: [idev] SUBJECT.KEYID = 7
1,481,481 UART: [idev] UDS.KEYID = 0
1,481,826 ready_for_fw is high
1,481,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,485 UART: [idev] Erasing UDS.KEYID = 0
1,506,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,589 UART: [idev] --
1,515,712 UART: [ldev] ++
1,515,880 UART: [ldev] CDI.KEYID = 6
1,516,243 UART: [ldev] SUBJECT.KEYID = 5
1,516,669 UART: [ldev] AUTHORITY.KEYID = 7
1,517,132 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,548,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,303 UART: [ldev] --
1,587,748 UART: [fwproc] Waiting for Commands...
1,588,531 UART: [fwproc] Received command 0x46574c44
1,589,322 UART: [fwproc] Received Image of size 114448 bytes
2,888,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,598 >>> mbox cmd response: success
3,081,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,082,634 UART: [afmc] ++
3,082,802 UART: [afmc] CDI.KEYID = 6
3,083,164 UART: [afmc] SUBJECT.KEYID = 7
3,083,589 UART: [afmc] AUTHORITY.KEYID = 5
3,119,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,371 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,061 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,862 UART: [afmc] --
3,162,906 UART: [cold-reset] --
3,163,696 UART: [state] Locking Datavault
3,164,887 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,491 UART: [state] Locking ICCM
3,166,021 UART: [exit] Launching FMC @ 0x40000130
3,171,350 UART:
3,171,366 UART: Running Caliptra FMC ...
3,171,774 UART:
3,171,917 UART: [state] CFI Enabled
3,182,312 UART: [fht] FMC Alias Private Key: 7
3,290,649 UART: [art] Extend RT PCRs Done
3,291,077 UART: [art] Lock RT PCRs Done
3,292,427 UART: [art] Populate DV Done
3,300,710 UART: [fht] FMC Alias Private Key: 7
3,301,740 UART: [art] Derive CDI
3,302,020 UART: [art] Store in in slot 0x4
3,388,165 UART: [art] Derive Key Pair
3,388,525 UART: [art] Store priv key in slot 0x5
3,401,089 UART: [art] Derive Key Pair - Done
3,415,845 UART: [art] Signing Cert with AUTHO
3,416,325 UART: RITY.KEYID = 7
3,431,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,730 UART: [art] PUB.X = 84FED7C25DCF3AD119D623D91F18CA9F1223F088BEC8F99460C1874603564D46AFD847623699DC0D5D091EEB5A13EA64
3,439,499 UART: [art] PUB.Y = 8861E49D3D5D3688E54F8437B46427398F78A111B941FAE6E90A8BD90CE18AD37F2EDE6B4E71408162CC602C8EE840A9
3,446,447 UART: [art] SIG.R = 5E7A10EDF983010B6749CC7C91EA04AB88B593DAD07B97C68F2030A0F869049963D4D6D3F41F76DD52E466AE7E2FA59D
3,453,215 UART: [art] SIG.S = 7C44E2507D3B087FD0319E8AE1E89FC95CD0D417DDF18C4F257DFB285C538C061E4C98D6D21EE0D45591398F31F8264A
3,477,212 UART: Caliptra RT
3,477,557 UART: [state] CFI Enabled
3,585,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,679 UART: [rt]cmd =0x44504543, len=96
3,650,193 >>> mbox cmd response data (56 bytes)
3,650,194 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,059 UART: [rt]cmd =0x44504543, len=92
3,871,766 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,186 >>> mbox cmd response data (12 bytes)
1,445,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,767 >>> mbox cmd response: success
2,931,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,825 UART:
2,992,841 UART: Running Caliptra FMC ...
2,993,249 UART:
2,993,392 UART: [state] CFI Enabled
3,003,965 UART: [fht] FMC Alias Private Key: 7
3,111,498 UART: [art] Extend RT PCRs Done
3,111,926 UART: [art] Lock RT PCRs Done
3,114,010 UART: [art] Populate DV Done
3,122,337 UART: [fht] FMC Alias Private Key: 7
3,123,503 UART: [art] Derive CDI
3,123,783 UART: [art] Store in in slot 0x4
3,209,654 UART: [art] Derive Key Pair
3,210,014 UART: [art] Store priv key in slot 0x5
3,223,340 UART: [art] Derive Key Pair - Done
3,237,898 UART: [art] Signing Cert with AUTHO
3,238,378 UART: RITY.KEYID = 7
3,253,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,705 UART: [art] PUB.X = A68C7723DBE65FD0C4677574C16B139799EAE59D1483E48E24BC89EE4CFEF8AF8BD9E2ED31439D0CB375247EC43D63F8
3,261,486 UART: [art] PUB.Y = 06DA6B4A33280FA9F0448C92BA067EC6F6FA76357B7E74F529928469218A59CC551AA6329D448A3BD574B2919E98F5D6
3,268,427 UART: [art] SIG.R = DC7F243A76D4C4DDF7255865DC4E6113B6A8C4D04A66A08D34E7A2B5618A1263C5E02254466ABFB0C0BCA975C353F2D0
3,275,207 UART: [art] SIG.S = 03CB43B2A3F5BD584DBF4FAFA7A6BE69158578B40B1C0441E4067CFDC933F8E2DB986332DB2727B9469EE9C284189726
3,299,412 UART: Caliptra RT
3,299,757 UART: [state] CFI Enabled
3,420,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,700 UART: [rt]cmd =0x44504543, len=92
3,643,156 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,586 ready_for_fw is high
1,362,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,100 >>> mbox cmd response: success
2,929,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,990,654 UART:
2,990,670 UART: Running Caliptra FMC ...
2,991,078 UART:
2,991,221 UART: [state] CFI Enabled
3,001,828 UART: [fht] FMC Alias Private Key: 7
3,110,257 UART: [art] Extend RT PCRs Done
3,110,685 UART: [art] Lock RT PCRs Done
3,112,129 UART: [art] Populate DV Done
3,120,380 UART: [fht] FMC Alias Private Key: 7
3,121,498 UART: [art] Derive CDI
3,121,778 UART: [art] Store in in slot 0x4
3,207,461 UART: [art] Derive Key Pair
3,207,821 UART: [art] Store priv key in slot 0x5
3,221,177 UART: [art] Derive Key Pair - Done
3,236,265 UART: [art] Signing Cert with AUTHO
3,236,745 UART: RITY.KEYID = 7
3,251,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,126 UART: [art] PUB.X = A68C7723DBE65FD0C4677574C16B139799EAE59D1483E48E24BC89EE4CFEF8AF8BD9E2ED31439D0CB375247EC43D63F8
3,258,907 UART: [art] PUB.Y = 06DA6B4A33280FA9F0448C92BA067EC6F6FA76357B7E74F529928469218A59CC551AA6329D448A3BD574B2919E98F5D6
3,265,848 UART: [art] SIG.R = DC7F243A76D4C4DDF7255865DC4E6113B6A8C4D04A66A08D34E7A2B5618A1263C5E02254466ABFB0C0BCA975C353F2D0
3,272,628 UART: [art] SIG.S = 03CB43B2A3F5BD584DBF4FAFA7A6BE69158578B40B1C0441E4067CFDC933F8E2DB986332DB2727B9469EE9C284189726
3,296,241 UART: Caliptra RT
3,296,586 UART: [state] CFI Enabled
3,405,127 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,361 UART: [rt]cmd =0x4d454153, len=108
3,457,159 >>> mbox cmd response data (12 bytes)
3,457,160 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,083 UART: [rt]cmd =0x44504543, len=92
3,677,909 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,974 ready_for_fw is high
1,362,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,654 >>> mbox cmd response: success
2,930,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,992,450 UART:
2,992,466 UART: Running Caliptra FMC ...
2,992,874 UART:
2,993,017 UART: [state] CFI Enabled
3,003,314 UART: [fht] FMC Alias Private Key: 7
3,110,933 UART: [art] Extend RT PCRs Done
3,111,361 UART: [art] Lock RT PCRs Done
3,112,841 UART: [art] Populate DV Done
3,120,922 UART: [fht] FMC Alias Private Key: 7
3,122,028 UART: [art] Derive CDI
3,122,308 UART: [art] Store in in slot 0x4
3,208,389 UART: [art] Derive Key Pair
3,208,749 UART: [art] Store priv key in slot 0x5
3,221,939 UART: [art] Derive Key Pair - Done
3,236,487 UART: [art] Signing Cert with AUTHO
3,236,967 UART: RITY.KEYID = 7
3,252,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,990 UART: [art] PUB.X = A68C7723DBE65FD0C4677574C16B139799EAE59D1483E48E24BC89EE4CFEF8AF8BD9E2ED31439D0CB375247EC43D63F8
3,259,771 UART: [art] PUB.Y = 06DA6B4A33280FA9F0448C92BA067EC6F6FA76357B7E74F529928469218A59CC551AA6329D448A3BD574B2919E98F5D6
3,266,712 UART: [art] SIG.R = DC7F243A76D4C4DDF7255865DC4E6113B6A8C4D04A66A08D34E7A2B5618A1263C5E02254466ABFB0C0BCA975C353F2D0
3,273,492 UART: [art] SIG.S = 03CB43B2A3F5BD584DBF4FAFA7A6BE69158578B40B1C0441E4067CFDC933F8E2DB986332DB2727B9469EE9C284189726
3,297,383 UART: Caliptra RT
3,297,728 UART: [state] CFI Enabled
3,404,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,027 UART: [rt]cmd =0x44504543, len=96
3,468,403 >>> mbox cmd response data (56 bytes)
3,468,404 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,247 UART: [rt]cmd =0x44504543, len=92
3,688,649 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.85s
Truncated 4783 bytes from beginning
7
3,131,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,575 UART: [art] PUB.X = DAE403177BA505498BB624CA7145F4CEDFBC06B0D3DA13948AE39B8E656E35C8039306FE5CFD22D3674AA463241C29B2
3,139,340 UART: [art] PUB.Y = 61A8058E6AFBF7DC9214C411B764651A4C3B928395C45DC51B39907EB867016FF94329F9310BC5BF5DFBE22E583664E1
3,146,283 UART: [art] SIG.R = 19F2567E6BFA33E8F03E85319F9F8C46FBE8C8C1CEB5000C8B504B867A9F3115FFDE6281A2DD41CE82273070C012E9EE
3,153,040 UART: [art] SIG.S = E3C06F6E6E38DB529271F52F68A20DD886D0BBADA8F7251D1919AA05AB074B091C18D35D37E78CD84289DF9601809FB1
3,176,930 UART: Caliptra RT
3,177,183 UART: [state] CFI Enabled
3,298,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,202 UART: [rt]cmd =0x44504543, len=92
3,520,254 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,294 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,171,731 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,712 UART: [idev] ++
1,174,880 UART: [idev] CDI.KEYID = 6
1,175,240 UART: [idev] SUBJECT.KEYID = 7
1,175,664 UART: [idev] UDS.KEYID = 0
1,176,009 ready_for_fw is high
1,176,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,765 UART: [idev] Sha1 KeyId Algorithm
1,209,429 UART: [idev] --
1,210,489 UART: [ldev] ++
1,210,657 UART: [ldev] CDI.KEYID = 6
1,211,020 UART: [ldev] SUBJECT.KEYID = 5
1,211,446 UART: [ldev] AUTHORITY.KEYID = 7
1,211,909 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,244,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,365 UART: [ldev] --
1,283,736 UART: [fwproc] Wait for Commands...
1,284,448 UART: [fwproc] Recv command 0x46574c44
1,285,176 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,740 >>> mbox cmd response: success
2,778,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,779,958 UART: [afmc] ++
2,780,126 UART: [afmc] CDI.KEYID = 6
2,780,488 UART: [afmc] SUBJECT.KEYID = 7
2,780,913 UART: [afmc] AUTHORITY.KEYID = 5
2,816,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,585 UART: [afmc] --
2,859,545 UART: [cold-reset] --
2,860,343 UART: [state] Locking Datavault
2,861,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,158 UART: [state] Locking ICCM
2,862,612 UART: [exit] Launching FMC @ 0x40000130
2,867,941 UART:
2,867,957 UART: Running Caliptra FMC ...
2,868,365 UART:
2,868,419 UART: [state] CFI Enabled
2,879,150 UART: [fht] FMC Alias Private Key: 7
2,986,731 UART: [art] Extend RT PCRs Done
2,987,159 UART: [art] Lock RT PCRs Done
2,988,441 UART: [art] Populate DV Done
2,996,478 UART: [fht] FMC Alias Private Key: 7
2,997,486 UART: [art] Derive CDI
2,997,766 UART: [art] Store in in slot 0x4
3,083,067 UART: [art] Derive Key Pair
3,083,427 UART: [art] Store priv key in slot 0x5
3,096,985 UART: [art] Derive Key Pair - Done
3,111,555 UART: [art] Signing Cert with AUTHO
3,112,035 UART: RITY.KEYID = 7
3,126,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,764 UART: [art] PUB.X = DAE403177BA505498BB624CA7145F4CEDFBC06B0D3DA13948AE39B8E656E35C8039306FE5CFD22D3674AA463241C29B2
3,134,529 UART: [art] PUB.Y = 61A8058E6AFBF7DC9214C411B764651A4C3B928395C45DC51B39907EB867016FF94329F9310BC5BF5DFBE22E583664E1
3,141,472 UART: [art] SIG.R = 19F2567E6BFA33E8F03E85319F9F8C46FBE8C8C1CEB5000C8B504B867A9F3115FFDE6281A2DD41CE82273070C012E9EE
3,148,229 UART: [art] SIG.S = E3C06F6E6E38DB529271F52F68A20DD886D0BBADA8F7251D1919AA05AB074B091C18D35D37E78CD84289DF9601809FB1
3,171,009 UART: Caliptra RT
3,171,262 UART: [state] CFI Enabled
3,278,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,307 UART: [rt]cmd =0x4d454153, len=108
3,331,213 >>> mbox cmd response data (12 bytes)
3,331,214 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,341 UART: [rt]cmd =0x44504543, len=92
3,552,661 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
893,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,583 UART: [kat] ++
897,735 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,570 UART: [kat] SHA2-512-ACC
908,471 UART: [kat] ECC-384
918,180 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,485 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 ready_for_fw is high
1,176,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,920 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,825 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,826 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,338 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,284 >>> mbox cmd response: success
2,776,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,777,338 UART: [afmc] ++
2,777,506 UART: [afmc] CDI.KEYID = 6
2,777,868 UART: [afmc] SUBJECT.KEYID = 7
2,778,293 UART: [afmc] AUTHORITY.KEYID = 5
2,813,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,977 UART: [afmc] --
2,856,939 UART: [cold-reset] --
2,857,995 UART: [state] Locking Datavault
2,859,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,820 UART: [state] Locking ICCM
2,860,334 UART: [exit] Launching FMC @ 0x40000130
2,865,663 UART:
2,865,679 UART: Running Caliptra FMC ...
2,866,087 UART:
2,866,141 UART: [state] CFI Enabled
2,876,930 UART: [fht] FMC Alias Private Key: 7
2,984,553 UART: [art] Extend RT PCRs Done
2,984,981 UART: [art] Lock RT PCRs Done
2,986,589 UART: [art] Populate DV Done
2,994,702 UART: [fht] FMC Alias Private Key: 7
2,995,832 UART: [art] Derive CDI
2,996,112 UART: [art] Store in in slot 0x4
3,081,953 UART: [art] Derive Key Pair
3,082,313 UART: [art] Store priv key in slot 0x5
3,095,183 UART: [art] Derive Key Pair - Done
3,110,075 UART: [art] Signing Cert with AUTHO
3,110,555 UART: RITY.KEYID = 7
3,126,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,802 UART: [art] PUB.X = DAE403177BA505498BB624CA7145F4CEDFBC06B0D3DA13948AE39B8E656E35C8039306FE5CFD22D3674AA463241C29B2
3,133,567 UART: [art] PUB.Y = 61A8058E6AFBF7DC9214C411B764651A4C3B928395C45DC51B39907EB867016FF94329F9310BC5BF5DFBE22E583664E1
3,140,510 UART: [art] SIG.R = 19F2567E6BFA33E8F03E85319F9F8C46FBE8C8C1CEB5000C8B504B867A9F3115FFDE6281A2DD41CE82273070C012E9EE
3,147,267 UART: [art] SIG.S = E3C06F6E6E38DB529271F52F68A20DD886D0BBADA8F7251D1919AA05AB074B091C18D35D37E78CD84289DF9601809FB1
3,171,707 UART: Caliptra RT
3,171,960 UART: [state] CFI Enabled
3,280,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,723 UART: [rt]cmd =0x44504543, len=96
3,344,543 >>> mbox cmd response data (56 bytes)
3,344,544 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,611 UART: [rt]cmd =0x44504543, len=92
3,565,509 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,895 >>> mbox cmd response data (12 bytes)
1,142,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,631,402 >>> mbox cmd response: success
2,631,402 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,692,588 UART:
2,692,604 UART: Running Caliptra FMC ...
2,693,012 UART:
2,693,066 UART: [state] CFI Enabled
2,703,399 UART: [fht] FMC Alias Private Key: 7
2,810,806 UART: [art] Extend RT PCRs Done
2,811,234 UART: [art] Lock RT PCRs Done
2,812,754 UART: [art] Populate DV Done
2,821,063 UART: [fht] FMC Alias Private Key: 7
2,822,131 UART: [art] Derive CDI
2,822,411 UART: [art] Store in in slot 0x4
2,907,924 UART: [art] Derive Key Pair
2,908,284 UART: [art] Store priv key in slot 0x5
2,921,412 UART: [art] Derive Key Pair - Done
2,936,362 UART: [art] Signing Cert with AUTHO
2,936,842 UART: RITY.KEYID = 7
2,952,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,913 UART: [art] PUB.X = 9BE556466114CDAA02B323FD9CE2CCE57F472B61E171A656D3BFB138C88FCFEB2B5B40A9452ADDD6A7B25377D73C312A
2,959,698 UART: [art] PUB.Y = 40A396BE40FB2C39D915F5CD8EB25E75D0B2796DB4E40D7C538E92A007C5C30F099FA632F391F0C281C7EBA35ECD0C2B
2,966,649 UART: [art] SIG.R = D5ECD610CE4038A3AE08D38BDDC5B2792D8D524A6F7292E641D2633E76544A808503FFE35A93DB90D5618FC4DB43D7E7
2,973,423 UART: [art] SIG.S = 064BB565E093396B6714B72CD36D0B0C092A906A7DDB86DCDDDD792BC7C1A44992512EFE3E32B498D6C0712BB309E460
2,997,047 UART: Caliptra RT
2,997,300 UART: [state] CFI Enabled
3,117,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,767 UART: [rt]cmd =0x44504543, len=92
3,339,467 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,577 ready_for_fw is high
1,060,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,985 >>> mbox cmd response: success
2,627,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,689,311 UART:
2,689,327 UART: Running Caliptra FMC ...
2,689,735 UART:
2,689,789 UART: [state] CFI Enabled
2,700,176 UART: [fht] FMC Alias Private Key: 7
2,807,437 UART: [art] Extend RT PCRs Done
2,807,865 UART: [art] Lock RT PCRs Done
2,809,245 UART: [art] Populate DV Done
2,817,498 UART: [fht] FMC Alias Private Key: 7
2,818,612 UART: [art] Derive CDI
2,818,892 UART: [art] Store in in slot 0x4
2,904,799 UART: [art] Derive Key Pair
2,905,159 UART: [art] Store priv key in slot 0x5
2,918,407 UART: [art] Derive Key Pair - Done
2,933,507 UART: [art] Signing Cert with AUTHO
2,933,987 UART: RITY.KEYID = 7
2,949,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,044 UART: [art] PUB.X = 9BE556466114CDAA02B323FD9CE2CCE57F472B61E171A656D3BFB138C88FCFEB2B5B40A9452ADDD6A7B25377D73C312A
2,956,829 UART: [art] PUB.Y = 40A396BE40FB2C39D915F5CD8EB25E75D0B2796DB4E40D7C538E92A007C5C30F099FA632F391F0C281C7EBA35ECD0C2B
2,963,780 UART: [art] SIG.R = D5ECD610CE4038A3AE08D38BDDC5B2792D8D524A6F7292E641D2633E76544A808503FFE35A93DB90D5618FC4DB43D7E7
2,970,554 UART: [art] SIG.S = 064BB565E093396B6714B72CD36D0B0C092A906A7DDB86DCDDDD792BC7C1A44992512EFE3E32B498D6C0712BB309E460
2,994,052 UART: Caliptra RT
2,994,305 UART: [state] CFI Enabled
3,102,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,606 UART: [rt]cmd =0x4d454153, len=108
3,155,136 >>> mbox cmd response data (12 bytes)
3,155,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,190 UART: [rt]cmd =0x44504543, len=92
3,375,662 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 ready_for_fw is high
1,060,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,433 >>> mbox cmd response: success
2,628,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,690,649 UART:
2,690,665 UART: Running Caliptra FMC ...
2,691,073 UART:
2,691,127 UART: [state] CFI Enabled
2,701,800 UART: [fht] FMC Alias Private Key: 7
2,808,873 UART: [art] Extend RT PCRs Done
2,809,301 UART: [art] Lock RT PCRs Done
2,810,763 UART: [art] Populate DV Done
2,819,126 UART: [fht] FMC Alias Private Key: 7
2,820,124 UART: [art] Derive CDI
2,820,404 UART: [art] Store in in slot 0x4
2,905,639 UART: [art] Derive Key Pair
2,905,999 UART: [art] Store priv key in slot 0x5
2,918,747 UART: [art] Derive Key Pair - Done
2,933,669 UART: [art] Signing Cert with AUTHO
2,934,149 UART: RITY.KEYID = 7
2,949,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,880 UART: [art] PUB.X = 9BE556466114CDAA02B323FD9CE2CCE57F472B61E171A656D3BFB138C88FCFEB2B5B40A9452ADDD6A7B25377D73C312A
2,956,665 UART: [art] PUB.Y = 40A396BE40FB2C39D915F5CD8EB25E75D0B2796DB4E40D7C538E92A007C5C30F099FA632F391F0C281C7EBA35ECD0C2B
2,963,616 UART: [art] SIG.R = D5ECD610CE4038A3AE08D38BDDC5B2792D8D524A6F7292E641D2633E76544A808503FFE35A93DB90D5618FC4DB43D7E7
2,970,390 UART: [art] SIG.S = 064BB565E093396B6714B72CD36D0B0C092A906A7DDB86DCDDDD792BC7C1A44992512EFE3E32B498D6C0712BB309E460
2,994,298 UART: Caliptra RT
2,994,551 UART: [state] CFI Enabled
3,102,084 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,198 UART: [rt]cmd =0x44504543, len=96
3,165,144 >>> mbox cmd response data (56 bytes)
3,165,145 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,786 UART: [rt]cmd =0x44504543, len=92
3,386,188 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.64s
Truncated 4783 bytes from beginning
7
3,130,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,321 UART: [art] PUB.X = AE26DECF19D2BE9498BDEEB0545986311065F4FA32154644A38D78D76C2D67F59D654B3E25198F6E2058A9072702D565
3,138,083 UART: [art] PUB.Y = C91DF4D96FB62E548D54C430D02AA3A1DB743ACFA7AAEFCDF22BCD34ADA25FFA31F206A30D5D242FEC6883BDAA15C1F6
3,145,061 UART: [art] SIG.R = 74FA76B918FF3181537F13BE580F2D0CAE9D477244119EF41F3678B449AB4A7DF317359D02D16425956BFDE6A41DB3F5
3,151,826 UART: [art] SIG.S = 8B7C109C438B9A926DF04702630FD759BCFBB013BE85E5B5FCF37D3804BB55045CC44E690F0F7B3280FB78CA54EE3234
3,175,589 UART: Caliptra RT
3,175,934 UART: [state] CFI Enabled
3,297,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,705 UART: [rt]cmd =0x44504543, len=92
3,518,873 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
893,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,902 UART: [kat] ++
898,054 UART: [kat] sha1
902,376 UART: [kat] SHA2-256
904,316 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,689 UART: [kat] HMAC-384Kdf
923,247 UART: [kat] LMS
1,171,575 UART: [kat] --
1,172,282 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 ready_for_fw is high
1,176,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,108 UART: [idev] --
1,211,288 UART: [ldev] ++
1,211,456 UART: [ldev] CDI.KEYID = 6
1,211,819 UART: [ldev] SUBJECT.KEYID = 5
1,212,245 UART: [ldev] AUTHORITY.KEYID = 7
1,212,708 UART: [ldev] FE.KEYID = 1
1,217,918 UART: [ldev] Erasing FE.KEYID = 1
1,243,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,297 UART: [fwproc] Wait for Commands...
1,284,059 UART: [fwproc] Recv command 0x46574c44
1,284,787 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,447 >>> mbox cmd response: success
2,776,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,777,573 UART: [afmc] ++
2,777,741 UART: [afmc] CDI.KEYID = 6
2,778,103 UART: [afmc] SUBJECT.KEYID = 7
2,778,528 UART: [afmc] AUTHORITY.KEYID = 5
2,814,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,672 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,430 UART: [afmc] --
2,857,432 UART: [cold-reset] --
2,858,518 UART: [state] Locking Datavault
2,859,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,279 UART: [state] Locking ICCM
2,860,721 UART: [exit] Launching FMC @ 0x40000130
2,866,050 UART:
2,866,066 UART: Running Caliptra FMC ...
2,866,474 UART:
2,866,617 UART: [state] CFI Enabled
2,877,374 UART: [fht] FMC Alias Private Key: 7
2,985,645 UART: [art] Extend RT PCRs Done
2,986,073 UART: [art] Lock RT PCRs Done
2,987,727 UART: [art] Populate DV Done
2,995,948 UART: [fht] FMC Alias Private Key: 7
2,997,086 UART: [art] Derive CDI
2,997,366 UART: [art] Store in in slot 0x4
3,083,065 UART: [art] Derive Key Pair
3,083,425 UART: [art] Store priv key in slot 0x5
3,097,061 UART: [art] Derive Key Pair - Done
3,111,817 UART: [art] Signing Cert with AUTHO
3,112,297 UART: RITY.KEYID = 7
3,127,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,964 UART: [art] PUB.X = AE26DECF19D2BE9498BDEEB0545986311065F4FA32154644A38D78D76C2D67F59D654B3E25198F6E2058A9072702D565
3,134,726 UART: [art] PUB.Y = C91DF4D96FB62E548D54C430D02AA3A1DB743ACFA7AAEFCDF22BCD34ADA25FFA31F206A30D5D242FEC6883BDAA15C1F6
3,141,704 UART: [art] SIG.R = 74FA76B918FF3181537F13BE580F2D0CAE9D477244119EF41F3678B449AB4A7DF317359D02D16425956BFDE6A41DB3F5
3,148,469 UART: [art] SIG.S = 8B7C109C438B9A926DF04702630FD759BCFBB013BE85E5B5FCF37D3804BB55045CC44E690F0F7B3280FB78CA54EE3234
3,171,916 UART: Caliptra RT
3,172,261 UART: [state] CFI Enabled
3,280,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,616 UART: [rt]cmd =0x4d454153, len=108
3,331,920 >>> mbox cmd response data (12 bytes)
3,331,921 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,046 UART: [rt]cmd =0x44504543, len=92
3,553,276 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,178 UART: [kat] SHA2-256
904,118 UART: [kat] SHA2-384
906,871 UART: [kat] SHA2-512-ACC
908,772 UART: [kat] ECC-384
918,067 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,171,656 UART: [cold-reset] ++
1,172,210 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 ready_for_fw is high
1,176,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,014 UART: [idev] Sha1 KeyId Algorithm
1,209,500 UART: [idev] --
1,210,686 UART: [ldev] ++
1,210,854 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,643 UART: [ldev] AUTHORITY.KEYID = 7
1,212,106 UART: [ldev] FE.KEYID = 1
1,217,164 UART: [ldev] Erasing FE.KEYID = 1
1,243,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,099 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,139 >>> mbox cmd response: success
2,777,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,778,219 UART: [afmc] ++
2,778,387 UART: [afmc] CDI.KEYID = 6
2,778,749 UART: [afmc] SUBJECT.KEYID = 7
2,779,174 UART: [afmc] AUTHORITY.KEYID = 5
2,814,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,884 UART: [afmc] --
2,857,912 UART: [cold-reset] --
2,858,850 UART: [state] Locking Datavault
2,860,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,609 UART: [state] Locking ICCM
2,861,059 UART: [exit] Launching FMC @ 0x40000130
2,866,388 UART:
2,866,404 UART: Running Caliptra FMC ...
2,866,812 UART:
2,866,955 UART: [state] CFI Enabled
2,877,608 UART: [fht] FMC Alias Private Key: 7
2,985,599 UART: [art] Extend RT PCRs Done
2,986,027 UART: [art] Lock RT PCRs Done
2,987,905 UART: [art] Populate DV Done
2,996,152 UART: [fht] FMC Alias Private Key: 7
2,997,190 UART: [art] Derive CDI
2,997,470 UART: [art] Store in in slot 0x4
3,083,119 UART: [art] Derive Key Pair
3,083,479 UART: [art] Store priv key in slot 0x5
3,096,761 UART: [art] Derive Key Pair - Done
3,111,663 UART: [art] Signing Cert with AUTHO
3,112,143 UART: RITY.KEYID = 7
3,127,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,066 UART: [art] PUB.X = AE26DECF19D2BE9498BDEEB0545986311065F4FA32154644A38D78D76C2D67F59D654B3E25198F6E2058A9072702D565
3,134,828 UART: [art] PUB.Y = C91DF4D96FB62E548D54C430D02AA3A1DB743ACFA7AAEFCDF22BCD34ADA25FFA31F206A30D5D242FEC6883BDAA15C1F6
3,141,806 UART: [art] SIG.R = 74FA76B918FF3181537F13BE580F2D0CAE9D477244119EF41F3678B449AB4A7DF317359D02D16425956BFDE6A41DB3F5
3,148,571 UART: [art] SIG.S = 8B7C109C438B9A926DF04702630FD759BCFBB013BE85E5B5FCF37D3804BB55045CC44E690F0F7B3280FB78CA54EE3234
3,172,718 UART: Caliptra RT
3,173,063 UART: [state] CFI Enabled
3,282,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,930 UART: [rt]cmd =0x44504543, len=96
3,346,278 >>> mbox cmd response data (56 bytes)
3,346,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,268 UART: [rt]cmd =0x44504543, len=92
3,567,036 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,066 >>> mbox cmd response data (12 bytes)
1,144,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,632,211 >>> mbox cmd response: success
2,632,211 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,694,571 UART:
2,694,587 UART: Running Caliptra FMC ...
2,694,995 UART:
2,695,138 UART: [state] CFI Enabled
2,705,903 UART: [fht] FMC Alias Private Key: 7
2,814,148 UART: [art] Extend RT PCRs Done
2,814,576 UART: [art] Lock RT PCRs Done
2,815,976 UART: [art] Populate DV Done
2,824,197 UART: [fht] FMC Alias Private Key: 7
2,825,225 UART: [art] Derive CDI
2,825,505 UART: [art] Store in in slot 0x4
2,910,852 UART: [art] Derive Key Pair
2,911,212 UART: [art] Store priv key in slot 0x5
2,924,756 UART: [art] Derive Key Pair - Done
2,939,566 UART: [art] Signing Cert with AUTHO
2,940,046 UART: RITY.KEYID = 7
2,955,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,957 UART: [art] PUB.X = 50299C24F37201866902F20719D5705928B0D49939875F70CDFA64878923498AF8679F99B812AB4DF297B0F7FBC05C00
2,962,684 UART: [art] PUB.Y = 8B34EDE702FD723E23AF5A6F023671CC56BC7807DFF817736BD17919A3D6D4281D87243293B0C0FF4020CDB29F87BD6B
2,969,633 UART: [art] SIG.R = FED4314270E57FE104056211BC443AECD6B473BDBAF9585CAFE239B2AF8FC4B96128E5D142631014BCA687E94F3A8C3A
2,976,411 UART: [art] SIG.S = D008CC936047D55F55C00C38C082E13C1A378304371560373F6A7C9518D50840C220A6D8217A6C37B92582C4D6C7ED0A
3,000,301 UART: Caliptra RT
3,000,646 UART: [state] CFI Enabled
3,122,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,153,144 UART: [rt]cmd =0x44504543, len=92
3,344,716 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,820 ready_for_fw is high
1,060,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,348 >>> mbox cmd response: success
2,629,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,692,446 UART:
2,692,462 UART: Running Caliptra FMC ...
2,692,870 UART:
2,693,013 UART: [state] CFI Enabled
2,703,740 UART: [fht] FMC Alias Private Key: 7
2,811,519 UART: [art] Extend RT PCRs Done
2,811,947 UART: [art] Lock RT PCRs Done
2,813,323 UART: [art] Populate DV Done
2,821,522 UART: [fht] FMC Alias Private Key: 7
2,822,660 UART: [art] Derive CDI
2,822,940 UART: [art] Store in in slot 0x4
2,908,785 UART: [art] Derive Key Pair
2,909,145 UART: [art] Store priv key in slot 0x5
2,922,789 UART: [art] Derive Key Pair - Done
2,937,557 UART: [art] Signing Cert with AUTHO
2,938,037 UART: RITY.KEYID = 7
2,953,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,088 UART: [art] PUB.X = 50299C24F37201866902F20719D5705928B0D49939875F70CDFA64878923498AF8679F99B812AB4DF297B0F7FBC05C00
2,960,815 UART: [art] PUB.Y = 8B34EDE702FD723E23AF5A6F023671CC56BC7807DFF817736BD17919A3D6D4281D87243293B0C0FF4020CDB29F87BD6B
2,967,764 UART: [art] SIG.R = FED4314270E57FE104056211BC443AECD6B473BDBAF9585CAFE239B2AF8FC4B96128E5D142631014BCA687E94F3A8C3A
2,974,542 UART: [art] SIG.S = D008CC936047D55F55C00C38C082E13C1A378304371560373F6A7C9518D50840C220A6D8217A6C37B92582C4D6C7ED0A
2,997,986 UART: Caliptra RT
2,998,331 UART: [state] CFI Enabled
3,106,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,029 UART: [rt]cmd =0x4d454153, len=108
3,158,859 >>> mbox cmd response data (12 bytes)
3,158,860 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,611 UART: [rt]cmd =0x44504543, len=92
3,379,945 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,782 ready_for_fw is high
1,059,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,784 >>> mbox cmd response: success
2,628,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,690,588 UART:
2,690,604 UART: Running Caliptra FMC ...
2,691,012 UART:
2,691,155 UART: [state] CFI Enabled
2,701,842 UART: [fht] FMC Alias Private Key: 7
2,809,149 UART: [art] Extend RT PCRs Done
2,809,577 UART: [art] Lock RT PCRs Done
2,811,235 UART: [art] Populate DV Done
2,819,292 UART: [fht] FMC Alias Private Key: 7
2,820,380 UART: [art] Derive CDI
2,820,660 UART: [art] Store in in slot 0x4
2,906,505 UART: [art] Derive Key Pair
2,906,865 UART: [art] Store priv key in slot 0x5
2,919,875 UART: [art] Derive Key Pair - Done
2,934,623 UART: [art] Signing Cert with AUTHO
2,935,103 UART: RITY.KEYID = 7
2,950,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,950 UART: [art] PUB.X = 50299C24F37201866902F20719D5705928B0D49939875F70CDFA64878923498AF8679F99B812AB4DF297B0F7FBC05C00
2,957,677 UART: [art] PUB.Y = 8B34EDE702FD723E23AF5A6F023671CC56BC7807DFF817736BD17919A3D6D4281D87243293B0C0FF4020CDB29F87BD6B
2,964,626 UART: [art] SIG.R = FED4314270E57FE104056211BC443AECD6B473BDBAF9585CAFE239B2AF8FC4B96128E5D142631014BCA687E94F3A8C3A
2,971,404 UART: [art] SIG.S = D008CC936047D55F55C00C38C082E13C1A378304371560373F6A7C9518D50840C220A6D8217A6C37B92582C4D6C7ED0A
2,995,472 UART: Caliptra RT
2,995,817 UART: [state] CFI Enabled
3,104,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,317 UART: [rt]cmd =0x44504543, len=96
3,168,541 >>> mbox cmd response data (56 bytes)
3,168,542 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,401 UART: [rt]cmd =0x44504543, len=92
3,390,517 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.69s
Truncated 4783 bytes from beginning
7
3,126,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,534 UART: [art] PUB.X = 9CC2F77D33BCDC908F3F11A7D66F02687DEDDE4C43FC3840CCB0D9C8159A18C3E79BF2105F4D29AB6558780027D1E9E1
3,134,293 UART: [art] PUB.Y = 6298234B2C327A1F5C03C8D734108AACFC26333E678FA10DACD10735FDA8EC0AD6B4051D8A85135F1080FBD18F6A9130
3,141,236 UART: [art] SIG.R = 4989322B654C4A520441B230B6BBCE2961DAC6B7F20C509B09C0F3953A299570D80C2673023290067A9A1360625F15D5
3,147,976 UART: [art] SIG.S = 2AA1B3EB39CC6295D83ADDBCE064987542EE812E90D38B3D04DC76E557E4D93DAB0664168E5749FADB72F7042C740427
3,171,547 UART: Caliptra RT
3,171,800 UART: [state] CFI Enabled
3,292,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,523 UART: [rt]cmd =0x44504543, len=92
3,514,485 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,867 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
890,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,887 UART: [kat] ++
895,039 UART: [kat] sha1
899,205 UART: [kat] SHA2-256
901,145 UART: [kat] SHA2-384
903,902 UART: [kat] SHA2-512-ACC
905,803 UART: [kat] ECC-384
915,322 UART: [kat] HMAC-384Kdf
919,914 UART: [kat] LMS
1,168,226 UART: [kat] --
1,169,481 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,615 UART: [idev] ++
1,172,783 UART: [idev] CDI.KEYID = 6
1,173,144 UART: [idev] SUBJECT.KEYID = 7
1,173,569 UART: [idev] UDS.KEYID = 0
1,173,915 ready_for_fw is high
1,173,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,851 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,936 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,384 UART: [ldev] --
1,280,856 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,988 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,862 >>> mbox cmd response: success
2,772,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,773,979 UART: [afmc] ++
2,774,147 UART: [afmc] CDI.KEYID = 6
2,774,510 UART: [afmc] SUBJECT.KEYID = 7
2,774,936 UART: [afmc] AUTHORITY.KEYID = 5
2,810,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,178 UART: [afmc] --
2,853,076 UART: [cold-reset] --
2,853,966 UART: [state] Locking Datavault
2,854,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,343 UART: [state] Locking ICCM
2,855,841 UART: [exit] Launching FMC @ 0x40000130
2,861,170 UART:
2,861,186 UART: Running Caliptra FMC ...
2,861,594 UART:
2,861,648 UART: [state] CFI Enabled
2,872,213 UART: [fht] FMC Alias Private Key: 7
2,980,418 UART: [art] Extend RT PCRs Done
2,980,846 UART: [art] Lock RT PCRs Done
2,982,168 UART: [art] Populate DV Done
2,990,349 UART: [fht] FMC Alias Private Key: 7
2,991,325 UART: [art] Derive CDI
2,991,605 UART: [art] Store in in slot 0x4
3,077,334 UART: [art] Derive Key Pair
3,077,694 UART: [art] Store priv key in slot 0x5
3,090,826 UART: [art] Derive Key Pair - Done
3,105,624 UART: [art] Signing Cert with AUTHO
3,106,104 UART: RITY.KEYID = 7
3,120,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,655 UART: [art] PUB.X = 9CC2F77D33BCDC908F3F11A7D66F02687DEDDE4C43FC3840CCB0D9C8159A18C3E79BF2105F4D29AB6558780027D1E9E1
3,128,414 UART: [art] PUB.Y = 6298234B2C327A1F5C03C8D734108AACFC26333E678FA10DACD10735FDA8EC0AD6B4051D8A85135F1080FBD18F6A9130
3,135,357 UART: [art] SIG.R = 4989322B654C4A520441B230B6BBCE2961DAC6B7F20C509B09C0F3953A299570D80C2673023290067A9A1360625F15D5
3,142,097 UART: [art] SIG.S = 2AA1B3EB39CC6295D83ADDBCE064987542EE812E90D38B3D04DC76E557E4D93DAB0664168E5749FADB72F7042C740427
3,165,778 UART: Caliptra RT
3,166,031 UART: [state] CFI Enabled
3,273,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,206 UART: [rt]cmd =0x4d454153, len=108
3,325,980 >>> mbox cmd response data (12 bytes)
3,325,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,598 UART: [rt]cmd =0x44504543, len=92
3,547,188 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,174,797 ready_for_fw is high
1,174,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,671 UART: [idev] Erasing UDS.KEYID = 0
1,199,565 UART: [idev] Sha1 KeyId Algorithm
1,208,201 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,242,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,308 UART: [ldev] --
1,281,668 UART: [fwproc] Wait for Commands...
1,282,309 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,014 >>> mbox cmd response: success
2,774,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,071 UART: [afmc] ++
2,775,239 UART: [afmc] CDI.KEYID = 6
2,775,602 UART: [afmc] SUBJECT.KEYID = 7
2,776,028 UART: [afmc] AUTHORITY.KEYID = 5
2,812,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,264 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,408 UART: [afmc] --
2,855,492 UART: [cold-reset] --
2,856,250 UART: [state] Locking Datavault
2,857,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,079 UART: [state] Locking ICCM
2,858,643 UART: [exit] Launching FMC @ 0x40000130
2,863,972 UART:
2,863,988 UART: Running Caliptra FMC ...
2,864,396 UART:
2,864,450 UART: [state] CFI Enabled
2,874,915 UART: [fht] FMC Alias Private Key: 7
2,983,080 UART: [art] Extend RT PCRs Done
2,983,508 UART: [art] Lock RT PCRs Done
2,985,328 UART: [art] Populate DV Done
2,993,617 UART: [fht] FMC Alias Private Key: 7
2,994,589 UART: [art] Derive CDI
2,994,869 UART: [art] Store in in slot 0x4
3,080,592 UART: [art] Derive Key Pair
3,080,952 UART: [art] Store priv key in slot 0x5
3,093,708 UART: [art] Derive Key Pair - Done
3,108,616 UART: [art] Signing Cert with AUTHO
3,109,096 UART: RITY.KEYID = 7
3,124,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,017 UART: [art] PUB.X = 9CC2F77D33BCDC908F3F11A7D66F02687DEDDE4C43FC3840CCB0D9C8159A18C3E79BF2105F4D29AB6558780027D1E9E1
3,131,776 UART: [art] PUB.Y = 6298234B2C327A1F5C03C8D734108AACFC26333E678FA10DACD10735FDA8EC0AD6B4051D8A85135F1080FBD18F6A9130
3,138,719 UART: [art] SIG.R = 4989322B654C4A520441B230B6BBCE2961DAC6B7F20C509B09C0F3953A299570D80C2673023290067A9A1360625F15D5
3,145,459 UART: [art] SIG.S = 2AA1B3EB39CC6295D83ADDBCE064987542EE812E90D38B3D04DC76E557E4D93DAB0664168E5749FADB72F7042C740427
3,169,882 UART: Caliptra RT
3,170,135 UART: [state] CFI Enabled
3,276,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,848 UART: [rt]cmd =0x44504543, len=96
3,341,870 >>> mbox cmd response data (56 bytes)
3,341,871 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,908 UART: [rt]cmd =0x44504543, len=92
3,563,906 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,976 >>> mbox cmd response data (12 bytes)
1,138,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,708 >>> mbox cmd response: success
2,627,708 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,520 UART:
2,689,536 UART: Running Caliptra FMC ...
2,689,944 UART:
2,689,998 UART: [state] CFI Enabled
2,700,453 UART: [fht] FMC Alias Private Key: 7
2,808,100 UART: [art] Extend RT PCRs Done
2,808,528 UART: [art] Lock RT PCRs Done
2,810,218 UART: [art] Populate DV Done
2,818,515 UART: [fht] FMC Alias Private Key: 7
2,819,503 UART: [art] Derive CDI
2,819,783 UART: [art] Store in in slot 0x4
2,905,246 UART: [art] Derive Key Pair
2,905,606 UART: [art] Store priv key in slot 0x5
2,919,266 UART: [art] Derive Key Pair - Done
2,934,265 UART: [art] Signing Cert with AUTHO
2,934,745 UART: RITY.KEYID = 7
2,949,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,086 UART: [art] PUB.X = F5B3674BA0AD354CEF77C6A690F367F13101E6E9280EB4C946B6F268F24EB15901E2C3B470566B49C21793F4415B79F1
2,956,847 UART: [art] PUB.Y = 6ACE3264CF116A81AB63E5BCDE9B98C5CE4A936E5F23FF62EE38E3BCF5920A28BEE739BD9547739972714AA62E2EC54F
2,963,812 UART: [art] SIG.R = AEEFCEEFD1FF38A1A9EC976FB36A1A5731E9E2ECA99933A7DBE1ABC1E647C1C295D2056762BD27A43982BF4074C31768
2,970,599 UART: [art] SIG.S = 3E61D8F598A3E11F0117B57F567149984820AF6D44AF2C84FA41EAEC7EE634CB2B0A2D9F85938D63A0A889E7BD26CC72
2,994,138 UART: Caliptra RT
2,994,391 UART: [state] CFI Enabled
3,113,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,556 UART: [rt]cmd =0x44504543, len=92
3,336,077 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,404 ready_for_fw is high
1,055,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,402 >>> mbox cmd response: success
2,621,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,682,762 UART:
2,682,778 UART: Running Caliptra FMC ...
2,683,186 UART:
2,683,240 UART: [state] CFI Enabled
2,693,715 UART: [fht] FMC Alias Private Key: 7
2,801,510 UART: [art] Extend RT PCRs Done
2,801,938 UART: [art] Lock RT PCRs Done
2,803,030 UART: [art] Populate DV Done
2,811,097 UART: [fht] FMC Alias Private Key: 7
2,812,215 UART: [art] Derive CDI
2,812,495 UART: [art] Store in in slot 0x4
2,898,020 UART: [art] Derive Key Pair
2,898,380 UART: [art] Store priv key in slot 0x5
2,911,096 UART: [art] Derive Key Pair - Done
2,925,625 UART: [art] Signing Cert with AUTHO
2,926,105 UART: RITY.KEYID = 7
2,940,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,740 UART: [art] PUB.X = F5B3674BA0AD354CEF77C6A690F367F13101E6E9280EB4C946B6F268F24EB15901E2C3B470566B49C21793F4415B79F1
2,948,501 UART: [art] PUB.Y = 6ACE3264CF116A81AB63E5BCDE9B98C5CE4A936E5F23FF62EE38E3BCF5920A28BEE739BD9547739972714AA62E2EC54F
2,955,466 UART: [art] SIG.R = AEEFCEEFD1FF38A1A9EC976FB36A1A5731E9E2ECA99933A7DBE1ABC1E647C1C295D2056762BD27A43982BF4074C31768
2,962,253 UART: [art] SIG.S = 3E61D8F598A3E11F0117B57F567149984820AF6D44AF2C84FA41EAEC7EE634CB2B0A2D9F85938D63A0A889E7BD26CC72
2,986,286 UART: Caliptra RT
2,986,539 UART: [state] CFI Enabled
3,094,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,132 UART: [rt]cmd =0x4d454153, len=108
3,145,812 >>> mbox cmd response data (12 bytes)
3,145,813 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,700 UART: [rt]cmd =0x44504543, len=92
3,366,941 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,738 ready_for_fw is high
1,055,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,712 >>> mbox cmd response: success
2,622,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,518 UART:
2,685,534 UART: Running Caliptra FMC ...
2,685,942 UART:
2,685,996 UART: [state] CFI Enabled
2,696,135 UART: [fht] FMC Alias Private Key: 7
2,804,094 UART: [art] Extend RT PCRs Done
2,804,522 UART: [art] Lock RT PCRs Done
2,806,198 UART: [art] Populate DV Done
2,814,341 UART: [fht] FMC Alias Private Key: 7
2,815,331 UART: [art] Derive CDI
2,815,611 UART: [art] Store in in slot 0x4
2,901,176 UART: [art] Derive Key Pair
2,901,536 UART: [art] Store priv key in slot 0x5
2,914,532 UART: [art] Derive Key Pair - Done
2,928,943 UART: [art] Signing Cert with AUTHO
2,929,423 UART: RITY.KEYID = 7
2,944,547 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,312 UART: [art] PUB.X = F5B3674BA0AD354CEF77C6A690F367F13101E6E9280EB4C946B6F268F24EB15901E2C3B470566B49C21793F4415B79F1
2,952,073 UART: [art] PUB.Y = 6ACE3264CF116A81AB63E5BCDE9B98C5CE4A936E5F23FF62EE38E3BCF5920A28BEE739BD9547739972714AA62E2EC54F
2,959,038 UART: [art] SIG.R = AEEFCEEFD1FF38A1A9EC976FB36A1A5731E9E2ECA99933A7DBE1ABC1E647C1C295D2056762BD27A43982BF4074C31768
2,965,825 UART: [art] SIG.S = 3E61D8F598A3E11F0117B57F567149984820AF6D44AF2C84FA41EAEC7EE634CB2B0A2D9F85938D63A0A889E7BD26CC72
2,989,880 UART: Caliptra RT
2,990,133 UART: [state] CFI Enabled
3,097,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,942 UART: [rt]cmd =0x44504543, len=96
3,160,528 >>> mbox cmd response data (56 bytes)
3,160,529 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,420 UART: [rt]cmd =0x44504543, len=92
3,382,195 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.65s
Truncated 4783 bytes from beginning
7
3,128,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,311 UART: [art] PUB.X = AFA3AF751D05C1D71AE572A504EBD0EFCADF05960FFCAC06D09251978080AFF310423BC0DDBE09CD57858799DA9DEC0E
3,136,084 UART: [art] PUB.Y = 139B4BFFDA92E921534A1F17862A571821477929C8167659B464556A285D1C97FAD981736DBDA16956085FF61F3223A7
3,143,021 UART: [art] SIG.R = 1EB6B688B064D6AE6003F5DD16C692F54520C0C1C69F1F7C6C09F9B791E2A475B5A7A5A5279E1FD7CC2E506391F4947D
3,149,793 UART: [art] SIG.S = 2C2ED074A4ED6284C0B31AC6E0B81BCE07731AE4759A7F184D6CACE21F78CA335920AD364D92006D866ADFB91DB218D6
3,173,949 UART: Caliptra RT
3,174,294 UART: [state] CFI Enabled
3,294,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,693 UART: [rt]cmd =0x44504543, len=92
3,517,137 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,594 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,307 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,359 >>> mbox cmd response: success
2,774,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,420 UART: [afmc] ++
2,775,588 UART: [afmc] CDI.KEYID = 6
2,775,951 UART: [afmc] SUBJECT.KEYID = 7
2,776,377 UART: [afmc] AUTHORITY.KEYID = 5
2,812,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,483 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,814 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,729 UART: [afmc] --
2,855,713 UART: [cold-reset] --
2,856,381 UART: [state] Locking Datavault
2,857,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,316 UART: [state] Locking ICCM
2,858,816 UART: [exit] Launching FMC @ 0x40000130
2,864,145 UART:
2,864,161 UART: Running Caliptra FMC ...
2,864,569 UART:
2,864,712 UART: [state] CFI Enabled
2,875,667 UART: [fht] FMC Alias Private Key: 7
2,984,016 UART: [art] Extend RT PCRs Done
2,984,444 UART: [art] Lock RT PCRs Done
2,985,990 UART: [art] Populate DV Done
2,994,357 UART: [fht] FMC Alias Private Key: 7
2,995,519 UART: [art] Derive CDI
2,995,799 UART: [art] Store in in slot 0x4
3,081,190 UART: [art] Derive Key Pair
3,081,550 UART: [art] Store priv key in slot 0x5
3,094,694 UART: [art] Derive Key Pair - Done
3,109,435 UART: [art] Signing Cert with AUTHO
3,109,915 UART: RITY.KEYID = 7
3,124,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,578 UART: [art] PUB.X = AFA3AF751D05C1D71AE572A504EBD0EFCADF05960FFCAC06D09251978080AFF310423BC0DDBE09CD57858799DA9DEC0E
3,132,351 UART: [art] PUB.Y = 139B4BFFDA92E921534A1F17862A571821477929C8167659B464556A285D1C97FAD981736DBDA16956085FF61F3223A7
3,139,288 UART: [art] SIG.R = 1EB6B688B064D6AE6003F5DD16C692F54520C0C1C69F1F7C6C09F9B791E2A475B5A7A5A5279E1FD7CC2E506391F4947D
3,146,060 UART: [art] SIG.S = 2C2ED074A4ED6284C0B31AC6E0B81BCE07731AE4759A7F184D6CACE21F78CA335920AD364D92006D866ADFB91DB218D6
3,170,218 UART: Caliptra RT
3,170,563 UART: [state] CFI Enabled
3,278,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,634 UART: [rt]cmd =0x4d454153, len=108
3,329,790 >>> mbox cmd response data (12 bytes)
3,329,791 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,626 UART: [rt]cmd =0x44504543, len=92
3,551,162 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,907 UART: [state] LifecycleState = Unprovisioned
86,562 UART: [state] DebugLocked = No
87,286 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,154 UART: [kat] ++
896,306 UART: [kat] sha1
900,542 UART: [kat] SHA2-256
902,482 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,170,976 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 ready_for_fw is high
1,174,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,797 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,277 >>> mbox cmd response: success
2,774,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,542 UART: [afmc] ++
2,775,710 UART: [afmc] CDI.KEYID = 6
2,776,073 UART: [afmc] SUBJECT.KEYID = 7
2,776,499 UART: [afmc] AUTHORITY.KEYID = 5
2,812,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,661 UART: [afmc] --
2,855,573 UART: [cold-reset] --
2,856,603 UART: [state] Locking Datavault
2,857,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,390 UART: [state] Locking ICCM
2,858,990 UART: [exit] Launching FMC @ 0x40000130
2,864,319 UART:
2,864,335 UART: Running Caliptra FMC ...
2,864,743 UART:
2,864,886 UART: [state] CFI Enabled
2,875,371 UART: [fht] FMC Alias Private Key: 7
2,983,260 UART: [art] Extend RT PCRs Done
2,983,688 UART: [art] Lock RT PCRs Done
2,985,120 UART: [art] Populate DV Done
2,993,537 UART: [fht] FMC Alias Private Key: 7
2,994,595 UART: [art] Derive CDI
2,994,875 UART: [art] Store in in slot 0x4
3,080,672 UART: [art] Derive Key Pair
3,081,032 UART: [art] Store priv key in slot 0x5
3,094,158 UART: [art] Derive Key Pair - Done
3,109,097 UART: [art] Signing Cert with AUTHO
3,109,577 UART: RITY.KEYID = 7
3,124,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,596 UART: [art] PUB.X = AFA3AF751D05C1D71AE572A504EBD0EFCADF05960FFCAC06D09251978080AFF310423BC0DDBE09CD57858799DA9DEC0E
3,132,369 UART: [art] PUB.Y = 139B4BFFDA92E921534A1F17862A571821477929C8167659B464556A285D1C97FAD981736DBDA16956085FF61F3223A7
3,139,306 UART: [art] SIG.R = 1EB6B688B064D6AE6003F5DD16C692F54520C0C1C69F1F7C6C09F9B791E2A475B5A7A5A5279E1FD7CC2E506391F4947D
3,146,078 UART: [art] SIG.S = 2C2ED074A4ED6284C0B31AC6E0B81BCE07731AE4759A7F184D6CACE21F78CA335920AD364D92006D866ADFB91DB218D6
3,169,934 UART: Caliptra RT
3,170,279 UART: [state] CFI Enabled
3,279,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,212 UART: [rt]cmd =0x44504543, len=96
3,343,058 >>> mbox cmd response data (56 bytes)
3,343,059 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,088 UART: [rt]cmd =0x44504543, len=92
3,564,398 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,729 >>> mbox cmd response data (12 bytes)
1,139,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,349 >>> mbox cmd response: success
2,628,349 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,211 UART:
2,691,227 UART: Running Caliptra FMC ...
2,691,635 UART:
2,691,778 UART: [state] CFI Enabled
2,702,151 UART: [fht] FMC Alias Private Key: 7
2,810,418 UART: [art] Extend RT PCRs Done
2,810,846 UART: [art] Lock RT PCRs Done
2,812,124 UART: [art] Populate DV Done
2,820,293 UART: [fht] FMC Alias Private Key: 7
2,821,423 UART: [art] Derive CDI
2,821,703 UART: [art] Store in in slot 0x4
2,907,678 UART: [art] Derive Key Pair
2,908,038 UART: [art] Store priv key in slot 0x5
2,921,348 UART: [art] Derive Key Pair - Done
2,936,077 UART: [art] Signing Cert with AUTHO
2,936,557 UART: RITY.KEYID = 7
2,951,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,162 UART: [art] PUB.X = EBD4769AA375FC3A1CDCDAE2D2E4307F6BFD91CB5F905DFE3EC91E83DC33177617D0CFCCB50164EA1E0D4AFC8F942A93
2,958,956 UART: [art] PUB.Y = 3B2B48DFD9DC1ADCB24B0767411F0AC787E8A1886D17717C4E821C82D35536368DA76DBEBE604D8B78D5B27B41D78955
2,965,908 UART: [art] SIG.R = 71F3187BAE911EE8BF784DF4A1A69029F7532BCEF1D92CC21DC7CB43F9D94A8280FEE8C282F8D4B7B07D72BE7B5CE455
2,972,698 UART: [art] SIG.S = F22663B7E389C2B47A5E400C94C0131F641E1486D49E2897A9574178B7179371CD12C80C045F1522F7EA394D1929FBD9
2,995,778 UART: Caliptra RT
2,996,123 UART: [state] CFI Enabled
3,116,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,364 UART: [rt]cmd =0x44504543, len=92
3,339,240 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,239 ready_for_fw is high
1,056,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,555 >>> mbox cmd response: success
2,625,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,687,539 UART:
2,687,555 UART: Running Caliptra FMC ...
2,687,963 UART:
2,688,106 UART: [state] CFI Enabled
2,698,695 UART: [fht] FMC Alias Private Key: 7
2,807,036 UART: [art] Extend RT PCRs Done
2,807,464 UART: [art] Lock RT PCRs Done
2,808,990 UART: [art] Populate DV Done
2,816,955 UART: [fht] FMC Alias Private Key: 7
2,818,111 UART: [art] Derive CDI
2,818,391 UART: [art] Store in in slot 0x4
2,904,186 UART: [art] Derive Key Pair
2,904,546 UART: [art] Store priv key in slot 0x5
2,917,676 UART: [art] Derive Key Pair - Done
2,932,675 UART: [art] Signing Cert with AUTHO
2,933,155 UART: RITY.KEYID = 7
2,947,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,572 UART: [art] PUB.X = EBD4769AA375FC3A1CDCDAE2D2E4307F6BFD91CB5F905DFE3EC91E83DC33177617D0CFCCB50164EA1E0D4AFC8F942A93
2,955,366 UART: [art] PUB.Y = 3B2B48DFD9DC1ADCB24B0767411F0AC787E8A1886D17717C4E821C82D35536368DA76DBEBE604D8B78D5B27B41D78955
2,962,318 UART: [art] SIG.R = 71F3187BAE911EE8BF784DF4A1A69029F7532BCEF1D92CC21DC7CB43F9D94A8280FEE8C282F8D4B7B07D72BE7B5CE455
2,969,108 UART: [art] SIG.S = F22663B7E389C2B47A5E400C94C0131F641E1486D49E2897A9574178B7179371CD12C80C045F1522F7EA394D1929FBD9
2,993,006 UART: Caliptra RT
2,993,351 UART: [state] CFI Enabled
3,100,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,156 UART: [rt]cmd =0x4d454153, len=108
3,153,000 >>> mbox cmd response data (12 bytes)
3,153,001 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,828 UART: [rt]cmd =0x44504543, len=92
3,374,718 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,711 ready_for_fw is high
1,055,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,829 >>> mbox cmd response: success
2,623,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,383 UART:
2,685,399 UART: Running Caliptra FMC ...
2,685,807 UART:
2,685,950 UART: [state] CFI Enabled
2,696,669 UART: [fht] FMC Alias Private Key: 7
2,804,198 UART: [art] Extend RT PCRs Done
2,804,626 UART: [art] Lock RT PCRs Done
2,806,112 UART: [art] Populate DV Done
2,814,593 UART: [fht] FMC Alias Private Key: 7
2,815,687 UART: [art] Derive CDI
2,815,967 UART: [art] Store in in slot 0x4
2,901,376 UART: [art] Derive Key Pair
2,901,736 UART: [art] Store priv key in slot 0x5
2,914,604 UART: [art] Derive Key Pair - Done
2,929,331 UART: [art] Signing Cert with AUTHO
2,929,811 UART: RITY.KEYID = 7
2,945,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,874 UART: [art] PUB.X = EBD4769AA375FC3A1CDCDAE2D2E4307F6BFD91CB5F905DFE3EC91E83DC33177617D0CFCCB50164EA1E0D4AFC8F942A93
2,952,668 UART: [art] PUB.Y = 3B2B48DFD9DC1ADCB24B0767411F0AC787E8A1886D17717C4E821C82D35536368DA76DBEBE604D8B78D5B27B41D78955
2,959,620 UART: [art] SIG.R = 71F3187BAE911EE8BF784DF4A1A69029F7532BCEF1D92CC21DC7CB43F9D94A8280FEE8C282F8D4B7B07D72BE7B5CE455
2,966,410 UART: [art] SIG.S = F22663B7E389C2B47A5E400C94C0131F641E1486D49E2897A9574178B7179371CD12C80C045F1522F7EA394D1929FBD9
2,990,576 UART: Caliptra RT
2,990,921 UART: [state] CFI Enabled
3,099,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,884 UART: [rt]cmd =0x44504543, len=96
3,163,894 >>> mbox cmd response data (56 bytes)
3,163,895 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,842 UART: [rt]cmd =0x44504543, len=92
3,385,536 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,228 UART:
192,581 UART: Running Caliptra ROM ...
193,774 UART:
193,931 UART: [state] CFI Enabled
263,742 UART: [state] LifecycleState = Unprovisioned
265,658 UART: [state] DebugLocked = No
267,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,638 UART: [kat] SHA2-256
442,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,866 UART: [kat] ++
453,356 UART: [kat] sha1
463,664 UART: [kat] SHA2-256
466,300 UART: [kat] SHA2-384
472,621 UART: [kat] SHA2-512-ACC
474,996 UART: [kat] ECC-384
2,768,910 UART: [kat] HMAC-384Kdf
2,792,057 UART: [kat] LMS
3,982,341 UART: [kat] --
3,986,934 UART: [cold-reset] ++
3,987,831 UART: [fht] Storing FHT @ 0x50003400
3,997,901 UART: [idev] ++
3,998,469 UART: [idev] CDI.KEYID = 6
3,999,525 UART: [idev] SUBJECT.KEYID = 7
4,000,710 UART: [idev] UDS.KEYID = 0
4,001,776 ready_for_fw is high
4,001,989 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,145,464 UART: [idev] Erasing UDS.KEYID = 0
7,337,441 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,921 UART: [idev] --
7,363,706 UART: [ldev] ++
7,364,284 UART: [ldev] CDI.KEYID = 6
7,365,254 UART: [ldev] SUBJECT.KEYID = 5
7,366,464 UART: [ldev] AUTHORITY.KEYID = 7
7,367,702 UART: [ldev] FE.KEYID = 1
7,412,905 UART: [ldev] Erasing FE.KEYID = 1
10,744,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,925 UART: [ldev] --
13,107,816 UART: [fwproc] Waiting for Commands...
13,110,808 UART: [fwproc] Received command 0x46574c44
13,113,050 UART: [fwproc] Received Image of size 114124 bytes
17,178,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,639,384 >>> mbox cmd response: success
17,639,908 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,643,181 UART: [afmc] ++
17,643,765 UART: [afmc] CDI.KEYID = 6
17,644,653 UART: [afmc] SUBJECT.KEYID = 7
17,645,921 UART: [afmc] AUTHORITY.KEYID = 5
21,017,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,375 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,636 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,337,064 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,884 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,366,306 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,388,005 UART: [afmc] --
23,391,764 UART: [cold-reset] --
23,395,787 UART: [state] Locking Datavault
23,400,922 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,673 UART: [state] Locking ICCM
23,404,933 UART: [exit] Launching FMC @ 0x40000130
23,413,325 UART:
23,413,557 UART: Running Caliptra FMC ...
23,414,660 UART:
23,414,821 UART: [state] CFI Enabled
23,479,309 UART: [fht] FMC Alias Private Key: 7
25,817,254 UART: [art] Extend RT PCRs Done
25,818,481 UART: [art] Lock RT PCRs Done
25,820,133 UART: [art] Populate DV Done
25,825,441 UART: [fht] FMC Alias Private Key: 7
25,827,128 UART: [art] Derive CDI
25,827,902 UART: [art] Store in in slot 0x4
25,887,351 UART: [art] Derive Key Pair
25,888,354 UART: [art] Store priv key in slot 0x5
29,181,347 UART: [art] Derive Key Pair - Done
29,194,174 UART: [art] Signing Cert with AUTHO
29,195,514 UART: RITY.KEYID = 7
31,482,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,222 UART: [art] PUB.X = 552E7E042080E466F4E715BADB6755710258AAC1684E5A1FE4CAEDC8807CF2D691F45BC6D29039399560C43C9028B737
31,491,475 UART: [art] PUB.Y = CB5499AC13F8866EE51FA596B56AB9A4E89336DADBAEBD79BCE7A0028B11AD0AE4C152A0EE8018CB01215739EC03919F
31,498,714 UART: [art] SIG.R = E4EFBD109733B197C51056C432CB9EEBD7BA5FCA15F30E27F50D82C9D37A58952E1A0556663188C06D378DF48EBA311A
31,506,213 UART: [art] SIG.S = 50C6ED92BCC552D29309301ED8159355308025F6F1E43AF9AC04CD10D4AE0D6AADFCA1692E9C0DBF3BD838A26B9E5F8A
32,811,645 UART: Caliptra RT
32,812,351 UART: [state] CFI Enabled
32,993,208 UART: [rt] RT listening for mailbox commands...
33,024,250 UART: [rt]cmd =0x43455252, len=4
33,035,714 >>> mbox cmd response data (783 bytes)
33,078,899 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,109,637 UART: [rt]cmd =0x44504543, len=92
38,877,408 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,804,900 ready_for_fw is high
3,805,394 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,861,606 >>> mbox cmd response: success
17,862,261 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,544,554 UART:
23,544,936 UART: Running Caliptra FMC ...
23,546,034 UART:
23,546,191 UART: [state] CFI Enabled
23,614,136 UART: [fht] FMC Alias Private Key: 7
25,952,146 UART: [art] Extend RT PCRs Done
25,953,369 UART: [art] Lock RT PCRs Done
25,955,178 UART: [art] Populate DV Done
25,960,551 UART: [fht] FMC Alias Private Key: 7
25,962,095 UART: [art] Derive CDI
25,962,921 UART: [art] Store in in slot 0x4
26,022,214 UART: [art] Derive Key Pair
26,023,255 UART: [art] Store priv key in slot 0x5
29,315,438 UART: [art] Derive Key Pair - Done
29,328,220 UART: [art] Signing Cert with AUTHO
29,329,518 UART: RITY.KEYID = 7
31,616,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,268 UART: [art] PUB.X = 8B6C58423F7D7CBC85129A8BFCE63EB0D290185443E456C0A43E55E8AC947E43AD8F79531BD3D62785CDAD12CBED66EB
31,625,519 UART: [art] PUB.Y = 07626A33DB726E248882D137D7F1B5F4BA1C3EC17069CB7794F5708C0D63D73FED522DD8073D7825CB194777E5536B22
31,632,750 UART: [art] SIG.R = 56DF2730C9EBDBE4134D5D3D595DA15DDFAF57FE43C0082FE82451E7503AAF39CA8667DA0635D5B289A5A267727814EA
31,640,165 UART: [art] SIG.S = 4A81BE8FD9C1DDFA6F0DE6E11CAF79C0F7EC20DBD05B8CF085C583A9543D5EC9A21391823922334E35AE7176F38E8464
32,945,226 UART: Caliptra RT
32,945,945 UART: [state] CFI Enabled
33,106,309 UART: [rt] RT listening for mailbox commands...
33,137,530 UART: [rt]cmd =0x43455252, len=4
33,149,156 >>> mbox cmd response data (782 bytes)
33,192,736 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,223,738 UART: [rt]cmd =0x44504543, len=92
38,970,182 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,355 UART:
192,736 UART: Running Caliptra ROM ...
193,833 UART:
603,388 UART: [state] CFI Enabled
615,478 UART: [state] LifecycleState = Unprovisioned
617,416 UART: [state] DebugLocked = No
619,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,085 UART: [kat] SHA2-256
793,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,394 UART: [kat] ++
804,922 UART: [kat] sha1
815,158 UART: [kat] SHA2-256
817,805 UART: [kat] SHA2-384
824,497 UART: [kat] SHA2-512-ACC
826,817 UART: [kat] ECC-384
3,110,082 UART: [kat] HMAC-384Kdf
3,122,047 UART: [kat] LMS
4,312,167 UART: [kat] --
4,317,248 UART: [cold-reset] ++
4,318,765 UART: [fht] Storing FHT @ 0x50003400
4,330,032 UART: [idev] ++
4,330,590 UART: [idev] CDI.KEYID = 6
4,331,539 UART: [idev] SUBJECT.KEYID = 7
4,332,773 UART: [idev] UDS.KEYID = 0
4,333,765 ready_for_fw is high
4,333,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,380 UART: [idev] Erasing UDS.KEYID = 0
7,621,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,036 UART: [idev] --
7,647,331 UART: [ldev] ++
7,647,906 UART: [ldev] CDI.KEYID = 6
7,648,924 UART: [ldev] SUBJECT.KEYID = 5
7,650,080 UART: [ldev] AUTHORITY.KEYID = 7
7,651,309 UART: [ldev] FE.KEYID = 1
7,660,382 UART: [ldev] Erasing FE.KEYID = 1
10,946,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,707 UART: [ldev] --
13,307,299 UART: [fwproc] Waiting for Commands...
13,309,810 UART: [fwproc] Received command 0x46574c44
13,311,994 UART: [fwproc] Received Image of size 114124 bytes
17,361,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,525 >>> mbox cmd response: success
17,824,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,828,032 UART: [afmc] ++
17,828,614 UART: [afmc] CDI.KEYID = 6
17,829,574 UART: [afmc] SUBJECT.KEYID = 7
17,830,786 UART: [afmc] AUTHORITY.KEYID = 5
21,143,689 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,104 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,472 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,317 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,738 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,168 UART: [afmc] --
23,508,407 UART: [cold-reset] --
23,512,643 UART: [state] Locking Datavault
23,518,643 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,338 UART: [state] Locking ICCM
23,521,511 UART: [exit] Launching FMC @ 0x40000130
23,529,902 UART:
23,530,137 UART: Running Caliptra FMC ...
23,531,238 UART:
23,531,396 UART: [state] CFI Enabled
23,539,543 UART: [fht] FMC Alias Private Key: 7
25,870,356 UART: [art] Extend RT PCRs Done
25,871,590 UART: [art] Lock RT PCRs Done
25,872,985 UART: [art] Populate DV Done
25,878,178 UART: [fht] FMC Alias Private Key: 7
25,879,775 UART: [art] Derive CDI
25,880,585 UART: [art] Store in in slot 0x4
25,923,279 UART: [art] Derive Key Pair
25,924,277 UART: [art] Store priv key in slot 0x5
29,166,332 UART: [art] Derive Key Pair - Done
29,179,024 UART: [art] Signing Cert with AUTHO
29,180,325 UART: RITY.KEYID = 7
31,459,775 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,282 UART: [art] PUB.X = 9E306C3E6F68361C01C4A3E4471DBF43417411270291E6BBD358706E08950D601CCD3EDA57FA8EF3A97D5059B471321A
31,468,549 UART: [art] PUB.Y = 2680293FFA609B067CAA31362C34DEF396B21213F01CB601A366DF6C71B8248DDD98179F3FE327B3103F459B2EE2325B
31,475,738 UART: [art] SIG.R = 1D406B872E9155D596CDD1B5ACD2EF51FE1DEE8724875A6CA749B831F70C8A4DE19974722189D50471EBCFFFBF85A31C
31,483,127 UART: [art] SIG.S = 7505D0D50E8EE1A31AD69B1B0792CD0B6847689742F8238A8E7D770B4877D2257F92E2C1FE81651693FC9786904CCE68
32,787,524 UART: Caliptra RT
32,788,236 UART: [state] CFI Enabled
32,906,475 UART: [rt] RT listening for mailbox commands...
32,938,103 UART: [rt]cmd =0x43455252, len=4
32,949,565 >>> mbox cmd response data (782 bytes)
32,992,684 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,023,476 UART: [rt]cmd =0x44504543, len=92
38,698,768 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,126,668 ready_for_fw is high
4,127,042 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,896 >>> mbox cmd response: success
18,068,664 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,712,398 UART:
23,712,798 UART: Running Caliptra FMC ...
23,713,896 UART:
23,714,043 UART: [state] CFI Enabled
23,722,048 UART: [fht] FMC Alias Private Key: 7
26,053,231 UART: [art] Extend RT PCRs Done
26,054,464 UART: [art] Lock RT PCRs Done
26,055,983 UART: [art] Populate DV Done
26,061,263 UART: [fht] FMC Alias Private Key: 7
26,062,858 UART: [art] Derive CDI
26,063,595 UART: [art] Store in in slot 0x4
26,106,563 UART: [art] Derive Key Pair
26,107,578 UART: [art] Store priv key in slot 0x5
29,349,518 UART: [art] Derive Key Pair - Done
29,362,515 UART: [art] Signing Cert with AUTHO
29,363,815 UART: RITY.KEYID = 7
31,643,141 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,659 UART: [art] PUB.X = E521C0330CF02E989A65FAD39571E5C61FC36716470ACB38CC7EC960D7AE379ADA39FD5C9BA58022991EEAECEBD887EB
31,651,913 UART: [art] PUB.Y = DB104CF35515A1483E3F7A6BF9ED136A23DA678524A7CA657B6468EB52D7EF6B737CB8399C7CAE950176B28086E3E345
31,659,199 UART: [art] SIG.R = 1C7B229AE96322AF6D8CC445A20262A195AD7302E3EA46D673380DE044FD0E22036742DA29F86827BE1438D0766D1CF5
31,666,548 UART: [art] SIG.S = A35F59D362F95AF27DC3200B935A48275A2CC17333C4BD1F660CB5098932F6F959591FE29E70F2F75BF0216A74BEC505
32,971,653 UART: Caliptra RT
32,972,363 UART: [state] CFI Enabled
33,090,295 UART: [rt] RT listening for mailbox commands...
33,121,696 UART: [rt]cmd =0x43455252, len=4
33,133,345 >>> mbox cmd response data (783 bytes)
33,176,622 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,207,533 UART: [rt]cmd =0x44504543, len=92
38,880,882 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
191,993 UART:
192,366 UART: Running Caliptra ROM ...
193,712 UART:
193,868 UART: [state] CFI Enabled
265,396 UART: [state] LifecycleState = Unprovisioned
267,281 UART: [state] DebugLocked = No
269,912 UART: [state] WD Timer not started. Device not locked for debugging
274,267 UART: [kat] SHA2-256
453,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,975 UART: [kat] ++
465,527 UART: [kat] sha1
476,692 UART: [kat] SHA2-256
479,691 UART: [kat] SHA2-384
486,314 UART: [kat] SHA2-512-ACC
489,314 UART: [kat] ECC-384
2,949,525 UART: [kat] HMAC-384Kdf
2,972,639 UART: [kat] LMS
3,502,159 UART: [kat] --
3,506,861 UART: [cold-reset] ++
3,509,144 UART: [fht] FHT @ 0x50003400
3,519,973 UART: [idev] ++
3,520,532 UART: [idev] CDI.KEYID = 6
3,521,412 UART: [idev] SUBJECT.KEYID = 7
3,522,652 UART: [idev] UDS.KEYID = 0
3,523,552 ready_for_fw is high
3,523,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,139 UART: [idev] Erasing UDS.KEYID = 0
6,029,489 UART: [idev] Sha1 KeyId Algorithm
6,052,445 UART: [idev] --
6,055,773 UART: [ldev] ++
6,056,351 UART: [ldev] CDI.KEYID = 6
6,057,262 UART: [ldev] SUBJECT.KEYID = 5
6,058,421 UART: [ldev] AUTHORITY.KEYID = 7
6,059,654 UART: [ldev] FE.KEYID = 1
6,101,731 UART: [ldev] Erasing FE.KEYID = 1
8,604,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,127 UART: [ldev] --
10,413,584 UART: [fwproc] Wait for Commands...
10,415,964 UART: [fwproc] Recv command 0x46574c44
10,418,053 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,887 >>> mbox cmd response: success
14,277,379 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,281,181 UART: [afmc] ++
14,281,767 UART: [afmc] CDI.KEYID = 6
14,282,650 UART: [afmc] SUBJECT.KEYID = 7
14,283,869 UART: [afmc] AUTHORITY.KEYID = 5
16,808,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,391 UART: [afmc] --
18,610,425 UART: [cold-reset] --
18,613,795 UART: [state] Locking Datavault
18,620,495 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,134 UART: [state] Locking ICCM
18,624,556 UART: [exit] Launching FMC @ 0x40000130
18,632,950 UART:
18,633,194 UART: Running Caliptra FMC ...
18,634,294 UART:
18,634,453 UART: [state] CFI Enabled
18,691,771 UART: [fht] FMC Alias Private Key: 7
20,455,564 UART: [art] Extend RT PCRs Done
20,456,778 UART: [art] Lock RT PCRs Done
20,458,400 UART: [art] Populate DV Done
20,463,969 UART: [fht] FMC Alias Private Key: 7
20,465,632 UART: [art] Derive CDI
20,466,446 UART: [art] Store in in slot 0x4
20,524,796 UART: [art] Derive Key Pair
20,525,827 UART: [art] Store priv key in slot 0x5
22,988,607 UART: [art] Derive Key Pair - Done
23,001,433 UART: [art] Signing Cert with AUTHO
23,002,767 UART: RITY.KEYID = 7
24,714,532 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,031 UART: [art] PUB.X = 9259CCB27B6FFA903ADE457F5F715234DB878302AFB7F17931C84AEBCE9C6A3D565F558045A077F0FA286E509D4DFD8A
24,723,275 UART: [art] PUB.Y = B2280574CCED5737B17E37136AF01AA859841BF246211B5CA9C59C1DE570AEC2C35E2400D0FC4F56A765FA38440D7AF5
24,730,554 UART: [art] SIG.R = BFFA8D892D2C365883AD022BDDAF1B66BED52C1C245F7C27A03659CCBBB2CBA5D98628A13AAB23A80DD141E689628658
24,737,939 UART: [art] SIG.S = 06225827E518B1EF0AF9A8B2603FD81D29AE329ED54155C2343C61473C75D1B8027BCCC6B0BFD54BE046A302CA06FD18
25,716,908 UART: Caliptra RT
25,717,604 UART: [state] CFI Enabled
25,882,746 UART: [rt] RT listening for mailbox commands...
25,914,104 UART: [rt]cmd =0x43455252, len=4
25,925,635 >>> mbox cmd response data (783 bytes)
25,969,988 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,000,700 UART: [rt]cmd =0x44504543, len=92
30,354,216 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,360,305 ready_for_fw is high
3,360,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,755 >>> mbox cmd response: success
14,071,327 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,365,602 UART:
18,365,975 UART: Running Caliptra FMC ...
18,367,083 UART:
18,367,239 UART: [state] CFI Enabled
18,431,969 UART: [fht] FMC Alias Private Key: 7
20,195,852 UART: [art] Extend RT PCRs Done
20,197,086 UART: [art] Lock RT PCRs Done
20,198,692 UART: [art] Populate DV Done
20,203,892 UART: [fht] FMC Alias Private Key: 7
20,205,380 UART: [art] Derive CDI
20,206,147 UART: [art] Store in in slot 0x4
20,264,794 UART: [art] Derive Key Pair
20,265,833 UART: [art] Store priv key in slot 0x5
22,729,119 UART: [art] Derive Key Pair - Done
22,741,577 UART: [art] Signing Cert with AUTHO
22,742,881 UART: RITY.KEYID = 7
24,455,535 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,053 UART: [art] PUB.X = 52998C5A9B71F342A3D8D3E243415985FE82721C69EB59B87514B4339106E39C79B6F74160CC94B8224F057A52B5DF99
24,464,267 UART: [art] PUB.Y = C611F786AB107003711D9412322B6DE3410A202797683A821C2993F296C4C8BEE3AA91ABD64993622CB7B103407F568D
24,471,538 UART: [art] SIG.R = D32BB2CBCC31005C6B8430B71791835A932501EC72B7D2726B7521EC145AB0122866B1D10D58167B3D5C2D9853576528
24,478,883 UART: [art] SIG.S = 77A13B51EABAFACAA68886FF633AB3372871C4F01241862F57232C19020A7D6BC84F0119A693ED2F0D59BCCED77D78D3
25,458,141 UART: Caliptra RT
25,458,849 UART: [state] CFI Enabled
25,622,918 UART: [rt] RT listening for mailbox commands...
25,654,012 UART: [rt]cmd =0x43455252, len=4
25,665,588 >>> mbox cmd response data (783 bytes)
25,709,545 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,740,402 UART: [rt]cmd =0x44504543, len=92
30,101,187 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,366 UART:
192,749 UART: Running Caliptra ROM ...
193,941 UART:
603,308 UART: [state] CFI Enabled
613,630 UART: [state] LifecycleState = Unprovisioned
615,509 UART: [state] DebugLocked = No
617,099 UART: [state] WD Timer not started. Device not locked for debugging
621,412 UART: [kat] SHA2-256
800,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,134 UART: [kat] ++
812,665 UART: [kat] sha1
823,684 UART: [kat] SHA2-256
826,756 UART: [kat] SHA2-384
832,735 UART: [kat] SHA2-512-ACC
835,659 UART: [kat] ECC-384
3,276,506 UART: [kat] HMAC-384Kdf
3,290,021 UART: [kat] LMS
3,819,516 UART: [kat] --
3,824,100 UART: [cold-reset] ++
3,826,536 UART: [fht] FHT @ 0x50003400
3,837,608 UART: [idev] ++
3,838,205 UART: [idev] CDI.KEYID = 6
3,839,117 UART: [idev] SUBJECT.KEYID = 7
3,840,287 UART: [idev] UDS.KEYID = 0
3,841,204 ready_for_fw is high
3,841,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,959 UART: [idev] Erasing UDS.KEYID = 0
6,309,280 UART: [idev] Sha1 KeyId Algorithm
6,332,981 UART: [idev] --
6,336,026 UART: [ldev] ++
6,336,597 UART: [ldev] CDI.KEYID = 6
6,337,498 UART: [ldev] SUBJECT.KEYID = 5
6,338,647 UART: [ldev] AUTHORITY.KEYID = 7
6,339,941 UART: [ldev] FE.KEYID = 1
6,350,257 UART: [ldev] Erasing FE.KEYID = 1
8,821,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,342 UART: [ldev] --
10,610,192 UART: [fwproc] Wait for Commands...
10,612,977 UART: [fwproc] Recv command 0x46574c44
10,615,062 UART: [fwproc] Recv'd Img size: 114448 bytes
14,014,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,475,486 >>> mbox cmd response: success
14,475,977 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,480,114 UART: [afmc] ++
14,480,697 UART: [afmc] CDI.KEYID = 6
14,481,600 UART: [afmc] SUBJECT.KEYID = 7
14,482,809 UART: [afmc] AUTHORITY.KEYID = 5
16,976,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,769,849 UART: [afmc] --
18,774,460 UART: [cold-reset] --
18,779,992 UART: [state] Locking Datavault
18,786,362 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,998 UART: [state] Locking ICCM
18,789,894 UART: [exit] Launching FMC @ 0x40000130
18,798,280 UART:
18,798,557 UART: Running Caliptra FMC ...
18,799,660 UART:
18,799,810 UART: [state] CFI Enabled
18,807,764 UART: [fht] FMC Alias Private Key: 7
20,564,757 UART: [art] Extend RT PCRs Done
20,565,991 UART: [art] Lock RT PCRs Done
20,567,748 UART: [art] Populate DV Done
20,572,989 UART: [fht] FMC Alias Private Key: 7
20,574,569 UART: [art] Derive CDI
20,575,295 UART: [art] Store in in slot 0x4
20,618,363 UART: [art] Derive Key Pair
20,619,354 UART: [art] Store priv key in slot 0x5
23,046,327 UART: [art] Derive Key Pair - Done
23,059,482 UART: [art] Signing Cert with AUTHO
23,060,784 UART: RITY.KEYID = 7
24,766,128 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,628 UART: [art] PUB.X = E59883D021086FF269A57BF3A478EABA9CB33E2075DD6143BBB796B4DA3A57B289A9B8C437BE8D0A80EA0D048500BA7F
24,774,873 UART: [art] PUB.Y = 8DA73E51502F2F76A09F38D27537759C54018360714216722725D08152555FDBEDAB9EC31CECC6B25A15CFBCBFD95E7D
24,782,147 UART: [art] SIG.R = 7A79C755F91128B3310FFC10FD336EE99EE6E2A09A84AF47CFC2E9CC5C9279677F6F297272C552F364EA469C3106EB9C
24,789,524 UART: [art] SIG.S = BF4DB019B101B4567CB8672F36A84F8BBD0776523210C5ED2765D161E84D641C304305105E6CA4E3B897753E4846F442
25,768,105 UART: Caliptra RT
25,768,804 UART: [state] CFI Enabled
25,886,080 UART: [rt] RT listening for mailbox commands...
25,917,538 UART: [rt]cmd =0x43455252, len=4
25,929,079 >>> mbox cmd response data (783 bytes)
25,971,871 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,002,443 UART: [rt]cmd =0x44504543, len=92
30,287,112 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,576 writing to cptra_bootfsm_go
3,694,822 ready_for_fw is high
3,695,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,657 >>> mbox cmd response: success
14,280,376 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,529,282 UART:
18,529,671 UART: Running Caliptra FMC ...
18,530,768 UART:
18,530,913 UART: [state] CFI Enabled
18,539,337 UART: [fht] FMC Alias Private Key: 7
20,295,738 UART: [art] Extend RT PCRs Done
20,296,968 UART: [art] Lock RT PCRs Done
20,298,701 UART: [art] Populate DV Done
20,304,179 UART: [fht] FMC Alias Private Key: 7
20,305,882 UART: [art] Derive CDI
20,306,693 UART: [art] Store in in slot 0x4
20,349,068 UART: [art] Derive Key Pair
20,350,065 UART: [art] Store priv key in slot 0x5
22,777,000 UART: [art] Derive Key Pair - Done
22,789,787 UART: [art] Signing Cert with AUTHO
22,791,085 UART: RITY.KEYID = 7
24,496,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,055 UART: [art] PUB.X = A0D61BD777ABB5AF5A722699A697668064FAA22DB802B5AA6C47A9BFBD58AE7D30D917E4D12A1B957B355B7678EE37E6
24,505,347 UART: [art] PUB.Y = 0004383D6373054CB3C3351E53447EA25225FD6573F11D980DC999FEF5D78536A81142201058F34B0D208291684E6A08
24,512,554 UART: [art] SIG.R = 4505256A092316897FE7FA127FFDFB01C35856C1EF4027F042D2CC2989D1BCCB625B0069E64E058EE4E5A4861B6F75A2
24,519,913 UART: [art] SIG.S = 9CD178F35EA53D7C9BD7273ED577B4193C9EB00F11698BE5B8D0CAA9398D5B8F5F1A579F3FE20C06E72BE36ADACDB9BD
25,499,500 UART: Caliptra RT
25,500,204 UART: [state] CFI Enabled
25,617,049 UART: [rt] RT listening for mailbox commands...
25,648,359 UART: [rt]cmd =0x43455252, len=4
25,659,957 >>> mbox cmd response data (783 bytes)
25,702,540 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,733,492 UART: [rt]cmd =0x44504543, len=92
30,017,869 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,075 UART:
192,439 UART: Running Caliptra ROM ...
193,564 UART:
193,711 UART: [state] CFI Enabled
267,956 UART: [state] LifecycleState = Unprovisioned
270,363 UART: [state] DebugLocked = No
272,666 UART: [state] WD Timer not started. Device not locked for debugging
277,768 UART: [kat] SHA2-256
467,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,461 UART: [kat] ++
478,913 UART: [kat] sha1
489,805 UART: [kat] SHA2-256
492,888 UART: [kat] SHA2-384
498,023 UART: [kat] SHA2-512-ACC
500,603 UART: [kat] ECC-384
2,949,484 UART: [kat] HMAC-384Kdf
2,972,233 UART: [kat] LMS
3,504,041 UART: [kat] --
3,508,112 UART: [cold-reset] ++
3,509,967 UART: [fht] FHT @ 0x50003400
3,521,648 UART: [idev] ++
3,522,278 UART: [idev] CDI.KEYID = 6
3,523,262 UART: [idev] SUBJECT.KEYID = 7
3,524,376 UART: [idev] UDS.KEYID = 0
3,525,363 ready_for_fw is high
3,525,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,583 UART: [idev] Erasing UDS.KEYID = 0
6,031,224 UART: [idev] Sha1 KeyId Algorithm
6,053,868 UART: [idev] --
6,058,699 UART: [ldev] ++
6,059,389 UART: [ldev] CDI.KEYID = 6
6,060,276 UART: [ldev] SUBJECT.KEYID = 5
6,061,491 UART: [ldev] AUTHORITY.KEYID = 7
6,062,725 UART: [ldev] FE.KEYID = 1
6,101,058 UART: [ldev] Erasing FE.KEYID = 1
8,604,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,628 UART: [ldev] --
10,415,802 UART: [fwproc] Wait for Commands...
10,417,399 UART: [fwproc] Recv command 0x46574c44
10,419,721 UART: [fwproc] Recv'd Img size: 114448 bytes
13,873,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,611,460 >>> mbox cmd response: success
14,611,993 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,615,316 UART: [afmc] ++
14,616,007 UART: [afmc] CDI.KEYID = 6
14,617,116 UART: [afmc] SUBJECT.KEYID = 7
14,618,657 UART: [afmc] AUTHORITY.KEYID = 5
17,148,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,470 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,925 UART: [afmc] --
18,968,353 UART: [cold-reset] --
18,973,024 UART: [state] Locking Datavault
18,979,192 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,336 UART: [state] Locking ICCM
18,984,110 UART: [exit] Launching FMC @ 0x40000130
18,992,775 UART:
18,993,010 UART: Running Caliptra FMC ...
18,994,113 UART:
18,994,271 UART: [state] CFI Enabled
19,050,466 UART: [fht] FMC Alias Private Key: 7
20,814,873 UART: [art] Extend RT PCRs Done
20,816,090 UART: [art] Lock RT PCRs Done
20,817,821 UART: [art] Populate DV Done
20,823,393 UART: [fht] FMC Alias Private Key: 7
20,824,938 UART: [art] Derive CDI
20,825,777 UART: [art] Store in in slot 0x4
20,883,709 UART: [art] Derive Key Pair
20,884,740 UART: [art] Store priv key in slot 0x5
23,347,517 UART: [art] Derive Key Pair - Done
23,360,619 UART: [art] Signing Cert with AUTHO
23,361,928 UART: RITY.KEYID = 7
25,073,776 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,274 UART: [art] PUB.X = 4D2ACCD1CF2E091EEBF8AA1AA1D59DFB9C375D92C365371D62206475355381FDBB54F8F003D220BCC101DE8961EB2E5D
25,082,576 UART: [art] PUB.Y = AC01E646CBCBF36F5CC6A7DE96113BEE5AEC68DF0A5D872438E7858166670F823096F8F0DBCEE97020610D201857DB9A
25,089,839 UART: [art] SIG.R = ABBF99BB44C63A4118361838D1058637C01DE6E157D7641116C2D1192A0BE4EF00A96F7A7FECC3F3315CD29510138E39
25,097,239 UART: [art] SIG.S = 91647FDFE09309FF99766E09C870E4EF80B429F641F5C839FE3C3B9419BAAFAD64CE398CB1929150881E72BBCB808FD1
26,076,242 UART: Caliptra RT
26,076,951 UART: [state] CFI Enabled
26,241,679 UART: [rt] RT listening for mailbox commands...
26,272,983 UART: [rt]cmd =0x43455252, len=4
26,284,495 >>> mbox cmd response data (784 bytes)
26,329,038 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,359,775 UART: [rt]cmd =0x44504543, len=92
30,720,843 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,416,997 ready_for_fw is high
3,417,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,715,372 >>> mbox cmd response: success
14,716,085 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,009,323 UART:
19,009,727 UART: Running Caliptra FMC ...
19,010,870 UART:
19,011,030 UART: [state] CFI Enabled
19,074,185 UART: [fht] FMC Alias Private Key: 7
20,837,954 UART: [art] Extend RT PCRs Done
20,839,181 UART: [art] Lock RT PCRs Done
20,840,880 UART: [art] Populate DV Done
20,846,217 UART: [fht] FMC Alias Private Key: 7
20,847,763 UART: [art] Derive CDI
20,848,577 UART: [art] Store in in slot 0x4
20,906,462 UART: [art] Derive Key Pair
20,907,508 UART: [art] Store priv key in slot 0x5
23,370,312 UART: [art] Derive Key Pair - Done
23,382,986 UART: [art] Signing Cert with AUTHO
23,384,290 UART: RITY.KEYID = 7
25,095,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,089 UART: [art] PUB.X = 1E783AFDE4B4F22B85A9F5976D55805D589E34DBE0E7DF053B28563AAD14058A0E01F55ED7FB5DE8DAFB6A88DD0336C9
25,104,361 UART: [art] PUB.Y = 61DE1B44C976B268F8B33D60DB12FA64367ACA35B1A8C9D445972295BD6464488956F67948D57C4467B40845DE74EF0D
25,111,616 UART: [art] SIG.R = EDCABDF3623A035FA098F284C9EB45EE445F6A262E45E558767F16751EAD219E3808BC2941E32F55C84FA25662FB4A5B
25,119,006 UART: [art] SIG.S = 2D54F92CABF3E7CA6900B7561740DB89AA5D77B26A8E0C8044A05FF0A713F3F9AB9F3604158D734DB6D2146D1A19912F
26,097,986 UART: Caliptra RT
26,098,690 UART: [state] CFI Enabled
26,264,116 UART: [rt] RT listening for mailbox commands...
26,295,601 UART: [rt]cmd =0x43455252, len=4
26,306,953 >>> mbox cmd response data (783 bytes)
26,350,978 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,381,733 UART: [rt]cmd =0x44504543, len=92
30,742,580 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,491 UART:
192,873 UART: Running Caliptra ROM ...
194,030 UART:
603,528 UART: [state] CFI Enabled
618,961 UART: [state] LifecycleState = Unprovisioned
621,330 UART: [state] DebugLocked = No
622,629 UART: [state] WD Timer not started. Device not locked for debugging
625,940 UART: [kat] SHA2-256
815,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,616 UART: [kat] ++
827,132 UART: [kat] sha1
837,799 UART: [kat] SHA2-256
840,837 UART: [kat] SHA2-384
846,538 UART: [kat] SHA2-512-ACC
849,120 UART: [kat] ECC-384
3,291,613 UART: [kat] HMAC-384Kdf
3,304,986 UART: [kat] LMS
3,836,855 UART: [kat] --
3,842,099 UART: [cold-reset] ++
3,843,530 UART: [fht] FHT @ 0x50003400
3,856,274 UART: [idev] ++
3,856,972 UART: [idev] CDI.KEYID = 6
3,857,953 UART: [idev] SUBJECT.KEYID = 7
3,859,118 UART: [idev] UDS.KEYID = 0
3,860,035 ready_for_fw is high
3,860,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,037 UART: [idev] Erasing UDS.KEYID = 0
6,334,582 UART: [idev] Sha1 KeyId Algorithm
6,356,299 UART: [idev] --
6,360,588 UART: [ldev] ++
6,361,330 UART: [ldev] CDI.KEYID = 6
6,362,399 UART: [ldev] SUBJECT.KEYID = 5
6,363,501 UART: [ldev] AUTHORITY.KEYID = 7
6,364,673 UART: [ldev] FE.KEYID = 1
6,375,766 UART: [ldev] Erasing FE.KEYID = 1
8,850,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,568 UART: [ldev] --
10,640,498 UART: [fwproc] Wait for Commands...
10,642,914 UART: [fwproc] Recv command 0x46574c44
10,645,213 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,831,798 >>> mbox cmd response: success
14,832,436 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,835,872 UART: [afmc] ++
14,836,576 UART: [afmc] CDI.KEYID = 6
14,837,819 UART: [afmc] SUBJECT.KEYID = 7
14,839,253 UART: [afmc] AUTHORITY.KEYID = 5
17,345,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,477 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,074 UART: [afmc] --
19,141,915 UART: [cold-reset] --
19,145,983 UART: [state] Locking Datavault
19,151,063 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,291 UART: [state] Locking ICCM
19,154,854 UART: [exit] Launching FMC @ 0x40000130
19,163,521 UART:
19,163,768 UART: Running Caliptra FMC ...
19,164,863 UART:
19,165,020 UART: [state] CFI Enabled
19,173,118 UART: [fht] FMC Alias Private Key: 7
20,930,150 UART: [art] Extend RT PCRs Done
20,931,367 UART: [art] Lock RT PCRs Done
20,933,240 UART: [art] Populate DV Done
20,938,859 UART: [fht] FMC Alias Private Key: 7
20,940,499 UART: [art] Derive CDI
20,941,228 UART: [art] Store in in slot 0x4
20,983,970 UART: [art] Derive Key Pair
20,984,962 UART: [art] Store priv key in slot 0x5
23,411,657 UART: [art] Derive Key Pair - Done
23,424,649 UART: [art] Signing Cert with AUTHO
23,425,944 UART: RITY.KEYID = 7
25,131,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,978 UART: [art] PUB.X = 53C5C66C924C42616B3DCE23D893475D3B3FB09CD1DCE1A93584389630D119115AF17E9E507D54C5330B8BC200EDB127
25,140,212 UART: [art] PUB.Y = 8D7729C7BB811497F7D1DD4FB08A6BA8635C7C563B6EB254111AC1A689A1457B3FB2928C27A71432FE3F900A86A240C9
25,147,485 UART: [art] SIG.R = D998ACC9208B8A8AD36BB8326D2876794914DA545497746F0D4D5A25AE3E4EE594522BE7B93265B0FF1B8CAF36E2EFB8
25,154,903 UART: [art] SIG.S = B9C975D2B6836E1737B63D0002EBC3FDE9DDFB039FE80C4663718C392C4FC08EBB478DDF6EFA2FF796727E7B2A57F382
26,134,135 UART: Caliptra RT
26,134,818 UART: [state] CFI Enabled
26,251,486 UART: [rt] RT listening for mailbox commands...
26,282,981 UART: [rt]cmd =0x43455252, len=4
26,294,300 >>> mbox cmd response data (784 bytes)
26,337,243 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,368,190 UART: [rt]cmd =0x44504543, len=92
30,653,186 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,752,422 ready_for_fw is high
3,752,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,404 >>> mbox cmd response: success
14,957,203 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,205,106 UART:
19,205,491 UART: Running Caliptra FMC ...
19,206,592 UART:
19,206,736 UART: [state] CFI Enabled
19,214,466 UART: [fht] FMC Alias Private Key: 7
20,971,448 UART: [art] Extend RT PCRs Done
20,972,663 UART: [art] Lock RT PCRs Done
20,974,414 UART: [art] Populate DV Done
20,980,037 UART: [fht] FMC Alias Private Key: 7
20,981,735 UART: [art] Derive CDI
20,982,474 UART: [art] Store in in slot 0x4
21,025,226 UART: [art] Derive Key Pair
21,026,227 UART: [art] Store priv key in slot 0x5
23,452,688 UART: [art] Derive Key Pair - Done
23,465,620 UART: [art] Signing Cert with AUTHO
23,466,945 UART: RITY.KEYID = 7
25,172,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,938 UART: [art] PUB.X = 449B93810AE384535EBE6CE892EE25C56890835CF04DA61D87499BB3A349AA61D21341785746241544E4B39A72753501
25,181,127 UART: [art] PUB.Y = 95EE774C6F362BA0F8A8ADECDD436E3F411A1257E35F9600F00DFBB965E6BED2CECC82B90F23DA0033DEB3F0D886D728
25,188,374 UART: [art] SIG.R = 2088B61F19BCBA1A4FF7D7004679196A81C81B2B103CC860615C522D7CCA15E9361E55493BDB7A833AF1804C69D14CDB
25,195,763 UART: [art] SIG.S = 70F2CBE9DB9CAB4A10C07F658D7CEF813858B9E107B584442CCE7DABD8D269969AA0A222A394A381B79764DD6D5F06E1
26,174,612 UART: Caliptra RT
26,175,294 UART: [state] CFI Enabled
26,293,118 UART: [rt] RT listening for mailbox commands...
26,324,309 UART: [rt]cmd =0x43455252, len=4
26,335,979 >>> mbox cmd response data (782 bytes)
26,378,967 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,409,717 UART: [rt]cmd =0x44504543, len=92
30,694,207 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,202 UART: [kat] SHA2-512-ACC
897,103 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 ready_for_fw is high
1,480,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,698 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,453 UART: [ldev] Erasing FE.KEYID = 1
1,547,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,926 UART: [ldev] --
1,586,371 UART: [fwproc] Waiting for Commands...
1,587,152 UART: [fwproc] Received command 0x46574c44
1,587,943 UART: [fwproc] Received Image of size 114448 bytes
2,888,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,919 >>> mbox cmd response: success
3,081,919 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,082,975 UART: [afmc] ++
3,083,143 UART: [afmc] CDI.KEYID = 6
3,083,505 UART: [afmc] SUBJECT.KEYID = 7
3,083,930 UART: [afmc] AUTHORITY.KEYID = 5
3,118,859 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,670 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,360 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,143 UART: [afmc] --
3,162,099 UART: [cold-reset] --
3,162,933 UART: [state] Locking Datavault
3,164,258 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,862 UART: [state] Locking ICCM
3,165,480 UART: [exit] Launching FMC @ 0x40000130
3,170,809 UART:
3,170,825 UART: Running Caliptra FMC ...
3,171,233 UART:
3,171,287 UART: [state] CFI Enabled
3,181,968 UART: [fht] FMC Alias Private Key: 7
3,289,973 UART: [art] Extend RT PCRs Done
3,290,401 UART: [art] Lock RT PCRs Done
3,292,243 UART: [art] Populate DV Done
3,300,394 UART: [fht] FMC Alias Private Key: 7
3,301,490 UART: [art] Derive CDI
3,301,770 UART: [art] Store in in slot 0x4
3,386,969 UART: [art] Derive Key Pair
3,387,329 UART: [art] Store priv key in slot 0x5
3,400,759 UART: [art] Derive Key Pair - Done
3,415,338 UART: [art] Signing Cert with AUTHO
3,415,818 UART: RITY.KEYID = 7
3,431,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,211 UART: [art] PUB.X = 1E2A99221CFF071C27E6EC0F35B9F1FA6BBBB3D324E96A4B594DEEDE3D36F6E2EAA90F61D4AB92E5257716B8A2B1F39F
3,438,996 UART: [art] PUB.Y = 929394864A89F5D2672BF3299266AE83580DD21904CFB3462B72DFCF40F75AC9651F24871D736F987AF162A1FEFA1BB1
3,445,942 UART: [art] SIG.R = 28B02D9B9D831691D74D382045231B86E5D89C2FA5C1D37D9F6460C081C33E84AA53E1847C9E0C89C4B457E488D4ABB1
3,452,711 UART: [art] SIG.S = DFDA8F07FC199B1245C0A2493B0409FBDBD2944CB5B0ADFCA0F861F5836F1CD8C6F10B7A9FD4A1CA5FD9F95BF531B526
3,476,194 UART: Caliptra RT
3,476,447 UART: [state] CFI Enabled
3,584,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,114 UART: [rt]cmd =0x43455252, len=4
3,625,905 >>> mbox cmd response data (783 bytes)
3,625,906 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,656,011 UART: [rt]cmd =0x44504543, len=92
3,839,936 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 ready_for_fw is high
1,362,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,435 >>> mbox cmd response: success
2,928,435 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,989,933 UART:
2,989,949 UART: Running Caliptra FMC ...
2,990,357 UART:
2,990,411 UART: [state] CFI Enabled
3,000,846 UART: [fht] FMC Alias Private Key: 7
3,109,345 UART: [art] Extend RT PCRs Done
3,109,773 UART: [art] Lock RT PCRs Done
3,111,343 UART: [art] Populate DV Done
3,119,434 UART: [fht] FMC Alias Private Key: 7
3,120,452 UART: [art] Derive CDI
3,120,732 UART: [art] Store in in slot 0x4
3,206,419 UART: [art] Derive Key Pair
3,206,779 UART: [art] Store priv key in slot 0x5
3,220,089 UART: [art] Derive Key Pair - Done
3,234,744 UART: [art] Signing Cert with AUTHO
3,235,224 UART: RITY.KEYID = 7
3,250,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,955 UART: [art] PUB.X = 4517681F767E8FBBAD01B9DBF56E7C7E6E622943334B352628FC7DB7179B8687B3E42CCE84035903E98F6B2021EB3964
3,257,716 UART: [art] PUB.Y = FF7B8FDBA005FEB3F8E0640BEFAA76C674FDBF89D6D6E449CB8BE54E4A88A9CF226C35AB88179B99139037D274EB2E55
3,264,682 UART: [art] SIG.R = 7A9B1E502DFD9B568D0D5F61B312D1F0F9346C90A1EB7E679A44611ED5805AE3511C5E1C57551C044101E0E7E94B0B0E
3,271,443 UART: [art] SIG.S = B037816891B281538A00B9E88E8078EE152731C3792F139DB544B14987730A15B7729821F68325C463918EA13048D8CF
3,295,917 UART: Caliptra RT
3,296,170 UART: [state] CFI Enabled
3,404,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,499 UART: [rt]cmd =0x43455252, len=4
3,446,476 >>> mbox cmd response data (783 bytes)
3,446,477 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,374 UART: [rt]cmd =0x44504543, len=92
3,659,342 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,674 UART: [kat] SHA2-256
892,612 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,411 UART: [kat] LMS
1,475,607 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,730 UART: [fht] Storing FHT @ 0x50003400
1,479,459 UART: [idev] ++
1,479,627 UART: [idev] CDI.KEYID = 6
1,479,987 UART: [idev] SUBJECT.KEYID = 7
1,480,411 UART: [idev] UDS.KEYID = 0
1,480,756 ready_for_fw is high
1,480,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,325 UART: [idev] Erasing UDS.KEYID = 0
1,504,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,341 UART: [idev] --
1,514,244 UART: [ldev] ++
1,514,412 UART: [ldev] CDI.KEYID = 6
1,514,775 UART: [ldev] SUBJECT.KEYID = 5
1,515,201 UART: [ldev] AUTHORITY.KEYID = 7
1,515,664 UART: [ldev] FE.KEYID = 1
1,520,732 UART: [ldev] Erasing FE.KEYID = 1
1,546,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,097 UART: [ldev] --
1,585,362 UART: [fwproc] Waiting for Commands...
1,585,981 UART: [fwproc] Received command 0x46574c44
1,586,772 UART: [fwproc] Received Image of size 114448 bytes
2,886,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,193 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,480 >>> mbox cmd response: success
3,079,480 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,532 UART: [afmc] ++
3,080,700 UART: [afmc] CDI.KEYID = 6
3,081,062 UART: [afmc] SUBJECT.KEYID = 7
3,081,487 UART: [afmc] AUTHORITY.KEYID = 5
3,117,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,005 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,695 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,680 UART: [afmc] --
3,160,652 UART: [cold-reset] --
3,161,482 UART: [state] Locking Datavault
3,162,693 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,297 UART: [state] Locking ICCM
3,163,719 UART: [exit] Launching FMC @ 0x40000130
3,169,048 UART:
3,169,064 UART: Running Caliptra FMC ...
3,169,472 UART:
3,169,615 UART: [state] CFI Enabled
3,180,168 UART: [fht] FMC Alias Private Key: 7
3,288,203 UART: [art] Extend RT PCRs Done
3,288,631 UART: [art] Lock RT PCRs Done
3,290,149 UART: [art] Populate DV Done
3,298,318 UART: [fht] FMC Alias Private Key: 7
3,299,470 UART: [art] Derive CDI
3,299,750 UART: [art] Store in in slot 0x4
3,385,735 UART: [art] Derive Key Pair
3,386,095 UART: [art] Store priv key in slot 0x5
3,398,861 UART: [art] Derive Key Pair - Done
3,413,772 UART: [art] Signing Cert with AUTHO
3,414,252 UART: RITY.KEYID = 7
3,429,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,187 UART: [art] PUB.X = 225F484795337D320AFB36DBFCEA7FDC4DE5DCB23992F039A7DDC0D84ADFFA5813F3189C2D5616BED119467862F5B606
3,436,965 UART: [art] PUB.Y = 472B74165FBECA7D40C1D68391B68228BFAE5D130BD460D19F2C2A0DE1B5C539897FAE83C79B48D6667B369C0B5F3F3E
3,443,918 UART: [art] SIG.R = 2FA2F0ED2A51FF0C944CCBE07005BDAFFAA1CD6C6343665B3506499C13F551D72A6548DAD0F9202EF47500BBACA4607D
3,450,675 UART: [art] SIG.S = DE0AEE432F43DBC945D6277334222169E17F2495E7922DA5A5EBB555C9CB6D0367B9D48F85E18449D8CA87CAC56B80FE
3,473,646 UART: Caliptra RT
3,473,991 UART: [state] CFI Enabled
3,583,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,602 UART: [rt]cmd =0x43455252, len=4
3,624,567 >>> mbox cmd response data (783 bytes)
3,624,568 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,553 UART: [rt]cmd =0x44504543, len=92
3,838,466 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,584 ready_for_fw is high
1,362,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,646 >>> mbox cmd response: success
2,928,646 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,990,692 UART:
2,990,708 UART: Running Caliptra FMC ...
2,991,116 UART:
2,991,259 UART: [state] CFI Enabled
3,002,096 UART: [fht] FMC Alias Private Key: 7
3,110,471 UART: [art] Extend RT PCRs Done
3,110,899 UART: [art] Lock RT PCRs Done
3,112,543 UART: [art] Populate DV Done
3,120,844 UART: [fht] FMC Alias Private Key: 7
3,121,914 UART: [art] Derive CDI
3,122,194 UART: [art] Store in in slot 0x4
3,208,039 UART: [art] Derive Key Pair
3,208,399 UART: [art] Store priv key in slot 0x5
3,221,799 UART: [art] Derive Key Pair - Done
3,236,558 UART: [art] Signing Cert with AUTHO
3,237,038 UART: RITY.KEYID = 7
3,252,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,957 UART: [art] PUB.X = 6030BC9FBCF2992F7832516D59BF351813BD58861EA4784C8757F67B5A9BCD6130BAB80C0E14F47496C5EB1B0FA15785
3,259,722 UART: [art] PUB.Y = 19A6E27F4C1E8346E7E5F96D92D2B052D21010F6316584374A553B68044C6A2272505834BAC14CD7702033FF143884A6
3,266,657 UART: [art] SIG.R = F6C326893833F5A396F52679CF7FA873756641A0C1BB7F9584B3B41649FD79F4FAD3043998A56C9399D8995BBE8842B4
3,273,420 UART: [art] SIG.S = F38234779F44CE37086B6782D1C17F494F69FA714672E1A15CA5C9CD71287E631FD497FF10EA307734F71624E1FFDF58
3,297,256 UART: Caliptra RT
3,297,601 UART: [state] CFI Enabled
3,406,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,851 UART: [rt]cmd =0x43455252, len=4
3,447,759 >>> mbox cmd response data (784 bytes)
3,447,760 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,525 UART: [rt]cmd =0x44504543, len=92
3,661,139 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,715 UART: [kat] SHA2-256
903,655 UART: [kat] SHA2-384
906,412 UART: [kat] SHA2-512-ACC
908,313 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,067 UART: [fht] FHT @ 0x50003400
1,174,568 UART: [idev] ++
1,174,736 UART: [idev] CDI.KEYID = 6
1,175,096 UART: [idev] SUBJECT.KEYID = 7
1,175,520 UART: [idev] UDS.KEYID = 0
1,175,865 ready_for_fw is high
1,175,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,621 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,610 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,567 UART: [ldev] --
1,282,060 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,854 >>> mbox cmd response: success
2,775,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,892 UART: [afmc] ++
2,777,060 UART: [afmc] CDI.KEYID = 6
2,777,422 UART: [afmc] SUBJECT.KEYID = 7
2,777,847 UART: [afmc] AUTHORITY.KEYID = 5
2,813,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,471 UART: [afmc] --
2,856,585 UART: [cold-reset] --
2,857,499 UART: [state] Locking Datavault
2,858,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,262 UART: [state] Locking ICCM
2,859,906 UART: [exit] Launching FMC @ 0x40000130
2,865,235 UART:
2,865,251 UART: Running Caliptra FMC ...
2,865,659 UART:
2,865,713 UART: [state] CFI Enabled
2,876,078 UART: [fht] FMC Alias Private Key: 7
2,983,841 UART: [art] Extend RT PCRs Done
2,984,269 UART: [art] Lock RT PCRs Done
2,986,201 UART: [art] Populate DV Done
2,994,660 UART: [fht] FMC Alias Private Key: 7
2,995,832 UART: [art] Derive CDI
2,996,112 UART: [art] Store in in slot 0x4
3,081,665 UART: [art] Derive Key Pair
3,082,025 UART: [art] Store priv key in slot 0x5
3,095,189 UART: [art] Derive Key Pair - Done
3,109,904 UART: [art] Signing Cert with AUTHO
3,110,384 UART: RITY.KEYID = 7
3,125,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,045 UART: [art] PUB.X = 3337553E268E0724AC4AF351B12F9469C2038E1A2F7470AB7E166CD5C259ED5DA01EA5AEB54109CBC9FB7D1AA65230E6
3,132,816 UART: [art] PUB.Y = C1AF775E9BD05C05ADC1C46BBB842A5F026CFD877CFA1F6156343CF6DD8FBAE73A90940B3A0BBD7F87AF964CE07033D0
3,139,778 UART: [art] SIG.R = 2718FAE5EBE2BAED57BF01AF1EB72FF2D2B86F7AD8B754141216A3AAA73E4938A799676B3067D59A170D4B22E9EEC3A3
3,146,560 UART: [art] SIG.S = 9668269F426BEC0B00C69B8DFF46BAFF6252811B1A6EA8C4DF7E5BF55E844FF5983B54FEBFD46FDEF30293B0A432D10A
3,170,632 UART: Caliptra RT
3,170,885 UART: [state] CFI Enabled
3,278,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,300 UART: [rt]cmd =0x43455252, len=4
3,320,125 >>> mbox cmd response data (783 bytes)
3,320,126 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,115 UART: [rt]cmd =0x44504543, len=92
3,533,438 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,369 ready_for_fw is high
1,060,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,673 >>> mbox cmd response: success
2,628,673 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,691,183 UART:
2,691,199 UART: Running Caliptra FMC ...
2,691,607 UART:
2,691,661 UART: [state] CFI Enabled
2,702,084 UART: [fht] FMC Alias Private Key: 7
2,809,819 UART: [art] Extend RT PCRs Done
2,810,247 UART: [art] Lock RT PCRs Done
2,811,861 UART: [art] Populate DV Done
2,820,322 UART: [fht] FMC Alias Private Key: 7
2,821,382 UART: [art] Derive CDI
2,821,662 UART: [art] Store in in slot 0x4
2,907,235 UART: [art] Derive Key Pair
2,907,595 UART: [art] Store priv key in slot 0x5
2,920,877 UART: [art] Derive Key Pair - Done
2,935,645 UART: [art] Signing Cert with AUTHO
2,936,125 UART: RITY.KEYID = 7
2,950,965 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,730 UART: [art] PUB.X = 96FE5C15268AC939DBD890C77DE2C3AC1B5D264403C320BA94535C82EB2047F5B65DF73F2EC612F99AB1AE8AFCFB4164
2,958,513 UART: [art] PUB.Y = 0E4A8C119A7D4B37C8C76A885CFB150BBCC3CAB924BC040734C9A577C5790B742CE1405F4325D4D57212459F8C8B9559
2,965,452 UART: [art] SIG.R = 7B0D86EDE0773E057EF64E4714AE85915E0A9F05E07D04860134E0744C096D51C0E6EAB08D00DD8DDF0E98E96EE55643
2,972,182 UART: [art] SIG.S = F544A30B07DD349F7E24AD642173EA93C6FD59A11764EE4556405BB58AD5B8C2E16122812453F6C3D1CBA5E07A6EF927
2,995,383 UART: Caliptra RT
2,995,636 UART: [state] CFI Enabled
3,102,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,419 UART: [rt]cmd =0x43455252, len=4
3,144,174 >>> mbox cmd response data (783 bytes)
3,144,175 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,072 UART: [rt]cmd =0x44504543, len=92
3,357,242 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,012 UART: [kat] SHA2-256
903,952 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,889 UART: [kat] HMAC-384Kdf
923,429 UART: [kat] LMS
1,171,757 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,766 UART: [fht] FHT @ 0x50003400
1,175,419 UART: [idev] ++
1,175,587 UART: [idev] CDI.KEYID = 6
1,175,947 UART: [idev] SUBJECT.KEYID = 7
1,176,371 UART: [idev] UDS.KEYID = 0
1,176,716 ready_for_fw is high
1,176,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,061 UART: [idev] Erasing UDS.KEYID = 0
1,201,058 UART: [idev] Sha1 KeyId Algorithm
1,209,584 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,271 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,262 UART: [ldev] Erasing FE.KEYID = 1
1,243,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,283,165 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,125 >>> mbox cmd response: success
2,777,125 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,778,197 UART: [afmc] ++
2,778,365 UART: [afmc] CDI.KEYID = 6
2,778,727 UART: [afmc] SUBJECT.KEYID = 7
2,779,152 UART: [afmc] AUTHORITY.KEYID = 5
2,814,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,098 UART: [afmc] --
2,858,134 UART: [cold-reset] --
2,859,056 UART: [state] Locking Datavault
2,860,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,651 UART: [state] Locking ICCM
2,861,295 UART: [exit] Launching FMC @ 0x40000130
2,866,624 UART:
2,866,640 UART: Running Caliptra FMC ...
2,867,048 UART:
2,867,191 UART: [state] CFI Enabled
2,877,982 UART: [fht] FMC Alias Private Key: 7
2,985,625 UART: [art] Extend RT PCRs Done
2,986,053 UART: [art] Lock RT PCRs Done
2,987,737 UART: [art] Populate DV Done
2,996,120 UART: [fht] FMC Alias Private Key: 7
2,997,080 UART: [art] Derive CDI
2,997,360 UART: [art] Store in in slot 0x4
3,082,937 UART: [art] Derive Key Pair
3,083,297 UART: [art] Store priv key in slot 0x5
3,097,051 UART: [art] Derive Key Pair - Done
3,111,835 UART: [art] Signing Cert with AUTHO
3,112,315 UART: RITY.KEYID = 7
3,127,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,476 UART: [art] PUB.X = A5E460F01CD4185DADEAA88924A5BA8EB49904B527CF0A4FF39456926455C4B98AA280694B2CF78C9B583ECD3BEA3229
3,135,252 UART: [art] PUB.Y = 83B336916DDA04E67B2712AC969D9F9D8A4DB241CEF59677A55070F5E2DA65D980C8E685FA246F4E34DB929636F97D8C
3,142,205 UART: [art] SIG.R = E8352D2C9F9E9C702E34B929F858BDBA4DC459F822D5ED34F5E3152776FF2B423B8C8D6D0825BD91D0CDC5E0E66D3824
3,148,984 UART: [art] SIG.S = F4BBF0C51D876BA94AEC337F29CD7D52E94CB936A688F691D0D3C7A75776DB7E0D4ED4D7B212EB6EB19B1250E551E54A
3,172,966 UART: Caliptra RT
3,173,311 UART: [state] CFI Enabled
3,282,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,721 UART: [rt]cmd =0x43455252, len=4
3,323,399 >>> mbox cmd response data (784 bytes)
3,323,400 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,259 UART: [rt]cmd =0x44504543, len=92
3,537,111 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,480 ready_for_fw is high
1,060,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,066 >>> mbox cmd response: success
2,629,066 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,691,510 UART:
2,691,526 UART: Running Caliptra FMC ...
2,691,934 UART:
2,692,077 UART: [state] CFI Enabled
2,702,720 UART: [fht] FMC Alias Private Key: 7
2,810,755 UART: [art] Extend RT PCRs Done
2,811,183 UART: [art] Lock RT PCRs Done
2,812,749 UART: [art] Populate DV Done
2,820,810 UART: [fht] FMC Alias Private Key: 7
2,821,848 UART: [art] Derive CDI
2,822,128 UART: [art] Store in in slot 0x4
2,907,539 UART: [art] Derive Key Pair
2,907,899 UART: [art] Store priv key in slot 0x5
2,920,799 UART: [art] Derive Key Pair - Done
2,935,296 UART: [art] Signing Cert with AUTHO
2,935,776 UART: RITY.KEYID = 7
2,951,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,089 UART: [art] PUB.X = F7FA0F4098F445C56F31FC54B00E3826A97E479A305E40090EC5E504F640CB8327C514E1E3947A45A5309F143203A7FC
2,958,839 UART: [art] PUB.Y = F95D470B7AFE8A77E4D180168175CAF7020F2AFF409D7754411673126F66E902029601922E804D0F8F960A624CB6AD85
2,965,759 UART: [art] SIG.R = 88FBD75D186F2932152FE2BA83D84A17323C3B25542EECCA28590C476494837BC96FD35A2010E50FBCDA209EF1F134EB
2,972,531 UART: [art] SIG.S = 1D55E3C0B01AD1751F3BCC1B43043116B949E0F177C5677BB7BACB0049D4ADAABE383B6C7D49E25812CC879B7BB015B0
2,996,007 UART: Caliptra RT
2,996,352 UART: [state] CFI Enabled
3,104,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,287 UART: [rt]cmd =0x43455252, len=4
3,145,996 >>> mbox cmd response data (783 bytes)
3,145,997 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,176 UART: [rt]cmd =0x44504543, len=92
3,360,369 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,883 UART: [kat] ++
895,035 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
903,904 UART: [kat] SHA2-512-ACC
905,805 UART: [kat] ECC-384
915,832 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,482 UART: [ldev] --
1,279,904 UART: [fwproc] Wait for Commands...
1,280,617 UART: [fwproc] Recv command 0x46574c44
1,281,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,858 >>> mbox cmd response: success
2,771,858 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,772,877 UART: [afmc] ++
2,773,045 UART: [afmc] CDI.KEYID = 6
2,773,408 UART: [afmc] SUBJECT.KEYID = 7
2,773,834 UART: [afmc] AUTHORITY.KEYID = 5
2,809,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,216 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,276 UART: [afmc] --
2,852,354 UART: [cold-reset] --
2,853,030 UART: [state] Locking Datavault
2,854,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,637 UART: [state] Locking ICCM
2,855,115 UART: [exit] Launching FMC @ 0x40000130
2,860,444 UART:
2,860,460 UART: Running Caliptra FMC ...
2,860,868 UART:
2,860,922 UART: [state] CFI Enabled
2,871,659 UART: [fht] FMC Alias Private Key: 7
2,980,152 UART: [art] Extend RT PCRs Done
2,980,580 UART: [art] Lock RT PCRs Done
2,982,166 UART: [art] Populate DV Done
2,990,271 UART: [fht] FMC Alias Private Key: 7
2,991,267 UART: [art] Derive CDI
2,991,547 UART: [art] Store in in slot 0x4
3,077,282 UART: [art] Derive Key Pair
3,077,642 UART: [art] Store priv key in slot 0x5
3,091,164 UART: [art] Derive Key Pair - Done
3,106,284 UART: [art] Signing Cert with AUTHO
3,106,764 UART: RITY.KEYID = 7
3,122,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,893 UART: [art] PUB.X = 3F968B29A156C55B9A56697B3BCE29CF459D212289970A21BF4F9EA1A69818848144CA8674A824A78561D55D9D4AB01B
3,129,658 UART: [art] PUB.Y = 341DFDF804D8AD4A2FA091E8719A6EF0BAFC5F3370C4086478D888E85752616BD526E6ADB50D7C9C9F6405E0B766D843
3,136,604 UART: [art] SIG.R = 64D3B994C4C671E58E33ED2869187D33DFAC55FF99F1A1F678118AD8113A3682B17CF74B03818A912C8E40BE0BD8177B
3,143,372 UART: [art] SIG.S = 097E53C73EEDB7D6B18E764C626342B6AFCBD04FCB6D2908CC43A30F4A8F392DEBE7D6DB0C82760375CE307047E7B2B9
3,167,092 UART: Caliptra RT
3,167,345 UART: [state] CFI Enabled
3,274,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,866 UART: [rt]cmd =0x43455252, len=4
3,315,911 >>> mbox cmd response data (782 bytes)
3,315,912 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,105 UART: [rt]cmd =0x44504543, len=92
3,528,805 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,832 ready_for_fw is high
1,055,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,236 >>> mbox cmd response: success
2,623,236 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,685,662 UART:
2,685,678 UART: Running Caliptra FMC ...
2,686,086 UART:
2,686,140 UART: [state] CFI Enabled
2,696,981 UART: [fht] FMC Alias Private Key: 7
2,804,902 UART: [art] Extend RT PCRs Done
2,805,330 UART: [art] Lock RT PCRs Done
2,806,836 UART: [art] Populate DV Done
2,815,185 UART: [fht] FMC Alias Private Key: 7
2,816,163 UART: [art] Derive CDI
2,816,443 UART: [art] Store in in slot 0x4
2,901,960 UART: [art] Derive Key Pair
2,902,320 UART: [art] Store priv key in slot 0x5
2,916,094 UART: [art] Derive Key Pair - Done
2,930,841 UART: [art] Signing Cert with AUTHO
2,931,321 UART: RITY.KEYID = 7
2,946,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,320 UART: [art] PUB.X = 545B6EF23E836B2B77CBE552D0295FD747A12E92D6D0634EA94F5B2EA92AF7909C581C4278DF016397C1E4E0884652E1
2,954,089 UART: [art] PUB.Y = D385EE8EEB91C6854753CE93C720E67E97DA400020C7E11F826AAFFB5C2D34F7536B49BB468AF9D6B049FE1DA4B8BC09
2,961,030 UART: [art] SIG.R = 70069FAD509EA1D31F7347FA092099644F32FBB32749850D9E98ED289F9262CEBDD8EBA89AA426B8D41A42964FF0E9E6
2,967,799 UART: [art] SIG.S = 7D6AB339B264621E457B1B1D071F5F087EDB841A183DA69A3E8D9232D0525351BA4BB182C081450D04CB02642ACB37F6
2,991,735 UART: Caliptra RT
2,991,988 UART: [state] CFI Enabled
3,098,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,413 UART: [rt]cmd =0x43455252, len=4
3,140,278 >>> mbox cmd response data (782 bytes)
3,140,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,358 UART: [rt]cmd =0x44504543, len=92
3,354,268 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,551 UART: [kat] HMAC-384Kdf
920,167 UART: [kat] LMS
1,168,479 UART: [kat] --
1,169,362 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,173,960 ready_for_fw is high
1,173,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,850 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,794 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,241,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,257 UART: [ldev] --
1,280,563 UART: [fwproc] Wait for Commands...
1,281,328 UART: [fwproc] Recv command 0x46574c44
1,282,061 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,579 >>> mbox cmd response: success
2,773,579 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,660 UART: [afmc] ++
2,774,828 UART: [afmc] CDI.KEYID = 6
2,775,191 UART: [afmc] SUBJECT.KEYID = 7
2,775,617 UART: [afmc] AUTHORITY.KEYID = 5
2,811,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,943 UART: [afmc] --
2,855,021 UART: [cold-reset] --
2,856,125 UART: [state] Locking Datavault
2,857,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,984 UART: [state] Locking ICCM
2,858,572 UART: [exit] Launching FMC @ 0x40000130
2,863,901 UART:
2,863,917 UART: Running Caliptra FMC ...
2,864,325 UART:
2,864,468 UART: [state] CFI Enabled
2,874,629 UART: [fht] FMC Alias Private Key: 7
2,982,608 UART: [art] Extend RT PCRs Done
2,983,036 UART: [art] Lock RT PCRs Done
2,984,456 UART: [art] Populate DV Done
2,992,901 UART: [fht] FMC Alias Private Key: 7
2,993,899 UART: [art] Derive CDI
2,994,179 UART: [art] Store in in slot 0x4
3,079,926 UART: [art] Derive Key Pair
3,080,286 UART: [art] Store priv key in slot 0x5
3,093,824 UART: [art] Derive Key Pair - Done
3,108,528 UART: [art] Signing Cert with AUTHO
3,109,008 UART: RITY.KEYID = 7
3,123,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,737 UART: [art] PUB.X = 7CE7E2DD74ABC31BD93D99E3E81A9A1C3172EEA5106E1E663ADA60FAD9212C28498381C4B680FD81C76D2EDDFE737074
3,131,523 UART: [art] PUB.Y = AF292EE14C07ED6B520BAF6FA18FED0BDE0ED992D03A4F91591FCECED2EE3393A133DD6D36D658BFE8D3FFF710F0F84D
3,138,493 UART: [art] SIG.R = 7465E43C2334F90FE671A43CB53EE39D2D7A6DE2D7F6EDC98BBEF00B4835540B39C99BE06BD44BA2B0E86647FCF77E66
3,145,270 UART: [art] SIG.S = 4B6E71EFF01B03783981AA4E4FE31A32AD823D0D6983D250B2D8CD1F776E099814FCB7CA3C475FE81646A8099BCB9EF7
3,168,713 UART: Caliptra RT
3,169,058 UART: [state] CFI Enabled
3,276,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,907 UART: [rt]cmd =0x43455252, len=4
3,317,626 >>> mbox cmd response data (782 bytes)
3,317,627 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,506 UART: [rt]cmd =0x44504543, len=92
3,530,450 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,805 ready_for_fw is high
1,056,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,105 >>> mbox cmd response: success
2,626,105 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,093 UART:
2,688,109 UART: Running Caliptra FMC ...
2,688,517 UART:
2,688,660 UART: [state] CFI Enabled
2,699,483 UART: [fht] FMC Alias Private Key: 7
2,807,856 UART: [art] Extend RT PCRs Done
2,808,284 UART: [art] Lock RT PCRs Done
2,809,540 UART: [art] Populate DV Done
2,817,807 UART: [fht] FMC Alias Private Key: 7
2,818,835 UART: [art] Derive CDI
2,819,115 UART: [art] Store in in slot 0x4
2,904,628 UART: [art] Derive Key Pair
2,904,988 UART: [art] Store priv key in slot 0x5
2,918,620 UART: [art] Derive Key Pair - Done
2,933,144 UART: [art] Signing Cert with AUTHO
2,933,624 UART: RITY.KEYID = 7
2,948,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,353 UART: [art] PUB.X = 75D943580AC83E9560A3D6036D55F042D39E0BDFC53F1DC936210831877181A4DB90B746AED7BDB224511603AC030065
2,956,079 UART: [art] PUB.Y = E4409F59AB98D4445F90AB5F4259D5D8E555453C17E4B3FBB7E8C0C81F146F09A2C2CC599AE64AD761980B25FA01A9B7
2,963,030 UART: [art] SIG.R = 256B06040C1AB9F47B158C94D8AD94E4CD5E82C1DC15D2AE85F3C1513D9C319D4C48ED7A795E4651183F3309ECD5A4BF
2,969,800 UART: [art] SIG.S = BBDA9FE33E35B95853D9275457117D118C7D0E1AF435443ED7766DD9CE1D41B1A08C034D2E3107160EE1F2171C627CEF
2,993,753 UART: Caliptra RT
2,994,098 UART: [state] CFI Enabled
3,102,931 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,361 UART: [rt]cmd =0x43455252, len=4
3,144,318 >>> mbox cmd response data (783 bytes)
3,144,319 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,024 UART: [rt]cmd =0x44504543, len=92
3,356,565 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,163 UART:
192,522 UART: Running Caliptra ROM ...
193,711 UART:
193,871 UART: [state] CFI Enabled
263,772 UART: [state] LifecycleState = Unprovisioned
265,684 UART: [state] DebugLocked = No
268,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,593 UART: [kat] SHA2-256
442,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,755 UART: [kat] ++
453,276 UART: [kat] sha1
464,857 UART: [kat] SHA2-256
467,508 UART: [kat] SHA2-384
474,203 UART: [kat] SHA2-512-ACC
476,570 UART: [kat] ECC-384
2,768,070 UART: [kat] HMAC-384Kdf
2,798,548 UART: [kat] LMS
3,988,887 UART: [kat] --
3,992,495 UART: [cold-reset] ++
3,994,854 UART: [fht] Storing FHT @ 0x50003400
4,006,496 UART: [idev] ++
4,007,110 UART: [idev] CDI.KEYID = 6
4,008,006 UART: [idev] SUBJECT.KEYID = 7
4,009,260 UART: [idev] UDS.KEYID = 0
4,010,230 ready_for_fw is high
4,010,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,822 UART: [idev] Erasing UDS.KEYID = 0
7,343,129 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,138 UART: [idev] --
7,370,347 UART: [ldev] ++
7,370,923 UART: [ldev] CDI.KEYID = 6
7,371,895 UART: [ldev] SUBJECT.KEYID = 5
7,373,129 UART: [ldev] AUTHORITY.KEYID = 7
7,374,363 UART: [ldev] FE.KEYID = 1
7,400,889 UART: [ldev] Erasing FE.KEYID = 1
10,734,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,996 UART: [ldev] --
13,094,292 UART: [fwproc] Waiting for Commands...
13,097,519 UART: [fwproc] Received command 0x46574c44
13,099,703 UART: [fwproc] Received Image of size 114124 bytes
17,161,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,183 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,623 >>> mbox cmd response: success
17,627,164 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,631,294 UART: [afmc] ++
17,631,884 UART: [afmc] CDI.KEYID = 6
17,632,800 UART: [afmc] SUBJECT.KEYID = 7
17,634,075 UART: [afmc] AUTHORITY.KEYID = 5
21,006,255 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,047 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,448 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,276 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,743 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,957 UART: [afmc] --
23,379,722 UART: [cold-reset] --
23,382,133 UART: [state] Locking Datavault
23,386,579 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,336 UART: [state] Locking ICCM
23,390,885 UART: [exit] Launching FMC @ 0x40000130
23,399,284 UART:
23,399,525 UART: Running Caliptra FMC ...
23,400,629 UART:
23,400,791 UART: [state] CFI Enabled
23,468,262 UART: [fht] FMC Alias Private Key: 7
25,805,803 UART: [art] Extend RT PCRs Done
25,807,036 UART: [art] Lock RT PCRs Done
25,808,559 UART: [art] Populate DV Done
25,813,759 UART: [fht] FMC Alias Private Key: 7
25,815,246 UART: [art] Derive CDI
25,816,012 UART: [art] Store in in slot 0x4
25,876,544 UART: [art] Derive Key Pair
25,877,615 UART: [art] Store priv key in slot 0x5
29,169,855 UART: [art] Derive Key Pair - Done
29,182,962 UART: [art] Signing Cert with AUTHO
29,184,282 UART: RITY.KEYID = 7
31,471,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,477 UART: [art] PUB.X = 3DF1D1C11F9A777A8099FBD9B528E3F17EDD0B06B56260748E18C12CBB136E059A658D211FB2F226985F253657304B1D
31,480,738 UART: [art] PUB.Y = 97F34A25B9CF32E1559ECB7EFA689638DCC4FB68B7F2A2A5BED237B318C0DD2418D3DBA662AFEA9BA862E538C4C40C3A
31,487,980 UART: [art] SIG.R = 2D67E3CEA351111B8F40542AD5A4DFFD5458CBF26C2100C0960C4F5DD538F00200317409510F4F5C82840712BDE1A802
31,495,322 UART: [art] SIG.S = 365065895DDD739D92532A2D1AFEDD82AEAD62C853E56E3B13842D9EC732A8B04AED8BCD8C88FDA7C1173118203720D2
32,800,759 UART: Caliptra RT
32,801,470 UART: [state] CFI Enabled
32,962,579 UART: [rt] RT listening for mailbox commands...
32,993,888 UART: [rt]cmd =0x4c444556, len=4
33,005,024 >>> mbox cmd response data (687 bytes)
33,046,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,076,675 UART: [rt]cmd =0x43455246, len=4
33,089,746 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,804,204 ready_for_fw is high
3,804,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,555 >>> mbox cmd response: success
17,874,111 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,564,120 UART:
23,564,504 UART: Running Caliptra FMC ...
23,565,726 UART:
23,565,893 UART: [state] CFI Enabled
23,616,629 UART: [fht] FMC Alias Private Key: 7
25,954,531 UART: [art] Extend RT PCRs Done
25,955,761 UART: [art] Lock RT PCRs Done
25,957,338 UART: [art] Populate DV Done
25,962,593 UART: [fht] FMC Alias Private Key: 7
25,964,302 UART: [art] Derive CDI
25,965,141 UART: [art] Store in in slot 0x4
26,024,493 UART: [art] Derive Key Pair
26,025,541 UART: [art] Store priv key in slot 0x5
29,318,517 UART: [art] Derive Key Pair - Done
29,331,892 UART: [art] Signing Cert with AUTHO
29,333,199 UART: RITY.KEYID = 7
31,619,605 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,116 UART: [art] PUB.X = 70DDB444A1FF8D32D337C6D9E044023BFD8E61FA740040974BCDEDE8E18FD6A2C627B2D5A53B7E72358FA156DA27C49E
31,628,357 UART: [art] PUB.Y = 35C2A2B7C8F132563C544200FCDB75042C18005B9ADD236D830EE505E54A7D61437C0666CD5FB78A135382C70550B479
31,635,590 UART: [art] SIG.R = 10D96EFA8D426B0C00EE9AEE3BCA6C1BA7D5DDD1BA57B440629D70DDBE4C5357500873A371D360F35AD31AF741515463
31,642,991 UART: [art] SIG.S = DD2435CC8B188438973E8E670A46B48AA8C600B9CA3E424DDA6C80A8F138633D8165FC5303282848B3E646EDA5A1EE75
32,948,360 UART: Caliptra RT
32,949,085 UART: [state] CFI Enabled
33,109,981 UART: [rt] RT listening for mailbox commands...
33,141,515 UART: [rt]cmd =0x4c444556, len=4
33,152,444 >>> mbox cmd response data (687 bytes)
33,194,018 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,224,037 UART: [rt]cmd =0x43455246, len=4
33,236,887 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,321 UART:
192,682 UART: Running Caliptra ROM ...
193,876 UART:
603,446 UART: [state] CFI Enabled
616,501 UART: [state] LifecycleState = Unprovisioned
618,546 UART: [state] DebugLocked = No
620,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,945 UART: [kat] SHA2-256
795,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,234 UART: [kat] ++
806,716 UART: [kat] sha1
817,938 UART: [kat] SHA2-256
820,585 UART: [kat] SHA2-384
827,070 UART: [kat] SHA2-512-ACC
829,444 UART: [kat] ECC-384
3,116,540 UART: [kat] HMAC-384Kdf
3,128,649 UART: [kat] LMS
4,318,823 UART: [kat] --
4,323,765 UART: [cold-reset] ++
4,326,260 UART: [fht] Storing FHT @ 0x50003400
4,338,793 UART: [idev] ++
4,339,429 UART: [idev] CDI.KEYID = 6
4,340,308 UART: [idev] SUBJECT.KEYID = 7
4,341,544 UART: [idev] UDS.KEYID = 0
4,342,518 ready_for_fw is high
4,342,724 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,090 UART: [idev] Erasing UDS.KEYID = 0
7,626,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,453 UART: [idev] --
7,651,121 UART: [ldev] ++
7,651,687 UART: [ldev] CDI.KEYID = 6
7,652,642 UART: [ldev] SUBJECT.KEYID = 5
7,653,866 UART: [ldev] AUTHORITY.KEYID = 7
7,655,145 UART: [ldev] FE.KEYID = 1
7,664,781 UART: [ldev] Erasing FE.KEYID = 1
10,953,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,426 UART: [ldev] --
13,311,467 UART: [fwproc] Waiting for Commands...
13,313,887 UART: [fwproc] Received command 0x46574c44
13,316,117 UART: [fwproc] Received Image of size 114124 bytes
17,372,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,970 >>> mbox cmd response: success
17,829,507 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,833,816 UART: [afmc] ++
17,834,453 UART: [afmc] CDI.KEYID = 6
17,835,327 UART: [afmc] SUBJECT.KEYID = 7
17,836,586 UART: [afmc] AUTHORITY.KEYID = 5
21,151,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,823 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,241 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,061 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,513 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,923 UART: [afmc] --
23,517,253 UART: [cold-reset] --
23,521,060 UART: [state] Locking Datavault
23,526,100 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,853 UART: [state] Locking ICCM
23,530,666 UART: [exit] Launching FMC @ 0x40000130
23,539,060 UART:
23,539,289 UART: Running Caliptra FMC ...
23,540,384 UART:
23,540,557 UART: [state] CFI Enabled
23,548,540 UART: [fht] FMC Alias Private Key: 7
25,879,143 UART: [art] Extend RT PCRs Done
25,880,366 UART: [art] Lock RT PCRs Done
25,881,931 UART: [art] Populate DV Done
25,887,233 UART: [fht] FMC Alias Private Key: 7
25,888,873 UART: [art] Derive CDI
25,889,683 UART: [art] Store in in slot 0x4
25,932,385 UART: [art] Derive Key Pair
25,933,423 UART: [art] Store priv key in slot 0x5
29,175,398 UART: [art] Derive Key Pair - Done
29,188,016 UART: [art] Signing Cert with AUTHO
29,189,368 UART: RITY.KEYID = 7
31,469,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,568 UART: [art] PUB.X = 9E846E08E1B9E347F6FE9E5E199ED30F19837939F4AF813995604330ADB742F53C1A79EEB1B77C9F8A8B5D8CD161FB6F
31,477,812 UART: [art] PUB.Y = B302EA41100F3CFF3DE35D6C0F95BB1A1F6A03A1657DA149B267DDE2ECC2C42B40F69354A4D05270FBAEF2D3D93C270A
31,485,087 UART: [art] SIG.R = 302F0E1A6316C26F695C59559CF5E521C7C619334AD05DF2AACD87C0F24FF0DCAE2F5F9F0247CF849A959918E2A87A1A
31,492,478 UART: [art] SIG.S = 3C3657A3EFBF2CCFAD722E66431678D12CD1B1929833D9F158926F64573F751F33AB3ADAB5205687C9C7CDDDC7B13FD7
32,797,830 UART: Caliptra RT
32,798,546 UART: [state] CFI Enabled
32,917,394 UART: [rt] RT listening for mailbox commands...
32,948,902 UART: [rt]cmd =0x4c444556, len=4
32,960,177 >>> mbox cmd response data (687 bytes)
33,001,978 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,032,164 UART: [rt]cmd =0x43455246, len=4
33,045,163 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,126,277 ready_for_fw is high
4,126,919 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,834 >>> mbox cmd response: success
18,081,469 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,720,428 UART:
23,720,797 UART: Running Caliptra FMC ...
23,721,953 UART:
23,722,113 UART: [state] CFI Enabled
23,729,686 UART: [fht] FMC Alias Private Key: 7
26,060,255 UART: [art] Extend RT PCRs Done
26,061,479 UART: [art] Lock RT PCRs Done
26,063,114 UART: [art] Populate DV Done
26,068,423 UART: [fht] FMC Alias Private Key: 7
26,070,018 UART: [art] Derive CDI
26,070,781 UART: [art] Store in in slot 0x4
26,113,313 UART: [art] Derive Key Pair
26,114,305 UART: [art] Store priv key in slot 0x5
29,356,322 UART: [art] Derive Key Pair - Done
29,369,433 UART: [art] Signing Cert with AUTHO
29,370,735 UART: RITY.KEYID = 7
31,650,341 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,974 UART: [art] PUB.X = 05D7563209D71A7BC05F1D6C350AFD8678E06197BEDACC837556CE9D1C56A87A354C6994021E706A433DA8CF711343E3
31,659,086 UART: [art] PUB.Y = 9699A5183B96A348BFEB6DCBFA3BD177782C6BEF7A0F52B44DED2BA81F8D6D139A63BB8BB82F34B7C65901599C55A2DB
31,666,323 UART: [art] SIG.R = 45199C0F1EC64DBD78BDF786B50A3EA1119C4C43DD1863889A1C8DBA1887C0FB1CAD25EC8C9A9D3D281BE975E271D64E
31,673,711 UART: [art] SIG.S = C32A007E7CF6C4B2A19F5876612D49EF4BEBFCA4CB2BB1FBCCA6957919613C187D473E0296D1EDBAFFA3680B15E51269
32,979,526 UART: Caliptra RT
32,980,239 UART: [state] CFI Enabled
33,099,319 UART: [rt] RT listening for mailbox commands...
33,130,800 UART: [rt]cmd =0x4c444556, len=4
33,141,940 >>> mbox cmd response data (687 bytes)
33,184,161 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,214,169 UART: [rt]cmd =0x43455246, len=4
33,227,020 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,050 UART:
192,419 UART: Running Caliptra ROM ...
193,558 UART:
193,710 UART: [state] CFI Enabled
258,769 UART: [state] LifecycleState = Unprovisioned
260,681 UART: [state] DebugLocked = No
263,064 UART: [state] WD Timer not started. Device not locked for debugging
266,814 UART: [kat] SHA2-256
445,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,576 UART: [kat] ++
458,031 UART: [kat] sha1
468,836 UART: [kat] SHA2-256
471,911 UART: [kat] SHA2-384
479,672 UART: [kat] SHA2-512-ACC
482,682 UART: [kat] ECC-384
2,927,232 UART: [kat] HMAC-384Kdf
2,949,900 UART: [kat] LMS
3,479,384 UART: [kat] --
3,485,014 UART: [cold-reset] ++
3,485,885 UART: [fht] FHT @ 0x50003400
3,495,851 UART: [idev] ++
3,496,457 UART: [idev] CDI.KEYID = 6
3,497,376 UART: [idev] SUBJECT.KEYID = 7
3,498,545 UART: [idev] UDS.KEYID = 0
3,499,471 ready_for_fw is high
3,499,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,449 UART: [idev] Erasing UDS.KEYID = 0
6,003,272 UART: [idev] Sha1 KeyId Algorithm
6,026,127 UART: [idev] --
6,029,964 UART: [ldev] ++
6,030,536 UART: [ldev] CDI.KEYID = 6
6,031,453 UART: [ldev] SUBJECT.KEYID = 5
6,032,616 UART: [ldev] AUTHORITY.KEYID = 7
6,033,860 UART: [ldev] FE.KEYID = 1
6,079,694 UART: [ldev] Erasing FE.KEYID = 1
8,584,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,391 UART: [ldev] --
10,393,656 UART: [fwproc] Wait for Commands...
10,395,157 UART: [fwproc] Recv command 0x46574c44
10,397,250 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,258,423 >>> mbox cmd response: success
14,258,940 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,263,449 UART: [afmc] ++
14,264,033 UART: [afmc] CDI.KEYID = 6
14,264,950 UART: [afmc] SUBJECT.KEYID = 7
14,266,132 UART: [afmc] AUTHORITY.KEYID = 5
16,806,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,875 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,612 UART: [afmc] --
18,610,466 UART: [cold-reset] --
18,614,257 UART: [state] Locking Datavault
18,620,373 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,018 UART: [state] Locking ICCM
18,623,579 UART: [exit] Launching FMC @ 0x40000130
18,631,980 UART:
18,632,211 UART: Running Caliptra FMC ...
18,633,312 UART:
18,633,493 UART: [state] CFI Enabled
18,691,175 UART: [fht] FMC Alias Private Key: 7
20,455,533 UART: [art] Extend RT PCRs Done
20,456,732 UART: [art] Lock RT PCRs Done
20,458,406 UART: [art] Populate DV Done
20,463,862 UART: [fht] FMC Alias Private Key: 7
20,465,414 UART: [art] Derive CDI
20,466,231 UART: [art] Store in in slot 0x4
20,524,103 UART: [art] Derive Key Pair
20,525,097 UART: [art] Store priv key in slot 0x5
22,987,628 UART: [art] Derive Key Pair - Done
23,000,787 UART: [art] Signing Cert with AUTHO
23,002,095 UART: RITY.KEYID = 7
24,713,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,276 UART: [art] PUB.X = A5567F808AC336F119DF6F57937C62B333A0F5CDCD033CFE09CC02F3CE519F2746A5CFA87BD4351011004F7E4ED313A6
24,722,524 UART: [art] PUB.Y = 204956EFA9EADA0D3D5D57BF54EBD0697C5CE0664C30662E4A1D74897D16655408051EB59BD71B24C0841C1582CA92E2
24,729,821 UART: [art] SIG.R = 5B4EE0DFBDA243701E9E570258B2AA2CC36184D98F29241F18451243CF6D6298A58FFBE5090DE7C081D68099F9292FB0
24,737,215 UART: [art] SIG.S = EA812D1F0D523E4CCF43A22482CB7E8238B2F359912B7D36FC4FF1B222FB3626CD48D0CC91FDE05325166B6205AD715C
25,716,655 UART: Caliptra RT
25,717,360 UART: [state] CFI Enabled
25,882,274 UART: [rt] RT listening for mailbox commands...
25,913,902 UART: [rt]cmd =0x4c444556, len=4
25,924,808 >>> mbox cmd response data (687 bytes)
25,966,818 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,996,882 UART: [rt]cmd =0x43455246, len=4
26,009,337 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,382,487 ready_for_fw is high
3,382,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,738 >>> mbox cmd response: success
14,074,504 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,370,069 UART:
18,370,451 UART: Running Caliptra FMC ...
18,371,585 UART:
18,371,742 UART: [state] CFI Enabled
18,433,504 UART: [fht] FMC Alias Private Key: 7
20,197,363 UART: [art] Extend RT PCRs Done
20,198,581 UART: [art] Lock RT PCRs Done
20,200,315 UART: [art] Populate DV Done
20,205,908 UART: [fht] FMC Alias Private Key: 7
20,207,621 UART: [art] Derive CDI
20,208,440 UART: [art] Store in in slot 0x4
20,266,120 UART: [art] Derive Key Pair
20,267,161 UART: [art] Store priv key in slot 0x5
22,730,484 UART: [art] Derive Key Pair - Done
22,743,371 UART: [art] Signing Cert with AUTHO
22,744,714 UART: RITY.KEYID = 7
24,456,140 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,635 UART: [art] PUB.X = 780468EA9829ED81D2EF55F04FCBC4C54CD988456DC03D051236C1C8162CDDBC22919034424CFBF5C86B0EACDF65FCEF
24,464,949 UART: [art] PUB.Y = A39D07C68E4C0D82E08096676101FB7310DFA9C5E3C06A5BDE58DA3D5E39929ABA41F696727585F3C916EC4E944D0484
24,472,217 UART: [art] SIG.R = 02E3134923A49B93BE3ECA4D2D6EB9D0690868E4C2138B5EA2F0599087F4B2B7E63FBC9628DCF9710CDB9815BB7D692F
24,479,559 UART: [art] SIG.S = 8076DDF52270DD85FF989DEB7AEA16E3BFDFC0E7A7029DB68E490DFB772D3792A0468FEAD9831CD664B571062C4997CF
25,458,532 UART: Caliptra RT
25,459,229 UART: [state] CFI Enabled
25,624,112 UART: [rt] RT listening for mailbox commands...
25,655,758 UART: [rt]cmd =0x4c444556, len=4
25,667,008 >>> mbox cmd response data (687 bytes)
25,708,516 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,738,531 UART: [rt]cmd =0x43455246, len=4
25,751,058 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,493 UART:
192,864 UART: Running Caliptra ROM ...
194,012 UART:
603,628 UART: [state] CFI Enabled
615,608 UART: [state] LifecycleState = Unprovisioned
617,513 UART: [state] DebugLocked = No
620,019 UART: [state] WD Timer not started. Device not locked for debugging
624,604 UART: [kat] SHA2-256
803,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,274 UART: [kat] ++
815,716 UART: [kat] sha1
826,365 UART: [kat] SHA2-256
829,373 UART: [kat] SHA2-384
835,575 UART: [kat] SHA2-512-ACC
838,517 UART: [kat] ECC-384
3,281,243 UART: [kat] HMAC-384Kdf
3,293,333 UART: [kat] LMS
3,822,842 UART: [kat] --
3,825,767 UART: [cold-reset] ++
3,827,901 UART: [fht] FHT @ 0x50003400
3,839,793 UART: [idev] ++
3,840,354 UART: [idev] CDI.KEYID = 6
3,841,375 UART: [idev] SUBJECT.KEYID = 7
3,842,539 UART: [idev] UDS.KEYID = 0
3,843,459 ready_for_fw is high
3,843,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,799 UART: [idev] Erasing UDS.KEYID = 0
6,311,690 UART: [idev] Sha1 KeyId Algorithm
6,335,753 UART: [idev] --
6,340,775 UART: [ldev] ++
6,341,340 UART: [ldev] CDI.KEYID = 6
6,342,252 UART: [ldev] SUBJECT.KEYID = 5
6,343,457 UART: [ldev] AUTHORITY.KEYID = 7
6,344,684 UART: [ldev] FE.KEYID = 1
6,354,413 UART: [ldev] Erasing FE.KEYID = 1
8,828,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,812 UART: [ldev] --
10,619,053 UART: [fwproc] Wait for Commands...
10,622,231 UART: [fwproc] Recv command 0x46574c44
10,624,312 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,233 >>> mbox cmd response: success
14,482,767 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,485,778 UART: [afmc] ++
14,486,360 UART: [afmc] CDI.KEYID = 6
14,487,232 UART: [afmc] SUBJECT.KEYID = 7
14,488,496 UART: [afmc] AUTHORITY.KEYID = 5
16,990,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,849 UART: [afmc] --
18,784,440 UART: [cold-reset] --
18,788,354 UART: [state] Locking Datavault
18,794,941 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,575 UART: [state] Locking ICCM
18,797,716 UART: [exit] Launching FMC @ 0x40000130
18,806,104 UART:
18,806,332 UART: Running Caliptra FMC ...
18,807,423 UART:
18,807,572 UART: [state] CFI Enabled
18,816,000 UART: [fht] FMC Alias Private Key: 7
20,573,154 UART: [art] Extend RT PCRs Done
20,574,368 UART: [art] Lock RT PCRs Done
20,576,334 UART: [art] Populate DV Done
20,581,733 UART: [fht] FMC Alias Private Key: 7
20,583,316 UART: [art] Derive CDI
20,584,055 UART: [art] Store in in slot 0x4
20,626,510 UART: [art] Derive Key Pair
20,627,542 UART: [art] Store priv key in slot 0x5
23,053,866 UART: [art] Derive Key Pair - Done
23,066,540 UART: [art] Signing Cert with AUTHO
23,067,850 UART: RITY.KEYID = 7
24,773,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,642 UART: [art] PUB.X = 214FD98F3DB91AB96E1916140E99A4C5866C9AF83FCB7C4269F6DA3F90AC744A895CE0E32FE404615A6FC6D9202DBAE5
24,781,936 UART: [art] PUB.Y = 18309A13BACBC2DBD3D4A05026851CA2218F350ED3B34AB15675E1B2F3E0153B74DECEFFCCEEAA72AF590AE2F987804D
24,789,218 UART: [art] SIG.R = C764CA7BA7F2092689B1ACF2B38FBC0C7C9FDE400EDF631F462C5C199D538556FEEC383DAFDC8AABDD2A7EC7D951592D
24,796,601 UART: [art] SIG.S = D468C2D01CC9BE7B9BF4BE8246CC586276610040DE5233E4B93D420EC22741EF696426D090001609B93444D0AEBF88CF
25,775,752 UART: Caliptra RT
25,776,460 UART: [state] CFI Enabled
25,893,905 UART: [rt] RT listening for mailbox commands...
25,924,939 UART: [rt]cmd =0x4c444556, len=4
25,936,019 >>> mbox cmd response data (687 bytes)
25,978,187 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,008,498 UART: [rt]cmd =0x43455246, len=4
26,021,188 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,698,595 ready_for_fw is high
3,698,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,009 >>> mbox cmd response: success
14,271,600 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,523,801 UART:
18,524,175 UART: Running Caliptra FMC ...
18,525,367 UART:
18,525,530 UART: [state] CFI Enabled
18,533,295 UART: [fht] FMC Alias Private Key: 7
20,291,190 UART: [art] Extend RT PCRs Done
20,292,412 UART: [art] Lock RT PCRs Done
20,294,039 UART: [art] Populate DV Done
20,299,446 UART: [fht] FMC Alias Private Key: 7
20,301,110 UART: [art] Derive CDI
20,302,059 UART: [art] Store in in slot 0x4
20,344,422 UART: [art] Derive Key Pair
20,345,428 UART: [art] Store priv key in slot 0x5
22,772,214 UART: [art] Derive Key Pair - Done
22,785,026 UART: [art] Signing Cert with AUTHO
22,786,362 UART: RITY.KEYID = 7
24,492,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,533 UART: [art] PUB.X = 1068A40BA52FD93A1C8A506BFC3C7D8028D4FF1DE6E0A2429A4C37F032FFB2AC118506903BC41DB82FEC8FB3008BAF58
24,500,774 UART: [art] PUB.Y = 3063AF636799EB75D013842314F8F61361CE35D9375027A3D4BCBE16EA4F86EEDF96BFB49F3FA0E7BCE1C1FCC385F124
24,508,078 UART: [art] SIG.R = 7450A2ADFE97F3522B5EC4295171000BCD54BAA09DE222A5A4ABC599A887E4CEE58937572155CA8B384C502419DF0E2B
24,515,474 UART: [art] SIG.S = D63D920185D692C6101E766AE047D26492DB7C137A699138BC79DF0AAD81F3401F9FC434953E8D740658FDEB4E735F95
25,493,926 UART: Caliptra RT
25,494,644 UART: [state] CFI Enabled
25,611,832 UART: [rt] RT listening for mailbox commands...
25,643,353 UART: [rt]cmd =0x4c444556, len=4
25,654,543 >>> mbox cmd response data (687 bytes)
25,696,066 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,726,050 UART: [rt]cmd =0x43455246, len=4
25,738,756 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,106 UART:
192,565 UART: Running Caliptra ROM ...
193,708 UART:
193,856 UART: [state] CFI Enabled
262,728 UART: [state] LifecycleState = Unprovisioned
265,174 UART: [state] DebugLocked = No
267,119 UART: [state] WD Timer not started. Device not locked for debugging
271,798 UART: [kat] SHA2-256
461,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,482 UART: [kat] ++
472,926 UART: [kat] sha1
483,372 UART: [kat] SHA2-256
486,454 UART: [kat] SHA2-384
492,513 UART: [kat] SHA2-512-ACC
495,094 UART: [kat] ECC-384
2,947,605 UART: [kat] HMAC-384Kdf
2,970,931 UART: [kat] LMS
3,502,673 UART: [kat] --
3,505,605 UART: [cold-reset] ++
3,506,889 UART: [fht] FHT @ 0x50003400
3,518,150 UART: [idev] ++
3,518,803 UART: [idev] CDI.KEYID = 6
3,519,757 UART: [idev] SUBJECT.KEYID = 7
3,521,003 UART: [idev] UDS.KEYID = 0
3,521,907 ready_for_fw is high
3,522,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,501 UART: [idev] Erasing UDS.KEYID = 0
6,029,021 UART: [idev] Sha1 KeyId Algorithm
6,051,068 UART: [idev] --
6,056,807 UART: [ldev] ++
6,057,528 UART: [ldev] CDI.KEYID = 6
6,058,444 UART: [ldev] SUBJECT.KEYID = 5
6,059,610 UART: [ldev] AUTHORITY.KEYID = 7
6,060,846 UART: [ldev] FE.KEYID = 1
6,099,073 UART: [ldev] Erasing FE.KEYID = 1
8,602,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,110 UART: [ldev] --
10,412,244 UART: [fwproc] Wait for Commands...
10,414,281 UART: [fwproc] Recv command 0x46574c44
10,416,584 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,021 >>> mbox cmd response: success
14,600,498 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,603,662 UART: [afmc] ++
14,604,411 UART: [afmc] CDI.KEYID = 6
14,605,597 UART: [afmc] SUBJECT.KEYID = 7
14,607,032 UART: [afmc] AUTHORITY.KEYID = 5
17,148,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,674 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,218 UART: [afmc] --
18,970,187 UART: [cold-reset] --
18,976,152 UART: [state] Locking Datavault
18,979,141 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,333 UART: [state] Locking ICCM
18,982,945 UART: [exit] Launching FMC @ 0x40000130
18,991,614 UART:
18,991,843 UART: Running Caliptra FMC ...
18,992,942 UART:
18,993,098 UART: [state] CFI Enabled
19,051,402 UART: [fht] FMC Alias Private Key: 7
20,815,200 UART: [art] Extend RT PCRs Done
20,816,419 UART: [art] Lock RT PCRs Done
20,818,204 UART: [art] Populate DV Done
20,823,718 UART: [fht] FMC Alias Private Key: 7
20,825,316 UART: [art] Derive CDI
20,826,133 UART: [art] Store in in slot 0x4
20,884,619 UART: [art] Derive Key Pair
20,885,658 UART: [art] Store priv key in slot 0x5
23,348,711 UART: [art] Derive Key Pair - Done
23,361,813 UART: [art] Signing Cert with AUTHO
23,363,116 UART: RITY.KEYID = 7
25,074,626 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,129 UART: [art] PUB.X = 836AC7865C4421E4691E2F89FA778C19FB2DB980BCACE02246A661938B3838798EC9550B3172E700C47B01C60B68380F
25,083,380 UART: [art] PUB.Y = AC9E001DFE0AC8626534436F333BCD2875FE4E5BD5CA4DC97E923972A1D8B3F2C1A471CAED681017A35FDE4DE6E3DDD7
25,090,659 UART: [art] SIG.R = 721156EB05623A7794C07AE6ED3AE3B014EE6FFE3A2C19483321CCCC20CCB01396B792ABC76DDB515958F2D7645D3A5C
25,098,109 UART: [art] SIG.S = 7B7EF93E7C83540F21FE0C083543A96B82B60FA6497F420A3A95A3AACB95C3BC6BE88A9266E49EBCB46F3FC05529622C
26,076,692 UART: Caliptra RT
26,077,379 UART: [state] CFI Enabled
26,242,908 UART: [rt] RT listening for mailbox commands...
26,274,263 UART: [rt]cmd =0x4c444556, len=4
26,285,179 >>> mbox cmd response data (687 bytes)
26,327,022 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,357,239 UART: [rt]cmd =0x43455246, len=4
26,369,867 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,440,539 ready_for_fw is high
3,440,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,718,357 >>> mbox cmd response: success
14,719,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,027,357 UART:
19,027,746 UART: Running Caliptra FMC ...
19,028,879 UART:
19,029,047 UART: [state] CFI Enabled
19,091,628 UART: [fht] FMC Alias Private Key: 7
20,855,570 UART: [art] Extend RT PCRs Done
20,856,784 UART: [art] Lock RT PCRs Done
20,858,649 UART: [art] Populate DV Done
20,864,213 UART: [fht] FMC Alias Private Key: 7
20,865,812 UART: [art] Derive CDI
20,866,550 UART: [art] Store in in slot 0x4
20,923,915 UART: [art] Derive Key Pair
20,924,953 UART: [art] Store priv key in slot 0x5
23,387,806 UART: [art] Derive Key Pair - Done
23,400,695 UART: [art] Signing Cert with AUTHO
23,402,028 UART: RITY.KEYID = 7
25,113,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,698 UART: [art] PUB.X = E6142B172473C27222E30D089BEA7EBBEE5A23401EBA15BA3D953613AEF096604606E9E850319D5D6DB921DA5A5CEFB8
25,121,952 UART: [art] PUB.Y = E0488F9C2E4BEFE96642A582AADA81666F540288CDF3048064C0D99FD8DC6239CAA82674F1DF5A3A01E1D4D58B297DEE
25,129,203 UART: [art] SIG.R = 568B5132601A4F406E27628521414B537D831F7159AA4D45D4ADC9457C38435D6D9077B8FE09A33DD3BB5FD4764DCF7A
25,136,591 UART: [art] SIG.S = 208E1536E319687678A0BE9748720FCE780E64DFD75BDCAFC1EC76AC3F6BE0979564BE3E4287436095BA51CA9AC6E633
26,115,470 UART: Caliptra RT
26,116,157 UART: [state] CFI Enabled
26,278,850 UART: [rt] RT listening for mailbox commands...
26,310,448 UART: [rt]cmd =0x4c444556, len=4
26,321,643 >>> mbox cmd response data (687 bytes)
26,363,601 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,393,736 UART: [rt]cmd =0x43455246, len=4
26,406,366 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,480 UART:
192,858 UART: Running Caliptra ROM ...
194,051 UART:
603,616 UART: [state] CFI Enabled
619,545 UART: [state] LifecycleState = Unprovisioned
621,918 UART: [state] DebugLocked = No
624,790 UART: [state] WD Timer not started. Device not locked for debugging
628,742 UART: [kat] SHA2-256
818,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,435 UART: [kat] ++
829,946 UART: [kat] sha1
842,211 UART: [kat] SHA2-256
845,299 UART: [kat] SHA2-384
852,136 UART: [kat] SHA2-512-ACC
854,839 UART: [kat] ECC-384
3,297,641 UART: [kat] HMAC-384Kdf
3,309,874 UART: [kat] LMS
3,841,698 UART: [kat] --
3,846,422 UART: [cold-reset] ++
3,848,777 UART: [fht] FHT @ 0x50003400
3,860,453 UART: [idev] ++
3,861,078 UART: [idev] CDI.KEYID = 6
3,862,025 UART: [idev] SUBJECT.KEYID = 7
3,863,258 UART: [idev] UDS.KEYID = 0
3,864,149 ready_for_fw is high
3,864,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,038 UART: [idev] Erasing UDS.KEYID = 0
6,342,631 UART: [idev] Sha1 KeyId Algorithm
6,365,576 UART: [idev] --
6,370,831 UART: [ldev] ++
6,371,572 UART: [ldev] CDI.KEYID = 6
6,372,477 UART: [ldev] SUBJECT.KEYID = 5
6,373,626 UART: [ldev] AUTHORITY.KEYID = 7
6,374,863 UART: [ldev] FE.KEYID = 1
6,386,127 UART: [ldev] Erasing FE.KEYID = 1
8,861,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,128 UART: [ldev] --
10,649,956 UART: [fwproc] Wait for Commands...
10,651,881 UART: [fwproc] Recv command 0x46574c44
10,654,180 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,869 >>> mbox cmd response: success
14,846,338 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,849,675 UART: [afmc] ++
14,850,367 UART: [afmc] CDI.KEYID = 6
14,851,605 UART: [afmc] SUBJECT.KEYID = 7
14,853,030 UART: [afmc] AUTHORITY.KEYID = 5
17,355,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,310 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,964 UART: [afmc] --
19,148,602 UART: [cold-reset] --
19,153,708 UART: [state] Locking Datavault
19,160,398 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,598 UART: [state] Locking ICCM
19,164,473 UART: [exit] Launching FMC @ 0x40000130
19,173,163 UART:
19,173,395 UART: Running Caliptra FMC ...
19,174,485 UART:
19,174,632 UART: [state] CFI Enabled
19,183,045 UART: [fht] FMC Alias Private Key: 7
20,939,843 UART: [art] Extend RT PCRs Done
20,941,059 UART: [art] Lock RT PCRs Done
20,942,707 UART: [art] Populate DV Done
20,948,214 UART: [fht] FMC Alias Private Key: 7
20,949,899 UART: [art] Derive CDI
20,950,703 UART: [art] Store in in slot 0x4
20,993,237 UART: [art] Derive Key Pair
20,994,264 UART: [art] Store priv key in slot 0x5
23,420,958 UART: [art] Derive Key Pair - Done
23,433,788 UART: [art] Signing Cert with AUTHO
23,435,081 UART: RITY.KEYID = 7
25,140,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,007 UART: [art] PUB.X = D9D20A7C05E33B0C32E936F615C522635049D0E5B49ACB690F9C6038D01DEBFDD747E56669EDB31022DED162D361D3B8
25,149,296 UART: [art] PUB.Y = 6A347E7814883A930CDDE24C133D7A47F69427955AC0A169A551D7C38C85971CF8F7CB5DDDE572AF4F3FCA536F5345BC
25,156,551 UART: [art] SIG.R = 3116EF90D37025D5661C829EE54D1A8EBF02174B77F4ABA56BC4DC0A30DF3654E3046A1540149FE1BD21D4E7612D6617
25,163,948 UART: [art] SIG.S = 5891BB45BF70E213C1C497ACCFF0CEA7CE74202A5A73C688D9D6638B4C4F6BCC8C1505CB38245E1B7E4F5C5F51DEF205
26,143,007 UART: Caliptra RT
26,143,695 UART: [state] CFI Enabled
26,261,717 UART: [rt] RT listening for mailbox commands...
26,292,779 UART: [rt]cmd =0x4c444556, len=4
26,303,833 >>> mbox cmd response data (687 bytes)
26,345,626 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,375,712 UART: [rt]cmd =0x43455246, len=4
26,388,541 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,758,220 ready_for_fw is high
3,758,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,632 >>> mbox cmd response: success
14,963,261 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,215,263 UART:
19,215,688 UART: Running Caliptra FMC ...
19,216,877 UART:
19,217,039 UART: [state] CFI Enabled
19,224,930 UART: [fht] FMC Alias Private Key: 7
20,982,094 UART: [art] Extend RT PCRs Done
20,983,318 UART: [art] Lock RT PCRs Done
20,984,803 UART: [art] Populate DV Done
20,990,160 UART: [fht] FMC Alias Private Key: 7
20,991,916 UART: [art] Derive CDI
20,992,721 UART: [art] Store in in slot 0x4
21,035,050 UART: [art] Derive Key Pair
21,036,094 UART: [art] Store priv key in slot 0x5
23,462,747 UART: [art] Derive Key Pair - Done
23,475,914 UART: [art] Signing Cert with AUTHO
23,477,224 UART: RITY.KEYID = 7
25,182,382 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,905 UART: [art] PUB.X = E78F26971FA8DF19F38ACB2A8E30967E8CEDF4B72DBF553FA7EE5B9AE03ACB250562FBA6440995C05D98FA71D70D7391
25,191,154 UART: [art] PUB.Y = 2A66575C4A786AC22B2C2B00BF3E1EC9A5B14B65F9B201108C4740BE35C9CD3200CC768FC5921C2C4B3E5515B38DAE9E
25,198,395 UART: [art] SIG.R = 3DF6B971F086D671C0D3A081CD5F199CE1A8BFA0FEF3CE61C6D10FDBC0F3F223814AA8DD4A55BA2D8A6C29D536C1599F
25,205,776 UART: [art] SIG.S = E651D686B00CC5C00F17EFE665F516BE8710F40CFB49756C1F25F2502DABBBD539B25568B15E09230DAD3775CE28F475
26,184,448 UART: Caliptra RT
26,185,143 UART: [state] CFI Enabled
26,303,236 UART: [rt] RT listening for mailbox commands...
26,334,538 UART: [rt]cmd =0x4c444556, len=4
26,345,667 >>> mbox cmd response data (687 bytes)
26,387,638 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,417,701 UART: [rt]cmd =0x43455246, len=4
26,430,331 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,719 UART: [kat] SHA2-256
881,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,765 UART: [kat] ++
885,917 UART: [kat] sha1
890,229 UART: [kat] SHA2-256
892,167 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,476,005 UART: [cold-reset] ++
1,476,539 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,192 UART: [idev] Erasing UDS.KEYID = 0
1,505,198 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,004 UART: [idev] --
1,515,043 UART: [ldev] ++
1,515,211 UART: [ldev] CDI.KEYID = 6
1,515,574 UART: [ldev] SUBJECT.KEYID = 5
1,516,000 UART: [ldev] AUTHORITY.KEYID = 7
1,516,463 UART: [ldev] FE.KEYID = 1
1,521,617 UART: [ldev] Erasing FE.KEYID = 1
1,546,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,736 UART: [ldev] --
1,586,207 UART: [fwproc] Waiting for Commands...
1,586,904 UART: [fwproc] Received command 0x46574c44
1,587,695 UART: [fwproc] Received Image of size 114448 bytes
2,887,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,002 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,311 >>> mbox cmd response: success
3,079,311 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,391 UART: [afmc] ++
3,080,559 UART: [afmc] CDI.KEYID = 6
3,080,921 UART: [afmc] SUBJECT.KEYID = 7
3,081,346 UART: [afmc] AUTHORITY.KEYID = 5
3,116,719 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,017 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,630 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,320 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,121 UART: [afmc] --
3,160,217 UART: [cold-reset] --
3,161,285 UART: [state] Locking Datavault
3,162,456 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,060 UART: [state] Locking ICCM
3,163,638 UART: [exit] Launching FMC @ 0x40000130
3,168,967 UART:
3,168,983 UART: Running Caliptra FMC ...
3,169,391 UART:
3,169,445 UART: [state] CFI Enabled
3,180,034 UART: [fht] FMC Alias Private Key: 7
3,287,887 UART: [art] Extend RT PCRs Done
3,288,315 UART: [art] Lock RT PCRs Done
3,289,813 UART: [art] Populate DV Done
3,297,806 UART: [fht] FMC Alias Private Key: 7
3,298,902 UART: [art] Derive CDI
3,299,182 UART: [art] Store in in slot 0x4
3,384,873 UART: [art] Derive Key Pair
3,385,233 UART: [art] Store priv key in slot 0x5
3,398,771 UART: [art] Derive Key Pair - Done
3,412,998 UART: [art] Signing Cert with AUTHO
3,413,478 UART: RITY.KEYID = 7
3,428,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,289 UART: [art] PUB.X = 9AAC85CFC674AAB0D2F6E5E506F514A8DE3CB7A00B4189E963481658819747ECC5A3D3292FCFBF155053A47064AE1B00
3,436,041 UART: [art] PUB.Y = EDC3F13AFE76E611782F48B39890839D213672D526116AD19481D39610A41415E7C04C4CDDE15F4E5BA8E30727710D79
3,442,981 UART: [art] SIG.R = 882E09ACCA4FBC9B2933DF7BAE042B90FB570230E252840F46F9155C5187AD836A38D1FD06F18F08E738C944C4CF5F20
3,449,741 UART: [art] SIG.S = 6F3E8C6EDB2D782263F4CE7CABCCA3591C0DA429D25633566837F9B8C025B78065E19E3A48864908667B23909D9492A7
3,473,086 UART: Caliptra RT
3,473,339 UART: [state] CFI Enabled
3,580,576 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,774 UART: [rt]cmd =0x4c444556, len=4
3,621,300 >>> mbox cmd response data (687 bytes)
3,621,301 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,550 UART: [rt]cmd =0x43455246, len=4
3,662,800 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 ready_for_fw is high
1,362,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,237 >>> mbox cmd response: success
2,928,237 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,569 UART:
2,989,585 UART: Running Caliptra FMC ...
2,989,993 UART:
2,990,047 UART: [state] CFI Enabled
3,000,186 UART: [fht] FMC Alias Private Key: 7
3,108,139 UART: [art] Extend RT PCRs Done
3,108,567 UART: [art] Lock RT PCRs Done
3,110,157 UART: [art] Populate DV Done
3,118,260 UART: [fht] FMC Alias Private Key: 7
3,119,412 UART: [art] Derive CDI
3,119,692 UART: [art] Store in in slot 0x4
3,205,417 UART: [art] Derive Key Pair
3,205,777 UART: [art] Store priv key in slot 0x5
3,219,263 UART: [art] Derive Key Pair - Done
3,234,442 UART: [art] Signing Cert with AUTHO
3,234,922 UART: RITY.KEYID = 7
3,250,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,873 UART: [art] PUB.X = 381BBCAD67579E6543E114AAF7555955AA3AB551D4FCA3529CBEBD1BD071B4C87736FE25118A6689B64C289F780D88B3
3,257,648 UART: [art] PUB.Y = D123E894E925B97F6D6AE4846831296838A3A15FE7F27061D3DF46598472080812437290C0CEBC7A955875DDD11527B7
3,264,582 UART: [art] SIG.R = 3BA4EC10DF13ED31C9B3E8CC1393C5D6612C4AB2F77E78BA07A77C77802D55E84DEC1C6021C524E861B86E6B92C649F4
3,271,361 UART: [art] SIG.S = 87CA2E459D458C23E8F5F0E0619BF78250695F09C573EB9925317F3B4CCE09DE5737AC9E0FB4335089166FED27C2A713
3,295,077 UART: Caliptra RT
3,295,330 UART: [state] CFI Enabled
3,403,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,937 UART: [rt]cmd =0x4c444556, len=4
3,444,245 >>> mbox cmd response data (687 bytes)
3,444,246 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,639 UART: [rt]cmd =0x43455246, len=4
3,485,929 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
903,245 UART: [kat] HMAC-384Kdf
907,847 UART: [kat] LMS
1,476,043 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 ready_for_fw is high
1,481,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,243 UART: [idev] Erasing UDS.KEYID = 0
1,505,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,339 UART: [idev] --
1,515,530 UART: [ldev] ++
1,515,698 UART: [ldev] CDI.KEYID = 6
1,516,061 UART: [ldev] SUBJECT.KEYID = 5
1,516,487 UART: [ldev] AUTHORITY.KEYID = 7
1,516,950 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,731 UART: [ldev] --
1,587,122 UART: [fwproc] Waiting for Commands...
1,587,797 UART: [fwproc] Received command 0x46574c44
1,588,588 UART: [fwproc] Received Image of size 114448 bytes
2,887,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,804 >>> mbox cmd response: success
3,079,804 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,930 UART: [afmc] ++
3,081,098 UART: [afmc] CDI.KEYID = 6
3,081,460 UART: [afmc] SUBJECT.KEYID = 7
3,081,885 UART: [afmc] AUTHORITY.KEYID = 5
3,117,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,756 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,149 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,839 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,638 UART: [afmc] --
3,160,596 UART: [cold-reset] --
3,161,682 UART: [state] Locking Datavault
3,163,035 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,639 UART: [state] Locking ICCM
3,164,167 UART: [exit] Launching FMC @ 0x40000130
3,169,496 UART:
3,169,512 UART: Running Caliptra FMC ...
3,169,920 UART:
3,170,063 UART: [state] CFI Enabled
3,180,398 UART: [fht] FMC Alias Private Key: 7
3,288,309 UART: [art] Extend RT PCRs Done
3,288,737 UART: [art] Lock RT PCRs Done
3,290,433 UART: [art] Populate DV Done
3,298,402 UART: [fht] FMC Alias Private Key: 7
3,299,482 UART: [art] Derive CDI
3,299,762 UART: [art] Store in in slot 0x4
3,385,235 UART: [art] Derive Key Pair
3,385,595 UART: [art] Store priv key in slot 0x5
3,399,115 UART: [art] Derive Key Pair - Done
3,413,630 UART: [art] Signing Cert with AUTHO
3,414,110 UART: RITY.KEYID = 7
3,428,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,613 UART: [art] PUB.X = 8E5C08AB1796DF3445C2F18E50A25AE4A3BD5DC5393195192F3524389023ADD6F22726CAB97627C4961586D01BCDF948
3,436,380 UART: [art] PUB.Y = 7B5AE23E669022B1A16D2CA105B6B737F626EA90CBFCD44FA408300BD218649A9BA20C8592EBC98EBDB4D47EBBF75D26
3,443,336 UART: [art] SIG.R = F5D37C6AD0F0588F05FD35A1355645301B1FED9BE9866C0402A6FC648A419DF659449570C2EEF1A78C94484ECE244FCC
3,450,105 UART: [art] SIG.S = 27710DD529CF6F9C84433EFF0D521A7F0AAB0A38FD33F07CC10A51BAC570668CA6439776E70CCDCF1081FB8E6BB321A7
3,473,708 UART: Caliptra RT
3,474,053 UART: [state] CFI Enabled
3,581,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,288 UART: [rt]cmd =0x4c444556, len=4
3,622,802 >>> mbox cmd response data (687 bytes)
3,622,803 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,254 UART: [rt]cmd =0x43455246, len=4
3,664,658 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,834 ready_for_fw is high
1,362,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,202 >>> mbox cmd response: success
2,931,202 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,993,404 UART:
2,993,420 UART: Running Caliptra FMC ...
2,993,828 UART:
2,993,971 UART: [state] CFI Enabled
3,004,588 UART: [fht] FMC Alias Private Key: 7
3,112,059 UART: [art] Extend RT PCRs Done
3,112,487 UART: [art] Lock RT PCRs Done
3,113,843 UART: [art] Populate DV Done
3,121,954 UART: [fht] FMC Alias Private Key: 7
3,123,132 UART: [art] Derive CDI
3,123,412 UART: [art] Store in in slot 0x4
3,209,055 UART: [art] Derive Key Pair
3,209,415 UART: [art] Store priv key in slot 0x5
3,222,531 UART: [art] Derive Key Pair - Done
3,237,352 UART: [art] Signing Cert with AUTHO
3,237,832 UART: RITY.KEYID = 7
3,253,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,051 UART: [art] PUB.X = 62A4CD44CB30758D374DB80CDEFD98BB78D1AE093BEBAE76CEFCBA4EC66A43907031F9A01E8EA55C541264DE089E71B8
3,260,834 UART: [art] PUB.Y = 019EFD4ADB1E888975CABD06E00266B64E6961E10DEAF64B744EDE20E0D292E320947EABF16F2C2601A820E3616B208D
3,267,779 UART: [art] SIG.R = 85DE5D2FE8073BCE0ABC834F0CE8AFF48E8A46C47339B87CEE18B269773D25215BC0E3AF291770062D82902F0E15B468
3,274,542 UART: [art] SIG.S = 55EF95B8CCE2A612CFD2C3CBB3CF682567262FE0A869FD4F1C396BCB62BE0C44D49B09C3045F5E19D6DAB84486F0A230
3,298,774 UART: Caliptra RT
3,299,119 UART: [state] CFI Enabled
3,406,606 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,044 UART: [rt]cmd =0x4c444556, len=4
3,447,540 >>> mbox cmd response data (687 bytes)
3,447,541 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,956 UART: [rt]cmd =0x43455246, len=4
3,489,126 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,537 UART: [kat] SHA2-256
903,477 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
917,820 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 ready_for_fw is high
1,176,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,908 UART: [idev] Erasing UDS.KEYID = 0
1,200,931 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,357 UART: [ldev] ++
1,210,525 UART: [ldev] CDI.KEYID = 6
1,210,888 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,567 UART: [ldev] --
1,283,020 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,502 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,812 >>> mbox cmd response: success
2,775,812 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,934 UART: [afmc] ++
2,777,102 UART: [afmc] CDI.KEYID = 6
2,777,464 UART: [afmc] SUBJECT.KEYID = 7
2,777,889 UART: [afmc] AUTHORITY.KEYID = 5
2,812,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,506 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,225 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,109 UART: [afmc] --
2,856,037 UART: [cold-reset] --
2,856,853 UART: [state] Locking Datavault
2,857,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,566 UART: [state] Locking ICCM
2,859,080 UART: [exit] Launching FMC @ 0x40000130
2,864,409 UART:
2,864,425 UART: Running Caliptra FMC ...
2,864,833 UART:
2,864,887 UART: [state] CFI Enabled
2,875,448 UART: [fht] FMC Alias Private Key: 7
2,983,503 UART: [art] Extend RT PCRs Done
2,983,931 UART: [art] Lock RT PCRs Done
2,985,411 UART: [art] Populate DV Done
2,993,528 UART: [fht] FMC Alias Private Key: 7
2,994,550 UART: [art] Derive CDI
2,994,830 UART: [art] Store in in slot 0x4
3,080,445 UART: [art] Derive Key Pair
3,080,805 UART: [art] Store priv key in slot 0x5
3,094,031 UART: [art] Derive Key Pair - Done
3,108,786 UART: [art] Signing Cert with AUTHO
3,109,266 UART: RITY.KEYID = 7
3,124,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,159 UART: [art] PUB.X = 02A07199D8D01F88CFB1FB03299B061A265698BA36D02D320ECDF91A148FA5EEB6E76F2A03CABC06EA0466C226141462
3,131,916 UART: [art] PUB.Y = 5ECB7DB9F6BA8476C54374FF567FFDABA0CE30F15C56FEB6129CF1764A9CC63A9318752389764EBD30268DD97C3256A4
3,138,878 UART: [art] SIG.R = 070F4100112ACDFD74C4376AAE5E219331DF92DFEF87F13488EDF8B9F7692527D9EA428585E399F8D473990D8B8B34AF
3,145,623 UART: [art] SIG.S = E7EA0810FB31D505F74651A0409DA02F860F6B17C94A11432025EC93D8C7957ADCF3A3B10C4DD6033AD55D938A95AA23
3,169,395 UART: Caliptra RT
3,169,648 UART: [state] CFI Enabled
3,276,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,091 UART: [rt]cmd =0x4c444556, len=4
3,317,639 >>> mbox cmd response data (687 bytes)
3,317,640 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,797 UART: [rt]cmd =0x43455246, len=4
3,358,901 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,641 ready_for_fw is high
1,059,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,815 >>> mbox cmd response: success
2,626,815 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,575 UART:
2,688,591 UART: Running Caliptra FMC ...
2,688,999 UART:
2,689,053 UART: [state] CFI Enabled
2,699,426 UART: [fht] FMC Alias Private Key: 7
2,807,255 UART: [art] Extend RT PCRs Done
2,807,683 UART: [art] Lock RT PCRs Done
2,809,173 UART: [art] Populate DV Done
2,817,528 UART: [fht] FMC Alias Private Key: 7
2,818,644 UART: [art] Derive CDI
2,818,924 UART: [art] Store in in slot 0x4
2,904,683 UART: [art] Derive Key Pair
2,905,043 UART: [art] Store priv key in slot 0x5
2,917,915 UART: [art] Derive Key Pair - Done
2,932,386 UART: [art] Signing Cert with AUTHO
2,932,866 UART: RITY.KEYID = 7
2,948,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,221 UART: [art] PUB.X = 54DCBF52B1684C3EE593DF8F1909C29AA7765918FCD04785EB4635496CEAB306B66BE17696399879794685A0AB8D953D
2,955,985 UART: [art] PUB.Y = C32510A75A23A98FA6997B28867CEE44B9C9592DCB532D911692A3783C079DBC0D49E58E02DB3336E276F1F00C638C02
2,962,920 UART: [art] SIG.R = A7FEEF25E311AA2F4AC5289FD2314BD56FFBEA914D7063D6430B73420B71BBA5279CB199D5804C9B9531069A75C1D5C2
2,969,691 UART: [art] SIG.S = C59FC79C947501DA2ADB6E35975F578C18AB77AC4E93A1F0486A03FF06BCD0D4AE5C4917D92CEFB4DEAFC33052FEB8A7
2,993,403 UART: Caliptra RT
2,993,656 UART: [state] CFI Enabled
3,101,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,152 UART: [rt]cmd =0x4c444556, len=4
3,142,536 >>> mbox cmd response data (687 bytes)
3,142,537 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,650 UART: [rt]cmd =0x43455246, len=4
3,183,642 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,634 UART: [kat] SHA2-256
903,574 UART: [kat] SHA2-384
906,369 UART: [kat] SHA2-512-ACC
908,270 UART: [kat] ECC-384
917,923 UART: [kat] HMAC-384Kdf
922,601 UART: [kat] LMS
1,170,929 UART: [kat] --
1,171,648 UART: [cold-reset] ++
1,172,180 UART: [fht] FHT @ 0x50003400
1,175,009 UART: [idev] ++
1,175,177 UART: [idev] CDI.KEYID = 6
1,175,537 UART: [idev] SUBJECT.KEYID = 7
1,175,961 UART: [idev] UDS.KEYID = 0
1,176,306 ready_for_fw is high
1,176,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,201,310 UART: [idev] Sha1 KeyId Algorithm
1,209,630 UART: [idev] --
1,210,572 UART: [ldev] ++
1,210,740 UART: [ldev] CDI.KEYID = 6
1,211,103 UART: [ldev] SUBJECT.KEYID = 5
1,211,529 UART: [ldev] AUTHORITY.KEYID = 7
1,211,992 UART: [ldev] FE.KEYID = 1
1,217,246 UART: [ldev] Erasing FE.KEYID = 1
1,244,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,856 UART: [ldev] --
1,283,349 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,861 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,215 >>> mbox cmd response: success
2,776,215 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,223 UART: [afmc] ++
2,777,391 UART: [afmc] CDI.KEYID = 6
2,777,753 UART: [afmc] SUBJECT.KEYID = 7
2,778,178 UART: [afmc] AUTHORITY.KEYID = 5
2,813,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,510 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,114 UART: [afmc] --
2,857,174 UART: [cold-reset] --
2,858,154 UART: [state] Locking Datavault
2,859,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,945 UART: [state] Locking ICCM
2,860,407 UART: [exit] Launching FMC @ 0x40000130
2,865,736 UART:
2,865,752 UART: Running Caliptra FMC ...
2,866,160 UART:
2,866,303 UART: [state] CFI Enabled
2,876,838 UART: [fht] FMC Alias Private Key: 7
2,984,873 UART: [art] Extend RT PCRs Done
2,985,301 UART: [art] Lock RT PCRs Done
2,986,849 UART: [art] Populate DV Done
2,994,796 UART: [fht] FMC Alias Private Key: 7
2,995,826 UART: [art] Derive CDI
2,996,106 UART: [art] Store in in slot 0x4
3,081,889 UART: [art] Derive Key Pair
3,082,249 UART: [art] Store priv key in slot 0x5
3,095,873 UART: [art] Derive Key Pair - Done
3,111,002 UART: [art] Signing Cert with AUTHO
3,111,482 UART: RITY.KEYID = 7
3,126,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,537 UART: [art] PUB.X = C0D611A2EC6EE311E26D44583E6BB1AA9301310C34726A9EB5553DD67E17451C768D5C2FF08ED0F5CCF4F87318EDEFFD
3,134,317 UART: [art] PUB.Y = D12677535BA24550607EC1A33A28F6EEB8EFFFC8ABA76BEA69C5F9345906FF2382F80BD5B33C447196D1E13F327890B6
3,141,269 UART: [art] SIG.R = 531E0A04393054247E28B9B29094A012BB9BF43DE010FBA95CD1BDA50EF5988E52970E490877BEADBF68DED56B3493EA
3,148,034 UART: [art] SIG.S = 17416B3662D1E552A584C74D80B8055E20DFB84E35395F58020878115BE4B9153A4FA3AB87BC2A15CCE3A27D1AF587D2
3,171,506 UART: Caliptra RT
3,171,851 UART: [state] CFI Enabled
3,278,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,492 UART: [rt]cmd =0x4c444556, len=4
3,319,934 >>> mbox cmd response data (687 bytes)
3,319,935 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,330 UART: [rt]cmd =0x43455246, len=4
3,361,340 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,548 ready_for_fw is high
1,060,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,273 >>> mbox cmd response: success
2,628,273 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,199 UART:
2,690,215 UART: Running Caliptra FMC ...
2,690,623 UART:
2,690,766 UART: [state] CFI Enabled
2,701,455 UART: [fht] FMC Alias Private Key: 7
2,809,128 UART: [art] Extend RT PCRs Done
2,809,556 UART: [art] Lock RT PCRs Done
2,811,598 UART: [art] Populate DV Done
2,819,999 UART: [fht] FMC Alias Private Key: 7
2,821,155 UART: [art] Derive CDI
2,821,435 UART: [art] Store in in slot 0x4
2,907,090 UART: [art] Derive Key Pair
2,907,450 UART: [art] Store priv key in slot 0x5
2,920,952 UART: [art] Derive Key Pair - Done
2,935,536 UART: [art] Signing Cert with AUTHO
2,936,016 UART: RITY.KEYID = 7
2,951,264 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,029 UART: [art] PUB.X = B3A49A0AC974AD1460A1E19BD8E1B95E6C95FB08E250AE617ACD5E0DCD3A9D434BA66AE8593729E0BF27C7DBD245DB7E
2,958,814 UART: [art] PUB.Y = 5BB2BFB63DFBBF00853173F47BC0F97E664400CF46B13AE1E904D81EFE22A505547E920DECE37008FA6BD598B9F18BA6
2,965,724 UART: [art] SIG.R = 3340BFBAF73AF9CEBE656DD2D33AE44EEE8E29DD3CB4B5155157BE297F82672FB10EC5E8D594FB45E7C1F20BDEB3BDB2
2,972,518 UART: [art] SIG.S = 57A76FA5A1381B64E096A977D711C80386959DC2F34B686E64C94C905040BDB0425F694AFBDBA458B096C1D7F47D906B
2,996,486 UART: Caliptra RT
2,996,831 UART: [state] CFI Enabled
3,104,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,346 UART: [rt]cmd =0x4c444556, len=4
3,145,790 >>> mbox cmd response data (687 bytes)
3,145,791 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,398 UART: [rt]cmd =0x43455246, len=4
3,187,544 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 ready_for_fw is high
1,174,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,843 UART: [idev] Erasing UDS.KEYID = 0
1,199,573 UART: [idev] Sha1 KeyId Algorithm
1,208,287 UART: [idev] --
1,209,362 UART: [ldev] ++
1,209,530 UART: [ldev] CDI.KEYID = 6
1,209,894 UART: [ldev] SUBJECT.KEYID = 5
1,210,321 UART: [ldev] AUTHORITY.KEYID = 7
1,210,784 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,242,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,866 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46574c44
1,282,306 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,210 >>> mbox cmd response: success
2,773,210 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,467 UART: [afmc] ++
2,774,635 UART: [afmc] CDI.KEYID = 6
2,774,998 UART: [afmc] SUBJECT.KEYID = 7
2,775,424 UART: [afmc] AUTHORITY.KEYID = 5
2,810,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,528 UART: [afmc] --
2,854,506 UART: [cold-reset] --
2,855,250 UART: [state] Locking Datavault
2,856,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,249 UART: [state] Locking ICCM
2,857,823 UART: [exit] Launching FMC @ 0x40000130
2,863,152 UART:
2,863,168 UART: Running Caliptra FMC ...
2,863,576 UART:
2,863,630 UART: [state] CFI Enabled
2,874,015 UART: [fht] FMC Alias Private Key: 7
2,982,260 UART: [art] Extend RT PCRs Done
2,982,688 UART: [art] Lock RT PCRs Done
2,984,194 UART: [art] Populate DV Done
2,992,161 UART: [fht] FMC Alias Private Key: 7
2,993,227 UART: [art] Derive CDI
2,993,507 UART: [art] Store in in slot 0x4
3,078,792 UART: [art] Derive Key Pair
3,079,152 UART: [art] Store priv key in slot 0x5
3,092,478 UART: [art] Derive Key Pair - Done
3,107,134 UART: [art] Signing Cert with AUTHO
3,107,614 UART: RITY.KEYID = 7
3,122,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,519 UART: [art] PUB.X = C7D85BA441DFC06250EB6BC704ACDC39E377CE7C2352580C26206603B6A4EAC338BDDF20C5157317513CE55532F4F4B6
3,130,288 UART: [art] PUB.Y = FAEFF872E1B88B9E1B5BDAF6B0017505ABEB1D5040871B1F13423C922C60257A7FBB6F8F4E2820C9FB2080FE9FC8F0B6
3,137,250 UART: [art] SIG.R = 4A9BF8668E2E45749D94CC404E61DF77286B2E02744E515BE2392BADEEEEBCCFA98A418DC9A9644254C0DE914784731C
3,144,027 UART: [art] SIG.S = 657A97102ADF06010140679F8D113149434E0001691D83E4682DEF2A70E6ADA8F508A9F2E5331B251D395212D4DE0A61
3,167,572 UART: Caliptra RT
3,167,825 UART: [state] CFI Enabled
3,275,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,274 UART: [rt]cmd =0x4c444556, len=4
3,316,792 >>> mbox cmd response data (687 bytes)
3,316,793 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,148 UART: [rt]cmd =0x43455246, len=4
3,358,238 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,468 ready_for_fw is high
1,056,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,712 >>> mbox cmd response: success
2,622,712 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,216 UART:
2,684,232 UART: Running Caliptra FMC ...
2,684,640 UART:
2,684,694 UART: [state] CFI Enabled
2,695,247 UART: [fht] FMC Alias Private Key: 7
2,803,476 UART: [art] Extend RT PCRs Done
2,803,904 UART: [art] Lock RT PCRs Done
2,805,512 UART: [art] Populate DV Done
2,813,757 UART: [fht] FMC Alias Private Key: 7
2,814,929 UART: [art] Derive CDI
2,815,209 UART: [art] Store in in slot 0x4
2,901,448 UART: [art] Derive Key Pair
2,901,808 UART: [art] Store priv key in slot 0x5
2,914,652 UART: [art] Derive Key Pair - Done
2,929,460 UART: [art] Signing Cert with AUTHO
2,929,940 UART: RITY.KEYID = 7
2,945,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,889 UART: [art] PUB.X = A47F24F496C2EC59F974891732AB21DEC8CD653ABF5CD163E90B52018ADAA2541E159B2ECF70EDFD7E0F8FF7857F8B12
2,952,668 UART: [art] PUB.Y = CE270B47BF178CAEAF1315C1CED92D193B285513AA85CE7910DC2A5FFDBD2259CF8065536AC63B137700AB2467602366
2,959,601 UART: [art] SIG.R = 7CBC84FBBA14F195B436F3EB4ABB47493E2D9C8B8112345CD748417F7DEA83E15F1696985664487F60098F5C71712555
2,966,366 UART: [art] SIG.S = 10245264C17B07FFA7885EC3BB2D98E2F84F218DB1230914FB71F0FEB7459A1F1E989537DD994374128017A3EF404E66
2,990,903 UART: Caliptra RT
2,991,156 UART: [state] CFI Enabled
3,099,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,959 UART: [rt]cmd =0x4c444556, len=4
3,140,331 >>> mbox cmd response data (687 bytes)
3,140,332 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,481 UART: [rt]cmd =0x43455246, len=4
3,181,487 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,855 UART: [kat] HMAC-384Kdf
921,555 UART: [kat] LMS
1,169,867 UART: [kat] --
1,170,716 UART: [cold-reset] ++
1,171,212 UART: [fht] FHT @ 0x50003400
1,173,854 UART: [idev] ++
1,174,022 UART: [idev] CDI.KEYID = 6
1,174,383 UART: [idev] SUBJECT.KEYID = 7
1,174,808 UART: [idev] UDS.KEYID = 0
1,175,154 ready_for_fw is high
1,175,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,154 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,209,092 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,747 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,244,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,963 UART: [ldev] --
1,283,469 UART: [fwproc] Wait for Commands...
1,284,060 UART: [fwproc] Recv command 0x46574c44
1,284,793 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,671 >>> mbox cmd response: success
2,775,671 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,916 UART: [afmc] ++
2,777,084 UART: [afmc] CDI.KEYID = 6
2,777,447 UART: [afmc] SUBJECT.KEYID = 7
2,777,873 UART: [afmc] AUTHORITY.KEYID = 5
2,812,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,320 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,239 UART: [afmc] --
2,856,239 UART: [cold-reset] --
2,856,925 UART: [state] Locking Datavault
2,857,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,432 UART: [state] Locking ICCM
2,859,010 UART: [exit] Launching FMC @ 0x40000130
2,864,339 UART:
2,864,355 UART: Running Caliptra FMC ...
2,864,763 UART:
2,864,906 UART: [state] CFI Enabled
2,875,819 UART: [fht] FMC Alias Private Key: 7
2,983,876 UART: [art] Extend RT PCRs Done
2,984,304 UART: [art] Lock RT PCRs Done
2,985,488 UART: [art] Populate DV Done
2,993,763 UART: [fht] FMC Alias Private Key: 7
2,994,733 UART: [art] Derive CDI
2,995,013 UART: [art] Store in in slot 0x4
3,080,814 UART: [art] Derive Key Pair
3,081,174 UART: [art] Store priv key in slot 0x5
3,095,330 UART: [art] Derive Key Pair - Done
3,110,280 UART: [art] Signing Cert with AUTHO
3,110,760 UART: RITY.KEYID = 7
3,126,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,791 UART: [art] PUB.X = A49EE5172D36AE6161E6DEC76A821B189114AFC0C001937F223CCF0C6FE7158534427547F90FBFF458EA27FCA4990D2E
3,133,557 UART: [art] PUB.Y = 7975F30134B73D01F199724BDCB9EF735EA89EE114617FC92534CDAEF23E4B5E1383DE834EA714F0ADBB4766CBA3CE8C
3,140,517 UART: [art] SIG.R = 5D42323F2A983F0B3C348EF9E6FC22CEFAE593ECF2755F00241B1F6412CDDA68DB387566EBFAF9A09DD8CE8A8949CD65
3,147,282 UART: [art] SIG.S = 1AB0B0283D0F4CFDD218385D8223E681D6CA4BD70445E3428A3A2790E1D631D4F6943C659D9DC9891987DF02D2FD1C2D
3,171,324 UART: Caliptra RT
3,171,669 UART: [state] CFI Enabled
3,279,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,976 UART: [rt]cmd =0x4c444556, len=4
3,320,502 >>> mbox cmd response data (687 bytes)
3,320,503 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,870 UART: [rt]cmd =0x43455246, len=4
3,362,068 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,403 ready_for_fw is high
1,056,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,251 >>> mbox cmd response: success
2,623,251 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,153 UART:
2,686,169 UART: Running Caliptra FMC ...
2,686,577 UART:
2,686,720 UART: [state] CFI Enabled
2,697,571 UART: [fht] FMC Alias Private Key: 7
2,805,144 UART: [art] Extend RT PCRs Done
2,805,572 UART: [art] Lock RT PCRs Done
2,807,246 UART: [art] Populate DV Done
2,815,495 UART: [fht] FMC Alias Private Key: 7
2,816,597 UART: [art] Derive CDI
2,816,877 UART: [art] Store in in slot 0x4
2,903,026 UART: [art] Derive Key Pair
2,903,386 UART: [art] Store priv key in slot 0x5
2,916,262 UART: [art] Derive Key Pair - Done
2,931,062 UART: [art] Signing Cert with AUTHO
2,931,542 UART: RITY.KEYID = 7
2,946,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,255 UART: [art] PUB.X = 3E79EC5099DE504730BA6E24A9791891FF13B83759989E0C44B596B754624428BD359997888C1BD812B074209635536D
2,954,006 UART: [art] PUB.Y = F5AA49470A3AF1DBA1C0FEFBB5747F8291225D252A0FFF7138234F536B6BAD05678D7922D35B6787B1404CBF420711FD
2,960,952 UART: [art] SIG.R = 7FF9600197773BFC7BBFE9FE7860EE3DC84D10CCE08FFBB394098922496452243F180C744353D728CEC7E039DA882ADC
2,967,721 UART: [art] SIG.S = 780A2390F65DF1A6AAABCC526C1BF4199705450F5AEB63CE64E9750AFE78698A12393A3CE129D6816B351AC52B1D9E3C
2,991,950 UART: Caliptra RT
2,992,295 UART: [state] CFI Enabled
3,099,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,074 UART: [rt]cmd =0x4c444556, len=4
3,140,644 >>> mbox cmd response data (687 bytes)
3,140,645 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,056 UART: [rt]cmd =0x43455246, len=4
3,182,104 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,216 UART:
192,587 UART: Running Caliptra ROM ...
193,773 UART:
193,932 UART: [state] CFI Enabled
263,214 UART: [state] LifecycleState = Unprovisioned
265,207 UART: [state] DebugLocked = No
267,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,096 UART: [kat] SHA2-256
442,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,273 UART: [kat] ++
453,720 UART: [kat] sha1
463,597 UART: [kat] SHA2-256
466,268 UART: [kat] SHA2-384
471,047 UART: [kat] SHA2-512-ACC
473,434 UART: [kat] ECC-384
2,765,808 UART: [kat] HMAC-384Kdf
2,797,093 UART: [kat] LMS
3,987,395 UART: [kat] --
3,991,333 UART: [cold-reset] ++
3,993,131 UART: [fht] Storing FHT @ 0x50003400
4,005,392 UART: [idev] ++
4,005,963 UART: [idev] CDI.KEYID = 6
4,007,001 UART: [idev] SUBJECT.KEYID = 7
4,008,114 UART: [idev] UDS.KEYID = 0
4,009,181 ready_for_fw is high
4,009,390 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,972 UART: [idev] Erasing UDS.KEYID = 0
7,344,108 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,028 UART: [idev] --
7,371,350 UART: [ldev] ++
7,371,921 UART: [ldev] CDI.KEYID = 6
7,372,861 UART: [ldev] SUBJECT.KEYID = 5
7,374,073 UART: [ldev] AUTHORITY.KEYID = 7
7,375,331 UART: [ldev] FE.KEYID = 1
7,418,952 UART: [ldev] Erasing FE.KEYID = 1
10,753,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,443 UART: [ldev] --
13,132,434 UART: [fwproc] Waiting for Commands...
13,135,499 UART: [fwproc] Received command 0x46574c44
13,137,679 UART: [fwproc] Received Image of size 114124 bytes
17,191,068 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,534 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,658,688 >>> mbox cmd response: success
17,659,219 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,662,028 UART: [afmc] ++
17,662,621 UART: [afmc] CDI.KEYID = 6
17,663,542 UART: [afmc] SUBJECT.KEYID = 7
17,664,936 UART: [afmc] AUTHORITY.KEYID = 5
21,021,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,772 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,205 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,999 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,463 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,583 UART: [afmc] --
23,395,684 UART: [cold-reset] --
23,398,900 UART: [state] Locking Datavault
23,405,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,351 UART: [state] Locking ICCM
23,409,908 UART: [exit] Launching FMC @ 0x40000130
23,418,320 UART:
23,418,563 UART: Running Caliptra FMC ...
23,419,590 UART:
23,419,737 UART: [state] CFI Enabled
23,485,372 UART: [fht] FMC Alias Private Key: 7
25,823,175 UART: [art] Extend RT PCRs Done
25,824,397 UART: [art] Lock RT PCRs Done
25,826,014 UART: [art] Populate DV Done
25,831,290 UART: [fht] FMC Alias Private Key: 7
25,832,938 UART: [art] Derive CDI
25,833,677 UART: [art] Store in in slot 0x4
25,893,884 UART: [art] Derive Key Pair
25,894,887 UART: [art] Store priv key in slot 0x5
29,188,304 UART: [art] Derive Key Pair - Done
29,201,362 UART: [art] Signing Cert with AUTHO
29,202,665 UART: RITY.KEYID = 7
31,489,970 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,476 UART: [art] PUB.X = 3A2E1CCAD69CDD1BC5F8CA88F02FD653A8A99199F2424A699D7ECB64D1F34B01017625A3A1BB45BB1DA4CAEF13EA8F49
31,498,735 UART: [art] PUB.Y = 92F74744FFE3EB9575F217573E61FA53DD37C270A851A74C6A6A6A73EBDB8DFEC2D353CFE071360319C65E96A85ED6C5
31,505,991 UART: [art] SIG.R = 9531B55BCABEFC450C4DC230EB544355933478BAD1BAAD990063030AE5AF02D91DCC674B63469B95FBB5EEDC39AEE971
31,513,415 UART: [art] SIG.S = F8507BF83475C7CD2F95A81C5D4E29AB2AC9C5BD87D8323045823D2D87113AB3DF9C12AF2E502BF559D7A8B6737D5BBA
32,818,559 UART: Caliptra RT
32,819,271 UART: [state] CFI Enabled
32,980,669 UART: [rt] RT listening for mailbox commands...
33,012,255 UART: [rt]cmd =0x4c444556, len=4
33,023,563 >>> mbox cmd response data (687 bytes)
33,065,217 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,095,292 UART: [rt]cmd =0x43455246, len=4
33,108,147 >>> mbox cmd response data (920 bytes)
33,125,263 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,155,367 UART: [rt]cmd =0x43455252, len=4
33,166,643 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,785,576 ready_for_fw is high
3,786,126 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,864,980 >>> mbox cmd response: success
17,865,738 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,566,084 UART:
23,566,458 UART: Running Caliptra FMC ...
23,567,566 UART:
23,567,718 UART: [state] CFI Enabled
23,635,886 UART: [fht] FMC Alias Private Key: 7
25,973,168 UART: [art] Extend RT PCRs Done
25,974,385 UART: [art] Lock RT PCRs Done
25,976,039 UART: [art] Populate DV Done
25,981,471 UART: [fht] FMC Alias Private Key: 7
25,983,182 UART: [art] Derive CDI
25,984,219 UART: [art] Store in in slot 0x4
26,044,328 UART: [art] Derive Key Pair
26,045,332 UART: [art] Store priv key in slot 0x5
29,338,308 UART: [art] Derive Key Pair - Done
29,351,473 UART: [art] Signing Cert with AUTHO
29,352,816 UART: RITY.KEYID = 7
31,639,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,249 UART: [art] PUB.X = C6015335BC183BD5B1345CEB758F6B14860D2B2C43EDE39E4BB72C4F19A54FC886D31EFC9E1A8961B052066CE604DBD1
31,648,491 UART: [art] PUB.Y = 6F0D4A04A27FE991E3324E7D39B02E425CCCAF702D9E4EB4C61BACB69B204F0D9DF2687CCF435E756A843EB0EFB6BB1C
31,655,782 UART: [art] SIG.R = 5332D3B787D2994A6991621ED435BF2F09890509AF57179A9181B49ACAB4113C62482E846DEE554F106D0F7135613978
31,663,124 UART: [art] SIG.S = 67AEF16B1CE63D1F30CBA2F20E930CB29679B395298532EEA1EF4F731521B5E7D9E4587E2FBB767A774378C8E256ACA4
32,968,171 UART: Caliptra RT
32,968,870 UART: [state] CFI Enabled
33,130,503 UART: [rt] RT listening for mailbox commands...
33,161,914 UART: [rt]cmd =0x4c444556, len=4
33,173,165 >>> mbox cmd response data (687 bytes)
33,214,781 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,244,881 UART: [rt]cmd =0x43455246, len=4
33,257,677 >>> mbox cmd response data (920 bytes)
33,274,791 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,304,604 UART: [rt]cmd =0x43455252, len=4
33,315,832 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,289 writing to cptra_bootfsm_go
193,403 UART:
193,766 UART: Running Caliptra ROM ...
194,865 UART:
604,481 UART: [state] CFI Enabled
620,785 UART: [state] LifecycleState = Unprovisioned
622,729 UART: [state] DebugLocked = No
625,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,245 UART: [kat] SHA2-256
801,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,536 UART: [kat] ++
812,082 UART: [kat] sha1
822,474 UART: [kat] SHA2-256
825,192 UART: [kat] SHA2-384
831,181 UART: [kat] SHA2-512-ACC
833,544 UART: [kat] ECC-384
3,118,994 UART: [kat] HMAC-384Kdf
3,130,393 UART: [kat] LMS
4,320,510 UART: [kat] --
4,327,206 UART: [cold-reset] ++
4,328,736 UART: [fht] Storing FHT @ 0x50003400
4,338,695 UART: [idev] ++
4,339,280 UART: [idev] CDI.KEYID = 6
4,340,232 UART: [idev] SUBJECT.KEYID = 7
4,341,472 UART: [idev] UDS.KEYID = 0
4,342,450 ready_for_fw is high
4,342,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,444 UART: [idev] Erasing UDS.KEYID = 0
7,629,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,613 UART: [idev] --
7,654,555 UART: [ldev] ++
7,655,119 UART: [ldev] CDI.KEYID = 6
7,656,077 UART: [ldev] SUBJECT.KEYID = 5
7,657,288 UART: [ldev] AUTHORITY.KEYID = 7
7,658,569 UART: [ldev] FE.KEYID = 1
7,670,877 UART: [ldev] Erasing FE.KEYID = 1
10,954,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,947 UART: [ldev] --
13,313,854 UART: [fwproc] Waiting for Commands...
13,316,528 UART: [fwproc] Received command 0x46574c44
13,318,776 UART: [fwproc] Received Image of size 114124 bytes
17,375,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,497 >>> mbox cmd response: success
17,841,015 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,844,135 UART: [afmc] ++
17,844,748 UART: [afmc] CDI.KEYID = 6
17,845,639 UART: [afmc] SUBJECT.KEYID = 7
17,846,908 UART: [afmc] AUTHORITY.KEYID = 5
21,158,730 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,207 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,585 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,428 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,826 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,640 UART: [afmc] --
23,524,897 UART: [cold-reset] --
23,528,828 UART: [state] Locking Datavault
23,533,754 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,499 UART: [state] Locking ICCM
23,537,264 UART: [exit] Launching FMC @ 0x40000130
23,545,651 UART:
23,545,890 UART: Running Caliptra FMC ...
23,546,986 UART:
23,547,142 UART: [state] CFI Enabled
23,555,448 UART: [fht] FMC Alias Private Key: 7
25,886,273 UART: [art] Extend RT PCRs Done
25,887,497 UART: [art] Lock RT PCRs Done
25,889,039 UART: [art] Populate DV Done
25,894,721 UART: [fht] FMC Alias Private Key: 7
25,896,373 UART: [art] Derive CDI
25,897,202 UART: [art] Store in in slot 0x4
25,940,013 UART: [art] Derive Key Pair
25,941,055 UART: [art] Store priv key in slot 0x5
29,183,248 UART: [art] Derive Key Pair - Done
29,196,041 UART: [art] Signing Cert with AUTHO
29,197,350 UART: RITY.KEYID = 7
31,476,958 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,465 UART: [art] PUB.X = 7DB3E3133EB77B6AB603FD7D12DE3C34EF88805C4180CA3A7689E8B4A141B7A563E3125E3540FEE65B19AB5EF58BE6EF
31,485,755 UART: [art] PUB.Y = 06306F4CBC64C4BE0DA4B305D14507CF1DFEEEC8A1588FFB2AD0FBC4911AB3AAC0DC93E4826DCF6ED79D49DFDD09AEBB
31,493,034 UART: [art] SIG.R = 0D109DD57B9CCBD9C487A45A46C2ED678A30966A1ABDF2591C3B78E29D256CC2E30D76773C100A0093D0A8B43C122718
31,500,417 UART: [art] SIG.S = 66EEFC1CC2B6B4CA224F0119DED6D113E8DD274A8CA4B8D1D4A955DB17CA4736418E20987E9B715484958F54847DA6FD
32,804,919 UART: Caliptra RT
32,805,631 UART: [state] CFI Enabled
32,923,984 UART: [rt] RT listening for mailbox commands...
32,955,339 UART: [rt]cmd =0x4c444556, len=4
32,966,410 >>> mbox cmd response data (687 bytes)
33,008,428 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,038,213 UART: [rt]cmd =0x43455246, len=4
33,051,181 >>> mbox cmd response data (920 bytes)
33,068,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,097,805 UART: [rt]cmd =0x43455252, len=4
33,109,138 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,130,939 ready_for_fw is high
4,131,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,897 >>> mbox cmd response: success
18,074,741 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,716,449 UART:
23,716,852 UART: Running Caliptra FMC ...
23,717,953 UART:
23,718,106 UART: [state] CFI Enabled
23,725,892 UART: [fht] FMC Alias Private Key: 7
26,056,730 UART: [art] Extend RT PCRs Done
26,058,086 UART: [art] Lock RT PCRs Done
26,059,795 UART: [art] Populate DV Done
26,065,053 UART: [fht] FMC Alias Private Key: 7
26,066,648 UART: [art] Derive CDI
26,067,464 UART: [art] Store in in slot 0x4
26,109,840 UART: [art] Derive Key Pair
26,110,839 UART: [art] Store priv key in slot 0x5
29,353,157 UART: [art] Derive Key Pair - Done
29,365,833 UART: [art] Signing Cert with AUTHO
29,367,141 UART: RITY.KEYID = 7
31,646,493 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,997 UART: [art] PUB.X = 15093E7DD62992F45ADDB57CAF2B2C5A429E681BB5AC6EB4F2C8667DA1470E0F9CCD1B352C8E2B2738C76682B7753D4B
31,655,252 UART: [art] PUB.Y = 4EEA56B325B8E4666AE5AA4BA4DFA5C266C91CC701649D5373F1AEF165AA1B329F563CE466E5E01FD86EF4932C26ED27
31,662,510 UART: [art] SIG.R = 4B2894F9A238A9F3F6CC33316343CC03F44547D234EE29C66B7713BADD8A517275CACCFB928992D96666A97A87BEDE4A
31,669,910 UART: [art] SIG.S = B29E5D2FF6F2250F21F214B4E98DD7671CB1BFE832F50DF1AC3D387E4F6A2404E55F46C86B53B271AF50B04AEE410CF0
32,975,248 UART: Caliptra RT
32,975,968 UART: [state] CFI Enabled
33,094,272 UART: [rt] RT listening for mailbox commands...
33,125,580 UART: [rt]cmd =0x4c444556, len=4
33,136,808 >>> mbox cmd response data (687 bytes)
33,178,874 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,208,640 UART: [rt]cmd =0x43455246, len=4
33,221,758 >>> mbox cmd response data (920 bytes)
33,238,520 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,268,328 UART: [rt]cmd =0x43455252, len=4
33,279,750 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,105 UART:
192,473 UART: Running Caliptra ROM ...
193,571 UART:
193,717 UART: [state] CFI Enabled
261,943 UART: [state] LifecycleState = Unprovisioned
263,796 UART: [state] DebugLocked = No
266,729 UART: [state] WD Timer not started. Device not locked for debugging
270,516 UART: [kat] SHA2-256
449,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,247 UART: [kat] ++
461,694 UART: [kat] sha1
472,143 UART: [kat] SHA2-256
475,213 UART: [kat] SHA2-384
481,909 UART: [kat] SHA2-512-ACC
484,836 UART: [kat] ECC-384
2,948,828 UART: [kat] HMAC-384Kdf
2,972,347 UART: [kat] LMS
3,501,815 UART: [kat] --
3,505,002 UART: [cold-reset] ++
3,506,160 UART: [fht] FHT @ 0x50003400
3,517,062 UART: [idev] ++
3,517,637 UART: [idev] CDI.KEYID = 6
3,518,622 UART: [idev] SUBJECT.KEYID = 7
3,519,795 UART: [idev] UDS.KEYID = 0
3,520,715 ready_for_fw is high
3,520,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,857 UART: [idev] Erasing UDS.KEYID = 0
6,039,926 UART: [idev] Sha1 KeyId Algorithm
6,063,089 UART: [idev] --
6,067,085 UART: [ldev] ++
6,067,693 UART: [ldev] CDI.KEYID = 6
6,068,605 UART: [ldev] SUBJECT.KEYID = 5
6,069,771 UART: [ldev] AUTHORITY.KEYID = 7
6,071,003 UART: [ldev] FE.KEYID = 1
6,113,274 UART: [ldev] Erasing FE.KEYID = 1
8,617,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,782 UART: [ldev] --
10,426,503 UART: [fwproc] Wait for Commands...
10,428,055 UART: [fwproc] Recv command 0x46574c44
10,430,153 UART: [fwproc] Recv'd Img size: 114448 bytes
13,841,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,301,720 >>> mbox cmd response: success
14,302,223 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,306,478 UART: [afmc] ++
14,307,063 UART: [afmc] CDI.KEYID = 6
14,307,973 UART: [afmc] SUBJECT.KEYID = 7
14,309,134 UART: [afmc] AUTHORITY.KEYID = 5
16,839,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,565,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,567,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,582,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,598,817 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,614,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,637,917 UART: [afmc] --
18,642,157 UART: [cold-reset] --
18,646,174 UART: [state] Locking Datavault
18,653,255 UART: [state] Locking PCR0, PCR1 and PCR31
18,654,917 UART: [state] Locking ICCM
18,656,366 UART: [exit] Launching FMC @ 0x40000130
18,664,759 UART:
18,664,995 UART: Running Caliptra FMC ...
18,666,097 UART:
18,666,256 UART: [state] CFI Enabled
18,724,053 UART: [fht] FMC Alias Private Key: 7
20,488,337 UART: [art] Extend RT PCRs Done
20,489,559 UART: [art] Lock RT PCRs Done
20,491,500 UART: [art] Populate DV Done
20,497,185 UART: [fht] FMC Alias Private Key: 7
20,498,719 UART: [art] Derive CDI
20,499,480 UART: [art] Store in in slot 0x4
20,556,718 UART: [art] Derive Key Pair
20,557,754 UART: [art] Store priv key in slot 0x5
23,020,678 UART: [art] Derive Key Pair - Done
23,033,323 UART: [art] Signing Cert with AUTHO
23,034,623 UART: RITY.KEYID = 7
24,747,233 UART: [art] Erasing AUTHORITY.KEYID = 7
24,748,866 UART: [art] PUB.X = 9569E89BF007F842F81EBF640B3938FB36609CB8D088395497EE9ED84D81D6CCB77892B758CC4F51C5CDFD87A8AE9011
24,755,998 UART: [art] PUB.Y = 45C845A2DBFB3D0C6B40D2321C9BB1948C59675C4F98206441298012D8579E8A8B4D1964808FE2DF78F641C3A81228CC
24,763,232 UART: [art] SIG.R = 5A27E7BF3C8F9E6C8BFD90F8BC419929678B708EC4C27A9713DDD1F23BF54882DB3BD950A99E4687C29C68D98E246308
24,770,618 UART: [art] SIG.S = 78BA37B7ED86AB442A5412ED527A9FB9B8409CF1F55DD36A8274D02DDCBCC57FF7F19917E7E43E9F5B19453AA33F1081
25,749,476 UART: Caliptra RT
25,750,189 UART: [state] CFI Enabled
25,914,476 UART: [rt] RT listening for mailbox commands...
25,945,891 UART: [rt]cmd =0x4c444556, len=4
25,956,988 >>> mbox cmd response data (687 bytes)
25,998,927 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,029,086 UART: [rt]cmd =0x43455246, len=4
26,041,785 >>> mbox cmd response data (887 bytes)
26,058,511 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,088,423 UART: [rt]cmd =0x43455252, len=4
26,099,809 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,362,168 ready_for_fw is high
3,362,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,054,630 >>> mbox cmd response: success
14,055,461 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,348,058 UART:
18,348,459 UART: Running Caliptra FMC ...
18,349,572 UART:
18,349,723 UART: [state] CFI Enabled
18,417,086 UART: [fht] FMC Alias Private Key: 7
20,180,938 UART: [art] Extend RT PCRs Done
20,182,188 UART: [art] Lock RT PCRs Done
20,184,062 UART: [art] Populate DV Done
20,189,322 UART: [fht] FMC Alias Private Key: 7
20,190,832 UART: [art] Derive CDI
20,191,602 UART: [art] Store in in slot 0x4
20,249,708 UART: [art] Derive Key Pair
20,250,715 UART: [art] Store priv key in slot 0x5
22,714,392 UART: [art] Derive Key Pair - Done
22,727,226 UART: [art] Signing Cert with AUTHO
22,728,524 UART: RITY.KEYID = 7
24,440,031 UART: [art] Erasing AUTHORITY.KEYID = 7
24,441,538 UART: [art] PUB.X = D5A1B77E573ADC3982800C281904E9866EA0F9C52867E7D993DE1384983B4C20C792F02E22037F57D9341127CEAAA319
24,448,739 UART: [art] PUB.Y = 7E1074A13767E229E4B289C9C3B6456ECA4EDFB94A96DBF81FA69382B0B2734722EB85700764990C99F4F2D066F19951
24,456,013 UART: [art] SIG.R = 60027D27102BE35B8CBE64FA51F0BE2A09D0BE23E8887E453D98890173D36419601F5384BA1FC2A680C47CBC2FF59B24
24,463,410 UART: [art] SIG.S = D6BB702EE390F963A6A528B5545E6BBC39339C62A5763F7E0E5C6EED20B63FF025FD02A23857FD802192660FFF7E8460
25,441,930 UART: Caliptra RT
25,442,651 UART: [state] CFI Enabled
25,609,048 UART: [rt] RT listening for mailbox commands...
25,640,518 UART: [rt]cmd =0x4c444556, len=4
25,651,745 >>> mbox cmd response data (687 bytes)
25,693,191 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,722,837 UART: [rt]cmd =0x43455246, len=4
25,735,554 >>> mbox cmd response data (887 bytes)
25,752,302 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,782,204 UART: [rt]cmd =0x43455252, len=4
25,793,697 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,324 UART:
192,699 UART: Running Caliptra ROM ...
193,794 UART:
603,508 UART: [state] CFI Enabled
615,103 UART: [state] LifecycleState = Unprovisioned
616,983 UART: [state] DebugLocked = No
619,219 UART: [state] WD Timer not started. Device not locked for debugging
623,102 UART: [kat] SHA2-256
802,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,777 UART: [kat] ++
814,313 UART: [kat] sha1
826,009 UART: [kat] SHA2-256
828,998 UART: [kat] SHA2-384
833,497 UART: [kat] SHA2-512-ACC
836,496 UART: [kat] ECC-384
3,278,813 UART: [kat] HMAC-384Kdf
3,291,130 UART: [kat] LMS
3,820,645 UART: [kat] --
3,825,376 UART: [cold-reset] ++
3,827,523 UART: [fht] FHT @ 0x50003400
3,838,281 UART: [idev] ++
3,838,839 UART: [idev] CDI.KEYID = 6
3,839,859 UART: [idev] SUBJECT.KEYID = 7
3,840,955 UART: [idev] UDS.KEYID = 0
3,841,990 ready_for_fw is high
3,842,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,935 UART: [idev] Erasing UDS.KEYID = 0
6,307,207 UART: [idev] Sha1 KeyId Algorithm
6,330,058 UART: [idev] --
6,334,640 UART: [ldev] ++
6,335,201 UART: [ldev] CDI.KEYID = 6
6,336,076 UART: [ldev] SUBJECT.KEYID = 5
6,337,282 UART: [ldev] AUTHORITY.KEYID = 7
6,338,561 UART: [ldev] FE.KEYID = 1
6,348,529 UART: [ldev] Erasing FE.KEYID = 1
8,822,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,734 UART: [ldev] --
10,616,884 UART: [fwproc] Wait for Commands...
10,619,510 UART: [fwproc] Recv command 0x46574c44
10,621,558 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,670 >>> mbox cmd response: success
14,493,197 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,497,807 UART: [afmc] ++
14,498,382 UART: [afmc] CDI.KEYID = 6
14,499,284 UART: [afmc] SUBJECT.KEYID = 7
14,500,492 UART: [afmc] AUTHORITY.KEYID = 5
16,998,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,700 UART: [afmc] --
18,794,697 UART: [cold-reset] --
18,798,226 UART: [state] Locking Datavault
18,804,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,681 UART: [state] Locking ICCM
18,807,691 UART: [exit] Launching FMC @ 0x40000130
18,816,134 UART:
18,816,362 UART: Running Caliptra FMC ...
18,817,451 UART:
18,817,602 UART: [state] CFI Enabled
18,825,668 UART: [fht] FMC Alias Private Key: 7
20,583,128 UART: [art] Extend RT PCRs Done
20,584,342 UART: [art] Lock RT PCRs Done
20,586,055 UART: [art] Populate DV Done
20,591,509 UART: [fht] FMC Alias Private Key: 7
20,593,097 UART: [art] Derive CDI
20,593,849 UART: [art] Store in in slot 0x4
20,636,546 UART: [art] Derive Key Pair
20,637,536 UART: [art] Store priv key in slot 0x5
23,064,924 UART: [art] Derive Key Pair - Done
23,077,466 UART: [art] Signing Cert with AUTHO
23,078,776 UART: RITY.KEYID = 7
24,784,156 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,654 UART: [art] PUB.X = BD48985CE59F1E8B826D4142ED9923A56C517F915371A138729F1E62435DFADCC0F9DE8E48E841010E7D0E9ADD995A24
24,792,941 UART: [art] PUB.Y = 9FF3B908C524FBC7DC73AD6C1BC4A4A8EA9184116F786DCA8E7585C4555162CAB6C9B72A1205007F94365065C9B772CB
24,800,169 UART: [art] SIG.R = 3C29F866041AF316CB891E17863E21D2DD54F092481D5637E7BCCCEE4FCD2AFBD54DFCD764CB2C2FCD0B4658D74DF086
24,807,606 UART: [art] SIG.S = 85D5124545319C6219B1CC9676BFFADE3A9FA118A11B8F2778D2359EEDEE501415EE8C74CCD2256222BC0CDC9C3BCA91
25,786,720 UART: Caliptra RT
25,787,421 UART: [state] CFI Enabled
25,904,312 UART: [rt] RT listening for mailbox commands...
25,935,495 UART: [rt]cmd =0x4c444556, len=4
25,946,509 >>> mbox cmd response data (687 bytes)
25,988,348 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,018,390 UART: [rt]cmd =0x43455246, len=4
26,030,994 >>> mbox cmd response data (887 bytes)
26,047,956 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,077,935 UART: [rt]cmd =0x43455252, len=4
26,089,206 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,968 writing to cptra_bootfsm_go
3,696,965 ready_for_fw is high
3,697,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,278 >>> mbox cmd response: success
14,279,901 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,527,663 UART:
18,528,062 UART: Running Caliptra FMC ...
18,529,251 UART:
18,529,410 UART: [state] CFI Enabled
18,537,253 UART: [fht] FMC Alias Private Key: 7
20,294,119 UART: [art] Extend RT PCRs Done
20,295,345 UART: [art] Lock RT PCRs Done
20,296,812 UART: [art] Populate DV Done
20,301,940 UART: [fht] FMC Alias Private Key: 7
20,303,479 UART: [art] Derive CDI
20,304,245 UART: [art] Store in in slot 0x4
20,346,453 UART: [art] Derive Key Pair
20,347,495 UART: [art] Store priv key in slot 0x5
22,774,105 UART: [art] Derive Key Pair - Done
22,786,958 UART: [art] Signing Cert with AUTHO
22,788,259 UART: RITY.KEYID = 7
24,493,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,417 UART: [art] PUB.X = 8A00C27A2B59AF320F3DFA5892B1EF1F709A400D8B45023AA3B3F7021E13B993CB347FE007CF6473DD4D79B6CA61F49F
24,502,705 UART: [art] PUB.Y = 0560E2B0D7882A598FF33988BDA63D5F255ECA88D6143D5BA9D5120DF0BD4DED7041F8B3F1BF5289540B00FA1A54A5D9
24,509,963 UART: [art] SIG.R = 4AA63FC93F958481F01792B1D5277C14D625CFBE2F9941E7A1BE8B96256FB56358606427E113D7D42F50B030CBEC2A46
24,517,375 UART: [art] SIG.S = 6BDF2A950D92C0DDD3A94FEC8C8CD7EA39EBF5CDBE02447A1398CCD292A6A44371CD13F7F693095E1923A7CB26FB0D00
25,496,331 UART: Caliptra RT
25,497,043 UART: [state] CFI Enabled
25,613,837 UART: [rt] RT listening for mailbox commands...
25,645,194 UART: [rt]cmd =0x4c444556, len=4
25,656,330 >>> mbox cmd response data (687 bytes)
25,697,988 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,727,808 UART: [rt]cmd =0x43455246, len=4
25,740,445 >>> mbox cmd response data (887 bytes)
25,756,977 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,786,895 UART: [rt]cmd =0x43455252, len=4
25,798,481 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,992 UART:
192,357 UART: Running Caliptra ROM ...
193,460 UART:
193,604 UART: [state] CFI Enabled
263,119 UART: [state] LifecycleState = Unprovisioned
265,492 UART: [state] DebugLocked = No
267,654 UART: [state] WD Timer not started. Device not locked for debugging
271,406 UART: [kat] SHA2-256
461,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,867 UART: [kat] ++
472,333 UART: [kat] sha1
483,560 UART: [kat] SHA2-256
486,568 UART: [kat] SHA2-384
492,841 UART: [kat] SHA2-512-ACC
495,416 UART: [kat] ECC-384
2,950,398 UART: [kat] HMAC-384Kdf
2,972,126 UART: [kat] LMS
3,503,884 UART: [kat] --
3,508,943 UART: [cold-reset] ++
3,511,296 UART: [fht] FHT @ 0x50003400
3,523,831 UART: [idev] ++
3,524,541 UART: [idev] CDI.KEYID = 6
3,525,465 UART: [idev] SUBJECT.KEYID = 7
3,526,635 UART: [idev] UDS.KEYID = 0
3,527,558 ready_for_fw is high
3,527,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,779 UART: [idev] Erasing UDS.KEYID = 0
6,028,258 UART: [idev] Sha1 KeyId Algorithm
6,050,890 UART: [idev] --
6,056,396 UART: [ldev] ++
6,057,073 UART: [ldev] CDI.KEYID = 6
6,057,960 UART: [ldev] SUBJECT.KEYID = 5
6,059,171 UART: [ldev] AUTHORITY.KEYID = 7
6,060,401 UART: [ldev] FE.KEYID = 1
6,099,915 UART: [ldev] Erasing FE.KEYID = 1
8,608,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,695 UART: [ldev] --
10,414,386 UART: [fwproc] Wait for Commands...
10,416,547 UART: [fwproc] Recv command 0x46574c44
10,418,804 UART: [fwproc] Recv'd Img size: 114448 bytes
13,869,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,605,644 >>> mbox cmd response: success
14,606,127 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,610,315 UART: [afmc] ++
14,611,012 UART: [afmc] CDI.KEYID = 6
14,612,208 UART: [afmc] SUBJECT.KEYID = 7
14,613,697 UART: [afmc] AUTHORITY.KEYID = 5
17,152,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,097 UART: [afmc] --
18,953,013 UART: [cold-reset] --
18,958,873 UART: [state] Locking Datavault
18,966,333 UART: [state] Locking PCR0, PCR1 and PCR31
18,968,524 UART: [state] Locking ICCM
18,971,517 UART: [exit] Launching FMC @ 0x40000130
18,980,185 UART:
18,980,425 UART: Running Caliptra FMC ...
18,981,522 UART:
18,982,342 UART: [state] CFI Enabled
19,033,449 UART: [fht] FMC Alias Private Key: 7
20,797,139 UART: [art] Extend RT PCRs Done
20,798,350 UART: [art] Lock RT PCRs Done
20,800,022 UART: [art] Populate DV Done
20,805,379 UART: [fht] FMC Alias Private Key: 7
20,806,881 UART: [art] Derive CDI
20,807,693 UART: [art] Store in in slot 0x4
20,866,011 UART: [art] Derive Key Pair
20,867,053 UART: [art] Store priv key in slot 0x5
23,328,557 UART: [art] Derive Key Pair - Done
23,341,820 UART: [art] Signing Cert with AUTHO
23,343,128 UART: RITY.KEYID = 7
25,054,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,151 UART: [art] PUB.X = 8CAC8E985D1230012A6771594134ABCFBF169A52EE3BE554A25FCDECC653390988EF0C8EEBBA0685131F861954E1E030
25,063,455 UART: [art] PUB.Y = C1FD1B8CE82EB824A084AAF5EF1BDC589D041794540B7E56944825FDB6FAF77708B5B88C52069C259E6900F0BB5B4708
25,070,693 UART: [art] SIG.R = AEEA8337E098230E2E7343C405A05970931AEAA0C94F9BC3C1092E7863A1D58E1F41C577F803CF6DCDE37CBA5E65790F
25,078,081 UART: [art] SIG.S = E513165878229C19DEA77C9F673B69C0EB721719DFA3359737B2C95A76EE88C90D97298378DF2638A37A44C46D3D4DD2
26,057,431 UART: Caliptra RT
26,058,137 UART: [state] CFI Enabled
26,223,512 UART: [rt] RT listening for mailbox commands...
26,254,878 UART: [rt]cmd =0x4c444556, len=4
26,265,935 >>> mbox cmd response data (687 bytes)
26,307,485 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,337,498 UART: [rt]cmd =0x43455246, len=4
26,350,259 >>> mbox cmd response data (887 bytes)
26,367,741 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,397,561 UART: [rt]cmd =0x43455252, len=4
26,409,063 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,438,910 ready_for_fw is high
3,439,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,396 >>> mbox cmd response: success
14,724,975 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,001,727 UART:
19,002,113 UART: Running Caliptra FMC ...
19,003,250 UART:
19,003,415 UART: [state] CFI Enabled
19,070,042 UART: [fht] FMC Alias Private Key: 7
20,834,002 UART: [art] Extend RT PCRs Done
20,835,250 UART: [art] Lock RT PCRs Done
20,837,010 UART: [art] Populate DV Done
20,842,254 UART: [fht] FMC Alias Private Key: 7
20,843,901 UART: [art] Derive CDI
20,844,716 UART: [art] Store in in slot 0x4
20,902,771 UART: [art] Derive Key Pair
20,903,820 UART: [art] Store priv key in slot 0x5
23,367,081 UART: [art] Derive Key Pair - Done
23,379,919 UART: [art] Signing Cert with AUTHO
23,381,229 UART: RITY.KEYID = 7
25,092,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,554 UART: [art] PUB.X = 19F96897DAAD40BD394CA80AC95EF19D8B62E1E25F991CC8A3FC53948A375820230B4C82C192064A3BED3895CCA15A8F
25,101,641 UART: [art] PUB.Y = 1527899BAFB0E2ABDA12AD7D68E2D240A1BB362AC4DE76E46340B1D1638AFB021B81F33C721CB086412DAFF1A292B331
25,108,948 UART: [art] SIG.R = FA980E4636653509A2552C79020C892EB5A31EF5A87974A905ED89576688F4C86E9A668C99BE3A17500F9B7A497120AF
25,116,343 UART: [art] SIG.S = EC3F602B120F8AA3AF6C1ED897A271CE58DD848E3C2C1804FFCCD288BBC90C447F2D66B573A50E454061553DC1E79791
26,094,818 UART: Caliptra RT
26,095,533 UART: [state] CFI Enabled
26,260,885 UART: [rt] RT listening for mailbox commands...
26,292,300 UART: [rt]cmd =0x4c444556, len=4
26,303,358 >>> mbox cmd response data (687 bytes)
26,344,873 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,374,807 UART: [rt]cmd =0x43455246, len=4
26,387,422 >>> mbox cmd response data (887 bytes)
26,404,165 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,434,095 UART: [rt]cmd =0x43455252, len=4
26,445,377 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,146 writing to cptra_bootfsm_go
193,408 UART:
193,873 UART: Running Caliptra ROM ...
195,018 UART:
604,631 UART: [state] CFI Enabled
620,017 UART: [state] LifecycleState = Unprovisioned
622,039 UART: [state] DebugLocked = No
623,625 UART: [state] WD Timer not started. Device not locked for debugging
628,723 UART: [kat] SHA2-256
818,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,347 UART: [kat] ++
829,861 UART: [kat] sha1
840,796 UART: [kat] SHA2-256
843,797 UART: [kat] SHA2-384
849,852 UART: [kat] SHA2-512-ACC
852,422 UART: [kat] ECC-384
3,291,269 UART: [kat] HMAC-384Kdf
3,304,353 UART: [kat] LMS
3,836,224 UART: [kat] --
3,842,016 UART: [cold-reset] ++
3,843,489 UART: [fht] FHT @ 0x50003400
3,855,188 UART: [idev] ++
3,855,902 UART: [idev] CDI.KEYID = 6
3,856,851 UART: [idev] SUBJECT.KEYID = 7
3,858,018 UART: [idev] UDS.KEYID = 0
3,859,086 ready_for_fw is high
3,859,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,125 UART: [idev] Erasing UDS.KEYID = 0
6,334,010 UART: [idev] Sha1 KeyId Algorithm
6,356,761 UART: [idev] --
6,360,319 UART: [ldev] ++
6,360,883 UART: [ldev] CDI.KEYID = 6
6,361,763 UART: [ldev] SUBJECT.KEYID = 5
6,362,883 UART: [ldev] AUTHORITY.KEYID = 7
6,364,209 UART: [ldev] FE.KEYID = 1
6,373,553 UART: [ldev] Erasing FE.KEYID = 1
8,850,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,596 UART: [ldev] --
10,641,015 UART: [fwproc] Wait for Commands...
10,644,078 UART: [fwproc] Recv command 0x46574c44
10,646,372 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,838,215 >>> mbox cmd response: success
14,838,715 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,842,745 UART: [afmc] ++
14,843,445 UART: [afmc] CDI.KEYID = 6
14,844,692 UART: [afmc] SUBJECT.KEYID = 7
14,846,122 UART: [afmc] AUTHORITY.KEYID = 5
17,348,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,872 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,686 UART: [afmc] --
19,141,969 UART: [cold-reset] --
19,146,705 UART: [state] Locking Datavault
19,152,060 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,195 UART: [state] Locking ICCM
19,156,560 UART: [exit] Launching FMC @ 0x40000130
19,165,222 UART:
19,165,458 UART: Running Caliptra FMC ...
19,166,553 UART:
19,166,703 UART: [state] CFI Enabled
19,174,795 UART: [fht] FMC Alias Private Key: 7
20,932,123 UART: [art] Extend RT PCRs Done
20,933,329 UART: [art] Lock RT PCRs Done
20,934,910 UART: [art] Populate DV Done
20,940,213 UART: [fht] FMC Alias Private Key: 7
20,941,851 UART: [art] Derive CDI
20,942,658 UART: [art] Store in in slot 0x4
20,985,246 UART: [art] Derive Key Pair
20,986,277 UART: [art] Store priv key in slot 0x5
23,413,366 UART: [art] Derive Key Pair - Done
23,426,576 UART: [art] Signing Cert with AUTHO
23,427,875 UART: RITY.KEYID = 7
25,133,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,708 UART: [art] PUB.X = 226856D7B9B1B974342D017C6BB3448BFE2F67D6F4E06C0614ED371985CE8BA77D6CFFB1F52F70A8A376B1C6E3CE7403
25,141,948 UART: [art] PUB.Y = FA9581FD390BCA4CAE2A816EA4E57F18FDD1EDEDEE9070DCC21A0A84F6C612B3F4C8FEAA337E8C3E805F665120A15542
25,149,276 UART: [art] SIG.R = 9D93B2E77E16CEF1DB96AACA76BB56D3C85FE75BEE81F2AA8FF0DC68810E6B9958BBFEBCA7461668B2AA780C6FE54B63
25,156,659 UART: [art] SIG.S = F603BCA9F42C904F533EF61E7AD3C27B4A9F01F8B92F6CBA37FFC4EE19F75D49D3A388E14C23A06B2C08E57DF31EF5A8
26,135,609 UART: Caliptra RT
26,136,317 UART: [state] CFI Enabled
26,253,947 UART: [rt] RT listening for mailbox commands...
26,285,631 UART: [rt]cmd =0x4c444556, len=4
26,296,816 >>> mbox cmd response data (687 bytes)
26,338,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,369,000 UART: [rt]cmd =0x43455246, len=4
26,381,420 >>> mbox cmd response data (887 bytes)
26,398,260 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,427,901 UART: [rt]cmd =0x43455252, len=4
26,439,265 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,755,597 ready_for_fw is high
3,756,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,176 >>> mbox cmd response: success
14,954,854 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,211,278 UART:
19,211,674 UART: Running Caliptra FMC ...
19,212,841 UART:
19,212,990 UART: [state] CFI Enabled
19,221,160 UART: [fht] FMC Alias Private Key: 7
20,978,316 UART: [art] Extend RT PCRs Done
20,979,526 UART: [art] Lock RT PCRs Done
20,981,308 UART: [art] Populate DV Done
20,986,815 UART: [fht] FMC Alias Private Key: 7
20,988,506 UART: [art] Derive CDI
20,989,319 UART: [art] Store in in slot 0x4
21,031,904 UART: [art] Derive Key Pair
21,032,942 UART: [art] Store priv key in slot 0x5
23,459,792 UART: [art] Derive Key Pair - Done
23,472,521 UART: [art] Signing Cert with AUTHO
23,473,818 UART: RITY.KEYID = 7
25,179,920 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,413 UART: [art] PUB.X = 28B77C15B5D5B276F619A31A6B949E93C73A4AD572B5AA6604EF35352CEE584E80D3DA0AB4F169EDA506125C294A9FB9
25,188,722 UART: [art] PUB.Y = 985EEF2696D6E9AB87C16D007F3DE82526E6C8241170F5FAC5611F1D45DE03B3DB99795C3036B733F80986AE26773229
25,195,970 UART: [art] SIG.R = 92160EFCEEA764C99F120A1947AC3BE49BF83E125A489FEAB256B9BEAB080C0F1A9E5098DB204CA53A8A3C630E741637
25,203,360 UART: [art] SIG.S = B2937FC1B29EDB84B09E9C9DD256333069B25FBF3D690312CE26D466464B9CD41926597CB71ADD0104B3920ADDBD954D
26,181,947 UART: Caliptra RT
26,182,646 UART: [state] CFI Enabled
26,300,258 UART: [rt] RT listening for mailbox commands...
26,331,341 UART: [rt]cmd =0x4c444556, len=4
26,342,364 >>> mbox cmd response data (687 bytes)
26,384,396 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,414,273 UART: [rt]cmd =0x43455246, len=4
26,426,967 >>> mbox cmd response data (887 bytes)
26,443,938 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,473,971 UART: [rt]cmd =0x43455252, len=4
26,485,242 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,448 UART: [kat] SHA2-512-ACC
897,349 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,642 UART: [kat] LMS
1,475,838 UART: [kat] --
1,476,715 UART: [cold-reset] ++
1,477,295 UART: [fht] Storing FHT @ 0x50003400
1,479,994 UART: [idev] ++
1,480,162 UART: [idev] CDI.KEYID = 6
1,480,522 UART: [idev] SUBJECT.KEYID = 7
1,480,946 UART: [idev] UDS.KEYID = 0
1,481,291 ready_for_fw is high
1,481,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,266 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,772 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,205 UART: [ldev] Erasing FE.KEYID = 1
1,546,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,542 UART: [ldev] --
1,585,887 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 114448 bytes
2,887,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,019 >>> mbox cmd response: success
3,080,019 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,081,237 UART: [afmc] ++
3,081,405 UART: [afmc] CDI.KEYID = 6
3,081,767 UART: [afmc] SUBJECT.KEYID = 7
3,082,192 UART: [afmc] AUTHORITY.KEYID = 5
3,117,309 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,407 UART: [afmc] --
3,160,317 UART: [cold-reset] --
3,160,989 UART: [state] Locking Datavault
3,162,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,968 UART: [state] Locking ICCM
3,163,528 UART: [exit] Launching FMC @ 0x40000130
3,168,857 UART:
3,168,873 UART: Running Caliptra FMC ...
3,169,281 UART:
3,169,335 UART: [state] CFI Enabled
3,180,042 UART: [fht] FMC Alias Private Key: 7
3,288,117 UART: [art] Extend RT PCRs Done
3,288,545 UART: [art] Lock RT PCRs Done
3,290,015 UART: [art] Populate DV Done
3,298,346 UART: [fht] FMC Alias Private Key: 7
3,299,434 UART: [art] Derive CDI
3,299,714 UART: [art] Store in in slot 0x4
3,385,515 UART: [art] Derive Key Pair
3,385,875 UART: [art] Store priv key in slot 0x5
3,398,607 UART: [art] Derive Key Pair - Done
3,413,440 UART: [art] Signing Cert with AUTHO
3,413,920 UART: RITY.KEYID = 7
3,428,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,713 UART: [art] PUB.X = 6BBDA0AD29AF8D7EADFE4BD80329E627C41E63D5F77F7681E68AE442E318EE49B9DC63EA2DF125121006B8D7E9EFAB71
3,436,499 UART: [art] PUB.Y = F46C3C2D441E85457A8712F435DA81C6D8B1BF64C4327BA5DDA73CBF052049E021F7948B68FEC36C7E53E4C01CC8518B
3,443,456 UART: [art] SIG.R = C7BC262AA43F233FE4075436617D0759F000740BCF4B37FAEE506326D13B9353C26EE83CDD1A3DF510ACF9AC4A1E5D77
3,450,207 UART: [art] SIG.S = 4317FFF1BB6FBF4AD04E79B2CF06F1582F9D5F56BA206E85D7C3A008866A05347C689DDD34E518AC9309DF296E8EA516
3,474,070 UART: Caliptra RT
3,474,323 UART: [state] CFI Enabled
3,582,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,524 UART: [rt]cmd =0x4c444556, len=4
3,623,864 >>> mbox cmd response data (687 bytes)
3,623,865 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,196 UART: [rt]cmd =0x43455246, len=4
3,665,678 >>> mbox cmd response data (920 bytes)
3,665,679 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,936 UART: [rt]cmd =0x43455252, len=4
3,705,677 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,415 ready_for_fw is high
1,362,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,095 >>> mbox cmd response: success
2,929,095 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,990,683 UART:
2,990,699 UART: Running Caliptra FMC ...
2,991,107 UART:
2,991,161 UART: [state] CFI Enabled
3,001,788 UART: [fht] FMC Alias Private Key: 7
3,109,015 UART: [art] Extend RT PCRs Done
3,109,443 UART: [art] Lock RT PCRs Done
3,111,201 UART: [art] Populate DV Done
3,119,360 UART: [fht] FMC Alias Private Key: 7
3,120,464 UART: [art] Derive CDI
3,120,744 UART: [art] Store in in slot 0x4
3,205,951 UART: [art] Derive Key Pair
3,206,311 UART: [art] Store priv key in slot 0x5
3,219,509 UART: [art] Derive Key Pair - Done
3,234,294 UART: [art] Signing Cert with AUTHO
3,234,774 UART: RITY.KEYID = 7
3,250,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,767 UART: [art] PUB.X = 2ECB5630F9DE5F85F63169B0ECD0D8B4A8916109BF886454D1399EFA88A6018E92E425F1C73F32C716955B1701D43D74
3,257,528 UART: [art] PUB.Y = 205D6541D129693DE0E04695971A4EB779267FA4B65A35ED4E5B12398B479C5F2C85EB68A5D412B6DE4ED4B9D9A76A89
3,264,482 UART: [art] SIG.R = 94E9E06688939B15CB7D4DAAFAA7E2DC2534A8B01B81D5773288A39E6BD63CDEA802D3986C67C79C03D81A4BB3BED494
3,271,260 UART: [art] SIG.S = 1E104D3C984F094B4BE204BEA0542B44BA6C3A8B1BFBFC4161E3B57F61BB5CCCCC3D2DF3822F6E8F72186F73FD33C7E9
3,294,883 UART: Caliptra RT
3,295,136 UART: [state] CFI Enabled
3,402,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,677 UART: [rt]cmd =0x4c444556, len=4
3,442,917 >>> mbox cmd response data (687 bytes)
3,442,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,327 UART: [rt]cmd =0x43455246, len=4
3,484,639 >>> mbox cmd response data (920 bytes)
3,484,640 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,005 UART: [rt]cmd =0x43455252, len=4
3,524,826 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,982 UART: [kat] SHA2-256
892,920 UART: [kat] SHA2-384
895,523 UART: [kat] SHA2-512-ACC
897,424 UART: [kat] ECC-384
903,237 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,476,874 UART: [fht] Storing FHT @ 0x50003400
1,479,719 UART: [idev] ++
1,479,887 UART: [idev] CDI.KEYID = 6
1,480,247 UART: [idev] SUBJECT.KEYID = 7
1,480,671 UART: [idev] UDS.KEYID = 0
1,481,016 ready_for_fw is high
1,481,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,449 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,063 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,576 UART: [ldev] Erasing FE.KEYID = 1
1,546,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,551 UART: [ldev] --
1,585,912 UART: [fwproc] Waiting for Commands...
1,586,759 UART: [fwproc] Received command 0x46574c44
1,587,550 UART: [fwproc] Received Image of size 114448 bytes
2,887,771 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,834 >>> mbox cmd response: success
3,079,834 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,081,008 UART: [afmc] ++
3,081,176 UART: [afmc] CDI.KEYID = 6
3,081,538 UART: [afmc] SUBJECT.KEYID = 7
3,081,963 UART: [afmc] AUTHORITY.KEYID = 5
3,116,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,551 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,241 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,910 UART: [afmc] --
3,159,840 UART: [cold-reset] --
3,160,766 UART: [state] Locking Datavault
3,162,131 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,735 UART: [state] Locking ICCM
3,163,221 UART: [exit] Launching FMC @ 0x40000130
3,168,550 UART:
3,168,566 UART: Running Caliptra FMC ...
3,168,974 UART:
3,169,117 UART: [state] CFI Enabled
3,179,430 UART: [fht] FMC Alias Private Key: 7
3,287,259 UART: [art] Extend RT PCRs Done
3,287,687 UART: [art] Lock RT PCRs Done
3,289,419 UART: [art] Populate DV Done
3,297,460 UART: [fht] FMC Alias Private Key: 7
3,298,480 UART: [art] Derive CDI
3,298,760 UART: [art] Store in in slot 0x4
3,384,805 UART: [art] Derive Key Pair
3,385,165 UART: [art] Store priv key in slot 0x5
3,398,465 UART: [art] Derive Key Pair - Done
3,413,319 UART: [art] Signing Cert with AUTHO
3,413,799 UART: RITY.KEYID = 7
3,429,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,002 UART: [art] PUB.X = 22146D28905760F84F881448978498750F556125317F48C02F026A3CD7F78244FF3956A26BA9FB8AD5D3FEDEB7B62FA0
3,436,762 UART: [art] PUB.Y = BC5EFB364AAC4D70FEBC9B70F7A6868490C586F44439FC661176EB9197263249E88E07FA15EAA838D0128CC324CF4861
3,443,715 UART: [art] SIG.R = 258C6A42EE69EF1294C1663CE838AD5E36B1DF01226B0D137A3367637AC0A1D2B130B9FCA89C4C66C9A00CA8C2BCC54E
3,450,490 UART: [art] SIG.S = 27792F710C6785BA281BD81C503F12CE547E325B4409A115F60CCB990812F7728DCE5FEDDB018F158BD863652FFFFE1A
3,474,446 UART: Caliptra RT
3,474,791 UART: [state] CFI Enabled
3,582,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,425 UART: [rt]cmd =0x4c444556, len=4
3,623,669 >>> mbox cmd response data (687 bytes)
3,623,670 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,807 UART: [rt]cmd =0x43455246, len=4
3,665,151 >>> mbox cmd response data (920 bytes)
3,665,152 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,551 UART: [rt]cmd =0x43455252, len=4
3,705,304 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,430 ready_for_fw is high
1,363,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,440 >>> mbox cmd response: success
2,930,440 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,991,172 UART:
2,991,188 UART: Running Caliptra FMC ...
2,991,596 UART:
2,991,739 UART: [state] CFI Enabled
3,002,690 UART: [fht] FMC Alias Private Key: 7
3,111,901 UART: [art] Extend RT PCRs Done
3,112,329 UART: [art] Lock RT PCRs Done
3,113,833 UART: [art] Populate DV Done
3,122,172 UART: [fht] FMC Alias Private Key: 7
3,123,168 UART: [art] Derive CDI
3,123,448 UART: [art] Store in in slot 0x4
3,209,345 UART: [art] Derive Key Pair
3,209,705 UART: [art] Store priv key in slot 0x5
3,222,887 UART: [art] Derive Key Pair - Done
3,237,772 UART: [art] Signing Cert with AUTHO
3,238,252 UART: RITY.KEYID = 7
3,253,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,325 UART: [art] PUB.X = 485609CB201BBA0DCF9D060557CD3F628706FFD7D6BCB7475A90EC5DE02F1BFFFA7D83DAD2FC4E854AE51FEFE2542B93
3,261,106 UART: [art] PUB.Y = 745B88210FC6F90E02E06108AEE9F5A1D0AA8E3AB8CA2DD51D5D80B3F71ACC9871DB7530DA72C87D44A0E95A690DDB15
3,268,059 UART: [art] SIG.R = 7B586D3AF9AD955579F4EFF8158217A35FC73B946DC9C661247F18880519C7892C26D1D87EC8C57A3270117D5E78A962
3,274,822 UART: [art] SIG.S = FD40D7E3C6C01495384E31968ACD00A59A4CFCBA27A53A30347AC7813D2F9E69369E02D2A8B9D1F53B05E1739163E0BC
3,298,639 UART: Caliptra RT
3,298,984 UART: [state] CFI Enabled
3,409,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,689 UART: [rt]cmd =0x4c444556, len=4
3,450,217 >>> mbox cmd response data (687 bytes)
3,450,218 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,473 UART: [rt]cmd =0x43455246, len=4
3,491,917 >>> mbox cmd response data (920 bytes)
3,491,918 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,349 UART: [rt]cmd =0x43455252, len=4
3,532,090 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,696 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,179 UART: [cold-reset] ++
1,171,617 UART: [fht] FHT @ 0x50003400
1,174,338 UART: [idev] ++
1,174,506 UART: [idev] CDI.KEYID = 6
1,174,866 UART: [idev] SUBJECT.KEYID = 7
1,175,290 UART: [idev] UDS.KEYID = 0
1,175,635 ready_for_fw is high
1,175,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,299 UART: [idev] Sha1 KeyId Algorithm
1,208,929 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,554 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,204 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,540 >>> mbox cmd response: success
2,776,540 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,780 UART: [afmc] ++
2,777,948 UART: [afmc] CDI.KEYID = 6
2,778,310 UART: [afmc] SUBJECT.KEYID = 7
2,778,735 UART: [afmc] AUTHORITY.KEYID = 5
2,814,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,715 UART: [afmc] --
2,857,631 UART: [cold-reset] --
2,858,559 UART: [state] Locking Datavault
2,859,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,052 UART: [state] Locking ICCM
2,860,704 UART: [exit] Launching FMC @ 0x40000130
2,866,033 UART:
2,866,049 UART: Running Caliptra FMC ...
2,866,457 UART:
2,866,511 UART: [state] CFI Enabled
2,876,882 UART: [fht] FMC Alias Private Key: 7
2,985,431 UART: [art] Extend RT PCRs Done
2,985,859 UART: [art] Lock RT PCRs Done
2,987,319 UART: [art] Populate DV Done
2,995,826 UART: [fht] FMC Alias Private Key: 7
2,996,950 UART: [art] Derive CDI
2,997,230 UART: [art] Store in in slot 0x4
3,083,023 UART: [art] Derive Key Pair
3,083,383 UART: [art] Store priv key in slot 0x5
3,096,471 UART: [art] Derive Key Pair - Done
3,111,027 UART: [art] Signing Cert with AUTHO
3,111,507 UART: RITY.KEYID = 7
3,126,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,490 UART: [art] PUB.X = 4F1580A137010A1A8D4464B61E6F71F8C2BA2A159CB0AE5103E97E7120BD32CCA214A26AB7FC7AC6229A8FB68A4A28CD
3,134,265 UART: [art] PUB.Y = 115615A2A910C54250092EFFC0572B8FFDDA8FED40B35DDBF6058DCC14F5FD0E2C73387BCC5F763A666511FB3A25AB1C
3,141,224 UART: [art] SIG.R = 5620A72F2D3F577D8132A4DDE2437F8B0FE00127048036312C7406EB85BFA428345363E9281E14EE2146FAB7F199ED28
3,147,978 UART: [art] SIG.S = DED7D0D34EAE5EB8122DEB9D21229C6BBFED227481E9EDA189E123AA4F03E03C581744B28EF07D8146052C75FDEEBA51
3,171,719 UART: Caliptra RT
3,171,972 UART: [state] CFI Enabled
3,279,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,803 UART: [rt]cmd =0x4c444556, len=4
3,320,111 >>> mbox cmd response data (687 bytes)
3,320,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,617 UART: [rt]cmd =0x43455246, len=4
3,361,799 >>> mbox cmd response data (887 bytes)
3,361,800 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,041 UART: [rt]cmd =0x43455252, len=4
3,401,922 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,925 >>> mbox cmd response: success
2,626,925 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,689,227 UART:
2,689,243 UART: Running Caliptra FMC ...
2,689,651 UART:
2,689,705 UART: [state] CFI Enabled
2,700,390 UART: [fht] FMC Alias Private Key: 7
2,808,321 UART: [art] Extend RT PCRs Done
2,808,749 UART: [art] Lock RT PCRs Done
2,810,101 UART: [art] Populate DV Done
2,818,526 UART: [fht] FMC Alias Private Key: 7
2,819,598 UART: [art] Derive CDI
2,819,878 UART: [art] Store in in slot 0x4
2,905,801 UART: [art] Derive Key Pair
2,906,161 UART: [art] Store priv key in slot 0x5
2,919,199 UART: [art] Derive Key Pair - Done
2,933,762 UART: [art] Signing Cert with AUTHO
2,934,242 UART: RITY.KEYID = 7
2,949,644 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,409 UART: [art] PUB.X = 706ADD4291352F5A21A64013DC4794C0A5E71585B34DE495846E5EC068510C5620A3413E14FC9A9B261C2C7A03621510
2,957,165 UART: [art] PUB.Y = EF28AFCD15BDD4AC36DCB71A84E668A2FE7E7A3A5661216757FE42FB58EDB93E35DD2B00C781A671A9396ADCD17997DF
2,964,115 UART: [art] SIG.R = C395A147B144E2C6F788F24698CD62A5884C3FAEB728DDD7FAD9F4DA6351AD2568372CA300100090AAE1925A9D63559E
2,970,847 UART: [art] SIG.S = 26DCE5D4CBCEDF57EA260278746120F412DB4C4A265BF16F0503815BD85D6AAAA5FF42A8E4ACA1CF056E95D4F38D1A6E
2,994,680 UART: Caliptra RT
2,994,933 UART: [state] CFI Enabled
3,103,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,900 UART: [rt]cmd =0x4c444556, len=4
3,144,418 >>> mbox cmd response data (687 bytes)
3,144,419 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,714 UART: [rt]cmd =0x43455246, len=4
3,185,674 >>> mbox cmd response data (887 bytes)
3,185,675 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,214,972 UART: [rt]cmd =0x43455252, len=4
3,225,717 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
893,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,690 UART: [kat] ++
897,842 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 ready_for_fw is high
1,176,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,956 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,388 UART: [ldev] ++
1,211,556 UART: [ldev] CDI.KEYID = 6
1,211,919 UART: [ldev] SUBJECT.KEYID = 5
1,212,345 UART: [ldev] AUTHORITY.KEYID = 7
1,212,808 UART: [ldev] FE.KEYID = 1
1,218,192 UART: [ldev] Erasing FE.KEYID = 1
1,244,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,158 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,113 UART: [fwproc] Recv command 0x46574c44
1,284,841 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,299 >>> mbox cmd response: success
2,777,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,778,461 UART: [afmc] ++
2,778,629 UART: [afmc] CDI.KEYID = 6
2,778,991 UART: [afmc] SUBJECT.KEYID = 7
2,779,416 UART: [afmc] AUTHORITY.KEYID = 5
2,815,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,824 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,582 UART: [afmc] --
2,858,466 UART: [cold-reset] --
2,859,396 UART: [state] Locking Datavault
2,860,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,321 UART: [state] Locking ICCM
2,861,983 UART: [exit] Launching FMC @ 0x40000130
2,867,312 UART:
2,867,328 UART: Running Caliptra FMC ...
2,867,736 UART:
2,867,879 UART: [state] CFI Enabled
2,879,074 UART: [fht] FMC Alias Private Key: 7
2,986,977 UART: [art] Extend RT PCRs Done
2,987,405 UART: [art] Lock RT PCRs Done
2,988,791 UART: [art] Populate DV Done
2,997,196 UART: [fht] FMC Alias Private Key: 7
2,998,246 UART: [art] Derive CDI
2,998,526 UART: [art] Store in in slot 0x4
3,084,569 UART: [art] Derive Key Pair
3,084,929 UART: [art] Store priv key in slot 0x5
3,098,853 UART: [art] Derive Key Pair - Done
3,113,872 UART: [art] Signing Cert with AUTHO
3,114,352 UART: RITY.KEYID = 7
3,129,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,915 UART: [art] PUB.X = B8C210A61A7F62B0FED3A9AEE08A9BDF100E430156F033A35982B5F8057F1C4916FE337402733FB0E615A41E0FEEB3B8
3,136,680 UART: [art] PUB.Y = E8AB13B6961CFA9C8395256282EA3719B9FF6AE643B312175EA177F158E07F0CE80EEEC3E39B658646D659C79B2B5C15
3,143,630 UART: [art] SIG.R = 57AE60AD24E5B783419923B6B320A3BE44056B61B8AB34CB36CEEC9E25828EC8E65F8917F9B3216F0DB35325D49C4E4C
3,150,402 UART: [art] SIG.S = 591C2EFC33F6F767D4C701A90068461817DEFBEDEEDA229D253F0011C106CEFB96F5548FB249A917AA5059F775B2A55B
3,174,355 UART: Caliptra RT
3,174,700 UART: [state] CFI Enabled
3,281,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,871 UART: [rt]cmd =0x4c444556, len=4
3,322,443 >>> mbox cmd response data (687 bytes)
3,322,444 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,869 UART: [rt]cmd =0x43455246, len=4
3,363,995 >>> mbox cmd response data (887 bytes)
3,363,996 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,293 UART: [rt]cmd =0x43455252, len=4
3,404,098 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,230 ready_for_fw is high
1,060,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,356 >>> mbox cmd response: success
2,629,356 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,691,588 UART:
2,691,604 UART: Running Caliptra FMC ...
2,692,012 UART:
2,692,155 UART: [state] CFI Enabled
2,703,238 UART: [fht] FMC Alias Private Key: 7
2,810,701 UART: [art] Extend RT PCRs Done
2,811,129 UART: [art] Lock RT PCRs Done
2,813,085 UART: [art] Populate DV Done
2,821,348 UART: [fht] FMC Alias Private Key: 7
2,822,348 UART: [art] Derive CDI
2,822,628 UART: [art] Store in in slot 0x4
2,908,681 UART: [art] Derive Key Pair
2,909,041 UART: [art] Store priv key in slot 0x5
2,922,637 UART: [art] Derive Key Pair - Done
2,937,086 UART: [art] Signing Cert with AUTHO
2,937,566 UART: RITY.KEYID = 7
2,952,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,739 UART: [art] PUB.X = 7B26E9FF7F18F890E37E6B1BAB0E0921ABE281673B0585CE446940CF2F37FE5C5B79F66915B1B608B5F62B29CCBCC22D
2,960,511 UART: [art] PUB.Y = D4A704D463FD23E4D9D710A27EE6D80FF34375DFE629B73D92DB81FFF6477B91D2855E46BF06343E9EE2E590E5A7B255
2,967,462 UART: [art] SIG.R = 4A6DE090F202D1D4BA847E4C6CCD4ECB1A9B844B14BFABDF00BDA02A88D8AD5D07F0231AEAA123F469C8F3646BBCCE56
2,974,234 UART: [art] SIG.S = 07ED1E1B87F4009EC9843D0195036342ACD144F1B6F799BFCC303C3D0B85AB0F4B5A988C8ACB37B87DC0FE1542A461E6
2,998,378 UART: Caliptra RT
2,998,723 UART: [state] CFI Enabled
3,106,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,690 UART: [rt]cmd =0x4c444556, len=4
3,147,152 >>> mbox cmd response data (687 bytes)
3,147,153 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,612 UART: [rt]cmd =0x43455246, len=4
3,188,490 >>> mbox cmd response data (887 bytes)
3,188,491 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,912 UART: [rt]cmd =0x43455252, len=4
3,228,673 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,904 UART: [kat] SHA2-512-ACC
906,805 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 ready_for_fw is high
1,174,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,968 UART: [ldev] Erasing FE.KEYID = 1
1,242,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,564 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,622 >>> mbox cmd response: success
2,774,622 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,715 UART: [afmc] ++
2,775,883 UART: [afmc] CDI.KEYID = 6
2,776,246 UART: [afmc] SUBJECT.KEYID = 7
2,776,672 UART: [afmc] AUTHORITY.KEYID = 5
2,812,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,835 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,536 UART: [afmc] --
2,855,514 UART: [cold-reset] --
2,856,528 UART: [state] Locking Datavault
2,857,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,601 UART: [state] Locking ICCM
2,859,263 UART: [exit] Launching FMC @ 0x40000130
2,864,592 UART:
2,864,608 UART: Running Caliptra FMC ...
2,865,016 UART:
2,865,070 UART: [state] CFI Enabled
2,875,415 UART: [fht] FMC Alias Private Key: 7
2,982,966 UART: [art] Extend RT PCRs Done
2,983,394 UART: [art] Lock RT PCRs Done
2,984,980 UART: [art] Populate DV Done
2,993,335 UART: [fht] FMC Alias Private Key: 7
2,994,459 UART: [art] Derive CDI
2,994,739 UART: [art] Store in in slot 0x4
3,080,710 UART: [art] Derive Key Pair
3,081,070 UART: [art] Store priv key in slot 0x5
3,094,876 UART: [art] Derive Key Pair - Done
3,109,698 UART: [art] Signing Cert with AUTHO
3,110,178 UART: RITY.KEYID = 7
3,125,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,087 UART: [art] PUB.X = 7C5C8DC836BDA2A8A9677FF3859160B871EAE4B52C6B66C6ACAF4B2A85C4F141F03BEE9DEFB1A6BF527401ABC561C3BD
3,132,880 UART: [art] PUB.Y = 7095F25B45CE1429449CCF17E6A64D5AFE92AB090D53A04E282434CF6ED667074CBDA89C7E0AA8B96A3EAF78712A5A18
3,139,830 UART: [art] SIG.R = 618B2E313778F0608DFA0E92EBB0356ED0B01EB0F1AD6C9F0990CE3E757DBB7499FB0A4502E8B5A9A0F7451B57E90450
3,146,595 UART: [art] SIG.S = 36C58A3B15052BDA6329A858E81E1AB477D7C4400402A51CF244348946BFCC5CDFDA07FEBEF38B27E4F55DB6ABEA02CF
3,170,359 UART: Caliptra RT
3,170,612 UART: [state] CFI Enabled
3,278,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,183 UART: [rt]cmd =0x4c444556, len=4
3,319,593 >>> mbox cmd response data (687 bytes)
3,319,594 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,857 UART: [rt]cmd =0x43455246, len=4
3,360,943 >>> mbox cmd response data (887 bytes)
3,360,944 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,547 UART: [rt]cmd =0x43455252, len=4
3,401,300 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,200 ready_for_fw is high
1,056,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,106 >>> mbox cmd response: success
2,622,106 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,130 UART:
2,684,146 UART: Running Caliptra FMC ...
2,684,554 UART:
2,684,608 UART: [state] CFI Enabled
2,694,911 UART: [fht] FMC Alias Private Key: 7
2,802,468 UART: [art] Extend RT PCRs Done
2,802,896 UART: [art] Lock RT PCRs Done
2,804,536 UART: [art] Populate DV Done
2,812,983 UART: [fht] FMC Alias Private Key: 7
2,813,915 UART: [art] Derive CDI
2,814,195 UART: [art] Store in in slot 0x4
2,899,594 UART: [art] Derive Key Pair
2,899,954 UART: [art] Store priv key in slot 0x5
2,913,266 UART: [art] Derive Key Pair - Done
2,927,602 UART: [art] Signing Cert with AUTHO
2,928,082 UART: RITY.KEYID = 7
2,943,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,985 UART: [art] PUB.X = 975465E9AD7AE4D7D6C3BA6BDAE0E4A32BBEB1C0B0193628CC1964DD6F60DB084E99CBCB8F9FEA0E96CF9567B96351CF
2,950,775 UART: [art] PUB.Y = 06E6136FE3AED2C0607E62CBDDED2D558EB02FADEC67F0D650E3F4DE916666AF2C056E9631BCF5B4898828E6DAE0EFD8
2,957,743 UART: [art] SIG.R = D29E9B053372385850F25615D06BB6C4A54B2CC4205DB8BABB300DAD6555873809DD5F29F3FF6001294E1614474CDB54
2,964,501 UART: [art] SIG.S = ADDF50A8F40511FED9CB2AD79D3EF1A454F9474C4BCA82A8F49E94DC4FB8E7E44D364274D4CCD50B28B5A8EDBFE34CBF
2,988,540 UART: Caliptra RT
2,988,793 UART: [state] CFI Enabled
3,095,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,669 UART: [rt]cmd =0x4c444556, len=4
3,137,203 >>> mbox cmd response data (687 bytes)
3,137,204 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,439 UART: [rt]cmd =0x43455246, len=4
3,178,709 >>> mbox cmd response data (887 bytes)
3,178,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,207,925 UART: [rt]cmd =0x43455252, len=4
3,218,751 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,916 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,577 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,082 UART: [fwproc] Recv command 0x46574c44
1,282,815 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,959 >>> mbox cmd response: success
2,773,959 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,110 UART: [afmc] ++
2,775,278 UART: [afmc] CDI.KEYID = 6
2,775,641 UART: [afmc] SUBJECT.KEYID = 7
2,776,067 UART: [afmc] AUTHORITY.KEYID = 5
2,812,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,363 UART: [afmc] --
2,855,265 UART: [cold-reset] --
2,856,201 UART: [state] Locking Datavault
2,857,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,018 UART: [state] Locking ICCM
2,858,540 UART: [exit] Launching FMC @ 0x40000130
2,863,869 UART:
2,863,885 UART: Running Caliptra FMC ...
2,864,293 UART:
2,864,436 UART: [state] CFI Enabled
2,874,949 UART: [fht] FMC Alias Private Key: 7
2,982,774 UART: [art] Extend RT PCRs Done
2,983,202 UART: [art] Lock RT PCRs Done
2,984,644 UART: [art] Populate DV Done
2,992,457 UART: [fht] FMC Alias Private Key: 7
2,993,619 UART: [art] Derive CDI
2,993,899 UART: [art] Store in in slot 0x4
3,079,488 UART: [art] Derive Key Pair
3,079,848 UART: [art] Store priv key in slot 0x5
3,093,326 UART: [art] Derive Key Pair - Done
3,108,438 UART: [art] Signing Cert with AUTHO
3,108,918 UART: RITY.KEYID = 7
3,124,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,917 UART: [art] PUB.X = 1E56828C2C789C4DA5F456C608CA3509776E8FEF8E82F49C15C78159D171B2DBB77ECF9C980275F75507F8ED86137E61
3,131,677 UART: [art] PUB.Y = E3A199AADF79C7F5D10B0E83E01F5DA09928A699D989936F796744CCD216B77D2236D0085E51E7C5BDC1A3FE0C6F4216
3,138,623 UART: [art] SIG.R = 432894853A734B453DC9165CCEE3F6B2CCC9C255C05BEF7F9BA50B3FDF73CA2131DC7D792570A8D6D3AD5088A90B1954
3,145,399 UART: [art] SIG.S = 7D6A5C44C582CA5E3A041DD8A5F84D39AD83F55D078417E1892E1204F783AFA902CFDC7002C8626F534470FB55C9BBF4
3,168,973 UART: Caliptra RT
3,169,318 UART: [state] CFI Enabled
3,277,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,125 UART: [rt]cmd =0x4c444556, len=4
3,318,507 >>> mbox cmd response data (687 bytes)
3,318,508 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,789 UART: [rt]cmd =0x43455246, len=4
3,359,875 >>> mbox cmd response data (887 bytes)
3,359,876 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,079 UART: [rt]cmd =0x43455252, len=4
3,400,040 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,267 ready_for_fw is high
1,057,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,087 >>> mbox cmd response: success
2,625,087 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,755 UART:
2,686,771 UART: Running Caliptra FMC ...
2,687,179 UART:
2,687,322 UART: [state] CFI Enabled
2,698,201 UART: [fht] FMC Alias Private Key: 7
2,807,112 UART: [art] Extend RT PCRs Done
2,807,540 UART: [art] Lock RT PCRs Done
2,809,438 UART: [art] Populate DV Done
2,817,535 UART: [fht] FMC Alias Private Key: 7
2,818,525 UART: [art] Derive CDI
2,818,805 UART: [art] Store in in slot 0x4
2,904,468 UART: [art] Derive Key Pair
2,904,828 UART: [art] Store priv key in slot 0x5
2,918,098 UART: [art] Derive Key Pair - Done
2,932,865 UART: [art] Signing Cert with AUTHO
2,933,345 UART: RITY.KEYID = 7
2,948,813 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,578 UART: [art] PUB.X = F1BD37A2ECF235B0D0D26418DA4394DBE13DB106715CAFE5FB2E94A2EBD8ED5ABBAFB358034EC91EB6263448C796AC13
2,956,366 UART: [art] PUB.Y = E3D3B651C0FC8F033C743872A88CD8480C0C04552EDB5DBBC477F568F83B3AEC0F2A19FC4911E2E580D2C9059EA5C29D
2,963,312 UART: [art] SIG.R = 93DE1D163EBC6FD947AF90AFFC88C8D039425F876EA4CFB0F2B9D56EDD5A22627FD9490CA775E2BACDD02B8A9393CDDB
2,970,107 UART: [art] SIG.S = F6943E081DC6DE2EAB475FDCD5975E8259E8707F1BFC91C6D5945533BFA32E41B34967A96D0A14B7DBA6DAD314543144
2,993,988 UART: Caliptra RT
2,994,333 UART: [state] CFI Enabled
3,102,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,983 UART: [rt]cmd =0x4c444556, len=4
3,143,321 >>> mbox cmd response data (687 bytes)
3,143,322 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,805 UART: [rt]cmd =0x43455246, len=4
3,184,817 >>> mbox cmd response data (887 bytes)
3,184,818 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,214,303 UART: [rt]cmd =0x43455252, len=4
3,224,917 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,032 writing to cptra_bootfsm_go
193,259 UART:
193,619 UART: Running Caliptra ROM ...
194,717 UART:
194,858 UART: [state] CFI Enabled
266,236 UART: [state] LifecycleState = Unprovisioned
268,158 UART: [state] DebugLocked = No
269,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,202 UART: [kat] SHA2-256
443,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,379 UART: [kat] ++
454,822 UART: [kat] sha1
466,707 UART: [kat] SHA2-256
469,432 UART: [kat] SHA2-384
476,201 UART: [kat] SHA2-512-ACC
478,564 UART: [kat] ECC-384
2,767,959 UART: [kat] HMAC-384Kdf
2,778,927 UART: [kat] LMS
3,969,206 UART: [kat] --
3,974,987 UART: [cold-reset] ++
3,976,711 UART: [fht] Storing FHT @ 0x50003400
3,988,474 UART: [idev] ++
3,989,040 UART: [idev] CDI.KEYID = 6
3,989,956 UART: [idev] SUBJECT.KEYID = 7
3,991,198 UART: [idev] UDS.KEYID = 0
3,992,176 ready_for_fw is high
3,992,370 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,456 UART: [idev] Erasing UDS.KEYID = 0
7,326,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,270 UART: [idev] --
7,352,158 UART: [ldev] ++
7,352,729 UART: [ldev] CDI.KEYID = 6
7,353,697 UART: [ldev] SUBJECT.KEYID = 5
7,354,908 UART: [ldev] AUTHORITY.KEYID = 7
7,356,134 UART: [ldev] FE.KEYID = 1
7,402,786 UART: [ldev] Erasing FE.KEYID = 1
10,733,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,461 UART: [ldev] --
13,095,465 UART: [fwproc] Waiting for Commands...
13,097,128 UART: [fwproc] Received command 0x46574c44
13,099,333 UART: [fwproc] Received Image of size 114124 bytes
17,154,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,620,377 >>> mbox cmd response: success
18,080,728 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,082,057 UART: [afmc] ++
18,082,598 UART: [afmc] CDI.KEYID = 6
18,083,485 UART: [afmc] SUBJECT.KEYID = 7
18,084,607 UART: [afmc] AUTHORITY.KEYID = 5
20,987,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,416 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,726 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,110 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,944 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,393 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,648 UART: [afmc] --
23,359,088 UART: [cold-reset] --
23,363,909 UART: [state] Locking Datavault
23,367,586 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,292 UART: [state] Locking ICCM
23,371,313 UART: [exit] Launching FMC @ 0x40000130
23,379,706 UART:
23,379,943 UART: Running Caliptra FMC ...
23,381,046 UART:
23,381,208 UART: [state] CFI Enabled
23,448,669 UART: [fht] FMC Alias Private Key: 7
25,785,851 UART: [art] Extend RT PCRs Done
25,787,069 UART: [art] Lock RT PCRs Done
25,788,827 UART: [art] Populate DV Done
25,794,240 UART: [fht] FMC Alias Private Key: 7
25,795,993 UART: [art] Derive CDI
25,796,733 UART: [art] Store in in slot 0x4
25,857,538 UART: [art] Derive Key Pair
25,858,595 UART: [art] Store priv key in slot 0x5
29,151,155 UART: [art] Derive Key Pair - Done
29,163,887 UART: [art] Signing Cert with AUTHO
29,165,190 UART: RITY.KEYID = 7
31,453,587 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,094 UART: [art] PUB.X = 1AD6E7E354D87E28E95C72CFCC42F7B975FB3C3004993099A1AF313AFAB922808117A7E058A7D85C5E568CC8BDC7EE35
31,462,358 UART: [art] PUB.Y = 798FB559E0CDFF29DD050D80F8B5BF49A771AA829AC0062A6353A14933AF4D8BA7103E389B8017CC610ECE76B2096CCB
31,469,603 UART: [art] SIG.R = 7E67FECD8BB1AAD7831206928036056CED68F23F8C61DE81850A2E3FA67FE473AA8A2520B8E859133CE0EDC4598DF781
31,477,005 UART: [art] SIG.S = 3D4D2620688F816F57766EA89E830B40E775AE5F9F07EE8010D443D5072AC22046FB3E6127932BFA0C963E3C50E84393
32,782,104 UART: Caliptra RT
32,782,803 UART: [state] CFI Enabled
32,944,925 UART: [rt] RT listening for mailbox commands...
32,978,438 UART: [rt]cmd =0x49444543, len=327
32,987,458 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,782,472 ready_for_fw is high
3,783,156 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,847,085 >>> mbox cmd response: success
18,309,727 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,541,948 UART:
23,542,346 UART: Running Caliptra FMC ...
23,543,454 UART:
23,543,609 UART: [state] CFI Enabled
23,613,537 UART: [fht] FMC Alias Private Key: 7
25,951,542 UART: [art] Extend RT PCRs Done
25,952,770 UART: [art] Lock RT PCRs Done
25,954,589 UART: [art] Populate DV Done
25,959,822 UART: [fht] FMC Alias Private Key: 7
25,961,369 UART: [art] Derive CDI
25,962,184 UART: [art] Store in in slot 0x4
26,023,205 UART: [art] Derive Key Pair
26,024,248 UART: [art] Store priv key in slot 0x5
29,317,556 UART: [art] Derive Key Pair - Done
29,330,336 UART: [art] Signing Cert with AUTHO
29,331,645 UART: RITY.KEYID = 7
31,619,052 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,562 UART: [art] PUB.X = 1A05DA6592C6D989CB4CB48EB71F73DEE06B0F02BE2B0C5E7EE991B35FDD13D285CF871008078C461918B985F381F49B
31,627,801 UART: [art] PUB.Y = 6F2AEC5CA5F1C7E7845FAA4B4596533727DD8F5C8C0B82AC44387111C993AE2026887D918FE8904FC28326BF75EF4BAF
31,635,014 UART: [art] SIG.R = F480BAB0FF00742DF7DC4B71FBC164E55F92DCDBA5C4D60FFE3CB08FB9BB78AD20E0D57B61AC7EF2DE74985728F53502
31,642,431 UART: [art] SIG.S = AD30557D9D570F4A72E7464DFD9CC36520F494E83D1A30A24AC96EC9F4908AF22F389674B25C01F82406CABAA55AC82F
32,948,040 UART: Caliptra RT
32,948,756 UART: [state] CFI Enabled
33,110,361 UART: [rt] RT listening for mailbox commands...
33,144,090 UART: [rt]cmd =0x49444543, len=327
33,153,012 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,435 UART:
192,796 UART: Running Caliptra ROM ...
193,981 UART:
603,607 UART: [state] CFI Enabled
621,214 UART: [state] LifecycleState = Unprovisioned
623,195 UART: [state] DebugLocked = No
625,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,936 UART: [kat] SHA2-256
800,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,251 UART: [kat] ++
811,717 UART: [kat] sha1
823,507 UART: [kat] SHA2-256
826,227 UART: [kat] SHA2-384
831,787 UART: [kat] SHA2-512-ACC
834,147 UART: [kat] ECC-384
3,118,417 UART: [kat] HMAC-384Kdf
3,130,215 UART: [kat] LMS
4,320,360 UART: [kat] --
4,325,840 UART: [cold-reset] ++
4,326,993 UART: [fht] Storing FHT @ 0x50003400
4,337,827 UART: [idev] ++
4,338,387 UART: [idev] CDI.KEYID = 6
4,339,362 UART: [idev] SUBJECT.KEYID = 7
4,340,596 UART: [idev] UDS.KEYID = 0
4,341,557 ready_for_fw is high
4,341,750 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,439 UART: [idev] Erasing UDS.KEYID = 0
7,630,062 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,492 UART: [idev] --
7,655,861 UART: [ldev] ++
7,656,425 UART: [ldev] CDI.KEYID = 6
7,657,402 UART: [ldev] SUBJECT.KEYID = 5
7,658,609 UART: [ldev] AUTHORITY.KEYID = 7
7,659,835 UART: [ldev] FE.KEYID = 1
7,671,508 UART: [ldev] Erasing FE.KEYID = 1
10,963,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,691 UART: [ldev] --
13,322,157 UART: [fwproc] Waiting for Commands...
13,324,616 UART: [fwproc] Received command 0x46574c44
13,326,788 UART: [fwproc] Received Image of size 114124 bytes
17,378,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,895 >>> mbox cmd response: success
18,299,997 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,301,314 UART: [afmc] ++
18,301,877 UART: [afmc] CDI.KEYID = 6
18,302,866 UART: [afmc] SUBJECT.KEYID = 7
18,303,982 UART: [afmc] AUTHORITY.KEYID = 5
21,155,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,227 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,500 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,873 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,707 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,102 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,141 UART: [afmc] --
23,519,963 UART: [cold-reset] --
23,524,092 UART: [state] Locking Datavault
23,529,882 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,633 UART: [state] Locking ICCM
23,534,161 UART: [exit] Launching FMC @ 0x40000130
23,542,520 UART:
23,542,752 UART: Running Caliptra FMC ...
23,543,848 UART:
23,544,005 UART: [state] CFI Enabled
23,551,785 UART: [fht] FMC Alias Private Key: 7
25,882,438 UART: [art] Extend RT PCRs Done
25,883,707 UART: [art] Lock RT PCRs Done
25,885,093 UART: [art] Populate DV Done
25,890,300 UART: [fht] FMC Alias Private Key: 7
25,891,834 UART: [art] Derive CDI
25,892,562 UART: [art] Store in in slot 0x4
25,935,041 UART: [art] Derive Key Pair
25,936,087 UART: [art] Store priv key in slot 0x5
29,177,448 UART: [art] Derive Key Pair - Done
29,190,447 UART: [art] Signing Cert with AUTHO
29,191,778 UART: RITY.KEYID = 7
31,471,098 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,610 UART: [art] PUB.X = C3C0475E0981D6BC2C3C53EB6A412811EF340507EF7676597FD3A4ED0472B0D956B20021C54442298FE3256DC69FCCCE
31,479,849 UART: [art] PUB.Y = 8A3B71AE00277E544A927BC2E427E957B1AFE96E3F53EEA68D033E953BEC48909C83A0EF8C00D1E90EBD6E8C356A95D8
31,487,072 UART: [art] SIG.R = 58D36475D3869B2C81424338299102FDE8F6B750F3423F0FEFF8783964B08CFA6D672CAAFFF13172217473C42E4EFD0E
31,494,453 UART: [art] SIG.S = 7D81D9BE55A32F5EC35C5FB5F625588E0F378BC95ACB95B98F94A99AC20C2BB945B68EC3E1BC09878FAFF6AA5AA68290
32,800,063 UART: Caliptra RT
32,800,772 UART: [state] CFI Enabled
32,918,370 UART: [rt] RT listening for mailbox commands...
32,952,472 UART: [rt]cmd =0x49444543, len=327
32,961,550 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,128,633 ready_for_fw is high
4,129,294 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,698 >>> mbox cmd response: success
18,540,453 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,717,081 UART:
23,717,535 UART: Running Caliptra FMC ...
23,718,635 UART:
23,718,789 UART: [state] CFI Enabled
23,727,048 UART: [fht] FMC Alias Private Key: 7
26,058,407 UART: [art] Extend RT PCRs Done
26,059,640 UART: [art] Lock RT PCRs Done
26,061,405 UART: [art] Populate DV Done
26,066,903 UART: [fht] FMC Alias Private Key: 7
26,068,615 UART: [art] Derive CDI
26,069,431 UART: [art] Store in in slot 0x4
26,112,346 UART: [art] Derive Key Pair
26,113,341 UART: [art] Store priv key in slot 0x5
29,355,659 UART: [art] Derive Key Pair - Done
29,368,817 UART: [art] Signing Cert with AUTHO
29,370,120 UART: RITY.KEYID = 7
31,649,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,165 UART: [art] PUB.X = 5D1BE0428AE2CEAB298BED1BFCC7E683A7D447044C7B7EAAD9006C3D3A31A04D9FFC15E65EB3405365FAE7C46271C1B9
31,658,420 UART: [art] PUB.Y = EE3C9E9036B3C81DC73FBEEA883CD2CB00DA79F2DE34A3599A036458900ACDB32FFB0137C024BB91DF6CC07D93DBD691
31,665,691 UART: [art] SIG.R = C9E02DCF82448ADF06B2A55AEF29492E193B61FFB0497F574FE90EAB432CAC7C05E730E3B0A876DDD842E2D3150DBE1A
31,673,091 UART: [art] SIG.S = AE16599A3547B61EFD93615FB0DB8CF25AFA98D9CCFDD6E520519A1A1CA9757091E14BE0EB296FC7B453B6BB649BFDC2
32,978,590 UART: Caliptra RT
32,979,310 UART: [state] CFI Enabled
33,097,367 UART: [rt] RT listening for mailbox commands...
33,131,060 UART: [rt]cmd =0x49444543, len=327
33,140,009 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
191,975 UART:
192,368 UART: Running Caliptra ROM ...
193,573 UART:
193,724 UART: [state] CFI Enabled
263,679 UART: [state] LifecycleState = Unprovisioned
265,598 UART: [state] DebugLocked = No
268,058 UART: [state] WD Timer not started. Device not locked for debugging
271,589 UART: [kat] SHA2-256
450,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,297 UART: [kat] ++
462,744 UART: [kat] sha1
474,890 UART: [kat] SHA2-256
477,960 UART: [kat] SHA2-384
485,510 UART: [kat] SHA2-512-ACC
488,518 UART: [kat] ECC-384
2,950,078 UART: [kat] HMAC-384Kdf
2,972,345 UART: [kat] LMS
3,501,802 UART: [kat] --
3,505,227 UART: [cold-reset] ++
3,506,868 UART: [fht] FHT @ 0x50003400
3,516,569 UART: [idev] ++
3,517,127 UART: [idev] CDI.KEYID = 6
3,518,079 UART: [idev] SUBJECT.KEYID = 7
3,519,249 UART: [idev] UDS.KEYID = 0
3,520,226 ready_for_fw is high
3,520,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,329 UART: [idev] Erasing UDS.KEYID = 0
6,025,790 UART: [idev] Sha1 KeyId Algorithm
6,049,771 UART: [idev] --
6,053,818 UART: [ldev] ++
6,054,391 UART: [ldev] CDI.KEYID = 6
6,055,283 UART: [ldev] SUBJECT.KEYID = 5
6,056,441 UART: [ldev] AUTHORITY.KEYID = 7
6,057,746 UART: [ldev] FE.KEYID = 1
6,101,471 UART: [ldev] Erasing FE.KEYID = 1
8,603,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,560 UART: [ldev] --
10,414,781 UART: [fwproc] Wait for Commands...
10,416,351 UART: [fwproc] Recv command 0x46574c44
10,418,456 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,910 >>> mbox cmd response: success
14,736,790 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,737,907 UART: [afmc] ++
14,738,428 UART: [afmc] CDI.KEYID = 6
14,739,333 UART: [afmc] SUBJECT.KEYID = 7
14,740,450 UART: [afmc] AUTHORITY.KEYID = 5
16,829,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,457 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,388 UART: [afmc] --
18,628,449 UART: [cold-reset] --
18,633,391 UART: [state] Locking Datavault
18,637,881 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,579 UART: [state] Locking ICCM
18,641,134 UART: [exit] Launching FMC @ 0x40000130
18,649,527 UART:
18,649,769 UART: Running Caliptra FMC ...
18,650,888 UART:
18,651,058 UART: [state] CFI Enabled
18,710,471 UART: [fht] FMC Alias Private Key: 7
20,474,729 UART: [art] Extend RT PCRs Done
20,475,949 UART: [art] Lock RT PCRs Done
20,477,796 UART: [art] Populate DV Done
20,483,095 UART: [fht] FMC Alias Private Key: 7
20,484,793 UART: [art] Derive CDI
20,485,606 UART: [art] Store in in slot 0x4
20,542,950 UART: [art] Derive Key Pair
20,543,990 UART: [art] Store priv key in slot 0x5
23,006,534 UART: [art] Derive Key Pair - Done
23,019,532 UART: [art] Signing Cert with AUTHO
23,020,836 UART: RITY.KEYID = 7
24,732,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,510 UART: [art] PUB.X = 246AA3D0EFFE15646642F75FAE6774C754B272063B306FADB2C02E493268F2D56368E5CC4501825ACA4554EBF8F144FA
24,740,824 UART: [art] PUB.Y = 221C99A7893FB9F035D9D06716F60CA17ED4F4EF853E0DA55A142988BF9AF5DEE785F5E365A5F9BC183CAC5302D5AED5
24,748,058 UART: [art] SIG.R = A3B2F82E1441BDDC8AB17FD426037C12E06D90A96B0DDE429CCBDBAECD0F133801B355896B3ED3909FA9BD5B5922B17B
24,755,498 UART: [art] SIG.S = 46931A2B8AAB031D46E618381F1522B29A769B3812E5556AC69DE39F5065C40793CE8AF89AD38EC3412438EC6EACC348
25,734,515 UART: Caliptra RT
25,735,217 UART: [state] CFI Enabled
25,898,480 UART: [rt] RT listening for mailbox commands...
25,932,481 UART: [rt]cmd =0x49444543, len=327
25,941,553 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,382,310 ready_for_fw is high
3,382,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,437 >>> mbox cmd response: success
14,529,375 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,344,773 UART:
18,345,173 UART: Running Caliptra FMC ...
18,346,352 UART:
18,346,527 UART: [state] CFI Enabled
18,414,770 UART: [fht] FMC Alias Private Key: 7
20,179,055 UART: [art] Extend RT PCRs Done
20,180,278 UART: [art] Lock RT PCRs Done
20,181,852 UART: [art] Populate DV Done
20,187,420 UART: [fht] FMC Alias Private Key: 7
20,189,117 UART: [art] Derive CDI
20,189,943 UART: [art] Store in in slot 0x4
20,247,497 UART: [art] Derive Key Pair
20,248,497 UART: [art] Store priv key in slot 0x5
22,711,532 UART: [art] Derive Key Pair - Done
22,724,365 UART: [art] Signing Cert with AUTHO
22,725,693 UART: RITY.KEYID = 7
24,437,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,445 UART: [art] PUB.X = F1FBE6CB658701F48645AE0B539FBA7206B86E1F591156A3429A7F52215C3983911FA6E70C237633433DD964EF150670
24,446,719 UART: [art] PUB.Y = DD2867D49FE68722861F68C89D570F024182826AB5B08B626A3FF5F291001FF42DB97E1E283FD31C6A959F2C3930CD88
24,453,926 UART: [art] SIG.R = 5ED2CB8A5A3E027EA036FCAB0D41C33B2CD6D4CB2403E09300FF0D79B3A094289EDA0069C3BD7E309A78C07DA4DA5BD4
24,461,289 UART: [art] SIG.S = DA7AB0D85A88E26D7C9646D7B039FE26BA31E47E390711B20BC9F69E3AEE1063AFC65D811FDAB2771E07173B8CE608AF
25,440,673 UART: Caliptra RT
25,441,377 UART: [state] CFI Enabled
25,606,599 UART: [rt] RT listening for mailbox commands...
25,640,112 UART: [rt]cmd =0x49444543, len=327
25,649,241 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,396 UART:
192,766 UART: Running Caliptra ROM ...
193,866 UART:
603,386 UART: [state] CFI Enabled
616,204 UART: [state] LifecycleState = Unprovisioned
618,087 UART: [state] DebugLocked = No
619,333 UART: [state] WD Timer not started. Device not locked for debugging
622,865 UART: [kat] SHA2-256
801,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,542 UART: [kat] ++
814,071 UART: [kat] sha1
824,760 UART: [kat] SHA2-256
827,800 UART: [kat] SHA2-384
834,877 UART: [kat] SHA2-512-ACC
837,808 UART: [kat] ECC-384
3,277,839 UART: [kat] HMAC-384Kdf
3,290,347 UART: [kat] LMS
3,819,857 UART: [kat] --
3,823,135 UART: [cold-reset] ++
3,825,413 UART: [fht] FHT @ 0x50003400
3,836,031 UART: [idev] ++
3,836,589 UART: [idev] CDI.KEYID = 6
3,837,491 UART: [idev] SUBJECT.KEYID = 7
3,838,719 UART: [idev] UDS.KEYID = 0
3,839,633 ready_for_fw is high
3,839,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,530 UART: [idev] Erasing UDS.KEYID = 0
6,312,662 UART: [idev] Sha1 KeyId Algorithm
6,334,159 UART: [idev] --
6,338,270 UART: [ldev] ++
6,338,833 UART: [ldev] CDI.KEYID = 6
6,339,733 UART: [ldev] SUBJECT.KEYID = 5
6,340,938 UART: [ldev] AUTHORITY.KEYID = 7
6,342,160 UART: [ldev] FE.KEYID = 1
6,352,403 UART: [ldev] Erasing FE.KEYID = 1
8,827,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,562 UART: [ldev] --
10,620,034 UART: [fwproc] Wait for Commands...
10,623,102 UART: [fwproc] Recv command 0x46574c44
10,625,188 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,034 >>> mbox cmd response: success
14,955,913 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,957,002 UART: [afmc] ++
14,957,519 UART: [afmc] CDI.KEYID = 6
14,958,392 UART: [afmc] SUBJECT.KEYID = 7
14,959,504 UART: [afmc] AUTHORITY.KEYID = 5
16,998,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,955 UART: [afmc] --
18,794,867 UART: [cold-reset] --
18,799,418 UART: [state] Locking Datavault
18,804,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,478 UART: [state] Locking ICCM
18,808,517 UART: [exit] Launching FMC @ 0x40000130
18,816,959 UART:
18,817,183 UART: Running Caliptra FMC ...
18,818,275 UART:
18,818,430 UART: [state] CFI Enabled
18,826,490 UART: [fht] FMC Alias Private Key: 7
20,582,938 UART: [art] Extend RT PCRs Done
20,584,162 UART: [art] Lock RT PCRs Done
20,585,894 UART: [art] Populate DV Done
20,591,512 UART: [fht] FMC Alias Private Key: 7
20,593,201 UART: [art] Derive CDI
20,594,005 UART: [art] Store in in slot 0x4
20,636,755 UART: [art] Derive Key Pair
20,637,741 UART: [art] Store priv key in slot 0x5
23,064,677 UART: [art] Derive Key Pair - Done
23,077,536 UART: [art] Signing Cert with AUTHO
23,078,842 UART: RITY.KEYID = 7
24,784,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,018 UART: [art] PUB.X = 0A46D291623DC1ACDAB641D2B042FE4DA3FB520D57DB57DC7872EE311BC2B1F4B20487C1494CE263DB184D7589F2D92F
24,793,308 UART: [art] PUB.Y = FF6659E5281CA63F73E24464D99ED989782AC9E11A8D6C42905D15920F785E717BA045AA27276CF93EE27CEAD90973DD
24,800,532 UART: [art] SIG.R = 4BFC4A10DFA47B4789F0A4D2C14FC996741937DCBE3B462C06ABC299F9BE4254EA06FB99951C6E78D9C1874D9EE194E9
24,807,965 UART: [art] SIG.S = AB9BC8E0A80BD603AFD9AE493B896461BA623570C75E610A9B0E79F6040E671968E921ADF2F3E063E02A5EF80709B146
25,786,832 UART: Caliptra RT
25,787,539 UART: [state] CFI Enabled
25,904,383 UART: [rt] RT listening for mailbox commands...
25,938,220 UART: [rt]cmd =0x49444543, len=327
25,947,154 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,692,374 ready_for_fw is high
3,692,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,445 >>> mbox cmd response: success
14,734,444 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,521,039 UART:
18,521,460 UART: Running Caliptra FMC ...
18,522,557 UART:
18,522,703 UART: [state] CFI Enabled
18,530,299 UART: [fht] FMC Alias Private Key: 7
20,287,443 UART: [art] Extend RT PCRs Done
20,288,686 UART: [art] Lock RT PCRs Done
20,290,067 UART: [art] Populate DV Done
20,295,462 UART: [fht] FMC Alias Private Key: 7
20,296,942 UART: [art] Derive CDI
20,297,669 UART: [art] Store in in slot 0x4
20,340,313 UART: [art] Derive Key Pair
20,341,351 UART: [art] Store priv key in slot 0x5
22,768,224 UART: [art] Derive Key Pair - Done
22,781,541 UART: [art] Signing Cert with AUTHO
22,782,833 UART: RITY.KEYID = 7
24,488,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,038 UART: [art] PUB.X = 680C4A02299902415B83877239B6C7A19D4283EC52295BFC9B2F3DE6291DC2EFF919FEA1A82F9B753E75C14FEE09392C
24,497,334 UART: [art] PUB.Y = 0BBA2D36C359B4D3F3116432BA0B415EC88377CFCCA1056A3FB0AD0AA5645C8A9CF116378F87F0E7D30D38C2B2AD020D
24,504,584 UART: [art] SIG.R = A198CCD4E4ABDA64A584E66A028E19AA1613A4FE714236D3AFC00C27BC19B720163FE09DE82258DBCFDBFD01F6506883
24,512,034 UART: [art] SIG.S = 2FFE7840147D611EC745896C8EA0D33F18F5661ABC2E4F68C162A9458B021D4E6AA4C8D8D410DA9593C09C8FA88DCD2C
25,490,373 UART: Caliptra RT
25,491,103 UART: [state] CFI Enabled
25,608,885 UART: [rt] RT listening for mailbox commands...
25,642,631 UART: [rt]cmd =0x49444543, len=327
25,651,521 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,210 UART:
192,572 UART: Running Caliptra ROM ...
193,771 UART:
193,925 UART: [state] CFI Enabled
264,621 UART: [state] LifecycleState = Unprovisioned
267,025 UART: [state] DebugLocked = No
268,650 UART: [state] WD Timer not started. Device not locked for debugging
272,681 UART: [kat] SHA2-256
462,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,298 UART: [kat] ++
473,748 UART: [kat] sha1
484,758 UART: [kat] SHA2-256
487,829 UART: [kat] SHA2-384
493,537 UART: [kat] SHA2-512-ACC
496,114 UART: [kat] ECC-384
2,950,654 UART: [kat] HMAC-384Kdf
2,973,432 UART: [kat] LMS
3,505,225 UART: [kat] --
3,510,585 UART: [cold-reset] ++
3,512,941 UART: [fht] FHT @ 0x50003400
3,524,519 UART: [idev] ++
3,525,224 UART: [idev] CDI.KEYID = 6
3,526,126 UART: [idev] SUBJECT.KEYID = 7
3,527,369 UART: [idev] UDS.KEYID = 0
3,528,272 ready_for_fw is high
3,528,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,472 UART: [idev] Erasing UDS.KEYID = 0
6,051,440 UART: [idev] Sha1 KeyId Algorithm
6,072,876 UART: [idev] --
6,079,280 UART: [ldev] ++
6,079,971 UART: [ldev] CDI.KEYID = 6
6,080,889 UART: [ldev] SUBJECT.KEYID = 5
6,082,051 UART: [ldev] AUTHORITY.KEYID = 7
6,083,289 UART: [ldev] FE.KEYID = 1
6,123,209 UART: [ldev] Erasing FE.KEYID = 1
8,627,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,894 UART: [ldev] --
10,434,731 UART: [fwproc] Wait for Commands...
10,436,338 UART: [fwproc] Recv command 0x46574c44
10,438,642 UART: [fwproc] Recv'd Img size: 114448 bytes
13,886,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,967,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,083,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,627,603 >>> mbox cmd response: success
15,089,168 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,090,229 UART: [afmc] ++
15,090,749 UART: [afmc] CDI.KEYID = 6
15,091,635 UART: [afmc] SUBJECT.KEYID = 7
15,092,656 UART: [afmc] AUTHORITY.KEYID = 5
17,175,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,919,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,921,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,936,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,951,670 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,966,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,990,634 UART: [afmc] --
18,993,596 UART: [cold-reset] --
18,997,948 UART: [state] Locking Datavault
19,004,606 UART: [state] Locking PCR0, PCR1 and PCR31
19,006,757 UART: [state] Locking ICCM
19,008,485 UART: [exit] Launching FMC @ 0x40000130
19,017,109 UART:
19,017,343 UART: Running Caliptra FMC ...
19,018,439 UART:
19,018,602 UART: [state] CFI Enabled
19,077,096 UART: [fht] FMC Alias Private Key: 7
20,840,972 UART: [art] Extend RT PCRs Done
20,842,194 UART: [art] Lock RT PCRs Done
20,844,109 UART: [art] Populate DV Done
20,849,689 UART: [fht] FMC Alias Private Key: 7
20,851,280 UART: [art] Derive CDI
20,852,018 UART: [art] Store in in slot 0x4
20,909,473 UART: [art] Derive Key Pair
20,910,506 UART: [art] Store priv key in slot 0x5
23,373,668 UART: [art] Derive Key Pair - Done
23,387,087 UART: [art] Signing Cert with AUTHO
23,388,390 UART: RITY.KEYID = 7
25,099,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,390 UART: [art] PUB.X = A0D9C08C37F2ED419AF61DEA953D6AF161755E2421FF217F7584A006E04E99FCB1C4F69ACD2DF0A37787B549E85B7354
25,108,627 UART: [art] PUB.Y = DF28103E0CB07C774292FD1AEF1FC8850E6817D91ED5D8DA6E044420A1230F006B2B5854F01A68B43B807349AA25C576
25,115,879 UART: [art] SIG.R = EB3334F1DA1A148FFAEFC9A43E965A025D9AA78E739AF065CAD7E5756D424251AF590A0B4E12B24507F2FF383B807A21
25,123,325 UART: [art] SIG.S = 6385D61F84BCFFF50082575DEBB4929630FEAC0248C8AE0B15BAB10B875384B164391D24BFA3584DE3B2CA00EBDB3FF2
26,101,914 UART: Caliptra RT
26,102,617 UART: [state] CFI Enabled
26,266,870 UART: [rt] RT listening for mailbox commands...
26,300,554 UART: [rt]cmd =0x49444543, len=327
26,309,659 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,418,260 ready_for_fw is high
3,418,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,723,236 >>> mbox cmd response: success
15,184,069 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,010,738 UART:
19,011,151 UART: Running Caliptra FMC ...
19,012,252 UART:
19,012,412 UART: [state] CFI Enabled
19,076,725 UART: [fht] FMC Alias Private Key: 7
20,840,506 UART: [art] Extend RT PCRs Done
20,841,730 UART: [art] Lock RT PCRs Done
20,843,509 UART: [art] Populate DV Done
20,848,580 UART: [fht] FMC Alias Private Key: 7
20,850,060 UART: [art] Derive CDI
20,850,840 UART: [art] Store in in slot 0x4
20,909,153 UART: [art] Derive Key Pair
20,910,152 UART: [art] Store priv key in slot 0x5
23,373,448 UART: [art] Derive Key Pair - Done
23,386,169 UART: [art] Signing Cert with AUTHO
23,387,474 UART: RITY.KEYID = 7
25,099,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,069 UART: [art] PUB.X = BC8C93774880849EE0BC4ED587987D5B33B8DB0F8371B4DE987F6F78FA3E527E2363C4FD10BB57537BA3C610E6BDA943
25,108,326 UART: [art] PUB.Y = 9A3C06B9677D309532C7F377B5E71B3F046F258E50CBB206781F53E75C13F379E2C9B4D3A46688E6C5D1C69D67E111FE
25,115,588 UART: [art] SIG.R = A87B5C8BFB5474D67768ECF88A28D943733F25857B44E660CF7E7F3A0398140FC9F02CF5B49515AC7A82B3399D3BFE46
25,122,977 UART: [art] SIG.S = 6FFFF5D972F9552E50B03FAAE6DD5695002FFDB22F39F59C2E66D01DEB399D459B7015379DD33C8E11F22FAA53DF89A4
26,101,809 UART: Caliptra RT
26,102,532 UART: [state] CFI Enabled
26,268,361 UART: [rt] RT listening for mailbox commands...
26,302,103 UART: [rt]cmd =0x49444543, len=327
26,311,184 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,340 UART:
192,701 UART: Running Caliptra ROM ...
193,829 UART:
603,350 UART: [state] CFI Enabled
617,791 UART: [state] LifecycleState = Unprovisioned
620,206 UART: [state] DebugLocked = No
622,504 UART: [state] WD Timer not started. Device not locked for debugging
627,247 UART: [kat] SHA2-256
817,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,927 UART: [kat] ++
828,476 UART: [kat] sha1
839,629 UART: [kat] SHA2-256
842,632 UART: [kat] SHA2-384
850,035 UART: [kat] SHA2-512-ACC
852,632 UART: [kat] ECC-384
3,297,847 UART: [kat] HMAC-384Kdf
3,310,847 UART: [kat] LMS
3,842,670 UART: [kat] --
3,846,181 UART: [cold-reset] ++
3,848,252 UART: [fht] FHT @ 0x50003400
3,860,853 UART: [idev] ++
3,861,489 UART: [idev] CDI.KEYID = 6
3,862,514 UART: [idev] SUBJECT.KEYID = 7
3,863,680 UART: [idev] UDS.KEYID = 0
3,864,774 ready_for_fw is high
3,864,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,648 UART: [idev] Erasing UDS.KEYID = 0
6,342,396 UART: [idev] Sha1 KeyId Algorithm
6,365,390 UART: [idev] --
6,370,091 UART: [ldev] ++
6,370,849 UART: [ldev] CDI.KEYID = 6
6,371,758 UART: [ldev] SUBJECT.KEYID = 5
6,372,905 UART: [ldev] AUTHORITY.KEYID = 7
6,374,128 UART: [ldev] FE.KEYID = 1
6,385,629 UART: [ldev] Erasing FE.KEYID = 1
8,862,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,689 UART: [ldev] --
10,655,784 UART: [fwproc] Wait for Commands...
10,657,432 UART: [fwproc] Recv command 0x46574c44
10,659,730 UART: [fwproc] Recv'd Img size: 114448 bytes
14,111,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,645 >>> mbox cmd response: success
15,310,197 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,311,251 UART: [afmc] ++
15,311,770 UART: [afmc] CDI.KEYID = 6
15,312,745 UART: [afmc] SUBJECT.KEYID = 7
15,313,853 UART: [afmc] AUTHORITY.KEYID = 5
17,353,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,356 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,770 UART: [afmc] --
19,150,219 UART: [cold-reset] --
19,154,683 UART: [state] Locking Datavault
19,160,198 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,394 UART: [state] Locking ICCM
19,164,545 UART: [exit] Launching FMC @ 0x40000130
19,173,212 UART:
19,173,442 UART: Running Caliptra FMC ...
19,174,464 UART:
19,174,602 UART: [state] CFI Enabled
19,182,613 UART: [fht] FMC Alias Private Key: 7
20,939,958 UART: [art] Extend RT PCRs Done
20,941,189 UART: [art] Lock RT PCRs Done
20,942,787 UART: [art] Populate DV Done
20,948,253 UART: [fht] FMC Alias Private Key: 7
20,949,786 UART: [art] Derive CDI
20,950,543 UART: [art] Store in in slot 0x4
20,993,490 UART: [art] Derive Key Pair
20,994,521 UART: [art] Store priv key in slot 0x5
23,421,428 UART: [art] Derive Key Pair - Done
23,434,586 UART: [art] Signing Cert with AUTHO
23,435,901 UART: RITY.KEYID = 7
25,141,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,592 UART: [art] PUB.X = 9ACA7839D9A7954C354C95493A7ADF1006A794B470DA8F3E1406592E63A19F2340C486972DBEDA04C66DB4E315FE34D8
25,149,858 UART: [art] PUB.Y = 2CE04E2FB2682C1329A9E8C26919FCB349391EB7E954CAFB126D29D362982B60B78E16EB3E21A0C7CBFA97E32106CBDB
25,157,085 UART: [art] SIG.R = 82A44008F4D412E85755B47C262BD7D16486890E572E3BB3E29E089B97201E6212959CA730481E5CBF1D5E15434A8D47
25,164,476 UART: [art] SIG.S = 6EA23C29C6BC37F6CBB01D3B72D01B1AE6C1B50583CEFE424F426B07853C1AFAA12F73D1900556796693EEAE720206E1
26,143,934 UART: Caliptra RT
26,144,621 UART: [state] CFI Enabled
26,261,629 UART: [rt] RT listening for mailbox commands...
26,295,300 UART: [rt]cmd =0x49444543, len=327
26,304,222 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,759,126 ready_for_fw is high
3,759,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,970,104 >>> mbox cmd response: success
15,435,097 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,227,004 UART:
19,227,434 UART: Running Caliptra FMC ...
19,228,553 UART:
19,228,711 UART: [state] CFI Enabled
19,236,579 UART: [fht] FMC Alias Private Key: 7
20,994,340 UART: [art] Extend RT PCRs Done
20,995,576 UART: [art] Lock RT PCRs Done
20,997,203 UART: [art] Populate DV Done
21,002,429 UART: [fht] FMC Alias Private Key: 7
21,004,025 UART: [art] Derive CDI
21,004,842 UART: [art] Store in in slot 0x4
21,047,442 UART: [art] Derive Key Pair
21,048,477 UART: [art] Store priv key in slot 0x5
23,474,737 UART: [art] Derive Key Pair - Done
23,488,061 UART: [art] Signing Cert with AUTHO
23,489,364 UART: RITY.KEYID = 7
25,194,780 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,287 UART: [art] PUB.X = 99C7F6C90D3B8CAF519D44DF3191DADD0CC37C624BF1A1971E96D2EFF9267630A02C15056DDB32FE2A75496B9B472943
25,203,597 UART: [art] PUB.Y = AFC3B696C28987F31E19EF415DEF545A0CF974607014B80C9BD4149B16B3FC7D1FF0AFCFDB01133E46FDB97F777C252E
25,210,827 UART: [art] SIG.R = 89567CEA59DDD3A8A6EEB39810C8E211BCEBE5E32D773F96BABEC598B546E890EB227D98E646A809EB200CA274E3F73F
25,218,276 UART: [art] SIG.S = 3EE2A2F61FCE25C6B989647839D6CD9687BF65E14CEF3BC90BEA878CED4292088CD296483FEBEC49CAC265057D04B50B
26,196,771 UART: Caliptra RT
26,197,456 UART: [state] CFI Enabled
26,314,598 UART: [rt] RT listening for mailbox commands...
26,348,373 UART: [rt]cmd =0x49444543, len=327
26,357,560 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,932 UART: [kat] LMS
1,475,128 UART: [kat] --
1,476,015 UART: [cold-reset] ++
1,476,505 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,480,425 ready_for_fw is high
1,480,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,505,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,389 UART: [ldev] ++
1,515,557 UART: [ldev] CDI.KEYID = 6
1,515,920 UART: [ldev] SUBJECT.KEYID = 5
1,516,346 UART: [ldev] AUTHORITY.KEYID = 7
1,516,809 UART: [ldev] FE.KEYID = 1
1,522,039 UART: [ldev] Erasing FE.KEYID = 1
1,547,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,900 UART: [ldev] --
1,587,337 UART: [fwproc] Waiting for Commands...
1,588,136 UART: [fwproc] Received command 0x46574c44
1,588,927 UART: [fwproc] Received Image of size 114448 bytes
2,887,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,724 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,073 >>> mbox cmd response: success
3,080,073 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,081,141 UART: [afmc] ++
3,081,309 UART: [afmc] CDI.KEYID = 6
3,081,671 UART: [afmc] SUBJECT.KEYID = 7
3,082,096 UART: [afmc] AUTHORITY.KEYID = 5
3,117,511 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,407 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,800 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,490 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,337 UART: [afmc] --
3,160,269 UART: [cold-reset] --
3,161,277 UART: [state] Locking Datavault
3,162,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,080 UART: [state] Locking ICCM
3,163,630 UART: [exit] Launching FMC @ 0x40000130
3,168,959 UART:
3,168,975 UART: Running Caliptra FMC ...
3,169,383 UART:
3,169,437 UART: [state] CFI Enabled
3,179,972 UART: [fht] FMC Alias Private Key: 7
3,287,969 UART: [art] Extend RT PCRs Done
3,288,397 UART: [art] Lock RT PCRs Done
3,289,935 UART: [art] Populate DV Done
3,298,234 UART: [fht] FMC Alias Private Key: 7
3,299,328 UART: [art] Derive CDI
3,299,608 UART: [art] Store in in slot 0x4
3,385,691 UART: [art] Derive Key Pair
3,386,051 UART: [art] Store priv key in slot 0x5
3,399,027 UART: [art] Derive Key Pair - Done
3,413,723 UART: [art] Signing Cert with AUTHO
3,414,203 UART: RITY.KEYID = 7
3,429,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,236 UART: [art] PUB.X = 79541E067752481E48FAEEFC09F59CC9F4665159B2F9A54F77173B23C602B6B83144CD15C44C4AB5BF468614172DE7BC
3,436,999 UART: [art] PUB.Y = 285B92F91348AEA8C4337190BA5D2CE69013C2238DC959CD0B8B0D7325AF71E9FE18FC2EFA0AA82A8EB8D6A3C81383AF
3,443,956 UART: [art] SIG.R = 5803E566C3D18400203F704862A8906F687DCD5C050763B929487F1DF388F2781C43851D125440362302B8BDC02B6860
3,450,674 UART: [art] SIG.S = A2BAFD3CBF694F416E479FDBDF10A3F749CAE3EA896E7043BA92035C7E9CE73FFBC0EAFC22E5C02EB527977D33BB27EB
3,474,236 UART: Caliptra RT
3,474,489 UART: [state] CFI Enabled
3,582,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,091 UART: [rt]cmd =0x49444543, len=327
3,623,611 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,523 >>> mbox cmd response: success
2,929,523 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,457 UART:
2,990,473 UART: Running Caliptra FMC ...
2,990,881 UART:
2,990,935 UART: [state] CFI Enabled
3,001,624 UART: [fht] FMC Alias Private Key: 7
3,109,765 UART: [art] Extend RT PCRs Done
3,110,193 UART: [art] Lock RT PCRs Done
3,111,387 UART: [art] Populate DV Done
3,119,622 UART: [fht] FMC Alias Private Key: 7
3,120,732 UART: [art] Derive CDI
3,121,012 UART: [art] Store in in slot 0x4
3,206,651 UART: [art] Derive Key Pair
3,207,011 UART: [art] Store priv key in slot 0x5
3,220,575 UART: [art] Derive Key Pair - Done
3,235,312 UART: [art] Signing Cert with AUTHO
3,235,792 UART: RITY.KEYID = 7
3,250,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,693 UART: [art] PUB.X = 066B72992C505D857F66CCF554B7B48EEA96D7A4BDB6C3A05F8AB123019170FC87E7A8689045234B7B8406C44CAB6333
3,258,456 UART: [art] PUB.Y = CAABD0843A7976F6AA42CA3F790BC4AC28600E5DFC8C384C4DA00D844BA9EE8D9072C95BBBFC1E79CBAD9EACF558B617
3,265,427 UART: [art] SIG.R = CA8322D505B855724A1C9D80C5A89EEE836ED32CB2927189FBE3C065A638DF3C16364BFA8B204DE627360B7E0DB1471B
3,272,196 UART: [art] SIG.S = 7FCFC523BD600E4162C7A3F318752CD5EABCD3AB3CA86411201D6002F324D4EC2146B3CD6A8B754CF8479A7175783C38
3,296,053 UART: Caliptra RT
3,296,306 UART: [state] CFI Enabled
3,405,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,612 UART: [rt]cmd =0x49444543, len=327
3,446,103 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,018 UART: [kat] SHA2-256
881,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,064 UART: [kat] ++
886,216 UART: [kat] sha1
890,432 UART: [kat] SHA2-256
892,370 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
907,071 UART: [kat] LMS
1,475,267 UART: [kat] --
1,476,010 UART: [cold-reset] ++
1,476,562 UART: [fht] Storing FHT @ 0x50003400
1,479,149 UART: [idev] ++
1,479,317 UART: [idev] CDI.KEYID = 6
1,479,677 UART: [idev] SUBJECT.KEYID = 7
1,480,101 UART: [idev] UDS.KEYID = 0
1,480,446 ready_for_fw is high
1,480,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,479 UART: [idev] Erasing UDS.KEYID = 0
1,505,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,871 UART: [idev] --
1,514,972 UART: [ldev] ++
1,515,140 UART: [ldev] CDI.KEYID = 6
1,515,503 UART: [ldev] SUBJECT.KEYID = 5
1,515,929 UART: [ldev] AUTHORITY.KEYID = 7
1,516,392 UART: [ldev] FE.KEYID = 1
1,521,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,799 UART: [ldev] --
1,587,164 UART: [fwproc] Waiting for Commands...
1,587,855 UART: [fwproc] Received command 0x46574c44
1,588,646 UART: [fwproc] Received Image of size 114448 bytes
2,888,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,344 >>> mbox cmd response: success
3,081,344 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,082,556 UART: [afmc] ++
3,082,724 UART: [afmc] CDI.KEYID = 6
3,083,086 UART: [afmc] SUBJECT.KEYID = 7
3,083,511 UART: [afmc] AUTHORITY.KEYID = 5
3,118,862 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,475 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,165 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,062 UART: [afmc] --
3,162,060 UART: [cold-reset] --
3,162,822 UART: [state] Locking Datavault
3,163,999 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,603 UART: [state] Locking ICCM
3,165,067 UART: [exit] Launching FMC @ 0x40000130
3,170,396 UART:
3,170,412 UART: Running Caliptra FMC ...
3,170,820 UART:
3,170,963 UART: [state] CFI Enabled
3,181,238 UART: [fht] FMC Alias Private Key: 7
3,289,397 UART: [art] Extend RT PCRs Done
3,289,825 UART: [art] Lock RT PCRs Done
3,291,737 UART: [art] Populate DV Done
3,300,168 UART: [fht] FMC Alias Private Key: 7
3,301,252 UART: [art] Derive CDI
3,301,532 UART: [art] Store in in slot 0x4
3,386,915 UART: [art] Derive Key Pair
3,387,275 UART: [art] Store priv key in slot 0x5
3,400,275 UART: [art] Derive Key Pair - Done
3,414,875 UART: [art] Signing Cert with AUTHO
3,415,355 UART: RITY.KEYID = 7
3,430,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,980 UART: [art] PUB.X = C61FE8564E85FE99CF99C83480CAF971A4048B5141ED55C3AD35082281B0E0496DB8FAABD30C422D906EB8B800D271C2
3,437,727 UART: [art] PUB.Y = B2FCBEFA0D494771EA78D06DD6BFFE1142AF107176707FACA25A9669499A2DCE4FE47CA76F77A8A6B3AE8CCD70B5D441
3,444,698 UART: [art] SIG.R = 2E05DC83F3B92D65184AF089D7C8F9ACBED803EDE13792439E9214026F2B1AF2B16394EF15815820D268BA2C480AF63F
3,451,462 UART: [art] SIG.S = 294294112B98BF16E38480E8D6E6E6EE289B112376F12E860752845D1E318D5A2C675F59BF6B6771C2DE1E7259C2C7A2
3,475,464 UART: Caliptra RT
3,475,809 UART: [state] CFI Enabled
3,584,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,874 UART: [rt]cmd =0x49444543, len=327
3,625,208 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,062 ready_for_fw is high
1,362,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,972 >>> mbox cmd response: success
2,929,972 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,991,838 UART:
2,991,854 UART: Running Caliptra FMC ...
2,992,262 UART:
2,992,405 UART: [state] CFI Enabled
3,003,176 UART: [fht] FMC Alias Private Key: 7
3,110,597 UART: [art] Extend RT PCRs Done
3,111,025 UART: [art] Lock RT PCRs Done
3,112,677 UART: [art] Populate DV Done
3,120,886 UART: [fht] FMC Alias Private Key: 7
3,122,006 UART: [art] Derive CDI
3,122,286 UART: [art] Store in in slot 0x4
3,207,661 UART: [art] Derive Key Pair
3,208,021 UART: [art] Store priv key in slot 0x5
3,221,717 UART: [art] Derive Key Pair - Done
3,236,414 UART: [art] Signing Cert with AUTHO
3,236,894 UART: RITY.KEYID = 7
3,252,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,867 UART: [art] PUB.X = 0ABD28AF8F27F95960FEB9B5AA5BF7C053E22C1DC905B3DE2C159FC986582E9E2D7F87938BB69CAB82A8BC7AB687E158
3,259,651 UART: [art] PUB.Y = B0F623CCAC5B3FFF662BA9DB10E5B13750771C07A6F529CE9960849235A10F0D755829BB46280CE45259290C23C5CD78
3,266,588 UART: [art] SIG.R = 1C0341926D07528C44B593E7185A7AB39C485FDDB1C71D4AF35ACC2881D00CE9F1039D37DBF356FAB94F795FA6A19026
3,273,354 UART: [art] SIG.S = 2503CEAB7D968EA29C162BAA0E4B939A95DADE5D7412199845BC7854FD6EFDDA3576E2F9FBBB659105A3C2846F7BB758
3,297,342 UART: Caliptra RT
3,297,687 UART: [state] CFI Enabled
3,405,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,000 UART: [rt]cmd =0x49444543, len=327
3,446,470 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,861 UART: [cold-reset] ++
1,172,389 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 ready_for_fw is high
1,176,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,329 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,217,117 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,758 UART: [fwproc] Wait for Commands...
1,283,476 UART: [fwproc] Recv command 0x46574c44
1,284,204 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,474 >>> mbox cmd response: success
2,776,474 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,777,548 UART: [afmc] ++
2,777,716 UART: [afmc] CDI.KEYID = 6
2,778,078 UART: [afmc] SUBJECT.KEYID = 7
2,778,503 UART: [afmc] AUTHORITY.KEYID = 5
2,814,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,295 UART: [afmc] --
2,857,279 UART: [cold-reset] --
2,858,197 UART: [state] Locking Datavault
2,859,342 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,946 UART: [state] Locking ICCM
2,860,436 UART: [exit] Launching FMC @ 0x40000130
2,865,765 UART:
2,865,781 UART: Running Caliptra FMC ...
2,866,189 UART:
2,866,243 UART: [state] CFI Enabled
2,876,870 UART: [fht] FMC Alias Private Key: 7
2,984,339 UART: [art] Extend RT PCRs Done
2,984,767 UART: [art] Lock RT PCRs Done
2,986,023 UART: [art] Populate DV Done
2,994,140 UART: [fht] FMC Alias Private Key: 7
2,995,320 UART: [art] Derive CDI
2,995,600 UART: [art] Store in in slot 0x4
3,081,643 UART: [art] Derive Key Pair
3,082,003 UART: [art] Store priv key in slot 0x5
3,094,897 UART: [art] Derive Key Pair - Done
3,109,717 UART: [art] Signing Cert with AUTHO
3,110,197 UART: RITY.KEYID = 7
3,125,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,300 UART: [art] PUB.X = A775A31977946A06919EA4747A7508C1D79BC0E2C26FD602F249D2EC2C11A4913B4818242FE76E2E07E1DBEA737B8849
3,133,058 UART: [art] PUB.Y = 6E0B7526EB554312A7E927F10EBB49FF0B0E675C03AFB36C677D0008DB4308567B5BF443EE897D0A89440A59C0137A42
3,139,961 UART: [art] SIG.R = D9BED96276A69DE72CF1607F6695D124160DE33ED47A077819AB1897FAD606612A9DBCE5894C0CFEFAEE7B4F8A085B76
3,146,730 UART: [art] SIG.S = 9310F1C8D0BB17542AE515AB6FC7C66FABD32A740974EB43AFF6BB47FBDA0AC208AF90C1B4FFBA6CF3129DEFAF80DD2D
3,170,444 UART: Caliptra RT
3,170,697 UART: [state] CFI Enabled
3,278,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,788 UART: [rt]cmd =0x49444543, len=327
3,319,309 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,373 ready_for_fw is high
1,059,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,615 >>> mbox cmd response: success
2,626,615 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,688,399 UART:
2,688,415 UART: Running Caliptra FMC ...
2,688,823 UART:
2,688,877 UART: [state] CFI Enabled
2,699,190 UART: [fht] FMC Alias Private Key: 7
2,807,099 UART: [art] Extend RT PCRs Done
2,807,527 UART: [art] Lock RT PCRs Done
2,808,723 UART: [art] Populate DV Done
2,817,048 UART: [fht] FMC Alias Private Key: 7
2,818,158 UART: [art] Derive CDI
2,818,438 UART: [art] Store in in slot 0x4
2,904,319 UART: [art] Derive Key Pair
2,904,679 UART: [art] Store priv key in slot 0x5
2,917,535 UART: [art] Derive Key Pair - Done
2,932,569 UART: [art] Signing Cert with AUTHO
2,933,049 UART: RITY.KEYID = 7
2,948,263 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,028 UART: [art] PUB.X = D50A681AEC21D71E7B1E373799BF3E78561E42F7187985B4568205999E37363850CDEA90C70491A3EAB9722B004424B8
2,955,759 UART: [art] PUB.Y = 8563A11D19B77EDF281A7282C8DFCF3D20F3CC3DB98183D639EDEA1C59C4567FBC1C8D507F8A255E99D53497D555D167
2,962,719 UART: [art] SIG.R = C0E6720F5DD09BC02C3381F10A3AFADBCA169BE7465FE4E699D8EDDFE84A9352B7711F398D6807396F2F2D66413B4600
2,969,468 UART: [art] SIG.S = 532796D86D65FAEF58A3ECFB849B6C2EFA99E37E264D9A49771DB00081FACC5981621A4C0B374F5603F101783CACEC2F
2,993,096 UART: Caliptra RT
2,993,349 UART: [state] CFI Enabled
3,101,178 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,627 UART: [rt]cmd =0x49444543, len=327
3,142,094 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,605 UART: [kat] SHA2-512-ACC
908,506 UART: [kat] ECC-384
918,127 UART: [kat] HMAC-384Kdf
922,579 UART: [kat] LMS
1,170,907 UART: [kat] --
1,171,928 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,174,977 UART: [idev] ++
1,175,145 UART: [idev] CDI.KEYID = 6
1,175,505 UART: [idev] SUBJECT.KEYID = 7
1,175,929 UART: [idev] UDS.KEYID = 0
1,176,274 ready_for_fw is high
1,176,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,407 UART: [idev] Erasing UDS.KEYID = 0
1,200,588 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,178 UART: [ldev] ++
1,210,346 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,135 UART: [ldev] AUTHORITY.KEYID = 7
1,211,598 UART: [ldev] FE.KEYID = 1
1,217,050 UART: [ldev] Erasing FE.KEYID = 1
1,242,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,550 UART: [ldev] --
1,282,019 UART: [fwproc] Wait for Commands...
1,282,761 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,991 >>> mbox cmd response: success
2,776,991 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,778,045 UART: [afmc] ++
2,778,213 UART: [afmc] CDI.KEYID = 6
2,778,575 UART: [afmc] SUBJECT.KEYID = 7
2,779,000 UART: [afmc] AUTHORITY.KEYID = 5
2,813,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,970 UART: [afmc] --
2,856,848 UART: [cold-reset] --
2,857,706 UART: [state] Locking Datavault
2,858,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,575 UART: [state] Locking ICCM
2,860,001 UART: [exit] Launching FMC @ 0x40000130
2,865,330 UART:
2,865,346 UART: Running Caliptra FMC ...
2,865,754 UART:
2,865,897 UART: [state] CFI Enabled
2,876,610 UART: [fht] FMC Alias Private Key: 7
2,984,301 UART: [art] Extend RT PCRs Done
2,984,729 UART: [art] Lock RT PCRs Done
2,986,175 UART: [art] Populate DV Done
2,994,442 UART: [fht] FMC Alias Private Key: 7
2,995,492 UART: [art] Derive CDI
2,995,772 UART: [art] Store in in slot 0x4
3,081,087 UART: [art] Derive Key Pair
3,081,447 UART: [art] Store priv key in slot 0x5
3,094,669 UART: [art] Derive Key Pair - Done
3,109,782 UART: [art] Signing Cert with AUTHO
3,110,262 UART: RITY.KEYID = 7
3,125,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,151 UART: [art] PUB.X = C98ECC95DA7E44153216A08574EAE2C8F40989BA478B9E1AFBEDEAE9D0FE8E4B7C4E2F1A649F99D843CDCA5D63691E63
3,132,940 UART: [art] PUB.Y = 4A396E92C26F07C76403D599CBE072417719463E5D7FE4150B3635FF6575318B0000001FC7AA466F5E206C0EBBC03076
3,139,806 UART: [art] SIG.R = 1F3EA818B108F7E7568C644F1792883F8F7EA9C6A946DF49F8C332B84A4AB086A3B8DF5081848A1881591E3C0E23D5F9
3,146,572 UART: [art] SIG.S = 308DA3EF938C09190DB287ACFFE51F6459D497D730AD51B5D819267EEC2FCD834FA03C30A30A1376803F2E5D93BC803A
3,171,154 UART: Caliptra RT
3,171,499 UART: [state] CFI Enabled
3,279,564 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,087 UART: [rt]cmd =0x49444543, len=327
3,320,614 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,246 ready_for_fw is high
1,061,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,284 >>> mbox cmd response: success
2,627,284 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,689,658 UART:
2,689,674 UART: Running Caliptra FMC ...
2,690,082 UART:
2,690,225 UART: [state] CFI Enabled
2,700,914 UART: [fht] FMC Alias Private Key: 7
2,808,941 UART: [art] Extend RT PCRs Done
2,809,369 UART: [art] Lock RT PCRs Done
2,811,079 UART: [art] Populate DV Done
2,819,572 UART: [fht] FMC Alias Private Key: 7
2,820,558 UART: [art] Derive CDI
2,820,838 UART: [art] Store in in slot 0x4
2,906,767 UART: [art] Derive Key Pair
2,907,127 UART: [art] Store priv key in slot 0x5
2,920,379 UART: [art] Derive Key Pair - Done
2,935,160 UART: [art] Signing Cert with AUTHO
2,935,640 UART: RITY.KEYID = 7
2,951,014 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,779 UART: [art] PUB.X = F1E0092195DA4406559CC0F707618BEAB240832F2E17D5B0DF1E4F4A7C3FC989758D642CEBEB0EF398881C5B01E40DDA
2,958,543 UART: [art] PUB.Y = 31611B53454D47092FF33C336B61223EEEEA6294BDCF9A7BA23A60A134BD3EBC4B0F76C5C3F2F243D3BE60C107C4F8BC
2,965,500 UART: [art] SIG.R = A288975A11AEC0111E9F7C9B7A46BADDEDE33EA62595C780B86E4236FD08B16B94C4D261E9AA5B6DF02D2F3E83ED68DE
2,972,287 UART: [art] SIG.S = B3300DA768A23D3AE0271DA56C81E3922D0F4454E26875A5DBD9794E2C0EB0535335D9AFD88E582FFD9A56F65AAA3F57
2,996,199 UART: Caliptra RT
2,996,544 UART: [state] CFI Enabled
3,104,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,763 UART: [rt]cmd =0x49444543, len=327
3,145,128 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,171,015 UART: [fht] FHT @ 0x50003400
1,173,531 UART: [idev] ++
1,173,699 UART: [idev] CDI.KEYID = 6
1,174,060 UART: [idev] SUBJECT.KEYID = 7
1,174,485 UART: [idev] UDS.KEYID = 0
1,174,831 ready_for_fw is high
1,174,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,559 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,193 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,215,782 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,110 UART: [ldev] --
1,281,528 UART: [fwproc] Wait for Commands...
1,282,101 UART: [fwproc] Recv command 0x46574c44
1,282,834 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,780 >>> mbox cmd response: success
2,773,780 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,797 UART: [afmc] ++
2,774,965 UART: [afmc] CDI.KEYID = 6
2,775,328 UART: [afmc] SUBJECT.KEYID = 7
2,775,754 UART: [afmc] AUTHORITY.KEYID = 5
2,811,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,392 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,111 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,974 UART: [afmc] --
2,854,990 UART: [cold-reset] --
2,855,750 UART: [state] Locking Datavault
2,857,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,629 UART: [state] Locking ICCM
2,858,161 UART: [exit] Launching FMC @ 0x40000130
2,863,490 UART:
2,863,506 UART: Running Caliptra FMC ...
2,863,914 UART:
2,863,968 UART: [state] CFI Enabled
2,874,599 UART: [fht] FMC Alias Private Key: 7
2,983,140 UART: [art] Extend RT PCRs Done
2,983,568 UART: [art] Lock RT PCRs Done
2,985,176 UART: [art] Populate DV Done
2,993,627 UART: [fht] FMC Alias Private Key: 7
2,994,771 UART: [art] Derive CDI
2,995,051 UART: [art] Store in in slot 0x4
3,080,790 UART: [art] Derive Key Pair
3,081,150 UART: [art] Store priv key in slot 0x5
3,093,872 UART: [art] Derive Key Pair - Done
3,108,597 UART: [art] Signing Cert with AUTHO
3,109,077 UART: RITY.KEYID = 7
3,124,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,922 UART: [art] PUB.X = 29FB8B83BDA958A267F06D98FE2C8153B900B87C1D5BD52C75B45E475805BFB0995DCA958C17123E8A4A28A98437EA5B
3,131,675 UART: [art] PUB.Y = 2388DF22BFB07A785F8255EB5658B63B0579B34A2844B262D617560652D93D478FE9D8540227C0B0D436023B844A6C6D
3,138,605 UART: [art] SIG.R = 57FB55D0816AE0CBB66C7F36BF74CEEDC155FD5745BF101F2AC80FE6968156B16273693FF9CD6D6444C1ED7A253C6D37
3,145,386 UART: [art] SIG.S = 0278DE736E28F553C61E121DFCCD89205E6CDE623D9F8767CF8B1C77333D5B89979C9FC5E6BB65F2C2CC4BA290C908CA
3,169,061 UART: Caliptra RT
3,169,314 UART: [state] CFI Enabled
3,277,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,690 UART: [rt]cmd =0x49444543, len=327
3,318,184 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,952 ready_for_fw is high
1,055,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,734 >>> mbox cmd response: success
2,624,734 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,686,590 UART:
2,686,606 UART: Running Caliptra FMC ...
2,687,014 UART:
2,687,068 UART: [state] CFI Enabled
2,697,715 UART: [fht] FMC Alias Private Key: 7
2,805,830 UART: [art] Extend RT PCRs Done
2,806,258 UART: [art] Lock RT PCRs Done
2,807,822 UART: [art] Populate DV Done
2,815,931 UART: [fht] FMC Alias Private Key: 7
2,817,009 UART: [art] Derive CDI
2,817,289 UART: [art] Store in in slot 0x4
2,903,122 UART: [art] Derive Key Pair
2,903,482 UART: [art] Store priv key in slot 0x5
2,916,234 UART: [art] Derive Key Pair - Done
2,931,048 UART: [art] Signing Cert with AUTHO
2,931,528 UART: RITY.KEYID = 7
2,946,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,657 UART: [art] PUB.X = F2E8F2E45F564BD85258EC8718A24C67D21BEB2F558B03E047F2DE0FC9D910BE178AA6068DEF50E64FC13821270F7424
2,954,423 UART: [art] PUB.Y = B6B6C5782F09DF08A94A7BB12E156EA1898A3CED97F42E7255BF3F2DEC40AEFB20F687509234C3DFD86FE64924AB7A04
2,961,380 UART: [art] SIG.R = 90696E97810B92CCE32FA842944A4DC1F068A3E542C956A4FBA573F4118AB1D92F44F45527837959A360286804B66367
2,968,134 UART: [art] SIG.S = 95C1FE0F4A6B8253CF0044D1EBB5B0D912FE9C42C989FEF4A2E29C073DA60A4E843696B027420124F6F56317F639871B
2,991,473 UART: Caliptra RT
2,991,726 UART: [state] CFI Enabled
3,099,162 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,923 UART: [rt]cmd =0x49444543, len=327
3,140,533 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
917,027 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,972 UART: [idev] --
1,209,003 UART: [ldev] ++
1,209,171 UART: [ldev] CDI.KEYID = 6
1,209,535 UART: [ldev] SUBJECT.KEYID = 5
1,209,962 UART: [ldev] AUTHORITY.KEYID = 7
1,210,425 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,675 UART: [ldev] --
1,280,989 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,813 >>> mbox cmd response: success
2,774,813 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,776,032 UART: [afmc] ++
2,776,200 UART: [afmc] CDI.KEYID = 6
2,776,563 UART: [afmc] SUBJECT.KEYID = 7
2,776,989 UART: [afmc] AUTHORITY.KEYID = 5
2,812,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,417 UART: [afmc] --
2,856,529 UART: [cold-reset] --
2,857,353 UART: [state] Locking Datavault
2,858,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,302 UART: [state] Locking ICCM
2,859,728 UART: [exit] Launching FMC @ 0x40000130
2,865,057 UART:
2,865,073 UART: Running Caliptra FMC ...
2,865,481 UART:
2,865,624 UART: [state] CFI Enabled
2,876,001 UART: [fht] FMC Alias Private Key: 7
2,983,918 UART: [art] Extend RT PCRs Done
2,984,346 UART: [art] Lock RT PCRs Done
2,985,676 UART: [art] Populate DV Done
2,993,909 UART: [fht] FMC Alias Private Key: 7
2,994,843 UART: [art] Derive CDI
2,995,123 UART: [art] Store in in slot 0x4
3,080,892 UART: [art] Derive Key Pair
3,081,252 UART: [art] Store priv key in slot 0x5
3,094,524 UART: [art] Derive Key Pair - Done
3,109,630 UART: [art] Signing Cert with AUTHO
3,110,110 UART: RITY.KEYID = 7
3,125,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,589 UART: [art] PUB.X = 0EAB4A3EE999A5B0C0987C581DFC67BD67789D0993BA446043F307F69BD1A6866139C46068937B78FEAE8631E290079D
3,133,347 UART: [art] PUB.Y = 38859529E951DB61A78FC83EBE8F80716E35E5192A3B51DB0172B3D6E102859F7C459718264D00B6AF3B4603AF5EF11E
3,140,266 UART: [art] SIG.R = 7D1B2B392710EDC5BFE98971EF78801AD8EE2F321AE8A3D62094874579C1518566D2224B826419A6AA9519157A5DF095
3,147,032 UART: [art] SIG.S = 7B36953E709F6B4512985BFA9AE31D49EBC04CE03DC15E58E01E7E0CBDFA23AE143EFA1C7DF65D7A20CD92B225040860
3,170,282 UART: Caliptra RT
3,170,627 UART: [state] CFI Enabled
3,277,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,199 UART: [rt]cmd =0x49444543, len=327
3,318,398 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,147 ready_for_fw is high
1,057,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,423 >>> mbox cmd response: success
2,626,423 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,689,025 UART:
2,689,041 UART: Running Caliptra FMC ...
2,689,449 UART:
2,689,592 UART: [state] CFI Enabled
2,700,475 UART: [fht] FMC Alias Private Key: 7
2,808,766 UART: [art] Extend RT PCRs Done
2,809,194 UART: [art] Lock RT PCRs Done
2,810,624 UART: [art] Populate DV Done
2,818,871 UART: [fht] FMC Alias Private Key: 7
2,819,803 UART: [art] Derive CDI
2,820,083 UART: [art] Store in in slot 0x4
2,905,578 UART: [art] Derive Key Pair
2,905,938 UART: [art] Store priv key in slot 0x5
2,919,242 UART: [art] Derive Key Pair - Done
2,933,983 UART: [art] Signing Cert with AUTHO
2,934,463 UART: RITY.KEYID = 7
2,949,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,520 UART: [art] PUB.X = 0DD44423F851CF9887640888B421A1EEFDE46D7C24E01E4C4C195FA35F2CC03E8FF054A30F230154BE03BA21384C69C8
2,957,281 UART: [art] PUB.Y = C84EB394841477B05534010890A89ADB1FEEDC13B604003CFB102D1B3313F013172C11B68971B0E45631C968E59A155C
2,964,194 UART: [art] SIG.R = 7695FBC753DE288D389635A2915D1509633EA3AB2E2BA3E15BD52B2D4F0AE9AC5EDA086A15475D632EA851E922F3124C
2,970,963 UART: [art] SIG.S = 9040E4F3822303723DA71884B5D136C4F92B7F9AB7CC5727D51B77E7C92D12768B76EA599409CF52957AF7161B6F1ECC
2,995,090 UART: Caliptra RT
2,995,435 UART: [state] CFI Enabled
3,102,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,335 UART: [rt]cmd =0x49444543, len=327
3,143,720 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,061 UART:
192,415 UART: Running Caliptra ROM ...
193,606 UART:
193,784 UART: [state] CFI Enabled
263,454 UART: [state] LifecycleState = Unprovisioned
265,442 UART: [state] DebugLocked = No
267,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,480 UART: [kat] SHA2-256
442,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,694 UART: [kat] ++
453,187 UART: [kat] sha1
464,276 UART: [kat] SHA2-256
466,999 UART: [kat] SHA2-384
471,853 UART: [kat] SHA2-512-ACC
474,220 UART: [kat] ECC-384
2,767,405 UART: [kat] HMAC-384Kdf
2,800,172 UART: [kat] LMS
3,990,501 UART: [kat] --
3,995,547 UART: [cold-reset] ++
3,996,969 UART: [fht] Storing FHT @ 0x50003400
4,009,033 UART: [idev] ++
4,009,605 UART: [idev] CDI.KEYID = 6
4,010,576 UART: [idev] SUBJECT.KEYID = 7
4,011,818 UART: [idev] UDS.KEYID = 0
4,012,801 ready_for_fw is high
4,013,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,619 UART: [idev] Erasing UDS.KEYID = 0
7,344,867 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,192 UART: [idev] --
7,371,122 UART: [ldev] ++
7,371,705 UART: [ldev] CDI.KEYID = 6
7,372,634 UART: [ldev] SUBJECT.KEYID = 5
7,373,843 UART: [ldev] AUTHORITY.KEYID = 7
7,375,126 UART: [ldev] FE.KEYID = 1
7,421,708 UART: [ldev] Erasing FE.KEYID = 1
10,757,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,431 UART: [ldev] --
13,135,696 UART: [fwproc] Waiting for Commands...
13,138,605 UART: [fwproc] Received command 0x46574c44
13,140,783 UART: [fwproc] Received Image of size 114124 bytes
17,191,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,655,260 >>> mbox cmd response: success
17,655,787 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,659,384 UART: [afmc] ++
17,659,980 UART: [afmc] CDI.KEYID = 6
17,660,883 UART: [afmc] SUBJECT.KEYID = 7
17,662,100 UART: [afmc] AUTHORITY.KEYID = 5
21,027,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,836 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,222 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,058 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,492 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,315 UART: [afmc] --
23,395,695 UART: [cold-reset] --
23,399,607 UART: [state] Locking Datavault
23,404,476 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,228 UART: [state] Locking ICCM
23,408,380 UART: [exit] Launching FMC @ 0x40000130
23,416,770 UART:
23,417,012 UART: Running Caliptra FMC ...
23,418,132 UART:
23,418,295 UART: [state] CFI Enabled
23,485,816 UART: [fht] FMC Alias Private Key: 7
25,823,713 UART: [art] Extend RT PCRs Done
25,824,934 UART: [art] Lock RT PCRs Done
25,826,610 UART: [art] Populate DV Done
25,832,290 UART: [fht] FMC Alias Private Key: 7
25,833,924 UART: [art] Derive CDI
25,834,696 UART: [art] Store in in slot 0x4
25,893,495 UART: [art] Derive Key Pair
25,894,496 UART: [art] Store priv key in slot 0x5
29,187,538 UART: [art] Derive Key Pair - Done
29,200,517 UART: [art] Signing Cert with AUTHO
29,201,853 UART: RITY.KEYID = 7
31,488,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,106 UART: [art] PUB.X = 66668CDE24789637C41C436D3F63F7B095C1C1CCBE704DEF92029A746F000D423A4DE28143C2AC66B07BE7626B2DD411
31,497,322 UART: [art] PUB.Y = 16430DFE7234A8DFA6FD08D540DE0206B75AF246515F4B5317C1ABA326935AEFD5482D5BCDE5BCF640328A001AD8C478
31,504,563 UART: [art] SIG.R = BEB576C68511383DEC6BEF39BEFE02F8D656B531D4211243DC15D6105DCE36CE52912DA555EC00F66927D54B3F3980BF
31,511,967 UART: [art] SIG.S = 233AF7C5E235C639FAC2BE470E68DA6E5298BC3F3A7D745ADBCCD9016AD08099BA2D3E6CA75580F034180577DD283AE4
32,817,438 UART: Caliptra RT
32,818,147 UART: [state] CFI Enabled
32,979,171 UART: [rt] RT listening for mailbox commands...
33,010,476 UART: [rt]cmd =0x4c444556, len=4
33,021,674 >>> mbox cmd response data (687 bytes)
33,063,362 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,093,189 UART: [rt]cmd =0x49444549, len=4
33,096,044 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,998 writing to cptra_bootfsm_go
3,802,094 ready_for_fw is high
3,802,466 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,927 >>> mbox cmd response: success
17,870,546 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,569,914 UART:
23,570,329 UART: Running Caliptra FMC ...
23,571,439 UART:
23,571,597 UART: [state] CFI Enabled
23,635,221 UART: [fht] FMC Alias Private Key: 7
25,973,041 UART: [art] Extend RT PCRs Done
25,974,277 UART: [art] Lock RT PCRs Done
25,975,932 UART: [art] Populate DV Done
25,981,412 UART: [fht] FMC Alias Private Key: 7
25,983,010 UART: [art] Derive CDI
25,983,755 UART: [art] Store in in slot 0x4
26,043,637 UART: [art] Derive Key Pair
26,044,679 UART: [art] Store priv key in slot 0x5
29,337,656 UART: [art] Derive Key Pair - Done
29,350,763 UART: [art] Signing Cert with AUTHO
29,352,073 UART: RITY.KEYID = 7
31,639,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,608 UART: [art] PUB.X = E2E3A6C4579AFEAFD40500A7FE2A577C02BB381D69BB0E46BE98DCF06E2D36DB8CC6772736FCDA88F243798D0438B489
31,647,856 UART: [art] PUB.Y = 8CD240C82C77E4FB39F1125D60E5F994884F568B2E7F49578515608416BE9A9B3EDFEE098BD24602344FF801821DD6F7
31,655,110 UART: [art] SIG.R = 6A6A9065244F65A35CF8994B89C8649F1DE16B2A043BE6BDE2F76F7999EC9D3C44A8B82668CB9E2AFA12F95F7943CD66
31,662,521 UART: [art] SIG.S = 800F6F92824F9B5855D04EA9C76BBFF14701EEF59B7AC911C295436E34AD0229D6EB51B42CCF6C084730BC84895A023D
32,967,572 UART: Caliptra RT
32,968,272 UART: [state] CFI Enabled
33,128,722 UART: [rt] RT listening for mailbox commands...
33,160,081 UART: [rt]cmd =0x4c444556, len=4
33,171,226 >>> mbox cmd response data (687 bytes)
33,212,889 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,242,785 UART: [rt]cmd =0x49444549, len=4
33,245,640 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,556 UART:
192,922 UART: Running Caliptra ROM ...
194,074 UART:
603,906 UART: [state] CFI Enabled
616,717 UART: [state] LifecycleState = Unprovisioned
618,586 UART: [state] DebugLocked = No
620,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,488 UART: [kat] SHA2-256
794,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,754 UART: [kat] ++
805,199 UART: [kat] sha1
816,089 UART: [kat] SHA2-256
818,784 UART: [kat] SHA2-384
825,560 UART: [kat] SHA2-512-ACC
827,920 UART: [kat] ECC-384
3,113,826 UART: [kat] HMAC-384Kdf
3,125,629 UART: [kat] LMS
4,315,745 UART: [kat] --
4,318,796 UART: [cold-reset] ++
4,319,881 UART: [fht] Storing FHT @ 0x50003400
4,332,322 UART: [idev] ++
4,332,925 UART: [idev] CDI.KEYID = 6
4,333,812 UART: [idev] SUBJECT.KEYID = 7
4,335,058 UART: [idev] UDS.KEYID = 0
4,336,062 ready_for_fw is high
4,336,304 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,543 UART: [idev] Erasing UDS.KEYID = 0
7,625,844 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,820 UART: [idev] --
7,652,355 UART: [ldev] ++
7,652,927 UART: [ldev] CDI.KEYID = 6
7,653,939 UART: [ldev] SUBJECT.KEYID = 5
7,655,090 UART: [ldev] AUTHORITY.KEYID = 7
7,656,370 UART: [ldev] FE.KEYID = 1
7,668,685 UART: [ldev] Erasing FE.KEYID = 1
10,952,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,158 UART: [ldev] --
13,312,379 UART: [fwproc] Waiting for Commands...
13,314,469 UART: [fwproc] Received command 0x46574c44
13,316,645 UART: [fwproc] Received Image of size 114124 bytes
17,375,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,194 >>> mbox cmd response: success
17,837,723 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,841,486 UART: [afmc] ++
17,842,128 UART: [afmc] CDI.KEYID = 6
17,843,034 UART: [afmc] SUBJECT.KEYID = 7
17,844,245 UART: [afmc] AUTHORITY.KEYID = 5
21,160,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,980 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,250 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,588 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,454 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,857 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,444 UART: [afmc] --
23,525,595 UART: [cold-reset] --
23,529,657 UART: [state] Locking Datavault
23,535,966 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,721 UART: [state] Locking ICCM
23,539,251 UART: [exit] Launching FMC @ 0x40000130
23,547,637 UART:
23,547,868 UART: Running Caliptra FMC ...
23,548,886 UART:
23,549,025 UART: [state] CFI Enabled
23,557,497 UART: [fht] FMC Alias Private Key: 7
25,888,275 UART: [art] Extend RT PCRs Done
25,889,497 UART: [art] Lock RT PCRs Done
25,891,201 UART: [art] Populate DV Done
25,896,573 UART: [fht] FMC Alias Private Key: 7
25,898,229 UART: [art] Derive CDI
25,899,039 UART: [art] Store in in slot 0x4
25,941,909 UART: [art] Derive Key Pair
25,942,951 UART: [art] Store priv key in slot 0x5
29,185,057 UART: [art] Derive Key Pair - Done
29,198,061 UART: [art] Signing Cert with AUTHO
29,199,370 UART: RITY.KEYID = 7
31,478,550 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,056 UART: [art] PUB.X = 14448A468C93AF01DAC215EF42A53487C8390ADC4AB31CF9383E9CC3564CF495D52B73C58E47A1AF529928105056C033
31,487,295 UART: [art] PUB.Y = C68E66F06C4B74878A2682D72B37395EEFDA926F407B2B050ADBE3B34ABEE05CD1DE5055AD20096C9126C66A0C6696F7
31,494,521 UART: [art] SIG.R = B13BBD9F310DC4A788160809FB451919655B585E24E9D26495B65975407DAE49CDF813251065C8089488522CE8AE698A
31,501,912 UART: [art] SIG.S = DA8651384E7DFC5CD6F52E089DC58424A7957CFE235D7565450EF7E8DB0EB51DDA8F5D004BF2DCB8ADC62DD05626A915
32,807,034 UART: Caliptra RT
32,808,404 UART: [state] CFI Enabled
32,924,951 UART: [rt] RT listening for mailbox commands...
32,956,449 UART: [rt]cmd =0x4c444556, len=4
32,967,596 >>> mbox cmd response data (687 bytes)
33,009,633 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,039,755 UART: [rt]cmd =0x49444549, len=4
33,042,348 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
4,130,758 ready_for_fw is high
4,131,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,261 >>> mbox cmd response: success
18,073,920 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,712,866 UART:
23,713,250 UART: Running Caliptra FMC ...
23,714,359 UART:
23,714,508 UART: [state] CFI Enabled
23,722,318 UART: [fht] FMC Alias Private Key: 7
26,053,560 UART: [art] Extend RT PCRs Done
26,054,790 UART: [art] Lock RT PCRs Done
26,056,229 UART: [art] Populate DV Done
26,061,644 UART: [fht] FMC Alias Private Key: 7
26,063,410 UART: [art] Derive CDI
26,064,222 UART: [art] Store in in slot 0x4
26,106,813 UART: [art] Derive Key Pair
26,107,808 UART: [art] Store priv key in slot 0x5
29,349,149 UART: [art] Derive Key Pair - Done
29,362,142 UART: [art] Signing Cert with AUTHO
29,363,449 UART: RITY.KEYID = 7
31,642,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,501 UART: [art] PUB.X = 44C6BD9DF108D7C7B53272682E6132E17E9B265654D5AE899962F8C2295C9B22F4219F6FBA6FD268C66E743D41D5C972
31,651,696 UART: [art] PUB.Y = B48F4BB204321DBC2E0EB7DFC2394F9386E21E97FDC4B24AAAB6C66D9C874F675B27E2F2E2971820186568881AF196BB
31,658,984 UART: [art] SIG.R = 9905689456D982CBA1B51864353B72233877E96FE0D35C187F085C8020EFFC0E0D10EA5B2F82AB090410AF30BC13D19F
31,666,339 UART: [art] SIG.S = 36BA3DC15550CB3A666F779FC4F1C49F87CF3855B6206E7FF44FE7FCE6371DD97C2229802BD0519330E5FC7ECEF9BCB4
32,971,964 UART: Caliptra RT
32,972,681 UART: [state] CFI Enabled
33,091,057 UART: [rt] RT listening for mailbox commands...
33,122,643 UART: [rt]cmd =0x4c444556, len=4
33,133,679 >>> mbox cmd response data (687 bytes)
33,175,580 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,205,547 UART: [rt]cmd =0x49444549, len=4
33,208,195 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,057 UART:
192,429 UART: Running Caliptra ROM ...
193,559 UART:
193,709 UART: [state] CFI Enabled
262,145 UART: [state] LifecycleState = Unprovisioned
264,089 UART: [state] DebugLocked = No
265,345 UART: [state] WD Timer not started. Device not locked for debugging
268,809 UART: [kat] SHA2-256
447,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,451 UART: [kat] ++
459,982 UART: [kat] sha1
469,446 UART: [kat] SHA2-256
472,452 UART: [kat] SHA2-384
478,100 UART: [kat] SHA2-512-ACC
481,107 UART: [kat] ECC-384
2,926,666 UART: [kat] HMAC-384Kdf
2,950,218 UART: [kat] LMS
3,479,662 UART: [kat] --
3,482,438 UART: [cold-reset] ++
3,484,646 UART: [fht] FHT @ 0x50003400
3,495,694 UART: [idev] ++
3,496,297 UART: [idev] CDI.KEYID = 6
3,497,216 UART: [idev] SUBJECT.KEYID = 7
3,498,388 UART: [idev] UDS.KEYID = 0
3,499,311 ready_for_fw is high
3,499,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,291 UART: [idev] Erasing UDS.KEYID = 0
6,007,133 UART: [idev] Sha1 KeyId Algorithm
6,029,498 UART: [idev] --
6,033,353 UART: [ldev] ++
6,033,925 UART: [ldev] CDI.KEYID = 6
6,034,837 UART: [ldev] SUBJECT.KEYID = 5
6,036,048 UART: [ldev] AUTHORITY.KEYID = 7
6,037,285 UART: [ldev] FE.KEYID = 1
6,078,944 UART: [ldev] Erasing FE.KEYID = 1
8,584,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,849 UART: [ldev] --
10,392,667 UART: [fwproc] Wait for Commands...
10,395,404 UART: [fwproc] Recv command 0x46574c44
10,397,490 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,940 >>> mbox cmd response: success
14,264,478 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,269,090 UART: [afmc] ++
14,269,680 UART: [afmc] CDI.KEYID = 6
14,270,565 UART: [afmc] SUBJECT.KEYID = 7
14,271,777 UART: [afmc] AUTHORITY.KEYID = 5
16,806,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,283 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,338 UART: [afmc] --
18,608,364 UART: [cold-reset] --
18,611,102 UART: [state] Locking Datavault
18,616,249 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,891 UART: [state] Locking ICCM
18,620,692 UART: [exit] Launching FMC @ 0x40000130
18,629,089 UART:
18,629,333 UART: Running Caliptra FMC ...
18,630,435 UART:
18,630,592 UART: [state] CFI Enabled
18,690,329 UART: [fht] FMC Alias Private Key: 7
20,454,591 UART: [art] Extend RT PCRs Done
20,455,818 UART: [art] Lock RT PCRs Done
20,457,661 UART: [art] Populate DV Done
20,463,010 UART: [fht] FMC Alias Private Key: 7
20,464,544 UART: [art] Derive CDI
20,465,356 UART: [art] Store in in slot 0x4
20,523,067 UART: [art] Derive Key Pair
20,524,087 UART: [art] Store priv key in slot 0x5
22,987,598 UART: [art] Derive Key Pair - Done
23,000,908 UART: [art] Signing Cert with AUTHO
23,002,213 UART: RITY.KEYID = 7
24,713,758 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,257 UART: [art] PUB.X = B8587703E75C52AD58BD58D3FB04FE34D1221240BE677B74A8FDD40886F69D022338A16A9A3BEFA56EDD0296902D3640
24,722,552 UART: [art] PUB.Y = 7205C5957135626A9B110B77AB9650C582083F0FE2D202EF0E639A12C0111792885EF75BF7B658E3EAFBE9312149D47F
24,729,787 UART: [art] SIG.R = 6732C56526BBA57BC0401FBC200F8F54043486EDA65E0913EE87243E00E373952F87EE8B96B68118733D7AB479C14B25
24,737,116 UART: [art] SIG.S = 26DE30097B202AB19F85A1C8F8CA12256CE1DCBCD31B4823D3C6EBFF92269E5A8DAA9A83D578269621CFCE4A88447E59
25,716,465 UART: Caliptra RT
25,717,171 UART: [state] CFI Enabled
25,881,995 UART: [rt] RT listening for mailbox commands...
25,913,261 UART: [rt]cmd =0x4c444556, len=4
25,924,484 >>> mbox cmd response data (687 bytes)
25,966,442 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,996,311 UART: [rt]cmd =0x49444549, len=4
25,999,151 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,382,943 ready_for_fw is high
3,383,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,973 >>> mbox cmd response: success
14,072,636 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,366,692 UART:
18,367,084 UART: Running Caliptra FMC ...
18,368,186 UART:
18,368,342 UART: [state] CFI Enabled
18,434,045 UART: [fht] FMC Alias Private Key: 7
20,198,212 UART: [art] Extend RT PCRs Done
20,199,457 UART: [art] Lock RT PCRs Done
20,200,927 UART: [art] Populate DV Done
20,206,235 UART: [fht] FMC Alias Private Key: 7
20,207,879 UART: [art] Derive CDI
20,208,692 UART: [art] Store in in slot 0x4
20,266,296 UART: [art] Derive Key Pair
20,267,335 UART: [art] Store priv key in slot 0x5
22,730,111 UART: [art] Derive Key Pair - Done
22,743,226 UART: [art] Signing Cert with AUTHO
22,744,539 UART: RITY.KEYID = 7
24,455,836 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,344 UART: [art] PUB.X = 20DD0A1F9274E592B6E96BFF1382A5BE378B38647342B1494087725055DC43BC23C001B7C9BE03B30BECA708E01351BD
24,464,601 UART: [art] PUB.Y = 309AEB1E054F02E92BA2E909E510F6D6F2A2F8D8521027DD298F9C05F8181D5A435842ACCE3726E0CBF5EC757EB3C459
24,471,863 UART: [art] SIG.R = B04BE0B8C22387A34EF153B3FFAFDB85369A71110C38EABE54FC4EA9F7A4DA99A27B9B316422BADABAE43A7E4F52C46C
24,479,326 UART: [art] SIG.S = 295420DAEF90D43B7A5041340D3401D20E6214C3DE374D43E72C57BB93576EA7DBB011DDEE6410573A628036C09AFA39
25,458,121 UART: Caliptra RT
25,458,841 UART: [state] CFI Enabled
25,623,396 UART: [rt] RT listening for mailbox commands...
25,654,518 UART: [rt]cmd =0x4c444556, len=4
25,665,743 >>> mbox cmd response data (687 bytes)
25,706,973 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,736,857 UART: [rt]cmd =0x49444549, len=4
25,739,751 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,406 UART:
192,783 UART: Running Caliptra ROM ...
193,934 UART:
603,505 UART: [state] CFI Enabled
613,139 UART: [state] LifecycleState = Unprovisioned
615,047 UART: [state] DebugLocked = No
616,865 UART: [state] WD Timer not started. Device not locked for debugging
620,683 UART: [kat] SHA2-256
799,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,382 UART: [kat] ++
811,912 UART: [kat] sha1
822,286 UART: [kat] SHA2-256
825,346 UART: [kat] SHA2-384
832,101 UART: [kat] SHA2-512-ACC
835,026 UART: [kat] ECC-384
3,276,517 UART: [kat] HMAC-384Kdf
3,289,607 UART: [kat] LMS
3,819,096 UART: [kat] --
3,825,057 UART: [cold-reset] ++
3,827,284 UART: [fht] FHT @ 0x50003400
3,838,112 UART: [idev] ++
3,838,668 UART: [idev] CDI.KEYID = 6
3,839,568 UART: [idev] SUBJECT.KEYID = 7
3,840,805 UART: [idev] UDS.KEYID = 0
3,841,719 ready_for_fw is high
3,841,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,632 UART: [idev] Erasing UDS.KEYID = 0
6,310,857 UART: [idev] Sha1 KeyId Algorithm
6,333,705 UART: [idev] --
6,337,536 UART: [ldev] ++
6,338,095 UART: [ldev] CDI.KEYID = 6
6,338,974 UART: [ldev] SUBJECT.KEYID = 5
6,340,123 UART: [ldev] AUTHORITY.KEYID = 7
6,341,455 UART: [ldev] FE.KEYID = 1
6,352,140 UART: [ldev] Erasing FE.KEYID = 1
8,823,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,610 UART: [ldev] --
10,616,582 UART: [fwproc] Wait for Commands...
10,618,089 UART: [fwproc] Recv command 0x46574c44
10,620,180 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,416 >>> mbox cmd response: success
14,478,930 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,481,866 UART: [afmc] ++
14,482,462 UART: [afmc] CDI.KEYID = 6
14,483,368 UART: [afmc] SUBJECT.KEYID = 7
14,484,577 UART: [afmc] AUTHORITY.KEYID = 5
16,982,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,143 UART: [afmc] --
18,780,026 UART: [cold-reset] --
18,783,457 UART: [state] Locking Datavault
18,788,644 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,279 UART: [state] Locking ICCM
18,791,935 UART: [exit] Launching FMC @ 0x40000130
18,800,377 UART:
18,800,634 UART: Running Caliptra FMC ...
18,801,732 UART:
18,801,883 UART: [state] CFI Enabled
18,810,246 UART: [fht] FMC Alias Private Key: 7
20,566,816 UART: [art] Extend RT PCRs Done
20,568,101 UART: [art] Lock RT PCRs Done
20,569,378 UART: [art] Populate DV Done
20,574,669 UART: [fht] FMC Alias Private Key: 7
20,576,146 UART: [art] Derive CDI
20,576,877 UART: [art] Store in in slot 0x4
20,619,646 UART: [art] Derive Key Pair
20,620,729 UART: [art] Store priv key in slot 0x5
23,047,498 UART: [art] Derive Key Pair - Done
23,060,660 UART: [art] Signing Cert with AUTHO
23,061,964 UART: RITY.KEYID = 7
24,767,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,179 UART: [art] PUB.X = C57A959261D924B79BBF4D1342AD20E40125C2682606CEBB07A4A716A184632F29FACC3FEFEC4016A2CD044486565299
24,776,398 UART: [art] PUB.Y = 47619C131894EB7E8EB366CBC6F4F3DE9E168E5A3C73F5FBA039CB94F74D87DEF1721467D956373F456D59BD6FA87682
24,783,683 UART: [art] SIG.R = C52CE6BF874E34D0C4B7CFF795B2AA57DF0AB8A99174005C7F73E32D4AE7723906632FDF89D44F8D2B79B4E0C9E2F4D0
24,791,008 UART: [art] SIG.S = BF4CCE86AEDD8DF0BD1830179F84D3BD46C31F51337F5C9006A001ACCF0B067D4DD43748983BC067B78D5B940AA0EACC
25,769,933 UART: Caliptra RT
25,770,632 UART: [state] CFI Enabled
25,888,009 UART: [rt] RT listening for mailbox commands...
25,919,284 UART: [rt]cmd =0x4c444556, len=4
25,930,283 >>> mbox cmd response data (687 bytes)
25,972,599 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,002,540 UART: [rt]cmd =0x49444549, len=4
26,005,131 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,987 writing to cptra_bootfsm_go
3,697,544 ready_for_fw is high
3,698,103 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,205 >>> mbox cmd response: success
14,280,869 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,531,880 UART:
18,532,277 UART: Running Caliptra FMC ...
18,533,412 UART:
18,533,561 UART: [state] CFI Enabled
18,541,323 UART: [fht] FMC Alias Private Key: 7
20,298,051 UART: [art] Extend RT PCRs Done
20,299,290 UART: [art] Lock RT PCRs Done
20,300,775 UART: [art] Populate DV Done
20,306,293 UART: [fht] FMC Alias Private Key: 7
20,307,944 UART: [art] Derive CDI
20,308,680 UART: [art] Store in in slot 0x4
20,351,359 UART: [art] Derive Key Pair
20,352,397 UART: [art] Store priv key in slot 0x5
22,779,027 UART: [art] Derive Key Pair - Done
22,791,534 UART: [art] Signing Cert with AUTHO
22,792,838 UART: RITY.KEYID = 7
24,498,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,842 UART: [art] PUB.X = ED558FFC336EC02DFAB7F85226D7C4D04B9FA3F9F5FF0E339627F20FA83E8C2C6D8764ED8E05352ADDA5246E38BC5809
24,507,089 UART: [art] PUB.Y = 98058148B63A902BA11D8E04AE6D8D3924F437FC973419CED2E16932D8DA05DA27A94DB6536D340997FEA9BBAF2832FA
24,514,355 UART: [art] SIG.R = 24ED8EFDF7B1E31582B7E5C657F2EE96F9404BE312BACAAC3C34D7D56B8FA8E7A9FDB2B78838999D3C3FF4E9E7BCE0F0
24,521,799 UART: [art] SIG.S = B4895BEE31D8AAD670003A23DF5D768FF0393CA162E671605131FD430ED0321C76F663436513CDF92CFF2B6211688D24
25,500,477 UART: Caliptra RT
25,501,177 UART: [state] CFI Enabled
25,618,946 UART: [rt] RT listening for mailbox commands...
25,650,409 UART: [rt]cmd =0x4c444556, len=4
25,661,488 >>> mbox cmd response data (687 bytes)
25,703,343 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,733,444 UART: [rt]cmd =0x49444549, len=4
25,736,151 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,090 UART:
192,459 UART: Running Caliptra ROM ...
193,660 UART:
193,815 UART: [state] CFI Enabled
267,199 UART: [state] LifecycleState = Unprovisioned
269,609 UART: [state] DebugLocked = No
271,717 UART: [state] WD Timer not started. Device not locked for debugging
275,830 UART: [kat] SHA2-256
465,742 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,475 UART: [kat] ++
476,949 UART: [kat] sha1
488,036 UART: [kat] SHA2-256
491,059 UART: [kat] SHA2-384
497,618 UART: [kat] SHA2-512-ACC
500,208 UART: [kat] ECC-384
2,948,289 UART: [kat] HMAC-384Kdf
2,973,460 UART: [kat] LMS
3,505,186 UART: [kat] --
3,510,807 UART: [cold-reset] ++
3,511,885 UART: [fht] FHT @ 0x50003400
3,524,350 UART: [idev] ++
3,525,054 UART: [idev] CDI.KEYID = 6
3,526,087 UART: [idev] SUBJECT.KEYID = 7
3,527,194 UART: [idev] UDS.KEYID = 0
3,528,137 ready_for_fw is high
3,528,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,364 UART: [idev] Erasing UDS.KEYID = 0
6,032,478 UART: [idev] Sha1 KeyId Algorithm
6,054,161 UART: [idev] --
6,059,079 UART: [ldev] ++
6,059,764 UART: [ldev] CDI.KEYID = 6
6,060,680 UART: [ldev] SUBJECT.KEYID = 5
6,061,844 UART: [ldev] AUTHORITY.KEYID = 7
6,063,079 UART: [ldev] FE.KEYID = 1
6,101,718 UART: [ldev] Erasing FE.KEYID = 1
8,609,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,870 UART: [ldev] --
10,412,601 UART: [fwproc] Wait for Commands...
10,415,332 UART: [fwproc] Recv command 0x46574c44
10,417,589 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,602,286 >>> mbox cmd response: success
14,602,796 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,605,529 UART: [afmc] ++
14,606,235 UART: [afmc] CDI.KEYID = 6
14,607,430 UART: [afmc] SUBJECT.KEYID = 7
14,608,871 UART: [afmc] AUTHORITY.KEYID = 5
17,149,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,490 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,268 UART: [afmc] --
18,946,768 UART: [cold-reset] --
18,950,910 UART: [state] Locking Datavault
18,956,592 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,784 UART: [state] Locking ICCM
18,961,418 UART: [exit] Launching FMC @ 0x40000130
18,970,089 UART:
18,970,335 UART: Running Caliptra FMC ...
18,971,650 UART:
18,971,817 UART: [state] CFI Enabled
19,031,879 UART: [fht] FMC Alias Private Key: 7
20,796,634 UART: [art] Extend RT PCRs Done
20,797,847 UART: [art] Lock RT PCRs Done
20,799,526 UART: [art] Populate DV Done
20,804,987 UART: [fht] FMC Alias Private Key: 7
20,806,629 UART: [art] Derive CDI
20,807,436 UART: [art] Store in in slot 0x4
20,864,869 UART: [art] Derive Key Pair
20,865,914 UART: [art] Store priv key in slot 0x5
23,328,630 UART: [art] Derive Key Pair - Done
23,341,332 UART: [art] Signing Cert with AUTHO
23,342,632 UART: RITY.KEYID = 7
25,054,990 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,502 UART: [art] PUB.X = 1522A680DC4A639B10917281DBD9F9AB66957673626EAE89234380D275215CCF8000D1BB6F006069D1F4355BBC036DAD
25,063,694 UART: [art] PUB.Y = B4A0013644EF142139ECCA6CB6C8BAAD685CA6DB88017B35B302E4F742FE0AB9C04D34A66EDE4B02B22AACD7B290ED65
25,071,036 UART: [art] SIG.R = 270118B794159CBF051AFD0F74549AE10F12D74CBDB7C59C2A4058D571AA84A3AE6859459344415961B34D3DE5CC164A
25,078,421 UART: [art] SIG.S = 3A94F17493C436DF30EEF773CBCAC05B6E5C067C22D7126923AA7173CFB0D574E80828DF6A7F3DBDF6832FB5AC91516E
26,057,423 UART: Caliptra RT
26,058,115 UART: [state] CFI Enabled
26,223,756 UART: [rt] RT listening for mailbox commands...
26,255,098 UART: [rt]cmd =0x4c444556, len=4
26,266,049 >>> mbox cmd response data (687 bytes)
26,307,957 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,337,767 UART: [rt]cmd =0x49444549, len=4
26,340,764 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,438,016 ready_for_fw is high
3,438,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,855 >>> mbox cmd response: success
14,735,418 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,026,083 UART:
19,026,460 UART: Running Caliptra FMC ...
19,027,562 UART:
19,027,718 UART: [state] CFI Enabled
19,094,572 UART: [fht] FMC Alias Private Key: 7
20,858,884 UART: [art] Extend RT PCRs Done
20,860,100 UART: [art] Lock RT PCRs Done
20,861,673 UART: [art] Populate DV Done
20,867,129 UART: [fht] FMC Alias Private Key: 7
20,868,881 UART: [art] Derive CDI
20,869,625 UART: [art] Store in in slot 0x4
20,927,343 UART: [art] Derive Key Pair
20,928,341 UART: [art] Store priv key in slot 0x5
23,390,815 UART: [art] Derive Key Pair - Done
23,403,699 UART: [art] Signing Cert with AUTHO
23,405,015 UART: RITY.KEYID = 7
25,117,484 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,988 UART: [art] PUB.X = 52F111904B024958CB96C709E0E8AC29B945EBACAA038D1FB3758F7AFD739C412E67B1821E28C76C4F13D098E8399422
25,126,228 UART: [art] PUB.Y = E49E1592386A803D6912B7BAE6C26382B1F0156306B8BED7D4D4DD5989A88FAF860691957AF33A2627C156084A34F196
25,133,479 UART: [art] SIG.R = 25464A80C12837ECC0C6EFCEC3D99FAB6965FEFFE646D3B97DFEC84DBA59573295264216E0401C65B1EAC188F72856CF
25,140,861 UART: [art] SIG.S = 944C859D1BA9F98F840C533412585581EFC37AE02935098195A7BB35186128FC1CB91073597AB93262A54F09F7F1D6E8
26,119,662 UART: Caliptra RT
26,120,345 UART: [state] CFI Enabled
26,286,330 UART: [rt] RT listening for mailbox commands...
26,317,460 UART: [rt]cmd =0x4c444556, len=4
26,328,516 >>> mbox cmd response data (687 bytes)
26,369,922 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,399,855 UART: [rt]cmd =0x49444549, len=4
26,402,803 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,466 UART:
192,819 UART: Running Caliptra ROM ...
194,008 UART:
603,637 UART: [state] CFI Enabled
616,534 UART: [state] LifecycleState = Unprovisioned
618,608 UART: [state] DebugLocked = No
620,354 UART: [state] WD Timer not started. Device not locked for debugging
625,680 UART: [kat] SHA2-256
815,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,309 UART: [kat] ++
826,901 UART: [kat] sha1
837,707 UART: [kat] SHA2-256
840,702 UART: [kat] SHA2-384
846,610 UART: [kat] SHA2-512-ACC
849,182 UART: [kat] ECC-384
3,290,533 UART: [kat] HMAC-384Kdf
3,303,003 UART: [kat] LMS
3,834,882 UART: [kat] --
3,841,214 UART: [cold-reset] ++
3,842,785 UART: [fht] FHT @ 0x50003400
3,854,895 UART: [idev] ++
3,855,529 UART: [idev] CDI.KEYID = 6
3,856,555 UART: [idev] SUBJECT.KEYID = 7
3,857,749 UART: [idev] UDS.KEYID = 0
3,858,938 ready_for_fw is high
3,859,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,933 UART: [idev] Erasing UDS.KEYID = 0
6,338,105 UART: [idev] Sha1 KeyId Algorithm
6,361,067 UART: [idev] --
6,365,813 UART: [ldev] ++
6,366,500 UART: [ldev] CDI.KEYID = 6
6,367,406 UART: [ldev] SUBJECT.KEYID = 5
6,368,610 UART: [ldev] AUTHORITY.KEYID = 7
6,369,834 UART: [ldev] FE.KEYID = 1
6,380,161 UART: [ldev] Erasing FE.KEYID = 1
8,860,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,907 UART: [ldev] --
10,652,730 UART: [fwproc] Wait for Commands...
10,655,895 UART: [fwproc] Recv command 0x46574c44
10,658,195 UART: [fwproc] Recv'd Img size: 114448 bytes
14,108,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,326 >>> mbox cmd response: success
14,845,807 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,849,456 UART: [afmc] ++
14,850,151 UART: [afmc] CDI.KEYID = 6
14,851,391 UART: [afmc] SUBJECT.KEYID = 7
14,852,818 UART: [afmc] AUTHORITY.KEYID = 5
17,357,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,434 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,455 UART: [afmc] --
19,149,881 UART: [cold-reset] --
19,155,411 UART: [state] Locking Datavault
19,160,819 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,007 UART: [state] Locking ICCM
19,165,751 UART: [exit] Launching FMC @ 0x40000130
19,174,428 UART:
19,174,658 UART: Running Caliptra FMC ...
19,175,752 UART:
19,175,903 UART: [state] CFI Enabled
19,183,959 UART: [fht] FMC Alias Private Key: 7
20,940,501 UART: [art] Extend RT PCRs Done
20,941,730 UART: [art] Lock RT PCRs Done
20,943,488 UART: [art] Populate DV Done
20,949,049 UART: [fht] FMC Alias Private Key: 7
20,950,631 UART: [art] Derive CDI
20,951,357 UART: [art] Store in in slot 0x4
20,994,044 UART: [art] Derive Key Pair
20,995,071 UART: [art] Store priv key in slot 0x5
23,421,369 UART: [art] Derive Key Pair - Done
23,434,578 UART: [art] Signing Cert with AUTHO
23,435,886 UART: RITY.KEYID = 7
25,141,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,039 UART: [art] PUB.X = 6E5FEF1D6D238857DE6D90758D1F24D2DEC21DA9D45CCB6721AEEC8705E14525EEDA3026F30AEAF8E1866F44BEE8236D
25,150,322 UART: [art] PUB.Y = CDB72BD764BE8C06202F1CC49B094E781CF5F23E51305650FC6FAA2FA0184B2225211A2C1F89B6D2C5B78966CD456859
25,157,605 UART: [art] SIG.R = BCB6BEF672601EC06216325E38E0D87EAB17839B5015368A6D65CE01E13123D6E53490C40DB18318C5B3FB4CA7401DFF
25,164,989 UART: [art] SIG.S = C0F8FA01FC4411516DECEC1DE43C0DF2D4FFE2299C22E6159498B49A5801CA682FCC1DCD9AD1B9BC911C04B9C2DC142E
26,143,834 UART: Caliptra RT
26,144,571 UART: [state] CFI Enabled
26,262,711 UART: [rt] RT listening for mailbox commands...
26,294,277 UART: [rt]cmd =0x4c444556, len=4
26,305,352 >>> mbox cmd response data (687 bytes)
26,347,323 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,377,415 UART: [rt]cmd =0x49444549, len=4
26,380,229 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,754,664 ready_for_fw is high
3,755,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,971,318 >>> mbox cmd response: success
14,971,920 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,226,193 UART:
19,226,579 UART: Running Caliptra FMC ...
19,227,768 UART:
19,227,926 UART: [state] CFI Enabled
19,235,591 UART: [fht] FMC Alias Private Key: 7
20,993,217 UART: [art] Extend RT PCRs Done
20,994,442 UART: [art] Lock RT PCRs Done
20,996,123 UART: [art] Populate DV Done
21,001,418 UART: [fht] FMC Alias Private Key: 7
21,003,120 UART: [art] Derive CDI
21,003,954 UART: [art] Store in in slot 0x4
21,046,505 UART: [art] Derive Key Pair
21,047,547 UART: [art] Store priv key in slot 0x5
23,474,198 UART: [art] Derive Key Pair - Done
23,487,141 UART: [art] Signing Cert with AUTHO
23,488,443 UART: RITY.KEYID = 7
25,194,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,897 UART: [art] PUB.X = 4E1C9A27A5E7B62A07A5F9FDB496C2FC9F078970D46D95713A15D247D6364E44CF6596C1C4531D735487DB9327086CE9
25,203,156 UART: [art] PUB.Y = 7581D29F9BAA901EE2FA4BE211BEBD626915A88BA9C522EC94A02C41CDA587137F404B5DBD3E79D16F31998231D20DAA
25,210,405 UART: [art] SIG.R = 4DABD1E0CB26405AB760837FB40362CF47EAA1B836CCAF535C7F50BDC184AACD8A61D44D19FD00E36ACECA4B98DB4DD2
25,217,840 UART: [art] SIG.S = 09FAB4821CEFC2EEDA2384060053B410DF86032A16ED1608DC2A2CD8B588B3B89CCFC4A3C33AB00761E6E7A66623B24D
26,196,627 UART: Caliptra RT
26,197,315 UART: [state] CFI Enabled
26,314,203 UART: [rt] RT listening for mailbox commands...
26,345,544 UART: [rt]cmd =0x4c444556, len=4
26,356,598 >>> mbox cmd response data (687 bytes)
26,398,545 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,428,580 UART: [rt]cmd =0x49444549, len=4
26,431,334 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
902,654 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 ready_for_fw is high
1,480,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,066 UART: [idev] Erasing UDS.KEYID = 0
1,504,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,042 UART: [idev] --
1,514,009 UART: [ldev] ++
1,514,177 UART: [ldev] CDI.KEYID = 6
1,514,540 UART: [ldev] SUBJECT.KEYID = 5
1,514,966 UART: [ldev] AUTHORITY.KEYID = 7
1,515,429 UART: [ldev] FE.KEYID = 1
1,520,613 UART: [ldev] Erasing FE.KEYID = 1
1,545,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,974 UART: [ldev] --
1,585,431 UART: [fwproc] Waiting for Commands...
1,586,108 UART: [fwproc] Received command 0x46574c44
1,586,899 UART: [fwproc] Received Image of size 114448 bytes
2,885,504 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,402 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,831 >>> mbox cmd response: success
3,077,831 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,093 UART: [afmc] ++
3,079,261 UART: [afmc] CDI.KEYID = 6
3,079,623 UART: [afmc] SUBJECT.KEYID = 7
3,080,048 UART: [afmc] AUTHORITY.KEYID = 5
3,114,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,211 UART: [afmc] --
3,158,143 UART: [cold-reset] --
3,158,953 UART: [state] Locking Datavault
3,160,074 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,678 UART: [state] Locking ICCM
3,161,336 UART: [exit] Launching FMC @ 0x40000130
3,166,665 UART:
3,166,681 UART: Running Caliptra FMC ...
3,167,089 UART:
3,167,143 UART: [state] CFI Enabled
3,177,648 UART: [fht] FMC Alias Private Key: 7
3,286,207 UART: [art] Extend RT PCRs Done
3,286,635 UART: [art] Lock RT PCRs Done
3,288,467 UART: [art] Populate DV Done
3,296,884 UART: [fht] FMC Alias Private Key: 7
3,298,060 UART: [art] Derive CDI
3,298,340 UART: [art] Store in in slot 0x4
3,383,969 UART: [art] Derive Key Pair
3,384,329 UART: [art] Store priv key in slot 0x5
3,397,283 UART: [art] Derive Key Pair - Done
3,412,326 UART: [art] Signing Cert with AUTHO
3,412,806 UART: RITY.KEYID = 7
3,428,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,003 UART: [art] PUB.X = 279CAD78A1D607129F117C48530F48050E9C0672921FF207F53A50A72B2F43CB5F7031CA2A5DD5D7D5460917F8E3B23C
3,435,752 UART: [art] PUB.Y = 5887D6A2B659CB08B41FE225D03F4D73A65A8271FD650F97F316DBC003634F8EC8B016D3D09C92C33F3EDDB26019584E
3,442,699 UART: [art] SIG.R = EF44DD4B84D7DF0F316C6895E17C31086335705B7D1D7307FB7DE7C8673F13AE60FDADB2F3F9CD15C51AA76D43C1E7CE
3,449,478 UART: [art] SIG.S = 9168400428CD59932A3D5D1E1977290D07D4F39B32273BAEB6AC4E69091B70F4CF28442E6266B3E7C62C170978E0C543
3,473,108 UART: Caliptra RT
3,473,361 UART: [state] CFI Enabled
3,581,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,507 UART: [rt]cmd =0x4c444556, len=4
3,623,041 >>> mbox cmd response data (687 bytes)
3,623,042 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,439 UART: [rt]cmd =0x49444549, len=4
3,654,827 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,869 ready_for_fw is high
1,362,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,009 >>> mbox cmd response: success
2,929,009 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,991,231 UART:
2,991,247 UART: Running Caliptra FMC ...
2,991,655 UART:
2,991,709 UART: [state] CFI Enabled
3,002,006 UART: [fht] FMC Alias Private Key: 7
3,110,717 UART: [art] Extend RT PCRs Done
3,111,145 UART: [art] Lock RT PCRs Done
3,112,625 UART: [art] Populate DV Done
3,121,072 UART: [fht] FMC Alias Private Key: 7
3,122,112 UART: [art] Derive CDI
3,122,392 UART: [art] Store in in slot 0x4
3,208,001 UART: [art] Derive Key Pair
3,208,361 UART: [art] Store priv key in slot 0x5
3,221,663 UART: [art] Derive Key Pair - Done
3,236,465 UART: [art] Signing Cert with AUTHO
3,236,945 UART: RITY.KEYID = 7
3,252,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,992 UART: [art] PUB.X = D18C2C308F317783786CFFF369ECD37BBED6C4B0FEBAB1B104B6CF744A3AB296B31B4D09D50E5CBCCF2C68E5259642A9
3,259,775 UART: [art] PUB.Y = 3CA12B7FE14917AC42AAC4B3EC0C05E6550DCA7E59118108B7DEDC766FEEF15D25DB77F0EDBA350171CE20697598B215
3,266,726 UART: [art] SIG.R = 021BA108EDF073F5BBF7FCE531B6098D87724E3BC554690612E8418E52C7E9E49097A128CA51CA0CFDB7F02FE37D9F44
3,273,491 UART: [art] SIG.S = 6A2DA1E4B5F0BF2F688F70C469C396ED66649C05783156B93FAAA225739FF681DCE12EA705CE4FE1B992972FD2500DFC
3,296,981 UART: Caliptra RT
3,297,234 UART: [state] CFI Enabled
3,404,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,608 UART: [rt]cmd =0x4c444556, len=4
3,445,054 >>> mbox cmd response data (687 bytes)
3,445,055 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,324 UART: [rt]cmd =0x49444549, len=4
3,476,458 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,283 UART: [kat] SHA2-512-ACC
897,184 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,633 UART: [kat] LMS
1,475,829 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,334 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 ready_for_fw is high
1,481,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,127 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,522,120 UART: [ldev] Erasing FE.KEYID = 1
1,548,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,143 UART: [ldev] --
1,587,556 UART: [fwproc] Waiting for Commands...
1,588,355 UART: [fwproc] Received command 0x46574c44
1,589,146 UART: [fwproc] Received Image of size 114448 bytes
2,889,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,400 >>> mbox cmd response: success
3,081,400 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,082,518 UART: [afmc] ++
3,082,686 UART: [afmc] CDI.KEYID = 6
3,083,048 UART: [afmc] SUBJECT.KEYID = 7
3,083,473 UART: [afmc] AUTHORITY.KEYID = 5
3,118,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,614 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,122 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,007 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,697 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,618 UART: [afmc] --
3,161,500 UART: [cold-reset] --
3,162,340 UART: [state] Locking Datavault
3,163,475 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,079 UART: [state] Locking ICCM
3,164,753 UART: [exit] Launching FMC @ 0x40000130
3,170,082 UART:
3,170,098 UART: Running Caliptra FMC ...
3,170,506 UART:
3,170,649 UART: [state] CFI Enabled
3,181,176 UART: [fht] FMC Alias Private Key: 7
3,289,263 UART: [art] Extend RT PCRs Done
3,289,691 UART: [art] Lock RT PCRs Done
3,291,265 UART: [art] Populate DV Done
3,299,288 UART: [fht] FMC Alias Private Key: 7
3,300,258 UART: [art] Derive CDI
3,300,538 UART: [art] Store in in slot 0x4
3,386,293 UART: [art] Derive Key Pair
3,386,653 UART: [art] Store priv key in slot 0x5
3,399,785 UART: [art] Derive Key Pair - Done
3,414,748 UART: [art] Signing Cert with AUTHO
3,415,228 UART: RITY.KEYID = 7
3,430,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,089 UART: [art] PUB.X = DF0A8FBC9D2CD81BF1EAA64AABFAB2C93A99E6C0B74AB27AF9206E7A24680C82161366FADE662C2350BF52772013CAB5
3,437,875 UART: [art] PUB.Y = BFFC0C99E7AE88103D3AD8CA56A7343AD3394BF08F419CA355166D627D19949EFE8ED2A798A7F41D29B4FACAE7FB7A00
3,444,820 UART: [art] SIG.R = 337BF943179F4597E564371D100421D7FDF1CB7B98A4871CCAFA0639255852ACDC9CBFEDEE0F9890D35AE2B2272C5137
3,451,589 UART: [art] SIG.S = DE63A173C8E598F72F676121B804AB7D474ECA663B9FEF127B514C30D07A80624C91FEE90105F26D4CD5B21CA243FDF0
3,475,749 UART: Caliptra RT
3,476,094 UART: [state] CFI Enabled
3,583,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,097 UART: [rt]cmd =0x4c444556, len=4
3,624,691 >>> mbox cmd response data (687 bytes)
3,624,692 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,955 UART: [rt]cmd =0x49444549, len=4
3,656,095 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,858 >>> mbox cmd response: success
2,930,858 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,992,914 UART:
2,992,930 UART: Running Caliptra FMC ...
2,993,338 UART:
2,993,481 UART: [state] CFI Enabled
3,004,508 UART: [fht] FMC Alias Private Key: 7
3,112,293 UART: [art] Extend RT PCRs Done
3,112,721 UART: [art] Lock RT PCRs Done
3,114,251 UART: [art] Populate DV Done
3,122,534 UART: [fht] FMC Alias Private Key: 7
3,123,682 UART: [art] Derive CDI
3,123,962 UART: [art] Store in in slot 0x4
3,209,869 UART: [art] Derive Key Pair
3,210,229 UART: [art] Store priv key in slot 0x5
3,222,871 UART: [art] Derive Key Pair - Done
3,237,575 UART: [art] Signing Cert with AUTHO
3,238,055 UART: RITY.KEYID = 7
3,253,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,006 UART: [art] PUB.X = 079F68B67DDECC2B3C1941EA1A76D84A64DB4A94C94C238FD3A3F20C979D8D034AB1F0B07244D126D611DA007E7DC438
3,260,757 UART: [art] PUB.Y = 9943BDFA335CFDD4102A94EA84331AD6D647B17343EEF0F51BD0CBBBCF99F5FB39E7CCFE1E09567F5C195E346158DD47
3,267,724 UART: [art] SIG.R = 0FDEAD84012CBF12880FF570FCA0C837B95CC43DCA458AC798D16A0FE661AC9A1A61967AB12759E465D5AC73F949546E
3,274,496 UART: [art] SIG.S = 7246C707C84DA1B409B6DEF123E0F1751C5D920614684EFBCDD371A2070D5954728385936662789175AB7B39B81D6C94
3,298,160 UART: Caliptra RT
3,298,505 UART: [state] CFI Enabled
3,406,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,331 UART: [rt]cmd =0x4c444556, len=4
3,447,767 >>> mbox cmd response data (687 bytes)
3,447,768 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,207 UART: [rt]cmd =0x49444549, len=4
3,479,475 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,732 UART: [kat] SHA2-512-ACC
908,633 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,439 UART: [cold-reset] ++
1,171,887 UART: [fht] FHT @ 0x50003400
1,174,586 UART: [idev] ++
1,174,754 UART: [idev] CDI.KEYID = 6
1,175,114 UART: [idev] SUBJECT.KEYID = 7
1,175,538 UART: [idev] UDS.KEYID = 0
1,175,883 ready_for_fw is high
1,175,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,819 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,269 UART: [ldev] ++
1,210,437 UART: [ldev] CDI.KEYID = 6
1,210,800 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,243,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,683 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,726 UART: [fwproc] Recv command 0x46574c44
1,284,454 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,072 >>> mbox cmd response: success
2,776,072 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,126 UART: [afmc] ++
2,777,294 UART: [afmc] CDI.KEYID = 6
2,777,656 UART: [afmc] SUBJECT.KEYID = 7
2,778,081 UART: [afmc] AUTHORITY.KEYID = 5
2,813,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,577 UART: [afmc] --
2,856,565 UART: [cold-reset] --
2,857,467 UART: [state] Locking Datavault
2,858,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,438 UART: [state] Locking ICCM
2,860,098 UART: [exit] Launching FMC @ 0x40000130
2,865,427 UART:
2,865,443 UART: Running Caliptra FMC ...
2,865,851 UART:
2,865,905 UART: [state] CFI Enabled
2,876,086 UART: [fht] FMC Alias Private Key: 7
2,983,731 UART: [art] Extend RT PCRs Done
2,984,159 UART: [art] Lock RT PCRs Done
2,985,435 UART: [art] Populate DV Done
2,993,582 UART: [fht] FMC Alias Private Key: 7
2,994,538 UART: [art] Derive CDI
2,994,818 UART: [art] Store in in slot 0x4
3,080,363 UART: [art] Derive Key Pair
3,080,723 UART: [art] Store priv key in slot 0x5
3,093,413 UART: [art] Derive Key Pair - Done
3,108,163 UART: [art] Signing Cert with AUTHO
3,108,643 UART: RITY.KEYID = 7
3,123,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,224 UART: [art] PUB.X = C0B5E6E5D97A4F189A648CAE8F419CF78A4DC8CF431AF78E361D7D23900FA8AD908C90D452BC417183665F6DD8BA9748
3,131,003 UART: [art] PUB.Y = D1AB8F84DA0DF9F061B247E03AE4269C33171E65B7D1EE0938C079BD6006B77BF9B4FAEB790C1907DB85F0731E022F37
3,137,945 UART: [art] SIG.R = 9FFAD4097BCD792A123ECE03FE6252D1423A07E1863A095730727E098C41EC9008AFDE6059E63620DF4CE937D1967A33
3,144,699 UART: [art] SIG.S = 6E5A4EEC53E8C5EF11B018658911DD1DC0CD03B565B1F0416A21937AB5A7B479896BD5D2B2B5522AE370E3861D03CD17
3,167,964 UART: Caliptra RT
3,168,217 UART: [state] CFI Enabled
3,276,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,622 UART: [rt]cmd =0x4c444556, len=4
3,317,218 >>> mbox cmd response data (687 bytes)
3,317,219 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,714 UART: [rt]cmd =0x49444549, len=4
3,349,056 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,543 ready_for_fw is high
1,059,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,701 >>> mbox cmd response: success
2,626,701 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,689,267 UART:
2,689,283 UART: Running Caliptra FMC ...
2,689,691 UART:
2,689,745 UART: [state] CFI Enabled
2,700,312 UART: [fht] FMC Alias Private Key: 7
2,808,319 UART: [art] Extend RT PCRs Done
2,808,747 UART: [art] Lock RT PCRs Done
2,810,419 UART: [art] Populate DV Done
2,818,804 UART: [fht] FMC Alias Private Key: 7
2,819,842 UART: [art] Derive CDI
2,820,122 UART: [art] Store in in slot 0x4
2,905,523 UART: [art] Derive Key Pair
2,905,883 UART: [art] Store priv key in slot 0x5
2,918,777 UART: [art] Derive Key Pair - Done
2,933,427 UART: [art] Signing Cert with AUTHO
2,933,907 UART: RITY.KEYID = 7
2,949,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,016 UART: [art] PUB.X = 3591916F3F9B303B2FA36A3C77035BEA5A42A0A4F62B06E7A348E5D56A06EA4DC2B5DFBE0DBED546ECD7BF824858F380
2,956,792 UART: [art] PUB.Y = A5F5D98BB34556560F6E21156E36A2B4997AEF7CA8ABEAE37E02B3E664FA6C09115E0F12450AB6DF21D10DF0271EBF21
2,963,738 UART: [art] SIG.R = 9AADEADA6A6958C732533135C0DB3E162CC43510D62FB3B32EA9F039796C3CCF7E49AC8C3FC022BBEA2D243C125F8061
2,970,524 UART: [art] SIG.S = F1F09BA72C3A67D99531B7AC5021C76CC46D8F18A3E14DE6340D45A7E7972A31B50EF8AF7000AD943552043D5C9CD760
2,994,094 UART: Caliptra RT
2,994,347 UART: [state] CFI Enabled
3,101,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,271 UART: [rt]cmd =0x4c444556, len=4
3,142,515 >>> mbox cmd response data (687 bytes)
3,142,516 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,933 UART: [rt]cmd =0x49444549, len=4
3,174,205 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
902,124 UART: [kat] SHA2-256
904,064 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,608 UART: [cold-reset] ++
1,173,140 UART: [fht] FHT @ 0x50003400
1,175,785 UART: [idev] ++
1,175,953 UART: [idev] CDI.KEYID = 6
1,176,313 UART: [idev] SUBJECT.KEYID = 7
1,176,737 UART: [idev] UDS.KEYID = 0
1,177,082 ready_for_fw is high
1,177,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,557 UART: [idev] Erasing UDS.KEYID = 0
1,201,562 UART: [idev] Sha1 KeyId Algorithm
1,210,230 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,684 UART: [ldev] --
1,284,137 UART: [fwproc] Wait for Commands...
1,284,849 UART: [fwproc] Recv command 0x46574c44
1,285,577 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,721 >>> mbox cmd response: success
2,777,721 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,778,779 UART: [afmc] ++
2,778,947 UART: [afmc] CDI.KEYID = 6
2,779,309 UART: [afmc] SUBJECT.KEYID = 7
2,779,734 UART: [afmc] AUTHORITY.KEYID = 5
2,815,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,528 UART: [afmc] --
2,858,626 UART: [cold-reset] --
2,859,320 UART: [state] Locking Datavault
2,860,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,163 UART: [state] Locking ICCM
2,861,585 UART: [exit] Launching FMC @ 0x40000130
2,866,914 UART:
2,866,930 UART: Running Caliptra FMC ...
2,867,338 UART:
2,867,481 UART: [state] CFI Enabled
2,878,002 UART: [fht] FMC Alias Private Key: 7
2,985,837 UART: [art] Extend RT PCRs Done
2,986,265 UART: [art] Lock RT PCRs Done
2,987,743 UART: [art] Populate DV Done
2,996,100 UART: [fht] FMC Alias Private Key: 7
2,997,062 UART: [art] Derive CDI
2,997,342 UART: [art] Store in in slot 0x4
3,083,311 UART: [art] Derive Key Pair
3,083,671 UART: [art] Store priv key in slot 0x5
3,097,193 UART: [art] Derive Key Pair - Done
3,111,853 UART: [art] Signing Cert with AUTHO
3,112,333 UART: RITY.KEYID = 7
3,127,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,366 UART: [art] PUB.X = 5A5E9C2CB724986D5FA154C1098F82BD22CFC970C3A0B47E7EF1C02BB6CC633C9D802C8FB40308F7B7B840FF5DDAB51D
3,135,147 UART: [art] PUB.Y = DB33808F90BE1C671597B4B75D1A2FC7D5296360212294B8E46A47B4B67073FA612E9FA28CC96217C8F7042DD5CD70FD
3,142,098 UART: [art] SIG.R = 269DECC7A70EFA75C1F4405BF067EF42B4198694892449C80C14B1DCC52507E287159A940F18FCA1E964495A2E9A8777
3,148,856 UART: [art] SIG.S = C6ADA1B4EA3480F36C5E92247499110B0EB8CECEDE9050A5A79BD9716E0A1F1C3FDF9CAB8A58F3E2CA96D16586AD4B91
3,172,684 UART: Caliptra RT
3,173,029 UART: [state] CFI Enabled
3,279,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,366 UART: [rt]cmd =0x4c444556, len=4
3,320,678 >>> mbox cmd response data (687 bytes)
3,320,679 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,164 UART: [rt]cmd =0x49444549, len=4
3,352,468 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 ready_for_fw is high
1,060,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,280 >>> mbox cmd response: success
2,630,280 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,692,854 UART:
2,692,870 UART: Running Caliptra FMC ...
2,693,278 UART:
2,693,421 UART: [state] CFI Enabled
2,704,020 UART: [fht] FMC Alias Private Key: 7
2,812,751 UART: [art] Extend RT PCRs Done
2,813,179 UART: [art] Lock RT PCRs Done
2,814,629 UART: [art] Populate DV Done
2,822,922 UART: [fht] FMC Alias Private Key: 7
2,823,914 UART: [art] Derive CDI
2,824,194 UART: [art] Store in in slot 0x4
2,909,519 UART: [art] Derive Key Pair
2,909,879 UART: [art] Store priv key in slot 0x5
2,923,139 UART: [art] Derive Key Pair - Done
2,937,624 UART: [art] Signing Cert with AUTHO
2,938,104 UART: RITY.KEYID = 7
2,953,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,431 UART: [art] PUB.X = A1163747F62F54C289781297406B88AE293A8295EDAA5465E32AD0EFEAC61F507814CF45C963B424AD33DE32A6D53B1C
2,961,205 UART: [art] PUB.Y = B106A170B85A328D5C1549034A2975782898BB58EB577ACCCDEAF8D6BB93BCBF2D2A0F8000B8813BFA802DE623572483
2,968,132 UART: [art] SIG.R = 9B52968C4DF5786E3FF512D2EE4BCF47E581AD53861B705176519AEB0CDB7F373A1C6A46E5A567244A6453EA663D7035
2,974,903 UART: [art] SIG.S = 0DC7CE92809956C5E74B270BC08E7D1058053B9BED80315381C0F08FB7DB503FA8DA2A6114A8945CA3CD60CB486DF2B5
2,998,207 UART: Caliptra RT
2,998,552 UART: [state] CFI Enabled
3,105,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,459 UART: [rt]cmd =0x4c444556, len=4
3,146,891 >>> mbox cmd response data (687 bytes)
3,146,892 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,299 UART: [rt]cmd =0x49444549, len=4
3,178,751 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,656 UART: [ldev] ++
1,209,824 UART: [ldev] CDI.KEYID = 6
1,210,188 UART: [ldev] SUBJECT.KEYID = 5
1,210,615 UART: [ldev] AUTHORITY.KEYID = 7
1,211,078 UART: [ldev] FE.KEYID = 1
1,216,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,482 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,459 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,914 >>> mbox cmd response: success
2,774,914 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,001 UART: [afmc] ++
2,776,169 UART: [afmc] CDI.KEYID = 6
2,776,532 UART: [afmc] SUBJECT.KEYID = 7
2,776,958 UART: [afmc] AUTHORITY.KEYID = 5
2,812,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,320 UART: [afmc] --
2,856,260 UART: [cold-reset] --
2,857,088 UART: [state] Locking Datavault
2,858,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,821 UART: [state] Locking ICCM
2,859,267 UART: [exit] Launching FMC @ 0x40000130
2,864,596 UART:
2,864,612 UART: Running Caliptra FMC ...
2,865,020 UART:
2,865,074 UART: [state] CFI Enabled
2,875,631 UART: [fht] FMC Alias Private Key: 7
2,983,330 UART: [art] Extend RT PCRs Done
2,983,758 UART: [art] Lock RT PCRs Done
2,985,204 UART: [art] Populate DV Done
2,993,411 UART: [fht] FMC Alias Private Key: 7
2,994,347 UART: [art] Derive CDI
2,994,627 UART: [art] Store in in slot 0x4
3,080,316 UART: [art] Derive Key Pair
3,080,676 UART: [art] Store priv key in slot 0x5
3,094,110 UART: [art] Derive Key Pair - Done
3,108,820 UART: [art] Signing Cert with AUTHO
3,109,300 UART: RITY.KEYID = 7
3,124,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,961 UART: [art] PUB.X = 7D8C261B67155C19B26CBB868379F2B53D56738AD9FEC0F93B59AA250377CAE28A36D42C7FC8D73B76CCC19C4F8CDB2B
3,131,744 UART: [art] PUB.Y = 8AFBDED284406D2A25A6113136E533C10315648151C0AB1E077B7486E31B166A3CFC0F0FE33F5C9E406C7A9B91A11E45
3,138,686 UART: [art] SIG.R = 5173EFE6E03E218709E9A501FF7B3B4A4F1CC989B62A796276DA8B9D30BF0A267FF659AE8610A6F85176B28A8D20F985
3,145,453 UART: [art] SIG.S = C46FEC1ED3D9A9672CBA7A0375638EB092E5276B812C26171FD147EB5A2CB0FAE13A1E92D9F0E122466BB0FB9F52C7F1
3,169,279 UART: Caliptra RT
3,169,532 UART: [state] CFI Enabled
3,276,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,265 UART: [rt]cmd =0x4c444556, len=4
3,317,553 >>> mbox cmd response data (687 bytes)
3,317,554 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,127 UART: [rt]cmd =0x49444549, len=4
3,349,329 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,432 ready_for_fw is high
1,055,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,370 >>> mbox cmd response: success
2,624,370 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,180 UART:
2,686,196 UART: Running Caliptra FMC ...
2,686,604 UART:
2,686,658 UART: [state] CFI Enabled
2,697,203 UART: [fht] FMC Alias Private Key: 7
2,805,738 UART: [art] Extend RT PCRs Done
2,806,166 UART: [art] Lock RT PCRs Done
2,807,846 UART: [art] Populate DV Done
2,815,879 UART: [fht] FMC Alias Private Key: 7
2,816,857 UART: [art] Derive CDI
2,817,137 UART: [art] Store in in slot 0x4
2,903,100 UART: [art] Derive Key Pair
2,903,460 UART: [art] Store priv key in slot 0x5
2,916,472 UART: [art] Derive Key Pair - Done
2,931,066 UART: [art] Signing Cert with AUTHO
2,931,546 UART: RITY.KEYID = 7
2,946,734 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,499 UART: [art] PUB.X = F9834499CC9ACFF25DDF86EF816DB5972DDD8E63F63A28EC3105A69CB17B8D1AAC19588C607B9CD2E6E0C20EF1C6171C
2,954,283 UART: [art] PUB.Y = 408022485A77F0256B00D5476282268A1916E6E6146563D8988644B97C655E4AC01B637FA23D41B6B9D52E850F8F1A23
2,961,194 UART: [art] SIG.R = 997BFC54E6AF0220A9AD75AC3B0726EC9A53D1920E3F6146AA30A9A0045505842ECC68699EB8411898B1C5F253DA669C
2,967,953 UART: [art] SIG.S = 51CB261E193A47D19016B08FB5DAFCDBB89FC9D5D084E6C5419F52FC3BC762B7580DF362455EFA2F067DE556C58AE566
2,991,086 UART: Caliptra RT
2,991,339 UART: [state] CFI Enabled
3,097,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,500 UART: [rt]cmd =0x4c444556, len=4
3,138,776 >>> mbox cmd response data (687 bytes)
3,138,777 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,222 UART: [rt]cmd =0x49444549, len=4
3,170,640 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,482 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,041 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,028 UART: [fwproc] Recv command 0x46574c44
1,283,761 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,131 >>> mbox cmd response: success
2,775,131 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,374 UART: [afmc] ++
2,776,542 UART: [afmc] CDI.KEYID = 6
2,776,905 UART: [afmc] SUBJECT.KEYID = 7
2,777,331 UART: [afmc] AUTHORITY.KEYID = 5
2,812,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,139 UART: [afmc] --
2,856,255 UART: [cold-reset] --
2,857,177 UART: [state] Locking Datavault
2,858,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,962 UART: [state] Locking ICCM
2,859,566 UART: [exit] Launching FMC @ 0x40000130
2,864,895 UART:
2,864,911 UART: Running Caliptra FMC ...
2,865,319 UART:
2,865,462 UART: [state] CFI Enabled
2,875,945 UART: [fht] FMC Alias Private Key: 7
2,984,022 UART: [art] Extend RT PCRs Done
2,984,450 UART: [art] Lock RT PCRs Done
2,986,130 UART: [art] Populate DV Done
2,994,229 UART: [fht] FMC Alias Private Key: 7
2,995,195 UART: [art] Derive CDI
2,995,475 UART: [art] Store in in slot 0x4
3,081,442 UART: [art] Derive Key Pair
3,081,802 UART: [art] Store priv key in slot 0x5
3,095,350 UART: [art] Derive Key Pair - Done
3,109,831 UART: [art] Signing Cert with AUTHO
3,110,311 UART: RITY.KEYID = 7
3,125,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,008 UART: [art] PUB.X = 0EEA04BB8E559110100746280D8614E3838F9D59734A3FFA25A35148F7E1C2A64B84CCD39605CE76BE305EC7BDC197AF
3,132,769 UART: [art] PUB.Y = 967DEF78D8426D3708593E0BFA8B641604FFA3C6C94F4039CF4695DD42E7E90C8802AAF3807EEB77CCC5D350437FB46D
3,139,714 UART: [art] SIG.R = 574082BBE14FCF927DD58D123E52305A0941B3893F7251A280E49C6F5909C8EF6FE92FEA54BBCF5A2811899169A3F540
3,146,480 UART: [art] SIG.S = BB687DAF7FFC32B144099B3171794B4564D0BAD4E00482D6B09689FB7B400B68EED464BEB2BD8E4D4D389B5CADBA72C2
3,170,592 UART: Caliptra RT
3,170,937 UART: [state] CFI Enabled
3,278,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,530 UART: [rt]cmd =0x4c444556, len=4
3,320,140 >>> mbox cmd response data (687 bytes)
3,320,141 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,610 UART: [rt]cmd =0x49444549, len=4
3,351,806 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,543 ready_for_fw is high
1,055,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,339 >>> mbox cmd response: success
2,623,339 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,685,111 UART:
2,685,127 UART: Running Caliptra FMC ...
2,685,535 UART:
2,685,678 UART: [state] CFI Enabled
2,696,653 UART: [fht] FMC Alias Private Key: 7
2,805,294 UART: [art] Extend RT PCRs Done
2,805,722 UART: [art] Lock RT PCRs Done
2,807,302 UART: [art] Populate DV Done
2,815,763 UART: [fht] FMC Alias Private Key: 7
2,816,913 UART: [art] Derive CDI
2,817,193 UART: [art] Store in in slot 0x4
2,902,918 UART: [art] Derive Key Pair
2,903,278 UART: [art] Store priv key in slot 0x5
2,916,172 UART: [art] Derive Key Pair - Done
2,931,005 UART: [art] Signing Cert with AUTHO
2,931,485 UART: RITY.KEYID = 7
2,947,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,808 UART: [art] PUB.X = 3747C48360FDF03E0FC31E692BA8ECCFC9C5067CDC4BE848FCC28FB4A8ED01E2D7662ABBBDBF90A245B59A38EC2ECAC2
2,954,601 UART: [art] PUB.Y = 30324B6756B1EFE160355BAA1BA9AF70893B15EFF868C38CCB6F6B6A50AF9A6B9581F83E081D970C12C6BB35B9198FFA
2,961,559 UART: [art] SIG.R = 049A3F04189C2894DC7BC1F352BEDFAE8746A94623492A570C26DA25F3E4DE02F5ACDAD083E78FCCB89C1F4B903CD1E7
2,968,335 UART: [art] SIG.S = 0974ADBE2BC1DE6614395F4209ADDC1C407AB513FB4503963CC1618EDC65FEFCEDEB73F8B3898849417B8B8E9C44024A
2,991,988 UART: Caliptra RT
2,992,333 UART: [state] CFI Enabled
3,099,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,450 UART: [rt]cmd =0x4c444556, len=4
3,140,918 >>> mbox cmd response data (687 bytes)
3,140,919 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,458 UART: [rt]cmd =0x49444549, len=4
3,172,920 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,183 UART:
192,563 UART: Running Caliptra ROM ...
193,757 UART:
193,917 UART: [state] CFI Enabled
261,307 UART: [state] LifecycleState = Unprovisioned
263,274 UART: [state] DebugLocked = No
265,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,744 UART: [kat] SHA2-256
439,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,924 UART: [kat] ++
450,530 UART: [kat] sha1
461,377 UART: [kat] SHA2-256
464,100 UART: [kat] SHA2-384
469,817 UART: [kat] SHA2-512-ACC
472,186 UART: [kat] ECC-384
2,765,604 UART: [kat] HMAC-384Kdf
2,777,072 UART: [kat] LMS
3,967,378 UART: [kat] --
3,970,183 UART: [cold-reset] ++
3,972,190 UART: [fht] Storing FHT @ 0x50003400
3,983,124 UART: [idev] ++
3,983,736 UART: [idev] CDI.KEYID = 6
3,984,655 UART: [idev] SUBJECT.KEYID = 7
3,985,906 UART: [idev] UDS.KEYID = 0
3,986,946 ready_for_fw is high
3,987,145 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,130,531 UART: [idev] Erasing UDS.KEYID = 0
7,323,356 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,254 UART: [idev] --
7,350,851 UART: [ldev] ++
7,351,431 UART: [ldev] CDI.KEYID = 6
7,352,409 UART: [ldev] SUBJECT.KEYID = 5
7,353,624 UART: [ldev] AUTHORITY.KEYID = 7
7,354,878 UART: [ldev] FE.KEYID = 1
7,399,236 UART: [ldev] Erasing FE.KEYID = 1
10,730,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,185 UART: [ldev] --
13,110,598 UART: [fwproc] Waiting for Commands...
13,113,881 UART: [fwproc] Received command 0x46574c44
13,116,061 UART: [fwproc] Received Image of size 114124 bytes
17,168,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,513 >>> mbox cmd response: success
17,627,035 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,630,442 UART: [afmc] ++
17,631,029 UART: [afmc] CDI.KEYID = 6
17,632,004 UART: [afmc] SUBJECT.KEYID = 7
17,633,230 UART: [afmc] AUTHORITY.KEYID = 5
20,999,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,603 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,912 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,292 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,096 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,569 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,366,517 UART: [afmc] --
23,369,950 UART: [cold-reset] --
23,373,601 UART: [state] Locking Datavault
23,376,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,378,488 UART: [state] Locking ICCM
23,380,456 UART: [exit] Launching FMC @ 0x40000130
23,388,872 UART:
23,389,107 UART: Running Caliptra FMC ...
23,390,135 UART:
23,390,284 UART: [state] CFI Enabled
23,459,959 UART: [fht] FMC Alias Private Key: 7
25,798,299 UART: [art] Extend RT PCRs Done
25,799,521 UART: [art] Lock RT PCRs Done
25,801,232 UART: [art] Populate DV Done
25,806,530 UART: [fht] FMC Alias Private Key: 7
25,808,231 UART: [art] Derive CDI
25,808,969 UART: [art] Store in in slot 0x4
25,868,949 UART: [art] Derive Key Pair
25,869,983 UART: [art] Store priv key in slot 0x5
29,162,702 UART: [art] Derive Key Pair - Done
29,175,909 UART: [art] Signing Cert with AUTHO
29,177,241 UART: RITY.KEYID = 7
31,463,975 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,482 UART: [art] PUB.X = 1E00C44556E46E5F4F4A25CC51E5F8A14419A4181988C20CAF3F98CAC378F96003C19A2C9005FE1F36600EF53530FB40
31,472,739 UART: [art] PUB.Y = 5D358A9D27F3BEE5A0D5B11BA88FAEA7AA370BD7DE1B5B593606119415689741AAB917D614AD835F98A3A1D0CD5D571C
31,479,983 UART: [art] SIG.R = 26C5CE3DCB6BD86E89A1C9CCEBF8DC28E53A1F0F0E3FD4EF8A49B07B6F755F6011DDA8C78E2ED95BF66A39992EE59DA4
31,487,434 UART: [art] SIG.S = 88A19F82518EFEF2B7A2DB971B376CCE791D097CC29FF8252B34A07CA6C804C6E23A05973C0BCCAE381843161ADE16E9
32,792,569 UART: Caliptra RT
32,793,283 UART: [state] CFI Enabled
32,973,822 UART: [rt] RT listening for mailbox commands...
33,005,293 UART: [rt]cmd =0x43455246, len=4
33,018,161 >>> mbox cmd response data (920 bytes)
33,060,692 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,090,662 UART: [rt]cmd =0x43455252, len=4
33,101,971 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,805,583 ready_for_fw is high
3,806,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,881,320 >>> mbox cmd response: success
17,882,098 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,568,462 UART:
23,568,840 UART: Running Caliptra FMC ...
23,569,970 UART:
23,570,129 UART: [state] CFI Enabled
23,638,680 UART: [fht] FMC Alias Private Key: 7
25,976,666 UART: [art] Extend RT PCRs Done
25,977,890 UART: [art] Lock RT PCRs Done
25,979,650 UART: [art] Populate DV Done
25,985,009 UART: [fht] FMC Alias Private Key: 7
25,986,623 UART: [art] Derive CDI
25,987,465 UART: [art] Store in in slot 0x4
26,049,246 UART: [art] Derive Key Pair
26,050,292 UART: [art] Store priv key in slot 0x5
29,343,471 UART: [art] Derive Key Pair - Done
29,356,846 UART: [art] Signing Cert with AUTHO
29,358,188 UART: RITY.KEYID = 7
31,644,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,090 UART: [art] PUB.X = F3B1750D96C5DDBC94D121F5A46C82EF9E12DB6318FCF1C2480C5F8E045DE3F03B20D43CCFCDB360E90AC8BCA05A34F7
31,653,339 UART: [art] PUB.Y = 255A537F7F44275C4AAAC29285EDB52CFF57A0911C670785CD918CFF36D1609E905E311BD10594FBEC92875F83DC4CFF
31,660,590 UART: [art] SIG.R = CECAA7988B434752E50B25A7A6BDAC6BAA4E8DBD2F93F2DD0E055C5A81241A7311AA5F21CD8D8BE5EB8014B89861B9A5
31,667,983 UART: [art] SIG.S = C97339913D5F556B00CD5B7910B98D95C7546DB869A53AF6A57A45986AD982EEC679B8DB0CEC9E2604B9090F2D5763A5
32,972,067 UART: Caliptra RT
32,972,778 UART: [state] CFI Enabled
33,134,455 UART: [rt] RT listening for mailbox commands...
33,165,765 UART: [rt]cmd =0x43455246, len=4
33,178,688 >>> mbox cmd response data (920 bytes)
33,222,016 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,252,025 UART: [rt]cmd =0x43455252, len=4
33,263,418 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,443 UART:
192,802 UART: Running Caliptra ROM ...
193,991 UART:
603,480 UART: [state] CFI Enabled
618,721 UART: [state] LifecycleState = Unprovisioned
620,663 UART: [state] DebugLocked = No
623,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,041 UART: [kat] SHA2-256
798,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,358 UART: [kat] ++
809,837 UART: [kat] sha1
821,557 UART: [kat] SHA2-256
824,220 UART: [kat] SHA2-384
829,002 UART: [kat] SHA2-512-ACC
831,381 UART: [kat] ECC-384
3,116,449 UART: [kat] HMAC-384Kdf
3,129,176 UART: [kat] LMS
4,319,234 UART: [kat] --
4,324,659 UART: [cold-reset] ++
4,327,224 UART: [fht] Storing FHT @ 0x50003400
4,339,121 UART: [idev] ++
4,339,682 UART: [idev] CDI.KEYID = 6
4,340,588 UART: [idev] SUBJECT.KEYID = 7
4,341,824 UART: [idev] UDS.KEYID = 0
4,342,790 ready_for_fw is high
4,342,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,299 UART: [idev] Erasing UDS.KEYID = 0
7,627,166 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,305 UART: [idev] --
7,651,690 UART: [ldev] ++
7,652,317 UART: [ldev] CDI.KEYID = 6
7,653,223 UART: [ldev] SUBJECT.KEYID = 5
7,654,480 UART: [ldev] AUTHORITY.KEYID = 7
7,655,706 UART: [ldev] FE.KEYID = 1
7,665,531 UART: [ldev] Erasing FE.KEYID = 1
10,951,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,862 UART: [ldev] --
13,312,470 UART: [fwproc] Waiting for Commands...
13,314,821 UART: [fwproc] Received command 0x46574c44
13,317,056 UART: [fwproc] Received Image of size 114124 bytes
17,372,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,317 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,015 >>> mbox cmd response: success
17,834,552 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,838,302 UART: [afmc] ++
17,838,887 UART: [afmc] CDI.KEYID = 6
17,839,818 UART: [afmc] SUBJECT.KEYID = 7
17,841,084 UART: [afmc] AUTHORITY.KEYID = 5
21,155,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,364 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,730 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,577 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,983 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,595 UART: [afmc] --
23,521,728 UART: [cold-reset] --
23,525,099 UART: [state] Locking Datavault
23,530,076 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,769 UART: [state] Locking ICCM
23,533,292 UART: [exit] Launching FMC @ 0x40000130
23,541,677 UART:
23,541,915 UART: Running Caliptra FMC ...
23,543,008 UART:
23,543,164 UART: [state] CFI Enabled
23,551,310 UART: [fht] FMC Alias Private Key: 7
25,881,780 UART: [art] Extend RT PCRs Done
25,882,992 UART: [art] Lock RT PCRs Done
25,884,368 UART: [art] Populate DV Done
25,889,880 UART: [fht] FMC Alias Private Key: 7
25,891,422 UART: [art] Derive CDI
25,892,177 UART: [art] Store in in slot 0x4
25,934,565 UART: [art] Derive Key Pair
25,935,560 UART: [art] Store priv key in slot 0x5
29,177,545 UART: [art] Derive Key Pair - Done
29,190,324 UART: [art] Signing Cert with AUTHO
29,191,630 UART: RITY.KEYID = 7
31,471,489 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,002 UART: [art] PUB.X = A21D94D14E8B075AEE8E1A6B145317CFCDDA245F8A5D93073600AB463A13AD3846F458E6D3CDAA7190C0C1E00CCDAB7E
31,480,271 UART: [art] PUB.Y = ECFDEDAD3FA0E60FFAC72C93502CC396B93E268A4EC75A18CDC0A292CCCC05B8DD85299C598E8756600685AD0B24B99C
31,487,511 UART: [art] SIG.R = 0B731F4A3361BD6D07AE611DBD15D621CDA477FF4963BEE98500A631FCEFCF329C08ED3E92C522662A81D399BBA45D63
31,494,892 UART: [art] SIG.S = 5FEBCF2BF56CADB68DC3ABAD17D50EBC706CB4D3AB65127DEC47E58087F4F73E370F826676D3013824165BA1B4B4B1C9
32,800,224 UART: Caliptra RT
32,800,940 UART: [state] CFI Enabled
32,918,507 UART: [rt] RT listening for mailbox commands...
32,949,918 UART: [rt]cmd =0x43455246, len=4
32,963,053 >>> mbox cmd response data (920 bytes)
33,006,087 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,036,282 UART: [rt]cmd =0x43455252, len=4
33,047,667 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
4,126,008 ready_for_fw is high
4,126,386 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,948 >>> mbox cmd response: success
18,064,558 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,703,293 UART:
23,703,666 UART: Running Caliptra FMC ...
23,704,764 UART:
23,704,906 UART: [state] CFI Enabled
23,713,074 UART: [fht] FMC Alias Private Key: 7
26,044,071 UART: [art] Extend RT PCRs Done
26,045,305 UART: [art] Lock RT PCRs Done
26,046,584 UART: [art] Populate DV Done
26,051,953 UART: [fht] FMC Alias Private Key: 7
26,053,653 UART: [art] Derive CDI
26,054,390 UART: [art] Store in in slot 0x4
26,096,678 UART: [art] Derive Key Pair
26,097,727 UART: [art] Store priv key in slot 0x5
29,339,914 UART: [art] Derive Key Pair - Done
29,353,043 UART: [art] Signing Cert with AUTHO
29,354,351 UART: RITY.KEYID = 7
31,633,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,351 UART: [art] PUB.X = 415CB1E42D14C027147E98F1E39DEBF3B81489B921D0CCAF448BE145AEB3FDABF76B45C64808AF757318BED7CF55918B
31,642,595 UART: [art] PUB.Y = F3EA8245579DDDFB45F207B8D1D38DC2DC925571046B3E0E5DA67C88A8E895E5404029029D1FDBDFECC30470B652581B
31,649,823 UART: [art] SIG.R = 0C9A827CC96863B781AB5D526437452AE4E05C556D13D1EDBF24CE20C8B9E05FA60A03903B75BAE0DDC97E9AE30BF123
31,657,217 UART: [art] SIG.S = 466EA37D14E3745ECF7C3E12D41B6D496397A71B4897A27E4274F9019B35BD603E05DBDC0A7099E31E6725F35C48B344
32,962,928 UART: Caliptra RT
32,963,637 UART: [state] CFI Enabled
33,081,235 UART: [rt] RT listening for mailbox commands...
33,112,368 UART: [rt]cmd =0x43455246, len=4
33,125,426 >>> mbox cmd response data (920 bytes)
33,168,414 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,198,209 UART: [rt]cmd =0x43455252, len=4
33,209,675 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,157 UART:
192,511 UART: Running Caliptra ROM ...
193,646 UART:
193,789 UART: [state] CFI Enabled
263,718 UART: [state] LifecycleState = Unprovisioned
265,626 UART: [state] DebugLocked = No
268,078 UART: [state] WD Timer not started. Device not locked for debugging
272,041 UART: [kat] SHA2-256
451,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,734 UART: [kat] ++
463,262 UART: [kat] sha1
474,567 UART: [kat] SHA2-256
477,572 UART: [kat] SHA2-384
482,775 UART: [kat] SHA2-512-ACC
485,774 UART: [kat] ECC-384
2,945,950 UART: [kat] HMAC-384Kdf
2,968,485 UART: [kat] LMS
3,497,895 UART: [kat] --
3,502,955 UART: [cold-reset] ++
3,504,807 UART: [fht] FHT @ 0x50003400
3,515,709 UART: [idev] ++
3,516,276 UART: [idev] CDI.KEYID = 6
3,517,183 UART: [idev] SUBJECT.KEYID = 7
3,518,424 UART: [idev] UDS.KEYID = 0
3,519,348 ready_for_fw is high
3,519,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,442 UART: [idev] Erasing UDS.KEYID = 0
6,024,084 UART: [idev] Sha1 KeyId Algorithm
6,045,663 UART: [idev] --
6,048,610 UART: [ldev] ++
6,049,193 UART: [ldev] CDI.KEYID = 6
6,050,129 UART: [ldev] SUBJECT.KEYID = 5
6,051,297 UART: [ldev] AUTHORITY.KEYID = 7
6,052,529 UART: [ldev] FE.KEYID = 1
6,097,581 UART: [ldev] Erasing FE.KEYID = 1
8,601,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,370 UART: [ldev] --
10,411,119 UART: [fwproc] Wait for Commands...
10,412,615 UART: [fwproc] Recv command 0x46574c44
10,414,704 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,294 >>> mbox cmd response: success
14,275,788 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,279,969 UART: [afmc] ++
14,280,584 UART: [afmc] CDI.KEYID = 6
14,281,503 UART: [afmc] SUBJECT.KEYID = 7
14,282,666 UART: [afmc] AUTHORITY.KEYID = 5
16,819,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,644 UART: [afmc] --
18,622,234 UART: [cold-reset] --
18,625,275 UART: [state] Locking Datavault
18,630,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,282 UART: [state] Locking ICCM
18,633,784 UART: [exit] Launching FMC @ 0x40000130
18,642,236 UART:
18,642,465 UART: Running Caliptra FMC ...
18,643,562 UART:
18,643,719 UART: [state] CFI Enabled
18,705,079 UART: [fht] FMC Alias Private Key: 7
20,469,555 UART: [art] Extend RT PCRs Done
20,470,779 UART: [art] Lock RT PCRs Done
20,472,538 UART: [art] Populate DV Done
20,477,891 UART: [fht] FMC Alias Private Key: 7
20,479,382 UART: [art] Derive CDI
20,480,145 UART: [art] Store in in slot 0x4
20,538,137 UART: [art] Derive Key Pair
20,539,176 UART: [art] Store priv key in slot 0x5
23,002,232 UART: [art] Derive Key Pair - Done
23,015,034 UART: [art] Signing Cert with AUTHO
23,016,339 UART: RITY.KEYID = 7
24,728,048 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,551 UART: [art] PUB.X = 1392FB70636566F5745F82D59DFF3E123C54CC8CAA300B3B670BF665DFF3138DCAADA96F534BB3CB6469E7EFDA213577
24,736,848 UART: [art] PUB.Y = 195E89623076F9308A39EA38A52F461475D3627777C007B92257E69C99DDA2108015230005F34F18E9A355B3423268EC
24,744,073 UART: [art] SIG.R = 70364006DDDA5F16D0B0B226BB6C470E79D67C8F1BAFEB1F539AE54C204D55D0C8ED2FBF55523E37B9EE577F8D9E4AB6
24,751,459 UART: [art] SIG.S = AFB1919143C3176E58ECD53DA66CDC53A057969E7775156BDD2A68A41A30B84436C1616F5DEFDF0F313F56CB05A094BE
25,730,840 UART: Caliptra RT
25,731,545 UART: [state] CFI Enabled
25,897,434 UART: [rt] RT listening for mailbox commands...
25,928,873 UART: [rt]cmd =0x43455246, len=4
25,941,524 >>> mbox cmd response data (887 bytes)
25,984,397 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,014,483 UART: [rt]cmd =0x43455252, len=4
26,025,735 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,362,143 ready_for_fw is high
3,362,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,775 >>> mbox cmd response: success
14,076,529 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,372,460 UART:
18,372,831 UART: Running Caliptra FMC ...
18,373,929 UART:
18,374,087 UART: [state] CFI Enabled
18,435,575 UART: [fht] FMC Alias Private Key: 7
20,200,362 UART: [art] Extend RT PCRs Done
20,201,580 UART: [art] Lock RT PCRs Done
20,203,154 UART: [art] Populate DV Done
20,208,625 UART: [fht] FMC Alias Private Key: 7
20,210,230 UART: [art] Derive CDI
20,211,052 UART: [art] Store in in slot 0x4
20,269,165 UART: [art] Derive Key Pair
20,270,209 UART: [art] Store priv key in slot 0x5
22,733,360 UART: [art] Derive Key Pair - Done
22,746,752 UART: [art] Signing Cert with AUTHO
22,748,058 UART: RITY.KEYID = 7
24,459,196 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,698 UART: [art] PUB.X = 6DDCD2DA7F2A5D607AE68BC7598214F27D9D7C438FF23D44881D335E7EB92540737C18E2F12225302DE4483B31E6668A
24,468,012 UART: [art] PUB.Y = 596DE12E85DB5C46F94CF7426FA232779C24B7733FBF2C8E1B24BD99BF0CC5A69A05A24C2403419E540C4EADD474A33F
24,475,271 UART: [art] SIG.R = D00A42F9D052753A616D36B1E18BE9229DBA2A71AD61561FF88B4B14714B72BF2EE28699A5AD291B5156932AE6950EB3
24,482,679 UART: [art] SIG.S = 50E0114CAF9BBFD502B8ED35E60EB62A84413149D5F0F6A8BEDB69634F1AD62352948E8CADFF69271E8D4E0F5B54BD18
25,461,855 UART: Caliptra RT
25,462,555 UART: [state] CFI Enabled
25,626,960 UART: [rt] RT listening for mailbox commands...
25,658,203 UART: [rt]cmd =0x43455246, len=4
25,670,743 >>> mbox cmd response data (887 bytes)
25,713,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,743,319 UART: [rt]cmd =0x43455252, len=4
25,754,474 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,390 UART:
192,769 UART: Running Caliptra ROM ...
193,971 UART:
603,456 UART: [state] CFI Enabled
615,550 UART: [state] LifecycleState = Unprovisioned
617,428 UART: [state] DebugLocked = No
618,877 UART: [state] WD Timer not started. Device not locked for debugging
622,972 UART: [kat] SHA2-256
802,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,659 UART: [kat] ++
814,199 UART: [kat] sha1
825,690 UART: [kat] SHA2-256
828,694 UART: [kat] SHA2-384
836,318 UART: [kat] SHA2-512-ACC
839,278 UART: [kat] ECC-384
3,279,104 UART: [kat] HMAC-384Kdf
3,290,686 UART: [kat] LMS
3,820,204 UART: [kat] --
3,824,265 UART: [cold-reset] ++
3,826,756 UART: [fht] FHT @ 0x50003400
3,837,792 UART: [idev] ++
3,838,348 UART: [idev] CDI.KEYID = 6
3,839,374 UART: [idev] SUBJECT.KEYID = 7
3,840,419 UART: [idev] UDS.KEYID = 0
3,841,396 ready_for_fw is high
3,841,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,305 UART: [idev] Erasing UDS.KEYID = 0
6,313,833 UART: [idev] Sha1 KeyId Algorithm
6,336,623 UART: [idev] --
6,340,230 UART: [ldev] ++
6,340,806 UART: [ldev] CDI.KEYID = 6
6,341,711 UART: [ldev] SUBJECT.KEYID = 5
6,342,914 UART: [ldev] AUTHORITY.KEYID = 7
6,344,134 UART: [ldev] FE.KEYID = 1
6,354,935 UART: [ldev] Erasing FE.KEYID = 1
8,830,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,442 UART: [ldev] --
10,620,002 UART: [fwproc] Wait for Commands...
10,622,635 UART: [fwproc] Recv command 0x46574c44
10,624,717 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,818 >>> mbox cmd response: success
14,484,328 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,488,938 UART: [afmc] ++
14,489,519 UART: [afmc] CDI.KEYID = 6
14,490,418 UART: [afmc] SUBJECT.KEYID = 7
14,491,623 UART: [afmc] AUTHORITY.KEYID = 5
16,989,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,368 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,398 UART: [afmc] --
18,787,440 UART: [cold-reset] --
18,792,313 UART: [state] Locking Datavault
18,797,686 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,381 UART: [state] Locking ICCM
18,801,709 UART: [exit] Launching FMC @ 0x40000130
18,810,088 UART:
18,810,315 UART: Running Caliptra FMC ...
18,811,332 UART:
18,811,470 UART: [state] CFI Enabled
18,820,050 UART: [fht] FMC Alias Private Key: 7
20,576,824 UART: [art] Extend RT PCRs Done
20,578,038 UART: [art] Lock RT PCRs Done
20,579,582 UART: [art] Populate DV Done
20,584,821 UART: [fht] FMC Alias Private Key: 7
20,586,513 UART: [art] Derive CDI
20,587,318 UART: [art] Store in in slot 0x4
20,630,040 UART: [art] Derive Key Pair
20,631,075 UART: [art] Store priv key in slot 0x5
23,057,857 UART: [art] Derive Key Pair - Done
23,070,796 UART: [art] Signing Cert with AUTHO
23,072,133 UART: RITY.KEYID = 7
24,777,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,284 UART: [art] PUB.X = 77E2D79A02900C314E1600DC3DBEAC09493531D1CB5166F044A1BBD8540F0280F77FCCDEF22B08C8650B723C4B470ED4
24,786,521 UART: [art] PUB.Y = 7DC63E544D6B3191F84AED64F3136F207BEBE5636F28057D81DCABBD674A3269E505D68BD8C9A9FA1685D47CA216A331
24,793,802 UART: [art] SIG.R = A0BDE209F0173E79B846393B413C8C7D648FDCCA0565367FB18521D5E72EEE7A776E7A0C8507099B7F6BBD46874BCE9D
24,801,182 UART: [art] SIG.S = 8727C486E44279F7A11630DD1814C86C45D75E5128ECE3FAB03D2021C97B73FB32E3D82E8AB0B528CEA07F288ED029C3
25,780,284 UART: Caliptra RT
25,780,992 UART: [state] CFI Enabled
25,897,751 UART: [rt] RT listening for mailbox commands...
25,929,001 UART: [rt]cmd =0x43455246, len=4
25,941,753 >>> mbox cmd response data (887 bytes)
25,984,791 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,014,783 UART: [rt]cmd =0x43455252, len=4
26,026,062 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,696,922 ready_for_fw is high
3,697,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,311 >>> mbox cmd response: success
14,268,066 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,515,576 UART:
18,515,971 UART: Running Caliptra FMC ...
18,517,098 UART:
18,517,252 UART: [state] CFI Enabled
18,525,215 UART: [fht] FMC Alias Private Key: 7
20,282,118 UART: [art] Extend RT PCRs Done
20,283,345 UART: [art] Lock RT PCRs Done
20,285,021 UART: [art] Populate DV Done
20,290,537 UART: [fht] FMC Alias Private Key: 7
20,292,185 UART: [art] Derive CDI
20,292,995 UART: [art] Store in in slot 0x4
20,335,742 UART: [art] Derive Key Pair
20,336,741 UART: [art] Store priv key in slot 0x5
22,763,584 UART: [art] Derive Key Pair - Done
22,776,474 UART: [art] Signing Cert with AUTHO
22,777,782 UART: RITY.KEYID = 7
24,483,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,595 UART: [art] PUB.X = 1BE03FC5343E44C0001711CB90735E7A894C92AF2DB52B577D9CDAD8C782C5CF608B24AE8AF697F2B4E2943B0098E7FB
24,491,846 UART: [art] PUB.Y = BE47721E193F62A5820C9BB0A0D22951679C87D0F3A1F5B4B5A5F2B8AE8F024BE4BBF9ADF13E091BB30BE4EBE6B6EEEA
24,499,153 UART: [art] SIG.R = 9439DEA6EAF7B313AE895EB71705F6A49247558DF09944E3811BA9E4D99FAA633F241533C46573378DDC22BACECCBEF6
24,506,560 UART: [art] SIG.S = A3B52EAF7CFEE5445053B95472EBD80064023A8A6F19D81D2CF26D7DEDD757070A33B323D731EF23DBC230B7C11C474D
25,485,043 UART: Caliptra RT
25,485,762 UART: [state] CFI Enabled
25,602,454 UART: [rt] RT listening for mailbox commands...
25,633,696 UART: [rt]cmd =0x43455246, len=4
25,646,481 >>> mbox cmd response data (887 bytes)
25,688,663 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,718,555 UART: [rt]cmd =0x43455252, len=4
25,729,773 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,097 UART:
192,475 UART: Running Caliptra ROM ...
193,619 UART:
193,766 UART: [state] CFI Enabled
263,271 UART: [state] LifecycleState = Unprovisioned
265,642 UART: [state] DebugLocked = No
268,099 UART: [state] WD Timer not started. Device not locked for debugging
273,199 UART: [kat] SHA2-256
463,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,813 UART: [kat] ++
474,348 UART: [kat] sha1
485,017 UART: [kat] SHA2-256
488,022 UART: [kat] SHA2-384
494,860 UART: [kat] SHA2-512-ACC
497,435 UART: [kat] ECC-384
2,951,000 UART: [kat] HMAC-384Kdf
2,972,121 UART: [kat] LMS
3,503,941 UART: [kat] --
3,507,334 UART: [cold-reset] ++
3,508,911 UART: [fht] FHT @ 0x50003400
3,520,525 UART: [idev] ++
3,521,229 UART: [idev] CDI.KEYID = 6
3,522,148 UART: [idev] SUBJECT.KEYID = 7
3,523,390 UART: [idev] UDS.KEYID = 0
3,524,335 ready_for_fw is high
3,524,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,627 UART: [idev] Erasing UDS.KEYID = 0
6,032,077 UART: [idev] Sha1 KeyId Algorithm
6,054,607 UART: [idev] --
6,060,167 UART: [ldev] ++
6,060,852 UART: [ldev] CDI.KEYID = 6
6,061,764 UART: [ldev] SUBJECT.KEYID = 5
6,062,979 UART: [ldev] AUTHORITY.KEYID = 7
6,064,157 UART: [ldev] FE.KEYID = 1
6,101,214 UART: [ldev] Erasing FE.KEYID = 1
8,607,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,667 UART: [ldev] --
10,416,304 UART: [fwproc] Wait for Commands...
10,419,105 UART: [fwproc] Recv command 0x46574c44
10,421,413 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,831 >>> mbox cmd response: success
14,602,347 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,605,399 UART: [afmc] ++
14,606,155 UART: [afmc] CDI.KEYID = 6
14,607,347 UART: [afmc] SUBJECT.KEYID = 7
14,608,781 UART: [afmc] AUTHORITY.KEYID = 5
17,154,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,230 UART: [afmc] --
18,953,577 UART: [cold-reset] --
18,958,038 UART: [state] Locking Datavault
18,964,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,966,456 UART: [state] Locking ICCM
18,967,955 UART: [exit] Launching FMC @ 0x40000130
18,976,628 UART:
18,976,868 UART: Running Caliptra FMC ...
18,977,967 UART:
18,978,120 UART: [state] CFI Enabled
19,035,249 UART: [fht] FMC Alias Private Key: 7
20,798,786 UART: [art] Extend RT PCRs Done
20,800,000 UART: [art] Lock RT PCRs Done
20,801,523 UART: [art] Populate DV Done
20,807,044 UART: [fht] FMC Alias Private Key: 7
20,808,689 UART: [art] Derive CDI
20,809,498 UART: [art] Store in in slot 0x4
20,868,246 UART: [art] Derive Key Pair
20,869,280 UART: [art] Store priv key in slot 0x5
23,332,566 UART: [art] Derive Key Pair - Done
23,345,714 UART: [art] Signing Cert with AUTHO
23,347,015 UART: RITY.KEYID = 7
25,058,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,836 UART: [art] PUB.X = 6F0D675ED50B12CE1346F712A880D5403ABC92037C633BB81B50FEBABD92367E61DE4D72AE6376EDB319E56F24C0B2D9
25,067,126 UART: [art] PUB.Y = 8EAA155A0A89DBAC2BA1E6581F3E7847D69CB4F8FB0655B718FAF10274CBCAFC315AAE4B9AE9CD71BBDFFE8F178D0195
25,074,415 UART: [art] SIG.R = E3948337ED53477540673FABD4A9CABD1BBA42219DA8FC53A2CB9ED8BB2EC213D216BFC6D39E5D452ADAF1FE9D680BAB
25,081,800 UART: [art] SIG.S = DA42AA8287B8934159D8C931BFA6485FDF1790149893B8128C8FAD3F9FAE75EB0A74C28467152F469BB53398656DEF47
26,060,266 UART: Caliptra RT
26,060,957 UART: [state] CFI Enabled
26,227,619 UART: [rt] RT listening for mailbox commands...
26,258,816 UART: [rt]cmd =0x43455246, len=4
26,271,361 >>> mbox cmd response data (887 bytes)
26,313,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,343,591 UART: [rt]cmd =0x43455252, len=4
26,354,947 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,435,628 ready_for_fw is high
3,436,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,766 >>> mbox cmd response: success
14,737,502 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,026,681 UART:
19,027,060 UART: Running Caliptra FMC ...
19,028,195 UART:
19,028,353 UART: [state] CFI Enabled
19,096,389 UART: [fht] FMC Alias Private Key: 7
20,860,427 UART: [art] Extend RT PCRs Done
20,861,648 UART: [art] Lock RT PCRs Done
20,863,259 UART: [art] Populate DV Done
20,868,780 UART: [fht] FMC Alias Private Key: 7
20,870,481 UART: [art] Derive CDI
20,871,293 UART: [art] Store in in slot 0x4
20,929,337 UART: [art] Derive Key Pair
20,930,379 UART: [art] Store priv key in slot 0x5
23,392,969 UART: [art] Derive Key Pair - Done
23,406,221 UART: [art] Signing Cert with AUTHO
23,407,517 UART: RITY.KEYID = 7
25,119,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,079 UART: [art] PUB.X = 883F09C9BE6A08440A280C53942EFAFA3032E13C7125AFD26F806767C58114B2ABCDEE4587498B48E4FE59390630EBA8
25,128,337 UART: [art] PUB.Y = 447F2900DDDBDF173BA360A5C634CEE0A1B42E2024A044943D2927D3B49FB3E0AB8AE4A80FC86A17636E2B217384CBBB
25,135,591 UART: [art] SIG.R = 1A96A172663245668BBD5A3DE3B2306081FBEC68F7AA35AAF06FA3BB08F7FCD8738A987AB1522C8861D08A791A62A9CA
25,143,043 UART: [art] SIG.S = CF865DB7A909A8D1B108855F24DAF48EAFCF60967FE30AFDB984D8539E01C90A706F1A2F4321C572BA518ED65EB7D9D5
26,122,292 UART: Caliptra RT
26,122,979 UART: [state] CFI Enabled
26,288,447 UART: [rt] RT listening for mailbox commands...
26,319,753 UART: [rt]cmd =0x43455246, len=4
26,332,563 >>> mbox cmd response data (887 bytes)
26,375,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,404,817 UART: [rt]cmd =0x43455252, len=4
26,416,308 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,355 UART:
192,726 UART: Running Caliptra ROM ...
193,812 UART:
603,634 UART: [state] CFI Enabled
617,164 UART: [state] LifecycleState = Unprovisioned
619,536 UART: [state] DebugLocked = No
621,488 UART: [state] WD Timer not started. Device not locked for debugging
626,080 UART: [kat] SHA2-256
815,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,767 UART: [kat] ++
827,285 UART: [kat] sha1
838,786 UART: [kat] SHA2-256
841,860 UART: [kat] SHA2-384
846,992 UART: [kat] SHA2-512-ACC
849,572 UART: [kat] ECC-384
3,291,800 UART: [kat] HMAC-384Kdf
3,306,121 UART: [kat] LMS
3,837,965 UART: [kat] --
3,842,944 UART: [cold-reset] ++
3,844,645 UART: [fht] FHT @ 0x50003400
3,856,602 UART: [idev] ++
3,857,297 UART: [idev] CDI.KEYID = 6
3,858,317 UART: [idev] SUBJECT.KEYID = 7
3,859,483 UART: [idev] UDS.KEYID = 0
3,860,438 ready_for_fw is high
3,860,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,458 UART: [idev] Erasing UDS.KEYID = 0
6,335,155 UART: [idev] Sha1 KeyId Algorithm
6,356,914 UART: [idev] --
6,360,506 UART: [ldev] ++
6,361,196 UART: [ldev] CDI.KEYID = 6
6,362,254 UART: [ldev] SUBJECT.KEYID = 5
6,363,357 UART: [ldev] AUTHORITY.KEYID = 7
6,364,520 UART: [ldev] FE.KEYID = 1
6,375,319 UART: [ldev] Erasing FE.KEYID = 1
8,853,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,325 UART: [ldev] --
10,645,616 UART: [fwproc] Wait for Commands...
10,647,377 UART: [fwproc] Recv command 0x46574c44
10,649,675 UART: [fwproc] Recv'd Img size: 114448 bytes
14,099,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,831,742 >>> mbox cmd response: success
14,832,205 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,836,495 UART: [afmc] ++
14,837,187 UART: [afmc] CDI.KEYID = 6
14,838,429 UART: [afmc] SUBJECT.KEYID = 7
14,839,858 UART: [afmc] AUTHORITY.KEYID = 5
17,343,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,503 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,699 UART: [afmc] --
19,139,504 UART: [cold-reset] --
19,143,106 UART: [state] Locking Datavault
19,147,664 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,866 UART: [state] Locking ICCM
19,151,689 UART: [exit] Launching FMC @ 0x40000130
19,160,365 UART:
19,160,592 UART: Running Caliptra FMC ...
19,161,684 UART:
19,161,833 UART: [state] CFI Enabled
19,169,982 UART: [fht] FMC Alias Private Key: 7
20,927,770 UART: [art] Extend RT PCRs Done
20,928,993 UART: [art] Lock RT PCRs Done
20,930,819 UART: [art] Populate DV Done
20,936,281 UART: [fht] FMC Alias Private Key: 7
20,937,982 UART: [art] Derive CDI
20,938,789 UART: [art] Store in in slot 0x4
20,980,893 UART: [art] Derive Key Pair
20,982,086 UART: [art] Store priv key in slot 0x5
23,408,750 UART: [art] Derive Key Pair - Done
23,422,007 UART: [art] Signing Cert with AUTHO
23,423,304 UART: RITY.KEYID = 7
25,128,668 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,157 UART: [art] PUB.X = B0FED6FD6905994DAE98C3513449CBDD5726A9BBC387C5DD7A2F0C0C0C0E465ACDF465BD13D952D84AAA88C53FA7CB91
25,137,492 UART: [art] PUB.Y = 08ED471D609D04336A919EE5F48D13A0BEE474DBAF96C5A80BB28B9443A5C9B993B2F7080598447A2DA4B7EF03B26EF0
25,144,738 UART: [art] SIG.R = 9D33D2F53289EBF0F9AFF014FF49C2837D16087DB848E7D6BE812A2FCD470E06ACDEFC81679878480E7A3A012A80C236
25,152,134 UART: [art] SIG.S = 5EF2C19090B8C2851082DC07E26049DA5838389D2152591364E5FD029C5A9CA908B6445622957E7F280FF8309322494A
26,130,913 UART: Caliptra RT
26,131,614 UART: [state] CFI Enabled
26,249,501 UART: [rt] RT listening for mailbox commands...
26,280,732 UART: [rt]cmd =0x43455246, len=4
26,293,560 >>> mbox cmd response data (887 bytes)
26,336,224 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,366,244 UART: [rt]cmd =0x43455252, len=4
26,377,612 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,758,612 ready_for_fw is high
3,758,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,858 >>> mbox cmd response: success
14,954,626 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,202,333 UART:
19,202,740 UART: Running Caliptra FMC ...
19,203,865 UART:
19,204,011 UART: [state] CFI Enabled
19,211,792 UART: [fht] FMC Alias Private Key: 7
20,968,847 UART: [art] Extend RT PCRs Done
20,970,072 UART: [art] Lock RT PCRs Done
20,971,445 UART: [art] Populate DV Done
20,976,860 UART: [fht] FMC Alias Private Key: 7
20,978,502 UART: [art] Derive CDI
20,979,314 UART: [art] Store in in slot 0x4
21,022,283 UART: [art] Derive Key Pair
21,023,277 UART: [art] Store priv key in slot 0x5
23,449,636 UART: [art] Derive Key Pair - Done
23,462,853 UART: [art] Signing Cert with AUTHO
23,464,154 UART: RITY.KEYID = 7
25,169,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,376 UART: [art] PUB.X = BC9CD231DC504B57101E62ED2371B68432E8A4C7F385299A764514F1FC40E7A281CA5539397DD88100B38E7A02822044
25,178,613 UART: [art] PUB.Y = 3A3908A8F9A23AE6CD800C4B7C04FF82A201A0E0F4526A1601DF5B4D695FF867CF178614370DF4C6653954EB24467707
25,185,856 UART: [art] SIG.R = EDFD86EAAF89C2A2EED1EECCE5B054F2DBBD3648CEF2F691DE50E7117B355C110DF440FCC9CCAE3B8B45DC230E422C51
25,193,283 UART: [art] SIG.S = 43652101C79DC74BF269F43E90DB9FED62E2E8D33C743ED6EDFB80661B5CCDBA484C1DAF2B5F9C3B030B72C31D6ED975
26,172,228 UART: Caliptra RT
26,172,934 UART: [state] CFI Enabled
26,289,623 UART: [rt] RT listening for mailbox commands...
26,320,974 UART: [rt]cmd =0x43455246, len=4
26,333,651 >>> mbox cmd response data (887 bytes)
26,376,313 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,406,295 UART: [rt]cmd =0x43455252, len=4
26,417,674 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,496 UART: [kat] LMS
1,475,692 UART: [kat] --
1,476,993 UART: [cold-reset] ++
1,477,473 UART: [fht] Storing FHT @ 0x50003400
1,480,434 UART: [idev] ++
1,480,602 UART: [idev] CDI.KEYID = 6
1,480,962 UART: [idev] SUBJECT.KEYID = 7
1,481,386 UART: [idev] UDS.KEYID = 0
1,481,731 ready_for_fw is high
1,481,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,400 UART: [idev] Erasing UDS.KEYID = 0
1,505,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,492 UART: [idev] --
1,515,709 UART: [ldev] ++
1,515,877 UART: [ldev] CDI.KEYID = 6
1,516,240 UART: [ldev] SUBJECT.KEYID = 5
1,516,666 UART: [ldev] AUTHORITY.KEYID = 7
1,517,129 UART: [ldev] FE.KEYID = 1
1,522,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,008 UART: [ldev] --
1,585,513 UART: [fwproc] Waiting for Commands...
1,586,308 UART: [fwproc] Received command 0x46574c44
1,587,099 UART: [fwproc] Received Image of size 114448 bytes
2,887,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,691 >>> mbox cmd response: success
3,080,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,081,827 UART: [afmc] ++
3,081,995 UART: [afmc] CDI.KEYID = 6
3,082,357 UART: [afmc] SUBJECT.KEYID = 7
3,082,782 UART: [afmc] AUTHORITY.KEYID = 5
3,117,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,704 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,394 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,339 UART: [afmc] --
3,161,235 UART: [cold-reset] --
3,162,107 UART: [state] Locking Datavault
3,163,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,724 UART: [state] Locking ICCM
3,164,312 UART: [exit] Launching FMC @ 0x40000130
3,169,641 UART:
3,169,657 UART: Running Caliptra FMC ...
3,170,065 UART:
3,170,119 UART: [state] CFI Enabled
3,180,494 UART: [fht] FMC Alias Private Key: 7
3,287,955 UART: [art] Extend RT PCRs Done
3,288,383 UART: [art] Lock RT PCRs Done
3,289,555 UART: [art] Populate DV Done
3,298,074 UART: [fht] FMC Alias Private Key: 7
3,299,244 UART: [art] Derive CDI
3,299,524 UART: [art] Store in in slot 0x4
3,384,999 UART: [art] Derive Key Pair
3,385,359 UART: [art] Store priv key in slot 0x5
3,398,255 UART: [art] Derive Key Pair - Done
3,412,741 UART: [art] Signing Cert with AUTHO
3,413,221 UART: RITY.KEYID = 7
3,428,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,086 UART: [art] PUB.X = AAA32D5063AF1794DDC0C56E0318DE21B2CAF3CCC0D164B9D7D83B594EE9840C30912F78F7D04CCB3C862AB308063142
3,435,856 UART: [art] PUB.Y = 145ADAEFB7CAA1C1190448F1EBA649260AF2FE7DB2EB548190753EB6485F4FAA6A33C3F40513F6CC6BC77643878B011B
3,442,808 UART: [art] SIG.R = B2222D89F5F8B8FAAED9E4930C40A6D818F7241A190836EECE675E3AC76211123CDD31B7EA0BF60D0BFFACDE08B8B5AA
3,449,584 UART: [art] SIG.S = C1E68AA03D5B86CA60C964CFA8EC7021E59DA4CF982F326F8DCFDBF64CB51F02BCB27E01C7BE0273A5C82901120DC197
3,473,394 UART: Caliptra RT
3,473,647 UART: [state] CFI Enabled
3,581,563 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,895 UART: [rt]cmd =0x43455246, len=4
3,624,265 >>> mbox cmd response data (920 bytes)
3,624,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,717 UART: [rt]cmd =0x43455252, len=4
3,664,499 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 ready_for_fw is high
1,362,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,393 >>> mbox cmd response: success
2,930,393 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,991,241 UART:
2,991,257 UART: Running Caliptra FMC ...
2,991,665 UART:
2,991,719 UART: [state] CFI Enabled
3,002,358 UART: [fht] FMC Alias Private Key: 7
3,109,745 UART: [art] Extend RT PCRs Done
3,110,173 UART: [art] Lock RT PCRs Done
3,111,709 UART: [art] Populate DV Done
3,120,124 UART: [fht] FMC Alias Private Key: 7
3,121,218 UART: [art] Derive CDI
3,121,498 UART: [art] Store in in slot 0x4
3,207,121 UART: [art] Derive Key Pair
3,207,481 UART: [art] Store priv key in slot 0x5
3,220,101 UART: [art] Derive Key Pair - Done
3,235,031 UART: [art] Signing Cert with AUTHO
3,235,511 UART: RITY.KEYID = 7
3,250,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,542 UART: [art] PUB.X = 556096F84F426CF79BF9DC7EE09C9987E8D28047A5565FEE1EDBCEFBDB10C6DC1D82A2AF75B282FE87CEB2F92DA4D44B
3,258,338 UART: [art] PUB.Y = 86DDE7871FCE126EFFB8DAE1B23A921F5CF29760680F6C1B392029C23F75B358B3C4AD2F4EF0406D6A810713C6BADB3D
3,265,298 UART: [art] SIG.R = 052B78A89F45646BD7A3C7DCDBBFBC974115FA85BA12A3E34208C21EDAED1EC2C7430C1F39BC75BDF458530DD3A3B7C9
3,272,078 UART: [art] SIG.S = FC1BDCFCAEE1CBB3DAE10FB88B1EC13FF26354CA92DB3CC2BC37124D4702B5579C180225409B77D5434FFC79F9F4D198
3,296,480 UART: Caliptra RT
3,296,733 UART: [state] CFI Enabled
3,405,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,518 UART: [rt]cmd =0x43455246, len=4
3,448,054 >>> mbox cmd response data (920 bytes)
3,448,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,432 UART: [rt]cmd =0x43455252, len=4
3,488,465 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,316 UART: [kat] SHA2-256
892,254 UART: [kat] SHA2-384
895,011 UART: [kat] SHA2-512-ACC
896,912 UART: [kat] ECC-384
902,529 UART: [kat] HMAC-384Kdf
907,149 UART: [kat] LMS
1,475,345 UART: [kat] --
1,476,338 UART: [cold-reset] ++
1,476,882 UART: [fht] Storing FHT @ 0x50003400
1,479,743 UART: [idev] ++
1,479,911 UART: [idev] CDI.KEYID = 6
1,480,271 UART: [idev] SUBJECT.KEYID = 7
1,480,695 UART: [idev] UDS.KEYID = 0
1,481,040 ready_for_fw is high
1,481,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,506,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,629 UART: [idev] --
1,515,726 UART: [ldev] ++
1,515,894 UART: [ldev] CDI.KEYID = 6
1,516,257 UART: [ldev] SUBJECT.KEYID = 5
1,516,683 UART: [ldev] AUTHORITY.KEYID = 7
1,517,146 UART: [ldev] FE.KEYID = 1
1,522,306 UART: [ldev] Erasing FE.KEYID = 1
1,547,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,251 UART: [ldev] --
1,587,522 UART: [fwproc] Waiting for Commands...
1,588,317 UART: [fwproc] Received command 0x46574c44
1,589,108 UART: [fwproc] Received Image of size 114448 bytes
2,887,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,152 >>> mbox cmd response: success
3,080,152 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,081,172 UART: [afmc] ++
3,081,340 UART: [afmc] CDI.KEYID = 6
3,081,702 UART: [afmc] SUBJECT.KEYID = 7
3,082,127 UART: [afmc] AUTHORITY.KEYID = 5
3,117,128 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,184 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,577 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,267 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,326 UART: [afmc] --
3,160,324 UART: [cold-reset] --
3,161,376 UART: [state] Locking Datavault
3,162,689 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,293 UART: [state] Locking ICCM
3,163,729 UART: [exit] Launching FMC @ 0x40000130
3,169,058 UART:
3,169,074 UART: Running Caliptra FMC ...
3,169,482 UART:
3,169,625 UART: [state] CFI Enabled
3,180,380 UART: [fht] FMC Alias Private Key: 7
3,288,241 UART: [art] Extend RT PCRs Done
3,288,669 UART: [art] Lock RT PCRs Done
3,290,033 UART: [art] Populate DV Done
3,298,344 UART: [fht] FMC Alias Private Key: 7
3,299,504 UART: [art] Derive CDI
3,299,784 UART: [art] Store in in slot 0x4
3,385,515 UART: [art] Derive Key Pair
3,385,875 UART: [art] Store priv key in slot 0x5
3,398,263 UART: [art] Derive Key Pair - Done
3,412,934 UART: [art] Signing Cert with AUTHO
3,413,414 UART: RITY.KEYID = 7
3,428,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,551 UART: [art] PUB.X = 186DF593F4E212693C2E2568F23543C8E5088F1A23F15707AEFF00D8C5F4582DADB76151C049DF83C54D57C03201E33D
3,436,290 UART: [art] PUB.Y = 128EAADDC64DD784BD7C5BE57C63AF7E128C32AF416FE225174B2F7638D44F9E6CFADD8F6BDEC7C4AAEDF3BC938D1FB8
3,443,274 UART: [art] SIG.R = 19C23C399D0EE05AD7F6A1EE3EECB3A1CAF93868CFA6766682EAB074F11EB43DD9AF408E81DE8DB6C10BA60BEE3C009A
3,450,041 UART: [art] SIG.S = 4746A61A678F7E79AFB298BC976371379F3ADE3B52675E0D2F8D3F63CC0371B855476CBC645F45BEB3077E029B332EBF
3,474,092 UART: Caliptra RT
3,474,437 UART: [state] CFI Enabled
3,582,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,415 UART: [rt]cmd =0x43455246, len=4
3,625,805 >>> mbox cmd response data (920 bytes)
3,625,806 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,099 UART: [rt]cmd =0x43455252, len=4
3,666,142 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,736 ready_for_fw is high
1,363,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,348 >>> mbox cmd response: success
2,930,348 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,991,852 UART:
2,991,868 UART: Running Caliptra FMC ...
2,992,276 UART:
2,992,419 UART: [state] CFI Enabled
3,003,238 UART: [fht] FMC Alias Private Key: 7
3,111,657 UART: [art] Extend RT PCRs Done
3,112,085 UART: [art] Lock RT PCRs Done
3,113,511 UART: [art] Populate DV Done
3,121,778 UART: [fht] FMC Alias Private Key: 7
3,122,762 UART: [art] Derive CDI
3,123,042 UART: [art] Store in in slot 0x4
3,208,829 UART: [art] Derive Key Pair
3,209,189 UART: [art] Store priv key in slot 0x5
3,223,069 UART: [art] Derive Key Pair - Done
3,238,182 UART: [art] Signing Cert with AUTHO
3,238,662 UART: RITY.KEYID = 7
3,253,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,359 UART: [art] PUB.X = 412E396C931D07E23B39AC65ED1A41E5605E69C7FE18C781C6E826134173BF430ED3FDA105176A9E12896525DCA8338F
3,261,120 UART: [art] PUB.Y = 81EC8D578528683C83AD446E7E0BF832170DFF1C5360E3FF50EA1E7AA1E76490A385BB39EFC9F8D129D65EA449CF458A
3,268,076 UART: [art] SIG.R = AFA6F424C17E6F9205827AE919FAE68A41F2E751FC64AEB5414ABB932E53A9877AEE8FCAF63328329D21646BA12C205E
3,274,855 UART: [art] SIG.S = 12856518E39DB6C96E1361BC1B6E7E865D87EEF992B6E19C6864EFA9AE080A5069AA0784BCF6B0D2E2C7C2817E2D1F09
3,298,922 UART: Caliptra RT
3,299,267 UART: [state] CFI Enabled
3,407,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,238 UART: [rt]cmd =0x43455246, len=4
3,450,422 >>> mbox cmd response data (920 bytes)
3,450,423 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,710 UART: [rt]cmd =0x43455252, len=4
3,490,533 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
892,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,963 UART: [kat] ++
897,115 UART: [kat] sha1
901,255 UART: [kat] SHA2-256
903,195 UART: [kat] SHA2-384
905,952 UART: [kat] SHA2-512-ACC
907,853 UART: [kat] ECC-384
917,648 UART: [kat] HMAC-384Kdf
922,096 UART: [kat] LMS
1,170,424 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,946 UART: [idev] ++
1,175,114 UART: [idev] CDI.KEYID = 6
1,175,474 UART: [idev] SUBJECT.KEYID = 7
1,175,898 UART: [idev] UDS.KEYID = 0
1,176,243 ready_for_fw is high
1,176,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,835 UART: [idev] --
1,211,029 UART: [ldev] ++
1,211,197 UART: [ldev] CDI.KEYID = 6
1,211,560 UART: [ldev] SUBJECT.KEYID = 5
1,211,986 UART: [ldev] AUTHORITY.KEYID = 7
1,212,449 UART: [ldev] FE.KEYID = 1
1,217,657 UART: [ldev] Erasing FE.KEYID = 1
1,244,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,349 UART: [ldev] --
1,283,636 UART: [fwproc] Wait for Commands...
1,284,426 UART: [fwproc] Recv command 0x46574c44
1,285,154 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,238 >>> mbox cmd response: success
2,776,238 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,777,296 UART: [afmc] ++
2,777,464 UART: [afmc] CDI.KEYID = 6
2,777,826 UART: [afmc] SUBJECT.KEYID = 7
2,778,251 UART: [afmc] AUTHORITY.KEYID = 5
2,814,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,299 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,912 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,631 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,425 UART: [afmc] --
2,857,303 UART: [cold-reset] --
2,857,921 UART: [state] Locking Datavault
2,858,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,528 UART: [state] Locking ICCM
2,859,954 UART: [exit] Launching FMC @ 0x40000130
2,865,283 UART:
2,865,299 UART: Running Caliptra FMC ...
2,865,707 UART:
2,865,761 UART: [state] CFI Enabled
2,876,254 UART: [fht] FMC Alias Private Key: 7
2,983,997 UART: [art] Extend RT PCRs Done
2,984,425 UART: [art] Lock RT PCRs Done
2,986,133 UART: [art] Populate DV Done
2,994,314 UART: [fht] FMC Alias Private Key: 7
2,995,416 UART: [art] Derive CDI
2,995,696 UART: [art] Store in in slot 0x4
3,081,317 UART: [art] Derive Key Pair
3,081,677 UART: [art] Store priv key in slot 0x5
3,094,585 UART: [art] Derive Key Pair - Done
3,109,554 UART: [art] Signing Cert with AUTHO
3,110,034 UART: RITY.KEYID = 7
3,124,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,627 UART: [art] PUB.X = 41D55148A538090CBDE09599B6293BEA86D404A596311BD1BD3BD12CCC13100054317F500583ACB55EE6AE39181E90A5
3,132,363 UART: [art] PUB.Y = 9A810DC34533E355719C6522CA7B00031843A2DBFD0135A7FB4B77797E513CF4627CF71FFED1C052140DF8BF25680367
3,139,276 UART: [art] SIG.R = A7F426E158BABF470C07C07DBB23AAF35F458084CBA07816E2E257F3962321D324D46B722B003EBB7E80A3BD84FE65E9
3,146,028 UART: [art] SIG.S = F743CB6A01A28582A68C69A317B7F5A78325D9AAB136C6AA0D72434CD37E9C92825472777BD70A0C2F9AE63249CFB294
3,170,115 UART: Caliptra RT
3,170,368 UART: [state] CFI Enabled
3,277,214 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,928 UART: [rt]cmd =0x43455246, len=4
3,320,068 >>> mbox cmd response data (887 bytes)
3,320,069 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,248 UART: [rt]cmd =0x43455252, len=4
3,360,080 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,193 ready_for_fw is high
1,060,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,333 >>> mbox cmd response: success
2,627,333 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,688,801 UART:
2,688,817 UART: Running Caliptra FMC ...
2,689,225 UART:
2,689,279 UART: [state] CFI Enabled
2,699,678 UART: [fht] FMC Alias Private Key: 7
2,807,889 UART: [art] Extend RT PCRs Done
2,808,317 UART: [art] Lock RT PCRs Done
2,809,801 UART: [art] Populate DV Done
2,818,256 UART: [fht] FMC Alias Private Key: 7
2,819,206 UART: [art] Derive CDI
2,819,486 UART: [art] Store in in slot 0x4
2,905,065 UART: [art] Derive Key Pair
2,905,425 UART: [art] Store priv key in slot 0x5
2,918,191 UART: [art] Derive Key Pair - Done
2,932,739 UART: [art] Signing Cert with AUTHO
2,933,219 UART: RITY.KEYID = 7
2,948,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,472 UART: [art] PUB.X = EABF2850C1B47E26BA87D2F2E622373D92C26631BCB01DBC35C45CA9646FBFF736CC3132337DEA5FF31659B70C376A62
2,956,251 UART: [art] PUB.Y = 5127B1CB355EE9FB99862DEC64A3A3EDF29ECD01E3A156B7592826F4739BD3A0F17E33A8C49C0D188549A6FE6ED65C38
2,963,207 UART: [art] SIG.R = 92EEC74DA01872B69F870C70F3133B7248096B388BD24D5B5995242BBB30124045E93CCCFA1822C8BA69BA4AEEA6CB25
2,969,979 UART: [art] SIG.S = 88D8C7212726B2FE14EB1D79D800DA5BA27E2F8A56F4AEF7295F89EEE845DD962C43A3583693C2900174C8719363F441
2,994,067 UART: Caliptra RT
2,994,320 UART: [state] CFI Enabled
3,101,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,712 UART: [rt]cmd =0x43455246, len=4
3,143,744 >>> mbox cmd response data (887 bytes)
3,143,745 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,280 UART: [rt]cmd =0x43455252, len=4
3,184,042 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,302 UART: [kat] SHA2-256
904,242 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
918,723 UART: [kat] HMAC-384Kdf
923,467 UART: [kat] LMS
1,171,795 UART: [kat] --
1,172,750 UART: [cold-reset] ++
1,173,194 UART: [fht] FHT @ 0x50003400
1,175,753 UART: [idev] ++
1,175,921 UART: [idev] CDI.KEYID = 6
1,176,281 UART: [idev] SUBJECT.KEYID = 7
1,176,705 UART: [idev] UDS.KEYID = 0
1,177,050 ready_for_fw is high
1,177,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,261 UART: [idev] Erasing UDS.KEYID = 0
1,202,364 UART: [idev] Sha1 KeyId Algorithm
1,210,772 UART: [idev] --
1,211,776 UART: [ldev] ++
1,211,944 UART: [ldev] CDI.KEYID = 6
1,212,307 UART: [ldev] SUBJECT.KEYID = 5
1,212,733 UART: [ldev] AUTHORITY.KEYID = 7
1,213,196 UART: [ldev] FE.KEYID = 1
1,218,246 UART: [ldev] Erasing FE.KEYID = 1
1,243,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,772 UART: [ldev] --
1,283,065 UART: [fwproc] Wait for Commands...
1,283,707 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,705 >>> mbox cmd response: success
2,776,705 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,777,939 UART: [afmc] ++
2,778,107 UART: [afmc] CDI.KEYID = 6
2,778,469 UART: [afmc] SUBJECT.KEYID = 7
2,778,894 UART: [afmc] AUTHORITY.KEYID = 5
2,814,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,983 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,702 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,464 UART: [afmc] --
2,858,546 UART: [cold-reset] --
2,859,466 UART: [state] Locking Datavault
2,860,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,307 UART: [state] Locking ICCM
2,861,895 UART: [exit] Launching FMC @ 0x40000130
2,867,224 UART:
2,867,240 UART: Running Caliptra FMC ...
2,867,648 UART:
2,867,791 UART: [state] CFI Enabled
2,878,494 UART: [fht] FMC Alias Private Key: 7
2,986,091 UART: [art] Extend RT PCRs Done
2,986,519 UART: [art] Lock RT PCRs Done
2,987,913 UART: [art] Populate DV Done
2,996,016 UART: [fht] FMC Alias Private Key: 7
2,996,952 UART: [art] Derive CDI
2,997,232 UART: [art] Store in in slot 0x4
3,083,293 UART: [art] Derive Key Pair
3,083,653 UART: [art] Store priv key in slot 0x5
3,097,383 UART: [art] Derive Key Pair - Done
3,112,319 UART: [art] Signing Cert with AUTHO
3,112,799 UART: RITY.KEYID = 7
3,128,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,942 UART: [art] PUB.X = ED2CCADC1A27BB77E89FE6839F2CAF70C9E02CEA524F2BA097324D0A0D7F49C8706C32082C6B6B8552A1633F127D04B5
3,135,714 UART: [art] PUB.Y = 96ECC54A1D2D2711869707C4AB1CA8BC6D66ACC5C43787620EB205681AB7F0FD64EFAA613F964E0092E90DEA3710324A
3,142,640 UART: [art] SIG.R = C747FB8CD2235B439477F251889662BE68A5AA063FCCC61E95B5AB9769E75AA57F88BA97086B9426104FEA83D29833CF
3,149,408 UART: [art] SIG.S = 1EAEB0A3F5BCAF5D479D39A0F4A6F374E5D3D14049F301B562493BD74918B2D4B2FA9491E2E1F5783FB980D05297C468
3,172,760 UART: Caliptra RT
3,173,105 UART: [state] CFI Enabled
3,280,360 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,030 UART: [rt]cmd =0x43455246, len=4
3,323,044 >>> mbox cmd response data (887 bytes)
3,323,045 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,170 UART: [rt]cmd =0x43455252, len=4
3,363,055 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,150 ready_for_fw is high
1,061,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,012 >>> mbox cmd response: success
2,630,012 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,691,254 UART:
2,691,270 UART: Running Caliptra FMC ...
2,691,678 UART:
2,691,821 UART: [state] CFI Enabled
2,702,354 UART: [fht] FMC Alias Private Key: 7
2,810,091 UART: [art] Extend RT PCRs Done
2,810,519 UART: [art] Lock RT PCRs Done
2,811,979 UART: [art] Populate DV Done
2,820,316 UART: [fht] FMC Alias Private Key: 7
2,821,384 UART: [art] Derive CDI
2,821,664 UART: [art] Store in in slot 0x4
2,907,449 UART: [art] Derive Key Pair
2,907,809 UART: [art] Store priv key in slot 0x5
2,921,131 UART: [art] Derive Key Pair - Done
2,935,989 UART: [art] Signing Cert with AUTHO
2,936,469 UART: RITY.KEYID = 7
2,951,463 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,228 UART: [art] PUB.X = 237FBF96B03D1343449ABFDCE787DC08C3CC68451D7DD9BDB1D1F49D8106FADCCA04BA63E755D4F76D76080C84E7F53E
2,959,003 UART: [art] PUB.Y = 238009A12AF5321B06670C7C3DE4C307DD318090E328C6F953776A14FDB53531F8AC38EF4B36D9E98F44D9253E943F9E
2,965,941 UART: [art] SIG.R = 9B4D6036F9FD7A57B970A95A568A878D49A5F885DAAD257DDD04D296B1B236942FA4B7BF546A692E2E4AC5A6D78B4100
2,972,696 UART: [art] SIG.S = 2FD3CF7573F245A03741A0B2709AA25D593CF4F55A10A74B0B102788A4BAAE4688B049D3FA6CD84CA64ACEEED30340B1
2,996,541 UART: Caliptra RT
2,996,886 UART: [state] CFI Enabled
3,104,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,175 UART: [rt]cmd =0x43455246, len=4
3,147,347 >>> mbox cmd response data (887 bytes)
3,147,348 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,561 UART: [rt]cmd =0x43455252, len=4
3,187,384 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,030 UART: [ldev] Erasing FE.KEYID = 1
1,240,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,288 UART: [ldev] --
1,279,704 UART: [fwproc] Wait for Commands...
1,280,399 UART: [fwproc] Recv command 0x46574c44
1,281,132 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,710 >>> mbox cmd response: success
2,772,710 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,773,937 UART: [afmc] ++
2,774,105 UART: [afmc] CDI.KEYID = 6
2,774,468 UART: [afmc] SUBJECT.KEYID = 7
2,774,894 UART: [afmc] AUTHORITY.KEYID = 5
2,810,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,456 UART: [afmc] --
2,853,500 UART: [cold-reset] --
2,854,456 UART: [state] Locking Datavault
2,855,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,457 UART: [state] Locking ICCM
2,856,915 UART: [exit] Launching FMC @ 0x40000130
2,862,244 UART:
2,862,260 UART: Running Caliptra FMC ...
2,862,668 UART:
2,862,722 UART: [state] CFI Enabled
2,873,089 UART: [fht] FMC Alias Private Key: 7
2,981,778 UART: [art] Extend RT PCRs Done
2,982,206 UART: [art] Lock RT PCRs Done
2,983,944 UART: [art] Populate DV Done
2,992,061 UART: [fht] FMC Alias Private Key: 7
2,993,059 UART: [art] Derive CDI
2,993,339 UART: [art] Store in in slot 0x4
3,078,996 UART: [art] Derive Key Pair
3,079,356 UART: [art] Store priv key in slot 0x5
3,092,736 UART: [art] Derive Key Pair - Done
3,107,566 UART: [art] Signing Cert with AUTHO
3,108,046 UART: RITY.KEYID = 7
3,122,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,507 UART: [art] PUB.X = B4D0ED32056BF1CE2262879882C17EB370663BE9A541BA24D74829E89A5BA6B521BB2FF87A4099E023435F82462A79D6
3,130,274 UART: [art] PUB.Y = B87D3E9E93CD1CF971A08A1497B1C84C29610B1E6D9EE80E8A4FADF07BEC58BA603A98CE7D174ED0BC53B6A28BBA5B7C
3,137,244 UART: [art] SIG.R = 08DBC5BF5D172530416A75404BB42CB871F9E89E2468947B853B06D8BEA70E67608C1EBA12F366E22D6C3498821DF07C
3,144,007 UART: [art] SIG.S = E3F67896FC8DDC038D73D797F0E55F376C04A6DB9CB3C74DF5769D27BDDC5AA1FCA1BC1A9E4781C23C8F2826B997375A
3,168,248 UART: Caliptra RT
3,168,501 UART: [state] CFI Enabled
3,277,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,404 UART: [rt]cmd =0x43455246, len=4
3,319,596 >>> mbox cmd response data (887 bytes)
3,319,597 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,748 UART: [rt]cmd =0x43455252, len=4
3,359,747 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,972 ready_for_fw is high
1,054,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,460 >>> mbox cmd response: success
2,622,460 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,128 UART:
2,684,144 UART: Running Caliptra FMC ...
2,684,552 UART:
2,684,606 UART: [state] CFI Enabled
2,694,975 UART: [fht] FMC Alias Private Key: 7
2,803,072 UART: [art] Extend RT PCRs Done
2,803,500 UART: [art] Lock RT PCRs Done
2,805,494 UART: [art] Populate DV Done
2,813,465 UART: [fht] FMC Alias Private Key: 7
2,814,639 UART: [art] Derive CDI
2,814,919 UART: [art] Store in in slot 0x4
2,900,468 UART: [art] Derive Key Pair
2,900,828 UART: [art] Store priv key in slot 0x5
2,913,960 UART: [art] Derive Key Pair - Done
2,928,911 UART: [art] Signing Cert with AUTHO
2,929,391 UART: RITY.KEYID = 7
2,944,485 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,250 UART: [art] PUB.X = 471848350749F15631C1D68CC864FEA0EEEAC1FE4618BC3A0BDB1072E6E8A3B25E6B53DFB4FE6634EA14C16E104EA75E
2,952,030 UART: [art] PUB.Y = 9AAD29EBA3696051449D433170C52713BE3972E468717DF4F8BAC3EF6A0FE3B70C9F0E6B1ED330DD9A623A30EF3D8BD6
2,958,985 UART: [art] SIG.R = DC147452B7539025AA8FAB45A450DFD214D014867454274969D1E02922BD20A7638521E03E8CCFB15DFABBF365BA0EDF
2,965,760 UART: [art] SIG.S = 01371B70E02E942FBDA833254C4B091292918E0D6B22207972B092D57807AF2FD08B6B5C8783295BF8A03C7091D6DA59
2,989,461 UART: Caliptra RT
2,989,714 UART: [state] CFI Enabled
3,097,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,593 UART: [rt]cmd =0x43455246, len=4
3,139,569 >>> mbox cmd response data (887 bytes)
3,139,570 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,909 UART: [rt]cmd =0x43455252, len=4
3,179,784 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,174,836 ready_for_fw is high
1,174,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,582 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,208,510 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,145 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,501 >>> mbox cmd response: success
2,776,501 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,777,628 UART: [afmc] ++
2,777,796 UART: [afmc] CDI.KEYID = 6
2,778,159 UART: [afmc] SUBJECT.KEYID = 7
2,778,585 UART: [afmc] AUTHORITY.KEYID = 5
2,814,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,837 UART: [afmc] --
2,857,725 UART: [cold-reset] --
2,858,711 UART: [state] Locking Datavault
2,859,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,300 UART: [state] Locking ICCM
2,860,802 UART: [exit] Launching FMC @ 0x40000130
2,866,131 UART:
2,866,147 UART: Running Caliptra FMC ...
2,866,555 UART:
2,866,698 UART: [state] CFI Enabled
2,877,285 UART: [fht] FMC Alias Private Key: 7
2,984,722 UART: [art] Extend RT PCRs Done
2,985,150 UART: [art] Lock RT PCRs Done
2,986,780 UART: [art] Populate DV Done
2,994,839 UART: [fht] FMC Alias Private Key: 7
2,995,949 UART: [art] Derive CDI
2,996,229 UART: [art] Store in in slot 0x4
3,081,564 UART: [art] Derive Key Pair
3,081,924 UART: [art] Store priv key in slot 0x5
3,094,724 UART: [art] Derive Key Pair - Done
3,109,508 UART: [art] Signing Cert with AUTHO
3,109,988 UART: RITY.KEYID = 7
3,125,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,173 UART: [art] PUB.X = 03E882B630854A196255EBC73138DA22B55CA732636AB980692D671D73083B500E9302F980CDDD83B122EC1D2733BADC
3,132,929 UART: [art] PUB.Y = 2577EC7A5BA3E3645CF9F7BBDAEF2E6441D33262653BAA6D45F9D3EC13A155DB0038C44AB3674B2144B5BF89559B8A0E
3,139,868 UART: [art] SIG.R = 6A4B7B965517021307D071E0C3B2CA1B19498341CA74FD72B765FE08DD9DBA666A7D64A72962E6F0D059D12D3D57729B
3,146,631 UART: [art] SIG.S = 1DEBAC6B30942BFAB22956F94D63E23A5473D0DEC4A2744F9D204B21DB9261D25468EFAE4795BDC65D193DB19F6176DF
3,170,902 UART: Caliptra RT
3,171,247 UART: [state] CFI Enabled
3,279,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,792 UART: [rt]cmd =0x43455246, len=4
3,321,992 >>> mbox cmd response data (887 bytes)
3,321,993 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,298 UART: [rt]cmd =0x43455252, len=4
3,362,315 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,597 ready_for_fw is high
1,056,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,675 >>> mbox cmd response: success
2,624,675 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,686,585 UART:
2,686,601 UART: Running Caliptra FMC ...
2,687,009 UART:
2,687,152 UART: [state] CFI Enabled
2,697,683 UART: [fht] FMC Alias Private Key: 7
2,805,450 UART: [art] Extend RT PCRs Done
2,805,878 UART: [art] Lock RT PCRs Done
2,807,252 UART: [art] Populate DV Done
2,815,481 UART: [fht] FMC Alias Private Key: 7
2,816,457 UART: [art] Derive CDI
2,816,737 UART: [art] Store in in slot 0x4
2,902,292 UART: [art] Derive Key Pair
2,902,652 UART: [art] Store priv key in slot 0x5
2,915,644 UART: [art] Derive Key Pair - Done
2,930,204 UART: [art] Signing Cert with AUTHO
2,930,684 UART: RITY.KEYID = 7
2,945,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,643 UART: [art] PUB.X = 50EB9AC492D2CA9EBB45587763813AA95C1931C919F62AB839A28AFB43061223DEAA68E4525DD0B038EAF863C399F3E2
2,953,418 UART: [art] PUB.Y = 33FCF52CF02FA5DB68D8A1F27FBA3CF28DE1CAAA8F9BD32A9DDDAE2A79E32AE7680D193C609C3686949C370B6FE348E5
2,960,388 UART: [art] SIG.R = 8B258478C1930DC443CE5037D895E46BB3ADAF7B644DA772BFDDEC7F15132DCD03DFC911C88893775938766542485932
2,967,152 UART: [art] SIG.S = 2F1B1E947F0FBD27263221BE6DB9A3B5FCA050E305A0F791EB2F30B316292D790B7BF8B8FAEA86EA830C0D5E75F21B34
2,991,416 UART: Caliptra RT
2,991,761 UART: [state] CFI Enabled
3,099,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,180 UART: [rt]cmd =0x43455246, len=4
3,141,252 >>> mbox cmd response data (887 bytes)
3,141,253 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,666 UART: [rt]cmd =0x43455252, len=4
3,181,503 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,031 UART:
192,395 UART: Running Caliptra ROM ...
193,572 UART:
193,734 UART: [state] CFI Enabled
267,642 UART: [state] LifecycleState = Unprovisioned
269,570 UART: [state] DebugLocked = No
272,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,711 UART: [kat] SHA2-256
447,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,912 UART: [kat] ++
458,432 UART: [kat] sha1
469,659 UART: [kat] SHA2-256
472,373 UART: [kat] SHA2-384
477,078 UART: [kat] SHA2-512-ACC
479,446 UART: [kat] ECC-384
2,767,711 UART: [kat] HMAC-384Kdf
2,800,214 UART: [kat] LMS
3,990,550 UART: [kat] --
3,995,286 UART: [cold-reset] ++
3,996,655 UART: [fht] Storing FHT @ 0x50003400
4,008,633 UART: [idev] ++
4,009,205 UART: [idev] CDI.KEYID = 6
4,010,150 UART: [idev] SUBJECT.KEYID = 7
4,011,403 UART: [idev] UDS.KEYID = 0
4,012,447 ready_for_fw is high
4,012,653 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,237 UART: [idev] Erasing UDS.KEYID = 0
7,346,837 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,026 UART: [idev] --
7,373,014 UART: [ldev] ++
7,373,580 UART: [ldev] CDI.KEYID = 6
7,374,518 UART: [ldev] SUBJECT.KEYID = 5
7,375,730 UART: [ldev] AUTHORITY.KEYID = 7
7,377,018 UART: [ldev] FE.KEYID = 1
7,420,545 UART: [ldev] Erasing FE.KEYID = 1
10,753,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,832 UART: [ldev] --
13,134,040 UART: [fwproc] Waiting for Commands...
13,136,027 UART: [fwproc] Received command 0x46574c44
13,138,210 UART: [fwproc] Received Image of size 114124 bytes
17,194,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,459 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,657,859 >>> mbox cmd response: success
17,658,359 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,662,069 UART: [afmc] ++
17,662,659 UART: [afmc] CDI.KEYID = 6
17,663,548 UART: [afmc] SUBJECT.KEYID = 7
17,664,823 UART: [afmc] AUTHORITY.KEYID = 5
21,028,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,863 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,248 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,103 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,373,471 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,393,890 UART: [afmc] --
23,397,309 UART: [cold-reset] --
23,400,962 UART: [state] Locking Datavault
23,406,203 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,952 UART: [state] Locking ICCM
23,409,647 UART: [exit] Launching FMC @ 0x40000130
23,418,039 UART:
23,418,274 UART: Running Caliptra FMC ...
23,419,374 UART:
23,419,533 UART: [state] CFI Enabled
23,488,447 UART: [fht] FMC Alias Private Key: 7
25,826,594 UART: [art] Extend RT PCRs Done
25,827,818 UART: [art] Lock RT PCRs Done
25,829,258 UART: [art] Populate DV Done
25,834,781 UART: [fht] FMC Alias Private Key: 7
25,836,434 UART: [art] Derive CDI
25,837,173 UART: [art] Store in in slot 0x4
25,896,459 UART: [art] Derive Key Pair
25,897,497 UART: [art] Store priv key in slot 0x5
29,190,352 UART: [art] Derive Key Pair - Done
29,203,833 UART: [art] Signing Cert with AUTHO
29,205,134 UART: RITY.KEYID = 7
31,491,268 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,771 UART: [art] PUB.X = 4815C68D3AB16884787D4730E689EE909B64DFC3250EA209AD5BCE349E7CEC87B22C79A2874E7EFC3A5984FFA80A4AF7
31,500,032 UART: [art] PUB.Y = A7EFB789A0C5C3B10AC3426B842D9D0C07585A17646F3FB165A7E4E3D0E0326EF127E3D096005B44870BF274548CD52A
31,507,277 UART: [art] SIG.R = E89C68C5E16A3164C996DB346FD304AB783FF42165E8F9EDEF8C53FE088A49798ACEA02B311377FA0BFDF2ACD37DA3AF
31,514,674 UART: [art] SIG.S = 1B1CD4AF7CE0F71383529AD0728AF0A8F388BDB71739E6B2CADE6854BC5A3567BECC5CA1CE0EA4BA195FDA23A0F20A2B
32,819,705 UART: Caliptra RT
32,820,408 UART: [state] CFI Enabled
32,980,520 UART: [rt] RT listening for mailbox commands...
33,011,818 UART: [rt]cmd =0x43455252, len=4
33,023,214 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,783,397 ready_for_fw is high
3,783,788 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,883,346 >>> mbox cmd response: success
17,883,912 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,585,469 UART:
23,585,865 UART: Running Caliptra FMC ...
23,587,001 UART:
23,587,162 UART: [state] CFI Enabled
23,652,150 UART: [fht] FMC Alias Private Key: 7
25,990,188 UART: [art] Extend RT PCRs Done
25,991,410 UART: [art] Lock RT PCRs Done
25,993,256 UART: [art] Populate DV Done
25,998,463 UART: [fht] FMC Alias Private Key: 7
26,000,169 UART: [art] Derive CDI
26,000,992 UART: [art] Store in in slot 0x4
26,061,113 UART: [art] Derive Key Pair
26,062,159 UART: [art] Store priv key in slot 0x5
29,355,349 UART: [art] Derive Key Pair - Done
29,368,505 UART: [art] Signing Cert with AUTHO
29,369,809 UART: RITY.KEYID = 7
31,657,239 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,763 UART: [art] PUB.X = 3F2B241EB252672359AFA1CFAB972F5BE0613440AF537069E0EEBEC9141C84E1486A073AE9F9B567E077D7D658AF0F9B
31,666,018 UART: [art] PUB.Y = 290B5D39E0C8E373F8AB181DB8682AE578697FEC0CC5263F2EC9225A9BC9D53847FAC5C5D102630448B05BC41E3D3914
31,673,255 UART: [art] SIG.R = 0DD946F59DE129F86D56ED7E18B8679C4419A8C40DD95B791EBC880302EC5C96243849B972F4B1487044925DF7ABE627
31,680,641 UART: [art] SIG.S = E866CCFE28CB006C1F8D30D99FCBF6A32745BF4BD6B7F4129898D4AC51E55ED10F9552E7D0626ED87D5A19C5744699F5
32,985,764 UART: Caliptra RT
32,986,479 UART: [state] CFI Enabled
33,147,035 UART: [rt] RT listening for mailbox commands...
33,178,452 UART: [rt]cmd =0x43455252, len=4
33,189,948 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,409 UART:
192,767 UART: Running Caliptra ROM ...
193,959 UART:
603,641 UART: [state] CFI Enabled
618,009 UART: [state] LifecycleState = Unprovisioned
619,956 UART: [state] DebugLocked = No
622,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,772 UART: [kat] SHA2-256
796,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,069 UART: [kat] ++
807,531 UART: [kat] sha1
818,683 UART: [kat] SHA2-256
821,335 UART: [kat] SHA2-384
827,036 UART: [kat] SHA2-512-ACC
829,399 UART: [kat] ECC-384
3,113,380 UART: [kat] HMAC-384Kdf
3,126,212 UART: [kat] LMS
4,316,323 UART: [kat] --
4,321,627 UART: [cold-reset] ++
4,323,493 UART: [fht] Storing FHT @ 0x50003400
4,334,896 UART: [idev] ++
4,335,455 UART: [idev] CDI.KEYID = 6
4,336,484 UART: [idev] SUBJECT.KEYID = 7
4,337,649 UART: [idev] UDS.KEYID = 0
4,338,682 ready_for_fw is high
4,338,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,311 UART: [idev] Erasing UDS.KEYID = 0
7,623,088 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,523 UART: [idev] --
7,648,508 UART: [ldev] ++
7,649,072 UART: [ldev] CDI.KEYID = 6
7,650,009 UART: [ldev] SUBJECT.KEYID = 5
7,651,218 UART: [ldev] AUTHORITY.KEYID = 7
7,652,497 UART: [ldev] FE.KEYID = 1
7,663,662 UART: [ldev] Erasing FE.KEYID = 1
10,956,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,119 UART: [ldev] --
13,319,376 UART: [fwproc] Waiting for Commands...
13,322,171 UART: [fwproc] Received command 0x46574c44
13,324,348 UART: [fwproc] Received Image of size 114124 bytes
17,379,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,462,351 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,531,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,847,788 >>> mbox cmd response: success
17,848,277 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,853,224 UART: [afmc] ++
17,853,798 UART: [afmc] CDI.KEYID = 6
17,854,762 UART: [afmc] SUBJECT.KEYID = 7
17,855,972 UART: [afmc] AUTHORITY.KEYID = 5
21,167,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,838 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,212 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,077 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,506,445 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,527,933 UART: [afmc] --
23,531,530 UART: [cold-reset] --
23,536,144 UART: [state] Locking Datavault
23,539,444 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,189 UART: [state] Locking ICCM
23,543,770 UART: [exit] Launching FMC @ 0x40000130
23,552,161 UART:
23,552,391 UART: Running Caliptra FMC ...
23,553,488 UART:
23,553,649 UART: [state] CFI Enabled
23,561,961 UART: [fht] FMC Alias Private Key: 7
25,892,999 UART: [art] Extend RT PCRs Done
25,894,219 UART: [art] Lock RT PCRs Done
25,896,113 UART: [art] Populate DV Done
25,901,534 UART: [fht] FMC Alias Private Key: 7
25,903,233 UART: [art] Derive CDI
25,903,996 UART: [art] Store in in slot 0x4
25,946,603 UART: [art] Derive Key Pair
25,947,600 UART: [art] Store priv key in slot 0x5
29,189,816 UART: [art] Derive Key Pair - Done
29,203,241 UART: [art] Signing Cert with AUTHO
29,204,542 UART: RITY.KEYID = 7
31,484,051 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,561 UART: [art] PUB.X = 8326418886470E1ABBAE61746E95B8A5349AF9386C3D7F2A7B64673B6CFF80A35DBC9019E0056067EAD8335F14A8F3AC
31,492,793 UART: [art] PUB.Y = C6841962108188ED87B7B179247B8DA07DF88BFC3998E23462B965D859F2A57CCFAF519AF509F85D47EC8A9D64132D07
31,500,026 UART: [art] SIG.R = D68E2B8573923FB1D269EF9EDA1AFAE0E2D7DDF6166BB9B53F42B6E4FCF9EFD144C0B7A9DC5CD279F59FA8C14A880AE9
31,507,522 UART: [art] SIG.S = 0A17FC131FEEF9523D7B0328DA3C7CE2FDCB2159B8E6F65B628441CA6CFD31594854BC5C7E48642A822D90DF9B9B603B
32,812,175 UART: Caliptra RT
32,812,885 UART: [state] CFI Enabled
32,930,111 UART: [rt] RT listening for mailbox commands...
32,961,644 UART: [rt]cmd =0x43455252, len=4
32,972,873 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,133,104 ready_for_fw is high
4,133,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,214 >>> mbox cmd response: success
18,073,858 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,714,538 UART:
23,714,927 UART: Running Caliptra FMC ...
23,716,073 UART:
23,716,228 UART: [state] CFI Enabled
23,724,441 UART: [fht] FMC Alias Private Key: 7
26,055,389 UART: [art] Extend RT PCRs Done
26,056,621 UART: [art] Lock RT PCRs Done
26,058,570 UART: [art] Populate DV Done
26,063,795 UART: [fht] FMC Alias Private Key: 7
26,065,290 UART: [art] Derive CDI
26,066,053 UART: [art] Store in in slot 0x4
26,108,599 UART: [art] Derive Key Pair
26,109,645 UART: [art] Store priv key in slot 0x5
29,351,740 UART: [art] Derive Key Pair - Done
29,364,853 UART: [art] Signing Cert with AUTHO
29,366,149 UART: RITY.KEYID = 7
31,645,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,073 UART: [art] PUB.X = 4850BF58413998BA5FE5B914F4A52F76FE015CC895190B2CF57AA5E6F32D4DBB1CACE0AA42D653973E80791027881158
31,654,326 UART: [art] PUB.Y = BC0EEBB17871885C77162CF1C0B53529F6DED613F478A1CC76D29F2C3E22D07AFDF317C1C83B7DEAB4EAE0490C4A3C8C
31,661,583 UART: [art] SIG.R = 948D14F3DC95BE3AD37A23236DC41FAF6CCC85354BF1C5816BB4AC97F86A7E4B1D3B597DE2ACF31DD0494CC0294E1E3D
31,668,969 UART: [art] SIG.S = 0F9EA2CEB101518C3BA041771B1680A220BB032A4859CF21233FA06EF4459423E5E0EFEFE2E79DC34DCB670359B3F34F
32,974,885 UART: Caliptra RT
32,975,602 UART: [state] CFI Enabled
33,093,373 UART: [rt] RT listening for mailbox commands...
33,124,426 UART: [rt]cmd =0x43455252, len=4
33,135,725 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,214 UART:
192,578 UART: Running Caliptra ROM ...
193,767 UART:
193,922 UART: [state] CFI Enabled
265,577 UART: [state] LifecycleState = Unprovisioned
267,491 UART: [state] DebugLocked = No
270,301 UART: [state] WD Timer not started. Device not locked for debugging
274,612 UART: [kat] SHA2-256
453,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,331 UART: [kat] ++
465,779 UART: [kat] sha1
476,069 UART: [kat] SHA2-256
479,096 UART: [kat] SHA2-384
484,385 UART: [kat] SHA2-512-ACC
487,389 UART: [kat] ECC-384
2,948,714 UART: [kat] HMAC-384Kdf
2,971,318 UART: [kat] LMS
3,500,754 UART: [kat] --
3,503,972 UART: [cold-reset] ++
3,505,902 UART: [fht] FHT @ 0x50003400
3,517,849 UART: [idev] ++
3,518,418 UART: [idev] CDI.KEYID = 6
3,519,301 UART: [idev] SUBJECT.KEYID = 7
3,520,542 UART: [idev] UDS.KEYID = 0
3,521,469 ready_for_fw is high
3,521,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,470 UART: [idev] Erasing UDS.KEYID = 0
6,023,259 UART: [idev] Sha1 KeyId Algorithm
6,045,132 UART: [idev] --
6,048,419 UART: [ldev] ++
6,048,986 UART: [ldev] CDI.KEYID = 6
6,049,874 UART: [ldev] SUBJECT.KEYID = 5
6,051,091 UART: [ldev] AUTHORITY.KEYID = 7
6,052,325 UART: [ldev] FE.KEYID = 1
6,078,916 UART: [ldev] Erasing FE.KEYID = 1
8,581,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,189 UART: [ldev] --
10,392,666 UART: [fwproc] Wait for Commands...
10,395,364 UART: [fwproc] Recv command 0x46574c44
10,397,456 UART: [fwproc] Recv'd Img size: 114448 bytes
13,806,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,233 >>> mbox cmd response: success
14,267,721 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,272,707 UART: [afmc] ++
14,273,292 UART: [afmc] CDI.KEYID = 6
14,274,174 UART: [afmc] SUBJECT.KEYID = 7
14,275,396 UART: [afmc] AUTHORITY.KEYID = 5
16,810,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,155 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,585,010 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,606,256 UART: [afmc] --
18,609,790 UART: [cold-reset] --
18,613,271 UART: [state] Locking Datavault
18,618,944 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,644 UART: [state] Locking ICCM
18,622,934 UART: [exit] Launching FMC @ 0x40000130
18,631,388 UART:
18,631,664 UART: Running Caliptra FMC ...
18,632,697 UART:
18,632,844 UART: [state] CFI Enabled
18,693,067 UART: [fht] FMC Alias Private Key: 7
20,456,856 UART: [art] Extend RT PCRs Done
20,458,079 UART: [art] Lock RT PCRs Done
20,459,521 UART: [art] Populate DV Done
20,464,752 UART: [fht] FMC Alias Private Key: 7
20,466,353 UART: [art] Derive CDI
20,467,291 UART: [art] Store in in slot 0x4
20,525,838 UART: [art] Derive Key Pair
20,526,842 UART: [art] Store priv key in slot 0x5
22,989,839 UART: [art] Derive Key Pair - Done
23,002,838 UART: [art] Signing Cert with AUTHO
23,004,151 UART: RITY.KEYID = 7
24,716,018 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,525 UART: [art] PUB.X = DCC0E3609484D244C5BFBB2239B04216CF7D30C058009413FF532404179C25CFB0FDA0338C51CB974371F1B7B1822440
24,724,722 UART: [art] PUB.Y = 2858DD8BE2C142443D5188AADEF5F06F554F6A59C6EB3D8D68B4EBB915CB8FF5F5E86FD9524DEFC0A3575052BEDC65B5
24,732,061 UART: [art] SIG.R = CAD58D692EE2AF35688C0521C3EAA46264FAEEACB780785CCAAD6B8E08C0CCB343B7209CE257EA32257120337382A3A1
24,739,448 UART: [art] SIG.S = 77539468F21E8D1F9727E95FE517D6822CF7949B9C2E302358BD8656FB91BAC1BA91919BAA6C201927449799180EBA74
25,718,621 UART: Caliptra RT
25,719,324 UART: [state] CFI Enabled
25,884,716 UART: [rt] RT listening for mailbox commands...
25,916,059 UART: [rt]cmd =0x43455252, len=4
25,927,451 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,383,246 ready_for_fw is high
3,383,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,425 >>> mbox cmd response: success
14,059,075 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,343,992 UART:
18,344,411 UART: Running Caliptra FMC ...
18,345,553 UART:
18,345,711 UART: [state] CFI Enabled
18,412,428 UART: [fht] FMC Alias Private Key: 7
20,177,288 UART: [art] Extend RT PCRs Done
20,178,519 UART: [art] Lock RT PCRs Done
20,180,009 UART: [art] Populate DV Done
20,185,155 UART: [fht] FMC Alias Private Key: 7
20,186,758 UART: [art] Derive CDI
20,187,575 UART: [art] Store in in slot 0x4
20,245,141 UART: [art] Derive Key Pair
20,246,186 UART: [art] Store priv key in slot 0x5
22,709,769 UART: [art] Derive Key Pair - Done
22,722,694 UART: [art] Signing Cert with AUTHO
22,724,022 UART: RITY.KEYID = 7
24,435,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,204 UART: [art] PUB.X = 6F071BBAC90F1488BBCA935D978EA31EF2F9AA0917495932C49F02D7AB01EB1179FF05DECF6C94ABDE4D6FCCADDE730F
24,444,470 UART: [art] PUB.Y = E6580E6B5BC59D3E0A87D28061516A14A3F5C79FF33DFF31C6E53735C4A364C2502B8C68854878B135678F450DEBC811
24,451,697 UART: [art] SIG.R = 64ECEC65050C74B00FF71EDC7FC91933DDB81CEC2B9C463842F166BAA280B202551EC2FE5DA17838E64F3B80F008A08D
24,459,101 UART: [art] SIG.S = C5DEEF009A32D1AE38F4D73F60ACC647C88F5169288D31128114BA0983A73A58B8744FA555C33BBCE31E8F03A5F949B9
25,437,933 UART: Caliptra RT
25,438,640 UART: [state] CFI Enabled
25,604,246 UART: [rt] RT listening for mailbox commands...
25,635,847 UART: [rt]cmd =0x43455252, len=4
25,647,473 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,335 UART:
192,705 UART: Running Caliptra ROM ...
193,892 UART:
603,506 UART: [state] CFI Enabled
616,334 UART: [state] LifecycleState = Unprovisioned
618,215 UART: [state] DebugLocked = No
620,585 UART: [state] WD Timer not started. Device not locked for debugging
624,964 UART: [kat] SHA2-256
804,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,642 UART: [kat] ++
816,239 UART: [kat] sha1
827,965 UART: [kat] SHA2-256
831,035 UART: [kat] SHA2-384
837,157 UART: [kat] SHA2-512-ACC
840,104 UART: [kat] ECC-384
3,281,375 UART: [kat] HMAC-384Kdf
3,293,846 UART: [kat] LMS
3,823,341 UART: [kat] --
3,828,684 UART: [cold-reset] ++
3,829,542 UART: [fht] FHT @ 0x50003400
3,839,881 UART: [idev] ++
3,840,477 UART: [idev] CDI.KEYID = 6
3,841,356 UART: [idev] SUBJECT.KEYID = 7
3,842,591 UART: [idev] UDS.KEYID = 0
3,843,481 ready_for_fw is high
3,843,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,314 UART: [idev] Erasing UDS.KEYID = 0
6,310,559 UART: [idev] Sha1 KeyId Algorithm
6,333,079 UART: [idev] --
6,337,858 UART: [ldev] ++
6,338,453 UART: [ldev] CDI.KEYID = 6
6,339,361 UART: [ldev] SUBJECT.KEYID = 5
6,340,514 UART: [ldev] AUTHORITY.KEYID = 7
6,341,791 UART: [ldev] FE.KEYID = 1
6,350,966 UART: [ldev] Erasing FE.KEYID = 1
8,828,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,589 UART: [ldev] --
10,619,674 UART: [fwproc] Wait for Commands...
10,621,431 UART: [fwproc] Recv command 0x46574c44
10,623,509 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,588 >>> mbox cmd response: success
14,494,076 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,499,116 UART: [afmc] ++
14,499,696 UART: [afmc] CDI.KEYID = 6
14,500,764 UART: [afmc] SUBJECT.KEYID = 7
14,501,866 UART: [afmc] AUTHORITY.KEYID = 5
17,001,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,515 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,770,363 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,793,014 UART: [afmc] --
18,796,290 UART: [cold-reset] --
18,799,380 UART: [state] Locking Datavault
18,805,836 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,479 UART: [state] Locking ICCM
18,808,758 UART: [exit] Launching FMC @ 0x40000130
18,817,149 UART:
18,817,387 UART: Running Caliptra FMC ...
18,818,482 UART:
18,818,631 UART: [state] CFI Enabled
18,826,668 UART: [fht] FMC Alias Private Key: 7
20,583,693 UART: [art] Extend RT PCRs Done
20,584,910 UART: [art] Lock RT PCRs Done
20,586,470 UART: [art] Populate DV Done
20,592,034 UART: [fht] FMC Alias Private Key: 7
20,593,672 UART: [art] Derive CDI
20,594,481 UART: [art] Store in in slot 0x4
20,636,967 UART: [art] Derive Key Pair
20,637,995 UART: [art] Store priv key in slot 0x5
23,064,497 UART: [art] Derive Key Pair - Done
23,077,721 UART: [art] Signing Cert with AUTHO
23,079,025 UART: RITY.KEYID = 7
24,784,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,828 UART: [art] PUB.X = 25A94213B6FCB252171C1F4FE6E4EC8257BF6478F227976B47824DB6CF4E936F705B2C15D84FA982F306B4C78A0F651D
24,793,129 UART: [art] PUB.Y = 960E548C2B3990DAEBCF9BF29DB363286D00ECE098121B942E448683A6EF64790412C1A0F22330F93DA3B1EC3361B0DB
24,800,387 UART: [art] SIG.R = DA3CA6A9F97BB3DDA3CC8A67E7C1A1124181DBB90CEE8E1E6374309240575CDB67196A666349EA5CB9580AE626C6DAA0
24,807,774 UART: [art] SIG.S = A6B71C1DCCF0BB5BDDA2B63BCBF63D40E6297FA37FB6E5A6F85C8FE7A89B6948791E36D22470F91DAC64EFD3E5E149F2
25,786,965 UART: Caliptra RT
25,787,674 UART: [state] CFI Enabled
25,904,827 UART: [rt] RT listening for mailbox commands...
25,936,113 UART: [rt]cmd =0x43455252, len=4
25,947,707 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,698,021 ready_for_fw is high
3,698,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,980 >>> mbox cmd response: success
14,269,864 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,520,216 UART:
18,520,596 UART: Running Caliptra FMC ...
18,521,787 UART:
18,521,947 UART: [state] CFI Enabled
18,529,830 UART: [fht] FMC Alias Private Key: 7
20,286,672 UART: [art] Extend RT PCRs Done
20,287,906 UART: [art] Lock RT PCRs Done
20,289,373 UART: [art] Populate DV Done
20,294,886 UART: [fht] FMC Alias Private Key: 7
20,296,477 UART: [art] Derive CDI
20,297,454 UART: [art] Store in in slot 0x4
20,339,843 UART: [art] Derive Key Pair
20,340,846 UART: [art] Store priv key in slot 0x5
22,767,307 UART: [art] Derive Key Pair - Done
22,780,422 UART: [art] Signing Cert with AUTHO
22,781,758 UART: RITY.KEYID = 7
24,487,583 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,097 UART: [art] PUB.X = 9AD9522D9ACA4BEA8D14C7213D04F78FFE3C82524C2284CAA40146D08AF4ECF8046E5BBB0CE46C64B9AFBF6C71AF8BB8
24,496,398 UART: [art] PUB.Y = FD0E5351BF6B36F1BF9ADE6803CFE46EC5D1D8120F98CC653053E762E096C2ACA2DAC649AE63D49B446FAB8F2AF5D721
24,503,714 UART: [art] SIG.R = 9347A9EF1BE0D46CC92E9B2CB9DEFF12D57C410D8943142490B7AB17D38CB8D410B8B96D018254679C8985AC01378B27
24,511,043 UART: [art] SIG.S = 3C66F66DFECEF821D7262485ED8756C97ECBB41F098ED633785A4B2F7A9B842F90653988950948C407EEF1C612C42AF5
25,489,479 UART: Caliptra RT
25,490,191 UART: [state] CFI Enabled
25,607,182 UART: [rt] RT listening for mailbox commands...
25,638,547 UART: [rt]cmd =0x43455252, len=4
25,650,110 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,990 UART:
192,352 UART: Running Caliptra ROM ...
193,505 UART:
193,656 UART: [state] CFI Enabled
261,888 UART: [state] LifecycleState = Unprovisioned
264,251 UART: [state] DebugLocked = No
266,886 UART: [state] WD Timer not started. Device not locked for debugging
271,523 UART: [kat] SHA2-256
461,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,188 UART: [kat] ++
472,727 UART: [kat] sha1
484,176 UART: [kat] SHA2-256
487,185 UART: [kat] SHA2-384
492,318 UART: [kat] SHA2-512-ACC
494,897 UART: [kat] ECC-384
2,946,899 UART: [kat] HMAC-384Kdf
2,971,567 UART: [kat] LMS
3,503,378 UART: [kat] --
3,508,080 UART: [cold-reset] ++
3,509,589 UART: [fht] FHT @ 0x50003400
3,521,773 UART: [idev] ++
3,522,480 UART: [idev] CDI.KEYID = 6
3,523,510 UART: [idev] SUBJECT.KEYID = 7
3,524,635 UART: [idev] UDS.KEYID = 0
3,525,568 ready_for_fw is high
3,525,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,727 UART: [idev] Erasing UDS.KEYID = 0
6,029,446 UART: [idev] Sha1 KeyId Algorithm
6,052,865 UART: [idev] --
6,057,947 UART: [ldev] ++
6,058,627 UART: [ldev] CDI.KEYID = 6
6,059,549 UART: [ldev] SUBJECT.KEYID = 5
6,060,709 UART: [ldev] AUTHORITY.KEYID = 7
6,061,938 UART: [ldev] FE.KEYID = 1
6,099,489 UART: [ldev] Erasing FE.KEYID = 1
8,607,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,855 UART: [ldev] --
10,415,495 UART: [fwproc] Wait for Commands...
10,418,501 UART: [fwproc] Recv command 0x46574c44
10,420,805 UART: [fwproc] Recv'd Img size: 114448 bytes
13,876,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,612,146 >>> mbox cmd response: success
14,612,669 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,617,122 UART: [afmc] ++
14,617,820 UART: [afmc] CDI.KEYID = 6
14,619,013 UART: [afmc] SUBJECT.KEYID = 7
14,620,452 UART: [afmc] AUTHORITY.KEYID = 5
17,151,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,679 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,939,724 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,963,823 UART: [afmc] --
18,968,232 UART: [cold-reset] --
18,973,175 UART: [state] Locking Datavault
18,978,585 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,720 UART: [state] Locking ICCM
18,982,314 UART: [exit] Launching FMC @ 0x40000130
18,991,003 UART:
18,991,273 UART: Running Caliptra FMC ...
18,992,381 UART:
18,992,537 UART: [state] CFI Enabled
19,050,811 UART: [fht] FMC Alias Private Key: 7
20,815,327 UART: [art] Extend RT PCRs Done
20,816,565 UART: [art] Lock RT PCRs Done
20,818,187 UART: [art] Populate DV Done
20,823,545 UART: [fht] FMC Alias Private Key: 7
20,825,286 UART: [art] Derive CDI
20,826,112 UART: [art] Store in in slot 0x4
20,883,446 UART: [art] Derive Key Pair
20,884,445 UART: [art] Store priv key in slot 0x5
23,347,293 UART: [art] Derive Key Pair - Done
23,360,561 UART: [art] Signing Cert with AUTHO
23,361,859 UART: RITY.KEYID = 7
25,073,087 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,604 UART: [art] PUB.X = E64D465BCA26F5C5836689991F890A937D27B05A36D26A1F99137C1216223C77D76771C6EACE7D3C6728E9F51B7484E7
25,081,791 UART: [art] PUB.Y = 26D16B68A0E29DE52A799D3139EE628844B39A87E95BF72BC207BE06ECFE74EE7691E8E1FBFD6DE153C2619C31354983
25,089,081 UART: [art] SIG.R = 97D78F8A7DDE9BA7769118F9A86EB8C01025D9B204D1DD5D669268F3F6F0D3E7798E04FA617955F73E5C7C7719157B0C
25,096,465 UART: [art] SIG.S = 2A7374B34DE39F7AB85355620E5768D6487B1431D1F4F263D135191BA9E4F7448C641AD472208BDE2141D5CA4B62D5DB
26,075,442 UART: Caliptra RT
26,076,173 UART: [state] CFI Enabled
26,241,273 UART: [rt] RT listening for mailbox commands...
26,272,688 UART: [rt]cmd =0x43455252, len=4
26,284,291 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,437,952 ready_for_fw is high
3,438,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,745,051 >>> mbox cmd response: success
14,745,650 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,025,845 UART:
19,026,244 UART: Running Caliptra FMC ...
19,027,346 UART:
19,027,504 UART: [state] CFI Enabled
19,095,056 UART: [fht] FMC Alias Private Key: 7
20,858,422 UART: [art] Extend RT PCRs Done
20,859,644 UART: [art] Lock RT PCRs Done
20,861,354 UART: [art] Populate DV Done
20,866,762 UART: [fht] FMC Alias Private Key: 7
20,868,246 UART: [art] Derive CDI
20,868,982 UART: [art] Store in in slot 0x4
20,926,647 UART: [art] Derive Key Pair
20,927,690 UART: [art] Store priv key in slot 0x5
23,390,357 UART: [art] Derive Key Pair - Done
23,403,190 UART: [art] Signing Cert with AUTHO
23,404,490 UART: RITY.KEYID = 7
25,116,251 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,792 UART: [art] PUB.X = ED307173DB157A5A7CC51C01CA6B337F6C827D62313F023E34B2E7B81256219204035567C219FFB8CE390CBCD36492B2
25,125,043 UART: [art] PUB.Y = FDF7D5C7B24297B2E05D4C05389E3527EB943C0BB3B6B715A12B4C7E6D31D4CDE1AEEC6218A85D67651FF0C065DFD496
25,132,313 UART: [art] SIG.R = CAA0BF90A68215D38FE695214114C433A59DD6E44BAEF802E3B64EE14AA8E7E5BDDFF8ED6E992207C66008DFC75894CF
25,139,791 UART: [art] SIG.S = E026CF8922B3ADFD68D166D5B1F9E25B65D6C66A388EF645B2F75606C602ECA5450BA08D277FA6C5CDA4F4591A1E365C
26,118,684 UART: Caliptra RT
26,119,386 UART: [state] CFI Enabled
26,285,138 UART: [rt] RT listening for mailbox commands...
26,316,396 UART: [rt]cmd =0x43455252, len=4
26,327,911 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,883 writing to cptra_bootfsm_go
194,183 UART:
194,554 UART: Running Caliptra ROM ...
195,744 UART:
605,193 UART: [state] CFI Enabled
621,266 UART: [state] LifecycleState = Unprovisioned
623,630 UART: [state] DebugLocked = No
625,858 UART: [state] WD Timer not started. Device not locked for debugging
629,761 UART: [kat] SHA2-256
819,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,452 UART: [kat] ++
830,930 UART: [kat] sha1
842,861 UART: [kat] SHA2-256
845,869 UART: [kat] SHA2-384
852,136 UART: [kat] SHA2-512-ACC
854,778 UART: [kat] ECC-384
3,297,049 UART: [kat] HMAC-384Kdf
3,309,289 UART: [kat] LMS
3,841,116 UART: [kat] --
3,846,036 UART: [cold-reset] ++
3,847,710 UART: [fht] FHT @ 0x50003400
3,859,113 UART: [idev] ++
3,859,820 UART: [idev] CDI.KEYID = 6
3,860,777 UART: [idev] SUBJECT.KEYID = 7
3,861,960 UART: [idev] UDS.KEYID = 0
3,862,884 ready_for_fw is high
3,863,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,896 UART: [idev] Erasing UDS.KEYID = 0
6,342,415 UART: [idev] Sha1 KeyId Algorithm
6,366,451 UART: [idev] --
6,369,894 UART: [ldev] ++
6,370,567 UART: [ldev] CDI.KEYID = 6
6,371,497 UART: [ldev] SUBJECT.KEYID = 5
6,372,708 UART: [ldev] AUTHORITY.KEYID = 7
6,373,879 UART: [ldev] FE.KEYID = 1
6,383,660 UART: [ldev] Erasing FE.KEYID = 1
8,863,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,761 UART: [ldev] --
10,654,381 UART: [fwproc] Wait for Commands...
10,657,123 UART: [fwproc] Recv command 0x46574c44
10,659,376 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,960 >>> mbox cmd response: success
14,848,477 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,852,394 UART: [afmc] ++
14,853,088 UART: [afmc] CDI.KEYID = 6
14,854,249 UART: [afmc] SUBJECT.KEYID = 7
14,855,789 UART: [afmc] AUTHORITY.KEYID = 5
17,359,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,866 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
19,128,951 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
19,153,865 UART: [afmc] --
19,157,939 UART: [cold-reset] --
19,162,548 UART: [state] Locking Datavault
19,168,278 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,417 UART: [state] Locking ICCM
19,171,860 UART: [exit] Launching FMC @ 0x40000130
19,180,525 UART:
19,180,755 UART: Running Caliptra FMC ...
19,181,846 UART:
19,181,994 UART: [state] CFI Enabled
19,189,599 UART: [fht] FMC Alias Private Key: 7
20,946,748 UART: [art] Extend RT PCRs Done
20,947,983 UART: [art] Lock RT PCRs Done
20,949,791 UART: [art] Populate DV Done
20,955,303 UART: [fht] FMC Alias Private Key: 7
20,957,049 UART: [art] Derive CDI
20,957,856 UART: [art] Store in in slot 0x4
21,000,284 UART: [art] Derive Key Pair
21,001,327 UART: [art] Store priv key in slot 0x5
23,428,088 UART: [art] Derive Key Pair - Done
23,441,351 UART: [art] Signing Cert with AUTHO
23,442,644 UART: RITY.KEYID = 7
25,148,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,695 UART: [art] PUB.X = E995BCE1B93DE2FD7F60827A2DD71170F680AF3C419DED60A941860C2CBF7D88F325BC85C67CCDCD61DAFBEAC4871C5A
25,156,979 UART: [art] PUB.Y = 45629D3273E8EDD3FFAE0E40B74D6503293858722FA0C8D9BC9EF746807465DB736F2D7997FB3C072A08739EF8506119
25,164,254 UART: [art] SIG.R = 5EA2E752AD58BA9DF261AD8C1AB0626A6131E560F7CDEE9E1DDD3D48046A8EDD5F1A002790D30181CB372699A4A6CBC7
25,171,628 UART: [art] SIG.S = B4B915B3B8CA7B945EBFF2756375D2CBC86CAA0FF3CA479E986AFA353A08D59ABD9CEB4944180C3EE1DC659387E92DE8
26,150,747 UART: Caliptra RT
26,151,450 UART: [state] CFI Enabled
26,268,185 UART: [rt] RT listening for mailbox commands...
26,299,923 UART: [rt]cmd =0x43455252, len=4
26,311,479 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,753,583 ready_for_fw is high
3,753,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,925 >>> mbox cmd response: success
14,967,674 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,220,854 UART:
19,221,251 UART: Running Caliptra FMC ...
19,222,434 UART:
19,222,589 UART: [state] CFI Enabled
19,230,588 UART: [fht] FMC Alias Private Key: 7
20,987,462 UART: [art] Extend RT PCRs Done
20,988,684 UART: [art] Lock RT PCRs Done
20,990,546 UART: [art] Populate DV Done
20,996,126 UART: [fht] FMC Alias Private Key: 7
20,997,822 UART: [art] Derive CDI
20,998,633 UART: [art] Store in in slot 0x4
21,041,024 UART: [art] Derive Key Pair
21,042,067 UART: [art] Store priv key in slot 0x5
23,469,360 UART: [art] Derive Key Pair - Done
23,482,843 UART: [art] Signing Cert with AUTHO
23,484,136 UART: RITY.KEYID = 7
25,189,536 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,042 UART: [art] PUB.X = 53988057F1106211CD5B564DDC625CEF490F5E494752CADCED154E7A556B09CA1050379F58333EF82BE8D40E103185FE
25,198,460 UART: [art] PUB.Y = 6B45338FA225B462EF93B56943620446F256A15BFD4FEBBF5E90FC13838E14C4E77558070B60145538D097E28EA8807B
25,205,491 UART: [art] SIG.R = AC50405B1610C924977850A8E78FD6F2230585E8040DC4C520C14DEDFF28E9C9F1EB2DA88923FC04FD7036A5F0C24E19
25,212,873 UART: [art] SIG.S = 9A125C48B5760C3CE6006AB5354E7B15D653B4D0F2AA9264BFF7132993AFDBB7BD0FA224C615D93869794C1079172E38
26,191,558 UART: Caliptra RT
26,192,261 UART: [state] CFI Enabled
26,309,432 UART: [rt] RT listening for mailbox commands...
26,340,837 UART: [rt]cmd =0x43455252, len=4
26,352,105 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,811 UART: [kat] SHA2-256
881,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,857 UART: [kat] ++
886,009 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
895,104 UART: [kat] SHA2-512-ACC
897,005 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
906,718 UART: [kat] LMS
1,474,914 UART: [kat] --
1,475,721 UART: [cold-reset] ++
1,476,129 UART: [fht] Storing FHT @ 0x50003400
1,478,772 UART: [idev] ++
1,478,940 UART: [idev] CDI.KEYID = 6
1,479,300 UART: [idev] SUBJECT.KEYID = 7
1,479,724 UART: [idev] UDS.KEYID = 0
1,480,069 ready_for_fw is high
1,480,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,792 UART: [idev] Erasing UDS.KEYID = 0
1,503,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,302 UART: [idev] --
1,513,357 UART: [ldev] ++
1,513,525 UART: [ldev] CDI.KEYID = 6
1,513,888 UART: [ldev] SUBJECT.KEYID = 5
1,514,314 UART: [ldev] AUTHORITY.KEYID = 7
1,514,777 UART: [ldev] FE.KEYID = 1
1,519,995 UART: [ldev] Erasing FE.KEYID = 1
1,545,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,058 UART: [ldev] --
1,584,563 UART: [fwproc] Waiting for Commands...
1,585,324 UART: [fwproc] Received command 0x46574c44
1,586,115 UART: [fwproc] Received Image of size 114448 bytes
2,885,648 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,117 >>> mbox cmd response: success
3,078,117 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,079,475 UART: [afmc] ++
3,079,643 UART: [afmc] CDI.KEYID = 6
3,080,005 UART: [afmc] SUBJECT.KEYID = 7
3,080,430 UART: [afmc] AUTHORITY.KEYID = 5
3,115,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,878 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,149,590 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,157,532 UART: [afmc] --
3,158,468 UART: [cold-reset] --
3,159,230 UART: [state] Locking Datavault
3,160,323 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,927 UART: [state] Locking ICCM
3,161,495 UART: [exit] Launching FMC @ 0x40000130
3,166,824 UART:
3,166,840 UART: Running Caliptra FMC ...
3,167,248 UART:
3,167,302 UART: [state] CFI Enabled
3,177,837 UART: [fht] FMC Alias Private Key: 7
3,286,286 UART: [art] Extend RT PCRs Done
3,286,714 UART: [art] Lock RT PCRs Done
3,288,088 UART: [art] Populate DV Done
3,296,157 UART: [fht] FMC Alias Private Key: 7
3,297,167 UART: [art] Derive CDI
3,297,447 UART: [art] Store in in slot 0x4
3,383,102 UART: [art] Derive Key Pair
3,383,462 UART: [art] Store priv key in slot 0x5
3,397,228 UART: [art] Derive Key Pair - Done
3,412,042 UART: [art] Signing Cert with AUTHO
3,412,522 UART: RITY.KEYID = 7
3,427,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,513 UART: [art] PUB.X = 8645C6201B002871E5E5A6717C21587FCBC581C89373BE1F25D52064406F70D120820F701713882697F21A897463E6C9
3,435,240 UART: [art] PUB.Y = FA748B0F64411A6A79722068F318BCF2EB00A829EC472AD6661014BACA351FC10D701BA1D58365A0F98013D1FB7F64A7
3,442,168 UART: [art] SIG.R = 912A460C6D924D87F5A47AD02EADA3C3340463C509FFA39E1CBEA7B26776036351503FD108EF5D6C291359194026FCDC
3,448,927 UART: [art] SIG.S = 14E764443C637F6D684D36E5EBEAB2037288CAB76A0E4D024E975548855C93CBD011747B47B40A33348FB1A93DACF106
3,472,737 UART: Caliptra RT
3,472,990 UART: [state] CFI Enabled
3,581,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,908 UART: [rt]cmd =0x43455252, len=4
3,622,739 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 ready_for_fw is high
1,362,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,025 >>> mbox cmd response: success
2,930,025 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,991,505 UART:
2,991,521 UART: Running Caliptra FMC ...
2,991,929 UART:
2,991,983 UART: [state] CFI Enabled
3,002,464 UART: [fht] FMC Alias Private Key: 7
3,109,871 UART: [art] Extend RT PCRs Done
3,110,299 UART: [art] Lock RT PCRs Done
3,111,565 UART: [art] Populate DV Done
3,119,884 UART: [fht] FMC Alias Private Key: 7
3,120,992 UART: [art] Derive CDI
3,121,272 UART: [art] Store in in slot 0x4
3,206,735 UART: [art] Derive Key Pair
3,207,095 UART: [art] Store priv key in slot 0x5
3,220,365 UART: [art] Derive Key Pair - Done
3,235,264 UART: [art] Signing Cert with AUTHO
3,235,744 UART: RITY.KEYID = 7
3,250,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,625 UART: [art] PUB.X = E96836208A47B50F36E4F9FA2219EB7EDA8A3709F18D7DCE1059728EBC7408BD000730D4774CE8D50BE1E8C41D03D204
3,258,358 UART: [art] PUB.Y = 684931BE1042FFC28635096A966920802DBD2FDD47B0A0523F45885A08004AFBDFD9DA9ACCB81AFA96C7500229FEA364
3,265,285 UART: [art] SIG.R = 8898A1D6B65D6DDD5C2EA8A327483E6618811AACB9EC8EAEAEEDA84BB435B8737528BEDDAF33CFA6ABB0610B5415D6AB
3,272,080 UART: [art] SIG.S = 6CC9DE34A5228A43B4CE38F846D2B2216ACF68E74327481FDF660EFBCB6ECC6591B55DE92D073F3F89330FDEF9EFCCE8
3,295,554 UART: Caliptra RT
3,295,807 UART: [state] CFI Enabled
3,404,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,883 UART: [rt]cmd =0x43455252, len=4
3,445,586 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,614 UART: [kat] SHA2-256
892,552 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,617 UART: [idev] Erasing UDS.KEYID = 0
1,505,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,977 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,835 UART: [ldev] --
1,587,318 UART: [fwproc] Waiting for Commands...
1,588,071 UART: [fwproc] Received command 0x46574c44
1,588,862 UART: [fwproc] Received Image of size 114448 bytes
2,886,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,232 >>> mbox cmd response: success
3,079,232 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,474 UART: [afmc] ++
3,080,642 UART: [afmc] CDI.KEYID = 6
3,081,004 UART: [afmc] SUBJECT.KEYID = 7
3,081,429 UART: [afmc] AUTHORITY.KEYID = 5
3,116,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,220 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,613 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,151,325 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,159,169 UART: [afmc] --
3,160,079 UART: [cold-reset] --
3,160,987 UART: [state] Locking Datavault
3,162,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,924 UART: [state] Locking ICCM
3,163,374 UART: [exit] Launching FMC @ 0x40000130
3,168,703 UART:
3,168,719 UART: Running Caliptra FMC ...
3,169,127 UART:
3,169,270 UART: [state] CFI Enabled
3,179,987 UART: [fht] FMC Alias Private Key: 7
3,288,646 UART: [art] Extend RT PCRs Done
3,289,074 UART: [art] Lock RT PCRs Done
3,290,926 UART: [art] Populate DV Done
3,299,199 UART: [fht] FMC Alias Private Key: 7
3,300,205 UART: [art] Derive CDI
3,300,485 UART: [art] Store in in slot 0x4
3,385,956 UART: [art] Derive Key Pair
3,386,316 UART: [art] Store priv key in slot 0x5
3,399,704 UART: [art] Derive Key Pair - Done
3,414,343 UART: [art] Signing Cert with AUTHO
3,414,823 UART: RITY.KEYID = 7
3,429,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,568 UART: [art] PUB.X = C5FACC731A80B0ADBE7043880DC3022AAEFEEB155E6C5799F801D61B36C165F63297A6433548DF62DEC9499A7D89257A
3,437,339 UART: [art] PUB.Y = 5AB3314013BE37C1AC146C67DDE14BCDDC4389488020E0FC43F2C869FEB522F537AD4BB7810303D62A46899CCB962BFC
3,444,295 UART: [art] SIG.R = 9FF6CFC41DABE5A1BCE92ACDAB5A33B184BCBFA7404F6383F6ACE6DA4177FC9FF50D2BE1117C6825E3CEED2BA9533757
3,451,094 UART: [art] SIG.S = 4385A0338984BB6D3CF4DC3A83D96ECEDB249A1FFAD03F039582EBC823006F761DA5B0FFDD4E7C02A087FCAE52F1384E
3,475,187 UART: Caliptra RT
3,475,532 UART: [state] CFI Enabled
3,583,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,472 UART: [rt]cmd =0x43455252, len=4
3,625,345 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,912 >>> mbox cmd response: success
2,929,912 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,990,852 UART:
2,990,868 UART: Running Caliptra FMC ...
2,991,276 UART:
2,991,419 UART: [state] CFI Enabled
3,002,220 UART: [fht] FMC Alias Private Key: 7
3,111,001 UART: [art] Extend RT PCRs Done
3,111,429 UART: [art] Lock RT PCRs Done
3,112,843 UART: [art] Populate DV Done
3,121,338 UART: [fht] FMC Alias Private Key: 7
3,122,362 UART: [art] Derive CDI
3,122,642 UART: [art] Store in in slot 0x4
3,208,165 UART: [art] Derive Key Pair
3,208,525 UART: [art] Store priv key in slot 0x5
3,221,905 UART: [art] Derive Key Pair - Done
3,236,652 UART: [art] Signing Cert with AUTHO
3,237,132 UART: RITY.KEYID = 7
3,252,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,173 UART: [art] PUB.X = 63CD98740E1FD0B1F0BAAC2B000F72546136AD1724B905CF2675DB4D71868EAFEE26CF193722D9B49AB883BD6FD89243
3,259,922 UART: [art] PUB.Y = A723928AA64A05CAC6B1C8ED63E74E336707DC1DC20FDCF595EBA923CCBE8718163464F51042549FDE079F14C80F1921
3,266,865 UART: [art] SIG.R = 295041C556DF401D04BB1B21A5C233E202380E7AA9A1AF94B27C480BB5C900F29172A0BC7A4512872FB2DF1F22F97B65
3,273,605 UART: [art] SIG.S = 3622E8DDEF80FAC7C85C6F9A876971D60F1DC77B993AA4A0AD10607D8DCF05E6269D81D7F645D62E1564047CB5BDC2CF
3,298,133 UART: Caliptra RT
3,298,478 UART: [state] CFI Enabled
3,407,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,853 UART: [rt]cmd =0x43455252, len=4
3,448,812 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
893,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,479 UART: [kat] ++
897,631 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
922,904 UART: [kat] LMS
1,171,232 UART: [kat] --
1,172,331 UART: [cold-reset] ++
1,172,735 UART: [fht] FHT @ 0x50003400
1,175,422 UART: [idev] ++
1,175,590 UART: [idev] CDI.KEYID = 6
1,175,950 UART: [idev] SUBJECT.KEYID = 7
1,176,374 UART: [idev] UDS.KEYID = 0
1,176,719 ready_for_fw is high
1,176,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,195 UART: [idev] Sha1 KeyId Algorithm
1,209,667 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,759 UART: [ldev] --
1,283,026 UART: [fwproc] Wait for Commands...
1,283,650 UART: [fwproc] Recv command 0x46574c44
1,284,378 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,566 >>> mbox cmd response: success
2,775,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,830 UART: [afmc] ++
2,776,998 UART: [afmc] CDI.KEYID = 6
2,777,360 UART: [afmc] SUBJECT.KEYID = 7
2,777,785 UART: [afmc] AUTHORITY.KEYID = 5
2,813,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,966 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,847,676 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,442 UART: [afmc] --
2,856,340 UART: [cold-reset] --
2,857,020 UART: [state] Locking Datavault
2,858,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,807 UART: [state] Locking ICCM
2,859,317 UART: [exit] Launching FMC @ 0x40000130
2,864,646 UART:
2,864,662 UART: Running Caliptra FMC ...
2,865,070 UART:
2,865,124 UART: [state] CFI Enabled
2,875,085 UART: [fht] FMC Alias Private Key: 7
2,982,950 UART: [art] Extend RT PCRs Done
2,983,378 UART: [art] Lock RT PCRs Done
2,984,852 UART: [art] Populate DV Done
2,993,279 UART: [fht] FMC Alias Private Key: 7
2,994,411 UART: [art] Derive CDI
2,994,691 UART: [art] Store in in slot 0x4
3,080,588 UART: [art] Derive Key Pair
3,080,948 UART: [art] Store priv key in slot 0x5
3,093,898 UART: [art] Derive Key Pair - Done
3,109,124 UART: [art] Signing Cert with AUTHO
3,109,604 UART: RITY.KEYID = 7
3,125,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,809 UART: [art] PUB.X = C7E6AF8D3447ED0E6744ED2FB4AF179DE748D43ED27AC5187CF139E98440FCA3DFCAB66F8952FBA2CC6EE775D9FDAC6A
3,132,606 UART: [art] PUB.Y = AF1884ED84D02BED217FE2671E50FB1EC368A4287D71E5A1AD5381F8DEF37B183D4582B4E9B065A458C70F8B47A642FA
3,139,565 UART: [art] SIG.R = 6A210C7E0A7C2FE27058D21949D627886C52E4E53674168F98EDEE512D9EF647E2F09939F8200D07E15CBDA895D691AA
3,146,325 UART: [art] SIG.S = 7743E423CEB4481DB09468A4DD93404CAEB506C97F8E4A4AE64E6BB5B44E93B554610A651D1F301A5726D32F6AF25224
3,169,856 UART: Caliptra RT
3,170,109 UART: [state] CFI Enabled
3,277,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,075 UART: [rt]cmd =0x43455252, len=4
3,319,070 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,443 ready_for_fw is high
1,059,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,375 >>> mbox cmd response: success
2,626,375 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,689,715 UART:
2,689,731 UART: Running Caliptra FMC ...
2,690,139 UART:
2,690,193 UART: [state] CFI Enabled
2,700,810 UART: [fht] FMC Alias Private Key: 7
2,808,681 UART: [art] Extend RT PCRs Done
2,809,109 UART: [art] Lock RT PCRs Done
2,810,441 UART: [art] Populate DV Done
2,818,692 UART: [fht] FMC Alias Private Key: 7
2,819,666 UART: [art] Derive CDI
2,819,946 UART: [art] Store in in slot 0x4
2,905,451 UART: [art] Derive Key Pair
2,905,811 UART: [art] Store priv key in slot 0x5
2,918,805 UART: [art] Derive Key Pair - Done
2,933,647 UART: [art] Signing Cert with AUTHO
2,934,127 UART: RITY.KEYID = 7
2,949,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,320 UART: [art] PUB.X = 3A7A7BE3E4AFFFD83A649A3EEC2D5A5661E8C8A9BD9363006C98A7261C3FFE9B97B13447FCE3995F88BD1AEAC4091C18
2,957,085 UART: [art] PUB.Y = 0089380ACDBA3997252F4B5791043758B3E6EDF10FFB4CC01A5A7F72374CCE5479746767EC04B83258DDFFA73FD6C95A
2,964,009 UART: [art] SIG.R = 3BE4C7689A4A8840A0604BA86182BD7ED9FC0DBC2CD6E189FA397BC764903CDADAE6AFA86947CE2E3EF612A36FEFC36A
2,970,802 UART: [art] SIG.S = BCA5F2EE890377F67C7D18D010888DAD69C80CF276698BA2486AD7A98ABF823B996C32BF8B2BF74F815E0BD382B3B645
2,994,380 UART: Caliptra RT
2,994,633 UART: [state] CFI Enabled
3,101,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,011 UART: [rt]cmd =0x43455252, len=4
3,142,984 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,789 UART: [kat] HMAC-384Kdf
923,359 UART: [kat] LMS
1,171,687 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,152 UART: [fht] FHT @ 0x50003400
1,175,699 UART: [idev] ++
1,175,867 UART: [idev] CDI.KEYID = 6
1,176,227 UART: [idev] SUBJECT.KEYID = 7
1,176,651 UART: [idev] UDS.KEYID = 0
1,176,996 ready_for_fw is high
1,176,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,200,824 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,456 UART: [ldev] ++
1,210,624 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,413 UART: [ldev] AUTHORITY.KEYID = 7
1,211,876 UART: [ldev] FE.KEYID = 1
1,216,854 UART: [ldev] Erasing FE.KEYID = 1
1,243,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,900 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,233 >>> mbox cmd response: success
2,774,233 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,595 UART: [afmc] ++
2,775,763 UART: [afmc] CDI.KEYID = 6
2,776,125 UART: [afmc] SUBJECT.KEYID = 7
2,776,550 UART: [afmc] AUTHORITY.KEYID = 5
2,811,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,545 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,255 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,854,121 UART: [afmc] --
2,855,181 UART: [cold-reset] --
2,856,007 UART: [state] Locking Datavault
2,857,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,920 UART: [state] Locking ICCM
2,858,492 UART: [exit] Launching FMC @ 0x40000130
2,863,821 UART:
2,863,837 UART: Running Caliptra FMC ...
2,864,245 UART:
2,864,388 UART: [state] CFI Enabled
2,875,121 UART: [fht] FMC Alias Private Key: 7
2,983,640 UART: [art] Extend RT PCRs Done
2,984,068 UART: [art] Lock RT PCRs Done
2,985,560 UART: [art] Populate DV Done
2,993,895 UART: [fht] FMC Alias Private Key: 7
2,994,971 UART: [art] Derive CDI
2,995,251 UART: [art] Store in in slot 0x4
3,081,328 UART: [art] Derive Key Pair
3,081,688 UART: [art] Store priv key in slot 0x5
3,094,742 UART: [art] Derive Key Pair - Done
3,109,839 UART: [art] Signing Cert with AUTHO
3,110,319 UART: RITY.KEYID = 7
3,125,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,290 UART: [art] PUB.X = 13C5A2D7E93EC6A6C1D71436C6526DD4AFB93C3FC5580CAC0BA6B03D47DBEFD54BA522B9A328CA547C28D766681608EE
3,133,069 UART: [art] PUB.Y = BF7282FE6DEF3A4AC822A18C7B21F3F6DD0BC81EA018FBB8F8436A148677A08D2F42F1943FFC374D31C29700576448C8
3,140,004 UART: [art] SIG.R = FC67ADDAB77A572B963DA11BBE8ECF2BB3C6A2C4808FE5D00C358F63163567051516F755FD029160C805E4ADF9575C39
3,146,772 UART: [art] SIG.S = 9B819855ADC75B934C95582AF81BD57F36F9FD8B98A26984F988A6AE5B977B6297CD152719BAF9873B8B8F294D3651EF
3,170,333 UART: Caliptra RT
3,170,678 UART: [state] CFI Enabled
3,278,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,929 UART: [rt]cmd =0x43455252, len=4
3,319,735 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,800 ready_for_fw is high
1,059,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,374 >>> mbox cmd response: success
2,626,374 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,538 UART:
2,688,554 UART: Running Caliptra FMC ...
2,688,962 UART:
2,689,105 UART: [state] CFI Enabled
2,699,940 UART: [fht] FMC Alias Private Key: 7
2,807,799 UART: [art] Extend RT PCRs Done
2,808,227 UART: [art] Lock RT PCRs Done
2,809,533 UART: [art] Populate DV Done
2,817,478 UART: [fht] FMC Alias Private Key: 7
2,818,660 UART: [art] Derive CDI
2,818,940 UART: [art] Store in in slot 0x4
2,904,861 UART: [art] Derive Key Pair
2,905,221 UART: [art] Store priv key in slot 0x5
2,918,341 UART: [art] Derive Key Pair - Done
2,932,972 UART: [art] Signing Cert with AUTHO
2,933,452 UART: RITY.KEYID = 7
2,948,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,505 UART: [art] PUB.X = F8382D1D85CEF012F0BC4CA69B2CD6DC4B0D8B35A3040292CE4006D13BCD53B74B756A688856DAD853DDDC0177B7650F
2,956,271 UART: [art] PUB.Y = DB8543C039C23329C89B408547D3C4C9B7DF8452F34093481CB50969D0EF29743F82BB84CFD491F7C38724C58C82F458
2,963,214 UART: [art] SIG.R = A863AB47ECAC6AE5F0B2995DB6B227A0A1FE3905868B6322654334E4302659BC83579595AEA0C576C704C4FDE3EB6AA6
2,969,986 UART: [art] SIG.S = 3A37F11F3414D59DE291467898234E962F0EFF465B2213F6E40C375BC7D57AC97BBD39D3EACEF65FDFCC0F7DE58BE365
2,994,026 UART: Caliptra RT
2,994,371 UART: [state] CFI Enabled
3,103,087 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,597 UART: [rt]cmd =0x43455252, len=4
3,144,516 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,174,097 ready_for_fw is high
1,174,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,240,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,504 UART: [ldev] --
1,279,810 UART: [fwproc] Wait for Commands...
1,280,539 UART: [fwproc] Recv command 0x46574c44
1,281,272 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,560 >>> mbox cmd response: success
2,772,560 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,767 UART: [afmc] ++
2,773,935 UART: [afmc] CDI.KEYID = 6
2,774,298 UART: [afmc] SUBJECT.KEYID = 7
2,774,724 UART: [afmc] AUTHORITY.KEYID = 5
2,810,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,400 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,110 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,852,783 UART: [afmc] --
2,853,833 UART: [cold-reset] --
2,854,663 UART: [state] Locking Datavault
2,855,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,512 UART: [state] Locking ICCM
2,857,180 UART: [exit] Launching FMC @ 0x40000130
2,862,509 UART:
2,862,525 UART: Running Caliptra FMC ...
2,862,933 UART:
2,862,987 UART: [state] CFI Enabled
2,873,410 UART: [fht] FMC Alias Private Key: 7
2,981,347 UART: [art] Extend RT PCRs Done
2,981,775 UART: [art] Lock RT PCRs Done
2,983,383 UART: [art] Populate DV Done
2,991,412 UART: [fht] FMC Alias Private Key: 7
2,992,512 UART: [art] Derive CDI
2,992,792 UART: [art] Store in in slot 0x4
3,078,291 UART: [art] Derive Key Pair
3,078,651 UART: [art] Store priv key in slot 0x5
3,092,607 UART: [art] Derive Key Pair - Done
3,107,561 UART: [art] Signing Cert with AUTHO
3,108,041 UART: RITY.KEYID = 7
3,123,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,484 UART: [art] PUB.X = 2F70957122C23F1ECD192E285D596EDFE166D7CB3A54C3E33994C00699760BA0D68F55E5490248CB96869C84B5D216D6
3,131,243 UART: [art] PUB.Y = DBD8AECBCA2A7C8B5BA462F27910F73DD4BF37E3EAE8F19AF66004577BFD133691D4026752545D2603593723EE96DA3A
3,138,196 UART: [art] SIG.R = 2549910097FA14BEB8E6D2311841F0B2BB3D4B1DEE7428C89C1F04676CAB440B892D8F6D6F56DEB862A66C7D98065739
3,144,939 UART: [art] SIG.S = CCB722D35892CE4C853DB58E751DC2ED15DCD7C3384C261060652527AE9C6EBB6FEF618F5FA5D524E1145AF7675A3DA4
3,168,884 UART: Caliptra RT
3,169,137 UART: [state] CFI Enabled
3,277,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,727 UART: [rt]cmd =0x43455252, len=4
3,318,762 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,214 ready_for_fw is high
1,056,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,290 >>> mbox cmd response: success
2,623,290 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,685,556 UART:
2,685,572 UART: Running Caliptra FMC ...
2,685,980 UART:
2,686,034 UART: [state] CFI Enabled
2,696,603 UART: [fht] FMC Alias Private Key: 7
2,804,730 UART: [art] Extend RT PCRs Done
2,805,158 UART: [art] Lock RT PCRs Done
2,806,702 UART: [art] Populate DV Done
2,815,025 UART: [fht] FMC Alias Private Key: 7
2,816,079 UART: [art] Derive CDI
2,816,359 UART: [art] Store in in slot 0x4
2,901,856 UART: [art] Derive Key Pair
2,902,216 UART: [art] Store priv key in slot 0x5
2,915,724 UART: [art] Derive Key Pair - Done
2,930,733 UART: [art] Signing Cert with AUTHO
2,931,213 UART: RITY.KEYID = 7
2,946,529 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,294 UART: [art] PUB.X = 7DE720A70377028E6507DE2BED6AB97DE3FEAC463695FC2A401A1EE248A56A774DDC2B1692B6A40B864844E0E024DE08
2,954,059 UART: [art] PUB.Y = 8E6716258294B43FD944CC987CF75E91BF50A98072F2038D77E0024584CC153EAE32E5CD0F051FFAC342D70DD6211DCC
2,961,000 UART: [art] SIG.R = 3B27E8645D7B12C8808F706378568180D3962951079F80DEA9C0F462E57534391CB81B3E7177E7355AA0E7A4DD542398
2,967,755 UART: [art] SIG.S = 873BFBC51C83E6FA409E086009DC8B765F0DE75D0A68E5C173C01DDF451B15AEA73610F94016E10A02DA11F521CE9CAB
2,991,580 UART: Caliptra RT
2,991,833 UART: [state] CFI Enabled
3,100,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,985 UART: [rt]cmd =0x43455252, len=4
3,141,758 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,174,772 ready_for_fw is high
1,174,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,614 UART: [fwproc] Recv command 0x46574c44
1,284,347 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,473 >>> mbox cmd response: success
2,775,473 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,770 UART: [afmc] ++
2,776,938 UART: [afmc] CDI.KEYID = 6
2,777,301 UART: [afmc] SUBJECT.KEYID = 7
2,777,727 UART: [afmc] AUTHORITY.KEYID = 5
2,813,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,885 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,847,595 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,582 UART: [afmc] --
2,856,490 UART: [cold-reset] --
2,857,346 UART: [state] Locking Datavault
2,858,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,297 UART: [state] Locking ICCM
2,859,971 UART: [exit] Launching FMC @ 0x40000130
2,865,300 UART:
2,865,316 UART: Running Caliptra FMC ...
2,865,724 UART:
2,865,867 UART: [state] CFI Enabled
2,876,634 UART: [fht] FMC Alias Private Key: 7
2,985,181 UART: [art] Extend RT PCRs Done
2,985,609 UART: [art] Lock RT PCRs Done
2,987,047 UART: [art] Populate DV Done
2,995,222 UART: [fht] FMC Alias Private Key: 7
2,996,236 UART: [art] Derive CDI
2,996,516 UART: [art] Store in in slot 0x4
3,082,197 UART: [art] Derive Key Pair
3,082,557 UART: [art] Store priv key in slot 0x5
3,095,677 UART: [art] Derive Key Pair - Done
3,110,545 UART: [art] Signing Cert with AUTHO
3,111,025 UART: RITY.KEYID = 7
3,125,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,700 UART: [art] PUB.X = 6AD6FD40050D214898AFBBA9BC4E0D9159CAEA4B1682094B5A0D2ADB1E61A4F3E2DCAD6C566293181AA0653642DD860E
3,133,468 UART: [art] PUB.Y = 73AEB3D40C00CC0C897CC8AE93195F9392118CE7F8EC1DF3FE2384126B3D7BE9A87082269506B2698FA9C41CE7C91399
3,140,393 UART: [art] SIG.R = D4C5606A6C7B3A176EB0EE3E2A76BF1DB29CA31A18353C7D4048612000BB1E03FF77A3603779383765FD47BDF72F9BF9
3,147,146 UART: [art] SIG.S = B1EF5FAC92F25F7F2C89B075DBA8B560D317E11A6392D9D9DA1CC32168EB27F358FFF3FC9376B1686FDC4E68D323172F
3,170,733 UART: Caliptra RT
3,171,078 UART: [state] CFI Enabled
3,278,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,323 UART: [rt]cmd =0x43455252, len=4
3,320,073 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 ready_for_fw is high
1,056,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,471 >>> mbox cmd response: success
2,625,471 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,533 UART:
2,688,549 UART: Running Caliptra FMC ...
2,688,957 UART:
2,689,100 UART: [state] CFI Enabled
2,699,621 UART: [fht] FMC Alias Private Key: 7
2,807,220 UART: [art] Extend RT PCRs Done
2,807,648 UART: [art] Lock RT PCRs Done
2,808,754 UART: [art] Populate DV Done
2,816,879 UART: [fht] FMC Alias Private Key: 7
2,818,015 UART: [art] Derive CDI
2,818,295 UART: [art] Store in in slot 0x4
2,903,952 UART: [art] Derive Key Pair
2,904,312 UART: [art] Store priv key in slot 0x5
2,918,134 UART: [art] Derive Key Pair - Done
2,933,285 UART: [art] Signing Cert with AUTHO
2,933,765 UART: RITY.KEYID = 7
2,948,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,748 UART: [art] PUB.X = 38F3D26EB8F4D39553FB7BFCD52292B53718EF4E7FA3AE30369EBF86D2A1CAB3E8628947DBA4C36F4AEEE860A7AA7CCD
2,956,544 UART: [art] PUB.Y = 55F2022BD65C6C0B4B851FF8EC2B6AD7F8660B679E9BF877C787B12C24B07E06598FD263CC32891698AD3DE79783621D
2,963,486 UART: [art] SIG.R = 31E202564314909857DC30F17CC68A10892071B67CBC846A47350DA4DAD50A43FA5F5AC4B94768E9E168F5CDA880752C
2,970,247 UART: [art] SIG.S = 36D7C60E98539B7670D1687202100CCE6DCB018375778D20CEA8011E1488E8BF45AE983D23232B550F2DDF4F90C050FB
2,993,820 UART: Caliptra RT
2,994,165 UART: [state] CFI Enabled
3,103,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,449 UART: [rt]cmd =0x43455252, len=4
3,144,126 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,193 UART:
192,577 UART: Running Caliptra ROM ...
193,928 UART:
194,083 UART: [state] CFI Enabled
264,464 UART: [state] LifecycleState = Unprovisioned
266,403 UART: [state] DebugLocked = No
269,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,614 UART: [kat] SHA2-256
443,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,853 UART: [kat] ++
454,306 UART: [kat] sha1
465,612 UART: [kat] SHA2-256
468,343 UART: [kat] SHA2-384
475,687 UART: [kat] SHA2-512-ACC
478,054 UART: [kat] ECC-384
2,768,312 UART: [kat] HMAC-384Kdf
2,800,369 UART: [kat] LMS
3,990,621 UART: [kat] --
3,993,943 UART: [cold-reset] ++
3,995,095 UART: [fht] Storing FHT @ 0x50003400
4,007,000 UART: [idev] ++
4,007,582 UART: [idev] CDI.KEYID = 6
4,008,621 UART: [idev] SUBJECT.KEYID = 7
4,009,799 UART: [idev] UDS.KEYID = 0
4,010,871 ready_for_fw is high
4,011,085 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,706 UART: [idev] Erasing UDS.KEYID = 0
7,348,727 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,086 UART: [idev] --
7,371,787 UART: [ldev] ++
7,372,362 UART: [ldev] CDI.KEYID = 6
7,373,347 UART: [ldev] SUBJECT.KEYID = 5
7,374,559 UART: [ldev] AUTHORITY.KEYID = 7
7,375,789 UART: [ldev] FE.KEYID = 1
7,402,073 UART: [ldev] Erasing FE.KEYID = 1
10,734,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,412 UART: [ldev] --
13,115,915 UART: [fwproc] Waiting for Commands...
13,118,170 UART: [fwproc] Received command 0x46574c44
13,120,352 UART: [fwproc] Received Image of size 114124 bytes
17,169,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,631,060 >>> mbox cmd response: success
17,631,589 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,636,062 UART: [afmc] ++
17,636,726 UART: [afmc] CDI.KEYID = 6
17,637,619 UART: [afmc] SUBJECT.KEYID = 7
17,638,839 UART: [afmc] AUTHORITY.KEYID = 5
21,008,724 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,764 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,014 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,471 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,262 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,712 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,842 UART: [afmc] --
23,378,322 UART: [cold-reset] --
23,384,124 UART: [state] Locking Datavault
23,390,456 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,172 UART: [state] Locking ICCM
23,394,844 UART: [exit] Launching FMC @ 0x40000130
23,403,280 UART:
23,403,525 UART: Running Caliptra FMC ...
23,404,629 UART:
23,404,789 UART: [state] CFI Enabled
23,466,833 UART: [fht] FMC Alias Private Key: 7
25,805,286 UART: [art] Extend RT PCRs Done
25,806,504 UART: [art] Lock RT PCRs Done
25,808,319 UART: [art] Populate DV Done
25,813,483 UART: [fht] FMC Alias Private Key: 7
25,815,025 UART: [art] Derive CDI
25,815,847 UART: [art] Store in in slot 0x4
25,876,646 UART: [art] Derive Key Pair
25,877,682 UART: [art] Store priv key in slot 0x5
29,169,591 UART: [art] Derive Key Pair - Done
29,182,394 UART: [art] Signing Cert with AUTHO
29,183,699 UART: RITY.KEYID = 7
31,470,510 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,015 UART: [art] PUB.X = E04B81892978B8F10F67A174C78AC8FFEB6623A884F7DC9B70E883FF7C467AAC6BE22D49BE3494765AD29EA586A74869
31,479,261 UART: [art] PUB.Y = D367CD0643D7AE85C55419C0949987216B789896E1B86CE2E43FEBDBC176BEE26C7DDE8AF437EEFC5F02118CDBE1AC2A
31,486,506 UART: [art] SIG.R = B1166A2F52CA2028D2130AA25D658AB030167B597FA6622CF284B89352D73AA3D26DDC94A642D940406FD402ED114D41
31,493,849 UART: [art] SIG.S = 675AC21551628406122AEF31895206181BA0912CA85255B9B430E2BC154D51015009F6072E4569AB3E468A0F492AC1B1
32,799,082 UART: Caliptra RT
32,799,793 UART: [state] CFI Enabled
32,959,669 UART: [rt] RT listening for mailbox commands...
32,990,488 UART: [rt]cmd =0x4453424c, len=4
36,272,951 >>> mbox cmd response data (8 bytes)
38,404,375 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
38,549,756 UART:
38,550,118 UART: Running Caliptra ROM ...
38,551,170 UART:
38,551,320 UART: [state] CFI Enabled
38,617,552 UART: [state] LifecycleState = Unprovisioned
38,619,488 UART: [state] DebugLocked = No
38,621,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,626,777 UART: [kat] SHA2-256
38,796,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,806,976 UART: [kat] ++
38,807,441 UART: [kat] sha1
38,818,383 UART: [kat] SHA2-256
38,821,078 UART: [kat] SHA2-384
38,827,284 UART: [kat] SHA2-512-ACC
38,829,654 UART: [kat] ECC-384
41,119,931 UART: [kat] HMAC-384Kdf
41,152,576 UART: [kat] LMS
42,342,927 UART: [kat] --
42,348,560 UART: [update-reset] ++
46,477,665 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,482,192 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
46,864,450 >>> mbox cmd response: success
46,864,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,865,459 UART: [update-reset] Copying MAN_2 To MAN_1
46,887,899 UART: [update-reset Success] --
46,892,455 UART: [state] Locking Datavault
46,894,686 UART: [state] Locking PCR0, PCR1 and PCR31
46,896,442 UART: [state] Locking ICCM
46,898,706 UART: [exit] Launching FMC @ 0x40000130
46,907,097 UART:
46,907,356 UART: Running Caliptra FMC ...
46,908,461 UART:
46,908,616 UART: [state] CFI Enabled
47,009,523 UART: [art] Extend RT PCRs Done
47,010,717 UART: [art] Lock RT PCRs Done
47,012,231 UART: [art] Populate DV Done
47,017,698 UART: [fht] FMC Alias Private Key: 7
47,019,327 UART: [art] Derive CDI
47,020,152 UART: [art] Store in in slot 0x4
47,079,212 UART: [art] Derive Key Pair
47,080,255 UART: [art] Store priv key in slot 0x5
50,373,252 UART: [art] Derive Key Pair - Done
50,385,981 UART: [art] Signing Cert with AUTHO
50,387,349 UART: RITY.KEYID = 7
52,675,487 UART: [art] Erasing AUTHORITY.KEYID = 7
52,676,997 UART: [art] PUB.X = D684E51CDA2DF0612D95748993D8747987DCE006A133C1F615B06B7FEB1EED28B15CC49391B8C42D17B7D78C826DD266
52,684,291 UART: [art] PUB.Y = E3501700408CFD29B5ED264CE00185942F809D25224A7C9BEA4022577A2D4498C3F313ABA6BC388CBE9DB8B3E2DB1BE1
52,691,535 UART: [art] SIG.R = B5BACDBBDFB5540E89146C6C2DAC7D9825AE3A3981577E4260B17E0F0CC364217EF675F29C07F2FFE589C1F6146FBF7F
52,698,931 UART: [art] SIG.S = 035F9545C33D3ED0B9C09536A130EBEFA7D7D002691EBB12B022510B7ED5ACFD3E5CC4956D7E8E446A94DDF2827CFFDC
54,004,170 UART: Caliptra RT
54,004,894 UART: [state] CFI Enabled
57,618,321 UART: [rt] RT listening for mailbox commands...
57,649,494 UART: [rt]cmd =0x494e464f, len=4
57,653,290 >>> mbox cmd response data (264 bytes)
57,654,977 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,684,731 UART: [rt]cmd =0x43455252, len=4
57,696,193 >>> mbox cmd response data (783 bytes)
57,738,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,768,951 UART: [rt]cmd =0x44504543, len=92
63,527,835 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,786,467 ready_for_fw is high
3,787,076 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,859,325 >>> mbox cmd response: success
17,859,904 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,547,966 UART:
23,548,328 UART: Running Caliptra FMC ...
23,549,523 UART:
23,549,689 UART: [state] CFI Enabled
23,615,920 UART: [fht] FMC Alias Private Key: 7
25,953,756 UART: [art] Extend RT PCRs Done
25,954,973 UART: [art] Lock RT PCRs Done
25,956,826 UART: [art] Populate DV Done
25,962,192 UART: [fht] FMC Alias Private Key: 7
25,963,750 UART: [art] Derive CDI
25,964,570 UART: [art] Store in in slot 0x4
26,023,920 UART: [art] Derive Key Pair
26,024,966 UART: [art] Store priv key in slot 0x5
29,318,069 UART: [art] Derive Key Pair - Done
29,331,326 UART: [art] Signing Cert with AUTHO
29,332,662 UART: RITY.KEYID = 7
31,619,066 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,575 UART: [art] PUB.X = B007315D0BD58EA490F755C41125B7DAD449512A91183C24DC0E587C21A24FB860DF1D712E22613529312CFE19E28EBF
31,627,827 UART: [art] PUB.Y = 5A8FEB83D15D741F7C2BC6E5A041A0E392766EB384035C3329717050C7191C1F27B4DC8BBD01A4D20676E2EA0C5AAA75
31,635,054 UART: [art] SIG.R = CBD5CE31B5897C22235560EBF321ED10F67312B7D766B86ADDEC448926930D469F0D9CC35FF7C505C17E71541E52EF04
31,642,447 UART: [art] SIG.S = 3F9858BDC01DFC2C45BB43BA97BFEADEB600E2499692DEBC39BA92431C79475D0F22EA5AB52D8EDE9BF19758B401DE20
32,948,024 UART: Caliptra RT
32,948,730 UART: [state] CFI Enabled
33,129,054 UART: [rt] RT listening for mailbox commands...
33,160,416 UART: [rt]cmd =0x4453424c, len=4
36,461,320 >>> mbox cmd response data (8 bytes)
38,589,896 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
47,331,544 >>> mbox cmd response: success
47,332,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,365,641 UART:
47,365,928 UART: Running Caliptra FMC ...
47,367,047 UART:
47,367,222 UART: [state] CFI Enabled
47,453,701 UART: [art] Extend RT PCRs Done
47,454,894 UART: [art] Lock RT PCRs Done
47,456,343 UART: [art] Populate DV Done
47,461,730 UART: [fht] FMC Alias Private Key: 7
47,463,445 UART: [art] Derive CDI
47,464,185 UART: [art] Store in in slot 0x4
47,522,942 UART: [art] Derive Key Pair
47,523,984 UART: [art] Store priv key in slot 0x5
50,816,959 UART: [art] Derive Key Pair - Done
50,830,068 UART: [art] Signing Cert with AUTHO
50,831,374 UART: RITY.KEYID = 7
53,118,064 UART: [art] Erasing AUTHORITY.KEYID = 7
53,119,565 UART: [art] PUB.X = 81CD801C98EC4A7D1FC5B69B8B29877EAE585749DE722BF810D443F81C2E3AD8AAA71069B2EE7A9F8B6A7DBE123DE2F4
53,126,812 UART: [art] PUB.Y = D9EBFA0C4FF42041877416147A1E0AB5600E95BE4E4B1158BF568286084B33F15C385892A38C0B3920C3D0456253B551
53,134,043 UART: [art] SIG.R = F2659A58015954EEC8EF77CCD4222A152CEE0FFCD47396CF60A0A3FF0470AECA289D22181B4DF9634DF30F629A066B23
53,141,444 UART: [art] SIG.S = 4838A2E4FD8DB4BCE8EDD0744E179587763418A67206613BE93FAEBC1B1010AB3D6A8A9E585412270D6A600098230AAE
54,446,189 UART: Caliptra RT
54,446,878 UART: [state] CFI Enabled
58,061,917 UART: [rt] RT listening for mailbox commands...
58,093,002 UART: [rt]cmd =0x494e464f, len=4
58,097,138 >>> mbox cmd response data (264 bytes)
58,098,842 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,128,611 UART: [rt]cmd =0x43455252, len=4
58,140,129 >>> mbox cmd response data (783 bytes)
58,181,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,212,791 UART: [rt]cmd =0x44504543, len=92
63,968,274 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,400 UART:
192,771 UART: Running Caliptra ROM ...
193,903 UART:
603,769 UART: [state] CFI Enabled
620,936 UART: [state] LifecycleState = Unprovisioned
622,900 UART: [state] DebugLocked = No
624,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,439 UART: [kat] SHA2-256
798,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,757 UART: [kat] ++
809,288 UART: [kat] sha1
818,884 UART: [kat] SHA2-256
821,598 UART: [kat] SHA2-384
827,366 UART: [kat] SHA2-512-ACC
829,727 UART: [kat] ECC-384
3,113,203 UART: [kat] HMAC-384Kdf
3,125,655 UART: [kat] LMS
4,315,782 UART: [kat] --
4,319,555 UART: [cold-reset] ++
4,321,973 UART: [fht] Storing FHT @ 0x50003400
4,333,514 UART: [idev] ++
4,334,069 UART: [idev] CDI.KEYID = 6
4,335,047 UART: [idev] SUBJECT.KEYID = 7
4,336,288 UART: [idev] UDS.KEYID = 0
4,337,264 ready_for_fw is high
4,337,464 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,819 UART: [idev] Erasing UDS.KEYID = 0
7,624,174 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,080 UART: [idev] --
7,650,884 UART: [ldev] ++
7,651,510 UART: [ldev] CDI.KEYID = 6
7,652,439 UART: [ldev] SUBJECT.KEYID = 5
7,653,650 UART: [ldev] AUTHORITY.KEYID = 7
7,654,930 UART: [ldev] FE.KEYID = 1
7,664,377 UART: [ldev] Erasing FE.KEYID = 1
10,952,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,135 UART: [ldev] --
13,313,226 UART: [fwproc] Waiting for Commands...
13,315,255 UART: [fwproc] Received command 0x46574c44
13,317,487 UART: [fwproc] Received Image of size 114124 bytes
17,369,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,824 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,428 >>> mbox cmd response: success
17,835,981 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,839,368 UART: [afmc] ++
17,839,949 UART: [afmc] CDI.KEYID = 6
17,840,854 UART: [afmc] SUBJECT.KEYID = 7
17,842,121 UART: [afmc] AUTHORITY.KEYID = 5
21,156,017 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,964 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,315 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,147 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,638 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,784 UART: [afmc] --
23,521,648 UART: [cold-reset] --
23,525,884 UART: [state] Locking Datavault
23,531,014 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,727 UART: [state] Locking ICCM
23,535,304 UART: [exit] Launching FMC @ 0x40000130
23,543,700 UART:
23,543,930 UART: Running Caliptra FMC ...
23,545,028 UART:
23,545,188 UART: [state] CFI Enabled
23,552,795 UART: [fht] FMC Alias Private Key: 7
25,883,653 UART: [art] Extend RT PCRs Done
25,885,008 UART: [art] Lock RT PCRs Done
25,886,693 UART: [art] Populate DV Done
25,892,266 UART: [fht] FMC Alias Private Key: 7
25,893,801 UART: [art] Derive CDI
25,894,611 UART: [art] Store in in slot 0x4
25,937,359 UART: [art] Derive Key Pair
25,938,356 UART: [art] Store priv key in slot 0x5
29,180,322 UART: [art] Derive Key Pair - Done
29,193,016 UART: [art] Signing Cert with AUTHO
29,194,320 UART: RITY.KEYID = 7
31,473,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,155 UART: [art] PUB.X = 7071062F6F2A29F7CB4841A20CF520F006E022243EDB180B19BDEC79A89230F4043A0A50893D5872546C176CB9DFF08B
31,482,391 UART: [art] PUB.Y = F8E06F442F6C4446340578B92D8A7A749590BA2A75FEEF21F917376BC9E75BD8529D420C076C4A2CB721552C993B3853
31,489,606 UART: [art] SIG.R = 274BDC20B90BCCAD35EFCE281EBD486436980BC9CDA8443DE35A2F41964DCD5275E233354C10167C027C897E3B12034C
31,497,004 UART: [art] SIG.S = 1272D077A293AB0E35D4822A91CD7E3DB5AC281CFD6C5894F0736108ACEB5BF1317D1E4F8FAFE072158C59855CBA0808
32,802,444 UART: Caliptra RT
32,803,155 UART: [state] CFI Enabled
32,920,702 UART: [rt] RT listening for mailbox commands...
32,952,103 UART: [rt]cmd =0x4453424c, len=4
36,194,825 >>> mbox cmd response data (8 bytes)
38,248,617 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
38,393,554 UART:
38,393,935 UART: Running Caliptra ROM ...
38,395,070 UART:
38,395,247 UART: [state] CFI Enabled
38,411,452 UART: [state] LifecycleState = Unprovisioned
38,413,334 UART: [state] DebugLocked = No
38,415,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,420,410 UART: [kat] SHA2-256
38,590,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,600,707 UART: [kat] ++
38,601,161 UART: [kat] sha1
38,612,203 UART: [kat] SHA2-256
38,614,882 UART: [kat] SHA2-384
38,620,449 UART: [kat] SHA2-512-ACC
38,622,815 UART: [kat] ECC-384
40,906,566 UART: [kat] HMAC-384Kdf
40,917,985 UART: [kat] LMS
42,108,040 UART: [kat] --
42,112,265 UART: [update-reset] ++
46,253,600 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,258,183 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
46,640,447 >>> mbox cmd response: success
46,640,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,641,103 UART: [update-reset] Copying MAN_2 To MAN_1
46,663,372 UART: [update-reset Success] --
46,668,565 UART: [state] Locking Datavault
46,673,064 UART: [state] Locking PCR0, PCR1 and PCR31
46,674,760 UART: [state] Locking ICCM
46,676,287 UART: [exit] Launching FMC @ 0x40000130
46,684,783 UART:
46,685,074 UART: Running Caliptra FMC ...
46,686,186 UART:
46,686,339 UART: [state] CFI Enabled
46,729,966 UART: [art] Extend RT PCRs Done
46,731,099 UART: [art] Lock RT PCRs Done
46,732,597 UART: [art] Populate DV Done
46,737,997 UART: [fht] FMC Alias Private Key: 7
46,739,539 UART: [art] Derive CDI
46,740,295 UART: [art] Store in in slot 0x4
46,782,830 UART: [art] Derive Key Pair
46,783,871 UART: [art] Store priv key in slot 0x5
50,025,218 UART: [art] Derive Key Pair - Done
50,038,038 UART: [art] Signing Cert with AUTHO
50,039,343 UART: RITY.KEYID = 7
52,318,597 UART: [art] Erasing AUTHORITY.KEYID = 7
52,320,106 UART: [art] PUB.X = 09F0C9862DE72003E503533AF1934614AE5A7BDC1019E0653111AA9002C96A925E025E3BA5751242982035AC81B1C3D8
52,327,366 UART: [art] PUB.Y = CED3A86ECAB713D7479F585253C622EC08FFC7C13A42EB09834D60081A0F75F849010D8D74BECD43126EEFB3875E70E1
52,334,602 UART: [art] SIG.R = DF09B5989C4D8DB71825DC81B9C941013397CB2438A71DF88713CE77C053F6819B224013D672BEBE4A9305F0D174A859
52,341,939 UART: [art] SIG.S = 777AB646BE859926255E5465620F8003CD8C8E019FE5C3C772F5FDB9CE6A7727C2F27C37972081376EEEB240DD95677C
53,647,341 UART: Caliptra RT
53,648,058 UART: [state] CFI Enabled
57,179,497 UART: [rt] RT listening for mailbox commands...
57,210,513 UART: [rt]cmd =0x494e464f, len=4
57,214,531 >>> mbox cmd response data (264 bytes)
57,216,206 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,246,107 UART: [rt]cmd =0x43455252, len=4
57,257,568 >>> mbox cmd response data (783 bytes)
57,299,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,329,935 UART: [rt]cmd =0x44504543, len=92
63,004,014 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,131,330 ready_for_fw is high
4,131,706 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,172 >>> mbox cmd response: success
18,070,994 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,717,008 UART:
23,717,396 UART: Running Caliptra FMC ...
23,718,594 UART:
23,718,753 UART: [state] CFI Enabled
23,726,637 UART: [fht] FMC Alias Private Key: 7
26,057,828 UART: [art] Extend RT PCRs Done
26,059,048 UART: [art] Lock RT PCRs Done
26,060,378 UART: [art] Populate DV Done
26,065,588 UART: [fht] FMC Alias Private Key: 7
26,067,288 UART: [art] Derive CDI
26,068,105 UART: [art] Store in in slot 0x4
26,110,711 UART: [art] Derive Key Pair
26,111,714 UART: [art] Store priv key in slot 0x5
29,354,100 UART: [art] Derive Key Pair - Done
29,366,997 UART: [art] Signing Cert with AUTHO
29,368,294 UART: RITY.KEYID = 7
31,648,033 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,541 UART: [art] PUB.X = C7F111BAD0A2FC130F3678242987EEE681DF88C60D07BACB970DA0BD721390C75F006AE77354F0DE67285EF0FE0188C6
31,656,730 UART: [art] PUB.Y = 23697C6AED7CE5E8AF15C897780191F18DD67AC896193D70093F544D5FB86F9A27EBD95E62A8BB298728D2F3D16AC9B4
31,664,003 UART: [art] SIG.R = 129820BDF6E038AC95398F4C47E55E5C44436E0F7223411B4C3450CCF66ED404C18FED1C685DE215A6A9523BABB4D58A
31,671,410 UART: [art] SIG.S = D4E767909F3287B75BB5829C0AB61F05D44E514AED3B2ADFFC1E491332085F4E9F9E071A88C93A82072F8BBE86556C53
32,976,769 UART: Caliptra RT
32,977,501 UART: [state] CFI Enabled
33,094,900 UART: [rt] RT listening for mailbox commands...
33,126,346 UART: [rt]cmd =0x4453424c, len=4
36,369,550 >>> mbox cmd response data (8 bytes)
38,430,387 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
47,080,921 >>> mbox cmd response: success
47,081,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,114,352 UART:
47,114,676 UART: Running Caliptra FMC ...
47,115,802 UART:
47,115,981 UART: [state] CFI Enabled
47,159,726 UART: [art] Extend RT PCRs Done
47,160,874 UART: [art] Lock RT PCRs Done
47,162,171 UART: [art] Populate DV Done
47,167,582 UART: [fht] FMC Alias Private Key: 7
47,169,122 UART: [art] Derive CDI
47,169,881 UART: [art] Store in in slot 0x4
47,212,651 UART: [art] Derive Key Pair
47,213,698 UART: [art] Store priv key in slot 0x5
50,455,617 UART: [art] Derive Key Pair - Done
50,468,722 UART: [art] Signing Cert with AUTHO
50,470,049 UART: RITY.KEYID = 7
52,749,284 UART: [art] Erasing AUTHORITY.KEYID = 7
52,750,804 UART: [art] PUB.X = 9F2B5BF5866AAE8FF52A0B7844E2C10D32365982DF2A7278F0C7810E609D998817BCAB3E6663202C8E2492F2CFC6BE15
52,758,061 UART: [art] PUB.Y = B63CC05448319C414E60AC5AAD6EE4C4907057C2393D0AC8295EB58575AB0A913402E6B371D87E9075A2AD1B2190DCC1
52,765,294 UART: [art] SIG.R = 1CC3A9C25DC52FDE45A6BA182042749C7044E404E4701A855C8CEC5347C5439FB95CDAFDABAEC51B3CA19BB1CD9FABC1
52,772,707 UART: [art] SIG.S = 19359E2C1A280278BE7294509D678000898949A6620E5C06329CE47C3004CA823F09BF754D90EA5FCF5F9069A3668D22
54,077,580 UART: Caliptra RT
54,078,291 UART: [state] CFI Enabled
57,608,345 UART: [rt] RT listening for mailbox commands...
57,639,525 UART: [rt]cmd =0x494e464f, len=4
57,643,596 >>> mbox cmd response data (264 bytes)
57,645,238 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,674,733 UART: [rt]cmd =0x43455252, len=4
57,686,022 >>> mbox cmd response data (782 bytes)
57,728,023 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,758,752 UART: [rt]cmd =0x44504543, len=92
63,432,060 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,078 UART:
192,462 UART: Running Caliptra ROM ...
193,580 UART:
193,724 UART: [state] CFI Enabled
264,613 UART: [state] LifecycleState = Unprovisioned
266,527 UART: [state] DebugLocked = No
267,839 UART: [state] WD Timer not started. Device not locked for debugging
272,227 UART: [kat] SHA2-256
451,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,895 UART: [kat] ++
463,342 UART: [kat] sha1
474,377 UART: [kat] SHA2-256
477,440 UART: [kat] SHA2-384
484,363 UART: [kat] SHA2-512-ACC
487,301 UART: [kat] ECC-384
2,947,488 UART: [kat] HMAC-384Kdf
2,970,855 UART: [kat] LMS
3,500,300 UART: [kat] --
3,503,628 UART: [cold-reset] ++
3,505,069 UART: [fht] FHT @ 0x50003400
3,515,588 UART: [idev] ++
3,516,197 UART: [idev] CDI.KEYID = 6
3,517,091 UART: [idev] SUBJECT.KEYID = 7
3,518,217 UART: [idev] UDS.KEYID = 0
3,519,214 ready_for_fw is high
3,519,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,322 UART: [idev] Erasing UDS.KEYID = 0
6,022,684 UART: [idev] Sha1 KeyId Algorithm
6,045,586 UART: [idev] --
6,050,819 UART: [ldev] ++
6,051,390 UART: [ldev] CDI.KEYID = 6
6,052,273 UART: [ldev] SUBJECT.KEYID = 5
6,053,484 UART: [ldev] AUTHORITY.KEYID = 7
6,054,719 UART: [ldev] FE.KEYID = 1
6,098,748 UART: [ldev] Erasing FE.KEYID = 1
8,604,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,525 UART: [ldev] --
10,413,237 UART: [fwproc] Wait for Commands...
10,415,599 UART: [fwproc] Recv command 0x46574c44
10,417,686 UART: [fwproc] Recv'd Img size: 114448 bytes
13,833,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,290,861 >>> mbox cmd response: success
14,291,335 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,294,525 UART: [afmc] ++
14,295,152 UART: [afmc] CDI.KEYID = 6
14,296,038 UART: [afmc] SUBJECT.KEYID = 7
14,297,198 UART: [afmc] AUTHORITY.KEYID = 5
16,828,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,616 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,793 UART: [afmc] --
18,628,812 UART: [cold-reset] --
18,632,301 UART: [state] Locking Datavault
18,638,453 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,106 UART: [state] Locking ICCM
18,641,746 UART: [exit] Launching FMC @ 0x40000130
18,650,190 UART:
18,650,449 UART: Running Caliptra FMC ...
18,651,551 UART:
18,651,708 UART: [state] CFI Enabled
18,711,928 UART: [fht] FMC Alias Private Key: 7
20,475,118 UART: [art] Extend RT PCRs Done
20,476,335 UART: [art] Lock RT PCRs Done
20,477,824 UART: [art] Populate DV Done
20,483,068 UART: [fht] FMC Alias Private Key: 7
20,484,766 UART: [art] Derive CDI
20,485,502 UART: [art] Store in in slot 0x4
20,545,053 UART: [art] Derive Key Pair
20,546,053 UART: [art] Store priv key in slot 0x5
23,008,486 UART: [art] Derive Key Pair - Done
23,021,750 UART: [art] Signing Cert with AUTHO
23,023,055 UART: RITY.KEYID = 7
24,734,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,407 UART: [art] PUB.X = 84DAE322085D602BDF371AA05D150A55C0CBC4BE867D535640D1508AE27FAB48E3A8978D94DFCECF87F14DD2C0B4D5B6
24,743,705 UART: [art] PUB.Y = 8BFB2B2BB6C7F13C5792BD12796FFF56B9942B147BAC5AE93866BF862A1372499B9365866FD5540201DD459C04CF19B4
24,750,929 UART: [art] SIG.R = 0C6C397B550808AABB4F526DD588BFCF0C3E50BC6EDEAF1C6AFC9FE8898172D84F73511087E9A890ECDA16132CFCD2B1
24,758,360 UART: [art] SIG.S = 8DF64B052E1049B7E1A5560A6E2A73F854206285A122E7D998DB54F74444CF97665A4D550F1A45608A59B6ED4692BCD9
25,737,245 UART: Caliptra RT
25,737,937 UART: [state] CFI Enabled
25,903,137 UART: [rt] RT listening for mailbox commands...
25,934,648 UART: [rt]cmd =0x4453424c, len=4
28,385,164 >>> mbox cmd response data (8 bytes)
30,449,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,595,868 UART:
30,596,264 UART: Running Caliptra ROM ...
30,597,337 UART:
30,597,494 UART: [state] CFI Enabled
30,661,969 UART: [state] LifecycleState = Unprovisioned
30,663,851 UART: [state] DebugLocked = No
30,665,040 UART: [state] WD Timer not started. Device not locked for debugging
30,668,797 UART: [kat] SHA2-256
30,847,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,859,519 UART: [kat] ++
30,860,063 UART: [kat] sha1
30,871,611 UART: [kat] SHA2-256
30,874,602 UART: [kat] SHA2-384
30,880,916 UART: [kat] SHA2-512-ACC
30,883,861 UART: [kat] ECC-384
33,346,412 UART: [kat] HMAC-384Kdf
33,370,882 UART: [kat] LMS
33,900,313 UART: [kat] --
33,903,578 UART: [update-reset] ++
37,338,892 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,343,023 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
37,726,334 >>> mbox cmd response: success
37,726,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,727,259 UART: [update-reset] Copying MAN_2 To MAN_1
37,749,584 UART: [update-reset Success] --
37,753,101 UART: [state] Locking Datavault
37,756,208 UART: [state] Locking PCR0, PCR1 and PCR31
37,757,849 UART: [state] Locking ICCM
37,760,431 UART: [exit] Launching FMC @ 0x40000130
37,768,878 UART:
37,769,109 UART: Running Caliptra FMC ...
37,770,208 UART:
37,770,366 UART: [state] CFI Enabled
37,863,159 UART: [art] Extend RT PCRs Done
37,864,355 UART: [art] Lock RT PCRs Done
37,865,700 UART: [art] Populate DV Done
37,871,379 UART: [fht] FMC Alias Private Key: 7
37,873,073 UART: [art] Derive CDI
37,873,890 UART: [art] Store in in slot 0x4
37,932,428 UART: [art] Derive Key Pair
37,933,464 UART: [art] Store priv key in slot 0x5
40,396,398 UART: [art] Derive Key Pair - Done
40,409,340 UART: [art] Signing Cert with AUTHO
40,410,643 UART: RITY.KEYID = 7
42,122,029 UART: [art] Erasing AUTHORITY.KEYID = 7
42,123,531 UART: [art] PUB.X = 9B2E11F8FD3CB99D183DBE10D34D5E1AE4B796D7A885382149FE4F6D1FDFD1765C520FE254D59481AC7CF7E267CBE88D
42,130,832 UART: [art] PUB.Y = EB2FF3248C5C5D799D9CC159C65808978C7992DB8B24C0AFD455833AEC2CD0E4E1804C350E5A470FD757AC526DEEF212
42,138,111 UART: [art] SIG.R = 5C12948614806A01FAAE208BFC0510C0C788918FE2195F5290B43296078F139BCEF7BB6C8842E10EB9D89DCA69DFF0A6
42,145,492 UART: [art] SIG.S = CCF0D8178988FF44E1D21D58C873B6BF3B10DD773C71D7CFF77537A8AF62662F03DCB02002A606CEF34698B0C22502C0
43,124,355 UART: Caliptra RT
43,125,081 UART: [state] CFI Enabled
45,915,097 UART: [rt] RT listening for mailbox commands...
45,946,346 UART: [rt]cmd =0x494e464f, len=4
45,950,359 >>> mbox cmd response data (264 bytes)
45,952,064 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,981,925 UART: [rt]cmd =0x43455252, len=4
45,993,264 >>> mbox cmd response data (783 bytes)
46,035,624 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,066,565 UART: [rt]cmd =0x44504543, len=92
50,414,200 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,384,306 ready_for_fw is high
3,384,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,089,870 >>> mbox cmd response: success
14,090,617 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,387,805 UART:
18,388,207 UART: Running Caliptra FMC ...
18,389,404 UART:
18,389,574 UART: [state] CFI Enabled
18,453,629 UART: [fht] FMC Alias Private Key: 7
20,217,724 UART: [art] Extend RT PCRs Done
20,218,948 UART: [art] Lock RT PCRs Done
20,220,626 UART: [art] Populate DV Done
20,226,217 UART: [fht] FMC Alias Private Key: 7
20,227,707 UART: [art] Derive CDI
20,228,470 UART: [art] Store in in slot 0x4
20,286,293 UART: [art] Derive Key Pair
20,287,287 UART: [art] Store priv key in slot 0x5
22,750,284 UART: [art] Derive Key Pair - Done
22,763,389 UART: [art] Signing Cert with AUTHO
22,764,697 UART: RITY.KEYID = 7
24,476,014 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,519 UART: [art] PUB.X = C2D521018DCE97765CA4FE7792BDD1870C22E8B2627C55F91FF81CB9096BC4C1EF7A6FDDF0C7A1D656037F8F25470575
24,484,774 UART: [art] PUB.Y = 98F4E0ABDA3C5EAA40CC1B11D600D4F2D981AE5D3695FC386BF06B3C64173FEBC78A571FF98D2D677B2E9DE5602C4A6D
24,492,034 UART: [art] SIG.R = 321C27B176F3F14C3380E182800143EDC6380B64755D32B7F186486D2AD67D5566E3C574B4B26F46C64246909EFE603A
24,499,387 UART: [art] SIG.S = 026646818AA6864DA1DD09686E12620C715B687EAADA937B08B189BC1989C7C7768FCD291227E6DED1A019F57D7BCE45
25,478,813 UART: Caliptra RT
25,479,523 UART: [state] CFI Enabled
25,645,114 UART: [rt] RT listening for mailbox commands...
25,676,273 UART: [rt]cmd =0x4453424c, len=4
28,127,610 >>> mbox cmd response data (8 bytes)
30,181,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
37,287,570 >>> mbox cmd response: success
37,288,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,320,461 UART:
37,320,752 UART: Running Caliptra FMC ...
37,321,788 UART:
37,321,937 UART: [state] CFI Enabled
37,413,326 UART: [art] Extend RT PCRs Done
37,414,530 UART: [art] Lock RT PCRs Done
37,416,196 UART: [art] Populate DV Done
37,421,637 UART: [fht] FMC Alias Private Key: 7
37,423,194 UART: [art] Derive CDI
37,423,931 UART: [art] Store in in slot 0x4
37,482,510 UART: [art] Derive Key Pair
37,483,507 UART: [art] Store priv key in slot 0x5
39,946,614 UART: [art] Derive Key Pair - Done
39,959,730 UART: [art] Signing Cert with AUTHO
39,961,026 UART: RITY.KEYID = 7
41,672,393 UART: [art] Erasing AUTHORITY.KEYID = 7
41,673,878 UART: [art] PUB.X = 4D94B1362A0095879AAA233DE6920A7C60628A12B611DB1EC3C229F562CA6DE35AE46746F0C7C15B3F5FDDEF7D6FEB57
41,681,128 UART: [art] PUB.Y = C999EF2FAE0CDBD3F8564FEA16E4054B5A595D7D02C99FAAF734B5D94AB07C13F784F542832897AC9A3B8BB698872BAB
41,688,424 UART: [art] SIG.R = D2AB79C8AEA673FF76DE6B3149B29420B110F783024752DA2FFAF164092F02023B4AA501A3CDF95C1076043719ADFEF5
41,695,816 UART: [art] SIG.S = 28F35CAE00182D0492C96CBE04594C1A028E9F562C00224ABF1252BC8B253EE19738104713FC6858216AADDB9BD8B243
42,674,728 UART: Caliptra RT
42,675,445 UART: [state] CFI Enabled
45,457,221 UART: [rt] RT listening for mailbox commands...
45,488,198 UART: [rt]cmd =0x494e464f, len=4
45,492,109 >>> mbox cmd response data (264 bytes)
45,493,738 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,523,570 UART: [rt]cmd =0x43455252, len=4
45,534,966 >>> mbox cmd response data (783 bytes)
45,576,431 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,607,465 UART: [rt]cmd =0x44504543, len=92
49,963,962 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,482 UART:
192,837 UART: Running Caliptra ROM ...
193,941 UART:
603,349 UART: [state] CFI Enabled
620,589 UART: [state] LifecycleState = Unprovisioned
622,352 UART: [state] DebugLocked = No
623,953 UART: [state] WD Timer not started. Device not locked for debugging
627,698 UART: [kat] SHA2-256
806,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,377 UART: [kat] ++
818,908 UART: [kat] sha1
830,543 UART: [kat] SHA2-256
833,547 UART: [kat] SHA2-384
838,901 UART: [kat] SHA2-512-ACC
841,829 UART: [kat] ECC-384
3,285,537 UART: [kat] HMAC-384Kdf
3,299,407 UART: [kat] LMS
3,828,854 UART: [kat] --
3,834,305 UART: [cold-reset] ++
3,835,747 UART: [fht] FHT @ 0x50003400
3,846,462 UART: [idev] ++
3,847,026 UART: [idev] CDI.KEYID = 6
3,847,935 UART: [idev] SUBJECT.KEYID = 7
3,849,101 UART: [idev] UDS.KEYID = 0
3,850,143 ready_for_fw is high
3,850,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,199 UART: [idev] Erasing UDS.KEYID = 0
6,325,823 UART: [idev] Sha1 KeyId Algorithm
6,348,884 UART: [idev] --
6,353,027 UART: [ldev] ++
6,353,588 UART: [ldev] CDI.KEYID = 6
6,354,489 UART: [ldev] SUBJECT.KEYID = 5
6,355,692 UART: [ldev] AUTHORITY.KEYID = 7
6,356,866 UART: [ldev] FE.KEYID = 1
6,366,682 UART: [ldev] Erasing FE.KEYID = 1
8,836,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,308 UART: [ldev] --
10,628,066 UART: [fwproc] Wait for Commands...
10,630,174 UART: [fwproc] Recv command 0x46574c44
10,632,258 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,773 >>> mbox cmd response: success
14,501,283 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,505,243 UART: [afmc] ++
14,505,824 UART: [afmc] CDI.KEYID = 6
14,506,725 UART: [afmc] SUBJECT.KEYID = 7
14,507,908 UART: [afmc] AUTHORITY.KEYID = 5
17,009,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,042 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,299 UART: [afmc] --
18,806,590 UART: [cold-reset] --
18,811,257 UART: [state] Locking Datavault
18,817,413 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,097 UART: [state] Locking ICCM
18,820,248 UART: [exit] Launching FMC @ 0x40000130
18,828,689 UART:
18,828,922 UART: Running Caliptra FMC ...
18,829,937 UART:
18,830,099 UART: [state] CFI Enabled
18,838,410 UART: [fht] FMC Alias Private Key: 7
20,594,919 UART: [art] Extend RT PCRs Done
20,596,134 UART: [art] Lock RT PCRs Done
20,597,651 UART: [art] Populate DV Done
20,602,839 UART: [fht] FMC Alias Private Key: 7
20,604,417 UART: [art] Derive CDI
20,605,219 UART: [art] Store in in slot 0x4
20,647,697 UART: [art] Derive Key Pair
20,648,732 UART: [art] Store priv key in slot 0x5
23,075,790 UART: [art] Derive Key Pair - Done
23,088,671 UART: [art] Signing Cert with AUTHO
23,089,976 UART: RITY.KEYID = 7
24,794,691 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,190 UART: [art] PUB.X = 806BECF48BB4C8BD2F74074C7BB968432DE63896E1D1B793965F0092EB49586D5F4429511F662E7B7C5A2FAEB3FA58C5
24,803,479 UART: [art] PUB.Y = 1B81AE55945F227BE924087BD7313D966113393CBA3D197480810D2A16ED50ED051185A9ECF9D779563CEEA9019D30C1
24,810,720 UART: [art] SIG.R = F56827B3089F26376AEBE13F0337B650AE9E3929C36B9A3F4971C962929D6E2876125FDCAEC9FAFF7AC9D0932B9536DC
24,818,107 UART: [art] SIG.S = 65427838A0C4E99D4A0CF4A95806ED425E1211BE3D1CD91ED2FB46779EFC1DBE9FAD98C4F8E1B69AE3569A28E11EE8E4
25,797,123 UART: Caliptra RT
25,797,829 UART: [state] CFI Enabled
25,914,629 UART: [rt] RT listening for mailbox commands...
25,946,363 UART: [rt]cmd =0x4453424c, len=4
28,374,850 >>> mbox cmd response data (8 bytes)
30,429,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,575,341 UART:
30,575,699 UART: Running Caliptra ROM ...
30,576,784 UART:
30,576,937 UART: [state] CFI Enabled
30,589,074 UART: [state] LifecycleState = Unprovisioned
30,590,902 UART: [state] DebugLocked = No
30,593,574 UART: [state] WD Timer not started. Device not locked for debugging
30,597,309 UART: [kat] SHA2-256
30,776,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,788,097 UART: [kat] ++
30,788,638 UART: [kat] sha1
30,799,199 UART: [kat] SHA2-256
30,802,255 UART: [kat] SHA2-384
30,808,615 UART: [kat] SHA2-512-ACC
30,811,550 UART: [kat] ECC-384
33,253,651 UART: [kat] HMAC-384Kdf
33,265,061 UART: [kat] LMS
33,794,560 UART: [kat] --
33,799,281 UART: [update-reset] ++
37,225,479 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,228,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
37,611,322 >>> mbox cmd response: success
37,611,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,612,909 UART: [update-reset] Copying MAN_2 To MAN_1
37,635,226 UART: [update-reset Success] --
37,639,773 UART: [state] Locking Datavault
37,644,050 UART: [state] Locking PCR0, PCR1 and PCR31
37,645,691 UART: [state] Locking ICCM
37,647,240 UART: [exit] Launching FMC @ 0x40000130
37,655,679 UART:
37,655,907 UART: Running Caliptra FMC ...
37,657,000 UART:
37,657,153 UART: [state] CFI Enabled
37,701,374 UART: [art] Extend RT PCRs Done
37,702,553 UART: [art] Lock RT PCRs Done
37,704,161 UART: [art] Populate DV Done
37,709,469 UART: [fht] FMC Alias Private Key: 7
37,710,947 UART: [art] Derive CDI
37,711,701 UART: [art] Store in in slot 0x4
37,754,281 UART: [art] Derive Key Pair
37,755,323 UART: [art] Store priv key in slot 0x5
40,182,240 UART: [art] Derive Key Pair - Done
40,195,245 UART: [art] Signing Cert with AUTHO
40,196,544 UART: RITY.KEYID = 7
41,901,909 UART: [art] Erasing AUTHORITY.KEYID = 7
41,903,424 UART: [art] PUB.X = 19D58C9729126FBCC2E7E5478577B8C606709C430700A4BE5056584C134E151237D2A0B1E3B4FBC4AFE5A25343370B14
41,910,662 UART: [art] PUB.Y = 5D686B30F46B4D37A00FB7D536691877A2907D5A4FA4A2A1987F783922EAABA7208331C272C24E4E8F7582CEBB1E52F5
41,917,899 UART: [art] SIG.R = 883E7DE65C6DA52A2857EC783FF22FC26089E3DD50DE6E9087E065041A7E3C4DF70A0870F9B4508DACAFF971DEA7F373
41,925,276 UART: [art] SIG.S = AD9CEB6E3CC2BD3D1318CA6678CDED52A9DED807E5F23F9665AB01B891BFF87C4B7CD5EC6F7AF53D5DFE920CB1EBF9EC
42,903,866 UART: Caliptra RT
42,904,578 UART: [state] CFI Enabled
45,618,146 UART: [rt] RT listening for mailbox commands...
45,649,226 UART: [rt]cmd =0x494e464f, len=4
45,653,020 >>> mbox cmd response data (264 bytes)
45,654,701 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,684,424 UART: [rt]cmd =0x43455252, len=4
45,695,765 >>> mbox cmd response data (784 bytes)
45,738,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,769,066 UART: [rt]cmd =0x44504543, len=92
50,054,140 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,695,480 ready_for_fw is high
3,695,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,042 >>> mbox cmd response: success
14,270,645 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,522,431 UART:
18,522,818 UART: Running Caliptra FMC ...
18,523,947 UART:
18,524,092 UART: [state] CFI Enabled
18,532,177 UART: [fht] FMC Alias Private Key: 7
20,289,700 UART: [art] Extend RT PCRs Done
20,290,917 UART: [art] Lock RT PCRs Done
20,292,812 UART: [art] Populate DV Done
20,298,266 UART: [fht] FMC Alias Private Key: 7
20,299,916 UART: [art] Derive CDI
20,300,727 UART: [art] Store in in slot 0x4
20,343,225 UART: [art] Derive Key Pair
20,344,226 UART: [art] Store priv key in slot 0x5
22,770,606 UART: [art] Derive Key Pair - Done
22,784,029 UART: [art] Signing Cert with AUTHO
22,785,330 UART: RITY.KEYID = 7
24,490,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,933 UART: [art] PUB.X = BC29A482FE15AEFC3F93F8556259803B706F8FF43C231187953FFF2FF7B4185655C7B24CE82FBB7AEAC24E2764B16571
24,499,175 UART: [art] PUB.Y = C7CA7CA808802B6828AF736B099485AB17604A1503096481C8D0297125270855F8D65AFE1AF4BC39FFA2A959A21397F7
24,506,477 UART: [art] SIG.R = B3946E64B159AB8B86F2AD5494D49549C19D7A3DA2FFDA729ADDF541EA5B1AB61EC92C1B926AC9E1396C9BE92866EE6E
24,513,865 UART: [art] SIG.S = B0D5FCCF4E96ECF0200715ABE0E8F6CFF9A4E0223806FAE9F564B2733E168CA000DAA846B787EB456FD891252C9BFC51
25,492,768 UART: Caliptra RT
25,493,467 UART: [state] CFI Enabled
25,610,798 UART: [rt] RT listening for mailbox commands...
25,642,244 UART: [rt]cmd =0x4453424c, len=4
28,070,461 >>> mbox cmd response data (8 bytes)
30,124,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
37,175,355 >>> mbox cmd response: success
37,175,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,211,649 UART:
37,211,926 UART: Running Caliptra FMC ...
37,212,949 UART:
37,213,090 UART: [state] CFI Enabled
37,257,431 UART: [art] Extend RT PCRs Done
37,258,630 UART: [art] Lock RT PCRs Done
37,260,017 UART: [art] Populate DV Done
37,265,168 UART: [fht] FMC Alias Private Key: 7
37,266,810 UART: [art] Derive CDI
37,267,540 UART: [art] Store in in slot 0x4
37,309,980 UART: [art] Derive Key Pair
37,310,976 UART: [art] Store priv key in slot 0x5
39,738,031 UART: [art] Derive Key Pair - Done
39,750,773 UART: [art] Signing Cert with AUTHO
39,752,070 UART: RITY.KEYID = 7
41,457,652 UART: [art] Erasing AUTHORITY.KEYID = 7
41,459,154 UART: [art] PUB.X = C138D549DF56EE27039B07CEE46F931F3E24AE667BD2D23847BCD79969026BF2200A409F2332AE0A52F110E424FDAD2C
41,466,443 UART: [art] PUB.Y = 55EF44F3DEFD6433288A3FCA7563DBA35BC50E9B81FC815D2249BCC1469C6611D0C30D3FE2165609473C326062E14943
41,473,717 UART: [art] SIG.R = 56DA66EF5F76B8D1F8C6BD888F7476A1A22DA70F19A118522E957F55E147BC93DF0A8960BE4FED2702F4B8E888A775D0
41,481,148 UART: [art] SIG.S = 792B4AE3794EBAF0C8E8837D042D8182C52C9C065D13E8474EE0F5003761D99E110E4B32E3C714F0174F050928BD2ABA
42,459,267 UART: Caliptra RT
42,459,966 UART: [state] CFI Enabled
45,175,478 UART: [rt] RT listening for mailbox commands...
45,206,384 UART: [rt]cmd =0x494e464f, len=4
45,210,449 >>> mbox cmd response data (264 bytes)
45,212,071 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,241,727 UART: [rt]cmd =0x43455252, len=4
45,252,950 >>> mbox cmd response data (782 bytes)
45,294,437 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,325,336 UART: [rt]cmd =0x44504543, len=92
49,610,419 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,140 UART:
192,513 UART: Running Caliptra ROM ...
193,621 UART:
193,766 UART: [state] CFI Enabled
262,206 UART: [state] LifecycleState = Unprovisioned
264,581 UART: [state] DebugLocked = No
267,093 UART: [state] WD Timer not started. Device not locked for debugging
272,122 UART: [kat] SHA2-256
462,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,797 UART: [kat] ++
473,254 UART: [kat] sha1
485,125 UART: [kat] SHA2-256
488,135 UART: [kat] SHA2-384
494,271 UART: [kat] SHA2-512-ACC
496,879 UART: [kat] ECC-384
2,950,741 UART: [kat] HMAC-384Kdf
2,972,783 UART: [kat] LMS
3,504,536 UART: [kat] --
3,510,376 UART: [cold-reset] ++
3,512,732 UART: [fht] FHT @ 0x50003400
3,525,271 UART: [idev] ++
3,525,906 UART: [idev] CDI.KEYID = 6
3,526,937 UART: [idev] SUBJECT.KEYID = 7
3,528,111 UART: [idev] UDS.KEYID = 0
3,529,035 ready_for_fw is high
3,529,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,197 UART: [idev] Erasing UDS.KEYID = 0
6,025,137 UART: [idev] Sha1 KeyId Algorithm
6,047,204 UART: [idev] --
6,051,669 UART: [ldev] ++
6,052,378 UART: [ldev] CDI.KEYID = 6
6,053,302 UART: [ldev] SUBJECT.KEYID = 5
6,054,461 UART: [ldev] AUTHORITY.KEYID = 7
6,055,694 UART: [ldev] FE.KEYID = 1
6,100,912 UART: [ldev] Erasing FE.KEYID = 1
8,608,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,346 UART: [ldev] --
10,416,200 UART: [fwproc] Wait for Commands...
10,418,025 UART: [fwproc] Recv command 0x46574c44
10,420,284 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,857 >>> mbox cmd response: success
14,609,348 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,613,010 UART: [afmc] ++
14,613,734 UART: [afmc] CDI.KEYID = 6
14,614,848 UART: [afmc] SUBJECT.KEYID = 7
14,616,394 UART: [afmc] AUTHORITY.KEYID = 5
17,151,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,053 UART: [afmc] --
18,949,782 UART: [cold-reset] --
18,953,167 UART: [state] Locking Datavault
18,958,002 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,200 UART: [state] Locking ICCM
18,961,683 UART: [exit] Launching FMC @ 0x40000130
18,970,350 UART:
18,970,580 UART: Running Caliptra FMC ...
18,971,604 UART:
18,971,751 UART: [state] CFI Enabled
19,033,743 UART: [fht] FMC Alias Private Key: 7
20,798,144 UART: [art] Extend RT PCRs Done
20,799,361 UART: [art] Lock RT PCRs Done
20,801,017 UART: [art] Populate DV Done
20,806,375 UART: [fht] FMC Alias Private Key: 7
20,807,855 UART: [art] Derive CDI
20,808,585 UART: [art] Store in in slot 0x4
20,866,454 UART: [art] Derive Key Pair
20,867,490 UART: [art] Store priv key in slot 0x5
23,330,313 UART: [art] Derive Key Pair - Done
23,343,472 UART: [art] Signing Cert with AUTHO
23,344,783 UART: RITY.KEYID = 7
25,056,787 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,285 UART: [art] PUB.X = 1BAA485842BD47A001BEA7D38634A86320EF800FEE78F5787ADB3B490B1034911CE409D8C47884DDF46054F536E5520C
25,065,526 UART: [art] PUB.Y = 91CDE033CF3AD36D38DB29EED12C43035E555A0457E8AAB34548C5ED87B665CEADBC9596432ABEC6381716D23D5767DB
25,072,810 UART: [art] SIG.R = F93CC755A298DECD1EEA9134F39F6A3131974BA2AC00E2119A7CBACD762BDF8244B55833986521F176204B8FB6F7D84F
25,080,266 UART: [art] SIG.S = 0FDD36956DB44554530BF3B002298D202B93EEE874BA6DBB1C8493E03816A15BE358194C4F82AB19E3EFBE919BBE4DDB
26,058,799 UART: Caliptra RT
26,059,498 UART: [state] CFI Enabled
26,224,703 UART: [rt] RT listening for mailbox commands...
26,256,005 UART: [rt]cmd =0x4453424c, len=4
28,706,573 >>> mbox cmd response data (8 bytes)
30,763,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,909,298 UART:
30,909,647 UART: Running Caliptra ROM ...
30,910,700 UART:
30,910,852 UART: [state] CFI Enabled
30,986,715 UART: [state] LifecycleState = Unprovisioned
30,988,818 UART: [state] DebugLocked = No
30,991,207 UART: [state] WD Timer not started. Device not locked for debugging
30,995,430 UART: [kat] SHA2-256
31,185,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,196,087 UART: [kat] ++
31,196,547 UART: [kat] sha1
31,208,025 UART: [kat] SHA2-256
31,211,043 UART: [kat] SHA2-384
31,215,648 UART: [kat] SHA2-512-ACC
31,218,216 UART: [kat] ECC-384
33,669,586 UART: [kat] HMAC-384Kdf
33,693,485 UART: [kat] LMS
34,225,054 UART: [kat] --
34,232,610 UART: [update-reset] ++
37,687,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,690,815 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
38,299,066 >>> mbox cmd response: success
38,299,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,299,778 UART: [update-reset] Copying MAN_2 To MAN_1
38,337,339 UART: [update-reset Success] --
38,341,254 UART: [state] Locking Datavault
38,344,131 UART: [state] Locking PCR0, PCR1 and PCR31
38,346,324 UART: [state] Locking ICCM
38,348,475 UART: [exit] Launching FMC @ 0x40000130
38,357,115 UART:
38,357,389 UART: Running Caliptra FMC ...
38,358,499 UART:
38,358,656 UART: [state] CFI Enabled
38,460,940 UART: [art] Extend RT PCRs Done
38,462,121 UART: [art] Lock RT PCRs Done
38,463,791 UART: [art] Populate DV Done
38,469,301 UART: [fht] FMC Alias Private Key: 7
38,470,998 UART: [art] Derive CDI
38,471,804 UART: [art] Store in in slot 0x4
38,530,762 UART: [art] Derive Key Pair
38,531,797 UART: [art] Store priv key in slot 0x5
40,994,393 UART: [art] Derive Key Pair - Done
41,007,075 UART: [art] Signing Cert with AUTHO
41,008,387 UART: RITY.KEYID = 7
42,720,717 UART: [art] Erasing AUTHORITY.KEYID = 7
42,722,245 UART: [art] PUB.X = BA96D66470E01C7FEEF56E1CD64639F32C5846ABA91469903DE687D6587017FDD645BBE268D057B4CA0BC9B8E5B954D9
42,729,497 UART: [art] PUB.Y = E153B6D239ECA450DF01E6574C5276EF73C8986E9B9BFBBDDCA4EB179735E8F54E4F5E5C6138A375F95AC1796FE460AA
42,736,731 UART: [art] SIG.R = 994594E9AF77B91A4B3B6F64ACC44D1070C9CFE60B7C567194CBD2E7E5B390455DC9708008A4B4DB70FF6BD6F28ECA49
42,744,173 UART: [art] SIG.S = D54A9182A32ACCF4FAC48C8F4C8709C0A03CF6DEB99F6C8810BC9ABC439906D2EF7A7013578CC7FAD4BBC1DD95F5A517
43,723,230 UART: Caliptra RT
43,723,923 UART: [state] CFI Enabled
46,516,356 UART: [rt] RT listening for mailbox commands...
46,547,482 UART: [rt]cmd =0x494e464f, len=4
46,551,654 >>> mbox cmd response data (264 bytes)
46,553,324 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,583,073 UART: [rt]cmd =0x43455252, len=4
46,594,553 >>> mbox cmd response data (784 bytes)
46,635,819 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,666,717 UART: [rt]cmd =0x44504543, len=92
51,013,135 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,439,946 ready_for_fw is high
3,440,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,084 >>> mbox cmd response: success
14,737,696 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,022,752 UART:
19,023,134 UART: Running Caliptra FMC ...
19,024,323 UART:
19,024,500 UART: [state] CFI Enabled
19,094,356 UART: [fht] FMC Alias Private Key: 7
20,857,983 UART: [art] Extend RT PCRs Done
20,859,200 UART: [art] Lock RT PCRs Done
20,861,074 UART: [art] Populate DV Done
20,866,434 UART: [fht] FMC Alias Private Key: 7
20,868,097 UART: [art] Derive CDI
20,868,917 UART: [art] Store in in slot 0x4
20,926,002 UART: [art] Derive Key Pair
20,927,041 UART: [art] Store priv key in slot 0x5
23,390,089 UART: [art] Derive Key Pair - Done
23,403,147 UART: [art] Signing Cert with AUTHO
23,404,448 UART: RITY.KEYID = 7
25,115,708 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,211 UART: [art] PUB.X = A29B6862F4F1735E073D3BE0A6D6FA4B10816DED635FCDA9943F616BD99DC92E499263FC69AD3D6E597F422BADBD7331
25,124,520 UART: [art] PUB.Y = 7D57CE2644D144A03CFBA9B110D32CCDC23C17C6709562135C131553CA412EAFAD73B743579633644C990A8554295027
25,131,711 UART: [art] SIG.R = DF6C7F8FCBF42E83EBE305EE8DCDF70B01352E7FBBF4202C4CF4D7CABC649BA6CE54392A8D15FA7C3DB79EFD9241A755
25,139,157 UART: [art] SIG.S = 6102D181C085CF02A887D37BC376EADF3B8A5AA15DA15392DCAFD29E5E678049DA60058FCF8D5A747CAE95484149AA8B
26,117,855 UART: Caliptra RT
26,118,567 UART: [state] CFI Enabled
26,284,394 UART: [rt] RT listening for mailbox commands...
26,315,758 UART: [rt]cmd =0x4453424c, len=4
28,787,692 >>> mbox cmd response data (8 bytes)
30,856,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,670,472 >>> mbox cmd response: success
38,671,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,705,945 UART:
38,706,228 UART: Running Caliptra FMC ...
38,707,351 UART:
38,707,510 UART: [state] CFI Enabled
38,800,126 UART: [art] Extend RT PCRs Done
38,801,342 UART: [art] Lock RT PCRs Done
38,802,730 UART: [art] Populate DV Done
38,808,305 UART: [fht] FMC Alias Private Key: 7
38,809,999 UART: [art] Derive CDI
38,810,812 UART: [art] Store in in slot 0x4
38,869,388 UART: [art] Derive Key Pair
38,870,385 UART: [art] Store priv key in slot 0x5
41,333,164 UART: [art] Derive Key Pair - Done
41,346,327 UART: [art] Signing Cert with AUTHO
41,347,624 UART: RITY.KEYID = 7
43,058,313 UART: [art] Erasing AUTHORITY.KEYID = 7
43,059,824 UART: [art] PUB.X = 9EAF06FE194D0B0DE64670C054F90CA9697F98DD399DE9E6F31BB129EEC818ECD4BAF2B107325E5F156B528020103DC3
43,067,072 UART: [art] PUB.Y = 9DB385ABEA43CBD6E466471BFD22C93368A006D4625279F99F473706CAE7B7CA1ED314F766594E13B682F6761A76B8D4
43,074,353 UART: [art] SIG.R = 9F74EB7FB23ACD2C14BF956FDBD0157E3D37E25C7FD11010D3C3BB42C373EF39713418D23E034BD56C3387D9FFEF160B
43,081,737 UART: [art] SIG.S = 9C00A87F96523B8B604A35CA4C4E0689C657323C0A3CD3CA4A0B08829A75D5375E56A2EA5D8416FDA14E4EB535EA1755
44,061,229 UART: Caliptra RT
44,061,943 UART: [state] CFI Enabled
46,844,539 UART: [rt] RT listening for mailbox commands...
46,875,592 UART: [rt]cmd =0x494e464f, len=4
46,879,422 >>> mbox cmd response data (264 bytes)
46,881,082 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,910,836 UART: [rt]cmd =0x43455252, len=4
46,922,133 >>> mbox cmd response data (784 bytes)
46,964,293 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,995,211 UART: [rt]cmd =0x44504543, len=92
51,350,221 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,335 UART:
192,708 UART: Running Caliptra ROM ...
193,892 UART:
603,531 UART: [state] CFI Enabled
619,193 UART: [state] LifecycleState = Unprovisioned
621,553 UART: [state] DebugLocked = No
622,943 UART: [state] WD Timer not started. Device not locked for debugging
627,340 UART: [kat] SHA2-256
817,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,042 UART: [kat] ++
828,644 UART: [kat] sha1
840,017 UART: [kat] SHA2-256
843,027 UART: [kat] SHA2-384
850,505 UART: [kat] SHA2-512-ACC
853,079 UART: [kat] ECC-384
3,292,493 UART: [kat] HMAC-384Kdf
3,306,077 UART: [kat] LMS
3,837,873 UART: [kat] --
3,841,342 UART: [cold-reset] ++
3,842,848 UART: [fht] FHT @ 0x50003400
3,855,165 UART: [idev] ++
3,855,871 UART: [idev] CDI.KEYID = 6
3,856,846 UART: [idev] SUBJECT.KEYID = 7
3,858,011 UART: [idev] UDS.KEYID = 0
3,858,927 ready_for_fw is high
3,859,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,823 UART: [idev] Erasing UDS.KEYID = 0
6,334,359 UART: [idev] Sha1 KeyId Algorithm
6,357,303 UART: [idev] --
6,363,399 UART: [ldev] ++
6,364,072 UART: [ldev] CDI.KEYID = 6
6,364,953 UART: [ldev] SUBJECT.KEYID = 5
6,366,155 UART: [ldev] AUTHORITY.KEYID = 7
6,367,378 UART: [ldev] FE.KEYID = 1
6,375,833 UART: [ldev] Erasing FE.KEYID = 1
8,851,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,948 UART: [ldev] --
10,641,947 UART: [fwproc] Wait for Commands...
10,644,523 UART: [fwproc] Recv command 0x46574c44
10,646,827 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,826,407 >>> mbox cmd response: success
14,826,903 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,830,331 UART: [afmc] ++
14,831,019 UART: [afmc] CDI.KEYID = 6
14,832,257 UART: [afmc] SUBJECT.KEYID = 7
14,833,687 UART: [afmc] AUTHORITY.KEYID = 5
17,334,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,057,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,059,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,129,177 UART: [afmc] --
19,133,203 UART: [cold-reset] --
19,138,355 UART: [state] Locking Datavault
19,145,219 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,416 UART: [state] Locking ICCM
19,148,806 UART: [exit] Launching FMC @ 0x40000130
19,157,479 UART:
19,157,707 UART: Running Caliptra FMC ...
19,158,798 UART:
19,158,947 UART: [state] CFI Enabled
19,167,096 UART: [fht] FMC Alias Private Key: 7
20,923,608 UART: [art] Extend RT PCRs Done
20,924,827 UART: [art] Lock RT PCRs Done
20,926,497 UART: [art] Populate DV Done
20,931,746 UART: [fht] FMC Alias Private Key: 7
20,933,437 UART: [art] Derive CDI
20,934,240 UART: [art] Store in in slot 0x4
20,976,505 UART: [art] Derive Key Pair
20,977,540 UART: [art] Store priv key in slot 0x5
23,404,474 UART: [art] Derive Key Pair - Done
23,417,683 UART: [art] Signing Cert with AUTHO
23,418,977 UART: RITY.KEYID = 7
25,124,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,225 UART: [art] PUB.X = 92B669885C3BB2933045475EE8EAE409F8A779D27F2162E35D49AD897D447F0C92520A985BDA2F3103A7C2F7E8094A5E
25,133,511 UART: [art] PUB.Y = B93BBBBB0921719710F0D4B11BD27B1BFB3CB3DE3F2D04277494B4B957AB609067B5331199C0CB376589FE3D13C377FB
25,140,783 UART: [art] SIG.R = 2F0D94F4C2A09EE62171178E024654128DEB630D186899D79AE8862439ED01C092C78DDCC18C6A7DC825DE494F09BE6B
25,148,156 UART: [art] SIG.S = 28961F41C323858042091F69CC8F90E68A3BDA7D88B9E7AD9BF23B5119BAF17D20AF370850507C5AF743379F2F2E1FD4
26,127,549 UART: Caliptra RT
26,128,257 UART: [state] CFI Enabled
26,243,948 UART: [rt] RT listening for mailbox commands...
26,275,363 UART: [rt]cmd =0x4453424c, len=4
28,703,252 >>> mbox cmd response data (8 bytes)
30,759,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,905,001 UART:
30,905,376 UART: Running Caliptra ROM ...
30,906,505 UART:
30,906,671 UART: [state] CFI Enabled
30,916,669 UART: [state] LifecycleState = Unprovisioned
30,918,559 UART: [state] DebugLocked = No
30,920,422 UART: [state] WD Timer not started. Device not locked for debugging
30,925,650 UART: [kat] SHA2-256
31,115,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,126,303 UART: [kat] ++
31,126,895 UART: [kat] sha1
31,138,436 UART: [kat] SHA2-256
31,141,447 UART: [kat] SHA2-384
31,147,215 UART: [kat] SHA2-512-ACC
31,149,772 UART: [kat] ECC-384
33,592,543 UART: [kat] HMAC-384Kdf
33,606,070 UART: [kat] LMS
34,137,678 UART: [kat] --
34,141,486 UART: [update-reset] ++
37,609,744 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,612,854 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
38,221,154 >>> mbox cmd response: success
38,221,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,222,407 UART: [update-reset] Copying MAN_2 To MAN_1
38,259,975 UART: [update-reset Success] --
38,264,478 UART: [state] Locking Datavault
38,269,565 UART: [state] Locking PCR0, PCR1 and PCR31
38,271,758 UART: [state] Locking ICCM
38,274,688 UART: [exit] Launching FMC @ 0x40000130
38,283,348 UART:
38,283,576 UART: Running Caliptra FMC ...
38,284,591 UART:
38,284,730 UART: [state] CFI Enabled
38,329,227 UART: [art] Extend RT PCRs Done
38,330,405 UART: [art] Lock RT PCRs Done
38,332,092 UART: [art] Populate DV Done
38,337,715 UART: [fht] FMC Alias Private Key: 7
38,339,405 UART: [art] Derive CDI
38,340,133 UART: [art] Store in in slot 0x4
38,382,685 UART: [art] Derive Key Pair
38,383,760 UART: [art] Store priv key in slot 0x5
40,810,432 UART: [art] Derive Key Pair - Done
40,823,266 UART: [art] Signing Cert with AUTHO
40,824,560 UART: RITY.KEYID = 7
42,530,040 UART: [art] Erasing AUTHORITY.KEYID = 7
42,531,532 UART: [art] PUB.X = B8D2CEA26FE909C0CF2C977399183AA1A60A3EA498859D11BF82F1FB0A7478A0E0663E153123018F80FD534FEE9FD6FC
42,538,822 UART: [art] PUB.Y = 9A9AD2AE15DA36D09BC9BCB89D68211E0A087C7C796B8FB0523FC803BFF5491E05B293A838917F70156D776EA807160B
42,546,116 UART: [art] SIG.R = E061FF70381B449C8FA56B81E0445AB6F80B5E08CFA9BD90B299EC3F97F662F11AE31C0374B9E8A01F1F643A69DAB1D6
42,553,527 UART: [art] SIG.S = D7236EFE5E38F11E66C9C3D28D977568527E1FF6C0B28416B91567BB8C443228AFB8412F3870CDBF1D6533F8075E4E26
43,532,403 UART: Caliptra RT
43,533,094 UART: [state] CFI Enabled
46,247,883 UART: [rt] RT listening for mailbox commands...
46,278,947 UART: [rt]cmd =0x494e464f, len=4
46,282,795 >>> mbox cmd response data (264 bytes)
46,284,459 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,314,549 UART: [rt]cmd =0x43455252, len=4
46,325,607 >>> mbox cmd response data (784 bytes)
46,367,111 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,397,675 UART: [rt]cmd =0x44504543, len=92
50,682,766 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,756,788 ready_for_fw is high
3,757,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,974,098 >>> mbox cmd response: success
14,974,860 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,229,614 UART:
19,230,006 UART: Running Caliptra FMC ...
19,231,138 UART:
19,231,289 UART: [state] CFI Enabled
19,239,454 UART: [fht] FMC Alias Private Key: 7
20,996,626 UART: [art] Extend RT PCRs Done
20,997,858 UART: [art] Lock RT PCRs Done
20,999,605 UART: [art] Populate DV Done
21,004,963 UART: [fht] FMC Alias Private Key: 7
21,006,678 UART: [art] Derive CDI
21,007,497 UART: [art] Store in in slot 0x4
21,050,099 UART: [art] Derive Key Pair
21,051,099 UART: [art] Store priv key in slot 0x5
23,477,698 UART: [art] Derive Key Pair - Done
23,490,858 UART: [art] Signing Cert with AUTHO
23,492,159 UART: RITY.KEYID = 7
25,197,777 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,285 UART: [art] PUB.X = 1BDB43DB1BCEA017FBC9EBA283ADC34CAEF25961761CBBCD936DC898AC4C075A7BF7DBE893A7F60E8A20E620DBD3C284
25,206,574 UART: [art] PUB.Y = 06DCE6E39CAFAE1E5A04EEC2EC3B934893621D8CE8DF4CF8FEAFD8A9591C8C3DA6AD6DBEEF3BED46D4077AFF5C9E0B56
25,213,868 UART: [art] SIG.R = F9DE0BFD3EE9EC91F0E7A549B141F674067C53872E11D8D853379DBD7915434F7C66EACE92FAA17BD985DEB3E4398610
25,221,313 UART: [art] SIG.S = 9653096C574F351625A4C2E230064CA6498F98797495A535ABC0F1FD05B79755D09AAA3368CF2B9588A035AE389A30CA
26,199,934 UART: Caliptra RT
26,200,633 UART: [state] CFI Enabled
26,318,143 UART: [rt] RT listening for mailbox commands...
26,349,598 UART: [rt]cmd =0x4453424c, len=4
28,777,872 >>> mbox cmd response data (8 bytes)
30,832,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,559,883 >>> mbox cmd response: success
38,560,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,595,163 UART:
38,595,486 UART: Running Caliptra FMC ...
38,596,605 UART:
38,596,761 UART: [state] CFI Enabled
38,640,667 UART: [art] Extend RT PCRs Done
38,641,831 UART: [art] Lock RT PCRs Done
38,643,286 UART: [art] Populate DV Done
38,648,536 UART: [fht] FMC Alias Private Key: 7
38,650,068 UART: [art] Derive CDI
38,650,879 UART: [art] Store in in slot 0x4
38,693,598 UART: [art] Derive Key Pair
38,694,636 UART: [art] Store priv key in slot 0x5
41,121,319 UART: [art] Derive Key Pair - Done
41,134,482 UART: [art] Signing Cert with AUTHO
41,135,778 UART: RITY.KEYID = 7
42,840,843 UART: [art] Erasing AUTHORITY.KEYID = 7
42,842,350 UART: [art] PUB.X = F93D90503F3716578544BC253634318BBF260489904452C5835628E7FF21C018072676FD4021730ACBB74ACDF7FD90DC
42,849,581 UART: [art] PUB.Y = A7B90AAA9C695603DA7EDA22A46DF3F486395A630CD37EB73810D532C444F3F31D480C04AB22FD1206E78249DC3C6217
42,856,851 UART: [art] SIG.R = C6D64763B3EA8735683359B5063F808C38B8626D8A3C2BD45CBD07C1E96D88CF4012A80E5147F26AE7B3A0C6CF27E9C3
42,864,174 UART: [art] SIG.S = 9C2C012E2622D31C344DF70FB6C162EE62918AE5F6AFCFE1E7B2CFAB8AFB27BCDD8DC10D56A7A6FC1D6365E51BBC7B7B
43,842,851 UART: Caliptra RT
43,843,559 UART: [state] CFI Enabled
46,557,772 UART: [rt] RT listening for mailbox commands...
46,588,813 UART: [rt]cmd =0x494e464f, len=4
46,592,858 >>> mbox cmd response data (264 bytes)
46,594,532 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,624,387 UART: [rt]cmd =0x43455252, len=4
46,635,784 >>> mbox cmd response data (784 bytes)
46,678,507 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,709,229 UART: [rt]cmd =0x44504543, len=92
50,993,347 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,127 UART: [kat] SHA2-256
892,065 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 ready_for_fw is high
1,480,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,938 UART: [idev] Erasing UDS.KEYID = 0
1,505,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,114 UART: [idev] --
1,515,337 UART: [ldev] ++
1,515,505 UART: [ldev] CDI.KEYID = 6
1,515,868 UART: [ldev] SUBJECT.KEYID = 5
1,516,294 UART: [ldev] AUTHORITY.KEYID = 7
1,516,757 UART: [ldev] FE.KEYID = 1
1,521,755 UART: [ldev] Erasing FE.KEYID = 1
1,546,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,624 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,730 UART: [fwproc] Received command 0x46574c44
1,587,521 UART: [fwproc] Received Image of size 114448 bytes
2,886,368 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,266 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,618 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,757 >>> mbox cmd response: success
3,078,757 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,079,871 UART: [afmc] ++
3,080,039 UART: [afmc] CDI.KEYID = 6
3,080,401 UART: [afmc] SUBJECT.KEYID = 7
3,080,826 UART: [afmc] AUTHORITY.KEYID = 5
3,115,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,615 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,500 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,190 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,949 UART: [afmc] --
3,159,019 UART: [cold-reset] --
3,159,763 UART: [state] Locking Datavault
3,160,906 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,510 UART: [state] Locking ICCM
3,162,124 UART: [exit] Launching FMC @ 0x40000130
3,167,453 UART:
3,167,469 UART: Running Caliptra FMC ...
3,167,877 UART:
3,167,931 UART: [state] CFI Enabled
3,178,700 UART: [fht] FMC Alias Private Key: 7
3,286,669 UART: [art] Extend RT PCRs Done
3,287,097 UART: [art] Lock RT PCRs Done
3,288,763 UART: [art] Populate DV Done
3,296,980 UART: [fht] FMC Alias Private Key: 7
3,298,142 UART: [art] Derive CDI
3,298,422 UART: [art] Store in in slot 0x4
3,383,809 UART: [art] Derive Key Pair
3,384,169 UART: [art] Store priv key in slot 0x5
3,396,991 UART: [art] Derive Key Pair - Done
3,411,903 UART: [art] Signing Cert with AUTHO
3,412,383 UART: RITY.KEYID = 7
3,426,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,620 UART: [art] PUB.X = BBFED62090A1B3884F3AF112570EC0719C2145D5F70593CADB4917F0CFA7E91CDEE45A1C66732702A46817D89E670309
3,434,379 UART: [art] PUB.Y = 7E9AA8EB3FD13B9A0D51D444AAEB3D9110EE6542EF75DE0F3C691DEC3F5C5292917E7721B4259DE90999F4B4BA7BE2DE
3,441,340 UART: [art] SIG.R = 3EB91797D3800E69B4EC79EF26665A13880A339A5BC68219CF39554C2FF014812F10A046618B10E237D3311933A875AF
3,448,096 UART: [art] SIG.S = 2D84410D56075C04F1F44BBFC57E6E244228E933EFD2D2715FF57F64E531251DCFE798FB3A345F1D8506537FA50AD21E
3,472,156 UART: Caliptra RT
3,472,409 UART: [state] CFI Enabled
3,580,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,051 UART: [rt]cmd =0x4453424c, len=4
3,625,001 >>> mbox cmd response data (8 bytes)
3,625,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,780 UART:
3,625,796 UART: Running Caliptra ROM ...
3,626,204 UART:
3,626,258 UART: [state] CFI Enabled
3,628,526 UART: [state] LifecycleState = Unprovisioned
3,629,181 UART: [state] DebugLocked = No
3,629,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,631,266 UART: [kat] SHA2-256
4,425,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,429,312 UART: [kat] ++
4,429,464 UART: [kat] sha1
4,433,500 UART: [kat] SHA2-256
4,435,438 UART: [kat] SHA2-384
4,438,077 UART: [kat] SHA2-512-ACC
4,439,977 UART: [kat] ECC-384
4,445,510 UART: [kat] HMAC-384Kdf
4,450,048 UART: [kat] LMS
5,018,244 UART: [kat] --
5,019,165 UART: [update-reset] ++
6,354,398 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,355,470 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,505,520 >>> mbox cmd response: success
6,505,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,505,683 UART: [update-reset] Copying MAN_2 To MAN_1
6,513,697 UART: [update-reset Success] --
6,514,552 UART: [state] Locking Datavault
6,515,286 UART: [state] Locking PCR0, PCR1 and PCR31
6,515,890 UART: [state] Locking ICCM
6,516,554 UART: [exit] Launching FMC @ 0x40000130
6,521,883 UART:
6,521,899 UART: Running Caliptra FMC ...
6,522,307 UART:
6,522,361 UART: [state] CFI Enabled
6,611,380 UART: [art] Extend RT PCRs Done
6,611,808 UART: [art] Lock RT PCRs Done
6,613,043 UART: [art] Populate DV Done
6,621,078 UART: [fht] FMC Alias Private Key: 7
6,622,128 UART: [art] Derive CDI
6,622,408 UART: [art] Store in in slot 0x4
6,708,157 UART: [art] Derive Key Pair
6,708,517 UART: [art] Store priv key in slot 0x5
6,721,473 UART: [art] Derive Key Pair - Done
6,735,981 UART: [art] Signing Cert with AUTHO
6,736,461 UART: RITY.KEYID = 7
6,751,791 UART: [art] Erasing AUTHORITY.KEYID = 7
6,752,556 UART: [art] PUB.X = CC0AA261EDA954EC87D16B5B58A6F10025FBECA7681645EE6D458743A723C8D91BDD1F42130452BA522E54FEA6666BC2
6,759,310 UART: [art] PUB.Y = C5E42711E448C55DBEF0488F21E99188B2F8BF72AEA07D25EDB6D81FE13D4635A7863EB7AA33816546BC8269CA825A8C
6,766,270 UART: [art] SIG.R = E2F1065DAB9427BC8B354C43768D79B0960FAE35EA42BCC90BC76072570099A1205C800E1D91A7A7AE33A47E0C50098A
6,773,004 UART: [art] SIG.S = A58FF48209CAC0CEC1F0797BDE7CAFDF3876276163BF899B647CDCDF2E41515EE0C46BDE45B3481B271677715A983F47
6,796,458 UART: Caliptra RT
6,796,711 UART: [state] CFI Enabled
7,086,283 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,116,606 UART: [rt]cmd =0x494e464f, len=4
7,119,889 >>> mbox cmd response data (264 bytes)
7,119,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,149,367 UART: [rt]cmd =0x43455252, len=4
7,160,251 >>> mbox cmd response data (784 bytes)
7,160,252 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,189,993 UART: [rt]cmd =0x44504543, len=92
7,373,297 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,963 ready_for_fw is high
1,362,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,411 >>> mbox cmd response: success
2,930,411 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,992,365 UART:
2,992,381 UART: Running Caliptra FMC ...
2,992,789 UART:
2,992,843 UART: [state] CFI Enabled
3,003,180 UART: [fht] FMC Alias Private Key: 7
3,110,961 UART: [art] Extend RT PCRs Done
3,111,389 UART: [art] Lock RT PCRs Done
3,113,121 UART: [art] Populate DV Done
3,121,348 UART: [fht] FMC Alias Private Key: 7
3,122,392 UART: [art] Derive CDI
3,122,672 UART: [art] Store in in slot 0x4
3,208,493 UART: [art] Derive Key Pair
3,208,853 UART: [art] Store priv key in slot 0x5
3,221,941 UART: [art] Derive Key Pair - Done
3,236,621 UART: [art] Signing Cert with AUTHO
3,237,101 UART: RITY.KEYID = 7
3,252,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,038 UART: [art] PUB.X = 4552F0C881F7214DC9CFA7EC95E7E04AA4D8DBEB66C94B436DF48288CCDBA4915B136355AC104FE757F2742F6026A365
3,259,818 UART: [art] PUB.Y = FF4F18E579FEB6F6FC4001D1EC9428DEB3012BC6EAAC743DEC703FF5D44C041FFF37C50FB246B1AEEF55DB146CB93B0D
3,266,783 UART: [art] SIG.R = 52B9927B3317553ECBEF5CE76D60B6A37C46EEBC4DF64C67332B07295C9D62780BE9F3633EE3EB875D6531FEEA8ABBAE
3,273,565 UART: [art] SIG.S = 995CC04F0C5E743C983A5A7DC5ADA8D3A63954A5F812DB4F4873777D02B1EFD0D6D89E9095B7651D002D399A575478B1
3,297,520 UART: Caliptra RT
3,297,773 UART: [state] CFI Enabled
3,405,582 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,340 UART: [rt]cmd =0x4453424c, len=4
3,450,106 >>> mbox cmd response data (8 bytes)
3,450,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,213,241 >>> mbox cmd response: success
6,213,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,226,504 UART:
6,226,520 UART: Running Caliptra FMC ...
6,226,928 UART:
6,226,982 UART: [state] CFI Enabled
6,315,863 UART: [art] Extend RT PCRs Done
6,316,291 UART: [art] Lock RT PCRs Done
6,317,656 UART: [art] Populate DV Done
6,326,071 UART: [fht] FMC Alias Private Key: 7
6,327,153 UART: [art] Derive CDI
6,327,433 UART: [art] Store in in slot 0x4
6,412,506 UART: [art] Derive Key Pair
6,412,866 UART: [art] Store priv key in slot 0x5
6,425,900 UART: [art] Derive Key Pair - Done
6,440,848 UART: [art] Signing Cert with AUTHO
6,441,328 UART: RITY.KEYID = 7
6,456,602 UART: [art] Erasing AUTHORITY.KEYID = 7
6,457,367 UART: [art] PUB.X = 137C4E297F47F93BA2E0B0AF8E06CA5BA18683517AFEFE917719D26C81D80E04E03DEA929ABFC185F7B969B6222F1AC7
6,464,142 UART: [art] PUB.Y = F3ABFB9EADDB5260CB0EE2F07BAAD74AC0F21B0F1FC75A1E1D7597819E6CB868EDAC5D4E704DB744AAE74B3413C3DA2B
6,471,120 UART: [art] SIG.R = 4042AA2988861DB93891E9B3B78EB79810FD6641C75040B9FF23238934BE76BF3A26651C0797F737D14E6D6659FA1CF5
6,477,883 UART: [art] SIG.S = 390B4EB4EC75A1E77633DA656A5D4928B41637F52FD6A74CC7132A8DAF7A395CC4196DB68998B786C5FCB3A0FB6A6B86
6,501,505 UART: Caliptra RT
6,501,758 UART: [state] CFI Enabled
6,791,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,822,165 UART: [rt]cmd =0x494e464f, len=4
6,825,334 >>> mbox cmd response data (264 bytes)
6,825,335 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,854,896 UART: [rt]cmd =0x43455252, len=4
6,865,653 >>> mbox cmd response data (782 bytes)
6,865,654 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,849 UART: [rt]cmd =0x44504543, len=92
7,079,447 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,745 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,513 UART: [idev] ++
1,479,681 UART: [idev] CDI.KEYID = 6
1,480,041 UART: [idev] SUBJECT.KEYID = 7
1,480,465 UART: [idev] UDS.KEYID = 0
1,480,810 ready_for_fw is high
1,480,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,165 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,943 UART: [ldev] --
1,587,312 UART: [fwproc] Waiting for Commands...
1,588,137 UART: [fwproc] Received command 0x46574c44
1,588,928 UART: [fwproc] Received Image of size 114448 bytes
2,888,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,824 >>> mbox cmd response: success
3,080,824 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,081,878 UART: [afmc] ++
3,082,046 UART: [afmc] CDI.KEYID = 6
3,082,408 UART: [afmc] SUBJECT.KEYID = 7
3,082,833 UART: [afmc] AUTHORITY.KEYID = 5
3,118,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,608 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,001 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,691 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,750 UART: [afmc] --
3,161,846 UART: [cold-reset] --
3,162,722 UART: [state] Locking Datavault
3,163,821 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,425 UART: [state] Locking ICCM
3,165,045 UART: [exit] Launching FMC @ 0x40000130
3,170,374 UART:
3,170,390 UART: Running Caliptra FMC ...
3,170,798 UART:
3,170,941 UART: [state] CFI Enabled
3,181,836 UART: [fht] FMC Alias Private Key: 7
3,289,937 UART: [art] Extend RT PCRs Done
3,290,365 UART: [art] Lock RT PCRs Done
3,291,669 UART: [art] Populate DV Done
3,299,956 UART: [fht] FMC Alias Private Key: 7
3,300,996 UART: [art] Derive CDI
3,301,276 UART: [art] Store in in slot 0x4
3,386,873 UART: [art] Derive Key Pair
3,387,233 UART: [art] Store priv key in slot 0x5
3,401,119 UART: [art] Derive Key Pair - Done
3,416,093 UART: [art] Signing Cert with AUTHO
3,416,573 UART: RITY.KEYID = 7
3,431,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,606 UART: [art] PUB.X = C15E20111938CA86E874E7D5FF9D1CEB2E67570F9A9791E9180FC3B8FC8120E8247B4B1AE306371B9FE35FAAC85DEA97
3,439,379 UART: [art] PUB.Y = 865650D625DC32CBD7C48933BBB17767026437AD7E9A36D39988083ED402FA866A6693886EB205DF315E72C0237E9372
3,446,309 UART: [art] SIG.R = 2996E9E2C196AE62BB5A5EE16F7CF93098CD5DEA1FDDC6660E6B435D52F49DC23ECC96A1EC79E4DFA09E000D5B39FAFA
3,453,079 UART: [art] SIG.S = 0D2CB31F48A14C3354776B6986341C8B425F08498155093BCD1467802CE51ED71AEFCBBDFA06725AC25A03B9E11A3C01
3,476,956 UART: Caliptra RT
3,477,301 UART: [state] CFI Enabled
3,585,873 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,307 UART: [rt]cmd =0x4453424c, len=4
3,629,717 >>> mbox cmd response data (8 bytes)
3,629,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,206 UART:
3,630,222 UART: Running Caliptra ROM ...
3,630,630 UART:
3,630,771 UART: [state] CFI Enabled
3,633,537 UART: [state] LifecycleState = Unprovisioned
3,634,192 UART: [state] DebugLocked = No
3,634,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,636,191 UART: [kat] SHA2-256
4,430,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,434,237 UART: [kat] ++
4,434,389 UART: [kat] sha1
4,438,629 UART: [kat] SHA2-256
4,440,567 UART: [kat] SHA2-384
4,443,354 UART: [kat] SHA2-512-ACC
4,445,254 UART: [kat] ECC-384
4,451,025 UART: [kat] HMAC-384Kdf
4,455,831 UART: [kat] LMS
5,024,027 UART: [kat] --
5,024,926 UART: [update-reset] ++
6,362,255 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,363,505 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,513,555 >>> mbox cmd response: success
6,513,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,513,790 UART: [update-reset] Copying MAN_2 To MAN_1
6,521,804 UART: [update-reset Success] --
6,522,963 UART: [state] Locking Datavault
6,523,719 UART: [state] Locking PCR0, PCR1 and PCR31
6,524,323 UART: [state] Locking ICCM
6,524,915 UART: [exit] Launching FMC @ 0x40000130
6,530,244 UART:
6,530,260 UART: Running Caliptra FMC ...
6,530,668 UART:
6,530,811 UART: [state] CFI Enabled
6,620,384 UART: [art] Extend RT PCRs Done
6,620,812 UART: [art] Lock RT PCRs Done
6,621,931 UART: [art] Populate DV Done
6,630,194 UART: [fht] FMC Alias Private Key: 7
6,631,140 UART: [art] Derive CDI
6,631,420 UART: [art] Store in in slot 0x4
6,717,133 UART: [art] Derive Key Pair
6,717,493 UART: [art] Store priv key in slot 0x5
6,730,427 UART: [art] Derive Key Pair - Done
6,745,332 UART: [art] Signing Cert with AUTHO
6,745,812 UART: RITY.KEYID = 7
6,761,360 UART: [art] Erasing AUTHORITY.KEYID = 7
6,762,125 UART: [art] PUB.X = 1096CC8491F08126A4BB6982C50F76617715413053596BD2BE4F7BCA315A7EC1437E79CDEAC180E85DD5B16CC0E509D8
6,768,893 UART: [art] PUB.Y = EFCBC8B02486BF88E44F29AD72A6E832AABE1DCC4917C1962404219D78AB9BACC1770379E2401D56EC90614EB1A89712
6,775,847 UART: [art] SIG.R = 0CBEAB290F001EA0CCBB08BE3988AF945C8178121C78980FD5A882BFD5981DD699E543B3EA40013B9C885A81B48F3A0B
6,782,589 UART: [art] SIG.S = 33598BFA04E6CE37C4BFD29EA1D7725F65B02C5AC325B2624FF2345EF146F89770CE95B0C2C4F14FAB678D245C0F1D33
6,806,150 UART: Caliptra RT
6,806,495 UART: [state] CFI Enabled
7,102,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,132,724 UART: [rt]cmd =0x494e464f, len=4
7,135,935 >>> mbox cmd response data (264 bytes)
7,135,936 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,165,553 UART: [rt]cmd =0x43455252, len=4
7,176,566 >>> mbox cmd response data (782 bytes)
7,176,567 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,206,486 UART: [rt]cmd =0x44504543, len=92
7,389,873 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 ready_for_fw is high
1,362,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,930 >>> mbox cmd response: success
2,929,930 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,990,854 UART:
2,990,870 UART: Running Caliptra FMC ...
2,991,278 UART:
2,991,421 UART: [state] CFI Enabled
3,002,150 UART: [fht] FMC Alias Private Key: 7
3,110,523 UART: [art] Extend RT PCRs Done
3,110,951 UART: [art] Lock RT PCRs Done
3,112,399 UART: [art] Populate DV Done
3,120,424 UART: [fht] FMC Alias Private Key: 7
3,121,396 UART: [art] Derive CDI
3,121,676 UART: [art] Store in in slot 0x4
3,207,613 UART: [art] Derive Key Pair
3,207,973 UART: [art] Store priv key in slot 0x5
3,222,241 UART: [art] Derive Key Pair - Done
3,236,942 UART: [art] Signing Cert with AUTHO
3,237,422 UART: RITY.KEYID = 7
3,252,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,407 UART: [art] PUB.X = F9344149AF1E76D9688E5920FAD551BF575A9302B42D2E265F83CB0366E104EE40C2AE1756514CFD755860E517256A86
3,260,164 UART: [art] PUB.Y = A8F6DE5988F9BB075F2A5B16C8D9B33B7754A64F6EC2A477A2CE7A1A4B65790F24937C64ED328C5C2358CA4D9D06FBB6
3,267,119 UART: [art] SIG.R = 2D80AF9ADFDDA02034AC7BD556BD4FE778E0A1861A911F8B81143D0D999F8D3B99C8116F6FF39BAE756F16359820A137
3,273,896 UART: [art] SIG.S = 5C52C8E5FD3FDFA8C8CED7B6FDEA427BAF360C94C3E8EFA7A3FEE6D2E53B5B16957891ED15200092E65F42B57D73B0C6
3,297,894 UART: Caliptra RT
3,298,239 UART: [state] CFI Enabled
3,406,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,341 UART: [rt]cmd =0x4453424c, len=4
3,450,603 >>> mbox cmd response data (8 bytes)
3,450,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,215,563 >>> mbox cmd response: success
6,215,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,228,936 UART:
6,228,952 UART: Running Caliptra FMC ...
6,229,360 UART:
6,229,503 UART: [state] CFI Enabled
6,318,852 UART: [art] Extend RT PCRs Done
6,319,280 UART: [art] Lock RT PCRs Done
6,320,423 UART: [art] Populate DV Done
6,328,766 UART: [fht] FMC Alias Private Key: 7
6,329,842 UART: [art] Derive CDI
6,330,122 UART: [art] Store in in slot 0x4
6,415,811 UART: [art] Derive Key Pair
6,416,171 UART: [art] Store priv key in slot 0x5
6,429,905 UART: [art] Derive Key Pair - Done
6,444,795 UART: [art] Signing Cert with AUTHO
6,445,275 UART: RITY.KEYID = 7
6,460,493 UART: [art] Erasing AUTHORITY.KEYID = 7
6,461,258 UART: [art] PUB.X = 232BF498F3CE5CF540A9B0D65925C0164C5A922118AF8DDCFE215CEB9456FB6B6E80E11DEFF9628EBEA0FA11F5B2C0B0
6,468,050 UART: [art] PUB.Y = 7F0B8865BC0A61E569577F7897BE38E09C6CC43A78C888FDAA114E7888FCEB083756E1696EE2966507CA41B6F065E551
6,474,990 UART: [art] SIG.R = 7AFC5013687B8F0C16F3023EE7938BD4F203A77BA829AA4EDF5A8B98659988C3BAEAAA49DF76ED22248A132EE785ECFB
6,481,769 UART: [art] SIG.S = D368CB6FE6BBBCFC6B04F0C261D1446CB99D48C04092993158504039B835FC9043EB3D7632FB5B42723F5BFA82026FF4
6,505,852 UART: Caliptra RT
6,506,197 UART: [state] CFI Enabled
6,799,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,829,755 UART: [rt]cmd =0x494e464f, len=4
6,833,172 >>> mbox cmd response data (264 bytes)
6,833,173 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,862,466 UART: [rt]cmd =0x43455252, len=4
6,873,307 >>> mbox cmd response data (783 bytes)
6,873,308 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,209 UART: [rt]cmd =0x44504543, len=92
7,087,865 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
901,827 UART: [kat] SHA2-256
903,767 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,619 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 ready_for_fw is high
1,176,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,201,647 UART: [idev] Sha1 KeyId Algorithm
1,210,015 UART: [idev] --
1,211,033 UART: [ldev] ++
1,211,201 UART: [ldev] CDI.KEYID = 6
1,211,564 UART: [ldev] SUBJECT.KEYID = 5
1,211,990 UART: [ldev] AUTHORITY.KEYID = 7
1,212,453 UART: [ldev] FE.KEYID = 1
1,217,931 UART: [ldev] Erasing FE.KEYID = 1
1,244,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,377 UART: [ldev] --
1,283,862 UART: [fwproc] Wait for Commands...
1,284,448 UART: [fwproc] Recv command 0x46574c44
1,285,176 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,345 >>> mbox cmd response: success
2,776,345 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,777,393 UART: [afmc] ++
2,777,561 UART: [afmc] CDI.KEYID = 6
2,777,923 UART: [afmc] SUBJECT.KEYID = 7
2,778,348 UART: [afmc] AUTHORITY.KEYID = 5
2,813,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,512 UART: [afmc] --
2,857,540 UART: [cold-reset] --
2,858,676 UART: [state] Locking Datavault
2,859,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,067 UART: [state] Locking ICCM
2,860,577 UART: [exit] Launching FMC @ 0x40000130
2,865,906 UART:
2,865,922 UART: Running Caliptra FMC ...
2,866,330 UART:
2,866,384 UART: [state] CFI Enabled
2,877,253 UART: [fht] FMC Alias Private Key: 7
2,985,144 UART: [art] Extend RT PCRs Done
2,985,572 UART: [art] Lock RT PCRs Done
2,987,368 UART: [art] Populate DV Done
2,995,505 UART: [fht] FMC Alias Private Key: 7
2,996,595 UART: [art] Derive CDI
2,996,875 UART: [art] Store in in slot 0x4
3,082,798 UART: [art] Derive Key Pair
3,083,158 UART: [art] Store priv key in slot 0x5
3,096,622 UART: [art] Derive Key Pair - Done
3,111,651 UART: [art] Signing Cert with AUTHO
3,112,131 UART: RITY.KEYID = 7
3,127,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,330 UART: [art] PUB.X = 860296E188E82B5C847E2F4B2E2199C39A0F078432BC95BA84852F2833C4FB81A2E7FBFB64C3171D2A5CE84B93E26F90
3,135,095 UART: [art] PUB.Y = E947C9EBA4D0A32495645C8D696F2D464E24E607EC22A68854D31D998E36CE59A5FCF6748F0397ED34AD193B32397330
3,142,039 UART: [art] SIG.R = 9C4BF48E9AE30C541BCD1A086133A0F5DFBDA748F7FD7CA4A8617F9FC418605967BDEE6D63CFBBD1009CA3C505830CDC
3,148,799 UART: [art] SIG.S = F758159E77E7B3A255C30FBAF88D36F88DF72645925E841F5043386BD531554420263B19BB855A847059FBF5B5C1DE94
3,172,649 UART: Caliptra RT
3,172,902 UART: [state] CFI Enabled
3,280,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,528 UART: [rt]cmd =0x4453424c, len=4
3,325,208 >>> mbox cmd response data (8 bytes)
3,325,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,230 UART:
3,326,246 UART: Running Caliptra ROM ...
3,326,654 UART:
3,326,709 UART: [state] CFI Enabled
3,329,103 UART: [state] LifecycleState = Unprovisioned
3,329,758 UART: [state] DebugLocked = No
3,330,340 UART: [state] WD Timer not started. Device not locked for debugging
3,331,674 UART: [kat] SHA2-256
4,137,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,141,449 UART: [kat] ++
4,141,601 UART: [kat] sha1
4,145,921 UART: [kat] SHA2-256
4,147,861 UART: [kat] SHA2-384
4,150,602 UART: [kat] SHA2-512-ACC
4,152,502 UART: [kat] ECC-384
4,162,471 UART: [kat] HMAC-384Kdf
4,166,923 UART: [kat] LMS
4,415,251 UART: [kat] --
4,416,213 UART: [update-reset] ++
5,730,022 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,731,039 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,881,037 >>> mbox cmd response: success
5,881,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,881,252 UART: [update-reset] Copying MAN_2 To MAN_1
5,889,266 UART: [update-reset Success] --
5,890,223 UART: [state] Locking Datavault
5,890,851 UART: [state] Locking PCR0, PCR1 and PCR31
5,891,455 UART: [state] Locking ICCM
5,892,041 UART: [exit] Launching FMC @ 0x40000130
5,897,370 UART:
5,897,386 UART: Running Caliptra FMC ...
5,897,794 UART:
5,897,848 UART: [state] CFI Enabled
5,986,689 UART: [art] Extend RT PCRs Done
5,987,117 UART: [art] Lock RT PCRs Done
5,988,434 UART: [art] Populate DV Done
5,996,819 UART: [fht] FMC Alias Private Key: 7
5,997,999 UART: [art] Derive CDI
5,998,279 UART: [art] Store in in slot 0x4
6,084,126 UART: [art] Derive Key Pair
6,084,486 UART: [art] Store priv key in slot 0x5
6,097,986 UART: [art] Derive Key Pair - Done
6,112,833 UART: [art] Signing Cert with AUTHO
6,113,313 UART: RITY.KEYID = 7
6,128,781 UART: [art] Erasing AUTHORITY.KEYID = 7
6,129,546 UART: [art] PUB.X = 429CD92A66CB9F34CFA0A47980B41C62A64E561F82BFE4B64D308EF7029820D542DB8E1E3595E7F1CAF0E04EEA155D11
6,136,325 UART: [art] PUB.Y = 849144D18E3B22E4F7C3535F80631EE574B151333A429DD2246DDA6212DCE6F6BD0DF859CBBA65EFCEC85310F67FE351
6,143,282 UART: [art] SIG.R = 24E96E13C96AB978BBEB4687CE841B175F245D0FB6314FD4A9B752DE57EC5F863963191CBFC41DD34E0DFBD005CE86F1
6,150,059 UART: [art] SIG.S = ADE5642B0D26A191F499E4CA68371F02C19B46EA31B270118B7B360C631D90E7B79B2CE196295EDCFF2A5B28A17EE020
6,173,867 UART: Caliptra RT
6,174,120 UART: [state] CFI Enabled
6,468,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,904 UART: [rt]cmd =0x494e464f, len=4
6,502,403 >>> mbox cmd response data (264 bytes)
6,502,404 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,531,883 UART: [rt]cmd =0x43455252, len=4
6,542,670 >>> mbox cmd response data (783 bytes)
6,542,671 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,572,480 UART: [rt]cmd =0x44504543, len=92
6,754,997 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,691 ready_for_fw is high
1,060,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,585 >>> mbox cmd response: success
2,628,585 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,691,589 UART:
2,691,605 UART: Running Caliptra FMC ...
2,692,013 UART:
2,692,067 UART: [state] CFI Enabled
2,702,784 UART: [fht] FMC Alias Private Key: 7
2,810,743 UART: [art] Extend RT PCRs Done
2,811,171 UART: [art] Lock RT PCRs Done
2,812,759 UART: [art] Populate DV Done
2,821,080 UART: [fht] FMC Alias Private Key: 7
2,822,162 UART: [art] Derive CDI
2,822,442 UART: [art] Store in in slot 0x4
2,908,251 UART: [art] Derive Key Pair
2,908,611 UART: [art] Store priv key in slot 0x5
2,921,581 UART: [art] Derive Key Pair - Done
2,936,295 UART: [art] Signing Cert with AUTHO
2,936,775 UART: RITY.KEYID = 7
2,952,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,116 UART: [art] PUB.X = 2DC578041925BD7E91A91DBDA6BA466E215CB6AC734D49D026164B8A60863CBD85FA848AADC065A448C928067B1845CD
2,959,888 UART: [art] PUB.Y = 604D35927443E0821E2661652B100E30CF910643C54F53C06F95A66AEDBD7FF9E20C58CB82093D59B00E1C068D7A82BF
2,966,820 UART: [art] SIG.R = 49D4A3DE29AAAC2C30A6ADC730E90610055B09F4CA05E576E538C8568D2ABF2575D1CCB2BD166F75F73CE8C3A8B36E7E
2,973,596 UART: [art] SIG.S = 79D5FB9A7DAAEB9A0B8850AFD922830368AF5A0A7FD8729097DE2C0EB55FB0D38B4653990005E8A49C52F2D00CBC4B7E
2,997,481 UART: Caliptra RT
2,997,734 UART: [state] CFI Enabled
3,105,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,323 UART: [rt]cmd =0x4453424c, len=4
3,149,419 >>> mbox cmd response data (8 bytes)
3,149,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,259 >>> mbox cmd response: success
5,587,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,600,769 UART:
5,600,785 UART: Running Caliptra FMC ...
5,601,193 UART:
5,601,247 UART: [state] CFI Enabled
5,690,230 UART: [art] Extend RT PCRs Done
5,690,658 UART: [art] Lock RT PCRs Done
5,691,843 UART: [art] Populate DV Done
5,699,978 UART: [fht] FMC Alias Private Key: 7
5,701,078 UART: [art] Derive CDI
5,701,358 UART: [art] Store in in slot 0x4
5,786,739 UART: [art] Derive Key Pair
5,787,099 UART: [art] Store priv key in slot 0x5
5,800,569 UART: [art] Derive Key Pair - Done
5,815,054 UART: [art] Signing Cert with AUTHO
5,815,534 UART: RITY.KEYID = 7
5,830,408 UART: [art] Erasing AUTHORITY.KEYID = 7
5,831,173 UART: [art] PUB.X = 4878A19E63E3CDE3E46D16B0E4B862476304233420229D39A157604B3FB724614D4D4C7F1E2AAB2C24D473E773CCB561
5,837,938 UART: [art] PUB.Y = 2A957DABAE852DF27D32481B6F8DF12C86C5EABEBCDF2BA9C8EBC07B11FA74E5A24A524005A8ACDB4AA1CEBE3C6487AF
5,844,921 UART: [art] SIG.R = 305ED636999ACEFC443D2CAA34240FBA10BBD014439FD51E93F6379E3151305EEF74D3253039CC4FCB0B2682E08C1E50
5,851,693 UART: [art] SIG.S = D2CEBE5866EDC6372B1DD8AF10525EB0B9295E5B48BB6747BFC10E5FF9748778AAEFC3301A6712FB9C93BE380375BAEC
5,874,532 UART: Caliptra RT
5,874,785 UART: [state] CFI Enabled
6,172,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,713 UART: [rt]cmd =0x494e464f, len=4
6,205,972 >>> mbox cmd response data (264 bytes)
6,205,973 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,235,350 UART: [rt]cmd =0x43455252, len=4
6,246,277 >>> mbox cmd response data (783 bytes)
6,246,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,276,099 UART: [rt]cmd =0x44504543, len=92
6,460,435 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,039 UART: [kat] SHA2-512-ACC
908,940 UART: [kat] ECC-384
918,445 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,580 UART: [fht] FHT @ 0x50003400
1,175,143 UART: [idev] ++
1,175,311 UART: [idev] CDI.KEYID = 6
1,175,671 UART: [idev] SUBJECT.KEYID = 7
1,176,095 UART: [idev] UDS.KEYID = 0
1,176,440 ready_for_fw is high
1,176,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,410 UART: [idev] --
1,211,530 UART: [ldev] ++
1,211,698 UART: [ldev] CDI.KEYID = 6
1,212,061 UART: [ldev] SUBJECT.KEYID = 5
1,212,487 UART: [ldev] AUTHORITY.KEYID = 7
1,212,950 UART: [ldev] FE.KEYID = 1
1,218,098 UART: [ldev] Erasing FE.KEYID = 1
1,244,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,002 UART: [ldev] --
1,284,279 UART: [fwproc] Wait for Commands...
1,285,003 UART: [fwproc] Recv command 0x46574c44
1,285,731 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,385 >>> mbox cmd response: success
2,777,385 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,778,395 UART: [afmc] ++
2,778,563 UART: [afmc] CDI.KEYID = 6
2,778,925 UART: [afmc] SUBJECT.KEYID = 7
2,779,350 UART: [afmc] AUTHORITY.KEYID = 5
2,814,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,248 UART: [afmc] --
2,858,216 UART: [cold-reset] --
2,858,840 UART: [state] Locking Datavault
2,859,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,389 UART: [state] Locking ICCM
2,860,947 UART: [exit] Launching FMC @ 0x40000130
2,866,276 UART:
2,866,292 UART: Running Caliptra FMC ...
2,866,700 UART:
2,866,843 UART: [state] CFI Enabled
2,877,338 UART: [fht] FMC Alias Private Key: 7
2,985,253 UART: [art] Extend RT PCRs Done
2,985,681 UART: [art] Lock RT PCRs Done
2,987,279 UART: [art] Populate DV Done
2,995,274 UART: [fht] FMC Alias Private Key: 7
2,996,288 UART: [art] Derive CDI
2,996,568 UART: [art] Store in in slot 0x4
3,082,445 UART: [art] Derive Key Pair
3,082,805 UART: [art] Store priv key in slot 0x5
3,095,971 UART: [art] Derive Key Pair - Done
3,110,893 UART: [art] Signing Cert with AUTHO
3,111,373 UART: RITY.KEYID = 7
3,126,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,058 UART: [art] PUB.X = 48D05B51BB61AC024A3B7D2CFEDB1282C7B2E92C3085C15D370E38B1B97759FF9DB5C48C4E534EB7061C95B02FD609DD
3,133,830 UART: [art] PUB.Y = C7F54B6640DFF73FE6EA68CD4AB753A58FD330F14C97D22F4A6F4AFEF02C56F3AD78759405CEBA755D93A12C22C19D90
3,140,795 UART: [art] SIG.R = B489225FD135C0DECEADC5A1D550BF708B57E3ACD8A0E2F4B527261A8272109421D3D82FE0CB68CE59CF01A05C1D9D76
3,147,578 UART: [art] SIG.S = BD582D2C8AEA6130CE6921342B8CF1FC00C214672B491C824F4A5B919634E7B56DD575590EFD50E340531DF1E1955206
3,171,953 UART: Caliptra RT
3,172,298 UART: [state] CFI Enabled
3,279,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,976 UART: [rt]cmd =0x4453424c, len=4
3,323,656 >>> mbox cmd response data (8 bytes)
3,323,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,380 UART:
3,324,396 UART: Running Caliptra ROM ...
3,324,804 UART:
3,324,946 UART: [state] CFI Enabled
3,328,128 UART: [state] LifecycleState = Unprovisioned
3,328,783 UART: [state] DebugLocked = No
3,329,353 UART: [state] WD Timer not started. Device not locked for debugging
3,330,549 UART: [kat] SHA2-256
4,136,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,140,324 UART: [kat] ++
4,140,476 UART: [kat] sha1
4,144,932 UART: [kat] SHA2-256
4,146,872 UART: [kat] SHA2-384
4,149,539 UART: [kat] SHA2-512-ACC
4,151,439 UART: [kat] ECC-384
4,161,250 UART: [kat] HMAC-384Kdf
4,165,814 UART: [kat] LMS
4,414,142 UART: [kat] --
4,414,966 UART: [update-reset] ++
5,728,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,729,708 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,879,706 >>> mbox cmd response: success
5,879,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,879,867 UART: [update-reset] Copying MAN_2 To MAN_1
5,887,881 UART: [update-reset Success] --
5,888,744 UART: [state] Locking Datavault
5,889,360 UART: [state] Locking PCR0, PCR1 and PCR31
5,889,964 UART: [state] Locking ICCM
5,890,418 UART: [exit] Launching FMC @ 0x40000130
5,895,747 UART:
5,895,763 UART: Running Caliptra FMC ...
5,896,171 UART:
5,896,314 UART: [state] CFI Enabled
5,985,069 UART: [art] Extend RT PCRs Done
5,985,497 UART: [art] Lock RT PCRs Done
5,986,806 UART: [art] Populate DV Done
5,995,105 UART: [fht] FMC Alias Private Key: 7
5,996,103 UART: [art] Derive CDI
5,996,383 UART: [art] Store in in slot 0x4
6,081,934 UART: [art] Derive Key Pair
6,082,294 UART: [art] Store priv key in slot 0x5
6,095,898 UART: [art] Derive Key Pair - Done
6,110,659 UART: [art] Signing Cert with AUTHO
6,111,139 UART: RITY.KEYID = 7
6,126,541 UART: [art] Erasing AUTHORITY.KEYID = 7
6,127,306 UART: [art] PUB.X = 5013E8087256709AA0975B9204FE7B93894459BB4993B974AB12D41116F29002F550996631DE533F2EA3CCBF007D1967
6,134,033 UART: [art] PUB.Y = F063E523A1117A70D6431A8FC55CF291D1BFD29FFD553EC73E5C49ECD8690035D080F187FC1EC1DEAE81A592FAB42058
6,140,975 UART: [art] SIG.R = EF79A8327273B7C0E793B3CAA4ED671798F64337D5EC72350EF15E2BC2FA1B5376CAD23E889B84768D8D1171904B7D5D
6,147,748 UART: [art] SIG.S = E28186DE1E68E29B86CCD9C9CACBB51649CFBC67BBE94FF9A756D48726B5F2AA4ABBD491060FC68F55877AC213A86C33
6,172,027 UART: Caliptra RT
6,172,372 UART: [state] CFI Enabled
6,464,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,951 UART: [rt]cmd =0x494e464f, len=4
6,498,280 >>> mbox cmd response data (264 bytes)
6,498,281 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,527,682 UART: [rt]cmd =0x43455252, len=4
6,538,362 >>> mbox cmd response data (784 bytes)
6,538,363 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,568,160 UART: [rt]cmd =0x44504543, len=92
6,751,272 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,240 ready_for_fw is high
1,060,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,848 >>> mbox cmd response: success
2,628,848 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,691,470 UART:
2,691,486 UART: Running Caliptra FMC ...
2,691,894 UART:
2,692,037 UART: [state] CFI Enabled
2,702,484 UART: [fht] FMC Alias Private Key: 7
2,811,191 UART: [art] Extend RT PCRs Done
2,811,619 UART: [art] Lock RT PCRs Done
2,813,393 UART: [art] Populate DV Done
2,821,440 UART: [fht] FMC Alias Private Key: 7
2,822,394 UART: [art] Derive CDI
2,822,674 UART: [art] Store in in slot 0x4
2,908,399 UART: [art] Derive Key Pair
2,908,759 UART: [art] Store priv key in slot 0x5
2,922,017 UART: [art] Derive Key Pair - Done
2,936,311 UART: [art] Signing Cert with AUTHO
2,936,791 UART: RITY.KEYID = 7
2,951,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,752 UART: [art] PUB.X = 8219C70E628C228F46CD4015C1EB5052333F242E3CE9CECABB642BDC5C5ACF39F5586F8BC7D404F5ED1368D395038313
2,959,521 UART: [art] PUB.Y = 03FD4788E5108AEFE4C6CD6D75F775D0F00DD6AE44FD865797E8453850CDDAB662913753C5CB51D89A42C9145BEA4231
2,966,473 UART: [art] SIG.R = 289AB72DD9EB7D1BE39C8ED60E8AADF0D20CBEDA5BA632F54112CDB6072E1CC48C0471A7EC31DA83DFE24B3EC2A9D506
2,973,258 UART: [art] SIG.S = A9D596A1BC673059D01BFE4D7E75263C66AE7D69F473E929E2B44AF5BD53A266670767089406DEFD631D026ADDA6A063
2,997,339 UART: Caliptra RT
2,997,684 UART: [state] CFI Enabled
3,105,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,893 UART: [rt]cmd =0x4453424c, len=4
3,149,281 >>> mbox cmd response data (8 bytes)
3,149,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,350 >>> mbox cmd response: success
5,588,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,601,810 UART:
5,601,826 UART: Running Caliptra FMC ...
5,602,234 UART:
5,602,377 UART: [state] CFI Enabled
5,691,170 UART: [art] Extend RT PCRs Done
5,691,598 UART: [art] Lock RT PCRs Done
5,693,033 UART: [art] Populate DV Done
5,701,422 UART: [fht] FMC Alias Private Key: 7
5,702,380 UART: [art] Derive CDI
5,702,660 UART: [art] Store in in slot 0x4
5,788,237 UART: [art] Derive Key Pair
5,788,597 UART: [art] Store priv key in slot 0x5
5,801,389 UART: [art] Derive Key Pair - Done
5,816,154 UART: [art] Signing Cert with AUTHO
5,816,634 UART: RITY.KEYID = 7
5,831,978 UART: [art] Erasing AUTHORITY.KEYID = 7
5,832,743 UART: [art] PUB.X = 53D110E5BD7417B63C009B4294A1310BD41D16B6D66C2EEF625317B0B8055E91D004F51A434609576619AEF9DFEE42BB
5,839,481 UART: [art] PUB.Y = ABB6BD6D39B6ABA2C6240BCC36608316CF1A83CCED29DD3324A0A79FBB2F643A349664B10DE70A689A59185B688C4DBD
5,846,440 UART: [art] SIG.R = D78FEF543DE99D3ECC7FD669C144C70E5C01CC2779979627898ECB98804613D1C3C3E685C2CFB6A39A93EBB928215BEB
5,853,216 UART: [art] SIG.S = F3B118D82D9F21FE551B74F73A3C41B66ADD9E7DB2CCB995544CA03F70EAABCAC98FE614E61BF10FA92242F08C0C8D5E
5,877,161 UART: Caliptra RT
5,877,506 UART: [state] CFI Enabled
6,171,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,201,845 UART: [rt]cmd =0x494e464f, len=4
6,205,082 >>> mbox cmd response data (264 bytes)
6,205,083 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,234,474 UART: [rt]cmd =0x43455252, len=4
6,245,430 >>> mbox cmd response data (784 bytes)
6,245,431 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,275,276 UART: [rt]cmd =0x44504543, len=92
6,459,488 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,174,597 ready_for_fw is high
1,174,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,833 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,209,780 UART: [ldev] ++
1,209,948 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,739 UART: [ldev] AUTHORITY.KEYID = 7
1,211,202 UART: [ldev] FE.KEYID = 1
1,216,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,736 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,773 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,162 >>> mbox cmd response: success
2,774,162 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,277 UART: [afmc] ++
2,775,445 UART: [afmc] CDI.KEYID = 6
2,775,808 UART: [afmc] SUBJECT.KEYID = 7
2,776,234 UART: [afmc] AUTHORITY.KEYID = 5
2,811,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,840 UART: [afmc] --
2,854,776 UART: [cold-reset] --
2,855,472 UART: [state] Locking Datavault
2,856,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,415 UART: [state] Locking ICCM
2,857,865 UART: [exit] Launching FMC @ 0x40000130
2,863,194 UART:
2,863,210 UART: Running Caliptra FMC ...
2,863,618 UART:
2,863,672 UART: [state] CFI Enabled
2,873,991 UART: [fht] FMC Alias Private Key: 7
2,981,928 UART: [art] Extend RT PCRs Done
2,982,356 UART: [art] Lock RT PCRs Done
2,983,990 UART: [art] Populate DV Done
2,992,217 UART: [fht] FMC Alias Private Key: 7
2,993,377 UART: [art] Derive CDI
2,993,657 UART: [art] Store in in slot 0x4
3,079,410 UART: [art] Derive Key Pair
3,079,770 UART: [art] Store priv key in slot 0x5
3,093,414 UART: [art] Derive Key Pair - Done
3,108,231 UART: [art] Signing Cert with AUTHO
3,108,711 UART: RITY.KEYID = 7
3,123,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,186 UART: [art] PUB.X = D18F2932E0C9EE16567B3516B62B45723EBB948DFDCEBD254DF90E518FB4454BA0A98B985317DBDEE323BDCD29F3F3F8
3,130,971 UART: [art] PUB.Y = A39229976257CC4A6B317A3DF3783C47D1938A294831D9D820DB35531B3AA34EF9C979D7EB2FBB4765196B5529F08937
3,137,917 UART: [art] SIG.R = F0F91726EEF8165F3A5D0CB982A4EB4161F0849F89FACAD847071C421C0CB5E8CD54882AEC90F4531C789D325AD3C73C
3,144,690 UART: [art] SIG.S = 0F34AA6AD6C52897321844EB5C8AF169417B8FE1F8CC6828E5A4DB7C21304F2ED9C9A1598056F7461B6A034CA3920AA9
3,168,194 UART: Caliptra RT
3,168,447 UART: [state] CFI Enabled
3,275,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,150 UART: [rt]cmd =0x4453424c, len=4
3,320,398 >>> mbox cmd response data (8 bytes)
3,320,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,908 UART:
3,320,924 UART: Running Caliptra ROM ...
3,321,332 UART:
3,321,387 UART: [state] CFI Enabled
3,324,217 UART: [state] LifecycleState = Unprovisioned
3,324,872 UART: [state] DebugLocked = No
3,325,394 UART: [state] WD Timer not started. Device not locked for debugging
3,326,634 UART: [kat] SHA2-256
4,130,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,134,313 UART: [kat] ++
4,134,465 UART: [kat] sha1
4,138,579 UART: [kat] SHA2-256
4,140,519 UART: [kat] SHA2-384
4,143,402 UART: [kat] SHA2-512-ACC
4,145,302 UART: [kat] ECC-384
4,155,499 UART: [kat] HMAC-384Kdf
4,160,101 UART: [kat] LMS
4,408,413 UART: [kat] --
4,409,699 UART: [update-reset] ++
5,722,983 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,724,192 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,874,190 >>> mbox cmd response: success
5,874,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,307 UART: [update-reset] Copying MAN_2 To MAN_1
5,882,321 UART: [update-reset Success] --
5,883,396 UART: [state] Locking Datavault
5,884,096 UART: [state] Locking PCR0, PCR1 and PCR31
5,884,700 UART: [state] Locking ICCM
5,885,246 UART: [exit] Launching FMC @ 0x40000130
5,890,575 UART:
5,890,591 UART: Running Caliptra FMC ...
5,890,999 UART:
5,891,053 UART: [state] CFI Enabled
5,979,304 UART: [art] Extend RT PCRs Done
5,979,732 UART: [art] Lock RT PCRs Done
5,980,693 UART: [art] Populate DV Done
5,988,866 UART: [fht] FMC Alias Private Key: 7
5,989,952 UART: [art] Derive CDI
5,990,232 UART: [art] Store in in slot 0x4
6,075,957 UART: [art] Derive Key Pair
6,076,317 UART: [art] Store priv key in slot 0x5
6,089,517 UART: [art] Derive Key Pair - Done
6,104,312 UART: [art] Signing Cert with AUTHO
6,104,792 UART: RITY.KEYID = 7
6,119,524 UART: [art] Erasing AUTHORITY.KEYID = 7
6,120,289 UART: [art] PUB.X = 4D9F16E77336066FF22FB3AEB56C4C1C9AD3178FF14333596F03F128ACFBD7B502D3D1F3CD164190D9770CF017B43E2E
6,127,057 UART: [art] PUB.Y = 153C54FC169C12C39F824402BC939B542AAB4BD3AA3DAB1F1FCC7E8317136D8DF8A77D8AB81E520CF9E9489B6B999126
6,134,013 UART: [art] SIG.R = A5C91E98145293F837F73021D2F62E11B259B9DE69E3CCAA839CB8871F99EECD42903E4B160B20395A76AE346D0E2F7A
6,140,783 UART: [art] SIG.S = DE77F26B3DB90D293469C688D4B7F3069882FC78AD485A8D5CE9CEEB98358A76538B32E5C5CD7D41BEAAD6B6E65486BD
6,164,372 UART: Caliptra RT
6,164,625 UART: [state] CFI Enabled
6,457,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,488,096 UART: [rt]cmd =0x494e464f, len=4
6,491,595 >>> mbox cmd response data (264 bytes)
6,491,596 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,521,185 UART: [rt]cmd =0x43455252, len=4
6,531,921 >>> mbox cmd response data (784 bytes)
6,531,922 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,561,697 UART: [rt]cmd =0x44504543, len=92
6,745,183 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,310 ready_for_fw is high
1,055,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,624 >>> mbox cmd response: success
2,622,624 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,685,132 UART:
2,685,148 UART: Running Caliptra FMC ...
2,685,556 UART:
2,685,610 UART: [state] CFI Enabled
2,695,985 UART: [fht] FMC Alias Private Key: 7
2,804,680 UART: [art] Extend RT PCRs Done
2,805,108 UART: [art] Lock RT PCRs Done
2,806,926 UART: [art] Populate DV Done
2,815,299 UART: [fht] FMC Alias Private Key: 7
2,816,423 UART: [art] Derive CDI
2,816,703 UART: [art] Store in in slot 0x4
2,902,338 UART: [art] Derive Key Pair
2,902,698 UART: [art] Store priv key in slot 0x5
2,916,000 UART: [art] Derive Key Pair - Done
2,930,790 UART: [art] Signing Cert with AUTHO
2,931,270 UART: RITY.KEYID = 7
2,946,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,381 UART: [art] PUB.X = E2CAC05625E528446E8265EC329CD0FACC1C173F78E222B89340D6A3858A5BF77A85AABB737087A7D8886B96447A73DE
2,954,157 UART: [art] PUB.Y = 978E0C289B15492EF1B147BD0FC54E595494A2CA52722FEED85B745D2B1D20AEF34007CAE8EC5AF6762A9E4CE2751B64
2,961,110 UART: [art] SIG.R = A03066C2125E183893AE21F3A467BCFDC690927EAB08993004FE069CA7918516A4B7D4AC408844B925120976C245667A
2,967,860 UART: [art] SIG.S = C50D73CE272A617974192C2FC7F2C6FE363DE645636881C220A33B212C472C41AF07E2F4DF85F2D22D5DA5A223435F8D
2,991,145 UART: Caliptra RT
2,991,398 UART: [state] CFI Enabled
3,099,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,870 UART: [rt]cmd =0x4453424c, len=4
3,143,760 >>> mbox cmd response data (8 bytes)
3,143,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,578,431 >>> mbox cmd response: success
5,578,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,591,491 UART:
5,591,507 UART: Running Caliptra FMC ...
5,591,915 UART:
5,591,969 UART: [state] CFI Enabled
5,681,170 UART: [art] Extend RT PCRs Done
5,681,598 UART: [art] Lock RT PCRs Done
5,682,795 UART: [art] Populate DV Done
5,691,056 UART: [fht] FMC Alias Private Key: 7
5,692,150 UART: [art] Derive CDI
5,692,430 UART: [art] Store in in slot 0x4
5,777,933 UART: [art] Derive Key Pair
5,778,293 UART: [art] Store priv key in slot 0x5
5,791,419 UART: [art] Derive Key Pair - Done
5,805,869 UART: [art] Signing Cert with AUTHO
5,806,349 UART: RITY.KEYID = 7
5,821,587 UART: [art] Erasing AUTHORITY.KEYID = 7
5,822,352 UART: [art] PUB.X = 13B9762C0542F1AD4832EF441C8B7C6EC4AAC0E7B1E8D739B24D0CC0B3EFF28D1DD482C4ABC645461743A73D0DE88958
5,829,127 UART: [art] PUB.Y = 945211DF76E083F9DEA94129963F1D87BD16947B06AA25D3AD4789266F9F4EAE6CA7C096B489B28F04A8055873439861
5,836,064 UART: [art] SIG.R = 0428FC315B4AAA4EE7BBE20F571188E93AC15F155289B3D1B2C84BF6830AFED77570894F912105B33EC3C455ABD9C028
5,842,830 UART: [art] SIG.S = E28F1006C87133E3A0EB059E55741238ADB28E1F80A548F9F7CAE1D58D93BFC6345D24E03DAFEDF6A565E5E94F270CFA
5,865,816 UART: Caliptra RT
5,866,069 UART: [state] CFI Enabled
6,162,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,193,009 UART: [rt]cmd =0x494e464f, len=4
6,196,346 >>> mbox cmd response data (264 bytes)
6,196,347 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,225,736 UART: [rt]cmd =0x43455252, len=4
6,236,679 >>> mbox cmd response data (783 bytes)
6,236,680 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,266,589 UART: [rt]cmd =0x44504543, len=92
6,450,437 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,634 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 ready_for_fw is high
1,174,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,472 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,280 UART: [fwproc] Recv command 0x46574c44
1,283,013 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,929 >>> mbox cmd response: success
2,774,929 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,776,174 UART: [afmc] ++
2,776,342 UART: [afmc] CDI.KEYID = 6
2,776,705 UART: [afmc] SUBJECT.KEYID = 7
2,777,131 UART: [afmc] AUTHORITY.KEYID = 5
2,813,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,361 UART: [afmc] --
2,856,439 UART: [cold-reset] --
2,857,201 UART: [state] Locking Datavault
2,858,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,892 UART: [state] Locking ICCM
2,859,514 UART: [exit] Launching FMC @ 0x40000130
2,864,843 UART:
2,864,859 UART: Running Caliptra FMC ...
2,865,267 UART:
2,865,410 UART: [state] CFI Enabled
2,875,987 UART: [fht] FMC Alias Private Key: 7
2,984,000 UART: [art] Extend RT PCRs Done
2,984,428 UART: [art] Lock RT PCRs Done
2,985,798 UART: [art] Populate DV Done
2,994,193 UART: [fht] FMC Alias Private Key: 7
2,995,227 UART: [art] Derive CDI
2,995,507 UART: [art] Store in in slot 0x4
3,080,896 UART: [art] Derive Key Pair
3,081,256 UART: [art] Store priv key in slot 0x5
3,094,346 UART: [art] Derive Key Pair - Done
3,108,820 UART: [art] Signing Cert with AUTHO
3,109,300 UART: RITY.KEYID = 7
3,124,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,241 UART: [art] PUB.X = C75633135329127F40A1E1DD56D2F53C0CFDB745C7D1AB6F9F2EC418868BF3A9112F1B1689CE926653D0DFD2996032B7
3,132,012 UART: [art] PUB.Y = FD615BF177EB8CDAA3807087CACAD108ACF692BC9D3EEC05B6E4CFFCC503FD58CD066581E81004FF0A48440707A6A296
3,138,958 UART: [art] SIG.R = E9CBC0343BF713CCAF6F33CC4B8BC0BEA94A1A78DDFB1C1062E4729907CEF2662D08CE2BF4404224000BF43C753C4B56
3,145,715 UART: [art] SIG.S = BCAD003F930BFA3DA76739F9997F229C1293EABB187A4D67BD5E74C63929CAFA5E4B03AC4F9E6D117075EDBC3425820D
3,169,767 UART: Caliptra RT
3,170,112 UART: [state] CFI Enabled
3,278,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,860 UART: [rt]cmd =0x4453424c, len=4
3,322,134 >>> mbox cmd response data (8 bytes)
3,322,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,042 UART:
3,323,058 UART: Running Caliptra ROM ...
3,323,466 UART:
3,323,608 UART: [state] CFI Enabled
3,326,168 UART: [state] LifecycleState = Unprovisioned
3,326,823 UART: [state] DebugLocked = No
3,327,449 UART: [state] WD Timer not started. Device not locked for debugging
3,328,639 UART: [kat] SHA2-256
4,132,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,136,318 UART: [kat] ++
4,136,470 UART: [kat] sha1
4,140,550 UART: [kat] SHA2-256
4,142,490 UART: [kat] SHA2-384
4,145,433 UART: [kat] SHA2-512-ACC
4,147,333 UART: [kat] ECC-384
4,157,014 UART: [kat] HMAC-384Kdf
4,161,634 UART: [kat] LMS
4,409,946 UART: [kat] --
4,410,748 UART: [update-reset] ++
5,725,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,726,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,876,239 >>> mbox cmd response: success
5,876,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,876,586 UART: [update-reset] Copying MAN_2 To MAN_1
5,884,600 UART: [update-reset Success] --
5,885,677 UART: [state] Locking Datavault
5,886,399 UART: [state] Locking PCR0, PCR1 and PCR31
5,887,003 UART: [state] Locking ICCM
5,887,493 UART: [exit] Launching FMC @ 0x40000130
5,892,822 UART:
5,892,838 UART: Running Caliptra FMC ...
5,893,246 UART:
5,893,389 UART: [state] CFI Enabled
5,982,696 UART: [art] Extend RT PCRs Done
5,983,124 UART: [art] Lock RT PCRs Done
5,984,307 UART: [art] Populate DV Done
5,992,348 UART: [fht] FMC Alias Private Key: 7
5,993,332 UART: [art] Derive CDI
5,993,612 UART: [art] Store in in slot 0x4
6,078,937 UART: [art] Derive Key Pair
6,079,297 UART: [art] Store priv key in slot 0x5
6,092,883 UART: [art] Derive Key Pair - Done
6,107,526 UART: [art] Signing Cert with AUTHO
6,108,006 UART: RITY.KEYID = 7
6,123,072 UART: [art] Erasing AUTHORITY.KEYID = 7
6,123,837 UART: [art] PUB.X = D59B33143F64D251BDDE863028645C53F2B58978DA381CFFFE9E5B2D660297E88F7DD90268BCDA989DDFC7320D8223D4
6,130,606 UART: [art] PUB.Y = D8751B9D271C34E04E69BC41A71FFBC4196105B94794C675E989345A2AAB1B1739C7CBBB6EDC0E19AAFE044F17C9620A
6,137,556 UART: [art] SIG.R = D6E0F1951C2575994292905B4BA97749C612A8133199FFAE5F041FE723D2C1E0F5443FC315544B6C1809412AB5DF627A
6,144,316 UART: [art] SIG.S = C0E09E3B0DC4FFD8B63ECD2188362906D9A22B93A9B767B5B5DF4C3C43CE2967FC1E7B92953625063E7A666CCA405870
6,168,158 UART: Caliptra RT
6,168,503 UART: [state] CFI Enabled
6,464,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,495,020 UART: [rt]cmd =0x494e464f, len=4
6,498,349 >>> mbox cmd response data (264 bytes)
6,498,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,527,839 UART: [rt]cmd =0x43455252, len=4
6,538,839 >>> mbox cmd response data (784 bytes)
6,538,840 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,568,709 UART: [rt]cmd =0x44504543, len=92
6,752,155 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,833 ready_for_fw is high
1,056,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,315 >>> mbox cmd response: success
2,626,315 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,688,043 UART:
2,688,059 UART: Running Caliptra FMC ...
2,688,467 UART:
2,688,610 UART: [state] CFI Enabled
2,699,255 UART: [fht] FMC Alias Private Key: 7
2,807,190 UART: [art] Extend RT PCRs Done
2,807,618 UART: [art] Lock RT PCRs Done
2,808,792 UART: [art] Populate DV Done
2,817,053 UART: [fht] FMC Alias Private Key: 7
2,818,177 UART: [art] Derive CDI
2,818,457 UART: [art] Store in in slot 0x4
2,904,478 UART: [art] Derive Key Pair
2,904,838 UART: [art] Store priv key in slot 0x5
2,918,190 UART: [art] Derive Key Pair - Done
2,933,081 UART: [art] Signing Cert with AUTHO
2,933,561 UART: RITY.KEYID = 7
2,949,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,860 UART: [art] PUB.X = DC6086E2E8FAABFC432DA7EEEC2666B92ABC7CE4A1B59927CF453C914E5FCD1724CB358E30B8466BD307836C722C7772
2,956,643 UART: [art] PUB.Y = 11DE1E6CC2B7D1BFFB821AE5BFD0938AE25D264BF0217D7051AE6132A19A5C5B0F9778DD3B352EE43F06EF302B9002AD
2,963,602 UART: [art] SIG.R = A3752CCF59E00C5841E82CFD4E4ABD48A9B5DA9D7EC133AAD540ED3DC11E0939EF22770F39E76EBB37970E69C67191D0
2,970,376 UART: [art] SIG.S = 517F921667302422345E9833F12EA58AAA9A3D0A79B34FBB24F94116644B69FB6AD0499EEADE8CB1A7EA80FD51A7E04B
2,994,052 UART: Caliptra RT
2,994,397 UART: [state] CFI Enabled
3,101,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,100 UART: [rt]cmd =0x4453424c, len=4
3,145,960 >>> mbox cmd response data (8 bytes)
3,145,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,688 >>> mbox cmd response: success
5,580,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,593,934 UART:
5,593,950 UART: Running Caliptra FMC ...
5,594,358 UART:
5,594,501 UART: [state] CFI Enabled
5,683,590 UART: [art] Extend RT PCRs Done
5,684,018 UART: [art] Lock RT PCRs Done
5,685,357 UART: [art] Populate DV Done
5,693,612 UART: [fht] FMC Alias Private Key: 7
5,694,688 UART: [art] Derive CDI
5,694,968 UART: [art] Store in in slot 0x4
5,780,185 UART: [art] Derive Key Pair
5,780,545 UART: [art] Store priv key in slot 0x5
5,793,735 UART: [art] Derive Key Pair - Done
5,808,216 UART: [art] Signing Cert with AUTHO
5,808,696 UART: RITY.KEYID = 7
5,824,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,824,975 UART: [art] PUB.X = CD3DD84A8C6AE82D9D29E92D4A53DD4EEB6B8E8EB52F36ED951BA9C68EBC841398A0673067165273DCBB041383E0D036
5,831,756 UART: [art] PUB.Y = C5641F07407DA9FA1CFAC09DB3011B187998F1ECADCB6045F71658414FC1945F6BEBC9779430F225D97EFA2F05BFC070
5,838,709 UART: [art] SIG.R = DE7FB928D6CBF3A2FD92A81FA083BB9325C04266DE73CD2F9B580BB01B8A6D484C9FB4193BE77AF588DA042872DA940E
5,845,488 UART: [art] SIG.S = AFA0F23CD839AD6D4C0642AE59E27FE9E5BB590FA2E249E62723DB152A8731C193400BD29F8737802A0D07D6BD65673A
5,868,882 UART: Caliptra RT
5,869,227 UART: [state] CFI Enabled
6,170,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,200,518 UART: [rt]cmd =0x494e464f, len=4
6,203,889 >>> mbox cmd response data (264 bytes)
6,203,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,233,363 UART: [rt]cmd =0x43455252, len=4
6,243,979 >>> mbox cmd response data (784 bytes)
6,243,980 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,273,753 UART: [rt]cmd =0x44504543, len=92
6,457,717 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,050 UART:
192,408 UART: Running Caliptra ROM ...
193,505 UART:
193,647 UART: [state] CFI Enabled
266,779 UART: [state] LifecycleState = Unprovisioned
268,764 UART: [state] DebugLocked = No
270,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,084 UART: [kat] SHA2-256
445,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,305 UART: [kat] ++
456,757 UART: [kat] sha1
468,058 UART: [kat] SHA2-256
470,721 UART: [kat] SHA2-384
476,427 UART: [kat] SHA2-512-ACC
478,792 UART: [kat] ECC-384
2,769,797 UART: [kat] HMAC-384Kdf
2,781,631 UART: [kat] LMS
3,971,914 UART: [kat] --
3,977,065 UART: [cold-reset] ++
3,979,076 UART: [fht] Storing FHT @ 0x50003400
3,990,197 UART: [idev] ++
3,990,836 UART: [idev] CDI.KEYID = 6
3,991,718 UART: [idev] SUBJECT.KEYID = 7
3,992,958 UART: [idev] UDS.KEYID = 0
3,993,926 ready_for_fw is high
3,994,138 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,674 UART: [idev] Erasing UDS.KEYID = 0
7,330,024 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,461 UART: [idev] --
7,355,643 UART: [ldev] ++
7,356,212 UART: [ldev] CDI.KEYID = 6
7,357,227 UART: [ldev] SUBJECT.KEYID = 5
7,358,386 UART: [ldev] AUTHORITY.KEYID = 7
7,359,617 UART: [ldev] FE.KEYID = 1
7,404,180 UART: [ldev] Erasing FE.KEYID = 1
10,739,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,904 UART: [ldev] --
13,119,190 UART: [fwproc] Waiting for Commands...
13,122,311 UART: [fwproc] Received command 0x46574c44
13,124,544 UART: [fwproc] Received Image of size 114124 bytes
17,180,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,645,702 >>> mbox cmd response: success
17,646,319 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,650,316 UART: [afmc] ++
17,650,906 UART: [afmc] CDI.KEYID = 6
17,651,793 UART: [afmc] SUBJECT.KEYID = 7
17,653,063 UART: [afmc] AUTHORITY.KEYID = 5
21,025,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,172 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,532 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,381 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,830 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,102 UART: [afmc] --
23,394,299 UART: [cold-reset] --
23,397,618 UART: [state] Locking Datavault
23,403,034 UART: [state] Locking PCR0, PCR1 and PCR31
23,404,781 UART: [state] Locking ICCM
23,406,288 UART: [exit] Launching FMC @ 0x40000130
23,414,683 UART:
23,414,917 UART: Running Caliptra FMC ...
23,416,019 UART:
23,416,186 UART: [state] CFI Enabled
23,484,572 UART: [fht] FMC Alias Private Key: 7
25,822,583 UART: [art] Extend RT PCRs Done
25,823,800 UART: [art] Lock RT PCRs Done
25,825,265 UART: [art] Populate DV Done
25,830,804 UART: [fht] FMC Alias Private Key: 7
25,832,288 UART: [art] Derive CDI
25,833,027 UART: [art] Store in in slot 0x4
25,892,685 UART: [art] Derive Key Pair
25,893,720 UART: [art] Store priv key in slot 0x5
29,186,251 UART: [art] Derive Key Pair - Done
29,199,304 UART: [art] Signing Cert with AUTHO
29,200,614 UART: RITY.KEYID = 7
31,488,228 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,727 UART: [art] PUB.X = 9DEC32C4FB2F4BF90B93F628D38B1191C64983F69845078DCB1F75E47B0E68D8E3B90999A139DB06305BDFED84FC60D3
31,496,984 UART: [art] PUB.Y = 1D94A4A44927F9E4F9BC5F6FA9D12C6FB261AD5F92259EBA6549CF282C4B8176F798C34A98B8D1FD473626A4E36C0C58
31,504,238 UART: [art] SIG.R = E679D6CA68DD0026C0F6CC3812EDF0DF6BFF7FCE286FD0249D4747B054A7DEAED3807715930E27505D3B9C56785B80C0
31,511,634 UART: [art] SIG.S = 882549A81F5CFB47E222587F91667EABF1C1FE97221540F8068DF72354DFFCFEFD7CFDEFC2CC69C75C3E50972A1632C5
32,817,182 UART: Caliptra RT
32,817,890 UART: [state] CFI Enabled
32,978,410 UART: [rt] RT listening for mailbox commands...
33,010,859 UART: [rt]cmd =0x44504543, len=136
38,633,840 >>> mbox cmd response data (136 bytes)
38,635,164 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,664,785 UART: [rt]cmd =0x4453424c, len=4
41,962,595 >>> mbox cmd response data (8 bytes)
41,963,136 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,993,736 UART: [rt]cmd =0x44504543, len=92
47,754,139 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,781,620 ready_for_fw is high
3,782,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,850,278 >>> mbox cmd response: success
17,851,200 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,546,994 UART:
23,547,365 UART: Running Caliptra FMC ...
23,548,558 UART:
23,548,729 UART: [state] CFI Enabled
23,615,227 UART: [fht] FMC Alias Private Key: 7
25,953,140 UART: [art] Extend RT PCRs Done
25,954,366 UART: [art] Lock RT PCRs Done
25,955,949 UART: [art] Populate DV Done
25,961,363 UART: [fht] FMC Alias Private Key: 7
25,963,022 UART: [art] Derive CDI
25,963,868 UART: [art] Store in in slot 0x4
26,023,918 UART: [art] Derive Key Pair
26,024,966 UART: [art] Store priv key in slot 0x5
29,318,238 UART: [art] Derive Key Pair - Done
29,331,074 UART: [art] Signing Cert with AUTHO
29,332,382 UART: RITY.KEYID = 7
31,620,062 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,565 UART: [art] PUB.X = 7BAFFB17FB80BD6B08FD622F287CB515E145C2F24EB3378D59D305D576C153E9A2E971E7EB936CA0148D56CB907FECA2
31,628,810 UART: [art] PUB.Y = D38FCC8D7C5B87B35E5CE1087FB7DEBCE7EB8F2CBD05E9F256F183FB034DD00DAD0FD15B216C5258B4DF4FA7E1FD1902
31,636,086 UART: [art] SIG.R = 81F32668BFE6B46C969B35CF082921B0D68844AEE6E1082C416ACBF9F03568D8D4ACBDF398C49C7523821DAF34362B28
31,643,505 UART: [art] SIG.S = 429EBCD02A27B07B37D6C2ECF1BF1A77AAB71ADB3D78CBF95DAB539C2FDCE1B71EA0AC5756BA0CD686683FFFE9D49C16
32,948,584 UART: Caliptra RT
32,949,300 UART: [state] CFI Enabled
33,111,978 UART: [rt] RT listening for mailbox commands...
33,144,628 UART: [rt]cmd =0x44504543, len=136
38,766,913 >>> mbox cmd response data (136 bytes)
38,768,212 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,798,156 UART: [rt]cmd =0x4453424c, len=4
42,095,602 >>> mbox cmd response data (8 bytes)
42,096,120 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,126,770 UART: [rt]cmd =0x44504543, len=92
47,888,563 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,376 UART:
192,741 UART: Running Caliptra ROM ...
193,844 UART:
603,703 UART: [state] CFI Enabled
618,005 UART: [state] LifecycleState = Unprovisioned
619,961 UART: [state] DebugLocked = No
622,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,426 UART: [kat] SHA2-256
796,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,781 UART: [kat] ++
807,227 UART: [kat] sha1
818,974 UART: [kat] SHA2-256
821,717 UART: [kat] SHA2-384
826,307 UART: [kat] SHA2-512-ACC
828,678 UART: [kat] ECC-384
3,115,086 UART: [kat] HMAC-384Kdf
3,126,293 UART: [kat] LMS
4,316,460 UART: [kat] --
4,321,596 UART: [cold-reset] ++
4,323,028 UART: [fht] Storing FHT @ 0x50003400
4,334,803 UART: [idev] ++
4,335,402 UART: [idev] CDI.KEYID = 6
4,336,314 UART: [idev] SUBJECT.KEYID = 7
4,337,551 UART: [idev] UDS.KEYID = 0
4,338,532 ready_for_fw is high
4,338,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,927 UART: [idev] Erasing UDS.KEYID = 0
7,624,285 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,956 UART: [idev] --
7,649,455 UART: [ldev] ++
7,650,022 UART: [ldev] CDI.KEYID = 6
7,650,984 UART: [ldev] SUBJECT.KEYID = 5
7,652,189 UART: [ldev] AUTHORITY.KEYID = 7
7,653,466 UART: [ldev] FE.KEYID = 1
7,666,804 UART: [ldev] Erasing FE.KEYID = 1
10,954,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,193 UART: [ldev] --
13,314,044 UART: [fwproc] Waiting for Commands...
13,316,138 UART: [fwproc] Received command 0x46574c44
13,318,312 UART: [fwproc] Received Image of size 114124 bytes
17,377,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,905 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,788 >>> mbox cmd response: success
17,842,384 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,846,525 UART: [afmc] ++
17,847,114 UART: [afmc] CDI.KEYID = 6
17,848,207 UART: [afmc] SUBJECT.KEYID = 7
17,849,262 UART: [afmc] AUTHORITY.KEYID = 5
21,168,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,018 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,389 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,227 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,673 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,445 UART: [afmc] --
23,533,431 UART: [cold-reset] --
23,536,778 UART: [state] Locking Datavault
23,541,646 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,392 UART: [state] Locking ICCM
23,545,267 UART: [exit] Launching FMC @ 0x40000130
23,553,658 UART:
23,553,898 UART: Running Caliptra FMC ...
23,554,996 UART:
23,555,155 UART: [state] CFI Enabled
23,563,303 UART: [fht] FMC Alias Private Key: 7
25,894,795 UART: [art] Extend RT PCRs Done
25,896,021 UART: [art] Lock RT PCRs Done
25,897,834 UART: [art] Populate DV Done
25,903,400 UART: [fht] FMC Alias Private Key: 7
25,905,096 UART: [art] Derive CDI
25,905,911 UART: [art] Store in in slot 0x4
25,948,934 UART: [art] Derive Key Pair
25,949,991 UART: [art] Store priv key in slot 0x5
29,192,592 UART: [art] Derive Key Pair - Done
29,205,368 UART: [art] Signing Cert with AUTHO
29,206,662 UART: RITY.KEYID = 7
31,485,699 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,203 UART: [art] PUB.X = 6CADA0B988E67711F0DA44AAE0B0DD197488857FB27B55BC3FFC280258770282FAB733C8D4525CB1EE2CB808883DB7E5
31,494,441 UART: [art] PUB.Y = B122AE497B54688A34EAC3D4C32C6C3F01AED1AA8DEDEE776BF71FB27F523E488250E174839A0403818D00AC3FFAF240
31,501,727 UART: [art] SIG.R = 1AE0AFCF07A31242E4963393E7ED57E5E7B8B8CDE5FC832F17B3741DB71FD5068501149299F2EF9A28790776D25828B6
31,509,102 UART: [art] SIG.S = 3911968E260F93F813E71D7D4F2E71B1C4DD27712EB817FDABE03BD01738F72AE0ACB7F7485FD8497158B1BE3C7DFD1F
32,813,929 UART: Caliptra RT
32,814,646 UART: [state] CFI Enabled
32,932,789 UART: [rt] RT listening for mailbox commands...
32,965,113 UART: [rt]cmd =0x44504543, len=136
38,524,593 >>> mbox cmd response data (136 bytes)
38,525,919 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,555,602 UART: [rt]cmd =0x4453424c, len=4
41,798,576 >>> mbox cmd response data (8 bytes)
41,799,125 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,829,661 UART: [rt]cmd =0x44504543, len=92
47,503,955 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,032 writing to cptra_bootfsm_go
4,134,158 ready_for_fw is high
4,134,723 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,784 >>> mbox cmd response: success
18,078,512 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,718,775 UART:
23,719,224 UART: Running Caliptra FMC ...
23,720,330 UART:
23,720,476 UART: [state] CFI Enabled
23,728,495 UART: [fht] FMC Alias Private Key: 7
26,059,108 UART: [art] Extend RT PCRs Done
26,060,364 UART: [art] Lock RT PCRs Done
26,062,331 UART: [art] Populate DV Done
26,067,584 UART: [fht] FMC Alias Private Key: 7
26,069,231 UART: [art] Derive CDI
26,070,046 UART: [art] Store in in slot 0x4
26,112,709 UART: [art] Derive Key Pair
26,113,750 UART: [art] Store priv key in slot 0x5
29,355,629 UART: [art] Derive Key Pair - Done
29,368,467 UART: [art] Signing Cert with AUTHO
29,369,807 UART: RITY.KEYID = 7
31,649,488 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,003 UART: [art] PUB.X = 5B4F87304092F1CCD2A61D2443BE3FE7FC006649A8563F085B3966CBDA8BC434BAAAF93B8D625D29E24820C99A0CFCBA
31,658,257 UART: [art] PUB.Y = E37B9D6F7E501A70874ED39C344CB314532CCB35DF2BF14AA770FAF23418F1E5F6A60A22E2780FDE75BCCECB5785BC75
31,665,548 UART: [art] SIG.R = 522CC9AA724CE8341BA6CBC70255AF65E5F5EC70B6BD6464FD14312E1C5550A3553BA7D2CE163165F02F14FA1E81AF64
31,672,944 UART: [art] SIG.S = F65176A310B39C252BD72677C5917BC97F4E314DFDE7770392B1D9B3247D589FD065BC783CC15251890814FA9040886B
32,978,685 UART: Caliptra RT
32,979,424 UART: [state] CFI Enabled
33,097,955 UART: [rt] RT listening for mailbox commands...
33,130,399 UART: [rt]cmd =0x44504543, len=136
38,689,338 >>> mbox cmd response data (136 bytes)
38,690,655 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,720,601 UART: [rt]cmd =0x4453424c, len=4
41,963,479 >>> mbox cmd response data (8 bytes)
41,964,040 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,994,579 UART: [rt]cmd =0x44504543, len=92
47,669,269 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
192,112 UART:
192,482 UART: Running Caliptra ROM ...
193,635 UART:
193,783 UART: [state] CFI Enabled
263,722 UART: [state] LifecycleState = Unprovisioned
265,594 UART: [state] DebugLocked = No
267,631 UART: [state] WD Timer not started. Device not locked for debugging
271,813 UART: [kat] SHA2-256
450,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,530 UART: [kat] ++
462,979 UART: [kat] sha1
475,413 UART: [kat] SHA2-256
478,491 UART: [kat] SHA2-384
484,337 UART: [kat] SHA2-512-ACC
487,342 UART: [kat] ECC-384
2,949,737 UART: [kat] HMAC-384Kdf
2,972,164 UART: [kat] LMS
3,501,624 UART: [kat] --
3,504,625 UART: [cold-reset] ++
3,506,054 UART: [fht] FHT @ 0x50003400
3,516,677 UART: [idev] ++
3,517,249 UART: [idev] CDI.KEYID = 6
3,518,231 UART: [idev] SUBJECT.KEYID = 7
3,519,403 UART: [idev] UDS.KEYID = 0
3,520,327 ready_for_fw is high
3,520,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,453 UART: [idev] Erasing UDS.KEYID = 0
6,027,369 UART: [idev] Sha1 KeyId Algorithm
6,050,108 UART: [idev] --
6,053,671 UART: [ldev] ++
6,054,246 UART: [ldev] CDI.KEYID = 6
6,055,161 UART: [ldev] SUBJECT.KEYID = 5
6,056,397 UART: [ldev] AUTHORITY.KEYID = 7
6,057,579 UART: [ldev] FE.KEYID = 1
6,100,647 UART: [ldev] Erasing FE.KEYID = 1
8,604,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,521 UART: [ldev] --
10,413,391 UART: [fwproc] Wait for Commands...
10,416,254 UART: [fwproc] Recv command 0x46574c44
10,418,348 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,910 >>> mbox cmd response: success
14,285,506 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,289,356 UART: [afmc] ++
14,289,966 UART: [afmc] CDI.KEYID = 6
14,290,881 UART: [afmc] SUBJECT.KEYID = 7
14,292,046 UART: [afmc] AUTHORITY.KEYID = 5
16,828,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,960 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,329 UART: [afmc] --
18,626,706 UART: [cold-reset] --
18,629,643 UART: [state] Locking Datavault
18,633,753 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,404 UART: [state] Locking ICCM
18,636,712 UART: [exit] Launching FMC @ 0x40000130
18,645,116 UART:
18,645,352 UART: Running Caliptra FMC ...
18,646,452 UART:
18,646,608 UART: [state] CFI Enabled
18,710,161 UART: [fht] FMC Alias Private Key: 7
20,474,522 UART: [art] Extend RT PCRs Done
20,475,746 UART: [art] Lock RT PCRs Done
20,477,487 UART: [art] Populate DV Done
20,482,893 UART: [fht] FMC Alias Private Key: 7
20,484,435 UART: [art] Derive CDI
20,485,252 UART: [art] Store in in slot 0x4
20,543,030 UART: [art] Derive Key Pair
20,544,073 UART: [art] Store priv key in slot 0x5
23,007,490 UART: [art] Derive Key Pair - Done
23,020,326 UART: [art] Signing Cert with AUTHO
23,021,654 UART: RITY.KEYID = 7
24,733,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,604 UART: [art] PUB.X = 6CFE908B4D2C3DF1630D9F5FFC15E9F364997A3BA64BA7FDB2A8CBD7C2C22512C7931A6122AA9743896A4D46A5F791C1
24,741,913 UART: [art] PUB.Y = E16A0D3DFBB4E3EE22AAD97ABA5E1FAA53BA646CAD425DA50EDD393BECDB396537ECD9E878CB404B13349F318C0AEFD5
24,749,197 UART: [art] SIG.R = A546F3872EE5F74FB732D0F7A23B0CD42014832C449EBC7967CD5249E8C90B19E54AE5E0EFBA3F8EA7A672F1000B420E
24,756,583 UART: [art] SIG.S = 2FD9EAFF0BAE57491C2A5C4F264506AAC5D828CABCB852739729C46A892D25FA416C79FCA42A0F25BF8A082F859F253C
25,735,539 UART: Caliptra RT
25,736,250 UART: [state] CFI Enabled
25,900,063 UART: [rt] RT listening for mailbox commands...
25,932,446 UART: [rt]cmd =0x44504543, len=136
30,150,176 >>> mbox cmd response data (136 bytes)
30,151,649 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,181,461 UART: [rt]cmd =0x4453424c, len=4
32,647,799 >>> mbox cmd response data (8 bytes)
32,648,343 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,678,837 UART: [rt]cmd =0x44504543, len=92
37,033,392 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,378,618 ready_for_fw is high
3,379,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,078,954 >>> mbox cmd response: success
14,079,704 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,365,529 UART:
18,365,974 UART: Running Caliptra FMC ...
18,367,087 UART:
18,367,256 UART: [state] CFI Enabled
18,430,649 UART: [fht] FMC Alias Private Key: 7
20,194,592 UART: [art] Extend RT PCRs Done
20,195,803 UART: [art] Lock RT PCRs Done
20,197,431 UART: [art] Populate DV Done
20,202,841 UART: [fht] FMC Alias Private Key: 7
20,204,445 UART: [art] Derive CDI
20,205,261 UART: [art] Store in in slot 0x4
20,263,018 UART: [art] Derive Key Pair
20,264,059 UART: [art] Store priv key in slot 0x5
22,726,951 UART: [art] Derive Key Pair - Done
22,740,068 UART: [art] Signing Cert with AUTHO
22,741,381 UART: RITY.KEYID = 7
24,453,063 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,568 UART: [art] PUB.X = C61FFF719F3E83B808A3AD52CC991978B72183CAD609C9D60E41EE09CE8B50E73226C35E55B8109BC8908D5D6D65EC20
24,461,828 UART: [art] PUB.Y = A722A64B87E6E73DEFADCF240F972CC07D78A546EBE69FB310EB7B8BB25B43467866E701FD7FC58127FDE6C8BE86BB9A
24,469,141 UART: [art] SIG.R = F0ACE6F393409A412EAC618C7E6207E01B6F1CC2A34BB79176CC1864949563AA61ABED88E7D38EFFD9C5ED7171D0A78D
24,476,546 UART: [art] SIG.S = F88C881D82C5D1BE11C7BEB4A4673B309B883E46F1F72A2A9A81824CD612A417C50D77B6997EA3946F2A6B9352EEFFAA
25,455,669 UART: Caliptra RT
25,456,384 UART: [state] CFI Enabled
25,621,427 UART: [rt] RT listening for mailbox commands...
25,653,928 UART: [rt]cmd =0x44504543, len=136
29,872,359 >>> mbox cmd response data (136 bytes)
29,873,669 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,903,338 UART: [rt]cmd =0x4453424c, len=4
32,370,322 >>> mbox cmd response data (8 bytes)
32,370,834 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,401,256 UART: [rt]cmd =0x44504543, len=92
36,756,354 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,572 UART:
192,947 UART: Running Caliptra ROM ...
194,160 UART:
603,520 UART: [state] CFI Enabled
614,262 UART: [state] LifecycleState = Unprovisioned
616,135 UART: [state] DebugLocked = No
618,297 UART: [state] WD Timer not started. Device not locked for debugging
622,821 UART: [kat] SHA2-256
801,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,469 UART: [kat] ++
814,005 UART: [kat] sha1
824,250 UART: [kat] SHA2-256
827,258 UART: [kat] SHA2-384
833,596 UART: [kat] SHA2-512-ACC
836,520 UART: [kat] ECC-384
3,277,627 UART: [kat] HMAC-384Kdf
3,289,285 UART: [kat] LMS
3,818,803 UART: [kat] --
3,822,457 UART: [cold-reset] ++
3,823,811 UART: [fht] FHT @ 0x50003400
3,834,853 UART: [idev] ++
3,835,406 UART: [idev] CDI.KEYID = 6
3,836,349 UART: [idev] SUBJECT.KEYID = 7
3,837,510 UART: [idev] UDS.KEYID = 0
3,838,501 ready_for_fw is high
3,838,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,378 UART: [idev] Erasing UDS.KEYID = 0
6,312,220 UART: [idev] Sha1 KeyId Algorithm
6,335,491 UART: [idev] --
6,339,149 UART: [ldev] ++
6,339,711 UART: [ldev] CDI.KEYID = 6
6,340,609 UART: [ldev] SUBJECT.KEYID = 5
6,341,809 UART: [ldev] AUTHORITY.KEYID = 7
6,343,085 UART: [ldev] FE.KEYID = 1
6,354,175 UART: [ldev] Erasing FE.KEYID = 1
8,825,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,262 UART: [ldev] --
10,616,256 UART: [fwproc] Wait for Commands...
10,618,351 UART: [fwproc] Recv command 0x46574c44
10,620,435 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,766 >>> mbox cmd response: success
14,494,335 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,497,391 UART: [afmc] ++
14,497,988 UART: [afmc] CDI.KEYID = 6
14,498,866 UART: [afmc] SUBJECT.KEYID = 7
14,500,077 UART: [afmc] AUTHORITY.KEYID = 5
16,996,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,731 UART: [afmc] --
18,790,015 UART: [cold-reset] --
18,793,921 UART: [state] Locking Datavault
18,797,218 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,852 UART: [state] Locking ICCM
18,800,779 UART: [exit] Launching FMC @ 0x40000130
18,809,161 UART:
18,809,406 UART: Running Caliptra FMC ...
18,810,499 UART:
18,810,651 UART: [state] CFI Enabled
18,818,794 UART: [fht] FMC Alias Private Key: 7
20,575,717 UART: [art] Extend RT PCRs Done
20,576,933 UART: [art] Lock RT PCRs Done
20,578,500 UART: [art] Populate DV Done
20,584,338 UART: [fht] FMC Alias Private Key: 7
20,585,866 UART: [art] Derive CDI
20,586,672 UART: [art] Store in in slot 0x4
20,629,585 UART: [art] Derive Key Pair
20,630,620 UART: [art] Store priv key in slot 0x5
23,057,117 UART: [art] Derive Key Pair - Done
23,070,162 UART: [art] Signing Cert with AUTHO
23,071,456 UART: RITY.KEYID = 7
24,776,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,337 UART: [art] PUB.X = 8FB2CF2FFA8BD820F7C3E9EB5C67794557FCBC70EAC6117B02C56E5D3CB6B27C02C0222D8777A9569208967B985DBE1A
24,785,626 UART: [art] PUB.Y = B15C4BA974BECE2398B84678E5E4843C3F74CFDF9438A0AC04DD7D53061213501DB91A59996A2B34076B16B31C4024A6
24,792,909 UART: [art] SIG.R = BA821E12C51E5CDEED2E4C72FC6EB11839F4B29A41A1F2FC7E86A9B003AEFCEAFCF597AE764E3C125582619D2BF5D6CA
24,800,286 UART: [art] SIG.S = 29A87745AE7B2EC1B4105DEEEDE0CE5F2D79FE5E2D7D84104E21676CA6187106D89B4E97A6FC59468AEF45FCA0F75799
25,779,657 UART: Caliptra RT
25,780,361 UART: [state] CFI Enabled
25,897,232 UART: [rt] RT listening for mailbox commands...
25,929,530 UART: [rt]cmd =0x44504543, len=136
30,099,994 >>> mbox cmd response data (136 bytes)
30,101,315 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,131,151 UART: [rt]cmd =0x4453424c, len=4
32,559,284 >>> mbox cmd response data (8 bytes)
32,559,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,590,381 UART: [rt]cmd =0x44504543, len=92
36,874,983 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,696,786 ready_for_fw is high
3,697,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,353 >>> mbox cmd response: success
14,269,305 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,524,032 UART:
18,524,427 UART: Running Caliptra FMC ...
18,525,531 UART:
18,525,682 UART: [state] CFI Enabled
18,533,621 UART: [fht] FMC Alias Private Key: 7
20,290,379 UART: [art] Extend RT PCRs Done
20,291,615 UART: [art] Lock RT PCRs Done
20,293,158 UART: [art] Populate DV Done
20,298,730 UART: [fht] FMC Alias Private Key: 7
20,300,377 UART: [art] Derive CDI
20,301,109 UART: [art] Store in in slot 0x4
20,343,917 UART: [art] Derive Key Pair
20,344,956 UART: [art] Store priv key in slot 0x5
22,770,979 UART: [art] Derive Key Pair - Done
22,783,866 UART: [art] Signing Cert with AUTHO
22,785,172 UART: RITY.KEYID = 7
24,490,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,153 UART: [art] PUB.X = A5182EBEFF4F15A04CFEC96B5B6E0410EB681E0C3890C8DA2537AB17A31130C2949F962D28150F9A293F2FC883C4EB9D
24,499,400 UART: [art] PUB.Y = A70E9B2502138BF28198A9AF20748BD8B1CF9938C61C938592385032FB3B7654F85DF971CBD9330D2F44DCF56A4760EC
24,506,654 UART: [art] SIG.R = 513B5B0113BAE10DE5F0A2E8C29CA7227404982321F23410165DF3FA6E3C4E42CB8AC7FEDE3494512F1FD86D16AF7FAC
24,514,039 UART: [art] SIG.S = 4CB959D0973113007E876B017AFF653FD2BFC9603C80EB687E18DA9DFA6E9B54F57861DE3AAFBD294A9D0982A3B7341F
25,492,805 UART: Caliptra RT
25,493,527 UART: [state] CFI Enabled
25,609,692 UART: [rt] RT listening for mailbox commands...
25,641,972 UART: [rt]cmd =0x44504543, len=136
29,811,274 >>> mbox cmd response data (136 bytes)
29,812,536 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,842,370 UART: [rt]cmd =0x4453424c, len=4
32,269,699 >>> mbox cmd response data (8 bytes)
32,270,184 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,300,665 UART: [rt]cmd =0x44504543, len=92
36,585,181 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,106 UART:
192,465 UART: Running Caliptra ROM ...
193,655 UART:
193,812 UART: [state] CFI Enabled
263,917 UART: [state] LifecycleState = Unprovisioned
266,342 UART: [state] DebugLocked = No
268,375 UART: [state] WD Timer not started. Device not locked for debugging
272,415 UART: [kat] SHA2-256
462,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,066 UART: [kat] ++
473,603 UART: [kat] sha1
483,774 UART: [kat] SHA2-256
486,787 UART: [kat] SHA2-384
492,561 UART: [kat] SHA2-512-ACC
495,137 UART: [kat] ECC-384
2,947,048 UART: [kat] HMAC-384Kdf
2,971,810 UART: [kat] LMS
3,503,576 UART: [kat] --
3,510,059 UART: [cold-reset] ++
3,511,065 UART: [fht] FHT @ 0x50003400
3,522,545 UART: [idev] ++
3,523,283 UART: [idev] CDI.KEYID = 6
3,524,220 UART: [idev] SUBJECT.KEYID = 7
3,525,396 UART: [idev] UDS.KEYID = 0
3,526,322 ready_for_fw is high
3,526,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,897 UART: [idev] Erasing UDS.KEYID = 0
6,027,083 UART: [idev] Sha1 KeyId Algorithm
6,047,938 UART: [idev] --
6,053,283 UART: [ldev] ++
6,053,968 UART: [ldev] CDI.KEYID = 6
6,054,859 UART: [ldev] SUBJECT.KEYID = 5
6,056,082 UART: [ldev] AUTHORITY.KEYID = 7
6,057,268 UART: [ldev] FE.KEYID = 1
6,099,566 UART: [ldev] Erasing FE.KEYID = 1
8,601,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,807 UART: [ldev] --
10,412,451 UART: [fwproc] Wait for Commands...
10,415,618 UART: [fwproc] Recv command 0x46574c44
10,417,929 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,597,664 >>> mbox cmd response: success
14,598,248 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,601,050 UART: [afmc] ++
14,601,771 UART: [afmc] CDI.KEYID = 6
14,602,879 UART: [afmc] SUBJECT.KEYID = 7
14,604,419 UART: [afmc] AUTHORITY.KEYID = 5
17,148,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,394 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,102 UART: [afmc] --
18,947,844 UART: [cold-reset] --
18,951,832 UART: [state] Locking Datavault
18,958,713 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,858 UART: [state] Locking ICCM
18,963,441 UART: [exit] Launching FMC @ 0x40000130
18,972,056 UART:
18,972,295 UART: Running Caliptra FMC ...
18,973,395 UART:
18,973,551 UART: [state] CFI Enabled
19,027,726 UART: [fht] FMC Alias Private Key: 7
20,791,045 UART: [art] Extend RT PCRs Done
20,792,267 UART: [art] Lock RT PCRs Done
20,793,625 UART: [art] Populate DV Done
20,799,046 UART: [fht] FMC Alias Private Key: 7
20,800,594 UART: [art] Derive CDI
20,801,357 UART: [art] Store in in slot 0x4
20,859,770 UART: [art] Derive Key Pair
20,860,764 UART: [art] Store priv key in slot 0x5
23,323,726 UART: [art] Derive Key Pair - Done
23,336,445 UART: [art] Signing Cert with AUTHO
23,337,751 UART: RITY.KEYID = 7
25,051,819 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,322 UART: [art] PUB.X = F87D686CF835AAA8F6C8C310152BDAA542F87504F65EA9AE1C5EC73E56EAE4AF8B291402F65653644CEEF3AD4C98271A
25,060,626 UART: [art] PUB.Y = 77C13B860EA5DD03D32BBE99D0CC8E9B0FD598BE307DD98A905D8C40EFCED54A841D7A608C0CCDE1DD6BCFCC6C629837
25,067,911 UART: [art] SIG.R = 8CCF692AA2B9483D41696292CCB3F735CC30DB5BD6D599CEF183C84848FC9165F8A7A8303F9B2552BC196571B5EE9D0F
25,075,311 UART: [art] SIG.S = 45DBC1F361DE0282159F5CD2D677481221691F9300B1DA5E265D1E421CEFC39CAE626C5CA2F058997B128CFE10D0F350
26,054,388 UART: Caliptra RT
26,055,417 UART: [state] CFI Enabled
26,221,114 UART: [rt] RT listening for mailbox commands...
26,253,726 UART: [rt]cmd =0x44504543, len=136
30,472,922 >>> mbox cmd response data (136 bytes)
30,474,845 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,504,703 UART: [rt]cmd =0x4453424c, len=4
32,971,066 >>> mbox cmd response data (8 bytes)
32,971,641 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,001,865 UART: [rt]cmd =0x44504543, len=92
37,357,240 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,417,505 ready_for_fw is high
3,417,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,726,184 >>> mbox cmd response: success
14,727,078 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,021,347 UART:
19,021,745 UART: Running Caliptra FMC ...
19,023,054 UART:
19,023,232 UART: [state] CFI Enabled
19,086,503 UART: [fht] FMC Alias Private Key: 7
20,850,378 UART: [art] Extend RT PCRs Done
20,851,588 UART: [art] Lock RT PCRs Done
20,853,391 UART: [art] Populate DV Done
20,858,638 UART: [fht] FMC Alias Private Key: 7
20,860,122 UART: [art] Derive CDI
20,860,883 UART: [art] Store in in slot 0x4
20,919,362 UART: [art] Derive Key Pair
20,920,395 UART: [art] Store priv key in slot 0x5
23,383,144 UART: [art] Derive Key Pair - Done
23,396,302 UART: [art] Signing Cert with AUTHO
23,397,605 UART: RITY.KEYID = 7
25,109,283 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,792 UART: [art] PUB.X = 580E41F9A002310053DBAEA5987DC470D22DF56693C0B9173674DA0AAE5ECB2EEE6E11DED65C78743766138E0C65EA5D
25,118,037 UART: [art] PUB.Y = 8314645348F9F090A15CFA34DF1645846C3065A9211D74B70BDDAB85FDDBEA9E57CDFC757DF0FD82DBE3E0C9FCEBF3D4
25,125,326 UART: [art] SIG.R = 096FDE90A9FDD07106CB2CC441C934A8246C715F61882AF18C5DEF8716DE233D7439D17E19F8596EFE44CA39CC01EBAF
25,132,727 UART: [art] SIG.S = CB323E4CA284768BC178F4CE188194D9E5E08E404C23F0EB6327AF9A36785D93B8FEDE90BE13B7A065B275849FE0A557
26,111,786 UART: Caliptra RT
26,112,471 UART: [state] CFI Enabled
26,276,320 UART: [rt] RT listening for mailbox commands...
26,308,649 UART: [rt]cmd =0x44504543, len=136
30,526,749 >>> mbox cmd response data (136 bytes)
30,528,030 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,557,779 UART: [rt]cmd =0x4453424c, len=4
33,023,288 >>> mbox cmd response data (8 bytes)
33,023,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,054,234 UART: [rt]cmd =0x44504543, len=92
37,410,261 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,414 UART:
192,800 UART: Running Caliptra ROM ...
193,908 UART:
603,762 UART: [state] CFI Enabled
616,911 UART: [state] LifecycleState = Unprovisioned
619,312 UART: [state] DebugLocked = No
621,992 UART: [state] WD Timer not started. Device not locked for debugging
627,444 UART: [kat] SHA2-256
817,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,078 UART: [kat] ++
828,794 UART: [kat] sha1
839,530 UART: [kat] SHA2-256
842,618 UART: [kat] SHA2-384
850,167 UART: [kat] SHA2-512-ACC
852,762 UART: [kat] ECC-384
3,294,642 UART: [kat] HMAC-384Kdf
3,308,295 UART: [kat] LMS
3,840,109 UART: [kat] --
3,846,043 UART: [cold-reset] ++
3,847,123 UART: [fht] FHT @ 0x50003400
3,859,298 UART: [idev] ++
3,860,005 UART: [idev] CDI.KEYID = 6
3,861,036 UART: [idev] SUBJECT.KEYID = 7
3,862,129 UART: [idev] UDS.KEYID = 0
3,863,171 ready_for_fw is high
3,863,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,195 UART: [idev] Erasing UDS.KEYID = 0
6,345,800 UART: [idev] Sha1 KeyId Algorithm
6,368,804 UART: [idev] --
6,374,334 UART: [ldev] ++
6,375,032 UART: [ldev] CDI.KEYID = 6
6,375,911 UART: [ldev] SUBJECT.KEYID = 5
6,377,117 UART: [ldev] AUTHORITY.KEYID = 7
6,378,288 UART: [ldev] FE.KEYID = 1
6,388,617 UART: [ldev] Erasing FE.KEYID = 1
8,864,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,164 UART: [ldev] --
10,659,118 UART: [fwproc] Wait for Commands...
10,661,091 UART: [fwproc] Recv command 0x46574c44
10,663,389 UART: [fwproc] Recv'd Img size: 114448 bytes
14,112,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,801 >>> mbox cmd response: success
14,848,356 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,851,848 UART: [afmc] ++
14,852,539 UART: [afmc] CDI.KEYID = 6
14,853,692 UART: [afmc] SUBJECT.KEYID = 7
14,855,225 UART: [afmc] AUTHORITY.KEYID = 5
17,360,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,458 UART: [afmc] --
19,159,029 UART: [cold-reset] --
19,163,649 UART: [state] Locking Datavault
19,169,240 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,436 UART: [state] Locking ICCM
19,172,936 UART: [exit] Launching FMC @ 0x40000130
19,181,606 UART:
19,181,835 UART: Running Caliptra FMC ...
19,182,926 UART:
19,183,077 UART: [state] CFI Enabled
19,190,958 UART: [fht] FMC Alias Private Key: 7
20,947,706 UART: [art] Extend RT PCRs Done
20,948,918 UART: [art] Lock RT PCRs Done
20,950,583 UART: [art] Populate DV Done
20,955,774 UART: [fht] FMC Alias Private Key: 7
20,957,307 UART: [art] Derive CDI
20,958,061 UART: [art] Store in in slot 0x4
21,001,188 UART: [art] Derive Key Pair
21,002,219 UART: [art] Store priv key in slot 0x5
23,428,747 UART: [art] Derive Key Pair - Done
23,441,521 UART: [art] Signing Cert with AUTHO
23,442,810 UART: RITY.KEYID = 7
25,148,081 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,725 UART: [art] PUB.X = 43900F429A0B182984F97433296B9404E0898334D11769EABA0A5860C4095460DF19DA25E6AA7BE14B9E1002D41C360B
25,156,856 UART: [art] PUB.Y = AFD09D1D78ED1FABB26E71BA91C4B8239581EDFDE3551CDDF6CBD5B7B2FCC968572059F1884A13634AA33167AA4CC3E8
25,164,128 UART: [art] SIG.R = A48FAE5F727778B989ECC234F3EF5B35800687C509B8ECA409E1B69777BC1326A2496915C9D57B82D0CBD43E37480FB2
25,171,513 UART: [art] SIG.S = 6058557EB3D668F31AC105FFA5CF88B94BF1D68E0F22B2231F4233A71DB4F0138CD82E5A1D1E26779A8B09DF18A932AA
26,150,625 UART: Caliptra RT
26,151,328 UART: [state] CFI Enabled
26,268,765 UART: [rt] RT listening for mailbox commands...
26,301,066 UART: [rt]cmd =0x44504543, len=136
30,471,433 >>> mbox cmd response data (136 bytes)
30,472,739 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,502,418 UART: [rt]cmd =0x4453424c, len=4
32,929,331 >>> mbox cmd response data (8 bytes)
32,929,856 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,960,280 UART: [rt]cmd =0x44504543, len=92
37,244,481 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,757,225 ready_for_fw is high
3,757,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,975,029 >>> mbox cmd response: success
14,975,811 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,226,053 UART:
19,226,446 UART: Running Caliptra FMC ...
19,227,636 UART:
19,227,792 UART: [state] CFI Enabled
19,235,601 UART: [fht] FMC Alias Private Key: 7
20,992,855 UART: [art] Extend RT PCRs Done
20,994,061 UART: [art] Lock RT PCRs Done
20,995,468 UART: [art] Populate DV Done
21,000,931 UART: [fht] FMC Alias Private Key: 7
21,002,635 UART: [art] Derive CDI
21,003,455 UART: [art] Store in in slot 0x4
21,045,549 UART: [art] Derive Key Pair
21,046,621 UART: [art] Store priv key in slot 0x5
23,473,291 UART: [art] Derive Key Pair - Done
23,486,125 UART: [art] Signing Cert with AUTHO
23,487,417 UART: RITY.KEYID = 7
25,193,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,607 UART: [art] PUB.X = C9BF20C9941239C6AB1F2AE812495F8375136069CF66247ADAC63F5A29D631CAB0355F3CAF973C3193C5BE4B27FC597B
25,201,903 UART: [art] PUB.Y = F962A20A2B88C85A1BB62752274225361CE0EB7365E86B2F9A2731D702119039AE0D0F52C87486D0B090AF6E23330895
25,209,148 UART: [art] SIG.R = D87A137C5FA275817FEF90DC81AD0D75F09B0F221E98FC10D17B3964653DC5D2B7C3B7EFFE95787CA5705BAF0BEFF283
25,216,530 UART: [art] SIG.S = E83A682A1963A4C4468BF97E20B1D20B32CC2593492DB84D82360E83C565726E36C7B6744378AAA2FCF460F5FDF75322
26,195,817 UART: Caliptra RT
26,196,507 UART: [state] CFI Enabled
26,314,288 UART: [rt] RT listening for mailbox commands...
26,346,454 UART: [rt]cmd =0x44504543, len=136
30,514,910 >>> mbox cmd response data (136 bytes)
30,516,201 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,546,118 UART: [rt]cmd =0x4453424c, len=4
32,973,895 >>> mbox cmd response data (8 bytes)
32,974,399 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,004,978 UART: [rt]cmd =0x44504543, len=92
37,289,194 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,327 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 ready_for_fw is high
1,480,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,504,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,772 UART: [idev] --
1,513,759 UART: [ldev] ++
1,513,927 UART: [ldev] CDI.KEYID = 6
1,514,290 UART: [ldev] SUBJECT.KEYID = 5
1,514,716 UART: [ldev] AUTHORITY.KEYID = 7
1,515,179 UART: [ldev] FE.KEYID = 1
1,520,215 UART: [ldev] Erasing FE.KEYID = 1
1,545,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,062 UART: [ldev] --
1,584,435 UART: [fwproc] Waiting for Commands...
1,585,172 UART: [fwproc] Received command 0x46574c44
1,585,963 UART: [fwproc] Received Image of size 114448 bytes
2,885,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,187 >>> mbox cmd response: success
3,078,187 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,315 UART: [afmc] ++
3,079,483 UART: [afmc] CDI.KEYID = 6
3,079,845 UART: [afmc] SUBJECT.KEYID = 7
3,080,270 UART: [afmc] AUTHORITY.KEYID = 5
3,114,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,943 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,556 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,246 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,349 UART: [afmc] --
3,158,279 UART: [cold-reset] --
3,159,295 UART: [state] Locking Datavault
3,160,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,282 UART: [state] Locking ICCM
3,161,864 UART: [exit] Launching FMC @ 0x40000130
3,167,193 UART:
3,167,209 UART: Running Caliptra FMC ...
3,167,617 UART:
3,167,671 UART: [state] CFI Enabled
3,177,918 UART: [fht] FMC Alias Private Key: 7
3,286,189 UART: [art] Extend RT PCRs Done
3,286,617 UART: [art] Lock RT PCRs Done
3,288,183 UART: [art] Populate DV Done
3,296,274 UART: [fht] FMC Alias Private Key: 7
3,297,218 UART: [art] Derive CDI
3,297,498 UART: [art] Store in in slot 0x4
3,382,997 UART: [art] Derive Key Pair
3,383,357 UART: [art] Store priv key in slot 0x5
3,396,457 UART: [art] Derive Key Pair - Done
3,411,182 UART: [art] Signing Cert with AUTHO
3,411,662 UART: RITY.KEYID = 7
3,427,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,839 UART: [art] PUB.X = D6F86E889DE9E3CF0F4F35E8512A644845D2EEA6C721E8C9B9F1E103F30EFC04B00C4E5117AD51D2247DBAE76AB80799
3,434,605 UART: [art] PUB.Y = 9586C2E111C9D7D3AC703FD80A5AB74DFB3991C629E5759C162EFE2B0BAA2BC0E020B116E8ECA4C39FF42A8D0CCB4C64
3,441,568 UART: [art] SIG.R = 4FA310A57B1FACEBA957B1C95E44C317D0658A3564D49EC24801EF91DA910063CDD42DB504C990A4CDD2086BB9C2F3B3
3,448,321 UART: [art] SIG.S = 91F6BB4F4924CD60F64F75B672F2859B589A963EFBB1A4966342D7B2B6A0C72DC9A8E050D00C0E4C95583144F46F762E
3,471,836 UART: Caliptra RT
3,472,089 UART: [state] CFI Enabled
3,580,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,880 UART: [rt]cmd =0x44504543, len=136
3,674,401 >>> mbox cmd response data (136 bytes)
3,674,402 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,879 UART: [rt]cmd =0x4453424c, len=4
3,717,093 >>> mbox cmd response data (8 bytes)
3,717,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,257 UART: [rt]cmd =0x44504543, len=92
3,929,628 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,581 ready_for_fw is high
1,361,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,705 >>> mbox cmd response: success
2,926,705 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,281 UART:
2,988,297 UART: Running Caliptra FMC ...
2,988,705 UART:
2,988,759 UART: [state] CFI Enabled
2,999,362 UART: [fht] FMC Alias Private Key: 7
3,107,105 UART: [art] Extend RT PCRs Done
3,107,533 UART: [art] Lock RT PCRs Done
3,108,915 UART: [art] Populate DV Done
3,117,390 UART: [fht] FMC Alias Private Key: 7
3,118,352 UART: [art] Derive CDI
3,118,632 UART: [art] Store in in slot 0x4
3,204,629 UART: [art] Derive Key Pair
3,204,989 UART: [art] Store priv key in slot 0x5
3,218,433 UART: [art] Derive Key Pair - Done
3,233,030 UART: [art] Signing Cert with AUTHO
3,233,510 UART: RITY.KEYID = 7
3,248,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,191 UART: [art] PUB.X = 995801E074E14C65C899EE0521A28C12991EDB922056EB03AA5E72C36AECA2F31C8BEBBA839381B0F7DD72D181DE9C05
3,255,959 UART: [art] PUB.Y = 5472403AC7A894C12FFDC8F69E97557340348AF0E4D82A329A1074789877A8C626AD7C7359D2909CC12B2D9733BAFE7F
3,262,909 UART: [art] SIG.R = B7D0B4B4C78CA8D2BA6AD06F9AAD6EB0C6BCF28589DA81F80F52F23BBF63D94E99B5157884F9D876FCEF786C78DF5692
3,269,698 UART: [art] SIG.S = 6DD5A4C440DFF90E1F5396174A721B1EFE91479440B68740360F5E3E7D063CB88CE8FA8FC38DCEF4BFAB5711678A928E
3,293,564 UART: Caliptra RT
3,293,817 UART: [state] CFI Enabled
3,402,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,394 UART: [rt]cmd =0x44504543, len=136
3,495,867 >>> mbox cmd response data (136 bytes)
3,495,868 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,107 UART: [rt]cmd =0x4453424c, len=4
3,538,739 >>> mbox cmd response data (8 bytes)
3,538,740 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,327 UART: [rt]cmd =0x44504543, len=92
3,751,148 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,344 UART: [fht] Storing FHT @ 0x50003400
1,480,025 UART: [idev] ++
1,480,193 UART: [idev] CDI.KEYID = 6
1,480,553 UART: [idev] SUBJECT.KEYID = 7
1,480,977 UART: [idev] UDS.KEYID = 0
1,481,322 ready_for_fw is high
1,481,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,109 UART: [idev] Erasing UDS.KEYID = 0
1,506,131 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,700 UART: [ldev] ++
1,515,868 UART: [ldev] CDI.KEYID = 6
1,516,231 UART: [ldev] SUBJECT.KEYID = 5
1,516,657 UART: [ldev] AUTHORITY.KEYID = 7
1,517,120 UART: [ldev] FE.KEYID = 1
1,522,560 UART: [ldev] Erasing FE.KEYID = 1
1,547,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,759 UART: [ldev] --
1,587,194 UART: [fwproc] Waiting for Commands...
1,587,865 UART: [fwproc] Received command 0x46574c44
1,588,656 UART: [fwproc] Received Image of size 114448 bytes
2,889,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,018 >>> mbox cmd response: success
3,082,018 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,083,146 UART: [afmc] ++
3,083,314 UART: [afmc] CDI.KEYID = 6
3,083,676 UART: [afmc] SUBJECT.KEYID = 7
3,084,101 UART: [afmc] AUTHORITY.KEYID = 5
3,119,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,333 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,023 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,010 UART: [afmc] --
3,163,136 UART: [cold-reset] --
3,164,034 UART: [state] Locking Datavault
3,165,381 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,985 UART: [state] Locking ICCM
3,166,619 UART: [exit] Launching FMC @ 0x40000130
3,171,948 UART:
3,171,964 UART: Running Caliptra FMC ...
3,172,372 UART:
3,172,515 UART: [state] CFI Enabled
3,183,248 UART: [fht] FMC Alias Private Key: 7
3,291,005 UART: [art] Extend RT PCRs Done
3,291,433 UART: [art] Lock RT PCRs Done
3,292,933 UART: [art] Populate DV Done
3,301,062 UART: [fht] FMC Alias Private Key: 7
3,302,028 UART: [art] Derive CDI
3,302,308 UART: [art] Store in in slot 0x4
3,387,771 UART: [art] Derive Key Pair
3,388,131 UART: [art] Store priv key in slot 0x5
3,401,465 UART: [art] Derive Key Pair - Done
3,416,177 UART: [art] Signing Cert with AUTHO
3,416,657 UART: RITY.KEYID = 7
3,431,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,542 UART: [art] PUB.X = 43B023AE432544FA8DF3A4483E963335971CD526186E28C84F86B247354ECF34550D437808AC474EF33AC05EA4E1E317
3,439,302 UART: [art] PUB.Y = 4976D470D5104A46E83EB4AA095D7243DAC434034B670D58480C3A3FB3604959A5766C9ECEEEEBAA8F0CBFEA75DC0274
3,446,246 UART: [art] SIG.R = BEBFD39BF67C56584F19F3D5F0A0C61CAB5AAFF8B36CCE527E86DF4840E23486A839720D336086A9EB4E0FF75D9ADA56
3,453,030 UART: [art] SIG.S = 7DB6DD3FB52F0D7098C29DB04C3342F8DDA331E3E0A4A0B7DD1A468CDC64FC00821851BEFE679B4EF318A74447C5E3C4
3,476,720 UART: Caliptra RT
3,477,065 UART: [state] CFI Enabled
3,585,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,380 UART: [rt]cmd =0x44504543, len=136
3,681,617 >>> mbox cmd response data (136 bytes)
3,681,618 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,265 UART: [rt]cmd =0x4453424c, len=4
3,724,609 >>> mbox cmd response data (8 bytes)
3,724,610 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,601 UART: [rt]cmd =0x44504543, len=92
3,938,171 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 ready_for_fw is high
1,362,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,824 >>> mbox cmd response: success
2,930,824 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,992,128 UART:
2,992,144 UART: Running Caliptra FMC ...
2,992,552 UART:
2,992,695 UART: [state] CFI Enabled
3,003,396 UART: [fht] FMC Alias Private Key: 7
3,111,581 UART: [art] Extend RT PCRs Done
3,112,009 UART: [art] Lock RT PCRs Done
3,113,765 UART: [art] Populate DV Done
3,121,728 UART: [fht] FMC Alias Private Key: 7
3,122,736 UART: [art] Derive CDI
3,123,016 UART: [art] Store in in slot 0x4
3,209,085 UART: [art] Derive Key Pair
3,209,445 UART: [art] Store priv key in slot 0x5
3,222,017 UART: [art] Derive Key Pair - Done
3,237,061 UART: [art] Signing Cert with AUTHO
3,237,541 UART: RITY.KEYID = 7
3,252,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,666 UART: [art] PUB.X = 33894B7D1132C9A24B6288742F5FB79F5DA753FB2C0EE95831BCEE7922B9CC7F3540309A5E84DE741F6D7CF058D5D0FC
3,260,443 UART: [art] PUB.Y = B1B6E396A9ECE13FC7BD7DC825FA893CD14DD5036E30AD4A96872B213CE482D2B62370F38A3D183DDBE1E0BA9FAC165A
3,267,412 UART: [art] SIG.R = 6566E57390F9D7B321A89BE55B7945B1E9AFC24F3B692F3A328FFC47DE7C445AF440C0852777195171912B60185FDF3D
3,274,182 UART: [art] SIG.S = B4585CE0F16DE7F1950B4C55B68ED4ABCCD436015775C4E5985EEFDF63D23093B278637456C1147723CEE17DAB2D111D
3,297,417 UART: Caliptra RT
3,297,762 UART: [state] CFI Enabled
3,406,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,769 UART: [rt]cmd =0x44504543, len=136
3,501,726 >>> mbox cmd response data (136 bytes)
3,501,727 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,854 UART: [rt]cmd =0x4453424c, len=4
3,544,838 >>> mbox cmd response data (8 bytes)
3,544,839 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,706 UART: [rt]cmd =0x44504543, len=92
3,757,917 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,714 UART: [kat] SHA2-512-ACC
908,615 UART: [kat] ECC-384
918,014 UART: [kat] HMAC-384Kdf
922,542 UART: [kat] LMS
1,170,870 UART: [kat] --
1,171,785 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,862 UART: [idev] ++
1,175,030 UART: [idev] CDI.KEYID = 6
1,175,390 UART: [idev] SUBJECT.KEYID = 7
1,175,814 UART: [idev] UDS.KEYID = 0
1,176,159 ready_for_fw is high
1,176,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,784 UART: [idev] Erasing UDS.KEYID = 0
1,200,433 UART: [idev] Sha1 KeyId Algorithm
1,208,923 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,350 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,380 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,764 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,700 >>> mbox cmd response: success
2,775,700 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,808 UART: [afmc] ++
2,776,976 UART: [afmc] CDI.KEYID = 6
2,777,338 UART: [afmc] SUBJECT.KEYID = 7
2,777,763 UART: [afmc] AUTHORITY.KEYID = 5
2,812,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,088 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,629 UART: [afmc] --
2,856,679 UART: [cold-reset] --
2,857,673 UART: [state] Locking Datavault
2,858,650 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,254 UART: [state] Locking ICCM
2,859,858 UART: [exit] Launching FMC @ 0x40000130
2,865,187 UART:
2,865,203 UART: Running Caliptra FMC ...
2,865,611 UART:
2,865,665 UART: [state] CFI Enabled
2,876,048 UART: [fht] FMC Alias Private Key: 7
2,983,537 UART: [art] Extend RT PCRs Done
2,983,965 UART: [art] Lock RT PCRs Done
2,985,759 UART: [art] Populate DV Done
2,993,686 UART: [fht] FMC Alias Private Key: 7
2,994,866 UART: [art] Derive CDI
2,995,146 UART: [art] Store in in slot 0x4
3,080,521 UART: [art] Derive Key Pair
3,080,881 UART: [art] Store priv key in slot 0x5
3,094,255 UART: [art] Derive Key Pair - Done
3,108,895 UART: [art] Signing Cert with AUTHO
3,109,375 UART: RITY.KEYID = 7
3,124,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,212 UART: [art] PUB.X = 4FCD38C8DC4F46915315CB1FFC127CE3B068F4DAAF939B75E55BE10795A4F55171FB21B57E0C20392B3A6B068F4F3CB4
3,131,987 UART: [art] PUB.Y = 717BA46E3CD84518BB2EEEBBCDC291989D529A0D693B5CCEADDAEF8195DEA2B51D7EBB15A269D2344602C8C91D3A5018
3,138,953 UART: [art] SIG.R = 5802B66CC5FDA45FE185487A20C390E83D17865C46BDAC97D041885C23240FFA4858C394C5D56A48C2DD8C8E8CD749AA
3,145,725 UART: [art] SIG.S = 8DD184D49EE579AA04BCAD79743F24F84A5F124FE41BE07C04A93670ED77883C7624ADE2D39AD1F1C7635494CE6D60F1
3,169,194 UART: Caliptra RT
3,169,447 UART: [state] CFI Enabled
3,277,358 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,796 UART: [rt]cmd =0x44504543, len=136
3,371,927 >>> mbox cmd response data (136 bytes)
3,371,928 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,141 UART: [rt]cmd =0x4453424c, len=4
3,414,801 >>> mbox cmd response data (8 bytes)
3,414,802 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,711 UART: [rt]cmd =0x44504543, len=92
3,627,847 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,043 ready_for_fw is high
1,061,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,061 >>> mbox cmd response: success
2,630,061 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,691,893 UART:
2,691,909 UART: Running Caliptra FMC ...
2,692,317 UART:
2,692,371 UART: [state] CFI Enabled
2,702,896 UART: [fht] FMC Alias Private Key: 7
2,810,533 UART: [art] Extend RT PCRs Done
2,810,961 UART: [art] Lock RT PCRs Done
2,812,493 UART: [art] Populate DV Done
2,820,712 UART: [fht] FMC Alias Private Key: 7
2,821,866 UART: [art] Derive CDI
2,822,146 UART: [art] Store in in slot 0x4
2,907,425 UART: [art] Derive Key Pair
2,907,785 UART: [art] Store priv key in slot 0x5
2,920,935 UART: [art] Derive Key Pair - Done
2,935,591 UART: [art] Signing Cert with AUTHO
2,936,071 UART: RITY.KEYID = 7
2,951,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,422 UART: [art] PUB.X = 1F8C85AA5F0D45381068F9C0F56E7EAC168AB09B8400647CAC8FB4AF020C802BCA48218938BC4B555BFF825B2FBA5FB8
2,959,177 UART: [art] PUB.Y = CCD80F2820474C939EEFB050EFC7A30822A39B4FA9FACCF8374699D5B3FD5C036CCBE86D02593C2146C7F013D87DBD0D
2,966,130 UART: [art] SIG.R = C4EC48B5A931FFD588BC0691FF1A42E609D8D5693C822B7BF62CFCDD1CFB81CC7FB5FB56734A480EAFDB0B29713E0D43
2,972,909 UART: [art] SIG.S = FE8CA40F5B3DEBF12AA7073BBA8A31D19ECA762C0426C090D1618D0A7E03C13E9FD90CB25D82A5B7F1FD92B1D37ADEBE
2,996,218 UART: Caliptra RT
2,996,471 UART: [state] CFI Enabled
3,104,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,833 UART: [rt]cmd =0x44504543, len=136
3,199,880 >>> mbox cmd response data (136 bytes)
3,199,881 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,254 UART: [rt]cmd =0x4453424c, len=4
3,243,192 >>> mbox cmd response data (8 bytes)
3,243,193 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,334 UART: [rt]cmd =0x44504543, len=92
3,457,038 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,422 UART: [kat] SHA2-256
904,362 UART: [kat] SHA2-384
907,085 UART: [kat] SHA2-512-ACC
908,986 UART: [kat] ECC-384
918,841 UART: [kat] HMAC-384Kdf
923,559 UART: [kat] LMS
1,171,887 UART: [kat] --
1,172,932 UART: [cold-reset] ++
1,173,298 UART: [fht] FHT @ 0x50003400
1,176,055 UART: [idev] ++
1,176,223 UART: [idev] CDI.KEYID = 6
1,176,583 UART: [idev] SUBJECT.KEYID = 7
1,177,007 UART: [idev] UDS.KEYID = 0
1,177,352 ready_for_fw is high
1,177,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,535 UART: [idev] Erasing UDS.KEYID = 0
1,201,774 UART: [idev] Sha1 KeyId Algorithm
1,210,142 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,020 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,747 UART: [fwproc] Wait for Commands...
1,284,405 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,673 >>> mbox cmd response: success
2,776,673 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,777,785 UART: [afmc] ++
2,777,953 UART: [afmc] CDI.KEYID = 6
2,778,315 UART: [afmc] SUBJECT.KEYID = 7
2,778,740 UART: [afmc] AUTHORITY.KEYID = 5
2,813,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,134 UART: [afmc] --
2,857,248 UART: [cold-reset] --
2,858,040 UART: [state] Locking Datavault
2,859,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,789 UART: [state] Locking ICCM
2,860,247 UART: [exit] Launching FMC @ 0x40000130
2,865,576 UART:
2,865,592 UART: Running Caliptra FMC ...
2,866,000 UART:
2,866,143 UART: [state] CFI Enabled
2,876,764 UART: [fht] FMC Alias Private Key: 7
2,984,703 UART: [art] Extend RT PCRs Done
2,985,131 UART: [art] Lock RT PCRs Done
2,986,425 UART: [art] Populate DV Done
2,994,698 UART: [fht] FMC Alias Private Key: 7
2,995,712 UART: [art] Derive CDI
2,995,992 UART: [art] Store in in slot 0x4
3,081,643 UART: [art] Derive Key Pair
3,082,003 UART: [art] Store priv key in slot 0x5
3,095,339 UART: [art] Derive Key Pair - Done
3,109,962 UART: [art] Signing Cert with AUTHO
3,110,442 UART: RITY.KEYID = 7
3,125,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,289 UART: [art] PUB.X = 159E62144F49C1984C2626A9FFC2BB02F922DB6EEE2B5DB5BEE51EE1530A9E7EEC4FB848EC8C1DAE41AC948086850B83
3,133,068 UART: [art] PUB.Y = BEFDC37113B5EB91B8CF845D993A7D770CCE0FA31888DEFF95FDE91C7678ADA1D69024FB9396A15FA7B5E83CE9283F7D
3,140,034 UART: [art] SIG.R = B12D4F90ACC5EE8F0D332108C06DA63BBA65E3C81BD2EF9132CB29158C7B4CC3107406EF260EE13A395332B29704C769
3,146,797 UART: [art] SIG.S = C418A2AE449B688855A10BCBCD3569DA974C20DED283BBBC770C7A16EF65A99D95BDFA5A363D4E0C90276FD0CFBFF1D1
3,170,959 UART: Caliptra RT
3,171,304 UART: [state] CFI Enabled
3,280,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,702 UART: [rt]cmd =0x44504543, len=136
3,376,283 >>> mbox cmd response data (136 bytes)
3,376,284 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,703 UART: [rt]cmd =0x4453424c, len=4
3,419,391 >>> mbox cmd response data (8 bytes)
3,419,392 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,235 UART: [rt]cmd =0x44504543, len=92
3,632,251 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,472 ready_for_fw is high
1,060,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,414 >>> mbox cmd response: success
2,628,414 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,690,924 UART:
2,690,940 UART: Running Caliptra FMC ...
2,691,348 UART:
2,691,491 UART: [state] CFI Enabled
2,702,206 UART: [fht] FMC Alias Private Key: 7
2,809,793 UART: [art] Extend RT PCRs Done
2,810,221 UART: [art] Lock RT PCRs Done
2,811,697 UART: [art] Populate DV Done
2,819,858 UART: [fht] FMC Alias Private Key: 7
2,820,808 UART: [art] Derive CDI
2,821,088 UART: [art] Store in in slot 0x4
2,906,851 UART: [art] Derive Key Pair
2,907,211 UART: [art] Store priv key in slot 0x5
2,920,351 UART: [art] Derive Key Pair - Done
2,935,220 UART: [art] Signing Cert with AUTHO
2,935,700 UART: RITY.KEYID = 7
2,951,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,897 UART: [art] PUB.X = ACF16F6F8B2DE887CA4715455E1AC0A313A8D9299E847388DB16E4FAF8E9A95289E19A2D173D47419E81A0BBD1CD522A
2,958,679 UART: [art] PUB.Y = 8298E4A8B97C458D715ED037CED6967EBCEAD3A8570C8C119D5DAEF96E5AD184DC2BFAD1E72A2786040E33C604B8FF10
2,965,635 UART: [art] SIG.R = FB1AAD8E07CD177979C3F558017264DE1A2AA6480F5297221D693ADF9235AAF4E1BF349D016C894086C24608D3E62F01
2,972,389 UART: [art] SIG.S = 411E93519EEF2D6B23F523D02738AC798C4C2F64DAA8BDF904F5AE5EB57F22A3242E9EACC0C35FA5B0616945DFEA7311
2,996,423 UART: Caliptra RT
2,996,768 UART: [state] CFI Enabled
3,105,883 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,313 UART: [rt]cmd =0x44504543, len=136
3,201,420 >>> mbox cmd response data (136 bytes)
3,201,421 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,880 UART: [rt]cmd =0x4453424c, len=4
3,244,718 >>> mbox cmd response data (8 bytes)
3,244,719 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,534 UART: [rt]cmd =0x44504543, len=92
3,457,380 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
903,892 UART: [kat] SHA2-512-ACC
905,793 UART: [kat] ECC-384
915,220 UART: [kat] HMAC-384Kdf
919,900 UART: [kat] LMS
1,168,212 UART: [kat] --
1,169,123 UART: [cold-reset] ++
1,169,613 UART: [fht] FHT @ 0x50003400
1,172,211 UART: [idev] ++
1,172,379 UART: [idev] CDI.KEYID = 6
1,172,740 UART: [idev] SUBJECT.KEYID = 7
1,173,165 UART: [idev] UDS.KEYID = 0
1,173,511 ready_for_fw is high
1,173,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,197 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,132 UART: [fwproc] Wait for Commands...
1,280,755 UART: [fwproc] Recv command 0x46574c44
1,281,488 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,358 >>> mbox cmd response: success
2,773,358 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,423 UART: [afmc] ++
2,774,591 UART: [afmc] CDI.KEYID = 6
2,774,954 UART: [afmc] SUBJECT.KEYID = 7
2,775,380 UART: [afmc] AUTHORITY.KEYID = 5
2,810,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,244 UART: [afmc] --
2,854,160 UART: [cold-reset] --
2,854,922 UART: [state] Locking Datavault
2,856,105 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,709 UART: [state] Locking ICCM
2,857,339 UART: [exit] Launching FMC @ 0x40000130
2,862,668 UART:
2,862,684 UART: Running Caliptra FMC ...
2,863,092 UART:
2,863,146 UART: [state] CFI Enabled
2,873,731 UART: [fht] FMC Alias Private Key: 7
2,981,942 UART: [art] Extend RT PCRs Done
2,982,370 UART: [art] Lock RT PCRs Done
2,983,684 UART: [art] Populate DV Done
2,992,111 UART: [fht] FMC Alias Private Key: 7
2,993,249 UART: [art] Derive CDI
2,993,529 UART: [art] Store in in slot 0x4
3,078,936 UART: [art] Derive Key Pair
3,079,296 UART: [art] Store priv key in slot 0x5
3,092,780 UART: [art] Derive Key Pair - Done
3,107,411 UART: [art] Signing Cert with AUTHO
3,107,891 UART: RITY.KEYID = 7
3,122,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,554 UART: [art] PUB.X = 6DA7D2AC002B918694908159451F6DE902BF0E9CF7331F500082C6834848DB630A2F7F8AEBCE6F3E31C1E80552D0688A
3,130,270 UART: [art] PUB.Y = DC81CCBBCBE57E908AF888D89CDDA936F625C3F16DF574CDDA913BD58961F085E7CC2A9B9D2BD9ECE8F9B3982FCBA555
3,137,250 UART: [art] SIG.R = 0D346E4D16E03D0D84EC021EC4019395B013C29E00A9C86AB7CB112BD4C6ED4B96FB274B12AE074D920F76603C8D579A
3,143,988 UART: [art] SIG.S = 56734EE655E0A4AAB0C3A0F5410C4B0A1597B78955777C11F89B95B2391552B8A928B7EA5626997046FDFA805AC3F96E
3,167,767 UART: Caliptra RT
3,168,020 UART: [state] CFI Enabled
3,275,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,039 UART: [rt]cmd =0x44504543, len=136
3,369,758 >>> mbox cmd response data (136 bytes)
3,369,759 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,970 UART: [rt]cmd =0x4453424c, len=4
3,412,234 >>> mbox cmd response data (8 bytes)
3,412,235 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,128 UART: [rt]cmd =0x44504543, len=92
3,626,120 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,202 ready_for_fw is high
1,056,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,286 >>> mbox cmd response: success
2,624,286 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,685,982 UART:
2,685,998 UART: Running Caliptra FMC ...
2,686,406 UART:
2,686,460 UART: [state] CFI Enabled
2,697,045 UART: [fht] FMC Alias Private Key: 7
2,805,184 UART: [art] Extend RT PCRs Done
2,805,612 UART: [art] Lock RT PCRs Done
2,807,164 UART: [art] Populate DV Done
2,815,217 UART: [fht] FMC Alias Private Key: 7
2,816,281 UART: [art] Derive CDI
2,816,561 UART: [art] Store in in slot 0x4
2,902,140 UART: [art] Derive Key Pair
2,902,500 UART: [art] Store priv key in slot 0x5
2,916,038 UART: [art] Derive Key Pair - Done
2,930,907 UART: [art] Signing Cert with AUTHO
2,931,387 UART: RITY.KEYID = 7
2,946,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,526 UART: [art] PUB.X = 666AB703C7499C8F0190A02422F2D10995BD0829F492293639E33A6FD6C8E1AC1628DA81CF4C3FE7EAAB8C8ED6959282
2,954,288 UART: [art] PUB.Y = 34DC3570EDD19DE18B2C87C445A5948CE8C316C56C278EF09EF54D0ECDAFEBF9CF0D082E0AE3541E93B088B321DFDBD2
2,961,250 UART: [art] SIG.R = 9D8FC58030822F5E24D4102EC5889C2209D665CB20A1A19FFF9FA1B68AC77CDA9FC91CFD9D315F05227D5D59706D1BB4
2,968,026 UART: [art] SIG.S = 6B28B0B4068446668B8EBE95E3AF52374E0B0D04866256C52541AA625802AE02A1FE18D9773D9ADA2F839D59D015E4B6
2,991,659 UART: Caliptra RT
2,991,912 UART: [state] CFI Enabled
3,099,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,049 UART: [rt]cmd =0x44504543, len=136
3,193,846 >>> mbox cmd response data (136 bytes)
3,193,847 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,358 UART: [rt]cmd =0x4453424c, len=4
3,236,990 >>> mbox cmd response data (8 bytes)
3,236,991 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,267,088 UART: [rt]cmd =0x44504543, len=92
3,449,867 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,174,278 ready_for_fw is high
1,174,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,482 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,995 UART: [ldev] --
1,282,477 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,887 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,777 >>> mbox cmd response: success
2,774,777 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,860 UART: [afmc] ++
2,776,028 UART: [afmc] CDI.KEYID = 6
2,776,391 UART: [afmc] SUBJECT.KEYID = 7
2,776,817 UART: [afmc] AUTHORITY.KEYID = 5
2,811,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,657 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,163 UART: [afmc] --
2,855,205 UART: [cold-reset] --
2,856,065 UART: [state] Locking Datavault
2,857,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,844 UART: [state] Locking ICCM
2,858,350 UART: [exit] Launching FMC @ 0x40000130
2,863,679 UART:
2,863,695 UART: Running Caliptra FMC ...
2,864,103 UART:
2,864,246 UART: [state] CFI Enabled
2,875,087 UART: [fht] FMC Alias Private Key: 7
2,983,474 UART: [art] Extend RT PCRs Done
2,983,902 UART: [art] Lock RT PCRs Done
2,985,610 UART: [art] Populate DV Done
2,993,869 UART: [fht] FMC Alias Private Key: 7
2,994,949 UART: [art] Derive CDI
2,995,229 UART: [art] Store in in slot 0x4
3,080,806 UART: [art] Derive Key Pair
3,081,166 UART: [art] Store priv key in slot 0x5
3,094,462 UART: [art] Derive Key Pair - Done
3,109,316 UART: [art] Signing Cert with AUTHO
3,109,796 UART: RITY.KEYID = 7
3,125,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,803 UART: [art] PUB.X = 9412791AD3B4125DC9EF4BC62CEF316723FF45ACAF6832FD36722FFAE5DFD6ACA58A9404857DE97D7817C294BC6ACE42
3,132,588 UART: [art] PUB.Y = 9A9319D6497D2C60A1047803D9BAFB836B8359F97FEC744450CB58E522CC8DE637FD77B4B3B11F75B186E4A58D1B5F37
3,139,538 UART: [art] SIG.R = 595902F4BD51C7D466E644E79EB6F3AD48B5261BF6FC8DF59ADC30EC1658D08E9146E8BA604FDF3BD611FDD682014225
3,146,314 UART: [art] SIG.S = 3458280546278EB04FE5656AA404C11409C697125148862DE56F0FFEA7A0A7AB69AAB15D3971036BA913D941A1FB6A4C
3,170,126 UART: Caliptra RT
3,170,471 UART: [state] CFI Enabled
3,278,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,726 UART: [rt]cmd =0x44504543, len=136
3,373,197 >>> mbox cmd response data (136 bytes)
3,373,198 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,305 UART: [rt]cmd =0x4453424c, len=4
3,416,685 >>> mbox cmd response data (8 bytes)
3,416,686 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,359 UART: [rt]cmd =0x44504543, len=92
3,629,531 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,649 ready_for_fw is high
1,056,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,153 >>> mbox cmd response: success
2,624,153 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,025 UART:
2,686,041 UART: Running Caliptra FMC ...
2,686,449 UART:
2,686,592 UART: [state] CFI Enabled
2,697,499 UART: [fht] FMC Alias Private Key: 7
2,804,686 UART: [art] Extend RT PCRs Done
2,805,114 UART: [art] Lock RT PCRs Done
2,806,602 UART: [art] Populate DV Done
2,814,943 UART: [fht] FMC Alias Private Key: 7
2,815,993 UART: [art] Derive CDI
2,816,273 UART: [art] Store in in slot 0x4
2,902,272 UART: [art] Derive Key Pair
2,902,632 UART: [art] Store priv key in slot 0x5
2,915,842 UART: [art] Derive Key Pair - Done
2,930,626 UART: [art] Signing Cert with AUTHO
2,931,106 UART: RITY.KEYID = 7
2,946,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,861 UART: [art] PUB.X = 0EE1368A27F0AA0F22109B69D28B295E3EF6E2F87C3090B859A4BD9CBA378F74CEE21FDB3E36850C394088C028BFA241
2,953,632 UART: [art] PUB.Y = 63F990238E1D40C91822E3BE630879B6594EEC1345662B100D14D6811ABF2C3117E6B61723985483535F5DB047501D28
2,960,562 UART: [art] SIG.R = 947A50DCDC06E860537FB1ECC9FC9CE3321FF6ACB1BBDE5662022DA3CD79318979C391268906FFD9546F475A337B4066
2,967,331 UART: [art] SIG.S = 143303DDF10E7CD9176852B1289B95033E35942E493D70B4F91D5ED52538ED6A6BE1513D2DE88AF01B7E4F2272C40FE5
2,991,036 UART: Caliptra RT
2,991,381 UART: [state] CFI Enabled
3,099,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,430 UART: [rt]cmd =0x44504543, len=136
3,194,283 >>> mbox cmd response data (136 bytes)
3,194,284 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,611 UART: [rt]cmd =0x4453424c, len=4
3,237,307 >>> mbox cmd response data (8 bytes)
3,237,308 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,267,285 UART: [rt]cmd =0x44504543, len=92
3,450,859 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.30s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.84s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.85s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.87s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.81s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.46s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 5.30s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 5.07s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.37s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.55s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.47s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 5.16s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.39s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,044 UART:
192,414 UART: Running Caliptra ROM ...
193,558 UART:
193,709 UART: [state] CFI Enabled
267,516 UART: [state] LifecycleState = Unprovisioned
269,444 UART: [state] DebugLocked = No
271,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,127 UART: [kat] SHA2-256
445,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,346 UART: [kat] ++
456,797 UART: [kat] sha1
467,248 UART: [kat] SHA2-256
469,898 UART: [kat] SHA2-384
475,391 UART: [kat] SHA2-512-ACC
477,766 UART: [kat] ECC-384
2,768,783 UART: [kat] HMAC-384Kdf
2,799,612 UART: [kat] LMS
3,989,906 UART: [kat] --
3,995,415 UART: [cold-reset] ++
3,997,811 UART: [fht] Storing FHT @ 0x50003400
4,009,945 UART: [idev] ++
4,010,539 UART: [idev] CDI.KEYID = 6
4,011,468 UART: [idev] SUBJECT.KEYID = 7
4,012,727 UART: [idev] UDS.KEYID = 0
4,013,791 ready_for_fw is high
4,014,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,650 UART: [idev] Erasing UDS.KEYID = 0
7,345,151 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,502 UART: [idev] --
7,371,064 UART: [ldev] ++
7,371,641 UART: [ldev] CDI.KEYID = 6
7,372,606 UART: [ldev] SUBJECT.KEYID = 5
7,373,816 UART: [ldev] AUTHORITY.KEYID = 7
7,375,105 UART: [ldev] FE.KEYID = 1
7,401,904 UART: [ldev] Erasing FE.KEYID = 1
10,734,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,902 UART: [ldev] --
13,097,177 UART: [fwproc] Waiting for Commands...
13,099,382 UART: [fwproc] Received command 0x46574c44
13,101,616 UART: [fwproc] Received Image of size 114124 bytes
17,157,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,852 >>> mbox cmd response: success
17,627,400 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,631,025 UART: [afmc] ++
17,631,631 UART: [afmc] CDI.KEYID = 6
17,632,549 UART: [afmc] SUBJECT.KEYID = 7
17,633,768 UART: [afmc] AUTHORITY.KEYID = 5
20,986,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,833 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,088 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,532 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,349 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,809 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,330 UART: [afmc] --
23,358,840 UART: [cold-reset] --
23,363,619 UART: [state] Locking Datavault
23,369,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,887 UART: [state] Locking ICCM
23,372,985 UART: [exit] Launching FMC @ 0x40000130
23,381,378 UART:
23,381,612 UART: Running Caliptra FMC ...
23,382,710 UART:
23,382,871 UART: [state] CFI Enabled
23,447,005 UART: [fht] FMC Alias Private Key: 7
25,784,922 UART: [art] Extend RT PCRs Done
25,786,144 UART: [art] Lock RT PCRs Done
25,787,521 UART: [art] Populate DV Done
25,793,096 UART: [fht] FMC Alias Private Key: 7
25,794,688 UART: [art] Derive CDI
25,795,426 UART: [art] Store in in slot 0x4
25,856,117 UART: [art] Derive Key Pair
25,857,162 UART: [art] Store priv key in slot 0x5
29,149,414 UART: [art] Derive Key Pair - Done
29,162,397 UART: [art] Signing Cert with AUTHO
29,163,724 UART: RITY.KEYID = 7
31,451,956 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,460 UART: [art] PUB.X = 4E72FD01DFC439A9FCC00AFF70E89AF8A504C84CB5CB4B1FF7AD7047EB330874440E8AA2E00801F9E7E411037DADCDC4
31,460,770 UART: [art] PUB.Y = 5C0177F0C0C44F4A7365C32FD900872F13940D099D5632206C14A5E7C943B684A0D232792001F7DE40575B27904F726F
31,467,956 UART: [art] SIG.R = 95B517AD8EFD246C57EC94B08926844F7984679E3B237A0F9EFACF1E4867538C57B8F6972F7BE42D1BEE1AB3305F3487
31,475,375 UART: [art] SIG.S = 249562AFD6A95070D041AF3BFCDEA7416C22A59CED9306A56C783281BAB6389ABDF9D293D4368D37A6D8B0DC7B44F0D8
32,781,315 UART: Caliptra RT
32,782,027 UART: [state] CFI Enabled
32,942,594 UART: [rt] RT listening for mailbox commands...
32,975,409 UART: [rt]cmd =0x53494756, len=196
32,979,901 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,804,570 ready_for_fw is high
3,804,952 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,802 >>> mbox cmd response: success
17,868,409 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,555,144 UART:
23,555,549 UART: Running Caliptra FMC ...
23,556,702 UART:
23,556,868 UART: [state] CFI Enabled
23,625,204 UART: [fht] FMC Alias Private Key: 7
25,962,642 UART: [art] Extend RT PCRs Done
25,963,866 UART: [art] Lock RT PCRs Done
25,965,330 UART: [art] Populate DV Done
25,970,757 UART: [fht] FMC Alias Private Key: 7
25,972,463 UART: [art] Derive CDI
25,973,281 UART: [art] Store in in slot 0x4
26,033,282 UART: [art] Derive Key Pair
26,034,326 UART: [art] Store priv key in slot 0x5
29,326,993 UART: [art] Derive Key Pair - Done
29,339,942 UART: [art] Signing Cert with AUTHO
29,341,252 UART: RITY.KEYID = 7
31,628,744 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,245 UART: [art] PUB.X = F3234B8B53BB6E5A8B1DD30D376ADB1B14B8025A613AEFA6294541BAB32659F11DFD425EEA5D3C6176E9ABFBA1AEEC2A
31,637,571 UART: [art] PUB.Y = 7FB5D3FAAEB638590386CB3FE9A3DADA3611062BBC0EAA4F44BE2509865B25DD8E834C9C4D51353C08EE474D7AABC8DA
31,644,796 UART: [art] SIG.R = 095488BBEED50B56E0151035D61B6DDF4AD55E53A4235B46EBB20A3B29910ECC4C8EEA98B5D60A7B9FDB3578DB443650
31,652,182 UART: [art] SIG.S = 2F0193953CAF46F843D5374F5FFFB2B256F48BAE1F71339D191E939BEEF352879188806DC1BBFE90309AB65694CBF3FF
32,957,255 UART: Caliptra RT
32,957,971 UART: [state] CFI Enabled
33,119,396 UART: [rt] RT listening for mailbox commands...
33,151,992 UART: [rt]cmd =0x53494756, len=196
33,156,839 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,516 UART:
192,881 UART: Running Caliptra ROM ...
194,074 UART:
603,774 UART: [state] CFI Enabled
618,077 UART: [state] LifecycleState = Unprovisioned
620,032 UART: [state] DebugLocked = No
622,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,472 UART: [kat] SHA2-256
797,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,804 UART: [kat] ++
808,332 UART: [kat] sha1
818,995 UART: [kat] SHA2-256
821,708 UART: [kat] SHA2-384
827,976 UART: [kat] SHA2-512-ACC
830,360 UART: [kat] ECC-384
3,113,526 UART: [kat] HMAC-384Kdf
3,124,742 UART: [kat] LMS
4,314,853 UART: [kat] --
4,318,236 UART: [cold-reset] ++
4,319,818 UART: [fht] Storing FHT @ 0x50003400
4,331,646 UART: [idev] ++
4,332,216 UART: [idev] CDI.KEYID = 6
4,333,253 UART: [idev] SUBJECT.KEYID = 7
4,334,424 UART: [idev] UDS.KEYID = 0
4,335,507 ready_for_fw is high
4,335,722 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,576 UART: [idev] Erasing UDS.KEYID = 0
7,617,551 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,337 UART: [idev] --
7,641,782 UART: [ldev] ++
7,642,420 UART: [ldev] CDI.KEYID = 6
7,643,332 UART: [ldev] SUBJECT.KEYID = 5
7,644,536 UART: [ldev] AUTHORITY.KEYID = 7
7,645,817 UART: [ldev] FE.KEYID = 1
7,656,231 UART: [ldev] Erasing FE.KEYID = 1
10,944,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,400 UART: [ldev] --
13,304,824 UART: [fwproc] Waiting for Commands...
13,307,505 UART: [fwproc] Received command 0x46574c44
13,309,730 UART: [fwproc] Received Image of size 114124 bytes
17,358,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,376 >>> mbox cmd response: success
17,824,935 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,829,104 UART: [afmc] ++
17,829,717 UART: [afmc] CDI.KEYID = 6
17,830,626 UART: [afmc] SUBJECT.KEYID = 7
17,831,892 UART: [afmc] AUTHORITY.KEYID = 5
21,144,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,011 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,276 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,659 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,503 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,909 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,622 UART: [afmc] --
23,508,880 UART: [cold-reset] --
23,513,321 UART: [state] Locking Datavault
23,518,650 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,412 UART: [state] Locking ICCM
23,521,961 UART: [exit] Launching FMC @ 0x40000130
23,530,353 UART:
23,530,582 UART: Running Caliptra FMC ...
23,531,680 UART:
23,531,841 UART: [state] CFI Enabled
23,539,671 UART: [fht] FMC Alias Private Key: 7
25,870,063 UART: [art] Extend RT PCRs Done
25,871,284 UART: [art] Lock RT PCRs Done
25,873,008 UART: [art] Populate DV Done
25,878,477 UART: [fht] FMC Alias Private Key: 7
25,879,955 UART: [art] Derive CDI
25,880,708 UART: [art] Store in in slot 0x4
25,923,083 UART: [art] Derive Key Pair
25,924,126 UART: [art] Store priv key in slot 0x5
29,165,952 UART: [art] Derive Key Pair - Done
29,179,107 UART: [art] Signing Cert with AUTHO
29,180,404 UART: RITY.KEYID = 7
31,459,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,368 UART: [art] PUB.X = F4ED670196C169EECE9522AED03AB20DDFDED6525636B769EF10F4C050CEC9C3171B1EB449A8D6AD927D8601E8C36503
31,468,615 UART: [art] PUB.Y = B67EDD3F1D31223C7458105982059373E43754A84299557EB93B37EBB80907B7A6B7DFC55574209FF4761ED461B592CC
31,475,835 UART: [art] SIG.R = 7F05AC5F6C18DEFF4D183647073A192520DC809DB56175BEC331D1933A2EE0E72EA2A6671BDDE54571E97DA82915DF70
31,483,216 UART: [art] SIG.S = 2B682B819128462580F4F6AEA9637B4E97E05AE67A9132D0335699C236B08E110A83D6246D6E7C7C5534564BD2114E04
32,787,801 UART: Caliptra RT
32,788,511 UART: [state] CFI Enabled
32,906,341 UART: [rt] RT listening for mailbox commands...
32,939,151 UART: [rt]cmd =0x53494756, len=196
32,943,689 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,124,945 ready_for_fw is high
4,125,501 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,471 >>> mbox cmd response: success
18,063,201 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,700,776 UART:
23,701,173 UART: Running Caliptra FMC ...
23,702,306 UART:
23,702,458 UART: [state] CFI Enabled
23,710,769 UART: [fht] FMC Alias Private Key: 7
26,041,840 UART: [art] Extend RT PCRs Done
26,043,070 UART: [art] Lock RT PCRs Done
26,044,622 UART: [art] Populate DV Done
26,049,934 UART: [fht] FMC Alias Private Key: 7
26,051,602 UART: [art] Derive CDI
26,052,336 UART: [art] Store in in slot 0x4
26,094,724 UART: [art] Derive Key Pair
26,095,775 UART: [art] Store priv key in slot 0x5
29,337,552 UART: [art] Derive Key Pair - Done
29,350,653 UART: [art] Signing Cert with AUTHO
29,351,959 UART: RITY.KEYID = 7
31,631,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,082 UART: [art] PUB.X = D6C4BE3E2647C0C5FBF6C2A17CE64AEC4377F9605043D0B787EC570ED0B9AB8F1140DB4415D7FB4A644C3960965B2663
31,640,342 UART: [art] PUB.Y = 8643619838CA0697C76BDE2AFE94C6D9E32731F6801FB0B40387569121BAE0C32D77BCBA0016B31F0C07DF1E3210FB6F
31,647,571 UART: [art] SIG.R = 5C4230821241A06273B6A526F2FD14ABD538BBEF4C8B90363AC7056E6AF2AD1E00685AC28045A24BD751F937D38EB55A
31,654,913 UART: [art] SIG.S = 8427709879779F67DA9BD218019257DF2BCD256A910B07AC7D418C3C8337DAEF87017A98F0FA3C8D198842EAD8F0149E
32,960,205 UART: Caliptra RT
32,960,927 UART: [state] CFI Enabled
33,079,399 UART: [rt] RT listening for mailbox commands...
33,112,063 UART: [rt]cmd =0x53494756, len=196
33,116,630 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,162 UART:
192,524 UART: Running Caliptra ROM ...
193,712 UART:
193,862 UART: [state] CFI Enabled
262,387 UART: [state] LifecycleState = Unprovisioned
264,316 UART: [state] DebugLocked = No
266,411 UART: [state] WD Timer not started. Device not locked for debugging
270,764 UART: [kat] SHA2-256
449,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,440 UART: [kat] ++
461,974 UART: [kat] sha1
473,504 UART: [kat] SHA2-256
475,870 UART: [kat] SHA2-384
482,427 UART: [kat] SHA2-512-ACC
485,366 UART: [kat] ECC-384
2,947,134 UART: [kat] HMAC-384Kdf
2,970,108 UART: [kat] LMS
3,499,555 UART: [kat] --
3,502,404 UART: [cold-reset] ++
3,503,913 UART: [fht] FHT @ 0x50003400
3,513,978 UART: [idev] ++
3,514,574 UART: [idev] CDI.KEYID = 6
3,515,467 UART: [idev] SUBJECT.KEYID = 7
3,516,659 UART: [idev] UDS.KEYID = 0
3,517,752 ready_for_fw is high
3,517,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,802 UART: [idev] Erasing UDS.KEYID = 0
6,024,746 UART: [idev] Sha1 KeyId Algorithm
6,047,383 UART: [idev] --
6,052,022 UART: [ldev] ++
6,052,597 UART: [ldev] CDI.KEYID = 6
6,053,521 UART: [ldev] SUBJECT.KEYID = 5
6,054,738 UART: [ldev] AUTHORITY.KEYID = 7
6,055,970 UART: [ldev] FE.KEYID = 1
6,098,705 UART: [ldev] Erasing FE.KEYID = 1
8,602,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,922 UART: [ldev] --
10,414,926 UART: [fwproc] Wait for Commands...
10,417,020 UART: [fwproc] Recv command 0x46574c44
10,419,059 UART: [fwproc] Recv'd Img size: 114448 bytes
13,813,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,244 >>> mbox cmd response: success
14,275,772 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,280,051 UART: [afmc] ++
14,280,669 UART: [afmc] CDI.KEYID = 6
14,281,551 UART: [afmc] SUBJECT.KEYID = 7
14,282,653 UART: [afmc] AUTHORITY.KEYID = 5
16,808,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,680 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,223 UART: [afmc] --
18,609,195 UART: [cold-reset] --
18,614,238 UART: [state] Locking Datavault
18,619,587 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,283 UART: [state] Locking ICCM
18,623,757 UART: [exit] Launching FMC @ 0x40000130
18,632,149 UART:
18,632,384 UART: Running Caliptra FMC ...
18,633,701 UART:
18,633,873 UART: [state] CFI Enabled
18,688,753 UART: [fht] FMC Alias Private Key: 7
20,453,321 UART: [art] Extend RT PCRs Done
20,454,560 UART: [art] Lock RT PCRs Done
20,456,314 UART: [art] Populate DV Done
20,461,939 UART: [fht] FMC Alias Private Key: 7
20,463,418 UART: [art] Derive CDI
20,464,149 UART: [art] Store in in slot 0x4
20,521,415 UART: [art] Derive Key Pair
20,522,452 UART: [art] Store priv key in slot 0x5
22,985,877 UART: [art] Derive Key Pair - Done
22,999,314 UART: [art] Signing Cert with AUTHO
23,000,610 UART: RITY.KEYID = 7
24,712,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,678 UART: [art] PUB.X = CBBA4905967C6E03B29A21822BD719F3A1698F64D60CC6FF5EA82DA4F3923BC5185263E20F3A7AE2002E67BC26A945E9
24,720,758 UART: [art] PUB.Y = 7BF344B02F1E1014CF01DD1E2093015EB09D008E27ADF562CF0F787FCE83EEB962A0E426BF25D4BD7BEC925EE089F3CD
24,728,048 UART: [art] SIG.R = C0F46CF019D96220A53E54BFF0C11402574D5F5CCB45A7E5E4F3B8DCF6537DBDC93E3D7A42808447B1B08F848D6AF659
24,735,431 UART: [art] SIG.S = A28EFC48A50471A92907E3799AD4F9AFE5742659B0D2080628F19DEECB15CDE46A93998EE9D7072253A216F16584403A
25,714,866 UART: Caliptra RT
25,715,597 UART: [state] CFI Enabled
25,881,124 UART: [rt] RT listening for mailbox commands...
25,913,759 UART: [rt]cmd =0x53494756, len=196
25,918,329 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,380,863 ready_for_fw is high
3,381,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,053,800 >>> mbox cmd response: success
14,054,615 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,347,634 UART:
18,348,036 UART: Running Caliptra FMC ...
18,349,138 UART:
18,349,289 UART: [state] CFI Enabled
18,415,781 UART: [fht] FMC Alias Private Key: 7
20,179,178 UART: [art] Extend RT PCRs Done
20,180,411 UART: [art] Lock RT PCRs Done
20,182,390 UART: [art] Populate DV Done
20,188,017 UART: [fht] FMC Alias Private Key: 7
20,189,664 UART: [art] Derive CDI
20,190,398 UART: [art] Store in in slot 0x4
20,248,874 UART: [art] Derive Key Pair
20,249,915 UART: [art] Store priv key in slot 0x5
22,712,655 UART: [art] Derive Key Pair - Done
22,725,829 UART: [art] Signing Cert with AUTHO
22,727,130 UART: RITY.KEYID = 7
24,438,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,440,427 UART: [art] PUB.X = FE64EF6F4DE6DBDCBCBE20E8FD16D135A4FBC67997FAAA4409E6026133CE8B32AA2F5E95E3026AB238EA400777AB7021
24,447,732 UART: [art] PUB.Y = DEE966B45B137DBB9AF19439ABDA9A1D6E821520159F323CC7B0B187492F6508B9EAE0D5560EC54AFA857C5DFF4BD903
24,454,955 UART: [art] SIG.R = 2442C8E799E503ECE11D47D26AD35B03909AC9AD13521CDCC9C31086DCCEC3C4C7B3C2D284E0DF3D91AD8B003A6CDE2B
24,462,350 UART: [art] SIG.S = 7DDE805F704058FDCF498116533F57EEED1B60050EE41C21CC97DD8308D793E5D38D4269C92712DF0751887FC910C894
25,440,596 UART: Caliptra RT
25,441,307 UART: [state] CFI Enabled
25,607,557 UART: [rt] RT listening for mailbox commands...
25,640,380 UART: [rt]cmd =0x53494756, len=196
25,644,870 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,382 UART:
192,750 UART: Running Caliptra ROM ...
193,937 UART:
603,364 UART: [state] CFI Enabled
619,874 UART: [state] LifecycleState = Unprovisioned
621,752 UART: [state] DebugLocked = No
624,209 UART: [state] WD Timer not started. Device not locked for debugging
627,943 UART: [kat] SHA2-256
807,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,640 UART: [kat] ++
819,081 UART: [kat] sha1
830,101 UART: [kat] SHA2-256
833,146 UART: [kat] SHA2-384
840,054 UART: [kat] SHA2-512-ACC
842,983 UART: [kat] ECC-384
3,285,118 UART: [kat] HMAC-384Kdf
3,297,953 UART: [kat] LMS
3,827,480 UART: [kat] --
3,833,389 UART: [cold-reset] ++
3,835,026 UART: [fht] FHT @ 0x50003400
3,845,286 UART: [idev] ++
3,845,845 UART: [idev] CDI.KEYID = 6
3,846,777 UART: [idev] SUBJECT.KEYID = 7
3,847,941 UART: [idev] UDS.KEYID = 0
3,848,981 ready_for_fw is high
3,849,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,450 UART: [idev] Erasing UDS.KEYID = 0
6,320,004 UART: [idev] Sha1 KeyId Algorithm
6,343,613 UART: [idev] --
6,346,977 UART: [ldev] ++
6,347,543 UART: [ldev] CDI.KEYID = 6
6,348,453 UART: [ldev] SUBJECT.KEYID = 5
6,349,653 UART: [ldev] AUTHORITY.KEYID = 7
6,350,869 UART: [ldev] FE.KEYID = 1
6,363,805 UART: [ldev] Erasing FE.KEYID = 1
8,840,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,278 UART: [ldev] --
10,632,419 UART: [fwproc] Wait for Commands...
10,635,416 UART: [fwproc] Recv command 0x46574c44
10,637,498 UART: [fwproc] Recv'd Img size: 114448 bytes
14,046,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,121,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,190,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,508,421 >>> mbox cmd response: success
14,508,939 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,513,544 UART: [afmc] ++
14,514,123 UART: [afmc] CDI.KEYID = 6
14,515,027 UART: [afmc] SUBJECT.KEYID = 7
14,516,182 UART: [afmc] AUTHORITY.KEYID = 5
17,013,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,753,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,769,443 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,785,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,807,896 UART: [afmc] --
18,811,584 UART: [cold-reset] --
18,815,274 UART: [state] Locking Datavault
18,820,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,821,976 UART: [state] Locking ICCM
18,824,241 UART: [exit] Launching FMC @ 0x40000130
18,832,653 UART:
18,832,892 UART: Running Caliptra FMC ...
18,833,986 UART:
18,834,134 UART: [state] CFI Enabled
18,842,604 UART: [fht] FMC Alias Private Key: 7
20,599,717 UART: [art] Extend RT PCRs Done
20,600,932 UART: [art] Lock RT PCRs Done
20,602,229 UART: [art] Populate DV Done
20,607,954 UART: [fht] FMC Alias Private Key: 7
20,609,481 UART: [art] Derive CDI
20,610,286 UART: [art] Store in in slot 0x4
20,652,872 UART: [art] Derive Key Pair
20,653,864 UART: [art] Store priv key in slot 0x5
23,081,044 UART: [art] Derive Key Pair - Done
23,094,156 UART: [art] Signing Cert with AUTHO
23,095,459 UART: RITY.KEYID = 7
24,801,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,599 UART: [art] PUB.X = 26D4A6C72B109091651833DD1896F15663425729CB10CED89D0CCDB07D66BF7D1A311FAE325571265CA22138CD3CFE0A
24,809,833 UART: [art] PUB.Y = D62F8758CF57B55F123137E887C2E519BA73F6C7B4DDDDAC5052C9EEDA7FFC4E4919BA2F137B0C69C299FBE1E4330D82
24,817,117 UART: [art] SIG.R = A02077A3EB63D982C249EA6A6B5C5295F67E0FBCC4B8EB327B0DFD9859F11A51ABA41822C38366611BAE60C852F65E11
24,824,589 UART: [art] SIG.S = 425B9F13697026E23E5607922B0C8660A7D9CB332C77F1168D00A275CCD3BBA89208C438450132822874AA0B1A85B629
25,803,350 UART: Caliptra RT
25,804,053 UART: [state] CFI Enabled
25,920,896 UART: [rt] RT listening for mailbox commands...
25,953,758 UART: [rt]cmd =0x53494756, len=196
25,958,060 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,693,055 ready_for_fw is high
3,693,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,402 >>> mbox cmd response: success
14,275,001 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,523,771 UART:
18,524,166 UART: Running Caliptra FMC ...
18,525,358 UART:
18,525,515 UART: [state] CFI Enabled
18,533,279 UART: [fht] FMC Alias Private Key: 7
20,290,686 UART: [art] Extend RT PCRs Done
20,291,914 UART: [art] Lock RT PCRs Done
20,293,639 UART: [art] Populate DV Done
20,298,818 UART: [fht] FMC Alias Private Key: 7
20,300,522 UART: [art] Derive CDI
20,301,330 UART: [art] Store in in slot 0x4
20,343,918 UART: [art] Derive Key Pair
20,344,961 UART: [art] Store priv key in slot 0x5
22,772,087 UART: [art] Derive Key Pair - Done
22,785,300 UART: [art] Signing Cert with AUTHO
22,786,593 UART: RITY.KEYID = 7
24,492,156 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,681 UART: [art] PUB.X = 9787FA4B3B20252839CE42BA92A9A3E69D2737629658303CA2C5C8CFF87E31CB6759C44FEEC5BB16C75ECA49EAC5D319
24,500,976 UART: [art] PUB.Y = B1D77224E23BCE1E7B4119D92D0DCDD805110A8DDD185938D2BFC460A09B97A7188D95C084F3ABBE7A1CCE75DA00D5F3
24,508,264 UART: [art] SIG.R = B15B37D4F7EC1DA9F82D62CA1452D3D54B9C62EDC24B835FD0A948DC790571E9F7AD841729E36818FCCB90305191B293
24,515,669 UART: [art] SIG.S = 5CCCAA3E643667305A540792E2AE0E428F5098221E43365B7B3F6F9E01AE30F267BD60D4E289AF666C90D78A3B3BB8FC
25,494,893 UART: Caliptra RT
25,495,583 UART: [state] CFI Enabled
25,612,148 UART: [rt] RT listening for mailbox commands...
25,644,847 UART: [rt]cmd =0x53494756, len=196
25,649,180 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,068 UART:
192,427 UART: Running Caliptra ROM ...
193,611 UART:
193,784 UART: [state] CFI Enabled
260,030 UART: [state] LifecycleState = Unprovisioned
262,440 UART: [state] DebugLocked = No
264,751 UART: [state] WD Timer not started. Device not locked for debugging
269,707 UART: [kat] SHA2-256
459,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,370 UART: [kat] ++
470,871 UART: [kat] sha1
482,594 UART: [kat] SHA2-256
485,591 UART: [kat] SHA2-384
490,225 UART: [kat] SHA2-512-ACC
492,801 UART: [kat] ECC-384
2,951,132 UART: [kat] HMAC-384Kdf
2,972,814 UART: [kat] LMS
3,504,574 UART: [kat] --
3,510,357 UART: [cold-reset] ++
3,512,989 UART: [fht] FHT @ 0x50003400
3,524,901 UART: [idev] ++
3,525,607 UART: [idev] CDI.KEYID = 6
3,526,636 UART: [idev] SUBJECT.KEYID = 7
3,527,737 UART: [idev] UDS.KEYID = 0
3,528,667 ready_for_fw is high
3,528,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,874 UART: [idev] Erasing UDS.KEYID = 0
6,027,953 UART: [idev] Sha1 KeyId Algorithm
6,049,670 UART: [idev] --
6,054,475 UART: [ldev] ++
6,055,157 UART: [ldev] CDI.KEYID = 6
6,056,069 UART: [ldev] SUBJECT.KEYID = 5
6,057,230 UART: [ldev] AUTHORITY.KEYID = 7
6,058,457 UART: [ldev] FE.KEYID = 1
6,101,131 UART: [ldev] Erasing FE.KEYID = 1
8,605,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,036 UART: [ldev] --
10,411,713 UART: [fwproc] Wait for Commands...
10,413,489 UART: [fwproc] Recv command 0x46574c44
10,415,748 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,603,805 >>> mbox cmd response: success
14,604,317 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,608,325 UART: [afmc] ++
14,609,056 UART: [afmc] CDI.KEYID = 6
14,610,275 UART: [afmc] SUBJECT.KEYID = 7
14,611,716 UART: [afmc] AUTHORITY.KEYID = 5
17,151,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,655 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,799 UART: [afmc] --
18,967,668 UART: [cold-reset] --
18,972,728 UART: [state] Locking Datavault
18,977,222 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,359 UART: [state] Locking ICCM
18,981,190 UART: [exit] Launching FMC @ 0x40000130
18,989,865 UART:
18,990,105 UART: Running Caliptra FMC ...
18,991,166 UART:
18,991,317 UART: [state] CFI Enabled
19,049,360 UART: [fht] FMC Alias Private Key: 7
20,813,360 UART: [art] Extend RT PCRs Done
20,814,571 UART: [art] Lock RT PCRs Done
20,816,548 UART: [art] Populate DV Done
20,821,846 UART: [fht] FMC Alias Private Key: 7
20,823,597 UART: [art] Derive CDI
20,824,331 UART: [art] Store in in slot 0x4
20,882,264 UART: [art] Derive Key Pair
20,883,301 UART: [art] Store priv key in slot 0x5
23,346,146 UART: [art] Derive Key Pair - Done
23,359,284 UART: [art] Signing Cert with AUTHO
23,360,595 UART: RITY.KEYID = 7
25,071,864 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,369 UART: [art] PUB.X = 2DD907C6727513CFAB85135F11455F42918733658D190621B47888FAD6E0A9E944B0ED683698E9FFF812634D247BEE14
25,080,633 UART: [art] PUB.Y = 0B60CE72DD1378011E76C2A28380988413800BEA6B1697923165F80C3EC979327B5ECD571FA64E10052B9D5E0D67B5AE
25,087,861 UART: [art] SIG.R = E5D336B2A3623BDD7E9941EF37A43A09B0F5D0BA62C6E9D40980589B03AE4FE5C841FDD8C4A9C5F16EF0F8804B4F1CAE
25,095,254 UART: [art] SIG.S = 3F22389CFA7CCD572FA129EC2788C0039D6793661FBD65BCAA3B49EB8120E0339C86B68F22685A8B62FF7F638BDF299F
26,074,891 UART: Caliptra RT
26,075,579 UART: [state] CFI Enabled
26,238,673 UART: [rt] RT listening for mailbox commands...
26,271,430 UART: [rt]cmd =0x53494756, len=196
26,276,185 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,440,031 ready_for_fw is high
3,440,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,733,397 >>> mbox cmd response: success
14,733,995 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,030,581 UART:
19,030,968 UART: Running Caliptra FMC ...
19,032,374 UART:
19,032,550 UART: [state] CFI Enabled
19,097,552 UART: [fht] FMC Alias Private Key: 7
20,861,996 UART: [art] Extend RT PCRs Done
20,863,208 UART: [art] Lock RT PCRs Done
20,864,997 UART: [art] Populate DV Done
20,870,191 UART: [fht] FMC Alias Private Key: 7
20,871,813 UART: [art] Derive CDI
20,872,668 UART: [art] Store in in slot 0x4
20,930,831 UART: [art] Derive Key Pair
20,931,834 UART: [art] Store priv key in slot 0x5
23,394,922 UART: [art] Derive Key Pair - Done
23,408,077 UART: [art] Signing Cert with AUTHO
23,409,388 UART: RITY.KEYID = 7
25,120,778 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,277 UART: [art] PUB.X = 15974CF68F6B4FDC8CD5F350ED6B86D2899DB8D87515D004255DB352625930C6B8CB87F2B2155D487F97E194F2CE8719
25,129,520 UART: [art] PUB.Y = 40668E073F00DE7BACA2AA38C6880491BB3CC2A8E5E2AD39CB609AFF24CB6626F9A4DCE21E7CD022F077A4884D5F298E
25,136,821 UART: [art] SIG.R = 85FB97DD534C900556BD4E55E564A0E84316DB01DC1EF8752C2C9FBA8370432965EFCD3B837F63418CC8C9BA1ABE9D07
25,144,203 UART: [art] SIG.S = 741ED6BA6842A30F6155C49010623C0504B2F56F252CF2C8C3A21DEE0429EBED51CC56754B20C3023F427A0AF5C263FD
26,123,264 UART: Caliptra RT
26,123,954 UART: [state] CFI Enabled
26,288,618 UART: [rt] RT listening for mailbox commands...
26,321,321 UART: [rt]cmd =0x53494756, len=196
26,326,030 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,285 UART:
192,668 UART: Running Caliptra ROM ...
193,861 UART:
603,517 UART: [state] CFI Enabled
618,173 UART: [state] LifecycleState = Unprovisioned
620,540 UART: [state] DebugLocked = No
622,697 UART: [state] WD Timer not started. Device not locked for debugging
626,719 UART: [kat] SHA2-256
816,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,346 UART: [kat] ++
827,862 UART: [kat] sha1
840,218 UART: [kat] SHA2-256
843,239 UART: [kat] SHA2-384
849,579 UART: [kat] SHA2-512-ACC
852,148 UART: [kat] ECC-384
3,294,356 UART: [kat] HMAC-384Kdf
3,307,375 UART: [kat] LMS
3,839,166 UART: [kat] --
3,843,659 UART: [cold-reset] ++
3,844,658 UART: [fht] FHT @ 0x50003400
3,854,701 UART: [idev] ++
3,855,403 UART: [idev] CDI.KEYID = 6
3,856,373 UART: [idev] SUBJECT.KEYID = 7
3,857,532 UART: [idev] UDS.KEYID = 0
3,858,519 ready_for_fw is high
3,858,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,739 UART: [idev] Erasing UDS.KEYID = 0
6,334,910 UART: [idev] Sha1 KeyId Algorithm
6,357,933 UART: [idev] --
6,363,215 UART: [ldev] ++
6,363,882 UART: [ldev] CDI.KEYID = 6
6,364,809 UART: [ldev] SUBJECT.KEYID = 5
6,366,012 UART: [ldev] AUTHORITY.KEYID = 7
6,367,128 UART: [ldev] FE.KEYID = 1
6,377,861 UART: [ldev] Erasing FE.KEYID = 1
8,853,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,219 UART: [ldev] --
10,645,407 UART: [fwproc] Wait for Commands...
10,647,065 UART: [fwproc] Recv command 0x46574c44
10,649,366 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,804 >>> mbox cmd response: success
14,837,333 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,840,683 UART: [afmc] ++
14,841,379 UART: [afmc] CDI.KEYID = 6
14,842,617 UART: [afmc] SUBJECT.KEYID = 7
14,844,054 UART: [afmc] AUTHORITY.KEYID = 5
17,349,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,545 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,763 UART: [afmc] --
19,147,591 UART: [cold-reset] --
19,153,077 UART: [state] Locking Datavault
19,156,327 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,509 UART: [state] Locking ICCM
19,160,709 UART: [exit] Launching FMC @ 0x40000130
19,169,371 UART:
19,169,599 UART: Running Caliptra FMC ...
19,170,690 UART:
19,170,842 UART: [state] CFI Enabled
19,178,467 UART: [fht] FMC Alias Private Key: 7
20,935,850 UART: [art] Extend RT PCRs Done
20,937,070 UART: [art] Lock RT PCRs Done
20,938,744 UART: [art] Populate DV Done
20,943,982 UART: [fht] FMC Alias Private Key: 7
20,945,512 UART: [art] Derive CDI
20,946,314 UART: [art] Store in in slot 0x4
20,988,760 UART: [art] Derive Key Pair
20,989,797 UART: [art] Store priv key in slot 0x5
23,416,214 UART: [art] Derive Key Pair - Done
23,429,148 UART: [art] Signing Cert with AUTHO
23,430,445 UART: RITY.KEYID = 7
25,135,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,378 UART: [art] PUB.X = B81CA636D71B0D69CECE1E0E4C3B43F9D6B06D99DFCB24FE2B325886AC26AB66D2AECBB983E82EBB5D5B716EB4157B34
25,144,670 UART: [art] PUB.Y = 9E122480ECE6DB8A8A817C485D6B813AC223A06021E65FA9133ABCADF197675EC3199D0B625D0AFDC3FB175B304D4B95
25,151,945 UART: [art] SIG.R = A589D38590C30AB3C53DB9140E319D49F23CDA185DEE787785490EC9F9EAD4DDCCFB924A1E078844E0BFDFFD9AD1795B
25,159,313 UART: [art] SIG.S = 61BEF8A4712EA4D13E5C4E37D2C61554E09C14E4E72B1F8BC76B57217C41E9FCDD216AFABBCD578E2386EA89A48A7F9D
26,138,827 UART: Caliptra RT
26,139,522 UART: [state] CFI Enabled
26,256,885 UART: [rt] RT listening for mailbox commands...
26,289,884 UART: [rt]cmd =0x53494756, len=196
26,294,535 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,758,296 ready_for_fw is high
3,758,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,024 >>> mbox cmd response: success
14,953,830 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,203,807 UART:
19,204,201 UART: Running Caliptra FMC ...
19,205,339 UART:
19,205,498 UART: [state] CFI Enabled
19,213,178 UART: [fht] FMC Alias Private Key: 7
20,969,918 UART: [art] Extend RT PCRs Done
20,971,137 UART: [art] Lock RT PCRs Done
20,972,785 UART: [art] Populate DV Done
20,978,192 UART: [fht] FMC Alias Private Key: 7
20,979,668 UART: [art] Derive CDI
20,980,396 UART: [art] Store in in slot 0x4
21,023,417 UART: [art] Derive Key Pair
21,024,461 UART: [art] Store priv key in slot 0x5
23,451,135 UART: [art] Derive Key Pair - Done
23,463,806 UART: [art] Signing Cert with AUTHO
23,465,109 UART: RITY.KEYID = 7
25,170,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,082 UART: [art] PUB.X = 91B6D0849DA5738B5470AF5615F7D01ED23D7DE2BD085D5882FAC534774A878CD11F1C708F09B6F82A46149AEBB1A775
25,179,396 UART: [art] PUB.Y = 04E08FAFD9C0740E8499FBAD76752B932BBCEFAF1C9293B3A49D411ED668342B0A787E12EEFAE835E3A17FC5750419D5
25,186,635 UART: [art] SIG.R = 9C7F862E9617104639AEE0A82B45B61C7F8ECE4A899070B0AF9E25376F33F9E56F4C940F8D83E576EF380B06CBCC9C0B
25,194,015 UART: [art] SIG.S = A29E598542FCAC299A59751DF03E1B74840EE5DC952D11A307F542D9D701FF8EA4A74D721DEFE956B226A09AF53BCBA6
26,172,857 UART: Caliptra RT
26,173,563 UART: [state] CFI Enabled
26,291,232 UART: [rt] RT listening for mailbox commands...
26,324,045 UART: [rt]cmd =0x53494756, len=196
26,328,754 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,231 UART:
192,586 UART: Running Caliptra ROM ...
193,772 UART:
193,931 UART: [state] CFI Enabled
266,056 UART: [state] LifecycleState = Unprovisioned
268,034 UART: [state] DebugLocked = No
269,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,071 UART: [kat] SHA2-256
443,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,348 UART: [kat] ++
454,837 UART: [kat] sha1
464,834 UART: [kat] SHA2-256
467,489 UART: [kat] SHA2-384
472,630 UART: [kat] SHA2-512-ACC
475,007 UART: [kat] ECC-384
2,768,898 UART: [kat] HMAC-384Kdf
2,799,533 UART: [kat] LMS
3,989,862 UART: [kat] --
3,994,942 UART: [cold-reset] ++
3,996,454 UART: [fht] Storing FHT @ 0x50003400
4,007,585 UART: [idev] ++
4,008,152 UART: [idev] CDI.KEYID = 6
4,009,113 UART: [idev] SUBJECT.KEYID = 7
4,010,366 UART: [idev] UDS.KEYID = 0
4,011,321 ready_for_fw is high
4,011,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,081 UART: [idev] Erasing UDS.KEYID = 0
7,347,717 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,181 UART: [idev] --
7,373,164 UART: [ldev] ++
7,373,732 UART: [ldev] CDI.KEYID = 6
7,374,673 UART: [ldev] SUBJECT.KEYID = 5
7,375,882 UART: [ldev] AUTHORITY.KEYID = 7
7,377,170 UART: [ldev] FE.KEYID = 1
7,422,854 UART: [ldev] Erasing FE.KEYID = 1
10,751,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,530 UART: [ldev] --
13,114,650 UART: [fwproc] Waiting for Commands...
13,116,702 UART: [fwproc] Received command 0x46574c44
13,118,886 UART: [fwproc] Received Image of size 114124 bytes
17,172,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,640,841 >>> mbox cmd response: success
17,641,359 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,644,559 UART: [afmc] ++
17,645,682 UART: [afmc] CDI.KEYID = 6
17,646,691 UART: [afmc] SUBJECT.KEYID = 7
17,647,727 UART: [afmc] AUTHORITY.KEYID = 5
21,009,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,469 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,688 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,122 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,848 UART: [afmc] --
23,377,716 UART: [cold-reset] --
23,382,169 UART: [state] Locking Datavault
23,387,685 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,438 UART: [state] Locking ICCM
23,391,971 UART: [exit] Launching FMC @ 0x40000130
23,400,373 UART:
23,400,610 UART: Running Caliptra FMC ...
23,401,710 UART:
23,401,869 UART: [state] CFI Enabled
23,465,984 UART: [fht] FMC Alias Private Key: 7
25,804,491 UART: [art] Extend RT PCRs Done
25,805,848 UART: [art] Lock RT PCRs Done
25,807,529 UART: [art] Populate DV Done
25,813,016 UART: [fht] FMC Alias Private Key: 7
25,814,614 UART: [art] Derive CDI
25,815,425 UART: [art] Store in in slot 0x4
25,874,604 UART: [art] Derive Key Pair
25,875,598 UART: [art] Store priv key in slot 0x5
29,168,593 UART: [art] Derive Key Pair - Done
29,181,757 UART: [art] Signing Cert with AUTHO
29,183,067 UART: RITY.KEYID = 7
31,471,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,026 UART: [art] PUB.X = 56E276D1108F78AC98BDC184B1F2778897D345AD2DB1F84526711595D2D38F2C1D1726F7956EF96F16092FFF884194ED
31,480,234 UART: [art] PUB.Y = 33F6B89ACEB655EEF41FFA32FB27EC6D5A204248432628D5A50F1003ED72BF2C9645986F0F5FF02F9259021E3D550148
31,487,527 UART: [art] SIG.R = 81B28D83F8AD056912367ACDC42C3C7981455248E7AC61600AEC24032CE2EA0E6A06A61E7517601E8FA6FB6A1F8284BC
31,494,884 UART: [art] SIG.S = B2A8B535334DC64502E2411200BA328E82CD34DBA0CB729F6718B7F480BF284682F70F1F3BB89DE5EFF14BA268C2E824
32,799,765 UART: Caliptra RT
32,800,476 UART: [state] CFI Enabled
32,962,549 UART: [rt] RT listening for mailbox commands...
32,977,496 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,785,262 ready_for_fw is high
3,785,888 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,468 >>> mbox cmd response: success
17,870,099 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,568,173 UART:
23,568,899 UART: Running Caliptra FMC ...
23,570,037 UART:
23,570,196 UART: [state] CFI Enabled
23,621,437 UART: [fht] FMC Alias Private Key: 7
25,959,160 UART: [art] Extend RT PCRs Done
25,960,387 UART: [art] Lock RT PCRs Done
25,962,282 UART: [art] Populate DV Done
25,967,927 UART: [fht] FMC Alias Private Key: 7
25,969,522 UART: [art] Derive CDI
25,970,339 UART: [art] Store in in slot 0x4
26,028,705 UART: [art] Derive Key Pair
26,029,743 UART: [art] Store priv key in slot 0x5
29,322,608 UART: [art] Derive Key Pair - Done
29,335,541 UART: [art] Signing Cert with AUTHO
29,336,839 UART: RITY.KEYID = 7
31,624,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,517 UART: [art] PUB.X = 907BA8EDF8A3718BF92EB6377C40E79C52FDF220203512B83ABF3D38E9D94CEC49D5979FD70C2CAA556316C6039909EF
31,632,761 UART: [art] PUB.Y = 91137C784D40095DCDF129B9DFA276FBB5C1D8456CB5DD724C7237C9A27ACF25CD03089CF02A1DA389373AA1F874E251
31,640,007 UART: [art] SIG.R = 617B8458052F08F99E8B29A184FCD9C0FCEB49720CA5926B73DA840E5B7DCCED9ABEC5C4DAB8CC0992544C3F593D05DF
31,647,475 UART: [art] SIG.S = 03716A4EF4C7A88D50434E53742DFED050ACA537D0BA5DA99B22089D1673C4DC22EEFD5EF70E4DA2B29A63CEBA1F661F
32,952,286 UART: Caliptra RT
32,953,002 UART: [state] CFI Enabled
33,113,036 UART: [rt] RT listening for mailbox commands...
33,128,108 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,392 UART:
192,758 UART: Running Caliptra ROM ...
193,850 UART:
603,717 UART: [state] CFI Enabled
618,725 UART: [state] LifecycleState = Unprovisioned
620,725 UART: [state] DebugLocked = No
622,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,509 UART: [kat] SHA2-256
796,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,837 UART: [kat] ++
807,303 UART: [kat] sha1
819,517 UART: [kat] SHA2-256
822,168 UART: [kat] SHA2-384
829,464 UART: [kat] SHA2-512-ACC
831,800 UART: [kat] ECC-384
3,118,122 UART: [kat] HMAC-384Kdf
3,130,493 UART: [kat] LMS
4,320,595 UART: [kat] --
4,324,546 UART: [cold-reset] ++
4,325,769 UART: [fht] Storing FHT @ 0x50003400
4,337,882 UART: [idev] ++
4,338,448 UART: [idev] CDI.KEYID = 6
4,339,505 UART: [idev] SUBJECT.KEYID = 7
4,340,606 UART: [idev] UDS.KEYID = 0
4,341,591 ready_for_fw is high
4,341,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,161 UART: [idev] Erasing UDS.KEYID = 0
7,626,977 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,359 UART: [idev] --
7,652,827 UART: [ldev] ++
7,653,398 UART: [ldev] CDI.KEYID = 6
7,654,365 UART: [ldev] SUBJECT.KEYID = 5
7,655,574 UART: [ldev] AUTHORITY.KEYID = 7
7,656,850 UART: [ldev] FE.KEYID = 1
7,667,224 UART: [ldev] Erasing FE.KEYID = 1
10,957,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,475 UART: [ldev] --
13,317,790 UART: [fwproc] Waiting for Commands...
13,321,124 UART: [fwproc] Received command 0x46574c44
13,323,298 UART: [fwproc] Received Image of size 114124 bytes
17,374,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,984 >>> mbox cmd response: success
17,834,524 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,838,261 UART: [afmc] ++
17,838,840 UART: [afmc] CDI.KEYID = 6
17,839,719 UART: [afmc] SUBJECT.KEYID = 7
17,840,982 UART: [afmc] AUTHORITY.KEYID = 5
21,162,324 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,574 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,971 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,778 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,220 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,304 UART: [afmc] --
23,528,536 UART: [cold-reset] --
23,531,911 UART: [state] Locking Datavault
23,536,453 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,202 UART: [state] Locking ICCM
23,540,023 UART: [exit] Launching FMC @ 0x40000130
23,548,408 UART:
23,548,685 UART: Running Caliptra FMC ...
23,549,793 UART:
23,549,947 UART: [state] CFI Enabled
23,557,993 UART: [fht] FMC Alias Private Key: 7
25,889,161 UART: [art] Extend RT PCRs Done
25,890,379 UART: [art] Lock RT PCRs Done
25,891,915 UART: [art] Populate DV Done
25,897,613 UART: [fht] FMC Alias Private Key: 7
25,899,097 UART: [art] Derive CDI
25,899,829 UART: [art] Store in in slot 0x4
25,942,627 UART: [art] Derive Key Pair
25,943,618 UART: [art] Store priv key in slot 0x5
29,186,098 UART: [art] Derive Key Pair - Done
29,198,998 UART: [art] Signing Cert with AUTHO
29,200,293 UART: RITY.KEYID = 7
31,479,669 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,183 UART: [art] PUB.X = 64064A2E7311CF4F967E60B5BDC30BFEB66FF66A31AEEC06086EDA0CF53E464FE21D99A2464404147BB7D40F86651364
31,488,425 UART: [art] PUB.Y = 1108F39A1B3497EF03467A389BF4A7FAAACAA8625796F4E3336EE16AC3BEAD97591A592754241357B7C77931E5271E5B
31,495,712 UART: [art] SIG.R = 328C0E57F9FB260B043A37A4746CCAD973E0E084867310FAF320570CFD47F5381A74D44FA4E83D45CA5710C6D7936F41
31,503,036 UART: [art] SIG.S = 6A120DA0FE726A990F662ABA5CB615BF14C22257930BA2E2290C5B3BAD5716A3F6C92138F200739214DECA23995D5423
32,808,367 UART: Caliptra RT
32,809,072 UART: [state] CFI Enabled
32,927,446 UART: [rt] RT listening for mailbox commands...
32,942,334 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
4,126,882 ready_for_fw is high
4,127,316 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,979 >>> mbox cmd response: success
18,068,629 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,706,646 UART:
23,707,047 UART: Running Caliptra FMC ...
23,708,246 UART:
23,708,406 UART: [state] CFI Enabled
23,716,456 UART: [fht] FMC Alias Private Key: 7
26,047,732 UART: [art] Extend RT PCRs Done
26,048,950 UART: [art] Lock RT PCRs Done
26,050,628 UART: [art] Populate DV Done
26,056,201 UART: [fht] FMC Alias Private Key: 7
26,057,795 UART: [art] Derive CDI
26,058,612 UART: [art] Store in in slot 0x4
26,101,005 UART: [art] Derive Key Pair
26,102,047 UART: [art] Store priv key in slot 0x5
29,344,132 UART: [art] Derive Key Pair - Done
29,357,020 UART: [art] Signing Cert with AUTHO
29,358,326 UART: RITY.KEYID = 7
31,638,127 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,650 UART: [art] PUB.X = 20AC8F3C7829224330F5338C840724FE21AF6816E40B7B27AE9288D70CC449A9FCF1F57A909C23AF22E558914CC9D444
31,646,842 UART: [art] PUB.Y = FE51A8354500A39047B72D693B51CDA438734AB688B8C1803F8CC5BF3CD4329AD37096E6D127793E780F18C7B9EC77BC
31,654,081 UART: [art] SIG.R = B81B772DA4E5B62485E46901E0D65E019BE8D738EC3259CC9EA3DFA004497AA830E43F85E616C6DB203EE8BAE9AA5CD4
31,661,535 UART: [art] SIG.S = 3EB6DB2B10D7B869218EE8C9CC3AF6005C36584402A2BC096886D8A64DF2029369D2F2A9628EE9087B3E0D7D7B230FC1
32,966,995 UART: Caliptra RT
32,967,696 UART: [state] CFI Enabled
33,085,743 UART: [rt] RT listening for mailbox commands...
33,101,000 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,101 UART:
192,468 UART: Running Caliptra ROM ...
193,660 UART:
193,810 UART: [state] CFI Enabled
266,610 UART: [state] LifecycleState = Unprovisioned
268,465 UART: [state] DebugLocked = No
271,131 UART: [state] WD Timer not started. Device not locked for debugging
275,093 UART: [kat] SHA2-256
454,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,845 UART: [kat] ++
466,372 UART: [kat] sha1
476,472 UART: [kat] SHA2-256
479,479 UART: [kat] SHA2-384
486,882 UART: [kat] SHA2-512-ACC
489,883 UART: [kat] ECC-384
2,946,447 UART: [kat] HMAC-384Kdf
2,970,829 UART: [kat] LMS
3,500,299 UART: [kat] --
3,503,625 UART: [cold-reset] ++
3,505,493 UART: [fht] FHT @ 0x50003400
3,516,492 UART: [idev] ++
3,517,055 UART: [idev] CDI.KEYID = 6
3,517,982 UART: [idev] SUBJECT.KEYID = 7
3,519,158 UART: [idev] UDS.KEYID = 0
3,520,234 ready_for_fw is high
3,520,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,950 UART: [idev] Erasing UDS.KEYID = 0
6,028,088 UART: [idev] Sha1 KeyId Algorithm
6,051,364 UART: [idev] --
6,054,257 UART: [ldev] ++
6,054,836 UART: [ldev] CDI.KEYID = 6
6,055,727 UART: [ldev] SUBJECT.KEYID = 5
6,056,885 UART: [ldev] AUTHORITY.KEYID = 7
6,058,170 UART: [ldev] FE.KEYID = 1
6,099,308 UART: [ldev] Erasing FE.KEYID = 1
8,604,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,762 UART: [ldev] --
10,409,613 UART: [fwproc] Wait for Commands...
10,412,349 UART: [fwproc] Recv command 0x46574c44
10,414,436 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,545 >>> mbox cmd response: success
14,282,082 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,286,553 UART: [afmc] ++
14,287,170 UART: [afmc] CDI.KEYID = 6
14,288,268 UART: [afmc] SUBJECT.KEYID = 7
14,289,444 UART: [afmc] AUTHORITY.KEYID = 5
16,823,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,931 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,954 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,250 UART: [afmc] --
18,624,209 UART: [cold-reset] --
18,626,284 UART: [state] Locking Datavault
18,631,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,060 UART: [state] Locking ICCM
18,634,648 UART: [exit] Launching FMC @ 0x40000130
18,643,036 UART:
18,643,281 UART: Running Caliptra FMC ...
18,644,378 UART:
18,644,554 UART: [state] CFI Enabled
18,706,999 UART: [fht] FMC Alias Private Key: 7
20,471,489 UART: [art] Extend RT PCRs Done
20,472,702 UART: [art] Lock RT PCRs Done
20,474,622 UART: [art] Populate DV Done
20,480,193 UART: [fht] FMC Alias Private Key: 7
20,481,672 UART: [art] Derive CDI
20,482,437 UART: [art] Store in in slot 0x4
20,539,180 UART: [art] Derive Key Pair
20,540,220 UART: [art] Store priv key in slot 0x5
23,003,527 UART: [art] Derive Key Pair - Done
23,016,630 UART: [art] Signing Cert with AUTHO
23,017,963 UART: RITY.KEYID = 7
24,729,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,878 UART: [art] PUB.X = D73CF10B4128C76AB93C87EF4EA931655AF916D618EE5D14333FB534245EAAF5E81496B694F7656CE280CE8ABE9F4426
24,738,114 UART: [art] PUB.Y = 16D295E31661BF79C1C8703C98BA023C665987C2DBEA5FF1E768DAF7D7355810AD7ADC1385B46BC68FDCF7CCB4C4E0B2
24,745,422 UART: [art] SIG.R = 39628B5EB31A8146484BB6D497EF5CF69E9F401EC620B6573AD49FDA605D2F1AEC61C60557241CFFCBDAEEACCCD25534
24,752,813 UART: [art] SIG.S = 878A41006A5CB5EA1CF3DF618CCDBC5985D11C888D54070E3EA577888792A9F070B0301511908B323552DF373DD899D3
25,732,195 UART: Caliptra RT
25,732,892 UART: [state] CFI Enabled
25,897,939 UART: [rt] RT listening for mailbox commands...
25,913,240 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,362,357 ready_for_fw is high
3,362,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,458 >>> mbox cmd response: success
14,074,175 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,365,289 UART:
18,365,689 UART: Running Caliptra FMC ...
18,366,890 UART:
18,367,079 UART: [state] CFI Enabled
18,434,360 UART: [fht] FMC Alias Private Key: 7
20,198,272 UART: [art] Extend RT PCRs Done
20,199,496 UART: [art] Lock RT PCRs Done
20,201,286 UART: [art] Populate DV Done
20,206,640 UART: [fht] FMC Alias Private Key: 7
20,208,232 UART: [art] Derive CDI
20,209,045 UART: [art] Store in in slot 0x4
20,267,142 UART: [art] Derive Key Pair
20,268,182 UART: [art] Store priv key in slot 0x5
22,730,939 UART: [art] Derive Key Pair - Done
22,744,045 UART: [art] Signing Cert with AUTHO
22,745,345 UART: RITY.KEYID = 7
24,456,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,954 UART: [art] PUB.X = 66666DDDE2766A73F579CA7EB2D23A0AB0E208169C664741BD07EEA527FCD88C91962D1A3A5243F796E540F7A178F50F
24,465,211 UART: [art] PUB.Y = F90DCD2396CBB18061DEEB2E66B17739B291132E9FE8C8FEA59F56DE0F1857EFA700371D53686A41945148E159DC6BAE
24,472,444 UART: [art] SIG.R = 40C2126780C988CE9EB7C582CF957EE441B1B6B43BB4B506E144BD66BDF2E8D25FAF4BA19963C541947A655B2DC0C2E0
24,479,851 UART: [art] SIG.S = 5DA01C836B649A2FE9A7F519ED8AB0D78E2DD8791A59CA5ED1606CDB0472ABE4F3EF25F0D988B1731A6ABD2B3E0D6566
25,458,938 UART: Caliptra RT
25,459,640 UART: [state] CFI Enabled
25,624,452 UART: [rt] RT listening for mailbox commands...
25,639,885 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,436 UART:
192,803 UART: Running Caliptra ROM ...
193,929 UART:
603,780 UART: [state] CFI Enabled
620,506 UART: [state] LifecycleState = Unprovisioned
622,338 UART: [state] DebugLocked = No
624,294 UART: [state] WD Timer not started. Device not locked for debugging
628,807 UART: [kat] SHA2-256
807,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,480 UART: [kat] ++
820,006 UART: [kat] sha1
830,813 UART: [kat] SHA2-256
833,828 UART: [kat] SHA2-384
839,675 UART: [kat] SHA2-512-ACC
842,603 UART: [kat] ECC-384
3,284,326 UART: [kat] HMAC-384Kdf
3,297,920 UART: [kat] LMS
3,827,423 UART: [kat] --
3,831,855 UART: [cold-reset] ++
3,834,213 UART: [fht] FHT @ 0x50003400
3,845,962 UART: [idev] ++
3,846,515 UART: [idev] CDI.KEYID = 6
3,847,467 UART: [idev] SUBJECT.KEYID = 7
3,848,624 UART: [idev] UDS.KEYID = 0
3,849,587 ready_for_fw is high
3,849,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,617 UART: [idev] Erasing UDS.KEYID = 0
6,320,902 UART: [idev] Sha1 KeyId Algorithm
6,343,166 UART: [idev] --
6,346,552 UART: [ldev] ++
6,347,111 UART: [ldev] CDI.KEYID = 6
6,347,981 UART: [ldev] SUBJECT.KEYID = 5
6,349,137 UART: [ldev] AUTHORITY.KEYID = 7
6,350,382 UART: [ldev] FE.KEYID = 1
6,359,823 UART: [ldev] Erasing FE.KEYID = 1
8,834,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,802 UART: [ldev] --
10,624,231 UART: [fwproc] Wait for Commands...
10,626,912 UART: [fwproc] Recv command 0x46574c44
10,629,002 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,710 >>> mbox cmd response: success
14,493,202 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,496,116 UART: [afmc] ++
14,496,734 UART: [afmc] CDI.KEYID = 6
14,497,609 UART: [afmc] SUBJECT.KEYID = 7
14,498,820 UART: [afmc] AUTHORITY.KEYID = 5
16,996,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,477 UART: [afmc] --
18,791,104 UART: [cold-reset] --
18,795,232 UART: [state] Locking Datavault
18,802,309 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,999 UART: [state] Locking ICCM
18,806,407 UART: [exit] Launching FMC @ 0x40000130
18,814,849 UART:
18,815,078 UART: Running Caliptra FMC ...
18,816,171 UART:
18,816,320 UART: [state] CFI Enabled
18,824,272 UART: [fht] FMC Alias Private Key: 7
20,581,070 UART: [art] Extend RT PCRs Done
20,582,292 UART: [art] Lock RT PCRs Done
20,584,045 UART: [art] Populate DV Done
20,589,286 UART: [fht] FMC Alias Private Key: 7
20,590,825 UART: [art] Derive CDI
20,591,552 UART: [art] Store in in slot 0x4
20,634,256 UART: [art] Derive Key Pair
20,635,295 UART: [art] Store priv key in slot 0x5
23,061,362 UART: [art] Derive Key Pair - Done
23,074,625 UART: [art] Signing Cert with AUTHO
23,075,924 UART: RITY.KEYID = 7
24,780,884 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,387 UART: [art] PUB.X = AFAA858F0BCE31FAFBAA9CF27D63DCFF968A9F19E28F215A9B854AAB60B2DF3776E9849BB0DDCD738ECB004DBB306E67
24,789,679 UART: [art] PUB.Y = 1BA7A801187FA6AC08DA2767B9C25C1D0F6A75F8811424D34C739AE0968904FAFD88F226FEE1C4EA288D6C7EBA310209
24,796,949 UART: [art] SIG.R = 8817AB23B2A1933F570502E6A985A49C6A2132A95F7464CF6418CE24B9DE97845BAD38F3E2D33EE0EC2D2F6043F412D1
24,804,392 UART: [art] SIG.S = 9B1A873A94CB01CD1BA90275A9A62B6C598C3E789238D7CEB6788104D29FCB482B12A9FC5537B05F4159F336865A0AA4
25,783,419 UART: Caliptra RT
25,784,104 UART: [state] CFI Enabled
25,900,144 UART: [rt] RT listening for mailbox commands...
25,915,120 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,694,406 ready_for_fw is high
3,695,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,278 >>> mbox cmd response: success
14,281,927 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,537,783 UART:
18,538,175 UART: Running Caliptra FMC ...
18,539,361 UART:
18,539,512 UART: [state] CFI Enabled
18,547,185 UART: [fht] FMC Alias Private Key: 7
20,304,313 UART: [art] Extend RT PCRs Done
20,305,542 UART: [art] Lock RT PCRs Done
20,307,167 UART: [art] Populate DV Done
20,312,470 UART: [fht] FMC Alias Private Key: 7
20,314,059 UART: [art] Derive CDI
20,314,873 UART: [art] Store in in slot 0x4
20,357,507 UART: [art] Derive Key Pair
20,358,502 UART: [art] Store priv key in slot 0x5
22,785,235 UART: [art] Derive Key Pair - Done
22,798,394 UART: [art] Signing Cert with AUTHO
22,799,717 UART: RITY.KEYID = 7
24,505,351 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,857 UART: [art] PUB.X = C14D8D2D01942F76D869E7DBE4B6F73C7757B8B5AD688DEAB809A53F0DA0F6C1C597842FD85590FE7B4D71E4CDE77B1C
24,514,158 UART: [art] PUB.Y = 7AF57B41BF4CC88192118B42BD272BA30D78ABA028B20685EE48DF30AF6D3F84F3A551947C9E3865D3F5052D2C23F5A9
24,521,420 UART: [art] SIG.R = ECC1DA6BCB26625CF07E649C4DAF3FEB6A7BA4639D66B0E0D82F45FE937AABCCE1B130019B5064E4679E4B93C0D85ED2
24,528,856 UART: [art] SIG.S = 5942ADDB713AEBA27604A71368798D38259D0405C3CE5D8328DE00C3D8A1F61E6D27049E04FF59DAA425415B51161726
25,507,229 UART: Caliptra RT
25,507,928 UART: [state] CFI Enabled
25,626,446 UART: [rt] RT listening for mailbox commands...
25,641,589 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,031 UART:
192,399 UART: Running Caliptra ROM ...
193,554 UART:
193,699 UART: [state] CFI Enabled
267,525 UART: [state] LifecycleState = Unprovisioned
269,946 UART: [state] DebugLocked = No
271,474 UART: [state] WD Timer not started. Device not locked for debugging
276,068 UART: [kat] SHA2-256
465,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,715 UART: [kat] ++
477,167 UART: [kat] sha1
489,881 UART: [kat] SHA2-256
492,889 UART: [kat] SHA2-384
498,734 UART: [kat] SHA2-512-ACC
501,314 UART: [kat] ECC-384
2,948,716 UART: [kat] HMAC-384Kdf
2,972,601 UART: [kat] LMS
3,504,346 UART: [kat] --
3,509,186 UART: [cold-reset] ++
3,510,761 UART: [fht] FHT @ 0x50003400
3,522,587 UART: [idev] ++
3,523,292 UART: [idev] CDI.KEYID = 6
3,524,322 UART: [idev] SUBJECT.KEYID = 7
3,525,421 UART: [idev] UDS.KEYID = 0
3,526,343 ready_for_fw is high
3,526,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,465 UART: [idev] Erasing UDS.KEYID = 0
6,029,936 UART: [idev] Sha1 KeyId Algorithm
6,052,419 UART: [idev] --
6,058,011 UART: [ldev] ++
6,058,706 UART: [ldev] CDI.KEYID = 6
6,059,621 UART: [ldev] SUBJECT.KEYID = 5
6,060,837 UART: [ldev] AUTHORITY.KEYID = 7
6,062,016 UART: [ldev] FE.KEYID = 1
6,101,777 UART: [ldev] Erasing FE.KEYID = 1
8,608,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,358 UART: [ldev] --
10,414,346 UART: [fwproc] Wait for Commands...
10,416,872 UART: [fwproc] Recv command 0x46574c44
10,419,177 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,603,350 >>> mbox cmd response: success
14,603,858 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,607,222 UART: [afmc] ++
14,607,963 UART: [afmc] CDI.KEYID = 6
14,609,161 UART: [afmc] SUBJECT.KEYID = 7
14,610,598 UART: [afmc] AUTHORITY.KEYID = 5
17,149,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,127 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,960 UART: [afmc] --
18,947,980 UART: [cold-reset] --
18,952,660 UART: [state] Locking Datavault
18,958,452 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,587 UART: [state] Locking ICCM
18,963,332 UART: [exit] Launching FMC @ 0x40000130
18,972,012 UART:
18,972,246 UART: Running Caliptra FMC ...
18,973,344 UART:
18,973,501 UART: [state] CFI Enabled
19,028,452 UART: [fht] FMC Alias Private Key: 7
20,792,885 UART: [art] Extend RT PCRs Done
20,794,108 UART: [art] Lock RT PCRs Done
20,795,843 UART: [art] Populate DV Done
20,801,221 UART: [fht] FMC Alias Private Key: 7
20,802,868 UART: [art] Derive CDI
20,803,684 UART: [art] Store in in slot 0x4
20,860,869 UART: [art] Derive Key Pair
20,861,906 UART: [art] Store priv key in slot 0x5
23,324,053 UART: [art] Derive Key Pair - Done
23,336,753 UART: [art] Signing Cert with AUTHO
23,338,060 UART: RITY.KEYID = 7
25,049,667 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,162 UART: [art] PUB.X = 265EFECD6352310A535404641880A633540D16179AFA8AF1EFD274F3A76F726B492D44446AAEEC28277343F87174D719
25,058,398 UART: [art] PUB.Y = 33BE5973FA5FA76D192FED0C6DB2FFA2F7AAE48471A0E4CFE7A41FDA4B4B298F18F8538291276DE719C1E2205939409F
25,065,728 UART: [art] SIG.R = F1BD0BE1CA52C0C93AFF4F1E7B407966B316FAA76E08F395813F57DAF25185252277440455E258C0BCFA8F6C37FE9C86
25,073,113 UART: [art] SIG.S = 8BEDF7D397342F2786D4027886E9294ADE70A00F01BAD04BAD17D65D9CE9782D7D65121478A4FECEE4CF248036F296A3
26,051,931 UART: Caliptra RT
26,052,645 UART: [state] CFI Enabled
26,216,784 UART: [rt] RT listening for mailbox commands...
26,231,674 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,994 writing to cptra_bootfsm_go
3,439,434 ready_for_fw is high
3,440,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,717,850 >>> mbox cmd response: success
14,718,465 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,030,869 UART:
19,031,249 UART: Running Caliptra FMC ...
19,032,443 UART:
19,032,617 UART: [state] CFI Enabled
19,096,033 UART: [fht] FMC Alias Private Key: 7
20,859,731 UART: [art] Extend RT PCRs Done
20,860,952 UART: [art] Lock RT PCRs Done
20,862,871 UART: [art] Populate DV Done
20,868,495 UART: [fht] FMC Alias Private Key: 7
20,870,034 UART: [art] Derive CDI
20,870,772 UART: [art] Store in in slot 0x4
20,928,621 UART: [art] Derive Key Pair
20,929,660 UART: [art] Store priv key in slot 0x5
23,392,353 UART: [art] Derive Key Pair - Done
23,405,507 UART: [art] Signing Cert with AUTHO
23,406,812 UART: RITY.KEYID = 7
25,117,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,478 UART: [art] PUB.X = A96A1A8AA4B4FE070DDB7878C74E9795A5D5C92A67171F9AB09331A512F490C131011601C7027F4696E16CA989229F7E
25,126,770 UART: [art] PUB.Y = 2804133A63A3BB6837BE1D428DC4B7F211B3D235EBE203A7EDF51B9B846A19F1D9B9E50A5804E87C21A6106BA817A0FF
25,133,967 UART: [art] SIG.R = 6E476495E85745FE8913B53681FF09971232039897E59B7A26458A8A5E2002F0CF4BA962EDDFD64BA9E408B1B1D718DF
25,141,363 UART: [art] SIG.S = 69E77D8504337CE90A13203189D72996CAB9D46A825113A4F714F4DB4A400691DEE4BB23BE3EA1F67DA26CDD34A7C603
26,121,085 UART: Caliptra RT
26,121,787 UART: [state] CFI Enabled
26,285,378 UART: [rt] RT listening for mailbox commands...
26,300,843 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,421 UART:
192,798 UART: Running Caliptra ROM ...
193,934 UART:
603,693 UART: [state] CFI Enabled
616,347 UART: [state] LifecycleState = Unprovisioned
618,703 UART: [state] DebugLocked = No
620,640 UART: [state] WD Timer not started. Device not locked for debugging
626,005 UART: [kat] SHA2-256
815,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,636 UART: [kat] ++
827,150 UART: [kat] sha1
837,585 UART: [kat] SHA2-256
840,661 UART: [kat] SHA2-384
846,419 UART: [kat] SHA2-512-ACC
849,000 UART: [kat] ECC-384
3,293,735 UART: [kat] HMAC-384Kdf
3,306,751 UART: [kat] LMS
3,838,590 UART: [kat] --
3,842,376 UART: [cold-reset] ++
3,844,681 UART: [fht] FHT @ 0x50003400
3,856,433 UART: [idev] ++
3,857,140 UART: [idev] CDI.KEYID = 6
3,858,043 UART: [idev] SUBJECT.KEYID = 7
3,859,285 UART: [idev] UDS.KEYID = 0
3,860,204 ready_for_fw is high
3,860,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,226 UART: [idev] Erasing UDS.KEYID = 0
6,334,652 UART: [idev] Sha1 KeyId Algorithm
6,355,977 UART: [idev] --
6,361,399 UART: [ldev] ++
6,362,107 UART: [ldev] CDI.KEYID = 6
6,362,995 UART: [ldev] SUBJECT.KEYID = 5
6,364,203 UART: [ldev] AUTHORITY.KEYID = 7
6,365,426 UART: [ldev] FE.KEYID = 1
6,376,448 UART: [ldev] Erasing FE.KEYID = 1
8,855,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,736 UART: [ldev] --
10,644,527 UART: [fwproc] Wait for Commands...
10,647,529 UART: [fwproc] Recv command 0x46574c44
10,649,829 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,435 >>> mbox cmd response: success
14,835,919 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,839,700 UART: [afmc] ++
14,840,446 UART: [afmc] CDI.KEYID = 6
14,841,790 UART: [afmc] SUBJECT.KEYID = 7
14,843,138 UART: [afmc] AUTHORITY.KEYID = 5
17,342,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,270 UART: [afmc] --
19,137,474 UART: [cold-reset] --
19,141,490 UART: [state] Locking Datavault
19,147,000 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,195 UART: [state] Locking ICCM
19,151,613 UART: [exit] Launching FMC @ 0x40000130
19,160,280 UART:
19,160,502 UART: Running Caliptra FMC ...
19,161,822 UART:
19,161,982 UART: [state] CFI Enabled
19,169,917 UART: [fht] FMC Alias Private Key: 7
20,927,581 UART: [art] Extend RT PCRs Done
20,928,793 UART: [art] Lock RT PCRs Done
20,930,813 UART: [art] Populate DV Done
20,936,431 UART: [fht] FMC Alias Private Key: 7
20,937,901 UART: [art] Derive CDI
20,938,628 UART: [art] Store in in slot 0x4
20,981,369 UART: [art] Derive Key Pair
20,982,360 UART: [art] Store priv key in slot 0x5
23,408,667 UART: [art] Derive Key Pair - Done
23,421,566 UART: [art] Signing Cert with AUTHO
23,422,855 UART: RITY.KEYID = 7
25,128,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,405 UART: [art] PUB.X = 677571F8E0CC25F50F2E57F7CED192E07D2E94CEC44978D6F055CA720F9C621D01B192330D0B420E110651736DF846ED
25,137,659 UART: [art] PUB.Y = 989FDC52195F1B109B19C51DD63D3B5738BD7A9F9F1466E3DEFBD9B130695C2EF08AEDB201F1F231C6942B1B23646A15
25,144,939 UART: [art] SIG.R = 623CFF8B41ADEE76FDF151E8CCB3D79C1067D5A0CF3FEA9620B3A7646C04ABFDA4D34B504FE9E9E4B38D0E78B6A90906
25,152,373 UART: [art] SIG.S = 51DCB1B654A7954D3B7F4B3E7646E70B7EDD2E8B7CBDA445058A5840D8D47329A91F5E15238E2B7CD8B7C7FF0746A76A
26,130,891 UART: Caliptra RT
26,131,573 UART: [state] CFI Enabled
26,248,623 UART: [rt] RT listening for mailbox commands...
26,263,702 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,755,960 ready_for_fw is high
3,756,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,330 >>> mbox cmd response: success
14,962,020 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,209,035 UART:
19,209,444 UART: Running Caliptra FMC ...
19,210,630 UART:
19,210,786 UART: [state] CFI Enabled
19,218,624 UART: [fht] FMC Alias Private Key: 7
20,975,924 UART: [art] Extend RT PCRs Done
20,977,145 UART: [art] Lock RT PCRs Done
20,978,877 UART: [art] Populate DV Done
20,984,270 UART: [fht] FMC Alias Private Key: 7
20,985,809 UART: [art] Derive CDI
20,986,539 UART: [art] Store in in slot 0x4
21,028,808 UART: [art] Derive Key Pair
21,029,852 UART: [art] Store priv key in slot 0x5
23,456,266 UART: [art] Derive Key Pair - Done
23,469,210 UART: [art] Signing Cert with AUTHO
23,470,514 UART: RITY.KEYID = 7
25,175,849 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,376 UART: [art] PUB.X = ABF1F0E4633E6506A2F62F0FC681B7E94C4F05B4F5D8A68CA61C307761BEBEB83D1AA1B5D6D1A37DF64CF0CA694AF34E
25,184,613 UART: [art] PUB.Y = 04487689FCB495356BD9FC1FA54C773B84DF55FB899B16115389ED2BC93F7828DB3A11B814DA9744C7E7A22056C5E42E
25,191,907 UART: [art] SIG.R = 61259BE6DC72D37C42CA0714F6736AED63A1240C4EB50AF8BC8BA5546E4F8241856ACB4301457E99CF675D8F5F9045BF
25,199,284 UART: [art] SIG.S = 28D89227C9C1062FC27274BEC97D8AEB14D6567045D2B4214B4595DD2E21880E89C5606356C049461CF6D4FC27CB3AAC
26,178,425 UART: Caliptra RT
26,179,118 UART: [state] CFI Enabled
26,297,035 UART: [rt] RT listening for mailbox commands...
26,311,935 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,545 UART: [kat] SHA2-256
882,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,591 UART: [kat] ++
886,743 UART: [kat] sha1
890,923 UART: [kat] SHA2-256
892,861 UART: [kat] SHA2-384
895,420 UART: [kat] SHA2-512-ACC
897,321 UART: [kat] ECC-384
903,048 UART: [kat] HMAC-384Kdf
907,708 UART: [kat] LMS
1,475,904 UART: [kat] --
1,476,781 UART: [cold-reset] ++
1,477,233 UART: [fht] Storing FHT @ 0x50003400
1,480,054 UART: [idev] ++
1,480,222 UART: [idev] CDI.KEYID = 6
1,480,582 UART: [idev] SUBJECT.KEYID = 7
1,481,006 UART: [idev] UDS.KEYID = 0
1,481,351 ready_for_fw is high
1,481,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,982 UART: [idev] Erasing UDS.KEYID = 0
1,505,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,244 UART: [idev] --
1,515,287 UART: [ldev] ++
1,515,455 UART: [ldev] CDI.KEYID = 6
1,515,818 UART: [ldev] SUBJECT.KEYID = 5
1,516,244 UART: [ldev] AUTHORITY.KEYID = 7
1,516,707 UART: [ldev] FE.KEYID = 1
1,521,857 UART: [ldev] Erasing FE.KEYID = 1
1,547,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,144 UART: [ldev] --
1,586,461 UART: [fwproc] Waiting for Commands...
1,587,190 UART: [fwproc] Received command 0x46574c44
1,587,981 UART: [fwproc] Received Image of size 114448 bytes
2,887,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,940 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,313 >>> mbox cmd response: success
3,080,313 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,081,527 UART: [afmc] ++
3,081,695 UART: [afmc] CDI.KEYID = 6
3,082,057 UART: [afmc] SUBJECT.KEYID = 7
3,082,482 UART: [afmc] AUTHORITY.KEYID = 5
3,117,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,188 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,878 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,781 UART: [afmc] --
3,160,813 UART: [cold-reset] --
3,161,487 UART: [state] Locking Datavault
3,162,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,182 UART: [state] Locking ICCM
3,163,718 UART: [exit] Launching FMC @ 0x40000130
3,169,047 UART:
3,169,063 UART: Running Caliptra FMC ...
3,169,471 UART:
3,169,525 UART: [state] CFI Enabled
3,180,154 UART: [fht] FMC Alias Private Key: 7
3,287,651 UART: [art] Extend RT PCRs Done
3,288,079 UART: [art] Lock RT PCRs Done
3,289,693 UART: [art] Populate DV Done
3,297,992 UART: [fht] FMC Alias Private Key: 7
3,299,002 UART: [art] Derive CDI
3,299,282 UART: [art] Store in in slot 0x4
3,384,367 UART: [art] Derive Key Pair
3,384,727 UART: [art] Store priv key in slot 0x5
3,397,281 UART: [art] Derive Key Pair - Done
3,412,094 UART: [art] Signing Cert with AUTHO
3,412,574 UART: RITY.KEYID = 7
3,427,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,645 UART: [art] PUB.X = 39317CC454B7F5D7F64EBE655080662FB7778E9DCC9B54600DC85A3FB6C2D4286AF34FFEDCF7094D1C247A42EB793918
3,435,419 UART: [art] PUB.Y = 1A849F32BC61E79B792F6A8D58EEE814074B399C305C54E5EF35A9F28DA084272E80423248D66D4356F688B556EE510C
3,442,361 UART: [art] SIG.R = 2B2360FEC1788D920C230FA8CD9C411E608490DF3D600650BEA847B561748FFE3FAAD8266F757C5C5455C9AD7BAB16C4
3,449,132 UART: [art] SIG.S = CF77873D0E8195DB7EA0EF9E957134E2F9951EA409FED89848840F7744B8D8A604046EAABE5D7E75177E395F00A4024D
3,472,943 UART: Caliptra RT
3,473,196 UART: [state] CFI Enabled
3,581,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,930 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 ready_for_fw is high
1,362,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,727 >>> mbox cmd response: success
2,929,727 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,990,751 UART:
2,990,767 UART: Running Caliptra FMC ...
2,991,175 UART:
2,991,229 UART: [state] CFI Enabled
3,001,606 UART: [fht] FMC Alias Private Key: 7
3,109,769 UART: [art] Extend RT PCRs Done
3,110,197 UART: [art] Lock RT PCRs Done
3,111,649 UART: [art] Populate DV Done
3,119,870 UART: [fht] FMC Alias Private Key: 7
3,120,812 UART: [art] Derive CDI
3,121,092 UART: [art] Store in in slot 0x4
3,207,459 UART: [art] Derive Key Pair
3,207,819 UART: [art] Store priv key in slot 0x5
3,220,721 UART: [art] Derive Key Pair - Done
3,234,981 UART: [art] Signing Cert with AUTHO
3,235,461 UART: RITY.KEYID = 7
3,250,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,208 UART: [art] PUB.X = B36069763B7D7A004CBBF881BD8640CB5CA33D1F4AABFDB0119BCF947F593DC38A99AC7922DB7EF2B2650DDC3C536A3E
3,257,975 UART: [art] PUB.Y = A6B6CEC3C356E77523A4B5FE029AAC20B6BC4FBC01684F50A49C21A8E8D8C49624BF52B721633835DA4A551E8E262FD4
3,264,931 UART: [art] SIG.R = F8D7D2C3F26A35496D17FF2DD9D16EC346224FED0F032DF9EEC01875CF8C21D07750103415762AC27A080FCB3FF93B72
3,271,699 UART: [art] SIG.S = 69573BC68BD623B6B22CE703547CD45305D23762A7C0A07CD4293DAF87C4536D2EF093DBDD56B61141D2C2D058852BE6
3,295,934 UART: Caliptra RT
3,296,187 UART: [state] CFI Enabled
3,404,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,221 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,333 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,518 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,497 UART: [idev] Erasing UDS.KEYID = 0
1,505,905 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,571 UART: [idev] --
1,515,706 UART: [ldev] ++
1,515,874 UART: [ldev] CDI.KEYID = 6
1,516,237 UART: [ldev] SUBJECT.KEYID = 5
1,516,663 UART: [ldev] AUTHORITY.KEYID = 7
1,517,126 UART: [ldev] FE.KEYID = 1
1,522,388 UART: [ldev] Erasing FE.KEYID = 1
1,547,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,931 UART: [ldev] --
1,587,348 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 114448 bytes
2,888,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,290 >>> mbox cmd response: success
3,082,290 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,083,416 UART: [afmc] ++
3,083,584 UART: [afmc] CDI.KEYID = 6
3,083,946 UART: [afmc] SUBJECT.KEYID = 7
3,084,371 UART: [afmc] AUTHORITY.KEYID = 5
3,119,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,996 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,609 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,299 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,196 UART: [afmc] --
3,163,294 UART: [cold-reset] --
3,164,126 UART: [state] Locking Datavault
3,165,125 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,729 UART: [state] Locking ICCM
3,166,351 UART: [exit] Launching FMC @ 0x40000130
3,171,680 UART:
3,171,696 UART: Running Caliptra FMC ...
3,172,104 UART:
3,172,247 UART: [state] CFI Enabled
3,182,928 UART: [fht] FMC Alias Private Key: 7
3,290,565 UART: [art] Extend RT PCRs Done
3,290,993 UART: [art] Lock RT PCRs Done
3,292,519 UART: [art] Populate DV Done
3,300,820 UART: [fht] FMC Alias Private Key: 7
3,301,822 UART: [art] Derive CDI
3,302,102 UART: [art] Store in in slot 0x4
3,388,153 UART: [art] Derive Key Pair
3,388,513 UART: [art] Store priv key in slot 0x5
3,401,669 UART: [art] Derive Key Pair - Done
3,416,273 UART: [art] Signing Cert with AUTHO
3,416,753 UART: RITY.KEYID = 7
3,431,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,302 UART: [art] PUB.X = C01363128CBC666B261F870320268D45D44908F55602B2D2EC7DD91ED89C0EA5AB9B249AD613125F78B2DD7E7DE71050
3,439,062 UART: [art] PUB.Y = A2D9836485632452EE60054A70865EF7A2BCAE4C2B8540829797E9DABC71C37A396E38F58C22010D1404BE0D27B528D6
3,445,995 UART: [art] SIG.R = 28DC0A0C4277AAFE040214051C686462FA7D54B59A4280F915813F12FFA826EB5C2EA161B323BDC2B8C5B71328129BD7
3,452,754 UART: [art] SIG.S = 2EE69EAD509D1624D2125207F99A561B204FCD2FBBCCE4BAC51C4D24B23431D540FA67A8394FF0C6E6C31617047B929E
3,476,135 UART: Caliptra RT
3,476,480 UART: [state] CFI Enabled
3,584,976 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,929 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,328 ready_for_fw is high
1,363,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,610 >>> mbox cmd response: success
2,928,610 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,990,994 UART:
2,991,010 UART: Running Caliptra FMC ...
2,991,418 UART:
2,991,561 UART: [state] CFI Enabled
3,002,510 UART: [fht] FMC Alias Private Key: 7
3,110,907 UART: [art] Extend RT PCRs Done
3,111,335 UART: [art] Lock RT PCRs Done
3,112,753 UART: [art] Populate DV Done
3,120,740 UART: [fht] FMC Alias Private Key: 7
3,121,850 UART: [art] Derive CDI
3,122,130 UART: [art] Store in in slot 0x4
3,207,649 UART: [art] Derive Key Pair
3,208,009 UART: [art] Store priv key in slot 0x5
3,221,575 UART: [art] Derive Key Pair - Done
3,236,532 UART: [art] Signing Cert with AUTHO
3,237,012 UART: RITY.KEYID = 7
3,252,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,861 UART: [art] PUB.X = DA7C5D19EC5855BEAB08A1858C7044FBE05BF0F38ED9E5148483C0A8622FCDBE461E598D0ECEAB0B033997E4E1C6EA2D
3,259,641 UART: [art] PUB.Y = B71A2AB27C5D4CA882C8CD69C79B1E4BDA55085105268BE52630B516EBBE79148C65C14B875B28C381395E72958FC134
3,266,587 UART: [art] SIG.R = 453973BD7FAC0A8C6619EA73D5E6C43A2355068AE7B1CDDDC3F7D8C8666DCEE0F51B3355B5FD7A043F8A85498298C81F
3,273,362 UART: [art] SIG.S = E833B750C6BEDA127AD1FAA23C325646B27E5F230F9915387D39435C23EDDB6AA1FD6679DD2A05F446313026B402546F
3,296,630 UART: Caliptra RT
3,296,975 UART: [state] CFI Enabled
3,405,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,825 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,914 UART: [state] LifecycleState = Unprovisioned
86,569 UART: [state] DebugLocked = No
87,183 UART: [state] WD Timer not started. Device not locked for debugging
88,358 UART: [kat] SHA2-256
894,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,133 UART: [kat] ++
898,285 UART: [kat] sha1
902,407 UART: [kat] SHA2-256
904,347 UART: [kat] SHA2-384
907,106 UART: [kat] SHA2-512-ACC
909,007 UART: [kat] ECC-384
918,470 UART: [kat] HMAC-384Kdf
922,874 UART: [kat] LMS
1,171,202 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,468 UART: [idev] ++
1,175,636 UART: [idev] CDI.KEYID = 6
1,175,996 UART: [idev] SUBJECT.KEYID = 7
1,176,420 UART: [idev] UDS.KEYID = 0
1,176,765 ready_for_fw is high
1,176,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,201,785 UART: [idev] Sha1 KeyId Algorithm
1,210,217 UART: [idev] --
1,211,053 UART: [ldev] ++
1,211,221 UART: [ldev] CDI.KEYID = 6
1,211,584 UART: [ldev] SUBJECT.KEYID = 5
1,212,010 UART: [ldev] AUTHORITY.KEYID = 7
1,212,473 UART: [ldev] FE.KEYID = 1
1,217,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,898 UART: [fwproc] Wait for Commands...
1,283,538 UART: [fwproc] Recv command 0x46574c44
1,284,266 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,650 >>> mbox cmd response: success
2,775,650 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,776,664 UART: [afmc] ++
2,776,832 UART: [afmc] CDI.KEYID = 6
2,777,194 UART: [afmc] SUBJECT.KEYID = 7
2,777,619 UART: [afmc] AUTHORITY.KEYID = 5
2,813,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,609 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,781 UART: [afmc] --
2,856,671 UART: [cold-reset] --
2,857,781 UART: [state] Locking Datavault
2,858,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,574 UART: [state] Locking ICCM
2,860,198 UART: [exit] Launching FMC @ 0x40000130
2,865,527 UART:
2,865,543 UART: Running Caliptra FMC ...
2,865,951 UART:
2,866,005 UART: [state] CFI Enabled
2,876,022 UART: [fht] FMC Alias Private Key: 7
2,984,085 UART: [art] Extend RT PCRs Done
2,984,513 UART: [art] Lock RT PCRs Done
2,985,985 UART: [art] Populate DV Done
2,994,454 UART: [fht] FMC Alias Private Key: 7
2,995,536 UART: [art] Derive CDI
2,995,816 UART: [art] Store in in slot 0x4
3,081,797 UART: [art] Derive Key Pair
3,082,157 UART: [art] Store priv key in slot 0x5
3,095,359 UART: [art] Derive Key Pair - Done
3,109,801 UART: [art] Signing Cert with AUTHO
3,110,281 UART: RITY.KEYID = 7
3,125,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,464 UART: [art] PUB.X = FCE320504B852219130207CD9B0B4A671078190767CBD99EC4A865B9EC0866435170F82274982C0EDF50A82FBEE8BCA3
3,133,216 UART: [art] PUB.Y = 80AD862EBED662614D5BB8BBB8EA7A54A2AF61CA4E682611C225C043196B2B24B39AC134F2AA56738466EB1E6ACC9E81
3,140,180 UART: [art] SIG.R = 1763273CC4223ACEC73C96F2F9CFABDC34CE3D23BAD427A0D46F17C7177F8BA9D8B48476A65C835B6E1594A190875102
3,146,955 UART: [art] SIG.S = A107F338C39956BE616360E71C35565D3ED7A22B8D5B1A7903B2452E1C70B89D3F7024CAFEBB9B88E8036C58112315E7
3,171,663 UART: Caliptra RT
3,171,916 UART: [state] CFI Enabled
3,280,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,134 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,075 ready_for_fw is high
1,061,075 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,209 >>> mbox cmd response: success
2,629,209 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,691,687 UART:
2,691,703 UART: Running Caliptra FMC ...
2,692,111 UART:
2,692,165 UART: [state] CFI Enabled
2,702,440 UART: [fht] FMC Alias Private Key: 7
2,810,233 UART: [art] Extend RT PCRs Done
2,810,661 UART: [art] Lock RT PCRs Done
2,812,261 UART: [art] Populate DV Done
2,820,474 UART: [fht] FMC Alias Private Key: 7
2,821,616 UART: [art] Derive CDI
2,821,896 UART: [art] Store in in slot 0x4
2,907,459 UART: [art] Derive Key Pair
2,907,819 UART: [art] Store priv key in slot 0x5
2,920,667 UART: [art] Derive Key Pair - Done
2,935,300 UART: [art] Signing Cert with AUTHO
2,935,780 UART: RITY.KEYID = 7
2,951,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,903 UART: [art] PUB.X = EE96981483EDFEB9557629DBEBBA418C9EA0A59D36C0835598FC671E18E95B6ADA2DD81242D58404458F27C5B8ED07A0
2,958,677 UART: [art] PUB.Y = C09F641EA2DFE3B83BA68318C264B85E17B4C9D1BF3F8799AD6EE4BA9AD816CD6003D098F6E6402BC290262797D5AA9E
2,965,638 UART: [art] SIG.R = 2FB91C2680E495212C824000A0B8D0ACF8DAED251ABD78A816DD3EB31438D1A36967B97C56EDF129A9D34087F647958B
2,972,392 UART: [art] SIG.S = 0B2A89FAF8BECDE79CF63D51CF94541FED8DEA7516E13AF6EA33D8CA67036C1D186E43A3336211EB2470911BB6B6C3E4
2,995,791 UART: Caliptra RT
2,996,044 UART: [state] CFI Enabled
3,103,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,117,466 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
902,212 UART: [kat] SHA2-256
904,152 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,383 UART: [kat] LMS
1,171,711 UART: [kat] --
1,172,380 UART: [cold-reset] ++
1,172,938 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,786 UART: [idev] Sha1 KeyId Algorithm
1,210,060 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,217,546 UART: [ldev] Erasing FE.KEYID = 1
1,243,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,656 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,609 UART: [fwproc] Recv command 0x46574c44
1,284,337 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,315 >>> mbox cmd response: success
2,776,315 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,777,371 UART: [afmc] ++
2,777,539 UART: [afmc] CDI.KEYID = 6
2,777,901 UART: [afmc] SUBJECT.KEYID = 7
2,778,326 UART: [afmc] AUTHORITY.KEYID = 5
2,813,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,352 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,080 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,458 UART: [afmc] --
2,857,402 UART: [cold-reset] --
2,858,420 UART: [state] Locking Datavault
2,859,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,449 UART: [state] Locking ICCM
2,860,993 UART: [exit] Launching FMC @ 0x40000130
2,866,322 UART:
2,866,338 UART: Running Caliptra FMC ...
2,866,746 UART:
2,866,889 UART: [state] CFI Enabled
2,877,614 UART: [fht] FMC Alias Private Key: 7
2,985,823 UART: [art] Extend RT PCRs Done
2,986,251 UART: [art] Lock RT PCRs Done
2,987,701 UART: [art] Populate DV Done
2,996,254 UART: [fht] FMC Alias Private Key: 7
2,997,310 UART: [art] Derive CDI
2,997,590 UART: [art] Store in in slot 0x4
3,083,679 UART: [art] Derive Key Pair
3,084,039 UART: [art] Store priv key in slot 0x5
3,097,473 UART: [art] Derive Key Pair - Done
3,112,377 UART: [art] Signing Cert with AUTHO
3,112,857 UART: RITY.KEYID = 7
3,127,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,724 UART: [art] PUB.X = 03C518D86A4DE00AFC02BDE0D2BF052182152F56A2F68AEEE43AEC525739FC69F6F4247DEEFF05DE55C29E0277BCD2CC
3,135,498 UART: [art] PUB.Y = C1D02EF680FEB8D65452239C60C197842DDC36E99ED25AFE9668265013C8E5B1C4B34EB76428CE801CF8BE17CC08C975
3,142,453 UART: [art] SIG.R = AF8C726823E121D4B2DABDC5A539B1F8F9E871F179731B9FEBF3D406BEA0DC7EDE24165A58A317B97414903DCE053E7E
3,149,233 UART: [art] SIG.S = 3DA321E61C2FD7E46AFF72206CEA6D28D1E641CA6814E9A010B47ADE52E7D69C69EB1A6BCFEDA7459628C32711208E54
3,172,836 UART: Caliptra RT
3,173,181 UART: [state] CFI Enabled
3,281,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,471 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,920 ready_for_fw is high
1,060,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,992 >>> mbox cmd response: success
2,630,992 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,693,630 UART:
2,693,646 UART: Running Caliptra FMC ...
2,694,054 UART:
2,694,197 UART: [state] CFI Enabled
2,704,422 UART: [fht] FMC Alias Private Key: 7
2,812,333 UART: [art] Extend RT PCRs Done
2,812,761 UART: [art] Lock RT PCRs Done
2,813,983 UART: [art] Populate DV Done
2,822,074 UART: [fht] FMC Alias Private Key: 7
2,823,180 UART: [art] Derive CDI
2,823,460 UART: [art] Store in in slot 0x4
2,908,983 UART: [art] Derive Key Pair
2,909,343 UART: [art] Store priv key in slot 0x5
2,923,569 UART: [art] Derive Key Pair - Done
2,938,065 UART: [art] Signing Cert with AUTHO
2,938,545 UART: RITY.KEYID = 7
2,953,897 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,662 UART: [art] PUB.X = 503102FF10C2E770DCB50EE61854F5DEF2D03E56BEAA307EF49BAC21F00C14A65774845718CCCD57C1912876F52C22F3
2,961,431 UART: [art] PUB.Y = 003A4A1AD1D34DBC3C4260FE1AE5DEDA8684BE0D27A9BE3871BD06B58AC8152537F87831AED92F23AFB0C4AF0B4A2BE4
2,968,374 UART: [art] SIG.R = B75F1168DC088A327923FCE85FCE564450B1D4D57764A496F38CC0D4736F6C0F9915B8C611B1AD7C3A35B47B6D98046A
2,975,139 UART: [art] SIG.S = C3C458115A482E66B6EE2C6460D7202F6F75075ADBDBA3BB4DF5C3E9A817A3646AF19B482BA880D91C176EF9A872A223
2,999,125 UART: Caliptra RT
2,999,470 UART: [state] CFI Enabled
3,107,606 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,033 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,549 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,830 UART: [ldev] --
1,280,104 UART: [fwproc] Wait for Commands...
1,280,773 UART: [fwproc] Recv command 0x46574c44
1,281,506 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,650 >>> mbox cmd response: success
2,773,650 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,774,681 UART: [afmc] ++
2,774,849 UART: [afmc] CDI.KEYID = 6
2,775,212 UART: [afmc] SUBJECT.KEYID = 7
2,775,638 UART: [afmc] AUTHORITY.KEYID = 5
2,811,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,048 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,476 UART: [afmc] --
2,854,550 UART: [cold-reset] --
2,855,298 UART: [state] Locking Datavault
2,856,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,175 UART: [state] Locking ICCM
2,857,795 UART: [exit] Launching FMC @ 0x40000130
2,863,124 UART:
2,863,140 UART: Running Caliptra FMC ...
2,863,548 UART:
2,863,602 UART: [state] CFI Enabled
2,874,117 UART: [fht] FMC Alias Private Key: 7
2,981,804 UART: [art] Extend RT PCRs Done
2,982,232 UART: [art] Lock RT PCRs Done
2,983,756 UART: [art] Populate DV Done
2,991,989 UART: [fht] FMC Alias Private Key: 7
2,993,041 UART: [art] Derive CDI
2,993,321 UART: [art] Store in in slot 0x4
3,078,822 UART: [art] Derive Key Pair
3,079,182 UART: [art] Store priv key in slot 0x5
3,092,476 UART: [art] Derive Key Pair - Done
3,106,925 UART: [art] Signing Cert with AUTHO
3,107,405 UART: RITY.KEYID = 7
3,122,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,480 UART: [art] PUB.X = 3922924702F240A966D1A246A69EF08083431E61E4DEA1D5716E780B3700DDBF2786F1392AEAF60FC1E93782BA44E3E4
3,130,219 UART: [art] PUB.Y = 11BCD380DAEEA3437A55D2F5F7F13C923F000C0832E07B9659462B3D6C58FA82FC29096E58F70ECD0A2259ADAA4F3A45
3,137,144 UART: [art] SIG.R = 6A2751CDB5001A016E87C003CA17569BC5EF97C7EE992FDDF91389EC7339399FD3D9A716F1AF9334983AFE1F4B003F77
3,143,872 UART: [art] SIG.S = 1C0B494722AA979D19D0113C655452B4D6A9C2D142E7E6DF50872B2ED16F273008E2C87BA5A672D06DE00AC2301CE17B
3,167,364 UART: Caliptra RT
3,167,617 UART: [state] CFI Enabled
3,275,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,705 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,836 ready_for_fw is high
1,055,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,410 >>> mbox cmd response: success
2,622,410 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,460 UART:
2,684,476 UART: Running Caliptra FMC ...
2,684,884 UART:
2,684,938 UART: [state] CFI Enabled
2,694,973 UART: [fht] FMC Alias Private Key: 7
2,802,546 UART: [art] Extend RT PCRs Done
2,802,974 UART: [art] Lock RT PCRs Done
2,804,314 UART: [art] Populate DV Done
2,812,515 UART: [fht] FMC Alias Private Key: 7
2,813,675 UART: [art] Derive CDI
2,813,955 UART: [art] Store in in slot 0x4
2,899,438 UART: [art] Derive Key Pair
2,899,798 UART: [art] Store priv key in slot 0x5
2,912,986 UART: [art] Derive Key Pair - Done
2,927,674 UART: [art] Signing Cert with AUTHO
2,928,154 UART: RITY.KEYID = 7
2,942,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,465 UART: [art] PUB.X = 4BD409B7D25A5CB8BB9A2E73932243D0779B2E92442F5FFF3E4A9A38803A686AFD6C5A02D461B21F9F1DBA564C10B38D
2,950,241 UART: [art] PUB.Y = 1E1A7AB183AA2D2853E8A0EA41442CA8D4B1634A1055AA9F33DD1B8187F848E4C93517108908718F6FE25D21ACC10F00
2,957,167 UART: [art] SIG.R = 88ECE9C04CF6BEBC8A79A14673CEAD240BDF8EFDFF1EE09EE8AC93905D80BCCD8938FE9C83E852FEF428C7DC261CDFED
2,963,972 UART: [art] SIG.S = 2B68B4AE8A0C4725242CB40BFB966344A3D06E07BFAE20F98899F28BB1304AF2D80DFE8C57082EA9E7BDBE9420AFCBD7
2,987,628 UART: Caliptra RT
2,987,881 UART: [state] CFI Enabled
3,096,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,110,097 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,478 UART: [kat] SHA2-256
901,418 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 ready_for_fw is high
1,174,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,200,104 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,587 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,933 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,991 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,455 >>> mbox cmd response: success
2,774,455 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,484 UART: [afmc] ++
2,775,652 UART: [afmc] CDI.KEYID = 6
2,776,015 UART: [afmc] SUBJECT.KEYID = 7
2,776,441 UART: [afmc] AUTHORITY.KEYID = 5
2,811,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,965 UART: [afmc] --
2,854,967 UART: [cold-reset] --
2,855,727 UART: [state] Locking Datavault
2,856,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,370 UART: [state] Locking ICCM
2,857,792 UART: [exit] Launching FMC @ 0x40000130
2,863,121 UART:
2,863,137 UART: Running Caliptra FMC ...
2,863,545 UART:
2,863,688 UART: [state] CFI Enabled
2,874,399 UART: [fht] FMC Alias Private Key: 7
2,982,508 UART: [art] Extend RT PCRs Done
2,982,936 UART: [art] Lock RT PCRs Done
2,984,668 UART: [art] Populate DV Done
2,993,225 UART: [fht] FMC Alias Private Key: 7
2,994,245 UART: [art] Derive CDI
2,994,525 UART: [art] Store in in slot 0x4
3,079,870 UART: [art] Derive Key Pair
3,080,230 UART: [art] Store priv key in slot 0x5
3,093,394 UART: [art] Derive Key Pair - Done
3,108,325 UART: [art] Signing Cert with AUTHO
3,108,805 UART: RITY.KEYID = 7
3,123,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,670 UART: [art] PUB.X = 2D715CE809C20F5E400018A2C28D79CF8CE4F4E004C02CF4698BA95DC5B68EF75B3D0B650352C2A14B4E937BC5247C4C
3,131,413 UART: [art] PUB.Y = C418017C6B6FF0EBA7030500530A6FD7CFB86D2054381963B531764D6E31D47313816BC869D106A48CE66C2B17A0D27F
3,138,324 UART: [art] SIG.R = 8354EE97C97959158670D68978B2F1E6CD6A3EBEC029B395D1011F1037C896918883C0EBC2060D1943C07D8743FD8699
3,145,077 UART: [art] SIG.S = 8771B9DC4E1324716086AE0536B695863D8DF94B4D306CC9716D00CAFD1BBC4590BFD6335258558885C7893687CE390A
3,168,552 UART: Caliptra RT
3,168,897 UART: [state] CFI Enabled
3,276,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,540 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,473 ready_for_fw is high
1,056,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,749 >>> mbox cmd response: success
2,624,749 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,687,263 UART:
2,687,279 UART: Running Caliptra FMC ...
2,687,687 UART:
2,687,830 UART: [state] CFI Enabled
2,697,907 UART: [fht] FMC Alias Private Key: 7
2,806,046 UART: [art] Extend RT PCRs Done
2,806,474 UART: [art] Lock RT PCRs Done
2,808,068 UART: [art] Populate DV Done
2,816,465 UART: [fht] FMC Alias Private Key: 7
2,817,583 UART: [art] Derive CDI
2,817,863 UART: [art] Store in in slot 0x4
2,903,466 UART: [art] Derive Key Pair
2,903,826 UART: [art] Store priv key in slot 0x5
2,916,858 UART: [art] Derive Key Pair - Done
2,931,539 UART: [art] Signing Cert with AUTHO
2,932,019 UART: RITY.KEYID = 7
2,947,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,436 UART: [art] PUB.X = 4647902EC9A4540E5FFCB18138EC7D77BCAB16A16A01A9DD5806F87B94F07D0D151D835D4C5DA39F819DF1C28AF75C47
2,955,206 UART: [art] PUB.Y = 81C38596396298CD5D2383A84A7B9790A282E13F733EA76BE5DFD83B9127288D76F92C3F4D50A71BEF0AAC81F4D2FAA3
2,962,161 UART: [art] SIG.R = 6973B7FFCAF988C6FBD0744442F308E84EACC4D20FE019C0406BDB4C24ED5B9184FAB49F8E50FC9A08C7E299DD802C11
2,968,940 UART: [art] SIG.S = 600977B53B7896EB041FFDE7604F0BCA7EDE2E7650DA57B5F05358AFF5A5696232086FF3643250FA3B46A0902243E12D
2,993,391 UART: Caliptra RT
2,993,736 UART: [state] CFI Enabled
3,102,427 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,632 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,206 UART:
192,564 UART: Running Caliptra ROM ...
193,705 UART:
193,858 UART: [state] CFI Enabled
264,800 UART: [state] LifecycleState = Unprovisioned
266,724 UART: [state] DebugLocked = No
268,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,838 UART: [kat] SHA2-256
442,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,008 UART: [kat] ++
453,495 UART: [kat] sha1
463,824 UART: [kat] SHA2-256
466,478 UART: [kat] SHA2-384
472,894 UART: [kat] SHA2-512-ACC
475,257 UART: [kat] ECC-384
2,770,591 UART: [kat] HMAC-384Kdf
2,800,651 UART: [kat] LMS
3,990,978 UART: [kat] --
3,996,679 UART: [cold-reset] ++
3,997,827 UART: [fht] Storing FHT @ 0x50003400
4,008,452 UART: [idev] ++
4,009,021 UART: [idev] CDI.KEYID = 6
4,009,941 UART: [idev] SUBJECT.KEYID = 7
4,011,190 UART: [idev] UDS.KEYID = 0
4,012,222 ready_for_fw is high
4,012,428 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,992 UART: [idev] Erasing UDS.KEYID = 0
7,344,489 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,460 UART: [idev] --
7,372,185 UART: [ldev] ++
7,372,807 UART: [ldev] CDI.KEYID = 6
7,373,745 UART: [ldev] SUBJECT.KEYID = 5
7,374,952 UART: [ldev] AUTHORITY.KEYID = 7
7,376,244 UART: [ldev] FE.KEYID = 1
7,422,080 UART: [ldev] Erasing FE.KEYID = 1
10,757,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,329 UART: [ldev] --
13,133,833 UART: [fwproc] Waiting for Commands...
13,136,794 UART: [fwproc] Received command 0x46574c44
13,138,995 UART: [fwproc] Received Image of size 114124 bytes
17,193,765 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,305 >>> mbox cmd response: success
17,663,084 UART: [afmc] ++
17,663,689 UART: [afmc] CDI.KEYID = 6
17,664,602 UART: [afmc] SUBJECT.KEYID = 7
17,665,877 UART: [afmc] AUTHORITY.KEYID = 5
21,026,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,261 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,730 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,552 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,975 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,386,928 UART: [afmc] --
23,391,573 UART: [cold-reset] --
23,394,896 UART: [state] Locking Datavault
23,399,929 UART: [state] Locking PCR0, PCR1 and PCR31
23,401,681 UART: [state] Locking ICCM
23,404,181 UART: [exit] Launching FMC @ 0x40000130
23,412,530 UART:
23,412,812 UART: Running Caliptra FMC ...
23,413,848 UART:
23,414,000 UART: [state] CFI Enabled
23,480,862 UART: [fht] FMC Alias Private Key: 7
25,819,001 UART: [art] Extend RT PCRs Done
25,820,231 UART: [art] Lock RT PCRs Done
25,821,993 UART: [art] Populate DV Done
25,827,030 UART: [fht] FMC Alias Private Key: 7
25,828,520 UART: [art] Derive CDI
25,829,253 UART: [art] Store in in slot 0x4
25,888,475 UART: [art] Derive Key Pair
25,889,518 UART: [art] Store priv key in slot 0x5
29,182,401 UART: [art] Derive Key Pair - Done
29,195,336 UART: [art] Signing Cert with AUTHO
29,196,644 UART: RITY.KEYID = 7
31,484,126 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,638 UART: [art] PUB.X = CB805D0B800B7F9B6149939ED0D42DACEEDDB7EBEF23DA68547A81E95F0A05E48508178D7F1A600DD9418E13E840CD07
31,492,923 UART: [art] PUB.Y = 8DB16C507E368E9B67DC405208F5630240B133F166D32E1C03488D16139320B594B979504707535D89572CDAD0E7AB1D
31,500,129 UART: [art] SIG.R = 4C88F92647214176ED4270EA4EACE43F80E1FA8FC4FA0B9CBBAA7D3CC6C647A9D24B68332639B20F4084F55E8657EF28
31,507,536 UART: [art] SIG.S = A90B310D6A358039A54AEF826D6C3718FB3AA1260FCE93006B9DA2DA2BC58EC0312EC0F8249082E64389F64DD90BEBD9
32,812,636 UART: Caliptra RT
32,813,349 UART: [state] CFI Enabled
32,976,782 UART: [rt] RT listening for mailbox commands...
32,979,591 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,011,128 UART: [rt]cmd =0x53494756, len=196
34,303,109 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,784,327 ready_for_fw is high
3,784,758 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,870 >>> mbox cmd response: success
23,551,683 UART:
23,552,064 UART: Running Caliptra FMC ...
23,553,203 UART:
23,553,369 UART: [state] CFI Enabled
23,619,330 UART: [fht] FMC Alias Private Key: 7
25,957,790 UART: [art] Extend RT PCRs Done
25,959,016 UART: [art] Lock RT PCRs Done
25,960,437 UART: [art] Populate DV Done
25,966,129 UART: [fht] FMC Alias Private Key: 7
25,967,845 UART: [art] Derive CDI
25,968,669 UART: [art] Store in in slot 0x4
26,026,764 UART: [art] Derive Key Pair
26,027,815 UART: [art] Store priv key in slot 0x5
29,320,379 UART: [art] Derive Key Pair - Done
29,333,444 UART: [art] Signing Cert with AUTHO
29,334,749 UART: RITY.KEYID = 7
31,621,259 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,771 UART: [art] PUB.X = 9FA61C8093F85795B55EE619FBCADAB6A4D672AD1CD630910B6B722BDF29ED786629DCA9E7FEAB1B220B6797DCF172F4
31,630,028 UART: [art] PUB.Y = 87F2D2F067229C7DFE4F8E00240B7BAB9954DE43E4FBB14456B0AF12AB35C7B2D8AA5E13CC8475DC0A20B9DE6FA1304F
31,637,324 UART: [art] SIG.R = 70F5F8C8621BD7DE507F6EA227EA4CDA5E2B7D28FBF2A9700615D58A0F5A717357C808EF4F807E8C7C74F6708D359DE0
31,644,719 UART: [art] SIG.S = 95EBBBB0812A50A8F5477FBC8381B58A0053DE9D1220DE98FF56AFFBD347C1D8CE95613D93512863644FA4D26569B408
32,949,753 UART: Caliptra RT
32,950,470 UART: [state] CFI Enabled
33,111,036 UART: [rt] RT listening for mailbox commands...
33,113,858 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,145,691 UART: [rt]cmd =0x53494756, len=196
34,437,416 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,737 writing to cptra_bootfsm_go
194,039 UART:
194,414 UART: Running Caliptra ROM ...
195,520 UART:
605,313 UART: [state] CFI Enabled
622,370 UART: [state] LifecycleState = Unprovisioned
624,309 UART: [state] DebugLocked = No
625,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,351 UART: [kat] SHA2-256
801,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,616 UART: [kat] ++
812,064 UART: [kat] sha1
824,452 UART: [kat] SHA2-256
827,181 UART: [kat] SHA2-384
832,239 UART: [kat] SHA2-512-ACC
834,601 UART: [kat] ECC-384
3,119,682 UART: [kat] HMAC-384Kdf
3,131,430 UART: [kat] LMS
4,321,584 UART: [kat] --
4,325,150 UART: [cold-reset] ++
4,326,932 UART: [fht] Storing FHT @ 0x50003400
4,338,617 UART: [idev] ++
4,339,177 UART: [idev] CDI.KEYID = 6
4,340,153 UART: [idev] SUBJECT.KEYID = 7
4,341,321 UART: [idev] UDS.KEYID = 0
4,342,376 ready_for_fw is high
4,342,619 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,023 UART: [idev] Erasing UDS.KEYID = 0
7,631,908 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,827 UART: [idev] --
7,656,741 UART: [ldev] ++
7,657,357 UART: [ldev] CDI.KEYID = 6
7,658,311 UART: [ldev] SUBJECT.KEYID = 5
7,659,509 UART: [ldev] AUTHORITY.KEYID = 7
7,660,784 UART: [ldev] FE.KEYID = 1
7,672,291 UART: [ldev] Erasing FE.KEYID = 1
10,961,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,951 UART: [ldev] --
13,320,584 UART: [fwproc] Waiting for Commands...
13,323,804 UART: [fwproc] Received command 0x46574c44
13,325,977 UART: [fwproc] Received Image of size 114124 bytes
17,374,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,118 >>> mbox cmd response: success
17,839,211 UART: [afmc] ++
17,839,856 UART: [afmc] CDI.KEYID = 6
17,840,757 UART: [afmc] SUBJECT.KEYID = 7
17,841,985 UART: [afmc] AUTHORITY.KEYID = 5
21,160,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,113 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,526 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,350 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,807 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,308 UART: [afmc] --
23,530,267 UART: [cold-reset] --
23,534,681 UART: [state] Locking Datavault
23,538,577 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,326 UART: [state] Locking ICCM
23,541,610 UART: [exit] Launching FMC @ 0x40000130
23,549,950 UART:
23,550,186 UART: Running Caliptra FMC ...
23,551,285 UART:
23,551,440 UART: [state] CFI Enabled
23,559,829 UART: [fht] FMC Alias Private Key: 7
25,890,508 UART: [art] Extend RT PCRs Done
25,891,720 UART: [art] Lock RT PCRs Done
25,893,259 UART: [art] Populate DV Done
25,898,560 UART: [fht] FMC Alias Private Key: 7
25,900,016 UART: [art] Derive CDI
25,900,784 UART: [art] Store in in slot 0x4
25,943,709 UART: [art] Derive Key Pair
25,944,746 UART: [art] Store priv key in slot 0x5
29,187,075 UART: [art] Derive Key Pair - Done
29,200,338 UART: [art] Signing Cert with AUTHO
29,201,818 UART: RITY.KEYID = 7
31,481,077 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,586 UART: [art] PUB.X = 15F9F8D36532EFA010E5784C0282ED77F6285F84355C3151311E5605161C955F79C0231BBA9A08C753D26B2E8F955EC4
31,489,763 UART: [art] PUB.Y = CC8B67130DED62C2F87F2CBAC3DF1C80615F97356D8D3BB16F11F5935021BCEA46907CB6C7EFC3EFC1C8A2E6EE66E5BB
31,497,079 UART: [art] SIG.R = 7D6FE5DA150E7EF4F5A39D9133DC4A1647C6073A61AEA92A810EAC0F55408CE5FFC3B1E53239932A6FB34FDAF2CB694F
31,504,461 UART: [art] SIG.S = 33851BA30B521873DEE254DB957FC93AC8A7E4D224782A02A0A0AE22CAE80B9D16F9E4315E0D108F134F51D7DA905789
32,809,391 UART: Caliptra RT
32,810,115 UART: [state] CFI Enabled
32,927,609 UART: [rt] RT listening for mailbox commands...
32,930,364 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,961,824 UART: [rt]cmd =0x53494756, len=196
34,253,279 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
4,132,432 ready_for_fw is high
4,133,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,082,887 >>> mbox cmd response: success
23,720,705 UART:
23,721,087 UART: Running Caliptra FMC ...
23,722,197 UART:
23,722,344 UART: [state] CFI Enabled
23,730,563 UART: [fht] FMC Alias Private Key: 7
26,061,214 UART: [art] Extend RT PCRs Done
26,062,455 UART: [art] Lock RT PCRs Done
26,064,216 UART: [art] Populate DV Done
26,069,290 UART: [fht] FMC Alias Private Key: 7
26,070,945 UART: [art] Derive CDI
26,071,683 UART: [art] Store in in slot 0x4
26,114,921 UART: [art] Derive Key Pair
26,115,920 UART: [art] Store priv key in slot 0x5
29,357,896 UART: [art] Derive Key Pair - Done
29,371,060 UART: [art] Signing Cert with AUTHO
29,372,372 UART: RITY.KEYID = 7
31,651,981 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,484 UART: [art] PUB.X = BEDDFBEF31EE2C7086762EF7B58207156914FF5569D76F689AC636CD8EB62FEE932E5008BE79324EB901991046B29C68
31,660,719 UART: [art] PUB.Y = 0A0B23E622C8706EB804CB755E360A3AF5F391161AA2C4F740E1791551E9C1CD22E86B3BEC48068FCFBEF3A268B3B14E
31,667,975 UART: [art] SIG.R = A374D55ADF329D4FDCB7701CB500871F2893932E0D821CBD8B8EBE7EDBAAA7CE9B889C407942C0B4A3951DB4430F9228
31,675,378 UART: [art] SIG.S = ABAA998FC041A44277F6EF0900926AFB2BAF04FC03013827238952AA2F367EA99C318ABA638724DA139F09167BD2C9C9
32,979,711 UART: Caliptra RT
32,980,431 UART: [state] CFI Enabled
33,099,112 UART: [rt] RT listening for mailbox commands...
33,101,859 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,133,399 UART: [rt]cmd =0x53494756, len=196
34,424,907 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,101 UART:
192,464 UART: Running Caliptra ROM ...
193,557 UART:
193,701 UART: [state] CFI Enabled
263,661 UART: [state] LifecycleState = Unprovisioned
265,533 UART: [state] DebugLocked = No
266,768 UART: [state] WD Timer not started. Device not locked for debugging
270,444 UART: [kat] SHA2-256
449,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,133 UART: [kat] ++
461,685 UART: [kat] sha1
473,279 UART: [kat] SHA2-256
476,285 UART: [kat] SHA2-384
481,487 UART: [kat] SHA2-512-ACC
484,419 UART: [kat] ECC-384
2,948,480 UART: [kat] HMAC-384Kdf
2,971,302 UART: [kat] LMS
3,500,788 UART: [kat] --
3,504,043 UART: [cold-reset] ++
3,505,979 UART: [fht] FHT @ 0x50003400
3,517,166 UART: [idev] ++
3,517,726 UART: [idev] CDI.KEYID = 6
3,518,645 UART: [idev] SUBJECT.KEYID = 7
3,519,820 UART: [idev] UDS.KEYID = 0
3,520,743 ready_for_fw is high
3,520,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,984 UART: [idev] Erasing UDS.KEYID = 0
6,029,996 UART: [idev] Sha1 KeyId Algorithm
6,051,734 UART: [idev] --
6,055,410 UART: [ldev] ++
6,056,060 UART: [ldev] CDI.KEYID = 6
6,056,958 UART: [ldev] SUBJECT.KEYID = 5
6,057,984 UART: [ldev] AUTHORITY.KEYID = 7
6,059,330 UART: [ldev] FE.KEYID = 1
6,101,008 UART: [ldev] Erasing FE.KEYID = 1
8,601,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,193 UART: [ldev] --
10,394,597 UART: [fwproc] Wait for Commands...
10,396,764 UART: [fwproc] Recv command 0x46574c44
10,398,803 UART: [fwproc] Recv'd Img size: 114448 bytes
13,809,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,265,614 >>> mbox cmd response: success
14,269,805 UART: [afmc] ++
14,270,404 UART: [afmc] CDI.KEYID = 6
14,271,290 UART: [afmc] SUBJECT.KEYID = 7
14,272,504 UART: [afmc] AUTHORITY.KEYID = 5
16,808,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,204 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,501 UART: [afmc] --
18,607,503 UART: [cold-reset] --
18,613,735 UART: [state] Locking Datavault
18,618,607 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,249 UART: [state] Locking ICCM
18,622,481 UART: [exit] Launching FMC @ 0x40000130
18,630,873 UART:
18,631,103 UART: Running Caliptra FMC ...
18,632,126 UART:
18,632,274 UART: [state] CFI Enabled
18,692,368 UART: [fht] FMC Alias Private Key: 7
20,456,444 UART: [art] Extend RT PCRs Done
20,457,661 UART: [art] Lock RT PCRs Done
20,459,421 UART: [art] Populate DV Done
20,464,775 UART: [fht] FMC Alias Private Key: 7
20,466,422 UART: [art] Derive CDI
20,467,254 UART: [art] Store in in slot 0x4
20,525,056 UART: [art] Derive Key Pair
20,526,100 UART: [art] Store priv key in slot 0x5
22,989,418 UART: [art] Derive Key Pair - Done
23,002,296 UART: [art] Signing Cert with AUTHO
23,003,626 UART: RITY.KEYID = 7
24,715,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,036 UART: [art] PUB.X = CAD6ACD431E85FD4BF91C7000B22DB1BAFC579B9DB0D447347A2156CDBA564BFA8DE62A3D9B22FAC43F4260153B45076
24,724,284 UART: [art] PUB.Y = 61E79A89A9EEE825CB51D852046EF06805B7B63538F777C766040EC70B53890FBDA185EA3ECF019DE4A039F972174E8A
24,731,570 UART: [art] SIG.R = 18C9D37E92B5AADAF5A5757EB6D687EA2CA120ECAF9E475578030FFAA0D66688A1C199511D7C61CF79EF894C7A52B22D
24,739,017 UART: [art] SIG.S = B785B9BCEAC3C785FFF4C7CC3701DFE58A69C8F117CE1BE1B1DFA19090344CF24ABB47EFF38A209CFFF3B37373072F97
25,718,562 UART: Caliptra RT
25,719,260 UART: [state] CFI Enabled
25,884,123 UART: [rt] RT listening for mailbox commands...
25,886,914 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,919,234 UART: [rt]cmd =0x53494756, len=196
26,884,687 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,982 writing to cptra_bootfsm_go
3,359,972 ready_for_fw is high
3,360,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,061,657 >>> mbox cmd response: success
18,362,567 UART:
18,362,965 UART: Running Caliptra FMC ...
18,364,151 UART:
18,364,321 UART: [state] CFI Enabled
18,429,890 UART: [fht] FMC Alias Private Key: 7
20,193,989 UART: [art] Extend RT PCRs Done
20,195,201 UART: [art] Lock RT PCRs Done
20,196,741 UART: [art] Populate DV Done
20,202,203 UART: [fht] FMC Alias Private Key: 7
20,203,906 UART: [art] Derive CDI
20,204,724 UART: [art] Store in in slot 0x4
20,261,780 UART: [art] Derive Key Pair
20,262,823 UART: [art] Store priv key in slot 0x5
22,725,583 UART: [art] Derive Key Pair - Done
22,738,583 UART: [art] Signing Cert with AUTHO
22,739,889 UART: RITY.KEYID = 7
24,451,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,742 UART: [art] PUB.X = 3EF999536C050ADD48D71492615AAEEC39A672F2EC6FED85227EE78E99FD8347A9335C5D378736813B40450C7D27A167
24,460,060 UART: [art] PUB.Y = B1272A2212627BACE8319683B311E63DD80A640C56E2635D7EAEA05D5E418082173E1FFB1CD3FAEF87E775960DA4C228
24,467,282 UART: [art] SIG.R = 6380B00BBC87D6B9502447839D442E127E5E53D6BF069DB606E49A4248E4F9AEF5472F748517860A5B37CCCC47C00A10
24,474,699 UART: [art] SIG.S = 9AE3EFA273DDBF2716788917F2C9A7DF783BE3BA0BA604F9450DB6C181635BD2987FEC052F7AC90CB8D2B46CE10C1385
25,453,700 UART: Caliptra RT
25,454,415 UART: [state] CFI Enabled
25,618,342 UART: [rt] RT listening for mailbox commands...
25,621,074 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,653,117 UART: [rt]cmd =0x53494756, len=196
26,618,321 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,371 UART:
192,741 UART: Running Caliptra ROM ...
193,874 UART:
603,520 UART: [state] CFI Enabled
620,802 UART: [state] LifecycleState = Unprovisioned
622,668 UART: [state] DebugLocked = No
625,529 UART: [state] WD Timer not started. Device not locked for debugging
629,328 UART: [kat] SHA2-256
808,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,052 UART: [kat] ++
820,498 UART: [kat] sha1
830,883 UART: [kat] SHA2-256
833,896 UART: [kat] SHA2-384
838,746 UART: [kat] SHA2-512-ACC
841,723 UART: [kat] ECC-384
3,281,811 UART: [kat] HMAC-384Kdf
3,294,178 UART: [kat] LMS
3,823,701 UART: [kat] --
3,829,270 UART: [cold-reset] ++
3,831,273 UART: [fht] FHT @ 0x50003400
3,842,030 UART: [idev] ++
3,842,585 UART: [idev] CDI.KEYID = 6
3,843,556 UART: [idev] SUBJECT.KEYID = 7
3,844,719 UART: [idev] UDS.KEYID = 0
3,845,758 ready_for_fw is high
3,845,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,654 UART: [idev] Erasing UDS.KEYID = 0
6,315,585 UART: [idev] Sha1 KeyId Algorithm
6,337,575 UART: [idev] --
6,342,216 UART: [ldev] ++
6,342,777 UART: [ldev] CDI.KEYID = 6
6,343,783 UART: [ldev] SUBJECT.KEYID = 5
6,344,881 UART: [ldev] AUTHORITY.KEYID = 7
6,346,157 UART: [ldev] FE.KEYID = 1
6,358,199 UART: [ldev] Erasing FE.KEYID = 1
8,831,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,789 UART: [ldev] --
10,623,083 UART: [fwproc] Wait for Commands...
10,624,912 UART: [fwproc] Recv command 0x46574c44
10,627,014 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,554 >>> mbox cmd response: success
14,500,312 UART: [afmc] ++
14,500,908 UART: [afmc] CDI.KEYID = 6
14,501,813 UART: [afmc] SUBJECT.KEYID = 7
14,503,023 UART: [afmc] AUTHORITY.KEYID = 5
17,000,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,613 UART: [afmc] --
18,800,706 UART: [cold-reset] --
18,805,586 UART: [state] Locking Datavault
18,812,075 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,775 UART: [state] Locking ICCM
18,816,186 UART: [exit] Launching FMC @ 0x40000130
18,824,631 UART:
18,824,863 UART: Running Caliptra FMC ...
18,825,957 UART:
18,826,110 UART: [state] CFI Enabled
18,834,091 UART: [fht] FMC Alias Private Key: 7
20,591,152 UART: [art] Extend RT PCRs Done
20,592,372 UART: [art] Lock RT PCRs Done
20,594,372 UART: [art] Populate DV Done
20,599,613 UART: [fht] FMC Alias Private Key: 7
20,601,199 UART: [art] Derive CDI
20,601,962 UART: [art] Store in in slot 0x4
20,644,470 UART: [art] Derive Key Pair
20,645,473 UART: [art] Store priv key in slot 0x5
23,072,301 UART: [art] Derive Key Pair - Done
23,084,964 UART: [art] Signing Cert with AUTHO
23,086,296 UART: RITY.KEYID = 7
24,791,949 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,443 UART: [art] PUB.X = 21655CE3E966DD87F76EA71CC5785222B3DD96B87325D51E837E809904AB3B9A11BA7A37767527AB51F49706F06730F0
24,800,725 UART: [art] PUB.Y = E8DFDFC9E08E86B113506B68C5DD66F9B68F0646DFDA5C0606D3805C05996A848CA676E8990773447BE7D181031EC212
24,807,940 UART: [art] SIG.R = 6EDDD9BF8010204108445B10072CDD4E138FB91A553074B55A08A792847422D78923AA26BABDE96B890EFBB6E86E5A42
24,815,365 UART: [art] SIG.S = 763C78C75CADDCDA9B48C1193BF5925981FF8A5145DF5D506A709C2CADE77FE9FBDA7C1A0F48403A22569B0C221407AE
25,794,149 UART: Caliptra RT
25,794,862 UART: [state] CFI Enabled
25,911,984 UART: [rt] RT listening for mailbox commands...
25,914,767 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,946,075 UART: [rt]cmd =0x53494756, len=196
26,911,732 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,695,976 ready_for_fw is high
3,696,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,411 >>> mbox cmd response: success
18,532,073 UART:
18,532,479 UART: Running Caliptra FMC ...
18,533,680 UART:
18,533,830 UART: [state] CFI Enabled
18,541,596 UART: [fht] FMC Alias Private Key: 7
20,298,943 UART: [art] Extend RT PCRs Done
20,300,148 UART: [art] Lock RT PCRs Done
20,301,554 UART: [art] Populate DV Done
20,306,893 UART: [fht] FMC Alias Private Key: 7
20,308,371 UART: [art] Derive CDI
20,309,127 UART: [art] Store in in slot 0x4
20,351,553 UART: [art] Derive Key Pair
20,352,588 UART: [art] Store priv key in slot 0x5
22,779,679 UART: [art] Derive Key Pair - Done
22,792,460 UART: [art] Signing Cert with AUTHO
22,793,788 UART: RITY.KEYID = 7
24,499,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,878 UART: [art] PUB.X = 9E6FF0CC77DE963559FC60F542E6A22D5172F8435D3A34A30BCFE9ACAA98541946E8631668907EC673FA48DD111B6ED2
24,508,159 UART: [art] PUB.Y = 12D1A9B236C3DD7A871F67D3A6737B0018EB54578D93138E439C7E2B6669E06872578C23B85F319AC7577A85249E4A20
24,515,392 UART: [art] SIG.R = FADB75536CC725FA8E24EFA87B8104895BDEBBBE9C4D9CE86637E748993C881E6B279C51CDE57F8FC3AC2D33B2F7DB2A
24,522,817 UART: [art] SIG.S = 5818BD98095CAEEDFB00D02B6E345E15F46BE22D6D3208CD6B945B002212DB75C10F2B19920DFFDEFFBD0B4D20BCA64A
25,502,412 UART: Caliptra RT
25,503,127 UART: [state] CFI Enabled
25,621,177 UART: [rt] RT listening for mailbox commands...
25,623,930 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,655,389 UART: [rt]cmd =0x53494756, len=196
26,620,940 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,126 UART:
192,489 UART: Running Caliptra ROM ...
193,683 UART:
193,842 UART: [state] CFI Enabled
261,378 UART: [state] LifecycleState = Unprovisioned
263,437 UART: [state] DebugLocked = No
265,040 UART: [state] WD Timer not started. Device not locked for debugging
269,013 UART: [kat] SHA2-256
458,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,636 UART: [kat] ++
470,087 UART: [kat] sha1
481,991 UART: [kat] SHA2-256
485,035 UART: [kat] SHA2-384
490,680 UART: [kat] SHA2-512-ACC
493,253 UART: [kat] ECC-384
2,947,365 UART: [kat] HMAC-384Kdf
2,970,686 UART: [kat] LMS
3,502,480 UART: [kat] --
3,507,817 UART: [cold-reset] ++
3,508,819 UART: [fht] FHT @ 0x50003400
3,521,444 UART: [idev] ++
3,522,187 UART: [idev] CDI.KEYID = 6
3,523,120 UART: [idev] SUBJECT.KEYID = 7
3,524,293 UART: [idev] UDS.KEYID = 0
3,525,236 ready_for_fw is high
3,525,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,217 UART: [idev] Erasing UDS.KEYID = 0
6,028,256 UART: [idev] Sha1 KeyId Algorithm
6,050,485 UART: [idev] --
6,055,883 UART: [ldev] ++
6,056,562 UART: [ldev] CDI.KEYID = 6
6,057,448 UART: [ldev] SUBJECT.KEYID = 5
6,058,658 UART: [ldev] AUTHORITY.KEYID = 7
6,059,892 UART: [ldev] FE.KEYID = 1
6,100,503 UART: [ldev] Erasing FE.KEYID = 1
8,599,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,101 UART: [ldev] --
10,391,718 UART: [fwproc] Wait for Commands...
10,394,182 UART: [fwproc] Recv command 0x46574c44
10,396,445 UART: [fwproc] Recv'd Img size: 114448 bytes
13,837,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,028,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,571,155 >>> mbox cmd response: success
14,575,129 UART: [afmc] ++
14,575,833 UART: [afmc] CDI.KEYID = 6
14,577,083 UART: [afmc] SUBJECT.KEYID = 7
14,578,521 UART: [afmc] AUTHORITY.KEYID = 5
17,108,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,546 UART: [afmc] --
18,923,872 UART: [cold-reset] --
18,928,059 UART: [state] Locking Datavault
18,934,558 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,696 UART: [state] Locking ICCM
18,938,194 UART: [exit] Launching FMC @ 0x40000130
18,946,867 UART:
18,947,103 UART: Running Caliptra FMC ...
18,948,200 UART:
18,948,360 UART: [state] CFI Enabled
19,007,918 UART: [fht] FMC Alias Private Key: 7
20,771,365 UART: [art] Extend RT PCRs Done
20,772,579 UART: [art] Lock RT PCRs Done
20,774,256 UART: [art] Populate DV Done
20,779,678 UART: [fht] FMC Alias Private Key: 7
20,781,373 UART: [art] Derive CDI
20,782,182 UART: [art] Store in in slot 0x4
20,840,467 UART: [art] Derive Key Pair
20,841,500 UART: [art] Store priv key in slot 0x5
23,304,327 UART: [art] Derive Key Pair - Done
23,317,049 UART: [art] Signing Cert with AUTHO
23,318,354 UART: RITY.KEYID = 7
25,031,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,032,738 UART: [art] PUB.X = 0383EF5B5726B0EF64FEBD80F1F4885DD197B85BD8722285B9DCC08900C3B7E574EF71110AD3C5A0B4D7AC62002B35E1
25,039,824 UART: [art] PUB.Y = 15BC3329B065C7A11D5BE0423E7EDA15115A9DA62CF9B75AA433986A68A17C4BE9DD229DAF66D31730DCC204597AEC04
25,047,104 UART: [art] SIG.R = 4F26CC1FC7BF987725499F6B65A8301555F1DAB220FF27981BAA34E248A94D41CCED8378BDF941E37B0CCAF4B0A1DCFA
25,054,491 UART: [art] SIG.S = 0C428FC1F5224B1E3E11D3E0594522B0C2C98FA46D8C9B013E629EBA95A3EC99272B4D3D5C7D1C694F698AD1B7A58EF2
26,033,247 UART: Caliptra RT
26,033,936 UART: [state] CFI Enabled
26,199,420 UART: [rt] RT listening for mailbox commands...
26,202,217 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,234,273 UART: [rt]cmd =0x53494756, len=196
27,200,243 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,442,679 ready_for_fw is high
3,443,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,400 >>> mbox cmd response: success
19,052,141 UART:
19,052,553 UART: Running Caliptra FMC ...
19,053,678 UART:
19,053,838 UART: [state] CFI Enabled
19,118,988 UART: [fht] FMC Alias Private Key: 7
20,883,449 UART: [art] Extend RT PCRs Done
20,884,660 UART: [art] Lock RT PCRs Done
20,886,218 UART: [art] Populate DV Done
20,891,474 UART: [fht] FMC Alias Private Key: 7
20,893,066 UART: [art] Derive CDI
20,893,884 UART: [art] Store in in slot 0x4
20,951,518 UART: [art] Derive Key Pair
20,952,580 UART: [art] Store priv key in slot 0x5
23,415,984 UART: [art] Derive Key Pair - Done
23,429,190 UART: [art] Signing Cert with AUTHO
23,430,486 UART: RITY.KEYID = 7
25,142,230 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,721 UART: [art] PUB.X = 3000086CEB044A69571F56A96759603764AC425CE3A5904DB4587995D3FD80F29C80B8E18B95A4B48E25BD4490D06A16
25,150,958 UART: [art] PUB.Y = 19156284FD71070D444195F691D9008194E841AB7E7938394772702A96BA1865987D9F01347CFCCA88294013F4232AC5
25,158,156 UART: [art] SIG.R = 31DA3D42C74EA4EEE85F1261815172A3AAD31D13C3B6B233EE7474FD75ECD03AC5FA286D8269B8BC27AD6C9916EA1F98
25,165,638 UART: [art] SIG.S = BA2B05D40216B1544F25BAA7679609289C51EF052D77D0AA0DC03D45EF91A7028241DD8EA2A5F93F386E3610EB9B3ADB
26,144,504 UART: Caliptra RT
26,145,212 UART: [state] CFI Enabled
26,310,899 UART: [rt] RT listening for mailbox commands...
26,313,665 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,345,956 UART: [rt]cmd =0x53494756, len=196
27,311,339 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,448 UART:
192,825 UART: Running Caliptra ROM ...
194,006 UART:
603,773 UART: [state] CFI Enabled
616,389 UART: [state] LifecycleState = Unprovisioned
618,790 UART: [state] DebugLocked = No
620,602 UART: [state] WD Timer not started. Device not locked for debugging
625,262 UART: [kat] SHA2-256
815,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,939 UART: [kat] ++
826,532 UART: [kat] sha1
838,398 UART: [kat] SHA2-256
841,394 UART: [kat] SHA2-384
846,273 UART: [kat] SHA2-512-ACC
848,888 UART: [kat] ECC-384
3,292,029 UART: [kat] HMAC-384Kdf
3,305,538 UART: [kat] LMS
3,837,360 UART: [kat] --
3,843,434 UART: [cold-reset] ++
3,844,722 UART: [fht] FHT @ 0x50003400
3,856,465 UART: [idev] ++
3,857,092 UART: [idev] CDI.KEYID = 6
3,858,066 UART: [idev] SUBJECT.KEYID = 7
3,859,303 UART: [idev] UDS.KEYID = 0
3,860,216 ready_for_fw is high
3,860,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,111 UART: [idev] Erasing UDS.KEYID = 0
6,336,800 UART: [idev] Sha1 KeyId Algorithm
6,358,353 UART: [idev] --
6,362,795 UART: [ldev] ++
6,363,465 UART: [ldev] CDI.KEYID = 6
6,364,431 UART: [ldev] SUBJECT.KEYID = 5
6,365,742 UART: [ldev] AUTHORITY.KEYID = 7
6,366,931 UART: [ldev] FE.KEYID = 1
6,378,384 UART: [ldev] Erasing FE.KEYID = 1
8,857,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,872 UART: [ldev] --
10,648,182 UART: [fwproc] Wait for Commands...
10,651,021 UART: [fwproc] Recv command 0x46574c44
10,653,328 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,839,969 >>> mbox cmd response: success
14,843,380 UART: [afmc] ++
14,844,081 UART: [afmc] CDI.KEYID = 6
14,845,213 UART: [afmc] SUBJECT.KEYID = 7
14,846,792 UART: [afmc] AUTHORITY.KEYID = 5
17,350,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,219 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,125 UART: [afmc] --
19,145,654 UART: [cold-reset] --
19,149,848 UART: [state] Locking Datavault
19,155,766 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,912 UART: [state] Locking ICCM
19,160,386 UART: [exit] Launching FMC @ 0x40000130
19,169,069 UART:
19,169,351 UART: Running Caliptra FMC ...
19,170,381 UART:
19,170,522 UART: [state] CFI Enabled
19,178,887 UART: [fht] FMC Alias Private Key: 7
20,935,308 UART: [art] Extend RT PCRs Done
20,936,527 UART: [art] Lock RT PCRs Done
20,938,007 UART: [art] Populate DV Done
20,943,367 UART: [fht] FMC Alias Private Key: 7
20,944,898 UART: [art] Derive CDI
20,945,622 UART: [art] Store in in slot 0x4
20,988,146 UART: [art] Derive Key Pair
20,989,135 UART: [art] Store priv key in slot 0x5
23,416,322 UART: [art] Derive Key Pair - Done
23,429,254 UART: [art] Signing Cert with AUTHO
23,430,552 UART: RITY.KEYID = 7
25,136,121 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,619 UART: [art] PUB.X = 5EF542E6C041CB51798C23936E3EDA6C7567FF6FEF6CED17D21D1A1E2869A116F1F6E45312C5A6CCF3283537F44F580E
25,144,889 UART: [art] PUB.Y = 050DB2936F783775A68AF408F379C1D7420540B85E162F93F347D2AE985EAB749F53CA19A2E826C9CC3772974695437F
25,152,152 UART: [art] SIG.R = A2FB2BEDBBAC7AA2C9185A5171208BA95E30E50101A0C12CC20181F0DC86C1EA64B117AFBAF06C630A8F00F55BD69FF4
25,159,517 UART: [art] SIG.S = 6C2A50A9D7B99F17F1ABDCBBB2BD65AC2C272C4EBA61909DD00BC2FC275C847D2BC1634505BAAE7D9D36104E15B472BF
26,138,440 UART: Caliptra RT
26,139,121 UART: [state] CFI Enabled
26,256,819 UART: [rt] RT listening for mailbox commands...
26,259,613 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,291,142 UART: [rt]cmd =0x53494756, len=196
27,256,637 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,996 writing to cptra_bootfsm_go
3,760,501 ready_for_fw is high
3,760,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,973,218 >>> mbox cmd response: success
19,225,988 UART:
19,226,401 UART: Running Caliptra FMC ...
19,227,538 UART:
19,227,708 UART: [state] CFI Enabled
19,235,473 UART: [fht] FMC Alias Private Key: 7
20,992,675 UART: [art] Extend RT PCRs Done
20,993,896 UART: [art] Lock RT PCRs Done
20,995,545 UART: [art] Populate DV Done
21,001,008 UART: [fht] FMC Alias Private Key: 7
21,002,670 UART: [art] Derive CDI
21,003,410 UART: [art] Store in in slot 0x4
21,046,326 UART: [art] Derive Key Pair
21,047,369 UART: [art] Store priv key in slot 0x5
23,474,496 UART: [art] Derive Key Pair - Done
23,487,436 UART: [art] Signing Cert with AUTHO
23,488,729 UART: RITY.KEYID = 7
25,193,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,247 UART: [art] PUB.X = C4390A85E833EFE1F463913F6C976755078D9495FD005C11AAFE21CD2684F881783405027D222E6E48E8370AFE8C5EDD
25,202,549 UART: [art] PUB.Y = E462C6883307224269EF77388F02D0A01E67A35056A18563D47F4AD9934CA41E95F0BBD0879122A83D0965046FF789CF
25,209,744 UART: [art] SIG.R = 05AC9895DF814624893F174B7C8F0693B32E9F688AB9CA2F64632EE803322153EFD96734A81D340C4DCB6BA8C96FC102
25,217,133 UART: [art] SIG.S = A6D2F403D2DE3E6AB802C0E3B84F8EF9A37AABEC809E3031C0136D6BADF0CB39C735F44E00D587C6E96B981B9AF20889
26,196,397 UART: Caliptra RT
26,197,148 UART: [state] CFI Enabled
26,315,023 UART: [rt] RT listening for mailbox commands...
26,317,827 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,349,415 UART: [rt]cmd =0x53494756, len=196
27,314,953 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Unprovisioned
86,381 UART: [state] DebugLocked = No
87,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,711 UART: [kat] SHA2-256
882,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,757 UART: [kat] ++
886,909 UART: [kat] sha1
891,179 UART: [kat] SHA2-256
893,117 UART: [kat] SHA2-384
895,928 UART: [kat] SHA2-512-ACC
897,829 UART: [kat] ECC-384
903,708 UART: [kat] HMAC-384Kdf
908,478 UART: [kat] LMS
1,476,674 UART: [kat] --
1,477,689 UART: [cold-reset] ++
1,478,121 UART: [fht] Storing FHT @ 0x50003400
1,480,966 UART: [idev] ++
1,481,134 UART: [idev] CDI.KEYID = 6
1,481,494 UART: [idev] SUBJECT.KEYID = 7
1,481,918 UART: [idev] UDS.KEYID = 0
1,482,263 ready_for_fw is high
1,482,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,164 UART: [idev] Erasing UDS.KEYID = 0
1,506,690 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,240 UART: [idev] --
1,516,387 UART: [ldev] ++
1,516,555 UART: [ldev] CDI.KEYID = 6
1,516,918 UART: [ldev] SUBJECT.KEYID = 5
1,517,344 UART: [ldev] AUTHORITY.KEYID = 7
1,517,807 UART: [ldev] FE.KEYID = 1
1,522,807 UART: [ldev] Erasing FE.KEYID = 1
1,547,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,910 UART: [ldev] --
1,587,189 UART: [fwproc] Waiting for Commands...
1,587,824 UART: [fwproc] Received command 0x46574c44
1,588,615 UART: [fwproc] Received Image of size 114448 bytes
2,888,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,658 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,009 >>> mbox cmd response: success
3,083,257 UART: [afmc] ++
3,083,425 UART: [afmc] CDI.KEYID = 6
3,083,787 UART: [afmc] SUBJECT.KEYID = 7
3,084,212 UART: [afmc] AUTHORITY.KEYID = 5
3,119,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,571 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,964 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,654 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,563 UART: [afmc] --
3,162,643 UART: [cold-reset] --
3,163,621 UART: [state] Locking Datavault
3,164,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,296 UART: [state] Locking ICCM
3,165,828 UART: [exit] Launching FMC @ 0x40000130
3,171,157 UART:
3,171,173 UART: Running Caliptra FMC ...
3,171,581 UART:
3,171,635 UART: [state] CFI Enabled
3,181,766 UART: [fht] FMC Alias Private Key: 7
3,289,427 UART: [art] Extend RT PCRs Done
3,289,855 UART: [art] Lock RT PCRs Done
3,291,307 UART: [art] Populate DV Done
3,299,594 UART: [fht] FMC Alias Private Key: 7
3,300,676 UART: [art] Derive CDI
3,300,956 UART: [art] Store in in slot 0x4
3,386,645 UART: [art] Derive Key Pair
3,387,005 UART: [art] Store priv key in slot 0x5
3,400,223 UART: [art] Derive Key Pair - Done
3,415,255 UART: [art] Signing Cert with AUTHO
3,415,735 UART: RITY.KEYID = 7
3,430,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,352 UART: [art] PUB.X = 2214C87DB425BE33990528B2F372C7BEC05D5282FFEA7BB7662C77AE4837CB9DD7C61F53C5EAB333DDF408BE04CE3A4F
3,438,131 UART: [art] PUB.Y = FE36E04F888D48BE39BF681641EDD66E694931EF8EBE6FC0E80B638751275C901023C1F89632DD3F5A10BA4FB3D96609
3,445,081 UART: [art] SIG.R = 92C0FFF1A26D8F8D5A9A8898CEDCA837B278B0D064AF2F87CF4D1DDC801A3F783A38CF7002D8234D89719E8A31FEF540
3,451,864 UART: [art] SIG.S = C35BBB7FCF8E674097CA6D4556AE3FB77B3699C8FB8B0364C1CC457A2F04BE4836C9946196B4BEB66F72144B24EAED41
3,476,123 UART: Caliptra RT
3,476,376 UART: [state] CFI Enabled
3,583,594 UART: [rt] RT listening for mailbox commands...
3,584,264 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,630 UART: [rt]cmd =0x53494756, len=196
3,621,133 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,273 ready_for_fw is high
1,362,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,077 >>> mbox cmd response: success
2,990,981 UART:
2,990,997 UART: Running Caliptra FMC ...
2,991,405 UART:
2,991,459 UART: [state] CFI Enabled
3,001,778 UART: [fht] FMC Alias Private Key: 7
3,109,477 UART: [art] Extend RT PCRs Done
3,109,905 UART: [art] Lock RT PCRs Done
3,111,215 UART: [art] Populate DV Done
3,119,278 UART: [fht] FMC Alias Private Key: 7
3,120,352 UART: [art] Derive CDI
3,120,632 UART: [art] Store in in slot 0x4
3,205,955 UART: [art] Derive Key Pair
3,206,315 UART: [art] Store priv key in slot 0x5
3,218,889 UART: [art] Derive Key Pair - Done
3,233,910 UART: [art] Signing Cert with AUTHO
3,234,390 UART: RITY.KEYID = 7
3,249,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,171 UART: [art] PUB.X = 26FA26A5600CF349667DA08C8E99DC4117536BF37C811270CC567DE26E8F36DE0B3E59E40C7E23CDE85C5B3C19A90637
3,256,935 UART: [art] PUB.Y = 9FA6D5DC9AFAC46BDAF06730E394AB7FED3B68B7F0D456E03B3818DD8F2E9380393BD9DA4C3DB578F8DA62F7D23F6D0F
3,263,908 UART: [art] SIG.R = 69F4F9C555A36AB7785F79D655E3774E8C2CC9992676927A9C233D9E2B1037FBBF69022FD745F75D6C823135F507366D
3,270,668 UART: [art] SIG.S = 6DAB68301360C6EF8FED99D23E36B3DA7EFF3A4F6EE0D7D491B475BF993ADC9109AF7D52FDB49F7A59171C63415B7979
3,294,494 UART: Caliptra RT
3,294,747 UART: [state] CFI Enabled
3,402,681 UART: [rt] RT listening for mailbox commands...
3,403,351 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,345 UART: [rt]cmd =0x53494756, len=196
3,439,634 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,595 UART: [kat] SHA2-512-ACC
897,496 UART: [kat] ECC-384
903,311 UART: [kat] HMAC-384Kdf
907,793 UART: [kat] LMS
1,475,989 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,120 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
1,480,966 ready_for_fw is high
1,480,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,505 UART: [idev] Erasing UDS.KEYID = 0
1,505,287 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,875 UART: [idev] --
1,514,850 UART: [ldev] ++
1,515,018 UART: [ldev] CDI.KEYID = 6
1,515,381 UART: [ldev] SUBJECT.KEYID = 5
1,515,807 UART: [ldev] AUTHORITY.KEYID = 7
1,516,270 UART: [ldev] FE.KEYID = 1
1,521,432 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,439 UART: [ldev] --
1,586,826 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 114448 bytes
2,887,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,948 >>> mbox cmd response: success
3,081,138 UART: [afmc] ++
3,081,306 UART: [afmc] CDI.KEYID = 6
3,081,668 UART: [afmc] SUBJECT.KEYID = 7
3,082,093 UART: [afmc] AUTHORITY.KEYID = 5
3,118,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,883 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,573 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,632 UART: [afmc] --
3,161,756 UART: [cold-reset] --
3,162,566 UART: [state] Locking Datavault
3,163,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,101 UART: [state] Locking ICCM
3,164,535 UART: [exit] Launching FMC @ 0x40000130
3,169,864 UART:
3,169,880 UART: Running Caliptra FMC ...
3,170,288 UART:
3,170,431 UART: [state] CFI Enabled
3,181,048 UART: [fht] FMC Alias Private Key: 7
3,289,457 UART: [art] Extend RT PCRs Done
3,289,885 UART: [art] Lock RT PCRs Done
3,291,683 UART: [art] Populate DV Done
3,300,188 UART: [fht] FMC Alias Private Key: 7
3,301,254 UART: [art] Derive CDI
3,301,534 UART: [art] Store in in slot 0x4
3,386,995 UART: [art] Derive Key Pair
3,387,355 UART: [art] Store priv key in slot 0x5
3,400,281 UART: [art] Derive Key Pair - Done
3,415,219 UART: [art] Signing Cert with AUTHO
3,415,699 UART: RITY.KEYID = 7
3,431,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,400 UART: [art] PUB.X = 48C5A049B94B7C08575405D4C2005B9883D9C5C42A3FAE0F867165F4A48139DED4FE28F95C4599AFA5E7D1343D80CDCD
3,439,147 UART: [art] PUB.Y = CD23E6E1D31242DFD000B4D8F905A187AF03010B79FC49A108A22A5828E87BB397378697FDB9456A01032539C33FF972
3,446,052 UART: [art] SIG.R = B11059AB6D8EAD65B41263F9B8F050FDD480216A45F46B541CBD2CB8787A19B77F011F428C60892CFD118E9C0B39B978
3,452,822 UART: [art] SIG.S = 702AB61A64AA0CE0EEC9E651E020CE8E6E2AC2224003C946B845525A0F140AD3FD466BC94D4E6767ED8E8B2B17F0D4B4
3,477,011 UART: Caliptra RT
3,477,356 UART: [state] CFI Enabled
3,586,613 UART: [rt] RT listening for mailbox commands...
3,587,283 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,089 UART: [rt]cmd =0x53494756, len=196
3,623,540 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 ready_for_fw is high
1,362,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,714 >>> mbox cmd response: success
2,990,002 UART:
2,990,018 UART: Running Caliptra FMC ...
2,990,426 UART:
2,990,569 UART: [state] CFI Enabled
3,001,098 UART: [fht] FMC Alias Private Key: 7
3,108,927 UART: [art] Extend RT PCRs Done
3,109,355 UART: [art] Lock RT PCRs Done
3,110,699 UART: [art] Populate DV Done
3,119,020 UART: [fht] FMC Alias Private Key: 7
3,120,130 UART: [art] Derive CDI
3,120,410 UART: [art] Store in in slot 0x4
3,206,067 UART: [art] Derive Key Pair
3,206,427 UART: [art] Store priv key in slot 0x5
3,220,053 UART: [art] Derive Key Pair - Done
3,234,590 UART: [art] Signing Cert with AUTHO
3,235,070 UART: RITY.KEYID = 7
3,250,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,979 UART: [art] PUB.X = 862ED0E9091001D067A4E0754D93FC3AD6C1E0D15D06D0216C5DF3C856FA4CC15BE1C0DAB1C4E20F011515B3830ED9BC
3,257,745 UART: [art] PUB.Y = 8F269E023027BB4808F239F2A75CF862364CA808339AE1EBD5001FC5AECF8ABD39B9025791894689A34C5B16244EC43F
3,264,663 UART: [art] SIG.R = D6F0561958F2C5E2A1A021878E10308B3D21DB8C44F40A7DB8ADA92740E880E8E49A30ECA774ED20E7E5AF9049B279CB
3,271,440 UART: [art] SIG.S = AD15C29143C01648B6527C4CF6A07FC116B0E9557AFAC7C38F2A0EBBD8AD59DD2B91C2F3716E01845FE09040793991FD
3,294,773 UART: Caliptra RT
3,295,118 UART: [state] CFI Enabled
3,403,976 UART: [rt] RT listening for mailbox commands...
3,404,646 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,390 UART: [rt]cmd =0x53494756, len=196
3,441,181 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,675 UART: [fht] FHT @ 0x50003400
1,175,428 UART: [idev] ++
1,175,596 UART: [idev] CDI.KEYID = 6
1,175,956 UART: [idev] SUBJECT.KEYID = 7
1,176,380 UART: [idev] UDS.KEYID = 0
1,176,725 ready_for_fw is high
1,176,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,398 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,463 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,750 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,148 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,328 >>> mbox cmd response: success
2,776,496 UART: [afmc] ++
2,776,664 UART: [afmc] CDI.KEYID = 6
2,777,026 UART: [afmc] SUBJECT.KEYID = 7
2,777,451 UART: [afmc] AUTHORITY.KEYID = 5
2,813,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,736 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,503 UART: [afmc] --
2,856,431 UART: [cold-reset] --
2,857,157 UART: [state] Locking Datavault
2,858,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,894 UART: [state] Locking ICCM
2,859,500 UART: [exit] Launching FMC @ 0x40000130
2,864,829 UART:
2,864,845 UART: Running Caliptra FMC ...
2,865,253 UART:
2,865,307 UART: [state] CFI Enabled
2,875,760 UART: [fht] FMC Alias Private Key: 7
2,983,385 UART: [art] Extend RT PCRs Done
2,983,813 UART: [art] Lock RT PCRs Done
2,985,411 UART: [art] Populate DV Done
2,993,548 UART: [fht] FMC Alias Private Key: 7
2,994,554 UART: [art] Derive CDI
2,994,834 UART: [art] Store in in slot 0x4
3,080,307 UART: [art] Derive Key Pair
3,080,667 UART: [art] Store priv key in slot 0x5
3,093,635 UART: [art] Derive Key Pair - Done
3,108,584 UART: [art] Signing Cert with AUTHO
3,109,064 UART: RITY.KEYID = 7
3,124,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,889 UART: [art] PUB.X = 22EA3E03082977ABA0D4941747F4D51A5CD5D1DA6267C8EE98155003E401E7A6D905FF542E08C0F17F7507497F6A0906
3,131,630 UART: [art] PUB.Y = A7B1163B2F57F16B21655306883A71193B9593ED2AE441DEACF9ADB2857BF35C93127FEB6EF57BBBACEEB30C8C83C5E9
3,138,592 UART: [art] SIG.R = EFE96DCE94C676C5F176338261D7925D8CBD40D8D57F62C9B48EE8058AE9DAE490C6A428BC1C6374773BAB109663E858
3,145,367 UART: [art] SIG.S = A7EFD2FCD9A1767779C0F4DC070B29CF7B99D3C88CA489513B17B551F74EC057EFE17D3D87ED5944D6289AF3009E5168
3,168,878 UART: Caliptra RT
3,169,131 UART: [state] CFI Enabled
3,276,515 UART: [rt] RT listening for mailbox commands...
3,277,185 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,989 UART: [rt]cmd =0x53494756, len=196
3,313,318 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 ready_for_fw is high
1,060,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,833 >>> mbox cmd response: success
2,690,041 UART:
2,690,057 UART: Running Caliptra FMC ...
2,690,465 UART:
2,690,519 UART: [state] CFI Enabled
2,701,142 UART: [fht] FMC Alias Private Key: 7
2,808,893 UART: [art] Extend RT PCRs Done
2,809,321 UART: [art] Lock RT PCRs Done
2,810,569 UART: [art] Populate DV Done
2,818,852 UART: [fht] FMC Alias Private Key: 7
2,819,954 UART: [art] Derive CDI
2,820,234 UART: [art] Store in in slot 0x4
2,905,787 UART: [art] Derive Key Pair
2,906,147 UART: [art] Store priv key in slot 0x5
2,918,909 UART: [art] Derive Key Pair - Done
2,933,840 UART: [art] Signing Cert with AUTHO
2,934,320 UART: RITY.KEYID = 7
2,949,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,533 UART: [art] PUB.X = 57729F45D9AE1A1CA3D2D7AA87B800F6C34C875416074E4E561102638DAAE745EB5C55458E30B3458294D399458CD7FA
2,957,275 UART: [art] PUB.Y = 568E014522C5B4EF77A2A0354E849121D452B911B1E3F048D67CEC47C2596A1B36AC95F67238FADDF93905A28ACAB866
2,964,223 UART: [art] SIG.R = 8DD0B144A474BB41C6CF48ED24FE32DE0475EBF022B18C4E50889AB2E9202C29A9B27F06B00DC56D85BE0184643BF082
2,970,991 UART: [art] SIG.S = 771323A223E60DD6143BA2876DCFF40F3068BCE4DED901F172BEB4F373C09F581945969CE8499577CB15389A8EADAF81
2,994,965 UART: Caliptra RT
2,995,218 UART: [state] CFI Enabled
3,103,965 UART: [rt] RT listening for mailbox commands...
3,104,635 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,655 UART: [rt]cmd =0x53494756, len=196
3,141,004 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,587 UART: [kat] SHA2-512-ACC
908,488 UART: [kat] ECC-384
918,371 UART: [kat] HMAC-384Kdf
922,921 UART: [kat] LMS
1,171,249 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,998 UART: [fht] FHT @ 0x50003400
1,175,851 UART: [idev] ++
1,176,019 UART: [idev] CDI.KEYID = 6
1,176,379 UART: [idev] SUBJECT.KEYID = 7
1,176,803 UART: [idev] UDS.KEYID = 0
1,177,148 ready_for_fw is high
1,177,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,909 UART: [idev] Erasing UDS.KEYID = 0
1,202,086 UART: [idev] Sha1 KeyId Algorithm
1,210,402 UART: [idev] --
1,211,666 UART: [ldev] ++
1,211,834 UART: [ldev] CDI.KEYID = 6
1,212,197 UART: [ldev] SUBJECT.KEYID = 5
1,212,623 UART: [ldev] AUTHORITY.KEYID = 7
1,213,086 UART: [ldev] FE.KEYID = 1
1,218,002 UART: [ldev] Erasing FE.KEYID = 1
1,244,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,374 UART: [ldev] --
1,283,691 UART: [fwproc] Wait for Commands...
1,284,443 UART: [fwproc] Recv command 0x46574c44
1,285,171 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,485 >>> mbox cmd response: success
2,778,627 UART: [afmc] ++
2,778,795 UART: [afmc] CDI.KEYID = 6
2,779,157 UART: [afmc] SUBJECT.KEYID = 7
2,779,582 UART: [afmc] AUTHORITY.KEYID = 5
2,815,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,411 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,904 UART: [afmc] --
2,859,002 UART: [cold-reset] --
2,859,976 UART: [state] Locking Datavault
2,860,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,489 UART: [state] Locking ICCM
2,861,961 UART: [exit] Launching FMC @ 0x40000130
2,867,290 UART:
2,867,306 UART: Running Caliptra FMC ...
2,867,714 UART:
2,867,857 UART: [state] CFI Enabled
2,878,478 UART: [fht] FMC Alias Private Key: 7
2,985,859 UART: [art] Extend RT PCRs Done
2,986,287 UART: [art] Lock RT PCRs Done
2,987,871 UART: [art] Populate DV Done
2,995,750 UART: [fht] FMC Alias Private Key: 7
2,996,798 UART: [art] Derive CDI
2,997,078 UART: [art] Store in in slot 0x4
3,082,977 UART: [art] Derive Key Pair
3,083,337 UART: [art] Store priv key in slot 0x5
3,095,827 UART: [art] Derive Key Pair - Done
3,110,750 UART: [art] Signing Cert with AUTHO
3,111,230 UART: RITY.KEYID = 7
3,126,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,211 UART: [art] PUB.X = 91AA3E227C4D5E942C30B14B9427BC4CF138119380D2054B06AD90C90C6061A8C8645B4538AD648110292CB09AEC42AD
3,133,972 UART: [art] PUB.Y = E938156E995B7E91FAA0E5EDD60F7C7728D7BDD6DA57133501ACA60AF7F2FD0C0C1547E428E0F217905480CA48F67D41
3,140,917 UART: [art] SIG.R = 7A883A4D7158FC286361143CE60AB7CCE3DE85E208CBAEFC9B2DAA7A0EB630B8865AB8AB57DCCF371CA6D9645E8AB1AA
3,147,706 UART: [art] SIG.S = D157158E1639FB543051894A54DF8CB8FB1E7F3E1A2E7CB596225344F056479BF0E227EE0E6257198C5584D2CAE2BABE
3,171,692 UART: Caliptra RT
3,172,037 UART: [state] CFI Enabled
3,280,324 UART: [rt] RT listening for mailbox commands...
3,280,994 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,072 UART: [rt]cmd =0x53494756, len=196
3,317,425 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,082 ready_for_fw is high
1,061,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,536 >>> mbox cmd response: success
2,689,940 UART:
2,689,956 UART: Running Caliptra FMC ...
2,690,364 UART:
2,690,507 UART: [state] CFI Enabled
2,701,130 UART: [fht] FMC Alias Private Key: 7
2,809,047 UART: [art] Extend RT PCRs Done
2,809,475 UART: [art] Lock RT PCRs Done
2,811,141 UART: [art] Populate DV Done
2,819,488 UART: [fht] FMC Alias Private Key: 7
2,820,626 UART: [art] Derive CDI
2,820,906 UART: [art] Store in in slot 0x4
2,906,385 UART: [art] Derive Key Pair
2,906,745 UART: [art] Store priv key in slot 0x5
2,920,321 UART: [art] Derive Key Pair - Done
2,934,668 UART: [art] Signing Cert with AUTHO
2,935,148 UART: RITY.KEYID = 7
2,950,460 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,225 UART: [art] PUB.X = 04DD4B368D4A3BAB55EEC8105738DE86E84AB1A67F62F6F798142E1269A75620427D76BC6DDAB47FE09ADD0DAB94AB98
2,958,005 UART: [art] PUB.Y = CD4B27F3D5FCFBCA466E7D1D2F45850E0802E6FB756C247D1D4C1770D99AD6EA1EB1E2986AB0D24CFAC8B72774FEE540
2,964,968 UART: [art] SIG.R = 83465D359FA727A4BA9021B255EE291217C67DCB38E8A9AADD5C9295EA22BC66D05FC9FD06D356464F77A4483A2EE67B
2,971,745 UART: [art] SIG.S = DE7EABBA85E11820A0DDD40DCB655F859C46A9A0AD6B965D0DA50E1C66FEF9028735B3B716F0E92226174B315AD80006
2,995,475 UART: Caliptra RT
2,995,820 UART: [state] CFI Enabled
3,104,048 UART: [rt] RT listening for mailbox commands...
3,104,718 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,574 UART: [rt]cmd =0x53494756, len=196
3,140,925 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,174,503 ready_for_fw is high
1,174,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,567 UART: [idev] Sha1 KeyId Algorithm
1,207,429 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,092 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,366 >>> mbox cmd response: success
2,776,393 UART: [afmc] ++
2,776,561 UART: [afmc] CDI.KEYID = 6
2,776,924 UART: [afmc] SUBJECT.KEYID = 7
2,777,350 UART: [afmc] AUTHORITY.KEYID = 5
2,812,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,106 UART: [afmc] --
2,856,026 UART: [cold-reset] --
2,856,888 UART: [state] Locking Datavault
2,857,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,503 UART: [state] Locking ICCM
2,859,043 UART: [exit] Launching FMC @ 0x40000130
2,864,372 UART:
2,864,388 UART: Running Caliptra FMC ...
2,864,796 UART:
2,864,850 UART: [state] CFI Enabled
2,874,925 UART: [fht] FMC Alias Private Key: 7
2,982,932 UART: [art] Extend RT PCRs Done
2,983,360 UART: [art] Lock RT PCRs Done
2,984,962 UART: [art] Populate DV Done
2,993,257 UART: [fht] FMC Alias Private Key: 7
2,994,227 UART: [art] Derive CDI
2,994,507 UART: [art] Store in in slot 0x4
3,080,014 UART: [art] Derive Key Pair
3,080,374 UART: [art] Store priv key in slot 0x5
3,093,420 UART: [art] Derive Key Pair - Done
3,108,000 UART: [art] Signing Cert with AUTHO
3,108,480 UART: RITY.KEYID = 7
3,123,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,761 UART: [art] PUB.X = 52FFDFB99AE94938A20608C57E568CBF487AFC1D69EE66E9C652759DCFC9317391DD8C45FFFF360CCA69FEEB1028FAEA
3,131,546 UART: [art] PUB.Y = 7A7C4E1334B32EEF57B5825D8FBFCC30E7DFEF7541BA9A27D113A7F912935D1C003B2A1A61EC0640E647259D9E968983
3,138,479 UART: [art] SIG.R = BD379CD92D91E2C0AD8F972B5303FAEE721E5E7E2A4D975736D866255C7963CAC29AECA43A9A270BAC132673874ED8CD
3,145,257 UART: [art] SIG.S = 5C211081C0FC5DBDAF7196131723F9CEC40A5EC8513FD7FFACAF9A3198EBD6E13DC89675330B5EA007A9372F3AAB0C50
3,169,282 UART: Caliptra RT
3,169,535 UART: [state] CFI Enabled
3,277,888 UART: [rt] RT listening for mailbox commands...
3,278,558 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,778 UART: [rt]cmd =0x53494756, len=196
3,315,459 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,366 ready_for_fw is high
1,055,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,430 >>> mbox cmd response: success
2,686,794 UART:
2,686,810 UART: Running Caliptra FMC ...
2,687,218 UART:
2,687,272 UART: [state] CFI Enabled
2,697,789 UART: [fht] FMC Alias Private Key: 7
2,806,106 UART: [art] Extend RT PCRs Done
2,806,534 UART: [art] Lock RT PCRs Done
2,808,086 UART: [art] Populate DV Done
2,816,269 UART: [fht] FMC Alias Private Key: 7
2,817,299 UART: [art] Derive CDI
2,817,579 UART: [art] Store in in slot 0x4
2,903,408 UART: [art] Derive Key Pair
2,903,768 UART: [art] Store priv key in slot 0x5
2,916,828 UART: [art] Derive Key Pair - Done
2,932,040 UART: [art] Signing Cert with AUTHO
2,932,520 UART: RITY.KEYID = 7
2,947,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,047 UART: [art] PUB.X = 0CC9F0C03E1455188A63FB8A1CD05D639251ADD5D35276438EC18A20130C84F2B41793DC2EE04281DEE35364ABD62C8B
2,954,817 UART: [art] PUB.Y = 66F0A19B36DF39FB59D759861876227C1F0B4FD5B9D4ACE287111820DB78CB56066529824EFF3E423E2EA9BB0A63C424
2,961,762 UART: [art] SIG.R = 23170A2FCBB280ABCF0236E9B490EA26DECEA71A1A58B210F443919FBA5F1D624AEA1D0D08FD1F2624EA0F506A0A445E
2,968,534 UART: [art] SIG.S = 2247AA202E4BC360D8C413875A0063F0412FABFD6315042DF32401756485E0BB3E52481AA8637A5192479B4DECAD428C
2,992,735 UART: Caliptra RT
2,992,988 UART: [state] CFI Enabled
3,100,589 UART: [rt] RT listening for mailbox commands...
3,101,259 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,233 UART: [rt]cmd =0x53494756, len=196
3,137,294 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,382 UART: [kat] SHA2-256
902,322 UART: [kat] SHA2-384
905,255 UART: [kat] SHA2-512-ACC
907,156 UART: [kat] ECC-384
916,997 UART: [kat] HMAC-384Kdf
921,429 UART: [kat] LMS
1,169,741 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,214 UART: [fht] FHT @ 0x50003400
1,173,824 UART: [idev] ++
1,173,992 UART: [idev] CDI.KEYID = 6
1,174,353 UART: [idev] SUBJECT.KEYID = 7
1,174,778 UART: [idev] UDS.KEYID = 0
1,175,124 ready_for_fw is high
1,175,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,396 UART: [idev] Sha1 KeyId Algorithm
1,209,272 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,211 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,535 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,279 >>> mbox cmd response: success
2,776,394 UART: [afmc] ++
2,776,562 UART: [afmc] CDI.KEYID = 6
2,776,925 UART: [afmc] SUBJECT.KEYID = 7
2,777,351 UART: [afmc] AUTHORITY.KEYID = 5
2,812,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,557 UART: [afmc] --
2,856,565 UART: [cold-reset] --
2,857,521 UART: [state] Locking Datavault
2,858,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,406 UART: [state] Locking ICCM
2,860,014 UART: [exit] Launching FMC @ 0x40000130
2,865,343 UART:
2,865,359 UART: Running Caliptra FMC ...
2,865,767 UART:
2,865,910 UART: [state] CFI Enabled
2,876,157 UART: [fht] FMC Alias Private Key: 7
2,984,320 UART: [art] Extend RT PCRs Done
2,984,748 UART: [art] Lock RT PCRs Done
2,986,180 UART: [art] Populate DV Done
2,994,313 UART: [fht] FMC Alias Private Key: 7
2,995,445 UART: [art] Derive CDI
2,995,725 UART: [art] Store in in slot 0x4
3,081,880 UART: [art] Derive Key Pair
3,082,240 UART: [art] Store priv key in slot 0x5
3,095,744 UART: [art] Derive Key Pair - Done
3,110,590 UART: [art] Signing Cert with AUTHO
3,111,070 UART: RITY.KEYID = 7
3,126,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,085 UART: [art] PUB.X = A1FBBA18B24E3649BB96DB40DB34C6162DA5952835BE33F6EC0CF04725E48B713D6C0E78C5925FBD46854FCE21134AE3
3,133,861 UART: [art] PUB.Y = 4817AF02740523736A4870609656F6EE3DC73991AFAF0FBDA3984E23C1F377F85DD14802AD60C88E47F4DB9A1D9F238F
3,140,803 UART: [art] SIG.R = F992E2E97C0C1A42287BD5BB37B41B68FAB5876AAAB9C26C7A02ACACE7B139C56BFBF8263BED2A9F2818D9C7EDAB5089
3,147,593 UART: [art] SIG.S = A25DE2D2CBE8A8745AC7597A2C782056EC65CB1F0AFC85B7B863444B924F066A85821B4063FFE760EC463C6ABA563329
3,170,624 UART: Caliptra RT
3,170,969 UART: [state] CFI Enabled
3,278,831 UART: [rt] RT listening for mailbox commands...
3,279,501 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,769 UART: [rt]cmd =0x53494756, len=196
3,316,218 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,229 ready_for_fw is high
1,056,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,307 >>> mbox cmd response: success
2,687,755 UART:
2,687,771 UART: Running Caliptra FMC ...
2,688,179 UART:
2,688,322 UART: [state] CFI Enabled
2,698,995 UART: [fht] FMC Alias Private Key: 7
2,806,644 UART: [art] Extend RT PCRs Done
2,807,072 UART: [art] Lock RT PCRs Done
2,808,852 UART: [art] Populate DV Done
2,817,329 UART: [fht] FMC Alias Private Key: 7
2,818,471 UART: [art] Derive CDI
2,818,751 UART: [art] Store in in slot 0x4
2,904,198 UART: [art] Derive Key Pair
2,904,558 UART: [art] Store priv key in slot 0x5
2,918,602 UART: [art] Derive Key Pair - Done
2,933,344 UART: [art] Signing Cert with AUTHO
2,933,824 UART: RITY.KEYID = 7
2,949,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,785 UART: [art] PUB.X = 7ACEE4151E374CC934E71E0FC9C53D6F5A8D9561FA709C23830121FEF0D8F64D056517CB4771365E5E00FD9ECFC0539C
2,956,534 UART: [art] PUB.Y = F3ACC6CE385BFE8BBD1AD7747872111A40C085E31ED475665619FE29A734A99D5760039F6C630672EB221EC852A8F03F
2,963,482 UART: [art] SIG.R = 9CD3C15031868519D4E590F7601F7433A6106EA58402AAD53F386077DC3581145B13F132FACCA410E88BE28A2DB5AE30
2,970,249 UART: [art] SIG.S = 6F29D797FD17283DB3248F9BF6FF1B2EB51E22931E7F7EA69149539DD68859CA599F84452904234E51D2C7CDA0B82501
2,993,816 UART: Caliptra RT
2,994,161 UART: [state] CFI Enabled
3,102,370 UART: [rt] RT listening for mailbox commands...
3,103,040 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,844 UART: [rt]cmd =0x53494756, len=196
3,139,069 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,070 UART:
192,438 UART: Running Caliptra ROM ...
193,530 UART:
193,676 UART: [state] CFI Enabled
265,550 UART: [state] LifecycleState = Unprovisioned
267,532 UART: [state] DebugLocked = No
268,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,358 UART: [kat] SHA2-256
444,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,566 UART: [kat] ++
455,059 UART: [kat] sha1
465,590 UART: [kat] SHA2-256
468,309 UART: [kat] SHA2-384
475,645 UART: [kat] SHA2-512-ACC
478,012 UART: [kat] ECC-384
2,765,387 UART: [kat] HMAC-384Kdf
2,777,716 UART: [kat] LMS
3,968,033 UART: [kat] --
3,972,032 UART: [cold-reset] ++
3,974,680 UART: [fht] Storing FHT @ 0x50003400
3,985,385 UART: [idev] ++
3,986,024 UART: [idev] CDI.KEYID = 6
3,986,908 UART: [idev] SUBJECT.KEYID = 7
3,988,154 UART: [idev] UDS.KEYID = 0
3,989,154 ready_for_fw is high
3,989,379 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,999 UART: [idev] Erasing UDS.KEYID = 0
7,326,284 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,554 UART: [idev] --
7,352,794 UART: [ldev] ++
7,353,362 UART: [ldev] CDI.KEYID = 6
7,354,299 UART: [ldev] SUBJECT.KEYID = 5
7,355,560 UART: [ldev] AUTHORITY.KEYID = 7
7,356,843 UART: [ldev] FE.KEYID = 1
7,398,918 UART: [ldev] Erasing FE.KEYID = 1
10,733,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,652 UART: [ldev] --
13,113,281 UART: [fwproc] Waiting for Commands...
13,116,346 UART: [fwproc] Received command 0x46574c44
13,118,524 UART: [fwproc] Received Image of size 114124 bytes
17,164,375 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,623 >>> mbox cmd response: success
17,627,161 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,631,528 UART: [afmc] ++
17,632,110 UART: [afmc] CDI.KEYID = 6
17,632,990 UART: [afmc] SUBJECT.KEYID = 7
17,634,263 UART: [afmc] AUTHORITY.KEYID = 5
21,007,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,671 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,932 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,321 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,207 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,632 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,728 UART: [afmc] --
23,377,299 UART: [cold-reset] --
23,379,709 UART: [state] Locking Datavault
23,385,918 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,623 UART: [state] Locking ICCM
23,389,237 UART: [exit] Launching FMC @ 0x40000130
23,397,644 UART:
23,397,880 UART: Running Caliptra FMC ...
23,398,982 UART:
23,399,143 UART: [state] CFI Enabled
23,466,008 UART: [fht] FMC Alias Private Key: 7
25,804,048 UART: [art] Extend RT PCRs Done
25,805,270 UART: [art] Lock RT PCRs Done
25,806,623 UART: [art] Populate DV Done
25,812,271 UART: [fht] FMC Alias Private Key: 7
25,813,804 UART: [art] Derive CDI
25,814,621 UART: [art] Store in in slot 0x4
25,874,580 UART: [art] Derive Key Pair
25,875,611 UART: [art] Store priv key in slot 0x5
29,169,721 UART: [art] Derive Key Pair - Done
29,182,880 UART: [art] Signing Cert with AUTHO
29,184,196 UART: RITY.KEYID = 7
31,470,352 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,862 UART: [art] PUB.X = 1C6F32BEE6111C2B44CADC18AD9A6FC4CA84332E0CB5B6DC9CB4E0D1F87C49E20E0FFDF16260C5A2629E10325C6B4FFA
31,479,172 UART: [art] PUB.Y = F455F98BDA677CB4CB52650089A4D289829AF1366EC347E89C60E4B71B4E1FE5EC4FECCF9F27B80113FB3B427F351576
31,486,414 UART: [art] SIG.R = FE19CC2B2D7FDFEC370F7E5D7B04510B99B43F3BB73EEDFD0D4F26CBBC96A7CBCDC7A72048C36D97C7417BF55961BB57
31,493,809 UART: [art] SIG.S = 08E2A3BCF87CCAAAAF3B313D32484F7849B770F8467BAB1B0B6AB81241CC0B6349B92296561EADEBF09F4BDC87C0B85C
32,798,488 UART: Caliptra RT
32,799,205 UART: [state] CFI Enabled
32,960,418 UART: [rt] RT listening for mailbox commands...
32,991,956 UART: [rt]cmd =0x46505344, len=4
33,101,831 >>> mbox cmd response data (8 bytes)
33,102,376 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,102,674 UART: Fatal Error: 0x000E0008
33,103,798 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,804,103 ready_for_fw is high
3,804,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,872,075 >>> mbox cmd response: success
17,872,676 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,567,012 UART:
23,567,388 UART: Running Caliptra FMC ...
23,568,533 UART:
23,568,691 UART: [state] CFI Enabled
23,634,150 UART: [fht] FMC Alias Private Key: 7
25,972,218 UART: [art] Extend RT PCRs Done
25,973,440 UART: [art] Lock RT PCRs Done
25,975,234 UART: [art] Populate DV Done
25,980,599 UART: [fht] FMC Alias Private Key: 7
25,982,248 UART: [art] Derive CDI
25,983,067 UART: [art] Store in in slot 0x4
26,043,924 UART: [art] Derive Key Pair
26,044,991 UART: [art] Store priv key in slot 0x5
29,337,658 UART: [art] Derive Key Pair - Done
29,351,032 UART: [art] Signing Cert with AUTHO
29,352,340 UART: RITY.KEYID = 7
31,638,615 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,628 UART: [art] PUB.X = 2FA89C0364D461A327BDD9CC9EDD0E490E3369DF88E428810ABD79E36015331605A50D5AAC7EEE9FC66DB486A5543F2E
31,647,345 UART: [art] PUB.Y = EF6A38143259B99B017BDD7607FE28E004724A4C4258DEDE23F21231B17EFA4328C0945637BAF1837F907F577E174DED
31,654,589 UART: [art] SIG.R = 0E4F9D92A3D39E04BC9F025004CA7B446D6C6AAC29CCB945B52E93937A2395299904E1B71EF4D3B761110391DC2363A4
31,661,989 UART: [art] SIG.S = 97FAF7E9DA076818BAE80D4790B558E36A4372A3055839951FAD1E2B21F1331B0E28F0C4E56D6B0096E0FB4170935B86
32,967,615 UART: Caliptra RT
32,968,348 UART: [state] CFI Enabled
33,129,627 UART: [rt] RT listening for mailbox commands...
33,160,886 UART: [rt]cmd =0x46505344, len=4
33,270,464 >>> mbox cmd response data (8 bytes)
33,271,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,271,364 UART: Fatal Error: 0x000E0008
33,272,475 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,335 UART:
192,706 UART: Running Caliptra ROM ...
193,810 UART:
603,678 UART: [state] CFI Enabled
617,201 UART: [state] LifecycleState = Unprovisioned
619,076 UART: [state] DebugLocked = No
622,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,384 UART: [kat] SHA2-256
797,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,709 UART: [kat] ++
808,152 UART: [kat] sha1
819,443 UART: [kat] SHA2-256
822,157 UART: [kat] SHA2-384
828,233 UART: [kat] SHA2-512-ACC
830,569 UART: [kat] ECC-384
3,114,981 UART: [kat] HMAC-384Kdf
3,126,790 UART: [kat] LMS
4,316,916 UART: [kat] --
4,321,079 UART: [cold-reset] ++
4,322,867 UART: [fht] Storing FHT @ 0x50003400
4,334,832 UART: [idev] ++
4,335,396 UART: [idev] CDI.KEYID = 6
4,336,302 UART: [idev] SUBJECT.KEYID = 7
4,337,537 UART: [idev] UDS.KEYID = 0
4,338,505 ready_for_fw is high
4,338,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,049 UART: [idev] Erasing UDS.KEYID = 0
7,629,535 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,026 UART: [idev] --
7,653,773 UART: [ldev] ++
7,654,341 UART: [ldev] CDI.KEYID = 6
7,655,353 UART: [ldev] SUBJECT.KEYID = 5
7,656,462 UART: [ldev] AUTHORITY.KEYID = 7
7,657,739 UART: [ldev] FE.KEYID = 1
7,671,185 UART: [ldev] Erasing FE.KEYID = 1
10,960,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,865 UART: [ldev] --
13,319,614 UART: [fwproc] Waiting for Commands...
13,321,271 UART: [fwproc] Received command 0x46574c44
13,323,504 UART: [fwproc] Received Image of size 114124 bytes
17,375,510 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,025 >>> mbox cmd response: success
17,839,554 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,843,802 UART: [afmc] ++
17,844,435 UART: [afmc] CDI.KEYID = 6
17,845,311 UART: [afmc] SUBJECT.KEYID = 7
17,846,574 UART: [afmc] AUTHORITY.KEYID = 5
21,163,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,230 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,636 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,450 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,865 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,777 UART: [afmc] --
23,530,990 UART: [cold-reset] --
23,533,438 UART: [state] Locking Datavault
23,538,136 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,891 UART: [state] Locking ICCM
23,542,249 UART: [exit] Launching FMC @ 0x40000130
23,550,686 UART:
23,550,954 UART: Running Caliptra FMC ...
23,551,981 UART:
23,552,121 UART: [state] CFI Enabled
23,560,167 UART: [fht] FMC Alias Private Key: 7
25,891,868 UART: [art] Extend RT PCRs Done
25,893,087 UART: [art] Lock RT PCRs Done
25,894,737 UART: [art] Populate DV Done
25,900,109 UART: [fht] FMC Alias Private Key: 7
25,901,752 UART: [art] Derive CDI
25,902,479 UART: [art] Store in in slot 0x4
25,945,119 UART: [art] Derive Key Pair
25,946,159 UART: [art] Store priv key in slot 0x5
29,188,139 UART: [art] Derive Key Pair - Done
29,201,180 UART: [art] Signing Cert with AUTHO
29,202,482 UART: RITY.KEYID = 7
31,482,034 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,543 UART: [art] PUB.X = 08FD5A843FDBA90BD488862849484DC612A14C63CC09ACD99DCD286E9A4AE1C68D1D79CCC1A391FD3DA2E986E1369113
31,490,789 UART: [art] PUB.Y = 7D5229AEF00A296469292D72EB08CEB0FE9C7ED85435EEDBCB2108FBD34981FED8EED1895C2256A63A3711AA295ADF2E
31,498,064 UART: [art] SIG.R = 742AF0EC703CCDCE7E1AC64147054602EAAA938E5B374834629853B94BE920573F4820E2CD881B6E7351C203412CB96D
31,505,390 UART: [art] SIG.S = 543E27BC70C9156C6261B284F5F59064920BCDF8606F9B1AD8BC190EE9236D77D947134F18E94CC2D7C1E97BC612B3CC
32,810,836 UART: Caliptra RT
32,811,546 UART: [state] CFI Enabled
32,929,322 UART: [rt] RT listening for mailbox commands...
32,960,706 UART: [rt]cmd =0x46505344, len=4
33,070,689 >>> mbox cmd response data (8 bytes)
33,071,233 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,071,532 UART: Fatal Error: 0x000E0008
33,072,665 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
4,125,278 ready_for_fw is high
4,125,699 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,551 >>> mbox cmd response: success
18,075,442 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,716,089 UART:
23,716,493 UART: Running Caliptra FMC ...
23,717,625 UART:
23,717,776 UART: [state] CFI Enabled
23,725,777 UART: [fht] FMC Alias Private Key: 7
26,056,875 UART: [art] Extend RT PCRs Done
26,058,104 UART: [art] Lock RT PCRs Done
26,059,889 UART: [art] Populate DV Done
26,065,311 UART: [fht] FMC Alias Private Key: 7
26,066,854 UART: [art] Derive CDI
26,067,588 UART: [art] Store in in slot 0x4
26,110,508 UART: [art] Derive Key Pair
26,111,546 UART: [art] Store priv key in slot 0x5
29,354,003 UART: [art] Derive Key Pair - Done
29,367,200 UART: [art] Signing Cert with AUTHO
29,368,529 UART: RITY.KEYID = 7
31,647,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,763 UART: [art] PUB.X = 3BF32A1CDA3698899232D011281E90AB6D8E659660934F136814B7AF391623B702E3FDC272F5D4E67AABA113B095B2A5
31,655,959 UART: [art] PUB.Y = 45369045037AE71E3B0A690FD1C29DE0C9746FD7B5D7E32E7E306EDB19823336F7A740FC88C4C1F2875A6CAB5B86270B
31,663,238 UART: [art] SIG.R = 7C1400492F7F1295EBFEC782CB280E9DE851E96DF274491F3BA1DC87DB1E27DD457661F52B532E52CAD423F97545BFF5
31,670,623 UART: [art] SIG.S = 3BFAC73E64CBF139A04AF0A8B680E46CC1E92E2BA3E8B5192E2A1123EB54FA2C084FD20A5A01968DA2948A6ED8FB4FA1
32,975,211 UART: Caliptra RT
32,975,918 UART: [state] CFI Enabled
33,093,735 UART: [rt] RT listening for mailbox commands...
33,124,878 UART: [rt]cmd =0x46505344, len=4
33,234,423 >>> mbox cmd response data (8 bytes)
33,234,954 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,235,241 UART: Fatal Error: 0x000E0008
33,236,420 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,856 writing to cptra_bootfsm_go
192,973 UART:
193,327 UART: Running Caliptra ROM ...
194,541 UART:
194,696 UART: [state] CFI Enabled
265,293 UART: [state] LifecycleState = Unprovisioned
267,209 UART: [state] DebugLocked = No
269,245 UART: [state] WD Timer not started. Device not locked for debugging
273,152 UART: [kat] SHA2-256
452,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,865 UART: [kat] ++
464,401 UART: [kat] sha1
476,846 UART: [kat] SHA2-256
479,854 UART: [kat] SHA2-384
484,302 UART: [kat] SHA2-512-ACC
487,277 UART: [kat] ECC-384
2,947,696 UART: [kat] HMAC-384Kdf
2,971,457 UART: [kat] LMS
3,500,910 UART: [kat] --
3,506,959 UART: [cold-reset] ++
3,508,739 UART: [fht] FHT @ 0x50003400
3,519,567 UART: [idev] ++
3,520,126 UART: [idev] CDI.KEYID = 6
3,521,109 UART: [idev] SUBJECT.KEYID = 7
3,522,301 UART: [idev] UDS.KEYID = 0
3,523,431 ready_for_fw is high
3,523,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,905 UART: [idev] Erasing UDS.KEYID = 0
6,028,854 UART: [idev] Sha1 KeyId Algorithm
6,051,414 UART: [idev] --
6,053,901 UART: [ldev] ++
6,054,480 UART: [ldev] CDI.KEYID = 6
6,055,403 UART: [ldev] SUBJECT.KEYID = 5
6,056,569 UART: [ldev] AUTHORITY.KEYID = 7
6,057,859 UART: [ldev] FE.KEYID = 1
6,101,794 UART: [ldev] Erasing FE.KEYID = 1
8,608,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,487 UART: [ldev] --
10,413,329 UART: [fwproc] Wait for Commands...
10,415,741 UART: [fwproc] Recv command 0x46574c44
10,417,833 UART: [fwproc] Recv'd Img size: 114448 bytes
13,812,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,272,791 >>> mbox cmd response: success
14,273,353 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,276,789 UART: [afmc] ++
14,277,372 UART: [afmc] CDI.KEYID = 6
14,278,258 UART: [afmc] SUBJECT.KEYID = 7
14,279,363 UART: [afmc] AUTHORITY.KEYID = 5
16,806,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,942 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,898 UART: [afmc] --
18,608,815 UART: [cold-reset] --
18,611,707 UART: [state] Locking Datavault
18,617,067 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,715 UART: [state] Locking ICCM
18,620,920 UART: [exit] Launching FMC @ 0x40000130
18,629,372 UART:
18,629,611 UART: Running Caliptra FMC ...
18,630,713 UART:
18,630,883 UART: [state] CFI Enabled
18,688,748 UART: [fht] FMC Alias Private Key: 7
20,453,082 UART: [art] Extend RT PCRs Done
20,454,332 UART: [art] Lock RT PCRs Done
20,455,960 UART: [art] Populate DV Done
20,461,478 UART: [fht] FMC Alias Private Key: 7
20,463,124 UART: [art] Derive CDI
20,463,938 UART: [art] Store in in slot 0x4
20,521,064 UART: [art] Derive Key Pair
20,522,107 UART: [art] Store priv key in slot 0x5
22,985,219 UART: [art] Derive Key Pair - Done
22,998,483 UART: [art] Signing Cert with AUTHO
22,999,791 UART: RITY.KEYID = 7
24,710,978 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,481 UART: [art] PUB.X = C8FC816734B487F42E7770FD8116549D4B441F25DC8A1FD212A016680EA0F6A7730C4F797A48AD76D3AB143861C44056
24,719,780 UART: [art] PUB.Y = E7AD0DDC960C1B97C7F42D6F87F7F42118EA06A62ACBD6AB8D60C27204CE14EA91B36CC9E8A827F25D92BFA168F9E6D1
24,727,041 UART: [art] SIG.R = 914C57A8EC02B66E16782C24F8FC1DBD5935CF2D9C9C5FE636243AC8E93CE0902EC5A9A77C38448F41530D61501D4D69
24,734,454 UART: [art] SIG.S = 267840D325DED04A779F2704177D7E47888482772292360ED55AD4B7AA22B77EF6E7C032C79FEBF2CD241EBD0E10B08C
25,713,146 UART: Caliptra RT
25,713,880 UART: [state] CFI Enabled
25,878,776 UART: [rt] RT listening for mailbox commands...
25,910,139 UART: [rt]cmd =0x46505344, len=4
26,020,205 >>> mbox cmd response data (8 bytes)
26,020,768 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,021,066 UART: Fatal Error: 0x000E0008
26,022,194 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,346,409 ready_for_fw is high
3,346,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,044,313 >>> mbox cmd response: success
14,044,985 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,343,884 UART:
18,344,255 UART: Running Caliptra FMC ...
18,345,357 UART:
18,345,510 UART: [state] CFI Enabled
18,410,336 UART: [fht] FMC Alias Private Key: 7
20,174,217 UART: [art] Extend RT PCRs Done
20,175,492 UART: [art] Lock RT PCRs Done
20,177,383 UART: [art] Populate DV Done
20,183,033 UART: [fht] FMC Alias Private Key: 7
20,184,647 UART: [art] Derive CDI
20,185,389 UART: [art] Store in in slot 0x4
20,242,668 UART: [art] Derive Key Pair
20,243,685 UART: [art] Store priv key in slot 0x5
22,706,862 UART: [art] Derive Key Pair - Done
22,719,646 UART: [art] Signing Cert with AUTHO
22,720,954 UART: RITY.KEYID = 7
24,432,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,993 UART: [art] PUB.X = 495B678518F7C9F8BD9A2218C3AB05503BF196580E5C93DE5322D4F7C73480B5274B9FC43E7888E95843D1D4FAD9765F
24,441,262 UART: [art] PUB.Y = 44BA3F83AAED2AD99D01B7EDB72057B65382BA6F470CBA12E596CA209304FC5C1DB62AB9C47C5A1C94D2BEB0D7022B03
24,448,537 UART: [art] SIG.R = 90AE489E3461E143FAFB472FBB9F30AA2FCD8CC71835BACDA1230391E18309A8C91DFDD0C2D666FC27A90E9B7BA128B5
24,455,928 UART: [art] SIG.S = 7CDE366F6921157B405D0055032051E7C8B26C8C0E5BFC725D8F5AF8A793D2345E1E1AF1F25B11E8670751DA9F41F9CE
25,434,155 UART: Caliptra RT
25,434,865 UART: [state] CFI Enabled
25,600,124 UART: [rt] RT listening for mailbox commands...
25,631,367 UART: [rt]cmd =0x46505344, len=4
25,741,283 >>> mbox cmd response data (8 bytes)
25,741,821 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,742,111 UART: Fatal Error: 0x000E0008
25,743,270 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,353 UART:
192,740 UART: Running Caliptra ROM ...
193,906 UART:
603,472 UART: [state] CFI Enabled
615,847 UART: [state] LifecycleState = Unprovisioned
617,720 UART: [state] DebugLocked = No
619,809 UART: [state] WD Timer not started. Device not locked for debugging
623,202 UART: [kat] SHA2-256
802,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,901 UART: [kat] ++
814,438 UART: [kat] sha1
826,657 UART: [kat] SHA2-256
829,646 UART: [kat] SHA2-384
835,844 UART: [kat] SHA2-512-ACC
838,770 UART: [kat] ECC-384
3,282,412 UART: [kat] HMAC-384Kdf
3,294,164 UART: [kat] LMS
3,823,659 UART: [kat] --
3,827,863 UART: [cold-reset] ++
3,830,093 UART: [fht] FHT @ 0x50003400
3,839,470 UART: [idev] ++
3,840,029 UART: [idev] CDI.KEYID = 6
3,841,056 UART: [idev] SUBJECT.KEYID = 7
3,842,150 UART: [idev] UDS.KEYID = 0
3,843,186 ready_for_fw is high
3,843,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,973 UART: [idev] Erasing UDS.KEYID = 0
6,312,100 UART: [idev] Sha1 KeyId Algorithm
6,335,558 UART: [idev] --
6,340,248 UART: [ldev] ++
6,340,804 UART: [ldev] CDI.KEYID = 6
6,341,683 UART: [ldev] SUBJECT.KEYID = 5
6,342,902 UART: [ldev] AUTHORITY.KEYID = 7
6,344,127 UART: [ldev] FE.KEYID = 1
6,356,521 UART: [ldev] Erasing FE.KEYID = 1
8,828,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,569 UART: [ldev] --
10,618,903 UART: [fwproc] Wait for Commands...
10,621,201 UART: [fwproc] Recv command 0x46574c44
10,623,235 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,980 >>> mbox cmd response: success
14,481,561 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,484,562 UART: [afmc] ++
14,485,148 UART: [afmc] CDI.KEYID = 6
14,486,025 UART: [afmc] SUBJECT.KEYID = 7
14,487,238 UART: [afmc] AUTHORITY.KEYID = 5
16,989,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,739 UART: [afmc] --
18,785,732 UART: [cold-reset] --
18,788,289 UART: [state] Locking Datavault
18,793,709 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,394 UART: [state] Locking ICCM
18,797,297 UART: [exit] Launching FMC @ 0x40000130
18,805,691 UART:
18,805,930 UART: Running Caliptra FMC ...
18,807,026 UART:
18,807,185 UART: [state] CFI Enabled
18,815,390 UART: [fht] FMC Alias Private Key: 7
20,571,841 UART: [art] Extend RT PCRs Done
20,573,067 UART: [art] Lock RT PCRs Done
20,574,424 UART: [art] Populate DV Done
20,579,615 UART: [fht] FMC Alias Private Key: 7
20,581,253 UART: [art] Derive CDI
20,582,058 UART: [art] Store in in slot 0x4
20,624,754 UART: [art] Derive Key Pair
20,625,747 UART: [art] Store priv key in slot 0x5
23,052,407 UART: [art] Derive Key Pair - Done
23,065,291 UART: [art] Signing Cert with AUTHO
23,066,620 UART: RITY.KEYID = 7
24,771,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,283 UART: [art] PUB.X = 38EF090F72611FC3A3870635C824D874B3F59C0B9DA9E767282B9869CF4D53BE37054D1399A0EF4F060EDED9F91D688A
24,780,580 UART: [art] PUB.Y = 5F0191955FF76E2A4782A3F54A6004704DC529FABF1FA632F2C9A2650E81A412891E8E886280CF33202E5D47EDAD95BC
24,787,859 UART: [art] SIG.R = 9354BA3A634B9407F8889A3651B3B763F0DDA41C384C10570D57601E1D33FD948357060C9BB6D78F0C7F04E57BD9B16F
24,795,233 UART: [art] SIG.S = 6E18502A1101D30B9BF5B56257BB4DE980FF1DA21CBA36313D7ABCE8B8F0FACCF6BD686B0077EF179DAF0087B63DCD21
25,774,607 UART: Caliptra RT
25,775,317 UART: [state] CFI Enabled
25,892,222 UART: [rt] RT listening for mailbox commands...
25,923,675 UART: [rt]cmd =0x46505344, len=4
26,033,749 >>> mbox cmd response data (8 bytes)
26,034,311 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,034,604 UART: Fatal Error: 0x000E0008
26,035,722 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,694,944 ready_for_fw is high
3,695,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,566 >>> mbox cmd response: success
14,279,272 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,527,589 UART:
18,527,975 UART: Running Caliptra FMC ...
18,529,163 UART:
18,529,318 UART: [state] CFI Enabled
18,537,469 UART: [fht] FMC Alias Private Key: 7
20,293,941 UART: [art] Extend RT PCRs Done
20,295,161 UART: [art] Lock RT PCRs Done
20,296,481 UART: [art] Populate DV Done
20,302,057 UART: [fht] FMC Alias Private Key: 7
20,303,549 UART: [art] Derive CDI
20,304,303 UART: [art] Store in in slot 0x4
20,346,788 UART: [art] Derive Key Pair
20,347,825 UART: [art] Store priv key in slot 0x5
22,774,060 UART: [art] Derive Key Pair - Done
22,787,228 UART: [art] Signing Cert with AUTHO
22,788,536 UART: RITY.KEYID = 7
24,494,070 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,579 UART: [art] PUB.X = 1421F466AE17D0968BB6DF31271DED60160E7284DE997FD0D56D60DE5E251D36E82EF39EBC32484D79940ED1883151F2
24,502,900 UART: [art] PUB.Y = DBD441711786141E9E9A317D086989E2D525D262A2AB36739B792DAEB778844F7FF24AAF6670F7535BB14BA471F1532A
24,510,110 UART: [art] SIG.R = BEC91C4587ACF712BCC62951C0C69F05FDC7A3213BBF6704CC80B00D4F9621E48C9570D39EB68C79B14F6AEB28590B8A
24,517,500 UART: [art] SIG.S = 466A8BCF80AC92B25395A92126C6B9DDB8734D72815E62954C37A2942CD0A432FB3B0E5A4F33385411B72A73DA73A279
25,496,353 UART: Caliptra RT
25,497,064 UART: [state] CFI Enabled
25,613,803 UART: [rt] RT listening for mailbox commands...
25,645,258 UART: [rt]cmd =0x46505344, len=4
25,755,228 >>> mbox cmd response data (8 bytes)
25,755,749 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,756,030 UART: Fatal Error: 0x000E0008
25,757,204 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,072 UART:
192,448 UART: Running Caliptra ROM ...
193,643 UART:
193,794 UART: [state] CFI Enabled
266,065 UART: [state] LifecycleState = Unprovisioned
268,488 UART: [state] DebugLocked = No
269,735 UART: [state] WD Timer not started. Device not locked for debugging
275,208 UART: [kat] SHA2-256
465,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,795 UART: [kat] ++
476,241 UART: [kat] sha1
487,561 UART: [kat] SHA2-256
490,611 UART: [kat] SHA2-384
496,891 UART: [kat] SHA2-512-ACC
499,469 UART: [kat] ECC-384
2,947,519 UART: [kat] HMAC-384Kdf
2,970,591 UART: [kat] LMS
3,502,348 UART: [kat] --
3,507,283 UART: [cold-reset] ++
3,508,931 UART: [fht] FHT @ 0x50003400
3,521,259 UART: [idev] ++
3,521,887 UART: [idev] CDI.KEYID = 6
3,522,883 UART: [idev] SUBJECT.KEYID = 7
3,524,055 UART: [idev] UDS.KEYID = 0
3,524,981 ready_for_fw is high
3,525,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,131 UART: [idev] Erasing UDS.KEYID = 0
6,028,617 UART: [idev] Sha1 KeyId Algorithm
6,050,658 UART: [idev] --
6,055,790 UART: [ldev] ++
6,056,465 UART: [ldev] CDI.KEYID = 6
6,057,405 UART: [ldev] SUBJECT.KEYID = 5
6,058,578 UART: [ldev] AUTHORITY.KEYID = 7
6,059,814 UART: [ldev] FE.KEYID = 1
6,100,254 UART: [ldev] Erasing FE.KEYID = 1
8,605,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,946 UART: [ldev] --
10,412,982 UART: [fwproc] Wait for Commands...
10,415,839 UART: [fwproc] Recv command 0x46574c44
10,418,148 UART: [fwproc] Recv'd Img size: 114448 bytes
13,861,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,632 >>> mbox cmd response: success
14,599,179 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,602,935 UART: [afmc] ++
14,603,692 UART: [afmc] CDI.KEYID = 6
14,604,800 UART: [afmc] SUBJECT.KEYID = 7
14,606,342 UART: [afmc] AUTHORITY.KEYID = 5
17,134,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,874,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,889,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,904,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,927,984 UART: [afmc] --
18,931,360 UART: [cold-reset] --
18,936,086 UART: [state] Locking Datavault
18,941,067 UART: [state] Locking PCR0, PCR1 and PCR31
18,943,260 UART: [state] Locking ICCM
18,944,925 UART: [exit] Launching FMC @ 0x40000130
18,953,597 UART:
18,953,827 UART: Running Caliptra FMC ...
18,954,862 UART:
18,955,009 UART: [state] CFI Enabled
19,015,796 UART: [fht] FMC Alias Private Key: 7
20,780,526 UART: [art] Extend RT PCRs Done
20,781,740 UART: [art] Lock RT PCRs Done
20,783,607 UART: [art] Populate DV Done
20,789,180 UART: [fht] FMC Alias Private Key: 7
20,790,727 UART: [art] Derive CDI
20,791,541 UART: [art] Store in in slot 0x4
20,848,720 UART: [art] Derive Key Pair
20,849,757 UART: [art] Store priv key in slot 0x5
23,312,944 UART: [art] Derive Key Pair - Done
23,325,616 UART: [art] Signing Cert with AUTHO
23,326,941 UART: RITY.KEYID = 7
25,038,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,039,761 UART: [art] PUB.X = BBCE6F631639AEA784C03F58BC983DB846DF592DBF2B4F929615A785310C49CA484895155FEB198DEB399F03863866FC
25,047,004 UART: [art] PUB.Y = CE52470D76D358890FAE333E7F971DE90139E2543E1A9AE12993E9BE4A8B268634A8362149A7AC483B82413470FD37E2
25,054,241 UART: [art] SIG.R = 6BF63E8E95A10172C33EB1645267DB4CC0F5D9028A9DBFD27E036358CCC852433D0996BB92D29F184EF878221A7419E4
25,061,643 UART: [art] SIG.S = 11147BD7ECC62785F52C48B7C7160BB28B57587D7E92495F1217A580B9911711AEE94065AA197427910E04587A3B6602
26,039,926 UART: Caliptra RT
26,040,633 UART: [state] CFI Enabled
26,206,825 UART: [rt] RT listening for mailbox commands...
26,238,138 UART: [rt]cmd =0x46505344, len=4
26,348,382 >>> mbox cmd response data (8 bytes)
26,348,930 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,349,222 UART: Fatal Error: 0x000E0008
26,350,401 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,447,028 ready_for_fw is high
3,447,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,746,455 >>> mbox cmd response: success
14,747,084 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,057,626 UART:
19,058,017 UART: Running Caliptra FMC ...
19,059,158 UART:
19,059,347 UART: [state] CFI Enabled
19,121,986 UART: [fht] FMC Alias Private Key: 7
20,885,999 UART: [art] Extend RT PCRs Done
20,887,219 UART: [art] Lock RT PCRs Done
20,889,280 UART: [art] Populate DV Done
20,894,963 UART: [fht] FMC Alias Private Key: 7
20,896,512 UART: [art] Derive CDI
20,897,276 UART: [art] Store in in slot 0x4
20,953,556 UART: [art] Derive Key Pair
20,954,606 UART: [art] Store priv key in slot 0x5
23,418,018 UART: [art] Derive Key Pair - Done
23,431,072 UART: [art] Signing Cert with AUTHO
23,432,375 UART: RITY.KEYID = 7
25,143,323 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,833 UART: [art] PUB.X = 8A46F2AB61679A7B4C5F8BF1DFA970E618213D571247266BD46D77C8EDA5EB3D3EB7E08321CDA905C0CD3B2D77A46219
25,152,075 UART: [art] PUB.Y = B7F3DEE633BB2B77870D4D279B9D74F18593893976387233F84E7C9EA9AA5DF465F14FBC0259CD4FDFB117767B4B957A
25,159,385 UART: [art] SIG.R = 6BD5C16A5202A9FB62B6A48941940EB7F75E2D8CF60566F2F9141904EDD569B1B389B8FB766D09BBE8FE681B7B5CD85F
25,166,784 UART: [art] SIG.S = 30F6EB39EAF183E2D39A894A60E65AAB48BAFE63A532E93800C8A78A3DEF1BF1935231DCA3DE8A3426241D788283076A
26,144,817 UART: Caliptra RT
26,145,505 UART: [state] CFI Enabled
26,311,397 UART: [rt] RT listening for mailbox commands...
26,342,700 UART: [rt]cmd =0x46505344, len=4
26,452,883 >>> mbox cmd response data (8 bytes)
26,453,396 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,453,687 UART: Fatal Error: 0x000E0008
26,454,858 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,464 UART:
192,834 UART: Running Caliptra ROM ...
193,958 UART:
603,517 UART: [state] CFI Enabled
618,666 UART: [state] LifecycleState = Unprovisioned
621,032 UART: [state] DebugLocked = No
623,486 UART: [state] WD Timer not started. Device not locked for debugging
627,386 UART: [kat] SHA2-256
817,253 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,055 UART: [kat] ++
828,601 UART: [kat] sha1
839,252 UART: [kat] SHA2-256
842,314 UART: [kat] SHA2-384
847,805 UART: [kat] SHA2-512-ACC
850,375 UART: [kat] ECC-384
3,290,857 UART: [kat] HMAC-384Kdf
3,303,372 UART: [kat] LMS
3,835,196 UART: [kat] --
3,837,976 UART: [cold-reset] ++
3,839,048 UART: [fht] FHT @ 0x50003400
3,851,802 UART: [idev] ++
3,852,476 UART: [idev] CDI.KEYID = 6
3,853,353 UART: [idev] SUBJECT.KEYID = 7
3,854,604 UART: [idev] UDS.KEYID = 0
3,855,530 ready_for_fw is high
3,855,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,294 UART: [idev] Erasing UDS.KEYID = 0
6,333,327 UART: [idev] Sha1 KeyId Algorithm
6,355,398 UART: [idev] --
6,359,440 UART: [ldev] ++
6,360,168 UART: [ldev] CDI.KEYID = 6
6,361,220 UART: [ldev] SUBJECT.KEYID = 5
6,362,319 UART: [ldev] AUTHORITY.KEYID = 7
6,363,486 UART: [ldev] FE.KEYID = 1
6,372,724 UART: [ldev] Erasing FE.KEYID = 1
8,851,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,286 UART: [ldev] --
10,643,031 UART: [fwproc] Wait for Commands...
10,645,819 UART: [fwproc] Recv command 0x46574c44
10,648,112 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,464 >>> mbox cmd response: success
14,835,999 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,839,817 UART: [afmc] ++
14,840,516 UART: [afmc] CDI.KEYID = 6
14,841,754 UART: [afmc] SUBJECT.KEYID = 7
14,843,181 UART: [afmc] AUTHORITY.KEYID = 5
17,345,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,203 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,848 UART: [afmc] --
19,141,505 UART: [cold-reset] --
19,145,036 UART: [state] Locking Datavault
19,148,933 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,064 UART: [state] Locking ICCM
19,152,776 UART: [exit] Launching FMC @ 0x40000130
19,161,437 UART:
19,161,663 UART: Running Caliptra FMC ...
19,162,756 UART:
19,162,906 UART: [state] CFI Enabled
19,171,214 UART: [fht] FMC Alias Private Key: 7
20,928,321 UART: [art] Extend RT PCRs Done
20,929,554 UART: [art] Lock RT PCRs Done
20,931,338 UART: [art] Populate DV Done
20,936,849 UART: [fht] FMC Alias Private Key: 7
20,938,544 UART: [art] Derive CDI
20,939,356 UART: [art] Store in in slot 0x4
20,981,789 UART: [art] Derive Key Pair
20,982,826 UART: [art] Store priv key in slot 0x5
23,409,485 UART: [art] Derive Key Pair - Done
23,422,374 UART: [art] Signing Cert with AUTHO
23,423,666 UART: RITY.KEYID = 7
25,129,203 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,712 UART: [art] PUB.X = DBFC57BA6CFF423B91A6E771CDA32DA0E37AAB4B9E3825EF19E5CB46826428F4007E4795C0D706275F3E77D2DC601D5C
25,137,999 UART: [art] PUB.Y = 261EF02D9DCD26ED16373C78BEECD451EBA69CC2F34294155C9AA39E855B75E74DF4144C68134A4E3413B163BE44BF22
25,145,274 UART: [art] SIG.R = 3386DA406B2587E8FB0C2EAAC280FE7E4033225109A9E27B2757003978C800F798D47D0016A62E8CF9EB6C49EF254040
25,152,598 UART: [art] SIG.S = 5F38E746F40D613E65B619695D2A9EF013915B9ECBA2F3482968DEC3B4BBCF4C6DC9A620F2392387514BB95BCC297DED
26,132,136 UART: Caliptra RT
26,132,865 UART: [state] CFI Enabled
26,251,383 UART: [rt] RT listening for mailbox commands...
26,282,853 UART: [rt]cmd =0x46505344, len=4
26,392,909 >>> mbox cmd response data (8 bytes)
26,393,457 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,393,751 UART: Fatal Error: 0x000E0008
26,394,868 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,750,878 ready_for_fw is high
3,751,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,946,200 >>> mbox cmd response: success
14,946,958 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,197,046 UART:
19,197,449 UART: Running Caliptra FMC ...
19,198,546 UART:
19,198,688 UART: [state] CFI Enabled
19,206,856 UART: [fht] FMC Alias Private Key: 7
20,964,110 UART: [art] Extend RT PCRs Done
20,965,329 UART: [art] Lock RT PCRs Done
20,967,188 UART: [art] Populate DV Done
20,972,646 UART: [fht] FMC Alias Private Key: 7
20,974,287 UART: [art] Derive CDI
20,975,092 UART: [art] Store in in slot 0x4
21,017,953 UART: [art] Derive Key Pair
21,019,149 UART: [art] Store priv key in slot 0x5
23,445,317 UART: [art] Derive Key Pair - Done
23,458,468 UART: [art] Signing Cert with AUTHO
23,459,790 UART: RITY.KEYID = 7
25,165,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,652 UART: [art] PUB.X = E5738A6C820EECCCF04B143F697300A8D6D9334FAF36D3A80E148310B123BA19344477C574B210D9A5B6A430481FF42D
25,173,891 UART: [art] PUB.Y = 591F7B36F4CF5743195C2B87B21059BD3C5321C91D18C7FA00DF01F1FA331E3BCE3BD1CC4DB91C67E8C02980AFD57C35
25,181,177 UART: [art] SIG.R = 3C5B46A083C4670E2CEB7CEE315CAE91C5CE9550D35A5546BAEF5BE9423DFB7D58EF41617BBF79AFDE128A7DF3B4C3E3
25,188,568 UART: [art] SIG.S = AD594CA796592C18D1BBADF152D46D33104B1FCE546FB528651F8352C6862906AC07599D6A7EA55E80C218825D017B10
26,166,985 UART: Caliptra RT
26,167,667 UART: [state] CFI Enabled
26,284,876 UART: [rt] RT listening for mailbox commands...
26,316,270 UART: [rt]cmd =0x46505344, len=4
26,426,454 >>> mbox cmd response data (8 bytes)
26,426,978 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,427,257 UART: Fatal Error: 0x000E0008
26,428,447 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,229 UART: [kat] SHA2-256
892,167 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,859 UART: [fht] Storing FHT @ 0x50003400
1,479,442 UART: [idev] ++
1,479,610 UART: [idev] CDI.KEYID = 6
1,479,970 UART: [idev] SUBJECT.KEYID = 7
1,480,394 UART: [idev] UDS.KEYID = 0
1,480,739 ready_for_fw is high
1,480,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,230 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,906 UART: [idev] --
1,515,037 UART: [ldev] ++
1,515,205 UART: [ldev] CDI.KEYID = 6
1,515,568 UART: [ldev] SUBJECT.KEYID = 5
1,515,994 UART: [ldev] AUTHORITY.KEYID = 7
1,516,457 UART: [ldev] FE.KEYID = 1
1,521,699 UART: [ldev] Erasing FE.KEYID = 1
1,547,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,218 UART: [ldev] --
1,586,615 UART: [fwproc] Waiting for Commands...
1,587,364 UART: [fwproc] Received command 0x46574c44
1,588,155 UART: [fwproc] Received Image of size 114448 bytes
2,888,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,736 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,167 >>> mbox cmd response: success
3,080,167 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,081,427 UART: [afmc] ++
3,081,595 UART: [afmc] CDI.KEYID = 6
3,081,957 UART: [afmc] SUBJECT.KEYID = 7
3,082,382 UART: [afmc] AUTHORITY.KEYID = 5
3,117,375 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,359 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,752 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,442 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,273 UART: [afmc] --
3,160,245 UART: [cold-reset] --
3,160,949 UART: [state] Locking Datavault
3,162,280 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,884 UART: [state] Locking ICCM
3,163,404 UART: [exit] Launching FMC @ 0x40000130
3,168,733 UART:
3,168,749 UART: Running Caliptra FMC ...
3,169,157 UART:
3,169,211 UART: [state] CFI Enabled
3,179,460 UART: [fht] FMC Alias Private Key: 7
3,287,423 UART: [art] Extend RT PCRs Done
3,287,851 UART: [art] Lock RT PCRs Done
3,289,273 UART: [art] Populate DV Done
3,297,436 UART: [fht] FMC Alias Private Key: 7
3,298,368 UART: [art] Derive CDI
3,298,648 UART: [art] Store in in slot 0x4
3,384,603 UART: [art] Derive Key Pair
3,384,963 UART: [art] Store priv key in slot 0x5
3,398,089 UART: [art] Derive Key Pair - Done
3,413,020 UART: [art] Signing Cert with AUTHO
3,413,500 UART: RITY.KEYID = 7
3,428,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,229 UART: [art] PUB.X = D6F54819C91E9138A13EF0C50064F0D1C31E95CA1A4504A0E278426DDE88B2D5BACBAA59F2EF7FB114C0EA3B0F3ACF10
3,435,991 UART: [art] PUB.Y = 25827621EC1CE9C2761CA50A6BF7022A1296250AFB99AC2116D34DACE7CDA6DC08A70563205863FB099421D54982408B
3,442,923 UART: [art] SIG.R = 9F0EFDCC7A47C5E4595887EBEF7B3A56CE834CCEB85154CB914F61B382DA9EA7096D392A0241DF663166E0AD2D27ABD2
3,449,702 UART: [art] SIG.S = E0C922FCA9599F8B25478CE70B853D008ECDCDB4CE4F8C956DB7A30C5BE3F4B093173EFEE4392E12B9A75F8500853940
3,473,317 UART: Caliptra RT
3,473,570 UART: [state] CFI Enabled
3,581,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,960 UART: [rt]cmd =0x46505344, len=4
3,720,392 >>> mbox cmd response data (8 bytes)
3,720,393 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,720,429 UART: Fatal Error: 0x000E0008
3,721,563 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,841 ready_for_fw is high
1,362,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,979 >>> mbox cmd response: success
2,929,979 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,991,187 UART:
2,991,203 UART: Running Caliptra FMC ...
2,991,611 UART:
2,991,665 UART: [state] CFI Enabled
3,001,966 UART: [fht] FMC Alias Private Key: 7
3,110,295 UART: [art] Extend RT PCRs Done
3,110,723 UART: [art] Lock RT PCRs Done
3,112,305 UART: [art] Populate DV Done
3,120,388 UART: [fht] FMC Alias Private Key: 7
3,121,400 UART: [art] Derive CDI
3,121,680 UART: [art] Store in in slot 0x4
3,207,313 UART: [art] Derive Key Pair
3,207,673 UART: [art] Store priv key in slot 0x5
3,220,905 UART: [art] Derive Key Pair - Done
3,235,924 UART: [art] Signing Cert with AUTHO
3,236,404 UART: RITY.KEYID = 7
3,251,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,339 UART: [art] PUB.X = 043035DE47EB6D02653BE2681EE52662FF41FBF968F97033CCE81475517E244FA53D90515F61E62D80F72BFD2129C798
3,259,101 UART: [art] PUB.Y = D38390B8E4667D82BD7E22A919D2E8BAFBD3A98128D84366E83D7499E5082EA58A845826B287F2E71552B45EE2D7F447
3,266,048 UART: [art] SIG.R = 6F77CA40E6C1B8EED297223311A4751A2D49F92F3294189F1D79647F4A2919C0FFD769597D2273234C63391709154273
3,272,801 UART: [art] SIG.S = BBE49981FC60C5D150D741516A88CCA48D4297407767410E7D77088B4AF0E11B715A2BACB8FBC7969415B0A1CAC43B9D
3,296,378 UART: Caliptra RT
3,296,631 UART: [state] CFI Enabled
3,404,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,958 UART: [rt]cmd =0x46505344, len=4
3,543,412 >>> mbox cmd response data (8 bytes)
3,543,413 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,449 UART: Fatal Error: 0x000E0008
3,544,583 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,060 UART: [kat] SHA2-256
892,998 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,477,096 UART: [cold-reset] ++
1,477,636 UART: [fht] Storing FHT @ 0x50003400
1,480,443 UART: [idev] ++
1,480,611 UART: [idev] CDI.KEYID = 6
1,480,971 UART: [idev] SUBJECT.KEYID = 7
1,481,395 UART: [idev] UDS.KEYID = 0
1,481,740 ready_for_fw is high
1,481,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,305 UART: [idev] Erasing UDS.KEYID = 0
1,506,271 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,711 UART: [idev] --
1,515,690 UART: [ldev] ++
1,515,858 UART: [ldev] CDI.KEYID = 6
1,516,221 UART: [ldev] SUBJECT.KEYID = 5
1,516,647 UART: [ldev] AUTHORITY.KEYID = 7
1,517,110 UART: [ldev] FE.KEYID = 1
1,522,606 UART: [ldev] Erasing FE.KEYID = 1
1,547,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,977 UART: [ldev] --
1,587,288 UART: [fwproc] Waiting for Commands...
1,588,097 UART: [fwproc] Received command 0x46574c44
1,588,888 UART: [fwproc] Received Image of size 114448 bytes
2,888,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,554 >>> mbox cmd response: success
3,081,554 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,082,760 UART: [afmc] ++
3,082,928 UART: [afmc] CDI.KEYID = 6
3,083,290 UART: [afmc] SUBJECT.KEYID = 7
3,083,715 UART: [afmc] AUTHORITY.KEYID = 5
3,118,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,777 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,467 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,368 UART: [afmc] --
3,162,368 UART: [cold-reset] --
3,163,068 UART: [state] Locking Datavault
3,164,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,877 UART: [state] Locking ICCM
3,165,505 UART: [exit] Launching FMC @ 0x40000130
3,170,834 UART:
3,170,850 UART: Running Caliptra FMC ...
3,171,258 UART:
3,171,401 UART: [state] CFI Enabled
3,182,076 UART: [fht] FMC Alias Private Key: 7
3,290,791 UART: [art] Extend RT PCRs Done
3,291,219 UART: [art] Lock RT PCRs Done
3,293,205 UART: [art] Populate DV Done
3,301,552 UART: [fht] FMC Alias Private Key: 7
3,302,490 UART: [art] Derive CDI
3,302,770 UART: [art] Store in in slot 0x4
3,388,479 UART: [art] Derive Key Pair
3,388,839 UART: [art] Store priv key in slot 0x5
3,401,921 UART: [art] Derive Key Pair - Done
3,416,515 UART: [art] Signing Cert with AUTHO
3,416,995 UART: RITY.KEYID = 7
3,432,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,084 UART: [art] PUB.X = E55FB15435E9FB414255DFF703E89A0FCEDB79784EB9C3D71BFE9785A3155935D00ADF98E2E4AC1F0E7A7357F61AAFDE
3,439,862 UART: [art] PUB.Y = E986D621D1EAE993F2D4218791B0BF6463589961140FC187CD55B719F2165A7845034406D92545034869C11C03E36FA4
3,446,783 UART: [art] SIG.R = E035ECCC2EA5D5C3EED7CD9283B39766783358DBD3977F7D1E8BC64FD3BEC39F828947AE31B63AE581F2140F9C88C31D
3,453,566 UART: [art] SIG.S = C3DFB86885D7B0FED2490E7DB05001C42A8399E5B0AC4B407B8A3D3EA5C0E7DC0F6F308D2C3ED8C6145E1DF91B3FC2B5
3,477,552 UART: Caliptra RT
3,477,897 UART: [state] CFI Enabled
3,585,759 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,511 UART: [rt]cmd =0x46505344, len=4
3,724,843 >>> mbox cmd response data (8 bytes)
3,724,844 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,724,880 UART: Fatal Error: 0x000E0008
3,726,014 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,674 >>> mbox cmd response: success
2,930,674 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,993,034 UART:
2,993,050 UART: Running Caliptra FMC ...
2,993,458 UART:
2,993,601 UART: [state] CFI Enabled
3,004,050 UART: [fht] FMC Alias Private Key: 7
3,111,875 UART: [art] Extend RT PCRs Done
3,112,303 UART: [art] Lock RT PCRs Done
3,114,075 UART: [art] Populate DV Done
3,122,200 UART: [fht] FMC Alias Private Key: 7
3,123,346 UART: [art] Derive CDI
3,123,626 UART: [art] Store in in slot 0x4
3,209,483 UART: [art] Derive Key Pair
3,209,843 UART: [art] Store priv key in slot 0x5
3,222,961 UART: [art] Derive Key Pair - Done
3,238,119 UART: [art] Signing Cert with AUTHO
3,238,599 UART: RITY.KEYID = 7
3,253,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,666 UART: [art] PUB.X = DFF50CF0AF9E0B9F98B221679F14EE74BDA4DFBC13968EB73933481282CA4471B6DB6841509F83071D193F8B8AAD2EA3
3,261,439 UART: [art] PUB.Y = B6B640DBF05916980290AFAA4BD9770D2780A3CC9FEE3F6B0AD9FAF85E6C7D6E5225406DB03FF6C387AF2164107FBA9F
3,268,398 UART: [art] SIG.R = 42550D4E35FF97DDACAC633A5E899B8ED0B154F84D60FA4F51E249CECB477B9915B50E8FD8FD35D6B67F27A526ADBD65
3,275,182 UART: [art] SIG.S = B61FEFF4C92AF0C8AB05472D09CAF7942F0E3AF6985E32BED5BF126B38295C23136E4050C97B387176BDF73FECC13CA5
3,299,400 UART: Caliptra RT
3,299,745 UART: [state] CFI Enabled
3,407,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,972 UART: [rt]cmd =0x46505344, len=4
3,546,440 >>> mbox cmd response data (8 bytes)
3,546,441 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,546,477 UART: Fatal Error: 0x000E0008
3,547,611 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,285 UART: [kat] SHA2-256
904,225 UART: [kat] SHA2-384
906,994 UART: [kat] SHA2-512-ACC
908,895 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,489 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,927 UART: [idev] Sha1 KeyId Algorithm
1,209,573 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,054 UART: [ldev] SUBJECT.KEYID = 5
1,211,480 UART: [ldev] AUTHORITY.KEYID = 7
1,211,943 UART: [ldev] FE.KEYID = 1
1,217,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,465 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,586 UART: [fwproc] Recv command 0x46574c44
1,284,314 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,110 >>> mbox cmd response: success
2,775,110 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,776,298 UART: [afmc] ++
2,776,466 UART: [afmc] CDI.KEYID = 6
2,776,828 UART: [afmc] SUBJECT.KEYID = 7
2,777,253 UART: [afmc] AUTHORITY.KEYID = 5
2,813,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,701 UART: [afmc] --
2,856,833 UART: [cold-reset] --
2,857,831 UART: [state] Locking Datavault
2,859,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,864 UART: [state] Locking ICCM
2,860,436 UART: [exit] Launching FMC @ 0x40000130
2,865,765 UART:
2,865,781 UART: Running Caliptra FMC ...
2,866,189 UART:
2,866,243 UART: [state] CFI Enabled
2,876,762 UART: [fht] FMC Alias Private Key: 7
2,984,695 UART: [art] Extend RT PCRs Done
2,985,123 UART: [art] Lock RT PCRs Done
2,986,773 UART: [art] Populate DV Done
2,994,828 UART: [fht] FMC Alias Private Key: 7
2,995,902 UART: [art] Derive CDI
2,996,182 UART: [art] Store in in slot 0x4
3,081,835 UART: [art] Derive Key Pair
3,082,195 UART: [art] Store priv key in slot 0x5
3,095,667 UART: [art] Derive Key Pair - Done
3,110,463 UART: [art] Signing Cert with AUTHO
3,110,943 UART: RITY.KEYID = 7
3,126,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,874 UART: [art] PUB.X = DCF053EE52A370DD97773DCEA141A1BBADD12C0B1C48FC03E3167E87FDC679E13F31B54C51C78023A913B1A811F7EBBF
3,133,658 UART: [art] PUB.Y = 812ED2C3AF0A6F41F7E3AF7FA0B474667DE81FB9C90AA6C5484F2BE3B2FB3FEE6BDE2C10F9EAEDE1EFF7B09DB9593EBA
3,140,640 UART: [art] SIG.R = 270C8D20B67DB205B485B5341B41D6952644BB42ABCCE4C06AFA445D9B8601C407F77C7F0F4D58E0424AABE598B906D1
3,147,400 UART: [art] SIG.S = 933DB1DA979B6A4ED227BDE590D6A7032657254272C25B4BDEE791BB21CDFC2CE0F341EE4145461FEBC58990E189DB41
3,171,466 UART: Caliptra RT
3,171,719 UART: [state] CFI Enabled
3,280,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,058 UART: [rt]cmd =0x46505344, len=4
3,419,664 >>> mbox cmd response data (8 bytes)
3,419,665 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,419,701 UART: Fatal Error: 0x000E0008
3,420,835 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,685 >>> mbox cmd response: success
2,628,685 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,691,075 UART:
2,691,091 UART: Running Caliptra FMC ...
2,691,499 UART:
2,691,553 UART: [state] CFI Enabled
2,701,700 UART: [fht] FMC Alias Private Key: 7
2,810,315 UART: [art] Extend RT PCRs Done
2,810,743 UART: [art] Lock RT PCRs Done
2,812,597 UART: [art] Populate DV Done
2,820,816 UART: [fht] FMC Alias Private Key: 7
2,821,804 UART: [art] Derive CDI
2,822,084 UART: [art] Store in in slot 0x4
2,907,819 UART: [art] Derive Key Pair
2,908,179 UART: [art] Store priv key in slot 0x5
2,921,129 UART: [art] Derive Key Pair - Done
2,935,756 UART: [art] Signing Cert with AUTHO
2,936,236 UART: RITY.KEYID = 7
2,951,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,273 UART: [art] PUB.X = 56994407A88A0B5952745E6C42927FE76CA3F86840FE2873703D67E3B6733DDB2E794A530C72A4D7C2161F50852F32DF
2,959,028 UART: [art] PUB.Y = A7C983E5B3F06D429639758301D5DFACB8F23AC1E3BE9C8C4B8EAFCE0EDDCE7D1BAFDCF026067299DB1B32B916AC1C79
2,965,997 UART: [art] SIG.R = 0AF25AD5AAAB03220AAA5163C2DD5D04619FFF1FFA7FB0997BCAD6972E62C4A646E2EE16DC40F6AF9AE8EC93903729F7
2,972,779 UART: [art] SIG.S = B257A5713E7910987FFC9E62B6E944B27DBE9872E95665F2D12F75B2268F886D0F8DCEE55E9D929234C2FDA756962AF1
2,996,855 UART: Caliptra RT
2,997,108 UART: [state] CFI Enabled
3,104,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,265 UART: [rt]cmd =0x46505344, len=4
3,243,751 >>> mbox cmd response data (8 bytes)
3,243,752 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,243,788 UART: Fatal Error: 0x000E0008
3,244,922 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,645 UART: [kat] LMS
1,171,973 UART: [kat] --
1,172,694 UART: [cold-reset] ++
1,173,040 UART: [fht] FHT @ 0x50003400
1,175,647 UART: [idev] ++
1,175,815 UART: [idev] CDI.KEYID = 6
1,176,175 UART: [idev] SUBJECT.KEYID = 7
1,176,599 UART: [idev] UDS.KEYID = 0
1,176,944 ready_for_fw is high
1,176,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,238 UART: [idev] --
1,211,258 UART: [ldev] ++
1,211,426 UART: [ldev] CDI.KEYID = 6
1,211,789 UART: [ldev] SUBJECT.KEYID = 5
1,212,215 UART: [ldev] AUTHORITY.KEYID = 7
1,212,678 UART: [ldev] FE.KEYID = 1
1,217,970 UART: [ldev] Erasing FE.KEYID = 1
1,244,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,008 UART: [ldev] --
1,284,449 UART: [fwproc] Wait for Commands...
1,285,067 UART: [fwproc] Recv command 0x46574c44
1,285,795 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,135 >>> mbox cmd response: success
2,777,135 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,778,343 UART: [afmc] ++
2,778,511 UART: [afmc] CDI.KEYID = 6
2,778,873 UART: [afmc] SUBJECT.KEYID = 7
2,779,298 UART: [afmc] AUTHORITY.KEYID = 5
2,814,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,796 UART: [afmc] --
2,857,784 UART: [cold-reset] --
2,858,730 UART: [state] Locking Datavault
2,860,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,795 UART: [state] Locking ICCM
2,861,369 UART: [exit] Launching FMC @ 0x40000130
2,866,698 UART:
2,866,714 UART: Running Caliptra FMC ...
2,867,122 UART:
2,867,265 UART: [state] CFI Enabled
2,878,000 UART: [fht] FMC Alias Private Key: 7
2,986,421 UART: [art] Extend RT PCRs Done
2,986,849 UART: [art] Lock RT PCRs Done
2,988,367 UART: [art] Populate DV Done
2,996,524 UART: [fht] FMC Alias Private Key: 7
2,997,596 UART: [art] Derive CDI
2,997,876 UART: [art] Store in in slot 0x4
3,083,695 UART: [art] Derive Key Pair
3,084,055 UART: [art] Store priv key in slot 0x5
3,096,887 UART: [art] Derive Key Pair - Done
3,111,623 UART: [art] Signing Cert with AUTHO
3,112,103 UART: RITY.KEYID = 7
3,127,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,984 UART: [art] PUB.X = 58BEEB1E30D5E974086145EA990DE9FA7625E07340898C7702D1F925199C5DDC65A210A8ECC783DE258F1DCA21A684C7
3,134,751 UART: [art] PUB.Y = 356CF656D1E12BB184699C3BEE9B006F01837FFAAE090EE0938930EFACA925CDB4F10B6043F213D70803A386628CB458
3,141,667 UART: [art] SIG.R = 78CC96055F91F3867065438E8BC4359F5349FB5105678B15C0D3C889CF1C819E3BE861B8146578821DDFE888B29F42AC
3,148,427 UART: [art] SIG.S = 885030F4D5CAFA110E9F81F9E3D23FFE6C082446A076C6BA3D83185AB0B8994A97DCB15356FB2408B80DF2FD2091C850
3,171,918 UART: Caliptra RT
3,172,263 UART: [state] CFI Enabled
3,279,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,764 UART: [rt]cmd =0x46505344, len=4
3,418,142 >>> mbox cmd response data (8 bytes)
3,418,143 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,418,179 UART: Fatal Error: 0x000E0008
3,419,313 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,930 ready_for_fw is high
1,060,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,764 >>> mbox cmd response: success
2,627,764 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,690,196 UART:
2,690,212 UART: Running Caliptra FMC ...
2,690,620 UART:
2,690,763 UART: [state] CFI Enabled
2,701,362 UART: [fht] FMC Alias Private Key: 7
2,809,799 UART: [art] Extend RT PCRs Done
2,810,227 UART: [art] Lock RT PCRs Done
2,811,995 UART: [art] Populate DV Done
2,820,220 UART: [fht] FMC Alias Private Key: 7
2,821,376 UART: [art] Derive CDI
2,821,656 UART: [art] Store in in slot 0x4
2,907,449 UART: [art] Derive Key Pair
2,907,809 UART: [art] Store priv key in slot 0x5
2,921,145 UART: [art] Derive Key Pair - Done
2,936,056 UART: [art] Signing Cert with AUTHO
2,936,536 UART: RITY.KEYID = 7
2,952,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,949 UART: [art] PUB.X = 2A0966E488A4FA81BA0A488ED7ECDCB65E3448A000E47AB15BE8D391BE29F102FB19A7BC6C96444763BA0327668793E4
2,959,693 UART: [art] PUB.Y = 4BCA53089BE8A75E009E43DCB7092044F560990775D1B8D170ECD96A389EA39AC9C5C9B7533BD586136054678277AD73
2,966,610 UART: [art] SIG.R = 2BAFB5F7B625EE4168BCC70C023BE9B529D624EE9737A3C9EB9C4ACA02F77D4778DB336100B9646186248E9FFE6A9D9C
2,973,363 UART: [art] SIG.S = BF10FC450E27C5AA5C039B533D1670764259F45B4F4EF7FDAAD4C6818C52B1BDA36518926460D23953C79185B52F7EFF
2,997,636 UART: Caliptra RT
2,997,981 UART: [state] CFI Enabled
3,105,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,654 UART: [rt]cmd =0x46505344, len=4
3,244,058 >>> mbox cmd response data (8 bytes)
3,244,059 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,244,095 UART: Fatal Error: 0x000E0008
3,245,229 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,227 UART: [kat] SHA2-256
902,167 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,869 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 ready_for_fw is high
1,174,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,697 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,940 UART: [ldev] ++
1,210,108 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,899 UART: [ldev] AUTHORITY.KEYID = 7
1,211,362 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,672 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46574c44
1,282,528 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,860 >>> mbox cmd response: success
2,772,860 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,079 UART: [afmc] ++
2,774,247 UART: [afmc] CDI.KEYID = 6
2,774,610 UART: [afmc] SUBJECT.KEYID = 7
2,775,036 UART: [afmc] AUTHORITY.KEYID = 5
2,810,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,346 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,798 UART: [afmc] --
2,853,762 UART: [cold-reset] --
2,854,830 UART: [state] Locking Datavault
2,855,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,315 UART: [state] Locking ICCM
2,856,793 UART: [exit] Launching FMC @ 0x40000130
2,862,122 UART:
2,862,138 UART: Running Caliptra FMC ...
2,862,546 UART:
2,862,600 UART: [state] CFI Enabled
2,873,083 UART: [fht] FMC Alias Private Key: 7
2,981,026 UART: [art] Extend RT PCRs Done
2,981,454 UART: [art] Lock RT PCRs Done
2,983,050 UART: [art] Populate DV Done
2,991,179 UART: [fht] FMC Alias Private Key: 7
2,992,137 UART: [art] Derive CDI
2,992,417 UART: [art] Store in in slot 0x4
3,077,848 UART: [art] Derive Key Pair
3,078,208 UART: [art] Store priv key in slot 0x5
3,091,716 UART: [art] Derive Key Pair - Done
3,106,285 UART: [art] Signing Cert with AUTHO
3,106,765 UART: RITY.KEYID = 7
3,121,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,500 UART: [art] PUB.X = CD8DF0A8DB9283143E4ED4BECC2CF64B4CE4F36E5CC51C356FCDD93545C75CA6139E55E15CDFBACEC07293BF84D37831
3,129,296 UART: [art] PUB.Y = CA16131A91A1D6E85DF3D7B2464F9214A53B3C3A5C4515033A3F4ADC57131969B769930B1704425B22778A96DB574093
3,136,229 UART: [art] SIG.R = 5E475939981B03D7BCAA292C741F84ACD6C103AAA59FB45AC29848BD15EBD920CF1D45E815038571374148A0C41BD9A3
3,142,996 UART: [art] SIG.S = 28145DFACC14F0BAE37DC335AED91F8E1815F45B8093234D9EABD7E6CAFFA20EC2F67F56DBF878EF9D180A0468B158C5
3,167,024 UART: Caliptra RT
3,167,277 UART: [state] CFI Enabled
3,275,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,794 UART: [rt]cmd =0x46505344, len=4
3,414,490 >>> mbox cmd response data (8 bytes)
3,414,491 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,527 UART: Fatal Error: 0x000E0008
3,415,661 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,358 ready_for_fw is high
1,056,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,612 >>> mbox cmd response: success
2,624,612 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,686,120 UART:
2,686,136 UART: Running Caliptra FMC ...
2,686,544 UART:
2,686,598 UART: [state] CFI Enabled
2,697,129 UART: [fht] FMC Alias Private Key: 7
2,804,820 UART: [art] Extend RT PCRs Done
2,805,248 UART: [art] Lock RT PCRs Done
2,807,096 UART: [art] Populate DV Done
2,815,229 UART: [fht] FMC Alias Private Key: 7
2,816,267 UART: [art] Derive CDI
2,816,547 UART: [art] Store in in slot 0x4
2,902,110 UART: [art] Derive Key Pair
2,902,470 UART: [art] Store priv key in slot 0x5
2,915,348 UART: [art] Derive Key Pair - Done
2,929,984 UART: [art] Signing Cert with AUTHO
2,930,464 UART: RITY.KEYID = 7
2,945,926 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,691 UART: [art] PUB.X = AF3CA1B080331E302C5BC3E097D8F885228E4F88CE1066A3F65385140ADA568857E32FE6070BFBE0ACA936F0F9A038D9
2,953,460 UART: [art] PUB.Y = 2AA18ED541DAD7AA072E06591050F26DA8DBA4C544C2E92695D8565BD3704814978215D1E00AE8E3A79D08AD4C794384
2,960,400 UART: [art] SIG.R = 7103FF963D353B06F97574C813BC44E4A77E4CEF8D147F170ADF504F9AE9D44162988C12B105D41BB774AA1F47CB8BE2
2,967,166 UART: [art] SIG.S = FCC83E15D0C23A4A23A4A31444A5FC44A1B3FFA6386EB7E6AB7920934C5179A338C09857655EACE36F84D0A41AB8A040
2,991,073 UART: Caliptra RT
2,991,326 UART: [state] CFI Enabled
3,099,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,555 UART: [rt]cmd =0x46505344, len=4
3,237,607 >>> mbox cmd response data (8 bytes)
3,237,608 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,237,644 UART: Fatal Error: 0x000E0008
3,238,778 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,174,700 ready_for_fw is high
1,174,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,241,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,733 UART: [ldev] --
1,281,143 UART: [fwproc] Wait for Commands...
1,281,750 UART: [fwproc] Recv command 0x46574c44
1,282,483 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,447 >>> mbox cmd response: success
2,775,447 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,776,562 UART: [afmc] ++
2,776,730 UART: [afmc] CDI.KEYID = 6
2,777,093 UART: [afmc] SUBJECT.KEYID = 7
2,777,519 UART: [afmc] AUTHORITY.KEYID = 5
2,813,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,949 UART: [afmc] --
2,855,921 UART: [cold-reset] --
2,856,729 UART: [state] Locking Datavault
2,858,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,708 UART: [state] Locking ICCM
2,859,134 UART: [exit] Launching FMC @ 0x40000130
2,864,463 UART:
2,864,479 UART: Running Caliptra FMC ...
2,864,887 UART:
2,865,030 UART: [state] CFI Enabled
2,875,499 UART: [fht] FMC Alias Private Key: 7
2,983,340 UART: [art] Extend RT PCRs Done
2,983,768 UART: [art] Lock RT PCRs Done
2,985,636 UART: [art] Populate DV Done
2,993,863 UART: [fht] FMC Alias Private Key: 7
2,994,967 UART: [art] Derive CDI
2,995,247 UART: [art] Store in in slot 0x4
3,080,600 UART: [art] Derive Key Pair
3,080,960 UART: [art] Store priv key in slot 0x5
3,094,344 UART: [art] Derive Key Pair - Done
3,109,140 UART: [art] Signing Cert with AUTHO
3,109,620 UART: RITY.KEYID = 7
3,124,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,725 UART: [art] PUB.X = 72BEBD87F280984F3323BB1A1560E9D3BB9269D0BCE8674E3A21847BF7E3FB215B5C0A709ACA71C52B7ADF64ADEB96E2
3,132,510 UART: [art] PUB.Y = B2F7E8FE0634A220E3C0148CBF925655A9870B8EF79D8C67BC0342BB2893B35C8C23A9E22048BBD7D2A22DCCBFDAF60E
3,139,466 UART: [art] SIG.R = 5115536936CF38ABE84E7159588438203D53228A9DF46DACD78FBB646F6FA29D3858421ED4EA23CE6ABBE0AB6DBC4BED
3,146,252 UART: [art] SIG.S = 4AC11AF64075E1636D0005C19C1DFAEA3CDDB438A6F52D4353EE946045EB60F66D809FBD49C08C0D614E4C30618C3CDC
3,169,737 UART: Caliptra RT
3,170,082 UART: [state] CFI Enabled
3,277,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,131 UART: [rt]cmd =0x46505344, len=4
3,416,587 >>> mbox cmd response data (8 bytes)
3,416,588 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,416,624 UART: Fatal Error: 0x000E0008
3,417,758 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 ready_for_fw is high
1,056,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,769 >>> mbox cmd response: success
2,624,769 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,687,251 UART:
2,687,267 UART: Running Caliptra FMC ...
2,687,675 UART:
2,687,818 UART: [state] CFI Enabled
2,698,485 UART: [fht] FMC Alias Private Key: 7
2,806,720 UART: [art] Extend RT PCRs Done
2,807,148 UART: [art] Lock RT PCRs Done
2,808,808 UART: [art] Populate DV Done
2,817,079 UART: [fht] FMC Alias Private Key: 7
2,818,015 UART: [art] Derive CDI
2,818,295 UART: [art] Store in in slot 0x4
2,904,286 UART: [art] Derive Key Pair
2,904,646 UART: [art] Store priv key in slot 0x5
2,918,008 UART: [art] Derive Key Pair - Done
2,932,950 UART: [art] Signing Cert with AUTHO
2,933,430 UART: RITY.KEYID = 7
2,948,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,229 UART: [art] PUB.X = 5A58953AAC1EB4E474CAA48C343CD60EE024BA890E9B4CE5E938E5E01C26786E13BEEF8A0E050513A7D964A5F6E76D24
2,955,998 UART: [art] PUB.Y = 6F70470123D1068B8E6443AF9C7DCE7F7EE7BE781F4FF1D1A743110D48BFD2CEEFAF16163A5FE285A82A594B599F62D4
2,962,953 UART: [art] SIG.R = 09F76587ACDF45495018220FE750B65448A8F7B796A49CDA762BD60D6DF0236C407580FB58C2229019D885609FEAB224
2,969,710 UART: [art] SIG.S = 54C84A5149722D659303ECD6173DD311D0AD6E129695E4DCC1D6DED87EE01981196784177F4AF25C785831BE2B8BA24D
2,993,644 UART: Caliptra RT
2,993,989 UART: [state] CFI Enabled
3,103,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,522 UART: [rt]cmd =0x46505344, len=4
3,241,878 >>> mbox cmd response data (8 bytes)
3,241,879 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,241,915 UART: Fatal Error: 0x000E0008
3,243,049 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,153 UART:
192,520 UART: Running Caliptra ROM ...
193,711 UART:
193,871 UART: [state] CFI Enabled
264,905 UART: [state] LifecycleState = Unprovisioned
266,851 UART: [state] DebugLocked = No
269,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,114 UART: [kat] SHA2-256
443,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,298 UART: [kat] ++
454,778 UART: [kat] sha1
465,825 UART: [kat] SHA2-256
468,523 UART: [kat] SHA2-384
473,813 UART: [kat] SHA2-512-ACC
476,178 UART: [kat] ECC-384
2,767,210 UART: [kat] HMAC-384Kdf
2,798,935 UART: [kat] LMS
3,989,262 UART: [kat] --
3,993,326 UART: [cold-reset] ++
3,995,822 UART: [fht] Storing FHT @ 0x50003400
4,006,589 UART: [idev] ++
4,007,155 UART: [idev] CDI.KEYID = 6
4,008,191 UART: [idev] SUBJECT.KEYID = 7
4,009,372 UART: [idev] UDS.KEYID = 0
4,010,414 ready_for_fw is high
4,010,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,167 UART: [idev] Erasing UDS.KEYID = 0
7,345,919 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,177 UART: [idev] --
7,372,870 UART: [ldev] ++
7,373,439 UART: [ldev] CDI.KEYID = 6
7,374,558 UART: [ldev] SUBJECT.KEYID = 5
7,375,683 UART: [ldev] AUTHORITY.KEYID = 7
7,376,826 UART: [ldev] FE.KEYID = 1
7,423,125 UART: [ldev] Erasing FE.KEYID = 1
10,752,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,615 UART: [ldev] --
13,116,657 UART: [fwproc] Waiting for Commands...
13,118,916 UART: [fwproc] Received command 0x46574c44
13,121,098 UART: [fwproc] Received Image of size 114124 bytes
17,173,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,243 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,632,726 >>> mbox cmd response: success
17,633,294 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,636,461 UART: [afmc] ++
17,637,045 UART: [afmc] CDI.KEYID = 6
17,637,931 UART: [afmc] SUBJECT.KEYID = 7
17,639,203 UART: [afmc] AUTHORITY.KEYID = 5
20,996,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,299,875 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,311 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,155 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,606 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,364,753 UART: [afmc] --
23,368,560 UART: [cold-reset] --
23,372,200 UART: [state] Locking Datavault
23,377,557 UART: [state] Locking PCR0, PCR1 and PCR31
23,379,250 UART: [state] Locking ICCM
23,380,855 UART: [exit] Launching FMC @ 0x40000130
23,389,248 UART:
23,389,491 UART: Running Caliptra FMC ...
23,390,521 UART:
23,390,668 UART: [state] CFI Enabled
23,457,536 UART: [fht] FMC Alias Private Key: 7
25,795,543 UART: [art] Extend RT PCRs Done
25,796,757 UART: [art] Lock RT PCRs Done
25,798,409 UART: [art] Populate DV Done
25,803,987 UART: [fht] FMC Alias Private Key: 7
25,805,630 UART: [art] Derive CDI
25,806,370 UART: [art] Store in in slot 0x4
25,865,212 UART: [art] Derive Key Pair
25,866,247 UART: [art] Store priv key in slot 0x5
29,159,231 UART: [art] Derive Key Pair - Done
29,172,293 UART: [art] Signing Cert with AUTHO
29,173,615 UART: RITY.KEYID = 7
31,460,304 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,813 UART: [art] PUB.X = F39035683760B86396CCEC24BC91173DB8ACDCA3266199D2B97B7079FDA5221A5E18C73D2C2AA36BC77EC6CD08F79CF3
31,469,067 UART: [art] PUB.Y = F9F3EAFB7EA2C5ACF2B77CF7F793BB3EBE7F7C61CAD8486FD3B1A09950FD7211699A7F8888DB2A499F90A60D9A3D6B5B
31,476,358 UART: [art] SIG.R = 4DBFEA144C8BFA2676DB7917FF8382E29BF11BB4DE936C50CA22DC38D60F8230ECA3E1EFC2E79779F5FAFF858585D81F
31,483,767 UART: [art] SIG.S = 4E9940D41DBDB58107ABCA843DE4DFA72DC22873FEB019A145BF3BFC59B532D020DCDB81F39B782B215C4BAAABC8632E
32,789,156 UART: Caliptra RT
32,789,860 UART: [state] CFI Enabled
32,952,309 UART: [rt] RT listening for mailbox commands...
32,983,615 UART: [rt]cmd =0x46505652, len=4
32,984,864 UART: [rt] FIPS Version
32,986,082 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,804,996 ready_for_fw is high
3,805,624 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,488 >>> mbox cmd response: success
17,879,174 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,569,677 UART:
23,570,053 UART: Running Caliptra FMC ...
23,571,162 UART:
23,571,314 UART: [state] CFI Enabled
23,638,091 UART: [fht] FMC Alias Private Key: 7
25,976,137 UART: [art] Extend RT PCRs Done
25,977,361 UART: [art] Lock RT PCRs Done
25,978,913 UART: [art] Populate DV Done
25,984,549 UART: [fht] FMC Alias Private Key: 7
25,986,041 UART: [art] Derive CDI
25,986,869 UART: [art] Store in in slot 0x4
26,047,097 UART: [art] Derive Key Pair
26,048,143 UART: [art] Store priv key in slot 0x5
29,341,119 UART: [art] Derive Key Pair - Done
29,353,903 UART: [art] Signing Cert with AUTHO
29,355,242 UART: RITY.KEYID = 7
31,642,955 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,464 UART: [art] PUB.X = A2906BB429F7603EDE739EC45BE6FFA9D8B74A548232E2165B34F18E1D3EF739D211E4D80E230C1EE0832BB4CCB28D16
31,651,750 UART: [art] PUB.Y = 2C31A65DB190A2464BA4CE5AED21B7B2AF487A5EA63E9875EB9707783C2F57C4C3ECF74FFFD87F5355D8E75D338CB0AD
31,658,987 UART: [art] SIG.R = 9FB98C3838FB2515DAFEE9345A4B9E81C8FAEE7D18D3A8C32AC477CDAEF2F570100A99179B7CED948EACEF13625FEFF1
31,666,392 UART: [art] SIG.S = CF2A03FD8A7A16C73CAF519664095ED055EC4C8B411FCDD7D3DAA87C14DA4317775BF6B1DE1AE68699D1F70683155C85
32,971,514 UART: Caliptra RT
32,972,232 UART: [state] CFI Enabled
33,133,823 UART: [rt] RT listening for mailbox commands...
33,165,442 UART: [rt]cmd =0x46505652, len=4
33,166,766 UART: [rt] FIPS Version
33,167,770 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,430 UART:
192,797 UART: Running Caliptra ROM ...
193,927 UART:
603,597 UART: [state] CFI Enabled
615,699 UART: [state] LifecycleState = Unprovisioned
617,636 UART: [state] DebugLocked = No
620,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,764 UART: [kat] SHA2-256
794,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,073 UART: [kat] ++
805,547 UART: [kat] sha1
817,426 UART: [kat] SHA2-256
820,117 UART: [kat] SHA2-384
827,312 UART: [kat] SHA2-512-ACC
829,675 UART: [kat] ECC-384
3,114,023 UART: [kat] HMAC-384Kdf
3,124,846 UART: [kat] LMS
4,314,904 UART: [kat] --
4,319,200 UART: [cold-reset] ++
4,321,560 UART: [fht] Storing FHT @ 0x50003400
4,333,529 UART: [idev] ++
4,334,100 UART: [idev] CDI.KEYID = 6
4,335,195 UART: [idev] SUBJECT.KEYID = 7
4,336,315 UART: [idev] UDS.KEYID = 0
4,337,300 ready_for_fw is high
4,337,500 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,687 UART: [idev] Erasing UDS.KEYID = 0
7,619,482 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,371 UART: [idev] --
7,643,664 UART: [ldev] ++
7,644,280 UART: [ldev] CDI.KEYID = 6
7,645,235 UART: [ldev] SUBJECT.KEYID = 5
7,646,447 UART: [ldev] AUTHORITY.KEYID = 7
7,647,677 UART: [ldev] FE.KEYID = 1
7,658,048 UART: [ldev] Erasing FE.KEYID = 1
10,948,746 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,390 UART: [ldev] --
13,310,737 UART: [fwproc] Waiting for Commands...
13,312,616 UART: [fwproc] Received command 0x46574c44
13,314,848 UART: [fwproc] Received Image of size 114124 bytes
17,364,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,224 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,006 >>> mbox cmd response: success
17,830,525 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,834,879 UART: [afmc] ++
17,835,465 UART: [afmc] CDI.KEYID = 6
17,836,487 UART: [afmc] SUBJECT.KEYID = 7
17,837,643 UART: [afmc] AUTHORITY.KEYID = 5
21,150,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,244 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,504 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,952 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,745 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,196 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,658 UART: [afmc] --
23,516,326 UART: [cold-reset] --
23,519,590 UART: [state] Locking Datavault
23,525,696 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,442 UART: [state] Locking ICCM
23,529,028 UART: [exit] Launching FMC @ 0x40000130
23,537,428 UART:
23,537,700 UART: Running Caliptra FMC ...
23,538,725 UART:
23,538,865 UART: [state] CFI Enabled
23,546,696 UART: [fht] FMC Alias Private Key: 7
25,877,834 UART: [art] Extend RT PCRs Done
25,879,054 UART: [art] Lock RT PCRs Done
25,880,588 UART: [art] Populate DV Done
25,886,107 UART: [fht] FMC Alias Private Key: 7
25,887,803 UART: [art] Derive CDI
25,888,536 UART: [art] Store in in slot 0x4
25,931,336 UART: [art] Derive Key Pair
25,932,332 UART: [art] Store priv key in slot 0x5
29,174,260 UART: [art] Derive Key Pair - Done
29,187,579 UART: [art] Signing Cert with AUTHO
29,188,889 UART: RITY.KEYID = 7
31,468,188 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,698 UART: [art] PUB.X = 50803A1BB59E0EA11B0EABF27146BC0ACD1DD244B24C96E6B2AABA4AB600071BC56A5747DFDD7810FE71BE859BBB1D44
31,476,945 UART: [art] PUB.Y = BF5A5CAEDF0F2658250975644F79A52640DF841C68BB771945996EB131F6B6CAF1DA260DF44E3CD64AD67148DAAD671A
31,484,221 UART: [art] SIG.R = B19CC9A2A266A275565CE052FBD28D391A42D3E37932587EE32D35320F0FECB349742461F119FBB53C9C920301D20752
31,491,615 UART: [art] SIG.S = 484E74B78D9D927488C434B5B468408419BD2F478B2A2AFF17F793F718C3EC31E181FA2A19E1D639DA1F3917E6195872
32,796,780 UART: Caliptra RT
32,797,497 UART: [state] CFI Enabled
32,915,332 UART: [rt] RT listening for mailbox commands...
32,946,748 UART: [rt]cmd =0x46505652, len=4
32,948,040 UART: [rt] FIPS Version
32,949,086 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,135,505 ready_for_fw is high
4,135,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,462 >>> mbox cmd response: success
18,074,058 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,714,842 UART:
23,715,270 UART: Running Caliptra FMC ...
23,716,372 UART:
23,716,522 UART: [state] CFI Enabled
23,724,845 UART: [fht] FMC Alias Private Key: 7
26,056,045 UART: [art] Extend RT PCRs Done
26,057,279 UART: [art] Lock RT PCRs Done
26,058,877 UART: [art] Populate DV Done
26,064,137 UART: [fht] FMC Alias Private Key: 7
26,065,782 UART: [art] Derive CDI
26,066,516 UART: [art] Store in in slot 0x4
26,109,004 UART: [art] Derive Key Pair
26,110,023 UART: [art] Store priv key in slot 0x5
29,352,384 UART: [art] Derive Key Pair - Done
29,365,007 UART: [art] Signing Cert with AUTHO
29,366,319 UART: RITY.KEYID = 7
31,645,615 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,126 UART: [art] PUB.X = E092295507628C0A044FCD597B142E42A178148A047C73000766EEB1DD207CB459FA20BE362FA27EE7B23E9B75320EB1
31,654,385 UART: [art] PUB.Y = 82D98BC5CA6ABF7B2B153ACE9ED8F6ECAFE1A0E51E31E78E62247E329D1FD58C4562BC4949390F18634460A67C0CC75F
31,661,618 UART: [art] SIG.R = 4E41CF16D470330A0817F0DA7AA9929DC6C6AEA1E3AB1988463F27DAA5511529F1B3A718E123C9088AD3DDE35CFACC01
31,669,051 UART: [art] SIG.S = 3BBBD0FB8A3C0D305518C7F2372821BB2CD6E350EC1E4D5B7FFC47F24A5D8C70BE816594A86157807FA1CB0A55662F98
32,974,322 UART: Caliptra RT
32,975,021 UART: [state] CFI Enabled
33,093,869 UART: [rt] RT listening for mailbox commands...
33,125,491 UART: [rt]cmd =0x46505652, len=4
33,126,822 UART: [rt] FIPS Version
33,127,987 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,021 UART:
192,407 UART: Running Caliptra ROM ...
193,508 UART:
193,652 UART: [state] CFI Enabled
262,813 UART: [state] LifecycleState = Unprovisioned
264,689 UART: [state] DebugLocked = No
266,842 UART: [state] WD Timer not started. Device not locked for debugging
271,335 UART: [kat] SHA2-256
450,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,018 UART: [kat] ++
462,471 UART: [kat] sha1
473,199 UART: [kat] SHA2-256
476,200 UART: [kat] SHA2-384
482,758 UART: [kat] SHA2-512-ACC
485,697 UART: [kat] ECC-384
2,946,452 UART: [kat] HMAC-384Kdf
2,970,496 UART: [kat] LMS
3,499,924 UART: [kat] --
3,505,767 UART: [cold-reset] ++
3,507,625 UART: [fht] FHT @ 0x50003400
3,518,051 UART: [idev] ++
3,518,616 UART: [idev] CDI.KEYID = 6
3,519,498 UART: [idev] SUBJECT.KEYID = 7
3,520,739 UART: [idev] UDS.KEYID = 0
3,521,639 ready_for_fw is high
3,521,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,139 UART: [idev] Erasing UDS.KEYID = 0
6,024,700 UART: [idev] Sha1 KeyId Algorithm
6,047,973 UART: [idev] --
6,050,859 UART: [ldev] ++
6,051,439 UART: [ldev] CDI.KEYID = 6
6,052,333 UART: [ldev] SUBJECT.KEYID = 5
6,053,498 UART: [ldev] AUTHORITY.KEYID = 7
6,054,790 UART: [ldev] FE.KEYID = 1
6,099,118 UART: [ldev] Erasing FE.KEYID = 1
8,597,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,927 UART: [ldev] --
10,389,542 UART: [fwproc] Wait for Commands...
10,392,282 UART: [fwproc] Recv command 0x46574c44
10,394,373 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,434 >>> mbox cmd response: success
14,258,001 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,261,318 UART: [afmc] ++
14,261,911 UART: [afmc] CDI.KEYID = 6
14,262,801 UART: [afmc] SUBJECT.KEYID = 7
14,264,032 UART: [afmc] AUTHORITY.KEYID = 5
16,783,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,560,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,483 UART: [afmc] --
18,587,510 UART: [cold-reset] --
18,590,593 UART: [state] Locking Datavault
18,595,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,004 UART: [state] Locking ICCM
18,599,727 UART: [exit] Launching FMC @ 0x40000130
18,608,125 UART:
18,608,359 UART: Running Caliptra FMC ...
18,609,383 UART:
18,609,550 UART: [state] CFI Enabled
18,669,825 UART: [fht] FMC Alias Private Key: 7
20,432,884 UART: [art] Extend RT PCRs Done
20,434,095 UART: [art] Lock RT PCRs Done
20,435,966 UART: [art] Populate DV Done
20,441,318 UART: [fht] FMC Alias Private Key: 7
20,442,798 UART: [art] Derive CDI
20,443,531 UART: [art] Store in in slot 0x4
20,502,154 UART: [art] Derive Key Pair
20,503,150 UART: [art] Store priv key in slot 0x5
22,965,803 UART: [art] Derive Key Pair - Done
22,978,465 UART: [art] Signing Cert with AUTHO
22,979,759 UART: RITY.KEYID = 7
24,692,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,221 UART: [art] PUB.X = F3C5715B95BB057261BEA65D2CEDDFEC72F840636EF233EA0414B317AF1312A09EED4B99F3863CA2A913E9BE5E30CC2C
24,701,519 UART: [art] PUB.Y = 4439D42EB4685653F68864FA073DE41E6DC2A44A2D8C4716E1F7182E2F2100AF28AA35BE8D8B47357EB145D2817A0885
24,708,759 UART: [art] SIG.R = 74CD916BFD4D4913A914FD71D2CC06AA7E53AE01F4931FC5914FBDD11ADC0559DE6C2A2783CE18D3D2F1920085326E36
24,716,144 UART: [art] SIG.S = A9D95295098733397C79F5B7FCB1355158910ED67FD8EF4265C7DBCD35DA21BA09C0F432F8CE597B41A855F044B4FB0A
25,695,231 UART: Caliptra RT
25,695,928 UART: [state] CFI Enabled
25,860,435 UART: [rt] RT listening for mailbox commands...
25,891,846 UART: [rt]cmd =0x46505652, len=4
25,893,172 UART: [rt] FIPS Version
25,894,331 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,360,419 ready_for_fw is high
3,361,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,082 >>> mbox cmd response: success
14,067,748 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,366,603 UART:
18,366,986 UART: Running Caliptra FMC ...
18,368,182 UART:
18,368,367 UART: [state] CFI Enabled
18,430,987 UART: [fht] FMC Alias Private Key: 7
20,194,954 UART: [art] Extend RT PCRs Done
20,196,183 UART: [art] Lock RT PCRs Done
20,197,698 UART: [art] Populate DV Done
20,203,436 UART: [fht] FMC Alias Private Key: 7
20,205,150 UART: [art] Derive CDI
20,205,968 UART: [art] Store in in slot 0x4
20,263,493 UART: [art] Derive Key Pair
20,264,538 UART: [art] Store priv key in slot 0x5
22,727,552 UART: [art] Derive Key Pair - Done
22,740,820 UART: [art] Signing Cert with AUTHO
22,742,129 UART: RITY.KEYID = 7
24,453,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,589 UART: [art] PUB.X = 2C3B82030D71CF0863960F8CF6AA20BA7F2AF61DAA45B32E306F76576FF5F4B595F3D905512558C2D9DD72DCCFBD2DF7
24,461,855 UART: [art] PUB.Y = 98D00FCF327815A30A20821964F05C270DF714AF9FCF49D29CF11E03F8D0AEEABB697665D91D79D2EE7BCDB2E535924B
24,469,140 UART: [art] SIG.R = 47A22D6D3C5D640953F9B60C88A7F438CA4318923D7F62DA5B5760C630EF60F8B1DC47C47043426B80B61C5AA4248833
24,476,543 UART: [art] SIG.S = 952F950E244D0ACF8F2B7CAAB1C6E059A67036CACC6F733A4A65CDCC776F897B84325C35D866CF610034C219A7FC934F
25,455,738 UART: Caliptra RT
25,456,450 UART: [state] CFI Enabled
25,618,528 UART: [rt] RT listening for mailbox commands...
25,650,110 UART: [rt]cmd =0x46505652, len=4
25,651,389 UART: [rt] FIPS Version
25,652,496 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,394 UART:
192,769 UART: Running Caliptra ROM ...
193,901 UART:
603,603 UART: [state] CFI Enabled
615,906 UART: [state] LifecycleState = Unprovisioned
617,787 UART: [state] DebugLocked = No
619,092 UART: [state] WD Timer not started. Device not locked for debugging
623,420 UART: [kat] SHA2-256
802,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,118 UART: [kat] ++
814,656 UART: [kat] sha1
826,240 UART: [kat] SHA2-256
829,237 UART: [kat] SHA2-384
835,495 UART: [kat] SHA2-512-ACC
838,421 UART: [kat] ECC-384
3,280,336 UART: [kat] HMAC-384Kdf
3,291,291 UART: [kat] LMS
3,820,809 UART: [kat] --
3,826,929 UART: [cold-reset] ++
3,828,067 UART: [fht] FHT @ 0x50003400
3,839,106 UART: [idev] ++
3,839,662 UART: [idev] CDI.KEYID = 6
3,840,683 UART: [idev] SUBJECT.KEYID = 7
3,841,750 UART: [idev] UDS.KEYID = 0
3,842,789 ready_for_fw is high
3,843,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,110 UART: [idev] Erasing UDS.KEYID = 0
6,317,659 UART: [idev] Sha1 KeyId Algorithm
6,341,519 UART: [idev] --
6,345,592 UART: [ldev] ++
6,346,158 UART: [ldev] CDI.KEYID = 6
6,347,061 UART: [ldev] SUBJECT.KEYID = 5
6,348,268 UART: [ldev] AUTHORITY.KEYID = 7
6,349,487 UART: [ldev] FE.KEYID = 1
6,360,555 UART: [ldev] Erasing FE.KEYID = 1
8,834,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,906 UART: [ldev] --
10,624,245 UART: [fwproc] Wait for Commands...
10,626,977 UART: [fwproc] Recv command 0x46574c44
10,629,058 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,767 >>> mbox cmd response: success
14,502,402 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,506,168 UART: [afmc] ++
14,506,748 UART: [afmc] CDI.KEYID = 6
14,507,656 UART: [afmc] SUBJECT.KEYID = 7
14,508,859 UART: [afmc] AUTHORITY.KEYID = 5
17,008,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,174 UART: [afmc] --
18,804,460 UART: [cold-reset] --
18,807,768 UART: [state] Locking Datavault
18,814,155 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,844 UART: [state] Locking ICCM
18,817,939 UART: [exit] Launching FMC @ 0x40000130
18,826,382 UART:
18,826,608 UART: Running Caliptra FMC ...
18,827,701 UART:
18,827,866 UART: [state] CFI Enabled
18,835,881 UART: [fht] FMC Alias Private Key: 7
20,592,790 UART: [art] Extend RT PCRs Done
20,594,015 UART: [art] Lock RT PCRs Done
20,595,857 UART: [art] Populate DV Done
20,601,205 UART: [fht] FMC Alias Private Key: 7
20,602,730 UART: [art] Derive CDI
20,603,534 UART: [art] Store in in slot 0x4
20,645,951 UART: [art] Derive Key Pair
20,646,940 UART: [art] Store priv key in slot 0x5
23,073,749 UART: [art] Derive Key Pair - Done
23,086,470 UART: [art] Signing Cert with AUTHO
23,087,762 UART: RITY.KEYID = 7
24,793,074 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,579 UART: [art] PUB.X = 83E62C4A7CEFB34D80FCEFF885CDB4BC58A9CF19B345501CC6156920D540D59FAD171DB6562100B28D6A707D76F544A8
24,801,809 UART: [art] PUB.Y = F67A6C8D1A28EA92B844018216DC61ADC41763C937B2FDB92CC52B23418DDA6510E8E0E841CFDC3180E956955244ECAF
24,809,084 UART: [art] SIG.R = D323D480BD5D470D550B19A83BBB078982EE04C234BC76E38AA0B0436CCD2355124E5C8F34545D0968BE964A6ED993EE
24,816,564 UART: [art] SIG.S = 4C9A2E10A0FBC8972B045CB743713C76E753A1AB3E46C490612D123D58E57001B30544922B7AE2F5D46276CDBD1C9ED9
25,795,117 UART: Caliptra RT
25,795,830 UART: [state] CFI Enabled
25,912,725 UART: [rt] RT listening for mailbox commands...
25,944,069 UART: [rt]cmd =0x46505652, len=4
25,945,399 UART: [rt] FIPS Version
25,946,720 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,689,977 ready_for_fw is high
3,690,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,319 >>> mbox cmd response: success
14,267,118 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,521,010 UART:
18,521,394 UART: Running Caliptra FMC ...
18,522,494 UART:
18,522,638 UART: [state] CFI Enabled
18,530,854 UART: [fht] FMC Alias Private Key: 7
20,288,226 UART: [art] Extend RT PCRs Done
20,289,447 UART: [art] Lock RT PCRs Done
20,290,937 UART: [art] Populate DV Done
20,296,506 UART: [fht] FMC Alias Private Key: 7
20,298,214 UART: [art] Derive CDI
20,299,024 UART: [art] Store in in slot 0x4
20,341,419 UART: [art] Derive Key Pair
20,342,463 UART: [art] Store priv key in slot 0x5
22,769,141 UART: [art] Derive Key Pair - Done
22,782,182 UART: [art] Signing Cert with AUTHO
22,783,475 UART: RITY.KEYID = 7
24,488,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,290 UART: [art] PUB.X = 7C254B38540375F8EC4A4AC0B7E893EC143A35D42350B2FF9D9D4877CA77B2212CD153B8A19703D4BAF6982CD05EE3B6
24,497,582 UART: [art] PUB.Y = B92709C0C7388EE287D738D6E04AEB96F9406737C1A50B4CA14AE6A614B955214B290864E4100BB30D95A250A309E200
24,504,776 UART: [art] SIG.R = 744A857FD1A059518CEB6741DAEBAE54B53A4FC47DAADEE478D2274EFA4C75E5A9C89147E13CABDB7CC50D76C6DC49F8
24,512,223 UART: [art] SIG.S = CB41680D871B6E01F2C39EF8DD3716A47AA2A8146C7B9040CD66E14B10D4BCB50F797AE3F9631FC9D72C0BA195EF706D
25,491,223 UART: Caliptra RT
25,491,919 UART: [state] CFI Enabled
25,609,307 UART: [rt] RT listening for mailbox commands...
25,640,499 UART: [rt]cmd =0x46505652, len=4
25,641,795 UART: [rt] FIPS Version
25,642,996 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,253 UART:
192,619 UART: Running Caliptra ROM ...
193,803 UART:
193,960 UART: [state] CFI Enabled
262,786 UART: [state] LifecycleState = Unprovisioned
265,201 UART: [state] DebugLocked = No
268,079 UART: [state] WD Timer not started. Device not locked for debugging
273,537 UART: [kat] SHA2-256
463,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,162 UART: [kat] ++
474,650 UART: [kat] sha1
486,095 UART: [kat] SHA2-256
489,117 UART: [kat] SHA2-384
495,181 UART: [kat] SHA2-512-ACC
497,756 UART: [kat] ECC-384
2,947,907 UART: [kat] HMAC-384Kdf
2,971,944 UART: [kat] LMS
3,503,698 UART: [kat] --
3,508,437 UART: [cold-reset] ++
3,510,223 UART: [fht] FHT @ 0x50003400
3,522,068 UART: [idev] ++
3,522,792 UART: [idev] CDI.KEYID = 6
3,523,691 UART: [idev] SUBJECT.KEYID = 7
3,524,785 UART: [idev] UDS.KEYID = 0
3,525,832 ready_for_fw is high
3,526,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,022 UART: [idev] Erasing UDS.KEYID = 0
6,028,929 UART: [idev] Sha1 KeyId Algorithm
6,051,504 UART: [idev] --
6,056,136 UART: [ldev] ++
6,056,859 UART: [ldev] CDI.KEYID = 6
6,057,758 UART: [ldev] SUBJECT.KEYID = 5
6,058,870 UART: [ldev] AUTHORITY.KEYID = 7
6,060,099 UART: [ldev] FE.KEYID = 1
6,101,813 UART: [ldev] Erasing FE.KEYID = 1
8,610,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,016 UART: [ldev] --
10,411,968 UART: [fwproc] Wait for Commands...
10,414,407 UART: [fwproc] Recv command 0x46574c44
10,416,664 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,605,466 >>> mbox cmd response: success
14,606,009 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,608,750 UART: [afmc] ++
14,609,446 UART: [afmc] CDI.KEYID = 6
14,610,692 UART: [afmc] SUBJECT.KEYID = 7
14,612,133 UART: [afmc] AUTHORITY.KEYID = 5
17,152,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,546 UART: [afmc] --
18,968,394 UART: [cold-reset] --
18,971,934 UART: [state] Locking Datavault
18,977,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,385 UART: [state] Locking ICCM
18,980,726 UART: [exit] Launching FMC @ 0x40000130
18,989,396 UART:
18,989,628 UART: Running Caliptra FMC ...
18,990,724 UART:
18,990,882 UART: [state] CFI Enabled
19,052,141 UART: [fht] FMC Alias Private Key: 7
20,816,429 UART: [art] Extend RT PCRs Done
20,817,639 UART: [art] Lock RT PCRs Done
20,819,555 UART: [art] Populate DV Done
20,824,698 UART: [fht] FMC Alias Private Key: 7
20,826,203 UART: [art] Derive CDI
20,826,936 UART: [art] Store in in slot 0x4
20,884,918 UART: [art] Derive Key Pair
20,885,957 UART: [art] Store priv key in slot 0x5
23,348,907 UART: [art] Derive Key Pair - Done
23,362,163 UART: [art] Signing Cert with AUTHO
23,363,492 UART: RITY.KEYID = 7
25,074,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,354 UART: [art] PUB.X = ECD14D4ADA2F3C799F197D245DEB8FB89D9AAFB78DC7F990EB41B0E2D136F35EF36790E75E8688F1B88FBCAD8453FFC7
25,083,646 UART: [art] PUB.Y = 8D27CB3797FCFC8BB500159AE8138C4F853995EE6E363348FAB4DB45286F08DA11F845CE5C2D5FFAC5F18CAED5301E17
25,090,924 UART: [art] SIG.R = 81A9799FB4DEB43D429B64E943A58B45F157F0F83D95B9FC4130AB4A27ABF442420E2D60B6C02C53E7B995AB1ACA7E99
25,098,317 UART: [art] SIG.S = C51DB4606E6371ADA01D6E18E2FC8A0FC62973BC7D7680EA0F441FB6D6C63EFBE00A9CC067BEE66C7C8C52057357C8DC
26,077,288 UART: Caliptra RT
26,077,992 UART: [state] CFI Enabled
26,243,573 UART: [rt] RT listening for mailbox commands...
26,275,088 UART: [rt]cmd =0x46505652, len=4
26,276,409 UART: [rt] FIPS Version
26,277,464 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,437,321 ready_for_fw is high
3,437,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,057 >>> mbox cmd response: success
14,734,678 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,019,291 UART:
19,019,675 UART: Running Caliptra FMC ...
19,020,775 UART:
19,020,935 UART: [state] CFI Enabled
19,088,575 UART: [fht] FMC Alias Private Key: 7
20,852,872 UART: [art] Extend RT PCRs Done
20,854,101 UART: [art] Lock RT PCRs Done
20,855,755 UART: [art] Populate DV Done
20,861,330 UART: [fht] FMC Alias Private Key: 7
20,862,985 UART: [art] Derive CDI
20,863,794 UART: [art] Store in in slot 0x4
20,920,644 UART: [art] Derive Key Pair
20,921,679 UART: [art] Store priv key in slot 0x5
23,384,414 UART: [art] Derive Key Pair - Done
23,397,437 UART: [art] Signing Cert with AUTHO
23,398,742 UART: RITY.KEYID = 7
25,109,685 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,175 UART: [art] PUB.X = 0538866FE3B9630949AA9A160AF4BAEBE799C2A5635DAC3F277B4286A0F79864E63D7AACC03B722D7046C7A09CC29CF9
25,118,503 UART: [art] PUB.Y = 8FC0D1CF223119DADDDCF04372A7C30EC4A9AD9D0AABC94E24E3DFE3885B636D18FF1592EC44A6B66BE4FCB3EFEB6565
25,125,758 UART: [art] SIG.R = DCB7FA35FC5BE7B9E3577B5E8401A09EB7CC11F7A3576B78F03E54A4A76981ACCD1B87CB9BA5AFF777841BF3A5391B8C
25,133,201 UART: [art] SIG.S = 9E15FA87B64303043365B4F965A0E662D838D4D3840CFF3C1E21A1639B48836D7189F96CFA61464D11728FE9CB4550C5
26,111,952 UART: Caliptra RT
26,112,663 UART: [state] CFI Enabled
26,276,468 UART: [rt] RT listening for mailbox commands...
26,307,881 UART: [rt]cmd =0x46505652, len=4
26,309,128 UART: [rt] FIPS Version
26,310,339 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,342 UART:
192,698 UART: Running Caliptra ROM ...
193,814 UART:
603,483 UART: [state] CFI Enabled
617,428 UART: [state] LifecycleState = Unprovisioned
619,801 UART: [state] DebugLocked = No
621,038 UART: [state] WD Timer not started. Device not locked for debugging
624,800 UART: [kat] SHA2-256
814,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,424 UART: [kat] ++
826,016 UART: [kat] sha1
838,740 UART: [kat] SHA2-256
841,802 UART: [kat] SHA2-384
847,283 UART: [kat] SHA2-512-ACC
849,871 UART: [kat] ECC-384
3,292,207 UART: [kat] HMAC-384Kdf
3,305,790 UART: [kat] LMS
3,837,610 UART: [kat] --
3,841,760 UART: [cold-reset] ++
3,843,477 UART: [fht] FHT @ 0x50003400
3,855,011 UART: [idev] ++
3,855,709 UART: [idev] CDI.KEYID = 6
3,856,605 UART: [idev] SUBJECT.KEYID = 7
3,857,859 UART: [idev] UDS.KEYID = 0
3,859,112 ready_for_fw is high
3,859,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,047 UART: [idev] Erasing UDS.KEYID = 0
6,332,125 UART: [idev] Sha1 KeyId Algorithm
6,354,361 UART: [idev] --
6,358,574 UART: [ldev] ++
6,359,248 UART: [ldev] CDI.KEYID = 6
6,360,119 UART: [ldev] SUBJECT.KEYID = 5
6,361,314 UART: [ldev] AUTHORITY.KEYID = 7
6,362,465 UART: [ldev] FE.KEYID = 1
6,372,870 UART: [ldev] Erasing FE.KEYID = 1
8,850,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,294 UART: [ldev] --
10,643,772 UART: [fwproc] Wait for Commands...
10,645,962 UART: [fwproc] Recv command 0x46574c44
10,648,259 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,516 >>> mbox cmd response: success
14,829,024 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,832,294 UART: [afmc] ++
14,833,033 UART: [afmc] CDI.KEYID = 6
14,834,139 UART: [afmc] SUBJECT.KEYID = 7
14,835,675 UART: [afmc] AUTHORITY.KEYID = 5
17,336,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,996 UART: [afmc] --
19,137,266 UART: [cold-reset] --
19,141,445 UART: [state] Locking Datavault
19,147,716 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,902 UART: [state] Locking ICCM
19,152,260 UART: [exit] Launching FMC @ 0x40000130
19,160,925 UART:
19,161,150 UART: Running Caliptra FMC ...
19,162,242 UART:
19,162,392 UART: [state] CFI Enabled
19,169,956 UART: [fht] FMC Alias Private Key: 7
20,926,953 UART: [art] Extend RT PCRs Done
20,928,192 UART: [art] Lock RT PCRs Done
20,929,870 UART: [art] Populate DV Done
20,935,490 UART: [fht] FMC Alias Private Key: 7
20,936,962 UART: [art] Derive CDI
20,937,691 UART: [art] Store in in slot 0x4
20,979,947 UART: [art] Derive Key Pair
20,980,934 UART: [art] Store priv key in slot 0x5
23,407,856 UART: [art] Derive Key Pair - Done
23,420,874 UART: [art] Signing Cert with AUTHO
23,422,176 UART: RITY.KEYID = 7
25,127,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,314 UART: [art] PUB.X = 58E744E9C7900A34CDC67936EB04C524CD152CD13F885CDF8104D906016B7AF7C65F8907D0553E858F56FFD5FA96C8C2
25,136,131 UART: [art] PUB.Y = 95F4C4A650F48025C72466F97D577667586C8FC9A4576BCA7C760DBDC4A6FBD63054F143E2130EE044B53BC673A1D0D0
25,143,405 UART: [art] SIG.R = CDDA964C808DABD7F52E7AAF4B3B1E9579A8D3C50C8C9EBDAB89CD790EEB7C28CD7FF5B1F65C9E9FE5FEFF1B0B87652A
25,150,846 UART: [art] SIG.S = E4E7A2590714A79EA5033CCB6DEA03C38C44F67D20DF9B61D14452E6485FBEDF2AD8DBAB3623C0EC92ABB2ABC33352F0
26,129,414 UART: Caliptra RT
26,130,120 UART: [state] CFI Enabled
26,246,992 UART: [rt] RT listening for mailbox commands...
26,278,485 UART: [rt]cmd =0x46505652, len=4
26,279,724 UART: [rt] FIPS Version
26,281,147 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,760,263 ready_for_fw is high
3,760,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,973,368 >>> mbox cmd response: success
14,974,107 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,233,637 UART:
19,234,036 UART: Running Caliptra FMC ...
19,235,131 UART:
19,235,276 UART: [state] CFI Enabled
19,243,214 UART: [fht] FMC Alias Private Key: 7
20,999,827 UART: [art] Extend RT PCRs Done
21,001,040 UART: [art] Lock RT PCRs Done
21,003,072 UART: [art] Populate DV Done
21,008,376 UART: [fht] FMC Alias Private Key: 7
21,009,861 UART: [art] Derive CDI
21,010,592 UART: [art] Store in in slot 0x4
21,052,964 UART: [art] Derive Key Pair
21,054,026 UART: [art] Store priv key in slot 0x5
23,480,986 UART: [art] Derive Key Pair - Done
23,494,474 UART: [art] Signing Cert with AUTHO
23,495,784 UART: RITY.KEYID = 7
25,200,957 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,447 UART: [art] PUB.X = 0ADEEC698A5CC91368FEB7D88CAD39A091DDA16D9A998C580B8749CD427878082BBE33F3FFE9AB07C2212471E6C38F89
25,209,741 UART: [art] PUB.Y = 0DA9D7746BE82703C5E94BFB5B7FF792C1A306990CC96E131B9823E86B408D71299A912540B73769F3FABDCD1F0144E1
25,216,986 UART: [art] SIG.R = 74CEF86FD879FAB14F6625F3D766AFC16F204B309181F91C2F21D568BCAAE6B5E1CC25236D680E331BCCBB650D0AFAD3
25,224,368 UART: [art] SIG.S = ADF2D86F7D3C659C4FE9D286105D72C614B0E9D357F6584831532A26D24E1458C93DF68395D4C52E8975510EBA41E34B
26,204,033 UART: Caliptra RT
26,204,744 UART: [state] CFI Enabled
26,322,040 UART: [rt] RT listening for mailbox commands...
26,353,513 UART: [rt]cmd =0x46505652, len=4
26,354,809 UART: [rt] FIPS Version
26,355,907 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,477,039 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 ready_for_fw is high
1,480,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,770 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,388 UART: [idev] --
1,514,279 UART: [ldev] ++
1,514,447 UART: [ldev] CDI.KEYID = 6
1,514,810 UART: [ldev] SUBJECT.KEYID = 5
1,515,236 UART: [ldev] AUTHORITY.KEYID = 7
1,515,699 UART: [ldev] FE.KEYID = 1
1,520,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,770 UART: [ldev] --
1,585,261 UART: [fwproc] Waiting for Commands...
1,586,000 UART: [fwproc] Received command 0x46574c44
1,586,791 UART: [fwproc] Received Image of size 114448 bytes
2,886,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,529 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,868 >>> mbox cmd response: success
3,078,868 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,988 UART: [afmc] ++
3,080,156 UART: [afmc] CDI.KEYID = 6
3,080,518 UART: [afmc] SUBJECT.KEYID = 7
3,080,943 UART: [afmc] AUTHORITY.KEYID = 5
3,115,570 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,207 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,897 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,686 UART: [afmc] --
3,158,800 UART: [cold-reset] --
3,159,608 UART: [state] Locking Datavault
3,160,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,387 UART: [state] Locking ICCM
3,161,911 UART: [exit] Launching FMC @ 0x40000130
3,167,240 UART:
3,167,256 UART: Running Caliptra FMC ...
3,167,664 UART:
3,167,718 UART: [state] CFI Enabled
3,178,371 UART: [fht] FMC Alias Private Key: 7
3,285,824 UART: [art] Extend RT PCRs Done
3,286,252 UART: [art] Lock RT PCRs Done
3,287,990 UART: [art] Populate DV Done
3,296,031 UART: [fht] FMC Alias Private Key: 7
3,297,007 UART: [art] Derive CDI
3,297,287 UART: [art] Store in in slot 0x4
3,382,798 UART: [art] Derive Key Pair
3,383,158 UART: [art] Store priv key in slot 0x5
3,396,202 UART: [art] Derive Key Pair - Done
3,410,748 UART: [art] Signing Cert with AUTHO
3,411,228 UART: RITY.KEYID = 7
3,426,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,885 UART: [art] PUB.X = F3041B5522738099774CD5E9DDD3F71C8C011C33F4E3088167B9DBEEB6DE2B34C9AE97E7B68BFB73C82D32A803175B26
3,433,651 UART: [art] PUB.Y = 4F2BDC6ED81C8D8253E5D467D43B0E562711BBB405B5132AF2EAC5AB1FF5D3DF19CA8DB871FF8D73AD52DA9043C8796A
3,440,617 UART: [art] SIG.R = 8386DD7D5E58A97C1266A7023C17708CD03A594C271353D24D08B363BA74DC6A0E6DA68ACCC1AD4BB83EA41E66C050B2
3,447,388 UART: [art] SIG.S = A5F0D654980F0C7BE9C2E7FF2CD7A027679D8D8E30945D0053F2D2E0C815EA8ADC3F9404A0979E82C56FA82F7E7D6225
3,471,218 UART: Caliptra RT
3,471,471 UART: [state] CFI Enabled
3,579,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,699 UART: [rt]cmd =0x46505652, len=4
3,610,370 UART: [rt] FIPS Version
3,611,413 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,187 >>> mbox cmd response: success
2,928,187 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,327 UART:
2,989,343 UART: Running Caliptra FMC ...
2,989,751 UART:
2,989,805 UART: [state] CFI Enabled
3,000,350 UART: [fht] FMC Alias Private Key: 7
3,108,883 UART: [art] Extend RT PCRs Done
3,109,311 UART: [art] Lock RT PCRs Done
3,110,951 UART: [art] Populate DV Done
3,119,078 UART: [fht] FMC Alias Private Key: 7
3,120,136 UART: [art] Derive CDI
3,120,416 UART: [art] Store in in slot 0x4
3,206,003 UART: [art] Derive Key Pair
3,206,363 UART: [art] Store priv key in slot 0x5
3,219,417 UART: [art] Derive Key Pair - Done
3,233,915 UART: [art] Signing Cert with AUTHO
3,234,395 UART: RITY.KEYID = 7
3,249,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,324 UART: [art] PUB.X = E102417DF5F058A261FA3170FBF83A01D71094D01090A21197D2E094DA03D8CAAE5BA42305386DD5F007A1C1E7306FE2
3,257,083 UART: [art] PUB.Y = 840749E30660A5E31FC25644EC82BBBA9B45EB7FB6EA0951C9CD2CCD5B405D3EBB565578493863D5EC9DF0B043747CEA
3,264,038 UART: [art] SIG.R = 65AC4BC55D69D2DA7E100F59F24672946FD7A0E56EC6F478DA8B43CFF94B64F76437F9D1C03F22D40CF488FB834C9180
3,270,812 UART: [art] SIG.S = 5029BAB64F17A4A46A9E7A0216BDE39D5BC3CB4655AA8382A323A4B31689B7E2302B573BDE9AFE07F02E9EF2EF196E23
3,294,615 UART: Caliptra RT
3,294,868 UART: [state] CFI Enabled
3,403,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,136 UART: [rt]cmd =0x46505652, len=4
3,434,807 UART: [rt] FIPS Version
3,435,974 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,479,803 UART: [idev] ++
1,479,971 UART: [idev] CDI.KEYID = 6
1,480,331 UART: [idev] SUBJECT.KEYID = 7
1,480,755 UART: [idev] UDS.KEYID = 0
1,481,100 ready_for_fw is high
1,481,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,867 UART: [idev] Erasing UDS.KEYID = 0
1,505,887 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,482 UART: [ldev] ++
1,515,650 UART: [ldev] CDI.KEYID = 6
1,516,013 UART: [ldev] SUBJECT.KEYID = 5
1,516,439 UART: [ldev] AUTHORITY.KEYID = 7
1,516,902 UART: [ldev] FE.KEYID = 1
1,522,036 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,659 UART: [ldev] --
1,587,086 UART: [fwproc] Waiting for Commands...
1,587,827 UART: [fwproc] Received command 0x46574c44
1,588,618 UART: [fwproc] Received Image of size 114448 bytes
2,888,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,505 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,848 >>> mbox cmd response: success
3,081,848 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,083,072 UART: [afmc] ++
3,083,240 UART: [afmc] CDI.KEYID = 6
3,083,602 UART: [afmc] SUBJECT.KEYID = 7
3,084,027 UART: [afmc] AUTHORITY.KEYID = 5
3,119,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,367 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,057 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,926 UART: [afmc] --
3,162,952 UART: [cold-reset] --
3,163,576 UART: [state] Locking Datavault
3,164,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,177 UART: [state] Locking ICCM
3,165,721 UART: [exit] Launching FMC @ 0x40000130
3,171,050 UART:
3,171,066 UART: Running Caliptra FMC ...
3,171,474 UART:
3,171,617 UART: [state] CFI Enabled
3,181,814 UART: [fht] FMC Alias Private Key: 7
3,290,103 UART: [art] Extend RT PCRs Done
3,290,531 UART: [art] Lock RT PCRs Done
3,292,315 UART: [art] Populate DV Done
3,300,284 UART: [fht] FMC Alias Private Key: 7
3,301,246 UART: [art] Derive CDI
3,301,526 UART: [art] Store in in slot 0x4
3,387,051 UART: [art] Derive Key Pair
3,387,411 UART: [art] Store priv key in slot 0x5
3,400,767 UART: [art] Derive Key Pair - Done
3,415,515 UART: [art] Signing Cert with AUTHO
3,415,995 UART: RITY.KEYID = 7
3,430,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,630 UART: [art] PUB.X = 330FD63BFCC1B473631532ABC7761C50866718BF33DB9E21C687BC81FA53C4BAB8B55133049E76169DEF9CEF2CC09BFE
3,438,408 UART: [art] PUB.Y = 441A6DE525B82DD9C7067492BEE76F3ADDF15BEE0A389630EAA45F8F2809FFA850638A6CA1F5E9130A577430196C9593
3,445,352 UART: [art] SIG.R = DBA6BEF5244A6163E3914BA8D6640C63B8335950B9A5C59E3A1E0B4973EC9E74A77C1D72E9D079DFFF05F15DD7BE9C3E
3,452,129 UART: [art] SIG.S = 505B9053920DC9C10D06ECD0A2A96165A727152EA09595E9EACF8D7549451F609AD842D2D562FA403B39BEA63A52F603
3,475,696 UART: Caliptra RT
3,476,041 UART: [state] CFI Enabled
3,584,310 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,904 UART: [rt]cmd =0x46505652, len=4
3,615,575 UART: [rt] FIPS Version
3,616,640 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,466 ready_for_fw is high
1,363,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,812 >>> mbox cmd response: success
2,930,812 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,992,060 UART:
2,992,076 UART: Running Caliptra FMC ...
2,992,484 UART:
2,992,627 UART: [state] CFI Enabled
3,003,450 UART: [fht] FMC Alias Private Key: 7
3,111,113 UART: [art] Extend RT PCRs Done
3,111,541 UART: [art] Lock RT PCRs Done
3,113,179 UART: [art] Populate DV Done
3,121,284 UART: [fht] FMC Alias Private Key: 7
3,122,434 UART: [art] Derive CDI
3,122,714 UART: [art] Store in in slot 0x4
3,208,409 UART: [art] Derive Key Pair
3,208,769 UART: [art] Store priv key in slot 0x5
3,221,865 UART: [art] Derive Key Pair - Done
3,236,645 UART: [art] Signing Cert with AUTHO
3,237,125 UART: RITY.KEYID = 7
3,252,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,194 UART: [art] PUB.X = B0C171F01681CC90B5CA1149E258808E57DFE6FC2D86D925704BACB9740E94C8F324C74DADBB13FA7E3E259913A84C0E
3,259,970 UART: [art] PUB.Y = D1E3A343CC19DEF0149573C94D7D2427C39235DB3298293DC888628D700385D2BFA6A843508F13460B50D1DE4676C034
3,266,908 UART: [art] SIG.R = D593197692AD69416741F8693856CA7F3E8E74B4D35EC2206063355FB62AEA2A15C76B0003E8D1E749A31FC98FA7C31D
3,273,653 UART: [art] SIG.S = D5812DBAFAD373BCFC9E1697EB0AB14662CC8F340F00D7837DD07F951BAE2C536F79FEFA9A15DB7C4792C3A55034F759
3,298,246 UART: Caliptra RT
3,298,591 UART: [state] CFI Enabled
3,407,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,129 UART: [rt]cmd =0x46505652, len=4
3,438,800 UART: [rt] FIPS Version
3,440,081 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
892,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,113 UART: [kat] ++
897,265 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,416 UART: [kat] SHA2-512-ACC
908,317 UART: [kat] ECC-384
917,944 UART: [kat] HMAC-384Kdf
922,412 UART: [kat] LMS
1,170,740 UART: [kat] --
1,171,303 UART: [cold-reset] ++
1,171,727 UART: [fht] FHT @ 0x50003400
1,174,174 UART: [idev] ++
1,174,342 UART: [idev] CDI.KEYID = 6
1,174,702 UART: [idev] SUBJECT.KEYID = 7
1,175,126 UART: [idev] UDS.KEYID = 0
1,175,471 ready_for_fw is high
1,175,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,580 UART: [idev] Erasing UDS.KEYID = 0
1,200,473 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,849 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,281,934 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,698 >>> mbox cmd response: success
2,775,698 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,806 UART: [afmc] ++
2,776,974 UART: [afmc] CDI.KEYID = 6
2,777,336 UART: [afmc] SUBJECT.KEYID = 7
2,777,761 UART: [afmc] AUTHORITY.KEYID = 5
2,813,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,213 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,826 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,545 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,345 UART: [afmc] --
2,856,427 UART: [cold-reset] --
2,857,361 UART: [state] Locking Datavault
2,858,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,274 UART: [state] Locking ICCM
2,859,904 UART: [exit] Launching FMC @ 0x40000130
2,865,233 UART:
2,865,249 UART: Running Caliptra FMC ...
2,865,657 UART:
2,865,711 UART: [state] CFI Enabled
2,876,478 UART: [fht] FMC Alias Private Key: 7
2,985,003 UART: [art] Extend RT PCRs Done
2,985,431 UART: [art] Lock RT PCRs Done
2,986,911 UART: [art] Populate DV Done
2,995,176 UART: [fht] FMC Alias Private Key: 7
2,996,264 UART: [art] Derive CDI
2,996,544 UART: [art] Store in in slot 0x4
3,082,189 UART: [art] Derive Key Pair
3,082,549 UART: [art] Store priv key in slot 0x5
3,095,135 UART: [art] Derive Key Pair - Done
3,109,821 UART: [art] Signing Cert with AUTHO
3,110,301 UART: RITY.KEYID = 7
3,125,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,268 UART: [art] PUB.X = 2D0B563C96B98E874AEBED22F2D980CD6624DE2DE337715D1060CFA2E94E22173FCF0016F07BC9CA3AAF2A25CB061F20
3,133,026 UART: [art] PUB.Y = 92C45E1E73822C08FA4B1A8A721D1D61F7DDF3FB5E68DC5D9429F3683BEE93FDAE11DC83A084CFD60E72C07CE6DDD77C
3,139,994 UART: [art] SIG.R = 29C9AED68EE6D7D8AF79769D886F23691498AD9FF4885914BB95A6ACEC02A6092E56D744F7E0D8A77818C3B23ADADAF8
3,146,772 UART: [art] SIG.S = 957B903064AA8E929FA85957AD7144CBA624EBE3D9FE62EFD16DF21D7747AD1F9A9542EAC242971DE3D32F632C167ED8
3,170,169 UART: Caliptra RT
3,170,422 UART: [state] CFI Enabled
3,278,001 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,607 UART: [rt]cmd =0x46505652, len=4
3,309,278 UART: [rt] FIPS Version
3,310,405 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 ready_for_fw is high
1,060,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,301 >>> mbox cmd response: success
2,628,301 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,515 UART:
2,689,531 UART: Running Caliptra FMC ...
2,689,939 UART:
2,689,993 UART: [state] CFI Enabled
2,700,144 UART: [fht] FMC Alias Private Key: 7
2,808,647 UART: [art] Extend RT PCRs Done
2,809,075 UART: [art] Lock RT PCRs Done
2,810,161 UART: [art] Populate DV Done
2,818,170 UART: [fht] FMC Alias Private Key: 7
2,819,194 UART: [art] Derive CDI
2,819,474 UART: [art] Store in in slot 0x4
2,905,119 UART: [art] Derive Key Pair
2,905,479 UART: [art] Store priv key in slot 0x5
2,918,545 UART: [art] Derive Key Pair - Done
2,933,271 UART: [art] Signing Cert with AUTHO
2,933,751 UART: RITY.KEYID = 7
2,949,199 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,964 UART: [art] PUB.X = 67E24E5BC16A3881CA9175635D509633E914BE08BE7ACF8404B70D1649B775E5A30F70E09C272E2F124E6AF11B8C52DF
2,956,726 UART: [art] PUB.Y = 742C2A8D42B5E1ECF8D2DFBD1577B3BB51C9D8897DB6E1B0E17F31DC08D937D93BEC857C89F9053201968E64C0229C47
2,963,677 UART: [art] SIG.R = 313E597CC53BFDBA06A477EBE4E06EC5ED2C64D5E7E5FC1318BA13DA4BDF90EE130D0A584D819B99D5B2702836193605
2,970,449 UART: [art] SIG.S = 2BACE6C661D8AE37F3E52C2FCFBDE3CC059215A73C2022634D5A9B3610CD5B25433671A348A0534E2C5F9EDD9B09AD31
2,994,378 UART: Caliptra RT
2,994,631 UART: [state] CFI Enabled
3,101,468 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,992 UART: [rt]cmd =0x46505652, len=4
3,132,663 UART: [rt] FIPS Version
3,133,756 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,600 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,217,848 UART: [ldev] Erasing FE.KEYID = 1
1,244,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,638 UART: [ldev] --
1,284,145 UART: [fwproc] Wait for Commands...
1,284,725 UART: [fwproc] Recv command 0x46574c44
1,285,453 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,961 >>> mbox cmd response: success
2,776,961 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,778,119 UART: [afmc] ++
2,778,287 UART: [afmc] CDI.KEYID = 6
2,778,649 UART: [afmc] SUBJECT.KEYID = 7
2,779,074 UART: [afmc] AUTHORITY.KEYID = 5
2,814,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,195 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,662 UART: [afmc] --
2,857,594 UART: [cold-reset] --
2,858,534 UART: [state] Locking Datavault
2,859,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,321 UART: [state] Locking ICCM
2,860,741 UART: [exit] Launching FMC @ 0x40000130
2,866,070 UART:
2,866,086 UART: Running Caliptra FMC ...
2,866,494 UART:
2,866,637 UART: [state] CFI Enabled
2,877,474 UART: [fht] FMC Alias Private Key: 7
2,985,673 UART: [art] Extend RT PCRs Done
2,986,101 UART: [art] Lock RT PCRs Done
2,987,587 UART: [art] Populate DV Done
2,995,778 UART: [fht] FMC Alias Private Key: 7
2,996,912 UART: [art] Derive CDI
2,997,192 UART: [art] Store in in slot 0x4
3,082,925 UART: [art] Derive Key Pair
3,083,285 UART: [art] Store priv key in slot 0x5
3,096,691 UART: [art] Derive Key Pair - Done
3,111,253 UART: [art] Signing Cert with AUTHO
3,111,733 UART: RITY.KEYID = 7
3,126,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,730 UART: [art] PUB.X = B090D0A2F8DE6700085291ADF6166A458238CB88391DAA157D2A4D8D11F4F8B5C67080B897EAE580B807EC3C4E6ADA4F
3,134,482 UART: [art] PUB.Y = CAA800113C2513ED5DFC5AA678E58624A8DC36E4DEB00361D00C47F9BAFF27B5ADF709002AEB698BC655B20A4AF6C908
3,141,391 UART: [art] SIG.R = 254E6B02518C9CA2B0A77629866941E2FBADE9927D9EF6D60816868C297D3918AF116B1D1A3D70F45E1490279F978152
3,148,149 UART: [art] SIG.S = 1C5E69ED99C4E7D35823C3FF1C1140F83F94D053022093C896318AC41D588B9D78F0D30A17236D45691EBAB5B69EA998
3,171,334 UART: Caliptra RT
3,171,679 UART: [state] CFI Enabled
3,279,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,124 UART: [rt]cmd =0x46505652, len=4
3,310,795 UART: [rt] FIPS Version
3,311,888 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 ready_for_fw is high
1,060,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,930 >>> mbox cmd response: success
2,625,930 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,574 UART:
2,688,590 UART: Running Caliptra FMC ...
2,688,998 UART:
2,689,141 UART: [state] CFI Enabled
2,699,554 UART: [fht] FMC Alias Private Key: 7
2,808,153 UART: [art] Extend RT PCRs Done
2,808,581 UART: [art] Lock RT PCRs Done
2,810,237 UART: [art] Populate DV Done
2,818,500 UART: [fht] FMC Alias Private Key: 7
2,819,600 UART: [art] Derive CDI
2,819,880 UART: [art] Store in in slot 0x4
2,905,695 UART: [art] Derive Key Pair
2,906,055 UART: [art] Store priv key in slot 0x5
2,919,655 UART: [art] Derive Key Pair - Done
2,934,658 UART: [art] Signing Cert with AUTHO
2,935,138 UART: RITY.KEYID = 7
2,949,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,397 UART: [art] PUB.X = 5852ACA4102B1706C7FEC6C092AEADA66D0995C8E527586642949AABECA4E5E4A53AEF5ED8193091502EB874689E93E5
2,957,169 UART: [art] PUB.Y = 7A4CB112CC020D6E649418561D12437BF5F7D2CB980A2EA99DAC23DA70D5680FDEC5851AFD3366F80D93326E1CA60A12
2,964,111 UART: [art] SIG.R = 3C05AA2F6AAAB8B2560FE8D3FC6592DB806A1C9C0540D350DFDE026C3A8268D60105E813E1E3497236B5F4FAE0F22859
2,970,873 UART: [art] SIG.S = 581E0652E2E3FB4123F8544612F4FE96C1B5859A74709C42611400F8DCCB69C7EF325EED82F86302405F4CFE07D19EDC
2,994,615 UART: Caliptra RT
2,994,960 UART: [state] CFI Enabled
3,103,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,025 UART: [rt]cmd =0x46505652, len=4
3,134,696 UART: [rt] FIPS Version
3,135,761 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,326 UART: [kat] LMS
1,169,638 UART: [kat] --
1,170,737 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,759 UART: [idev] ++
1,173,927 UART: [idev] CDI.KEYID = 6
1,174,288 UART: [idev] SUBJECT.KEYID = 7
1,174,713 UART: [idev] UDS.KEYID = 0
1,175,059 ready_for_fw is high
1,175,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,731 UART: [idev] Erasing UDS.KEYID = 0
1,199,793 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,762 UART: [ldev] ++
1,209,930 UART: [ldev] CDI.KEYID = 6
1,210,294 UART: [ldev] SUBJECT.KEYID = 5
1,210,721 UART: [ldev] AUTHORITY.KEYID = 7
1,211,184 UART: [ldev] FE.KEYID = 1
1,216,550 UART: [ldev] Erasing FE.KEYID = 1
1,243,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,264 UART: [ldev] --
1,282,534 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,068 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,278 >>> mbox cmd response: success
2,775,278 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,423 UART: [afmc] ++
2,776,591 UART: [afmc] CDI.KEYID = 6
2,776,954 UART: [afmc] SUBJECT.KEYID = 7
2,777,380 UART: [afmc] AUTHORITY.KEYID = 5
2,813,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,104 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,716 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,435 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,232 UART: [afmc] --
2,857,136 UART: [cold-reset] --
2,857,978 UART: [state] Locking Datavault
2,859,317 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,921 UART: [state] Locking ICCM
2,860,433 UART: [exit] Launching FMC @ 0x40000130
2,865,762 UART:
2,865,778 UART: Running Caliptra FMC ...
2,866,186 UART:
2,866,240 UART: [state] CFI Enabled
2,876,955 UART: [fht] FMC Alias Private Key: 7
2,985,210 UART: [art] Extend RT PCRs Done
2,985,638 UART: [art] Lock RT PCRs Done
2,987,138 UART: [art] Populate DV Done
2,995,393 UART: [fht] FMC Alias Private Key: 7
2,996,423 UART: [art] Derive CDI
2,996,703 UART: [art] Store in in slot 0x4
3,082,710 UART: [art] Derive Key Pair
3,083,070 UART: [art] Store priv key in slot 0x5
3,096,324 UART: [art] Derive Key Pair - Done
3,111,297 UART: [art] Signing Cert with AUTHO
3,111,777 UART: RITY.KEYID = 7
3,127,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,176 UART: [art] PUB.X = 22A9E85B1C31253AADD9DE72E41B7B398C202DB7F8FC0F6C4583879C71523DE73E9BD0366D89CFDEFA5E9746E8D4E1BB
3,134,961 UART: [art] PUB.Y = 01A6A5B9E9D5854D72257416525728E3666EBD9A99FACE51BC24EFB3CA95D8CC87ED8A557FB812E3ED28CBB64E7E2EBA
3,141,928 UART: [art] SIG.R = 21F4D9EBB3385757301FE824F7E08DC0DBF57F3EAE6685EE9DD8327883CD484A7A4C0C2DA2FC2C138E14D1928D400E37
3,148,704 UART: [art] SIG.S = AF8759C56406FCE3B69F4E699461E7E3421D70F2D9847AA254AC987246312656800A2838CAEFE546CF6A0274C0006EE0
3,173,018 UART: Caliptra RT
3,173,271 UART: [state] CFI Enabled
3,281,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,428 UART: [rt]cmd =0x46505652, len=4
3,313,099 UART: [rt] FIPS Version
3,314,054 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,356 ready_for_fw is high
1,056,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,556 >>> mbox cmd response: success
2,624,556 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,742 UART:
2,686,758 UART: Running Caliptra FMC ...
2,687,166 UART:
2,687,220 UART: [state] CFI Enabled
2,697,281 UART: [fht] FMC Alias Private Key: 7
2,805,396 UART: [art] Extend RT PCRs Done
2,805,824 UART: [art] Lock RT PCRs Done
2,807,278 UART: [art] Populate DV Done
2,815,467 UART: [fht] FMC Alias Private Key: 7
2,816,513 UART: [art] Derive CDI
2,816,793 UART: [art] Store in in slot 0x4
2,902,200 UART: [art] Derive Key Pair
2,902,560 UART: [art] Store priv key in slot 0x5
2,915,514 UART: [art] Derive Key Pair - Done
2,930,269 UART: [art] Signing Cert with AUTHO
2,930,749 UART: RITY.KEYID = 7
2,946,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,314 UART: [art] PUB.X = 4DE301E3843AE864904EFE9E9F15F24CCBD611EAC0CA7F51D6C77FDDED636453DEF7ADFEA77A27C797D92691C451EFC3
2,954,105 UART: [art] PUB.Y = 8D8E16B612092C7F3844D1A14521F1A9F9A9BFF4014353BC55D0F191CFE5E22176A503D57FF67C7EA3A7B21A5108FEF6
2,961,051 UART: [art] SIG.R = 6CA29F292C16411B43FEEFDFFBFBD17A5A84988083A1FAC2FDA025A6A7B6A5C87E4E916E08178ED300FC6BD0943BBDF5
2,967,820 UART: [art] SIG.S = 8F0B70C1C791107D4EC0497F897C05AC7113B44267124289AB63891F0EDAE5F152B31A8DE2C0C2502E2341A396BC53D1
2,991,368 UART: Caliptra RT
2,991,621 UART: [state] CFI Enabled
3,098,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,316 UART: [rt]cmd =0x46505652, len=4
3,129,987 UART: [rt] FIPS Version
3,130,992 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,292 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 ready_for_fw is high
1,174,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,849 UART: [ldev] SUBJECT.KEYID = 5
1,210,276 UART: [ldev] AUTHORITY.KEYID = 7
1,210,739 UART: [ldev] FE.KEYID = 1
1,216,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,416 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,735 >>> mbox cmd response: success
2,775,735 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,786 UART: [afmc] ++
2,776,954 UART: [afmc] CDI.KEYID = 6
2,777,317 UART: [afmc] SUBJECT.KEYID = 7
2,777,743 UART: [afmc] AUTHORITY.KEYID = 5
2,813,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,516 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,397 UART: [afmc] --
2,857,469 UART: [cold-reset] --
2,858,427 UART: [state] Locking Datavault
2,859,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,110 UART: [state] Locking ICCM
2,860,706 UART: [exit] Launching FMC @ 0x40000130
2,866,035 UART:
2,866,051 UART: Running Caliptra FMC ...
2,866,459 UART:
2,866,602 UART: [state] CFI Enabled
2,877,123 UART: [fht] FMC Alias Private Key: 7
2,985,434 UART: [art] Extend RT PCRs Done
2,985,862 UART: [art] Lock RT PCRs Done
2,987,472 UART: [art] Populate DV Done
2,995,625 UART: [fht] FMC Alias Private Key: 7
2,996,629 UART: [art] Derive CDI
2,996,909 UART: [art] Store in in slot 0x4
3,082,676 UART: [art] Derive Key Pair
3,083,036 UART: [art] Store priv key in slot 0x5
3,097,426 UART: [art] Derive Key Pair - Done
3,112,181 UART: [art] Signing Cert with AUTHO
3,112,661 UART: RITY.KEYID = 7
3,128,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,842 UART: [art] PUB.X = 2AF27543ED5A297D0BA5B306B4F633706B332809AF475379447E4ECFA692C22E699A5CE91AB5BA580B62D48D67A6341C
3,135,604 UART: [art] PUB.Y = C7FC3F3B0E614DA9E67099A5B2912FD24F1DE4FDBBA5102A6238266BFA1E86A9BBB7F9B8A2EF9C51F0ED19E7DDBCB6AA
3,142,583 UART: [art] SIG.R = A1BE2175880A2D5D50096461AA08E4AC841756936D7362C235786F051CB0D607780EF02D8E2AF5D47A8EB2509D7FD3AD
3,149,337 UART: [art] SIG.S = ECE0F4021A88829E2F4FE41B9E5896C6B51FE8F179A7F8E5CD9902E878AEF878278A8E307140F64A2EB6FE87EB84D6EC
3,172,552 UART: Caliptra RT
3,172,897 UART: [state] CFI Enabled
3,280,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,719 UART: [rt]cmd =0x46505652, len=4
3,311,390 UART: [rt] FIPS Version
3,312,199 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,259 ready_for_fw is high
1,056,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,881 >>> mbox cmd response: success
2,622,881 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,729 UART:
2,684,745 UART: Running Caliptra FMC ...
2,685,153 UART:
2,685,296 UART: [state] CFI Enabled
2,695,403 UART: [fht] FMC Alias Private Key: 7
2,803,542 UART: [art] Extend RT PCRs Done
2,803,970 UART: [art] Lock RT PCRs Done
2,805,488 UART: [art] Populate DV Done
2,813,755 UART: [fht] FMC Alias Private Key: 7
2,814,719 UART: [art] Derive CDI
2,814,999 UART: [art] Store in in slot 0x4
2,900,452 UART: [art] Derive Key Pair
2,900,812 UART: [art] Store priv key in slot 0x5
2,914,228 UART: [art] Derive Key Pair - Done
2,928,382 UART: [art] Signing Cert with AUTHO
2,928,862 UART: RITY.KEYID = 7
2,943,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,601 UART: [art] PUB.X = 30F578058F84A4EE2CA4A7AEA47DF68EC5F9AC36E0B415B184FB7202D9B3BEDFDCBA7DCCAAB6DBBDCB236F4696C360BC
2,951,401 UART: [art] PUB.Y = 396453446D258CA2A8EECF9ABAF47359C1BC046B4834DBCD4CAE8159AC192B3941F538C7E678E261A336E8D664ED424F
2,958,358 UART: [art] SIG.R = 4EF64F70C0EDD1A96A4ACEB10EE7366C24E044DA54228E565821AF5925D1F1A5F28F152F77D742EA218E02399D0E2161
2,965,125 UART: [art] SIG.S = 656ADD49F1E8F316812688B193050C514106DB99B3158266B037D54BDF4EFB41911128FBDE8702D2C8ACAD7C3372001E
2,989,592 UART: Caliptra RT
2,989,937 UART: [state] CFI Enabled
3,097,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,058 UART: [rt]cmd =0x46505652, len=4
3,128,729 UART: [rt] FIPS Version
3,129,564 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
191,988 UART:
192,332 UART: Running Caliptra ROM ...
193,527 UART:
193,682 UART: [state] CFI Enabled
265,841 UART: [state] LifecycleState = Unprovisioned
267,810 UART: [state] DebugLocked = No
269,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,624 UART: [kat] SHA2-256
445,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,883 UART: [kat] ++
456,383 UART: [kat] sha1
468,331 UART: [kat] SHA2-256
471,069 UART: [kat] SHA2-384
476,305 UART: [kat] SHA2-512-ACC
478,679 UART: [kat] ECC-384
2,766,043 UART: [kat] HMAC-384Kdf
2,779,031 UART: [kat] LMS
3,969,349 UART: [kat] --
3,973,121 UART: [cold-reset] ++
3,974,561 UART: [fht] Storing FHT @ 0x50003400
3,986,753 UART: [idev] ++
3,987,386 UART: [idev] CDI.KEYID = 6
3,988,302 UART: [idev] SUBJECT.KEYID = 7
3,989,547 UART: [idev] UDS.KEYID = 0
3,990,621 ready_for_fw is high
3,990,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,415 UART: [idev] Erasing UDS.KEYID = 0
7,327,325 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,069 UART: [idev] --
7,352,415 UART: [ldev] ++
7,353,012 UART: [ldev] CDI.KEYID = 6
7,353,933 UART: [ldev] SUBJECT.KEYID = 5
7,355,152 UART: [ldev] AUTHORITY.KEYID = 7
7,356,384 UART: [ldev] FE.KEYID = 1
7,404,518 UART: [ldev] Erasing FE.KEYID = 1
10,738,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,623 UART: [ldev] --
13,097,579 UART: [fwproc] Waiting for Commands...
13,099,310 UART: [fwproc] Received command 0x46574c44
13,101,506 UART: [fwproc] Received Image of size 114124 bytes
17,151,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,609,368 >>> mbox cmd response: success
17,609,873 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,612,992 UART: [afmc] ++
17,613,579 UART: [afmc] CDI.KEYID = 6
17,614,497 UART: [afmc] SUBJECT.KEYID = 7
17,615,718 UART: [afmc] AUTHORITY.KEYID = 5
20,990,026 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,405 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,829 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,682 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,135 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,199 UART: [afmc] --
23,359,212 UART: [cold-reset] --
23,363,580 UART: [state] Locking Datavault
23,370,611 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,367 UART: [state] Locking ICCM
23,373,655 UART: [exit] Launching FMC @ 0x40000130
23,382,001 UART:
23,382,244 UART: Running Caliptra FMC ...
23,383,346 UART:
23,383,504 UART: [state] CFI Enabled
23,449,793 UART: [fht] FMC Alias Private Key: 7
25,787,526 UART: [art] Extend RT PCRs Done
25,788,752 UART: [art] Lock RT PCRs Done
25,790,165 UART: [art] Populate DV Done
25,795,530 UART: [fht] FMC Alias Private Key: 7
25,797,012 UART: [art] Derive CDI
25,797,778 UART: [art] Store in in slot 0x4
25,858,305 UART: [art] Derive Key Pair
25,859,363 UART: [art] Store priv key in slot 0x5
29,152,214 UART: [art] Derive Key Pair - Done
29,165,058 UART: [art] Signing Cert with AUTHO
29,166,372 UART: RITY.KEYID = 7
31,454,582 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,092 UART: [art] PUB.X = 655AEC68E02FE32BD7753E021466FB8763A1B71B63A246FE682F779D1FE69EB200569024D5F8E2A9D71A0F448C7C681F
31,463,347 UART: [art] PUB.Y = C11824C53AB3E8DE229805FED900B3400F88C71339D345680797034B7E8CB67DE98A116A6DCD09319C64C8AF609FC4B5
31,470,593 UART: [art] SIG.R = 37E524DEA2213FF1CB3A4AB06BA5246A398037D20C8B8A66C6979827CCED19F976F16E930C2007896D49F49FD32B8B33
31,477,942 UART: [art] SIG.S = 02DC74B3E5BA483DCE5D2A818F77B5D508D59269B84840C0DCE83AC133154495B13D08DA9A3A3CC98073B58A5DAFCFBF
32,782,628 UART: Caliptra RT
32,783,339 UART: [state] CFI Enabled
32,945,043 UART: [rt] RT listening for mailbox commands...
32,976,292 UART: [rt]cmd =0x464d4352, len=4
32,984,035 >>> mbox cmd response data (524 bytes)
33,153,278 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,183,208 UART: [rt]cmd =0x43455252, len=4
33,194,616 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,379 writing to cptra_bootfsm_go
3,805,283 ready_for_fw is high
3,805,663 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,778 >>> mbox cmd response: success
17,878,646 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,565,033 UART:
23,565,430 UART: Running Caliptra FMC ...
23,566,540 UART:
23,566,701 UART: [state] CFI Enabled
23,637,327 UART: [fht] FMC Alias Private Key: 7
25,975,736 UART: [art] Extend RT PCRs Done
25,977,003 UART: [art] Lock RT PCRs Done
25,979,047 UART: [art] Populate DV Done
25,984,470 UART: [fht] FMC Alias Private Key: 7
25,986,070 UART: [art] Derive CDI
25,986,818 UART: [art] Store in in slot 0x4
26,046,107 UART: [art] Derive Key Pair
26,047,155 UART: [art] Store priv key in slot 0x5
29,340,192 UART: [art] Derive Key Pair - Done
29,353,156 UART: [art] Signing Cert with AUTHO
29,354,464 UART: RITY.KEYID = 7
31,642,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,921 UART: [art] PUB.X = 11427A591CEFA9DB69794F758B1954FE3BB600FD63B288190486B9E58DBEF72E53EF3F7FF00BFA8657858D6A28A94A1C
31,651,165 UART: [art] PUB.Y = 9C8AF0BBCA758D82B999D54000BD013DFF7D9899B79AB88DE162B4B0055218B0FD29393810974CD24941845A4A810A77
31,658,400 UART: [art] SIG.R = 7CAAC7D9E83C15865695CDC364117ED6D9D1251FE3789BFE7A781C442974D93FC54AE50D24B910EE5DCFC26718B92554
31,665,788 UART: [art] SIG.S = 9FB695B9B134671BE7FCF229347B3D941F01E91E9CE68C2EC83996FDAAC5450D9AA0D09CEEE722051EB9889B3BEA2B2F
32,971,423 UART: Caliptra RT
32,972,127 UART: [state] CFI Enabled
33,132,499 UART: [rt] RT listening for mailbox commands...
33,163,424 UART: [rt]cmd =0x464d4352, len=4
33,171,215 >>> mbox cmd response data (524 bytes)
33,340,489 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,370,346 UART: [rt]cmd =0x43455252, len=4
33,381,857 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,351 UART:
192,767 UART: Running Caliptra ROM ...
193,878 UART:
603,443 UART: [state] CFI Enabled
615,785 UART: [state] LifecycleState = Unprovisioned
617,766 UART: [state] DebugLocked = No
620,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,939 UART: [kat] SHA2-256
795,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,246 UART: [kat] ++
806,719 UART: [kat] sha1
817,301 UART: [kat] SHA2-256
820,017 UART: [kat] SHA2-384
825,155 UART: [kat] SHA2-512-ACC
827,515 UART: [kat] ECC-384
3,111,772 UART: [kat] HMAC-384Kdf
3,124,719 UART: [kat] LMS
4,314,837 UART: [kat] --
4,316,972 UART: [cold-reset] ++
4,318,054 UART: [fht] Storing FHT @ 0x50003400
4,329,530 UART: [idev] ++
4,330,162 UART: [idev] CDI.KEYID = 6
4,331,068 UART: [idev] SUBJECT.KEYID = 7
4,332,306 UART: [idev] UDS.KEYID = 0
4,333,348 ready_for_fw is high
4,333,576 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,421 UART: [idev] Erasing UDS.KEYID = 0
7,618,965 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,209 UART: [idev] --
7,645,741 UART: [ldev] ++
7,646,356 UART: [ldev] CDI.KEYID = 6
7,647,311 UART: [ldev] SUBJECT.KEYID = 5
7,648,515 UART: [ldev] AUTHORITY.KEYID = 7
7,649,919 UART: [ldev] FE.KEYID = 1
7,659,184 UART: [ldev] Erasing FE.KEYID = 1
10,945,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,571 UART: [ldev] --
13,308,661 UART: [fwproc] Waiting for Commands...
13,310,419 UART: [fwproc] Received command 0x46574c44
13,312,593 UART: [fwproc] Received Image of size 114124 bytes
17,362,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,632 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,017 >>> mbox cmd response: success
17,823,540 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,826,462 UART: [afmc] ++
17,827,044 UART: [afmc] CDI.KEYID = 6
17,827,948 UART: [afmc] SUBJECT.KEYID = 7
17,829,212 UART: [afmc] AUTHORITY.KEYID = 5
21,141,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,998 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,381 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,217 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,661 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,347 UART: [afmc] --
23,509,089 UART: [cold-reset] --
23,511,007 UART: [state] Locking Datavault
23,516,362 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,111 UART: [state] Locking ICCM
23,520,880 UART: [exit] Launching FMC @ 0x40000130
23,529,231 UART:
23,529,472 UART: Running Caliptra FMC ...
23,530,567 UART:
23,530,724 UART: [state] CFI Enabled
23,538,655 UART: [fht] FMC Alias Private Key: 7
25,869,328 UART: [art] Extend RT PCRs Done
25,870,563 UART: [art] Lock RT PCRs Done
25,872,019 UART: [art] Populate DV Done
25,877,437 UART: [fht] FMC Alias Private Key: 7
25,878,973 UART: [art] Derive CDI
25,879,779 UART: [art] Store in in slot 0x4
25,922,274 UART: [art] Derive Key Pair
25,923,309 UART: [art] Store priv key in slot 0x5
29,165,337 UART: [art] Derive Key Pair - Done
29,178,535 UART: [art] Signing Cert with AUTHO
29,179,865 UART: RITY.KEYID = 7
31,458,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,394 UART: [art] PUB.X = 3483C84B3FCED8C89737E05724F156B91D96A9CCF7375EAC3C75FF68FE5DBB695F372239DAD0DA9ECE18A53BBEE84D0E
31,467,686 UART: [art] PUB.Y = 4DB6D63976DD156B9C3B580D545720F7BE373560F5D604CFF91EEF272419FF2E606B7F1A13EA56E09C3D4F703AF5EB94
31,474,914 UART: [art] SIG.R = 319486D120439009A403A9B5DA34E64E22F64F63D7CABA8CD5A51A6DB07E0E8458FD4953FED2713D8F287B743E781A95
31,482,297 UART: [art] SIG.S = 50C0E426A56223824BE0FD520955E4B30232E03F52C911A8B5707D358B3DEBCFB80A9A865CD7580BDD4FDFC5B9FBAD62
32,787,111 UART: Caliptra RT
32,787,823 UART: [state] CFI Enabled
32,905,964 UART: [rt] RT listening for mailbox commands...
32,937,594 UART: [rt]cmd =0x464d4352, len=4
32,945,037 >>> mbox cmd response data (524 bytes)
33,116,379 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,146,558 UART: [rt]cmd =0x43455252, len=4
33,158,067 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,129,165 ready_for_fw is high
4,129,689 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,742 >>> mbox cmd response: success
18,073,385 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,712,389 UART:
23,712,784 UART: Running Caliptra FMC ...
23,713,920 UART:
23,714,075 UART: [state] CFI Enabled
23,721,905 UART: [fht] FMC Alias Private Key: 7
26,052,767 UART: [art] Extend RT PCRs Done
26,053,995 UART: [art] Lock RT PCRs Done
26,055,706 UART: [art] Populate DV Done
26,061,364 UART: [fht] FMC Alias Private Key: 7
26,062,956 UART: [art] Derive CDI
26,063,691 UART: [art] Store in in slot 0x4
26,106,668 UART: [art] Derive Key Pair
26,107,704 UART: [art] Store priv key in slot 0x5
29,349,652 UART: [art] Derive Key Pair - Done
29,362,793 UART: [art] Signing Cert with AUTHO
29,364,115 UART: RITY.KEYID = 7
31,643,444 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,947 UART: [art] PUB.X = 8EE9CB079E119B35CA5A70560D1D10096D4409788CD95912A70D5B690092B6EEB8B718AF391E816AF78A3D55ED23A98D
31,652,197 UART: [art] PUB.Y = 7E46BBC2DAE1F3F8E4B27C1455689F4B4770698B68717DA8357BDB27AF765A0A1FC585515FAD4175F1F613117FDB8565
31,659,425 UART: [art] SIG.R = A826C60CA162719AE5ACD280CFAD85390BDD4024773D89B0C4C5600781B14E942FB6A05EF963DEDD111191CD21711DE4
31,666,816 UART: [art] SIG.S = EEF1244DDA20C2530009E4E0263F643FEB5D1162B4E62D42F2D45DA69FD6643B888AD8B1C6C38E92F0FB80C319B4229C
32,971,317 UART: Caliptra RT
32,972,023 UART: [state] CFI Enabled
33,089,208 UART: [rt] RT listening for mailbox commands...
33,120,671 UART: [rt]cmd =0x464d4352, len=4
33,128,271 >>> mbox cmd response data (524 bytes)
33,299,447 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,329,796 UART: [rt]cmd =0x43455252, len=4
33,341,139 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,161 UART:
192,538 UART: Running Caliptra ROM ...
193,730 UART:
193,883 UART: [state] CFI Enabled
263,445 UART: [state] LifecycleState = Unprovisioned
265,361 UART: [state] DebugLocked = No
268,173 UART: [state] WD Timer not started. Device not locked for debugging
272,419 UART: [kat] SHA2-256
451,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,076 UART: [kat] ++
463,604 UART: [kat] sha1
474,840 UART: [kat] SHA2-256
477,914 UART: [kat] SHA2-384
483,897 UART: [kat] SHA2-512-ACC
486,828 UART: [kat] ECC-384
2,948,915 UART: [kat] HMAC-384Kdf
2,972,159 UART: [kat] LMS
3,501,628 UART: [kat] --
3,504,971 UART: [cold-reset] ++
3,507,246 UART: [fht] FHT @ 0x50003400
3,517,434 UART: [idev] ++
3,517,991 UART: [idev] CDI.KEYID = 6
3,518,898 UART: [idev] SUBJECT.KEYID = 7
3,520,068 UART: [idev] UDS.KEYID = 0
3,521,134 ready_for_fw is high
3,521,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,241 UART: [idev] Erasing UDS.KEYID = 0
6,030,507 UART: [idev] Sha1 KeyId Algorithm
6,054,811 UART: [idev] --
6,057,723 UART: [ldev] ++
6,058,286 UART: [ldev] CDI.KEYID = 6
6,059,199 UART: [ldev] SUBJECT.KEYID = 5
6,060,358 UART: [ldev] AUTHORITY.KEYID = 7
6,061,645 UART: [ldev] FE.KEYID = 1
6,100,763 UART: [ldev] Erasing FE.KEYID = 1
8,603,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,304 UART: [ldev] --
10,406,085 UART: [fwproc] Wait for Commands...
10,407,962 UART: [fwproc] Recv command 0x46574c44
10,410,053 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,715 >>> mbox cmd response: success
14,275,236 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,278,987 UART: [afmc] ++
14,279,594 UART: [afmc] CDI.KEYID = 6
14,280,511 UART: [afmc] SUBJECT.KEYID = 7
14,281,675 UART: [afmc] AUTHORITY.KEYID = 5
16,822,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,562,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,564,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,580,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,596,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,612,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,634,880 UART: [afmc] --
18,638,472 UART: [cold-reset] --
18,643,249 UART: [state] Locking Datavault
18,649,087 UART: [state] Locking PCR0, PCR1 and PCR31
18,650,786 UART: [state] Locking ICCM
18,651,908 UART: [exit] Launching FMC @ 0x40000130
18,660,310 UART:
18,660,589 UART: Running Caliptra FMC ...
18,661,698 UART:
18,661,857 UART: [state] CFI Enabled
18,722,245 UART: [fht] FMC Alias Private Key: 7
20,486,633 UART: [art] Extend RT PCRs Done
20,487,868 UART: [art] Lock RT PCRs Done
20,489,704 UART: [art] Populate DV Done
20,495,278 UART: [fht] FMC Alias Private Key: 7
20,496,813 UART: [art] Derive CDI
20,497,549 UART: [art] Store in in slot 0x4
20,554,832 UART: [art] Derive Key Pair
20,555,844 UART: [art] Store priv key in slot 0x5
23,018,782 UART: [art] Derive Key Pair - Done
23,031,780 UART: [art] Signing Cert with AUTHO
23,033,085 UART: RITY.KEYID = 7
24,744,243 UART: [art] Erasing AUTHORITY.KEYID = 7
24,745,746 UART: [art] PUB.X = 7053317D3658AE1E90F089A0D476432C53C3BE4E098D4F98F948132971C115535A92BD6759B95066CE75EA256DBF191D
24,752,993 UART: [art] PUB.Y = DD1CB7C9FA5BD40ED057EC233CB85643DA5667DC586F891859F6C76106319A96028ED1969AEAC199D68CE591F52ED6B0
24,760,224 UART: [art] SIG.R = CB3058B3B2D1FAC5E90D9B4CCCE509DB09B158730CAF6914FF91D1A73089540759CC0C42E7D90F894C0E565CFD1C25B8
24,767,662 UART: [art] SIG.S = DBBB33290C1864624B52AC36ECA407E795F0330ED0F328A8D4DF1BC71C9D300BD0C6B87AC40C0C92709F374CDFC96706
25,746,258 UART: Caliptra RT
25,746,970 UART: [state] CFI Enabled
25,912,736 UART: [rt] RT listening for mailbox commands...
25,944,197 UART: [rt]cmd =0x464d4352, len=4
25,951,912 >>> mbox cmd response data (524 bytes)
26,120,689 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,150,770 UART: [rt]cmd =0x43455252, len=4
26,162,000 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,381,390 ready_for_fw is high
3,381,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,603 >>> mbox cmd response: success
14,065,245 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,343,799 UART:
18,344,183 UART: Running Caliptra FMC ...
18,345,368 UART:
18,345,535 UART: [state] CFI Enabled
18,409,083 UART: [fht] FMC Alias Private Key: 7
20,173,429 UART: [art] Extend RT PCRs Done
20,174,651 UART: [art] Lock RT PCRs Done
20,176,061 UART: [art] Populate DV Done
20,181,258 UART: [fht] FMC Alias Private Key: 7
20,182,796 UART: [art] Derive CDI
20,183,615 UART: [art] Store in in slot 0x4
20,241,876 UART: [art] Derive Key Pair
20,242,928 UART: [art] Store priv key in slot 0x5
22,705,521 UART: [art] Derive Key Pair - Done
22,718,350 UART: [art] Signing Cert with AUTHO
22,719,650 UART: RITY.KEYID = 7
24,432,019 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,524 UART: [art] PUB.X = D1ED8BAF3E8387D921645A2BA45CA111C7915DA50EE94B03F62EC8C1BCA0CCA070449F25690D539521D0F30ED3585DB7
24,440,833 UART: [art] PUB.Y = F201CA7FB754E3DCB9A86C5F6F33D154B35B2DC899317CB098EA57B49136868BABD3B20CD453B75AEE1C124A284E3135
24,448,091 UART: [art] SIG.R = B2B46839BB9E87FE70F3AA373CBE8BC06E5BE9C5437744266B92B2C7FFAD57E7F33553E80831D42BA28726743D3BFFA6
24,455,513 UART: [art] SIG.S = 03A79F1D623CEC8471DCC0C4C9AC7CB97CA5587A2E39A00D3C1C1E6ED7719A0ABF0616B98E64983A956B81D5AF090342
25,434,233 UART: Caliptra RT
25,434,944 UART: [state] CFI Enabled
25,599,076 UART: [rt] RT listening for mailbox commands...
25,630,597 UART: [rt]cmd =0x464d4352, len=4
25,638,119 >>> mbox cmd response data (524 bytes)
25,806,442 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,836,458 UART: [rt]cmd =0x43455252, len=4
25,847,848 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,479 UART:
192,848 UART: Running Caliptra ROM ...
194,033 UART:
603,726 UART: [state] CFI Enabled
617,040 UART: [state] LifecycleState = Unprovisioned
618,879 UART: [state] DebugLocked = No
620,201 UART: [state] WD Timer not started. Device not locked for debugging
624,439 UART: [kat] SHA2-256
803,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,140 UART: [kat] ++
815,587 UART: [kat] sha1
826,020 UART: [kat] SHA2-256
829,101 UART: [kat] SHA2-384
834,226 UART: [kat] SHA2-512-ACC
837,223 UART: [kat] ECC-384
3,278,064 UART: [kat] HMAC-384Kdf
3,291,925 UART: [kat] LMS
3,821,357 UART: [kat] --
3,825,297 UART: [cold-reset] ++
3,826,941 UART: [fht] FHT @ 0x50003400
3,837,341 UART: [idev] ++
3,837,902 UART: [idev] CDI.KEYID = 6
3,838,899 UART: [idev] SUBJECT.KEYID = 7
3,840,070 UART: [idev] UDS.KEYID = 0
3,840,991 ready_for_fw is high
3,841,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,906 UART: [idev] Erasing UDS.KEYID = 0
6,313,104 UART: [idev] Sha1 KeyId Algorithm
6,336,592 UART: [idev] --
6,340,200 UART: [ldev] ++
6,340,761 UART: [ldev] CDI.KEYID = 6
6,341,665 UART: [ldev] SUBJECT.KEYID = 5
6,342,864 UART: [ldev] AUTHORITY.KEYID = 7
6,344,085 UART: [ldev] FE.KEYID = 1
6,352,675 UART: [ldev] Erasing FE.KEYID = 1
8,824,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,591 UART: [ldev] --
10,614,911 UART: [fwproc] Wait for Commands...
10,617,054 UART: [fwproc] Recv command 0x46574c44
10,619,086 UART: [fwproc] Recv'd Img size: 114448 bytes
14,017,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,152,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,471,096 >>> mbox cmd response: success
14,471,600 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,475,073 UART: [afmc] ++
14,475,659 UART: [afmc] CDI.KEYID = 6
14,476,562 UART: [afmc] SUBJECT.KEYID = 7
14,477,772 UART: [afmc] AUTHORITY.KEYID = 5
16,976,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,697,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,699,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,714,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,746,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,769,732 UART: [afmc] --
18,773,741 UART: [cold-reset] --
18,776,144 UART: [state] Locking Datavault
18,780,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,782,257 UART: [state] Locking ICCM
18,784,073 UART: [exit] Launching FMC @ 0x40000130
18,792,515 UART:
18,792,750 UART: Running Caliptra FMC ...
18,793,838 UART:
18,793,987 UART: [state] CFI Enabled
18,802,055 UART: [fht] FMC Alias Private Key: 7
20,559,176 UART: [art] Extend RT PCRs Done
20,560,393 UART: [art] Lock RT PCRs Done
20,562,171 UART: [art] Populate DV Done
20,567,624 UART: [fht] FMC Alias Private Key: 7
20,569,152 UART: [art] Derive CDI
20,569,955 UART: [art] Store in in slot 0x4
20,612,604 UART: [art] Derive Key Pair
20,613,635 UART: [art] Store priv key in slot 0x5
23,040,503 UART: [art] Derive Key Pair - Done
23,053,754 UART: [art] Signing Cert with AUTHO
23,055,056 UART: RITY.KEYID = 7
24,760,129 UART: [art] Erasing AUTHORITY.KEYID = 7
24,761,632 UART: [art] PUB.X = 497BDE9A1ACC5E507FF6D60713C32A541FF41F9DD6AD33AE3FCC4A59BA4EF25F2BD064A79A8535010C71355FFE50F438
24,768,951 UART: [art] PUB.Y = A0E25C218BA0CFFF50A42C4204C20A38C1F8EDC6A946AC8485E11AFB6313F6C21EC51B127FC64DE9CBBFBEFAA0212B72
24,776,234 UART: [art] SIG.R = B04706549A3060CBDCF167721B8BB164BA1A168713EC831EBA33173787B07922E7CC4FE9B91F67AFD18AF4909C996D37
24,783,609 UART: [art] SIG.S = A7D2122770D136B63D08A77ED232CC2DE5CD184BA4D71852634A6D3B9B5EBD3278C334F563BBCFB8774D12C6E695FBD7
25,762,828 UART: Caliptra RT
25,763,521 UART: [state] CFI Enabled
25,881,588 UART: [rt] RT listening for mailbox commands...
25,913,040 UART: [rt]cmd =0x464d4352, len=4
25,920,635 >>> mbox cmd response data (524 bytes)
26,091,892 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,121,989 UART: [rt]cmd =0x43455252, len=4
26,133,253 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,701,698 ready_for_fw is high
3,702,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,365 >>> mbox cmd response: success
14,287,184 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,529,256 UART:
18,529,657 UART: Running Caliptra FMC ...
18,530,794 UART:
18,530,945 UART: [state] CFI Enabled
18,538,767 UART: [fht] FMC Alias Private Key: 7
20,296,099 UART: [art] Extend RT PCRs Done
20,297,340 UART: [art] Lock RT PCRs Done
20,299,150 UART: [art] Populate DV Done
20,304,446 UART: [fht] FMC Alias Private Key: 7
20,306,035 UART: [art] Derive CDI
20,306,845 UART: [art] Store in in slot 0x4
20,349,701 UART: [art] Derive Key Pair
20,350,696 UART: [art] Store priv key in slot 0x5
22,777,832 UART: [art] Derive Key Pair - Done
22,791,052 UART: [art] Signing Cert with AUTHO
22,792,366 UART: RITY.KEYID = 7
24,497,546 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,053 UART: [art] PUB.X = A1FCD3AAAA51F37861F630F07B5565BFBDC34B79B382AC9F36494ED135BF9945D5B775E73EA55A039F6E97694F818DB9
24,506,350 UART: [art] PUB.Y = CB0D851F943AF4DA57C8DB9277263837C40DABCCEBB41B5098DB671FEE78B869CF5125EA726648B1918327548CF02170
24,513,598 UART: [art] SIG.R = 9CE4F5372EC4B09339437CF73E73C66D62A192B4C144D6F6D93D3AD436B5965BA62B5E283B32ED72C8FD97A6D1DD24DD
24,520,987 UART: [art] SIG.S = 13E957FA2A406C52618F4DD5786E6DAAEDBA3E29F14A9CB82A88BE95DC30A4187E0769A08D0339EF4311275489A8C32E
25,500,034 UART: Caliptra RT
25,500,759 UART: [state] CFI Enabled
25,618,022 UART: [rt] RT listening for mailbox commands...
25,649,477 UART: [rt]cmd =0x464d4352, len=4
25,656,866 >>> mbox cmd response data (524 bytes)
25,827,334 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,857,415 UART: [rt]cmd =0x43455252, len=4
25,868,824 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,203 UART:
192,549 UART: Running Caliptra ROM ...
193,737 UART:
193,893 UART: [state] CFI Enabled
259,526 UART: [state] LifecycleState = Unprovisioned
261,945 UART: [state] DebugLocked = No
264,829 UART: [state] WD Timer not started. Device not locked for debugging
269,713 UART: [kat] SHA2-256
459,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,381 UART: [kat] ++
470,877 UART: [kat] sha1
481,683 UART: [kat] SHA2-256
484,636 UART: [kat] SHA2-384
491,407 UART: [kat] SHA2-512-ACC
493,995 UART: [kat] ECC-384
2,947,371 UART: [kat] HMAC-384Kdf
2,970,892 UART: [kat] LMS
3,502,661 UART: [kat] --
3,507,777 UART: [cold-reset] ++
3,510,108 UART: [fht] FHT @ 0x50003400
3,522,371 UART: [idev] ++
3,523,076 UART: [idev] CDI.KEYID = 6
3,523,990 UART: [idev] SUBJECT.KEYID = 7
3,525,236 UART: [idev] UDS.KEYID = 0
3,526,160 ready_for_fw is high
3,526,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,288 UART: [idev] Erasing UDS.KEYID = 0
6,029,864 UART: [idev] Sha1 KeyId Algorithm
6,052,566 UART: [idev] --
6,057,324 UART: [ldev] ++
6,058,003 UART: [ldev] CDI.KEYID = 6
6,058,896 UART: [ldev] SUBJECT.KEYID = 5
6,060,111 UART: [ldev] AUTHORITY.KEYID = 7
6,061,350 UART: [ldev] FE.KEYID = 1
6,100,923 UART: [ldev] Erasing FE.KEYID = 1
8,608,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,852 UART: [ldev] --
10,414,762 UART: [fwproc] Wait for Commands...
10,416,260 UART: [fwproc] Recv command 0x46574c44
10,418,244 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,831 >>> mbox cmd response: success
14,599,308 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,602,156 UART: [afmc] ++
14,602,876 UART: [afmc] CDI.KEYID = 6
14,604,124 UART: [afmc] SUBJECT.KEYID = 7
14,605,559 UART: [afmc] AUTHORITY.KEYID = 5
17,150,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,427 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,607 UART: [afmc] --
18,949,551 UART: [cold-reset] --
18,952,450 UART: [state] Locking Datavault
18,958,024 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,169 UART: [state] Locking ICCM
18,962,479 UART: [exit] Launching FMC @ 0x40000130
18,971,158 UART:
18,971,392 UART: Running Caliptra FMC ...
18,972,491 UART:
18,972,648 UART: [state] CFI Enabled
19,031,076 UART: [fht] FMC Alias Private Key: 7
20,794,563 UART: [art] Extend RT PCRs Done
20,795,770 UART: [art] Lock RT PCRs Done
20,797,717 UART: [art] Populate DV Done
20,803,338 UART: [fht] FMC Alias Private Key: 7
20,804,928 UART: [art] Derive CDI
20,805,738 UART: [art] Store in in slot 0x4
20,863,361 UART: [art] Derive Key Pair
20,864,358 UART: [art] Store priv key in slot 0x5
23,326,823 UART: [art] Derive Key Pair - Done
23,339,655 UART: [art] Signing Cert with AUTHO
23,340,956 UART: RITY.KEYID = 7
25,052,445 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,941 UART: [art] PUB.X = 043C7992F8E64599545D94FBF6F662B934D9B9CF43034C6EFD635D6A68A10EDD20AC28B809CD719A6684C2A47CCECF4E
25,061,236 UART: [art] PUB.Y = E45726E160D7180070DA6B05F77913AB44C9F7155786844564309E27E7C65E5D0A61C6690672A4708FBB5737B5E63B9A
25,068,469 UART: [art] SIG.R = 201A4DC6F0F8E4290FA3981D491EB68001F55058EA7F5E322385982EC4E7D85C975ECD3A23C9C054AEA07AE0759D3348
25,075,801 UART: [art] SIG.S = 1604CE417E5594DC8B2EA7C80D0E403D4B10E6E93259074B834EB52AE1D730A8A165F30F851EF3CA8670E1BC18D95F5A
26,054,718 UART: Caliptra RT
26,055,429 UART: [state] CFI Enabled
26,219,979 UART: [rt] RT listening for mailbox commands...
26,251,545 UART: [rt]cmd =0x464d4352, len=4
26,259,037 >>> mbox cmd response data (524 bytes)
26,427,741 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,457,809 UART: [rt]cmd =0x43455252, len=4
26,469,118 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,437,417 ready_for_fw is high
3,437,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,630 >>> mbox cmd response: success
14,732,231 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,034,145 UART:
19,034,527 UART: Running Caliptra FMC ...
19,035,638 UART:
19,035,794 UART: [state] CFI Enabled
19,103,657 UART: [fht] FMC Alias Private Key: 7
20,868,029 UART: [art] Extend RT PCRs Done
20,869,252 UART: [art] Lock RT PCRs Done
20,870,583 UART: [art] Populate DV Done
20,876,051 UART: [fht] FMC Alias Private Key: 7
20,877,542 UART: [art] Derive CDI
20,878,310 UART: [art] Store in in slot 0x4
20,936,427 UART: [art] Derive Key Pair
20,937,470 UART: [art] Store priv key in slot 0x5
23,401,233 UART: [art] Derive Key Pair - Done
23,414,315 UART: [art] Signing Cert with AUTHO
23,415,625 UART: RITY.KEYID = 7
25,127,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,938 UART: [art] PUB.X = A20D1130F34692F5762ED95CB2BFBA4B9C71D683E57E035A2C00E3179728C5B28FFDDBA9A63EB8C1A7ABDE0EF61E9BBE
25,136,186 UART: [art] PUB.Y = 2249B01C55250208944D8C30246DF1B15544E5372CCA3EF66F1DFBC9EE6073EFF9C7634C16703EA20E6CF12672783A02
25,143,465 UART: [art] SIG.R = 6130793AC16C4CB509AEF491B4EBC230EAE0D38B10476F754938EAE37DE6EDA9E86F3EE79E7685A15BC6B515F60F43A3
25,150,871 UART: [art] SIG.S = 78A37C0B8A2DF61BAD713FB941D4137BDB12F3EA7D0EE8621554773AB637C3119A3FF7783C0EA4F98CB23A637E570E9A
26,130,221 UART: Caliptra RT
26,130,900 UART: [state] CFI Enabled
26,295,706 UART: [rt] RT listening for mailbox commands...
26,327,001 UART: [rt]cmd =0x464d4352, len=4
26,334,573 >>> mbox cmd response data (524 bytes)
26,503,284 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,533,058 UART: [rt]cmd =0x43455252, len=4
26,544,395 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,257 UART:
192,639 UART: Running Caliptra ROM ...
193,770 UART:
603,544 UART: [state] CFI Enabled
616,417 UART: [state] LifecycleState = Unprovisioned
618,792 UART: [state] DebugLocked = No
620,953 UART: [state] WD Timer not started. Device not locked for debugging
625,540 UART: [kat] SHA2-256
815,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,219 UART: [kat] ++
826,841 UART: [kat] sha1
837,575 UART: [kat] SHA2-256
840,650 UART: [kat] SHA2-384
845,355 UART: [kat] SHA2-512-ACC
848,001 UART: [kat] ECC-384
3,291,599 UART: [kat] HMAC-384Kdf
3,304,537 UART: [kat] LMS
3,836,344 UART: [kat] --
3,839,792 UART: [cold-reset] ++
3,842,212 UART: [fht] FHT @ 0x50003400
3,854,180 UART: [idev] ++
3,854,876 UART: [idev] CDI.KEYID = 6
3,855,844 UART: [idev] SUBJECT.KEYID = 7
3,857,014 UART: [idev] UDS.KEYID = 0
3,857,936 ready_for_fw is high
3,858,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,885 UART: [idev] Erasing UDS.KEYID = 0
6,335,451 UART: [idev] Sha1 KeyId Algorithm
6,356,935 UART: [idev] --
6,363,272 UART: [ldev] ++
6,363,952 UART: [ldev] CDI.KEYID = 6
6,364,961 UART: [ldev] SUBJECT.KEYID = 5
6,366,058 UART: [ldev] AUTHORITY.KEYID = 7
6,367,282 UART: [ldev] FE.KEYID = 1
6,378,241 UART: [ldev] Erasing FE.KEYID = 1
8,855,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,442 UART: [ldev] --
10,649,723 UART: [fwproc] Wait for Commands...
10,652,041 UART: [fwproc] Recv command 0x46574c44
10,654,358 UART: [fwproc] Recv'd Img size: 114448 bytes
14,104,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,543 >>> mbox cmd response: success
14,848,043 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,852,294 UART: [afmc] ++
14,852,985 UART: [afmc] CDI.KEYID = 6
14,854,169 UART: [afmc] SUBJECT.KEYID = 7
14,855,653 UART: [afmc] AUTHORITY.KEYID = 5
17,359,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,964 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,282 UART: [afmc] --
19,156,939 UART: [cold-reset] --
19,162,526 UART: [state] Locking Datavault
19,168,415 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,552 UART: [state] Locking ICCM
19,172,375 UART: [exit] Launching FMC @ 0x40000130
19,181,038 UART:
19,181,266 UART: Running Caliptra FMC ...
19,182,360 UART:
19,182,514 UART: [state] CFI Enabled
19,190,414 UART: [fht] FMC Alias Private Key: 7
20,947,453 UART: [art] Extend RT PCRs Done
20,948,667 UART: [art] Lock RT PCRs Done
20,950,446 UART: [art] Populate DV Done
20,955,795 UART: [fht] FMC Alias Private Key: 7
20,957,455 UART: [art] Derive CDI
20,958,262 UART: [art] Store in in slot 0x4
21,001,233 UART: [art] Derive Key Pair
21,002,273 UART: [art] Store priv key in slot 0x5
23,428,615 UART: [art] Derive Key Pair - Done
23,441,296 UART: [art] Signing Cert with AUTHO
23,442,594 UART: RITY.KEYID = 7
25,148,349 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,854 UART: [art] PUB.X = 7FAB24B3DDD783DE2E796582AE9976EE2055D963828EF5E26BF86C8B7454B0EA7709461F85484E18117DCABCDF58BD52
25,157,146 UART: [art] PUB.Y = D410E2E594FE22818D9A025F5FC57DD0F24FF1ED9B1D4A08B373A0A1A70C5C473375B75D2792AA6AFD6A6B425A60E538
25,164,419 UART: [art] SIG.R = 8855030EA271B01D95A540E12C0B64728E4C4696B4D44121C89210317FF79C33F6EEEAFA3422C24CE9F422DF6CA58DF2
25,171,791 UART: [art] SIG.S = DEF9097F3AAB19BC4E1155A8D28DBC0A9B44D942070B69FB61EA60385905C89BD2349A0C1A97B85657E299D4B4FBA751
26,150,425 UART: Caliptra RT
26,151,118 UART: [state] CFI Enabled
26,268,060 UART: [rt] RT listening for mailbox commands...
26,299,361 UART: [rt]cmd =0x464d4352, len=4
26,306,837 >>> mbox cmd response data (524 bytes)
26,478,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,508,745 UART: [rt]cmd =0x43455252, len=4
26,520,018 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,752,745 ready_for_fw is high
3,753,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,411 >>> mbox cmd response: success
14,968,999 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,216,399 UART:
19,216,790 UART: Running Caliptra FMC ...
19,217,980 UART:
19,218,145 UART: [state] CFI Enabled
19,226,194 UART: [fht] FMC Alias Private Key: 7
20,983,067 UART: [art] Extend RT PCRs Done
20,984,293 UART: [art] Lock RT PCRs Done
20,985,993 UART: [art] Populate DV Done
20,991,723 UART: [fht] FMC Alias Private Key: 7
20,993,255 UART: [art] Derive CDI
20,993,979 UART: [art] Store in in slot 0x4
21,036,515 UART: [art] Derive Key Pair
21,037,557 UART: [art] Store priv key in slot 0x5
23,463,852 UART: [art] Derive Key Pair - Done
23,476,734 UART: [art] Signing Cert with AUTHO
23,478,052 UART: RITY.KEYID = 7
25,183,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,043 UART: [art] PUB.X = 74E856A77B47719F670901254F714A3CE269C8ADA36702816854ACDEAD890FAB6917563CE41D6E7272F3531B0D92C391
25,192,286 UART: [art] PUB.Y = 1AF51B8EA8E3BF09EDF5FCB4E8A1333659C9D3A562C82B38C0F2C62C93AAF4689A21513517D207E2858091E557A9CBE6
25,199,529 UART: [art] SIG.R = 4E110F71312382B84F3D1544A032BFD9C3747DA66D5D5DE382340CEA59462E426DEE3AA19FDB209EB5045F9367195DAA
25,206,964 UART: [art] SIG.S = 9EE903218BD929E0E3B89877862D19AB1B4016C55A42B93431B80DE5ECEEC799C1B7DCE12FA941630C1477A6602BF4B8
26,185,608 UART: Caliptra RT
26,186,314 UART: [state] CFI Enabled
26,303,556 UART: [rt] RT listening for mailbox commands...
26,334,780 UART: [rt]cmd =0x464d4352, len=4
26,342,239 >>> mbox cmd response data (524 bytes)
26,512,949 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,542,995 UART: [rt]cmd =0x43455252, len=4
26,554,415 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,554 UART: [state] LifecycleState = Unprovisioned
85,209 UART: [state] DebugLocked = No
85,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,403 UART: [kat] SHA2-256
881,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,449 UART: [kat] ++
885,601 UART: [kat] sha1
889,661 UART: [kat] SHA2-256
891,599 UART: [kat] SHA2-384
894,240 UART: [kat] SHA2-512-ACC
896,141 UART: [kat] ECC-384
901,842 UART: [kat] HMAC-384Kdf
906,306 UART: [kat] LMS
1,474,502 UART: [kat] --
1,475,025 UART: [cold-reset] ++
1,475,469 UART: [fht] Storing FHT @ 0x50003400
1,478,146 UART: [idev] ++
1,478,314 UART: [idev] CDI.KEYID = 6
1,478,674 UART: [idev] SUBJECT.KEYID = 7
1,479,098 UART: [idev] UDS.KEYID = 0
1,479,443 ready_for_fw is high
1,479,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,266 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,974 UART: [idev] --
1,514,015 UART: [ldev] ++
1,514,183 UART: [ldev] CDI.KEYID = 6
1,514,546 UART: [ldev] SUBJECT.KEYID = 5
1,514,972 UART: [ldev] AUTHORITY.KEYID = 7
1,515,435 UART: [ldev] FE.KEYID = 1
1,520,269 UART: [ldev] Erasing FE.KEYID = 1
1,545,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,440 UART: [ldev] --
1,584,913 UART: [fwproc] Waiting for Commands...
1,585,644 UART: [fwproc] Received command 0x46574c44
1,586,435 UART: [fwproc] Received Image of size 114448 bytes
2,884,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,582 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,733 >>> mbox cmd response: success
3,077,733 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,078,917 UART: [afmc] ++
3,079,085 UART: [afmc] CDI.KEYID = 6
3,079,447 UART: [afmc] SUBJECT.KEYID = 7
3,079,872 UART: [afmc] AUTHORITY.KEYID = 5
3,114,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,148 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,838 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,771 UART: [afmc] --
3,157,883 UART: [cold-reset] --
3,158,859 UART: [state] Locking Datavault
3,160,010 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,614 UART: [state] Locking ICCM
3,161,254 UART: [exit] Launching FMC @ 0x40000130
3,166,583 UART:
3,166,599 UART: Running Caliptra FMC ...
3,167,007 UART:
3,167,061 UART: [state] CFI Enabled
3,177,724 UART: [fht] FMC Alias Private Key: 7
3,285,753 UART: [art] Extend RT PCRs Done
3,286,181 UART: [art] Lock RT PCRs Done
3,287,453 UART: [art] Populate DV Done
3,295,872 UART: [fht] FMC Alias Private Key: 7
3,297,008 UART: [art] Derive CDI
3,297,288 UART: [art] Store in in slot 0x4
3,383,645 UART: [art] Derive Key Pair
3,384,005 UART: [art] Store priv key in slot 0x5
3,397,403 UART: [art] Derive Key Pair - Done
3,411,980 UART: [art] Signing Cert with AUTHO
3,412,460 UART: RITY.KEYID = 7
3,427,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,497 UART: [art] PUB.X = C005DF143CE7D8B56C1017E982647CE81A20997E1E3F3553765CB22ED56EBC6291897C12A5A4F830213A1D9BF3046F20
3,435,261 UART: [art] PUB.Y = 27767777B141497A4412F2585DE44F5CC44982E52CAE0F3E8436E29CB08654F96B6F11E95EA1323F1CD9C0AB213438F6
3,442,206 UART: [art] SIG.R = A99924EB65A649D0CCF5A15C701BDB6D90243E45EE85641C8D74135CBF2637663B7F1CDCF6808E8BF05629B3FCAD88D1
3,448,988 UART: [art] SIG.S = 80DC38B3792ABFA0915F0ACEEB4E40C4C8751994F604E9C5DED09FD1C2A0D2108050AA3CBAAA1BA1B4F0A29D4CF4AD6C
3,473,415 UART: Caliptra RT
3,473,668 UART: [state] CFI Enabled
3,581,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,442 UART: [rt]cmd =0x464d4352, len=4
3,618,482 >>> mbox cmd response data (524 bytes)
3,618,483 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,918 UART: [rt]cmd =0x43455252, len=4
3,658,826 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,459 ready_for_fw is high
1,361,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,855 >>> mbox cmd response: success
2,926,855 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,988,955 UART:
2,988,971 UART: Running Caliptra FMC ...
2,989,379 UART:
2,989,433 UART: [state] CFI Enabled
2,999,440 UART: [fht] FMC Alias Private Key: 7
3,107,163 UART: [art] Extend RT PCRs Done
3,107,591 UART: [art] Lock RT PCRs Done
3,109,231 UART: [art] Populate DV Done
3,117,548 UART: [fht] FMC Alias Private Key: 7
3,118,698 UART: [art] Derive CDI
3,118,978 UART: [art] Store in in slot 0x4
3,204,167 UART: [art] Derive Key Pair
3,204,527 UART: [art] Store priv key in slot 0x5
3,218,125 UART: [art] Derive Key Pair - Done
3,232,791 UART: [art] Signing Cert with AUTHO
3,233,271 UART: RITY.KEYID = 7
3,248,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,868 UART: [art] PUB.X = C8C4AB4F5DCD287B733830856BE374453E8363031665A31E701BF05758E4E40794BAFF21FFEF895D4FA6020B65E031FE
3,255,630 UART: [art] PUB.Y = 9A6F4843204F769EA6CE005AFE77C8B0955D6F6A4DAB9FBB214A00D201254470A2707A23A986F592C4AFBB6AD65EB675
3,262,543 UART: [art] SIG.R = 85AA7E8E90804DD6F5CBD6D8B5FAB223DF5EDEB39E33CFEE7F7DF6E6FAE3CDBB21D4FA76EA49EC8DB58110823D07606B
3,269,344 UART: [art] SIG.S = D351BD0FCD99498D56A846544C7F333B3609DBD0ECA6072DA13EA19FE711181ADA22DC0D7AB6BF6EB881427D51BC7849
3,293,171 UART: Caliptra RT
3,293,424 UART: [state] CFI Enabled
3,401,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,032 UART: [rt]cmd =0x464d4352, len=4
3,439,220 >>> mbox cmd response data (524 bytes)
3,439,221 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,710 UART: [rt]cmd =0x43455252, len=4
3,479,368 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
891,048 UART: [kat] SHA2-256
892,986 UART: [kat] SHA2-384
895,839 UART: [kat] SHA2-512-ACC
897,740 UART: [kat] ECC-384
903,161 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,948 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 ready_for_fw is high
1,481,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,507 UART: [idev] Erasing UDS.KEYID = 0
1,506,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,763 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,197 UART: [ldev] --
1,586,554 UART: [fwproc] Waiting for Commands...
1,587,357 UART: [fwproc] Received command 0x46574c44
1,588,148 UART: [fwproc] Received Image of size 114448 bytes
2,887,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,056 >>> mbox cmd response: success
3,080,056 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,081,130 UART: [afmc] ++
3,081,298 UART: [afmc] CDI.KEYID = 6
3,081,660 UART: [afmc] SUBJECT.KEYID = 7
3,082,085 UART: [afmc] AUTHORITY.KEYID = 5
3,117,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,571 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,261 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,128 UART: [afmc] --
3,161,250 UART: [cold-reset] --
3,162,244 UART: [state] Locking Datavault
3,163,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,153 UART: [state] Locking ICCM
3,164,709 UART: [exit] Launching FMC @ 0x40000130
3,170,038 UART:
3,170,054 UART: Running Caliptra FMC ...
3,170,462 UART:
3,170,605 UART: [state] CFI Enabled
3,181,238 UART: [fht] FMC Alias Private Key: 7
3,289,421 UART: [art] Extend RT PCRs Done
3,289,849 UART: [art] Lock RT PCRs Done
3,291,135 UART: [art] Populate DV Done
3,299,252 UART: [fht] FMC Alias Private Key: 7
3,300,220 UART: [art] Derive CDI
3,300,500 UART: [art] Store in in slot 0x4
3,385,653 UART: [art] Derive Key Pair
3,386,013 UART: [art] Store priv key in slot 0x5
3,399,187 UART: [art] Derive Key Pair - Done
3,414,092 UART: [art] Signing Cert with AUTHO
3,414,572 UART: RITY.KEYID = 7
3,429,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,517 UART: [art] PUB.X = F62054407B309F7C5BEB65D95713652A98F5E3C5EB908EA7F3CEFB5102C4AF058A1EFF31930A993D10EAC1F5BF79D73D
3,437,292 UART: [art] PUB.Y = 1EA8A651FF60DCE0467C4A1EA19313E855B054378571CB05CAD5D429F89A0DB07990403F5D3C785463F2244ADF9075D4
3,444,238 UART: [art] SIG.R = F50E9EC45CD104F4D4AA6AD3684851A068A7DA0A5F7EBC295AAB2CC23EC73F0AF3BBC8D8682EC21BB6202F76DACC480C
3,451,021 UART: [art] SIG.S = FD60B4948CC49D3471995AAAFC23DFC3662FED74B8702C2AEDACFE29DBBB7B16492CFEDB863A4346DBA2776A21D7CA96
3,474,472 UART: Caliptra RT
3,474,817 UART: [state] CFI Enabled
3,583,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,677 UART: [rt]cmd =0x464d4352, len=4
3,620,777 >>> mbox cmd response data (524 bytes)
3,620,778 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,145 UART: [rt]cmd =0x43455252, len=4
3,660,841 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 ready_for_fw is high
1,363,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,078 >>> mbox cmd response: success
2,930,078 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,991,010 UART:
2,991,026 UART: Running Caliptra FMC ...
2,991,434 UART:
2,991,577 UART: [state] CFI Enabled
3,002,310 UART: [fht] FMC Alias Private Key: 7
3,110,529 UART: [art] Extend RT PCRs Done
3,110,957 UART: [art] Lock RT PCRs Done
3,112,445 UART: [art] Populate DV Done
3,120,510 UART: [fht] FMC Alias Private Key: 7
3,121,612 UART: [art] Derive CDI
3,121,892 UART: [art] Store in in slot 0x4
3,207,147 UART: [art] Derive Key Pair
3,207,507 UART: [art] Store priv key in slot 0x5
3,220,705 UART: [art] Derive Key Pair - Done
3,235,500 UART: [art] Signing Cert with AUTHO
3,235,980 UART: RITY.KEYID = 7
3,251,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,981 UART: [art] PUB.X = 586A15237829863EDF511973D4F3CB475FE82FEC0C4503E377F113CF1022D72685CFC82C65FDC697BBB508D5A94E7503
3,258,741 UART: [art] PUB.Y = 18C94ED8990E8351029F8CC1E43E9976B10B38FFF4D924192FB897F65FD25BDD53826AE37E98F51CE0E98F6639339396
3,265,682 UART: [art] SIG.R = 3FF1F339B1710C69CB5FF16932048FD879A4D6FD66B45BA5B4BC6C7B33376ABDABEF28E2B232ADEB788E13EAE46AF4A8
3,272,470 UART: [art] SIG.S = 191CEF0B3B3B2B0F5C625E9508525D69ED54C1048B6E106B641522936D286E877B718ECC2275DE55941BC9B1EDE189A4
3,296,527 UART: Caliptra RT
3,296,872 UART: [state] CFI Enabled
3,404,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,704 UART: [rt]cmd =0x464d4352, len=4
3,441,942 >>> mbox cmd response data (524 bytes)
3,441,943 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,418 UART: [rt]cmd =0x43455252, len=4
3,482,217 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,739 UART: [kat] SHA2-256
903,679 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,711 UART: [cold-reset] ++
1,172,099 UART: [fht] FHT @ 0x50003400
1,174,932 UART: [idev] ++
1,175,100 UART: [idev] CDI.KEYID = 6
1,175,460 UART: [idev] SUBJECT.KEYID = 7
1,175,884 UART: [idev] UDS.KEYID = 0
1,176,229 ready_for_fw is high
1,176,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,407 UART: [idev] Sha1 KeyId Algorithm
1,208,907 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,944 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,460 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,602 >>> mbox cmd response: success
2,775,602 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,788 UART: [afmc] ++
2,776,956 UART: [afmc] CDI.KEYID = 6
2,777,318 UART: [afmc] SUBJECT.KEYID = 7
2,777,743 UART: [afmc] AUTHORITY.KEYID = 5
2,812,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,245 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,043 UART: [afmc] --
2,855,921 UART: [cold-reset] --
2,856,987 UART: [state] Locking Datavault
2,858,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,828 UART: [state] Locking ICCM
2,859,500 UART: [exit] Launching FMC @ 0x40000130
2,864,829 UART:
2,864,845 UART: Running Caliptra FMC ...
2,865,253 UART:
2,865,307 UART: [state] CFI Enabled
2,875,682 UART: [fht] FMC Alias Private Key: 7
2,982,901 UART: [art] Extend RT PCRs Done
2,983,329 UART: [art] Lock RT PCRs Done
2,984,991 UART: [art] Populate DV Done
2,993,288 UART: [fht] FMC Alias Private Key: 7
2,994,382 UART: [art] Derive CDI
2,994,662 UART: [art] Store in in slot 0x4
3,080,677 UART: [art] Derive Key Pair
3,081,037 UART: [art] Store priv key in slot 0x5
3,094,655 UART: [art] Derive Key Pair - Done
3,109,505 UART: [art] Signing Cert with AUTHO
3,109,985 UART: RITY.KEYID = 7
3,125,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,544 UART: [art] PUB.X = E8B653553A1FDA38ED62726F5E61A3AB5A2B214D7C00DE1AD61CBA426E7355D61F4225255F15CE9078C8F07F941B5E36
3,133,300 UART: [art] PUB.Y = 88364940187CEF147A24554BA37012C9D30ED9D44BE30DEE5A2B4B9EA13C92ED8C5D4503AB2163A02801B5F6742DF73B
3,140,244 UART: [art] SIG.R = EFFA83670A9E1A840EFA05F05DF7EC468516EF58C4A6CE6E82F5DD069C6D3784F8D98BCDA9F9FAA73D56798D41E3B62D
3,147,024 UART: [art] SIG.S = 830A60E67D3518B7477606FE16CA00967040F95D382E626895E220E327A910E42A70DE241A4FDF696BD0BB5306C12D15
3,170,446 UART: Caliptra RT
3,170,699 UART: [state] CFI Enabled
3,277,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,499 UART: [rt]cmd =0x464d4352, len=4
3,315,621 >>> mbox cmd response data (524 bytes)
3,315,622 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,973 UART: [rt]cmd =0x43455252, len=4
3,355,697 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 ready_for_fw is high
1,059,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,205 >>> mbox cmd response: success
2,626,205 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,688,015 UART:
2,688,031 UART: Running Caliptra FMC ...
2,688,439 UART:
2,688,493 UART: [state] CFI Enabled
2,698,928 UART: [fht] FMC Alias Private Key: 7
2,806,227 UART: [art] Extend RT PCRs Done
2,806,655 UART: [art] Lock RT PCRs Done
2,808,217 UART: [art] Populate DV Done
2,816,476 UART: [fht] FMC Alias Private Key: 7
2,817,406 UART: [art] Derive CDI
2,817,686 UART: [art] Store in in slot 0x4
2,903,151 UART: [art] Derive Key Pair
2,903,511 UART: [art] Store priv key in slot 0x5
2,916,373 UART: [art] Derive Key Pair - Done
2,931,256 UART: [art] Signing Cert with AUTHO
2,931,736 UART: RITY.KEYID = 7
2,946,524 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,289 UART: [art] PUB.X = 93C632C9E8E395921407D6490F2DAE64EE13D7FFD7C5F480F8CBA504488790ABC0CCDDE1F9816B245BC18AEE8EF2B167
2,954,066 UART: [art] PUB.Y = 97CB20CC1761E85A1F38516226EB8F91CDB298D099F9D4B2E23BE994289B69AB6B14B85D40503E2F6702B1A4D66122A9
2,961,015 UART: [art] SIG.R = F2DB115D200780F1AD4F9F8CFAFB6EA710CB5B8A7648EC0F5DC6834F7A2BE367117CBC914403461717CAC823E8B52A5A
2,967,792 UART: [art] SIG.S = 93A1C5659A99CC7E8B681A91C1F3F3EB8A6B92D5D21121A77DF228FAB9BB829D962A17C4A3CA69344BE4F8768D9B1A8C
2,991,225 UART: Caliptra RT
2,991,478 UART: [state] CFI Enabled
3,099,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,226 UART: [rt]cmd =0x464d4352, len=4
3,136,296 >>> mbox cmd response data (524 bytes)
3,136,297 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,610 UART: [rt]cmd =0x43455252, len=4
3,176,480 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,423 UART: [kat] SHA2-512-ACC
908,324 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,778 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,189 UART: [idev] Erasing UDS.KEYID = 0
1,200,772 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,090 UART: [ldev] ++
1,210,258 UART: [ldev] CDI.KEYID = 6
1,210,621 UART: [ldev] SUBJECT.KEYID = 5
1,211,047 UART: [ldev] AUTHORITY.KEYID = 7
1,211,510 UART: [ldev] FE.KEYID = 1
1,216,950 UART: [ldev] Erasing FE.KEYID = 1
1,243,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,283,033 UART: [fwproc] Wait for Commands...
1,283,681 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,073 >>> mbox cmd response: success
2,777,073 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,778,287 UART: [afmc] ++
2,778,455 UART: [afmc] CDI.KEYID = 6
2,778,817 UART: [afmc] SUBJECT.KEYID = 7
2,779,242 UART: [afmc] AUTHORITY.KEYID = 5
2,815,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,642 UART: [afmc] --
2,858,744 UART: [cold-reset] --
2,859,498 UART: [state] Locking Datavault
2,860,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,355 UART: [state] Locking ICCM
2,862,023 UART: [exit] Launching FMC @ 0x40000130
2,867,352 UART:
2,867,368 UART: Running Caliptra FMC ...
2,867,776 UART:
2,867,919 UART: [state] CFI Enabled
2,878,328 UART: [fht] FMC Alias Private Key: 7
2,986,161 UART: [art] Extend RT PCRs Done
2,986,589 UART: [art] Lock RT PCRs Done
2,988,045 UART: [art] Populate DV Done
2,995,932 UART: [fht] FMC Alias Private Key: 7
2,996,934 UART: [art] Derive CDI
2,997,214 UART: [art] Store in in slot 0x4
3,083,021 UART: [art] Derive Key Pair
3,083,381 UART: [art] Store priv key in slot 0x5
3,096,873 UART: [art] Derive Key Pair - Done
3,112,011 UART: [art] Signing Cert with AUTHO
3,112,491 UART: RITY.KEYID = 7
3,127,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,530 UART: [art] PUB.X = B2248E592E889352889FC5BBDCB0ADBF048C7F499A10872AF76FFEE332A2AD06C7D0D6190356B148244DBE9DA234775F
3,135,301 UART: [art] PUB.Y = 74D612A25C9368B9CA2ED200D17E9EA9F9F13F34EBFC3408AA5193697D894BF90D21CA940DB4AC0D416604641B997094
3,142,218 UART: [art] SIG.R = 4F63ACA1EBA70464C8CDFB07789B5E4B7F8A9E49C68FFB188C21AD6E25227425BF9C6B6E4580923335FB3D37AC84F901
3,148,991 UART: [art] SIG.S = B51D17BF5227AF198C486EAD768668FA75DBDACFDEA738D9219645ED805161EC4E7EB7C824A55E0378C0C28D25B3C1F9
3,172,739 UART: Caliptra RT
3,173,084 UART: [state] CFI Enabled
3,280,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,539 UART: [rt]cmd =0x464d4352, len=4
3,318,697 >>> mbox cmd response data (524 bytes)
3,318,698 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,995 UART: [rt]cmd =0x43455252, len=4
3,358,862 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 ready_for_fw is high
1,060,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,202 >>> mbox cmd response: success
2,629,202 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,691,614 UART:
2,691,630 UART: Running Caliptra FMC ...
2,692,038 UART:
2,692,181 UART: [state] CFI Enabled
2,702,752 UART: [fht] FMC Alias Private Key: 7
2,810,079 UART: [art] Extend RT PCRs Done
2,810,507 UART: [art] Lock RT PCRs Done
2,812,235 UART: [art] Populate DV Done
2,820,302 UART: [fht] FMC Alias Private Key: 7
2,821,454 UART: [art] Derive CDI
2,821,734 UART: [art] Store in in slot 0x4
2,907,255 UART: [art] Derive Key Pair
2,907,615 UART: [art] Store priv key in slot 0x5
2,920,929 UART: [art] Derive Key Pair - Done
2,935,467 UART: [art] Signing Cert with AUTHO
2,935,947 UART: RITY.KEYID = 7
2,951,805 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,570 UART: [art] PUB.X = 2E7BE26866E6B91D6304CAC97FEE8AECC1E6D8A59B475C4EAF220CE858A2BC44DF1643F4CCE50D4F346FCA44F13582B9
2,959,353 UART: [art] PUB.Y = 21296275B1A577827510E33DB0518CF6C47AB1966467E8D3F1683104B6ADA760C76009F2CDA651FC45A7F3F0C1225EB8
2,966,295 UART: [art] SIG.R = 0B933395F89A9869F38FB7C8D490D1D76EE7644D0C5DFD6C8EA998E405A23F870A9B3BD1FD80F8F5A4B9E9532A10FAB0
2,973,067 UART: [art] SIG.S = 4CA2D107EEC65E5058CA6E64FDB3DE9D2848FDEA0512B72F68F903BA55D382695FCCA9E71F18F734A6F7967A1D76F8E8
2,996,669 UART: Caliptra RT
2,997,014 UART: [state] CFI Enabled
3,104,075 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,585 UART: [rt]cmd =0x464d4352, len=4
3,141,727 >>> mbox cmd response data (524 bytes)
3,141,728 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,105 UART: [rt]cmd =0x43455252, len=4
3,181,878 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 ready_for_fw is high
1,173,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,080 UART: [ldev] --
1,281,520 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46574c44
1,282,982 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,834 >>> mbox cmd response: success
2,773,834 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,775,027 UART: [afmc] ++
2,775,195 UART: [afmc] CDI.KEYID = 6
2,775,558 UART: [afmc] SUBJECT.KEYID = 7
2,775,984 UART: [afmc] AUTHORITY.KEYID = 5
2,811,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,668 UART: [afmc] --
2,854,572 UART: [cold-reset] --
2,855,404 UART: [state] Locking Datavault
2,856,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,211 UART: [state] Locking ICCM
2,857,827 UART: [exit] Launching FMC @ 0x40000130
2,863,156 UART:
2,863,172 UART: Running Caliptra FMC ...
2,863,580 UART:
2,863,634 UART: [state] CFI Enabled
2,874,317 UART: [fht] FMC Alias Private Key: 7
2,981,614 UART: [art] Extend RT PCRs Done
2,982,042 UART: [art] Lock RT PCRs Done
2,983,880 UART: [art] Populate DV Done
2,992,149 UART: [fht] FMC Alias Private Key: 7
2,993,227 UART: [art] Derive CDI
2,993,507 UART: [art] Store in in slot 0x4
3,079,128 UART: [art] Derive Key Pair
3,079,488 UART: [art] Store priv key in slot 0x5
3,092,958 UART: [art] Derive Key Pair - Done
3,107,773 UART: [art] Signing Cert with AUTHO
3,108,253 UART: RITY.KEYID = 7
3,123,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,008 UART: [art] PUB.X = 21836B7712FA669159F2BA3D45DAB41AB67C03B9534BB6507BE1A53F90407E4FA840885F0CA72E017C619EAF49498E66
3,130,771 UART: [art] PUB.Y = BB7119CE56DD62ABBBB44DA4BC9F416E4A124F8AC0AA5FC72EF6AE06A03F0DFC4A83A10820E2E5E3819BBCA2BAE66274
3,137,742 UART: [art] SIG.R = 0DEE935E861ABC74DB381F9559188F2D2B041A388677E25019294E5E78F53F99AB34979EFCD8C08EA7F2A4C5C4F5F285
3,144,512 UART: [art] SIG.S = 66187741033F45BA6193261E68CC5AEB2738A974AA1A36E300D38BB87FB66B93AA4841AED5F39C457E7A6E81989AA098
3,168,940 UART: Caliptra RT
3,169,193 UART: [state] CFI Enabled
3,276,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,214 UART: [rt]cmd =0x464d4352, len=4
3,314,576 >>> mbox cmd response data (524 bytes)
3,314,577 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,802 UART: [rt]cmd =0x43455252, len=4
3,354,689 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,300 ready_for_fw is high
1,056,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,386 >>> mbox cmd response: success
2,624,386 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,685,546 UART:
2,685,562 UART: Running Caliptra FMC ...
2,685,970 UART:
2,686,024 UART: [state] CFI Enabled
2,696,741 UART: [fht] FMC Alias Private Key: 7
2,804,624 UART: [art] Extend RT PCRs Done
2,805,052 UART: [art] Lock RT PCRs Done
2,806,592 UART: [art] Populate DV Done
2,814,923 UART: [fht] FMC Alias Private Key: 7
2,816,037 UART: [art] Derive CDI
2,816,317 UART: [art] Store in in slot 0x4
2,901,996 UART: [art] Derive Key Pair
2,902,356 UART: [art] Store priv key in slot 0x5
2,915,766 UART: [art] Derive Key Pair - Done
2,930,402 UART: [art] Signing Cert with AUTHO
2,930,882 UART: RITY.KEYID = 7
2,946,382 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,147 UART: [art] PUB.X = 0ADDE0CDA136D654F3A4CCC5A9809A6EE121803BD4954322B93D1374F8EF1E4C2FB6756B824DAEDB9BA3614A72CDDDFB
2,953,938 UART: [art] PUB.Y = 97DEDB6EA3D78D9BE06C313D07E054D0543E8D0C4CCBA1924553C7646E2AB1C297309F6EEDAC20577B761B80E6101278
2,960,890 UART: [art] SIG.R = E9968D86C3A4E34B11A4C7979B237BBD95E917D1D7A6B5661416F66AEE5020926907C04DB60D85DD2F50AD02FE16AEED
2,967,661 UART: [art] SIG.S = FDC25254668D21B1ABBE10404AFF7301DEAAC8C1D06A09C320B0308FCA3201D5E35DDA48AAB0ADCEB36901EC09400E13
2,992,028 UART: Caliptra RT
2,992,281 UART: [state] CFI Enabled
3,099,579 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,225 UART: [rt]cmd =0x464d4352, len=4
3,137,269 >>> mbox cmd response data (524 bytes)
3,137,270 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,447 UART: [rt]cmd =0x43455252, len=4
3,177,099 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,823 UART: [kat] HMAC-384Kdf
921,423 UART: [kat] LMS
1,169,735 UART: [kat] --
1,170,832 UART: [cold-reset] ++
1,171,342 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 ready_for_fw is high
1,175,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,890 UART: [fwproc] Recv command 0x46574c44
1,283,623 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,403 >>> mbox cmd response: success
2,775,403 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,526 UART: [afmc] ++
2,776,694 UART: [afmc] CDI.KEYID = 6
2,777,057 UART: [afmc] SUBJECT.KEYID = 7
2,777,483 UART: [afmc] AUTHORITY.KEYID = 5
2,813,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,645 UART: [afmc] --
2,856,557 UART: [cold-reset] --
2,857,291 UART: [state] Locking Datavault
2,858,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,262 UART: [state] Locking ICCM
2,859,916 UART: [exit] Launching FMC @ 0x40000130
2,865,245 UART:
2,865,261 UART: Running Caliptra FMC ...
2,865,669 UART:
2,865,812 UART: [state] CFI Enabled
2,876,437 UART: [fht] FMC Alias Private Key: 7
2,984,462 UART: [art] Extend RT PCRs Done
2,984,890 UART: [art] Lock RT PCRs Done
2,986,556 UART: [art] Populate DV Done
2,994,721 UART: [fht] FMC Alias Private Key: 7
2,995,847 UART: [art] Derive CDI
2,996,127 UART: [art] Store in in slot 0x4
3,081,594 UART: [art] Derive Key Pair
3,081,954 UART: [art] Store priv key in slot 0x5
3,095,650 UART: [art] Derive Key Pair - Done
3,110,145 UART: [art] Signing Cert with AUTHO
3,110,625 UART: RITY.KEYID = 7
3,126,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,008 UART: [art] PUB.X = 1AE12F37981CB299ACA32B7293B21CDEFCD447E756A61BEB88AF51DA2F5DA936D3FCF62D8F458A81B6A6CFB2116FD30B
3,133,799 UART: [art] PUB.Y = D00D14A33B2033A7850782D03B1EADF0A5246A9C1BFDA84CEFAA5EA04CF7470913D3BCFE46AE2B46CAC92A2EE17877B1
3,140,762 UART: [art] SIG.R = E430D2C6B04900A0839DCE6898A3B7DD26623FCA85359805A0105978EBD4B25BFD1DC7F1AA186AD84307E6959E71F016
3,147,508 UART: [art] SIG.S = 099DAC0980608940CD58C6A05E20DB8FA267AD8E7A886289421340F18ED91759E45F743DCC598DC14B4D7D6BA52275AA
3,171,483 UART: Caliptra RT
3,171,828 UART: [state] CFI Enabled
3,280,505 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,167 UART: [rt]cmd =0x464d4352, len=4
3,318,075 >>> mbox cmd response data (524 bytes)
3,318,076 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,465 UART: [rt]cmd =0x43455252, len=4
3,358,150 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,617 ready_for_fw is high
1,056,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,861 >>> mbox cmd response: success
2,624,861 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,686,445 UART:
2,686,461 UART: Running Caliptra FMC ...
2,686,869 UART:
2,687,012 UART: [state] CFI Enabled
2,697,639 UART: [fht] FMC Alias Private Key: 7
2,805,516 UART: [art] Extend RT PCRs Done
2,805,944 UART: [art] Lock RT PCRs Done
2,807,440 UART: [art] Populate DV Done
2,815,661 UART: [fht] FMC Alias Private Key: 7
2,816,803 UART: [art] Derive CDI
2,817,083 UART: [art] Store in in slot 0x4
2,902,570 UART: [art] Derive Key Pair
2,902,930 UART: [art] Store priv key in slot 0x5
2,916,062 UART: [art] Derive Key Pair - Done
2,930,896 UART: [art] Signing Cert with AUTHO
2,931,376 UART: RITY.KEYID = 7
2,946,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,161 UART: [art] PUB.X = B1781BE321B4A5F393EEB914D0976C59FCACE7043B2A4FF5F2EEBDA40C93016ADD1FB0B0036D5BE45EBDC64B2609B74F
2,953,940 UART: [art] PUB.Y = 9091D3DBE358DCB543ACFFDFE283FE5BC94D40C452BDD5C7530CFDFB942CB6E33575CAE659B07A90BCEBD0DE7AA804FB
2,960,918 UART: [art] SIG.R = 179460630CF323A3BBBCA702B2F5AC9A06CA6CCA19B491557C388ED34ADC2C48441CEDBA6DEA14748EF38DAAA89F4126
2,967,699 UART: [art] SIG.S = F689C7671F5322D50D7380CB112285210899DCDD321D5EE7B1DF68007654ED7F6978D04608A4264EB7E70D65A802BC1E
2,991,447 UART: Caliptra RT
2,991,792 UART: [state] CFI Enabled
3,099,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,485 UART: [rt]cmd =0x464d4352, len=4
3,137,463 >>> mbox cmd response data (524 bytes)
3,137,464 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,865 UART: [rt]cmd =0x43455252, len=4
3,177,882 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,073 UART:
192,442 UART: Running Caliptra ROM ...
193,588 UART:
193,741 UART: [state] CFI Enabled
260,551 UART: [state] LifecycleState = Unprovisioned
262,481 UART: [state] DebugLocked = No
264,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,116 UART: [kat] SHA2-256
439,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,277 UART: [kat] ++
450,755 UART: [kat] sha1
462,341 UART: [kat] SHA2-256
464,996 UART: [kat] SHA2-384
472,058 UART: [kat] SHA2-512-ACC
474,430 UART: [kat] ECC-384
2,767,171 UART: [kat] HMAC-384Kdf
2,799,300 UART: [kat] LMS
3,989,604 UART: [kat] --
3,992,623 UART: [cold-reset] ++
3,993,631 UART: [fht] Storing FHT @ 0x50003400
4,005,111 UART: [idev] ++
4,005,693 UART: [idev] CDI.KEYID = 6
4,006,613 UART: [idev] SUBJECT.KEYID = 7
4,007,864 UART: [idev] UDS.KEYID = 0
4,034,112 UART: [idev] Erasing UDS.KEYID = 0
7,345,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,655 UART: [idev] CSR upload requested
7,371,800 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,677,282 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,691,968 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,706,570 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,720,904 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,743,791 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,867,771 UART: [idev] CSR uploaded
9,881,015 ready_for_fw is high
9,881,316 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,025,109 UART: [idev] --
10,025,809 UART: [ldev] ++
10,026,311 UART: [ldev] CDI.KEYID = 6
10,027,198 UART: [ldev] SUBJECT.KEYID = 5
10,028,241 UART: [ldev] AUTHORITY.KEYID = 7
10,029,334 UART: [ldev] FE.KEYID = 1
10,030,200 UART: [ldev] Erasing FE.KEYID = 1
13,250,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,562,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,576,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,591,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,606,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,626,645 UART: [ldev] --
15,631,785 UART: [fwproc] Waiting for Commands...
15,634,749 UART: [fwproc] Received command 0x46574c44
15,636,932 UART: [fwproc] Received Image of size 114124 bytes
19,683,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,762,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,831,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,149,637 >>> mbox cmd response: success
20,150,146 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,153,857 UART: [afmc] ++
20,154,447 UART: [afmc] CDI.KEYID = 6
20,155,357 UART: [afmc] SUBJECT.KEYID = 7
20,156,629 UART: [afmc] AUTHORITY.KEYID = 5
23,522,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,823,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,826,157 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,840,542 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,855,386 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,869,870 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,889,585 UART: [afmc] --
25,892,906 UART: [cold-reset] --
25,897,097 UART: [state] Locking Datavault
25,900,833 UART: [state] Locking PCR0, PCR1 and PCR31
25,902,580 UART: [state] Locking ICCM
25,903,863 UART: [exit] Launching FMC @ 0x40000130
25,912,253 UART:
25,912,491 UART: Running Caliptra FMC ...
25,913,597 UART:
25,913,754 UART: [state] CFI Enabled
25,984,290 UART: [fht] FMC Alias Private Key: 7
28,321,871 UART: [art] Extend RT PCRs Done
28,323,102 UART: [art] Lock RT PCRs Done
28,324,356 UART: [art] Populate DV Done
28,329,610 UART: [fht] FMC Alias Private Key: 7
28,331,150 UART: [art] Derive CDI
28,331,911 UART: [art] Store in in slot 0x4
28,393,586 UART: [art] Derive Key Pair
28,394,625 UART: [art] Store priv key in slot 0x5
31,687,252 UART: [art] Derive Key Pair - Done
31,700,146 UART: [art] Signing Cert with AUTHO
31,701,470 UART: RITY.KEYID = 7
33,988,943 UART: [art] Erasing AUTHORITY.KEYID = 7
33,990,490 UART: [art] PUB.X = 6F0AFD45D7B92F7500DAB47D3E82D457D8F0319BBD4FF4642FD27B4DED23BF4C3A7B8EDCDB24F725892BE408F6B11E93
33,997,747 UART: [art] PUB.Y = 91F159BA770A65EED41C01239223AD759F0CD0358A4C4C2858BCB71F7337836220E4346B14B164325944C273F9827C58
34,004,987 UART: [art] SIG.R = 5F65F503A4F0514217FCC8B06346A6CEA991D01BB40EBA1BD81F80D78424E03AB918BF943CA423E1563E5665D331AC55
34,012,342 UART: [art] SIG.S = D0A61708B94B66D0820FB961CF89AFE6C791A74ED394C20B49A418E01D4B74977455DABC3696C5D8E0473913485E5DB8
35,317,775 UART: Caliptra RT
35,318,491 UART: [state] CFI Enabled
35,499,685 UART: [rt] RT listening for mailbox commands...
35,531,044 UART: [rt]cmd =0x49444352, len=4
35,532,986 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
9,482,216 ready_for_fw is high
9,482,895 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,173,700 >>> mbox cmd response: success
20,174,297 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,867,355 UART:
25,867,732 UART: Running Caliptra FMC ...
25,868,948 UART:
25,869,121 UART: [state] CFI Enabled
25,936,789 UART: [fht] FMC Alias Private Key: 7
28,274,608 UART: [art] Extend RT PCRs Done
28,275,837 UART: [art] Lock RT PCRs Done
28,277,981 UART: [art] Populate DV Done
28,283,455 UART: [fht] FMC Alias Private Key: 7
28,285,001 UART: [art] Derive CDI
28,285,747 UART: [art] Store in in slot 0x4
28,345,677 UART: [art] Derive Key Pair
28,346,678 UART: [art] Store priv key in slot 0x5
31,639,736 UART: [art] Derive Key Pair - Done
31,652,740 UART: [art] Signing Cert with AUTHO
31,654,041 UART: RITY.KEYID = 7
33,942,091 UART: [art] Erasing AUTHORITY.KEYID = 7
33,943,597 UART: [art] PUB.X = 848F9F45C67D448683E639AA2831EC1AEE783858795F4766D846DE8E226121F8D68F75CAD3A1F1920BD62CD075A27950
33,951,023 UART: [art] PUB.Y = 4C786EDEEB145CFB1D63CE9748F0B609B3898FB26D7548A9ECA2452EBD91D35512F07B4061D5FB0466140779528D90E3
33,958,074 UART: [art] SIG.R = E685257A8D7C7B671E22CD39B474297B291F971833CA26E23A7C3F5BDD03FF5A16E753FBDB4ABB3105FCE6CAE44B6620
33,965,489 UART: [art] SIG.S = 5DDF96C0D63D1F6A0BE6C5266EC66066979E83B1E66C0CAD892D082F09F9F2AF9E8C552DAAA0D93DCA92CE1065D4805E
35,270,743 UART: Caliptra RT
35,271,457 UART: [state] CFI Enabled
35,431,376 UART: [rt] RT listening for mailbox commands...
35,463,071 UART: [rt]cmd =0x49444352, len=4
35,465,169 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,301 UART:
192,660 UART: Running Caliptra ROM ...
193,791 UART:
603,656 UART: [state] CFI Enabled
616,631 UART: [state] LifecycleState = Unprovisioned
618,578 UART: [state] DebugLocked = No
619,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,823 UART: [kat] SHA2-256
794,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,132 UART: [kat] ++
805,577 UART: [kat] sha1
815,979 UART: [kat] SHA2-256
818,695 UART: [kat] SHA2-384
824,679 UART: [kat] SHA2-512-ACC
827,038 UART: [kat] ECC-384
3,108,456 UART: [kat] HMAC-384Kdf
3,120,540 UART: [kat] LMS
4,310,685 UART: [kat] --
4,315,839 UART: [cold-reset] ++
4,318,194 UART: [fht] Storing FHT @ 0x50003400
4,329,027 UART: [idev] ++
4,329,598 UART: [idev] CDI.KEYID = 6
4,330,625 UART: [idev] SUBJECT.KEYID = 7
4,331,795 UART: [idev] UDS.KEYID = 0
4,348,502 UART: [idev] Erasing UDS.KEYID = 0
7,619,062 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,135 UART: [idev] CSR upload requested
7,645,245 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,939,488 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,954,031 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,968,622 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,982,958 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,005,950 UART: [idev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
10,129,905 UART: [idev] CSR uploaded
10,143,149 ready_for_fw is high
10,143,432 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,286,784 UART: [idev] --
10,287,464 UART: [ldev] ++
10,287,958 UART: [ldev] CDI.KEYID = 6
10,288,877 UART: [ldev] SUBJECT.KEYID = 5
10,289,915 UART: [ldev] AUTHORITY.KEYID = 7
10,290,996 UART: [ldev] FE.KEYID = 1
10,291,855 UART: [ldev] Erasing FE.KEYID = 1
13,450,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,742,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,756,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,771,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,785,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,804,753 UART: [ldev] --
15,809,532 UART: [fwproc] Waiting for Commands...
15,812,826 UART: [fwproc] Received command 0x46574c44
15,815,005 UART: [fwproc] Received Image of size 114124 bytes
19,862,317 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,945,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,014,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,331,608 >>> mbox cmd response: success
20,332,137 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,336,594 UART: [afmc] ++
20,337,230 UART: [afmc] CDI.KEYID = 6
20,338,145 UART: [afmc] SUBJECT.KEYID = 7
20,339,355 UART: [afmc] AUTHORITY.KEYID = 5
23,648,881 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,942,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,944,972 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,959,468 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,974,202 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,988,659 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
26,010,565 UART: [afmc] --
26,014,966 UART: [cold-reset] --
26,018,884 UART: [state] Locking Datavault
26,023,534 UART: [state] Locking PCR0, PCR1 and PCR31
26,025,281 UART: [state] Locking ICCM
26,026,348 UART: [exit] Launching FMC @ 0x40000130
26,034,739 UART:
26,034,979 UART: Running Caliptra FMC ...
26,036,075 UART:
26,036,235 UART: [state] CFI Enabled
26,044,441 UART: [fht] FMC Alias Private Key: 7
28,374,964 UART: [art] Extend RT PCRs Done
28,376,194 UART: [art] Lock RT PCRs Done
28,377,736 UART: [art] Populate DV Done
28,383,194 UART: [fht] FMC Alias Private Key: 7
28,384,751 UART: [art] Derive CDI
28,385,482 UART: [art] Store in in slot 0x4
28,427,904 UART: [art] Derive Key Pair
28,428,904 UART: [art] Store priv key in slot 0x5
31,670,899 UART: [art] Derive Key Pair - Done
31,683,683 UART: [art] Signing Cert with AUTHO
31,684,981 UART: RITY.KEYID = 7
33,964,770 UART: [art] Erasing AUTHORITY.KEYID = 7
33,966,341 UART: [art] PUB.X = 80DD62DBED42448B7272B9F3BF3630DF657DCA029DF92657E948728A802C29144B33B9429A5CB81458659E0F69D1CF10
33,973,525 UART: [art] PUB.Y = 6182D19126D7234A9E7DC39E96297EBBD7B6B250B9FBCC3AA24EF417042CDA530AA9C2CDE2B74779F6C9CECC6407EA07
33,980,798 UART: [art] SIG.R = 716DBA4629D7DE1EA84F9486CBC91882DDCEF1B63611426450A7B1BEB235F96DF73D6B1C86CFC07BCAC81B1F37688892
33,988,178 UART: [art] SIG.S = 28896D9950A76C3A95B61FC0297C6D126A792F739D81B19479C8E5884FAF244D95D30AA94B648BDF8EC276B54F3254AC
35,293,812 UART: Caliptra RT
35,294,504 UART: [state] CFI Enabled
35,412,436 UART: [rt] RT listening for mailbox commands...
35,443,906 UART: [rt]cmd =0x49444352, len=4
35,445,534 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
9,740,313 ready_for_fw is high
9,741,107 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,389,003 >>> mbox cmd response: success
20,389,666 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,031,305 UART:
26,031,687 UART: Running Caliptra FMC ...
26,032,788 UART:
26,032,936 UART: [state] CFI Enabled
26,040,573 UART: [fht] FMC Alias Private Key: 7
28,371,387 UART: [art] Extend RT PCRs Done
28,372,613 UART: [art] Lock RT PCRs Done
28,374,259 UART: [art] Populate DV Done
28,379,455 UART: [fht] FMC Alias Private Key: 7
28,381,098 UART: [art] Derive CDI
28,381,834 UART: [art] Store in in slot 0x4
28,424,150 UART: [art] Derive Key Pair
28,425,144 UART: [art] Store priv key in slot 0x5
31,667,419 UART: [art] Derive Key Pair - Done
31,680,243 UART: [art] Signing Cert with AUTHO
31,681,549 UART: RITY.KEYID = 7
33,961,241 UART: [art] Erasing AUTHORITY.KEYID = 7
33,962,751 UART: [art] PUB.X = F9D8371573F8634353765C91B24082FEC0002B4D29AF3847672296A8E81A14DA6108E95DF816C8D1207DE4A4F2D2E036
33,969,968 UART: [art] PUB.Y = A78601F2262997FFEAC9499632897FCEAF0B69DCAAAFE0EC07FD38DDC5CAB7344DA5677BB7209C8494D16685A1931A6E
33,977,202 UART: [art] SIG.R = 252238F2BE554616370A3DE0D2D9FA6020C29DC956FDCA9B08E1E692F16615749AED2512E3D81F1B463280697E6ED038
33,984,600 UART: [art] SIG.S = EC02095FB879FC5056A51824987FF74F8DCF9D0092F83B7160D283F611E27A89E1A1FFF4B110AD7FDBA8E0C011F8001C
35,289,826 UART: Caliptra RT
35,290,540 UART: [state] CFI Enabled
35,408,181 UART: [rt] RT listening for mailbox commands...
35,439,219 UART: [rt]cmd =0x49444352, len=4
35,441,159 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,005 UART:
192,384 UART: Running Caliptra ROM ...
193,503 UART:
193,650 UART: [state] CFI Enabled
263,867 UART: [state] LifecycleState = Unprovisioned
265,956 UART: [state] DebugLocked = No
267,231 UART: [state] WD Timer not started. Device not locked for debugging
271,553 UART: [kat] SHA2-256
450,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,213 UART: [kat] ++
462,743 UART: [kat] sha1
474,267 UART: [kat] SHA2-256
477,339 UART: [kat] SHA2-384
484,246 UART: [kat] SHA2-512-ACC
487,184 UART: [kat] ECC-384
2,949,601 UART: [kat] HMAC-384Kdf
2,972,211 UART: [kat] LMS
3,501,694 UART: [kat] --
3,505,331 UART: [cold-reset] ++
3,506,404 UART: [fht] FHT @ 0x50003400
3,517,161 UART: [idev] ++
3,517,717 UART: [idev] CDI.KEYID = 6
3,518,689 UART: [idev] SUBJECT.KEYID = 7
3,519,863 UART: [idev] UDS.KEYID = 0
3,545,055 UART: [idev] Erasing UDS.KEYID = 0
6,029,024 UART: [idev] Sha1 KeyId Algorithm
6,049,635 UART: [idev] CSR upload begun
6,054,349 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,782,162 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,230 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,814,209 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,830,031 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,828 UART: [idev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
7,996,039 UART: [idev] CSR uploaded
8,012,102 ready_for_fw is high
8,012,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,156,508 UART: [idev] --
8,157,154 UART: [ldev] ++
8,157,670 UART: [ldev] CDI.KEYID = 6
8,158,548 UART: [ldev] SUBJECT.KEYID = 5
8,159,689 UART: [ldev] AUTHORITY.KEYID = 7
8,160,864 UART: [ldev] FE.KEYID = 1
8,161,745 UART: [ldev] Erasing FE.KEYID = 1
10,567,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,302,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,334,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,350,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,370,399 UART: [ldev] --
12,375,606 UART: [fwproc] Wait for Commands...
12,378,726 UART: [fwproc] Recv command 0x46574c44
12,380,817 UART: [fwproc] Recv'd Img size: 114448 bytes
15,782,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,855,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,924,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,243,130 >>> mbox cmd response: success
16,243,636 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,248,105 UART: [afmc] ++
16,248,718 UART: [afmc] CDI.KEYID = 6
16,249,630 UART: [afmc] SUBJECT.KEYID = 7
16,250,794 UART: [afmc] AUTHORITY.KEYID = 5
18,792,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,514,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,516,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,532,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,548,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,564,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,587,473 UART: [afmc] --
20,591,478 UART: [cold-reset] --
20,594,585 UART: [state] Locking Datavault
20,599,371 UART: [state] Locking PCR0, PCR1 and PCR31
20,601,073 UART: [state] Locking ICCM
20,603,285 UART: [exit] Launching FMC @ 0x40000130
20,611,734 UART:
20,611,966 UART: Running Caliptra FMC ...
20,613,018 UART:
20,613,176 UART: [state] CFI Enabled
20,672,819 UART: [fht] FMC Alias Private Key: 7
22,436,840 UART: [art] Extend RT PCRs Done
22,438,060 UART: [art] Lock RT PCRs Done
22,439,279 UART: [art] Populate DV Done
22,444,638 UART: [fht] FMC Alias Private Key: 7
22,446,224 UART: [art] Derive CDI
22,447,038 UART: [art] Store in in slot 0x4
22,505,513 UART: [art] Derive Key Pair
22,506,550 UART: [art] Store priv key in slot 0x5
24,969,556 UART: [art] Derive Key Pair - Done
24,982,545 UART: [art] Signing Cert with AUTHO
24,983,850 UART: RITY.KEYID = 7
26,695,440 UART: [art] Erasing AUTHORITY.KEYID = 7
26,696,944 UART: [art] PUB.X = 26E2700D465A1FE4F8AEB05A0D7112021916B0CD2121E8C3F3260F79CD64013B41D9492D50F76036FF9FFBAB86EC239A
26,704,190 UART: [art] PUB.Y = 81CDFA3B0D142B3DAD19E48EE19C397B2E9064168D12F54D3794CE6DCD5AA9A3A5CEEA5C007F335E515D530B1016DCC3
26,711,417 UART: [art] SIG.R = 8AD5AE921615B3DA1D1D0D91DE554642B27E15F4384C360C101650B532B924913EEA0BED74F66520AB9DA88C5468AED8
26,718,811 UART: [art] SIG.S = 66D1FD78DAF21F51ABF863119931D1BB17D9843C5DB6BAF86A726828CC53237911FB33A78B704F0B525583D2537F8391
27,697,755 UART: Caliptra RT
27,698,465 UART: [state] CFI Enabled
27,863,302 UART: [rt] RT listening for mailbox commands...
27,894,662 UART: [rt]cmd =0x49444352, len=4
27,902,144 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
7,662,893 ready_for_fw is high
7,663,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,812,903 >>> mbox cmd response: success
15,813,528 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,092,551 UART:
20,092,953 UART: Running Caliptra FMC ...
20,094,058 UART:
20,094,219 UART: [state] CFI Enabled
20,160,789 UART: [fht] FMC Alias Private Key: 7
21,925,097 UART: [art] Extend RT PCRs Done
21,926,318 UART: [art] Lock RT PCRs Done
21,928,022 UART: [art] Populate DV Done
21,933,431 UART: [fht] FMC Alias Private Key: 7
21,935,105 UART: [art] Derive CDI
21,935,926 UART: [art] Store in in slot 0x4
21,993,224 UART: [art] Derive Key Pair
21,994,267 UART: [art] Store priv key in slot 0x5
24,457,475 UART: [art] Derive Key Pair - Done
24,470,254 UART: [art] Signing Cert with AUTHO
24,471,559 UART: RITY.KEYID = 7
26,183,664 UART: [art] Erasing AUTHORITY.KEYID = 7
26,185,157 UART: [art] PUB.X = 3D0B19B65038C200CC20551089B8072FC00E7D3401DADEBD34564B6CE7863CB850DC0EAB74FA431491772505971354B0
26,192,415 UART: [art] PUB.Y = DD73B409BC7D8FAA9EC9C849116745D46397C2A227933355254DDC4FA8FA2F4074CB351627EB2DDEEFF87362B158C309
26,199,695 UART: [art] SIG.R = 10D29585C8610CFA0E83390B69CDB6C712AD9F2EA06BF6370D85F82F57905F1775BD663D0B96506E064A5FA82D087C9C
26,207,092 UART: [art] SIG.S = D0001B9F71AC5AD2FBAFA7B76843832BB65F10895930BB1FA88C5553759284935511C822EF1DC45DBE88B0F91D1F04E9
27,185,439 UART: Caliptra RT
27,186,149 UART: [state] CFI Enabled
27,352,276 UART: [rt] RT listening for mailbox commands...
27,383,487 UART: [rt]cmd =0x49444352, len=4
27,391,081 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,421 UART:
192,799 UART: Running Caliptra ROM ...
193,930 UART:
603,805 UART: [state] CFI Enabled
618,791 UART: [state] LifecycleState = Unprovisioned
620,698 UART: [state] DebugLocked = No
623,437 UART: [state] WD Timer not started. Device not locked for debugging
626,829 UART: [kat] SHA2-256
805,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,508 UART: [kat] ++
817,969 UART: [kat] sha1
828,411 UART: [kat] SHA2-256
831,413 UART: [kat] SHA2-384
838,178 UART: [kat] SHA2-512-ACC
841,104 UART: [kat] ECC-384
3,285,177 UART: [kat] HMAC-384Kdf
3,297,410 UART: [kat] LMS
3,826,890 UART: [kat] --
3,830,812 UART: [cold-reset] ++
3,833,304 UART: [fht] FHT @ 0x50003400
3,844,699 UART: [idev] ++
3,845,258 UART: [idev] CDI.KEYID = 6
3,846,155 UART: [idev] SUBJECT.KEYID = 7
3,847,385 UART: [idev] UDS.KEYID = 0
3,861,846 UART: [idev] Erasing UDS.KEYID = 0
6,320,634 UART: [idev] Sha1 KeyId Algorithm
6,342,112 UART: [idev] CSR upload begun
6,346,815 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,061,815 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,077,857 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,093,833 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,109,654 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,133,489 UART: [idev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
8,275,678 UART: [idev] CSR uploaded
8,291,742 ready_for_fw is high
8,292,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,435,736 UART: [idev] --
8,436,371 UART: [ldev] ++
8,436,914 UART: [ldev] CDI.KEYID = 6
8,437,786 UART: [ldev] SUBJECT.KEYID = 5
8,438,922 UART: [ldev] AUTHORITY.KEYID = 7
8,440,092 UART: [ldev] FE.KEYID = 1
8,440,981 UART: [ldev] Erasing FE.KEYID = 1
10,788,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,506,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,522,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,538,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,554,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,574,864 UART: [ldev] --
12,579,423 UART: [fwproc] Wait for Commands...
12,581,293 UART: [fwproc] Recv command 0x46574c44
12,583,378 UART: [fwproc] Recv'd Img size: 114448 bytes
15,982,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,121,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,438,509 >>> mbox cmd response: success
16,438,983 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,443,271 UART: [afmc] ++
16,443,863 UART: [afmc] CDI.KEYID = 6
16,444,769 UART: [afmc] SUBJECT.KEYID = 7
16,445,982 UART: [afmc] AUTHORITY.KEYID = 5
18,944,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,666,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,668,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,684,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,700,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,716,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,739,999 UART: [afmc] --
20,743,304 UART: [cold-reset] --
20,748,556 UART: [state] Locking Datavault
20,754,280 UART: [state] Locking PCR0, PCR1 and PCR31
20,755,921 UART: [state] Locking ICCM
20,758,171 UART: [exit] Launching FMC @ 0x40000130
20,766,610 UART:
20,766,853 UART: Running Caliptra FMC ...
20,767,946 UART:
20,768,097 UART: [state] CFI Enabled
20,776,034 UART: [fht] FMC Alias Private Key: 7
22,532,813 UART: [art] Extend RT PCRs Done
22,534,030 UART: [art] Lock RT PCRs Done
22,535,874 UART: [art] Populate DV Done
22,541,110 UART: [fht] FMC Alias Private Key: 7
22,542,707 UART: [art] Derive CDI
22,543,516 UART: [art] Store in in slot 0x4
22,586,315 UART: [art] Derive Key Pair
22,587,312 UART: [art] Store priv key in slot 0x5
25,014,260 UART: [art] Derive Key Pair - Done
25,026,800 UART: [art] Signing Cert with AUTHO
25,028,106 UART: RITY.KEYID = 7
26,733,523 UART: [art] Erasing AUTHORITY.KEYID = 7
26,735,038 UART: [art] PUB.X = F55009F2F8EA023849C7B3B44570968C0FCAFFCBE6406FD225957BEA4FA645379057064CA933FC474880C44A91AFFD0E
26,742,267 UART: [art] PUB.Y = 6F7E7274A7F3AA82F8285B1792F421BA2A697110978C271D6007FCB76E7F83CE6DF252FC0783B66779A11F72AEA4174B
26,749,556 UART: [art] SIG.R = ACC112C266C1DA1FD92C0FC2288A693947B2E3D96C52A83218F0B7843E6DABA16031AB53B3D2C111807A43C51D0EA4A9
26,756,939 UART: [art] SIG.S = 2B480D30FC786EA1B5F2244DD73FE1DDACC93CD840B755C99B0C70BF2647C0FA41FCD79856EB897A1625EA3C2E0BDCD5
27,735,136 UART: Caliptra RT
27,735,980 UART: [state] CFI Enabled
27,852,909 UART: [rt] RT listening for mailbox commands...
27,884,371 UART: [rt]cmd =0x49444352, len=4
27,891,941 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
7,939,487 ready_for_fw is high
7,939,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,023,374 >>> mbox cmd response: success
16,023,952 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,272,150 UART:
20,272,536 UART: Running Caliptra FMC ...
20,273,624 UART:
20,273,766 UART: [state] CFI Enabled
20,281,867 UART: [fht] FMC Alias Private Key: 7
22,038,748 UART: [art] Extend RT PCRs Done
22,039,950 UART: [art] Lock RT PCRs Done
22,041,565 UART: [art] Populate DV Done
22,046,917 UART: [fht] FMC Alias Private Key: 7
22,048,453 UART: [art] Derive CDI
22,049,184 UART: [art] Store in in slot 0x4
22,091,933 UART: [art] Derive Key Pair
22,092,928 UART: [art] Store priv key in slot 0x5
24,519,374 UART: [art] Derive Key Pair - Done
24,532,863 UART: [art] Signing Cert with AUTHO
24,534,169 UART: RITY.KEYID = 7
26,239,585 UART: [art] Erasing AUTHORITY.KEYID = 7
26,241,078 UART: [art] PUB.X = 07125AE772563115E0C464CE7A73FFB93ECCA20289AC0AD5B19463459C040C0F6D8090FEB9053C19EE2A63EDB3C2D107
26,248,380 UART: [art] PUB.Y = 087101C5AA991BD79EA83CAD44309F33CB2D94B1984C334FCCE92D690BF9CB7D3D5AB560612F1CAB3A673F3671BA29AB
26,255,625 UART: [art] SIG.R = 63D9C7F893F4AA4CDD0ADEA85F74700A3CD04C27D6E25DF846B3804881FBC5C9E1AA49B4B86645FEC0D469AACF824A51
26,263,066 UART: [art] SIG.S = F1443912E458E5377C416CD7464174FE252E2D262439C80FD31F1344DE779E108C8FA5988A5CED73FA3C28A750B3E813
27,241,468 UART: Caliptra RT
27,242,182 UART: [state] CFI Enabled
27,359,309 UART: [rt] RT listening for mailbox commands...
27,390,740 UART: [rt]cmd =0x49444352, len=4
27,398,346 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,308 UART:
192,673 UART: Running Caliptra ROM ...
193,884 UART:
194,040 UART: [state] CFI Enabled
264,144 UART: [state] LifecycleState = Unprovisioned
266,557 UART: [state] DebugLocked = No
269,300 UART: [state] WD Timer not started. Device not locked for debugging
274,608 UART: [kat] SHA2-256
464,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,269 UART: [kat] ++
475,748 UART: [kat] sha1
488,329 UART: [kat] SHA2-256
491,342 UART: [kat] SHA2-384
496,620 UART: [kat] SHA2-512-ACC
499,266 UART: [kat] ECC-384
2,948,822 UART: [kat] HMAC-384Kdf
2,972,427 UART: [kat] LMS
3,504,226 UART: [kat] --
3,509,850 UART: [cold-reset] ++
3,511,912 UART: [fht] FHT @ 0x50003400
3,521,885 UART: [idev] ++
3,522,616 UART: [idev] CDI.KEYID = 6
3,523,527 UART: [idev] SUBJECT.KEYID = 7
3,524,767 UART: [idev] UDS.KEYID = 0
3,544,079 UART: [idev] Erasing UDS.KEYID = 0
6,028,650 UART: [idev] Sha1 KeyId Algorithm
6,049,763 UART: [idev] CSR upload begun
6,054,477 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,930 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,172 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,230 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,204 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,401 UART: [idev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
7,982,056 UART: [idev] CSR uploaded
7,990,113 ready_for_fw is high
7,990,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,134,444 UART: [idev] --
8,135,117 UART: [ldev] ++
8,135,614 UART: [ldev] CDI.KEYID = 6
8,136,492 UART: [ldev] SUBJECT.KEYID = 5
8,137,547 UART: [ldev] AUTHORITY.KEYID = 7
8,138,726 UART: [ldev] FE.KEYID = 1
8,139,600 UART: [ldev] Erasing FE.KEYID = 1
10,544,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,281,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,296,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,311,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,327,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,349,336 UART: [ldev] --
12,354,098 UART: [fwproc] Wait for Commands...
12,356,304 UART: [fwproc] Recv command 0x46574c44
12,358,614 UART: [fwproc] Recv'd Img size: 114448 bytes
15,810,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,891,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,007,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,550,869 >>> mbox cmd response: success
16,551,361 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,554,526 UART: [afmc] ++
16,555,251 UART: [afmc] CDI.KEYID = 6
16,556,442 UART: [afmc] SUBJECT.KEYID = 7
16,557,871 UART: [afmc] AUTHORITY.KEYID = 5
19,095,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,815,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,817,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,832,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,848,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,863,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,886,346 UART: [afmc] --
20,889,129 UART: [cold-reset] --
20,892,954 UART: [state] Locking Datavault
20,899,125 UART: [state] Locking PCR0, PCR1 and PCR31
20,901,319 UART: [state] Locking ICCM
20,904,001 UART: [exit] Launching FMC @ 0x40000130
20,912,701 UART:
20,912,938 UART: Running Caliptra FMC ...
20,914,036 UART:
20,914,197 UART: [state] CFI Enabled
20,973,990 UART: [fht] FMC Alias Private Key: 7
22,737,914 UART: [art] Extend RT PCRs Done
22,739,131 UART: [art] Lock RT PCRs Done
22,741,054 UART: [art] Populate DV Done
22,746,472 UART: [fht] FMC Alias Private Key: 7
22,748,161 UART: [art] Derive CDI
22,748,985 UART: [art] Store in in slot 0x4
22,806,916 UART: [art] Derive Key Pair
22,807,937 UART: [art] Store priv key in slot 0x5
25,271,146 UART: [art] Derive Key Pair - Done
25,284,140 UART: [art] Signing Cert with AUTHO
25,285,441 UART: RITY.KEYID = 7
26,996,669 UART: [art] Erasing AUTHORITY.KEYID = 7
26,998,174 UART: [art] PUB.X = 0C219DAFDAD51A04B3E84A792EE2C9E8F9BCEBF3D5A6E0A13E2916EB1001579FA9239113397E54BF216D4A5262D47867
27,005,402 UART: [art] PUB.Y = 706BA3D7E240DB86F9FEC9523590EB9123146C69FD93D528BC7EA933A0AED0DCB43D54EC628D25B0FB4DA191A6C1104E
27,012,701 UART: [art] SIG.R = 6DF40D161AABF67B3D9539E3AD8155E5EE4E4A9C7EB9C5C9EDB3CA56F649320E252B5FB665CDEEB1114992525AEC278A
27,020,094 UART: [art] SIG.S = 34B9831170DA68B10289CC255E559E6AFFDAA5012FEE219FDC63705609CE1B25156B69D4E6AF04BE53A86D5BBAFD9BDD
27,999,435 UART: Caliptra RT
28,000,133 UART: [state] CFI Enabled
28,165,135 UART: [rt] RT listening for mailbox commands...
28,196,490 UART: [rt]cmd =0x49444352, len=4
28,198,509 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
7,714,784 ready_for_fw is high
7,715,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,514,685 >>> mbox cmd response: success
16,515,289 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,793,373 UART:
20,793,762 UART: Running Caliptra FMC ...
20,794,957 UART:
20,795,121 UART: [state] CFI Enabled
20,862,758 UART: [fht] FMC Alias Private Key: 7
22,627,005 UART: [art] Extend RT PCRs Done
22,628,266 UART: [art] Lock RT PCRs Done
22,629,900 UART: [art] Populate DV Done
22,635,307 UART: [fht] FMC Alias Private Key: 7
22,636,951 UART: [art] Derive CDI
22,637,765 UART: [art] Store in in slot 0x4
22,695,271 UART: [art] Derive Key Pair
22,696,286 UART: [art] Store priv key in slot 0x5
25,159,447 UART: [art] Derive Key Pair - Done
25,172,510 UART: [art] Signing Cert with AUTHO
25,173,819 UART: RITY.KEYID = 7
26,885,039 UART: [art] Erasing AUTHORITY.KEYID = 7
26,886,543 UART: [art] PUB.X = 6569DAA2F1242EB91A0FFECC455A0320A54900B4FAEC58C66DDC5F07B90310FC32C5C5AF8CC90F41FCC719F12B1A54A9
26,893,839 UART: [art] PUB.Y = E6F874BB4D1F2ED0825A26003CBABC8C935977BA3485CE00F0DBA04880E3C40B36A0637AFAA296ACDE41C4115CC875BA
26,901,080 UART: [art] SIG.R = 848E2871526584213B8DEFD4764C01EBEB6F897772A434FDA32526A50D28356F82711BEB008165E8BE5C3858DB3DAD3D
26,908,424 UART: [art] SIG.S = EB0EB30BCF30437AFA74CAB3A52CA81C1A443227A0CEA5BC51A7409692F6C770D540850D886880F3376C97FEA0F1FDD6
27,887,605 UART: Caliptra RT
27,888,335 UART: [state] CFI Enabled
28,053,666 UART: [rt] RT listening for mailbox commands...
28,085,092 UART: [rt]cmd =0x49444352, len=4
28,086,847 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,337 UART:
192,737 UART: Running Caliptra ROM ...
193,855 UART:
603,485 UART: [state] CFI Enabled
618,004 UART: [state] LifecycleState = Unprovisioned
620,384 UART: [state] DebugLocked = No
622,051 UART: [state] WD Timer not started. Device not locked for debugging
626,863 UART: [kat] SHA2-256
816,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,539 UART: [kat] ++
828,085 UART: [kat] sha1
840,514 UART: [kat] SHA2-256
843,520 UART: [kat] SHA2-384
848,873 UART: [kat] SHA2-512-ACC
851,445 UART: [kat] ECC-384
3,291,420 UART: [kat] HMAC-384Kdf
3,305,285 UART: [kat] LMS
3,837,123 UART: [kat] --
3,841,984 UART: [cold-reset] ++
3,843,931 UART: [fht] FHT @ 0x50003400
3,855,346 UART: [idev] ++
3,856,087 UART: [idev] CDI.KEYID = 6
3,856,966 UART: [idev] SUBJECT.KEYID = 7
3,858,202 UART: [idev] UDS.KEYID = 0
3,875,336 UART: [idev] Erasing UDS.KEYID = 0
6,338,734 UART: [idev] Sha1 KeyId Algorithm
6,361,676 UART: [idev] CSR upload begun
6,366,458 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,085,931 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,101,174 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,116,213 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,131,244 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,156,427 UART: [idev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
8,286,052 UART: [idev] CSR uploaded
8,294,193 ready_for_fw is high
8,294,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,438,268 UART: [idev] --
8,438,903 UART: [ldev] ++
8,439,393 UART: [ldev] CDI.KEYID = 6
8,440,291 UART: [ldev] SUBJECT.KEYID = 5
8,441,338 UART: [ldev] AUTHORITY.KEYID = 7
8,442,514 UART: [ldev] FE.KEYID = 1
8,443,349 UART: [ldev] Erasing FE.KEYID = 1
10,794,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,512,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,527,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,542,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,557,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,579,521 UART: [ldev] --
12,585,006 UART: [fwproc] Wait for Commands...
12,587,203 UART: [fwproc] Recv command 0x46574c44
12,589,523 UART: [fwproc] Recv'd Img size: 114448 bytes
16,037,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,117,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,233,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,776,539 >>> mbox cmd response: success
16,777,032 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,781,173 UART: [afmc] ++
16,781,866 UART: [afmc] CDI.KEYID = 6
16,783,023 UART: [afmc] SUBJECT.KEYID = 7
16,784,506 UART: [afmc] AUTHORITY.KEYID = 5
19,289,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,011,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,013,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,028,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,043,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,058,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,083,598 UART: [afmc] --
21,086,814 UART: [cold-reset] --
21,089,376 UART: [state] Locking Datavault
21,094,294 UART: [state] Locking PCR0, PCR1 and PCR31
21,096,481 UART: [state] Locking ICCM
21,097,923 UART: [exit] Launching FMC @ 0x40000130
21,106,588 UART:
21,106,820 UART: Running Caliptra FMC ...
21,107,909 UART:
21,108,061 UART: [state] CFI Enabled
21,116,154 UART: [fht] FMC Alias Private Key: 7
22,872,702 UART: [art] Extend RT PCRs Done
22,873,920 UART: [art] Lock RT PCRs Done
22,875,723 UART: [art] Populate DV Done
22,881,233 UART: [fht] FMC Alias Private Key: 7
22,882,868 UART: [art] Derive CDI
22,883,618 UART: [art] Store in in slot 0x4
22,926,525 UART: [art] Derive Key Pair
22,927,556 UART: [art] Store priv key in slot 0x5
25,354,475 UART: [art] Derive Key Pair - Done
25,367,574 UART: [art] Signing Cert with AUTHO
25,368,878 UART: RITY.KEYID = 7
27,074,662 UART: [art] Erasing AUTHORITY.KEYID = 7
27,076,164 UART: [art] PUB.X = FBE2617DAB0C40F3BB15F898C74380BFE9D59DF0F26EEAAC2A4E06AC5881E2B4BE3EC21DB7F54D6E8EE45BB481F06EE3
27,083,441 UART: [art] PUB.Y = 59EB979F030BF4740BA1C291295E205A2D4A510416FD85DC3B35A5CCFA1BA77DC7DFB0761C855ACD5E9B06B00584E546
27,090,720 UART: [art] SIG.R = E484A7BC8BB1061DC9A28DD6C5AE4C10ED55172F4B6C19E9487518E6EFC7089246CCF320A0CA750395FF8ED5061ADEB3
27,098,099 UART: [art] SIG.S = 35937AD2D2AF9771FDEB42F3A793EFE8F5255136F50BCA55C545EAA304AB56D56B8A8375D94EAEBD0A0713F5E8BCF619
28,076,745 UART: Caliptra RT
28,077,442 UART: [state] CFI Enabled
28,195,168 UART: [rt] RT listening for mailbox commands...
28,226,802 UART: [rt]cmd =0x49444352, len=4
28,228,464 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
7,979,174 ready_for_fw is high
7,979,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,683,692 >>> mbox cmd response: success
16,684,245 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,939,623 UART:
20,940,029 UART: Running Caliptra FMC ...
20,941,126 UART:
20,941,273 UART: [state] CFI Enabled
20,949,229 UART: [fht] FMC Alias Private Key: 7
22,705,621 UART: [art] Extend RT PCRs Done
22,706,848 UART: [art] Lock RT PCRs Done
22,708,797 UART: [art] Populate DV Done
22,714,096 UART: [fht] FMC Alias Private Key: 7
22,715,743 UART: [art] Derive CDI
22,716,554 UART: [art] Store in in slot 0x4
22,759,210 UART: [art] Derive Key Pair
22,760,249 UART: [art] Store priv key in slot 0x5
25,187,938 UART: [art] Derive Key Pair - Done
25,200,981 UART: [art] Signing Cert with AUTHO
25,202,287 UART: RITY.KEYID = 7
26,907,523 UART: [art] Erasing AUTHORITY.KEYID = 7
26,909,019 UART: [art] PUB.X = 42D473AEFA8FBF86288A20BD80F49B6669F3A923C329022E5BA2C34AF5D6735C6ED2F48D8C487C994894CFFE851BFFBC
26,916,331 UART: [art] PUB.Y = 6189DC58892D367C055323BE7E1283B709A68804138C50AD8804FA60BCBCD445B6949915DBEB726583E5F9483CA649D5
26,923,581 UART: [art] SIG.R = 81D96D0D43C1B18EEB6C54FCD9375CCFE68133824179A6B1D2FA3A871CBABD88C723DA6E5602E093AE99C180F23091B6
26,930,966 UART: [art] SIG.S = A242B21249DFE45DE48342CC911C4C4F916ADDDF26F92DE8B57FDFC528F1D7B9B0ECAE6856096D3311AFC388107FDA83
27,909,383 UART: Caliptra RT
27,910,096 UART: [state] CFI Enabled
28,027,934 UART: [rt] RT listening for mailbox commands...
28,059,350 UART: [rt]cmd =0x49444352, len=4
28,061,237 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,319 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,489,248 UART: [idev] Erasing UDS.KEYID = 0
1,505,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,195 UART: [idev] CSR upload requested
1,516,041 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,750 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,457 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,339 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,044 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,464 UART: [idev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
1,602,612 UART: [idev] CSR uploaded
1,604,993 ready_for_fw is high
1,604,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,605,164 UART: [idev] --
1,606,223 UART: [ldev] ++
1,606,391 UART: [ldev] CDI.KEYID = 6
1,606,754 UART: [ldev] SUBJECT.KEYID = 5
1,607,180 UART: [ldev] AUTHORITY.KEYID = 7
1,607,643 UART: [ldev] FE.KEYID = 1
1,612,517 UART: [ldev] Erasing FE.KEYID = 1
1,638,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,668,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,675,380 UART: [ldev] --
1,676,651 UART: [fwproc] Waiting for Commands...
1,677,272 UART: [fwproc] Received command 0x46574c44
1,678,063 UART: [fwproc] Received Image of size 114448 bytes
2,977,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,005,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,034,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,170,923 >>> mbox cmd response: success
3,170,923 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,172,013 UART: [afmc] ++
3,172,181 UART: [afmc] CDI.KEYID = 6
3,172,543 UART: [afmc] SUBJECT.KEYID = 7
3,172,968 UART: [afmc] AUTHORITY.KEYID = 5
3,207,695 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,224,059 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,224,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,230,567 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,236,452 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,242,142 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,250,015 UART: [afmc] --
3,250,913 UART: [cold-reset] --
3,251,645 UART: [state] Locking Datavault
3,252,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,253,594 UART: [state] Locking ICCM
3,254,190 UART: [exit] Launching FMC @ 0x40000130
3,259,519 UART:
3,259,535 UART: Running Caliptra FMC ...
3,259,943 UART:
3,259,997 UART: [state] CFI Enabled
3,270,712 UART: [fht] FMC Alias Private Key: 7
3,379,009 UART: [art] Extend RT PCRs Done
3,379,437 UART: [art] Lock RT PCRs Done
3,381,043 UART: [art] Populate DV Done
3,389,266 UART: [fht] FMC Alias Private Key: 7
3,390,288 UART: [art] Derive CDI
3,390,568 UART: [art] Store in in slot 0x4
3,476,093 UART: [art] Derive Key Pair
3,476,453 UART: [art] Store priv key in slot 0x5
3,489,911 UART: [art] Derive Key Pair - Done
3,504,704 UART: [art] Signing Cert with AUTHO
3,505,184 UART: RITY.KEYID = 7
3,520,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,521,273 UART: [art] PUB.X = 588449262685D13D2703A2B04F934C68A29E5CB814425A0500291753D79F8A3950590E961FDE1067940B7CB40AE98E68
3,527,992 UART: [art] PUB.Y = 20CBC1B5F63C8D8A7333AA1C707169B0384076F14B34B23A7F95F95E6174B450B5560B7855A438E1CDF7AB9497AF5D11
3,534,941 UART: [art] SIG.R = 97C8D84F0D18BE93FFAF5DF5828BA1C96AA44DDBB1AAA7ACA62867AF1F9FCE2EFAC97095F0E10EB111FC708AF89F965E
3,541,737 UART: [art] SIG.S = 8040387BAAB41765C58178A28CA4ACECA6F897297E84BABEE14184A5D46506054273DAE816B5584B160597C959E44962
3,565,353 UART: Caliptra RT
3,565,606 UART: [state] CFI Enabled
3,674,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,218 UART: [rt]cmd =0x49444352, len=4
3,705,732 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,146 ready_for_fw is high
1,410,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,945,554 >>> mbox cmd response: success
2,945,554 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,007,498 UART:
3,007,514 UART: Running Caliptra FMC ...
3,007,922 UART:
3,007,976 UART: [state] CFI Enabled
3,018,699 UART: [fht] FMC Alias Private Key: 7
3,127,054 UART: [art] Extend RT PCRs Done
3,127,482 UART: [art] Lock RT PCRs Done
3,128,892 UART: [art] Populate DV Done
3,137,199 UART: [fht] FMC Alias Private Key: 7
3,138,265 UART: [art] Derive CDI
3,138,545 UART: [art] Store in in slot 0x4
3,224,334 UART: [art] Derive Key Pair
3,224,694 UART: [art] Store priv key in slot 0x5
3,238,074 UART: [art] Derive Key Pair - Done
3,253,208 UART: [art] Signing Cert with AUTHO
3,253,688 UART: RITY.KEYID = 7
3,268,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,269,561 UART: [art] PUB.X = D9A3CA267287A9450DF12CD4B3C3A3BF0FAFB58E9938C61A82977BF2030D3D16B261DD7A27ACD481598175C007BD3ECF
3,276,330 UART: [art] PUB.Y = 804BC5DA8FE13266CFAEFEACA84B45E94535DE527372A6D5D33CD3EE13900966C96FD8442A95E56D2731A9E650870D97
3,283,282 UART: [art] SIG.R = 156C319DE111BB3503B541617544FDE97AD0D0AAB060D8932AABE0F0C26AD0D0BA3C2C7AFAA2109EC258EB491E7DF16D
3,290,069 UART: [art] SIG.S = 66B0EE00B92E2906DEA6549550E23B4B7ABBF647AE58304AF4572ACAF91E314B5E32A29E8CAD756D65865CF72147C278
3,313,249 UART: Caliptra RT
3,313,502 UART: [state] CFI Enabled
3,422,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,844 UART: [rt]cmd =0x49444352, len=4
3,454,214 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,251 UART: [kat] SHA2-512-ACC
897,152 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,324 UART: [cold-reset] ++
1,476,724 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,488,283 UART: [idev] Erasing UDS.KEYID = 0
1,504,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,928 UART: [idev] CSR upload requested
1,514,774 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,725 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,432 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,314 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,019 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,439 UART: [idev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
1,601,587 UART: [idev] CSR uploaded
1,603,968 ready_for_fw is high
1,603,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,604,139 UART: [idev] --
1,605,058 UART: [ldev] ++
1,605,226 UART: [ldev] CDI.KEYID = 6
1,605,589 UART: [ldev] SUBJECT.KEYID = 5
1,606,015 UART: [ldev] AUTHORITY.KEYID = 7
1,606,478 UART: [ldev] FE.KEYID = 1
1,611,784 UART: [ldev] Erasing FE.KEYID = 1
1,637,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,650,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,668,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,675,209 UART: [ldev] --
1,676,592 UART: [fwproc] Waiting for Commands...
1,677,285 UART: [fwproc] Received command 0x46574c44
1,678,076 UART: [fwproc] Received Image of size 114448 bytes
2,977,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,005,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,035,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,171,090 >>> mbox cmd response: success
3,171,090 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,172,264 UART: [afmc] ++
3,172,432 UART: [afmc] CDI.KEYID = 6
3,172,794 UART: [afmc] SUBJECT.KEYID = 7
3,173,219 UART: [afmc] AUTHORITY.KEYID = 5
3,208,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,224,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,225,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,231,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,237,067 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,242,757 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,250,602 UART: [afmc] --
3,251,636 UART: [cold-reset] --
3,252,730 UART: [state] Locking Datavault
3,253,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,254,431 UART: [state] Locking ICCM
3,255,047 UART: [exit] Launching FMC @ 0x40000130
3,260,376 UART:
3,260,392 UART: Running Caliptra FMC ...
3,260,800 UART:
3,260,943 UART: [state] CFI Enabled
3,271,462 UART: [fht] FMC Alias Private Key: 7
3,379,197 UART: [art] Extend RT PCRs Done
3,379,625 UART: [art] Lock RT PCRs Done
3,381,351 UART: [art] Populate DV Done
3,389,482 UART: [fht] FMC Alias Private Key: 7
3,390,518 UART: [art] Derive CDI
3,390,798 UART: [art] Store in in slot 0x4
3,476,213 UART: [art] Derive Key Pair
3,476,573 UART: [art] Store priv key in slot 0x5
3,489,873 UART: [art] Derive Key Pair - Done
3,504,729 UART: [art] Signing Cert with AUTHO
3,505,209 UART: RITY.KEYID = 7
3,520,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,521,106 UART: [art] PUB.X = 7A8C5897523323EDA9FFA4A9F7D646CE62680A07B1FF99E3A41D5C6506CCD52A1D42BE004AB0AA797FF94D674B709AEF
3,527,861 UART: [art] PUB.Y = 89C2012F19C54440F49A7074AD6D6F6382941EA2B6D3D659573012DB80AF8470018AA91D5349FB0604CDD6D9089A778A
3,534,792 UART: [art] SIG.R = 8CBCFD7D8FB56E3166D6B47C5C3F03C456F6510611F9A1E6196F0BFBB5034E91A6CC9543846C316224BE13504A4AD0F7
3,541,558 UART: [art] SIG.S = 0D63EEC2C000E2E6CAD390F71C7ABD8807AAF6E49D9F991E939A956DF1ED42024332CC0519398C92C506B3CE0730E780
3,565,091 UART: Caliptra RT
3,565,436 UART: [state] CFI Enabled
3,673,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,035 UART: [rt]cmd =0x49444352, len=4
3,705,191 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,799 ready_for_fw is high
1,411,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,945,925 >>> mbox cmd response: success
2,945,925 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,008,217 UART:
3,008,233 UART: Running Caliptra FMC ...
3,008,641 UART:
3,008,784 UART: [state] CFI Enabled
3,019,223 UART: [fht] FMC Alias Private Key: 7
3,127,116 UART: [art] Extend RT PCRs Done
3,127,544 UART: [art] Lock RT PCRs Done
3,129,032 UART: [art] Populate DV Done
3,137,245 UART: [fht] FMC Alias Private Key: 7
3,138,185 UART: [art] Derive CDI
3,138,465 UART: [art] Store in in slot 0x4
3,223,784 UART: [art] Derive Key Pair
3,224,144 UART: [art] Store priv key in slot 0x5
3,237,592 UART: [art] Derive Key Pair - Done
3,252,804 UART: [art] Signing Cert with AUTHO
3,253,284 UART: RITY.KEYID = 7
3,269,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,269,805 UART: [art] PUB.X = AA4303FE011FA37F5E21128F61EB6300F536689A007E87DC296AD7754EB0EC097D5F4C504AC65C0CA6C1FAFC89841ADC
3,276,533 UART: [art] PUB.Y = B2525F7DA31562A55F40FD434B52A26E46AAAEF58C62BF965EA0DD48AC8A09337950BFF9800804C773CEE1970B1835EA
3,283,481 UART: [art] SIG.R = 447B8AB10C15A5F2BC0BD86F97B5117A5A30A547DA48FE71BD7FE385770BBF960853DEF036290BAA554C0E12CA599CA9
3,290,247 UART: [art] SIG.S = 423F05B9E682B34552A1FCB6F3BF8E3BE1883073A49B100819347EDDAF5A6807190F373AC1BF4353BE5A40CBAD597389
3,313,918 UART: Caliptra RT
3,314,263 UART: [state] CFI Enabled
3,422,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,737 UART: [rt]cmd =0x49444352, len=4
3,454,095 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
893,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,639 UART: [kat] ++
897,791 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,070 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] CSR upload begun
1,211,052 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,648 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,355 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,237 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,942 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,362 UART: [idev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
1,297,510 UART: [idev] CSR uploaded
1,299,889 ready_for_fw is high
1,299,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,060 UART: [idev] --
1,300,958 UART: [ldev] ++
1,301,126 UART: [ldev] CDI.KEYID = 6
1,301,489 UART: [ldev] SUBJECT.KEYID = 5
1,301,915 UART: [ldev] AUTHORITY.KEYID = 7
1,302,378 UART: [ldev] FE.KEYID = 1
1,307,640 UART: [ldev] Erasing FE.KEYID = 1
1,334,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,950 UART: [ldev] --
1,373,253 UART: [fwproc] Wait for Commands...
1,373,959 UART: [fwproc] Recv command 0x46574c44
1,374,687 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,651 >>> mbox cmd response: success
2,867,651 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,868,663 UART: [afmc] ++
2,868,831 UART: [afmc] CDI.KEYID = 6
2,869,193 UART: [afmc] SUBJECT.KEYID = 7
2,869,618 UART: [afmc] AUTHORITY.KEYID = 5
2,904,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,976 UART: [afmc] --
2,948,028 UART: [cold-reset] --
2,948,642 UART: [state] Locking Datavault
2,950,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,655 UART: [state] Locking ICCM
2,951,177 UART: [exit] Launching FMC @ 0x40000130
2,956,506 UART:
2,956,522 UART: Running Caliptra FMC ...
2,956,930 UART:
2,956,984 UART: [state] CFI Enabled
2,967,935 UART: [fht] FMC Alias Private Key: 7
3,075,790 UART: [art] Extend RT PCRs Done
3,076,218 UART: [art] Lock RT PCRs Done
3,077,708 UART: [art] Populate DV Done
3,085,919 UART: [fht] FMC Alias Private Key: 7
3,086,943 UART: [art] Derive CDI
3,087,223 UART: [art] Store in in slot 0x4
3,172,608 UART: [art] Derive Key Pair
3,172,968 UART: [art] Store priv key in slot 0x5
3,185,788 UART: [art] Derive Key Pair - Done
3,200,553 UART: [art] Signing Cert with AUTHO
3,201,033 UART: RITY.KEYID = 7
3,216,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,080 UART: [art] PUB.X = 0E518140A427A418EF6A3DA7DB6031364B8B7BFC55FCD8C0FC224FA318944AC680911061A1C5EC87BFB4CBB90E0B0516
3,223,850 UART: [art] PUB.Y = 694804A3C3BB599713FD37BCC78D0E87019BA2E6101E6B05ED5BA12464F8A4FAC9F02161DDE86BB3D6AD575C47204CC6
3,230,800 UART: [art] SIG.R = C37DC5D5B0422769CA9C809558F98CA39086B09C2BA346E6B769FF7FB5195965F31AA0A65EDA3AD1FF6258533828E247
3,237,574 UART: [art] SIG.S = DAD35EE66E383389AB98952C4D78B4840A48BB81967B565E6E065A12235E621A59F001B8F6555B255723226442D9C8F9
3,261,438 UART: Caliptra RT
3,261,691 UART: [state] CFI Enabled
3,368,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,415 UART: [rt]cmd =0x49444352, len=4
3,400,647 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,234 ready_for_fw is high
1,108,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,825 >>> mbox cmd response: success
2,641,825 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,685 UART:
2,703,701 UART: Running Caliptra FMC ...
2,704,109 UART:
2,704,163 UART: [state] CFI Enabled
2,714,562 UART: [fht] FMC Alias Private Key: 7
2,822,989 UART: [art] Extend RT PCRs Done
2,823,417 UART: [art] Lock RT PCRs Done
2,825,143 UART: [art] Populate DV Done
2,833,460 UART: [fht] FMC Alias Private Key: 7
2,834,510 UART: [art] Derive CDI
2,834,790 UART: [art] Store in in slot 0x4
2,920,419 UART: [art] Derive Key Pair
2,920,779 UART: [art] Store priv key in slot 0x5
2,933,931 UART: [art] Derive Key Pair - Done
2,948,947 UART: [art] Signing Cert with AUTHO
2,949,427 UART: RITY.KEYID = 7
2,964,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,948 UART: [art] PUB.X = 91D21034EF99CD36941E3E417EF429FDD29A98600FE73E5146EB41F5F86335D51B0A65F860284A4E4A3BA0DA3C7FBFF1
2,971,722 UART: [art] PUB.Y = 2B3EF53C3AC00349EF7FADF9999BBB0FDC5EEC61DC7D1841E0ABEDA9BC8BCE0A7DA22BC87E3924B732B6FAEAB0EA6EBF
2,978,707 UART: [art] SIG.R = 078D2F31DBA6DD6C6D74BD618CE8D5E9BF7F8001A08113F4E031977E602F377BEA9CA123872BA9A464F568D9F13A583F
2,985,481 UART: [art] SIG.S = 18E73953C003B71DEF395BF4FA1D0027D81FD9ABFCF6CDDBAEA7C292AB2A5F7A237D20B169E5B29A2614387184568FC7
3,009,351 UART: Caliptra RT
3,009,604 UART: [state] CFI Enabled
3,117,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,671 UART: [rt]cmd =0x49444352, len=4
3,149,339 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
923,077 UART: [kat] LMS
1,171,405 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,184,743 UART: [idev] Erasing UDS.KEYID = 0
1,202,298 UART: [idev] Sha1 KeyId Algorithm
1,210,494 UART: [idev] CSR upload begun
1,212,275 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,223,245 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,952 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,834 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,240,539 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,959 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,107 UART: [idev] CSR uploaded
1,301,486 ready_for_fw is high
1,301,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,657 UART: [idev] --
1,302,713 UART: [ldev] ++
1,302,881 UART: [ldev] CDI.KEYID = 6
1,303,244 UART: [ldev] SUBJECT.KEYID = 5
1,303,670 UART: [ldev] AUTHORITY.KEYID = 7
1,304,133 UART: [ldev] FE.KEYID = 1
1,309,441 UART: [ldev] Erasing FE.KEYID = 1
1,335,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,271 UART: [ldev] --
1,374,706 UART: [fwproc] Wait for Commands...
1,375,380 UART: [fwproc] Recv command 0x46574c44
1,376,108 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,742 >>> mbox cmd response: success
2,867,742 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,868,866 UART: [afmc] ++
2,869,034 UART: [afmc] CDI.KEYID = 6
2,869,396 UART: [afmc] SUBJECT.KEYID = 7
2,869,821 UART: [afmc] AUTHORITY.KEYID = 5
2,905,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,501 UART: [afmc] --
2,948,541 UART: [cold-reset] --
2,949,279 UART: [state] Locking Datavault
2,950,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,004 UART: [state] Locking ICCM
2,951,546 UART: [exit] Launching FMC @ 0x40000130
2,956,875 UART:
2,956,891 UART: Running Caliptra FMC ...
2,957,299 UART:
2,957,442 UART: [state] CFI Enabled
2,968,135 UART: [fht] FMC Alias Private Key: 7
3,076,248 UART: [art] Extend RT PCRs Done
3,076,676 UART: [art] Lock RT PCRs Done
3,078,356 UART: [art] Populate DV Done
3,086,569 UART: [fht] FMC Alias Private Key: 7
3,087,703 UART: [art] Derive CDI
3,087,983 UART: [art] Store in in slot 0x4
3,173,658 UART: [art] Derive Key Pair
3,174,018 UART: [art] Store priv key in slot 0x5
3,187,854 UART: [art] Derive Key Pair - Done
3,202,404 UART: [art] Signing Cert with AUTHO
3,202,884 UART: RITY.KEYID = 7
3,217,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,649 UART: [art] PUB.X = 4CF2EB24E02B2DF80ACAA003FC9BECE4508B0AB68B550A66DA97321392FD572FC5267989D2194EFACDE9CB45364FA21C
3,225,427 UART: [art] PUB.Y = F630E8FBF3E01A5FA5DA46048CA925B5EDE7ABDF8731152C5D852F3B6F1E7566BA6F75216F971C8075E86F4F8E0BA53F
3,232,387 UART: [art] SIG.R = D4AFCB41596F996F4ECE97185BD07A730A2AE4AB9A9B075113724116AEE5CB95008DF6BDC1EEA0934BE4B471830E37AA
3,239,142 UART: [art] SIG.S = F7289E7A5BFA0FA606B0FEECBEBC098E0C4C5EA04FD1CFDBE48D65F45140B5240122CD6D75D4C2ED3832A04739C16CBF
3,263,232 UART: Caliptra RT
3,263,577 UART: [state] CFI Enabled
3,372,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,879 UART: [rt]cmd =0x49444352, len=4
3,404,099 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,929 ready_for_fw is high
1,109,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,496 >>> mbox cmd response: success
2,645,496 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,707,814 UART:
2,707,830 UART: Running Caliptra FMC ...
2,708,238 UART:
2,708,381 UART: [state] CFI Enabled
2,718,912 UART: [fht] FMC Alias Private Key: 7
2,826,875 UART: [art] Extend RT PCRs Done
2,827,303 UART: [art] Lock RT PCRs Done
2,829,029 UART: [art] Populate DV Done
2,837,350 UART: [fht] FMC Alias Private Key: 7
2,838,420 UART: [art] Derive CDI
2,838,700 UART: [art] Store in in slot 0x4
2,924,511 UART: [art] Derive Key Pair
2,924,871 UART: [art] Store priv key in slot 0x5
2,938,339 UART: [art] Derive Key Pair - Done
2,953,004 UART: [art] Signing Cert with AUTHO
2,953,484 UART: RITY.KEYID = 7
2,968,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,267 UART: [art] PUB.X = B0D7CB9ABDE534DE10C72F8FC0A88945168754B2D3A474B60F74A8D1F1DABCD80B694E1EDD3F4366B219A5BB5EEC0AF6
2,976,052 UART: [art] PUB.Y = C508344CA31F6C9FE76644649343A233FD77829C0FFD08B221EA4FC52519A1B00C1F24248AED0D1ACE5A80C8B8679851
2,982,991 UART: [art] SIG.R = 4582E45D8990FB44435DA5513AD607356439A259CA39BAFFB2F47C677725C7144F816CB67BAF0B4132C450FAE1AADDF4
2,989,763 UART: [art] SIG.S = BC1086A3918FF557A532A8FE64D433938859D74F7F0CF05D5C746EC3386E2876A926BA3C7EBB07FFD907B1CAAA66F400
3,013,449 UART: Caliptra RT
3,013,794 UART: [state] CFI Enabled
3,122,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,152,791 UART: [rt]cmd =0x49444352, len=4
3,154,171 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,182,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,206,757 UART: [idev] CSR upload begun
1,208,536 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,977 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,685 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,570 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,276 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,705 UART: [idev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
1,296,199 UART: [idev] CSR uploaded
1,299,244 ready_for_fw is high
1,299,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,413 UART: [idev] --
1,300,342 UART: [ldev] ++
1,300,510 UART: [ldev] CDI.KEYID = 6
1,300,874 UART: [ldev] SUBJECT.KEYID = 5
1,301,301 UART: [ldev] AUTHORITY.KEYID = 7
1,301,764 UART: [ldev] FE.KEYID = 1
1,306,772 UART: [ldev] Erasing FE.KEYID = 1
1,333,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,144 UART: [ldev] --
1,372,536 UART: [fwproc] Wait for Commands...
1,373,215 UART: [fwproc] Recv command 0x46574c44
1,373,948 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,865,148 >>> mbox cmd response: success
2,865,148 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,373 UART: [afmc] ++
2,866,541 UART: [afmc] CDI.KEYID = 6
2,866,904 UART: [afmc] SUBJECT.KEYID = 7
2,867,330 UART: [afmc] AUTHORITY.KEYID = 5
2,903,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,536 UART: [afmc] --
2,946,572 UART: [cold-reset] --
2,947,620 UART: [state] Locking Datavault
2,948,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,407 UART: [state] Locking ICCM
2,949,867 UART: [exit] Launching FMC @ 0x40000130
2,955,196 UART:
2,955,212 UART: Running Caliptra FMC ...
2,955,620 UART:
2,955,674 UART: [state] CFI Enabled
2,966,249 UART: [fht] FMC Alias Private Key: 7
3,074,430 UART: [art] Extend RT PCRs Done
3,074,858 UART: [art] Lock RT PCRs Done
3,076,094 UART: [art] Populate DV Done
3,084,457 UART: [fht] FMC Alias Private Key: 7
3,085,443 UART: [art] Derive CDI
3,085,723 UART: [art] Store in in slot 0x4
3,171,730 UART: [art] Derive Key Pair
3,172,090 UART: [art] Store priv key in slot 0x5
3,185,586 UART: [art] Derive Key Pair - Done
3,200,015 UART: [art] Signing Cert with AUTHO
3,200,495 UART: RITY.KEYID = 7
3,216,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,006 UART: [art] PUB.X = 0A63CA1D12C03E24D26185A24EC5AECE24C07656B4FACAF6278B78F296BB8BDC7283FA35F9C94CFC2A12C9C77A0DBB10
3,223,792 UART: [art] PUB.Y = 61EBDE5F8896F8F89CB5C4E95731CC8B16C231C49126DB12C69FA10BB18E0502521AAA2CB63F9C6C6676F4CB295B5687
3,230,743 UART: [art] SIG.R = 4F586B11106FD038D9252735DC071FE9FA66294B4AC2CCCD58012482EECDA537B05BD56F5A03C6E833EFF70FF087C604
3,237,508 UART: [art] SIG.S = 5C9E7C3DF88F0FDECC36B57384781136093FB8247706FABDDC6F48D93ABC73372D25E19CC61AC79E76BBF8A5B2169831
3,261,418 UART: Caliptra RT
3,261,671 UART: [state] CFI Enabled
3,370,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,272 UART: [rt]cmd =0x49444352, len=4
3,408,201 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,773 ready_for_fw is high
1,106,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,535 >>> mbox cmd response: success
2,641,535 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,597 UART:
2,704,613 UART: Running Caliptra FMC ...
2,705,021 UART:
2,705,075 UART: [state] CFI Enabled
2,715,738 UART: [fht] FMC Alias Private Key: 7
2,823,735 UART: [art] Extend RT PCRs Done
2,824,163 UART: [art] Lock RT PCRs Done
2,825,583 UART: [art] Populate DV Done
2,833,960 UART: [fht] FMC Alias Private Key: 7
2,835,088 UART: [art] Derive CDI
2,835,368 UART: [art] Store in in slot 0x4
2,921,031 UART: [art] Derive Key Pair
2,921,391 UART: [art] Store priv key in slot 0x5
2,934,213 UART: [art] Derive Key Pair - Done
2,948,894 UART: [art] Signing Cert with AUTHO
2,949,374 UART: RITY.KEYID = 7
2,964,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,875 UART: [art] PUB.X = BC4526FD7EF7775A0DCE5A582F759BC9D71F9D3CECAC333BD5FE07AAD226B62F3A8AD2C7A8A8B20DE4EB02EC4EC905AF
2,971,664 UART: [art] PUB.Y = 07F650147A402DD96312A076BEBF9B12EA2DDAB632EB5E04C58AD813A131A62A4E5E85DE9CC0545346DF70CC4EA57E69
2,978,622 UART: [art] SIG.R = E617C52904890F40D244D9CA2D7E61C332C0BECE7FE26C82B38CFDE0130DBEC2E696BE7BE4999E89168763AD82BCA120
2,985,397 UART: [art] SIG.S = 8EA2D2D6F9B235B58FF8C4EB1900CFA128F0BA04C4FEAA6181F1CD2E531AD8FDCC8E0490945F2578F2F2CC4FDA1EB06B
3,009,196 UART: Caliptra RT
3,009,449 UART: [state] CFI Enabled
3,118,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,485 UART: [rt]cmd =0x49444352, len=4
3,155,686 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,263 UART: [kat] LMS
1,169,575 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,862 UART: [idev] ++
1,174,030 UART: [idev] CDI.KEYID = 6
1,174,391 UART: [idev] SUBJECT.KEYID = 7
1,174,816 UART: [idev] UDS.KEYID = 0
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,202 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] CSR upload begun
1,210,257 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,438 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,146 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,031 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,737 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,166 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,660 UART: [idev] CSR uploaded
1,301,705 ready_for_fw is high
1,301,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,874 UART: [idev] --
1,302,965 UART: [ldev] ++
1,303,133 UART: [ldev] CDI.KEYID = 6
1,303,497 UART: [ldev] SUBJECT.KEYID = 5
1,303,924 UART: [ldev] AUTHORITY.KEYID = 7
1,304,387 UART: [ldev] FE.KEYID = 1
1,309,379 UART: [ldev] Erasing FE.KEYID = 1
1,335,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,543 UART: [ldev] --
1,375,037 UART: [fwproc] Wait for Commands...
1,375,752 UART: [fwproc] Recv command 0x46574c44
1,376,485 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,407 >>> mbox cmd response: success
2,867,407 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,868,670 UART: [afmc] ++
2,868,838 UART: [afmc] CDI.KEYID = 6
2,869,201 UART: [afmc] SUBJECT.KEYID = 7
2,869,627 UART: [afmc] AUTHORITY.KEYID = 5
2,905,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,510 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,393 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,027 UART: [afmc] --
2,949,053 UART: [cold-reset] --
2,950,143 UART: [state] Locking Datavault
2,951,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,690 UART: [state] Locking ICCM
2,952,216 UART: [exit] Launching FMC @ 0x40000130
2,957,545 UART:
2,957,561 UART: Running Caliptra FMC ...
2,957,969 UART:
2,958,112 UART: [state] CFI Enabled
2,968,927 UART: [fht] FMC Alias Private Key: 7
3,077,278 UART: [art] Extend RT PCRs Done
3,077,706 UART: [art] Lock RT PCRs Done
3,079,442 UART: [art] Populate DV Done
3,087,873 UART: [fht] FMC Alias Private Key: 7
3,088,819 UART: [art] Derive CDI
3,089,099 UART: [art] Store in in slot 0x4
3,174,950 UART: [art] Derive Key Pair
3,175,310 UART: [art] Store priv key in slot 0x5
3,188,722 UART: [art] Derive Key Pair - Done
3,203,466 UART: [art] Signing Cert with AUTHO
3,203,946 UART: RITY.KEYID = 7
3,219,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,983 UART: [art] PUB.X = 3DAAC03AEED5C561162DAE4F5CEA246659FECEC5F3FD0EE8C4A215F9FFD131C67A43286900815877DCECC48789E3FCBA
3,226,754 UART: [art] PUB.Y = 2000E9BB11CE77FC3FB6B6CF8A9D79CBB38E878F6480E2B90048E9672FE77E14A40BDD767E6AA10609F03EB08AC8E81B
3,233,667 UART: [art] SIG.R = 8300E55697E6E98B905E658B30B7D474FDE7D66A5C75FB1B45FCE936BEBBB988B26E051134D68D14EA96F19E2E690DD5
3,240,419 UART: [art] SIG.S = DF0C0ED3BC91279FFC19F7B68264759AEC20DCF0C19CF7412A1913D4BBF194A7FB9C7DF49CD57153072F4A880D0A8737
3,264,249 UART: Caliptra RT
3,264,594 UART: [state] CFI Enabled
3,371,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,172 UART: [rt]cmd =0x49444352, len=4
3,409,475 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,684 ready_for_fw is high
1,106,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,276 >>> mbox cmd response: success
2,642,276 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,832 UART:
2,704,848 UART: Running Caliptra FMC ...
2,705,256 UART:
2,705,399 UART: [state] CFI Enabled
2,715,936 UART: [fht] FMC Alias Private Key: 7
2,824,381 UART: [art] Extend RT PCRs Done
2,824,809 UART: [art] Lock RT PCRs Done
2,826,327 UART: [art] Populate DV Done
2,834,748 UART: [fht] FMC Alias Private Key: 7
2,835,718 UART: [art] Derive CDI
2,835,998 UART: [art] Store in in slot 0x4
2,921,305 UART: [art] Derive Key Pair
2,921,665 UART: [art] Store priv key in slot 0x5
2,934,703 UART: [art] Derive Key Pair - Done
2,949,577 UART: [art] Signing Cert with AUTHO
2,950,057 UART: RITY.KEYID = 7
2,965,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,892 UART: [art] PUB.X = 9BDA3376DF6789E53A0CC084A8C7968B29D24B37719E48E077B423767C4595B8A1FF9B8BDD18AB2DC14479551F1A6E28
2,972,663 UART: [art] PUB.Y = 56BE0826E3BCC20C93EB3E46C00B9E0385DBF611B836CFC6D32A32DDFB2F86A7F18AADD64AAA950F8E7FE04970EAD5BD
2,979,626 UART: [art] SIG.R = 01FA5946F4263A7686799BEEDB426B0D8E862F027B96886D252458635796FB78EBCDF2D5B3DC9FD52D8C574E1543C5A0
2,986,391 UART: [art] SIG.S = 4100044B02A8F360A9C49A1589913536F57EB10BFEEDD3225A6D381E3E285DABD86306ACF904B43A080C7209696142DB
3,009,602 UART: Caliptra RT
3,009,947 UART: [state] CFI Enabled
3,118,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,152 UART: [rt]cmd =0x49444352, len=4
3,156,363 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,975 UART:
192,356 UART: Running Caliptra ROM ...
193,558 UART:
193,717 UART: [state] CFI Enabled
267,625 UART: [state] LifecycleState = Unprovisioned
269,564 UART: [state] DebugLocked = No
272,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,805 UART: [kat] SHA2-256
447,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,002 UART: [kat] ++
458,493 UART: [kat] sha1
470,941 UART: [kat] SHA2-256
473,665 UART: [kat] SHA2-384
478,741 UART: [kat] SHA2-512-ACC
481,109 UART: [kat] ECC-384
2,767,632 UART: [kat] HMAC-384Kdf
2,780,084 UART: [kat] LMS
3,970,388 UART: [kat] --
3,974,825 UART: [cold-reset] ++
3,976,757 UART: [fht] Storing FHT @ 0x50003400
3,988,306 UART: [idev] ++
3,988,869 UART: [idev] CDI.KEYID = 6
3,989,897 UART: [idev] SUBJECT.KEYID = 7
3,991,077 UART: [idev] UDS.KEYID = 0
3,992,070 ready_for_fw is high
3,992,273 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,821 UART: [idev] Erasing UDS.KEYID = 0
7,325,288 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,897 UART: [idev] --
7,351,113 UART: [ldev] ++
7,351,688 UART: [ldev] CDI.KEYID = 6
7,352,659 UART: [ldev] SUBJECT.KEYID = 5
7,353,870 UART: [ldev] AUTHORITY.KEYID = 7
7,355,101 UART: [ldev] FE.KEYID = 1
7,402,286 UART: [ldev] Erasing FE.KEYID = 1
10,735,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,937 UART: [ldev] --
13,115,010 UART: [fwproc] Waiting for Commands...
13,116,944 UART: [fwproc] Received command 0x46574c44
13,119,179 UART: [fwproc] Received Image of size 114124 bytes
17,167,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,032 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,627,570 >>> mbox cmd response: success
17,632,216 UART: [afmc] ++
17,632,848 UART: [afmc] CDI.KEYID = 6
17,633,785 UART: [afmc] SUBJECT.KEYID = 7
17,635,003 UART: [afmc] AUTHORITY.KEYID = 5
21,009,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,218 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,472 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,897 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,721 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,197 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,296 UART: [afmc] --
23,375,729 UART: [cold-reset] --
23,380,082 UART: [state] Locking Datavault
23,385,221 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,923 UART: [state] Locking ICCM
23,387,995 UART: [exit] Launching FMC @ 0x40000130
23,396,370 UART:
23,396,694 UART: Running Caliptra FMC ...
23,397,779 UART:
23,397,942 UART: [state] CFI Enabled
23,468,859 UART: [fht] FMC Alias Private Key: 7
25,806,300 UART: [art] Extend RT PCRs Done
25,807,516 UART: [art] Lock RT PCRs Done
25,809,247 UART: [art] Populate DV Done
25,814,657 UART: [fht] FMC Alias Private Key: 7
25,816,303 UART: [art] Derive CDI
25,817,115 UART: [art] Store in in slot 0x4
25,877,516 UART: [art] Derive Key Pair
25,878,549 UART: [art] Store priv key in slot 0x5
29,171,328 UART: [art] Derive Key Pair - Done
29,184,265 UART: [art] Signing Cert with AUTHO
29,185,570 UART: RITY.KEYID = 7
31,473,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,328 UART: [art] PUB.X = C7668A75432661F1E1FAAACB8157A8AF208D5225E108D0722C65AC106E83C8C9E3857053D165CA69B61FAC404523987D
31,482,605 UART: [art] PUB.Y = 75E6AB08998336EF8695515F62AFE3317A01FF2918D348AD63456B7A287D22D231823942DDCD1218C57DE96656C7AA77
31,489,793 UART: [art] SIG.R = E2F0A29D6FFFB1F5D0763DA3E82EDB6273A47A41550AD081624994365CBCF57B09841763D9C8B7C897DF49E1CB3DED9E
31,497,196 UART: [art] SIG.S = 46D380EC5CCC23192DCFCD1732F23D233D4D47ACCA2ADAD0F04E2F3B1270C1F8188046C7C28E5401C1611D429B8A9BC4
32,802,198 UART: Caliptra RT
32,802,908 UART: [state] CFI Enabled
32,965,516 UART: [rt] RT listening for mailbox commands...
32,967,360 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,996,931 UART: [rt]cmd =0x49444352, len=4
32,998,793 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,782,506 ready_for_fw is high
3,783,100 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,852,833 >>> mbox cmd response: success
23,542,884 UART:
23,543,279 UART: Running Caliptra FMC ...
23,544,474 UART:
23,544,662 UART: [state] CFI Enabled
23,613,204 UART: [fht] FMC Alias Private Key: 7
25,951,227 UART: [art] Extend RT PCRs Done
25,952,546 UART: [art] Lock RT PCRs Done
25,954,424 UART: [art] Populate DV Done
25,959,906 UART: [fht] FMC Alias Private Key: 7
25,961,508 UART: [art] Derive CDI
25,962,250 UART: [art] Store in in slot 0x4
26,022,042 UART: [art] Derive Key Pair
26,023,050 UART: [art] Store priv key in slot 0x5
29,315,276 UART: [art] Derive Key Pair - Done
29,328,600 UART: [art] Signing Cert with AUTHO
29,329,902 UART: RITY.KEYID = 7
31,616,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,303 UART: [art] PUB.X = E38D0343E54F6FF9AF99BC89845263C54424D9A56BCAFCF586F167A5C8A04867E5AFFFEC0218F31C323F4BBAD76CFD93
31,625,607 UART: [art] PUB.Y = 4F1BFFCFA37EE0ED10055473CC827CE6F398AF10C7A3980FF24DAD8C87626FDED75A4E774F77797B30D09750F7189832
31,632,841 UART: [art] SIG.R = 117190430738833240E7BC112E5CA88EADF9C3875833767CB5850A9E54632E7CE47CF1DF7034FEB64E3523D17EB3CA5C
31,640,191 UART: [art] SIG.S = 75B08843FF996B38AC8C48097DAEA86156A1AD4D324820A9FB64DB19A1704994C48C6DFBB057B616D38A8F39A873D084
32,945,301 UART: Caliptra RT
32,945,989 UART: [state] CFI Enabled
33,106,656 UART: [rt] RT listening for mailbox commands...
33,108,496 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,138,229 UART: [rt]cmd =0x49444352, len=4
33,139,840 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,574 UART:
192,945 UART: Running Caliptra ROM ...
194,135 UART:
603,664 UART: [state] CFI Enabled
618,604 UART: [state] LifecycleState = Unprovisioned
620,543 UART: [state] DebugLocked = No
623,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,241 UART: [kat] SHA2-256
796,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,512 UART: [kat] ++
808,113 UART: [kat] sha1
819,488 UART: [kat] SHA2-256
822,205 UART: [kat] SHA2-384
826,980 UART: [kat] SHA2-512-ACC
829,340 UART: [kat] ECC-384
3,114,564 UART: [kat] HMAC-384Kdf
3,126,721 UART: [kat] LMS
4,316,845 UART: [kat] --
4,323,129 UART: [cold-reset] ++
4,324,154 UART: [fht] Storing FHT @ 0x50003400
4,336,260 UART: [idev] ++
4,336,890 UART: [idev] CDI.KEYID = 6
4,337,772 UART: [idev] SUBJECT.KEYID = 7
4,339,007 UART: [idev] UDS.KEYID = 0
4,339,965 ready_for_fw is high
4,340,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,451 UART: [idev] Erasing UDS.KEYID = 0
7,623,268 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,985 UART: [idev] --
7,650,823 UART: [ldev] ++
7,651,381 UART: [ldev] CDI.KEYID = 6
7,652,334 UART: [ldev] SUBJECT.KEYID = 5
7,653,589 UART: [ldev] AUTHORITY.KEYID = 7
7,654,807 UART: [ldev] FE.KEYID = 1
7,666,913 UART: [ldev] Erasing FE.KEYID = 1
10,957,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,637 UART: [ldev] --
13,320,727 UART: [fwproc] Waiting for Commands...
13,322,707 UART: [fwproc] Received command 0x46574c44
13,324,938 UART: [fwproc] Received Image of size 114124 bytes
17,377,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,002 >>> mbox cmd response: success
17,846,444 UART: [afmc] ++
17,847,039 UART: [afmc] CDI.KEYID = 6
17,847,981 UART: [afmc] SUBJECT.KEYID = 7
17,849,266 UART: [afmc] AUTHORITY.KEYID = 5
21,167,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,083 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,430 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,300 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,791 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,982 UART: [afmc] --
23,535,708 UART: [cold-reset] --
23,539,185 UART: [state] Locking Datavault
23,543,777 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,536 UART: [state] Locking ICCM
23,547,301 UART: [exit] Launching FMC @ 0x40000130
23,555,687 UART:
23,555,917 UART: Running Caliptra FMC ...
23,557,013 UART:
23,557,192 UART: [state] CFI Enabled
23,564,972 UART: [fht] FMC Alias Private Key: 7
25,897,192 UART: [art] Extend RT PCRs Done
25,898,418 UART: [art] Lock RT PCRs Done
25,900,175 UART: [art] Populate DV Done
25,905,672 UART: [fht] FMC Alias Private Key: 7
25,907,382 UART: [art] Derive CDI
25,908,114 UART: [art] Store in in slot 0x4
25,950,976 UART: [art] Derive Key Pair
25,951,970 UART: [art] Store priv key in slot 0x5
29,193,522 UART: [art] Derive Key Pair - Done
29,206,582 UART: [art] Signing Cert with AUTHO
29,207,889 UART: RITY.KEYID = 7
31,487,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,148 UART: [art] PUB.X = E379B213C6736D016DF9E8AD7AC7A0F594D93E04CCC81E03D882DEC6F9ADE6C80AE38CE46F9495F323F457944E3A5829
31,496,381 UART: [art] PUB.Y = F1DA4089AF027924C6A3C50C307F868D1B07003346EBB6A1B83E600E82EC68F82E5501095A4BE7323390D2B47421CC3A
31,503,642 UART: [art] SIG.R = F0E43AAE4D29B7180DEF0023FF7C3D758D7800A59F3EEB6D64FFEB82A0120283A9D46EEF0D7B611E0D4B06D79A0DF6FD
31,511,030 UART: [art] SIG.S = E1C267513B6AD98CAFEE641835FC4CD869C512674D4215754BBE7522FAC74F4F50E517303FCC38B72ED7EF5F5DD72141
32,816,283 UART: Caliptra RT
32,816,982 UART: [state] CFI Enabled
32,933,987 UART: [rt] RT listening for mailbox commands...
32,935,816 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,965,381 UART: [rt]cmd =0x49444352, len=4
32,966,967 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,125,281 ready_for_fw is high
4,125,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,570 >>> mbox cmd response: success
23,714,811 UART:
23,715,224 UART: Running Caliptra FMC ...
23,716,330 UART:
23,716,477 UART: [state] CFI Enabled
23,724,377 UART: [fht] FMC Alias Private Key: 7
26,055,380 UART: [art] Extend RT PCRs Done
26,056,606 UART: [art] Lock RT PCRs Done
26,058,258 UART: [art] Populate DV Done
26,063,789 UART: [fht] FMC Alias Private Key: 7
26,065,423 UART: [art] Derive CDI
26,066,170 UART: [art] Store in in slot 0x4
26,108,664 UART: [art] Derive Key Pair
26,109,673 UART: [art] Store priv key in slot 0x5
29,351,979 UART: [art] Derive Key Pair - Done
29,364,868 UART: [art] Signing Cert with AUTHO
29,366,166 UART: RITY.KEYID = 7
31,646,097 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,602 UART: [art] PUB.X = 00BF6D726F0ABAAA0D81466A9A2A790676EBAABCDC3ACE55FE0EC45C59755815ECFB9EB56CEEDDA5E5D44EB8D96BDA03
31,654,888 UART: [art] PUB.Y = 6AD73D7EFF0D87423C3AFE75B63EF6C7C170A8AE8B63BD3CD846BD773EAD5B59C6CAE6C2D590648C7CE73F960B4EB459
31,662,191 UART: [art] SIG.R = F67D7FD51796CFEF5F4387AFB77D0D284B9C6A2F0F6301A3483A0635FCB13A941561BA3950B7F9F6A48BE70DFF781BEF
31,669,583 UART: [art] SIG.S = 0A5A5E38C75733436DAB557A728A82E9AD5A8D51D64AA7B64AEC0C62D54F64A8BA4D313388FE5B7243BA1009BD5CA02A
32,975,383 UART: Caliptra RT
32,976,095 UART: [state] CFI Enabled
33,093,323 UART: [rt] RT listening for mailbox commands...
33,095,157 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,125,154 UART: [rt]cmd =0x49444352, len=4
33,126,961 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,213 UART:
192,581 UART: Running Caliptra ROM ...
193,718 UART:
193,868 UART: [state] CFI Enabled
266,828 UART: [state] LifecycleState = Unprovisioned
268,752 UART: [state] DebugLocked = No
270,356 UART: [state] WD Timer not started. Device not locked for debugging
274,817 UART: [kat] SHA2-256
453,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,561 UART: [kat] ++
466,105 UART: [kat] sha1
476,280 UART: [kat] SHA2-256
479,282 UART: [kat] SHA2-384
484,272 UART: [kat] SHA2-512-ACC
487,202 UART: [kat] ECC-384
2,948,100 UART: [kat] HMAC-384Kdf
2,971,129 UART: [kat] LMS
3,500,583 UART: [kat] --
3,503,459 UART: [cold-reset] ++
3,504,756 UART: [fht] FHT @ 0x50003400
3,515,091 UART: [idev] ++
3,515,663 UART: [idev] CDI.KEYID = 6
3,516,575 UART: [idev] SUBJECT.KEYID = 7
3,517,818 UART: [idev] UDS.KEYID = 0
3,518,742 ready_for_fw is high
3,518,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,898 UART: [idev] Erasing UDS.KEYID = 0
6,027,827 UART: [idev] Sha1 KeyId Algorithm
6,050,834 UART: [idev] --
6,054,610 UART: [ldev] ++
6,055,218 UART: [ldev] CDI.KEYID = 6
6,056,135 UART: [ldev] SUBJECT.KEYID = 5
6,057,298 UART: [ldev] AUTHORITY.KEYID = 7
6,058,535 UART: [ldev] FE.KEYID = 1
6,100,507 UART: [ldev] Erasing FE.KEYID = 1
8,602,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,802 UART: [ldev] --
10,395,767 UART: [fwproc] Wait for Commands...
10,397,700 UART: [fwproc] Recv command 0x46574c44
10,399,741 UART: [fwproc] Recv'd Img size: 114448 bytes
13,811,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,599 >>> mbox cmd response: success
14,278,379 UART: [afmc] ++
14,278,970 UART: [afmc] CDI.KEYID = 6
14,279,881 UART: [afmc] SUBJECT.KEYID = 7
14,281,096 UART: [afmc] AUTHORITY.KEYID = 5
16,809,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,326 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,289 UART: [afmc] --
18,611,371 UART: [cold-reset] --
18,615,103 UART: [state] Locking Datavault
18,619,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,575 UART: [state] Locking ICCM
18,623,993 UART: [exit] Launching FMC @ 0x40000130
18,632,388 UART:
18,632,632 UART: Running Caliptra FMC ...
18,633,732 UART:
18,633,894 UART: [state] CFI Enabled
18,691,327 UART: [fht] FMC Alias Private Key: 7
20,455,814 UART: [art] Extend RT PCRs Done
20,457,037 UART: [art] Lock RT PCRs Done
20,458,778 UART: [art] Populate DV Done
20,464,236 UART: [fht] FMC Alias Private Key: 7
20,465,787 UART: [art] Derive CDI
20,466,601 UART: [art] Store in in slot 0x4
20,524,445 UART: [art] Derive Key Pair
20,525,439 UART: [art] Store priv key in slot 0x5
22,988,839 UART: [art] Derive Key Pair - Done
23,001,561 UART: [art] Signing Cert with AUTHO
23,002,858 UART: RITY.KEYID = 7
24,714,748 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,247 UART: [art] PUB.X = 75C222032F8E2A9688626D4BF80A16C1B46C8D2DC462042365FA74722F644440D00EE4D5FC3DCDD04A54DBAC1386EE6A
24,723,545 UART: [art] PUB.Y = 0B02A1D2A26A5BF2937C66BE761E89AE15DA33A2E6C957862DACE8579FFAA488BF9DFF6F7618106CFADA7F743E5FA7CE
24,730,831 UART: [art] SIG.R = 9A28A9E4F30BFCB4E300334A1A98D47BFDA218B1157EDD863A9131357D7569438CBF12C8F20B76B0D60A21F173BA9D19
24,738,220 UART: [art] SIG.S = 70F78555DF073EB34C437C13C878DFA73AC9ADB9C23EDB58CE3B7F422F324AEDC970B57D5B0132825C9A99F555F9621A
25,716,998 UART: Caliptra RT
25,717,693 UART: [state] CFI Enabled
25,882,861 UART: [rt] RT listening for mailbox commands...
25,884,711 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,914,757 UART: [rt]cmd =0x49444352, len=4
25,916,690 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,362,057 ready_for_fw is high
3,362,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,024 >>> mbox cmd response: success
18,328,166 UART:
18,328,624 UART: Running Caliptra FMC ...
18,329,724 UART:
18,329,878 UART: [state] CFI Enabled
18,391,952 UART: [fht] FMC Alias Private Key: 7
20,155,799 UART: [art] Extend RT PCRs Done
20,157,022 UART: [art] Lock RT PCRs Done
20,158,513 UART: [art] Populate DV Done
20,163,982 UART: [fht] FMC Alias Private Key: 7
20,165,538 UART: [art] Derive CDI
20,166,273 UART: [art] Store in in slot 0x4
20,223,908 UART: [art] Derive Key Pair
20,224,953 UART: [art] Store priv key in slot 0x5
22,688,402 UART: [art] Derive Key Pair - Done
22,701,668 UART: [art] Signing Cert with AUTHO
22,702,973 UART: RITY.KEYID = 7
24,414,195 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,702 UART: [art] PUB.X = 09FADF1296F841D35D7CCC13357AD073B693563C75B80E7D42748CD959A7CA910205BF3EBE00AB182D1BBEA32E734C87
24,422,966 UART: [art] PUB.Y = 66492736A249D1094CB37D76F110593C4352EE054ADEBEAF6A2B5A9436920EAA924F72290887FF80173D5537B7E55872
24,430,176 UART: [art] SIG.R = 20E8EB86A52CC3A01BC43721BAAFAAD1076EC9EC6A50DAED2E03AACAA8815F55CC444619FE01A824E9E9377A45B1DBBB
24,437,593 UART: [art] SIG.S = BE235660A203C2291E56F72BAE9C99E6F768E436BCAE6D044E1266B35E94F686CC5B3AEE9859DB208921C9BE1B45D9EA
25,416,652 UART: Caliptra RT
25,417,367 UART: [state] CFI Enabled
25,582,558 UART: [rt] RT listening for mailbox commands...
25,584,407 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,614,778 UART: [rt]cmd =0x49444352, len=4
25,616,481 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,508 UART:
192,882 UART: Running Caliptra ROM ...
194,088 UART:
603,481 UART: [state] CFI Enabled
617,014 UART: [state] LifecycleState = Unprovisioned
618,885 UART: [state] DebugLocked = No
621,542 UART: [state] WD Timer not started. Device not locked for debugging
625,356 UART: [kat] SHA2-256
804,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,014 UART: [kat] ++
816,545 UART: [kat] sha1
827,844 UART: [kat] SHA2-256
830,844 UART: [kat] SHA2-384
837,105 UART: [kat] SHA2-512-ACC
840,033 UART: [kat] ECC-384
3,282,866 UART: [kat] HMAC-384Kdf
3,295,189 UART: [kat] LMS
3,824,693 UART: [kat] --
3,827,566 UART: [cold-reset] ++
3,828,500 UART: [fht] FHT @ 0x50003400
3,840,099 UART: [idev] ++
3,840,648 UART: [idev] CDI.KEYID = 6
3,841,591 UART: [idev] SUBJECT.KEYID = 7
3,842,750 UART: [idev] UDS.KEYID = 0
3,843,738 ready_for_fw is high
3,843,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,688 UART: [idev] Erasing UDS.KEYID = 0
6,316,493 UART: [idev] Sha1 KeyId Algorithm
6,339,438 UART: [idev] --
6,344,534 UART: [ldev] ++
6,345,101 UART: [ldev] CDI.KEYID = 6
6,345,995 UART: [ldev] SUBJECT.KEYID = 5
6,347,201 UART: [ldev] AUTHORITY.KEYID = 7
6,348,424 UART: [ldev] FE.KEYID = 1
6,358,169 UART: [ldev] Erasing FE.KEYID = 1
8,835,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,587 UART: [ldev] --
10,624,686 UART: [fwproc] Wait for Commands...
10,626,771 UART: [fwproc] Recv command 0x46574c44
10,628,852 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,738 >>> mbox cmd response: success
14,493,328 UART: [afmc] ++
14,494,087 UART: [afmc] CDI.KEYID = 6
14,494,994 UART: [afmc] SUBJECT.KEYID = 7
14,496,102 UART: [afmc] AUTHORITY.KEYID = 5
16,997,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,745 UART: [afmc] --
18,793,848 UART: [cold-reset] --
18,797,645 UART: [state] Locking Datavault
18,804,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,933 UART: [state] Locking ICCM
18,806,903 UART: [exit] Launching FMC @ 0x40000130
18,815,310 UART:
18,815,581 UART: Running Caliptra FMC ...
18,816,683 UART:
18,816,835 UART: [state] CFI Enabled
18,824,817 UART: [fht] FMC Alias Private Key: 7
20,581,724 UART: [art] Extend RT PCRs Done
20,582,945 UART: [art] Lock RT PCRs Done
20,584,809 UART: [art] Populate DV Done
20,590,164 UART: [fht] FMC Alias Private Key: 7
20,591,696 UART: [art] Derive CDI
20,592,502 UART: [art] Store in in slot 0x4
20,635,042 UART: [art] Derive Key Pair
20,636,038 UART: [art] Store priv key in slot 0x5
23,062,702 UART: [art] Derive Key Pair - Done
23,075,430 UART: [art] Signing Cert with AUTHO
23,076,753 UART: RITY.KEYID = 7
24,782,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,636 UART: [art] PUB.X = 365BB4A08D27B9D27756F847F93EE2A8CFE8208342FC8B45E4776D09588F95D843DAE518CF408839F388D68202E6FC4B
24,790,916 UART: [art] PUB.Y = 46AC5E7CF086977670BE1F72A738DAE5E87CDB60BEE625725CC964DBD23443D36D3A25DADA2DA8EB2DE6FC3419762711
24,798,186 UART: [art] SIG.R = BB0EBB562B00A8711F43E60E6DD270D78D5BD744BDADDC86E415C6266340AD10780883DE11FCCAAB1D42CE1CEA5A46E6
24,805,611 UART: [art] SIG.S = EC4F56378074C7AB861A8C2039C9195D16DA3634784DAFC387F8A9A59DA1F6344648BB3B1553E79229A70CA8635D0FF5
25,784,264 UART: Caliptra RT
25,784,959 UART: [state] CFI Enabled
25,903,197 UART: [rt] RT listening for mailbox commands...
25,905,040 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,934,816 UART: [rt]cmd =0x49444352, len=4
25,936,349 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,695,379 ready_for_fw is high
3,695,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,247 >>> mbox cmd response: success
18,521,231 UART:
18,521,629 UART: Running Caliptra FMC ...
18,522,832 UART:
18,522,994 UART: [state] CFI Enabled
18,530,872 UART: [fht] FMC Alias Private Key: 7
20,287,823 UART: [art] Extend RT PCRs Done
20,289,045 UART: [art] Lock RT PCRs Done
20,291,050 UART: [art] Populate DV Done
20,296,244 UART: [fht] FMC Alias Private Key: 7
20,297,942 UART: [art] Derive CDI
20,298,751 UART: [art] Store in in slot 0x4
20,341,678 UART: [art] Derive Key Pair
20,342,671 UART: [art] Store priv key in slot 0x5
22,769,249 UART: [art] Derive Key Pair - Done
22,782,578 UART: [art] Signing Cert with AUTHO
22,783,884 UART: RITY.KEYID = 7
24,489,708 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,204 UART: [art] PUB.X = 3FEC4EB683717306BBE6C7D35309DF28355302AD9650AB521FE3B55E48C76D340E7B430023B812FD0C2C9A68CD19F75D
24,498,493 UART: [art] PUB.Y = EF5E261AD3982AB69119ECD40E1476469C7B2178FDC6A8E677EFA51779EB8A4CC4CE9DA8CD3000C34A61AB8E6D8F8C7E
24,505,768 UART: [art] SIG.R = E4C102579367090DCEFB660D533E16E63777A12FEB18FACFD4C609E800ED9B371E367E911578596069F621AE22543F4A
24,513,101 UART: [art] SIG.S = 68684689C71BEEE8A68C95C1659BD9173106221E73D198AA9AFA685794830DC13A1FA18E3C480B1FAA81E9763FA75EB2
25,492,008 UART: Caliptra RT
25,492,723 UART: [state] CFI Enabled
25,609,519 UART: [rt] RT listening for mailbox commands...
25,611,351 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,641,008 UART: [rt]cmd =0x49444352, len=4
25,642,928 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,198 UART:
192,565 UART: Running Caliptra ROM ...
193,754 UART:
193,905 UART: [state] CFI Enabled
262,506 UART: [state] LifecycleState = Unprovisioned
264,854 UART: [state] DebugLocked = No
266,033 UART: [state] WD Timer not started. Device not locked for debugging
269,571 UART: [kat] SHA2-256
459,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,178 UART: [kat] ++
470,667 UART: [kat] sha1
482,203 UART: [kat] SHA2-256
485,194 UART: [kat] SHA2-384
490,709 UART: [kat] SHA2-512-ACC
493,289 UART: [kat] ECC-384
2,948,132 UART: [kat] HMAC-384Kdf
2,972,384 UART: [kat] LMS
3,504,172 UART: [kat] --
3,507,891 UART: [cold-reset] ++
3,508,965 UART: [fht] FHT @ 0x50003400
3,519,884 UART: [idev] ++
3,520,663 UART: [idev] CDI.KEYID = 6
3,521,552 UART: [idev] SUBJECT.KEYID = 7
3,522,671 UART: [idev] UDS.KEYID = 0
3,524,011 ready_for_fw is high
3,524,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,984 UART: [idev] Erasing UDS.KEYID = 0
6,030,323 UART: [idev] Sha1 KeyId Algorithm
6,051,610 UART: [idev] --
6,055,781 UART: [ldev] ++
6,056,464 UART: [ldev] CDI.KEYID = 6
6,057,376 UART: [ldev] SUBJECT.KEYID = 5
6,058,536 UART: [ldev] AUTHORITY.KEYID = 7
6,059,766 UART: [ldev] FE.KEYID = 1
6,100,425 UART: [ldev] Erasing FE.KEYID = 1
8,602,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,084 UART: [ldev] --
10,413,149 UART: [fwproc] Wait for Commands...
10,416,163 UART: [fwproc] Recv command 0x46574c44
10,418,468 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,528 >>> mbox cmd response: success
14,607,834 UART: [afmc] ++
14,608,538 UART: [afmc] CDI.KEYID = 6
14,609,642 UART: [afmc] SUBJECT.KEYID = 7
14,611,181 UART: [afmc] AUTHORITY.KEYID = 5
17,147,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,869,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,871,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,136 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,212 UART: [afmc] --
18,945,752 UART: [cold-reset] --
18,950,638 UART: [state] Locking Datavault
18,956,299 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,481 UART: [state] Locking ICCM
18,960,207 UART: [exit] Launching FMC @ 0x40000130
18,968,879 UART:
18,969,112 UART: Running Caliptra FMC ...
18,970,209 UART:
18,970,369 UART: [state] CFI Enabled
19,027,207 UART: [fht] FMC Alias Private Key: 7
20,791,032 UART: [art] Extend RT PCRs Done
20,792,237 UART: [art] Lock RT PCRs Done
20,793,855 UART: [art] Populate DV Done
20,799,344 UART: [fht] FMC Alias Private Key: 7
20,800,891 UART: [art] Derive CDI
20,801,660 UART: [art] Store in in slot 0x4
20,859,247 UART: [art] Derive Key Pair
20,860,247 UART: [art] Store priv key in slot 0x5
23,322,722 UART: [art] Derive Key Pair - Done
23,335,710 UART: [art] Signing Cert with AUTHO
23,337,008 UART: RITY.KEYID = 7
25,048,240 UART: [art] Erasing AUTHORITY.KEYID = 7
25,049,749 UART: [art] PUB.X = 9F3817DEB0048C26D17B56704AF61CAD8D471EE541ED350E7F8CFCB8F220CD6C3E6075EF55B440DF336883A55CCE1FED
25,056,997 UART: [art] PUB.Y = 9F4B7F7ADFFF57A18EA2A01105593D2B452C8BEE4697BF753033FB43E11BF6EAA2A74FA78B0BB9CAB53B3B8C2BFC97BC
25,064,329 UART: [art] SIG.R = E12C4644C091322FBD75733CCE16DAF7F7ABFEFCB521825F7F7BCD908F2FEB5269F1F086F1DB79A727D47F2E34E03ED6
25,071,711 UART: [art] SIG.S = 6F336D018D3B52431344FB73954E79A435CEB72B7DB1121BF3EAC6B9431A8964E3503E8669A6F54E19B5383A2842B711
26,050,158 UART: Caliptra RT
26,050,847 UART: [state] CFI Enabled
26,215,749 UART: [rt] RT listening for mailbox commands...
26,217,588 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,247,970 UART: [rt]cmd =0x49444352, len=4
26,249,572 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,440,270 ready_for_fw is high
3,440,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,553 >>> mbox cmd response: success
19,045,981 UART:
19,046,356 UART: Running Caliptra FMC ...
19,047,467 UART:
19,047,625 UART: [state] CFI Enabled
19,112,811 UART: [fht] FMC Alias Private Key: 7
20,876,659 UART: [art] Extend RT PCRs Done
20,877,870 UART: [art] Lock RT PCRs Done
20,879,953 UART: [art] Populate DV Done
20,885,252 UART: [fht] FMC Alias Private Key: 7
20,886,951 UART: [art] Derive CDI
20,887,691 UART: [art] Store in in slot 0x4
20,945,115 UART: [art] Derive Key Pair
20,946,155 UART: [art] Store priv key in slot 0x5
23,408,829 UART: [art] Derive Key Pair - Done
23,421,630 UART: [art] Signing Cert with AUTHO
23,422,938 UART: RITY.KEYID = 7
25,133,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,772 UART: [art] PUB.X = 4E7C70C30A84289DA9D62D77E63E77DF04BD3401CE7BFBC9D2A024B8E21B2AF4AFD8CE8658B4A6EA83A718786B34B9FB
25,142,648 UART: [art] PUB.Y = E017A957F172D317C6592A2330BFF0701510A2E4DD7FFD6CD901687513A2CD5074553EE9F8A58F7F7B2C650E5A720CFF
25,149,902 UART: [art] SIG.R = 65DAF8E3CCDD22527D979F55D995EBB6ED4AF45256B921CD8BE48B0597422884CDB6C512D8066B5AA3360B9010DAF258
25,157,291 UART: [art] SIG.S = 61A9373FB815A3B5F1FCD16238501E5F6324BECB52D142830BB96FA473F5CB41841A162D1CCCEE904927FADEDC0221BC
26,135,433 UART: Caliptra RT
26,136,128 UART: [state] CFI Enabled
26,299,573 UART: [rt] RT listening for mailbox commands...
26,301,403 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,331,878 UART: [rt]cmd =0x49444352, len=4
26,333,408 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,632 UART:
192,996 UART: Running Caliptra ROM ...
194,092 UART:
603,629 UART: [state] CFI Enabled
618,005 UART: [state] LifecycleState = Unprovisioned
620,427 UART: [state] DebugLocked = No
622,229 UART: [state] WD Timer not started. Device not locked for debugging
626,043 UART: [kat] SHA2-256
815,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,661 UART: [kat] ++
827,260 UART: [kat] sha1
838,490 UART: [kat] SHA2-256
841,488 UART: [kat] SHA2-384
846,473 UART: [kat] SHA2-512-ACC
849,047 UART: [kat] ECC-384
3,291,437 UART: [kat] HMAC-384Kdf
3,304,830 UART: [kat] LMS
3,836,666 UART: [kat] --
3,840,181 UART: [cold-reset] ++
3,842,179 UART: [fht] FHT @ 0x50003400
3,855,420 UART: [idev] ++
3,856,148 UART: [idev] CDI.KEYID = 6
3,857,069 UART: [idev] SUBJECT.KEYID = 7
3,858,237 UART: [idev] UDS.KEYID = 0
3,859,156 ready_for_fw is high
3,859,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,107 UART: [idev] Erasing UDS.KEYID = 0
6,332,767 UART: [idev] Sha1 KeyId Algorithm
6,355,478 UART: [idev] --
6,360,606 UART: [ldev] ++
6,361,278 UART: [ldev] CDI.KEYID = 6
6,362,151 UART: [ldev] SUBJECT.KEYID = 5
6,363,355 UART: [ldev] AUTHORITY.KEYID = 7
6,364,576 UART: [ldev] FE.KEYID = 1
6,375,030 UART: [ldev] Erasing FE.KEYID = 1
8,851,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,682 UART: [ldev] --
10,643,346 UART: [fwproc] Wait for Commands...
10,645,157 UART: [fwproc] Recv command 0x46574c44
10,647,455 UART: [fwproc] Recv'd Img size: 114448 bytes
14,090,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,824,485 >>> mbox cmd response: success
14,829,425 UART: [afmc] ++
14,830,126 UART: [afmc] CDI.KEYID = 6
14,831,231 UART: [afmc] SUBJECT.KEYID = 7
14,832,773 UART: [afmc] AUTHORITY.KEYID = 5
17,331,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,069,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,085,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,100,136 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,983 UART: [afmc] --
19,126,930 UART: [cold-reset] --
19,130,140 UART: [state] Locking Datavault
19,137,118 UART: [state] Locking PCR0, PCR1 and PCR31
19,139,257 UART: [state] Locking ICCM
19,140,652 UART: [exit] Launching FMC @ 0x40000130
19,149,330 UART:
19,149,559 UART: Running Caliptra FMC ...
19,150,653 UART:
19,150,803 UART: [state] CFI Enabled
19,159,056 UART: [fht] FMC Alias Private Key: 7
20,915,659 UART: [art] Extend RT PCRs Done
20,916,880 UART: [art] Lock RT PCRs Done
20,918,682 UART: [art] Populate DV Done
20,924,086 UART: [fht] FMC Alias Private Key: 7
20,925,615 UART: [art] Derive CDI
20,926,340 UART: [art] Store in in slot 0x4
20,969,085 UART: [art] Derive Key Pair
20,970,116 UART: [art] Store priv key in slot 0x5
23,396,865 UART: [art] Derive Key Pair - Done
23,409,862 UART: [art] Signing Cert with AUTHO
23,411,163 UART: RITY.KEYID = 7
25,116,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,977 UART: [art] PUB.X = 36F62C198118A24C411135301993585D9E35426028CA817DC5BDB42B8BE6538B6355BA5A1AD22FD92E7BAA6CBBD255E4
25,125,248 UART: [art] PUB.Y = CC21E3EA166374BE4E2379DAAC0A5F01F48C01A3D1D58C30977C57DEFC554E8D1DDA6C29CC531F5F9910AC24107FC963
25,132,512 UART: [art] SIG.R = BA6C1AE5D53813871BD74B3637ABBBB8FA67E8A7C974DCB6A24C48F3C9349AE0E8C3F2806B2553B2841329692269C620
25,139,883 UART: [art] SIG.S = FD44ACC3E09FAC0AF5CE5CAAEF2F679269EDB393CA57B1A1FE6247DB50B14E5A76CC50540AC482BE72E5D43A43DE604E
26,118,439 UART: Caliptra RT
26,119,127 UART: [state] CFI Enabled
26,236,453 UART: [rt] RT listening for mailbox commands...
26,238,291 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,268,049 UART: [rt]cmd =0x49444352, len=4
26,269,877 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,757,088 ready_for_fw is high
3,757,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,253 >>> mbox cmd response: success
19,212,699 UART:
19,213,091 UART: Running Caliptra FMC ...
19,214,192 UART:
19,214,336 UART: [state] CFI Enabled
19,222,340 UART: [fht] FMC Alias Private Key: 7
20,979,324 UART: [art] Extend RT PCRs Done
20,980,550 UART: [art] Lock RT PCRs Done
20,982,197 UART: [art] Populate DV Done
20,987,385 UART: [fht] FMC Alias Private Key: 7
20,989,079 UART: [art] Derive CDI
20,989,815 UART: [art] Store in in slot 0x4
21,031,972 UART: [art] Derive Key Pair
21,033,015 UART: [art] Store priv key in slot 0x5
23,459,692 UART: [art] Derive Key Pair - Done
23,472,639 UART: [art] Signing Cert with AUTHO
23,473,944 UART: RITY.KEYID = 7
25,179,798 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,304 UART: [art] PUB.X = B7389E52B8A787A72D23B65218A9FBF87F8C9FF77D50D0D1EAB83E4FE27FE0C8A1FD5ADACAF34CB27BA48ED86D436A57
25,188,589 UART: [art] PUB.Y = A45E9252757D99685D5B5DE0AF3C75C32595318A73B9258D945A83DF33F07A53FC1033CBD021C3A78423889776F88D9F
25,195,811 UART: [art] SIG.R = 07D0581E50BAA927D58C792A7FA4D6FEA54E139F1EF370BB702EBE47DD272E072D6BB15DA3CE175F53A921D6A38E0199
25,203,232 UART: [art] SIG.S = 402EFAE4E4BDBD2409E0933F1C2819FA463401B8E6089FBAEAAF2BA726B3A6327E5691CC74A25A1A93B144E29899FD7F
26,182,054 UART: Caliptra RT
26,182,772 UART: [state] CFI Enabled
26,299,634 UART: [rt] RT listening for mailbox commands...
26,301,485 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,331,433 UART: [rt]cmd =0x49444352, len=4
26,333,203 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,477,097 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 ready_for_fw is high
1,480,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,576 UART: [idev] --
1,514,537 UART: [ldev] ++
1,514,705 UART: [ldev] CDI.KEYID = 6
1,515,068 UART: [ldev] SUBJECT.KEYID = 5
1,515,494 UART: [ldev] AUTHORITY.KEYID = 7
1,515,957 UART: [ldev] FE.KEYID = 1
1,520,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,270 UART: [ldev] --
1,585,629 UART: [fwproc] Waiting for Commands...
1,586,382 UART: [fwproc] Received command 0x46574c44
1,587,173 UART: [fwproc] Received Image of size 114448 bytes
2,887,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,523 >>> mbox cmd response: success
3,081,631 UART: [afmc] ++
3,081,799 UART: [afmc] CDI.KEYID = 6
3,082,161 UART: [afmc] SUBJECT.KEYID = 7
3,082,586 UART: [afmc] AUTHORITY.KEYID = 5
3,117,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,516 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,206 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,101 UART: [afmc] --
3,161,083 UART: [cold-reset] --
3,161,861 UART: [state] Locking Datavault
3,163,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,632 UART: [state] Locking ICCM
3,164,130 UART: [exit] Launching FMC @ 0x40000130
3,169,459 UART:
3,169,475 UART: Running Caliptra FMC ...
3,169,883 UART:
3,169,937 UART: [state] CFI Enabled
3,180,822 UART: [fht] FMC Alias Private Key: 7
3,289,177 UART: [art] Extend RT PCRs Done
3,289,605 UART: [art] Lock RT PCRs Done
3,291,379 UART: [art] Populate DV Done
3,299,434 UART: [fht] FMC Alias Private Key: 7
3,300,608 UART: [art] Derive CDI
3,300,888 UART: [art] Store in in slot 0x4
3,386,773 UART: [art] Derive Key Pair
3,387,133 UART: [art] Store priv key in slot 0x5
3,400,423 UART: [art] Derive Key Pair - Done
3,414,943 UART: [art] Signing Cert with AUTHO
3,415,423 UART: RITY.KEYID = 7
3,430,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,142 UART: [art] PUB.X = 4FCD23B57E6C44570A79BB5B7911B6706D796307854CB0CDDA59ACFC1E6A384AC446AB19E76677E8D5C2E233F9B8DDAC
3,437,922 UART: [art] PUB.Y = 2EA5667E2E412AF7A5C55FB4E285631931EBA7E6E9713AA9280C7389DE4770F551B48236F2E69FEEA95BFD682C5129F8
3,444,875 UART: [art] SIG.R = F4CD041F4CCB0CC3E8C63371526221727C8A20B1209AB62FB571B42394ECC07F9AFC053A4BEE53B76F079BE3AE5C7F0F
3,451,646 UART: [art] SIG.S = BB17D42FD12D6F0752F956D8B48A4369A8192AC670BF1AE38A5F1CF390E734586DA199FB8365E257A3E7F7E7F1B009EC
3,476,003 UART: Caliptra RT
3,476,256 UART: [state] CFI Enabled
3,583,346 UART: [rt] RT listening for mailbox commands...
3,584,016 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,778 UART: [rt]cmd =0x49444352, len=4
3,614,906 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,655 >>> mbox cmd response: success
2,991,089 UART:
2,991,105 UART: Running Caliptra FMC ...
2,991,513 UART:
2,991,567 UART: [state] CFI Enabled
3,002,114 UART: [fht] FMC Alias Private Key: 7
3,110,533 UART: [art] Extend RT PCRs Done
3,110,961 UART: [art] Lock RT PCRs Done
3,112,895 UART: [art] Populate DV Done
3,121,502 UART: [fht] FMC Alias Private Key: 7
3,122,598 UART: [art] Derive CDI
3,122,878 UART: [art] Store in in slot 0x4
3,208,361 UART: [art] Derive Key Pair
3,208,721 UART: [art] Store priv key in slot 0x5
3,221,933 UART: [art] Derive Key Pair - Done
3,236,396 UART: [art] Signing Cert with AUTHO
3,236,876 UART: RITY.KEYID = 7
3,252,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,843 UART: [art] PUB.X = DCF9DA9F36C1F12D1FD7A53575A97221133E9FE490D71935A81740305DBCBB1FA84A1A400BF0A84FD25969B51DA44DE7
3,259,622 UART: [art] PUB.Y = 305C533A37A8EEB4C89833B602E322E9CEAC5EF1891392DF3E84EAE29BF288C4C7A09BBDFA794B82C18E6F75B7BDF810
3,266,587 UART: [art] SIG.R = C4EF737B7F13B776213D1E9171616D76368F5A219BA6279195481F9F76835C13CCA4E4F4C5C8D15E7A884E4247351295
3,273,349 UART: [art] SIG.S = 0E89A850AB4DED46E3D9FAF1469296AAFF608A9A4056F467EBE278775393B2BA3F00F5334CFF3A0F74B8C2ADF0B744A5
3,297,084 UART: Caliptra RT
3,297,337 UART: [state] CFI Enabled
3,405,000 UART: [rt] RT listening for mailbox commands...
3,405,670 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,434 UART: [rt]cmd =0x49444352, len=4
3,436,756 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,185 UART: [kat] SHA2-512-ACC
897,086 UART: [kat] ECC-384
902,715 UART: [kat] HMAC-384Kdf
907,343 UART: [kat] LMS
1,475,539 UART: [kat] --
1,476,188 UART: [cold-reset] ++
1,476,548 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 ready_for_fw is high
1,480,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,001 UART: [idev] Erasing UDS.KEYID = 0
1,504,697 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,509 UART: [idev] --
1,514,632 UART: [ldev] ++
1,514,800 UART: [ldev] CDI.KEYID = 6
1,515,163 UART: [ldev] SUBJECT.KEYID = 5
1,515,589 UART: [ldev] AUTHORITY.KEYID = 7
1,516,052 UART: [ldev] FE.KEYID = 1
1,521,440 UART: [ldev] Erasing FE.KEYID = 1
1,546,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,592 UART: [fwproc] Waiting for Commands...
1,587,237 UART: [fwproc] Received command 0x46574c44
1,588,028 UART: [fwproc] Received Image of size 114448 bytes
2,887,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,700 >>> mbox cmd response: success
3,079,934 UART: [afmc] ++
3,080,102 UART: [afmc] CDI.KEYID = 6
3,080,464 UART: [afmc] SUBJECT.KEYID = 7
3,080,889 UART: [afmc] AUTHORITY.KEYID = 5
3,115,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,585 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,275 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,176 UART: [afmc] --
3,159,262 UART: [cold-reset] --
3,160,020 UART: [state] Locking Datavault
3,161,229 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,833 UART: [state] Locking ICCM
3,162,505 UART: [exit] Launching FMC @ 0x40000130
3,167,834 UART:
3,167,850 UART: Running Caliptra FMC ...
3,168,258 UART:
3,168,401 UART: [state] CFI Enabled
3,178,668 UART: [fht] FMC Alias Private Key: 7
3,286,003 UART: [art] Extend RT PCRs Done
3,286,431 UART: [art] Lock RT PCRs Done
3,287,881 UART: [art] Populate DV Done
3,296,238 UART: [fht] FMC Alias Private Key: 7
3,297,264 UART: [art] Derive CDI
3,297,544 UART: [art] Store in in slot 0x4
3,383,083 UART: [art] Derive Key Pair
3,383,443 UART: [art] Store priv key in slot 0x5
3,396,845 UART: [art] Derive Key Pair - Done
3,411,675 UART: [art] Signing Cert with AUTHO
3,412,155 UART: RITY.KEYID = 7
3,427,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,166 UART: [art] PUB.X = 988403B478713F9A578D96F30397FD626B3F4884F77467813B4F48DFC6D60195B53B19568B6928A8940E56E3C9AF7A9A
3,434,916 UART: [art] PUB.Y = F2B176102FAECC6ECF17F1E4AE163575A9C3C8B144B06B44B756E478EE651653B92F510A7E1C9B93497CB1EAF975471D
3,441,873 UART: [art] SIG.R = C0F5A9FE9CEC4B8D7218AE8811E991490414D58FE3501A2B45C78CC22317C3E43F14F3AC2A353AD021072B9E23B83F37
3,448,643 UART: [art] SIG.S = E2E6AF34DE4D6B61A98E661A0841AA73C5DE134C48D3005F0F3FCA7EEEAB60F4F53A296A5EBBA11C36DCC27BB23DA464
3,472,654 UART: Caliptra RT
3,472,999 UART: [state] CFI Enabled
3,581,421 UART: [rt] RT listening for mailbox commands...
3,582,091 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,049 UART: [rt]cmd =0x49444352, len=4
3,613,257 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 ready_for_fw is high
1,362,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,942 >>> mbox cmd response: success
2,994,390 UART:
2,994,406 UART: Running Caliptra FMC ...
2,994,814 UART:
2,994,957 UART: [state] CFI Enabled
3,005,702 UART: [fht] FMC Alias Private Key: 7
3,113,647 UART: [art] Extend RT PCRs Done
3,114,075 UART: [art] Lock RT PCRs Done
3,115,843 UART: [art] Populate DV Done
3,123,918 UART: [fht] FMC Alias Private Key: 7
3,125,002 UART: [art] Derive CDI
3,125,282 UART: [art] Store in in slot 0x4
3,210,805 UART: [art] Derive Key Pair
3,211,165 UART: [art] Store priv key in slot 0x5
3,224,829 UART: [art] Derive Key Pair - Done
3,239,442 UART: [art] Signing Cert with AUTHO
3,239,922 UART: RITY.KEYID = 7
3,255,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,815 UART: [art] PUB.X = 5C6CEC0B1AAC156F761DF6C6A3AFF2689F7D2E44BAB797DFCC1CDCA0D1ED14B86936B2A8FF35D2A532CF9DC3A91A46DB
3,262,616 UART: [art] PUB.Y = B61B219DAC37C4214D6F88AB7E4D0F549595CE9470641302D6EF834E6AEFC68537FE8712AD4F17CC7CF24D4F9DA79D16
3,269,572 UART: [art] SIG.R = 109158596ECB709F8712B0D3634BCE930DC21DF79F794D5EF828C372FFC17A4B9A4131A2855CFAB289619C0235B33A9C
3,276,340 UART: [art] SIG.S = AC13774CEBAFDD4E950E29324F75DDB69F892C0BB69933F30360429E175B04BB0B32B27EC6737B7178AC0ECEAE45CCDA
3,300,129 UART: Caliptra RT
3,300,474 UART: [state] CFI Enabled
3,408,861 UART: [rt] RT listening for mailbox commands...
3,409,531 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,553 UART: [rt]cmd =0x49444352, len=4
3,440,707 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
893,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,833 UART: [kat] ++
897,985 UART: [kat] sha1
902,185 UART: [kat] SHA2-256
904,125 UART: [kat] SHA2-384
906,984 UART: [kat] SHA2-512-ACC
908,885 UART: [kat] ECC-384
918,652 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,167 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 ready_for_fw is high
1,176,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,200 UART: [idev] Erasing UDS.KEYID = 0
1,201,323 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,957 UART: [ldev] ++
1,211,125 UART: [ldev] CDI.KEYID = 6
1,211,488 UART: [ldev] SUBJECT.KEYID = 5
1,211,914 UART: [ldev] AUTHORITY.KEYID = 7
1,212,377 UART: [ldev] FE.KEYID = 1
1,217,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,877 UART: [ldev] --
1,283,144 UART: [fwproc] Wait for Commands...
1,283,792 UART: [fwproc] Recv command 0x46574c44
1,284,520 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,158 >>> mbox cmd response: success
2,776,382 UART: [afmc] ++
2,776,550 UART: [afmc] CDI.KEYID = 6
2,776,912 UART: [afmc] SUBJECT.KEYID = 7
2,777,337 UART: [afmc] AUTHORITY.KEYID = 5
2,812,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,735 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,621 UART: [afmc] --
2,855,529 UART: [cold-reset] --
2,856,471 UART: [state] Locking Datavault
2,857,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,066 UART: [state] Locking ICCM
2,858,714 UART: [exit] Launching FMC @ 0x40000130
2,864,043 UART:
2,864,059 UART: Running Caliptra FMC ...
2,864,467 UART:
2,864,521 UART: [state] CFI Enabled
2,875,006 UART: [fht] FMC Alias Private Key: 7
2,983,135 UART: [art] Extend RT PCRs Done
2,983,563 UART: [art] Lock RT PCRs Done
2,985,191 UART: [art] Populate DV Done
2,993,152 UART: [fht] FMC Alias Private Key: 7
2,994,092 UART: [art] Derive CDI
2,994,372 UART: [art] Store in in slot 0x4
3,080,161 UART: [art] Derive Key Pair
3,080,521 UART: [art] Store priv key in slot 0x5
3,094,033 UART: [art] Derive Key Pair - Done
3,108,992 UART: [art] Signing Cert with AUTHO
3,109,472 UART: RITY.KEYID = 7
3,124,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,645 UART: [art] PUB.X = 84CDBBE9F1B4F5CBF1C74F58B0BF5AFD8BD842B83D289416F6EE8254D8CF2D7CF49F8127E441FAB37EC854BB71B29C4E
3,132,441 UART: [art] PUB.Y = FA2A8BF0C338B05F972253B26F3E9C04F3C889E3A6888003EC94C15DBBFA2C79160922E861ED10D8B3BC588F7EEB6D80
3,139,394 UART: [art] SIG.R = 6B41D5E8B9F24971326E0325159887E273230D62812FBADF05C8051D1D7259863A7CC354F2B555E1AADCA549D9344AA5
3,146,150 UART: [art] SIG.S = 47DE5BDF8E2DDDA16372BBE3AA9AC2730F78C63EB8AE8481EC7F2A99B7D2F550B5CDCFBB7FC7C23D1BEC8DFA1143A24A
3,170,170 UART: Caliptra RT
3,170,423 UART: [state] CFI Enabled
3,277,658 UART: [rt] RT listening for mailbox commands...
3,278,328 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,196 UART: [rt]cmd =0x49444352, len=4
3,310,028 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 ready_for_fw is high
1,060,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,905 >>> mbox cmd response: success
2,690,005 UART:
2,690,021 UART: Running Caliptra FMC ...
2,690,429 UART:
2,690,483 UART: [state] CFI Enabled
2,701,020 UART: [fht] FMC Alias Private Key: 7
2,808,701 UART: [art] Extend RT PCRs Done
2,809,129 UART: [art] Lock RT PCRs Done
2,810,669 UART: [art] Populate DV Done
2,818,868 UART: [fht] FMC Alias Private Key: 7
2,819,862 UART: [art] Derive CDI
2,820,142 UART: [art] Store in in slot 0x4
2,905,815 UART: [art] Derive Key Pair
2,906,175 UART: [art] Store priv key in slot 0x5
2,919,163 UART: [art] Derive Key Pair - Done
2,934,017 UART: [art] Signing Cert with AUTHO
2,934,497 UART: RITY.KEYID = 7
2,949,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,706 UART: [art] PUB.X = A59EB64475DFE65F6B7667ABC3B35BE4A40B387291BE279F6428D27B2C2F101BE5EC517C0159E9629E739B69F5B9DA28
2,957,478 UART: [art] PUB.Y = 38FEF2EEA8169B625AA89C2E8F558FC9B53660D434EB14FAC453471533CB56DAE89020C3FF7A510A75A1CF236447ACC8
2,964,437 UART: [art] SIG.R = 60B20F2945CAF8A80D5CFB5D21C01B2612C91858655BF00897D40A29D693F20AB37946A29C097EF82C11A24DED7CE780
2,971,193 UART: [art] SIG.S = 8AC2FCBDB68D3DA98891F149B91D05D71EED4441F5CD289BAABCE7827E845DE2307985285C6F9D6D9E78945B0B12155E
2,994,692 UART: Caliptra RT
2,994,945 UART: [state] CFI Enabled
3,102,144 UART: [rt] RT listening for mailbox commands...
3,102,814 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,614 UART: [rt]cmd =0x49444352, len=4
3,134,186 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,216 UART: [state] WD Timer not started. Device not locked for debugging
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,698 UART: [kat] SHA2-256
904,638 UART: [kat] SHA2-384
907,223 UART: [kat] SHA2-512-ACC
909,124 UART: [kat] ECC-384
919,397 UART: [kat] HMAC-384Kdf
924,149 UART: [kat] LMS
1,172,477 UART: [kat] --
1,173,652 UART: [cold-reset] ++
1,174,080 UART: [fht] FHT @ 0x50003400
1,176,705 UART: [idev] ++
1,176,873 UART: [idev] CDI.KEYID = 6
1,177,233 UART: [idev] SUBJECT.KEYID = 7
1,177,657 UART: [idev] UDS.KEYID = 0
1,178,002 ready_for_fw is high
1,178,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,939 UART: [idev] Erasing UDS.KEYID = 0
1,202,850 UART: [idev] Sha1 KeyId Algorithm
1,211,334 UART: [idev] --
1,212,388 UART: [ldev] ++
1,212,556 UART: [ldev] CDI.KEYID = 6
1,212,919 UART: [ldev] SUBJECT.KEYID = 5
1,213,345 UART: [ldev] AUTHORITY.KEYID = 7
1,213,808 UART: [ldev] FE.KEYID = 1
1,219,284 UART: [ldev] Erasing FE.KEYID = 1
1,245,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,420 UART: [ldev] --
1,284,895 UART: [fwproc] Wait for Commands...
1,285,711 UART: [fwproc] Recv command 0x46574c44
1,286,439 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,409 >>> mbox cmd response: success
2,778,657 UART: [afmc] ++
2,778,825 UART: [afmc] CDI.KEYID = 6
2,779,187 UART: [afmc] SUBJECT.KEYID = 7
2,779,612 UART: [afmc] AUTHORITY.KEYID = 5
2,814,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,032 UART: [afmc] --
2,858,102 UART: [cold-reset] --
2,858,706 UART: [state] Locking Datavault
2,859,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,559 UART: [state] Locking ICCM
2,861,193 UART: [exit] Launching FMC @ 0x40000130
2,866,522 UART:
2,866,538 UART: Running Caliptra FMC ...
2,866,946 UART:
2,867,089 UART: [state] CFI Enabled
2,877,668 UART: [fht] FMC Alias Private Key: 7
2,985,427 UART: [art] Extend RT PCRs Done
2,985,855 UART: [art] Lock RT PCRs Done
2,987,613 UART: [art] Populate DV Done
2,995,922 UART: [fht] FMC Alias Private Key: 7
2,997,004 UART: [art] Derive CDI
2,997,284 UART: [art] Store in in slot 0x4
3,082,753 UART: [art] Derive Key Pair
3,083,113 UART: [art] Store priv key in slot 0x5
3,095,899 UART: [art] Derive Key Pair - Done
3,111,040 UART: [art] Signing Cert with AUTHO
3,111,520 UART: RITY.KEYID = 7
3,126,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,565 UART: [art] PUB.X = D9F281818C293DC2DC22DDCF05F8C4A9A5097C1F4D0215D3966E833A85F3D72AC3F92ECF7068FF0579C0E178C0908C1A
3,134,333 UART: [art] PUB.Y = 5D9ACFDC46EC663A4A076A852091497C5F0524144B7C8053DC8C83975C9F3A5D5E3ACDB42EF028DEC633AC279D7070DC
3,141,289 UART: [art] SIG.R = 8F96AE6E91677D5B0722E02208A79DD84DC701B8E9EC1F2B6D3DD62BDEC917F2F01A7D084B6D1C98BBF2862932DDBEC2
3,148,065 UART: [art] SIG.S = FF09788AAD190FB1AC80DE9733005835F80B442B71A0FC59D23A63DD979E17A5D465994C9F19B273BBD37157C2A63B9C
3,172,081 UART: Caliptra RT
3,172,426 UART: [state] CFI Enabled
3,279,986 UART: [rt] RT listening for mailbox commands...
3,280,656 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,522 UART: [rt]cmd =0x49444352, len=4
3,311,994 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 ready_for_fw is high
1,060,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,954 >>> mbox cmd response: success
2,692,362 UART:
2,692,378 UART: Running Caliptra FMC ...
2,692,786 UART:
2,692,929 UART: [state] CFI Enabled
2,703,808 UART: [fht] FMC Alias Private Key: 7
2,811,683 UART: [art] Extend RT PCRs Done
2,812,111 UART: [art] Lock RT PCRs Done
2,813,575 UART: [art] Populate DV Done
2,821,846 UART: [fht] FMC Alias Private Key: 7
2,822,804 UART: [art] Derive CDI
2,823,084 UART: [art] Store in in slot 0x4
2,908,951 UART: [art] Derive Key Pair
2,909,311 UART: [art] Store priv key in slot 0x5
2,922,559 UART: [art] Derive Key Pair - Done
2,937,553 UART: [art] Signing Cert with AUTHO
2,938,033 UART: RITY.KEYID = 7
2,953,565 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,330 UART: [art] PUB.X = 671CF85432DE9CCEA9B559D5441589A1A319894D47EACE92D89C83F32612F10C17FAD0708B7BCDF9250E8CEF26260594
2,961,097 UART: [art] PUB.Y = A274419C87642EEA0E6E69EB414E6BDBE6A46A0C6724D8A790DAFE0CD4260F76294E1C9FD9C7852A8434A2C9C65485C3
2,968,045 UART: [art] SIG.R = 5C588F80C77A3AFC18A2D35ECBBFD9C7EB684DED18DC5EDADDD21AE623EC5AD260D22F1D91EA471700FC27223887DBEF
2,974,823 UART: [art] SIG.S = BFB09D3DE3F14AA1F27798DCD9C1CCF2095376268EF2D56A70E7F913E87B5A1079AD76B6B3EEABCD530E7C20EE839AD3
2,998,642 UART: Caliptra RT
2,998,987 UART: [state] CFI Enabled
3,106,056 UART: [rt] RT listening for mailbox commands...
3,106,726 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,390 UART: [rt]cmd =0x49444352, len=4
3,137,862 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
920,000 UART: [kat] LMS
1,168,312 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 ready_for_fw is high
1,173,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,119 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,214,498 UART: [ldev] Erasing FE.KEYID = 1
1,240,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,782 UART: [ldev] --
1,279,154 UART: [fwproc] Wait for Commands...
1,279,959 UART: [fwproc] Recv command 0x46574c44
1,280,692 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,444 >>> mbox cmd response: success
2,774,699 UART: [afmc] ++
2,774,867 UART: [afmc] CDI.KEYID = 6
2,775,230 UART: [afmc] SUBJECT.KEYID = 7
2,775,656 UART: [afmc] AUTHORITY.KEYID = 5
2,811,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,222 UART: [afmc] --
2,854,308 UART: [cold-reset] --
2,855,276 UART: [state] Locking Datavault
2,856,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,169 UART: [state] Locking ICCM
2,857,743 UART: [exit] Launching FMC @ 0x40000130
2,863,072 UART:
2,863,088 UART: Running Caliptra FMC ...
2,863,496 UART:
2,863,550 UART: [state] CFI Enabled
2,874,025 UART: [fht] FMC Alias Private Key: 7
2,982,384 UART: [art] Extend RT PCRs Done
2,982,812 UART: [art] Lock RT PCRs Done
2,984,646 UART: [art] Populate DV Done
2,992,807 UART: [fht] FMC Alias Private Key: 7
2,993,799 UART: [art] Derive CDI
2,994,079 UART: [art] Store in in slot 0x4
3,079,648 UART: [art] Derive Key Pair
3,080,008 UART: [art] Store priv key in slot 0x5
3,093,374 UART: [art] Derive Key Pair - Done
3,107,704 UART: [art] Signing Cert with AUTHO
3,108,184 UART: RITY.KEYID = 7
3,123,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,031 UART: [art] PUB.X = FE4394456D228328B0BD1C11454D9EE8AF0DBA45C64B45742A5AD9531ED1211C7314A30D14F61D5B020C213D8BDA11A2
3,130,795 UART: [art] PUB.Y = 338D208A5ECFF990EEA35D84F7850EC5B4CE95C9E89F0CCB5017509D07F2ACEF8C6D324412D25A16462F3104081C6C56
3,137,738 UART: [art] SIG.R = 1AB6F9D11B1139F5F49CF57BD08C18E5A46FBA212B0B12CC402B53C2AEEA7218F4D95CD73C661C541C3F9BA2940E8E67
3,144,518 UART: [art] SIG.S = 4273566524E838C7A15C69C210D0463E3BDDDBB8BC0BBC0262D7C46A50060D8CF92E3FC5A796175E3BD5C12F293B0BA1
3,168,204 UART: Caliptra RT
3,168,457 UART: [state] CFI Enabled
3,275,790 UART: [rt] RT listening for mailbox commands...
3,276,460 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,468 UART: [rt]cmd =0x49444352, len=4
3,307,870 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,238 ready_for_fw is high
1,056,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,844 >>> mbox cmd response: success
2,685,026 UART:
2,685,042 UART: Running Caliptra FMC ...
2,685,450 UART:
2,685,504 UART: [state] CFI Enabled
2,695,691 UART: [fht] FMC Alias Private Key: 7
2,803,284 UART: [art] Extend RT PCRs Done
2,803,712 UART: [art] Lock RT PCRs Done
2,805,232 UART: [art] Populate DV Done
2,813,305 UART: [fht] FMC Alias Private Key: 7
2,814,487 UART: [art] Derive CDI
2,814,767 UART: [art] Store in in slot 0x4
2,900,562 UART: [art] Derive Key Pair
2,900,922 UART: [art] Store priv key in slot 0x5
2,913,912 UART: [art] Derive Key Pair - Done
2,928,943 UART: [art] Signing Cert with AUTHO
2,929,423 UART: RITY.KEYID = 7
2,944,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,974 UART: [art] PUB.X = 6F9B5054EC9E2082FED9A71593B0FB101B41D528E933B431E5B294E31C26D747139716D9ED2536EC4851F66AA7A79698
2,951,742 UART: [art] PUB.Y = 1C38F8D4861C5D4B4FA1AAB96A8F3397E32967FF638AFFBDDA6CCAFA0AD8EFEB9347F80818548E6B021EA571562731ED
2,958,703 UART: [art] SIG.R = B7B7828B00F0916DDB3D1D7B80EFA8C67CF4AE950C76A889048557FCB36C57BC0B10738D71F7016E8547EEF0FA74E9DD
2,965,453 UART: [art] SIG.S = 4CAB52B40EB3E4EEEC8B3792CAF634BD44557DAF2F1DE45893B16051804060FB11FE121A5E33F15065745B7E42AF6BB7
2,989,697 UART: Caliptra RT
2,989,950 UART: [state] CFI Enabled
3,097,115 UART: [rt] RT listening for mailbox commands...
3,097,785 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,635 UART: [rt]cmd =0x49444352, len=4
3,128,807 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
891,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,978 UART: [kat] ++
896,130 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
905,065 UART: [kat] SHA2-512-ACC
906,966 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 ready_for_fw is high
1,174,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,392 UART: [fwproc] Recv command 0x46574c44
1,283,125 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,389 >>> mbox cmd response: success
2,774,588 UART: [afmc] ++
2,774,756 UART: [afmc] CDI.KEYID = 6
2,775,119 UART: [afmc] SUBJECT.KEYID = 7
2,775,545 UART: [afmc] AUTHORITY.KEYID = 5
2,811,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,067 UART: [afmc] --
2,854,947 UART: [cold-reset] --
2,855,855 UART: [state] Locking Datavault
2,857,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,786 UART: [state] Locking ICCM
2,858,452 UART: [exit] Launching FMC @ 0x40000130
2,863,781 UART:
2,863,797 UART: Running Caliptra FMC ...
2,864,205 UART:
2,864,348 UART: [state] CFI Enabled
2,874,755 UART: [fht] FMC Alias Private Key: 7
2,982,630 UART: [art] Extend RT PCRs Done
2,983,058 UART: [art] Lock RT PCRs Done
2,984,742 UART: [art] Populate DV Done
2,993,067 UART: [fht] FMC Alias Private Key: 7
2,994,057 UART: [art] Derive CDI
2,994,337 UART: [art] Store in in slot 0x4
3,079,802 UART: [art] Derive Key Pair
3,080,162 UART: [art] Store priv key in slot 0x5
3,093,994 UART: [art] Derive Key Pair - Done
3,108,669 UART: [art] Signing Cert with AUTHO
3,109,149 UART: RITY.KEYID = 7
3,124,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,226 UART: [art] PUB.X = 9D25FBDE0A7476F17761BD7CD41E35409D5F30E1C41E09631EE5417DDA96B1BB06700CBD853DAED7FC0425C961F07298
3,131,991 UART: [art] PUB.Y = C9C707BECACD4E55D3AD14951C51CFAA008892F88831EA32EE37BED3E55C5613FB6F2FFF4F7EA4ACAB7C200ABC1688D6
3,138,941 UART: [art] SIG.R = C9C17E94CF45E1126F3B80BAB5F9297F5102E2E395CE1757810CA2D37989A4ACB31A7BA369522CC8D36EE2A91D2F7A62
3,145,715 UART: [art] SIG.S = 00731E3862594731BA32FEFE4CE4E82401C4CB0165A1C8AE9FBD17FA0D4540F77D725F91911C362181F01457A20D856C
3,169,640 UART: Caliptra RT
3,169,985 UART: [state] CFI Enabled
3,277,465 UART: [rt] RT listening for mailbox commands...
3,278,135 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,213 UART: [rt]cmd =0x49444352, len=4
3,309,721 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,447 ready_for_fw is high
1,056,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,221 >>> mbox cmd response: success
2,688,073 UART:
2,688,089 UART: Running Caliptra FMC ...
2,688,497 UART:
2,688,640 UART: [state] CFI Enabled
2,699,545 UART: [fht] FMC Alias Private Key: 7
2,807,474 UART: [art] Extend RT PCRs Done
2,807,902 UART: [art] Lock RT PCRs Done
2,809,224 UART: [art] Populate DV Done
2,817,657 UART: [fht] FMC Alias Private Key: 7
2,818,631 UART: [art] Derive CDI
2,818,911 UART: [art] Store in in slot 0x4
2,904,642 UART: [art] Derive Key Pair
2,905,002 UART: [art] Store priv key in slot 0x5
2,918,284 UART: [art] Derive Key Pair - Done
2,932,949 UART: [art] Signing Cert with AUTHO
2,933,429 UART: RITY.KEYID = 7
2,948,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,484 UART: [art] PUB.X = 9609D889B1BEFB06BC1336DC1BD019A047245884822AC6DC09D536DD0086A40697934EDBF7D2E860704C8C9F8BEEF92E
2,956,228 UART: [art] PUB.Y = 3CE03F6CD768AFB984BF7CAE1224258F28EA5C42D4A749F9266C860F3BFA34EED1AA540471E31395A3F6AA4BE29E8001
2,963,183 UART: [art] SIG.R = 1156828D50A3F6FB2B436CD65C45612754BDB3361A589FD9DACCA4838BDA428A6255E2B34B717B1498FDBDA89083A86F
2,969,961 UART: [art] SIG.S = AC29031AA58914F7ABAF239D974A67BAAB1C6C8B4D863C65AD2109E52E81D2F0F3F5E55B01351E55C99B3C399FA61DFB
2,993,729 UART: Caliptra RT
2,994,074 UART: [state] CFI Enabled
3,102,051 UART: [rt] RT listening for mailbox commands...
3,102,721 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,513 UART: [rt]cmd =0x49444352, len=4
3,133,939 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,012 UART:
192,390 UART: Running Caliptra ROM ...
193,529 UART:
193,695 UART: [state] CFI Enabled
264,395 UART: [state] LifecycleState = Unprovisioned
266,320 UART: [state] DebugLocked = No
267,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,219 UART: [kat] SHA2-256
441,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,418 UART: [kat] ++
452,895 UART: [kat] sha1
463,223 UART: [kat] SHA2-256
465,948 UART: [kat] SHA2-384
472,578 UART: [kat] SHA2-512-ACC
474,948 UART: [kat] ECC-384
2,769,439 UART: [kat] HMAC-384Kdf
2,801,332 UART: [kat] LMS
3,991,599 UART: [kat] --
3,997,228 UART: [cold-reset] ++
3,999,321 UART: [fht] Storing FHT @ 0x50003400
4,010,970 UART: [idev] ++
4,011,590 UART: [idev] CDI.KEYID = 6
4,012,510 UART: [idev] SUBJECT.KEYID = 7
4,013,688 UART: [idev] UDS.KEYID = 0
4,014,707 ready_for_fw is high
4,014,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,419 UART: [idev] Erasing UDS.KEYID = 0
7,346,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,372 UART: [idev] --
7,373,934 UART: [ldev] ++
7,374,509 UART: [ldev] CDI.KEYID = 6
7,375,450 UART: [ldev] SUBJECT.KEYID = 5
7,376,664 UART: [ldev] AUTHORITY.KEYID = 7
7,377,953 UART: [ldev] FE.KEYID = 1
7,422,004 UART: [ldev] Erasing FE.KEYID = 1
10,755,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,363 UART: [ldev] --
13,135,720 UART: [fwproc] Waiting for Commands...
13,138,628 UART: [fwproc] Received command 0x46574c44
13,140,860 UART: [fwproc] Received Image of size 114124 bytes
17,190,848 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,653,267 >>> mbox cmd response: success
17,653,782 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,657,326 UART: [afmc] ++
17,657,909 UART: [afmc] CDI.KEYID = 6
17,659,047 UART: [afmc] SUBJECT.KEYID = 7
17,660,160 UART: [afmc] AUTHORITY.KEYID = 5
21,029,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,157 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,410 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,781 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,667 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,135 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,825 UART: [afmc] --
23,397,149 UART: [cold-reset] --
23,400,305 UART: [state] Locking Datavault
23,406,736 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,497 UART: [state] Locking ICCM
23,411,274 UART: [exit] Launching FMC @ 0x40000130
23,419,660 UART:
23,419,892 UART: Running Caliptra FMC ...
23,420,938 UART:
23,421,089 UART: [state] CFI Enabled
23,488,840 UART: [fht] FMC Alias Private Key: 7
25,826,535 UART: [art] Extend RT PCRs Done
25,827,763 UART: [art] Lock RT PCRs Done
25,829,383 UART: [art] Populate DV Done
25,834,903 UART: [fht] FMC Alias Private Key: 7
25,836,438 UART: [art] Derive CDI
25,837,251 UART: [art] Store in in slot 0x4
25,897,074 UART: [art] Derive Key Pair
25,898,107 UART: [art] Store priv key in slot 0x5
29,191,372 UART: [art] Derive Key Pair - Done
29,204,374 UART: [art] Signing Cert with AUTHO
29,205,676 UART: RITY.KEYID = 7
31,493,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,566 UART: [art] PUB.X = 012C661A42C4F318D812DFFA7B614B3884F44230EC99BEB5666CEF85D958B20A779FF7CFA44574FC307EDB9EE109484A
31,501,849 UART: [art] PUB.Y = 80CBCCF643905DA4290F9BAE736366E01C136B54E34F4261805E53CD1C8E4849A89E6DBDB71BAF96D5E3E69105C76602
31,509,039 UART: [art] SIG.R = 4B3F60F80C24D6DB92FC814BE55C83C332EBDDD5A625FB893195A473FE915BF3F3BAD4B7CCB303190737B1CE0AF4BAE7
31,516,441 UART: [art] SIG.S = F889B36DC49CA3B81712C6B2C18FF4598DBF0A0939F80DECBA2A6AE590B878F14B2FC66CA1F941FA2C1F32524B1E6D66
32,821,998 UART: Caliptra RT
32,822,711 UART: [state] CFI Enabled
32,983,757 UART: [rt] RT listening for mailbox commands...
33,014,903 UART: [rt]cmd =0x43415053, len=4
33,016,538 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,783,842 ready_for_fw is high
3,784,221 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,936 >>> mbox cmd response: success
17,870,742 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,570,816 UART:
23,571,201 UART: Running Caliptra FMC ...
23,572,311 UART:
23,572,462 UART: [state] CFI Enabled
23,637,289 UART: [fht] FMC Alias Private Key: 7
25,975,174 UART: [art] Extend RT PCRs Done
25,976,402 UART: [art] Lock RT PCRs Done
25,978,273 UART: [art] Populate DV Done
25,983,656 UART: [fht] FMC Alias Private Key: 7
25,985,212 UART: [art] Derive CDI
25,986,031 UART: [art] Store in in slot 0x4
26,040,158 UART: [art] Derive Key Pair
26,041,201 UART: [art] Store priv key in slot 0x5
29,334,080 UART: [art] Derive Key Pair - Done
29,347,141 UART: [art] Signing Cert with AUTHO
29,348,440 UART: RITY.KEYID = 7
31,635,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,083 UART: [art] PUB.X = C834A743DED84C48028D22FDD777119BDE48A3EFE95C5F4B41CBBEB7ABE39B3ECB2257F5ABD97D760FBC4C6AA2FEEF52
31,644,389 UART: [art] PUB.Y = 477AE158E879AFD8E9026137C9EF197D62F5C9CDD8C63B2520FB58DF1C76B6E68F47EEFDC7248220843A3DD733195A93
31,651,624 UART: [art] SIG.R = 6297425ADEBE35FDED5CBE437CABD738ADD7724CD54C135161D1843145FFA661139031072BD4078105C2372BE57328E3
31,659,017 UART: [art] SIG.S = 0ADAFFE6743D238C4AD41BE07DAC9D1940CB0CFAFE7ED1C1CA37CBDEF9061D05FE8418C311EA2DFE1D6B72961ECCCEF7
32,964,471 UART: Caliptra RT
32,965,175 UART: [state] CFI Enabled
33,146,150 UART: [rt] RT listening for mailbox commands...
33,177,658 UART: [rt]cmd =0x43415053, len=4
33,179,412 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,300 UART:
192,662 UART: Running Caliptra ROM ...
193,854 UART:
603,613 UART: [state] CFI Enabled
615,789 UART: [state] LifecycleState = Unprovisioned
617,724 UART: [state] DebugLocked = No
620,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,381 UART: [kat] SHA2-256
795,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,624 UART: [kat] ++
806,143 UART: [kat] sha1
817,238 UART: [kat] SHA2-256
819,963 UART: [kat] SHA2-384
826,874 UART: [kat] SHA2-512-ACC
829,240 UART: [kat] ECC-384
3,112,879 UART: [kat] HMAC-384Kdf
3,123,922 UART: [kat] LMS
4,314,017 UART: [kat] --
4,318,682 UART: [cold-reset] ++
4,320,509 UART: [fht] Storing FHT @ 0x50003400
4,331,563 UART: [idev] ++
4,332,122 UART: [idev] CDI.KEYID = 6
4,333,147 UART: [idev] SUBJECT.KEYID = 7
4,334,315 UART: [idev] UDS.KEYID = 0
4,335,363 ready_for_fw is high
4,335,579 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,943 UART: [idev] Erasing UDS.KEYID = 0
7,624,536 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,267 UART: [idev] --
7,650,604 UART: [ldev] ++
7,651,167 UART: [ldev] CDI.KEYID = 6
7,652,144 UART: [ldev] SUBJECT.KEYID = 5
7,653,347 UART: [ldev] AUTHORITY.KEYID = 7
7,654,571 UART: [ldev] FE.KEYID = 1
7,666,935 UART: [ldev] Erasing FE.KEYID = 1
10,957,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,797 UART: [ldev] --
13,319,252 UART: [fwproc] Waiting for Commands...
13,322,366 UART: [fwproc] Received command 0x46574c44
13,324,615 UART: [fwproc] Received Image of size 114124 bytes
17,371,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,933 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,755 >>> mbox cmd response: success
17,836,270 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,840,096 UART: [afmc] ++
17,840,709 UART: [afmc] CDI.KEYID = 6
17,841,619 UART: [afmc] SUBJECT.KEYID = 7
17,842,836 UART: [afmc] AUTHORITY.KEYID = 5
21,154,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,543 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,862 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,748 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,154 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,368 UART: [afmc] --
23,516,803 UART: [cold-reset] --
23,519,947 UART: [state] Locking Datavault
23,525,254 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,010 UART: [state] Locking ICCM
23,529,265 UART: [exit] Launching FMC @ 0x40000130
23,537,658 UART:
23,537,890 UART: Running Caliptra FMC ...
23,538,985 UART:
23,539,141 UART: [state] CFI Enabled
23,547,560 UART: [fht] FMC Alias Private Key: 7
25,878,757 UART: [art] Extend RT PCRs Done
25,879,982 UART: [art] Lock RT PCRs Done
25,881,602 UART: [art] Populate DV Done
25,886,899 UART: [fht] FMC Alias Private Key: 7
25,888,597 UART: [art] Derive CDI
25,889,422 UART: [art] Store in in slot 0x4
25,932,285 UART: [art] Derive Key Pair
25,933,329 UART: [art] Store priv key in slot 0x5
29,175,165 UART: [art] Derive Key Pair - Done
29,188,376 UART: [art] Signing Cert with AUTHO
29,189,684 UART: RITY.KEYID = 7
31,469,205 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,710 UART: [art] PUB.X = 4E839476944203A58CFAEC8E23A5B05C633C9B97A320365ABF0637B37BAEF46DF0A4FC92BF30BB80CD8AD65ADAAF4D9B
31,477,956 UART: [art] PUB.Y = D01CE089718CFA7D277C92F077E085551827F5EDA4EB94A9B98AFB582DDB89AC835C17878C707BBFABEC2402F7934AC6
31,485,234 UART: [art] SIG.R = 48C2317FC516F1439BAF0FA29F66D888D07F22B525128426ECD99AE0AE9435C47AE8C843B4D41CA6B08B02D222485E34
31,492,560 UART: [art] SIG.S = FF5BEBBD4D81FCE4E73413DF6409A0DB8393C0F7806BF7488F5BC0CBFA48896EE0A1602E19DD42C80286DFDC71165BA7
32,797,916 UART: Caliptra RT
32,798,615 UART: [state] CFI Enabled
32,916,323 UART: [rt] RT listening for mailbox commands...
32,947,726 UART: [rt]cmd =0x43415053, len=4
32,949,410 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,131,826 ready_for_fw is high
4,132,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,743 >>> mbox cmd response: success
18,068,372 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,713,032 UART:
23,713,412 UART: Running Caliptra FMC ...
23,714,615 UART:
23,714,796 UART: [state] CFI Enabled
23,722,693 UART: [fht] FMC Alias Private Key: 7
26,052,984 UART: [art] Extend RT PCRs Done
26,054,215 UART: [art] Lock RT PCRs Done
26,056,063 UART: [art] Populate DV Done
26,061,441 UART: [fht] FMC Alias Private Key: 7
26,063,142 UART: [art] Derive CDI
26,063,957 UART: [art] Store in in slot 0x4
26,106,502 UART: [art] Derive Key Pair
26,107,539 UART: [art] Store priv key in slot 0x5
29,349,708 UART: [art] Derive Key Pair - Done
29,362,874 UART: [art] Signing Cert with AUTHO
29,364,213 UART: RITY.KEYID = 7
31,643,457 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,970 UART: [art] PUB.X = 3E7E6CDA1FCD012E79D09C85E8EAB30E184A080444EB7B46964DBA514B10B41455C90DE6C85F8D28B8858645FC937931
31,652,221 UART: [art] PUB.Y = 6FFEDD0D0AF07E2F2142B858F3F716CF5ECB54EA1D971066E5DE43488FE78B6DD992FE23EF60525F5E8FF3E17F41ACB2
31,659,471 UART: [art] SIG.R = E9184AA412EAE715F0B26B25318E7863B8A5A8BA37322D20D7BB66AE319A91B341AF34C4E62EA722CD389D4D28DB6927
31,666,871 UART: [art] SIG.S = 63F29D896A6F5FCB7E087D2AD3ABBE6D50B0AF84A1358B5297776267A1A458CF5EB791C66D72F863B51FF470D0022747
32,972,678 UART: Caliptra RT
32,973,377 UART: [state] CFI Enabled
33,091,463 UART: [rt] RT listening for mailbox commands...
33,122,653 UART: [rt]cmd =0x43415053, len=4
33,124,257 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,180 UART:
192,572 UART: Running Caliptra ROM ...
193,674 UART:
193,820 UART: [state] CFI Enabled
262,620 UART: [state] LifecycleState = Unprovisioned
264,484 UART: [state] DebugLocked = No
266,548 UART: [state] WD Timer not started. Device not locked for debugging
269,590 UART: [kat] SHA2-256
448,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,292 UART: [kat] ++
460,737 UART: [kat] sha1
471,537 UART: [kat] SHA2-256
474,617 UART: [kat] SHA2-384
480,676 UART: [kat] SHA2-512-ACC
483,607 UART: [kat] ECC-384
2,946,275 UART: [kat] HMAC-384Kdf
2,969,875 UART: [kat] LMS
3,499,341 UART: [kat] --
3,502,981 UART: [cold-reset] ++
3,504,484 UART: [fht] FHT @ 0x50003400
3,515,112 UART: [idev] ++
3,515,676 UART: [idev] CDI.KEYID = 6
3,516,705 UART: [idev] SUBJECT.KEYID = 7
3,517,826 UART: [idev] UDS.KEYID = 0
3,518,759 ready_for_fw is high
3,518,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,882 UART: [idev] Erasing UDS.KEYID = 0
6,025,192 UART: [idev] Sha1 KeyId Algorithm
6,048,345 UART: [idev] --
6,053,265 UART: [ldev] ++
6,053,836 UART: [ldev] CDI.KEYID = 6
6,054,724 UART: [ldev] SUBJECT.KEYID = 5
6,055,941 UART: [ldev] AUTHORITY.KEYID = 7
6,057,178 UART: [ldev] FE.KEYID = 1
6,097,071 UART: [ldev] Erasing FE.KEYID = 1
8,604,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,377 UART: [ldev] --
10,411,188 UART: [fwproc] Wait for Commands...
10,413,437 UART: [fwproc] Recv command 0x46574c44
10,415,528 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,132 >>> mbox cmd response: success
14,281,618 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,285,648 UART: [afmc] ++
14,286,237 UART: [afmc] CDI.KEYID = 6
14,287,153 UART: [afmc] SUBJECT.KEYID = 7
14,288,374 UART: [afmc] AUTHORITY.KEYID = 5
16,822,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,563,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,579,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,595,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,599 UART: [afmc] --
18,622,680 UART: [cold-reset] --
18,628,210 UART: [state] Locking Datavault
18,634,218 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,861 UART: [state] Locking ICCM
18,637,254 UART: [exit] Launching FMC @ 0x40000130
18,645,651 UART:
18,645,885 UART: Running Caliptra FMC ...
18,646,985 UART:
18,647,148 UART: [state] CFI Enabled
18,705,492 UART: [fht] FMC Alias Private Key: 7
20,469,636 UART: [art] Extend RT PCRs Done
20,470,874 UART: [art] Lock RT PCRs Done
20,472,499 UART: [art] Populate DV Done
20,478,074 UART: [fht] FMC Alias Private Key: 7
20,479,614 UART: [art] Derive CDI
20,480,424 UART: [art] Store in in slot 0x4
20,538,601 UART: [art] Derive Key Pair
20,539,635 UART: [art] Store priv key in slot 0x5
23,002,636 UART: [art] Derive Key Pair - Done
23,015,595 UART: [art] Signing Cert with AUTHO
23,016,913 UART: RITY.KEYID = 7
24,728,787 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,319 UART: [art] PUB.X = 2413D90CA30E07DFACD27C2A390B643BDD166BFB02D9DF5D5F86634E3C0CD89E47466E8F2F6379F4D911337783257E9A
24,737,567 UART: [art] PUB.Y = 1183815A3F8CA35CF298B48E465ED765161D37BA499D69BD0741D3FDD010E3B768FF898BD187E10E7C7E71942C02FCB4
24,744,856 UART: [art] SIG.R = CD4CB16578619A7C8860C32808E304D2888A44B0F4C67631D312A69F5CDA7EDA95B68769221E9170A5D51BD6313042AC
24,752,304 UART: [art] SIG.S = D95F3676D85C998CC899CF24F34FB1ACEC64EDF5D7318D4FDAF899E8C87FE246373A8B8E89356501DF0AADFE31345E27
25,731,360 UART: Caliptra RT
25,732,095 UART: [state] CFI Enabled
25,896,672 UART: [rt] RT listening for mailbox commands...
25,928,098 UART: [rt]cmd =0x43415053, len=4
25,929,678 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,382,466 ready_for_fw is high
3,382,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,095,869 >>> mbox cmd response: success
14,096,660 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,388,426 UART:
18,388,819 UART: Running Caliptra FMC ...
18,389,929 UART:
18,390,082 UART: [state] CFI Enabled
18,456,200 UART: [fht] FMC Alias Private Key: 7
20,220,158 UART: [art] Extend RT PCRs Done
20,221,376 UART: [art] Lock RT PCRs Done
20,222,917 UART: [art] Populate DV Done
20,228,245 UART: [fht] FMC Alias Private Key: 7
20,229,728 UART: [art] Derive CDI
20,230,661 UART: [art] Store in in slot 0x4
20,288,813 UART: [art] Derive Key Pair
20,289,816 UART: [art] Store priv key in slot 0x5
22,753,000 UART: [art] Derive Key Pair - Done
22,766,162 UART: [art] Signing Cert with AUTHO
22,767,470 UART: RITY.KEYID = 7
24,478,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,381 UART: [art] PUB.X = 2F27C2197BC75815A3D48507AD421D6F3AC25D8CF8DE0BB9FCFAA90DD58DF2EF918D4E853745611DDCB4DA01888FF316
24,487,696 UART: [art] PUB.Y = 7FAEE8496A92927AC408759FB4F2CE7D57D038AAFA6CA3A98F2BF941BAACC2A53BA88F1A315011C9FEEB9D023C2B8BD2
24,495,008 UART: [art] SIG.R = E60E9BE10DFDE76959C828C5E482987CE93C41F5B7D1080A728063C2C3DE9FDFE750C957620609B1E40244C927337073
24,502,352 UART: [art] SIG.S = 7E0828464A001F828C3CD32A6AABB172B4FA0B85BBDCE34D79377D80166A288230F6C571F4EF0E7FC5401AB94D9D6745
25,481,292 UART: Caliptra RT
25,481,991 UART: [state] CFI Enabled
25,647,298 UART: [rt] RT listening for mailbox commands...
25,678,469 UART: [rt]cmd =0x43415053, len=4
25,679,914 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,394 UART:
192,790 UART: Running Caliptra ROM ...
193,987 UART:
603,575 UART: [state] CFI Enabled
619,248 UART: [state] LifecycleState = Unprovisioned
621,157 UART: [state] DebugLocked = No
622,907 UART: [state] WD Timer not started. Device not locked for debugging
627,214 UART: [kat] SHA2-256
806,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,902 UART: [kat] ++
818,439 UART: [kat] sha1
828,247 UART: [kat] SHA2-256
831,323 UART: [kat] SHA2-384
837,376 UART: [kat] SHA2-512-ACC
840,300 UART: [kat] ECC-384
3,277,878 UART: [kat] HMAC-384Kdf
3,291,386 UART: [kat] LMS
3,820,844 UART: [kat] --
3,825,783 UART: [cold-reset] ++
3,827,363 UART: [fht] FHT @ 0x50003400
3,839,396 UART: [idev] ++
3,839,949 UART: [idev] CDI.KEYID = 6
3,840,824 UART: [idev] SUBJECT.KEYID = 7
3,842,054 UART: [idev] UDS.KEYID = 0
3,842,948 ready_for_fw is high
3,843,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,888 UART: [idev] Erasing UDS.KEYID = 0
6,314,496 UART: [idev] Sha1 KeyId Algorithm
6,338,791 UART: [idev] --
6,342,664 UART: [ldev] ++
6,343,233 UART: [ldev] CDI.KEYID = 6
6,344,138 UART: [ldev] SUBJECT.KEYID = 5
6,345,288 UART: [ldev] AUTHORITY.KEYID = 7
6,346,566 UART: [ldev] FE.KEYID = 1
6,356,931 UART: [ldev] Erasing FE.KEYID = 1
8,828,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,228 UART: [ldev] --
10,620,198 UART: [fwproc] Wait for Commands...
10,623,285 UART: [fwproc] Recv command 0x46574c44
10,625,372 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,816 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,406 >>> mbox cmd response: success
14,487,896 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,492,449 UART: [afmc] ++
14,493,026 UART: [afmc] CDI.KEYID = 6
14,493,932 UART: [afmc] SUBJECT.KEYID = 7
14,495,083 UART: [afmc] AUTHORITY.KEYID = 5
16,993,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,822 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,256 UART: [afmc] --
18,791,478 UART: [cold-reset] --
18,794,307 UART: [state] Locking Datavault
18,800,028 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,733 UART: [state] Locking ICCM
18,803,310 UART: [exit] Launching FMC @ 0x40000130
18,811,754 UART:
18,811,985 UART: Running Caliptra FMC ...
18,813,080 UART:
18,813,233 UART: [state] CFI Enabled
18,821,646 UART: [fht] FMC Alias Private Key: 7
20,578,384 UART: [art] Extend RT PCRs Done
20,579,601 UART: [art] Lock RT PCRs Done
20,581,355 UART: [art] Populate DV Done
20,586,877 UART: [fht] FMC Alias Private Key: 7
20,588,482 UART: [art] Derive CDI
20,589,293 UART: [art] Store in in slot 0x4
20,631,999 UART: [art] Derive Key Pair
20,633,039 UART: [art] Store priv key in slot 0x5
23,060,080 UART: [art] Derive Key Pair - Done
23,073,243 UART: [art] Signing Cert with AUTHO
23,074,543 UART: RITY.KEYID = 7
24,779,925 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,427 UART: [art] PUB.X = A68A81B2B0C05B98B1ED903837ED4C8782CC5AA91173501785B7C5EB2CB0C89599F45752256AFF446E34E5DA982DB113
24,788,666 UART: [art] PUB.Y = 2791868B79418A684B268A9145BC218E619F636490EC20A01DC7480E8FB15C7602530536646C5CDDF5BF8D70F25FC9C2
24,795,890 UART: [art] SIG.R = 8EA0DD53D9CE971DD8135DF7ACDF5EA1DCD99084970252343F450D173BEB6333F4A59CBE89794AB9E6AC145CD28F84C5
24,803,321 UART: [art] SIG.S = 545804BD7F49068470353D50761E358CA3E4BC4F37CFF94B36DB07E8BFF9E0DFB85891845EC742951110950EDAFE889B
25,782,518 UART: Caliptra RT
25,783,224 UART: [state] CFI Enabled
25,899,793 UART: [rt] RT listening for mailbox commands...
25,931,031 UART: [rt]cmd =0x43415053, len=4
25,932,948 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,697,536 ready_for_fw is high
3,697,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,573 >>> mbox cmd response: success
14,284,124 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,529,704 UART:
18,530,093 UART: Running Caliptra FMC ...
18,531,240 UART:
18,531,391 UART: [state] CFI Enabled
18,539,061 UART: [fht] FMC Alias Private Key: 7
20,296,180 UART: [art] Extend RT PCRs Done
20,297,405 UART: [art] Lock RT PCRs Done
20,299,194 UART: [art] Populate DV Done
20,304,654 UART: [fht] FMC Alias Private Key: 7
20,306,124 UART: [art] Derive CDI
20,306,903 UART: [art] Store in in slot 0x4
20,349,436 UART: [art] Derive Key Pair
20,350,432 UART: [art] Store priv key in slot 0x5
22,777,213 UART: [art] Derive Key Pair - Done
22,789,773 UART: [art] Signing Cert with AUTHO
22,791,110 UART: RITY.KEYID = 7
24,496,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,189 UART: [art] PUB.X = BA617321E0B8BEC9CDEFDF5055EF5FA2E92A7E2ADA8E4F238749BAC9C000501C5FCB45A8DCF865458F87D98D9A911824
24,505,503 UART: [art] PUB.Y = 061BB159285025E177621AD3FC57DD4FD3036A8522A3BF704616038CEAE2E6A9882FC674AE240E42C64B4B6200F6AAFB
24,512,695 UART: [art] SIG.R = 1E184AD8939D7C9660140248FC878D9DABC19653907B37D3425003D3402025D70C8728B73954D84DBC6979036DA44A16
24,520,022 UART: [art] SIG.S = E2BE932765A700B2B6F79B56D0C5117F6B40B900C4CEDB4C89249FF0538E9D665889C7836F93050DA014CD429D8EE506
25,498,690 UART: Caliptra RT
25,499,398 UART: [state] CFI Enabled
25,616,579 UART: [rt] RT listening for mailbox commands...
25,647,883 UART: [rt]cmd =0x43415053, len=4
25,649,567 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,212 UART:
192,554 UART: Running Caliptra ROM ...
193,739 UART:
193,893 UART: [state] CFI Enabled
265,084 UART: [state] LifecycleState = Unprovisioned
267,523 UART: [state] DebugLocked = No
269,416 UART: [state] WD Timer not started. Device not locked for debugging
274,588 UART: [kat] SHA2-256
464,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,220 UART: [kat] ++
475,723 UART: [kat] sha1
488,162 UART: [kat] SHA2-256
491,174 UART: [kat] SHA2-384
496,185 UART: [kat] SHA2-512-ACC
498,781 UART: [kat] ECC-384
2,961,191 UART: [kat] HMAC-384Kdf
2,986,126 UART: [kat] LMS
3,517,931 UART: [kat] --
3,522,849 UART: [cold-reset] ++
3,524,066 UART: [fht] FHT @ 0x50003400
3,537,173 UART: [idev] ++
3,537,885 UART: [idev] CDI.KEYID = 6
3,538,798 UART: [idev] SUBJECT.KEYID = 7
3,539,971 UART: [idev] UDS.KEYID = 0
3,540,872 ready_for_fw is high
3,541,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,685,005 UART: [idev] Erasing UDS.KEYID = 0
6,041,892 UART: [idev] Sha1 KeyId Algorithm
6,064,364 UART: [idev] --
6,067,945 UART: [ldev] ++
6,068,631 UART: [ldev] CDI.KEYID = 6
6,069,544 UART: [ldev] SUBJECT.KEYID = 5
6,070,703 UART: [ldev] AUTHORITY.KEYID = 7
6,071,939 UART: [ldev] FE.KEYID = 1
6,113,548 UART: [ldev] Erasing FE.KEYID = 1
8,619,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,481 UART: [ldev] --
10,430,285 UART: [fwproc] Wait for Commands...
10,433,242 UART: [fwproc] Recv command 0x46574c44
10,435,552 UART: [fwproc] Recv'd Img size: 114448 bytes
13,883,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,073,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,616,345 >>> mbox cmd response: success
14,616,820 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,619,926 UART: [afmc] ++
14,620,626 UART: [afmc] CDI.KEYID = 6
14,621,867 UART: [afmc] SUBJECT.KEYID = 7
14,623,300 UART: [afmc] AUTHORITY.KEYID = 5
17,160,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,884,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,886,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,901,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,916,922 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,931,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,954,270 UART: [afmc] --
18,958,250 UART: [cold-reset] --
18,962,904 UART: [state] Locking Datavault
18,968,700 UART: [state] Locking PCR0, PCR1 and PCR31
18,970,839 UART: [state] Locking ICCM
18,973,189 UART: [exit] Launching FMC @ 0x40000130
18,981,860 UART:
18,982,094 UART: Running Caliptra FMC ...
18,983,125 UART:
18,983,272 UART: [state] CFI Enabled
19,042,382 UART: [fht] FMC Alias Private Key: 7
20,805,694 UART: [art] Extend RT PCRs Done
20,806,897 UART: [art] Lock RT PCRs Done
20,808,892 UART: [art] Populate DV Done
20,814,349 UART: [fht] FMC Alias Private Key: 7
20,815,889 UART: [art] Derive CDI
20,816,703 UART: [art] Store in in slot 0x4
20,874,586 UART: [art] Derive Key Pair
20,875,642 UART: [art] Store priv key in slot 0x5
23,338,474 UART: [art] Derive Key Pair - Done
23,351,337 UART: [art] Signing Cert with AUTHO
23,352,641 UART: RITY.KEYID = 7
25,064,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,066,454 UART: [art] PUB.X = C6F7FDC652DEDE693CF54D1896FCB024B549FF7D6348FE2AA02E2A8CF686D870E480DBFA95BEF6F84D579E4E69DBB75E
25,073,816 UART: [art] PUB.Y = D4FCDC66DDFEBCB44D2D03634E86DF5E6425ADF4C3B2F00D6FE812C2C7581A2B57D3F9D0E8C3500E391852A7880283F5
25,081,098 UART: [art] SIG.R = D1A6EAD7013B31DB4C1BBDDF4A62B8C0AF7AC58B26FD460466FFBF11884E29CF4BB86FA91DB246B8B2618FF10C249906
25,088,492 UART: [art] SIG.S = 19164A0ED972C02409E0BA789BC104EC212A648677823D53A9C992840C83F9D711E6B1329D4E16AA9E252F29399C5F87
26,067,848 UART: Caliptra RT
26,068,569 UART: [state] CFI Enabled
26,232,916 UART: [rt] RT listening for mailbox commands...
26,264,249 UART: [rt]cmd =0x43415053, len=4
26,266,041 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,440,041 ready_for_fw is high
3,440,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,763,598 >>> mbox cmd response: success
14,764,343 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,065,654 UART:
19,066,038 UART: Running Caliptra FMC ...
19,067,177 UART:
19,067,336 UART: [state] CFI Enabled
19,131,997 UART: [fht] FMC Alias Private Key: 7
20,895,818 UART: [art] Extend RT PCRs Done
20,897,050 UART: [art] Lock RT PCRs Done
20,898,684 UART: [art] Populate DV Done
20,904,162 UART: [fht] FMC Alias Private Key: 7
20,905,818 UART: [art] Derive CDI
20,906,647 UART: [art] Store in in slot 0x4
20,964,371 UART: [art] Derive Key Pair
20,965,372 UART: [art] Store priv key in slot 0x5
23,428,474 UART: [art] Derive Key Pair - Done
23,441,423 UART: [art] Signing Cert with AUTHO
23,442,728 UART: RITY.KEYID = 7
25,154,328 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,836 UART: [art] PUB.X = 0688AF52517D67B09FBA3DE662D245CF0D0D50D491F19758A665C612A3A0A37A80EA09E17067D771E5D1F6C6E3D77301
25,163,079 UART: [art] PUB.Y = A565BB161E50F8E8CE18E6234F9A83889B70AD10AAB8194379EE205880D4DA379488829771CA85AC68B09CF207779DD9
25,170,345 UART: [art] SIG.R = 214EA132FD203B13CF9A1BEA383BCC13725F4AF4371450AF1570DFF6F27EB5B41A48EA48817AA9EF0E1441F84F6A06FC
25,177,733 UART: [art] SIG.S = 50D8FA5D65B72B8D46F49D3A3745AADDC6A192CF6CAE0EB8B23C1CD5CF0A9D380A4FB96136AE149F7B6773284C887E70
26,156,435 UART: Caliptra RT
26,157,131 UART: [state] CFI Enabled
26,321,092 UART: [rt] RT listening for mailbox commands...
26,352,510 UART: [rt]cmd =0x43415053, len=4
26,354,089 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,348 UART:
192,718 UART: Running Caliptra ROM ...
193,858 UART:
603,630 UART: [state] CFI Enabled
617,367 UART: [state] LifecycleState = Unprovisioned
619,735 UART: [state] DebugLocked = No
621,048 UART: [state] WD Timer not started. Device not locked for debugging
624,879 UART: [kat] SHA2-256
814,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,568 UART: [kat] ++
826,082 UART: [kat] sha1
836,882 UART: [kat] SHA2-256
839,880 UART: [kat] SHA2-384
845,894 UART: [kat] SHA2-512-ACC
848,510 UART: [kat] ECC-384
3,291,507 UART: [kat] HMAC-384Kdf
3,305,937 UART: [kat] LMS
3,837,784 UART: [kat] --
3,842,078 UART: [cold-reset] ++
3,843,869 UART: [fht] FHT @ 0x50003400
3,855,973 UART: [idev] ++
3,856,599 UART: [idev] CDI.KEYID = 6
3,857,619 UART: [idev] SUBJECT.KEYID = 7
3,858,802 UART: [idev] UDS.KEYID = 0
3,859,723 ready_for_fw is high
3,859,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,625 UART: [idev] Erasing UDS.KEYID = 0
6,335,813 UART: [idev] Sha1 KeyId Algorithm
6,358,438 UART: [idev] --
6,363,828 UART: [ldev] ++
6,364,535 UART: [ldev] CDI.KEYID = 6
6,365,445 UART: [ldev] SUBJECT.KEYID = 5
6,366,596 UART: [ldev] AUTHORITY.KEYID = 7
6,367,819 UART: [ldev] FE.KEYID = 1
6,377,860 UART: [ldev] Erasing FE.KEYID = 1
8,853,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,673 UART: [ldev] --
10,644,281 UART: [fwproc] Wait for Commands...
10,646,206 UART: [fwproc] Recv command 0x46574c44
10,648,504 UART: [fwproc] Recv'd Img size: 114448 bytes
14,090,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,823,054 >>> mbox cmd response: success
14,823,555 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,826,289 UART: [afmc] ++
14,826,981 UART: [afmc] CDI.KEYID = 6
14,828,133 UART: [afmc] SUBJECT.KEYID = 7
14,829,664 UART: [afmc] AUTHORITY.KEYID = 5
17,335,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,402 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,296 UART: [afmc] --
19,135,220 UART: [cold-reset] --
19,140,163 UART: [state] Locking Datavault
19,144,759 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,891 UART: [state] Locking ICCM
19,149,680 UART: [exit] Launching FMC @ 0x40000130
19,158,341 UART:
19,158,567 UART: Running Caliptra FMC ...
19,159,662 UART:
19,159,807 UART: [state] CFI Enabled
19,168,075 UART: [fht] FMC Alias Private Key: 7
20,925,162 UART: [art] Extend RT PCRs Done
20,926,392 UART: [art] Lock RT PCRs Done
20,927,797 UART: [art] Populate DV Done
20,932,876 UART: [fht] FMC Alias Private Key: 7
20,934,416 UART: [art] Derive CDI
20,935,170 UART: [art] Store in in slot 0x4
20,977,805 UART: [art] Derive Key Pair
20,978,800 UART: [art] Store priv key in slot 0x5
23,406,594 UART: [art] Derive Key Pair - Done
23,419,642 UART: [art] Signing Cert with AUTHO
23,420,940 UART: RITY.KEYID = 7
25,126,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,812 UART: [art] PUB.X = 8662C7E53A8125365CBD5F54FAC99A322F16D70FC91F7256C90C2C1D551831F11B82C6E0C143E6400B44E31D55327D3D
25,135,095 UART: [art] PUB.Y = 13E647C5F146FB5E3A8A02373C6A0638F85C8649479CEF3658D6BFA5200DDDC6F581128EBDD8B45D168C3E6F09677622
25,142,367 UART: [art] SIG.R = DD0CAF363B536B7E853762A20F269156C1F0DF2763EEBDA3760A144B34E835BBE97CA1B54DBEE3974BC08EA44447E77E
25,149,752 UART: [art] SIG.S = D59D93C119A1C72317DD1517E64E7B9ED3021F01B8C0D549F2AE69C53C0439461286D4C333D9A8B7DFE7511E87DE2F10
26,128,024 UART: Caliptra RT
26,128,730 UART: [state] CFI Enabled
26,246,620 UART: [rt] RT listening for mailbox commands...
26,277,915 UART: [rt]cmd =0x43415053, len=4
26,279,592 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,756,310 ready_for_fw is high
3,756,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,365 >>> mbox cmd response: success
14,951,174 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,201,716 UART:
19,202,099 UART: Running Caliptra FMC ...
19,203,198 UART:
19,203,348 UART: [state] CFI Enabled
19,210,969 UART: [fht] FMC Alias Private Key: 7
20,967,588 UART: [art] Extend RT PCRs Done
20,968,813 UART: [art] Lock RT PCRs Done
20,970,240 UART: [art] Populate DV Done
20,975,489 UART: [fht] FMC Alias Private Key: 7
20,977,034 UART: [art] Derive CDI
20,977,766 UART: [art] Store in in slot 0x4
21,020,249 UART: [art] Derive Key Pair
21,021,289 UART: [art] Store priv key in slot 0x5
23,447,858 UART: [art] Derive Key Pair - Done
23,460,874 UART: [art] Signing Cert with AUTHO
23,462,178 UART: RITY.KEYID = 7
25,167,297 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,805 UART: [art] PUB.X = 916A2B1734D40B69335FA36494CE79FF23F183FEA9CFCCF3E356FECAA4459E3D90BA156FAAE768CA54B64FEAAED67E4D
25,176,098 UART: [art] PUB.Y = B89D77C914C44516C208232403860BA8E57368D651F7D27572C746B9893FB6879BD5EDC39982CE0FD0F9567B0D934370
25,183,348 UART: [art] SIG.R = 9BA10A9F750B83ADBE7C16A4FB090A5DC3E9FA5851CD48EB11FF7F573BF01C80E5D36E6BC8540FA96187E53CE3018B71
25,190,734 UART: [art] SIG.S = F6238485BBC606F5A5C5D663EBA841FB72ED0CE3A0472B1672A3DBBB93A4261308CA99AFA520B64CAD12DAE861C94D06
26,170,200 UART: Caliptra RT
26,170,907 UART: [state] CFI Enabled
26,288,248 UART: [rt] RT listening for mailbox commands...
26,319,606 UART: [rt]cmd =0x43415053, len=4
26,321,398 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,619 UART: [cold-reset] ++
1,477,057 UART: [fht] Storing FHT @ 0x50003400
1,479,696 UART: [idev] ++
1,479,864 UART: [idev] CDI.KEYID = 6
1,480,224 UART: [idev] SUBJECT.KEYID = 7
1,480,648 UART: [idev] UDS.KEYID = 0
1,480,993 ready_for_fw is high
1,480,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,516 UART: [idev] Erasing UDS.KEYID = 0
1,505,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,828 UART: [idev] --
1,514,953 UART: [ldev] ++
1,515,121 UART: [ldev] CDI.KEYID = 6
1,515,484 UART: [ldev] SUBJECT.KEYID = 5
1,515,910 UART: [ldev] AUTHORITY.KEYID = 7
1,516,373 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,546,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,048 UART: [ldev] --
1,586,503 UART: [fwproc] Waiting for Commands...
1,587,252 UART: [fwproc] Received command 0x46574c44
1,588,043 UART: [fwproc] Received Image of size 114448 bytes
2,887,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,170 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,439 >>> mbox cmd response: success
3,080,439 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,081,611 UART: [afmc] ++
3,081,779 UART: [afmc] CDI.KEYID = 6
3,082,141 UART: [afmc] SUBJECT.KEYID = 7
3,082,566 UART: [afmc] AUTHORITY.KEYID = 5
3,117,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,154 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,844 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,843 UART: [afmc] --
3,160,841 UART: [cold-reset] --
3,161,649 UART: [state] Locking Datavault
3,162,850 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,454 UART: [state] Locking ICCM
3,164,004 UART: [exit] Launching FMC @ 0x40000130
3,169,333 UART:
3,169,349 UART: Running Caliptra FMC ...
3,169,757 UART:
3,169,811 UART: [state] CFI Enabled
3,180,236 UART: [fht] FMC Alias Private Key: 7
3,287,555 UART: [art] Extend RT PCRs Done
3,287,983 UART: [art] Lock RT PCRs Done
3,289,355 UART: [art] Populate DV Done
3,297,370 UART: [fht] FMC Alias Private Key: 7
3,298,398 UART: [art] Derive CDI
3,298,678 UART: [art] Store in in slot 0x4
3,384,267 UART: [art] Derive Key Pair
3,384,627 UART: [art] Store priv key in slot 0x5
3,397,641 UART: [art] Derive Key Pair - Done
3,412,328 UART: [art] Signing Cert with AUTHO
3,412,808 UART: RITY.KEYID = 7
3,427,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,753 UART: [art] PUB.X = 114E093B714519575F3616C50A2DF6C61184D8468F7DC21C9892AF063D1D83AC6C6F30B00C81CC1F1792C79509121279
3,435,500 UART: [art] PUB.Y = 3AB1324FF0B9441DA6493C46C2CD8DFC48390F5A495B5B51C8A1BD6FBBF487C986730F2EE67405879EEF76951C753426
3,442,447 UART: [art] SIG.R = AF1E5382A2E1FE366658C0C3FA068DDC6CEA0B71C5C11083A1731500A011ABE3FDC2E3CF7112020670EB8A57A2A1E240
3,449,195 UART: [art] SIG.S = BC66B241D16E462D65A32D3272CF8AB4FD1ED6175F9E385F330DDB0632044F970B87576563916C98017A27DD0DA1712F
3,472,924 UART: Caliptra RT
3,473,177 UART: [state] CFI Enabled
3,581,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,207 UART: [rt]cmd =0x43415053, len=4
3,613,395 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 ready_for_fw is high
1,362,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,865 >>> mbox cmd response: success
2,929,865 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,991,031 UART:
2,991,047 UART: Running Caliptra FMC ...
2,991,455 UART:
2,991,509 UART: [state] CFI Enabled
3,002,078 UART: [fht] FMC Alias Private Key: 7
3,110,387 UART: [art] Extend RT PCRs Done
3,110,815 UART: [art] Lock RT PCRs Done
3,112,181 UART: [art] Populate DV Done
3,120,700 UART: [fht] FMC Alias Private Key: 7
3,121,642 UART: [art] Derive CDI
3,121,922 UART: [art] Store in in slot 0x4
3,207,493 UART: [art] Derive Key Pair
3,207,853 UART: [art] Store priv key in slot 0x5
3,220,601 UART: [art] Derive Key Pair - Done
3,235,075 UART: [art] Signing Cert with AUTHO
3,235,555 UART: RITY.KEYID = 7
3,251,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,818 UART: [art] PUB.X = CCA26B07CCECF9098A2C92852DD30365E07B363D25F484E3E43A35FCCE86592B5242F394772188A956D69F11F0D81D76
3,258,581 UART: [art] PUB.Y = AEAEED6944FC342EAB8EE4CADCB92C46AC7C79AEBB523E678D931446EBB9F3E762021DE25FBB38296F29D87E92D08811
3,265,550 UART: [art] SIG.R = DC2ECE0AE7D92464A6F3156DBD3E33E05BCEE356CFB54A754D7F69FA840B9F09659074DD9CBA2AA5345FB0AE41AF4E34
3,272,335 UART: [art] SIG.S = E30E7490A0A8B38E59A05E4AD3F059960A4920D4C9512BB7A86078E9E3768CC55F9B76750CE1BBC953BF645947983632
3,295,713 UART: Caliptra RT
3,295,966 UART: [state] CFI Enabled
3,404,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,774 UART: [rt]cmd =0x43415053, len=4
3,435,996 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,710 UART: [kat] SHA2-256
882,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,756 UART: [kat] ++
886,908 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,871 UART: [kat] SHA2-512-ACC
897,772 UART: [kat] ECC-384
903,315 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,476,998 UART: [cold-reset] ++
1,477,506 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 ready_for_fw is high
1,481,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,133 UART: [idev] Erasing UDS.KEYID = 0
1,506,131 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,777 UART: [idev] --
1,515,646 UART: [ldev] ++
1,515,814 UART: [ldev] CDI.KEYID = 6
1,516,177 UART: [ldev] SUBJECT.KEYID = 5
1,516,603 UART: [ldev] AUTHORITY.KEYID = 7
1,517,066 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,547,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,485 UART: [ldev] --
1,586,976 UART: [fwproc] Waiting for Commands...
1,587,723 UART: [fwproc] Received command 0x46574c44
1,588,514 UART: [fwproc] Received Image of size 114448 bytes
2,888,809 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,323 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,678 >>> mbox cmd response: success
3,081,678 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,082,816 UART: [afmc] ++
3,082,984 UART: [afmc] CDI.KEYID = 6
3,083,346 UART: [afmc] SUBJECT.KEYID = 7
3,083,771 UART: [afmc] AUTHORITY.KEYID = 5
3,118,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,201 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,891 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,842 UART: [afmc] --
3,161,940 UART: [cold-reset] --
3,162,554 UART: [state] Locking Datavault
3,163,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,183 UART: [state] Locking ICCM
3,164,641 UART: [exit] Launching FMC @ 0x40000130
3,169,970 UART:
3,169,986 UART: Running Caliptra FMC ...
3,170,394 UART:
3,170,537 UART: [state] CFI Enabled
3,181,528 UART: [fht] FMC Alias Private Key: 7
3,289,397 UART: [art] Extend RT PCRs Done
3,289,825 UART: [art] Lock RT PCRs Done
3,290,993 UART: [art] Populate DV Done
3,299,136 UART: [fht] FMC Alias Private Key: 7
3,300,108 UART: [art] Derive CDI
3,300,388 UART: [art] Store in in slot 0x4
3,386,267 UART: [art] Derive Key Pair
3,386,627 UART: [art] Store priv key in slot 0x5
3,400,309 UART: [art] Derive Key Pair - Done
3,415,315 UART: [art] Signing Cert with AUTHO
3,415,795 UART: RITY.KEYID = 7
3,430,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,732 UART: [art] PUB.X = E84AE1A7E46D10A1210840DDBE7527FDEC759F80A4A5D93CA78E446F70D7DDC0FCAC77AA32B389487650EEDF6A13137C
3,438,517 UART: [art] PUB.Y = 79A39CA298323C59B98062DE0AB0AA2DCCADF24378C9DC109C086082C88CE70AB5015FFE8288C409305EA55F8B93326A
3,445,460 UART: [art] SIG.R = DCC0E324E92A9974EBFF4C7B29E7F44400738059E62724A5BD08E02A02B94EA365C596E1D7DC3C007013082A95D420AC
3,452,181 UART: [art] SIG.S = A29CB445F474ADD36502E71700A04184FBD70D1271474A638A6C86FB9B40210A46037FFAAE69D8F858603904299D8CEF
3,476,097 UART: Caliptra RT
3,476,442 UART: [state] CFI Enabled
3,584,242 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,692 UART: [rt]cmd =0x43415053, len=4
3,615,846 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,896 ready_for_fw is high
1,362,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,360 >>> mbox cmd response: success
2,931,360 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,993,550 UART:
2,993,566 UART: Running Caliptra FMC ...
2,993,974 UART:
2,994,117 UART: [state] CFI Enabled
3,004,972 UART: [fht] FMC Alias Private Key: 7
3,113,303 UART: [art] Extend RT PCRs Done
3,113,731 UART: [art] Lock RT PCRs Done
3,115,449 UART: [art] Populate DV Done
3,123,556 UART: [fht] FMC Alias Private Key: 7
3,124,538 UART: [art] Derive CDI
3,124,818 UART: [art] Store in in slot 0x4
3,210,075 UART: [art] Derive Key Pair
3,210,435 UART: [art] Store priv key in slot 0x5
3,223,717 UART: [art] Derive Key Pair - Done
3,238,958 UART: [art] Signing Cert with AUTHO
3,239,438 UART: RITY.KEYID = 7
3,254,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,315 UART: [art] PUB.X = 13209CC22945647F045B3568E9829047E7E21016687DC22FF1670A09F55A760D407C8C1B21A47C2194E4CCD1FF962995
3,262,063 UART: [art] PUB.Y = D97FE440ED3FBC94BC00F2065B6FDEA84A89A0E64C613FFB19F2CF99A46D7B60E4778BE98A35FBA5136C28E66AB4A8EE
3,269,012 UART: [art] SIG.R = D29290E9ABDA300D26CED43CE687164C3BBB222A2FFD427092316675A86DAC21C318E5AC378437197CFF120D27D5A62A
3,275,784 UART: [art] SIG.S = 180B763B0723DC4CDC02D10D501A5E086C0F9E04F171742AB699AB57179AC242FEE1DA30B6A1E87B86117810490AC7E6
3,299,159 UART: Caliptra RT
3,299,504 UART: [state] CFI Enabled
3,407,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,061 UART: [rt]cmd =0x43415053, len=4
3,439,345 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
892,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,093 UART: [kat] ++
897,245 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,146 UART: [kat] LMS
1,170,474 UART: [kat] --
1,171,229 UART: [cold-reset] ++
1,171,801 UART: [fht] FHT @ 0x50003400
1,174,464 UART: [idev] ++
1,174,632 UART: [idev] CDI.KEYID = 6
1,174,992 UART: [idev] SUBJECT.KEYID = 7
1,175,416 UART: [idev] UDS.KEYID = 0
1,175,761 ready_for_fw is high
1,175,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,756 UART: [idev] Erasing UDS.KEYID = 0
1,200,501 UART: [idev] Sha1 KeyId Algorithm
1,208,977 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,564 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,282,164 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,880 >>> mbox cmd response: success
2,775,880 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,777,006 UART: [afmc] ++
2,777,174 UART: [afmc] CDI.KEYID = 6
2,777,536 UART: [afmc] SUBJECT.KEYID = 7
2,777,961 UART: [afmc] AUTHORITY.KEYID = 5
2,813,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,345 UART: [afmc] --
2,857,467 UART: [cold-reset] --
2,858,231 UART: [state] Locking Datavault
2,859,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,158 UART: [state] Locking ICCM
2,860,760 UART: [exit] Launching FMC @ 0x40000130
2,866,089 UART:
2,866,105 UART: Running Caliptra FMC ...
2,866,513 UART:
2,866,567 UART: [state] CFI Enabled
2,876,894 UART: [fht] FMC Alias Private Key: 7
2,984,625 UART: [art] Extend RT PCRs Done
2,985,053 UART: [art] Lock RT PCRs Done
2,986,817 UART: [art] Populate DV Done
2,994,946 UART: [fht] FMC Alias Private Key: 7
2,995,888 UART: [art] Derive CDI
2,996,168 UART: [art] Store in in slot 0x4
3,081,759 UART: [art] Derive Key Pair
3,082,119 UART: [art] Store priv key in slot 0x5
3,095,131 UART: [art] Derive Key Pair - Done
3,109,635 UART: [art] Signing Cert with AUTHO
3,110,115 UART: RITY.KEYID = 7
3,125,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,152 UART: [art] PUB.X = EE8CDB156CABE145B86C66F7E2AE515E6D029596B179BDB400C56EA993E830464D6BEB630C068594C168A162A75C91BA
3,132,901 UART: [art] PUB.Y = 161E708DAAEC274F3D1AE3DD920EDD79BF339E39AC41822F2DC0BAC0DE4C33D0C0F955F167307D54F71005DE73E3C3E7
3,139,863 UART: [art] SIG.R = F420FFE16B08F0C1CE9E8AA64B0515FC3A43DC2D915314E4B62850363FF72ABB432EBC20F90AEAFB8F6D6AA4634199F3
3,146,642 UART: [art] SIG.S = E1757629C54F626E6A20C5FEC34A21EA66FBA2CDC05CA4847540194DEC333754ED16B42AA5139D856508BEA2BBA4CBE9
3,170,434 UART: Caliptra RT
3,170,687 UART: [state] CFI Enabled
3,279,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,911 UART: [rt]cmd =0x43415053, len=4
3,311,173 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 ready_for_fw is high
1,059,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,817 >>> mbox cmd response: success
2,628,817 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,690,499 UART:
2,690,515 UART: Running Caliptra FMC ...
2,690,923 UART:
2,690,977 UART: [state] CFI Enabled
2,701,424 UART: [fht] FMC Alias Private Key: 7
2,809,219 UART: [art] Extend RT PCRs Done
2,809,647 UART: [art] Lock RT PCRs Done
2,811,259 UART: [art] Populate DV Done
2,819,700 UART: [fht] FMC Alias Private Key: 7
2,820,788 UART: [art] Derive CDI
2,821,068 UART: [art] Store in in slot 0x4
2,906,899 UART: [art] Derive Key Pair
2,907,259 UART: [art] Store priv key in slot 0x5
2,920,879 UART: [art] Derive Key Pair - Done
2,935,492 UART: [art] Signing Cert with AUTHO
2,935,972 UART: RITY.KEYID = 7
2,950,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,599 UART: [art] PUB.X = 19CDF82252B733800FB092ECCDEF43057D48AA683D7F78D94B3E0898B6941A46E7BBEAA66654EA5126F63F71A5B26771
2,958,366 UART: [art] PUB.Y = 6F1BC41554F0A68F97EC6037A860F484AE90156F91C318A044E8E9B35AA404D163A9FDB6AFDE3F6BE200D06CCFD1B347
2,965,305 UART: [art] SIG.R = 89E338C2ED1469456EA4ED322E6115E296D42786FA33CEC79947175DC77EC62FF1A5B0B54EBC2E2BD826F4745A297373
2,972,079 UART: [art] SIG.S = B35C46C7EF16DBFD146D5915C1669D67EAC1F745D31663E65BC2740C62075A023D5552C279C9668329D1CE39E9D13B0B
2,995,884 UART: Caliptra RT
2,996,137 UART: [state] CFI Enabled
3,104,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,217 UART: [rt]cmd =0x43415053, len=4
3,135,489 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,913 UART: [kat] HMAC-384Kdf
923,647 UART: [kat] LMS
1,171,975 UART: [kat] --
1,173,040 UART: [cold-reset] ++
1,173,608 UART: [fht] FHT @ 0x50003400
1,176,147 UART: [idev] ++
1,176,315 UART: [idev] CDI.KEYID = 6
1,176,675 UART: [idev] SUBJECT.KEYID = 7
1,177,099 UART: [idev] UDS.KEYID = 0
1,177,444 ready_for_fw is high
1,177,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,651 UART: [idev] Erasing UDS.KEYID = 0
1,202,116 UART: [idev] Sha1 KeyId Algorithm
1,210,500 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,164 UART: [ldev] Erasing FE.KEYID = 1
1,244,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,454 UART: [ldev] --
1,283,885 UART: [fwproc] Wait for Commands...
1,284,669 UART: [fwproc] Recv command 0x46574c44
1,285,397 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,069 >>> mbox cmd response: success
2,777,069 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,778,221 UART: [afmc] ++
2,778,389 UART: [afmc] CDI.KEYID = 6
2,778,751 UART: [afmc] SUBJECT.KEYID = 7
2,779,176 UART: [afmc] AUTHORITY.KEYID = 5
2,815,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,633 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,192 UART: [afmc] --
2,858,106 UART: [cold-reset] --
2,859,016 UART: [state] Locking Datavault
2,860,317 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,921 UART: [state] Locking ICCM
2,861,393 UART: [exit] Launching FMC @ 0x40000130
2,866,722 UART:
2,866,738 UART: Running Caliptra FMC ...
2,867,146 UART:
2,867,289 UART: [state] CFI Enabled
2,878,142 UART: [fht] FMC Alias Private Key: 7
2,985,581 UART: [art] Extend RT PCRs Done
2,986,009 UART: [art] Lock RT PCRs Done
2,987,375 UART: [art] Populate DV Done
2,995,714 UART: [fht] FMC Alias Private Key: 7
2,996,894 UART: [art] Derive CDI
2,997,174 UART: [art] Store in in slot 0x4
3,082,493 UART: [art] Derive Key Pair
3,082,853 UART: [art] Store priv key in slot 0x5
3,095,811 UART: [art] Derive Key Pair - Done
3,110,922 UART: [art] Signing Cert with AUTHO
3,111,402 UART: RITY.KEYID = 7
3,127,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,795 UART: [art] PUB.X = 13FE376AFCE394BCFE0F40966CD8FC00691AA0DF1DFC7404AF5EF71DC4C9AEB3DB0BFE0774A515585B8A95117930F80C
3,134,550 UART: [art] PUB.Y = D56255AAE3D83B8A8DAF9BBFDCE43AEB687FCCEAF95E1FD412C11D00ACF63987EF7C9860F704800B18BF68A52ECD6474
3,141,498 UART: [art] SIG.R = 167CA3CECC910E235F59BF6AA814EE4833B172A860908E379737C5E2A89AB8DAC28A1390BA56C87D56B478BAF85CD672
3,148,275 UART: [art] SIG.S = 4335E5298A87028E6A24823D7092BBF7CD6C0753505A62E7464503F725FE260C48D6C221282E8FFF93E3A8AF22DA0B54
3,172,375 UART: Caliptra RT
3,172,720 UART: [state] CFI Enabled
3,280,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,807 UART: [rt]cmd =0x43415053, len=4
3,312,197 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,194 ready_for_fw is high
1,061,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,642 >>> mbox cmd response: success
2,629,642 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,691,322 UART:
2,691,338 UART: Running Caliptra FMC ...
2,691,746 UART:
2,691,889 UART: [state] CFI Enabled
2,702,206 UART: [fht] FMC Alias Private Key: 7
2,809,901 UART: [art] Extend RT PCRs Done
2,810,329 UART: [art] Lock RT PCRs Done
2,812,043 UART: [art] Populate DV Done
2,820,090 UART: [fht] FMC Alias Private Key: 7
2,821,030 UART: [art] Derive CDI
2,821,310 UART: [art] Store in in slot 0x4
2,906,791 UART: [art] Derive Key Pair
2,907,151 UART: [art] Store priv key in slot 0x5
2,920,817 UART: [art] Derive Key Pair - Done
2,935,600 UART: [art] Signing Cert with AUTHO
2,936,080 UART: RITY.KEYID = 7
2,951,866 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,631 UART: [art] PUB.X = 81B6F21B9497E853394FD3948D6F8904093FE4EC069E46F00A9C324ED10ADD475566547F1C3465B692B16466E23351BA
2,959,380 UART: [art] PUB.Y = E644FE52910CAB6A64D41B743C59E6A9F9A2AD3BA2E09BEE9011526DA97AAD66B346A0AEDAF004028461CD2752283C5C
2,966,335 UART: [art] SIG.R = 91626CC06E8BE22B9F9D36E868F152D004173F8837881ABA94204995C9AAAE819DECD854484959F9BFEE94014E22BE11
2,973,101 UART: [art] SIG.S = A9ED4DB377238923EF927FCABB3A19CED556F76475C7D22593A11C126B8788C6B1871720533DBD20AE8F8359F9B68C02
2,996,759 UART: Caliptra RT
2,997,104 UART: [state] CFI Enabled
3,104,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,796 UART: [rt]cmd =0x43415053, len=4
3,135,944 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 ready_for_fw is high
1,174,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,273 UART: [idev] --
1,209,348 UART: [ldev] ++
1,209,516 UART: [ldev] CDI.KEYID = 6
1,209,880 UART: [ldev] SUBJECT.KEYID = 5
1,210,307 UART: [ldev] AUTHORITY.KEYID = 7
1,210,770 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,479 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,520 >>> mbox cmd response: success
2,774,520 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,757 UART: [afmc] ++
2,775,925 UART: [afmc] CDI.KEYID = 6
2,776,288 UART: [afmc] SUBJECT.KEYID = 7
2,776,714 UART: [afmc] AUTHORITY.KEYID = 5
2,812,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,426 UART: [afmc] --
2,855,470 UART: [cold-reset] --
2,856,400 UART: [state] Locking Datavault
2,857,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,007 UART: [state] Locking ICCM
2,858,617 UART: [exit] Launching FMC @ 0x40000130
2,863,946 UART:
2,863,962 UART: Running Caliptra FMC ...
2,864,370 UART:
2,864,424 UART: [state] CFI Enabled
2,874,789 UART: [fht] FMC Alias Private Key: 7
2,982,450 UART: [art] Extend RT PCRs Done
2,982,878 UART: [art] Lock RT PCRs Done
2,984,402 UART: [art] Populate DV Done
2,992,627 UART: [fht] FMC Alias Private Key: 7
2,993,715 UART: [art] Derive CDI
2,993,995 UART: [art] Store in in slot 0x4
3,079,224 UART: [art] Derive Key Pair
3,079,584 UART: [art] Store priv key in slot 0x5
3,092,708 UART: [art] Derive Key Pair - Done
3,107,481 UART: [art] Signing Cert with AUTHO
3,107,961 UART: RITY.KEYID = 7
3,123,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,138 UART: [art] PUB.X = CCE80C2FB53A03BBFECE67B60EA57312EB35EEBD5E5993933AE2EEFAF32AFD706ACDD96687727DAACFCF9A1343E2633B
3,130,931 UART: [art] PUB.Y = 62F06EAAECCE5954F2012E0DA94D45743B94F85D01F0A1C1D69555C2E10D2DADDF821BC9A9617767FA9D9B369C33498C
3,137,881 UART: [art] SIG.R = 6C0C34EC707A5480ACF03F67F84A9240C4BEBBF670B25E7F9E335B903D6F63F264231B27EA9124F0CFDF4B1782AB2529
3,144,658 UART: [art] SIG.S = 95C4FE2EBCD2CB71E4561526176920267352D82A53AD104034B1857C04888D394016EC9CF080A9C157D0775BA2DB929E
3,168,684 UART: Caliptra RT
3,168,937 UART: [state] CFI Enabled
3,275,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,490 UART: [rt]cmd =0x43415053, len=4
3,307,676 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,272 ready_for_fw is high
1,055,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,900 >>> mbox cmd response: success
2,622,900 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,685,522 UART:
2,685,538 UART: Running Caliptra FMC ...
2,685,946 UART:
2,686,000 UART: [state] CFI Enabled
2,696,289 UART: [fht] FMC Alias Private Key: 7
2,803,880 UART: [art] Extend RT PCRs Done
2,804,308 UART: [art] Lock RT PCRs Done
2,805,990 UART: [art] Populate DV Done
2,814,117 UART: [fht] FMC Alias Private Key: 7
2,815,211 UART: [art] Derive CDI
2,815,491 UART: [art] Store in in slot 0x4
2,901,380 UART: [art] Derive Key Pair
2,901,740 UART: [art] Store priv key in slot 0x5
2,915,308 UART: [art] Derive Key Pair - Done
2,929,876 UART: [art] Signing Cert with AUTHO
2,930,356 UART: RITY.KEYID = 7
2,945,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,413 UART: [art] PUB.X = CD648D68D3342BC45DC64D6850E0B4D8E714FC5ECABFC0577135C7B411048B1D27CE6A6C51076C9508A87A3897B7F59E
2,953,182 UART: [art] PUB.Y = 49B8DBC4379516FA824043E89E020AEACED84851F10A6FEDB943B1BCCC9103EB63BE464FF41E6CAC3A6327A0E871D4CF
2,960,140 UART: [art] SIG.R = 60258CA59F255C3C3B3042D25D1B8404923EB3BB4C903B646FD806899D84ED73C75E9366889A70A718A36C5B9A5C8F2D
2,966,904 UART: [art] SIG.S = C56134031BFAE0520F1AD6D7EE3A55CB1CA18E6825911B26044872FCA21183D97EEE207BD7B409997CE6CA6556355C67
2,991,097 UART: Caliptra RT
2,991,350 UART: [state] CFI Enabled
3,099,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,901 UART: [rt]cmd =0x43415053, len=4
3,131,051 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,174,474 ready_for_fw is high
1,174,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,223 UART: [ldev] ++
1,209,391 UART: [ldev] CDI.KEYID = 6
1,209,755 UART: [ldev] SUBJECT.KEYID = 5
1,210,182 UART: [ldev] AUTHORITY.KEYID = 7
1,210,645 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,291 UART: [fwproc] Wait for Commands...
1,282,902 UART: [fwproc] Recv command 0x46574c44
1,283,635 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,517 >>> mbox cmd response: success
2,776,517 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,777,736 UART: [afmc] ++
2,777,904 UART: [afmc] CDI.KEYID = 6
2,778,267 UART: [afmc] SUBJECT.KEYID = 7
2,778,693 UART: [afmc] AUTHORITY.KEYID = 5
2,814,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,577 UART: [afmc] --
2,857,597 UART: [cold-reset] --
2,858,583 UART: [state] Locking Datavault
2,859,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,142 UART: [state] Locking ICCM
2,860,812 UART: [exit] Launching FMC @ 0x40000130
2,866,141 UART:
2,866,157 UART: Running Caliptra FMC ...
2,866,565 UART:
2,866,708 UART: [state] CFI Enabled
2,877,263 UART: [fht] FMC Alias Private Key: 7
2,985,340 UART: [art] Extend RT PCRs Done
2,985,768 UART: [art] Lock RT PCRs Done
2,987,614 UART: [art] Populate DV Done
2,995,705 UART: [fht] FMC Alias Private Key: 7
2,996,835 UART: [art] Derive CDI
2,997,115 UART: [art] Store in in slot 0x4
3,082,814 UART: [art] Derive Key Pair
3,083,174 UART: [art] Store priv key in slot 0x5
3,096,412 UART: [art] Derive Key Pair - Done
3,111,201 UART: [art] Signing Cert with AUTHO
3,111,681 UART: RITY.KEYID = 7
3,126,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,724 UART: [art] PUB.X = 6241D2328471E50A88F3216FC34758B14D1BC73A51BC9F6C9DE201B6972E2580EBD4AA062B57633BF6270B6BFFB2BD98
3,134,488 UART: [art] PUB.Y = 90D19AA4C75F55FD365F279BE515FCFAD12BCF1D640112B18CBBB1917E2B7DB9EF07CCAC74170C3FBEAA9663A25D3473
3,141,451 UART: [art] SIG.R = 29F103F48275694C50F7B6279B555A2DB41A5DAACCA43A25196C71BA6C5216DF4D363E65ACC3F8B991447B1D3B4014F6
3,148,224 UART: [art] SIG.S = E59AFE4315D45A6D4D617E6ADF412BEECBAD15C6E08056FC2278BB123384561FFE4D9DF132C389034903671F096BACA4
3,172,056 UART: Caliptra RT
3,172,401 UART: [state] CFI Enabled
3,280,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,406 UART: [rt]cmd =0x43415053, len=4
3,312,710 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,623 ready_for_fw is high
1,056,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,359 >>> mbox cmd response: success
2,624,359 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,217 UART:
2,686,233 UART: Running Caliptra FMC ...
2,686,641 UART:
2,686,784 UART: [state] CFI Enabled
2,697,301 UART: [fht] FMC Alias Private Key: 7
2,805,260 UART: [art] Extend RT PCRs Done
2,805,688 UART: [art] Lock RT PCRs Done
2,807,108 UART: [art] Populate DV Done
2,815,523 UART: [fht] FMC Alias Private Key: 7
2,816,633 UART: [art] Derive CDI
2,816,913 UART: [art] Store in in slot 0x4
2,902,482 UART: [art] Derive Key Pair
2,902,842 UART: [art] Store priv key in slot 0x5
2,915,858 UART: [art] Derive Key Pair - Done
2,930,761 UART: [art] Signing Cert with AUTHO
2,931,241 UART: RITY.KEYID = 7
2,946,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,170 UART: [art] PUB.X = 0CF3F001AFBC094399E76064002374883789F98B1F0377D5A99B70301C25A74A8014DBB3A7017219F9188A9A88358C0C
2,953,890 UART: [art] PUB.Y = 8E0F2681F2654B3C494F90B429EC2472E515F4EDCE004A2A55D2F847650F725AA76708792180E18833544A7D7ED9B8F4
2,960,805 UART: [art] SIG.R = B28F62BEDA73C61C289B2BB5FB76DD713F0D55F1B9D6662AB00979DC21BED55B0C09007E30FC7B094F368B29EED5988C
2,967,554 UART: [art] SIG.S = A32016C87474B93A3D574D58321A36D791C953E0D4705FF7068478B44AF05FB6086A940D1D97725E855E433807AFE827
2,991,197 UART: Caliptra RT
2,991,542 UART: [state] CFI Enabled
3,100,270 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,070 UART: [rt]cmd =0x43415053, len=4
3,132,202 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,370,478 UART: [ldev] SUBJECT.KEYID = 5
7,371,693 UART: [ldev] AUTHORITY.KEYID = 7
7,372,971 UART: [ldev] FE.KEYID = 1
7,421,970 UART: [ldev] Erasing FE.KEYID = 1
10,756,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,525 UART: [ldev] --
13,137,383 UART: [fwproc] Waiting for Commands...
13,139,963 UART: [fwproc] Received command 0x46574c44
13,142,142 UART: [fwproc] Received Image of size 114124 bytes
17,196,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,657,971 >>> mbox cmd response: success
17,659,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,662,811 UART: [afmc] ++
17,663,453 UART: [afmc] CDI.KEYID = 6
17,664,337 UART: [afmc] SUBJECT.KEYID = 7
17,665,609 UART: [afmc] AUTHORITY.KEYID = 5
21,027,243 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,019 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,282 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,343,861 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,358,643 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,373,161 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,394,223 UART: [afmc] --
23,397,924 UART: [cold-reset] --
23,402,379 UART: [state] Locking Datavault
23,409,188 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,939 UART: [state] Locking ICCM
23,412,630 UART: [exit] Launching FMC @ 0x40000130
23,421,018 UART:
23,421,263 UART: Running Caliptra FMC ...
23,422,290 UART:
23,422,436 UART: [state] CFI Enabled
23,487,462 UART: [fht] FMC Alias Private Key: 7
25,825,113 UART: [art] Extend RT PCRs Done
25,826,340 UART: [art] Lock RT PCRs Done
25,827,960 UART: [art] Populate DV Done
25,833,145 UART: [fht] FMC Alias Private Key: 7
25,834,856 UART: [art] Derive CDI
25,835,597 UART: [art] Store in in slot 0x4
25,895,901 UART: [art] Derive Key Pair
25,896,899 UART: [art] Store priv key in slot 0x5
29,189,528 UART: [art] Derive Key Pair - Done
29,202,628 UART: [art] Signing Cert with AUTHO
29,203,924 UART: RITY.KEYID = 7
31,490,705 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,203 UART: [art] PUB.X = 085A072B4E0860D8A29BD01B7ECF41BDE5F2E95D4077AAB7DDDBA1C979B5941FCA8D3DC36B18FC1E4053B3A54E41D863
31,499,517 UART: [art] PUB.Y = 694DBA1C264995FE9A6DBB506F8B91315FD9DBC9989B4A643D70D8161A15FCACFCC5F6D421E4CBCA5EEC77595E53AA77
31,506,747 UART: [art] SIG.R = 8D763F8F2E7D69E1ADBFCC9162DD43305A32334063EE8DA79945E67A37A9D4E75FF40BC063A5F69B195592AE99E858CC
31,514,187 UART: [art] SIG.S = 8EC6DA49EDBE9D18CF02995342CE8533D585FBF4342FE5844FBBFAF85CFCA7493F3354C2EDB012165DDE9584A7300002
32,818,941 UART: Caliptra RT
32,819,656 UART: [state] CFI Enabled
32,979,584 UART: [rt] RT listening for mailbox commands...
33,011,005 UART: [rt]cmd =0x494e464f, len=4
33,014,917 >>> mbox cmd response data (264 bytes)
35,146,732 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,292,006 UART:
35,292,376 UART: Running Caliptra ROM ...
35,293,515 UART:
35,293,690 UART: [state] CFI Enabled
35,351,889 UART: [state] LifecycleState = Unprovisioned
35,353,845 UART: [state] DebugLocked = No
35,355,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,360,297 UART: [kat] SHA2-256
35,530,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,540,488 UART: [kat] ++
35,540,973 UART: [kat] sha1
35,552,183 UART: [kat] SHA2-256
35,554,927 UART: [kat] SHA2-384
35,561,285 UART: [kat] SHA2-512-ACC
35,563,632 UART: [kat] ECC-384
37,852,339 UART: [kat] HMAC-384Kdf
37,886,341 UART: [kat] LMS
39,076,658 UART: [kat] --
39,081,008 UART: [update-reset] ++
43,216,452 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,220,187 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,602,467 >>> mbox cmd response: success
43,604,055 UART: [update-reset] Copying MAN_2 To MAN_1
43,626,500 UART: [update-reset Success] --
43,631,161 UART: [state] Locking Datavault
43,634,958 UART: [state] Locking PCR0, PCR1 and PCR31
43,636,655 UART: [state] Locking ICCM
43,638,163 UART: [exit] Launching FMC @ 0x40000130
43,646,560 UART:
43,646,794 UART: Running Caliptra FMC ...
43,647,893 UART:
43,648,056 UART: [state] CFI Enabled
43,743,906 UART: [art] Extend RT PCRs Done
43,745,090 UART: [art] Lock RT PCRs Done
43,746,498 UART: [art] Populate DV Done
43,751,915 UART: [fht] FMC Alias Private Key: 7
43,753,498 UART: [art] Derive CDI
43,754,287 UART: [art] Store in in slot 0x4
43,812,577 UART: [art] Derive Key Pair
43,813,576 UART: [art] Store priv key in slot 0x5
47,106,031 UART: [art] Derive Key Pair - Done
47,118,972 UART: [art] Signing Cert with AUTHO
47,120,314 UART: RITY.KEYID = 7
49,408,519 UART: [art] Erasing AUTHORITY.KEYID = 7
49,410,030 UART: [art] PUB.X = 4338583EA67B1B274B4B1FB9AB4545B2D3E4435FBE2D8A9B29BEFF9C12C48E29C642216040AF726774E847BB21F6DB5F
49,417,295 UART: [art] PUB.Y = 49DC48CBE48A341496A2865061A54887FC7FCC13895AB97F2C5A9995404338FB8C392FADAF493BD06774E00D460DABE9
49,424,538 UART: [art] SIG.R = 3B3D7B05365466263365DA84724BA323C9C6929448D845E8FFA044C086F99E8688B9003B9DF3A9167D68AB1B711950D8
49,431,918 UART: [art] SIG.S = 9122CF03FA2C2D987DF587F85DD0B87C319B8F5D59F396E6F3CB1D747FF2C04F394766C0EC0D70B863BB14D445A5DC50
50,737,601 UART: Caliptra RT
50,738,311 UART: [state] CFI Enabled
51,069,088 UART: [rt] RT listening for mailbox commands...
51,070,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,100,664 UART: [rt]cmd =0x494e464f, len=4
51,104,535 >>> mbox cmd response data (264 bytes)
53,233,072 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,378,127 UART:
53,378,487 UART: Running Caliptra ROM ...
53,379,573 UART:
53,379,740 UART: [state] CFI Enabled
53,437,757 UART: [state] LifecycleState = Unprovisioned
53,439,699 UART: [state] DebugLocked = No
53,441,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,446,543 UART: [kat] SHA2-256
53,616,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,626,765 UART: [kat] ++
53,627,245 UART: [kat] sha1
53,638,077 UART: [kat] SHA2-256
53,640,768 UART: [kat] SHA2-384
53,646,434 UART: [kat] SHA2-512-ACC
53,648,835 UART: [kat] ECC-384
55,943,800 UART: [kat] HMAC-384Kdf
55,975,063 UART: [kat] LMS
57,165,375 UART: [kat] --
57,170,251 UART: [update-reset] ++
61,307,922 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,312,029 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,694,307 >>> mbox cmd response: success
61,695,101 UART: [update-reset] Copying MAN_2 To MAN_1
61,717,547 UART: [update-reset Success] --
61,723,724 UART: [state] Locking Datavault
61,727,728 UART: [state] Locking PCR0, PCR1 and PCR31
61,729,499 UART: [state] Locking ICCM
61,731,654 UART: [exit] Launching FMC @ 0x40000130
61,740,046 UART:
61,740,289 UART: Running Caliptra FMC ...
61,741,391 UART:
61,741,554 UART: [state] CFI Enabled
61,829,369 UART: [art] Extend RT PCRs Done
61,830,559 UART: [art] Lock RT PCRs Done
61,832,178 UART: [art] Populate DV Done
61,837,536 UART: [fht] FMC Alias Private Key: 7
61,839,069 UART: [art] Derive CDI
61,839,887 UART: [art] Store in in slot 0x4
61,898,871 UART: [art] Derive Key Pair
61,899,869 UART: [art] Store priv key in slot 0x5
65,192,477 UART: [art] Derive Key Pair - Done
65,205,196 UART: [art] Signing Cert with AUTHO
65,206,527 UART: RITY.KEYID = 7
67,494,420 UART: [art] Erasing AUTHORITY.KEYID = 7
67,495,928 UART: [art] PUB.X = 0D2397B427A829335DF9F8170EFDF9536341E5E74C7B70BD5127F8D7DD7CD1CF4569C96F5742A35B8C40EFCEA53BD9F0
67,503,199 UART: [art] PUB.Y = 1203FD2E88BE446F9B1DE1190B5A72EAA4F02998A04D348BC7A6584B95A867AB470D4981E1923B3EA9487A757CF0CB75
67,510,434 UART: [art] SIG.R = A0330D940B07B4F11749F90990E80D2213AB47C4F3497229F5E0C9DD69E67F0BC768A18C6065EB44C2A75B59130C1BD1
67,517,793 UART: [art] SIG.S = AA35CA89FD108E1AA8A4356C711828C1BBABC221864AABE29AEC117BB4C0F6EE0B0A388125EC7BFC1A4A2DFDD1E902D7
68,823,080 UART: Caliptra RT
68,823,772 UART: [state] CFI Enabled
69,156,218 UART: [rt] RT listening for mailbox commands...
69,158,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,187,858 UART: [rt]cmd =0x494e464f, len=4
69,191,710 >>> mbox cmd response data (264 bytes)
69,193,392 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
69,337,526 UART:
69,337,825 UART: Running Caliptra ROM ...
69,338,943 UART:
69,339,139 UART: [state] CFI Enabled
69,413,906 UART: [state] LifecycleState = Unprovisioned
69,415,837 UART: [state] DebugLocked = No
69,417,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,422,876 UART: [kat] SHA2-256
69,592,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,603,038 UART: [kat] ++
69,603,528 UART: [kat] sha1
69,615,065 UART: [kat] SHA2-256
69,617,759 UART: [kat] SHA2-384
69,623,584 UART: [kat] SHA2-512-ACC
69,625,993 UART: [kat] ECC-384
71,916,270 UART: [kat] HMAC-384Kdf
71,927,843 UART: [kat] LMS
73,118,175 UART: [kat] --
73,122,167 UART: [update-reset] ++
77,264,587 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,268,952 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
77,651,204 >>> mbox cmd response: success
77,652,739 UART: [update-reset] Copying MAN_2 To MAN_1
77,675,141 UART: [update-reset Success] --
77,680,222 UART: [state] Locking Datavault
77,682,394 UART: [state] Locking PCR0, PCR1 and PCR31
77,684,098 UART: [state] Locking ICCM
77,686,009 UART: [exit] Launching FMC @ 0x40000130
77,694,400 UART:
77,694,642 UART: Running Caliptra FMC ...
77,695,670 UART:
77,695,818 UART: [state] CFI Enabled
77,784,678 UART: [art] Extend RT PCRs Done
77,785,860 UART: [art] Lock RT PCRs Done
77,787,400 UART: [art] Populate DV Done
77,792,767 UART: [fht] FMC Alias Private Key: 7
77,794,461 UART: [art] Derive CDI
77,795,199 UART: [art] Store in in slot 0x4
77,853,640 UART: [art] Derive Key Pair
77,854,674 UART: [art] Store priv key in slot 0x5
81,147,232 UART: [art] Derive Key Pair - Done
81,160,234 UART: [art] Signing Cert with AUTHO
81,161,545 UART: RITY.KEYID = 7
83,448,976 UART: [art] Erasing AUTHORITY.KEYID = 7
83,450,485 UART: [art] PUB.X = 4338583EA67B1B274B4B1FB9AB4545B2D3E4435FBE2D8A9B29BEFF9C12C48E29C642216040AF726774E847BB21F6DB5F
83,457,742 UART: [art] PUB.Y = 49DC48CBE48A341496A2865061A54887FC7FCC13895AB97F2C5A9995404338FB8C392FADAF493BD06774E00D460DABE9
83,464,993 UART: [art] SIG.R = 3B3D7B05365466263365DA84724BA323C9C6929448D845E8FFA044C086F99E8688B9003B9DF3A9167D68AB1B711950D8
83,472,340 UART: [art] SIG.S = 9122CF03FA2C2D987DF587F85DD0B87C319B8F5D59F396E6F3CB1D747FF2C04F394766C0EC0D70B863BB14D445A5DC50
84,777,813 UART: Caliptra RT
84,778,529 UART: [state] CFI Enabled
85,109,460 UART: [rt] RT listening for mailbox commands...
85,111,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,141,135 UART: [rt]cmd =0x494e464f, len=4
85,145,250 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,796,628 ready_for_fw is high
3,797,181 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,356 >>> mbox cmd response: success
17,861,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,558,912 UART:
23,559,294 UART: Running Caliptra FMC ...
23,560,398 UART:
23,560,553 UART: [state] CFI Enabled
23,629,184 UART: [fht] FMC Alias Private Key: 7
25,966,612 UART: [art] Extend RT PCRs Done
25,967,837 UART: [art] Lock RT PCRs Done
25,969,168 UART: [art] Populate DV Done
25,974,483 UART: [fht] FMC Alias Private Key: 7
25,976,024 UART: [art] Derive CDI
25,976,784 UART: [art] Store in in slot 0x4
26,037,311 UART: [art] Derive Key Pair
26,038,353 UART: [art] Store priv key in slot 0x5
29,330,586 UART: [art] Derive Key Pair - Done
29,343,908 UART: [art] Signing Cert with AUTHO
29,345,220 UART: RITY.KEYID = 7
31,631,766 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,278 UART: [art] PUB.X = D092ECB0D0502C2EC75B01311AB05A5980FB84DF8A7FEA2E3E2B48EAE079AAC08C667640DF448042B3B4F2D1506EE3CD
31,640,526 UART: [art] PUB.Y = 634550572E5AA3DAB4624905AFAF18957D9AF0193D5ABD2CD8875CFA9BEE9605B34B5C0229B17CB59E4D9EB6EB919F60
31,647,818 UART: [art] SIG.R = ED4B0A9D0E083BA584F68CAA9BDBA9DCBF50DC1A74526BBD985A7D74F5473A6DBA779D978D7CCA7939E53CFEA0ED4FE7
31,655,213 UART: [art] SIG.S = 31CD875B466E22B618276E4AC514C7CA5383910AF5871D71F4C9F5C320DC33A5486DDDE1FC811AAD9983F8BD53461CCE
32,959,687 UART: Caliptra RT
32,960,390 UART: [state] CFI Enabled
33,121,695 UART: [rt] RT listening for mailbox commands...
33,152,957 UART: [rt]cmd =0x494e464f, len=4
33,156,976 >>> mbox cmd response data (264 bytes)
35,290,150 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
44,023,245 >>> mbox cmd response: success
44,056,264 UART:
44,056,560 UART: Running Caliptra FMC ...
44,057,683 UART:
44,057,858 UART: [state] CFI Enabled
44,145,559 UART: [art] Extend RT PCRs Done
44,146,745 UART: [art] Lock RT PCRs Done
44,148,303 UART: [art] Populate DV Done
44,153,703 UART: [fht] FMC Alias Private Key: 7
44,155,253 UART: [art] Derive CDI
44,156,078 UART: [art] Store in in slot 0x4
44,215,129 UART: [art] Derive Key Pair
44,216,124 UART: [art] Store priv key in slot 0x5
47,509,048 UART: [art] Derive Key Pair - Done
47,521,676 UART: [art] Signing Cert with AUTHO
47,522,988 UART: RITY.KEYID = 7
49,809,946 UART: [art] Erasing AUTHORITY.KEYID = 7
49,811,455 UART: [art] PUB.X = F04A162FC35C1A8BB22AC9A752E3551B9E2121924D5963164BA87DF7E7A9B653AB413E5F06ECDABC823A4483C52D2848
49,818,702 UART: [art] PUB.Y = 12728DB5CCE0A8BBE77C44697628FAEDD6EB99F03F08FF2EECED2110F83BE8BDE59B75B05E9088A55D0E59E12D882130
49,825,993 UART: [art] SIG.R = 747297F67CB4AFC557D1C2BC60ACA64DBD3D08CA1126C91BE3B303D90F5C9C7EC20709C5C37FB9F2D50F2E0C07671E25
49,833,419 UART: [art] SIG.S = ADC3B8F2D1E022047C675BF663DA01DB96F01429E8C759DA44325922C966CFCBD559BA2390FDBD66AE4F72BB068D016E
51,137,915 UART: Caliptra RT
51,138,634 UART: [state] CFI Enabled
51,470,739 UART: [rt] RT listening for mailbox commands...
51,472,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,502,376 UART: [rt]cmd =0x494e464f, len=4
51,506,225 >>> mbox cmd response data (264 bytes)
53,639,712 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
62,371,874 >>> mbox cmd response: success
62,405,516 UART:
62,405,846 UART: Running Caliptra FMC ...
62,406,970 UART:
62,407,144 UART: [state] CFI Enabled
62,511,373 UART: [art] Extend RT PCRs Done
62,512,561 UART: [art] Lock RT PCRs Done
62,513,875 UART: [art] Populate DV Done
62,519,420 UART: [fht] FMC Alias Private Key: 7
62,521,124 UART: [art] Derive CDI
62,521,861 UART: [art] Store in in slot 0x4
62,580,084 UART: [art] Derive Key Pair
62,581,135 UART: [art] Store priv key in slot 0x5
65,873,917 UART: [art] Derive Key Pair - Done
65,886,915 UART: [art] Signing Cert with AUTHO
65,888,225 UART: RITY.KEYID = 7
68,175,229 UART: [art] Erasing AUTHORITY.KEYID = 7
68,176,735 UART: [art] PUB.X = 45219DA922FB525BC2504A29274B7C306BE5C34FABCAE47949F445116BEB34EE0279712F09A426D3CDF624FB90D7F6A8
68,183,982 UART: [art] PUB.Y = 20D691E0D88456B335B2F0E18A79DF4B56F1EC720116A9DD8F70B08471010758AD379754613615A168B397CBB0341570
68,191,216 UART: [art] SIG.R = 23942DF45846F35BEC19CEB28C80907B77141DCE2048152BF32AD18EF0BEFD155622436DE740B449F81BFDA8CA42E3B8
68,198,610 UART: [art] SIG.S = AC5EB55E3E74D84D2F3C1A6A2360B6A1D6A70BA8087A56638B09707A55B6A995356FF38A07F9FF71BF15E05788E07139
69,504,139 UART: Caliptra RT
69,504,844 UART: [state] CFI Enabled
69,833,016 UART: [rt] RT listening for mailbox commands...
69,834,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,864,698 UART: [rt]cmd =0x494e464f, len=4
69,868,551 >>> mbox cmd response data (264 bytes)
69,870,211 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
78,585,258 >>> mbox cmd response: success
78,617,345 UART:
78,617,614 UART: Running Caliptra FMC ...
78,618,728 UART:
78,618,889 UART: [state] CFI Enabled
78,719,519 UART: [art] Extend RT PCRs Done
78,720,723 UART: [art] Lock RT PCRs Done
78,722,071 UART: [art] Populate DV Done
78,727,757 UART: [fht] FMC Alias Private Key: 7
78,729,352 UART: [art] Derive CDI
78,730,166 UART: [art] Store in in slot 0x4
78,788,655 UART: [art] Derive Key Pair
78,789,710 UART: [art] Store priv key in slot 0x5
82,083,014 UART: [art] Derive Key Pair - Done
82,096,071 UART: [art] Signing Cert with AUTHO
82,097,368 UART: RITY.KEYID = 7
84,384,385 UART: [art] Erasing AUTHORITY.KEYID = 7
84,385,893 UART: [art] PUB.X = F04A162FC35C1A8BB22AC9A752E3551B9E2121924D5963164BA87DF7E7A9B653AB413E5F06ECDABC823A4483C52D2848
84,393,161 UART: [art] PUB.Y = 12728DB5CCE0A8BBE77C44697628FAEDD6EB99F03F08FF2EECED2110F83BE8BDE59B75B05E9088A55D0E59E12D882130
84,400,399 UART: [art] SIG.R = 747297F67CB4AFC557D1C2BC60ACA64DBD3D08CA1126C91BE3B303D90F5C9C7EC20709C5C37FB9F2D50F2E0C07671E25
84,407,795 UART: [art] SIG.S = ADC3B8F2D1E022047C675BF663DA01DB96F01429E8C759DA44325922C966CFCBD559BA2390FDBD66AE4F72BB068D016E
85,712,849 UART: Caliptra RT
85,713,560 UART: [state] CFI Enabled
86,042,512 UART: [rt] RT listening for mailbox commands...
86,044,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
86,074,249 UART: [rt]cmd =0x494e464f, len=4
86,078,243 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.42s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,649,581 UART: [ldev] SUBJECT.KEYID = 5
7,650,728 UART: [ldev] AUTHORITY.KEYID = 7
7,652,001 UART: [ldev] FE.KEYID = 1
7,665,075 UART: [ldev] Erasing FE.KEYID = 1
10,953,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,048 UART: [ldev] --
13,311,564 UART: [fwproc] Waiting for Commands...
13,314,462 UART: [fwproc] Received command 0x46574c44
13,316,632 UART: [fwproc] Received Image of size 114124 bytes
17,366,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,623 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,723 >>> mbox cmd response: success
17,828,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,831,525 UART: [afmc] ++
17,832,108 UART: [afmc] CDI.KEYID = 6
17,833,013 UART: [afmc] SUBJECT.KEYID = 7
17,834,279 UART: [afmc] AUTHORITY.KEYID = 5
21,149,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,222 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,512 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,461,081 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,475,835 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,490,346 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,512,715 UART: [afmc] --
23,516,464 UART: [cold-reset] --
23,519,785 UART: [state] Locking Datavault
23,525,671 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,418 UART: [state] Locking ICCM
23,528,860 UART: [exit] Launching FMC @ 0x40000130
23,537,245 UART:
23,537,487 UART: Running Caliptra FMC ...
23,538,812 UART:
23,538,983 UART: [state] CFI Enabled
23,546,599 UART: [fht] FMC Alias Private Key: 7
25,877,707 UART: [art] Extend RT PCRs Done
25,878,956 UART: [art] Lock RT PCRs Done
25,880,794 UART: [art] Populate DV Done
25,886,096 UART: [fht] FMC Alias Private Key: 7
25,887,589 UART: [art] Derive CDI
25,888,320 UART: [art] Store in in slot 0x4
25,930,736 UART: [art] Derive Key Pair
25,931,721 UART: [art] Store priv key in slot 0x5
29,173,601 UART: [art] Derive Key Pair - Done
29,186,388 UART: [art] Signing Cert with AUTHO
29,187,699 UART: RITY.KEYID = 7
31,467,114 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,615 UART: [art] PUB.X = CF034EE62845BFCABCA74E08AFABE7B94AFA5906C6BF9A0251E5C2A85D85FAF0A19FF7ABEBC8671F338FD47996CE7665
31,475,912 UART: [art] PUB.Y = 3184146717ECC811DC317AF8C4F9DE17470F1E307E0CDDBF8F836AAC053F087E7A9C276B16DA97CD9A2CD9C19F5EC8C7
31,483,183 UART: [art] SIG.R = BFDA0B0EC6FE43ED6309743E4A782317DD44B7E233CAE7DDEB0E38B5C895223601F9B32BB1EBD8B19F3FE9E6907D4373
31,490,612 UART: [art] SIG.S = 0EC28A577F64AA96B72770513116A956864BF5A04A91B68836A22D11CB9E39A63D3C5385AC78D3BFE63101C153159E08
32,796,095 UART: Caliptra RT
32,796,811 UART: [state] CFI Enabled
32,913,563 UART: [rt] RT listening for mailbox commands...
32,944,706 UART: [rt]cmd =0x494e464f, len=4
32,948,713 >>> mbox cmd response data (264 bytes)
35,006,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,152,205 UART:
35,152,618 UART: Running Caliptra ROM ...
35,153,662 UART:
35,153,862 UART: [state] CFI Enabled
35,167,569 UART: [state] LifecycleState = Unprovisioned
35,169,460 UART: [state] DebugLocked = No
35,171,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,175,910 UART: [kat] SHA2-256
35,345,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,356,180 UART: [kat] ++
35,356,630 UART: [kat] sha1
35,366,428 UART: [kat] SHA2-256
35,369,115 UART: [kat] SHA2-384
35,376,558 UART: [kat] SHA2-512-ACC
35,378,911 UART: [kat] ECC-384
37,660,421 UART: [kat] HMAC-384Kdf
37,672,370 UART: [kat] LMS
38,862,400 UART: [kat] --
38,866,690 UART: [update-reset] ++
43,005,526 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,008,956 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,391,232 >>> mbox cmd response: success
43,393,260 UART: [update-reset] Copying MAN_2 To MAN_1
43,415,695 UART: [update-reset Success] --
43,419,974 UART: [state] Locking Datavault
43,423,217 UART: [state] Locking PCR0, PCR1 and PCR31
43,424,969 UART: [state] Locking ICCM
43,427,169 UART: [exit] Launching FMC @ 0x40000130
43,435,612 UART:
43,435,845 UART: Running Caliptra FMC ...
43,436,889 UART:
43,437,035 UART: [state] CFI Enabled
43,480,617 UART: [art] Extend RT PCRs Done
43,481,804 UART: [art] Lock RT PCRs Done
43,483,149 UART: [art] Populate DV Done
43,488,662 UART: [fht] FMC Alias Private Key: 7
43,490,227 UART: [art] Derive CDI
43,491,041 UART: [art] Store in in slot 0x4
43,533,575 UART: [art] Derive Key Pair
43,534,571 UART: [art] Store priv key in slot 0x5
46,776,953 UART: [art] Derive Key Pair - Done
46,790,016 UART: [art] Signing Cert with AUTHO
46,791,316 UART: RITY.KEYID = 7
49,070,981 UART: [art] Erasing AUTHORITY.KEYID = 7
49,072,497 UART: [art] PUB.X = 38D91DB86585EBCC37AD36B01166CEAB726C4AD76F1F21BAF1FEAA51D46DEB94B62A0C41B499FFEECF58C2C8C4E90B0E
49,079,802 UART: [art] PUB.Y = F81B9CFC14A068E5E828354CF65A452B8821562B5093D2E127B0F6F94FD93B208F54E3900139CBF466057A854C892A75
49,087,027 UART: [art] SIG.R = 0DE71031A1E520BED076F70BCD05BA4B87145B36FF3AA6ECED818D1E4D0098D3295C23B074B03C039FA71E9A667F49CB
49,094,417 UART: [art] SIG.S = B41DAB54611DDC2EEB5D618542AD7471C0FCC2387C6EECEE8A075F6AD115AA730346AA1C68EFDBCDD95658B856129EE0
50,399,219 UART: Caliptra RT
50,399,928 UART: [state] CFI Enabled
50,691,068 UART: [rt] RT listening for mailbox commands...
50,692,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,722,492 UART: [rt]cmd =0x494e464f, len=4
50,726,391 >>> mbox cmd response data (264 bytes)
52,779,687 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
52,924,798 UART:
52,925,169 UART: Running Caliptra ROM ...
52,926,218 UART:
52,926,420 UART: [state] CFI Enabled
52,940,422 UART: [state] LifecycleState = Unprovisioned
52,942,321 UART: [state] DebugLocked = No
52,943,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,949,368 UART: [kat] SHA2-256
53,119,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,129,627 UART: [kat] ++
53,130,080 UART: [kat] sha1
53,140,697 UART: [kat] SHA2-256
53,143,433 UART: [kat] SHA2-384
53,149,099 UART: [kat] SHA2-512-ACC
53,151,457 UART: [kat] ECC-384
55,436,225 UART: [kat] HMAC-384Kdf
55,447,067 UART: [kat] LMS
56,637,158 UART: [kat] --
56,642,030 UART: [update-reset] ++
60,777,762 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,780,946 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,163,171 >>> mbox cmd response: success
61,164,060 UART: [update-reset] Copying MAN_2 To MAN_1
61,186,512 UART: [update-reset Success] --
61,191,065 UART: [state] Locking Datavault
61,194,440 UART: [state] Locking PCR0, PCR1 and PCR31
61,196,137 UART: [state] Locking ICCM
61,197,437 UART: [exit] Launching FMC @ 0x40000130
61,205,879 UART:
61,206,117 UART: Running Caliptra FMC ...
61,207,214 UART:
61,207,368 UART: [state] CFI Enabled
61,251,593 UART: [art] Extend RT PCRs Done
61,252,777 UART: [art] Lock RT PCRs Done
61,254,118 UART: [art] Populate DV Done
61,259,523 UART: [fht] FMC Alias Private Key: 7
61,261,212 UART: [art] Derive CDI
61,262,014 UART: [art] Store in in slot 0x4
61,304,604 UART: [art] Derive Key Pair
61,305,641 UART: [art] Store priv key in slot 0x5
64,547,815 UART: [art] Derive Key Pair - Done
64,560,775 UART: [art] Signing Cert with AUTHO
64,562,074 UART: RITY.KEYID = 7
66,841,418 UART: [art] Erasing AUTHORITY.KEYID = 7
66,842,918 UART: [art] PUB.X = 9B4929E12D0C48BDBCC47403F62B226EE707D5EDBFBFF1E93723A6DB21EFA4D07D22284D6DEE0ADE287B84FBE7C55212
66,850,213 UART: [art] PUB.Y = 8D2E34DB58F06A66B67F550FA340CD535AF84686BFCC143D7BC3E98B94061958C2411ECB8B10404C3A698A42333D1ABE
66,857,433 UART: [art] SIG.R = 504499FFBEB8BC8D5D47A292E2036C33F56B49B9A244F6792150AA0FF69F33C4ACA6B4BA2AA60DCE9848701C7EF0F515
66,864,822 UART: [art] SIG.S = B768F487521F1A6C8626F228908F365170897A53E431BBF216204102BF9A83B97C2A2F6473CC1DAF933CB3EB9829E8C5
68,170,196 UART: Caliptra RT
68,170,895 UART: [state] CFI Enabled
68,460,502 UART: [rt] RT listening for mailbox commands...
68,462,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,492,230 UART: [rt]cmd =0x494e464f, len=4
68,496,021 >>> mbox cmd response data (264 bytes)
68,497,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
68,642,392 UART:
68,642,707 UART: Running Caliptra ROM ...
68,643,790 UART:
68,644,009 UART: [state] CFI Enabled
68,658,718 UART: [state] LifecycleState = Unprovisioned
68,660,639 UART: [state] DebugLocked = No
68,662,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,666,968 UART: [kat] SHA2-256
68,836,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,847,220 UART: [kat] ++
68,847,753 UART: [kat] sha1
68,860,040 UART: [kat] SHA2-256
68,862,733 UART: [kat] SHA2-384
68,868,655 UART: [kat] SHA2-512-ACC
68,871,049 UART: [kat] ECC-384
71,155,665 UART: [kat] HMAC-384Kdf
71,166,858 UART: [kat] LMS
72,356,926 UART: [kat] --
72,361,586 UART: [update-reset] ++
76,494,851 UART: [update-reset] Image verified using Vendor ECC Key Index 0
76,499,068 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
76,881,356 >>> mbox cmd response: success
76,882,615 UART: [update-reset] Copying MAN_2 To MAN_1
76,904,997 UART: [update-reset Success] --
76,908,631 UART: [state] Locking Datavault
76,912,649 UART: [state] Locking PCR0, PCR1 and PCR31
76,914,351 UART: [state] Locking ICCM
76,916,008 UART: [exit] Launching FMC @ 0x40000130
76,924,402 UART:
76,924,632 UART: Running Caliptra FMC ...
76,925,727 UART:
76,925,881 UART: [state] CFI Enabled
76,970,533 UART: [art] Extend RT PCRs Done
76,971,672 UART: [art] Lock RT PCRs Done
76,973,130 UART: [art] Populate DV Done
76,978,655 UART: [fht] FMC Alias Private Key: 7
76,980,280 UART: [art] Derive CDI
76,981,097 UART: [art] Store in in slot 0x4
77,024,012 UART: [art] Derive Key Pair
77,025,018 UART: [art] Store priv key in slot 0x5
80,266,888 UART: [art] Derive Key Pair - Done
80,280,078 UART: [art] Signing Cert with AUTHO
80,281,474 UART: RITY.KEYID = 7
82,560,841 UART: [art] Erasing AUTHORITY.KEYID = 7
82,562,362 UART: [art] PUB.X = 38D91DB86585EBCC37AD36B01166CEAB726C4AD76F1F21BAF1FEAA51D46DEB94B62A0C41B499FFEECF58C2C8C4E90B0E
82,569,600 UART: [art] PUB.Y = F81B9CFC14A068E5E828354CF65A452B8821562B5093D2E127B0F6F94FD93B208F54E3900139CBF466057A854C892A75
82,576,827 UART: [art] SIG.R = 0DE71031A1E520BED076F70BCD05BA4B87145B36FF3AA6ECED818D1E4D0098D3295C23B074B03C039FA71E9A667F49CB
82,584,265 UART: [art] SIG.S = B41DAB54611DDC2EEB5D618542AD7471C0FCC2387C6EECEE8A075F6AD115AA730346AA1C68EFDBCDD95658B856129EE0
83,889,379 UART: Caliptra RT
83,890,080 UART: [state] CFI Enabled
84,178,535 UART: [rt] RT listening for mailbox commands...
84,180,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,210,115 UART: [rt]cmd =0x494e464f, len=4
84,214,123 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,121,493 ready_for_fw is high
4,121,887 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,048,695 >>> mbox cmd response: success
18,050,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,687,172 UART:
23,687,588 UART: Running Caliptra FMC ...
23,688,727 UART:
23,688,906 UART: [state] CFI Enabled
23,696,575 UART: [fht] FMC Alias Private Key: 7
26,026,218 UART: [art] Extend RT PCRs Done
26,027,446 UART: [art] Lock RT PCRs Done
26,029,018 UART: [art] Populate DV Done
26,034,234 UART: [fht] FMC Alias Private Key: 7
26,035,887 UART: [art] Derive CDI
26,036,700 UART: [art] Store in in slot 0x4
26,079,138 UART: [art] Derive Key Pair
26,080,185 UART: [art] Store priv key in slot 0x5
29,322,150 UART: [art] Derive Key Pair - Done
29,334,715 UART: [art] Signing Cert with AUTHO
29,336,023 UART: RITY.KEYID = 7
31,615,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,047 UART: [art] PUB.X = BADC102714BD812B06DBC0F40C3DD268B3E238BE630B5F58A607D2D643D296D8BD1935EE7DDC07ED163797418A0D1EF2
31,624,357 UART: [art] PUB.Y = 4286A4003A3E12ED572BE166E8E6FF385362EA16B130DE6696A9774DBE834ACE31A44EE3251E4D8FC31833B54EB2E2BC
31,631,617 UART: [art] SIG.R = FEF2404A710A35B14BCBDD7763BE9C071FA324B6A208F4433051CB0EF21532F951BCED6F9566EEAC21825B7BE1013D1A
31,639,010 UART: [art] SIG.S = 4BF9E6CACEA0978C0F82ADD6E5BC316CA73EDFBC163AFE99842A0BA03429BF907E00C8A3C19CA6AD02EC4817892CEFB4
32,944,519 UART: Caliptra RT
32,945,217 UART: [state] CFI Enabled
33,062,815 UART: [rt] RT listening for mailbox commands...
33,094,177 UART: [rt]cmd =0x494e464f, len=4
33,098,079 >>> mbox cmd response data (264 bytes)
35,161,515 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,818,048 >>> mbox cmd response: success
43,854,193 UART:
43,854,521 UART: Running Caliptra FMC ...
43,855,652 UART:
43,855,821 UART: [state] CFI Enabled
43,899,674 UART: [art] Extend RT PCRs Done
43,900,824 UART: [art] Lock RT PCRs Done
43,902,254 UART: [art] Populate DV Done
43,907,883 UART: [fht] FMC Alias Private Key: 7
43,909,526 UART: [art] Derive CDI
43,910,344 UART: [art] Store in in slot 0x4
43,953,231 UART: [art] Derive Key Pair
43,954,274 UART: [art] Store priv key in slot 0x5
47,195,828 UART: [art] Derive Key Pair - Done
47,208,842 UART: [art] Signing Cert with AUTHO
47,210,189 UART: RITY.KEYID = 7
49,489,700 UART: [art] Erasing AUTHORITY.KEYID = 7
49,491,208 UART: [art] PUB.X = D3DB592FB7B43562B2D4BA8D90B772BAD33E94771A7A553B9281627DD6DBC76234C6C7B71E7171E770142514530EF22E
49,498,408 UART: [art] PUB.Y = 39570B27281858E7F6CDD4E5CE42C85297A27DF29A22D6B42EDF7CEB89E8FA0ACF44C29BE5E0C7EE4A4F68484B459B3C
49,505,695 UART: [art] SIG.R = E5ED1B28052BF078912C76AD31597BA9B1676D24BBD5A3108931A44EC9FB52B53C4A1291BCB40452B095075EEBC4F4B9
49,513,089 UART: [art] SIG.S = 3679E63F32DF4FB91A0951B40F42E08070C7465DC2D67139568CDFEBE8790720E94AEE22ED1E735273DB68EB4BEC8A5D
50,818,661 UART: Caliptra RT
50,819,373 UART: [state] CFI Enabled
51,104,561 UART: [rt] RT listening for mailbox commands...
51,106,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,136,141 UART: [rt]cmd =0x494e464f, len=4
51,140,020 >>> mbox cmd response data (264 bytes)
53,194,012 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
61,851,787 >>> mbox cmd response: success
61,889,166 UART:
61,889,462 UART: Running Caliptra FMC ...
61,890,574 UART:
61,890,733 UART: [state] CFI Enabled
61,934,275 UART: [art] Extend RT PCRs Done
61,935,464 UART: [art] Lock RT PCRs Done
61,936,864 UART: [art] Populate DV Done
61,942,487 UART: [fht] FMC Alias Private Key: 7
61,944,075 UART: [art] Derive CDI
61,944,884 UART: [art] Store in in slot 0x4
61,986,999 UART: [art] Derive Key Pair
61,987,999 UART: [art] Store priv key in slot 0x5
65,230,016 UART: [art] Derive Key Pair - Done
65,242,922 UART: [art] Signing Cert with AUTHO
65,244,228 UART: RITY.KEYID = 7
67,523,529 UART: [art] Erasing AUTHORITY.KEYID = 7
67,525,058 UART: [art] PUB.X = C438682219484156ABDD4E57ACF7721C09B73BF90B61AD9953F4CBC17F80A2F22CC317B74ACD5BB52079803BD41B5237
67,532,311 UART: [art] PUB.Y = 7049FB2DC41995D454C0FFF46E03558B1CA246E2A84FCDB6BE887E6AA3ACC6F9348C4C63A841A422833BB33510BE19C8
67,539,539 UART: [art] SIG.R = 1C7AEBED83217D7AEA748BE1976A9C97B3FAAB5E0A06015BD1B4648AC81FE11164C92E92D4B9ADEE664F4083248D7080
67,546,934 UART: [art] SIG.S = B251440E7C904B136C877DD43811FB26107CDCFA84A9B9651121568E7A5C883AE884245982917013D7D8346C9716C767
68,852,558 UART: Caliptra RT
68,853,265 UART: [state] CFI Enabled
69,144,286 UART: [rt] RT listening for mailbox commands...
69,146,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,175,850 UART: [rt]cmd =0x494e464f, len=4
69,179,744 >>> mbox cmd response data (264 bytes)
69,181,395 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
77,838,576 >>> mbox cmd response: success
77,870,839 UART:
77,871,131 UART: Running Caliptra FMC ...
77,872,246 UART:
77,872,403 UART: [state] CFI Enabled
77,916,595 UART: [art] Extend RT PCRs Done
77,917,738 UART: [art] Lock RT PCRs Done
77,919,181 UART: [art] Populate DV Done
77,924,503 UART: [fht] FMC Alias Private Key: 7
77,926,038 UART: [art] Derive CDI
77,926,853 UART: [art] Store in in slot 0x4
77,969,335 UART: [art] Derive Key Pair
77,970,331 UART: [art] Store priv key in slot 0x5
81,212,465 UART: [art] Derive Key Pair - Done
81,225,459 UART: [art] Signing Cert with AUTHO
81,226,761 UART: RITY.KEYID = 7
83,506,356 UART: [art] Erasing AUTHORITY.KEYID = 7
83,507,857 UART: [art] PUB.X = D3DB592FB7B43562B2D4BA8D90B772BAD33E94771A7A553B9281627DD6DBC76234C6C7B71E7171E770142514530EF22E
83,515,101 UART: [art] PUB.Y = 39570B27281858E7F6CDD4E5CE42C85297A27DF29A22D6B42EDF7CEB89E8FA0ACF44C29BE5E0C7EE4A4F68484B459B3C
83,522,362 UART: [art] SIG.R = E5ED1B28052BF078912C76AD31597BA9B1676D24BBD5A3108931A44EC9FB52B53C4A1291BCB40452B095075EEBC4F4B9
83,529,770 UART: [art] SIG.S = 3679E63F32DF4FB91A0951B40F42E08070C7465DC2D67139568CDFEBE8790720E94AEE22ED1E735273DB68EB4BEC8A5D
84,834,706 UART: Caliptra RT
84,835,422 UART: [state] CFI Enabled
85,124,515 UART: [rt] RT listening for mailbox commands...
85,126,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,156,037 UART: [rt]cmd =0x494e464f, len=4
85,159,831 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.37s
Truncated 1634 bytes from beginning
,023,831 UART: [idev] Sha1 KeyId Algorithm
6,048,143 UART: [idev] --
6,052,030 UART: [ldev] ++
6,052,604 UART: [ldev] CDI.KEYID = 6
6,053,699 UART: [ldev] SUBJECT.KEYID = 5
6,054,812 UART: [ldev] AUTHORITY.KEYID = 7
6,055,992 UART: [ldev] FE.KEYID = 1
6,097,919 UART: [ldev] Erasing FE.KEYID = 1
8,603,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,357 UART: [ldev] --
10,410,551 UART: [fwproc] Wait for Commands...
10,413,075 UART: [fwproc] Recv command 0x46574c44
10,415,166 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,278,579 >>> mbox cmd response: success
14,279,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,282,736 UART: [afmc] ++
14,283,331 UART: [afmc] CDI.KEYID = 6
14,284,240 UART: [afmc] SUBJECT.KEYID = 7
14,285,395 UART: [afmc] AUTHORITY.KEYID = 5
16,826,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,421 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,569,423 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,585,511 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,601,470 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,622,834 UART: [afmc] --
18,627,126 UART: [cold-reset] --
18,630,715 UART: [state] Locking Datavault
18,635,304 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,018 UART: [state] Locking ICCM
18,638,377 UART: [exit] Launching FMC @ 0x40000130
18,646,834 UART:
18,647,069 UART: Running Caliptra FMC ...
18,648,172 UART:
18,648,335 UART: [state] CFI Enabled
18,709,740 UART: [fht] FMC Alias Private Key: 7
20,474,003 UART: [art] Extend RT PCRs Done
20,475,217 UART: [art] Lock RT PCRs Done
20,476,719 UART: [art] Populate DV Done
20,482,021 UART: [fht] FMC Alias Private Key: 7
20,483,732 UART: [art] Derive CDI
20,484,548 UART: [art] Store in in slot 0x4
20,542,639 UART: [art] Derive Key Pair
20,543,636 UART: [art] Store priv key in slot 0x5
23,006,897 UART: [art] Derive Key Pair - Done
23,020,249 UART: [art] Signing Cert with AUTHO
23,021,568 UART: RITY.KEYID = 7
24,733,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,902 UART: [art] PUB.X = 902AEE15E33BABDFE8D9F41A09A8D75F1A708CBD4A59DBA5699E942583121D36044969E1CD474D98B85337F81BFAB01D
24,742,203 UART: [art] PUB.Y = AD076C2757CBEBA7B49B2E2C3F50900060E541FA63A9CAAC0118C1CAEA4265E6EA0DDCE7D5C3B6997561889F1ECB7228
24,749,432 UART: [art] SIG.R = B1B9CE736FA92ECD54981121F992612D941F4816DCA882DC55CFBA3680CDBC2AAD11D19A49696C688F7D0CC01CA51A87
24,756,875 UART: [art] SIG.S = B1465618D231D6E51E45EE53EA36B2F21F44695172C307AC181746592CE52382274CDC2654F25F41E19EDDDE5CF5C2A1
25,735,934 UART: Caliptra RT
25,736,636 UART: [state] CFI Enabled
25,901,546 UART: [rt] RT listening for mailbox commands...
25,933,199 UART: [rt]cmd =0x494e464f, len=4
25,937,238 >>> mbox cmd response data (264 bytes)
28,013,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,159,557 UART:
28,159,933 UART: Running Caliptra ROM ...
28,161,068 UART:
28,161,244 UART: [state] CFI Enabled
28,228,929 UART: [state] LifecycleState = Unprovisioned
28,230,772 UART: [state] DebugLocked = No
28,232,811 UART: [state] WD Timer not started. Device not locked for debugging
28,237,472 UART: [kat] SHA2-256
28,416,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,428,178 UART: [kat] ++
28,428,713 UART: [kat] sha1
28,440,848 UART: [kat] SHA2-256
28,443,888 UART: [kat] SHA2-384
28,450,093 UART: [kat] SHA2-512-ACC
28,453,032 UART: [kat] ECC-384
30,916,967 UART: [kat] HMAC-384Kdf
30,935,510 UART: [kat] LMS
31,464,953 UART: [kat] --
31,470,799 UART: [update-reset] ++
34,899,779 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,902,547 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,285,847 >>> mbox cmd response: success
35,287,313 UART: [update-reset] Copying MAN_2 To MAN_1
35,309,651 UART: [update-reset Success] --
35,313,125 UART: [state] Locking Datavault
35,315,992 UART: [state] Locking PCR0, PCR1 and PCR31
35,317,687 UART: [state] Locking ICCM
35,319,571 UART: [exit] Launching FMC @ 0x40000130
35,327,987 UART:
35,328,223 UART: Running Caliptra FMC ...
35,329,323 UART:
35,329,482 UART: [state] CFI Enabled
35,425,636 UART: [art] Extend RT PCRs Done
35,426,819 UART: [art] Lock RT PCRs Done
35,428,543 UART: [art] Populate DV Done
35,433,842 UART: [fht] FMC Alias Private Key: 7
35,435,533 UART: [art] Derive CDI
35,436,280 UART: [art] Store in in slot 0x4
35,495,388 UART: [art] Derive Key Pair
35,496,378 UART: [art] Store priv key in slot 0x5
37,959,120 UART: [art] Derive Key Pair - Done
37,972,010 UART: [art] Signing Cert with AUTHO
37,973,321 UART: RITY.KEYID = 7
39,685,064 UART: [art] Erasing AUTHORITY.KEYID = 7
39,686,583 UART: [art] PUB.X = E758937C71CAC42CD8B224DB3B369092F75EC464AD960E4CEF133BAFDDBAFBF057BB17DFD2D64D19BC1727EEACF06746
39,693,839 UART: [art] PUB.Y = 054F8A8C51130BC4DDBFD140A58D188641C30D206B3499A2A1AEB2A6F3AA9DEDB44161E04F1ED8FEA16A17D86F582E12
39,701,120 UART: [art] SIG.R = C7EBEF764B2C7FFA55E57B0E361B57D3A62C5FCBAFD570DE0335ABE396E44F185095F2EF994B55720580BA35ED960FBB
39,708,558 UART: [art] SIG.S = 74FC19423093DB05B7EF0A7564D092E6EDB9414458147AA890B182C5E12B25CA66AE36E0DA087A02DDFC23DE8371BA47
40,687,359 UART: Caliptra RT
40,688,049 UART: [state] CFI Enabled
41,025,483 UART: [rt] RT listening for mailbox commands...
41,027,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,057,193 UART: [rt]cmd =0x494e464f, len=4
41,060,970 >>> mbox cmd response data (264 bytes)
43,120,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,265,632 UART:
43,266,013 UART: Running Caliptra ROM ...
43,267,070 UART:
43,267,224 UART: [state] CFI Enabled
43,331,204 UART: [state] LifecycleState = Unprovisioned
43,333,090 UART: [state] DebugLocked = No
43,335,401 UART: [state] WD Timer not started. Device not locked for debugging
43,339,420 UART: [kat] SHA2-256
43,518,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,530,097 UART: [kat] ++
43,530,645 UART: [kat] sha1
43,542,889 UART: [kat] SHA2-256
43,545,901 UART: [kat] SHA2-384
43,552,531 UART: [kat] SHA2-512-ACC
43,555,481 UART: [kat] ECC-384
46,012,957 UART: [kat] HMAC-384Kdf
46,036,966 UART: [kat] LMS
46,566,432 UART: [kat] --
46,570,860 UART: [update-reset] ++
50,008,014 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,011,882 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
50,395,199 >>> mbox cmd response: success
50,395,619 UART: [update-reset] Copying MAN_2 To MAN_1
50,417,911 UART: [update-reset Success] --
50,423,013 UART: [state] Locking Datavault
50,426,588 UART: [state] Locking PCR0, PCR1 and PCR31
50,428,232 UART: [state] Locking ICCM
50,429,570 UART: [exit] Launching FMC @ 0x40000130
50,438,026 UART:
50,438,268 UART: Running Caliptra FMC ...
50,439,365 UART:
50,439,524 UART: [state] CFI Enabled
50,529,425 UART: [art] Extend RT PCRs Done
50,530,627 UART: [art] Lock RT PCRs Done
50,532,083 UART: [art] Populate DV Done
50,537,763 UART: [fht] FMC Alias Private Key: 7
50,539,465 UART: [art] Derive CDI
50,540,278 UART: [art] Store in in slot 0x4
50,598,344 UART: [art] Derive Key Pair
50,599,381 UART: [art] Store priv key in slot 0x5
53,062,576 UART: [art] Derive Key Pair - Done
53,075,894 UART: [art] Signing Cert with AUTHO
53,077,201 UART: RITY.KEYID = 7
54,788,503 UART: [art] Erasing AUTHORITY.KEYID = 7
54,790,008 UART: [art] PUB.X = A94FFD5B0F60E2776E0B3C1F0AB1DD785FCCAE6C7FCC409B3CFD40AD08C0B37EA49788D9A120FFB5ACDFEABC7B59093E
54,797,347 UART: [art] PUB.Y = 98FF1F850442416DBCBB7F55639D14269729419F4EB811E0EF855E2021708EEDB01C81275F363BF39CD74A0FF5A26E5B
54,804,585 UART: [art] SIG.R = 0C8E1676B2ED3DD49B8CC46CEA362961D36169DC88B40F460B9E74F99FFD3028FDE2636A64BDAC445A140E4334A4871A
54,811,974 UART: [art] SIG.S = 5BB7912D5E37F1A2C35E076AD5AAD57302EE3BF5FD70D36F10BEE3E42221BACC607D9D790AB07BDF348649FA88BD9566
55,790,602 UART: Caliptra RT
55,791,307 UART: [state] CFI Enabled
56,124,671 UART: [rt] RT listening for mailbox commands...
56,126,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,156,418 UART: [rt]cmd =0x494e464f, len=4
56,160,353 >>> mbox cmd response data (264 bytes)
56,162,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
56,306,712 UART:
56,307,018 UART: Running Caliptra ROM ...
56,308,058 UART:
56,308,213 UART: [state] CFI Enabled
56,365,924 UART: [state] LifecycleState = Unprovisioned
56,367,826 UART: [state] DebugLocked = No
56,370,323 UART: [state] WD Timer not started. Device not locked for debugging
56,374,709 UART: [kat] SHA2-256
56,553,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,565,423 UART: [kat] ++
56,565,899 UART: [kat] sha1
56,577,004 UART: [kat] SHA2-256
56,580,024 UART: [kat] SHA2-384
56,586,821 UART: [kat] SHA2-512-ACC
56,589,759 UART: [kat] ECC-384
59,047,862 UART: [kat] HMAC-384Kdf
59,071,700 UART: [kat] LMS
59,601,173 UART: [kat] --
59,607,424 UART: [update-reset] ++
63,036,358 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,039,203 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
63,422,501 >>> mbox cmd response: success
63,423,810 UART: [update-reset] Copying MAN_2 To MAN_1
63,446,143 UART: [update-reset Success] --
63,450,137 UART: [state] Locking Datavault
63,454,472 UART: [state] Locking PCR0, PCR1 and PCR31
63,456,142 UART: [state] Locking ICCM
63,457,973 UART: [exit] Launching FMC @ 0x40000130
63,466,429 UART:
63,466,660 UART: Running Caliptra FMC ...
63,467,763 UART:
63,467,918 UART: [state] CFI Enabled
63,562,352 UART: [art] Extend RT PCRs Done
63,563,536 UART: [art] Lock RT PCRs Done
63,565,204 UART: [art] Populate DV Done
63,570,660 UART: [fht] FMC Alias Private Key: 7
63,572,354 UART: [art] Derive CDI
63,573,163 UART: [art] Store in in slot 0x4
63,631,693 UART: [art] Derive Key Pair
63,632,725 UART: [art] Store priv key in slot 0x5
66,095,963 UART: [art] Derive Key Pair - Done
66,108,743 UART: [art] Signing Cert with AUTHO
66,110,057 UART: RITY.KEYID = 7
67,821,605 UART: [art] Erasing AUTHORITY.KEYID = 7
67,823,106 UART: [art] PUB.X = E758937C71CAC42CD8B224DB3B369092F75EC464AD960E4CEF133BAFDDBAFBF057BB17DFD2D64D19BC1727EEACF06746
67,830,408 UART: [art] PUB.Y = 054F8A8C51130BC4DDBFD140A58D188641C30D206B3499A2A1AEB2A6F3AA9DEDB44161E04F1ED8FEA16A17D86F582E12
67,837,675 UART: [art] SIG.R = C7EBEF764B2C7FFA55E57B0E361B57D3A62C5FCBAFD570DE0335ABE396E44F185095F2EF994B55720580BA35ED960FBB
67,845,078 UART: [art] SIG.S = 74FC19423093DB05B7EF0A7564D092E6EDB9414458147AA890B182C5E12B25CA66AE36E0DA087A02DDFC23DE8371BA47
68,823,862 UART: Caliptra RT
68,824,566 UART: [state] CFI Enabled
69,161,500 UART: [rt] RT listening for mailbox commands...
69,163,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,193,170 UART: [rt]cmd =0x494e464f, len=4
69,197,210 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,359,746 ready_for_fw is high
3,360,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,998 >>> mbox cmd response: success
14,044,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,325,526 UART:
18,325,912 UART: Running Caliptra FMC ...
18,327,046 UART:
18,327,208 UART: [state] CFI Enabled
18,390,957 UART: [fht] FMC Alias Private Key: 7
20,154,247 UART: [art] Extend RT PCRs Done
20,155,466 UART: [art] Lock RT PCRs Done
20,157,034 UART: [art] Populate DV Done
20,162,554 UART: [fht] FMC Alias Private Key: 7
20,164,115 UART: [art] Derive CDI
20,164,936 UART: [art] Store in in slot 0x4
20,222,940 UART: [art] Derive Key Pair
20,223,968 UART: [art] Store priv key in slot 0x5
22,688,771 UART: [art] Derive Key Pair - Done
22,701,763 UART: [art] Signing Cert with AUTHO
22,703,071 UART: RITY.KEYID = 7
24,414,659 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,160 UART: [art] PUB.X = A86AC79ADE95E3206621210EFB39F51D67BD3B14FBFB9D0FA1290168A8C3C6B952C7E267DD6B70495C848B633B162172
24,423,427 UART: [art] PUB.Y = 6FA74081372EE5CA6789A65E583124F643759E7F9C86650489315EEDBF34281703EC488DF1261E99C5A64FAFFD06DD8D
24,430,696 UART: [art] SIG.R = 5F045B479311317B34363C2CECF80A1696679B58E65147927E8F7769E17E5D4D2757435C8AB77D022F8D3668216E698C
24,438,083 UART: [art] SIG.S = 69F965F9047DCDA04F50AD9054B5CD64BA2A8D63C68EE52B28C39533E6D91CC9EE7CD860422C26550FF017295347EBD5
25,417,225 UART: Caliptra RT
25,417,932 UART: [state] CFI Enabled
25,582,422 UART: [rt] RT listening for mailbox commands...
25,613,884 UART: [rt]cmd =0x494e464f, len=4
25,617,910 >>> mbox cmd response data (264 bytes)
27,676,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,790,098 >>> mbox cmd response: success
34,826,238 UART:
34,826,541 UART: Running Caliptra FMC ...
34,827,657 UART:
34,827,829 UART: [state] CFI Enabled
34,915,644 UART: [art] Extend RT PCRs Done
34,916,835 UART: [art] Lock RT PCRs Done
34,918,312 UART: [art] Populate DV Done
34,923,833 UART: [fht] FMC Alias Private Key: 7
34,925,478 UART: [art] Derive CDI
34,926,288 UART: [art] Store in in slot 0x4
34,984,940 UART: [art] Derive Key Pair
34,985,929 UART: [art] Store priv key in slot 0x5
37,449,060 UART: [art] Derive Key Pair - Done
37,462,224 UART: [art] Signing Cert with AUTHO
37,463,523 UART: RITY.KEYID = 7
39,175,070 UART: [art] Erasing AUTHORITY.KEYID = 7
39,176,572 UART: [art] PUB.X = 820057E2CE8A04A34009D24A2E9592E9E76954C15EDC20810B342A1DC557BE1D2E46B8E18697ED182C4BDD469C8D6A19
39,183,826 UART: [art] PUB.Y = 1D8D402DE68EB5EC276C53B03DABA208D94E21CC004D7FBF1E04300D201A4468E2012EA263FAAAF2DE1FC5EA3414B299
39,191,076 UART: [art] SIG.R = 756A0D919CA8A19BC049EDA60FF10F198641BCB3DDC2FB18B604FC767784561F87BE4822386BD53DF709EEAF345B71EF
39,198,479 UART: [art] SIG.S = 69885111AD94B56FEF9800E61D3019AEE360C0A91D35AA692CA999EE79C8B06E1598A3E1290DA7CE956B046039F40132
40,177,163 UART: Caliptra RT
40,177,872 UART: [state] CFI Enabled
40,517,395 UART: [rt] RT listening for mailbox commands...
40,519,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,549,032 UART: [rt]cmd =0x494e464f, len=4
40,552,827 >>> mbox cmd response data (264 bytes)
42,612,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
49,738,233 >>> mbox cmd response: success
49,772,451 UART:
49,772,747 UART: Running Caliptra FMC ...
49,773,788 UART:
49,773,938 UART: [state] CFI Enabled
49,869,744 UART: [art] Extend RT PCRs Done
49,870,928 UART: [art] Lock RT PCRs Done
49,872,438 UART: [art] Populate DV Done
49,877,966 UART: [fht] FMC Alias Private Key: 7
49,879,544 UART: [art] Derive CDI
49,880,367 UART: [art] Store in in slot 0x4
49,938,540 UART: [art] Derive Key Pair
49,939,544 UART: [art] Store priv key in slot 0x5
52,402,123 UART: [art] Derive Key Pair - Done
52,415,229 UART: [art] Signing Cert with AUTHO
52,416,527 UART: RITY.KEYID = 7
54,128,492 UART: [art] Erasing AUTHORITY.KEYID = 7
54,129,992 UART: [art] PUB.X = 9005694B295B582A9F0DFC04181F6755B1699B0E68A08FA878769835212FE9161DCD2776D0A09EFAE9B25F731AC93A77
54,137,247 UART: [art] PUB.Y = C56C9AF19D443DA02151DE1A8051D624216882661191B111018FE79FEAA64B595D98C9F558FAF8469CF1019F25184600
54,144,492 UART: [art] SIG.R = A8894F25D2E5DE2C3C1A32C9E43E214E3E118B28DF6CF6A25490E7D692663634DF656F628568B5195556D5697F5488A2
54,151,886 UART: [art] SIG.S = 10C0CA812BC0F812CE28283863003D12D5FF630F73DECFF27655C8BC930CD3506DF5A5FFDA1134C7283C0DFEE16B70B7
55,130,255 UART: Caliptra RT
55,130,950 UART: [state] CFI Enabled
55,471,227 UART: [rt] RT listening for mailbox commands...
55,473,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,502,902 UART: [rt]cmd =0x494e464f, len=4
55,506,888 >>> mbox cmd response data (264 bytes)
55,508,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
62,622,755 >>> mbox cmd response: success
62,656,376 UART:
62,656,645 UART: Running Caliptra FMC ...
62,657,759 UART:
62,657,922 UART: [state] CFI Enabled
62,755,124 UART: [art] Extend RT PCRs Done
62,756,305 UART: [art] Lock RT PCRs Done
62,757,758 UART: [art] Populate DV Done
62,763,327 UART: [fht] FMC Alias Private Key: 7
62,764,964 UART: [art] Derive CDI
62,765,779 UART: [art] Store in in slot 0x4
62,824,242 UART: [art] Derive Key Pair
62,825,242 UART: [art] Store priv key in slot 0x5
65,287,940 UART: [art] Derive Key Pair - Done
65,300,940 UART: [art] Signing Cert with AUTHO
65,302,248 UART: RITY.KEYID = 7
67,013,854 UART: [art] Erasing AUTHORITY.KEYID = 7
67,015,368 UART: [art] PUB.X = 820057E2CE8A04A34009D24A2E9592E9E76954C15EDC20810B342A1DC557BE1D2E46B8E18697ED182C4BDD469C8D6A19
67,022,574 UART: [art] PUB.Y = 1D8D402DE68EB5EC276C53B03DABA208D94E21CC004D7FBF1E04300D201A4468E2012EA263FAAAF2DE1FC5EA3414B299
67,029,870 UART: [art] SIG.R = 756A0D919CA8A19BC049EDA60FF10F198641BCB3DDC2FB18B604FC767784561F87BE4822386BD53DF709EEAF345B71EF
67,037,274 UART: [art] SIG.S = 69885111AD94B56FEF9800E61D3019AEE360C0A91D35AA692CA999EE79C8B06E1598A3E1290DA7CE956B046039F40132
68,016,017 UART: Caliptra RT
68,016,716 UART: [state] CFI Enabled
68,352,299 UART: [rt] RT listening for mailbox commands...
68,354,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,384,216 UART: [rt]cmd =0x494e464f, len=4
68,388,177 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
Truncated 1634 bytes from beginning
,318,137 UART: [idev] Sha1 KeyId Algorithm
6,340,342 UART: [idev] --
6,344,897 UART: [ldev] ++
6,345,470 UART: [ldev] CDI.KEYID = 6
6,346,348 UART: [ldev] SUBJECT.KEYID = 5
6,347,496 UART: [ldev] AUTHORITY.KEYID = 7
6,348,774 UART: [ldev] FE.KEYID = 1
6,357,927 UART: [ldev] Erasing FE.KEYID = 1
8,830,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,022 UART: [ldev] --
10,623,446 UART: [fwproc] Wait for Commands...
10,626,503 UART: [fwproc] Recv command 0x46574c44
10,628,590 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,955 >>> mbox cmd response: success
14,502,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,506,226 UART: [afmc] ++
14,506,812 UART: [afmc] CDI.KEYID = 6
14,507,714 UART: [afmc] SUBJECT.KEYID = 7
14,508,942 UART: [afmc] AUTHORITY.KEYID = 5
17,007,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,953 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,745,949 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,762,038 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,777,951 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,800,938 UART: [afmc] --
18,805,552 UART: [cold-reset] --
18,810,814 UART: [state] Locking Datavault
18,815,425 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,101 UART: [state] Locking ICCM
18,818,252 UART: [exit] Launching FMC @ 0x40000130
18,826,643 UART:
18,826,870 UART: Running Caliptra FMC ...
18,827,887 UART:
18,828,049 UART: [state] CFI Enabled
18,836,580 UART: [fht] FMC Alias Private Key: 7
20,592,911 UART: [art] Extend RT PCRs Done
20,594,129 UART: [art] Lock RT PCRs Done
20,596,041 UART: [art] Populate DV Done
20,601,502 UART: [fht] FMC Alias Private Key: 7
20,602,979 UART: [art] Derive CDI
20,603,734 UART: [art] Store in in slot 0x4
20,646,532 UART: [art] Derive Key Pair
20,647,528 UART: [art] Store priv key in slot 0x5
23,074,244 UART: [art] Derive Key Pair - Done
23,087,192 UART: [art] Signing Cert with AUTHO
23,088,497 UART: RITY.KEYID = 7
24,794,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,651 UART: [art] PUB.X = 54EAF4340B3A2DDECB33CF915A22C2D1AC99D503BAC9D9C4B1FE8EF8F8A061B660680B5FF7763AA77D0BBFFB5C279D97
24,802,946 UART: [art] PUB.Y = 7D36070E6DEE3CBC2C4981897F55583EF70FF45DFE9641080B13687A2EDA0A1C0170BAC8D337509821FC4466ED4BC5C3
24,810,195 UART: [art] SIG.R = 5471797121C80EBC05AE4BC49EAC438273F48886438D743E0837165165CAF45F0AE373D21A830427D419BF3F484FC059
24,817,618 UART: [art] SIG.S = BF37F8539E5BCA51079B6B7DEE71EC9A2C2BBF82E798010B064C70362975354D060863207F735EED929D835A72013E13
25,795,974 UART: Caliptra RT
25,796,684 UART: [state] CFI Enabled
25,913,846 UART: [rt] RT listening for mailbox commands...
25,944,966 UART: [rt]cmd =0x494e464f, len=4
25,949,109 >>> mbox cmd response data (264 bytes)
28,008,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,154,516 UART:
28,154,934 UART: Running Caliptra ROM ...
28,155,974 UART:
28,156,120 UART: [state] CFI Enabled
28,170,926 UART: [state] LifecycleState = Unprovisioned
28,172,762 UART: [state] DebugLocked = No
28,175,361 UART: [state] WD Timer not started. Device not locked for debugging
28,178,737 UART: [kat] SHA2-256
28,357,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,369,505 UART: [kat] ++
28,369,956 UART: [kat] sha1
28,380,993 UART: [kat] SHA2-256
28,384,006 UART: [kat] SHA2-384
28,390,046 UART: [kat] SHA2-512-ACC
28,392,992 UART: [kat] ECC-384
30,833,302 UART: [kat] HMAC-384Kdf
30,846,455 UART: [kat] LMS
31,375,977 UART: [kat] --
31,380,718 UART: [update-reset] ++
34,809,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,812,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,195,847 >>> mbox cmd response: success
35,197,162 UART: [update-reset] Copying MAN_2 To MAN_1
35,219,500 UART: [update-reset Success] --
35,223,446 UART: [state] Locking Datavault
35,225,724 UART: [state] Locking PCR0, PCR1 and PCR31
35,227,373 UART: [state] Locking ICCM
35,228,438 UART: [exit] Launching FMC @ 0x40000130
35,236,884 UART:
35,237,113 UART: Running Caliptra FMC ...
35,238,208 UART:
35,238,356 UART: [state] CFI Enabled
35,282,091 UART: [art] Extend RT PCRs Done
35,283,252 UART: [art] Lock RT PCRs Done
35,284,591 UART: [art] Populate DV Done
35,290,100 UART: [fht] FMC Alias Private Key: 7
35,291,744 UART: [art] Derive CDI
35,292,555 UART: [art] Store in in slot 0x4
35,334,752 UART: [art] Derive Key Pair
35,335,773 UART: [art] Store priv key in slot 0x5
37,762,916 UART: [art] Derive Key Pair - Done
37,776,176 UART: [art] Signing Cert with AUTHO
37,777,501 UART: RITY.KEYID = 7
39,483,069 UART: [art] Erasing AUTHORITY.KEYID = 7
39,484,572 UART: [art] PUB.X = 2D19188AFF0A98DE71568FB66F05BCF4F52C97F631D6F084FCA01EE0CFABC76000713F8F6436B79E4BC1B639B79D9A6C
39,491,816 UART: [art] PUB.Y = 724F4C598E580A6CA2532127DA7FA8C97B01CC2145496C2B89450B47EE1F4BB9DE50358CF92D46ED962B64B24B33DDF6
39,499,093 UART: [art] SIG.R = 480F2570DC31DBB123BB27DFF955C0B0B9F1B9C123E6D7F0DED97870BB646EEC1307AA1FF8F696A3CC9EDEF3AF06C05D
39,506,541 UART: [art] SIG.S = 46506C6DC7C48DC9DE250D23488C6F50B21008324D9D5D636AE7525586C6FD44F9645DCE9A1332C37894A3524FB73CB7
40,485,347 UART: Caliptra RT
40,486,082 UART: [state] CFI Enabled
40,779,048 UART: [rt] RT listening for mailbox commands...
40,780,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,810,388 UART: [rt]cmd =0x494e464f, len=4
40,814,229 >>> mbox cmd response data (264 bytes)
42,884,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,029,816 UART:
43,030,186 UART: Running Caliptra ROM ...
43,031,313 UART:
43,031,478 UART: [state] CFI Enabled
43,046,282 UART: [state] LifecycleState = Unprovisioned
43,048,109 UART: [state] DebugLocked = No
43,049,575 UART: [state] WD Timer not started. Device not locked for debugging
43,052,519 UART: [kat] SHA2-256
43,231,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,243,249 UART: [kat] ++
43,243,785 UART: [kat] sha1
43,255,049 UART: [kat] SHA2-256
43,258,057 UART: [kat] SHA2-384
43,264,580 UART: [kat] SHA2-512-ACC
43,267,517 UART: [kat] ECC-384
45,708,786 UART: [kat] HMAC-384Kdf
45,721,977 UART: [kat] LMS
46,251,480 UART: [kat] --
46,254,365 UART: [update-reset] ++
49,680,290 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,683,338 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
50,066,659 >>> mbox cmd response: success
50,067,412 UART: [update-reset] Copying MAN_2 To MAN_1
50,089,760 UART: [update-reset Success] --
50,094,097 UART: [state] Locking Datavault
50,096,684 UART: [state] Locking PCR0, PCR1 and PCR31
50,098,381 UART: [state] Locking ICCM
50,100,446 UART: [exit] Launching FMC @ 0x40000130
50,108,834 UART:
50,109,062 UART: Running Caliptra FMC ...
50,110,082 UART:
50,110,223 UART: [state] CFI Enabled
50,154,115 UART: [art] Extend RT PCRs Done
50,155,250 UART: [art] Lock RT PCRs Done
50,156,717 UART: [art] Populate DV Done
50,162,109 UART: [fht] FMC Alias Private Key: 7
50,163,634 UART: [art] Derive CDI
50,164,389 UART: [art] Store in in slot 0x4
50,207,320 UART: [art] Derive Key Pair
50,208,360 UART: [art] Store priv key in slot 0x5
52,635,151 UART: [art] Derive Key Pair - Done
52,648,093 UART: [art] Signing Cert with AUTHO
52,649,394 UART: RITY.KEYID = 7
54,354,653 UART: [art] Erasing AUTHORITY.KEYID = 7
54,356,153 UART: [art] PUB.X = 0902995EF0E034976DD8597EDC4B1B0AA38A73B8189C5744AF7B74F46A7CEBD04352475C3B16043377A594D447DB1C1C
54,363,392 UART: [art] PUB.Y = 7F944B32A5B26D3952F1D8322B7D30CCEBC4DDCDEC7DB69323EE4465F55E28F1EFB39F12B4859399C22DEABFEDA1E3C2
54,370,726 UART: [art] SIG.R = 60C0AF8B40EF664CB14FBB7AC3BD0C3E1DD340801D90CDF3DFA2E1E57509167DA94FAAA26AA5D0A35F85684F6D3AFDCA
54,378,114 UART: [art] SIG.S = 4C23E55657F5FB7ACBE2262AD3D05035FB0F109C7374E023B208C6A04798719CB99E6FB764852863F676C000DF8587B2
55,357,476 UART: Caliptra RT
55,358,188 UART: [state] CFI Enabled
55,650,654 UART: [rt] RT listening for mailbox commands...
55,652,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,682,424 UART: [rt]cmd =0x494e464f, len=4
55,686,425 >>> mbox cmd response data (264 bytes)
55,688,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
55,833,064 UART:
55,833,375 UART: Running Caliptra ROM ...
55,834,485 UART:
55,834,640 UART: [state] CFI Enabled
55,848,406 UART: [state] LifecycleState = Unprovisioned
55,850,236 UART: [state] DebugLocked = No
55,852,742 UART: [state] WD Timer not started. Device not locked for debugging
55,856,086 UART: [kat] SHA2-256
56,035,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,046,823 UART: [kat] ++
56,047,357 UART: [kat] sha1
56,058,676 UART: [kat] SHA2-256
56,061,685 UART: [kat] SHA2-384
56,066,748 UART: [kat] SHA2-512-ACC
56,069,737 UART: [kat] ECC-384
58,510,035 UART: [kat] HMAC-384Kdf
58,521,406 UART: [kat] LMS
59,050,910 UART: [kat] --
59,054,809 UART: [update-reset] ++
62,483,837 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,487,539 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
62,870,828 >>> mbox cmd response: success
62,872,453 UART: [update-reset] Copying MAN_2 To MAN_1
62,894,829 UART: [update-reset Success] --
62,898,391 UART: [state] Locking Datavault
62,902,727 UART: [state] Locking PCR0, PCR1 and PCR31
62,904,368 UART: [state] Locking ICCM
62,905,567 UART: [exit] Launching FMC @ 0x40000130
62,914,013 UART:
62,914,243 UART: Running Caliptra FMC ...
62,915,256 UART:
62,915,414 UART: [state] CFI Enabled
62,959,584 UART: [art] Extend RT PCRs Done
62,960,723 UART: [art] Lock RT PCRs Done
62,962,298 UART: [art] Populate DV Done
62,967,857 UART: [fht] FMC Alias Private Key: 7
62,969,382 UART: [art] Derive CDI
62,970,105 UART: [art] Store in in slot 0x4
63,012,527 UART: [art] Derive Key Pair
63,013,566 UART: [art] Store priv key in slot 0x5
65,440,400 UART: [art] Derive Key Pair - Done
65,453,608 UART: [art] Signing Cert with AUTHO
65,455,104 UART: RITY.KEYID = 7
67,159,957 UART: [art] Erasing AUTHORITY.KEYID = 7
67,161,444 UART: [art] PUB.X = 2D19188AFF0A98DE71568FB66F05BCF4F52C97F631D6F084FCA01EE0CFABC76000713F8F6436B79E4BC1B639B79D9A6C
67,168,745 UART: [art] PUB.Y = 724F4C598E580A6CA2532127DA7FA8C97B01CC2145496C2B89450B47EE1F4BB9DE50358CF92D46ED962B64B24B33DDF6
67,176,003 UART: [art] SIG.R = 480F2570DC31DBB123BB27DFF955C0B0B9F1B9C123E6D7F0DED97870BB646EEC1307AA1FF8F696A3CC9EDEF3AF06C05D
67,183,476 UART: [art] SIG.S = 46506C6DC7C48DC9DE250D23488C6F50B21008324D9D5D636AE7525586C6FD44F9645DCE9A1332C37894A3524FB73CB7
68,162,432 UART: Caliptra RT
68,163,131 UART: [state] CFI Enabled
68,454,159 UART: [rt] RT listening for mailbox commands...
68,455,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,485,636 UART: [rt]cmd =0x494e464f, len=4
68,489,526 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,695,393 ready_for_fw is high
3,695,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,979 >>> mbox cmd response: success
14,268,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,514,453 UART:
18,514,865 UART: Running Caliptra FMC ...
18,515,990 UART:
18,516,138 UART: [state] CFI Enabled
18,524,224 UART: [fht] FMC Alias Private Key: 7
20,281,641 UART: [art] Extend RT PCRs Done
20,282,866 UART: [art] Lock RT PCRs Done
20,284,651 UART: [art] Populate DV Done
20,290,009 UART: [fht] FMC Alias Private Key: 7
20,291,615 UART: [art] Derive CDI
20,292,425 UART: [art] Store in in slot 0x4
20,335,296 UART: [art] Derive Key Pair
20,336,335 UART: [art] Store priv key in slot 0x5
22,762,489 UART: [art] Derive Key Pair - Done
22,775,919 UART: [art] Signing Cert with AUTHO
22,777,210 UART: RITY.KEYID = 7
24,482,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,324 UART: [art] PUB.X = 2C00137511F52A68020F0A0581DA78E8845C63A3E4003D2DF3599570DBFB711CCF74C361DA827EE2B77FDCA02FFB9CE5
24,491,508 UART: [art] PUB.Y = 9D61C93643A9B632D76A6743FF49F3883F067056CB2E5DFF3563ABE7EC6E778A932C0AA996731683E512474ACDE21E4D
24,498,764 UART: [art] SIG.R = 9C52BD204246333A2AE5B542153ACEF280E5D77843CB232D8F0BB262487D4DF29A118EEF92EE32A15255303092FF779F
24,506,161 UART: [art] SIG.S = 6990ADAB3C0C06D17E11CD1C39D78682F39DBE91ADF192F061A7FBF3F7F79F105071ECB84562C5EAE8BC5A7F771C8D66
25,485,026 UART: Caliptra RT
25,485,730 UART: [state] CFI Enabled
25,602,186 UART: [rt] RT listening for mailbox commands...
25,633,546 UART: [rt]cmd =0x494e464f, len=4
25,637,655 >>> mbox cmd response data (264 bytes)
27,696,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,742,073 >>> mbox cmd response: success
34,779,363 UART:
34,779,671 UART: Running Caliptra FMC ...
34,780,785 UART:
34,780,939 UART: [state] CFI Enabled
34,825,236 UART: [art] Extend RT PCRs Done
34,826,421 UART: [art] Lock RT PCRs Done
34,827,914 UART: [art] Populate DV Done
34,833,430 UART: [fht] FMC Alias Private Key: 7
34,835,069 UART: [art] Derive CDI
34,835,875 UART: [art] Store in in slot 0x4
34,878,357 UART: [art] Derive Key Pair
34,879,395 UART: [art] Store priv key in slot 0x5
37,305,925 UART: [art] Derive Key Pair - Done
37,318,623 UART: [art] Signing Cert with AUTHO
37,319,944 UART: RITY.KEYID = 7
39,025,645 UART: [art] Erasing AUTHORITY.KEYID = 7
39,027,154 UART: [art] PUB.X = C00F6C11FB80A7B45716F4944AB871F744D902A8F0EFBDA735258248FF71D54014DD0C4D3B92403F872C2775A7D94DD8
39,034,424 UART: [art] PUB.Y = 0BE95722AF7AE11BE88FF4C9923EF7C9351D371250551639CA0426E900D7B808418D614595C569D52A7F71F9BDE35E0D
39,041,660 UART: [art] SIG.R = 79AF47FC99A8B4BFA39F5BC96E5A0B7365B3D30A00399512CEA7CAAE49ABAE9C1F2D35B1C9E9811EC1AA591BEA6320C6
39,049,044 UART: [art] SIG.S = 9B711DC827419B4BC9D2BA8E64654FC4D797668DD0F1224311A9F2781BD07B87EEEF01D66A1F75C28B7CF0AEA4091E41
40,027,914 UART: Caliptra RT
40,028,615 UART: [state] CFI Enabled
40,316,095 UART: [rt] RT listening for mailbox commands...
40,317,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,347,826 UART: [rt]cmd =0x494e464f, len=4
40,351,832 >>> mbox cmd response data (264 bytes)
42,407,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
49,454,872 >>> mbox cmd response: success
49,488,302 UART:
49,488,607 UART: Running Caliptra FMC ...
49,489,722 UART:
49,489,883 UART: [state] CFI Enabled
49,534,445 UART: [art] Extend RT PCRs Done
49,535,629 UART: [art] Lock RT PCRs Done
49,537,244 UART: [art] Populate DV Done
49,542,751 UART: [fht] FMC Alias Private Key: 7
49,544,280 UART: [art] Derive CDI
49,545,047 UART: [art] Store in in slot 0x4
49,587,575 UART: [art] Derive Key Pair
49,588,882 UART: [art] Store priv key in slot 0x5
52,014,777 UART: [art] Derive Key Pair - Done
52,027,657 UART: [art] Signing Cert with AUTHO
52,028,980 UART: RITY.KEYID = 7
53,734,503 UART: [art] Erasing AUTHORITY.KEYID = 7
53,736,010 UART: [art] PUB.X = D967D648B4E488DAD9CAA5C4B5330A1F7570DCCB8B42491181CB5177540208604DCB045B00AEE7425E403F80FE813DDD
53,743,253 UART: [art] PUB.Y = D3BA7E6A97E6B4F0B82A83739DCCEC76E3F515A0ECE284B3D4E0619FDB33C88263586708D19F36F14A49FC03F9D678AD
53,750,506 UART: [art] SIG.R = D8F1B48BA23FE154B8ED9E1BBAEC08BF2046163378F7F866037AB5630C195EE34F483146977BA03106C70DC707B0B65D
53,757,915 UART: [art] SIG.S = 220300B62655478830AD5F686D8F839A07D857A8AB0524F5557C03BF4F682767E4E6BDC70C4E4F3D1FF2987337EF1A6B
54,737,137 UART: Caliptra RT
54,737,837 UART: [state] CFI Enabled
55,025,282 UART: [rt] RT listening for mailbox commands...
55,027,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,057,035 UART: [rt]cmd =0x494e464f, len=4
55,060,862 >>> mbox cmd response data (264 bytes)
55,062,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
62,115,976 >>> mbox cmd response: success
62,148,757 UART:
62,149,055 UART: Running Caliptra FMC ...
62,150,109 UART:
62,150,250 UART: [state] CFI Enabled
62,194,372 UART: [art] Extend RT PCRs Done
62,195,516 UART: [art] Lock RT PCRs Done
62,197,388 UART: [art] Populate DV Done
62,202,679 UART: [fht] FMC Alias Private Key: 7
62,204,367 UART: [art] Derive CDI
62,205,170 UART: [art] Store in in slot 0x4
62,247,435 UART: [art] Derive Key Pair
62,248,470 UART: [art] Store priv key in slot 0x5
64,675,260 UART: [art] Derive Key Pair - Done
64,688,360 UART: [art] Signing Cert with AUTHO
64,689,659 UART: RITY.KEYID = 7
66,394,823 UART: [art] Erasing AUTHORITY.KEYID = 7
66,396,317 UART: [art] PUB.X = C00F6C11FB80A7B45716F4944AB871F744D902A8F0EFBDA735258248FF71D54014DD0C4D3B92403F872C2775A7D94DD8
66,403,611 UART: [art] PUB.Y = 0BE95722AF7AE11BE88FF4C9923EF7C9351D371250551639CA0426E900D7B808418D614595C569D52A7F71F9BDE35E0D
66,410,851 UART: [art] SIG.R = 79AF47FC99A8B4BFA39F5BC96E5A0B7365B3D30A00399512CEA7CAAE49ABAE9C1F2D35B1C9E9811EC1AA591BEA6320C6
66,418,230 UART: [art] SIG.S = 9B711DC827419B4BC9D2BA8E64654FC4D797668DD0F1224311A9F2781BD07B87EEEF01D66A1F75C28B7CF0AEA4091E41
67,396,978 UART: Caliptra RT
67,397,671 UART: [state] CFI Enabled
67,687,822 UART: [rt] RT listening for mailbox commands...
67,689,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
67,719,365 UART: [rt]cmd =0x494e464f, len=4
67,723,260 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
Truncated 1634 bytes from beginning
,053,967 UART: [idev] Sha1 KeyId Algorithm
6,076,496 UART: [idev] --
6,081,220 UART: [ldev] ++
6,081,906 UART: [ldev] CDI.KEYID = 6
6,082,796 UART: [ldev] SUBJECT.KEYID = 5
6,083,957 UART: [ldev] AUTHORITY.KEYID = 7
6,085,243 UART: [ldev] FE.KEYID = 1
6,122,382 UART: [ldev] Erasing FE.KEYID = 1
8,628,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,433,129 UART: [ldev] --
10,439,264 UART: [fwproc] Wait for Commands...
10,442,111 UART: [fwproc] Recv command 0x46574c44
10,444,418 UART: [fwproc] Recv'd Img size: 114448 bytes
13,891,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,625,085 >>> mbox cmd response: success
14,626,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,628,480 UART: [afmc] ++
14,629,191 UART: [afmc] CDI.KEYID = 6
14,630,382 UART: [afmc] SUBJECT.KEYID = 7
14,631,870 UART: [afmc] AUTHORITY.KEYID = 5
17,171,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,009 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,912,046 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,927,210 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,942,144 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,967,103 UART: [afmc] --
18,970,169 UART: [cold-reset] --
18,974,511 UART: [state] Locking Datavault
18,979,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,900 UART: [state] Locking ICCM
18,983,292 UART: [exit] Launching FMC @ 0x40000130
18,991,964 UART:
18,992,203 UART: Running Caliptra FMC ...
18,993,303 UART:
18,993,459 UART: [state] CFI Enabled
19,055,090 UART: [fht] FMC Alias Private Key: 7
20,818,482 UART: [art] Extend RT PCRs Done
20,819,696 UART: [art] Lock RT PCRs Done
20,821,502 UART: [art] Populate DV Done
20,826,803 UART: [fht] FMC Alias Private Key: 7
20,828,285 UART: [art] Derive CDI
20,829,206 UART: [art] Store in in slot 0x4
20,888,597 UART: [art] Derive Key Pair
20,889,637 UART: [art] Store priv key in slot 0x5
23,353,046 UART: [art] Derive Key Pair - Done
23,365,764 UART: [art] Signing Cert with AUTHO
23,367,058 UART: RITY.KEYID = 7
25,078,426 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,929 UART: [art] PUB.X = 41E29DDFD9804107B8524C005BEE5A3518D9DFB62FDEE6F46984716FB81EA4F46759A8ECA27AD5593BA257246E5D18E0
25,087,223 UART: [art] PUB.Y = 6811F6E83E2CB4B3FA182259E8000078A60C823ADCF5D8426EC26BEC4D9C9DB1362373394383172DD67F87C8D9DDF7BF
25,094,459 UART: [art] SIG.R = DDEC27D31881061AA691DF6228E6C2A6299B3BC4A16F622FCE78DE04D64EE955F54ADE4C8ADEE53C23D6F7CD3556F0EC
25,101,845 UART: [art] SIG.S = FB827643E61B0E8F79AA38E50B7E020A5559C08859A1C7282159209D26F475064224A3352B6122BA3E80AA5146DCB3F0
26,080,551 UART: Caliptra RT
26,081,240 UART: [state] CFI Enabled
26,245,267 UART: [rt] RT listening for mailbox commands...
26,276,355 UART: [rt]cmd =0x494e464f, len=4
26,280,411 >>> mbox cmd response data (264 bytes)
28,339,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,485,024 UART:
28,485,378 UART: Running Caliptra ROM ...
28,486,510 UART:
28,486,683 UART: [state] CFI Enabled
28,551,390 UART: [state] LifecycleState = Unprovisioned
28,553,516 UART: [state] DebugLocked = No
28,555,779 UART: [state] WD Timer not started. Device not locked for debugging
28,559,864 UART: [kat] SHA2-256
28,749,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,760,489 UART: [kat] ++
28,760,947 UART: [kat] sha1
28,773,722 UART: [kat] SHA2-256
28,776,690 UART: [kat] SHA2-384
28,782,999 UART: [kat] SHA2-512-ACC
28,785,578 UART: [kat] ECC-384
31,236,208 UART: [kat] HMAC-384Kdf
31,259,887 UART: [kat] LMS
31,791,447 UART: [kat] --
31,796,346 UART: [update-reset] ++
35,260,579 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,264,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,872,900 >>> mbox cmd response: success
35,874,513 UART: [update-reset] Copying MAN_2 To MAN_1
35,912,080 UART: [update-reset Success] --
35,915,800 UART: [state] Locking Datavault
35,918,310 UART: [state] Locking PCR0, PCR1 and PCR31
35,920,552 UART: [state] Locking ICCM
35,922,907 UART: [exit] Launching FMC @ 0x40000130
35,931,524 UART:
35,931,756 UART: Running Caliptra FMC ...
35,932,783 UART:
35,932,932 UART: [state] CFI Enabled
36,027,502 UART: [art] Extend RT PCRs Done
36,028,694 UART: [art] Lock RT PCRs Done
36,030,012 UART: [art] Populate DV Done
36,035,696 UART: [fht] FMC Alias Private Key: 7
36,037,284 UART: [art] Derive CDI
36,038,049 UART: [art] Store in in slot 0x4
36,096,929 UART: [art] Derive Key Pair
36,097,967 UART: [art] Store priv key in slot 0x5
38,560,520 UART: [art] Derive Key Pair - Done
38,573,456 UART: [art] Signing Cert with AUTHO
38,574,752 UART: RITY.KEYID = 7
40,285,841 UART: [art] Erasing AUTHORITY.KEYID = 7
40,287,345 UART: [art] PUB.X = 40DC5DA736083CE7163C5724E8EBD8A451C1AFE82CB0A6D4D8083A49D529B6B37C48F28F9FD1368A14DBC5D042E8DA1D
40,294,653 UART: [art] PUB.Y = 0EB416C5FC115D528E81EE9B8AA5C063665FB25E2174A9F8F55D41D7FF682297E362938FBE8C05C6CD646BA405D3A37A
40,301,873 UART: [art] SIG.R = 76A558D09C4F21BCC89A29939F96D88CF2FE4F23E3D9A1272EA44E8D0E002F462431DB84DD70A65EB47FC031C75DAA1B
40,309,264 UART: [art] SIG.S = 39986A32B8179F3C0EE4E925758D5409921733ECD45F582FB321E0A6C2A0F2B673E1DB5BBFE08A32AB561C145DF73D22
41,287,817 UART: Caliptra RT
41,288,502 UART: [state] CFI Enabled
41,626,816 UART: [rt] RT listening for mailbox commands...
41,628,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,658,519 UART: [rt]cmd =0x494e464f, len=4
41,662,601 >>> mbox cmd response data (264 bytes)
43,738,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,883,877 UART:
43,884,254 UART: Running Caliptra ROM ...
43,885,391 UART:
43,885,583 UART: [state] CFI Enabled
43,949,558 UART: [state] LifecycleState = Unprovisioned
43,951,659 UART: [state] DebugLocked = No
43,953,645 UART: [state] WD Timer not started. Device not locked for debugging
43,958,424 UART: [kat] SHA2-256
44,148,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,159,066 UART: [kat] ++
44,159,627 UART: [kat] sha1
44,172,683 UART: [kat] SHA2-256
44,175,641 UART: [kat] SHA2-384
44,181,198 UART: [kat] SHA2-512-ACC
44,183,763 UART: [kat] ECC-384
46,635,566 UART: [kat] HMAC-384Kdf
46,659,788 UART: [kat] LMS
47,191,342 UART: [kat] --
47,194,364 UART: [update-reset] ++
50,655,409 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,659,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
51,267,283 >>> mbox cmd response: success
51,267,978 UART: [update-reset] Copying MAN_2 To MAN_1
51,305,508 UART: [update-reset Success] --
51,310,327 UART: [state] Locking Datavault
51,314,188 UART: [state] Locking PCR0, PCR1 and PCR31
51,316,411 UART: [state] Locking ICCM
51,318,835 UART: [exit] Launching FMC @ 0x40000130
51,327,512 UART:
51,327,753 UART: Running Caliptra FMC ...
51,328,854 UART:
51,329,024 UART: [state] CFI Enabled
51,428,113 UART: [art] Extend RT PCRs Done
51,429,302 UART: [art] Lock RT PCRs Done
51,430,666 UART: [art] Populate DV Done
51,435,938 UART: [fht] FMC Alias Private Key: 7
51,437,515 UART: [art] Derive CDI
51,438,291 UART: [art] Store in in slot 0x4
51,497,498 UART: [art] Derive Key Pair
51,498,496 UART: [art] Store priv key in slot 0x5
53,962,672 UART: [art] Derive Key Pair - Done
53,975,346 UART: [art] Signing Cert with AUTHO
53,976,665 UART: RITY.KEYID = 7
55,688,046 UART: [art] Erasing AUTHORITY.KEYID = 7
55,689,560 UART: [art] PUB.X = EAEA9BCEC470B7A8C10A391F56F6E7CC4CE7D15322CEAD893D56FD82646033958662D07CDFE03B781D4E36BBBB8BF166
55,696,856 UART: [art] PUB.Y = 5AE530390C5F0D5BD8A2479D78C76CEB23184C5F612248E6D7A68FB5168F79DE298F5C0524F76AD9CD26DBAE295A4F62
55,704,137 UART: [art] SIG.R = 861D482A272E5CD4FFAB7BF821341296753057AB35D133D355E9F95991858A3564EE6D3C8B4C94F83C2BF502AB42AAAB
55,711,534 UART: [art] SIG.S = D30E8BB125076B2D2ACD6466AF34069CE6D5183417705DB733E45E13B73C395D851CC0A0ED6497E99EC24EEBC0F2EE37
56,690,921 UART: Caliptra RT
56,691,629 UART: [state] CFI Enabled
57,022,599 UART: [rt] RT listening for mailbox commands...
57,024,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,054,315 UART: [rt]cmd =0x494e464f, len=4
57,058,253 >>> mbox cmd response data (264 bytes)
57,060,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
57,205,023 UART:
57,205,329 UART: Running Caliptra ROM ...
57,206,368 UART:
57,206,536 UART: [state] CFI Enabled
57,266,287 UART: [state] LifecycleState = Unprovisioned
57,268,341 UART: [state] DebugLocked = No
57,269,693 UART: [state] WD Timer not started. Device not locked for debugging
57,274,199 UART: [kat] SHA2-256
57,464,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,474,851 UART: [kat] ++
57,475,304 UART: [kat] sha1
57,486,625 UART: [kat] SHA2-256
57,489,635 UART: [kat] SHA2-384
57,495,995 UART: [kat] SHA2-512-ACC
57,498,560 UART: [kat] ECC-384
59,948,009 UART: [kat] HMAC-384Kdf
59,971,162 UART: [kat] LMS
60,502,718 UART: [kat] --
60,505,916 UART: [update-reset] ++
63,961,875 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,965,243 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
64,573,496 >>> mbox cmd response: success
64,575,352 UART: [update-reset] Copying MAN_2 To MAN_1
64,612,921 UART: [update-reset Success] --
64,615,849 UART: [state] Locking Datavault
64,618,616 UART: [state] Locking PCR0, PCR1 and PCR31
64,620,806 UART: [state] Locking ICCM
64,622,554 UART: [exit] Launching FMC @ 0x40000130
64,631,221 UART:
64,631,453 UART: Running Caliptra FMC ...
64,632,823 UART:
64,633,022 UART: [state] CFI Enabled
64,718,985 UART: [art] Extend RT PCRs Done
64,720,161 UART: [art] Lock RT PCRs Done
64,721,663 UART: [art] Populate DV Done
64,726,869 UART: [fht] FMC Alias Private Key: 7
64,728,414 UART: [art] Derive CDI
64,729,227 UART: [art] Store in in slot 0x4
64,787,886 UART: [art] Derive Key Pair
64,788,885 UART: [art] Store priv key in slot 0x5
67,251,851 UART: [art] Derive Key Pair - Done
67,265,019 UART: [art] Signing Cert with AUTHO
67,266,330 UART: RITY.KEYID = 7
68,978,418 UART: [art] Erasing AUTHORITY.KEYID = 7
68,979,920 UART: [art] PUB.X = 40DC5DA736083CE7163C5724E8EBD8A451C1AFE82CB0A6D4D8083A49D529B6B37C48F28F9FD1368A14DBC5D042E8DA1D
68,987,216 UART: [art] PUB.Y = 0EB416C5FC115D528E81EE9B8AA5C063665FB25E2174A9F8F55D41D7FF682297E362938FBE8C05C6CD646BA405D3A37A
68,994,492 UART: [art] SIG.R = 76A558D09C4F21BCC89A29939F96D88CF2FE4F23E3D9A1272EA44E8D0E002F462431DB84DD70A65EB47FC031C75DAA1B
69,001,875 UART: [art] SIG.S = 39986A32B8179F3C0EE4E925758D5409921733ECD45F582FB321E0A6C2A0F2B673E1DB5BBFE08A32AB561C145DF73D22
69,981,209 UART: Caliptra RT
69,981,907 UART: [state] CFI Enabled
70,316,375 UART: [rt] RT listening for mailbox commands...
70,318,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,348,163 UART: [rt]cmd =0x494e464f, len=4
70,352,065 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,440,207 ready_for_fw is high
3,440,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,748,898 >>> mbox cmd response: success
14,750,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,038,993 UART:
19,039,382 UART: Running Caliptra FMC ...
19,040,579 UART:
19,040,750 UART: [state] CFI Enabled
19,108,221 UART: [fht] FMC Alias Private Key: 7
20,872,278 UART: [art] Extend RT PCRs Done
20,873,485 UART: [art] Lock RT PCRs Done
20,875,158 UART: [art] Populate DV Done
20,880,574 UART: [fht] FMC Alias Private Key: 7
20,882,328 UART: [art] Derive CDI
20,883,170 UART: [art] Store in in slot 0x4
20,940,444 UART: [art] Derive Key Pair
20,941,511 UART: [art] Store priv key in slot 0x5
23,404,734 UART: [art] Derive Key Pair - Done
23,417,506 UART: [art] Signing Cert with AUTHO
23,418,801 UART: RITY.KEYID = 7
25,130,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,450 UART: [art] PUB.X = 5097511713DDFC7C2FDFB9EBC8507D52EB3A98179A838317AC91C8AD05851E87BB84196F6031F77BD58CD12BE7793A0C
25,139,730 UART: [art] PUB.Y = 85C4C931817086D49F641940F8C6CCC035D1891CB6F85646F26467922743EC00F4B7332B3374FCFA57D52093F6AC93F9
25,146,941 UART: [art] SIG.R = 5878D8D91AD4CC91CA0D2C54D91EB92DAD6A8E82964FB83878E1B66C4E32AEA0CD893292754C49253F76233C432CFE30
25,154,333 UART: [art] SIG.S = 7071DDBD4A2E9D4CAB36453495C00FD94D5417A192D79AF8662BA2DD4FCDDCB268B841CF5BC54EE7089BAD489A120A1E
26,133,770 UART: Caliptra RT
26,134,460 UART: [state] CFI Enabled
26,298,948 UART: [rt] RT listening for mailbox commands...
26,330,253 UART: [rt]cmd =0x494e464f, len=4
26,334,202 >>> mbox cmd response data (264 bytes)
28,395,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,196,941 >>> mbox cmd response: success
36,234,805 UART:
36,235,101 UART: Running Caliptra FMC ...
36,236,221 UART:
36,236,393 UART: [state] CFI Enabled
36,337,547 UART: [art] Extend RT PCRs Done
36,338,857 UART: [art] Lock RT PCRs Done
36,340,008 UART: [art] Populate DV Done
36,345,557 UART: [fht] FMC Alias Private Key: 7
36,347,181 UART: [art] Derive CDI
36,347,922 UART: [art] Store in in slot 0x4
36,406,909 UART: [art] Derive Key Pair
36,407,907 UART: [art] Store priv key in slot 0x5
38,870,819 UART: [art] Derive Key Pair - Done
38,884,027 UART: [art] Signing Cert with AUTHO
38,885,332 UART: RITY.KEYID = 7
40,596,264 UART: [art] Erasing AUTHORITY.KEYID = 7
40,597,772 UART: [art] PUB.X = DEC04A05AA4708582026B635ABB1B35E87E980088320C9076FB260BAA7221FE53A62E5132A742A12407023B439F0CA7D
40,605,024 UART: [art] PUB.Y = BAFD3CFCB62A011108A1FB3938E32DED16680B798DE11BD6D7AD1841568FB95AD2547104E100C406709A3ACC985AC23B
40,612,252 UART: [art] SIG.R = 06D53D6043062A4459AB7AA8A72C359EF5621F944FD298964036B1594AD2BF45E85E93905327599D9D2DD2E11C20527C
40,619,639 UART: [art] SIG.S = 9AD2099A9C3EE0D99DBEF75EFF1F31B2877322B65F8018BF3DFDAC2D1742B24E6BF11A1B2845752D2DFFD179854CB4F4
41,598,457 UART: Caliptra RT
41,599,142 UART: [state] CFI Enabled
41,931,501 UART: [rt] RT listening for mailbox commands...
41,933,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,963,071 UART: [rt]cmd =0x494e464f, len=4
41,967,126 >>> mbox cmd response data (264 bytes)
44,028,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
51,851,280 >>> mbox cmd response: success
51,884,769 UART:
51,885,093 UART: Running Caliptra FMC ...
51,886,136 UART:
51,886,285 UART: [state] CFI Enabled
51,991,711 UART: [art] Extend RT PCRs Done
51,992,900 UART: [art] Lock RT PCRs Done
51,994,270 UART: [art] Populate DV Done
51,999,544 UART: [fht] FMC Alias Private Key: 7
52,001,133 UART: [art] Derive CDI
52,001,897 UART: [art] Store in in slot 0x4
52,060,559 UART: [art] Derive Key Pair
52,061,602 UART: [art] Store priv key in slot 0x5
54,524,293 UART: [art] Derive Key Pair - Done
54,537,191 UART: [art] Signing Cert with AUTHO
54,538,488 UART: RITY.KEYID = 7
56,249,909 UART: [art] Erasing AUTHORITY.KEYID = 7
56,251,414 UART: [art] PUB.X = D40429C90819B888ACC8BB73E2D7D1D190BD762B64BACBEEDC43A56239AD8E34B101E47ED300BC679595594640B2F015
56,259,067 UART: [art] PUB.Y = 720EA0480E1797F7535C4B6702EECFE69DCC4ACAD8B737023875B517B125E85CCE0CD6A5D83B830779E017E23DEFECF1
56,265,931 UART: [art] SIG.R = 47069F958275671FDCB5E0D6B2E5586721CD1AC0E76229E6E3DF49C6D35DD6E044B4C9CBC9DEE2A7107966104DB228CC
56,273,320 UART: [art] SIG.S = F1513667A5F82CB3062C62DF5B5D947274A965A8A24C6151AC9C73441B8EB3C4AA89BCA33C769E9E79048B99C2B768C2
57,252,317 UART: Caliptra RT
57,253,021 UART: [state] CFI Enabled
57,591,217 UART: [rt] RT listening for mailbox commands...
57,593,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,622,904 UART: [rt]cmd =0x494e464f, len=4
57,626,750 >>> mbox cmd response data (264 bytes)
57,628,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
65,447,018 >>> mbox cmd response: success
65,481,950 UART:
65,482,245 UART: Running Caliptra FMC ...
65,483,283 UART:
65,483,432 UART: [state] CFI Enabled
65,576,737 UART: [art] Extend RT PCRs Done
65,577,921 UART: [art] Lock RT PCRs Done
65,579,402 UART: [art] Populate DV Done
65,584,752 UART: [fht] FMC Alias Private Key: 7
65,586,449 UART: [art] Derive CDI
65,587,264 UART: [art] Store in in slot 0x4
65,646,033 UART: [art] Derive Key Pair
65,647,071 UART: [art] Store priv key in slot 0x5
68,109,877 UART: [art] Derive Key Pair - Done
68,122,781 UART: [art] Signing Cert with AUTHO
68,124,083 UART: RITY.KEYID = 7
69,835,510 UART: [art] Erasing AUTHORITY.KEYID = 7
69,837,011 UART: [art] PUB.X = DEC04A05AA4708582026B635ABB1B35E87E980088320C9076FB260BAA7221FE53A62E5132A742A12407023B439F0CA7D
69,844,251 UART: [art] PUB.Y = BAFD3CFCB62A011108A1FB3938E32DED16680B798DE11BD6D7AD1841568FB95AD2547104E100C406709A3ACC985AC23B
69,851,531 UART: [art] SIG.R = 06D53D6043062A4459AB7AA8A72C359EF5621F944FD298964036B1594AD2BF45E85E93905327599D9D2DD2E11C20527C
69,859,023 UART: [art] SIG.S = 9AD2099A9C3EE0D99DBEF75EFF1F31B2877322B65F8018BF3DFDAC2D1742B24E6BF11A1B2845752D2DFFD179854CB4F4
70,838,133 UART: Caliptra RT
70,838,834 UART: [state] CFI Enabled
71,177,328 UART: [rt] RT listening for mailbox commands...
71,179,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,208,980 UART: [rt]cmd =0x494e464f, len=4
71,213,039 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.68s
Truncated 1634 bytes from beginning
,337,390 UART: [idev] Sha1 KeyId Algorithm
6,358,617 UART: [idev] --
6,364,261 UART: [ldev] ++
6,364,940 UART: [ldev] CDI.KEYID = 6
6,365,841 UART: [ldev] SUBJECT.KEYID = 5
6,367,049 UART: [ldev] AUTHORITY.KEYID = 7
6,368,278 UART: [ldev] FE.KEYID = 1
6,379,559 UART: [ldev] Erasing FE.KEYID = 1
8,856,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,050 UART: [ldev] --
10,650,892 UART: [fwproc] Wait for Commands...
10,653,412 UART: [fwproc] Recv command 0x46574c44
10,655,726 UART: [fwproc] Recv'd Img size: 114448 bytes
14,110,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,415 >>> mbox cmd response: success
14,848,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,851,077 UART: [afmc] ++
14,851,782 UART: [afmc] CDI.KEYID = 6
14,852,974 UART: [afmc] SUBJECT.KEYID = 7
14,854,469 UART: [afmc] AUTHORITY.KEYID = 5
17,360,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,725 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
19,099,788 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
19,114,959 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
19,129,892 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
19,153,548 UART: [afmc] --
19,157,095 UART: [cold-reset] --
19,160,139 UART: [state] Locking Datavault
19,166,840 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,021 UART: [state] Locking ICCM
19,171,572 UART: [exit] Launching FMC @ 0x40000130
19,180,230 UART:
19,180,454 UART: Running Caliptra FMC ...
19,181,548 UART:
19,181,697 UART: [state] CFI Enabled
19,189,572 UART: [fht] FMC Alias Private Key: 7
20,947,178 UART: [art] Extend RT PCRs Done
20,948,378 UART: [art] Lock RT PCRs Done
20,950,077 UART: [art] Populate DV Done
20,955,658 UART: [fht] FMC Alias Private Key: 7
20,957,243 UART: [art] Derive CDI
20,957,969 UART: [art] Store in in slot 0x4
21,000,340 UART: [art] Derive Key Pair
21,001,407 UART: [art] Store priv key in slot 0x5
23,428,318 UART: [art] Derive Key Pair - Done
23,440,940 UART: [art] Signing Cert with AUTHO
23,442,233 UART: RITY.KEYID = 7
25,147,944 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,451 UART: [art] PUB.X = C696C13BAFAEB0DE3223A3812C4C13F3F42C1B938054497504B0EBDD4D7EC26CE1746961335423E4582F23C4C896854D
25,156,740 UART: [art] PUB.Y = 05E0C0348020A122B1C987BCFA6693DD7C079ABB5FEC4D5B0331CDA88781941A12C9BAAFA852C276B54B8EF45D723AE2
25,164,014 UART: [art] SIG.R = 7738A5F804AAEA996F9D8EBB45754216F6BA9A83E050E25AB220DD081EC24C3B56005F876CEFDF67401932D09F89F568
25,171,401 UART: [art] SIG.S = F8B0F4603DDCB1A2A53AD588611F6E9C80B76CAD1B576B2B260A2EBD48E238A2ED3B8E7A714E77A6BF37FE1B4109041E
26,150,709 UART: Caliptra RT
26,151,393 UART: [state] CFI Enabled
26,270,240 UART: [rt] RT listening for mailbox commands...
26,301,559 UART: [rt]cmd =0x494e464f, len=4
26,305,619 >>> mbox cmd response data (264 bytes)
28,364,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,509,995 UART:
28,510,356 UART: Running Caliptra ROM ...
28,511,413 UART:
28,511,613 UART: [state] CFI Enabled
28,527,242 UART: [state] LifecycleState = Unprovisioned
28,529,128 UART: [state] DebugLocked = No
28,530,826 UART: [state] WD Timer not started. Device not locked for debugging
28,535,605 UART: [kat] SHA2-256
28,725,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,736,295 UART: [kat] ++
28,736,831 UART: [kat] sha1
28,748,576 UART: [kat] SHA2-256
28,751,575 UART: [kat] SHA2-384
28,757,185 UART: [kat] SHA2-512-ACC
28,759,813 UART: [kat] ECC-384
31,199,541 UART: [kat] HMAC-384Kdf
31,212,154 UART: [kat] LMS
31,743,797 UART: [kat] --
31,749,099 UART: [update-reset] ++
35,211,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,214,756 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,823,023 >>> mbox cmd response: success
35,824,341 UART: [update-reset] Copying MAN_2 To MAN_1
35,861,915 UART: [update-reset Success] --
35,868,291 UART: [state] Locking Datavault
35,872,528 UART: [state] Locking PCR0, PCR1 and PCR31
35,874,663 UART: [state] Locking ICCM
35,877,061 UART: [exit] Launching FMC @ 0x40000130
35,885,725 UART:
35,885,956 UART: Running Caliptra FMC ...
35,886,980 UART:
35,887,117 UART: [state] CFI Enabled
35,931,228 UART: [art] Extend RT PCRs Done
35,932,368 UART: [art] Lock RT PCRs Done
35,933,912 UART: [art] Populate DV Done
35,939,256 UART: [fht] FMC Alias Private Key: 7
35,940,997 UART: [art] Derive CDI
35,941,801 UART: [art] Store in in slot 0x4
35,984,358 UART: [art] Derive Key Pair
35,985,400 UART: [art] Store priv key in slot 0x5
38,412,732 UART: [art] Derive Key Pair - Done
38,425,771 UART: [art] Signing Cert with AUTHO
38,427,107 UART: RITY.KEYID = 7
40,132,132 UART: [art] Erasing AUTHORITY.KEYID = 7
40,133,798 UART: [art] PUB.X = 2A26B5B3609F0C335B41B983BAE724CB7A5040C7699C7D509BFDD7BFAEB6052D4AD1925195396B22103A68C69459AA0B
40,140,973 UART: [art] PUB.Y = 61ACDB7EB8E43CB2B246E5258429E5E25FC5BDC3F842568D9141A32A193AF69FF8F766B112F275AD52F94AF8769E380C
40,148,191 UART: [art] SIG.R = ACC5BEA8326CAA7A4DF6609915FC495F53DD34A751189B819CDD40B8325D7CBE11FB78A1A55212D8CC5EEA13CC5005BE
40,155,622 UART: [art] SIG.S = 6D88CF4BEA07C8ED9C01ABA632D75AAC0585355D53BFAAF16595DE226095D722358C98708C692C2F36623EB80F51AE86
41,133,836 UART: Caliptra RT
41,134,522 UART: [state] CFI Enabled
41,420,995 UART: [rt] RT listening for mailbox commands...
41,422,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,452,405 UART: [rt]cmd =0x494e464f, len=4
41,456,243 >>> mbox cmd response data (264 bytes)
43,512,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,657,943 UART:
43,658,323 UART: Running Caliptra ROM ...
43,659,376 UART:
43,659,520 UART: [state] CFI Enabled
43,674,713 UART: [state] LifecycleState = Unprovisioned
43,676,600 UART: [state] DebugLocked = No
43,678,594 UART: [state] WD Timer not started. Device not locked for debugging
43,683,420 UART: [kat] SHA2-256
43,873,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,884,069 UART: [kat] ++
43,884,586 UART: [kat] sha1
43,896,187 UART: [kat] SHA2-256
43,899,211 UART: [kat] SHA2-384
43,905,899 UART: [kat] SHA2-512-ACC
43,908,516 UART: [kat] ECC-384
46,347,821 UART: [kat] HMAC-384Kdf
46,361,402 UART: [kat] LMS
46,893,023 UART: [kat] --
46,898,692 UART: [update-reset] ++
50,355,735 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,358,726 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
50,966,993 >>> mbox cmd response: success
50,968,358 UART: [update-reset] Copying MAN_2 To MAN_1
51,005,925 UART: [update-reset Success] --
51,010,687 UART: [state] Locking Datavault
51,014,600 UART: [state] Locking PCR0, PCR1 and PCR31
51,016,735 UART: [state] Locking ICCM
51,019,556 UART: [exit] Launching FMC @ 0x40000130
51,028,177 UART:
51,028,418 UART: Running Caliptra FMC ...
51,029,511 UART:
51,029,661 UART: [state] CFI Enabled
51,073,673 UART: [art] Extend RT PCRs Done
51,074,852 UART: [art] Lock RT PCRs Done
51,076,167 UART: [art] Populate DV Done
51,081,840 UART: [fht] FMC Alias Private Key: 7
51,083,478 UART: [art] Derive CDI
51,084,283 UART: [art] Store in in slot 0x4
51,126,710 UART: [art] Derive Key Pair
51,127,699 UART: [art] Store priv key in slot 0x5
53,554,636 UART: [art] Derive Key Pair - Done
53,567,409 UART: [art] Signing Cert with AUTHO
53,568,716 UART: RITY.KEYID = 7
55,274,272 UART: [art] Erasing AUTHORITY.KEYID = 7
55,275,779 UART: [art] PUB.X = EF4007F53C31EB4E3634B43C78FA466C03B58D0F5754A2524F79A37AD45ABD6A43A5C1887A9243060C152685B23F8A96
55,283,023 UART: [art] PUB.Y = 3AA26D6DCB862937643C892A9BBD6092701596E8D192D1CFFC96644E3AAFEB9B75212B84A32B9F90D332C1AEC8E835E0
55,290,298 UART: [art] SIG.R = 29661DDF4C958AE0B7B891BFAC4AE046AE29B95EE61248EA5A2C888B031CB40F9BB943E3A12322826B52DC849CD8490A
55,297,678 UART: [art] SIG.S = 0D1B1C2B9451D443B9E756E5B74E1CEC6C89DB1883573D9E2BA0104AA09BD4506DCC32FECFF528A886D23E3517AE8B4D
56,276,445 UART: Caliptra RT
56,277,126 UART: [state] CFI Enabled
56,565,579 UART: [rt] RT listening for mailbox commands...
56,567,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,596,986 UART: [rt]cmd =0x494e464f, len=4
56,600,975 >>> mbox cmd response data (264 bytes)
56,602,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
56,747,560 UART:
56,747,868 UART: Running Caliptra ROM ...
56,748,896 UART:
56,749,200 UART: [state] CFI Enabled
56,763,270 UART: [state] LifecycleState = Unprovisioned
56,765,093 UART: [state] DebugLocked = No
56,767,144 UART: [state] WD Timer not started. Device not locked for debugging
56,770,919 UART: [kat] SHA2-256
56,960,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,971,529 UART: [kat] ++
56,972,031 UART: [kat] sha1
56,983,996 UART: [kat] SHA2-256
56,986,991 UART: [kat] SHA2-384
56,992,765 UART: [kat] SHA2-512-ACC
56,995,327 UART: [kat] ECC-384
59,437,697 UART: [kat] HMAC-384Kdf
59,450,335 UART: [kat] LMS
59,981,933 UART: [kat] --
59,986,696 UART: [update-reset] ++
63,438,322 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,442,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
64,050,268 >>> mbox cmd response: success
64,051,344 UART: [update-reset] Copying MAN_2 To MAN_1
64,088,911 UART: [update-reset Success] --
64,094,176 UART: [state] Locking Datavault
64,098,188 UART: [state] Locking PCR0, PCR1 and PCR31
64,100,376 UART: [state] Locking ICCM
64,101,875 UART: [exit] Launching FMC @ 0x40000130
64,110,526 UART:
64,110,769 UART: Running Caliptra FMC ...
64,111,870 UART:
64,112,022 UART: [state] CFI Enabled
64,156,134 UART: [art] Extend RT PCRs Done
64,157,274 UART: [art] Lock RT PCRs Done
64,158,498 UART: [art] Populate DV Done
64,164,058 UART: [fht] FMC Alias Private Key: 7
64,165,610 UART: [art] Derive CDI
64,166,418 UART: [art] Store in in slot 0x4
64,209,001 UART: [art] Derive Key Pair
64,210,041 UART: [art] Store priv key in slot 0x5
66,637,195 UART: [art] Derive Key Pair - Done
66,650,050 UART: [art] Signing Cert with AUTHO
66,651,362 UART: RITY.KEYID = 7
68,356,911 UART: [art] Erasing AUTHORITY.KEYID = 7
68,358,412 UART: [art] PUB.X = 2A26B5B3609F0C335B41B983BAE724CB7A5040C7699C7D509BFDD7BFAEB6052D4AD1925195396B22103A68C69459AA0B
68,365,704 UART: [art] PUB.Y = 61ACDB7EB8E43CB2B246E5258429E5E25FC5BDC3F842568D9141A32A193AF69FF8F766B112F275AD52F94AF8769E380C
68,372,931 UART: [art] SIG.R = ACC5BEA8326CAA7A4DF6609915FC495F53DD34A751189B819CDD40B8325D7CBE11FB78A1A55212D8CC5EEA13CC5005BE
68,380,372 UART: [art] SIG.S = 6D88CF4BEA07C8ED9C01ABA632D75AAC0585355D53BFAAF16595DE226095D722358C98708C692C2F36623EB80F51AE86
69,359,857 UART: Caliptra RT
69,360,568 UART: [state] CFI Enabled
69,649,310 UART: [rt] RT listening for mailbox commands...
69,651,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,681,083 UART: [rt]cmd =0x494e464f, len=4
69,685,095 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,754,081 ready_for_fw is high
3,754,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,015 >>> mbox cmd response: success
14,957,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,208,228 UART:
19,208,625 UART: Running Caliptra FMC ...
19,209,818 UART:
19,209,980 UART: [state] CFI Enabled
19,218,138 UART: [fht] FMC Alias Private Key: 7
20,975,061 UART: [art] Extend RT PCRs Done
20,976,294 UART: [art] Lock RT PCRs Done
20,977,538 UART: [art] Populate DV Done
20,983,071 UART: [fht] FMC Alias Private Key: 7
20,984,671 UART: [art] Derive CDI
20,985,427 UART: [art] Store in in slot 0x4
21,027,904 UART: [art] Derive Key Pair
21,028,922 UART: [art] Store priv key in slot 0x5
23,455,505 UART: [art] Derive Key Pair - Done
23,468,397 UART: [art] Signing Cert with AUTHO
23,469,694 UART: RITY.KEYID = 7
25,175,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,824 UART: [art] PUB.X = 121235CA6CE6EC5FD75012B23385C1B920712AE4A4D5B8890C93F2F8C4D08B50D48E85F706BFF885EBA115F0F138DFD4
25,184,063 UART: [art] PUB.Y = 93A7D4F4857E0E7E816455A1C78191E91A8B0BDF88BE77D259221ECB64A9B561495331BA2B0D6BA3BF9732841F1E9D7B
25,191,369 UART: [art] SIG.R = 9C3E65ED9CE50339DD42FE9FF3E20DE01C415B2E48C7439CE887AB155E233A10D22DB1EDDC125F43459546140E3FB13F
25,198,755 UART: [art] SIG.S = 35C907726786B6236B0FCFCE09709038B3B9779F69F08547675C950F314179131E5585EC94E3BC20EE6EA1A776DDBC2D
26,177,591 UART: Caliptra RT
26,178,281 UART: [state] CFI Enabled
26,295,369 UART: [rt] RT listening for mailbox commands...
26,326,443 UART: [rt]cmd =0x494e464f, len=4
26,330,478 >>> mbox cmd response data (264 bytes)
28,389,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,121,877 >>> mbox cmd response: success
36,154,966 UART:
36,155,310 UART: Running Caliptra FMC ...
36,156,443 UART:
36,156,612 UART: [state] CFI Enabled
36,200,416 UART: [art] Extend RT PCRs Done
36,201,562 UART: [art] Lock RT PCRs Done
36,203,016 UART: [art] Populate DV Done
36,208,482 UART: [fht] FMC Alias Private Key: 7
36,210,128 UART: [art] Derive CDI
36,210,936 UART: [art] Store in in slot 0x4
36,253,289 UART: [art] Derive Key Pair
36,254,332 UART: [art] Store priv key in slot 0x5
38,681,515 UART: [art] Derive Key Pair - Done
38,694,134 UART: [art] Signing Cert with AUTHO
38,695,429 UART: RITY.KEYID = 7
40,400,574 UART: [art] Erasing AUTHORITY.KEYID = 7
40,402,080 UART: [art] PUB.X = 09E8B5EE339F254D5841EF82FCFD435E5907924F5BBB390610087DD19ACAD8DFE9942BC1528E64E61A4C7AE0F29E23C9
40,409,330 UART: [art] PUB.Y = B8686A01DFCA6086841BE238DB70E480C9B23DD3E833C41CC225C79482DBE231B409F63F12732C10A64859770FA90A97
40,416,611 UART: [art] SIG.R = 91F67B7F006F5AD0C2C72250ED3B467374FDEAF5D7D4EFF1CB8BE5E131458BA9B8BCE679E76DB5C6DA1F0F1BC23A26E4
40,423,996 UART: [art] SIG.S = C878E14EC2E7015C64CB71AD21A0A98CD463E8F50935F9AD8434898A73CEF75B2F966B65E1A76430C0F1479AD976B430
41,403,016 UART: Caliptra RT
41,403,727 UART: [state] CFI Enabled
41,693,887 UART: [rt] RT listening for mailbox commands...
41,695,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,725,716 UART: [rt]cmd =0x494e464f, len=4
41,729,776 >>> mbox cmd response data (264 bytes)
43,785,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
51,530,366 >>> mbox cmd response: success
51,565,039 UART:
51,565,350 UART: Running Caliptra FMC ...
51,566,414 UART:
51,566,568 UART: [state] CFI Enabled
51,610,608 UART: [art] Extend RT PCRs Done
51,611,820 UART: [art] Lock RT PCRs Done
51,613,254 UART: [art] Populate DV Done
51,618,501 UART: [fht] FMC Alias Private Key: 7
51,620,091 UART: [art] Derive CDI
51,620,905 UART: [art] Store in in slot 0x4
51,663,660 UART: [art] Derive Key Pair
51,664,678 UART: [art] Store priv key in slot 0x5
54,091,936 UART: [art] Derive Key Pair - Done
54,104,666 UART: [art] Signing Cert with AUTHO
54,105,974 UART: RITY.KEYID = 7
55,811,185 UART: [art] Erasing AUTHORITY.KEYID = 7
55,812,685 UART: [art] PUB.X = 660AE98D73F30B7AC96C37B901A13108553BAA0E3E789EC9D858D235ACFC4C0DCEAAAF95254C2FB29DCFE6C48BF2F8CB
55,819,991 UART: [art] PUB.Y = BBCC2050014100E0BE940F332E0103F7DAEBF0980ABD3492B73768FA43620E56E6F018F1845A9EEC6A6D2D9E700D6C2A
55,827,269 UART: [art] SIG.R = D77AB3DBB4B39E4F80E4BA9012E2E729A4A67B201F2DE62641901F35577EA0BD0DC0799F538CF22DCE87F5B2F559CAAF
55,834,693 UART: [art] SIG.S = 208ECE7169B4C70EB4C7B7591DFF017A2000C0B02FE958332689D4A50A1DB73CACED61CED2F33860ADF39E09BC8A48FF
56,813,625 UART: Caliptra RT
56,814,307 UART: [state] CFI Enabled
57,102,281 UART: [rt] RT listening for mailbox commands...
57,104,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,133,984 UART: [rt]cmd =0x494e464f, len=4
57,137,756 >>> mbox cmd response data (264 bytes)
57,139,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
64,873,835 >>> mbox cmd response: success
64,907,892 UART:
64,908,229 UART: Running Caliptra FMC ...
64,909,289 UART:
64,909,432 UART: [state] CFI Enabled
64,953,114 UART: [art] Extend RT PCRs Done
64,954,258 UART: [art] Lock RT PCRs Done
64,955,761 UART: [art] Populate DV Done
64,961,448 UART: [fht] FMC Alias Private Key: 7
64,963,094 UART: [art] Derive CDI
64,963,905 UART: [art] Store in in slot 0x4
65,006,383 UART: [art] Derive Key Pair
65,007,377 UART: [art] Store priv key in slot 0x5
67,433,870 UART: [art] Derive Key Pair - Done
67,446,680 UART: [art] Signing Cert with AUTHO
67,447,983 UART: RITY.KEYID = 7
69,153,307 UART: [art] Erasing AUTHORITY.KEYID = 7
69,154,818 UART: [art] PUB.X = 09E8B5EE339F254D5841EF82FCFD435E5907924F5BBB390610087DD19ACAD8DFE9942BC1528E64E61A4C7AE0F29E23C9
69,162,114 UART: [art] PUB.Y = B8686A01DFCA6086841BE238DB70E480C9B23DD3E833C41CC225C79482DBE231B409F63F12732C10A64859770FA90A97
69,169,340 UART: [art] SIG.R = 91F67B7F006F5AD0C2C72250ED3B467374FDEAF5D7D4EFF1CB8BE5E131458BA9B8BCE679E76DB5C6DA1F0F1BC23A26E4
69,176,725 UART: [art] SIG.S = C878E14EC2E7015C64CB71AD21A0A98CD463E8F50935F9AD8434898A73CEF75B2F966B65E1A76430C0F1479AD976B430
70,155,380 UART: Caliptra RT
70,156,074 UART: [state] CFI Enabled
70,447,248 UART: [rt] RT listening for mailbox commands...
70,449,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,478,750 UART: [rt]cmd =0x494e464f, len=4
70,482,819 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
Truncated 2120 bytes from beginning
,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,038 UART: [ldev] --
1,586,439 UART: [fwproc] Waiting for Commands...
1,587,244 UART: [fwproc] Received command 0x46574c44
1,588,035 UART: [fwproc] Received Image of size 114448 bytes
2,886,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,658 >>> mbox cmd response: success
3,078,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,079,772 UART: [afmc] ++
3,079,940 UART: [afmc] CDI.KEYID = 6
3,080,302 UART: [afmc] SUBJECT.KEYID = 7
3,080,727 UART: [afmc] AUTHORITY.KEYID = 5
3,115,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,597 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,138,289 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,144,162 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,149,876 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,157,707 UART: [afmc] --
3,158,797 UART: [cold-reset] --
3,159,745 UART: [state] Locking Datavault
3,161,132 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,736 UART: [state] Locking ICCM
3,162,274 UART: [exit] Launching FMC @ 0x40000130
3,167,603 UART:
3,167,619 UART: Running Caliptra FMC ...
3,168,027 UART:
3,168,081 UART: [state] CFI Enabled
3,178,635 UART: [fht] FMC Alias Private Key: 7
3,286,450 UART: [art] Extend RT PCRs Done
3,286,878 UART: [art] Lock RT PCRs Done
3,287,928 UART: [art] Populate DV Done
3,296,168 UART: [fht] FMC Alias Private Key: 7
3,297,332 UART: [art] Derive CDI
3,297,612 UART: [art] Store in in slot 0x4
3,383,009 UART: [art] Derive Key Pair
3,383,369 UART: [art] Store priv key in slot 0x5
3,396,899 UART: [art] Derive Key Pair - Done
3,411,527 UART: [art] Signing Cert with AUTHO
3,412,007 UART: RITY.KEYID = 7
3,426,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,664 UART: [art] PUB.X = EA0DABC2235692540ACDF96A8E2E541AFDE66164C9D932FD8A1E79618EE5F4609446A67D26A1E6290113DCA188DA3E6F
3,434,437 UART: [art] PUB.Y = 9E0B9930ED06478E2355F0BF318069DD652D82CA62FC4DF118DC7AE0668635968B4E4BFB6464456CBAAF820D11A12549
3,441,382 UART: [art] SIG.R = 87183181AB7647DFA2217EBE0FCFB761903E1E0DD53806BAC769A1067665EE1AD0612010285C2332A50BBAFA6B794B87
3,448,141 UART: [art] SIG.S = FADB6962D438C5733C5105E5DF45D3896480FC821B68441608208D7B17FA205ED85E7726C8A392BDA1149C1E7D297D26
3,471,352 UART: Caliptra RT
3,471,605 UART: [state] CFI Enabled
3,580,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,151 UART: [rt]cmd =0x494e464f, len=4
3,614,440 >>> mbox cmd response data (264 bytes)
3,614,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,235 UART:
3,615,251 UART: Running Caliptra ROM ...
3,615,659 UART:
3,615,713 UART: [state] CFI Enabled
3,618,761 UART: [state] LifecycleState = Unprovisioned
3,619,416 UART: [state] DebugLocked = No
3,619,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,703 UART: [kat] SHA2-256
4,415,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,749 UART: [kat] ++
4,419,901 UART: [kat] sha1
4,424,369 UART: [kat] SHA2-256
4,426,307 UART: [kat] SHA2-384
4,428,868 UART: [kat] SHA2-512-ACC
4,430,768 UART: [kat] ECC-384
4,436,279 UART: [kat] HMAC-384Kdf
4,440,885 UART: [kat] LMS
5,009,081 UART: [kat] --
5,009,590 UART: [update-reset] ++
6,345,314 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,346,572 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,496,622 >>> mbox cmd response: success
6,496,937 UART: [update-reset] Copying MAN_2 To MAN_1
6,504,951 UART: [update-reset Success] --
6,505,886 UART: [state] Locking Datavault
6,506,654 UART: [state] Locking PCR0, PCR1 and PCR31
6,507,258 UART: [state] Locking ICCM
6,507,826 UART: [exit] Launching FMC @ 0x40000130
6,513,155 UART:
6,513,171 UART: Running Caliptra FMC ...
6,513,579 UART:
6,513,633 UART: [state] CFI Enabled
6,602,116 UART: [art] Extend RT PCRs Done
6,602,544 UART: [art] Lock RT PCRs Done
6,603,879 UART: [art] Populate DV Done
6,612,111 UART: [fht] FMC Alias Private Key: 7
6,613,095 UART: [art] Derive CDI
6,613,375 UART: [art] Store in in slot 0x4
6,698,996 UART: [art] Derive Key Pair
6,699,356 UART: [art] Store priv key in slot 0x5
6,712,630 UART: [art] Derive Key Pair - Done
6,727,486 UART: [art] Signing Cert with AUTHO
6,727,966 UART: RITY.KEYID = 7
6,743,162 UART: [art] Erasing AUTHORITY.KEYID = 7
6,743,927 UART: [art] PUB.X = DB130A0C7747ACCFD41DD8FADF3C6E3B9F795EC420D03A8EE348EDDF816934206D3E629D2C051DCF3FEF7AD63E808536
6,750,710 UART: [art] PUB.Y = 9AADB5561CFDAF805B1FC6681F568CDAB1BB1A6C61590180DBEB81D52A9FD4A2066AC00E48DA0344B0BD427AB1947399
6,757,666 UART: [art] SIG.R = 81E9F4C609480795A2553C831AAA35978A02A89D5131988C293440CB267B4122B579E4B23BD242112B96E800A872F53A
6,764,393 UART: [art] SIG.S = 6BADAB1FC648E45BB9C431A33C2A01B54B40F686C2AB1F3B49F39B2016D175A375EEE479CB0283A8E3B556A75BB922A2
6,788,500 UART: Caliptra RT
6,788,753 UART: [state] CFI Enabled
7,072,236 UART: [rt] RT listening for mailbox commands...
7,072,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,613 UART: [rt]cmd =0x494e464f, len=4
7,106,054 >>> mbox cmd response data (264 bytes)
7,106,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,106,891 UART:
7,106,907 UART: Running Caliptra ROM ...
7,107,315 UART:
7,107,369 UART: [state] CFI Enabled
7,109,573 UART: [state] LifecycleState = Unprovisioned
7,110,228 UART: [state] DebugLocked = No
7,110,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,112,333 UART: [kat] SHA2-256
7,906,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,910,379 UART: [kat] ++
7,910,531 UART: [kat] sha1
7,914,811 UART: [kat] SHA2-256
7,916,749 UART: [kat] SHA2-384
7,919,354 UART: [kat] SHA2-512-ACC
7,921,254 UART: [kat] ECC-384
7,927,215 UART: [kat] HMAC-384Kdf
7,931,735 UART: [kat] LMS
8,499,931 UART: [kat] --
8,500,904 UART: [update-reset] ++
9,835,770 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,836,880 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
9,986,930 >>> mbox cmd response: success
9,987,263 UART: [update-reset] Copying MAN_2 To MAN_1
9,995,277 UART: [update-reset Success] --
9,996,222 UART: [state] Locking Datavault
9,996,946 UART: [state] Locking PCR0, PCR1 and PCR31
9,997,550 UART: [state] Locking ICCM
9,998,042 UART: [exit] Launching FMC @ 0x40000130
10,003,371 UART:
10,003,387 UART: Running Caliptra FMC ...
10,003,795 UART:
10,003,849 UART: [state] CFI Enabled
10,093,136 UART: [art] Extend RT PCRs Done
10,093,564 UART: [art] Lock RT PCRs Done
10,094,891 UART: [art] Populate DV Done
10,103,293 UART: [fht] FMC Alias Private Key: 7
10,104,265 UART: [art] Derive CDI
10,104,545 UART: [art] Store in in slot 0x4
10,189,996 UART: [art] Derive Key Pair
10,190,356 UART: [art] Store priv key in slot 0x5
10,203,642 UART: [art] Derive Key Pair - Done
10,218,274 UART: [art] Signing Cert with AUTHO
10,218,754 UART: RITY.KEYID = 7
10,234,286 UART: [art] Erasing AUTHORITY.KEYID = 7
10,235,051 UART: [art] PUB.X = 51C9261631DA8629E7B625E237769F0EC462D7B73C86D50A8DC4E6BE174CA184AC91CFD394571CA5254AC3570D5A8D9D
10,241,818 UART: [art] PUB.Y = 4F8FE7E9F7CEEF028F5EB4510C71A91913296696526E5559D12081B6138E132AF876857451D4E2BF85C694DE43748C17
10,248,756 UART: [art] SIG.R = 5567A28A5D25F231ECE697B8633FA2727A1E049CB698F4766A74EB2380ABEECA12888FBC8A4D77FC2B48F8BC46C513C0
10,255,535 UART: [art] SIG.S = A820CB64AED05C3C30579530C4AE45F379F246CCB1B2BDB5F14CD7D1CD52CD6C7DF40AC165553A686A08569CE4B86551
10,278,832 UART: Caliptra RT
10,279,085 UART: [state] CFI Enabled
10,558,586 UART: [rt] RT listening for mailbox commands...
10,559,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,588,755 UART: [rt]cmd =0x494e464f, len=4
10,592,112 >>> mbox cmd response data (264 bytes)
10,592,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,592,851 UART:
10,592,867 UART: Running Caliptra ROM ...
10,593,275 UART:
10,593,329 UART: [state] CFI Enabled
10,596,245 UART: [state] LifecycleState = Unprovisioned
10,596,900 UART: [state] DebugLocked = No
10,597,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,599,197 UART: [kat] SHA2-256
11,393,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,397,243 UART: [kat] ++
11,397,395 UART: [kat] sha1
11,401,631 UART: [kat] SHA2-256
11,403,569 UART: [kat] SHA2-384
11,406,366 UART: [kat] SHA2-512-ACC
11,408,266 UART: [kat] ECC-384
11,413,803 UART: [kat] HMAC-384Kdf
11,418,463 UART: [kat] LMS
11,986,659 UART: [kat] --
11,987,526 UART: [update-reset] ++
13,321,972 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,323,202 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,473,252 >>> mbox cmd response: success
13,473,605 UART: [update-reset] Copying MAN_2 To MAN_1
13,481,619 UART: [update-reset Success] --
13,482,598 UART: [state] Locking Datavault
13,483,406 UART: [state] Locking PCR0, PCR1 and PCR31
13,484,010 UART: [state] Locking ICCM
13,484,450 UART: [exit] Launching FMC @ 0x40000130
13,489,779 UART:
13,489,795 UART: Running Caliptra FMC ...
13,490,203 UART:
13,490,257 UART: [state] CFI Enabled
13,579,410 UART: [art] Extend RT PCRs Done
13,579,838 UART: [art] Lock RT PCRs Done
13,580,999 UART: [art] Populate DV Done
13,589,117 UART: [fht] FMC Alias Private Key: 7
13,590,295 UART: [art] Derive CDI
13,590,575 UART: [art] Store in in slot 0x4
13,676,132 UART: [art] Derive Key Pair
13,676,492 UART: [art] Store priv key in slot 0x5
13,689,064 UART: [art] Derive Key Pair - Done
13,703,528 UART: [art] Signing Cert with AUTHO
13,704,008 UART: RITY.KEYID = 7
13,719,602 UART: [art] Erasing AUTHORITY.KEYID = 7
13,720,367 UART: [art] PUB.X = DB130A0C7747ACCFD41DD8FADF3C6E3B9F795EC420D03A8EE348EDDF816934206D3E629D2C051DCF3FEF7AD63E808536
13,727,150 UART: [art] PUB.Y = 9AADB5561CFDAF805B1FC6681F568CDAB1BB1A6C61590180DBEB81D52A9FD4A2066AC00E48DA0344B0BD427AB1947399
13,734,106 UART: [art] SIG.R = 81E9F4C609480795A2553C831AAA35978A02A89D5131988C293440CB267B4122B579E4B23BD242112B96E800A872F53A
13,740,833 UART: [art] SIG.S = 6BADAB1FC648E45BB9C431A33C2A01B54B40F686C2AB1F3B49F39B2016D175A375EEE479CB0283A8E3B556A75BB922A2
13,765,118 UART: Caliptra RT
13,765,371 UART: [state] CFI Enabled
14,040,270 UART: [rt] RT listening for mailbox commands...
14,040,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,070,337 UART: [rt]cmd =0x494e464f, len=4
14,073,750 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 ready_for_fw is high
1,362,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,180 >>> mbox cmd response: success
2,929,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,433 UART:
2,990,449 UART: Running Caliptra FMC ...
2,990,857 UART:
2,990,911 UART: [state] CFI Enabled
3,000,951 UART: [fht] FMC Alias Private Key: 7
3,108,290 UART: [art] Extend RT PCRs Done
3,108,718 UART: [art] Lock RT PCRs Done
3,110,340 UART: [art] Populate DV Done
3,118,852 UART: [fht] FMC Alias Private Key: 7
3,119,938 UART: [art] Derive CDI
3,120,218 UART: [art] Store in in slot 0x4
3,206,091 UART: [art] Derive Key Pair
3,206,451 UART: [art] Store priv key in slot 0x5
3,219,817 UART: [art] Derive Key Pair - Done
3,234,394 UART: [art] Signing Cert with AUTHO
3,234,874 UART: RITY.KEYID = 7
3,250,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,285 UART: [art] PUB.X = 708A708E3E0951DCEDE2081506B553F9A7CA7B378EBD3EB37F42C9AABD3C721CBDDF31022D22081F8B7BF7DD1F86F1F2
3,258,060 UART: [art] PUB.Y = 846269DC15BE6FE22E6C5504DF8FB18984A0E9941E0B94C588FD411FCFD1BC3C6402EE31B6DEEB93A5BEA04AFC8E3C85
3,265,023 UART: [art] SIG.R = 0F7C84EB7EC2E57888B842005890DBCB4444D0BC6F986E1147697DC86AB9A7225CC29012D57F156BE9D286C9E89F8ACD
3,271,776 UART: [art] SIG.S = CFDD65D1C9E2433335C85423F5F902B5792BCD13C8E4984B1660B0D55AC262DF76B09B47FF4FDF0685AF669EF1B6DA22
3,295,317 UART: Caliptra RT
3,295,570 UART: [state] CFI Enabled
3,403,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,581 UART: [rt]cmd =0x494e464f, len=4
3,436,974 >>> mbox cmd response data (264 bytes)
3,436,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,200,602 >>> mbox cmd response: success
6,214,185 UART:
6,214,201 UART: Running Caliptra FMC ...
6,214,609 UART:
6,214,663 UART: [state] CFI Enabled
6,303,750 UART: [art] Extend RT PCRs Done
6,304,178 UART: [art] Lock RT PCRs Done
6,305,767 UART: [art] Populate DV Done
6,314,249 UART: [fht] FMC Alias Private Key: 7
6,315,329 UART: [art] Derive CDI
6,315,609 UART: [art] Store in in slot 0x4
6,401,358 UART: [art] Derive Key Pair
6,401,718 UART: [art] Store priv key in slot 0x5
6,415,350 UART: [art] Derive Key Pair - Done
6,430,202 UART: [art] Signing Cert with AUTHO
6,430,682 UART: RITY.KEYID = 7
6,445,780 UART: [art] Erasing AUTHORITY.KEYID = 7
6,446,545 UART: [art] PUB.X = 0E9C99764ACA977A49355A3F3BB6122518F59CD422554E37D3243B988B9719068FC0E8B2C774255E5A6679116EF72DA1
6,453,303 UART: [art] PUB.Y = 3A0E236E89882A7DCA57967F614DC84F857E3D1C6017375BF0898429D3A82CC0459A2DD074DA794473D6614FC8D3F603
6,460,245 UART: [art] SIG.R = BDBB7BAA1D17E7610F4E40ACFA1ABE1D59CF3AB198D7C19D0DB28589B0F4654BF29E75F5749C5F11559AFE76CCAC093A
6,467,032 UART: [art] SIG.S = AF5C089687FCD7620D5AAFA88F65A3959CA7BA198D4AAC4B3C2A106FCFD8E25DCEEF263F0DE556176322F2F3722F61AF
6,490,576 UART: Caliptra RT
6,490,829 UART: [state] CFI Enabled
6,773,173 UART: [rt] RT listening for mailbox commands...
6,773,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,803,142 UART: [rt]cmd =0x494e464f, len=4
6,806,493 >>> mbox cmd response data (264 bytes)
6,806,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,569,329 >>> mbox cmd response: success
9,582,798 UART:
9,582,814 UART: Running Caliptra FMC ...
9,583,222 UART:
9,583,276 UART: [state] CFI Enabled
9,672,179 UART: [art] Extend RT PCRs Done
9,672,607 UART: [art] Lock RT PCRs Done
9,673,650 UART: [art] Populate DV Done
9,681,954 UART: [fht] FMC Alias Private Key: 7
9,683,086 UART: [art] Derive CDI
9,683,366 UART: [art] Store in in slot 0x4
9,769,149 UART: [art] Derive Key Pair
9,769,509 UART: [art] Store priv key in slot 0x5
9,782,701 UART: [art] Derive Key Pair - Done
9,797,491 UART: [art] Signing Cert with AUTHO
9,797,971 UART: RITY.KEYID = 7
9,813,051 UART: [art] Erasing AUTHORITY.KEYID = 7
9,813,816 UART: [art] PUB.X = F51A65F43FF28F63DF1B4EC9C87134AD327510ADF0EB42E1DB47BDAA4A930AEE61E987D01A313C83DA7AC2FCC5C4A598
9,820,607 UART: [art] PUB.Y = 2BE0E67D7524712DF6820508337CA4590BE3B45E6D32BBA7A117226BD7DAB97DCCF86A466ABF7DABCA7BC2C357E3BAF7
9,827,570 UART: [art] SIG.R = 4CDEE977D1060538F292C9FD309005E7E7E6CA134AB2EB7A7B9E0773E792195A6ED2F2EEFDC539575C4FC8A709EC97D0
9,834,339 UART: [art] SIG.S = 8ED6895550A14CE055C69746506B499B43BFBB459046816562BE1AD6329ABE240A4AD0C4B5D61291F02CC8D18D518A55
9,857,611 UART: Caliptra RT
9,857,864 UART: [state] CFI Enabled
10,140,683 UART: [rt] RT listening for mailbox commands...
10,141,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,170,958 UART: [rt]cmd =0x494e464f, len=4
10,174,315 >>> mbox cmd response data (264 bytes)
10,174,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,938,401 >>> mbox cmd response: success
12,951,540 UART:
12,951,556 UART: Running Caliptra FMC ...
12,951,964 UART:
12,952,018 UART: [state] CFI Enabled
13,040,803 UART: [art] Extend RT PCRs Done
13,041,231 UART: [art] Lock RT PCRs Done
13,042,848 UART: [art] Populate DV Done
13,051,146 UART: [fht] FMC Alias Private Key: 7
13,052,238 UART: [art] Derive CDI
13,052,518 UART: [art] Store in in slot 0x4
13,138,391 UART: [art] Derive Key Pair
13,138,751 UART: [art] Store priv key in slot 0x5
13,151,725 UART: [art] Derive Key Pair - Done
13,166,477 UART: [art] Signing Cert with AUTHO
13,166,957 UART: RITY.KEYID = 7
13,181,913 UART: [art] Erasing AUTHORITY.KEYID = 7
13,182,678 UART: [art] PUB.X = 0E9C99764ACA977A49355A3F3BB6122518F59CD422554E37D3243B988B9719068FC0E8B2C774255E5A6679116EF72DA1
13,189,436 UART: [art] PUB.Y = 3A0E236E89882A7DCA57967F614DC84F857E3D1C6017375BF0898429D3A82CC0459A2DD074DA794473D6614FC8D3F603
13,196,378 UART: [art] SIG.R = BDBB7BAA1D17E7610F4E40ACFA1ABE1D59CF3AB198D7C19D0DB28589B0F4654BF29E75F5749C5F11559AFE76CCAC093A
13,203,165 UART: [art] SIG.S = AF5C089687FCD7620D5AAFA88F65A3959CA7BA198D4AAC4B3C2A106FCFD8E25DCEEF263F0DE556176322F2F3722F61AF
13,226,847 UART: Caliptra RT
13,227,100 UART: [state] CFI Enabled
13,504,724 UART: [rt] RT listening for mailbox commands...
13,505,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,534,751 UART: [rt]cmd =0x494e464f, len=4
13,537,970 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.72s
Truncated 2120 bytes from beginning
,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,193 UART: [ldev] --
1,585,586 UART: [fwproc] Waiting for Commands...
1,586,203 UART: [fwproc] Received command 0x46574c44
1,586,994 UART: [fwproc] Received Image of size 114448 bytes
2,886,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,884 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,237 >>> mbox cmd response: success
3,079,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,080,411 UART: [afmc] ++
3,080,579 UART: [afmc] CDI.KEYID = 6
3,080,941 UART: [afmc] SUBJECT.KEYID = 7
3,081,366 UART: [afmc] AUTHORITY.KEYID = 5
3,116,628 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,776 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,139,468 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,145,341 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,151,055 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,158,824 UART: [afmc] --
3,159,908 UART: [cold-reset] --
3,160,728 UART: [state] Locking Datavault
3,162,069 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,673 UART: [state] Locking ICCM
3,163,297 UART: [exit] Launching FMC @ 0x40000130
3,168,626 UART:
3,168,642 UART: Running Caliptra FMC ...
3,169,050 UART:
3,169,193 UART: [state] CFI Enabled
3,180,101 UART: [fht] FMC Alias Private Key: 7
3,288,160 UART: [art] Extend RT PCRs Done
3,288,588 UART: [art] Lock RT PCRs Done
3,290,384 UART: [art] Populate DV Done
3,298,766 UART: [fht] FMC Alias Private Key: 7
3,299,864 UART: [art] Derive CDI
3,300,144 UART: [art] Store in in slot 0x4
3,385,641 UART: [art] Derive Key Pair
3,386,001 UART: [art] Store priv key in slot 0x5
3,399,409 UART: [art] Derive Key Pair - Done
3,414,221 UART: [art] Signing Cert with AUTHO
3,414,701 UART: RITY.KEYID = 7
3,430,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,832 UART: [art] PUB.X = B8FEE12AB956748A44DCDDCE8EF8CFE4B3953CA0F2BD290DBA217621FF480E3A658159B14855DF91381A3397F473F75C
3,437,610 UART: [art] PUB.Y = EE7EA33450EA7C5058819FA6D9231701CF2C17B8E4E08C4DCA415254F7AE9AB718338AABF598CCDDF326A2665CF85A6A
3,444,573 UART: [art] SIG.R = 9DDF54AF241B906E16E728D7013813AA715A418C5650DD0E6E570196CABAD70FDC907EA798A74180DD7B8B49284B2A9B
3,451,339 UART: [art] SIG.S = 643E186624BBB0FC49E4ABD9418D283250BF375939B60FB9781D3ECB42FD2362A10F539798A2B9E18F1ECBB87ABDE223
3,475,390 UART: Caliptra RT
3,475,735 UART: [state] CFI Enabled
3,584,214 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,394 UART: [rt]cmd =0x494e464f, len=4
3,617,707 >>> mbox cmd response data (264 bytes)
3,617,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,452 UART:
3,618,468 UART: Running Caliptra ROM ...
3,618,876 UART:
3,619,017 UART: [state] CFI Enabled
3,621,861 UART: [state] LifecycleState = Unprovisioned
3,622,516 UART: [state] DebugLocked = No
3,623,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,624,735 UART: [kat] SHA2-256
4,418,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,422,781 UART: [kat] ++
4,422,933 UART: [kat] sha1
4,427,019 UART: [kat] SHA2-256
4,428,957 UART: [kat] SHA2-384
4,431,658 UART: [kat] SHA2-512-ACC
4,433,558 UART: [kat] ECC-384
4,439,245 UART: [kat] HMAC-384Kdf
4,444,015 UART: [kat] LMS
5,012,211 UART: [kat] --
5,013,170 UART: [update-reset] ++
6,349,560 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,350,658 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,500,708 >>> mbox cmd response: success
6,500,963 UART: [update-reset] Copying MAN_2 To MAN_1
6,508,977 UART: [update-reset Success] --
6,509,966 UART: [state] Locking Datavault
6,510,654 UART: [state] Locking PCR0, PCR1 and PCR31
6,511,258 UART: [state] Locking ICCM
6,511,928 UART: [exit] Launching FMC @ 0x40000130
6,517,257 UART:
6,517,273 UART: Running Caliptra FMC ...
6,517,681 UART:
6,517,824 UART: [state] CFI Enabled
6,606,781 UART: [art] Extend RT PCRs Done
6,607,209 UART: [art] Lock RT PCRs Done
6,608,512 UART: [art] Populate DV Done
6,616,866 UART: [fht] FMC Alias Private Key: 7
6,617,982 UART: [art] Derive CDI
6,618,262 UART: [art] Store in in slot 0x4
6,703,989 UART: [art] Derive Key Pair
6,704,349 UART: [art] Store priv key in slot 0x5
6,717,553 UART: [art] Derive Key Pair - Done
6,732,556 UART: [art] Signing Cert with AUTHO
6,733,036 UART: RITY.KEYID = 7
6,747,978 UART: [art] Erasing AUTHORITY.KEYID = 7
6,748,743 UART: [art] PUB.X = C19A24FCE16C4F05E6F9E225ADD3CE2AEDDADD18AC36A79F4D49E0CAE1FE55028592901F3EF3688F18A349EFCCED8A2C
6,755,537 UART: [art] PUB.Y = C6ADDE31577F027591954F3E47DE545E15A5A6DC55A62AB9FBC23972E89997C5F3B37F3F6E11B033CC37F83244FCA4CF
6,762,496 UART: [art] SIG.R = DEB0225A878D68D02CA2616A0E8281DF20B1616B2BAB1D4D3CCBEBF5A945E1E69B271556CF49C8A2B985E147D249EB8E
6,769,279 UART: [art] SIG.S = F73A0441A77835AB1D593AB26ADA02C28FA6CD466D020411C06C446C8B7A24F818053135C94581CA73F4E6CE596ED1D5
6,792,885 UART: Caliptra RT
6,793,230 UART: [state] CFI Enabled
7,078,472 UART: [rt] RT listening for mailbox commands...
7,079,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,108,651 UART: [rt]cmd =0x494e464f, len=4
7,111,952 >>> mbox cmd response data (264 bytes)
7,111,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,112,785 UART:
7,112,801 UART: Running Caliptra ROM ...
7,113,209 UART:
7,113,350 UART: [state] CFI Enabled
7,116,254 UART: [state] LifecycleState = Unprovisioned
7,116,909 UART: [state] DebugLocked = No
7,117,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,119,170 UART: [kat] SHA2-256
7,913,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,917,216 UART: [kat] ++
7,917,368 UART: [kat] sha1
7,921,790 UART: [kat] SHA2-256
7,923,728 UART: [kat] SHA2-384
7,926,293 UART: [kat] SHA2-512-ACC
7,928,193 UART: [kat] ECC-384
7,933,788 UART: [kat] HMAC-384Kdf
7,938,422 UART: [kat] LMS
8,506,618 UART: [kat] --
8,507,549 UART: [update-reset] ++
9,842,707 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,843,981 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
9,994,031 >>> mbox cmd response: success
9,994,172 UART: [update-reset] Copying MAN_2 To MAN_1
10,002,186 UART: [update-reset Success] --
10,003,427 UART: [state] Locking Datavault
10,004,191 UART: [state] Locking PCR0, PCR1 and PCR31
10,004,795 UART: [state] Locking ICCM
10,005,263 UART: [exit] Launching FMC @ 0x40000130
10,010,592 UART:
10,010,608 UART: Running Caliptra FMC ...
10,011,016 UART:
10,011,159 UART: [state] CFI Enabled
10,100,424 UART: [art] Extend RT PCRs Done
10,100,852 UART: [art] Lock RT PCRs Done
10,102,433 UART: [art] Populate DV Done
10,110,725 UART: [fht] FMC Alias Private Key: 7
10,111,799 UART: [art] Derive CDI
10,112,079 UART: [art] Store in in slot 0x4
10,197,960 UART: [art] Derive Key Pair
10,198,320 UART: [art] Store priv key in slot 0x5
10,211,738 UART: [art] Derive Key Pair - Done
10,226,376 UART: [art] Signing Cert with AUTHO
10,226,856 UART: RITY.KEYID = 7
10,242,328 UART: [art] Erasing AUTHORITY.KEYID = 7
10,243,093 UART: [art] PUB.X = 2617DD6795C144C1B4FDC0FBDBE32E0CD2A292250ABC06FAB9F2F04DA945D3CE6670124D336F2C5A7B56DCB3BC795D41
10,249,874 UART: [art] PUB.Y = AEA42E395236D76F8EE572E870D0D40CAAE30E2134534BE11FA15E1F985FDD0E12EF453D3CC2EBA594A431C00EA13CFE
10,256,832 UART: [art] SIG.R = 001C855C26B338E0C245BAF8B3B08F335C0A3540D524F41E215BFAFF8D88815CBD03222A9BED420C3FC27A5048E15731
10,263,577 UART: [art] SIG.S = 1921DCBA3BAFD6A9A1995DD52B2AC46A9947E0D938D40FFB81266F6C593B2461EC01034945E9F60A6612E1F193B198B2
10,287,352 UART: Caliptra RT
10,287,697 UART: [state] CFI Enabled
10,570,468 UART: [rt] RT listening for mailbox commands...
10,571,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,600,659 UART: [rt]cmd =0x494e464f, len=4
10,603,984 >>> mbox cmd response data (264 bytes)
10,603,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,604,735 UART:
10,604,751 UART: Running Caliptra ROM ...
10,605,159 UART:
10,605,300 UART: [state] CFI Enabled
10,608,140 UART: [state] LifecycleState = Unprovisioned
10,608,795 UART: [state] DebugLocked = No
10,609,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,610,932 UART: [kat] SHA2-256
11,404,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,408,978 UART: [kat] ++
11,409,130 UART: [kat] sha1
11,413,260 UART: [kat] SHA2-256
11,415,198 UART: [kat] SHA2-384
11,417,929 UART: [kat] SHA2-512-ACC
11,419,829 UART: [kat] ECC-384
11,425,160 UART: [kat] HMAC-384Kdf
11,429,684 UART: [kat] LMS
11,997,880 UART: [kat] --
11,998,577 UART: [update-reset] ++
13,333,491 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,334,739 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,484,789 >>> mbox cmd response: success
13,484,976 UART: [update-reset] Copying MAN_2 To MAN_1
13,492,990 UART: [update-reset Success] --
13,493,949 UART: [state] Locking Datavault
13,494,885 UART: [state] Locking PCR0, PCR1 and PCR31
13,495,489 UART: [state] Locking ICCM
13,496,109 UART: [exit] Launching FMC @ 0x40000130
13,501,438 UART:
13,501,454 UART: Running Caliptra FMC ...
13,501,862 UART:
13,502,005 UART: [state] CFI Enabled
13,590,980 UART: [art] Extend RT PCRs Done
13,591,408 UART: [art] Lock RT PCRs Done
13,592,611 UART: [art] Populate DV Done
13,600,731 UART: [fht] FMC Alias Private Key: 7
13,601,775 UART: [art] Derive CDI
13,602,055 UART: [art] Store in in slot 0x4
13,687,984 UART: [art] Derive Key Pair
13,688,344 UART: [art] Store priv key in slot 0x5
13,702,136 UART: [art] Derive Key Pair - Done
13,717,123 UART: [art] Signing Cert with AUTHO
13,717,603 UART: RITY.KEYID = 7
13,733,271 UART: [art] Erasing AUTHORITY.KEYID = 7
13,734,036 UART: [art] PUB.X = C19A24FCE16C4F05E6F9E225ADD3CE2AEDDADD18AC36A79F4D49E0CAE1FE55028592901F3EF3688F18A349EFCCED8A2C
13,740,830 UART: [art] PUB.Y = C6ADDE31577F027591954F3E47DE545E15A5A6DC55A62AB9FBC23972E89997C5F3B37F3F6E11B033CC37F83244FCA4CF
13,747,789 UART: [art] SIG.R = DEB0225A878D68D02CA2616A0E8281DF20B1616B2BAB1D4D3CCBEBF5A945E1E69B271556CF49C8A2B985E147D249EB8E
13,754,572 UART: [art] SIG.S = F73A0441A77835AB1D593AB26ADA02C28FA6CD466D020411C06C446C8B7A24F818053135C94581CA73F4E6CE596ED1D5
13,777,730 UART: Caliptra RT
13,778,075 UART: [state] CFI Enabled
14,056,745 UART: [rt] RT listening for mailbox commands...
14,057,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,086,738 UART: [rt]cmd =0x494e464f, len=4
14,090,293 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 ready_for_fw is high
1,362,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,027 >>> mbox cmd response: success
2,930,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,991,790 UART:
2,991,806 UART: Running Caliptra FMC ...
2,992,214 UART:
2,992,357 UART: [state] CFI Enabled
3,002,771 UART: [fht] FMC Alias Private Key: 7
3,111,086 UART: [art] Extend RT PCRs Done
3,111,514 UART: [art] Lock RT PCRs Done
3,113,034 UART: [art] Populate DV Done
3,121,316 UART: [fht] FMC Alias Private Key: 7
3,122,290 UART: [art] Derive CDI
3,122,570 UART: [art] Store in in slot 0x4
3,208,317 UART: [art] Derive Key Pair
3,208,677 UART: [art] Store priv key in slot 0x5
3,222,083 UART: [art] Derive Key Pair - Done
3,236,825 UART: [art] Signing Cert with AUTHO
3,237,305 UART: RITY.KEYID = 7
3,252,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,698 UART: [art] PUB.X = 50E1DBD96B20B7407C01969F6BE7E501D444D67346F1AA68BAC245C46AB62C1F4F9ACE629D1B107E16D4C294F44735F4
3,260,470 UART: [art] PUB.Y = 7EAF0A965FE46283B761657BAEB9BA9A96229EF89830928C6767364001B13B76919A14DCACCD1E18047D0D028BF8AFBC
3,267,413 UART: [art] SIG.R = 6F12905B8440A098837D3BBA5B878947893BFB5B61A77D444C95D47F930CD4F981AA2C9060A330ABB0E307726317F8F4
3,274,175 UART: [art] SIG.S = 9661FB352CFEFCD16B5CC9A3F5A3F0982EC52E2E02FE677D2257BCAA3C9D44BA57D8B750D60603DA5310AD87FB5B6343
3,297,653 UART: Caliptra RT
3,297,998 UART: [state] CFI Enabled
3,405,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,535 UART: [rt]cmd =0x494e464f, len=4
3,439,006 >>> mbox cmd response data (264 bytes)
3,439,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,927 >>> mbox cmd response: success
6,216,488 UART:
6,216,504 UART: Running Caliptra FMC ...
6,216,912 UART:
6,217,055 UART: [state] CFI Enabled
6,306,142 UART: [art] Extend RT PCRs Done
6,306,570 UART: [art] Lock RT PCRs Done
6,307,739 UART: [art] Populate DV Done
6,315,791 UART: [fht] FMC Alias Private Key: 7
6,316,937 UART: [art] Derive CDI
6,317,217 UART: [art] Store in in slot 0x4
6,403,012 UART: [art] Derive Key Pair
6,403,372 UART: [art] Store priv key in slot 0x5
6,416,504 UART: [art] Derive Key Pair - Done
6,431,448 UART: [art] Signing Cert with AUTHO
6,431,928 UART: RITY.KEYID = 7
6,447,420 UART: [art] Erasing AUTHORITY.KEYID = 7
6,448,185 UART: [art] PUB.X = A03CB1D58815CA4926EF78C8CDAF3C427A346D679986374CFB1B743AC52B111F578ABF96E8B746C2129344C9E8CA125C
6,454,963 UART: [art] PUB.Y = EA9A22298E4BE7EDF32B333717BEB84A406019D275EEC5E943F2D9A908DDA483DEA52926C48BB0CFFC844324A123831B
6,461,922 UART: [art] SIG.R = 8DB125F3B2CCFBABCC872F4DBE6709713DA66A74E24D82CFD0B3B933244E4C65D749F3DB2AE7CA1251933A92AE2E70F7
6,468,709 UART: [art] SIG.S = BE6E3EDCC111A2F9C1CC0C89BCCF35173B830680507058DE0C6EB6275765F6479A0753E54E4897BFDCEEDBE43C64967E
6,492,338 UART: Caliptra RT
6,492,683 UART: [state] CFI Enabled
6,772,393 UART: [rt] RT listening for mailbox commands...
6,773,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,802,386 UART: [rt]cmd =0x494e464f, len=4
6,805,603 >>> mbox cmd response data (264 bytes)
6,805,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,568,966 >>> mbox cmd response: success
9,582,361 UART:
9,582,377 UART: Running Caliptra FMC ...
9,582,785 UART:
9,582,928 UART: [state] CFI Enabled
9,672,181 UART: [art] Extend RT PCRs Done
9,672,609 UART: [art] Lock RT PCRs Done
9,673,870 UART: [art] Populate DV Done
9,682,182 UART: [fht] FMC Alias Private Key: 7
9,683,196 UART: [art] Derive CDI
9,683,476 UART: [art] Store in in slot 0x4
9,769,193 UART: [art] Derive Key Pair
9,769,553 UART: [art] Store priv key in slot 0x5
9,782,697 UART: [art] Derive Key Pair - Done
9,797,450 UART: [art] Signing Cert with AUTHO
9,797,930 UART: RITY.KEYID = 7
9,813,270 UART: [art] Erasing AUTHORITY.KEYID = 7
9,814,035 UART: [art] PUB.X = D2165A3B747331739F2D4784503BA6E32265ED55A39CA88EAD48FCF01C6C2EF137BAE8B8C23C6DDE3A4B8117A2C43EC6
9,820,819 UART: [art] PUB.Y = B7C3A26586D909DDDAAAEB70F7DE355A235CDA082981F140B9E4206FD50CF0FBB1AEF14DF6C096A621E51B719AFCE33A
9,827,784 UART: [art] SIG.R = 63CA37ABAF2EB06045F7F0F7FB22B10443ED7F0EBEEB62C35AB7D5BA41F195DC5DB80A1364B3675C9CF7CC3E6B028480
9,834,564 UART: [art] SIG.S = 16B1A1A64ABD56BED0041484A9EC3C00F79EC3B4BE1A7CED16EFFC5DAD1255CFFA06015A52785BDC6EB22E9E88F608E4
9,858,277 UART: Caliptra RT
9,858,622 UART: [state] CFI Enabled
10,138,632 UART: [rt] RT listening for mailbox commands...
10,139,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,168,797 UART: [rt]cmd =0x494e464f, len=4
10,172,090 >>> mbox cmd response data (264 bytes)
10,172,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,935,379 >>> mbox cmd response: success
12,949,062 UART:
12,949,078 UART: Running Caliptra FMC ...
12,949,486 UART:
12,949,629 UART: [state] CFI Enabled
13,038,898 UART: [art] Extend RT PCRs Done
13,039,326 UART: [art] Lock RT PCRs Done
13,040,401 UART: [art] Populate DV Done
13,048,691 UART: [fht] FMC Alias Private Key: 7
13,049,843 UART: [art] Derive CDI
13,050,123 UART: [art] Store in in slot 0x4
13,136,196 UART: [art] Derive Key Pair
13,136,556 UART: [art] Store priv key in slot 0x5
13,150,132 UART: [art] Derive Key Pair - Done
13,164,828 UART: [art] Signing Cert with AUTHO
13,165,308 UART: RITY.KEYID = 7
13,180,580 UART: [art] Erasing AUTHORITY.KEYID = 7
13,181,345 UART: [art] PUB.X = A03CB1D58815CA4926EF78C8CDAF3C427A346D679986374CFB1B743AC52B111F578ABF96E8B746C2129344C9E8CA125C
13,188,123 UART: [art] PUB.Y = EA9A22298E4BE7EDF32B333717BEB84A406019D275EEC5E943F2D9A908DDA483DEA52926C48BB0CFFC844324A123831B
13,195,082 UART: [art] SIG.R = 8DB125F3B2CCFBABCC872F4DBE6709713DA66A74E24D82CFD0B3B933244E4C65D749F3DB2AE7CA1251933A92AE2E70F7
13,201,869 UART: [art] SIG.S = BE6E3EDCC111A2F9C1CC0C89BCCF35173B830680507058DE0C6EB6275765F6479A0753E54E4897BFDCEEDBE43C64967E
13,225,474 UART: Caliptra RT
13,225,819 UART: [state] CFI Enabled
13,508,555 UART: [rt] RT listening for mailbox commands...
13,509,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,538,754 UART: [rt]cmd =0x494e464f, len=4
13,542,285 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.65s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,638 UART: [fwproc] Recv command 0x46574c44
1,284,366 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,627 >>> mbox cmd response: success
2,775,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,776,805 UART: [afmc] ++
2,776,973 UART: [afmc] CDI.KEYID = 6
2,777,335 UART: [afmc] SUBJECT.KEYID = 7
2,777,760 UART: [afmc] AUTHORITY.KEYID = 5
2,813,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,027 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,835,719 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,841,592 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,847,294 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,855,217 UART: [afmc] --
2,856,219 UART: [cold-reset] --
2,857,053 UART: [state] Locking Datavault
2,858,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,908 UART: [state] Locking ICCM
2,859,330 UART: [exit] Launching FMC @ 0x40000130
2,864,659 UART:
2,864,675 UART: Running Caliptra FMC ...
2,865,083 UART:
2,865,137 UART: [state] CFI Enabled
2,875,947 UART: [fht] FMC Alias Private Key: 7
2,983,774 UART: [art] Extend RT PCRs Done
2,984,202 UART: [art] Lock RT PCRs Done
2,985,498 UART: [art] Populate DV Done
2,993,774 UART: [fht] FMC Alias Private Key: 7
2,994,780 UART: [art] Derive CDI
2,995,060 UART: [art] Store in in slot 0x4
3,080,657 UART: [art] Derive Key Pair
3,081,017 UART: [art] Store priv key in slot 0x5
3,094,197 UART: [art] Derive Key Pair - Done
3,109,298 UART: [art] Signing Cert with AUTHO
3,109,778 UART: RITY.KEYID = 7
3,125,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,399 UART: [art] PUB.X = 3C8E91E05846DD39810FFBA87AF7737BB1C8F0DDFA55FFF4C224319064EA94C481F433578DAAA2193E761F4033EDC50E
3,133,175 UART: [art] PUB.Y = 39DECB13099E9C1A9816F3585EAE6ABCEFD22B93B34790A6B98E50BC69D27F89C06D02B1BC189DBD977BE7A468DC77C7
3,140,137 UART: [art] SIG.R = 9FE78D3FCCE1F3AFD683D5BD60B553CD38E51E6B36B221DF050F7DA61FD8B22B87F67BB8F4EFAA49DB8BF68917E7B974
3,146,927 UART: [art] SIG.S = AF9D88C6AA0FB894309AA9175466452269DEAE05FD5A40E5B89F05647FBB6954458CD5689F7F29B149278821FD330B55
3,170,422 UART: Caliptra RT
3,170,675 UART: [state] CFI Enabled
3,278,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,336 UART: [rt]cmd =0x494e464f, len=4
3,312,747 >>> mbox cmd response data (264 bytes)
3,312,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,717 UART:
3,313,733 UART: Running Caliptra ROM ...
3,314,141 UART:
3,314,196 UART: [state] CFI Enabled
3,316,374 UART: [state] LifecycleState = Unprovisioned
3,317,029 UART: [state] DebugLocked = No
3,317,701 UART: [state] WD Timer not started. Device not locked for debugging
3,318,841 UART: [kat] SHA2-256
4,124,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,128,616 UART: [kat] ++
4,128,768 UART: [kat] sha1
4,133,028 UART: [kat] SHA2-256
4,134,968 UART: [kat] SHA2-384
4,137,733 UART: [kat] SHA2-512-ACC
4,139,633 UART: [kat] ECC-384
4,148,974 UART: [kat] HMAC-384Kdf
4,153,556 UART: [kat] LMS
4,401,884 UART: [kat] --
4,402,736 UART: [update-reset] ++
5,716,664 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,717,639 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,867,637 >>> mbox cmd response: success
5,867,904 UART: [update-reset] Copying MAN_2 To MAN_1
5,875,918 UART: [update-reset Success] --
5,877,113 UART: [state] Locking Datavault
5,877,701 UART: [state] Locking PCR0, PCR1 and PCR31
5,878,305 UART: [state] Locking ICCM
5,878,827 UART: [exit] Launching FMC @ 0x40000130
5,884,156 UART:
5,884,172 UART: Running Caliptra FMC ...
5,884,580 UART:
5,884,634 UART: [state] CFI Enabled
5,973,729 UART: [art] Extend RT PCRs Done
5,974,157 UART: [art] Lock RT PCRs Done
5,975,570 UART: [art] Populate DV Done
5,983,850 UART: [fht] FMC Alias Private Key: 7
5,984,958 UART: [art] Derive CDI
5,985,238 UART: [art] Store in in slot 0x4
6,070,903 UART: [art] Derive Key Pair
6,071,263 UART: [art] Store priv key in slot 0x5
6,084,581 UART: [art] Derive Key Pair - Done
6,099,127 UART: [art] Signing Cert with AUTHO
6,099,607 UART: RITY.KEYID = 7
6,114,497 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,262 UART: [art] PUB.X = 0A24B7BF07C8F2930CBAEACD7A49231FB4F0D50B3D4B51C9DC1344B7EFECA39501E9F80E98F0290A01EC7259ED0B0D4E
6,122,024 UART: [art] PUB.Y = 5B502F3F45B0856699ADAA1D7DF6571F90EE0509909D21DC2C5DB9F9A3AF0788171AA166A7FA17A55FBFE0CCEC03878D
6,128,978 UART: [art] SIG.R = 5BD97411B93019FCDC0B32B0FCDA699123F2A2EB4CAD268AE5A25436B51F0FCC36CA228BE587F43D8922DB9C05AD18B3
6,135,757 UART: [art] SIG.S = 413E9A2F7EEF3147A78ED06E089F31921BFD12B86F9194580F30A78335DE3992F325EC71E837C03C8C5DD73286D56EC9
6,159,452 UART: Caliptra RT
6,159,705 UART: [state] CFI Enabled
6,445,731 UART: [rt] RT listening for mailbox commands...
6,446,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,476,028 UART: [rt]cmd =0x494e464f, len=4
6,479,337 >>> mbox cmd response data (264 bytes)
6,479,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,480,259 UART:
6,480,275 UART: Running Caliptra ROM ...
6,480,683 UART:
6,480,738 UART: [state] CFI Enabled
6,483,458 UART: [state] LifecycleState = Unprovisioned
6,484,113 UART: [state] DebugLocked = No
6,484,663 UART: [state] WD Timer not started. Device not locked for debugging
6,485,957 UART: [kat] SHA2-256
7,291,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,295,732 UART: [kat] ++
7,295,884 UART: [kat] sha1
7,300,014 UART: [kat] SHA2-256
7,301,954 UART: [kat] SHA2-384
7,304,667 UART: [kat] SHA2-512-ACC
7,306,567 UART: [kat] ECC-384
7,316,112 UART: [kat] HMAC-384Kdf
7,320,644 UART: [kat] LMS
7,568,972 UART: [kat] --
7,569,850 UART: [update-reset] ++
8,881,500 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,882,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,032,653 >>> mbox cmd response: success
9,032,894 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,908 UART: [update-reset Success] --
9,041,887 UART: [state] Locking Datavault
9,042,711 UART: [state] Locking PCR0, PCR1 and PCR31
9,043,315 UART: [state] Locking ICCM
9,043,899 UART: [exit] Launching FMC @ 0x40000130
9,049,228 UART:
9,049,244 UART: Running Caliptra FMC ...
9,049,652 UART:
9,049,706 UART: [state] CFI Enabled
9,138,789 UART: [art] Extend RT PCRs Done
9,139,217 UART: [art] Lock RT PCRs Done
9,140,466 UART: [art] Populate DV Done
9,148,850 UART: [fht] FMC Alias Private Key: 7
9,149,810 UART: [art] Derive CDI
9,150,090 UART: [art] Store in in slot 0x4
9,235,459 UART: [art] Derive Key Pair
9,235,819 UART: [art] Store priv key in slot 0x5
9,248,925 UART: [art] Derive Key Pair - Done
9,263,474 UART: [art] Signing Cert with AUTHO
9,263,954 UART: RITY.KEYID = 7
9,279,284 UART: [art] Erasing AUTHORITY.KEYID = 7
9,280,049 UART: [art] PUB.X = 8B342BA3394F8A1848A01BB23A52512B5B81256CB44004059BC58F844B05009C4C6079C96BA1084F48F804BB9CE6D0EC
9,286,782 UART: [art] PUB.Y = C4694F0F2E4646D76D6959A50C51B75A3FB0D3138583A155656012BE1E83CF24FE82C35CC5E7C25D2340F0A749090CC5
9,293,720 UART: [art] SIG.R = 45BA502DEDE65CADA9B3F9CCE7E212BF91357D23EE11D25C98AC4DCD322566BD55DB146614ECA4E8EDDC8FFE6F448F5E
9,300,520 UART: [art] SIG.S = CC621BE8D26A4BCBE3F18F8C2DCC03CF8044D05263EF76B0FD7C855E018495E7E621F26DCB6659E4D1706D689D8B90F2
9,324,051 UART: Caliptra RT
9,324,304 UART: [state] CFI Enabled
9,603,685 UART: [rt] RT listening for mailbox commands...
9,604,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,880 UART: [rt]cmd =0x494e464f, len=4
9,637,185 >>> mbox cmd response data (264 bytes)
9,637,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,637,821 UART:
9,637,837 UART: Running Caliptra ROM ...
9,638,245 UART:
9,638,300 UART: [state] CFI Enabled
9,641,302 UART: [state] LifecycleState = Unprovisioned
9,641,957 UART: [state] DebugLocked = No
9,642,467 UART: [state] WD Timer not started. Device not locked for debugging
9,643,679 UART: [kat] SHA2-256
10,449,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,453,454 UART: [kat] ++
10,453,606 UART: [kat] sha1
10,457,826 UART: [kat] SHA2-256
10,459,766 UART: [kat] SHA2-384
10,462,417 UART: [kat] SHA2-512-ACC
10,464,317 UART: [kat] ECC-384
10,473,988 UART: [kat] HMAC-384Kdf
10,478,470 UART: [kat] LMS
10,726,798 UART: [kat] --
10,727,828 UART: [update-reset] ++
12,042,310 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,043,491 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,193,489 >>> mbox cmd response: success
12,193,632 UART: [update-reset] Copying MAN_2 To MAN_1
12,201,646 UART: [update-reset Success] --
12,202,721 UART: [state] Locking Datavault
12,203,505 UART: [state] Locking PCR0, PCR1 and PCR31
12,204,109 UART: [state] Locking ICCM
12,204,693 UART: [exit] Launching FMC @ 0x40000130
12,210,022 UART:
12,210,038 UART: Running Caliptra FMC ...
12,210,446 UART:
12,210,500 UART: [state] CFI Enabled
12,299,567 UART: [art] Extend RT PCRs Done
12,299,995 UART: [art] Lock RT PCRs Done
12,301,546 UART: [art] Populate DV Done
12,309,658 UART: [fht] FMC Alias Private Key: 7
12,310,624 UART: [art] Derive CDI
12,310,904 UART: [art] Store in in slot 0x4
12,396,405 UART: [art] Derive Key Pair
12,396,765 UART: [art] Store priv key in slot 0x5
12,409,695 UART: [art] Derive Key Pair - Done
12,424,321 UART: [art] Signing Cert with AUTHO
12,424,801 UART: RITY.KEYID = 7
12,439,861 UART: [art] Erasing AUTHORITY.KEYID = 7
12,440,626 UART: [art] PUB.X = 0A24B7BF07C8F2930CBAEACD7A49231FB4F0D50B3D4B51C9DC1344B7EFECA39501E9F80E98F0290A01EC7259ED0B0D4E
12,447,388 UART: [art] PUB.Y = 5B502F3F45B0856699ADAA1D7DF6571F90EE0509909D21DC2C5DB9F9A3AF0788171AA166A7FA17A55FBFE0CCEC03878D
12,454,342 UART: [art] SIG.R = 5BD97411B93019FCDC0B32B0FCDA699123F2A2EB4CAD268AE5A25436B51F0FCC36CA228BE587F43D8922DB9C05AD18B3
12,461,121 UART: [art] SIG.S = 413E9A2F7EEF3147A78ED06E089F31921BFD12B86F9194580F30A78335DE3992F325EC71E837C03C8C5DD73286D56EC9
12,484,804 UART: Caliptra RT
12,485,057 UART: [state] CFI Enabled
12,767,019 UART: [rt] RT listening for mailbox commands...
12,767,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,797,346 UART: [rt]cmd =0x494e464f, len=4
12,800,519 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,403 ready_for_fw is high
1,060,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,064 >>> mbox cmd response: success
2,627,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,859 UART:
2,687,875 UART: Running Caliptra FMC ...
2,688,283 UART:
2,688,337 UART: [state] CFI Enabled
2,699,041 UART: [fht] FMC Alias Private Key: 7
2,807,154 UART: [art] Extend RT PCRs Done
2,807,582 UART: [art] Lock RT PCRs Done
2,809,014 UART: [art] Populate DV Done
2,817,492 UART: [fht] FMC Alias Private Key: 7
2,818,452 UART: [art] Derive CDI
2,818,732 UART: [art] Store in in slot 0x4
2,903,977 UART: [art] Derive Key Pair
2,904,337 UART: [art] Store priv key in slot 0x5
2,917,099 UART: [art] Derive Key Pair - Done
2,931,673 UART: [art] Signing Cert with AUTHO
2,932,153 UART: RITY.KEYID = 7
2,947,297 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,062 UART: [art] PUB.X = 2E3D1EFEF74D16D7B32C58EE693B178B96A9134E528C699EEB9CB4ABD71F66D90E6BE46AF8F19173F071592444F9EDEC
2,954,845 UART: [art] PUB.Y = 30612746AD292EB8955984377EADA93ABD382EF480B855BC1D18CA5ACE1323991829C05734A2CA8DDBA15ED3BC7556D6
2,961,803 UART: [art] SIG.R = 43150157E783D334EB2D2FF5A91960D38093ACDCB40D62DC82953F0AAB373DE8C31E252B2C0282BB1B018900235EFAFA
2,968,544 UART: [art] SIG.S = C6B03CE29E52B4931EDE79A3E99DF029A26173AA92AD31CD2F91EEC97B8C79AD0F448DA8EF98167B94C902DA8546BA05
2,992,616 UART: Caliptra RT
2,992,869 UART: [state] CFI Enabled
3,100,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,500 UART: [rt]cmd =0x494e464f, len=4
3,133,861 >>> mbox cmd response data (264 bytes)
3,133,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,254 >>> mbox cmd response: success
5,585,382 UART:
5,585,398 UART: Running Caliptra FMC ...
5,585,806 UART:
5,585,860 UART: [state] CFI Enabled
5,674,949 UART: [art] Extend RT PCRs Done
5,675,377 UART: [art] Lock RT PCRs Done
5,676,494 UART: [art] Populate DV Done
5,684,848 UART: [fht] FMC Alias Private Key: 7
5,685,954 UART: [art] Derive CDI
5,686,234 UART: [art] Store in in slot 0x4
5,771,941 UART: [art] Derive Key Pair
5,772,301 UART: [art] Store priv key in slot 0x5
5,785,907 UART: [art] Derive Key Pair - Done
5,800,682 UART: [art] Signing Cert with AUTHO
5,801,162 UART: RITY.KEYID = 7
5,816,606 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,371 UART: [art] PUB.X = 452766ACC4806D34D86C65188DDDEB6A41B67B3E18D63C8F28E9019C90FAB3D7F984E9A68170091A1D705E8164920E57
5,824,132 UART: [art] PUB.Y = A171B5545AB6B062A833E405363A909E5F1E32F946C738F8E2CA7213214E938C892C02AB5E210FC7E223D5E606324A98
5,831,066 UART: [art] SIG.R = B2D3C7F887AE87FB09B86D9A0F1F380DF9729959364EBC899AF7C57F0FBAB1ED82D236B7DDF8AE07F96A3CC7F13E040E
5,837,837 UART: [art] SIG.S = CDAEEDDD5D59A2611F882191527A282D7FD12D67F468143FC0D9A2C728935032A83EA4E5DA3ABFCEFFAE2E719EC9F22E
5,861,812 UART: Caliptra RT
5,862,065 UART: [state] CFI Enabled
6,143,144 UART: [rt] RT listening for mailbox commands...
6,143,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,513 UART: [rt]cmd =0x494e464f, len=4
6,176,702 >>> mbox cmd response data (264 bytes)
6,176,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,616,321 >>> mbox cmd response: success
8,629,767 UART:
8,629,783 UART: Running Caliptra FMC ...
8,630,191 UART:
8,630,245 UART: [state] CFI Enabled
8,719,138 UART: [art] Extend RT PCRs Done
8,719,566 UART: [art] Lock RT PCRs Done
8,720,777 UART: [art] Populate DV Done
8,728,961 UART: [fht] FMC Alias Private Key: 7
8,730,093 UART: [art] Derive CDI
8,730,373 UART: [art] Store in in slot 0x4
8,815,844 UART: [art] Derive Key Pair
8,816,204 UART: [art] Store priv key in slot 0x5
8,829,208 UART: [art] Derive Key Pair - Done
8,843,733 UART: [art] Signing Cert with AUTHO
8,844,213 UART: RITY.KEYID = 7
8,859,069 UART: [art] Erasing AUTHORITY.KEYID = 7
8,859,834 UART: [art] PUB.X = 0BBE1D5FEAF783426A46EE7A1FC9FB64F43F5254FB2178074E5498DE638158D47E72F4CF57347D1DABAEA072FC941C96
8,866,612 UART: [art] PUB.Y = 19C2B455A46AA5272911616BA85BAF0EF82875CAE2819DEC9527EFB752855665D4A9B1B5677961C07C0E09C2CE2E401F
8,873,557 UART: [art] SIG.R = 7DDD4A4D291E95F1F22181DC848154BA2A28F6D11A30C7BF356CD7406F81B3332A2C27E613D756229350CE3FE2E18EC5
8,880,333 UART: [art] SIG.S = 5D9F54ED343C39A9ADF4956278B96F0F4BFAF1F1B7C4C4F2611B99AC78A8BD9BDFF3CB6407B05F71B56A8F561FCDCD45
8,903,402 UART: Caliptra RT
8,903,655 UART: [state] CFI Enabled
9,181,597 UART: [rt] RT listening for mailbox commands...
9,182,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,211,710 UART: [rt]cmd =0x494e464f, len=4
9,214,969 >>> mbox cmd response data (264 bytes)
9,214,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,653,580 >>> mbox cmd response: success
11,667,294 UART:
11,667,310 UART: Running Caliptra FMC ...
11,667,718 UART:
11,667,772 UART: [state] CFI Enabled
11,756,991 UART: [art] Extend RT PCRs Done
11,757,419 UART: [art] Lock RT PCRs Done
11,758,732 UART: [art] Populate DV Done
11,766,882 UART: [fht] FMC Alias Private Key: 7
11,768,034 UART: [art] Derive CDI
11,768,314 UART: [art] Store in in slot 0x4
11,853,307 UART: [art] Derive Key Pair
11,853,667 UART: [art] Store priv key in slot 0x5
11,866,515 UART: [art] Derive Key Pair - Done
11,881,688 UART: [art] Signing Cert with AUTHO
11,882,168 UART: RITY.KEYID = 7
11,897,448 UART: [art] Erasing AUTHORITY.KEYID = 7
11,898,213 UART: [art] PUB.X = 452766ACC4806D34D86C65188DDDEB6A41B67B3E18D63C8F28E9019C90FAB3D7F984E9A68170091A1D705E8164920E57
11,904,974 UART: [art] PUB.Y = A171B5545AB6B062A833E405363A909E5F1E32F946C738F8E2CA7213214E938C892C02AB5E210FC7E223D5E606324A98
11,911,908 UART: [art] SIG.R = B2D3C7F887AE87FB09B86D9A0F1F380DF9729959364EBC899AF7C57F0FBAB1ED82D236B7DDF8AE07F96A3CC7F13E040E
11,918,679 UART: [art] SIG.S = CDAEEDDD5D59A2611F882191527A282D7FD12D67F468143FC0D9A2C728935032A83EA4E5DA3ABFCEFFAE2E719EC9F22E
11,942,544 UART: Caliptra RT
11,942,797 UART: [state] CFI Enabled
12,224,226 UART: [rt] RT listening for mailbox commands...
12,224,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,254,407 UART: [rt]cmd =0x494e464f, len=4
12,257,556 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.52s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,560 UART: [ldev] --
1,283,995 UART: [fwproc] Wait for Commands...
1,284,675 UART: [fwproc] Recv command 0x46574c44
1,285,403 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,164 >>> mbox cmd response: success
2,777,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,778,264 UART: [afmc] ++
2,778,432 UART: [afmc] CDI.KEYID = 6
2,778,794 UART: [afmc] SUBJECT.KEYID = 7
2,779,219 UART: [afmc] AUTHORITY.KEYID = 5
2,814,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,048 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,837,740 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,843,613 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,849,315 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,857,120 UART: [afmc] --
2,858,234 UART: [cold-reset] --
2,858,942 UART: [state] Locking Datavault
2,860,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,915 UART: [state] Locking ICCM
2,861,527 UART: [exit] Launching FMC @ 0x40000130
2,866,856 UART:
2,866,872 UART: Running Caliptra FMC ...
2,867,280 UART:
2,867,423 UART: [state] CFI Enabled
2,877,799 UART: [fht] FMC Alias Private Key: 7
2,986,140 UART: [art] Extend RT PCRs Done
2,986,568 UART: [art] Lock RT PCRs Done
2,987,868 UART: [art] Populate DV Done
2,996,304 UART: [fht] FMC Alias Private Key: 7
2,997,326 UART: [art] Derive CDI
2,997,606 UART: [art] Store in in slot 0x4
3,083,111 UART: [art] Derive Key Pair
3,083,471 UART: [art] Store priv key in slot 0x5
3,096,633 UART: [art] Derive Key Pair - Done
3,111,309 UART: [art] Signing Cert with AUTHO
3,111,789 UART: RITY.KEYID = 7
3,126,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,456 UART: [art] PUB.X = 86EE96A90035DF1FA860522D1CB7CA83C24ADE8304DA407E8AB54A7289A7BE8ABC4E25BEAD2702A5AA8368716818435C
3,134,210 UART: [art] PUB.Y = CBB99D41763BB15BE5976EF3C5B7F18DA17B0FE60489D6DDC7097717A735851F36540CD7AC39AF1F3A88DB998898C8EB
3,141,160 UART: [art] SIG.R = E26709AEB9CD113B6334C9974F55840C87F95A0173CC4F3228D810B5FEA56E17A66F90955A03519ECB599133A61C7E61
3,147,916 UART: [art] SIG.S = D9421C53121FC15521454CA9E0A43C884D84AA6F7B4F2CABDCD502D03F415DF894BC8169788B91FA602797DF17AEE3CA
3,171,024 UART: Caliptra RT
3,171,369 UART: [state] CFI Enabled
3,280,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,342 UART: [rt]cmd =0x494e464f, len=4
3,313,659 >>> mbox cmd response data (264 bytes)
3,313,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,561 UART:
3,314,577 UART: Running Caliptra ROM ...
3,314,985 UART:
3,315,127 UART: [state] CFI Enabled
3,317,509 UART: [state] LifecycleState = Unprovisioned
3,318,164 UART: [state] DebugLocked = No
3,318,898 UART: [state] WD Timer not started. Device not locked for debugging
3,320,048 UART: [kat] SHA2-256
4,125,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,129,823 UART: [kat] ++
4,129,975 UART: [kat] sha1
4,134,273 UART: [kat] SHA2-256
4,136,213 UART: [kat] SHA2-384
4,138,900 UART: [kat] SHA2-512-ACC
4,140,800 UART: [kat] ECC-384
4,150,477 UART: [kat] HMAC-384Kdf
4,155,141 UART: [kat] LMS
4,403,469 UART: [kat] --
4,404,471 UART: [update-reset] ++
5,718,113 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,719,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,869,110 >>> mbox cmd response: success
5,869,339 UART: [update-reset] Copying MAN_2 To MAN_1
5,877,353 UART: [update-reset Success] --
5,878,334 UART: [state] Locking Datavault
5,879,208 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,812 UART: [state] Locking ICCM
5,880,322 UART: [exit] Launching FMC @ 0x40000130
5,885,651 UART:
5,885,667 UART: Running Caliptra FMC ...
5,886,075 UART:
5,886,218 UART: [state] CFI Enabled
5,975,965 UART: [art] Extend RT PCRs Done
5,976,393 UART: [art] Lock RT PCRs Done
5,977,538 UART: [art] Populate DV Done
5,985,668 UART: [fht] FMC Alias Private Key: 7
5,986,664 UART: [art] Derive CDI
5,986,944 UART: [art] Store in in slot 0x4
6,072,187 UART: [art] Derive Key Pair
6,072,547 UART: [art] Store priv key in slot 0x5
6,086,043 UART: [art] Derive Key Pair - Done
6,100,835 UART: [art] Signing Cert with AUTHO
6,101,315 UART: RITY.KEYID = 7
6,116,401 UART: [art] Erasing AUTHORITY.KEYID = 7
6,117,166 UART: [art] PUB.X = FE60A04C809DB02047ED92C343B88C6F9E12A8E8B2371FA8CE800D740C438D2BE6F5548C3DE50D51FF5017C4CA4EFC16
6,123,941 UART: [art] PUB.Y = B4A431015AC7725A70E3072A3FB470A41A91848E9DE60279CF66FADFDE7B8B0660880F9B7D86A5F61ABD13C971D201C3
6,130,881 UART: [art] SIG.R = 9BB39816A8448B26A9715A4B9087B277FAF5FAB2F6C3D61E0A0E908877BAC37F729535BB563D3CF2A197B8D4C4E2AE7E
6,137,657 UART: [art] SIG.S = 5EC59C58F87A52EAB5E84A07557ED9AECEA0FC569CC5C6D25ED5D0587C2AEFE712838BA5851B358A3F32E5B320E420E2
6,161,259 UART: Caliptra RT
6,161,604 UART: [state] CFI Enabled
6,444,527 UART: [rt] RT listening for mailbox commands...
6,445,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,474,730 UART: [rt]cmd =0x494e464f, len=4
6,478,303 >>> mbox cmd response data (264 bytes)
6,478,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,479,065 UART:
6,479,081 UART: Running Caliptra ROM ...
6,479,489 UART:
6,479,631 UART: [state] CFI Enabled
6,482,665 UART: [state] LifecycleState = Unprovisioned
6,483,320 UART: [state] DebugLocked = No
6,483,942 UART: [state] WD Timer not started. Device not locked for debugging
6,485,172 UART: [kat] SHA2-256
7,290,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,294,947 UART: [kat] ++
7,295,099 UART: [kat] sha1
7,299,389 UART: [kat] SHA2-256
7,301,329 UART: [kat] SHA2-384
7,303,854 UART: [kat] SHA2-512-ACC
7,305,754 UART: [kat] ECC-384
7,315,691 UART: [kat] HMAC-384Kdf
7,320,129 UART: [kat] LMS
7,568,457 UART: [kat] --
7,569,283 UART: [update-reset] ++
8,882,503 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,883,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,033,692 >>> mbox cmd response: success
9,033,981 UART: [update-reset] Copying MAN_2 To MAN_1
9,041,995 UART: [update-reset Success] --
9,042,946 UART: [state] Locking Datavault
9,043,858 UART: [state] Locking PCR0, PCR1 and PCR31
9,044,462 UART: [state] Locking ICCM
9,045,002 UART: [exit] Launching FMC @ 0x40000130
9,050,331 UART:
9,050,347 UART: Running Caliptra FMC ...
9,050,755 UART:
9,050,898 UART: [state] CFI Enabled
9,140,007 UART: [art] Extend RT PCRs Done
9,140,435 UART: [art] Lock RT PCRs Done
9,141,542 UART: [art] Populate DV Done
9,149,836 UART: [fht] FMC Alias Private Key: 7
9,150,984 UART: [art] Derive CDI
9,151,264 UART: [art] Store in in slot 0x4
9,236,689 UART: [art] Derive Key Pair
9,237,049 UART: [art] Store priv key in slot 0x5
9,250,453 UART: [art] Derive Key Pair - Done
9,265,273 UART: [art] Signing Cert with AUTHO
9,265,753 UART: RITY.KEYID = 7
9,280,809 UART: [art] Erasing AUTHORITY.KEYID = 7
9,281,574 UART: [art] PUB.X = 0B209C8814044F5F9E334CBC906D11243C98F52FC7DECE42F6049F26B2F8A6B66EFDFA980577384256520E07D9B46BCF
9,288,332 UART: [art] PUB.Y = 5DF2149C5F92A275830AFEFB5303531685EC40CAF84990992ABC344F8BC7264971196F44E4DCF0D07D2784474ABC8255
9,295,276 UART: [art] SIG.R = 63B3E47DC834CBA702F6BD370959FB1DF56F345EBC2A44D88989409DEA331604B928710B0E3061C8D52570F4E22F9C4B
9,302,035 UART: [art] SIG.S = 9C960D000C347D4285CA823D386ADE3D2D857AA6F24F8CD34B63CDBDFFC07C91D5AB69B09C660E04B14F7026381B20B2
9,326,272 UART: Caliptra RT
9,326,617 UART: [state] CFI Enabled
9,606,296 UART: [rt] RT listening for mailbox commands...
9,606,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,636,435 UART: [rt]cmd =0x494e464f, len=4
9,639,834 >>> mbox cmd response data (264 bytes)
9,639,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,640,628 UART:
9,640,644 UART: Running Caliptra ROM ...
9,641,052 UART:
9,641,194 UART: [state] CFI Enabled
9,644,016 UART: [state] LifecycleState = Unprovisioned
9,644,671 UART: [state] DebugLocked = No
9,645,209 UART: [state] WD Timer not started. Device not locked for debugging
9,646,431 UART: [kat] SHA2-256
10,452,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,456,206 UART: [kat] ++
10,456,358 UART: [kat] sha1
10,460,602 UART: [kat] SHA2-256
10,462,542 UART: [kat] SHA2-384
10,465,349 UART: [kat] SHA2-512-ACC
10,467,249 UART: [kat] ECC-384
10,477,342 UART: [kat] HMAC-384Kdf
10,481,866 UART: [kat] LMS
10,730,194 UART: [kat] --
10,731,080 UART: [update-reset] ++
12,046,556 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,047,563 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,197,561 >>> mbox cmd response: success
12,197,766 UART: [update-reset] Copying MAN_2 To MAN_1
12,205,780 UART: [update-reset Success] --
12,206,679 UART: [state] Locking Datavault
12,207,623 UART: [state] Locking PCR0, PCR1 and PCR31
12,208,227 UART: [state] Locking ICCM
12,208,885 UART: [exit] Launching FMC @ 0x40000130
12,214,214 UART:
12,214,230 UART: Running Caliptra FMC ...
12,214,638 UART:
12,214,781 UART: [state] CFI Enabled
12,303,934 UART: [art] Extend RT PCRs Done
12,304,362 UART: [art] Lock RT PCRs Done
12,305,733 UART: [art] Populate DV Done
12,313,773 UART: [fht] FMC Alias Private Key: 7
12,314,819 UART: [art] Derive CDI
12,315,099 UART: [art] Store in in slot 0x4
12,400,910 UART: [art] Derive Key Pair
12,401,270 UART: [art] Store priv key in slot 0x5
12,414,738 UART: [art] Derive Key Pair - Done
12,429,602 UART: [art] Signing Cert with AUTHO
12,430,082 UART: RITY.KEYID = 7
12,445,482 UART: [art] Erasing AUTHORITY.KEYID = 7
12,446,247 UART: [art] PUB.X = FE60A04C809DB02047ED92C343B88C6F9E12A8E8B2371FA8CE800D740C438D2BE6F5548C3DE50D51FF5017C4CA4EFC16
12,453,022 UART: [art] PUB.Y = B4A431015AC7725A70E3072A3FB470A41A91848E9DE60279CF66FADFDE7B8B0660880F9B7D86A5F61ABD13C971D201C3
12,459,962 UART: [art] SIG.R = 9BB39816A8448B26A9715A4B9087B277FAF5FAB2F6C3D61E0A0E908877BAC37F729535BB563D3CF2A197B8D4C4E2AE7E
12,466,738 UART: [art] SIG.S = 5EC59C58F87A52EAB5E84A07557ED9AECEA0FC569CC5C6D25ED5D0587C2AEFE712838BA5851B358A3F32E5B320E420E2
12,490,268 UART: Caliptra RT
12,490,613 UART: [state] CFI Enabled
12,770,202 UART: [rt] RT listening for mailbox commands...
12,770,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,800,151 UART: [rt]cmd =0x494e464f, len=4
12,803,524 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,960 ready_for_fw is high
1,059,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,235 >>> mbox cmd response: success
2,629,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,691,112 UART:
2,691,128 UART: Running Caliptra FMC ...
2,691,536 UART:
2,691,679 UART: [state] CFI Enabled
2,702,157 UART: [fht] FMC Alias Private Key: 7
2,809,762 UART: [art] Extend RT PCRs Done
2,810,190 UART: [art] Lock RT PCRs Done
2,811,698 UART: [art] Populate DV Done
2,819,744 UART: [fht] FMC Alias Private Key: 7
2,820,732 UART: [art] Derive CDI
2,821,012 UART: [art] Store in in slot 0x4
2,906,599 UART: [art] Derive Key Pair
2,906,959 UART: [art] Store priv key in slot 0x5
2,919,959 UART: [art] Derive Key Pair - Done
2,935,084 UART: [art] Signing Cert with AUTHO
2,935,564 UART: RITY.KEYID = 7
2,951,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,879 UART: [art] PUB.X = 8FDE9EE9CC31511C11D1FBBF7AE88BDA1908546C7217F4797FA69A293D9900B4E1DFBD24AF2E8E64E3EAAC8A2FC6C95A
2,958,650 UART: [art] PUB.Y = 57579829008B6AA91BDE92DE1DF825F21235511B0EF1D6B84E07FC5C6A5DB73B1FAAC85E872EDB78BFB4120035F2D0D5
2,965,564 UART: [art] SIG.R = C8499650846F8A75B2C5E0A45838206F1137A5C50A30B1618368A47406BECEB98C209CA23CEA8FC72D1B1433F1C3BC9F
2,972,332 UART: [art] SIG.S = 4591E3D26A36A40C48C80F9F71F9574539AD102FC4A4A9D7A913EFD5715A4BF57EFDB7F877844C0B4C3506E048C2FCC0
2,995,969 UART: Caliptra RT
2,996,314 UART: [state] CFI Enabled
3,104,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,865 UART: [rt]cmd =0x494e464f, len=4
3,138,344 >>> mbox cmd response data (264 bytes)
3,138,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,148 >>> mbox cmd response: success
5,590,598 UART:
5,590,614 UART: Running Caliptra FMC ...
5,591,022 UART:
5,591,165 UART: [state] CFI Enabled
5,679,974 UART: [art] Extend RT PCRs Done
5,680,402 UART: [art] Lock RT PCRs Done
5,681,549 UART: [art] Populate DV Done
5,689,857 UART: [fht] FMC Alias Private Key: 7
5,690,949 UART: [art] Derive CDI
5,691,229 UART: [art] Store in in slot 0x4
5,776,574 UART: [art] Derive Key Pair
5,776,934 UART: [art] Store priv key in slot 0x5
5,789,974 UART: [art] Derive Key Pair - Done
5,805,139 UART: [art] Signing Cert with AUTHO
5,805,619 UART: RITY.KEYID = 7
5,820,373 UART: [art] Erasing AUTHORITY.KEYID = 7
5,821,138 UART: [art] PUB.X = 052F1BCD7EC783709025637B7F9A0DE2E51C65EF97ECC1BAA845CEF78908121CAF02043143337A623DCADFED24977AA8
5,827,905 UART: [art] PUB.Y = 81337DB6232AF12B01E227F7AA6172532EB575CB2ACFD903C74919E317C07B559700F38303FF798647CC55C98465E0CD
5,834,822 UART: [art] SIG.R = 77A9FF4DF9EDFBE2A62570BFC27F00B4B4A9BD3851E3D2DEE05FDFEAB259A2593B31AEED51D21F5FD9BCE59D5DE156EF
5,841,606 UART: [art] SIG.S = CD5BB38EBC4298BD90BE2C52C194B1B1754DDB29A52CC375784CF9217E8F655E3D3422810ABB100C7E2978FB83F28A55
5,864,933 UART: Caliptra RT
5,865,278 UART: [state] CFI Enabled
6,145,967 UART: [rt] RT listening for mailbox commands...
6,146,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,326 UART: [rt]cmd =0x494e464f, len=4
6,179,635 >>> mbox cmd response data (264 bytes)
6,179,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,619,150 >>> mbox cmd response: success
8,632,546 UART:
8,632,562 UART: Running Caliptra FMC ...
8,632,970 UART:
8,633,113 UART: [state] CFI Enabled
8,722,608 UART: [art] Extend RT PCRs Done
8,723,036 UART: [art] Lock RT PCRs Done
8,724,363 UART: [art] Populate DV Done
8,732,495 UART: [fht] FMC Alias Private Key: 7
8,733,647 UART: [art] Derive CDI
8,733,927 UART: [art] Store in in slot 0x4
8,819,374 UART: [art] Derive Key Pair
8,819,734 UART: [art] Store priv key in slot 0x5
8,832,974 UART: [art] Derive Key Pair - Done
8,847,537 UART: [art] Signing Cert with AUTHO
8,848,017 UART: RITY.KEYID = 7
8,863,267 UART: [art] Erasing AUTHORITY.KEYID = 7
8,864,032 UART: [art] PUB.X = 6213476D7BAD32DBEA4BB1C9D45FD6F3D494BB090B263E697EF64899239A6D7966AF66D9270FA571CFC37236C2E37563
8,870,799 UART: [art] PUB.Y = 29CDAC190E7DAB9DC19B00C4C3537FF8A1B946F25C975E767BF1FE5D8FE36B5D05A50354FCB95F256B6792C4172BC82E
8,877,734 UART: [art] SIG.R = 54A9B9826A0625F8A0DE968F360AF18B23DC05AB8478B15789CD0AB8927D147EF0A93099A3E45E56416074B7BCF31D49
8,884,494 UART: [art] SIG.S = 01B6233DB64C141222009E4279C4022C4AB337AEC3643EF51B993D73B4C0EC50C57C3318E2982E2FFD82A21591ED8CE5
8,908,477 UART: Caliptra RT
8,908,822 UART: [state] CFI Enabled
9,191,836 UART: [rt] RT listening for mailbox commands...
9,192,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,222,235 UART: [rt]cmd =0x494e464f, len=4
9,225,492 >>> mbox cmd response data (264 bytes)
9,225,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,664,506 >>> mbox cmd response: success
11,678,042 UART:
11,678,058 UART: Running Caliptra FMC ...
11,678,466 UART:
11,678,609 UART: [state] CFI Enabled
11,767,948 UART: [art] Extend RT PCRs Done
11,768,376 UART: [art] Lock RT PCRs Done
11,769,727 UART: [art] Populate DV Done
11,777,951 UART: [fht] FMC Alias Private Key: 7
11,778,949 UART: [art] Derive CDI
11,779,229 UART: [art] Store in in slot 0x4
11,864,904 UART: [art] Derive Key Pair
11,865,264 UART: [art] Store priv key in slot 0x5
11,877,536 UART: [art] Derive Key Pair - Done
11,892,103 UART: [art] Signing Cert with AUTHO
11,892,583 UART: RITY.KEYID = 7
11,907,663 UART: [art] Erasing AUTHORITY.KEYID = 7
11,908,428 UART: [art] PUB.X = 052F1BCD7EC783709025637B7F9A0DE2E51C65EF97ECC1BAA845CEF78908121CAF02043143337A623DCADFED24977AA8
11,915,195 UART: [art] PUB.Y = 81337DB6232AF12B01E227F7AA6172532EB575CB2ACFD903C74919E317C07B559700F38303FF798647CC55C98465E0CD
11,922,112 UART: [art] SIG.R = 77A9FF4DF9EDFBE2A62570BFC27F00B4B4A9BD3851E3D2DEE05FDFEAB259A2593B31AEED51D21F5FD9BCE59D5DE156EF
11,928,896 UART: [art] SIG.S = CD5BB38EBC4298BD90BE2C52C194B1B1754DDB29A52CC375784CF9217E8F655E3D3422810ABB100C7E2978FB83F28A55
11,952,397 UART: Caliptra RT
11,952,742 UART: [state] CFI Enabled
12,232,915 UART: [rt] RT listening for mailbox commands...
12,233,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,263,098 UART: [rt]cmd =0x494e464f, len=4
12,266,355 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.69s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,359 >>> mbox cmd response: success
2,774,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,775,426 UART: [afmc] ++
2,775,594 UART: [afmc] CDI.KEYID = 6
2,775,957 UART: [afmc] SUBJECT.KEYID = 7
2,776,383 UART: [afmc] AUTHORITY.KEYID = 5
2,811,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,740 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,433 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,840,304 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,846,006 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,853,920 UART: [afmc] --
2,854,958 UART: [cold-reset] --
2,855,784 UART: [state] Locking Datavault
2,856,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,115 UART: [state] Locking ICCM
2,857,683 UART: [exit] Launching FMC @ 0x40000130
2,863,012 UART:
2,863,028 UART: Running Caliptra FMC ...
2,863,436 UART:
2,863,490 UART: [state] CFI Enabled
2,873,966 UART: [fht] FMC Alias Private Key: 7
2,981,443 UART: [art] Extend RT PCRs Done
2,981,871 UART: [art] Lock RT PCRs Done
2,983,857 UART: [art] Populate DV Done
2,992,105 UART: [fht] FMC Alias Private Key: 7
2,993,157 UART: [art] Derive CDI
2,993,437 UART: [art] Store in in slot 0x4
3,078,308 UART: [art] Derive Key Pair
3,078,668 UART: [art] Store priv key in slot 0x5
3,091,952 UART: [art] Derive Key Pair - Done
3,106,850 UART: [art] Signing Cert with AUTHO
3,107,330 UART: RITY.KEYID = 7
3,122,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,977 UART: [art] PUB.X = 4840BA42BE4E6979CF32CB686F9EF6513F0305FC423151C77965154E366FB969266647581307E9F52B392D680777D96F
3,129,723 UART: [art] PUB.Y = 2BCD9E40C621345CB9C42D690A0292BEC91F609F0820EB8AEDFCD0B6F919BCCB43F394D56AC1BD49962D685FAD159AD9
3,136,684 UART: [art] SIG.R = 6C39E69C7D2B31A539FD191D53B0AA8C24FDD6D5EBF6B627E7F29373B5F0EF2962C67A29A953939412CC33249BFA6EB8
3,143,466 UART: [art] SIG.S = 91FDA0506268D437DD516A393BBE4459B5AEC76471FC85EB5E6C93BD69B92B0EDE569240369245AA9DA9AF045CA48F4C
3,167,735 UART: Caliptra RT
3,167,988 UART: [state] CFI Enabled
3,275,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,905 UART: [rt]cmd =0x494e464f, len=4
3,309,412 >>> mbox cmd response data (264 bytes)
3,309,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,238 UART:
3,310,254 UART: Running Caliptra ROM ...
3,310,662 UART:
3,310,717 UART: [state] CFI Enabled
3,313,731 UART: [state] LifecycleState = Unprovisioned
3,314,386 UART: [state] DebugLocked = No
3,315,078 UART: [state] WD Timer not started. Device not locked for debugging
3,316,280 UART: [kat] SHA2-256
4,119,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,959 UART: [kat] ++
4,124,111 UART: [kat] sha1
4,128,491 UART: [kat] SHA2-256
4,130,431 UART: [kat] SHA2-384
4,133,324 UART: [kat] SHA2-512-ACC
4,135,224 UART: [kat] ECC-384
4,144,653 UART: [kat] HMAC-384Kdf
4,149,343 UART: [kat] LMS
4,397,655 UART: [kat] --
4,398,583 UART: [update-reset] ++
5,711,820 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,712,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,862,791 >>> mbox cmd response: success
5,863,086 UART: [update-reset] Copying MAN_2 To MAN_1
5,871,100 UART: [update-reset Success] --
5,872,359 UART: [state] Locking Datavault
5,873,167 UART: [state] Locking PCR0, PCR1 and PCR31
5,873,771 UART: [state] Locking ICCM
5,874,361 UART: [exit] Launching FMC @ 0x40000130
5,879,690 UART:
5,879,706 UART: Running Caliptra FMC ...
5,880,114 UART:
5,880,168 UART: [state] CFI Enabled
5,969,567 UART: [art] Extend RT PCRs Done
5,969,995 UART: [art] Lock RT PCRs Done
5,971,336 UART: [art] Populate DV Done
5,979,768 UART: [fht] FMC Alias Private Key: 7
5,980,698 UART: [art] Derive CDI
5,980,978 UART: [art] Store in in slot 0x4
6,066,597 UART: [art] Derive Key Pair
6,066,957 UART: [art] Store priv key in slot 0x5
6,079,999 UART: [art] Derive Key Pair - Done
6,094,685 UART: [art] Signing Cert with AUTHO
6,095,165 UART: RITY.KEYID = 7
6,110,447 UART: [art] Erasing AUTHORITY.KEYID = 7
6,111,212 UART: [art] PUB.X = 59930BA5906CA5CDFA73F3B4206C1880028DC60B8E0012C302E502DB02BAC7BC4B75BA3AC3556D0A71A6D5EE34E72778
6,117,949 UART: [art] PUB.Y = 813341BBFE5C6103F11E9FDA8701E77A6AB6C49B2C40F97C4FFE42548887F0982138278483A9C0356235C9F6C3DB18BA
6,124,895 UART: [art] SIG.R = BC23F8C472E0646FA5EF71EAE9274354BD967A7451DF2B0B26442CBE6355E512555943C5CFDAA8A5D2A200B9CE785829
6,131,648 UART: [art] SIG.S = 4139D5B36418D1111DA5A8F4DA138F9CBF1539FA80460373EBAC6C5B3B498A88B79F2DD5457B719FFA9B251E47D03E8D
6,155,558 UART: Caliptra RT
6,155,811 UART: [state] CFI Enabled
6,434,412 UART: [rt] RT listening for mailbox commands...
6,435,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,464,633 UART: [rt]cmd =0x494e464f, len=4
6,467,880 >>> mbox cmd response data (264 bytes)
6,467,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,468,954 UART:
6,468,970 UART: Running Caliptra ROM ...
6,469,378 UART:
6,469,433 UART: [state] CFI Enabled
6,472,295 UART: [state] LifecycleState = Unprovisioned
6,472,950 UART: [state] DebugLocked = No
6,473,576 UART: [state] WD Timer not started. Device not locked for debugging
6,474,684 UART: [kat] SHA2-256
7,278,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,282,363 UART: [kat] ++
7,282,515 UART: [kat] sha1
7,286,819 UART: [kat] SHA2-256
7,288,759 UART: [kat] SHA2-384
7,291,386 UART: [kat] SHA2-512-ACC
7,293,286 UART: [kat] ECC-384
7,302,779 UART: [kat] HMAC-384Kdf
7,307,435 UART: [kat] LMS
7,555,747 UART: [kat] --
7,556,593 UART: [update-reset] ++
8,869,966 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,871,121 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,021,119 >>> mbox cmd response: success
9,021,434 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,448 UART: [update-reset Success] --
9,030,559 UART: [state] Locking Datavault
9,031,333 UART: [state] Locking PCR0, PCR1 and PCR31
9,031,937 UART: [state] Locking ICCM
9,032,487 UART: [exit] Launching FMC @ 0x40000130
9,037,816 UART:
9,037,832 UART: Running Caliptra FMC ...
9,038,240 UART:
9,038,294 UART: [state] CFI Enabled
9,127,125 UART: [art] Extend RT PCRs Done
9,127,553 UART: [art] Lock RT PCRs Done
9,128,774 UART: [art] Populate DV Done
9,136,708 UART: [fht] FMC Alias Private Key: 7
9,137,680 UART: [art] Derive CDI
9,137,960 UART: [art] Store in in slot 0x4
9,223,495 UART: [art] Derive Key Pair
9,223,855 UART: [art] Store priv key in slot 0x5
9,236,855 UART: [art] Derive Key Pair - Done
9,251,424 UART: [art] Signing Cert with AUTHO
9,251,904 UART: RITY.KEYID = 7
9,267,018 UART: [art] Erasing AUTHORITY.KEYID = 7
9,267,783 UART: [art] PUB.X = D8050497470F7DF582689AEBC73DFFEE7358ACB034CDC2020EBB60DDEC84AE100379AFEDD02FA2C7E1843188E3EF709F
9,274,555 UART: [art] PUB.Y = 1914AEC4288B0B692D7ADBE167BE49A9E09B12CB239AA78DBA49495E017F955082E05F25D47B058FB83F6B9AB861A4CF
9,281,508 UART: [art] SIG.R = A0F9B25168015A54B26B9701885991DCAC0820B6A3B850400AB8394B253F3ADEB687A7CEDCB09C63A02A1984EB1D9DA5
9,288,274 UART: [art] SIG.S = 805202E78D041F27B7454E8D3FB1F328259E03C3B1530C5379CD09D5B41FB88BE98F89C10B6F8E7119E11BE48AD2EB47
9,312,329 UART: Caliptra RT
9,312,582 UART: [state] CFI Enabled
9,597,229 UART: [rt] RT listening for mailbox commands...
9,597,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,552 UART: [rt]cmd =0x494e464f, len=4
9,630,785 >>> mbox cmd response data (264 bytes)
9,630,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,631,469 UART:
9,631,485 UART: Running Caliptra ROM ...
9,631,893 UART:
9,631,948 UART: [state] CFI Enabled
9,634,428 UART: [state] LifecycleState = Unprovisioned
9,635,083 UART: [state] DebugLocked = No
9,635,565 UART: [state] WD Timer not started. Device not locked for debugging
9,636,731 UART: [kat] SHA2-256
10,440,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,444,410 UART: [kat] ++
10,444,562 UART: [kat] sha1
10,448,846 UART: [kat] SHA2-256
10,450,786 UART: [kat] SHA2-384
10,453,613 UART: [kat] SHA2-512-ACC
10,455,513 UART: [kat] ECC-384
10,465,282 UART: [kat] HMAC-384Kdf
10,469,988 UART: [kat] LMS
10,718,300 UART: [kat] --
10,719,198 UART: [update-reset] ++
12,032,267 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,033,270 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,183,268 >>> mbox cmd response: success
12,183,435 UART: [update-reset] Copying MAN_2 To MAN_1
12,191,449 UART: [update-reset Success] --
12,192,412 UART: [state] Locking Datavault
12,193,208 UART: [state] Locking PCR0, PCR1 and PCR31
12,193,812 UART: [state] Locking ICCM
12,194,338 UART: [exit] Launching FMC @ 0x40000130
12,199,667 UART:
12,199,683 UART: Running Caliptra FMC ...
12,200,091 UART:
12,200,145 UART: [state] CFI Enabled
12,288,956 UART: [art] Extend RT PCRs Done
12,289,384 UART: [art] Lock RT PCRs Done
12,290,549 UART: [art] Populate DV Done
12,298,791 UART: [fht] FMC Alias Private Key: 7
12,299,745 UART: [art] Derive CDI
12,300,025 UART: [art] Store in in slot 0x4
12,385,818 UART: [art] Derive Key Pair
12,386,178 UART: [art] Store priv key in slot 0x5
12,399,704 UART: [art] Derive Key Pair - Done
12,414,580 UART: [art] Signing Cert with AUTHO
12,415,060 UART: RITY.KEYID = 7
12,430,230 UART: [art] Erasing AUTHORITY.KEYID = 7
12,430,995 UART: [art] PUB.X = 59930BA5906CA5CDFA73F3B4206C1880028DC60B8E0012C302E502DB02BAC7BC4B75BA3AC3556D0A71A6D5EE34E72778
12,437,732 UART: [art] PUB.Y = 813341BBFE5C6103F11E9FDA8701E77A6AB6C49B2C40F97C4FFE42548887F0982138278483A9C0356235C9F6C3DB18BA
12,444,678 UART: [art] SIG.R = BC23F8C472E0646FA5EF71EAE9274354BD967A7451DF2B0B26442CBE6355E512555943C5CFDAA8A5D2A200B9CE785829
12,451,431 UART: [art] SIG.S = 4139D5B36418D1111DA5A8F4DA138F9CBF1539FA80460373EBAC6C5B3B498A88B79F2DD5457B719FFA9B251E47D03E8D
12,475,005 UART: Caliptra RT
12,475,258 UART: [state] CFI Enabled
12,758,807 UART: [rt] RT listening for mailbox commands...
12,759,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,789,082 UART: [rt]cmd =0x494e464f, len=4
12,792,483 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,062 ready_for_fw is high
1,056,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,145 >>> mbox cmd response: success
2,625,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,784 UART:
2,687,800 UART: Running Caliptra FMC ...
2,688,208 UART:
2,688,262 UART: [state] CFI Enabled
2,698,688 UART: [fht] FMC Alias Private Key: 7
2,806,725 UART: [art] Extend RT PCRs Done
2,807,153 UART: [art] Lock RT PCRs Done
2,808,579 UART: [art] Populate DV Done
2,816,763 UART: [fht] FMC Alias Private Key: 7
2,817,733 UART: [art] Derive CDI
2,818,013 UART: [art] Store in in slot 0x4
2,903,694 UART: [art] Derive Key Pair
2,904,054 UART: [art] Store priv key in slot 0x5
2,917,082 UART: [art] Derive Key Pair - Done
2,932,084 UART: [art] Signing Cert with AUTHO
2,932,564 UART: RITY.KEYID = 7
2,947,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,715 UART: [art] PUB.X = 92DA956D333F8758DDD9673806A7CA92E6D0E5A537FD60FBDCDB30A6C1C3E1EBFC3DDEB395384229CD5E930412C8629E
2,955,495 UART: [art] PUB.Y = 83C99A9AF2208E7FA1726AEDAB8967FD68DD26597A614F409078E2AF632097B3F57EC2F1535DC64EC4D107FE95BB7587
2,962,450 UART: [art] SIG.R = 1F4AD2ACCF262E63D53FC444EAEC5B7894A95E7C85DA83CC001CD46DF097A8E9EAF5EEEE8C8E84ECB90C295F94B7A020
2,969,223 UART: [art] SIG.S = 35173730CDB1D91C68615A5C8AC11B301D8B56D43ACED48940B4C5C84302B2F2ACD4B43BF5257FBE1CEADDB306FF79B4
2,993,358 UART: Caliptra RT
2,993,611 UART: [state] CFI Enabled
3,101,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,691 UART: [rt]cmd =0x494e464f, len=4
3,136,064 >>> mbox cmd response data (264 bytes)
3,136,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,998 >>> mbox cmd response: success
5,583,746 UART:
5,583,762 UART: Running Caliptra FMC ...
5,584,170 UART:
5,584,224 UART: [state] CFI Enabled
5,673,407 UART: [art] Extend RT PCRs Done
5,673,835 UART: [art] Lock RT PCRs Done
5,675,006 UART: [art] Populate DV Done
5,683,128 UART: [fht] FMC Alias Private Key: 7
5,684,172 UART: [art] Derive CDI
5,684,452 UART: [art] Store in in slot 0x4
5,769,843 UART: [art] Derive Key Pair
5,770,203 UART: [art] Store priv key in slot 0x5
5,782,661 UART: [art] Derive Key Pair - Done
5,797,382 UART: [art] Signing Cert with AUTHO
5,797,862 UART: RITY.KEYID = 7
5,812,500 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,265 UART: [art] PUB.X = E871C9AD3296E855A4F935712459A7D90905D0F749E4C4F530D5EA4030313A3BAF9E45BD3970129E4B72FEBF5E1AC143
5,820,033 UART: [art] PUB.Y = 2D1ABCF9EAAB48737E7D28D25A4DD2F73943A55CF8E68BA050D3415C5E41830C1EB72077BD63E95B0253A2A0F9CC3544
5,826,989 UART: [art] SIG.R = 31FDD4BDA08655C031BBCEE2627325F3E05FB28F1E860E8D2C63B66CE1C3C7B4A43FDA5272FF5B92B70424E51679CD8A
5,833,769 UART: [art] SIG.S = 5B1E8EFD8AB7AA928F4E113716192288BE5145306DC33B2922F52E3950D39911B7B9D6BB51CB7F9871EF139A82BB0218
5,857,083 UART: Caliptra RT
5,857,336 UART: [state] CFI Enabled
6,138,200 UART: [rt] RT listening for mailbox commands...
6,138,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,219 UART: [rt]cmd =0x494e464f, len=4
6,171,584 >>> mbox cmd response data (264 bytes)
6,171,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,605,446 >>> mbox cmd response: success
8,618,544 UART:
8,618,560 UART: Running Caliptra FMC ...
8,618,968 UART:
8,619,022 UART: [state] CFI Enabled
8,708,173 UART: [art] Extend RT PCRs Done
8,708,601 UART: [art] Lock RT PCRs Done
8,709,864 UART: [art] Populate DV Done
8,717,972 UART: [fht] FMC Alias Private Key: 7
8,719,110 UART: [art] Derive CDI
8,719,390 UART: [art] Store in in slot 0x4
8,804,963 UART: [art] Derive Key Pair
8,805,323 UART: [art] Store priv key in slot 0x5
8,818,803 UART: [art] Derive Key Pair - Done
8,833,853 UART: [art] Signing Cert with AUTHO
8,834,333 UART: RITY.KEYID = 7
8,849,813 UART: [art] Erasing AUTHORITY.KEYID = 7
8,850,578 UART: [art] PUB.X = 3A7820975C4084F6D3965298C8DF2CE0178CD58259860C750F7AC272488867EB92EB86D07459361DDC7F3393D9979F57
8,857,332 UART: [art] PUB.Y = D476B65DB1231998D49D0CBA7DB9FA8A1241DE6392C6C9AE4562602261C7AD27E98DEDAA2BCF064E19D48864FD6BD2D1
8,864,292 UART: [art] SIG.R = 4B6DDD8E9202BFA8C4D53A5709B505B79E8C2F1F08699C3E215B0CE56894E866E945439DA9C0A8CBE54FFBF5F86D42A4
8,871,061 UART: [art] SIG.S = 087996ABCCB671131D2AC31EFAC911D5CD99D435A48A0E38CFCCEBE2E1D2E99204516AD5BBCE67A8914ACB3C10AEC685
8,894,803 UART: Caliptra RT
8,895,056 UART: [state] CFI Enabled
9,177,364 UART: [rt] RT listening for mailbox commands...
9,178,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,207,601 UART: [rt]cmd =0x494e464f, len=4
9,211,148 >>> mbox cmd response data (264 bytes)
9,211,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,646,100 >>> mbox cmd response: success
11,659,368 UART:
11,659,384 UART: Running Caliptra FMC ...
11,659,792 UART:
11,659,846 UART: [state] CFI Enabled
11,749,083 UART: [art] Extend RT PCRs Done
11,749,511 UART: [art] Lock RT PCRs Done
11,750,974 UART: [art] Populate DV Done
11,759,150 UART: [fht] FMC Alias Private Key: 7
11,760,270 UART: [art] Derive CDI
11,760,550 UART: [art] Store in in slot 0x4
11,846,735 UART: [art] Derive Key Pair
11,847,095 UART: [art] Store priv key in slot 0x5
11,860,631 UART: [art] Derive Key Pair - Done
11,875,430 UART: [art] Signing Cert with AUTHO
11,875,910 UART: RITY.KEYID = 7
11,891,454 UART: [art] Erasing AUTHORITY.KEYID = 7
11,892,219 UART: [art] PUB.X = E871C9AD3296E855A4F935712459A7D90905D0F749E4C4F530D5EA4030313A3BAF9E45BD3970129E4B72FEBF5E1AC143
11,898,987 UART: [art] PUB.Y = 2D1ABCF9EAAB48737E7D28D25A4DD2F73943A55CF8E68BA050D3415C5E41830C1EB72077BD63E95B0253A2A0F9CC3544
11,905,943 UART: [art] SIG.R = 31FDD4BDA08655C031BBCEE2627325F3E05FB28F1E860E8D2C63B66CE1C3C7B4A43FDA5272FF5B92B70424E51679CD8A
11,912,723 UART: [art] SIG.S = 5B1E8EFD8AB7AA928F4E113716192288BE5145306DC33B2922F52E3950D39911B7B9D6BB51CB7F9871EF139A82BB0218
11,936,361 UART: Caliptra RT
11,936,614 UART: [state] CFI Enabled
12,217,984 UART: [rt] RT listening for mailbox commands...
12,218,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,248,115 UART: [rt]cmd =0x494e464f, len=4
12,251,500 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.52s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,400 UART: [fwproc] Recv command 0x46574c44
1,284,133 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,966 >>> mbox cmd response: success
2,773,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,775,099 UART: [afmc] ++
2,775,267 UART: [afmc] CDI.KEYID = 6
2,775,630 UART: [afmc] SUBJECT.KEYID = 7
2,776,056 UART: [afmc] AUTHORITY.KEYID = 5
2,812,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,247 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,940 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,840,811 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,846,513 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,854,587 UART: [afmc] --
2,855,545 UART: [cold-reset] --
2,856,425 UART: [state] Locking Datavault
2,857,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,206 UART: [state] Locking ICCM
2,858,626 UART: [exit] Launching FMC @ 0x40000130
2,863,955 UART:
2,863,971 UART: Running Caliptra FMC ...
2,864,379 UART:
2,864,522 UART: [state] CFI Enabled
2,874,848 UART: [fht] FMC Alias Private Key: 7
2,983,137 UART: [art] Extend RT PCRs Done
2,983,565 UART: [art] Lock RT PCRs Done
2,985,363 UART: [art] Populate DV Done
2,993,569 UART: [fht] FMC Alias Private Key: 7
2,994,627 UART: [art] Derive CDI
2,994,907 UART: [art] Store in in slot 0x4
3,080,284 UART: [art] Derive Key Pair
3,080,644 UART: [art] Store priv key in slot 0x5
3,094,206 UART: [art] Derive Key Pair - Done
3,109,046 UART: [art] Signing Cert with AUTHO
3,109,526 UART: RITY.KEYID = 7
3,124,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,061 UART: [art] PUB.X = D4A4BD37C731214B50EF6B24CD808F15783CE64E240BA938E2346AAF9E76BB275C1D07CA7286DBFD992DC711A6049147
3,131,830 UART: [art] PUB.Y = 29698F5EF3D8A757678B348CBB5C5FA7E4E527DED70C36A00FC5CAA2B66A098D49DCB5CB6347FBF1C55D0E2EFFB6A1A1
3,138,794 UART: [art] SIG.R = 4B3B740E02F946F108EAD1A3FBC00858BAB53363E9C6A7B2781A56E398A70D2BD7D3A0539954C12524EE9A76034B6DFD
3,145,554 UART: [art] SIG.S = 8F594501239FE898AB1E9EAE25E5B50010A49A61990D5448BD382A3AED544C7764C09684028A5528159411E9D4E69146
3,169,148 UART: Caliptra RT
3,169,493 UART: [state] CFI Enabled
3,278,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,310 UART: [rt]cmd =0x494e464f, len=4
3,311,531 >>> mbox cmd response data (264 bytes)
3,311,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,497 UART:
3,312,513 UART: Running Caliptra ROM ...
3,312,921 UART:
3,313,063 UART: [state] CFI Enabled
3,315,957 UART: [state] LifecycleState = Unprovisioned
3,316,612 UART: [state] DebugLocked = No
3,317,148 UART: [state] WD Timer not started. Device not locked for debugging
3,318,320 UART: [kat] SHA2-256
4,121,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,999 UART: [kat] ++
4,126,151 UART: [kat] sha1
4,130,297 UART: [kat] SHA2-256
4,132,237 UART: [kat] SHA2-384
4,134,998 UART: [kat] SHA2-512-ACC
4,136,898 UART: [kat] ECC-384
4,146,373 UART: [kat] HMAC-384Kdf
4,151,097 UART: [kat] LMS
4,399,409 UART: [kat] --
4,400,203 UART: [update-reset] ++
5,713,394 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,714,509 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,864,507 >>> mbox cmd response: success
5,864,836 UART: [update-reset] Copying MAN_2 To MAN_1
5,872,850 UART: [update-reset Success] --
5,873,937 UART: [state] Locking Datavault
5,874,719 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,323 UART: [state] Locking ICCM
5,875,757 UART: [exit] Launching FMC @ 0x40000130
5,881,086 UART:
5,881,102 UART: Running Caliptra FMC ...
5,881,510 UART:
5,881,653 UART: [state] CFI Enabled
5,971,076 UART: [art] Extend RT PCRs Done
5,971,504 UART: [art] Lock RT PCRs Done
5,972,789 UART: [art] Populate DV Done
5,980,789 UART: [fht] FMC Alias Private Key: 7
5,981,947 UART: [art] Derive CDI
5,982,227 UART: [art] Store in in slot 0x4
6,067,948 UART: [art] Derive Key Pair
6,068,308 UART: [art] Store priv key in slot 0x5
6,082,064 UART: [art] Derive Key Pair - Done
6,097,156 UART: [art] Signing Cert with AUTHO
6,097,636 UART: RITY.KEYID = 7
6,112,718 UART: [art] Erasing AUTHORITY.KEYID = 7
6,113,483 UART: [art] PUB.X = E6411EFE7D16A0D59B388C809114332AAB5F90720693AFE9DC5AD0F5493747E2EC6B199217427696C64B3F39765C56D3
6,120,248 UART: [art] PUB.Y = BB1D389F7452C4C0BA996127CFEF2BD57CDC94FE578C38002A01845BB890DDC095D2010F353F100ABCCF1E17CF75DC91
6,127,180 UART: [art] SIG.R = 662F89DAA8AA103CCD4D3F41DB199288EBBA260E0AC66B79C675275B167B251E00C0F1570126D86075D907D27A475BA6
6,133,920 UART: [art] SIG.S = AD7CF407788BE68E78BD29EFB13C48E5E1007E4C01E8A8234BAA619571561EF8160FEE357768C84A052354BD23DC7245
6,157,709 UART: Caliptra RT
6,158,054 UART: [state] CFI Enabled
6,440,775 UART: [rt] RT listening for mailbox commands...
6,441,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,002 UART: [rt]cmd =0x494e464f, len=4
6,474,431 >>> mbox cmd response data (264 bytes)
6,474,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,475,265 UART:
6,475,281 UART: Running Caliptra ROM ...
6,475,689 UART:
6,475,831 UART: [state] CFI Enabled
6,478,425 UART: [state] LifecycleState = Unprovisioned
6,479,080 UART: [state] DebugLocked = No
6,479,798 UART: [state] WD Timer not started. Device not locked for debugging
6,480,930 UART: [kat] SHA2-256
7,284,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,288,609 UART: [kat] ++
7,288,761 UART: [kat] sha1
7,292,947 UART: [kat] SHA2-256
7,294,887 UART: [kat] SHA2-384
7,297,842 UART: [kat] SHA2-512-ACC
7,299,742 UART: [kat] ECC-384
7,309,397 UART: [kat] HMAC-384Kdf
7,314,223 UART: [kat] LMS
7,562,535 UART: [kat] --
7,563,317 UART: [update-reset] ++
8,875,664 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,876,849 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,026,847 >>> mbox cmd response: success
9,027,090 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,104 UART: [update-reset Success] --
9,036,117 UART: [state] Locking Datavault
9,037,005 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,609 UART: [state] Locking ICCM
9,038,113 UART: [exit] Launching FMC @ 0x40000130
9,043,442 UART:
9,043,458 UART: Running Caliptra FMC ...
9,043,866 UART:
9,044,009 UART: [state] CFI Enabled
9,133,480 UART: [art] Extend RT PCRs Done
9,133,908 UART: [art] Lock RT PCRs Done
9,135,057 UART: [art] Populate DV Done
9,143,173 UART: [fht] FMC Alias Private Key: 7
9,144,305 UART: [art] Derive CDI
9,144,585 UART: [art] Store in in slot 0x4
9,230,296 UART: [art] Derive Key Pair
9,230,656 UART: [art] Store priv key in slot 0x5
9,243,636 UART: [art] Derive Key Pair - Done
9,258,597 UART: [art] Signing Cert with AUTHO
9,259,077 UART: RITY.KEYID = 7
9,274,591 UART: [art] Erasing AUTHORITY.KEYID = 7
9,275,356 UART: [art] PUB.X = 655ACF59A5AA637B2A22D0B0083C86A8F59BCD28B580CB4520B12BC349868CEA0F1E7C1FB4F65DEDC34ABF6822C88487
9,282,136 UART: [art] PUB.Y = 4368CF40B4301E7EC6AD25E1C9D1E0A11E63D07BB8CD123BE3404BE2FC15A9A526DC609BF7C661B183186C3FD00FCA06
9,289,096 UART: [art] SIG.R = FDFD56EE14203FEF48EF8F053308E35C45FACF8D0E58ABCC669D5BE808AA84AEA24325AE50371CF6A771C2419412EE4B
9,295,874 UART: [art] SIG.S = EA4C621A7143F77CD63DDFC8F7A5CAF0EE310F9A84FA3CEF37DB08D34EF934ED5BF8FF6B849496AFA7625168DDF32A3C
9,320,031 UART: Caliptra RT
9,320,376 UART: [state] CFI Enabled
9,600,387 UART: [rt] RT listening for mailbox commands...
9,601,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,630,678 UART: [rt]cmd =0x494e464f, len=4
9,633,779 >>> mbox cmd response data (264 bytes)
9,633,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,634,571 UART:
9,634,587 UART: Running Caliptra ROM ...
9,634,995 UART:
9,635,137 UART: [state] CFI Enabled
9,637,979 UART: [state] LifecycleState = Unprovisioned
9,638,634 UART: [state] DebugLocked = No
9,639,120 UART: [state] WD Timer not started. Device not locked for debugging
9,640,300 UART: [kat] SHA2-256
10,443,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,447,979 UART: [kat] ++
10,448,131 UART: [kat] sha1
10,452,457 UART: [kat] SHA2-256
10,454,397 UART: [kat] SHA2-384
10,457,158 UART: [kat] SHA2-512-ACC
10,459,058 UART: [kat] ECC-384
10,469,185 UART: [kat] HMAC-384Kdf
10,473,747 UART: [kat] LMS
10,722,059 UART: [kat] --
10,722,897 UART: [update-reset] ++
12,035,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,037,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,187,031 >>> mbox cmd response: success
12,187,256 UART: [update-reset] Copying MAN_2 To MAN_1
12,195,270 UART: [update-reset Success] --
12,196,441 UART: [state] Locking Datavault
12,197,231 UART: [state] Locking PCR0, PCR1 and PCR31
12,197,835 UART: [state] Locking ICCM
12,198,375 UART: [exit] Launching FMC @ 0x40000130
12,203,704 UART:
12,203,720 UART: Running Caliptra FMC ...
12,204,128 UART:
12,204,271 UART: [state] CFI Enabled
12,293,374 UART: [art] Extend RT PCRs Done
12,293,802 UART: [art] Lock RT PCRs Done
12,294,993 UART: [art] Populate DV Done
12,303,047 UART: [fht] FMC Alias Private Key: 7
12,304,191 UART: [art] Derive CDI
12,304,471 UART: [art] Store in in slot 0x4
12,390,210 UART: [art] Derive Key Pair
12,390,570 UART: [art] Store priv key in slot 0x5
12,403,794 UART: [art] Derive Key Pair - Done
12,418,716 UART: [art] Signing Cert with AUTHO
12,419,196 UART: RITY.KEYID = 7
12,434,174 UART: [art] Erasing AUTHORITY.KEYID = 7
12,434,939 UART: [art] PUB.X = E6411EFE7D16A0D59B388C809114332AAB5F90720693AFE9DC5AD0F5493747E2EC6B199217427696C64B3F39765C56D3
12,441,704 UART: [art] PUB.Y = BB1D389F7452C4C0BA996127CFEF2BD57CDC94FE578C38002A01845BB890DDC095D2010F353F100ABCCF1E17CF75DC91
12,448,636 UART: [art] SIG.R = 662F89DAA8AA103CCD4D3F41DB199288EBBA260E0AC66B79C675275B167B251E00C0F1570126D86075D907D27A475BA6
12,455,376 UART: [art] SIG.S = AD7CF407788BE68E78BD29EFB13C48E5E1007E4C01E8A8234BAA619571561EF8160FEE357768C84A052354BD23DC7245
12,479,437 UART: Caliptra RT
12,479,782 UART: [state] CFI Enabled
12,755,623 UART: [rt] RT listening for mailbox commands...
12,756,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,785,910 UART: [rt]cmd =0x494e464f, len=4
12,789,165 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 ready_for_fw is high
1,056,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,134 >>> mbox cmd response: success
2,625,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,423 UART:
2,687,439 UART: Running Caliptra FMC ...
2,687,847 UART:
2,687,990 UART: [state] CFI Enabled
2,698,414 UART: [fht] FMC Alias Private Key: 7
2,806,717 UART: [art] Extend RT PCRs Done
2,807,145 UART: [art] Lock RT PCRs Done
2,808,841 UART: [art] Populate DV Done
2,816,963 UART: [fht] FMC Alias Private Key: 7
2,818,009 UART: [art] Derive CDI
2,818,289 UART: [art] Store in in slot 0x4
2,903,948 UART: [art] Derive Key Pair
2,904,308 UART: [art] Store priv key in slot 0x5
2,917,868 UART: [art] Derive Key Pair - Done
2,932,540 UART: [art] Signing Cert with AUTHO
2,933,020 UART: RITY.KEYID = 7
2,948,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,871 UART: [art] PUB.X = 552CF4CBF5A16C0FC4D7333F68EE3EE73C111890AF74C0951DCED4E944A2834A862FC727B15C9AB2797411C62F52EEC8
2,955,650 UART: [art] PUB.Y = 1EE126DC745D5F9B3E3AEA458E56B7A5E0861A4AD64DE152F8E5D58C1D467B873737D156D1044D2FC6F48EA4A903CF22
2,962,606 UART: [art] SIG.R = 867CCF6248B519F7220E0AEDABE3E96694F38674395601CB427E84D4629D71F488E18A800724CFC0B039973125F40D2F
2,969,357 UART: [art] SIG.S = C8E10664CD4A052BB2D92D76642C58A045096EFA7D02DEBA3B57C406571AC7BFE2716C8D3D43D1369941CA525406001E
2,993,272 UART: Caliptra RT
2,993,617 UART: [state] CFI Enabled
3,101,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,494 UART: [rt]cmd =0x494e464f, len=4
3,134,829 >>> mbox cmd response data (264 bytes)
3,134,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,098 >>> mbox cmd response: success
5,582,460 UART:
5,582,476 UART: Running Caliptra FMC ...
5,582,884 UART:
5,583,027 UART: [state] CFI Enabled
5,672,988 UART: [art] Extend RT PCRs Done
5,673,416 UART: [art] Lock RT PCRs Done
5,674,827 UART: [art] Populate DV Done
5,682,867 UART: [fht] FMC Alias Private Key: 7
5,683,969 UART: [art] Derive CDI
5,684,249 UART: [art] Store in in slot 0x4
5,769,864 UART: [art] Derive Key Pair
5,770,224 UART: [art] Store priv key in slot 0x5
5,783,582 UART: [art] Derive Key Pair - Done
5,798,392 UART: [art] Signing Cert with AUTHO
5,798,872 UART: RITY.KEYID = 7
5,814,344 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,109 UART: [art] PUB.X = FA04C80D980A74D87632A6949A1E6AA4919BD88A0F86A592717058D9A15D9F070B8E886FF8F72CC6F6E5E402E8C47EB4
5,821,864 UART: [art] PUB.Y = 398F3B1EAE93BAA185C91158D427111CC24C1CB62B832ED9282FB464536275EF549ED6EA52225371ACA07F284B1A54E1
5,828,818 UART: [art] SIG.R = EBA2FF83F1B90E6A0B5AC55389FE5F1BB9F14537F6F25FBD28A39C450C97E812E7983FC32604A59E06499579B0EDA69B
5,835,585 UART: [art] SIG.S = 4163532323FCB749F635583572C608FD0C73AD8E0754F07552BB9F0CC3115565561C86CB971254342535769D23E83695
5,859,202 UART: Caliptra RT
5,859,547 UART: [state] CFI Enabled
6,146,996 UART: [rt] RT listening for mailbox commands...
6,147,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,177,299 UART: [rt]cmd =0x494e464f, len=4
6,180,528 >>> mbox cmd response data (264 bytes)
6,180,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,615,101 >>> mbox cmd response: success
8,628,591 UART:
8,628,607 UART: Running Caliptra FMC ...
8,629,015 UART:
8,629,158 UART: [state] CFI Enabled
8,717,853 UART: [art] Extend RT PCRs Done
8,718,281 UART: [art] Lock RT PCRs Done
8,719,584 UART: [art] Populate DV Done
8,727,748 UART: [fht] FMC Alias Private Key: 7
8,728,870 UART: [art] Derive CDI
8,729,150 UART: [art] Store in in slot 0x4
8,815,149 UART: [art] Derive Key Pair
8,815,509 UART: [art] Store priv key in slot 0x5
8,829,171 UART: [art] Derive Key Pair - Done
8,843,801 UART: [art] Signing Cert with AUTHO
8,844,281 UART: RITY.KEYID = 7
8,859,875 UART: [art] Erasing AUTHORITY.KEYID = 7
8,860,640 UART: [art] PUB.X = C10BB7760D169A936C354766105074DA85F977A362BB0813AA9D366ECFE06C5D2F44587A31D3D38695D0B8CACE30803E
8,867,403 UART: [art] PUB.Y = 2064E60B019DF13B28D4AFA4618F067953EC2695AB7F53C375017F71F458927EA820157DC421A73599D88B5994D0C8CA
8,874,337 UART: [art] SIG.R = 9A50A9D47D044403C25090A08B0098DA35F2042A9FC4CCA2E73D38CE23A81AC2CE3D5EAD58D3F8D186939972652D687F
8,881,082 UART: [art] SIG.S = EBC2DC76C58610076C1C254247BD5D6B4C2589D923A81AEE1102A7538EEE1A09E1538F2F2139F1975F402C0C879676EA
8,905,019 UART: Caliptra RT
8,905,364 UART: [state] CFI Enabled
9,184,105 UART: [rt] RT listening for mailbox commands...
9,184,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,214,116 UART: [rt]cmd =0x494e464f, len=4
9,217,473 >>> mbox cmd response data (264 bytes)
9,217,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,651,108 >>> mbox cmd response: success
11,664,606 UART:
11,664,622 UART: Running Caliptra FMC ...
11,665,030 UART:
11,665,173 UART: [state] CFI Enabled
11,754,642 UART: [art] Extend RT PCRs Done
11,755,070 UART: [art] Lock RT PCRs Done
11,756,291 UART: [art] Populate DV Done
11,764,731 UART: [fht] FMC Alias Private Key: 7
11,765,841 UART: [art] Derive CDI
11,766,121 UART: [art] Store in in slot 0x4
11,851,888 UART: [art] Derive Key Pair
11,852,248 UART: [art] Store priv key in slot 0x5
11,865,954 UART: [art] Derive Key Pair - Done
11,880,626 UART: [art] Signing Cert with AUTHO
11,881,106 UART: RITY.KEYID = 7
11,896,332 UART: [art] Erasing AUTHORITY.KEYID = 7
11,897,097 UART: [art] PUB.X = FA04C80D980A74D87632A6949A1E6AA4919BD88A0F86A592717058D9A15D9F070B8E886FF8F72CC6F6E5E402E8C47EB4
11,903,852 UART: [art] PUB.Y = 398F3B1EAE93BAA185C91158D427111CC24C1CB62B832ED9282FB464536275EF549ED6EA52225371ACA07F284B1A54E1
11,910,806 UART: [art] SIG.R = EBA2FF83F1B90E6A0B5AC55389FE5F1BB9F14537F6F25FBD28A39C450C97E812E7983FC32604A59E06499579B0EDA69B
11,917,573 UART: [art] SIG.S = 4163532323FCB749F635583572C608FD0C73AD8E0754F07552BB9F0CC3115565561C86CB971254342535769D23E83695
11,941,418 UART: Caliptra RT
11,941,763 UART: [state] CFI Enabled
12,224,740 UART: [rt] RT listening for mailbox commands...
12,225,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,254,937 UART: [rt]cmd =0x494e464f, len=4
12,258,334 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,159 UART:
192,520 UART: Running Caliptra ROM ...
193,707 UART:
193,861 UART: [state] CFI Enabled
262,545 UART: [state] LifecycleState = Unprovisioned
264,537 UART: [state] DebugLocked = No
267,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,004 UART: [kat] SHA2-256
441,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,242 UART: [kat] ++
452,728 UART: [kat] sha1
464,055 UART: [kat] SHA2-256
466,771 UART: [kat] SHA2-384
471,559 UART: [kat] SHA2-512-ACC
473,876 UART: [kat] ECC-384
2,767,020 UART: [kat] HMAC-384Kdf
2,778,428 UART: [kat] LMS
3,968,660 UART: [kat] --
3,972,526 UART: [cold-reset] ++
3,974,389 UART: [fht] Storing FHT @ 0x50003400
3,984,820 UART: [idev] ++
3,985,424 UART: [idev] CDI.KEYID = 6
3,986,413 UART: [idev] SUBJECT.KEYID = 7
3,987,509 UART: [idev] UDS.KEYID = 0
3,988,640 ready_for_fw is high
3,988,846 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,216 UART: [idev] Erasing UDS.KEYID = 0
7,327,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,355 UART: [idev] --
7,353,289 UART: [ldev] ++
7,353,881 UART: [ldev] CDI.KEYID = 6
7,354,774 UART: [ldev] SUBJECT.KEYID = 5
7,356,041 UART: [ldev] AUTHORITY.KEYID = 7
7,357,275 UART: [ldev] FE.KEYID = 1
7,400,904 UART: [ldev] Erasing FE.KEYID = 1
10,736,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,362 UART: [ldev] --
13,117,575 UART: [fwproc] Waiting for Commands...
13,120,210 UART: [fwproc] Received command 0x46574c44
13,122,391 UART: [fwproc] Received Image of size 114124 bytes
17,164,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,629,826 >>> mbox cmd response: success
17,630,342 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,634,440 UART: [afmc] ++
17,635,020 UART: [afmc] CDI.KEYID = 6
17,635,960 UART: [afmc] SUBJECT.KEYID = 7
17,637,171 UART: [afmc] AUTHORITY.KEYID = 5
21,005,115 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,351 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,748 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,566 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,039 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,157 UART: [afmc] --
23,383,377 UART: [cold-reset] --
23,386,427 UART: [state] Locking Datavault
23,389,907 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,659 UART: [state] Locking ICCM
23,393,434 UART: [exit] Launching FMC @ 0x40000130
23,401,832 UART:
23,402,074 UART: Running Caliptra FMC ...
23,403,179 UART:
23,403,336 UART: [state] CFI Enabled
23,469,441 UART: [fht] FMC Alias Private Key: 7
25,807,856 UART: [art] Extend RT PCRs Done
25,809,085 UART: [art] Lock RT PCRs Done
25,810,822 UART: [art] Populate DV Done
25,816,231 UART: [fht] FMC Alias Private Key: 7
25,817,716 UART: [art] Derive CDI
25,818,660 UART: [art] Store in in slot 0x4
25,877,495 UART: [art] Derive Key Pair
25,878,503 UART: [art] Store priv key in slot 0x5
29,171,106 UART: [art] Derive Key Pair - Done
29,183,859 UART: [art] Signing Cert with AUTHO
29,185,183 UART: RITY.KEYID = 7
31,473,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,307 UART: [art] PUB.X = DD30C53AC4FD8667343FFCDF24ADC746B30EAA438667154F245D5856E8E7D880E960A80ECABFBFE76D69F7CC2955C6B3
31,482,511 UART: [art] PUB.Y = 59AFF1D75A89BEF31FEB455C54C6AF96BB787F02255721371D338B086DAD13632285FAB05C767C04663ADC5F319A0B5D
31,489,802 UART: [art] SIG.R = 840A08CDD631684681154B3A1B1A9E72EA134A9B570D3D385A0E4229F72CA64F25884B2754D36C918D60D441823642AD
31,497,151 UART: [art] SIG.S = 1931A646B847A51550DB667852CDB74A77EF5CACCDA0AEB4885738D94DA68F9B23994D15913E7D8037E2297336615A30
32,801,935 UART: Caliptra RT
32,802,640 UART: [state] CFI Enabled
32,963,861 UART: [rt] RT listening for mailbox commands...
32,995,440 UART: [rt]cmd =0x49444549, len=4
32,998,261 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,475 writing to cptra_bootfsm_go
3,807,703 ready_for_fw is high
3,808,248 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,899,693 >>> mbox cmd response: success
17,900,305 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,593,176 UART:
23,593,565 UART: Running Caliptra FMC ...
23,594,763 UART:
23,594,931 UART: [state] CFI Enabled
23,662,566 UART: [fht] FMC Alias Private Key: 7
26,001,167 UART: [art] Extend RT PCRs Done
26,002,394 UART: [art] Lock RT PCRs Done
26,004,079 UART: [art] Populate DV Done
26,009,520 UART: [fht] FMC Alias Private Key: 7
26,011,079 UART: [art] Derive CDI
26,011,821 UART: [art] Store in in slot 0x4
26,062,413 UART: [art] Derive Key Pair
26,063,415 UART: [art] Store priv key in slot 0x5
29,356,613 UART: [art] Derive Key Pair - Done
29,369,767 UART: [art] Signing Cert with AUTHO
29,371,106 UART: RITY.KEYID = 7
31,658,298 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,825 UART: [art] PUB.X = 0C4D21674AC3B6A8B4190A7470E2B3A499FCE7B70FD759A242D32B5FBBC8579F98890D0FEB47F181B571DC783DC705A5
31,667,070 UART: [art] PUB.Y = 97A94424B2029A47A3D8685435CCEE5B644F5F3E3D310701419862FBD893AB69C0DB150B7856DAA2AED407B304975D93
31,674,267 UART: [art] SIG.R = 9B1814C3A8304DAF2D094E198B421E05729B9F08395CE59CB624A77982D46297767FDDD7C217F405CF7402117F0B7C7E
31,681,660 UART: [art] SIG.S = 2945A5AC75A329A383C175CF1DB122B322AE0572BCC76ED24ACD50EBD96C4CADB2FA196E8B8762EF55A0AC6F461EAB13
32,987,248 UART: Caliptra RT
32,987,955 UART: [state] CFI Enabled
33,149,392 UART: [rt] RT listening for mailbox commands...
33,180,644 UART: [rt]cmd =0x49444549, len=4
33,183,521 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,461 UART:
192,824 UART: Running Caliptra ROM ...
194,020 UART:
603,597 UART: [state] CFI Enabled
615,769 UART: [state] LifecycleState = Unprovisioned
617,698 UART: [state] DebugLocked = No
619,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,932 UART: [kat] SHA2-256
794,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,190 UART: [kat] ++
805,632 UART: [kat] sha1
817,137 UART: [kat] SHA2-256
819,859 UART: [kat] SHA2-384
825,703 UART: [kat] SHA2-512-ACC
828,065 UART: [kat] ECC-384
3,111,208 UART: [kat] HMAC-384Kdf
3,123,638 UART: [kat] LMS
4,313,750 UART: [kat] --
4,317,772 UART: [cold-reset] ++
4,319,421 UART: [fht] Storing FHT @ 0x50003400
4,330,611 UART: [idev] ++
4,331,180 UART: [idev] CDI.KEYID = 6
4,332,056 UART: [idev] SUBJECT.KEYID = 7
4,333,368 UART: [idev] UDS.KEYID = 0
4,334,335 ready_for_fw is high
4,334,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,885 UART: [idev] Erasing UDS.KEYID = 0
7,624,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,798 UART: [idev] --
7,648,602 UART: [ldev] ++
7,649,167 UART: [ldev] CDI.KEYID = 6
7,650,136 UART: [ldev] SUBJECT.KEYID = 5
7,651,358 UART: [ldev] AUTHORITY.KEYID = 7
7,652,646 UART: [ldev] FE.KEYID = 1
7,662,974 UART: [ldev] Erasing FE.KEYID = 1
10,951,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,785 UART: [ldev] --
13,313,075 UART: [fwproc] Waiting for Commands...
13,316,350 UART: [fwproc] Received command 0x46574c44
13,318,522 UART: [fwproc] Received Image of size 114124 bytes
17,365,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,771 >>> mbox cmd response: success
17,826,313 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,829,377 UART: [afmc] ++
17,829,964 UART: [afmc] CDI.KEYID = 6
17,830,845 UART: [afmc] SUBJECT.KEYID = 7
17,832,104 UART: [afmc] AUTHORITY.KEYID = 5
21,150,336 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,285 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,652 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,493 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,890 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,452 UART: [afmc] --
23,516,732 UART: [cold-reset] --
23,520,050 UART: [state] Locking Datavault
23,526,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,394 UART: [state] Locking ICCM
23,530,451 UART: [exit] Launching FMC @ 0x40000130
23,538,848 UART:
23,539,079 UART: Running Caliptra FMC ...
23,540,127 UART:
23,540,278 UART: [state] CFI Enabled
23,548,478 UART: [fht] FMC Alias Private Key: 7
25,879,392 UART: [art] Extend RT PCRs Done
25,880,611 UART: [art] Lock RT PCRs Done
25,882,556 UART: [art] Populate DV Done
25,887,802 UART: [fht] FMC Alias Private Key: 7
25,889,283 UART: [art] Derive CDI
25,890,014 UART: [art] Store in in slot 0x4
25,932,878 UART: [art] Derive Key Pair
25,933,919 UART: [art] Store priv key in slot 0x5
29,176,034 UART: [art] Derive Key Pair - Done
29,189,111 UART: [art] Signing Cert with AUTHO
29,190,457 UART: RITY.KEYID = 7
31,470,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,554 UART: [art] PUB.X = 45EBB4FB33E9260AAB68F524594A1A4D3CC4A7FCE6BB456141B56E093E2E62D13638A127A603ED2BE64C9C2E01E842DD
31,478,797 UART: [art] PUB.Y = 9C7B68A47FF2B6E6ACBBC00213A801D1328ACE697ACA60EF627D1B49EB6718D722A746B51BD69F51417F81C91074E6D5
31,486,079 UART: [art] SIG.R = 8AC813C09EC9C8FC9DFFB0148D5C8EDA355F66CA80D6B06407FFEB49865D3DC13AC03BC9ED4F40267C9DB8CEBF370397
31,493,482 UART: [art] SIG.S = CC7E86A3A1DE08FCD4CCA097604E7E1A6CBB57E30EE7AC208DD44354286CFAF30ECDAD36D8B9D44F60BC1CAA9DC49122
32,799,290 UART: Caliptra RT
32,800,016 UART: [state] CFI Enabled
32,918,329 UART: [rt] RT listening for mailbox commands...
32,949,736 UART: [rt]cmd =0x49444549, len=4
32,952,533 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
4,128,641 ready_for_fw is high
4,129,059 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,897 >>> mbox cmd response: success
18,064,485 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,706,929 UART:
23,707,313 UART: Running Caliptra FMC ...
23,708,416 UART:
23,708,572 UART: [state] CFI Enabled
23,716,640 UART: [fht] FMC Alias Private Key: 7
26,047,398 UART: [art] Extend RT PCRs Done
26,048,627 UART: [art] Lock RT PCRs Done
26,050,350 UART: [art] Populate DV Done
26,055,741 UART: [fht] FMC Alias Private Key: 7
26,057,215 UART: [art] Derive CDI
26,057,952 UART: [art] Store in in slot 0x4
26,100,971 UART: [art] Derive Key Pair
26,101,968 UART: [art] Store priv key in slot 0x5
29,344,464 UART: [art] Derive Key Pair - Done
29,357,462 UART: [art] Signing Cert with AUTHO
29,358,764 UART: RITY.KEYID = 7
31,638,099 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,614 UART: [art] PUB.X = D05C13CC83C79242D117C786E671AE285365E5A2AC2CF27C8D7742B67A06AF7D556B5EE0846C4E2ABCF7D80488D0519E
31,646,865 UART: [art] PUB.Y = 876C376BF1B5527D669BA55AE7744521E41F0B0B3934394C90C2B70676CA1ACCE3E3B89C31364318CBCBF8C201B5725F
31,654,131 UART: [art] SIG.R = 56CAD866066AD7C552BE95C52DD29F3F92944334DA920F94B5245D27AD40308751A535163524D61064A973D9A5DA1A1F
31,661,476 UART: [art] SIG.S = 11E2B80B06445C4E187C871976A6738A649496B5D46B08C2F9AE0376377A4296EF27AFCA938FA15189A801521DCE76AF
32,966,476 UART: Caliptra RT
32,967,190 UART: [state] CFI Enabled
33,084,222 UART: [rt] RT listening for mailbox commands...
33,115,575 UART: [rt]cmd =0x49444549, len=4
33,118,536 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,194 UART:
192,563 UART: Running Caliptra ROM ...
193,704 UART:
193,849 UART: [state] CFI Enabled
264,772 UART: [state] LifecycleState = Unprovisioned
266,691 UART: [state] DebugLocked = No
268,369 UART: [state] WD Timer not started. Device not locked for debugging
272,185 UART: [kat] SHA2-256
451,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,923 UART: [kat] ++
463,452 UART: [kat] sha1
474,689 UART: [kat] SHA2-256
477,685 UART: [kat] SHA2-384
483,816 UART: [kat] SHA2-512-ACC
486,820 UART: [kat] ECC-384
2,949,505 UART: [kat] HMAC-384Kdf
2,973,027 UART: [kat] LMS
3,502,452 UART: [kat] --
3,506,468 UART: [cold-reset] ++
3,508,968 UART: [fht] FHT @ 0x50003400
3,519,443 UART: [idev] ++
3,520,013 UART: [idev] CDI.KEYID = 6
3,520,922 UART: [idev] SUBJECT.KEYID = 7
3,522,164 UART: [idev] UDS.KEYID = 0
3,523,107 ready_for_fw is high
3,523,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,217 UART: [idev] Erasing UDS.KEYID = 0
6,026,643 UART: [idev] Sha1 KeyId Algorithm
6,049,518 UART: [idev] --
6,053,596 UART: [ldev] ++
6,054,176 UART: [ldev] CDI.KEYID = 6
6,055,090 UART: [ldev] SUBJECT.KEYID = 5
6,056,199 UART: [ldev] AUTHORITY.KEYID = 7
6,057,426 UART: [ldev] FE.KEYID = 1
6,102,232 UART: [ldev] Erasing FE.KEYID = 1
8,604,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,849 UART: [ldev] --
10,415,032 UART: [fwproc] Wait for Commands...
10,417,016 UART: [fwproc] Recv command 0x46574c44
10,419,110 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,813 >>> mbox cmd response: success
14,284,326 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,288,252 UART: [afmc] ++
14,288,869 UART: [afmc] CDI.KEYID = 6
14,289,787 UART: [afmc] SUBJECT.KEYID = 7
14,290,956 UART: [afmc] AUTHORITY.KEYID = 5
16,826,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,340 UART: [afmc] --
18,628,889 UART: [cold-reset] --
18,632,097 UART: [state] Locking Datavault
18,638,045 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,693 UART: [state] Locking ICCM
18,640,799 UART: [exit] Launching FMC @ 0x40000130
18,649,192 UART:
18,649,423 UART: Running Caliptra FMC ...
18,650,522 UART:
18,650,678 UART: [state] CFI Enabled
18,711,451 UART: [fht] FMC Alias Private Key: 7
20,475,868 UART: [art] Extend RT PCRs Done
20,477,084 UART: [art] Lock RT PCRs Done
20,479,030 UART: [art] Populate DV Done
20,484,390 UART: [fht] FMC Alias Private Key: 7
20,485,933 UART: [art] Derive CDI
20,486,669 UART: [art] Store in in slot 0x4
20,544,007 UART: [art] Derive Key Pair
20,545,044 UART: [art] Store priv key in slot 0x5
23,008,367 UART: [art] Derive Key Pair - Done
23,021,530 UART: [art] Signing Cert with AUTHO
23,022,834 UART: RITY.KEYID = 7
24,734,125 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,623 UART: [art] PUB.X = 6CE83D12699E95F3894F12E198A464EA9641911D7836B5BABBD2F579CD7665C1F173D80645D22B9B239908D806BC949D
24,742,930 UART: [art] PUB.Y = 6E0F103E9B5475B33917469E79B7CA593E3848F85C931A5E9AD4E6C7650A5EFC6F5BE543EBC0B04F429EF299C67EAE54
24,750,163 UART: [art] SIG.R = 0F91A4E1ED6D92F22541088F076FFC6FB344DCD54A417D5059E2D5405EA6A813F3D54EAF9434E91B6A8558D313B62395
24,757,549 UART: [art] SIG.S = E1321D13D0C96BF605BE05E862BEA1908D7D74DE5E8773642325BD2B5C34747DA8FDFAE0D64FD833B527E1AE6CCCC6AE
25,736,483 UART: Caliptra RT
25,737,179 UART: [state] CFI Enabled
25,901,974 UART: [rt] RT listening for mailbox commands...
25,933,062 UART: [rt]cmd =0x49444549, len=4
25,935,829 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,381,276 ready_for_fw is high
3,381,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,103 >>> mbox cmd response: success
14,088,913 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,385,679 UART:
18,386,085 UART: Running Caliptra FMC ...
18,387,261 UART:
18,387,424 UART: [state] CFI Enabled
18,453,100 UART: [fht] FMC Alias Private Key: 7
20,217,281 UART: [art] Extend RT PCRs Done
20,218,507 UART: [art] Lock RT PCRs Done
20,220,244 UART: [art] Populate DV Done
20,225,712 UART: [fht] FMC Alias Private Key: 7
20,227,203 UART: [art] Derive CDI
20,227,968 UART: [art] Store in in slot 0x4
20,286,068 UART: [art] Derive Key Pair
20,287,111 UART: [art] Store priv key in slot 0x5
22,749,376 UART: [art] Derive Key Pair - Done
22,762,260 UART: [art] Signing Cert with AUTHO
22,763,558 UART: RITY.KEYID = 7
24,475,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,497 UART: [art] PUB.X = 5F822A66155827527CF5FE9AB4BC0D87AFA66BEA3A3884D88B0FFFE901858F741B00836DE95787C60DFEB9B2EC1859FC
24,484,832 UART: [art] PUB.Y = B420934C6C790F9B73582FF5FF21F48722B9DA74887C5A1542CB18B46EB0863576D85DCF830AD379653FCF68E33CDA28
24,492,050 UART: [art] SIG.R = CB9DECC024B1A79F5982FD3DACF872C4AA02563EA80F08A9E64E9A69309D30231C0E7DC4FA3F5F27D049DC3FB731B7FC
24,499,454 UART: [art] SIG.S = B811FD6DD63D5D808BD0B7BA60E6A1A95D985EDE6594FC6C3786A8074E9547EE4687A356F0DA32A97998BE1E201980ED
25,477,732 UART: Caliptra RT
25,478,429 UART: [state] CFI Enabled
25,644,255 UART: [rt] RT listening for mailbox commands...
25,675,319 UART: [rt]cmd =0x49444549, len=4
25,677,986 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,321 UART:
192,688 UART: Running Caliptra ROM ...
193,822 UART:
603,485 UART: [state] CFI Enabled
619,496 UART: [state] LifecycleState = Unprovisioned
621,378 UART: [state] DebugLocked = No
623,044 UART: [state] WD Timer not started. Device not locked for debugging
626,012 UART: [kat] SHA2-256
805,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,728 UART: [kat] ++
817,255 UART: [kat] sha1
827,487 UART: [kat] SHA2-256
830,487 UART: [kat] SHA2-384
837,249 UART: [kat] SHA2-512-ACC
840,185 UART: [kat] ECC-384
3,281,283 UART: [kat] HMAC-384Kdf
3,292,733 UART: [kat] LMS
3,822,249 UART: [kat] --
3,827,449 UART: [cold-reset] ++
3,829,019 UART: [fht] FHT @ 0x50003400
3,838,714 UART: [idev] ++
3,839,277 UART: [idev] CDI.KEYID = 6
3,840,249 UART: [idev] SUBJECT.KEYID = 7
3,841,412 UART: [idev] UDS.KEYID = 0
3,842,419 ready_for_fw is high
3,842,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,325 UART: [idev] Erasing UDS.KEYID = 0
6,318,656 UART: [idev] Sha1 KeyId Algorithm
6,341,395 UART: [idev] --
6,345,224 UART: [ldev] ++
6,345,789 UART: [ldev] CDI.KEYID = 6
6,346,749 UART: [ldev] SUBJECT.KEYID = 5
6,347,901 UART: [ldev] AUTHORITY.KEYID = 7
6,349,182 UART: [ldev] FE.KEYID = 1
6,359,824 UART: [ldev] Erasing FE.KEYID = 1
8,829,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,260 UART: [ldev] --
10,621,103 UART: [fwproc] Wait for Commands...
10,622,762 UART: [fwproc] Recv command 0x46574c44
10,624,856 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,728 >>> mbox cmd response: success
14,484,211 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,488,821 UART: [afmc] ++
14,489,400 UART: [afmc] CDI.KEYID = 6
14,490,306 UART: [afmc] SUBJECT.KEYID = 7
14,491,519 UART: [afmc] AUTHORITY.KEYID = 5
16,995,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,228 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,707 UART: [afmc] --
18,790,134 UART: [cold-reset] --
18,793,187 UART: [state] Locking Datavault
18,797,402 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,038 UART: [state] Locking ICCM
18,800,375 UART: [exit] Launching FMC @ 0x40000130
18,808,820 UART:
18,809,049 UART: Running Caliptra FMC ...
18,810,144 UART:
18,810,299 UART: [state] CFI Enabled
18,818,720 UART: [fht] FMC Alias Private Key: 7
20,575,734 UART: [art] Extend RT PCRs Done
20,576,951 UART: [art] Lock RT PCRs Done
20,578,561 UART: [art] Populate DV Done
20,583,644 UART: [fht] FMC Alias Private Key: 7
20,585,388 UART: [art] Derive CDI
20,586,116 UART: [art] Store in in slot 0x4
20,629,074 UART: [art] Derive Key Pair
20,630,113 UART: [art] Store priv key in slot 0x5
23,056,952 UART: [art] Derive Key Pair - Done
23,070,435 UART: [art] Signing Cert with AUTHO
23,071,742 UART: RITY.KEYID = 7
24,777,835 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,349 UART: [art] PUB.X = A7C4B3027BBDDEEB5694A45426AED3CBE10330D7CCF809861E7BD70D72055904E13DB9FF4A875DA6555A5BB782F16543
24,786,587 UART: [art] PUB.Y = FD5663CC71AA91123E0463FC1F633364E08784F1CEEBFEEB70AF79195027B2FF02FDA94934CA49CC2AAD683D266E5E71
24,793,863 UART: [art] SIG.R = 4858CB898F48CD15BEF8EA1ABB09077F07DB64FCECB097DA24B27CFC964E85D3ABEF6D175B8ED71A19EB70B10F763E93
24,801,292 UART: [art] SIG.S = E420AB36B2AB8D9641DAF3486361CE94FD731472CFE893A5163782F5386E3A247397FF09FAF54C9B590B9CCE3B9D5599
25,779,681 UART: Caliptra RT
25,780,394 UART: [state] CFI Enabled
25,897,765 UART: [rt] RT listening for mailbox commands...
25,929,076 UART: [rt]cmd =0x49444549, len=4
25,931,893 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,059 writing to cptra_bootfsm_go
3,696,340 ready_for_fw is high
3,696,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,409 >>> mbox cmd response: success
14,281,038 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,527,841 UART:
18,528,273 UART: Running Caliptra FMC ...
18,529,370 UART:
18,529,520 UART: [state] CFI Enabled
18,537,524 UART: [fht] FMC Alias Private Key: 7
20,294,332 UART: [art] Extend RT PCRs Done
20,295,562 UART: [art] Lock RT PCRs Done
20,297,186 UART: [art] Populate DV Done
20,302,705 UART: [fht] FMC Alias Private Key: 7
20,304,245 UART: [art] Derive CDI
20,304,996 UART: [art] Store in in slot 0x4
20,347,376 UART: [art] Derive Key Pair
20,348,409 UART: [art] Store priv key in slot 0x5
22,775,201 UART: [art] Derive Key Pair - Done
22,788,146 UART: [art] Signing Cert with AUTHO
22,789,461 UART: RITY.KEYID = 7
24,495,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,648 UART: [art] PUB.X = 1B45039868D618390D2F9AA5DE1F5F489E2C78F90BC48EFE13B723D2839BAF2493152BD9F5188F78E9F80BE5C9D9F318
24,503,885 UART: [art] PUB.Y = 8E304673BC78C616C5656E6B9FE75A9ED8E99CEF89FCC6D5830FBD41EAD6FFE6632BD12FBFA8E1D457B9B78DEAB49640
24,511,187 UART: [art] SIG.R = 7720D52690A62EA6535C85B3F2F179E2D770E29062A581AA38D3DD5F028AC4314579466BD23C436237812AADB8C2DBBE
24,518,572 UART: [art] SIG.S = A28DFDC8EA2251B67D5FD7F2105EA0B4A1F5AA42E97816D4F4C5173C950EA48190AF14BD60CA52C34FE88BC42ABC72F2
25,497,689 UART: Caliptra RT
25,498,384 UART: [state] CFI Enabled
25,614,968 UART: [rt] RT listening for mailbox commands...
25,646,224 UART: [rt]cmd =0x49444549, len=4
25,649,095 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,102 UART:
192,474 UART: Running Caliptra ROM ...
193,612 UART:
193,782 UART: [state] CFI Enabled
266,036 UART: [state] LifecycleState = Unprovisioned
268,452 UART: [state] DebugLocked = No
271,057 UART: [state] WD Timer not started. Device not locked for debugging
275,804 UART: [kat] SHA2-256
465,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,476 UART: [kat] ++
476,953 UART: [kat] sha1
487,540 UART: [kat] SHA2-256
490,539 UART: [kat] SHA2-384
497,021 UART: [kat] SHA2-512-ACC
499,602 UART: [kat] ECC-384
2,947,874 UART: [kat] HMAC-384Kdf
2,972,626 UART: [kat] LMS
3,504,376 UART: [kat] --
3,508,937 UART: [cold-reset] ++
3,510,605 UART: [fht] FHT @ 0x50003400
3,521,160 UART: [idev] ++
3,521,795 UART: [idev] CDI.KEYID = 6
3,522,748 UART: [idev] SUBJECT.KEYID = 7
3,523,983 UART: [idev] UDS.KEYID = 0
3,524,883 ready_for_fw is high
3,525,079 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,075 UART: [idev] Erasing UDS.KEYID = 0
6,027,504 UART: [idev] Sha1 KeyId Algorithm
6,050,089 UART: [idev] --
6,053,921 UART: [ldev] ++
6,054,528 UART: [ldev] CDI.KEYID = 6
6,055,418 UART: [ldev] SUBJECT.KEYID = 5
6,056,632 UART: [ldev] AUTHORITY.KEYID = 7
6,057,808 UART: [ldev] FE.KEYID = 1
6,099,433 UART: [ldev] Erasing FE.KEYID = 1
8,605,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,277 UART: [ldev] --
10,414,807 UART: [fwproc] Wait for Commands...
10,416,841 UART: [fwproc] Recv command 0x46574c44
10,419,141 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,602,049 >>> mbox cmd response: success
14,602,601 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,606,039 UART: [afmc] ++
14,606,745 UART: [afmc] CDI.KEYID = 6
14,607,955 UART: [afmc] SUBJECT.KEYID = 7
14,609,393 UART: [afmc] AUTHORITY.KEYID = 5
17,147,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,923,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,938,758 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,180 UART: [afmc] --
18,966,579 UART: [cold-reset] --
18,968,819 UART: [state] Locking Datavault
18,975,523 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,657 UART: [state] Locking ICCM
18,980,673 UART: [exit] Launching FMC @ 0x40000130
18,989,343 UART:
18,989,595 UART: Running Caliptra FMC ...
18,990,671 UART:
18,990,827 UART: [state] CFI Enabled
19,049,102 UART: [fht] FMC Alias Private Key: 7
20,813,412 UART: [art] Extend RT PCRs Done
20,814,630 UART: [art] Lock RT PCRs Done
20,816,472 UART: [art] Populate DV Done
20,821,882 UART: [fht] FMC Alias Private Key: 7
20,823,417 UART: [art] Derive CDI
20,824,229 UART: [art] Store in in slot 0x4
20,881,680 UART: [art] Derive Key Pair
20,882,713 UART: [art] Store priv key in slot 0x5
23,345,620 UART: [art] Derive Key Pair - Done
23,358,657 UART: [art] Signing Cert with AUTHO
23,359,959 UART: RITY.KEYID = 7
25,071,091 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,600 UART: [art] PUB.X = CEC87ED2C7DCE8E168D6C3BD8EA4EB3DABE3D0E2AD56D5A53B6A30267AFBB89CED27E0709DE39515A8734C5CF260FE18
25,079,916 UART: [art] PUB.Y = 9A691F9F7C89B0A856FD0E87100553B2BB59D82B9B62630270D63BF4E704482D6432754984EF07C72E4462EAA2D3F1A0
25,087,151 UART: [art] SIG.R = 1863965BF97E2B58F1B72A05891C6D9E9B05F2233CEACF1E90375A8293CB2559094AF2F3A36D018DFF516C8E20511215
25,094,583 UART: [art] SIG.S = BE81201B4263352D5C3D584195E82AB776F9863D663669034C73D352ACC74A81DC94940304D557E316DEA484633851B3
26,073,683 UART: Caliptra RT
26,074,383 UART: [state] CFI Enabled
26,237,210 UART: [rt] RT listening for mailbox commands...
26,268,527 UART: [rt]cmd =0x49444549, len=4
26,271,348 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,437,634 ready_for_fw is high
3,438,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,091 >>> mbox cmd response: success
14,742,702 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,043,252 UART:
19,043,636 UART: Running Caliptra FMC ...
19,044,834 UART:
19,045,009 UART: [state] CFI Enabled
19,113,034 UART: [fht] FMC Alias Private Key: 7
20,877,187 UART: [art] Extend RT PCRs Done
20,878,406 UART: [art] Lock RT PCRs Done
20,880,213 UART: [art] Populate DV Done
20,885,676 UART: [fht] FMC Alias Private Key: 7
20,887,267 UART: [art] Derive CDI
20,888,079 UART: [art] Store in in slot 0x4
20,945,699 UART: [art] Derive Key Pair
20,946,739 UART: [art] Store priv key in slot 0x5
23,410,744 UART: [art] Derive Key Pair - Done
23,423,653 UART: [art] Signing Cert with AUTHO
23,424,954 UART: RITY.KEYID = 7
25,136,418 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,932 UART: [art] PUB.X = 3C891FCACFF220DB29BFF24699C6F15497F7FE70C294640FE96899D7DFFAE772F432C37B69CD677D51CE99478D4077E1
25,145,197 UART: [art] PUB.Y = 425F5B885729F764CB98F023452CA9FE3B69E3F5AAC5080B5C31D4A8C841633A76B83BBD6B661AF49568E6AD82F89E17
25,152,405 UART: [art] SIG.R = 906E07CCF87FE678637E81593FADD9E6F43A8723478E2A91A2F79E975E32B54E562A480757827DE5C3279A8C926149DE
25,159,792 UART: [art] SIG.S = CB84391DD52EEE95F2E163F5DA7FBEACB890CAC28DD7A63D4C54C714C88B7981C7247112E9B2B451B4C7F53B69708CC8
26,138,606 UART: Caliptra RT
26,139,294 UART: [state] CFI Enabled
26,303,654 UART: [rt] RT listening for mailbox commands...
26,334,849 UART: [rt]cmd =0x49444549, len=4
26,337,665 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,469 UART:
192,839 UART: Running Caliptra ROM ...
193,987 UART:
603,703 UART: [state] CFI Enabled
616,037 UART: [state] LifecycleState = Unprovisioned
618,418 UART: [state] DebugLocked = No
619,870 UART: [state] WD Timer not started. Device not locked for debugging
624,819 UART: [kat] SHA2-256
814,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,494 UART: [kat] ++
826,098 UART: [kat] sha1
838,185 UART: [kat] SHA2-256
841,192 UART: [kat] SHA2-384
847,557 UART: [kat] SHA2-512-ACC
850,106 UART: [kat] ECC-384
3,290,221 UART: [kat] HMAC-384Kdf
3,303,793 UART: [kat] LMS
3,835,599 UART: [kat] --
3,839,662 UART: [cold-reset] ++
3,841,586 UART: [fht] FHT @ 0x50003400
3,853,850 UART: [idev] ++
3,854,487 UART: [idev] CDI.KEYID = 6
3,855,509 UART: [idev] SUBJECT.KEYID = 7
3,856,673 UART: [idev] UDS.KEYID = 0
3,857,592 ready_for_fw is high
3,857,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,514 UART: [idev] Erasing UDS.KEYID = 0
6,333,320 UART: [idev] Sha1 KeyId Algorithm
6,354,716 UART: [idev] --
6,359,516 UART: [ldev] ++
6,360,187 UART: [ldev] CDI.KEYID = 6
6,361,088 UART: [ldev] SUBJECT.KEYID = 5
6,362,295 UART: [ldev] AUTHORITY.KEYID = 7
6,363,678 UART: [ldev] FE.KEYID = 1
6,373,736 UART: [ldev] Erasing FE.KEYID = 1
8,849,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,021 UART: [ldev] --
10,643,199 UART: [fwproc] Wait for Commands...
10,645,888 UART: [fwproc] Recv command 0x46574c44
10,648,137 UART: [fwproc] Recv'd Img size: 114448 bytes
14,101,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,841,661 >>> mbox cmd response: success
14,842,162 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,845,585 UART: [afmc] ++
14,846,308 UART: [afmc] CDI.KEYID = 6
14,847,493 UART: [afmc] SUBJECT.KEYID = 7
14,848,996 UART: [afmc] AUTHORITY.KEYID = 5
17,351,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,211 UART: [afmc] --
19,149,852 UART: [cold-reset] --
19,153,221 UART: [state] Locking Datavault
19,158,624 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,817 UART: [state] Locking ICCM
19,162,749 UART: [exit] Launching FMC @ 0x40000130
19,171,450 UART:
19,171,690 UART: Running Caliptra FMC ...
19,172,788 UART:
19,172,964 UART: [state] CFI Enabled
19,181,014 UART: [fht] FMC Alias Private Key: 7
20,938,330 UART: [art] Extend RT PCRs Done
20,939,553 UART: [art] Lock RT PCRs Done
20,941,199 UART: [art] Populate DV Done
20,946,769 UART: [fht] FMC Alias Private Key: 7
20,948,295 UART: [art] Derive CDI
20,949,048 UART: [art] Store in in slot 0x4
20,991,581 UART: [art] Derive Key Pair
20,992,579 UART: [art] Store priv key in slot 0x5
23,418,724 UART: [art] Derive Key Pair - Done
23,431,935 UART: [art] Signing Cert with AUTHO
23,433,227 UART: RITY.KEYID = 7
25,138,491 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,994 UART: [art] PUB.X = 4CA1C6927B6E2E221724B09398023A484F8697EE0155804E1FA1D692DA8C4B1192D8B21497BEE9974CC9ADC1661724E2
25,147,233 UART: [art] PUB.Y = A6B90B41CF9B61232D6034E8FB6CA7BD5BFB8EB06F1A2DE5C11B43669781F19347844695022B953AEEEE531353C294FF
25,154,470 UART: [art] SIG.R = 12A420DB2EBD4A46E453956C257242FBEA074935F023D3BEDCF53E90B8D589415A2D47A1A51273281DBF3ACDD070F383
25,161,915 UART: [art] SIG.S = 8EE670BE9233DD079B6BFCBEC86B9D2872FEA7D94FD064E3AF38AC786C0EAB8F1A1D50134920E0113492FDAFDC0029CC
26,140,915 UART: Caliptra RT
26,141,622 UART: [state] CFI Enabled
26,259,975 UART: [rt] RT listening for mailbox commands...
26,291,263 UART: [rt]cmd =0x49444549, len=4
26,294,154 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,755,158 ready_for_fw is high
3,755,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,421 >>> mbox cmd response: success
14,962,108 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,214,452 UART:
19,214,850 UART: Running Caliptra FMC ...
19,215,946 UART:
19,216,090 UART: [state] CFI Enabled
19,224,579 UART: [fht] FMC Alias Private Key: 7
20,981,255 UART: [art] Extend RT PCRs Done
20,982,496 UART: [art] Lock RT PCRs Done
20,983,934 UART: [art] Populate DV Done
20,989,448 UART: [fht] FMC Alias Private Key: 7
20,991,092 UART: [art] Derive CDI
20,991,827 UART: [art] Store in in slot 0x4
21,034,798 UART: [art] Derive Key Pair
21,035,839 UART: [art] Store priv key in slot 0x5
23,462,346 UART: [art] Derive Key Pair - Done
23,475,235 UART: [art] Signing Cert with AUTHO
23,476,532 UART: RITY.KEYID = 7
25,182,570 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,069 UART: [art] PUB.X = 55F59A6B1CDE640F223AA94887CF92D7A11F97AC73E3FBB8E7735CAE207268BFF7109AD5EA1FE392D197570C4747FC9A
25,191,334 UART: [art] PUB.Y = 60B1355FC4F93595D525641C91D800A31DE070FD077627502336D1B7F72487441CE02244D5551137B8F9065F0EF3AAE3
25,198,535 UART: [art] SIG.R = F088A8B6837066E07922A74D1F168C1F7D9F85633C6C2306D5620D2596D64552384069283F24CD3174A260F5E99FF6D3
25,205,970 UART: [art] SIG.S = BD5CFDD5769CC83B3B658CDE27F576120A8A638B63F3EB2D4EA0D3E16258E4ECD286C498161504446184353437EFCCA1
26,184,302 UART: Caliptra RT
26,185,032 UART: [state] CFI Enabled
26,301,884 UART: [rt] RT listening for mailbox commands...
26,333,563 UART: [rt]cmd =0x49444549, len=4
26,336,363 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,227 UART: [kat] SHA2-256
892,165 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
906,968 UART: [kat] LMS
1,475,164 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,443 UART: [fht] Storing FHT @ 0x50003400
1,479,238 UART: [idev] ++
1,479,406 UART: [idev] CDI.KEYID = 6
1,479,766 UART: [idev] SUBJECT.KEYID = 7
1,480,190 UART: [idev] UDS.KEYID = 0
1,480,535 ready_for_fw is high
1,480,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,876 UART: [idev] Erasing UDS.KEYID = 0
1,504,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,056 UART: [idev] --
1,514,183 UART: [ldev] ++
1,514,351 UART: [ldev] CDI.KEYID = 6
1,514,714 UART: [ldev] SUBJECT.KEYID = 5
1,515,140 UART: [ldev] AUTHORITY.KEYID = 7
1,515,603 UART: [ldev] FE.KEYID = 1
1,520,891 UART: [ldev] Erasing FE.KEYID = 1
1,546,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,218 UART: [ldev] --
1,585,673 UART: [fwproc] Waiting for Commands...
1,586,348 UART: [fwproc] Received command 0x46574c44
1,587,139 UART: [fwproc] Received Image of size 114448 bytes
2,885,744 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,715 >>> mbox cmd response: success
3,078,715 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,793 UART: [afmc] ++
3,079,961 UART: [afmc] CDI.KEYID = 6
3,080,323 UART: [afmc] SUBJECT.KEYID = 7
3,080,748 UART: [afmc] AUTHORITY.KEYID = 5
3,115,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,315 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,708 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,398 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,501 UART: [afmc] --
3,159,633 UART: [cold-reset] --
3,160,585 UART: [state] Locking Datavault
3,161,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,240 UART: [state] Locking ICCM
3,162,770 UART: [exit] Launching FMC @ 0x40000130
3,168,099 UART:
3,168,115 UART: Running Caliptra FMC ...
3,168,523 UART:
3,168,577 UART: [state] CFI Enabled
3,179,106 UART: [fht] FMC Alias Private Key: 7
3,286,855 UART: [art] Extend RT PCRs Done
3,287,283 UART: [art] Lock RT PCRs Done
3,288,595 UART: [art] Populate DV Done
3,296,670 UART: [fht] FMC Alias Private Key: 7
3,297,794 UART: [art] Derive CDI
3,298,074 UART: [art] Store in in slot 0x4
3,383,887 UART: [art] Derive Key Pair
3,384,247 UART: [art] Store priv key in slot 0x5
3,397,385 UART: [art] Derive Key Pair - Done
3,411,902 UART: [art] Signing Cert with AUTHO
3,412,382 UART: RITY.KEYID = 7
3,427,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,435 UART: [art] PUB.X = AFAE349063CFC15CB52706D7433DCADD72262B5A7E693B589D79C6A01EBC956705161D0EC2F06081D611B4956115841D
3,435,198 UART: [art] PUB.Y = FC7DB0C768604598814E81E5946ECEF61F5DC5B1F6CAB86199C7BAB8ADDB8BC77388ACAF9DEC811B0F7F02C8D92B3B31
3,442,166 UART: [art] SIG.R = 359AEBC1680673E98CF7AD1E2CDD6A7A577913F5DE581A12AD318A7B9E12F031AF4E625FC1923007468BCBE97233449F
3,448,938 UART: [art] SIG.S = CF66E50CF1AFE2AE124D9EFDDD7054C1F0D928208D9407B804032D9F506CEB79AC1EA2C96410DD1EA066D89B655DD6B6
3,472,733 UART: Caliptra RT
3,472,986 UART: [state] CFI Enabled
3,581,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,791 UART: [rt]cmd =0x49444549, len=4
3,614,095 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,277 ready_for_fw is high
1,362,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,725 >>> mbox cmd response: success
2,929,725 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,991,183 UART:
2,991,199 UART: Running Caliptra FMC ...
2,991,607 UART:
2,991,661 UART: [state] CFI Enabled
3,001,876 UART: [fht] FMC Alias Private Key: 7
3,109,495 UART: [art] Extend RT PCRs Done
3,109,923 UART: [art] Lock RT PCRs Done
3,111,497 UART: [art] Populate DV Done
3,119,914 UART: [fht] FMC Alias Private Key: 7
3,120,936 UART: [art] Derive CDI
3,121,216 UART: [art] Store in in slot 0x4
3,206,673 UART: [art] Derive Key Pair
3,207,033 UART: [art] Store priv key in slot 0x5
3,220,041 UART: [art] Derive Key Pair - Done
3,234,729 UART: [art] Signing Cert with AUTHO
3,235,209 UART: RITY.KEYID = 7
3,250,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,772 UART: [art] PUB.X = 4D843C8F9FC6EF1AE544F6B98BBFADAE270EF4C18259232DC499F835F10D469F2403DA236D98F284C669655A5D9C2E71
3,257,543 UART: [art] PUB.Y = 2180162FC53210A35DD132764491CC4136949CBA763061977B9E31FD9229C40F9A49B8BCDE4C3D277C8CDD32A64B824A
3,264,490 UART: [art] SIG.R = E78107A080857B9ACA2771AE5DDDD25BFBC0FF663AEAD98A774F210DE711F3BE00E288771566E13FA69C58E3D563DFA4
3,271,248 UART: [art] SIG.S = 81B78484DEFF5B3D023C26E583CC4AE7EB525BD00B21185161E44849EE020443B4CAA78544C1179F47AAFCC95AD8348E
3,295,233 UART: Caliptra RT
3,295,486 UART: [state] CFI Enabled
3,403,272 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,020 UART: [rt]cmd =0x49444549, len=4
3,436,402 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
891,236 UART: [kat] SHA2-256
893,174 UART: [kat] SHA2-384
895,905 UART: [kat] SHA2-512-ACC
897,806 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,949 UART: [kat] LMS
1,476,145 UART: [kat] --
1,477,126 UART: [cold-reset] ++
1,477,534 UART: [fht] Storing FHT @ 0x50003400
1,480,471 UART: [idev] ++
1,480,639 UART: [idev] CDI.KEYID = 6
1,480,999 UART: [idev] SUBJECT.KEYID = 7
1,481,423 UART: [idev] UDS.KEYID = 0
1,481,768 ready_for_fw is high
1,481,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,519 UART: [idev] Erasing UDS.KEYID = 0
1,506,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,033 UART: [idev] --
1,516,228 UART: [ldev] ++
1,516,396 UART: [ldev] CDI.KEYID = 6
1,516,759 UART: [ldev] SUBJECT.KEYID = 5
1,517,185 UART: [ldev] AUTHORITY.KEYID = 7
1,517,648 UART: [ldev] FE.KEYID = 1
1,523,134 UART: [ldev] Erasing FE.KEYID = 1
1,548,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,411 UART: [ldev] --
1,587,680 UART: [fwproc] Waiting for Commands...
1,588,423 UART: [fwproc] Received command 0x46574c44
1,589,214 UART: [fwproc] Received Image of size 114448 bytes
2,888,377 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,678 >>> mbox cmd response: success
3,080,678 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,081,860 UART: [afmc] ++
3,082,028 UART: [afmc] CDI.KEYID = 6
3,082,390 UART: [afmc] SUBJECT.KEYID = 7
3,082,815 UART: [afmc] AUTHORITY.KEYID = 5
3,118,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,855 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,545 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,516 UART: [afmc] --
3,162,572 UART: [cold-reset] --
3,163,502 UART: [state] Locking Datavault
3,164,457 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,061 UART: [state] Locking ICCM
3,165,551 UART: [exit] Launching FMC @ 0x40000130
3,170,880 UART:
3,170,896 UART: Running Caliptra FMC ...
3,171,304 UART:
3,171,447 UART: [state] CFI Enabled
3,181,872 UART: [fht] FMC Alias Private Key: 7
3,289,737 UART: [art] Extend RT PCRs Done
3,290,165 UART: [art] Lock RT PCRs Done
3,291,853 UART: [art] Populate DV Done
3,300,106 UART: [fht] FMC Alias Private Key: 7
3,301,076 UART: [art] Derive CDI
3,301,356 UART: [art] Store in in slot 0x4
3,387,065 UART: [art] Derive Key Pair
3,387,425 UART: [art] Store priv key in slot 0x5
3,400,547 UART: [art] Derive Key Pair - Done
3,415,755 UART: [art] Signing Cert with AUTHO
3,416,235 UART: RITY.KEYID = 7
3,431,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,132 UART: [art] PUB.X = 34898B533BD082758C54A7E91DCFC09D420A37089ACB0A6E3B517E0CB4328478DD54C4F9F441F8731E768229E1339E04
3,438,885 UART: [art] PUB.Y = 0EA753EDF941C7AA99FCA7447D81DFE6990B1670DC2AADFF67D2E315C41C207D38AAD537D5D1A4868DCBBA1E1BF402AA
3,445,852 UART: [art] SIG.R = 469301AD07C03253D1B9590A0446411F13CEBCD8F15F1782AD1EE07BF164ABC9CE34774B019271D221696B5C887ADCB7
3,452,611 UART: [art] SIG.S = C2BF92CC5D60756AEA90ED9454B2DA0D448413D3DD0C6D49D0D03D8BA3B0FF8B324FCA01442BEBAD91B0A8807A7E348D
3,476,477 UART: Caliptra RT
3,476,822 UART: [state] CFI Enabled
3,586,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,477 UART: [rt]cmd =0x49444549, len=4
3,618,817 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 ready_for_fw is high
1,362,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,514 >>> mbox cmd response: success
2,929,514 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,990,688 UART:
2,990,704 UART: Running Caliptra FMC ...
2,991,112 UART:
2,991,255 UART: [state] CFI Enabled
3,002,056 UART: [fht] FMC Alias Private Key: 7
3,109,957 UART: [art] Extend RT PCRs Done
3,110,385 UART: [art] Lock RT PCRs Done
3,111,935 UART: [art] Populate DV Done
3,120,300 UART: [fht] FMC Alias Private Key: 7
3,121,286 UART: [art] Derive CDI
3,121,566 UART: [art] Store in in slot 0x4
3,207,295 UART: [art] Derive Key Pair
3,207,655 UART: [art] Store priv key in slot 0x5
3,220,689 UART: [art] Derive Key Pair - Done
3,235,522 UART: [art] Signing Cert with AUTHO
3,236,002 UART: RITY.KEYID = 7
3,251,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,965 UART: [art] PUB.X = 8F7AC48DF77F84277D5BEB74E37C36DBB0AF8EA62CAC9AFCF8581EBC4D46FE95D8B0A54F349EEB6D4604C3FB806A449E
3,258,760 UART: [art] PUB.Y = 9CFEEE260F477209029BB8F6457CBE9E0211C34434AEF006A5D3C95E72C6AE8CCBEF03A76D5CB0F25B8423E863F50918
3,265,701 UART: [art] SIG.R = 4F99F53A513598B502CCE1BC17FC28C09F6FD3B5A816AA73D744EB013BF767708F8C7428B9D4F52DCC793712DF359E69
3,272,473 UART: [art] SIG.S = 8461972E34D444D262F403425713C955AFB220D10E44FDC72806F77654CEBAA7A449BBCAE5335698FC91498552C5FF91
3,296,257 UART: Caliptra RT
3,296,602 UART: [state] CFI Enabled
3,404,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,863 UART: [rt]cmd =0x49444549, len=4
3,437,045 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
893,652 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,777 UART: [kat] ++
897,929 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,240 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 ready_for_fw is high
1,176,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,201,235 UART: [idev] Sha1 KeyId Algorithm
1,209,625 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,046 >>> mbox cmd response: success
2,776,046 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,777,180 UART: [afmc] ++
2,777,348 UART: [afmc] CDI.KEYID = 6
2,777,710 UART: [afmc] SUBJECT.KEYID = 7
2,778,135 UART: [afmc] AUTHORITY.KEYID = 5
2,813,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,065 UART: [afmc] --
2,857,107 UART: [cold-reset] --
2,857,961 UART: [state] Locking Datavault
2,859,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,900 UART: [state] Locking ICCM
2,860,416 UART: [exit] Launching FMC @ 0x40000130
2,865,745 UART:
2,865,761 UART: Running Caliptra FMC ...
2,866,169 UART:
2,866,223 UART: [state] CFI Enabled
2,877,092 UART: [fht] FMC Alias Private Key: 7
2,985,479 UART: [art] Extend RT PCRs Done
2,985,907 UART: [art] Lock RT PCRs Done
2,987,499 UART: [art] Populate DV Done
2,995,652 UART: [fht] FMC Alias Private Key: 7
2,996,792 UART: [art] Derive CDI
2,997,072 UART: [art] Store in in slot 0x4
3,082,771 UART: [art] Derive Key Pair
3,083,131 UART: [art] Store priv key in slot 0x5
3,096,615 UART: [art] Derive Key Pair - Done
3,111,773 UART: [art] Signing Cert with AUTHO
3,112,253 UART: RITY.KEYID = 7
3,127,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,584 UART: [art] PUB.X = DD10EDE3B09432DD6288DC51A58E48C8B331FDD47499897051A6185E94B58349B787F09262F541DB6D8557C46C1E6608
3,135,347 UART: [art] PUB.Y = EEC2AE8EE22FC3AD3126B98ACD39019B2A1BDADBDDABCD8686A50B87B60065027F052BD7EC8078ED851E3A221AAC1A6D
3,142,291 UART: [art] SIG.R = AC5B1E451B0D0EC087E86B04C956277FE4F6972DD45292F7C3A9C121AB81DA1EB0AD4DA72E0F6D360B7000A691FBC795
3,149,038 UART: [art] SIG.S = 77A41E4CDA80993D9FE4CE894B291FCBD15AFBFEF29EAB357E2AB6DA8788A424BC442EFAFD2316F3507D715AE6639501
3,173,292 UART: Caliptra RT
3,173,545 UART: [state] CFI Enabled
3,280,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,288 UART: [rt]cmd =0x49444549, len=4
3,313,616 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 ready_for_fw is high
1,059,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,071 >>> mbox cmd response: success
2,628,071 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,689,729 UART:
2,689,745 UART: Running Caliptra FMC ...
2,690,153 UART:
2,690,207 UART: [state] CFI Enabled
2,700,640 UART: [fht] FMC Alias Private Key: 7
2,808,997 UART: [art] Extend RT PCRs Done
2,809,425 UART: [art] Lock RT PCRs Done
2,810,761 UART: [art] Populate DV Done
2,819,140 UART: [fht] FMC Alias Private Key: 7
2,820,280 UART: [art] Derive CDI
2,820,560 UART: [art] Store in in slot 0x4
2,906,469 UART: [art] Derive Key Pair
2,906,829 UART: [art] Store priv key in slot 0x5
2,920,197 UART: [art] Derive Key Pair - Done
2,934,989 UART: [art] Signing Cert with AUTHO
2,935,469 UART: RITY.KEYID = 7
2,950,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,346 UART: [art] PUB.X = 86A9682762C681DBCFE4DFBAF163C9509442D736BD8C288909968E15626AE969668A6F02815FD2ADA0486FD3C13EBDB4
2,958,116 UART: [art] PUB.Y = F9077A438BF4C55299B1F971F4F267D4932B6A6CC92E67B4459A17763BC6F4E91D87986F09A67E748A4BC0FF12BE54A7
2,965,064 UART: [art] SIG.R = 1E5BAF936A28DDB431283505F8B78EECABC58B5AA9C3D6161322B578B2310C634D93074A103D5FC5C24B885CACF2A80A
2,971,834 UART: [art] SIG.S = 993CD56CD79C683AE7D439C1DD32767DBDFC578F54D15002BB01A682C652E2AD54B86961DA8C007ADE616297CE58A475
2,995,335 UART: Caliptra RT
2,995,588 UART: [state] CFI Enabled
3,104,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,797 UART: [rt]cmd =0x49444549, len=4
3,137,261 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,038 UART: [kat] SHA2-256
903,978 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,447 UART: [idev] ++
1,175,615 UART: [idev] CDI.KEYID = 6
1,175,975 UART: [idev] SUBJECT.KEYID = 7
1,176,399 UART: [idev] UDS.KEYID = 0
1,176,744 ready_for_fw is high
1,176,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,200,732 UART: [idev] Sha1 KeyId Algorithm
1,209,382 UART: [idev] --
1,210,364 UART: [ldev] ++
1,210,532 UART: [ldev] CDI.KEYID = 6
1,210,895 UART: [ldev] SUBJECT.KEYID = 5
1,211,321 UART: [ldev] AUTHORITY.KEYID = 7
1,211,784 UART: [ldev] FE.KEYID = 1
1,217,288 UART: [ldev] Erasing FE.KEYID = 1
1,243,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,830 UART: [ldev] --
1,283,215 UART: [fwproc] Wait for Commands...
1,283,851 UART: [fwproc] Recv command 0x46574c44
1,284,579 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,709 >>> mbox cmd response: success
2,775,709 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,776,755 UART: [afmc] ++
2,776,923 UART: [afmc] CDI.KEYID = 6
2,777,285 UART: [afmc] SUBJECT.KEYID = 7
2,777,710 UART: [afmc] AUTHORITY.KEYID = 5
2,813,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,842 UART: [afmc] --
2,856,834 UART: [cold-reset] --
2,857,794 UART: [state] Locking Datavault
2,858,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,517 UART: [state] Locking ICCM
2,860,043 UART: [exit] Launching FMC @ 0x40000130
2,865,372 UART:
2,865,388 UART: Running Caliptra FMC ...
2,865,796 UART:
2,865,939 UART: [state] CFI Enabled
2,876,322 UART: [fht] FMC Alias Private Key: 7
2,983,681 UART: [art] Extend RT PCRs Done
2,984,109 UART: [art] Lock RT PCRs Done
2,985,751 UART: [art] Populate DV Done
2,994,298 UART: [fht] FMC Alias Private Key: 7
2,995,280 UART: [art] Derive CDI
2,995,560 UART: [art] Store in in slot 0x4
3,081,509 UART: [art] Derive Key Pair
3,081,869 UART: [art] Store priv key in slot 0x5
3,094,695 UART: [art] Derive Key Pair - Done
3,109,682 UART: [art] Signing Cert with AUTHO
3,110,162 UART: RITY.KEYID = 7
3,125,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,371 UART: [art] PUB.X = FC2FEB5904DCF6593112D8EC88E24FD98683A04995CFB96B2A95613A349A4C3EDA8DE26E44C3DD44248F7DAC5F3E666A
3,133,154 UART: [art] PUB.Y = 24CA3F7B2B01E3A81CF994360DD4213B5AEE8B8250CD78404BA79E0ABBC49890DB5C1466DDEB9625BCE6993D53C64BFE
3,140,113 UART: [art] SIG.R = C115D3B4692AC6272E046A1BCC2BFAA0D855F66DCC6CEFB794992F1C33E4AED2ED93A8FF59D3579DDC6999743BF366B1
3,146,900 UART: [art] SIG.S = A742DDD40011A95C1525B5B305C934CF1560F76354895B31AD4104A88AAEA82CCDE36D4ED39B732DE5B468ABA3737D8B
3,169,707 UART: Caliptra RT
3,170,052 UART: [state] CFI Enabled
3,277,842 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,408 UART: [rt]cmd =0x49444549, len=4
3,310,822 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 ready_for_fw is high
1,060,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,384 >>> mbox cmd response: success
2,629,384 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,692,238 UART:
2,692,254 UART: Running Caliptra FMC ...
2,692,662 UART:
2,692,805 UART: [state] CFI Enabled
2,703,282 UART: [fht] FMC Alias Private Key: 7
2,811,533 UART: [art] Extend RT PCRs Done
2,811,961 UART: [art] Lock RT PCRs Done
2,813,253 UART: [art] Populate DV Done
2,821,560 UART: [fht] FMC Alias Private Key: 7
2,822,672 UART: [art] Derive CDI
2,822,952 UART: [art] Store in in slot 0x4
2,908,557 UART: [art] Derive Key Pair
2,908,917 UART: [art] Store priv key in slot 0x5
2,922,149 UART: [art] Derive Key Pair - Done
2,937,336 UART: [art] Signing Cert with AUTHO
2,937,816 UART: RITY.KEYID = 7
2,953,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,011 UART: [art] PUB.X = 8E9A8DA9C82262B5ED04D061568D63688AE4DAC75BEE1E06B53C3DFEF9F6CFBE23C456B9D79E89668624BDEAD87E3276
2,960,793 UART: [art] PUB.Y = 0E878D3933049799F347CB33C28CACC43ADA169CDE724BBB8D91957B3D546F0A04647B3D9136C160E01FA6676D00E2F1
2,967,713 UART: [art] SIG.R = 2C5517AE349120F0A1527A50FB00766A5525A7FFA943048710CEB78B7C9C7F58E7F00848D42AE8F7F3F3C33A9830C00C
2,974,454 UART: [art] SIG.S = AA3FBBFA1E7E0C8866FFF9AFD484F32EEF2267F6409872122701194EA22DDE3FD8E75263E128FF12B0086E119D06F05F
2,998,413 UART: Caliptra RT
2,998,758 UART: [state] CFI Enabled
3,107,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,261 UART: [rt]cmd =0x49444549, len=4
3,140,553 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,855 UART: [idev] Erasing UDS.KEYID = 0
1,198,413 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,860 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,574 >>> mbox cmd response: success
2,773,574 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,774,623 UART: [afmc] ++
2,774,791 UART: [afmc] CDI.KEYID = 6
2,775,154 UART: [afmc] SUBJECT.KEYID = 7
2,775,580 UART: [afmc] AUTHORITY.KEYID = 5
2,810,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,760 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,946 UART: [afmc] --
2,853,862 UART: [cold-reset] --
2,854,854 UART: [state] Locking Datavault
2,855,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,443 UART: [state] Locking ICCM
2,856,889 UART: [exit] Launching FMC @ 0x40000130
2,862,218 UART:
2,862,234 UART: Running Caliptra FMC ...
2,862,642 UART:
2,862,696 UART: [state] CFI Enabled
2,873,343 UART: [fht] FMC Alias Private Key: 7
2,980,894 UART: [art] Extend RT PCRs Done
2,981,322 UART: [art] Lock RT PCRs Done
2,982,728 UART: [art] Populate DV Done
2,990,875 UART: [fht] FMC Alias Private Key: 7
2,992,053 UART: [art] Derive CDI
2,992,333 UART: [art] Store in in slot 0x4
3,078,112 UART: [art] Derive Key Pair
3,078,472 UART: [art] Store priv key in slot 0x5
3,091,340 UART: [art] Derive Key Pair - Done
3,106,083 UART: [art] Signing Cert with AUTHO
3,106,563 UART: RITY.KEYID = 7
3,121,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,258 UART: [art] PUB.X = 9DCDF6E516A326FFC7E2AD9FBC429B6CC798E301ABA856D54F9FD00050542BC01EF66A426F39D626A86D67C62EB6213F
3,129,019 UART: [art] PUB.Y = C2AE55182916B3D8BA999500D9F376214A063B59195EF29321010F7B9B0440C2F369437367094F8E0F937C4A01EC4352
3,135,914 UART: [art] SIG.R = 9CB6AC4923CED7AF294B5F4C156C277F859D02845B046B74C2FBE328D7441375E116578EF59A8934DEF8F7C8A7AA6ACB
3,142,690 UART: [art] SIG.S = 87BDAC6CD6F0C58B86BB9C7AB994097ED9570A3045AB584D152970A810C8991F205ECC4F11B55415D50B6EBCEE96DDF4
3,167,150 UART: Caliptra RT
3,167,403 UART: [state] CFI Enabled
3,275,291 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,917 UART: [rt]cmd =0x49444549, len=4
3,308,477 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,256 ready_for_fw is high
1,056,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,486 >>> mbox cmd response: success
2,624,486 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,640 UART:
2,686,656 UART: Running Caliptra FMC ...
2,687,064 UART:
2,687,118 UART: [state] CFI Enabled
2,697,615 UART: [fht] FMC Alias Private Key: 7
2,805,434 UART: [art] Extend RT PCRs Done
2,805,862 UART: [art] Lock RT PCRs Done
2,807,546 UART: [art] Populate DV Done
2,815,821 UART: [fht] FMC Alias Private Key: 7
2,816,821 UART: [art] Derive CDI
2,817,101 UART: [art] Store in in slot 0x4
2,902,944 UART: [art] Derive Key Pair
2,903,304 UART: [art] Store priv key in slot 0x5
2,916,302 UART: [art] Derive Key Pair - Done
2,931,327 UART: [art] Signing Cert with AUTHO
2,931,807 UART: RITY.KEYID = 7
2,946,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,486 UART: [art] PUB.X = 56313AACFD2BDDE706CB30BFC4D6BF21FA63BABB0AD2A7B023EEF80CFBFA8C4F950B36D0788CE538B9BB942A22AAEA68
2,954,280 UART: [art] PUB.Y = 524E395FEC3B3D18F8471128469F9451F29E3F8187CC5301208483FC5F0030A21C178E0452BDBB68ACFBD9B2D1301A68
2,961,202 UART: [art] SIG.R = 8317F5EC8CD8B25926C486656A53F4E6667E09CB083E11822BEF3A4FD6695D6A935EF62A86832B99430D06F7F4E22B88
2,967,960 UART: [art] SIG.S = CA4110E979BFD9CB488B95D3E6B566D440DD0DB48416B20A45D082BDB727B0A0CC1B6C1E899BFF245FE4F0CC65B1BDF7
2,991,501 UART: Caliptra RT
2,991,754 UART: [state] CFI Enabled
3,100,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,086 UART: [rt]cmd =0x49444549, len=4
3,133,464 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 ready_for_fw is high
1,174,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,276 UART: [idev] --
1,208,445 UART: [ldev] ++
1,208,613 UART: [ldev] CDI.KEYID = 6
1,208,977 UART: [ldev] SUBJECT.KEYID = 5
1,209,404 UART: [ldev] AUTHORITY.KEYID = 7
1,209,867 UART: [ldev] FE.KEYID = 1
1,215,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,241 >>> mbox cmd response: success
2,773,241 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,774,406 UART: [afmc] ++
2,774,574 UART: [afmc] CDI.KEYID = 6
2,774,937 UART: [afmc] SUBJECT.KEYID = 7
2,775,363 UART: [afmc] AUTHORITY.KEYID = 5
2,810,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,707 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,426 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,211 UART: [afmc] --
2,854,267 UART: [cold-reset] --
2,855,223 UART: [state] Locking Datavault
2,856,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,966 UART: [state] Locking ICCM
2,857,636 UART: [exit] Launching FMC @ 0x40000130
2,862,965 UART:
2,862,981 UART: Running Caliptra FMC ...
2,863,389 UART:
2,863,532 UART: [state] CFI Enabled
2,874,389 UART: [fht] FMC Alias Private Key: 7
2,982,330 UART: [art] Extend RT PCRs Done
2,982,758 UART: [art] Lock RT PCRs Done
2,984,528 UART: [art] Populate DV Done
2,992,685 UART: [fht] FMC Alias Private Key: 7
2,993,779 UART: [art] Derive CDI
2,994,059 UART: [art] Store in in slot 0x4
3,079,784 UART: [art] Derive Key Pair
3,080,144 UART: [art] Store priv key in slot 0x5
3,093,638 UART: [art] Derive Key Pair - Done
3,108,998 UART: [art] Signing Cert with AUTHO
3,109,478 UART: RITY.KEYID = 7
3,124,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,495 UART: [art] PUB.X = 453153ABF76F196928DBAD1EC4F5CE47F0E52FB97384A21C994F7F86B2AC073C1B9943493124E84DE81948EADC15E0C5
3,132,270 UART: [art] PUB.Y = 4599A827C0CCB5717EAA2D38663F5C15F4553856EBDE8E83052772CF2125E60A082038FF936E8842BBC74ED622A46AA4
3,139,213 UART: [art] SIG.R = D9864589DD7CD9B2537427B8DF6ECF54D0BC6281D78741F2A53ADC749DA509539A8EC29C7C2852824ACB00E1014BE8E0
3,145,963 UART: [art] SIG.S = 650BA59942FFDFEF6228693F444BC753A3C18E8DA1D56B1A3B2B00D988A3E8F18E196FC3572405D6D57F327C28B764A8
3,170,170 UART: Caliptra RT
3,170,515 UART: [state] CFI Enabled
3,278,428 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,596 UART: [rt]cmd =0x49444549, len=4
3,310,930 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,719 ready_for_fw is high
1,056,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,593 >>> mbox cmd response: success
2,623,593 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,685,029 UART:
2,685,045 UART: Running Caliptra FMC ...
2,685,453 UART:
2,685,596 UART: [state] CFI Enabled
2,696,055 UART: [fht] FMC Alias Private Key: 7
2,804,600 UART: [art] Extend RT PCRs Done
2,805,028 UART: [art] Lock RT PCRs Done
2,806,824 UART: [art] Populate DV Done
2,815,027 UART: [fht] FMC Alias Private Key: 7
2,816,139 UART: [art] Derive CDI
2,816,419 UART: [art] Store in in slot 0x4
2,901,906 UART: [art] Derive Key Pair
2,902,266 UART: [art] Store priv key in slot 0x5
2,915,560 UART: [art] Derive Key Pair - Done
2,930,428 UART: [art] Signing Cert with AUTHO
2,930,908 UART: RITY.KEYID = 7
2,945,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,711 UART: [art] PUB.X = 2EFA75335CE6DF171BC351832CE3E880F75905D1D13DC32CA966B0DFB4420732DFB411D45EE359A20ADAC0FA786B0233
2,953,481 UART: [art] PUB.Y = 98CA374A14AE5621A534EDBDC1068E6C3ECD4491CB9DCA2921CA9196C960298570BB1AA2DD7C1F7D358FC93D98A73AB8
2,960,444 UART: [art] SIG.R = C6E03234C24F6B00F263484CA5A6ADB866E6D3702F6CA9D4BCFCBB457EE4E647F9A274218406C16810CD1966CDE06C79
2,967,199 UART: [art] SIG.S = F0A7D47A9FEBF766ABDDB6F6FC9CF91DE9538B80501B83C12C23CDAE498F8F38E16B1E91D9942FB6671A5A42F524904A
2,991,606 UART: Caliptra RT
2,991,951 UART: [state] CFI Enabled
3,098,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,929 UART: [rt]cmd =0x49444549, len=4
3,131,219 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,051 UART:
192,428 UART: Running Caliptra ROM ...
193,533 UART:
193,698 UART: [state] CFI Enabled
264,635 UART: [state] LifecycleState = Unprovisioned
266,565 UART: [state] DebugLocked = No
268,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,751 UART: [kat] SHA2-256
442,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,989 UART: [kat] ++
453,440 UART: [kat] sha1
464,453 UART: [kat] SHA2-256
467,173 UART: [kat] SHA2-384
471,737 UART: [kat] SHA2-512-ACC
474,102 UART: [kat] ECC-384
2,769,469 UART: [kat] HMAC-384Kdf
2,801,164 UART: [kat] LMS
3,991,427 UART: [kat] --
3,997,005 UART: [cold-reset] ++
3,998,818 UART: [fht] Storing FHT @ 0x50003400
4,009,659 UART: [idev] ++
4,010,225 UART: [idev] CDI.KEYID = 6
4,011,182 UART: [idev] SUBJECT.KEYID = 7
4,012,423 UART: [idev] UDS.KEYID = 0
4,013,380 ready_for_fw is high
4,013,568 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,085 UART: [idev] Erasing UDS.KEYID = 0
7,345,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,071 UART: [idev] --
7,370,530 UART: [ldev] ++
7,371,102 UART: [ldev] CDI.KEYID = 6
7,372,117 UART: [ldev] SUBJECT.KEYID = 5
7,373,271 UART: [ldev] AUTHORITY.KEYID = 7
7,374,552 UART: [ldev] FE.KEYID = 1
7,422,763 UART: [ldev] Erasing FE.KEYID = 1
10,753,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,598 UART: [ldev] --
13,113,046 UART: [fwproc] Waiting for Commands...
13,116,113 UART: [fwproc] Received command 0x46574c44
13,118,341 UART: [fwproc] Received Image of size 114124 bytes
17,169,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,689 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,632,680 >>> mbox cmd response: success
17,636,577 UART: [afmc] ++
17,637,229 UART: [afmc] CDI.KEYID = 6
17,638,145 UART: [afmc] SUBJECT.KEYID = 7
17,639,381 UART: [afmc] AUTHORITY.KEYID = 5
21,006,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,721 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,136 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,956 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,371 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,423 UART: [afmc] --
23,375,722 UART: [cold-reset] --
23,379,364 UART: [state] Locking Datavault
23,383,523 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,221 UART: [state] Locking ICCM
23,386,623 UART: [exit] Launching FMC @ 0x40000130
23,395,024 UART:
23,395,302 UART: Running Caliptra FMC ...
23,396,409 UART:
23,396,593 UART: [state] CFI Enabled
23,463,091 UART: [fht] FMC Alias Private Key: 7
25,801,422 UART: [art] Extend RT PCRs Done
25,802,638 UART: [art] Lock RT PCRs Done
25,804,150 UART: [art] Populate DV Done
25,809,778 UART: [fht] FMC Alias Private Key: 7
25,811,430 UART: [art] Derive CDI
25,812,247 UART: [art] Store in in slot 0x4
25,871,510 UART: [art] Derive Key Pair
25,872,578 UART: [art] Store priv key in slot 0x5
29,165,117 UART: [art] Derive Key Pair - Done
29,178,062 UART: [art] Signing Cert with AUTHO
29,179,364 UART: RITY.KEYID = 7
31,466,796 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,296 UART: [art] PUB.X = B235D3DBB83B4E5932AD4860E901356FE1368DB38E8D2260C360EEE9D282867A32846A1A3F8EFA3D3510434E7D562E37
31,475,578 UART: [art] PUB.Y = C55633A0F3E3359D52FAF866E9845B1AD96D8F65E724871499E7180298F3F3EE55728FD04F2F0DE930A91163ED331AF7
31,482,790 UART: [art] SIG.R = 9C817B68262AA14ADF5519A87D50B0975F4D1582F6D454727300F892BB670BF5E65F14A6163A8F8CF76F1D4C8864F187
31,490,137 UART: [art] SIG.S = 43A95A4CFA7C43BF23596B1C457AD5D146B01CF831DD3350A86FDF8AAD8215F9D2714764CD335B277B55947275327D3C
32,795,245 UART: Caliptra RT
32,795,956 UART: [state] CFI Enabled
32,976,161 UART: [rt] RT listening for mailbox commands...
32,978,089 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,009,065 UART: [rt]cmd =0x44504543, len=136
38,631,621 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,808,500 ready_for_fw is high
3,809,071 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,899,448 >>> mbox cmd response: success
23,592,364 UART:
23,592,765 UART: Running Caliptra FMC ...
23,593,966 UART:
23,594,138 UART: [state] CFI Enabled
23,661,495 UART: [fht] FMC Alias Private Key: 7
25,999,282 UART: [art] Extend RT PCRs Done
26,000,507 UART: [art] Lock RT PCRs Done
26,002,313 UART: [art] Populate DV Done
26,007,800 UART: [fht] FMC Alias Private Key: 7
26,009,361 UART: [art] Derive CDI
26,010,106 UART: [art] Store in in slot 0x4
26,070,128 UART: [art] Derive Key Pair
26,071,171 UART: [art] Store priv key in slot 0x5
29,364,120 UART: [art] Derive Key Pair - Done
29,377,113 UART: [art] Signing Cert with AUTHO
29,378,413 UART: RITY.KEYID = 7
31,666,241 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,770 UART: [art] PUB.X = AFE8800FD68ACFB7F52A6BE26CB61A82FD583DC9BE15C56DC67555CBFB5BFBA3BA1EB5CBE15279EA4BAA1B256BFB0044
31,675,022 UART: [art] PUB.Y = 2B9720F80A48D18B25FA623120B09386B5E326746F7B6BC47D31AC240405F3F686B2524AA1A31BEF2E7DF36183FFAC8E
31,682,317 UART: [art] SIG.R = AFF2B72263372977B5DDE57A620ACD3B82A091A4CA35C5BB950CAD14816A9C0ACC3FEE2EDE07960017BEB132DF7A0A3E
31,689,716 UART: [art] SIG.S = E60A88F60BECE0115F53E80E57B85AFD3290F37980CC05EEBB569257DBDC8A469236432FFD08C470D95EEB47809BC969
32,994,950 UART: Caliptra RT
32,995,661 UART: [state] CFI Enabled
33,156,913 UART: [rt] RT listening for mailbox commands...
33,158,845 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,189,665 UART: [rt]cmd =0x44504543, len=136
38,812,506 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,375 UART:
192,749 UART: Running Caliptra ROM ...
193,832 UART:
603,409 UART: [state] CFI Enabled
616,009 UART: [state] LifecycleState = Unprovisioned
617,913 UART: [state] DebugLocked = No
620,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,884 UART: [kat] SHA2-256
795,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,146 UART: [kat] ++
806,630 UART: [kat] sha1
818,211 UART: [kat] SHA2-256
820,932 UART: [kat] SHA2-384
827,128 UART: [kat] SHA2-512-ACC
829,489 UART: [kat] ECC-384
3,112,894 UART: [kat] HMAC-384Kdf
3,124,932 UART: [kat] LMS
4,315,057 UART: [kat] --
4,319,220 UART: [cold-reset] ++
4,320,161 UART: [fht] Storing FHT @ 0x50003400
4,330,665 UART: [idev] ++
4,331,270 UART: [idev] CDI.KEYID = 6
4,332,183 UART: [idev] SUBJECT.KEYID = 7
4,333,425 UART: [idev] UDS.KEYID = 0
4,334,400 ready_for_fw is high
4,334,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,871 UART: [idev] Erasing UDS.KEYID = 0
7,621,731 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,898 UART: [idev] --
7,646,894 UART: [ldev] ++
7,647,466 UART: [ldev] CDI.KEYID = 6
7,648,446 UART: [ldev] SUBJECT.KEYID = 5
7,649,651 UART: [ldev] AUTHORITY.KEYID = 7
7,650,928 UART: [ldev] FE.KEYID = 1
7,661,569 UART: [ldev] Erasing FE.KEYID = 1
10,948,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,849 UART: [ldev] --
13,306,850 UART: [fwproc] Waiting for Commands...
13,309,811 UART: [fwproc] Received command 0x46574c44
13,311,986 UART: [fwproc] Received Image of size 114124 bytes
17,365,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,542 >>> mbox cmd response: success
17,838,189 UART: [afmc] ++
17,838,787 UART: [afmc] CDI.KEYID = 6
17,839,749 UART: [afmc] SUBJECT.KEYID = 7
17,840,957 UART: [afmc] AUTHORITY.KEYID = 5
21,154,206 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,515 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,765 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,171 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,995 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,407 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,564 UART: [afmc] --
23,520,879 UART: [cold-reset] --
23,523,606 UART: [state] Locking Datavault
23,530,245 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,016 UART: [state] Locking ICCM
23,533,212 UART: [exit] Launching FMC @ 0x40000130
23,541,557 UART:
23,541,787 UART: Running Caliptra FMC ...
23,542,883 UART:
23,543,037 UART: [state] CFI Enabled
23,551,077 UART: [fht] FMC Alias Private Key: 7
25,881,808 UART: [art] Extend RT PCRs Done
25,883,031 UART: [art] Lock RT PCRs Done
25,884,704 UART: [art] Populate DV Done
25,890,272 UART: [fht] FMC Alias Private Key: 7
25,891,974 UART: [art] Derive CDI
25,892,705 UART: [art] Store in in slot 0x4
25,935,247 UART: [art] Derive Key Pair
25,936,285 UART: [art] Store priv key in slot 0x5
29,178,132 UART: [art] Derive Key Pair - Done
29,191,125 UART: [art] Signing Cert with AUTHO
29,192,447 UART: RITY.KEYID = 7
31,471,472 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,973 UART: [art] PUB.X = 2572CF5BAF43B7A710009EA59B5140F99639102B4E577249EB497B537AFB512678577E26744951F7F189AD1E7C4F44E3
31,480,195 UART: [art] PUB.Y = 67D4E93D5AB4BA138D9A660DD15A8693D58E17C4A55F68C913734F19F7B3A994B63A964ABF88F09D1F5328229B77821E
31,487,461 UART: [art] SIG.R = 84AC1EF192B782EB02EAF95A8359DD204C914A663040250AC0B3B13EB6E3C52ABFC3ABB337F0C54632DD871CA030E4F2
31,494,900 UART: [art] SIG.S = 317598F240AAF44CE80FE05352D4918B1645AC81C46DCCD9872817E4B8D18FAD535FF16C188DE5CDD42A5A47FFEFF5A3
32,800,111 UART: Caliptra RT
32,800,811 UART: [state] CFI Enabled
32,919,287 UART: [rt] RT listening for mailbox commands...
32,921,204 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,952,222 UART: [rt]cmd =0x44504543, len=136
38,512,253 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
4,127,097 ready_for_fw is high
4,127,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,277 >>> mbox cmd response: success
23,716,304 UART:
23,716,688 UART: Running Caliptra FMC ...
23,717,889 UART:
23,718,052 UART: [state] CFI Enabled
23,725,993 UART: [fht] FMC Alias Private Key: 7
26,057,136 UART: [art] Extend RT PCRs Done
26,058,371 UART: [art] Lock RT PCRs Done
26,060,112 UART: [art] Populate DV Done
26,065,506 UART: [fht] FMC Alias Private Key: 7
26,067,155 UART: [art] Derive CDI
26,067,984 UART: [art] Store in in slot 0x4
26,110,368 UART: [art] Derive Key Pair
26,111,368 UART: [art] Store priv key in slot 0x5
29,353,664 UART: [art] Derive Key Pair - Done
29,366,613 UART: [art] Signing Cert with AUTHO
29,367,920 UART: RITY.KEYID = 7
31,647,767 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,268 UART: [art] PUB.X = ABA05297D5597963880FF4D9847B492619870B41A37111588F6881B848441C971ABB2C1CE82D1F96ED73AEED83AE81F2
31,656,504 UART: [art] PUB.Y = 90701A66AC666289411F11276ABF73E006CE06A7864A47E9E81DBA7058AFA2291C973C9684F73D737DA0E48B7CBBB19F
31,663,867 UART: [art] SIG.R = EE0FD716DAD9B28421524BA4E95995F808A3F196A4686F6085244D59C3D50C94424B73AD8E3D6C7FBEDFAC3C5D4ABE16
31,671,160 UART: [art] SIG.S = 502B22D3520AF29A40AAB49300C1BFD4EBBE30E14C01262E87C897ACA2CEF625FAAF6E4F19069293A5E848B8CA8E9249
32,976,320 UART: Caliptra RT
32,977,037 UART: [state] CFI Enabled
33,093,999 UART: [rt] RT listening for mailbox commands...
33,095,928 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,126,751 UART: [rt]cmd =0x44504543, len=136
38,686,467 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,062 UART:
192,437 UART: Running Caliptra ROM ...
193,629 UART:
193,782 UART: [state] CFI Enabled
264,366 UART: [state] LifecycleState = Unprovisioned
266,274 UART: [state] DebugLocked = No
268,389 UART: [state] WD Timer not started. Device not locked for debugging
271,713 UART: [kat] SHA2-256
450,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,371 UART: [kat] ++
462,901 UART: [kat] sha1
473,190 UART: [kat] SHA2-256
476,196 UART: [kat] SHA2-384
481,474 UART: [kat] SHA2-512-ACC
484,406 UART: [kat] ECC-384
2,950,655 UART: [kat] HMAC-384Kdf
2,973,555 UART: [kat] LMS
3,502,960 UART: [kat] --
3,508,522 UART: [cold-reset] ++
3,510,602 UART: [fht] FHT @ 0x50003400
3,522,075 UART: [idev] ++
3,522,638 UART: [idev] CDI.KEYID = 6
3,523,569 UART: [idev] SUBJECT.KEYID = 7
3,524,742 UART: [idev] UDS.KEYID = 0
3,525,791 ready_for_fw is high
3,526,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,056 UART: [idev] Erasing UDS.KEYID = 0
6,030,512 UART: [idev] Sha1 KeyId Algorithm
6,054,007 UART: [idev] --
6,058,324 UART: [ldev] ++
6,058,901 UART: [ldev] CDI.KEYID = 6
6,059,789 UART: [ldev] SUBJECT.KEYID = 5
6,061,000 UART: [ldev] AUTHORITY.KEYID = 7
6,062,235 UART: [ldev] FE.KEYID = 1
6,101,292 UART: [ldev] Erasing FE.KEYID = 1
8,607,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,643 UART: [ldev] --
10,415,716 UART: [fwproc] Wait for Commands...
10,417,213 UART: [fwproc] Recv command 0x46574c44
10,419,303 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,089 >>> mbox cmd response: success
14,289,539 UART: [afmc] ++
14,290,173 UART: [afmc] CDI.KEYID = 6
14,291,096 UART: [afmc] SUBJECT.KEYID = 7
14,292,203 UART: [afmc] AUTHORITY.KEYID = 5
16,830,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,035 UART: [afmc] --
18,631,185 UART: [cold-reset] --
18,633,425 UART: [state] Locking Datavault
18,638,887 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,580 UART: [state] Locking ICCM
18,643,276 UART: [exit] Launching FMC @ 0x40000130
18,651,672 UART:
18,651,914 UART: Running Caliptra FMC ...
18,653,013 UART:
18,653,182 UART: [state] CFI Enabled
18,714,663 UART: [fht] FMC Alias Private Key: 7
20,479,084 UART: [art] Extend RT PCRs Done
20,480,298 UART: [art] Lock RT PCRs Done
20,481,595 UART: [art] Populate DV Done
20,487,003 UART: [fht] FMC Alias Private Key: 7
20,488,545 UART: [art] Derive CDI
20,489,282 UART: [art] Store in in slot 0x4
20,547,456 UART: [art] Derive Key Pair
20,548,490 UART: [art] Store priv key in slot 0x5
23,011,668 UART: [art] Derive Key Pair - Done
23,024,561 UART: [art] Signing Cert with AUTHO
23,025,856 UART: RITY.KEYID = 7
24,737,517 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,992 UART: [art] PUB.X = DCC28BC3CE0FACCF528980C5AA9B145393450CA5118C1D45708634835F5FAAAF86035F5CF42EEC3864FEF072A49FD24A
24,746,340 UART: [art] PUB.Y = ABE59D46BEC66F2F4BC72BFF356ACC3845E47F930E69CAE815D6E81AE004C256D6A976984E2DEE0BC6BD386F94E9CFE3
24,753,627 UART: [art] SIG.R = 47F72CF993F9F072987A20517C70A3757C2016A3DB05E34565DF86CA39E628C7856244E04F520B2CDDC23BE59F573265
24,760,959 UART: [art] SIG.S = 4EF74DD20047B04D087399A41A949DE8BEA937DDC47710DA58719C0C33EE77F1F99A133651EED5DBD099F7FF5934977C
25,739,486 UART: Caliptra RT
25,740,209 UART: [state] CFI Enabled
25,905,739 UART: [rt] RT listening for mailbox commands...
25,907,665 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,938,994 UART: [rt]cmd =0x44504543, len=136
30,156,550 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,360,051 ready_for_fw is high
3,360,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,168 >>> mbox cmd response: success
18,326,344 UART:
18,326,723 UART: Running Caliptra FMC ...
18,327,919 UART:
18,328,086 UART: [state] CFI Enabled
18,393,386 UART: [fht] FMC Alias Private Key: 7
20,156,683 UART: [art] Extend RT PCRs Done
20,157,894 UART: [art] Lock RT PCRs Done
20,159,270 UART: [art] Populate DV Done
20,164,518 UART: [fht] FMC Alias Private Key: 7
20,166,124 UART: [art] Derive CDI
20,166,941 UART: [art] Store in in slot 0x4
20,225,830 UART: [art] Derive Key Pair
20,226,875 UART: [art] Store priv key in slot 0x5
22,689,813 UART: [art] Derive Key Pair - Done
22,702,924 UART: [art] Signing Cert with AUTHO
22,704,234 UART: RITY.KEYID = 7
24,416,148 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,631 UART: [art] PUB.X = 1A1F3A673B527021C2EEAB0E8ADA04EB3378286544758FD138A2A872FBAC9D45B108BA0AFCF4D90A2001C0799AA541FD
24,424,942 UART: [art] PUB.Y = 566C2B6E5BA5983320B9F87C2A566AF023FB8EE71A6C12C70D92BD712A6FA65896601B3B5F6B111ABC237DAE1A424343
24,432,207 UART: [art] SIG.R = A25C1535ED9EDD381F5083A4EDC2D568A23516DF693B45D7E247139D79CCC3BDCD8FC703EE22E89B800069CCD51E486C
24,439,634 UART: [art] SIG.S = F6EB3C9B7DFD48AD513184EE519DEB176DD4379B043EB78A241EA24A3F1A7D2FEB43505AE9102363D9C8212D39DF35DB
25,418,320 UART: Caliptra RT
25,419,034 UART: [state] CFI Enabled
25,583,309 UART: [rt] RT listening for mailbox commands...
25,585,230 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,616,540 UART: [rt]cmd =0x44504543, len=136
29,834,767 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,271 UART:
192,647 UART: Running Caliptra ROM ...
193,772 UART:
603,253 UART: [state] CFI Enabled
616,718 UART: [state] LifecycleState = Unprovisioned
618,525 UART: [state] DebugLocked = No
619,905 UART: [state] WD Timer not started. Device not locked for debugging
623,643 UART: [kat] SHA2-256
802,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,385 UART: [kat] ++
814,827 UART: [kat] sha1
825,121 UART: [kat] SHA2-256
828,122 UART: [kat] SHA2-384
835,308 UART: [kat] SHA2-512-ACC
838,262 UART: [kat] ECC-384
3,279,198 UART: [kat] HMAC-384Kdf
3,290,607 UART: [kat] LMS
3,820,111 UART: [kat] --
3,824,664 UART: [cold-reset] ++
3,825,523 UART: [fht] FHT @ 0x50003400
3,837,363 UART: [idev] ++
3,837,925 UART: [idev] CDI.KEYID = 6
3,838,831 UART: [idev] SUBJECT.KEYID = 7
3,839,998 UART: [idev] UDS.KEYID = 0
3,840,966 ready_for_fw is high
3,841,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,000 UART: [idev] Erasing UDS.KEYID = 0
6,311,352 UART: [idev] Sha1 KeyId Algorithm
6,334,791 UART: [idev] --
6,338,663 UART: [ldev] ++
6,339,229 UART: [ldev] CDI.KEYID = 6
6,340,130 UART: [ldev] SUBJECT.KEYID = 5
6,341,334 UART: [ldev] AUTHORITY.KEYID = 7
6,342,555 UART: [ldev] FE.KEYID = 1
6,354,323 UART: [ldev] Erasing FE.KEYID = 1
8,828,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,368 UART: [ldev] --
10,619,888 UART: [fwproc] Wait for Commands...
10,622,347 UART: [fwproc] Recv command 0x46574c44
10,624,428 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,188 >>> mbox cmd response: success
14,485,624 UART: [afmc] ++
14,486,208 UART: [afmc] CDI.KEYID = 6
14,487,109 UART: [afmc] SUBJECT.KEYID = 7
14,488,313 UART: [afmc] AUTHORITY.KEYID = 5
16,986,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,165 UART: [afmc] --
18,783,095 UART: [cold-reset] --
18,786,842 UART: [state] Locking Datavault
18,791,714 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,358 UART: [state] Locking ICCM
18,795,097 UART: [exit] Launching FMC @ 0x40000130
18,803,535 UART:
18,803,773 UART: Running Caliptra FMC ...
18,804,799 UART:
18,804,939 UART: [state] CFI Enabled
18,812,782 UART: [fht] FMC Alias Private Key: 7
20,569,235 UART: [art] Extend RT PCRs Done
20,570,452 UART: [art] Lock RT PCRs Done
20,571,778 UART: [art] Populate DV Done
20,577,621 UART: [fht] FMC Alias Private Key: 7
20,579,155 UART: [art] Derive CDI
20,579,881 UART: [art] Store in in slot 0x4
20,623,059 UART: [art] Derive Key Pair
20,624,097 UART: [art] Store priv key in slot 0x5
23,051,067 UART: [art] Derive Key Pair - Done
23,064,170 UART: [art] Signing Cert with AUTHO
23,065,468 UART: RITY.KEYID = 7
24,771,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,600 UART: [art] PUB.X = 6763584392E0A7D2B998FED39D36F0ABA3CA252EE2839FCF6B2CC5787C9AF5FB03BB1C98F304F74F4B360062F2A0D315
24,779,877 UART: [art] PUB.Y = F6DF0042B3008BFC326D060F8BB9142DAB266AAD9BA3D1F360D69B230D71E15C9A099A637F1F6FF42B91C15550847B2D
24,787,086 UART: [art] SIG.R = BAED8817CBCEB0294CAA55F6C0E1AF17E1DF62C42CDC391A2580D4DF1D0004732F4F6AD8CF2911398444703060F2CCA8
24,794,489 UART: [art] SIG.S = 8CD3391C8E1C2211813606F44B1F6CE74B80022F19E52709D77A9B55F28876A1838D79F877A4B8F21FAC9FAC87D37647
25,772,986 UART: Caliptra RT
25,773,682 UART: [state] CFI Enabled
25,889,558 UART: [rt] RT listening for mailbox commands...
25,891,484 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,922,405 UART: [rt]cmd =0x44504543, len=136
30,092,274 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,695,712 ready_for_fw is high
3,696,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,355 >>> mbox cmd response: success
18,514,738 UART:
18,515,141 UART: Running Caliptra FMC ...
18,516,255 UART:
18,516,401 UART: [state] CFI Enabled
18,524,728 UART: [fht] FMC Alias Private Key: 7
20,281,931 UART: [art] Extend RT PCRs Done
20,283,153 UART: [art] Lock RT PCRs Done
20,284,912 UART: [art] Populate DV Done
20,290,272 UART: [fht] FMC Alias Private Key: 7
20,291,874 UART: [art] Derive CDI
20,292,606 UART: [art] Store in in slot 0x4
20,334,931 UART: [art] Derive Key Pair
20,335,928 UART: [art] Store priv key in slot 0x5
22,762,218 UART: [art] Derive Key Pair - Done
22,775,270 UART: [art] Signing Cert with AUTHO
22,776,596 UART: RITY.KEYID = 7
24,481,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,128 UART: [art] PUB.X = EB26BFC8610EC0DF19D79ABB29625070B99E9199DC4B81BE679E0175F723A4A5B7B0C41D8395FC011C94E52D6EEEA12A
24,490,413 UART: [art] PUB.Y = 6222C6087FCB111B89556271A8EF310EB9A8FB340F23DC6E29EFE1C4E73A22C583EA3C38765CB1FEBA945F83A82EB86C
24,497,701 UART: [art] SIG.R = 3A495E762B18ABEE102D49B6543BD9DDA77CCB2F06D939D83C08FDA1E8CC4A1236B862BB0E81EC1548E86F4FB26A4C1E
24,505,083 UART: [art] SIG.S = 5AB8B3E8C9F1B3CF930EAB88150C79314F7BBCE0B6CCEDA4AED369443617AA5F90CED385889C1743C3C7C36D73E90CF2
25,484,262 UART: Caliptra RT
25,484,963 UART: [state] CFI Enabled
25,602,469 UART: [rt] RT listening for mailbox commands...
25,604,425 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,635,300 UART: [rt]cmd =0x44504543, len=136
29,805,321 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
191,992 UART:
192,348 UART: Running Caliptra ROM ...
193,452 UART:
193,592 UART: [state] CFI Enabled
265,437 UART: [state] LifecycleState = Unprovisioned
267,845 UART: [state] DebugLocked = No
269,720 UART: [state] WD Timer not started. Device not locked for debugging
275,030 UART: [kat] SHA2-256
464,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,732 UART: [kat] ++
476,254 UART: [kat] sha1
487,918 UART: [kat] SHA2-256
490,932 UART: [kat] SHA2-384
496,706 UART: [kat] SHA2-512-ACC
499,355 UART: [kat] ECC-384
2,947,204 UART: [kat] HMAC-384Kdf
2,971,163 UART: [kat] LMS
3,502,957 UART: [kat] --
3,507,192 UART: [cold-reset] ++
3,509,689 UART: [fht] FHT @ 0x50003400
3,521,091 UART: [idev] ++
3,521,736 UART: [idev] CDI.KEYID = 6
3,522,730 UART: [idev] SUBJECT.KEYID = 7
3,523,906 UART: [idev] UDS.KEYID = 0
3,524,835 ready_for_fw is high
3,525,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,005 UART: [idev] Erasing UDS.KEYID = 0
6,027,598 UART: [idev] Sha1 KeyId Algorithm
6,049,953 UART: [idev] --
6,055,920 UART: [ldev] ++
6,056,609 UART: [ldev] CDI.KEYID = 6
6,057,691 UART: [ldev] SUBJECT.KEYID = 5
6,058,802 UART: [ldev] AUTHORITY.KEYID = 7
6,059,980 UART: [ldev] FE.KEYID = 1
6,100,734 UART: [ldev] Erasing FE.KEYID = 1
8,607,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,134 UART: [ldev] --
10,413,801 UART: [fwproc] Wait for Commands...
10,415,319 UART: [fwproc] Recv command 0x46574c44
10,417,571 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,609,424 >>> mbox cmd response: success
14,613,689 UART: [afmc] ++
14,614,398 UART: [afmc] CDI.KEYID = 6
14,615,591 UART: [afmc] SUBJECT.KEYID = 7
14,617,023 UART: [afmc] AUTHORITY.KEYID = 5
17,150,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,801 UART: [afmc] --
18,949,809 UART: [cold-reset] --
18,955,028 UART: [state] Locking Datavault
18,959,537 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,729 UART: [state] Locking ICCM
18,964,081 UART: [exit] Launching FMC @ 0x40000130
18,972,749 UART:
18,972,984 UART: Running Caliptra FMC ...
18,974,080 UART:
18,974,240 UART: [state] CFI Enabled
19,030,160 UART: [fht] FMC Alias Private Key: 7
20,793,580 UART: [art] Extend RT PCRs Done
20,794,795 UART: [art] Lock RT PCRs Done
20,796,176 UART: [art] Populate DV Done
20,801,531 UART: [fht] FMC Alias Private Key: 7
20,803,068 UART: [art] Derive CDI
20,803,823 UART: [art] Store in in slot 0x4
20,863,460 UART: [art] Derive Key Pair
20,864,494 UART: [art] Store priv key in slot 0x5
23,327,190 UART: [art] Derive Key Pair - Done
23,339,852 UART: [art] Signing Cert with AUTHO
23,341,154 UART: RITY.KEYID = 7
25,052,828 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,334 UART: [art] PUB.X = 0D61E42423683B32B5F8B207365B13ED4F04368EB5E389C4CEE7DCDB287157600D56C9524C68F349F8606AA5B03B2AF3
25,061,588 UART: [art] PUB.Y = 2F3EE09C2239331B9F1E28BEBBDAE1AA37BDC981138C167AEEA3C951748E24565691715A47BC07E9C6886CAA9533CEBD
25,068,872 UART: [art] SIG.R = 9DB9FED4B3490E026AFE5103251FE4014EAC14C860FF11C2A4D5BE65EF7BEE0820DD5AC9493F4A7C10D0C2DE8F0905AC
25,076,256 UART: [art] SIG.S = 498A39A39B19A0815BADA26A111BDE158DB9E7E6320B70B3C1C457546D94D1086E0C945577E414F5318094B00CCE064C
26,055,226 UART: Caliptra RT
26,055,935 UART: [state] CFI Enabled
26,219,392 UART: [rt] RT listening for mailbox commands...
26,221,318 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,252,933 UART: [rt]cmd =0x44504543, len=136
30,470,393 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,440,261 ready_for_fw is high
3,440,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,929 >>> mbox cmd response: success
19,046,031 UART:
19,046,440 UART: Running Caliptra FMC ...
19,047,642 UART:
19,047,819 UART: [state] CFI Enabled
19,116,148 UART: [fht] FMC Alias Private Key: 7
20,880,509 UART: [art] Extend RT PCRs Done
20,881,730 UART: [art] Lock RT PCRs Done
20,883,410 UART: [art] Populate DV Done
20,888,824 UART: [fht] FMC Alias Private Key: 7
20,890,316 UART: [art] Derive CDI
20,891,081 UART: [art] Store in in slot 0x4
20,949,698 UART: [art] Derive Key Pair
20,950,736 UART: [art] Store priv key in slot 0x5
23,413,712 UART: [art] Derive Key Pair - Done
23,426,875 UART: [art] Signing Cert with AUTHO
23,428,188 UART: RITY.KEYID = 7
25,139,591 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,110 UART: [art] PUB.X = 1A496168892D6A5666CA71DE343F4F2143E235ED6A38B4D8C75AC9027EE1FA6759386BCAF3CDCC89BF833C5463165329
25,148,310 UART: [art] PUB.Y = FA5D173697718157AC19A22010B31A1425EABA32825E63B644A890906895732C443158AE4EFF9F3B83F0A45EE59CEB04
25,155,556 UART: [art] SIG.R = D18B4C0222F05856CE502B18C04BDFCF90850059DB44C00521C41FA9F56213457E07BAF8D87926BC29ABBF270E1B921C
25,162,940 UART: [art] SIG.S = AAD69F71D6103B149BF3CED3EA8C7579197D2FD421E259307CDD77D85FB8B6FE38926B0A940BF518813503690751A29C
26,142,095 UART: Caliptra RT
26,142,804 UART: [state] CFI Enabled
26,308,331 UART: [rt] RT listening for mailbox commands...
26,310,263 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,341,780 UART: [rt]cmd =0x44504543, len=136
30,558,283 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,433 UART:
192,798 UART: Running Caliptra ROM ...
194,084 UART:
603,480 UART: [state] CFI Enabled
615,570 UART: [state] LifecycleState = Unprovisioned
617,934 UART: [state] DebugLocked = No
620,521 UART: [state] WD Timer not started. Device not locked for debugging
624,547 UART: [kat] SHA2-256
814,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,201 UART: [kat] ++
825,744 UART: [kat] sha1
837,106 UART: [kat] SHA2-256
840,176 UART: [kat] SHA2-384
845,869 UART: [kat] SHA2-512-ACC
848,467 UART: [kat] ECC-384
3,290,813 UART: [kat] HMAC-384Kdf
3,303,335 UART: [kat] LMS
3,835,122 UART: [kat] --
3,840,178 UART: [cold-reset] ++
3,842,594 UART: [fht] FHT @ 0x50003400
3,853,554 UART: [idev] ++
3,854,261 UART: [idev] CDI.KEYID = 6
3,855,232 UART: [idev] SUBJECT.KEYID = 7
3,856,388 UART: [idev] UDS.KEYID = 0
3,857,373 ready_for_fw is high
3,857,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,288 UART: [idev] Erasing UDS.KEYID = 0
6,336,414 UART: [idev] Sha1 KeyId Algorithm
6,359,456 UART: [idev] --
6,363,681 UART: [ldev] ++
6,364,385 UART: [ldev] CDI.KEYID = 6
6,365,294 UART: [ldev] SUBJECT.KEYID = 5
6,366,445 UART: [ldev] AUTHORITY.KEYID = 7
6,367,669 UART: [ldev] FE.KEYID = 1
6,378,301 UART: [ldev] Erasing FE.KEYID = 1
8,855,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,138 UART: [ldev] --
10,648,090 UART: [fwproc] Wait for Commands...
10,651,309 UART: [fwproc] Recv command 0x46574c44
10,653,552 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,837,701 >>> mbox cmd response: success
14,842,665 UART: [afmc] ++
14,843,363 UART: [afmc] CDI.KEYID = 6
14,844,543 UART: [afmc] SUBJECT.KEYID = 7
14,846,024 UART: [afmc] AUTHORITY.KEYID = 5
17,347,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,569 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,916 UART: [afmc] --
19,143,731 UART: [cold-reset] --
19,146,555 UART: [state] Locking Datavault
19,150,684 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,845 UART: [state] Locking ICCM
19,155,697 UART: [exit] Launching FMC @ 0x40000130
19,164,380 UART:
19,164,611 UART: Running Caliptra FMC ...
19,165,703 UART:
19,165,853 UART: [state] CFI Enabled
19,173,999 UART: [fht] FMC Alias Private Key: 7
20,931,310 UART: [art] Extend RT PCRs Done
20,932,525 UART: [art] Lock RT PCRs Done
20,934,218 UART: [art] Populate DV Done
20,939,886 UART: [fht] FMC Alias Private Key: 7
20,941,533 UART: [art] Derive CDI
20,942,258 UART: [art] Store in in slot 0x4
20,984,687 UART: [art] Derive Key Pair
20,985,714 UART: [art] Store priv key in slot 0x5
23,412,714 UART: [art] Derive Key Pair - Done
23,426,155 UART: [art] Signing Cert with AUTHO
23,427,448 UART: RITY.KEYID = 7
25,132,978 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,478 UART: [art] PUB.X = 5490062F454B8FA8F8B3800CCC90D95D451A713CEB1A8C0DC490A58CDD6094C7A9F5222179A472D93FE9362E93ADB7B9
25,141,758 UART: [art] PUB.Y = 296591D6F3D217A6EF7C52737A17449E46A267598F647F35FD473A54A993CE126C996A3B8303E03917B772F6B9459B24
25,148,994 UART: [art] SIG.R = E2EC0843D8614CB35715BA39AC57609749B000982F46DEA3D79B62272C32D650F9053A622AE83669F86BAD721B41312B
25,156,329 UART: [art] SIG.S = 4291ED646B0426703496A92FDA9E750922D3AE41BAFDDB2878D19062B12C5DAA967962FB2810FAE419417125D5105E4A
26,135,581 UART: Caliptra RT
26,136,286 UART: [state] CFI Enabled
26,254,101 UART: [rt] RT listening for mailbox commands...
26,256,012 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,286,868 UART: [rt]cmd =0x44504543, len=136
30,456,468 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,755,469 ready_for_fw is high
3,755,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,964,793 >>> mbox cmd response: success
19,220,324 UART:
19,220,709 UART: Running Caliptra FMC ...
19,221,803 UART:
19,221,952 UART: [state] CFI Enabled
19,229,936 UART: [fht] FMC Alias Private Key: 7
20,986,358 UART: [art] Extend RT PCRs Done
20,987,600 UART: [art] Lock RT PCRs Done
20,989,464 UART: [art] Populate DV Done
20,995,093 UART: [fht] FMC Alias Private Key: 7
20,996,852 UART: [art] Derive CDI
20,997,662 UART: [art] Store in in slot 0x4
21,039,948 UART: [art] Derive Key Pair
21,041,004 UART: [art] Store priv key in slot 0x5
23,468,284 UART: [art] Derive Key Pair - Done
23,481,201 UART: [art] Signing Cert with AUTHO
23,482,497 UART: RITY.KEYID = 7
25,187,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,307 UART: [art] PUB.X = BAFB4525DFDFBC4303CC4131B4F7C6E9470D9D3B1B850D00CDC8169922CED5B1C3E5EFD0610A350E6521F8D9678FDF1B
25,196,539 UART: [art] PUB.Y = 34B3DFAC5D70C10D4F922FAFB5AC04D2B532C92FE2AC94048E51753049BFE9AAD4ADEBCA55CFBA9FAEB2D0F6F101AF4C
25,203,819 UART: [art] SIG.R = 4266098F0403B7DDB6DD1DE1BDAE7BD2D5C11AFF27D23342D86307367E89B2260EAA18CD2ADE9224C4A49D05E473F283
25,211,222 UART: [art] SIG.S = 7DFACC1CCAF4A1B288E92507488595E8F91B8B6268F2F7A52620931886CC6B9D7F166F1E4C211713DEA76C00B4270C0C
26,190,239 UART: Caliptra RT
26,190,925 UART: [state] CFI Enabled
26,307,621 UART: [rt] RT listening for mailbox commands...
26,309,566 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,340,494 UART: [rt]cmd =0x44504543, len=136
30,508,821 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 ready_for_fw is high
1,480,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,828 UART: [idev] Erasing UDS.KEYID = 0
1,505,414 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,046 UART: [idev] --
1,515,239 UART: [ldev] ++
1,515,407 UART: [ldev] CDI.KEYID = 6
1,515,770 UART: [ldev] SUBJECT.KEYID = 5
1,516,196 UART: [ldev] AUTHORITY.KEYID = 7
1,516,659 UART: [ldev] FE.KEYID = 1
1,521,625 UART: [ldev] Erasing FE.KEYID = 1
1,547,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,338 UART: [ldev] --
1,586,603 UART: [fwproc] Waiting for Commands...
1,587,254 UART: [fwproc] Received command 0x46574c44
1,588,045 UART: [fwproc] Received Image of size 114448 bytes
2,887,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,912 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,215 >>> mbox cmd response: success
3,081,297 UART: [afmc] ++
3,081,465 UART: [afmc] CDI.KEYID = 6
3,081,827 UART: [afmc] SUBJECT.KEYID = 7
3,082,252 UART: [afmc] AUTHORITY.KEYID = 5
3,117,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,968 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,658 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,479 UART: [afmc] --
3,160,473 UART: [cold-reset] --
3,161,381 UART: [state] Locking Datavault
3,162,728 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,332 UART: [state] Locking ICCM
3,163,794 UART: [exit] Launching FMC @ 0x40000130
3,169,123 UART:
3,169,139 UART: Running Caliptra FMC ...
3,169,547 UART:
3,169,601 UART: [state] CFI Enabled
3,179,824 UART: [fht] FMC Alias Private Key: 7
3,288,413 UART: [art] Extend RT PCRs Done
3,288,841 UART: [art] Lock RT PCRs Done
3,290,227 UART: [art] Populate DV Done
3,298,464 UART: [fht] FMC Alias Private Key: 7
3,299,576 UART: [art] Derive CDI
3,299,856 UART: [art] Store in in slot 0x4
3,385,939 UART: [art] Derive Key Pair
3,386,299 UART: [art] Store priv key in slot 0x5
3,399,521 UART: [art] Derive Key Pair - Done
3,414,228 UART: [art] Signing Cert with AUTHO
3,414,708 UART: RITY.KEYID = 7
3,429,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,489 UART: [art] PUB.X = FB669E9E236B72FBA26D7FF5FFDB0BD97C08124D5B0568D606D8D85EF4C2C85239809BB2FD47C7EAD1C1C8481F4BC2D6
3,437,267 UART: [art] PUB.Y = 0D04EFD43B853F0A183134F803CE7E8BF7ABA78567B81DF9ADEA4AD09E1233EB6EA1D4CF8135224D74D66E4A261DC2C7
3,444,223 UART: [art] SIG.R = AD5FD83C277D5C25E0639F4BF073DBA89F1A752C09A03069E8B5F172338A608B1BA0C832F5DC1EDF7F97528D9A74E089
3,451,000 UART: [art] SIG.S = 22611442F3BC8E07E902D8AD1FEFEF75B4907878982CF1F26D04F2712958A37750849D69FC07AAC4E6465D5109FAA343
3,474,336 UART: Caliptra RT
3,474,589 UART: [state] CFI Enabled
3,582,638 UART: [rt] RT listening for mailbox commands...
3,583,308 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,008 UART: [rt]cmd =0x44504543, len=136
3,677,265 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 ready_for_fw is high
1,362,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,197 >>> mbox cmd response: success
2,989,579 UART:
2,989,595 UART: Running Caliptra FMC ...
2,990,003 UART:
2,990,057 UART: [state] CFI Enabled
3,000,396 UART: [fht] FMC Alias Private Key: 7
3,108,403 UART: [art] Extend RT PCRs Done
3,108,831 UART: [art] Lock RT PCRs Done
3,110,401 UART: [art] Populate DV Done
3,118,600 UART: [fht] FMC Alias Private Key: 7
3,119,552 UART: [art] Derive CDI
3,119,832 UART: [art] Store in in slot 0x4
3,205,705 UART: [art] Derive Key Pair
3,206,065 UART: [art] Store priv key in slot 0x5
3,219,249 UART: [art] Derive Key Pair - Done
3,233,598 UART: [art] Signing Cert with AUTHO
3,234,078 UART: RITY.KEYID = 7
3,249,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,951 UART: [art] PUB.X = F7BF2D08260832EE7489F0043950353CAC1C176EB8AFE58ECD107D0ADDF65B677B664E59E09657604F5BCF533B4EEFFD
3,256,723 UART: [art] PUB.Y = 896A205C4A9AFDE01124322F09FE7FB6DEEDFB51D67A92ADED85F315F8FFAC8683286B6FB2EDECD87C72A8705B9F69B2
3,263,694 UART: [art] SIG.R = 15CA20CC0F12F9BA79E95DEC0C0AF77FA002367370570E51BEBFDF1DBECB003EED40A61DF75A032E228C3548CD6487BA
3,270,446 UART: [art] SIG.S = 58325B1979EB1FC50AC7F4B41F158DB199D113B69962BAA1D17734DA566BBB8207A999CF9E4DB8743579D15184CECC39
3,294,125 UART: Caliptra RT
3,294,378 UART: [state] CFI Enabled
3,402,594 UART: [rt] RT listening for mailbox commands...
3,403,264 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,910 UART: [rt]cmd =0x44504543, len=136
3,498,151 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,743 UART: [kat] LMS
1,475,939 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 ready_for_fw is high
1,481,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,231 UART: [idev] Erasing UDS.KEYID = 0
1,505,909 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,497 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,522,164 UART: [ldev] Erasing FE.KEYID = 1
1,546,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,059 UART: [ldev] --
1,586,574 UART: [fwproc] Waiting for Commands...
1,587,433 UART: [fwproc] Received command 0x46574c44
1,588,224 UART: [fwproc] Received Image of size 114448 bytes
2,887,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,705 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,080 >>> mbox cmd response: success
3,082,098 UART: [afmc] ++
3,082,266 UART: [afmc] CDI.KEYID = 6
3,082,628 UART: [afmc] SUBJECT.KEYID = 7
3,083,053 UART: [afmc] AUTHORITY.KEYID = 5
3,117,388 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,151 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,841 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,854 UART: [afmc] --
3,160,766 UART: [cold-reset] --
3,161,456 UART: [state] Locking Datavault
3,162,361 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,965 UART: [state] Locking ICCM
3,163,431 UART: [exit] Launching FMC @ 0x40000130
3,168,760 UART:
3,168,776 UART: Running Caliptra FMC ...
3,169,184 UART:
3,169,327 UART: [state] CFI Enabled
3,180,048 UART: [fht] FMC Alias Private Key: 7
3,287,507 UART: [art] Extend RT PCRs Done
3,287,935 UART: [art] Lock RT PCRs Done
3,289,553 UART: [art] Populate DV Done
3,297,532 UART: [fht] FMC Alias Private Key: 7
3,298,714 UART: [art] Derive CDI
3,298,994 UART: [art] Store in in slot 0x4
3,385,117 UART: [art] Derive Key Pair
3,385,477 UART: [art] Store priv key in slot 0x5
3,398,419 UART: [art] Derive Key Pair - Done
3,413,381 UART: [art] Signing Cert with AUTHO
3,413,861 UART: RITY.KEYID = 7
3,428,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,672 UART: [art] PUB.X = 02A10966C8EAF37F55B57061A286A4924DF8FA14A355E840D17EC03CA15C723FA782C8E3311B29824FA1D6B3402FB406
3,436,435 UART: [art] PUB.Y = 7C8E8CA44200006FE899B4945554D9EA9BDF2E269A3CCAD626BBFA6AB78846686B660D2B5305156895DBA9826123546D
3,443,337 UART: [art] SIG.R = 7DAE60B0E43413D4DFDD5C1CCE07BE1E0D05957C4516EDADBD103CDBD40982EC578C5CCA003C45AD14F454EA4E72198C
3,450,097 UART: [art] SIG.S = F13612150EB637FE0DAC57BE1F9A3F2B3FB7AAEB14F1B7A09AA3972BA56D9D5270EF287E5115685B30184C909EAD23A6
3,473,738 UART: Caliptra RT
3,474,083 UART: [state] CFI Enabled
3,581,906 UART: [rt] RT listening for mailbox commands...
3,582,576 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,460 UART: [rt]cmd =0x44504543, len=136
3,676,737 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,354 ready_for_fw is high
1,363,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,630 >>> mbox cmd response: success
2,994,870 UART:
2,994,886 UART: Running Caliptra FMC ...
2,995,294 UART:
2,995,437 UART: [state] CFI Enabled
3,005,940 UART: [fht] FMC Alias Private Key: 7
3,113,569 UART: [art] Extend RT PCRs Done
3,113,997 UART: [art] Lock RT PCRs Done
3,115,531 UART: [art] Populate DV Done
3,123,584 UART: [fht] FMC Alias Private Key: 7
3,124,514 UART: [art] Derive CDI
3,124,794 UART: [art] Store in in slot 0x4
3,210,545 UART: [art] Derive Key Pair
3,210,905 UART: [art] Store priv key in slot 0x5
3,223,849 UART: [art] Derive Key Pair - Done
3,238,499 UART: [art] Signing Cert with AUTHO
3,238,979 UART: RITY.KEYID = 7
3,254,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,374 UART: [art] PUB.X = 59C5C7083D2D341A4A09E7AB66F3DF6571F1F82503BA38D6B9CF532DA74A6BC5F56D954EBD7E4CCBE251C59CDA1B4478
3,262,153 UART: [art] PUB.Y = 8A3B465E0034F4554616513DCF1197D926248FFDEA809526321E4FB04D21037E4081678C989019672519E78A26BFD370
3,269,064 UART: [art] SIG.R = 071FCE9B41E921CCAE6CF50E24335C1002AC49B0D7BF6DC827FB9F91A5821E269474E1867C9C59DBB5A522222A112ACC
3,275,837 UART: [art] SIG.S = 5DCD2C9C461609823B4559E4F3184ABD537D3E2FE2D196D965023389229118D6A18259DF9705F005D2F1CCB3968B4059
3,299,910 UART: Caliptra RT
3,300,255 UART: [state] CFI Enabled
3,408,417 UART: [rt] RT listening for mailbox commands...
3,409,087 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,659 UART: [rt]cmd =0x44504543, len=136
3,502,916 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
917,802 UART: [kat] HMAC-384Kdf
922,378 UART: [kat] LMS
1,170,706 UART: [kat] --
1,171,681 UART: [cold-reset] ++
1,172,097 UART: [fht] FHT @ 0x50003400
1,174,580 UART: [idev] ++
1,174,748 UART: [idev] CDI.KEYID = 6
1,175,108 UART: [idev] SUBJECT.KEYID = 7
1,175,532 UART: [idev] UDS.KEYID = 0
1,175,877 ready_for_fw is high
1,175,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,622 UART: [idev] Erasing UDS.KEYID = 0
1,200,241 UART: [idev] Sha1 KeyId Algorithm
1,208,611 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,292 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,243,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,696 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,446 >>> mbox cmd response: success
2,776,496 UART: [afmc] ++
2,776,664 UART: [afmc] CDI.KEYID = 6
2,777,026 UART: [afmc] SUBJECT.KEYID = 7
2,777,451 UART: [afmc] AUTHORITY.KEYID = 5
2,812,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,235 UART: [afmc] --
2,855,183 UART: [cold-reset] --
2,856,005 UART: [state] Locking Datavault
2,857,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,734 UART: [state] Locking ICCM
2,858,268 UART: [exit] Launching FMC @ 0x40000130
2,863,597 UART:
2,863,613 UART: Running Caliptra FMC ...
2,864,021 UART:
2,864,075 UART: [state] CFI Enabled
2,874,448 UART: [fht] FMC Alias Private Key: 7
2,981,705 UART: [art] Extend RT PCRs Done
2,982,133 UART: [art] Lock RT PCRs Done
2,983,321 UART: [art] Populate DV Done
2,991,550 UART: [fht] FMC Alias Private Key: 7
2,992,604 UART: [art] Derive CDI
2,992,884 UART: [art] Store in in slot 0x4
3,079,009 UART: [art] Derive Key Pair
3,079,369 UART: [art] Store priv key in slot 0x5
3,091,821 UART: [art] Derive Key Pair - Done
3,106,329 UART: [art] Signing Cert with AUTHO
3,106,809 UART: RITY.KEYID = 7
3,122,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,958 UART: [art] PUB.X = 48BCA1560DD029FABA48A9647EC1BB28BD56932C311634EF87BA8073DCA727D69FBFD5796CB3AA78E867C15DFB1F7C57
3,129,743 UART: [art] PUB.Y = A38A17996E93DCE34FBC59AA2EAB1C2149C4DADAC56002FE18FD82BAE673E776E67E8D9269750C73FFEFDAC031580D90
3,136,704 UART: [art] SIG.R = 5D73875BC1D1811F5F01708E383CF213098DEA0310A321D54861AD95D7405424EDEEC6CFD81DF391A327DA3ECEA4CF13
3,143,475 UART: [art] SIG.S = 84330054D7FEEA716569F26351A45EFEF655EE23E83F820B0008D3AFF5468D4F592B50157D8C335D851282709BE8DF63
3,167,056 UART: Caliptra RT
3,167,309 UART: [state] CFI Enabled
3,275,202 UART: [rt] RT listening for mailbox commands...
3,275,872 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,358 UART: [rt]cmd =0x44504543, len=136
3,370,191 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,735 ready_for_fw is high
1,060,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,285 >>> mbox cmd response: success
2,690,739 UART:
2,690,755 UART: Running Caliptra FMC ...
2,691,163 UART:
2,691,217 UART: [state] CFI Enabled
2,701,522 UART: [fht] FMC Alias Private Key: 7
2,809,041 UART: [art] Extend RT PCRs Done
2,809,469 UART: [art] Lock RT PCRs Done
2,811,145 UART: [art] Populate DV Done
2,819,414 UART: [fht] FMC Alias Private Key: 7
2,820,546 UART: [art] Derive CDI
2,820,826 UART: [art] Store in in slot 0x4
2,906,137 UART: [art] Derive Key Pair
2,906,497 UART: [art] Store priv key in slot 0x5
2,919,751 UART: [art] Derive Key Pair - Done
2,934,295 UART: [art] Signing Cert with AUTHO
2,934,775 UART: RITY.KEYID = 7
2,950,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,210 UART: [art] PUB.X = 7B0C63EB4EE9093854A66D12E0A99C622E792D3BB1658277D7C836EDA10D6D2F54B7B96C4ED2CFFB1527CF6BDA312D9E
2,957,987 UART: [art] PUB.Y = 635FE9E7218758EEF9A14B57E4680404C2A1B7BDFDA397BAF291208B65D8C23FC1A7DC3B086C29F228E897E750EF185C
2,964,938 UART: [art] SIG.R = 2A16CD43B00D98C4234D832DEE0F53AB0B902BB2CCBFBE449BC4F0483093AB5DFAD197F42E842B1FCF7480B49136080F
2,971,709 UART: [art] SIG.S = B74CC72637941D6C45D5F6A41F6C05A6667482848B4776660D41923A9747EF8274A53311A2BC33B7C53EF154BAB3BD19
2,995,654 UART: Caliptra RT
2,995,907 UART: [state] CFI Enabled
3,103,102 UART: [rt] RT listening for mailbox commands...
3,103,772 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,282 UART: [rt]cmd =0x44504543, len=136
3,197,399 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,171,882 UART: [cold-reset] ++
1,172,234 UART: [fht] FHT @ 0x50003400
1,175,099 UART: [idev] ++
1,175,267 UART: [idev] CDI.KEYID = 6
1,175,627 UART: [idev] SUBJECT.KEYID = 7
1,176,051 UART: [idev] UDS.KEYID = 0
1,176,396 ready_for_fw is high
1,176,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,143 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,460 UART: [idev] --
1,210,590 UART: [ldev] ++
1,210,758 UART: [ldev] CDI.KEYID = 6
1,211,121 UART: [ldev] SUBJECT.KEYID = 5
1,211,547 UART: [ldev] AUTHORITY.KEYID = 7
1,212,010 UART: [ldev] FE.KEYID = 1
1,217,406 UART: [ldev] Erasing FE.KEYID = 1
1,243,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,972 UART: [ldev] --
1,283,303 UART: [fwproc] Wait for Commands...
1,284,055 UART: [fwproc] Recv command 0x46574c44
1,284,783 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,169 >>> mbox cmd response: success
2,777,183 UART: [afmc] ++
2,777,351 UART: [afmc] CDI.KEYID = 6
2,777,713 UART: [afmc] SUBJECT.KEYID = 7
2,778,138 UART: [afmc] AUTHORITY.KEYID = 5
2,814,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,604 UART: [afmc] --
2,857,658 UART: [cold-reset] --
2,858,556 UART: [state] Locking Datavault
2,859,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,195 UART: [state] Locking ICCM
2,860,679 UART: [exit] Launching FMC @ 0x40000130
2,866,008 UART:
2,866,024 UART: Running Caliptra FMC ...
2,866,432 UART:
2,866,575 UART: [state] CFI Enabled
2,877,532 UART: [fht] FMC Alias Private Key: 7
2,985,255 UART: [art] Extend RT PCRs Done
2,985,683 UART: [art] Lock RT PCRs Done
2,987,399 UART: [art] Populate DV Done
2,995,470 UART: [fht] FMC Alias Private Key: 7
2,996,480 UART: [art] Derive CDI
2,996,760 UART: [art] Store in in slot 0x4
3,082,741 UART: [art] Derive Key Pair
3,083,101 UART: [art] Store priv key in slot 0x5
3,096,583 UART: [art] Derive Key Pair - Done
3,111,225 UART: [art] Signing Cert with AUTHO
3,111,705 UART: RITY.KEYID = 7
3,126,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,650 UART: [art] PUB.X = D9610F8AC25A2D936B55A82B0D220ABCB4FE681A80A4866E1291166CCA81698874DAEB8C052451DAD5E5FDDF3D076F80
3,134,417 UART: [art] PUB.Y = BF4928EF936AC88D43A0A5B6ADA8846069B2DF2D9E20AB878379C1A07CA7C8DCA55B9A992FE8A8BCB167CA6E2DE7A204
3,141,386 UART: [art] SIG.R = 1510C77B8C6A179BAE8675BCF3CD43FEB20C6C16855E1733625A29030440422D6E8D204B47709BD7B9E4255E6340D064
3,148,143 UART: [art] SIG.S = 876EF45187D38F0BD181BCDC6BB0475BAEA4555C338B632A4EC8C71115E4AC4101B29F0736915E42C0D408B48072F9CB
3,172,190 UART: Caliptra RT
3,172,535 UART: [state] CFI Enabled
3,280,682 UART: [rt] RT listening for mailbox commands...
3,281,352 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,382 UART: [rt]cmd =0x44504543, len=136
3,376,463 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,484 ready_for_fw is high
1,060,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,874 >>> mbox cmd response: success
2,689,072 UART:
2,689,088 UART: Running Caliptra FMC ...
2,689,496 UART:
2,689,639 UART: [state] CFI Enabled
2,699,790 UART: [fht] FMC Alias Private Key: 7
2,807,519 UART: [art] Extend RT PCRs Done
2,807,947 UART: [art] Lock RT PCRs Done
2,809,843 UART: [art] Populate DV Done
2,818,130 UART: [fht] FMC Alias Private Key: 7
2,819,128 UART: [art] Derive CDI
2,819,408 UART: [art] Store in in slot 0x4
2,905,173 UART: [art] Derive Key Pair
2,905,533 UART: [art] Store priv key in slot 0x5
2,918,599 UART: [art] Derive Key Pair - Done
2,933,265 UART: [art] Signing Cert with AUTHO
2,933,745 UART: RITY.KEYID = 7
2,949,147 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,912 UART: [art] PUB.X = 8B6DFCB398557EDFC2DA1F42D821572323D1E69C82BBC2CF234F223D23927AAF10BAC7AA9BD46323A421085126AB0581
2,956,686 UART: [art] PUB.Y = 01F43FD0AA9504B186CA478346A12816597858B010F41F06390BEC5E0AAA30B75BF63BF1EFD931512E76031CA423F808
2,963,615 UART: [art] SIG.R = 48CF3DFD114E52F6190A3AD1DAE68A14E33B053A3E5D5398BC34AE0B50ADB4B7D461B2C40A3352282F556104AFD7BC23
2,970,384 UART: [art] SIG.S = B1D15A8A44F1A00DFDDFAF753BCA6B2F1EDACBBC6DAADFD8C7602928E3FB7630E5AD7FEA76EB63030E4AF909110E2A78
2,995,432 UART: Caliptra RT
2,995,777 UART: [state] CFI Enabled
3,103,628 UART: [rt] RT listening for mailbox commands...
3,104,298 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,894 UART: [rt]cmd =0x44504543, len=136
3,198,621 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,493 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,174,985 ready_for_fw is high
1,174,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,459 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,238 UART: [ldev] ++
1,209,406 UART: [ldev] CDI.KEYID = 6
1,209,770 UART: [ldev] SUBJECT.KEYID = 5
1,210,197 UART: [ldev] AUTHORITY.KEYID = 7
1,210,660 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,032 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,209 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,958 >>> mbox cmd response: success
2,774,147 UART: [afmc] ++
2,774,315 UART: [afmc] CDI.KEYID = 6
2,774,678 UART: [afmc] SUBJECT.KEYID = 7
2,775,104 UART: [afmc] AUTHORITY.KEYID = 5
2,810,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,034 UART: [afmc] --
2,853,926 UART: [cold-reset] --
2,854,974 UART: [state] Locking Datavault
2,856,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,735 UART: [state] Locking ICCM
2,857,177 UART: [exit] Launching FMC @ 0x40000130
2,862,506 UART:
2,862,522 UART: Running Caliptra FMC ...
2,862,930 UART:
2,862,984 UART: [state] CFI Enabled
2,873,519 UART: [fht] FMC Alias Private Key: 7
2,981,162 UART: [art] Extend RT PCRs Done
2,981,590 UART: [art] Lock RT PCRs Done
2,983,474 UART: [art] Populate DV Done
2,991,773 UART: [fht] FMC Alias Private Key: 7
2,992,803 UART: [art] Derive CDI
2,993,083 UART: [art] Store in in slot 0x4
3,079,004 UART: [art] Derive Key Pair
3,079,364 UART: [art] Store priv key in slot 0x5
3,092,676 UART: [art] Derive Key Pair - Done
3,107,627 UART: [art] Signing Cert with AUTHO
3,108,107 UART: RITY.KEYID = 7
3,122,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,526 UART: [art] PUB.X = AEBD3F34CA6ACB6143E7D312EF54DCA68F83DD7A58AF80B2525705FFEF31BE750B335DA0F0C01D3534400D9497D0E8F9
3,130,305 UART: [art] PUB.Y = CD30686AEB1CC458B42A1CDB83D9B5128E4C0236120B4EAEC9CDDF95AE000D8ABB16999B985D2181F2D5D4C2C75B91D9
3,137,242 UART: [art] SIG.R = D5205581A88472453A9037CAD3A66B10F52FADB72EFB0CCFE7915ED12E96AFC2DBFA99E5AA0D3E122EB5BE489CF61A0B
3,144,027 UART: [art] SIG.S = 656A8FE0BEADCECC05F79953E4481268F2137A91285989B6A46F8B8BF4190D3CABCA8D3824C8289A5917B212576140F3
3,167,750 UART: Caliptra RT
3,168,003 UART: [state] CFI Enabled
3,275,926 UART: [rt] RT listening for mailbox commands...
3,276,596 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,520 UART: [rt]cmd =0x44504543, len=136
3,370,657 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,436 ready_for_fw is high
1,055,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,440 >>> mbox cmd response: success
2,686,908 UART:
2,686,924 UART: Running Caliptra FMC ...
2,687,332 UART:
2,687,386 UART: [state] CFI Enabled
2,697,887 UART: [fht] FMC Alias Private Key: 7
2,804,958 UART: [art] Extend RT PCRs Done
2,805,386 UART: [art] Lock RT PCRs Done
2,806,606 UART: [art] Populate DV Done
2,814,641 UART: [fht] FMC Alias Private Key: 7
2,815,801 UART: [art] Derive CDI
2,816,081 UART: [art] Store in in slot 0x4
2,901,776 UART: [art] Derive Key Pair
2,902,136 UART: [art] Store priv key in slot 0x5
2,914,832 UART: [art] Derive Key Pair - Done
2,929,723 UART: [art] Signing Cert with AUTHO
2,930,203 UART: RITY.KEYID = 7
2,945,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,162 UART: [art] PUB.X = 37B0E3055963B3CACBE3D8316BF6B3ADA536475F46EB7A935325BCF5A727F270207E0BBE3648E2978D4BEEAB8E65ED12
2,952,940 UART: [art] PUB.Y = F0668F618539AD6F4D9EBE53D5C84D5BF0E40047785A3BD89EBEC38C0F66DF0FCCB64CA5D0CBFC4461D7CFCC77C0D26F
2,959,890 UART: [art] SIG.R = E7158135D29D968ABE362A38C09C113BA7015C95822F598CC3981997CC5DD94159060ED4ACA98559D27E7AFA5CE45DE1
2,966,655 UART: [art] SIG.S = 01AF907DD43B5628CACBA7850DF16C8CFD8ED41BE3C2FCCD6FDC2A2BF8B8502CE0107807029615ACD71F3F68E550BBCF
2,990,484 UART: Caliptra RT
2,990,737 UART: [state] CFI Enabled
3,098,398 UART: [rt] RT listening for mailbox commands...
3,099,068 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,000 UART: [rt]cmd =0x44504543, len=136
3,193,543 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 ready_for_fw is high
1,174,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,652 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,282,027 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,840 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,143 >>> mbox cmd response: success
2,775,358 UART: [afmc] ++
2,775,526 UART: [afmc] CDI.KEYID = 6
2,775,889 UART: [afmc] SUBJECT.KEYID = 7
2,776,315 UART: [afmc] AUTHORITY.KEYID = 5
2,811,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,077 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,689 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,275 UART: [afmc] --
2,855,379 UART: [cold-reset] --
2,856,271 UART: [state] Locking Datavault
2,857,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,024 UART: [state] Locking ICCM
2,858,554 UART: [exit] Launching FMC @ 0x40000130
2,863,883 UART:
2,863,899 UART: Running Caliptra FMC ...
2,864,307 UART:
2,864,450 UART: [state] CFI Enabled
2,874,591 UART: [fht] FMC Alias Private Key: 7
2,982,724 UART: [art] Extend RT PCRs Done
2,983,152 UART: [art] Lock RT PCRs Done
2,984,910 UART: [art] Populate DV Done
2,993,159 UART: [fht] FMC Alias Private Key: 7
2,994,327 UART: [art] Derive CDI
2,994,607 UART: [art] Store in in slot 0x4
3,080,470 UART: [art] Derive Key Pair
3,080,830 UART: [art] Store priv key in slot 0x5
3,093,862 UART: [art] Derive Key Pair - Done
3,108,915 UART: [art] Signing Cert with AUTHO
3,109,395 UART: RITY.KEYID = 7
3,124,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,652 UART: [art] PUB.X = CDC0F9DB09E16DF406199D977B269C090409D10F193873E4AB9579844B6C4FACCD74DDA4C283DD222280E50B0C9AB43C
3,132,408 UART: [art] PUB.Y = 58488F96CFE85E434DFCF7D5244850034355A90F15C8B14129C9CA42672BCE8CCFF2099082DB4F8F1DE5B10BE205A1AF
3,139,353 UART: [art] SIG.R = 7327E4FAC1003DAC231C3C7871FD5BA992C64FE6F33948BC9EE8C23FEF044C2AACB1BE1F61AA21B3D6DE28939D7B5BE6
3,146,122 UART: [art] SIG.S = 7DA3825D4D5A6DEC752006CC2B1EFCC8F670F638597F2D48C3F0BDE4F2E6D813EC0DDAA66B35AF720F2CFA0B6BD83C2F
3,169,843 UART: Caliptra RT
3,170,188 UART: [state] CFI Enabled
3,278,987 UART: [rt] RT listening for mailbox commands...
3,279,657 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,111 UART: [rt]cmd =0x44504543, len=136
3,373,494 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,665 ready_for_fw is high
1,055,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,153 >>> mbox cmd response: success
2,686,803 UART:
2,686,819 UART: Running Caliptra FMC ...
2,687,227 UART:
2,687,370 UART: [state] CFI Enabled
2,697,855 UART: [fht] FMC Alias Private Key: 7
2,806,192 UART: [art] Extend RT PCRs Done
2,806,620 UART: [art] Lock RT PCRs Done
2,808,148 UART: [art] Populate DV Done
2,816,435 UART: [fht] FMC Alias Private Key: 7
2,817,493 UART: [art] Derive CDI
2,817,773 UART: [art] Store in in slot 0x4
2,903,948 UART: [art] Derive Key Pair
2,904,308 UART: [art] Store priv key in slot 0x5
2,917,656 UART: [art] Derive Key Pair - Done
2,932,472 UART: [art] Signing Cert with AUTHO
2,932,952 UART: RITY.KEYID = 7
2,948,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,771 UART: [art] PUB.X = E4FF039DD9D73BEF28AC9618F27526800DF9BFBA2903B93B8A30362F502B01F2041E79B87F27B4E4233CB4CE47A0E13E
2,955,536 UART: [art] PUB.Y = 50770D5F916894C8D4AB28026B3DC11EC42C78F35E226677F2DADC0A58C63104DA081513533D79A3A36A04019C2747B0
2,962,461 UART: [art] SIG.R = 33F18CED1B01FB5C026306B6B487EA4CCF16B50515DFFAE56BB65F8D007354F0F2A6A52146E52594D0E9D428A02B692E
2,969,207 UART: [art] SIG.S = 1B483E05EE6D23041264E4849939AD7F836C004BD8B01A04C80611B3654D4A0A782F11465D03F0CDD9A7F1CE602B66F4
2,992,704 UART: Caliptra RT
2,993,049 UART: [state] CFI Enabled
3,100,638 UART: [rt] RT listening for mailbox commands...
3,101,308 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,108 UART: [rt]cmd =0x44504543, len=136
3,196,117 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,246 UART:
192,590 UART: Running Caliptra ROM ...
193,783 UART:
193,946 UART: [state] CFI Enabled
262,770 UART: [state] LifecycleState = Unprovisioned
264,680 UART: [state] DebugLocked = No
267,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,603 UART: [kat] SHA2-256
441,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,795 UART: [kat] ++
452,243 UART: [kat] sha1
462,976 UART: [kat] SHA2-256
465,627 UART: [kat] SHA2-384
470,441 UART: [kat] SHA2-512-ACC
472,843 UART: [kat] ECC-384
2,770,103 UART: [kat] HMAC-384Kdf
2,800,049 UART: [kat] LMS
3,990,371 UART: [kat] --
3,995,595 UART: [cold-reset] ++
3,996,815 UART: [fht] Storing FHT @ 0x50003400
4,009,124 UART: [idev] ++
4,009,716 UART: [idev] CDI.KEYID = 6
4,010,631 UART: [idev] SUBJECT.KEYID = 7
4,011,883 UART: [idev] UDS.KEYID = 0
4,012,846 ready_for_fw is high
4,013,039 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,581 UART: [idev] Erasing UDS.KEYID = 0
7,344,954 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,975 UART: [idev] --
7,371,665 UART: [ldev] ++
7,372,247 UART: [ldev] CDI.KEYID = 6
7,373,269 UART: [ldev] SUBJECT.KEYID = 5
7,374,431 UART: [ldev] AUTHORITY.KEYID = 7
7,375,714 UART: [ldev] FE.KEYID = 1
7,420,827 UART: [ldev] Erasing FE.KEYID = 1
10,752,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,262 UART: [ldev] --
13,113,214 UART: [fwproc] Waiting for Commands...
13,115,594 UART: [fwproc] Received command 0x46574c44
13,117,777 UART: [fwproc] Received Image of size 114124 bytes
17,173,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,429 >>> mbox cmd response: success
17,640,384 UART: [afmc] ++
17,640,987 UART: [afmc] CDI.KEYID = 6
17,641,905 UART: [afmc] SUBJECT.KEYID = 7
17,643,118 UART: [afmc] AUTHORITY.KEYID = 5
21,010,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,775 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,161 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,020 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,487 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,543 UART: [afmc] --
23,377,928 UART: [cold-reset] --
23,383,843 UART: [state] Locking Datavault
23,389,358 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,116 UART: [state] Locking ICCM
23,393,217 UART: [exit] Launching FMC @ 0x40000130
23,401,555 UART:
23,401,789 UART: Running Caliptra FMC ...
23,402,888 UART:
23,403,052 UART: [state] CFI Enabled
23,468,396 UART: [fht] FMC Alias Private Key: 7
25,806,600 UART: [art] Extend RT PCRs Done
25,807,838 UART: [art] Lock RT PCRs Done
25,809,543 UART: [art] Populate DV Done
25,815,006 UART: [fht] FMC Alias Private Key: 7
25,816,551 UART: [art] Derive CDI
25,817,287 UART: [art] Store in in slot 0x4
25,877,505 UART: [art] Derive Key Pair
25,878,540 UART: [art] Store priv key in slot 0x5
29,171,081 UART: [art] Derive Key Pair - Done
29,184,128 UART: [art] Signing Cert with AUTHO
29,185,434 UART: RITY.KEYID = 7
31,473,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,837 UART: [art] PUB.X = 00F6E87254369F396D873344B9A3E85CE1F171BD69F8741387FA7DD916850F3677C1ADB5407E7F131E372E0FA865EB2D
31,482,040 UART: [art] PUB.Y = 97DD92061027DFF90725AB783AAC5B154D960DA5AC3F7C944BD9F4C0786ED14F23C4D635A0D3AA85D367336240E1F3A8
31,489,342 UART: [art] SIG.R = 3D7A07E21FC47FFC16CD12853E9E2C5F1095C06A2EABEFFDEE38A4FB95EDB9C22D685B4D7C43F9A6B1B1F81FED8543FB
31,496,741 UART: [art] SIG.S = 93A9694360C524382E34EE9DD7A74911A6D4520B62EDFDADA2BE21CF69DB1EBB5AB4BCE2279F0EDFF9855F50C2E84AC4
32,802,384 UART: Caliptra RT
32,803,099 UART: [state] CFI Enabled
32,964,585 UART: [rt] RT listening for mailbox commands...
32,966,986 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,997,821 UART: [rt]cmd =0x44504543, len=92
41,049,863 >>> mbox cmd response data (6284 bytes)
41,079,195 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,109,218 UART: [rt]cmd =0x43455252, len=4
41,120,704 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,786,106 ready_for_fw is high
3,786,511 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,433 >>> mbox cmd response: success
23,578,118 UART:
23,578,494 UART: Running Caliptra FMC ...
23,579,608 UART:
23,579,763 UART: [state] CFI Enabled
23,648,923 UART: [fht] FMC Alias Private Key: 7
25,987,050 UART: [art] Extend RT PCRs Done
25,988,276 UART: [art] Lock RT PCRs Done
25,989,929 UART: [art] Populate DV Done
25,995,353 UART: [fht] FMC Alias Private Key: 7
25,997,110 UART: [art] Derive CDI
25,997,849 UART: [art] Store in in slot 0x4
26,057,703 UART: [art] Derive Key Pair
26,058,714 UART: [art] Store priv key in slot 0x5
29,351,702 UART: [art] Derive Key Pair - Done
29,364,375 UART: [art] Signing Cert with AUTHO
29,365,718 UART: RITY.KEYID = 7
31,654,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,649 UART: [art] PUB.X = BF2D026380126E83BED9AA89044A31EE360020CA99BE8E0E25BE75C8C0A61281D393FC18F97FFCA62D67BD4A538A5BC7
31,662,897 UART: [art] PUB.Y = FF6F4C5E75E642B566E3E3340E5AA71C8553EE8CE6B616A66CD6BC17EE114A279B560608385110E39ADC8E0948B58338
31,670,187 UART: [art] SIG.R = 856EEA7CEDC3B542EB822C89D7EEF2ECCF11D03EFFFFBEFB1AB5F6F8285358A691DCF4F5096F9C18E54FC9DA721468C2
31,677,602 UART: [art] SIG.S = BF9591418392B5CD3450D02CEF858E9EB9C7760028490540A419EC2F819A38C2359054CFC3F1AA7FF0214598A999AFBB
32,982,185 UART: Caliptra RT
32,982,901 UART: [state] CFI Enabled
33,145,360 UART: [rt] RT listening for mailbox commands...
33,147,730 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,178,391 UART: [rt]cmd =0x44504543, len=92
41,231,584 >>> mbox cmd response data (6284 bytes)
41,260,831 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,290,711 UART: [rt]cmd =0x43455252, len=4
41,302,056 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,137 UART:
192,509 UART: Running Caliptra ROM ...
193,710 UART:
603,198 UART: [state] CFI Enabled
619,032 UART: [state] LifecycleState = Unprovisioned
620,994 UART: [state] DebugLocked = No
622,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,439 UART: [kat] SHA2-256
798,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,696 UART: [kat] ++
809,141 UART: [kat] sha1
820,078 UART: [kat] SHA2-256
822,795 UART: [kat] SHA2-384
827,641 UART: [kat] SHA2-512-ACC
830,002 UART: [kat] ECC-384
3,114,777 UART: [kat] HMAC-384Kdf
3,125,400 UART: [kat] LMS
4,315,502 UART: [kat] --
4,320,509 UART: [cold-reset] ++
4,321,874 UART: [fht] Storing FHT @ 0x50003400
4,333,151 UART: [idev] ++
4,333,721 UART: [idev] CDI.KEYID = 6
4,334,697 UART: [idev] SUBJECT.KEYID = 7
4,335,934 UART: [idev] UDS.KEYID = 0
4,336,898 ready_for_fw is high
4,337,105 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,471 UART: [idev] Erasing UDS.KEYID = 0
7,625,922 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,811 UART: [idev] --
7,650,961 UART: [ldev] ++
7,651,572 UART: [ldev] CDI.KEYID = 6
7,652,533 UART: [ldev] SUBJECT.KEYID = 5
7,653,734 UART: [ldev] AUTHORITY.KEYID = 7
7,654,957 UART: [ldev] FE.KEYID = 1
7,667,622 UART: [ldev] Erasing FE.KEYID = 1
10,958,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,521 UART: [ldev] --
13,320,126 UART: [fwproc] Waiting for Commands...
13,322,211 UART: [fwproc] Received command 0x46574c44
13,324,450 UART: [fwproc] Received Image of size 114124 bytes
17,378,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,354 >>> mbox cmd response: success
17,839,149 UART: [afmc] ++
17,839,738 UART: [afmc] CDI.KEYID = 6
17,840,639 UART: [afmc] SUBJECT.KEYID = 7
17,841,902 UART: [afmc] AUTHORITY.KEYID = 5
21,157,547 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,768 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,174 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,020 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,404 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,728 UART: [afmc] --
23,523,880 UART: [cold-reset] --
23,527,690 UART: [state] Locking Datavault
23,535,042 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,736 UART: [state] Locking ICCM
23,539,506 UART: [exit] Launching FMC @ 0x40000130
23,547,894 UART:
23,548,119 UART: Running Caliptra FMC ...
23,549,137 UART:
23,549,275 UART: [state] CFI Enabled
23,557,197 UART: [fht] FMC Alias Private Key: 7
25,888,035 UART: [art] Extend RT PCRs Done
25,889,256 UART: [art] Lock RT PCRs Done
25,891,166 UART: [art] Populate DV Done
25,896,683 UART: [fht] FMC Alias Private Key: 7
25,898,218 UART: [art] Derive CDI
25,898,969 UART: [art] Store in in slot 0x4
25,941,236 UART: [art] Derive Key Pair
25,942,277 UART: [art] Store priv key in slot 0x5
29,184,378 UART: [art] Derive Key Pair - Done
29,197,509 UART: [art] Signing Cert with AUTHO
29,198,855 UART: RITY.KEYID = 7
31,478,464 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,972 UART: [art] PUB.X = D99A5DF64EFA07F334C26D21248FFB4EC4179C078E42ADB12E84C6990C1EF79C21B3E5486BA42BBE2E2971A1F1604A02
31,487,205 UART: [art] PUB.Y = C1CAAB8A1102590C6DF8B29B26F83486F2CE1CB14644A149C3E671D2A0FFE4F88373DC7C030E694E708909A1E77B3C90
31,494,477 UART: [art] SIG.R = 9BF258CAE6A8EE8B0B283504D7356D44A6A0AD97C6AA54EEB0BBBB8F3382F8A3E0410B3E229C0044CF1D09568C3DA41B
31,501,875 UART: [art] SIG.S = 0D038E08DAF66D010378A124C3CE0F008E3345696E1AEC371E15E15E9A0AC683EAE13121EF83EDFE2856FAD292EF571D
32,806,918 UART: Caliptra RT
32,807,616 UART: [state] CFI Enabled
32,924,725 UART: [rt] RT listening for mailbox commands...
32,927,039 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,957,653 UART: [rt]cmd =0x44504543, len=92
40,930,412 >>> mbox cmd response data (6284 bytes)
40,959,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
40,989,838 UART: [rt]cmd =0x43455252, len=4
41,001,159 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
4,128,022 ready_for_fw is high
4,128,438 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,937 >>> mbox cmd response: success
23,704,453 UART:
23,704,850 UART: Running Caliptra FMC ...
23,705,978 UART:
23,706,135 UART: [state] CFI Enabled
23,714,245 UART: [fht] FMC Alias Private Key: 7
26,044,867 UART: [art] Extend RT PCRs Done
26,046,095 UART: [art] Lock RT PCRs Done
26,047,508 UART: [art] Populate DV Done
26,053,058 UART: [fht] FMC Alias Private Key: 7
26,054,660 UART: [art] Derive CDI
26,055,476 UART: [art] Store in in slot 0x4
26,098,230 UART: [art] Derive Key Pair
26,099,230 UART: [art] Store priv key in slot 0x5
29,341,120 UART: [art] Derive Key Pair - Done
29,353,952 UART: [art] Signing Cert with AUTHO
29,355,257 UART: RITY.KEYID = 7
31,634,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,279 UART: [art] PUB.X = 4EDA5E3E587C1682052FCB2CE07D4DFD79EDA82D7C86941141CC301782CBABE291345ED206127086C52ED73F19578329
31,643,529 UART: [art] PUB.Y = B44E570BE38A5A984E90E744498CA81A3C4842899BB68B338332116AF7248BD999361E4F87CCD11D7846F8F778C782F8
31,650,729 UART: [art] SIG.R = DE9AD58697341B9A23EB64C21516CF995214052240604E064A9C52B80A4693E1996245EE53F45FDC334CB245BDB1B0BD
31,658,128 UART: [art] SIG.S = 29F03D34DD24893F6DD265CB3D56E46CF92E5476F7EA66BE940AB0828908FB9CE56A46CFB8C4321B15A4D214D5E4BA09
32,963,604 UART: Caliptra RT
32,964,316 UART: [state] CFI Enabled
33,082,730 UART: [rt] RT listening for mailbox commands...
33,085,309 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,116,047 UART: [rt]cmd =0x44504543, len=92
41,089,368 >>> mbox cmd response data (6284 bytes)
41,118,999 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,148,711 UART: [rt]cmd =0x43455252, len=4
41,160,037 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
191,970 UART:
192,327 UART: Running Caliptra ROM ...
193,508 UART:
193,664 UART: [state] CFI Enabled
261,829 UART: [state] LifecycleState = Unprovisioned
263,619 UART: [state] DebugLocked = No
265,733 UART: [state] WD Timer not started. Device not locked for debugging
269,156 UART: [kat] SHA2-256
448,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,865 UART: [kat] ++
460,398 UART: [kat] sha1
471,633 UART: [kat] SHA2-256
474,711 UART: [kat] SHA2-384
480,838 UART: [kat] SHA2-512-ACC
483,766 UART: [kat] ECC-384
2,926,825 UART: [kat] HMAC-384Kdf
2,951,665 UART: [kat] LMS
3,481,147 UART: [kat] --
3,486,010 UART: [cold-reset] ++
3,488,521 UART: [fht] FHT @ 0x50003400
3,499,445 UART: [idev] ++
3,500,010 UART: [idev] CDI.KEYID = 6
3,500,924 UART: [idev] SUBJECT.KEYID = 7
3,502,096 UART: [idev] UDS.KEYID = 0
3,503,021 ready_for_fw is high
3,503,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,236 UART: [idev] Erasing UDS.KEYID = 0
6,008,015 UART: [idev] Sha1 KeyId Algorithm
6,030,930 UART: [idev] --
6,035,981 UART: [ldev] ++
6,036,556 UART: [ldev] CDI.KEYID = 6
6,037,446 UART: [ldev] SUBJECT.KEYID = 5
6,038,660 UART: [ldev] AUTHORITY.KEYID = 7
6,039,893 UART: [ldev] FE.KEYID = 1
6,079,683 UART: [ldev] Erasing FE.KEYID = 1
8,583,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,795 UART: [ldev] --
10,387,056 UART: [fwproc] Wait for Commands...
10,388,665 UART: [fwproc] Recv command 0x46574c44
10,390,757 UART: [fwproc] Recv'd Img size: 114448 bytes
13,792,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,256,191 >>> mbox cmd response: success
14,260,641 UART: [afmc] ++
14,261,228 UART: [afmc] CDI.KEYID = 6
14,262,135 UART: [afmc] SUBJECT.KEYID = 7
14,263,296 UART: [afmc] AUTHORITY.KEYID = 5
16,802,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,205 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,597,551 UART: [afmc] --
18,601,636 UART: [cold-reset] --
18,604,524 UART: [state] Locking Datavault
18,610,810 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,457 UART: [state] Locking ICCM
18,615,045 UART: [exit] Launching FMC @ 0x40000130
18,623,497 UART:
18,623,730 UART: Running Caliptra FMC ...
18,624,829 UART:
18,624,996 UART: [state] CFI Enabled
18,683,545 UART: [fht] FMC Alias Private Key: 7
20,447,241 UART: [art] Extend RT PCRs Done
20,448,450 UART: [art] Lock RT PCRs Done
20,449,869 UART: [art] Populate DV Done
20,455,172 UART: [fht] FMC Alias Private Key: 7
20,456,758 UART: [art] Derive CDI
20,457,570 UART: [art] Store in in slot 0x4
20,515,805 UART: [art] Derive Key Pair
20,516,843 UART: [art] Store priv key in slot 0x5
22,979,870 UART: [art] Derive Key Pair - Done
22,992,984 UART: [art] Signing Cert with AUTHO
22,994,322 UART: RITY.KEYID = 7
24,706,297 UART: [art] Erasing AUTHORITY.KEYID = 7
24,707,794 UART: [art] PUB.X = E07AAC10D3F54A9E7E06B4A09B2D1A4AF6A046F81F593EBC755F2B930D717244BFD608552181F2BEE49E7DBC63CE653B
24,715,086 UART: [art] PUB.Y = 4C95CC27E66308BE534F2B4D0D9146686FD8BCB16DEA5B62CD7C4BCCBDA3A8214E4B9EDA89F487C42EE3638B4DB5CBD3
24,722,421 UART: [art] SIG.R = 6156BB0C17F24BE2A7935583B8E1C058EE871ED57F6314FE0956FC1404865A88FC0891246095A3586F84903391EDE1B9
24,729,777 UART: [art] SIG.S = 48E734BEFE5ED62C34FCA3A644AD172AFD5672E68E97CBDA9169D9E75FECE6219D2F4B084CE8B53C546379F0EB443BA9
25,708,600 UART: Caliptra RT
25,709,302 UART: [state] CFI Enabled
25,874,587 UART: [rt] RT listening for mailbox commands...
25,877,130 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,908,475 UART: [rt]cmd =0x44504543, len=92
31,999,104 >>> mbox cmd response data (6284 bytes)
32,028,609 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,058,541 UART: [rt]cmd =0x43455252, len=4
32,070,079 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,381,339 ready_for_fw is high
3,381,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,622 >>> mbox cmd response: success
18,365,705 UART:
18,366,117 UART: Running Caliptra FMC ...
18,367,251 UART:
18,367,420 UART: [state] CFI Enabled
18,430,519 UART: [fht] FMC Alias Private Key: 7
20,194,401 UART: [art] Extend RT PCRs Done
20,195,628 UART: [art] Lock RT PCRs Done
20,197,469 UART: [art] Populate DV Done
20,202,769 UART: [fht] FMC Alias Private Key: 7
20,204,258 UART: [art] Derive CDI
20,205,024 UART: [art] Store in in slot 0x4
20,262,551 UART: [art] Derive Key Pair
20,263,552 UART: [art] Store priv key in slot 0x5
22,726,590 UART: [art] Derive Key Pair - Done
22,739,592 UART: [art] Signing Cert with AUTHO
22,740,897 UART: RITY.KEYID = 7
24,452,024 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,529 UART: [art] PUB.X = 4DE0D41637CCD802B814AB461EF9AB0DF832F07526921CCB28F2C9B18959184E10838C9783A472A17EA6AB563F7A5C7C
24,460,794 UART: [art] PUB.Y = 69AA31DCE277EC0C0B52FD210C67DA7856632D1057BAA5484481EBD15490FF5A09F9EE1472CAA68ED340308A8E165186
24,468,067 UART: [art] SIG.R = 7F6162ADED41E7424C0364B9E2652A39E2FCFE3F263D9013C976EF6515EBD8F841FCF643562B8E155632DD6BB3593C93
24,475,438 UART: [art] SIG.S = 3D2C5083F00B1E899921024C7A096B7C2E890F8F4DF78EEEA90D495E7058A8D886AB46BEAA230E73FB248C9C49017C06
25,454,305 UART: Caliptra RT
25,455,019 UART: [state] CFI Enabled
25,619,808 UART: [rt] RT listening for mailbox commands...
25,622,230 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,653,325 UART: [rt]cmd =0x44504543, len=92
31,725,727 >>> mbox cmd response data (6284 bytes)
31,755,277 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,785,087 UART: [rt]cmd =0x43455252, len=4
31,796,373 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
193,484 UART:
193,855 UART: Running Caliptra ROM ...
194,957 UART:
604,379 UART: [state] CFI Enabled
620,247 UART: [state] LifecycleState = Unprovisioned
622,120 UART: [state] DebugLocked = No
624,273 UART: [state] WD Timer not started. Device not locked for debugging
628,863 UART: [kat] SHA2-256
807,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,555 UART: [kat] ++
819,997 UART: [kat] sha1
831,643 UART: [kat] SHA2-256
834,650 UART: [kat] SHA2-384
841,413 UART: [kat] SHA2-512-ACC
844,343 UART: [kat] ECC-384
3,289,458 UART: [kat] HMAC-384Kdf
3,303,418 UART: [kat] LMS
3,832,912 UART: [kat] --
3,836,488 UART: [cold-reset] ++
3,837,629 UART: [fht] FHT @ 0x50003400
3,848,539 UART: [idev] ++
3,849,140 UART: [idev] CDI.KEYID = 6
3,850,021 UART: [idev] SUBJECT.KEYID = 7
3,851,195 UART: [idev] UDS.KEYID = 0
3,852,184 ready_for_fw is high
3,852,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,995,988 UART: [idev] Erasing UDS.KEYID = 0
6,324,558 UART: [idev] Sha1 KeyId Algorithm
6,346,871 UART: [idev] --
6,350,967 UART: [ldev] ++
6,351,530 UART: [ldev] CDI.KEYID = 6
6,352,406 UART: [ldev] SUBJECT.KEYID = 5
6,353,609 UART: [ldev] AUTHORITY.KEYID = 7
6,354,889 UART: [ldev] FE.KEYID = 1
6,365,339 UART: [ldev] Erasing FE.KEYID = 1
8,842,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,674 UART: [ldev] --
10,633,704 UART: [fwproc] Wait for Commands...
10,636,060 UART: [fwproc] Recv command 0x46574c44
10,638,094 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,510 >>> mbox cmd response: success
14,497,770 UART: [afmc] ++
14,498,355 UART: [afmc] CDI.KEYID = 6
14,499,227 UART: [afmc] SUBJECT.KEYID = 7
14,500,489 UART: [afmc] AUTHORITY.KEYID = 5
17,002,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,691 UART: [afmc] --
18,801,114 UART: [cold-reset] --
18,804,866 UART: [state] Locking Datavault
18,809,504 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,153 UART: [state] Locking ICCM
18,812,949 UART: [exit] Launching FMC @ 0x40000130
18,821,393 UART:
18,821,633 UART: Running Caliptra FMC ...
18,822,731 UART:
18,822,879 UART: [state] CFI Enabled
18,830,973 UART: [fht] FMC Alias Private Key: 7
20,587,897 UART: [art] Extend RT PCRs Done
20,589,122 UART: [art] Lock RT PCRs Done
20,590,749 UART: [art] Populate DV Done
20,596,098 UART: [fht] FMC Alias Private Key: 7
20,597,762 UART: [art] Derive CDI
20,598,605 UART: [art] Store in in slot 0x4
20,640,945 UART: [art] Derive Key Pair
20,641,942 UART: [art] Store priv key in slot 0x5
23,069,187 UART: [art] Derive Key Pair - Done
23,081,925 UART: [art] Signing Cert with AUTHO
23,083,239 UART: RITY.KEYID = 7
24,788,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,878 UART: [art] PUB.X = B73B02A32604955A854425F2B94C2A2C7DBDD2D01FC75162F2C2EA6831C5B96A854B8CFB4712DD46AD038B28D7B1699D
24,797,172 UART: [art] PUB.Y = F61D62A1268A0AFF0563B3023D50550433B1A2D2069C460A8D5908A86A58501F890B59CFBAAC432924F15FF5D7759F83
24,804,414 UART: [art] SIG.R = 65E9E3B8A0E508105CF7BD753887E94D311F131A6A3D4ACCDA72D1E2EB721BA449BB7E5708649930A5C55826709DE940
24,811,751 UART: [art] SIG.S = A478A0D0B2E58126336A266CF1E7873DE529001F44DE910E3E6736838FDB18E7E929FB11E66239A9CB0DFB8EBC1443B3
25,790,631 UART: Caliptra RT
25,791,339 UART: [state] CFI Enabled
25,909,320 UART: [rt] RT listening for mailbox commands...
25,911,640 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,942,172 UART: [rt]cmd =0x44504543, len=92
31,950,806 >>> mbox cmd response data (6284 bytes)
31,980,094 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,010,030 UART: [rt]cmd =0x43455252, len=4
32,021,439 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,699,072 ready_for_fw is high
3,699,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,515 >>> mbox cmd response: success
18,524,331 UART:
18,524,748 UART: Running Caliptra FMC ...
18,525,854 UART:
18,525,999 UART: [state] CFI Enabled
18,533,622 UART: [fht] FMC Alias Private Key: 7
20,290,391 UART: [art] Extend RT PCRs Done
20,291,633 UART: [art] Lock RT PCRs Done
20,293,174 UART: [art] Populate DV Done
20,298,525 UART: [fht] FMC Alias Private Key: 7
20,300,059 UART: [art] Derive CDI
20,300,871 UART: [art] Store in in slot 0x4
20,342,928 UART: [art] Derive Key Pair
20,343,969 UART: [art] Store priv key in slot 0x5
22,770,864 UART: [art] Derive Key Pair - Done
22,783,538 UART: [art] Signing Cert with AUTHO
22,785,032 UART: RITY.KEYID = 7
24,489,804 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,306 UART: [art] PUB.X = 97A3C091A39227F77669FA3A8F11323E03C3CBD4BF5564FF94D5AF1563B61F7EDBD8255CD384757AC964A3EFDFB5A83F
24,498,587 UART: [art] PUB.Y = 7C42F9E84A000F47C2D632707E0A36393B51C1EC830657EB09F8D4D5B17E5AD93748BC27159342463A2C0BD644E3DEFA
24,505,822 UART: [art] SIG.R = 0823B7F1D23298957AA67A76F2AE6AFC7768527686D953C9CD7D1D26F315336800E40E787E2CC3D03427F53004F0F26F
24,513,143 UART: [art] SIG.S = EB05E01B0FD22BD82E92299F83DD159E4A7337B65B27634BA8066D4ABB67DBBDED9DA21A9245502329BCD01EA111BA27
25,491,970 UART: Caliptra RT
25,492,686 UART: [state] CFI Enabled
25,610,224 UART: [rt] RT listening for mailbox commands...
25,612,524 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,643,013 UART: [rt]cmd =0x44504543, len=92
31,651,776 >>> mbox cmd response data (6284 bytes)
31,681,443 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,711,261 UART: [rt]cmd =0x43455252, len=4
31,722,795 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,130 UART:
192,501 UART: Running Caliptra ROM ...
193,722 UART:
193,880 UART: [state] CFI Enabled
268,179 UART: [state] LifecycleState = Unprovisioned
270,581 UART: [state] DebugLocked = No
272,113 UART: [state] WD Timer not started. Device not locked for debugging
276,210 UART: [kat] SHA2-256
466,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,857 UART: [kat] ++
477,311 UART: [kat] sha1
488,715 UART: [kat] SHA2-256
491,760 UART: [kat] SHA2-384
498,684 UART: [kat] SHA2-512-ACC
501,268 UART: [kat] ECC-384
2,950,009 UART: [kat] HMAC-384Kdf
2,973,998 UART: [kat] LMS
3,505,739 UART: [kat] --
3,510,061 UART: [cold-reset] ++
3,511,433 UART: [fht] FHT @ 0x50003400
3,522,344 UART: [idev] ++
3,522,977 UART: [idev] CDI.KEYID = 6
3,523,934 UART: [idev] SUBJECT.KEYID = 7
3,525,191 UART: [idev] UDS.KEYID = 0
3,526,098 ready_for_fw is high
3,526,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,087 UART: [idev] Erasing UDS.KEYID = 0
6,029,128 UART: [idev] Sha1 KeyId Algorithm
6,052,739 UART: [idev] --
6,056,903 UART: [ldev] ++
6,057,639 UART: [ldev] CDI.KEYID = 6
6,058,560 UART: [ldev] SUBJECT.KEYID = 5
6,059,723 UART: [ldev] AUTHORITY.KEYID = 7
6,060,900 UART: [ldev] FE.KEYID = 1
6,100,623 UART: [ldev] Erasing FE.KEYID = 1
8,605,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,453 UART: [ldev] --
10,413,484 UART: [fwproc] Wait for Commands...
10,415,806 UART: [fwproc] Recv command 0x46574c44
10,418,063 UART: [fwproc] Recv'd Img size: 114448 bytes
13,854,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,588,457 >>> mbox cmd response: success
14,592,156 UART: [afmc] ++
14,592,858 UART: [afmc] CDI.KEYID = 6
14,594,071 UART: [afmc] SUBJECT.KEYID = 7
14,595,515 UART: [afmc] AUTHORITY.KEYID = 5
17,123,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,369 UART: [afmc] --
18,925,282 UART: [cold-reset] --
18,929,203 UART: [state] Locking Datavault
18,936,405 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,546 UART: [state] Locking ICCM
18,940,268 UART: [exit] Launching FMC @ 0x40000130
18,948,891 UART:
18,949,128 UART: Running Caliptra FMC ...
18,950,250 UART:
18,950,413 UART: [state] CFI Enabled
19,009,478 UART: [fht] FMC Alias Private Key: 7
20,773,543 UART: [art] Extend RT PCRs Done
20,774,763 UART: [art] Lock RT PCRs Done
20,776,284 UART: [art] Populate DV Done
20,781,587 UART: [fht] FMC Alias Private Key: 7
20,783,233 UART: [art] Derive CDI
20,784,047 UART: [art] Store in in slot 0x4
20,833,899 UART: [art] Derive Key Pair
20,834,938 UART: [art] Store priv key in slot 0x5
23,297,930 UART: [art] Derive Key Pair - Done
23,310,767 UART: [art] Signing Cert with AUTHO
23,312,076 UART: RITY.KEYID = 7
25,023,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,024,561 UART: [art] PUB.X = F06DBDAC961D7D315CB7E8E237D4DAA0C6C0111DEF44E00804D0C5466827F10E292E640985486DAA45045168AEA8D5B5
25,031,887 UART: [art] PUB.Y = A5A3188A488D381252180506015F82AEE08FCF8B767F9E2A0333691562A40D21DAFDB216C2A8067DF600802249F13E60
25,039,061 UART: [art] SIG.R = 3070B80A2E2311819DB11092E374F9253681D997EB9FA8A4BEACDDF7634989A73CF907406D294DCB4CBF870D7840E0A0
25,046,495 UART: [art] SIG.S = 2875E692B26D9F8709158E269E2D1F4861A7C9A803FBD3021C121BB337225D8CC0FD4FF57B7F17560150778CC4D1BABE
26,025,728 UART: Caliptra RT
26,026,452 UART: [state] CFI Enabled
26,189,886 UART: [rt] RT listening for mailbox commands...
26,192,366 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,223,521 UART: [rt]cmd =0x44504543, len=92
32,295,372 >>> mbox cmd response data (6284 bytes)
32,325,469 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,355,367 UART: [rt]cmd =0x43455252, len=4
32,366,739 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,416,653 ready_for_fw is high
3,417,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,161 >>> mbox cmd response: success
19,024,687 UART:
19,025,069 UART: Running Caliptra FMC ...
19,026,276 UART:
19,026,450 UART: [state] CFI Enabled
19,093,840 UART: [fht] FMC Alias Private Key: 7
20,857,544 UART: [art] Extend RT PCRs Done
20,858,790 UART: [art] Lock RT PCRs Done
20,860,473 UART: [art] Populate DV Done
20,865,891 UART: [fht] FMC Alias Private Key: 7
20,867,540 UART: [art] Derive CDI
20,868,359 UART: [art] Store in in slot 0x4
20,911,184 UART: [art] Derive Key Pair
20,912,219 UART: [art] Store priv key in slot 0x5
23,375,322 UART: [art] Derive Key Pair - Done
23,388,256 UART: [art] Signing Cert with AUTHO
23,389,585 UART: RITY.KEYID = 7
25,101,345 UART: [art] Erasing AUTHORITY.KEYID = 7
25,102,852 UART: [art] PUB.X = 5BCB05907EFC99C60D6B633DFF9BCD6F22DD520D00D83134C07203EFC8531639B0DEBC89EAFC93552053A135B78B5C30
25,110,102 UART: [art] PUB.Y = C2C63BDDCFFA91DBAE914CEEF0110D6323405BE847B58A0A1D4E3FB23AA649362F66964206C3DC5DBC941F677081417D
25,117,355 UART: [art] SIG.R = 8DBE99B4C0456D971718E4A240EAB925F9486D80741199339A57F01F41B06DD727D7F678574E98A2B94665EB637F569D
25,124,743 UART: [art] SIG.S = 4CD6BB4A6EDD51A7ECDA7287D650744DDD9FE07C005FD612B7F631E91FD9D020E6FC94C0B2F7D2876EEE50FC6A3D76FA
26,103,350 UART: Caliptra RT
26,104,090 UART: [state] CFI Enabled
26,270,273 UART: [rt] RT listening for mailbox commands...
26,272,674 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,303,931 UART: [rt]cmd =0x44504543, len=92
32,375,605 >>> mbox cmd response data (6284 bytes)
32,404,932 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,434,829 UART: [rt]cmd =0x43455252, len=4
32,446,339 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,432 UART:
192,795 UART: Running Caliptra ROM ...
193,993 UART:
603,463 UART: [state] CFI Enabled
616,717 UART: [state] LifecycleState = Unprovisioned
619,086 UART: [state] DebugLocked = No
621,241 UART: [state] WD Timer not started. Device not locked for debugging
625,686 UART: [kat] SHA2-256
815,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,343 UART: [kat] ++
826,855 UART: [kat] sha1
837,507 UART: [kat] SHA2-256
840,517 UART: [kat] SHA2-384
846,500 UART: [kat] SHA2-512-ACC
849,070 UART: [kat] ECC-384
3,293,526 UART: [kat] HMAC-384Kdf
3,306,396 UART: [kat] LMS
3,838,218 UART: [kat] --
3,841,860 UART: [cold-reset] ++
3,843,801 UART: [fht] FHT @ 0x50003400
3,856,826 UART: [idev] ++
3,857,530 UART: [idev] CDI.KEYID = 6
3,858,442 UART: [idev] SUBJECT.KEYID = 7
3,859,673 UART: [idev] UDS.KEYID = 0
3,860,590 ready_for_fw is high
3,860,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,489 UART: [idev] Erasing UDS.KEYID = 0
6,336,814 UART: [idev] Sha1 KeyId Algorithm
6,358,403 UART: [idev] --
6,363,091 UART: [ldev] ++
6,363,821 UART: [ldev] CDI.KEYID = 6
6,364,700 UART: [ldev] SUBJECT.KEYID = 5
6,365,898 UART: [ldev] AUTHORITY.KEYID = 7
6,367,117 UART: [ldev] FE.KEYID = 1
6,379,381 UART: [ldev] Erasing FE.KEYID = 1
8,858,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,929 UART: [ldev] --
10,650,855 UART: [fwproc] Wait for Commands...
10,652,299 UART: [fwproc] Recv command 0x46574c44
10,654,603 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,833,214 >>> mbox cmd response: success
14,837,298 UART: [afmc] ++
14,838,009 UART: [afmc] CDI.KEYID = 6
14,839,250 UART: [afmc] SUBJECT.KEYID = 7
14,840,705 UART: [afmc] AUTHORITY.KEYID = 5
17,344,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,415 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,664 UART: [afmc] --
19,143,123 UART: [cold-reset] --
19,146,117 UART: [state] Locking Datavault
19,152,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,480 UART: [state] Locking ICCM
19,156,838 UART: [exit] Launching FMC @ 0x40000130
19,165,521 UART:
19,165,748 UART: Running Caliptra FMC ...
19,166,837 UART:
19,167,009 UART: [state] CFI Enabled
19,175,219 UART: [fht] FMC Alias Private Key: 7
20,931,990 UART: [art] Extend RT PCRs Done
20,933,220 UART: [art] Lock RT PCRs Done
20,934,959 UART: [art] Populate DV Done
20,940,476 UART: [fht] FMC Alias Private Key: 7
20,942,116 UART: [art] Derive CDI
20,942,922 UART: [art] Store in in slot 0x4
20,985,456 UART: [art] Derive Key Pair
20,986,494 UART: [art] Store priv key in slot 0x5
23,412,994 UART: [art] Derive Key Pair - Done
23,425,929 UART: [art] Signing Cert with AUTHO
23,427,225 UART: RITY.KEYID = 7
25,132,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,323 UART: [art] PUB.X = 4EA61855BD75D388BF0AF5F104048B10D15C01BCBBFDA07770E38AE8D32ECB90152C1337235192CF4693349CF3BCA765
25,141,599 UART: [art] PUB.Y = 95454481CAD9F0F4B2E9008A9E5D61E733CD95B051D0C04A24F706C398079430EDD957F24075D328715980DE79028C6B
25,148,825 UART: [art] SIG.R = 25BC2B2591BB52219990CE7F64C1E2249034D0E4F74637CBD34705396DAA6603E521ACFB5A88C2E801121142B4FE59D0
25,156,196 UART: [art] SIG.S = 90281CC81A8A2850DFC43413B98DD89EB276BEB802D785A3C0DDD9D56410E09C78290819A43CC850A42A6C7E96E864C7
26,135,286 UART: Caliptra RT
26,135,991 UART: [state] CFI Enabled
26,253,487 UART: [rt] RT listening for mailbox commands...
26,255,907 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,286,814 UART: [rt]cmd =0x44504543, len=92
32,294,829 >>> mbox cmd response data (6284 bytes)
32,324,320 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,354,349 UART: [rt]cmd =0x43455252, len=4
32,365,713 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,752,297 ready_for_fw is high
3,752,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,574 >>> mbox cmd response: success
19,208,555 UART:
19,208,939 UART: Running Caliptra FMC ...
19,210,042 UART:
19,210,193 UART: [state] CFI Enabled
19,218,195 UART: [fht] FMC Alias Private Key: 7
20,975,155 UART: [art] Extend RT PCRs Done
20,976,377 UART: [art] Lock RT PCRs Done
20,977,914 UART: [art] Populate DV Done
20,982,990 UART: [fht] FMC Alias Private Key: 7
20,984,639 UART: [art] Derive CDI
20,985,455 UART: [art] Store in in slot 0x4
21,027,781 UART: [art] Derive Key Pair
21,028,819 UART: [art] Store priv key in slot 0x5
23,455,667 UART: [art] Derive Key Pair - Done
23,468,551 UART: [art] Signing Cert with AUTHO
23,469,851 UART: RITY.KEYID = 7
25,175,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,022 UART: [art] PUB.X = 6D1B3567DDE4A9C45A60AA2632BB964C3FD667F2DD8AB7CFCB1543475A5FEA2AEB5DFF5CDC355E32D6EBC738984B6F53
25,184,319 UART: [art] PUB.Y = 8A54ED7E596793137B692F1F389D37E5F1DFBB21C33D19A0EECA9EB6A2E403343D93C2C35AFB1FEF5DE0DF4387B18607
25,191,581 UART: [art] SIG.R = 0995B46BEE37FF29851AC241DCF414282C3AE71B00432F2F8DEDFC5020C1640AED98BA29253641B1B0A72ED85EC0977D
25,198,987 UART: [art] SIG.S = 963A45AB5D701577371ED85EB282F9AFF72800E50DE5E3239266211C1B0A9A4F7A21E52AD1A37AAC7D871F6CB1008E42
26,177,368 UART: Caliptra RT
26,178,058 UART: [state] CFI Enabled
26,294,806 UART: [rt] RT listening for mailbox commands...
26,297,188 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,327,847 UART: [rt]cmd =0x44504543, len=92
32,336,684 >>> mbox cmd response data (6284 bytes)
32,365,933 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,395,679 UART: [rt]cmd =0x43455252, len=4
32,407,094 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,973 UART: [kat] SHA2-256
881,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,019 UART: [kat] ++
886,171 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,457 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 ready_for_fw is high
1,480,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,514,849 UART: [ldev] ++
1,515,017 UART: [ldev] CDI.KEYID = 6
1,515,380 UART: [ldev] SUBJECT.KEYID = 5
1,515,806 UART: [ldev] AUTHORITY.KEYID = 7
1,516,269 UART: [ldev] FE.KEYID = 1
1,521,355 UART: [ldev] Erasing FE.KEYID = 1
1,547,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,170 UART: [ldev] --
1,586,443 UART: [fwproc] Waiting for Commands...
1,587,244 UART: [fwproc] Received command 0x46574c44
1,588,035 UART: [fwproc] Received Image of size 114448 bytes
2,887,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,556 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,961 >>> mbox cmd response: success
3,082,159 UART: [afmc] ++
3,082,327 UART: [afmc] CDI.KEYID = 6
3,082,689 UART: [afmc] SUBJECT.KEYID = 7
3,083,114 UART: [afmc] AUTHORITY.KEYID = 5
3,118,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,940 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,630 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,493 UART: [afmc] --
3,161,425 UART: [cold-reset] --
3,162,211 UART: [state] Locking Datavault
3,163,616 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,220 UART: [state] Locking ICCM
3,164,798 UART: [exit] Launching FMC @ 0x40000130
3,170,127 UART:
3,170,143 UART: Running Caliptra FMC ...
3,170,551 UART:
3,170,605 UART: [state] CFI Enabled
3,181,088 UART: [fht] FMC Alias Private Key: 7
3,288,395 UART: [art] Extend RT PCRs Done
3,288,823 UART: [art] Lock RT PCRs Done
3,290,093 UART: [art] Populate DV Done
3,298,122 UART: [fht] FMC Alias Private Key: 7
3,299,274 UART: [art] Derive CDI
3,299,554 UART: [art] Store in in slot 0x4
3,385,069 UART: [art] Derive Key Pair
3,385,429 UART: [art] Store priv key in slot 0x5
3,397,915 UART: [art] Derive Key Pair - Done
3,412,738 UART: [art] Signing Cert with AUTHO
3,413,218 UART: RITY.KEYID = 7
3,428,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,839 UART: [art] PUB.X = 2FAE8E39F85128222FE7E970B7AA9D2277FC5DDD3F14C52D2C3A628F12B7DC27A3B644A04DC8E2F319278F14C3938230
3,435,617 UART: [art] PUB.Y = 53C299BA97A77F2EE0EF31A60EEA92460BD58050C847223D0D583809B0DEFC1DA162B602AC1A15F3B48287614FDB9F54
3,442,560 UART: [art] SIG.R = 78AE59EE666468BD0AC8648FBD0108111C79C243B9CDD7562356C135C131E848B74FA22E655F7EFCDBF6B0330391B3FA
3,449,326 UART: [art] SIG.S = C0688A73DB4C8905655D8F279EEAEEEDB2B9D450DFC1826A40BBB2CCA0879CEFBBE092B2BC599348CBC1E8661868CA97
3,472,684 UART: Caliptra RT
3,472,937 UART: [state] CFI Enabled
3,582,022 UART: [rt] RT listening for mailbox commands...
3,582,692 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,166 UART: [rt]cmd =0x44504543, len=92
3,830,168 >>> mbox cmd response data (6284 bytes)
3,830,169 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,488 UART: [rt]cmd =0x43455252, len=4
3,870,167 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,989 ready_for_fw is high
1,362,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,281 >>> mbox cmd response: success
2,991,377 UART:
2,991,393 UART: Running Caliptra FMC ...
2,991,801 UART:
2,991,855 UART: [state] CFI Enabled
3,002,576 UART: [fht] FMC Alias Private Key: 7
3,110,197 UART: [art] Extend RT PCRs Done
3,110,625 UART: [art] Lock RT PCRs Done
3,112,149 UART: [art] Populate DV Done
3,120,194 UART: [fht] FMC Alias Private Key: 7
3,121,136 UART: [art] Derive CDI
3,121,416 UART: [art] Store in in slot 0x4
3,206,825 UART: [art] Derive Key Pair
3,207,185 UART: [art] Store priv key in slot 0x5
3,220,117 UART: [art] Derive Key Pair - Done
3,234,956 UART: [art] Signing Cert with AUTHO
3,235,436 UART: RITY.KEYID = 7
3,250,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,091 UART: [art] PUB.X = C112A7627B53BA1FB3D0DB030BE0C349315AFD6F058604A594C04BA9722236A08B6230F03257755EB6D85361E3BA59D7
3,257,849 UART: [art] PUB.Y = C4BF3FE124B3BAEEF57898110F42952FC40A7EDA8B49F07AD243CDC2A56BBCDA1F488F5235487A1DD3EB5C62465CFA9B
3,264,817 UART: [art] SIG.R = 0EA357D30DB0CF85A40A168CFE10EBFF0E6CC6F9F8E3784015FFFC7EAF792C2CEAAD62DD33A5C7DBC30DE5A130715095
3,271,600 UART: [art] SIG.S = 662F2BAB1897FBFF7BB13A50C888C42A3CAC13C8D0C48864BC7649C637B4C7184A092A12C8BA84B0AF3AF98E58832F2F
3,295,060 UART: Caliptra RT
3,295,313 UART: [state] CFI Enabled
3,403,573 UART: [rt] RT listening for mailbox commands...
3,404,243 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,607 UART: [rt]cmd =0x44504543, len=92
3,650,816 >>> mbox cmd response data (6284 bytes)
3,650,817 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,136 UART: [rt]cmd =0x43455252, len=4
3,690,903 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
891,062 UART: [kat] SHA2-256
893,000 UART: [kat] SHA2-384
895,675 UART: [kat] SHA2-512-ACC
897,576 UART: [kat] ECC-384
903,265 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,477,206 UART: [cold-reset] ++
1,477,636 UART: [fht] Storing FHT @ 0x50003400
1,480,413 UART: [idev] ++
1,480,581 UART: [idev] CDI.KEYID = 6
1,480,941 UART: [idev] SUBJECT.KEYID = 7
1,481,365 UART: [idev] UDS.KEYID = 0
1,481,710 ready_for_fw is high
1,481,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,713 UART: [idev] Erasing UDS.KEYID = 0
1,506,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,989 UART: [idev] --
1,515,936 UART: [ldev] ++
1,516,104 UART: [ldev] CDI.KEYID = 6
1,516,467 UART: [ldev] SUBJECT.KEYID = 5
1,516,893 UART: [ldev] AUTHORITY.KEYID = 7
1,517,356 UART: [ldev] FE.KEYID = 1
1,522,934 UART: [ldev] Erasing FE.KEYID = 1
1,548,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,921 UART: [ldev] --
1,588,356 UART: [fwproc] Waiting for Commands...
1,589,055 UART: [fwproc] Received command 0x46574c44
1,589,846 UART: [fwproc] Received Image of size 114448 bytes
2,888,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,196 >>> mbox cmd response: success
3,082,354 UART: [afmc] ++
3,082,522 UART: [afmc] CDI.KEYID = 6
3,082,884 UART: [afmc] SUBJECT.KEYID = 7
3,083,309 UART: [afmc] AUTHORITY.KEYID = 5
3,118,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,505 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,195 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,956 UART: [afmc] --
3,162,060 UART: [cold-reset] --
3,162,684 UART: [state] Locking Datavault
3,163,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,447 UART: [state] Locking ICCM
3,165,107 UART: [exit] Launching FMC @ 0x40000130
3,170,436 UART:
3,170,452 UART: Running Caliptra FMC ...
3,170,860 UART:
3,171,003 UART: [state] CFI Enabled
3,181,724 UART: [fht] FMC Alias Private Key: 7
3,289,583 UART: [art] Extend RT PCRs Done
3,290,011 UART: [art] Lock RT PCRs Done
3,291,391 UART: [art] Populate DV Done
3,299,316 UART: [fht] FMC Alias Private Key: 7
3,300,244 UART: [art] Derive CDI
3,300,524 UART: [art] Store in in slot 0x4
3,386,505 UART: [art] Derive Key Pair
3,386,865 UART: [art] Store priv key in slot 0x5
3,399,911 UART: [art] Derive Key Pair - Done
3,414,338 UART: [art] Signing Cert with AUTHO
3,414,818 UART: RITY.KEYID = 7
3,430,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,769 UART: [art] PUB.X = 30C1599D64FF29817547432FB1019B26E77D0A7150529F216D8E448371CAE561E1524E1EC13D86F11E2373C399690D65
3,437,518 UART: [art] PUB.Y = 5146E3032A7B49B03C286E284D8E064BDF58DFB49E7D1DDB9B6FDBCC51F9332738C8CDF7E51CB61723FCE825154F1082
3,444,474 UART: [art] SIG.R = 9910399C4CA76B0043B11E216DCCF929BE1BDFEB08E1848B20DF9DD3F1CF7ABF029D059F3EB0EB2C60764DC7B0D3770B
3,451,230 UART: [art] SIG.S = C8C3A3060BA09F8A5A06F10B9ADFF15DAA40043B915C678DFC56E75C066B1A4AC269AF92D4EE899E88C9E8344A644A22
3,474,785 UART: Caliptra RT
3,475,130 UART: [state] CFI Enabled
3,584,222 UART: [rt] RT listening for mailbox commands...
3,584,892 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,148 UART: [rt]cmd =0x44504543, len=92
3,831,498 >>> mbox cmd response data (6284 bytes)
3,831,499 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,734 UART: [rt]cmd =0x43455252, len=4
3,871,548 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,584 ready_for_fw is high
1,362,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,002 >>> mbox cmd response: success
2,989,344 UART:
2,989,360 UART: Running Caliptra FMC ...
2,989,768 UART:
2,989,911 UART: [state] CFI Enabled
3,000,740 UART: [fht] FMC Alias Private Key: 7
3,109,319 UART: [art] Extend RT PCRs Done
3,109,747 UART: [art] Lock RT PCRs Done
3,111,119 UART: [art] Populate DV Done
3,119,242 UART: [fht] FMC Alias Private Key: 7
3,120,344 UART: [art] Derive CDI
3,120,624 UART: [art] Store in in slot 0x4
3,206,325 UART: [art] Derive Key Pair
3,206,685 UART: [art] Store priv key in slot 0x5
3,219,885 UART: [art] Derive Key Pair - Done
3,234,629 UART: [art] Signing Cert with AUTHO
3,235,109 UART: RITY.KEYID = 7
3,250,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,090 UART: [art] PUB.X = C8D4F8D62832085DF75DEB2DCDBF577064FCFBB51F52A613FBFD107F0677944418CEA50383F18DFC34F9C43503ED4F14
3,257,862 UART: [art] PUB.Y = 3E78DC8CA8E3A2DCE590F49ECCDE1192CE9EC5028FFC251B1DB2506774FDA95F62904BAD824D91CF173FF3CC69A08816
3,264,829 UART: [art] SIG.R = 2D49A552147973FC27DAC145DFD28D8BE8CD0886C4F3244817E1A8E3BA2CA59272E7A7C384147824189B6485728AA3DF
3,271,598 UART: [art] SIG.S = D38B5538D09A587D7399E89B93118DD40546E36B4FEE2C4EBC67267A5C662BB9B82EE65713C22AAB550C8DDF9EE5C7E8
3,295,495 UART: Caliptra RT
3,295,840 UART: [state] CFI Enabled
3,404,007 UART: [rt] RT listening for mailbox commands...
3,404,677 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,121 UART: [rt]cmd =0x44504543, len=92
3,652,707 >>> mbox cmd response data (6284 bytes)
3,652,708 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,283 UART: [rt]cmd =0x43455252, len=4
3,693,100 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,861 UART: [kat] SHA2-256
903,801 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,554 UART: [kat] HMAC-384Kdf
922,998 UART: [kat] LMS
1,171,326 UART: [kat] --
1,171,939 UART: [cold-reset] ++
1,172,285 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 ready_for_fw is high
1,176,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,894 UART: [idev] Erasing UDS.KEYID = 0
1,201,209 UART: [idev] Sha1 KeyId Algorithm
1,209,773 UART: [idev] --
1,210,869 UART: [ldev] ++
1,211,037 UART: [ldev] CDI.KEYID = 6
1,211,400 UART: [ldev] SUBJECT.KEYID = 5
1,211,826 UART: [ldev] AUTHORITY.KEYID = 7
1,212,289 UART: [ldev] FE.KEYID = 1
1,217,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,544 UART: [fwproc] Wait for Commands...
1,283,290 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,072 >>> mbox cmd response: success
2,777,214 UART: [afmc] ++
2,777,382 UART: [afmc] CDI.KEYID = 6
2,777,744 UART: [afmc] SUBJECT.KEYID = 7
2,778,169 UART: [afmc] AUTHORITY.KEYID = 5
2,813,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,473 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,663 UART: [afmc] --
2,856,569 UART: [cold-reset] --
2,857,467 UART: [state] Locking Datavault
2,858,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,984 UART: [state] Locking ICCM
2,859,622 UART: [exit] Launching FMC @ 0x40000130
2,864,951 UART:
2,864,967 UART: Running Caliptra FMC ...
2,865,375 UART:
2,865,429 UART: [state] CFI Enabled
2,875,822 UART: [fht] FMC Alias Private Key: 7
2,984,043 UART: [art] Extend RT PCRs Done
2,984,471 UART: [art] Lock RT PCRs Done
2,985,779 UART: [art] Populate DV Done
2,994,174 UART: [fht] FMC Alias Private Key: 7
2,995,294 UART: [art] Derive CDI
2,995,574 UART: [art] Store in in slot 0x4
3,081,667 UART: [art] Derive Key Pair
3,082,027 UART: [art] Store priv key in slot 0x5
3,094,839 UART: [art] Derive Key Pair - Done
3,109,657 UART: [art] Signing Cert with AUTHO
3,110,137 UART: RITY.KEYID = 7
3,125,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,942 UART: [art] PUB.X = 27779E127A72FE98C6376C8719567529CEC37997B1C1CCB36E7B32C15C4C2CB05A04366ECF15CF412D2B4344557809CD
3,132,706 UART: [art] PUB.Y = CDD49C59E2F9F1E6D2AE1A65E71CC58C899AFC33E4CDBDB79016BB23D58D19FF5F5B4B0968A6E144B61214256DBB5996
3,139,671 UART: [art] SIG.R = 8E239E12F3367DF8BD2D7311EB8315DCFA38D9B0871E05B8F33C5E52B538270DA71B67E0C2D9F8E93F57FB9D94739957
3,146,441 UART: [art] SIG.S = 4FEEA86CA905E6D301FBF13C2484AED7ED52DAB33CF5DC14339CCECF070BD88385D5B21A45B7BB4A013BE951A35B8111
3,170,079 UART: Caliptra RT
3,170,332 UART: [state] CFI Enabled
3,277,251 UART: [rt] RT listening for mailbox commands...
3,277,921 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,331 UART: [rt]cmd =0x44504543, len=92
3,524,529 >>> mbox cmd response data (6284 bytes)
3,524,530 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,831 UART: [rt]cmd =0x43455252, len=4
3,564,592 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 ready_for_fw is high
1,060,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,987 >>> mbox cmd response: success
2,689,921 UART:
2,689,937 UART: Running Caliptra FMC ...
2,690,345 UART:
2,690,399 UART: [state] CFI Enabled
2,700,620 UART: [fht] FMC Alias Private Key: 7
2,808,177 UART: [art] Extend RT PCRs Done
2,808,605 UART: [art] Lock RT PCRs Done
2,810,101 UART: [art] Populate DV Done
2,818,116 UART: [fht] FMC Alias Private Key: 7
2,819,210 UART: [art] Derive CDI
2,819,490 UART: [art] Store in in slot 0x4
2,905,355 UART: [art] Derive Key Pair
2,905,715 UART: [art] Store priv key in slot 0x5
2,918,879 UART: [art] Derive Key Pair - Done
2,933,563 UART: [art] Signing Cert with AUTHO
2,934,043 UART: RITY.KEYID = 7
2,949,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,068 UART: [art] PUB.X = 6A5AAC6B928B12D45F4DB0709399B85ED0B5C51E93EF1F06E6A911D45CC4C64F12186FCB4B5D12EC2166632A1FD0A624
2,956,847 UART: [art] PUB.Y = EAB2F3D5844B3429F0275EBF1BC4F8254BD9DECCE9FEA4ECF7519A2D4C0ACD263CEECA9CF687D312BCC79434392762F8
2,963,820 UART: [art] SIG.R = 1CF9E8A525399FFBB1937711840399425110BB5CEB1E6D5B5352DF98F83DA0E1C87AC55D8A020D972B772D768C227F55
2,970,583 UART: [art] SIG.S = 895D08974C52DB9C58FB4706E2CD5D44355A4F36FAC2113DB9EC4F5F8F8C6BB571CA49E5F947DE2E9E50FC85D8B975DB
2,994,948 UART: Caliptra RT
2,995,201 UART: [state] CFI Enabled
3,103,818 UART: [rt] RT listening for mailbox commands...
3,104,488 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,106 UART: [rt]cmd =0x44504543, len=92
3,350,680 >>> mbox cmd response data (6284 bytes)
3,350,681 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,000 UART: [rt]cmd =0x43455252, len=4
3,390,863 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
893,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,480 UART: [kat] ++
897,632 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,855 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,598 UART: [cold-reset] ++
1,173,080 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 ready_for_fw is high
1,177,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,741 UART: [idev] Erasing UDS.KEYID = 0
1,202,004 UART: [idev] Sha1 KeyId Algorithm
1,210,536 UART: [idev] --
1,211,550 UART: [ldev] ++
1,211,718 UART: [ldev] CDI.KEYID = 6
1,212,081 UART: [ldev] SUBJECT.KEYID = 5
1,212,507 UART: [ldev] AUTHORITY.KEYID = 7
1,212,970 UART: [ldev] FE.KEYID = 1
1,218,086 UART: [ldev] Erasing FE.KEYID = 1
1,244,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,366 UART: [ldev] --
1,283,835 UART: [fwproc] Wait for Commands...
1,284,519 UART: [fwproc] Recv command 0x46574c44
1,285,247 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,679 >>> mbox cmd response: success
2,778,731 UART: [afmc] ++
2,778,899 UART: [afmc] CDI.KEYID = 6
2,779,261 UART: [afmc] SUBJECT.KEYID = 7
2,779,686 UART: [afmc] AUTHORITY.KEYID = 5
2,816,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,660 UART: [afmc] --
2,859,692 UART: [cold-reset] --
2,860,626 UART: [state] Locking Datavault
2,861,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,283 UART: [state] Locking ICCM
2,862,827 UART: [exit] Launching FMC @ 0x40000130
2,868,156 UART:
2,868,172 UART: Running Caliptra FMC ...
2,868,580 UART:
2,868,723 UART: [state] CFI Enabled
2,879,470 UART: [fht] FMC Alias Private Key: 7
2,987,239 UART: [art] Extend RT PCRs Done
2,987,667 UART: [art] Lock RT PCRs Done
2,989,085 UART: [art] Populate DV Done
2,997,380 UART: [fht] FMC Alias Private Key: 7
2,998,524 UART: [art] Derive CDI
2,998,804 UART: [art] Store in in slot 0x4
3,084,503 UART: [art] Derive Key Pair
3,084,863 UART: [art] Store priv key in slot 0x5
3,097,841 UART: [art] Derive Key Pair - Done
3,112,540 UART: [art] Signing Cert with AUTHO
3,113,020 UART: RITY.KEYID = 7
3,128,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,077 UART: [art] PUB.X = E357B35023C71AFB69F866F9C0315C97439F8D9AC24A628EEF6EE6C6A6E7DB4FB1F45512583E39F9FE3900579C3EA5EA
3,135,837 UART: [art] PUB.Y = 176A528ED098CE7A586A4E9D887615D3F98A74B00DC0074AB0AB50BC1326A93330F09821ED39029143B4E213794DA2DF
3,142,778 UART: [art] SIG.R = C6368BA5850351779A70515A6D2C0EA24A47568DA32082955583DF24870D5D2320E397A8E803780663274022F9456AB6
3,149,515 UART: [art] SIG.S = 65082C7E3DB13160B807A521A483EE049728DAB588AD07BBE163D4BCCDF13B48FFF76E176D67A43E868D7E462DF7B68C
3,173,286 UART: Caliptra RT
3,173,631 UART: [state] CFI Enabled
3,281,320 UART: [rt] RT listening for mailbox commands...
3,281,990 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,370 UART: [rt]cmd =0x44504543, len=92
3,528,585 >>> mbox cmd response data (6284 bytes)
3,528,586 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,897 UART: [rt]cmd =0x43455252, len=4
3,568,722 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,040 ready_for_fw is high
1,060,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,016 >>> mbox cmd response: success
2,690,048 UART:
2,690,064 UART: Running Caliptra FMC ...
2,690,472 UART:
2,690,615 UART: [state] CFI Enabled
2,701,010 UART: [fht] FMC Alias Private Key: 7
2,808,877 UART: [art] Extend RT PCRs Done
2,809,305 UART: [art] Lock RT PCRs Done
2,810,863 UART: [art] Populate DV Done
2,819,334 UART: [fht] FMC Alias Private Key: 7
2,820,312 UART: [art] Derive CDI
2,820,592 UART: [art] Store in in slot 0x4
2,906,601 UART: [art] Derive Key Pair
2,906,961 UART: [art] Store priv key in slot 0x5
2,919,983 UART: [art] Derive Key Pair - Done
2,934,923 UART: [art] Signing Cert with AUTHO
2,935,403 UART: RITY.KEYID = 7
2,950,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,102 UART: [art] PUB.X = F7C77B058FEA3932C6F85C6F2E7E2B0AAE8CF1759B6FC1F059F99E73BE16D3528EFD46089B076930D6C98126CA2F8911
2,957,870 UART: [art] PUB.Y = 9DEFC7237DECBB10E6C83D95689034A0D77F13E447EDB74E51CAE9A33A31B385AA76AEAF73CAC5E19D1299ACEAA61DC7
2,964,846 UART: [art] SIG.R = 29162B68B63FB1654CA3DA6C86D2D2662A980C31D3ED363AFB096BB736EE27956FB94CBCBFB9849812A006F50BD4E8DE
2,971,618 UART: [art] SIG.S = B929000539931F9CF52DF674FC013E0A56A789A8EB8E8608C5421C224725D33AC67BFF712BB4858A6E2208F2A77A467F
2,995,164 UART: Caliptra RT
2,995,509 UART: [state] CFI Enabled
3,103,366 UART: [rt] RT listening for mailbox commands...
3,104,036 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,144 UART: [rt]cmd =0x44504543, len=92
3,350,496 >>> mbox cmd response data (6284 bytes)
3,350,497 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,890 UART: [rt]cmd =0x43455252, len=4
3,390,917 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,412 UART: [fwproc] Wait for Commands...
1,281,225 UART: [fwproc] Recv command 0x46574c44
1,281,958 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,028 >>> mbox cmd response: success
2,775,257 UART: [afmc] ++
2,775,425 UART: [afmc] CDI.KEYID = 6
2,775,788 UART: [afmc] SUBJECT.KEYID = 7
2,776,214 UART: [afmc] AUTHORITY.KEYID = 5
2,811,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,708 UART: [afmc] --
2,854,608 UART: [cold-reset] --
2,855,282 UART: [state] Locking Datavault
2,856,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,977 UART: [state] Locking ICCM
2,857,613 UART: [exit] Launching FMC @ 0x40000130
2,862,942 UART:
2,862,958 UART: Running Caliptra FMC ...
2,863,366 UART:
2,863,420 UART: [state] CFI Enabled
2,873,975 UART: [fht] FMC Alias Private Key: 7
2,982,464 UART: [art] Extend RT PCRs Done
2,982,892 UART: [art] Lock RT PCRs Done
2,984,384 UART: [art] Populate DV Done
2,992,531 UART: [fht] FMC Alias Private Key: 7
2,993,499 UART: [art] Derive CDI
2,993,779 UART: [art] Store in in slot 0x4
3,079,492 UART: [art] Derive Key Pair
3,079,852 UART: [art] Store priv key in slot 0x5
3,093,328 UART: [art] Derive Key Pair - Done
3,108,106 UART: [art] Signing Cert with AUTHO
3,108,586 UART: RITY.KEYID = 7
3,123,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,487 UART: [art] PUB.X = D0A50DE4986797BE5AAA8DEFF1892F63189DCB2E4F89A1FB56F97C503DD3EDDFFCCA1DD144D8BA643F93B5A4D60F74AA
3,131,281 UART: [art] PUB.Y = 8E13FAC309FE5CC4E6AA5D07EDE400F5062A23A7804103385714C210ED257A817F1524401B63DCFF874C31C1D9A5189D
3,138,201 UART: [art] SIG.R = 4F35514687F356BFF57A8C32E84CC58D90862BACFB8950FA16901AF9D84C2AAF189B5F00D9B14F920E0A67BC21D2BF95
3,144,955 UART: [art] SIG.S = F887A1435C7AE4F4B99C157361AEC7FF8B50C6542C5F50129C46BAF4BF7E1D719624A6844EB6884A9841F24E297BC633
3,168,560 UART: Caliptra RT
3,168,813 UART: [state] CFI Enabled
3,276,800 UART: [rt] RT listening for mailbox commands...
3,277,470 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,898 UART: [rt]cmd =0x44504543, len=92
3,523,914 >>> mbox cmd response data (6284 bytes)
3,523,915 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,456 UART: [rt]cmd =0x43455252, len=4
3,564,317 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,934 ready_for_fw is high
1,055,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,428 >>> mbox cmd response: success
2,687,778 UART:
2,687,794 UART: Running Caliptra FMC ...
2,688,202 UART:
2,688,256 UART: [state] CFI Enabled
2,698,447 UART: [fht] FMC Alias Private Key: 7
2,806,372 UART: [art] Extend RT PCRs Done
2,806,800 UART: [art] Lock RT PCRs Done
2,808,360 UART: [art] Populate DV Done
2,816,641 UART: [fht] FMC Alias Private Key: 7
2,817,793 UART: [art] Derive CDI
2,818,073 UART: [art] Store in in slot 0x4
2,903,294 UART: [art] Derive Key Pair
2,903,654 UART: [art] Store priv key in slot 0x5
2,916,824 UART: [art] Derive Key Pair - Done
2,931,894 UART: [art] Signing Cert with AUTHO
2,932,374 UART: RITY.KEYID = 7
2,947,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,359 UART: [art] PUB.X = B1EE26D95F7B7917D38C5C67BA2353525BCD307308854A05DB74AC7AC300B1B08B32E4613E77EFD08D641BAF4B3FFECD
2,955,117 UART: [art] PUB.Y = 15B136C057C6342BF2A2EC805D04957FD4BA594E7353BDE5661739054AD885840A916A29F63381B4F5981EDA8A3433D1
2,962,054 UART: [art] SIG.R = 0BCFE7500C8E99CD962899D2C61061D599B5D917EC88D2838B779A7F017FB4C3E5B900E5EFDF3369304BF72A76451463
2,968,795 UART: [art] SIG.S = DF512F0F44A10A5AACE52A94E91101A3A32B8D8F0A2F88E684D46425372B6AB5B3DC8B31C7ADA3A54C7E67CBE32982C0
2,992,222 UART: Caliptra RT
2,992,475 UART: [state] CFI Enabled
3,099,414 UART: [rt] RT listening for mailbox commands...
3,100,084 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,170 UART: [rt]cmd =0x44504543, len=92
3,346,687 >>> mbox cmd response data (6284 bytes)
3,346,688 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,233 UART: [rt]cmd =0x43455252, len=4
3,387,232 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
891,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,948 UART: [kat] ++
896,100 UART: [kat] sha1
900,474 UART: [kat] SHA2-256
902,414 UART: [kat] SHA2-384
905,209 UART: [kat] SHA2-512-ACC
907,110 UART: [kat] ECC-384
917,277 UART: [kat] HMAC-384Kdf
921,863 UART: [kat] LMS
1,170,175 UART: [kat] --
1,170,806 UART: [cold-reset] ++
1,171,334 UART: [fht] FHT @ 0x50003400
1,174,062 UART: [idev] ++
1,174,230 UART: [idev] CDI.KEYID = 6
1,174,591 UART: [idev] SUBJECT.KEYID = 7
1,175,016 UART: [idev] UDS.KEYID = 0
1,175,362 ready_for_fw is high
1,175,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,062 UART: [idev] Erasing UDS.KEYID = 0
1,200,680 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,957 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,738 UART: [fwproc] Recv command 0x46574c44
1,284,471 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,621 >>> mbox cmd response: success
2,776,644 UART: [afmc] ++
2,776,812 UART: [afmc] CDI.KEYID = 6
2,777,175 UART: [afmc] SUBJECT.KEYID = 7
2,777,601 UART: [afmc] AUTHORITY.KEYID = 5
2,813,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,355 UART: [afmc] --
2,857,387 UART: [cold-reset] --
2,858,383 UART: [state] Locking Datavault
2,859,488 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,092 UART: [state] Locking ICCM
2,860,526 UART: [exit] Launching FMC @ 0x40000130
2,865,855 UART:
2,865,871 UART: Running Caliptra FMC ...
2,866,279 UART:
2,866,422 UART: [state] CFI Enabled
2,877,189 UART: [fht] FMC Alias Private Key: 7
2,985,018 UART: [art] Extend RT PCRs Done
2,985,446 UART: [art] Lock RT PCRs Done
2,986,888 UART: [art] Populate DV Done
2,995,297 UART: [fht] FMC Alias Private Key: 7
2,996,341 UART: [art] Derive CDI
2,996,621 UART: [art] Store in in slot 0x4
3,082,776 UART: [art] Derive Key Pair
3,083,136 UART: [art] Store priv key in slot 0x5
3,096,222 UART: [art] Derive Key Pair - Done
3,110,722 UART: [art] Signing Cert with AUTHO
3,111,202 UART: RITY.KEYID = 7
3,126,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,313 UART: [art] PUB.X = E5DB00802F66BDDF742B9CD83D282D6B3149CDC674F3E0D92678FE9B4017BE80185F7AF3C5229532662252DE6CE86EFB
3,134,071 UART: [art] PUB.Y = 059FA4B1BFCB10EF85AAB26EAB91A3C1983C7AF7256D4FC0BC449954BEAA18A0EC14D7086033115AACCEFFF7E30E5B34
3,141,038 UART: [art] SIG.R = 3DA1A6EBE1E07C550662FB60B3104B69C2B84DD4060EA358DEE7C28A4AC7543B71B2AAC7A6E78684D3B18719907B58EE
3,147,811 UART: [art] SIG.S = D966954C9BD1714B6EACEA031026BCC0CE2CC0E7E4A70A659A8D5CBC920DA580FEB4043B47EDFEE4A4D01509A8F8488D
3,172,065 UART: Caliptra RT
3,172,410 UART: [state] CFI Enabled
3,280,017 UART: [rt] RT listening for mailbox commands...
3,280,687 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,129 UART: [rt]cmd =0x44504543, len=92
3,526,609 >>> mbox cmd response data (6284 bytes)
3,526,610 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,885 UART: [rt]cmd =0x43455252, len=4
3,566,738 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 ready_for_fw is high
1,056,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,943 >>> mbox cmd response: success
2,685,275 UART:
2,685,291 UART: Running Caliptra FMC ...
2,685,699 UART:
2,685,842 UART: [state] CFI Enabled
2,696,341 UART: [fht] FMC Alias Private Key: 7
2,804,494 UART: [art] Extend RT PCRs Done
2,804,922 UART: [art] Lock RT PCRs Done
2,806,316 UART: [art] Populate DV Done
2,814,615 UART: [fht] FMC Alias Private Key: 7
2,815,771 UART: [art] Derive CDI
2,816,051 UART: [art] Store in in slot 0x4
2,901,648 UART: [art] Derive Key Pair
2,902,008 UART: [art] Store priv key in slot 0x5
2,915,456 UART: [art] Derive Key Pair - Done
2,930,215 UART: [art] Signing Cert with AUTHO
2,930,695 UART: RITY.KEYID = 7
2,945,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,396 UART: [art] PUB.X = 7857500EEA2D4F59C7B3F933AF8AFB7FBE54D091EF35D3ADA44E3879A96EC0B862F10AB80440C956DDBD02E722D3F6C6
2,953,172 UART: [art] PUB.Y = B0836C56EEB8CF4051FC76652E1A843CC0202F7F1DD982EA94D432B5306A09E0975C4661E7C911C5909C55EA151F28B8
2,960,121 UART: [art] SIG.R = FD968847274550107FA1EC2B14FFBBED98456242D3601CB4E7B5CD2D5DC68885334DB641BB5160B2378353CDA02F2DD8
2,966,897 UART: [art] SIG.S = B9B4EE84E959B6B55FBB1E93735B57E89D4F8220B44EA71FCB83B15F7F7943DD54CB2CD93B4C7804E2B527F43BE227C5
2,990,705 UART: Caliptra RT
2,991,050 UART: [state] CFI Enabled
3,099,214 UART: [rt] RT listening for mailbox commands...
3,099,884 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,186 UART: [rt]cmd =0x44504543, len=92
3,347,141 >>> mbox cmd response data (6284 bytes)
3,347,142 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,763 UART: [rt]cmd =0x43455252, len=4
3,387,605 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,334 UART:
192,687 UART: Running Caliptra ROM ...
193,865 UART:
194,028 UART: [state] CFI Enabled
264,331 UART: [state] LifecycleState = Unprovisioned
266,244 UART: [state] DebugLocked = No
268,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,923 UART: [kat] SHA2-256
442,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,091 UART: [kat] ++
453,616 UART: [kat] sha1
464,654 UART: [kat] SHA2-256
467,379 UART: [kat] SHA2-384
472,331 UART: [kat] SHA2-512-ACC
474,749 UART: [kat] ECC-384
2,766,696 UART: [kat] HMAC-384Kdf
2,779,779 UART: [kat] LMS
3,970,133 UART: [kat] --
3,972,659 UART: [cold-reset] ++
3,973,887 UART: [fht] Storing FHT @ 0x50003400
3,984,655 UART: [idev] ++
3,985,219 UART: [idev] CDI.KEYID = 6
3,986,206 UART: [idev] SUBJECT.KEYID = 7
3,987,387 UART: [idev] UDS.KEYID = 0
3,988,397 ready_for_fw is high
3,988,598 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,216 UART: [idev] Erasing UDS.KEYID = 0
7,323,860 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,312 UART: [idev] --
7,349,490 UART: [ldev] ++
7,350,117 UART: [ldev] CDI.KEYID = 6
7,351,222 UART: [ldev] SUBJECT.KEYID = 5
7,352,357 UART: [ldev] AUTHORITY.KEYID = 7
7,353,536 UART: [ldev] FE.KEYID = 1
7,380,009 UART: [ldev] Erasing FE.KEYID = 1
10,714,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,069,723 UART: [ldev] --
13,074,881 UART: [fwproc] Waiting for Commands...
13,077,364 UART: [fwproc] Received command 0x46574c44
13,079,569 UART: [fwproc] Received Image of size 114124 bytes
17,130,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,208,666 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,277,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,595,564 >>> mbox cmd response: success
17,596,160 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,599,757 UART: [afmc] ++
17,600,341 UART: [afmc] CDI.KEYID = 6
17,601,311 UART: [afmc] SUBJECT.KEYID = 7
17,602,526 UART: [afmc] AUTHORITY.KEYID = 5
20,971,018 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,269,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,272,117 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,286,562 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,301,352 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,315,820 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,338,356 UART: [afmc] --
23,341,629 UART: [cold-reset] --
23,344,732 UART: [state] Locking Datavault
23,349,654 UART: [state] Locking PCR0, PCR1 and PCR31
23,351,563 UART: [state] Locking ICCM
23,352,653 UART: [exit] Launching FMC @ 0x40000130
23,361,055 UART:
23,361,295 UART: Running Caliptra FMC ...
23,362,393 UART:
23,362,558 UART: [state] CFI Enabled
23,427,854 UART: [fht] FMC Alias Private Key: 7
25,766,252 UART: [art] Extend RT PCRs Done
25,767,474 UART: [art] Lock RT PCRs Done
25,769,045 UART: [art] Populate DV Done
25,774,728 UART: [fht] FMC Alias Private Key: 7
25,776,262 UART: [art] Derive CDI
25,777,094 UART: [art] Store in in slot 0x4
25,836,676 UART: [art] Derive Key Pair
25,837,702 UART: [art] Store priv key in slot 0x5
29,130,725 UART: [art] Derive Key Pair - Done
29,143,623 UART: [art] Signing Cert with AUTHO
29,144,927 UART: RITY.KEYID = 7
31,432,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,434,484 UART: [art] PUB.X = 29D533876F6DA3D28765893EAFBA801F3408A2901771A962A4DB7834CF1BB82105F90B92B676096FF00721616FD389B7
31,441,679 UART: [art] PUB.Y = A606B9444DEAD985FA2760D2D1E1E561F4900CB07346AC7919DB6A7E232C0FC7ECAA6235D55768E3E09CEFEA4C285FCE
31,448,975 UART: [art] SIG.R = FA2EA6140E6F499081F4A7B2D4FC78A03D7F1A771D00790A06F23EC29C2265ED04886E8189045E33DA7B9245228E368F
31,456,318 UART: [art] SIG.S = 9C1349C6B5934527D91399AE9F76104AD0F7A6A9F81F4BCFBA13B4A59DFB8C1931855E03F18065B52D8BC71E4D1D6F55
32,761,971 UART: Caliptra RT
32,762,690 UART: [state] CFI Enabled
32,923,465 UART: [rt] RT listening for mailbox commands...
32,955,354 UART: [rt]cmd =0x44504543, len=92
38,722,530 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,804,816 ready_for_fw is high
3,805,187 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,855,512 >>> mbox cmd response: success
17,856,432 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,544,647 UART:
23,545,038 UART: Running Caliptra FMC ...
23,546,147 UART:
23,546,304 UART: [state] CFI Enabled
23,614,439 UART: [fht] FMC Alias Private Key: 7
25,951,963 UART: [art] Extend RT PCRs Done
25,953,195 UART: [art] Lock RT PCRs Done
25,954,959 UART: [art] Populate DV Done
25,960,622 UART: [fht] FMC Alias Private Key: 7
25,962,065 UART: [art] Derive CDI
25,962,840 UART: [art] Store in in slot 0x4
26,022,778 UART: [art] Derive Key Pair
26,023,846 UART: [art] Store priv key in slot 0x5
29,316,151 UART: [art] Derive Key Pair - Done
29,329,084 UART: [art] Signing Cert with AUTHO
29,330,385 UART: RITY.KEYID = 7
31,617,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,195 UART: [art] PUB.X = 335D97298CD9E1440DF63F0CA4E8A1AE8029D6EE3CB35F07B55295B13E520AE3889CA2C89BB09E610029387C790B41EE
31,626,448 UART: [art] PUB.Y = 7FD28731B9129B9C6034AE85604778E67420001A5C43F51ACDF519041AFCE582ECCD54D2950F49BEA5170015D0A3C510
31,633,629 UART: [art] SIG.R = 1517D11000E2532726D3E2B1975D2FB47CB09697F426871CCB928DCB35AB439C0081DFC0569F2C01CD8311EEBC847F66
31,640,977 UART: [art] SIG.S = 86B2ED5145857D847D907EAE707F26D58075DE154B687588ADCB942102B98D0BC37BBDF4B3791BC52D94E475F0652520
32,945,925 UART: Caliptra RT
32,946,642 UART: [state] CFI Enabled
33,107,961 UART: [rt] RT listening for mailbox commands...
33,139,776 UART: [rt]cmd =0x44504543, len=92
38,905,965 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,393 UART:
192,773 UART: Running Caliptra ROM ...
193,915 UART:
603,663 UART: [state] CFI Enabled
615,792 UART: [state] LifecycleState = Unprovisioned
617,762 UART: [state] DebugLocked = No
620,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,785 UART: [kat] SHA2-256
795,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,096 UART: [kat] ++
806,574 UART: [kat] sha1
817,251 UART: [kat] SHA2-256
819,901 UART: [kat] SHA2-384
826,098 UART: [kat] SHA2-512-ACC
828,465 UART: [kat] ECC-384
3,112,927 UART: [kat] HMAC-384Kdf
3,123,733 UART: [kat] LMS
4,313,831 UART: [kat] --
4,318,909 UART: [cold-reset] ++
4,320,119 UART: [fht] Storing FHT @ 0x50003400
4,332,592 UART: [idev] ++
4,333,157 UART: [idev] CDI.KEYID = 6
4,334,041 UART: [idev] SUBJECT.KEYID = 7
4,335,350 UART: [idev] UDS.KEYID = 0
4,336,299 ready_for_fw is high
4,336,478 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,809 UART: [idev] Erasing UDS.KEYID = 0
7,622,738 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,474 UART: [idev] --
7,650,977 UART: [ldev] ++
7,651,632 UART: [ldev] CDI.KEYID = 6
7,652,523 UART: [ldev] SUBJECT.KEYID = 5
7,653,728 UART: [ldev] AUTHORITY.KEYID = 7
7,655,009 UART: [ldev] FE.KEYID = 1
7,664,705 UART: [ldev] Erasing FE.KEYID = 1
10,958,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,405 UART: [ldev] --
13,318,442 UART: [fwproc] Waiting for Commands...
13,320,253 UART: [fwproc] Received command 0x46574c44
13,322,497 UART: [fwproc] Received Image of size 114124 bytes
17,380,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,004 >>> mbox cmd response: success
17,842,663 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,846,589 UART: [afmc] ++
17,847,225 UART: [afmc] CDI.KEYID = 6
17,848,285 UART: [afmc] SUBJECT.KEYID = 7
17,849,388 UART: [afmc] AUTHORITY.KEYID = 5
21,158,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,429 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,805 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,617 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,078 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,563 UART: [afmc] --
23,522,788 UART: [cold-reset] --
23,527,615 UART: [state] Locking Datavault
23,532,806 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,495 UART: [state] Locking ICCM
23,536,754 UART: [exit] Launching FMC @ 0x40000130
23,545,129 UART:
23,545,379 UART: Running Caliptra FMC ...
23,546,485 UART:
23,546,640 UART: [state] CFI Enabled
23,554,464 UART: [fht] FMC Alias Private Key: 7
25,885,097 UART: [art] Extend RT PCRs Done
25,886,319 UART: [art] Lock RT PCRs Done
25,887,560 UART: [art] Populate DV Done
25,892,911 UART: [fht] FMC Alias Private Key: 7
25,894,651 UART: [art] Derive CDI
25,895,489 UART: [art] Store in in slot 0x4
25,938,144 UART: [art] Derive Key Pair
25,939,148 UART: [art] Store priv key in slot 0x5
29,181,939 UART: [art] Derive Key Pair - Done
29,194,770 UART: [art] Signing Cert with AUTHO
29,196,066 UART: RITY.KEYID = 7
31,475,542 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,044 UART: [art] PUB.X = 4DBDBB73DC47D4FA54ADD0BF91189423F532E874239CBB3E8E99B0B2A89A68BB0F563C852B4E5AB268F05E8DC136500B
31,484,285 UART: [art] PUB.Y = 8F097D9BE06949B44E1CE9BE9DC1564B07133D367585EED59E4698CBB8D541FBFA79152C6A1591D6D158AFF1EA87D5EE
31,491,507 UART: [art] SIG.R = 58816717A0B5531DBC9A26849970C07E8F306F5C43422A0AB86FE25B55C31917560EDDE68C9138C99F629C482B962253
31,498,907 UART: [art] SIG.S = 2620885E9EC13CD2406F168512EDFE1F9898374BB02517FF3DEA8485F7AED029FD92BA5A0400C13A78558D4480E6DC59
32,804,275 UART: Caliptra RT
32,804,986 UART: [state] CFI Enabled
32,921,777 UART: [rt] RT listening for mailbox commands...
32,953,885 UART: [rt]cmd =0x44504543, len=92
38,627,629 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,125,356 ready_for_fw is high
4,125,912 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,748 >>> mbox cmd response: success
18,077,638 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,714,129 UART:
23,714,511 UART: Running Caliptra FMC ...
23,715,613 UART:
23,715,762 UART: [state] CFI Enabled
23,723,887 UART: [fht] FMC Alias Private Key: 7
26,054,383 UART: [art] Extend RT PCRs Done
26,055,630 UART: [art] Lock RT PCRs Done
26,057,431 UART: [art] Populate DV Done
26,062,738 UART: [fht] FMC Alias Private Key: 7
26,064,386 UART: [art] Derive CDI
26,065,206 UART: [art] Store in in slot 0x4
26,107,717 UART: [art] Derive Key Pair
26,108,761 UART: [art] Store priv key in slot 0x5
29,351,061 UART: [art] Derive Key Pair - Done
29,364,235 UART: [art] Signing Cert with AUTHO
29,365,576 UART: RITY.KEYID = 7
31,644,758 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,261 UART: [art] PUB.X = 0E7327AF690BE8F511E632FD9A22D1A327FCA360D073A24C65FC3E739A62C4F59370956F9EA77F138DD486632EBEAD0C
31,653,517 UART: [art] PUB.Y = AACC988A3509165735D364EE04E7DEF9403F31A1ABCC3A4E98E477FA769F6487FBAE4233970285D5550F11BC67EF1926
31,660,751 UART: [art] SIG.R = 013203B0044DF308E27F3855FFC98693B4F7EEFD7E664241E361902C994AC7E3C999671B8D8A7B3C7D06F4CFC6BE7DB3
31,668,148 UART: [art] SIG.S = EB7271AB8DDEDC20D2C49575CA03D35A2AF2F8EB5D84B404F066FBDE1D74257E349008A235BADB74268C0B07926C2E1B
32,972,972 UART: Caliptra RT
32,973,711 UART: [state] CFI Enabled
33,091,489 UART: [rt] RT listening for mailbox commands...
33,123,655 UART: [rt]cmd =0x44504543, len=92
38,797,990 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,116 UART:
192,481 UART: Running Caliptra ROM ...
193,579 UART:
193,724 UART: [state] CFI Enabled
262,451 UART: [state] LifecycleState = Unprovisioned
264,376 UART: [state] DebugLocked = No
266,466 UART: [state] WD Timer not started. Device not locked for debugging
270,449 UART: [kat] SHA2-256
449,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,149 UART: [kat] ++
461,595 UART: [kat] sha1
471,574 UART: [kat] SHA2-256
474,551 UART: [kat] SHA2-384
480,553 UART: [kat] SHA2-512-ACC
483,501 UART: [kat] ECC-384
2,947,960 UART: [kat] HMAC-384Kdf
2,970,514 UART: [kat] LMS
3,499,988 UART: [kat] --
3,502,415 UART: [cold-reset] ++
3,504,664 UART: [fht] FHT @ 0x50003400
3,515,865 UART: [idev] ++
3,516,430 UART: [idev] CDI.KEYID = 6
3,517,348 UART: [idev] SUBJECT.KEYID = 7
3,518,539 UART: [idev] UDS.KEYID = 0
3,519,470 ready_for_fw is high
3,519,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,682 UART: [idev] Erasing UDS.KEYID = 0
6,025,995 UART: [idev] Sha1 KeyId Algorithm
6,048,759 UART: [idev] --
6,053,346 UART: [ldev] ++
6,053,915 UART: [ldev] CDI.KEYID = 6
6,054,828 UART: [ldev] SUBJECT.KEYID = 5
6,055,932 UART: [ldev] AUTHORITY.KEYID = 7
6,057,275 UART: [ldev] FE.KEYID = 1
6,098,334 UART: [ldev] Erasing FE.KEYID = 1
8,600,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,027 UART: [ldev] --
10,393,681 UART: [fwproc] Wait for Commands...
10,396,701 UART: [fwproc] Recv command 0x46574c44
10,398,794 UART: [fwproc] Recv'd Img size: 114448 bytes
13,807,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,502 >>> mbox cmd response: success
14,268,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,271,561 UART: [afmc] ++
14,272,171 UART: [afmc] CDI.KEYID = 6
14,273,085 UART: [afmc] SUBJECT.KEYID = 7
14,274,249 UART: [afmc] AUTHORITY.KEYID = 5
16,805,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,761 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,650 UART: [afmc] --
18,604,084 UART: [cold-reset] --
18,609,241 UART: [state] Locking Datavault
18,614,106 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,747 UART: [state] Locking ICCM
18,617,086 UART: [exit] Launching FMC @ 0x40000130
18,625,491 UART:
18,625,773 UART: Running Caliptra FMC ...
18,626,880 UART:
18,627,046 UART: [state] CFI Enabled
18,689,431 UART: [fht] FMC Alias Private Key: 7
20,453,323 UART: [art] Extend RT PCRs Done
20,454,541 UART: [art] Lock RT PCRs Done
20,456,593 UART: [art] Populate DV Done
20,461,949 UART: [fht] FMC Alias Private Key: 7
20,463,821 UART: [art] Derive CDI
20,464,700 UART: [art] Store in in slot 0x4
20,522,159 UART: [art] Derive Key Pair
20,523,155 UART: [art] Store priv key in slot 0x5
22,986,529 UART: [art] Derive Key Pair - Done
22,999,630 UART: [art] Signing Cert with AUTHO
23,000,933 UART: RITY.KEYID = 7
24,712,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,097 UART: [art] PUB.X = 8DD8EAA3477ACDAE75252337B818E3E63D3C6D46DA9267187FDE81EA7E455EBEEA971276F458AFEDCC41D931C484F787
24,721,339 UART: [art] PUB.Y = 358F0AD56846E42D4DDA0825EA1BE947EE764767B2D1B76902A461999B85573D3A7E8A7BD10ABE59D20F267F099B3139
24,728,627 UART: [art] SIG.R = 3740B6FF58557AA8CC08FCA3A151457E0F97AD00E231C05FB6DD72EB14D29D0D0CB600103DD599457178B288352688FC
24,735,962 UART: [art] SIG.S = CD9F8EBD8BFD78C99407E466A41D0CF4285E17F21C90001D11610E4D52A3BCF787E86620431F6AADCAE9A1FC93B50D47
25,715,229 UART: Caliptra RT
25,715,952 UART: [state] CFI Enabled
25,880,958 UART: [rt] RT listening for mailbox commands...
25,913,182 UART: [rt]cmd =0x44504543, len=92
30,274,741 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,383,006 ready_for_fw is high
3,383,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,932 >>> mbox cmd response: success
14,076,672 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,367,772 UART:
18,368,167 UART: Running Caliptra FMC ...
18,369,267 UART:
18,369,421 UART: [state] CFI Enabled
18,437,395 UART: [fht] FMC Alias Private Key: 7
20,202,067 UART: [art] Extend RT PCRs Done
20,203,296 UART: [art] Lock RT PCRs Done
20,204,682 UART: [art] Populate DV Done
20,210,202 UART: [fht] FMC Alias Private Key: 7
20,211,685 UART: [art] Derive CDI
20,212,419 UART: [art] Store in in slot 0x4
20,270,301 UART: [art] Derive Key Pair
20,271,345 UART: [art] Store priv key in slot 0x5
22,733,910 UART: [art] Derive Key Pair - Done
22,746,748 UART: [art] Signing Cert with AUTHO
22,748,050 UART: RITY.KEYID = 7
24,460,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,834 UART: [art] PUB.X = A8D7975C77DB75FFE51CAF3FF863AEC738C4137DA670352A176D2C73A93C6A3A3C71A7073317203F2A45858967FEB35F
24,469,109 UART: [art] PUB.Y = 8723BAD392D7C68B0723BF3365F6E8C6E6C7B7C52A991C364DB67C55109A36D4C47EF76F4303B15B74E67B0A6BB3C1C8
24,476,328 UART: [art] SIG.R = 6CCE5DE7776D23FF40F539CB173D2B7C100ED3295A292E098DAA9C90D8B7B18952EABBC1D82ACF52DF4324B1959EEFB1
24,483,730 UART: [art] SIG.S = 4DB9418F520225E52DAB62EEB5609263382B2BDC9FB7C35946380819038106DB6D4DAD7BC149FC31F5C66D83508660F5
25,463,025 UART: Caliptra RT
25,463,732 UART: [state] CFI Enabled
25,628,594 UART: [rt] RT listening for mailbox commands...
25,660,343 UART: [rt]cmd =0x44504543, len=92
30,022,156 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,365 UART:
192,752 UART: Running Caliptra ROM ...
193,905 UART:
603,473 UART: [state] CFI Enabled
616,799 UART: [state] LifecycleState = Unprovisioned
618,675 UART: [state] DebugLocked = No
620,909 UART: [state] WD Timer not started. Device not locked for debugging
623,799 UART: [kat] SHA2-256
802,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,483 UART: [kat] ++
815,009 UART: [kat] sha1
826,884 UART: [kat] SHA2-256
829,952 UART: [kat] SHA2-384
836,237 UART: [kat] SHA2-512-ACC
839,221 UART: [kat] ECC-384
3,280,003 UART: [kat] HMAC-384Kdf
3,292,950 UART: [kat] LMS
3,822,466 UART: [kat] --
3,827,682 UART: [cold-reset] ++
3,828,971 UART: [fht] FHT @ 0x50003400
3,839,743 UART: [idev] ++
3,840,293 UART: [idev] CDI.KEYID = 6
3,841,237 UART: [idev] SUBJECT.KEYID = 7
3,842,399 UART: [idev] UDS.KEYID = 0
3,843,362 ready_for_fw is high
3,843,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,246 UART: [idev] Erasing UDS.KEYID = 0
6,318,101 UART: [idev] Sha1 KeyId Algorithm
6,341,042 UART: [idev] --
6,346,004 UART: [ldev] ++
6,346,581 UART: [ldev] CDI.KEYID = 6
6,347,486 UART: [ldev] SUBJECT.KEYID = 5
6,348,688 UART: [ldev] AUTHORITY.KEYID = 7
6,349,909 UART: [ldev] FE.KEYID = 1
6,361,865 UART: [ldev] Erasing FE.KEYID = 1
8,834,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,757 UART: [ldev] --
10,625,991 UART: [fwproc] Wait for Commands...
10,628,887 UART: [fwproc] Recv command 0x46574c44
10,630,970 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,072 >>> mbox cmd response: success
14,494,651 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,498,676 UART: [afmc] ++
14,499,277 UART: [afmc] CDI.KEYID = 6
14,500,163 UART: [afmc] SUBJECT.KEYID = 7
14,501,373 UART: [afmc] AUTHORITY.KEYID = 5
17,001,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,121 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,365 UART: [afmc] --
18,797,597 UART: [cold-reset] --
18,802,526 UART: [state] Locking Datavault
18,805,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,407 UART: [state] Locking ICCM
18,809,147 UART: [exit] Launching FMC @ 0x40000130
18,817,530 UART:
18,817,773 UART: Running Caliptra FMC ...
18,818,792 UART:
18,818,933 UART: [state] CFI Enabled
18,827,243 UART: [fht] FMC Alias Private Key: 7
20,584,140 UART: [art] Extend RT PCRs Done
20,585,365 UART: [art] Lock RT PCRs Done
20,586,906 UART: [art] Populate DV Done
20,592,153 UART: [fht] FMC Alias Private Key: 7
20,593,615 UART: [art] Derive CDI
20,594,375 UART: [art] Store in in slot 0x4
20,637,396 UART: [art] Derive Key Pair
20,638,389 UART: [art] Store priv key in slot 0x5
23,065,302 UART: [art] Derive Key Pair - Done
23,078,127 UART: [art] Signing Cert with AUTHO
23,079,464 UART: RITY.KEYID = 7
24,784,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,493 UART: [art] PUB.X = 227C32F297A53D77F9FB7ED12C87968FE38C33525F90B91EDBDFE243BFC25C3284B65ED2CC7E19919C5975AC4C0D2688
24,793,729 UART: [art] PUB.Y = E27B40B54D30DA781C099D2F4C43FC45D48B1767FE145CC44CABED21C856BB910D34525D9808E4BC3EB6243C379E170B
24,801,013 UART: [art] SIG.R = 23C321BFAEEFD5CF6789E2D963CD5F48825DB6E1A309F7CAE19904D5B7FFEC1BD54BD2F70616842CE047E2C8DE064298
24,808,394 UART: [art] SIG.S = 55D328E92875A4DBB1668E1FAE32D96F2D4712A14446B394CA82F111B1C7BA685081219F40A06B5B7E4B316DD0C21FD9
25,786,536 UART: Caliptra RT
25,787,245 UART: [state] CFI Enabled
25,904,449 UART: [rt] RT listening for mailbox commands...
25,936,369 UART: [rt]cmd =0x44504543, len=92
30,221,048 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,703,226 ready_for_fw is high
3,703,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,026 >>> mbox cmd response: success
14,282,843 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,532,430 UART:
18,532,826 UART: Running Caliptra FMC ...
18,533,922 UART:
18,534,070 UART: [state] CFI Enabled
18,542,123 UART: [fht] FMC Alias Private Key: 7
20,299,196 UART: [art] Extend RT PCRs Done
20,300,425 UART: [art] Lock RT PCRs Done
20,302,182 UART: [art] Populate DV Done
20,307,204 UART: [fht] FMC Alias Private Key: 7
20,308,755 UART: [art] Derive CDI
20,309,485 UART: [art] Store in in slot 0x4
20,352,077 UART: [art] Derive Key Pair
20,353,118 UART: [art] Store priv key in slot 0x5
22,779,942 UART: [art] Derive Key Pair - Done
22,793,312 UART: [art] Signing Cert with AUTHO
22,794,613 UART: RITY.KEYID = 7
24,500,378 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,883 UART: [art] PUB.X = D53028AD2ADC8E0A1149E2FCE9539EBBF81F6818E028DBCE7C82118F2A042B776E3F10314C0BC0D33BFA1FD52DCC72C5
24,509,183 UART: [art] PUB.Y = AA037FF346DF2FA74483F1113B0E2FEDC0E89D15719ECD3FCD4D1BB0746E3FF29CA3755ADC9B6ECD7C38F352E38C84EC
24,516,487 UART: [art] SIG.R = 3B5B0F497169A0FF3603EBDD53E525E956223132068559EE0D03BBE09D9BBCBD9C96B9140B81891326A3F4078BAC0A42
24,523,873 UART: [art] SIG.S = 9F07E8BBE3443CCA5EF27541DFFD79B36317A4C8FD720922AFBE8D76AAC9AE941069BEB3202D28B07C4D3F0AA57C389C
25,503,160 UART: Caliptra RT
25,503,878 UART: [state] CFI Enabled
25,621,277 UART: [rt] RT listening for mailbox commands...
25,653,128 UART: [rt]cmd =0x44504543, len=92
29,938,026 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,087 UART:
192,452 UART: Running Caliptra ROM ...
193,660 UART:
193,816 UART: [state] CFI Enabled
266,522 UART: [state] LifecycleState = Unprovisioned
268,545 UART: [state] DebugLocked = No
271,566 UART: [state] WD Timer not started. Device not locked for debugging
276,363 UART: [kat] SHA2-256
466,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,962 UART: [kat] ++
477,457 UART: [kat] sha1
490,182 UART: [kat] SHA2-256
493,196 UART: [kat] SHA2-384
498,834 UART: [kat] SHA2-512-ACC
501,411 UART: [kat] ECC-384
2,948,590 UART: [kat] HMAC-384Kdf
2,973,092 UART: [kat] LMS
3,504,834 UART: [kat] --
3,509,329 UART: [cold-reset] ++
3,511,612 UART: [fht] FHT @ 0x50003400
3,521,586 UART: [idev] ++
3,522,288 UART: [idev] CDI.KEYID = 6
3,523,317 UART: [idev] SUBJECT.KEYID = 7
3,524,490 UART: [idev] UDS.KEYID = 0
3,525,675 ready_for_fw is high
3,525,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,923 UART: [idev] Erasing UDS.KEYID = 0
6,028,995 UART: [idev] Sha1 KeyId Algorithm
6,052,423 UART: [idev] --
6,056,394 UART: [ldev] ++
6,057,080 UART: [ldev] CDI.KEYID = 6
6,057,969 UART: [ldev] SUBJECT.KEYID = 5
6,059,182 UART: [ldev] AUTHORITY.KEYID = 7
6,060,319 UART: [ldev] FE.KEYID = 1
6,101,531 UART: [ldev] Erasing FE.KEYID = 1
8,606,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,994 UART: [ldev] --
10,417,636 UART: [fwproc] Wait for Commands...
10,420,237 UART: [fwproc] Recv command 0x46574c44
10,422,548 UART: [fwproc] Recv'd Img size: 114448 bytes
13,872,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,610,449 >>> mbox cmd response: success
14,611,043 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,614,587 UART: [afmc] ++
14,615,310 UART: [afmc] CDI.KEYID = 6
14,616,504 UART: [afmc] SUBJECT.KEYID = 7
14,617,938 UART: [afmc] AUTHORITY.KEYID = 5
17,151,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,556 UART: [afmc] --
18,971,367 UART: [cold-reset] --
18,974,523 UART: [state] Locking Datavault
18,981,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,302 UART: [state] Locking ICCM
18,986,297 UART: [exit] Launching FMC @ 0x40000130
18,994,977 UART:
18,995,250 UART: Running Caliptra FMC ...
18,996,282 UART:
18,996,431 UART: [state] CFI Enabled
19,055,294 UART: [fht] FMC Alias Private Key: 7
20,819,003 UART: [art] Extend RT PCRs Done
20,820,226 UART: [art] Lock RT PCRs Done
20,821,824 UART: [art] Populate DV Done
20,827,452 UART: [fht] FMC Alias Private Key: 7
20,829,058 UART: [art] Derive CDI
20,829,800 UART: [art] Store in in slot 0x4
20,887,674 UART: [art] Derive Key Pair
20,888,709 UART: [art] Store priv key in slot 0x5
23,351,870 UART: [art] Derive Key Pair - Done
23,364,589 UART: [art] Signing Cert with AUTHO
23,365,887 UART: RITY.KEYID = 7
25,078,005 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,518 UART: [art] PUB.X = 12A48520993F3BBDE5FA45BEB705AB50E628B5E4798799350317B3A2D2569512ACE4B1328D825388A2ED26C39AEEA303
25,086,764 UART: [art] PUB.Y = A0EAA1A4A63773642814CEE9805277D1AA76D8757B27587B1CF177E31A767446C9FBAFDEAC21BF59F53F3AF42D170943
25,094,050 UART: [art] SIG.R = 82444EAA8014C756CCF18E7B2C59956E12574551DA935F66C0B2B1317761074961BBE4724C02FF5B06A445F904D326BC
25,101,389 UART: [art] SIG.S = C2B4559E68C48A5A2BF2F9A9D81C2A8D15A7F44294474C72B2A3FD0B4F67E4651EBF85EB65C583490BECE82398FB0156
26,079,447 UART: Caliptra RT
26,080,156 UART: [state] CFI Enabled
26,246,493 UART: [rt] RT listening for mailbox commands...
26,278,548 UART: [rt]cmd =0x44504543, len=92
30,639,741 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,439,969 ready_for_fw is high
3,440,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,542 >>> mbox cmd response: success
14,739,381 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,049,249 UART:
19,049,647 UART: Running Caliptra FMC ...
19,050,753 UART:
19,050,907 UART: [state] CFI Enabled
19,115,315 UART: [fht] FMC Alias Private Key: 7
20,879,014 UART: [art] Extend RT PCRs Done
20,880,237 UART: [art] Lock RT PCRs Done
20,881,780 UART: [art] Populate DV Done
20,887,083 UART: [fht] FMC Alias Private Key: 7
20,888,636 UART: [art] Derive CDI
20,889,373 UART: [art] Store in in slot 0x4
20,948,067 UART: [art] Derive Key Pair
20,949,109 UART: [art] Store priv key in slot 0x5
23,411,772 UART: [art] Derive Key Pair - Done
23,425,039 UART: [art] Signing Cert with AUTHO
23,426,353 UART: RITY.KEYID = 7
25,138,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,813 UART: [art] PUB.X = 17BD7ABDF173202ADA8C5F339EF0974B508CC65C2E8F4749DD5EBD52F5D5664F741D29C3C128FC6B51A0DBCF150578E4
25,147,122 UART: [art] PUB.Y = 71652399FD14CDC867D529B98EBA44B77AD34E7BC8347D945DE2314E811899DE642F51F9D6224C373634C210B6847793
25,154,315 UART: [art] SIG.R = 620241718D9A80233EE9B50E0488C5676080448C9A11FACE1B10223FB08FFEF4AAA5106B6000371B026C32E030CC1C29
25,161,700 UART: [art] SIG.S = 0F52FE48257F8BCFF4E868CB9455ACDA5809A6EABA3801EED73E481CA724A0BE71B3C9BFF9855B2849BBB9F635A824A4
26,140,892 UART: Caliptra RT
26,141,606 UART: [state] CFI Enabled
26,306,279 UART: [rt] RT listening for mailbox commands...
26,338,238 UART: [rt]cmd =0x44504543, len=92
30,699,182 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
192,405 UART:
192,765 UART: Running Caliptra ROM ...
193,873 UART:
603,493 UART: [state] CFI Enabled
618,072 UART: [state] LifecycleState = Unprovisioned
620,443 UART: [state] DebugLocked = No
622,316 UART: [state] WD Timer not started. Device not locked for debugging
627,758 UART: [kat] SHA2-256
817,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,454 UART: [kat] ++
828,998 UART: [kat] sha1
839,267 UART: [kat] SHA2-256
842,249 UART: [kat] SHA2-384
847,111 UART: [kat] SHA2-512-ACC
849,690 UART: [kat] ECC-384
3,291,545 UART: [kat] HMAC-384Kdf
3,305,149 UART: [kat] LMS
3,837,018 UART: [kat] --
3,841,607 UART: [cold-reset] ++
3,843,754 UART: [fht] FHT @ 0x50003400
3,856,429 UART: [idev] ++
3,857,132 UART: [idev] CDI.KEYID = 6
3,858,104 UART: [idev] SUBJECT.KEYID = 7
3,859,340 UART: [idev] UDS.KEYID = 0
3,860,258 ready_for_fw is high
3,860,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,289 UART: [idev] Erasing UDS.KEYID = 0
6,335,568 UART: [idev] Sha1 KeyId Algorithm
6,357,883 UART: [idev] --
6,362,871 UART: [ldev] ++
6,363,554 UART: [ldev] CDI.KEYID = 6
6,364,514 UART: [ldev] SUBJECT.KEYID = 5
6,365,670 UART: [ldev] AUTHORITY.KEYID = 7
6,366,891 UART: [ldev] FE.KEYID = 1
6,377,745 UART: [ldev] Erasing FE.KEYID = 1
8,859,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,566 UART: [ldev] --
10,652,711 UART: [fwproc] Wait for Commands...
10,655,196 UART: [fwproc] Recv command 0x46574c44
10,657,450 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,844,978 >>> mbox cmd response: success
14,845,539 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,848,704 UART: [afmc] ++
14,849,452 UART: [afmc] CDI.KEYID = 6
14,850,635 UART: [afmc] SUBJECT.KEYID = 7
14,852,120 UART: [afmc] AUTHORITY.KEYID = 5
17,354,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,924 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,486 UART: [afmc] --
19,150,534 UART: [cold-reset] --
19,155,208 UART: [state] Locking Datavault
19,159,867 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,040 UART: [state] Locking ICCM
19,164,248 UART: [exit] Launching FMC @ 0x40000130
19,172,917 UART:
19,173,153 UART: Running Caliptra FMC ...
19,174,247 UART:
19,174,396 UART: [state] CFI Enabled
19,182,512 UART: [fht] FMC Alias Private Key: 7
20,938,958 UART: [art] Extend RT PCRs Done
20,940,173 UART: [art] Lock RT PCRs Done
20,942,230 UART: [art] Populate DV Done
20,947,907 UART: [fht] FMC Alias Private Key: 7
20,949,565 UART: [art] Derive CDI
20,950,378 UART: [art] Store in in slot 0x4
20,992,811 UART: [art] Derive Key Pair
20,993,804 UART: [art] Store priv key in slot 0x5
23,420,993 UART: [art] Derive Key Pair - Done
23,433,874 UART: [art] Signing Cert with AUTHO
23,435,175 UART: RITY.KEYID = 7
25,140,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,275 UART: [art] PUB.X = 0AAF71615508B422F75B26631AE27081DACE82F1C0E6881EF55FB4A3211A3B6E28CC6BDA168AD6EF6B0E9C8C8E1C9F6D
25,149,517 UART: [art] PUB.Y = 92B4B90E065F5F951AE57BFF5C8BB2005FDF90B5287610B156E66985ADC2CACB3B5CA8CE5879BC20C53EE2D533DFE4BD
25,156,789 UART: [art] SIG.R = 7721649D73119B4B570619B11C2BDAC6417F97E8E1BEBD3CAE659D393F000CBB4D827C860CFE5D955A09E09CF3447F72
25,164,177 UART: [art] SIG.S = 8596B65E3BA9833E6F2194FEEB550E41D59BB2ACA735C80E220E3B1FA0F46DD9343C590A3E904E1AC9B17468B2FF4D00
26,143,298 UART: Caliptra RT
26,144,018 UART: [state] CFI Enabled
26,260,690 UART: [rt] RT listening for mailbox commands...
26,293,005 UART: [rt]cmd =0x44504543, len=92
30,578,503 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,753,883 ready_for_fw is high
3,754,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,213 >>> mbox cmd response: success
14,956,886 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,211,488 UART:
19,211,878 UART: Running Caliptra FMC ...
19,213,009 UART:
19,213,166 UART: [state] CFI Enabled
19,221,097 UART: [fht] FMC Alias Private Key: 7
20,977,515 UART: [art] Extend RT PCRs Done
20,978,752 UART: [art] Lock RT PCRs Done
20,980,675 UART: [art] Populate DV Done
20,985,706 UART: [fht] FMC Alias Private Key: 7
20,987,358 UART: [art] Derive CDI
20,988,165 UART: [art] Store in in slot 0x4
21,030,552 UART: [art] Derive Key Pair
21,031,594 UART: [art] Store priv key in slot 0x5
23,457,681 UART: [art] Derive Key Pair - Done
23,470,518 UART: [art] Signing Cert with AUTHO
23,471,822 UART: RITY.KEYID = 7
25,176,711 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,216 UART: [art] PUB.X = 1550381AB433BFAF4FC001D0422B6031F4D506D004BF8957FD98D1693FFA81FB29C010A83BE587DD7474A34D7861BE0F
25,185,452 UART: [art] PUB.Y = 15BB435032438F2D36F12A4AC11DB0B56D9973BC79187523626873EF28349A6F75F84E8DD2D954BED0180209B7884640
25,192,756 UART: [art] SIG.R = 2175DC211B275D7DD752B946079582F9F7538F371B521A7CD8534A82A1C9F7440AE701BCC72A52A60E6787321206FE27
25,200,077 UART: [art] SIG.S = CA8C247A2FE042CEFEB23EDB07036CFD335ECCE6C28791457DBA6CC67501F0A6FA855F8DDBECC2AF24A02595D724CD32
26,178,992 UART: Caliptra RT
26,179,938 UART: [state] CFI Enabled
26,296,333 UART: [rt] RT listening for mailbox commands...
26,328,255 UART: [rt]cmd =0x44504543, len=92
30,612,403 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,350 UART: [kat] LMS
1,475,546 UART: [kat] --
1,476,423 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 ready_for_fw is high
1,481,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,562 UART: [idev] Erasing UDS.KEYID = 0
1,504,818 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,360 UART: [idev] --
1,514,437 UART: [ldev] ++
1,514,605 UART: [ldev] CDI.KEYID = 6
1,514,968 UART: [ldev] SUBJECT.KEYID = 5
1,515,394 UART: [ldev] AUTHORITY.KEYID = 7
1,515,857 UART: [ldev] FE.KEYID = 1
1,521,301 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,538 UART: [ldev] --
1,585,977 UART: [fwproc] Waiting for Commands...
1,586,792 UART: [fwproc] Received command 0x46574c44
1,587,583 UART: [fwproc] Received Image of size 114448 bytes
2,885,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,090 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,525 >>> mbox cmd response: success
3,078,525 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,079,647 UART: [afmc] ++
3,079,815 UART: [afmc] CDI.KEYID = 6
3,080,177 UART: [afmc] SUBJECT.KEYID = 7
3,080,602 UART: [afmc] AUTHORITY.KEYID = 5
3,115,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,477 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,870 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,560 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,433 UART: [afmc] --
3,158,419 UART: [cold-reset] --
3,159,181 UART: [state] Locking Datavault
3,160,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,026 UART: [state] Locking ICCM
3,161,602 UART: [exit] Launching FMC @ 0x40000130
3,166,931 UART:
3,166,947 UART: Running Caliptra FMC ...
3,167,355 UART:
3,167,409 UART: [state] CFI Enabled
3,177,502 UART: [fht] FMC Alias Private Key: 7
3,285,853 UART: [art] Extend RT PCRs Done
3,286,281 UART: [art] Lock RT PCRs Done
3,287,639 UART: [art] Populate DV Done
3,295,632 UART: [fht] FMC Alias Private Key: 7
3,296,718 UART: [art] Derive CDI
3,296,998 UART: [art] Store in in slot 0x4
3,382,801 UART: [art] Derive Key Pair
3,383,161 UART: [art] Store priv key in slot 0x5
3,396,027 UART: [art] Derive Key Pair - Done
3,410,836 UART: [art] Signing Cert with AUTHO
3,411,316 UART: RITY.KEYID = 7
3,426,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,295 UART: [art] PUB.X = 6790D73124D96453214912409446594EF5BBAFEA08697E3CD1859A9D762CD47A6AA26C75FEC22ECFB39764B11C48B94A
3,434,064 UART: [art] PUB.Y = 1EFA8C29E408236107953D91775763900897F3627F852CE79DC5EF023EDF8CD9B62352776598257147302FDC69AC0B4F
3,440,991 UART: [art] SIG.R = D36EA54CF439717D741197E33E32ACDC23AA26374FB764ECF1A9C6153373C0D4E2F643FF8355E45FC9F2E9835CBE3165
3,447,769 UART: [art] SIG.S = EA0B75B16B017AD21BE43810F54F0BAC2ADBD7AFAAAC1822497DACD114BCA98FAAB590CFDFB7538F1207CFF6110D269B
3,471,713 UART: Caliptra RT
3,471,966 UART: [state] CFI Enabled
3,580,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,066 UART: [rt]cmd =0x44504543, len=92
3,795,216 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,959 ready_for_fw is high
1,361,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,561 >>> mbox cmd response: success
2,930,561 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,033 UART:
2,992,049 UART: Running Caliptra FMC ...
2,992,457 UART:
2,992,511 UART: [state] CFI Enabled
3,002,914 UART: [fht] FMC Alias Private Key: 7
3,110,827 UART: [art] Extend RT PCRs Done
3,111,255 UART: [art] Lock RT PCRs Done
3,113,007 UART: [art] Populate DV Done
3,121,508 UART: [fht] FMC Alias Private Key: 7
3,122,650 UART: [art] Derive CDI
3,122,930 UART: [art] Store in in slot 0x4
3,208,599 UART: [art] Derive Key Pair
3,208,959 UART: [art] Store priv key in slot 0x5
3,221,995 UART: [art] Derive Key Pair - Done
3,236,604 UART: [art] Signing Cert with AUTHO
3,237,084 UART: RITY.KEYID = 7
3,252,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,221 UART: [art] PUB.X = B561BD2191A6C35AE825E8FFF0C59B6E26DD33BDC77460FED125606B61F66E14038121492114167D83957E2DCC339D6C
3,259,990 UART: [art] PUB.Y = 91604C608DA0BAB06392590C34DEA25D45A3BA17B4E403214F3602186193F62BAF1FBB6360B33697AB763F6A51B43E10
3,266,931 UART: [art] SIG.R = FC8218A94CE4F80F82BFFE93D3B12D2056885303ADB7E0C9B42739ABA09AAFE53077D34666DCF473E56F1EF83A9BBAD0
3,273,713 UART: [art] SIG.S = 7C2A059D5C6C96A8F5CF27221D26F0DD0D246F1667855FC4DD46F3955D406DCD834BA7D132E74A42AFA9D29DE7379773
3,297,340 UART: Caliptra RT
3,297,593 UART: [state] CFI Enabled
3,406,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,876 UART: [rt]cmd =0x44504543, len=92
3,619,601 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,880 UART: [kat] SHA2-256
882,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,926 UART: [kat] ++
887,078 UART: [kat] sha1
891,444 UART: [kat] SHA2-256
893,382 UART: [kat] SHA2-384
896,269 UART: [kat] SHA2-512-ACC
898,170 UART: [kat] ECC-384
903,823 UART: [kat] HMAC-384Kdf
908,615 UART: [kat] LMS
1,476,811 UART: [kat] --
1,477,468 UART: [cold-reset] ++
1,477,990 UART: [fht] Storing FHT @ 0x50003400
1,480,881 UART: [idev] ++
1,481,049 UART: [idev] CDI.KEYID = 6
1,481,409 UART: [idev] SUBJECT.KEYID = 7
1,481,833 UART: [idev] UDS.KEYID = 0
1,482,178 ready_for_fw is high
1,482,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,049 UART: [idev] Erasing UDS.KEYID = 0
1,507,147 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,637 UART: [idev] --
1,516,698 UART: [ldev] ++
1,516,866 UART: [ldev] CDI.KEYID = 6
1,517,229 UART: [ldev] SUBJECT.KEYID = 5
1,517,655 UART: [ldev] AUTHORITY.KEYID = 7
1,518,118 UART: [ldev] FE.KEYID = 1
1,523,304 UART: [ldev] Erasing FE.KEYID = 1
1,548,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,477 UART: [ldev] --
1,587,968 UART: [fwproc] Waiting for Commands...
1,588,693 UART: [fwproc] Received command 0x46574c44
1,589,484 UART: [fwproc] Received Image of size 114448 bytes
2,888,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,196 >>> mbox cmd response: success
3,081,196 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,082,382 UART: [afmc] ++
3,082,550 UART: [afmc] CDI.KEYID = 6
3,082,912 UART: [afmc] SUBJECT.KEYID = 7
3,083,337 UART: [afmc] AUTHORITY.KEYID = 5
3,118,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,898 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,291 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,981 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,876 UART: [afmc] --
3,161,832 UART: [cold-reset] --
3,162,830 UART: [state] Locking Datavault
3,163,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,475 UART: [state] Locking ICCM
3,165,067 UART: [exit] Launching FMC @ 0x40000130
3,170,396 UART:
3,170,412 UART: Running Caliptra FMC ...
3,170,820 UART:
3,170,963 UART: [state] CFI Enabled
3,181,980 UART: [fht] FMC Alias Private Key: 7
3,289,531 UART: [art] Extend RT PCRs Done
3,289,959 UART: [art] Lock RT PCRs Done
3,291,403 UART: [art] Populate DV Done
3,299,656 UART: [fht] FMC Alias Private Key: 7
3,300,628 UART: [art] Derive CDI
3,300,908 UART: [art] Store in in slot 0x4
3,386,159 UART: [art] Derive Key Pair
3,386,519 UART: [art] Store priv key in slot 0x5
3,400,343 UART: [art] Derive Key Pair - Done
3,414,949 UART: [art] Signing Cert with AUTHO
3,415,429 UART: RITY.KEYID = 7
3,430,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,608 UART: [art] PUB.X = A9F590E48313C1DFC0EA578EF2648CB98852EED13FF43D1AA15628682472F30324FC0690CF4CF8CDF7157D64165C8EB0
3,438,380 UART: [art] PUB.Y = 0F9052888E2C502C9B5DA4C0A684D276975B18EDA7CED6646096C9E23472C72912CE7AC279F1A7DA9E62352BC818D7B4
3,445,331 UART: [art] SIG.R = 8DA89728B9BFBE9B0823116EC904AE5A20708DF91E83A768CDA7FECBD040E77AFD67569653D40265B3B42504F2025846
3,452,090 UART: [art] SIG.S = E3C7BF4CAFD18A65B74C8FAD18FDC0513FCB6520FD6B19F76F63A711BE7BD6ADA42F6B57CABF998EBFD01DC7950BEB4D
3,475,666 UART: Caliptra RT
3,476,011 UART: [state] CFI Enabled
3,583,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,701 UART: [rt]cmd =0x44504543, len=92
3,798,835 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,732 ready_for_fw is high
1,362,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,714 >>> mbox cmd response: success
2,929,714 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,991,170 UART:
2,991,186 UART: Running Caliptra FMC ...
2,991,594 UART:
2,991,737 UART: [state] CFI Enabled
3,002,224 UART: [fht] FMC Alias Private Key: 7
3,109,959 UART: [art] Extend RT PCRs Done
3,110,387 UART: [art] Lock RT PCRs Done
3,112,065 UART: [art] Populate DV Done
3,120,068 UART: [fht] FMC Alias Private Key: 7
3,121,186 UART: [art] Derive CDI
3,121,466 UART: [art] Store in in slot 0x4
3,207,101 UART: [art] Derive Key Pair
3,207,461 UART: [art] Store priv key in slot 0x5
3,220,893 UART: [art] Derive Key Pair - Done
3,235,355 UART: [art] Signing Cert with AUTHO
3,235,835 UART: RITY.KEYID = 7
3,251,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,856 UART: [art] PUB.X = A7A423026C38FF0327EDD8F4B9B25FA8B682F5149E77D2154AE0C12E3919406B7C056E9B073E1D7085B35EB145A82973
3,258,614 UART: [art] PUB.Y = C1CD5439F4381FF1E346CEBA09131127950EE7BEA39FD0DC5C3C9B18873688C6B5245C0238D17D93D7B697F6A39A9CEA
3,265,565 UART: [art] SIG.R = 2D95B69EF8A95992A0F6334DF94B115FF7866A6B94D84CFC409364DFBE9C9433867AE0AD2A9B1D9FF3E3EA7354FA5273
3,272,347 UART: [art] SIG.S = 2168C8A79FDA03480EFEBF2EA70944F657959B0EA9B3392A28415E2DD5B280D68B3DE5DF010C78BEC9BB51DE9D36D35F
3,296,278 UART: Caliptra RT
3,296,623 UART: [state] CFI Enabled
3,405,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,029 UART: [rt]cmd =0x44504543, len=92
3,619,576 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
893,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,499 UART: [kat] ++
897,651 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,298 UART: [kat] HMAC-384Kdf
922,958 UART: [kat] LMS
1,171,286 UART: [kat] --
1,172,131 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,120 UART: [idev] ++
1,175,288 UART: [idev] CDI.KEYID = 6
1,175,648 UART: [idev] SUBJECT.KEYID = 7
1,176,072 UART: [idev] UDS.KEYID = 0
1,176,417 ready_for_fw is high
1,176,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,463 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,211,025 UART: [ldev] ++
1,211,193 UART: [ldev] CDI.KEYID = 6
1,211,556 UART: [ldev] SUBJECT.KEYID = 5
1,211,982 UART: [ldev] AUTHORITY.KEYID = 7
1,212,445 UART: [ldev] FE.KEYID = 1
1,217,699 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,423 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,794 >>> mbox cmd response: success
2,775,794 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,776,816 UART: [afmc] ++
2,776,984 UART: [afmc] CDI.KEYID = 6
2,777,346 UART: [afmc] SUBJECT.KEYID = 7
2,777,771 UART: [afmc] AUTHORITY.KEYID = 5
2,813,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,003 UART: [afmc] --
2,856,923 UART: [cold-reset] --
2,857,569 UART: [state] Locking Datavault
2,858,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,260 UART: [state] Locking ICCM
2,859,846 UART: [exit] Launching FMC @ 0x40000130
2,865,175 UART:
2,865,191 UART: Running Caliptra FMC ...
2,865,599 UART:
2,865,653 UART: [state] CFI Enabled
2,876,090 UART: [fht] FMC Alias Private Key: 7
2,984,523 UART: [art] Extend RT PCRs Done
2,984,951 UART: [art] Lock RT PCRs Done
2,986,949 UART: [art] Populate DV Done
2,994,940 UART: [fht] FMC Alias Private Key: 7
2,996,120 UART: [art] Derive CDI
2,996,400 UART: [art] Store in in slot 0x4
3,081,725 UART: [art] Derive Key Pair
3,082,085 UART: [art] Store priv key in slot 0x5
3,095,133 UART: [art] Derive Key Pair - Done
3,110,036 UART: [art] Signing Cert with AUTHO
3,110,516 UART: RITY.KEYID = 7
3,125,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,577 UART: [art] PUB.X = CE1EADD22BF34862D6A0C72B119405DA73C024659DF21A3382BA95DAFA258EA09E6F99B3D395D59F91EA06561AC570AE
3,133,355 UART: [art] PUB.Y = 09A2DDFA5AD271A3375E39C31366DC201CAB8563D3C27A8556CC21896F458607518D51CE1F9C6BC70EDCE182D014E14F
3,140,304 UART: [art] SIG.R = 041B91215527BE2BFA382908797359D01C82DD0276E4B09D881C6C5725920D7B96A56735EBA0CECF716CE111C54B0326
3,147,055 UART: [art] SIG.S = 5E7635EE996487A573B7003377219500033466F9CD11A82BCAA56A8693261A3156C44AB7ED9240DC0AAFBB834F55EA6F
3,171,052 UART: Caliptra RT
3,171,305 UART: [state] CFI Enabled
3,278,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,632 UART: [rt]cmd =0x44504543, len=92
3,492,775 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,925 ready_for_fw is high
1,059,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,859 >>> mbox cmd response: success
2,629,859 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,673 UART:
2,691,689 UART: Running Caliptra FMC ...
2,692,097 UART:
2,692,151 UART: [state] CFI Enabled
2,702,680 UART: [fht] FMC Alias Private Key: 7
2,810,397 UART: [art] Extend RT PCRs Done
2,810,825 UART: [art] Lock RT PCRs Done
2,812,333 UART: [art] Populate DV Done
2,820,410 UART: [fht] FMC Alias Private Key: 7
2,821,382 UART: [art] Derive CDI
2,821,662 UART: [art] Store in in slot 0x4
2,907,055 UART: [art] Derive Key Pair
2,907,415 UART: [art] Store priv key in slot 0x5
2,920,511 UART: [art] Derive Key Pair - Done
2,935,556 UART: [art] Signing Cert with AUTHO
2,936,036 UART: RITY.KEYID = 7
2,951,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,583 UART: [art] PUB.X = 5CC59EBEE5388BD74AC0C225FDB7125B1198CD975D5EE0AE7DF838074E6CC2A6BA9ACBE7A23C09746B8A88EA2F2D3409
2,959,366 UART: [art] PUB.Y = AB13724D3B6418F3C5BD0D09E3A2E572B62288420A64C52D1C63F1C8E3C582DD1EE7C9E6BE6092C06459EF49DEBE542C
2,966,319 UART: [art] SIG.R = 4F32C2E6C6045A79039C724D6DF86A6998C4C6449FC7EECE536B84B6C92278B4B9C921E3AF4093B571E3C99ACC8DD9BA
2,973,095 UART: [art] SIG.S = 9A80E0CCE3C9661482A3F0140395E08A34FFB96BFD23FCB3A6025AD835FDBB7702E638F8D1EE1B630CC6EC68C38D7FA6
2,996,572 UART: Caliptra RT
2,996,825 UART: [state] CFI Enabled
3,103,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,882 UART: [rt]cmd =0x44504543, len=92
3,318,068 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
893,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,072 UART: [kat] ++
898,224 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
918,761 UART: [kat] HMAC-384Kdf
923,417 UART: [kat] LMS
1,171,745 UART: [kat] --
1,172,782 UART: [cold-reset] ++
1,173,228 UART: [fht] FHT @ 0x50003400
1,176,009 UART: [idev] ++
1,176,177 UART: [idev] CDI.KEYID = 6
1,176,537 UART: [idev] SUBJECT.KEYID = 7
1,176,961 UART: [idev] UDS.KEYID = 0
1,177,306 ready_for_fw is high
1,177,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,134 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,244,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,179 UART: [fwproc] Wait for Commands...
1,284,813 UART: [fwproc] Recv command 0x46574c44
1,285,541 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,723 >>> mbox cmd response: success
2,778,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,779,869 UART: [afmc] ++
2,780,037 UART: [afmc] CDI.KEYID = 6
2,780,399 UART: [afmc] SUBJECT.KEYID = 7
2,780,824 UART: [afmc] AUTHORITY.KEYID = 5
2,816,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,390 UART: [afmc] --
2,859,340 UART: [cold-reset] --
2,860,120 UART: [state] Locking Datavault
2,861,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,121 UART: [state] Locking ICCM
2,862,649 UART: [exit] Launching FMC @ 0x40000130
2,867,978 UART:
2,867,994 UART: Running Caliptra FMC ...
2,868,402 UART:
2,868,545 UART: [state] CFI Enabled
2,879,164 UART: [fht] FMC Alias Private Key: 7
2,986,771 UART: [art] Extend RT PCRs Done
2,987,199 UART: [art] Lock RT PCRs Done
2,988,751 UART: [art] Populate DV Done
2,996,868 UART: [fht] FMC Alias Private Key: 7
2,998,008 UART: [art] Derive CDI
2,998,288 UART: [art] Store in in slot 0x4
3,084,127 UART: [art] Derive Key Pair
3,084,487 UART: [art] Store priv key in slot 0x5
3,097,101 UART: [art] Derive Key Pair - Done
3,111,764 UART: [art] Signing Cert with AUTHO
3,112,244 UART: RITY.KEYID = 7
3,127,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,705 UART: [art] PUB.X = D6DF462E69D07190E053F90D9FE29D2D7110FCEF010A0BC23E328CBD196CEAA0FB2DFB9FB110EF18F0B78FB3076433D7
3,135,480 UART: [art] PUB.Y = 2D1BC7B3516FD9BA8C98A2404BB535D901983662501B09E58344FEA8B16EED1FD68C2DFE542806BDC9EB4CBF98CBC83E
3,142,439 UART: [art] SIG.R = CCFDE21DD8184309640E9A35BD85FE51E6803A09DAD49CD81AFE37075FDC3896E30B1785C2D40CCED2BF7F2680BCAE74
3,149,211 UART: [art] SIG.S = C2106539CCA50F2FCED3302AECEDFE4DB155059A8B282CB66CE5D08AD535CD5CAB8E23127CE3E3ED40F023B2052932B7
3,172,635 UART: Caliptra RT
3,172,980 UART: [state] CFI Enabled
3,280,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,778 UART: [rt]cmd =0x44504543, len=92
3,495,341 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,330 ready_for_fw is high
1,061,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,631,226 >>> mbox cmd response: success
2,631,226 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,693,492 UART:
2,693,508 UART: Running Caliptra FMC ...
2,693,916 UART:
2,694,059 UART: [state] CFI Enabled
2,704,412 UART: [fht] FMC Alias Private Key: 7
2,812,597 UART: [art] Extend RT PCRs Done
2,813,025 UART: [art] Lock RT PCRs Done
2,814,647 UART: [art] Populate DV Done
2,823,106 UART: [fht] FMC Alias Private Key: 7
2,824,176 UART: [art] Derive CDI
2,824,456 UART: [art] Store in in slot 0x4
2,910,165 UART: [art] Derive Key Pair
2,910,525 UART: [art] Store priv key in slot 0x5
2,923,837 UART: [art] Derive Key Pair - Done
2,938,737 UART: [art] Signing Cert with AUTHO
2,939,217 UART: RITY.KEYID = 7
2,954,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,248 UART: [art] PUB.X = BD965167BF7ADC3EB9DD77E6A9BF96642501D369A9A4007FA332B3C5E59AF133501E35CAC90C43A6E1E91DC09C0D18EA
2,962,003 UART: [art] PUB.Y = 0B1512A70A45A2ACA1F44B93F3455442B97BB72B83501BDA3F45636E4969161ABB486AAAC094C29EBAFD27A2406A74C1
2,968,955 UART: [art] SIG.R = 1A5313563BDA57163B793CD79157A591CC38109430DFAC57806B445FF1BDED2A4992C5AF9AF53E4B185E17550EEE65F1
2,975,728 UART: [art] SIG.S = C5503A2924EEC5BF0AE6DE235570796BE572F34B6F8FABED52B59262A0E845D42B47916E16159DDD182DC0B7062EB888
2,999,285 UART: Caliptra RT
2,999,630 UART: [state] CFI Enabled
3,106,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,411 UART: [rt]cmd =0x44504543, len=92
3,320,632 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,424 UART: [state] LifecycleState = Unprovisioned
85,079 UART: [state] DebugLocked = No
85,639 UART: [state] WD Timer not started. Device not locked for debugging
86,746 UART: [kat] SHA2-256
890,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,425 UART: [kat] ++
894,577 UART: [kat] sha1
898,753 UART: [kat] SHA2-256
900,693 UART: [kat] SHA2-384
903,444 UART: [kat] SHA2-512-ACC
905,345 UART: [kat] ECC-384
914,942 UART: [kat] HMAC-384Kdf
919,694 UART: [kat] LMS
1,168,006 UART: [kat] --
1,169,011 UART: [cold-reset] ++
1,169,495 UART: [fht] FHT @ 0x50003400
1,172,179 UART: [idev] ++
1,172,347 UART: [idev] CDI.KEYID = 6
1,172,708 UART: [idev] SUBJECT.KEYID = 7
1,173,133 UART: [idev] UDS.KEYID = 0
1,173,479 ready_for_fw is high
1,173,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,861 UART: [idev] Erasing UDS.KEYID = 0
1,197,825 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,756 UART: [ldev] ++
1,207,924 UART: [ldev] CDI.KEYID = 6
1,208,288 UART: [ldev] SUBJECT.KEYID = 5
1,208,715 UART: [ldev] AUTHORITY.KEYID = 7
1,209,178 UART: [ldev] FE.KEYID = 1
1,214,222 UART: [ldev] Erasing FE.KEYID = 1
1,240,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,997 UART: [fwproc] Recv command 0x46574c44
1,281,730 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,798 >>> mbox cmd response: success
2,772,798 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,773,951 UART: [afmc] ++
2,774,119 UART: [afmc] CDI.KEYID = 6
2,774,482 UART: [afmc] SUBJECT.KEYID = 7
2,774,908 UART: [afmc] AUTHORITY.KEYID = 5
2,811,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,644 UART: [afmc] --
2,854,660 UART: [cold-reset] --
2,855,428 UART: [state] Locking Datavault
2,856,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,051 UART: [state] Locking ICCM
2,857,505 UART: [exit] Launching FMC @ 0x40000130
2,862,834 UART:
2,862,850 UART: Running Caliptra FMC ...
2,863,258 UART:
2,863,312 UART: [state] CFI Enabled
2,873,959 UART: [fht] FMC Alias Private Key: 7
2,982,122 UART: [art] Extend RT PCRs Done
2,982,550 UART: [art] Lock RT PCRs Done
2,984,018 UART: [art] Populate DV Done
2,992,273 UART: [fht] FMC Alias Private Key: 7
2,993,353 UART: [art] Derive CDI
2,993,633 UART: [art] Store in in slot 0x4
3,079,382 UART: [art] Derive Key Pair
3,079,742 UART: [art] Store priv key in slot 0x5
3,092,776 UART: [art] Derive Key Pair - Done
3,107,857 UART: [art] Signing Cert with AUTHO
3,108,337 UART: RITY.KEYID = 7
3,123,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,448 UART: [art] PUB.X = 01C7F573D00F33CF17DA498FDA8290E73930884E0C6D68568D0889C663B5CAE03DE44CD35F6A0A2A88EB3645B6171001
3,131,202 UART: [art] PUB.Y = A225F67F98C204CD1E253851193BC8CB24738722DBF11A650268E24DBBFD4C607D88DB4DC944BC3979EC31080E3E96EC
3,138,148 UART: [art] SIG.R = 316C7394B51B489593080C1845F56D1CD37E3EEF39D2D4BF3ED8F5A8FDE26E60EC64DA014979E650E14722A269D22FCA
3,144,917 UART: [art] SIG.S = 63954560DFA1AB61E746C1AE106932D6382C3A14B66C9E93B2E8B6CDB20951C2D138AB3E2BBD6F505B2BC89A366361E8
3,168,763 UART: Caliptra RT
3,169,016 UART: [state] CFI Enabled
3,276,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,487 UART: [rt]cmd =0x44504543, len=92
3,490,698 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,602 ready_for_fw is high
1,056,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,684 >>> mbox cmd response: success
2,623,684 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,418 UART:
2,685,434 UART: Running Caliptra FMC ...
2,685,842 UART:
2,685,896 UART: [state] CFI Enabled
2,696,291 UART: [fht] FMC Alias Private Key: 7
2,804,140 UART: [art] Extend RT PCRs Done
2,804,568 UART: [art] Lock RT PCRs Done
2,806,180 UART: [art] Populate DV Done
2,814,293 UART: [fht] FMC Alias Private Key: 7
2,815,301 UART: [art] Derive CDI
2,815,581 UART: [art] Store in in slot 0x4
2,901,374 UART: [art] Derive Key Pair
2,901,734 UART: [art] Store priv key in slot 0x5
2,915,640 UART: [art] Derive Key Pair - Done
2,930,851 UART: [art] Signing Cert with AUTHO
2,931,331 UART: RITY.KEYID = 7
2,946,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,202 UART: [art] PUB.X = E9B5F72FE5210420EDFD8BB5AC6D5D25074AE44A0C8A039CFA8F483D0784A5B16421DA3C02054F58011107C94340AA5B
2,953,953 UART: [art] PUB.Y = 9561F21FF43D795B64DCFD1B126A7BBE3A5B38B27BFF0430891A183A6AF9A7E159F69D69E8156B9812C696B0457DA2A1
2,960,908 UART: [art] SIG.R = C5F12AB0572E73C73B63A4B696AF55D4D2BFD8CD4EFE9E8F3FE4646959D6422E35A0E4F71421EF6A5F6421E679007DF1
2,967,668 UART: [art] SIG.S = D345483D945EA0546258B7DD1EA94B50F93912CA619FAC9B5D6DA72ECF3F5D3B5FA8AE636FDA3A016B9A9802370D7A27
2,991,684 UART: Caliptra RT
2,991,937 UART: [state] CFI Enabled
3,098,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,871 UART: [rt]cmd =0x44504543, len=92
3,312,619 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,430 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 ready_for_fw is high
1,174,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,198,606 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,525 UART: [ldev] ++
1,208,693 UART: [ldev] CDI.KEYID = 6
1,209,057 UART: [ldev] SUBJECT.KEYID = 5
1,209,484 UART: [ldev] AUTHORITY.KEYID = 7
1,209,947 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,241,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,121 UART: [ldev] --
1,280,413 UART: [fwproc] Wait for Commands...
1,281,014 UART: [fwproc] Recv command 0x46574c44
1,281,747 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,163 >>> mbox cmd response: success
2,773,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,268 UART: [afmc] ++
2,774,436 UART: [afmc] CDI.KEYID = 6
2,774,799 UART: [afmc] SUBJECT.KEYID = 7
2,775,225 UART: [afmc] AUTHORITY.KEYID = 5
2,810,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,315 UART: [afmc] --
2,854,385 UART: [cold-reset] --
2,855,239 UART: [state] Locking Datavault
2,856,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,004 UART: [state] Locking ICCM
2,857,612 UART: [exit] Launching FMC @ 0x40000130
2,862,941 UART:
2,862,957 UART: Running Caliptra FMC ...
2,863,365 UART:
2,863,508 UART: [state] CFI Enabled
2,874,319 UART: [fht] FMC Alias Private Key: 7
2,982,066 UART: [art] Extend RT PCRs Done
2,982,494 UART: [art] Lock RT PCRs Done
2,983,920 UART: [art] Populate DV Done
2,991,879 UART: [fht] FMC Alias Private Key: 7
2,992,821 UART: [art] Derive CDI
2,993,101 UART: [art] Store in in slot 0x4
3,078,642 UART: [art] Derive Key Pair
3,079,002 UART: [art] Store priv key in slot 0x5
3,092,210 UART: [art] Derive Key Pair - Done
3,107,031 UART: [art] Signing Cert with AUTHO
3,107,511 UART: RITY.KEYID = 7
3,122,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,402 UART: [art] PUB.X = 485FBA9972246B77AF61CD3F94653F1F1266471EC9B36BA29B48DB2D27AEF738A283341709AE232A52CF683806264AA6
3,130,166 UART: [art] PUB.Y = 500A72F08B48CAB385D9DA40AA4C2BA0BFE1BE9C145E027644B83A01ED61AE8E00AA3D24CFEE83562F3C602955FC3754
3,137,101 UART: [art] SIG.R = 5B6ABAF6B3E95A033B6547E55B01831F54D6C273352FB9D3531C06B357197F63A2F71B09F464D0FBCC8DEE655164FAA4
3,143,867 UART: [art] SIG.S = CE5A983BDBBBEC3707854946FA04FFCDDAF9E737C64E16FC1F614DED860C651209E6F9FD7B1B873BE34A251ACBB0AD8A
3,168,342 UART: Caliptra RT
3,168,687 UART: [state] CFI Enabled
3,277,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,248 UART: [rt]cmd =0x44504543, len=92
3,491,159 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,037 ready_for_fw is high
1,057,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,395 >>> mbox cmd response: success
2,626,395 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,441 UART:
2,689,457 UART: Running Caliptra FMC ...
2,689,865 UART:
2,690,008 UART: [state] CFI Enabled
2,700,679 UART: [fht] FMC Alias Private Key: 7
2,808,604 UART: [art] Extend RT PCRs Done
2,809,032 UART: [art] Lock RT PCRs Done
2,810,898 UART: [art] Populate DV Done
2,818,921 UART: [fht] FMC Alias Private Key: 7
2,819,921 UART: [art] Derive CDI
2,820,201 UART: [art] Store in in slot 0x4
2,906,394 UART: [art] Derive Key Pair
2,906,754 UART: [art] Store priv key in slot 0x5
2,920,306 UART: [art] Derive Key Pair - Done
2,935,136 UART: [art] Signing Cert with AUTHO
2,935,616 UART: RITY.KEYID = 7
2,950,922 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,687 UART: [art] PUB.X = 5513C59EDAEBA32970D14244A2A3D48AB313ACA4161E39C2FA49CF363028A3D0FBF04A8478FA0F2D224F02717CEC1114
2,958,461 UART: [art] PUB.Y = C8EFDE6C7417F7175B9C26C8F94182B2C164A519F86878361DBC716C84C5507B4971883369CE4A68B1E6272E6DC6A704
2,965,406 UART: [art] SIG.R = CCDC9BAE073975B0A6D70E4CFDF39BA3B6065D346E5BD94879FF4ACCADE6504269275752AABDDFC7DD77BA03F5813918
2,972,186 UART: [art] SIG.S = 5653C53542ED04398FCE0E2E284BDFC93449CD3C0703B1F21B09D94F178AF005BCA47C0309DC143432D92D3A07E590B8
2,995,766 UART: Caliptra RT
2,996,111 UART: [state] CFI Enabled
3,103,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,046 UART: [rt]cmd =0x44504543, len=92
3,316,672 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,144 UART:
192,495 UART: Running Caliptra ROM ...
193,677 UART:
193,831 UART: [state] CFI Enabled
265,611 UART: [state] LifecycleState = Unprovisioned
267,600 UART: [state] DebugLocked = No
270,342 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,931 UART: [kat] SHA2-256
445,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,151 UART: [kat] ++
456,643 UART: [kat] sha1
467,027 UART: [kat] SHA2-256
469,775 UART: [kat] SHA2-384
475,887 UART: [kat] SHA2-512-ACC
478,264 UART: [kat] ECC-384
2,767,949 UART: [kat] HMAC-384Kdf
2,799,611 UART: [kat] LMS
3,989,941 UART: [kat] --
3,993,031 UART: [cold-reset] ++
3,995,254 UART: [fht] Storing FHT @ 0x50003400
4,007,868 UART: [idev] ++
4,008,443 UART: [idev] CDI.KEYID = 6
4,009,331 UART: [idev] SUBJECT.KEYID = 7
4,010,598 UART: [idev] UDS.KEYID = 0
4,011,573 ready_for_fw is high
4,011,766 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,354 UART: [idev] Erasing UDS.KEYID = 0
7,343,752 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,756 UART: [idev] --
7,371,475 UART: [ldev] ++
7,372,049 UART: [ldev] CDI.KEYID = 6
7,372,995 UART: [ldev] SUBJECT.KEYID = 5
7,374,209 UART: [ldev] AUTHORITY.KEYID = 7
7,375,496 UART: [ldev] FE.KEYID = 1
7,421,763 UART: [ldev] Erasing FE.KEYID = 1
10,751,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,571 UART: [ldev] --
13,113,638 UART: [fwproc] Waiting for Commands...
13,116,764 UART: [fwproc] Received command 0x46574c44
13,118,949 UART: [fwproc] Received Image of size 114124 bytes
17,169,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,937 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,844 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,632,988 >>> mbox cmd response: success
17,636,410 UART: [afmc] ++
17,637,064 UART: [afmc] CDI.KEYID = 6
17,637,979 UART: [afmc] SUBJECT.KEYID = 7
17,639,192 UART: [afmc] AUTHORITY.KEYID = 5
21,005,378 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,350 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,809 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,614 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,076 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,069 UART: [afmc] --
23,378,827 UART: [cold-reset] --
23,382,905 UART: [state] Locking Datavault
23,389,555 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,311 UART: [state] Locking ICCM
23,393,244 UART: [exit] Launching FMC @ 0x40000130
23,401,637 UART:
23,401,872 UART: Running Caliptra FMC ...
23,402,970 UART:
23,403,128 UART: [state] CFI Enabled
23,467,802 UART: [fht] FMC Alias Private Key: 7
25,805,228 UART: [art] Extend RT PCRs Done
25,806,445 UART: [art] Lock RT PCRs Done
25,808,141 UART: [art] Populate DV Done
25,813,718 UART: [fht] FMC Alias Private Key: 7
25,815,308 UART: [art] Derive CDI
25,816,122 UART: [art] Store in in slot 0x4
25,876,450 UART: [art] Derive Key Pair
25,877,484 UART: [art] Store priv key in slot 0x5
29,170,101 UART: [art] Derive Key Pair - Done
29,182,997 UART: [art] Signing Cert with AUTHO
29,184,304 UART: RITY.KEYID = 7
31,472,595 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,100 UART: [art] PUB.X = E2A7A553657FDF059BCADC03DDE0701C5ABB479A07FE3CCB1B3E1679214A818FF3A2B6863CEF7A767EA500082084A92F
31,481,355 UART: [art] PUB.Y = 1AD919E5FE00598FBCFF7AA51A98E4F4780A9457D9544753DAE881B8697D9A79FD3A23DFB020C6141C6E1BD4BA72FE52
31,488,646 UART: [art] SIG.R = BE96813854BE49C6080604FA5379EE8966A08FA4C45FA5199B5DE4AFED533FF5707C8E4948C4AB0C26EA85B5FC0D50EE
31,496,040 UART: [art] SIG.S = F73D1FB66305A3773AFB65B83FEA6FDADE634665531E8E7A1EF36F8D6F0590D0B76E09B64ABA8A32C920266B1549D10C
32,801,103 UART: Caliptra RT
32,801,808 UART: [state] CFI Enabled
32,964,234 UART: [rt] RT listening for mailbox commands...
32,966,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,996,602 UART: [rt]cmd =0x44504543, len=96
38,759,855 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,785,924 ready_for_fw is high
3,786,546 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,152 >>> mbox cmd response: success
23,567,017 UART:
23,567,420 UART: Running Caliptra FMC ...
23,568,562 UART:
23,568,747 UART: [state] CFI Enabled
23,636,533 UART: [fht] FMC Alias Private Key: 7
25,974,415 UART: [art] Extend RT PCRs Done
25,975,645 UART: [art] Lock RT PCRs Done
25,977,059 UART: [art] Populate DV Done
25,982,700 UART: [fht] FMC Alias Private Key: 7
25,984,306 UART: [art] Derive CDI
25,985,126 UART: [art] Store in in slot 0x4
26,044,449 UART: [art] Derive Key Pair
26,045,495 UART: [art] Store priv key in slot 0x5
29,337,916 UART: [art] Derive Key Pair - Done
29,351,289 UART: [art] Signing Cert with AUTHO
29,352,588 UART: RITY.KEYID = 7
31,638,828 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,331 UART: [art] PUB.X = 818EF7BB1C1DE3440236A74D5060642FF78C8A2F26C9BF6BBE46AADC061FF41B90849DDBB12E773F01E0A086FA42A25E
31,647,646 UART: [art] PUB.Y = 74798E582EA91CD6984BA52A93BD71E77181F95288E7B8C37944C0884217D673F7F4F2B60DF10B65E3F86D94E5DC8989
31,654,831 UART: [art] SIG.R = 0F6B526C411A56BC14D51E32EB0B785F224AD2616DBBA3E3E93530555D74679B2E68830584EA39C7C0DFFB5EBF14DA8E
31,662,228 UART: [art] SIG.S = 06FF901178CB62841CCF3276A669BA3707ED48B0FAEEA22FB9C8839E084AECB405B7BC831F5D3A4519157F292E1A468B
32,967,209 UART: Caliptra RT
32,967,929 UART: [state] CFI Enabled
33,128,062 UART: [rt] RT listening for mailbox commands...
33,129,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,160,562 UART: [rt]cmd =0x44504543, len=96
38,944,212 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,467 UART:
192,828 UART: Running Caliptra ROM ...
194,034 UART:
603,887 UART: [state] CFI Enabled
616,454 UART: [state] LifecycleState = Unprovisioned
618,441 UART: [state] DebugLocked = No
620,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,502 UART: [kat] SHA2-256
795,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,753 UART: [kat] ++
806,200 UART: [kat] sha1
817,209 UART: [kat] SHA2-256
819,929 UART: [kat] SHA2-384
824,990 UART: [kat] SHA2-512-ACC
827,361 UART: [kat] ECC-384
3,111,217 UART: [kat] HMAC-384Kdf
3,121,456 UART: [kat] LMS
4,311,539 UART: [kat] --
4,316,603 UART: [cold-reset] ++
4,318,244 UART: [fht] Storing FHT @ 0x50003400
4,328,793 UART: [idev] ++
4,329,361 UART: [idev] CDI.KEYID = 6
4,330,386 UART: [idev] SUBJECT.KEYID = 7
4,331,575 UART: [idev] UDS.KEYID = 0
4,332,603 ready_for_fw is high
4,332,795 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,585 UART: [idev] Erasing UDS.KEYID = 0
7,620,649 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,312 UART: [idev] --
7,646,679 UART: [ldev] ++
7,647,246 UART: [ldev] CDI.KEYID = 6
7,648,204 UART: [ldev] SUBJECT.KEYID = 5
7,649,406 UART: [ldev] AUTHORITY.KEYID = 7
7,650,689 UART: [ldev] FE.KEYID = 1
7,660,580 UART: [ldev] Erasing FE.KEYID = 1
10,952,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,791 UART: [ldev] --
13,314,506 UART: [fwproc] Waiting for Commands...
13,316,429 UART: [fwproc] Received command 0x46574c44
13,318,601 UART: [fwproc] Received Image of size 114124 bytes
17,371,220 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,203 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,755 >>> mbox cmd response: success
17,841,117 UART: [afmc] ++
17,841,760 UART: [afmc] CDI.KEYID = 6
17,842,667 UART: [afmc] SUBJECT.KEYID = 7
17,843,877 UART: [afmc] AUTHORITY.KEYID = 5
21,161,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,848 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,113 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,522 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,333 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,787 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,232 UART: [afmc] --
23,527,932 UART: [cold-reset] --
23,531,627 UART: [state] Locking Datavault
23,536,005 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,769 UART: [state] Locking ICCM
23,539,481 UART: [exit] Launching FMC @ 0x40000130
23,547,874 UART:
23,548,102 UART: Running Caliptra FMC ...
23,549,198 UART:
23,549,354 UART: [state] CFI Enabled
23,557,132 UART: [fht] FMC Alias Private Key: 7
25,888,231 UART: [art] Extend RT PCRs Done
25,889,455 UART: [art] Lock RT PCRs Done
25,891,227 UART: [art] Populate DV Done
25,896,525 UART: [fht] FMC Alias Private Key: 7
25,898,151 UART: [art] Derive CDI
25,898,889 UART: [art] Store in in slot 0x4
25,941,534 UART: [art] Derive Key Pair
25,942,530 UART: [art] Store priv key in slot 0x5
29,184,459 UART: [art] Derive Key Pair - Done
29,197,668 UART: [art] Signing Cert with AUTHO
29,198,968 UART: RITY.KEYID = 7
31,477,996 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,499 UART: [art] PUB.X = 8C5490650F426308AC8BBE78373A2D8FCDAD0AEE0132874970B3D4A95D18F5877E64D1467100C87A723E03596CDC9418
31,486,726 UART: [art] PUB.Y = 0F08E02CD4FBBF7315FC2C3DCDD5663810F463B031470741CED7E63C9F0BC5A6B0C582F976F8C3C9E21778F7293F45BA
31,494,005 UART: [art] SIG.R = 9A1C3C80E777BD7157768777059835E085E38DDF5B3525CD2BF0B1AB3171994BA8F655BD4514C1A0F51873816EBB4123
31,501,402 UART: [art] SIG.S = 3C2A440753A9BFA6554D7364032A5978B193F2366F077C7BEB1EB9BDC3113DEB9815B90EF7479D3C4C8A8BEEB6844C14
32,806,688 UART: Caliptra RT
32,807,387 UART: [state] CFI Enabled
32,925,328 UART: [rt] RT listening for mailbox commands...
32,927,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,957,812 UART: [rt]cmd =0x44504543, len=96
38,629,238 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,129,865 ready_for_fw is high
4,130,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,305 >>> mbox cmd response: success
23,703,910 UART:
23,704,295 UART: Running Caliptra FMC ...
23,705,425 UART:
23,705,582 UART: [state] CFI Enabled
23,713,147 UART: [fht] FMC Alias Private Key: 7
26,043,523 UART: [art] Extend RT PCRs Done
26,044,758 UART: [art] Lock RT PCRs Done
26,046,712 UART: [art] Populate DV Done
26,051,964 UART: [fht] FMC Alias Private Key: 7
26,053,664 UART: [art] Derive CDI
26,054,500 UART: [art] Store in in slot 0x4
26,096,967 UART: [art] Derive Key Pair
26,098,019 UART: [art] Store priv key in slot 0x5
29,340,022 UART: [art] Derive Key Pair - Done
29,353,124 UART: [art] Signing Cert with AUTHO
29,354,468 UART: RITY.KEYID = 7
31,633,634 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,136 UART: [art] PUB.X = 7A9DDF9F8DDD75183647EC8582528121A5E969755085205E63AE4E3795ED694C039964976329A767C0278E7544FC5FE0
31,642,368 UART: [art] PUB.Y = 9037424541F79F968B3260A00BE473AF22AEFC1E1C5F4AE83CCAF07382C74E311D314F1691A96681DCD1388A4C041509
31,649,626 UART: [art] SIG.R = 747C694B0A57E6FAE2C1B7491B1E0407442E36AD128C95BEA575BFEEEA7DD24065C5E37267DDE183107B3795CE712608
31,656,962 UART: [art] SIG.S = 767F3AEDA00F2CD9AF5A557BD4094B78796A63059EEF67CB0AC5B8881E15FB6DC30A50F465F522E27CBA2EAE5624F79C
32,962,256 UART: Caliptra RT
32,962,972 UART: [state] CFI Enabled
33,081,334 UART: [rt] RT listening for mailbox commands...
33,083,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,113,816 UART: [rt]cmd =0x44504543, len=96
38,785,573 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,062 UART:
192,431 UART: Running Caliptra ROM ...
193,524 UART:
193,666 UART: [state] CFI Enabled
261,438 UART: [state] LifecycleState = Unprovisioned
263,278 UART: [state] DebugLocked = No
265,299 UART: [state] WD Timer not started. Device not locked for debugging
269,045 UART: [kat] SHA2-256
448,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,796 UART: [kat] ++
460,548 UART: [kat] sha1
471,217 UART: [kat] SHA2-256
474,242 UART: [kat] SHA2-384
481,300 UART: [kat] SHA2-512-ACC
484,304 UART: [kat] ECC-384
2,949,684 UART: [kat] HMAC-384Kdf
2,971,812 UART: [kat] LMS
3,501,214 UART: [kat] --
3,505,487 UART: [cold-reset] ++
3,507,064 UART: [fht] FHT @ 0x50003400
3,518,328 UART: [idev] ++
3,518,888 UART: [idev] CDI.KEYID = 6
3,519,802 UART: [idev] SUBJECT.KEYID = 7
3,520,974 UART: [idev] UDS.KEYID = 0
3,522,040 ready_for_fw is high
3,522,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,206 UART: [idev] Erasing UDS.KEYID = 0
6,026,953 UART: [idev] Sha1 KeyId Algorithm
6,050,778 UART: [idev] --
6,055,797 UART: [ldev] ++
6,056,367 UART: [ldev] CDI.KEYID = 6
6,057,434 UART: [ldev] SUBJECT.KEYID = 5
6,058,542 UART: [ldev] AUTHORITY.KEYID = 7
6,059,718 UART: [ldev] FE.KEYID = 1
6,098,842 UART: [ldev] Erasing FE.KEYID = 1
8,603,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,038 UART: [ldev] --
10,413,012 UART: [fwproc] Wait for Commands...
10,415,807 UART: [fwproc] Recv command 0x46574c44
10,417,841 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,060 >>> mbox cmd response: success
14,277,715 UART: [afmc] ++
14,278,304 UART: [afmc] CDI.KEYID = 6
14,279,213 UART: [afmc] SUBJECT.KEYID = 7
14,280,431 UART: [afmc] AUTHORITY.KEYID = 5
16,823,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,299 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,807 UART: [afmc] --
18,624,404 UART: [cold-reset] --
18,629,793 UART: [state] Locking Datavault
18,637,090 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,737 UART: [state] Locking ICCM
18,640,235 UART: [exit] Launching FMC @ 0x40000130
18,648,630 UART:
18,648,872 UART: Running Caliptra FMC ...
18,649,976 UART:
18,650,141 UART: [state] CFI Enabled
18,707,487 UART: [fht] FMC Alias Private Key: 7
20,471,689 UART: [art] Extend RT PCRs Done
20,472,912 UART: [art] Lock RT PCRs Done
20,474,566 UART: [art] Populate DV Done
20,479,778 UART: [fht] FMC Alias Private Key: 7
20,481,368 UART: [art] Derive CDI
20,482,175 UART: [art] Store in in slot 0x4
20,540,683 UART: [art] Derive Key Pair
20,541,719 UART: [art] Store priv key in slot 0x5
23,004,831 UART: [art] Derive Key Pair - Done
23,017,477 UART: [art] Signing Cert with AUTHO
23,018,788 UART: RITY.KEYID = 7
24,730,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,041 UART: [art] PUB.X = 64FF345AB24692B91A4C83FBDB326B0377DBAF46D02C3A5EA131D346E33A1A57CC43FFD97CC8FB4F61CD466B43BA2EB4
24,739,387 UART: [art] PUB.Y = 26865912353E19DD31B20321CCCBE207D20C4BB8DE06B8BA99359589DD80075E66A92886103F23F12E8CE25822B692A1
24,746,614 UART: [art] SIG.R = EEA754618515E7B10759AEBAE05F50E19C02D5754954E21765052498946BC9B2E4656E9F54C501132784E81F23AA2BB4
24,754,012 UART: [art] SIG.S = 66FFF5499E950386A1BDD7945D17C0BD6549B4C42DCD58050B13DA98DB2750027B9FC4EB95B52DCE2D3B523A3BDF5354
25,733,338 UART: Caliptra RT
25,734,052 UART: [state] CFI Enabled
25,899,292 UART: [rt] RT listening for mailbox commands...
25,901,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,505 UART: [rt]cmd =0x44504543, len=96
30,310,282 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,383,444 ready_for_fw is high
3,383,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,593 >>> mbox cmd response: success
18,367,029 UART:
18,367,412 UART: Running Caliptra FMC ...
18,368,603 UART:
18,368,769 UART: [state] CFI Enabled
18,434,703 UART: [fht] FMC Alias Private Key: 7
20,198,541 UART: [art] Extend RT PCRs Done
20,199,769 UART: [art] Lock RT PCRs Done
20,201,825 UART: [art] Populate DV Done
20,207,133 UART: [fht] FMC Alias Private Key: 7
20,208,708 UART: [art] Derive CDI
20,209,532 UART: [art] Store in in slot 0x4
20,266,079 UART: [art] Derive Key Pair
20,267,101 UART: [art] Store priv key in slot 0x5
22,730,269 UART: [art] Derive Key Pair - Done
22,743,216 UART: [art] Signing Cert with AUTHO
22,744,528 UART: RITY.KEYID = 7
24,455,655 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,156 UART: [art] PUB.X = F1697747EEB5DEB6F4BD75C32F7FB97292A9831F4A1D090A360A9550E72B0EFB9B964AA5C9360CD610F77EC76705F391
24,464,418 UART: [art] PUB.Y = 240442D855B68D287A731F51E800FED28375A0829319676419F6B9EBF336F49E5DA7EBFEA9EE25581ECC1C71BCFBA50C
24,471,687 UART: [art] SIG.R = 1DE3982D04895D548503974EC01B67A716B8A6BAF8480451F413682F0489C2811E1E9F1B4A23F62C33DD50A562FFAB38
24,479,046 UART: [art] SIG.S = EA7B848D2B1C4F7A3852094127658AD96C6559433194F860FCE95535D2BF925D1FD643C5F78B8C6108E43ADF33D5339B
25,457,583 UART: Caliptra RT
25,458,280 UART: [state] CFI Enabled
25,622,641 UART: [rt] RT listening for mailbox commands...
25,624,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,655,567 UART: [rt]cmd =0x44504543, len=96
30,014,568 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,403 UART:
192,764 UART: Running Caliptra ROM ...
193,958 UART:
603,442 UART: [state] CFI Enabled
616,629 UART: [state] LifecycleState = Unprovisioned
618,507 UART: [state] DebugLocked = No
620,043 UART: [state] WD Timer not started. Device not locked for debugging
624,376 UART: [kat] SHA2-256
803,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,098 UART: [kat] ++
815,544 UART: [kat] sha1
826,760 UART: [kat] SHA2-256
829,758 UART: [kat] SHA2-384
836,728 UART: [kat] SHA2-512-ACC
839,740 UART: [kat] ECC-384
3,280,020 UART: [kat] HMAC-384Kdf
3,291,689 UART: [kat] LMS
3,821,219 UART: [kat] --
3,825,286 UART: [cold-reset] ++
3,827,064 UART: [fht] FHT @ 0x50003400
3,837,323 UART: [idev] ++
3,837,874 UART: [idev] CDI.KEYID = 6
3,838,897 UART: [idev] SUBJECT.KEYID = 7
3,839,985 UART: [idev] UDS.KEYID = 0
3,841,027 ready_for_fw is high
3,841,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,041 UART: [idev] Erasing UDS.KEYID = 0
6,314,484 UART: [idev] Sha1 KeyId Algorithm
6,336,515 UART: [idev] --
6,339,580 UART: [ldev] ++
6,340,158 UART: [ldev] CDI.KEYID = 6
6,341,037 UART: [ldev] SUBJECT.KEYID = 5
6,342,237 UART: [ldev] AUTHORITY.KEYID = 7
6,343,459 UART: [ldev] FE.KEYID = 1
6,354,392 UART: [ldev] Erasing FE.KEYID = 1
8,826,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,890 UART: [ldev] --
10,616,172 UART: [fwproc] Wait for Commands...
10,617,670 UART: [fwproc] Recv command 0x46574c44
10,619,856 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,182 >>> mbox cmd response: success
14,483,563 UART: [afmc] ++
14,484,155 UART: [afmc] CDI.KEYID = 6
14,485,061 UART: [afmc] SUBJECT.KEYID = 7
14,486,217 UART: [afmc] AUTHORITY.KEYID = 5
16,985,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,703,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,751 UART: [afmc] --
18,779,395 UART: [cold-reset] --
18,781,519 UART: [state] Locking Datavault
18,787,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,232 UART: [state] Locking ICCM
18,791,085 UART: [exit] Launching FMC @ 0x40000130
18,799,483 UART:
18,799,710 UART: Running Caliptra FMC ...
18,800,803 UART:
18,800,952 UART: [state] CFI Enabled
18,809,421 UART: [fht] FMC Alias Private Key: 7
20,566,568 UART: [art] Extend RT PCRs Done
20,567,779 UART: [art] Lock RT PCRs Done
20,569,232 UART: [art] Populate DV Done
20,574,900 UART: [fht] FMC Alias Private Key: 7
20,576,547 UART: [art] Derive CDI
20,577,299 UART: [art] Store in in slot 0x4
20,619,938 UART: [art] Derive Key Pair
20,620,967 UART: [art] Store priv key in slot 0x5
23,047,333 UART: [art] Derive Key Pair - Done
23,060,398 UART: [art] Signing Cert with AUTHO
23,061,702 UART: RITY.KEYID = 7
24,767,076 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,579 UART: [art] PUB.X = FF8F5B8D27C55EB147C694CB24D95F42195C4F69308B2E50175AE3D55A1F9C947E07078BA95ECB931DAE0D5A7CD51A53
24,775,893 UART: [art] PUB.Y = 0E22483F2DD2F8BC0D5A0203FC7DA068A86D147A18E32AA570EDF40138633939A4575F4429DEE85F5701A954D43F90F3
24,783,121 UART: [art] SIG.R = E2A9B06628EDDDB9A42813ED9528033758509974E38485F9AAE095F97701862C637B74712BF13CF799541AC70A98DCFA
24,790,506 UART: [art] SIG.S = 55DE05F6C419BE035100AEC17DDEA3F6B9DAB2BCEB5CF5E9E5845EC3B19C79D6B4CF69B0FC9731CF0E623EFE59A4E59D
25,769,441 UART: Caliptra RT
25,770,142 UART: [state] CFI Enabled
25,887,359 UART: [rt] RT listening for mailbox commands...
25,889,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,920,091 UART: [rt]cmd =0x44504543, len=96
30,203,656 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,697,286 ready_for_fw is high
3,697,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,211 >>> mbox cmd response: success
18,530,191 UART:
18,530,571 UART: Running Caliptra FMC ...
18,531,673 UART:
18,531,821 UART: [state] CFI Enabled
18,539,923 UART: [fht] FMC Alias Private Key: 7
20,296,376 UART: [art] Extend RT PCRs Done
20,297,597 UART: [art] Lock RT PCRs Done
20,299,226 UART: [art] Populate DV Done
20,304,581 UART: [fht] FMC Alias Private Key: 7
20,306,289 UART: [art] Derive CDI
20,307,101 UART: [art] Store in in slot 0x4
20,349,588 UART: [art] Derive Key Pair
20,350,642 UART: [art] Store priv key in slot 0x5
22,777,178 UART: [art] Derive Key Pair - Done
22,790,073 UART: [art] Signing Cert with AUTHO
22,791,378 UART: RITY.KEYID = 7
24,496,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,414 UART: [art] PUB.X = 8607628AC40892EE2CFA078775BAE69ECE45FEAD57A0B407447925D3490AD41EA1A147E846D46DD41896ADE59A56764E
24,505,698 UART: [art] PUB.Y = 7774DAC398E625B7AFFD987E36FBD388CB3D6027CE1AD8F50812529A95C5FD5CB0F09DC9133479D4D811DE37A8FD1EFA
24,512,980 UART: [art] SIG.R = C435EA4B54CBF98A1AC4B8F243C884793FA1BE37FA5750A8B4211712E268C7BA11F38D2CD9F206833A7327B4427AA8E6
24,520,372 UART: [art] SIG.S = 570230D41E458C582E38380594EEC256C1A095CE6C43C4C6448A84E4556073A930CF00AFAC3DCEDC59115FAAD27A53CF
25,499,818 UART: Caliptra RT
25,500,511 UART: [state] CFI Enabled
25,618,049 UART: [rt] RT listening for mailbox commands...
25,619,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,650,659 UART: [rt]cmd =0x44504543, len=96
29,932,591 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,124 UART:
192,484 UART: Running Caliptra ROM ...
193,600 UART:
193,744 UART: [state] CFI Enabled
262,534 UART: [state] LifecycleState = Unprovisioned
264,892 UART: [state] DebugLocked = No
266,548 UART: [state] WD Timer not started. Device not locked for debugging
270,882 UART: [kat] SHA2-256
460,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,499 UART: [kat] ++
471,961 UART: [kat] sha1
483,119 UART: [kat] SHA2-256
486,126 UART: [kat] SHA2-384
492,396 UART: [kat] SHA2-512-ACC
494,976 UART: [kat] ECC-384
2,948,826 UART: [kat] HMAC-384Kdf
2,969,655 UART: [kat] LMS
3,501,432 UART: [kat] --
3,508,430 UART: [cold-reset] ++
3,509,940 UART: [fht] FHT @ 0x50003400
3,521,272 UART: [idev] ++
3,521,903 UART: [idev] CDI.KEYID = 6
3,522,891 UART: [idev] SUBJECT.KEYID = 7
3,524,062 UART: [idev] UDS.KEYID = 0
3,524,987 ready_for_fw is high
3,525,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,152 UART: [idev] Erasing UDS.KEYID = 0
6,029,354 UART: [idev] Sha1 KeyId Algorithm
6,052,417 UART: [idev] --
6,057,383 UART: [ldev] ++
6,058,063 UART: [ldev] CDI.KEYID = 6
6,058,976 UART: [ldev] SUBJECT.KEYID = 5
6,060,136 UART: [ldev] AUTHORITY.KEYID = 7
6,061,366 UART: [ldev] FE.KEYID = 1
6,097,820 UART: [ldev] Erasing FE.KEYID = 1
8,604,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,732 UART: [ldev] --
10,412,372 UART: [fwproc] Wait for Commands...
10,414,861 UART: [fwproc] Recv command 0x46574c44
10,417,168 UART: [fwproc] Recv'd Img size: 114448 bytes
13,868,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,607,826 >>> mbox cmd response: success
14,612,243 UART: [afmc] ++
14,612,942 UART: [afmc] CDI.KEYID = 6
14,614,104 UART: [afmc] SUBJECT.KEYID = 7
14,615,637 UART: [afmc] AUTHORITY.KEYID = 5
17,147,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,119 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,452 UART: [afmc] --
18,944,187 UART: [cold-reset] --
18,947,888 UART: [state] Locking Datavault
18,951,893 UART: [state] Locking PCR0, PCR1 and PCR31
18,954,079 UART: [state] Locking ICCM
18,955,906 UART: [exit] Launching FMC @ 0x40000130
18,964,577 UART:
18,964,818 UART: Running Caliptra FMC ...
18,965,916 UART:
18,966,076 UART: [state] CFI Enabled
19,031,048 UART: [fht] FMC Alias Private Key: 7
20,795,003 UART: [art] Extend RT PCRs Done
20,796,223 UART: [art] Lock RT PCRs Done
20,797,841 UART: [art] Populate DV Done
20,803,413 UART: [fht] FMC Alias Private Key: 7
20,804,891 UART: [art] Derive CDI
20,805,668 UART: [art] Store in in slot 0x4
20,864,064 UART: [art] Derive Key Pair
20,865,102 UART: [art] Store priv key in slot 0x5
23,327,999 UART: [art] Derive Key Pair - Done
23,341,317 UART: [art] Signing Cert with AUTHO
23,342,614 UART: RITY.KEYID = 7
25,054,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,084 UART: [art] PUB.X = 2EFF29B6E31481072675F3CFD1FDA8D4B7AF8ED503BA60056A7DA85A832DFEB1E178B1B00336A7D611DF4660A3DA272D
25,063,384 UART: [art] PUB.Y = AEF045CBD68F008F1E8B5F1BAC0A88732E8BC366B83F27C1CA02D4E735254491A5D76A3D66A54418129BBCCCC7DD5FBE
25,070,590 UART: [art] SIG.R = BC0E17BE16A671570EE7BBCD78C540C7FF5BA1CE5CDF5EE07504F232DB940A910407270E0419DAEE92F3FEFCE28FB601
25,077,999 UART: [art] SIG.S = 5FC99A91A76566A541342F9D58E249EF1AE557DF59C6AC2BE67E5F3DB2BFD16742B85624F56E7311BE3CC2E72F6EC2D2
26,057,171 UART: Caliptra RT
26,057,855 UART: [state] CFI Enabled
26,221,986 UART: [rt] RT listening for mailbox commands...
26,223,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,015 UART: [rt]cmd =0x44504543, len=96
30,613,303 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,432,476 ready_for_fw is high
3,433,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,267 >>> mbox cmd response: success
19,024,170 UART:
19,024,552 UART: Running Caliptra FMC ...
19,025,749 UART:
19,025,921 UART: [state] CFI Enabled
19,087,692 UART: [fht] FMC Alias Private Key: 7
20,851,790 UART: [art] Extend RT PCRs Done
20,853,000 UART: [art] Lock RT PCRs Done
20,854,522 UART: [art] Populate DV Done
20,860,042 UART: [fht] FMC Alias Private Key: 7
20,861,742 UART: [art] Derive CDI
20,862,556 UART: [art] Store in in slot 0x4
20,920,133 UART: [art] Derive Key Pair
20,921,129 UART: [art] Store priv key in slot 0x5
23,384,483 UART: [art] Derive Key Pair - Done
23,397,432 UART: [art] Signing Cert with AUTHO
23,398,741 UART: RITY.KEYID = 7
25,110,204 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,750 UART: [art] PUB.X = 32317C61217A68AF95DF918A0C35EEE83E311A1B1D6255240D8A030AA3A85F44A0882DCCBFEEA8AC03BA6A5C724C2762
25,118,950 UART: [art] PUB.Y = 3AA4832EE655F091CBC08E06D92A95CE86D90D2DD8960B34AAA16886AE3799043CD6A69922D8AA126C49CE88938BD15C
25,126,244 UART: [art] SIG.R = 59C40B158C9A67B4EDEF50737318575E64C7FF1C6ECFAAFDF4843F3D236128113291EF95978A66869C49CE09A8D099F1
25,133,587 UART: [art] SIG.S = 2661750A4360F7347A63F357038EF094A724B1A9D786C641080C311FD907D9ADF95E1852DA90406C8DA4443187876266
26,112,816 UART: Caliptra RT
26,113,736 UART: [state] CFI Enabled
26,279,219 UART: [rt] RT listening for mailbox commands...
26,281,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,312,606 UART: [rt]cmd =0x44504543, len=96
30,691,306 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,100 writing to cptra_bootfsm_go
193,403 UART:
193,770 UART: Running Caliptra ROM ...
194,862 UART:
604,432 UART: [state] CFI Enabled
617,953 UART: [state] LifecycleState = Unprovisioned
620,324 UART: [state] DebugLocked = No
623,196 UART: [state] WD Timer not started. Device not locked for debugging
628,355 UART: [kat] SHA2-256
818,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,017 UART: [kat] ++
829,537 UART: [kat] sha1
840,968 UART: [kat] SHA2-256
843,966 UART: [kat] SHA2-384
850,238 UART: [kat] SHA2-512-ACC
852,809 UART: [kat] ECC-384
3,294,825 UART: [kat] HMAC-384Kdf
3,307,787 UART: [kat] LMS
3,839,642 UART: [kat] --
3,844,743 UART: [cold-reset] ++
3,845,574 UART: [fht] FHT @ 0x50003400
3,858,674 UART: [idev] ++
3,859,367 UART: [idev] CDI.KEYID = 6
3,860,313 UART: [idev] SUBJECT.KEYID = 7
3,861,542 UART: [idev] UDS.KEYID = 0
3,862,430 ready_for_fw is high
3,862,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,310 UART: [idev] Erasing UDS.KEYID = 0
6,337,150 UART: [idev] Sha1 KeyId Algorithm
6,359,668 UART: [idev] --
6,364,629 UART: [ldev] ++
6,365,302 UART: [ldev] CDI.KEYID = 6
6,366,259 UART: [ldev] SUBJECT.KEYID = 5
6,367,429 UART: [ldev] AUTHORITY.KEYID = 7
6,368,654 UART: [ldev] FE.KEYID = 1
6,379,130 UART: [ldev] Erasing FE.KEYID = 1
8,859,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,090 UART: [ldev] --
10,649,120 UART: [fwproc] Wait for Commands...
10,651,969 UART: [fwproc] Recv command 0x46574c44
10,654,267 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,840,777 >>> mbox cmd response: success
14,845,201 UART: [afmc] ++
14,845,914 UART: [afmc] CDI.KEYID = 6
14,847,160 UART: [afmc] SUBJECT.KEYID = 7
14,848,598 UART: [afmc] AUTHORITY.KEYID = 5
17,351,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,932 UART: [afmc] --
19,148,249 UART: [cold-reset] --
19,152,327 UART: [state] Locking Datavault
19,156,781 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,925 UART: [state] Locking ICCM
19,161,825 UART: [exit] Launching FMC @ 0x40000130
19,170,513 UART:
19,170,745 UART: Running Caliptra FMC ...
19,171,836 UART:
19,171,992 UART: [state] CFI Enabled
19,180,303 UART: [fht] FMC Alias Private Key: 7
20,936,999 UART: [art] Extend RT PCRs Done
20,938,216 UART: [art] Lock RT PCRs Done
20,940,050 UART: [art] Populate DV Done
20,945,511 UART: [fht] FMC Alias Private Key: 7
20,947,094 UART: [art] Derive CDI
20,947,825 UART: [art] Store in in slot 0x4
20,990,190 UART: [art] Derive Key Pair
20,991,228 UART: [art] Store priv key in slot 0x5
23,417,394 UART: [art] Derive Key Pair - Done
23,430,276 UART: [art] Signing Cert with AUTHO
23,431,574 UART: RITY.KEYID = 7
25,137,241 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,742 UART: [art] PUB.X = EE0FF03A46F3F3F0C2E2EA77AE29BD87DD90037CEB895F50FFC857E444AE0BFE99EB07AC2D0D1C189D9C78067535C7DB
25,146,074 UART: [art] PUB.Y = 87713E70E8B01CBDCAA527F128EC11D086DA91CE0F52B9A5845E8946B481A8EA171BA84015C8447AA44CEEDD48AFA529
25,153,347 UART: [art] SIG.R = 997F3E6949BD67DB1B836FC16F3E5A346906BF2B589DE58D1C088EE6F1E3149B36891F0B73C2C841E7FD2C6EE20CC89C
25,160,721 UART: [art] SIG.S = 754AF39E009D168A80E151EF6537698634B87028748308CE0A78C78ACB6D99F4C206975787D2674FD88A419C204ABB8A
26,139,643 UART: Caliptra RT
26,140,352 UART: [state] CFI Enabled
26,257,058 UART: [rt] RT listening for mailbox commands...
26,259,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,289,916 UART: [rt]cmd =0x44504543, len=96
30,573,317 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,752,608 ready_for_fw is high
3,753,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,969 >>> mbox cmd response: success
19,209,658 UART:
19,210,045 UART: Running Caliptra FMC ...
19,211,241 UART:
19,211,394 UART: [state] CFI Enabled
19,219,227 UART: [fht] FMC Alias Private Key: 7
20,976,177 UART: [art] Extend RT PCRs Done
20,977,399 UART: [art] Lock RT PCRs Done
20,979,024 UART: [art] Populate DV Done
20,984,539 UART: [fht] FMC Alias Private Key: 7
20,986,076 UART: [art] Derive CDI
20,986,887 UART: [art] Store in in slot 0x4
21,029,803 UART: [art] Derive Key Pair
21,030,842 UART: [art] Store priv key in slot 0x5
23,457,523 UART: [art] Derive Key Pair - Done
23,470,738 UART: [art] Signing Cert with AUTHO
23,472,033 UART: RITY.KEYID = 7
25,177,781 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,289 UART: [art] PUB.X = CFA763BD7BF9BD177B7EC98F6828CA6364F2E8DE7E28CDEA09049624DC40BA591BE445D4174EFAF51FD2AD0D3B43786A
25,186,570 UART: [art] PUB.Y = 286F1348A5BBF06659D3A3D34DE6994FE459A877C42FDD913921C1978240AD2A270DA7D58BA76CBF2CFFB003DAC5541E
25,193,852 UART: [art] SIG.R = 3A9EE2A9ECBAC76671829740BC9803FF85399E13EF4556C4B90211F6355DFCCAF801C5002525E7B5BB620279045BE89A
25,201,231 UART: [art] SIG.S = CC5DAE8427D77D4E7C364A9958B50845EE6BB1C6E619FD455C03D03BF622C0384744664B220D3B92B7EB91E39A279EDC
26,180,718 UART: Caliptra RT
26,181,408 UART: [state] CFI Enabled
26,298,719 UART: [rt] RT listening for mailbox commands...
26,300,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,468 UART: [rt]cmd =0x44504543, len=96
30,615,316 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,741 UART: [kat] SHA2-256
881,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,787 UART: [kat] ++
885,939 UART: [kat] sha1
890,195 UART: [kat] SHA2-256
892,133 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
906,906 UART: [kat] LMS
1,475,102 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,537 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 ready_for_fw is high
1,480,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,505,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,448 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,521,003 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,098 UART: [ldev] --
1,585,363 UART: [fwproc] Waiting for Commands...
1,586,096 UART: [fwproc] Received command 0x46574c44
1,586,887 UART: [fwproc] Received Image of size 114448 bytes
2,886,074 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,769 >>> mbox cmd response: success
3,079,969 UART: [afmc] ++
3,080,137 UART: [afmc] CDI.KEYID = 6
3,080,499 UART: [afmc] SUBJECT.KEYID = 7
3,080,924 UART: [afmc] AUTHORITY.KEYID = 5
3,116,377 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,116 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,806 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,597 UART: [afmc] --
3,159,729 UART: [cold-reset] --
3,160,633 UART: [state] Locking Datavault
3,161,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,344 UART: [state] Locking ICCM
3,162,982 UART: [exit] Launching FMC @ 0x40000130
3,168,311 UART:
3,168,327 UART: Running Caliptra FMC ...
3,168,735 UART:
3,168,789 UART: [state] CFI Enabled
3,179,092 UART: [fht] FMC Alias Private Key: 7
3,286,911 UART: [art] Extend RT PCRs Done
3,287,339 UART: [art] Lock RT PCRs Done
3,289,071 UART: [art] Populate DV Done
3,297,232 UART: [fht] FMC Alias Private Key: 7
3,298,270 UART: [art] Derive CDI
3,298,550 UART: [art] Store in in slot 0x4
3,384,583 UART: [art] Derive Key Pair
3,384,943 UART: [art] Store priv key in slot 0x5
3,398,577 UART: [art] Derive Key Pair - Done
3,413,047 UART: [art] Signing Cert with AUTHO
3,413,527 UART: RITY.KEYID = 7
3,428,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,612 UART: [art] PUB.X = 1256A9BDC2119045F7D56177084B94B196204B674A88CCE15E335EEFB966E9FC185BF29C5CB90B8218460675D6420048
3,436,345 UART: [art] PUB.Y = 6432AE85A66AF2FDD79D03021A8BF6B7F6648639B954CE9254909A8ED4938BF4CA5349DFCB72A8687028EAD075CDA231
3,443,297 UART: [art] SIG.R = 49921940066971D6F953E018FF0C64F243DBA828468911292557DF788D197ED486EB38F416DF435A563B3231E5B4DA70
3,450,051 UART: [art] SIG.S = 3B117EE618F8A1A50F2F34C2C71281731901DCADFC9C8A0974B711E023202965D46516BF8940E7E66932BACC170D5DD0
3,473,388 UART: Caliptra RT
3,473,641 UART: [state] CFI Enabled
3,581,697 UART: [rt] RT listening for mailbox commands...
3,582,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,773 UART: [rt]cmd =0x44504543, len=96
3,792,635 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 ready_for_fw is high
1,362,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,985 >>> mbox cmd response: success
2,990,267 UART:
2,990,283 UART: Running Caliptra FMC ...
2,990,691 UART:
2,990,745 UART: [state] CFI Enabled
3,000,808 UART: [fht] FMC Alias Private Key: 7
3,109,115 UART: [art] Extend RT PCRs Done
3,109,543 UART: [art] Lock RT PCRs Done
3,110,997 UART: [art] Populate DV Done
3,119,004 UART: [fht] FMC Alias Private Key: 7
3,120,062 UART: [art] Derive CDI
3,120,342 UART: [art] Store in in slot 0x4
3,206,075 UART: [art] Derive Key Pair
3,206,435 UART: [art] Store priv key in slot 0x5
3,219,741 UART: [art] Derive Key Pair - Done
3,234,621 UART: [art] Signing Cert with AUTHO
3,235,101 UART: RITY.KEYID = 7
3,250,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,926 UART: [art] PUB.X = B15B31B712B0D6976902512741BB30CDDE166CFA7F6EA6380515B57E489E9214AA7ED0D64146FC7D9735D77EDE866AF4
3,257,696 UART: [art] PUB.Y = EDCA9CBB8D6C36CEEF435473F338B07453EDC37BDC5FEBD5031777B86BD17DFAC6BBFDF74B51F3DF2B21822B2CD682C4
3,264,673 UART: [art] SIG.R = 68DCA8F3679977257FEED131B44491E574050A716866B33DC120ECA473F43106DF7D90962B917B16DC91734C413716D6
3,271,426 UART: [art] SIG.S = 43DE54285132B68D0985E4BBFED5D670BF109FC1487193D3B27F2AB20DC02E0C9951464665E93758FED1328A58B5D06A
3,295,074 UART: Caliptra RT
3,295,327 UART: [state] CFI Enabled
3,403,849 UART: [rt] RT listening for mailbox commands...
3,404,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,823 UART: [rt]cmd =0x44504543, len=96
3,615,456 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,898 UART: [kat] SHA2-256
881,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,944 UART: [kat] ++
886,096 UART: [kat] sha1
890,170 UART: [kat] SHA2-256
892,108 UART: [kat] SHA2-384
894,901 UART: [kat] SHA2-512-ACC
896,802 UART: [kat] ECC-384
902,119 UART: [kat] HMAC-384Kdf
906,735 UART: [kat] LMS
1,474,931 UART: [kat] --
1,475,874 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,189 UART: [idev] ++
1,479,357 UART: [idev] CDI.KEYID = 6
1,479,717 UART: [idev] SUBJECT.KEYID = 7
1,480,141 UART: [idev] UDS.KEYID = 0
1,480,486 ready_for_fw is high
1,480,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,055 UART: [idev] Erasing UDS.KEYID = 0
1,504,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,451 UART: [idev] --
1,514,642 UART: [ldev] ++
1,514,810 UART: [ldev] CDI.KEYID = 6
1,515,173 UART: [ldev] SUBJECT.KEYID = 5
1,515,599 UART: [ldev] AUTHORITY.KEYID = 7
1,516,062 UART: [ldev] FE.KEYID = 1
1,521,296 UART: [ldev] Erasing FE.KEYID = 1
1,546,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,203 UART: [ldev] --
1,585,622 UART: [fwproc] Waiting for Commands...
1,586,353 UART: [fwproc] Received command 0x46574c44
1,587,144 UART: [fwproc] Received Image of size 114448 bytes
2,886,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,628 >>> mbox cmd response: success
3,080,662 UART: [afmc] ++
3,080,830 UART: [afmc] CDI.KEYID = 6
3,081,192 UART: [afmc] SUBJECT.KEYID = 7
3,081,617 UART: [afmc] AUTHORITY.KEYID = 5
3,116,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,487 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,177 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,016 UART: [afmc] --
3,159,990 UART: [cold-reset] --
3,160,798 UART: [state] Locking Datavault
3,161,863 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,467 UART: [state] Locking ICCM
3,162,903 UART: [exit] Launching FMC @ 0x40000130
3,168,232 UART:
3,168,248 UART: Running Caliptra FMC ...
3,168,656 UART:
3,168,799 UART: [state] CFI Enabled
3,179,030 UART: [fht] FMC Alias Private Key: 7
3,287,383 UART: [art] Extend RT PCRs Done
3,287,811 UART: [art] Lock RT PCRs Done
3,289,579 UART: [art] Populate DV Done
3,297,834 UART: [fht] FMC Alias Private Key: 7
3,299,004 UART: [art] Derive CDI
3,299,284 UART: [art] Store in in slot 0x4
3,385,285 UART: [art] Derive Key Pair
3,385,645 UART: [art] Store priv key in slot 0x5
3,399,417 UART: [art] Derive Key Pair - Done
3,414,412 UART: [art] Signing Cert with AUTHO
3,414,892 UART: RITY.KEYID = 7
3,430,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,165 UART: [art] PUB.X = AC3261F01C0AA2110902DAE6481BE937D46FF25D64120AC4670C739FF1AE9623AF59E2E6D7F327818A00A75F4D45D965
3,437,902 UART: [art] PUB.Y = 8A4375CA38B2ACF10B6952FD4C2AA07BAE3AD98E7BDDFFEB8EEE9AD37DEC62B7504E49DBAF719AD6D4DBFAF526CFBF62
3,444,891 UART: [art] SIG.R = DDA2069A8AB14BB409454C0981B6034CE17F85112F8A4480313E71DF44FED0CEA89F5CBCD22ED2A3582ADE611573F4ED
3,451,663 UART: [art] SIG.S = 6A85D3177D5D0695968C57531F6B7831D679EA0E82DFE5A5528621C110080F0035906C93367E03DA27FE98FEC5CF95D6
3,475,131 UART: Caliptra RT
3,475,476 UART: [state] CFI Enabled
3,584,727 UART: [rt] RT listening for mailbox commands...
3,585,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,925 UART: [rt]cmd =0x44504543, len=96
3,796,406 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,994 ready_for_fw is high
1,362,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,566 >>> mbox cmd response: success
2,991,982 UART:
2,991,998 UART: Running Caliptra FMC ...
2,992,406 UART:
2,992,549 UART: [state] CFI Enabled
3,003,136 UART: [fht] FMC Alias Private Key: 7
3,110,905 UART: [art] Extend RT PCRs Done
3,111,333 UART: [art] Lock RT PCRs Done
3,112,493 UART: [art] Populate DV Done
3,120,684 UART: [fht] FMC Alias Private Key: 7
3,121,768 UART: [art] Derive CDI
3,122,048 UART: [art] Store in in slot 0x4
3,207,663 UART: [art] Derive Key Pair
3,208,023 UART: [art] Store priv key in slot 0x5
3,221,775 UART: [art] Derive Key Pair - Done
3,236,566 UART: [art] Signing Cert with AUTHO
3,237,046 UART: RITY.KEYID = 7
3,252,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,949 UART: [art] PUB.X = D616574769961784030FE2192C0EE65C0CB0426324432F8EBDBD35DE59F6A5268C08C6E7D6E7ECBFE3547E7169FAA2C7
3,259,710 UART: [art] PUB.Y = FC0ED3C74BF66645A6912DE2629E1F2AEFBD714D570EFCDA6B7DF4D9B4ECEBD4B88CF3277DFA3399F655B58FD7EC3DDF
3,266,688 UART: [art] SIG.R = 109033F87B1979C747101BDD9D69719F0584A2A3D8A8CDC528DBCF3F6E4C6D36C6173C155E5797C304A3FFD354EB009B
3,273,436 UART: [art] SIG.S = 9EB1976479C2810BE77C04EB541883D4BC10CE2DCB5A9F0E4695B0DC8D3C404E286FCE6A733EA86557162E5BAE439DE1
3,297,150 UART: Caliptra RT
3,297,495 UART: [state] CFI Enabled
3,405,794 UART: [rt] RT listening for mailbox commands...
3,406,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,982 UART: [rt]cmd =0x44504543, len=96
3,618,063 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,247 UART: [kat] SHA2-256
904,187 UART: [kat] SHA2-384
907,010 UART: [kat] SHA2-512-ACC
908,911 UART: [kat] ECC-384
918,486 UART: [kat] HMAC-384Kdf
923,182 UART: [kat] LMS
1,171,510 UART: [kat] --
1,172,439 UART: [cold-reset] ++
1,172,801 UART: [fht] FHT @ 0x50003400
1,175,460 UART: [idev] ++
1,175,628 UART: [idev] CDI.KEYID = 6
1,175,988 UART: [idev] SUBJECT.KEYID = 7
1,176,412 UART: [idev] UDS.KEYID = 0
1,176,757 ready_for_fw is high
1,176,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,523 UART: [idev] Sha1 KeyId Algorithm
1,209,909 UART: [idev] --
1,211,137 UART: [ldev] ++
1,211,305 UART: [ldev] CDI.KEYID = 6
1,211,668 UART: [ldev] SUBJECT.KEYID = 5
1,212,094 UART: [ldev] AUTHORITY.KEYID = 7
1,212,557 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,243,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,736 UART: [fwproc] Wait for Commands...
1,283,334 UART: [fwproc] Recv command 0x46574c44
1,284,062 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,650 >>> mbox cmd response: success
2,776,788 UART: [afmc] ++
2,776,956 UART: [afmc] CDI.KEYID = 6
2,777,318 UART: [afmc] SUBJECT.KEYID = 7
2,777,743 UART: [afmc] AUTHORITY.KEYID = 5
2,813,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,862 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,581 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,273 UART: [afmc] --
2,856,155 UART: [cold-reset] --
2,856,909 UART: [state] Locking Datavault
2,858,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,714 UART: [state] Locking ICCM
2,859,350 UART: [exit] Launching FMC @ 0x40000130
2,864,679 UART:
2,864,695 UART: Running Caliptra FMC ...
2,865,103 UART:
2,865,157 UART: [state] CFI Enabled
2,875,666 UART: [fht] FMC Alias Private Key: 7
2,983,185 UART: [art] Extend RT PCRs Done
2,983,613 UART: [art] Lock RT PCRs Done
2,985,103 UART: [art] Populate DV Done
2,993,280 UART: [fht] FMC Alias Private Key: 7
2,994,446 UART: [art] Derive CDI
2,994,726 UART: [art] Store in in slot 0x4
3,080,183 UART: [art] Derive Key Pair
3,080,543 UART: [art] Store priv key in slot 0x5
3,093,253 UART: [art] Derive Key Pair - Done
3,108,180 UART: [art] Signing Cert with AUTHO
3,108,660 UART: RITY.KEYID = 7
3,123,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,529 UART: [art] PUB.X = 3F29DBA00D76EB5691031DD45AFCA2CC00339DA20A139B346122C225FCE47BD7B74DF26DC9A221066E353C8E2AB90851
3,131,272 UART: [art] PUB.Y = 30F35C32442DCD8399ECDCBC6E4BD1AFC93DEC56E5AC06AAF607A5C4D6DBA5000F76B47C00FBC934249AC631C3574F7D
3,138,193 UART: [art] SIG.R = DDAD5D03ACA28DA3B0B75064EF96234857DF0043601D3777BC765F2EC64F017B5A9FACF2D3387A731C5DF81BD859469F
3,144,947 UART: [art] SIG.S = ACDFFD62853712BA29ECF223463C3A3AAFD19E18AC698F22BD3323B53221BB54AF38AA99E4A78188BB11EE85FB85D7DD
3,168,236 UART: Caliptra RT
3,168,489 UART: [state] CFI Enabled
3,275,653 UART: [rt] RT listening for mailbox commands...
3,276,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,651 UART: [rt]cmd =0x44504543, len=96
3,486,396 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,001 ready_for_fw is high
1,060,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,617 >>> mbox cmd response: success
2,692,033 UART:
2,692,049 UART: Running Caliptra FMC ...
2,692,457 UART:
2,692,511 UART: [state] CFI Enabled
2,703,036 UART: [fht] FMC Alias Private Key: 7
2,811,577 UART: [art] Extend RT PCRs Done
2,812,005 UART: [art] Lock RT PCRs Done
2,813,849 UART: [art] Populate DV Done
2,822,284 UART: [fht] FMC Alias Private Key: 7
2,823,252 UART: [art] Derive CDI
2,823,532 UART: [art] Store in in slot 0x4
2,909,151 UART: [art] Derive Key Pair
2,909,511 UART: [art] Store priv key in slot 0x5
2,921,745 UART: [art] Derive Key Pair - Done
2,936,302 UART: [art] Signing Cert with AUTHO
2,936,782 UART: RITY.KEYID = 7
2,951,958 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,723 UART: [art] PUB.X = FF164B01AA1F1A571927B7E09E62E7A0B841450486FF5C8FDA6595581CCFCF68CAC3FDB84F70FB510961032B1F018779
2,959,486 UART: [art] PUB.Y = D7B2954D29D812F2AA37A5B5EA805E7D4AA4535D3554C9BDC54038CCCF200087D7E169F19067FA607B03334837F6C82C
2,966,415 UART: [art] SIG.R = 033D67472618FD6510250852D26931B4B4DCF3FBF12D0294768C01B9A8EB581B6EE52093093EB841DCA6D988B6B762CF
2,973,170 UART: [art] SIG.S = 8C3973D73CFFD1C4213A4BBC33FCFE42E802113AF9468CB2E5F9E9E221451C8CEBDB667AC89CC2C9667B64EE95801D5B
2,997,340 UART: Caliptra RT
2,997,593 UART: [state] CFI Enabled
3,104,856 UART: [rt] RT listening for mailbox commands...
3,105,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,012 UART: [rt]cmd =0x44504543, len=96
3,315,215 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,609 UART: [kat] SHA2-512-ACC
908,510 UART: [kat] ECC-384
918,147 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,678 UART: [fht] FHT @ 0x50003400
1,175,451 UART: [idev] ++
1,175,619 UART: [idev] CDI.KEYID = 6
1,175,979 UART: [idev] SUBJECT.KEYID = 7
1,176,403 UART: [idev] UDS.KEYID = 0
1,176,748 ready_for_fw is high
1,176,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,374 UART: [ldev] Erasing FE.KEYID = 1
1,243,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,304 UART: [ldev] --
1,282,565 UART: [fwproc] Wait for Commands...
1,283,377 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,093 >>> mbox cmd response: success
2,777,355 UART: [afmc] ++
2,777,523 UART: [afmc] CDI.KEYID = 6
2,777,885 UART: [afmc] SUBJECT.KEYID = 7
2,778,310 UART: [afmc] AUTHORITY.KEYID = 5
2,814,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,008 UART: [afmc] --
2,857,962 UART: [cold-reset] --
2,858,820 UART: [state] Locking Datavault
2,860,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,727 UART: [state] Locking ICCM
2,861,243 UART: [exit] Launching FMC @ 0x40000130
2,866,572 UART:
2,866,588 UART: Running Caliptra FMC ...
2,866,996 UART:
2,867,139 UART: [state] CFI Enabled
2,877,818 UART: [fht] FMC Alias Private Key: 7
2,985,703 UART: [art] Extend RT PCRs Done
2,986,131 UART: [art] Lock RT PCRs Done
2,987,543 UART: [art] Populate DV Done
2,995,608 UART: [fht] FMC Alias Private Key: 7
2,996,762 UART: [art] Derive CDI
2,997,042 UART: [art] Store in in slot 0x4
3,082,961 UART: [art] Derive Key Pair
3,083,321 UART: [art] Store priv key in slot 0x5
3,096,705 UART: [art] Derive Key Pair - Done
3,111,307 UART: [art] Signing Cert with AUTHO
3,111,787 UART: RITY.KEYID = 7
3,127,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,064 UART: [art] PUB.X = 5536B629D611E8E8DA5D1FB99B67E5D9E09296B21167BD0CF58DCD197C240101E01FC592D9A23DE91BE5897133114F94
3,134,827 UART: [art] PUB.Y = C9DB918C51D0445CEFCCD993092D49417B8F5082CEB54A994F015228BEEF3CE622FC65A7F9754024DFEB564BFB6C9DC1
3,141,787 UART: [art] SIG.R = E136E394E6C6397DBCBCDBC0170C96C419BE15FDBF39DA78E2B322598E1563AB51E056591EBEC3D93E10F9049722D65F
3,148,563 UART: [art] SIG.S = 1BDEC85C804BF1A2251A3E499B925EC2AF0AAB94E646324764BA156347A9C3707F4834B6FE4CB089334A213CD2258CC2
3,172,365 UART: Caliptra RT
3,172,710 UART: [state] CFI Enabled
3,279,877 UART: [rt] RT listening for mailbox commands...
3,280,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,035 UART: [rt]cmd =0x44504543, len=96
3,491,662 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 ready_for_fw is high
1,060,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,698 >>> mbox cmd response: success
2,690,432 UART:
2,690,448 UART: Running Caliptra FMC ...
2,690,856 UART:
2,690,999 UART: [state] CFI Enabled
2,701,666 UART: [fht] FMC Alias Private Key: 7
2,810,593 UART: [art] Extend RT PCRs Done
2,811,021 UART: [art] Lock RT PCRs Done
2,812,267 UART: [art] Populate DV Done
2,820,550 UART: [fht] FMC Alias Private Key: 7
2,821,484 UART: [art] Derive CDI
2,821,764 UART: [art] Store in in slot 0x4
2,907,387 UART: [art] Derive Key Pair
2,907,747 UART: [art] Store priv key in slot 0x5
2,921,329 UART: [art] Derive Key Pair - Done
2,936,176 UART: [art] Signing Cert with AUTHO
2,936,656 UART: RITY.KEYID = 7
2,951,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,537 UART: [art] PUB.X = 604BF94923810D5174D3E8A3C90744257DC3CA1232775FC185687591E91FC87F38F28DA3E62E4A4558F0AEB16C0862BB
2,959,296 UART: [art] PUB.Y = F72C8BBE34F0A3BC0144E43841F4E67212D31E34F103B912EE6FA7ED7840E4632FE00913FFEAC62DDAD0FEE77E797CAD
2,966,257 UART: [art] SIG.R = E08D244DFA1D3BA18AA16CDF225FC8374A437515196D306DD4FF43C80977E66B06AE9836172E5E200C83F7EDDF36833A
2,973,026 UART: [art] SIG.S = 4A4EEA1E8A515D1FC5363F6961902CA0751AF1757ECB2B8C03FA0DF87E566DA83BF355F097B37A054E7F9DA3238DAD04
2,996,685 UART: Caliptra RT
2,997,030 UART: [state] CFI Enabled
3,105,119 UART: [rt] RT listening for mailbox commands...
3,105,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,247 UART: [rt]cmd =0x44504543, len=96
3,317,415 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 ready_for_fw is high
1,174,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,372 UART: [ldev] ++
1,209,540 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,331 UART: [ldev] AUTHORITY.KEYID = 7
1,210,794 UART: [ldev] FE.KEYID = 1
1,215,830 UART: [ldev] Erasing FE.KEYID = 1
1,242,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,952 >>> mbox cmd response: success
2,775,111 UART: [afmc] ++
2,775,279 UART: [afmc] CDI.KEYID = 6
2,775,642 UART: [afmc] SUBJECT.KEYID = 7
2,776,068 UART: [afmc] AUTHORITY.KEYID = 5
2,811,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,280 UART: [afmc] --
2,855,308 UART: [cold-reset] --
2,856,156 UART: [state] Locking Datavault
2,857,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,115 UART: [state] Locking ICCM
2,858,535 UART: [exit] Launching FMC @ 0x40000130
2,863,864 UART:
2,863,880 UART: Running Caliptra FMC ...
2,864,288 UART:
2,864,342 UART: [state] CFI Enabled
2,874,841 UART: [fht] FMC Alias Private Key: 7
2,983,594 UART: [art] Extend RT PCRs Done
2,984,022 UART: [art] Lock RT PCRs Done
2,985,514 UART: [art] Populate DV Done
2,993,803 UART: [fht] FMC Alias Private Key: 7
2,994,983 UART: [art] Derive CDI
2,995,263 UART: [art] Store in in slot 0x4
3,080,820 UART: [art] Derive Key Pair
3,081,180 UART: [art] Store priv key in slot 0x5
3,094,384 UART: [art] Derive Key Pair - Done
3,108,850 UART: [art] Signing Cert with AUTHO
3,109,330 UART: RITY.KEYID = 7
3,124,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,115 UART: [art] PUB.X = 7F2AB0F7D02FF131F1FCE56E6EF7E4467089498D17789C81AAD323C32C9C685383425FEE395FAFFEEA0851E4F5A195ED
3,131,896 UART: [art] PUB.Y = A8DFAC2EED0B91CC84BD9FAA01323A07C5A640D8EA53B962EDB9E021B3B8B931933024FB7E9E297FFC7C42B40575005C
3,138,830 UART: [art] SIG.R = 5F59052B890D80EDE172565633ACA1C1F55A0085D5A3C547B6B0041C044A108628A7289EBAE2D0B685F31783D149F19F
3,145,564 UART: [art] SIG.S = 83450854DB6140C8F2857BE99F0AD4E47A158DC59CA736603B860DECD72AC1A0BF4823FC09500108512A76FFF36311EA
3,169,301 UART: Caliptra RT
3,169,554 UART: [state] CFI Enabled
3,277,127 UART: [rt] RT listening for mailbox commands...
3,277,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,291 UART: [rt]cmd =0x44504543, len=96
3,488,642 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 ready_for_fw is high
1,056,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,546 >>> mbox cmd response: success
2,686,636 UART:
2,686,652 UART: Running Caliptra FMC ...
2,687,060 UART:
2,687,114 UART: [state] CFI Enabled
2,697,445 UART: [fht] FMC Alias Private Key: 7
2,804,732 UART: [art] Extend RT PCRs Done
2,805,160 UART: [art] Lock RT PCRs Done
2,806,392 UART: [art] Populate DV Done
2,814,633 UART: [fht] FMC Alias Private Key: 7
2,815,701 UART: [art] Derive CDI
2,815,981 UART: [art] Store in in slot 0x4
2,901,302 UART: [art] Derive Key Pair
2,901,662 UART: [art] Store priv key in slot 0x5
2,914,944 UART: [art] Derive Key Pair - Done
2,929,427 UART: [art] Signing Cert with AUTHO
2,929,907 UART: RITY.KEYID = 7
2,944,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,714 UART: [art] PUB.X = B2082E18B614694399BFD5037B61D5EC891504270C95678EA36F675CD564E72251765CB58E72A63B06E9DC777B2274B0
2,952,461 UART: [art] PUB.Y = EBD281BC3F97112BFACA0F506E42E1EDA1563FC1F6E1C5447F0816DB040F81CE8A2DEC0F0D76EAB75FC792977E303124
2,959,411 UART: [art] SIG.R = F3C01B52EB447ACEB2AC03778089225DE5DCF2ED9C55AE5FFBDC4E155A498B75DA7FC9BB45BA311900B58E0EE1C03BE8
2,966,179 UART: [art] SIG.S = 072F4F8AB35E9CAD5197B0EA4D9A6740B0E4660909F70B2965B6DC648B4F441D7CEDE3D448374BEC8E771C4F9646C605
2,989,895 UART: Caliptra RT
2,990,148 UART: [state] CFI Enabled
3,098,131 UART: [rt] RT listening for mailbox commands...
3,098,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,243 UART: [rt]cmd =0x44504543, len=96
3,309,360 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,609 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,528 UART: [cold-reset] ++
1,169,984 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 ready_for_fw is high
1,174,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x46574c44
1,283,161 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,637 >>> mbox cmd response: success
2,774,904 UART: [afmc] ++
2,775,072 UART: [afmc] CDI.KEYID = 6
2,775,435 UART: [afmc] SUBJECT.KEYID = 7
2,775,861 UART: [afmc] AUTHORITY.KEYID = 5
2,810,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,329 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,048 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,651 UART: [afmc] --
2,853,565 UART: [cold-reset] --
2,854,457 UART: [state] Locking Datavault
2,856,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,642 UART: [state] Locking ICCM
2,857,212 UART: [exit] Launching FMC @ 0x40000130
2,862,541 UART:
2,862,557 UART: Running Caliptra FMC ...
2,862,965 UART:
2,863,108 UART: [state] CFI Enabled
2,873,387 UART: [fht] FMC Alias Private Key: 7
2,981,958 UART: [art] Extend RT PCRs Done
2,982,386 UART: [art] Lock RT PCRs Done
2,983,960 UART: [art] Populate DV Done
2,992,331 UART: [fht] FMC Alias Private Key: 7
2,993,419 UART: [art] Derive CDI
2,993,699 UART: [art] Store in in slot 0x4
3,079,080 UART: [art] Derive Key Pair
3,079,440 UART: [art] Store priv key in slot 0x5
3,092,878 UART: [art] Derive Key Pair - Done
3,107,306 UART: [art] Signing Cert with AUTHO
3,107,786 UART: RITY.KEYID = 7
3,122,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,511 UART: [art] PUB.X = 61AED54C02361449011E6739937C72750C31528C18F99EDCFE38D3E54F2AA65E90C93401D9FF02F834B9FD7A3352DD44
3,130,266 UART: [art] PUB.Y = 53A11B19904191E091E86B14EFB72629AEC8EED7B7AE2530D1DCA2975CE5776027A9961B8BE1484A8016201E876B9168
3,137,214 UART: [art] SIG.R = D1AC49FD1FDF0023115DCB02976E77D9BA3D1C8106E32132CC1A5CE354F27EC730D4EC3FB1595ED0A6BFB4F8BAE53429
3,143,976 UART: [art] SIG.S = 1D61F5CEE2E4734BAAEF3F14EBFC1EB91FA0CE8B127E9309B0FA961C50C5F6E6280655D92C70DC44C6B67C155E6CB6D4
3,167,837 UART: Caliptra RT
3,168,182 UART: [state] CFI Enabled
3,276,105 UART: [rt] RT listening for mailbox commands...
3,276,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,325 UART: [rt]cmd =0x44504543, len=96
3,488,568 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 ready_for_fw is high
1,056,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,651 >>> mbox cmd response: success
2,687,801 UART:
2,687,817 UART: Running Caliptra FMC ...
2,688,225 UART:
2,688,368 UART: [state] CFI Enabled
2,698,853 UART: [fht] FMC Alias Private Key: 7
2,806,842 UART: [art] Extend RT PCRs Done
2,807,270 UART: [art] Lock RT PCRs Done
2,808,920 UART: [art] Populate DV Done
2,816,979 UART: [fht] FMC Alias Private Key: 7
2,817,985 UART: [art] Derive CDI
2,818,265 UART: [art] Store in in slot 0x4
2,904,036 UART: [art] Derive Key Pair
2,904,396 UART: [art] Store priv key in slot 0x5
2,917,936 UART: [art] Derive Key Pair - Done
2,932,751 UART: [art] Signing Cert with AUTHO
2,933,231 UART: RITY.KEYID = 7
2,948,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,324 UART: [art] PUB.X = 2E4D58E7DE41E7A4FF79B2417916C111741654B51A511BC8789A34D33A1AE5F7375E09B1BE60609CEE7AFA69313C6401
2,956,090 UART: [art] PUB.Y = 010B9F4ADD1EBEE04115121C6D3A2E63B78C2A71FCB6EE90E4DEB0D4C0506474DFBC24BB93977646F2DF1B9E5533EDF0
2,963,054 UART: [art] SIG.R = 0DB6FB1CB06E92503FD4B90E18DA4A19A08C0AF26D42D7F461336A7EC299ED1832347F57C4797CE0D84E44534A9F6E5D
2,969,825 UART: [art] SIG.S = 98714FE717C672A6C6F8AA665B3952CEF5A8F266793D7430649AE5762136742B3DCD82EC1EB882684A9D23499243DC2A
2,992,766 UART: Caliptra RT
2,993,111 UART: [state] CFI Enabled
3,100,074 UART: [rt] RT listening for mailbox commands...
3,100,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,300 UART: [rt]cmd =0x44504543, len=96
3,311,110 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,011 UART:
192,373 UART: Running Caliptra ROM ...
193,499 UART:
193,650 UART: [state] CFI Enabled
265,850 UART: [state] LifecycleState = Unprovisioned
267,862 UART: [state] DebugLocked = No
269,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,937 UART: [kat] SHA2-256
443,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,133 UART: [kat] ++
454,656 UART: [kat] sha1
466,026 UART: [kat] SHA2-256
468,682 UART: [kat] SHA2-384
473,602 UART: [kat] SHA2-512-ACC
475,966 UART: [kat] ECC-384
2,767,872 UART: [kat] HMAC-384Kdf
2,800,136 UART: [kat] LMS
3,990,475 UART: [kat] --
3,994,914 UART: [cold-reset] ++
3,996,632 UART: [fht] Storing FHT @ 0x50003400
4,008,892 UART: [idev] ++
4,009,464 UART: [idev] CDI.KEYID = 6
4,010,419 UART: [idev] SUBJECT.KEYID = 7
4,011,685 UART: [idev] UDS.KEYID = 0
4,012,673 ready_for_fw is high
4,012,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,405 UART: [idev] Erasing UDS.KEYID = 0
7,346,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,549 UART: [idev] --
7,372,923 UART: [ldev] ++
7,373,491 UART: [ldev] CDI.KEYID = 6
7,374,456 UART: [ldev] SUBJECT.KEYID = 5
7,375,670 UART: [ldev] AUTHORITY.KEYID = 7
7,376,907 UART: [ldev] FE.KEYID = 1
7,422,457 UART: [ldev] Erasing FE.KEYID = 1
10,755,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,457 UART: [ldev] --
13,118,078 UART: [fwproc] Waiting for Commands...
13,120,390 UART: [fwproc] Received command 0x46574c44
13,122,566 UART: [fwproc] Received Image of size 114124 bytes
17,174,730 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,146 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,477 >>> mbox cmd response: success
17,637,397 UART: [afmc] ++
17,637,990 UART: [afmc] CDI.KEYID = 6
17,639,011 UART: [afmc] SUBJECT.KEYID = 7
17,640,181 UART: [afmc] AUTHORITY.KEYID = 5
21,009,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,440 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,851 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,655 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,138 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,158 UART: [afmc] --
23,381,506 UART: [cold-reset] --
23,385,096 UART: [state] Locking Datavault
23,390,149 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,891 UART: [state] Locking ICCM
23,393,616 UART: [exit] Launching FMC @ 0x40000130
23,402,011 UART:
23,402,248 UART: Running Caliptra FMC ...
23,403,349 UART:
23,403,512 UART: [state] CFI Enabled
23,468,988 UART: [fht] FMC Alias Private Key: 7
25,807,143 UART: [art] Extend RT PCRs Done
25,808,373 UART: [art] Lock RT PCRs Done
25,810,345 UART: [art] Populate DV Done
25,815,919 UART: [fht] FMC Alias Private Key: 7
25,817,567 UART: [art] Derive CDI
25,818,384 UART: [art] Store in in slot 0x4
25,878,078 UART: [art] Derive Key Pair
25,879,116 UART: [art] Store priv key in slot 0x5
29,171,512 UART: [art] Derive Key Pair - Done
29,184,186 UART: [art] Signing Cert with AUTHO
29,185,494 UART: RITY.KEYID = 7
31,473,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,567 UART: [art] PUB.X = 00E6F7EE581472769C3CAF265F0A3A04CE6D882038C077902C4464563BDC82EBE055BD8871E7E5EABC930CB9862830E5
31,482,733 UART: [art] PUB.Y = BBAC7C2E321B0A4A1C5FBA23D2023A432570363B65CF1BE6E896B7BDA22FF8C06497AAF80019CD25A4B5AF9170C5D392
31,489,973 UART: [art] SIG.R = CDA576500F3FDAE3887934E07133FDD0656CD768395862A783971F66C4290D9C38EEC88EE78552F53D0AFD030C855207
31,497,322 UART: [art] SIG.S = 2F7068B92D9FFE511255C1D5BB0AAE1309DBE88460FF4C1793F89453EB2983EB23A5E5D78066FF2BAAA6411CF226DA35
32,802,821 UART: Caliptra RT
32,803,533 UART: [state] CFI Enabled
32,965,365 UART: [rt] RT listening for mailbox commands...
32,967,280 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,997,429 UART: [rt]cmd =0x44504543, len=28
33,040,507 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,784,618 ready_for_fw is high
3,785,221 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,885,440 >>> mbox cmd response: success
23,570,311 UART:
23,570,693 UART: Running Caliptra FMC ...
23,571,893 UART:
23,572,061 UART: [state] CFI Enabled
23,639,034 UART: [fht] FMC Alias Private Key: 7
25,976,438 UART: [art] Extend RT PCRs Done
25,977,659 UART: [art] Lock RT PCRs Done
25,979,103 UART: [art] Populate DV Done
25,984,672 UART: [fht] FMC Alias Private Key: 7
25,986,227 UART: [art] Derive CDI
25,987,049 UART: [art] Store in in slot 0x4
26,047,987 UART: [art] Derive Key Pair
26,048,997 UART: [art] Store priv key in slot 0x5
29,342,273 UART: [art] Derive Key Pair - Done
29,355,381 UART: [art] Signing Cert with AUTHO
29,356,689 UART: RITY.KEYID = 7
31,643,847 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,364 UART: [art] PUB.X = 3730666D872197F941F7E5E5078CCA066C060B86E2C3F11544477CDE689186AA4F0402418C8B2574480EBAF8CA915889
31,652,617 UART: [art] PUB.Y = 8F4B8A64FD29E7C3979BF9AF0062BD58F1FAE4F51E864354CB96DAD144F9B8A8588DB252EB0C818CCE588CAAEE19CA5F
31,659,880 UART: [art] SIG.R = DCC2C193E4967AD07CE4637E2AC36CDD05257B633D1EA90927AC278C5701FD71E4246B02FC9E10CAE06B5E58F0ED9126
31,667,280 UART: [art] SIG.S = CE4692FDF71B50710FC3279CBA24F4B498587288BF725719F0C6AE30D82CD34BBAB501F829CAF00BC51BB05DF2ADA8C3
32,972,502 UART: Caliptra RT
32,973,212 UART: [state] CFI Enabled
33,134,916 UART: [rt] RT listening for mailbox commands...
33,136,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,166,930 UART: [rt]cmd =0x44504543, len=28
33,209,441 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,433 UART:
192,805 UART: Running Caliptra ROM ...
194,009 UART:
603,765 UART: [state] CFI Enabled
618,577 UART: [state] LifecycleState = Unprovisioned
620,551 UART: [state] DebugLocked = No
622,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,526 UART: [kat] SHA2-256
797,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,786 UART: [kat] ++
808,274 UART: [kat] sha1
819,354 UART: [kat] SHA2-256
822,077 UART: [kat] SHA2-384
828,064 UART: [kat] SHA2-512-ACC
830,447 UART: [kat] ECC-384
3,114,089 UART: [kat] HMAC-384Kdf
3,126,360 UART: [kat] LMS
4,316,488 UART: [kat] --
4,320,391 UART: [cold-reset] ++
4,321,686 UART: [fht] Storing FHT @ 0x50003400
4,331,739 UART: [idev] ++
4,332,297 UART: [idev] CDI.KEYID = 6
4,333,283 UART: [idev] SUBJECT.KEYID = 7
4,334,521 UART: [idev] UDS.KEYID = 0
4,335,581 ready_for_fw is high
4,335,798 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,168 UART: [idev] Erasing UDS.KEYID = 0
7,621,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,889 UART: [idev] --
7,648,741 UART: [ldev] ++
7,649,375 UART: [ldev] CDI.KEYID = 6
7,650,255 UART: [ldev] SUBJECT.KEYID = 5
7,651,478 UART: [ldev] AUTHORITY.KEYID = 7
7,652,772 UART: [ldev] FE.KEYID = 1
7,663,495 UART: [ldev] Erasing FE.KEYID = 1
10,951,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,927 UART: [ldev] --
13,312,183 UART: [fwproc] Waiting for Commands...
13,314,377 UART: [fwproc] Received command 0x46574c44
13,316,548 UART: [fwproc] Received Image of size 114124 bytes
17,370,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,821 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,321 >>> mbox cmd response: success
17,840,154 UART: [afmc] ++
17,840,748 UART: [afmc] CDI.KEYID = 6
17,841,648 UART: [afmc] SUBJECT.KEYID = 7
17,842,911 UART: [afmc] AUTHORITY.KEYID = 5
21,158,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,614 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,003 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,828 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,297 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,853 UART: [afmc] --
23,526,524 UART: [cold-reset] --
23,532,114 UART: [state] Locking Datavault
23,536,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,152 UART: [state] Locking ICCM
23,539,811 UART: [exit] Launching FMC @ 0x40000130
23,548,203 UART:
23,548,439 UART: Running Caliptra FMC ...
23,549,535 UART:
23,549,695 UART: [state] CFI Enabled
23,557,896 UART: [fht] FMC Alias Private Key: 7
25,887,903 UART: [art] Extend RT PCRs Done
25,889,120 UART: [art] Lock RT PCRs Done
25,890,732 UART: [art] Populate DV Done
25,896,079 UART: [fht] FMC Alias Private Key: 7
25,897,574 UART: [art] Derive CDI
25,898,304 UART: [art] Store in in slot 0x4
25,940,937 UART: [art] Derive Key Pair
25,941,926 UART: [art] Store priv key in slot 0x5
29,183,671 UART: [art] Derive Key Pair - Done
29,196,786 UART: [art] Signing Cert with AUTHO
29,198,089 UART: RITY.KEYID = 7
31,477,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,668 UART: [art] PUB.X = 14A9F586FB746D821285095A2714FACA46BD539EDB6B700F835EA330A503F16F9C13D21DFA73A532F73CB7F63656A802
31,485,900 UART: [art] PUB.Y = 4E36B7C65FEAB84118556A9E7DAFC53C6FA66D55AA6A56677CB7CBF05F30AD5C78D7683C9005EB180747FC81C53D3F5D
31,493,148 UART: [art] SIG.R = BD912A63EDE8250F82163941FB5FCD2459E01DBCF0FFB7F150ED1ABC56BEA836F21F4DAFD2D4FC8BE51D2207E0017688
31,500,541 UART: [art] SIG.S = 38E7CF13F76E82924E9CA3E0ED13C163DD24B9E4EBCE2696534055C4C1ACAD932A8FE293FAE275770C32E235C2DD6157
32,805,290 UART: Caliptra RT
32,806,007 UART: [state] CFI Enabled
32,923,405 UART: [rt] RT listening for mailbox commands...
32,925,324 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,955,517 UART: [rt]cmd =0x44504543, len=28
32,997,845 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,129,467 ready_for_fw is high
4,130,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,626 >>> mbox cmd response: success
23,710,061 UART:
23,710,454 UART: Running Caliptra FMC ...
23,711,564 UART:
23,711,711 UART: [state] CFI Enabled
23,719,607 UART: [fht] FMC Alias Private Key: 7
26,050,081 UART: [art] Extend RT PCRs Done
26,051,305 UART: [art] Lock RT PCRs Done
26,053,008 UART: [art] Populate DV Done
26,058,377 UART: [fht] FMC Alias Private Key: 7
26,059,866 UART: [art] Derive CDI
26,060,627 UART: [art] Store in in slot 0x4
26,103,007 UART: [art] Derive Key Pair
26,104,067 UART: [art] Store priv key in slot 0x5
29,345,687 UART: [art] Derive Key Pair - Done
29,358,517 UART: [art] Signing Cert with AUTHO
29,359,852 UART: RITY.KEYID = 7
31,639,099 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,613 UART: [art] PUB.X = B57E4D95C32EDA67A715C014857834E9BBD6D31B73C05BC013EA0B6059DD2849425E7DA939EF00A69D42660BD84E2194
31,647,882 UART: [art] PUB.Y = 39007D77A43082ED0C80422549FF33973EC45C948C4BDD6F899652E61CDAA5C7726FAB57C5D3A013E2B2F773B3F4BBDD
31,655,101 UART: [art] SIG.R = 1FB962668891B0473AF7CEAE15E1B2AD56B83B9C08BA9FA852D55A2FEE4CB14DCE981906E6595FACAB7590CAB0B67FCE
31,662,508 UART: [art] SIG.S = EDDEE4D3346B7893FD1503BAE3F138B8EE9DB8B2A52B7435A8DE1ABC1996B00B1571D5CDE7A65EEAF815E8AF8F788992
32,967,400 UART: Caliptra RT
32,968,105 UART: [state] CFI Enabled
33,085,764 UART: [rt] RT listening for mailbox commands...
33,087,669 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,117,739 UART: [rt]cmd =0x44504543, len=28
33,160,625 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,115 UART:
192,475 UART: Running Caliptra ROM ...
193,694 UART:
193,853 UART: [state] CFI Enabled
267,439 UART: [state] LifecycleState = Unprovisioned
269,351 UART: [state] DebugLocked = No
271,813 UART: [state] WD Timer not started. Device not locked for debugging
274,924 UART: [kat] SHA2-256
454,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,641 UART: [kat] ++
466,171 UART: [kat] sha1
478,483 UART: [kat] SHA2-256
481,497 UART: [kat] SHA2-384
488,343 UART: [kat] SHA2-512-ACC
491,280 UART: [kat] ECC-384
2,946,677 UART: [kat] HMAC-384Kdf
2,971,335 UART: [kat] LMS
3,500,769 UART: [kat] --
3,505,794 UART: [cold-reset] ++
3,507,516 UART: [fht] FHT @ 0x50003400
3,518,421 UART: [idev] ++
3,518,992 UART: [idev] CDI.KEYID = 6
3,520,024 UART: [idev] SUBJECT.KEYID = 7
3,521,129 UART: [idev] UDS.KEYID = 0
3,522,066 ready_for_fw is high
3,522,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,192 UART: [idev] Erasing UDS.KEYID = 0
6,027,519 UART: [idev] Sha1 KeyId Algorithm
6,049,937 UART: [idev] --
6,055,067 UART: [ldev] ++
6,055,649 UART: [ldev] CDI.KEYID = 6
6,056,565 UART: [ldev] SUBJECT.KEYID = 5
6,057,728 UART: [ldev] AUTHORITY.KEYID = 7
6,059,017 UART: [ldev] FE.KEYID = 1
6,099,772 UART: [ldev] Erasing FE.KEYID = 1
8,602,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,744 UART: [ldev] --
10,404,142 UART: [fwproc] Wait for Commands...
10,405,583 UART: [fwproc] Recv command 0x46574c44
10,407,673 UART: [fwproc] Recv'd Img size: 114448 bytes
13,809,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,744 >>> mbox cmd response: success
14,276,540 UART: [afmc] ++
14,277,138 UART: [afmc] CDI.KEYID = 6
14,278,049 UART: [afmc] SUBJECT.KEYID = 7
14,279,216 UART: [afmc] AUTHORITY.KEYID = 5
16,818,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,613,519 UART: [afmc] --
18,617,171 UART: [cold-reset] --
18,621,198 UART: [state] Locking Datavault
18,627,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,629,274 UART: [state] Locking ICCM
18,631,917 UART: [exit] Launching FMC @ 0x40000130
18,640,310 UART:
18,640,554 UART: Running Caliptra FMC ...
18,641,675 UART:
18,641,834 UART: [state] CFI Enabled
18,699,492 UART: [fht] FMC Alias Private Key: 7
20,463,974 UART: [art] Extend RT PCRs Done
20,465,198 UART: [art] Lock RT PCRs Done
20,466,830 UART: [art] Populate DV Done
20,472,399 UART: [fht] FMC Alias Private Key: 7
20,473,878 UART: [art] Derive CDI
20,474,639 UART: [art] Store in in slot 0x4
20,532,384 UART: [art] Derive Key Pair
20,533,429 UART: [art] Store priv key in slot 0x5
22,996,424 UART: [art] Derive Key Pair - Done
23,009,736 UART: [art] Signing Cert with AUTHO
23,011,049 UART: RITY.KEYID = 7
24,722,306 UART: [art] Erasing AUTHORITY.KEYID = 7
24,723,804 UART: [art] PUB.X = C7A77DAAC19BC3A98F6A805582FF78CDBBB4A36ACD7143A30C1E970C98623B5E3EAEFFAE0EF0ECF8C8FF5F73AD217375
24,731,118 UART: [art] PUB.Y = E587746697B50414C4A5D9AEEC6CBD6BE0A9DB67EBA128425389DD487DDE9213935DA7C1096467E578F1AC1088CCB337
24,738,398 UART: [art] SIG.R = 25D007FCD708E4806E2F2B8F500F83D2C186504366505B9304C5538589A8618439F825E02C5BFF21265A610394E7DCD7
24,745,772 UART: [art] SIG.S = 9010CD8CFC79032C9BE0782156AA132892967B768E9C4BC63BB3B27C9268ED8DF2A67762E7D82BE3012F8E3A27CA17B8
25,724,839 UART: Caliptra RT
25,725,537 UART: [state] CFI Enabled
25,890,174 UART: [rt] RT listening for mailbox commands...
25,892,088 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,922,875 UART: [rt]cmd =0x44504543, len=28
25,965,809 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,903 writing to cptra_bootfsm_go
3,362,036 ready_for_fw is high
3,362,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,044,986 >>> mbox cmd response: success
18,323,355 UART:
18,323,747 UART: Running Caliptra FMC ...
18,324,891 UART:
18,325,053 UART: [state] CFI Enabled
18,393,646 UART: [fht] FMC Alias Private Key: 7
20,157,552 UART: [art] Extend RT PCRs Done
20,158,794 UART: [art] Lock RT PCRs Done
20,160,205 UART: [art] Populate DV Done
20,165,526 UART: [fht] FMC Alias Private Key: 7
20,167,222 UART: [art] Derive CDI
20,168,049 UART: [art] Store in in slot 0x4
20,226,073 UART: [art] Derive Key Pair
20,227,068 UART: [art] Store priv key in slot 0x5
22,689,874 UART: [art] Derive Key Pair - Done
22,702,724 UART: [art] Signing Cert with AUTHO
22,704,035 UART: RITY.KEYID = 7
24,416,135 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,618 UART: [art] PUB.X = B633EF3D56805E51F1A1DC37B2C5C5B5DA6F6DD3ABC411E8EAD6686016AD3EE2CF1ADF619C73A822BD77F89FB0C09502
24,424,928 UART: [art] PUB.Y = DBE656744AADFB6AA80224BF7BFFCFB40C2B2B9A763EEFEA77C3145975CE1892CAA23D5B6755F34C2CD815EB800E6AA6
24,432,198 UART: [art] SIG.R = E85E25160FB9D8FD8A318D089A868213268FEFEFF1FADD9CCCC614B593F91E04D61890CB50E39C6562EE0EA57B122E5F
24,439,591 UART: [art] SIG.S = 083B162C54173D54F9B1CE68BEF41EDDFEAC0EF622C9C5EF3199F82C675AE0249855AFCAB949E68FB4842875C8F63F11
25,418,684 UART: Caliptra RT
25,419,418 UART: [state] CFI Enabled
25,584,773 UART: [rt] RT listening for mailbox commands...
25,586,701 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,617,378 UART: [rt]cmd =0x44504543, len=28
25,660,093 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,429 UART:
192,820 UART: Running Caliptra ROM ...
194,023 UART:
603,487 UART: [state] CFI Enabled
617,882 UART: [state] LifecycleState = Unprovisioned
619,762 UART: [state] DebugLocked = No
622,563 UART: [state] WD Timer not started. Device not locked for debugging
625,741 UART: [kat] SHA2-256
804,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,408 UART: [kat] ++
816,944 UART: [kat] sha1
828,528 UART: [kat] SHA2-256
831,529 UART: [kat] SHA2-384
838,246 UART: [kat] SHA2-512-ACC
841,222 UART: [kat] ECC-384
3,286,563 UART: [kat] HMAC-384Kdf
3,298,441 UART: [kat] LMS
3,827,977 UART: [kat] --
3,831,206 UART: [cold-reset] ++
3,832,848 UART: [fht] FHT @ 0x50003400
3,842,751 UART: [idev] ++
3,843,315 UART: [idev] CDI.KEYID = 6
3,844,295 UART: [idev] SUBJECT.KEYID = 7
3,845,461 UART: [idev] UDS.KEYID = 0
3,846,379 ready_for_fw is high
3,846,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,683 UART: [idev] Erasing UDS.KEYID = 0
6,315,946 UART: [idev] Sha1 KeyId Algorithm
6,337,873 UART: [idev] --
6,343,040 UART: [ldev] ++
6,343,606 UART: [ldev] CDI.KEYID = 6
6,344,511 UART: [ldev] SUBJECT.KEYID = 5
6,345,717 UART: [ldev] AUTHORITY.KEYID = 7
6,346,961 UART: [ldev] FE.KEYID = 1
6,359,912 UART: [ldev] Erasing FE.KEYID = 1
8,833,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,220 UART: [ldev] --
10,624,644 UART: [fwproc] Wait for Commands...
10,627,434 UART: [fwproc] Recv command 0x46574c44
10,629,518 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,649 >>> mbox cmd response: success
14,488,444 UART: [afmc] ++
14,489,060 UART: [afmc] CDI.KEYID = 6
14,489,970 UART: [afmc] SUBJECT.KEYID = 7
14,491,125 UART: [afmc] AUTHORITY.KEYID = 5
16,990,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,311 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,149 UART: [afmc] --
18,786,171 UART: [cold-reset] --
18,790,510 UART: [state] Locking Datavault
18,796,824 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,472 UART: [state] Locking ICCM
18,800,346 UART: [exit] Launching FMC @ 0x40000130
18,808,792 UART:
18,809,040 UART: Running Caliptra FMC ...
18,810,138 UART:
18,810,290 UART: [state] CFI Enabled
18,818,220 UART: [fht] FMC Alias Private Key: 7
20,574,868 UART: [art] Extend RT PCRs Done
20,576,091 UART: [art] Lock RT PCRs Done
20,577,793 UART: [art] Populate DV Done
20,583,364 UART: [fht] FMC Alias Private Key: 7
20,585,059 UART: [art] Derive CDI
20,585,864 UART: [art] Store in in slot 0x4
20,628,361 UART: [art] Derive Key Pair
20,629,401 UART: [art] Store priv key in slot 0x5
23,055,361 UART: [art] Derive Key Pair - Done
23,068,143 UART: [art] Signing Cert with AUTHO
23,069,442 UART: RITY.KEYID = 7
24,775,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,625 UART: [art] PUB.X = 7355B87A9F0C06CD83B30895BC2B990B393EADE72432270C2018A8534BBCADDC2105C8038EEA12DB6C1D6B93758F3AED
24,783,852 UART: [art] PUB.Y = C8CA7C3C9FD110A3E6F4739D967E186A2086B89CB9EA4F6A5203775A53189129B2DFA6988313D37B05AAE8F730139171
24,791,112 UART: [art] SIG.R = FB1BAA5F56CC9F51B46465E7B6FE806FC73BA32D1FE812297398A418C9A31F708BB578016701D852D82D6F415DB0510B
24,798,490 UART: [art] SIG.S = FC05D5B990A14A6B22709DCDAE0F306087251FA164679046E9A15B6773352312FDD16731E9853C29FFAB70A7D043A584
25,776,611 UART: Caliptra RT
25,777,312 UART: [state] CFI Enabled
25,894,928 UART: [rt] RT listening for mailbox commands...
25,896,843 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,926,923 UART: [rt]cmd =0x44504543, len=28
25,969,853 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,697,381 ready_for_fw is high
3,697,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,405 >>> mbox cmd response: success
18,521,087 UART:
18,521,488 UART: Running Caliptra FMC ...
18,522,617 UART:
18,522,770 UART: [state] CFI Enabled
18,530,316 UART: [fht] FMC Alias Private Key: 7
20,287,572 UART: [art] Extend RT PCRs Done
20,288,792 UART: [art] Lock RT PCRs Done
20,290,734 UART: [art] Populate DV Done
20,296,303 UART: [fht] FMC Alias Private Key: 7
20,297,828 UART: [art] Derive CDI
20,298,569 UART: [art] Store in in slot 0x4
20,341,050 UART: [art] Derive Key Pair
20,342,053 UART: [art] Store priv key in slot 0x5
22,768,959 UART: [art] Derive Key Pair - Done
22,781,794 UART: [art] Signing Cert with AUTHO
22,783,125 UART: RITY.KEYID = 7
24,488,416 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,920 UART: [art] PUB.X = 8DC0F08579FE9E49924B77F4B1C95FB8A1E06A0D7CA7C7E6FAA61E34EB8C1AE10B89B61BC9D6CD230CF90D69F3C138C1
24,497,205 UART: [art] PUB.Y = DF3D434BB0B2CCD5BCB444F923BD53FD97FD125941EC730AA58BC8EE3147DBE2CC82D52C27CB6866FDEFEE7C5291719E
24,504,489 UART: [art] SIG.R = 15B022DA85925C313ABC7D2A58FF4E2C132E14D71FF2A8D0CA9BBF6C891C6CE9A74A2CFC194BA30129B7176B8216F5E9
24,511,864 UART: [art] SIG.S = 33756872561CE7A0582505AE79498A89010901D2501A19F16B8848CBF50910B0BB896D13ADF5D8F127115C8EC6F9D1B7
25,490,727 UART: Caliptra RT
25,491,441 UART: [state] CFI Enabled
25,607,976 UART: [rt] RT listening for mailbox commands...
25,609,887 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,639,902 UART: [rt]cmd =0x44504543, len=28
25,682,841 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,974 UART:
192,345 UART: Running Caliptra ROM ...
193,442 UART:
193,603 UART: [state] CFI Enabled
261,727 UART: [state] LifecycleState = Unprovisioned
264,143 UART: [state] DebugLocked = No
265,593 UART: [state] WD Timer not started. Device not locked for debugging
270,827 UART: [kat] SHA2-256
460,683 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,509 UART: [kat] ++
471,954 UART: [kat] sha1
483,750 UART: [kat] SHA2-256
486,752 UART: [kat] SHA2-384
493,307 UART: [kat] SHA2-512-ACC
495,883 UART: [kat] ECC-384
2,949,801 UART: [kat] HMAC-384Kdf
2,973,126 UART: [kat] LMS
3,504,882 UART: [kat] --
3,509,225 UART: [cold-reset] ++
3,510,742 UART: [fht] FHT @ 0x50003400
3,521,151 UART: [idev] ++
3,521,854 UART: [idev] CDI.KEYID = 6
3,522,807 UART: [idev] SUBJECT.KEYID = 7
3,524,043 UART: [idev] UDS.KEYID = 0
3,524,948 ready_for_fw is high
3,525,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,071 UART: [idev] Erasing UDS.KEYID = 0
6,032,874 UART: [idev] Sha1 KeyId Algorithm
6,055,025 UART: [idev] --
6,060,195 UART: [ldev] ++
6,060,883 UART: [ldev] CDI.KEYID = 6
6,061,815 UART: [ldev] SUBJECT.KEYID = 5
6,062,918 UART: [ldev] AUTHORITY.KEYID = 7
6,064,202 UART: [ldev] FE.KEYID = 1
6,100,780 UART: [ldev] Erasing FE.KEYID = 1
8,606,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,571 UART: [ldev] --
10,412,293 UART: [fwproc] Wait for Commands...
10,415,300 UART: [fwproc] Recv command 0x46574c44
10,417,601 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,010 >>> mbox cmd response: success
14,604,617 UART: [afmc] ++
14,605,319 UART: [afmc] CDI.KEYID = 6
14,606,630 UART: [afmc] SUBJECT.KEYID = 7
14,608,002 UART: [afmc] AUTHORITY.KEYID = 5
17,147,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,510 UART: [afmc] --
18,947,871 UART: [cold-reset] --
18,953,140 UART: [state] Locking Datavault
18,958,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,955 UART: [state] Locking ICCM
18,963,248 UART: [exit] Launching FMC @ 0x40000130
18,971,906 UART:
18,972,135 UART: Running Caliptra FMC ...
18,973,159 UART:
18,973,324 UART: [state] CFI Enabled
19,030,172 UART: [fht] FMC Alias Private Key: 7
20,793,519 UART: [art] Extend RT PCRs Done
20,794,741 UART: [art] Lock RT PCRs Done
20,796,421 UART: [art] Populate DV Done
20,801,724 UART: [fht] FMC Alias Private Key: 7
20,803,417 UART: [art] Derive CDI
20,804,231 UART: [art] Store in in slot 0x4
20,863,492 UART: [art] Derive Key Pair
20,864,528 UART: [art] Store priv key in slot 0x5
23,327,382 UART: [art] Derive Key Pair - Done
23,340,430 UART: [art] Signing Cert with AUTHO
23,341,726 UART: RITY.KEYID = 7
25,053,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,703 UART: [art] PUB.X = 5AE51AA87350AF598C9344022E23053A1A99870F0591FE11F7D35897F1DF187F298730EA88F05D91FBCD5432CE460232
25,061,948 UART: [art] PUB.Y = 160B856FD55EC0B73531A368BAE693B8E5783E4A096131CEDCA3EA22475C92FF130271FBE5D68AABD0DC326C9027A3D0
25,069,257 UART: [art] SIG.R = 719E41A910E088713142321178FAB87C24C1EE4AE4426039809C85839B5456BE6938A0346325C99BD90CA11E5AF59716
25,076,600 UART: [art] SIG.S = C1FA084B45B3842FD1976C551E0816773429FBCADD7C3B05CEE523B7AEB95C5070C9E5236A1FE52786B4145ECCBCEBCD
26,055,451 UART: Caliptra RT
26,056,169 UART: [state] CFI Enabled
26,220,594 UART: [rt] RT listening for mailbox commands...
26,222,513 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,253,105 UART: [rt]cmd =0x44504543, len=28
26,295,813 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,435,122 ready_for_fw is high
3,435,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,652 >>> mbox cmd response: success
19,028,879 UART:
19,029,301 UART: Running Caliptra FMC ...
19,030,436 UART:
19,030,625 UART: [state] CFI Enabled
19,086,350 UART: [fht] FMC Alias Private Key: 7
20,850,193 UART: [art] Extend RT PCRs Done
20,851,415 UART: [art] Lock RT PCRs Done
20,853,374 UART: [art] Populate DV Done
20,858,623 UART: [fht] FMC Alias Private Key: 7
20,860,279 UART: [art] Derive CDI
20,861,099 UART: [art] Store in in slot 0x4
20,919,236 UART: [art] Derive Key Pair
20,920,280 UART: [art] Store priv key in slot 0x5
23,382,845 UART: [art] Derive Key Pair - Done
23,395,842 UART: [art] Signing Cert with AUTHO
23,397,151 UART: RITY.KEYID = 7
25,108,936 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,440 UART: [art] PUB.X = 4937A031EBCBBE6CBDFFFFC47E178CE48F02BC4D7C9D1C26B877C8F713CA5A11463DD3DA8E99D153E43498EB953898B7
25,117,748 UART: [art] PUB.Y = DEFD5EBC1BDFFC5203BF568D343A00ABD3C20AA678F493126038FA86D587815B2751A42624C74FE8049CA637B1838A82
25,124,958 UART: [art] SIG.R = FE3A72A31058A6CCE594CDAC92AED8619B1D03573576C2820F251D9BE29A585299D8D29F5AA1313E6DCC07B737124DCF
25,132,347 UART: [art] SIG.S = 2CD89D995BD12800184701AC4706B8744BDF8A728312C301581685AED5EA1449F82C87C6F57AAE35D64F929F6B7B5E73
26,111,209 UART: Caliptra RT
26,111,917 UART: [state] CFI Enabled
26,275,414 UART: [rt] RT listening for mailbox commands...
26,277,331 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,307,980 UART: [rt]cmd =0x44504543, len=28
26,351,041 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,410 UART:
192,778 UART: Running Caliptra ROM ...
193,875 UART:
603,727 UART: [state] CFI Enabled
613,707 UART: [state] LifecycleState = Unprovisioned
616,197 UART: [state] DebugLocked = No
617,933 UART: [state] WD Timer not started. Device not locked for debugging
622,882 UART: [kat] SHA2-256
812,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,532 UART: [kat] ++
824,049 UART: [kat] sha1
835,911 UART: [kat] SHA2-256
838,908 UART: [kat] SHA2-384
843,963 UART: [kat] SHA2-512-ACC
846,537 UART: [kat] ECC-384
3,290,121 UART: [kat] HMAC-384Kdf
3,303,843 UART: [kat] LMS
3,835,624 UART: [kat] --
3,839,426 UART: [cold-reset] ++
3,841,999 UART: [fht] FHT @ 0x50003400
3,852,893 UART: [idev] ++
3,853,590 UART: [idev] CDI.KEYID = 6
3,854,563 UART: [idev] SUBJECT.KEYID = 7
3,855,797 UART: [idev] UDS.KEYID = 0
3,856,689 ready_for_fw is high
3,856,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,624 UART: [idev] Erasing UDS.KEYID = 0
6,333,626 UART: [idev] Sha1 KeyId Algorithm
6,357,297 UART: [idev] --
6,363,553 UART: [ldev] ++
6,364,282 UART: [ldev] CDI.KEYID = 6
6,365,194 UART: [ldev] SUBJECT.KEYID = 5
6,366,344 UART: [ldev] AUTHORITY.KEYID = 7
6,367,562 UART: [ldev] FE.KEYID = 1
6,379,775 UART: [ldev] Erasing FE.KEYID = 1
8,857,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,006 UART: [ldev] --
10,648,044 UART: [fwproc] Wait for Commands...
10,651,109 UART: [fwproc] Recv command 0x46574c44
10,653,417 UART: [fwproc] Recv'd Img size: 114448 bytes
14,105,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,840,426 >>> mbox cmd response: success
14,844,804 UART: [afmc] ++
14,845,506 UART: [afmc] CDI.KEYID = 6
14,846,743 UART: [afmc] SUBJECT.KEYID = 7
14,848,174 UART: [afmc] AUTHORITY.KEYID = 5
17,356,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,729 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,514 UART: [afmc] --
19,152,810 UART: [cold-reset] --
19,156,995 UART: [state] Locking Datavault
19,162,027 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,166 UART: [state] Locking ICCM
19,166,784 UART: [exit] Launching FMC @ 0x40000130
19,175,410 UART:
19,175,638 UART: Running Caliptra FMC ...
19,176,884 UART:
19,177,039 UART: [state] CFI Enabled
19,184,593 UART: [fht] FMC Alias Private Key: 7
20,941,360 UART: [art] Extend RT PCRs Done
20,942,579 UART: [art] Lock RT PCRs Done
20,944,278 UART: [art] Populate DV Done
20,949,733 UART: [fht] FMC Alias Private Key: 7
20,951,395 UART: [art] Derive CDI
20,952,128 UART: [art] Store in in slot 0x4
20,994,766 UART: [art] Derive Key Pair
20,995,751 UART: [art] Store priv key in slot 0x5
23,422,625 UART: [art] Derive Key Pair - Done
23,435,559 UART: [art] Signing Cert with AUTHO
23,436,850 UART: RITY.KEYID = 7
25,142,278 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,781 UART: [art] PUB.X = F96608AC36CE54CAD30EF9EB85D15FC72D86112A22504FA986E67FE90FFFB91F5466C37898D53BF2836171AFCC413E5F
25,151,090 UART: [art] PUB.Y = 697E9805DB59318BECC67EAE12ECB593F76EF8ADF8C11FC259016686DC4A61743F99661EAD8BFB508718B8AA875EBD31
25,158,347 UART: [art] SIG.R = 9053760F12D1128FB5D4AE70EB7FA02121084A73F93A4DA04450978BCB101F178CB808700B9F8FF4D8AE4A828BCFD91A
25,165,781 UART: [art] SIG.S = 97938DA925DD9C69FC8B531BDB49C0660065E1EA040B73EBD2EEB17C76CBBDA239C4C4232092E49C56B110064EF6E690
26,144,163 UART: Caliptra RT
26,144,847 UART: [state] CFI Enabled
26,261,955 UART: [rt] RT listening for mailbox commands...
26,263,861 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,293,908 UART: [rt]cmd =0x44504543, len=28
26,336,901 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,753,087 ready_for_fw is high
3,753,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,263 >>> mbox cmd response: success
19,203,673 UART:
19,204,081 UART: Running Caliptra FMC ...
19,205,186 UART:
19,205,333 UART: [state] CFI Enabled
19,213,238 UART: [fht] FMC Alias Private Key: 7
20,969,368 UART: [art] Extend RT PCRs Done
20,970,618 UART: [art] Lock RT PCRs Done
20,972,317 UART: [art] Populate DV Done
20,977,778 UART: [fht] FMC Alias Private Key: 7
20,979,416 UART: [art] Derive CDI
20,980,149 UART: [art] Store in in slot 0x4
21,022,951 UART: [art] Derive Key Pair
21,023,946 UART: [art] Store priv key in slot 0x5
23,450,871 UART: [art] Derive Key Pair - Done
23,464,033 UART: [art] Signing Cert with AUTHO
23,465,332 UART: RITY.KEYID = 7
25,170,647 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,152 UART: [art] PUB.X = 7C494AA599FFEA2D5462576817CCAF3F385FC0D441BA9BDA58681E64C26F5C329B1F39BDA412E4849E9AAE0249B1E95B
25,179,437 UART: [art] PUB.Y = 1B851B4CBE69CA245B95D4DAC06C55CE09B3438766E953C84FFA7919E907336E6E2EACBEBD44EE5F4C3E9381D0A958A3
25,186,721 UART: [art] SIG.R = 453B717085CEF218A6393665248D94FD2A7DE67CAC9AA188C91D9B7ECFFCD0BA8D0A5E4D4BB8EA671D92DAAEBA5CD558
25,194,144 UART: [art] SIG.S = 77EE3DD398A0D0FF479584A10CBDC7BF8662F807E822C68CAFDFB0B853008AE4C1AD3494CC37B7958A152C64F517C59A
26,172,494 UART: Caliptra RT
26,173,228 UART: [state] CFI Enabled
26,290,568 UART: [rt] RT listening for mailbox commands...
26,292,484 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,322,472 UART: [rt]cmd =0x44504543, len=28
26,365,013 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,426 UART: [kat] SHA2-512-ACC
897,327 UART: [kat] ECC-384
902,904 UART: [kat] HMAC-384Kdf
907,518 UART: [kat] LMS
1,475,714 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 ready_for_fw is high
1,481,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,006 UART: [idev] --
1,514,925 UART: [ldev] ++
1,515,093 UART: [ldev] CDI.KEYID = 6
1,515,456 UART: [ldev] SUBJECT.KEYID = 5
1,515,882 UART: [ldev] AUTHORITY.KEYID = 7
1,516,345 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,392 UART: [ldev] --
1,585,875 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114448 bytes
2,886,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,830 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,235 >>> mbox cmd response: success
3,081,269 UART: [afmc] ++
3,081,437 UART: [afmc] CDI.KEYID = 6
3,081,799 UART: [afmc] SUBJECT.KEYID = 7
3,082,224 UART: [afmc] AUTHORITY.KEYID = 5
3,117,563 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,024 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,714 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,505 UART: [afmc] --
3,160,605 UART: [cold-reset] --
3,161,351 UART: [state] Locking Datavault
3,162,500 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,104 UART: [state] Locking ICCM
3,163,596 UART: [exit] Launching FMC @ 0x40000130
3,168,925 UART:
3,168,941 UART: Running Caliptra FMC ...
3,169,349 UART:
3,169,403 UART: [state] CFI Enabled
3,179,888 UART: [fht] FMC Alias Private Key: 7
3,288,037 UART: [art] Extend RT PCRs Done
3,288,465 UART: [art] Lock RT PCRs Done
3,290,047 UART: [art] Populate DV Done
3,298,636 UART: [fht] FMC Alias Private Key: 7
3,299,596 UART: [art] Derive CDI
3,299,876 UART: [art] Store in in slot 0x4
3,385,329 UART: [art] Derive Key Pair
3,385,689 UART: [art] Store priv key in slot 0x5
3,398,417 UART: [art] Derive Key Pair - Done
3,413,191 UART: [art] Signing Cert with AUTHO
3,413,671 UART: RITY.KEYID = 7
3,428,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,458 UART: [art] PUB.X = C033A6EABCA0469E8E4AC2F458E62C6D4874EEAD059396220E4370B7D86E9490F40CBFDF3A56982DC180ABFF7A5587E3
3,436,233 UART: [art] PUB.Y = 378EDFB03C853C334DE31D57DA9D2A0BA6F4F4FD38603C13430167B4246ABC4CEE330C15FAFA44EAC21D181A97DC1FC6
3,443,194 UART: [art] SIG.R = E63516FC549F32F34B512CCF679E5FD6503D998883158633497A44056F98E29549F5B629C495594D528156D52ABD5F64
3,449,949 UART: [art] SIG.S = CE2E63CDEAD86A960A0462EEFAB813570A26DBC921406535918AB1AA2F3D813B7F89F25DF2F8BEBDC2B9230F4DBBB62B
3,473,548 UART: Caliptra RT
3,473,801 UART: [state] CFI Enabled
3,581,089 UART: [rt] RT listening for mailbox commands...
3,581,759 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,607 UART: [rt]cmd =0x44504543, len=28
3,654,762 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,747 ready_for_fw is high
1,361,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,925,675 >>> mbox cmd response: success
2,987,399 UART:
2,987,415 UART: Running Caliptra FMC ...
2,987,823 UART:
2,987,877 UART: [state] CFI Enabled
2,998,264 UART: [fht] FMC Alias Private Key: 7
3,106,337 UART: [art] Extend RT PCRs Done
3,106,765 UART: [art] Lock RT PCRs Done
3,108,371 UART: [art] Populate DV Done
3,116,662 UART: [fht] FMC Alias Private Key: 7
3,117,824 UART: [art] Derive CDI
3,118,104 UART: [art] Store in in slot 0x4
3,203,775 UART: [art] Derive Key Pair
3,204,135 UART: [art] Store priv key in slot 0x5
3,216,969 UART: [art] Derive Key Pair - Done
3,231,936 UART: [art] Signing Cert with AUTHO
3,232,416 UART: RITY.KEYID = 7
3,247,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,077 UART: [art] PUB.X = B19AE992BF8E053B7734C1EF3C3D2EAB210396AAD3C0AC3E9255F8CC80F94B475D5EA93F5A16929232CBD080C0B15D58
3,254,855 UART: [art] PUB.Y = D03570093350C48E9247112B2924765E2AD8245A5FEE6BCDB736552F78B5503F9205213509588B1F7193973525BD3223
3,261,778 UART: [art] SIG.R = DBC3FD51DAE6DEF6FD1ABFDC010C432B4AA9D2DA22D6D0167F444581462D868E75C9133E49171034A3EF5BC859074953
3,268,551 UART: [art] SIG.S = 716AEBB4ECEEE06D82148737CDB05852045E869CD8A24E5BAE05709B771E902D1D79E1F90DFC76F4E54B19695E798385
3,292,375 UART: Caliptra RT
3,292,628 UART: [state] CFI Enabled
3,400,785 UART: [rt] RT listening for mailbox commands...
3,401,455 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,531 UART: [rt]cmd =0x44504543, len=28
3,474,596 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,702 UART: [kat] SHA2-256
882,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,748 UART: [kat] ++
886,900 UART: [kat] sha1
891,036 UART: [kat] SHA2-256
892,974 UART: [kat] SHA2-384
895,821 UART: [kat] SHA2-512-ACC
897,722 UART: [kat] ECC-384
903,391 UART: [kat] HMAC-384Kdf
907,875 UART: [kat] LMS
1,476,071 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,191 UART: [idev] ++
1,480,359 UART: [idev] CDI.KEYID = 6
1,480,719 UART: [idev] SUBJECT.KEYID = 7
1,481,143 UART: [idev] UDS.KEYID = 0
1,481,488 ready_for_fw is high
1,481,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,709 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,349 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,550 UART: [ldev] Erasing FE.KEYID = 1
1,548,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,569 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 114448 bytes
2,888,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,689 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,032 >>> mbox cmd response: success
3,082,074 UART: [afmc] ++
3,082,242 UART: [afmc] CDI.KEYID = 6
3,082,604 UART: [afmc] SUBJECT.KEYID = 7
3,083,029 UART: [afmc] AUTHORITY.KEYID = 5
3,118,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,881 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,571 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,526 UART: [afmc] --
3,161,638 UART: [cold-reset] --
3,162,536 UART: [state] Locking Datavault
3,163,763 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,367 UART: [state] Locking ICCM
3,164,801 UART: [exit] Launching FMC @ 0x40000130
3,170,130 UART:
3,170,146 UART: Running Caliptra FMC ...
3,170,554 UART:
3,170,697 UART: [state] CFI Enabled
3,181,122 UART: [fht] FMC Alias Private Key: 7
3,289,441 UART: [art] Extend RT PCRs Done
3,289,869 UART: [art] Lock RT PCRs Done
3,291,563 UART: [art] Populate DV Done
3,299,756 UART: [fht] FMC Alias Private Key: 7
3,300,742 UART: [art] Derive CDI
3,301,022 UART: [art] Store in in slot 0x4
3,386,673 UART: [art] Derive Key Pair
3,387,033 UART: [art] Store priv key in slot 0x5
3,400,401 UART: [art] Derive Key Pair - Done
3,415,038 UART: [art] Signing Cert with AUTHO
3,415,518 UART: RITY.KEYID = 7
3,431,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,807 UART: [art] PUB.X = 831586744EC56F1105E90C0D84B8915EDF8339840911D3FDBCB95E9120A8E53D3C6F844C6D3E36585A33A4C4ADF249BA
3,438,569 UART: [art] PUB.Y = FAFD77EAE69B9721CE8FEF034321A0739B62956C875C36F958411DC3EBD0BCCE829AC1E2580D5EC9967DA22A8E8FE82C
3,445,531 UART: [art] SIG.R = 2AB55206A4849E5994FA8EF16AADF93A1971FCB719EB5EEFAD7AC28C853A51CF591C38DE610CA29813FEC86F920E6C17
3,452,310 UART: [art] SIG.S = 7F6993073612BF8667962334AC4D47F4B91E269D5E2595A533A35554F8A6D17A88396D528F8EDCB61783547577E4E0AB
3,475,994 UART: Caliptra RT
3,476,339 UART: [state] CFI Enabled
3,584,355 UART: [rt] RT listening for mailbox commands...
3,585,025 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,179 UART: [rt]cmd =0x44504543, len=28
3,658,230 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,300 >>> mbox cmd response: success
2,991,844 UART:
2,991,860 UART: Running Caliptra FMC ...
2,992,268 UART:
2,992,411 UART: [state] CFI Enabled
3,003,106 UART: [fht] FMC Alias Private Key: 7
3,111,067 UART: [art] Extend RT PCRs Done
3,111,495 UART: [art] Lock RT PCRs Done
3,112,953 UART: [art] Populate DV Done
3,121,306 UART: [fht] FMC Alias Private Key: 7
3,122,488 UART: [art] Derive CDI
3,122,768 UART: [art] Store in in slot 0x4
3,208,891 UART: [art] Derive Key Pair
3,209,251 UART: [art] Store priv key in slot 0x5
3,222,605 UART: [art] Derive Key Pair - Done
3,237,220 UART: [art] Signing Cert with AUTHO
3,237,700 UART: RITY.KEYID = 7
3,253,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,973 UART: [art] PUB.X = 6CFB0E0B67D9FD6E84D6C88A256C5EE1E2F44BA381C1E2886CFE0084CE73089797FDDE4CAD28A88BEB17CCAA49DC6587
3,260,736 UART: [art] PUB.Y = FD0EA5C086AE233E21FE03D4EC318DDA0D54C214B8CBB8A08F55964EA5B18528DF5C1C3A8A68AEA9B7318530F0CE0F9A
3,267,696 UART: [art] SIG.R = C29FE9790454E30AD9774D96E45FF2A99D1E72C514EF80C41BF76D36BFAEB906843BC10047A24908A168E682FFEAA8E4
3,274,442 UART: [art] SIG.S = FD375DD233E1B45B325AD2E8DC2594EE68E2AEFD552D22D2395A0DCB490A1307E7666FAF62F8C4E96EC5EF4BB4508722
3,298,878 UART: Caliptra RT
3,299,223 UART: [state] CFI Enabled
3,408,557 UART: [rt] RT listening for mailbox commands...
3,409,227 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,135 UART: [rt]cmd =0x44504543, len=28
3,482,482 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,785 UART: [kat] SHA2-256
903,725 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,202 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 ready_for_fw is high
1,176,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,364 UART: [idev] Erasing UDS.KEYID = 0
1,200,889 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,417 UART: [ldev] ++
1,210,585 UART: [ldev] CDI.KEYID = 6
1,210,948 UART: [ldev] SUBJECT.KEYID = 5
1,211,374 UART: [ldev] AUTHORITY.KEYID = 7
1,211,837 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,768 UART: [fwproc] Wait for Commands...
1,283,388 UART: [fwproc] Recv command 0x46574c44
1,284,116 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,162 >>> mbox cmd response: success
2,776,400 UART: [afmc] ++
2,776,568 UART: [afmc] CDI.KEYID = 6
2,776,930 UART: [afmc] SUBJECT.KEYID = 7
2,777,355 UART: [afmc] AUTHORITY.KEYID = 5
2,812,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,679 UART: [afmc] --
2,856,615 UART: [cold-reset] --
2,857,409 UART: [state] Locking Datavault
2,858,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,050 UART: [state] Locking ICCM
2,859,724 UART: [exit] Launching FMC @ 0x40000130
2,865,053 UART:
2,865,069 UART: Running Caliptra FMC ...
2,865,477 UART:
2,865,531 UART: [state] CFI Enabled
2,876,280 UART: [fht] FMC Alias Private Key: 7
2,985,165 UART: [art] Extend RT PCRs Done
2,985,593 UART: [art] Lock RT PCRs Done
2,987,291 UART: [art] Populate DV Done
2,995,728 UART: [fht] FMC Alias Private Key: 7
2,996,780 UART: [art] Derive CDI
2,997,060 UART: [art] Store in in slot 0x4
3,082,417 UART: [art] Derive Key Pair
3,082,777 UART: [art] Store priv key in slot 0x5
3,096,287 UART: [art] Derive Key Pair - Done
3,111,213 UART: [art] Signing Cert with AUTHO
3,111,693 UART: RITY.KEYID = 7
3,127,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,952 UART: [art] PUB.X = DA217D91C6DA0450A69EC98C656BAD3EAA33A18D81DB26366E8493D9B048DA85F344B67955095C6405D62D3AD808A7CD
3,134,718 UART: [art] PUB.Y = 4A712E32D1D0A96E64BF268AA9F6E31137BEE509C033444E57DF5CCFE725571B811582E652C5C5DC3B45F9E0C8234620
3,141,669 UART: [art] SIG.R = 8CE0953BDB5786C8161A0AA5553416129365CF3216A2B1E27776E5A4172D72509E622C4011226198A4277E21F1DF7BBE
3,148,428 UART: [art] SIG.S = 10D76367C9A4FB9098C70D783246570F49C9CD2BF73557E3FBC166FC839F861FE7D170F1AC26D03BA15C46E321A3CB80
3,172,547 UART: Caliptra RT
3,172,800 UART: [state] CFI Enabled
3,280,289 UART: [rt] RT listening for mailbox commands...
3,280,959 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,699 UART: [rt]cmd =0x44504543, len=28
3,354,092 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,207 ready_for_fw is high
1,060,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,871 >>> mbox cmd response: success
2,687,947 UART:
2,687,963 UART: Running Caliptra FMC ...
2,688,371 UART:
2,688,425 UART: [state] CFI Enabled
2,698,898 UART: [fht] FMC Alias Private Key: 7
2,806,687 UART: [art] Extend RT PCRs Done
2,807,115 UART: [art] Lock RT PCRs Done
2,808,951 UART: [art] Populate DV Done
2,816,942 UART: [fht] FMC Alias Private Key: 7
2,817,912 UART: [art] Derive CDI
2,818,192 UART: [art] Store in in slot 0x4
2,904,219 UART: [art] Derive Key Pair
2,904,579 UART: [art] Store priv key in slot 0x5
2,918,257 UART: [art] Derive Key Pair - Done
2,932,791 UART: [art] Signing Cert with AUTHO
2,933,271 UART: RITY.KEYID = 7
2,948,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,002 UART: [art] PUB.X = 3DF6BC2180D5F95919DE40029C5E9459EFDD99DB3C21916DBDA2DF136772DE9583D3F72BD2229C676870C1B04634AD87
2,955,775 UART: [art] PUB.Y = 7997B897D6345628D6760A07D0EAF6780486731D940F490539C9F2607E2D79A4B237774B54695B1B5E5CC42D46CD27EC
2,962,702 UART: [art] SIG.R = 7050C39E6FCC65A1736EF54E90755C9412DE6F325820E6E83FC00F195F339456A4EC800D4AF85F240E86E169E4AEB9E3
2,969,467 UART: [art] SIG.S = D3F3F1328D78016C0054AE3B66E6481180DE44ADD35E2EF00BB687ED43FC06EA64D2B18336652198FA41B3ACE877B896
2,992,883 UART: Caliptra RT
2,993,136 UART: [state] CFI Enabled
3,101,203 UART: [rt] RT listening for mailbox commands...
3,101,873 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,803 UART: [rt]cmd =0x44504543, len=28
3,175,054 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,821 UART: [state] LifecycleState = Unprovisioned
85,476 UART: [state] DebugLocked = No
86,006 UART: [state] WD Timer not started. Device not locked for debugging
87,209 UART: [kat] SHA2-256
892,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,984 UART: [kat] ++
897,136 UART: [kat] sha1
901,514 UART: [kat] SHA2-256
903,454 UART: [kat] SHA2-384
906,221 UART: [kat] SHA2-512-ACC
908,122 UART: [kat] ECC-384
917,549 UART: [kat] HMAC-384Kdf
922,323 UART: [kat] LMS
1,170,651 UART: [kat] --
1,171,468 UART: [cold-reset] ++
1,171,828 UART: [fht] FHT @ 0x50003400
1,174,413 UART: [idev] ++
1,174,581 UART: [idev] CDI.KEYID = 6
1,174,941 UART: [idev] SUBJECT.KEYID = 7
1,175,365 UART: [idev] UDS.KEYID = 0
1,175,710 ready_for_fw is high
1,175,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,735 UART: [idev] Erasing UDS.KEYID = 0
1,200,608 UART: [idev] Sha1 KeyId Algorithm
1,209,162 UART: [idev] --
1,210,050 UART: [ldev] ++
1,210,218 UART: [ldev] CDI.KEYID = 6
1,210,581 UART: [ldev] SUBJECT.KEYID = 5
1,211,007 UART: [ldev] AUTHORITY.KEYID = 7
1,211,470 UART: [ldev] FE.KEYID = 1
1,216,492 UART: [ldev] Erasing FE.KEYID = 1
1,243,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,882 UART: [ldev] --
1,282,245 UART: [fwproc] Wait for Commands...
1,282,889 UART: [fwproc] Recv command 0x46574c44
1,283,617 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,327 >>> mbox cmd response: success
2,775,489 UART: [afmc] ++
2,775,657 UART: [afmc] CDI.KEYID = 6
2,776,019 UART: [afmc] SUBJECT.KEYID = 7
2,776,444 UART: [afmc] AUTHORITY.KEYID = 5
2,811,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,474 UART: [afmc] --
2,855,500 UART: [cold-reset] --
2,856,430 UART: [state] Locking Datavault
2,857,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,217 UART: [state] Locking ICCM
2,858,671 UART: [exit] Launching FMC @ 0x40000130
2,864,000 UART:
2,864,016 UART: Running Caliptra FMC ...
2,864,424 UART:
2,864,567 UART: [state] CFI Enabled
2,875,478 UART: [fht] FMC Alias Private Key: 7
2,983,375 UART: [art] Extend RT PCRs Done
2,983,803 UART: [art] Lock RT PCRs Done
2,985,283 UART: [art] Populate DV Done
2,993,468 UART: [fht] FMC Alias Private Key: 7
2,994,518 UART: [art] Derive CDI
2,994,798 UART: [art] Store in in slot 0x4
3,080,753 UART: [art] Derive Key Pair
3,081,113 UART: [art] Store priv key in slot 0x5
3,094,605 UART: [art] Derive Key Pair - Done
3,109,132 UART: [art] Signing Cert with AUTHO
3,109,612 UART: RITY.KEYID = 7
3,124,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,629 UART: [art] PUB.X = E22E4960B24C153D584A9A3B8392C0721D3E884E05B8E264E167A70FDF06454F9D4EB766041984C6C18CB34AC021798D
3,132,385 UART: [art] PUB.Y = B068E3CBD78445B7E54B3E1E0941A2FB231F407C6DCDC4CEDE67CBB0EA57B42881C0C4F60B6FEE37A60EB3604F260234
3,139,341 UART: [art] SIG.R = 05BDB905749BF49B843C89BF64592B1292FEEA3FEB01175BF29987F801A3F8CF75D603457AADF01B78518B31958BFAD3
3,146,104 UART: [art] SIG.S = 682A3DF1F603337B0F0EA07B894C97B38731F30829E50D175F333DCBC75F2C23045FC622CC3BEE918D254FD77AAB7103
3,169,862 UART: Caliptra RT
3,170,207 UART: [state] CFI Enabled
3,277,506 UART: [rt] RT listening for mailbox commands...
3,278,176 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,960 UART: [rt]cmd =0x44504543, len=28
3,351,325 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,732 ready_for_fw is high
1,060,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,080 >>> mbox cmd response: success
2,691,158 UART:
2,691,174 UART: Running Caliptra FMC ...
2,691,582 UART:
2,691,725 UART: [state] CFI Enabled
2,702,232 UART: [fht] FMC Alias Private Key: 7
2,810,875 UART: [art] Extend RT PCRs Done
2,811,303 UART: [art] Lock RT PCRs Done
2,813,045 UART: [art] Populate DV Done
2,821,460 UART: [fht] FMC Alias Private Key: 7
2,822,476 UART: [art] Derive CDI
2,822,756 UART: [art] Store in in slot 0x4
2,908,415 UART: [art] Derive Key Pair
2,908,775 UART: [art] Store priv key in slot 0x5
2,921,715 UART: [art] Derive Key Pair - Done
2,936,791 UART: [art] Signing Cert with AUTHO
2,937,271 UART: RITY.KEYID = 7
2,952,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,124 UART: [art] PUB.X = 5EB810D9A85FB3E6756640FE2EAB615B31CE1E536FB6E357065D11B0068EEF68A3CCF04B2BAB1E49B095B36A86BA81EB
2,959,906 UART: [art] PUB.Y = B678519DCE792452CEE3915B61FE37AEBFE0F7B26CACCE39E6C26E52137623017E1972B1FCD3AA2F17B3DE0B642712B1
2,966,864 UART: [art] SIG.R = 82B7FC45629CB63039A3AE6317BD132C88D2FAD6E5C135B06EEF4E630BA87582C8791DF566D80F8D5B5D3DD3B2B409E2
2,973,637 UART: [art] SIG.S = 9E1A701BE85CFC88442D23242C056C688E4E8B5CE2FF0EE43997A2D9A92F036D2D4055F9578E3D8B83CA5B9BF5099164
2,997,642 UART: Caliptra RT
2,997,987 UART: [state] CFI Enabled
3,105,935 UART: [rt] RT listening for mailbox commands...
3,106,605 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,815 UART: [rt]cmd =0x44504543, len=28
3,180,030 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,174,233 ready_for_fw is high
1,174,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,788 UART: [ldev] ++
1,209,956 UART: [ldev] CDI.KEYID = 6
1,210,320 UART: [ldev] SUBJECT.KEYID = 5
1,210,747 UART: [ldev] AUTHORITY.KEYID = 7
1,211,210 UART: [ldev] FE.KEYID = 1
1,216,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,796 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,540 >>> mbox cmd response: success
2,776,717 UART: [afmc] ++
2,776,885 UART: [afmc] CDI.KEYID = 6
2,777,248 UART: [afmc] SUBJECT.KEYID = 7
2,777,674 UART: [afmc] AUTHORITY.KEYID = 5
2,813,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,942 UART: [afmc] --
2,857,038 UART: [cold-reset] --
2,857,702 UART: [state] Locking Datavault
2,858,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,305 UART: [state] Locking ICCM
2,859,901 UART: [exit] Launching FMC @ 0x40000130
2,865,230 UART:
2,865,246 UART: Running Caliptra FMC ...
2,865,654 UART:
2,865,708 UART: [state] CFI Enabled
2,875,793 UART: [fht] FMC Alias Private Key: 7
2,983,816 UART: [art] Extend RT PCRs Done
2,984,244 UART: [art] Lock RT PCRs Done
2,985,532 UART: [art] Populate DV Done
2,993,717 UART: [fht] FMC Alias Private Key: 7
2,994,715 UART: [art] Derive CDI
2,994,995 UART: [art] Store in in slot 0x4
3,080,302 UART: [art] Derive Key Pair
3,080,662 UART: [art] Store priv key in slot 0x5
3,093,248 UART: [art] Derive Key Pair - Done
3,107,978 UART: [art] Signing Cert with AUTHO
3,108,458 UART: RITY.KEYID = 7
3,123,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,099 UART: [art] PUB.X = F2FB6981B4504CAB2D376CF206D95C049518A97B126099DE1130F5969A92C562F822048D3A62C59F9C64AB2D324A25B6
3,130,858 UART: [art] PUB.Y = C34D2D4B27D7F0F4163868B98BF67660D3B66B3AB155F32710AC6BBF8E397EA9F0462D6E7BF9CEAEADC5405EFE7954AF
3,137,828 UART: [art] SIG.R = 9C1F4C789DC7B117119EFD890E8ABBC2C133D958CC3542FD12C4E8DC56525F8AA519B60E3BBCF0D61DDDCF91A1B2646D
3,144,614 UART: [art] SIG.S = A3A4F600B47342CB1D3CC265B907A65F93A37FE1B1AE3DB95D7B5FFE77299562D243616604D566529D80C06662B7E85D
3,168,249 UART: Caliptra RT
3,168,502 UART: [state] CFI Enabled
3,276,140 UART: [rt] RT listening for mailbox commands...
3,276,810 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,542 UART: [rt]cmd =0x44504543, len=28
3,350,063 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,864 ready_for_fw is high
1,056,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,529 >>> mbox cmd response: success
2,686,297 UART:
2,686,313 UART: Running Caliptra FMC ...
2,686,721 UART:
2,686,775 UART: [state] CFI Enabled
2,697,040 UART: [fht] FMC Alias Private Key: 7
2,804,965 UART: [art] Extend RT PCRs Done
2,805,393 UART: [art] Lock RT PCRs Done
2,807,069 UART: [art] Populate DV Done
2,815,474 UART: [fht] FMC Alias Private Key: 7
2,816,408 UART: [art] Derive CDI
2,816,688 UART: [art] Store in in slot 0x4
2,902,203 UART: [art] Derive Key Pair
2,902,563 UART: [art] Store priv key in slot 0x5
2,915,293 UART: [art] Derive Key Pair - Done
2,930,560 UART: [art] Signing Cert with AUTHO
2,931,040 UART: RITY.KEYID = 7
2,946,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,067 UART: [art] PUB.X = F114C47D79CCA97D6674BEC03047E35B262B5A8AD355130BFD3B8BB7620F9DF3EC4D22C3FB400A4A7EC992A6CD4FE2BE
2,953,850 UART: [art] PUB.Y = BF35F0362C6BDF3284446B1904B73C98838E9B1F34C0560E2A0432A11EBFFB7CAF05F95635D5AED43B8B7FADDEA55400
2,960,780 UART: [art] SIG.R = BE151A282BB261E9D35F412D165D1B9ABB03AF33902108B08C9186C23B446297A7EEEEFDA0DFEE8E9997DDADAEC25F11
2,967,564 UART: [art] SIG.S = CE5605E4360CAF356C381673A492BD5DCDCB046BDAB6AC8D928345102B9BF9F698BB7E0F519F93A2C26CD3F37F82DFC9
2,991,341 UART: Caliptra RT
2,991,594 UART: [state] CFI Enabled
3,098,778 UART: [rt] RT listening for mailbox commands...
3,099,448 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,254 UART: [rt]cmd =0x44504543, len=28
3,172,103 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,234 UART: [cold-reset] ++
1,169,768 UART: [fht] FHT @ 0x50003400
1,172,536 UART: [idev] ++
1,172,704 UART: [idev] CDI.KEYID = 6
1,173,065 UART: [idev] SUBJECT.KEYID = 7
1,173,490 UART: [idev] UDS.KEYID = 0
1,173,836 ready_for_fw is high
1,173,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,490 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha1 KeyId Algorithm
1,207,540 UART: [idev] --
1,208,557 UART: [ldev] ++
1,208,725 UART: [ldev] CDI.KEYID = 6
1,209,089 UART: [ldev] SUBJECT.KEYID = 5
1,209,516 UART: [ldev] AUTHORITY.KEYID = 7
1,209,979 UART: [ldev] FE.KEYID = 1
1,215,153 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,835 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,659 >>> mbox cmd response: success
2,774,720 UART: [afmc] ++
2,774,888 UART: [afmc] CDI.KEYID = 6
2,775,251 UART: [afmc] SUBJECT.KEYID = 7
2,775,677 UART: [afmc] AUTHORITY.KEYID = 5
2,811,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,879 UART: [afmc] --
2,854,849 UART: [cold-reset] --
2,855,739 UART: [state] Locking Datavault
2,857,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,622 UART: [state] Locking ICCM
2,858,292 UART: [exit] Launching FMC @ 0x40000130
2,863,621 UART:
2,863,637 UART: Running Caliptra FMC ...
2,864,045 UART:
2,864,188 UART: [state] CFI Enabled
2,874,607 UART: [fht] FMC Alias Private Key: 7
2,983,144 UART: [art] Extend RT PCRs Done
2,983,572 UART: [art] Lock RT PCRs Done
2,985,206 UART: [art] Populate DV Done
2,993,455 UART: [fht] FMC Alias Private Key: 7
2,994,431 UART: [art] Derive CDI
2,994,711 UART: [art] Store in in slot 0x4
3,080,224 UART: [art] Derive Key Pair
3,080,584 UART: [art] Store priv key in slot 0x5
3,094,142 UART: [art] Derive Key Pair - Done
3,108,786 UART: [art] Signing Cert with AUTHO
3,109,266 UART: RITY.KEYID = 7
3,124,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,423 UART: [art] PUB.X = FE522AA25F12DA4BE53BB8528951EBCC2CEDEECC9CC8BA2D1669E03FD5B9F0934601A7FC1A142BAED82BE220286FA049
3,132,216 UART: [art] PUB.Y = 243D9F9BDE8E6660040B411ECB417A3AC7DB63FA3C145E3A5FAAD085BA6A9C0D16DF6BF8A587C9ECE250124AFBF71A55
3,139,181 UART: [art] SIG.R = A29674720EF4FFA2ED5C226D1C3F9B8E92796E131CD93918B1700E0C43D714ABA57E25CE35102BE06CCB1A41FAC18A3C
3,145,956 UART: [art] SIG.S = 5ED0258622FF4E5E64456051C2FB736B9E4FF9F937DDEC44C78F4B29255013D55AB4C5990B516F8AE422AD8B6EAB7AFA
3,169,926 UART: Caliptra RT
3,170,271 UART: [state] CFI Enabled
3,278,670 UART: [rt] RT listening for mailbox commands...
3,279,340 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,466 UART: [rt]cmd =0x44504543, len=28
3,352,829 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,415 ready_for_fw is high
1,056,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,229 >>> mbox cmd response: success
2,686,591 UART:
2,686,607 UART: Running Caliptra FMC ...
2,687,015 UART:
2,687,158 UART: [state] CFI Enabled
2,697,837 UART: [fht] FMC Alias Private Key: 7
2,805,712 UART: [art] Extend RT PCRs Done
2,806,140 UART: [art] Lock RT PCRs Done
2,807,612 UART: [art] Populate DV Done
2,816,039 UART: [fht] FMC Alias Private Key: 7
2,816,991 UART: [art] Derive CDI
2,817,271 UART: [art] Store in in slot 0x4
2,902,836 UART: [art] Derive Key Pair
2,903,196 UART: [art] Store priv key in slot 0x5
2,916,508 UART: [art] Derive Key Pair - Done
2,931,260 UART: [art] Signing Cert with AUTHO
2,931,740 UART: RITY.KEYID = 7
2,947,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,975 UART: [art] PUB.X = 6941315E77A15F5A3CF0968DFA51BABE88F716DC061F68973940DE9AC60064F57784963C933890D9AE0C48E486361CE3
2,954,715 UART: [art] PUB.Y = 10BE361396DB9C2C73E0741DCB0BC8E8B2730498496C781EA986B0DD60044DBE045623E845F7950E3EFA586343F6CB82
2,961,652 UART: [art] SIG.R = 5478AF10E4C656DDAE92E8ED791B42C09A26CE20BAAA4A317104A4EDFEAD7BE7C16587AE3D93DF25543FF8ECCD6B6454
2,968,443 UART: [art] SIG.S = E8376D150DCC100AE0A51F3FC6B795E2B9D2907E81409ABA15F409F926CE9249E5E93018F3EC11BA388F8193988473A9
2,991,841 UART: Caliptra RT
2,992,186 UART: [state] CFI Enabled
3,099,645 UART: [rt] RT listening for mailbox commands...
3,100,315 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,309 UART: [rt]cmd =0x44504543, len=28
3,173,734 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,184 UART:
192,552 UART: Running Caliptra ROM ...
193,740 UART:
193,897 UART: [state] CFI Enabled
261,764 UART: [state] LifecycleState = Unprovisioned
263,688 UART: [state] DebugLocked = No
266,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,711 UART: [kat] SHA2-256
440,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,930 UART: [kat] ++
451,380 UART: [kat] sha1
462,610 UART: [kat] SHA2-256
465,339 UART: [kat] SHA2-384
471,474 UART: [kat] SHA2-512-ACC
473,834 UART: [kat] ECC-384
2,769,265 UART: [kat] HMAC-384Kdf
2,798,950 UART: [kat] LMS
3,989,238 UART: [kat] --
3,993,464 UART: [cold-reset] ++
3,995,823 UART: [fht] Storing FHT @ 0x50003400
4,007,094 UART: [idev] ++
4,007,688 UART: [idev] CDI.KEYID = 6
4,008,581 UART: [idev] SUBJECT.KEYID = 7
4,009,828 UART: [idev] UDS.KEYID = 0
4,010,860 ready_for_fw is high
4,011,065 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,763 UART: [idev] Erasing UDS.KEYID = 0
7,345,577 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,302 UART: [idev] --
7,369,917 UART: [ldev] ++
7,370,483 UART: [ldev] CDI.KEYID = 6
7,371,450 UART: [ldev] SUBJECT.KEYID = 5
7,372,661 UART: [ldev] AUTHORITY.KEYID = 7
7,373,953 UART: [ldev] FE.KEYID = 1
7,421,922 UART: [ldev] Erasing FE.KEYID = 1
10,754,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,008 UART: [ldev] --
13,134,732 UART: [fwproc] Waiting for Commands...
13,136,766 UART: [fwproc] Received command 0x46574c44
13,138,943 UART: [fwproc] Received Image of size 114124 bytes
17,187,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,162 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,649,698 >>> mbox cmd response: success
17,654,538 UART: [afmc] ++
17,655,139 UART: [afmc] CDI.KEYID = 6
17,656,053 UART: [afmc] SUBJECT.KEYID = 7
17,657,326 UART: [afmc] AUTHORITY.KEYID = 5
21,024,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,473 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,919 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,723 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,140 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,027 UART: [afmc] --
23,395,356 UART: [cold-reset] --
23,397,439 UART: [state] Locking Datavault
23,402,586 UART: [state] Locking PCR0, PCR1 and PCR31
23,404,321 UART: [state] Locking ICCM
23,406,907 UART: [exit] Launching FMC @ 0x40000130
23,415,249 UART:
23,415,487 UART: Running Caliptra FMC ...
23,416,590 UART:
23,416,752 UART: [state] CFI Enabled
23,486,796 UART: [fht] FMC Alias Private Key: 7
25,825,935 UART: [art] Extend RT PCRs Done
25,827,157 UART: [art] Lock RT PCRs Done
25,829,118 UART: [art] Populate DV Done
25,834,593 UART: [fht] FMC Alias Private Key: 7
25,836,183 UART: [art] Derive CDI
25,836,996 UART: [art] Store in in slot 0x4
25,894,900 UART: [art] Derive Key Pair
25,895,937 UART: [art] Store priv key in slot 0x5
29,188,510 UART: [art] Derive Key Pair - Done
29,201,232 UART: [art] Signing Cert with AUTHO
29,202,530 UART: RITY.KEYID = 7
31,490,029 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,610 UART: [art] PUB.X = 4E6FE159E3F953413E74DC3E515C9957DDFE0B8E0C22A7D6A24DD25A470147FCC91FAA46971D663D9305CD493F129A92
31,498,810 UART: [art] PUB.Y = 962D33585D31B64146E22042A626CA003A929DD0307D4EFAEB47AC197716D0D3518A9091A77E47036AFFA402DC643B32
31,506,043 UART: [art] SIG.R = F65686ED248B980DFFAC44D378015FDC0C335D92B3D246A31A56BBD5A377E0C1AD97CD48988AA33BC901059E652863BE
31,513,446 UART: [art] SIG.S = 9E7AEAFAA0ABCFB172F3FA2CB3C3DEA4C75B74B86B71C40D77EDF67D37BB197C1B625BE8B6ED7A01DA4B360871A09BE5
32,818,518 UART: Caliptra RT
32,819,233 UART: [state] CFI Enabled
32,979,845 UART: [rt] RT listening for mailbox commands...
32,981,771 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,011,626 UART: [rt]cmd =0x44504543, len=20
33,031,798 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,802,104 ready_for_fw is high
3,802,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,098 >>> mbox cmd response: success
23,580,916 UART:
23,581,305 UART: Running Caliptra FMC ...
23,582,424 UART:
23,582,578 UART: [state] CFI Enabled
23,650,895 UART: [fht] FMC Alias Private Key: 7
25,988,708 UART: [art] Extend RT PCRs Done
25,989,939 UART: [art] Lock RT PCRs Done
25,991,542 UART: [art] Populate DV Done
25,997,178 UART: [fht] FMC Alias Private Key: 7
25,998,886 UART: [art] Derive CDI
25,999,648 UART: [art] Store in in slot 0x4
26,059,775 UART: [art] Derive Key Pair
26,060,778 UART: [art] Store priv key in slot 0x5
29,353,642 UART: [art] Derive Key Pair - Done
29,366,960 UART: [art] Signing Cert with AUTHO
29,368,259 UART: RITY.KEYID = 7
31,654,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,068 UART: [art] PUB.X = BB2E68C795901E054314D278E46169D5AED6F14F2DAC2ADAAD4B04A211A226652B5189AF28B67DB841C517ED39B94F35
31,663,421 UART: [art] PUB.Y = A7B9F3BCC9FD121F8E6CDF34E3A8A1E1C560461EE9016F2D9FCB0683294B83157096FD33C41D1954837A29FEC8A523D8
31,670,561 UART: [art] SIG.R = 2E8F5DC62C97E7C38F4375A56F26FECA6F1433959853E300E62A12E9C7C2A5CF854A014E44E668AE3401068262F289E9
31,677,904 UART: [art] SIG.S = 58B4699A80CC6C606748C51FF8F818011B8E02F5E2FD8996F60D8A920C17E0A0E53EB7BAF18935CB6B7F494BF68AB849
32,983,387 UART: Caliptra RT
32,984,101 UART: [state] CFI Enabled
33,145,587 UART: [rt] RT listening for mailbox commands...
33,147,505 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,177,516 UART: [rt]cmd =0x44504543, len=20
33,197,798 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,394 UART:
192,770 UART: Running Caliptra ROM ...
193,868 UART:
603,745 UART: [state] CFI Enabled
613,301 UART: [state] LifecycleState = Unprovisioned
615,246 UART: [state] DebugLocked = No
616,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,567 UART: [kat] SHA2-256
791,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,819 UART: [kat] ++
802,259 UART: [kat] sha1
814,212 UART: [kat] SHA2-256
816,937 UART: [kat] SHA2-384
821,715 UART: [kat] SHA2-512-ACC
824,114 UART: [kat] ECC-384
3,109,621 UART: [kat] HMAC-384Kdf
3,120,646 UART: [kat] LMS
4,310,770 UART: [kat] --
4,316,251 UART: [cold-reset] ++
4,317,825 UART: [fht] Storing FHT @ 0x50003400
4,329,934 UART: [idev] ++
4,330,492 UART: [idev] CDI.KEYID = 6
4,331,516 UART: [idev] SUBJECT.KEYID = 7
4,332,688 UART: [idev] UDS.KEYID = 0
4,333,720 ready_for_fw is high
4,333,905 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,210 UART: [idev] Erasing UDS.KEYID = 0
7,619,975 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,494 UART: [idev] --
7,645,783 UART: [ldev] ++
7,646,404 UART: [ldev] CDI.KEYID = 6
7,647,372 UART: [ldev] SUBJECT.KEYID = 5
7,648,576 UART: [ldev] AUTHORITY.KEYID = 7
7,649,799 UART: [ldev] FE.KEYID = 1
7,660,222 UART: [ldev] Erasing FE.KEYID = 1
10,949,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,443 UART: [ldev] --
13,308,067 UART: [fwproc] Waiting for Commands...
13,311,349 UART: [fwproc] Received command 0x46574c44
13,313,551 UART: [fwproc] Received Image of size 114124 bytes
17,368,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,063 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,151 >>> mbox cmd response: success
17,835,225 UART: [afmc] ++
17,835,813 UART: [afmc] CDI.KEYID = 6
17,836,696 UART: [afmc] SUBJECT.KEYID = 7
17,837,962 UART: [afmc] AUTHORITY.KEYID = 5
21,152,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,675 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,935 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,428 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,146 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,600 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,760 UART: [afmc] --
23,516,310 UART: [cold-reset] --
23,519,141 UART: [state] Locking Datavault
23,524,818 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,574 UART: [state] Locking ICCM
23,527,640 UART: [exit] Launching FMC @ 0x40000130
23,536,035 UART:
23,536,264 UART: Running Caliptra FMC ...
23,537,361 UART:
23,537,519 UART: [state] CFI Enabled
23,545,627 UART: [fht] FMC Alias Private Key: 7
25,876,745 UART: [art] Extend RT PCRs Done
25,877,958 UART: [art] Lock RT PCRs Done
25,879,551 UART: [art] Populate DV Done
25,884,738 UART: [fht] FMC Alias Private Key: 7
25,886,270 UART: [art] Derive CDI
25,886,995 UART: [art] Store in in slot 0x4
25,929,924 UART: [art] Derive Key Pair
25,930,917 UART: [art] Store priv key in slot 0x5
29,173,106 UART: [art] Derive Key Pair - Done
29,186,042 UART: [art] Signing Cert with AUTHO
29,187,343 UART: RITY.KEYID = 7
31,467,067 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,576 UART: [art] PUB.X = 782BF7B5D42BF7E4C99031D8506E805142CE6DCD433EDCBDB190C2DDD9FD364B46B7835D98E96031992D9FD1A8F5C214
31,475,865 UART: [art] PUB.Y = 58C66E78A5BCE5CF8F9B54974A6D9E0BBCE74D0E0EE768092274AAD6225B7729DEBE3D3DCFC74321DBD4B71C20F696A5
31,483,132 UART: [art] SIG.R = D506443CA993D559EDAA0D96F5DE4CF660AE4967CB85A233F6F8A818FA2B0D0B4FEA9F0A73A707F89EAED594781C03A9
31,490,503 UART: [art] SIG.S = F4792C25A2060933FF4E4CB1DE0CB2245DEBD688288A943E353DDC3166DC25814A91DA7204366E68E181482856849FB0
32,796,022 UART: Caliptra RT
32,796,738 UART: [state] CFI Enabled
32,914,730 UART: [rt] RT listening for mailbox commands...
32,916,644 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,946,502 UART: [rt]cmd =0x44504543, len=20
32,966,859 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,130,251 ready_for_fw is high
4,130,644 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,510 >>> mbox cmd response: success
23,707,790 UART:
23,708,200 UART: Running Caliptra FMC ...
23,709,307 UART:
23,709,451 UART: [state] CFI Enabled
23,717,103 UART: [fht] FMC Alias Private Key: 7
26,048,092 UART: [art] Extend RT PCRs Done
26,049,333 UART: [art] Lock RT PCRs Done
26,050,823 UART: [art] Populate DV Done
26,056,206 UART: [fht] FMC Alias Private Key: 7
26,057,910 UART: [art] Derive CDI
26,058,727 UART: [art] Store in in slot 0x4
26,101,146 UART: [art] Derive Key Pair
26,102,186 UART: [art] Store priv key in slot 0x5
29,344,062 UART: [art] Derive Key Pair - Done
29,357,061 UART: [art] Signing Cert with AUTHO
29,358,365 UART: RITY.KEYID = 7
31,638,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,515 UART: [art] PUB.X = 74A8A16AFAAF64643937DE2D5E0DEB521BCB2847B751F461C80DA7AB6AB185DEC2002D45FFAFEEEC43042C82C5107C73
31,646,805 UART: [art] PUB.Y = 482EB3D3CA53BDDDCE624981CE6D70084A00B183A52371830A047657C19AC4974AE6F09A93BF1E9868BF41697B430CE1
31,654,032 UART: [art] SIG.R = 1456233E16FC24A16F1BCB51B0F098997DB0F7581FC10BA13076A5CE073123319B7AAD41A3E2D8B140947A191E54350A
31,661,593 UART: [art] SIG.S = B13F0BF43413E231BDD875DD8E97CE511FC73FBD6001A94DDBEFFB7B8BBBF518951A812887DC17978ED020FF283E1723
32,966,920 UART: Caliptra RT
32,967,634 UART: [state] CFI Enabled
33,085,276 UART: [rt] RT listening for mailbox commands...
33,087,190 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,117,052 UART: [rt]cmd =0x44504543, len=20
33,137,496 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,164 UART:
192,571 UART: Running Caliptra ROM ...
193,779 UART:
193,933 UART: [state] CFI Enabled
251,565 UART: [state] LifecycleState = Unprovisioned
253,423 UART: [state] DebugLocked = No
255,231 UART: [state] WD Timer not started. Device not locked for debugging
258,279 UART: [kat] SHA2-256
437,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
448,963 UART: [kat] ++
449,503 UART: [kat] sha1
461,804 UART: [kat] SHA2-256
464,821 UART: [kat] SHA2-384
471,305 UART: [kat] SHA2-512-ACC
474,237 UART: [kat] ECC-384
2,932,908 UART: [kat] HMAC-384Kdf
2,959,714 UART: [kat] LMS
3,489,156 UART: [kat] --
3,494,219 UART: [cold-reset] ++
3,495,157 UART: [fht] FHT @ 0x50003400
3,504,713 UART: [idev] ++
3,505,276 UART: [idev] CDI.KEYID = 6
3,506,306 UART: [idev] SUBJECT.KEYID = 7
3,507,409 UART: [idev] UDS.KEYID = 0
3,508,455 ready_for_fw is high
3,508,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,652,609 UART: [idev] Erasing UDS.KEYID = 0
6,013,957 UART: [idev] Sha1 KeyId Algorithm
6,037,677 UART: [idev] --
6,041,218 UART: [ldev] ++
6,041,804 UART: [ldev] CDI.KEYID = 6
6,042,721 UART: [ldev] SUBJECT.KEYID = 5
6,043,887 UART: [ldev] AUTHORITY.KEYID = 7
6,045,137 UART: [ldev] FE.KEYID = 1
6,086,797 UART: [ldev] Erasing FE.KEYID = 1
8,595,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,927 UART: [ldev] --
10,400,920 UART: [fwproc] Wait for Commands...
10,403,765 UART: [fwproc] Recv command 0x46574c44
10,405,852 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,818 >>> mbox cmd response: success
14,278,679 UART: [afmc] ++
14,279,289 UART: [afmc] CDI.KEYID = 6
14,280,175 UART: [afmc] SUBJECT.KEYID = 7
14,281,333 UART: [afmc] AUTHORITY.KEYID = 5
16,813,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,537,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,538,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,554,675 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,570,695 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,586,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,608,555 UART: [afmc] --
18,611,714 UART: [cold-reset] --
18,616,004 UART: [state] Locking Datavault
18,620,290 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,935 UART: [state] Locking ICCM
18,623,654 UART: [exit] Launching FMC @ 0x40000130
18,632,051 UART:
18,632,308 UART: Running Caliptra FMC ...
18,633,411 UART:
18,633,571 UART: [state] CFI Enabled
18,697,554 UART: [fht] FMC Alias Private Key: 7
20,461,073 UART: [art] Extend RT PCRs Done
20,462,286 UART: [art] Lock RT PCRs Done
20,463,910 UART: [art] Populate DV Done
20,469,532 UART: [fht] FMC Alias Private Key: 7
20,471,013 UART: [art] Derive CDI
20,471,778 UART: [art] Store in in slot 0x4
20,530,873 UART: [art] Derive Key Pair
20,531,905 UART: [art] Store priv key in slot 0x5
22,995,064 UART: [art] Derive Key Pair - Done
23,007,890 UART: [art] Signing Cert with AUTHO
23,009,193 UART: RITY.KEYID = 7
24,720,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,722,332 UART: [art] PUB.X = 6726C2DCD88A299DEB77525D1FE2E78C0584A356A510B1D7AAC3B809AACC85101B06747C63E2F3A85EC9280707E61B68
24,729,567 UART: [art] PUB.Y = 34BE33498DA650337271A23192BA60CB3D5D1894A8053256559F06DB5A7DD89E4C9E4EFB7594AFC7E63101062247BCB6
24,737,136 UART: [art] SIG.R = EEE534A25A3D939699D4E64893560D212EEE353BDB722976D871218BF677F109B85D6FEFEE959DCFBB188241AAF37D42
24,744,230 UART: [art] SIG.S = 153306305A0A91213BC1E1877ADCEF747F246E7D6AD076A7EB0B13934CCB84021B26266B7AF98112D0A9893E51E4850D
25,723,059 UART: Caliptra RT
25,723,746 UART: [state] CFI Enabled
25,888,671 UART: [rt] RT listening for mailbox commands...
25,890,597 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,921,181 UART: [rt]cmd =0x44504543, len=20
25,941,751 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,379,345 ready_for_fw is high
3,379,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,587 >>> mbox cmd response: success
18,366,806 UART:
18,367,196 UART: Running Caliptra FMC ...
18,368,295 UART:
18,368,446 UART: [state] CFI Enabled
18,433,669 UART: [fht] FMC Alias Private Key: 7
20,198,341 UART: [art] Extend RT PCRs Done
20,199,570 UART: [art] Lock RT PCRs Done
20,201,667 UART: [art] Populate DV Done
20,207,071 UART: [fht] FMC Alias Private Key: 7
20,208,777 UART: [art] Derive CDI
20,209,589 UART: [art] Store in in slot 0x4
20,267,224 UART: [art] Derive Key Pair
20,268,267 UART: [art] Store priv key in slot 0x5
22,730,900 UART: [art] Derive Key Pair - Done
22,743,628 UART: [art] Signing Cert with AUTHO
22,744,928 UART: RITY.KEYID = 7
24,457,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,675 UART: [art] PUB.X = DD326DF46F5824EDB46AB7C6839DF48C51EB6EFE2C77C8BAAD27E220CD1D798489033F95F480942BCFE383022257368C
24,465,985 UART: [art] PUB.Y = D06FF699AD1121DB2764BB881CAC91CD3F8159EC9F179CD238D7C6F9DED75F473584C1D83055E6E8D3C51EFC921A866F
24,473,256 UART: [art] SIG.R = 45FE5515A043B7BD2F7E54CA947B850F43CFEC2361D851BADB80A478AD82E13D70D35692D7214268276BA7F9B053C4E5
24,480,668 UART: [art] SIG.S = C843E58A432DECC70E382B72A821F28759DAD7EABAC6F8F12B284F46AE376247C50146CCE1C59D89F57BB29062F5882D
25,459,953 UART: Caliptra RT
25,460,659 UART: [state] CFI Enabled
25,625,860 UART: [rt] RT listening for mailbox commands...
25,627,794 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,658,359 UART: [rt]cmd =0x44504543, len=20
25,678,774 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,379 UART:
192,759 UART: Running Caliptra ROM ...
193,949 UART:
603,323 UART: [state] CFI Enabled
611,569 UART: [state] LifecycleState = Unprovisioned
613,453 UART: [state] DebugLocked = No
615,903 UART: [state] WD Timer not started. Device not locked for debugging
620,155 UART: [kat] SHA2-256
799,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,844 UART: [kat] ++
811,365 UART: [kat] sha1
823,513 UART: [kat] SHA2-256
826,582 UART: [kat] SHA2-384
832,125 UART: [kat] SHA2-512-ACC
835,138 UART: [kat] ECC-384
3,277,132 UART: [kat] HMAC-384Kdf
3,290,146 UART: [kat] LMS
3,819,657 UART: [kat] --
3,826,151 UART: [cold-reset] ++
3,827,790 UART: [fht] FHT @ 0x50003400
3,839,758 UART: [idev] ++
3,840,318 UART: [idev] CDI.KEYID = 6
3,841,193 UART: [idev] SUBJECT.KEYID = 7
3,842,424 UART: [idev] UDS.KEYID = 0
3,843,342 ready_for_fw is high
3,843,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,357 UART: [idev] Erasing UDS.KEYID = 0
6,319,738 UART: [idev] Sha1 KeyId Algorithm
6,341,779 UART: [idev] --
6,345,657 UART: [ldev] ++
6,346,218 UART: [ldev] CDI.KEYID = 6
6,347,491 UART: [ldev] SUBJECT.KEYID = 5
6,348,625 UART: [ldev] AUTHORITY.KEYID = 7
6,349,800 UART: [ldev] FE.KEYID = 1
6,361,968 UART: [ldev] Erasing FE.KEYID = 1
8,833,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,225 UART: [ldev] --
10,624,558 UART: [fwproc] Wait for Commands...
10,626,211 UART: [fwproc] Recv command 0x46574c44
10,628,293 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,441 >>> mbox cmd response: success
14,491,208 UART: [afmc] ++
14,491,807 UART: [afmc] CDI.KEYID = 6
14,492,707 UART: [afmc] SUBJECT.KEYID = 7
14,493,856 UART: [afmc] AUTHORITY.KEYID = 5
16,992,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,618 UART: [afmc] --
18,787,260 UART: [cold-reset] --
18,790,410 UART: [state] Locking Datavault
18,794,842 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,478 UART: [state] Locking ICCM
18,798,480 UART: [exit] Launching FMC @ 0x40000130
18,806,934 UART:
18,807,162 UART: Running Caliptra FMC ...
18,808,251 UART:
18,808,404 UART: [state] CFI Enabled
18,816,551 UART: [fht] FMC Alias Private Key: 7
20,572,850 UART: [art] Extend RT PCRs Done
20,574,055 UART: [art] Lock RT PCRs Done
20,575,806 UART: [art] Populate DV Done
20,581,424 UART: [fht] FMC Alias Private Key: 7
20,583,118 UART: [art] Derive CDI
20,583,924 UART: [art] Store in in slot 0x4
20,626,624 UART: [art] Derive Key Pair
20,627,659 UART: [art] Store priv key in slot 0x5
23,054,758 UART: [art] Derive Key Pair - Done
23,067,762 UART: [art] Signing Cert with AUTHO
23,069,111 UART: RITY.KEYID = 7
24,774,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,967 UART: [art] PUB.X = CA8C0DBA4F2A1991A1C0A04D95A0D3F84796311DCAD0CBA58345829084EFD6A43196C6C2A811766AFFBED1473B2C7208
24,783,246 UART: [art] PUB.Y = D581A0CD36853ED69108C582E3A87EACB6414917DFF51C08A7430146D9B76217325C6B9F10797601D91485BF9712C5A3
24,790,522 UART: [art] SIG.R = 48C8C8CA8914D01DBD6F964D481E3003F0360ED106D5DA62C18CF390FF33BCD20E60F873B6E488EBD9190A62AF3672DF
24,797,894 UART: [art] SIG.S = 4D629A19F9ED2E3A02575D82B6DF530DBB45879C524B5E6822A128B4F9C2C43EF01EBE0BE0691A001744E314CB81EF43
25,777,681 UART: Caliptra RT
25,778,375 UART: [state] CFI Enabled
25,896,021 UART: [rt] RT listening for mailbox commands...
25,897,943 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,927,912 UART: [rt]cmd =0x44504543, len=20
25,948,325 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,693,823 ready_for_fw is high
3,694,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,374 >>> mbox cmd response: success
18,525,099 UART:
18,525,510 UART: Running Caliptra FMC ...
18,526,638 UART:
18,526,795 UART: [state] CFI Enabled
18,534,673 UART: [fht] FMC Alias Private Key: 7
20,291,690 UART: [art] Extend RT PCRs Done
20,292,918 UART: [art] Lock RT PCRs Done
20,294,452 UART: [art] Populate DV Done
20,299,814 UART: [fht] FMC Alias Private Key: 7
20,301,466 UART: [art] Derive CDI
20,302,197 UART: [art] Store in in slot 0x4
20,344,683 UART: [art] Derive Key Pair
20,345,676 UART: [art] Store priv key in slot 0x5
22,772,776 UART: [art] Derive Key Pair - Done
22,785,995 UART: [art] Signing Cert with AUTHO
22,787,291 UART: RITY.KEYID = 7
24,493,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,664 UART: [art] PUB.X = 3DF065A63B486EB835F2DF0DC49726229424A34A7D188ED9F5FD8F5158AB3E2FC6529E5C40EB44BD268E3D8F0C8F6EEA
24,501,898 UART: [art] PUB.Y = E992D4BF4CD62F89F259F41CF202DCA0F35664A7D4EC6A4421CDDEFA183BBDE3EC3AF70E8755D2595127E4847CB5D87F
24,509,203 UART: [art] SIG.R = 9DF3904A4EB6D23E657718F47007E9C0F5B1CBF05736872FCCC5123362C8F7045042D683F2F3AA01E755793802F8CA06
24,516,588 UART: [art] SIG.S = 10FA217919470B59D0ADA862CFFE2C40370ACCC2AB6CE1BAD8481A8449CABB75C191032934207BF84D33D7AE30AC7247
25,495,448 UART: Caliptra RT
25,496,166 UART: [state] CFI Enabled
25,612,629 UART: [rt] RT listening for mailbox commands...
25,614,536 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,644,466 UART: [rt]cmd =0x44504543, len=20
25,664,690 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,940 writing to cptra_bootfsm_go
193,163 UART:
193,507 UART: Running Caliptra ROM ...
194,709 UART:
194,861 UART: [state] CFI Enabled
265,141 UART: [state] LifecycleState = Unprovisioned
267,573 UART: [state] DebugLocked = No
270,387 UART: [state] WD Timer not started. Device not locked for debugging
274,269 UART: [kat] SHA2-256
464,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,858 UART: [kat] ++
475,306 UART: [kat] sha1
486,206 UART: [kat] SHA2-256
489,179 UART: [kat] SHA2-384
495,316 UART: [kat] SHA2-512-ACC
497,897 UART: [kat] ECC-384
2,946,847 UART: [kat] HMAC-384Kdf
2,971,877 UART: [kat] LMS
3,503,669 UART: [kat] --
3,507,120 UART: [cold-reset] ++
3,508,341 UART: [fht] FHT @ 0x50003400
3,520,404 UART: [idev] ++
3,521,037 UART: [idev] CDI.KEYID = 6
3,521,972 UART: [idev] SUBJECT.KEYID = 7
3,523,149 UART: [idev] UDS.KEYID = 0
3,524,076 ready_for_fw is high
3,524,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,081 UART: [idev] Erasing UDS.KEYID = 0
6,031,688 UART: [idev] Sha1 KeyId Algorithm
6,053,814 UART: [idev] --
6,059,060 UART: [ldev] ++
6,059,748 UART: [ldev] CDI.KEYID = 6
6,060,678 UART: [ldev] SUBJECT.KEYID = 5
6,061,844 UART: [ldev] AUTHORITY.KEYID = 7
6,062,996 UART: [ldev] FE.KEYID = 1
6,101,119 UART: [ldev] Erasing FE.KEYID = 1
8,607,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,372 UART: [ldev] --
10,414,049 UART: [fwproc] Wait for Commands...
10,416,795 UART: [fwproc] Recv command 0x46574c44
10,419,104 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,597,510 >>> mbox cmd response: success
14,602,359 UART: [afmc] ++
14,603,071 UART: [afmc] CDI.KEYID = 6
14,604,262 UART: [afmc] SUBJECT.KEYID = 7
14,605,701 UART: [afmc] AUTHORITY.KEYID = 5
17,152,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,737 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,407 UART: [afmc] --
18,967,386 UART: [cold-reset] --
18,971,143 UART: [state] Locking Datavault
18,976,663 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,859 UART: [state] Locking ICCM
18,981,478 UART: [exit] Launching FMC @ 0x40000130
18,990,095 UART:
18,990,330 UART: Running Caliptra FMC ...
18,991,356 UART:
18,991,503 UART: [state] CFI Enabled
19,050,909 UART: [fht] FMC Alias Private Key: 7
20,815,080 UART: [art] Extend RT PCRs Done
20,816,360 UART: [art] Lock RT PCRs Done
20,818,072 UART: [art] Populate DV Done
20,823,542 UART: [fht] FMC Alias Private Key: 7
20,825,035 UART: [art] Derive CDI
20,825,971 UART: [art] Store in in slot 0x4
20,883,883 UART: [art] Derive Key Pair
20,884,916 UART: [art] Store priv key in slot 0x5
23,348,428 UART: [art] Derive Key Pair - Done
23,361,417 UART: [art] Signing Cert with AUTHO
23,362,748 UART: RITY.KEYID = 7
25,074,412 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,910 UART: [art] PUB.X = 610867DA0300CBAF2425F4EBF7904B348C76339A920D7DB0FD9684A1C11C648F266281CF1A724BDF400518E9329DD125
25,083,153 UART: [art] PUB.Y = 8907DF69D49909073C033C73C0BA73C9642351CE25A2CB680436ADC75D050909FE7492E5820DEE5AC91225E2773A51F4
25,090,429 UART: [art] SIG.R = 1C07EF200D9EBAD722671F92F97842854972F2F366C4F1DFB5CDB064E82B77F71E36B367F5C37153127B988CB003A737
25,097,783 UART: [art] SIG.S = FDAEA9305DB246794229BA1995DE57E96D36D720392EC22985333982C2A63D56AB0827A383A1CC887BD94D1D4FF4DDC7
26,076,043 UART: Caliptra RT
26,076,756 UART: [state] CFI Enabled
26,242,113 UART: [rt] RT listening for mailbox commands...
26,244,026 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,274,372 UART: [rt]cmd =0x44504543, len=20
26,294,760 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,437,092 ready_for_fw is high
3,437,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,744,373 >>> mbox cmd response: success
19,028,375 UART:
19,028,761 UART: Running Caliptra FMC ...
19,029,957 UART:
19,030,131 UART: [state] CFI Enabled
19,097,676 UART: [fht] FMC Alias Private Key: 7
20,861,812 UART: [art] Extend RT PCRs Done
20,863,031 UART: [art] Lock RT PCRs Done
20,864,445 UART: [art] Populate DV Done
20,869,804 UART: [fht] FMC Alias Private Key: 7
20,871,507 UART: [art] Derive CDI
20,872,322 UART: [art] Store in in slot 0x4
20,930,735 UART: [art] Derive Key Pair
20,931,799 UART: [art] Store priv key in slot 0x5
23,394,266 UART: [art] Derive Key Pair - Done
23,406,989 UART: [art] Signing Cert with AUTHO
23,408,297 UART: RITY.KEYID = 7
25,120,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,502 UART: [art] PUB.X = B3F913C42F9B9642CF72A9DD68CED006DFB25A8F500B64548A2D3EF4CA0EBA14E282F39BDF26FAB40B9CB9312D597A93
25,129,805 UART: [art] PUB.Y = 46907C6B3E6FA34C03CAB7078F64B89B9F259D184088A2F64D1C50244D5C97F013FFDF52D2F6FB1A8F3E307B475489D1
25,137,052 UART: [art] SIG.R = B4C0860F361523A306F4021FF1BB166A0E1C03BFC4B1BAE8A34C4FC9035B88B62EBC20DB2324C86CF7B14C7C9FE306FA
25,144,452 UART: [art] SIG.S = BE08AD0DECE7365721F094014CEFFE650C0397877897CB4B0491277D9F94649DDBA81D3C00B56CEC7B258FAA2B3368B6
26,123,176 UART: Caliptra RT
26,123,882 UART: [state] CFI Enabled
26,289,561 UART: [rt] RT listening for mailbox commands...
26,291,613 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,322,274 UART: [rt]cmd =0x44504543, len=20
26,342,651 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,443 UART:
192,804 UART: Running Caliptra ROM ...
193,903 UART:
603,760 UART: [state] CFI Enabled
615,731 UART: [state] LifecycleState = Unprovisioned
618,122 UART: [state] DebugLocked = No
619,569 UART: [state] WD Timer not started. Device not locked for debugging
625,009 UART: [kat] SHA2-256
814,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,701 UART: [kat] ++
826,140 UART: [kat] sha1
837,146 UART: [kat] SHA2-256
840,213 UART: [kat] SHA2-384
845,770 UART: [kat] SHA2-512-ACC
848,341 UART: [kat] ECC-384
3,292,178 UART: [kat] HMAC-384Kdf
3,305,489 UART: [kat] LMS
3,837,325 UART: [kat] --
3,841,901 UART: [cold-reset] ++
3,843,756 UART: [fht] FHT @ 0x50003400
3,855,151 UART: [idev] ++
3,855,844 UART: [idev] CDI.KEYID = 6
3,856,862 UART: [idev] SUBJECT.KEYID = 7
3,858,027 UART: [idev] UDS.KEYID = 0
3,858,950 ready_for_fw is high
3,859,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,812 UART: [idev] Erasing UDS.KEYID = 0
6,333,858 UART: [idev] Sha1 KeyId Algorithm
6,356,513 UART: [idev] --
6,360,819 UART: [ldev] ++
6,361,487 UART: [ldev] CDI.KEYID = 6
6,362,396 UART: [ldev] SUBJECT.KEYID = 5
6,363,564 UART: [ldev] AUTHORITY.KEYID = 7
6,364,786 UART: [ldev] FE.KEYID = 1
6,374,832 UART: [ldev] Erasing FE.KEYID = 1
8,852,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,534 UART: [ldev] --
10,643,113 UART: [fwproc] Wait for Commands...
10,644,657 UART: [fwproc] Recv command 0x46574c44
10,646,957 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,834,085 >>> mbox cmd response: success
14,838,757 UART: [afmc] ++
14,839,516 UART: [afmc] CDI.KEYID = 6
14,840,621 UART: [afmc] SUBJECT.KEYID = 7
14,842,164 UART: [afmc] AUTHORITY.KEYID = 5
17,345,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,715 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,159 UART: [afmc] --
19,144,613 UART: [cold-reset] --
19,149,127 UART: [state] Locking Datavault
19,153,567 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,762 UART: [state] Locking ICCM
19,157,422 UART: [exit] Launching FMC @ 0x40000130
19,166,115 UART:
19,166,357 UART: Running Caliptra FMC ...
19,167,453 UART:
19,167,605 UART: [state] CFI Enabled
19,175,873 UART: [fht] FMC Alias Private Key: 7
20,932,865 UART: [art] Extend RT PCRs Done
20,934,076 UART: [art] Lock RT PCRs Done
20,935,833 UART: [art] Populate DV Done
20,941,147 UART: [fht] FMC Alias Private Key: 7
20,942,737 UART: [art] Derive CDI
20,943,544 UART: [art] Store in in slot 0x4
20,986,031 UART: [art] Derive Key Pair
20,987,026 UART: [art] Store priv key in slot 0x5
23,414,097 UART: [art] Derive Key Pair - Done
23,426,790 UART: [art] Signing Cert with AUTHO
23,428,128 UART: RITY.KEYID = 7
25,133,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,736 UART: [art] PUB.X = 96D0DDD6AD9931FBB05448977446BBAA89932A1AD597AEA3B0D0657EF8E0E27C5EBB41DBBBC5D72647579BFD91F7C076
25,142,012 UART: [art] PUB.Y = 03B3DF4401ED658C78A5060FD1805D6F71CDDA2544ECC95A033E9C09629ED45CF4F4D27AB71F91574D2B8F0B47FF2A2C
25,149,277 UART: [art] SIG.R = 5AA7A183D87A392E04D73843AD67698A3A7E08219A91DB07E446108A950BD014F957F97B312CD2F1BCE6C4A638243104
25,156,642 UART: [art] SIG.S = DEC992781ED08F792ECB7D9DB5C3E525AAB73F5373DA9EE9D9D16689A5B4681C2209E35CA5DFEB958B46A0860D0B4884
26,135,335 UART: Caliptra RT
26,136,035 UART: [state] CFI Enabled
26,253,037 UART: [rt] RT listening for mailbox commands...
26,254,955 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,284,862 UART: [rt]cmd =0x44504543, len=20
26,305,272 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,757,175 ready_for_fw is high
3,757,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,776 >>> mbox cmd response: success
19,197,250 UART:
19,197,667 UART: Running Caliptra FMC ...
19,198,764 UART:
19,198,917 UART: [state] CFI Enabled
19,206,964 UART: [fht] FMC Alias Private Key: 7
20,963,738 UART: [art] Extend RT PCRs Done
20,964,937 UART: [art] Lock RT PCRs Done
20,966,566 UART: [art] Populate DV Done
20,971,972 UART: [fht] FMC Alias Private Key: 7
20,973,465 UART: [art] Derive CDI
20,974,226 UART: [art] Store in in slot 0x4
21,017,030 UART: [art] Derive Key Pair
21,018,074 UART: [art] Store priv key in slot 0x5
23,444,101 UART: [art] Derive Key Pair - Done
23,456,767 UART: [art] Signing Cert with AUTHO
23,458,063 UART: RITY.KEYID = 7
25,163,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,320 UART: [art] PUB.X = F05A5A02CB725BD56FA87C1512CF24FA3F9E376BA9B3D3FDBBF1B7A69A5176C21CFE0168B18B260B85EE4DC1E0C70E7D
25,172,609 UART: [art] PUB.Y = 3A29398160B8691D8200A6FC2FD9FD16152AAF613EBA6A482B1524DDCD372BD6A4000ED53043B0D7E6F4CBC064107CCA
25,179,841 UART: [art] SIG.R = 583273EE559FA426CE782852F0F6DED19135B1E493EC527FE5F6B4F0C78F985EBD7CD2FC76D0095DD05C3EE881334FCF
25,187,275 UART: [art] SIG.S = D856421A07C7EBB1938B4A866C3150E97C3C058C9CBECBE4CD688F1E7717244B8888B8A8CBE6EAB0D2D366C22C26F89C
26,166,214 UART: Caliptra RT
26,166,922 UART: [state] CFI Enabled
26,283,672 UART: [rt] RT listening for mailbox commands...
26,285,584 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,315,761 UART: [rt]cmd =0x44504543, len=20
26,336,277 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,285 UART: [kat] SHA2-256
882,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,331 UART: [kat] ++
886,483 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,105 UART: [cold-reset] ++
1,476,527 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 ready_for_fw is high
1,480,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,466 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,696 UART: [idev] --
1,514,749 UART: [ldev] ++
1,514,917 UART: [ldev] CDI.KEYID = 6
1,515,280 UART: [ldev] SUBJECT.KEYID = 5
1,515,706 UART: [ldev] AUTHORITY.KEYID = 7
1,516,169 UART: [ldev] FE.KEYID = 1
1,521,495 UART: [ldev] Erasing FE.KEYID = 1
1,547,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,772 UART: [ldev] --
1,586,199 UART: [fwproc] Waiting for Commands...
1,586,936 UART: [fwproc] Received command 0x46574c44
1,587,727 UART: [fwproc] Received Image of size 114448 bytes
2,887,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,461 >>> mbox cmd response: success
3,080,597 UART: [afmc] ++
3,080,765 UART: [afmc] CDI.KEYID = 6
3,081,127 UART: [afmc] SUBJECT.KEYID = 7
3,081,552 UART: [afmc] AUTHORITY.KEYID = 5
3,117,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,286 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,976 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,663 UART: [afmc] --
3,160,701 UART: [cold-reset] --
3,161,419 UART: [state] Locking Datavault
3,162,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,080 UART: [state] Locking ICCM
3,163,684 UART: [exit] Launching FMC @ 0x40000130
3,169,013 UART:
3,169,029 UART: Running Caliptra FMC ...
3,169,437 UART:
3,169,491 UART: [state] CFI Enabled
3,179,788 UART: [fht] FMC Alias Private Key: 7
3,287,749 UART: [art] Extend RT PCRs Done
3,288,177 UART: [art] Lock RT PCRs Done
3,289,515 UART: [art] Populate DV Done
3,297,674 UART: [fht] FMC Alias Private Key: 7
3,298,828 UART: [art] Derive CDI
3,299,108 UART: [art] Store in in slot 0x4
3,384,553 UART: [art] Derive Key Pair
3,384,913 UART: [art] Store priv key in slot 0x5
3,398,401 UART: [art] Derive Key Pair - Done
3,412,739 UART: [art] Signing Cert with AUTHO
3,413,219 UART: RITY.KEYID = 7
3,428,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,828 UART: [art] PUB.X = 087324D29759D23DA9CB7DFABB93F2CE3B53B40CF60DE67D68E81A11C31C8816E46AA36FABEAB3952CCCA95BFD7836E8
3,435,611 UART: [art] PUB.Y = F6096F4FBEF44189F75B0D65CE8958C336A22B18799B6F7077CF6A1CB4A6F41240868A4F94BD18BC452F75A02BA7B5AB
3,442,565 UART: [art] SIG.R = C8C8B9DBF457932ABDEBC4E13C9EE400254A1E39A332F9C1949A98CC3C25CF159E6349953159E1C9B9B6A80D73541AB2
3,449,320 UART: [art] SIG.S = 0C6450C3E13AAC3B52CA6FDA4BA07B5141A400AE4DF16B48EF501704910B0423E86505FB454FE790D2AC8CE42441B7BD
3,472,810 UART: Caliptra RT
3,473,063 UART: [state] CFI Enabled
3,580,962 UART: [rt] RT listening for mailbox commands...
3,581,632 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,864 UART: [rt]cmd =0x44504543, len=20
3,632,789 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,065 ready_for_fw is high
1,362,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,160 >>> mbox cmd response: success
2,989,614 UART:
2,989,630 UART: Running Caliptra FMC ...
2,990,038 UART:
2,990,092 UART: [state] CFI Enabled
3,000,785 UART: [fht] FMC Alias Private Key: 7
3,108,668 UART: [art] Extend RT PCRs Done
3,109,096 UART: [art] Lock RT PCRs Done
3,110,654 UART: [art] Populate DV Done
3,119,053 UART: [fht] FMC Alias Private Key: 7
3,120,207 UART: [art] Derive CDI
3,120,487 UART: [art] Store in in slot 0x4
3,206,000 UART: [art] Derive Key Pair
3,206,360 UART: [art] Store priv key in slot 0x5
3,219,330 UART: [art] Derive Key Pair - Done
3,233,834 UART: [art] Signing Cert with AUTHO
3,234,314 UART: RITY.KEYID = 7
3,249,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,131 UART: [art] PUB.X = 20A2B290C82D205D5EE3ABAFB25F172B5108C172DB78DCB2642A90B157581C31293B3394A039D0F9F4BBF2EA9DE0D3CD
3,256,912 UART: [art] PUB.Y = 63E0BF2DE28E73B9E76FB924615842843EB4F58FE6D56F298E055082C266F10053342AC27E52ED0812A1369A639C560A
3,263,827 UART: [art] SIG.R = 5EBBCE6F08587B7241B9887D1149D703F658721CFA5F1D71C1A09EF1998B492511AC93B2DA4FE1C78A4A59024E08E844
3,270,589 UART: [art] SIG.S = 7FE4F48DC26332EB59F71FDC68407077DCD572FDD717EC24CDADE0BAE60310E55CBB8D86D68CB39FACCE988AAECBD87F
3,294,523 UART: Caliptra RT
3,294,776 UART: [state] CFI Enabled
3,403,642 UART: [rt] RT listening for mailbox commands...
3,404,312 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,368 UART: [rt]cmd =0x44504543, len=20
3,455,315 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,296 UART: [kat] SHA2-256
892,234 UART: [kat] SHA2-384
895,005 UART: [kat] SHA2-512-ACC
896,906 UART: [kat] ECC-384
902,519 UART: [kat] HMAC-384Kdf
907,059 UART: [kat] LMS
1,475,255 UART: [kat] --
1,475,920 UART: [cold-reset] ++
1,476,330 UART: [fht] Storing FHT @ 0x50003400
1,479,151 UART: [idev] ++
1,479,319 UART: [idev] CDI.KEYID = 6
1,479,679 UART: [idev] SUBJECT.KEYID = 7
1,480,103 UART: [idev] UDS.KEYID = 0
1,480,448 ready_for_fw is high
1,480,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,803 UART: [idev] Erasing UDS.KEYID = 0
1,504,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,349 UART: [idev] --
1,514,324 UART: [ldev] ++
1,514,492 UART: [ldev] CDI.KEYID = 6
1,514,855 UART: [ldev] SUBJECT.KEYID = 5
1,515,281 UART: [ldev] AUTHORITY.KEYID = 7
1,515,744 UART: [ldev] FE.KEYID = 1
1,520,926 UART: [ldev] Erasing FE.KEYID = 1
1,546,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,503 UART: [ldev] --
1,585,792 UART: [fwproc] Waiting for Commands...
1,586,439 UART: [fwproc] Received command 0x46574c44
1,587,230 UART: [fwproc] Received Image of size 114448 bytes
2,886,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,727 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,120 >>> mbox cmd response: success
3,079,380 UART: [afmc] ++
3,079,548 UART: [afmc] CDI.KEYID = 6
3,079,910 UART: [afmc] SUBJECT.KEYID = 7
3,080,335 UART: [afmc] AUTHORITY.KEYID = 5
3,115,094 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,156 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,549 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,239 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,918 UART: [afmc] --
3,157,936 UART: [cold-reset] --
3,158,810 UART: [state] Locking Datavault
3,160,075 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,679 UART: [state] Locking ICCM
3,161,237 UART: [exit] Launching FMC @ 0x40000130
3,166,566 UART:
3,166,582 UART: Running Caliptra FMC ...
3,166,990 UART:
3,167,133 UART: [state] CFI Enabled
3,177,494 UART: [fht] FMC Alias Private Key: 7
3,285,977 UART: [art] Extend RT PCRs Done
3,286,405 UART: [art] Lock RT PCRs Done
3,287,739 UART: [art] Populate DV Done
3,295,742 UART: [fht] FMC Alias Private Key: 7
3,296,828 UART: [art] Derive CDI
3,297,108 UART: [art] Store in in slot 0x4
3,382,749 UART: [art] Derive Key Pair
3,383,109 UART: [art] Store priv key in slot 0x5
3,396,897 UART: [art] Derive Key Pair - Done
3,411,602 UART: [art] Signing Cert with AUTHO
3,412,082 UART: RITY.KEYID = 7
3,427,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,995 UART: [art] PUB.X = 8DB93107DB512C6F22A690BDA97225155D9AA084BD0DBDBDCB8436F2041551F6F07FAB9691A25C9732A803906F1BCB73
3,434,761 UART: [art] PUB.Y = 8684DED163714725FBD2659E0E38CD53EE8CFFE6982790C65610C329E1D789FFCAD850C7CB538017BEAC58F6DB71B1CA
3,441,722 UART: [art] SIG.R = 0F906947303EB2964C8B978F1F1F04C11DA4F4E5A6D223E260872B96B4960D05CBAA5D4BF200D6B042E797CEF2753797
3,448,460 UART: [art] SIG.S = A73E04FED0F0CCCB700633B8ACB0828C197B7BC54CD74E4F9512EECBC6506DB63DEE46491431BCB5122EC3BB1917C252
3,472,951 UART: Caliptra RT
3,473,296 UART: [state] CFI Enabled
3,581,663 UART: [rt] RT listening for mailbox commands...
3,582,333 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,135 UART: [rt]cmd =0x44504543, len=20
3,633,060 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,848 ready_for_fw is high
1,362,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,106 >>> mbox cmd response: success
2,991,876 UART:
2,991,892 UART: Running Caliptra FMC ...
2,992,300 UART:
2,992,443 UART: [state] CFI Enabled
3,003,162 UART: [fht] FMC Alias Private Key: 7
3,111,287 UART: [art] Extend RT PCRs Done
3,111,715 UART: [art] Lock RT PCRs Done
3,113,361 UART: [art] Populate DV Done
3,121,492 UART: [fht] FMC Alias Private Key: 7
3,122,568 UART: [art] Derive CDI
3,122,848 UART: [art] Store in in slot 0x4
3,208,679 UART: [art] Derive Key Pair
3,209,039 UART: [art] Store priv key in slot 0x5
3,222,065 UART: [art] Derive Key Pair - Done
3,236,984 UART: [art] Signing Cert with AUTHO
3,237,464 UART: RITY.KEYID = 7
3,252,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,493 UART: [art] PUB.X = 95F4E2DD5C3EF0225B772330C30593BF92C86A99763D176C2364A4076FD007D664DF2282CBA3E76BE5DF546B67C4C31E
3,260,258 UART: [art] PUB.Y = 08D86804D4A3F46A100A5EF02D37482FD15AED989B3085B84006F2E9F6A8398D7188DE0E68530FBF6046A008000C1098
3,267,158 UART: [art] SIG.R = 481E79029C59494EE5CC9F796C67C5D36B414EBD8E39EC5135E9F9D9988422C72D94C1AE02251B7F95F610BDA6B5578A
3,273,926 UART: [art] SIG.S = DAAF11C357845EA3F97DFAD840669BA515A81C591F21C82A24B096E6CEF68CC36E9E5C684C47D872D86AA0D0FE8DC178
3,298,539 UART: Caliptra RT
3,298,884 UART: [state] CFI Enabled
3,406,851 UART: [rt] RT listening for mailbox commands...
3,407,521 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,447 UART: [rt]cmd =0x44504543, len=20
3,458,242 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,706 UART: [kat] SHA2-512-ACC
908,607 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,172,049 UART: [cold-reset] ++
1,172,537 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 ready_for_fw is high
1,176,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,562 UART: [idev] Erasing UDS.KEYID = 0
1,201,799 UART: [idev] Sha1 KeyId Algorithm
1,210,269 UART: [idev] --
1,211,319 UART: [ldev] ++
1,211,487 UART: [ldev] CDI.KEYID = 6
1,211,850 UART: [ldev] SUBJECT.KEYID = 5
1,212,276 UART: [ldev] AUTHORITY.KEYID = 7
1,212,739 UART: [ldev] FE.KEYID = 1
1,218,111 UART: [ldev] Erasing FE.KEYID = 1
1,244,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,021 UART: [ldev] --
1,283,516 UART: [fwproc] Wait for Commands...
1,284,232 UART: [fwproc] Recv command 0x46574c44
1,284,960 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,112 >>> mbox cmd response: success
2,776,248 UART: [afmc] ++
2,776,416 UART: [afmc] CDI.KEYID = 6
2,776,778 UART: [afmc] SUBJECT.KEYID = 7
2,777,203 UART: [afmc] AUTHORITY.KEYID = 5
2,812,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,849 UART: [afmc] --
2,855,739 UART: [cold-reset] --
2,856,629 UART: [state] Locking Datavault
2,857,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,382 UART: [state] Locking ICCM
2,859,010 UART: [exit] Launching FMC @ 0x40000130
2,864,339 UART:
2,864,355 UART: Running Caliptra FMC ...
2,864,763 UART:
2,864,817 UART: [state] CFI Enabled
2,875,270 UART: [fht] FMC Alias Private Key: 7
2,983,137 UART: [art] Extend RT PCRs Done
2,983,565 UART: [art] Lock RT PCRs Done
2,984,917 UART: [art] Populate DV Done
2,993,058 UART: [fht] FMC Alias Private Key: 7
2,994,086 UART: [art] Derive CDI
2,994,366 UART: [art] Store in in slot 0x4
3,079,725 UART: [art] Derive Key Pair
3,080,085 UART: [art] Store priv key in slot 0x5
3,093,501 UART: [art] Derive Key Pair - Done
3,108,215 UART: [art] Signing Cert with AUTHO
3,108,695 UART: RITY.KEYID = 7
3,124,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,858 UART: [art] PUB.X = F37C28757007BB5427A241FCDD3311A3B7B0919C3D4A9FF4DB7E0262693A6B29DF581BD31424E62F43E47338D4D10B50
3,131,621 UART: [art] PUB.Y = 9C8ABFDEF9B8C1280A7AE8AD36A255899ABB12B322B1D9A0576499E7EF9D12237503A1D17F2050BA0839154AB2A044B4
3,138,570 UART: [art] SIG.R = BF7C833A7698465D2E20B5D384085EFFB8278DF54B9C2BCA93AB523CBA96F2F7573417F4FBD8EE78F5586CF29145C6C0
3,145,349 UART: [art] SIG.S = 3DDCD53132629F1323D2F85C8EBBEEC884DE812447E0EF3B91296C0FBE944DBBD90A9A14D2FB65AD9D92F2B754662F23
3,169,014 UART: Caliptra RT
3,169,267 UART: [state] CFI Enabled
3,277,718 UART: [rt] RT listening for mailbox commands...
3,278,388 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,418 UART: [rt]cmd =0x44504543, len=20
3,328,949 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,507 ready_for_fw is high
1,060,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,895 >>> mbox cmd response: success
2,690,177 UART:
2,690,193 UART: Running Caliptra FMC ...
2,690,601 UART:
2,690,655 UART: [state] CFI Enabled
2,701,020 UART: [fht] FMC Alias Private Key: 7
2,808,937 UART: [art] Extend RT PCRs Done
2,809,365 UART: [art] Lock RT PCRs Done
2,811,119 UART: [art] Populate DV Done
2,819,314 UART: [fht] FMC Alias Private Key: 7
2,820,326 UART: [art] Derive CDI
2,820,606 UART: [art] Store in in slot 0x4
2,906,343 UART: [art] Derive Key Pair
2,906,703 UART: [art] Store priv key in slot 0x5
2,919,951 UART: [art] Derive Key Pair - Done
2,934,354 UART: [art] Signing Cert with AUTHO
2,934,834 UART: RITY.KEYID = 7
2,949,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,551 UART: [art] PUB.X = FCC8E49EE73E4282FDDD1E0F264716D22E81B8DF06546B4B1E63595F21F9908F57282CF63FECA1782E5F62BF6FDDC9EA
2,957,333 UART: [art] PUB.Y = 9F18552A558D94E2B5BDDC1E79A95AE1DBB400D594CB8C74F23A68E56D3610E997614DF9011053175787A43B09992EA3
2,964,255 UART: [art] SIG.R = 4724EABA434BCFD886B45A9A7F0A71FA11B0D305E2FE2B628D1C90623DE9709D61D198E095800ED47BB3B100F5169C8F
2,971,004 UART: [art] SIG.S = 6115F7905C5854F2F7D9BDAA682DCE0B904DDBC3BA7AD3A9F306F56549F27A828EE637529DC53145D2047BEB42AC1113
2,994,240 UART: Caliptra RT
2,994,493 UART: [state] CFI Enabled
3,102,492 UART: [rt] RT listening for mailbox commands...
3,103,162 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,016 UART: [rt]cmd =0x44504543, len=20
3,153,785 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,818 UART: [kat] SHA2-256
903,758 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,171 UART: [kat] HMAC-384Kdf
922,851 UART: [kat] LMS
1,171,179 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,446 UART: [fht] FHT @ 0x50003400
1,174,937 UART: [idev] ++
1,175,105 UART: [idev] CDI.KEYID = 6
1,175,465 UART: [idev] SUBJECT.KEYID = 7
1,175,889 UART: [idev] UDS.KEYID = 0
1,176,234 ready_for_fw is high
1,176,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,588 UART: [ldev] ++
1,210,756 UART: [ldev] CDI.KEYID = 6
1,211,119 UART: [ldev] SUBJECT.KEYID = 5
1,211,545 UART: [ldev] AUTHORITY.KEYID = 7
1,212,008 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,243,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,398 UART: [ldev] --
1,282,691 UART: [fwproc] Wait for Commands...
1,283,483 UART: [fwproc] Recv command 0x46574c44
1,284,211 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,405 >>> mbox cmd response: success
2,776,491 UART: [afmc] ++
2,776,659 UART: [afmc] CDI.KEYID = 6
2,777,021 UART: [afmc] SUBJECT.KEYID = 7
2,777,446 UART: [afmc] AUTHORITY.KEYID = 5
2,812,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,932 UART: [afmc] --
2,855,956 UART: [cold-reset] --
2,856,886 UART: [state] Locking Datavault
2,858,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,769 UART: [state] Locking ICCM
2,859,413 UART: [exit] Launching FMC @ 0x40000130
2,864,742 UART:
2,864,758 UART: Running Caliptra FMC ...
2,865,166 UART:
2,865,309 UART: [state] CFI Enabled
2,876,062 UART: [fht] FMC Alias Private Key: 7
2,983,933 UART: [art] Extend RT PCRs Done
2,984,361 UART: [art] Lock RT PCRs Done
2,986,049 UART: [art] Populate DV Done
2,994,388 UART: [fht] FMC Alias Private Key: 7
2,995,324 UART: [art] Derive CDI
2,995,604 UART: [art] Store in in slot 0x4
3,081,731 UART: [art] Derive Key Pair
3,082,091 UART: [art] Store priv key in slot 0x5
3,095,433 UART: [art] Derive Key Pair - Done
3,109,912 UART: [art] Signing Cert with AUTHO
3,110,392 UART: RITY.KEYID = 7
3,126,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,903 UART: [art] PUB.X = 6F15BB3E16AFDB78B7CEF82C9E4859D3262FFA7541145C161EE90DCB1030DE438CB0ACBBAD7F07928225EB8B68C84369
3,133,683 UART: [art] PUB.Y = 9F3BA88D84DB85A375BE2D377950257CA2B378095B37A9B85D423C3B854022E95AF224C9FD2881094B2696DD77A008F0
3,140,622 UART: [art] SIG.R = 0769932FF87EAC682F42BEB3558D4730E02798E196AA0D999B58F4F96A8462706ACEBF70E39A9AE3339EACC7420B2437
3,147,387 UART: [art] SIG.S = 585C3E679C133B7F22A103A3C99EC32DBB9C095E0982F50D8D9B3C9DC2F311D9A20778930D2F8A73657ECEEEC10F5AA0
3,171,289 UART: Caliptra RT
3,171,634 UART: [state] CFI Enabled
3,278,795 UART: [rt] RT listening for mailbox commands...
3,279,465 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,603 UART: [rt]cmd =0x44504543, len=20
3,330,304 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 ready_for_fw is high
1,060,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,724 >>> mbox cmd response: success
2,690,544 UART:
2,690,560 UART: Running Caliptra FMC ...
2,690,968 UART:
2,691,111 UART: [state] CFI Enabled
2,701,824 UART: [fht] FMC Alias Private Key: 7
2,809,607 UART: [art] Extend RT PCRs Done
2,810,035 UART: [art] Lock RT PCRs Done
2,811,537 UART: [art] Populate DV Done
2,819,900 UART: [fht] FMC Alias Private Key: 7
2,820,926 UART: [art] Derive CDI
2,821,206 UART: [art] Store in in slot 0x4
2,906,979 UART: [art] Derive Key Pair
2,907,339 UART: [art] Store priv key in slot 0x5
2,920,725 UART: [art] Derive Key Pair - Done
2,935,501 UART: [art] Signing Cert with AUTHO
2,935,981 UART: RITY.KEYID = 7
2,951,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,862 UART: [art] PUB.X = 126F865694D988C9E657EF1E0049F495A5D1B0FC03CD93161E60792786B95FD485A8A52AD64F6C9D66F970D0CD18792B
2,958,607 UART: [art] PUB.Y = 402B05F13E0DBAE146428DA2DCF56544A0576FDC00622EC7E85252B82636C03D6822EF5CFC2436F686902CB17748F338
2,965,529 UART: [art] SIG.R = 516CFA39191FC0A322E812374F57EC99A3075B068C48D3AEB29FBBE576829041B552268DDD6844DDC1B618785F51074F
2,972,290 UART: [art] SIG.S = 26FF00B73E745811C2BB3EDE63A091EB0F535EDC8B232991AB30DBBF5AE481B614F19D6630865C666BEB44FD14D85841
2,996,016 UART: Caliptra RT
2,996,361 UART: [state] CFI Enabled
3,104,788 UART: [rt] RT listening for mailbox commands...
3,105,458 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,440 UART: [rt]cmd =0x44504543, len=20
3,156,585 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,336 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,756 >>> mbox cmd response: success
2,774,899 UART: [afmc] ++
2,775,067 UART: [afmc] CDI.KEYID = 6
2,775,430 UART: [afmc] SUBJECT.KEYID = 7
2,775,856 UART: [afmc] AUTHORITY.KEYID = 5
2,811,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,960 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,640 UART: [afmc] --
2,854,718 UART: [cold-reset] --
2,855,772 UART: [state] Locking Datavault
2,856,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,563 UART: [state] Locking ICCM
2,858,183 UART: [exit] Launching FMC @ 0x40000130
2,863,512 UART:
2,863,528 UART: Running Caliptra FMC ...
2,863,936 UART:
2,863,990 UART: [state] CFI Enabled
2,874,393 UART: [fht] FMC Alias Private Key: 7
2,981,936 UART: [art] Extend RT PCRs Done
2,982,364 UART: [art] Lock RT PCRs Done
2,983,900 UART: [art] Populate DV Done
2,992,135 UART: [fht] FMC Alias Private Key: 7
2,993,241 UART: [art] Derive CDI
2,993,521 UART: [art] Store in in slot 0x4
3,079,380 UART: [art] Derive Key Pair
3,079,740 UART: [art] Store priv key in slot 0x5
3,093,490 UART: [art] Derive Key Pair - Done
3,108,364 UART: [art] Signing Cert with AUTHO
3,108,844 UART: RITY.KEYID = 7
3,124,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,915 UART: [art] PUB.X = 9F08CFBB6314E07AF86496A643C3D715940A4B58423EED6A28F0CA8AA604FFAFCA4768FA64EF5088C5E3DBA34C7F50C1
3,131,694 UART: [art] PUB.Y = 9570234A4590309AAFB4AFA5A1BE3E5C898D21AFAA1D960B7095088A3213DFF66CC3D02D2FA078B4C7DBDD75AADA3B34
3,138,658 UART: [art] SIG.R = 62B626584F1E4656BB5557FA53D8C80F746DEED1DFBC085C88C26FBD05DF43EA85B3065000B8E1F153C737655D9755AF
3,145,402 UART: [art] SIG.S = 23BB7788D578A27731E85033B3AC2B240C9709AB212E95D570BA7AE7379C803C2F393B35B9355A080BC29B811E835E91
3,168,729 UART: Caliptra RT
3,168,982 UART: [state] CFI Enabled
3,277,173 UART: [rt] RT listening for mailbox commands...
3,277,843 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,609 UART: [rt]cmd =0x44504543, len=20
3,328,502 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,476 ready_for_fw is high
1,056,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,822 >>> mbox cmd response: success
2,684,208 UART:
2,684,224 UART: Running Caliptra FMC ...
2,684,632 UART:
2,684,686 UART: [state] CFI Enabled
2,695,149 UART: [fht] FMC Alias Private Key: 7
2,802,558 UART: [art] Extend RT PCRs Done
2,802,986 UART: [art] Lock RT PCRs Done
2,804,730 UART: [art] Populate DV Done
2,812,847 UART: [fht] FMC Alias Private Key: 7
2,813,957 UART: [art] Derive CDI
2,814,237 UART: [art] Store in in slot 0x4
2,900,244 UART: [art] Derive Key Pair
2,900,604 UART: [art] Store priv key in slot 0x5
2,913,724 UART: [art] Derive Key Pair - Done
2,928,098 UART: [art] Signing Cert with AUTHO
2,928,578 UART: RITY.KEYID = 7
2,944,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,785 UART: [art] PUB.X = 6BA898D5ABB1156CCBE20664CFA71A5B410BE4287B47514400F67479A40CA076A010422BB95C871A58FCAE5714EF8576
2,951,528 UART: [art] PUB.Y = FD18EFC3E9F347AE0EFE9B04444B800805D9C01FAB46E1C3252FC04B4433D34E11A63890C40950C1FB6BDEDF4AFB8211
2,958,479 UART: [art] SIG.R = 07C7CB2454B9E9C7ED57E0B48EF9F42337F790CBEDFB4CA025910A0116FB959C8C8990B8889BF8E365E276F60C0E7F0B
2,965,243 UART: [art] SIG.S = B5C452997A8F8BA830B28FE625B4356A581758F66059567948333FBB62B39A31C650F31B4CAB9DFFA78A7188FDAFA256
2,989,356 UART: Caliptra RT
2,989,609 UART: [state] CFI Enabled
3,097,242 UART: [rt] RT listening for mailbox commands...
3,097,912 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,856 UART: [rt]cmd =0x44504543, len=20
3,148,731 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
915,805 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 ready_for_fw is high
1,174,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,340 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,747 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,067 >>> mbox cmd response: success
2,774,130 UART: [afmc] ++
2,774,298 UART: [afmc] CDI.KEYID = 6
2,774,661 UART: [afmc] SUBJECT.KEYID = 7
2,775,087 UART: [afmc] AUTHORITY.KEYID = 5
2,810,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,431 UART: [afmc] --
2,854,533 UART: [cold-reset] --
2,855,509 UART: [state] Locking Datavault
2,856,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,376 UART: [state] Locking ICCM
2,857,954 UART: [exit] Launching FMC @ 0x40000130
2,863,283 UART:
2,863,299 UART: Running Caliptra FMC ...
2,863,707 UART:
2,863,850 UART: [state] CFI Enabled
2,874,399 UART: [fht] FMC Alias Private Key: 7
2,982,522 UART: [art] Extend RT PCRs Done
2,982,950 UART: [art] Lock RT PCRs Done
2,984,150 UART: [art] Populate DV Done
2,992,355 UART: [fht] FMC Alias Private Key: 7
2,993,501 UART: [art] Derive CDI
2,993,781 UART: [art] Store in in slot 0x4
3,079,286 UART: [art] Derive Key Pair
3,079,646 UART: [art] Store priv key in slot 0x5
3,093,104 UART: [art] Derive Key Pair - Done
3,108,136 UART: [art] Signing Cert with AUTHO
3,108,616 UART: RITY.KEYID = 7
3,124,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,849 UART: [art] PUB.X = 7132082E4D1E7AA0D0EABB772F1C39BF18CEFF3115D4053E9D19B2307DB7F0A2B0794721769F013DD6551395C4534836
3,131,610 UART: [art] PUB.Y = FE81648117B42E7055F3C8AE58C5D6BB699B82B9F3CDD1BD325FE2F6A1FF6DA6E0CA32B44B4EDDDE62E94004D4537DA8
3,138,579 UART: [art] SIG.R = 8768B5506D3B8168FD98A9E992827E65D25E3E48FF43CF493D78B2C21BE9BC0526CCC4F074309D318C24168CA8743E66
3,145,346 UART: [art] SIG.S = 4306BF66E2302C98A4C41B48806BB9341CF11392575C79F88C6D376A093B6EE1BB98E88F96BF617A4A64C5B9F6B4FC83
3,168,621 UART: Caliptra RT
3,168,966 UART: [state] CFI Enabled
3,276,395 UART: [rt] RT listening for mailbox commands...
3,277,065 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,289 UART: [rt]cmd =0x44504543, len=20
3,328,146 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,187 ready_for_fw is high
1,056,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,749 >>> mbox cmd response: success
2,684,151 UART:
2,684,167 UART: Running Caliptra FMC ...
2,684,575 UART:
2,684,718 UART: [state] CFI Enabled
2,695,461 UART: [fht] FMC Alias Private Key: 7
2,803,512 UART: [art] Extend RT PCRs Done
2,803,940 UART: [art] Lock RT PCRs Done
2,805,860 UART: [art] Populate DV Done
2,814,199 UART: [fht] FMC Alias Private Key: 7
2,815,269 UART: [art] Derive CDI
2,815,549 UART: [art] Store in in slot 0x4
2,901,052 UART: [art] Derive Key Pair
2,901,412 UART: [art] Store priv key in slot 0x5
2,914,148 UART: [art] Derive Key Pair - Done
2,929,026 UART: [art] Signing Cert with AUTHO
2,929,506 UART: RITY.KEYID = 7
2,945,028 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,793 UART: [art] PUB.X = 1F2A37A57F40D0DD4F4617B0808C431D4ED3D01BCA3E0B0450A94179F8EBFF2A755943DA2EC4A78D61B68B9DA1DE7703
2,952,568 UART: [art] PUB.Y = 709D9F1FA3BADE095B6C15A53B605B45FD916C1D4B4DCB84FA970FC10ABC4F467408A231C7A258E4BD703745417461FA
2,959,518 UART: [art] SIG.R = 2C386E105FE7A3A0BFF5F781C6054F4803E4D1054191B7881F08C93F8D4B1FC85E99FC6C66A6AB9B3E1C1435DC215792
2,966,282 UART: [art] SIG.S = 19B37617F902BF5FC8063CB1A6B54DE7C0F6AE7AF811540E768AE7EA32A32908B6D1BC4860792E02BC9E47041A56E65C
2,989,711 UART: Caliptra RT
2,990,056 UART: [state] CFI Enabled
3,098,243 UART: [rt] RT listening for mailbox commands...
3,098,913 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,661 UART: [rt]cmd =0x44504543, len=20
3,149,582 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,035 UART:
192,420 UART: Running Caliptra ROM ...
193,547 UART:
193,701 UART: [state] CFI Enabled
264,886 UART: [state] LifecycleState = Unprovisioned
266,897 UART: [state] DebugLocked = No
269,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,091 UART: [kat] SHA2-256
443,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,271 UART: [kat] ++
454,748 UART: [kat] sha1
466,260 UART: [kat] SHA2-256
468,983 UART: [kat] SHA2-384
474,688 UART: [kat] SHA2-512-ACC
477,059 UART: [kat] ECC-384
2,768,347 UART: [kat] HMAC-384Kdf
2,801,394 UART: [kat] LMS
3,991,718 UART: [kat] --
3,996,443 UART: [cold-reset] ++
3,998,739 UART: [fht] Storing FHT @ 0x50003400
4,011,163 UART: [idev] ++
4,011,785 UART: [idev] CDI.KEYID = 6
4,012,683 UART: [idev] SUBJECT.KEYID = 7
4,013,928 UART: [idev] UDS.KEYID = 0
4,014,917 ready_for_fw is high
4,015,115 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,502 UART: [idev] Erasing UDS.KEYID = 0
7,346,053 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,946 UART: [idev] --
7,372,810 UART: [ldev] ++
7,373,395 UART: [ldev] CDI.KEYID = 6
7,374,412 UART: [ldev] SUBJECT.KEYID = 5
7,375,572 UART: [ldev] AUTHORITY.KEYID = 7
7,376,805 UART: [ldev] FE.KEYID = 1
7,424,065 UART: [ldev] Erasing FE.KEYID = 1
10,756,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,305 UART: [ldev] --
13,136,822 UART: [fwproc] Waiting for Commands...
13,139,564 UART: [fwproc] Received command 0x46574c44
13,141,759 UART: [fwproc] Received Image of size 114124 bytes
17,194,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,253 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,653,926 >>> mbox cmd response: success
17,657,998 UART: [afmc] ++
17,658,605 UART: [afmc] CDI.KEYID = 6
17,659,630 UART: [afmc] SUBJECT.KEYID = 7
17,660,795 UART: [afmc] AUTHORITY.KEYID = 5
21,028,567 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,122 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,503 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,366 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,842 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,957 UART: [afmc] --
23,400,672 UART: [cold-reset] --
23,405,723 UART: [state] Locking Datavault
23,411,189 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,938 UART: [state] Locking ICCM
23,414,391 UART: [exit] Launching FMC @ 0x40000130
23,422,793 UART:
23,423,029 UART: Running Caliptra FMC ...
23,424,135 UART:
23,424,300 UART: [state] CFI Enabled
23,487,326 UART: [fht] FMC Alias Private Key: 7
25,825,261 UART: [art] Extend RT PCRs Done
25,826,480 UART: [art] Lock RT PCRs Done
25,828,188 UART: [art] Populate DV Done
25,833,329 UART: [fht] FMC Alias Private Key: 7
25,834,974 UART: [art] Derive CDI
25,835,788 UART: [art] Store in in slot 0x4
25,895,271 UART: [art] Derive Key Pair
25,896,314 UART: [art] Store priv key in slot 0x5
29,189,012 UART: [art] Derive Key Pair - Done
29,202,169 UART: [art] Signing Cert with AUTHO
29,203,468 UART: RITY.KEYID = 7
31,489,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,479 UART: [art] PUB.X = EB849683BB42EA8ADA05E2F268EA1BF639CF734FA5D6AF9296A2AFB8D0C86BFF2AB81EC1F4953DED3426B14B5CB36818
31,498,740 UART: [art] PUB.Y = 10857D750BFE672ECA4CC0D9776D31494474AC6C94B3ACE52C9589025C83860C98F27A080FFFD00933336580BBD44DF5
31,505,979 UART: [art] SIG.R = 426E286629B22E4613EF35040AFB259A80B7C21CE0A8FA9026CDEFF138DD9687EDC4FE6D5F9D204E1D90C2B31A4E5C79
31,513,385 UART: [art] SIG.S = 9225EE7111832A7555CAB499FA846DD5D3FA63C5CB095BF99B00F3606F0DAEC97957D4C3C82C4C3AB7112CB86BF4CD06
32,818,977 UART: Caliptra RT
32,819,687 UART: [state] CFI Enabled
32,979,374 UART: [rt] RT listening for mailbox commands...
32,981,291 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,011,168 UART: [rt]cmd =0x44504543, len=40
33,053,944 >>> mbox cmd response data (40 bytes)
33,055,064 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,085,070 UART: [rt]cmd =0x44504543, len=40
33,107,610 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,788,563 ready_for_fw is high
3,788,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,852,643 >>> mbox cmd response: success
23,553,013 UART:
23,553,382 UART: Running Caliptra FMC ...
23,554,526 UART:
23,554,690 UART: [state] CFI Enabled
23,621,604 UART: [fht] FMC Alias Private Key: 7
25,958,977 UART: [art] Extend RT PCRs Done
25,960,200 UART: [art] Lock RT PCRs Done
25,961,697 UART: [art] Populate DV Done
25,967,066 UART: [fht] FMC Alias Private Key: 7
25,968,688 UART: [art] Derive CDI
25,969,430 UART: [art] Store in in slot 0x4
26,031,122 UART: [art] Derive Key Pair
26,032,168 UART: [art] Store priv key in slot 0x5
29,324,974 UART: [art] Derive Key Pair - Done
29,337,763 UART: [art] Signing Cert with AUTHO
29,339,079 UART: RITY.KEYID = 7
31,626,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,975 UART: [art] PUB.X = 059DC0256F0D935C8EDD11C76CE98C58732DA1F5F4F74D114BEAD91B6A9E292611F6B6DAF07AF3BF981E6CC884FD32C8
31,635,228 UART: [art] PUB.Y = AEE2743A731C41C8A3158A93A66A203ED4414F9DC12E67B845876E1AFF1A8BD1D726FEFEDD07FC84B73FC3F95C790E6A
31,642,513 UART: [art] SIG.R = D204E0A08A68163BEDD28014F9D8D50811B0BFDF3D4073EE2D7509EAC5E1E6148F760F3C7FB53170F18F070D10B25458
31,649,906 UART: [art] SIG.S = 90AE356EDC7DA91BC77F05CD626CBFC489FA03726DD25F25232AB2CB86A9256304CA74E84E521A27C2D329461C6C384D
32,954,869 UART: Caliptra RT
32,955,578 UART: [state] CFI Enabled
33,116,511 UART: [rt] RT listening for mailbox commands...
33,118,437 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,148,558 UART: [rt]cmd =0x44504543, len=40
33,191,097 >>> mbox cmd response data (40 bytes)
33,192,252 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,222,518 UART: [rt]cmd =0x44504543, len=40
33,245,175 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,557 UART:
192,920 UART: Running Caliptra ROM ...
194,097 UART:
603,670 UART: [state] CFI Enabled
616,910 UART: [state] LifecycleState = Unprovisioned
618,855 UART: [state] DebugLocked = No
620,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,231 UART: [kat] SHA2-256
795,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,568 UART: [kat] ++
806,100 UART: [kat] sha1
816,054 UART: [kat] SHA2-256
818,768 UART: [kat] SHA2-384
825,034 UART: [kat] SHA2-512-ACC
827,405 UART: [kat] ECC-384
3,108,881 UART: [kat] HMAC-384Kdf
3,120,292 UART: [kat] LMS
4,310,376 UART: [kat] --
4,314,486 UART: [cold-reset] ++
4,315,428 UART: [fht] Storing FHT @ 0x50003400
4,328,110 UART: [idev] ++
4,328,679 UART: [idev] CDI.KEYID = 6
4,329,709 UART: [idev] SUBJECT.KEYID = 7
4,330,875 UART: [idev] UDS.KEYID = 0
4,331,899 ready_for_fw is high
4,332,140 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,562 UART: [idev] Erasing UDS.KEYID = 0
7,613,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,634,977 UART: [idev] --
7,637,839 UART: [ldev] ++
7,638,419 UART: [ldev] CDI.KEYID = 6
7,639,380 UART: [ldev] SUBJECT.KEYID = 5
7,640,583 UART: [ldev] AUTHORITY.KEYID = 7
7,642,440 UART: [ldev] FE.KEYID = 1
7,653,856 UART: [ldev] Erasing FE.KEYID = 1
10,943,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,587 UART: [ldev] --
13,303,618 UART: [fwproc] Waiting for Commands...
13,306,459 UART: [fwproc] Received command 0x46574c44
13,308,632 UART: [fwproc] Received Image of size 114124 bytes
17,358,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,107 >>> mbox cmd response: success
17,828,413 UART: [afmc] ++
17,829,004 UART: [afmc] CDI.KEYID = 6
17,829,896 UART: [afmc] SUBJECT.KEYID = 7
17,831,163 UART: [afmc] AUTHORITY.KEYID = 5
21,144,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,772 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,131 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,452 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,831 UART: [afmc] --
23,506,942 UART: [cold-reset] --
23,511,232 UART: [state] Locking Datavault
23,515,878 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,644 UART: [state] Locking ICCM
23,520,004 UART: [exit] Launching FMC @ 0x40000130
23,528,403 UART:
23,528,631 UART: Running Caliptra FMC ...
23,529,729 UART:
23,529,884 UART: [state] CFI Enabled
23,538,361 UART: [fht] FMC Alias Private Key: 7
25,869,043 UART: [art] Extend RT PCRs Done
25,870,275 UART: [art] Lock RT PCRs Done
25,871,990 UART: [art] Populate DV Done
25,877,776 UART: [fht] FMC Alias Private Key: 7
25,879,381 UART: [art] Derive CDI
25,880,115 UART: [art] Store in in slot 0x4
25,922,824 UART: [art] Derive Key Pair
25,923,850 UART: [art] Store priv key in slot 0x5
29,165,802 UART: [art] Derive Key Pair - Done
29,178,686 UART: [art] Signing Cert with AUTHO
29,179,983 UART: RITY.KEYID = 7
31,459,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,869 UART: [art] PUB.X = 519BF4564F9E660EEC65F184D6C77CD27A70CB21601B6BA0851477FB35BBF39692E15AF41FEB2FCCD12E9BCACBB2AE77
31,468,152 UART: [art] PUB.Y = F6E411ED295071905B763EE21B01F72DC366184D289D30511D74D01EEBC54870D717565FB310BFFDFBA7C60F4296832A
31,475,395 UART: [art] SIG.R = C20050DB2BC14D6E40308C518A38C40A527C77CD4D10644056581AA75F142516550395C6B1FF0F50991150918FF77935
31,482,734 UART: [art] SIG.S = 355ACE20F9A7470FA6D9DB1DA456BDB45FBA1137B828519ECEF8575CD5388FD1FCA0B56537BF5157B7843E49B5D16007
32,788,152 UART: Caliptra RT
32,788,875 UART: [state] CFI Enabled
32,906,422 UART: [rt] RT listening for mailbox commands...
32,908,331 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,938,283 UART: [rt]cmd =0x44504543, len=40
32,964,285 >>> mbox cmd response data (40 bytes)
32,965,566 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,995,671 UART: [rt]cmd =0x44504543, len=40
33,018,278 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,125,212 ready_for_fw is high
4,125,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,158 >>> mbox cmd response: success
23,708,771 UART:
23,709,164 UART: Running Caliptra FMC ...
23,710,290 UART:
23,710,447 UART: [state] CFI Enabled
23,718,335 UART: [fht] FMC Alias Private Key: 7
26,048,919 UART: [art] Extend RT PCRs Done
26,050,175 UART: [art] Lock RT PCRs Done
26,052,001 UART: [art] Populate DV Done
26,057,428 UART: [fht] FMC Alias Private Key: 7
26,059,022 UART: [art] Derive CDI
26,059,757 UART: [art] Store in in slot 0x4
26,102,394 UART: [art] Derive Key Pair
26,103,462 UART: [art] Store priv key in slot 0x5
29,345,777 UART: [art] Derive Key Pair - Done
29,358,979 UART: [art] Signing Cert with AUTHO
29,360,278 UART: RITY.KEYID = 7
31,639,721 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,224 UART: [art] PUB.X = DF42E2DCFBB1F2451D2376761E00EFA3D406677B381CB948D3D325331D514A00357B620AC9AD46BBCF9BE27B8E5ABB6A
31,648,458 UART: [art] PUB.Y = 12F61CF2A1051332D9CE3AD32AF0F7C11B9C6F2104E9AFABE44BEAA494E1819C5F4418D48FC37E4FA95943C349A9AC40
31,655,728 UART: [art] SIG.R = B4182CDA1C0CD1FB78203BD00CB7F2AAC90354ECFD3CB110EC5AB80A1601DD6F17FC78C53648D168D21EC3DC4CFAC68D
31,663,142 UART: [art] SIG.S = 01A34F446520DEF7DEC0746A60C4CA3879FAE13745557DD7EC2D3817C0023FC0C62F89CAF84155B60442F495D14B547D
32,968,960 UART: Caliptra RT
32,969,693 UART: [state] CFI Enabled
33,087,653 UART: [rt] RT listening for mailbox commands...
33,089,581 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,119,746 UART: [rt]cmd =0x44504543, len=40
33,145,701 >>> mbox cmd response data (40 bytes)
33,146,848 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,177,044 UART: [rt]cmd =0x44504543, len=40
33,199,535 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
191,980 UART:
192,347 UART: Running Caliptra ROM ...
193,532 UART:
193,688 UART: [state] CFI Enabled
263,065 UART: [state] LifecycleState = Unprovisioned
264,983 UART: [state] DebugLocked = No
267,862 UART: [state] WD Timer not started. Device not locked for debugging
270,893 UART: [kat] SHA2-256
450,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,611 UART: [kat] ++
462,158 UART: [kat] sha1
472,400 UART: [kat] SHA2-256
475,413 UART: [kat] SHA2-384
482,962 UART: [kat] SHA2-512-ACC
485,895 UART: [kat] ECC-384
2,947,332 UART: [kat] HMAC-384Kdf
2,971,241 UART: [kat] LMS
3,500,699 UART: [kat] --
3,505,641 UART: [cold-reset] ++
3,506,650 UART: [fht] FHT @ 0x50003400
3,518,055 UART: [idev] ++
3,518,617 UART: [idev] CDI.KEYID = 6
3,519,546 UART: [idev] SUBJECT.KEYID = 7
3,520,725 UART: [idev] UDS.KEYID = 0
3,521,648 ready_for_fw is high
3,521,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,823 UART: [idev] Erasing UDS.KEYID = 0
6,026,649 UART: [idev] Sha1 KeyId Algorithm
6,050,301 UART: [idev] --
6,053,514 UART: [ldev] ++
6,054,093 UART: [ldev] CDI.KEYID = 6
6,055,012 UART: [ldev] SUBJECT.KEYID = 5
6,056,178 UART: [ldev] AUTHORITY.KEYID = 7
6,057,410 UART: [ldev] FE.KEYID = 1
6,098,843 UART: [ldev] Erasing FE.KEYID = 1
8,602,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,336 UART: [ldev] --
10,413,145 UART: [fwproc] Wait for Commands...
10,414,720 UART: [fwproc] Recv command 0x46574c44
10,416,813 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,599 >>> mbox cmd response: success
14,286,376 UART: [afmc] ++
14,287,001 UART: [afmc] CDI.KEYID = 6
14,287,898 UART: [afmc] SUBJECT.KEYID = 7
14,289,062 UART: [afmc] AUTHORITY.KEYID = 5
16,826,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,399 UART: [afmc] --
18,624,788 UART: [cold-reset] --
18,627,839 UART: [state] Locking Datavault
18,633,081 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,727 UART: [state] Locking ICCM
18,636,768 UART: [exit] Launching FMC @ 0x40000130
18,645,215 UART:
18,645,448 UART: Running Caliptra FMC ...
18,646,545 UART:
18,646,704 UART: [state] CFI Enabled
18,708,474 UART: [fht] FMC Alias Private Key: 7
20,472,358 UART: [art] Extend RT PCRs Done
20,473,573 UART: [art] Lock RT PCRs Done
20,475,340 UART: [art] Populate DV Done
20,481,017 UART: [fht] FMC Alias Private Key: 7
20,482,662 UART: [art] Derive CDI
20,483,416 UART: [art] Store in in slot 0x4
20,541,268 UART: [art] Derive Key Pair
20,542,304 UART: [art] Store priv key in slot 0x5
23,005,128 UART: [art] Derive Key Pair - Done
23,018,183 UART: [art] Signing Cert with AUTHO
23,019,489 UART: RITY.KEYID = 7
24,731,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,105 UART: [art] PUB.X = B12A2ECCBB0057310DF1A580B6CD4ABDFB3A4AFEC0A3071013F46D58BDA1FB95F8B8A15F8807F463E9CBC4FF031BFB17
24,740,403 UART: [art] PUB.Y = 865514AC4DF39B2E97F658A4F9F92F9000B07D37DA747D903F14F26FAF6F687A17E177A07C8342245012520B198FDB32
24,747,627 UART: [art] SIG.R = 3B614369FABC8345BA0E998D64A6BF8AACC42C238D9E0903170837032F90CFBE304A4122CEE0CCBFF25D085FEBA21207
24,755,018 UART: [art] SIG.S = 7EF35BA1838B62C415FE64CC7005E9A92E9FDBA4B8FE5C99FDA73EA581AEE3105202C6966CE885A06FB90568A66A1FB5
25,734,288 UART: Caliptra RT
25,734,987 UART: [state] CFI Enabled
25,897,781 UART: [rt] RT listening for mailbox commands...
25,899,702 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,930,426 UART: [rt]cmd =0x44504543, len=40
25,972,411 >>> mbox cmd response data (40 bytes)
25,973,528 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,003,674 UART: [rt]cmd =0x44504543, len=40
26,025,929 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,378,454 ready_for_fw is high
3,378,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,174 >>> mbox cmd response: success
18,365,236 UART:
18,365,613 UART: Running Caliptra FMC ...
18,366,824 UART:
18,366,995 UART: [state] CFI Enabled
18,434,902 UART: [fht] FMC Alias Private Key: 7
20,199,098 UART: [art] Extend RT PCRs Done
20,200,331 UART: [art] Lock RT PCRs Done
20,201,813 UART: [art] Populate DV Done
20,207,544 UART: [fht] FMC Alias Private Key: 7
20,209,240 UART: [art] Derive CDI
20,209,981 UART: [art] Store in in slot 0x4
20,269,030 UART: [art] Derive Key Pair
20,270,072 UART: [art] Store priv key in slot 0x5
22,732,742 UART: [art] Derive Key Pair - Done
22,745,736 UART: [art] Signing Cert with AUTHO
22,747,043 UART: RITY.KEYID = 7
24,458,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,048 UART: [art] PUB.X = 0F9B645520106F9D543C9FD1E9216B1C8A806C4BC1B5C7A4FB742D47F62AF83CE8DBB26D7F4C30E411B111AC8443A927
24,467,383 UART: [art] PUB.Y = 276CC7AFF9376531A071DBF1BAF0139A7BDA40A856C5765BEB029314D8A8217E2A23F14388A3A22423FB3410A9C86E63
24,474,604 UART: [art] SIG.R = 9A648BDEF07EB165195FCF69F891E2E0C0BAFD793139DD877525709D15B01FD4F211F43484667732FE6528568FD2EA42
24,482,000 UART: [art] SIG.S = 2CA52A4AC9E4F1A3E7F447EA036F8FCD98F649DF6E27D85147E50936F92DEB5B57E83A8BF06F87EC48286E20842906E3
25,460,974 UART: Caliptra RT
25,461,675 UART: [state] CFI Enabled
25,626,314 UART: [rt] RT listening for mailbox commands...
25,628,232 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,658,910 UART: [rt]cmd =0x44504543, len=40
25,701,071 >>> mbox cmd response data (40 bytes)
25,702,177 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,732,367 UART: [rt]cmd =0x44504543, len=40
25,755,219 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,358 UART:
192,764 UART: Running Caliptra ROM ...
193,962 UART:
603,426 UART: [state] CFI Enabled
614,102 UART: [state] LifecycleState = Unprovisioned
615,901 UART: [state] DebugLocked = No
617,492 UART: [state] WD Timer not started. Device not locked for debugging
621,585 UART: [kat] SHA2-256
800,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,315 UART: [kat] ++
812,846 UART: [kat] sha1
823,290 UART: [kat] SHA2-256
826,294 UART: [kat] SHA2-384
832,769 UART: [kat] SHA2-512-ACC
835,767 UART: [kat] ECC-384
3,277,693 UART: [kat] HMAC-384Kdf
3,289,365 UART: [kat] LMS
3,818,896 UART: [kat] --
3,826,084 UART: [cold-reset] ++
3,827,797 UART: [fht] FHT @ 0x50003400
3,838,554 UART: [idev] ++
3,839,112 UART: [idev] CDI.KEYID = 6
3,840,061 UART: [idev] SUBJECT.KEYID = 7
3,841,226 UART: [idev] UDS.KEYID = 0
3,842,191 ready_for_fw is high
3,842,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,189 UART: [idev] Erasing UDS.KEYID = 0
6,314,428 UART: [idev] Sha1 KeyId Algorithm
6,336,958 UART: [idev] --
6,342,191 UART: [ldev] ++
6,342,752 UART: [ldev] CDI.KEYID = 6
6,343,708 UART: [ldev] SUBJECT.KEYID = 5
6,344,854 UART: [ldev] AUTHORITY.KEYID = 7
6,346,150 UART: [ldev] FE.KEYID = 1
6,356,411 UART: [ldev] Erasing FE.KEYID = 1
8,828,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,720 UART: [ldev] --
10,619,476 UART: [fwproc] Wait for Commands...
10,621,350 UART: [fwproc] Recv command 0x46574c44
10,623,436 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,351 >>> mbox cmd response: success
14,491,761 UART: [afmc] ++
14,492,378 UART: [afmc] CDI.KEYID = 6
14,493,262 UART: [afmc] SUBJECT.KEYID = 7
14,494,473 UART: [afmc] AUTHORITY.KEYID = 5
16,993,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,894 UART: [afmc] --
18,788,946 UART: [cold-reset] --
18,792,209 UART: [state] Locking Datavault
18,797,391 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,031 UART: [state] Locking ICCM
18,801,393 UART: [exit] Launching FMC @ 0x40000130
18,809,787 UART:
18,810,036 UART: Running Caliptra FMC ...
18,811,136 UART:
18,811,287 UART: [state] CFI Enabled
18,819,276 UART: [fht] FMC Alias Private Key: 7
20,575,258 UART: [art] Extend RT PCRs Done
20,576,465 UART: [art] Lock RT PCRs Done
20,577,975 UART: [art] Populate DV Done
20,583,435 UART: [fht] FMC Alias Private Key: 7
20,585,182 UART: [art] Derive CDI
20,585,988 UART: [art] Store in in slot 0x4
20,628,573 UART: [art] Derive Key Pair
20,629,610 UART: [art] Store priv key in slot 0x5
23,056,808 UART: [art] Derive Key Pair - Done
23,070,125 UART: [art] Signing Cert with AUTHO
23,071,432 UART: RITY.KEYID = 7
24,777,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,718 UART: [art] PUB.X = 91C7D0A2D8CBFDF11EF7A544998A0DED5F18F08624D053AA8AF80F258A14E6DB2AE2E954D5B21FD48A1DDB914A281320
24,786,002 UART: [art] PUB.Y = C600A7C353B59BE81714CF173623B7B8CF56AE34E3307DD32DDF22E0E6DAA1E48B92926B39178B280F69D7956312859B
24,793,223 UART: [art] SIG.R = DA4160046A95650E53F434FA4EDA40B4C5FCB8C3BEF0693393DE3B29D2DB71937C22720D73B7D52A5D573795677FAC03
24,800,593 UART: [art] SIG.S = 55D260BB65924C05DDD4D2C016C206A2D15293FB2C8D07FEDB0A9A50291778DE93F4D7D9AA76A04DB42B7DF7AC54F68E
25,779,436 UART: Caliptra RT
25,780,148 UART: [state] CFI Enabled
25,897,606 UART: [rt] RT listening for mailbox commands...
25,899,515 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,929,446 UART: [rt]cmd =0x44504543, len=40
25,955,359 >>> mbox cmd response data (40 bytes)
25,956,622 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,986,976 UART: [rt]cmd =0x44504543, len=40
26,009,585 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,696,062 ready_for_fw is high
3,696,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,184 >>> mbox cmd response: success
18,519,437 UART:
18,519,874 UART: Running Caliptra FMC ...
18,520,988 UART:
18,521,145 UART: [state] CFI Enabled
18,528,812 UART: [fht] FMC Alias Private Key: 7
20,285,420 UART: [art] Extend RT PCRs Done
20,286,636 UART: [art] Lock RT PCRs Done
20,288,310 UART: [art] Populate DV Done
20,293,662 UART: [fht] FMC Alias Private Key: 7
20,295,306 UART: [art] Derive CDI
20,296,112 UART: [art] Store in in slot 0x4
20,338,551 UART: [art] Derive Key Pair
20,339,593 UART: [art] Store priv key in slot 0x5
22,766,363 UART: [art] Derive Key Pair - Done
22,779,261 UART: [art] Signing Cert with AUTHO
22,780,588 UART: RITY.KEYID = 7
24,485,899 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,397 UART: [art] PUB.X = 6D65C39E39EA2AD236CD6B26E1A4E6B334B6C80F237B6C0597315ED562F2982DD5A6E9EE211F4B3979BF424BBB81789F
24,494,628 UART: [art] PUB.Y = AF17116332A9ABE234F5C08DFF23D6C931CB39DBE0F195C10D12A753ADF2B7D6BD6CEF58226210B003F52A78F19210C5
24,501,919 UART: [art] SIG.R = 98C53F0DC016B393CBFCABE0B982AE007893352E50F8CC85D7474EA7AEFE90B911E9BB931B45DBCEB47D1D6E62EB735E
24,509,350 UART: [art] SIG.S = 4EDB893CA582EB55B87A2B14AD7A051F94F4B1A9D9DC62EBE1D1F4CE696D4E38F13D4BE0B569AA2611E8274F13210E78
25,488,715 UART: Caliptra RT
25,489,414 UART: [state] CFI Enabled
25,606,956 UART: [rt] RT listening for mailbox commands...
25,608,913 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,639,116 UART: [rt]cmd =0x44504543, len=40
25,665,318 >>> mbox cmd response data (40 bytes)
25,666,657 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,696,815 UART: [rt]cmd =0x44504543, len=40
25,719,289 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,233 UART:
192,603 UART: Running Caliptra ROM ...
193,750 UART:
193,897 UART: [state] CFI Enabled
263,551 UART: [state] LifecycleState = Unprovisioned
265,985 UART: [state] DebugLocked = No
268,665 UART: [state] WD Timer not started. Device not locked for debugging
273,199 UART: [kat] SHA2-256
463,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,887 UART: [kat] ++
474,336 UART: [kat] sha1
486,204 UART: [kat] SHA2-256
489,213 UART: [kat] SHA2-384
496,404 UART: [kat] SHA2-512-ACC
498,979 UART: [kat] ECC-384
2,949,738 UART: [kat] HMAC-384Kdf
2,972,847 UART: [kat] LMS
3,504,596 UART: [kat] --
3,509,307 UART: [cold-reset] ++
3,511,657 UART: [fht] FHT @ 0x50003400
3,524,052 UART: [idev] ++
3,524,769 UART: [idev] CDI.KEYID = 6
3,525,685 UART: [idev] SUBJECT.KEYID = 7
3,526,856 UART: [idev] UDS.KEYID = 0
3,527,923 ready_for_fw is high
3,528,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,124 UART: [idev] Erasing UDS.KEYID = 0
6,026,974 UART: [idev] Sha1 KeyId Algorithm
6,050,247 UART: [idev] --
6,053,998 UART: [ldev] ++
6,054,684 UART: [ldev] CDI.KEYID = 6
6,055,600 UART: [ldev] SUBJECT.KEYID = 5
6,056,810 UART: [ldev] AUTHORITY.KEYID = 7
6,057,994 UART: [ldev] FE.KEYID = 1
6,100,892 UART: [ldev] Erasing FE.KEYID = 1
8,605,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,763 UART: [ldev] --
10,413,811 UART: [fwproc] Wait for Commands...
10,416,387 UART: [fwproc] Recv command 0x46574c44
10,418,638 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,448 >>> mbox cmd response: success
14,610,481 UART: [afmc] ++
14,611,202 UART: [afmc] CDI.KEYID = 6
14,612,394 UART: [afmc] SUBJECT.KEYID = 7
14,613,830 UART: [afmc] AUTHORITY.KEYID = 5
17,151,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,923 UART: [afmc] --
18,967,676 UART: [cold-reset] --
18,972,247 UART: [state] Locking Datavault
18,979,331 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,471 UART: [state] Locking ICCM
18,982,924 UART: [exit] Launching FMC @ 0x40000130
18,991,605 UART:
18,991,837 UART: Running Caliptra FMC ...
18,992,939 UART:
18,993,101 UART: [state] CFI Enabled
19,050,672 UART: [fht] FMC Alias Private Key: 7
20,814,304 UART: [art] Extend RT PCRs Done
20,815,510 UART: [art] Lock RT PCRs Done
20,817,295 UART: [art] Populate DV Done
20,822,668 UART: [fht] FMC Alias Private Key: 7
20,824,320 UART: [art] Derive CDI
20,825,131 UART: [art] Store in in slot 0x4
20,882,986 UART: [art] Derive Key Pair
20,884,016 UART: [art] Store priv key in slot 0x5
23,346,309 UART: [art] Derive Key Pair - Done
23,359,470 UART: [art] Signing Cert with AUTHO
23,360,776 UART: RITY.KEYID = 7
25,072,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,749 UART: [art] PUB.X = D9F0365A3370C2FF721FDD68687817F6715893119C48365B1352B6AFE0BB5799440E03FF1FE7F95A077CA7F895D18F86
25,081,044 UART: [art] PUB.Y = B26C7215AA33A3D174060D0A5878E8C558606C0BABCB75BE138321AFF1330EE4FF364570AB4EABD914138853499F571B
25,088,262 UART: [art] SIG.R = D249ADA008A994DBCCA496C555495A731306D732652323102F63EFE5D4041E57EBC43382733BE8A9DD6B2AFF5A58140A
25,095,668 UART: [art] SIG.S = 39DC2AF5B73CEDAC9540B1A467C03D99C3D451643E03E1F51E25B638B84050870A899CCF132A24065559DFBA60C345C3
26,074,929 UART: Caliptra RT
26,075,637 UART: [state] CFI Enabled
26,239,089 UART: [rt] RT listening for mailbox commands...
26,241,036 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,271,648 UART: [rt]cmd =0x44504543, len=40
26,313,714 >>> mbox cmd response data (40 bytes)
26,314,909 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,344,790 UART: [rt]cmd =0x44504543, len=40
26,367,343 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,418,991 ready_for_fw is high
3,419,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,912 >>> mbox cmd response: success
19,025,292 UART:
19,025,713 UART: Running Caliptra FMC ...
19,026,821 UART:
19,026,984 UART: [state] CFI Enabled
19,095,855 UART: [fht] FMC Alias Private Key: 7
20,860,169 UART: [art] Extend RT PCRs Done
20,861,397 UART: [art] Lock RT PCRs Done
20,863,262 UART: [art] Populate DV Done
20,868,622 UART: [fht] FMC Alias Private Key: 7
20,870,237 UART: [art] Derive CDI
20,870,975 UART: [art] Store in in slot 0x4
20,929,858 UART: [art] Derive Key Pair
20,930,856 UART: [art] Store priv key in slot 0x5
23,393,895 UART: [art] Derive Key Pair - Done
23,406,676 UART: [art] Signing Cert with AUTHO
23,407,978 UART: RITY.KEYID = 7
25,119,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,058 UART: [art] PUB.X = AFAD436A2C9AB08CFC594584D5D431D6ED82EFAEE1CD7DF7AE72293C3731B6FA45FF6A93EF5901124733C6D71C9F89B7
25,128,307 UART: [art] PUB.Y = 2ED4B15E0FBA705379A9CCE42C8EA5E47361B3C5A679652F10D88C646A56F614BC7BF711D64D40DF28665B04A37954C4
25,135,609 UART: [art] SIG.R = C960C0864BF0AEF66AA9F349DDF7006936A923DBB708261E80FC9162904FA43E9066B11FF134125DF21BEE6FD0C2DD6C
25,142,939 UART: [art] SIG.S = AFABC5CA3AC9A2D7EE4C12C3CE3AC1877EE06A0B7CD11FF104DAF2E1C2C827A74CF22E02AA68469B46D31DDF2D505542
26,121,827 UART: Caliptra RT
26,122,535 UART: [state] CFI Enabled
26,286,878 UART: [rt] RT listening for mailbox commands...
26,288,801 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,319,485 UART: [rt]cmd =0x44504543, len=40
26,361,660 >>> mbox cmd response data (40 bytes)
26,362,806 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,392,868 UART: [rt]cmd =0x44504543, len=40
26,415,200 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,489 UART:
192,859 UART: Running Caliptra ROM ...
194,066 UART:
603,607 UART: [state] CFI Enabled
617,341 UART: [state] LifecycleState = Unprovisioned
619,716 UART: [state] DebugLocked = No
621,383 UART: [state] WD Timer not started. Device not locked for debugging
626,421 UART: [kat] SHA2-256
816,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,095 UART: [kat] ++
827,694 UART: [kat] sha1
839,228 UART: [kat] SHA2-256
842,228 UART: [kat] SHA2-384
847,712 UART: [kat] SHA2-512-ACC
850,284 UART: [kat] ECC-384
3,291,355 UART: [kat] HMAC-384Kdf
3,303,097 UART: [kat] LMS
3,834,960 UART: [kat] --
3,840,162 UART: [cold-reset] ++
3,841,444 UART: [fht] FHT @ 0x50003400
3,853,619 UART: [idev] ++
3,854,247 UART: [idev] CDI.KEYID = 6
3,855,265 UART: [idev] SUBJECT.KEYID = 7
3,856,451 UART: [idev] UDS.KEYID = 0
3,857,382 ready_for_fw is high
3,857,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,287 UART: [idev] Erasing UDS.KEYID = 0
6,329,945 UART: [idev] Sha1 KeyId Algorithm
6,351,558 UART: [idev] --
6,356,998 UART: [ldev] ++
6,357,723 UART: [ldev] CDI.KEYID = 6
6,358,623 UART: [ldev] SUBJECT.KEYID = 5
6,359,827 UART: [ldev] AUTHORITY.KEYID = 7
6,360,995 UART: [ldev] FE.KEYID = 1
6,374,332 UART: [ldev] Erasing FE.KEYID = 1
8,851,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,175 UART: [ldev] --
10,642,826 UART: [fwproc] Wait for Commands...
10,645,351 UART: [fwproc] Recv command 0x46574c44
10,647,651 UART: [fwproc] Recv'd Img size: 114448 bytes
14,102,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,840,486 >>> mbox cmd response: success
14,844,050 UART: [afmc] ++
14,844,773 UART: [afmc] CDI.KEYID = 6
14,845,963 UART: [afmc] SUBJECT.KEYID = 7
14,847,445 UART: [afmc] AUTHORITY.KEYID = 5
17,355,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,300 UART: [afmc] --
19,152,461 UART: [cold-reset] --
19,156,328 UART: [state] Locking Datavault
19,161,686 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,824 UART: [state] Locking ICCM
19,166,679 UART: [exit] Launching FMC @ 0x40000130
19,175,359 UART:
19,175,592 UART: Running Caliptra FMC ...
19,176,688 UART:
19,176,846 UART: [state] CFI Enabled
19,184,668 UART: [fht] FMC Alias Private Key: 7
20,941,301 UART: [art] Extend RT PCRs Done
20,942,514 UART: [art] Lock RT PCRs Done
20,944,123 UART: [art] Populate DV Done
20,949,420 UART: [fht] FMC Alias Private Key: 7
20,950,956 UART: [art] Derive CDI
20,951,684 UART: [art] Store in in slot 0x4
20,994,654 UART: [art] Derive Key Pair
20,995,685 UART: [art] Store priv key in slot 0x5
23,422,384 UART: [art] Derive Key Pair - Done
23,435,222 UART: [art] Signing Cert with AUTHO
23,436,547 UART: RITY.KEYID = 7
25,142,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,967 UART: [art] PUB.X = BC5CC4A6A3E1C03136FA48B222641B5F83D81F01BD5D61B63A183E8FFA919C88B8FCAB6277E20005449EAE1CF577E401
25,151,192 UART: [art] PUB.Y = 60446EC7473E48E3A664123DDF732E2B7FB3C5168AFFB5DF243DA9ED07766DBF27C24A1653E356848E4020BE3B53777F
25,158,483 UART: [art] SIG.R = 504A5A09B35471C3119782B9C85234D57B5BE34E7E497E16FDEA9E6719338DE251D91F5DA7C5F11DB60710CD2440634F
25,165,857 UART: [art] SIG.S = 2DA65D071EFFD4EB9EE9F5810D4E89C019B4E9890D56A3DE25D5C6D7CF5D0F8F4A9BACB15D1C69057E3EB443D95405F6
26,144,557 UART: Caliptra RT
26,145,241 UART: [state] CFI Enabled
26,262,171 UART: [rt] RT listening for mailbox commands...
26,264,087 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,294,183 UART: [rt]cmd =0x44504543, len=40
26,320,741 >>> mbox cmd response data (40 bytes)
26,322,088 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,352,230 UART: [rt]cmd =0x44504543, len=40
26,374,743 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,754,705 ready_for_fw is high
3,755,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,847 >>> mbox cmd response: success
19,225,464 UART:
19,225,889 UART: Running Caliptra FMC ...
19,227,024 UART:
19,227,179 UART: [state] CFI Enabled
19,235,051 UART: [fht] FMC Alias Private Key: 7
20,992,457 UART: [art] Extend RT PCRs Done
20,993,677 UART: [art] Lock RT PCRs Done
20,995,117 UART: [art] Populate DV Done
21,000,628 UART: [fht] FMC Alias Private Key: 7
21,002,337 UART: [art] Derive CDI
21,003,076 UART: [art] Store in in slot 0x4
21,045,669 UART: [art] Derive Key Pair
21,046,666 UART: [art] Store priv key in slot 0x5
23,472,878 UART: [art] Derive Key Pair - Done
23,486,095 UART: [art] Signing Cert with AUTHO
23,487,387 UART: RITY.KEYID = 7
25,192,800 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,329 UART: [art] PUB.X = F746A401725E8D5C0BBFDE70740C5DD4AF4BC22A0BC335DEEA6933352B1FD09E20CD9083926E55FFD6E1BA74D0C4426C
25,201,614 UART: [art] PUB.Y = DF0DFAC8E5DF921D0855442FDF795F75FEA4DFE05453C102F26DBE853422F1D13E85F1AB0F1281CE4F4F3DE5C2A4CDD2
25,208,896 UART: [art] SIG.R = D2B7D93D1F8C6121CE2A408A6B3E99A7D091E0A222516A87EB7ADA7F00713EEC3237F8A777A43B5000C9A123723A7FEC
25,216,271 UART: [art] SIG.S = 4278838EA293AF3A6AC95E81DE6FA8D459BE0FBB3B9BA021778363018AF98D76611C5873B910E70A4CCD815D5969B614
26,194,947 UART: Caliptra RT
26,195,656 UART: [state] CFI Enabled
26,312,609 UART: [rt] RT listening for mailbox commands...
26,314,529 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,344,764 UART: [rt]cmd =0x44504543, len=40
26,370,683 >>> mbox cmd response data (40 bytes)
26,371,974 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,402,390 UART: [rt]cmd =0x44504543, len=40
26,424,792 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,484 UART: [kat] SHA2-512-ACC
897,385 UART: [kat] ECC-384
902,884 UART: [kat] HMAC-384Kdf
907,640 UART: [kat] LMS
1,475,836 UART: [kat] --
1,476,751 UART: [cold-reset] ++
1,477,159 UART: [fht] Storing FHT @ 0x50003400
1,479,904 UART: [idev] ++
1,480,072 UART: [idev] CDI.KEYID = 6
1,480,432 UART: [idev] SUBJECT.KEYID = 7
1,480,856 UART: [idev] UDS.KEYID = 0
1,481,201 ready_for_fw is high
1,481,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,194 UART: [idev] Erasing UDS.KEYID = 0
1,505,512 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,998 UART: [idev] --
1,515,105 UART: [ldev] ++
1,515,273 UART: [ldev] CDI.KEYID = 6
1,515,636 UART: [ldev] SUBJECT.KEYID = 5
1,516,062 UART: [ldev] AUTHORITY.KEYID = 7
1,516,525 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,547,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,390 UART: [ldev] --
1,586,759 UART: [fwproc] Waiting for Commands...
1,587,514 UART: [fwproc] Received command 0x46574c44
1,588,305 UART: [fwproc] Received Image of size 114448 bytes
2,887,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,045 >>> mbox cmd response: success
3,080,285 UART: [afmc] ++
3,080,453 UART: [afmc] CDI.KEYID = 6
3,080,815 UART: [afmc] SUBJECT.KEYID = 7
3,081,240 UART: [afmc] AUTHORITY.KEYID = 5
3,116,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,626 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,316 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,281 UART: [afmc] --
3,159,199 UART: [cold-reset] --
3,160,203 UART: [state] Locking Datavault
3,161,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,826 UART: [state] Locking ICCM
3,162,248 UART: [exit] Launching FMC @ 0x40000130
3,167,577 UART:
3,167,593 UART: Running Caliptra FMC ...
3,168,001 UART:
3,168,055 UART: [state] CFI Enabled
3,178,336 UART: [fht] FMC Alias Private Key: 7
3,286,391 UART: [art] Extend RT PCRs Done
3,286,819 UART: [art] Lock RT PCRs Done
3,288,417 UART: [art] Populate DV Done
3,296,838 UART: [fht] FMC Alias Private Key: 7
3,297,772 UART: [art] Derive CDI
3,298,052 UART: [art] Store in in slot 0x4
3,383,895 UART: [art] Derive Key Pair
3,384,255 UART: [art] Store priv key in slot 0x5
3,397,921 UART: [art] Derive Key Pair - Done
3,412,778 UART: [art] Signing Cert with AUTHO
3,413,258 UART: RITY.KEYID = 7
3,428,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,459 UART: [art] PUB.X = BB8F195E94A8A5986956C43F4EAB6571954CD6D253673220221DC2275140E22045CC1200C0D5D64274056B46C795C600
3,436,170 UART: [art] PUB.Y = F81DF19D76C0AB749FFB95B96A72351C4365AC97BFEAF7FB3AC44FBF720D6A80D9FBF3495541E958384FD2BE4E5FE9CD
3,443,141 UART: [art] SIG.R = 731E5891876A258BE9C8E26C508D19DB207B74844D6541D30679827C7798F0C181AFA1E2597607CBF4530751946A38C2
3,449,890 UART: [art] SIG.S = 23802F4D65E43370C17B9DE50B761FDD97B06E3185F540F2E94EC3D85A32403C4B9716B052C36312DF93E241B5E0CD76
3,473,902 UART: Caliptra RT
3,474,155 UART: [state] CFI Enabled
3,582,695 UART: [rt] RT listening for mailbox commands...
3,583,365 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,837 UART: [rt]cmd =0x44504543, len=40
3,640,035 >>> mbox cmd response data (40 bytes)
3,640,036 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,413 UART: [rt]cmd =0x44504543, len=40
3,692,225 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,511 ready_for_fw is high
1,362,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,523 >>> mbox cmd response: success
2,991,353 UART:
2,991,369 UART: Running Caliptra FMC ...
2,991,777 UART:
2,991,831 UART: [state] CFI Enabled
3,002,128 UART: [fht] FMC Alias Private Key: 7
3,110,223 UART: [art] Extend RT PCRs Done
3,110,651 UART: [art] Lock RT PCRs Done
3,112,257 UART: [art] Populate DV Done
3,120,536 UART: [fht] FMC Alias Private Key: 7
3,121,494 UART: [art] Derive CDI
3,121,774 UART: [art] Store in in slot 0x4
3,207,203 UART: [art] Derive Key Pair
3,207,563 UART: [art] Store priv key in slot 0x5
3,220,957 UART: [art] Derive Key Pair - Done
3,235,443 UART: [art] Signing Cert with AUTHO
3,235,923 UART: RITY.KEYID = 7
3,251,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,096 UART: [art] PUB.X = CBD34B03E7E8E882B967A59B312503BA73A5CC57B0480D527B7D551714DC75D2C381FA76CF73B5D13D5919B2862839D3
3,258,859 UART: [art] PUB.Y = 66B7CD9803C2C2316BC06819244470BACC1786F5DFDBC0418FE287A6167EFDEECD4F6C7A62422EC65F0F00EB395A33CD
3,265,797 UART: [art] SIG.R = 659D36707C789021CA4705FDF82CE9F04498C1134CC0D39A8CC5256B834EF626901925E7F5667688678562B889787799
3,272,548 UART: [art] SIG.S = 8A3AC1431CF4FCD5810E7EE155FFB7A2A300BBC6FE648539708DE4AC1BA22E2B648F33BD41539E3D57569289ED3566CC
3,296,034 UART: Caliptra RT
3,296,287 UART: [state] CFI Enabled
3,405,034 UART: [rt] RT listening for mailbox commands...
3,405,704 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,884 UART: [rt]cmd =0x44504543, len=40
3,462,072 >>> mbox cmd response data (40 bytes)
3,462,073 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,712 UART: [rt]cmd =0x44504543, len=40
3,514,632 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,752 UART: [kat] SHA2-256
881,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,798 UART: [kat] ++
885,950 UART: [kat] sha1
890,262 UART: [kat] SHA2-256
892,200 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,475,998 UART: [cold-reset] ++
1,476,540 UART: [fht] Storing FHT @ 0x50003400
1,479,333 UART: [idev] ++
1,479,501 UART: [idev] CDI.KEYID = 6
1,479,861 UART: [idev] SUBJECT.KEYID = 7
1,480,285 UART: [idev] UDS.KEYID = 0
1,480,630 ready_for_fw is high
1,480,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,285 UART: [idev] Erasing UDS.KEYID = 0
1,504,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,075 UART: [idev] --
1,514,286 UART: [ldev] ++
1,514,454 UART: [ldev] CDI.KEYID = 6
1,514,817 UART: [ldev] SUBJECT.KEYID = 5
1,515,243 UART: [ldev] AUTHORITY.KEYID = 7
1,515,706 UART: [ldev] FE.KEYID = 1
1,520,996 UART: [ldev] Erasing FE.KEYID = 1
1,546,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,117 UART: [ldev] --
1,585,510 UART: [fwproc] Waiting for Commands...
1,586,313 UART: [fwproc] Received command 0x46574c44
1,587,104 UART: [fwproc] Received Image of size 114448 bytes
2,886,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,762 >>> mbox cmd response: success
3,080,778 UART: [afmc] ++
3,080,946 UART: [afmc] CDI.KEYID = 6
3,081,308 UART: [afmc] SUBJECT.KEYID = 7
3,081,733 UART: [afmc] AUTHORITY.KEYID = 5
3,117,210 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,356 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,749 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,439 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,306 UART: [afmc] --
3,160,408 UART: [cold-reset] --
3,161,208 UART: [state] Locking Datavault
3,162,511 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,115 UART: [state] Locking ICCM
3,163,697 UART: [exit] Launching FMC @ 0x40000130
3,169,026 UART:
3,169,042 UART: Running Caliptra FMC ...
3,169,450 UART:
3,169,593 UART: [state] CFI Enabled
3,180,110 UART: [fht] FMC Alias Private Key: 7
3,288,195 UART: [art] Extend RT PCRs Done
3,288,623 UART: [art] Lock RT PCRs Done
3,290,387 UART: [art] Populate DV Done
3,298,654 UART: [fht] FMC Alias Private Key: 7
3,299,670 UART: [art] Derive CDI
3,299,950 UART: [art] Store in in slot 0x4
3,385,941 UART: [art] Derive Key Pair
3,386,301 UART: [art] Store priv key in slot 0x5
3,400,047 UART: [art] Derive Key Pair - Done
3,414,830 UART: [art] Signing Cert with AUTHO
3,415,310 UART: RITY.KEYID = 7
3,430,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,283 UART: [art] PUB.X = F1FA2D0E275F8B4DFBBB404FC08BDF1D88F94C4BCAC062DE648E88CB4610A7B755DEFA5E929C7459C2CE27CAD5EC3A6C
3,438,082 UART: [art] PUB.Y = 1E849E98AE6AC8A8174E6CA1D4C148EBAC4CC5BB50F680504858FED64AFC0FC85C0E1E1A6F1A568B2B0A9C0214771B5C
3,445,040 UART: [art] SIG.R = D886B88EDF1DA74B1069C1F44254B63A7AF9FB03EBB54FB36897A7501289765F6F4424195F5D45C615144D30B81AAAB0
3,451,811 UART: [art] SIG.S = 61DB54B9BC073C39CD8DE6A5F399CA1B1ABFBC312EA4C56F5215E204791B43DCEEF3F87F932FD38A8B000591EF955FBA
3,475,975 UART: Caliptra RT
3,476,320 UART: [state] CFI Enabled
3,584,875 UART: [rt] RT listening for mailbox commands...
3,585,545 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,673 UART: [rt]cmd =0x44504543, len=40
3,642,137 >>> mbox cmd response data (40 bytes)
3,642,138 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,991 UART: [rt]cmd =0x44504543, len=40
3,695,043 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,442 ready_for_fw is high
1,362,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,042 >>> mbox cmd response: success
2,991,884 UART:
2,991,900 UART: Running Caliptra FMC ...
2,992,308 UART:
2,992,451 UART: [state] CFI Enabled
3,003,188 UART: [fht] FMC Alias Private Key: 7
3,110,963 UART: [art] Extend RT PCRs Done
3,111,391 UART: [art] Lock RT PCRs Done
3,113,189 UART: [art] Populate DV Done
3,121,404 UART: [fht] FMC Alias Private Key: 7
3,122,576 UART: [art] Derive CDI
3,122,856 UART: [art] Store in in slot 0x4
3,208,527 UART: [art] Derive Key Pair
3,208,887 UART: [art] Store priv key in slot 0x5
3,222,049 UART: [art] Derive Key Pair - Done
3,236,888 UART: [art] Signing Cert with AUTHO
3,237,368 UART: RITY.KEYID = 7
3,252,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,285 UART: [art] PUB.X = 8445E46B288945B0E6396A4B119AF66BD7EF26695B033CB585D59FFF134EF054D08B9BD989406E96E3B686FC1DEDB568
3,260,058 UART: [art] PUB.Y = B1A4E19568A0D4D299AB463DEA9BCD08E39DC42459DF434EDFD961FFCE4A659FBCDF311FEC09A464CCBBB52A9B77CEC9
3,267,034 UART: [art] SIG.R = 54BBD0F8A37DDBF118B817B6C7F2B5628319A08B8EE58D7D079DF4F27B1BDF864473EE61DA3D1C0D326B6D61A4783234
3,273,810 UART: [art] SIG.S = 0FAB4FF74C097FCFE5791F3E4883213962DD8C4FB5FFB94C6EB181DC727BAB62E59A2B70E9126A96E6A95869C0C55325
3,297,537 UART: Caliptra RT
3,297,882 UART: [state] CFI Enabled
3,405,718 UART: [rt] RT listening for mailbox commands...
3,406,388 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,484 UART: [rt]cmd =0x44504543, len=40
3,462,532 >>> mbox cmd response data (40 bytes)
3,462,533 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,298 UART: [rt]cmd =0x44504543, len=40
3,515,300 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,692 UART: [state] LifecycleState = Unprovisioned
86,347 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,198 UART: [kat] SHA2-256
893,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,973 UART: [kat] ++
898,125 UART: [kat] sha1
902,329 UART: [kat] SHA2-256
904,269 UART: [kat] SHA2-384
907,068 UART: [kat] SHA2-512-ACC
908,969 UART: [kat] ECC-384
918,636 UART: [kat] HMAC-384Kdf
923,052 UART: [kat] LMS
1,171,380 UART: [kat] --
1,172,331 UART: [cold-reset] ++
1,172,841 UART: [fht] FHT @ 0x50003400
1,175,474 UART: [idev] ++
1,175,642 UART: [idev] CDI.KEYID = 6
1,176,002 UART: [idev] SUBJECT.KEYID = 7
1,176,426 UART: [idev] UDS.KEYID = 0
1,176,771 ready_for_fw is high
1,176,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,959 UART: [idev] Sha1 KeyId Algorithm
1,210,541 UART: [idev] --
1,211,527 UART: [ldev] ++
1,211,695 UART: [ldev] CDI.KEYID = 6
1,212,058 UART: [ldev] SUBJECT.KEYID = 5
1,212,484 UART: [ldev] AUTHORITY.KEYID = 7
1,212,947 UART: [ldev] FE.KEYID = 1
1,218,209 UART: [ldev] Erasing FE.KEYID = 1
1,244,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,385 UART: [ldev] --
1,283,698 UART: [fwproc] Wait for Commands...
1,284,468 UART: [fwproc] Recv command 0x46574c44
1,285,196 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,036 >>> mbox cmd response: success
2,778,068 UART: [afmc] ++
2,778,236 UART: [afmc] CDI.KEYID = 6
2,778,598 UART: [afmc] SUBJECT.KEYID = 7
2,779,023 UART: [afmc] AUTHORITY.KEYID = 5
2,814,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,157 UART: [afmc] --
2,858,167 UART: [cold-reset] --
2,859,061 UART: [state] Locking Datavault
2,860,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,918 UART: [state] Locking ICCM
2,861,494 UART: [exit] Launching FMC @ 0x40000130
2,866,823 UART:
2,866,839 UART: Running Caliptra FMC ...
2,867,247 UART:
2,867,301 UART: [state] CFI Enabled
2,877,818 UART: [fht] FMC Alias Private Key: 7
2,985,819 UART: [art] Extend RT PCRs Done
2,986,247 UART: [art] Lock RT PCRs Done
2,987,857 UART: [art] Populate DV Done
2,996,156 UART: [fht] FMC Alias Private Key: 7
2,997,170 UART: [art] Derive CDI
2,997,450 UART: [art] Store in in slot 0x4
3,083,183 UART: [art] Derive Key Pair
3,083,543 UART: [art] Store priv key in slot 0x5
3,096,527 UART: [art] Derive Key Pair - Done
3,111,140 UART: [art] Signing Cert with AUTHO
3,111,620 UART: RITY.KEYID = 7
3,126,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,521 UART: [art] PUB.X = A1217A837A2D04A4A95B250B14E25DEBEF7DE218FFE5CC70226CCA7D4923EB128236940E2FEE1C5740DB3D2B6FAAA92C
3,134,302 UART: [art] PUB.Y = BF89E5823A038943EDA4E67365C27FC30D341F339D2A7D5DD56C11073C910F09C7CFA634365D89F8BCD39E5EC4445FED
3,141,247 UART: [art] SIG.R = 1985279E686A5E238CB3CC40D19F25F307893FFE45EDC22FA6B16572A355535C27C3F02955BC1CBABD8D2AE595F1E27E
3,148,024 UART: [art] SIG.S = BB581465833FC3025E6CDACD8C70AD3B800DEFE28FE9415BD85C94F786B9AE4ED0AF9CDCE596D767992B349E45B26C6E
3,171,499 UART: Caliptra RT
3,171,752 UART: [state] CFI Enabled
3,279,023 UART: [rt] RT listening for mailbox commands...
3,279,693 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,721 UART: [rt]cmd =0x44504543, len=40
3,335,643 >>> mbox cmd response data (40 bytes)
3,335,644 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,203 UART: [rt]cmd =0x44504543, len=40
3,388,503 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,223 ready_for_fw is high
1,059,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,121 >>> mbox cmd response: success
2,689,025 UART:
2,689,041 UART: Running Caliptra FMC ...
2,689,449 UART:
2,689,503 UART: [state] CFI Enabled
2,699,892 UART: [fht] FMC Alias Private Key: 7
2,808,233 UART: [art] Extend RT PCRs Done
2,808,661 UART: [art] Lock RT PCRs Done
2,810,407 UART: [art] Populate DV Done
2,818,680 UART: [fht] FMC Alias Private Key: 7
2,819,782 UART: [art] Derive CDI
2,820,062 UART: [art] Store in in slot 0x4
2,905,645 UART: [art] Derive Key Pair
2,906,005 UART: [art] Store priv key in slot 0x5
2,919,271 UART: [art] Derive Key Pair - Done
2,933,879 UART: [art] Signing Cert with AUTHO
2,934,359 UART: RITY.KEYID = 7
2,949,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,302 UART: [art] PUB.X = 9BF9196E828993BE4A9447DE189B489E6FB0F70B12C61354B4D6010A455EEDE6662E01B4F355E8A8F7FAD2BA8A7F2774
2,957,068 UART: [art] PUB.Y = C8EA4798B14E4E88AF087CE21DE686FDF1A6AA7CEF618C01FF5B607ABFD2E8630F41ADB228220741E08BECB064709E17
2,964,024 UART: [art] SIG.R = 9DBD1432977E3C909F4A79923CC20C0FAEFF19FB4B6A9372E04A58DB05A50CC7FE4D5E88C2FC77385816867F4A0D6AE4
2,970,793 UART: [art] SIG.S = 676891A657C69CB2E8E9EF4671DF151DD1C540ABDE2D50FDCCA96879E72E6D418591B923CB879C841B6B15C357B78304
2,994,551 UART: Caliptra RT
2,994,804 UART: [state] CFI Enabled
3,102,953 UART: [rt] RT listening for mailbox commands...
3,103,623 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,501 UART: [rt]cmd =0x44504543, len=40
3,159,199 >>> mbox cmd response data (40 bytes)
3,159,200 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,663 UART: [rt]cmd =0x44504543, len=40
3,211,383 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,390 UART: [kat] SHA2-256
904,330 UART: [kat] SHA2-384
907,085 UART: [kat] SHA2-512-ACC
908,986 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,318 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,329 UART: [idev] ++
1,175,497 UART: [idev] CDI.KEYID = 6
1,175,857 UART: [idev] SUBJECT.KEYID = 7
1,176,281 UART: [idev] UDS.KEYID = 0
1,176,626 ready_for_fw is high
1,176,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,485 UART: [idev] Erasing UDS.KEYID = 0
1,201,652 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] --
1,211,156 UART: [ldev] ++
1,211,324 UART: [ldev] CDI.KEYID = 6
1,211,687 UART: [ldev] SUBJECT.KEYID = 5
1,212,113 UART: [ldev] AUTHORITY.KEYID = 7
1,212,576 UART: [ldev] FE.KEYID = 1
1,217,768 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,599 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46574c44
1,284,925 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,271 >>> mbox cmd response: success
2,776,311 UART: [afmc] ++
2,776,479 UART: [afmc] CDI.KEYID = 6
2,776,841 UART: [afmc] SUBJECT.KEYID = 7
2,777,266 UART: [afmc] AUTHORITY.KEYID = 5
2,813,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,152 UART: [afmc] --
2,857,220 UART: [cold-reset] --
2,858,168 UART: [state] Locking Datavault
2,859,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,777 UART: [state] Locking ICCM
2,860,285 UART: [exit] Launching FMC @ 0x40000130
2,865,614 UART:
2,865,630 UART: Running Caliptra FMC ...
2,866,038 UART:
2,866,181 UART: [state] CFI Enabled
2,876,982 UART: [fht] FMC Alias Private Key: 7
2,984,917 UART: [art] Extend RT PCRs Done
2,985,345 UART: [art] Lock RT PCRs Done
2,986,979 UART: [art] Populate DV Done
2,995,138 UART: [fht] FMC Alias Private Key: 7
2,996,250 UART: [art] Derive CDI
2,996,530 UART: [art] Store in in slot 0x4
3,082,569 UART: [art] Derive Key Pair
3,082,929 UART: [art] Store priv key in slot 0x5
3,096,257 UART: [art] Derive Key Pair - Done
3,111,142 UART: [art] Signing Cert with AUTHO
3,111,622 UART: RITY.KEYID = 7
3,126,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,599 UART: [art] PUB.X = E83FCD6629F50FA4268AFBCB71D39EF0C90844C81B648827BC3593DA37D57316518098709256A888EFF35300A7715235
3,134,335 UART: [art] PUB.Y = F300371231ED3CC297D66C84E43A90F0D1741080C752187A5103357151578376F7E0DA25FCC70E7E9408321AA3CD3971
3,141,244 UART: [art] SIG.R = 4303304B2462467B34E866D264DE8B46421499E6B01FBCEA114A1AE13F8CC1A8EC4A40CCA2D4D2591AF1B76AC3D8369A
3,148,021 UART: [art] SIG.S = D17D95D4905C7D2533D7C41822CCBC5657179816EC995A741AF7C32268ACF654C6BBC36EA48FA4573928332AD831AC18
3,172,066 UART: Caliptra RT
3,172,411 UART: [state] CFI Enabled
3,279,504 UART: [rt] RT listening for mailbox commands...
3,280,174 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,226 UART: [rt]cmd =0x44504543, len=40
3,335,896 >>> mbox cmd response data (40 bytes)
3,335,897 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,614 UART: [rt]cmd =0x44504543, len=40
3,388,472 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,012 ready_for_fw is high
1,060,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,308 >>> mbox cmd response: success
2,689,836 UART:
2,689,852 UART: Running Caliptra FMC ...
2,690,260 UART:
2,690,403 UART: [state] CFI Enabled
2,701,158 UART: [fht] FMC Alias Private Key: 7
2,810,095 UART: [art] Extend RT PCRs Done
2,810,523 UART: [art] Lock RT PCRs Done
2,811,935 UART: [art] Populate DV Done
2,820,278 UART: [fht] FMC Alias Private Key: 7
2,821,396 UART: [art] Derive CDI
2,821,676 UART: [art] Store in in slot 0x4
2,907,289 UART: [art] Derive Key Pair
2,907,649 UART: [art] Store priv key in slot 0x5
2,920,945 UART: [art] Derive Key Pair - Done
2,936,151 UART: [art] Signing Cert with AUTHO
2,936,631 UART: RITY.KEYID = 7
2,951,915 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,680 UART: [art] PUB.X = D5823F61ED2C40196BB73687F7A30CF0F5DDCD8F626309FFBF5382495D7A94C2C495616075E6613E476805D69A425A8B
2,959,441 UART: [art] PUB.Y = 95653B5DC27C88CA85FEEE06968F34AAD95E9B5448405433B8449D3721ACCBDD144C259F9B6E238F127CBA11657E226D
2,966,394 UART: [art] SIG.R = BD4B271A808E045AB28690BE6A5E788D5B2E8AA438DD7AFDC61F47F920612F6777293913A30F3EB99E6CA7CA01B53B63
2,973,165 UART: [art] SIG.S = 6E1CFC7557D95BE75EEE6F35D0DDD7A538AB3058E0B8613C5C7DDBB84F1706E05042E62BC97321A5B2A3F3C539EE7D4A
2,996,423 UART: Caliptra RT
2,996,768 UART: [state] CFI Enabled
3,104,409 UART: [rt] RT listening for mailbox commands...
3,105,079 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,193 UART: [rt]cmd =0x44504543, len=40
3,161,723 >>> mbox cmd response data (40 bytes)
3,161,724 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,535 UART: [rt]cmd =0x44504543, len=40
3,214,685 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 ready_for_fw is high
1,174,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,022 UART: [ldev] Erasing FE.KEYID = 1
1,240,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,784 UART: [ldev] --
1,280,298 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,098 >>> mbox cmd response: success
2,775,139 UART: [afmc] ++
2,775,307 UART: [afmc] CDI.KEYID = 6
2,775,670 UART: [afmc] SUBJECT.KEYID = 7
2,776,096 UART: [afmc] AUTHORITY.KEYID = 5
2,812,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,564 UART: [afmc] --
2,855,632 UART: [cold-reset] --
2,856,256 UART: [state] Locking Datavault
2,857,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,091 UART: [state] Locking ICCM
2,858,719 UART: [exit] Launching FMC @ 0x40000130
2,864,048 UART:
2,864,064 UART: Running Caliptra FMC ...
2,864,472 UART:
2,864,526 UART: [state] CFI Enabled
2,875,341 UART: [fht] FMC Alias Private Key: 7
2,984,056 UART: [art] Extend RT PCRs Done
2,984,484 UART: [art] Lock RT PCRs Done
2,986,320 UART: [art] Populate DV Done
2,994,325 UART: [fht] FMC Alias Private Key: 7
2,995,459 UART: [art] Derive CDI
2,995,739 UART: [art] Store in in slot 0x4
3,081,236 UART: [art] Derive Key Pair
3,081,596 UART: [art] Store priv key in slot 0x5
3,094,704 UART: [art] Derive Key Pair - Done
3,109,333 UART: [art] Signing Cert with AUTHO
3,109,813 UART: RITY.KEYID = 7
3,125,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,898 UART: [art] PUB.X = C028FC74432F95B1207F34CD934FF0AB550AAE81CD19BCFDAC4927EA84C8918371A8C73509066E12CEF61189134B605A
3,132,665 UART: [art] PUB.Y = DFA929B39A5FDCC28B2AEC9AC8B6ED8B1103DBD17E24090E3703BC84EE5F38C44761864F7953C2160BD46A602A50E12B
3,139,614 UART: [art] SIG.R = 1A988F7A51855C27FB9B8F29B3EB3059E9DB9239A0E9214DBDB375AD8B5F67BCA38CC4F37FF2821156940F22CF3E14B2
3,146,393 UART: [art] SIG.S = 70FD2FAB0933C8EAF8555C06D1FD72B94EE2ADBB1A9A3C274D88923FB1CF8F9424474A3432FA6C83B9813E25D4F6E3E7
3,170,000 UART: Caliptra RT
3,170,253 UART: [state] CFI Enabled
3,278,654 UART: [rt] RT listening for mailbox commands...
3,279,324 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,276 UART: [rt]cmd =0x44504543, len=40
3,335,294 >>> mbox cmd response data (40 bytes)
3,335,295 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,776 UART: [rt]cmd =0x44504543, len=40
3,387,722 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,830 >>> mbox cmd response: success
2,685,928 UART:
2,685,944 UART: Running Caliptra FMC ...
2,686,352 UART:
2,686,406 UART: [state] CFI Enabled
2,696,945 UART: [fht] FMC Alias Private Key: 7
2,804,580 UART: [art] Extend RT PCRs Done
2,805,008 UART: [art] Lock RT PCRs Done
2,806,518 UART: [art] Populate DV Done
2,814,913 UART: [fht] FMC Alias Private Key: 7
2,815,951 UART: [art] Derive CDI
2,816,231 UART: [art] Store in in slot 0x4
2,901,908 UART: [art] Derive Key Pair
2,902,268 UART: [art] Store priv key in slot 0x5
2,915,814 UART: [art] Derive Key Pair - Done
2,930,351 UART: [art] Signing Cert with AUTHO
2,930,831 UART: RITY.KEYID = 7
2,945,837 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,602 UART: [art] PUB.X = 0A78AFE22AE1E478D9ADA5DA62376748A6834975A0DFF0CB31E0F2E089E2E051D19DC82549BB7C861AF0794E32C13D76
2,953,379 UART: [art] PUB.Y = EE708652F480DAB9A88F595245BB106548C342DC106C8718F79A965F2B1E23C2C3B743B3F9D03FA299A26D146D73D3F0
2,960,331 UART: [art] SIG.R = 8F6DA13A3EA3C3DCB131414516BE2F964A4855D14D94AD4C13B04271198D40D6096489E937EB1AA42F916CD99EEBA53D
2,967,106 UART: [art] SIG.S = A493A9909B4E9AA050AFB5DC949252496E50B00FF3BBBE4612DD16B2F5F01D505B6C209B83C4E3EDBA4EB25E93E0B565
2,991,168 UART: Caliptra RT
2,991,421 UART: [state] CFI Enabled
3,099,903 UART: [rt] RT listening for mailbox commands...
3,100,573 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,839 UART: [rt]cmd =0x44504543, len=40
3,156,721 >>> mbox cmd response data (40 bytes)
3,156,722 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,231 UART: [rt]cmd =0x44504543, len=40
3,209,281 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 ready_for_fw is high
1,174,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,196 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,633 UART: [ldev] Erasing FE.KEYID = 1
1,241,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,535 >>> mbox cmd response: success
2,773,568 UART: [afmc] ++
2,773,736 UART: [afmc] CDI.KEYID = 6
2,774,099 UART: [afmc] SUBJECT.KEYID = 7
2,774,525 UART: [afmc] AUTHORITY.KEYID = 5
2,810,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,759 UART: [afmc] --
2,853,647 UART: [cold-reset] --
2,854,529 UART: [state] Locking Datavault
2,855,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,478 UART: [state] Locking ICCM
2,857,054 UART: [exit] Launching FMC @ 0x40000130
2,862,383 UART:
2,862,399 UART: Running Caliptra FMC ...
2,862,807 UART:
2,862,950 UART: [state] CFI Enabled
2,873,373 UART: [fht] FMC Alias Private Key: 7
2,982,228 UART: [art] Extend RT PCRs Done
2,982,656 UART: [art] Lock RT PCRs Done
2,984,214 UART: [art] Populate DV Done
2,992,203 UART: [fht] FMC Alias Private Key: 7
2,993,183 UART: [art] Derive CDI
2,993,463 UART: [art] Store in in slot 0x4
3,079,148 UART: [art] Derive Key Pair
3,079,508 UART: [art] Store priv key in slot 0x5
3,092,990 UART: [art] Derive Key Pair - Done
3,107,706 UART: [art] Signing Cert with AUTHO
3,108,186 UART: RITY.KEYID = 7
3,123,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,199 UART: [art] PUB.X = 1630663BB2EC4B6698CC71ABAB23B40E060F75792E384460719E98619E414A08395FF968EDC71F011BC9A32967CFA606
3,130,949 UART: [art] PUB.Y = 5DF86B230F65075D68513CF65EB2DCDFC6DD9A0F13E8BD875E0A0E56D1C445B96981CF9EC38BA08A66E1ABE01461ED66
3,137,902 UART: [art] SIG.R = 057A30028D34C3B57AD31460FEDF8808A8203E965A4380BD9FDE17FB230A603CECBC03951B74423C9BF1E27FB28EBECE
3,144,671 UART: [art] SIG.S = 8F892FC773BC35410E4BD3AB74879AFF4E10F88551DFF5C97DD8835AD770A80E26B6D1F0E0AF476510726E717E4BAB92
3,168,664 UART: Caliptra RT
3,169,009 UART: [state] CFI Enabled
3,277,022 UART: [rt] RT listening for mailbox commands...
3,277,692 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,034 UART: [rt]cmd =0x44504543, len=40
3,334,310 >>> mbox cmd response data (40 bytes)
3,334,311 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,902 UART: [rt]cmd =0x44504543, len=40
3,386,540 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,729 ready_for_fw is high
1,056,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,571 >>> mbox cmd response: success
2,687,081 UART:
2,687,097 UART: Running Caliptra FMC ...
2,687,505 UART:
2,687,648 UART: [state] CFI Enabled
2,698,429 UART: [fht] FMC Alias Private Key: 7
2,806,670 UART: [art] Extend RT PCRs Done
2,807,098 UART: [art] Lock RT PCRs Done
2,808,724 UART: [art] Populate DV Done
2,816,989 UART: [fht] FMC Alias Private Key: 7
2,817,995 UART: [art] Derive CDI
2,818,275 UART: [art] Store in in slot 0x4
2,904,284 UART: [art] Derive Key Pair
2,904,644 UART: [art] Store priv key in slot 0x5
2,917,752 UART: [art] Derive Key Pair - Done
2,932,441 UART: [art] Signing Cert with AUTHO
2,932,921 UART: RITY.KEYID = 7
2,948,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,982 UART: [art] PUB.X = 6928F1600ED1A5407792449D7DC583A90DF17335955147541BD82F39A705C91A148BF370C8734BF945286BBBD6A556D8
2,955,735 UART: [art] PUB.Y = F3E08BD1FD80979254F5B1FFD4F7268277FC56149637953720FEE95F9596AA03193ADFF5EE29349CB5664C979263403B
2,962,680 UART: [art] SIG.R = D47F4EC22587948DD989619794E2D1E95B73F601B765B5092DA36CAE68D16BD7EF88B27C18C5B0E08560176A46D8D767
2,969,444 UART: [art] SIG.S = 6F57061523640C981E16C1C2E1236F10DD998C6DF83A30FE8DB71FFD7F8F48F2FC0FE9D6585A1766FB09A12176A41DF4
2,993,033 UART: Caliptra RT
2,993,378 UART: [state] CFI Enabled
3,102,183 UART: [rt] RT listening for mailbox commands...
3,102,853 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,117 UART: [rt]cmd =0x44504543, len=40
3,159,317 >>> mbox cmd response data (40 bytes)
3,159,318 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,865 UART: [rt]cmd =0x44504543, len=40
3,211,603 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,005 UART:
192,370 UART: Running Caliptra ROM ...
193,575 UART:
193,728 UART: [state] CFI Enabled
266,314 UART: [state] LifecycleState = Unprovisioned
268,297 UART: [state] DebugLocked = No
270,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,196 UART: [kat] SHA2-256
444,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,399 UART: [kat] ++
455,855 UART: [kat] sha1
467,677 UART: [kat] SHA2-256
470,400 UART: [kat] SHA2-384
475,887 UART: [kat] SHA2-512-ACC
478,252 UART: [kat] ECC-384
2,768,810 UART: [kat] HMAC-384Kdf
2,799,728 UART: [kat] LMS
3,990,091 UART: [kat] --
3,994,942 UART: [cold-reset] ++
3,997,019 UART: [fht] Storing FHT @ 0x50003400
4,007,597 UART: [idev] ++
4,008,166 UART: [idev] CDI.KEYID = 6
4,009,102 UART: [idev] SUBJECT.KEYID = 7
4,010,352 UART: [idev] UDS.KEYID = 0
4,011,399 ready_for_fw is high
4,011,610 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,223 UART: [idev] Erasing UDS.KEYID = 0
7,345,664 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,764 UART: [idev] --
7,369,995 UART: [ldev] ++
7,370,559 UART: [ldev] CDI.KEYID = 6
7,371,527 UART: [ldev] SUBJECT.KEYID = 5
7,372,734 UART: [ldev] AUTHORITY.KEYID = 7
7,373,960 UART: [ldev] FE.KEYID = 1
7,421,441 UART: [ldev] Erasing FE.KEYID = 1
10,754,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,123 UART: [ldev] --
13,114,176 UART: [fwproc] Waiting for Commands...
13,116,916 UART: [fwproc] Received command 0x46574c44
13,119,105 UART: [fwproc] Received Image of size 114124 bytes
17,170,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,245 >>> mbox cmd response: success
17,633,876 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,638,182 UART: [afmc] ++
17,638,774 UART: [afmc] CDI.KEYID = 6
17,639,801 UART: [afmc] SUBJECT.KEYID = 7
17,640,983 UART: [afmc] AUTHORITY.KEYID = 5
21,006,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,833 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,268 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,081 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,536 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,252 UART: [afmc] --
23,377,722 UART: [cold-reset] --
23,382,288 UART: [state] Locking Datavault
23,388,129 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,826 UART: [state] Locking ICCM
23,391,332 UART: [exit] Launching FMC @ 0x40000130
23,399,726 UART:
23,399,963 UART: Running Caliptra FMC ...
23,401,064 UART:
23,401,247 UART: [state] CFI Enabled
23,465,840 UART: [fht] FMC Alias Private Key: 7
25,804,216 UART: [art] Extend RT PCRs Done
25,805,438 UART: [art] Lock RT PCRs Done
25,806,901 UART: [art] Populate DV Done
25,812,554 UART: [fht] FMC Alias Private Key: 7
25,814,147 UART: [art] Derive CDI
25,814,883 UART: [art] Store in in slot 0x4
25,875,619 UART: [art] Derive Key Pair
25,876,610 UART: [art] Store priv key in slot 0x5
29,169,170 UART: [art] Derive Key Pair - Done
29,182,054 UART: [art] Signing Cert with AUTHO
29,183,368 UART: RITY.KEYID = 7
31,471,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,755 UART: [art] PUB.X = C670D735699CEE20D7982C03CCDBD3E246EDC7C38BF823976DFDB79D02C74A5CE4AFA8129661A1C1CF8BABD46EEB2B10
31,480,004 UART: [art] PUB.Y = 044AC79419000D2DDCA021736058372CB167D9206AB8C9C08467CFC1CAF0F536FFE0D4E152AC3B3F16B7D9F094956670
31,487,307 UART: [art] SIG.R = 42AED3C2310CA9BF47DB69829D8B1DA6415BB63F190428C3B63C5913764DD092EA72D5067E6E5D85B2930A8B2BF11AB0
31,494,667 UART: [art] SIG.S = FFCDBB559E303709F70C28D5BDB511D4314E84D79A8658543696EC3B012B11CC8151B8B6D787E6E4769CD6496FC225F8
32,800,256 UART: Caliptra RT
32,800,971 UART: [state] CFI Enabled
32,962,286 UART: [rt] RT listening for mailbox commands...
32,994,668 UART: [rt]cmd =0x44504543, len=136
38,618,771 >>> mbox cmd response data (136 bytes)
38,620,113 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,650,770 UART: [rt]cmd =0x44504543, len=92
44,412,281 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,804,791 ready_for_fw is high
3,805,218 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,593 >>> mbox cmd response: success
17,879,492 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,560,324 UART:
23,560,768 UART: Running Caliptra FMC ...
23,561,898 UART:
23,562,078 UART: [state] CFI Enabled
23,612,736 UART: [fht] FMC Alias Private Key: 7
25,950,555 UART: [art] Extend RT PCRs Done
25,951,786 UART: [art] Lock RT PCRs Done
25,953,763 UART: [art] Populate DV Done
25,959,241 UART: [fht] FMC Alias Private Key: 7
25,960,730 UART: [art] Derive CDI
25,961,496 UART: [art] Store in in slot 0x4
26,020,739 UART: [art] Derive Key Pair
26,021,777 UART: [art] Store priv key in slot 0x5
29,315,119 UART: [art] Derive Key Pair - Done
29,328,241 UART: [art] Signing Cert with AUTHO
29,329,553 UART: RITY.KEYID = 7
31,616,193 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,698 UART: [art] PUB.X = 4EE4AAE67C7D42B6F57B78702EB2EDF8D8A2F5AFD60DFE20847854006C8B05F3699729346C6203399BA091418C22AAC8
31,624,893 UART: [art] PUB.Y = 3C279FBD005DB669DD5A08996DD7BC8BAF45929A266E0A0C783192A97480BA748E10A618C9D34C0890E862EA27DCCBEA
31,632,143 UART: [art] SIG.R = F7B62947C4CDCC51C0AB27BB033891D1E241BB3F3BC31C1D506B57C426075054087410F196B41088865159F5F049005A
31,639,489 UART: [art] SIG.S = BD56D664F8905A1162930841F714CAD93BD65FCC49AF0B9AF31EF6660AABCACA981BFB367A58AA227231822BF0A2C142
32,944,581 UART: Caliptra RT
32,945,297 UART: [state] CFI Enabled
33,105,984 UART: [rt] RT listening for mailbox commands...
33,138,150 UART: [rt]cmd =0x44504543, len=136
38,760,728 >>> mbox cmd response data (136 bytes)
38,762,167 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,792,829 UART: [rt]cmd =0x44504543, len=92
44,555,601 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,403 UART:
192,784 UART: Running Caliptra ROM ...
193,970 UART:
603,702 UART: [state] CFI Enabled
618,427 UART: [state] LifecycleState = Unprovisioned
620,364 UART: [state] DebugLocked = No
623,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,163 UART: [kat] SHA2-256
797,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,478 UART: [kat] ++
808,974 UART: [kat] sha1
820,015 UART: [kat] SHA2-256
822,776 UART: [kat] SHA2-384
829,052 UART: [kat] SHA2-512-ACC
831,428 UART: [kat] ECC-384
3,116,904 UART: [kat] HMAC-384Kdf
3,128,989 UART: [kat] LMS
4,319,120 UART: [kat] --
4,324,560 UART: [cold-reset] ++
4,326,916 UART: [fht] Storing FHT @ 0x50003400
4,337,493 UART: [idev] ++
4,338,098 UART: [idev] CDI.KEYID = 6
4,339,014 UART: [idev] SUBJECT.KEYID = 7
4,340,056 UART: [idev] UDS.KEYID = 0
4,341,193 ready_for_fw is high
4,341,396 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,551 UART: [idev] Erasing UDS.KEYID = 0
7,629,832 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,946 UART: [idev] --
7,656,643 UART: [ldev] ++
7,657,205 UART: [ldev] CDI.KEYID = 6
7,658,168 UART: [ldev] SUBJECT.KEYID = 5
7,659,368 UART: [ldev] AUTHORITY.KEYID = 7
7,660,648 UART: [ldev] FE.KEYID = 1
7,673,230 UART: [ldev] Erasing FE.KEYID = 1
10,966,686 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,322,061 UART: [ldev] --
13,327,323 UART: [fwproc] Waiting for Commands...
13,330,299 UART: [fwproc] Received command 0x46574c44
13,332,476 UART: [fwproc] Received Image of size 114124 bytes
17,385,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,464,031 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,532,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,851,093 >>> mbox cmd response: success
17,851,705 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,855,744 UART: [afmc] ++
17,856,384 UART: [afmc] CDI.KEYID = 6
17,857,265 UART: [afmc] SUBJECT.KEYID = 7
17,858,516 UART: [afmc] AUTHORITY.KEYID = 5
21,173,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,467,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,470,106 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,484,469 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,499,293 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,513,749 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,536,670 UART: [afmc] --
23,541,343 UART: [cold-reset] --
23,544,701 UART: [state] Locking Datavault
23,551,415 UART: [state] Locking PCR0, PCR1 and PCR31
23,553,163 UART: [state] Locking ICCM
23,555,468 UART: [exit] Launching FMC @ 0x40000130
23,563,856 UART:
23,564,092 UART: Running Caliptra FMC ...
23,565,191 UART:
23,565,344 UART: [state] CFI Enabled
23,573,381 UART: [fht] FMC Alias Private Key: 7
25,903,349 UART: [art] Extend RT PCRs Done
25,904,563 UART: [art] Lock RT PCRs Done
25,906,450 UART: [art] Populate DV Done
25,911,526 UART: [fht] FMC Alias Private Key: 7
25,913,189 UART: [art] Derive CDI
25,913,998 UART: [art] Store in in slot 0x4
25,956,315 UART: [art] Derive Key Pair
25,957,342 UART: [art] Store priv key in slot 0x5
29,198,972 UART: [art] Derive Key Pair - Done
29,211,810 UART: [art] Signing Cert with AUTHO
29,213,115 UART: RITY.KEYID = 7
31,492,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,178 UART: [art] PUB.X = 2EAB45BAFFA4A6DCA6C3ED9D39E21AB2B8017C98183E598C78A56025FA3440E74C22BD6173B91B5D82A07480C7E8C549
31,501,418 UART: [art] PUB.Y = D172823106B16ED0FC90A98F093C7E18861E68A663B88165F30812C565E402A8DC0FFFD371BE1B5067EA8C4DCB00D6B1
31,508,636 UART: [art] SIG.R = 0C0D766E11E0229BC07E726A90E983BAD09DA32F04287D0EFBA3DB4CD301E3625166E2001173140887DD28D2C3E20065
31,515,969 UART: [art] SIG.S = 56C3C2E0896B5B3BFCC3D4614E31D713B23AFADA97E4AC6BD64CF2E6FD6CCC25B2709667D119F020BCF8F66F7FA9AC9C
32,821,271 UART: Caliptra RT
32,821,965 UART: [state] CFI Enabled
32,938,802 UART: [rt] RT listening for mailbox commands...
32,970,941 UART: [rt]cmd =0x44504543, len=136
38,530,308 >>> mbox cmd response data (136 bytes)
38,531,665 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,562,199 UART: [rt]cmd =0x44504543, len=92
44,236,145 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
4,130,278 ready_for_fw is high
4,130,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,499 >>> mbox cmd response: success
18,066,273 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,705,618 UART:
23,706,003 UART: Running Caliptra FMC ...
23,707,203 UART:
23,707,366 UART: [state] CFI Enabled
23,715,249 UART: [fht] FMC Alias Private Key: 7
26,046,182 UART: [art] Extend RT PCRs Done
26,047,400 UART: [art] Lock RT PCRs Done
26,048,977 UART: [art] Populate DV Done
26,054,344 UART: [fht] FMC Alias Private Key: 7
26,055,900 UART: [art] Derive CDI
26,056,721 UART: [art] Store in in slot 0x4
26,099,510 UART: [art] Derive Key Pair
26,100,554 UART: [art] Store priv key in slot 0x5
29,343,253 UART: [art] Derive Key Pair - Done
29,356,031 UART: [art] Signing Cert with AUTHO
29,357,333 UART: RITY.KEYID = 7
31,637,141 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,650 UART: [art] PUB.X = 5BB96D8F32997653BB37D4348EEA0D82765F357B1C927E3397D6244797091D0070C15D85A75A40DEEBA3CC6125ACE8C1
31,645,845 UART: [art] PUB.Y = 41AABE84545BB14EA763BD872922C6456627DD42CB9D1139255896906FA775B4C3710219FF8E921FC16EA949DB256CCB
31,653,138 UART: [art] SIG.R = 7157490954155020AE2F87FFD32D335AD7602AA3D4BB997A7AF511CB68F6E5E7D32ACB2CFAA40C50712E0E3E2969C2F8
31,660,528 UART: [art] SIG.S = FD9187138F06D56642CB333F620D9BEEC42D90F75F0FAF7400AC8AD914C798AD85FF22FBAFE0B1A1D17E5CE533933017
32,965,594 UART: Caliptra RT
32,966,287 UART: [state] CFI Enabled
33,083,123 UART: [rt] RT listening for mailbox commands...
33,115,298 UART: [rt]cmd =0x44504543, len=136
38,674,690 >>> mbox cmd response data (136 bytes)
38,675,992 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,706,545 UART: [rt]cmd =0x44504543, len=92
44,380,649 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,129 UART:
192,494 UART: Running Caliptra ROM ...
193,683 UART:
193,836 UART: [state] CFI Enabled
265,879 UART: [state] LifecycleState = Unprovisioned
267,800 UART: [state] DebugLocked = No
269,123 UART: [state] WD Timer not started. Device not locked for debugging
272,091 UART: [kat] SHA2-256
451,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,825 UART: [kat] ++
463,349 UART: [kat] sha1
473,732 UART: [kat] SHA2-256
476,782 UART: [kat] SHA2-384
482,887 UART: [kat] SHA2-512-ACC
485,830 UART: [kat] ECC-384
2,949,055 UART: [kat] HMAC-384Kdf
2,971,713 UART: [kat] LMS
3,501,219 UART: [kat] --
3,505,223 UART: [cold-reset] ++
3,507,150 UART: [fht] FHT @ 0x50003400
3,516,652 UART: [idev] ++
3,517,254 UART: [idev] CDI.KEYID = 6
3,518,145 UART: [idev] SUBJECT.KEYID = 7
3,519,322 UART: [idev] UDS.KEYID = 0
3,520,396 ready_for_fw is high
3,520,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,492 UART: [idev] Erasing UDS.KEYID = 0
6,025,397 UART: [idev] Sha1 KeyId Algorithm
6,048,779 UART: [idev] --
6,052,285 UART: [ldev] ++
6,052,857 UART: [ldev] CDI.KEYID = 6
6,053,773 UART: [ldev] SUBJECT.KEYID = 5
6,054,930 UART: [ldev] AUTHORITY.KEYID = 7
6,056,218 UART: [ldev] FE.KEYID = 1
6,101,333 UART: [ldev] Erasing FE.KEYID = 1
8,604,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,134 UART: [ldev] --
10,413,445 UART: [fwproc] Wait for Commands...
10,415,000 UART: [fwproc] Recv command 0x46574c44
10,417,044 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,010 >>> mbox cmd response: success
14,289,611 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,293,563 UART: [afmc] ++
14,294,177 UART: [afmc] CDI.KEYID = 6
14,295,071 UART: [afmc] SUBJECT.KEYID = 7
14,296,237 UART: [afmc] AUTHORITY.KEYID = 5
16,832,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,557,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,954 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,110 UART: [afmc] --
18,633,022 UART: [cold-reset] --
18,635,264 UART: [state] Locking Datavault
18,639,594 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,277 UART: [state] Locking ICCM
18,642,677 UART: [exit] Launching FMC @ 0x40000130
18,651,074 UART:
18,651,320 UART: Running Caliptra FMC ...
18,652,424 UART:
18,652,606 UART: [state] CFI Enabled
18,713,339 UART: [fht] FMC Alias Private Key: 7
20,477,691 UART: [art] Extend RT PCRs Done
20,478,926 UART: [art] Lock RT PCRs Done
20,480,442 UART: [art] Populate DV Done
20,486,120 UART: [fht] FMC Alias Private Key: 7
20,487,764 UART: [art] Derive CDI
20,488,574 UART: [art] Store in in slot 0x4
20,546,720 UART: [art] Derive Key Pair
20,547,722 UART: [art] Store priv key in slot 0x5
23,010,466 UART: [art] Derive Key Pair - Done
23,023,310 UART: [art] Signing Cert with AUTHO
23,024,612 UART: RITY.KEYID = 7
24,737,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,600 UART: [art] PUB.X = A82083AFD499A1E13BDC428A5AD5958482D2B1CAFD50703394838C95773E5C89395E0732288AE7576869C51E50F4FAB8
24,745,895 UART: [art] PUB.Y = 6A0D51CA6C805AA701464B74AAB6570DCABF746BD325497F7192797A388AB58517F375FC26ECC9DC92F2DD036F7E120F
24,753,175 UART: [art] SIG.R = BFC495C7C9C497C7EEA6B15B26CEB6A418ADF77D236A3D4C87459780E435C43077898D7B4C7CA720C2554808BCD05434
24,760,501 UART: [art] SIG.S = 3860B58B9D76B2E1196DB880062DEDAF7DE771469F5CFE1DE95825769A80F61218B2FE07435AEA54148AF4A258BBC810
25,738,981 UART: Caliptra RT
25,739,678 UART: [state] CFI Enabled
25,905,550 UART: [rt] RT listening for mailbox commands...
25,938,040 UART: [rt]cmd =0x44504543, len=136
30,157,262 >>> mbox cmd response data (136 bytes)
30,159,212 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,189,812 UART: [rt]cmd =0x44504543, len=92
34,544,528 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,382,267 ready_for_fw is high
3,382,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,329 >>> mbox cmd response: success
14,070,213 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,360,436 UART:
18,360,839 UART: Running Caliptra FMC ...
18,361,979 UART:
18,362,136 UART: [state] CFI Enabled
18,430,048 UART: [fht] FMC Alias Private Key: 7
20,194,317 UART: [art] Extend RT PCRs Done
20,195,547 UART: [art] Lock RT PCRs Done
20,197,442 UART: [art] Populate DV Done
20,202,692 UART: [fht] FMC Alias Private Key: 7
20,204,234 UART: [art] Derive CDI
20,205,047 UART: [art] Store in in slot 0x4
20,262,772 UART: [art] Derive Key Pair
20,263,829 UART: [art] Store priv key in slot 0x5
22,726,543 UART: [art] Derive Key Pair - Done
22,739,266 UART: [art] Signing Cert with AUTHO
22,740,561 UART: RITY.KEYID = 7
24,453,245 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,757 UART: [art] PUB.X = E3127AF015F052B597E840F3EBBE38831F11C2FF8CCE13F3B72DB00F1C1AAB3FA72D03A4B8AF7765845651C047DBEDD3
24,462,018 UART: [art] PUB.Y = BD257381E564984A384FF57207B5358FE90D20AD7DF19ED7504A9660CEDDFC3C5BAF39E0C622CCD39B6C8024A4244731
24,469,303 UART: [art] SIG.R = C2CA0381DF7D50BE14E05FCED0AF159A30855D347366BB2ADFFC3C4E0D86DA136DCB30B98EB796C49E39F72544518021
24,476,754 UART: [art] SIG.S = AAAB24693B023ADBBAF8F2D929BC48ED7090E16C42AC7488AABC602ABC94EB5027C36D9358320305DCFAC1547F7A9059
25,455,500 UART: Caliptra RT
25,456,195 UART: [state] CFI Enabled
25,620,977 UART: [rt] RT listening for mailbox commands...
25,653,212 UART: [rt]cmd =0x44504543, len=136
29,871,910 >>> mbox cmd response data (136 bytes)
29,873,281 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,903,782 UART: [rt]cmd =0x44504543, len=92
34,260,430 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,419 UART:
192,789 UART: Running Caliptra ROM ...
193,929 UART:
603,680 UART: [state] CFI Enabled
619,257 UART: [state] LifecycleState = Unprovisioned
621,135 UART: [state] DebugLocked = No
623,999 UART: [state] WD Timer not started. Device not locked for debugging
627,954 UART: [kat] SHA2-256
807,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,650 UART: [kat] ++
819,095 UART: [kat] sha1
831,170 UART: [kat] SHA2-256
834,238 UART: [kat] SHA2-384
840,153 UART: [kat] SHA2-512-ACC
843,150 UART: [kat] ECC-384
3,280,813 UART: [kat] HMAC-384Kdf
3,292,342 UART: [kat] LMS
3,821,820 UART: [kat] --
3,825,576 UART: [cold-reset] ++
3,828,077 UART: [fht] FHT @ 0x50003400
3,839,054 UART: [idev] ++
3,839,607 UART: [idev] CDI.KEYID = 6
3,840,482 UART: [idev] SUBJECT.KEYID = 7
3,841,711 UART: [idev] UDS.KEYID = 0
3,842,752 ready_for_fw is high
3,842,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,772 UART: [idev] Erasing UDS.KEYID = 0
6,316,124 UART: [idev] Sha1 KeyId Algorithm
6,339,182 UART: [idev] --
6,342,445 UART: [ldev] ++
6,342,918 UART: [ldev] CDI.KEYID = 6
6,343,887 UART: [ldev] SUBJECT.KEYID = 5
6,345,052 UART: [ldev] AUTHORITY.KEYID = 7
6,346,291 UART: [ldev] FE.KEYID = 1
6,356,152 UART: [ldev] Erasing FE.KEYID = 1
8,828,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,196 UART: [ldev] --
10,616,272 UART: [fwproc] Wait for Commands...
10,618,750 UART: [fwproc] Recv command 0x46574c44
10,620,794 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,710 >>> mbox cmd response: success
14,490,219 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,493,152 UART: [afmc] ++
14,493,650 UART: [afmc] CDI.KEYID = 6
14,494,625 UART: [afmc] SUBJECT.KEYID = 7
14,495,890 UART: [afmc] AUTHORITY.KEYID = 5
16,997,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,073 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,791 UART: [afmc] --
18,794,496 UART: [cold-reset] --
18,799,438 UART: [state] Locking Datavault
18,805,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,772 UART: [state] Locking ICCM
18,809,038 UART: [exit] Launching FMC @ 0x40000130
18,817,492 UART:
18,817,685 UART: Running Caliptra FMC ...
18,818,697 UART:
18,818,833 UART: [state] CFI Enabled
18,827,160 UART: [fht] FMC Alias Private Key: 7
20,583,490 UART: [art] Extend RT PCRs Done
20,584,594 UART: [art] Lock RT PCRs Done
20,586,435 UART: [art] Populate DV Done
20,591,904 UART: [fht] FMC Alias Private Key: 7
20,593,497 UART: [art] Derive CDI
20,594,208 UART: [art] Store in in slot 0x4
20,636,805 UART: [art] Derive Key Pair
20,637,696 UART: [art] Store priv key in slot 0x5
23,064,889 UART: [art] Derive Key Pair - Done
23,077,659 UART: [art] Signing Cert with AUTHO
23,078,857 UART: RITY.KEYID = 7
24,784,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,562 UART: [art] PUB.X = 184FD71EE0605A6EDF469BF25AA5492D209596B44D85CE4430AD69A81DAE5917EA1375A2B74E77744C912A9CD08C5C87
24,792,863 UART: [art] PUB.Y = 89C0988DD129B0EE953DCEFAAD37E852B1E24DD6DC8BA7077B3648A8E48468AC4A34AA1BC1B3AC704355CD90DC8930D7
24,800,259 UART: [art] SIG.R = 4138C1DBA34D4AA4BA85D665A62E1868C3E87707AD3C3ACE059D2A5B7FE65FA365312D36ADD4806C9750DD8B35EB1288
24,807,543 UART: [art] SIG.S = FBA426810714E3669DD0494C9340705FBBE8A9E055B2C0C2442DED4E27AA2D1506566840AD44AD6C56C05BD8B89BF26C
25,786,471 UART: Caliptra RT
25,787,168 UART: [state] CFI Enabled
25,904,365 UART: [rt] RT listening for mailbox commands...
25,936,351 UART: [rt]cmd =0x44504543, len=136
30,106,980 >>> mbox cmd response data (136 bytes)
30,108,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,138,733 UART: [rt]cmd =0x44504543, len=92
34,422,275 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,697,891 ready_for_fw is high
3,698,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,494 >>> mbox cmd response: success
14,271,401 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,523,539 UART:
18,523,916 UART: Running Caliptra FMC ...
18,525,045 UART:
18,525,195 UART: [state] CFI Enabled
18,533,262 UART: [fht] FMC Alias Private Key: 7
20,290,652 UART: [art] Extend RT PCRs Done
20,291,876 UART: [art] Lock RT PCRs Done
20,293,673 UART: [art] Populate DV Done
20,299,186 UART: [fht] FMC Alias Private Key: 7
20,300,835 UART: [art] Derive CDI
20,301,648 UART: [art] Store in in slot 0x4
20,344,357 UART: [art] Derive Key Pair
20,345,397 UART: [art] Store priv key in slot 0x5
22,772,280 UART: [art] Derive Key Pair - Done
22,785,011 UART: [art] Signing Cert with AUTHO
22,786,317 UART: RITY.KEYID = 7
24,492,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,672 UART: [art] PUB.X = D92D2AB7119DC8099E1B7926DB74FAA86760115E95C0A97D67D336C1EBDD3BFDC29F1EA711406B95B4852E03C1176A82
24,500,914 UART: [art] PUB.Y = F35BFB7AF81710659AF477023CE272CC1BD41D8975604D39E139EC21F6F736B7F4527ED4D43B7750A27391923E3768CC
24,508,169 UART: [art] SIG.R = 5151F569429F1CD9B93959674E407D4C4A0A58EB09C2F731CA33E9FE627454940DFCEEB5B3CC1FE6A0820FDB635599CF
24,515,576 UART: [art] SIG.S = C7036E2373E9DD02FABBFFF94DE0595EC837BAA4F32AFAA9E92D0E77C5300876A03A47B666D824EE2EACA3DD68CA61E6
25,494,559 UART: Caliptra RT
25,495,274 UART: [state] CFI Enabled
25,611,949 UART: [rt] RT listening for mailbox commands...
25,644,172 UART: [rt]cmd =0x44504543, len=136
29,814,740 >>> mbox cmd response data (136 bytes)
29,816,152 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,846,855 UART: [rt]cmd =0x44504543, len=92
34,130,800 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,062 UART:
192,427 UART: Running Caliptra ROM ...
193,562 UART:
193,712 UART: [state] CFI Enabled
262,240 UART: [state] LifecycleState = Unprovisioned
264,639 UART: [state] DebugLocked = No
267,235 UART: [state] WD Timer not started. Device not locked for debugging
271,623 UART: [kat] SHA2-256
461,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,267 UART: [kat] ++
472,740 UART: [kat] sha1
485,035 UART: [kat] SHA2-256
488,047 UART: [kat] SHA2-384
494,608 UART: [kat] SHA2-512-ACC
497,202 UART: [kat] ECC-384
2,950,363 UART: [kat] HMAC-384Kdf
2,972,253 UART: [kat] LMS
3,503,989 UART: [kat] --
3,509,569 UART: [cold-reset] ++
3,511,499 UART: [fht] FHT @ 0x50003400
3,522,400 UART: [idev] ++
3,523,113 UART: [idev] CDI.KEYID = 6
3,524,024 UART: [idev] SUBJECT.KEYID = 7
3,525,270 UART: [idev] UDS.KEYID = 0
3,526,195 ready_for_fw is high
3,526,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,392 UART: [idev] Erasing UDS.KEYID = 0
6,029,809 UART: [idev] Sha1 KeyId Algorithm
6,051,255 UART: [idev] --
6,055,626 UART: [ldev] ++
6,056,338 UART: [ldev] CDI.KEYID = 6
6,057,261 UART: [ldev] SUBJECT.KEYID = 5
6,058,423 UART: [ldev] AUTHORITY.KEYID = 7
6,059,605 UART: [ldev] FE.KEYID = 1
6,100,291 UART: [ldev] Erasing FE.KEYID = 1
8,605,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,859 UART: [ldev] --
10,413,821 UART: [fwproc] Wait for Commands...
10,416,682 UART: [fwproc] Recv command 0x46574c44
10,419,038 UART: [fwproc] Recv'd Img size: 114448 bytes
13,869,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,456 >>> mbox cmd response: success
14,605,076 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,609,226 UART: [afmc] ++
14,609,952 UART: [afmc] CDI.KEYID = 6
14,611,158 UART: [afmc] SUBJECT.KEYID = 7
14,612,594 UART: [afmc] AUTHORITY.KEYID = 5
17,150,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,175 UART: [afmc] --
18,967,009 UART: [cold-reset] --
18,971,632 UART: [state] Locking Datavault
18,977,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,553 UART: [state] Locking ICCM
18,982,180 UART: [exit] Launching FMC @ 0x40000130
18,990,853 UART:
18,991,086 UART: Running Caliptra FMC ...
18,992,117 UART:
18,992,264 UART: [state] CFI Enabled
19,052,370 UART: [fht] FMC Alias Private Key: 7
20,816,316 UART: [art] Extend RT PCRs Done
20,817,537 UART: [art] Lock RT PCRs Done
20,819,352 UART: [art] Populate DV Done
20,824,760 UART: [fht] FMC Alias Private Key: 7
20,826,349 UART: [art] Derive CDI
20,827,162 UART: [art] Store in in slot 0x4
20,885,371 UART: [art] Derive Key Pair
20,886,374 UART: [art] Store priv key in slot 0x5
23,349,080 UART: [art] Derive Key Pair - Done
23,362,073 UART: [art] Signing Cert with AUTHO
23,363,380 UART: RITY.KEYID = 7
25,075,659 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,165 UART: [art] PUB.X = 33A44DA1612EEAEFE9567753732EC75BE50B34425C5C771D0CB2EDCF88F92946E39802B438F2A6FCE6A1B7275BF21EF7
25,084,462 UART: [art] PUB.Y = FF7C8F1BE2B10E0D7CC70B5CAB22B80B51262E6D7FEB3448ED0D1BCFCACF8F614BF5E3DE3AC29C7A31C4A529905DFCE3
25,091,742 UART: [art] SIG.R = 6F2DAC67C06E5216D26F82F21E983401529DE668FB54AB05D368BEB47863499EC27EA78F5C5ED845C6849F7F032A747C
25,099,136 UART: [art] SIG.S = 4C8BA0FDE5E47D0FE8D69DA7E8BEBD22A85AEDEBFC8AD737766C5CCB4B844AE618E9905C416A522E9013B7C3E7B37C5D
26,078,398 UART: Caliptra RT
26,079,087 UART: [state] CFI Enabled
26,244,882 UART: [rt] RT listening for mailbox commands...
26,277,256 UART: [rt]cmd =0x44504543, len=136
30,494,546 >>> mbox cmd response data (136 bytes)
30,496,438 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,527,077 UART: [rt]cmd =0x44504543, len=92
34,883,045 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,435,704 ready_for_fw is high
3,436,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,746,155 >>> mbox cmd response: success
14,746,840 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,024,125 UART:
19,024,519 UART: Running Caliptra FMC ...
19,025,668 UART:
19,025,831 UART: [state] CFI Enabled
19,096,719 UART: [fht] FMC Alias Private Key: 7
20,860,138 UART: [art] Extend RT PCRs Done
20,861,361 UART: [art] Lock RT PCRs Done
20,862,742 UART: [art] Populate DV Done
20,868,370 UART: [fht] FMC Alias Private Key: 7
20,870,077 UART: [art] Derive CDI
20,870,899 UART: [art] Store in in slot 0x4
20,929,213 UART: [art] Derive Key Pair
20,930,212 UART: [art] Store priv key in slot 0x5
23,392,900 UART: [art] Derive Key Pair - Done
23,405,923 UART: [art] Signing Cert with AUTHO
23,407,234 UART: RITY.KEYID = 7
25,119,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,960 UART: [art] PUB.X = 899FB63B2A9A1CC094FDA9E06E71251F2A3660B5C7FF64F02C7BB13B4F93D25F4061D8FEA7A89BA2F194D20D793C8456
25,128,254 UART: [art] PUB.Y = C9BA4B9D57914293AFA9F16D805C875DA3910D793A25C64E6452985CDABC88F4E91734644AAF85C7E08428F604493DB9
25,135,499 UART: [art] SIG.R = 3B55BB73DE4FFCC7F59198F34532E6EF43B48390617BE4D67C512788CB17BB6650C6AFF8686CD6124C5D6A4C9798A5A1
25,142,884 UART: [art] SIG.S = 3ABDEB40802169B00BA846B44FD6FDB118EBF3D32287B98F2DF4F442FE02252C89438C53CCF209E81C838F349B1843E4
26,121,776 UART: Caliptra RT
26,122,461 UART: [state] CFI Enabled
26,287,826 UART: [rt] RT listening for mailbox commands...
26,320,035 UART: [rt]cmd =0x44504543, len=136
30,537,387 >>> mbox cmd response data (136 bytes)
30,538,694 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,569,121 UART: [rt]cmd =0x44504543, len=92
34,924,027 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,443 UART:
192,819 UART: Running Caliptra ROM ...
193,909 UART:
603,654 UART: [state] CFI Enabled
616,965 UART: [state] LifecycleState = Unprovisioned
619,334 UART: [state] DebugLocked = No
621,713 UART: [state] WD Timer not started. Device not locked for debugging
626,085 UART: [kat] SHA2-256
815,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,791 UART: [kat] ++
827,266 UART: [kat] sha1
838,275 UART: [kat] SHA2-256
841,267 UART: [kat] SHA2-384
846,964 UART: [kat] SHA2-512-ACC
849,543 UART: [kat] ECC-384
3,290,108 UART: [kat] HMAC-384Kdf
3,302,207 UART: [kat] LMS
3,834,040 UART: [kat] --
3,838,667 UART: [cold-reset] ++
3,841,223 UART: [fht] FHT @ 0x50003400
3,852,470 UART: [idev] ++
3,853,100 UART: [idev] CDI.KEYID = 6
3,854,122 UART: [idev] SUBJECT.KEYID = 7
3,855,283 UART: [idev] UDS.KEYID = 0
3,856,219 ready_for_fw is high
3,856,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,479 UART: [idev] Erasing UDS.KEYID = 0
6,332,341 UART: [idev] Sha1 KeyId Algorithm
6,354,786 UART: [idev] --
6,360,850 UART: [ldev] ++
6,361,524 UART: [ldev] CDI.KEYID = 6
6,362,402 UART: [ldev] SUBJECT.KEYID = 5
6,363,608 UART: [ldev] AUTHORITY.KEYID = 7
6,364,831 UART: [ldev] FE.KEYID = 1
6,375,305 UART: [ldev] Erasing FE.KEYID = 1
8,848,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,176 UART: [ldev] --
10,638,465 UART: [fwproc] Wait for Commands...
10,640,604 UART: [fwproc] Recv command 0x46574c44
10,642,915 UART: [fwproc] Recv'd Img size: 114448 bytes
14,089,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,824,946 >>> mbox cmd response: success
14,825,561 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,829,808 UART: [afmc] ++
14,830,504 UART: [afmc] CDI.KEYID = 6
14,831,735 UART: [afmc] SUBJECT.KEYID = 7
14,833,216 UART: [afmc] AUTHORITY.KEYID = 5
17,335,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,032 UART: [afmc] --
19,133,944 UART: [cold-reset] --
19,137,906 UART: [state] Locking Datavault
19,145,260 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,432 UART: [state] Locking ICCM
19,148,755 UART: [exit] Launching FMC @ 0x40000130
19,157,419 UART:
19,157,651 UART: Running Caliptra FMC ...
19,158,688 UART:
19,158,828 UART: [state] CFI Enabled
19,167,086 UART: [fht] FMC Alias Private Key: 7
20,923,724 UART: [art] Extend RT PCRs Done
20,924,935 UART: [art] Lock RT PCRs Done
20,926,729 UART: [art] Populate DV Done
20,932,190 UART: [fht] FMC Alias Private Key: 7
20,933,830 UART: [art] Derive CDI
20,934,634 UART: [art] Store in in slot 0x4
20,977,432 UART: [art] Derive Key Pair
20,978,426 UART: [art] Store priv key in slot 0x5
23,405,040 UART: [art] Derive Key Pair - Done
23,418,085 UART: [art] Signing Cert with AUTHO
23,419,384 UART: RITY.KEYID = 7
25,125,070 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,575 UART: [art] PUB.X = D063D1D233913A4F4304C9790FD69C9BF331A38511D8425D0F2F51DAEB9C786782CB17C71F6BF46AC94788040703C6F0
25,133,869 UART: [art] PUB.Y = 02A17C649C2B64561852790444958755F0C1A6AC0E958B091FBCB60839FF54B4FBEC65A88AAA4A8E9F717F97E10533F7
25,141,141 UART: [art] SIG.R = 62B90F769C04E0CCE9D9A2E5250A6B706CE47E2EB792F48B387A90DD8EBA3E0B6CA59395134BF5FB10CA24EA4CDC1FC8
25,148,560 UART: [art] SIG.S = DC72D391C3C54721AE7B7F9C4447F40EDA91CDB1FD45940F3549618E413A0A4FFD718AEF3467887A7F367609187889DF
26,127,495 UART: Caliptra RT
26,128,208 UART: [state] CFI Enabled
26,244,806 UART: [rt] RT listening for mailbox commands...
26,277,176 UART: [rt]cmd =0x44504543, len=136
30,446,762 >>> mbox cmd response data (136 bytes)
30,448,100 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,478,638 UART: [rt]cmd =0x44504543, len=92
34,763,146 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,751,890 ready_for_fw is high
3,752,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,943,654 >>> mbox cmd response: success
14,944,479 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,198,267 UART:
19,198,688 UART: Running Caliptra FMC ...
19,199,828 UART:
19,199,979 UART: [state] CFI Enabled
19,207,817 UART: [fht] FMC Alias Private Key: 7
20,964,834 UART: [art] Extend RT PCRs Done
20,966,054 UART: [art] Lock RT PCRs Done
20,967,729 UART: [art] Populate DV Done
20,973,080 UART: [fht] FMC Alias Private Key: 7
20,974,574 UART: [art] Derive CDI
20,975,329 UART: [art] Store in in slot 0x4
21,017,871 UART: [art] Derive Key Pair
21,018,911 UART: [art] Store priv key in slot 0x5
23,445,524 UART: [art] Derive Key Pair - Done
23,458,623 UART: [art] Signing Cert with AUTHO
23,459,918 UART: RITY.KEYID = 7
25,164,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,345 UART: [art] PUB.X = B516B5C8D64307F6419CA48A278D87FE3984584A0E334A49E50BAD34F5DC431EDEE3885E25F1519B0EC51CD443629014
25,173,580 UART: [art] PUB.Y = 1459225C9C37473E1C85AA8109CDED2F7B1A414CAEBE2564E601B70DBFA144582EA1B621795C753C8BE349F4E6D94BEA
25,180,824 UART: [art] SIG.R = 7BBE72832C015FA350BC81C5117FAA15BEB61BB839A20B5A25CCB0AB6855E8736581D50C59737E2180D61B00EA2D6DC7
25,188,265 UART: [art] SIG.S = D483E1792385431DCD1CF1D1FE6F6234E43DC04E3342B6C46F198B683DE3B6C42BFB5767B083A10BA00C4C197E65D4E5
26,167,167 UART: Caliptra RT
26,167,854 UART: [state] CFI Enabled
26,285,625 UART: [rt] RT listening for mailbox commands...
26,318,008 UART: [rt]cmd =0x44504543, len=136
30,486,822 >>> mbox cmd response data (136 bytes)
30,488,324 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,518,952 UART: [rt]cmd =0x44504543, len=92
34,803,129 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
907,136 UART: [kat] LMS
1,475,332 UART: [kat] --
1,476,199 UART: [cold-reset] ++
1,476,537 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,504,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,516 UART: [idev] --
1,514,759 UART: [ldev] ++
1,514,927 UART: [ldev] CDI.KEYID = 6
1,515,290 UART: [ldev] SUBJECT.KEYID = 5
1,515,716 UART: [ldev] AUTHORITY.KEYID = 7
1,516,179 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,964 UART: [ldev] --
1,586,425 UART: [fwproc] Waiting for Commands...
1,587,138 UART: [fwproc] Received command 0x46574c44
1,587,929 UART: [fwproc] Received Image of size 114448 bytes
2,885,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,427 >>> mbox cmd response: success
3,078,427 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,443 UART: [afmc] ++
3,079,611 UART: [afmc] CDI.KEYID = 6
3,079,973 UART: [afmc] SUBJECT.KEYID = 7
3,080,398 UART: [afmc] AUTHORITY.KEYID = 5
3,114,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,949 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,562 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,252 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,183 UART: [afmc] --
3,158,285 UART: [cold-reset] --
3,158,849 UART: [state] Locking Datavault
3,160,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,730 UART: [state] Locking ICCM
3,161,208 UART: [exit] Launching FMC @ 0x40000130
3,166,537 UART:
3,166,553 UART: Running Caliptra FMC ...
3,166,961 UART:
3,167,015 UART: [state] CFI Enabled
3,177,596 UART: [fht] FMC Alias Private Key: 7
3,285,769 UART: [art] Extend RT PCRs Done
3,286,197 UART: [art] Lock RT PCRs Done
3,287,931 UART: [art] Populate DV Done
3,296,182 UART: [fht] FMC Alias Private Key: 7
3,297,112 UART: [art] Derive CDI
3,297,392 UART: [art] Store in in slot 0x4
3,382,921 UART: [art] Derive Key Pair
3,383,281 UART: [art] Store priv key in slot 0x5
3,396,293 UART: [art] Derive Key Pair - Done
3,411,292 UART: [art] Signing Cert with AUTHO
3,411,772 UART: RITY.KEYID = 7
3,426,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,343 UART: [art] PUB.X = 2DDC0D99F8C041801FED1F989F22787A8B82CB37D03ED9C0803BD8D7517CE3F9DABC7CD65D3FC6BA6C1A016E5E69E8A5
3,434,129 UART: [art] PUB.Y = A5CB101EF1061B4B8193F0EC5258B150713CC19DDB91FB2C1E1CA901521E5EA5C399C78ECD518F9990EEFC355A9AF478
3,441,087 UART: [art] SIG.R = 210FEB25FD483F0EEBE47F01BED084D86C23717712C823876C9B5F09890B756C44A308D844890A7676101450E4F61CA2
3,447,832 UART: [art] SIG.S = 149205A72F50DC0EF682C171D685B0CFB58D44F4862C9C1E56420087D2C8CB1EFAA2D8A3B45168CE03E163F36EFED211
3,471,468 UART: Caliptra RT
3,471,721 UART: [state] CFI Enabled
3,579,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,627 UART: [rt]cmd =0x44504543, len=136
3,673,906 >>> mbox cmd response data (136 bytes)
3,673,907 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,750 UART: [rt]cmd =0x44504543, len=92
3,886,481 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,819 ready_for_fw is high
1,362,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,591 >>> mbox cmd response: success
2,929,591 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,991,611 UART:
2,991,627 UART: Running Caliptra FMC ...
2,992,035 UART:
2,992,089 UART: [state] CFI Enabled
3,002,230 UART: [fht] FMC Alias Private Key: 7
3,109,501 UART: [art] Extend RT PCRs Done
3,109,929 UART: [art] Lock RT PCRs Done
3,111,389 UART: [art] Populate DV Done
3,119,386 UART: [fht] FMC Alias Private Key: 7
3,120,432 UART: [art] Derive CDI
3,120,712 UART: [art] Store in in slot 0x4
3,206,389 UART: [art] Derive Key Pair
3,206,749 UART: [art] Store priv key in slot 0x5
3,219,797 UART: [art] Derive Key Pair - Done
3,234,495 UART: [art] Signing Cert with AUTHO
3,234,975 UART: RITY.KEYID = 7
3,250,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,304 UART: [art] PUB.X = 173F7848B76361D54D25B1D7E2A4D68DFAF5F6A375A148684A8FA08A57C290646F8AF01ACD0FEA638C9162277F76E2C7
3,258,077 UART: [art] PUB.Y = 5C7F41C28C6D5417B8E35AB06C29A633A9C5C91E340AF515AEBFEA5D50F5859907D58749B51FC934DA24ABDD8F887D52
3,265,033 UART: [art] SIG.R = 3C35DF3DBC2A2B20B2C59CBF32161C6D34453D8741127FC97F48344ECAB165F3DFEF614E88D9E396BA7DB0DA7B87D328
3,271,819 UART: [art] SIG.S = 06DCD52A041F5C5840397A836E6B03B6402484ACA0FEE539FAA573972E91DC4C65BAD690974C7A8A48358F7AE98C8A26
3,295,361 UART: Caliptra RT
3,295,614 UART: [state] CFI Enabled
3,404,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,578 UART: [rt]cmd =0x44504543, len=136
3,499,157 >>> mbox cmd response data (136 bytes)
3,499,158 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,179 UART: [rt]cmd =0x44504543, len=92
3,712,137 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,977 UART: [state] LifecycleState = Unprovisioned
86,632 UART: [state] DebugLocked = No
87,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,778 UART: [kat] SHA2-256
882,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,824 UART: [kat] ++
886,976 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,258 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,153 UART: [idev] Erasing UDS.KEYID = 0
1,504,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,119 UART: [idev] --
1,514,158 UART: [ldev] ++
1,514,326 UART: [ldev] CDI.KEYID = 6
1,514,689 UART: [ldev] SUBJECT.KEYID = 5
1,515,115 UART: [ldev] AUTHORITY.KEYID = 7
1,515,578 UART: [ldev] FE.KEYID = 1
1,520,622 UART: [ldev] Erasing FE.KEYID = 1
1,546,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,315 UART: [ldev] --
1,585,752 UART: [fwproc] Waiting for Commands...
1,586,379 UART: [fwproc] Received command 0x46574c44
1,587,170 UART: [fwproc] Received Image of size 114448 bytes
2,886,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,818 >>> mbox cmd response: success
3,078,818 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,898 UART: [afmc] ++
3,080,066 UART: [afmc] CDI.KEYID = 6
3,080,428 UART: [afmc] SUBJECT.KEYID = 7
3,080,853 UART: [afmc] AUTHORITY.KEYID = 5
3,116,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,127 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,817 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,672 UART: [afmc] --
3,159,662 UART: [cold-reset] --
3,160,664 UART: [state] Locking Datavault
3,161,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,587 UART: [state] Locking ICCM
3,163,187 UART: [exit] Launching FMC @ 0x40000130
3,168,516 UART:
3,168,532 UART: Running Caliptra FMC ...
3,168,940 UART:
3,169,083 UART: [state] CFI Enabled
3,179,676 UART: [fht] FMC Alias Private Key: 7
3,288,135 UART: [art] Extend RT PCRs Done
3,288,563 UART: [art] Lock RT PCRs Done
3,290,107 UART: [art] Populate DV Done
3,298,050 UART: [fht] FMC Alias Private Key: 7
3,298,986 UART: [art] Derive CDI
3,299,266 UART: [art] Store in in slot 0x4
3,385,107 UART: [art] Derive Key Pair
3,385,467 UART: [art] Store priv key in slot 0x5
3,398,401 UART: [art] Derive Key Pair - Done
3,413,247 UART: [art] Signing Cert with AUTHO
3,413,727 UART: RITY.KEYID = 7
3,428,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,382 UART: [art] PUB.X = 2892D15D808592092EA83519A5EC53D7C253E099B5651AD3B204C910EE5099B8A1A88EB1DD795277A89B0A509E3D0404
3,436,133 UART: [art] PUB.Y = 0C312CFE5E704419758B2175028C99E499630B251F8141AAD16AEB8A1031C8F9F0F2F903E6B8787C1C2A29D9F8644E5F
3,443,071 UART: [art] SIG.R = CA9C5FF22E553A1BC9B64A09F8899B29AB050F4BE63AF3A048EBFA1D28EE826148DFCD889149DB3C9075C9D4A076590D
3,449,845 UART: [art] SIG.S = 733840775B5D74F001259BDBAAFE35B94FDFC119599720F7AAB1A302E1BEF20F07F8BE28321D4203CD0E9243B02997B4
3,473,956 UART: Caliptra RT
3,474,301 UART: [state] CFI Enabled
3,582,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,516 UART: [rt]cmd =0x44504543, len=136
3,676,847 >>> mbox cmd response data (136 bytes)
3,676,848 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,949 UART: [rt]cmd =0x44504543, len=92
3,891,575 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,632 ready_for_fw is high
1,363,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,600 >>> mbox cmd response: success
2,931,600 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,992,850 UART:
2,992,866 UART: Running Caliptra FMC ...
2,993,274 UART:
2,993,417 UART: [state] CFI Enabled
3,004,140 UART: [fht] FMC Alias Private Key: 7
3,112,189 UART: [art] Extend RT PCRs Done
3,112,617 UART: [art] Lock RT PCRs Done
3,114,475 UART: [art] Populate DV Done
3,123,030 UART: [fht] FMC Alias Private Key: 7
3,124,076 UART: [art] Derive CDI
3,124,356 UART: [art] Store in in slot 0x4
3,210,327 UART: [art] Derive Key Pair
3,210,687 UART: [art] Store priv key in slot 0x5
3,224,085 UART: [art] Derive Key Pair - Done
3,238,741 UART: [art] Signing Cert with AUTHO
3,239,221 UART: RITY.KEYID = 7
3,254,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,612 UART: [art] PUB.X = 31A47C6CA9DA1A2EB68D34F81C93A0952A1FF88538E31CD491CFF4F18AA20EF24E92E29A6359C35128446FDB305539BF
3,262,389 UART: [art] PUB.Y = 645E7B9ADB4648D8B70B750199F12E4FDDCB4E49B29622697B8EF25B4CAC2240BAE7347C9FE3E3FBA6D2DF2ED29E6C24
3,269,353 UART: [art] SIG.R = A221B4E690A1A7180E6E5CF783763F7C4CC320A65B1415720E80DC7077F5AA3FBA7EA776EDC61724DD59ABBCAB88A121
3,276,131 UART: [art] SIG.S = 65FC3A9574917DBE386CC05B7ADA318430A833D2B565042551BCD2AEA60B2D6F385E65A1414CDD8E0505DBB714D33CEA
3,299,648 UART: Caliptra RT
3,299,993 UART: [state] CFI Enabled
3,408,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,532 UART: [rt]cmd =0x44504543, len=136
3,503,829 >>> mbox cmd response data (136 bytes)
3,503,830 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,965 UART: [rt]cmd =0x44504543, len=92
3,717,831 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,611 UART: [kat] SHA2-256
903,551 UART: [kat] SHA2-384
906,132 UART: [kat] SHA2-512-ACC
908,033 UART: [kat] ECC-384
917,406 UART: [kat] HMAC-384Kdf
922,002 UART: [kat] LMS
1,170,330 UART: [kat] --
1,171,179 UART: [cold-reset] ++
1,171,629 UART: [fht] FHT @ 0x50003400
1,174,396 UART: [idev] ++
1,174,564 UART: [idev] CDI.KEYID = 6
1,174,924 UART: [idev] SUBJECT.KEYID = 7
1,175,348 UART: [idev] UDS.KEYID = 0
1,175,693 ready_for_fw is high
1,175,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,937 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,986 UART: [fwproc] Wait for Commands...
1,282,752 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,828 >>> mbox cmd response: success
2,774,828 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,890 UART: [afmc] ++
2,776,058 UART: [afmc] CDI.KEYID = 6
2,776,420 UART: [afmc] SUBJECT.KEYID = 7
2,776,845 UART: [afmc] AUTHORITY.KEYID = 5
2,812,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,103 UART: [afmc] --
2,856,221 UART: [cold-reset] --
2,856,725 UART: [state] Locking Datavault
2,857,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,392 UART: [state] Locking ICCM
2,858,932 UART: [exit] Launching FMC @ 0x40000130
2,864,261 UART:
2,864,277 UART: Running Caliptra FMC ...
2,864,685 UART:
2,864,739 UART: [state] CFI Enabled
2,875,302 UART: [fht] FMC Alias Private Key: 7
2,983,511 UART: [art] Extend RT PCRs Done
2,983,939 UART: [art] Lock RT PCRs Done
2,985,219 UART: [art] Populate DV Done
2,993,372 UART: [fht] FMC Alias Private Key: 7
2,994,476 UART: [art] Derive CDI
2,994,756 UART: [art] Store in in slot 0x4
3,080,537 UART: [art] Derive Key Pair
3,080,897 UART: [art] Store priv key in slot 0x5
3,094,133 UART: [art] Derive Key Pair - Done
3,108,984 UART: [art] Signing Cert with AUTHO
3,109,464 UART: RITY.KEYID = 7
3,124,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,067 UART: [art] PUB.X = AD1689AD546D48136499C37E5186D28A1DCA3B3B62030F94E242DEA42526423CEB8C5773AC3ED1A589F9ACF040FFF8AC
3,131,843 UART: [art] PUB.Y = B1F03F7FA321E6A93C345AD6F90693F6A3AF98A97E93BE1F33C72BDE79D5C90936677496A20B00C8B2549E6536BCE0F3
3,138,770 UART: [art] SIG.R = 9810AA17A93BF8F285ECCEC19817D2EC4A2BA8D2B0676996695145E81481725FCBF02930B1FF7EDA32C9834DCF6599EB
3,145,550 UART: [art] SIG.S = 7799CE43802AEB4B88B812D09B7162098C66C52CAE43E912971F58F4BD3D7866CD3628601BE0C3569F50744B997B9C21
3,169,328 UART: Caliptra RT
3,169,581 UART: [state] CFI Enabled
3,277,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,410 UART: [rt]cmd =0x44504543, len=136
3,372,865 >>> mbox cmd response data (136 bytes)
3,372,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,849 UART: [rt]cmd =0x44504543, len=92
3,586,416 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 ready_for_fw is high
1,059,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,289 >>> mbox cmd response: success
2,627,289 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,688,703 UART:
2,688,719 UART: Running Caliptra FMC ...
2,689,127 UART:
2,689,181 UART: [state] CFI Enabled
2,699,086 UART: [fht] FMC Alias Private Key: 7
2,806,403 UART: [art] Extend RT PCRs Done
2,806,831 UART: [art] Lock RT PCRs Done
2,808,453 UART: [art] Populate DV Done
2,816,670 UART: [fht] FMC Alias Private Key: 7
2,817,834 UART: [art] Derive CDI
2,818,114 UART: [art] Store in in slot 0x4
2,903,789 UART: [art] Derive Key Pair
2,904,149 UART: [art] Store priv key in slot 0x5
2,916,759 UART: [art] Derive Key Pair - Done
2,931,508 UART: [art] Signing Cert with AUTHO
2,931,988 UART: RITY.KEYID = 7
2,947,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,827 UART: [art] PUB.X = 19307E3B008AE865360F8B7926C169830B3019884A5B3139028B8A8B37207DA0A6C350C61228F6977C67DF4607987E63
2,954,547 UART: [art] PUB.Y = 0C8A49845400251CB8439DBC150344AF466A2ECE307409334FD94EB6520B562E0CFA2510FDF298C99F5491DCCCF300A5
2,961,442 UART: [art] SIG.R = D29CC50F1E793E0E104B6825E2CB9270E959331C0052915972386C147744D9D589FA8ACEBD7E6BCBE40B4B576B9F2755
2,968,183 UART: [art] SIG.S = 0933B61F958A9EBF0F9E2E8B5961A99DE3CDE6F7C2498C1F9345423FC8F64B6DA7D5F8290ADBBAF699F93F6EDE58EA35
2,992,251 UART: Caliptra RT
2,992,504 UART: [state] CFI Enabled
3,099,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,069 UART: [rt]cmd =0x44504543, len=136
3,194,954 >>> mbox cmd response data (136 bytes)
3,194,955 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,706 UART: [rt]cmd =0x44504543, len=92
3,408,333 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
919,211 UART: [kat] HMAC-384Kdf
923,819 UART: [kat] LMS
1,172,147 UART: [kat] --
1,173,010 UART: [cold-reset] ++
1,173,520 UART: [fht] FHT @ 0x50003400
1,176,185 UART: [idev] ++
1,176,353 UART: [idev] CDI.KEYID = 6
1,176,713 UART: [idev] SUBJECT.KEYID = 7
1,177,137 UART: [idev] UDS.KEYID = 0
1,177,482 ready_for_fw is high
1,177,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,570 UART: [idev] Sha1 KeyId Algorithm
1,211,124 UART: [idev] --
1,212,090 UART: [ldev] ++
1,212,258 UART: [ldev] CDI.KEYID = 6
1,212,621 UART: [ldev] SUBJECT.KEYID = 5
1,213,047 UART: [ldev] AUTHORITY.KEYID = 7
1,213,510 UART: [ldev] FE.KEYID = 1
1,218,772 UART: [ldev] Erasing FE.KEYID = 1
1,245,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,462 UART: [ldev] --
1,284,873 UART: [fwproc] Wait for Commands...
1,285,629 UART: [fwproc] Recv command 0x46574c44
1,286,357 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,619 >>> mbox cmd response: success
2,777,619 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,778,645 UART: [afmc] ++
2,778,813 UART: [afmc] CDI.KEYID = 6
2,779,175 UART: [afmc] SUBJECT.KEYID = 7
2,779,600 UART: [afmc] AUTHORITY.KEYID = 5
2,815,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,446 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,220 UART: [afmc] --
2,858,310 UART: [cold-reset] --
2,858,996 UART: [state] Locking Datavault
2,860,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,753 UART: [state] Locking ICCM
2,861,417 UART: [exit] Launching FMC @ 0x40000130
2,866,746 UART:
2,866,762 UART: Running Caliptra FMC ...
2,867,170 UART:
2,867,313 UART: [state] CFI Enabled
2,877,924 UART: [fht] FMC Alias Private Key: 7
2,986,227 UART: [art] Extend RT PCRs Done
2,986,655 UART: [art] Lock RT PCRs Done
2,988,229 UART: [art] Populate DV Done
2,996,634 UART: [fht] FMC Alias Private Key: 7
2,997,626 UART: [art] Derive CDI
2,997,906 UART: [art] Store in in slot 0x4
3,083,629 UART: [art] Derive Key Pair
3,083,989 UART: [art] Store priv key in slot 0x5
3,097,187 UART: [art] Derive Key Pair - Done
3,111,716 UART: [art] Signing Cert with AUTHO
3,112,196 UART: RITY.KEYID = 7
3,127,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,367 UART: [art] PUB.X = D0F6A309A068BD1C86D4EEECB64EE3FA9813B451C846AFC85B6D4DC10704659314350661932E4972C957EC7831123AEA
3,135,129 UART: [art] PUB.Y = 05AFEFD650665198BF4F7B74B73394B2A14653EDB45B109DC6614D3DE3185D8FF3C330165854250C7C71C7C9055F6656
3,142,068 UART: [art] SIG.R = E3628951A3412ED40E8B05823C7489B6F2B168908F9A828F020C1BF2C60859844097FE84897AEEA78639AA77679273D5
3,148,813 UART: [art] SIG.S = D035005615A84BD83543F1A463F2877464F1F83506A742C8DEB02E586A1B8CFA23FD95E691FC6DF9351C064EC088E95F
3,172,422 UART: Caliptra RT
3,172,767 UART: [state] CFI Enabled
3,281,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,293 UART: [rt]cmd =0x44504543, len=136
3,376,282 >>> mbox cmd response data (136 bytes)
3,376,283 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,146 UART: [rt]cmd =0x44504543, len=92
3,587,956 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,818 ready_for_fw is high
1,059,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,998 >>> mbox cmd response: success
2,625,998 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,688,328 UART:
2,688,344 UART: Running Caliptra FMC ...
2,688,752 UART:
2,688,895 UART: [state] CFI Enabled
2,699,342 UART: [fht] FMC Alias Private Key: 7
2,807,761 UART: [art] Extend RT PCRs Done
2,808,189 UART: [art] Lock RT PCRs Done
2,810,041 UART: [art] Populate DV Done
2,818,364 UART: [fht] FMC Alias Private Key: 7
2,819,322 UART: [art] Derive CDI
2,819,602 UART: [art] Store in in slot 0x4
2,905,149 UART: [art] Derive Key Pair
2,905,509 UART: [art] Store priv key in slot 0x5
2,918,769 UART: [art] Derive Key Pair - Done
2,933,380 UART: [art] Signing Cert with AUTHO
2,933,860 UART: RITY.KEYID = 7
2,948,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,551 UART: [art] PUB.X = 5FF584AF323EB97D64245F10810572537D3CABB0DD6879C66B7F11840B9013A1FD12A10DED3208052ED2CB647298360E
2,956,303 UART: [art] PUB.Y = 92F92E64A4B4BCD7CA6F60FDFD52D3FACE5CC28B5600A2C45EF616594EE1B2B85EDA0A29A23C18894F18F70F8821A97D
2,963,245 UART: [art] SIG.R = 9168AB1FE506E117525377BB61D67895FCDCCB8C68C2285BC2CB612C0DE8A8572E9FFE0E6588E787025CEA40022B8FF8
2,970,010 UART: [art] SIG.S = 028A71BE5992779841AA42B82AD684284268DE85EA3E38AF59C74204918E1AF70A463125383884739069FF48AB7429D4
2,993,694 UART: Caliptra RT
2,994,039 UART: [state] CFI Enabled
3,101,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,482 UART: [rt]cmd =0x44504543, len=136
3,197,541 >>> mbox cmd response data (136 bytes)
3,197,542 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,601 UART: [rt]cmd =0x44504543, len=92
3,411,100 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,059 UART: [idev] ++
1,173,227 UART: [idev] CDI.KEYID = 6
1,173,588 UART: [idev] SUBJECT.KEYID = 7
1,174,013 UART: [idev] UDS.KEYID = 0
1,174,359 ready_for_fw is high
1,174,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,832 UART: [ldev] ++
1,209,000 UART: [ldev] CDI.KEYID = 6
1,209,364 UART: [ldev] SUBJECT.KEYID = 5
1,209,791 UART: [ldev] AUTHORITY.KEYID = 7
1,210,254 UART: [ldev] FE.KEYID = 1
1,215,748 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,216 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,580 >>> mbox cmd response: success
2,773,580 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,839 UART: [afmc] ++
2,775,007 UART: [afmc] CDI.KEYID = 6
2,775,370 UART: [afmc] SUBJECT.KEYID = 7
2,775,796 UART: [afmc] AUTHORITY.KEYID = 5
2,811,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,410 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,996 UART: [afmc] --
2,855,018 UART: [cold-reset] --
2,855,852 UART: [state] Locking Datavault
2,856,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,597 UART: [state] Locking ICCM
2,858,021 UART: [exit] Launching FMC @ 0x40000130
2,863,350 UART:
2,863,366 UART: Running Caliptra FMC ...
2,863,774 UART:
2,863,828 UART: [state] CFI Enabled
2,874,349 UART: [fht] FMC Alias Private Key: 7
2,982,192 UART: [art] Extend RT PCRs Done
2,982,620 UART: [art] Lock RT PCRs Done
2,983,892 UART: [art] Populate DV Done
2,992,033 UART: [fht] FMC Alias Private Key: 7
2,992,991 UART: [art] Derive CDI
2,993,271 UART: [art] Store in in slot 0x4
3,078,528 UART: [art] Derive Key Pair
3,078,888 UART: [art] Store priv key in slot 0x5
3,092,168 UART: [art] Derive Key Pair - Done
3,107,005 UART: [art] Signing Cert with AUTHO
3,107,485 UART: RITY.KEYID = 7
3,123,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,840 UART: [art] PUB.X = 663B6E2BA770AE3A06A25B32702BD1BE650C36162FD02926C1704A272416823F3274AACBC258E2EACC1F3F4D8A0CDB9D
3,130,613 UART: [art] PUB.Y = 239237DBD5084F5CCCB39BF4E2CB5FD5061148CB619D5158279AA930DC3659C25CF67F922CBA83E2D035C6CF79626CB5
3,137,567 UART: [art] SIG.R = B681C8B1975DD904735A751D4DFBB066CCAE807FBDCF896D19FDFE643299F36B877FA50B35C183BAA8AC40FAFF5458BA
3,144,353 UART: [art] SIG.S = 7F682EE7987479AE200EFF69A60CA6766EDCCD15B176AF44BF87A4282E801A8FB06D39623F8D1930A59022868F976EBD
3,168,114 UART: Caliptra RT
3,168,367 UART: [state] CFI Enabled
3,275,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,322 UART: [rt]cmd =0x44504543, len=136
3,370,815 >>> mbox cmd response data (136 bytes)
3,370,816 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,747 UART: [rt]cmd =0x44504543, len=92
3,583,069 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 ready_for_fw is high
1,055,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,458 >>> mbox cmd response: success
2,622,458 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,685,384 UART:
2,685,400 UART: Running Caliptra FMC ...
2,685,808 UART:
2,685,862 UART: [state] CFI Enabled
2,696,287 UART: [fht] FMC Alias Private Key: 7
2,804,310 UART: [art] Extend RT PCRs Done
2,804,738 UART: [art] Lock RT PCRs Done
2,806,536 UART: [art] Populate DV Done
2,814,679 UART: [fht] FMC Alias Private Key: 7
2,815,717 UART: [art] Derive CDI
2,815,997 UART: [art] Store in in slot 0x4
2,901,716 UART: [art] Derive Key Pair
2,902,076 UART: [art] Store priv key in slot 0x5
2,915,710 UART: [art] Derive Key Pair - Done
2,930,869 UART: [art] Signing Cert with AUTHO
2,931,349 UART: RITY.KEYID = 7
2,946,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,552 UART: [art] PUB.X = 9385C6E4B8F6C893141BD574053292EDCF244A38F7E7405ED0ADA30C956522968CBB682D288A948B03B8CB7EDD15BA79
2,954,319 UART: [art] PUB.Y = 8BC6CFBE9CB23DF4806DCA5D3072A516F194CF71856EB9D351819223DA6878FC164972B5F6D4AC62803CEFE9EEE84E53
2,961,283 UART: [art] SIG.R = 29F3D8A12BBC73BDB61EE489F0F962D2C17B562C39BF3C226C529D9AD78527AD7E8E54F7BBBC618850BF1A2F0393A2BB
2,968,068 UART: [art] SIG.S = F4A077AC9E9E8448F11458B0B1D97C179A6526FC600C2B2E9C83E36B0B8E6D61266FE04886B72C3EFD4B5F28800AB56B
2,992,862 UART: Caliptra RT
2,993,115 UART: [state] CFI Enabled
3,100,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,652 UART: [rt]cmd =0x44504543, len=136
3,195,031 >>> mbox cmd response data (136 bytes)
3,195,032 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,995 UART: [rt]cmd =0x44504543, len=92
3,408,172 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,188 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,174,088 ready_for_fw is high
1,174,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,403 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,263 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,251 >>> mbox cmd response: success
2,775,251 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,422 UART: [afmc] ++
2,776,590 UART: [afmc] CDI.KEYID = 6
2,776,953 UART: [afmc] SUBJECT.KEYID = 7
2,777,379 UART: [afmc] AUTHORITY.KEYID = 5
2,812,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,431 UART: [afmc] --
2,856,365 UART: [cold-reset] --
2,857,187 UART: [state] Locking Datavault
2,858,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,628 UART: [state] Locking ICCM
2,859,082 UART: [exit] Launching FMC @ 0x40000130
2,864,411 UART:
2,864,427 UART: Running Caliptra FMC ...
2,864,835 UART:
2,864,978 UART: [state] CFI Enabled
2,875,435 UART: [fht] FMC Alias Private Key: 7
2,983,810 UART: [art] Extend RT PCRs Done
2,984,238 UART: [art] Lock RT PCRs Done
2,986,038 UART: [art] Populate DV Done
2,994,395 UART: [fht] FMC Alias Private Key: 7
2,995,523 UART: [art] Derive CDI
2,995,803 UART: [art] Store in in slot 0x4
3,081,892 UART: [art] Derive Key Pair
3,082,252 UART: [art] Store priv key in slot 0x5
3,095,960 UART: [art] Derive Key Pair - Done
3,110,802 UART: [art] Signing Cert with AUTHO
3,111,282 UART: RITY.KEYID = 7
3,126,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,161 UART: [art] PUB.X = 780DAA454FAF73ED049396C3202F2413B282F0AD2CCA8FB430E4AD444F73042129550FEFDA7158760099FA97A6B6AEA9
3,133,905 UART: [art] PUB.Y = E4FE83C62CC2AD660EB6F352A83984F5C119762E1FE1E687D363289487BDA54DAC8ADCBDACB44B32CF8BC4F1D75D3599
3,140,872 UART: [art] SIG.R = A701E643F79A1A71501869B22365DE1B594B6C61F47107F43744A6AFC72D84E4A54F44C30FDB430DF43B768E1B50E723
3,147,630 UART: [art] SIG.S = 89BF2F197DF92B64896F83038A900F68978BBD3EE363D4534D9D618CB557C1608A202A915EA5783FCEF8C475AAE3FB9F
3,171,569 UART: Caliptra RT
3,171,914 UART: [state] CFI Enabled
3,279,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,564 UART: [rt]cmd =0x44504543, len=136
3,374,073 >>> mbox cmd response data (136 bytes)
3,374,074 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,915 UART: [rt]cmd =0x44504543, len=92
3,585,596 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 ready_for_fw is high
1,056,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,263 >>> mbox cmd response: success
2,625,263 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,015 UART:
2,687,031 UART: Running Caliptra FMC ...
2,687,439 UART:
2,687,582 UART: [state] CFI Enabled
2,698,285 UART: [fht] FMC Alias Private Key: 7
2,806,792 UART: [art] Extend RT PCRs Done
2,807,220 UART: [art] Lock RT PCRs Done
2,808,606 UART: [art] Populate DV Done
2,816,907 UART: [fht] FMC Alias Private Key: 7
2,817,995 UART: [art] Derive CDI
2,818,275 UART: [art] Store in in slot 0x4
2,904,100 UART: [art] Derive Key Pair
2,904,460 UART: [art] Store priv key in slot 0x5
2,917,654 UART: [art] Derive Key Pair - Done
2,932,730 UART: [art] Signing Cert with AUTHO
2,933,210 UART: RITY.KEYID = 7
2,948,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,193 UART: [art] PUB.X = 417CA1985684DBE66F52F15AB25989DDD641A65BFAFAC28F5D016010AE6358F98E316480D9F01CBB1776B32C7FE8C720
2,955,968 UART: [art] PUB.Y = 9F5A9831679D10A2AB117BBDDBDD74B653DD1EFF7BB0A034A4BA84586682FED2DBB691F4934C7BF4F6C48583F687A948
2,962,934 UART: [art] SIG.R = 834CCA7A2C91A6E3C81CDE764D079FF14C583EE4FAB402A794A0C05D0CAC8D35039B0CA94091D53F02A583055249E973
2,969,691 UART: [art] SIG.S = F74B9E63B7493B2026680080F7768F2AAE4243FB08ADA1F738AA0E6AFA1FEEC7927A2F735101EF6184620B1C4CCDB406
2,993,301 UART: Caliptra RT
2,993,646 UART: [state] CFI Enabled
3,101,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,578 UART: [rt]cmd =0x44504543, len=136
3,196,423 >>> mbox cmd response data (136 bytes)
3,196,424 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,495 UART: [rt]cmd =0x44504543, len=92
3,410,720 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,186 UART:
192,558 UART: Running Caliptra ROM ...
193,750 UART:
193,905 UART: [state] CFI Enabled
261,657 UART: [state] LifecycleState = Unprovisioned
263,638 UART: [state] DebugLocked = No
265,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,540 UART: [kat] SHA2-256
439,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,724 UART: [kat] ++
450,252 UART: [kat] sha1
461,632 UART: [kat] SHA2-256
464,322 UART: [kat] SHA2-384
471,209 UART: [kat] SHA2-512-ACC
473,582 UART: [kat] ECC-384
2,766,506 UART: [kat] HMAC-384Kdf
2,777,948 UART: [kat] LMS
3,968,269 UART: [kat] --
3,972,569 UART: [cold-reset] ++
3,973,931 UART: [fht] Storing FHT @ 0x50003400
3,986,358 UART: [idev] ++
3,986,966 UART: [idev] CDI.KEYID = 6
3,987,863 UART: [idev] SUBJECT.KEYID = 7
3,989,107 UART: [idev] UDS.KEYID = 0
3,990,126 ready_for_fw is high
3,990,324 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,767 UART: [idev] Erasing UDS.KEYID = 0
7,326,041 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,645 UART: [idev] --
7,350,377 UART: [ldev] ++
7,350,959 UART: [ldev] CDI.KEYID = 6
7,351,936 UART: [ldev] SUBJECT.KEYID = 5
7,353,098 UART: [ldev] AUTHORITY.KEYID = 7
7,354,407 UART: [ldev] FE.KEYID = 1
7,401,777 UART: [ldev] Erasing FE.KEYID = 1
10,734,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,554 UART: [ldev] --
13,115,446 UART: [fwproc] Waiting for Commands...
13,117,539 UART: [fwproc] Received command 0x46574c44
13,119,720 UART: [fwproc] Received Image of size 114124 bytes
17,169,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,627,323 >>> mbox cmd response: success
17,632,150 UART: [afmc] ++
17,632,772 UART: [afmc] CDI.KEYID = 6
17,633,694 UART: [afmc] SUBJECT.KEYID = 7
17,634,913 UART: [afmc] AUTHORITY.KEYID = 5
21,007,671 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,034 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,420 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,227 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,696 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,094 UART: [afmc] --
23,378,857 UART: [cold-reset] --
23,381,859 UART: [state] Locking Datavault
23,387,320 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,016 UART: [state] Locking ICCM
23,390,200 UART: [exit] Launching FMC @ 0x40000130
23,398,594 UART:
23,398,844 UART: Running Caliptra FMC ...
23,399,947 UART:
23,400,107 UART: [state] CFI Enabled
23,466,228 UART: [fht] FMC Alias Private Key: 7
25,804,468 UART: [art] Extend RT PCRs Done
25,805,684 UART: [art] Lock RT PCRs Done
25,807,338 UART: [art] Populate DV Done
25,812,690 UART: [fht] FMC Alias Private Key: 7
25,814,401 UART: [art] Derive CDI
25,815,222 UART: [art] Store in in slot 0x4
25,873,701 UART: [art] Derive Key Pair
25,874,741 UART: [art] Store priv key in slot 0x5
29,167,396 UART: [art] Derive Key Pair - Done
29,180,501 UART: [art] Signing Cert with AUTHO
29,181,806 UART: RITY.KEYID = 7
31,468,231 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,753 UART: [art] PUB.X = 24A5E15D7A59D59F1E57BC80D1C23B17DB058BCA63E9E35D2DF231E863257E8352CEFC356C549C4CB514BE3FDA211653
31,476,966 UART: [art] PUB.Y = 509513B8F4AAC3F4310110D1CABA36B746FD92DA612E1B1CE1CE79621E4845AC93E8A1C6E22467996BC400FD8CFEA606
31,484,213 UART: [art] SIG.R = 9D50E0AAC311A0005154B5F1AFCBC89BE16FE4109DC8FB1896198C671B73EF54CBE04A4179C9B10523F41B69A1A0BDCA
31,491,563 UART: [art] SIG.S = 1D7DDCCF36893520606E05DA36701BB38A230F50F5C2AD591B8ADB3F9A3B11F95BE661CEC84E50873EFBE987301477D5
32,796,914 UART: Caliptra RT
32,797,629 UART: [state] CFI Enabled
32,959,064 UART: [rt] RT listening for mailbox commands...
32,962,999 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,007,568 UART: [rt]cmd =0x4c4d5356, len=1672
34,210,980 >>> mbox cmd response data (8 bytes)
34,213,459 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,257,956 UART: [rt]cmd =0x4c4d5356, len=1672
35,025,092 >>> mbox cmd response data (8 bytes)
35,027,515 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,071,957 UART: [rt]cmd =0x4c4d5356, len=1672
35,812,935 >>> mbox cmd response data (8 bytes)
35,815,351 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,859,734 UART: [rt]cmd =0x4c4d5356, len=1672
36,626,705 >>> mbox cmd response data (8 bytes)
36,627,999 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,672,372 UART: [rt]cmd =0x4c4d5356, len=1672
37,517,388 >>> mbox cmd response data (8 bytes)
37,518,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,563,056 UART: [rt]cmd =0x4c4d5356, len=1672
38,303,843 >>> mbox cmd response data (8 bytes)
38,305,095 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,349,527 UART: [rt]cmd =0x4c4d5356, len=1672
39,142,566 >>> mbox cmd response data (8 bytes)
39,143,843 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,188,230 UART: [rt]cmd =0x4c4d5356, len=1672
40,007,199 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,805,431 ready_for_fw is high
3,805,856 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,846,921 >>> mbox cmd response: success
23,537,601 UART:
23,537,996 UART: Running Caliptra FMC ...
23,539,116 UART:
23,539,267 UART: [state] CFI Enabled
23,607,449 UART: [fht] FMC Alias Private Key: 7
25,945,188 UART: [art] Extend RT PCRs Done
25,946,417 UART: [art] Lock RT PCRs Done
25,948,130 UART: [art] Populate DV Done
25,953,773 UART: [fht] FMC Alias Private Key: 7
25,955,373 UART: [art] Derive CDI
25,956,112 UART: [art] Store in in slot 0x4
26,016,730 UART: [art] Derive Key Pair
26,017,779 UART: [art] Store priv key in slot 0x5
29,310,105 UART: [art] Derive Key Pair - Done
29,323,172 UART: [art] Signing Cert with AUTHO
29,324,479 UART: RITY.KEYID = 7
31,612,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,614,041 UART: [art] PUB.X = D944E247B72F29E051B8AA41C1284E15DC1E5DD44E2E72923DB79A7BD19F6AC289F4BF1E5D789FDD2AAD1DF1FE8B94DC
31,621,294 UART: [art] PUB.Y = F95A8620720B36DE94D3DF63B334EB210B16924400569520719BF77AC7EC0259C8C28E1700B33295315D581A2320A9C0
31,628,472 UART: [art] SIG.R = 796A78880A3DBA450656C2CF048482A0A466DA1D5867F277692E0D337121D6F28B118DEA2FD0578049D2A2B05916A340
31,635,865 UART: [art] SIG.S = E7363742A890750C77D2442AB90C756BCDE40F54DDD334EDB3A36A6983BFD80038E032EDB8F5FE6BC4B112CFC932B493
32,941,307 UART: Caliptra RT
32,942,009 UART: [state] CFI Enabled
33,102,947 UART: [rt] RT listening for mailbox commands...
33,106,924 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,151,201 UART: [rt]cmd =0x4c4d5356, len=1672
34,354,639 >>> mbox cmd response data (8 bytes)
34,357,102 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,401,396 UART: [rt]cmd =0x4c4d5356, len=1672
35,168,246 >>> mbox cmd response data (8 bytes)
35,170,732 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,215,340 UART: [rt]cmd =0x4c4d5356, len=1672
35,956,578 >>> mbox cmd response data (8 bytes)
35,958,982 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,003,580 UART: [rt]cmd =0x4c4d5356, len=1672
36,770,681 >>> mbox cmd response data (8 bytes)
36,771,934 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,816,087 UART: [rt]cmd =0x4c4d5356, len=1672
37,661,010 >>> mbox cmd response data (8 bytes)
37,662,307 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,706,583 UART: [rt]cmd =0x4c4d5356, len=1672
38,447,760 >>> mbox cmd response data (8 bytes)
38,449,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,493,385 UART: [rt]cmd =0x4c4d5356, len=1672
39,286,370 >>> mbox cmd response data (8 bytes)
39,287,625 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,332,021 UART: [rt]cmd =0x4c4d5356, len=1672
40,150,879 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,468 UART:
192,826 UART: Running Caliptra ROM ...
193,938 UART:
603,842 UART: [state] CFI Enabled
619,785 UART: [state] LifecycleState = Unprovisioned
621,733 UART: [state] DebugLocked = No
624,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,828 UART: [kat] SHA2-256
798,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,120 UART: [kat] ++
809,597 UART: [kat] sha1
820,108 UART: [kat] SHA2-256
822,834 UART: [kat] SHA2-384
829,487 UART: [kat] SHA2-512-ACC
831,683 UART: [kat] ECC-384
3,115,473 UART: [kat] HMAC-384Kdf
3,127,510 UART: [kat] LMS
4,317,634 UART: [kat] --
4,322,626 UART: [cold-reset] ++
4,324,347 UART: [fht] Storing FHT @ 0x50003400
4,336,821 UART: [idev] ++
4,337,385 UART: [idev] CDI.KEYID = 6
4,338,416 UART: [idev] SUBJECT.KEYID = 7
4,339,587 UART: [idev] UDS.KEYID = 0
4,340,562 ready_for_fw is high
4,340,777 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,167 UART: [idev] Erasing UDS.KEYID = 0
7,630,169 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,759 UART: [idev] --
7,656,617 UART: [ldev] ++
7,657,190 UART: [ldev] CDI.KEYID = 6
7,658,146 UART: [ldev] SUBJECT.KEYID = 5
7,659,356 UART: [ldev] AUTHORITY.KEYID = 7
7,660,637 UART: [ldev] FE.KEYID = 1
7,670,895 UART: [ldev] Erasing FE.KEYID = 1
10,953,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,604 UART: [ldev] --
13,313,829 UART: [fwproc] Waiting for Commands...
13,317,145 UART: [fwproc] Received command 0x46574c44
13,319,380 UART: [fwproc] Received Image of size 114124 bytes
17,376,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,807 >>> mbox cmd response: success
17,845,633 UART: [afmc] ++
17,846,224 UART: [afmc] CDI.KEYID = 6
17,847,183 UART: [afmc] SUBJECT.KEYID = 7
17,848,396 UART: [afmc] AUTHORITY.KEYID = 5
21,167,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,865 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,263 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,083 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,545 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,620 UART: [afmc] --
23,531,263 UART: [cold-reset] --
23,535,603 UART: [state] Locking Datavault
23,542,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,155 UART: [state] Locking ICCM
23,546,329 UART: [exit] Launching FMC @ 0x40000130
23,554,687 UART:
23,554,968 UART: Running Caliptra FMC ...
23,555,994 UART:
23,556,133 UART: [state] CFI Enabled
23,564,496 UART: [fht] FMC Alias Private Key: 7
25,895,544 UART: [art] Extend RT PCRs Done
25,896,762 UART: [art] Lock RT PCRs Done
25,898,140 UART: [art] Populate DV Done
25,903,495 UART: [fht] FMC Alias Private Key: 7
25,905,048 UART: [art] Derive CDI
25,905,861 UART: [art] Store in in slot 0x4
25,948,447 UART: [art] Derive Key Pair
25,949,610 UART: [art] Store priv key in slot 0x5
29,191,503 UART: [art] Derive Key Pair - Done
29,204,436 UART: [art] Signing Cert with AUTHO
29,205,729 UART: RITY.KEYID = 7
31,485,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,531 UART: [art] PUB.X = 7F2BD8D5D826BCE9C0F8F92C7595638BE12F2B6A07D265D4E4B1DA38915CC0ACBCADCAFF7DE2C0E98BD52258A3096E32
31,493,811 UART: [art] PUB.Y = 78EA64F4420921445D1A1B573E30F83F9C940DBD3929A98FB9560E32963ECC65B4584DD9594C1C3341A05DA8A2D56A30
31,501,032 UART: [art] SIG.R = 3B6F19B94B1E8EC43F90C9A3E9705F414484C21F8A48581ADFF3C9C2343CF8D2317F22C05C16669225959F6FA0BC76EB
31,508,407 UART: [art] SIG.S = 2D04C4E34B190F745333206EFA3905A6F28A8017473AD875644E733EDE4D35619FED292A207E660DAE4E98D56AA8A81F
32,813,643 UART: Caliptra RT
32,814,349 UART: [state] CFI Enabled
32,932,181 UART: [rt] RT listening for mailbox commands...
32,936,081 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,980,642 UART: [rt]cmd =0x4c4d5356, len=1672
34,183,940 >>> mbox cmd response data (8 bytes)
34,186,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,231,047 UART: [rt]cmd =0x4c4d5356, len=1672
34,998,014 >>> mbox cmd response data (8 bytes)
35,000,415 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,044,739 UART: [rt]cmd =0x4c4d5356, len=1672
35,785,906 >>> mbox cmd response data (8 bytes)
35,788,315 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,832,830 UART: [rt]cmd =0x4c4d5356, len=1672
36,599,916 >>> mbox cmd response data (8 bytes)
36,601,194 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,645,341 UART: [rt]cmd =0x4c4d5356, len=1672
37,490,318 >>> mbox cmd response data (8 bytes)
37,491,592 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,535,876 UART: [rt]cmd =0x4c4d5356, len=1672
38,276,722 >>> mbox cmd response data (8 bytes)
38,278,010 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,322,403 UART: [rt]cmd =0x4c4d5356, len=1672
39,115,265 >>> mbox cmd response data (8 bytes)
39,116,547 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,160,725 UART: [rt]cmd =0x4c4d5356, len=1672
39,979,538 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
4,126,635 ready_for_fw is high
4,127,060 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,502 >>> mbox cmd response: success
23,712,115 UART:
23,712,501 UART: Running Caliptra FMC ...
23,713,702 UART:
23,713,864 UART: [state] CFI Enabled
23,721,844 UART: [fht] FMC Alias Private Key: 7
26,053,065 UART: [art] Extend RT PCRs Done
26,054,294 UART: [art] Lock RT PCRs Done
26,056,110 UART: [art] Populate DV Done
26,061,582 UART: [fht] FMC Alias Private Key: 7
26,063,237 UART: [art] Derive CDI
26,064,054 UART: [art] Store in in slot 0x4
26,106,709 UART: [art] Derive Key Pair
26,107,706 UART: [art] Store priv key in slot 0x5
29,349,768 UART: [art] Derive Key Pair - Done
29,362,776 UART: [art] Signing Cert with AUTHO
29,364,081 UART: RITY.KEYID = 7
31,643,328 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,837 UART: [art] PUB.X = 790C10C83BC906BD01BEECF9EBDB075460E218E8851C141307AA94FEB688546D7C023133EA6DAEF300F15932CE7253BE
31,652,060 UART: [art] PUB.Y = 97D647A66ED7BE50DA4CF5DE87A507EA39DE44E782E53106AEB19F4E8FC663B667D3C940243EB4CF97CDC20B924A498D
31,659,371 UART: [art] SIG.R = AB26BFFE4D39563B9EB2C22A739D568F2A22ABDFC02D78A0193468D927C0D4DC1C5DB10DE3115EF3C7D1ABD9536D7E2F
31,666,790 UART: [art] SIG.S = 732B37AE8EB2E39FC8488D38423F147ADD4A2BD9660225329FCE193AE6DADBAF1AC1AF3BED1407CEBCBC03BD6C8385FB
32,971,795 UART: Caliptra RT
32,972,493 UART: [state] CFI Enabled
33,091,676 UART: [rt] RT listening for mailbox commands...
33,095,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,139,927 UART: [rt]cmd =0x4c4d5356, len=1672
34,343,550 >>> mbox cmd response data (8 bytes)
34,346,020 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,390,156 UART: [rt]cmd =0x4c4d5356, len=1672
35,156,841 >>> mbox cmd response data (8 bytes)
35,159,259 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,203,806 UART: [rt]cmd =0x4c4d5356, len=1672
35,944,358 >>> mbox cmd response data (8 bytes)
35,946,761 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,991,200 UART: [rt]cmd =0x4c4d5356, len=1672
36,758,014 >>> mbox cmd response data (8 bytes)
36,759,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,803,898 UART: [rt]cmd =0x4c4d5356, len=1672
37,648,451 >>> mbox cmd response data (8 bytes)
37,649,750 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,694,348 UART: [rt]cmd =0x4c4d5356, len=1672
38,435,039 >>> mbox cmd response data (8 bytes)
38,436,307 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,480,718 UART: [rt]cmd =0x4c4d5356, len=1672
39,273,597 >>> mbox cmd response data (8 bytes)
39,274,847 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,319,211 UART: [rt]cmd =0x4c4d5356, len=1672
40,137,452 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,773 writing to cptra_bootfsm_go
192,909 UART:
193,270 UART: Running Caliptra ROM ...
194,456 UART:
194,617 UART: [state] CFI Enabled
267,055 UART: [state] LifecycleState = Unprovisioned
268,913 UART: [state] DebugLocked = No
270,665 UART: [state] WD Timer not started. Device not locked for debugging
273,987 UART: [kat] SHA2-256
453,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,685 UART: [kat] ++
465,213 UART: [kat] sha1
474,555 UART: [kat] SHA2-256
477,629 UART: [kat] SHA2-384
482,856 UART: [kat] SHA2-512-ACC
485,828 UART: [kat] ECC-384
2,948,486 UART: [kat] HMAC-384Kdf
2,970,980 UART: [kat] LMS
3,500,431 UART: [kat] --
3,505,448 UART: [cold-reset] ++
3,507,389 UART: [fht] FHT @ 0x50003400
3,519,289 UART: [idev] ++
3,519,854 UART: [idev] CDI.KEYID = 6
3,520,769 UART: [idev] SUBJECT.KEYID = 7
3,521,951 UART: [idev] UDS.KEYID = 0
3,523,046 ready_for_fw is high
3,523,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,117 UART: [idev] Erasing UDS.KEYID = 0
6,026,494 UART: [idev] Sha1 KeyId Algorithm
6,049,784 UART: [idev] --
6,053,561 UART: [ldev] ++
6,054,132 UART: [ldev] CDI.KEYID = 6
6,055,022 UART: [ldev] SUBJECT.KEYID = 5
6,056,236 UART: [ldev] AUTHORITY.KEYID = 7
6,057,469 UART: [ldev] FE.KEYID = 1
6,100,338 UART: [ldev] Erasing FE.KEYID = 1
8,606,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,978 UART: [ldev] --
10,409,881 UART: [fwproc] Wait for Commands...
10,413,115 UART: [fwproc] Recv command 0x46574c44
10,415,226 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,460 >>> mbox cmd response: success
14,282,328 UART: [afmc] ++
14,282,916 UART: [afmc] CDI.KEYID = 6
14,283,800 UART: [afmc] SUBJECT.KEYID = 7
14,285,015 UART: [afmc] AUTHORITY.KEYID = 5
16,827,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,346 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,996 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,761 UART: [afmc] --
18,627,590 UART: [cold-reset] --
18,633,178 UART: [state] Locking Datavault
18,638,314 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,009 UART: [state] Locking ICCM
18,641,465 UART: [exit] Launching FMC @ 0x40000130
18,649,856 UART:
18,650,103 UART: Running Caliptra FMC ...
18,651,131 UART:
18,651,278 UART: [state] CFI Enabled
18,709,043 UART: [fht] FMC Alias Private Key: 7
20,473,761 UART: [art] Extend RT PCRs Done
20,474,987 UART: [art] Lock RT PCRs Done
20,476,645 UART: [art] Populate DV Done
20,482,106 UART: [fht] FMC Alias Private Key: 7
20,483,617 UART: [art] Derive CDI
20,484,363 UART: [art] Store in in slot 0x4
20,541,938 UART: [art] Derive Key Pair
20,542,939 UART: [art] Store priv key in slot 0x5
23,006,116 UART: [art] Derive Key Pair - Done
23,019,332 UART: [art] Signing Cert with AUTHO
23,020,635 UART: RITY.KEYID = 7
24,731,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,478 UART: [art] PUB.X = 91715ADDCB29ED91D64A49BC72BA3CB164CF8201EB4E6288E0726696BB7EE8A4184627E904078A56F76941138B71B393
24,740,776 UART: [art] PUB.Y = CF03DC28D69AAF204E36AA791E43618FEDE0063CDDCCFDC7DA45B0F81F2C56928BDF3398C6ED79733ECCC871239879B6
24,748,059 UART: [art] SIG.R = 99A5EB28E3BB3BF3ED2E931AB5E46D4692C7DC339C011FFBF7A62110D3DE34822115E0D6C0D5DA82B709F04A71E606E2
24,755,450 UART: [art] SIG.S = 4F6803E3042DADEF4FCA6F0948A86949412B79A62B8B11C87119BF08F412A21549A6BC808B7292048DBBE7BD7EFEE367
25,733,958 UART: Caliptra RT
25,734,656 UART: [state] CFI Enabled
25,900,471 UART: [rt] RT listening for mailbox commands...
25,904,430 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,949,482 UART: [rt]cmd =0x4c4d5356, len=1672
26,363,835 >>> mbox cmd response data (8 bytes)
26,366,332 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,410,887 UART: [rt]cmd =0x4c4d5356, len=1672
26,629,637 >>> mbox cmd response data (8 bytes)
26,632,016 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,676,508 UART: [rt]cmd =0x4c4d5356, len=1672
26,894,484 >>> mbox cmd response data (8 bytes)
26,896,855 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,941,281 UART: [rt]cmd =0x4c4d5356, len=1672
27,157,123 >>> mbox cmd response data (8 bytes)
27,158,375 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,202,639 UART: [rt]cmd =0x4c4d5356, len=1672
27,421,554 >>> mbox cmd response data (8 bytes)
27,422,816 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,467,204 UART: [rt]cmd =0x4c4d5356, len=1672
27,683,659 >>> mbox cmd response data (8 bytes)
27,684,969 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,729,360 UART: [rt]cmd =0x4c4d5356, len=1672
27,946,125 >>> mbox cmd response data (8 bytes)
27,947,404 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,991,579 UART: [rt]cmd =0x4c4d5356, len=1672
28,211,001 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,382,801 ready_for_fw is high
3,383,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,599 >>> mbox cmd response: success
18,364,604 UART:
18,364,991 UART: Running Caliptra FMC ...
18,366,127 UART:
18,366,312 UART: [state] CFI Enabled
18,433,277 UART: [fht] FMC Alias Private Key: 7
20,197,447 UART: [art] Extend RT PCRs Done
20,198,674 UART: [art] Lock RT PCRs Done
20,200,551 UART: [art] Populate DV Done
20,205,960 UART: [fht] FMC Alias Private Key: 7
20,207,609 UART: [art] Derive CDI
20,208,345 UART: [art] Store in in slot 0x4
20,266,133 UART: [art] Derive Key Pair
20,267,145 UART: [art] Store priv key in slot 0x5
22,730,481 UART: [art] Derive Key Pair - Done
22,743,148 UART: [art] Signing Cert with AUTHO
22,744,448 UART: RITY.KEYID = 7
24,455,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,373 UART: [art] PUB.X = A25A9F9BF27FACD22A6DC80C5902165ABD513BB6768FC41980EC58C00E6D8CB17A2A94D06470AD4AF1D03EDFF69C83C4
24,464,685 UART: [art] PUB.Y = 21D55CEBFD1BB40183122175D67E41F00CDB380613A948BFD7065D7348950AA6AC1E38D475FEA31F8FCA3A7CB3DDA083
24,471,960 UART: [art] SIG.R = FB6468A50123389FB2CB27B57447843F95C4C10B070E9423342F4D995ED5635126A840829A84204A3D480A790FEE2B0A
24,479,306 UART: [art] SIG.S = 40F5CDAD632B5D741C08EE8E11A93E9B3A552E179DF1109FDAC26617BBB7BB511468D51E1B9E3435D0FF0DC1CFD8024B
25,458,320 UART: Caliptra RT
25,459,025 UART: [state] CFI Enabled
25,623,126 UART: [rt] RT listening for mailbox commands...
25,627,129 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,672,086 UART: [rt]cmd =0x4c4d5356, len=1672
26,086,600 >>> mbox cmd response data (8 bytes)
26,089,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,133,376 UART: [rt]cmd =0x4c4d5356, len=1672
26,352,522 >>> mbox cmd response data (8 bytes)
26,354,920 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,399,482 UART: [rt]cmd =0x4c4d5356, len=1672
26,617,385 >>> mbox cmd response data (8 bytes)
26,619,775 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,664,312 UART: [rt]cmd =0x4c4d5356, len=1672
26,880,169 >>> mbox cmd response data (8 bytes)
26,881,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,925,651 UART: [rt]cmd =0x4c4d5356, len=1672
27,144,295 >>> mbox cmd response data (8 bytes)
27,145,566 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,190,184 UART: [rt]cmd =0x4c4d5356, len=1672
27,406,883 >>> mbox cmd response data (8 bytes)
27,408,140 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,452,578 UART: [rt]cmd =0x4c4d5356, len=1672
27,669,394 >>> mbox cmd response data (8 bytes)
27,670,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,715,106 UART: [rt]cmd =0x4c4d5356, len=1672
27,934,523 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,462 UART:
192,851 UART: Running Caliptra ROM ...
194,030 UART:
603,728 UART: [state] CFI Enabled
616,694 UART: [state] LifecycleState = Unprovisioned
618,605 UART: [state] DebugLocked = No
621,257 UART: [state] WD Timer not started. Device not locked for debugging
625,342 UART: [kat] SHA2-256
804,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,024 UART: [kat] ++
816,548 UART: [kat] sha1
827,492 UART: [kat] SHA2-256
830,492 UART: [kat] SHA2-384
836,689 UART: [kat] SHA2-512-ACC
839,615 UART: [kat] ECC-384
3,281,648 UART: [kat] HMAC-384Kdf
3,294,090 UART: [kat] LMS
3,823,590 UART: [kat] --
3,828,806 UART: [cold-reset] ++
3,829,951 UART: [fht] FHT @ 0x50003400
3,841,131 UART: [idev] ++
3,841,707 UART: [idev] CDI.KEYID = 6
3,842,612 UART: [idev] SUBJECT.KEYID = 7
3,843,778 UART: [idev] UDS.KEYID = 0
3,844,818 ready_for_fw is high
3,845,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,750 UART: [idev] Erasing UDS.KEYID = 0
6,313,627 UART: [idev] Sha1 KeyId Algorithm
6,336,947 UART: [idev] --
6,341,413 UART: [ldev] ++
6,341,974 UART: [ldev] CDI.KEYID = 6
6,342,905 UART: [ldev] SUBJECT.KEYID = 5
6,344,104 UART: [ldev] AUTHORITY.KEYID = 7
6,345,326 UART: [ldev] FE.KEYID = 1
6,357,773 UART: [ldev] Erasing FE.KEYID = 1
8,831,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,208 UART: [ldev] --
10,621,721 UART: [fwproc] Wait for Commands...
10,623,591 UART: [fwproc] Recv command 0x46574c44
10,625,677 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,583 >>> mbox cmd response: success
14,491,825 UART: [afmc] ++
14,492,416 UART: [afmc] CDI.KEYID = 6
14,493,291 UART: [afmc] SUBJECT.KEYID = 7
14,494,448 UART: [afmc] AUTHORITY.KEYID = 5
16,994,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,145 UART: [afmc] --
18,791,359 UART: [cold-reset] --
18,794,577 UART: [state] Locking Datavault
18,799,118 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,809 UART: [state] Locking ICCM
18,802,893 UART: [exit] Launching FMC @ 0x40000130
18,811,335 UART:
18,811,563 UART: Running Caliptra FMC ...
18,812,652 UART:
18,812,802 UART: [state] CFI Enabled
18,821,001 UART: [fht] FMC Alias Private Key: 7
20,577,619 UART: [art] Extend RT PCRs Done
20,578,843 UART: [art] Lock RT PCRs Done
20,580,864 UART: [art] Populate DV Done
20,586,487 UART: [fht] FMC Alias Private Key: 7
20,587,964 UART: [art] Derive CDI
20,588,715 UART: [art] Store in in slot 0x4
20,631,195 UART: [art] Derive Key Pair
20,632,232 UART: [art] Store priv key in slot 0x5
23,059,378 UART: [art] Derive Key Pair - Done
23,072,215 UART: [art] Signing Cert with AUTHO
23,073,520 UART: RITY.KEYID = 7
24,779,210 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,703 UART: [art] PUB.X = 445980AD96657369393B908F9E029CCE71EC4B7454EAD63833C037D70E7E7B5BE1658327801C9A8F552B70AEF5297243
24,787,981 UART: [art] PUB.Y = CAD13168A1C8C95E90A7E3100B1B8AD224CB8B17C1D520D9C8505709EE352156CDEFC058BE79E341301EE93F1302619B
24,795,249 UART: [art] SIG.R = DA0364F5F1E1D323FE1959F424249C28153DE03197294670C9BCA9A4779D7BCD24E264DEA37B0BD532F939D1A71A5136
24,802,618 UART: [art] SIG.S = 16C27A4D53F98F3D4AD50F7C96CA2B5F7C9F84ABFD6C8A2DFCB19A0A7A9F7565FDA4E61C5E1D76C6B0DE8A1441020F65
25,782,052 UART: Caliptra RT
25,782,756 UART: [state] CFI Enabled
25,899,543 UART: [rt] RT listening for mailbox commands...
25,903,514 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,948,124 UART: [rt]cmd =0x4c4d5356, len=1672
26,362,704 >>> mbox cmd response data (8 bytes)
26,365,185 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,409,462 UART: [rt]cmd =0x4c4d5356, len=1672
26,628,677 >>> mbox cmd response data (8 bytes)
26,631,093 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,675,310 UART: [rt]cmd =0x4c4d5356, len=1672
26,893,112 >>> mbox cmd response data (8 bytes)
26,895,490 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,939,985 UART: [rt]cmd =0x4c4d5356, len=1672
27,155,505 >>> mbox cmd response data (8 bytes)
27,156,770 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,201,218 UART: [rt]cmd =0x4c4d5356, len=1672
27,420,022 >>> mbox cmd response data (8 bytes)
27,421,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,465,883 UART: [rt]cmd =0x4c4d5356, len=1672
27,682,262 >>> mbox cmd response data (8 bytes)
27,683,522 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,727,724 UART: [rt]cmd =0x4c4d5356, len=1672
27,944,639 >>> mbox cmd response data (8 bytes)
27,945,891 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,990,376 UART: [rt]cmd =0x4c4d5356, len=1672
28,209,714 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,693,639 ready_for_fw is high
3,694,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,818 >>> mbox cmd response: success
18,516,429 UART:
18,516,815 UART: Running Caliptra FMC ...
18,517,954 UART:
18,518,126 UART: [state] CFI Enabled
18,526,387 UART: [fht] FMC Alias Private Key: 7
20,282,771 UART: [art] Extend RT PCRs Done
20,283,994 UART: [art] Lock RT PCRs Done
20,285,348 UART: [art] Populate DV Done
20,290,758 UART: [fht] FMC Alias Private Key: 7
20,292,237 UART: [art] Derive CDI
20,292,991 UART: [art] Store in in slot 0x4
20,335,358 UART: [art] Derive Key Pair
20,336,351 UART: [art] Store priv key in slot 0x5
22,763,019 UART: [art] Derive Key Pair - Done
22,775,916 UART: [art] Signing Cert with AUTHO
22,777,221 UART: RITY.KEYID = 7
24,482,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,282 UART: [art] PUB.X = 23BF2CA30D5C85E7745B5B87D7978E6EA991F8FDB16F15FFA613B28342688C63B8AA54CD71E3909E9FB36062124918CC
24,491,503 UART: [art] PUB.Y = DA28108D601828B51554275EFE6866D30975D4925E130807C6A9B73EB8BD0A0249284B13B4A3F16FE39200E795EFD380
24,498,754 UART: [art] SIG.R = 0B6DA99E45294754611D2E0A01B963588C046AFEA6A710C038D46FDAB561419DE2BA6BF2146DC351D604BC2513DC35C8
24,506,169 UART: [art] SIG.S = B0067DEB3D8FBC395CF8D8840D5716EC6CE8657AA25EC20544D761FED23F8A9BA825C3A780F8FEB50983A25B5BF20B6A
25,485,528 UART: Caliptra RT
25,486,234 UART: [state] CFI Enabled
25,602,704 UART: [rt] RT listening for mailbox commands...
25,606,613 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,650,868 UART: [rt]cmd =0x4c4d5356, len=1672
26,065,085 >>> mbox cmd response data (8 bytes)
26,067,542 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,111,888 UART: [rt]cmd =0x4c4d5356, len=1672
26,331,080 >>> mbox cmd response data (8 bytes)
26,333,468 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,377,651 UART: [rt]cmd =0x4c4d5356, len=1672
26,595,768 >>> mbox cmd response data (8 bytes)
26,598,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,642,582 UART: [rt]cmd =0x4c4d5356, len=1672
26,858,402 >>> mbox cmd response data (8 bytes)
26,859,698 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,904,316 UART: [rt]cmd =0x4c4d5356, len=1672
27,123,085 >>> mbox cmd response data (8 bytes)
27,124,380 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,168,823 UART: [rt]cmd =0x4c4d5356, len=1672
27,385,068 >>> mbox cmd response data (8 bytes)
27,386,339 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,430,925 UART: [rt]cmd =0x4c4d5356, len=1672
27,647,843 >>> mbox cmd response data (8 bytes)
27,649,102 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,693,632 UART: [rt]cmd =0x4c4d5356, len=1672
27,912,922 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,251 UART:
192,621 UART: Running Caliptra ROM ...
193,724 UART:
193,866 UART: [state] CFI Enabled
262,739 UART: [state] LifecycleState = Unprovisioned
265,098 UART: [state] DebugLocked = No
267,470 UART: [state] WD Timer not started. Device not locked for debugging
272,134 UART: [kat] SHA2-256
462,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,786 UART: [kat] ++
473,265 UART: [kat] sha1
483,715 UART: [kat] SHA2-256
486,722 UART: [kat] SHA2-384
493,421 UART: [kat] SHA2-512-ACC
496,008 UART: [kat] ECC-384
2,948,381 UART: [kat] HMAC-384Kdf
2,973,241 UART: [kat] LMS
3,504,979 UART: [kat] --
3,512,098 UART: [cold-reset] ++
3,514,316 UART: [fht] FHT @ 0x50003400
3,525,080 UART: [idev] ++
3,525,785 UART: [idev] CDI.KEYID = 6
3,526,739 UART: [idev] SUBJECT.KEYID = 7
3,527,982 UART: [idev] UDS.KEYID = 0
3,528,879 ready_for_fw is high
3,529,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,094 UART: [idev] Erasing UDS.KEYID = 0
6,028,646 UART: [idev] Sha1 KeyId Algorithm
6,052,202 UART: [idev] --
6,057,390 UART: [ldev] ++
6,058,069 UART: [ldev] CDI.KEYID = 6
6,059,008 UART: [ldev] SUBJECT.KEYID = 5
6,060,191 UART: [ldev] AUTHORITY.KEYID = 7
6,061,425 UART: [ldev] FE.KEYID = 1
6,101,428 UART: [ldev] Erasing FE.KEYID = 1
8,608,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,644 UART: [ldev] --
10,415,066 UART: [fwproc] Wait for Commands...
10,417,924 UART: [fwproc] Recv command 0x46574c44
10,420,226 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,530 >>> mbox cmd response: success
14,608,075 UART: [afmc] ++
14,608,794 UART: [afmc] CDI.KEYID = 6
14,609,963 UART: [afmc] SUBJECT.KEYID = 7
14,611,457 UART: [afmc] AUTHORITY.KEYID = 5
17,154,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,262 UART: [afmc] --
18,973,289 UART: [cold-reset] --
18,977,264 UART: [state] Locking Datavault
18,981,812 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,949 UART: [state] Locking ICCM
18,985,505 UART: [exit] Launching FMC @ 0x40000130
18,994,203 UART:
18,994,486 UART: Running Caliptra FMC ...
18,995,603 UART:
18,995,766 UART: [state] CFI Enabled
19,054,393 UART: [fht] FMC Alias Private Key: 7
20,818,497 UART: [art] Extend RT PCRs Done
20,819,715 UART: [art] Lock RT PCRs Done
20,821,368 UART: [art] Populate DV Done
20,826,669 UART: [fht] FMC Alias Private Key: 7
20,828,366 UART: [art] Derive CDI
20,829,387 UART: [art] Store in in slot 0x4
20,887,570 UART: [art] Derive Key Pair
20,888,572 UART: [art] Store priv key in slot 0x5
23,351,601 UART: [art] Derive Key Pair - Done
23,364,429 UART: [art] Signing Cert with AUTHO
23,365,731 UART: RITY.KEYID = 7
25,077,660 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,167 UART: [art] PUB.X = D4DA322A28428F44657FA57332B36FE19B7F2065EFABC3F460C7AA0AC4B1022FB23046E6A7A62DAB021C9C8F91B99B8E
25,086,409 UART: [art] PUB.Y = 83E74964C6FA79149AD4E5BC338899B7ECD8414B473E445F62A5117CA5D9B4B9456CBEC3433317093217E77380061C5E
25,093,693 UART: [art] SIG.R = 4A40A80CEB16D503753A8D1A490DD32977EC31625E82D04A9C899F6EE343009DC14C10B250040C1800B3914A6386653A
25,100,975 UART: [art] SIG.S = 89F4D16CE62C1EA56CECB65338CA20137633469FE024737D54F97B79E21C4E41DBC8D1FE96C9F26E15AF1BE58267F061
26,080,305 UART: Caliptra RT
26,080,995 UART: [state] CFI Enabled
26,246,978 UART: [rt] RT listening for mailbox commands...
26,250,915 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,295,772 UART: [rt]cmd =0x4c4d5356, len=1672
26,710,455 >>> mbox cmd response data (8 bytes)
26,712,936 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,757,282 UART: [rt]cmd =0x4c4d5356, len=1672
26,976,328 >>> mbox cmd response data (8 bytes)
26,978,714 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,022,933 UART: [rt]cmd =0x4c4d5356, len=1672
27,240,796 >>> mbox cmd response data (8 bytes)
27,243,184 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,287,774 UART: [rt]cmd =0x4c4d5356, len=1672
27,503,641 >>> mbox cmd response data (8 bytes)
27,504,905 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,549,507 UART: [rt]cmd =0x4c4d5356, len=1672
27,768,112 >>> mbox cmd response data (8 bytes)
27,769,369 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,813,675 UART: [rt]cmd =0x4c4d5356, len=1672
28,030,064 >>> mbox cmd response data (8 bytes)
28,031,328 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,075,536 UART: [rt]cmd =0x4c4d5356, len=1672
28,292,380 >>> mbox cmd response data (8 bytes)
28,293,636 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,338,173 UART: [rt]cmd =0x4c4d5356, len=1672
28,557,594 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,426,192 ready_for_fw is high
3,426,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,935 >>> mbox cmd response: success
19,010,727 UART:
19,011,108 UART: Running Caliptra FMC ...
19,012,239 UART:
19,012,401 UART: [state] CFI Enabled
19,080,041 UART: [fht] FMC Alias Private Key: 7
20,844,303 UART: [art] Extend RT PCRs Done
20,845,537 UART: [art] Lock RT PCRs Done
20,847,137 UART: [art] Populate DV Done
20,852,514 UART: [fht] FMC Alias Private Key: 7
20,854,109 UART: [art] Derive CDI
20,854,924 UART: [art] Store in in slot 0x4
20,912,988 UART: [art] Derive Key Pair
20,913,981 UART: [art] Store priv key in slot 0x5
23,376,963 UART: [art] Derive Key Pair - Done
23,390,014 UART: [art] Signing Cert with AUTHO
23,391,318 UART: RITY.KEYID = 7
25,102,933 UART: [art] Erasing AUTHORITY.KEYID = 7
25,104,452 UART: [art] PUB.X = 6E9E73E0FF80478E7D2E9BC4933F52F19E55B180FB2B447511527FB31D8C9E4CD56BFB5261251A34D1690780960DDBF1
25,111,720 UART: [art] PUB.Y = 14E8FD3CC0A31629170BFA46FB1D628627C981E539DFE87A595509434F076A3C200AB9A9AC3FD6587A1974F3077C2255
25,118,925 UART: [art] SIG.R = D56C6459EAA24BE6E6F94E0FF7AF318439F8D0790D868C204C081179E66D9914087C1C0A63903709662FF6047FD189F3
25,126,313 UART: [art] SIG.S = 28CFD7AFCE35FFE25401C11DC217635230833C938923820AEC947BEF0B56B4FF36E80D0A66752FD70161D32F0325A77A
26,105,164 UART: Caliptra RT
26,105,854 UART: [state] CFI Enabled
26,272,206 UART: [rt] RT listening for mailbox commands...
26,276,203 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,321,728 UART: [rt]cmd =0x4c4d5356, len=1672
26,736,172 >>> mbox cmd response data (8 bytes)
26,738,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,782,979 UART: [rt]cmd =0x4c4d5356, len=1672
27,001,810 >>> mbox cmd response data (8 bytes)
27,004,210 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,048,706 UART: [rt]cmd =0x4c4d5356, len=1672
27,266,702 >>> mbox cmd response data (8 bytes)
27,269,096 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,313,759 UART: [rt]cmd =0x4c4d5356, len=1672
27,529,460 >>> mbox cmd response data (8 bytes)
27,530,722 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,575,107 UART: [rt]cmd =0x4c4d5356, len=1672
27,793,741 >>> mbox cmd response data (8 bytes)
27,794,996 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,839,538 UART: [rt]cmd =0x4c4d5356, len=1672
28,055,649 >>> mbox cmd response data (8 bytes)
28,056,904 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,101,192 UART: [rt]cmd =0x4c4d5356, len=1672
28,317,830 >>> mbox cmd response data (8 bytes)
28,319,100 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,363,473 UART: [rt]cmd =0x4c4d5356, len=1672
28,582,708 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,434 UART:
192,792 UART: Running Caliptra ROM ...
193,967 UART:
603,501 UART: [state] CFI Enabled
617,376 UART: [state] LifecycleState = Unprovisioned
619,744 UART: [state] DebugLocked = No
622,333 UART: [state] WD Timer not started. Device not locked for debugging
626,505 UART: [kat] SHA2-256
816,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,183 UART: [kat] ++
827,735 UART: [kat] sha1
839,028 UART: [kat] SHA2-256
842,057 UART: [kat] SHA2-384
848,260 UART: [kat] SHA2-512-ACC
850,833 UART: [kat] ECC-384
3,290,692 UART: [kat] HMAC-384Kdf
3,304,852 UART: [kat] LMS
3,836,666 UART: [kat] --
3,840,688 UART: [cold-reset] ++
3,841,693 UART: [fht] FHT @ 0x50003400
3,852,453 UART: [idev] ++
3,853,149 UART: [idev] CDI.KEYID = 6
3,854,122 UART: [idev] SUBJECT.KEYID = 7
3,855,286 UART: [idev] UDS.KEYID = 0
3,856,204 ready_for_fw is high
3,856,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,096 UART: [idev] Erasing UDS.KEYID = 0
6,331,130 UART: [idev] Sha1 KeyId Algorithm
6,354,367 UART: [idev] --
6,359,001 UART: [ldev] ++
6,359,567 UART: [ldev] CDI.KEYID = 6
6,360,447 UART: [ldev] SUBJECT.KEYID = 5
6,361,650 UART: [ldev] AUTHORITY.KEYID = 7
6,362,872 UART: [ldev] FE.KEYID = 1
6,373,862 UART: [ldev] Erasing FE.KEYID = 1
8,851,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,711 UART: [ldev] --
10,641,715 UART: [fwproc] Wait for Commands...
10,643,699 UART: [fwproc] Recv command 0x46574c44
10,645,999 UART: [fwproc] Recv'd Img size: 114448 bytes
14,094,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,860 >>> mbox cmd response: success
14,839,558 UART: [afmc] ++
14,840,261 UART: [afmc] CDI.KEYID = 6
14,841,370 UART: [afmc] SUBJECT.KEYID = 7
14,842,911 UART: [afmc] AUTHORITY.KEYID = 5
17,344,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,364 UART: [afmc] --
19,141,127 UART: [cold-reset] --
19,144,613 UART: [state] Locking Datavault
19,150,582 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,781 UART: [state] Locking ICCM
19,155,096 UART: [exit] Launching FMC @ 0x40000130
19,163,722 UART:
19,163,961 UART: Running Caliptra FMC ...
19,164,983 UART:
19,165,122 UART: [state] CFI Enabled
19,173,417 UART: [fht] FMC Alias Private Key: 7
20,929,914 UART: [art] Extend RT PCRs Done
20,931,132 UART: [art] Lock RT PCRs Done
20,933,020 UART: [art] Populate DV Done
20,938,537 UART: [fht] FMC Alias Private Key: 7
20,940,283 UART: [art] Derive CDI
20,941,087 UART: [art] Store in in slot 0x4
20,984,161 UART: [art] Derive Key Pair
20,985,209 UART: [art] Store priv key in slot 0x5
23,411,911 UART: [art] Derive Key Pair - Done
23,424,897 UART: [art] Signing Cert with AUTHO
23,426,204 UART: RITY.KEYID = 7
25,132,178 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,682 UART: [art] PUB.X = 34FEEC9D55F25F569CB44DC0CE7AD3898CFBA486D80B93AEA5D372251E9E2EC777C79CB78EF046B96267FF6C1EF8435F
25,141,007 UART: [art] PUB.Y = 5311A857C2CEE71E129E0477E7F9F27928C5AC77EFCE288601FDD0BAEC3C6AED75F1BBE65BB609B2606F60B19A927A59
25,148,273 UART: [art] SIG.R = 8A1D167AD737484315AA30790EC3D1DCF4C7DB28A6257671A942B3ADD8B51BFE0452A7FC351F638429C58CA0414C360A
25,155,648 UART: [art] SIG.S = 375CDCF00A6F103C2505B0B1B50164022F7804175B258B87ECDA5CC5F6E21F86FB2FD47F6B7285D9656D23B91F138448
26,135,158 UART: Caliptra RT
26,135,838 UART: [state] CFI Enabled
26,253,233 UART: [rt] RT listening for mailbox commands...
26,257,163 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,301,777 UART: [rt]cmd =0x4c4d5356, len=1672
26,716,249 >>> mbox cmd response data (8 bytes)
26,718,749 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,763,367 UART: [rt]cmd =0x4c4d5356, len=1672
26,982,243 >>> mbox cmd response data (8 bytes)
26,984,638 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,028,797 UART: [rt]cmd =0x4c4d5356, len=1672
27,246,781 >>> mbox cmd response data (8 bytes)
27,249,150 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,293,243 UART: [rt]cmd =0x4c4d5356, len=1672
27,509,223 >>> mbox cmd response data (8 bytes)
27,510,486 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,555,039 UART: [rt]cmd =0x4c4d5356, len=1672
27,773,887 >>> mbox cmd response data (8 bytes)
27,775,153 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,819,320 UART: [rt]cmd =0x4c4d5356, len=1672
28,035,424 >>> mbox cmd response data (8 bytes)
28,036,667 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,080,942 UART: [rt]cmd =0x4c4d5356, len=1672
28,297,805 >>> mbox cmd response data (8 bytes)
28,299,051 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,343,225 UART: [rt]cmd =0x4c4d5356, len=1672
28,562,796 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,759,318 ready_for_fw is high
3,759,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,124 >>> mbox cmd response: success
19,215,142 UART:
19,215,914 UART: Running Caliptra FMC ...
19,217,029 UART:
19,217,178 UART: [state] CFI Enabled
19,224,879 UART: [fht] FMC Alias Private Key: 7
20,980,916 UART: [art] Extend RT PCRs Done
20,982,150 UART: [art] Lock RT PCRs Done
20,983,905 UART: [art] Populate DV Done
20,989,164 UART: [fht] FMC Alias Private Key: 7
20,990,811 UART: [art] Derive CDI
20,991,541 UART: [art] Store in in slot 0x4
21,034,427 UART: [art] Derive Key Pair
21,035,478 UART: [art] Store priv key in slot 0x5
23,462,406 UART: [art] Derive Key Pair - Done
23,475,235 UART: [art] Signing Cert with AUTHO
23,476,532 UART: RITY.KEYID = 7
25,181,749 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,249 UART: [art] PUB.X = 8DA512448E5A5882D1B7ADB0DF27FDA665D561BE6644BAA4574DF741F49EDFCD146B6067F8E05757D917CC1B1A449A71
25,190,534 UART: [art] PUB.Y = C7DE014502AFF3530E684BB63C07ECA5436502EE2F3E55A9C8F28F75194657CAB42850286550A1DDA56AB541E8A1AEBF
25,197,796 UART: [art] SIG.R = EF7DC2AC6068D65B953B603904E4466E8162FF5D7F13CCB441B0D0575B6BC97559AD1AC0A53300EE27102B91C24CD7C0
25,205,176 UART: [art] SIG.S = AA39EC0B01CF13D647452973DF5A6439E62FAE2496DFF53C886E9D7B04056B4CD6EE689EF438BE698B5FEABB1233251E
26,184,948 UART: Caliptra RT
26,185,638 UART: [state] CFI Enabled
26,302,594 UART: [rt] RT listening for mailbox commands...
26,306,617 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,350,963 UART: [rt]cmd =0x4c4d5356, len=1672
26,765,435 >>> mbox cmd response data (8 bytes)
26,767,920 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,812,468 UART: [rt]cmd =0x4c4d5356, len=1672
27,031,455 >>> mbox cmd response data (8 bytes)
27,033,841 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,078,159 UART: [rt]cmd =0x4c4d5356, len=1672
27,296,053 >>> mbox cmd response data (8 bytes)
27,298,461 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,342,892 UART: [rt]cmd =0x4c4d5356, len=1672
27,558,571 >>> mbox cmd response data (8 bytes)
27,559,837 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,604,052 UART: [rt]cmd =0x4c4d5356, len=1672
27,823,047 >>> mbox cmd response data (8 bytes)
27,824,318 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,868,907 UART: [rt]cmd =0x4c4d5356, len=1672
28,085,014 >>> mbox cmd response data (8 bytes)
28,086,273 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,130,771 UART: [rt]cmd =0x4c4d5356, len=1672
28,347,787 >>> mbox cmd response data (8 bytes)
28,349,034 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,393,102 UART: [rt]cmd =0x4c4d5356, len=1672
28,612,282 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,807 UART: [kat] SHA2-256
881,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,853 UART: [kat] ++
886,005 UART: [kat] sha1
890,151 UART: [kat] SHA2-256
892,089 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 ready_for_fw is high
1,480,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,210 UART: [idev] Erasing UDS.KEYID = 0
1,505,162 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,585,983 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 114448 bytes
2,887,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,755 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,092 >>> mbox cmd response: success
3,081,150 UART: [afmc] ++
3,081,318 UART: [afmc] CDI.KEYID = 6
3,081,680 UART: [afmc] SUBJECT.KEYID = 7
3,082,105 UART: [afmc] AUTHORITY.KEYID = 5
3,117,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,155 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,845 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,766 UART: [afmc] --
3,160,830 UART: [cold-reset] --
3,161,548 UART: [state] Locking Datavault
3,162,727 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,331 UART: [state] Locking ICCM
3,163,959 UART: [exit] Launching FMC @ 0x40000130
3,169,288 UART:
3,169,304 UART: Running Caliptra FMC ...
3,169,712 UART:
3,169,766 UART: [state] CFI Enabled
3,180,409 UART: [fht] FMC Alias Private Key: 7
3,288,726 UART: [art] Extend RT PCRs Done
3,289,154 UART: [art] Lock RT PCRs Done
3,290,724 UART: [art] Populate DV Done
3,298,935 UART: [fht] FMC Alias Private Key: 7
3,299,867 UART: [art] Derive CDI
3,300,147 UART: [art] Store in in slot 0x4
3,385,588 UART: [art] Derive Key Pair
3,385,948 UART: [art] Store priv key in slot 0x5
3,399,980 UART: [art] Derive Key Pair - Done
3,414,632 UART: [art] Signing Cert with AUTHO
3,415,112 UART: RITY.KEYID = 7
3,430,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,283 UART: [art] PUB.X = 7D40DDFB1CC4F24EEE4CDD92D36A3929CCE436A5D0D57D0A66C7D4F4ECC4757BF58715BDB8FE8646BADAC12647634AE9
3,438,076 UART: [art] PUB.Y = 4045526F3BCFF1952F00CA6A950B76290D0D0DB0F649A429DA74C5B6E80002030FA6E2004D4C34D577883CFB2D6C3BEB
3,444,947 UART: [art] SIG.R = B778AF04A6E6396DA4D3FAA0703A75300B8AD9DCDDB4D12506AFE0E26562EBD6350DE8A8EB9B77D8D4E0074BD4A32678
3,451,720 UART: [art] SIG.S = 1BCA26E7CED7CD47179582BFDC60701C11F1250D31A0243DF0EF30F38A2FD1498FFDF6287630330A5EA555A99A514AF8
3,475,801 UART: Caliptra RT
3,476,054 UART: [state] CFI Enabled
3,582,653 UART: [rt] RT listening for mailbox commands...
3,583,323 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,839 UART: [rt]cmd =0x4c4d5356, len=1672
4,144,377 >>> mbox cmd response data (8 bytes)
4,144,378 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,184,539 UART: [rt]cmd =0x4c4d5356, len=1672
4,461,253 >>> mbox cmd response data (8 bytes)
4,461,254 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,331 UART: [rt]cmd =0x4c4d5356, len=1672
4,777,647 >>> mbox cmd response data (8 bytes)
4,777,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,873 UART: [rt]cmd =0x4c4d5356, len=1672
5,089,639 >>> mbox cmd response data (8 bytes)
5,089,640 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,129,891 UART: [rt]cmd =0x4c4d5356, len=1672
5,401,539 >>> mbox cmd response data (8 bytes)
5,401,540 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,441,655 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,678 >>> mbox cmd response data (8 bytes)
5,715,679 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,918 UART: [rt]cmd =0x4c4d5356, len=1672
6,027,280 >>> mbox cmd response data (8 bytes)
6,027,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,512 UART: [rt]cmd =0x4c4d5356, len=1672
6,341,485 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,829 ready_for_fw is high
1,362,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,521 >>> mbox cmd response: success
2,990,197 UART:
2,990,213 UART: Running Caliptra FMC ...
2,990,621 UART:
2,990,675 UART: [state] CFI Enabled
3,000,862 UART: [fht] FMC Alias Private Key: 7
3,109,045 UART: [art] Extend RT PCRs Done
3,109,473 UART: [art] Lock RT PCRs Done
3,111,009 UART: [art] Populate DV Done
3,119,118 UART: [fht] FMC Alias Private Key: 7
3,120,074 UART: [art] Derive CDI
3,120,354 UART: [art] Store in in slot 0x4
3,206,361 UART: [art] Derive Key Pair
3,206,721 UART: [art] Store priv key in slot 0x5
3,220,059 UART: [art] Derive Key Pair - Done
3,234,971 UART: [art] Signing Cert with AUTHO
3,235,451 UART: RITY.KEYID = 7
3,250,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,316 UART: [art] PUB.X = 29E8A8EFD80EA9CED10F1B3966E3662E75316318DD1EE02CAF9ECBFF94B7DCF937642E76E3B7BD5C779E1B164ECC36DF
3,258,104 UART: [art] PUB.Y = 71CB12B5E5FCA05237420401BC4C5BE3575A146A99D5CA8CCB84BCFD218A7D90DD6749333C458ED909DF871898F29EB4
3,265,055 UART: [art] SIG.R = 3D3669168BDD1FCE6119C1341AF2B809F9DB52922F8147A7D25F05EDCB731714F7CC7F75969486B354A682DC0C91E8B9
3,271,820 UART: [art] SIG.S = EB6F491488B0ED5196B910C79AB004866C08428867007342A59EC7B99AEA12D6883097CF8579AE7ACE246BE0E03365BA
3,295,721 UART: Caliptra RT
3,295,974 UART: [state] CFI Enabled
3,404,815 UART: [rt] RT listening for mailbox commands...
3,405,485 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,289 UART: [rt]cmd =0x4c4d5356, len=1672
3,966,549 >>> mbox cmd response data (8 bytes)
3,966,550 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,865 UART: [rt]cmd =0x4c4d5356, len=1672
4,283,591 >>> mbox cmd response data (8 bytes)
4,283,592 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,481 UART: [rt]cmd =0x4c4d5356, len=1672
4,600,259 >>> mbox cmd response data (8 bytes)
4,600,260 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,640,531 UART: [rt]cmd =0x4c4d5356, len=1672
4,912,189 >>> mbox cmd response data (8 bytes)
4,912,190 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,401 UART: [rt]cmd =0x4c4d5356, len=1672
5,224,031 >>> mbox cmd response data (8 bytes)
5,224,032 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,264,165 UART: [rt]cmd =0x4c4d5356, len=1672
5,538,330 >>> mbox cmd response data (8 bytes)
5,538,331 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,578,798 UART: [rt]cmd =0x4c4d5356, len=1672
5,850,248 >>> mbox cmd response data (8 bytes)
5,850,249 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,890,512 UART: [rt]cmd =0x4c4d5356, len=1672
6,164,579 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 ready_for_fw is high
1,480,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,537 UART: [idev] Erasing UDS.KEYID = 0
1,505,223 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] --
1,514,966 UART: [ldev] ++
1,515,134 UART: [ldev] CDI.KEYID = 6
1,515,497 UART: [ldev] SUBJECT.KEYID = 5
1,515,923 UART: [ldev] AUTHORITY.KEYID = 7
1,516,386 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,864 UART: [fwproc] Waiting for Commands...
1,587,711 UART: [fwproc] Received command 0x46574c44
1,588,502 UART: [fwproc] Received Image of size 114448 bytes
2,887,103 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,542 >>> mbox cmd response: success
3,080,622 UART: [afmc] ++
3,080,790 UART: [afmc] CDI.KEYID = 6
3,081,152 UART: [afmc] SUBJECT.KEYID = 7
3,081,577 UART: [afmc] AUTHORITY.KEYID = 5
3,116,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,234 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,119 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,809 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,742 UART: [afmc] --
3,159,830 UART: [cold-reset] --
3,160,558 UART: [state] Locking Datavault
3,161,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,451 UART: [state] Locking ICCM
3,163,105 UART: [exit] Launching FMC @ 0x40000130
3,168,434 UART:
3,168,450 UART: Running Caliptra FMC ...
3,168,858 UART:
3,169,001 UART: [state] CFI Enabled
3,179,852 UART: [fht] FMC Alias Private Key: 7
3,288,213 UART: [art] Extend RT PCRs Done
3,288,641 UART: [art] Lock RT PCRs Done
3,289,975 UART: [art] Populate DV Done
3,298,140 UART: [fht] FMC Alias Private Key: 7
3,299,272 UART: [art] Derive CDI
3,299,552 UART: [art] Store in in slot 0x4
3,385,171 UART: [art] Derive Key Pair
3,385,531 UART: [art] Store priv key in slot 0x5
3,398,337 UART: [art] Derive Key Pair - Done
3,413,231 UART: [art] Signing Cert with AUTHO
3,413,711 UART: RITY.KEYID = 7
3,428,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,558 UART: [art] PUB.X = 7D46F101646820D15293B8852E2FD8AAC0E0F23143A753D7735E6A1054ED1F69F4DD0FD995A680B7D947760B1D2A7422
3,436,317 UART: [art] PUB.Y = 25530147414FBD58820FEF78127864C57274E685D070161BD497A8A1CE4001078157958ABDC6ACBC08BB2270F625E46D
3,443,246 UART: [art] SIG.R = 2D849482D14EB5A2FA2580662CD45EEE305573DBEC0282230DDA3127CBA2C083972AA4DD061481C8AE176FAB729875B4
3,450,013 UART: [art] SIG.S = F96EA72C7D5A023DCBEBDC0DB03EB581ABA1A27C751F3F1A9C30B7753FDFED63BC2D55431A054FA4074C412DE69BAC9F
3,473,858 UART: Caliptra RT
3,474,203 UART: [state] CFI Enabled
3,582,272 UART: [rt] RT listening for mailbox commands...
3,582,942 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,998 UART: [rt]cmd =0x4c4d5356, len=1672
4,144,198 >>> mbox cmd response data (8 bytes)
4,144,199 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,184,478 UART: [rt]cmd =0x4c4d5356, len=1672
4,460,950 >>> mbox cmd response data (8 bytes)
4,460,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,114 UART: [rt]cmd =0x4c4d5356, len=1672
4,777,678 >>> mbox cmd response data (8 bytes)
4,777,679 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,970 UART: [rt]cmd =0x4c4d5356, len=1672
5,089,386 >>> mbox cmd response data (8 bytes)
5,089,387 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,129,560 UART: [rt]cmd =0x4c4d5356, len=1672
5,401,092 >>> mbox cmd response data (8 bytes)
5,401,093 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,441,352 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,419 >>> mbox cmd response data (8 bytes)
5,715,420 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,439 UART: [rt]cmd =0x4c4d5356, len=1672
6,026,925 >>> mbox cmd response data (8 bytes)
6,026,926 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,391 UART: [rt]cmd =0x4c4d5356, len=1672
6,341,248 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,904 ready_for_fw is high
1,362,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,828 >>> mbox cmd response: success
2,990,424 UART:
2,990,440 UART: Running Caliptra FMC ...
2,990,848 UART:
2,990,991 UART: [state] CFI Enabled
3,001,766 UART: [fht] FMC Alias Private Key: 7
3,109,889 UART: [art] Extend RT PCRs Done
3,110,317 UART: [art] Lock RT PCRs Done
3,111,773 UART: [art] Populate DV Done
3,119,818 UART: [fht] FMC Alias Private Key: 7
3,120,986 UART: [art] Derive CDI
3,121,266 UART: [art] Store in in slot 0x4
3,206,545 UART: [art] Derive Key Pair
3,206,905 UART: [art] Store priv key in slot 0x5
3,220,367 UART: [art] Derive Key Pair - Done
3,235,331 UART: [art] Signing Cert with AUTHO
3,235,811 UART: RITY.KEYID = 7
3,250,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,650 UART: [art] PUB.X = BECA92E98C1627401CF97F264902724F705E8FD9CC8C97CDABB13DE1D1E17742583D1E5AB9192DC85D77E405DB1EC617
3,258,426 UART: [art] PUB.Y = 0275167131E9BD3971CD2EB80A2E561441F016071FC63A550FCE8F597FB3E4CA73CAF71F8A56B7BDA22B45D32F5D4E9D
3,265,376 UART: [art] SIG.R = B7DADC00F2847722D625B5498C9CB994FE3E32C12F46D643CB0B7E6343D0F54924684463BDFA78B3D3C3CACCB7658945
3,272,129 UART: [art] SIG.S = 31CFCF2E81A56F82A7EEA2279BEDA57965A963C912E4E1835FEC0E499F36EDFD3AD46E60E8D47EB28816C89A4A8B5412
3,296,253 UART: Caliptra RT
3,296,598 UART: [state] CFI Enabled
3,404,083 UART: [rt] RT listening for mailbox commands...
3,404,753 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,409 UART: [rt]cmd =0x4c4d5356, len=1672
3,965,659 >>> mbox cmd response data (8 bytes)
3,965,660 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,969 UART: [rt]cmd =0x4c4d5356, len=1672
4,282,339 >>> mbox cmd response data (8 bytes)
4,282,340 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,322,491 UART: [rt]cmd =0x4c4d5356, len=1672
4,598,759 >>> mbox cmd response data (8 bytes)
4,598,760 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,638,845 UART: [rt]cmd =0x4c4d5356, len=1672
4,910,155 >>> mbox cmd response data (8 bytes)
4,910,156 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,950,509 UART: [rt]cmd =0x4c4d5356, len=1672
5,222,037 >>> mbox cmd response data (8 bytes)
5,222,038 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,262,183 UART: [rt]cmd =0x4c4d5356, len=1672
5,536,226 >>> mbox cmd response data (8 bytes)
5,536,227 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,504 UART: [rt]cmd =0x4c4d5356, len=1672
5,848,290 >>> mbox cmd response data (8 bytes)
5,848,291 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,888,492 UART: [rt]cmd =0x4c4d5356, len=1672
6,162,901 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
893,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,163 UART: [kat] ++
897,315 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,598 UART: [kat] LMS
1,170,926 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,139 UART: [fht] FHT @ 0x50003400
1,174,858 UART: [idev] ++
1,175,026 UART: [idev] CDI.KEYID = 6
1,175,386 UART: [idev] SUBJECT.KEYID = 7
1,175,810 UART: [idev] UDS.KEYID = 0
1,176,155 ready_for_fw is high
1,176,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,051 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,730 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,888 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,505 >>> mbox cmd response: success
2,776,761 UART: [afmc] ++
2,776,929 UART: [afmc] CDI.KEYID = 6
2,777,291 UART: [afmc] SUBJECT.KEYID = 7
2,777,716 UART: [afmc] AUTHORITY.KEYID = 5
2,813,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,922 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,600 UART: [afmc] --
2,856,684 UART: [cold-reset] --
2,857,520 UART: [state] Locking Datavault
2,858,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,105 UART: [state] Locking ICCM
2,859,757 UART: [exit] Launching FMC @ 0x40000130
2,865,086 UART:
2,865,102 UART: Running Caliptra FMC ...
2,865,510 UART:
2,865,564 UART: [state] CFI Enabled
2,875,999 UART: [fht] FMC Alias Private Key: 7
2,983,928 UART: [art] Extend RT PCRs Done
2,984,356 UART: [art] Lock RT PCRs Done
2,986,104 UART: [art] Populate DV Done
2,994,497 UART: [fht] FMC Alias Private Key: 7
2,995,637 UART: [art] Derive CDI
2,995,917 UART: [art] Store in in slot 0x4
3,081,690 UART: [art] Derive Key Pair
3,082,050 UART: [art] Store priv key in slot 0x5
3,095,308 UART: [art] Derive Key Pair - Done
3,109,578 UART: [art] Signing Cert with AUTHO
3,110,058 UART: RITY.KEYID = 7
3,124,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,739 UART: [art] PUB.X = 9FCBB5E120122ECDBF16FCE5E874E6D9012FB3FCE7CA8A12550D854DEE802DFC164CC07ABFFB666BAC0B1CEBDC6E04ED
3,132,535 UART: [art] PUB.Y = F972A785AD458F8AF5317083A8D01A3FFD5DBE7FC23804D2027879512BC8C9D1AA0591804B73120192718DA067243DCE
3,139,473 UART: [art] SIG.R = 9DFBAA8FC002338D1396F89A1A9D8546D40AA275CB37EC8BCA235CD9406460A14683201D62A961CF026B9052ED4A43FA
3,146,242 UART: [art] SIG.S = 32142D717AEEC6764007203A5631D4D1C22789E323773E5870238D6A0F9BE47B166186737907C2C48FD0FF01B9DBA035
3,169,281 UART: Caliptra RT
3,169,534 UART: [state] CFI Enabled
3,276,621 UART: [rt] RT listening for mailbox commands...
3,277,291 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,041 UART: [rt]cmd =0x4c4d5356, len=1672
3,838,627 >>> mbox cmd response data (8 bytes)
3,838,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,911 UART: [rt]cmd =0x4c4d5356, len=1672
4,155,345 >>> mbox cmd response data (8 bytes)
4,155,346 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,535 UART: [rt]cmd =0x4c4d5356, len=1672
4,472,051 >>> mbox cmd response data (8 bytes)
4,472,052 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,512,269 UART: [rt]cmd =0x4c4d5356, len=1672
4,784,025 >>> mbox cmd response data (8 bytes)
4,784,026 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,824,091 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,941 >>> mbox cmd response data (8 bytes)
5,095,942 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,997 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,922 >>> mbox cmd response data (8 bytes)
5,409,923 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,450,354 UART: [rt]cmd =0x4c4d5356, len=1672
5,722,006 >>> mbox cmd response data (8 bytes)
5,722,007 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,292 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,369 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 ready_for_fw is high
1,060,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,259 >>> mbox cmd response: success
2,689,173 UART:
2,689,189 UART: Running Caliptra FMC ...
2,689,597 UART:
2,689,651 UART: [state] CFI Enabled
2,700,212 UART: [fht] FMC Alias Private Key: 7
2,807,843 UART: [art] Extend RT PCRs Done
2,808,271 UART: [art] Lock RT PCRs Done
2,809,751 UART: [art] Populate DV Done
2,817,928 UART: [fht] FMC Alias Private Key: 7
2,819,066 UART: [art] Derive CDI
2,819,346 UART: [art] Store in in slot 0x4
2,904,571 UART: [art] Derive Key Pair
2,904,931 UART: [art] Store priv key in slot 0x5
2,918,097 UART: [art] Derive Key Pair - Done
2,932,833 UART: [art] Signing Cert with AUTHO
2,933,313 UART: RITY.KEYID = 7
2,948,637 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,402 UART: [art] PUB.X = 1F137FECE1C50209C91F0418FE642158F33389DE5AD9AB46479D13D16C9D81CCBB92221E51AF75A790C626E843A32934
2,956,165 UART: [art] PUB.Y = 4BD583F2CD75E64292A6B42917E1D650BEFF073F04BC777FE8D74AE4C7912EB42DD6701744AB9004DE7855C52CA8F333
2,963,114 UART: [art] SIG.R = A428E781218834CC16542511BF6128E2A6F656BE8F6C938B59B08CCAE066D96F281BCE96CF6BB3718A826E8B9252982C
2,969,886 UART: [art] SIG.S = 3FE0A3C831654B6A71E2C82342FC89E9EA275E1DE878CA13B8C9EFC618A506E643CED5EE201AE3BC9B5C829CE2643AB2
2,993,318 UART: Caliptra RT
2,993,571 UART: [state] CFI Enabled
3,101,640 UART: [rt] RT listening for mailbox commands...
3,102,310 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,932 UART: [rt]cmd =0x4c4d5356, len=1672
3,663,210 >>> mbox cmd response data (8 bytes)
3,663,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,602 UART: [rt]cmd =0x4c4d5356, len=1672
3,980,202 >>> mbox cmd response data (8 bytes)
3,980,203 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,546 UART: [rt]cmd =0x4c4d5356, len=1672
4,297,094 >>> mbox cmd response data (8 bytes)
4,297,095 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,120 UART: [rt]cmd =0x4c4d5356, len=1672
4,608,696 >>> mbox cmd response data (8 bytes)
4,608,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,880 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,496 >>> mbox cmd response data (8 bytes)
4,920,497 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,960,808 UART: [rt]cmd =0x4c4d5356, len=1672
5,234,823 >>> mbox cmd response data (8 bytes)
5,234,824 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,274,913 UART: [rt]cmd =0x4c4d5356, len=1672
5,546,293 >>> mbox cmd response data (8 bytes)
5,546,294 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,569 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,498 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,244 UART: [kat] SHA2-256
904,184 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
919,103 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,778 UART: [cold-reset] ++
1,173,236 UART: [fht] FHT @ 0x50003400
1,176,005 UART: [idev] ++
1,176,173 UART: [idev] CDI.KEYID = 6
1,176,533 UART: [idev] SUBJECT.KEYID = 7
1,176,957 UART: [idev] UDS.KEYID = 0
1,177,302 ready_for_fw is high
1,177,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,897 UART: [idev] Erasing UDS.KEYID = 0
1,201,924 UART: [idev] Sha1 KeyId Algorithm
1,210,412 UART: [idev] --
1,211,596 UART: [ldev] ++
1,211,764 UART: [ldev] CDI.KEYID = 6
1,212,127 UART: [ldev] SUBJECT.KEYID = 5
1,212,553 UART: [ldev] AUTHORITY.KEYID = 7
1,213,016 UART: [ldev] FE.KEYID = 1
1,218,236 UART: [ldev] Erasing FE.KEYID = 1
1,243,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,828 UART: [ldev] --
1,283,277 UART: [fwproc] Wait for Commands...
1,283,911 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,649 >>> mbox cmd response: success
2,777,683 UART: [afmc] ++
2,777,851 UART: [afmc] CDI.KEYID = 6
2,778,213 UART: [afmc] SUBJECT.KEYID = 7
2,778,638 UART: [afmc] AUTHORITY.KEYID = 5
2,814,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,614 UART: [afmc] --
2,857,508 UART: [cold-reset] --
2,858,214 UART: [state] Locking Datavault
2,859,633 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,237 UART: [state] Locking ICCM
2,860,677 UART: [exit] Launching FMC @ 0x40000130
2,866,006 UART:
2,866,022 UART: Running Caliptra FMC ...
2,866,430 UART:
2,866,573 UART: [state] CFI Enabled
2,877,250 UART: [fht] FMC Alias Private Key: 7
2,984,887 UART: [art] Extend RT PCRs Done
2,985,315 UART: [art] Lock RT PCRs Done
2,986,717 UART: [art] Populate DV Done
2,994,700 UART: [fht] FMC Alias Private Key: 7
2,995,822 UART: [art] Derive CDI
2,996,102 UART: [art] Store in in slot 0x4
3,081,757 UART: [art] Derive Key Pair
3,082,117 UART: [art] Store priv key in slot 0x5
3,094,871 UART: [art] Derive Key Pair - Done
3,109,714 UART: [art] Signing Cert with AUTHO
3,110,194 UART: RITY.KEYID = 7
3,125,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,849 UART: [art] PUB.X = 54A937D24B24BBBEC183CF0E691BCE97E9BDD2D6D297EAB6FEC6AD797B9248CBBD46EDC78C4837BF018A99BDBCFCC739
3,132,645 UART: [art] PUB.Y = 4F4CCAC7D9988255BCDC6B6B22EB2AEFF6578311E75E69C5461A7D901366B3CAD9765DACB7C1C474FCE004FC004D9E3A
3,139,590 UART: [art] SIG.R = F5372DD53CBA05BE11AA012190FA3CA3D8598051498FEB56C0CA345F1F505E3209C5591805266FD4B589B79255B2694D
3,146,348 UART: [art] SIG.S = 5EF76BF4C3A71B21722AD3AC08179412A054E72C2D8C94B9961A620AB21BFE8EE7A1FDB956856B00948BA029A8DD9E8E
3,170,019 UART: Caliptra RT
3,170,364 UART: [state] CFI Enabled
3,277,633 UART: [rt] RT listening for mailbox commands...
3,278,303 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,115 UART: [rt]cmd =0x4c4d5356, len=1672
3,839,415 >>> mbox cmd response data (8 bytes)
3,839,416 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,481 UART: [rt]cmd =0x4c4d5356, len=1672
4,155,921 >>> mbox cmd response data (8 bytes)
4,155,922 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,147 UART: [rt]cmd =0x4c4d5356, len=1672
4,472,597 >>> mbox cmd response data (8 bytes)
4,472,598 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,512,725 UART: [rt]cmd =0x4c4d5356, len=1672
4,784,493 >>> mbox cmd response data (8 bytes)
4,784,494 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,824,675 UART: [rt]cmd =0x4c4d5356, len=1672
5,096,147 >>> mbox cmd response data (8 bytes)
5,096,148 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,136,451 UART: [rt]cmd =0x4c4d5356, len=1672
5,410,656 >>> mbox cmd response data (8 bytes)
5,410,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,450,738 UART: [rt]cmd =0x4c4d5356, len=1672
5,722,224 >>> mbox cmd response data (8 bytes)
5,722,225 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,460 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,423 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 ready_for_fw is high
1,060,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,364 >>> mbox cmd response: success
2,691,064 UART:
2,691,080 UART: Running Caliptra FMC ...
2,691,488 UART:
2,691,631 UART: [state] CFI Enabled
2,702,328 UART: [fht] FMC Alias Private Key: 7
2,810,203 UART: [art] Extend RT PCRs Done
2,810,631 UART: [art] Lock RT PCRs Done
2,811,783 UART: [art] Populate DV Done
2,819,912 UART: [fht] FMC Alias Private Key: 7
2,820,872 UART: [art] Derive CDI
2,821,152 UART: [art] Store in in slot 0x4
2,906,899 UART: [art] Derive Key Pair
2,907,259 UART: [art] Store priv key in slot 0x5
2,920,455 UART: [art] Derive Key Pair - Done
2,934,962 UART: [art] Signing Cert with AUTHO
2,935,442 UART: RITY.KEYID = 7
2,950,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,467 UART: [art] PUB.X = 4A8DE900B8FCA00212D68CA8C9E25085D215E2FD5ECA8677E5F7AF80EF6639AF9C2D6701457AA2B2D19A8CD68A3C6E4C
2,958,227 UART: [art] PUB.Y = 1BA377780CA364D4892AF2DD8D94AC2FD13EE149753EE91D64F3E344CC7014D3947C391832EE60594DCCDF39347CA6D2
2,965,182 UART: [art] SIG.R = 8BE39CE1DE172BEB02180A146BD2E581E9F61BA603EBE4A505562B2AB5E9E7C2DA0F8DD9AF3A3B3F71219E1209DFE5AA
2,971,958 UART: [art] SIG.S = CA00F36A9D493F19D1F4C2654B8AEE80030C9C6D47F665484530D636EE1D2F5D4DD6CCB27F598D50AEB36467931A82EC
2,995,543 UART: Caliptra RT
2,995,888 UART: [state] CFI Enabled
3,104,128 UART: [rt] RT listening for mailbox commands...
3,104,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,388 UART: [rt]cmd =0x4c4d5356, len=1672
3,665,738 >>> mbox cmd response data (8 bytes)
3,665,739 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,196 UART: [rt]cmd =0x4c4d5356, len=1672
3,982,756 >>> mbox cmd response data (8 bytes)
3,982,757 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,924 UART: [rt]cmd =0x4c4d5356, len=1672
4,299,452 >>> mbox cmd response data (8 bytes)
4,299,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,339,684 UART: [rt]cmd =0x4c4d5356, len=1672
4,611,498 >>> mbox cmd response data (8 bytes)
4,611,499 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,651,650 UART: [rt]cmd =0x4c4d5356, len=1672
4,923,082 >>> mbox cmd response data (8 bytes)
4,923,083 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,963,168 UART: [rt]cmd =0x4c4d5356, len=1672
5,237,311 >>> mbox cmd response data (8 bytes)
5,237,312 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,277,475 UART: [rt]cmd =0x4c4d5356, len=1672
5,548,955 >>> mbox cmd response data (8 bytes)
5,548,956 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,891 UART: [rt]cmd =0x4c4d5356, len=1672
5,863,166 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 ready_for_fw is high
1,174,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,241,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,566 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,667 UART: [fwproc] Recv command 0x46574c44
1,282,400 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,266 >>> mbox cmd response: success
2,776,289 UART: [afmc] ++
2,776,457 UART: [afmc] CDI.KEYID = 6
2,776,820 UART: [afmc] SUBJECT.KEYID = 7
2,777,246 UART: [afmc] AUTHORITY.KEYID = 5
2,812,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,246 UART: [afmc] --
2,855,310 UART: [cold-reset] --
2,856,192 UART: [state] Locking Datavault
2,857,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,985 UART: [state] Locking ICCM
2,858,505 UART: [exit] Launching FMC @ 0x40000130
2,863,834 UART:
2,863,850 UART: Running Caliptra FMC ...
2,864,258 UART:
2,864,312 UART: [state] CFI Enabled
2,874,859 UART: [fht] FMC Alias Private Key: 7
2,983,524 UART: [art] Extend RT PCRs Done
2,983,952 UART: [art] Lock RT PCRs Done
2,985,224 UART: [art] Populate DV Done
2,993,343 UART: [fht] FMC Alias Private Key: 7
2,994,413 UART: [art] Derive CDI
2,994,693 UART: [art] Store in in slot 0x4
3,080,400 UART: [art] Derive Key Pair
3,080,760 UART: [art] Store priv key in slot 0x5
3,094,318 UART: [art] Derive Key Pair - Done
3,109,220 UART: [art] Signing Cert with AUTHO
3,109,700 UART: RITY.KEYID = 7
3,124,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,627 UART: [art] PUB.X = 6FC35A4CDCDAACEC8CC831623FD75F586FC1DF18D2682A69CD0726BC542983B0E6DEF18D2891D772B4A4D5DBCF47C512
3,132,416 UART: [art] PUB.Y = A84B6210F4ECD38022621774018A4EBE4EF2843DB9C8B7652079ABE489173A0D60D7D1EF82B385E55F6E80F9AD18BED9
3,139,368 UART: [art] SIG.R = ED3290694EC815BA5F679A301CD52690C36529D641DE578FD81A9BDB86F18F18A7D8325B6A58EDE8B68B4EDB729D3237
3,146,146 UART: [art] SIG.S = 8EE39A8130DC840E91F000BF65DB0D58268143C85B5E909FE3B0444FF1531EB043550EFD6FDD276D528AFA9DB3D3119E
3,169,926 UART: Caliptra RT
3,170,179 UART: [state] CFI Enabled
3,277,245 UART: [rt] RT listening for mailbox commands...
3,277,915 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,853 UART: [rt]cmd =0x4c4d5356, len=1672
3,839,263 >>> mbox cmd response data (8 bytes)
3,839,264 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,391 UART: [rt]cmd =0x4c4d5356, len=1672
4,155,793 >>> mbox cmd response data (8 bytes)
4,155,794 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,877 UART: [rt]cmd =0x4c4d5356, len=1672
4,472,113 >>> mbox cmd response data (8 bytes)
4,472,114 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,512,311 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,731 >>> mbox cmd response data (8 bytes)
4,783,732 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,865 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,505 >>> mbox cmd response data (8 bytes)
5,095,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,575 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,622 >>> mbox cmd response data (8 bytes)
5,409,623 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,690 UART: [rt]cmd =0x4c4d5356, len=1672
5,721,488 >>> mbox cmd response data (8 bytes)
5,721,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,536 UART: [rt]cmd =0x4c4d5356, len=1672
6,035,721 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,086 ready_for_fw is high
1,055,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,718 >>> mbox cmd response: success
2,685,606 UART:
2,685,622 UART: Running Caliptra FMC ...
2,686,030 UART:
2,686,084 UART: [state] CFI Enabled
2,696,805 UART: [fht] FMC Alias Private Key: 7
2,804,948 UART: [art] Extend RT PCRs Done
2,805,376 UART: [art] Lock RT PCRs Done
2,807,286 UART: [art] Populate DV Done
2,815,259 UART: [fht] FMC Alias Private Key: 7
2,816,403 UART: [art] Derive CDI
2,816,683 UART: [art] Store in in slot 0x4
2,902,736 UART: [art] Derive Key Pair
2,903,096 UART: [art] Store priv key in slot 0x5
2,915,728 UART: [art] Derive Key Pair - Done
2,930,886 UART: [art] Signing Cert with AUTHO
2,931,366 UART: RITY.KEYID = 7
2,945,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,711 UART: [art] PUB.X = 0A956B00E564B2EF92AD2E110A01DD4FB65D735D512FD6B9D7B20A23F851AF2867F7DCB7B10E4268E826DA4226DE2EEB
2,953,460 UART: [art] PUB.Y = 707FC7D22D3B5F60A10E5037F0A93EDC3A2C976228D2D1C2F392CF09F3EAC935BD928546A55ED451C466E991B453BC49
2,960,412 UART: [art] SIG.R = 453E83FF213703FD2800293C4D8BB1049BA5E859D9946E4BDD9E1ECA186D62D232758E8A9438E79EE519DF70998F1090
2,967,154 UART: [art] SIG.S = 8679F4877972600CB096C19522ED4E01CCDD24DC8F4A0D30318CFD37B503876BEFAB8CE5A901F3D73883C2A8A7C63974
2,991,124 UART: Caliptra RT
2,991,377 UART: [state] CFI Enabled
3,099,362 UART: [rt] RT listening for mailbox commands...
3,100,032 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,738 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,078 >>> mbox cmd response data (8 bytes)
3,661,079 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,230 UART: [rt]cmd =0x4c4d5356, len=1672
3,977,822 >>> mbox cmd response data (8 bytes)
3,977,823 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,092 UART: [rt]cmd =0x4c4d5356, len=1672
4,294,562 >>> mbox cmd response data (8 bytes)
4,294,563 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,616 UART: [rt]cmd =0x4c4d5356, len=1672
4,606,506 >>> mbox cmd response data (8 bytes)
4,606,507 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,782 UART: [rt]cmd =0x4c4d5356, len=1672
4,918,532 >>> mbox cmd response data (8 bytes)
4,918,533 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,768 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,951 >>> mbox cmd response data (8 bytes)
5,232,952 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,273,279 UART: [rt]cmd =0x4c4d5356, len=1672
5,544,861 >>> mbox cmd response data (8 bytes)
5,544,862 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,045 UART: [rt]cmd =0x4c4d5356, len=1672
5,859,072 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,487 UART: [kat] SHA2-256
891,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 ready_for_fw is high
1,174,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,559 UART: [ldev] Erasing FE.KEYID = 1
1,241,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,741 UART: [ldev] --
1,281,137 UART: [fwproc] Wait for Commands...
1,281,730 UART: [fwproc] Recv command 0x46574c44
1,282,463 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,491 >>> mbox cmd response: success
2,773,726 UART: [afmc] ++
2,773,894 UART: [afmc] CDI.KEYID = 6
2,774,257 UART: [afmc] SUBJECT.KEYID = 7
2,774,683 UART: [afmc] AUTHORITY.KEYID = 5
2,810,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,235 UART: [afmc] --
2,854,291 UART: [cold-reset] --
2,854,941 UART: [state] Locking Datavault
2,856,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,692 UART: [state] Locking ICCM
2,857,140 UART: [exit] Launching FMC @ 0x40000130
2,862,469 UART:
2,862,485 UART: Running Caliptra FMC ...
2,862,893 UART:
2,863,036 UART: [state] CFI Enabled
2,873,839 UART: [fht] FMC Alias Private Key: 7
2,982,562 UART: [art] Extend RT PCRs Done
2,982,990 UART: [art] Lock RT PCRs Done
2,984,418 UART: [art] Populate DV Done
2,992,619 UART: [fht] FMC Alias Private Key: 7
2,993,627 UART: [art] Derive CDI
2,993,907 UART: [art] Store in in slot 0x4
3,079,798 UART: [art] Derive Key Pair
3,080,158 UART: [art] Store priv key in slot 0x5
3,093,260 UART: [art] Derive Key Pair - Done
3,108,011 UART: [art] Signing Cert with AUTHO
3,108,491 UART: RITY.KEYID = 7
3,123,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,474 UART: [art] PUB.X = 982342ABC5AD70F1FDD3E8703E9F3698C00070E9D0E20B4C42D839BBCC252EF24BF6CA71574BD5D56038300DF8E723ED
3,131,228 UART: [art] PUB.Y = 5CCDB322C4606770C76A26B06726C6495E399D8C922DA4589E15B7BFAA8A6D272F2AB376F936B30ED6AC014E6E1D6775
3,138,178 UART: [art] SIG.R = E36998D5774EF0862E7258B07DC8D270580261E45BE03002CB4A2DB52DAAED18A3367EBF9B28049411A7B49CA2553A19
3,144,941 UART: [art] SIG.S = 2387265C2EAF46CB50EA42B45DA6F749F0538D930111F6C873879804948A5C88A257EAF90F586E0A74B658D942BA823E
3,168,674 UART: Caliptra RT
3,169,019 UART: [state] CFI Enabled
3,277,436 UART: [rt] RT listening for mailbox commands...
3,278,106 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,864 UART: [rt]cmd =0x4c4d5356, len=1672
3,839,190 >>> mbox cmd response data (8 bytes)
3,839,191 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,360 UART: [rt]cmd =0x4c4d5356, len=1672
4,156,036 >>> mbox cmd response data (8 bytes)
4,156,037 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,172 UART: [rt]cmd =0x4c4d5356, len=1672
4,472,554 >>> mbox cmd response data (8 bytes)
4,472,555 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,512,578 UART: [rt]cmd =0x4c4d5356, len=1672
4,784,324 >>> mbox cmd response data (8 bytes)
4,784,325 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,824,682 UART: [rt]cmd =0x4c4d5356, len=1672
5,096,250 >>> mbox cmd response data (8 bytes)
5,096,251 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,136,296 UART: [rt]cmd =0x4c4d5356, len=1672
5,410,455 >>> mbox cmd response data (8 bytes)
5,410,456 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,450,797 UART: [rt]cmd =0x4c4d5356, len=1672
5,722,367 >>> mbox cmd response data (8 bytes)
5,722,368 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,617 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,450 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,605 ready_for_fw is high
1,056,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,089 >>> mbox cmd response: success
2,686,027 UART:
2,686,043 UART: Running Caliptra FMC ...
2,686,451 UART:
2,686,594 UART: [state] CFI Enabled
2,697,637 UART: [fht] FMC Alias Private Key: 7
2,806,104 UART: [art] Extend RT PCRs Done
2,806,532 UART: [art] Lock RT PCRs Done
2,808,142 UART: [art] Populate DV Done
2,816,191 UART: [fht] FMC Alias Private Key: 7
2,817,235 UART: [art] Derive CDI
2,817,515 UART: [art] Store in in slot 0x4
2,903,008 UART: [art] Derive Key Pair
2,903,368 UART: [art] Store priv key in slot 0x5
2,916,440 UART: [art] Derive Key Pair - Done
2,931,514 UART: [art] Signing Cert with AUTHO
2,931,994 UART: RITY.KEYID = 7
2,947,444 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,209 UART: [art] PUB.X = B604ABFC7509564224A63BAC9989D8BD558DF4E905B4A5D80B32F9A3F012F65E3FF5430E3F61235A537476957C4B3FB3
2,954,968 UART: [art] PUB.Y = 2E14D04A6EBE67426EFF0283A52FBAD2FB58EE922F5BE001DC52D960082A88CB36FDBA274CE4A04E42ED59892C5DF999
2,961,927 UART: [art] SIG.R = B9AE40B9E153072A9A8D47D85F40492C02DD89241E1911C491B249647EE2B2DE57E2F26AD28AF67E17F9F01B62C7F6F2
2,968,697 UART: [art] SIG.S = 36623CBCD85BD56CBA78276439DABF7C10CBE483CD4D0D0F1648A4A3D63420368490EA24DC0651C66408BC434E46C9DC
2,992,502 UART: Caliptra RT
2,992,847 UART: [state] CFI Enabled
3,100,132 UART: [rt] RT listening for mailbox commands...
3,100,802 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,532 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,778 >>> mbox cmd response data (8 bytes)
3,661,779 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,020 UART: [rt]cmd =0x4c4d5356, len=1672
3,978,782 >>> mbox cmd response data (8 bytes)
3,978,783 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,962 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,460 >>> mbox cmd response data (8 bytes)
4,295,461 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,606 UART: [rt]cmd =0x4c4d5356, len=1672
4,607,426 >>> mbox cmd response data (8 bytes)
4,607,427 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,647,788 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,320 >>> mbox cmd response data (8 bytes)
4,919,321 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,959,604 UART: [rt]cmd =0x4c4d5356, len=1672
5,233,643 >>> mbox cmd response data (8 bytes)
5,233,644 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,273,849 UART: [rt]cmd =0x4c4d5356, len=1672
5,545,581 >>> mbox cmd response data (8 bytes)
5,545,582 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,851 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,008 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,056 UART:
192,549 UART: Running Caliptra ROM ...
193,703 UART:
193,855 UART: [state] CFI Enabled
264,738 UART: [state] LifecycleState = Unprovisioned
266,661 UART: [state] DebugLocked = No
269,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,714 UART: [kat] SHA2-256
443,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,910 UART: [kat] ++
454,509 UART: [kat] sha1
465,542 UART: [kat] SHA2-256
468,197 UART: [kat] SHA2-384
473,404 UART: [kat] SHA2-512-ACC
475,769 UART: [kat] ECC-384
2,768,748 UART: [kat] HMAC-384Kdf
2,781,986 UART: [kat] LMS
3,972,276 UART: [kat] --
3,977,782 UART: [cold-reset] ++
3,980,424 UART: [fht] Storing FHT @ 0x50003400
3,991,335 UART: [idev] ++
3,991,910 UART: [idev] CDI.KEYID = 6
3,992,940 UART: [idev] SUBJECT.KEYID = 7
3,994,114 UART: [idev] UDS.KEYID = 0
3,995,148 ready_for_fw is high
3,995,353 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,981 UART: [idev] Erasing UDS.KEYID = 0
7,325,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,776 UART: [idev] --
7,351,951 UART: [ldev] ++
7,352,519 UART: [ldev] CDI.KEYID = 6
7,353,659 UART: [ldev] SUBJECT.KEYID = 5
7,354,766 UART: [ldev] AUTHORITY.KEYID = 7
7,355,944 UART: [ldev] FE.KEYID = 1
7,403,635 UART: [ldev] Erasing FE.KEYID = 1
10,737,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,968 UART: [ldev] --
13,115,989 UART: [fwproc] Waiting for Commands...
13,119,326 UART: [fwproc] Received command 0x46574c44
13,121,508 UART: [fwproc] Received Image of size 114124 bytes
17,184,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,191 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,337,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,653,978 >>> mbox cmd response: success
17,657,997 UART: [afmc] ++
17,658,599 UART: [afmc] CDI.KEYID = 6
17,659,484 UART: [afmc] SUBJECT.KEYID = 7
17,660,758 UART: [afmc] AUTHORITY.KEYID = 5
21,029,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,356 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,660 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,046 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,910 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,359 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,264 UART: [afmc] --
23,401,886 UART: [cold-reset] --
23,404,772 UART: [state] Locking Datavault
23,410,674 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,429 UART: [state] Locking ICCM
23,415,058 UART: [exit] Launching FMC @ 0x40000130
23,423,451 UART:
23,423,682 UART: Running Caliptra FMC ...
23,424,707 UART:
23,424,854 UART: [state] CFI Enabled
23,490,954 UART: [fht] FMC Alias Private Key: 7
25,828,796 UART: [art] Extend RT PCRs Done
25,830,015 UART: [art] Lock RT PCRs Done
25,831,780 UART: [art] Populate DV Done
25,837,191 UART: [fht] FMC Alias Private Key: 7
25,838,841 UART: [art] Derive CDI
25,839,581 UART: [art] Store in in slot 0x4
25,900,297 UART: [art] Derive Key Pair
25,901,338 UART: [art] Store priv key in slot 0x5
29,193,981 UART: [art] Derive Key Pair - Done
29,207,087 UART: [art] Signing Cert with AUTHO
29,208,414 UART: RITY.KEYID = 7
31,496,228 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,734 UART: [art] PUB.X = F15FC02B94E29653738E7C3FE0F4E393FC75E4F32838A5369E7657747B93B681F80305DC18275C545AA82FFF9B291578
31,504,941 UART: [art] PUB.Y = 0C8281D2F2A7AB4A5C18B842DE68361BBCB118ED0B0B0D7F8D43C9F29A6B839CADF15163BA589248DCC95181482B1CB1
31,512,188 UART: [art] SIG.R = F243380CC5B65A26854CBF1B596BE7230CC418D0FCD6AE11D54E2E7C4620DAB1F4D3F39A4B5E4691DF7A166D00BA679C
31,519,592 UART: [art] SIG.S = 8A0C1F3E5A18EBD10AB2B6210986FEACE43A6F419205B46000A4C490BF618FFF4537342F13B82131B248DB9A9CE2C7E1
32,824,674 UART: Caliptra RT
32,825,377 UART: [state] CFI Enabled
32,986,683 UART: [rt] RT listening for mailbox commands...
32,990,640 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,034,877 UART: [rt]cmd =0x4c4d5356, len=1672
34,289,844 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,783,447 ready_for_fw is high
3,784,052 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,190 >>> mbox cmd response: success
23,560,077 UART:
23,560,465 UART: Running Caliptra FMC ...
23,561,603 UART:
23,561,761 UART: [state] CFI Enabled
23,627,966 UART: [fht] FMC Alias Private Key: 7
25,965,192 UART: [art] Extend RT PCRs Done
25,966,418 UART: [art] Lock RT PCRs Done
25,968,000 UART: [art] Populate DV Done
25,973,427 UART: [fht] FMC Alias Private Key: 7
25,975,033 UART: [art] Derive CDI
25,975,855 UART: [art] Store in in slot 0x4
26,035,770 UART: [art] Derive Key Pair
26,036,822 UART: [art] Store priv key in slot 0x5
29,330,184 UART: [art] Derive Key Pair - Done
29,343,665 UART: [art] Signing Cert with AUTHO
29,344,965 UART: RITY.KEYID = 7
31,632,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,880 UART: [art] PUB.X = D3CD7DF94E53AC3FD6172C4CEFCF00AA20D86F373ED293E05C43D5B025B6F8DED32E09A3CDA42998798C91D9E0B639E5
31,641,191 UART: [art] PUB.Y = F462C7D85E2468B2BFB417AC216B3A74AAE5512968BF7B37DC523F563A9C2B35D6410D1F5DD5AA68634FA0AC78E646A0
31,648,428 UART: [art] SIG.R = 16B28A81EE6114653271F92EC7E8A00E89A055CED943909EEB00B290309A403859A216C1535B510E6F3E91A1C4E1CAD6
31,655,764 UART: [art] SIG.S = 4AEE42DA115D137C6241EE0C13D257DD4379357BCCC819D8A2250898CC43E8D70D60CBCD9287B33A3F8F0C5606B5D2D9
32,960,543 UART: Caliptra RT
32,961,269 UART: [state] CFI Enabled
33,123,195 UART: [rt] RT listening for mailbox commands...
33,127,136 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,171,541 UART: [rt]cmd =0x4c4d5356, len=1672
34,426,424 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
192,330 UART:
192,700 UART: Running Caliptra ROM ...
193,887 UART:
603,407 UART: [state] CFI Enabled
618,434 UART: [state] LifecycleState = Unprovisioned
620,314 UART: [state] DebugLocked = No
622,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,646 UART: [kat] SHA2-256
796,388 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,991 UART: [kat] ++
807,436 UART: [kat] sha1
817,236 UART: [kat] SHA2-256
819,961 UART: [kat] SHA2-384
826,803 UART: [kat] SHA2-512-ACC
829,185 UART: [kat] ECC-384
3,113,454 UART: [kat] HMAC-384Kdf
3,124,842 UART: [kat] LMS
4,314,917 UART: [kat] --
4,320,757 UART: [cold-reset] ++
4,323,252 UART: [fht] Storing FHT @ 0x50003400
4,334,940 UART: [idev] ++
4,335,499 UART: [idev] CDI.KEYID = 6
4,336,446 UART: [idev] SUBJECT.KEYID = 7
4,337,682 UART: [idev] UDS.KEYID = 0
4,338,627 ready_for_fw is high
4,338,815 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,169 UART: [idev] Erasing UDS.KEYID = 0
7,626,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,646 UART: [idev] --
7,651,579 UART: [ldev] ++
7,652,171 UART: [ldev] CDI.KEYID = 6
7,653,287 UART: [ldev] SUBJECT.KEYID = 5
7,654,390 UART: [ldev] AUTHORITY.KEYID = 7
7,655,615 UART: [ldev] FE.KEYID = 1
7,669,066 UART: [ldev] Erasing FE.KEYID = 1
10,952,972 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,102 UART: [ldev] --
13,316,735 UART: [fwproc] Waiting for Commands...
13,318,391 UART: [fwproc] Received command 0x46574c44
13,320,623 UART: [fwproc] Received Image of size 114124 bytes
17,378,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,577 >>> mbox cmd response: success
17,843,352 UART: [afmc] ++
17,843,952 UART: [afmc] CDI.KEYID = 6
17,844,860 UART: [afmc] SUBJECT.KEYID = 7
17,846,132 UART: [afmc] AUTHORITY.KEYID = 5
21,160,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,562 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,884 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,765 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,180 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,535 UART: [afmc] --
23,527,969 UART: [cold-reset] --
23,532,313 UART: [state] Locking Datavault
23,538,311 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,028 UART: [state] Locking ICCM
23,541,152 UART: [exit] Launching FMC @ 0x40000130
23,549,544 UART:
23,549,781 UART: Running Caliptra FMC ...
23,550,878 UART:
23,551,035 UART: [state] CFI Enabled
23,559,349 UART: [fht] FMC Alias Private Key: 7
25,890,281 UART: [art] Extend RT PCRs Done
25,891,495 UART: [art] Lock RT PCRs Done
25,893,386 UART: [art] Populate DV Done
25,898,951 UART: [fht] FMC Alias Private Key: 7
25,900,594 UART: [art] Derive CDI
25,901,399 UART: [art] Store in in slot 0x4
25,943,831 UART: [art] Derive Key Pair
25,944,873 UART: [art] Store priv key in slot 0x5
29,186,468 UART: [art] Derive Key Pair - Done
29,199,861 UART: [art] Signing Cert with AUTHO
29,201,191 UART: RITY.KEYID = 7
31,480,222 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,726 UART: [art] PUB.X = 810FA6411DFDA11908B1092B364266D5072E1C866FF2B27E46CA4FF675A3711B641F98F108FF6C690B9A2EB18FDD2937
31,488,951 UART: [art] PUB.Y = A2DACFCA5117DE1CB945F0A989801D3C6BEFD1BBFB551244AA8588F5C9DB44379808C35C614BEFD9A5FBDC82CC4102FC
31,496,228 UART: [art] SIG.R = A6FDF0B8DDED5B246621B4AA7073F82AF4BE22F9936BF6C1F1AEEC2C6FB80C53B34EE0DA52869595B5E88F9E7DDF81A1
31,503,655 UART: [art] SIG.S = 8D59ED091206B11638A026A7D762A548161B3D16FF34824DE0897BB497BB732B3BFC487CD5E580F9FB3614B3EA726634
32,808,639 UART: Caliptra RT
32,809,359 UART: [state] CFI Enabled
32,927,508 UART: [rt] RT listening for mailbox commands...
32,931,509 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,975,923 UART: [rt]cmd =0x4c4d5356, len=1672
34,230,901 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,130,380 ready_for_fw is high
4,130,954 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,059,673 >>> mbox cmd response: success
23,701,815 UART:
23,702,249 UART: Running Caliptra FMC ...
23,703,353 UART:
23,703,502 UART: [state] CFI Enabled
23,711,407 UART: [fht] FMC Alias Private Key: 7
26,042,461 UART: [art] Extend RT PCRs Done
26,043,692 UART: [art] Lock RT PCRs Done
26,045,131 UART: [art] Populate DV Done
26,050,390 UART: [fht] FMC Alias Private Key: 7
26,051,932 UART: [art] Derive CDI
26,052,688 UART: [art] Store in in slot 0x4
26,095,720 UART: [art] Derive Key Pair
26,096,769 UART: [art] Store priv key in slot 0x5
29,338,941 UART: [art] Derive Key Pair - Done
29,352,041 UART: [art] Signing Cert with AUTHO
29,353,374 UART: RITY.KEYID = 7
31,632,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,393 UART: [art] PUB.X = 54BC5938463AF0F67869F62A0A062BF1196B6B969D1CA3E6309537C673E4F45A526C9E7F1C2C92F3227EB7CEE4E35DF9
31,641,681 UART: [art] PUB.Y = F2FEB5D58246AC29C2F3E2DAD62012B78A1AD9EBFAA05F029EAEB1930B559029455A7C802AA9D2EA2BE7E9225E186FEA
31,648,911 UART: [art] SIG.R = 45DCCD54BD3DC249256301B7A1420829ECC74A1EDDACBDDBD46D1A8A81810A860AF1DF599A8F5A6321E6CC0E73963C01
31,656,352 UART: [art] SIG.S = C0BB48163303CB8925C5DD6A0BC18505B291CB5CA8F63C1D4CA0B7BB1AE5D9057A728DFF28997A537DEF9DF240D40F5D
32,961,653 UART: Caliptra RT
32,962,369 UART: [state] CFI Enabled
33,080,076 UART: [rt] RT listening for mailbox commands...
33,084,046 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,128,697 UART: [rt]cmd =0x4c4d5356, len=1672
34,383,694 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,105 UART:
192,478 UART: Running Caliptra ROM ...
193,657 UART:
193,815 UART: [state] CFI Enabled
263,865 UART: [state] LifecycleState = Unprovisioned
265,723 UART: [state] DebugLocked = No
267,186 UART: [state] WD Timer not started. Device not locked for debugging
271,217 UART: [kat] SHA2-256
450,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,916 UART: [kat] ++
462,458 UART: [kat] sha1
474,261 UART: [kat] SHA2-256
477,267 UART: [kat] SHA2-384
483,255 UART: [kat] SHA2-512-ACC
486,194 UART: [kat] ECC-384
2,948,376 UART: [kat] HMAC-384Kdf
2,971,980 UART: [kat] LMS
3,501,491 UART: [kat] --
3,505,061 UART: [cold-reset] ++
3,507,489 UART: [fht] FHT @ 0x50003400
3,517,823 UART: [idev] ++
3,518,401 UART: [idev] CDI.KEYID = 6
3,519,432 UART: [idev] SUBJECT.KEYID = 7
3,520,531 UART: [idev] UDS.KEYID = 0
3,521,468 ready_for_fw is high
3,521,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,712 UART: [idev] Erasing UDS.KEYID = 0
6,024,646 UART: [idev] Sha1 KeyId Algorithm
6,046,155 UART: [idev] --
6,049,503 UART: [ldev] ++
6,050,070 UART: [ldev] CDI.KEYID = 6
6,050,985 UART: [ldev] SUBJECT.KEYID = 5
6,052,142 UART: [ldev] AUTHORITY.KEYID = 7
6,053,425 UART: [ldev] FE.KEYID = 1
6,101,345 UART: [ldev] Erasing FE.KEYID = 1
8,603,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,176 UART: [ldev] --
10,414,281 UART: [fwproc] Wait for Commands...
10,416,089 UART: [fwproc] Recv command 0x46574c44
10,418,134 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,466 >>> mbox cmd response: success
14,287,409 UART: [afmc] ++
14,287,999 UART: [afmc] CDI.KEYID = 6
14,288,885 UART: [afmc] SUBJECT.KEYID = 7
14,290,097 UART: [afmc] AUTHORITY.KEYID = 5
16,829,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,167 UART: [afmc] --
18,631,792 UART: [cold-reset] --
18,634,782 UART: [state] Locking Datavault
18,641,915 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,554 UART: [state] Locking ICCM
18,645,847 UART: [exit] Launching FMC @ 0x40000130
18,654,304 UART:
18,654,574 UART: Running Caliptra FMC ...
18,655,603 UART:
18,655,752 UART: [state] CFI Enabled
18,713,623 UART: [fht] FMC Alias Private Key: 7
20,477,922 UART: [art] Extend RT PCRs Done
20,479,140 UART: [art] Lock RT PCRs Done
20,480,953 UART: [art] Populate DV Done
20,486,414 UART: [fht] FMC Alias Private Key: 7
20,487,997 UART: [art] Derive CDI
20,488,729 UART: [art] Store in in slot 0x4
20,545,598 UART: [art] Derive Key Pair
20,546,636 UART: [art] Store priv key in slot 0x5
23,009,827 UART: [art] Derive Key Pair - Done
23,022,553 UART: [art] Signing Cert with AUTHO
23,023,850 UART: RITY.KEYID = 7
24,735,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,768 UART: [art] PUB.X = 13144C00B5E861EBCA74B3551BB4A2DA8A86E7CCA600DC2B4132AFB0AF0605C9CE0F4D3DBE7F41D3D615E8177F61A2F5
24,744,004 UART: [art] PUB.Y = 1F297BC7317272372A2F7E4119388846EF6BE977195867F6D71D0C26324D86A2BDECE4B06C5E1C5D3A32E1B3001F2FD3
24,751,240 UART: [art] SIG.R = 42309DCCC54AD15645878080B6B15A6D5848679B764FE0D71DF22DB9A1D9A440BCA17E87AE9D27AB3A9599FF86C7623F
24,758,627 UART: [art] SIG.S = D13B62FC0C70B5A4D727095CAF045132889C6D4E56BC2565D1AFC288DF30847DF5247ED2A32344E6DD45A29B07083262
25,737,420 UART: Caliptra RT
25,738,135 UART: [state] CFI Enabled
25,902,613 UART: [rt] RT listening for mailbox commands...
25,906,565 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,951,516 UART: [rt]cmd =0x4c4d5356, len=1672
26,373,826 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,373,908 ready_for_fw is high
3,374,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,455 >>> mbox cmd response: success
18,361,806 UART:
18,362,198 UART: Running Caliptra FMC ...
18,363,307 UART:
18,363,460 UART: [state] CFI Enabled
18,428,567 UART: [fht] FMC Alias Private Key: 7
20,192,485 UART: [art] Extend RT PCRs Done
20,193,718 UART: [art] Lock RT PCRs Done
20,195,080 UART: [art] Populate DV Done
20,200,467 UART: [fht] FMC Alias Private Key: 7
20,202,170 UART: [art] Derive CDI
20,202,986 UART: [art] Store in in slot 0x4
20,261,164 UART: [art] Derive Key Pair
20,262,164 UART: [art] Store priv key in slot 0x5
22,724,893 UART: [art] Derive Key Pair - Done
22,737,897 UART: [art] Signing Cert with AUTHO
22,739,201 UART: RITY.KEYID = 7
24,451,238 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,741 UART: [art] PUB.X = A68CF3C1D01A5495C291362D1426DCD6CE091DC65C4259F34397F79A98DDE1AACDA15CC6E8BB60149F0FBAF91531D0C6
24,460,054 UART: [art] PUB.Y = 53016B238AC53A17DCCE89F0B3216357732556C4B79DAD96FA046B22C83C7898DE5FDE6C579F0E69B4688F2D98946189
24,467,283 UART: [art] SIG.R = 8F83A8611EF860DE3B1D7BD718ECFF32B8434531EA9CADB249C1E288D75B72554C22F1935F06AB4BA5D260513F8411F3
24,474,683 UART: [art] SIG.S = DE9EEDF6C565C4DE7335C5935E72B16A24E828A6BC7DFA14240D7F7560C5049A8F52980799A9057C5D4FB57B7ECB86DC
25,453,440 UART: Caliptra RT
25,454,139 UART: [state] CFI Enabled
25,619,150 UART: [rt] RT listening for mailbox commands...
25,623,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,668,314 UART: [rt]cmd =0x4c4d5356, len=1672
26,090,825 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,264 UART:
192,637 UART: Running Caliptra ROM ...
193,831 UART:
603,521 UART: [state] CFI Enabled
619,042 UART: [state] LifecycleState = Unprovisioned
620,944 UART: [state] DebugLocked = No
622,174 UART: [state] WD Timer not started. Device not locked for debugging
625,910 UART: [kat] SHA2-256
805,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,654 UART: [kat] ++
817,095 UART: [kat] sha1
828,031 UART: [kat] SHA2-256
831,025 UART: [kat] SHA2-384
836,507 UART: [kat] SHA2-512-ACC
839,461 UART: [kat] ECC-384
3,280,757 UART: [kat] HMAC-384Kdf
3,292,636 UART: [kat] LMS
3,822,134 UART: [kat] --
3,825,009 UART: [cold-reset] ++
3,827,656 UART: [fht] FHT @ 0x50003400
3,838,697 UART: [idev] ++
3,839,259 UART: [idev] CDI.KEYID = 6
3,840,281 UART: [idev] SUBJECT.KEYID = 7
3,841,371 UART: [idev] UDS.KEYID = 0
3,842,408 ready_for_fw is high
3,842,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,312 UART: [idev] Erasing UDS.KEYID = 0
6,316,642 UART: [idev] Sha1 KeyId Algorithm
6,340,998 UART: [idev] --
6,344,984 UART: [ldev] ++
6,345,560 UART: [ldev] CDI.KEYID = 6
6,346,438 UART: [ldev] SUBJECT.KEYID = 5
6,347,587 UART: [ldev] AUTHORITY.KEYID = 7
6,348,922 UART: [ldev] FE.KEYID = 1
6,358,909 UART: [ldev] Erasing FE.KEYID = 1
8,834,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,060 UART: [ldev] --
10,629,545 UART: [fwproc] Wait for Commands...
10,632,609 UART: [fwproc] Recv command 0x46574c44
10,634,691 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,996 >>> mbox cmd response: success
14,502,184 UART: [afmc] ++
14,502,767 UART: [afmc] CDI.KEYID = 6
14,503,676 UART: [afmc] SUBJECT.KEYID = 7
14,504,831 UART: [afmc] AUTHORITY.KEYID = 5
17,003,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,890 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,535 UART: [afmc] --
18,803,158 UART: [cold-reset] --
18,807,334 UART: [state] Locking Datavault
18,814,463 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,117 UART: [state] Locking ICCM
18,817,774 UART: [exit] Launching FMC @ 0x40000130
18,826,163 UART:
18,826,389 UART: Running Caliptra FMC ...
18,827,482 UART:
18,827,634 UART: [state] CFI Enabled
18,835,781 UART: [fht] FMC Alias Private Key: 7
20,592,479 UART: [art] Extend RT PCRs Done
20,593,696 UART: [art] Lock RT PCRs Done
20,595,475 UART: [art] Populate DV Done
20,600,876 UART: [fht] FMC Alias Private Key: 7
20,602,571 UART: [art] Derive CDI
20,603,375 UART: [art] Store in in slot 0x4
20,645,908 UART: [art] Derive Key Pair
20,646,940 UART: [art] Store priv key in slot 0x5
23,074,142 UART: [art] Derive Key Pair - Done
23,086,939 UART: [art] Signing Cert with AUTHO
23,088,242 UART: RITY.KEYID = 7
24,793,766 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,268 UART: [art] PUB.X = 5692242CB461AB15863141352A6D79E020A62E022B0A5C28E472D9EF415E65BDBA8F7333930D6121823813B014643FA4
24,802,522 UART: [art] PUB.Y = 922FCE5A3420F112C9D15FB8EDE5BCA0758ED8F0CA93243AF4F2C86F749D2245A8DEB238EA60232FAABB0F0E39C52AC8
24,809,789 UART: [art] SIG.R = 88B72960BE3CE08A0F48263CC60920A357B980BCD32CC36766D18C4470EB4F0D7DA149634FF3B93CA9685F8E08638417
24,817,161 UART: [art] SIG.S = 02C1F775880F6C56F3A82F4E1529AB1776C4CBF657A83E5832CC4C81083A7E564ED72F1A65ADE7161D654050CF57D0E8
25,795,802 UART: Caliptra RT
25,796,513 UART: [state] CFI Enabled
25,913,676 UART: [rt] RT listening for mailbox commands...
25,917,693 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,961,915 UART: [rt]cmd =0x4c4d5356, len=1672
26,384,236 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,698,878 ready_for_fw is high
3,699,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,610 >>> mbox cmd response: success
18,530,750 UART:
18,531,209 UART: Running Caliptra FMC ...
18,532,314 UART:
18,532,464 UART: [state] CFI Enabled
18,540,188 UART: [fht] FMC Alias Private Key: 7
20,296,764 UART: [art] Extend RT PCRs Done
20,297,980 UART: [art] Lock RT PCRs Done
20,299,875 UART: [art] Populate DV Done
20,305,284 UART: [fht] FMC Alias Private Key: 7
20,306,822 UART: [art] Derive CDI
20,307,627 UART: [art] Store in in slot 0x4
20,350,224 UART: [art] Derive Key Pair
20,351,264 UART: [art] Store priv key in slot 0x5
22,777,813 UART: [art] Derive Key Pair - Done
22,791,080 UART: [art] Signing Cert with AUTHO
22,792,404 UART: RITY.KEYID = 7
24,497,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,172 UART: [art] PUB.X = CA41BB96DE507FFDF9D4E47C561EE5AF72C10FBAA83316855505AB389A023E5AD087C1C74BCCA73B4231F673E3EA37BB
24,506,530 UART: [art] PUB.Y = F65D52E4019B65EE25B7C6EF674141665CDB903927407A63051A58036DA69B330B0AB0076475A4197EDFF1427BD0B014
24,513,722 UART: [art] SIG.R = 9A1680462DD3EF1DE9897C52B6ED1372F8BBD9EB9A29EF69592D7610613A0CC6528CE046A59A5462CE61649A5C11D9B4
24,521,098 UART: [art] SIG.S = AC61FB9804D9EA9F6E0C7E38EF63F812BA05DB232513CE55818FCE9DC32BBDA799AD65CAAE01B9D6C86D8B0E97113E95
25,500,380 UART: Caliptra RT
25,501,074 UART: [state] CFI Enabled
25,618,508 UART: [rt] RT listening for mailbox commands...
25,622,605 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,667,073 UART: [rt]cmd =0x4c4d5356, len=1672
26,089,619 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,127 UART:
192,489 UART: Running Caliptra ROM ...
193,680 UART:
193,834 UART: [state] CFI Enabled
266,236 UART: [state] LifecycleState = Unprovisioned
268,657 UART: [state] DebugLocked = No
271,258 UART: [state] WD Timer not started. Device not locked for debugging
275,862 UART: [kat] SHA2-256
465,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,469 UART: [kat] ++
477,000 UART: [kat] sha1
487,815 UART: [kat] SHA2-256
490,822 UART: [kat] SHA2-384
496,522 UART: [kat] SHA2-512-ACC
499,117 UART: [kat] ECC-384
2,949,753 UART: [kat] HMAC-384Kdf
2,974,348 UART: [kat] LMS
3,506,069 UART: [kat] --
3,510,374 UART: [cold-reset] ++
3,511,665 UART: [fht] FHT @ 0x50003400
3,523,632 UART: [idev] ++
3,524,338 UART: [idev] CDI.KEYID = 6
3,525,370 UART: [idev] SUBJECT.KEYID = 7
3,526,469 UART: [idev] UDS.KEYID = 0
3,527,539 ready_for_fw is high
3,527,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,680 UART: [idev] Erasing UDS.KEYID = 0
6,033,482 UART: [idev] Sha1 KeyId Algorithm
6,054,495 UART: [idev] --
6,058,518 UART: [ldev] ++
6,059,228 UART: [ldev] CDI.KEYID = 6
6,060,152 UART: [ldev] SUBJECT.KEYID = 5
6,061,316 UART: [ldev] AUTHORITY.KEYID = 7
6,062,495 UART: [ldev] FE.KEYID = 1
6,102,144 UART: [ldev] Erasing FE.KEYID = 1
8,604,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,855 UART: [ldev] --
10,414,708 UART: [fwproc] Wait for Commands...
10,417,179 UART: [fwproc] Recv command 0x46574c44
10,419,483 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,891 >>> mbox cmd response: success
14,603,762 UART: [afmc] ++
14,604,471 UART: [afmc] CDI.KEYID = 6
14,605,654 UART: [afmc] SUBJECT.KEYID = 7
14,607,141 UART: [afmc] AUTHORITY.KEYID = 5
17,153,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,117 UART: [afmc] --
18,949,726 UART: [cold-reset] --
18,953,647 UART: [state] Locking Datavault
18,959,330 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,548 UART: [state] Locking ICCM
18,963,755 UART: [exit] Launching FMC @ 0x40000130
18,972,427 UART:
18,972,657 UART: Running Caliptra FMC ...
18,973,753 UART:
18,973,910 UART: [state] CFI Enabled
19,032,375 UART: [fht] FMC Alias Private Key: 7
20,796,598 UART: [art] Extend RT PCRs Done
20,797,813 UART: [art] Lock RT PCRs Done
20,799,383 UART: [art] Populate DV Done
20,804,850 UART: [fht] FMC Alias Private Key: 7
20,806,449 UART: [art] Derive CDI
20,807,262 UART: [art] Store in in slot 0x4
20,864,307 UART: [art] Derive Key Pair
20,865,347 UART: [art] Store priv key in slot 0x5
23,328,245 UART: [art] Derive Key Pair - Done
23,341,300 UART: [art] Signing Cert with AUTHO
23,342,634 UART: RITY.KEYID = 7
25,053,785 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,301 UART: [art] PUB.X = 8DF7D3555613520ABD7C2C5A4C2A5DC89FD685B0ECC981227AC4C8872E2D03D8549570B2E9EBE7E815F0C377BBC5D0E1
25,062,548 UART: [art] PUB.Y = 8CD251A59A43C1A75FC4438C2DDE7704D78F3F57BC77790A7569FEF2CFF3C864AEA91103C4F6B28DA907943A9758511F
25,069,827 UART: [art] SIG.R = 6147EEBBBE7B19F27A1740E42FB28B2C6EFC8D742C224A56B8CDC3EE042FBCEAA1EFF5D8ED0951D248298DE7C960FE3F
25,077,266 UART: [art] SIG.S = BC64082FA6D767549E33689616A12FEFED05217D2D38EE058A49762F1888C12C8740EF757ECB7638D7A8394C94435D26
26,056,386 UART: Caliptra RT
26,057,079 UART: [state] CFI Enabled
26,220,967 UART: [rt] RT listening for mailbox commands...
26,224,863 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,270,002 UART: [rt]cmd =0x4c4d5356, len=1672
26,692,386 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,439,572 ready_for_fw is high
3,440,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,721,177 >>> mbox cmd response: success
19,001,430 UART:
19,001,838 UART: Running Caliptra FMC ...
19,003,005 UART:
19,003,185 UART: [state] CFI Enabled
19,070,643 UART: [fht] FMC Alias Private Key: 7
20,834,821 UART: [art] Extend RT PCRs Done
20,836,038 UART: [art] Lock RT PCRs Done
20,837,609 UART: [art] Populate DV Done
20,843,238 UART: [fht] FMC Alias Private Key: 7
20,844,889 UART: [art] Derive CDI
20,845,706 UART: [art] Store in in slot 0x4
20,903,294 UART: [art] Derive Key Pair
20,904,342 UART: [art] Store priv key in slot 0x5
23,366,754 UART: [art] Derive Key Pair - Done
23,379,634 UART: [art] Signing Cert with AUTHO
23,380,933 UART: RITY.KEYID = 7
25,093,402 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,928 UART: [art] PUB.X = F18DBCC9B02F92697B90B76C45320F56FDF35F605C79C0870A3BB4210053BA3AA2AFECAEC2640FF3C61143967E7B56EB
25,102,178 UART: [art] PUB.Y = 9108CB38EC835F6C5762C4363B0B58EBEB7C6130DD030B71CF4FFC2A14DA6DFC19AF1CD1BC35A04F2241150EEC7ECF3A
25,109,426 UART: [art] SIG.R = B4C137E4EF38E211AC5F61EC56A2E908AF52774454D340BA4887B4FB0E50A389DAAE835ABD7C10EEF07CDC66145606A3
25,116,811 UART: [art] SIG.S = 9070173CD3F1D9AD6703419C09DD5F3A7D2E5E23AADC2370C74A5D7BAE707AA9AB1D1E2EE153D2BEBFF9050B452F3001
26,096,213 UART: Caliptra RT
26,096,904 UART: [state] CFI Enabled
26,260,784 UART: [rt] RT listening for mailbox commands...
26,264,771 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,309,812 UART: [rt]cmd =0x4c4d5356, len=1672
26,732,323 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
193,518 UART:
193,878 UART: Running Caliptra ROM ...
194,983 UART:
604,614 UART: [state] CFI Enabled
619,548 UART: [state] LifecycleState = Unprovisioned
621,920 UART: [state] DebugLocked = No
624,720 UART: [state] WD Timer not started. Device not locked for debugging
630,016 UART: [kat] SHA2-256
819,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,686 UART: [kat] ++
831,227 UART: [kat] sha1
842,166 UART: [kat] SHA2-256
845,165 UART: [kat] SHA2-384
851,215 UART: [kat] SHA2-512-ACC
853,797 UART: [kat] ECC-384
3,297,063 UART: [kat] HMAC-384Kdf
3,309,546 UART: [kat] LMS
3,841,324 UART: [kat] --
3,846,297 UART: [cold-reset] ++
3,848,704 UART: [fht] FHT @ 0x50003400
3,860,612 UART: [idev] ++
3,861,240 UART: [idev] CDI.KEYID = 6
3,862,266 UART: [idev] SUBJECT.KEYID = 7
3,863,429 UART: [idev] UDS.KEYID = 0
3,864,350 ready_for_fw is high
3,864,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,391 UART: [idev] Erasing UDS.KEYID = 0
6,343,926 UART: [idev] Sha1 KeyId Algorithm
6,367,471 UART: [idev] --
6,372,318 UART: [ldev] ++
6,372,987 UART: [ldev] CDI.KEYID = 6
6,373,907 UART: [ldev] SUBJECT.KEYID = 5
6,375,056 UART: [ldev] AUTHORITY.KEYID = 7
6,376,282 UART: [ldev] FE.KEYID = 1
6,390,376 UART: [ldev] Erasing FE.KEYID = 1
8,868,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,588,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,618,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,633,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,654,378 UART: [ldev] --
10,659,969 UART: [fwproc] Wait for Commands...
10,663,129 UART: [fwproc] Recv command 0x46574c44
10,665,423 UART: [fwproc] Recv'd Img size: 114448 bytes
14,119,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,197,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,313,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,856,765 >>> mbox cmd response: success
14,861,726 UART: [afmc] ++
14,862,436 UART: [afmc] CDI.KEYID = 6
14,863,684 UART: [afmc] SUBJECT.KEYID = 7
14,865,119 UART: [afmc] AUTHORITY.KEYID = 5
17,369,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,091,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,093,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,108,565 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,123,872 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,138,751 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,162,201 UART: [afmc] --
19,165,414 UART: [cold-reset] --
19,171,212 UART: [state] Locking Datavault
19,177,810 UART: [state] Locking PCR0, PCR1 and PCR31
19,180,003 UART: [state] Locking ICCM
19,182,129 UART: [exit] Launching FMC @ 0x40000130
19,190,803 UART:
19,191,031 UART: Running Caliptra FMC ...
19,192,122 UART:
19,192,274 UART: [state] CFI Enabled
19,200,579 UART: [fht] FMC Alias Private Key: 7
20,956,931 UART: [art] Extend RT PCRs Done
20,958,145 UART: [art] Lock RT PCRs Done
20,959,574 UART: [art] Populate DV Done
20,965,143 UART: [fht] FMC Alias Private Key: 7
20,966,883 UART: [art] Derive CDI
20,967,623 UART: [art] Store in in slot 0x4
21,009,996 UART: [art] Derive Key Pair
21,010,991 UART: [art] Store priv key in slot 0x5
23,437,368 UART: [art] Derive Key Pair - Done
23,450,137 UART: [art] Signing Cert with AUTHO
23,451,483 UART: RITY.KEYID = 7
25,156,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,985 UART: [art] PUB.X = F57D3921F77D2C1BC001BD394603789ABAD64A79732C18B7AEC67494B42912E8760DE15DC97EC34314CD9FCC62E9D81D
25,165,263 UART: [art] PUB.Y = 647CB6A144BE51FB1BA32D098AD3D437CF73877A16A34601F1FEEB822E7FD5833288363ED2AC12696DB8C97BDA7163F8
25,172,575 UART: [art] SIG.R = AEBB3188069E89F1DCFC0AEA10B547E4D47338AEF962AFA760B498FB490E8AA6A0A0F62087120827FE74682A3E602A05
25,179,947 UART: [art] SIG.S = 04B0037195E9E9E3AAD5DEDC992921394FE1D797F19FA161E498DA011C3155C5A9B5FCF268461F17E0970038B8CE9C17
26,158,576 UART: Caliptra RT
26,159,263 UART: [state] CFI Enabled
26,275,789 UART: [rt] RT listening for mailbox commands...
26,279,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,324,312 UART: [rt]cmd =0x4c4d5356, len=1672
26,746,763 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,752,682 ready_for_fw is high
3,753,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,448 >>> mbox cmd response: success
19,203,302 UART:
19,203,674 UART: Running Caliptra FMC ...
19,204,806 UART:
19,204,956 UART: [state] CFI Enabled
19,213,097 UART: [fht] FMC Alias Private Key: 7
20,969,829 UART: [art] Extend RT PCRs Done
20,971,052 UART: [art] Lock RT PCRs Done
20,972,568 UART: [art] Populate DV Done
20,977,879 UART: [fht] FMC Alias Private Key: 7
20,979,416 UART: [art] Derive CDI
20,980,245 UART: [art] Store in in slot 0x4
21,022,738 UART: [art] Derive Key Pair
21,023,785 UART: [art] Store priv key in slot 0x5
23,450,723 UART: [art] Derive Key Pair - Done
23,463,837 UART: [art] Signing Cert with AUTHO
23,465,170 UART: RITY.KEYID = 7
25,170,792 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,301 UART: [art] PUB.X = 998F16D5F0716F60DF822DECDE3EC7252F669154A32D8F99B7DC8A142EF9F59046DD398F44F77F32DF3F043ABB3300C9
25,179,509 UART: [art] PUB.Y = A1555B924DD3C68CD1E53DF585DFBF433EEA46B1E058C678C9FB80DAC824347A494EFFE70DCEFB3A7D12E5CE09805E9C
25,186,849 UART: [art] SIG.R = 3654FB802B481E78D82ABDF20C57C8EC339ECD0917C0D0AA25F0BFA5FB1DD31C71C9F74EA635C3740F6CB52BAED2E2E3
25,194,276 UART: [art] SIG.S = 4D85A266F6F8AF2333ADC23627C57AAC2C1F5A64A598E8DA8554B779E833BCE5D2D44D0D389F9265506601FF17B10F91
26,173,898 UART: Caliptra RT
26,174,610 UART: [state] CFI Enabled
26,291,594 UART: [rt] RT listening for mailbox commands...
26,295,543 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,340,161 UART: [rt]cmd =0x4c4d5356, len=1672
26,762,425 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,587 UART: [kat] SHA2-256
881,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,633 UART: [kat] ++
885,785 UART: [kat] sha1
890,007 UART: [kat] SHA2-256
891,945 UART: [kat] SHA2-384
894,680 UART: [kat] SHA2-512-ACC
896,581 UART: [kat] ECC-384
901,982 UART: [kat] HMAC-384Kdf
906,690 UART: [kat] LMS
1,474,886 UART: [kat] --
1,475,729 UART: [cold-reset] ++
1,476,299 UART: [fht] Storing FHT @ 0x50003400
1,479,148 UART: [idev] ++
1,479,316 UART: [idev] CDI.KEYID = 6
1,479,676 UART: [idev] SUBJECT.KEYID = 7
1,480,100 UART: [idev] UDS.KEYID = 0
1,480,445 ready_for_fw is high
1,480,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,160 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,632 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,520,959 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,392 UART: [ldev] --
1,585,811 UART: [fwproc] Waiting for Commands...
1,586,610 UART: [fwproc] Received command 0x46574c44
1,587,401 UART: [fwproc] Received Image of size 114448 bytes
2,887,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,635 >>> mbox cmd response: success
3,080,691 UART: [afmc] ++
3,080,859 UART: [afmc] CDI.KEYID = 6
3,081,221 UART: [afmc] SUBJECT.KEYID = 7
3,081,646 UART: [afmc] AUTHORITY.KEYID = 5
3,117,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,819 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,599 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,212 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,902 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,989 UART: [afmc] --
3,160,935 UART: [cold-reset] --
3,161,745 UART: [state] Locking Datavault
3,163,006 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,610 UART: [state] Locking ICCM
3,164,056 UART: [exit] Launching FMC @ 0x40000130
3,169,385 UART:
3,169,401 UART: Running Caliptra FMC ...
3,169,809 UART:
3,169,863 UART: [state] CFI Enabled
3,180,176 UART: [fht] FMC Alias Private Key: 7
3,287,951 UART: [art] Extend RT PCRs Done
3,288,379 UART: [art] Lock RT PCRs Done
3,289,973 UART: [art] Populate DV Done
3,298,328 UART: [fht] FMC Alias Private Key: 7
3,299,458 UART: [art] Derive CDI
3,299,738 UART: [art] Store in in slot 0x4
3,385,297 UART: [art] Derive Key Pair
3,385,657 UART: [art] Store priv key in slot 0x5
3,399,219 UART: [art] Derive Key Pair - Done
3,413,912 UART: [art] Signing Cert with AUTHO
3,414,392 UART: RITY.KEYID = 7
3,429,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,961 UART: [art] PUB.X = 13AE551E96FF5FC5452DE0114D05C62365A9486DCBF7D688C60AB26424ACF7FC9D5C49763EC68896C419083742868F89
3,436,722 UART: [art] PUB.Y = FAF83D470785D91F1EE1195E58B187A647C50756E35402EB2BB36B73B61E0BFBA48FD475F7D4494CB5A850FC8BC82A3A
3,443,672 UART: [art] SIG.R = 1DE9456A478689BC0C22A8C25398FBEBACFA59730DD39286E2349A9DFDF64FC090C8AFAFF9B575F8F43B7F54025CEA49
3,450,451 UART: [art] SIG.S = DEED0EB4FFA01F6D0FE91F78D3D7DADBA9C13F5B655DEBB088F4E335D956A466CBC074B9D9C4C9902796A0DE3ABAEF3B
3,474,452 UART: Caliptra RT
3,474,705 UART: [state] CFI Enabled
3,582,416 UART: [rt] RT listening for mailbox commands...
3,583,086 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,586 UART: [rt]cmd =0x4c4d5356, len=1672
4,153,425 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,791 ready_for_fw is high
1,362,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,695 >>> mbox cmd response: success
2,990,817 UART:
2,990,833 UART: Running Caliptra FMC ...
2,991,241 UART:
2,991,295 UART: [state] CFI Enabled
3,001,642 UART: [fht] FMC Alias Private Key: 7
3,109,529 UART: [art] Extend RT PCRs Done
3,109,957 UART: [art] Lock RT PCRs Done
3,111,661 UART: [art] Populate DV Done
3,119,736 UART: [fht] FMC Alias Private Key: 7
3,120,884 UART: [art] Derive CDI
3,121,164 UART: [art] Store in in slot 0x4
3,206,485 UART: [art] Derive Key Pair
3,206,845 UART: [art] Store priv key in slot 0x5
3,219,883 UART: [art] Derive Key Pair - Done
3,234,543 UART: [art] Signing Cert with AUTHO
3,235,023 UART: RITY.KEYID = 7
3,250,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,804 UART: [art] PUB.X = 4AA3F7D896BF8C23C68BABD69DEBE2C960C916C9763713EF75014EA88B5A66BC8AF516F33A65D6E8567BE5B28E6424F4
3,257,585 UART: [art] PUB.Y = 8FA6ECDEED1CF7ADBF9413996E9F1FE044E16A46531500414F9287AC3B2AE9CEF51E25B51B40E6920644BC85CAD18056
3,264,524 UART: [art] SIG.R = 48C507C184E5452C8E424D0FB9B602928F0A16E89447C40EF7A34F5E8A0E895594EDD3450D15E010653E1587306C9D63
3,271,267 UART: [art] SIG.S = ED0FB8456F5566332C6E3AA9DF693DDBD196D0981DE7A93AC864F60A6A0284B779F4B3029F22C31F14204527FAF1C170
3,295,360 UART: Caliptra RT
3,295,613 UART: [state] CFI Enabled
3,403,840 UART: [rt] RT listening for mailbox commands...
3,404,510 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,184 UART: [rt]cmd =0x4c4d5356, len=1672
3,975,203 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,846 UART: [kat] SHA2-256
881,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,892 UART: [kat] ++
886,044 UART: [kat] sha1
890,258 UART: [kat] SHA2-256
892,196 UART: [kat] SHA2-384
895,069 UART: [kat] SHA2-512-ACC
896,970 UART: [kat] ECC-384
902,621 UART: [kat] HMAC-384Kdf
907,061 UART: [kat] LMS
1,475,257 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,846 UART: [fht] Storing FHT @ 0x50003400
1,479,857 UART: [idev] ++
1,480,025 UART: [idev] CDI.KEYID = 6
1,480,385 UART: [idev] SUBJECT.KEYID = 7
1,480,809 UART: [idev] UDS.KEYID = 0
1,481,154 ready_for_fw is high
1,481,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,111 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,480 UART: [ldev] ++
1,515,648 UART: [ldev] CDI.KEYID = 6
1,516,011 UART: [ldev] SUBJECT.KEYID = 5
1,516,437 UART: [ldev] AUTHORITY.KEYID = 7
1,516,900 UART: [ldev] FE.KEYID = 1
1,522,140 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,661 UART: [ldev] --
1,587,140 UART: [fwproc] Waiting for Commands...
1,587,841 UART: [fwproc] Received command 0x46574c44
1,588,632 UART: [fwproc] Received Image of size 114448 bytes
2,887,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,918 >>> mbox cmd response: success
3,081,012 UART: [afmc] ++
3,081,180 UART: [afmc] CDI.KEYID = 6
3,081,542 UART: [afmc] SUBJECT.KEYID = 7
3,081,967 UART: [afmc] AUTHORITY.KEYID = 5
3,117,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,479 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,169 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,934 UART: [afmc] --
3,160,932 UART: [cold-reset] --
3,161,492 UART: [state] Locking Datavault
3,162,649 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,253 UART: [state] Locking ICCM
3,163,925 UART: [exit] Launching FMC @ 0x40000130
3,169,254 UART:
3,169,270 UART: Running Caliptra FMC ...
3,169,678 UART:
3,169,821 UART: [state] CFI Enabled
3,180,284 UART: [fht] FMC Alias Private Key: 7
3,288,639 UART: [art] Extend RT PCRs Done
3,289,067 UART: [art] Lock RT PCRs Done
3,290,719 UART: [art] Populate DV Done
3,298,882 UART: [fht] FMC Alias Private Key: 7
3,299,852 UART: [art] Derive CDI
3,300,132 UART: [art] Store in in slot 0x4
3,386,051 UART: [art] Derive Key Pair
3,386,411 UART: [art] Store priv key in slot 0x5
3,399,461 UART: [art] Derive Key Pair - Done
3,414,288 UART: [art] Signing Cert with AUTHO
3,414,768 UART: RITY.KEYID = 7
3,429,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,427 UART: [art] PUB.X = 6BFB67F41B1A4B8F1019A1789AB684626DBBF142ECC091D11F807EEC1283D353BC907BFC645452C2AA63F3393B12E89B
3,437,207 UART: [art] PUB.Y = 9EF50D077C0FE71863839D37D97FD8C15A73908CBB292A2CED21B148D48D820C45082210262C464C0B03CD40591B4548
3,444,132 UART: [art] SIG.R = 883A800719EC9A99F0577E72B35BE8BC10FF1CD98C170E1B04D589C355492ECA7DEAB061270C941E71F3EA9740CA2981
3,450,896 UART: [art] SIG.S = 815BCC011780395F72D1ABCF71A1509B62F79CCDFCC456C3C173B369F877DF26886BC843025E78C9B6ACB002B416DF34
3,474,808 UART: Caliptra RT
3,475,153 UART: [state] CFI Enabled
3,582,959 UART: [rt] RT listening for mailbox commands...
3,583,629 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,113 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,224 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,180 ready_for_fw is high
1,363,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,292 >>> mbox cmd response: success
2,993,184 UART:
2,993,200 UART: Running Caliptra FMC ...
2,993,608 UART:
2,993,751 UART: [state] CFI Enabled
3,004,664 UART: [fht] FMC Alias Private Key: 7
3,112,405 UART: [art] Extend RT PCRs Done
3,112,833 UART: [art] Lock RT PCRs Done
3,114,403 UART: [art] Populate DV Done
3,122,526 UART: [fht] FMC Alias Private Key: 7
3,123,476 UART: [art] Derive CDI
3,123,756 UART: [art] Store in in slot 0x4
3,209,029 UART: [art] Derive Key Pair
3,209,389 UART: [art] Store priv key in slot 0x5
3,222,803 UART: [art] Derive Key Pair - Done
3,238,033 UART: [art] Signing Cert with AUTHO
3,238,513 UART: RITY.KEYID = 7
3,253,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,602 UART: [art] PUB.X = 5C840AEE3F9B905854CCB47435FB00CFB2F47D4A751C5B8562C2A4B9441FC5B765513B6ECE11B1FE4441E63A8ECF2E39
3,261,361 UART: [art] PUB.Y = FB3D5B909E9EFE92F45294B66A5CD46FECED3F81EF126C880525C7C8749012202C49AA9C69AAF9B2CD0669DE729A58A8
3,268,319 UART: [art] SIG.R = 3BDD42B847E0B7760DD7AD1090123893DBF884457DA3A174B56F4F57D274BBB4632F8E074D809EA3EC7387B67BADB18A
3,275,093 UART: [art] SIG.S = 7A5D6F652BC84F4EE5B1DBDA767EE4E05898F5F431FCD3F6B9D66F1039C21DA6B3D1E8228CB8FF4506E75362A107E087
3,299,390 UART: Caliptra RT
3,299,735 UART: [state] CFI Enabled
3,407,977 UART: [rt] RT listening for mailbox commands...
3,408,647 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,485 UART: [rt]cmd =0x4c4d5356, len=1672
3,979,182 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
893,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,245 UART: [kat] ++
897,397 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,098 UART: [kat] SHA2-512-ACC
907,999 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,417 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,452 UART: [idev] ++
1,174,620 UART: [idev] CDI.KEYID = 6
1,174,980 UART: [idev] SUBJECT.KEYID = 7
1,175,404 UART: [idev] UDS.KEYID = 0
1,175,749 ready_for_fw is high
1,175,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,187 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,744 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,076 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,442 >>> mbox cmd response: success
2,775,700 UART: [afmc] ++
2,775,868 UART: [afmc] CDI.KEYID = 6
2,776,230 UART: [afmc] SUBJECT.KEYID = 7
2,776,655 UART: [afmc] AUTHORITY.KEYID = 5
2,811,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,551 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,377 UART: [afmc] --
2,855,481 UART: [cold-reset] --
2,856,183 UART: [state] Locking Datavault
2,857,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,018 UART: [state] Locking ICCM
2,858,608 UART: [exit] Launching FMC @ 0x40000130
2,863,937 UART:
2,863,953 UART: Running Caliptra FMC ...
2,864,361 UART:
2,864,415 UART: [state] CFI Enabled
2,874,684 UART: [fht] FMC Alias Private Key: 7
2,982,243 UART: [art] Extend RT PCRs Done
2,982,671 UART: [art] Lock RT PCRs Done
2,984,157 UART: [art] Populate DV Done
2,992,336 UART: [fht] FMC Alias Private Key: 7
2,993,450 UART: [art] Derive CDI
2,993,730 UART: [art] Store in in slot 0x4
3,079,559 UART: [art] Derive Key Pair
3,079,919 UART: [art] Store priv key in slot 0x5
3,093,707 UART: [art] Derive Key Pair - Done
3,108,329 UART: [art] Signing Cert with AUTHO
3,108,809 UART: RITY.KEYID = 7
3,124,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,802 UART: [art] PUB.X = D63AAD87A06EFA3D41BF82A1AA91B29AC58C89CB76953880AD14C97821F2E7903F3EB00730BF67A8C00400740B7B7DD1
3,131,551 UART: [art] PUB.Y = C554F5FE93FA5EB83CBBE70D6AF1FC0A519819F57BA77650372E4FE8E5F7FF214F931B99E74BCB59DFED5F778F814C68
3,138,515 UART: [art] SIG.R = A9648953D8EB33C1C4D769C9AE9CC486A0CEBC828E2F889C428852FE01D7690D1472C0BC511454B751256597719E6490
3,145,275 UART: [art] SIG.S = 27027C94F73857890FA70ED0DEE6B19E14DCB94FA89CDA1AD64C94A05398DEAF70D3306E09EE28DFF2746D091A45C570
3,169,315 UART: Caliptra RT
3,169,568 UART: [state] CFI Enabled
3,277,215 UART: [rt] RT listening for mailbox commands...
3,277,885 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,399 UART: [rt]cmd =0x4c4d5356, len=1672
3,848,248 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,991 ready_for_fw is high
1,060,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,955 >>> mbox cmd response: success
2,693,441 UART:
2,693,457 UART: Running Caliptra FMC ...
2,693,865 UART:
2,693,919 UART: [state] CFI Enabled
2,704,080 UART: [fht] FMC Alias Private Key: 7
2,812,373 UART: [art] Extend RT PCRs Done
2,812,801 UART: [art] Lock RT PCRs Done
2,814,207 UART: [art] Populate DV Done
2,822,758 UART: [fht] FMC Alias Private Key: 7
2,823,838 UART: [art] Derive CDI
2,824,118 UART: [art] Store in in slot 0x4
2,909,579 UART: [art] Derive Key Pair
2,909,939 UART: [art] Store priv key in slot 0x5
2,923,329 UART: [art] Derive Key Pair - Done
2,938,264 UART: [art] Signing Cert with AUTHO
2,938,744 UART: RITY.KEYID = 7
2,954,492 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,257 UART: [art] PUB.X = 3B472A7E65B1C9E49EF6D90B50F6997D9A0170AC959DB586ADDF2D7ABA123F3817A9A8799EBC1E2606361B08BD07ECDF
2,962,028 UART: [art] PUB.Y = EA04B014B4E438C67737CFBCD3C1FA9F6006AF12704186071026B8B1983FC954FFD715E62735951E4C128608DA24B86A
2,968,966 UART: [art] SIG.R = C83486C67D2A470185420A34525CE4149E5B3D0F50F9D2725B843179A92C4B997C48F05BAA110B7AD45F7C86FDAE44FA
2,975,728 UART: [art] SIG.S = 4AFE6B4566404448D8B307BAEE9DC5431024581F4755B4B931A90FD59418983DA25EF6F2897DEC89A2276CF7A7B77631
2,999,951 UART: Caliptra RT
3,000,204 UART: [state] CFI Enabled
3,108,191 UART: [rt] RT listening for mailbox commands...
3,108,861 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,521 UART: [rt]cmd =0x4c4d5356, len=1672
3,679,192 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,446 UART: [kat] SHA2-256
904,386 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
919,023 UART: [kat] HMAC-384Kdf
923,759 UART: [kat] LMS
1,172,087 UART: [kat] --
1,173,038 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 ready_for_fw is high
1,177,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,895 UART: [idev] Erasing UDS.KEYID = 0
1,202,364 UART: [idev] Sha1 KeyId Algorithm
1,210,882 UART: [idev] --
1,212,044 UART: [ldev] ++
1,212,212 UART: [ldev] CDI.KEYID = 6
1,212,575 UART: [ldev] SUBJECT.KEYID = 5
1,213,001 UART: [ldev] AUTHORITY.KEYID = 7
1,213,464 UART: [ldev] FE.KEYID = 1
1,219,066 UART: [ldev] Erasing FE.KEYID = 1
1,245,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,634 UART: [ldev] --
1,284,937 UART: [fwproc] Wait for Commands...
1,285,715 UART: [fwproc] Recv command 0x46574c44
1,286,443 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,675 >>> mbox cmd response: success
2,778,683 UART: [afmc] ++
2,778,851 UART: [afmc] CDI.KEYID = 6
2,779,213 UART: [afmc] SUBJECT.KEYID = 7
2,779,638 UART: [afmc] AUTHORITY.KEYID = 5
2,814,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,402 UART: [afmc] --
2,858,492 UART: [cold-reset] --
2,859,460 UART: [state] Locking Datavault
2,860,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,091 UART: [state] Locking ICCM
2,861,587 UART: [exit] Launching FMC @ 0x40000130
2,866,916 UART:
2,866,932 UART: Running Caliptra FMC ...
2,867,340 UART:
2,867,483 UART: [state] CFI Enabled
2,878,206 UART: [fht] FMC Alias Private Key: 7
2,986,525 UART: [art] Extend RT PCRs Done
2,986,953 UART: [art] Lock RT PCRs Done
2,988,563 UART: [art] Populate DV Done
2,996,576 UART: [fht] FMC Alias Private Key: 7
2,997,634 UART: [art] Derive CDI
2,997,914 UART: [art] Store in in slot 0x4
3,083,957 UART: [art] Derive Key Pair
3,084,317 UART: [art] Store priv key in slot 0x5
3,097,575 UART: [art] Derive Key Pair - Done
3,111,922 UART: [art] Signing Cert with AUTHO
3,112,402 UART: RITY.KEYID = 7
3,127,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,361 UART: [art] PUB.X = F0D4CC256359A577518A821AFD718BC510E4B6249C0DB1580175F35E36D0E883FC0E8929FED92D9541DCD5BD3E2DE155
3,135,130 UART: [art] PUB.Y = DF8690DFFBAC53D6DD4752C6D88D0962D44EF5354B9E6133F203C1E50F762BDDF506C1666C2164C0E405671D59BA3C4D
3,142,075 UART: [art] SIG.R = 34B37CE4E855B5486B30F8EE83C05001FD617477B8FF68E356609219D6A76236F89441775E92F86BDB9BFD856428F5A0
3,148,838 UART: [art] SIG.S = 9EE585B28590FD371E1C71B0187E258BAD3873F4A786869157454F0BAE556BB4D6B4455E4F0EEE7DB9B6605FFA513715
3,172,019 UART: Caliptra RT
3,172,364 UART: [state] CFI Enabled
3,280,071 UART: [rt] RT listening for mailbox commands...
3,280,741 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,443 UART: [rt]cmd =0x4c4d5356, len=1672
3,851,112 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,676 ready_for_fw is high
1,060,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,674 >>> mbox cmd response: success
2,690,800 UART:
2,690,816 UART: Running Caliptra FMC ...
2,691,224 UART:
2,691,367 UART: [state] CFI Enabled
2,701,928 UART: [fht] FMC Alias Private Key: 7
2,809,395 UART: [art] Extend RT PCRs Done
2,809,823 UART: [art] Lock RT PCRs Done
2,811,181 UART: [art] Populate DV Done
2,819,608 UART: [fht] FMC Alias Private Key: 7
2,820,754 UART: [art] Derive CDI
2,821,034 UART: [art] Store in in slot 0x4
2,906,205 UART: [art] Derive Key Pair
2,906,565 UART: [art] Store priv key in slot 0x5
2,919,661 UART: [art] Derive Key Pair - Done
2,934,280 UART: [art] Signing Cert with AUTHO
2,934,760 UART: RITY.KEYID = 7
2,949,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,535 UART: [art] PUB.X = 9F106B032403609233497DCD64D293229759D39808EA80642256E130AFD140AD57FD7CB827845BC3F043802B7746A0B2
2,957,284 UART: [art] PUB.Y = 47D02B2C1F18A78E0CF03776511672BFBEEA0DF01DC9D72CBB05623FEADC5AB97C474C2CCD5E13998197138A9703A3BA
2,964,238 UART: [art] SIG.R = C834C9518C5B18F90C791D3C030A6078AC34389992FFC9102784953C23E4056F802C0F611797FE898F7962D5AC599E15
2,970,983 UART: [art] SIG.S = 2A203A1F5446D368F0CD2EAB115E9CA559DB6D0697EBF213D2A8F6ECED0017BBCF5436901F5D778A70A7D60DC0273B64
2,994,672 UART: Caliptra RT
2,995,017 UART: [state] CFI Enabled
3,103,852 UART: [rt] RT listening for mailbox commands...
3,104,522 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,250 UART: [rt]cmd =0x4c4d5356, len=1672
3,675,229 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,781 UART: [fht] FHT @ 0x50003400
1,173,475 UART: [idev] ++
1,173,643 UART: [idev] CDI.KEYID = 6
1,174,004 UART: [idev] SUBJECT.KEYID = 7
1,174,429 UART: [idev] UDS.KEYID = 0
1,174,775 ready_for_fw is high
1,174,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,827 UART: [idev] Erasing UDS.KEYID = 0
1,200,303 UART: [idev] Sha1 KeyId Algorithm
1,209,111 UART: [idev] --
1,210,146 UART: [ldev] ++
1,210,314 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,105 UART: [ldev] AUTHORITY.KEYID = 7
1,211,568 UART: [ldev] FE.KEYID = 1
1,216,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,772 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,725 UART: [fwproc] Recv command 0x46574c44
1,283,458 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,314 >>> mbox cmd response: success
2,777,579 UART: [afmc] ++
2,777,747 UART: [afmc] CDI.KEYID = 6
2,778,110 UART: [afmc] SUBJECT.KEYID = 7
2,778,536 UART: [afmc] AUTHORITY.KEYID = 5
2,813,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,606 UART: [afmc] --
2,856,730 UART: [cold-reset] --
2,857,684 UART: [state] Locking Datavault
2,858,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,565 UART: [state] Locking ICCM
2,859,993 UART: [exit] Launching FMC @ 0x40000130
2,865,322 UART:
2,865,338 UART: Running Caliptra FMC ...
2,865,746 UART:
2,865,800 UART: [state] CFI Enabled
2,876,237 UART: [fht] FMC Alias Private Key: 7
2,984,076 UART: [art] Extend RT PCRs Done
2,984,504 UART: [art] Lock RT PCRs Done
2,985,996 UART: [art] Populate DV Done
2,994,269 UART: [fht] FMC Alias Private Key: 7
2,995,299 UART: [art] Derive CDI
2,995,579 UART: [art] Store in in slot 0x4
3,081,292 UART: [art] Derive Key Pair
3,081,652 UART: [art] Store priv key in slot 0x5
3,094,350 UART: [art] Derive Key Pair - Done
3,108,979 UART: [art] Signing Cert with AUTHO
3,109,459 UART: RITY.KEYID = 7
3,124,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,980 UART: [art] PUB.X = E2A5DCA75E630240F953757EE7A3328299FFB3AF48CCCD3520253847414295EADF1428DF709780B2264428646BED0CE0
3,131,744 UART: [art] PUB.Y = D8B762FC24C2240406E2C8AFBB823FD04F81BBE0CB9675A772FC71B6412EF8DF37B9C3BC33568AA828DE4518EA3288A3
3,138,702 UART: [art] SIG.R = 14954646B576994F08FB5246151170E22957BE2758B09F97CFC771B394288A2DF31F0AB6E1B4E989A4F266BC52A28034
3,145,458 UART: [art] SIG.S = 3AC175EE3FF80771A217B65229608F2ECDFED828F18416DE5553C5D6F6F531BA8B01BB7E169EE84BF8AB014C899527BF
3,169,444 UART: Caliptra RT
3,169,697 UART: [state] CFI Enabled
3,277,086 UART: [rt] RT listening for mailbox commands...
3,277,756 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,100 UART: [rt]cmd =0x4c4d5356, len=1672
3,847,905 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 ready_for_fw is high
1,055,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,428 >>> mbox cmd response: success
2,687,602 UART:
2,687,618 UART: Running Caliptra FMC ...
2,688,026 UART:
2,688,080 UART: [state] CFI Enabled
2,698,303 UART: [fht] FMC Alias Private Key: 7
2,806,566 UART: [art] Extend RT PCRs Done
2,806,994 UART: [art] Lock RT PCRs Done
2,808,512 UART: [art] Populate DV Done
2,816,567 UART: [fht] FMC Alias Private Key: 7
2,817,503 UART: [art] Derive CDI
2,817,783 UART: [art] Store in in slot 0x4
2,903,300 UART: [art] Derive Key Pair
2,903,660 UART: [art] Store priv key in slot 0x5
2,916,728 UART: [art] Derive Key Pair - Done
2,931,373 UART: [art] Signing Cert with AUTHO
2,931,853 UART: RITY.KEYID = 7
2,946,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,718 UART: [art] PUB.X = F35C7EE66AB9D17E6F5A58431E76161CC41D892DBCD789C11AB0C34492818A4BDAD4F0E3D1C699AB650AFCC880200BDC
2,954,500 UART: [art] PUB.Y = 4ACF1DFE5BB740C9B5C5941569284EDC4501FA5D181E1E349069F2B6F781EC234BC58B16A0B1DB96C09E5F4D567AFA81
2,961,461 UART: [art] SIG.R = 4FBE80178678B7DBE6281856C42B9ED5285F93A1889DFEDD0B9E1E62B5572F12300539ACF545768196B652291DEFB72F
2,968,227 UART: [art] SIG.S = 368EF3888194E4E0E08956E31994FE45C0AEBE830F769FA51EF6EA345103C4ED18EE83C648C907C7A80CCF48840A2AF9
2,991,649 UART: Caliptra RT
2,991,902 UART: [state] CFI Enabled
3,099,311 UART: [rt] RT listening for mailbox commands...
3,099,981 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,793 UART: [rt]cmd =0x4c4d5356, len=1672
3,670,688 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,174,756 ready_for_fw is high
1,174,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,789 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,826 UART: [fwproc] Recv command 0x46574c44
1,283,559 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,607 >>> mbox cmd response: success
2,775,850 UART: [afmc] ++
2,776,018 UART: [afmc] CDI.KEYID = 6
2,776,381 UART: [afmc] SUBJECT.KEYID = 7
2,776,807 UART: [afmc] AUTHORITY.KEYID = 5
2,812,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,417 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,136 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,965 UART: [afmc] --
2,856,037 UART: [cold-reset] --
2,856,753 UART: [state] Locking Datavault
2,857,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,248 UART: [state] Locking ICCM
2,858,770 UART: [exit] Launching FMC @ 0x40000130
2,864,099 UART:
2,864,115 UART: Running Caliptra FMC ...
2,864,523 UART:
2,864,666 UART: [state] CFI Enabled
2,875,593 UART: [fht] FMC Alias Private Key: 7
2,983,496 UART: [art] Extend RT PCRs Done
2,983,924 UART: [art] Lock RT PCRs Done
2,985,142 UART: [art] Populate DV Done
2,993,271 UART: [fht] FMC Alias Private Key: 7
2,994,443 UART: [art] Derive CDI
2,994,723 UART: [art] Store in in slot 0x4
3,080,276 UART: [art] Derive Key Pair
3,080,636 UART: [art] Store priv key in slot 0x5
3,093,830 UART: [art] Derive Key Pair - Done
3,108,658 UART: [art] Signing Cert with AUTHO
3,109,138 UART: RITY.KEYID = 7
3,124,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,847 UART: [art] PUB.X = 1DB6CC47105B4B99087C4C3B9816D67D6E36D14DC23A52A82CB630603E298D1AA086DC55117F471EF438267941E100AA
3,131,592 UART: [art] PUB.Y = 3C4B770540A78E55EDCCE9D989362EAE92B1435040076FBC6C91A96D32BB30568FECE285FA6BDFA1B117F8F15B0AB6D3
3,138,549 UART: [art] SIG.R = 407F6123295678AF3429CEEC4A7423EF14AF143B2CA7FB5D53654AF4E2C0E7FFCE6DD0D010E25588DA28CAC5616A8567
3,145,331 UART: [art] SIG.S = 87770C10058B69021D5AEAA267B182AFFB51FEB4685FF32A6C11A68538C943144F4F8F6CD48729F013019632C7704680
3,169,178 UART: Caliptra RT
3,169,523 UART: [state] CFI Enabled
3,278,086 UART: [rt] RT listening for mailbox commands...
3,278,756 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,298 UART: [rt]cmd =0x4c4d5356, len=1672
3,849,069 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,635 ready_for_fw is high
1,056,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,787 >>> mbox cmd response: success
2,686,783 UART:
2,686,799 UART: Running Caliptra FMC ...
2,687,207 UART:
2,687,350 UART: [state] CFI Enabled
2,698,059 UART: [fht] FMC Alias Private Key: 7
2,805,948 UART: [art] Extend RT PCRs Done
2,806,376 UART: [art] Lock RT PCRs Done
2,807,950 UART: [art] Populate DV Done
2,816,153 UART: [fht] FMC Alias Private Key: 7
2,817,249 UART: [art] Derive CDI
2,817,529 UART: [art] Store in in slot 0x4
2,903,142 UART: [art] Derive Key Pair
2,903,502 UART: [art] Store priv key in slot 0x5
2,916,608 UART: [art] Derive Key Pair - Done
2,931,144 UART: [art] Signing Cert with AUTHO
2,931,624 UART: RITY.KEYID = 7
2,946,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,697 UART: [art] PUB.X = 4BA0FE5057607C5C3B645A1E5F91EE8B13F83A25FB5D11BB5D6A5B8AE2B093D9A726409DA1CA4579762F66EDAEDF83A6
2,954,485 UART: [art] PUB.Y = E72E00ADA9C8E7C53608477553E4D6F38F21098303DBF00BD217C030D2C347FE6E883ACA1F40B57D44D378FF7E047A78
2,961,404 UART: [art] SIG.R = 94A6D9E6E742CCE685CDBD73F4BC83A2BEF443DA9AA08B984D6F58D13BFF7C69B768EA3F20D984034656E7E188354F69
2,968,185 UART: [art] SIG.S = 1F447E075DE646B7096CF6728A458A65CF2C81413801C7F7619BDC5489C02131F84EB14A7A75CCB17E8D13EF9D88487F
2,992,047 UART: Caliptra RT
2,992,392 UART: [state] CFI Enabled
3,100,747 UART: [rt] RT listening for mailbox commands...
3,101,417 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,195 UART: [rt]cmd =0x4c4d5356, len=1672
3,672,100 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,163 UART:
192,523 UART: Running Caliptra ROM ...
193,707 UART:
193,861 UART: [state] CFI Enabled
261,356 UART: [state] LifecycleState = Unprovisioned
263,333 UART: [state] DebugLocked = No
265,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,884 UART: [kat] SHA2-256
440,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,117 UART: [kat] ++
451,594 UART: [kat] sha1
461,617 UART: [kat] SHA2-256
464,345 UART: [kat] SHA2-384
468,914 UART: [kat] SHA2-512-ACC
471,286 UART: [kat] ECC-384
2,767,448 UART: [kat] HMAC-384Kdf
2,798,806 UART: [kat] LMS
3,989,258 UART: [kat] --
3,991,990 UART: [cold-reset] ++
3,993,288 UART: [fht] Storing FHT @ 0x50003400
4,005,615 UART: [idev] ++
4,006,191 UART: [idev] CDI.KEYID = 6
4,007,250 UART: [idev] SUBJECT.KEYID = 7
4,008,361 UART: [idev] UDS.KEYID = 0
4,009,420 ready_for_fw is high
4,009,638 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,259 UART: [idev] Erasing UDS.KEYID = 0
7,346,169 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,829 UART: [idev] --
7,372,344 UART: [ldev] ++
7,372,924 UART: [ldev] CDI.KEYID = 6
7,373,894 UART: [ldev] SUBJECT.KEYID = 5
7,375,109 UART: [ldev] AUTHORITY.KEYID = 7
7,376,291 UART: [ldev] FE.KEYID = 1
7,423,067 UART: [ldev] Erasing FE.KEYID = 1
10,752,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,661 UART: [ldev] --
13,116,989 UART: [fwproc] Waiting for Commands...
13,119,735 UART: [fwproc] Received command 0x46574c44
13,121,917 UART: [fwproc] Received Image of size 114124 bytes
17,174,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,557 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,798 >>> mbox cmd response: success
17,639,991 UART: [afmc] ++
17,640,594 UART: [afmc] CDI.KEYID = 6
17,641,486 UART: [afmc] SUBJECT.KEYID = 7
17,642,747 UART: [afmc] AUTHORITY.KEYID = 5
21,007,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,083 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,465 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,333 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,789 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,329 UART: [afmc] --
23,379,987 UART: [cold-reset] --
23,383,311 UART: [state] Locking Datavault
23,390,609 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,361 UART: [state] Locking ICCM
23,394,050 UART: [exit] Launching FMC @ 0x40000130
23,402,395 UART:
23,402,630 UART: Running Caliptra FMC ...
23,403,657 UART:
23,403,807 UART: [state] CFI Enabled
23,469,222 UART: [fht] FMC Alias Private Key: 7
25,806,938 UART: [art] Extend RT PCRs Done
25,808,180 UART: [art] Lock RT PCRs Done
25,810,157 UART: [art] Populate DV Done
25,815,462 UART: [fht] FMC Alias Private Key: 7
25,816,894 UART: [art] Derive CDI
25,817,663 UART: [art] Store in in slot 0x4
25,877,627 UART: [art] Derive Key Pair
25,878,671 UART: [art] Store priv key in slot 0x5
29,171,602 UART: [art] Derive Key Pair - Done
29,184,478 UART: [art] Signing Cert with AUTHO
29,185,783 UART: RITY.KEYID = 7
31,473,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,862 UART: [art] PUB.X = 1AFE66D434D7B1EF0AC020023AC02DD6BB8527ACD59BA37F24BAD0D148DD7414DE0E9C0769CE619AEB915A5C0A3C0D88
31,482,514 UART: [art] PUB.Y = B4E721FCF1254F7AD66C90655D9F9155DE99F8FAC6EFE4D67FBE0865CF1A65EEA029BE00CE5F5293F3042301932DB45E
31,489,772 UART: [art] SIG.R = 817FA02F2DF926957AAABDB166FA88A52D6CDF6080E146FAF1883BA8DA904E2D455C3E57FA7697809D12AC8B68DC3218
31,497,174 UART: [art] SIG.S = 8E7AD4E74FAEDF6FC2D599FE58B81004D9E55059B2B5FEF2AC85E7483719BD83BA621EB06C91731F0B8886E9635EC5A4
32,802,208 UART: Caliptra RT
32,803,370 UART: [state] CFI Enabled
32,969,079 UART: [rt] RT listening for mailbox commands...
32,973,114 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,017,810 UART: [rt]cmd =0x4c4d5356, len=1672
33,432,634 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,807,795 ready_for_fw is high
3,808,194 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,883,748 >>> mbox cmd response: success
23,569,519 UART:
23,569,907 UART: Running Caliptra FMC ...
23,571,024 UART:
23,571,183 UART: [state] CFI Enabled
23,636,610 UART: [fht] FMC Alias Private Key: 7
25,974,291 UART: [art] Extend RT PCRs Done
25,975,527 UART: [art] Lock RT PCRs Done
25,977,099 UART: [art] Populate DV Done
25,982,695 UART: [fht] FMC Alias Private Key: 7
25,984,343 UART: [art] Derive CDI
25,985,160 UART: [art] Store in in slot 0x4
26,045,122 UART: [art] Derive Key Pair
26,046,196 UART: [art] Store priv key in slot 0x5
29,338,985 UART: [art] Derive Key Pair - Done
29,351,938 UART: [art] Signing Cert with AUTHO
29,353,240 UART: RITY.KEYID = 7
31,639,843 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,349 UART: [art] PUB.X = 08F421CA26B83B569DF5DCFDDC4C493A12080B26BF4C2F6957D3E9A691EDFB7327DAC09DA5CBC89AFDBF4A46BA7E40EA
31,648,653 UART: [art] PUB.Y = 5F53FDFC13214B1F7569CBD6F00A27116D46FCAA42BD740C04D0DE2B8E3B6CA0BE26BC1A597FB1DFC17053DE1EED5458
31,655,880 UART: [art] SIG.R = 7CE2523E7721549DB1988EE179F6861D172FA86BB135F045718C83DC9937AAFC1F329736181AA8A074A12DAFBB65D7C6
31,663,283 UART: [art] SIG.S = F2883CCA32571C4F9C5154FEFEC43ED2B91AA3F1B8F9F366FD1FD690BB844358C66EFE38BDA64083B1C64E46919CD048
32,968,381 UART: Caliptra RT
32,969,097 UART: [state] CFI Enabled
33,128,927 UART: [rt] RT listening for mailbox commands...
33,132,932 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,176,982 UART: [rt]cmd =0x4c4d5356, len=1672
33,591,726 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,346 UART:
192,709 UART: Running Caliptra ROM ...
193,817 UART:
603,612 UART: [state] CFI Enabled
615,235 UART: [state] LifecycleState = Unprovisioned
617,110 UART: [state] DebugLocked = No
618,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,860 UART: [kat] SHA2-256
792,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,118 UART: [kat] ++
803,564 UART: [kat] sha1
815,283 UART: [kat] SHA2-256
817,933 UART: [kat] SHA2-384
823,684 UART: [kat] SHA2-512-ACC
826,023 UART: [kat] ECC-384
3,111,711 UART: [kat] HMAC-384Kdf
3,123,659 UART: [kat] LMS
4,313,784 UART: [kat] --
4,318,651 UART: [cold-reset] ++
4,321,151 UART: [fht] Storing FHT @ 0x50003400
4,333,473 UART: [idev] ++
4,334,045 UART: [idev] CDI.KEYID = 6
4,334,964 UART: [idev] SUBJECT.KEYID = 7
4,336,203 UART: [idev] UDS.KEYID = 0
4,337,179 ready_for_fw is high
4,337,370 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,057 UART: [idev] Erasing UDS.KEYID = 0
7,622,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,682 UART: [idev] --
7,649,071 UART: [ldev] ++
7,649,645 UART: [ldev] CDI.KEYID = 6
7,650,581 UART: [ldev] SUBJECT.KEYID = 5
7,651,787 UART: [ldev] AUTHORITY.KEYID = 7
7,652,990 UART: [ldev] FE.KEYID = 1
7,665,244 UART: [ldev] Erasing FE.KEYID = 1
10,952,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,356 UART: [ldev] --
13,314,771 UART: [fwproc] Waiting for Commands...
13,316,593 UART: [fwproc] Received command 0x46574c44
13,318,827 UART: [fwproc] Received Image of size 114124 bytes
17,376,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,919 >>> mbox cmd response: success
17,839,554 UART: [afmc] ++
17,840,150 UART: [afmc] CDI.KEYID = 6
17,841,088 UART: [afmc] SUBJECT.KEYID = 7
17,842,355 UART: [afmc] AUTHORITY.KEYID = 5
21,158,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,783 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,215 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,000 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,443 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,873 UART: [afmc] --
23,522,405 UART: [cold-reset] --
23,525,728 UART: [state] Locking Datavault
23,531,912 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,666 UART: [state] Locking ICCM
23,534,872 UART: [exit] Launching FMC @ 0x40000130
23,543,270 UART:
23,543,544 UART: Running Caliptra FMC ...
23,544,571 UART:
23,544,714 UART: [state] CFI Enabled
23,552,835 UART: [fht] FMC Alias Private Key: 7
25,883,622 UART: [art] Extend RT PCRs Done
25,884,842 UART: [art] Lock RT PCRs Done
25,886,435 UART: [art] Populate DV Done
25,892,004 UART: [fht] FMC Alias Private Key: 7
25,893,709 UART: [art] Derive CDI
25,894,441 UART: [art] Store in in slot 0x4
25,937,031 UART: [art] Derive Key Pair
25,938,030 UART: [art] Store priv key in slot 0x5
29,180,122 UART: [art] Derive Key Pair - Done
29,193,222 UART: [art] Signing Cert with AUTHO
29,194,525 UART: RITY.KEYID = 7
31,473,947 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,454 UART: [art] PUB.X = CC66A2838FB3045A0DFE31778BC95CFB3361E1A58911E9A3D9D11281E6EB54B6D0654F7F4DE767E670302CF2B40944C1
31,482,685 UART: [art] PUB.Y = 80C5D1DCBD783110E1DBB313F54F1A054F4E0E788D874139D01E01C2ACA770EFA7A0D519579F2B84A8390D1858D9F2EE
31,489,951 UART: [art] SIG.R = FDBCA09B30AA6664CC6A88D6490D5186F125B67BF7295A7C8B41427404ADC8B83DF59FFAAFF03A01B190B45931C4FB34
31,497,336 UART: [art] SIG.S = B41EA28FB0CEB1E2F32EF7532EB50B3FFE2B408BDFE05D268745FB5E7C9531BB86E6D2BFE13E35A368ECEA935D1F2907
32,803,144 UART: Caliptra RT
32,803,843 UART: [state] CFI Enabled
32,921,735 UART: [rt] RT listening for mailbox commands...
32,925,650 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,970,093 UART: [rt]cmd =0x4c4d5356, len=1672
33,384,602 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,132,244 ready_for_fw is high
4,132,636 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,431 >>> mbox cmd response: success
23,703,218 UART:
23,703,612 UART: Running Caliptra FMC ...
23,704,777 UART:
23,704,935 UART: [state] CFI Enabled
23,712,890 UART: [fht] FMC Alias Private Key: 7
26,043,668 UART: [art] Extend RT PCRs Done
26,044,941 UART: [art] Lock RT PCRs Done
26,046,339 UART: [art] Populate DV Done
26,051,845 UART: [fht] FMC Alias Private Key: 7
26,053,401 UART: [art] Derive CDI
26,054,164 UART: [art] Store in in slot 0x4
26,096,622 UART: [art] Derive Key Pair
26,097,617 UART: [art] Store priv key in slot 0x5
29,339,871 UART: [art] Derive Key Pair - Done
29,352,824 UART: [art] Signing Cert with AUTHO
29,354,133 UART: RITY.KEYID = 7
31,633,519 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,025 UART: [art] PUB.X = EBF4BE8F2305191798F34168021DD15E26D4F377E5C623EAEA4669C922E1DB45FE98DABB9C17FF5D0364C2DF583B2AE0
31,642,319 UART: [art] PUB.Y = 0D5EABDFAF69BBE7EFD5AB2882BA767585CE4EABD83509E2439866DEBBF9F7F3D3B9373DA91BB6F40289DA35F0FC5BD7
31,649,588 UART: [art] SIG.R = 67F881F4ED675905282B0798E4C5443525F643D09929566014C3A46D613D7CC52119751CEDC0B4A66FD879C2F3447F97
31,656,905 UART: [art] SIG.S = 9AE036517ED499360FDDF25AB9F640EF27555946F738BC5586EE32A71BB8BA2F4DFC1F0F802457CE30DB296DB3CD799A
32,962,500 UART: Caliptra RT
32,963,201 UART: [state] CFI Enabled
33,080,930 UART: [rt] RT listening for mailbox commands...
33,084,949 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,129,243 UART: [rt]cmd =0x4c4d5356, len=1672
33,543,792 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,183 UART:
192,546 UART: Running Caliptra ROM ...
193,742 UART:
193,901 UART: [state] CFI Enabled
265,423 UART: [state] LifecycleState = Unprovisioned
267,334 UART: [state] DebugLocked = No
268,942 UART: [state] WD Timer not started. Device not locked for debugging
273,284 UART: [kat] SHA2-256
452,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,982 UART: [kat] ++
464,515 UART: [kat] sha1
475,542 UART: [kat] SHA2-256
478,554 UART: [kat] SHA2-384
485,534 UART: [kat] SHA2-512-ACC
488,466 UART: [kat] ECC-384
2,950,691 UART: [kat] HMAC-384Kdf
2,974,359 UART: [kat] LMS
3,503,775 UART: [kat] --
3,507,471 UART: [cold-reset] ++
3,508,756 UART: [fht] FHT @ 0x50003400
3,520,937 UART: [idev] ++
3,521,500 UART: [idev] CDI.KEYID = 6
3,522,490 UART: [idev] SUBJECT.KEYID = 7
3,523,681 UART: [idev] UDS.KEYID = 0
3,524,606 ready_for_fw is high
3,524,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,815 UART: [idev] Erasing UDS.KEYID = 0
6,027,029 UART: [idev] Sha1 KeyId Algorithm
6,048,804 UART: [idev] --
6,052,689 UART: [ldev] ++
6,053,258 UART: [ldev] CDI.KEYID = 6
6,054,143 UART: [ldev] SUBJECT.KEYID = 5
6,055,304 UART: [ldev] AUTHORITY.KEYID = 7
6,056,589 UART: [ldev] FE.KEYID = 1
6,102,806 UART: [ldev] Erasing FE.KEYID = 1
8,609,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,960 UART: [ldev] --
10,414,786 UART: [fwproc] Wait for Commands...
10,417,143 UART: [fwproc] Recv command 0x46574c44
10,419,177 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,770 >>> mbox cmd response: success
14,291,326 UART: [afmc] ++
14,291,916 UART: [afmc] CDI.KEYID = 6
14,292,823 UART: [afmc] SUBJECT.KEYID = 7
14,293,981 UART: [afmc] AUTHORITY.KEYID = 5
16,832,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,772 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,983 UART: [afmc] --
18,628,900 UART: [cold-reset] --
18,633,079 UART: [state] Locking Datavault
18,638,647 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,297 UART: [state] Locking ICCM
18,641,908 UART: [exit] Launching FMC @ 0x40000130
18,650,305 UART:
18,650,534 UART: Running Caliptra FMC ...
18,651,638 UART:
18,651,823 UART: [state] CFI Enabled
18,712,739 UART: [fht] FMC Alias Private Key: 7
20,476,406 UART: [art] Extend RT PCRs Done
20,477,621 UART: [art] Lock RT PCRs Done
20,479,565 UART: [art] Populate DV Done
20,485,195 UART: [fht] FMC Alias Private Key: 7
20,486,849 UART: [art] Derive CDI
20,487,667 UART: [art] Store in in slot 0x4
20,545,028 UART: [art] Derive Key Pair
20,546,069 UART: [art] Store priv key in slot 0x5
23,009,525 UART: [art] Derive Key Pair - Done
23,022,144 UART: [art] Signing Cert with AUTHO
23,023,451 UART: RITY.KEYID = 7
24,734,412 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,916 UART: [art] PUB.X = 877E71DE46FC9A9C7D45C57E073EA484024CAD044E2B84B8D45B6A4094C41FE556C4BF8D8D997D665C4E8DF59815F2CE
24,743,230 UART: [art] PUB.Y = 1E1210102E4A0C38F17ED73DEAE54DD387C7229CD43DD4A8E61FBB8FE231B1CCBF56941EE20158B12691BF41E6DCC43C
24,750,523 UART: [art] SIG.R = E036E06058115D1E9AE81552DBC8F9AD8B6DB6E2EFBB2B83370BDAEE31423AFB08628A122F35D2ED096AA30A0960C608
24,757,919 UART: [art] SIG.S = 1AB47553250226DEB0721483681A252187FE6BCB60751DEC0A7E77DCAFEEC6068F9CD45387980EA119CC89EFFCBF2484
25,737,239 UART: Caliptra RT
25,737,932 UART: [state] CFI Enabled
25,901,879 UART: [rt] RT listening for mailbox commands...
25,905,816 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,950,712 UART: [rt]cmd =0x4c4d5356, len=1672
26,152,824 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,359,017 ready_for_fw is high
3,359,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,238 >>> mbox cmd response: success
18,344,497 UART:
18,344,881 UART: Running Caliptra FMC ...
18,346,079 UART:
18,346,246 UART: [state] CFI Enabled
18,411,820 UART: [fht] FMC Alias Private Key: 7
20,176,526 UART: [art] Extend RT PCRs Done
20,177,741 UART: [art] Lock RT PCRs Done
20,178,990 UART: [art] Populate DV Done
20,184,460 UART: [fht] FMC Alias Private Key: 7
20,186,111 UART: [art] Derive CDI
20,186,927 UART: [art] Store in in slot 0x4
20,244,851 UART: [art] Derive Key Pair
20,245,844 UART: [art] Store priv key in slot 0x5
22,709,327 UART: [art] Derive Key Pair - Done
22,722,528 UART: [art] Signing Cert with AUTHO
22,723,828 UART: RITY.KEYID = 7
24,434,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,420 UART: [art] PUB.X = 96F46F6E7ED9DCE5700F46D401C89CEF96258FBD2529CED2C327BB243225AC6C8A3947E15F4469532A6D09D479A58885
24,443,675 UART: [art] PUB.Y = 1EA584FE99B321A6F3A4ACE6B3341C7F47F86CF15A76701B51C893C2D5273F9314D2D57AD456D24A1925E0E869466EAD
24,450,944 UART: [art] SIG.R = 8F334B6C18062E688FDFF2E7B27FE788F5CF7ED7104EB8C9298C155BE37281A68A49F58EA5B22FBB0E82243E5DE892C4
24,458,347 UART: [art] SIG.S = 6212C411DF56382BF3012B90EFE121A448721FDF5A70B7E6BCF23F1EC72F41792BE9E98634D8F4B6E85732BA9A629E2D
25,437,195 UART: Caliptra RT
25,437,887 UART: [state] CFI Enabled
25,604,085 UART: [rt] RT listening for mailbox commands...
25,608,053 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,653,367 UART: [rt]cmd =0x4c4d5356, len=1672
25,855,135 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,228 UART:
192,601 UART: Running Caliptra ROM ...
193,786 UART:
603,295 UART: [state] CFI Enabled
615,183 UART: [state] LifecycleState = Unprovisioned
617,049 UART: [state] DebugLocked = No
619,203 UART: [state] WD Timer not started. Device not locked for debugging
623,638 UART: [kat] SHA2-256
802,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,327 UART: [kat] ++
814,766 UART: [kat] sha1
826,696 UART: [kat] SHA2-256
829,768 UART: [kat] SHA2-384
835,748 UART: [kat] SHA2-512-ACC
838,750 UART: [kat] ECC-384
3,280,798 UART: [kat] HMAC-384Kdf
3,293,170 UART: [kat] LMS
3,822,626 UART: [kat] --
3,825,999 UART: [cold-reset] ++
3,827,604 UART: [fht] FHT @ 0x50003400
3,839,149 UART: [idev] ++
3,839,705 UART: [idev] CDI.KEYID = 6
3,840,728 UART: [idev] SUBJECT.KEYID = 7
3,841,821 UART: [idev] UDS.KEYID = 0
3,842,862 ready_for_fw is high
3,843,046 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,760 UART: [idev] Erasing UDS.KEYID = 0
6,316,482 UART: [idev] Sha1 KeyId Algorithm
6,338,955 UART: [idev] --
6,341,366 UART: [ldev] ++
6,341,936 UART: [ldev] CDI.KEYID = 6
6,342,845 UART: [ldev] SUBJECT.KEYID = 5
6,343,996 UART: [ldev] AUTHORITY.KEYID = 7
6,345,274 UART: [ldev] FE.KEYID = 1
6,353,209 UART: [ldev] Erasing FE.KEYID = 1
8,827,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,506 UART: [ldev] --
10,616,357 UART: [fwproc] Wait for Commands...
10,619,571 UART: [fwproc] Recv command 0x46574c44
10,621,611 UART: [fwproc] Recv'd Img size: 114448 bytes
14,018,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,082,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,151,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,469,244 >>> mbox cmd response: success
14,473,474 UART: [afmc] ++
14,474,063 UART: [afmc] CDI.KEYID = 6
14,474,942 UART: [afmc] SUBJECT.KEYID = 7
14,476,112 UART: [afmc] AUTHORITY.KEYID = 5
16,972,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,695,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,697,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,712,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,728,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,744,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,766,668 UART: [afmc] --
18,771,171 UART: [cold-reset] --
18,774,648 UART: [state] Locking Datavault
18,780,589 UART: [state] Locking PCR0, PCR1 and PCR31
18,782,433 UART: [state] Locking ICCM
18,783,513 UART: [exit] Launching FMC @ 0x40000130
18,791,908 UART:
18,792,139 UART: Running Caliptra FMC ...
18,793,229 UART:
18,793,399 UART: [state] CFI Enabled
18,801,929 UART: [fht] FMC Alias Private Key: 7
20,558,621 UART: [art] Extend RT PCRs Done
20,559,839 UART: [art] Lock RT PCRs Done
20,561,455 UART: [art] Populate DV Done
20,566,756 UART: [fht] FMC Alias Private Key: 7
20,568,286 UART: [art] Derive CDI
20,569,092 UART: [art] Store in in slot 0x4
20,612,004 UART: [art] Derive Key Pair
20,613,001 UART: [art] Store priv key in slot 0x5
23,039,154 UART: [art] Derive Key Pair - Done
23,052,478 UART: [art] Signing Cert with AUTHO
23,053,774 UART: RITY.KEYID = 7
24,759,467 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,969 UART: [art] PUB.X = F989EEA3B89690A72160517EEEF3033A9B48C2561C187F19DF08BB1E5D3D7C7BEDB518E2655B577374351D2E56F2F815
24,768,245 UART: [art] PUB.Y = F432A26207A608631E5583AC193830812EC74592BB6567FA5A9DFC1044E794212A657E3F5DE6ABF607BB1CD2ABBD73DA
24,775,479 UART: [art] SIG.R = EDA233A53EDCF93773C28DB2183B035CCDC111B19A6293F8F2DFB96105B7643B188FB176861F6A367D8CFD5E67137911
24,782,942 UART: [art] SIG.S = 3916A816325E246817E41C31D1F1C61DD2173C0446BDA496194E92402F3F17B6C4850974ECDFBE7A585077D148A3D4A2
25,762,007 UART: Caliptra RT
25,762,707 UART: [state] CFI Enabled
25,879,033 UART: [rt] RT listening for mailbox commands...
25,882,996 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,927,454 UART: [rt]cmd =0x4c4d5356, len=1672
26,129,403 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,695,394 ready_for_fw is high
3,695,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,589 >>> mbox cmd response: success
18,514,046 UART:
18,514,461 UART: Running Caliptra FMC ...
18,515,664 UART:
18,515,846 UART: [state] CFI Enabled
18,523,795 UART: [fht] FMC Alias Private Key: 7
20,280,971 UART: [art] Extend RT PCRs Done
20,282,194 UART: [art] Lock RT PCRs Done
20,283,989 UART: [art] Populate DV Done
20,289,292 UART: [fht] FMC Alias Private Key: 7
20,290,830 UART: [art] Derive CDI
20,291,638 UART: [art] Store in in slot 0x4
20,334,441 UART: [art] Derive Key Pair
20,335,429 UART: [art] Store priv key in slot 0x5
22,761,940 UART: [art] Derive Key Pair - Done
22,774,982 UART: [art] Signing Cert with AUTHO
22,776,279 UART: RITY.KEYID = 7
24,481,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,210 UART: [art] PUB.X = A0E250AD448E68A204B50F0ECDDDD4A5524FDD78FF64582AF61F06557FACF2F673ED740A32415BDFF5A3A2C6ECF594ED
24,490,485 UART: [art] PUB.Y = AED05CCA0B4DB483FDDCDF05BEA99DD43BF49D52168BA5678C5016F436ED3156DAB72A3018EFC7558B60AE375D88EAE5
24,497,786 UART: [art] SIG.R = AB5BF41077A7704CD29264F8662AB69AD49F6BDD0EDA5937BBD04B11E642A21C11CD25AB55CB2B51FEFAC0470A423412
24,505,182 UART: [art] SIG.S = 054D106A4CB2CC218857432E879336AAAAE6E68EA3E8AB05E3C8032BDEE95D039072B0216D61B1D374443B9E6C74E3E1
25,484,055 UART: Caliptra RT
25,484,753 UART: [state] CFI Enabled
25,602,241 UART: [rt] RT listening for mailbox commands...
25,606,144 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,650,656 UART: [rt]cmd =0x4c4d5356, len=1672
25,852,392 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,009 UART:
192,382 UART: Running Caliptra ROM ...
193,582 UART:
193,737 UART: [state] CFI Enabled
263,738 UART: [state] LifecycleState = Unprovisioned
266,086 UART: [state] DebugLocked = No
267,485 UART: [state] WD Timer not started. Device not locked for debugging
271,609 UART: [kat] SHA2-256
461,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,313 UART: [kat] ++
472,799 UART: [kat] sha1
484,954 UART: [kat] SHA2-256
487,960 UART: [kat] SHA2-384
494,300 UART: [kat] SHA2-512-ACC
496,876 UART: [kat] ECC-384
2,947,626 UART: [kat] HMAC-384Kdf
2,970,450 UART: [kat] LMS
3,502,194 UART: [kat] --
3,506,897 UART: [cold-reset] ++
3,508,900 UART: [fht] FHT @ 0x50003400
3,521,363 UART: [idev] ++
3,522,067 UART: [idev] CDI.KEYID = 6
3,523,098 UART: [idev] SUBJECT.KEYID = 7
3,524,219 UART: [idev] UDS.KEYID = 0
3,525,196 ready_for_fw is high
3,525,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,724 UART: [idev] Erasing UDS.KEYID = 0
6,027,114 UART: [idev] Sha1 KeyId Algorithm
6,048,558 UART: [idev] --
6,053,254 UART: [ldev] ++
6,053,936 UART: [ldev] CDI.KEYID = 6
6,054,849 UART: [ldev] SUBJECT.KEYID = 5
6,056,010 UART: [ldev] AUTHORITY.KEYID = 7
6,057,240 UART: [ldev] FE.KEYID = 1
6,098,722 UART: [ldev] Erasing FE.KEYID = 1
8,603,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,345 UART: [ldev] --
10,413,475 UART: [fwproc] Wait for Commands...
10,416,592 UART: [fwproc] Recv command 0x46574c44
10,418,843 UART: [fwproc] Recv'd Img size: 114448 bytes
13,872,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,607,980 >>> mbox cmd response: success
14,611,538 UART: [afmc] ++
14,612,247 UART: [afmc] CDI.KEYID = 6
14,613,494 UART: [afmc] SUBJECT.KEYID = 7
14,614,932 UART: [afmc] AUTHORITY.KEYID = 5
17,148,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,032 UART: [afmc] --
18,944,930 UART: [cold-reset] --
18,949,281 UART: [state] Locking Datavault
18,954,797 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,984 UART: [state] Locking ICCM
18,959,759 UART: [exit] Launching FMC @ 0x40000130
18,968,428 UART:
18,968,660 UART: Running Caliptra FMC ...
18,969,685 UART:
18,969,833 UART: [state] CFI Enabled
19,028,635 UART: [fht] FMC Alias Private Key: 7
20,793,117 UART: [art] Extend RT PCRs Done
20,794,330 UART: [art] Lock RT PCRs Done
20,795,948 UART: [art] Populate DV Done
20,801,683 UART: [fht] FMC Alias Private Key: 7
20,803,268 UART: [art] Derive CDI
20,803,998 UART: [art] Store in in slot 0x4
20,861,781 UART: [art] Derive Key Pair
20,862,816 UART: [art] Store priv key in slot 0x5
23,326,057 UART: [art] Derive Key Pair - Done
23,339,322 UART: [art] Signing Cert with AUTHO
23,340,618 UART: RITY.KEYID = 7
25,052,243 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,755 UART: [art] PUB.X = 0778B736797AA16DA7B3B61E3CE7199763895E1ADE68A5B52C6411E7CB623918FE14E350EA6C742E7B6B03881E2F8F33
25,061,008 UART: [art] PUB.Y = 6D9B87C438CCB71FA5AC18F60C7BEB341D1ED24336997360EB81E68FA4B58FFC83374028CF03746B929C65B73184B08C
25,068,258 UART: [art] SIG.R = E10A8DA9FD8842DD2B1A8117325F9FE59AAA91C776327C0FB6774CD081215BD123969505FCDBB9252C756A7D70002D78
25,075,647 UART: [art] SIG.S = 3695F28F24BDA5301C50032244C7AF80929757DB96627A254D8E992D7A15125CDB975D5FB28D94DA402E48DC3FAF0EF5
26,054,476 UART: Caliptra RT
26,055,166 UART: [state] CFI Enabled
26,219,757 UART: [rt] RT listening for mailbox commands...
26,223,661 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,268,758 UART: [rt]cmd =0x4c4d5356, len=1672
26,470,618 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,439,729 ready_for_fw is high
3,440,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,759,266 >>> mbox cmd response: success
19,051,850 UART:
19,052,225 UART: Running Caliptra FMC ...
19,053,368 UART:
19,053,533 UART: [state] CFI Enabled
19,118,463 UART: [fht] FMC Alias Private Key: 7
20,882,177 UART: [art] Extend RT PCRs Done
20,883,404 UART: [art] Lock RT PCRs Done
20,885,056 UART: [art] Populate DV Done
20,890,596 UART: [fht] FMC Alias Private Key: 7
20,892,201 UART: [art] Derive CDI
20,893,021 UART: [art] Store in in slot 0x4
20,951,319 UART: [art] Derive Key Pair
20,952,359 UART: [art] Store priv key in slot 0x5
23,415,517 UART: [art] Derive Key Pair - Done
23,428,558 UART: [art] Signing Cert with AUTHO
23,429,893 UART: RITY.KEYID = 7
25,141,637 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,141 UART: [art] PUB.X = 86E2EE5DD3F845CA83197FBFAA817E8CB30AB5B8B6E05945D0B2C9D57628FF76C8E5FD8BD72B52ADD4AB12CEC5D1FC6A
25,150,443 UART: [art] PUB.Y = 5FAF9475A0F5724D634EA280E232E3CAFC21D0F19CFE86762F439A42E21161E536FBBEA5C7EC2F53643F48190C6AFA01
25,157,702 UART: [art] SIG.R = 87428EFDA6B610D55167905FD129E9085A230094DF1129D8671E957087A062BD45BED258BCC7C99A5B329CEE664EAC25
25,165,100 UART: [art] SIG.S = 54ECA18A2BDF542558A1AC4BC7F0EE9101644C789E44D3F56C7BE2BDB1CB6C86953245BAB620072F26085F7AA713936B
26,144,027 UART: Caliptra RT
26,144,721 UART: [state] CFI Enabled
26,308,946 UART: [rt] RT listening for mailbox commands...
26,312,874 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,358,073 UART: [rt]cmd =0x4c4d5356, len=1672
26,559,787 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,296 UART:
192,674 UART: Running Caliptra ROM ...
193,792 UART:
603,720 UART: [state] CFI Enabled
614,201 UART: [state] LifecycleState = Unprovisioned
616,565 UART: [state] DebugLocked = No
619,350 UART: [state] WD Timer not started. Device not locked for debugging
623,151 UART: [kat] SHA2-256
812,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,792 UART: [kat] ++
824,306 UART: [kat] sha1
835,592 UART: [kat] SHA2-256
838,592 UART: [kat] SHA2-384
844,714 UART: [kat] SHA2-512-ACC
847,285 UART: [kat] ECC-384
3,286,862 UART: [kat] HMAC-384Kdf
3,300,234 UART: [kat] LMS
3,832,046 UART: [kat] --
3,837,528 UART: [cold-reset] ++
3,839,238 UART: [fht] FHT @ 0x50003400
3,851,658 UART: [idev] ++
3,852,333 UART: [idev] CDI.KEYID = 6
3,853,362 UART: [idev] SUBJECT.KEYID = 7
3,854,457 UART: [idev] UDS.KEYID = 0
3,855,375 ready_for_fw is high
3,855,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,152 UART: [idev] Erasing UDS.KEYID = 0
6,333,380 UART: [idev] Sha1 KeyId Algorithm
6,355,256 UART: [idev] --
6,360,915 UART: [ldev] ++
6,361,583 UART: [ldev] CDI.KEYID = 6
6,362,512 UART: [ldev] SUBJECT.KEYID = 5
6,363,712 UART: [ldev] AUTHORITY.KEYID = 7
6,364,933 UART: [ldev] FE.KEYID = 1
6,376,929 UART: [ldev] Erasing FE.KEYID = 1
8,856,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,176 UART: [ldev] --
10,647,972 UART: [fwproc] Wait for Commands...
10,651,136 UART: [fwproc] Recv command 0x46574c44
10,653,389 UART: [fwproc] Recv'd Img size: 114448 bytes
14,101,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,702 >>> mbox cmd response: success
14,839,891 UART: [afmc] ++
14,840,591 UART: [afmc] CDI.KEYID = 6
14,841,693 UART: [afmc] SUBJECT.KEYID = 7
14,843,244 UART: [afmc] AUTHORITY.KEYID = 5
17,345,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,154 UART: [afmc] --
19,140,051 UART: [cold-reset] --
19,143,747 UART: [state] Locking Datavault
19,148,511 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,660 UART: [state] Locking ICCM
19,153,326 UART: [exit] Launching FMC @ 0x40000130
19,161,990 UART:
19,162,214 UART: Running Caliptra FMC ...
19,163,230 UART:
19,163,367 UART: [state] CFI Enabled
19,171,587 UART: [fht] FMC Alias Private Key: 7
20,928,846 UART: [art] Extend RT PCRs Done
20,930,068 UART: [art] Lock RT PCRs Done
20,931,717 UART: [art] Populate DV Done
20,937,445 UART: [fht] FMC Alias Private Key: 7
20,939,025 UART: [art] Derive CDI
20,939,751 UART: [art] Store in in slot 0x4
20,981,952 UART: [art] Derive Key Pair
20,982,990 UART: [art] Store priv key in slot 0x5
23,409,889 UART: [art] Derive Key Pair - Done
23,423,039 UART: [art] Signing Cert with AUTHO
23,424,337 UART: RITY.KEYID = 7
25,130,134 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,639 UART: [art] PUB.X = C22AEFE6876B34C59A59D776BC3C01FAE7E60BF79A780EB8727F263B0EA3A494245EF286FD8D9CE6422FB0A10DE3BE40
25,138,917 UART: [art] PUB.Y = D5E64CDC974B4FF11D4F3C5AE8B9DB8DC363D1AEB2AB18DAE2981F1AAA4EB42433CA57E012A7DC1EE02836C8CD3FD7B9
25,146,289 UART: [art] SIG.R = 8A9FF91D82372C9246900A5585B00714F740619CC53197945E4458C21BDA3163449F62C4015A5347846321490F858330
25,153,578 UART: [art] SIG.S = BCC9DD2BFFC341B7743ED9CF79DEEB733246F164526028505552E43BB6ABBBE940D3EA091C3FCD3A296EF723AA7CB7FB
26,132,812 UART: Caliptra RT
26,133,525 UART: [state] CFI Enabled
26,250,219 UART: [rt] RT listening for mailbox commands...
26,254,137 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,298,635 UART: [rt]cmd =0x4c4d5356, len=1672
26,500,381 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,755,169 ready_for_fw is high
3,755,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,579 >>> mbox cmd response: success
19,199,696 UART:
19,200,086 UART: Running Caliptra FMC ...
19,201,280 UART:
19,201,435 UART: [state] CFI Enabled
19,209,279 UART: [fht] FMC Alias Private Key: 7
20,965,891 UART: [art] Extend RT PCRs Done
20,967,106 UART: [art] Lock RT PCRs Done
20,968,627 UART: [art] Populate DV Done
20,974,092 UART: [fht] FMC Alias Private Key: 7
20,975,634 UART: [art] Derive CDI
20,976,446 UART: [art] Store in in slot 0x4
21,018,657 UART: [art] Derive Key Pair
21,019,669 UART: [art] Store priv key in slot 0x5
23,446,498 UART: [art] Derive Key Pair - Done
23,459,811 UART: [art] Signing Cert with AUTHO
23,461,116 UART: RITY.KEYID = 7
25,166,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,052 UART: [art] PUB.X = 4FEA300C94E842C7174C52BE866F93CEF419BD99AE3EF733E2FF461DA606C9F4FCC4B43DAD46F971DC551967914F7F1B
25,175,313 UART: [art] PUB.Y = C579FB324D01124EE869A8BC89AFA410A5AF26BD541198CAEC5A834BCA289C311D77E13CFBBE1644A5542A371C32442C
25,182,584 UART: [art] SIG.R = 62F663FD97B7D440D57D238C1312DDC7EB744CE717E51CA2199022F9B879E9699DFD7BF000295FCD43A29036EE89E9B5
25,189,959 UART: [art] SIG.S = 6204852A7C6092DBFD06B223C07EB16F3EDAE2E851AD1777C34EBD78355985940180775F4E4CC64DAB74846511E2CCA8
26,169,240 UART: Caliptra RT
26,169,927 UART: [state] CFI Enabled
26,287,035 UART: [rt] RT listening for mailbox commands...
26,290,968 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,335,367 UART: [rt]cmd =0x4c4d5356, len=1672
26,536,940 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,852 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,483 UART: [cold-reset] ++
1,477,047 UART: [fht] Storing FHT @ 0x50003400
1,479,910 UART: [idev] ++
1,480,078 UART: [idev] CDI.KEYID = 6
1,480,438 UART: [idev] SUBJECT.KEYID = 7
1,480,862 UART: [idev] UDS.KEYID = 0
1,481,207 ready_for_fw is high
1,481,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,786 UART: [idev] Erasing UDS.KEYID = 0
1,505,694 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,210 UART: [idev] --
1,515,111 UART: [ldev] ++
1,515,279 UART: [ldev] CDI.KEYID = 6
1,515,642 UART: [ldev] SUBJECT.KEYID = 5
1,516,068 UART: [ldev] AUTHORITY.KEYID = 7
1,516,531 UART: [ldev] FE.KEYID = 1
1,521,667 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,732 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,672 UART: [fwproc] Received command 0x46574c44
1,587,463 UART: [fwproc] Received Image of size 114448 bytes
2,887,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,305 >>> mbox cmd response: success
3,081,453 UART: [afmc] ++
3,081,621 UART: [afmc] CDI.KEYID = 6
3,081,983 UART: [afmc] SUBJECT.KEYID = 7
3,082,408 UART: [afmc] AUTHORITY.KEYID = 5
3,117,547 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,398 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,088 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,881 UART: [afmc] --
3,160,857 UART: [cold-reset] --
3,161,725 UART: [state] Locking Datavault
3,162,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,336 UART: [state] Locking ICCM
3,163,938 UART: [exit] Launching FMC @ 0x40000130
3,169,267 UART:
3,169,283 UART: Running Caliptra FMC ...
3,169,691 UART:
3,169,745 UART: [state] CFI Enabled
3,180,462 UART: [fht] FMC Alias Private Key: 7
3,288,913 UART: [art] Extend RT PCRs Done
3,289,341 UART: [art] Lock RT PCRs Done
3,290,965 UART: [art] Populate DV Done
3,299,172 UART: [fht] FMC Alias Private Key: 7
3,300,306 UART: [art] Derive CDI
3,300,586 UART: [art] Store in in slot 0x4
3,386,301 UART: [art] Derive Key Pair
3,386,661 UART: [art] Store priv key in slot 0x5
3,399,519 UART: [art] Derive Key Pair - Done
3,414,381 UART: [art] Signing Cert with AUTHO
3,414,861 UART: RITY.KEYID = 7
3,430,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,042 UART: [art] PUB.X = 478ABC2FA49EEAE63033AB5F249CDB0C5F2D9FFFAB6533FF43E7890D364FFD46FF1B3230E469EEE2203B7A52FC0288FE
3,437,827 UART: [art] PUB.Y = A3AA426A0F9F258CFA798E694B8BA04037B551C9DA330F8A16DEF15F7D3F99B224E00DA8A93FB560DF74FB5FD1A3370A
3,444,783 UART: [art] SIG.R = 323D412DC236475D77E0B0E98CD61C7608A7A3B97D30F914B88C9CC99513DAE7CFC19F6877DCCF9412C5BBA83CFC8F8F
3,451,566 UART: [art] SIG.S = 4802640DB96BD419C2950E995175E858DCE24ECB6B4B69D0C753D3B59C7F9820C6014A6463969F519268CE565D7FF0D7
3,475,313 UART: Caliptra RT
3,475,566 UART: [state] CFI Enabled
3,584,786 UART: [rt] RT listening for mailbox commands...
3,585,456 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,030 UART: [rt]cmd =0x4c4d5356, len=1672
3,878,481 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,037 ready_for_fw is high
1,362,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,735 >>> mbox cmd response: success
2,991,063 UART:
2,991,079 UART: Running Caliptra FMC ...
2,991,487 UART:
2,991,541 UART: [state] CFI Enabled
3,002,046 UART: [fht] FMC Alias Private Key: 7
3,110,151 UART: [art] Extend RT PCRs Done
3,110,579 UART: [art] Lock RT PCRs Done
3,112,295 UART: [art] Populate DV Done
3,120,386 UART: [fht] FMC Alias Private Key: 7
3,121,478 UART: [art] Derive CDI
3,121,758 UART: [art] Store in in slot 0x4
3,207,193 UART: [art] Derive Key Pair
3,207,553 UART: [art] Store priv key in slot 0x5
3,220,409 UART: [art] Derive Key Pair - Done
3,235,256 UART: [art] Signing Cert with AUTHO
3,235,736 UART: RITY.KEYID = 7
3,250,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,717 UART: [art] PUB.X = 8F8EBFF124DDFBACCEE16E3FDE0EB6E56A7EF3396873364CDC5F66616787DB6C24455852ACF82A02645F2A68A045B7E3
3,258,499 UART: [art] PUB.Y = 7229ACF389F72DB18155640681775E60CB0CB0F2B24F5771D64E876B8F44FEB855230508D2F17908CA28BA40BAF123A2
3,265,434 UART: [art] SIG.R = F63A4FFDDADB48541CAA9EF0F59FFDDA7EC957DC28524C297F698583683B4A24EE680192CFC089378536876C2434901B
3,272,209 UART: [art] SIG.S = 5AEAC99C194491128B65F96A9E6E9E8772A2085CDDB0F4CC82EECC42F9468A02F3FB5761BB72F4BEA29FD6ABDA7D3994
3,296,298 UART: Caliptra RT
3,296,551 UART: [state] CFI Enabled
3,404,686 UART: [rt] RT listening for mailbox commands...
3,405,356 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,644 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,197 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,780 UART: [kat] SHA2-256
892,718 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,994 UART: [cold-reset] ++
1,477,420 UART: [fht] Storing FHT @ 0x50003400
1,480,305 UART: [idev] ++
1,480,473 UART: [idev] CDI.KEYID = 6
1,480,833 UART: [idev] SUBJECT.KEYID = 7
1,481,257 UART: [idev] UDS.KEYID = 0
1,481,602 ready_for_fw is high
1,481,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,611 UART: [idev] --
1,515,724 UART: [ldev] ++
1,515,892 UART: [ldev] CDI.KEYID = 6
1,516,255 UART: [ldev] SUBJECT.KEYID = 5
1,516,681 UART: [ldev] AUTHORITY.KEYID = 7
1,517,144 UART: [ldev] FE.KEYID = 1
1,522,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,897 UART: [ldev] --
1,587,356 UART: [fwproc] Waiting for Commands...
1,588,035 UART: [fwproc] Received command 0x46574c44
1,588,826 UART: [fwproc] Received Image of size 114448 bytes
2,888,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,312 >>> mbox cmd response: success
3,082,450 UART: [afmc] ++
3,082,618 UART: [afmc] CDI.KEYID = 6
3,082,980 UART: [afmc] SUBJECT.KEYID = 7
3,083,405 UART: [afmc] AUTHORITY.KEYID = 5
3,118,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,126 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,519 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,209 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,088 UART: [afmc] --
3,161,086 UART: [cold-reset] --
3,161,954 UART: [state] Locking Datavault
3,163,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,637 UART: [state] Locking ICCM
3,164,197 UART: [exit] Launching FMC @ 0x40000130
3,169,526 UART:
3,169,542 UART: Running Caliptra FMC ...
3,169,950 UART:
3,170,093 UART: [state] CFI Enabled
3,180,692 UART: [fht] FMC Alias Private Key: 7
3,288,405 UART: [art] Extend RT PCRs Done
3,288,833 UART: [art] Lock RT PCRs Done
3,290,271 UART: [art] Populate DV Done
3,298,538 UART: [fht] FMC Alias Private Key: 7
3,299,684 UART: [art] Derive CDI
3,299,964 UART: [art] Store in in slot 0x4
3,385,869 UART: [art] Derive Key Pair
3,386,229 UART: [art] Store priv key in slot 0x5
3,399,491 UART: [art] Derive Key Pair - Done
3,414,361 UART: [art] Signing Cert with AUTHO
3,414,841 UART: RITY.KEYID = 7
3,430,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,822 UART: [art] PUB.X = 049A37DD63447009E0436013FED9530F6CEA57F90120FACC230A1998E643AF415678FD40221B92F2017AB1261A95E0F2
3,437,570 UART: [art] PUB.Y = 989104014D3A88A03CE4254F43614A38C6628E0DE864CFFAE0B26AC068CAA934BAA95D17C882F72E4AB2397841DFB76A
3,444,519 UART: [art] SIG.R = A231A5679586CF9299DDCEF6C71FFB3F639956265971E532AEEB881D6F1227487A4029E311255E1B634B5172EF56A5FB
3,451,289 UART: [art] SIG.S = 5956A3643EDCFE3BF364857CBF0732DD025F549865C79D4EE4CB76B8254007800B6ACE5F43B84AFA35D7BB36B7B40456
3,475,263 UART: Caliptra RT
3,475,608 UART: [state] CFI Enabled
3,583,901 UART: [rt] RT listening for mailbox commands...
3,584,571 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,083 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,804 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,974 ready_for_fw is high
1,362,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,380 >>> mbox cmd response: success
2,991,036 UART:
2,991,052 UART: Running Caliptra FMC ...
2,991,460 UART:
2,991,603 UART: [state] CFI Enabled
3,002,250 UART: [fht] FMC Alias Private Key: 7
3,109,981 UART: [art] Extend RT PCRs Done
3,110,409 UART: [art] Lock RT PCRs Done
3,111,861 UART: [art] Populate DV Done
3,120,132 UART: [fht] FMC Alias Private Key: 7
3,121,184 UART: [art] Derive CDI
3,121,464 UART: [art] Store in in slot 0x4
3,207,563 UART: [art] Derive Key Pair
3,207,923 UART: [art] Store priv key in slot 0x5
3,221,163 UART: [art] Derive Key Pair - Done
3,235,793 UART: [art] Signing Cert with AUTHO
3,236,273 UART: RITY.KEYID = 7
3,251,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,832 UART: [art] PUB.X = F7CE0351281449E075ED30E31941467884A22F35CF16F2D696D1D6A84AEF082F7E9BD46C155210991020C4FB4DDF4085
3,258,594 UART: [art] PUB.Y = 35B2F23C1AC0D9AB03D474A9BB502FFB7A19832D9C9AAB10170073B565854FAF944F6DE130CDABF92F4DBE1FE2D6D8EF
3,265,543 UART: [art] SIG.R = DF7501F112E8543515695A83BC18E4D792FCB0074574067832509EA56C87CBAB14666DE2B7F71FA27D4451416ED23419
3,272,298 UART: [art] SIG.S = AD4349D9D5A4BF51062C45D3F3F01667EC63063E902B6B99D5376A71254096968F513250638989B0E9174DFA7980C94B
3,296,357 UART: Caliptra RT
3,296,702 UART: [state] CFI Enabled
3,404,498 UART: [rt] RT listening for mailbox commands...
3,405,168 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,798 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,451 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,087 UART: [fht] FHT @ 0x50003400
1,174,866 UART: [idev] ++
1,175,034 UART: [idev] CDI.KEYID = 6
1,175,394 UART: [idev] SUBJECT.KEYID = 7
1,175,818 UART: [idev] UDS.KEYID = 0
1,176,163 ready_for_fw is high
1,176,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,200,949 UART: [idev] Sha1 KeyId Algorithm
1,209,441 UART: [idev] --
1,210,641 UART: [ldev] ++
1,210,809 UART: [ldev] CDI.KEYID = 6
1,211,172 UART: [ldev] SUBJECT.KEYID = 5
1,211,598 UART: [ldev] AUTHORITY.KEYID = 7
1,212,061 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,640 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,656 >>> mbox cmd response: success
2,775,812 UART: [afmc] ++
2,775,980 UART: [afmc] CDI.KEYID = 6
2,776,342 UART: [afmc] SUBJECT.KEYID = 7
2,776,767 UART: [afmc] AUTHORITY.KEYID = 5
2,811,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,613 UART: [afmc] --
2,854,623 UART: [cold-reset] --
2,855,213 UART: [state] Locking Datavault
2,856,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,798 UART: [state] Locking ICCM
2,857,462 UART: [exit] Launching FMC @ 0x40000130
2,862,791 UART:
2,862,807 UART: Running Caliptra FMC ...
2,863,215 UART:
2,863,269 UART: [state] CFI Enabled
2,873,622 UART: [fht] FMC Alias Private Key: 7
2,981,627 UART: [art] Extend RT PCRs Done
2,982,055 UART: [art] Lock RT PCRs Done
2,983,425 UART: [art] Populate DV Done
2,991,792 UART: [fht] FMC Alias Private Key: 7
2,992,962 UART: [art] Derive CDI
2,993,242 UART: [art] Store in in slot 0x4
3,079,217 UART: [art] Derive Key Pair
3,079,577 UART: [art] Store priv key in slot 0x5
3,092,681 UART: [art] Derive Key Pair - Done
3,107,352 UART: [art] Signing Cert with AUTHO
3,107,832 UART: RITY.KEYID = 7
3,123,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,021 UART: [art] PUB.X = 3E16584E5A08BE4017E7307836C0D826287BC8C7E4027278BCC143821B89F30CB29E750607882C4AF7D567F334223F12
3,130,766 UART: [art] PUB.Y = 8798E2F66602F4991713D870853F38A7576D6EE1280224F96FD1F951957FE15E07B55DF1684016730D983305B0677B29
3,137,683 UART: [art] SIG.R = D495E3E131FC89650424FA87D9F478916EEE1D27014FC5649435A53C7F66C2CF35B4B4413A3D0A34BF1DFC9E6CE638CA
3,144,454 UART: [art] SIG.S = 987924E57C234340699AC0492013126070BD8C0BDAA94A66700157E0ACD04254C94047516DB9F236F6A6BDF3B68B7BB4
3,168,385 UART: Caliptra RT
3,168,638 UART: [state] CFI Enabled
3,277,326 UART: [rt] RT listening for mailbox commands...
3,277,996 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,918 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,655 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,753 ready_for_fw is high
1,059,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,555 >>> mbox cmd response: success
2,687,781 UART:
2,687,797 UART: Running Caliptra FMC ...
2,688,205 UART:
2,688,259 UART: [state] CFI Enabled
2,698,680 UART: [fht] FMC Alias Private Key: 7
2,806,731 UART: [art] Extend RT PCRs Done
2,807,159 UART: [art] Lock RT PCRs Done
2,808,783 UART: [art] Populate DV Done
2,817,306 UART: [fht] FMC Alias Private Key: 7
2,818,304 UART: [art] Derive CDI
2,818,584 UART: [art] Store in in slot 0x4
2,904,301 UART: [art] Derive Key Pair
2,904,661 UART: [art] Store priv key in slot 0x5
2,917,859 UART: [art] Derive Key Pair - Done
2,932,657 UART: [art] Signing Cert with AUTHO
2,933,137 UART: RITY.KEYID = 7
2,948,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,434 UART: [art] PUB.X = F9C739B0E674CE157EA21DE695655ED8E7B8C602E15D66EEB793B6DA76578616B04687CF9E9C1F111A336F228BA4804C
2,956,207 UART: [art] PUB.Y = 8A78EEDD09C4394B845028271A2EFF7D6834FFE9B04EE37736F8E5E9F0017B828DA1E5F567B1290972EB4C27C563D11F
2,963,154 UART: [art] SIG.R = 0A48AE2B9834A36DDEA32B7376C0D315BD9335A718F0BAF3491E73C96BD616F15F75D9D69E65D324D1377BB15D435AD2
2,969,929 UART: [art] SIG.S = E8AAB916DA8D021FF2590F37542BAFF0F2BADB0E86338784FDFC81EEA75F8D86A76A0B2832236141885B26A4A8A09B82
2,994,020 UART: Caliptra RT
2,994,273 UART: [state] CFI Enabled
3,101,324 UART: [rt] RT listening for mailbox commands...
3,101,994 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,898 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,193 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
893,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,702 UART: [kat] ++
897,854 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
918,127 UART: [kat] HMAC-384Kdf
922,513 UART: [kat] LMS
1,170,841 UART: [kat] --
1,171,588 UART: [cold-reset] ++
1,172,062 UART: [fht] FHT @ 0x50003400
1,174,797 UART: [idev] ++
1,174,965 UART: [idev] CDI.KEYID = 6
1,175,325 UART: [idev] SUBJECT.KEYID = 7
1,175,749 UART: [idev] UDS.KEYID = 0
1,176,094 ready_for_fw is high
1,176,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,945 UART: [idev] Erasing UDS.KEYID = 0
1,200,496 UART: [idev] Sha1 KeyId Algorithm
1,209,056 UART: [idev] --
1,210,140 UART: [ldev] ++
1,210,308 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,097 UART: [ldev] AUTHORITY.KEYID = 7
1,211,560 UART: [ldev] FE.KEYID = 1
1,216,996 UART: [ldev] Erasing FE.KEYID = 1
1,243,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,646 UART: [ldev] --
1,283,049 UART: [fwproc] Wait for Commands...
1,283,859 UART: [fwproc] Recv command 0x46574c44
1,284,587 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,709 >>> mbox cmd response: success
2,777,747 UART: [afmc] ++
2,777,915 UART: [afmc] CDI.KEYID = 6
2,778,277 UART: [afmc] SUBJECT.KEYID = 7
2,778,702 UART: [afmc] AUTHORITY.KEYID = 5
2,814,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,155 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,694 UART: [afmc] --
2,857,726 UART: [cold-reset] --
2,858,386 UART: [state] Locking Datavault
2,859,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,099 UART: [state] Locking ICCM
2,860,621 UART: [exit] Launching FMC @ 0x40000130
2,865,950 UART:
2,865,966 UART: Running Caliptra FMC ...
2,866,374 UART:
2,866,517 UART: [state] CFI Enabled
2,877,786 UART: [fht] FMC Alias Private Key: 7
2,985,355 UART: [art] Extend RT PCRs Done
2,985,783 UART: [art] Lock RT PCRs Done
2,987,339 UART: [art] Populate DV Done
2,995,662 UART: [fht] FMC Alias Private Key: 7
2,996,602 UART: [art] Derive CDI
2,996,882 UART: [art] Store in in slot 0x4
3,082,125 UART: [art] Derive Key Pair
3,082,485 UART: [art] Store priv key in slot 0x5
3,096,439 UART: [art] Derive Key Pair - Done
3,111,161 UART: [art] Signing Cert with AUTHO
3,111,641 UART: RITY.KEYID = 7
3,126,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,544 UART: [art] PUB.X = 8A5D7A40BF09E92358E4CE8230A563AF32D23E35830F51E648D69F722ABEA12D5B22FEE144DCB1DE0471D4E1D97E7B3A
3,134,319 UART: [art] PUB.Y = E958FBB7581ABBFED645D97D8B515DDDE4E698EADDEA72E00E35D7A536D0A1610C77AAC4558C0D8779FB2A41099ADD85
3,141,279 UART: [art] SIG.R = 5B160FA7DE915B54F6A741774D6640B25030708DCDA33A4E45D5046B9D1DB1F7668FBF56977CF45E09AA405FDC589AD9
3,148,048 UART: [art] SIG.S = 6AAC98EF0F5351A8CB84EDDBF0885578414A2F3733331079D058BDB0F7019600C94E6DE55875289A9A16E5E39FF94820
3,172,171 UART: Caliptra RT
3,172,516 UART: [state] CFI Enabled
3,280,791 UART: [rt] RT listening for mailbox commands...
3,281,461 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,115 UART: [rt]cmd =0x4c4d5356, len=1672
3,574,738 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 ready_for_fw is high
1,060,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,066 >>> mbox cmd response: success
2,691,320 UART:
2,691,336 UART: Running Caliptra FMC ...
2,691,744 UART:
2,691,887 UART: [state] CFI Enabled
2,702,096 UART: [fht] FMC Alias Private Key: 7
2,809,519 UART: [art] Extend RT PCRs Done
2,809,947 UART: [art] Lock RT PCRs Done
2,811,487 UART: [art] Populate DV Done
2,819,898 UART: [fht] FMC Alias Private Key: 7
2,820,978 UART: [art] Derive CDI
2,821,258 UART: [art] Store in in slot 0x4
2,906,941 UART: [art] Derive Key Pair
2,907,301 UART: [art] Store priv key in slot 0x5
2,920,561 UART: [art] Derive Key Pair - Done
2,935,331 UART: [art] Signing Cert with AUTHO
2,935,811 UART: RITY.KEYID = 7
2,950,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,556 UART: [art] PUB.X = 4395652880A41E87484533363F591A390AC009D0C0C7B8DB017202D6DA765185052F0C969AC399EAC4BFF891FA361D63
2,958,302 UART: [art] PUB.Y = 97AECDD6BF9EC89E5978E16D627CF5B06E74A5D7489113268200B36A3026910B02D2C33CC18B948356587FE657027356
2,965,215 UART: [art] SIG.R = 8222313C5CC9D730E344A201F4FF075A47F1D134E20AF5F302F0AF1376A257BFE09674E29613C5FD34BFB3B69566C931
2,971,975 UART: [art] SIG.S = 624E93BC6CA58A5B504F106A3AB81F2D9E009F50FF876D53EEAA78320D4CCC604FC6E4E6E02B24CDB5675C7012D19900
2,996,069 UART: Caliptra RT
2,996,414 UART: [state] CFI Enabled
3,104,039 UART: [rt] RT listening for mailbox commands...
3,104,709 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,551 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,892 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 ready_for_fw is high
1,174,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,668 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,336 >>> mbox cmd response: success
2,775,587 UART: [afmc] ++
2,775,755 UART: [afmc] CDI.KEYID = 6
2,776,118 UART: [afmc] SUBJECT.KEYID = 7
2,776,544 UART: [afmc] AUTHORITY.KEYID = 5
2,811,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,394 UART: [afmc] --
2,855,488 UART: [cold-reset] --
2,856,534 UART: [state] Locking Datavault
2,857,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,569 UART: [state] Locking ICCM
2,859,095 UART: [exit] Launching FMC @ 0x40000130
2,864,424 UART:
2,864,440 UART: Running Caliptra FMC ...
2,864,848 UART:
2,864,902 UART: [state] CFI Enabled
2,875,061 UART: [fht] FMC Alias Private Key: 7
2,983,474 UART: [art] Extend RT PCRs Done
2,983,902 UART: [art] Lock RT PCRs Done
2,985,710 UART: [art] Populate DV Done
2,993,987 UART: [fht] FMC Alias Private Key: 7
2,995,157 UART: [art] Derive CDI
2,995,437 UART: [art] Store in in slot 0x4
3,080,920 UART: [art] Derive Key Pair
3,081,280 UART: [art] Store priv key in slot 0x5
3,094,732 UART: [art] Derive Key Pair - Done
3,109,774 UART: [art] Signing Cert with AUTHO
3,110,254 UART: RITY.KEYID = 7
3,125,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,283 UART: [art] PUB.X = AC00E48DF5E75387A361B32364E66402F64C7BE3A88E92B7421F390B88EB260D2268A7B5B43BF255964B6243486C2BA0
3,133,020 UART: [art] PUB.Y = 05D6C29B1F097898C6EF2AD45AB21D506BFE963BCBECC8EE9CB4AAEFEC00812A8977C37584AEB29E458C3BAFC983525F
3,139,966 UART: [art] SIG.R = 5ED5BB14E08C36A3298747B32A833D48EB980FD133DACB6776C58157371FF3B2FE2123D5991D2488EA7947326E370682
3,146,726 UART: [art] SIG.S = CFAC439864A352C2C79BD16AE54E83F4F6C0B655BAC3B25C50DFD4F5955B45512774B23830683751081C3BA4064633E7
3,169,795 UART: Caliptra RT
3,170,048 UART: [state] CFI Enabled
3,277,179 UART: [rt] RT listening for mailbox commands...
3,277,849 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,623 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,032 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 ready_for_fw is high
1,055,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,842 >>> mbox cmd response: success
2,685,136 UART:
2,685,152 UART: Running Caliptra FMC ...
2,685,560 UART:
2,685,614 UART: [state] CFI Enabled
2,696,281 UART: [fht] FMC Alias Private Key: 7
2,804,868 UART: [art] Extend RT PCRs Done
2,805,296 UART: [art] Lock RT PCRs Done
2,807,070 UART: [art] Populate DV Done
2,815,519 UART: [fht] FMC Alias Private Key: 7
2,816,637 UART: [art] Derive CDI
2,816,917 UART: [art] Store in in slot 0x4
2,902,288 UART: [art] Derive Key Pair
2,902,648 UART: [art] Store priv key in slot 0x5
2,916,064 UART: [art] Derive Key Pair - Done
2,930,760 UART: [art] Signing Cert with AUTHO
2,931,240 UART: RITY.KEYID = 7
2,946,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,011 UART: [art] PUB.X = 4E1FBABA7E38FF86CFF4D192E4BB73437373BE212934C97A054E09DE7665C8DC742BAC0E7E8AF36B095914858DA58A45
2,953,781 UART: [art] PUB.Y = 1CA7C399E037789C7BD30D058955CB8A59F15BCD27E6DF66A3D15F278B3B9156AD4AB3AD878F5FB66E04166AE6D93B67
2,960,734 UART: [art] SIG.R = 29F3F7EE7940FFE3251A575E7467FBB4D56F4817E82CE2B6DE5BBD0BB392D8F0E5844E67DA777EAA8F7DAD7719A6A49D
2,967,521 UART: [art] SIG.S = E4BBE97FCA678DA7DCCB95B193B3EF932AF33DA4A0D29189ECFE5E055BA573BD38D6192B669B139E5294C054B416E646
2,991,559 UART: Caliptra RT
2,991,812 UART: [state] CFI Enabled
3,099,567 UART: [rt] RT listening for mailbox commands...
3,100,237 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,783 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,266 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,834 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,101 UART: [ldev] ++
1,209,269 UART: [ldev] CDI.KEYID = 6
1,209,633 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,925 UART: [ldev] --
1,281,293 UART: [fwproc] Wait for Commands...
1,282,076 UART: [fwproc] Recv command 0x46574c44
1,282,809 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,129 >>> mbox cmd response: success
2,774,336 UART: [afmc] ++
2,774,504 UART: [afmc] CDI.KEYID = 6
2,774,867 UART: [afmc] SUBJECT.KEYID = 7
2,775,293 UART: [afmc] AUTHORITY.KEYID = 5
2,810,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,421 UART: [afmc] --
2,854,371 UART: [cold-reset] --
2,855,155 UART: [state] Locking Datavault
2,856,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,878 UART: [state] Locking ICCM
2,857,372 UART: [exit] Launching FMC @ 0x40000130
2,862,701 UART:
2,862,717 UART: Running Caliptra FMC ...
2,863,125 UART:
2,863,268 UART: [state] CFI Enabled
2,874,035 UART: [fht] FMC Alias Private Key: 7
2,981,964 UART: [art] Extend RT PCRs Done
2,982,392 UART: [art] Lock RT PCRs Done
2,983,768 UART: [art] Populate DV Done
2,991,905 UART: [fht] FMC Alias Private Key: 7
2,993,045 UART: [art] Derive CDI
2,993,325 UART: [art] Store in in slot 0x4
3,078,998 UART: [art] Derive Key Pair
3,079,358 UART: [art] Store priv key in slot 0x5
3,092,952 UART: [art] Derive Key Pair - Done
3,107,550 UART: [art] Signing Cert with AUTHO
3,108,030 UART: RITY.KEYID = 7
3,123,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,957 UART: [art] PUB.X = 318030AA89F0E5C5A01B4F273F04CA5DEDCF5B952A13AC7FB3814AEC411DF7DBBEAEA7DDEFE4543AAB8698330F3FCE56
3,130,751 UART: [art] PUB.Y = 7FD4033B022ACF36D1B45DB5C89406C91A52D825DA5C432D01CAB9403D0D91B6A2BA21B292D72756CEEACCD7CA7465A0
3,137,702 UART: [art] SIG.R = 24C5CF3AC8F401EA3B36DBDB3359DFE200532BD496D642BB8758793C0E490CE96383C1F75B01649EA729DA8E9605E0C4
3,144,443 UART: [art] SIG.S = B21936D92F39BB3577C031210909A8CBD0B70C8D014E7F226BA5FE82861D5B986AD5782C42EB586E26792EAAEFBE71BA
3,168,514 UART: Caliptra RT
3,168,859 UART: [state] CFI Enabled
3,277,108 UART: [rt] RT listening for mailbox commands...
3,277,778 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,602 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,005 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 ready_for_fw is high
1,056,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,221 >>> mbox cmd response: success
2,685,927 UART:
2,685,943 UART: Running Caliptra FMC ...
2,686,351 UART:
2,686,494 UART: [state] CFI Enabled
2,696,915 UART: [fht] FMC Alias Private Key: 7
2,805,310 UART: [art] Extend RT PCRs Done
2,805,738 UART: [art] Lock RT PCRs Done
2,807,180 UART: [art] Populate DV Done
2,815,689 UART: [fht] FMC Alias Private Key: 7
2,816,737 UART: [art] Derive CDI
2,817,017 UART: [art] Store in in slot 0x4
2,902,560 UART: [art] Derive Key Pair
2,902,920 UART: [art] Store priv key in slot 0x5
2,916,834 UART: [art] Derive Key Pair - Done
2,931,544 UART: [art] Signing Cert with AUTHO
2,932,024 UART: RITY.KEYID = 7
2,947,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,871 UART: [art] PUB.X = 5819CABB7819E5DA492F1762501CBB59D0E19B559F06FA6F0C29B1EF3C4086E77BF947AE4C2D203C683D099A8A358F66
2,954,640 UART: [art] PUB.Y = 8E67C3C0047B2D5864DA8C90952C3ED4804930F9457F56EF2D6ABA48699FFC8E10884FA631FFEB663FC41E9701823C53
2,961,588 UART: [art] SIG.R = 8F6C39AE5D4BEAB17A29E6F41A40B69421AAE4CD5736718A43B5F70F30179EF5CA42CEC193F6A8A5722EA23CFB003543
2,968,347 UART: [art] SIG.S = 376420E29AE73B8A9D9D7AC891820744E35D6AF1BE1065063722B9746F1C1634AC65D8EC9261818C87816A0709CF7D3D
2,991,756 UART: Caliptra RT
2,992,101 UART: [state] CFI Enabled
3,098,880 UART: [rt] RT listening for mailbox commands...
3,099,550 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,102 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,301 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,365 UART:
192,734 UART: Running Caliptra ROM ...
193,933 UART:
194,094 UART: [state] CFI Enabled
267,450 UART: [state] LifecycleState = Unprovisioned
269,155 UART: [state] DebugLocked = No
271,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,628 UART: [kat] SHA2-256
445,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,889 UART: [kat] ++
456,366 UART: [kat] sha1
468,738 UART: [kat] SHA2-256
471,459 UART: [kat] SHA2-384
475,883 UART: [kat] SHA2-512-ACC
478,250 UART: [kat] ECC-384
2,769,639 UART: [kat] HMAC-384Kdf
2,800,713 UART: [kat] LMS
3,990,953 UART: [kat] --
3,996,248 UART: [cold-reset] ++
3,998,465 UART: [fht] Storing FHT @ 0x50003400
4,009,660 UART: [idev] ++
4,010,236 UART: [idev] CDI.KEYID = 6
4,011,223 UART: [idev] SUBJECT.KEYID = 7
4,012,402 UART: [idev] UDS.KEYID = 0
4,013,446 ready_for_fw is high
4,013,652 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,174 UART: [idev] Erasing UDS.KEYID = 0
7,348,243 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,470 UART: [idev] --
7,374,891 UART: [ldev] ++
7,375,456 UART: [ldev] CDI.KEYID = 6
7,376,399 UART: [ldev] SUBJECT.KEYID = 5
7,377,586 UART: [ldev] AUTHORITY.KEYID = 7
7,378,926 UART: [ldev] FE.KEYID = 1
7,422,993 UART: [ldev] Erasing FE.KEYID = 1
10,756,451 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,937 UART: [ldev] --
13,136,340 UART: [fwproc] Waiting for Commands...
13,138,978 UART: [fwproc] Received command 0x46574c44
13,141,160 UART: [fwproc] Received Image of size 114124 bytes
17,192,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,644 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,655,368 >>> mbox cmd response: success
17,658,788 UART: [afmc] ++
17,659,391 UART: [afmc] CDI.KEYID = 6
17,660,305 UART: [afmc] SUBJECT.KEYID = 7
17,661,520 UART: [afmc] AUTHORITY.KEYID = 5
21,019,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,319,183 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,321,488 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,335,874 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,350,681 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,161 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,387,685 UART: [afmc] --
23,392,401 UART: [cold-reset] --
23,397,026 UART: [state] Locking Datavault
23,401,197 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,950 UART: [state] Locking ICCM
23,405,750 UART: [exit] Launching FMC @ 0x40000130
23,414,120 UART:
23,414,357 UART: Running Caliptra FMC ...
23,415,459 UART:
23,415,616 UART: [state] CFI Enabled
23,480,052 UART: [fht] FMC Alias Private Key: 7
25,818,078 UART: [art] Extend RT PCRs Done
25,819,301 UART: [art] Lock RT PCRs Done
25,820,958 UART: [art] Populate DV Done
25,826,477 UART: [fht] FMC Alias Private Key: 7
25,827,959 UART: [art] Derive CDI
25,828,695 UART: [art] Store in in slot 0x4
25,889,035 UART: [art] Derive Key Pair
25,890,080 UART: [art] Store priv key in slot 0x5
29,183,412 UART: [art] Derive Key Pair - Done
29,196,135 UART: [art] Signing Cert with AUTHO
29,197,438 UART: RITY.KEYID = 7
31,484,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,484 UART: [art] PUB.X = FF81AFEC3BA58FFAB78278C6BC0D09EECD122EC8BDDDD120FF9344EA6444DF3BEFFDC58F69A3A8A2D85BBE7CACAFF060
31,493,792 UART: [art] PUB.Y = 483FE2F0E76C72CBC37FC5320B5A60DB7F0543DD67D570552AA8F9FB5009A8DC76ABAEC5E6936B74BD3091ABD835FFB9
31,501,034 UART: [art] SIG.R = 008BC0B376C3B491EEB7B8D5A38B33985466E629F9B3BD4774C152945602F8CF917028119D2EAFFC51C28D5F88950EF2
31,508,429 UART: [art] SIG.S = 3E79318B53D9700747488B4B7C546B9B1AF441D4B9246F4A82E31ACD9418D6BFF58C662D43698BED2D7D66BE6D0503EC
32,813,921 UART: Caliptra RT
32,814,624 UART: [state] CFI Enabled
32,976,739 UART: [rt] RT listening for mailbox commands...
32,980,764 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,025,134 UART: [rt]cmd =0x4c4d5356, len=1672
33,439,720 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,806,641 ready_for_fw is high
3,807,144 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,822 >>> mbox cmd response: success
23,571,418 UART:
23,571,813 UART: Running Caliptra FMC ...
23,573,149 UART:
23,573,332 UART: [state] CFI Enabled
23,639,398 UART: [fht] FMC Alias Private Key: 7
25,977,303 UART: [art] Extend RT PCRs Done
25,978,566 UART: [art] Lock RT PCRs Done
25,980,076 UART: [art] Populate DV Done
25,985,444 UART: [fht] FMC Alias Private Key: 7
25,986,989 UART: [art] Derive CDI
25,987,807 UART: [art] Store in in slot 0x4
26,048,148 UART: [art] Derive Key Pair
26,049,152 UART: [art] Store priv key in slot 0x5
29,341,868 UART: [art] Derive Key Pair - Done
29,354,653 UART: [art] Signing Cert with AUTHO
29,355,957 UART: RITY.KEYID = 7
31,644,031 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,542 UART: [art] PUB.X = 91733B764DB9A650A362EF9CC4990EA25B2C955C640902504D3A2B00A3EFD9B9FBC7C021898E5B2DEF8C07C47DD69DB6
31,652,817 UART: [art] PUB.Y = 37AF1E55D50E23FEAB22834EBA508CA533E8BA3BF3095F3F9D1B9AC57B0078B39F0A0CACC6BAC8657DD267FDE9EE16E1
31,660,047 UART: [art] SIG.R = 3A24010BE6222D83C6DD7BF5566ACC79566D21383DEA8A1E45E1F947554C1EF8C6EF6DBFC41BF24254E74B8AD613A307
31,667,451 UART: [art] SIG.S = 9411922695C71CCF756D24169EB6207DE3FC4540CA1130B93CE6119A72546D4CB29C9B614E9D5309DCF2A436D7BB0773
32,972,279 UART: Caliptra RT
32,972,990 UART: [state] CFI Enabled
33,136,166 UART: [rt] RT listening for mailbox commands...
33,140,168 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,184,596 UART: [rt]cmd =0x4c4d5356, len=1672
33,599,068 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,345 UART:
192,706 UART: Running Caliptra ROM ...
193,911 UART:
603,622 UART: [state] CFI Enabled
614,590 UART: [state] LifecycleState = Unprovisioned
616,463 UART: [state] DebugLocked = No
619,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,158 UART: [kat] SHA2-256
793,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,411 UART: [kat] ++
804,942 UART: [kat] sha1
815,461 UART: [kat] SHA2-256
818,184 UART: [kat] SHA2-384
825,233 UART: [kat] SHA2-512-ACC
827,593 UART: [kat] ECC-384
3,111,862 UART: [kat] HMAC-384Kdf
3,124,096 UART: [kat] LMS
4,314,257 UART: [kat] --
4,318,021 UART: [cold-reset] ++
4,319,886 UART: [fht] Storing FHT @ 0x50003400
4,330,294 UART: [idev] ++
4,330,854 UART: [idev] CDI.KEYID = 6
4,331,878 UART: [idev] SUBJECT.KEYID = 7
4,333,017 UART: [idev] UDS.KEYID = 0
4,334,023 ready_for_fw is high
4,334,238 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,632 UART: [idev] Erasing UDS.KEYID = 0
7,620,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,802 UART: [idev] --
7,645,508 UART: [ldev] ++
7,646,134 UART: [ldev] CDI.KEYID = 6
7,647,012 UART: [ldev] SUBJECT.KEYID = 5
7,648,274 UART: [ldev] AUTHORITY.KEYID = 7
7,649,554 UART: [ldev] FE.KEYID = 1
7,659,845 UART: [ldev] Erasing FE.KEYID = 1
10,949,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,553 UART: [ldev] --
13,311,271 UART: [fwproc] Waiting for Commands...
13,314,608 UART: [fwproc] Received command 0x46574c44
13,316,835 UART: [fwproc] Received Image of size 114124 bytes
17,372,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,014 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,654 >>> mbox cmd response: success
17,841,665 UART: [afmc] ++
17,842,303 UART: [afmc] CDI.KEYID = 6
17,843,187 UART: [afmc] SUBJECT.KEYID = 7
17,844,340 UART: [afmc] AUTHORITY.KEYID = 5
21,162,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,786 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,062 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,483 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,270 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,691 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,264 UART: [afmc] --
23,527,649 UART: [cold-reset] --
23,531,309 UART: [state] Locking Datavault
23,538,138 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,892 UART: [state] Locking ICCM
23,542,382 UART: [exit] Launching FMC @ 0x40000130
23,550,786 UART:
23,551,019 UART: Running Caliptra FMC ...
23,552,115 UART:
23,552,273 UART: [state] CFI Enabled
23,560,106 UART: [fht] FMC Alias Private Key: 7
25,891,121 UART: [art] Extend RT PCRs Done
25,892,394 UART: [art] Lock RT PCRs Done
25,893,847 UART: [art] Populate DV Done
25,899,374 UART: [fht] FMC Alias Private Key: 7
25,901,021 UART: [art] Derive CDI
25,901,755 UART: [art] Store in in slot 0x4
25,944,237 UART: [art] Derive Key Pair
25,945,232 UART: [art] Store priv key in slot 0x5
29,187,340 UART: [art] Derive Key Pair - Done
29,200,987 UART: [art] Signing Cert with AUTHO
29,202,281 UART: RITY.KEYID = 7
31,481,490 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,005 UART: [art] PUB.X = 32807FF2764D211A571AAB133EEAFF475F685E3BA7B25D5F2F6D06001A3B59991DBF4A6B41069D95FA1F5C7D40A90C5C
31,490,243 UART: [art] PUB.Y = 567EEA175B6A86AB12C056CF6FA11C430F84BCE9DC17E2916697848A02E2ED81527D0C837ED34D21CE81DA8EB5B89018
31,497,525 UART: [art] SIG.R = AF2914D646D3DFD690286C9118C71E76FC9D87502DE3A4CF3A0B44902F620E9DA69369FB6D2917A7608EB7C1545B41EF
31,504,902 UART: [art] SIG.S = 6F56FEC3CBF844C271B54BF2F081A3B5B20AD7A1C6A44C5B817E526BC84C20F6C89EA3D03A118FBF642F72C556B60935
32,810,639 UART: Caliptra RT
32,811,334 UART: [state] CFI Enabled
32,929,373 UART: [rt] RT listening for mailbox commands...
32,933,452 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,977,812 UART: [rt]cmd =0x4c4d5356, len=1672
33,392,622 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
4,127,439 ready_for_fw is high
4,127,849 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,791 >>> mbox cmd response: success
23,697,109 UART:
23,697,499 UART: Running Caliptra FMC ...
23,698,608 UART:
23,698,756 UART: [state] CFI Enabled
23,706,779 UART: [fht] FMC Alias Private Key: 7
26,037,206 UART: [art] Extend RT PCRs Done
26,038,431 UART: [art] Lock RT PCRs Done
26,039,920 UART: [art] Populate DV Done
26,045,500 UART: [fht] FMC Alias Private Key: 7
26,047,062 UART: [art] Derive CDI
26,047,799 UART: [art] Store in in slot 0x4
26,090,121 UART: [art] Derive Key Pair
26,091,118 UART: [art] Store priv key in slot 0x5
29,333,587 UART: [art] Derive Key Pair - Done
29,346,313 UART: [art] Signing Cert with AUTHO
29,347,612 UART: RITY.KEYID = 7
31,627,194 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,708 UART: [art] PUB.X = 3A51A4B78BAA9AA9558029D88197D8FC413389CE2CF9A42AC5589CC1DAD367C74AE563C08D2EAD9D766BD4F0B5A5B0FF
31,635,939 UART: [art] PUB.Y = 4D3F29EBA26787C28B3931A75206F633E0A1F14612EC2D0642AFB1FEF0CDB5FD285FA5778DCBB84D98105EB1EFE07021
31,643,214 UART: [art] SIG.R = 2FB26E090DAC3B7424480713A8C00B3E5203C9C3041E7FF848A1BA3A17DAE79308EF5C84A251AC757A785A192D9B0A09
31,650,597 UART: [art] SIG.S = 9A438DC766540D95AB4DB04CB4DF8852711169AEA32A1387AB6CE2E8D8DE72240E3DFEB882075776974BAF6C7AE2346B
32,956,012 UART: Caliptra RT
32,956,722 UART: [state] CFI Enabled
33,073,972 UART: [rt] RT listening for mailbox commands...
33,077,936 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,122,251 UART: [rt]cmd =0x4c4d5356, len=1672
33,536,728 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,995 UART:
192,364 UART: Running Caliptra ROM ...
193,570 UART:
193,728 UART: [state] CFI Enabled
262,417 UART: [state] LifecycleState = Unprovisioned
264,328 UART: [state] DebugLocked = No
266,495 UART: [state] WD Timer not started. Device not locked for debugging
270,038 UART: [kat] SHA2-256
449,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,748 UART: [kat] ++
461,274 UART: [kat] sha1
472,866 UART: [kat] SHA2-256
475,884 UART: [kat] SHA2-384
482,795 UART: [kat] SHA2-512-ACC
485,806 UART: [kat] ECC-384
2,948,241 UART: [kat] HMAC-384Kdf
2,971,783 UART: [kat] LMS
3,501,190 UART: [kat] --
3,506,693 UART: [cold-reset] ++
3,508,908 UART: [fht] FHT @ 0x50003400
3,520,308 UART: [idev] ++
3,520,874 UART: [idev] CDI.KEYID = 6
3,521,786 UART: [idev] SUBJECT.KEYID = 7
3,522,960 UART: [idev] UDS.KEYID = 0
3,524,006 ready_for_fw is high
3,524,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,146 UART: [idev] Erasing UDS.KEYID = 0
6,023,421 UART: [idev] Sha1 KeyId Algorithm
6,047,461 UART: [idev] --
6,050,483 UART: [ldev] ++
6,051,052 UART: [ldev] CDI.KEYID = 6
6,051,944 UART: [ldev] SUBJECT.KEYID = 5
6,053,155 UART: [ldev] AUTHORITY.KEYID = 7
6,054,439 UART: [ldev] FE.KEYID = 1
6,101,245 UART: [ldev] Erasing FE.KEYID = 1
8,602,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,495 UART: [ldev] --
10,414,600 UART: [fwproc] Wait for Commands...
10,416,968 UART: [fwproc] Recv command 0x46574c44
10,419,065 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,359 >>> mbox cmd response: success
14,285,837 UART: [afmc] ++
14,286,433 UART: [afmc] CDI.KEYID = 6
14,287,328 UART: [afmc] SUBJECT.KEYID = 7
14,288,544 UART: [afmc] AUTHORITY.KEYID = 5
16,824,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,416 UART: [afmc] --
18,624,333 UART: [cold-reset] --
18,628,206 UART: [state] Locking Datavault
18,634,799 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,496 UART: [state] Locking ICCM
18,638,193 UART: [exit] Launching FMC @ 0x40000130
18,646,647 UART:
18,646,877 UART: Running Caliptra FMC ...
18,647,915 UART:
18,648,061 UART: [state] CFI Enabled
18,708,478 UART: [fht] FMC Alias Private Key: 7
20,472,469 UART: [art] Extend RT PCRs Done
20,473,685 UART: [art] Lock RT PCRs Done
20,475,556 UART: [art] Populate DV Done
20,480,854 UART: [fht] FMC Alias Private Key: 7
20,482,439 UART: [art] Derive CDI
20,483,176 UART: [art] Store in in slot 0x4
20,542,001 UART: [art] Derive Key Pair
20,543,059 UART: [art] Store priv key in slot 0x5
23,005,265 UART: [art] Derive Key Pair - Done
23,018,368 UART: [art] Signing Cert with AUTHO
23,019,666 UART: RITY.KEYID = 7
24,731,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,336 UART: [art] PUB.X = AC269204AFC1ACB4AA022451DCD3FC5A636249E1E928112FEC769BCDF423D909CF5B27AA40E9B2B3F48A96BA3468B68D
24,740,624 UART: [art] PUB.Y = 6287B5AC57F2CFA79916A9676994E3D22322B818888C0CD57FE10EC752A9545151C91D7AE1674C78668648BB91E8FDBD
24,747,907 UART: [art] SIG.R = 0E3E3E18059BA9E4CF69659FB5278E88A4FF6ADE8B475AE9C67512D6365033E596628149EE7892D3AB25042C82380027
24,755,235 UART: [art] SIG.S = 544A5B03D8FB37E1A6AF15E983F4F0D0CDCEAAABC1167DD94785703836675693E886D4945F19EDF503E5E029072DD903
25,734,236 UART: Caliptra RT
25,734,937 UART: [state] CFI Enabled
25,900,222 UART: [rt] RT listening for mailbox commands...
25,904,146 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,948,986 UART: [rt]cmd =0x4c4d5356, len=1672
26,150,714 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,361,912 ready_for_fw is high
3,362,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,027 >>> mbox cmd response: success
18,368,055 UART:
18,368,444 UART: Running Caliptra FMC ...
18,369,582 UART:
18,369,739 UART: [state] CFI Enabled
18,434,313 UART: [fht] FMC Alias Private Key: 7
20,198,643 UART: [art] Extend RT PCRs Done
20,199,871 UART: [art] Lock RT PCRs Done
20,201,669 UART: [art] Populate DV Done
20,206,863 UART: [fht] FMC Alias Private Key: 7
20,208,349 UART: [art] Derive CDI
20,209,114 UART: [art] Store in in slot 0x4
20,267,259 UART: [art] Derive Key Pair
20,268,303 UART: [art] Store priv key in slot 0x5
22,731,401 UART: [art] Derive Key Pair - Done
22,744,241 UART: [art] Signing Cert with AUTHO
22,745,547 UART: RITY.KEYID = 7
24,458,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,556 UART: [art] PUB.X = BB8DD2D4D70F3A3741EF40314CD8804FF8BF7CCAD747EB9BEA2194BA46C71A1763432C89403F413A012F4E9977160806
24,466,840 UART: [art] PUB.Y = D51FB623F10BC110F20A9B28A7EE033921049536622C28F7A8050862F60B8D580C0BBFA7D7358BC44B27934AC84C6AEA
24,474,073 UART: [art] SIG.R = D8BC007F308152BAD00A2568BDA078C12D4DD668DB2B5075B0D098D6F6278DA653712499267CB15B5D5CD51A1F1737B6
24,481,442 UART: [art] SIG.S = B691CC1559DB3C49F3A569975F24E5E43BAB7D880E890FA22B66E293F4D73D9966F8EEA53C490F2F1C1A593AA5D163BC
25,460,558 UART: Caliptra RT
25,461,270 UART: [state] CFI Enabled
25,625,510 UART: [rt] RT listening for mailbox commands...
25,629,510 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,674,308 UART: [rt]cmd =0x4c4d5356, len=1672
25,875,918 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
193,331 UART:
193,700 UART: Running Caliptra ROM ...
194,784 UART:
604,531 UART: [state] CFI Enabled
617,683 UART: [state] LifecycleState = Unprovisioned
619,561 UART: [state] DebugLocked = No
621,925 UART: [state] WD Timer not started. Device not locked for debugging
625,891 UART: [kat] SHA2-256
805,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,631 UART: [kat] ++
817,073 UART: [kat] sha1
828,151 UART: [kat] SHA2-256
831,223 UART: [kat] SHA2-384
837,562 UART: [kat] SHA2-512-ACC
840,488 UART: [kat] ECC-384
3,282,550 UART: [kat] HMAC-384Kdf
3,295,763 UART: [kat] LMS
3,825,270 UART: [kat] --
3,829,972 UART: [cold-reset] ++
3,831,758 UART: [fht] FHT @ 0x50003400
3,843,880 UART: [idev] ++
3,844,490 UART: [idev] CDI.KEYID = 6
3,845,395 UART: [idev] SUBJECT.KEYID = 7
3,846,582 UART: [idev] UDS.KEYID = 0
3,847,502 ready_for_fw is high
3,847,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,259 UART: [idev] Erasing UDS.KEYID = 0
6,318,814 UART: [idev] Sha1 KeyId Algorithm
6,341,704 UART: [idev] --
6,345,132 UART: [ldev] ++
6,345,703 UART: [ldev] CDI.KEYID = 6
6,346,582 UART: [ldev] SUBJECT.KEYID = 5
6,347,785 UART: [ldev] AUTHORITY.KEYID = 7
6,349,004 UART: [ldev] FE.KEYID = 1
6,357,623 UART: [ldev] Erasing FE.KEYID = 1
8,832,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,985 UART: [ldev] --
10,622,912 UART: [fwproc] Wait for Commands...
10,625,914 UART: [fwproc] Recv command 0x46574c44
10,627,994 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,502,452 >>> mbox cmd response: success
14,507,125 UART: [afmc] ++
14,507,711 UART: [afmc] CDI.KEYID = 6
14,508,588 UART: [afmc] SUBJECT.KEYID = 7
14,509,742 UART: [afmc] AUTHORITY.KEYID = 5
17,005,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,205 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,823 UART: [afmc] --
18,800,977 UART: [cold-reset] --
18,805,390 UART: [state] Locking Datavault
18,811,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,027 UART: [state] Locking ICCM
18,814,446 UART: [exit] Launching FMC @ 0x40000130
18,822,888 UART:
18,823,117 UART: Running Caliptra FMC ...
18,824,132 UART:
18,824,271 UART: [state] CFI Enabled
18,832,580 UART: [fht] FMC Alias Private Key: 7
20,589,717 UART: [art] Extend RT PCRs Done
20,590,935 UART: [art] Lock RT PCRs Done
20,592,871 UART: [art] Populate DV Done
20,598,283 UART: [fht] FMC Alias Private Key: 7
20,599,771 UART: [art] Derive CDI
20,600,527 UART: [art] Store in in slot 0x4
20,642,788 UART: [art] Derive Key Pair
20,643,961 UART: [art] Store priv key in slot 0x5
23,070,982 UART: [art] Derive Key Pair - Done
23,084,012 UART: [art] Signing Cert with AUTHO
23,085,322 UART: RITY.KEYID = 7
24,790,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,045 UART: [art] PUB.X = CB427C160C342ABB19677BEE6F0913A85E54564F0A33BE8B96E34FB69A753F1D9CDECFA10AF74D7C084A47276E6B5BD4
24,799,333 UART: [art] PUB.Y = 7FF11BA04C0D59409273E50D4FB3618E8665893C42DACA275A38D9DA753DFACCE1772CAB6B6370889813B8B5B2FD032A
24,806,658 UART: [art] SIG.R = C7559D2E0C644093816668279A55874F4407996F7E02400B5CC815125FB0518683128C65AF1F8F79D0FF83AF1A35A4EC
24,814,025 UART: [art] SIG.S = 4C08CFBBE8FCCA16F107B9CA5ED0FEDB32353B23A28B0730435BD513E97B0A5A1119A25C75DEF088C24C90E4C981300A
25,792,871 UART: Caliptra RT
25,793,567 UART: [state] CFI Enabled
25,910,966 UART: [rt] RT listening for mailbox commands...
25,914,940 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,959,521 UART: [rt]cmd =0x4c4d5356, len=1672
26,161,414 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,696,421 ready_for_fw is high
3,697,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,293,073 >>> mbox cmd response: success
18,542,626 UART:
18,543,387 UART: Running Caliptra FMC ...
18,544,514 UART:
18,544,711 UART: [state] CFI Enabled
18,552,235 UART: [fht] FMC Alias Private Key: 7
20,308,806 UART: [art] Extend RT PCRs Done
20,310,032 UART: [art] Lock RT PCRs Done
20,311,656 UART: [art] Populate DV Done
20,317,173 UART: [fht] FMC Alias Private Key: 7
20,318,817 UART: [art] Derive CDI
20,319,631 UART: [art] Store in in slot 0x4
20,362,454 UART: [art] Derive Key Pair
20,363,517 UART: [art] Store priv key in slot 0x5
22,790,610 UART: [art] Derive Key Pair - Done
22,803,456 UART: [art] Signing Cert with AUTHO
22,804,768 UART: RITY.KEYID = 7
24,510,377 UART: [art] Erasing AUTHORITY.KEYID = 7
24,511,859 UART: [art] PUB.X = 5B98DE1A2A1B426593C89AB5A27A1FBB22C3831B779DE4ECDEDC69CFA98030045871E2416933DDE43A90CCF85921E533
24,519,145 UART: [art] PUB.Y = CDF8239F18F4F86D2D452FD2864EDE773754DB391600E7B75CE7C9E971147F08D5C0CC9EADFCDB0BACE9531375277A8A
24,526,419 UART: [art] SIG.R = C86BB67CE4EC3EF7F044C846B54D6EBBA761E413E3A1DF17EB88808CD1C125DCF60191FBE1813ABBE39B15DDE652013E
24,533,795 UART: [art] SIG.S = 50125786A3C7BBC324209A0E7B247DB923D70D5AAF8F9434705B73B7CC71A5AB78836999BEA8D253B2553E2AAEEF4249
25,512,501 UART: Caliptra RT
25,513,215 UART: [state] CFI Enabled
25,630,138 UART: [rt] RT listening for mailbox commands...
25,634,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,678,526 UART: [rt]cmd =0x4c4d5356, len=1672
25,880,319 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,111 UART:
192,480 UART: Running Caliptra ROM ...
193,611 UART:
193,758 UART: [state] CFI Enabled
264,037 UART: [state] LifecycleState = Unprovisioned
266,465 UART: [state] DebugLocked = No
268,426 UART: [state] WD Timer not started. Device not locked for debugging
272,965 UART: [kat] SHA2-256
462,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,603 UART: [kat] ++
474,092 UART: [kat] sha1
485,398 UART: [kat] SHA2-256
488,407 UART: [kat] SHA2-384
493,117 UART: [kat] SHA2-512-ACC
495,698 UART: [kat] ECC-384
2,951,847 UART: [kat] HMAC-384Kdf
2,972,106 UART: [kat] LMS
3,503,833 UART: [kat] --
3,508,105 UART: [cold-reset] ++
3,509,887 UART: [fht] FHT @ 0x50003400
3,522,279 UART: [idev] ++
3,522,992 UART: [idev] CDI.KEYID = 6
3,524,020 UART: [idev] SUBJECT.KEYID = 7
3,525,120 UART: [idev] UDS.KEYID = 0
3,526,190 ready_for_fw is high
3,526,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,376 UART: [idev] Erasing UDS.KEYID = 0
6,029,519 UART: [idev] Sha1 KeyId Algorithm
6,051,849 UART: [idev] --
6,056,473 UART: [ldev] ++
6,057,159 UART: [ldev] CDI.KEYID = 6
6,058,045 UART: [ldev] SUBJECT.KEYID = 5
6,059,258 UART: [ldev] AUTHORITY.KEYID = 7
6,060,435 UART: [ldev] FE.KEYID = 1
6,101,793 UART: [ldev] Erasing FE.KEYID = 1
8,606,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,543 UART: [ldev] --
10,414,824 UART: [fwproc] Wait for Commands...
10,417,514 UART: [fwproc] Recv command 0x46574c44
10,419,821 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,607,335 >>> mbox cmd response: success
14,611,215 UART: [afmc] ++
14,611,959 UART: [afmc] CDI.KEYID = 6
14,613,162 UART: [afmc] SUBJECT.KEYID = 7
14,614,598 UART: [afmc] AUTHORITY.KEYID = 5
17,155,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,321 UART: [afmc] --
18,971,590 UART: [cold-reset] --
18,976,046 UART: [state] Locking Datavault
18,981,944 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,134 UART: [state] Locking ICCM
18,986,933 UART: [exit] Launching FMC @ 0x40000130
18,995,602 UART:
18,995,833 UART: Running Caliptra FMC ...
18,996,930 UART:
18,997,085 UART: [state] CFI Enabled
19,053,998 UART: [fht] FMC Alias Private Key: 7
20,817,836 UART: [art] Extend RT PCRs Done
20,819,053 UART: [art] Lock RT PCRs Done
20,820,843 UART: [art] Populate DV Done
20,826,360 UART: [fht] FMC Alias Private Key: 7
20,828,084 UART: [art] Derive CDI
20,828,903 UART: [art] Store in in slot 0x4
20,885,892 UART: [art] Derive Key Pair
20,886,933 UART: [art] Store priv key in slot 0x5
23,350,059 UART: [art] Derive Key Pair - Done
23,362,774 UART: [art] Signing Cert with AUTHO
23,364,077 UART: RITY.KEYID = 7
25,076,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,699 UART: [art] PUB.X = BF7D96557FE4D9760DA4D82D1B234A7881EDDECFB48DD73A98E80E8822DC6CA88D36D9BB5C59D20708A8A5E986692B9F
25,085,000 UART: [art] PUB.Y = A9601595A02BED927397C6C7008933850418FFB0271F1386B2F246A5FB30A3AC867D4A0B1561351DACD1B04AB9E6FEA8
25,092,270 UART: [art] SIG.R = E9F15449E878B94D4C1C57D633A04BFE31B53F4C8B1679D39E7143F9BD14185EEDA7DA1EC4F61164AF0A9E7F09441431
25,099,674 UART: [art] SIG.S = D35831F261F4F228520CDC2BCE465BA185FD36FE8F1B8D591DAA9F8F23AB428D26D2FAB6C6DCA35FF1CF788F312D0CAF
26,078,585 UART: Caliptra RT
26,079,295 UART: [state] CFI Enabled
26,243,129 UART: [rt] RT listening for mailbox commands...
26,247,026 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,292,104 UART: [rt]cmd =0x4c4d5356, len=1672
26,493,981 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
3,439,571 ready_for_fw is high
3,439,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,894 >>> mbox cmd response: success
19,028,152 UART:
19,028,555 UART: Running Caliptra FMC ...
19,029,673 UART:
19,029,827 UART: [state] CFI Enabled
19,097,204 UART: [fht] FMC Alias Private Key: 7
20,861,126 UART: [art] Extend RT PCRs Done
20,862,354 UART: [art] Lock RT PCRs Done
20,864,062 UART: [art] Populate DV Done
20,869,695 UART: [fht] FMC Alias Private Key: 7
20,871,296 UART: [art] Derive CDI
20,872,112 UART: [art] Store in in slot 0x4
20,919,697 UART: [art] Derive Key Pair
20,920,737 UART: [art] Store priv key in slot 0x5
23,383,620 UART: [art] Derive Key Pair - Done
23,396,936 UART: [art] Signing Cert with AUTHO
23,398,239 UART: RITY.KEYID = 7
25,109,513 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,009 UART: [art] PUB.X = 7D027D5F190D0757D5364556A16FA1D9E4A4864E21C4E72B3B252A546BF910BFBCD1B9287071C3E096FBC464401A5FAF
25,118,263 UART: [art] PUB.Y = FD6FA5748EADC259C4D52091E2749A9D124785596CB30184D0E08A757EF4B28193E22CCEF5771FAA6A3544F856506F14
25,125,552 UART: [art] SIG.R = 33A87B769C0EE378AAB3BD2A185A8486D0EC0A03565A3467FF0739725082E6066F326A6B52D170EB94400C3687933CE8
25,132,915 UART: [art] SIG.S = 4A4CFF2D01906F477FA7B1515AE4DE32D05F10F97BF604C844405E45D8E0CD4D4F9AF37A631F8E49726DC3F126491969
26,112,226 UART: Caliptra RT
26,112,935 UART: [state] CFI Enabled
26,277,892 UART: [rt] RT listening for mailbox commands...
26,281,853 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,327,042 UART: [rt]cmd =0x4c4d5356, len=1672
26,528,838 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,508 UART:
192,875 UART: Running Caliptra ROM ...
194,004 UART:
603,696 UART: [state] CFI Enabled
621,327 UART: [state] LifecycleState = Unprovisioned
623,682 UART: [state] DebugLocked = No
626,397 UART: [state] WD Timer not started. Device not locked for debugging
631,406 UART: [kat] SHA2-256
821,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,018 UART: [kat] ++
832,533 UART: [kat] sha1
844,462 UART: [kat] SHA2-256
847,460 UART: [kat] SHA2-384
854,720 UART: [kat] SHA2-512-ACC
857,291 UART: [kat] ECC-384
3,301,048 UART: [kat] HMAC-384Kdf
3,314,487 UART: [kat] LMS
3,846,313 UART: [kat] --
3,850,451 UART: [cold-reset] ++
3,851,379 UART: [fht] FHT @ 0x50003400
3,861,939 UART: [idev] ++
3,862,607 UART: [idev] CDI.KEYID = 6
3,863,591 UART: [idev] SUBJECT.KEYID = 7
3,864,757 UART: [idev] UDS.KEYID = 0
3,865,695 ready_for_fw is high
3,865,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,468 UART: [idev] Erasing UDS.KEYID = 0
6,341,963 UART: [idev] Sha1 KeyId Algorithm
6,365,516 UART: [idev] --
6,371,180 UART: [ldev] ++
6,371,851 UART: [ldev] CDI.KEYID = 6
6,372,726 UART: [ldev] SUBJECT.KEYID = 5
6,373,869 UART: [ldev] AUTHORITY.KEYID = 7
6,375,143 UART: [ldev] FE.KEYID = 1
6,387,803 UART: [ldev] Erasing FE.KEYID = 1
8,864,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,390 UART: [ldev] --
10,658,409 UART: [fwproc] Wait for Commands...
10,660,062 UART: [fwproc] Recv command 0x46574c44
10,662,413 UART: [fwproc] Recv'd Img size: 114448 bytes
14,108,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,844,457 >>> mbox cmd response: success
14,847,810 UART: [afmc] ++
14,848,514 UART: [afmc] CDI.KEYID = 6
14,849,757 UART: [afmc] SUBJECT.KEYID = 7
14,851,190 UART: [afmc] AUTHORITY.KEYID = 5
17,352,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,975 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,329 UART: [afmc] --
19,146,797 UART: [cold-reset] --
19,150,824 UART: [state] Locking Datavault
19,157,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,841 UART: [state] Locking ICCM
19,162,856 UART: [exit] Launching FMC @ 0x40000130
19,171,537 UART:
19,171,766 UART: Running Caliptra FMC ...
19,172,860 UART:
19,173,011 UART: [state] CFI Enabled
19,180,889 UART: [fht] FMC Alias Private Key: 7
20,937,484 UART: [art] Extend RT PCRs Done
20,938,702 UART: [art] Lock RT PCRs Done
20,940,371 UART: [art] Populate DV Done
20,945,850 UART: [fht] FMC Alias Private Key: 7
20,947,389 UART: [art] Derive CDI
20,948,141 UART: [art] Store in in slot 0x4
20,990,491 UART: [art] Derive Key Pair
20,991,523 UART: [art] Store priv key in slot 0x5
23,417,666 UART: [art] Derive Key Pair - Done
23,430,613 UART: [art] Signing Cert with AUTHO
23,431,912 UART: RITY.KEYID = 7
25,137,213 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,724 UART: [art] PUB.X = 2AB1A50E36FE6034AFFA0F173C09AAFFF25C7B074078ABF325E8C32F52B356AD9B259045335A2FDA1B4ABDC93C3040FE
25,146,060 UART: [art] PUB.Y = 356B998830243AB2B09BD8E135899412603B4F9DB337DE4426B4682E430B9A6AFFFBC7E165FFF35A96DE1C231F378BE1
25,153,274 UART: [art] SIG.R = 2F2736517E042F52B595875B1C02935B624CEC51E074767AEB2B8EA48EB8E22B9DBB8085A5C44C558D4B5EF15326FCE6
25,160,636 UART: [art] SIG.S = A27667AAEAD6BF4D8EF9A021B4BE4C71AE3A11E3C79D51ECE5F0EFB5C1AE9100C03E70CFFD0B4A968D2E35417F1750E8
26,139,316 UART: Caliptra RT
26,140,024 UART: [state] CFI Enabled
26,257,032 UART: [rt] RT listening for mailbox commands...
26,260,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,305,528 UART: [rt]cmd =0x4c4d5356, len=1672
26,507,201 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,759,072 ready_for_fw is high
3,759,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,959,141 >>> mbox cmd response: success
19,210,459 UART:
19,210,847 UART: Running Caliptra FMC ...
19,212,038 UART:
19,212,215 UART: [state] CFI Enabled
19,220,101 UART: [fht] FMC Alias Private Key: 7
20,977,297 UART: [art] Extend RT PCRs Done
20,978,521 UART: [art] Lock RT PCRs Done
20,980,240 UART: [art] Populate DV Done
20,985,750 UART: [fht] FMC Alias Private Key: 7
20,987,447 UART: [art] Derive CDI
20,988,179 UART: [art] Store in in slot 0x4
21,030,926 UART: [art] Derive Key Pair
21,031,969 UART: [art] Store priv key in slot 0x5
23,458,590 UART: [art] Derive Key Pair - Done
23,471,688 UART: [art] Signing Cert with AUTHO
23,472,990 UART: RITY.KEYID = 7
25,178,685 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,195 UART: [art] PUB.X = 1C817382B20694AEEC405F3E48549BCA9A49334AB0177B3BF455A75A0DC9D348F684126F4D3DB6AE662DB22830C0F896
25,187,432 UART: [art] PUB.Y = 285FE87E0B8EBC1C94B2408D9645EC3DD10E299CAFEBCF65013B7FEAAD157BA379C3077FE69BCCE6DD8BCA776DD00C24
25,194,744 UART: [art] SIG.R = C7D120E239B5711258BAC64A6F338A044BE7B36C150D9C6F42F9DA24518E516FB1F68E5784B0459AB6AD1ACA54FD4823
25,202,130 UART: [art] SIG.S = 6008B7A646766DCC09FC7E3449988DAF9A55DA1A3C3F61396F62DA455A857E2E3782A49836C1D00F8123431D3C1DC79F
26,180,643 UART: Caliptra RT
26,181,355 UART: [state] CFI Enabled
26,299,243 UART: [rt] RT listening for mailbox commands...
26,303,137 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,347,375 UART: [rt]cmd =0x4c4d5356, len=1672
26,549,159 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,485 UART: [kat] SHA2-256
882,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,531 UART: [kat] ++
886,683 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,614 UART: [kat] SHA2-512-ACC
897,515 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,460 UART: [kat] LMS
1,475,656 UART: [kat] --
1,476,373 UART: [cold-reset] ++
1,476,757 UART: [fht] Storing FHT @ 0x50003400
1,479,478 UART: [idev] ++
1,479,646 UART: [idev] CDI.KEYID = 6
1,480,006 UART: [idev] SUBJECT.KEYID = 7
1,480,430 UART: [idev] UDS.KEYID = 0
1,480,775 ready_for_fw is high
1,480,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,310 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,362 UART: [idev] --
1,514,543 UART: [ldev] ++
1,514,711 UART: [ldev] CDI.KEYID = 6
1,515,074 UART: [ldev] SUBJECT.KEYID = 5
1,515,500 UART: [ldev] AUTHORITY.KEYID = 7
1,515,963 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,662 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,606 UART: [fwproc] Received command 0x46574c44
1,587,397 UART: [fwproc] Received Image of size 114448 bytes
2,887,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,027 >>> mbox cmd response: success
3,081,147 UART: [afmc] ++
3,081,315 UART: [afmc] CDI.KEYID = 6
3,081,677 UART: [afmc] SUBJECT.KEYID = 7
3,082,102 UART: [afmc] AUTHORITY.KEYID = 5
3,117,355 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,351 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,744 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,434 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,307 UART: [afmc] --
3,160,247 UART: [cold-reset] --
3,161,109 UART: [state] Locking Datavault
3,161,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,598 UART: [state] Locking ICCM
3,163,038 UART: [exit] Launching FMC @ 0x40000130
3,168,367 UART:
3,168,383 UART: Running Caliptra FMC ...
3,168,791 UART:
3,168,845 UART: [state] CFI Enabled
3,179,240 UART: [fht] FMC Alias Private Key: 7
3,287,723 UART: [art] Extend RT PCRs Done
3,288,151 UART: [art] Lock RT PCRs Done
3,289,475 UART: [art] Populate DV Done
3,297,622 UART: [fht] FMC Alias Private Key: 7
3,298,794 UART: [art] Derive CDI
3,299,074 UART: [art] Store in in slot 0x4
3,384,969 UART: [art] Derive Key Pair
3,385,329 UART: [art] Store priv key in slot 0x5
3,399,133 UART: [art] Derive Key Pair - Done
3,413,922 UART: [art] Signing Cert with AUTHO
3,414,402 UART: RITY.KEYID = 7
3,429,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,345 UART: [art] PUB.X = 488DA0206E08D368C60E3A79BE708861254BF00C9DE8A9F05F0D919AA806B7A1A623CB3ED29288579B09EBA520FBE1F1
3,437,105 UART: [art] PUB.Y = 556C264FD7992CC33551B7694CF10015E9831C5E2B6CA0577A131CBE88F565E03DE87566FF9F268B2F31B2951548DCE9
3,444,033 UART: [art] SIG.R = FE76CC0102924C8E0995E4B133604225781962DA7047B7CC0C8B2BEA56A0AFBDEAEC5227D84CBAF4A2D1787CD6A68C11
3,450,805 UART: [art] SIG.S = 9C86A60D79AD3238124D808FCCE4F6FF912AF1DB4B315B9A361B2EF69D7E764A2AB99F2613CF2704F8FF7C793CA3B673
3,474,332 UART: Caliptra RT
3,474,585 UART: [state] CFI Enabled
3,583,225 UART: [rt] RT listening for mailbox commands...
3,583,895 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,649 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,169 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,163 ready_for_fw is high
1,362,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,361 >>> mbox cmd response: success
2,990,493 UART:
2,990,509 UART: Running Caliptra FMC ...
2,990,917 UART:
2,990,971 UART: [state] CFI Enabled
3,001,488 UART: [fht] FMC Alias Private Key: 7
3,109,673 UART: [art] Extend RT PCRs Done
3,110,101 UART: [art] Lock RT PCRs Done
3,111,709 UART: [art] Populate DV Done
3,119,896 UART: [fht] FMC Alias Private Key: 7
3,120,850 UART: [art] Derive CDI
3,121,130 UART: [art] Store in in slot 0x4
3,206,727 UART: [art] Derive Key Pair
3,207,087 UART: [art] Store priv key in slot 0x5
3,219,921 UART: [art] Derive Key Pair - Done
3,234,763 UART: [art] Signing Cert with AUTHO
3,235,243 UART: RITY.KEYID = 7
3,250,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,966 UART: [art] PUB.X = 9534C4ED4FA0F5334BA16EBC18E3DDB6CD616F547F91C16A3406B10A1ED55FAC12A4F9025F3484142F32E7101A0EAA0A
3,257,735 UART: [art] PUB.Y = 8ADADEE5A11A2BD0B62479688BF4C14D54A9E05E44C68D637B0058187D3AF8D607553A263686405F5F4B54842E493CB4
3,264,662 UART: [art] SIG.R = 62EC8A85F4AD7F9A5FB12F08C3337C3AD4ED0EF8DFEB92B909F5E3C2F842D3D1A6EC9DDEC0E4B8EB6C87C69FF1D02A5E
3,271,457 UART: [art] SIG.S = F9D26C078FDB5668BFD15BBAC4CD7E6E77A51D1DD2AD56E01B1060089C1FE69E9D600254F8F6B2F9D2F00509A08F3C0E
3,295,116 UART: Caliptra RT
3,295,369 UART: [state] CFI Enabled
3,403,834 UART: [rt] RT listening for mailbox commands...
3,404,504 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,134 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,506 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
902,803 UART: [kat] HMAC-384Kdf
907,351 UART: [kat] LMS
1,475,547 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,828 UART: [fht] Storing FHT @ 0x50003400
1,479,443 UART: [idev] ++
1,479,611 UART: [idev] CDI.KEYID = 6
1,479,971 UART: [idev] SUBJECT.KEYID = 7
1,480,395 UART: [idev] UDS.KEYID = 0
1,480,740 ready_for_fw is high
1,480,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,701 UART: [idev] Erasing UDS.KEYID = 0
1,505,919 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,627 UART: [idev] --
1,515,776 UART: [ldev] ++
1,515,944 UART: [ldev] CDI.KEYID = 6
1,516,307 UART: [ldev] SUBJECT.KEYID = 5
1,516,733 UART: [ldev] AUTHORITY.KEYID = 7
1,517,196 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,885 UART: [ldev] --
1,587,370 UART: [fwproc] Waiting for Commands...
1,588,197 UART: [fwproc] Received command 0x46574c44
1,588,988 UART: [fwproc] Received Image of size 114448 bytes
2,888,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,970 >>> mbox cmd response: success
3,082,016 UART: [afmc] ++
3,082,184 UART: [afmc] CDI.KEYID = 6
3,082,546 UART: [afmc] SUBJECT.KEYID = 7
3,082,971 UART: [afmc] AUTHORITY.KEYID = 5
3,118,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,334 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,727 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,417 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,318 UART: [afmc] --
3,161,290 UART: [cold-reset] --
3,162,432 UART: [state] Locking Datavault
3,163,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,423 UART: [state] Locking ICCM
3,164,915 UART: [exit] Launching FMC @ 0x40000130
3,170,244 UART:
3,170,260 UART: Running Caliptra FMC ...
3,170,668 UART:
3,170,811 UART: [state] CFI Enabled
3,181,302 UART: [fht] FMC Alias Private Key: 7
3,288,755 UART: [art] Extend RT PCRs Done
3,289,183 UART: [art] Lock RT PCRs Done
3,290,705 UART: [art] Populate DV Done
3,298,838 UART: [fht] FMC Alias Private Key: 7
3,300,006 UART: [art] Derive CDI
3,300,286 UART: [art] Store in in slot 0x4
3,386,189 UART: [art] Derive Key Pair
3,386,549 UART: [art] Store priv key in slot 0x5
3,399,927 UART: [art] Derive Key Pair - Done
3,414,954 UART: [art] Signing Cert with AUTHO
3,415,434 UART: RITY.KEYID = 7
3,430,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,361 UART: [art] PUB.X = 3694CABF87CEB1031C37915E4AEB2D2C9BE028A5121BB3838114372730141E88778E8A126767BBE257113D131B7513C1
3,438,122 UART: [art] PUB.Y = 8548237677931730D8C18C3D8B5346BFBAD071D3E8ED9BA6FDF93F7A9F631360F28C382C460F561000B6491A07CAB79D
3,445,046 UART: [art] SIG.R = D16F08BAC6884ABEAAB308F135DC618EB43CF739771C34F0774D8BFF94E697F52D335C1391A15B07CE9EC0552158F740
3,451,815 UART: [art] SIG.S = 259EDF97202540F6C029962D59818E8E3A08FE831C4867EED6BA179C8B148B83AA366E47245C2AEFB61F30F049431872
3,475,243 UART: Caliptra RT
3,475,588 UART: [state] CFI Enabled
3,583,963 UART: [rt] RT listening for mailbox commands...
3,584,633 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,169 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,781 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,550 ready_for_fw is high
1,363,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,234 >>> mbox cmd response: success
2,992,552 UART:
2,992,568 UART: Running Caliptra FMC ...
2,992,976 UART:
2,993,119 UART: [state] CFI Enabled
3,004,044 UART: [fht] FMC Alias Private Key: 7
3,111,953 UART: [art] Extend RT PCRs Done
3,112,381 UART: [art] Lock RT PCRs Done
3,114,017 UART: [art] Populate DV Done
3,122,186 UART: [fht] FMC Alias Private Key: 7
3,123,204 UART: [art] Derive CDI
3,123,484 UART: [art] Store in in slot 0x4
3,209,655 UART: [art] Derive Key Pair
3,210,015 UART: [art] Store priv key in slot 0x5
3,223,159 UART: [art] Derive Key Pair - Done
3,237,803 UART: [art] Signing Cert with AUTHO
3,238,283 UART: RITY.KEYID = 7
3,253,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,314 UART: [art] PUB.X = 01DA3780ADD30CC9EE656615F37FC38DDF80F15494461BC5EA113B03002FA02E79294257CB985D5CE3E9DBD4664BD676
3,261,061 UART: [art] PUB.Y = 1F9A6CCBB94DAF88E53F5A8E4AB8A10D27356DEB05898B1B6DFFAA1E419D78020DC9306A7B4804740AEA7E8FD7FB1A51
3,268,015 UART: [art] SIG.R = 93E227626F376E2F09287EC47F13C4A149D0A847C7B4893C615B9B77D75F3C8EC33E2EDD660632B837DF887AF0DFF74C
3,274,785 UART: [art] SIG.S = 72EC05480E656BB055FCB1B966D6E998BE03C1E3DB06C906FEFBEED427357DB6E3CEEEC6AB6993D72DBEA49441DC3714
3,298,993 UART: Caliptra RT
3,299,338 UART: [state] CFI Enabled
3,408,241 UART: [rt] RT listening for mailbox commands...
3,408,911 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,613 UART: [rt]cmd =0x4c4d5356, len=1672
3,702,147 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,654 UART: [kat] HMAC-384Kdf
922,236 UART: [kat] LMS
1,170,564 UART: [kat] --
1,171,211 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,548 UART: [idev] ++
1,174,716 UART: [idev] CDI.KEYID = 6
1,175,076 UART: [idev] SUBJECT.KEYID = 7
1,175,500 UART: [idev] UDS.KEYID = 0
1,175,845 ready_for_fw is high
1,175,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,279 UART: [idev] --
1,210,381 UART: [ldev] ++
1,210,549 UART: [ldev] CDI.KEYID = 6
1,210,912 UART: [ldev] SUBJECT.KEYID = 5
1,211,338 UART: [ldev] AUTHORITY.KEYID = 7
1,211,801 UART: [ldev] FE.KEYID = 1
1,217,403 UART: [ldev] Erasing FE.KEYID = 1
1,243,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,630 UART: [fwproc] Wait for Commands...
1,283,406 UART: [fwproc] Recv command 0x46574c44
1,284,134 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,096 >>> mbox cmd response: success
2,777,172 UART: [afmc] ++
2,777,340 UART: [afmc] CDI.KEYID = 6
2,777,702 UART: [afmc] SUBJECT.KEYID = 7
2,778,127 UART: [afmc] AUTHORITY.KEYID = 5
2,813,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,487 UART: [afmc] --
2,857,505 UART: [cold-reset] --
2,858,529 UART: [state] Locking Datavault
2,859,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,398 UART: [state] Locking ICCM
2,860,844 UART: [exit] Launching FMC @ 0x40000130
2,866,173 UART:
2,866,189 UART: Running Caliptra FMC ...
2,866,597 UART:
2,866,651 UART: [state] CFI Enabled
2,877,044 UART: [fht] FMC Alias Private Key: 7
2,984,963 UART: [art] Extend RT PCRs Done
2,985,391 UART: [art] Lock RT PCRs Done
2,986,767 UART: [art] Populate DV Done
2,994,986 UART: [fht] FMC Alias Private Key: 7
2,996,014 UART: [art] Derive CDI
2,996,294 UART: [art] Store in in slot 0x4
3,081,841 UART: [art] Derive Key Pair
3,082,201 UART: [art] Store priv key in slot 0x5
3,095,583 UART: [art] Derive Key Pair - Done
3,110,248 UART: [art] Signing Cert with AUTHO
3,110,728 UART: RITY.KEYID = 7
3,125,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,189 UART: [art] PUB.X = F3DA3F5255F09476D2298316941F169558742B54C3248CB7A0D32B85CCB77EFC8A19EEE5AE73A1DF4FB2847F72A354F9
3,132,965 UART: [art] PUB.Y = 360822B668295983BA633E2FD3CA47D83DDFD3819B7A1B81A2459CA2192AFAF9ABB682914E7B47DFCBCEE3A4D48B9963
3,139,926 UART: [art] SIG.R = F7F35EAF85FE43E094B3B18C5630CE5B7A4E3B3FDB0E0B36D0EB37834D275B924E14D0983FA448C076C38DD2649CC3AB
3,146,706 UART: [art] SIG.S = F5268B202220F22B864D136AEB2799A7873010E55BD7AD47EBBA2484818D46F7C4BB078801C21AE389C306445AA57967
3,170,420 UART: Caliptra RT
3,170,673 UART: [state] CFI Enabled
3,278,235 UART: [rt] RT listening for mailbox commands...
3,278,905 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,685 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,401 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,075 >>> mbox cmd response: success
2,692,521 UART:
2,692,537 UART: Running Caliptra FMC ...
2,692,945 UART:
2,692,999 UART: [state] CFI Enabled
2,703,184 UART: [fht] FMC Alias Private Key: 7
2,810,807 UART: [art] Extend RT PCRs Done
2,811,235 UART: [art] Lock RT PCRs Done
2,812,679 UART: [art] Populate DV Done
2,820,966 UART: [fht] FMC Alias Private Key: 7
2,821,898 UART: [art] Derive CDI
2,822,178 UART: [art] Store in in slot 0x4
2,907,735 UART: [art] Derive Key Pair
2,908,095 UART: [art] Store priv key in slot 0x5
2,921,483 UART: [art] Derive Key Pair - Done
2,936,043 UART: [art] Signing Cert with AUTHO
2,936,523 UART: RITY.KEYID = 7
2,951,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,742 UART: [art] PUB.X = CB77F2553C05551B7E2E354C229804596D8DEF430EA86CAC48ACB974F238DECFE7D8342B76AD56886B8EFFCF25756274
2,959,513 UART: [art] PUB.Y = ECA984C04DA3AAB7BE84F0754DFEC0A1389C91BB1445FFA0B3D99D199A4052A20FD23A8DE6F10A859CBE9906BB7432F9
2,966,474 UART: [art] SIG.R = F28549A501BAEE8670B6507EF64A4C70B64AFD18E4551C54A331980F99B31872600C46C6AA4855ED493B0E5328C9722B
2,973,230 UART: [art] SIG.S = F2C2FE25159BB0EF286E027CFA45A855FDAF2EBFF000E6A041680579C24B0BFEA83A36D94E49FE530AE610E50B2F425D
2,997,032 UART: Caliptra RT
2,997,285 UART: [state] CFI Enabled
3,104,623 UART: [rt] RT listening for mailbox commands...
3,105,293 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,973 UART: [rt]cmd =0x4c4d5356, len=1672
3,398,617 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,647 UART: [kat] HMAC-384Kdf
923,211 UART: [kat] LMS
1,171,539 UART: [kat] --
1,172,352 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 ready_for_fw is high
1,176,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,202,254 UART: [idev] Sha1 KeyId Algorithm
1,210,552 UART: [idev] --
1,211,500 UART: [ldev] ++
1,211,668 UART: [ldev] CDI.KEYID = 6
1,212,031 UART: [ldev] SUBJECT.KEYID = 5
1,212,457 UART: [ldev] AUTHORITY.KEYID = 7
1,212,920 UART: [ldev] FE.KEYID = 1
1,218,088 UART: [ldev] Erasing FE.KEYID = 1
1,244,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,800 UART: [ldev] --
1,284,061 UART: [fwproc] Wait for Commands...
1,284,633 UART: [fwproc] Recv command 0x46574c44
1,285,361 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,379 >>> mbox cmd response: success
2,778,511 UART: [afmc] ++
2,778,679 UART: [afmc] CDI.KEYID = 6
2,779,041 UART: [afmc] SUBJECT.KEYID = 7
2,779,466 UART: [afmc] AUTHORITY.KEYID = 5
2,814,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,780 UART: [afmc] --
2,857,744 UART: [cold-reset] --
2,858,658 UART: [state] Locking Datavault
2,859,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,513 UART: [state] Locking ICCM
2,861,145 UART: [exit] Launching FMC @ 0x40000130
2,866,474 UART:
2,866,490 UART: Running Caliptra FMC ...
2,866,898 UART:
2,867,041 UART: [state] CFI Enabled
2,877,770 UART: [fht] FMC Alias Private Key: 7
2,986,133 UART: [art] Extend RT PCRs Done
2,986,561 UART: [art] Lock RT PCRs Done
2,988,109 UART: [art] Populate DV Done
2,996,238 UART: [fht] FMC Alias Private Key: 7
2,997,368 UART: [art] Derive CDI
2,997,648 UART: [art] Store in in slot 0x4
3,083,451 UART: [art] Derive Key Pair
3,083,811 UART: [art] Store priv key in slot 0x5
3,097,367 UART: [art] Derive Key Pair - Done
3,111,841 UART: [art] Signing Cert with AUTHO
3,112,321 UART: RITY.KEYID = 7
3,127,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,114 UART: [art] PUB.X = 4560BA23FFCB652FA925B405F65E5998C94A428C24D1D89171A66D78A062E76996F6A4D9B868D8CFC0A5C5BF549717E4
3,134,885 UART: [art] PUB.Y = CD68328EAB26C604B00B53DBB2CBAFD0A9168FAB3DFCF37A6EB8948315A912C1411C69A2F6815E93FFD09D3BDC3B9F7A
3,141,853 UART: [art] SIG.R = F805708546178987FB35E0E2825B93549E7507262059D8D14E9BD861F9970AB2FA8A599687AC4D2B8CEBFDC945329684
3,148,608 UART: [art] SIG.S = 3E38D34848859A13A5A91DE3D97C208945DFBB3B6062E53D47E0281265A56E5CA0CC03E263E7A4F1289738AF0B142BCD
3,172,889 UART: Caliptra RT
3,173,234 UART: [state] CFI Enabled
3,280,381 UART: [rt] RT listening for mailbox commands...
3,281,051 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,875 UART: [rt]cmd =0x4c4d5356, len=1672
3,574,579 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,106 ready_for_fw is high
1,061,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,886 >>> mbox cmd response: success
2,691,796 UART:
2,691,812 UART: Running Caliptra FMC ...
2,692,220 UART:
2,692,363 UART: [state] CFI Enabled
2,702,614 UART: [fht] FMC Alias Private Key: 7
2,810,335 UART: [art] Extend RT PCRs Done
2,810,763 UART: [art] Lock RT PCRs Done
2,812,239 UART: [art] Populate DV Done
2,820,234 UART: [fht] FMC Alias Private Key: 7
2,821,364 UART: [art] Derive CDI
2,821,644 UART: [art] Store in in slot 0x4
2,907,409 UART: [art] Derive Key Pair
2,907,769 UART: [art] Store priv key in slot 0x5
2,920,839 UART: [art] Derive Key Pair - Done
2,935,524 UART: [art] Signing Cert with AUTHO
2,936,004 UART: RITY.KEYID = 7
2,951,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,057 UART: [art] PUB.X = A23BCBB137EECCB2F3B092184B574230F04F294C06E3E20BF6074A4A9EBDB76FC6AF0082F3DA93EBAACBF26A564D8C85
2,958,820 UART: [art] PUB.Y = A233E69F71E241B8369AAE4E99D765E5C39AEAB9DBE5BC7B89978A6D2A7775246BC40CBF72CBD5E35DF07C6842123C6F
2,965,783 UART: [art] SIG.R = 7F641FB1B869596EF039B7AC98EDF3DB5453AC9735506E3ADB21FC260F11138FF18EE911BCE4D5592BD23EA074E0FB38
2,972,564 UART: [art] SIG.S = 3F33AE84937C41EAD00A99FA5DA09B08BBE4C2E3B37D8E76F31E77A4374E270D211AA9292B04A48C01C634867FF05177
2,996,528 UART: Caliptra RT
2,996,873 UART: [state] CFI Enabled
3,104,736 UART: [rt] RT listening for mailbox commands...
3,105,406 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,028 UART: [rt]cmd =0x4c4d5356, len=1672
3,398,670 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 ready_for_fw is high
1,174,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,609 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,480 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,874 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,951 UART: [fwproc] Recv command 0x46574c44
1,282,684 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,158 >>> mbox cmd response: success
2,774,417 UART: [afmc] ++
2,774,585 UART: [afmc] CDI.KEYID = 6
2,774,948 UART: [afmc] SUBJECT.KEYID = 7
2,775,374 UART: [afmc] AUTHORITY.KEYID = 5
2,810,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,410 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,154 UART: [afmc] --
2,854,144 UART: [cold-reset] --
2,855,060 UART: [state] Locking Datavault
2,856,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,863 UART: [state] Locking ICCM
2,857,489 UART: [exit] Launching FMC @ 0x40000130
2,862,818 UART:
2,862,834 UART: Running Caliptra FMC ...
2,863,242 UART:
2,863,296 UART: [state] CFI Enabled
2,873,385 UART: [fht] FMC Alias Private Key: 7
2,981,642 UART: [art] Extend RT PCRs Done
2,982,070 UART: [art] Lock RT PCRs Done
2,983,498 UART: [art] Populate DV Done
2,991,509 UART: [fht] FMC Alias Private Key: 7
2,992,437 UART: [art] Derive CDI
2,992,717 UART: [art] Store in in slot 0x4
3,078,272 UART: [art] Derive Key Pair
3,078,632 UART: [art] Store priv key in slot 0x5
3,091,766 UART: [art] Derive Key Pair - Done
3,106,683 UART: [art] Signing Cert with AUTHO
3,107,163 UART: RITY.KEYID = 7
3,122,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,070 UART: [art] PUB.X = D8B7EEDEAB95B8145B7051FF9AAC50277632A3000CCB3218C3CB3984096FA03348CD582DE421D201682EA0E43E38ED97
3,129,817 UART: [art] PUB.Y = 2C86C85587F920009041A29BC9CAB77173B8665D8E541507FE102323C00B06A4CFAB33F42E542FE7FDB74607FEE6390F
3,136,732 UART: [art] SIG.R = C39DC3F38513BE6499FADD6D9B6864CF4B5DAC652EA521A8FBF1BD95E009B94C2E28CD60714E7BA40130B2519AD38B06
3,143,509 UART: [art] SIG.S = 1C794FC5C67A4780BCA435BEA26BB2E32B23FA51E590D1ECD37F2E2593CACF31106FDF9E3C3AC6DEC0FC74BD70C1D2E8
3,168,036 UART: Caliptra RT
3,168,289 UART: [state] CFI Enabled
3,276,658 UART: [rt] RT listening for mailbox commands...
3,277,328 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,886 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,460 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 ready_for_fw is high
1,056,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,692 >>> mbox cmd response: success
2,683,908 UART:
2,683,924 UART: Running Caliptra FMC ...
2,684,332 UART:
2,684,386 UART: [state] CFI Enabled
2,694,365 UART: [fht] FMC Alias Private Key: 7
2,802,304 UART: [art] Extend RT PCRs Done
2,802,732 UART: [art] Lock RT PCRs Done
2,803,820 UART: [art] Populate DV Done
2,812,025 UART: [fht] FMC Alias Private Key: 7
2,813,075 UART: [art] Derive CDI
2,813,355 UART: [art] Store in in slot 0x4
2,899,396 UART: [art] Derive Key Pair
2,899,756 UART: [art] Store priv key in slot 0x5
2,913,070 UART: [art] Derive Key Pair - Done
2,927,563 UART: [art] Signing Cert with AUTHO
2,928,043 UART: RITY.KEYID = 7
2,943,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,906 UART: [art] PUB.X = 5134496D592858A7B0E247DF62C319EBFC797ECDC5ECD7D724041C4C6C38176A9545420633E52BD0141C7551E00F6F69
2,950,665 UART: [art] PUB.Y = D0957BB74D218516C55AA5656D6610EE7DF5894CDBE5E89CF2EBFBF8500F46001D44E4EDAC08147A67959101A212F7CA
2,957,594 UART: [art] SIG.R = 51E3DCF3D5276BE01A53D3FFFE7181815E7D1753F6A18625D45F20694756ECB5122BB9BA8548B08A1BB5399392FE6116
2,964,366 UART: [art] SIG.S = 8CCB1172F000C92D2F3534E73E150136832B755ABE52E9C3365E2D303D74973B1A4808AA3A6BF50ECEF9164EFB3D6E57
2,988,322 UART: Caliptra RT
2,988,575 UART: [state] CFI Enabled
3,096,420 UART: [rt] RT listening for mailbox commands...
3,097,090 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,824 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,006 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 ready_for_fw is high
1,174,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,151 UART: [fwproc] Wait for Commands...
1,282,950 UART: [fwproc] Recv command 0x46574c44
1,283,683 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,399 >>> mbox cmd response: success
2,776,548 UART: [afmc] ++
2,776,716 UART: [afmc] CDI.KEYID = 6
2,777,079 UART: [afmc] SUBJECT.KEYID = 7
2,777,505 UART: [afmc] AUTHORITY.KEYID = 5
2,812,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,183 UART: [afmc] --
2,856,251 UART: [cold-reset] --
2,857,169 UART: [state] Locking Datavault
2,858,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,074 UART: [state] Locking ICCM
2,859,682 UART: [exit] Launching FMC @ 0x40000130
2,865,011 UART:
2,865,027 UART: Running Caliptra FMC ...
2,865,435 UART:
2,865,578 UART: [state] CFI Enabled
2,875,887 UART: [fht] FMC Alias Private Key: 7
2,984,512 UART: [art] Extend RT PCRs Done
2,984,940 UART: [art] Lock RT PCRs Done
2,986,468 UART: [art] Populate DV Done
2,994,763 UART: [fht] FMC Alias Private Key: 7
2,995,867 UART: [art] Derive CDI
2,996,147 UART: [art] Store in in slot 0x4
3,081,556 UART: [art] Derive Key Pair
3,081,916 UART: [art] Store priv key in slot 0x5
3,095,012 UART: [art] Derive Key Pair - Done
3,109,685 UART: [art] Signing Cert with AUTHO
3,110,165 UART: RITY.KEYID = 7
3,125,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,682 UART: [art] PUB.X = EFE64F9DB6FD92604187B4204B41F5DCC5AE75EEAE37E138218AC98D6A1A7522DF56B21166A378F2602558F51A77CBD5
3,133,462 UART: [art] PUB.Y = 2A2EBF9E91BF858B8E7CC57CF40662781BB8836E46F050B674F1A45464D954E06BF3E52855F41B670ED4FB83B49A5BD0
3,140,414 UART: [art] SIG.R = 5C775768D64771F37C2EA74B13C4E95313793004681B235AC84EAA637C9C6D2D241BEB014C1998FFA3F70CCA19EC24D4
3,147,179 UART: [art] SIG.S = 67A6B81F7A1FD10F49C18F5F2A11B43A66E4C968BEF3FAB9A218549DD5CCB45D36E1D91D93DF700DFF019AAD3E42607B
3,170,639 UART: Caliptra RT
3,170,984 UART: [state] CFI Enabled
3,278,543 UART: [rt] RT listening for mailbox commands...
3,279,213 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,027 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,433 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,221 ready_for_fw is high
1,057,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,531 >>> mbox cmd response: success
2,686,821 UART:
2,686,837 UART: Running Caliptra FMC ...
2,687,245 UART:
2,687,388 UART: [state] CFI Enabled
2,697,831 UART: [fht] FMC Alias Private Key: 7
2,806,388 UART: [art] Extend RT PCRs Done
2,806,816 UART: [art] Lock RT PCRs Done
2,808,328 UART: [art] Populate DV Done
2,816,517 UART: [fht] FMC Alias Private Key: 7
2,817,639 UART: [art] Derive CDI
2,817,919 UART: [art] Store in in slot 0x4
2,903,382 UART: [art] Derive Key Pair
2,903,742 UART: [art] Store priv key in slot 0x5
2,916,878 UART: [art] Derive Key Pair - Done
2,931,700 UART: [art] Signing Cert with AUTHO
2,932,180 UART: RITY.KEYID = 7
2,947,586 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,351 UART: [art] PUB.X = E4675022E263ABBC37F06E42B897E0CB62EA5ACB6A0514BB6FA33CCB29F655165DEC2686007051C4A1F9F8ACC7CE7276
2,955,110 UART: [art] PUB.Y = 5232333DC752A1F94FE20A02E5A87978D2749F37E60A70A58343C5ED44B9DF48373FC9FBCCF93C642EF1A2691F182708
2,962,050 UART: [art] SIG.R = 2D8793A468E21E3A8CE3FFB5E51F9F4CB8B1168B61FB3377FB9211C9731C12FF620C3A7A15AAF8FC1CB554F389E689B5
2,968,831 UART: [art] SIG.S = 64774523D8D1438DE1D538A7668C410EDC71D41CBF149FCFA19538A698B3DF47BA4AD7BE953ACFB989F67EFB5DD391FD
2,992,395 UART: Caliptra RT
2,992,740 UART: [state] CFI Enabled
3,101,011 UART: [rt] RT listening for mailbox commands...
3,101,681 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,379 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,063 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,127 UART:
192,499 UART: Running Caliptra ROM ...
193,683 UART:
193,835 UART: [state] CFI Enabled
262,517 UART: [state] LifecycleState = Unprovisioned
264,505 UART: [state] DebugLocked = No
266,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,325 UART: [kat] SHA2-256
441,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,784 UART: [kat] ++
452,462 UART: [kat] sha1
464,555 UART: [kat] SHA2-256
467,278 UART: [kat] SHA2-384
472,639 UART: [kat] SHA2-512-ACC
475,006 UART: [kat] ECC-384
2,767,841 UART: [kat] HMAC-384Kdf
2,801,589 UART: [kat] LMS
3,991,927 UART: [kat] --
3,997,644 UART: [cold-reset] ++
3,999,019 UART: [fht] Storing FHT @ 0x50003400
4,011,212 UART: [idev] ++
4,011,784 UART: [idev] CDI.KEYID = 6
4,012,706 UART: [idev] SUBJECT.KEYID = 7
4,013,950 UART: [idev] UDS.KEYID = 0
4,015,008 ready_for_fw is high
4,015,222 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,852 UART: [idev] Erasing UDS.KEYID = 0
7,346,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,876 UART: [idev] --
7,371,791 UART: [ldev] ++
7,372,364 UART: [ldev] CDI.KEYID = 6
7,373,330 UART: [ldev] SUBJECT.KEYID = 5
7,374,562 UART: [ldev] AUTHORITY.KEYID = 7
7,375,793 UART: [ldev] FE.KEYID = 1
7,423,811 UART: [ldev] Erasing FE.KEYID = 1
10,757,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,880 UART: [ldev] --
13,138,098 UART: [fwproc] Waiting for Commands...
13,140,894 UART: [fwproc] Received command 0x46574c44
13,143,078 UART: [fwproc] Received Image of size 114124 bytes
17,190,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,337,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,656,034 >>> mbox cmd response: success
17,660,963 UART: [afmc] ++
17,661,575 UART: [afmc] CDI.KEYID = 6
17,662,490 UART: [afmc] SUBJECT.KEYID = 7
17,663,705 UART: [afmc] AUTHORITY.KEYID = 5
21,029,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,669 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,073 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,885 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,321 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,238 UART: [afmc] --
23,401,098 UART: [cold-reset] --
23,406,474 UART: [state] Locking Datavault
23,410,544 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,443 UART: [state] Locking ICCM
23,414,742 UART: [exit] Launching FMC @ 0x40000130
23,423,159 UART:
23,423,401 UART: Running Caliptra FMC ...
23,424,503 UART:
23,424,670 UART: [state] CFI Enabled
23,488,286 UART: [fht] FMC Alias Private Key: 7
25,826,293 UART: [art] Extend RT PCRs Done
25,827,522 UART: [art] Lock RT PCRs Done
25,828,959 UART: [art] Populate DV Done
25,834,321 UART: [fht] FMC Alias Private Key: 7
25,836,017 UART: [art] Derive CDI
25,836,754 UART: [art] Store in in slot 0x4
25,895,844 UART: [art] Derive Key Pair
25,896,900 UART: [art] Store priv key in slot 0x5
29,189,292 UART: [art] Derive Key Pair - Done
29,202,494 UART: [art] Signing Cert with AUTHO
29,203,796 UART: RITY.KEYID = 7
31,491,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,288 UART: [art] PUB.X = 02761CB45B192A32990E0A8DB51E0C324EA04512AFFC59DA8B89C84FC2057D14B05AF5B809E20191511F1091B24C4314
31,500,400 UART: [art] PUB.Y = AB5FB589693A283884E45FEB98CC714FDB79623E54DF7DC2572A4F1F2E2B4E628736D20A4138C685CB830BD6FBEE509D
31,507,642 UART: [art] SIG.R = B6DBC41703C6C3F7D2587D9FC347D7398718F2FF01A00F3621DE79DE03681AD954A52E81DD7E5C9C0ACB71598E1335B2
31,515,034 UART: [art] SIG.S = 0F30DE5A33E1C57CEE6F4410353E1E37C6AB8A8F07E4F783B25E356EBAC533D736059FDCB1C17B2CD3B90C65C77C979A
32,820,614 UART: Caliptra RT
32,821,327 UART: [state] CFI Enabled
32,981,304 UART: [rt] RT listening for mailbox commands...
32,985,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,029,755 UART: [rt]cmd =0x4c4d5356, len=1672
33,444,335 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,938 writing to cptra_bootfsm_go
3,785,116 ready_for_fw is high
3,785,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,876,410 >>> mbox cmd response: success
23,571,974 UART:
23,572,356 UART: Running Caliptra FMC ...
23,573,510 UART:
23,573,691 UART: [state] CFI Enabled
23,640,131 UART: [fht] FMC Alias Private Key: 7
25,978,466 UART: [art] Extend RT PCRs Done
25,979,705 UART: [art] Lock RT PCRs Done
25,981,307 UART: [art] Populate DV Done
25,986,846 UART: [fht] FMC Alias Private Key: 7
25,988,552 UART: [art] Derive CDI
25,989,366 UART: [art] Store in in slot 0x4
26,050,028 UART: [art] Derive Key Pair
26,051,075 UART: [art] Store priv key in slot 0x5
29,344,334 UART: [art] Derive Key Pair - Done
29,357,124 UART: [art] Signing Cert with AUTHO
29,358,434 UART: RITY.KEYID = 7
31,646,040 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,549 UART: [art] PUB.X = FD4C8D1BE50D948202060E23D9ABF44AFD40EBD8A092D473B99AFEFBF9C047CAD0C9F3AC083EC9FD6E72514749E9225E
31,654,797 UART: [art] PUB.Y = 94DF02A49D1631D59388E45C988BACA95F6D57DEBE4A8007B0600EF4CCAC676E12B56D26C54235F39DEC615FFE6BF93C
31,662,052 UART: [art] SIG.R = 10D7FFF818141BCF5A0C1B4B169F4735677D015D097CA07F15EE905E489F7C50B4E839A234EEF7623D455C437B5E92D6
31,669,459 UART: [art] SIG.S = EE1E6416C2246690344BD809E9CADD235D45FBEC0E23AAFE75A61E0F9BF0E9312198FFAE1E1720D3FA5017555874C73E
32,974,169 UART: Caliptra RT
32,974,883 UART: [state] CFI Enabled
33,136,365 UART: [rt] RT listening for mailbox commands...
33,140,368 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,184,948 UART: [rt]cmd =0x4c4d5356, len=1672
33,599,385 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,423 UART:
192,794 UART: Running Caliptra ROM ...
193,899 UART:
603,793 UART: [state] CFI Enabled
621,288 UART: [state] LifecycleState = Unprovisioned
623,237 UART: [state] DebugLocked = No
624,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,252 UART: [kat] SHA2-256
800,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,594 UART: [kat] ++
811,092 UART: [kat] sha1
820,784 UART: [kat] SHA2-256
823,474 UART: [kat] SHA2-384
828,473 UART: [kat] SHA2-512-ACC
830,836 UART: [kat] ECC-384
3,114,023 UART: [kat] HMAC-384Kdf
3,124,980 UART: [kat] LMS
4,315,071 UART: [kat] --
4,319,234 UART: [cold-reset] ++
4,320,902 UART: [fht] Storing FHT @ 0x50003400
4,331,312 UART: [idev] ++
4,331,877 UART: [idev] CDI.KEYID = 6
4,332,899 UART: [idev] SUBJECT.KEYID = 7
4,334,076 UART: [idev] UDS.KEYID = 0
4,335,121 ready_for_fw is high
4,335,323 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,656 UART: [idev] Erasing UDS.KEYID = 0
7,621,428 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,238 UART: [idev] --
7,646,861 UART: [ldev] ++
7,647,480 UART: [ldev] CDI.KEYID = 6
7,648,417 UART: [ldev] SUBJECT.KEYID = 5
7,649,618 UART: [ldev] AUTHORITY.KEYID = 7
7,650,896 UART: [ldev] FE.KEYID = 1
7,664,158 UART: [ldev] Erasing FE.KEYID = 1
10,951,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,395 UART: [ldev] --
13,309,912 UART: [fwproc] Waiting for Commands...
13,313,034 UART: [fwproc] Received command 0x46574c44
13,315,217 UART: [fwproc] Received Image of size 114124 bytes
17,367,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,551 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,361 >>> mbox cmd response: success
17,834,042 UART: [afmc] ++
17,834,642 UART: [afmc] CDI.KEYID = 6
17,835,607 UART: [afmc] SUBJECT.KEYID = 7
17,836,833 UART: [afmc] AUTHORITY.KEYID = 5
21,153,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,597 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,966 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,803 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,246 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,185 UART: [afmc] --
23,518,292 UART: [cold-reset] --
23,520,686 UART: [state] Locking Datavault
23,523,929 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,680 UART: [state] Locking ICCM
23,528,090 UART: [exit] Launching FMC @ 0x40000130
23,536,482 UART:
23,536,720 UART: Running Caliptra FMC ...
23,537,817 UART:
23,537,995 UART: [state] CFI Enabled
23,545,983 UART: [fht] FMC Alias Private Key: 7
25,876,848 UART: [art] Extend RT PCRs Done
25,878,064 UART: [art] Lock RT PCRs Done
25,879,633 UART: [art] Populate DV Done
25,884,716 UART: [fht] FMC Alias Private Key: 7
25,886,263 UART: [art] Derive CDI
25,887,017 UART: [art] Store in in slot 0x4
25,929,659 UART: [art] Derive Key Pair
25,930,659 UART: [art] Store priv key in slot 0x5
29,172,739 UART: [art] Derive Key Pair - Done
29,185,576 UART: [art] Signing Cert with AUTHO
29,186,882 UART: RITY.KEYID = 7
31,466,104 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,602 UART: [art] PUB.X = 731D2211447A845955B4351284794FE4D825A23D371B6BBCA8A3AD429A8A27396D7788A3E733ACCF58A77A298AE5DA68
31,474,884 UART: [art] PUB.Y = A4A8F1774948D3B190FC9B6190059CC881593240F18D2686D2B71FC29CE837EF5341BE4281C4A4ABB3478F2F048FFA80
31,482,112 UART: [art] SIG.R = 4B391D9223AF19ABDDDC10222B3C49F445FAF71D71BF65C1186BDFD62442986A672761A432B80647B967699F9A452AFC
31,489,468 UART: [art] SIG.S = 3ED3C08D2BF505A2A75E970B47CCD5E9AA7B364504D518BFF26DDE355749CA1988426FA9485F96BCC7054C4D8D3A3E3B
32,794,744 UART: Caliptra RT
32,795,450 UART: [state] CFI Enabled
32,913,951 UART: [rt] RT listening for mailbox commands...
32,917,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,962,428 UART: [rt]cmd =0x4c4d5356, len=1672
33,376,872 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,130,279 ready_for_fw is high
4,130,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,646 >>> mbox cmd response: success
23,709,208 UART:
23,709,596 UART: Running Caliptra FMC ...
23,710,743 UART:
23,710,901 UART: [state] CFI Enabled
23,718,576 UART: [fht] FMC Alias Private Key: 7
26,049,702 UART: [art] Extend RT PCRs Done
26,050,930 UART: [art] Lock RT PCRs Done
26,052,903 UART: [art] Populate DV Done
26,058,399 UART: [fht] FMC Alias Private Key: 7
26,060,053 UART: [art] Derive CDI
26,060,791 UART: [art] Store in in slot 0x4
26,103,810 UART: [art] Derive Key Pair
26,104,805 UART: [art] Store priv key in slot 0x5
29,347,307 UART: [art] Derive Key Pair - Done
29,359,869 UART: [art] Signing Cert with AUTHO
29,361,170 UART: RITY.KEYID = 7
31,640,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,265 UART: [art] PUB.X = 86A596BD26B133B954680A6C11173BB06D97E333348D551984BD1829610DDC5AEE0F42B97ACDE54F31963E3947F112B6
31,649,532 UART: [art] PUB.Y = 0B734CDCB958248053EC243CFA70CA3AA56625E9995460B14F58ECFB2E9DE45BC51C2C5A2A07C461296465D83C7C1C3A
31,656,754 UART: [art] SIG.R = 537419EF6B78A46D73331386A895EF8D98C55F3771200305D51FADA7BFA8AF36055CE777FD559FF460462E943B5BD054
31,664,144 UART: [art] SIG.S = CF70601C9D8F408CFCDE5702F446D05C5454EF0CA1BA4B03E0D29F173465C8867CDDF7AC7A89AEFFAA458FD869ADC764
32,969,488 UART: Caliptra RT
32,970,190 UART: [state] CFI Enabled
33,088,321 UART: [rt] RT listening for mailbox commands...
33,092,332 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,136,741 UART: [rt]cmd =0x4c4d5356, len=1672
33,551,550 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,095 UART:
192,451 UART: Running Caliptra ROM ...
193,641 UART:
193,793 UART: [state] CFI Enabled
262,533 UART: [state] LifecycleState = Unprovisioned
264,446 UART: [state] DebugLocked = No
266,820 UART: [state] WD Timer not started. Device not locked for debugging
269,784 UART: [kat] SHA2-256
448,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,502 UART: [kat] ++
460,950 UART: [kat] sha1
471,966 UART: [kat] SHA2-256
475,055 UART: [kat] SHA2-384
481,053 UART: [kat] SHA2-512-ACC
484,009 UART: [kat] ECC-384
2,946,315 UART: [kat] HMAC-384Kdf
2,968,925 UART: [kat] LMS
3,498,310 UART: [kat] --
3,503,863 UART: [cold-reset] ++
3,506,216 UART: [fht] FHT @ 0x50003400
3,517,350 UART: [idev] ++
3,517,950 UART: [idev] CDI.KEYID = 6
3,518,876 UART: [idev] SUBJECT.KEYID = 7
3,520,048 UART: [idev] UDS.KEYID = 0
3,520,976 ready_for_fw is high
3,521,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,133 UART: [idev] Erasing UDS.KEYID = 0
6,027,224 UART: [idev] Sha1 KeyId Algorithm
6,049,339 UART: [idev] --
6,054,468 UART: [ldev] ++
6,055,037 UART: [ldev] CDI.KEYID = 6
6,055,934 UART: [ldev] SUBJECT.KEYID = 5
6,057,147 UART: [ldev] AUTHORITY.KEYID = 7
6,058,331 UART: [ldev] FE.KEYID = 1
6,100,084 UART: [ldev] Erasing FE.KEYID = 1
8,602,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,954 UART: [ldev] --
10,393,996 UART: [fwproc] Wait for Commands...
10,395,880 UART: [fwproc] Recv command 0x46574c44
10,397,962 UART: [fwproc] Recv'd Img size: 114448 bytes
13,803,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,335 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,262,927 >>> mbox cmd response: success
14,266,417 UART: [afmc] ++
14,267,011 UART: [afmc] CDI.KEYID = 6
14,267,901 UART: [afmc] SUBJECT.KEYID = 7
14,269,118 UART: [afmc] AUTHORITY.KEYID = 5
16,809,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,275 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,350 UART: [afmc] --
18,604,214 UART: [cold-reset] --
18,609,497 UART: [state] Locking Datavault
18,615,663 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,310 UART: [state] Locking ICCM
18,619,704 UART: [exit] Launching FMC @ 0x40000130
18,628,099 UART:
18,628,337 UART: Running Caliptra FMC ...
18,629,361 UART:
18,629,510 UART: [state] CFI Enabled
18,687,881 UART: [fht] FMC Alias Private Key: 7
20,451,655 UART: [art] Extend RT PCRs Done
20,452,855 UART: [art] Lock RT PCRs Done
20,454,233 UART: [art] Populate DV Done
20,459,585 UART: [fht] FMC Alias Private Key: 7
20,461,171 UART: [art] Derive CDI
20,461,912 UART: [art] Store in in slot 0x4
20,519,760 UART: [art] Derive Key Pair
20,520,810 UART: [art] Store priv key in slot 0x5
22,983,736 UART: [art] Derive Key Pair - Done
22,996,893 UART: [art] Signing Cert with AUTHO
22,998,195 UART: RITY.KEYID = 7
24,709,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,634 UART: [art] PUB.X = A4701C94B9AF6E194BC0E11EDA5754C5ED3D387A8BAE1C45EAD5BD9939FE4F99F5BECAEF1BF12E2F9C6E45106DEEFDC4
24,718,000 UART: [art] PUB.Y = CCDA4C3622A791468400F48EAF9C488A4D362E39239419EA0490B68A8D76FA58C1CF2EAF91B851C1D7C3375E451C98F9
24,725,244 UART: [art] SIG.R = 13FA7D66DB2791C87391075CF6A45648273B8FCC2DAA2F61E0E884E2F3C6AD4F25BA62906DA544E0A42756409B45502E
24,732,635 UART: [art] SIG.S = 1B7997B4D5AB9204A39BB284E489FAC0BA52B3FB7583B0DC4E2E4D90C7DC58098EEDDAE2BC5DC7318181FC2A4915F7E8
25,711,697 UART: Caliptra RT
25,712,406 UART: [state] CFI Enabled
25,876,552 UART: [rt] RT listening for mailbox commands...
25,880,529 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,925,477 UART: [rt]cmd =0x4c4d5356, len=1672
26,127,132 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,358,009 ready_for_fw is high
3,358,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,191 >>> mbox cmd response: success
18,321,992 UART:
18,322,376 UART: Running Caliptra FMC ...
18,323,564 UART:
18,323,734 UART: [state] CFI Enabled
18,390,172 UART: [fht] FMC Alias Private Key: 7
20,154,470 UART: [art] Extend RT PCRs Done
20,155,697 UART: [art] Lock RT PCRs Done
20,157,321 UART: [art] Populate DV Done
20,162,570 UART: [fht] FMC Alias Private Key: 7
20,164,175 UART: [art] Derive CDI
20,164,990 UART: [art] Store in in slot 0x4
20,222,820 UART: [art] Derive Key Pair
20,223,861 UART: [art] Store priv key in slot 0x5
22,687,273 UART: [art] Derive Key Pair - Done
22,700,374 UART: [art] Signing Cert with AUTHO
22,701,677 UART: RITY.KEYID = 7
24,412,680 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,181 UART: [art] PUB.X = 9D6D1FC911C0B58FCBEF6E4DD6C38B4D7FF0617666E626725E54740C227F57B8399F4C8FB9165A80EE5C435E8A0F3DCB
24,421,485 UART: [art] PUB.Y = 26A80A9C9568E436F61443B10C21D36BEB8492B043C6C0D85171C076B72A70E5732A286EA8A180A09FCEA45680539D45
24,428,708 UART: [art] SIG.R = 222754D47F1BD330FA395BEC560767FDA9F84375CBC0D1E4AED6CF7E709B61A5FD809497CEC94A8D068727D59B6D2AA9
24,436,113 UART: [art] SIG.S = 1B2AAB5DC66F9F446B1437DC2FD672BF6C0B2E28F563434D4E2755620AD00070C78E6F6D2B6C3E29DC7B148D450ED1D6
25,415,411 UART: Caliptra RT
25,416,108 UART: [state] CFI Enabled
25,580,561 UART: [rt] RT listening for mailbox commands...
25,584,468 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,629,434 UART: [rt]cmd =0x4c4d5356, len=1672
25,831,245 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,396 UART:
192,760 UART: Running Caliptra ROM ...
193,949 UART:
603,740 UART: [state] CFI Enabled
617,471 UART: [state] LifecycleState = Unprovisioned
619,339 UART: [state] DebugLocked = No
620,562 UART: [state] WD Timer not started. Device not locked for debugging
623,446 UART: [kat] SHA2-256
802,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,151 UART: [kat] ++
814,592 UART: [kat] sha1
824,885 UART: [kat] SHA2-256
827,882 UART: [kat] SHA2-384
834,571 UART: [kat] SHA2-512-ACC
837,517 UART: [kat] ECC-384
3,280,366 UART: [kat] HMAC-384Kdf
3,292,448 UART: [kat] LMS
3,821,940 UART: [kat] --
3,826,943 UART: [cold-reset] ++
3,829,372 UART: [fht] FHT @ 0x50003400
3,840,291 UART: [idev] ++
3,840,887 UART: [idev] CDI.KEYID = 6
3,841,817 UART: [idev] SUBJECT.KEYID = 7
3,842,983 UART: [idev] UDS.KEYID = 0
3,843,898 ready_for_fw is high
3,844,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,645 UART: [idev] Erasing UDS.KEYID = 0
6,314,989 UART: [idev] Sha1 KeyId Algorithm
6,336,691 UART: [idev] --
6,341,434 UART: [ldev] ++
6,342,022 UART: [ldev] CDI.KEYID = 6
6,342,930 UART: [ldev] SUBJECT.KEYID = 5
6,344,075 UART: [ldev] AUTHORITY.KEYID = 7
6,345,299 UART: [ldev] FE.KEYID = 1
6,356,748 UART: [ldev] Erasing FE.KEYID = 1
8,826,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,993 UART: [ldev] --
10,614,540 UART: [fwproc] Wait for Commands...
10,617,160 UART: [fwproc] Recv command 0x46574c44
10,619,253 UART: [fwproc] Recv'd Img size: 114448 bytes
14,019,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,985 >>> mbox cmd response: success
14,486,097 UART: [afmc] ++
14,486,689 UART: [afmc] CDI.KEYID = 6
14,487,591 UART: [afmc] SUBJECT.KEYID = 7
14,488,797 UART: [afmc] AUTHORITY.KEYID = 5
16,987,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,887 UART: [afmc] --
18,783,532 UART: [cold-reset] --
18,787,437 UART: [state] Locking Datavault
18,793,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,860 UART: [state] Locking ICCM
18,796,126 UART: [exit] Launching FMC @ 0x40000130
18,804,532 UART:
18,804,764 UART: Running Caliptra FMC ...
18,805,856 UART:
18,806,000 UART: [state] CFI Enabled
18,813,936 UART: [fht] FMC Alias Private Key: 7
20,570,233 UART: [art] Extend RT PCRs Done
20,571,461 UART: [art] Lock RT PCRs Done
20,573,299 UART: [art] Populate DV Done
20,578,494 UART: [fht] FMC Alias Private Key: 7
20,580,024 UART: [art] Derive CDI
20,580,835 UART: [art] Store in in slot 0x4
20,623,690 UART: [art] Derive Key Pair
20,624,682 UART: [art] Store priv key in slot 0x5
23,052,124 UART: [art] Derive Key Pair - Done
23,065,299 UART: [art] Signing Cert with AUTHO
23,066,600 UART: RITY.KEYID = 7
24,771,759 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,255 UART: [art] PUB.X = C06F63C4558405E14C0697EF94CB529CB8AABBEEF2717642D2F1ABE99E777A944240B0461182CB6F7834B216736B0DBE
24,780,518 UART: [art] PUB.Y = 13AE472A335D3C1F131FD87C826C4AFDFECC10F290DE48083AE23E440FF60B76F7468E54C6BCF7EB681367A1A2EA83C5
24,787,779 UART: [art] SIG.R = CF5FC7CD9D637125144B841DDA42F746EB989628AE0233D960C969BC2990DA25134174C06928A227E4B2F1755D92F4D3
24,795,186 UART: [art] SIG.S = 769E3282416916D7FDCAA370220DB9786B7D4568781A2FD2D10EFE820F0AF637774E1E3B40F34BA86E48EB3485913BEE
25,774,049 UART: Caliptra RT
25,774,744 UART: [state] CFI Enabled
25,891,470 UART: [rt] RT listening for mailbox commands...
25,895,366 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,939,812 UART: [rt]cmd =0x4c4d5356, len=1672
26,141,916 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,697,093 ready_for_fw is high
3,697,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,496 >>> mbox cmd response: success
18,526,491 UART:
18,526,906 UART: Running Caliptra FMC ...
18,528,011 UART:
18,528,158 UART: [state] CFI Enabled
18,535,947 UART: [fht] FMC Alias Private Key: 7
20,292,723 UART: [art] Extend RT PCRs Done
20,293,945 UART: [art] Lock RT PCRs Done
20,295,651 UART: [art] Populate DV Done
20,301,007 UART: [fht] FMC Alias Private Key: 7
20,302,662 UART: [art] Derive CDI
20,303,393 UART: [art] Store in in slot 0x4
20,345,601 UART: [art] Derive Key Pair
20,346,596 UART: [art] Store priv key in slot 0x5
22,773,404 UART: [art] Derive Key Pair - Done
22,786,259 UART: [art] Signing Cert with AUTHO
22,787,557 UART: RITY.KEYID = 7
24,493,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,512 UART: [art] PUB.X = 3323989D1D1A1A6E786F3C3AB4568D6C0FC77E3F8CC548A4E6538FA51F5941732DA9474CABCF0D9E8D2FAE83E920DF48
24,501,805 UART: [art] PUB.Y = 8C10C5E1C3CB135B70BDACF3EF0D05D3B84DEA81B2DBAA0B41E78856A9C856BAEFBB522C77BAF7587A12F14A3848BCBB
24,509,075 UART: [art] SIG.R = 1A8857A993BEBFDD8E5E7DBAE0CE3C1B1DDC164498B279BC856FF0DEF44774E589A28C4E59D7542AE6D336B8344AF024
24,516,504 UART: [art] SIG.S = FBB5572D4A544E95FA7A3F486890ABCCFD68E238EB2B9E3D525BB90F6D162226BEF1A109280E6B9640A2CAFE2B2B7A04
25,495,910 UART: Caliptra RT
25,496,609 UART: [state] CFI Enabled
25,614,633 UART: [rt] RT listening for mailbox commands...
25,618,595 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,662,959 UART: [rt]cmd =0x4c4d5356, len=1672
25,864,518 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,093 UART:
192,467 UART: Running Caliptra ROM ...
193,659 UART:
193,814 UART: [state] CFI Enabled
265,172 UART: [state] LifecycleState = Unprovisioned
267,597 UART: [state] DebugLocked = No
269,723 UART: [state] WD Timer not started. Device not locked for debugging
273,904 UART: [kat] SHA2-256
463,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,555 UART: [kat] ++
475,001 UART: [kat] sha1
485,669 UART: [kat] SHA2-256
488,671 UART: [kat] SHA2-384
494,586 UART: [kat] SHA2-512-ACC
497,167 UART: [kat] ECC-384
2,949,474 UART: [kat] HMAC-384Kdf
2,972,184 UART: [kat] LMS
3,503,945 UART: [kat] --
3,508,574 UART: [cold-reset] ++
3,509,932 UART: [fht] FHT @ 0x50003400
3,522,473 UART: [idev] ++
3,523,182 UART: [idev] CDI.KEYID = 6
3,524,229 UART: [idev] SUBJECT.KEYID = 7
3,525,329 UART: [idev] UDS.KEYID = 0
3,526,273 ready_for_fw is high
3,526,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,512 UART: [idev] Erasing UDS.KEYID = 0
6,028,771 UART: [idev] Sha1 KeyId Algorithm
6,051,785 UART: [idev] --
6,057,199 UART: [ldev] ++
6,057,892 UART: [ldev] CDI.KEYID = 6
6,058,783 UART: [ldev] SUBJECT.KEYID = 5
6,060,000 UART: [ldev] AUTHORITY.KEYID = 7
6,061,187 UART: [ldev] FE.KEYID = 1
6,100,892 UART: [ldev] Erasing FE.KEYID = 1
8,607,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,588 UART: [ldev] --
10,411,420 UART: [fwproc] Wait for Commands...
10,414,655 UART: [fwproc] Recv command 0x46574c44
10,416,971 UART: [fwproc] Recv'd Img size: 114448 bytes
13,862,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,602,398 >>> mbox cmd response: success
14,605,591 UART: [afmc] ++
14,606,297 UART: [afmc] CDI.KEYID = 6
14,607,487 UART: [afmc] SUBJECT.KEYID = 7
14,608,985 UART: [afmc] AUTHORITY.KEYID = 5
17,147,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,247 UART: [afmc] --
18,946,258 UART: [cold-reset] --
18,950,882 UART: [state] Locking Datavault
18,956,030 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,173 UART: [state] Locking ICCM
18,959,515 UART: [exit] Launching FMC @ 0x40000130
18,968,192 UART:
18,968,429 UART: Running Caliptra FMC ...
18,969,530 UART:
18,969,691 UART: [state] CFI Enabled
19,030,017 UART: [fht] FMC Alias Private Key: 7
20,794,143 UART: [art] Extend RT PCRs Done
20,795,383 UART: [art] Lock RT PCRs Done
20,797,062 UART: [art] Populate DV Done
20,802,421 UART: [fht] FMC Alias Private Key: 7
20,804,119 UART: [art] Derive CDI
20,804,935 UART: [art] Store in in slot 0x4
20,863,256 UART: [art] Derive Key Pair
20,864,297 UART: [art] Store priv key in slot 0x5
23,327,076 UART: [art] Derive Key Pair - Done
23,340,071 UART: [art] Signing Cert with AUTHO
23,341,411 UART: RITY.KEYID = 7
25,052,935 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,439 UART: [art] PUB.X = 11BBC3945D95581075AA7A66AF9A179343D0514FBFBE7D40A59B98F763B00AFE3449F8717D45FE902D916686B01D32A2
25,061,687 UART: [art] PUB.Y = DB9DAAF43D7F866941ED81D55A1D1D267FDA3EBD514D895FE235154FC3A295A5F5F5A2C941044278AAC61C345637FA0E
25,068,968 UART: [art] SIG.R = E794BE8BDC0533381EB67A7259B30F5D14D98D0279839CAE0A5E09B9BA858AA7C4C6DD9FA2530FBF89DF36D87E2E8A47
25,076,362 UART: [art] SIG.S = 2DCB8BF5D8F93E85079FDADBA5E3103CFA9EE2C4E98561D5E43296F3F414BA3DB03E994402C507CC05D3A2BCE7EB82E1
26,055,260 UART: Caliptra RT
26,055,988 UART: [state] CFI Enabled
26,220,779 UART: [rt] RT listening for mailbox commands...
26,224,700 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,269,545 UART: [rt]cmd =0x4c4d5356, len=1672
26,471,700 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,438,839 ready_for_fw is high
3,439,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,573 >>> mbox cmd response: success
19,024,035 UART:
19,024,425 UART: Running Caliptra FMC ...
19,025,624 UART:
19,025,797 UART: [state] CFI Enabled
19,093,913 UART: [fht] FMC Alias Private Key: 7
20,858,038 UART: [art] Extend RT PCRs Done
20,859,261 UART: [art] Lock RT PCRs Done
20,860,723 UART: [art] Populate DV Done
20,866,183 UART: [fht] FMC Alias Private Key: 7
20,867,881 UART: [art] Derive CDI
20,868,696 UART: [art] Store in in slot 0x4
20,926,598 UART: [art] Derive Key Pair
20,927,594 UART: [art] Store priv key in slot 0x5
23,390,799 UART: [art] Derive Key Pair - Done
23,403,686 UART: [art] Signing Cert with AUTHO
23,404,997 UART: RITY.KEYID = 7
25,116,302 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,809 UART: [art] PUB.X = 482E6A32696517248706E9B8939A8B3A79A833E682B3A57E298F5FD8B193392A05C88FBBF08905202F3A9638CF15AC22
25,125,055 UART: [art] PUB.Y = B9FEE06E864B27D7EBE615AC60AEA125973ECA94D6CA2DE53766DA1403643D60D349F16C75C1E6EA7971002DA1D24154
25,132,302 UART: [art] SIG.R = FC93C8C9E9283C6A7BCF28F0206DF755AF671A19E61A3EC9C5C94465558FDF893B246F6C04222F10819DBF091B5B4739
25,139,692 UART: [art] SIG.S = C239FF6C4EF0A8022BAAC5C1A834AC2C484E68C35F9D8B4DD86A428B857142763109962BF140051ED93FCE28F5E03DFA
26,118,469 UART: Caliptra RT
26,119,159 UART: [state] CFI Enabled
26,282,115 UART: [rt] RT listening for mailbox commands...
26,286,108 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,330,904 UART: [rt]cmd =0x4c4d5356, len=1672
26,532,773 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,370 UART:
192,768 UART: Running Caliptra ROM ...
193,897 UART:
603,585 UART: [state] CFI Enabled
617,676 UART: [state] LifecycleState = Unprovisioned
620,042 UART: [state] DebugLocked = No
622,278 UART: [state] WD Timer not started. Device not locked for debugging
627,655 UART: [kat] SHA2-256
817,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,343 UART: [kat] ++
828,919 UART: [kat] sha1
839,434 UART: [kat] SHA2-256
842,450 UART: [kat] SHA2-384
848,506 UART: [kat] SHA2-512-ACC
851,078 UART: [kat] ECC-384
3,291,662 UART: [kat] HMAC-384Kdf
3,303,463 UART: [kat] LMS
3,835,233 UART: [kat] --
3,840,817 UART: [cold-reset] ++
3,843,388 UART: [fht] FHT @ 0x50003400
3,855,155 UART: [idev] ++
3,855,904 UART: [idev] CDI.KEYID = 6
3,856,785 UART: [idev] SUBJECT.KEYID = 7
3,858,027 UART: [idev] UDS.KEYID = 0
3,858,927 ready_for_fw is high
3,859,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,802 UART: [idev] Erasing UDS.KEYID = 0
6,339,373 UART: [idev] Sha1 KeyId Algorithm
6,361,561 UART: [idev] --
6,365,492 UART: [ldev] ++
6,366,220 UART: [ldev] CDI.KEYID = 6
6,367,095 UART: [ldev] SUBJECT.KEYID = 5
6,368,296 UART: [ldev] AUTHORITY.KEYID = 7
6,369,535 UART: [ldev] FE.KEYID = 1
6,380,688 UART: [ldev] Erasing FE.KEYID = 1
8,857,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,411 UART: [ldev] --
10,646,124 UART: [fwproc] Wait for Commands...
10,647,990 UART: [fwproc] Recv command 0x46574c44
10,650,289 UART: [fwproc] Recv'd Img size: 114448 bytes
14,097,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,833,401 >>> mbox cmd response: success
14,837,556 UART: [afmc] ++
14,838,279 UART: [afmc] CDI.KEYID = 6
14,839,409 UART: [afmc] SUBJECT.KEYID = 7
14,840,892 UART: [afmc] AUTHORITY.KEYID = 5
17,343,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,526 UART: [afmc] --
19,140,428 UART: [cold-reset] --
19,144,947 UART: [state] Locking Datavault
19,151,022 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,169 UART: [state] Locking ICCM
19,154,834 UART: [exit] Launching FMC @ 0x40000130
19,163,507 UART:
19,163,759 UART: Running Caliptra FMC ...
19,164,854 UART:
19,165,006 UART: [state] CFI Enabled
19,173,377 UART: [fht] FMC Alias Private Key: 7
20,930,562 UART: [art] Extend RT PCRs Done
20,931,779 UART: [art] Lock RT PCRs Done
20,933,239 UART: [art] Populate DV Done
20,938,704 UART: [fht] FMC Alias Private Key: 7
20,940,221 UART: [art] Derive CDI
20,940,950 UART: [art] Store in in slot 0x4
20,983,760 UART: [art] Derive Key Pair
20,984,800 UART: [art] Store priv key in slot 0x5
23,411,802 UART: [art] Derive Key Pair - Done
23,424,954 UART: [art] Signing Cert with AUTHO
23,426,258 UART: RITY.KEYID = 7
25,131,670 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,334 UART: [art] PUB.X = 5998BD4669520FBFF8F8E10239EE657A838A2C860C42398DA8A4E22AC72D07C43BB51FD2563FCC299E627C2BB45714B5
25,140,452 UART: [art] PUB.Y = 42068804375BB267DDD6E3AE2C37B0EA0102719D095394045DFE3BD30582FB2F5FCA792FB4069B8A964200F178135FF7
25,147,689 UART: [art] SIG.R = 3896F0376FDE2B60FC5085A9C4980D317DDF2EB2EA148629948475F0320ED1A2E6520A4AC60FEF39F8D6564B4DD01074
25,155,054 UART: [art] SIG.S = 6DB964E672C82E95D1CD9A705CA264DE58AC36BE6843E5438AA5357F88B373BB41C17645098D6DAA8BE51A6F1A63114B
26,134,249 UART: Caliptra RT
26,134,933 UART: [state] CFI Enabled
26,253,138 UART: [rt] RT listening for mailbox commands...
26,257,111 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,301,351 UART: [rt]cmd =0x4c4d5356, len=1672
26,503,100 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,760,233 ready_for_fw is high
3,760,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,176 >>> mbox cmd response: success
19,218,909 UART:
19,219,304 UART: Running Caliptra FMC ...
19,220,415 UART:
19,220,564 UART: [state] CFI Enabled
19,228,628 UART: [fht] FMC Alias Private Key: 7
20,985,645 UART: [art] Extend RT PCRs Done
20,986,870 UART: [art] Lock RT PCRs Done
20,988,409 UART: [art] Populate DV Done
20,993,597 UART: [fht] FMC Alias Private Key: 7
20,995,081 UART: [art] Derive CDI
20,995,817 UART: [art] Store in in slot 0x4
21,038,238 UART: [art] Derive Key Pair
21,039,235 UART: [art] Store priv key in slot 0x5
23,465,541 UART: [art] Derive Key Pair - Done
23,478,649 UART: [art] Signing Cert with AUTHO
23,479,975 UART: RITY.KEYID = 7
25,185,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,763 UART: [art] PUB.X = 0516E74199A428F6E1EDEAF148C644D0B33077EEEBBD2D62225AA28D2B37580DC7581BBBAB43CB0009A452AD1769BE19
25,194,048 UART: [art] PUB.Y = B8F07906A2D6587C82A40F1ED79E4EC74BD11CA9F02B05A407FCF347B752222C632FCEAB3C758E2B3EF7B67782474107
25,201,299 UART: [art] SIG.R = EAC3500DC8FF21A29DCB1E44645E2E594D339CBB4D67B712DD51EC65A9B2B739D79F76257944BAA86DB9094C4A843E94
25,208,705 UART: [art] SIG.S = 02C2599B71223BEFFCDFFB6F613E58DF8A179BC7864D815ACF457876495302F1EFE855CC1E765FEEF45497E3707424B9
26,186,862 UART: Caliptra RT
26,187,552 UART: [state] CFI Enabled
26,305,041 UART: [rt] RT listening for mailbox commands...
26,308,956 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,353,478 UART: [rt]cmd =0x4c4d5356, len=1672
26,555,421 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,392 UART: [kat] HMAC-384Kdf
906,918 UART: [kat] LMS
1,475,114 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,581 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 ready_for_fw is high
1,480,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,504,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,676 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,610 UART: [fwproc] Received command 0x46574c44
1,588,401 UART: [fwproc] Received Image of size 114448 bytes
2,889,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,624 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,135 >>> mbox cmd response: success
3,083,319 UART: [afmc] ++
3,083,487 UART: [afmc] CDI.KEYID = 6
3,083,849 UART: [afmc] SUBJECT.KEYID = 7
3,084,274 UART: [afmc] AUTHORITY.KEYID = 5
3,119,357 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,658 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,348 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,197 UART: [afmc] --
3,162,165 UART: [cold-reset] --
3,163,113 UART: [state] Locking Datavault
3,164,400 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,004 UART: [state] Locking ICCM
3,165,552 UART: [exit] Launching FMC @ 0x40000130
3,170,881 UART:
3,170,897 UART: Running Caliptra FMC ...
3,171,305 UART:
3,171,359 UART: [state] CFI Enabled
3,181,920 UART: [fht] FMC Alias Private Key: 7
3,290,135 UART: [art] Extend RT PCRs Done
3,290,563 UART: [art] Lock RT PCRs Done
3,291,991 UART: [art] Populate DV Done
3,300,254 UART: [fht] FMC Alias Private Key: 7
3,301,380 UART: [art] Derive CDI
3,301,660 UART: [art] Store in in slot 0x4
3,387,443 UART: [art] Derive Key Pair
3,387,803 UART: [art] Store priv key in slot 0x5
3,401,389 UART: [art] Derive Key Pair - Done
3,416,395 UART: [art] Signing Cert with AUTHO
3,416,875 UART: RITY.KEYID = 7
3,432,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,024 UART: [art] PUB.X = 23F067880096F8C9AC5307F4B2A47850CE6880AF0FC8256A43AA31BBDF58FEA6868C92F341748E12B1C6D4B2808996DE
3,439,770 UART: [art] PUB.Y = 2D04F78A0D7B294AFE8299FEAF50B44E583BEF3FEE907CED46E1620E60669D676B0F1F480931A71F30FF5D6894C1B98B
3,446,717 UART: [art] SIG.R = 20425A43EFFB0E1E4E2BD5D4611A73D7776C66869665C6036693FF22345A872511FD83A54003A4ABB216C7947E44BAAE
3,453,478 UART: [art] SIG.S = 5AC7319A3175B05A1AEF523A82059D06EC653E5CB4DEC428CEA3D16F2855F71698BB66F1B8FBC8F9DAA1BD1D63B235DB
3,477,181 UART: Caliptra RT
3,477,434 UART: [state] CFI Enabled
3,585,092 UART: [rt] RT listening for mailbox commands...
3,585,762 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,298 UART: [rt]cmd =0x4c4d5356, len=1672
3,878,822 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,517 ready_for_fw is high
1,363,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,781 >>> mbox cmd response: success
2,991,233 UART:
2,991,249 UART: Running Caliptra FMC ...
2,991,657 UART:
2,991,711 UART: [state] CFI Enabled
3,002,242 UART: [fht] FMC Alias Private Key: 7
3,109,539 UART: [art] Extend RT PCRs Done
3,109,967 UART: [art] Lock RT PCRs Done
3,111,691 UART: [art] Populate DV Done
3,119,856 UART: [fht] FMC Alias Private Key: 7
3,120,948 UART: [art] Derive CDI
3,121,228 UART: [art] Store in in slot 0x4
3,206,571 UART: [art] Derive Key Pair
3,206,931 UART: [art] Store priv key in slot 0x5
3,221,017 UART: [art] Derive Key Pair - Done
3,235,838 UART: [art] Signing Cert with AUTHO
3,236,318 UART: RITY.KEYID = 7
3,251,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,573 UART: [art] PUB.X = EF52143CC74F3105BD94D844EAD446CB5A4E06E6F9CF85EC9AEC0B61209CDFDBC62F9898F86A2ED2E602B09534D2321B
3,259,349 UART: [art] PUB.Y = 1BAA0B47F40251BE8B84F05A75135D57EB7584A57507480961D84C47EF514FBD07289E8E9A873515487A223AD58A4078
3,266,278 UART: [art] SIG.R = 47EBD9B8754E3DB4EF808EBD7FA455A7317D88A59E1313EC29128789D092943FE64BB5B0A17450493A26616370C0507F
3,273,046 UART: [art] SIG.S = 61CEDA60AC3258F8BFF0B854686D882066C7F6575F8CDEA4013FD47ADC8B1227FF2E53680CECB63DEB4B69952C239FDD
3,297,065 UART: Caliptra RT
3,297,318 UART: [state] CFI Enabled
3,405,812 UART: [rt] RT listening for mailbox commands...
3,406,482 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,016 UART: [rt]cmd =0x4c4d5356, len=1672
3,699,568 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,582 UART: [kat] SHA2-256
882,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,628 UART: [kat] ++
886,780 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,931 UART: [kat] SHA2-512-ACC
897,832 UART: [kat] ECC-384
903,405 UART: [kat] HMAC-384Kdf
908,039 UART: [kat] LMS
1,476,235 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 ready_for_fw is high
1,481,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,689 UART: [idev] Erasing UDS.KEYID = 0
1,505,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,100 UART: [ldev] ++
1,515,268 UART: [ldev] CDI.KEYID = 6
1,515,631 UART: [ldev] SUBJECT.KEYID = 5
1,516,057 UART: [ldev] AUTHORITY.KEYID = 7
1,516,520 UART: [ldev] FE.KEYID = 1
1,521,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,641 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,693 UART: [fwproc] Received command 0x46574c44
1,588,484 UART: [fwproc] Received Image of size 114448 bytes
2,886,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,188 >>> mbox cmd response: success
3,080,276 UART: [afmc] ++
3,080,444 UART: [afmc] CDI.KEYID = 6
3,080,806 UART: [afmc] SUBJECT.KEYID = 7
3,081,231 UART: [afmc] AUTHORITY.KEYID = 5
3,116,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,460 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,853 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,543 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,288 UART: [afmc] --
3,159,380 UART: [cold-reset] --
3,160,250 UART: [state] Locking Datavault
3,161,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,159 UART: [state] Locking ICCM
3,162,807 UART: [exit] Launching FMC @ 0x40000130
3,168,136 UART:
3,168,152 UART: Running Caliptra FMC ...
3,168,560 UART:
3,168,703 UART: [state] CFI Enabled
3,179,382 UART: [fht] FMC Alias Private Key: 7
3,286,859 UART: [art] Extend RT PCRs Done
3,287,287 UART: [art] Lock RT PCRs Done
3,288,861 UART: [art] Populate DV Done
3,297,246 UART: [fht] FMC Alias Private Key: 7
3,298,312 UART: [art] Derive CDI
3,298,592 UART: [art] Store in in slot 0x4
3,384,503 UART: [art] Derive Key Pair
3,384,863 UART: [art] Store priv key in slot 0x5
3,398,623 UART: [art] Derive Key Pair - Done
3,413,789 UART: [art] Signing Cert with AUTHO
3,414,269 UART: RITY.KEYID = 7
3,429,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,338 UART: [art] PUB.X = 9EEF2AC15F0132E22E8784B80B72F349D985A7EDE217EF4CEFF1EAB1BADB37DAFEF22A48E90F2366E59AD71E6B7524B5
3,437,123 UART: [art] PUB.Y = 31757146A7C7F43697A78E556ED9906C74B19948C69B2BE3D8CB1234FD1139CF6364E1DEF1B0704EDBA20BABC6B6C2C4
3,444,080 UART: [art] SIG.R = ADC5FF5FAB8167C8B565C167700DCEDFDD79C7FA5E34B1B5DA559267B215D090BFE2E72CEF5B2BEF5B28C9E78C9FE585
3,450,875 UART: [art] SIG.S = DF0E77B42FD592E59A9820B8A24E3B9BE7EAAED28A0E5F7C14A22CFE71B78F239563EE81B3278C823D98DDFB2376296C
3,474,840 UART: Caliptra RT
3,475,185 UART: [state] CFI Enabled
3,583,861 UART: [rt] RT listening for mailbox commands...
3,584,531 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,253 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,597 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,482 ready_for_fw is high
1,362,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,642 >>> mbox cmd response: success
2,992,030 UART:
2,992,046 UART: Running Caliptra FMC ...
2,992,454 UART:
2,992,597 UART: [state] CFI Enabled
3,003,510 UART: [fht] FMC Alias Private Key: 7
3,111,679 UART: [art] Extend RT PCRs Done
3,112,107 UART: [art] Lock RT PCRs Done
3,113,581 UART: [art] Populate DV Done
3,121,880 UART: [fht] FMC Alias Private Key: 7
3,122,968 UART: [art] Derive CDI
3,123,248 UART: [art] Store in in slot 0x4
3,208,821 UART: [art] Derive Key Pair
3,209,181 UART: [art] Store priv key in slot 0x5
3,222,121 UART: [art] Derive Key Pair - Done
3,236,790 UART: [art] Signing Cert with AUTHO
3,237,270 UART: RITY.KEYID = 7
3,252,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,159 UART: [art] PUB.X = 2D94C25EDBB7E26B63E2A6F993CACF63848D27D2F9E011F450824A2058247A15C0D07C313F8A58B303016C51C83BC3D0
3,259,927 UART: [art] PUB.Y = 49DEC5FF48573B0428874712F52BC4C51D6E0D50DB1CA52D1EAC7F745A81175885091B467C88F7A626E4315014430F78
3,266,861 UART: [art] SIG.R = F5849FD2B37D077B18E7EBCD0BAF161A1F08A1562D6C733D58D066E108131DDB36FC1E06B1B7CFF6C878CE38CD7FBA0F
3,273,635 UART: [art] SIG.S = 269A7201C4FC43712FCC0A51E12A125BA4FDE64D3BA3BF247CFF4DA2DC8A28CDB715FBD76D9659194E96F071D687BBA2
3,297,302 UART: Caliptra RT
3,297,647 UART: [state] CFI Enabled
3,406,564 UART: [rt] RT listening for mailbox commands...
3,407,234 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,746 UART: [rt]cmd =0x4c4d5356, len=1672
3,700,298 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
892,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,105 UART: [kat] ++
897,257 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
917,716 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,475 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,642 UART: [idev] ++
1,174,810 UART: [idev] CDI.KEYID = 6
1,175,170 UART: [idev] SUBJECT.KEYID = 7
1,175,594 UART: [idev] UDS.KEYID = 0
1,175,939 ready_for_fw is high
1,175,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,541 UART: [idev] Sha1 KeyId Algorithm
1,208,925 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,716 >>> mbox cmd response: success
2,776,788 UART: [afmc] ++
2,776,956 UART: [afmc] CDI.KEYID = 6
2,777,318 UART: [afmc] SUBJECT.KEYID = 7
2,777,743 UART: [afmc] AUTHORITY.KEYID = 5
2,813,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,345 UART: [afmc] --
2,856,351 UART: [cold-reset] --
2,857,149 UART: [state] Locking Datavault
2,858,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,782 UART: [state] Locking ICCM
2,859,432 UART: [exit] Launching FMC @ 0x40000130
2,864,761 UART:
2,864,777 UART: Running Caliptra FMC ...
2,865,185 UART:
2,865,239 UART: [state] CFI Enabled
2,875,910 UART: [fht] FMC Alias Private Key: 7
2,983,301 UART: [art] Extend RT PCRs Done
2,983,729 UART: [art] Lock RT PCRs Done
2,985,261 UART: [art] Populate DV Done
2,993,396 UART: [fht] FMC Alias Private Key: 7
2,994,364 UART: [art] Derive CDI
2,994,644 UART: [art] Store in in slot 0x4
3,080,441 UART: [art] Derive Key Pair
3,080,801 UART: [art] Store priv key in slot 0x5
3,093,605 UART: [art] Derive Key Pair - Done
3,108,302 UART: [art] Signing Cert with AUTHO
3,108,782 UART: RITY.KEYID = 7
3,124,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,113 UART: [art] PUB.X = A44872D3E69AC6045A137102ACB8C85D904DE173816DF616A21FBA244608FF3DEAE4171843B989DE96EA82F49A845E76
3,131,878 UART: [art] PUB.Y = 0D06434503F64E4AB1293311240CD4D36EFD60CFED4B806EB0D880AE93F457CA9F3F6FDF441F2CA97CD9BEB1035B5838
3,138,827 UART: [art] SIG.R = 54E6D54D3E9CBACAB424BA177CB8A670B47A87888E910E29666B44AB8485B34405772A146509C9B6CB048F763E6D299C
3,145,587 UART: [art] SIG.S = 317A46E1EDC8EBCBBB55398D7551BDE2C664A726FA913F18D147D8D718D254352071B86437538BC23C2EA8797A46D7EB
3,169,894 UART: Caliptra RT
3,170,147 UART: [state] CFI Enabled
3,277,586 UART: [rt] RT listening for mailbox commands...
3,278,256 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,928 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,396 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,819 ready_for_fw is high
1,060,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,673 >>> mbox cmd response: success
2,690,231 UART:
2,690,247 UART: Running Caliptra FMC ...
2,690,655 UART:
2,690,709 UART: [state] CFI Enabled
2,701,472 UART: [fht] FMC Alias Private Key: 7
2,809,591 UART: [art] Extend RT PCRs Done
2,810,019 UART: [art] Lock RT PCRs Done
2,811,565 UART: [art] Populate DV Done
2,819,732 UART: [fht] FMC Alias Private Key: 7
2,820,676 UART: [art] Derive CDI
2,820,956 UART: [art] Store in in slot 0x4
2,906,373 UART: [art] Derive Key Pair
2,906,733 UART: [art] Store priv key in slot 0x5
2,919,617 UART: [art] Derive Key Pair - Done
2,934,591 UART: [art] Signing Cert with AUTHO
2,935,071 UART: RITY.KEYID = 7
2,950,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,172 UART: [art] PUB.X = 4B514CE879475E74058260910F634E5A1F298945AFDA21038AC1BC72629F8EEB4BD9C2A50501DED0255D80C63CCD1510
2,957,929 UART: [art] PUB.Y = 9878F80F4D7C67B3F12BDE83FC45238EDE9690EC012AF6515DC64CC4F4B9D95D77AA05305E1E31CF537196520987EE5D
2,964,875 UART: [art] SIG.R = AAD60E5254E0B3B2E4168CE92A07987F6C4C4049803874B8AB489F49AEA66528C31367A98C098D3062BF53D2D9607807
2,971,629 UART: [art] SIG.S = BC271E89B93C56DBF33E84D35A2FB664C5B92736210A2A7EF009FAB91A9B2FC4300F1FB9C924066AE9B7BC5503BBCA09
2,995,388 UART: Caliptra RT
2,995,641 UART: [state] CFI Enabled
3,103,491 UART: [rt] RT listening for mailbox commands...
3,104,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,929 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,407 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,784 UART: [kat] SHA2-256
903,724 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,707 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,530 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,747 UART: [idev] ++
1,175,915 UART: [idev] CDI.KEYID = 6
1,176,275 UART: [idev] SUBJECT.KEYID = 7
1,176,699 UART: [idev] UDS.KEYID = 0
1,177,044 ready_for_fw is high
1,177,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,751 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,126 UART: [ldev] ++
1,211,294 UART: [ldev] CDI.KEYID = 6
1,211,657 UART: [ldev] SUBJECT.KEYID = 5
1,212,083 UART: [ldev] AUTHORITY.KEYID = 7
1,212,546 UART: [ldev] FE.KEYID = 1
1,217,902 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,572 UART: [ldev] --
1,283,889 UART: [fwproc] Wait for Commands...
1,284,481 UART: [fwproc] Recv command 0x46574c44
1,285,209 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,669 >>> mbox cmd response: success
2,778,929 UART: [afmc] ++
2,779,097 UART: [afmc] CDI.KEYID = 6
2,779,459 UART: [afmc] SUBJECT.KEYID = 7
2,779,884 UART: [afmc] AUTHORITY.KEYID = 5
2,814,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,709 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,428 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,278 UART: [afmc] --
2,858,166 UART: [cold-reset] --
2,858,894 UART: [state] Locking Datavault
2,860,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,657 UART: [state] Locking ICCM
2,861,089 UART: [exit] Launching FMC @ 0x40000130
2,866,418 UART:
2,866,434 UART: Running Caliptra FMC ...
2,866,842 UART:
2,866,985 UART: [state] CFI Enabled
2,877,844 UART: [fht] FMC Alias Private Key: 7
2,986,169 UART: [art] Extend RT PCRs Done
2,986,597 UART: [art] Lock RT PCRs Done
2,987,919 UART: [art] Populate DV Done
2,996,196 UART: [fht] FMC Alias Private Key: 7
2,997,190 UART: [art] Derive CDI
2,997,470 UART: [art] Store in in slot 0x4
3,083,177 UART: [art] Derive Key Pair
3,083,537 UART: [art] Store priv key in slot 0x5
3,096,543 UART: [art] Derive Key Pair - Done
3,111,549 UART: [art] Signing Cert with AUTHO
3,112,029 UART: RITY.KEYID = 7
3,127,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,382 UART: [art] PUB.X = 0A8CE09A0611A63F002CAEDC4F562D18F06D945317676423BA1354C64DE3D1F6447D4A44055C5B843CA585619EF535B4
3,135,121 UART: [art] PUB.Y = 255552AB10C272E3019F2C7B211B7109FE2D523A591F623C368EC039C044B000C8DAF227118C903374BA52937C9352B0
3,142,035 UART: [art] SIG.R = F5054BE7AC6B0C279894DB6DB70A1778D242D1753A0BEE4E2B63EDBD08C49F543481E49F6EA0DBB339CD82AF8711DF46
3,148,806 UART: [art] SIG.S = 07AB61AE034F8116211A6D50FFDC9A28FBC2488622DD932105C3CEE2B99BE31805C6A227E93A36530CD8DC363084A0B4
3,172,308 UART: Caliptra RT
3,172,653 UART: [state] CFI Enabled
3,280,140 UART: [rt] RT listening for mailbox commands...
3,280,810 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,514 UART: [rt]cmd =0x4c4d5356, len=1672
3,574,166 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,470 ready_for_fw is high
1,061,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,122 >>> mbox cmd response: success
2,690,092 UART:
2,690,108 UART: Running Caliptra FMC ...
2,690,516 UART:
2,690,659 UART: [state] CFI Enabled
2,701,348 UART: [fht] FMC Alias Private Key: 7
2,809,153 UART: [art] Extend RT PCRs Done
2,809,581 UART: [art] Lock RT PCRs Done
2,811,103 UART: [art] Populate DV Done
2,819,296 UART: [fht] FMC Alias Private Key: 7
2,820,276 UART: [art] Derive CDI
2,820,556 UART: [art] Store in in slot 0x4
2,906,713 UART: [art] Derive Key Pair
2,907,073 UART: [art] Store priv key in slot 0x5
2,920,489 UART: [art] Derive Key Pair - Done
2,935,470 UART: [art] Signing Cert with AUTHO
2,935,950 UART: RITY.KEYID = 7
2,951,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,883 UART: [art] PUB.X = 6368DE1F6374DBC7E3ECE8A90084FF18BD2E400F3CC0A0EC2E0464083D2A80A05E86BB1A7CCC3F55B0F3EFD39C0B08AD
2,958,640 UART: [art] PUB.Y = 31349E7FA25886DD6F79C2F27094A0C17064866F097BCA80947EE9359D3FE251BDB344D5FBF0539395370F6E6E36765C
2,965,582 UART: [art] SIG.R = A2B0F6835C97272B9D98F7EE3BD5D72E7B05107E82DA708136660DBD55C58AD31E228396EA400D9DAA80C5D91C26ED27
2,972,351 UART: [art] SIG.S = 69B5AD9CD7890C3BD2655E9F1740500E09A0BEFE88D28108D2CA38FB17E382B793486ACCE76BDA638E3638AF8AD69A95
2,995,922 UART: Caliptra RT
2,996,267 UART: [state] CFI Enabled
3,104,296 UART: [rt] RT listening for mailbox commands...
3,104,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,584 UART: [rt]cmd =0x4c4d5356, len=1672
3,398,028 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 ready_for_fw is high
1,174,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,242,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,745 UART: [fwproc] Recv command 0x46574c44
1,282,478 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,328 >>> mbox cmd response: success
2,774,547 UART: [afmc] ++
2,774,715 UART: [afmc] CDI.KEYID = 6
2,775,078 UART: [afmc] SUBJECT.KEYID = 7
2,775,504 UART: [afmc] AUTHORITY.KEYID = 5
2,811,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,572 UART: [afmc] --
2,854,698 UART: [cold-reset] --
2,855,592 UART: [state] Locking Datavault
2,856,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,481 UART: [state] Locking ICCM
2,857,953 UART: [exit] Launching FMC @ 0x40000130
2,863,282 UART:
2,863,298 UART: Running Caliptra FMC ...
2,863,706 UART:
2,863,760 UART: [state] CFI Enabled
2,874,247 UART: [fht] FMC Alias Private Key: 7
2,982,818 UART: [art] Extend RT PCRs Done
2,983,246 UART: [art] Lock RT PCRs Done
2,984,866 UART: [art] Populate DV Done
2,993,317 UART: [fht] FMC Alias Private Key: 7
2,994,261 UART: [art] Derive CDI
2,994,541 UART: [art] Store in in slot 0x4
3,080,354 UART: [art] Derive Key Pair
3,080,714 UART: [art] Store priv key in slot 0x5
3,093,932 UART: [art] Derive Key Pair - Done
3,108,726 UART: [art] Signing Cert with AUTHO
3,109,206 UART: RITY.KEYID = 7
3,124,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,357 UART: [art] PUB.X = F12A5F735FDC72484FBCDCC2AD95087849F493CBD1291B9C3724F43BF1E7360BF42D47F86FC461866BB54E8799BDB39B
3,132,133 UART: [art] PUB.Y = E9B0500AF93B250058B83D53C397E1A3CD3603B5A9A4F66E7BDC72323C83FA67D73997DBE645E81E166A45DF242B42AE
3,139,063 UART: [art] SIG.R = D8FD79EFF0B417E342E145F336D75FE417122DC7F94299FAD9B0C4B909E714A3CE2739E325340D97957D47B22920CBC1
3,145,831 UART: [art] SIG.S = FB778C41C0CE2C4ABF9283C8A4545C959B437A07140171CA22A5928D9FFA4AA6C25A08C0D0B0EC9BE71324B6D9A9E81F
3,169,995 UART: Caliptra RT
3,170,248 UART: [state] CFI Enabled
3,277,194 UART: [rt] RT listening for mailbox commands...
3,277,864 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,498 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,048 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,824 ready_for_fw is high
1,055,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,838 >>> mbox cmd response: success
2,683,796 UART:
2,683,812 UART: Running Caliptra FMC ...
2,684,220 UART:
2,684,274 UART: [state] CFI Enabled
2,695,021 UART: [fht] FMC Alias Private Key: 7
2,802,938 UART: [art] Extend RT PCRs Done
2,803,366 UART: [art] Lock RT PCRs Done
2,804,818 UART: [art] Populate DV Done
2,813,067 UART: [fht] FMC Alias Private Key: 7
2,814,037 UART: [art] Derive CDI
2,814,317 UART: [art] Store in in slot 0x4
2,900,118 UART: [art] Derive Key Pair
2,900,478 UART: [art] Store priv key in slot 0x5
2,914,162 UART: [art] Derive Key Pair - Done
2,928,864 UART: [art] Signing Cert with AUTHO
2,929,344 UART: RITY.KEYID = 7
2,944,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,229 UART: [art] PUB.X = C9F541AAC808AD1F2806623264F865A32D490DCA9548ACBB2881992589E4E9515B4A451F061447162C27F23BDC441B2F
2,951,985 UART: [art] PUB.Y = A1FD119744F32AA245BB8B002920E7899BD4B433854A66BAAC61D2F3FAF78E1ADA00258BD29338E91B8512A64D2314C8
2,958,897 UART: [art] SIG.R = 882E78B7EB47900558A4D4D7D55B61CCC2663B1B461FC10998269D508DC73A4B8CBF86A6B9558F80775A3F5B16C4637C
2,965,663 UART: [art] SIG.S = FAF5DAFAED06635932076149CBE8979FC1B22506DC4EC36B869870BC87B8822B2652A4283C91D87966FBB6C676292608
2,989,340 UART: Caliptra RT
2,989,593 UART: [state] CFI Enabled
3,097,053 UART: [rt] RT listening for mailbox commands...
3,097,723 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,429 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,805 UART: [kat] HMAC-384Kdf
921,505 UART: [kat] LMS
1,169,817 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,110 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,174,952 ready_for_fw is high
1,174,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x46574c44
1,282,627 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,621 >>> mbox cmd response: success
2,774,822 UART: [afmc] ++
2,774,990 UART: [afmc] CDI.KEYID = 6
2,775,353 UART: [afmc] SUBJECT.KEYID = 7
2,775,779 UART: [afmc] AUTHORITY.KEYID = 5
2,811,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,022 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,323 UART: [afmc] --
2,854,319 UART: [cold-reset] --
2,855,363 UART: [state] Locking Datavault
2,856,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,148 UART: [state] Locking ICCM
2,857,568 UART: [exit] Launching FMC @ 0x40000130
2,862,897 UART:
2,862,913 UART: Running Caliptra FMC ...
2,863,321 UART:
2,863,464 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,982,198 UART: [art] Extend RT PCRs Done
2,982,626 UART: [art] Lock RT PCRs Done
2,984,296 UART: [art] Populate DV Done
2,992,395 UART: [fht] FMC Alias Private Key: 7
2,993,471 UART: [art] Derive CDI
2,993,751 UART: [art] Store in in slot 0x4
3,079,208 UART: [art] Derive Key Pair
3,079,568 UART: [art] Store priv key in slot 0x5
3,093,034 UART: [art] Derive Key Pair - Done
3,107,656 UART: [art] Signing Cert with AUTHO
3,108,136 UART: RITY.KEYID = 7
3,123,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,227 UART: [art] PUB.X = 02D31A601C14A5198944B03639E2975445A53418CC9583CFDA62879B8DED06A77911C81A67738099C9C715360940D2A2
3,130,974 UART: [art] PUB.Y = EB84E76B78923542E4590994FD52B236741060BEF26E7AA2C2D7D23288EA0FB7D7407D277A6198DE8D61CFD203775A9D
3,137,917 UART: [art] SIG.R = F8B058B7CCCDEBE54128FF1C63872431F1231600B7056E9D726FF02B1169FE1DC41A1A2E857125278EAA20D7D0B8179A
3,144,668 UART: [art] SIG.S = A6A2FBE4F9401363F3C2FDF4D6C1364E8B4C6A30FF6D23E54F18A6B8DD9EDF3B005C2E2AB3F265692D638A0B41F449EF
3,167,864 UART: Caliptra RT
3,168,209 UART: [state] CFI Enabled
3,276,033 UART: [rt] RT listening for mailbox commands...
3,276,703 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,553 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,011 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 ready_for_fw is high
1,056,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,277 >>> mbox cmd response: success
2,686,779 UART:
2,686,795 UART: Running Caliptra FMC ...
2,687,203 UART:
2,687,346 UART: [state] CFI Enabled
2,697,775 UART: [fht] FMC Alias Private Key: 7
2,805,868 UART: [art] Extend RT PCRs Done
2,806,296 UART: [art] Lock RT PCRs Done
2,807,914 UART: [art] Populate DV Done
2,816,265 UART: [fht] FMC Alias Private Key: 7
2,817,439 UART: [art] Derive CDI
2,817,719 UART: [art] Store in in slot 0x4
2,903,724 UART: [art] Derive Key Pair
2,904,084 UART: [art] Store priv key in slot 0x5
2,916,836 UART: [art] Derive Key Pair - Done
2,931,685 UART: [art] Signing Cert with AUTHO
2,932,165 UART: RITY.KEYID = 7
2,947,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,914 UART: [art] PUB.X = A2DE3164F4CCD4D05CB58011EFED64AA8CE70A84FC0E0FF4344421BBD2A8B04D8FBEC4A40F4F4F89E1676B07CC564AD7
2,954,695 UART: [art] PUB.Y = 29549764F7B61A7D23C4F3AD5CF66AA1AF7AEDDE30612C22D52B3C67451C7A979EAC0D38CFFD3B67ACAC52328C2A12FE
2,961,664 UART: [art] SIG.R = CABA2595F8F5D2FC8408625A65CF998B399AB5612605078FEC0029CA7C6400CC1D192D8B00D734743107EBDD19E0AD3A
2,968,364 UART: [art] SIG.S = 75716D28696040197BB7B8F58497AD1789949B27241AFFB82471A27681EF338E5A93EA98E6F84F5F1E696142ABD3736D
2,992,161 UART: Caliptra RT
2,992,506 UART: [state] CFI Enabled
3,099,867 UART: [rt] RT listening for mailbox commands...
3,100,537 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,495 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,941 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,415 UART:
192,772 UART: Running Caliptra ROM ...
193,959 UART:
194,113 UART: [state] CFI Enabled
265,440 UART: [state] LifecycleState = Unprovisioned
267,365 UART: [state] DebugLocked = No
270,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,472 UART: [kat] SHA2-256
445,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,691 UART: [kat] ++
456,170 UART: [kat] sha1
467,612 UART: [kat] SHA2-256
470,274 UART: [kat] SHA2-384
476,022 UART: [kat] SHA2-512-ACC
478,342 UART: [kat] ECC-384
2,767,571 UART: [kat] HMAC-384Kdf
2,790,852 UART: [kat] LMS
3,980,442 UART: [kat] --
3,985,434 UART: [cold-reset] ++
3,986,937 UART: [fht] Storing FHT @ 0x50003400
3,996,945 UART: [idev] ++
3,997,548 UART: [idev] CDI.KEYID = 6
3,998,469 UART: [idev] SUBJECT.KEYID = 7
3,999,643 UART: [idev] UDS.KEYID = 0
4,000,679 ready_for_fw is high
4,000,882 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,144,256 UART: [idev] Erasing UDS.KEYID = 0
7,336,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,115 UART: [idev] --
7,362,327 UART: [ldev] ++
7,362,903 UART: [ldev] CDI.KEYID = 6
7,363,906 UART: [ldev] SUBJECT.KEYID = 5
7,365,010 UART: [ldev] AUTHORITY.KEYID = 7
7,366,353 UART: [ldev] FE.KEYID = 1
7,413,625 UART: [ldev] Erasing FE.KEYID = 1
10,745,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,008 UART: [ldev] --
13,107,231 UART: [fwproc] Waiting for Commands...
13,109,160 UART: [fwproc] Received command 0x46574c44
13,111,367 UART: [fwproc] Received Image of size 114124 bytes
17,169,639 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,307 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,516 >>> mbox cmd response: success
17,634,096 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,637,276 UART: [afmc] ++
17,637,928 UART: [afmc] CDI.KEYID = 6
17,638,817 UART: [afmc] SUBJECT.KEYID = 7
17,640,086 UART: [afmc] AUTHORITY.KEYID = 5
20,997,289 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,383 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,315,774 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,330,597 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,100 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,365,838 UART: [afmc] --
23,370,040 UART: [cold-reset] --
23,376,121 UART: [state] Locking Datavault
23,380,619 UART: [state] Locking PCR0, PCR1 and PCR31
23,382,391 UART: [state] Locking ICCM
23,385,143 UART: [exit] Launching FMC @ 0x40000130
23,393,537 UART:
23,393,772 UART: Running Caliptra FMC ...
23,394,873 UART:
23,395,032 UART: [state] CFI Enabled
23,459,370 UART: [fht] FMC Alias Private Key: 7
25,796,878 UART: [art] Extend RT PCRs Done
25,798,097 UART: [art] Lock RT PCRs Done
25,799,646 UART: [art] Populate DV Done
25,804,999 UART: [fht] FMC Alias Private Key: 7
25,806,748 UART: [art] Derive CDI
25,807,488 UART: [art] Store in in slot 0x4
25,868,170 UART: [art] Derive Key Pair
25,869,209 UART: [art] Store priv key in slot 0x5
29,162,040 UART: [art] Derive Key Pair - Done
29,175,171 UART: [art] Signing Cert with AUTHO
29,176,470 UART: RITY.KEYID = 7
31,464,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,882 UART: [art] PUB.X = 53AAFA8E90530115A7D104213502F677A2F7CB66B862A4BBABD23991D7BF8C8234AE4F05F2AFA2E5E6E06178E31C6FB9
31,473,142 UART: [art] PUB.Y = 39364A513589DCB1D921201A8A36A60B1C09447606743EEAAF3D5979528C9FC20FD98A31B8DD599E2930FFA9E4721196
31,480,376 UART: [art] SIG.R = 46D9DC8335178A69174D57C3CFF984B022CAAB3C0B49BD94505256FD16470F8DDA6BAF4FD2143CCA96C0D6951CCFD88B
31,487,767 UART: [art] SIG.S = B4383D26E1396A1BB89C55B27F6A7C5FAC6DCBF84BFF36C07EFA8084A268CBAFB1A97C3FE86D46C9D23A94B28FC14351
32,793,359 UART: Caliptra RT
32,794,066 UART: [state] CFI Enabled
32,954,736 UART: [rt] RT listening for mailbox commands...
32,968,421 >>> mbox cmd response: failed
32,968,811 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,998,408 UART: [rt]cmd =0x46505652, len=4
32,999,646 UART: [rt] FIPS Version
33,000,862 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,784,221 ready_for_fw is high
3,784,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,807 >>> mbox cmd response: success
17,857,385 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,549,816 UART:
23,550,182 UART: Running Caliptra FMC ...
23,551,321 UART:
23,551,476 UART: [state] CFI Enabled
23,619,702 UART: [fht] FMC Alias Private Key: 7
25,958,082 UART: [art] Extend RT PCRs Done
25,959,311 UART: [art] Lock RT PCRs Done
25,960,997 UART: [art] Populate DV Done
25,966,412 UART: [fht] FMC Alias Private Key: 7
25,968,005 UART: [art] Derive CDI
25,968,750 UART: [art] Store in in slot 0x4
26,029,007 UART: [art] Derive Key Pair
26,030,058 UART: [art] Store priv key in slot 0x5
29,322,612 UART: [art] Derive Key Pair - Done
29,335,656 UART: [art] Signing Cert with AUTHO
29,336,958 UART: RITY.KEYID = 7
31,625,137 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,643 UART: [art] PUB.X = 361F83694A88CD5B5A41EF2A22849C7F64BCCC97449B146DE9D14024BC4A3A0D060C3DFB5BD6FF35AD46E5507B77E8FF
31,633,950 UART: [art] PUB.Y = 5E7F9428B2629094178C1EEFADF07F9909D9A14D81211457B5838B319191BBDF99D02CDBB2D327B49A3274C2ACF47223
31,641,189 UART: [art] SIG.R = C6904EE193F242B41DF7109440FA489DA4779A935C6CF49F157F378A6645CA08AAC8E1EF71073BA33D0068DA72E24268
31,648,536 UART: [art] SIG.S = 60B082EBC2F06027555424CCAD99332651714A13A2DEA5BC029EC96CE7544CF8EE9E45B640F3781C874C67DD35A815CF
32,953,348 UART: Caliptra RT
32,954,052 UART: [state] CFI Enabled
33,116,770 UART: [rt] RT listening for mailbox commands...
33,130,619 >>> mbox cmd response: failed
33,131,002 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,160,817 UART: [rt]cmd =0x46505652, len=4
33,162,094 UART: [rt] FIPS Version
33,163,266 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,532 UART:
192,888 UART: Running Caliptra ROM ...
194,333 UART:
603,645 UART: [state] CFI Enabled
622,136 UART: [state] LifecycleState = Unprovisioned
624,086 UART: [state] DebugLocked = No
626,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,833 UART: [kat] SHA2-256
801,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,095 UART: [kat] ++
812,577 UART: [kat] sha1
824,084 UART: [kat] SHA2-256
826,812 UART: [kat] SHA2-384
832,889 UART: [kat] SHA2-512-ACC
835,244 UART: [kat] ECC-384
3,119,443 UART: [kat] HMAC-384Kdf
3,131,465 UART: [kat] LMS
4,321,512 UART: [kat] --
4,328,227 UART: [cold-reset] ++
4,330,883 UART: [fht] Storing FHT @ 0x50003400
4,341,434 UART: [idev] ++
4,342,064 UART: [idev] CDI.KEYID = 6
4,342,969 UART: [idev] SUBJECT.KEYID = 7
4,344,204 UART: [idev] UDS.KEYID = 0
4,345,278 ready_for_fw is high
4,345,494 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,882 UART: [idev] Erasing UDS.KEYID = 0
7,629,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,784 UART: [idev] --
7,654,679 UART: [ldev] ++
7,655,256 UART: [ldev] CDI.KEYID = 6
7,656,214 UART: [ldev] SUBJECT.KEYID = 5
7,657,358 UART: [ldev] AUTHORITY.KEYID = 7
7,658,687 UART: [ldev] FE.KEYID = 1
7,670,059 UART: [ldev] Erasing FE.KEYID = 1
10,957,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,988 UART: [ldev] --
13,317,262 UART: [fwproc] Waiting for Commands...
13,320,548 UART: [fwproc] Received command 0x46574c44
13,322,778 UART: [fwproc] Received Image of size 114124 bytes
17,383,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,058 >>> mbox cmd response: success
17,842,583 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,846,118 UART: [afmc] ++
17,846,699 UART: [afmc] CDI.KEYID = 6
17,847,635 UART: [afmc] SUBJECT.KEYID = 7
17,848,900 UART: [afmc] AUTHORITY.KEYID = 5
21,164,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,454 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,707 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,120 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,917 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,375 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,319 UART: [afmc] --
23,528,287 UART: [cold-reset] --
23,532,923 UART: [state] Locking Datavault
23,538,169 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,871 UART: [state] Locking ICCM
23,541,691 UART: [exit] Launching FMC @ 0x40000130
23,550,083 UART:
23,550,317 UART: Running Caliptra FMC ...
23,551,413 UART:
23,551,568 UART: [state] CFI Enabled
23,559,886 UART: [fht] FMC Alias Private Key: 7
25,889,855 UART: [art] Extend RT PCRs Done
25,891,069 UART: [art] Lock RT PCRs Done
25,892,851 UART: [art] Populate DV Done
25,898,472 UART: [fht] FMC Alias Private Key: 7
25,899,951 UART: [art] Derive CDI
25,900,703 UART: [art] Store in in slot 0x4
25,943,284 UART: [art] Derive Key Pair
25,944,301 UART: [art] Store priv key in slot 0x5
29,185,855 UART: [art] Derive Key Pair - Done
29,199,020 UART: [art] Signing Cert with AUTHO
29,200,333 UART: RITY.KEYID = 7
31,479,771 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,278 UART: [art] PUB.X = C9BF64AB3DA33E5EEEDDA0837B446CDBF3E19BCD1113011151269AA0FA84564416512DF11AA75108EA72C04FE2CB5355
31,488,536 UART: [art] PUB.Y = FE51F5F6CAF0C9F835E8A1991120EF723F483FE13ED56AD568BAAC8FAD6661BCF093CB0BAAD2D07AB9D5A80BB3947A45
31,495,766 UART: [art] SIG.R = 98213708B6089E67BBF4BFD5B3D63D6B88CCC9C9068D514FCD5EF740BEB898FFF54C8D184228E1138122BEF3E10F70CB
31,503,150 UART: [art] SIG.S = 3000950515CF9D991F4F50F21596C9DF23BB8FE3AEB55710B9828FC2A9BCD6EF6A87928C02FF7A76F1ABFCBEEBCCD3D9
32,808,085 UART: Caliptra RT
32,808,801 UART: [state] CFI Enabled
32,927,301 UART: [rt] RT listening for mailbox commands...
32,940,610 >>> mbox cmd response: failed
32,941,010 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,970,612 UART: [rt]cmd =0x46505652, len=4
32,971,899 UART: [rt] FIPS Version
32,973,124 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,132,363 ready_for_fw is high
4,132,772 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,781 >>> mbox cmd response: success
18,077,638 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,720,127 UART:
23,720,533 UART: Running Caliptra FMC ...
23,721,631 UART:
23,721,782 UART: [state] CFI Enabled
23,729,674 UART: [fht] FMC Alias Private Key: 7
26,060,190 UART: [art] Extend RT PCRs Done
26,061,426 UART: [art] Lock RT PCRs Done
26,062,676 UART: [art] Populate DV Done
26,068,172 UART: [fht] FMC Alias Private Key: 7
26,069,724 UART: [art] Derive CDI
26,070,546 UART: [art] Store in in slot 0x4
26,112,998 UART: [art] Derive Key Pair
26,114,043 UART: [art] Store priv key in slot 0x5
29,356,322 UART: [art] Derive Key Pair - Done
29,369,428 UART: [art] Signing Cert with AUTHO
29,370,736 UART: RITY.KEYID = 7
31,649,981 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,488 UART: [art] PUB.X = F8B623D24AA88D4B38C428D1751B5EC34EB4CD8D6605274D569412913E7084B6C4DECB05F99B1BF10C32BF1836CC4782
31,658,736 UART: [art] PUB.Y = C8B5DBDBAF3EA8BDBF2A2DF038E7061765FEB455DBBC3A1C6FE7B8E336E99F11660ADED4068B8F1DC89CCC2428D04F89
31,666,023 UART: [art] SIG.R = 6B337C1D9FB2C9418D0BA65D6C217B0B3A3FBAF461DDEE23670AEEF521CC7BE9B115F3C1E3821CC66C93E9634275B6D7
31,673,410 UART: [art] SIG.S = 8767558E63875B6A7517DFCFCC1650408257D1851BA422D10D5E6EE5FDB88E6F39BAA7726FD6FC038B1A3BD015FF1BA7
32,979,049 UART: Caliptra RT
32,979,769 UART: [state] CFI Enabled
33,097,399 UART: [rt] RT listening for mailbox commands...
33,110,942 >>> mbox cmd response: failed
33,111,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,141,114 UART: [rt]cmd =0x46505652, len=4
33,142,565 UART: [rt] FIPS Version
33,143,512 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,002 UART:
192,390 UART: Running Caliptra ROM ...
193,535 UART:
193,687 UART: [state] CFI Enabled
266,746 UART: [state] LifecycleState = Unprovisioned
268,666 UART: [state] DebugLocked = No
270,357 UART: [state] WD Timer not started. Device not locked for debugging
274,339 UART: [kat] SHA2-256
453,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,030 UART: [kat] ++
465,578 UART: [kat] sha1
475,892 UART: [kat] SHA2-256
478,895 UART: [kat] SHA2-384
484,386 UART: [kat] SHA2-512-ACC
487,318 UART: [kat] ECC-384
2,946,786 UART: [kat] HMAC-384Kdf
2,971,252 UART: [kat] LMS
3,500,693 UART: [kat] --
3,505,108 UART: [cold-reset] ++
3,506,187 UART: [fht] FHT @ 0x50003400
3,516,873 UART: [idev] ++
3,517,434 UART: [idev] CDI.KEYID = 6
3,518,340 UART: [idev] SUBJECT.KEYID = 7
3,519,604 UART: [idev] UDS.KEYID = 0
3,520,530 ready_for_fw is high
3,520,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,646 UART: [idev] Erasing UDS.KEYID = 0
6,023,583 UART: [idev] Sha1 KeyId Algorithm
6,046,168 UART: [idev] --
6,050,490 UART: [ldev] ++
6,051,062 UART: [ldev] CDI.KEYID = 6
6,051,976 UART: [ldev] SUBJECT.KEYID = 5
6,053,133 UART: [ldev] AUTHORITY.KEYID = 7
6,054,419 UART: [ldev] FE.KEYID = 1
6,099,044 UART: [ldev] Erasing FE.KEYID = 1
8,599,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,051 UART: [ldev] --
10,394,044 UART: [fwproc] Wait for Commands...
10,395,542 UART: [fwproc] Recv command 0x46574c44
10,397,632 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,258,038 >>> mbox cmd response: success
14,258,571 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,263,186 UART: [afmc] ++
14,263,787 UART: [afmc] CDI.KEYID = 6
14,264,676 UART: [afmc] SUBJECT.KEYID = 7
14,265,839 UART: [afmc] AUTHORITY.KEYID = 5
16,804,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,498 UART: [afmc] --
18,605,658 UART: [cold-reset] --
18,607,794 UART: [state] Locking Datavault
18,613,849 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,486 UART: [state] Locking ICCM
18,617,775 UART: [exit] Launching FMC @ 0x40000130
18,626,221 UART:
18,626,462 UART: Running Caliptra FMC ...
18,627,563 UART:
18,627,724 UART: [state] CFI Enabled
18,686,749 UART: [fht] FMC Alias Private Key: 7
20,451,004 UART: [art] Extend RT PCRs Done
20,452,247 UART: [art] Lock RT PCRs Done
20,453,874 UART: [art] Populate DV Done
20,459,232 UART: [fht] FMC Alias Private Key: 7
20,460,767 UART: [art] Derive CDI
20,461,575 UART: [art] Store in in slot 0x4
20,519,076 UART: [art] Derive Key Pair
20,520,113 UART: [art] Store priv key in slot 0x5
22,983,273 UART: [art] Derive Key Pair - Done
22,996,429 UART: [art] Signing Cert with AUTHO
22,997,731 UART: RITY.KEYID = 7
24,707,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,423 UART: [art] PUB.X = 6F1161B788ED5E6E6DC895D1C35C3EDA4D7D7DFF1C28779194C2CD39FF3CB78FF5A6AA8FC46B3784934DB362990A1E10
24,716,718 UART: [art] PUB.Y = E6E38EF6D74762DA949F9FFDF6001050C25BEE4744A1B0BF8FB936DD9178356F080D8DE7BFC363B185141603E16D9CCB
24,723,997 UART: [art] SIG.R = 3F37A3E80EA4DC3ED6A68A3F36B353449296A73102555A1B3210748293C743F42FBDA4046BD3AACEBBCAF2A11BC7DD9F
24,731,423 UART: [art] SIG.S = B47740EC5422DC28B081E1E4F910C4EE11C2CACE96019622F5E97CC27737D0B1FC820CCF4DFA353DCE7B56FC902841FA
25,710,446 UART: Caliptra RT
25,711,174 UART: [state] CFI Enabled
25,875,952 UART: [rt] RT listening for mailbox commands...
25,889,470 >>> mbox cmd response: failed
25,889,875 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,919,696 UART: [rt]cmd =0x46505652, len=4
25,920,996 UART: [rt] FIPS Version
25,922,049 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,362,208 ready_for_fw is high
3,362,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,361 >>> mbox cmd response: success
14,063,960 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,343,166 UART:
18,343,544 UART: Running Caliptra FMC ...
18,344,742 UART:
18,344,911 UART: [state] CFI Enabled
18,413,834 UART: [fht] FMC Alias Private Key: 7
20,177,392 UART: [art] Extend RT PCRs Done
20,178,617 UART: [art] Lock RT PCRs Done
20,180,265 UART: [art] Populate DV Done
20,185,631 UART: [fht] FMC Alias Private Key: 7
20,187,119 UART: [art] Derive CDI
20,187,883 UART: [art] Store in in slot 0x4
20,246,251 UART: [art] Derive Key Pair
20,247,257 UART: [art] Store priv key in slot 0x5
22,710,184 UART: [art] Derive Key Pair - Done
22,722,816 UART: [art] Signing Cert with AUTHO
22,724,129 UART: RITY.KEYID = 7
24,436,519 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,019 UART: [art] PUB.X = 7D0EF6C470D660CC74D73F2CDD0C578DFFD4A1348191B0A568A4224D1FB0D333C9690101ABC800BA2E3088C987F1A480
24,445,276 UART: [art] PUB.Y = B1B4B3EFFA0EAB23D821B07FE030263BC4C8652765EF18B6E0A2D9DD6AE78D5519A7FD26F0515851251089F70CBD7963
24,452,551 UART: [art] SIG.R = 63BECA9E337F4842F255133FEFC22B9F2D4C597F83E72C6B74774A26B8743F1FCEAC44AC6F15EC7381926CAE55B3A842
24,459,955 UART: [art] SIG.S = B8E5FA053F33A7C6E6139DB3E1F3FB2C8F6F253A30D4FCDBC0CB93F599744B808E9A9000758C17CE2D4E2376ACD9A23D
25,438,592 UART: Caliptra RT
25,439,290 UART: [state] CFI Enabled
25,604,837 UART: [rt] RT listening for mailbox commands...
25,618,624 >>> mbox cmd response: failed
25,619,038 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,648,645 UART: [rt]cmd =0x46505652, len=4
25,649,889 UART: [rt] FIPS Version
25,651,153 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,546 UART:
192,908 UART: Running Caliptra ROM ...
194,093 UART:
603,453 UART: [state] CFI Enabled
617,684 UART: [state] LifecycleState = Unprovisioned
619,570 UART: [state] DebugLocked = No
621,937 UART: [state] WD Timer not started. Device not locked for debugging
626,249 UART: [kat] SHA2-256
805,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,003 UART: [kat] ++
817,454 UART: [kat] sha1
828,101 UART: [kat] SHA2-256
831,093 UART: [kat] SHA2-384
836,295 UART: [kat] SHA2-512-ACC
839,232 UART: [kat] ECC-384
3,283,616 UART: [kat] HMAC-384Kdf
3,297,334 UART: [kat] LMS
3,826,809 UART: [kat] --
3,832,587 UART: [cold-reset] ++
3,833,909 UART: [fht] FHT @ 0x50003400
3,844,743 UART: [idev] ++
3,845,316 UART: [idev] CDI.KEYID = 6
3,846,226 UART: [idev] SUBJECT.KEYID = 7
3,847,390 UART: [idev] UDS.KEYID = 0
3,848,433 ready_for_fw is high
3,848,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,692 UART: [idev] Erasing UDS.KEYID = 0
6,318,257 UART: [idev] Sha1 KeyId Algorithm
6,341,214 UART: [idev] --
6,343,524 UART: [ldev] ++
6,344,085 UART: [ldev] CDI.KEYID = 6
6,345,042 UART: [ldev] SUBJECT.KEYID = 5
6,346,190 UART: [ldev] AUTHORITY.KEYID = 7
6,347,467 UART: [ldev] FE.KEYID = 1
6,358,426 UART: [ldev] Erasing FE.KEYID = 1
8,831,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,392 UART: [ldev] --
10,620,427 UART: [fwproc] Wait for Commands...
10,622,939 UART: [fwproc] Recv command 0x46574c44
10,624,962 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,188 >>> mbox cmd response: success
14,487,722 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,492,003 UART: [afmc] ++
14,492,583 UART: [afmc] CDI.KEYID = 6
14,493,483 UART: [afmc] SUBJECT.KEYID = 7
14,494,574 UART: [afmc] AUTHORITY.KEYID = 5
16,993,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,836 UART: [afmc] --
18,789,454 UART: [cold-reset] --
18,793,299 UART: [state] Locking Datavault
18,799,032 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,726 UART: [state] Locking ICCM
18,802,704 UART: [exit] Launching FMC @ 0x40000130
18,811,095 UART:
18,811,337 UART: Running Caliptra FMC ...
18,812,434 UART:
18,812,584 UART: [state] CFI Enabled
18,820,425 UART: [fht] FMC Alias Private Key: 7
20,576,860 UART: [art] Extend RT PCRs Done
20,578,073 UART: [art] Lock RT PCRs Done
20,580,123 UART: [art] Populate DV Done
20,585,844 UART: [fht] FMC Alias Private Key: 7
20,587,479 UART: [art] Derive CDI
20,588,209 UART: [art] Store in in slot 0x4
20,631,071 UART: [art] Derive Key Pair
20,632,104 UART: [art] Store priv key in slot 0x5
23,059,158 UART: [art] Derive Key Pair - Done
23,071,831 UART: [art] Signing Cert with AUTHO
23,073,133 UART: RITY.KEYID = 7
24,778,497 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,995 UART: [art] PUB.X = C33EE6F71087745DC05D04FEE89DE94E0F967EF697B747BD1B32696F7A17C3AE23663D6B56CBB96A6386BD67598AD88A
24,787,294 UART: [art] PUB.Y = EB6C789C62EA1953F90982B78ABA5D941D9FF56E136C3583EF6E0C0E581F457E425B6738285A75F5B3A4D54AC150FFDD
24,794,531 UART: [art] SIG.R = F51B0FAC98DEA6A4553F88AE2039B673E1424F04EF92BD6B4A7640417D1B2C9CF98C9848D596698322ABD95E7FBCAC09
24,801,947 UART: [art] SIG.S = 8E96ECC73D442DAAD03607C592F9CAB1CB593C1E50689C75D4BB54E6C6F7ECD4FBCCF1674C823596B96D163B6E04A865
25,780,665 UART: Caliptra RT
25,781,365 UART: [state] CFI Enabled
25,898,634 UART: [rt] RT listening for mailbox commands...
25,912,148 >>> mbox cmd response: failed
25,912,557 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,941,995 UART: [rt]cmd =0x46505652, len=4
25,943,287 UART: [rt] FIPS Version
25,944,383 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,704,088 ready_for_fw is high
3,704,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,287,121 >>> mbox cmd response: success
14,287,927 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,538,577 UART:
18,538,964 UART: Running Caliptra FMC ...
18,540,124 UART:
18,540,276 UART: [state] CFI Enabled
18,548,163 UART: [fht] FMC Alias Private Key: 7
20,305,368 UART: [art] Extend RT PCRs Done
20,306,595 UART: [art] Lock RT PCRs Done
20,308,245 UART: [art] Populate DV Done
20,313,655 UART: [fht] FMC Alias Private Key: 7
20,315,353 UART: [art] Derive CDI
20,316,161 UART: [art] Store in in slot 0x4
20,358,928 UART: [art] Derive Key Pair
20,359,968 UART: [art] Store priv key in slot 0x5
22,786,826 UART: [art] Derive Key Pair - Done
22,800,209 UART: [art] Signing Cert with AUTHO
22,801,506 UART: RITY.KEYID = 7
24,507,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,522 UART: [art] PUB.X = A8C817D4893F1C8B1966D87008125E816A4BD87A9630535E97F7093A38AB2C28F9A54C08D2C2743EA71AC4D8F5BE7BED
24,515,830 UART: [art] PUB.Y = 9E399D3F918B0DBF12E192E0C8F8195525C21472DCF374B039C910357E7E3B2438C58AF0467CDD2DFC6D665226D1482A
24,523,089 UART: [art] SIG.R = D434D2B92E7108B9E7035DAE1A6426BD264A478FF978E6B9FD7368573763A62F2E26011CF6E1CF326C5661DB0D37444D
24,530,425 UART: [art] SIG.S = 69B3282E76E5273C4724990A40A6D06C54B37D64A13551443CDD42BD47F4F062AD5792CB843D780BD17FB02347506A63
25,509,031 UART: Caliptra RT
25,509,737 UART: [state] CFI Enabled
25,627,128 UART: [rt] RT listening for mailbox commands...
25,640,864 >>> mbox cmd response: failed
25,641,263 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,670,914 UART: [rt]cmd =0x46505652, len=4
25,672,204 UART: [rt] FIPS Version
25,673,408 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
193,109 UART:
193,465 UART: Running Caliptra ROM ...
194,645 UART:
194,823 UART: [state] CFI Enabled
264,787 UART: [state] LifecycleState = Unprovisioned
267,182 UART: [state] DebugLocked = No
268,923 UART: [state] WD Timer not started. Device not locked for debugging
273,168 UART: [kat] SHA2-256
463,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,848 UART: [kat] ++
474,299 UART: [kat] sha1
485,912 UART: [kat] SHA2-256
488,882 UART: [kat] SHA2-384
494,091 UART: [kat] SHA2-512-ACC
496,743 UART: [kat] ECC-384
2,949,015 UART: [kat] HMAC-384Kdf
2,973,074 UART: [kat] LMS
3,504,807 UART: [kat] --
3,510,363 UART: [cold-reset] ++
3,511,532 UART: [fht] FHT @ 0x50003400
3,523,170 UART: [idev] ++
3,523,839 UART: [idev] CDI.KEYID = 6
3,524,832 UART: [idev] SUBJECT.KEYID = 7
3,526,011 UART: [idev] UDS.KEYID = 0
3,526,940 ready_for_fw is high
3,527,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,009 UART: [idev] Erasing UDS.KEYID = 0
6,028,546 UART: [idev] Sha1 KeyId Algorithm
6,052,104 UART: [idev] --
6,057,825 UART: [ldev] ++
6,058,505 UART: [ldev] CDI.KEYID = 6
6,059,388 UART: [ldev] SUBJECT.KEYID = 5
6,060,602 UART: [ldev] AUTHORITY.KEYID = 7
6,061,837 UART: [ldev] FE.KEYID = 1
6,100,232 UART: [ldev] Erasing FE.KEYID = 1
8,607,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,554 UART: [ldev] --
10,415,902 UART: [fwproc] Wait for Commands...
10,418,369 UART: [fwproc] Recv command 0x46574c44
10,420,670 UART: [fwproc] Recv'd Img size: 114448 bytes
13,875,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,697 >>> mbox cmd response: success
14,609,212 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,612,906 UART: [afmc] ++
14,613,601 UART: [afmc] CDI.KEYID = 6
14,614,780 UART: [afmc] SUBJECT.KEYID = 7
14,616,270 UART: [afmc] AUTHORITY.KEYID = 5
17,150,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,022 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,379 UART: [afmc] --
18,949,671 UART: [cold-reset] --
18,954,666 UART: [state] Locking Datavault
18,960,939 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,174 UART: [state] Locking ICCM
18,965,774 UART: [exit] Launching FMC @ 0x40000130
18,974,456 UART:
18,974,694 UART: Running Caliptra FMC ...
18,975,817 UART:
18,975,977 UART: [state] CFI Enabled
19,032,785 UART: [fht] FMC Alias Private Key: 7
20,796,130 UART: [art] Extend RT PCRs Done
20,797,348 UART: [art] Lock RT PCRs Done
20,799,241 UART: [art] Populate DV Done
20,804,610 UART: [fht] FMC Alias Private Key: 7
20,806,297 UART: [art] Derive CDI
20,807,119 UART: [art] Store in in slot 0x4
20,865,482 UART: [art] Derive Key Pair
20,866,485 UART: [art] Store priv key in slot 0x5
23,330,147 UART: [art] Derive Key Pair - Done
23,343,133 UART: [art] Signing Cert with AUTHO
23,344,427 UART: RITY.KEYID = 7
25,055,820 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,325 UART: [art] PUB.X = 595044A3D83E245B97645067336500AEA8AF0F0E88AA869D8D3683774CBAD48FD909A0315C6833C9BEE3D9807365D285
25,064,592 UART: [art] PUB.Y = 27ABC5B12F8EB9BC91E23F99BF0D4412B027F48940F905EA649AAF525F9F66B0CAFF200B257F53FEDC39B909511E3764
25,071,824 UART: [art] SIG.R = EA05F676E7FFBBFC1D86A6CB2A362BB708F5ACC8529B6970DA66B52AC6EAE75A9172F7588E93DC4362ED0FF626F18660
25,079,296 UART: [art] SIG.S = C8B9F70A48B2EE98FE2D93B7CD7F3994F2334FBCEF770613947A2F8109B322D51915AE3FBC690C657603243D32CB0F96
26,058,421 UART: Caliptra RT
26,059,108 UART: [state] CFI Enabled
26,223,664 UART: [rt] RT listening for mailbox commands...
26,237,238 >>> mbox cmd response: failed
26,237,616 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,267,228 UART: [rt]cmd =0x46505652, len=4
26,268,559 UART: [rt] FIPS Version
26,269,560 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,418,608 ready_for_fw is high
3,419,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,712,764 >>> mbox cmd response: success
14,713,572 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,009,408 UART:
19,009,805 UART: Running Caliptra FMC ...
19,010,948 UART:
19,011,116 UART: [state] CFI Enabled
19,075,250 UART: [fht] FMC Alias Private Key: 7
20,839,043 UART: [art] Extend RT PCRs Done
20,840,267 UART: [art] Lock RT PCRs Done
20,842,024 UART: [art] Populate DV Done
20,847,332 UART: [fht] FMC Alias Private Key: 7
20,848,924 UART: [art] Derive CDI
20,849,740 UART: [art] Store in in slot 0x4
20,907,903 UART: [art] Derive Key Pair
20,908,935 UART: [art] Store priv key in slot 0x5
23,371,987 UART: [art] Derive Key Pair - Done
23,385,252 UART: [art] Signing Cert with AUTHO
23,386,584 UART: RITY.KEYID = 7
25,097,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,313 UART: [art] PUB.X = 8328E8E3A77C7FC102BC5E2596A30CA8F5449CDEB7B0C6F32BA0C38243FCC09E8E516E301BDB4B8F6744AE8C0F768E13
25,106,613 UART: [art] PUB.Y = 2E3CFB24E429597FB47D1C5A81F256C7EE653E1B36DA42F609099FAC489456B92296BD4FF71F82903EA1FE37545ABF6B
25,113,861 UART: [art] SIG.R = CD90A8E57244F848E6A6D2FB0EF146F41A9D47231670447855BB1D4AEA9764D9C3D0CBFD5E8EBCBB903F3D78642AC72B
25,121,246 UART: [art] SIG.S = 715CBF442A331413519AE9A7501583896D54790319324A4727A3E9BE482109BC2E39ABE82606900773310E36AD8D0441
26,100,077 UART: Caliptra RT
26,100,770 UART: [state] CFI Enabled
26,267,201 UART: [rt] RT listening for mailbox commands...
26,280,995 >>> mbox cmd response: failed
26,281,390 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,310,772 UART: [rt]cmd =0x46505652, len=4
26,312,067 UART: [rt] FIPS Version
26,313,228 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,408 UART:
192,782 UART: Running Caliptra ROM ...
193,875 UART:
603,545 UART: [state] CFI Enabled
616,153 UART: [state] LifecycleState = Unprovisioned
618,233 UART: [state] DebugLocked = No
620,569 UART: [state] WD Timer not started. Device not locked for debugging
624,375 UART: [kat] SHA2-256
814,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,014 UART: [kat] ++
825,533 UART: [kat] sha1
836,117 UART: [kat] SHA2-256
839,188 UART: [kat] SHA2-384
844,530 UART: [kat] SHA2-512-ACC
847,173 UART: [kat] ECC-384
3,289,732 UART: [kat] HMAC-384Kdf
3,302,351 UART: [kat] LMS
3,834,158 UART: [kat] --
3,838,861 UART: [cold-reset] ++
3,840,935 UART: [fht] FHT @ 0x50003400
3,852,512 UART: [idev] ++
3,853,181 UART: [idev] CDI.KEYID = 6
3,854,138 UART: [idev] SUBJECT.KEYID = 7
3,855,373 UART: [idev] UDS.KEYID = 0
3,856,555 ready_for_fw is high
3,856,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,404 UART: [idev] Erasing UDS.KEYID = 0
6,336,309 UART: [idev] Sha1 KeyId Algorithm
6,357,232 UART: [idev] --
6,362,414 UART: [ldev] ++
6,363,085 UART: [ldev] CDI.KEYID = 6
6,364,022 UART: [ldev] SUBJECT.KEYID = 5
6,365,223 UART: [ldev] AUTHORITY.KEYID = 7
6,366,342 UART: [ldev] FE.KEYID = 1
6,379,941 UART: [ldev] Erasing FE.KEYID = 1
8,862,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,630 UART: [ldev] --
10,654,196 UART: [fwproc] Wait for Commands...
10,656,350 UART: [fwproc] Recv command 0x46574c44
10,658,655 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,848,003 >>> mbox cmd response: success
14,848,504 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,851,764 UART: [afmc] ++
14,852,452 UART: [afmc] CDI.KEYID = 6
14,853,605 UART: [afmc] SUBJECT.KEYID = 7
14,855,156 UART: [afmc] AUTHORITY.KEYID = 5
17,360,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,707 UART: [afmc] --
19,155,626 UART: [cold-reset] --
19,159,430 UART: [state] Locking Datavault
19,165,434 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,570 UART: [state] Locking ICCM
19,170,098 UART: [exit] Launching FMC @ 0x40000130
19,178,765 UART:
19,178,995 UART: Running Caliptra FMC ...
19,180,086 UART:
19,180,260 UART: [state] CFI Enabled
19,188,679 UART: [fht] FMC Alias Private Key: 7
20,946,286 UART: [art] Extend RT PCRs Done
20,947,504 UART: [art] Lock RT PCRs Done
20,949,179 UART: [art] Populate DV Done
20,954,422 UART: [fht] FMC Alias Private Key: 7
20,956,111 UART: [art] Derive CDI
20,956,840 UART: [art] Store in in slot 0x4
20,999,265 UART: [art] Derive Key Pair
21,000,302 UART: [art] Store priv key in slot 0x5
23,426,856 UART: [art] Derive Key Pair - Done
23,440,060 UART: [art] Signing Cert with AUTHO
23,441,350 UART: RITY.KEYID = 7
25,146,820 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,325 UART: [art] PUB.X = 1C484926E9C8C0847FE6B13AABDF29CE378BF98C52895F2A024AB28CDEBD311FB2337D20D114431FAFD26E5C72F9CCC7
25,155,606 UART: [art] PUB.Y = D671C2C060982811AEC46A5C972CE5805CED8C5B053488AAA5960AFF0BFEB193A9FB3A01938E9419E79466A490318697
25,162,902 UART: [art] SIG.R = 0158F31B40C4420297B5405EFC6842A5157D001A08D9FD24FDB8E2A5C0A477E537C6537DC7C4458FFBEBA6712E60027A
25,170,240 UART: [art] SIG.S = E671D50FA7930696B527D153317265C43B61D7CB0A7D66C9E73262BE113303A7388BBF0B65FF83EF77965CDACC784470
26,149,491 UART: Caliptra RT
26,150,204 UART: [state] CFI Enabled
26,267,382 UART: [rt] RT listening for mailbox commands...
26,281,281 >>> mbox cmd response: failed
26,281,669 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,311,103 UART: [rt]cmd =0x46505652, len=4
26,312,399 UART: [rt] FIPS Version
26,313,601 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,758,588 ready_for_fw is high
3,759,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,122 >>> mbox cmd response: success
14,968,836 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,213,748 UART:
19,214,165 UART: Running Caliptra FMC ...
19,215,291 UART:
19,215,447 UART: [state] CFI Enabled
19,223,512 UART: [fht] FMC Alias Private Key: 7
20,979,345 UART: [art] Extend RT PCRs Done
20,980,699 UART: [art] Lock RT PCRs Done
20,982,219 UART: [art] Populate DV Done
20,987,412 UART: [fht] FMC Alias Private Key: 7
20,988,948 UART: [art] Derive CDI
20,989,763 UART: [art] Store in in slot 0x4
21,032,457 UART: [art] Derive Key Pair
21,033,457 UART: [art] Store priv key in slot 0x5
23,459,673 UART: [art] Derive Key Pair - Done
23,472,420 UART: [art] Signing Cert with AUTHO
23,473,731 UART: RITY.KEYID = 7
25,179,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,625 UART: [art] PUB.X = 04E48FD1F177CD78B701523B5B0F77FD7CBCA6DAEE1B54933CE7CA0D787D4135EC68FF642F7F18CE9C53EE80F07A11B3
25,187,869 UART: [art] PUB.Y = 60EE545D3C300E4DF16D1F7A582E100EFC5B0A644699578523D64F083ABD339C6E44D729A7CF376B417BCC3163488530
25,195,111 UART: [art] SIG.R = B7006544D444EF3817841AD2C104336A853D8F81DBC90DC30356C11A6F034A38188CE4625D23A68BCF0C1E5CBE8D344E
25,202,495 UART: [art] SIG.S = 0E4D12C0A2E95DE9AFF81957FE8F60F4B28333A9ABCAC969ECAFD31808497B4A85FF8D6ED6F7E2A9F40C98C3238CE409
26,181,310 UART: Caliptra RT
26,181,998 UART: [state] CFI Enabled
26,298,834 UART: [rt] RT listening for mailbox commands...
26,312,458 >>> mbox cmd response: failed
26,312,833 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,342,644 UART: [rt]cmd =0x46505652, len=4
26,343,925 UART: [rt] FIPS Version
26,345,297 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,947 UART: [kat] SHA2-256
881,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,993 UART: [kat] ++
886,145 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
907,018 UART: [kat] LMS
1,475,214 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,526 UART: [idev] ++
1,479,694 UART: [idev] CDI.KEYID = 6
1,480,054 UART: [idev] SUBJECT.KEYID = 7
1,480,478 UART: [idev] UDS.KEYID = 0
1,480,823 ready_for_fw is high
1,480,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,046 UART: [idev] Erasing UDS.KEYID = 0
1,504,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,826 UART: [idev] --
1,513,759 UART: [ldev] ++
1,513,927 UART: [ldev] CDI.KEYID = 6
1,514,290 UART: [ldev] SUBJECT.KEYID = 5
1,514,716 UART: [ldev] AUTHORITY.KEYID = 7
1,515,179 UART: [ldev] FE.KEYID = 1
1,520,299 UART: [ldev] Erasing FE.KEYID = 1
1,545,258 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,370 UART: [ldev] --
1,584,681 UART: [fwproc] Waiting for Commands...
1,585,364 UART: [fwproc] Received command 0x46574c44
1,586,155 UART: [fwproc] Received Image of size 114448 bytes
2,884,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,076,481 >>> mbox cmd response: success
3,076,481 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,077,491 UART: [afmc] ++
3,077,659 UART: [afmc] CDI.KEYID = 6
3,078,021 UART: [afmc] SUBJECT.KEYID = 7
3,078,446 UART: [afmc] AUTHORITY.KEYID = 5
3,113,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,666 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,356 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,213 UART: [afmc] --
3,156,189 UART: [cold-reset] --
3,156,891 UART: [state] Locking Datavault
3,157,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,382 UART: [state] Locking ICCM
3,159,036 UART: [exit] Launching FMC @ 0x40000130
3,164,365 UART:
3,164,381 UART: Running Caliptra FMC ...
3,164,789 UART:
3,164,843 UART: [state] CFI Enabled
3,175,296 UART: [fht] FMC Alias Private Key: 7
3,282,877 UART: [art] Extend RT PCRs Done
3,283,305 UART: [art] Lock RT PCRs Done
3,284,787 UART: [art] Populate DV Done
3,293,244 UART: [fht] FMC Alias Private Key: 7
3,294,344 UART: [art] Derive CDI
3,294,624 UART: [art] Store in in slot 0x4
3,379,941 UART: [art] Derive Key Pair
3,380,301 UART: [art] Store priv key in slot 0x5
3,393,205 UART: [art] Derive Key Pair - Done
3,407,632 UART: [art] Signing Cert with AUTHO
3,408,112 UART: RITY.KEYID = 7
3,423,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,207 UART: [art] PUB.X = D505116BEEC43B5324CA77A5BCF49A9A6E921ED5AE7D90E8D39F43EFA42EF21EAE1B108C71B9F64074C07C5492E80A60
3,430,987 UART: [art] PUB.Y = D76D9CDF6DA9566AC0C9B00D1530ACDE932C7A7F6D317A3529335D879721ACC15851F569B59B907F7FDB09BA5A989FB6
3,437,943 UART: [art] SIG.R = 5A708ECC3DFDC54C03A0D1A436A92CB5E742C8B4C9385C0D2BEA8DCABFEA9817B6BF1DC4B8512E54BC242EA1396D9229
3,444,731 UART: [art] SIG.S = 13B486040D65D4190792A3E0226D428401796B734F20E261D544989F841346CBF7DA21CD4CA412F5FD8DB4A67E2F28FE
3,468,702 UART: Caliptra RT
3,468,955 UART: [state] CFI Enabled
3,576,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,484 >>> mbox cmd response: failed
3,589,484 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,588 UART: [rt]cmd =0x46505652, len=4
3,619,259 UART: [rt] FIPS Version
3,620,476 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,185 ready_for_fw is high
1,362,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,209 >>> mbox cmd response: success
2,928,209 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,989,113 UART:
2,989,129 UART: Running Caliptra FMC ...
2,989,537 UART:
2,989,591 UART: [state] CFI Enabled
3,000,184 UART: [fht] FMC Alias Private Key: 7
3,107,671 UART: [art] Extend RT PCRs Done
3,108,099 UART: [art] Lock RT PCRs Done
3,109,633 UART: [art] Populate DV Done
3,117,730 UART: [fht] FMC Alias Private Key: 7
3,118,682 UART: [art] Derive CDI
3,118,962 UART: [art] Store in in slot 0x4
3,204,493 UART: [art] Derive Key Pair
3,204,853 UART: [art] Store priv key in slot 0x5
3,217,415 UART: [art] Derive Key Pair - Done
3,231,977 UART: [art] Signing Cert with AUTHO
3,232,457 UART: RITY.KEYID = 7
3,247,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,420 UART: [art] PUB.X = 0056FC4604DC00F2F06539194647A4EDFE7B3E4853C259970A80956E5378572AA908F001D57FA6575E52729DA0CB3026
3,255,126 UART: [art] PUB.Y = 51E0C561B60687FC3F00C0C51D5B3F36E288B49E1C53CD69E637C476A38F6B3C1763E23B904A1506C479EA9809BE6FF5
3,262,049 UART: [art] SIG.R = 20737D396C225A4F48D13598E2009D7D57268258F8C65325B3051BE949E0AA7DBE632D8C24B7FB6C20B360C4B337058D
3,268,787 UART: [art] SIG.S = 81A2D714D846B2BBE5E699BD04EC451AAF8BD7800B8BF365D87EC1E40B8CB2C0EEE2267D95D8B249883F2C314A5426F3
3,292,265 UART: Caliptra RT
3,292,518 UART: [state] CFI Enabled
3,401,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,764 >>> mbox cmd response: failed
3,413,764 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,896 UART: [rt]cmd =0x46505652, len=4
3,443,567 UART: [rt] FIPS Version
3,444,594 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,125 UART: [kat] SHA2-512-ACC
897,026 UART: [kat] ECC-384
902,481 UART: [kat] HMAC-384Kdf
907,063 UART: [kat] LMS
1,475,259 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,548 UART: [fht] Storing FHT @ 0x50003400
1,479,321 UART: [idev] ++
1,479,489 UART: [idev] CDI.KEYID = 6
1,479,849 UART: [idev] SUBJECT.KEYID = 7
1,480,273 UART: [idev] UDS.KEYID = 0
1,480,618 ready_for_fw is high
1,480,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,095 UART: [idev] Erasing UDS.KEYID = 0
1,504,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,219 UART: [idev] --
1,514,132 UART: [ldev] ++
1,514,300 UART: [ldev] CDI.KEYID = 6
1,514,663 UART: [ldev] SUBJECT.KEYID = 5
1,515,089 UART: [ldev] AUTHORITY.KEYID = 7
1,515,552 UART: [ldev] FE.KEYID = 1
1,520,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,586,128 UART: [fwproc] Waiting for Commands...
1,586,933 UART: [fwproc] Received command 0x46574c44
1,587,724 UART: [fwproc] Received Image of size 114448 bytes
2,887,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,546 >>> mbox cmd response: success
3,079,546 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,080,706 UART: [afmc] ++
3,080,874 UART: [afmc] CDI.KEYID = 6
3,081,236 UART: [afmc] SUBJECT.KEYID = 7
3,081,661 UART: [afmc] AUTHORITY.KEYID = 5
3,117,010 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,657 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,347 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,194 UART: [afmc] --
3,160,308 UART: [cold-reset] --
3,161,190 UART: [state] Locking Datavault
3,162,551 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,155 UART: [state] Locking ICCM
3,163,727 UART: [exit] Launching FMC @ 0x40000130
3,169,056 UART:
3,169,072 UART: Running Caliptra FMC ...
3,169,480 UART:
3,169,623 UART: [state] CFI Enabled
3,180,452 UART: [fht] FMC Alias Private Key: 7
3,287,965 UART: [art] Extend RT PCRs Done
3,288,393 UART: [art] Lock RT PCRs Done
3,289,787 UART: [art] Populate DV Done
3,297,914 UART: [fht] FMC Alias Private Key: 7
3,298,860 UART: [art] Derive CDI
3,299,140 UART: [art] Store in in slot 0x4
3,385,161 UART: [art] Derive Key Pair
3,385,521 UART: [art] Store priv key in slot 0x5
3,398,579 UART: [art] Derive Key Pair - Done
3,413,419 UART: [art] Signing Cert with AUTHO
3,413,899 UART: RITY.KEYID = 7
3,429,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,784 UART: [art] PUB.X = D028C48441F3CA8A62B6686AD5142231D05CFC77847C15ADF391469B0B277594DFA9DC3AD90550FEE35AC768330F62B9
3,436,549 UART: [art] PUB.Y = C4374EBE288B992861389BEFF6D82569FB677B6913164529140D582848903A1379C3C14A6C23AF858E6A03125065B44D
3,443,481 UART: [art] SIG.R = 45A059C080FAC84FD3C653D3FA29BBDCE7F305B39610E55F9D308DDEDC266051A849FF870F2AF313268B444A1DE4E303
3,450,254 UART: [art] SIG.S = 5B3B102BAB58AFF9E9B2E36BB44C4F371008BB666CB6D67EBB1CE3529D867DBAE94B0BE2F3F4FE6B8D9C1CF1448E9B5F
3,474,295 UART: Caliptra RT
3,474,640 UART: [state] CFI Enabled
3,582,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,241 >>> mbox cmd response: failed
3,595,241 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,465 UART: [rt]cmd =0x46505652, len=4
3,625,136 UART: [rt] FIPS Version
3,626,149 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 ready_for_fw is high
1,362,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,040 >>> mbox cmd response: success
2,929,040 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,990,968 UART:
2,990,984 UART: Running Caliptra FMC ...
2,991,392 UART:
2,991,535 UART: [state] CFI Enabled
3,002,092 UART: [fht] FMC Alias Private Key: 7
3,109,505 UART: [art] Extend RT PCRs Done
3,109,933 UART: [art] Lock RT PCRs Done
3,111,591 UART: [art] Populate DV Done
3,119,954 UART: [fht] FMC Alias Private Key: 7
3,121,070 UART: [art] Derive CDI
3,121,350 UART: [art] Store in in slot 0x4
3,206,781 UART: [art] Derive Key Pair
3,207,141 UART: [art] Store priv key in slot 0x5
3,220,377 UART: [art] Derive Key Pair - Done
3,234,931 UART: [art] Signing Cert with AUTHO
3,235,411 UART: RITY.KEYID = 7
3,250,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,262 UART: [art] PUB.X = 816812A167CBE504E435EE85FF91D2E206E373CABD0DB4314E0FF1216B1D1D06FC4374EBCB2978479CAAE8E46E3DE0E6
3,258,033 UART: [art] PUB.Y = EB0DC108F8A3B21DA5CF23CEDAE6A82044A381C43B8FF506875DA6295D67202FDDF552767847B7270992E3B1C5FAABB2
3,264,985 UART: [art] SIG.R = 23C3F15265BDDAB9682CC8943E1D57349E363A879F164F611AEF2E0CCADEB52186F4A84968A309D3507257473FA05BC6
3,271,753 UART: [art] SIG.S = 9CA62304A22C6A7883B00A083FEE9703B76757DFBDEE5226A8C839E149C513D14096C857055003739F265A96153A58E9
3,295,156 UART: Caliptra RT
3,295,501 UART: [state] CFI Enabled
3,402,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,947 >>> mbox cmd response: failed
3,415,947 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,401 UART: [rt]cmd =0x46505652, len=4
3,446,072 UART: [rt] FIPS Version
3,446,909 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
893,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,871 UART: [kat] ++
898,023 UART: [kat] sha1
902,249 UART: [kat] SHA2-256
904,189 UART: [kat] SHA2-384
906,954 UART: [kat] SHA2-512-ACC
908,855 UART: [kat] ECC-384
918,746 UART: [kat] HMAC-384Kdf
923,362 UART: [kat] LMS
1,171,690 UART: [kat] --
1,172,471 UART: [cold-reset] ++
1,172,913 UART: [fht] FHT @ 0x50003400
1,175,548 UART: [idev] ++
1,175,716 UART: [idev] CDI.KEYID = 6
1,176,076 UART: [idev] SUBJECT.KEYID = 7
1,176,500 UART: [idev] UDS.KEYID = 0
1,176,845 ready_for_fw is high
1,176,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,666 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,941 UART: [ldev] ++
1,211,109 UART: [ldev] CDI.KEYID = 6
1,211,472 UART: [ldev] SUBJECT.KEYID = 5
1,211,898 UART: [ldev] AUTHORITY.KEYID = 7
1,212,361 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,152 UART: [fwproc] Wait for Commands...
1,283,924 UART: [fwproc] Recv command 0x46574c44
1,284,652 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,258 >>> mbox cmd response: success
2,777,258 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,778,312 UART: [afmc] ++
2,778,480 UART: [afmc] CDI.KEYID = 6
2,778,842 UART: [afmc] SUBJECT.KEYID = 7
2,779,267 UART: [afmc] AUTHORITY.KEYID = 5
2,814,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,675 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,213 UART: [afmc] --
2,858,131 UART: [cold-reset] --
2,859,089 UART: [state] Locking Datavault
2,860,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,886 UART: [state] Locking ICCM
2,861,430 UART: [exit] Launching FMC @ 0x40000130
2,866,759 UART:
2,866,775 UART: Running Caliptra FMC ...
2,867,183 UART:
2,867,237 UART: [state] CFI Enabled
2,877,738 UART: [fht] FMC Alias Private Key: 7
2,984,909 UART: [art] Extend RT PCRs Done
2,985,337 UART: [art] Lock RT PCRs Done
2,986,865 UART: [art] Populate DV Done
2,995,128 UART: [fht] FMC Alias Private Key: 7
2,996,186 UART: [art] Derive CDI
2,996,466 UART: [art] Store in in slot 0x4
3,082,357 UART: [art] Derive Key Pair
3,082,717 UART: [art] Store priv key in slot 0x5
3,096,077 UART: [art] Derive Key Pair - Done
3,110,765 UART: [art] Signing Cert with AUTHO
3,111,245 UART: RITY.KEYID = 7
3,126,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,132 UART: [art] PUB.X = 3248A41AC827473C5D47304644A03BC429701AA510157DEC30EE9DDB22DA7D6304A77AFEB71A32B5ABF1C48844F7F71F
3,133,907 UART: [art] PUB.Y = CC6D2505668BA7E549C130AB17D34453B1CE0607C7C4037DEB5739E64D831A73393489D96AA2551A800AECB0A6018631
3,140,837 UART: [art] SIG.R = 90959CD053A7E25D9DC223E21B0A259C5047E3354427AB6DDC60AEC988053E16725E0522B85A5C68BA4AC6B4434675F4
3,147,598 UART: [art] SIG.S = 2158B0F50031429D99773940D7F0D63E9D607379C8D3B20BAF9BE19FBAEB7F489F17406D3171CB5E59A9CF7E56107F3F
3,171,318 UART: Caliptra RT
3,171,571 UART: [state] CFI Enabled
3,279,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,971 >>> mbox cmd response: failed
3,291,971 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,349 UART: [rt]cmd =0x46505652, len=4
3,322,020 UART: [rt] FIPS Version
3,322,931 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,913 ready_for_fw is high
1,059,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,559 >>> mbox cmd response: success
2,627,559 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,688,435 UART:
2,688,451 UART: Running Caliptra FMC ...
2,688,859 UART:
2,688,913 UART: [state] CFI Enabled
2,699,346 UART: [fht] FMC Alias Private Key: 7
2,806,811 UART: [art] Extend RT PCRs Done
2,807,239 UART: [art] Lock RT PCRs Done
2,808,779 UART: [art] Populate DV Done
2,817,084 UART: [fht] FMC Alias Private Key: 7
2,818,106 UART: [art] Derive CDI
2,818,386 UART: [art] Store in in slot 0x4
2,903,973 UART: [art] Derive Key Pair
2,904,333 UART: [art] Store priv key in slot 0x5
2,917,427 UART: [art] Derive Key Pair - Done
2,932,421 UART: [art] Signing Cert with AUTHO
2,932,901 UART: RITY.KEYID = 7
2,948,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,800 UART: [art] PUB.X = 8F07326A0A384A65765AB6013B3DB1BDC2E10ACA9E50D429A8304CBBEC3313D8555B88CA652C4DEC98B3743281252C59
2,955,564 UART: [art] PUB.Y = 6DFB0A037A89D964E0FF26AE7087B3A25302EE524702D79ECF445E880241377F5478D3EA0DFCCCD418332247B0D09267
2,962,498 UART: [art] SIG.R = 603531CA29546B8F86DDD168DA025868219C31BA576F69519042E8CA9BF770E47B6A62D8A46D6FC3CCFCCF8634D75D61
2,969,271 UART: [art] SIG.S = 5AF946500E5681284EBA42B4D005247977C3FAA8AEBEDF41D5C1C3972EBB7016AE922E08A2058DAABE68C5545260A909
2,992,657 UART: Caliptra RT
2,992,910 UART: [state] CFI Enabled
3,099,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,176 >>> mbox cmd response: failed
3,112,176 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,586 UART: [rt]cmd =0x46505652, len=4
3,142,257 UART: [rt] FIPS Version
3,143,312 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,629 UART: [idev] ++
1,175,797 UART: [idev] CDI.KEYID = 6
1,176,157 UART: [idev] SUBJECT.KEYID = 7
1,176,581 UART: [idev] UDS.KEYID = 0
1,176,926 ready_for_fw is high
1,176,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,529 UART: [idev] Erasing UDS.KEYID = 0
1,202,488 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,924 UART: [ldev] ++
1,212,092 UART: [ldev] CDI.KEYID = 6
1,212,455 UART: [ldev] SUBJECT.KEYID = 5
1,212,881 UART: [ldev] AUTHORITY.KEYID = 7
1,213,344 UART: [ldev] FE.KEYID = 1
1,218,640 UART: [ldev] Erasing FE.KEYID = 1
1,245,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,112 UART: [ldev] --
1,284,557 UART: [fwproc] Wait for Commands...
1,285,191 UART: [fwproc] Recv command 0x46574c44
1,285,919 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,195 >>> mbox cmd response: success
2,778,195 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,779,457 UART: [afmc] ++
2,779,625 UART: [afmc] CDI.KEYID = 6
2,779,987 UART: [afmc] SUBJECT.KEYID = 7
2,780,412 UART: [afmc] AUTHORITY.KEYID = 5
2,816,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,360 UART: [afmc] --
2,859,386 UART: [cold-reset] --
2,860,172 UART: [state] Locking Datavault
2,861,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,947 UART: [state] Locking ICCM
2,862,397 UART: [exit] Launching FMC @ 0x40000130
2,867,726 UART:
2,867,742 UART: Running Caliptra FMC ...
2,868,150 UART:
2,868,293 UART: [state] CFI Enabled
2,878,814 UART: [fht] FMC Alias Private Key: 7
2,986,411 UART: [art] Extend RT PCRs Done
2,986,839 UART: [art] Lock RT PCRs Done
2,988,311 UART: [art] Populate DV Done
2,996,296 UART: [fht] FMC Alias Private Key: 7
2,997,456 UART: [art] Derive CDI
2,997,736 UART: [art] Store in in slot 0x4
3,083,455 UART: [art] Derive Key Pair
3,083,815 UART: [art] Store priv key in slot 0x5
3,097,103 UART: [art] Derive Key Pair - Done
3,111,760 UART: [art] Signing Cert with AUTHO
3,112,240 UART: RITY.KEYID = 7
3,127,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,427 UART: [art] PUB.X = 44EE8235DA2F6586118BB10903EE182162130EAAA8B139E5847677BABBAF3BEB681B64828941F7141478687C29193062
3,135,180 UART: [art] PUB.Y = C41E94A9C62F12691F16FAB2C05155D737B1164CDA67FAD45462BB86E30B0A3B321FDBDDF7DE1F0739F6D66C2FD430A7
3,142,137 UART: [art] SIG.R = 7D9F657D618F266F3B73346591AE8E09E022C5295B265B8E60F09086FD400071F126E6496C27DD1308612D9BEDBE4D07
3,148,872 UART: [art] SIG.S = 4458BD87BE850395C0499D6ABAFC1A18DE416C2F2651CAFBB55A3D917A3A6D9935B5CF75F047EEE95394BFA47D870134
3,172,711 UART: Caliptra RT
3,173,056 UART: [state] CFI Enabled
3,281,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,570 >>> mbox cmd response: failed
3,294,570 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,086 UART: [rt]cmd =0x46505652, len=4
3,324,757 UART: [rt] FIPS Version
3,325,880 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 ready_for_fw is high
1,060,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,884 >>> mbox cmd response: success
2,628,884 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,691,052 UART:
2,691,068 UART: Running Caliptra FMC ...
2,691,476 UART:
2,691,619 UART: [state] CFI Enabled
2,702,338 UART: [fht] FMC Alias Private Key: 7
2,810,917 UART: [art] Extend RT PCRs Done
2,811,345 UART: [art] Lock RT PCRs Done
2,813,195 UART: [art] Populate DV Done
2,821,620 UART: [fht] FMC Alias Private Key: 7
2,822,796 UART: [art] Derive CDI
2,823,076 UART: [art] Store in in slot 0x4
2,908,879 UART: [art] Derive Key Pair
2,909,239 UART: [art] Store priv key in slot 0x5
2,923,249 UART: [art] Derive Key Pair - Done
2,938,162 UART: [art] Signing Cert with AUTHO
2,938,642 UART: RITY.KEYID = 7
2,953,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,245 UART: [art] PUB.X = 570A326D115BC8EDBAF2D0695BD7384D11349920DDB54175910B1AC28CD31389EB5AA2B2D1FB6E5CAC8EFF1AC8D3D4C0
2,961,029 UART: [art] PUB.Y = 81B214CC47A81EB47454350A32EEB88174EFEA0C7624ECD872ECA20872EBD19B3FDDBE2BED29A67F97183A2D131456EA
2,967,986 UART: [art] SIG.R = FE07DF3F6B7890BAA028629D6FD8A1C2DC672A8D411AB9D348D4DFA29ECC0BFF1094D566BCBE88E9BF4F9A8730AE7A59
2,974,776 UART: [art] SIG.S = 955F64491F3775BA81237A3E8022E15BF9DC33AE8CCE6527381485212BAF6245D00CECC846E1E2E53199FC7B99D83E73
2,998,442 UART: Caliptra RT
2,998,787 UART: [state] CFI Enabled
3,106,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,118,926 >>> mbox cmd response: failed
3,118,926 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,432 UART: [rt]cmd =0x46505652, len=4
3,149,103 UART: [rt] FIPS Version
3,150,022 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,207,775 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,666 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,790 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,374 >>> mbox cmd response: success
2,774,374 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,775,405 UART: [afmc] ++
2,775,573 UART: [afmc] CDI.KEYID = 6
2,775,936 UART: [afmc] SUBJECT.KEYID = 7
2,776,362 UART: [afmc] AUTHORITY.KEYID = 5
2,811,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,728 UART: [afmc] --
2,854,630 UART: [cold-reset] --
2,855,552 UART: [state] Locking Datavault
2,856,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,359 UART: [state] Locking ICCM
2,857,933 UART: [exit] Launching FMC @ 0x40000130
2,863,262 UART:
2,863,278 UART: Running Caliptra FMC ...
2,863,686 UART:
2,863,740 UART: [state] CFI Enabled
2,874,505 UART: [fht] FMC Alias Private Key: 7
2,982,248 UART: [art] Extend RT PCRs Done
2,982,676 UART: [art] Lock RT PCRs Done
2,984,072 UART: [art] Populate DV Done
2,992,493 UART: [fht] FMC Alias Private Key: 7
2,993,519 UART: [art] Derive CDI
2,993,799 UART: [art] Store in in slot 0x4
3,079,568 UART: [art] Derive Key Pair
3,079,928 UART: [art] Store priv key in slot 0x5
3,092,838 UART: [art] Derive Key Pair - Done
3,107,528 UART: [art] Signing Cert with AUTHO
3,108,008 UART: RITY.KEYID = 7
3,122,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,301 UART: [art] PUB.X = BE43D49034849DF1D1CFFCEF474851F481B18CB7271B0AE2DAAB30EE9933BBA8FC98A474A176169F257BEC26E690BC73
3,130,084 UART: [art] PUB.Y = C139D6E930CD54990F676C175FD387D26BEA9FFD2A038B6A83FA87FD11A1C7B8BBDAE777293EE503902368C49AFC1B4E
3,137,041 UART: [art] SIG.R = 7A1217B86911CBF67D9751401579954CB867A73C9A87E41D2A11596BC7A950B4A998B590DFA4F75A5F1D452425F7E4BA
3,143,811 UART: [art] SIG.S = 5CEEF594681CFA01A91D0C4E01A233DFE1AEA776867C55A8272177CD21B8C4221A253164EE76CC9313ECF2139D81CF7F
3,167,543 UART: Caliptra RT
3,167,796 UART: [state] CFI Enabled
3,276,995 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,862 >>> mbox cmd response: failed
3,289,862 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,480 UART: [rt]cmd =0x46505652, len=4
3,320,151 UART: [rt] FIPS Version
3,321,336 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 ready_for_fw is high
1,055,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,282 >>> mbox cmd response: success
2,623,282 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,685,610 UART:
2,685,626 UART: Running Caliptra FMC ...
2,686,034 UART:
2,686,088 UART: [state] CFI Enabled
2,696,419 UART: [fht] FMC Alias Private Key: 7
2,804,366 UART: [art] Extend RT PCRs Done
2,804,794 UART: [art] Lock RT PCRs Done
2,806,114 UART: [art] Populate DV Done
2,814,585 UART: [fht] FMC Alias Private Key: 7
2,815,533 UART: [art] Derive CDI
2,815,813 UART: [art] Store in in slot 0x4
2,901,514 UART: [art] Derive Key Pair
2,901,874 UART: [art] Store priv key in slot 0x5
2,915,014 UART: [art] Derive Key Pair - Done
2,929,830 UART: [art] Signing Cert with AUTHO
2,930,310 UART: RITY.KEYID = 7
2,945,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,477 UART: [art] PUB.X = 1408776EBD25724706218A1E6902EFEE93FA394F9ECF44F7C8E46E56367C3AD9B00BED6D6C0B4B80DCFB4C702A1E013A
2,953,243 UART: [art] PUB.Y = B91838349AA8FB1055E6A9922F3C5B8640A85DCF4BDED059F6D50647625A36FC2C74C516CEC7DCF67B5BD8D7F58B218C
2,960,204 UART: [art] SIG.R = 4959D5BD64950C3A6555A4A28EBBF204D55F751F4A915667837E6FB72E643EA75A649E0963511A9280FB1972FD30B090
2,966,961 UART: [art] SIG.S = F35F60F0EB11446547AE53A07038920206724F0ECF1C38949315E5552595410CA0B62D2EF5AB86D7C171EF842FF73862
2,990,784 UART: Caliptra RT
2,991,037 UART: [state] CFI Enabled
3,097,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,110,849 >>> mbox cmd response: failed
3,110,849 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,259 UART: [rt]cmd =0x46505652, len=4
3,140,930 UART: [rt] FIPS Version
3,141,989 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,343 UART: [kat] SHA2-256
891,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,022 UART: [kat] ++
896,174 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,303 UART: [kat] SHA2-512-ACC
907,204 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,734 UART: [idev] ++
1,173,902 UART: [idev] CDI.KEYID = 6
1,174,263 UART: [idev] SUBJECT.KEYID = 7
1,174,688 UART: [idev] UDS.KEYID = 0
1,175,034 ready_for_fw is high
1,175,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,608 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,283,001 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,371 >>> mbox cmd response: success
2,775,371 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,776,394 UART: [afmc] ++
2,776,562 UART: [afmc] CDI.KEYID = 6
2,776,925 UART: [afmc] SUBJECT.KEYID = 7
2,777,351 UART: [afmc] AUTHORITY.KEYID = 5
2,812,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,509 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,228 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,077 UART: [afmc] --
2,856,173 UART: [cold-reset] --
2,856,961 UART: [state] Locking Datavault
2,858,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,690 UART: [state] Locking ICCM
2,859,130 UART: [exit] Launching FMC @ 0x40000130
2,864,459 UART:
2,864,475 UART: Running Caliptra FMC ...
2,864,883 UART:
2,865,026 UART: [state] CFI Enabled
2,875,491 UART: [fht] FMC Alias Private Key: 7
2,983,528 UART: [art] Extend RT PCRs Done
2,983,956 UART: [art] Lock RT PCRs Done
2,985,410 UART: [art] Populate DV Done
2,993,531 UART: [fht] FMC Alias Private Key: 7
2,994,609 UART: [art] Derive CDI
2,994,889 UART: [art] Store in in slot 0x4
3,080,754 UART: [art] Derive Key Pair
3,081,114 UART: [art] Store priv key in slot 0x5
3,094,862 UART: [art] Derive Key Pair - Done
3,109,865 UART: [art] Signing Cert with AUTHO
3,110,345 UART: RITY.KEYID = 7
3,125,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,294 UART: [art] PUB.X = C3205A3E47D52FBC0712AE48F27B92CC4444A6C6331364F2BC065D16A699BB64EB8F1A787D8EF5C6EDB409537F5F13F5
3,133,065 UART: [art] PUB.Y = 1917025A91D3FF868DB1D35C7F939C5C835591803E22B8B1726C1FF5AA7F2FE901DB8B3B25C89C8B3C21E750870737CA
3,140,010 UART: [art] SIG.R = 500E3005A4AAE69EED2F8484E15E2B32001D1BD6EE196406E716FBCAE89703D9B8FE60D1E1B4C599C3E72F6B9EF748FD
3,146,762 UART: [art] SIG.S = 8AC34B833A8010FA607D2AE36264BD7749D2822F3815F5540D9FBD0ED8811AD158806E1CECD4D63847795DF3C9E8CC34
3,170,197 UART: Caliptra RT
3,170,542 UART: [state] CFI Enabled
3,278,575 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,402 >>> mbox cmd response: failed
3,291,402 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,674 UART: [rt]cmd =0x46505652, len=4
3,321,345 UART: [rt] FIPS Version
3,322,220 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,447 ready_for_fw is high
1,056,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,921 >>> mbox cmd response: success
2,622,921 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,685,417 UART:
2,685,433 UART: Running Caliptra FMC ...
2,685,841 UART:
2,685,984 UART: [state] CFI Enabled
2,696,915 UART: [fht] FMC Alias Private Key: 7
2,804,940 UART: [art] Extend RT PCRs Done
2,805,368 UART: [art] Lock RT PCRs Done
2,806,738 UART: [art] Populate DV Done
2,815,163 UART: [fht] FMC Alias Private Key: 7
2,816,313 UART: [art] Derive CDI
2,816,593 UART: [art] Store in in slot 0x4
2,902,080 UART: [art] Derive Key Pair
2,902,440 UART: [art] Store priv key in slot 0x5
2,915,812 UART: [art] Derive Key Pair - Done
2,930,595 UART: [art] Signing Cert with AUTHO
2,931,075 UART: RITY.KEYID = 7
2,946,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,078 UART: [art] PUB.X = D9DC588CE09ED94791C6D273295601BEA19B65A04554329F0E5F3634D149076C0DB181CD6E249A3A775097C4A571FD7B
2,953,836 UART: [art] PUB.Y = 2B1AD24BFA9F896F3B2FC85432A51D25AD3BEA43FAF680C502B23D9BF33617573A2D0951B1D656861E6B4FDE06C5AEC9
2,960,793 UART: [art] SIG.R = 28AA3DA4E0ED44F18AD53D22DE781C22B579D848A801E0426013759DF93A182F329D9CAA591660663D76FC7E5D41E6B9
2,967,564 UART: [art] SIG.S = 7670DD611EB7B134D0211762C209E2DC13D0FE2C9B51C3009CC53361265CD7EB1DB64E0E00F9AD1899FF3E5A346381AC
2,991,581 UART: Caliptra RT
2,991,926 UART: [state] CFI Enabled
3,100,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,134 >>> mbox cmd response: failed
3,113,134 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,444 UART: [rt]cmd =0x46505652, len=4
3,143,115 UART: [rt] FIPS Version
3,144,310 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,109 UART:
192,482 UART: Running Caliptra ROM ...
193,691 UART:
193,845 UART: [state] CFI Enabled
264,005 UART: [state] LifecycleState = Unprovisioned
265,996 UART: [state] DebugLocked = No
268,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,095 UART: [kat] SHA2-256
442,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,301 UART: [kat] ++
453,906 UART: [kat] sha1
465,039 UART: [kat] SHA2-256
467,739 UART: [kat] SHA2-384
474,517 UART: [kat] SHA2-512-ACC
476,881 UART: [kat] ECC-384
2,769,808 UART: [kat] HMAC-384Kdf
2,800,822 UART: [kat] LMS
3,991,091 UART: [kat] --
3,996,290 UART: [cold-reset] ++
3,998,216 UART: [fht] Storing FHT @ 0x50003400
4,009,360 UART: [idev] ++
4,009,932 UART: [idev] CDI.KEYID = 6
4,010,893 UART: [idev] SUBJECT.KEYID = 7
4,012,138 UART: [idev] UDS.KEYID = 0
4,013,188 ready_for_fw is high
4,013,391 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,340 UART: [idev] Erasing UDS.KEYID = 0
7,349,057 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,423 UART: [idev] --
7,375,602 UART: [ldev] ++
7,376,169 UART: [ldev] CDI.KEYID = 6
7,377,139 UART: [ldev] SUBJECT.KEYID = 5
7,378,354 UART: [ldev] AUTHORITY.KEYID = 7
7,379,639 UART: [ldev] FE.KEYID = 1
7,422,898 UART: [ldev] Erasing FE.KEYID = 1
10,753,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,858 UART: [ldev] --
13,115,480 UART: [fwproc] Waiting for Commands...
13,118,817 UART: [fwproc] Received command 0x46574c44
13,120,995 UART: [fwproc] Received Image of size 114124 bytes
17,180,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,642,473 >>> mbox cmd response: success
17,643,020 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,647,168 UART: [afmc] ++
17,647,755 UART: [afmc] CDI.KEYID = 6
17,648,646 UART: [afmc] SUBJECT.KEYID = 7
17,649,940 UART: [afmc] AUTHORITY.KEYID = 5
21,010,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,188 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,603 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,429 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,890 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,111 UART: [afmc] --
23,380,056 UART: [cold-reset] --
23,383,111 UART: [state] Locking Datavault
23,388,518 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,271 UART: [state] Locking ICCM
23,392,909 UART: [exit] Launching FMC @ 0x40000130
23,401,306 UART:
23,401,549 UART: Running Caliptra FMC ...
23,402,654 UART:
23,402,833 UART: [state] CFI Enabled
23,469,164 UART: [fht] FMC Alias Private Key: 7
25,807,653 UART: [art] Extend RT PCRs Done
25,808,879 UART: [art] Lock RT PCRs Done
25,810,182 UART: [art] Populate DV Done
25,815,767 UART: [fht] FMC Alias Private Key: 7
25,817,408 UART: [art] Derive CDI
25,818,227 UART: [art] Store in in slot 0x4
25,877,984 UART: [art] Derive Key Pair
25,879,001 UART: [art] Store priv key in slot 0x5
29,172,195 UART: [art] Derive Key Pair - Done
29,185,019 UART: [art] Signing Cert with AUTHO
29,186,348 UART: RITY.KEYID = 7
31,474,230 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,741 UART: [art] PUB.X = 296777F62FA0421ACE02D1B9D0B0DDB5FE8C16714D424A72B23D9FDE9036BF20DBD556AAC7D1C9261746E58DED949042
31,482,997 UART: [art] PUB.Y = E71C2EB84483F6DAAE62DE742C1297558476FEEA4FD384FD6FA279FF0DC1999724A718701403DD5120B67DB2A9E1BCB6
31,490,257 UART: [art] SIG.R = 802D3D1DB176CC2E98D5ABC58D4C61E73BA77CC4E6CB3A89EFA8304CAC1264F1642890061DFD83FAB075E3C10C0240EA
31,497,665 UART: [art] SIG.S = 5B6CCA9CD95887D61C2080FD33B775DEEC178B24F1BB499493E888F34E65ECF0842AE69FFE7DA4D213F8E866B52E6FA9
32,802,987 UART: Caliptra RT
32,803,703 UART: [state] CFI Enabled
32,966,568 UART: [rt] RT listening for mailbox commands...
32,969,133 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,808,463 ready_for_fw is high
3,809,057 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,885,170 >>> mbox cmd response: success
17,885,829 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,581,599 UART:
23,581,981 UART: Running Caliptra FMC ...
23,583,185 UART:
23,583,374 UART: [state] CFI Enabled
23,653,670 UART: [fht] FMC Alias Private Key: 7
25,991,944 UART: [art] Extend RT PCRs Done
25,993,176 UART: [art] Lock RT PCRs Done
25,994,694 UART: [art] Populate DV Done
26,000,278 UART: [fht] FMC Alias Private Key: 7
26,001,944 UART: [art] Derive CDI
26,002,767 UART: [art] Store in in slot 0x4
26,061,751 UART: [art] Derive Key Pair
26,062,797 UART: [art] Store priv key in slot 0x5
29,354,807 UART: [art] Derive Key Pair - Done
29,367,651 UART: [art] Signing Cert with AUTHO
29,368,958 UART: RITY.KEYID = 7
31,656,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,071 UART: [art] PUB.X = DC67D102319153D7BC52264D0C4C84EA69750F951060B1687CC0EB89A96115CF5EAE33273D4AE1A89E461772302DEF7D
31,665,325 UART: [art] PUB.Y = B5B5E88EC56AFADD916D433B1CF9B9CDEA327B04D5F0DB8663BD7A64445ABFCFC06079CE76251EA1C2BF44C7633546CE
31,672,632 UART: [art] SIG.R = 80C5615EC255F40955E3473813C8C873DD443AC92D1D7B1A3495E4B17CDB9AE0C4C080EE62E11FECBD3FBD28DF7E582A
31,680,020 UART: [art] SIG.S = C5E8FC4586EBA25826E87503F041F2AB4FFCFCB207841D509AC43D732AC814ADB52AABD4FAE3410C395989244B9D0894
32,986,330 UART: Caliptra RT
32,987,047 UART: [state] CFI Enabled
33,167,230 UART: [rt] RT listening for mailbox commands...
33,169,737 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,361 UART:
192,725 UART: Running Caliptra ROM ...
193,915 UART:
603,602 UART: [state] CFI Enabled
618,477 UART: [state] LifecycleState = Unprovisioned
620,420 UART: [state] DebugLocked = No
622,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,589 UART: [kat] SHA2-256
797,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,846 UART: [kat] ++
808,444 UART: [kat] sha1
820,243 UART: [kat] SHA2-256
822,952 UART: [kat] SHA2-384
827,796 UART: [kat] SHA2-512-ACC
830,158 UART: [kat] ECC-384
3,112,506 UART: [kat] HMAC-384Kdf
3,124,112 UART: [kat] LMS
4,314,243 UART: [kat] --
4,320,030 UART: [cold-reset] ++
4,322,482 UART: [fht] Storing FHT @ 0x50003400
4,334,397 UART: [idev] ++
4,335,030 UART: [idev] CDI.KEYID = 6
4,335,942 UART: [idev] SUBJECT.KEYID = 7
4,337,179 UART: [idev] UDS.KEYID = 0
4,338,144 ready_for_fw is high
4,338,341 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,679 UART: [idev] Erasing UDS.KEYID = 0
7,617,088 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,074 UART: [idev] --
7,644,782 UART: [ldev] ++
7,645,402 UART: [ldev] CDI.KEYID = 6
7,646,378 UART: [ldev] SUBJECT.KEYID = 5
7,647,534 UART: [ldev] AUTHORITY.KEYID = 7
7,648,814 UART: [ldev] FE.KEYID = 1
7,657,915 UART: [ldev] Erasing FE.KEYID = 1
10,947,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,311 UART: [ldev] --
13,304,546 UART: [fwproc] Waiting for Commands...
13,306,202 UART: [fwproc] Received command 0x46574c44
13,308,378 UART: [fwproc] Received Image of size 114124 bytes
17,358,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,851 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,927 >>> mbox cmd response: success
17,827,495 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,830,405 UART: [afmc] ++
17,831,043 UART: [afmc] CDI.KEYID = 6
17,831,973 UART: [afmc] SUBJECT.KEYID = 7
17,833,189 UART: [afmc] AUTHORITY.KEYID = 5
21,148,095 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,121 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,497 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,358 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,797 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,889 UART: [afmc] --
23,512,801 UART: [cold-reset] --
23,517,367 UART: [state] Locking Datavault
23,521,639 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,385 UART: [state] Locking ICCM
23,525,527 UART: [exit] Launching FMC @ 0x40000130
23,533,912 UART:
23,534,148 UART: Running Caliptra FMC ...
23,535,267 UART:
23,535,425 UART: [state] CFI Enabled
23,543,516 UART: [fht] FMC Alias Private Key: 7
25,874,755 UART: [art] Extend RT PCRs Done
25,875,973 UART: [art] Lock RT PCRs Done
25,877,486 UART: [art] Populate DV Done
25,883,107 UART: [fht] FMC Alias Private Key: 7
25,884,577 UART: [art] Derive CDI
25,885,345 UART: [art] Store in in slot 0x4
25,927,558 UART: [art] Derive Key Pair
25,928,599 UART: [art] Store priv key in slot 0x5
29,170,809 UART: [art] Derive Key Pair - Done
29,183,584 UART: [art] Signing Cert with AUTHO
29,184,884 UART: RITY.KEYID = 7
31,464,298 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,806 UART: [art] PUB.X = B7787950E5F6936CE67304996A92C2D56D318A485013FCA46E48072441F13BCDE029034FEFEAB483C164C6DA52B187BC
31,473,063 UART: [art] PUB.Y = 19E0AC04F2633E010C6C6D0FEB6EC0EEB4F661F2934CA7CC48E6B1673196CE33C9301522065705101994E8AF8E60BD81
31,480,292 UART: [art] SIG.R = 1E86FBA7A24702FE2FA940553C1D80F2F14B2C60DA6EBE23B55094B8F995E5E00BBAD25021225E37EE87A1350367D4D9
31,487,724 UART: [art] SIG.S = 80BDD05B41FB68FF82C9958ABFBE0A149DEAC563C5EAC01D06CD555BAA9CBB713679A2537E59858F97D1C802E1BA0D0A
32,793,660 UART: Caliptra RT
32,794,367 UART: [state] CFI Enabled
32,913,393 UART: [rt] RT listening for mailbox commands...
32,915,921 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
4,128,500 ready_for_fw is high
4,129,106 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,849 >>> mbox cmd response: success
18,074,494 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,714,009 UART:
23,714,395 UART: Running Caliptra FMC ...
23,715,593 UART:
23,715,756 UART: [state] CFI Enabled
23,723,809 UART: [fht] FMC Alias Private Key: 7
26,054,735 UART: [art] Extend RT PCRs Done
26,055,957 UART: [art] Lock RT PCRs Done
26,057,825 UART: [art] Populate DV Done
26,063,087 UART: [fht] FMC Alias Private Key: 7
26,064,644 UART: [art] Derive CDI
26,065,459 UART: [art] Store in in slot 0x4
26,107,962 UART: [art] Derive Key Pair
26,109,005 UART: [art] Store priv key in slot 0x5
29,350,818 UART: [art] Derive Key Pair - Done
29,363,490 UART: [art] Signing Cert with AUTHO
29,364,789 UART: RITY.KEYID = 7
31,644,120 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,629 UART: [art] PUB.X = BD07C1C2864E1AFD123FBDC36524F8D6AEA825D7B371CC24A4C8C84BBC533E89185EAA11738789B3E4213C9556AEAA9B
31,652,882 UART: [art] PUB.Y = 88716690C14435606D4B7D27E3FC3170D4EA00DB85B77FFE231C949B7BA09A9BBCC824D24D996C3B5B8FBA877109E7DF
31,660,170 UART: [art] SIG.R = B142AD2942179703341134DA41AD8B1D0ACD5F5F82B29EF6F2B31EFFA59C57BB2C06647EBD4645C012CE826831738E2E
31,667,556 UART: [art] SIG.S = 22D8174B9910E0C27C448237728B11AA57221FD55D5155F8E110828CB39B86BB8B2EACEE8E9F1FBC67C8237C725C8647
32,972,822 UART: Caliptra RT
32,973,524 UART: [state] CFI Enabled
33,091,908 UART: [rt] RT listening for mailbox commands...
33,094,553 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,133 UART:
192,490 UART: Running Caliptra ROM ...
193,593 UART:
193,737 UART: [state] CFI Enabled
263,853 UART: [state] LifecycleState = Unprovisioned
265,767 UART: [state] DebugLocked = No
267,879 UART: [state] WD Timer not started. Device not locked for debugging
271,563 UART: [kat] SHA2-256
450,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,240 UART: [kat] ++
462,773 UART: [kat] sha1
474,175 UART: [kat] SHA2-256
477,170 UART: [kat] SHA2-384
484,657 UART: [kat] SHA2-512-ACC
487,667 UART: [kat] ECC-384
2,947,231 UART: [kat] HMAC-384Kdf
2,970,226 UART: [kat] LMS
3,499,671 UART: [kat] --
3,503,526 UART: [cold-reset] ++
3,504,893 UART: [fht] FHT @ 0x50003400
3,515,606 UART: [idev] ++
3,516,212 UART: [idev] CDI.KEYID = 6
3,517,150 UART: [idev] SUBJECT.KEYID = 7
3,518,327 UART: [idev] UDS.KEYID = 0
3,519,250 ready_for_fw is high
3,519,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,214 UART: [idev] Erasing UDS.KEYID = 0
6,026,775 UART: [idev] Sha1 KeyId Algorithm
6,050,225 UART: [idev] --
6,054,757 UART: [ldev] ++
6,055,330 UART: [ldev] CDI.KEYID = 6
6,056,244 UART: [ldev] SUBJECT.KEYID = 5
6,057,406 UART: [ldev] AUTHORITY.KEYID = 7
6,058,642 UART: [ldev] FE.KEYID = 1
6,098,463 UART: [ldev] Erasing FE.KEYID = 1
8,601,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,170 UART: [ldev] --
10,410,955 UART: [fwproc] Wait for Commands...
10,414,024 UART: [fwproc] Recv command 0x46574c44
10,416,121 UART: [fwproc] Recv'd Img size: 114448 bytes
13,812,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,702 >>> mbox cmd response: success
14,278,229 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,281,274 UART: [afmc] ++
14,281,862 UART: [afmc] CDI.KEYID = 6
14,282,771 UART: [afmc] SUBJECT.KEYID = 7
14,283,927 UART: [afmc] AUTHORITY.KEYID = 5
16,826,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,033 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,409 UART: [afmc] --
18,624,780 UART: [cold-reset] --
18,627,771 UART: [state] Locking Datavault
18,632,200 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,851 UART: [state] Locking ICCM
18,636,273 UART: [exit] Launching FMC @ 0x40000130
18,644,667 UART:
18,644,903 UART: Running Caliptra FMC ...
18,646,000 UART:
18,646,164 UART: [state] CFI Enabled
18,707,459 UART: [fht] FMC Alias Private Key: 7
20,471,980 UART: [art] Extend RT PCRs Done
20,473,196 UART: [art] Lock RT PCRs Done
20,474,710 UART: [art] Populate DV Done
20,479,966 UART: [fht] FMC Alias Private Key: 7
20,481,503 UART: [art] Derive CDI
20,482,317 UART: [art] Store in in slot 0x4
20,540,089 UART: [art] Derive Key Pair
20,541,087 UART: [art] Store priv key in slot 0x5
23,004,486 UART: [art] Derive Key Pair - Done
23,017,382 UART: [art] Signing Cert with AUTHO
23,018,693 UART: RITY.KEYID = 7
24,729,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,764 UART: [art] PUB.X = 24A62BE79E5718764EA36FED8D1AD0F5648CB9D9E8F31ECC9533D1766EECDC0DDCF4005D7E5DCF90290F3A02ADB235B2
24,738,012 UART: [art] PUB.Y = 90476D3D743B6820ED7E89934A2BFE3E2173A349D853B6E63266257BEA50905FD39B5AD254CBE9CED80A19EA7961DED4
24,745,298 UART: [art] SIG.R = EC00FA79EB66FEDB5F7918E56533E36692E56C482AE0FD4C08E3D9B4B66AFA8F6C721BFF1A11D1AC5E449925964C93F2
24,752,628 UART: [art] SIG.S = C12DCCB0CCD4E05893851BA56C612A7783B9E012A49E10809E1FF49F0165BB6E21EC3A0E898498CC4E7CA064D2959206
25,731,417 UART: Caliptra RT
25,732,118 UART: [state] CFI Enabled
25,897,167 UART: [rt] RT listening for mailbox commands...
25,899,677 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,382,164 ready_for_fw is high
3,382,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,118 >>> mbox cmd response: success
14,066,821 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,342,332 UART:
18,342,719 UART: Running Caliptra FMC ...
18,343,919 UART:
18,344,080 UART: [state] CFI Enabled
18,413,193 UART: [fht] FMC Alias Private Key: 7
20,177,700 UART: [art] Extend RT PCRs Done
20,178,913 UART: [art] Lock RT PCRs Done
20,180,489 UART: [art] Populate DV Done
20,185,851 UART: [fht] FMC Alias Private Key: 7
20,187,415 UART: [art] Derive CDI
20,188,181 UART: [art] Store in in slot 0x4
20,246,013 UART: [art] Derive Key Pair
20,247,054 UART: [art] Store priv key in slot 0x5
22,709,744 UART: [art] Derive Key Pair - Done
22,722,575 UART: [art] Signing Cert with AUTHO
22,723,871 UART: RITY.KEYID = 7
24,436,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,668 UART: [art] PUB.X = BBEEA3439FC2574A1CAA7770F02DA4828DE7011F773F24B255F4B686C833DBC6446E3D4B7E67375F3012749C4391BBA0
24,444,919 UART: [art] PUB.Y = 7A46356F1CC3A387C0DB766E5267776493656CDFCDB6EFCB8FD2A02BB0AC0F2AC342F8A1A9842AA5F1B4B0E14EA32965
24,452,189 UART: [art] SIG.R = F9F916EF99B5B0DCBD116017228481A3CF9A9B25AE2046039371300CFBAC4C17BFD108ADAA234916CB7DE7E9F54D5549
24,459,583 UART: [art] SIG.S = 50768D8125DFAF64D6241E33A6F609E52FF53182D2EE10DB5085E97A44268FE1331B7197448251D2327EA876A6AC28D0
25,438,404 UART: Caliptra RT
25,439,100 UART: [state] CFI Enabled
25,604,138 UART: [rt] RT listening for mailbox commands...
25,606,692 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,318 UART:
192,706 UART: Running Caliptra ROM ...
193,820 UART:
603,600 UART: [state] CFI Enabled
619,536 UART: [state] LifecycleState = Unprovisioned
621,339 UART: [state] DebugLocked = No
624,279 UART: [state] WD Timer not started. Device not locked for debugging
628,723 UART: [kat] SHA2-256
807,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,435 UART: [kat] ++
819,920 UART: [kat] sha1
831,569 UART: [kat] SHA2-256
834,578 UART: [kat] SHA2-384
841,086 UART: [kat] SHA2-512-ACC
844,066 UART: [kat] ECC-384
3,284,673 UART: [kat] HMAC-384Kdf
3,298,283 UART: [kat] LMS
3,827,809 UART: [kat] --
3,830,540 UART: [cold-reset] ++
3,831,969 UART: [fht] FHT @ 0x50003400
3,843,293 UART: [idev] ++
3,843,845 UART: [idev] CDI.KEYID = 6
3,844,718 UART: [idev] SUBJECT.KEYID = 7
3,845,948 UART: [idev] UDS.KEYID = 0
3,846,870 ready_for_fw is high
3,847,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,255 UART: [idev] Erasing UDS.KEYID = 0
6,324,046 UART: [idev] Sha1 KeyId Algorithm
6,346,905 UART: [idev] --
6,350,353 UART: [ldev] ++
6,350,917 UART: [ldev] CDI.KEYID = 6
6,351,788 UART: [ldev] SUBJECT.KEYID = 5
6,352,991 UART: [ldev] AUTHORITY.KEYID = 7
6,354,273 UART: [ldev] FE.KEYID = 1
6,366,326 UART: [ldev] Erasing FE.KEYID = 1
8,839,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,978 UART: [ldev] --
10,631,340 UART: [fwproc] Wait for Commands...
10,634,121 UART: [fwproc] Recv command 0x46574c44
10,636,202 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,002 >>> mbox cmd response: success
14,500,554 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,505,065 UART: [afmc] ++
14,505,665 UART: [afmc] CDI.KEYID = 6
14,506,543 UART: [afmc] SUBJECT.KEYID = 7
14,507,750 UART: [afmc] AUTHORITY.KEYID = 5
17,008,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,341 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,101 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,880 UART: [afmc] --
18,805,253 UART: [cold-reset] --
18,809,105 UART: [state] Locking Datavault
18,814,397 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,084 UART: [state] Locking ICCM
18,817,580 UART: [exit] Launching FMC @ 0x40000130
18,825,976 UART:
18,826,228 UART: Running Caliptra FMC ...
18,827,325 UART:
18,827,477 UART: [state] CFI Enabled
18,835,836 UART: [fht] FMC Alias Private Key: 7
20,592,825 UART: [art] Extend RT PCRs Done
20,594,036 UART: [art] Lock RT PCRs Done
20,595,609 UART: [art] Populate DV Done
20,601,115 UART: [fht] FMC Alias Private Key: 7
20,602,664 UART: [art] Derive CDI
20,603,395 UART: [art] Store in in slot 0x4
20,645,706 UART: [art] Derive Key Pair
20,646,695 UART: [art] Store priv key in slot 0x5
23,073,077 UART: [art] Derive Key Pair - Done
23,086,076 UART: [art] Signing Cert with AUTHO
23,087,411 UART: RITY.KEYID = 7
24,792,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,445 UART: [art] PUB.X = 87B7577FA86D1F4DD8E8966623DD5EF8CEF33516817237E4F734B1F15E7738439623C815B2224D1B84654A3B18C9F997
24,801,683 UART: [art] PUB.Y = 3C464423D505D13681EBE17F5F50421AACDBD6D57C9CC5FBC38BF289718B46E50C77F8398868B71C469CD77EC0FD73E6
24,808,958 UART: [art] SIG.R = EDE08A17ECFEB582C98CD26353B3FA5623750E1A5EE04913E934B36027A109C78DCE56CD2630CA05F547AFE984B333E4
24,816,387 UART: [art] SIG.S = 5A4EB6E2E2FCBED02731434992798A11F4EBDA3C064C9491B3B86994005B0AF1E63092C3A7CD5F12E4080693CC107371
25,795,882 UART: Caliptra RT
25,796,723 UART: [state] CFI Enabled
25,913,676 UART: [rt] RT listening for mailbox commands...
25,916,120 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,692,307 ready_for_fw is high
3,692,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,772 >>> mbox cmd response: success
14,271,607 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,518,961 UART:
18,519,371 UART: Running Caliptra FMC ...
18,520,500 UART:
18,520,645 UART: [state] CFI Enabled
18,528,463 UART: [fht] FMC Alias Private Key: 7
20,285,455 UART: [art] Extend RT PCRs Done
20,286,685 UART: [art] Lock RT PCRs Done
20,288,632 UART: [art] Populate DV Done
20,293,950 UART: [fht] FMC Alias Private Key: 7
20,295,654 UART: [art] Derive CDI
20,296,462 UART: [art] Store in in slot 0x4
20,339,028 UART: [art] Derive Key Pair
20,340,065 UART: [art] Store priv key in slot 0x5
22,767,027 UART: [art] Derive Key Pair - Done
22,780,082 UART: [art] Signing Cert with AUTHO
22,781,388 UART: RITY.KEYID = 7
24,486,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,413 UART: [art] PUB.X = CD2BF926427BA4D9E3008F8BACB58C20BDAD2F68CDAD2F350D909800876DB15B3E47C702CA6BA06BA693D7BC2482260B
24,495,653 UART: [art] PUB.Y = B5E9FC3BD52D387074864B4940DFD4AA9E75D69D8F97EFB27556EA81AD2F0B5A7F1E0875A8CBC14993D3482DC462368D
24,502,945 UART: [art] SIG.R = 535D3D6271EF8ED6B2F332A8F9685F3CB04C832EED79F725D1DB6EBA31990FD932EE5DFC507BE1753543901A5747FA77
24,510,340 UART: [art] SIG.S = 1F7C77467B9291B5A6A52341259C93570871505CFA1091A716BE3A409C71A0A61CFCC2C62D33AB00B023E6EF3708A884
25,489,002 UART: Caliptra RT
25,489,712 UART: [state] CFI Enabled
25,607,751 UART: [rt] RT listening for mailbox commands...
25,610,169 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,283 UART:
192,646 UART: Running Caliptra ROM ...
193,839 UART:
193,995 UART: [state] CFI Enabled
262,251 UART: [state] LifecycleState = Unprovisioned
264,639 UART: [state] DebugLocked = No
266,383 UART: [state] WD Timer not started. Device not locked for debugging
270,759 UART: [kat] SHA2-256
460,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,456 UART: [kat] ++
471,930 UART: [kat] sha1
482,610 UART: [kat] SHA2-256
485,675 UART: [kat] SHA2-384
491,672 UART: [kat] SHA2-512-ACC
494,201 UART: [kat] ECC-384
2,946,776 UART: [kat] HMAC-384Kdf
2,972,674 UART: [kat] LMS
3,504,441 UART: [kat] --
3,507,322 UART: [cold-reset] ++
3,508,974 UART: [fht] FHT @ 0x50003400
3,519,693 UART: [idev] ++
3,520,364 UART: [idev] CDI.KEYID = 6
3,521,317 UART: [idev] SUBJECT.KEYID = 7
3,522,553 UART: [idev] UDS.KEYID = 0
3,523,488 ready_for_fw is high
3,523,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,540 UART: [idev] Erasing UDS.KEYID = 0
6,027,895 UART: [idev] Sha1 KeyId Algorithm
6,049,480 UART: [idev] --
6,055,046 UART: [ldev] ++
6,055,750 UART: [ldev] CDI.KEYID = 6
6,056,669 UART: [ldev] SUBJECT.KEYID = 5
6,057,833 UART: [ldev] AUTHORITY.KEYID = 7
6,059,010 UART: [ldev] FE.KEYID = 1
6,101,111 UART: [ldev] Erasing FE.KEYID = 1
8,606,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,701 UART: [ldev] --
10,415,352 UART: [fwproc] Wait for Commands...
10,418,038 UART: [fwproc] Recv command 0x46574c44
10,420,346 UART: [fwproc] Recv'd Img size: 114448 bytes
13,878,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,618,215 >>> mbox cmd response: success
14,618,732 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,622,161 UART: [afmc] ++
14,622,857 UART: [afmc] CDI.KEYID = 6
14,624,094 UART: [afmc] SUBJECT.KEYID = 7
14,625,529 UART: [afmc] AUTHORITY.KEYID = 5
17,172,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,915,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,917,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,932,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,947,815 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,962,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,985,650 UART: [afmc] --
18,988,709 UART: [cold-reset] --
18,992,572 UART: [state] Locking Datavault
18,997,035 UART: [state] Locking PCR0, PCR1 and PCR31
18,999,180 UART: [state] Locking ICCM
19,001,549 UART: [exit] Launching FMC @ 0x40000130
19,010,178 UART:
19,010,412 UART: Running Caliptra FMC ...
19,011,447 UART:
19,011,599 UART: [state] CFI Enabled
19,072,040 UART: [fht] FMC Alias Private Key: 7
20,835,816 UART: [art] Extend RT PCRs Done
20,837,040 UART: [art] Lock RT PCRs Done
20,838,772 UART: [art] Populate DV Done
20,844,505 UART: [fht] FMC Alias Private Key: 7
20,845,981 UART: [art] Derive CDI
20,846,745 UART: [art] Store in in slot 0x4
20,904,081 UART: [art] Derive Key Pair
20,905,125 UART: [art] Store priv key in slot 0x5
23,368,158 UART: [art] Derive Key Pair - Done
23,381,414 UART: [art] Signing Cert with AUTHO
23,382,711 UART: RITY.KEYID = 7
25,093,202 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,720 UART: [art] PUB.X = E0817F8833A607BC09A3C14B33C3E51E61EDD409E565C65169604F37C9057B61E374A24D7BE3DEC6BFCC8993F6EB6D88
25,101,968 UART: [art] PUB.Y = 47ED31F457FA51EA1665B07115C57C73D01E659241F7FA6DEA55D19F632E561FF527F9FF57A74185549E37770A3F651A
25,109,260 UART: [art] SIG.R = 72B7F5EF542EAD4E087E4471B5418523AB0A74F1375901B9057829C28D649BCC5DF01C31A9A732E27CCF8A89E3A9970C
25,116,654 UART: [art] SIG.S = D64672F27B9D129EECDD4B81AF6EFAA1F7855566BFAAC1D71A0444B334C0F7D94A575DB05CF3D893C056A17963457FC3
26,095,674 UART: Caliptra RT
26,096,382 UART: [state] CFI Enabled
26,262,173 UART: [rt] RT listening for mailbox commands...
26,264,621 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,436,259 ready_for_fw is high
3,436,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,033 >>> mbox cmd response: success
14,731,906 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,022,306 UART:
19,022,690 UART: Running Caliptra FMC ...
19,023,829 UART:
19,023,993 UART: [state] CFI Enabled
19,092,715 UART: [fht] FMC Alias Private Key: 7
20,856,521 UART: [art] Extend RT PCRs Done
20,857,915 UART: [art] Lock RT PCRs Done
20,859,331 UART: [art] Populate DV Done
20,864,958 UART: [fht] FMC Alias Private Key: 7
20,866,460 UART: [art] Derive CDI
20,867,272 UART: [art] Store in in slot 0x4
20,925,099 UART: [art] Derive Key Pair
20,926,102 UART: [art] Store priv key in slot 0x5
23,389,284 UART: [art] Derive Key Pair - Done
23,402,246 UART: [art] Signing Cert with AUTHO
23,403,550 UART: RITY.KEYID = 7
25,114,204 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,715 UART: [art] PUB.X = 47224FB3C4B06A52F6981325BB4F9A61177F05AF6879BF5EFE9C88A0F759B53AEEB07A75E300DC923FCA58E5C8F5CE91
25,122,964 UART: [art] PUB.Y = 8060794A3076612DCF23B5287EBE4CF38B8AE7934C2AED5B9E9CA2B8576504570D0F2CBF8296B78602E4A6AFC4DDA3F3
25,130,229 UART: [art] SIG.R = 4518481413B15F671DFD79193C5380B148F7288AA680D809F73DD0B5AA80D39E67275ED761F7BB0CB4071A4EAC9654CD
25,137,614 UART: [art] SIG.S = 890D88F8285BEE40DF3CA09630E8DEC259C51B626C285713C22D1797911E85F33FFA625C1B8DE303E28D4F1BADB1F108
26,116,735 UART: Caliptra RT
26,117,426 UART: [state] CFI Enabled
26,281,606 UART: [rt] RT listening for mailbox commands...
26,284,217 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,453 UART:
192,823 UART: Running Caliptra ROM ...
193,914 UART:
603,489 UART: [state] CFI Enabled
616,004 UART: [state] LifecycleState = Unprovisioned
618,386 UART: [state] DebugLocked = No
620,406 UART: [state] WD Timer not started. Device not locked for debugging
624,868 UART: [kat] SHA2-256
814,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,541 UART: [kat] ++
826,137 UART: [kat] sha1
836,821 UART: [kat] SHA2-256
839,787 UART: [kat] SHA2-384
846,622 UART: [kat] SHA2-512-ACC
849,273 UART: [kat] ECC-384
3,291,731 UART: [kat] HMAC-384Kdf
3,305,286 UART: [kat] LMS
3,837,130 UART: [kat] --
3,841,995 UART: [cold-reset] ++
3,844,352 UART: [fht] FHT @ 0x50003400
3,856,166 UART: [idev] ++
3,856,863 UART: [idev] CDI.KEYID = 6
3,857,808 UART: [idev] SUBJECT.KEYID = 7
3,859,057 UART: [idev] UDS.KEYID = 0
3,859,959 ready_for_fw is high
3,860,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,008 UART: [idev] Erasing UDS.KEYID = 0
6,341,515 UART: [idev] Sha1 KeyId Algorithm
6,364,052 UART: [idev] --
6,368,623 UART: [ldev] ++
6,369,304 UART: [ldev] CDI.KEYID = 6
6,370,222 UART: [ldev] SUBJECT.KEYID = 5
6,371,372 UART: [ldev] AUTHORITY.KEYID = 7
6,372,591 UART: [ldev] FE.KEYID = 1
6,385,006 UART: [ldev] Erasing FE.KEYID = 1
8,864,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,308 UART: [ldev] --
10,655,938 UART: [fwproc] Wait for Commands...
10,658,399 UART: [fwproc] Recv command 0x46574c44
10,660,701 UART: [fwproc] Recv'd Img size: 114448 bytes
14,113,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,853,244 >>> mbox cmd response: success
14,853,757 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,857,891 UART: [afmc] ++
14,858,582 UART: [afmc] CDI.KEYID = 6
14,859,814 UART: [afmc] SUBJECT.KEYID = 7
14,861,334 UART: [afmc] AUTHORITY.KEYID = 5
17,365,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,105,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,120,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,135,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,483 UART: [afmc] --
19,162,731 UART: [cold-reset] --
19,167,728 UART: [state] Locking Datavault
19,173,024 UART: [state] Locking PCR0, PCR1 and PCR31
19,175,219 UART: [state] Locking ICCM
19,178,117 UART: [exit] Launching FMC @ 0x40000130
19,186,776 UART:
19,187,003 UART: Running Caliptra FMC ...
19,188,099 UART:
19,188,254 UART: [state] CFI Enabled
19,196,347 UART: [fht] FMC Alias Private Key: 7
20,953,724 UART: [art] Extend RT PCRs Done
20,954,959 UART: [art] Lock RT PCRs Done
20,956,929 UART: [art] Populate DV Done
20,962,116 UART: [fht] FMC Alias Private Key: 7
20,963,592 UART: [art] Derive CDI
20,964,343 UART: [art] Store in in slot 0x4
21,007,034 UART: [art] Derive Key Pair
21,008,073 UART: [art] Store priv key in slot 0x5
23,434,673 UART: [art] Derive Key Pair - Done
23,447,391 UART: [art] Signing Cert with AUTHO
23,448,684 UART: RITY.KEYID = 7
25,154,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,677 UART: [art] PUB.X = 505BDB780E15C9D71880FF31BFF4C5426C6763EF2F66984CFC389C9C42FE374520946A47048150AFD0F05A22E05A2222
25,162,909 UART: [art] PUB.Y = CB48681BD3C7C1649843D98E5F02F8FB47DEDA8B1E1EDC09538F2A612C253851255C3856BEBB95B454AB6F21934A76C7
25,170,178 UART: [art] SIG.R = 4AC6588A17F559AD9917B482A5269995DDA0A79C60022F6ED331596F1D51A94BF542FCC71A50086BAB2C94C592BDB2D3
25,177,603 UART: [art] SIG.S = CE84FB8647775E3279DDA4F8ADBD0A4F57C3780FDC5FAEC2E76AACE800522E9029DCF36E15CA4FC12580E974750BDE36
26,157,213 UART: Caliptra RT
26,157,916 UART: [state] CFI Enabled
26,275,018 UART: [rt] RT listening for mailbox commands...
26,277,362 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
3,755,387 ready_for_fw is high
3,756,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,942 >>> mbox cmd response: success
14,954,621 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,209,548 UART:
19,209,940 UART: Running Caliptra FMC ...
19,211,069 UART:
19,211,222 UART: [state] CFI Enabled
19,219,110 UART: [fht] FMC Alias Private Key: 7
20,976,271 UART: [art] Extend RT PCRs Done
20,977,501 UART: [art] Lock RT PCRs Done
20,979,125 UART: [art] Populate DV Done
20,984,532 UART: [fht] FMC Alias Private Key: 7
20,986,170 UART: [art] Derive CDI
20,986,902 UART: [art] Store in in slot 0x4
21,029,537 UART: [art] Derive Key Pair
21,030,547 UART: [art] Store priv key in slot 0x5
23,457,166 UART: [art] Derive Key Pair - Done
23,470,211 UART: [art] Signing Cert with AUTHO
23,471,558 UART: RITY.KEYID = 7
25,176,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,242 UART: [art] PUB.X = 8CD6C723E77E88FF3537FAA663688EAE529D634D883BC82B1AEBB6205122FD0462B721B52CF40054F12DC103FC02308E
25,185,475 UART: [art] PUB.Y = A275FD35D93350435547CA2517394D26B21B9CE3683BF856045B007CBD9277B1BE508BDEF9C97A6539287B813E27AA38
25,192,722 UART: [art] SIG.R = 3361D06197544353957A8F19E1C699669F985A1F2D858D8244D8197371A480A7DF69D04C09DE0C86B7CAB1A002BF01E9
25,200,099 UART: [art] SIG.S = 4648F740BA7E390830175B4AF8FAD943E732A73CBDC243FC5CDF992CF6F27F1C2BC1636126285EAC243605C4A8010D6A
26,179,119 UART: Caliptra RT
26,179,812 UART: [state] CFI Enabled
26,297,207 UART: [rt] RT listening for mailbox commands...
26,299,757 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,231 UART:
192,608 UART: Running Caliptra ROM ...
193,812 UART:
193,963 UART: [state] CFI Enabled
263,401 UART: [state] LifecycleState = Unprovisioned
265,320 UART: [state] DebugLocked = No
266,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,133 UART: [kat] SHA2-256
441,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,345 UART: [kat] ++
452,834 UART: [kat] sha1
464,563 UART: [kat] SHA2-256
467,217 UART: [kat] SHA2-384
473,561 UART: [kat] SHA2-512-ACC
475,921 UART: [kat] ECC-384
2,768,593 UART: [kat] HMAC-384Kdf
2,800,027 UART: [kat] LMS
3,990,319 UART: [kat] --
3,996,918 UART: [cold-reset] ++
3,998,461 UART: [fht] Storing FHT @ 0x50003400
4,009,242 UART: [idev] ++
4,009,818 UART: [idev] CDI.KEYID = 6
4,010,737 UART: [idev] SUBJECT.KEYID = 7
4,011,985 UART: [idev] UDS.KEYID = 0
4,013,052 ready_for_fw is high
4,013,262 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,693 UART: [idev] Erasing UDS.KEYID = 0
7,347,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,362 UART: [idev] --
7,372,894 UART: [ldev] ++
7,373,467 UART: [ldev] CDI.KEYID = 6
7,374,405 UART: [ldev] SUBJECT.KEYID = 5
7,375,668 UART: [ldev] AUTHORITY.KEYID = 7
7,376,918 UART: [ldev] FE.KEYID = 1
7,424,375 UART: [ldev] Erasing FE.KEYID = 1
10,757,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,987 UART: [ldev] --
13,138,478 UART: [fwproc] Waiting for Commands...
13,141,706 UART: [fwproc] Received command 0x46574c44
13,143,940 UART: [fwproc] Received Image of size 114124 bytes
17,202,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,350,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,667,725 >>> mbox cmd response: success
17,668,255 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,671,395 UART: [afmc] ++
17,671,987 UART: [afmc] CDI.KEYID = 6
17,672,927 UART: [afmc] SUBJECT.KEYID = 7
17,674,142 UART: [afmc] AUTHORITY.KEYID = 5
21,030,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,461 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,857 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,703 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,136 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,400,163 UART: [afmc] --
23,404,730 UART: [cold-reset] --
23,410,484 UART: [state] Locking Datavault
23,416,980 UART: [state] Locking PCR0, PCR1 and PCR31
23,418,735 UART: [state] Locking ICCM
23,419,911 UART: [exit] Launching FMC @ 0x40000130
23,428,270 UART:
23,428,512 UART: Running Caliptra FMC ...
23,429,609 UART:
23,429,769 UART: [state] CFI Enabled
23,492,539 UART: [fht] FMC Alias Private Key: 7
25,831,072 UART: [art] Extend RT PCRs Done
25,832,305 UART: [art] Lock RT PCRs Done
25,833,775 UART: [art] Populate DV Done
25,839,415 UART: [fht] FMC Alias Private Key: 7
25,840,996 UART: [art] Derive CDI
25,841,820 UART: [art] Store in in slot 0x4
25,901,211 UART: [art] Derive Key Pair
25,902,212 UART: [art] Store priv key in slot 0x5
29,195,109 UART: [art] Derive Key Pair - Done
29,208,039 UART: [art] Signing Cert with AUTHO
29,209,372 UART: RITY.KEYID = 7
31,497,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,886 UART: [art] PUB.X = B6E0CC8EA8C3F3C41EF64B77BC6EA064723E3F4D5186077CA1BF84FE538CACE04C2593C76DFF53B13DE4519DDE606CDC
31,506,150 UART: [art] PUB.Y = 3705E84F174A2AF51001F4200FCDA7B856DCF421B9E1D9897FED60DD61022988D6E5B50B74F605B5CB9FBBABD3BBE96C
31,513,391 UART: [art] SIG.R = 152ACE7B547A668EBC226D7189C8A72D62E4089AA4EEB7D861DCF745AC6705F8D3606E156BF478FC523F276E84A72B4B
31,520,826 UART: [art] SIG.S = 321FE0F05EC29B8EB7DAA64082398147BE83F90F449121C7F1D80680316DAB5D56B637214CB16E7E56C98C27D2BF0376
32,825,454 UART: Caliptra RT
32,826,172 UART: [state] CFI Enabled
32,987,281 UART: [rt] RT listening for mailbox commands...
33,018,535 UART: [rt]cmd =0xaabbccdd, len=4
33,019,888 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,782,341 ready_for_fw is high
3,782,790 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,834,488 >>> mbox cmd response: success
17,835,267 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,527,636 UART:
23,528,027 UART: Running Caliptra FMC ...
23,529,229 UART:
23,529,393 UART: [state] CFI Enabled
23,595,831 UART: [fht] FMC Alias Private Key: 7
25,934,468 UART: [art] Extend RT PCRs Done
25,935,702 UART: [art] Lock RT PCRs Done
25,937,333 UART: [art] Populate DV Done
25,942,798 UART: [fht] FMC Alias Private Key: 7
25,944,356 UART: [art] Derive CDI
25,945,178 UART: [art] Store in in slot 0x4
26,004,908 UART: [art] Derive Key Pair
26,005,975 UART: [art] Store priv key in slot 0x5
29,298,674 UART: [art] Derive Key Pair - Done
29,311,512 UART: [art] Signing Cert with AUTHO
29,312,815 UART: RITY.KEYID = 7
31,600,769 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,273 UART: [art] PUB.X = FFFEB25DB5E17BF775E7E74766359B998D82D65F047CC3B920D2CE21ED34C0A16CE2B7651AE759D6F05FEA97B5EC5B53
31,609,554 UART: [art] PUB.Y = E3F09D2F41581E0A3AEF309AA223CA92321EC0E07232E6A2F25BB08BDF21AE4F63954840285CE2722D4AE6A440DC30D3
31,616,802 UART: [art] SIG.R = 0B0ED528C11C7E005E4B226274F9A9FD1A093A6B3FDD77FC929F5F2DD42EFE00720A8C572804A78BEAA3094D99FCA833
31,624,143 UART: [art] SIG.S = AB8A4C27A66AA45C8AFB6AC2A6E5CC80D4A712C6756F7DB6BF69CEE7F4910812A1632DDA62567B62522AAE89006F8FBF
32,929,070 UART: Caliptra RT
32,929,790 UART: [state] CFI Enabled
33,092,259 UART: [rt] RT listening for mailbox commands...
33,123,678 UART: [rt]cmd =0xaabbccdd, len=4
33,125,155 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,330 UART:
192,692 UART: Running Caliptra ROM ...
193,827 UART:
603,405 UART: [state] CFI Enabled
616,647 UART: [state] LifecycleState = Unprovisioned
618,573 UART: [state] DebugLocked = No
620,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,332 UART: [kat] SHA2-256
795,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,618 UART: [kat] ++
806,062 UART: [kat] sha1
816,787 UART: [kat] SHA2-256
819,508 UART: [kat] SHA2-384
824,357 UART: [kat] SHA2-512-ACC
826,718 UART: [kat] ECC-384
3,111,112 UART: [kat] HMAC-384Kdf
3,122,223 UART: [kat] LMS
4,312,383 UART: [kat] --
4,316,121 UART: [cold-reset] ++
4,318,624 UART: [fht] Storing FHT @ 0x50003400
4,331,094 UART: [idev] ++
4,331,669 UART: [idev] CDI.KEYID = 6
4,332,577 UART: [idev] SUBJECT.KEYID = 7
4,333,885 UART: [idev] UDS.KEYID = 0
4,334,838 ready_for_fw is high
4,335,060 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,503 UART: [idev] Erasing UDS.KEYID = 0
7,620,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,955 UART: [idev] --
7,647,659 UART: [ldev] ++
7,648,274 UART: [ldev] CDI.KEYID = 6
7,649,211 UART: [ldev] SUBJECT.KEYID = 5
7,650,418 UART: [ldev] AUTHORITY.KEYID = 7
7,651,696 UART: [ldev] FE.KEYID = 1
7,663,934 UART: [ldev] Erasing FE.KEYID = 1
10,953,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,825 UART: [ldev] --
13,314,786 UART: [fwproc] Waiting for Commands...
13,317,414 UART: [fwproc] Received command 0x46574c44
13,319,641 UART: [fwproc] Received Image of size 114124 bytes
17,374,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,840 >>> mbox cmd response: success
17,840,430 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,843,267 UART: [afmc] ++
17,843,850 UART: [afmc] CDI.KEYID = 6
17,844,869 UART: [afmc] SUBJECT.KEYID = 7
17,846,020 UART: [afmc] AUTHORITY.KEYID = 5
21,158,294 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,943 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,334 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,184 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,616 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,272 UART: [afmc] --
23,524,452 UART: [cold-reset] --
23,529,281 UART: [state] Locking Datavault
23,535,764 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,511 UART: [state] Locking ICCM
23,539,496 UART: [exit] Launching FMC @ 0x40000130
23,547,883 UART:
23,548,107 UART: Running Caliptra FMC ...
23,549,200 UART:
23,549,364 UART: [state] CFI Enabled
23,557,622 UART: [fht] FMC Alias Private Key: 7
25,888,938 UART: [art] Extend RT PCRs Done
25,890,160 UART: [art] Lock RT PCRs Done
25,892,133 UART: [art] Populate DV Done
25,897,609 UART: [fht] FMC Alias Private Key: 7
25,899,305 UART: [art] Derive CDI
25,900,111 UART: [art] Store in in slot 0x4
25,942,856 UART: [art] Derive Key Pair
25,943,849 UART: [art] Store priv key in slot 0x5
29,186,444 UART: [art] Derive Key Pair - Done
29,199,439 UART: [art] Signing Cert with AUTHO
29,200,734 UART: RITY.KEYID = 7
31,480,371 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,877 UART: [art] PUB.X = B6EA38A798B03E6397DCECD778239BE7055B1321736F011CBC0BC0A6F61DA0BB68F5CFD47062883C85C434A0E517F54E
31,489,190 UART: [art] PUB.Y = 601A5D60F3CA53BE7958BAE3106BEBC2FB5529C81F86DA977BD12077BDF1253CA622444DDEAED60A22AFAD9334F6FF98
31,496,374 UART: [art] SIG.R = FBF15ABDCDB760E1672E8BAC5D1372683A2D98528CBE24B98D4BD7DC7D69D9754DE27A2B36FBC21849BA18AACA97D409
31,503,821 UART: [art] SIG.S = E2522BAEE885A0C6894F06DC2EC8E21D1E382C9C27BFB4C28772D405F532F7CF329156E118CBB35127AC97EBEC779B4C
32,808,957 UART: Caliptra RT
32,809,670 UART: [state] CFI Enabled
32,927,666 UART: [rt] RT listening for mailbox commands...
32,959,158 UART: [rt]cmd =0xaabbccdd, len=4
32,960,604 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,126,627 ready_for_fw is high
4,127,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,451 >>> mbox cmd response: success
18,081,276 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,720,523 UART:
23,720,911 UART: Running Caliptra FMC ...
23,722,047 UART:
23,722,199 UART: [state] CFI Enabled
23,730,406 UART: [fht] FMC Alias Private Key: 7
26,061,328 UART: [art] Extend RT PCRs Done
26,062,562 UART: [art] Lock RT PCRs Done
26,064,562 UART: [art] Populate DV Done
26,070,195 UART: [fht] FMC Alias Private Key: 7
26,071,893 UART: [art] Derive CDI
26,072,631 UART: [art] Store in in slot 0x4
26,115,389 UART: [art] Derive Key Pair
26,116,394 UART: [art] Store priv key in slot 0x5
29,358,552 UART: [art] Derive Key Pair - Done
29,371,282 UART: [art] Signing Cert with AUTHO
29,372,580 UART: RITY.KEYID = 7
31,652,444 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,959 UART: [art] PUB.X = E8F32185838D79EBEC45585CC99C9FAC929674A750DB84DF37FFE6DA3ACC4C33EF2C4EA32DFC93DD928BBB6D583A98CA
31,661,206 UART: [art] PUB.Y = A09681EB56A4A684990A563D72A74E6AE943F72F0555A13311C1F5481AE033560B224714FC2EDA789ACB1FF8B190AA6C
31,668,444 UART: [art] SIG.R = C945DCAD478A25DF3F7D5D9D3CE00EE9F86785571EAF55F8358E1C40EF70DC00899B022AC8F230725FF21E5695085BA7
31,675,832 UART: [art] SIG.S = A761D2E29CCBE0B5F4C096AD7CCCC92371B4392BA02678B64593E29D3A41CE6111DFE93BB4ECF95F97637166974260CE
32,980,856 UART: Caliptra RT
32,981,573 UART: [state] CFI Enabled
33,098,276 UART: [rt] RT listening for mailbox commands...
33,129,470 UART: [rt]cmd =0xaabbccdd, len=4
33,130,841 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,073 UART:
192,441 UART: Running Caliptra ROM ...
193,663 UART:
193,828 UART: [state] CFI Enabled
264,704 UART: [state] LifecycleState = Unprovisioned
266,618 UART: [state] DebugLocked = No
268,788 UART: [state] WD Timer not started. Device not locked for debugging
273,323 UART: [kat] SHA2-256
452,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,984 UART: [kat] ++
464,514 UART: [kat] sha1
475,843 UART: [kat] SHA2-256
478,911 UART: [kat] SHA2-384
484,977 UART: [kat] SHA2-512-ACC
487,982 UART: [kat] ECC-384
2,942,531 UART: [kat] HMAC-384Kdf
2,964,937 UART: [kat] LMS
3,494,351 UART: [kat] --
3,498,312 UART: [cold-reset] ++
3,500,752 UART: [fht] FHT @ 0x50003400
3,511,446 UART: [idev] ++
3,512,008 UART: [idev] CDI.KEYID = 6
3,512,927 UART: [idev] SUBJECT.KEYID = 7
3,514,149 UART: [idev] UDS.KEYID = 0
3,515,082 ready_for_fw is high
3,515,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,659,057 UART: [idev] Erasing UDS.KEYID = 0
6,020,366 UART: [idev] Sha1 KeyId Algorithm
6,043,265 UART: [idev] --
6,047,045 UART: [ldev] ++
6,047,618 UART: [ldev] CDI.KEYID = 6
6,048,533 UART: [ldev] SUBJECT.KEYID = 5
6,049,694 UART: [ldev] AUTHORITY.KEYID = 7
6,050,925 UART: [ldev] FE.KEYID = 1
6,091,630 UART: [ldev] Erasing FE.KEYID = 1
8,593,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,076 UART: [ldev] --
10,405,946 UART: [fwproc] Wait for Commands...
10,408,848 UART: [fwproc] Recv command 0x46574c44
10,410,884 UART: [fwproc] Recv'd Img size: 114448 bytes
13,809,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,269,019 >>> mbox cmd response: success
14,269,532 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,273,270 UART: [afmc] ++
14,273,868 UART: [afmc] CDI.KEYID = 6
14,274,777 UART: [afmc] SUBJECT.KEYID = 7
14,275,936 UART: [afmc] AUTHORITY.KEYID = 5
16,800,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,597,408 UART: [afmc] --
18,601,281 UART: [cold-reset] --
18,604,546 UART: [state] Locking Datavault
18,607,142 UART: [state] Locking PCR0, PCR1 and PCR31
18,608,781 UART: [state] Locking ICCM
18,610,065 UART: [exit] Launching FMC @ 0x40000130
18,618,461 UART:
18,618,718 UART: Running Caliptra FMC ...
18,619,820 UART:
18,619,978 UART: [state] CFI Enabled
18,685,061 UART: [fht] FMC Alias Private Key: 7
20,448,971 UART: [art] Extend RT PCRs Done
20,450,180 UART: [art] Lock RT PCRs Done
20,451,962 UART: [art] Populate DV Done
20,457,429 UART: [fht] FMC Alias Private Key: 7
20,459,017 UART: [art] Derive CDI
20,459,829 UART: [art] Store in in slot 0x4
20,518,028 UART: [art] Derive Key Pair
20,519,063 UART: [art] Store priv key in slot 0x5
22,981,625 UART: [art] Derive Key Pair - Done
22,994,505 UART: [art] Signing Cert with AUTHO
22,995,800 UART: RITY.KEYID = 7
24,708,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,587 UART: [art] PUB.X = 1FE87DE64AEF06D68A6663F5D3B70185B2DBF7A60FF7C434F27AFA14159666A286F29C8C9CA2B30FBD200DE8C5A98A03
24,716,854 UART: [art] PUB.Y = C768665FF762E161EBAB9D0652865A93F2597C5FA6399A2787A59BE3AE4A1A03AD5CFC7B8A817CA124A49E91D4AE3F5D
24,724,097 UART: [art] SIG.R = A772F40F9C0D08198A2D782BCD8BB2C278F172AF03A9EFC87478203064C1AE1176A43AA83EEA1352AF8A27D97DCED6B4
24,731,548 UART: [art] SIG.S = D3DAD3BE4573E42F2007CAE0B224EF6531EAF4BA53F9508991A31BDF1D245703A6196D03325FAADD41B28EEFFDB4E67D
25,710,257 UART: Caliptra RT
25,710,953 UART: [state] CFI Enabled
25,875,240 UART: [rt] RT listening for mailbox commands...
25,906,757 UART: [rt]cmd =0xaabbccdd, len=4
25,908,094 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,382,506 ready_for_fw is high
3,383,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,076,306 >>> mbox cmd response: success
14,076,991 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,365,370 UART:
18,365,753 UART: Running Caliptra FMC ...
18,366,892 UART:
18,367,052 UART: [state] CFI Enabled
18,430,340 UART: [fht] FMC Alias Private Key: 7
20,194,565 UART: [art] Extend RT PCRs Done
20,195,789 UART: [art] Lock RT PCRs Done
20,197,311 UART: [art] Populate DV Done
20,202,616 UART: [fht] FMC Alias Private Key: 7
20,204,233 UART: [art] Derive CDI
20,205,054 UART: [art] Store in in slot 0x4
20,263,218 UART: [art] Derive Key Pair
20,264,253 UART: [art] Store priv key in slot 0x5
22,727,889 UART: [art] Derive Key Pair - Done
22,741,103 UART: [art] Signing Cert with AUTHO
22,742,406 UART: RITY.KEYID = 7
24,453,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,221 UART: [art] PUB.X = 070E332617C1C5A0601FBAD66B2C07295474887443B9B3E2DBAADE7E9B567AC943D38F2957C84181F032296FFBB9CC9B
24,462,227 UART: [art] PUB.Y = A0B7D694E45584F2F731FA8C2C1F7D1132EE9786A77F9144A3AFF96C561A7CB6C97FE73E39C99CB5A6914490A6CFD8BE
24,469,477 UART: [art] SIG.R = 4CFBFEE43163E42CB99CA26FAF1C7D5E431DCB307095697147F68ABDA85291CED9859AF92813C399384E69CEFA107D0D
24,476,880 UART: [art] SIG.S = 856F756B228782589566A7A0D0BEC9299A0847B9784B5C66F0DDDDA88775F561175BE107605BF34248D7B5D6CE71D85F
25,455,917 UART: Caliptra RT
25,456,628 UART: [state] CFI Enabled
25,622,091 UART: [rt] RT listening for mailbox commands...
25,653,314 UART: [rt]cmd =0xaabbccdd, len=4
25,654,641 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,229 UART:
192,607 UART: Running Caliptra ROM ...
193,738 UART:
603,362 UART: [state] CFI Enabled
615,746 UART: [state] LifecycleState = Unprovisioned
617,608 UART: [state] DebugLocked = No
619,630 UART: [state] WD Timer not started. Device not locked for debugging
623,088 UART: [kat] SHA2-256
802,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,763 UART: [kat] ++
814,293 UART: [kat] sha1
825,311 UART: [kat] SHA2-256
828,969 UART: [kat] SHA2-384
835,095 UART: [kat] SHA2-512-ACC
838,045 UART: [kat] ECC-384
3,280,497 UART: [kat] HMAC-384Kdf
3,292,867 UART: [kat] LMS
3,822,298 UART: [kat] --
3,827,428 UART: [cold-reset] ++
3,829,727 UART: [fht] FHT @ 0x50003400
3,841,833 UART: [idev] ++
3,842,394 UART: [idev] CDI.KEYID = 6
3,843,293 UART: [idev] SUBJECT.KEYID = 7
3,844,526 UART: [idev] UDS.KEYID = 0
3,845,442 ready_for_fw is high
3,845,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,518 UART: [idev] Erasing UDS.KEYID = 0
6,314,857 UART: [idev] Sha1 KeyId Algorithm
6,337,770 UART: [idev] --
6,342,192 UART: [ldev] ++
6,342,750 UART: [ldev] CDI.KEYID = 6
6,343,702 UART: [ldev] SUBJECT.KEYID = 5
6,344,903 UART: [ldev] AUTHORITY.KEYID = 7
6,346,122 UART: [ldev] FE.KEYID = 1
6,356,035 UART: [ldev] Erasing FE.KEYID = 1
8,831,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,555 UART: [ldev] --
10,622,763 UART: [fwproc] Wait for Commands...
10,624,633 UART: [fwproc] Recv command 0x46574c44
10,626,717 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,315 >>> mbox cmd response: success
14,500,845 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,505,241 UART: [afmc] ++
14,505,816 UART: [afmc] CDI.KEYID = 6
14,506,735 UART: [afmc] SUBJECT.KEYID = 7
14,507,948 UART: [afmc] AUTHORITY.KEYID = 5
17,009,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,654 UART: [afmc] --
18,806,236 UART: [cold-reset] --
18,809,653 UART: [state] Locking Datavault
18,814,942 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,642 UART: [state] Locking ICCM
18,818,728 UART: [exit] Launching FMC @ 0x40000130
18,827,170 UART:
18,827,398 UART: Running Caliptra FMC ...
18,828,674 UART:
18,828,859 UART: [state] CFI Enabled
18,836,854 UART: [fht] FMC Alias Private Key: 7
20,593,906 UART: [art] Extend RT PCRs Done
20,595,128 UART: [art] Lock RT PCRs Done
20,596,828 UART: [art] Populate DV Done
20,602,337 UART: [fht] FMC Alias Private Key: 7
20,603,812 UART: [art] Derive CDI
20,604,537 UART: [art] Store in in slot 0x4
20,647,223 UART: [art] Derive Key Pair
20,648,216 UART: [art] Store priv key in slot 0x5
23,075,071 UART: [art] Derive Key Pair - Done
23,088,025 UART: [art] Signing Cert with AUTHO
23,089,327 UART: RITY.KEYID = 7
24,794,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,099 UART: [art] PUB.X = CFCCFC3173F1DFD3F16BA5CA1E707B02A6E5D62B133BCAE9CDEC10A2C0230C4FC2FDEEDCEBA61942C80CCB52948A4D34
24,803,460 UART: [art] PUB.Y = E80526E6BB62E234F7A803A6F780CF9B05F239F2918FC161348F05BB4BAD9E0072AFE27B4B5377D8EDAC9224CB5D42A3
24,810,684 UART: [art] SIG.R = 7B9444FFAEEEE491D44F4B48C6CF37F3FA96A30360F9F6079AC8F0FD29B5BADD2C8CB7E6F673B9A118354D1244D5ED13
24,818,064 UART: [art] SIG.S = 4B1FD5FEB83087E6DDA2293C65DE929B161BEF4A575B0CF1E1C8CDBC52BE26B367D5669E8723061ABF931B82D279293D
25,796,794 UART: Caliptra RT
25,797,501 UART: [state] CFI Enabled
25,914,728 UART: [rt] RT listening for mailbox commands...
25,945,975 UART: [rt]cmd =0xaabbccdd, len=4
25,947,305 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,697,589 ready_for_fw is high
3,697,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,145 >>> mbox cmd response: success
14,276,784 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,525,541 UART:
18,525,921 UART: Running Caliptra FMC ...
18,527,007 UART:
18,527,160 UART: [state] CFI Enabled
18,534,949 UART: [fht] FMC Alias Private Key: 7
20,291,854 UART: [art] Extend RT PCRs Done
20,293,085 UART: [art] Lock RT PCRs Done
20,294,594 UART: [art] Populate DV Done
20,299,998 UART: [fht] FMC Alias Private Key: 7
20,301,482 UART: [art] Derive CDI
20,302,216 UART: [art] Store in in slot 0x4
20,344,647 UART: [art] Derive Key Pair
20,345,689 UART: [art] Store priv key in slot 0x5
22,772,502 UART: [art] Derive Key Pair - Done
22,785,602 UART: [art] Signing Cert with AUTHO
22,786,892 UART: RITY.KEYID = 7
24,492,113 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,618 UART: [art] PUB.X = 657BC111F8E24795AC3A8140FA436E3D50316F9C1695C3D1CD6FB552C6BA7FDF857D5131D4190C2DE6D4593577EE97BD
24,500,911 UART: [art] PUB.Y = E776CC42E943529262D76926A1DA0C14D647BBA6CAF5EA60B494F0F0797C7EFF9E55588E297935AC2455BC2F5A254A3F
24,508,161 UART: [art] SIG.R = 9AE7EFF18284165E9DE415F100C9E9C5E88C98EE61CC398024AB3A86F4CAD14BE5941646B218C231936BAD52E9FA3155
24,515,540 UART: [art] SIG.S = FDA145FD20E9DF618D945A6E457AC802B7824C0C919C5EDAD11FC1C026EBE90F7176B6A05AE6BCA2FC2D49E2636502C8
25,494,796 UART: Caliptra RT
25,495,500 UART: [state] CFI Enabled
25,612,380 UART: [rt] RT listening for mailbox commands...
25,643,523 UART: [rt]cmd =0xaabbccdd, len=4
25,644,860 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,106 UART:
192,472 UART: Running Caliptra ROM ...
193,666 UART:
193,819 UART: [state] CFI Enabled
262,437 UART: [state] LifecycleState = Unprovisioned
264,786 UART: [state] DebugLocked = No
266,398 UART: [state] WD Timer not started. Device not locked for debugging
271,284 UART: [kat] SHA2-256
461,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,938 UART: [kat] ++
472,385 UART: [kat] sha1
482,728 UART: [kat] SHA2-256
485,783 UART: [kat] SHA2-384
492,061 UART: [kat] SHA2-512-ACC
494,644 UART: [kat] ECC-384
2,948,493 UART: [kat] HMAC-384Kdf
2,971,955 UART: [kat] LMS
3,503,659 UART: [kat] --
3,507,582 UART: [cold-reset] ++
3,509,868 UART: [fht] FHT @ 0x50003400
3,520,862 UART: [idev] ++
3,521,608 UART: [idev] CDI.KEYID = 6
3,522,527 UART: [idev] SUBJECT.KEYID = 7
3,523,702 UART: [idev] UDS.KEYID = 0
3,524,629 ready_for_fw is high
3,524,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,610 UART: [idev] Erasing UDS.KEYID = 0
6,029,245 UART: [idev] Sha1 KeyId Algorithm
6,051,416 UART: [idev] --
6,057,574 UART: [ldev] ++
6,058,255 UART: [ldev] CDI.KEYID = 6
6,059,194 UART: [ldev] SUBJECT.KEYID = 5
6,060,363 UART: [ldev] AUTHORITY.KEYID = 7
6,061,600 UART: [ldev] FE.KEYID = 1
6,100,212 UART: [ldev] Erasing FE.KEYID = 1
8,606,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,738 UART: [ldev] --
10,414,687 UART: [fwproc] Wait for Commands...
10,416,617 UART: [fwproc] Recv command 0x46574c44
10,418,923 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,660 >>> mbox cmd response: success
14,609,189 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,613,118 UART: [afmc] ++
14,613,817 UART: [afmc] CDI.KEYID = 6
14,615,004 UART: [afmc] SUBJECT.KEYID = 7
14,616,448 UART: [afmc] AUTHORITY.KEYID = 5
17,151,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,352 UART: [afmc] --
18,948,074 UART: [cold-reset] --
18,952,806 UART: [state] Locking Datavault
18,958,235 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,441 UART: [state] Locking ICCM
18,961,797 UART: [exit] Launching FMC @ 0x40000130
18,970,474 UART:
18,970,708 UART: Running Caliptra FMC ...
18,971,807 UART:
18,971,965 UART: [state] CFI Enabled
19,032,939 UART: [fht] FMC Alias Private Key: 7
20,796,701 UART: [art] Extend RT PCRs Done
20,797,922 UART: [art] Lock RT PCRs Done
20,799,252 UART: [art] Populate DV Done
20,804,506 UART: [fht] FMC Alias Private Key: 7
20,805,986 UART: [art] Derive CDI
20,806,722 UART: [art] Store in in slot 0x4
20,865,562 UART: [art] Derive Key Pair
20,866,561 UART: [art] Store priv key in slot 0x5
23,329,741 UART: [art] Derive Key Pair - Done
23,343,028 UART: [art] Signing Cert with AUTHO
23,344,344 UART: RITY.KEYID = 7
25,056,042 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,558 UART: [art] PUB.X = 2DB39B6CDE6F7B0457A3CFE4C5A6EF015E4D77D116BAA45F30CD964B7312EF02DE1D1E252269C860D6B61F8BE9409799
25,064,803 UART: [art] PUB.Y = 14BBCDEE84F8FAEA0B0441C8D0F7684E02B3752121DEBFBCB4B24A960E5E45C817BCCB675AE204B8876982256C9C19E7
25,072,087 UART: [art] SIG.R = 4B8AF16B9F248E21AF68FC25A7A4CFCF937D845546E53FC1CFEF7553DEB911C1594CDF7229EDAC29D158FF29D0EC9BFF
25,079,528 UART: [art] SIG.S = 0D9EAA10600F183EAF9FD64D4614B133FBF790993DAFA9EA4A026131C1F2A53F9EC9BFC97FF0643B2607C3788CE09510
26,058,943 UART: Caliptra RT
26,059,654 UART: [state] CFI Enabled
26,223,893 UART: [rt] RT listening for mailbox commands...
26,255,227 UART: [rt]cmd =0xaabbccdd, len=4
26,256,645 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,438,881 ready_for_fw is high
3,439,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,746,737 >>> mbox cmd response: success
14,747,307 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,048,952 UART:
19,049,335 UART: Running Caliptra FMC ...
19,050,436 UART:
19,050,593 UART: [state] CFI Enabled
19,118,612 UART: [fht] FMC Alias Private Key: 7
20,882,441 UART: [art] Extend RT PCRs Done
20,883,663 UART: [art] Lock RT PCRs Done
20,885,045 UART: [art] Populate DV Done
20,890,466 UART: [fht] FMC Alias Private Key: 7
20,892,071 UART: [art] Derive CDI
20,892,892 UART: [art] Store in in slot 0x4
20,951,327 UART: [art] Derive Key Pair
20,952,365 UART: [art] Store priv key in slot 0x5
23,415,515 UART: [art] Derive Key Pair - Done
23,428,564 UART: [art] Signing Cert with AUTHO
23,429,870 UART: RITY.KEYID = 7
25,141,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,098 UART: [art] PUB.X = 5DE61404964F36832D9F80F7463C0A6518349FEBF24771620C1D7EC1A688855337B7A6143B169ED28ABEA7305ABB0E9B
25,150,346 UART: [art] PUB.Y = 60B18A5C8F97859EA87483CB11B9353C1C841F721517BC302B690597984F7203F80683D1035822B2B6B4D61885556BA8
25,157,566 UART: [art] SIG.R = 602CEFF16983D8DA6872EB162C5E7494D63A7E8A87E7F66DABB13DA04AED5F731CC16E825202A7E0905680EB6DC3B9D9
25,165,022 UART: [art] SIG.S = 956A775CED264DAA7E0C005A281BD6E2A5B395E6D45E828C84B8EFFFAFB9AF9BB1743E3C177B13C02288C6D26FA9FEF8
26,143,920 UART: Caliptra RT
26,144,630 UART: [state] CFI Enabled
26,311,247 UART: [rt] RT listening for mailbox commands...
26,342,932 UART: [rt]cmd =0xaabbccdd, len=4
26,344,268 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,331 UART:
192,706 UART: Running Caliptra ROM ...
193,808 UART:
603,499 UART: [state] CFI Enabled
614,332 UART: [state] LifecycleState = Unprovisioned
616,695 UART: [state] DebugLocked = No
619,072 UART: [state] WD Timer not started. Device not locked for debugging
624,380 UART: [kat] SHA2-256
814,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,048 UART: [kat] ++
825,500 UART: [kat] sha1
836,729 UART: [kat] SHA2-256
839,728 UART: [kat] SHA2-384
844,426 UART: [kat] SHA2-512-ACC
846,993 UART: [kat] ECC-384
3,290,990 UART: [kat] HMAC-384Kdf
3,304,220 UART: [kat] LMS
3,836,042 UART: [kat] --
3,841,003 UART: [cold-reset] ++
3,842,434 UART: [fht] FHT @ 0x50003400
3,853,853 UART: [idev] ++
3,854,547 UART: [idev] CDI.KEYID = 6
3,855,494 UART: [idev] SUBJECT.KEYID = 7
3,856,847 UART: [idev] UDS.KEYID = 0
3,857,795 ready_for_fw is high
3,857,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,636 UART: [idev] Erasing UDS.KEYID = 0
6,333,410 UART: [idev] Sha1 KeyId Algorithm
6,355,062 UART: [idev] --
6,360,059 UART: [ldev] ++
6,360,739 UART: [ldev] CDI.KEYID = 6
6,361,788 UART: [ldev] SUBJECT.KEYID = 5
6,362,882 UART: [ldev] AUTHORITY.KEYID = 7
6,364,047 UART: [ldev] FE.KEYID = 1
6,374,633 UART: [ldev] Erasing FE.KEYID = 1
8,851,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,770 UART: [ldev] --
10,642,454 UART: [fwproc] Wait for Commands...
10,644,868 UART: [fwproc] Recv command 0x46574c44
10,647,167 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,843,144 >>> mbox cmd response: success
14,843,633 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,847,710 UART: [afmc] ++
14,848,400 UART: [afmc] CDI.KEYID = 6
14,849,639 UART: [afmc] SUBJECT.KEYID = 7
14,851,092 UART: [afmc] AUTHORITY.KEYID = 5
17,357,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,403 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,794 UART: [afmc] --
19,154,088 UART: [cold-reset] --
19,159,511 UART: [state] Locking Datavault
19,165,458 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,639 UART: [state] Locking ICCM
19,169,872 UART: [exit] Launching FMC @ 0x40000130
19,178,528 UART:
19,178,766 UART: Running Caliptra FMC ...
19,179,857 UART:
19,180,025 UART: [state] CFI Enabled
19,188,123 UART: [fht] FMC Alias Private Key: 7
20,945,699 UART: [art] Extend RT PCRs Done
20,946,917 UART: [art] Lock RT PCRs Done
20,948,399 UART: [art] Populate DV Done
20,954,124 UART: [fht] FMC Alias Private Key: 7
20,955,866 UART: [art] Derive CDI
20,956,590 UART: [art] Store in in slot 0x4
20,998,901 UART: [art] Derive Key Pair
20,999,933 UART: [art] Store priv key in slot 0x5
23,426,614 UART: [art] Derive Key Pair - Done
23,439,558 UART: [art] Signing Cert with AUTHO
23,440,857 UART: RITY.KEYID = 7
25,146,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,930 UART: [art] PUB.X = 682AC4838170333515603791C671F8D44D4E17BFCF5DFF988C3FF3C9E9BCC32876CD790994347BE82F4466AA9F326867
25,155,223 UART: [art] PUB.Y = 38EE104459B8110631E81E93CB1350DBB755AA17F5F440EB263A2B419C98098E0069AFA73B30D4DF9510B9B72E6C26C1
25,162,459 UART: [art] SIG.R = 697419A776DE0D80B9CD4897CACDBD63BB63F1C96B613FAC04696AF2CC810424A1A2398F8006F3835F161EBCA3A8683B
25,169,835 UART: [art] SIG.S = 1D0F054B2A626E0792275B1D4276EC205C90B026C05927950F5C1494A92C32EF72A2717FE82556741FF5B8DE11F5F3E2
26,148,646 UART: Caliptra RT
26,149,328 UART: [state] CFI Enabled
26,266,659 UART: [rt] RT listening for mailbox commands...
26,297,900 UART: [rt]cmd =0xaabbccdd, len=4
26,299,393 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,758,243 ready_for_fw is high
3,758,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,278 >>> mbox cmd response: success
14,954,910 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,208,688 UART:
19,209,073 UART: Running Caliptra FMC ...
19,210,265 UART:
19,210,423 UART: [state] CFI Enabled
19,218,306 UART: [fht] FMC Alias Private Key: 7
20,974,818 UART: [art] Extend RT PCRs Done
20,976,047 UART: [art] Lock RT PCRs Done
20,977,808 UART: [art] Populate DV Done
20,983,116 UART: [fht] FMC Alias Private Key: 7
20,984,715 UART: [art] Derive CDI
20,985,525 UART: [art] Store in in slot 0x4
21,027,842 UART: [art] Derive Key Pair
21,028,836 UART: [art] Store priv key in slot 0x5
23,455,335 UART: [art] Derive Key Pair - Done
23,468,002 UART: [art] Signing Cert with AUTHO
23,469,304 UART: RITY.KEYID = 7
25,174,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,256 UART: [art] PUB.X = 27C12F031A5E7A0E08BEE0850F1B0481473DA9A663E7835E8F4B62AB3D262DFF35A2C5305692172DD6208908EFA2F8B6
25,183,496 UART: [art] PUB.Y = A52E45566C188E43A01768E46324FE80D5B69A4248E8B80FF9B7B3A9BB0E18CBD0CD8229C63D257C27BB9621AACA86D2
25,190,799 UART: [art] SIG.R = 04C26952A9A6CB00D62A5C62CC79EC91D68E5741DE21AC31C96C881D3B9FD05D01E4B5344781BB3D0ED0D872A2BEFCB1
25,198,229 UART: [art] SIG.S = B3FF4FC425E22D409C84F75EB49BE79EFB5E04D9C56A12E9A998A6E5869793F399BF9DF53E4C4DB19B6A00B8AF906644
26,177,791 UART: Caliptra RT
26,178,498 UART: [state] CFI Enabled
26,296,779 UART: [rt] RT listening for mailbox commands...
26,328,076 UART: [rt]cmd =0xaabbccdd, len=4
26,329,449 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,259 UART: [kat] SHA2-256
882,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,305 UART: [kat] ++
886,457 UART: [kat] sha1
890,879 UART: [kat] SHA2-256
892,817 UART: [kat] SHA2-384
895,554 UART: [kat] SHA2-512-ACC
897,455 UART: [kat] ECC-384
903,018 UART: [kat] HMAC-384Kdf
907,442 UART: [kat] LMS
1,475,638 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,169 UART: [fht] Storing FHT @ 0x50003400
1,480,146 UART: [idev] ++
1,480,314 UART: [idev] CDI.KEYID = 6
1,480,674 UART: [idev] SUBJECT.KEYID = 7
1,481,098 UART: [idev] UDS.KEYID = 0
1,481,443 ready_for_fw is high
1,481,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,924 UART: [idev] Erasing UDS.KEYID = 0
1,505,580 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,162 UART: [idev] --
1,515,149 UART: [ldev] ++
1,515,317 UART: [ldev] CDI.KEYID = 6
1,515,680 UART: [ldev] SUBJECT.KEYID = 5
1,516,106 UART: [ldev] AUTHORITY.KEYID = 7
1,516,569 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,718 UART: [ldev] --
1,587,183 UART: [fwproc] Waiting for Commands...
1,588,008 UART: [fwproc] Received command 0x46574c44
1,588,799 UART: [fwproc] Received Image of size 114448 bytes
2,888,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,932 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,317 >>> mbox cmd response: success
3,081,317 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,082,541 UART: [afmc] ++
3,082,709 UART: [afmc] CDI.KEYID = 6
3,083,071 UART: [afmc] SUBJECT.KEYID = 7
3,083,496 UART: [afmc] AUTHORITY.KEYID = 5
3,118,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,535 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,043 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,928 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,618 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,491 UART: [afmc] --
3,161,497 UART: [cold-reset] --
3,162,307 UART: [state] Locking Datavault
3,163,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,864 UART: [state] Locking ICCM
3,164,490 UART: [exit] Launching FMC @ 0x40000130
3,169,819 UART:
3,169,835 UART: Running Caliptra FMC ...
3,170,243 UART:
3,170,297 UART: [state] CFI Enabled
3,180,558 UART: [fht] FMC Alias Private Key: 7
3,288,861 UART: [art] Extend RT PCRs Done
3,289,289 UART: [art] Lock RT PCRs Done
3,290,861 UART: [art] Populate DV Done
3,299,174 UART: [fht] FMC Alias Private Key: 7
3,300,200 UART: [art] Derive CDI
3,300,480 UART: [art] Store in in slot 0x4
3,385,873 UART: [art] Derive Key Pair
3,386,233 UART: [art] Store priv key in slot 0x5
3,399,653 UART: [art] Derive Key Pair - Done
3,414,742 UART: [art] Signing Cert with AUTHO
3,415,222 UART: RITY.KEYID = 7
3,430,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,231 UART: [art] PUB.X = 6C0A0784AB827EA64E56D2A2848B016B0BDDED78F1221108FD3A366BF7E19D7923AA79E7DAD2E8D1185B319CDCEEE768
3,438,002 UART: [art] PUB.Y = CE4D65AAAD883467CF6CA7D3FEC9987B0553BD6FB68AE4CD86715E67ACD45ACF22C5F271B3D065E43AEB8F424F91D8AA
3,444,975 UART: [art] SIG.R = C2EFC54351994D7A4461565851C7E7D5F5016F66FFB29902EA96419E02F11D6E383947CC83E55035C89ACF04D162E9D9
3,451,731 UART: [art] SIG.S = 1F7D19D93E6ADC96F6ED65C8463C57A32863B0AC2404A55C8D2C8F5D09CF0FC92EDDBF51334D8C1AC5B1BE4F3377F299
3,475,609 UART: Caliptra RT
3,475,862 UART: [state] CFI Enabled
3,584,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,543 UART: [rt]cmd =0xaabbccdd, len=4
3,615,482 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,285 ready_for_fw is high
1,363,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,705 >>> mbox cmd response: success
2,930,705 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,993,011 UART:
2,993,027 UART: Running Caliptra FMC ...
2,993,435 UART:
2,993,489 UART: [state] CFI Enabled
3,004,192 UART: [fht] FMC Alias Private Key: 7
3,111,991 UART: [art] Extend RT PCRs Done
3,112,419 UART: [art] Lock RT PCRs Done
3,113,809 UART: [art] Populate DV Done
3,122,028 UART: [fht] FMC Alias Private Key: 7
3,123,042 UART: [art] Derive CDI
3,123,322 UART: [art] Store in in slot 0x4
3,208,893 UART: [art] Derive Key Pair
3,209,253 UART: [art] Store priv key in slot 0x5
3,222,659 UART: [art] Derive Key Pair - Done
3,237,432 UART: [art] Signing Cert with AUTHO
3,237,912 UART: RITY.KEYID = 7
3,253,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,941 UART: [art] PUB.X = F88668B0F7F13098B12702225D4E3570D2FEABF516FF6E3466E2227A8E22EEE95723655D162F355717156F0A0AAB7247
3,260,698 UART: [art] PUB.Y = 62C13EFA71137BB5B25523A80D77B94305D072013200F2C12E80FD758060408DDF38F59BDD98439EE5C01B9D83E9B818
3,267,615 UART: [art] SIG.R = 0662F1BA3529776DD30736CFB13E685DA735A101DAEA2081AF1DC8E752D64BC108B65F273A23A9729FB1BA935B7E2B3B
3,274,383 UART: [art] SIG.S = 43F01623337F9008D1CACBCD7F7DB36FBF0319AAB4F68745CAE0683D1B7875216D57C06B52299FCA91FE626DA429860C
3,298,587 UART: Caliptra RT
3,298,840 UART: [state] CFI Enabled
3,407,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,620 UART: [rt]cmd =0xaabbccdd, len=4
3,438,561 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,748 UART: [kat] SHA2-256
892,686 UART: [kat] SHA2-384
895,615 UART: [kat] SHA2-512-ACC
897,516 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,664 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,503 UART: [idev] Erasing UDS.KEYID = 0
1,505,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,577 UART: [idev] --
1,515,546 UART: [ldev] ++
1,515,714 UART: [ldev] CDI.KEYID = 6
1,516,077 UART: [ldev] SUBJECT.KEYID = 5
1,516,503 UART: [ldev] AUTHORITY.KEYID = 7
1,516,966 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,547,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,441 UART: [ldev] --
1,587,852 UART: [fwproc] Waiting for Commands...
1,588,651 UART: [fwproc] Received command 0x46574c44
1,589,442 UART: [fwproc] Received Image of size 114448 bytes
2,888,953 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,196 >>> mbox cmd response: success
3,081,196 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,082,408 UART: [afmc] ++
3,082,576 UART: [afmc] CDI.KEYID = 6
3,082,938 UART: [afmc] SUBJECT.KEYID = 7
3,083,363 UART: [afmc] AUTHORITY.KEYID = 5
3,118,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,172 UART: [afmc] --
3,162,154 UART: [cold-reset] --
3,163,028 UART: [state] Locking Datavault
3,163,993 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,597 UART: [state] Locking ICCM
3,165,069 UART: [exit] Launching FMC @ 0x40000130
3,170,398 UART:
3,170,414 UART: Running Caliptra FMC ...
3,170,822 UART:
3,170,965 UART: [state] CFI Enabled
3,181,536 UART: [fht] FMC Alias Private Key: 7
3,289,147 UART: [art] Extend RT PCRs Done
3,289,575 UART: [art] Lock RT PCRs Done
3,291,155 UART: [art] Populate DV Done
3,299,386 UART: [fht] FMC Alias Private Key: 7
3,300,332 UART: [art] Derive CDI
3,300,612 UART: [art] Store in in slot 0x4
3,386,727 UART: [art] Derive Key Pair
3,387,087 UART: [art] Store priv key in slot 0x5
3,400,629 UART: [art] Derive Key Pair - Done
3,415,289 UART: [art] Signing Cert with AUTHO
3,415,769 UART: RITY.KEYID = 7
3,431,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,834 UART: [art] PUB.X = 615D194D044B52B7A18B8A022F915F0A6EA0B21B0A7D5B6F5DF0E8616ED471FFC013A596931DF8D31A055086D0C79A47
3,438,595 UART: [art] PUB.Y = F8EFFBF1F61300D038172773A7220992FDB2FECF0E8320B4BB9C28938A78F3574A50696E0064B61FC7FB59DE57BC7FBC
3,445,507 UART: [art] SIG.R = E33E9E98064CFE930B33A9009EA0AF27895421CAEE964D3B18A7A45AD14090143A1429559400C0CAECCB80FA112C9608
3,452,228 UART: [art] SIG.S = E1FDE6A4889732FE811FAF02CA0E957FE0B8E2F4496249D5D427DB9DD3AC2EB646761A70CD82894DF42D0FAE5FE5A410
3,476,280 UART: Caliptra RT
3,476,625 UART: [state] CFI Enabled
3,583,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,343 UART: [rt]cmd =0xaabbccdd, len=4
3,615,520 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,762 ready_for_fw is high
1,363,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,986 >>> mbox cmd response: success
2,930,986 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,992,754 UART:
2,992,770 UART: Running Caliptra FMC ...
2,993,178 UART:
2,993,321 UART: [state] CFI Enabled
3,004,194 UART: [fht] FMC Alias Private Key: 7
3,111,899 UART: [art] Extend RT PCRs Done
3,112,327 UART: [art] Lock RT PCRs Done
3,113,969 UART: [art] Populate DV Done
3,122,352 UART: [fht] FMC Alias Private Key: 7
3,123,360 UART: [art] Derive CDI
3,123,640 UART: [art] Store in in slot 0x4
3,208,931 UART: [art] Derive Key Pair
3,209,291 UART: [art] Store priv key in slot 0x5
3,222,313 UART: [art] Derive Key Pair - Done
3,236,940 UART: [art] Signing Cert with AUTHO
3,237,420 UART: RITY.KEYID = 7
3,252,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,317 UART: [art] PUB.X = B108BB8A415F8F64971DCAA88D693AC203FC707EFD05C4CC489FD9F58A62CC299957CFFFF7EA2ADEC5E1A0E816D6B3DF
3,260,106 UART: [art] PUB.Y = 52D92B48250CF2D5D5840DC77E63D6BF187273C86A1FF02C32D06829DC059913E8BADD58189F3BDFE86C9D3FF5A4C0E7
3,267,059 UART: [art] SIG.R = D668DA031E6AB6C868907CFB86B6D1CBB34E79617D8394EAEF42F61A041297B1254F1F84A41D70D7F11C0D25A8CA6F71
3,273,830 UART: [art] SIG.S = CD670CDB6C2C7AE7E594874A2A13A9F773FEFA221C447EC5530BC54FFE7387CAACB28478F01AFA051E9684BE026D6B07
3,297,588 UART: Caliptra RT
3,297,933 UART: [state] CFI Enabled
3,406,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,911 UART: [rt]cmd =0xaabbccdd, len=4
3,437,946 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,696 UART: [kat] LMS
1,171,024 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,729 UART: [fht] FHT @ 0x50003400
1,175,324 UART: [idev] ++
1,175,492 UART: [idev] CDI.KEYID = 6
1,175,852 UART: [idev] SUBJECT.KEYID = 7
1,176,276 UART: [idev] UDS.KEYID = 0
1,176,621 ready_for_fw is high
1,176,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,356 UART: [idev] Erasing UDS.KEYID = 0
1,201,795 UART: [idev] Sha1 KeyId Algorithm
1,210,133 UART: [idev] --
1,210,959 UART: [ldev] ++
1,211,127 UART: [ldev] CDI.KEYID = 6
1,211,490 UART: [ldev] SUBJECT.KEYID = 5
1,211,916 UART: [ldev] AUTHORITY.KEYID = 7
1,212,379 UART: [ldev] FE.KEYID = 1
1,217,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,497 UART: [ldev] --
1,282,836 UART: [fwproc] Wait for Commands...
1,283,468 UART: [fwproc] Recv command 0x46574c44
1,284,196 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,228 >>> mbox cmd response: success
2,776,228 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,777,466 UART: [afmc] ++
2,777,634 UART: [afmc] CDI.KEYID = 6
2,777,996 UART: [afmc] SUBJECT.KEYID = 7
2,778,421 UART: [afmc] AUTHORITY.KEYID = 5
2,813,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,151 UART: [afmc] --
2,856,063 UART: [cold-reset] --
2,856,995 UART: [state] Locking Datavault
2,858,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,770 UART: [state] Locking ICCM
2,859,236 UART: [exit] Launching FMC @ 0x40000130
2,864,565 UART:
2,864,581 UART: Running Caliptra FMC ...
2,864,989 UART:
2,865,043 UART: [state] CFI Enabled
2,875,142 UART: [fht] FMC Alias Private Key: 7
2,983,171 UART: [art] Extend RT PCRs Done
2,983,599 UART: [art] Lock RT PCRs Done
2,984,977 UART: [art] Populate DV Done
2,993,140 UART: [fht] FMC Alias Private Key: 7
2,994,272 UART: [art] Derive CDI
2,994,552 UART: [art] Store in in slot 0x4
3,079,815 UART: [art] Derive Key Pair
3,080,175 UART: [art] Store priv key in slot 0x5
3,093,849 UART: [art] Derive Key Pair - Done
3,108,855 UART: [art] Signing Cert with AUTHO
3,109,335 UART: RITY.KEYID = 7
3,124,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,418 UART: [art] PUB.X = A0408A1F8CA1944317DA16863A5659BCCFB20BC13D3CCDC8D35B788F8C28A8BC2201AEA1C3497D7F81545EC0172311FC
3,132,194 UART: [art] PUB.Y = 102D2B2C3BAAC9C3415FDAFE3A5AC66239FBD537E7E8A4E90C8F5540655415FA7CC8FD2A18A3CE7A6DCE910997741878
3,139,154 UART: [art] SIG.R = C7281E62B796144D69E1C489F315B9A092E2CE17EEC4C1AB2618C66AF81D26A67B8C9C9A35CC13BF5AA1C1121443ED7A
3,145,936 UART: [art] SIG.S = 1E0E7AD1166816D90A00B891506FF16691279B18F88E60CF8350718A21DD09FC7F61B26D9FAA741A05E091560FB84C8E
3,169,866 UART: Caliptra RT
3,170,119 UART: [state] CFI Enabled
3,277,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,840 UART: [rt]cmd =0xaabbccdd, len=4
3,308,857 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,701 ready_for_fw is high
1,060,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,049 >>> mbox cmd response: success
2,627,049 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,689,611 UART:
2,689,627 UART: Running Caliptra FMC ...
2,690,035 UART:
2,690,089 UART: [state] CFI Enabled
2,700,496 UART: [fht] FMC Alias Private Key: 7
2,808,301 UART: [art] Extend RT PCRs Done
2,808,729 UART: [art] Lock RT PCRs Done
2,810,151 UART: [art] Populate DV Done
2,818,508 UART: [fht] FMC Alias Private Key: 7
2,819,436 UART: [art] Derive CDI
2,819,716 UART: [art] Store in in slot 0x4
2,905,555 UART: [art] Derive Key Pair
2,905,915 UART: [art] Store priv key in slot 0x5
2,918,851 UART: [art] Derive Key Pair - Done
2,933,487 UART: [art] Signing Cert with AUTHO
2,933,967 UART: RITY.KEYID = 7
2,949,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,134 UART: [art] PUB.X = 2DD9A34617EA09D99A77ACA54BE9196AE8BF6B407799C241914256224B2E2BECF60B778F0CC594A628551922AE20DE58
2,956,899 UART: [art] PUB.Y = 9E404F818F372280D130EEF71B32A960FF99FE481E77E9B0D385C5F5D124B6792D6F58458B4A941D9D892A9D64E5C42C
2,963,851 UART: [art] SIG.R = 741D23629D94F75A436FCDAEAC7F98FFAF7D421835B9CF4A751F24A97DF9D780893B6434C0BCD69A5660A665BBB2C736
2,970,633 UART: [art] SIG.S = 7DC9758240A443B7957EBF2994A126C3C9308DD34099FD8C55F3BED2D38776E3A2658F439B2FE5FEE806C074A8DD3851
2,994,345 UART: Caliptra RT
2,994,598 UART: [state] CFI Enabled
3,102,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,051 UART: [rt]cmd =0xaabbccdd, len=4
3,134,074 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
893,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,362 UART: [kat] ++
897,514 UART: [kat] sha1
901,924 UART: [kat] SHA2-256
903,864 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,227 UART: [kat] HMAC-384Kdf
923,053 UART: [kat] LMS
1,171,381 UART: [kat] --
1,172,142 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,975 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,210,094 UART: [idev] --
1,210,978 UART: [ldev] ++
1,211,146 UART: [ldev] CDI.KEYID = 6
1,211,509 UART: [ldev] SUBJECT.KEYID = 5
1,211,935 UART: [ldev] AUTHORITY.KEYID = 7
1,212,398 UART: [ldev] FE.KEYID = 1
1,217,680 UART: [ldev] Erasing FE.KEYID = 1
1,243,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,610 UART: [ldev] --
1,282,945 UART: [fwproc] Wait for Commands...
1,283,747 UART: [fwproc] Recv command 0x46574c44
1,284,475 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,709 >>> mbox cmd response: success
2,776,709 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,777,897 UART: [afmc] ++
2,778,065 UART: [afmc] CDI.KEYID = 6
2,778,427 UART: [afmc] SUBJECT.KEYID = 7
2,778,852 UART: [afmc] AUTHORITY.KEYID = 5
2,814,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,820 UART: [afmc] --
2,857,698 UART: [cold-reset] --
2,858,608 UART: [state] Locking Datavault
2,859,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,311 UART: [state] Locking ICCM
2,860,813 UART: [exit] Launching FMC @ 0x40000130
2,866,142 UART:
2,866,158 UART: Running Caliptra FMC ...
2,866,566 UART:
2,866,709 UART: [state] CFI Enabled
2,877,134 UART: [fht] FMC Alias Private Key: 7
2,985,261 UART: [art] Extend RT PCRs Done
2,985,689 UART: [art] Lock RT PCRs Done
2,987,273 UART: [art] Populate DV Done
2,995,396 UART: [fht] FMC Alias Private Key: 7
2,996,558 UART: [art] Derive CDI
2,996,838 UART: [art] Store in in slot 0x4
3,082,313 UART: [art] Derive Key Pair
3,082,673 UART: [art] Store priv key in slot 0x5
3,095,519 UART: [art] Derive Key Pair - Done
3,110,114 UART: [art] Signing Cert with AUTHO
3,110,594 UART: RITY.KEYID = 7
3,125,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,661 UART: [art] PUB.X = C5C94A8C6760F3F3BB0A9AD87AFB53460405147BC52616C44EBF2927B111BD7353CCEC857FF354A39884678061DFC3B5
3,133,428 UART: [art] PUB.Y = 07036E76FDE7B1B42B95BD76E81CF1AB1E737697AC841489D3DDF20D981D063097D2786D94D1925B635B41D61EE73230
3,140,366 UART: [art] SIG.R = 3B210FCF2B128F6BFC4857A03815A70E95F46D272BA0D329DEA0BCF4F876174A52D50E328CA743BC857443DC2CF915AC
3,147,139 UART: [art] SIG.S = 17FC19DE8326C47336F7DECE8B860C91313128BABA9913B0164AA04994A2D91E49211C221F05F21D8FCAE914FD7C202D
3,171,366 UART: Caliptra RT
3,171,711 UART: [state] CFI Enabled
3,280,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,796 UART: [rt]cmd =0xaabbccdd, len=4
3,311,795 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,762 ready_for_fw is high
1,060,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,428 >>> mbox cmd response: success
2,629,428 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,692,592 UART:
2,692,608 UART: Running Caliptra FMC ...
2,693,016 UART:
2,693,159 UART: [state] CFI Enabled
2,704,280 UART: [fht] FMC Alias Private Key: 7
2,812,347 UART: [art] Extend RT PCRs Done
2,812,775 UART: [art] Lock RT PCRs Done
2,814,575 UART: [art] Populate DV Done
2,822,712 UART: [fht] FMC Alias Private Key: 7
2,823,792 UART: [art] Derive CDI
2,824,072 UART: [art] Store in in slot 0x4
2,909,763 UART: [art] Derive Key Pair
2,910,123 UART: [art] Store priv key in slot 0x5
2,923,545 UART: [art] Derive Key Pair - Done
2,938,269 UART: [art] Signing Cert with AUTHO
2,938,749 UART: RITY.KEYID = 7
2,954,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,808 UART: [art] PUB.X = 9FA4A63677975B7269D1C3BBA0B8712A2A4966AA9B1E796641167B61C69CB668E7FA8A4AC04277BA30764F5FC596ED28
2,961,582 UART: [art] PUB.Y = 84BF8B2DCE96FAE758C36579B8710C9310574236FE60E90BF924E0749ACCF5F11C3A0C3EC186F69117640F0865520726
2,968,512 UART: [art] SIG.R = 8E7D045911BB7796756E8C72ADA04C73A5D5C567E399D7580A5BFE96EE62DF5EAD448E76D0BAA32DE7533AE637B1FBA5
2,975,292 UART: [art] SIG.S = F4557F37245A66D04EB018AA1B181CC64BFEF808AAC8AEECD4C25B937B51CAE04A0D8251FEC5B01EA5EE3E908550106A
2,999,229 UART: Caliptra RT
2,999,574 UART: [state] CFI Enabled
3,107,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,256 UART: [rt]cmd =0xaabbccdd, len=4
3,139,321 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,174,891 ready_for_fw is high
1,174,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,771 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,422 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,395 UART: [fwproc] Recv command 0x46574c44
1,283,128 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,992 >>> mbox cmd response: success
2,774,992 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,776,023 UART: [afmc] ++
2,776,191 UART: [afmc] CDI.KEYID = 6
2,776,554 UART: [afmc] SUBJECT.KEYID = 7
2,776,980 UART: [afmc] AUTHORITY.KEYID = 5
2,813,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,894 UART: [afmc] --
2,855,978 UART: [cold-reset] --
2,856,590 UART: [state] Locking Datavault
2,857,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,345 UART: [state] Locking ICCM
2,858,861 UART: [exit] Launching FMC @ 0x40000130
2,864,190 UART:
2,864,206 UART: Running Caliptra FMC ...
2,864,614 UART:
2,864,668 UART: [state] CFI Enabled
2,874,737 UART: [fht] FMC Alias Private Key: 7
2,982,610 UART: [art] Extend RT PCRs Done
2,983,038 UART: [art] Lock RT PCRs Done
2,984,578 UART: [art] Populate DV Done
2,992,751 UART: [fht] FMC Alias Private Key: 7
2,993,779 UART: [art] Derive CDI
2,994,059 UART: [art] Store in in slot 0x4
3,079,522 UART: [art] Derive Key Pair
3,079,882 UART: [art] Store priv key in slot 0x5
3,092,412 UART: [art] Derive Key Pair - Done
3,107,131 UART: [art] Signing Cert with AUTHO
3,107,611 UART: RITY.KEYID = 7
3,122,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,582 UART: [art] PUB.X = BCDA49BD6FC8A1C0BA06E4A2A1F2BB35D391D578EC0B069A2705987EBFAD9A4A5FF9FF0965806B41645B6C827321A59C
3,130,355 UART: [art] PUB.Y = E1519193A43D80E1FE18C6AF57EE157E535A4A23181E050276A2BE3776DA5E76C494AE100320B9F5ACB4E7DECC5C7F78
3,137,306 UART: [art] SIG.R = 0B4C72803F386A4A66BCAE0A40F0B7124A78DD8653174EE49DB37A23C579AE3F2935D0EBA939AF56031ED5EFD4EAA819
3,144,081 UART: [art] SIG.S = CF62296269DC4BDD705EA963E43FFCC14EF86FFB07BD1DECD1C30472163A923C47416B0AA18FD34D6471E31BC0AD2EBA
3,167,825 UART: Caliptra RT
3,168,078 UART: [state] CFI Enabled
3,275,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,995 UART: [rt]cmd =0xaabbccdd, len=4
3,306,846 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 ready_for_fw is high
1,056,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,872 >>> mbox cmd response: success
2,623,872 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,686,844 UART:
2,686,860 UART: Running Caliptra FMC ...
2,687,268 UART:
2,687,322 UART: [state] CFI Enabled
2,697,957 UART: [fht] FMC Alias Private Key: 7
2,805,706 UART: [art] Extend RT PCRs Done
2,806,134 UART: [art] Lock RT PCRs Done
2,807,458 UART: [art] Populate DV Done
2,815,711 UART: [fht] FMC Alias Private Key: 7
2,816,655 UART: [art] Derive CDI
2,816,935 UART: [art] Store in in slot 0x4
2,902,608 UART: [art] Derive Key Pair
2,902,968 UART: [art] Store priv key in slot 0x5
2,916,712 UART: [art] Derive Key Pair - Done
2,931,345 UART: [art] Signing Cert with AUTHO
2,931,825 UART: RITY.KEYID = 7
2,947,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,968 UART: [art] PUB.X = 0847C9349DD2F32267F4A8171371F091A1EDCAE128F5C782CBD75C2572F29650016ED37263883CD4F1A61C9595E3ABD2
2,954,732 UART: [art] PUB.Y = 6A2B9F933A47212BB4EB6CA285008191803D671A7558396BD213CA022D65E3E730DEA749810CF112EA74B6BEF086ADD8
2,961,658 UART: [art] SIG.R = 14D8E34CC4AD33B54F61AD9AFEA5E79376DAEBF78459DDE55803F3E806FEFE286111C5BAE0B9074B46A545624CD05D80
2,968,435 UART: [art] SIG.S = DC2CCF9D3ED66D95AB1FD1CE55E2C9B0B09A17B60FBDFA3CA93CD62E5320A20D8E62D10988E748A6F76EA831BF76E978
2,992,565 UART: Caliptra RT
2,992,818 UART: [state] CFI Enabled
3,099,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,051 UART: [rt]cmd =0xaabbccdd, len=4
3,131,160 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,174,802 ready_for_fw is high
1,174,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,728 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,245 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x46574c44
1,283,649 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,963 >>> mbox cmd response: success
2,774,963 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,776,130 UART: [afmc] ++
2,776,298 UART: [afmc] CDI.KEYID = 6
2,776,661 UART: [afmc] SUBJECT.KEYID = 7
2,777,087 UART: [afmc] AUTHORITY.KEYID = 5
2,812,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,067 UART: [afmc] --
2,856,037 UART: [cold-reset] --
2,856,947 UART: [state] Locking Datavault
2,857,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,586 UART: [state] Locking ICCM
2,859,256 UART: [exit] Launching FMC @ 0x40000130
2,864,585 UART:
2,864,601 UART: Running Caliptra FMC ...
2,865,009 UART:
2,865,152 UART: [state] CFI Enabled
2,875,789 UART: [fht] FMC Alias Private Key: 7
2,984,018 UART: [art] Extend RT PCRs Done
2,984,446 UART: [art] Lock RT PCRs Done
2,986,254 UART: [art] Populate DV Done
2,994,369 UART: [fht] FMC Alias Private Key: 7
2,995,481 UART: [art] Derive CDI
2,995,761 UART: [art] Store in in slot 0x4
3,081,598 UART: [art] Derive Key Pair
3,081,958 UART: [art] Store priv key in slot 0x5
3,095,232 UART: [art] Derive Key Pair - Done
3,109,974 UART: [art] Signing Cert with AUTHO
3,110,454 UART: RITY.KEYID = 7
3,125,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,857 UART: [art] PUB.X = AEAB62E5C3E1C6709908F78BA38F25E12CD7971B8F7978594DF83781FC40B8FA1902B26C96E8AAE3383CEA56DAC9CEC1
3,132,637 UART: [art] PUB.Y = 83F1508FE2BB4E0CA9BBAB6735775C31D1673BF7FAE3251285DC4F69E4489AD5EBA47BAA3F542693F5B0FC0E4206BF5A
3,139,596 UART: [art] SIG.R = 51EC2134A689524FAC324EE38C0BE41EF5D1036BAA7DDA0B699D9D8554CD9DD5FFD4FF369F8D083CB7391BC60ABC20F3
3,146,373 UART: [art] SIG.S = 462A758A83E28DF44BAF5EE4B23C0F1EFB7441002880DA3D6126C4597236170DC0660311BE344CAFF6904E8962E7FF5A
3,169,809 UART: Caliptra RT
3,170,154 UART: [state] CFI Enabled
3,278,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,845 UART: [rt]cmd =0xaabbccdd, len=4
3,310,044 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,569 ready_for_fw is high
1,057,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,487 >>> mbox cmd response: success
2,626,487 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,688,603 UART:
2,688,619 UART: Running Caliptra FMC ...
2,689,027 UART:
2,689,170 UART: [state] CFI Enabled
2,700,037 UART: [fht] FMC Alias Private Key: 7
2,807,790 UART: [art] Extend RT PCRs Done
2,808,218 UART: [art] Lock RT PCRs Done
2,809,784 UART: [art] Populate DV Done
2,817,829 UART: [fht] FMC Alias Private Key: 7
2,818,845 UART: [art] Derive CDI
2,819,125 UART: [art] Store in in slot 0x4
2,904,854 UART: [art] Derive Key Pair
2,905,214 UART: [art] Store priv key in slot 0x5
2,918,864 UART: [art] Derive Key Pair - Done
2,933,918 UART: [art] Signing Cert with AUTHO
2,934,398 UART: RITY.KEYID = 7
2,949,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,353 UART: [art] PUB.X = 60898E2771035CD3449132FAD1172DA53D88CB9D2D1235DE241027C31E8414A03D19B37257DEB7B25565AB7435527EC1
2,957,114 UART: [art] PUB.Y = 21931DC6302DBCFE0AF9A3C5F8F28225A08F3695B08DF6AB15114F601667C84CE86D150363E677F98193A78A72F6CD3E
2,964,062 UART: [art] SIG.R = 41B993EC7985AE8169CEF5285AF7529ED4F8EDB4055B7B1EF132CFE3A4449F165FD8683803F97C320CE589A2E6F96FAF
2,970,835 UART: [art] SIG.S = 1B48A86A0A6EAB734ADD6DA2810369B67E57DB0D399A094B9FB32BFBCCC04938BDF3A5B963FA2457C3D613B74E3CE414
2,994,652 UART: Caliptra RT
2,994,997 UART: [state] CFI Enabled
3,103,162 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,656 UART: [rt]cmd =0xaabbccdd, len=4
3,134,709 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,961 writing to cptra_bootfsm_go
193,228 UART:
193,585 UART: Running Caliptra ROM ...
194,775 UART:
194,952 UART: [state] CFI Enabled
265,681 UART: [state] LifecycleState = Unprovisioned
267,659 UART: [state] DebugLocked = No
268,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,722 UART: [kat] SHA2-256
443,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,958 UART: [kat] ++
454,438 UART: [kat] sha1
464,032 UART: [kat] SHA2-256
466,770 UART: [kat] SHA2-384
472,052 UART: [kat] SHA2-512-ACC
474,421 UART: [kat] ECC-384
2,768,585 UART: [kat] HMAC-384Kdf
2,800,652 UART: [kat] LMS
3,990,965 UART: [kat] --
3,998,316 UART: [cold-reset] ++
3,999,757 UART: [fht] Storing FHT @ 0x50003400
4,009,691 UART: [idev] ++
4,010,309 UART: [idev] CDI.KEYID = 6
4,011,231 UART: [idev] SUBJECT.KEYID = 7
4,012,374 UART: [idev] UDS.KEYID = 0
4,013,362 ready_for_fw is high
4,013,556 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,957 UART: [idev] Erasing UDS.KEYID = 0
7,347,591 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,233 UART: [idev] --
7,372,667 UART: [ldev] ++
7,373,246 UART: [ldev] CDI.KEYID = 6
7,374,217 UART: [ldev] SUBJECT.KEYID = 5
7,375,429 UART: [ldev] AUTHORITY.KEYID = 7
7,376,711 UART: [ldev] FE.KEYID = 1
7,437,689 UART: [ldev] Erasing FE.KEYID = 1
10,769,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,627 UART: [ldev] --
13,132,660 UART: [fwproc] Waiting for Commands...
13,134,708 UART: [fwproc] Received command 0x46574c44
13,136,894 UART: [fwproc] Received Image of size 114124 bytes
17,191,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,351 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,655,903 >>> mbox cmd response: success
17,660,357 UART: [afmc] ++
17,660,968 UART: [afmc] CDI.KEYID = 6
17,661,889 UART: [afmc] SUBJECT.KEYID = 7
17,663,106 UART: [afmc] AUTHORITY.KEYID = 5
21,025,205 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,324,902 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,362 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,174 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,636 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,942 UART: [afmc] --
23,393,944 UART: [cold-reset] --
23,397,316 UART: [state] Locking Datavault
23,404,130 UART: [state] Locking PCR0, PCR1 and PCR31
23,405,833 UART: [state] Locking ICCM
23,408,201 UART: [exit] Launching FMC @ 0x40000130
23,416,594 UART:
23,416,826 UART: Running Caliptra FMC ...
23,417,923 UART:
23,418,089 UART: [state] CFI Enabled
23,483,319 UART: [fht] FMC Alias Private Key: 7
25,821,129 UART: [art] Extend RT PCRs Done
25,822,351 UART: [art] Lock RT PCRs Done
25,823,876 UART: [art] Populate DV Done
25,829,130 UART: [fht] FMC Alias Private Key: 7
25,830,728 UART: [art] Derive CDI
25,831,541 UART: [art] Store in in slot 0x4
25,891,723 UART: [art] Derive Key Pair
25,892,772 UART: [art] Store priv key in slot 0x5
29,185,126 UART: [art] Derive Key Pair - Done
29,197,850 UART: [art] Signing Cert with AUTHO
29,199,153 UART: RITY.KEYID = 7
31,486,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,076 UART: [art] PUB.X = EB50352B10ED55FA7C4292CCEF6DD85930B6A77EE08907069B485C3DB59D36DE8BCFAA9C746B819FFBFF2022A32DF8C8
31,495,337 UART: [art] PUB.Y = 914303ED7AAC0BD4584E1B01E4FECABC60C454D87D5CB1FD4CAF1C856CADD9CEA0B1D254F99FA0BE9996614D273D5985
31,502,640 UART: [art] SIG.R = 644A98EC24AF1C4CD6662D95B42C99324BC29FD8393D1A9429942760479C9AD49FF913D236820F94AB7F5BA720FFDD43
31,509,983 UART: [art] SIG.S = 100BDA1B51E8658D5169D05A018F0C3EE716895DA0F1536F8B449F1FB48A533CA03928650B4C25841E1567B2F17234AE
32,815,514 UART: Caliptra RT
32,816,226 UART: [state] CFI Enabled
32,975,932 UART: [rt] RT listening for mailbox commands...
32,977,813 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,008,344 UART: [rt]cmd =0x434b4558, len=80
33,009,949 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,803,431 ready_for_fw is high
3,803,871 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,880,968 >>> mbox cmd response: success
23,565,123 UART:
23,565,503 UART: Running Caliptra FMC ...
23,566,797 UART:
23,566,966 UART: [state] CFI Enabled
23,617,270 UART: [fht] FMC Alias Private Key: 7
25,955,288 UART: [art] Extend RT PCRs Done
25,956,515 UART: [art] Lock RT PCRs Done
25,958,441 UART: [art] Populate DV Done
25,964,079 UART: [fht] FMC Alias Private Key: 7
25,965,632 UART: [art] Derive CDI
25,966,368 UART: [art] Store in in slot 0x4
26,025,955 UART: [art] Derive Key Pair
26,026,973 UART: [art] Store priv key in slot 0x5
29,319,864 UART: [art] Derive Key Pair - Done
29,333,146 UART: [art] Signing Cert with AUTHO
29,334,479 UART: RITY.KEYID = 7
31,621,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,161 UART: [art] PUB.X = 176E911FCDB344C55E9624D2D7BE7CB51D1F5ED0472B0765B4D87905B69B50A7DABB92FFF9B2B6C8B112B9F286E880D7
31,630,417 UART: [art] PUB.Y = C64A04EA6800E98D3009E807B115FDD8846D9DAC80ED1BF89FB838755C56FE2CBA3CDEED577E302F35AF58DE8D8C669D
31,637,699 UART: [art] SIG.R = BD18C8D2BC59FEC80196AC96F428817B59D8F0863EAC3029ECA0C7C7AD25853082C5CDD73E2B8E1EF46BD40B91627A69
31,645,097 UART: [art] SIG.S = 00BC7C543AB8E404EA97EAB7A96BAFD3193EB2CACEB14E3AE17017AF464AABCB86BC9A5EF71C5F78C76A3B59A258DF11
32,950,130 UART: Caliptra RT
32,950,845 UART: [state] CFI Enabled
33,112,062 UART: [rt] RT listening for mailbox commands...
33,113,952 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,144,639 UART: [rt]cmd =0x434b4558, len=80
33,146,188 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,451 UART:
192,838 UART: Running Caliptra ROM ...
193,966 UART:
603,700 UART: [state] CFI Enabled
619,278 UART: [state] LifecycleState = Unprovisioned
621,219 UART: [state] DebugLocked = No
622,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,962 UART: [kat] SHA2-256
797,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,210 UART: [kat] ++
808,690 UART: [kat] sha1
819,062 UART: [kat] SHA2-256
821,711 UART: [kat] SHA2-384
827,715 UART: [kat] SHA2-512-ACC
830,121 UART: [kat] ECC-384
3,114,455 UART: [kat] HMAC-384Kdf
3,125,766 UART: [kat] LMS
4,315,883 UART: [kat] --
4,321,175 UART: [cold-reset] ++
4,322,114 UART: [fht] Storing FHT @ 0x50003400
4,334,296 UART: [idev] ++
4,334,854 UART: [idev] CDI.KEYID = 6
4,335,826 UART: [idev] SUBJECT.KEYID = 7
4,337,064 UART: [idev] UDS.KEYID = 0
4,338,044 ready_for_fw is high
4,338,235 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,555 UART: [idev] Erasing UDS.KEYID = 0
7,625,480 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,873 UART: [idev] --
7,650,668 UART: [ldev] ++
7,651,299 UART: [ldev] CDI.KEYID = 6
7,652,213 UART: [ldev] SUBJECT.KEYID = 5
7,653,422 UART: [ldev] AUTHORITY.KEYID = 7
7,654,725 UART: [ldev] FE.KEYID = 1
7,665,474 UART: [ldev] Erasing FE.KEYID = 1
10,956,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,162 UART: [ldev] --
13,319,112 UART: [fwproc] Waiting for Commands...
13,320,931 UART: [fwproc] Received command 0x46574c44
13,323,111 UART: [fwproc] Received Image of size 114124 bytes
17,376,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,703 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,323 >>> mbox cmd response: success
17,838,883 UART: [afmc] ++
17,839,493 UART: [afmc] CDI.KEYID = 6
17,840,414 UART: [afmc] SUBJECT.KEYID = 7
17,841,625 UART: [afmc] AUTHORITY.KEYID = 5
21,153,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,614 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,009 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,845 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,251 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,701 UART: [afmc] --
23,520,016 UART: [cold-reset] --
23,525,384 UART: [state] Locking Datavault
23,529,126 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,822 UART: [state] Locking ICCM
23,533,288 UART: [exit] Launching FMC @ 0x40000130
23,541,678 UART:
23,542,007 UART: Running Caliptra FMC ...
23,543,069 UART:
23,543,223 UART: [state] CFI Enabled
23,551,499 UART: [fht] FMC Alias Private Key: 7
25,882,208 UART: [art] Extend RT PCRs Done
25,883,438 UART: [art] Lock RT PCRs Done
25,884,976 UART: [art] Populate DV Done
25,890,494 UART: [fht] FMC Alias Private Key: 7
25,892,029 UART: [art] Derive CDI
25,892,839 UART: [art] Store in in slot 0x4
25,935,752 UART: [art] Derive Key Pair
25,936,748 UART: [art] Store priv key in slot 0x5
29,178,667 UART: [art] Derive Key Pair - Done
29,191,641 UART: [art] Signing Cert with AUTHO
29,192,946 UART: RITY.KEYID = 7
31,471,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,354 UART: [art] PUB.X = E9B148E9FC563F9EB77D85F74FE9906B8015D92160ED98539945041C3834E6DD3FCCB051EE3FF16008A4FB7C2C5485C5
31,480,577 UART: [art] PUB.Y = 203C2CD43FEDFB0DFC1A7828F4FA8E163696FFB54D2835F051EEEEB1E632E5C093F9E3E5C3FE9FEDD9FDF7927B893D6D
31,487,868 UART: [art] SIG.R = 8E9E323BAB26E926732944D9ABF5F5997B059E3CF133E030E55817F6FE080A47ABAD110C6506B7F1475BB108E3242D17
31,495,260 UART: [art] SIG.S = F8FDCB0361038349E21037C4CD6001D694F9DB77A4FE99CC801F32B44C76987E231B09649B0105168463C9C8CE7D0EE4
32,799,866 UART: Caliptra RT
32,800,568 UART: [state] CFI Enabled
32,918,510 UART: [rt] RT listening for mailbox commands...
32,920,396 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,950,931 UART: [rt]cmd =0x434b4558, len=80
32,952,303 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,128,093 ready_for_fw is high
4,128,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,287 >>> mbox cmd response: success
23,714,187 UART:
23,714,573 UART: Running Caliptra FMC ...
23,715,704 UART:
23,715,860 UART: [state] CFI Enabled
23,723,865 UART: [fht] FMC Alias Private Key: 7
26,054,168 UART: [art] Extend RT PCRs Done
26,055,395 UART: [art] Lock RT PCRs Done
26,057,244 UART: [art] Populate DV Done
26,062,826 UART: [fht] FMC Alias Private Key: 7
26,064,368 UART: [art] Derive CDI
26,065,182 UART: [art] Store in in slot 0x4
26,107,787 UART: [art] Derive Key Pair
26,108,822 UART: [art] Store priv key in slot 0x5
29,350,792 UART: [art] Derive Key Pair - Done
29,363,481 UART: [art] Signing Cert with AUTHO
29,364,806 UART: RITY.KEYID = 7
31,644,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,231 UART: [art] PUB.X = 5DABB3FCCD39A0B53FC9149FFA77C4DF30214E3BBBB0DFC3791663FCE6BEA85E4174AB14321BDEE9CC0758C9B8424D13
31,653,457 UART: [art] PUB.Y = 1BC94F75C4E25F44321A79E78287682A67B2DFE0109F2B1F3A027A445E2E9DD14F316F254EF75C0AAEBBED20FD588DF7
31,660,712 UART: [art] SIG.R = 7BE781E24EDC6D686FEA604902E2F629B11D2367136964195FB813B2701FFB9CD545A2803B5F03AE4877453AB92A5311
31,668,078 UART: [art] SIG.S = 5EAA9A393A52EBB5B8C5424BC53757CDE6C6D453AB6EADA6BCBE8E04571BC43A9E77A7FC6A46A61018CDCCD97096ACF4
32,973,315 UART: Caliptra RT
32,974,024 UART: [state] CFI Enabled
33,090,956 UART: [rt] RT listening for mailbox commands...
33,092,840 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,123,310 UART: [rt]cmd =0x434b4558, len=80
33,124,848 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,029 UART:
192,401 UART: Running Caliptra ROM ...
193,539 UART:
193,689 UART: [state] CFI Enabled
265,446 UART: [state] LifecycleState = Unprovisioned
267,278 UART: [state] DebugLocked = No
269,953 UART: [state] WD Timer not started. Device not locked for debugging
273,003 UART: [kat] SHA2-256
452,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,691 UART: [kat] ++
464,138 UART: [kat] sha1
476,073 UART: [kat] SHA2-256
479,077 UART: [kat] SHA2-384
485,915 UART: [kat] SHA2-512-ACC
488,847 UART: [kat] ECC-384
2,951,127 UART: [kat] HMAC-384Kdf
2,972,693 UART: [kat] LMS
3,502,167 UART: [kat] --
3,507,899 UART: [cold-reset] ++
3,509,474 UART: [fht] FHT @ 0x50003400
3,521,517 UART: [idev] ++
3,522,088 UART: [idev] CDI.KEYID = 6
3,523,010 UART: [idev] SUBJECT.KEYID = 7
3,524,184 UART: [idev] UDS.KEYID = 0
3,525,110 ready_for_fw is high
3,525,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,373 UART: [idev] Erasing UDS.KEYID = 0
6,029,149 UART: [idev] Sha1 KeyId Algorithm
6,053,125 UART: [idev] --
6,057,662 UART: [ldev] ++
6,058,230 UART: [ldev] CDI.KEYID = 6
6,059,140 UART: [ldev] SUBJECT.KEYID = 5
6,060,297 UART: [ldev] AUTHORITY.KEYID = 7
6,061,586 UART: [ldev] FE.KEYID = 1
6,100,220 UART: [ldev] Erasing FE.KEYID = 1
8,605,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,373 UART: [ldev] --
10,412,219 UART: [fwproc] Wait for Commands...
10,415,067 UART: [fwproc] Recv command 0x46574c44
10,417,159 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,433 >>> mbox cmd response: success
14,286,937 UART: [afmc] ++
14,287,526 UART: [afmc] CDI.KEYID = 6
14,288,439 UART: [afmc] SUBJECT.KEYID = 7
14,289,607 UART: [afmc] AUTHORITY.KEYID = 5
16,834,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,849 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,438 UART: [afmc] --
18,630,328 UART: [cold-reset] --
18,634,830 UART: [state] Locking Datavault
18,640,018 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,715 UART: [state] Locking ICCM
18,642,727 UART: [exit] Launching FMC @ 0x40000130
18,651,185 UART:
18,651,418 UART: Running Caliptra FMC ...
18,652,520 UART:
18,652,679 UART: [state] CFI Enabled
18,713,800 UART: [fht] FMC Alias Private Key: 7
20,477,925 UART: [art] Extend RT PCRs Done
20,479,137 UART: [art] Lock RT PCRs Done
20,480,712 UART: [art] Populate DV Done
20,486,122 UART: [fht] FMC Alias Private Key: 7
20,487,676 UART: [art] Derive CDI
20,488,489 UART: [art] Store in in slot 0x4
20,545,749 UART: [art] Derive Key Pair
20,546,786 UART: [art] Store priv key in slot 0x5
23,010,239 UART: [art] Derive Key Pair - Done
23,023,018 UART: [art] Signing Cert with AUTHO
23,024,319 UART: RITY.KEYID = 7
24,736,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,174 UART: [art] PUB.X = B016D58431659DE9CF71135D022E03D308C40BE5C42390334920E476A84DDC082129CBC6671CD3486C1E9C03624CF1E4
24,745,281 UART: [art] PUB.Y = 059B759CBE2185A7B02A4D83D881EEAD450FFC47F44E2DF6A86E230DE545EE4DF3B5C9ECCAB788D2AE9F93F24D4CB51D
24,752,566 UART: [art] SIG.R = F8A2B063B91659D33017DF219D06678D0DD22EB8C34743A0AF20BFEC866537AC15AB4E585F23604E55F06D3451905A10
24,759,952 UART: [art] SIG.S = 1DC3047658DBA6576970EA0BBF3DFE16445DB04E2ED38ED94BC6A0E2A6DE5F84B7858606BCA39D6336F4684535CC54D0
25,738,706 UART: Caliptra RT
25,739,403 UART: [state] CFI Enabled
25,904,468 UART: [rt] RT listening for mailbox commands...
25,906,340 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,937,212 UART: [rt]cmd =0x434b4558, len=80
25,938,818 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,360,587 ready_for_fw is high
3,360,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,673 >>> mbox cmd response: success
18,369,751 UART:
18,370,147 UART: Running Caliptra FMC ...
18,371,336 UART:
18,371,508 UART: [state] CFI Enabled
18,434,100 UART: [fht] FMC Alias Private Key: 7
20,198,119 UART: [art] Extend RT PCRs Done
20,199,335 UART: [art] Lock RT PCRs Done
20,201,123 UART: [art] Populate DV Done
20,206,664 UART: [fht] FMC Alias Private Key: 7
20,208,216 UART: [art] Derive CDI
20,208,981 UART: [art] Store in in slot 0x4
20,267,104 UART: [art] Derive Key Pair
20,268,140 UART: [art] Store priv key in slot 0x5
22,731,233 UART: [art] Derive Key Pair - Done
22,744,112 UART: [art] Signing Cert with AUTHO
22,745,413 UART: RITY.KEYID = 7
24,457,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,784 UART: [art] PUB.X = C80C07591D298C04CC774C8DF1F06966C075C1C1EB37C060D87E1D64628E20419B6A8DD90CF987C5381EABE0D763444B
24,466,045 UART: [art] PUB.Y = 4C35556171E87BD53D6F9EFC10D1E9EBEBA567318C1914838EEB3C9CE7BA46DB1AB969F6371C996E8D00FC44BBBCC400
24,473,309 UART: [art] SIG.R = 9A5E22583113FB896B5D6731EEFE6966BEC89F48C49BF9370AC99EBC097C6D725742D62E6605E1BA4D26B0BBE0094F4D
24,480,755 UART: [art] SIG.S = 3590471A5DCF905C7C18A63D6A18D22499389748A06ECC38D6A8C8D651015E1EDD0300C386FE20C7937FCEDDA697A23B
25,459,404 UART: Caliptra RT
25,460,121 UART: [state] CFI Enabled
25,627,148 UART: [rt] RT listening for mailbox commands...
25,629,062 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,660,141 UART: [rt]cmd =0x434b4558, len=80
25,661,559 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,351 UART:
192,723 UART: Running Caliptra ROM ...
193,813 UART:
603,563 UART: [state] CFI Enabled
617,495 UART: [state] LifecycleState = Unprovisioned
619,290 UART: [state] DebugLocked = No
620,671 UART: [state] WD Timer not started. Device not locked for debugging
623,634 UART: [kat] SHA2-256
802,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,314 UART: [kat] ++
814,913 UART: [kat] sha1
825,447 UART: [kat] SHA2-256
828,420 UART: [kat] SHA2-384
834,980 UART: [kat] SHA2-512-ACC
837,980 UART: [kat] ECC-384
3,278,196 UART: [kat] HMAC-384Kdf
3,290,079 UART: [kat] LMS
3,819,508 UART: [kat] --
3,824,567 UART: [cold-reset] ++
3,825,493 UART: [fht] FHT @ 0x50003400
3,836,181 UART: [idev] ++
3,836,742 UART: [idev] CDI.KEYID = 6
3,837,765 UART: [idev] SUBJECT.KEYID = 7
3,838,860 UART: [idev] UDS.KEYID = 0
3,839,862 ready_for_fw is high
3,840,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,307 UART: [idev] Erasing UDS.KEYID = 0
6,304,150 UART: [idev] Sha1 KeyId Algorithm
6,327,452 UART: [idev] --
6,332,580 UART: [ldev] ++
6,333,151 UART: [ldev] CDI.KEYID = 6
6,334,055 UART: [ldev] SUBJECT.KEYID = 5
6,335,229 UART: [ldev] AUTHORITY.KEYID = 7
6,336,457 UART: [ldev] FE.KEYID = 1
6,347,650 UART: [ldev] Erasing FE.KEYID = 1
8,818,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,604,865 UART: [ldev] --
10,608,985 UART: [fwproc] Wait for Commands...
10,610,650 UART: [fwproc] Recv command 0x46574c44
10,612,736 UART: [fwproc] Recv'd Img size: 114448 bytes
14,019,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,198 >>> mbox cmd response: success
14,491,229 UART: [afmc] ++
14,491,853 UART: [afmc] CDI.KEYID = 6
14,492,767 UART: [afmc] SUBJECT.KEYID = 7
14,493,926 UART: [afmc] AUTHORITY.KEYID = 5
16,996,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,785 UART: [afmc] --
18,793,808 UART: [cold-reset] --
18,799,168 UART: [state] Locking Datavault
18,804,299 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,934 UART: [state] Locking ICCM
18,808,342 UART: [exit] Launching FMC @ 0x40000130
18,816,760 UART:
18,816,994 UART: Running Caliptra FMC ...
18,818,086 UART:
18,818,240 UART: [state] CFI Enabled
18,826,290 UART: [fht] FMC Alias Private Key: 7
20,583,368 UART: [art] Extend RT PCRs Done
20,584,589 UART: [art] Lock RT PCRs Done
20,586,266 UART: [art] Populate DV Done
20,591,782 UART: [fht] FMC Alias Private Key: 7
20,593,425 UART: [art] Derive CDI
20,594,231 UART: [art] Store in in slot 0x4
20,636,711 UART: [art] Derive Key Pair
20,637,701 UART: [art] Store priv key in slot 0x5
23,064,123 UART: [art] Derive Key Pair - Done
23,077,118 UART: [art] Signing Cert with AUTHO
23,078,411 UART: RITY.KEYID = 7
24,783,827 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,332 UART: [art] PUB.X = 7455B824D08FD0E4F6AB6BBAE338BDEEF73F7AFF29877BC832D1C65BDB8701467CAF7D51E497A88AE91E3794CAD50E72
24,792,607 UART: [art] PUB.Y = 438D8C7B2F51F46A66C7355FFC984F5F38C52FED9A45AC058398FEF2A7B43E252C042A950523A555FAF891506DEA5B9B
24,799,923 UART: [art] SIG.R = E92E835EE374BC017E23FD2A02BC27EFDE9E6A4508F2FF09FF91F67F638C7485F23F26A1516DA2C6976E3CB654C50A8A
24,807,301 UART: [art] SIG.S = A2FDA5108F64D7DC1F3F5549154D49F050EF1EF31781E2819B70B56139B860998788396142A92BA4DBFF9A314E71A260
25,785,925 UART: Caliptra RT
25,786,624 UART: [state] CFI Enabled
25,904,429 UART: [rt] RT listening for mailbox commands...
25,906,304 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,936,978 UART: [rt]cmd =0x434b4558, len=80
25,938,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,693,039 ready_for_fw is high
3,693,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,676 >>> mbox cmd response: success
18,521,741 UART:
18,522,200 UART: Running Caliptra FMC ...
18,523,302 UART:
18,523,453 UART: [state] CFI Enabled
18,531,181 UART: [fht] FMC Alias Private Key: 7
20,287,711 UART: [art] Extend RT PCRs Done
20,288,942 UART: [art] Lock RT PCRs Done
20,290,753 UART: [art] Populate DV Done
20,296,158 UART: [fht] FMC Alias Private Key: 7
20,297,802 UART: [art] Derive CDI
20,298,530 UART: [art] Store in in slot 0x4
20,341,776 UART: [art] Derive Key Pair
20,342,814 UART: [art] Store priv key in slot 0x5
22,769,216 UART: [art] Derive Key Pair - Done
22,782,419 UART: [art] Signing Cert with AUTHO
22,783,759 UART: RITY.KEYID = 7
24,489,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,886 UART: [art] PUB.X = 9AE340FE9ECDAA730E053A028A1FD8072CF32244A948A203873AC3246AF42EB7D0EC3863C923A9AF7636006BC17CF36A
24,498,120 UART: [art] PUB.Y = AF8583A0496952CC569A1BC25BBB570410BE4E5B4BF37CD8408B290B4B4E954D9F24BF4464AE8B021E9B15167B418545
24,505,426 UART: [art] SIG.R = 9E11FBA1F0605ADBC5981AF8E079AB1016C11BA44783837E76827D79A0EE97E43C5FC72EA1E8D3DFDC6206E9EBCDF726
24,512,802 UART: [art] SIG.S = 4B0830A0900517AC279733F262B905F731F6934A47E7C6CE63930B5E076F613C3A9968769D48959CEFEAEE1CF7F28A6E
25,492,215 UART: Caliptra RT
25,492,916 UART: [state] CFI Enabled
25,608,907 UART: [rt] RT listening for mailbox commands...
25,610,789 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,641,308 UART: [rt]cmd =0x434b4558, len=80
25,642,904 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,095 UART:
192,461 UART: Running Caliptra ROM ...
193,608 UART:
193,755 UART: [state] CFI Enabled
263,665 UART: [state] LifecycleState = Unprovisioned
266,094 UART: [state] DebugLocked = No
267,216 UART: [state] WD Timer not started. Device not locked for debugging
270,120 UART: [kat] SHA2-256
459,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,737 UART: [kat] ++
471,192 UART: [kat] sha1
481,144 UART: [kat] SHA2-256
484,160 UART: [kat] SHA2-384
489,367 UART: [kat] SHA2-512-ACC
491,948 UART: [kat] ECC-384
2,951,364 UART: [kat] HMAC-384Kdf
2,971,912 UART: [kat] LMS
3,503,740 UART: [kat] --
3,508,518 UART: [cold-reset] ++
3,510,871 UART: [fht] FHT @ 0x50003400
3,523,553 UART: [idev] ++
3,524,193 UART: [idev] CDI.KEYID = 6
3,525,151 UART: [idev] SUBJECT.KEYID = 7
3,526,396 UART: [idev] UDS.KEYID = 0
3,527,311 ready_for_fw is high
3,527,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,459 UART: [idev] Erasing UDS.KEYID = 0
6,029,089 UART: [idev] Sha1 KeyId Algorithm
6,051,833 UART: [idev] --
6,056,505 UART: [ldev] ++
6,057,201 UART: [ldev] CDI.KEYID = 6
6,058,088 UART: [ldev] SUBJECT.KEYID = 5
6,059,213 UART: [ldev] AUTHORITY.KEYID = 7
6,060,498 UART: [ldev] FE.KEYID = 1
6,100,692 UART: [ldev] Erasing FE.KEYID = 1
8,607,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,513 UART: [ldev] --
10,412,938 UART: [fwproc] Wait for Commands...
10,416,165 UART: [fwproc] Recv command 0x46574c44
10,418,424 UART: [fwproc] Recv'd Img size: 114448 bytes
13,874,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,073,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,616,051 >>> mbox cmd response: success
14,619,753 UART: [afmc] ++
14,620,457 UART: [afmc] CDI.KEYID = 6
14,621,648 UART: [afmc] SUBJECT.KEYID = 7
14,623,138 UART: [afmc] AUTHORITY.KEYID = 5
17,162,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,886,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,888,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,903,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,918,954 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,934,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,957,744 UART: [afmc] --
18,962,158 UART: [cold-reset] --
18,967,591 UART: [state] Locking Datavault
18,974,028 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,171 UART: [state] Locking ICCM
18,977,619 UART: [exit] Launching FMC @ 0x40000130
18,986,288 UART:
18,986,523 UART: Running Caliptra FMC ...
18,987,623 UART:
18,987,782 UART: [state] CFI Enabled
19,043,058 UART: [fht] FMC Alias Private Key: 7
20,806,313 UART: [art] Extend RT PCRs Done
20,807,533 UART: [art] Lock RT PCRs Done
20,809,239 UART: [art] Populate DV Done
20,814,888 UART: [fht] FMC Alias Private Key: 7
20,816,374 UART: [art] Derive CDI
20,817,134 UART: [art] Store in in slot 0x4
20,875,209 UART: [art] Derive Key Pair
20,876,245 UART: [art] Store priv key in slot 0x5
23,338,975 UART: [art] Derive Key Pair - Done
23,352,180 UART: [art] Signing Cert with AUTHO
23,353,476 UART: RITY.KEYID = 7
25,064,958 UART: [art] Erasing AUTHORITY.KEYID = 7
25,066,456 UART: [art] PUB.X = 4928EDEF8D8B858EE4677656D7B4A7C75980E2CAAFEB1B96B64D8A802C9E93C45865E5EA8F8EDA28646B47C41379F3AF
25,073,752 UART: [art] PUB.Y = 6FDBD0B9BF59C559D8221F35FEA01FB7716D129674BA2920BAA5312C8CDF284051F74B360A6C372AEF1E7F1E62802DA3
25,081,020 UART: [art] SIG.R = 48B7AE0BCE1775C41F7304BB00918A6E649BF47E3BA5854C2F724E7AEF5B36F0CEEC65A936F002289732138E808F9E8B
25,088,427 UART: [art] SIG.S = 5E9C3517ABD9F5098BEB8781DECC03175724F4EE08CC2854536786D05B6F3D7332CF1075C5528F61A58D30288FD9D191
26,067,091 UART: Caliptra RT
26,067,805 UART: [state] CFI Enabled
26,230,910 UART: [rt] RT listening for mailbox commands...
26,232,814 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,263,747 UART: [rt]cmd =0x434b4558, len=80
26,265,378 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,419,419 ready_for_fw is high
3,419,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,037 >>> mbox cmd response: success
19,031,959 UART:
19,032,351 UART: Running Caliptra FMC ...
19,033,479 UART:
19,033,642 UART: [state] CFI Enabled
19,097,076 UART: [fht] FMC Alias Private Key: 7
20,861,078 UART: [art] Extend RT PCRs Done
20,862,286 UART: [art] Lock RT PCRs Done
20,863,614 UART: [art] Populate DV Done
20,868,970 UART: [fht] FMC Alias Private Key: 7
20,870,527 UART: [art] Derive CDI
20,871,265 UART: [art] Store in in slot 0x4
20,929,705 UART: [art] Derive Key Pair
20,930,745 UART: [art] Store priv key in slot 0x5
23,393,766 UART: [art] Derive Key Pair - Done
23,406,545 UART: [art] Signing Cert with AUTHO
23,407,849 UART: RITY.KEYID = 7
25,119,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,363 UART: [art] PUB.X = 5C6C15B6CC895F34E91FE338E4B589FCFB7A5CEADEAF6DFD56FE4A6C48D75B4FB150E00BD7042938468F564EAFC02D66
25,128,661 UART: [art] PUB.Y = B1C0DE348159BDFAB95300C8F6DDBBAB9DD426FCFCC2EDAC4648E242B28BE969FA318624DA88903694BCD6B241EE6C4B
25,135,959 UART: [art] SIG.R = CE46A1635C9F08446BCEC83B455CD4237226E25E4AFF17D9AEBE9D8106626D76F0D92E670E006BE3ADC49067CC307CAB
25,143,353 UART: [art] SIG.S = D12D2D3BE3F922BA05A8020FE067AF7B49FD12218F034C2224188BC31E10D76FD6EAD0E0CA7097F24A7AB214ADF72865
26,122,180 UART: Caliptra RT
26,122,895 UART: [state] CFI Enabled
26,288,496 UART: [rt] RT listening for mailbox commands...
26,290,496 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,321,520 UART: [rt]cmd =0x434b4558, len=80
26,322,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,485 UART:
192,847 UART: Running Caliptra ROM ...
193,975 UART:
603,681 UART: [state] CFI Enabled
617,559 UART: [state] LifecycleState = Unprovisioned
619,932 UART: [state] DebugLocked = No
622,664 UART: [state] WD Timer not started. Device not locked for debugging
627,834 UART: [kat] SHA2-256
817,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,469 UART: [kat] ++
829,073 UART: [kat] sha1
841,235 UART: [kat] SHA2-256
844,309 UART: [kat] SHA2-384
850,309 UART: [kat] SHA2-512-ACC
852,886 UART: [kat] ECC-384
3,297,915 UART: [kat] HMAC-384Kdf
3,309,714 UART: [kat] LMS
3,841,552 UART: [kat] --
3,844,128 UART: [cold-reset] ++
3,846,197 UART: [fht] FHT @ 0x50003400
3,856,335 UART: [idev] ++
3,857,085 UART: [idev] CDI.KEYID = 6
3,857,998 UART: [idev] SUBJECT.KEYID = 7
3,859,167 UART: [idev] UDS.KEYID = 0
3,860,084 ready_for_fw is high
3,860,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,056 UART: [idev] Erasing UDS.KEYID = 0
6,336,301 UART: [idev] Sha1 KeyId Algorithm
6,359,568 UART: [idev] --
6,363,633 UART: [ldev] ++
6,364,312 UART: [ldev] CDI.KEYID = 6
6,365,220 UART: [ldev] SUBJECT.KEYID = 5
6,366,369 UART: [ldev] AUTHORITY.KEYID = 7
6,367,592 UART: [ldev] FE.KEYID = 1
6,377,431 UART: [ldev] Erasing FE.KEYID = 1
8,854,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,173 UART: [ldev] --
10,644,968 UART: [fwproc] Wait for Commands...
10,646,568 UART: [fwproc] Recv command 0x46574c44
10,649,076 UART: [fwproc] Recv'd Img size: 114448 bytes
14,088,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,998 >>> mbox cmd response: success
14,833,403 UART: [afmc] ++
14,834,103 UART: [afmc] CDI.KEYID = 6
14,835,340 UART: [afmc] SUBJECT.KEYID = 7
14,836,769 UART: [afmc] AUTHORITY.KEYID = 5
17,340,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,465 UART: [afmc] --
19,140,391 UART: [cold-reset] --
19,145,501 UART: [state] Locking Datavault
19,152,611 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,814 UART: [state] Locking ICCM
19,156,258 UART: [exit] Launching FMC @ 0x40000130
19,164,931 UART:
19,165,165 UART: Running Caliptra FMC ...
19,166,257 UART:
19,166,413 UART: [state] CFI Enabled
19,174,127 UART: [fht] FMC Alias Private Key: 7
20,931,309 UART: [art] Extend RT PCRs Done
20,932,527 UART: [art] Lock RT PCRs Done
20,934,225 UART: [art] Populate DV Done
20,939,376 UART: [fht] FMC Alias Private Key: 7
20,941,066 UART: [art] Derive CDI
20,941,878 UART: [art] Store in in slot 0x4
20,984,309 UART: [art] Derive Key Pair
20,985,343 UART: [art] Store priv key in slot 0x5
23,412,250 UART: [art] Derive Key Pair - Done
23,424,923 UART: [art] Signing Cert with AUTHO
23,426,221 UART: RITY.KEYID = 7
25,131,583 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,086 UART: [art] PUB.X = 5F39F209D42E3FFA0E66678AE3C1AAF7B3E5032F74B61156C90FE0EC5D0B9E22656F84FFD7735318EC96E27B4C609A65
25,140,361 UART: [art] PUB.Y = DC28B5C4B93B03D519741C6720F7C0F25E594BB472A7E29E1907FEDEB9CC3EEB5A030CE3431057DFCE233D4A656BD1EE
25,147,675 UART: [art] SIG.R = 7544E88A6635324D401362CD8E07C9B27E8386719C99CA5A18AF0B2D6ADBEA564696E5A74B4DE3768F04425753A22FCC
25,155,040 UART: [art] SIG.S = 000A94BCC0442A36E57288F2B2CEA3B15D04616F0773CD05DF97BACB052925E91D74A3222061C754BF4A97CCBDEFCB9A
26,133,850 UART: Caliptra RT
26,134,558 UART: [state] CFI Enabled
26,252,161 UART: [rt] RT listening for mailbox commands...
26,254,041 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,284,613 UART: [rt]cmd =0x434b4558, len=80
26,286,091 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,757,110 ready_for_fw is high
3,757,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,626 >>> mbox cmd response: success
19,220,066 UART:
19,220,461 UART: Running Caliptra FMC ...
19,221,601 UART:
19,221,757 UART: [state] CFI Enabled
19,229,457 UART: [fht] FMC Alias Private Key: 7
20,985,621 UART: [art] Extend RT PCRs Done
20,986,848 UART: [art] Lock RT PCRs Done
20,988,368 UART: [art] Populate DV Done
20,993,782 UART: [fht] FMC Alias Private Key: 7
20,995,481 UART: [art] Derive CDI
20,996,296 UART: [art] Store in in slot 0x4
21,038,641 UART: [art] Derive Key Pair
21,039,684 UART: [art] Store priv key in slot 0x5
23,466,604 UART: [art] Derive Key Pair - Done
23,479,553 UART: [art] Signing Cert with AUTHO
23,480,860 UART: RITY.KEYID = 7
25,186,419 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,925 UART: [art] PUB.X = D35BD65F0DDAEB00A41DADAF9E8962FE91DC6054139ABF38F87D57C6C2788503D1C659D2E71894DC1CBC6EE5C7DA739A
25,195,215 UART: [art] PUB.Y = E48D29093388DD47E405A01481BE3E9FB2B76BD68EE002564688C16D176A0A678C2522745413E283602347BB218B9618
25,202,447 UART: [art] SIG.R = C2EC151E9D2D827699329423D43FEC34CAFF5E70C947C61821CF8A67FFA862EB37E65DF36E2A62B49D283735BFDC7CA7
25,209,838 UART: [art] SIG.S = EE852F1C82FA52374D48A0811E872E2556425E8ED57C6CFEE1EACDD8EE398CD0AAEB3FE38E839EF5F0AE0875064DFB80
26,189,120 UART: Caliptra RT
26,189,811 UART: [state] CFI Enabled
26,307,258 UART: [rt] RT listening for mailbox commands...
26,309,128 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,339,530 UART: [rt]cmd =0x434b4558, len=80
26,340,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,135 UART: [kat] SHA2-256
882,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,181 UART: [kat] ++
886,333 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,042 UART: [kat] SHA2-512-ACC
896,943 UART: [kat] ECC-384
902,314 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,476,117 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,290 UART: [idev] ++
1,479,458 UART: [idev] CDI.KEYID = 6
1,479,818 UART: [idev] SUBJECT.KEYID = 7
1,480,242 UART: [idev] UDS.KEYID = 0
1,480,587 ready_for_fw is high
1,480,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,870 UART: [idev] Erasing UDS.KEYID = 0
1,504,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,934 UART: [idev] --
1,513,901 UART: [ldev] ++
1,514,069 UART: [ldev] CDI.KEYID = 6
1,514,432 UART: [ldev] SUBJECT.KEYID = 5
1,514,858 UART: [ldev] AUTHORITY.KEYID = 7
1,515,321 UART: [ldev] FE.KEYID = 1
1,520,321 UART: [ldev] Erasing FE.KEYID = 1
1,545,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,316 UART: [ldev] --
1,584,607 UART: [fwproc] Waiting for Commands...
1,585,454 UART: [fwproc] Received command 0x46574c44
1,586,245 UART: [fwproc] Received Image of size 114448 bytes
2,884,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,076,091 >>> mbox cmd response: success
3,077,139 UART: [afmc] ++
3,077,307 UART: [afmc] CDI.KEYID = 6
3,077,669 UART: [afmc] SUBJECT.KEYID = 7
3,078,094 UART: [afmc] AUTHORITY.KEYID = 5
3,112,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,774 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,464 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,431 UART: [afmc] --
3,156,357 UART: [cold-reset] --
3,157,499 UART: [state] Locking Datavault
3,158,784 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,388 UART: [state] Locking ICCM
3,159,842 UART: [exit] Launching FMC @ 0x40000130
3,165,171 UART:
3,165,187 UART: Running Caliptra FMC ...
3,165,595 UART:
3,165,649 UART: [state] CFI Enabled
3,176,000 UART: [fht] FMC Alias Private Key: 7
3,284,131 UART: [art] Extend RT PCRs Done
3,284,559 UART: [art] Lock RT PCRs Done
3,286,169 UART: [art] Populate DV Done
3,294,146 UART: [fht] FMC Alias Private Key: 7
3,295,238 UART: [art] Derive CDI
3,295,518 UART: [art] Store in in slot 0x4
3,380,987 UART: [art] Derive Key Pair
3,381,347 UART: [art] Store priv key in slot 0x5
3,394,671 UART: [art] Derive Key Pair - Done
3,409,423 UART: [art] Signing Cert with AUTHO
3,409,903 UART: RITY.KEYID = 7
3,424,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,478 UART: [art] PUB.X = 361F307B493D4F8DC4CB121263623E360678DFD6EE3D588604992F4C7AF8FB84C6BB386B5FF5BB5CBA85D531F59F095E
3,432,249 UART: [art] PUB.Y = 74FDA9601DE637EF8192C3754CF0B97BE0551B728ACB728889FE28355C29F6152C8360179630BDEF65234A65342E48BD
3,439,197 UART: [art] SIG.R = 0B35949E3671B043E5FE80BE14D98F64C50379B411BF7BEC5E6F25E7E38C34052CEA23D61F082D09AE042787845961C6
3,445,949 UART: [art] SIG.S = 0B79AD8532CF9165E34CABEFAD85682B6B59D10DD7B59CE81CF778BECAA64C947D14B3671F5FAE9E0D0ADA38347964B4
3,469,918 UART: Caliptra RT
3,470,171 UART: [state] CFI Enabled
3,578,157 UART: [rt] RT listening for mailbox commands...
3,578,827 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,121 UART: [rt]cmd =0x434b4558, len=80
3,610,233 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,291 ready_for_fw is high
1,362,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,575 >>> mbox cmd response: success
2,988,577 UART:
2,988,593 UART: Running Caliptra FMC ...
2,989,001 UART:
2,989,055 UART: [state] CFI Enabled
2,999,836 UART: [fht] FMC Alias Private Key: 7
3,107,575 UART: [art] Extend RT PCRs Done
3,108,003 UART: [art] Lock RT PCRs Done
3,109,369 UART: [art] Populate DV Done
3,117,602 UART: [fht] FMC Alias Private Key: 7
3,118,744 UART: [art] Derive CDI
3,119,024 UART: [art] Store in in slot 0x4
3,204,439 UART: [art] Derive Key Pair
3,204,799 UART: [art] Store priv key in slot 0x5
3,218,245 UART: [art] Derive Key Pair - Done
3,233,194 UART: [art] Signing Cert with AUTHO
3,233,674 UART: RITY.KEYID = 7
3,249,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,975 UART: [art] PUB.X = 099F9F3A323FF6437C88F9900B13662633C8DB08A7412E1027BA83B1BF1B0932F5A3054B36825576EA64B235C6629E10
3,256,722 UART: [art] PUB.Y = 875017A0678CC38BDD54EB8A39ABBE8342536DEB286FED677C70D09086DD2A2154656F2AAE52A623B44BC1FF8B54F118
3,263,682 UART: [art] SIG.R = 60E140444D1744ABB786F48ECED738B6D75A38ED8450719B6636DF4A86BA5F19EC0ED9F18ACE518F81AAF6920EAE2968
3,270,458 UART: [art] SIG.S = 842158920D94310FAA2967C160421BF0446BEC51946C118529F2EF2F8F280E29C2525675883AA2BE75410668ED163A36
3,293,839 UART: Caliptra RT
3,294,092 UART: [state] CFI Enabled
3,402,553 UART: [rt] RT listening for mailbox commands...
3,403,223 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,567 UART: [rt]cmd =0x434b4558, len=80
3,434,717 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,635 UART: [kat] SHA2-512-ACC
897,536 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,645 UART: [kat] LMS
1,475,841 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,481,478 ready_for_fw is high
1,481,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,505,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,367 UART: [idev] --
1,515,438 UART: [ldev] ++
1,515,606 UART: [ldev] CDI.KEYID = 6
1,515,969 UART: [ldev] SUBJECT.KEYID = 5
1,516,395 UART: [ldev] AUTHORITY.KEYID = 7
1,516,858 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,147 UART: [ldev] --
1,586,556 UART: [fwproc] Waiting for Commands...
1,587,313 UART: [fwproc] Received command 0x46574c44
1,588,104 UART: [fwproc] Received Image of size 114448 bytes
2,886,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,610 >>> mbox cmd response: success
3,079,770 UART: [afmc] ++
3,079,938 UART: [afmc] CDI.KEYID = 6
3,080,300 UART: [afmc] SUBJECT.KEYID = 7
3,080,725 UART: [afmc] AUTHORITY.KEYID = 5
3,115,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,281 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,971 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,900 UART: [afmc] --
3,158,820 UART: [cold-reset] --
3,159,836 UART: [state] Locking Datavault
3,160,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,479 UART: [state] Locking ICCM
3,161,997 UART: [exit] Launching FMC @ 0x40000130
3,167,326 UART:
3,167,342 UART: Running Caliptra FMC ...
3,167,750 UART:
3,167,893 UART: [state] CFI Enabled
3,178,438 UART: [fht] FMC Alias Private Key: 7
3,286,087 UART: [art] Extend RT PCRs Done
3,286,515 UART: [art] Lock RT PCRs Done
3,287,857 UART: [art] Populate DV Done
3,296,354 UART: [fht] FMC Alias Private Key: 7
3,297,524 UART: [art] Derive CDI
3,297,804 UART: [art] Store in in slot 0x4
3,383,757 UART: [art] Derive Key Pair
3,384,117 UART: [art] Store priv key in slot 0x5
3,397,355 UART: [art] Derive Key Pair - Done
3,412,013 UART: [art] Signing Cert with AUTHO
3,412,493 UART: RITY.KEYID = 7
3,427,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,554 UART: [art] PUB.X = 65962E6E412BE39EF69BE1492092D12AB9B3D76A1FE7B485A2C08426CC1CB27FDD295CBA11B3446EC650CFEAC21C849D
3,435,340 UART: [art] PUB.Y = E894849E6D60BBD9162F5F748D9B4E5484C08F6F8646F97DD00BD4FCB3AD5C6772CD1DB9BA4D329772E5C6B393BD197E
3,442,301 UART: [art] SIG.R = C1C348974055E41B9A99C13827F530ACD7723C3C8E66F9B8DD0795BFA0C29710843044E44E5454D642CD3CE041325DC6
3,449,066 UART: [art] SIG.S = F47382C10F5B498FFCC5B8FBAA659FF4FCB0C626A0818C90FC913A90B165FFD1011C2D9CB2F6F1D5A88F2EDF7D01ED85
3,472,704 UART: Caliptra RT
3,473,049 UART: [state] CFI Enabled
3,581,277 UART: [rt] RT listening for mailbox commands...
3,581,947 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,015 UART: [rt]cmd =0x434b4558, len=80
3,613,107 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,408 ready_for_fw is high
1,362,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,048 >>> mbox cmd response: success
2,991,350 UART:
2,991,366 UART: Running Caliptra FMC ...
2,991,774 UART:
2,991,917 UART: [state] CFI Enabled
3,002,606 UART: [fht] FMC Alias Private Key: 7
3,110,747 UART: [art] Extend RT PCRs Done
3,111,175 UART: [art] Lock RT PCRs Done
3,112,849 UART: [art] Populate DV Done
3,121,322 UART: [fht] FMC Alias Private Key: 7
3,122,300 UART: [art] Derive CDI
3,122,580 UART: [art] Store in in slot 0x4
3,208,163 UART: [art] Derive Key Pair
3,208,523 UART: [art] Store priv key in slot 0x5
3,221,319 UART: [art] Derive Key Pair - Done
3,236,441 UART: [art] Signing Cert with AUTHO
3,236,921 UART: RITY.KEYID = 7
3,251,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,610 UART: [art] PUB.X = 88B65C670726EBA9002073460AF886E028E6310BC5CF0D74B4C22889A43F4B9DA8A7A96CA22824725AB336EE98E7B4CF
3,259,350 UART: [art] PUB.Y = C8F7511360B3DA3A6322E53EB9C8B76C2A53F2A6AD501BB280DEFB1EAD37BCD37FDF4C05BA00830CB6D50678A948F272
3,266,287 UART: [art] SIG.R = D52C45856A8F82C80E599E66F1698B1BCBF63A678E8076FD1E1CDA08814BD1D0A19B4DE34B7CB1F8D10C3206A00D599F
3,273,054 UART: [art] SIG.S = A4A0386A28FC5B091E779457FE69017C3E3340571587F915DB0DD7E5CE9110011346786D193980350E253D275BD51BE3
3,297,166 UART: Caliptra RT
3,297,511 UART: [state] CFI Enabled
3,405,877 UART: [rt] RT listening for mailbox commands...
3,406,547 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,823 UART: [rt]cmd =0x434b4558, len=80
3,437,833 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,632 UART: [kat] LMS
1,170,960 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,283 UART: [fht] FHT @ 0x50003400
1,175,144 UART: [idev] ++
1,175,312 UART: [idev] CDI.KEYID = 6
1,175,672 UART: [idev] SUBJECT.KEYID = 7
1,176,096 UART: [idev] UDS.KEYID = 0
1,176,441 ready_for_fw is high
1,176,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,052 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,210,009 UART: [idev] --
1,211,095 UART: [ldev] ++
1,211,263 UART: [ldev] CDI.KEYID = 6
1,211,626 UART: [ldev] SUBJECT.KEYID = 5
1,212,052 UART: [ldev] AUTHORITY.KEYID = 7
1,212,515 UART: [ldev] FE.KEYID = 1
1,217,893 UART: [ldev] Erasing FE.KEYID = 1
1,244,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,779 UART: [ldev] --
1,283,282 UART: [fwproc] Wait for Commands...
1,284,004 UART: [fwproc] Recv command 0x46574c44
1,284,732 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,786 >>> mbox cmd response: success
2,777,838 UART: [afmc] ++
2,778,006 UART: [afmc] CDI.KEYID = 6
2,778,368 UART: [afmc] SUBJECT.KEYID = 7
2,778,793 UART: [afmc] AUTHORITY.KEYID = 5
2,814,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,123 UART: [afmc] --
2,858,227 UART: [cold-reset] --
2,858,815 UART: [state] Locking Datavault
2,860,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,714 UART: [state] Locking ICCM
2,861,246 UART: [exit] Launching FMC @ 0x40000130
2,866,575 UART:
2,866,591 UART: Running Caliptra FMC ...
2,866,999 UART:
2,867,053 UART: [state] CFI Enabled
2,877,436 UART: [fht] FMC Alias Private Key: 7
2,985,785 UART: [art] Extend RT PCRs Done
2,986,213 UART: [art] Lock RT PCRs Done
2,987,475 UART: [art] Populate DV Done
2,995,572 UART: [fht] FMC Alias Private Key: 7
2,996,568 UART: [art] Derive CDI
2,996,848 UART: [art] Store in in slot 0x4
3,082,143 UART: [art] Derive Key Pair
3,082,503 UART: [art] Store priv key in slot 0x5
3,095,477 UART: [art] Derive Key Pair - Done
3,109,911 UART: [art] Signing Cert with AUTHO
3,110,391 UART: RITY.KEYID = 7
3,125,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,556 UART: [art] PUB.X = 08ECB18F468FE7A9EDD5E76563AC14BBF551F64BE89C08577D88A0E4361E131C72FE5C811C041ADEBC95A60AE22EA2A7
3,133,332 UART: [art] PUB.Y = 211B04BA2A9DAABC9006CD3F0B293F4427A27F5868E21C9719022F8DF7CE46AFA926F6DAD39D4EBC4D40A967B68C3BF4
3,140,288 UART: [art] SIG.R = CCEE09BAAF6292CDE221B43B136FE42324ACDDC6374D50352BE992A73FB962E8ACDEE35DE1DA24DD0175DE051A1B9423
3,147,071 UART: [art] SIG.S = FACE982645B7F20C96E2B56D5FBFBF377D0E68C6809193A0449CF2E940D76FFEFF5610D9E1D13760B8141CA83E6E9A68
3,171,264 UART: Caliptra RT
3,171,517 UART: [state] CFI Enabled
3,279,381 UART: [rt] RT listening for mailbox commands...
3,280,051 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,375 UART: [rt]cmd =0x434b4558, len=80
3,311,445 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 ready_for_fw is high
1,060,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,583 >>> mbox cmd response: success
2,691,107 UART:
2,691,123 UART: Running Caliptra FMC ...
2,691,531 UART:
2,691,585 UART: [state] CFI Enabled
2,701,684 UART: [fht] FMC Alias Private Key: 7
2,809,631 UART: [art] Extend RT PCRs Done
2,810,059 UART: [art] Lock RT PCRs Done
2,811,773 UART: [art] Populate DV Done
2,819,904 UART: [fht] FMC Alias Private Key: 7
2,820,912 UART: [art] Derive CDI
2,821,192 UART: [art] Store in in slot 0x4
2,906,887 UART: [art] Derive Key Pair
2,907,247 UART: [art] Store priv key in slot 0x5
2,920,377 UART: [art] Derive Key Pair - Done
2,935,296 UART: [art] Signing Cert with AUTHO
2,935,776 UART: RITY.KEYID = 7
2,951,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,981 UART: [art] PUB.X = F7924733E9A5BA57A02B025518951180F4BA8576B09AF3ECED05B886867885DC79EC220DDF2196D6272D26412300C616
2,958,714 UART: [art] PUB.Y = B8BC2FE38BB3BD4C4B1DE0678D2B0CF543935279151561791F6FFF890196DEA45E48AADEF6C25B1C1F0803D5368F970F
2,965,661 UART: [art] SIG.R = 67A298A31FC96712BF5BD1B8307C7D569A96DE056F2D9DAEB7FBD98B2532B7BB51A02D20F873224A1E04E5F84AB83FDC
2,972,441 UART: [art] SIG.S = D951F0ECE09A373922469C12BBA6103FDB60494ED1CDD80C0682F1BD7A3AEFD2E24016E791747881E8C57A9A0CEAA98C
2,996,373 UART: Caliptra RT
2,996,626 UART: [state] CFI Enabled
3,105,101 UART: [rt] RT listening for mailbox commands...
3,105,771 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,741 UART: [rt]cmd =0x434b4558, len=80
3,136,659 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,789 UART: [kat] SHA2-512-ACC
908,690 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
923,103 UART: [kat] LMS
1,171,431 UART: [kat] --
1,172,492 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 ready_for_fw is high
1,176,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,231 UART: [idev] Erasing UDS.KEYID = 0
1,201,048 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,388 UART: [ldev] ++
1,210,556 UART: [ldev] CDI.KEYID = 6
1,210,919 UART: [ldev] SUBJECT.KEYID = 5
1,211,345 UART: [ldev] AUTHORITY.KEYID = 7
1,211,808 UART: [ldev] FE.KEYID = 1
1,216,616 UART: [ldev] Erasing FE.KEYID = 1
1,243,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,864 UART: [ldev] --
1,282,353 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,253 >>> mbox cmd response: success
2,776,419 UART: [afmc] ++
2,776,587 UART: [afmc] CDI.KEYID = 6
2,776,949 UART: [afmc] SUBJECT.KEYID = 7
2,777,374 UART: [afmc] AUTHORITY.KEYID = 5
2,812,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,677 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,396 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,478 UART: [afmc] --
2,856,370 UART: [cold-reset] --
2,857,118 UART: [state] Locking Datavault
2,858,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,641 UART: [state] Locking ICCM
2,859,193 UART: [exit] Launching FMC @ 0x40000130
2,864,522 UART:
2,864,538 UART: Running Caliptra FMC ...
2,864,946 UART:
2,865,089 UART: [state] CFI Enabled
2,875,640 UART: [fht] FMC Alias Private Key: 7
2,983,459 UART: [art] Extend RT PCRs Done
2,983,887 UART: [art] Lock RT PCRs Done
2,985,261 UART: [art] Populate DV Done
2,993,270 UART: [fht] FMC Alias Private Key: 7
2,994,300 UART: [art] Derive CDI
2,994,580 UART: [art] Store in in slot 0x4
3,079,839 UART: [art] Derive Key Pair
3,080,199 UART: [art] Store priv key in slot 0x5
3,093,733 UART: [art] Derive Key Pair - Done
3,108,625 UART: [art] Signing Cert with AUTHO
3,109,105 UART: RITY.KEYID = 7
3,124,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,980 UART: [art] PUB.X = 04A7F5B7A34C77221562DED0450CEF0DFD3A5B3F8FEF02A2CDDB0D8A42C8234547D6325BEB94FA3EA2DF059EC2692004
3,131,747 UART: [art] PUB.Y = 6C5B48189DC5F63557725D6EA844E64269149BAE96CCB5884BE4C39CABAEEBE7361704128814B0E249612AC7832774B9
3,138,694 UART: [art] SIG.R = 0AADC117966AA3CD12E2631A537F7E5B5A75751A09767BFA423D78CBB96BD4C8D6B21CD157C946E4DCC9F9A2B1E46B53
3,145,474 UART: [art] SIG.S = 05ECFF6C2475B0218FA90585CAF72DACD3E3B4CC9A008184F7AF7C482CA06531516CEC8E3E17CAE9319D80FFF3A1F6CA
3,169,301 UART: Caliptra RT
3,169,646 UART: [state] CFI Enabled
3,277,191 UART: [rt] RT listening for mailbox commands...
3,277,861 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,147 UART: [rt]cmd =0x434b4558, len=80
3,309,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,402 ready_for_fw is high
1,060,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,696 >>> mbox cmd response: success
2,691,478 UART:
2,691,494 UART: Running Caliptra FMC ...
2,691,902 UART:
2,692,045 UART: [state] CFI Enabled
2,702,704 UART: [fht] FMC Alias Private Key: 7
2,810,607 UART: [art] Extend RT PCRs Done
2,811,035 UART: [art] Lock RT PCRs Done
2,812,721 UART: [art] Populate DV Done
2,820,948 UART: [fht] FMC Alias Private Key: 7
2,822,062 UART: [art] Derive CDI
2,822,342 UART: [art] Store in in slot 0x4
2,908,129 UART: [art] Derive Key Pair
2,908,489 UART: [art] Store priv key in slot 0x5
2,922,385 UART: [art] Derive Key Pair - Done
2,937,027 UART: [art] Signing Cert with AUTHO
2,937,507 UART: RITY.KEYID = 7
2,952,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,710 UART: [art] PUB.X = 5BD0754C6233B2E72479CFBDE133C256DDF4E32F3C61AA11349B73BCEAEC6B6C54B40AFC42478F9FE23BA1E6B9F2589A
2,960,497 UART: [art] PUB.Y = BDB73A2E27F495FFDD605268361C7FFA2219556F93222FCA30E04CD24F6125927A185D69B4AE8E58DBF22A30C692BE13
2,967,455 UART: [art] SIG.R = DCE68D32EDD7C661FAB4481EAC3FC82C2E9F2712B1FF63A77B68535F404E63D9FC50D7BF3DDCDC7DC09E14C79D39F098
2,974,249 UART: [art] SIG.S = 3547B17281615DC3564E1F654253838406E68C24D4F61890942520CA3BF2917742E188D5483B79E3F61C8B0D001E9BFD
2,998,128 UART: Caliptra RT
2,998,473 UART: [state] CFI Enabled
3,106,034 UART: [rt] RT listening for mailbox commands...
3,106,704 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,370 UART: [rt]cmd =0x434b4558, len=80
3,138,564 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 ready_for_fw is high
1,174,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,802 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x46574c44
1,282,290 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,396 >>> mbox cmd response: success
2,774,613 UART: [afmc] ++
2,774,781 UART: [afmc] CDI.KEYID = 6
2,775,144 UART: [afmc] SUBJECT.KEYID = 7
2,775,570 UART: [afmc] AUTHORITY.KEYID = 5
2,810,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,552 UART: [afmc] --
2,854,496 UART: [cold-reset] --
2,855,232 UART: [state] Locking Datavault
2,856,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,021 UART: [state] Locking ICCM
2,857,493 UART: [exit] Launching FMC @ 0x40000130
2,862,822 UART:
2,862,838 UART: Running Caliptra FMC ...
2,863,246 UART:
2,863,300 UART: [state] CFI Enabled
2,874,103 UART: [fht] FMC Alias Private Key: 7
2,982,070 UART: [art] Extend RT PCRs Done
2,982,498 UART: [art] Lock RT PCRs Done
2,984,180 UART: [art] Populate DV Done
2,992,369 UART: [fht] FMC Alias Private Key: 7
2,993,421 UART: [art] Derive CDI
2,993,701 UART: [art] Store in in slot 0x4
3,079,002 UART: [art] Derive Key Pair
3,079,362 UART: [art] Store priv key in slot 0x5
3,092,958 UART: [art] Derive Key Pair - Done
3,107,653 UART: [art] Signing Cert with AUTHO
3,108,133 UART: RITY.KEYID = 7
3,123,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,036 UART: [art] PUB.X = F04C17AE1586A772B1F34066CB74B0B72C2DE613791B348CEDA5C054CCB70B1C456A25009988926B434CC03646CA0AEF
3,130,784 UART: [art] PUB.Y = 8BEFD5453D2EC9BA1BFDB2EA5CDBE939522FDBA7B65ABC95460D873422A2C6CDFEC51F54C2E1B39E7AEFC15EE42921C7
3,137,763 UART: [art] SIG.R = 47E35EC3F2F87118A3CC8671FE3B93B5029B3265C38041CB84D450F823C6B124C0691F44DE3BB97639B994646953D67A
3,144,526 UART: [art] SIG.S = 017A93B9A93CC3BFA5194357071D69535EC9F1DC4BEC42A04B441C9F83A5F42562254AF1A2464FE98C6936F895E60C54
3,168,348 UART: Caliptra RT
3,168,601 UART: [state] CFI Enabled
3,276,498 UART: [rt] RT listening for mailbox commands...
3,277,168 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,260 UART: [rt]cmd =0x434b4558, len=80
3,308,260 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,752 ready_for_fw is high
1,055,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,148 >>> mbox cmd response: success
2,688,332 UART:
2,688,348 UART: Running Caliptra FMC ...
2,688,756 UART:
2,688,810 UART: [state] CFI Enabled
2,699,223 UART: [fht] FMC Alias Private Key: 7
2,806,370 UART: [art] Extend RT PCRs Done
2,806,798 UART: [art] Lock RT PCRs Done
2,808,386 UART: [art] Populate DV Done
2,816,669 UART: [fht] FMC Alias Private Key: 7
2,817,829 UART: [art] Derive CDI
2,818,109 UART: [art] Store in in slot 0x4
2,903,694 UART: [art] Derive Key Pair
2,904,054 UART: [art] Store priv key in slot 0x5
2,917,382 UART: [art] Derive Key Pair - Done
2,932,004 UART: [art] Signing Cert with AUTHO
2,932,484 UART: RITY.KEYID = 7
2,947,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,449 UART: [art] PUB.X = 4F86EA2DDD360AFFB92457582334A2DD0BBA4776D7F3C198A3072777375657A98B9AB4B4D9570E404485CAC90762230A
2,955,201 UART: [art] PUB.Y = 4E19701C2039CBE1D1B1A8402923E538AC238ED75DC3440A69BF78DDC9172B898F2D54162006D9EDA66EF411C50AEACF
2,962,152 UART: [art] SIG.R = 9243462E9E920C1F4AD71A7274D2793E3DED7872E6AC929BFAF8EE1284452FA6E88E1522693C244DFD603CA9FE0FD1A5
2,968,926 UART: [art] SIG.S = 5421E123AF858F9BA81D60EB1D9E3A6FB43A3DEC5D98B516F6E2D1F5D7BFA2AFF9AD705BCAFA6563C8C2A2C44ED3A58C
2,992,483 UART: Caliptra RT
2,992,736 UART: [state] CFI Enabled
3,100,829 UART: [rt] RT listening for mailbox commands...
3,101,499 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,633 UART: [rt]cmd =0x434b4558, len=80
3,132,621 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,332 UART: [kat] SHA2-256
902,272 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
917,041 UART: [kat] HMAC-384Kdf
921,653 UART: [kat] LMS
1,169,965 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,174,722 ready_for_fw is high
1,174,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,463 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,933 UART: [ldev] --
1,282,353 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,863 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,359 >>> mbox cmd response: success
2,775,424 UART: [afmc] ++
2,775,592 UART: [afmc] CDI.KEYID = 6
2,775,955 UART: [afmc] SUBJECT.KEYID = 7
2,776,381 UART: [afmc] AUTHORITY.KEYID = 5
2,811,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,827 UART: [afmc] --
2,854,883 UART: [cold-reset] --
2,855,719 UART: [state] Locking Datavault
2,856,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,582 UART: [state] Locking ICCM
2,858,130 UART: [exit] Launching FMC @ 0x40000130
2,863,459 UART:
2,863,475 UART: Running Caliptra FMC ...
2,863,883 UART:
2,864,026 UART: [state] CFI Enabled
2,874,563 UART: [fht] FMC Alias Private Key: 7
2,982,712 UART: [art] Extend RT PCRs Done
2,983,140 UART: [art] Lock RT PCRs Done
2,984,478 UART: [art] Populate DV Done
2,992,669 UART: [fht] FMC Alias Private Key: 7
2,993,715 UART: [art] Derive CDI
2,993,995 UART: [art] Store in in slot 0x4
3,079,478 UART: [art] Derive Key Pair
3,079,838 UART: [art] Store priv key in slot 0x5
3,092,810 UART: [art] Derive Key Pair - Done
3,107,460 UART: [art] Signing Cert with AUTHO
3,107,940 UART: RITY.KEYID = 7
3,123,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,863 UART: [art] PUB.X = C39920B572939018F23729E1020D21702723F2A80420B33C011FDDEAC872910CAF8AC2FB7AF85307B8F87F9104DE55DF
3,130,612 UART: [art] PUB.Y = BF9B85B43A9F5999DA76F10CEED564B1390ADFEFE912EF3E8EB0B8E87BC6321E5FC4FD8273CE911F424BF55EC5A2DD29
3,137,582 UART: [art] SIG.R = 56F19A46FBF81E48A800C25BD89A8A6A52D9A9A3CA08CF9CC307E42882826D5C37DE9E4D9A4A4E26F25414E72942DEFC
3,144,338 UART: [art] SIG.S = 2F8431CE5BFA3861B6FC003741B0B02D1F81B5809F94B3A523371926A764501B3131A077858B7C024B786EED2B3D38A7
3,167,790 UART: Caliptra RT
3,168,135 UART: [state] CFI Enabled
3,274,946 UART: [rt] RT listening for mailbox commands...
3,275,616 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,152 UART: [rt]cmd =0x434b4558, len=80
3,307,040 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 ready_for_fw is high
1,056,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,669 >>> mbox cmd response: success
2,687,251 UART:
2,687,267 UART: Running Caliptra FMC ...
2,687,675 UART:
2,687,818 UART: [state] CFI Enabled
2,698,251 UART: [fht] FMC Alias Private Key: 7
2,805,822 UART: [art] Extend RT PCRs Done
2,806,250 UART: [art] Lock RT PCRs Done
2,807,968 UART: [art] Populate DV Done
2,816,337 UART: [fht] FMC Alias Private Key: 7
2,817,307 UART: [art] Derive CDI
2,817,587 UART: [art] Store in in slot 0x4
2,903,470 UART: [art] Derive Key Pair
2,903,830 UART: [art] Store priv key in slot 0x5
2,917,234 UART: [art] Derive Key Pair - Done
2,932,106 UART: [art] Signing Cert with AUTHO
2,932,586 UART: RITY.KEYID = 7
2,948,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,843 UART: [art] PUB.X = 8ACE68534E5B598EEC8C354E79D2B21316BF9164FF1916F297C628257FF3C6CC0DF8AEF00E0EE97C87FBA5DD9AB6114E
2,955,622 UART: [art] PUB.Y = F54A1CFE61A1BD3716DAC58A8CD6668CE1EB3B69DB0B0FF153DE32B81754A4217EC1FBB4913DD5A4366CE650AD5F75B7
2,962,588 UART: [art] SIG.R = 3F29E160BD0617E61E7A45150DD122C21C62115DD50F005F99206DACB2D53B687A826358A7809A1B516ABD2923A45B55
2,969,325 UART: [art] SIG.S = 4F0603CA19BF1E08CF5C88CF0A74DCC8DC14B370D50E2D3E36B6DADC6543E16033442630B2DDF45EE1CCAD38B89F86BD
2,993,187 UART: Caliptra RT
2,993,532 UART: [state] CFI Enabled
3,101,539 UART: [rt] RT listening for mailbox commands...
3,102,209 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,499 UART: [rt]cmd =0x434b4558, len=80
3,133,477 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,025 UART:
192,385 UART: Running Caliptra ROM ...
193,479 UART:
193,623 UART: [state] CFI Enabled
265,785 UART: [state] LifecycleState = Unprovisioned
267,760 UART: [state] DebugLocked = No
269,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,361 UART: [kat] SHA2-256
444,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,546 UART: [kat] ++
455,001 UART: [kat] sha1
464,609 UART: [kat] SHA2-256
467,293 UART: [kat] SHA2-384
471,934 UART: [kat] SHA2-512-ACC
474,303 UART: [kat] ECC-384
2,767,517 UART: [kat] HMAC-384Kdf
2,799,960 UART: [kat] LMS
3,990,262 UART: [kat] --
3,993,687 UART: [cold-reset] ++
3,995,117 UART: [fht] Storing FHT @ 0x50003400
4,006,244 UART: [idev] ++
4,006,823 UART: [idev] CDI.KEYID = 6
4,007,793 UART: [idev] SUBJECT.KEYID = 7
4,009,042 UART: [idev] UDS.KEYID = 0
4,010,041 ready_for_fw is high
4,010,245 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,874 UART: [idev] Erasing UDS.KEYID = 0
7,346,299 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,327 UART: [idev] --
7,371,598 UART: [ldev] ++
7,372,224 UART: [ldev] CDI.KEYID = 6
7,373,165 UART: [ldev] SUBJECT.KEYID = 5
7,374,378 UART: [ldev] AUTHORITY.KEYID = 7
7,375,611 UART: [ldev] FE.KEYID = 1
7,420,243 UART: [ldev] Erasing FE.KEYID = 1
10,752,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,066 UART: [ldev] --
13,114,259 UART: [fwproc] Waiting for Commands...
13,115,981 UART: [fwproc] Received command 0x46574c44
13,118,161 UART: [fwproc] Received Image of size 114124 bytes
17,171,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,329 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,576 >>> mbox cmd response: success
17,639,204 UART: [afmc] ++
17,639,805 UART: [afmc] CDI.KEYID = 6
17,640,725 UART: [afmc] SUBJECT.KEYID = 7
17,641,998 UART: [afmc] AUTHORITY.KEYID = 5
21,005,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,973 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,416 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,216 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,665 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,772 UART: [afmc] --
23,376,744 UART: [cold-reset] --
23,380,297 UART: [state] Locking Datavault
23,385,163 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,930 UART: [state] Locking ICCM
23,388,598 UART: [exit] Launching FMC @ 0x40000130
23,396,999 UART:
23,397,236 UART: Running Caliptra FMC ...
23,398,337 UART:
23,398,494 UART: [state] CFI Enabled
23,465,815 UART: [fht] FMC Alias Private Key: 7
25,804,122 UART: [art] Extend RT PCRs Done
25,805,347 UART: [art] Lock RT PCRs Done
25,806,895 UART: [art] Populate DV Done
25,812,412 UART: [fht] FMC Alias Private Key: 7
25,814,076 UART: [art] Derive CDI
25,814,896 UART: [art] Store in in slot 0x4
25,873,878 UART: [art] Derive Key Pair
25,874,899 UART: [art] Store priv key in slot 0x5
29,167,543 UART: [art] Derive Key Pair - Done
29,180,593 UART: [art] Signing Cert with AUTHO
29,181,897 UART: RITY.KEYID = 7
31,468,583 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,088 UART: [art] PUB.X = 868EC35074E632EFF1A04AB943DC2C9AD5664B8F3790ECA473A5F1C7061AAF46D6283C119C0A77B20AF18911B29CEBC8
31,477,351 UART: [art] PUB.Y = 2A1D7328CABF1158B7E35327938084C426E1A6558D2174203065CFD55C31BCFABEEA751C80A63F18768533E25E867DD2
31,484,589 UART: [art] SIG.R = CEE33F272FC0F31D67A5C6CF4CE6B6E0DD9985B1B8F09B94FB64A6FD5E87E8EC0C9C6F256ED04FF6DB41325BC8B66E23
31,492,018 UART: [art] SIG.S = 2930BB539D60438276F75810ED6DA21265B61C81CEEC8B5CA45E17C212166AEFCB5B3CFFE9A7E5F5C7842A63B95C5A76
32,797,592 UART: Caliptra RT
32,798,306 UART: [state] CFI Enabled
32,958,167 UART: [rt] RT listening for mailbox commands...
32,960,110 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,990,545 UART: [rt]cmd =0x44504543, len=92
32,997,169 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,786,749 ready_for_fw is high
3,787,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,025 >>> mbox cmd response: success
23,547,161 UART:
23,547,540 UART: Running Caliptra FMC ...
23,548,678 UART:
23,548,858 UART: [state] CFI Enabled
23,615,086 UART: [fht] FMC Alias Private Key: 7
25,953,187 UART: [art] Extend RT PCRs Done
25,954,408 UART: [art] Lock RT PCRs Done
25,955,954 UART: [art] Populate DV Done
25,961,340 UART: [fht] FMC Alias Private Key: 7
25,962,831 UART: [art] Derive CDI
25,963,594 UART: [art] Store in in slot 0x4
26,023,279 UART: [art] Derive Key Pair
26,024,274 UART: [art] Store priv key in slot 0x5
29,317,386 UART: [art] Derive Key Pair - Done
29,330,803 UART: [art] Signing Cert with AUTHO
29,332,116 UART: RITY.KEYID = 7
31,618,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,173 UART: [art] PUB.X = 1BF7672367571F4A476931503895D5760EEA873596C4629C61D5EC9890A696FB0C6B618874E9B747BDA5F2E46A827BA7
31,627,375 UART: [art] PUB.Y = 02096FC2C39182869740047C05FE65FB22E6C19CF029E4922960CD7C3326B462B8B947D846D8A55C47CAA148CF1AF5B5
31,634,625 UART: [art] SIG.R = F4B606297EDA31E34C0CC92C467A25640E7A52EF583C722A2CA5A1C76557E3EE21087012014711D5BE3BDBF28287DA72
31,641,981 UART: [art] SIG.S = AC298921E37B3B72C4435DA911441ECEFF69AA8E42CFA1CB30976310F37489B90ABF2A8A1063784D2EBD5DA44C754EE7
32,947,077 UART: Caliptra RT
32,947,795 UART: [state] CFI Enabled
33,108,347 UART: [rt] RT listening for mailbox commands...
33,110,298 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,140,636 UART: [rt]cmd =0x44504543, len=92
33,147,040 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,466 UART:
192,831 UART: Running Caliptra ROM ...
193,961 UART:
603,505 UART: [state] CFI Enabled
617,327 UART: [state] LifecycleState = Unprovisioned
619,299 UART: [state] DebugLocked = No
620,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,209 UART: [kat] SHA2-256
794,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,476 UART: [kat] ++
805,918 UART: [kat] sha1
816,219 UART: [kat] SHA2-256
818,937 UART: [kat] SHA2-384
825,276 UART: [kat] SHA2-512-ACC
827,636 UART: [kat] ECC-384
3,112,149 UART: [kat] HMAC-384Kdf
3,124,452 UART: [kat] LMS
4,314,574 UART: [kat] --
4,319,368 UART: [cold-reset] ++
4,321,793 UART: [fht] Storing FHT @ 0x50003400
4,332,838 UART: [idev] ++
4,333,402 UART: [idev] CDI.KEYID = 6
4,334,353 UART: [idev] SUBJECT.KEYID = 7
4,335,594 UART: [idev] UDS.KEYID = 0
4,336,584 ready_for_fw is high
4,336,773 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,089 UART: [idev] Erasing UDS.KEYID = 0
7,623,487 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,756 UART: [idev] --
7,650,139 UART: [ldev] ++
7,650,698 UART: [ldev] CDI.KEYID = 6
7,651,656 UART: [ldev] SUBJECT.KEYID = 5
7,653,038 UART: [ldev] AUTHORITY.KEYID = 7
7,654,261 UART: [ldev] FE.KEYID = 1
7,665,176 UART: [ldev] Erasing FE.KEYID = 1
10,952,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,784 UART: [ldev] --
13,313,617 UART: [fwproc] Waiting for Commands...
13,316,893 UART: [fwproc] Received command 0x46574c44
13,319,068 UART: [fwproc] Received Image of size 114124 bytes
17,378,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,011 >>> mbox cmd response: success
17,845,943 UART: [afmc] ++
17,846,540 UART: [afmc] CDI.KEYID = 6
17,847,448 UART: [afmc] SUBJECT.KEYID = 7
17,848,716 UART: [afmc] AUTHORITY.KEYID = 5
21,161,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,709 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,108 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,956 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,397 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,031 UART: [afmc] --
23,526,769 UART: [cold-reset] --
23,530,143 UART: [state] Locking Datavault
23,535,171 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,923 UART: [state] Locking ICCM
23,538,696 UART: [exit] Launching FMC @ 0x40000130
23,547,093 UART:
23,547,334 UART: Running Caliptra FMC ...
23,548,432 UART:
23,548,589 UART: [state] CFI Enabled
23,556,660 UART: [fht] FMC Alias Private Key: 7
25,888,094 UART: [art] Extend RT PCRs Done
25,889,310 UART: [art] Lock RT PCRs Done
25,891,254 UART: [art] Populate DV Done
25,896,739 UART: [fht] FMC Alias Private Key: 7
25,898,257 UART: [art] Derive CDI
25,899,017 UART: [art] Store in in slot 0x4
25,941,392 UART: [art] Derive Key Pair
25,942,390 UART: [art] Store priv key in slot 0x5
29,184,300 UART: [art] Derive Key Pair - Done
29,197,359 UART: [art] Signing Cert with AUTHO
29,198,661 UART: RITY.KEYID = 7
31,477,771 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,271 UART: [art] PUB.X = 5AFE6A54FD5F35F5A34CE8ED8389E39D7D5121A1E4A65FBDA895CCD8EADE92AE89A4E969D679820129B55CEA794A76C2
31,486,555 UART: [art] PUB.Y = 41986CDC290F840937C47B5913DB5140940820B2ADFED854C1A8672EEB9D1931897759C9DF9F1BC9DE5B1833B5954D32
31,493,808 UART: [art] SIG.R = 5E10FF5EE03E2B9BB418CCFF5987BDCF33296D8A7492B8BC47A0E5C447D13E38A1501A2B972F66CC1855624ECFC64AA6
31,501,202 UART: [art] SIG.S = A19FB6DC4EC15C8D32F94364DCFB0B1FB479460DEED8A867B1B20DAFC95C977B66ABD18A58BC69FD66EBD03406352CF8
32,806,409 UART: Caliptra RT
32,807,104 UART: [state] CFI Enabled
32,924,112 UART: [rt] RT listening for mailbox commands...
32,926,063 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,956,403 UART: [rt]cmd =0x44504543, len=92
32,963,045 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,128,650 ready_for_fw is high
4,129,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,950 >>> mbox cmd response: success
23,702,390 UART:
23,702,813 UART: Running Caliptra FMC ...
23,703,920 UART:
23,704,076 UART: [state] CFI Enabled
23,711,974 UART: [fht] FMC Alias Private Key: 7
26,042,660 UART: [art] Extend RT PCRs Done
26,043,887 UART: [art] Lock RT PCRs Done
26,045,626 UART: [art] Populate DV Done
26,050,934 UART: [fht] FMC Alias Private Key: 7
26,052,477 UART: [art] Derive CDI
26,053,256 UART: [art] Store in in slot 0x4
26,095,740 UART: [art] Derive Key Pair
26,096,747 UART: [art] Store priv key in slot 0x5
29,338,693 UART: [art] Derive Key Pair - Done
29,351,587 UART: [art] Signing Cert with AUTHO
29,352,890 UART: RITY.KEYID = 7
31,632,549 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,059 UART: [art] PUB.X = 93A224ECABD680E0501340AB5748C56A1F11CADA9A982D3F56A8C6BFD5F73DD90959AE199425DA849A905419E08CFF57
31,641,302 UART: [art] PUB.Y = A7FE599A92C14513E0D06E144E1D7C86216D7545ECCACA63D5436447B70341F63BFD712D2EE323FAC1F8B8D850595414
31,648,516 UART: [art] SIG.R = 782BD1A2DF07A754B1EB60B3A7A30745BBF984D284C96374FEEA1799EAF892EF1445EABE65E8AE056EA0D67AE11C9317
31,655,903 UART: [art] SIG.S = 11CB7176177105B1304C0F89C9218799336F023DC8F5624B09F2803B0A2DC7E1863346482BE63AEB0835E9108C32AA9C
32,960,846 UART: Caliptra RT
32,961,546 UART: [state] CFI Enabled
33,079,733 UART: [rt] RT listening for mailbox commands...
33,081,672 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,112,371 UART: [rt]cmd =0x44504543, len=92
33,118,848 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,970 UART:
192,342 UART: Running Caliptra ROM ...
193,444 UART:
193,588 UART: [state] CFI Enabled
264,751 UART: [state] LifecycleState = Unprovisioned
266,673 UART: [state] DebugLocked = No
268,332 UART: [state] WD Timer not started. Device not locked for debugging
272,931 UART: [kat] SHA2-256
452,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,659 UART: [kat] ++
464,104 UART: [kat] sha1
475,398 UART: [kat] SHA2-256
478,470 UART: [kat] SHA2-384
483,957 UART: [kat] SHA2-512-ACC
486,902 UART: [kat] ECC-384
2,949,855 UART: [kat] HMAC-384Kdf
2,971,756 UART: [kat] LMS
3,501,175 UART: [kat] --
3,506,164 UART: [cold-reset] ++
3,507,453 UART: [fht] FHT @ 0x50003400
3,517,861 UART: [idev] ++
3,518,421 UART: [idev] CDI.KEYID = 6
3,519,450 UART: [idev] SUBJECT.KEYID = 7
3,520,548 UART: [idev] UDS.KEYID = 0
3,521,475 ready_for_fw is high
3,521,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,697 UART: [idev] Erasing UDS.KEYID = 0
6,028,403 UART: [idev] Sha1 KeyId Algorithm
6,050,245 UART: [idev] --
6,053,522 UART: [ldev] ++
6,054,120 UART: [ldev] CDI.KEYID = 6
6,055,039 UART: [ldev] SUBJECT.KEYID = 5
6,056,208 UART: [ldev] AUTHORITY.KEYID = 7
6,057,440 UART: [ldev] FE.KEYID = 1
6,099,891 UART: [ldev] Erasing FE.KEYID = 1
8,605,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,884 UART: [ldev] --
10,413,064 UART: [fwproc] Wait for Commands...
10,415,534 UART: [fwproc] Recv command 0x46574c44
10,417,623 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,579 >>> mbox cmd response: success
14,283,231 UART: [afmc] ++
14,283,822 UART: [afmc] CDI.KEYID = 6
14,284,735 UART: [afmc] SUBJECT.KEYID = 7
14,285,891 UART: [afmc] AUTHORITY.KEYID = 5
16,826,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,395 UART: [afmc] --
18,627,109 UART: [cold-reset] --
18,631,835 UART: [state] Locking Datavault
18,637,834 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,504 UART: [state] Locking ICCM
18,640,736 UART: [exit] Launching FMC @ 0x40000130
18,649,133 UART:
18,649,367 UART: Running Caliptra FMC ...
18,650,464 UART:
18,650,621 UART: [state] CFI Enabled
18,709,025 UART: [fht] FMC Alias Private Key: 7
20,473,226 UART: [art] Extend RT PCRs Done
20,474,451 UART: [art] Lock RT PCRs Done
20,476,237 UART: [art] Populate DV Done
20,481,969 UART: [fht] FMC Alias Private Key: 7
20,483,558 UART: [art] Derive CDI
20,484,373 UART: [art] Store in in slot 0x4
20,541,687 UART: [art] Derive Key Pair
20,542,719 UART: [art] Store priv key in slot 0x5
23,005,207 UART: [art] Derive Key Pair - Done
23,018,105 UART: [art] Signing Cert with AUTHO
23,019,441 UART: RITY.KEYID = 7
24,731,097 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,604 UART: [art] PUB.X = 2994BEEB9577DD91AC2A61732314DCC2433E5018498E077F8A3F606B7D9A7980A6C80209359CD68EAA551AF91F4C537E
24,739,897 UART: [art] PUB.Y = F5E863E2F1B6576A09371BF3BA64C18F8610D76B75AFCBA9C4510595943EA4ABE1C28067FE7FE460764FBF2EEC4DCF3B
24,747,187 UART: [art] SIG.R = 0C6519737FE33F664ABDC8E43A363C5F4C3DE1E51F3F7D0543CFDAF570143C46A693F4DD4243074C28AA909C46E6F44D
24,754,574 UART: [art] SIG.S = 58B42414C903F17CBA9FEAE6631EB7AE4A4BE718C7444EA0D010A827414773A1DFB8BEF358487D6A939D65AE9E4945B6
25,733,766 UART: Caliptra RT
25,734,458 UART: [state] CFI Enabled
25,899,771 UART: [rt] RT listening for mailbox commands...
25,901,717 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,932,670 UART: [rt]cmd =0x44504543, len=92
25,939,373 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,359,397 ready_for_fw is high
3,359,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,054,491 >>> mbox cmd response: success
18,347,047 UART:
18,347,440 UART: Running Caliptra FMC ...
18,348,543 UART:
18,348,711 UART: [state] CFI Enabled
18,411,181 UART: [fht] FMC Alias Private Key: 7
20,175,512 UART: [art] Extend RT PCRs Done
20,176,728 UART: [art] Lock RT PCRs Done
20,178,544 UART: [art] Populate DV Done
20,183,845 UART: [fht] FMC Alias Private Key: 7
20,185,332 UART: [art] Derive CDI
20,186,098 UART: [art] Store in in slot 0x4
20,244,449 UART: [art] Derive Key Pair
20,245,490 UART: [art] Store priv key in slot 0x5
22,708,550 UART: [art] Derive Key Pair - Done
22,721,055 UART: [art] Signing Cert with AUTHO
22,722,388 UART: RITY.KEYID = 7
24,434,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,977 UART: [art] PUB.X = EFEE123ADC894549BF0051A0595A11C8D84A4446DA066B3B464BCCD57A581CFBAF068C15AA56198AB67A250302F2F4CD
24,443,237 UART: [art] PUB.Y = CB3A9356BD651E9F0FCCB577061C8B1E2543856B2586A2EA9DB18FB4DBEB936DF306E11826E964FB6BAB6B596CF594D9
24,450,559 UART: [art] SIG.R = 445073F8380BD1972CEAB8EE3D8618F2C1A492E1F10E06EEB757AB158047EF5393D29F1A94D8743E69EC0723C5E2CA6A
24,457,909 UART: [art] SIG.S = D08A46F0FC6EB3846FB8850FD90D146C1B71D6F68D5E4111439EC550D500E47D033FB1D99D73721FC56DD14DB8FAFFFF
25,437,305 UART: Caliptra RT
25,438,007 UART: [state] CFI Enabled
25,601,866 UART: [rt] RT listening for mailbox commands...
25,603,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,634,830 UART: [rt]cmd =0x44504543, len=92
25,641,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,423 UART:
192,794 UART: Running Caliptra ROM ...
193,969 UART:
603,444 UART: [state] CFI Enabled
619,961 UART: [state] LifecycleState = Unprovisioned
621,838 UART: [state] DebugLocked = No
623,584 UART: [state] WD Timer not started. Device not locked for debugging
626,902 UART: [kat] SHA2-256
806,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,608 UART: [kat] ++
818,072 UART: [kat] sha1
829,582 UART: [kat] SHA2-256
832,654 UART: [kat] SHA2-384
837,924 UART: [kat] SHA2-512-ACC
840,849 UART: [kat] ECC-384
3,282,131 UART: [kat] HMAC-384Kdf
3,294,922 UART: [kat] LMS
3,824,434 UART: [kat] --
3,830,269 UART: [cold-reset] ++
3,832,478 UART: [fht] FHT @ 0x50003400
3,845,005 UART: [idev] ++
3,845,569 UART: [idev] CDI.KEYID = 6
3,846,442 UART: [idev] SUBJECT.KEYID = 7
3,847,672 UART: [idev] UDS.KEYID = 0
3,848,593 ready_for_fw is high
3,848,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,504 UART: [idev] Erasing UDS.KEYID = 0
6,318,549 UART: [idev] Sha1 KeyId Algorithm
6,342,567 UART: [idev] --
6,346,082 UART: [ldev] ++
6,346,647 UART: [ldev] CDI.KEYID = 6
6,347,653 UART: [ldev] SUBJECT.KEYID = 5
6,348,748 UART: [ldev] AUTHORITY.KEYID = 7
6,350,023 UART: [ldev] FE.KEYID = 1
6,362,014 UART: [ldev] Erasing FE.KEYID = 1
8,833,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,945 UART: [ldev] --
10,623,741 UART: [fwproc] Wait for Commands...
10,625,789 UART: [fwproc] Recv command 0x46574c44
10,627,890 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,796 >>> mbox cmd response: success
14,488,629 UART: [afmc] ++
14,489,223 UART: [afmc] CDI.KEYID = 6
14,490,125 UART: [afmc] SUBJECT.KEYID = 7
14,491,337 UART: [afmc] AUTHORITY.KEYID = 5
16,990,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,234 UART: [afmc] --
18,787,269 UART: [cold-reset] --
18,790,212 UART: [state] Locking Datavault
18,795,455 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,154 UART: [state] Locking ICCM
18,799,625 UART: [exit] Launching FMC @ 0x40000130
18,808,067 UART:
18,808,298 UART: Running Caliptra FMC ...
18,809,390 UART:
18,809,556 UART: [state] CFI Enabled
18,817,649 UART: [fht] FMC Alias Private Key: 7
20,574,568 UART: [art] Extend RT PCRs Done
20,575,786 UART: [art] Lock RT PCRs Done
20,577,512 UART: [art] Populate DV Done
20,582,979 UART: [fht] FMC Alias Private Key: 7
20,584,615 UART: [art] Derive CDI
20,585,442 UART: [art] Store in in slot 0x4
20,627,825 UART: [art] Derive Key Pair
20,628,859 UART: [art] Store priv key in slot 0x5
23,054,888 UART: [art] Derive Key Pair - Done
23,067,824 UART: [art] Signing Cert with AUTHO
23,069,116 UART: RITY.KEYID = 7
24,774,910 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,415 UART: [art] PUB.X = 443436228F97AE34A2AB58E814BDD31571B1EA8C0795EAF335F9FD9DD75650345DE5A27466B4EB20BD9C7D3ABC1EB101
24,783,705 UART: [art] PUB.Y = F0DDF2C6E1BFC4B44EB1D90F412ADE6B5236848CB70A1ED89CF358BC40489EBBBD19E33F045ADCEA19B072651F8898D6
24,790,958 UART: [art] SIG.R = ADE4C99F333B470C23D3811AEDEEDABB31C0246A2DFC9EC4B6700F3B16E693289BFD13045EBE9ABFF12E9E93C339FBF5
24,798,413 UART: [art] SIG.S = C9F886200A534F82A9756DF6AAAE5EB538B3E1692BF76191EA7F7976EDA7B859DF73C856F1F6981245D80576477F7948
25,777,172 UART: Caliptra RT
25,777,876 UART: [state] CFI Enabled
25,894,180 UART: [rt] RT listening for mailbox commands...
25,896,103 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,926,916 UART: [rt]cmd =0x44504543, len=92
25,933,157 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,695,338 ready_for_fw is high
3,695,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,166 >>> mbox cmd response: success
18,520,173 UART:
18,520,568 UART: Running Caliptra FMC ...
18,521,671 UART:
18,521,817 UART: [state] CFI Enabled
18,530,254 UART: [fht] FMC Alias Private Key: 7
20,286,703 UART: [art] Extend RT PCRs Done
20,287,925 UART: [art] Lock RT PCRs Done
20,289,499 UART: [art] Populate DV Done
20,294,748 UART: [fht] FMC Alias Private Key: 7
20,296,233 UART: [art] Derive CDI
20,296,996 UART: [art] Store in in slot 0x4
20,339,652 UART: [art] Derive Key Pair
20,340,689 UART: [art] Store priv key in slot 0x5
22,767,347 UART: [art] Derive Key Pair - Done
22,780,346 UART: [art] Signing Cert with AUTHO
22,781,651 UART: RITY.KEYID = 7
24,487,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,788 UART: [art] PUB.X = 9380EC6630213CA1C63D7A645E0EB896652DC52C6325E80BB6D490E22C2DE9688D75888350921F23F12901379F135FCE
24,496,048 UART: [art] PUB.Y = 48D5015AA68D1649A5D5567A2A91213B5D30A6B6FDADB35D76FB32B3416B7A134D3C933A1B6A7E31B686620C841FAF3C
24,503,308 UART: [art] SIG.R = 65FF766224E74C7F6C629BBCFDA28DE867F61D046936511F1F5933DBF8895653626221DF528C8E9795F5EE2FB2E696F5
24,510,681 UART: [art] SIG.S = E6510A027F7658086FF82D1B030CFFAF9C233EF60616CF46BAC4C741C1DFA556E692C7A82F96713597A16834FFC0AEC8
25,489,881 UART: Caliptra RT
25,490,574 UART: [state] CFI Enabled
25,607,746 UART: [rt] RT listening for mailbox commands...
25,609,828 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,640,273 UART: [rt]cmd =0x44504543, len=92
25,646,574 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,063 UART:
192,444 UART: Running Caliptra ROM ...
193,551 UART:
193,695 UART: [state] CFI Enabled
260,543 UART: [state] LifecycleState = Unprovisioned
262,930 UART: [state] DebugLocked = No
264,597 UART: [state] WD Timer not started. Device not locked for debugging
269,618 UART: [kat] SHA2-256
459,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,252 UART: [kat] ++
470,727 UART: [kat] sha1
482,596 UART: [kat] SHA2-256
485,671 UART: [kat] SHA2-384
492,221 UART: [kat] SHA2-512-ACC
494,805 UART: [kat] ECC-384
2,946,173 UART: [kat] HMAC-384Kdf
2,971,519 UART: [kat] LMS
3,503,245 UART: [kat] --
3,506,820 UART: [cold-reset] ++
3,507,967 UART: [fht] FHT @ 0x50003400
3,520,643 UART: [idev] ++
3,521,355 UART: [idev] CDI.KEYID = 6
3,522,385 UART: [idev] SUBJECT.KEYID = 7
3,523,486 UART: [idev] UDS.KEYID = 0
3,524,444 ready_for_fw is high
3,524,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,103 UART: [idev] Erasing UDS.KEYID = 0
6,050,789 UART: [idev] Sha1 KeyId Algorithm
6,072,500 UART: [idev] --
6,078,010 UART: [ldev] ++
6,078,694 UART: [ldev] CDI.KEYID = 6
6,079,583 UART: [ldev] SUBJECT.KEYID = 5
6,080,796 UART: [ldev] AUTHORITY.KEYID = 7
6,082,028 UART: [ldev] FE.KEYID = 1
6,121,938 UART: [ldev] Erasing FE.KEYID = 1
8,627,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,556 UART: [ldev] --
10,434,660 UART: [fwproc] Wait for Commands...
10,437,388 UART: [fwproc] Recv command 0x46574c44
10,439,646 UART: [fwproc] Recv'd Img size: 114448 bytes
13,896,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,969,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,085,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,629,711 >>> mbox cmd response: success
14,633,102 UART: [afmc] ++
14,633,819 UART: [afmc] CDI.KEYID = 6
14,635,069 UART: [afmc] SUBJECT.KEYID = 7
14,636,511 UART: [afmc] AUTHORITY.KEYID = 5
17,170,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,301 UART: [afmc] --
18,968,027 UART: [cold-reset] --
18,971,142 UART: [state] Locking Datavault
18,977,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,175 UART: [state] Locking ICCM
18,981,213 UART: [exit] Launching FMC @ 0x40000130
18,989,889 UART:
18,990,129 UART: Running Caliptra FMC ...
18,991,229 UART:
18,991,388 UART: [state] CFI Enabled
19,052,293 UART: [fht] FMC Alias Private Key: 7
20,816,655 UART: [art] Extend RT PCRs Done
20,817,871 UART: [art] Lock RT PCRs Done
20,819,223 UART: [art] Populate DV Done
20,824,917 UART: [fht] FMC Alias Private Key: 7
20,826,397 UART: [art] Derive CDI
20,827,158 UART: [art] Store in in slot 0x4
20,884,577 UART: [art] Derive Key Pair
20,885,616 UART: [art] Store priv key in slot 0x5
23,348,527 UART: [art] Derive Key Pair - Done
23,361,620 UART: [art] Signing Cert with AUTHO
23,362,915 UART: RITY.KEYID = 7
25,074,301 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,946 UART: [art] PUB.X = DF04748F9FA3F0C82A7820FB0E5B57C1653CF425107EE8A75285A3084A33C2D5C2436FBFB7279FE8E0DBAFA117383D92
25,083,074 UART: [art] PUB.Y = 052CF87151A032AC5D34B17BF1C15CC52881C2E553A3DE8DBA6F5650885D711D92AC29DD8F2889AEF4A52E4F715864C9
25,090,355 UART: [art] SIG.R = 2EABDA011AF6329D7F6495BAC830C0544FE753F353E4C48259C4951F935B38E4A7968C852430D78AFD8C45A0868D9D21
25,097,695 UART: [art] SIG.S = 44750B2888A6A98D664C3DDED54F0C287139949DA46716B85902EA9AAE24EB076AA488D83E17A578AB39C99313F0805A
26,076,346 UART: Caliptra RT
26,077,037 UART: [state] CFI Enabled
26,242,743 UART: [rt] RT listening for mailbox commands...
26,244,680 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,275,993 UART: [rt]cmd =0x44504543, len=92
26,282,545 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,438,550 ready_for_fw is high
3,438,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,000 >>> mbox cmd response: success
19,035,171 UART:
19,035,557 UART: Running Caliptra FMC ...
19,036,747 UART:
19,036,917 UART: [state] CFI Enabled
19,104,482 UART: [fht] FMC Alias Private Key: 7
20,868,084 UART: [art] Extend RT PCRs Done
20,869,308 UART: [art] Lock RT PCRs Done
20,870,801 UART: [art] Populate DV Done
20,876,267 UART: [fht] FMC Alias Private Key: 7
20,877,806 UART: [art] Derive CDI
20,878,538 UART: [art] Store in in slot 0x4
20,937,530 UART: [art] Derive Key Pair
20,938,588 UART: [art] Store priv key in slot 0x5
23,401,282 UART: [art] Derive Key Pair - Done
23,414,125 UART: [art] Signing Cert with AUTHO
23,415,431 UART: RITY.KEYID = 7
25,127,241 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,751 UART: [art] PUB.X = D56B864A0FE73A18B1F348396D5715CC5D91383D92B86C8C5021533A28A36D0D6D8695EE1A0DA41F007B2F00F72E9EFE
25,135,947 UART: [art] PUB.Y = FC20976420716103377E6BF42E240B85889D385702FF635753C5784A7FD07191D2F99BCE610755A22882B2DE6C42221D
25,143,207 UART: [art] SIG.R = 6189EF450A7DCD09BC12D0BD5B5A7221F45144EF7AFA3D06EA878FC4E46C3F73401E6E5B3D1F68176AB2AE79DE73E8E1
25,150,606 UART: [art] SIG.S = BA17A6B489E18C5B7EC11F040F8C980658C2A60D7F3014D23EAEACD6107F1917840C4EE2BD9E982F4B114A9B034248F6
26,130,205 UART: Caliptra RT
26,130,894 UART: [state] CFI Enabled
26,295,562 UART: [rt] RT listening for mailbox commands...
26,297,491 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,328,742 UART: [rt]cmd =0x44504543, len=92
26,335,176 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,412 UART:
192,782 UART: Running Caliptra ROM ...
193,926 UART:
603,661 UART: [state] CFI Enabled
617,050 UART: [state] LifecycleState = Unprovisioned
619,449 UART: [state] DebugLocked = No
621,457 UART: [state] WD Timer not started. Device not locked for debugging
626,059 UART: [kat] SHA2-256
815,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,755 UART: [kat] ++
827,308 UART: [kat] sha1
839,380 UART: [kat] SHA2-256
842,385 UART: [kat] SHA2-384
848,718 UART: [kat] SHA2-512-ACC
851,319 UART: [kat] ECC-384
3,293,430 UART: [kat] HMAC-384Kdf
3,306,928 UART: [kat] LMS
3,838,742 UART: [kat] --
3,842,095 UART: [cold-reset] ++
3,844,299 UART: [fht] FHT @ 0x50003400
3,855,120 UART: [idev] ++
3,855,818 UART: [idev] CDI.KEYID = 6
3,856,786 UART: [idev] SUBJECT.KEYID = 7
3,858,020 UART: [idev] UDS.KEYID = 0
3,858,940 ready_for_fw is high
3,859,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,870 UART: [idev] Erasing UDS.KEYID = 0
6,333,227 UART: [idev] Sha1 KeyId Algorithm
6,356,478 UART: [idev] --
6,360,899 UART: [ldev] ++
6,361,570 UART: [ldev] CDI.KEYID = 6
6,362,633 UART: [ldev] SUBJECT.KEYID = 5
6,363,730 UART: [ldev] AUTHORITY.KEYID = 7
6,364,899 UART: [ldev] FE.KEYID = 1
6,376,399 UART: [ldev] Erasing FE.KEYID = 1
8,852,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,092 UART: [ldev] --
10,644,519 UART: [fwproc] Wait for Commands...
10,646,519 UART: [fwproc] Recv command 0x46574c44
10,648,824 UART: [fwproc] Recv'd Img size: 114448 bytes
14,102,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,843,290 >>> mbox cmd response: success
14,847,659 UART: [afmc] ++
14,848,423 UART: [afmc] CDI.KEYID = 6
14,849,534 UART: [afmc] SUBJECT.KEYID = 7
14,851,130 UART: [afmc] AUTHORITY.KEYID = 5
17,353,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,633 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,031 UART: [afmc] --
19,149,389 UART: [cold-reset] --
19,154,334 UART: [state] Locking Datavault
19,162,173 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,369 UART: [state] Locking ICCM
19,166,060 UART: [exit] Launching FMC @ 0x40000130
19,174,684 UART:
19,174,953 UART: Running Caliptra FMC ...
19,175,973 UART:
19,176,113 UART: [state] CFI Enabled
19,184,265 UART: [fht] FMC Alias Private Key: 7
20,940,845 UART: [art] Extend RT PCRs Done
20,942,060 UART: [art] Lock RT PCRs Done
20,943,587 UART: [art] Populate DV Done
20,948,995 UART: [fht] FMC Alias Private Key: 7
20,950,534 UART: [art] Derive CDI
20,951,307 UART: [art] Store in in slot 0x4
20,994,219 UART: [art] Derive Key Pair
20,995,213 UART: [art] Store priv key in slot 0x5
23,421,814 UART: [art] Derive Key Pair - Done
23,434,859 UART: [art] Signing Cert with AUTHO
23,436,154 UART: RITY.KEYID = 7
25,141,617 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,123 UART: [art] PUB.X = 4C47BE81C03181B16B7863171A8431BDFE3C9C79E4BD38246BB3523DBB560475C9DDB80F99D1B99AD77CC1FAD56FA2DD
25,150,352 UART: [art] PUB.Y = 263BD21132EA243761F4AF5CBE9457C06ED5C3230BCDE5358D8D7468D5F82C9702D8275C1AF45ED69E260D88B1660BFA
25,157,673 UART: [art] SIG.R = 1D8102BD747D13D909CA76C15B80AF5FF1247D90151C6B966F1FA549EEAE3D4DF5B0998F3EC64C4DBF2A8192F562D797
25,165,052 UART: [art] SIG.S = 3361D5B95942162ABF66C09F06251AF41522475EF01B092263DDA10226B906E2ECA9B29BBC469C920ABE60BC1A325F91
26,144,044 UART: Caliptra RT
26,144,727 UART: [state] CFI Enabled
26,262,317 UART: [rt] RT listening for mailbox commands...
26,264,238 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,295,089 UART: [rt]cmd =0x44504543, len=92
26,301,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,754,267 ready_for_fw is high
3,754,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,434 >>> mbox cmd response: success
19,212,861 UART:
19,213,265 UART: Running Caliptra FMC ...
19,214,389 UART:
19,214,547 UART: [state] CFI Enabled
19,222,660 UART: [fht] FMC Alias Private Key: 7
20,979,544 UART: [art] Extend RT PCRs Done
20,980,767 UART: [art] Lock RT PCRs Done
20,982,031 UART: [art] Populate DV Done
20,987,565 UART: [fht] FMC Alias Private Key: 7
20,989,051 UART: [art] Derive CDI
20,989,813 UART: [art] Store in in slot 0x4
21,032,243 UART: [art] Derive Key Pair
21,033,286 UART: [art] Store priv key in slot 0x5
23,460,263 UART: [art] Derive Key Pair - Done
23,473,531 UART: [art] Signing Cert with AUTHO
23,474,828 UART: RITY.KEYID = 7
25,180,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,079 UART: [art] PUB.X = D23C770462AD04C394EE65025A0F21A00764B3746831A926484418596276194239DD5AC546BD1B6C34BB70F90C83FBD5
25,189,308 UART: [art] PUB.Y = 5346A0E48CB3E8939670AE1F6AD1C1151C40994E441C9D47BF77BBB86A35B6DC5E2875E8DE493F7BC9E6D851543406B0
25,196,622 UART: [art] SIG.R = E5FF00746D19E15BC4A9ABB6D7E86EE5E2E32D70326DD6011C5B5899241BA692A3FF4B7E3768748B3B5BBE5F24329DC7
25,203,981 UART: [art] SIG.S = BA745D348E21DE21CF23F6CB887B02055C13B1B5A9A77273DFF183C928AA9A107F986A5707DA763C56FF33F2930110F5
26,182,405 UART: Caliptra RT
26,183,116 UART: [state] CFI Enabled
26,300,647 UART: [rt] RT listening for mailbox commands...
26,302,574 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,333,217 UART: [rt]cmd =0x44504543, len=92
26,339,405 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,578 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,289 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 ready_for_fw is high
1,480,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,664 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,114 UART: [idev] --
1,514,095 UART: [ldev] ++
1,514,263 UART: [ldev] CDI.KEYID = 6
1,514,626 UART: [ldev] SUBJECT.KEYID = 5
1,515,052 UART: [ldev] AUTHORITY.KEYID = 7
1,515,515 UART: [ldev] FE.KEYID = 1
1,520,651 UART: [ldev] Erasing FE.KEYID = 1
1,546,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,068 UART: [ldev] --
1,585,541 UART: [fwproc] Waiting for Commands...
1,586,346 UART: [fwproc] Received command 0x46574c44
1,587,137 UART: [fwproc] Received Image of size 114448 bytes
2,886,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,514 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,866 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,971 >>> mbox cmd response: success
3,078,997 UART: [afmc] ++
3,079,165 UART: [afmc] CDI.KEYID = 6
3,079,527 UART: [afmc] SUBJECT.KEYID = 7
3,079,952 UART: [afmc] AUTHORITY.KEYID = 5
3,115,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,018 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,708 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,759 UART: [afmc] --
3,158,701 UART: [cold-reset] --
3,159,553 UART: [state] Locking Datavault
3,160,884 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,488 UART: [state] Locking ICCM
3,162,064 UART: [exit] Launching FMC @ 0x40000130
3,167,393 UART:
3,167,409 UART: Running Caliptra FMC ...
3,167,817 UART:
3,167,871 UART: [state] CFI Enabled
3,178,458 UART: [fht] FMC Alias Private Key: 7
3,286,783 UART: [art] Extend RT PCRs Done
3,287,211 UART: [art] Lock RT PCRs Done
3,288,789 UART: [art] Populate DV Done
3,296,996 UART: [fht] FMC Alias Private Key: 7
3,298,174 UART: [art] Derive CDI
3,298,454 UART: [art] Store in in slot 0x4
3,384,149 UART: [art] Derive Key Pair
3,384,509 UART: [art] Store priv key in slot 0x5
3,397,819 UART: [art] Derive Key Pair - Done
3,412,798 UART: [art] Signing Cert with AUTHO
3,413,278 UART: RITY.KEYID = 7
3,428,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,291 UART: [art] PUB.X = 67E3541E25E5CCFFF514B7465EDFAACB3926CEE6B119DBBB50330F7C95BAD0C659532D2B45ED56EB65C74B9122391520
3,436,072 UART: [art] PUB.Y = 1D93B74F8DD70C1BE2F055FCD4B68BC47920B108600FBA4E25396A030D887518646349A3C9FFC6E3F0932F3E8F9A90C8
3,443,013 UART: [art] SIG.R = ED4F69B1FB076FD7AEBD47B155D09D6FAF59B9EDD4078B8FD084D0E6DE77A44971565A0DB2C2B40D63678E31A1D32156
3,449,787 UART: [art] SIG.S = 756B89CFA31FC18E6C3C2C3B99066196FC9E1A0B94871575943167F7E7F636B05446E9C116B6ACE39F5CD41AC7FEA38A
3,473,524 UART: Caliptra RT
3,473,777 UART: [state] CFI Enabled
3,582,870 UART: [rt] RT listening for mailbox commands...
3,583,540 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,910 UART: [rt]cmd =0x44504543, len=92
3,621,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,629 ready_for_fw is high
1,362,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,749 >>> mbox cmd response: success
2,989,961 UART:
2,989,977 UART: Running Caliptra FMC ...
2,990,385 UART:
2,990,439 UART: [state] CFI Enabled
3,000,746 UART: [fht] FMC Alias Private Key: 7
3,108,675 UART: [art] Extend RT PCRs Done
3,109,103 UART: [art] Lock RT PCRs Done
3,110,755 UART: [art] Populate DV Done
3,118,986 UART: [fht] FMC Alias Private Key: 7
3,120,050 UART: [art] Derive CDI
3,120,330 UART: [art] Store in in slot 0x4
3,206,271 UART: [art] Derive Key Pair
3,206,631 UART: [art] Store priv key in slot 0x5
3,219,771 UART: [art] Derive Key Pair - Done
3,234,995 UART: [art] Signing Cert with AUTHO
3,235,475 UART: RITY.KEYID = 7
3,250,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,238 UART: [art] PUB.X = 7204C05F0A7E484AAE7BDA11354B5C36850E9BACF644C00351C93FD59067AABB8AA23A67295215B7ECA5C671CAE7EAB1
3,258,012 UART: [art] PUB.Y = 8D41DE6A027C6A57C6EF7A873D34DE5EE1E4E15293B21575380263F026474A282917A0DA6329AC39246D8A6A12864A78
3,264,952 UART: [art] SIG.R = 805AFA00C8839F9406C6DBE0111DEBB6F6D8C7F23DC8148403564C5CC763EC12163E394D16DC6AD2C4A4486975BD3B3C
3,271,704 UART: [art] SIG.S = ED9B63AADBF0E5A3A08B7ED5E8AD445E35B058417DB5467E2D02BD98D13D300F27C0C9FCD0F00CD783FCADF260C02B01
3,295,785 UART: Caliptra RT
3,296,038 UART: [state] CFI Enabled
3,404,548 UART: [rt] RT listening for mailbox commands...
3,405,218 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,678 UART: [rt]cmd =0x44504543, len=92
3,442,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,744 UART: [kat] SHA2-256
892,682 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
903,493 UART: [kat] HMAC-384Kdf
908,247 UART: [kat] LMS
1,476,443 UART: [kat] --
1,477,406 UART: [cold-reset] ++
1,477,930 UART: [fht] Storing FHT @ 0x50003400
1,480,733 UART: [idev] ++
1,480,901 UART: [idev] CDI.KEYID = 6
1,481,261 UART: [idev] SUBJECT.KEYID = 7
1,481,685 UART: [idev] UDS.KEYID = 0
1,482,030 ready_for_fw is high
1,482,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,779 UART: [idev] Erasing UDS.KEYID = 0
1,506,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,999 UART: [idev] --
1,515,940 UART: [ldev] ++
1,516,108 UART: [ldev] CDI.KEYID = 6
1,516,471 UART: [ldev] SUBJECT.KEYID = 5
1,516,897 UART: [ldev] AUTHORITY.KEYID = 7
1,517,360 UART: [ldev] FE.KEYID = 1
1,522,448 UART: [ldev] Erasing FE.KEYID = 1
1,547,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,043 UART: [ldev] --
1,587,486 UART: [fwproc] Waiting for Commands...
1,588,323 UART: [fwproc] Received command 0x46574c44
1,589,114 UART: [fwproc] Received Image of size 114448 bytes
2,888,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,578 >>> mbox cmd response: success
3,082,604 UART: [afmc] ++
3,082,772 UART: [afmc] CDI.KEYID = 6
3,083,134 UART: [afmc] SUBJECT.KEYID = 7
3,083,559 UART: [afmc] AUTHORITY.KEYID = 5
3,119,216 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,274 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,667 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,357 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,322 UART: [afmc] --
3,162,236 UART: [cold-reset] --
3,163,114 UART: [state] Locking Datavault
3,164,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,771 UART: [state] Locking ICCM
3,165,431 UART: [exit] Launching FMC @ 0x40000130
3,170,760 UART:
3,170,776 UART: Running Caliptra FMC ...
3,171,184 UART:
3,171,327 UART: [state] CFI Enabled
3,181,866 UART: [fht] FMC Alias Private Key: 7
3,290,063 UART: [art] Extend RT PCRs Done
3,290,491 UART: [art] Lock RT PCRs Done
3,292,115 UART: [art] Populate DV Done
3,300,190 UART: [fht] FMC Alias Private Key: 7
3,301,162 UART: [art] Derive CDI
3,301,442 UART: [art] Store in in slot 0x4
3,387,427 UART: [art] Derive Key Pair
3,387,787 UART: [art] Store priv key in slot 0x5
3,401,027 UART: [art] Derive Key Pair - Done
3,415,539 UART: [art] Signing Cert with AUTHO
3,416,019 UART: RITY.KEYID = 7
3,431,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,104 UART: [art] PUB.X = 10FD2FD959AEA9C469007AD2F87AA162F581DA1151CB097348ADA071659DE236A0E59DA62646541F2CCA26FF4A916D6C
3,438,859 UART: [art] PUB.Y = 80CC5B2B3435EBCBC283112BD8B49B7B455B294AD4733D7B8A8641681B8624907DEDE62DC4550986DCD06A66C92F42E3
3,445,812 UART: [art] SIG.R = 94276BDD31760C6DD1C31044089B95C096E3F66E654EC9F2D9744D27BA38A9253F6470D01ABAFED0C11C0AB9D1B7D5B6
3,452,583 UART: [art] SIG.S = 081F5AC667617833682C76B7073273267A2F5C7473A5232C86EC86A97EE431D2103578B8A6C0F69A1E0DC7F84FD9A1B1
3,476,775 UART: Caliptra RT
3,477,120 UART: [state] CFI Enabled
3,585,167 UART: [rt] RT listening for mailbox commands...
3,585,837 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,073 UART: [rt]cmd =0x44504543, len=92
3,623,186 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,776 >>> mbox cmd response: success
2,993,314 UART:
2,993,330 UART: Running Caliptra FMC ...
2,993,738 UART:
2,993,881 UART: [state] CFI Enabled
3,004,660 UART: [fht] FMC Alias Private Key: 7
3,112,527 UART: [art] Extend RT PCRs Done
3,112,955 UART: [art] Lock RT PCRs Done
3,114,569 UART: [art] Populate DV Done
3,122,736 UART: [fht] FMC Alias Private Key: 7
3,123,748 UART: [art] Derive CDI
3,124,028 UART: [art] Store in in slot 0x4
3,209,693 UART: [art] Derive Key Pair
3,210,053 UART: [art] Store priv key in slot 0x5
3,223,301 UART: [art] Derive Key Pair - Done
3,238,108 UART: [art] Signing Cert with AUTHO
3,238,588 UART: RITY.KEYID = 7
3,253,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,617 UART: [art] PUB.X = E8F5764B6E22EF3EE27C656BFC194673248B8F4F4E5247B50CEB736A836F6AFF0A73509EBC378E041FF0320889EAAAD4
3,261,387 UART: [art] PUB.Y = 7FB6CF1A5A87B605091BEFA7C0A9092EA13771225A5914E931D0EF31A7C6823030BE74570992CC48949C09B96798443D
3,268,318 UART: [art] SIG.R = E579CACF91ECAD2224FB49A967ACEA4A9F57B14E1B40BD544BC71B0C60E58BC681C78FF2EFD38FEF47F5CF32D626288E
3,275,111 UART: [art] SIG.S = 9BECA25086B8139EB7F65E6BC47F9BCA01EF35CE43E8270B789B466A1AA79C5CCCC70CAF57BBF719C959E87514BAB779
3,299,191 UART: Caliptra RT
3,299,536 UART: [state] CFI Enabled
3,408,526 UART: [rt] RT listening for mailbox commands...
3,409,196 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,728 UART: [rt]cmd =0x44504543, len=92
3,446,761 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
917,908 UART: [kat] HMAC-384Kdf
922,384 UART: [kat] LMS
1,170,712 UART: [kat] --
1,171,421 UART: [cold-reset] ++
1,171,881 UART: [fht] FHT @ 0x50003400
1,174,486 UART: [idev] ++
1,174,654 UART: [idev] CDI.KEYID = 6
1,175,014 UART: [idev] SUBJECT.KEYID = 7
1,175,438 UART: [idev] UDS.KEYID = 0
1,175,783 ready_for_fw is high
1,175,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,526 UART: [idev] Erasing UDS.KEYID = 0
1,200,415 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,489 UART: [ldev] --
1,282,972 UART: [fwproc] Wait for Commands...
1,283,708 UART: [fwproc] Recv command 0x46574c44
1,284,436 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,720 >>> mbox cmd response: success
2,777,804 UART: [afmc] ++
2,777,972 UART: [afmc] CDI.KEYID = 6
2,778,334 UART: [afmc] SUBJECT.KEYID = 7
2,778,759 UART: [afmc] AUTHORITY.KEYID = 5
2,814,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,899 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,817 UART: [afmc] --
2,857,855 UART: [cold-reset] --
2,858,765 UART: [state] Locking Datavault
2,860,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,760 UART: [state] Locking ICCM
2,861,252 UART: [exit] Launching FMC @ 0x40000130
2,866,581 UART:
2,866,597 UART: Running Caliptra FMC ...
2,867,005 UART:
2,867,059 UART: [state] CFI Enabled
2,877,626 UART: [fht] FMC Alias Private Key: 7
2,985,575 UART: [art] Extend RT PCRs Done
2,986,003 UART: [art] Lock RT PCRs Done
2,987,873 UART: [art] Populate DV Done
2,996,004 UART: [fht] FMC Alias Private Key: 7
2,996,950 UART: [art] Derive CDI
2,997,230 UART: [art] Store in in slot 0x4
3,082,967 UART: [art] Derive Key Pair
3,083,327 UART: [art] Store priv key in slot 0x5
3,096,199 UART: [art] Derive Key Pair - Done
3,110,635 UART: [art] Signing Cert with AUTHO
3,111,115 UART: RITY.KEYID = 7
3,125,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,756 UART: [art] PUB.X = 7D5C749014208DC3D54CC694F6894430C1C3754B79BB87E1934F6AE2B0EA79062BE8A1551E62EFFF9484B57F760D6235
3,133,520 UART: [art] PUB.Y = EE82758D53C7373C46E0BF1A996F204FD2894A732AAC0080B57DE0DF168A6EF8B194BF26E14908E040194120F8C0B3A0
3,140,449 UART: [art] SIG.R = 53184248361E2E11273184D5E21EEC0C43D03D8D0B43E0F5D6A99A0A65182CD1A71D825FBFB3327B413B3962D80A33BC
3,147,209 UART: [art] SIG.S = E0B2BAB1812AD79D382DC5E206BA1A6F5F2BF341F7BA942760B3886B4529E1DED04BBEDCA03AC3AAF76541D3AD571607
3,171,354 UART: Caliptra RT
3,171,607 UART: [state] CFI Enabled
3,279,058 UART: [rt] RT listening for mailbox commands...
3,279,728 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,144 UART: [rt]cmd =0x44504543, len=92
3,317,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 ready_for_fw is high
1,060,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,591 >>> mbox cmd response: success
2,689,387 UART:
2,689,403 UART: Running Caliptra FMC ...
2,689,811 UART:
2,689,865 UART: [state] CFI Enabled
2,700,270 UART: [fht] FMC Alias Private Key: 7
2,807,375 UART: [art] Extend RT PCRs Done
2,807,803 UART: [art] Lock RT PCRs Done
2,809,257 UART: [art] Populate DV Done
2,817,604 UART: [fht] FMC Alias Private Key: 7
2,818,646 UART: [art] Derive CDI
2,818,926 UART: [art] Store in in slot 0x4
2,904,269 UART: [art] Derive Key Pair
2,904,629 UART: [art] Store priv key in slot 0x5
2,918,237 UART: [art] Derive Key Pair - Done
2,932,993 UART: [art] Signing Cert with AUTHO
2,933,473 UART: RITY.KEYID = 7
2,948,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,336 UART: [art] PUB.X = CE5E81F033B404C6BE37C79969B5B35323CE1E098677E76A409D27A13FA3C390535304B797F082D6BBE7A1C522B2F945
2,956,097 UART: [art] PUB.Y = 94A61B9EC7C78E539B2F61CB3540DC1C1F2F84D0F8054C165B3991B199447044D21B2B008EB54ADAE234BC952EF639A0
2,963,028 UART: [art] SIG.R = 6F4775A0C1778D35A4214B924537CC40066892838D9B02BEC40396DC569C776D0F9CCE21C6CCAC13778C8C77852811DD
2,969,784 UART: [art] SIG.S = 10380C492936BE7ED372A8D4573E097F3BEF047F58A0CB280A5E125255CB292745940BB9AF2CF3F70A632026330ED499
2,993,424 UART: Caliptra RT
2,993,677 UART: [state] CFI Enabled
3,100,948 UART: [rt] RT listening for mailbox commands...
3,101,618 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,162 UART: [rt]cmd =0x44504543, len=92
3,139,331 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,597 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,173,068 UART: [cold-reset] ++
1,173,646 UART: [fht] FHT @ 0x50003400
1,176,467 UART: [idev] ++
1,176,635 UART: [idev] CDI.KEYID = 6
1,176,995 UART: [idev] SUBJECT.KEYID = 7
1,177,419 UART: [idev] UDS.KEYID = 0
1,177,764 ready_for_fw is high
1,177,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,137 UART: [idev] Erasing UDS.KEYID = 0
1,202,934 UART: [idev] Sha1 KeyId Algorithm
1,211,482 UART: [idev] --
1,212,412 UART: [ldev] ++
1,212,580 UART: [ldev] CDI.KEYID = 6
1,212,943 UART: [ldev] SUBJECT.KEYID = 5
1,213,369 UART: [ldev] AUTHORITY.KEYID = 7
1,213,832 UART: [ldev] FE.KEYID = 1
1,219,258 UART: [ldev] Erasing FE.KEYID = 1
1,245,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,508 UART: [ldev] --
1,284,949 UART: [fwproc] Wait for Commands...
1,285,611 UART: [fwproc] Recv command 0x46574c44
1,286,339 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,669 >>> mbox cmd response: success
2,778,925 UART: [afmc] ++
2,779,093 UART: [afmc] CDI.KEYID = 6
2,779,455 UART: [afmc] SUBJECT.KEYID = 7
2,779,880 UART: [afmc] AUTHORITY.KEYID = 5
2,815,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,140 UART: [afmc] --
2,859,260 UART: [cold-reset] --
2,860,072 UART: [state] Locking Datavault
2,861,457 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,061 UART: [state] Locking ICCM
2,862,665 UART: [exit] Launching FMC @ 0x40000130
2,867,994 UART:
2,868,010 UART: Running Caliptra FMC ...
2,868,418 UART:
2,868,561 UART: [state] CFI Enabled
2,879,084 UART: [fht] FMC Alias Private Key: 7
2,986,735 UART: [art] Extend RT PCRs Done
2,987,163 UART: [art] Lock RT PCRs Done
2,988,723 UART: [art] Populate DV Done
2,996,894 UART: [fht] FMC Alias Private Key: 7
2,997,964 UART: [art] Derive CDI
2,998,244 UART: [art] Store in in slot 0x4
3,083,903 UART: [art] Derive Key Pair
3,084,263 UART: [art] Store priv key in slot 0x5
3,096,745 UART: [art] Derive Key Pair - Done
3,111,577 UART: [art] Signing Cert with AUTHO
3,112,057 UART: RITY.KEYID = 7
3,127,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,374 UART: [art] PUB.X = 0FA4B28B11D1A05DB428E67626258DD7EF7C14E118DD3A4B9EA7689891DA633EA982B3F6EB796F66276A439FB900ECCA
3,135,131 UART: [art] PUB.Y = 495DD126200EC7D36567A6989B0B78AE2F5EDA66F0879A027A085293516F16558FCA6E454A2B8E6F4B5ACC387EB0ED63
3,142,075 UART: [art] SIG.R = 788EBBCBA7406A0647B80105D1F8F42AE00BE2628727261082428959EFAC1913E3DCCEA4828FE3A7FC1644972978BAA0
3,148,837 UART: [art] SIG.S = 32066BA915ACE7ACCFBCE807BEEFCCF1E310C1A819A3D227A0C8B6C29E52295CFADB6B2DCE59BC316A149B721AA2B7B1
3,173,212 UART: Caliptra RT
3,173,557 UART: [state] CFI Enabled
3,281,524 UART: [rt] RT listening for mailbox commands...
3,282,194 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,650 UART: [rt]cmd =0x44504543, len=92
3,319,667 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,964 ready_for_fw is high
1,060,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,718 >>> mbox cmd response: success
2,692,350 UART:
2,692,366 UART: Running Caliptra FMC ...
2,692,774 UART:
2,692,917 UART: [state] CFI Enabled
2,703,696 UART: [fht] FMC Alias Private Key: 7
2,811,895 UART: [art] Extend RT PCRs Done
2,812,323 UART: [art] Lock RT PCRs Done
2,814,079 UART: [art] Populate DV Done
2,822,584 UART: [fht] FMC Alias Private Key: 7
2,823,516 UART: [art] Derive CDI
2,823,796 UART: [art] Store in in slot 0x4
2,909,085 UART: [art] Derive Key Pair
2,909,445 UART: [art] Store priv key in slot 0x5
2,922,969 UART: [art] Derive Key Pair - Done
2,937,551 UART: [art] Signing Cert with AUTHO
2,938,031 UART: RITY.KEYID = 7
2,953,443 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,208 UART: [art] PUB.X = C2D268933D66E9E89E05597B397D8EC2C46956CD0BC11333ED5C7B4395037CDBA943EDF6CD93D72E7C66E051190CB5E6
2,960,974 UART: [art] PUB.Y = 76661B8B11168ADA695EB4F6F2C65DBD3DAED6933C8D245DE98E05F649F6757319D63974E405DB3F963207E0EFFCECC8
2,967,927 UART: [art] SIG.R = 1BA5DD9B5C5473562E472EDB41AB0EBF03850FB48A713681CB3ADF9746783ECF480089FA4E2FE77E9B72BD1CE4619715
2,974,678 UART: [art] SIG.S = 6B39050EEA5E290A6529A9FAF92FF7A404F375D83A74C383F6ED8B70F89223790F50D69911143223C28D812505D104AD
2,998,344 UART: Caliptra RT
2,998,689 UART: [state] CFI Enabled
3,107,166 UART: [rt] RT listening for mailbox commands...
3,107,836 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,252 UART: [rt]cmd =0x44504543, len=92
3,145,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,180 UART: [kat] LMS
1,168,492 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,503 UART: [idev] ++
1,172,671 UART: [idev] CDI.KEYID = 6
1,173,032 UART: [idev] SUBJECT.KEYID = 7
1,173,457 UART: [idev] UDS.KEYID = 0
1,173,803 ready_for_fw is high
1,173,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,918 UART: [ldev] --
1,280,402 UART: [fwproc] Wait for Commands...
1,281,013 UART: [fwproc] Recv command 0x46574c44
1,281,746 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,614 >>> mbox cmd response: success
2,774,765 UART: [afmc] ++
2,774,933 UART: [afmc] CDI.KEYID = 6
2,775,296 UART: [afmc] SUBJECT.KEYID = 7
2,775,722 UART: [afmc] AUTHORITY.KEYID = 5
2,810,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,426 UART: [afmc] --
2,854,464 UART: [cold-reset] --
2,854,962 UART: [state] Locking Datavault
2,856,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,705 UART: [state] Locking ICCM
2,857,299 UART: [exit] Launching FMC @ 0x40000130
2,862,628 UART:
2,862,644 UART: Running Caliptra FMC ...
2,863,052 UART:
2,863,106 UART: [state] CFI Enabled
2,873,653 UART: [fht] FMC Alias Private Key: 7
2,981,402 UART: [art] Extend RT PCRs Done
2,981,830 UART: [art] Lock RT PCRs Done
2,983,528 UART: [art] Populate DV Done
2,991,829 UART: [fht] FMC Alias Private Key: 7
2,992,893 UART: [art] Derive CDI
2,993,173 UART: [art] Store in in slot 0x4
3,078,476 UART: [art] Derive Key Pair
3,078,836 UART: [art] Store priv key in slot 0x5
3,092,164 UART: [art] Derive Key Pair - Done
3,106,831 UART: [art] Signing Cert with AUTHO
3,107,311 UART: RITY.KEYID = 7
3,122,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,918 UART: [art] PUB.X = C0D3AD7BC8FA9B6CF9507ED9EA0FB277DF3F555DE58FDAE10BF25879D4B36F17C367B32364352A784C3B964D990F0EC2
3,129,694 UART: [art] PUB.Y = BA282ADD20AB1BB5C8C4B7E58DA586354E2F0A7272DAFC90AEE3411BB8BD8A60D093E68E47F792270FBF2CBF9A2F04C6
3,136,659 UART: [art] SIG.R = 4ADDDFF1BB48D716B2D41863656CE5486C717C17F816100ED4859379EC9B49093E289F3D3B25535108ACF847D4D5B74A
3,143,422 UART: [art] SIG.S = EB910E02EAEE062950D21160D9F44677ABE7D4263DD89F23123E75A748EE6C36B9D1911700F76A0ADA0FC3F13DED84A0
3,166,578 UART: Caliptra RT
3,166,831 UART: [state] CFI Enabled
3,274,296 UART: [rt] RT listening for mailbox commands...
3,274,966 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,456 UART: [rt]cmd =0x44504543, len=92
3,312,461 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,352 ready_for_fw is high
1,056,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,096 >>> mbox cmd response: success
2,686,772 UART:
2,686,788 UART: Running Caliptra FMC ...
2,687,196 UART:
2,687,250 UART: [state] CFI Enabled
2,697,335 UART: [fht] FMC Alias Private Key: 7
2,804,626 UART: [art] Extend RT PCRs Done
2,805,054 UART: [art] Lock RT PCRs Done
2,806,774 UART: [art] Populate DV Done
2,814,935 UART: [fht] FMC Alias Private Key: 7
2,816,043 UART: [art] Derive CDI
2,816,323 UART: [art] Store in in slot 0x4
2,901,968 UART: [art] Derive Key Pair
2,902,328 UART: [art] Store priv key in slot 0x5
2,915,350 UART: [art] Derive Key Pair - Done
2,929,912 UART: [art] Signing Cert with AUTHO
2,930,392 UART: RITY.KEYID = 7
2,945,516 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,281 UART: [art] PUB.X = 2D4696FA5E3622483C3C915F708821B4FC1DC22DBDE8DAEAEBDBD85DF46A837599A831423CC6C9EFCC26C840337E3CA4
2,953,069 UART: [art] PUB.Y = 2F5D37D09293CB2795D7E4EB4BEFEF4E7EE9C276CADBD5047A71BAE805DD77F117A9AD4FB2B5B4235CD5EED5F3BA0434
2,960,038 UART: [art] SIG.R = 6107C95788DA37DA351B8B07F86C125B5E5BFB10EB95719D2E9D663E3EA143AF6D66A1629DECEBAA1940336ABFB4955A
2,966,816 UART: [art] SIG.S = F54B005B8DEE9DC2CB1A5096DD628A2AD7F1E098BA7E6A95A3E989D4D2866FB4771CF165BAB51CF68A247E241D8C7A7A
2,990,877 UART: Caliptra RT
2,991,130 UART: [state] CFI Enabled
3,099,001 UART: [rt] RT listening for mailbox commands...
3,099,671 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,103 UART: [rt]cmd =0x44504543, len=92
3,137,266 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,051 UART: [kat] SHA2-512-ACC
905,952 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,748 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 ready_for_fw is high
1,174,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,687 UART: [ldev] ++
1,208,855 UART: [ldev] CDI.KEYID = 6
1,209,219 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,241,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,835 UART: [ldev] --
1,280,289 UART: [fwproc] Wait for Commands...
1,280,976 UART: [fwproc] Recv command 0x46574c44
1,281,709 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,589 >>> mbox cmd response: success
2,773,798 UART: [afmc] ++
2,773,966 UART: [afmc] CDI.KEYID = 6
2,774,329 UART: [afmc] SUBJECT.KEYID = 7
2,774,755 UART: [afmc] AUTHORITY.KEYID = 5
2,810,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,769 UART: [afmc] --
2,853,863 UART: [cold-reset] --
2,854,745 UART: [state] Locking Datavault
2,855,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,492 UART: [state] Locking ICCM
2,857,094 UART: [exit] Launching FMC @ 0x40000130
2,862,423 UART:
2,862,439 UART: Running Caliptra FMC ...
2,862,847 UART:
2,862,990 UART: [state] CFI Enabled
2,873,655 UART: [fht] FMC Alias Private Key: 7
2,981,844 UART: [art] Extend RT PCRs Done
2,982,272 UART: [art] Lock RT PCRs Done
2,983,580 UART: [art] Populate DV Done
2,991,927 UART: [fht] FMC Alias Private Key: 7
2,992,981 UART: [art] Derive CDI
2,993,261 UART: [art] Store in in slot 0x4
3,079,256 UART: [art] Derive Key Pair
3,079,616 UART: [art] Store priv key in slot 0x5
3,092,894 UART: [art] Derive Key Pair - Done
3,107,477 UART: [art] Signing Cert with AUTHO
3,107,957 UART: RITY.KEYID = 7
3,123,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,850 UART: [art] PUB.X = C27A43B5E8ADDBF49C9B4717D6132E014938F5DDB4DBA5A89DD2076BB206184BFA10C2707B5AD96998D608F87834120E
3,130,613 UART: [art] PUB.Y = 3421A8424EEDCA5DD3DFDC9809C6BFA7A78AC5E98D93A1C45CA7DBA1CF14AE59685292B1A5815F6362E5C311A266288A
3,137,576 UART: [art] SIG.R = BC972FF9DD6310D1AC5F2FF87A77B526412F5EAFFE023B018D8E5E8B7BB3E9606636C955D0A61CEF0F44F66B3F8557A9
3,144,353 UART: [art] SIG.S = B8E8C5665B1BA1D0AB609277EBD6F8C49B2EFBF6AF1043D49680D96303C3A98B308480E53E8F317ED23029BC640E67A0
3,168,798 UART: Caliptra RT
3,169,143 UART: [state] CFI Enabled
3,277,593 UART: [rt] RT listening for mailbox commands...
3,278,263 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,489 UART: [rt]cmd =0x44504543, len=92
3,315,354 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,067 ready_for_fw is high
1,056,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,511 >>> mbox cmd response: success
2,687,749 UART:
2,687,765 UART: Running Caliptra FMC ...
2,688,173 UART:
2,688,316 UART: [state] CFI Enabled
2,698,797 UART: [fht] FMC Alias Private Key: 7
2,806,818 UART: [art] Extend RT PCRs Done
2,807,246 UART: [art] Lock RT PCRs Done
2,808,850 UART: [art] Populate DV Done
2,817,149 UART: [fht] FMC Alias Private Key: 7
2,818,185 UART: [art] Derive CDI
2,818,465 UART: [art] Store in in slot 0x4
2,903,696 UART: [art] Derive Key Pair
2,904,056 UART: [art] Store priv key in slot 0x5
2,917,846 UART: [art] Derive Key Pair - Done
2,932,508 UART: [art] Signing Cert with AUTHO
2,932,988 UART: RITY.KEYID = 7
2,947,962 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,727 UART: [art] PUB.X = 834D02726AC9354F43E827ACAD47DDA247FF6BFAF5B52F4A94F3753AC1EFA7DBE2428D79FB09069E7D1BF2E291F1FF24
2,955,508 UART: [art] PUB.Y = C7076C1DABD9CB71BB80636C1B202B45036D79E956753E42945FFB98F93162A5A09CB9AEB22FFF073AFEF0F217223908
2,962,454 UART: [art] SIG.R = 34F16C61FABA127D048310D5DC4D6B64D484BFFB54B8FA18AE5AF9C8E2BBAA01D17EF53FCCA01A8F153CC238F12701C8
2,969,239 UART: [art] SIG.S = C0B62303800C9F20326F9DB5C16D815F0B5EED5F4A167BF9AEF649E5915EF3A7DAE2B094317318988F399E8F3308FDBF
2,993,116 UART: Caliptra RT
2,993,461 UART: [state] CFI Enabled
3,101,244 UART: [rt] RT listening for mailbox commands...
3,101,914 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,476 UART: [rt]cmd =0x44504543, len=92
3,139,453 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,237 UART:
192,596 UART: Running Caliptra ROM ...
193,724 UART:
193,874 UART: [state] CFI Enabled
263,029 UART: [state] LifecycleState = Unprovisioned
264,958 UART: [state] DebugLocked = No
268,005 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,290 UART: [kat] SHA2-256
442,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,564 UART: [kat] ++
453,094 UART: [kat] sha1
462,913 UART: [kat] SHA2-256
465,569 UART: [kat] SHA2-384
471,222 UART: [kat] SHA2-512-ACC
473,595 UART: [kat] ECC-384
2,766,494 UART: [kat] HMAC-384Kdf
2,778,941 UART: [kat] LMS
3,969,247 UART: [kat] --
3,972,889 UART: [cold-reset] ++
3,973,825 UART: [fht] Storing FHT @ 0x50003400
3,984,663 UART: [idev] ++
3,985,308 UART: [idev] CDI.KEYID = 6
3,986,220 UART: [idev] SUBJECT.KEYID = 7
3,987,464 UART: [idev] UDS.KEYID = 0
3,988,452 ready_for_fw is high
3,988,641 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,177 UART: [idev] Erasing UDS.KEYID = 0
7,324,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,018 UART: [idev] --
7,350,007 UART: [ldev] ++
7,350,586 UART: [ldev] CDI.KEYID = 6
7,351,608 UART: [ldev] SUBJECT.KEYID = 5
7,352,770 UART: [ldev] AUTHORITY.KEYID = 7
7,353,998 UART: [ldev] FE.KEYID = 1
7,401,703 UART: [ldev] Erasing FE.KEYID = 1
10,735,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,723 UART: [ldev] --
13,114,851 UART: [fwproc] Waiting for Commands...
13,118,133 UART: [fwproc] Received command 0x46574c44
13,120,366 UART: [fwproc] Received Image of size 114124 bytes
17,173,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,635 >>> mbox cmd response: success
17,630,721 UART: [afmc] ++
17,631,323 UART: [afmc] CDI.KEYID = 6
17,632,207 UART: [afmc] SUBJECT.KEYID = 7
17,633,472 UART: [afmc] AUTHORITY.KEYID = 5
20,981,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,241 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,675 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,488 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,916 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,797 UART: [afmc] --
23,357,441 UART: [cold-reset] --
23,362,436 UART: [state] Locking Datavault
23,368,289 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,037 UART: [state] Locking ICCM
23,371,407 UART: [exit] Launching FMC @ 0x40000130
23,379,799 UART:
23,380,037 UART: Running Caliptra FMC ...
23,381,068 UART:
23,381,220 UART: [state] CFI Enabled
23,445,380 UART: [fht] FMC Alias Private Key: 7
25,783,281 UART: [art] Extend RT PCRs Done
25,784,507 UART: [art] Lock RT PCRs Done
25,786,214 UART: [art] Populate DV Done
25,791,399 UART: [fht] FMC Alias Private Key: 7
25,793,007 UART: [art] Derive CDI
25,793,757 UART: [art] Store in in slot 0x4
25,853,068 UART: [art] Derive Key Pair
25,854,071 UART: [art] Store priv key in slot 0x5
29,147,527 UART: [art] Derive Key Pair - Done
29,160,519 UART: [art] Signing Cert with AUTHO
29,161,817 UART: RITY.KEYID = 7
31,448,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,959 UART: [art] PUB.X = A3CB17839A949EF4F41A3690398AD5C04E0D5EF2A1E0A1663D038956544481BA40786D7140AB64C71985B0229AF8BCEB
31,457,218 UART: [art] PUB.Y = D1564E31DAEFC7DC521350D25457F6310B0B5B7C3935459048FCAF3137CD9D2CF3B087443D61550C5BAB0EA0CEE1EB39
31,464,455 UART: [art] SIG.R = 51277E7058462032C368920C097E1D3CB1613D9700C38A2A6A551060BC98F20457BE673EB01BD54674AF80A17C5413DC
31,471,849 UART: [art] SIG.S = E4C0B10FE78C43627CBA19AB69865B3C99E0EB24F10D5ADBF63EF35FF740405E361F9B2662EFBF3B4F3DD1153FA7507B
32,777,194 UART: Caliptra RT
32,777,893 UART: [state] CFI Enabled
32,939,312 UART: [rt] RT listening for mailbox commands...
32,941,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,971,890 UART: [rt]cmd =0x44504543, len=96
33,004,080 >>> mbox cmd response data (56 bytes)
33,004,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,035,248 UART: [rt]cmd =0x44504543, len=96
33,066,545 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,785,782 ready_for_fw is high
3,786,179 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,831,654 >>> mbox cmd response: success
23,527,650 UART:
23,528,030 UART: Running Caliptra FMC ...
23,529,172 UART:
23,529,338 UART: [state] CFI Enabled
23,596,594 UART: [fht] FMC Alias Private Key: 7
25,934,573 UART: [art] Extend RT PCRs Done
25,935,793 UART: [art] Lock RT PCRs Done
25,937,127 UART: [art] Populate DV Done
25,942,929 UART: [fht] FMC Alias Private Key: 7
25,944,405 UART: [art] Derive CDI
25,945,148 UART: [art] Store in in slot 0x4
26,003,593 UART: [art] Derive Key Pair
26,004,595 UART: [art] Store priv key in slot 0x5
29,297,226 UART: [art] Derive Key Pair - Done
29,309,923 UART: [art] Signing Cert with AUTHO
29,311,254 UART: RITY.KEYID = 7
31,598,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,600,076 UART: [art] PUB.X = 500FBD8D72299BF051B2E05C31113613D1E6D5F4015299643782E37F4FE928DD5ABD51F99CA3C93333FA250FCEB16603
31,607,331 UART: [art] PUB.Y = B21F131AFA67E1F05B0854999AC22B1AE54F2B145882EF633607CA181F82F2FC98890A5E1E268E9878AEAAD074231D86
31,614,567 UART: [art] SIG.R = 65FDF42336CE6A5FBAD27410100A6499A002904419C864CCF9FBD665B56E6A63071BA8E1F79731B703EA7B38CC7C6718
31,621,962 UART: [art] SIG.S = F7606D25E10DC3D3A3F23C7A1D69DDCF73C046DDD86FFC1B0D041A51AB6FCEDF4CD7C74C735550BBF3C063D0146C78DE
32,926,839 UART: Caliptra RT
32,927,539 UART: [state] CFI Enabled
33,090,438 UART: [rt] RT listening for mailbox commands...
33,092,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,122,921 UART: [rt]cmd =0x44504543, len=96
33,153,379 >>> mbox cmd response data (56 bytes)
33,154,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,184,799 UART: [rt]cmd =0x44504543, len=96
33,216,283 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,343 UART:
192,709 UART: Running Caliptra ROM ...
193,908 UART:
603,462 UART: [state] CFI Enabled
619,970 UART: [state] LifecycleState = Unprovisioned
621,912 UART: [state] DebugLocked = No
623,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,993 UART: [kat] SHA2-256
798,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,298 UART: [kat] ++
809,735 UART: [kat] sha1
821,521 UART: [kat] SHA2-256
824,233 UART: [kat] SHA2-384
829,860 UART: [kat] SHA2-512-ACC
832,227 UART: [kat] ECC-384
3,115,894 UART: [kat] HMAC-384Kdf
3,127,649 UART: [kat] LMS
4,317,742 UART: [kat] --
4,321,477 UART: [cold-reset] ++
4,323,836 UART: [fht] Storing FHT @ 0x50003400
4,335,095 UART: [idev] ++
4,335,736 UART: [idev] CDI.KEYID = 6
4,336,615 UART: [idev] SUBJECT.KEYID = 7
4,337,851 UART: [idev] UDS.KEYID = 0
4,338,869 ready_for_fw is high
4,339,065 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,404 UART: [idev] Erasing UDS.KEYID = 0
7,629,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,876 UART: [idev] --
7,656,597 UART: [ldev] ++
7,657,161 UART: [ldev] CDI.KEYID = 6
7,658,118 UART: [ldev] SUBJECT.KEYID = 5
7,659,340 UART: [ldev] AUTHORITY.KEYID = 7
7,660,621 UART: [ldev] FE.KEYID = 1
7,672,836 UART: [ldev] Erasing FE.KEYID = 1
10,961,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,766 UART: [ldev] --
13,319,337 UART: [fwproc] Waiting for Commands...
13,321,265 UART: [fwproc] Received command 0x46574c44
13,323,439 UART: [fwproc] Received Image of size 114124 bytes
17,377,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,844,798 >>> mbox cmd response: success
17,849,254 UART: [afmc] ++
17,849,852 UART: [afmc] CDI.KEYID = 6
17,850,756 UART: [afmc] SUBJECT.KEYID = 7
17,851,962 UART: [afmc] AUTHORITY.KEYID = 5
21,169,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,534 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,923 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,750 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,218 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,015 UART: [afmc] --
23,533,013 UART: [cold-reset] --
23,537,578 UART: [state] Locking Datavault
23,541,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,604 UART: [state] Locking ICCM
23,545,261 UART: [exit] Launching FMC @ 0x40000130
23,553,619 UART:
23,553,851 UART: Running Caliptra FMC ...
23,554,951 UART:
23,555,107 UART: [state] CFI Enabled
23,563,498 UART: [fht] FMC Alias Private Key: 7
25,894,180 UART: [art] Extend RT PCRs Done
25,895,400 UART: [art] Lock RT PCRs Done
25,896,805 UART: [art] Populate DV Done
25,902,329 UART: [fht] FMC Alias Private Key: 7
25,903,861 UART: [art] Derive CDI
25,904,589 UART: [art] Store in in slot 0x4
25,946,950 UART: [art] Derive Key Pair
25,947,955 UART: [art] Store priv key in slot 0x5
29,190,358 UART: [art] Derive Key Pair - Done
29,203,246 UART: [art] Signing Cert with AUTHO
29,204,548 UART: RITY.KEYID = 7
31,483,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,960 UART: [art] PUB.X = 1A3B96A421E468DA9F3361FC9B9784B55FAE261066DE1717707873B931576B0C2AD93C1BB979BD8C38F2D64A877AE5F3
31,492,199 UART: [art] PUB.Y = 5BE68ACB7B83855EA04E84C06F30BCCE2721B0B128087C6C93822EB2DAC8992A563FA88C2BCD404EF9AA89E3CA0E88D0
31,499,471 UART: [art] SIG.R = 6513717D5804E296F89EEED29D76E2B9B4FCF34B8279BDB071A711238943D39858CB1E05889CC336A997A78930EF3E6C
31,506,878 UART: [art] SIG.S = B647B31F0083F34D4FC6F088E037EB32AD15FF0083431456C77D299055CD77724A07B9A61A4348E448E1D273E6D18DC6
32,811,703 UART: Caliptra RT
32,812,426 UART: [state] CFI Enabled
32,930,253 UART: [rt] RT listening for mailbox commands...
32,932,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,962,741 UART: [rt]cmd =0x44504543, len=96
32,994,387 >>> mbox cmd response data (56 bytes)
32,995,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,025,794 UART: [rt]cmd =0x44504543, len=96
33,058,333 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,129,139 ready_for_fw is high
4,129,539 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,930 >>> mbox cmd response: success
23,719,824 UART:
23,720,206 UART: Running Caliptra FMC ...
23,721,405 UART:
23,721,570 UART: [state] CFI Enabled
23,729,293 UART: [fht] FMC Alias Private Key: 7
26,059,971 UART: [art] Extend RT PCRs Done
26,061,333 UART: [art] Lock RT PCRs Done
26,062,829 UART: [art] Populate DV Done
26,067,817 UART: [fht] FMC Alias Private Key: 7
26,069,466 UART: [art] Derive CDI
26,070,198 UART: [art] Store in in slot 0x4
26,112,679 UART: [art] Derive Key Pair
26,113,672 UART: [art] Store priv key in slot 0x5
29,355,849 UART: [art] Derive Key Pair - Done
29,369,026 UART: [art] Signing Cert with AUTHO
29,370,337 UART: RITY.KEYID = 7
31,649,802 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,311 UART: [art] PUB.X = 07BFA900F2CEC7359AF500E7393F3BEA093C298948727EE2D6A35D0B72BD01D00491C1E7EF68229E15524D57E005622B
31,658,536 UART: [art] PUB.Y = 00AAB14D2AD0A135D9F8BBB14CCB88FED013AD00A46FB31AD484EA279ED5C69FCA4A68611AF7C344567E2C824087DEED
31,665,759 UART: [art] SIG.R = 13D873AC56673279E327049B39AD3FBFCF9EA66424180EDAE347978BB2FE4EEF996851EFC7216B407271E5CF14B87925
31,673,148 UART: [art] SIG.S = E0557EBE077C0D0ACCC51C3C4920725DB39B112863289719748AA3BB902DE347AF53A2DD7A97A2E4A721954DF9676AA2
32,978,429 UART: Caliptra RT
32,979,124 UART: [state] CFI Enabled
33,096,513 UART: [rt] RT listening for mailbox commands...
33,098,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,837 UART: [rt]cmd =0x44504543, len=96
33,160,191 >>> mbox cmd response data (56 bytes)
33,161,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,191,712 UART: [rt]cmd =0x44504543, len=96
33,223,182 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,170 UART:
192,522 UART: Running Caliptra ROM ...
193,622 UART:
193,763 UART: [state] CFI Enabled
265,180 UART: [state] LifecycleState = Unprovisioned
267,017 UART: [state] DebugLocked = No
268,341 UART: [state] WD Timer not started. Device not locked for debugging
271,957 UART: [kat] SHA2-256
451,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,667 UART: [kat] ++
463,219 UART: [kat] sha1
475,107 UART: [kat] SHA2-256
478,091 UART: [kat] SHA2-384
484,087 UART: [kat] SHA2-512-ACC
487,024 UART: [kat] ECC-384
2,947,457 UART: [kat] HMAC-384Kdf
2,969,918 UART: [kat] LMS
3,499,396 UART: [kat] --
3,505,662 UART: [cold-reset] ++
3,506,640 UART: [fht] FHT @ 0x50003400
3,518,401 UART: [idev] ++
3,518,960 UART: [idev] CDI.KEYID = 6
3,519,988 UART: [idev] SUBJECT.KEYID = 7
3,521,089 UART: [idev] UDS.KEYID = 0
3,522,028 ready_for_fw is high
3,522,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,055 UART: [idev] Erasing UDS.KEYID = 0
6,027,337 UART: [idev] Sha1 KeyId Algorithm
6,050,478 UART: [idev] --
6,054,961 UART: [ldev] ++
6,055,534 UART: [ldev] CDI.KEYID = 6
6,056,464 UART: [ldev] SUBJECT.KEYID = 5
6,057,626 UART: [ldev] AUTHORITY.KEYID = 7
6,058,912 UART: [ldev] FE.KEYID = 1
6,099,000 UART: [ldev] Erasing FE.KEYID = 1
8,602,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,537 UART: [ldev] --
10,413,317 UART: [fwproc] Wait for Commands...
10,416,345 UART: [fwproc] Recv command 0x46574c44
10,418,436 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,031 >>> mbox cmd response: success
14,290,466 UART: [afmc] ++
14,291,059 UART: [afmc] CDI.KEYID = 6
14,291,972 UART: [afmc] SUBJECT.KEYID = 7
14,293,134 UART: [afmc] AUTHORITY.KEYID = 5
16,825,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,095 UART: [afmc] --
18,625,964 UART: [cold-reset] --
18,629,649 UART: [state] Locking Datavault
18,632,530 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,172 UART: [state] Locking ICCM
18,635,835 UART: [exit] Launching FMC @ 0x40000130
18,644,287 UART:
18,644,527 UART: Running Caliptra FMC ...
18,645,625 UART:
18,645,787 UART: [state] CFI Enabled
18,710,909 UART: [fht] FMC Alias Private Key: 7
20,474,494 UART: [art] Extend RT PCRs Done
20,475,708 UART: [art] Lock RT PCRs Done
20,477,167 UART: [art] Populate DV Done
20,482,853 UART: [fht] FMC Alias Private Key: 7
20,484,385 UART: [art] Derive CDI
20,485,218 UART: [art] Store in in slot 0x4
20,543,661 UART: [art] Derive Key Pair
20,544,651 UART: [art] Store priv key in slot 0x5
23,007,507 UART: [art] Derive Key Pair - Done
23,020,397 UART: [art] Signing Cert with AUTHO
23,021,699 UART: RITY.KEYID = 7
24,732,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,388 UART: [art] PUB.X = DE0102E7E17DCFBCAF0005D75B07EC645DCB5EF2FD5D24AA090FB82A7410568CE8C00543B46C929EB62D7ABE4C2E312A
24,741,683 UART: [art] PUB.Y = 0DDA137A62AAD499BD01BA308ADAAF924B544AC1636623010161471009CACDF2398622CB217D7C86821F657C310115D7
24,748,916 UART: [art] SIG.R = 7E3C0A6A45216BBDE900A7CFE98F44FE27BA41299DCE85458E7E48714363251FD4392D43418DA34D2C1C5D1624FFB47E
24,756,302 UART: [art] SIG.S = CFF8C7209447CC3506BC295CFA66D5EB250098D9A5A2CBC8E6D48EE3B0AD3604212D156DAF2C9D0AC81576AD5439E414
25,735,261 UART: Caliptra RT
25,735,972 UART: [state] CFI Enabled
25,900,172 UART: [rt] RT listening for mailbox commands...
25,902,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,219 UART: [rt]cmd =0x44504543, len=96
25,964,449 >>> mbox cmd response data (56 bytes)
25,965,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,996,089 UART: [rt]cmd =0x44504543, len=96
26,027,335 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,382,249 ready_for_fw is high
3,382,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,089,003 >>> mbox cmd response: success
18,384,632 UART:
18,385,029 UART: Running Caliptra FMC ...
18,386,234 UART:
18,386,403 UART: [state] CFI Enabled
18,452,465 UART: [fht] FMC Alias Private Key: 7
20,216,141 UART: [art] Extend RT PCRs Done
20,217,369 UART: [art] Lock RT PCRs Done
20,218,684 UART: [art] Populate DV Done
20,224,213 UART: [fht] FMC Alias Private Key: 7
20,225,695 UART: [art] Derive CDI
20,226,459 UART: [art] Store in in slot 0x4
20,285,024 UART: [art] Derive Key Pair
20,286,063 UART: [art] Store priv key in slot 0x5
22,748,795 UART: [art] Derive Key Pair - Done
22,761,851 UART: [art] Signing Cert with AUTHO
22,763,162 UART: RITY.KEYID = 7
24,474,679 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,183 UART: [art] PUB.X = A0FA35D191C72F8E71B841346288F53927559B939D3BBC5C97100CB663774E0A5DB1B9C2A5E3B0F79981C37C2B41A6C3
24,483,401 UART: [art] PUB.Y = 1E7E85BFFB235C53EB426C1F34EFC1ED3A6CD1C87A56FD74BB440E66B3A7F130FFCAEC2FA27000E61F5E38F37137BB67
24,490,718 UART: [art] SIG.R = B3DA3E829948D13E15C223032FDA41806F36E2AFD9B945EF029768DBF67605B0D49489106FAA7D1A2499ADBEDF55FE95
24,498,127 UART: [art] SIG.S = 54B51166DD400CA72D915DAB13D086E4440BB75C566D3E78CB21D23531EC077AE187E88FA454F4CCB7E51630754991B9
25,477,394 UART: Caliptra RT
25,478,094 UART: [state] CFI Enabled
25,641,694 UART: [rt] RT listening for mailbox commands...
25,643,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,674,907 UART: [rt]cmd =0x44504543, len=96
25,705,951 >>> mbox cmd response data (56 bytes)
25,706,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,737,369 UART: [rt]cmd =0x44504543, len=96
25,768,477 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,344 UART:
192,718 UART: Running Caliptra ROM ...
193,850 UART:
603,348 UART: [state] CFI Enabled
611,916 UART: [state] LifecycleState = Unprovisioned
613,794 UART: [state] DebugLocked = No
614,951 UART: [state] WD Timer not started. Device not locked for debugging
618,192 UART: [kat] SHA2-256
797,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
808,893 UART: [kat] ++
809,334 UART: [kat] sha1
820,550 UART: [kat] SHA2-256
823,621 UART: [kat] SHA2-384
828,192 UART: [kat] SHA2-512-ACC
831,199 UART: [kat] ECC-384
3,272,341 UART: [kat] HMAC-384Kdf
3,285,222 UART: [kat] LMS
3,814,682 UART: [kat] --
3,817,145 UART: [cold-reset] ++
3,818,086 UART: [fht] FHT @ 0x50003400
3,828,301 UART: [idev] ++
3,828,864 UART: [idev] CDI.KEYID = 6
3,829,885 UART: [idev] SUBJECT.KEYID = 7
3,830,977 UART: [idev] UDS.KEYID = 0
3,832,017 ready_for_fw is high
3,832,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,975,944 UART: [idev] Erasing UDS.KEYID = 0
6,302,655 UART: [idev] Sha1 KeyId Algorithm
6,326,634 UART: [idev] --
6,330,561 UART: [ldev] ++
6,331,120 UART: [ldev] CDI.KEYID = 6
6,332,050 UART: [ldev] SUBJECT.KEYID = 5
6,333,254 UART: [ldev] AUTHORITY.KEYID = 7
6,334,444 UART: [ldev] FE.KEYID = 1
6,344,674 UART: [ldev] Erasing FE.KEYID = 1
8,816,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,566,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,581,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,602,699 UART: [ldev] --
10,607,966 UART: [fwproc] Wait for Commands...
10,610,212 UART: [fwproc] Recv command 0x46574c44
10,612,301 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,733 >>> mbox cmd response: success
14,489,587 UART: [afmc] ++
14,490,181 UART: [afmc] CDI.KEYID = 6
14,491,086 UART: [afmc] SUBJECT.KEYID = 7
14,492,243 UART: [afmc] AUTHORITY.KEYID = 5
16,993,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,322 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,061 UART: [afmc] --
18,788,057 UART: [cold-reset] --
18,794,016 UART: [state] Locking Datavault
18,799,209 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,849 UART: [state] Locking ICCM
18,802,893 UART: [exit] Launching FMC @ 0x40000130
18,811,285 UART:
18,811,522 UART: Running Caliptra FMC ...
18,812,619 UART:
18,812,778 UART: [state] CFI Enabled
18,821,058 UART: [fht] FMC Alias Private Key: 7
20,576,826 UART: [art] Extend RT PCRs Done
20,578,291 UART: [art] Lock RT PCRs Done
20,579,528 UART: [art] Populate DV Done
20,585,064 UART: [fht] FMC Alias Private Key: 7
20,586,600 UART: [art] Derive CDI
20,587,356 UART: [art] Store in in slot 0x4
20,629,632 UART: [art] Derive Key Pair
20,630,676 UART: [art] Store priv key in slot 0x5
23,057,146 UART: [art] Derive Key Pair - Done
23,069,991 UART: [art] Signing Cert with AUTHO
23,071,298 UART: RITY.KEYID = 7
24,776,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,445 UART: [art] PUB.X = E335B5DA2CF4591F46A31F751D473D1DC2221ECB1CA1B42CAFEF3F0A6E3025505C5BAB0ECABC4EBC22540836D3D1231D
24,785,729 UART: [art] PUB.Y = DC3D7F0D90DFB136754BF75BDD01BDB079464437D475859ACBB03DED9BB14FB176AC12232F6687532ADBA20F715E17E6
24,792,997 UART: [art] SIG.R = E4407340443D00BAF4159A22657F2392791766EC095DDD27CF63896CA31DF3E2EAF56DF2C8269368996D028270774391
24,800,333 UART: [art] SIG.S = 894516CE23CAAC012205B0D8241C0EB3E46B3B0794343A8162F464C1BA360E6DDA932164F4A4555CC1DB7D1EBC341279
25,779,150 UART: Caliptra RT
25,779,854 UART: [state] CFI Enabled
25,896,325 UART: [rt] RT listening for mailbox commands...
25,898,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,762 UART: [rt]cmd =0x44504543, len=96
25,960,082 >>> mbox cmd response data (56 bytes)
25,961,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,991,621 UART: [rt]cmd =0x44504543, len=96
26,022,719 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,697,242 ready_for_fw is high
3,697,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,017 >>> mbox cmd response: success
18,523,553 UART:
18,523,945 UART: Running Caliptra FMC ...
18,525,281 UART:
18,525,446 UART: [state] CFI Enabled
18,532,758 UART: [fht] FMC Alias Private Key: 7
20,290,772 UART: [art] Extend RT PCRs Done
20,292,002 UART: [art] Lock RT PCRs Done
20,293,710 UART: [art] Populate DV Done
20,299,118 UART: [fht] FMC Alias Private Key: 7
20,300,706 UART: [art] Derive CDI
20,301,457 UART: [art] Store in in slot 0x4
20,344,157 UART: [art] Derive Key Pair
20,345,153 UART: [art] Store priv key in slot 0x5
22,772,391 UART: [art] Derive Key Pair - Done
22,785,183 UART: [art] Signing Cert with AUTHO
22,786,490 UART: RITY.KEYID = 7
24,492,513 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,027 UART: [art] PUB.X = 4326052C6E1C80AA424221F781D6E06F199ACC7CC8D327BCF3501E93721FF38880A6C874A67B55BA82475794094FF38D
24,501,260 UART: [art] PUB.Y = 4342AA4299CFCFC1370E148FFA5B45F34B3D70EC79DEE9B0B0BF6D618192CF9E7E898195CD76F9DC3FCDF9A50CAC3332
24,508,559 UART: [art] SIG.R = 54A2421BA15AE5518D35C89C53C19BA2ED2ECB9A5CC3F7A30DA2C06995BFD84E792791A532EA1E4212A4634FFFB0441A
24,515,991 UART: [art] SIG.S = 4D33778BC77B1FE3A25426D9898D593ED514A4F04834E192808103AB6A37AE1730D995F456792ECADCC27D924A661533
25,494,314 UART: Caliptra RT
25,495,015 UART: [state] CFI Enabled
25,612,229 UART: [rt] RT listening for mailbox commands...
25,614,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,645,117 UART: [rt]cmd =0x44504543, len=96
25,675,953 >>> mbox cmd response data (56 bytes)
25,676,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,707,391 UART: [rt]cmd =0x44504543, len=96
25,739,906 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,253 UART:
192,607 UART: Running Caliptra ROM ...
193,790 UART:
193,946 UART: [state] CFI Enabled
263,477 UART: [state] LifecycleState = Unprovisioned
265,897 UART: [state] DebugLocked = No
267,502 UART: [state] WD Timer not started. Device not locked for debugging
271,956 UART: [kat] SHA2-256
461,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,576 UART: [kat] ++
473,025 UART: [kat] sha1
483,799 UART: [kat] SHA2-256
486,780 UART: [kat] SHA2-384
493,008 UART: [kat] SHA2-512-ACC
495,607 UART: [kat] ECC-384
2,950,319 UART: [kat] HMAC-384Kdf
2,972,393 UART: [kat] LMS
3,504,124 UART: [kat] --
3,508,396 UART: [cold-reset] ++
3,509,327 UART: [fht] FHT @ 0x50003400
3,520,035 UART: [idev] ++
3,520,727 UART: [idev] CDI.KEYID = 6
3,521,647 UART: [idev] SUBJECT.KEYID = 7
3,522,893 UART: [idev] UDS.KEYID = 0
3,523,818 ready_for_fw is high
3,524,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,833 UART: [idev] Erasing UDS.KEYID = 0
6,030,726 UART: [idev] Sha1 KeyId Algorithm
6,051,850 UART: [idev] --
6,057,624 UART: [ldev] ++
6,058,304 UART: [ldev] CDI.KEYID = 6
6,059,214 UART: [ldev] SUBJECT.KEYID = 5
6,060,376 UART: [ldev] AUTHORITY.KEYID = 7
6,061,608 UART: [ldev] FE.KEYID = 1
6,101,003 UART: [ldev] Erasing FE.KEYID = 1
8,608,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,077 UART: [ldev] --
10,417,735 UART: [fwproc] Wait for Commands...
10,419,724 UART: [fwproc] Recv command 0x46574c44
10,421,979 UART: [fwproc] Recv'd Img size: 114448 bytes
13,873,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,612,355 >>> mbox cmd response: success
14,617,298 UART: [afmc] ++
14,618,008 UART: [afmc] CDI.KEYID = 6
14,619,255 UART: [afmc] SUBJECT.KEYID = 7
14,620,682 UART: [afmc] AUTHORITY.KEYID = 5
17,152,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,284 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,586 UART: [afmc] --
18,950,284 UART: [cold-reset] --
18,954,259 UART: [state] Locking Datavault
18,959,572 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,752 UART: [state] Locking ICCM
18,964,399 UART: [exit] Launching FMC @ 0x40000130
18,973,073 UART:
18,973,318 UART: Running Caliptra FMC ...
18,974,418 UART:
18,974,582 UART: [state] CFI Enabled
19,032,826 UART: [fht] FMC Alias Private Key: 7
20,796,746 UART: [art] Extend RT PCRs Done
20,797,962 UART: [art] Lock RT PCRs Done
20,799,745 UART: [art] Populate DV Done
20,805,100 UART: [fht] FMC Alias Private Key: 7
20,806,582 UART: [art] Derive CDI
20,807,343 UART: [art] Store in in slot 0x4
20,866,001 UART: [art] Derive Key Pair
20,867,004 UART: [art] Store priv key in slot 0x5
23,330,107 UART: [art] Derive Key Pair - Done
23,342,943 UART: [art] Signing Cert with AUTHO
23,344,239 UART: RITY.KEYID = 7
25,056,591 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,100 UART: [art] PUB.X = DFE8DB818F3B507F2DFD66EC5A751BD907CA1DD4C1F2B020D9C2074A3AB78B512A7D2BC116841C99470BFDCE45F4A5D8
25,065,397 UART: [art] PUB.Y = 4C739B8DED8D0DAAF8DAB602C89CE9ADD39F344FD2B2505935841C1F72AD7996356C54DD0C601F01D2EDB4DFFA5ED549
25,072,682 UART: [art] SIG.R = 53C3C1FC99303534DE8EA59B7AD614F1E2B838A082B91B6BFDA5BE86403F12B0A9F164957EA37F30A635FADE79AA4B54
25,080,121 UART: [art] SIG.S = BF357ECD155B4A0BE716FF63D2B2595A33CD4BFF49D548DDCE1CFB36246287DE7BA28C597392872126226F207E3BC959
26,059,550 UART: Caliptra RT
26,060,261 UART: [state] CFI Enabled
26,224,705 UART: [rt] RT listening for mailbox commands...
26,226,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,257,626 UART: [rt]cmd =0x44504543, len=96
26,289,002 >>> mbox cmd response data (56 bytes)
26,289,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,659 UART: [rt]cmd =0x44504543, len=96
26,352,356 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,440,872 ready_for_fw is high
3,441,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,131 >>> mbox cmd response: success
19,050,789 UART:
19,051,174 UART: Running Caliptra FMC ...
19,052,313 UART:
19,052,478 UART: [state] CFI Enabled
19,118,439 UART: [fht] FMC Alias Private Key: 7
20,882,169 UART: [art] Extend RT PCRs Done
20,883,385 UART: [art] Lock RT PCRs Done
20,884,954 UART: [art] Populate DV Done
20,890,418 UART: [fht] FMC Alias Private Key: 7
20,891,906 UART: [art] Derive CDI
20,892,672 UART: [art] Store in in slot 0x4
20,943,438 UART: [art] Derive Key Pair
20,944,482 UART: [art] Store priv key in slot 0x5
23,407,812 UART: [art] Derive Key Pair - Done
23,420,655 UART: [art] Signing Cert with AUTHO
23,421,963 UART: RITY.KEYID = 7
25,133,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,836 UART: [art] PUB.X = 821989C93C0A3260BE8332F2694354CF18BF22DCD99232DA7A3EC64963289706AC79D71917CE7EA1F4BECEC453371A2C
25,142,077 UART: [art] PUB.Y = 1322562C0C5180A05D3EAD833ABC0154026103CE55AF6E018CCEA2974F41F2DE3A7779ED70FFDE0BCB7F2C435715254B
25,149,378 UART: [art] SIG.R = 9FAE380F45F7C90216FB7A4CDC2C5655104CCAC10127E61EACAD13D464FA2571E34C1915B1DC1E14056F91CBAE16ED4F
25,156,763 UART: [art] SIG.S = 1750A658ABF4F5BF4532310C6B007CA27501B1BA1FC3EA468172C85A9A3F093C8DE7986A7837AB9BB0B99041056946D8
26,136,391 UART: Caliptra RT
26,137,083 UART: [state] CFI Enabled
26,301,560 UART: [rt] RT listening for mailbox commands...
26,303,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,823 UART: [rt]cmd =0x44504543, len=96
26,365,871 >>> mbox cmd response data (56 bytes)
26,366,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,297 UART: [rt]cmd =0x44504543, len=96
26,427,975 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,585 UART:
192,949 UART: Running Caliptra ROM ...
194,124 UART:
603,611 UART: [state] CFI Enabled
618,004 UART: [state] LifecycleState = Unprovisioned
620,391 UART: [state] DebugLocked = No
622,844 UART: [state] WD Timer not started. Device not locked for debugging
627,506 UART: [kat] SHA2-256
817,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,122 UART: [kat] ++
828,720 UART: [kat] sha1
839,879 UART: [kat] SHA2-256
842,871 UART: [kat] SHA2-384
849,208 UART: [kat] SHA2-512-ACC
851,782 UART: [kat] ECC-384
3,293,033 UART: [kat] HMAC-384Kdf
3,304,903 UART: [kat] LMS
3,836,760 UART: [kat] --
3,840,492 UART: [cold-reset] ++
3,841,454 UART: [fht] FHT @ 0x50003400
3,852,634 UART: [idev] ++
3,853,256 UART: [idev] CDI.KEYID = 6
3,854,201 UART: [idev] SUBJECT.KEYID = 7
3,855,432 UART: [idev] UDS.KEYID = 0
3,856,326 ready_for_fw is high
3,856,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,214 UART: [idev] Erasing UDS.KEYID = 0
6,329,942 UART: [idev] Sha1 KeyId Algorithm
6,352,888 UART: [idev] --
6,356,982 UART: [ldev] ++
6,357,660 UART: [ldev] CDI.KEYID = 6
6,358,536 UART: [ldev] SUBJECT.KEYID = 5
6,359,738 UART: [ldev] AUTHORITY.KEYID = 7
6,360,960 UART: [ldev] FE.KEYID = 1
6,373,494 UART: [ldev] Erasing FE.KEYID = 1
8,852,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,935 UART: [ldev] --
10,640,914 UART: [fwproc] Wait for Commands...
10,642,846 UART: [fwproc] Recv command 0x46574c44
10,645,145 UART: [fwproc] Recv'd Img size: 114448 bytes
14,098,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,674 >>> mbox cmd response: success
14,839,956 UART: [afmc] ++
14,840,654 UART: [afmc] CDI.KEYID = 6
14,841,761 UART: [afmc] SUBJECT.KEYID = 7
14,843,317 UART: [afmc] AUTHORITY.KEYID = 5
17,349,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,877 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,204 UART: [afmc] --
19,147,198 UART: [cold-reset] --
19,152,895 UART: [state] Locking Datavault
19,158,472 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,666 UART: [state] Locking ICCM
19,162,329 UART: [exit] Launching FMC @ 0x40000130
19,170,951 UART:
19,171,187 UART: Running Caliptra FMC ...
19,172,279 UART:
19,172,448 UART: [state] CFI Enabled
19,180,920 UART: [fht] FMC Alias Private Key: 7
20,938,027 UART: [art] Extend RT PCRs Done
20,939,252 UART: [art] Lock RT PCRs Done
20,941,200 UART: [art] Populate DV Done
20,946,609 UART: [fht] FMC Alias Private Key: 7
20,948,089 UART: [art] Derive CDI
20,948,848 UART: [art] Store in in slot 0x4
20,991,103 UART: [art] Derive Key Pair
20,992,153 UART: [art] Store priv key in slot 0x5
23,419,551 UART: [art] Derive Key Pair - Done
23,432,488 UART: [art] Signing Cert with AUTHO
23,433,791 UART: RITY.KEYID = 7
25,139,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,006 UART: [art] PUB.X = 971AB41F01A17F05AEFAA0F34311FA70AF1D16FE0162D47E50C8D5AC43D50242631E053CBBA22EA1F88A55E111A4E33B
25,148,295 UART: [art] PUB.Y = 1A4A35117C9D7B2718E86BB328F0B8DDCE95F36AB03A9D20070162134A67D697F76129F9260929D1DD115D6F23DE34A5
25,155,574 UART: [art] SIG.R = 485C309A520E245BB59A4BF39AF5601DD5A98C6067C0B7A6EAE38B03C4046076E7A6B9A2420515E95F3EF7ED04B592D3
25,162,946 UART: [art] SIG.S = 52C7B414E1B242D7D2752A10260AE9E1A3788AD5E4FD1CAD373718D640FFF6A5E2B00FF18E65A6481967090FAB7CFC2A
26,142,207 UART: Caliptra RT
26,142,906 UART: [state] CFI Enabled
26,260,030 UART: [rt] RT listening for mailbox commands...
26,261,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,769 UART: [rt]cmd =0x44504543, len=96
26,324,295 >>> mbox cmd response data (56 bytes)
26,325,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,985 UART: [rt]cmd =0x44504543, len=96
26,387,446 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,759,514 ready_for_fw is high
3,759,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,970,024 >>> mbox cmd response: success
19,222,701 UART:
19,223,118 UART: Running Caliptra FMC ...
19,224,269 UART:
19,224,424 UART: [state] CFI Enabled
19,232,326 UART: [fht] FMC Alias Private Key: 7
20,989,269 UART: [art] Extend RT PCRs Done
20,990,513 UART: [art] Lock RT PCRs Done
20,991,920 UART: [art] Populate DV Done
20,997,383 UART: [fht] FMC Alias Private Key: 7
20,998,970 UART: [art] Derive CDI
20,999,780 UART: [art] Store in in slot 0x4
21,042,263 UART: [art] Derive Key Pair
21,043,308 UART: [art] Store priv key in slot 0x5
23,469,424 UART: [art] Derive Key Pair - Done
23,482,312 UART: [art] Signing Cert with AUTHO
23,483,605 UART: RITY.KEYID = 7
25,189,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,609 UART: [art] PUB.X = AFC68F38D9E5DDB5C855208882D275659CFDD4E8B2281ED50C227508B053D3B08081099ACCA0890F411D1AD21B5871DB
25,197,838 UART: [art] PUB.Y = 6F3FF84345E711DE0E0A9BEA87D1D05F92387086AD5121A2EB7F9C0CAB2CD19FA8C20F93C051145630FF794D462B152B
25,205,131 UART: [art] SIG.R = 205C71DDCC6A475EAB094230A6AF2368751B3E29A533E1D95B9F40CED635CA66470999191D94D463B48BAAD9FA7A3389
25,212,503 UART: [art] SIG.S = EB8A743039355A13E7F5AD9C593DB7D1691294FE7B53F64558FF3108DDA95D0C7EBC30F7CF7C1E4CF3555B19642D2DC4
26,191,517 UART: Caliptra RT
26,192,539 UART: [state] CFI Enabled
26,308,374 UART: [rt] RT listening for mailbox commands...
26,310,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,251 UART: [rt]cmd =0x44504543, len=96
26,372,348 >>> mbox cmd response data (56 bytes)
26,373,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,798 UART: [rt]cmd =0x44504543, len=96
26,435,649 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,220 UART: [kat] SHA2-512-ACC
897,121 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,441 UART: [cold-reset] ++
1,476,921 UART: [fht] Storing FHT @ 0x50003400
1,479,596 UART: [idev] ++
1,479,764 UART: [idev] CDI.KEYID = 6
1,480,124 UART: [idev] SUBJECT.KEYID = 7
1,480,548 UART: [idev] UDS.KEYID = 0
1,480,893 ready_for_fw is high
1,480,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,158 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,440 UART: [idev] --
1,514,325 UART: [ldev] ++
1,514,493 UART: [ldev] CDI.KEYID = 6
1,514,856 UART: [ldev] SUBJECT.KEYID = 5
1,515,282 UART: [ldev] AUTHORITY.KEYID = 7
1,515,745 UART: [ldev] FE.KEYID = 1
1,520,905 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,352 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,682 UART: [fwproc] Received command 0x46574c44
1,587,473 UART: [fwproc] Received Image of size 114448 bytes
2,887,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,384 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,755 >>> mbox cmd response: success
3,080,779 UART: [afmc] ++
3,080,947 UART: [afmc] CDI.KEYID = 6
3,081,309 UART: [afmc] SUBJECT.KEYID = 7
3,081,734 UART: [afmc] AUTHORITY.KEYID = 5
3,117,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,887 UART: [afmc] --
3,160,837 UART: [cold-reset] --
3,161,561 UART: [state] Locking Datavault
3,162,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,252 UART: [state] Locking ICCM
3,163,718 UART: [exit] Launching FMC @ 0x40000130
3,169,047 UART:
3,169,063 UART: Running Caliptra FMC ...
3,169,471 UART:
3,169,525 UART: [state] CFI Enabled
3,179,834 UART: [fht] FMC Alias Private Key: 7
3,287,497 UART: [art] Extend RT PCRs Done
3,287,925 UART: [art] Lock RT PCRs Done
3,289,479 UART: [art] Populate DV Done
3,297,864 UART: [fht] FMC Alias Private Key: 7
3,298,872 UART: [art] Derive CDI
3,299,152 UART: [art] Store in in slot 0x4
3,384,955 UART: [art] Derive Key Pair
3,385,315 UART: [art] Store priv key in slot 0x5
3,398,425 UART: [art] Derive Key Pair - Done
3,413,104 UART: [art] Signing Cert with AUTHO
3,413,584 UART: RITY.KEYID = 7
3,428,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,417 UART: [art] PUB.X = B7CE96D39971DDCDFCDAF1005A239B3AEEBEA493F3F2DD66330724F1133A63F07797F1377C5B07D722FE271039EA8E98
3,436,171 UART: [art] PUB.Y = 9206BB3FBA295181CAAA024FD04DE3F8C0F555CC643ADAE796B697C50CC3EAFFFB1AE7D46099AF824C7324E8E99FB19C
3,443,136 UART: [art] SIG.R = A7CE9787EB391F8FFC1EDC28BB9064724E9C8C059DE1B01170DFCDBD61A0D3F308DB9DEF0CEDE6857A8E07E8B39A1758
3,449,918 UART: [art] SIG.S = 13AD160D6BD86B75C80796AA18891615B97F1739A60B6DDA171B84CD911A471710CD8D92DA3444DE510740509F0E82A0
3,473,570 UART: Caliptra RT
3,473,823 UART: [state] CFI Enabled
3,581,408 UART: [rt] RT listening for mailbox commands...
3,582,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,322 UART: [rt]cmd =0x44504543, len=96
3,645,048 >>> mbox cmd response data (56 bytes)
3,645,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,224 UART: [rt]cmd =0x44504543, len=96
3,707,987 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,169 ready_for_fw is high
1,362,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,777 >>> mbox cmd response: success
2,989,107 UART:
2,989,123 UART: Running Caliptra FMC ...
2,989,531 UART:
2,989,585 UART: [state] CFI Enabled
2,999,746 UART: [fht] FMC Alias Private Key: 7
3,107,831 UART: [art] Extend RT PCRs Done
3,108,259 UART: [art] Lock RT PCRs Done
3,109,683 UART: [art] Populate DV Done
3,117,888 UART: [fht] FMC Alias Private Key: 7
3,118,932 UART: [art] Derive CDI
3,119,212 UART: [art] Store in in slot 0x4
3,204,751 UART: [art] Derive Key Pair
3,205,111 UART: [art] Store priv key in slot 0x5
3,217,819 UART: [art] Derive Key Pair - Done
3,232,912 UART: [art] Signing Cert with AUTHO
3,233,392 UART: RITY.KEYID = 7
3,248,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,563 UART: [art] PUB.X = B64B4EBF1C02F36DE0B1D1DC23F9D91CC1F5F6365D244A56D1C1DF06EAA0B008AB61DFA059D72476889BE1918E70AC57
3,256,342 UART: [art] PUB.Y = 8370521C8CF3E2F1AAA40ECC975DC04DA2186F57F022A91E5BE4CDABECFDCE6C77A77D1CD38E06AB35F2CA891A4D4C16
3,263,314 UART: [art] SIG.R = 4AE4D3F50055CD70AA6F6B4B0C08C2352BBBA8C30AA8307CD3338A981922B3BF63554EDDA80CA4C92B75B7AF802BB022
3,270,066 UART: [art] SIG.S = 4000960FF8D58E14F01137218B6A186EB6F1CB4044243CC886D021A57BB95C424FA609CA3846A56A3887319B3ED50543
3,294,134 UART: Caliptra RT
3,294,387 UART: [state] CFI Enabled
3,402,385 UART: [rt] RT listening for mailbox commands...
3,403,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,481 UART: [rt]cmd =0x44504543, len=96
3,466,001 >>> mbox cmd response data (56 bytes)
3,466,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,763 UART: [rt]cmd =0x44504543, len=96
3,529,272 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
903,057 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,868 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 ready_for_fw is high
1,480,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,504,967 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,573 UART: [idev] --
1,514,658 UART: [ldev] ++
1,514,826 UART: [ldev] CDI.KEYID = 6
1,515,189 UART: [ldev] SUBJECT.KEYID = 5
1,515,615 UART: [ldev] AUTHORITY.KEYID = 7
1,516,078 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,703 UART: [ldev] --
1,587,170 UART: [fwproc] Waiting for Commands...
1,587,873 UART: [fwproc] Received command 0x46574c44
1,588,664 UART: [fwproc] Received Image of size 114448 bytes
2,888,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,687 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,038 >>> mbox cmd response: success
3,081,224 UART: [afmc] ++
3,081,392 UART: [afmc] CDI.KEYID = 6
3,081,754 UART: [afmc] SUBJECT.KEYID = 7
3,082,179 UART: [afmc] AUTHORITY.KEYID = 5
3,117,784 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,004 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,512 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,397 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,087 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,186 UART: [afmc] --
3,161,158 UART: [cold-reset] --
3,162,076 UART: [state] Locking Datavault
3,163,475 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,079 UART: [state] Locking ICCM
3,164,667 UART: [exit] Launching FMC @ 0x40000130
3,169,996 UART:
3,170,012 UART: Running Caliptra FMC ...
3,170,420 UART:
3,170,563 UART: [state] CFI Enabled
3,181,644 UART: [fht] FMC Alias Private Key: 7
3,289,831 UART: [art] Extend RT PCRs Done
3,290,259 UART: [art] Lock RT PCRs Done
3,291,557 UART: [art] Populate DV Done
3,299,768 UART: [fht] FMC Alias Private Key: 7
3,300,722 UART: [art] Derive CDI
3,301,002 UART: [art] Store in in slot 0x4
3,386,735 UART: [art] Derive Key Pair
3,387,095 UART: [art] Store priv key in slot 0x5
3,400,611 UART: [art] Derive Key Pair - Done
3,415,323 UART: [art] Signing Cert with AUTHO
3,415,803 UART: RITY.KEYID = 7
3,430,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,594 UART: [art] PUB.X = 7F293B6971BA3F310393CF91E9E53093A36D1F8E9CD44681F763A62DAE880C79531A7B71C405352430486C5BB070D8F5
3,438,351 UART: [art] PUB.Y = 75192CD80A7C329838DC4225C88073286EBD1F966F54D426883C52249862D858E005AEA567FFBF3DA21B7CEA9D520F3E
3,445,294 UART: [art] SIG.R = 9D59E9C9C2A17D1FD3655FF11EE94D29AF05CB239DAF30A47851F4CA75992E54167AD30E96349900F792A464CFBB3D39
3,452,044 UART: [art] SIG.S = FFEA195DE02BF081D818F2C6CA0A96E5CA7A2A7D045BC1771585ADE1E528F8928B8C39B55482FAA01A1B785D28856880
3,476,129 UART: Caliptra RT
3,476,474 UART: [state] CFI Enabled
3,583,654 UART: [rt] RT listening for mailbox commands...
3,584,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,808 UART: [rt]cmd =0x44504543, len=96
3,647,940 >>> mbox cmd response data (56 bytes)
3,647,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,908 UART: [rt]cmd =0x44504543, len=96
3,710,707 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,704 ready_for_fw is high
1,362,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,770 >>> mbox cmd response: success
2,990,228 UART:
2,990,244 UART: Running Caliptra FMC ...
2,990,652 UART:
2,990,795 UART: [state] CFI Enabled
3,001,508 UART: [fht] FMC Alias Private Key: 7
3,109,945 UART: [art] Extend RT PCRs Done
3,110,373 UART: [art] Lock RT PCRs Done
3,112,027 UART: [art] Populate DV Done
3,120,190 UART: [fht] FMC Alias Private Key: 7
3,121,338 UART: [art] Derive CDI
3,121,618 UART: [art] Store in in slot 0x4
3,207,185 UART: [art] Derive Key Pair
3,207,545 UART: [art] Store priv key in slot 0x5
3,220,879 UART: [art] Derive Key Pair - Done
3,235,594 UART: [art] Signing Cert with AUTHO
3,236,074 UART: RITY.KEYID = 7
3,251,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,893 UART: [art] PUB.X = 638FE1D934824EACCD7F7B88BDBE139692F7C731EC289F01D3AD1548B42C30E639254F2A710752C8413DC803D5697BC3
3,258,658 UART: [art] PUB.Y = 75B202D4412257E7D45FC8A62420ACC0F7432B285E974614E4E895A538CBA6CA2D5988995AA3C4102D586C2443319573
3,265,597 UART: [art] SIG.R = 9AF66EE17DE2522EBE503B185BDA7DA33F77AE591EBFBCFD09AF80DE60603D8EEE254B9B71E80E20218A92CECE103EAF
3,272,389 UART: [art] SIG.S = 6611F329218D2C871973A165F7ABD8490F118651BBC4A85698BB2A0D27F2D7BE8D7A2616E8EC5165064399BE2A9F28D6
3,296,305 UART: Caliptra RT
3,296,650 UART: [state] CFI Enabled
3,405,289 UART: [rt] RT listening for mailbox commands...
3,405,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,223 UART: [rt]cmd =0x44504543, len=96
3,468,525 >>> mbox cmd response data (56 bytes)
3,468,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,713 UART: [rt]cmd =0x44504543, len=96
3,530,850 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,524 UART: [kat] HMAC-384Kdf
923,114 UART: [kat] LMS
1,171,442 UART: [kat] --
1,172,083 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,471 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,496 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,303 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,314 >>> mbox cmd response: success
2,775,342 UART: [afmc] ++
2,775,510 UART: [afmc] CDI.KEYID = 6
2,775,872 UART: [afmc] SUBJECT.KEYID = 7
2,776,297 UART: [afmc] AUTHORITY.KEYID = 5
2,811,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,837 UART: [afmc] --
2,854,829 UART: [cold-reset] --
2,855,665 UART: [state] Locking Datavault
2,856,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,408 UART: [state] Locking ICCM
2,857,830 UART: [exit] Launching FMC @ 0x40000130
2,863,159 UART:
2,863,175 UART: Running Caliptra FMC ...
2,863,583 UART:
2,863,637 UART: [state] CFI Enabled
2,873,818 UART: [fht] FMC Alias Private Key: 7
2,981,493 UART: [art] Extend RT PCRs Done
2,981,921 UART: [art] Lock RT PCRs Done
2,983,203 UART: [art] Populate DV Done
2,991,570 UART: [fht] FMC Alias Private Key: 7
2,992,538 UART: [art] Derive CDI
2,992,818 UART: [art] Store in in slot 0x4
3,078,071 UART: [art] Derive Key Pair
3,078,431 UART: [art] Store priv key in slot 0x5
3,091,393 UART: [art] Derive Key Pair - Done
3,106,048 UART: [art] Signing Cert with AUTHO
3,106,528 UART: RITY.KEYID = 7
3,121,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,329 UART: [art] PUB.X = 762AC1950DA51AE7C3241FB81DD20A15439E290D31622874FC383FBF27A167468B3405181CDD89F1800677FBE05C8665
3,129,080 UART: [art] PUB.Y = 10C3661439E28D5EC7D4DE83BE39F432A51B37A75603AC21AAF3ED292F2721388BF7F4CBBAD88677959F8E5667E5907F
3,136,033 UART: [art] SIG.R = F348D282F6B249E496FD456F3D5FE45DE9DECAF69C0B663B8D57A405A8C54D1E3B3351513636AA1F5118B487EB39F5ED
3,142,809 UART: [art] SIG.S = E49D4587C26335F85CA3DF729E30A2F2D7A3D42ED411CD871AE0B85F699D13E5097ADD511AB567A6A32ECF426FFB6764
3,166,669 UART: Caliptra RT
3,166,922 UART: [state] CFI Enabled
3,275,186 UART: [rt] RT listening for mailbox commands...
3,275,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,144 UART: [rt]cmd =0x44504543, len=96
3,338,544 >>> mbox cmd response data (56 bytes)
3,338,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,524 UART: [rt]cmd =0x44504543, len=96
3,402,169 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,271 >>> mbox cmd response: success
2,688,831 UART:
2,688,847 UART: Running Caliptra FMC ...
2,689,255 UART:
2,689,309 UART: [state] CFI Enabled
2,699,792 UART: [fht] FMC Alias Private Key: 7
2,807,011 UART: [art] Extend RT PCRs Done
2,807,439 UART: [art] Lock RT PCRs Done
2,809,065 UART: [art] Populate DV Done
2,817,324 UART: [fht] FMC Alias Private Key: 7
2,818,268 UART: [art] Derive CDI
2,818,548 UART: [art] Store in in slot 0x4
2,904,449 UART: [art] Derive Key Pair
2,904,809 UART: [art] Store priv key in slot 0x5
2,918,857 UART: [art] Derive Key Pair - Done
2,933,688 UART: [art] Signing Cert with AUTHO
2,934,168 UART: RITY.KEYID = 7
2,949,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,431 UART: [art] PUB.X = C5A10D8BCCA43612B2F16ECFE617385F838E34F04E0B5E2D72A508CE449FED8ACDC37BBA1769F572BC99467F7051B515
2,957,206 UART: [art] PUB.Y = 4E5301C2B773D005AABDDFF5DB9D7F19F9C62C8B72E7F223B838164E0E9F4DEAF2AE57F680F891EE6E2F6AEE890A885C
2,964,166 UART: [art] SIG.R = 91B514D716462C823DB0C522D8BFC206F0178BFD2F5ACAECED02850DAFBF93A6F77083C1EBF896E6B908E6B532BF7C1A
2,970,944 UART: [art] SIG.S = 084B728E5222DAFF15BA82BCD0E302580F48148677916B3438D19C1116B0F79F7F41B37629B3F77546C85BE78D7D00F2
2,994,416 UART: Caliptra RT
2,994,669 UART: [state] CFI Enabled
3,102,454 UART: [rt] RT listening for mailbox commands...
3,103,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,724 UART: [rt]cmd =0x44504543, len=96
3,165,860 >>> mbox cmd response data (56 bytes)
3,165,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,858 UART: [rt]cmd =0x44504543, len=96
3,227,715 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,144 UART: [kat] SHA2-256
904,084 UART: [kat] SHA2-384
906,831 UART: [kat] SHA2-512-ACC
908,732 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,497 UART: [kat] LMS
1,170,825 UART: [kat] --
1,171,748 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,989 UART: [idev] ++
1,175,157 UART: [idev] CDI.KEYID = 6
1,175,517 UART: [idev] SUBJECT.KEYID = 7
1,175,941 UART: [idev] UDS.KEYID = 0
1,176,286 ready_for_fw is high
1,176,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,127 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,210,084 UART: [idev] --
1,211,180 UART: [ldev] ++
1,211,348 UART: [ldev] CDI.KEYID = 6
1,211,711 UART: [ldev] SUBJECT.KEYID = 5
1,212,137 UART: [ldev] AUTHORITY.KEYID = 7
1,212,600 UART: [ldev] FE.KEYID = 1
1,217,776 UART: [ldev] Erasing FE.KEYID = 1
1,244,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,144 UART: [ldev] --
1,283,421 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,265 >>> mbox cmd response: success
2,777,397 UART: [afmc] ++
2,777,565 UART: [afmc] CDI.KEYID = 6
2,777,927 UART: [afmc] SUBJECT.KEYID = 7
2,778,352 UART: [afmc] AUTHORITY.KEYID = 5
2,813,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,932 UART: [afmc] --
2,857,054 UART: [cold-reset] --
2,857,812 UART: [state] Locking Datavault
2,859,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,671 UART: [state] Locking ICCM
2,860,213 UART: [exit] Launching FMC @ 0x40000130
2,865,542 UART:
2,865,558 UART: Running Caliptra FMC ...
2,865,966 UART:
2,866,109 UART: [state] CFI Enabled
2,876,728 UART: [fht] FMC Alias Private Key: 7
2,985,227 UART: [art] Extend RT PCRs Done
2,985,655 UART: [art] Lock RT PCRs Done
2,987,155 UART: [art] Populate DV Done
2,995,144 UART: [fht] FMC Alias Private Key: 7
2,996,252 UART: [art] Derive CDI
2,996,532 UART: [art] Store in in slot 0x4
3,082,125 UART: [art] Derive Key Pair
3,082,485 UART: [art] Store priv key in slot 0x5
3,095,795 UART: [art] Derive Key Pair - Done
3,110,652 UART: [art] Signing Cert with AUTHO
3,111,132 UART: RITY.KEYID = 7
3,126,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,951 UART: [art] PUB.X = D40AC89B24D3E35898D45D0A6DCA04496F825DBE6AB8A124D5FA65FCD77558A903F85EFF3417060C3CD7989A3CF9D30B
3,133,714 UART: [art] PUB.Y = 6B2D18B1900A5366DA8C100AE6BBA2C324116A1A3EE94F8826D482646729EAE78C5334F55DAFB162AF93DD6C182B1ED8
3,140,668 UART: [art] SIG.R = 238D8733F21115E3024529E04361FDEBFB0F1DDB0B8D036AD60E660CEDD16E6CAE6EEDC7CB74E13D0C4F0E8BD43D61CB
3,147,438 UART: [art] SIG.S = 890FC74F5631586CE75B1B862AB9B6178145ED2EC9F2F67FE6ED36C7D7C912EF93E3A91287FA392EAA65CA2B91B63CF1
3,170,830 UART: Caliptra RT
3,171,175 UART: [state] CFI Enabled
3,279,810 UART: [rt] RT listening for mailbox commands...
3,280,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,734 UART: [rt]cmd =0x44504543, len=96
3,343,418 >>> mbox cmd response data (56 bytes)
3,343,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,374 UART: [rt]cmd =0x44504543, len=96
3,405,923 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,262 ready_for_fw is high
1,061,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,886 >>> mbox cmd response: success
2,692,010 UART:
2,692,026 UART: Running Caliptra FMC ...
2,692,434 UART:
2,692,577 UART: [state] CFI Enabled
2,702,946 UART: [fht] FMC Alias Private Key: 7
2,811,023 UART: [art] Extend RT PCRs Done
2,811,451 UART: [art] Lock RT PCRs Done
2,812,861 UART: [art] Populate DV Done
2,821,004 UART: [fht] FMC Alias Private Key: 7
2,822,140 UART: [art] Derive CDI
2,822,420 UART: [art] Store in in slot 0x4
2,907,645 UART: [art] Derive Key Pair
2,908,005 UART: [art] Store priv key in slot 0x5
2,921,367 UART: [art] Derive Key Pair - Done
2,935,783 UART: [art] Signing Cert with AUTHO
2,936,263 UART: RITY.KEYID = 7
2,951,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,168 UART: [art] PUB.X = D6FC3BAE026F256CF0F40B85FA88B035A227BCDECBED6874A25375E1DA257EEC8E7BD2FA0F12D2704526BCAB41F7009E
2,958,931 UART: [art] PUB.Y = 47174B9DD68EBB520D5F73E68D19449EC132D4D776D8957F7126EE45D766390AF26CE79236EDFC7177DCEF0961BF39C1
2,965,878 UART: [art] SIG.R = 231CF26C4ADC4FE1A4EBA1BCF08542A8A4EC9D2DD464208B4D6B10183E0B35C4E93B825B786C45F4B8ACB7A8D6868C96
2,972,663 UART: [art] SIG.S = AF49B1466DBE993B48DF579FB73006E388FF3D5C0E63F34B3CDF03CF0A63F3477C36EFB56A5AD58E83BBE87EB499AAF6
2,996,020 UART: Caliptra RT
2,996,365 UART: [state] CFI Enabled
3,104,554 UART: [rt] RT listening for mailbox commands...
3,105,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,668 UART: [rt]cmd =0x44504543, len=96
3,168,338 >>> mbox cmd response data (56 bytes)
3,168,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,412 UART: [rt]cmd =0x44504543, len=96
3,231,397 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,200 UART: [kat] SHA2-256
890,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,879 UART: [kat] ++
895,031 UART: [kat] sha1
899,253 UART: [kat] SHA2-256
901,193 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
914,972 UART: [kat] HMAC-384Kdf
919,680 UART: [kat] LMS
1,167,992 UART: [kat] --
1,168,909 UART: [cold-reset] ++
1,169,267 UART: [fht] FHT @ 0x50003400
1,171,781 UART: [idev] ++
1,171,949 UART: [idev] CDI.KEYID = 6
1,172,310 UART: [idev] SUBJECT.KEYID = 7
1,172,735 UART: [idev] UDS.KEYID = 0
1,173,081 ready_for_fw is high
1,173,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,115 UART: [idev] Erasing UDS.KEYID = 0
1,197,727 UART: [idev] Sha1 KeyId Algorithm
1,206,545 UART: [idev] --
1,207,520 UART: [ldev] ++
1,207,688 UART: [ldev] CDI.KEYID = 6
1,208,052 UART: [ldev] SUBJECT.KEYID = 5
1,208,479 UART: [ldev] AUTHORITY.KEYID = 7
1,208,942 UART: [ldev] FE.KEYID = 1
1,214,226 UART: [ldev] Erasing FE.KEYID = 1
1,240,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,532 UART: [ldev] --
1,279,876 UART: [fwproc] Wait for Commands...
1,280,447 UART: [fwproc] Recv command 0x46574c44
1,281,180 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,537 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,956 >>> mbox cmd response: success
2,772,979 UART: [afmc] ++
2,773,147 UART: [afmc] CDI.KEYID = 6
2,773,510 UART: [afmc] SUBJECT.KEYID = 7
2,773,936 UART: [afmc] AUTHORITY.KEYID = 5
2,809,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,662 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,381 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,296 UART: [afmc] --
2,852,190 UART: [cold-reset] --
2,853,030 UART: [state] Locking Datavault
2,854,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,655 UART: [state] Locking ICCM
2,855,099 UART: [exit] Launching FMC @ 0x40000130
2,860,428 UART:
2,860,444 UART: Running Caliptra FMC ...
2,860,852 UART:
2,860,906 UART: [state] CFI Enabled
2,871,145 UART: [fht] FMC Alias Private Key: 7
2,979,376 UART: [art] Extend RT PCRs Done
2,979,804 UART: [art] Lock RT PCRs Done
2,981,280 UART: [art] Populate DV Done
2,989,621 UART: [fht] FMC Alias Private Key: 7
2,990,687 UART: [art] Derive CDI
2,990,967 UART: [art] Store in in slot 0x4
3,076,548 UART: [art] Derive Key Pair
3,076,908 UART: [art] Store priv key in slot 0x5
3,090,646 UART: [art] Derive Key Pair - Done
3,105,492 UART: [art] Signing Cert with AUTHO
3,105,972 UART: RITY.KEYID = 7
3,120,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,725 UART: [art] PUB.X = EC7BB9C15BC0388F51BF01B53717BBE72DC7A52AB763EE8FA15BA66D1A20989BABA5C167E182CACBEBEE89AE5121EF14
3,128,520 UART: [art] PUB.Y = 448DA8A09B0C14B89A91DBD8A8063401C2449E9CD1733CBD68F83DDEA0B30CC24673B41F522D55B22DF0E821E4CE6FBF
3,135,474 UART: [art] SIG.R = D929264E1F927F910B652A2971A31B236426EF07E7465CCC74F1570FD412482F9F1B915821F6D8EBE70233384178D577
3,142,222 UART: [art] SIG.S = 0B0F5BA96E02708FE6ACBC636F2790E79B5FFE0AE7BE580680DAD4DEBAF5D1EC2B1F7146AB895684E5421E76AF8D6D2B
3,165,672 UART: Caliptra RT
3,165,925 UART: [state] CFI Enabled
3,272,722 UART: [rt] RT listening for mailbox commands...
3,273,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,792 UART: [rt]cmd =0x44504543, len=96
3,336,280 >>> mbox cmd response data (56 bytes)
3,336,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,012 UART: [rt]cmd =0x44504543, len=96
3,398,937 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,516 ready_for_fw is high
1,056,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,808 >>> mbox cmd response: success
2,686,738 UART:
2,686,754 UART: Running Caliptra FMC ...
2,687,162 UART:
2,687,216 UART: [state] CFI Enabled
2,697,695 UART: [fht] FMC Alias Private Key: 7
2,805,472 UART: [art] Extend RT PCRs Done
2,805,900 UART: [art] Lock RT PCRs Done
2,807,382 UART: [art] Populate DV Done
2,815,517 UART: [fht] FMC Alias Private Key: 7
2,816,691 UART: [art] Derive CDI
2,816,971 UART: [art] Store in in slot 0x4
2,902,436 UART: [art] Derive Key Pair
2,902,796 UART: [art] Store priv key in slot 0x5
2,916,292 UART: [art] Derive Key Pair - Done
2,931,130 UART: [art] Signing Cert with AUTHO
2,931,610 UART: RITY.KEYID = 7
2,946,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,519 UART: [art] PUB.X = 997A93B2216D44A5F918800EA73F9B6E16C2D7BE7ABAF66FCF32FB55FAB71A2465BF9AE81BBE489ADF273642B237AB65
2,954,304 UART: [art] PUB.Y = 7E5CDF2CFF5A79D93DE2C75912A4A9EC62021000E0276B20DD816E63A47406161CBCEF91753DE688873B32FD6FBE0333
2,961,231 UART: [art] SIG.R = 25A2BFB58FF088D3371DC8778AA6C68AEEC88250FA895E3778B560819EDE6409843E0EE2CB03527A932A5515DEA464B9
2,967,998 UART: [art] SIG.S = 0C4165FBF3FAECA1548BEE889D9D12852DADB4BB70043163B8FB7192DA14D7FFFCA5C886B986920995860A04B9456DE1
2,992,130 UART: Caliptra RT
2,992,383 UART: [state] CFI Enabled
3,099,812 UART: [rt] RT listening for mailbox commands...
3,100,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,074 UART: [rt]cmd =0x44504543, len=96
3,163,534 >>> mbox cmd response data (56 bytes)
3,163,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,608 UART: [rt]cmd =0x44504543, len=96
3,226,389 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,174,232 ready_for_fw is high
1,174,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,875 UART: [ldev] SUBJECT.KEYID = 5
1,210,302 UART: [ldev] AUTHORITY.KEYID = 7
1,210,765 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,445 UART: [fwproc] Wait for Commands...
1,282,042 UART: [fwproc] Recv command 0x46574c44
1,282,775 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,611 >>> mbox cmd response: success
2,775,848 UART: [afmc] ++
2,776,016 UART: [afmc] CDI.KEYID = 6
2,776,379 UART: [afmc] SUBJECT.KEYID = 7
2,776,805 UART: [afmc] AUTHORITY.KEYID = 5
2,811,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,553 UART: [afmc] --
2,855,437 UART: [cold-reset] --
2,856,297 UART: [state] Locking Datavault
2,857,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,078 UART: [state] Locking ICCM
2,858,540 UART: [exit] Launching FMC @ 0x40000130
2,863,869 UART:
2,863,885 UART: Running Caliptra FMC ...
2,864,293 UART:
2,864,436 UART: [state] CFI Enabled
2,874,759 UART: [fht] FMC Alias Private Key: 7
2,982,378 UART: [art] Extend RT PCRs Done
2,982,806 UART: [art] Lock RT PCRs Done
2,984,558 UART: [art] Populate DV Done
2,992,487 UART: [fht] FMC Alias Private Key: 7
2,993,597 UART: [art] Derive CDI
2,993,877 UART: [art] Store in in slot 0x4
3,079,682 UART: [art] Derive Key Pair
3,080,042 UART: [art] Store priv key in slot 0x5
3,093,840 UART: [art] Derive Key Pair - Done
3,108,556 UART: [art] Signing Cert with AUTHO
3,109,036 UART: RITY.KEYID = 7
3,124,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,989 UART: [art] PUB.X = CF30D2BCF2CA402FB1C509744ED18E309E64AA66DB8277F60883E6BAF772B54EA12DA12AF6AC1CECD1A470D67F77AB48
3,131,775 UART: [art] PUB.Y = 64648FD0B636A9C6214035B9D366FC1D4E18CAC9F823BCC51C7CD4E672556AB066A0A61D47E86F21F9F372AB624239E7
3,138,731 UART: [art] SIG.R = 15024612196B03053A8913B5D8A87B3BFB515DE20952EE6C863C8536701A920DAAB1E81DA130B872463BE712E5151709
3,145,475 UART: [art] SIG.S = 81E3FDF4387BFA1F9EE47A60CDC40CB3F27CA9CC2F044CF75A6A6E04DF78ECFBFA6FB3FB8E2E41CBF61B837C0FE45072
3,169,146 UART: Caliptra RT
3,169,491 UART: [state] CFI Enabled
3,278,200 UART: [rt] RT listening for mailbox commands...
3,278,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,980 UART: [rt]cmd =0x44504543, len=96
3,341,366 >>> mbox cmd response data (56 bytes)
3,341,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,140 UART: [rt]cmd =0x44504543, len=96
3,404,281 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,339 ready_for_fw is high
1,056,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,225 >>> mbox cmd response: success
2,686,701 UART:
2,686,717 UART: Running Caliptra FMC ...
2,687,125 UART:
2,687,268 UART: [state] CFI Enabled
2,697,489 UART: [fht] FMC Alias Private Key: 7
2,805,356 UART: [art] Extend RT PCRs Done
2,805,784 UART: [art] Lock RT PCRs Done
2,807,194 UART: [art] Populate DV Done
2,815,097 UART: [fht] FMC Alias Private Key: 7
2,816,063 UART: [art] Derive CDI
2,816,343 UART: [art] Store in in slot 0x4
2,901,922 UART: [art] Derive Key Pair
2,902,282 UART: [art] Store priv key in slot 0x5
2,915,634 UART: [art] Derive Key Pair - Done
2,930,408 UART: [art] Signing Cert with AUTHO
2,930,888 UART: RITY.KEYID = 7
2,946,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,309 UART: [art] PUB.X = 381FE75C9067CC289B81CCA1B778F137785D2A46CB1B6BAB7B01A049308F561E0F24D5F777A4F74E75FCBFE12E0E554D
2,954,082 UART: [art] PUB.Y = 2282D838F7C9DD430974AA1A51608E611D99B3B9206C3F3C3742674DE0DA9B113DF614DA4E07432C69C32AEA63B20CC5
2,961,027 UART: [art] SIG.R = DA8263B23969169BA3F914ADEDA28F7DA3FED15D5BCB4A06816E1D305E2251261A86E32B8F94636664CF18EC9B2AFF0F
2,967,805 UART: [art] SIG.S = D2779EBB150D03C9485B5F0C88BAB5CABB2F3AF27CD0481787272BF6586242A219D8D71A6A45D3EE4803364B993FA77F
2,991,434 UART: Caliptra RT
2,991,779 UART: [state] CFI Enabled
3,100,411 UART: [rt] RT listening for mailbox commands...
3,101,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,337 UART: [rt]cmd =0x44504543, len=96
3,163,677 >>> mbox cmd response data (56 bytes)
3,163,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,599 UART: [rt]cmd =0x44504543, len=96
3,226,710 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,009 UART:
192,569 UART: Running Caliptra ROM ...
193,738 UART:
193,883 UART: [state] CFI Enabled
265,476 UART: [state] LifecycleState = Unprovisioned
267,468 UART: [state] DebugLocked = No
268,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,293 UART: [kat] SHA2-256
443,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,496 UART: [kat] ++
454,942 UART: [kat] sha1
465,317 UART: [kat] SHA2-256
468,037 UART: [kat] SHA2-384
473,674 UART: [kat] SHA2-512-ACC
476,038 UART: [kat] ECC-384
2,768,757 UART: [kat] HMAC-384Kdf
2,800,450 UART: [kat] LMS
3,990,751 UART: [kat] --
3,994,694 UART: [cold-reset] ++
3,996,700 UART: [fht] Storing FHT @ 0x50003400
4,009,171 UART: [idev] ++
4,009,738 UART: [idev] CDI.KEYID = 6
4,010,697 UART: [idev] SUBJECT.KEYID = 7
4,011,943 UART: [idev] UDS.KEYID = 0
4,012,906 ready_for_fw is high
4,013,110 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,729 UART: [idev] Erasing UDS.KEYID = 0
7,344,424 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,336 UART: [idev] --
7,370,278 UART: [ldev] ++
7,370,849 UART: [ldev] CDI.KEYID = 6
7,371,788 UART: [ldev] SUBJECT.KEYID = 5
7,372,997 UART: [ldev] AUTHORITY.KEYID = 7
7,374,281 UART: [ldev] FE.KEYID = 1
7,422,873 UART: [ldev] Erasing FE.KEYID = 1
10,755,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,739 UART: [ldev] --
13,135,326 UART: [fwproc] Waiting for Commands...
13,138,062 UART: [fwproc] Received command 0x46574c44
13,140,243 UART: [fwproc] Received Image of size 114124 bytes
17,188,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,653,663 >>> mbox cmd response: success
17,658,173 UART: [afmc] ++
17,658,775 UART: [afmc] CDI.KEYID = 6
17,659,734 UART: [afmc] SUBJECT.KEYID = 7
17,660,954 UART: [afmc] AUTHORITY.KEYID = 5
21,027,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,063 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,368 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,750 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,606 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,039 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,534 UART: [afmc] --
23,397,012 UART: [cold-reset] --
23,400,013 UART: [state] Locking Datavault
23,404,562 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,312 UART: [state] Locking ICCM
23,408,597 UART: [exit] Launching FMC @ 0x40000130
23,416,990 UART:
23,417,229 UART: Running Caliptra FMC ...
23,418,275 UART:
23,418,430 UART: [state] CFI Enabled
23,486,651 UART: [fht] FMC Alias Private Key: 7
25,824,454 UART: [art] Extend RT PCRs Done
25,825,671 UART: [art] Lock RT PCRs Done
25,827,272 UART: [art] Populate DV Done
25,832,760 UART: [fht] FMC Alias Private Key: 7
25,834,349 UART: [art] Derive CDI
25,835,109 UART: [art] Store in in slot 0x4
25,894,635 UART: [art] Derive Key Pair
25,895,678 UART: [art] Store priv key in slot 0x5
29,188,330 UART: [art] Derive Key Pair - Done
29,201,011 UART: [art] Signing Cert with AUTHO
29,202,327 UART: RITY.KEYID = 7
31,489,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,922 UART: [art] PUB.X = 254E72A8F1F640DCD4A23FC3397CCEA031FED148C91C7030423AC973B27DFD9AFD5D208246FCD1AAD3FE615874826923
31,498,196 UART: [art] PUB.Y = 66267FE870F3DBD07A17CA2465483FA6263F2E7012FA9D35721347053DFC24F5A3FAFBC067BF2F7D06BA729B2BD0B384
31,505,433 UART: [art] SIG.R = 5A9078477683A26045690E8243D6A6D4BF4B5D3644437E18EF94603368DEDA753D39AE4E71064D22BFD92287D2D619B4
31,512,788 UART: [art] SIG.S = 0EE110466B73A9E208CC4BDC6B3A105AC5DD535D6B2A222B378A925FD23C308FA1BF9D7BA1E9D7408941204B894F95A3
32,818,262 UART: Caliptra RT
32,818,973 UART: [state] CFI Enabled
32,979,138 UART: [rt] RT listening for mailbox commands...
32,981,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,010,770 UART: [rt]cmd =0x44504543, len=24
33,053,198 >>> mbox cmd response data (40 bytes)
33,054,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,084,981 UART: [rt]cmd =0x44504543, len=96
33,091,316 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,785,108 ready_for_fw is high
3,785,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,846,872 >>> mbox cmd response: success
23,538,747 UART:
23,539,133 UART: Running Caliptra FMC ...
23,540,275 UART:
23,540,435 UART: [state] CFI Enabled
23,608,406 UART: [fht] FMC Alias Private Key: 7
25,946,846 UART: [art] Extend RT PCRs Done
25,948,067 UART: [art] Lock RT PCRs Done
25,949,778 UART: [art] Populate DV Done
25,955,196 UART: [fht] FMC Alias Private Key: 7
25,956,839 UART: [art] Derive CDI
25,957,664 UART: [art] Store in in slot 0x4
26,018,922 UART: [art] Derive Key Pair
26,019,923 UART: [art] Store priv key in slot 0x5
29,312,208 UART: [art] Derive Key Pair - Done
29,324,911 UART: [art] Signing Cert with AUTHO
29,326,219 UART: RITY.KEYID = 7
31,613,940 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,449 UART: [art] PUB.X = 83E6EF2635FDC1549B14DB0A2DB3B1F1E20EFDB531F49A2DB111623E996885A3F99DACA7415533D370721A7EF3D3964D
31,622,700 UART: [art] PUB.Y = FA8F4AEAD10FE11ABC5A5468FC7611F584FB29B0CA1B9FFD3D1E538EA6C083A5894981A6235D4242CECEB341C15CD05E
31,629,934 UART: [art] SIG.R = F98338EBE92CB3E428F2707DE00035EADC7E47C07A1ABFA02A5D19FE2D247C888893D203623F1E181588615AA4F968DE
31,637,442 UART: [art] SIG.S = 2ED7B2951A87C4D08B850D591153A90A054FB7D51CB6ABA312602A24FC39E727ABC51F0F89A853482ED8BD5C5A397457
32,942,586 UART: Caliptra RT
32,943,296 UART: [state] CFI Enabled
33,104,673 UART: [rt] RT listening for mailbox commands...
33,106,599 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,136,693 UART: [rt]cmd =0x44504543, len=24
33,178,331 >>> mbox cmd response data (40 bytes)
33,179,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,210,466 UART: [rt]cmd =0x44504543, len=96
33,216,938 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,219 UART:
192,586 UART: Running Caliptra ROM ...
193,705 UART:
603,563 UART: [state] CFI Enabled
617,588 UART: [state] LifecycleState = Unprovisioned
619,463 UART: [state] DebugLocked = No
620,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,192 UART: [kat] SHA2-256
795,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,547 UART: [kat] ++
806,991 UART: [kat] sha1
818,562 UART: [kat] SHA2-256
821,280 UART: [kat] SHA2-384
826,837 UART: [kat] SHA2-512-ACC
829,208 UART: [kat] ECC-384
3,115,588 UART: [kat] HMAC-384Kdf
3,126,624 UART: [kat] LMS
4,316,746 UART: [kat] --
4,321,913 UART: [cold-reset] ++
4,323,060 UART: [fht] Storing FHT @ 0x50003400
4,333,681 UART: [idev] ++
4,334,311 UART: [idev] CDI.KEYID = 6
4,335,372 UART: [idev] SUBJECT.KEYID = 7
4,336,473 UART: [idev] UDS.KEYID = 0
4,337,606 ready_for_fw is high
4,337,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,127 UART: [idev] Erasing UDS.KEYID = 0
7,627,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,820 UART: [idev] --
7,655,110 UART: [ldev] ++
7,655,678 UART: [ldev] CDI.KEYID = 6
7,656,640 UART: [ldev] SUBJECT.KEYID = 5
7,657,844 UART: [ldev] AUTHORITY.KEYID = 7
7,659,068 UART: [ldev] FE.KEYID = 1
7,669,365 UART: [ldev] Erasing FE.KEYID = 1
10,959,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,190 UART: [ldev] --
13,318,612 UART: [fwproc] Waiting for Commands...
13,321,832 UART: [fwproc] Received command 0x46574c44
13,324,006 UART: [fwproc] Received Image of size 114124 bytes
17,378,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,323 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,037 >>> mbox cmd response: success
17,842,088 UART: [afmc] ++
17,842,739 UART: [afmc] CDI.KEYID = 6
17,843,643 UART: [afmc] SUBJECT.KEYID = 7
17,844,857 UART: [afmc] AUTHORITY.KEYID = 5
21,158,223 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,543 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,862 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,213 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,070 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,504 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,995 UART: [afmc] --
23,524,972 UART: [cold-reset] --
23,528,615 UART: [state] Locking Datavault
23,532,236 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,987 UART: [state] Locking ICCM
23,535,860 UART: [exit] Launching FMC @ 0x40000130
23,544,248 UART:
23,544,480 UART: Running Caliptra FMC ...
23,545,594 UART:
23,545,754 UART: [state] CFI Enabled
23,553,825 UART: [fht] FMC Alias Private Key: 7
25,884,631 UART: [art] Extend RT PCRs Done
25,885,850 UART: [art] Lock RT PCRs Done
25,887,794 UART: [art] Populate DV Done
25,893,425 UART: [fht] FMC Alias Private Key: 7
25,895,017 UART: [art] Derive CDI
25,895,829 UART: [art] Store in in slot 0x4
25,938,905 UART: [art] Derive Key Pair
25,939,942 UART: [art] Store priv key in slot 0x5
29,181,991 UART: [art] Derive Key Pair - Done
29,195,255 UART: [art] Signing Cert with AUTHO
29,196,585 UART: RITY.KEYID = 7
31,475,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,219 UART: [art] PUB.X = 2C182706D602EB69A2AF739552A61A1615F6AA3A12D854898B6A41EE85F3E7985D8B9FE258E7463F8E811DD88C02599E
31,484,466 UART: [art] PUB.Y = 237B19863175530AACB6101AAA82DE7BEDB3F408F85C78FB6FE208B7408928455BB72D33A788918A36680C470B43F631
31,491,683 UART: [art] SIG.R = 3C85ED703677DA49A62B4E566EEDE821425180FCCF2B3233ABE83E6803633F8CD8E5B2CACDF6E46610652D5A6A31BD10
31,499,057 UART: [art] SIG.S = F23EF4909CC3DA348DA9434E8FC18968CAAFA804A8216D2D19D50B04F134BDA43063DEFD47F0FEFEBD63E4DFCF6B1DA9
32,804,455 UART: Caliptra RT
32,805,161 UART: [state] CFI Enabled
32,923,223 UART: [rt] RT listening for mailbox commands...
32,925,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,955,156 UART: [rt]cmd =0x44504543, len=24
32,981,486 >>> mbox cmd response data (40 bytes)
32,982,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,013,538 UART: [rt]cmd =0x44504543, len=96
33,020,008 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,126,043 ready_for_fw is high
4,126,677 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,877 >>> mbox cmd response: success
23,717,820 UART:
23,718,199 UART: Running Caliptra FMC ...
23,719,316 UART:
23,719,471 UART: [state] CFI Enabled
23,727,210 UART: [fht] FMC Alias Private Key: 7
26,057,873 UART: [art] Extend RT PCRs Done
26,059,124 UART: [art] Lock RT PCRs Done
26,060,619 UART: [art] Populate DV Done
26,065,875 UART: [fht] FMC Alias Private Key: 7
26,067,577 UART: [art] Derive CDI
26,068,314 UART: [art] Store in in slot 0x4
26,110,799 UART: [art] Derive Key Pair
26,111,796 UART: [art] Store priv key in slot 0x5
29,353,712 UART: [art] Derive Key Pair - Done
29,367,196 UART: [art] Signing Cert with AUTHO
29,368,500 UART: RITY.KEYID = 7
31,647,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,082 UART: [art] PUB.X = 2C7D777E55EAA8A60583A92A9CF60220F4D39A9C0B86B9B58EF1B3CE1C269C425DF1BC8A1A90537AEA1CAE298FEB7BF0
31,656,368 UART: [art] PUB.Y = D2322A37B104CC6E93D54E917887944FF2A9A89A97A1C0E0EC43B6701E298C079B19F26267D231DA2D73CB19705C0CC2
31,663,574 UART: [art] SIG.R = 5F3CD2895853FFF251FF4ED31E2EB8559FA97AFAC9184B57133E05DEE1D4154978B562B9582CEB9B0FA3BB3B716F82AE
31,670,955 UART: [art] SIG.S = E8ED4B146764C79B172203728C0A35ADA8B1AE8693E011F70030B2BE9BAA5ACA0F2F8EA5E5005DC57DFB78BB329A4245
32,976,849 UART: Caliptra RT
32,977,583 UART: [state] CFI Enabled
33,095,676 UART: [rt] RT listening for mailbox commands...
33,097,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,127,526 UART: [rt]cmd =0x44504543, len=24
33,153,928 >>> mbox cmd response data (40 bytes)
33,155,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,185,910 UART: [rt]cmd =0x44504543, len=96
33,192,248 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,091 UART:
192,464 UART: Running Caliptra ROM ...
193,659 UART:
193,817 UART: [state] CFI Enabled
263,309 UART: [state] LifecycleState = Unprovisioned
265,186 UART: [state] DebugLocked = No
267,294 UART: [state] WD Timer not started. Device not locked for debugging
270,760 UART: [kat] SHA2-256
449,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,471 UART: [kat] ++
462,004 UART: [kat] sha1
472,681 UART: [kat] SHA2-256
475,686 UART: [kat] SHA2-384
483,021 UART: [kat] SHA2-512-ACC
485,918 UART: [kat] ECC-384
2,950,029 UART: [kat] HMAC-384Kdf
2,970,883 UART: [kat] LMS
3,500,316 UART: [kat] --
3,504,597 UART: [cold-reset] ++
3,506,596 UART: [fht] FHT @ 0x50003400
3,518,008 UART: [idev] ++
3,518,593 UART: [idev] CDI.KEYID = 6
3,519,556 UART: [idev] SUBJECT.KEYID = 7
3,520,739 UART: [idev] UDS.KEYID = 0
3,521,665 ready_for_fw is high
3,521,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,807 UART: [idev] Erasing UDS.KEYID = 0
6,027,181 UART: [idev] Sha1 KeyId Algorithm
6,050,517 UART: [idev] --
6,054,305 UART: [ldev] ++
6,054,870 UART: [ldev] CDI.KEYID = 6
6,055,813 UART: [ldev] SUBJECT.KEYID = 5
6,056,974 UART: [ldev] AUTHORITY.KEYID = 7
6,058,264 UART: [ldev] FE.KEYID = 1
6,099,200 UART: [ldev] Erasing FE.KEYID = 1
8,602,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,752 UART: [ldev] --
10,412,897 UART: [fwproc] Wait for Commands...
10,414,514 UART: [fwproc] Recv command 0x46574c44
10,416,559 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,278,176 >>> mbox cmd response: success
14,283,358 UART: [afmc] ++
14,283,952 UART: [afmc] CDI.KEYID = 6
14,284,864 UART: [afmc] SUBJECT.KEYID = 7
14,286,031 UART: [afmc] AUTHORITY.KEYID = 5
16,826,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,309 UART: [afmc] --
18,629,197 UART: [cold-reset] --
18,633,003 UART: [state] Locking Datavault
18,635,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,419 UART: [state] Locking ICCM
18,638,628 UART: [exit] Launching FMC @ 0x40000130
18,647,037 UART:
18,647,316 UART: Running Caliptra FMC ...
18,648,422 UART:
18,648,585 UART: [state] CFI Enabled
18,710,564 UART: [fht] FMC Alias Private Key: 7
20,474,429 UART: [art] Extend RT PCRs Done
20,475,631 UART: [art] Lock RT PCRs Done
20,476,980 UART: [art] Populate DV Done
20,482,446 UART: [fht] FMC Alias Private Key: 7
20,483,924 UART: [art] Derive CDI
20,485,284 UART: [art] Store in in slot 0x4
20,543,105 UART: [art] Derive Key Pair
20,544,109 UART: [art] Store priv key in slot 0x5
23,007,267 UART: [art] Derive Key Pair - Done
23,020,271 UART: [art] Signing Cert with AUTHO
23,021,581 UART: RITY.KEYID = 7
24,732,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,478 UART: [art] PUB.X = 63A48D27B708CA795220CB6C18D806C8BC256B8D5509DB1A6B24981EA5CEEB1F8B9F90AB116A3E85C0E0EF3C347DEC43
24,741,777 UART: [art] PUB.Y = 41C43749F13BB54B21EA7950E17A93A76A44D0DCFB2CF98A0316ADBE519AB593A1D86FD6DE5E0940AD7EFA6BC751495D
24,749,056 UART: [art] SIG.R = 332D175BDE8E0FAC0B989DB7C0B84C1F6FFD33B1317A4AF41E84CE8FE79C47EEDD4CA3E90ED4AF82C22BCCF61670E80D
24,756,513 UART: [art] SIG.S = B76B59A3D0FD0E24A2DB58DB31453985615F1EDAAE31AC66666F3EBAE2CA6D82417CBB8AFF2DC6EEF6E251ABFABB4901
25,735,818 UART: Caliptra RT
25,736,517 UART: [state] CFI Enabled
25,900,625 UART: [rt] RT listening for mailbox commands...
25,902,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,933,236 UART: [rt]cmd =0x44504543, len=24
25,974,264 >>> mbox cmd response data (40 bytes)
25,975,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,005,888 UART: [rt]cmd =0x44504543, len=96
26,012,229 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,382,448 ready_for_fw is high
3,382,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,094,194 >>> mbox cmd response: success
18,390,307 UART:
18,390,687 UART: Running Caliptra FMC ...
18,391,873 UART:
18,392,053 UART: [state] CFI Enabled
18,457,668 UART: [fht] FMC Alias Private Key: 7
20,221,575 UART: [art] Extend RT PCRs Done
20,222,794 UART: [art] Lock RT PCRs Done
20,224,209 UART: [art] Populate DV Done
20,229,424 UART: [fht] FMC Alias Private Key: 7
20,231,003 UART: [art] Derive CDI
20,231,831 UART: [art] Store in in slot 0x4
20,289,633 UART: [art] Derive Key Pair
20,290,628 UART: [art] Store priv key in slot 0x5
22,753,340 UART: [art] Derive Key Pair - Done
22,766,173 UART: [art] Signing Cert with AUTHO
22,767,491 UART: RITY.KEYID = 7
24,478,659 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,159 UART: [art] PUB.X = A3249283BEBDB6B4CCF35FD34D06684DDB05CA75392EFE31B355BE6478405DE2ADA7A38FEB925DCB34876ADF851BF130
24,487,465 UART: [art] PUB.Y = EF71D4F805FF01C1CCA113EF02DCC2BDFA12C98C23778828D6EB88550FBA91FF10F2451CA081FD4ECCF208E144FB9C2E
24,494,742 UART: [art] SIG.R = D93D4607B1B91988ECE81EEF91B354EA04AF05757BC458C8BD1DC16A1A281CFBAB73C4E5C0EBBDC22ABC965ED93F9FB2
24,502,204 UART: [art] SIG.S = DF1640F66FB2FA2E84AD089C6326DCB2D2CCA87F9C32F50869FBE856AF821581AC4ECFFD742EB1BD5333FA4742D2BD5A
25,480,977 UART: Caliptra RT
25,481,686 UART: [state] CFI Enabled
25,646,973 UART: [rt] RT listening for mailbox commands...
25,648,886 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,679,231 UART: [rt]cmd =0x44504543, len=24
25,720,808 >>> mbox cmd response data (40 bytes)
25,721,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,752,577 UART: [rt]cmd =0x44504543, len=96
25,758,970 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,553 UART:
192,921 UART: Running Caliptra ROM ...
194,126 UART:
603,643 UART: [state] CFI Enabled
617,944 UART: [state] LifecycleState = Unprovisioned
619,817 UART: [state] DebugLocked = No
622,263 UART: [state] WD Timer not started. Device not locked for debugging
625,224 UART: [kat] SHA2-256
804,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,914 UART: [kat] ++
816,450 UART: [kat] sha1
827,963 UART: [kat] SHA2-256
830,966 UART: [kat] SHA2-384
837,304 UART: [kat] SHA2-512-ACC
840,227 UART: [kat] ECC-384
3,283,424 UART: [kat] HMAC-384Kdf
3,294,880 UART: [kat] LMS
3,824,341 UART: [kat] --
3,828,237 UART: [cold-reset] ++
3,830,312 UART: [fht] FHT @ 0x50003400
3,841,729 UART: [idev] ++
3,842,332 UART: [idev] CDI.KEYID = 6
3,843,244 UART: [idev] SUBJECT.KEYID = 7
3,844,414 UART: [idev] UDS.KEYID = 0
3,845,404 ready_for_fw is high
3,845,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,155 UART: [idev] Erasing UDS.KEYID = 0
6,312,583 UART: [idev] Sha1 KeyId Algorithm
6,335,957 UART: [idev] --
6,339,216 UART: [ldev] ++
6,339,785 UART: [ldev] CDI.KEYID = 6
6,340,689 UART: [ldev] SUBJECT.KEYID = 5
6,341,896 UART: [ldev] AUTHORITY.KEYID = 7
6,343,119 UART: [ldev] FE.KEYID = 1
6,353,504 UART: [ldev] Erasing FE.KEYID = 1
8,830,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,402 UART: [ldev] --
10,616,525 UART: [fwproc] Wait for Commands...
10,618,288 UART: [fwproc] Recv command 0x46574c44
10,620,379 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,317 >>> mbox cmd response: success
14,484,200 UART: [afmc] ++
14,484,790 UART: [afmc] CDI.KEYID = 6
14,485,691 UART: [afmc] SUBJECT.KEYID = 7
14,486,900 UART: [afmc] AUTHORITY.KEYID = 5
16,986,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,471 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,851 UART: [afmc] --
18,784,037 UART: [cold-reset] --
18,789,082 UART: [state] Locking Datavault
18,794,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,538 UART: [state] Locking ICCM
18,798,934 UART: [exit] Launching FMC @ 0x40000130
18,807,389 UART:
18,807,620 UART: Running Caliptra FMC ...
18,808,737 UART:
18,808,894 UART: [state] CFI Enabled
18,816,888 UART: [fht] FMC Alias Private Key: 7
20,573,332 UART: [art] Extend RT PCRs Done
20,574,549 UART: [art] Lock RT PCRs Done
20,576,111 UART: [art] Populate DV Done
20,581,673 UART: [fht] FMC Alias Private Key: 7
20,583,261 UART: [art] Derive CDI
20,584,073 UART: [art] Store in in slot 0x4
20,626,560 UART: [art] Derive Key Pair
20,627,554 UART: [art] Store priv key in slot 0x5
23,054,314 UART: [art] Derive Key Pair - Done
23,067,221 UART: [art] Signing Cert with AUTHO
23,068,519 UART: RITY.KEYID = 7
24,773,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,149 UART: [art] PUB.X = 4651232A35DF1F1F28DEDE7DF6E37C580A0A1AF0CAB7735AF12AF84A9C083AA5AC471F33AB09615F7451DCD5C48E03CC
24,782,479 UART: [art] PUB.Y = 0F4D7878FC0B65B83DA6AAA57024BAC7F913D4EC452A052C02C194657A84C0A96AB723312691F3444897C88DC28B8467
24,789,725 UART: [art] SIG.R = 7AAE2F70C9CE28160780F81FB840A685653ADE0F7A99C5F21BEAF391D4D5A1A6D732ADDF4BC2EEE27475BC328F466382
24,797,111 UART: [art] SIG.S = DA016595B74E14461E8EFCC9BF4C7744F2024E4B1EFFFDB389C27ACFFF7FFFDC5FC5ADABBA0880C329D5C67AC9FE9393
25,776,388 UART: Caliptra RT
25,777,084 UART: [state] CFI Enabled
25,894,632 UART: [rt] RT listening for mailbox commands...
25,896,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,926,402 UART: [rt]cmd =0x44504543, len=24
25,952,881 >>> mbox cmd response data (40 bytes)
25,954,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,984,575 UART: [rt]cmd =0x44504543, len=96
25,990,982 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,693,130 ready_for_fw is high
3,693,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,663 >>> mbox cmd response: success
18,508,642 UART:
18,509,070 UART: Running Caliptra FMC ...
18,510,209 UART:
18,510,364 UART: [state] CFI Enabled
18,517,936 UART: [fht] FMC Alias Private Key: 7
20,274,420 UART: [art] Extend RT PCRs Done
20,275,627 UART: [art] Lock RT PCRs Done
20,277,409 UART: [art] Populate DV Done
20,282,911 UART: [fht] FMC Alias Private Key: 7
20,284,627 UART: [art] Derive CDI
20,285,435 UART: [art] Store in in slot 0x4
20,327,990 UART: [art] Derive Key Pair
20,329,056 UART: [art] Store priv key in slot 0x5
22,755,478 UART: [art] Derive Key Pair - Done
22,768,525 UART: [art] Signing Cert with AUTHO
22,769,996 UART: RITY.KEYID = 7
24,475,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,780 UART: [art] PUB.X = E4566BBB25EDEDF941633E14EFAF55854779379D2A041BCC708746B267DCA5A2A422253CA23695D7CBA1E1EC892BD647
24,484,006 UART: [art] PUB.Y = B733169E1D090F1621299E2F440DE6DD647454D5E9CDF9AD640212DDFC782F5F0344132B5A206996ECE2725F33C6C2DF
24,491,298 UART: [art] SIG.R = 4A5765539E2BCE0F6CC92597527AC61B9797F03435098ECFC2DDDC4FAD258AE891A5804C103E2641523B51694B0058E5
24,498,673 UART: [art] SIG.S = 72B8A2D859BEAFEDDEE5B1403E8CFF4A781DE3B816B3F2B15EEED10BE5D0FEA463790BBB79A73F37B09C2FEC07274AF8
25,477,384 UART: Caliptra RT
25,478,082 UART: [state] CFI Enabled
25,595,311 UART: [rt] RT listening for mailbox commands...
25,597,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,627,051 UART: [rt]cmd =0x44504543, len=24
25,653,196 >>> mbox cmd response data (40 bytes)
25,654,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,685,219 UART: [rt]cmd =0x44504543, len=96
25,691,680 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,148 UART:
192,549 UART: Running Caliptra ROM ...
193,712 UART:
193,861 UART: [state] CFI Enabled
267,016 UART: [state] LifecycleState = Unprovisioned
269,426 UART: [state] DebugLocked = No
272,234 UART: [state] WD Timer not started. Device not locked for debugging
277,121 UART: [kat] SHA2-256
466,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,788 UART: [kat] ++
478,262 UART: [kat] sha1
489,351 UART: [kat] SHA2-256
492,364 UART: [kat] SHA2-384
498,496 UART: [kat] SHA2-512-ACC
501,073 UART: [kat] ECC-384
2,950,272 UART: [kat] HMAC-384Kdf
2,971,242 UART: [kat] LMS
3,503,054 UART: [kat] --
3,507,785 UART: [cold-reset] ++
3,508,651 UART: [fht] FHT @ 0x50003400
3,518,512 UART: [idev] ++
3,519,218 UART: [idev] CDI.KEYID = 6
3,520,244 UART: [idev] SUBJECT.KEYID = 7
3,521,413 UART: [idev] UDS.KEYID = 0
3,522,338 ready_for_fw is high
3,522,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,529 UART: [idev] Erasing UDS.KEYID = 0
6,028,785 UART: [idev] Sha1 KeyId Algorithm
6,052,089 UART: [idev] --
6,056,649 UART: [ldev] ++
6,057,334 UART: [ldev] CDI.KEYID = 6
6,058,251 UART: [ldev] SUBJECT.KEYID = 5
6,059,415 UART: [ldev] AUTHORITY.KEYID = 7
6,060,645 UART: [ldev] FE.KEYID = 1
6,100,292 UART: [ldev] Erasing FE.KEYID = 1
8,606,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,135 UART: [ldev] --
10,414,229 UART: [fwproc] Wait for Commands...
10,416,692 UART: [fwproc] Recv command 0x46574c44
10,418,942 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,128 >>> mbox cmd response: success
14,602,428 UART: [afmc] ++
14,603,130 UART: [afmc] CDI.KEYID = 6
14,604,366 UART: [afmc] SUBJECT.KEYID = 7
14,605,821 UART: [afmc] AUTHORITY.KEYID = 5
17,148,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,643 UART: [afmc] --
18,949,620 UART: [cold-reset] --
18,953,912 UART: [state] Locking Datavault
18,960,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,218 UART: [state] Locking ICCM
18,964,745 UART: [exit] Launching FMC @ 0x40000130
18,973,361 UART:
18,973,592 UART: Running Caliptra FMC ...
18,974,687 UART:
18,974,842 UART: [state] CFI Enabled
19,032,573 UART: [fht] FMC Alias Private Key: 7
20,796,416 UART: [art] Extend RT PCRs Done
20,797,631 UART: [art] Lock RT PCRs Done
20,799,310 UART: [art] Populate DV Done
20,804,825 UART: [fht] FMC Alias Private Key: 7
20,806,476 UART: [art] Derive CDI
20,807,290 UART: [art] Store in in slot 0x4
20,865,194 UART: [art] Derive Key Pair
20,866,231 UART: [art] Store priv key in slot 0x5
23,329,352 UART: [art] Derive Key Pair - Done
23,342,399 UART: [art] Signing Cert with AUTHO
23,343,704 UART: RITY.KEYID = 7
25,055,813 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,318 UART: [art] PUB.X = BA8C423EE867A68DB19DFC03D5AE13BE1B47ED68B62109B6F7DB5CC0BF9E1A8AADC38038891FD2C14ABC3820B585BDEB
25,064,618 UART: [art] PUB.Y = D0CD828D06CCB4463DBACB84FD48315948006D28A4E93EE95BA7F3D96CF674F4D053522A3158F8C2D4CE574703A071AB
25,071,906 UART: [art] SIG.R = 179E695F5B1B04FE1EC5E51C32B363E31E11E77F651F028556CA9FC1DC1E3D39888F2F321AF0810093ADE9E158BE6EDC
25,079,311 UART: [art] SIG.S = 9021EB7B7639AE79A49E5A99062F2E15AC07371B8455B0B9FD078A1E1C4CE93DCA0BD1FD1C694B576707D29D5106DC01
26,058,560 UART: Caliptra RT
26,059,269 UART: [state] CFI Enabled
26,222,945 UART: [rt] RT listening for mailbox commands...
26,224,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,255,377 UART: [rt]cmd =0x44504543, len=24
26,298,309 >>> mbox cmd response data (40 bytes)
26,299,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,051 UART: [rt]cmd =0x44504543, len=96
26,336,255 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,419,795 ready_for_fw is high
3,420,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,022 >>> mbox cmd response: success
19,002,824 UART:
19,003,211 UART: Running Caliptra FMC ...
19,004,412 UART:
19,004,582 UART: [state] CFI Enabled
19,072,573 UART: [fht] FMC Alias Private Key: 7
20,836,091 UART: [art] Extend RT PCRs Done
20,837,317 UART: [art] Lock RT PCRs Done
20,839,050 UART: [art] Populate DV Done
20,844,465 UART: [fht] FMC Alias Private Key: 7
20,845,965 UART: [art] Derive CDI
20,846,787 UART: [art] Store in in slot 0x4
20,905,360 UART: [art] Derive Key Pair
20,906,392 UART: [art] Store priv key in slot 0x5
23,369,707 UART: [art] Derive Key Pair - Done
23,382,674 UART: [art] Signing Cert with AUTHO
23,383,981 UART: RITY.KEYID = 7
25,095,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,075 UART: [art] PUB.X = 2A6369BE27CB06AC27E8DFBE06BF6249F63E74265FC120D0DE5BAE491AE301C6BE76F19CBCB2FCE7D6B70B657B612197
25,104,385 UART: [art] PUB.Y = 0E598E0248B8C5240B606D337D6AC418F81959E313805A98CD2B1C77D2722D745724BE98B516A949DF39C73D70F88E6E
25,111,631 UART: [art] SIG.R = 57B86821E07A91E45EFF5ED7BD61374937C7F1B02A6C2EEC8936DAFD37AE92A5A72AF9B4E1E3379D03E347B4A6E6FFCF
25,119,017 UART: [art] SIG.S = A912A8A5BD7ED47160562B9740B2C7BEE3F5436BDA9A0C89F1F4357BAE624CEBA951C78010295DA7AEB770FD9CF2EF02
26,097,786 UART: Caliptra RT
26,098,494 UART: [state] CFI Enabled
26,264,155 UART: [rt] RT listening for mailbox commands...
26,266,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,296,719 UART: [rt]cmd =0x44504543, len=24
26,338,281 >>> mbox cmd response data (40 bytes)
26,339,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,370,092 UART: [rt]cmd =0x44504543, len=96
26,376,699 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,439 UART:
192,813 UART: Running Caliptra ROM ...
193,942 UART:
603,770 UART: [state] CFI Enabled
615,329 UART: [state] LifecycleState = Unprovisioned
617,707 UART: [state] DebugLocked = No
620,678 UART: [state] WD Timer not started. Device not locked for debugging
624,792 UART: [kat] SHA2-256
814,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,433 UART: [kat] ++
825,950 UART: [kat] sha1
836,741 UART: [kat] SHA2-256
839,746 UART: [kat] SHA2-384
846,012 UART: [kat] SHA2-512-ACC
848,591 UART: [kat] ECC-384
3,287,730 UART: [kat] HMAC-384Kdf
3,302,164 UART: [kat] LMS
3,833,829 UART: [kat] --
3,836,971 UART: [cold-reset] ++
3,838,259 UART: [fht] FHT @ 0x50003400
3,849,648 UART: [idev] ++
3,850,274 UART: [idev] CDI.KEYID = 6
3,851,316 UART: [idev] SUBJECT.KEYID = 7
3,852,480 UART: [idev] UDS.KEYID = 0
3,853,401 ready_for_fw is high
3,853,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,997,477 UART: [idev] Erasing UDS.KEYID = 0
6,330,240 UART: [idev] Sha1 KeyId Algorithm
6,353,651 UART: [idev] --
6,358,544 UART: [ldev] ++
6,359,229 UART: [ldev] CDI.KEYID = 6
6,360,135 UART: [ldev] SUBJECT.KEYID = 5
6,361,289 UART: [ldev] AUTHORITY.KEYID = 7
6,362,516 UART: [ldev] FE.KEYID = 1
6,374,501 UART: [ldev] Erasing FE.KEYID = 1
8,850,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,672 UART: [ldev] --
10,639,821 UART: [fwproc] Wait for Commands...
10,641,368 UART: [fwproc] Recv command 0x46574c44
10,643,612 UART: [fwproc] Recv'd Img size: 114448 bytes
14,091,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,418 >>> mbox cmd response: success
14,834,868 UART: [afmc] ++
14,835,579 UART: [afmc] CDI.KEYID = 6
14,836,765 UART: [afmc] SUBJECT.KEYID = 7
14,838,253 UART: [afmc] AUTHORITY.KEYID = 5
17,337,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,717 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,348 UART: [afmc] --
19,134,641 UART: [cold-reset] --
19,138,714 UART: [state] Locking Datavault
19,145,170 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,358 UART: [state] Locking ICCM
19,150,378 UART: [exit] Launching FMC @ 0x40000130
19,159,001 UART:
19,159,235 UART: Running Caliptra FMC ...
19,160,329 UART:
19,160,482 UART: [state] CFI Enabled
19,168,948 UART: [fht] FMC Alias Private Key: 7
20,926,468 UART: [art] Extend RT PCRs Done
20,927,686 UART: [art] Lock RT PCRs Done
20,929,465 UART: [art] Populate DV Done
20,935,140 UART: [fht] FMC Alias Private Key: 7
20,936,722 UART: [art] Derive CDI
20,937,531 UART: [art] Store in in slot 0x4
20,980,222 UART: [art] Derive Key Pair
20,981,214 UART: [art] Store priv key in slot 0x5
23,408,065 UART: [art] Derive Key Pair - Done
23,421,166 UART: [art] Signing Cert with AUTHO
23,422,467 UART: RITY.KEYID = 7
25,128,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,585 UART: [art] PUB.X = E300923287DF8EE3A1B016F752320A18B3D9654B846335E4A0878B44FD0779E3CDA3A1916E23E4D110F4FA7778A87587
25,136,856 UART: [art] PUB.Y = 3E362E06B497CB26E78795F80B99F6781CA6529F8FCA48D2B4ED830CFB9E454D2ED9AB152418CF183F68E5870E14C932
25,144,090 UART: [art] SIG.R = 1BBE2B2A765A3F80026BB9621E1AE59356924308477A7066327F5C43D0F7052301913AEC67C52EC75621DE3A11858F78
25,151,476 UART: [art] SIG.S = C309E17F27705CBAE0359708283F7A528757D49D8EAD2C290CB0FF5405C4D6D755D13A5B85397D330C2ED04DB228F07A
26,130,521 UART: Caliptra RT
26,131,240 UART: [state] CFI Enabled
26,247,556 UART: [rt] RT listening for mailbox commands...
26,249,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,279,332 UART: [rt]cmd =0x44504543, len=24
26,305,278 >>> mbox cmd response data (40 bytes)
26,306,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,208 UART: [rt]cmd =0x44504543, len=96
26,343,418 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,756,961 ready_for_fw is high
3,757,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,559 >>> mbox cmd response: success
19,212,660 UART:
19,213,070 UART: Running Caliptra FMC ...
19,214,178 UART:
19,214,317 UART: [state] CFI Enabled
19,222,323 UART: [fht] FMC Alias Private Key: 7
20,978,917 UART: [art] Extend RT PCRs Done
20,980,138 UART: [art] Lock RT PCRs Done
20,981,956 UART: [art] Populate DV Done
20,987,422 UART: [fht] FMC Alias Private Key: 7
20,989,021 UART: [art] Derive CDI
20,989,755 UART: [art] Store in in slot 0x4
21,032,237 UART: [art] Derive Key Pair
21,033,297 UART: [art] Store priv key in slot 0x5
23,460,256 UART: [art] Derive Key Pair - Done
23,473,302 UART: [art] Signing Cert with AUTHO
23,474,634 UART: RITY.KEYID = 7
25,179,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,455 UART: [art] PUB.X = B2FF4626827BC1A2303B874A3030C89F10E38C64B07F46E9A099C7379A6053280CBF385C88D321B272F6ABE57634CB5E
25,188,676 UART: [art] PUB.Y = 9A43C56EED9F3A33A85D29DCFAA262C03B605068BE32D2F3D779B053FC55549B49643928631F62599D9BFFBC17C506C9
25,195,958 UART: [art] SIG.R = 94E53B1A9B24D4645D2ED8F40302803B6E0FF79164506A9B16DB35370AE04452714BDD4F363E67EFDD23F711D3C93B83
25,203,340 UART: [art] SIG.S = 94BC6EF1F6FE31FAD50B34FEECB377905662A4079F48C12BC44A27582EDDB1D3DC17D2E688FCF3EF702607FB1AB75EA0
26,182,399 UART: Caliptra RT
26,183,088 UART: [state] CFI Enabled
26,300,701 UART: [rt] RT listening for mailbox commands...
26,302,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,332,433 UART: [rt]cmd =0x44504543, len=24
26,358,391 >>> mbox cmd response data (40 bytes)
26,359,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,390,435 UART: [rt]cmd =0x44504543, len=96
26,396,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,743 UART: [kat] SHA2-256
881,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,789 UART: [kat] ++
885,941 UART: [kat] sha1
890,025 UART: [kat] SHA2-256
891,963 UART: [kat] SHA2-384
894,730 UART: [kat] SHA2-512-ACC
896,631 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,191 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,424 UART: [idev] ++
1,479,592 UART: [idev] CDI.KEYID = 6
1,479,952 UART: [idev] SUBJECT.KEYID = 7
1,480,376 UART: [idev] UDS.KEYID = 0
1,480,721 ready_for_fw is high
1,480,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,060 UART: [idev] Erasing UDS.KEYID = 0
1,504,832 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,521,319 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,596 UART: [ldev] --
1,586,099 UART: [fwproc] Waiting for Commands...
1,586,946 UART: [fwproc] Received command 0x46574c44
1,587,737 UART: [fwproc] Received Image of size 114448 bytes
2,887,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,523 >>> mbox cmd response: success
3,081,617 UART: [afmc] ++
3,081,785 UART: [afmc] CDI.KEYID = 6
3,082,147 UART: [afmc] SUBJECT.KEYID = 7
3,082,572 UART: [afmc] AUTHORITY.KEYID = 5
3,117,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,162 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,852 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,859 UART: [afmc] --
3,160,835 UART: [cold-reset] --
3,161,661 UART: [state] Locking Datavault
3,162,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,342 UART: [state] Locking ICCM
3,163,896 UART: [exit] Launching FMC @ 0x40000130
3,169,225 UART:
3,169,241 UART: Running Caliptra FMC ...
3,169,649 UART:
3,169,703 UART: [state] CFI Enabled
3,180,254 UART: [fht] FMC Alias Private Key: 7
3,288,055 UART: [art] Extend RT PCRs Done
3,288,483 UART: [art] Lock RT PCRs Done
3,290,085 UART: [art] Populate DV Done
3,298,266 UART: [fht] FMC Alias Private Key: 7
3,299,440 UART: [art] Derive CDI
3,299,720 UART: [art] Store in in slot 0x4
3,385,265 UART: [art] Derive Key Pair
3,385,625 UART: [art] Store priv key in slot 0x5
3,398,809 UART: [art] Derive Key Pair - Done
3,413,403 UART: [art] Signing Cert with AUTHO
3,413,883 UART: RITY.KEYID = 7
3,429,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,914 UART: [art] PUB.X = BEA8EE004E7B522676C54F4986D967690FA900F278F3594782CFF035C254DD91279BF87F3C6639934F49111D319FCEB6
3,436,635 UART: [art] PUB.Y = 38C7082A22BE0F38C72B696FD044C2DF9B4A37D14DC55806885CED42FBF7974765863B7709707FA529D95D775D23151E
3,443,571 UART: [art] SIG.R = 6A60804A6164F3E38ABE47F4CEFA598E3A5D1FB4F4AE9CF88E27AB96F0881B9A67B70411B68E132474E0B4023E7C653D
3,450,345 UART: [art] SIG.S = 7A3ED2198A5DF7A0018DD34584C2AEC76C992471C23F2BCF0B871B427EC6A440A80AB28F81896FE7B8C1414A73C6A18C
3,474,723 UART: Caliptra RT
3,474,976 UART: [state] CFI Enabled
3,583,554 UART: [rt] RT listening for mailbox commands...
3,584,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,090 UART: [rt]cmd =0x44504543, len=24
3,640,670 >>> mbox cmd response data (40 bytes)
3,640,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,756 UART: [rt]cmd =0x44504543, len=96
3,677,986 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 ready_for_fw is high
1,362,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,495 >>> mbox cmd response: success
2,989,735 UART:
2,989,751 UART: Running Caliptra FMC ...
2,990,159 UART:
2,990,213 UART: [state] CFI Enabled
3,000,618 UART: [fht] FMC Alias Private Key: 7
3,108,375 UART: [art] Extend RT PCRs Done
3,108,803 UART: [art] Lock RT PCRs Done
3,110,143 UART: [art] Populate DV Done
3,118,548 UART: [fht] FMC Alias Private Key: 7
3,119,602 UART: [art] Derive CDI
3,119,882 UART: [art] Store in in slot 0x4
3,205,315 UART: [art] Derive Key Pair
3,205,675 UART: [art] Store priv key in slot 0x5
3,218,681 UART: [art] Derive Key Pair - Done
3,233,061 UART: [art] Signing Cert with AUTHO
3,233,541 UART: RITY.KEYID = 7
3,248,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,476 UART: [art] PUB.X = 75E104FEA04345FD9A90124FF976EFE5384AAEAC79098900B50664E4B94F4FC659ABA146ACD667B5B2F665012B34BF13
3,256,220 UART: [art] PUB.Y = 9B92714BD6666157CE3C9D61B9665AF7A4D1429153EC59DEAD10BD88B82B9F936D7C280AB95C7FD4ED14871EA2AEC64A
3,263,181 UART: [art] SIG.R = B586A82F9EDE661C7E992489C935490F95EFC61020FBA5229D6E609B7351E6EB6FF8C6562520612E59081F3B540D57BB
3,269,942 UART: [art] SIG.S = 0572EF9C4362302183E5A8B14874E58A59F3F4E438633A85869A23030378F61BBE76E3F00D66FA8BBA88BD6B0DBF71A1
3,293,892 UART: Caliptra RT
3,294,145 UART: [state] CFI Enabled
3,402,920 UART: [rt] RT listening for mailbox commands...
3,403,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,516 UART: [rt]cmd =0x44504543, len=24
3,460,222 >>> mbox cmd response data (40 bytes)
3,460,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,352 UART: [rt]cmd =0x44504543, len=96
3,497,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,460 UART: [kat] SHA2-256
882,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,506 UART: [kat] ++
886,658 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,305 UART: [kat] HMAC-384Kdf
907,899 UART: [kat] LMS
1,476,095 UART: [kat] --
1,477,046 UART: [cold-reset] ++
1,477,398 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 ready_for_fw is high
1,481,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,677 UART: [idev] Erasing UDS.KEYID = 0
1,506,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,953 UART: [idev] --
1,516,190 UART: [ldev] ++
1,516,358 UART: [ldev] CDI.KEYID = 6
1,516,721 UART: [ldev] SUBJECT.KEYID = 5
1,517,147 UART: [ldev] AUTHORITY.KEYID = 7
1,517,610 UART: [ldev] FE.KEYID = 1
1,522,836 UART: [ldev] Erasing FE.KEYID = 1
1,547,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,841 UART: [ldev] --
1,587,162 UART: [fwproc] Waiting for Commands...
1,587,793 UART: [fwproc] Received command 0x46574c44
1,588,584 UART: [fwproc] Received Image of size 114448 bytes
2,888,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,886 >>> mbox cmd response: success
3,081,902 UART: [afmc] ++
3,082,070 UART: [afmc] CDI.KEYID = 6
3,082,432 UART: [afmc] SUBJECT.KEYID = 7
3,082,857 UART: [afmc] AUTHORITY.KEYID = 5
3,118,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,899 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,589 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,406 UART: [afmc] --
3,161,488 UART: [cold-reset] --
3,162,232 UART: [state] Locking Datavault
3,163,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,009 UART: [state] Locking ICCM
3,164,543 UART: [exit] Launching FMC @ 0x40000130
3,169,872 UART:
3,169,888 UART: Running Caliptra FMC ...
3,170,296 UART:
3,170,439 UART: [state] CFI Enabled
3,180,734 UART: [fht] FMC Alias Private Key: 7
3,288,645 UART: [art] Extend RT PCRs Done
3,289,073 UART: [art] Lock RT PCRs Done
3,290,511 UART: [art] Populate DV Done
3,298,750 UART: [fht] FMC Alias Private Key: 7
3,299,742 UART: [art] Derive CDI
3,300,022 UART: [art] Store in in slot 0x4
3,385,863 UART: [art] Derive Key Pair
3,386,223 UART: [art] Store priv key in slot 0x5
3,399,385 UART: [art] Derive Key Pair - Done
3,414,247 UART: [art] Signing Cert with AUTHO
3,414,727 UART: RITY.KEYID = 7
3,429,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,664 UART: [art] PUB.X = 29B7FD2F3DCE5AEDCE888ABE566A677DD6DD6390DCD0FD55354271B884F836271E734E3A61FA42459CB5708588D0BB40
3,437,446 UART: [art] PUB.Y = 1A475818ADEB974B483615D6EFB041D989924C5EEDE930045E9FBB599C927C51154A81F7BF5F76E817A226FBA8DAAC77
3,444,403 UART: [art] SIG.R = 793B74D0B1F1FA07E646CADCDF75F13D4BE87D8C1CD2143BB7E9BD1D99403B5D1029EC6459FBBF13369723A33092790A
3,451,179 UART: [art] SIG.S = 48A9D36DAA960376B7DC3B9D801ED9351A339405DD8A8205923CE824552542F28BDC010A8331D58856C47AA850921C45
3,474,805 UART: Caliptra RT
3,475,150 UART: [state] CFI Enabled
3,582,742 UART: [rt] RT listening for mailbox commands...
3,583,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,488 UART: [rt]cmd =0x44504543, len=24
3,639,750 >>> mbox cmd response data (40 bytes)
3,639,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,612 UART: [rt]cmd =0x44504543, len=96
3,677,114 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,060 ready_for_fw is high
1,363,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,026 >>> mbox cmd response: success
2,993,306 UART:
2,993,322 UART: Running Caliptra FMC ...
2,993,730 UART:
2,993,873 UART: [state] CFI Enabled
3,004,510 UART: [fht] FMC Alias Private Key: 7
3,112,727 UART: [art] Extend RT PCRs Done
3,113,155 UART: [art] Lock RT PCRs Done
3,114,829 UART: [art] Populate DV Done
3,123,182 UART: [fht] FMC Alias Private Key: 7
3,124,226 UART: [art] Derive CDI
3,124,506 UART: [art] Store in in slot 0x4
3,210,075 UART: [art] Derive Key Pair
3,210,435 UART: [art] Store priv key in slot 0x5
3,223,803 UART: [art] Derive Key Pair - Done
3,238,580 UART: [art] Signing Cert with AUTHO
3,239,060 UART: RITY.KEYID = 7
3,254,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,943 UART: [art] PUB.X = 094EB94D997264B909A0417EA30054A748AF9CCEF800BA3A6629352476726B42586ECE60A91DAEF9D31F08048270B98D
3,261,655 UART: [art] PUB.Y = 3DB1D428F39A50495E285FAD47A55FA18EDEAAC8E381E39FF53DDEBE7A1F9D69AD779E6774B5B300A78DBF1E7B92E996
3,268,605 UART: [art] SIG.R = C3245B4C649942344F8CC56AE099DFDA5FA0BC418692971750B4724735091D1F22A98CBA80867DA97BD1B7810D5F3C5D
3,275,371 UART: [art] SIG.S = B1B06D16F362B66D9528BE4B1D9C7478CD0E755B4E2DA266BE287EFF0C6530D82FF29FFC0E537845B1BF9FA006E8CBF4
3,299,334 UART: Caliptra RT
3,299,679 UART: [state] CFI Enabled
3,407,593 UART: [rt] RT listening for mailbox commands...
3,408,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,323 UART: [rt]cmd =0x44504543, len=24
3,464,285 >>> mbox cmd response data (40 bytes)
3,464,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,317 UART: [rt]cmd =0x44504543, len=96
3,501,701 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,171,917 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,539 UART: [idev] Sha1 KeyId Algorithm
1,209,133 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,388 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,790 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,066 >>> mbox cmd response: success
2,777,208 UART: [afmc] ++
2,777,376 UART: [afmc] CDI.KEYID = 6
2,777,738 UART: [afmc] SUBJECT.KEYID = 7
2,778,163 UART: [afmc] AUTHORITY.KEYID = 5
2,813,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,077 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,857 UART: [afmc] --
2,856,945 UART: [cold-reset] --
2,857,697 UART: [state] Locking Datavault
2,858,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,450 UART: [state] Locking ICCM
2,860,100 UART: [exit] Launching FMC @ 0x40000130
2,865,429 UART:
2,865,445 UART: Running Caliptra FMC ...
2,865,853 UART:
2,865,907 UART: [state] CFI Enabled
2,876,502 UART: [fht] FMC Alias Private Key: 7
2,985,023 UART: [art] Extend RT PCRs Done
2,985,451 UART: [art] Lock RT PCRs Done
2,986,987 UART: [art] Populate DV Done
2,994,872 UART: [fht] FMC Alias Private Key: 7
2,995,842 UART: [art] Derive CDI
2,996,122 UART: [art] Store in in slot 0x4
3,081,535 UART: [art] Derive Key Pair
3,081,895 UART: [art] Store priv key in slot 0x5
3,094,683 UART: [art] Derive Key Pair - Done
3,109,859 UART: [art] Signing Cert with AUTHO
3,110,339 UART: RITY.KEYID = 7
3,125,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,304 UART: [art] PUB.X = 68E4C1DD1703FA352B66BC0A746E7BF3F7CDE1FC348EE739307F0AE031126C9B2045D71F6CC7FDC68C9A22F6A0C85734
3,133,079 UART: [art] PUB.Y = E4CC4D2BE2B2A24D9D7843B9FF9723D0066B8306668F58C0AAFD5ED2F98836B7A7D1639EA4DF26706F9D27FCADB394FA
3,140,041 UART: [art] SIG.R = BA3D272675A7C5C1ABC867E280DAEAD50A7276F48620A54A42DC70478FFF608D5B5BA3C227067201980739651B85FE1A
3,146,803 UART: [art] SIG.S = 6A7FB6CC10AAF33D2949E3B9E4814940FF08A7D1AE295326B2A93A296D7043836EA64E75353A58E140A95327902A905B
3,170,443 UART: Caliptra RT
3,170,696 UART: [state] CFI Enabled
3,278,157 UART: [rt] RT listening for mailbox commands...
3,278,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,969 UART: [rt]cmd =0x44504543, len=24
3,335,285 >>> mbox cmd response data (40 bytes)
3,335,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,193 UART: [rt]cmd =0x44504543, len=96
3,372,641 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,933 >>> mbox cmd response: success
2,689,415 UART:
2,689,431 UART: Running Caliptra FMC ...
2,689,839 UART:
2,689,893 UART: [state] CFI Enabled
2,700,484 UART: [fht] FMC Alias Private Key: 7
2,808,809 UART: [art] Extend RT PCRs Done
2,809,237 UART: [art] Lock RT PCRs Done
2,810,843 UART: [art] Populate DV Done
2,818,966 UART: [fht] FMC Alias Private Key: 7
2,819,990 UART: [art] Derive CDI
2,820,270 UART: [art] Store in in slot 0x4
2,906,355 UART: [art] Derive Key Pair
2,906,715 UART: [art] Store priv key in slot 0x5
2,918,877 UART: [art] Derive Key Pair - Done
2,933,776 UART: [art] Signing Cert with AUTHO
2,934,256 UART: RITY.KEYID = 7
2,949,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,649 UART: [art] PUB.X = FB92013F8156D9E60B809D8BFC2B41BDA053BF0D157D49A66467CBBFC88FBE36646837956D4E794147287040ABB20D70
2,957,411 UART: [art] PUB.Y = E385C85D0E42C3EE34B7523F1C5580BC810ED35F9F6794308D64ACFAF59944538B86391788DAAFBDAFFB9A59849F5B3F
2,964,367 UART: [art] SIG.R = 8660096B7E79F2EE243BAA857F6CEE2047A4F5FE72C0B5EE9AE6A9F211EA9A577A6EFAE96B7E81529678E65DAFB78C19
2,971,152 UART: [art] SIG.S = 4637092BC761E0AE3EE4C093769146ECF2CA0D83B43346F2FA15DB3E4C1F7E8FACB0BB9348DC52CA2BCD4FF967D69B9B
2,995,019 UART: Caliptra RT
2,995,272 UART: [state] CFI Enabled
3,103,779 UART: [rt] RT listening for mailbox commands...
3,104,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,601 UART: [rt]cmd =0x44504543, len=24
3,160,985 >>> mbox cmd response data (40 bytes)
3,160,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,711 UART: [rt]cmd =0x44504543, len=96
3,197,785 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
893,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,310 UART: [kat] ++
897,462 UART: [kat] sha1
901,526 UART: [kat] SHA2-256
903,466 UART: [kat] SHA2-384
906,125 UART: [kat] SHA2-512-ACC
908,026 UART: [kat] ECC-384
917,423 UART: [kat] HMAC-384Kdf
922,133 UART: [kat] LMS
1,170,461 UART: [kat] --
1,171,646 UART: [cold-reset] ++
1,172,086 UART: [fht] FHT @ 0x50003400
1,174,753 UART: [idev] ++
1,174,921 UART: [idev] CDI.KEYID = 6
1,175,281 UART: [idev] SUBJECT.KEYID = 7
1,175,705 UART: [idev] UDS.KEYID = 0
1,176,050 ready_for_fw is high
1,176,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,096 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,458 UART: [ldev] ++
1,210,626 UART: [ldev] CDI.KEYID = 6
1,210,989 UART: [ldev] SUBJECT.KEYID = 5
1,211,415 UART: [ldev] AUTHORITY.KEYID = 7
1,211,878 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,243,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,532 UART: [ldev] --
1,282,819 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,133 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,611 >>> mbox cmd response: success
2,776,643 UART: [afmc] ++
2,776,811 UART: [afmc] CDI.KEYID = 6
2,777,173 UART: [afmc] SUBJECT.KEYID = 7
2,777,598 UART: [afmc] AUTHORITY.KEYID = 5
2,813,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,622 UART: [afmc] --
2,856,662 UART: [cold-reset] --
2,857,590 UART: [state] Locking Datavault
2,858,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,215 UART: [state] Locking ICCM
2,859,837 UART: [exit] Launching FMC @ 0x40000130
2,865,166 UART:
2,865,182 UART: Running Caliptra FMC ...
2,865,590 UART:
2,865,733 UART: [state] CFI Enabled
2,876,182 UART: [fht] FMC Alias Private Key: 7
2,983,971 UART: [art] Extend RT PCRs Done
2,984,399 UART: [art] Lock RT PCRs Done
2,985,897 UART: [art] Populate DV Done
2,994,310 UART: [fht] FMC Alias Private Key: 7
2,995,350 UART: [art] Derive CDI
2,995,630 UART: [art] Store in in slot 0x4
3,081,593 UART: [art] Derive Key Pair
3,081,953 UART: [art] Store priv key in slot 0x5
3,095,321 UART: [art] Derive Key Pair - Done
3,110,207 UART: [art] Signing Cert with AUTHO
3,110,687 UART: RITY.KEYID = 7
3,125,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,472 UART: [art] PUB.X = E896FE5D4225A9CE50D4E09C24DB659A7282F57E5DCA76422D9ED3E8B59BFE5E99BAFF966AC8E772C6EA34E8F7700D15
3,133,257 UART: [art] PUB.Y = 00F05154EC2216868AD60FB017D4BB524734E994E40680297EFD6A5E52BBF9BE08694693543F0F58F107D66F8D8E2AC0
3,140,170 UART: [art] SIG.R = EABF3F4004A07CFE57B959AF6DE94D85C1233DF9D5EA6FF8C22BF8172AB450958CA7A123C46BD4ED58A79DB6C4038616
3,146,952 UART: [art] SIG.S = B93534453579AD597ECD05D13DBA42BD8E065832F052B4884212FC08E61FDF1C9C0391D19BE6691D372FAA7CB43A09CB
3,170,908 UART: Caliptra RT
3,171,253 UART: [state] CFI Enabled
3,277,965 UART: [rt] RT listening for mailbox commands...
3,278,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,435 UART: [rt]cmd =0x44504543, len=24
3,334,803 >>> mbox cmd response data (40 bytes)
3,334,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,565 UART: [rt]cmd =0x44504543, len=96
3,371,349 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,208 ready_for_fw is high
1,060,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,854 >>> mbox cmd response: success
2,689,576 UART:
2,689,592 UART: Running Caliptra FMC ...
2,690,000 UART:
2,690,143 UART: [state] CFI Enabled
2,700,640 UART: [fht] FMC Alias Private Key: 7
2,808,691 UART: [art] Extend RT PCRs Done
2,809,119 UART: [art] Lock RT PCRs Done
2,810,615 UART: [art] Populate DV Done
2,818,658 UART: [fht] FMC Alias Private Key: 7
2,819,816 UART: [art] Derive CDI
2,820,096 UART: [art] Store in in slot 0x4
2,905,515 UART: [art] Derive Key Pair
2,905,875 UART: [art] Store priv key in slot 0x5
2,919,351 UART: [art] Derive Key Pair - Done
2,934,022 UART: [art] Signing Cert with AUTHO
2,934,502 UART: RITY.KEYID = 7
2,949,306 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,071 UART: [art] PUB.X = D354001C11787352BF8BD91EFA9BADE1EF7D98FBB5A4C8599EF300555FC8750BE922F2810775C2F8F51E6F1D2673F2BF
2,956,803 UART: [art] PUB.Y = 7E591A1DE190321FB50AB5828C25F20FDDBAE1B1F0902AB37E6F78A0C25493092E1507C62897050FF800CAEDAC9BBD20
2,963,725 UART: [art] SIG.R = DBE80FEF3582B3C5D054F45CF3B30E7579EED034BE68992A46D80F38CEE6E482AB6AE0253A63E7BE28F3A888304ED672
2,970,500 UART: [art] SIG.S = 7E84EEEEFC809F3DF1C6BC6FA9C76EE271AB98501241FEC4FEF95099E7565989AC49DDF2EFC00982AB4BF929074BAB01
2,994,450 UART: Caliptra RT
2,994,795 UART: [state] CFI Enabled
3,103,940 UART: [rt] RT listening for mailbox commands...
3,104,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,662 UART: [rt]cmd =0x44504543, len=24
3,161,184 >>> mbox cmd response data (40 bytes)
3,161,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,274 UART: [rt]cmd =0x44504543, len=96
3,198,544 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,174,061 ready_for_fw is high
1,174,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,167 UART: [idev] Erasing UDS.KEYID = 0
1,197,811 UART: [idev] Sha1 KeyId Algorithm
1,206,645 UART: [idev] --
1,207,624 UART: [ldev] ++
1,207,792 UART: [ldev] CDI.KEYID = 6
1,208,156 UART: [ldev] SUBJECT.KEYID = 5
1,208,583 UART: [ldev] AUTHORITY.KEYID = 7
1,209,046 UART: [ldev] FE.KEYID = 1
1,214,252 UART: [ldev] Erasing FE.KEYID = 1
1,240,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,474 UART: [ldev] --
1,279,768 UART: [fwproc] Wait for Commands...
1,280,369 UART: [fwproc] Recv command 0x46574c44
1,281,102 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,742 >>> mbox cmd response: success
2,773,949 UART: [afmc] ++
2,774,117 UART: [afmc] CDI.KEYID = 6
2,774,480 UART: [afmc] SUBJECT.KEYID = 7
2,774,906 UART: [afmc] AUTHORITY.KEYID = 5
2,810,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,042 UART: [afmc] --
2,852,942 UART: [cold-reset] --
2,853,648 UART: [state] Locking Datavault
2,854,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,157 UART: [state] Locking ICCM
2,855,609 UART: [exit] Launching FMC @ 0x40000130
2,860,938 UART:
2,860,954 UART: Running Caliptra FMC ...
2,861,362 UART:
2,861,416 UART: [state] CFI Enabled
2,871,789 UART: [fht] FMC Alias Private Key: 7
2,979,758 UART: [art] Extend RT PCRs Done
2,980,186 UART: [art] Lock RT PCRs Done
2,981,438 UART: [art] Populate DV Done
2,989,691 UART: [fht] FMC Alias Private Key: 7
2,990,777 UART: [art] Derive CDI
2,991,057 UART: [art] Store in in slot 0x4
3,076,542 UART: [art] Derive Key Pair
3,076,902 UART: [art] Store priv key in slot 0x5
3,090,140 UART: [art] Derive Key Pair - Done
3,104,956 UART: [art] Signing Cert with AUTHO
3,105,436 UART: RITY.KEYID = 7
3,120,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,385 UART: [art] PUB.X = C040C952EA2F03F359E0FAB4C70833AB6C46ACECD775EFE192A3C127CE538B8F92A4A885BAFBEAF7426096916112402E
3,128,163 UART: [art] PUB.Y = D94EEF15C51FA2F89EEA5A7D6535610C59843078E55FE113100269D1913DE1F080F4E3B3EF8AD59AF518D67CFFB49223
3,135,115 UART: [art] SIG.R = E42420E197D3F43EF762A33D0113A473C2839D16BBDB656453BFBF73FC8B6BDC2ACE8DCCB475DEF48AD94CB60FC14119
3,141,899 UART: [art] SIG.S = 8C36679D7EEBF3F570C648AF6A549FD79CA1008102C6D51C9C87A0357CA29A8B5CFBE10C29E208C85067EAF4F711BE9B
3,165,671 UART: Caliptra RT
3,165,924 UART: [state] CFI Enabled
3,273,358 UART: [rt] RT listening for mailbox commands...
3,274,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,766 UART: [rt]cmd =0x44504543, len=24
3,330,156 >>> mbox cmd response data (40 bytes)
3,330,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,178 UART: [rt]cmd =0x44504543, len=96
3,367,452 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,548 ready_for_fw is high
1,055,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,514 >>> mbox cmd response: success
2,686,188 UART:
2,686,204 UART: Running Caliptra FMC ...
2,686,612 UART:
2,686,666 UART: [state] CFI Enabled
2,696,971 UART: [fht] FMC Alias Private Key: 7
2,804,478 UART: [art] Extend RT PCRs Done
2,804,906 UART: [art] Lock RT PCRs Done
2,806,156 UART: [art] Populate DV Done
2,814,429 UART: [fht] FMC Alias Private Key: 7
2,815,565 UART: [art] Derive CDI
2,815,845 UART: [art] Store in in slot 0x4
2,901,482 UART: [art] Derive Key Pair
2,901,842 UART: [art] Store priv key in slot 0x5
2,915,374 UART: [art] Derive Key Pair - Done
2,929,955 UART: [art] Signing Cert with AUTHO
2,930,435 UART: RITY.KEYID = 7
2,945,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,416 UART: [art] PUB.X = E1F5F547BCA4E2192875EAF4394C7896A34398DDB58A5DB11325038A668F1395D34E04AD231C11BEFB0BD214B6F836AE
2,953,185 UART: [art] PUB.Y = EC9745EB47CAC144D017916D19EE091016FC51247AB2BF14D66D13430101CECA23A8303333C0069024F0C4C94E70843E
2,960,121 UART: [art] SIG.R = 026682E1ADEF1DDA6FFCF60B6BF58946802F531462F5C4D4F11B1E7F9DFA6AE471B9EB750A4A37618043E2C2FC0E5BBA
2,966,899 UART: [art] SIG.S = A43A773F95A5B2EB6A6A542AB0C6E116DAAA5CE9ECE95ACF135926C3DBEDC47A705D04B25149D7BBACAFA190EEB469A5
2,990,599 UART: Caliptra RT
2,990,852 UART: [state] CFI Enabled
3,098,911 UART: [rt] RT listening for mailbox commands...
3,099,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,303 UART: [rt]cmd =0x44504543, len=24
3,155,693 >>> mbox cmd response data (40 bytes)
3,155,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,655 UART: [rt]cmd =0x44504543, len=96
3,192,977 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,082 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 ready_for_fw is high
1,175,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,615 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,037 >>> mbox cmd response: success
2,776,064 UART: [afmc] ++
2,776,232 UART: [afmc] CDI.KEYID = 6
2,776,595 UART: [afmc] SUBJECT.KEYID = 7
2,777,021 UART: [afmc] AUTHORITY.KEYID = 5
2,813,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,603 UART: [afmc] --
2,856,571 UART: [cold-reset] --
2,857,415 UART: [state] Locking Datavault
2,858,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,046 UART: [state] Locking ICCM
2,859,470 UART: [exit] Launching FMC @ 0x40000130
2,864,799 UART:
2,864,815 UART: Running Caliptra FMC ...
2,865,223 UART:
2,865,366 UART: [state] CFI Enabled
2,876,087 UART: [fht] FMC Alias Private Key: 7
2,984,242 UART: [art] Extend RT PCRs Done
2,984,670 UART: [art] Lock RT PCRs Done
2,985,978 UART: [art] Populate DV Done
2,994,413 UART: [fht] FMC Alias Private Key: 7
2,995,471 UART: [art] Derive CDI
2,995,751 UART: [art] Store in in slot 0x4
3,081,222 UART: [art] Derive Key Pair
3,081,582 UART: [art] Store priv key in slot 0x5
3,095,352 UART: [art] Derive Key Pair - Done
3,110,096 UART: [art] Signing Cert with AUTHO
3,110,576 UART: RITY.KEYID = 7
3,125,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,735 UART: [art] PUB.X = 6AB16E4CBB20376ECF06E2E770EDF16A0760B8881FE5C4B9038AEDE73DE5B145A52386E5EC5273A31942AAFC7C142966
3,133,508 UART: [art] PUB.Y = 3969174756B65F5EFB7DBA586084AAEBCB80201D612A065F0157E1A1F82E588E9A7682BFFD79B39881C2A4AEC6F656BD
3,140,462 UART: [art] SIG.R = A298D682947736E5182DDBE38DCC94543798B0219D9241611B93579786AF1FC64DE155BEAF36C8B7D1DF53EF36A0D37C
3,147,236 UART: [art] SIG.S = 6B3DEE7D3C3C7AA6D054EC11EED180395D1D161861703A2B23EEE170DA2BEF8C0699B3EC645D08EC663618A623C9DF64
3,171,307 UART: Caliptra RT
3,171,652 UART: [state] CFI Enabled
3,279,615 UART: [rt] RT listening for mailbox commands...
3,280,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,455 UART: [rt]cmd =0x44504543, len=24
3,336,695 >>> mbox cmd response data (40 bytes)
3,336,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,793 UART: [rt]cmd =0x44504543, len=96
3,374,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,571 ready_for_fw is high
1,056,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,439 >>> mbox cmd response: success
2,685,723 UART:
2,685,739 UART: Running Caliptra FMC ...
2,686,147 UART:
2,686,290 UART: [state] CFI Enabled
2,696,807 UART: [fht] FMC Alias Private Key: 7
2,804,488 UART: [art] Extend RT PCRs Done
2,804,916 UART: [art] Lock RT PCRs Done
2,806,546 UART: [art] Populate DV Done
2,814,837 UART: [fht] FMC Alias Private Key: 7
2,815,933 UART: [art] Derive CDI
2,816,213 UART: [art] Store in in slot 0x4
2,901,598 UART: [art] Derive Key Pair
2,901,958 UART: [art] Store priv key in slot 0x5
2,914,882 UART: [art] Derive Key Pair - Done
2,929,725 UART: [art] Signing Cert with AUTHO
2,930,205 UART: RITY.KEYID = 7
2,945,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,132 UART: [art] PUB.X = A4A663C893AAF531EEFA26CF59C6D7D1BC18A57C0F79EB943B2F739F89265466318A524F25C85F5460AB7DADFCF4F736
2,952,913 UART: [art] PUB.Y = 8C91717989E3943AA096416C9B40615E8C2F9BBE3431329AB3CBB1A8F7C8EE5C0991EBD6D44C3D52B2A206A36628ADC0
2,959,865 UART: [art] SIG.R = 52CDA6471C5F17E4B5C786991F88A1452431065AAC3EE2C9AABF01ACE883B1B6668DA387A84C2333D2000526E039E6E9
2,966,608 UART: [art] SIG.S = 4708E307B4DBA451D4350296467EB3B3C9D028B021BE1B3127DA93CA03AAC22D58409122037D0986AE4B4787DFFE1AA6
2,990,273 UART: Caliptra RT
2,990,618 UART: [state] CFI Enabled
3,098,693 UART: [rt] RT listening for mailbox commands...
3,099,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,341 UART: [rt]cmd =0x44504543, len=24
3,155,855 >>> mbox cmd response data (40 bytes)
3,155,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,621 UART: [rt]cmd =0x44504543, len=96
3,192,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,278 writing to cptra_bootfsm_go
193,537 UART:
193,902 UART: Running Caliptra ROM ...
195,012 UART:
195,182 UART: [state] CFI Enabled
265,438 UART: [state] LifecycleState = Unprovisioned
267,411 UART: [state] DebugLocked = No
269,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,007 UART: [kat] SHA2-256
443,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,211 UART: [kat] ++
454,661 UART: [kat] sha1
466,316 UART: [kat] SHA2-256
469,041 UART: [kat] SHA2-384
475,100 UART: [kat] SHA2-512-ACC
477,469 UART: [kat] ECC-384
2,767,821 UART: [kat] HMAC-384Kdf
2,779,912 UART: [kat] LMS
3,970,202 UART: [kat] --
3,974,134 UART: [cold-reset] ++
3,976,011 UART: [fht] Storing FHT @ 0x50003400
3,987,350 UART: [idev] ++
3,987,913 UART: [idev] CDI.KEYID = 6
3,988,828 UART: [idev] SUBJECT.KEYID = 7
3,990,075 UART: [idev] UDS.KEYID = 0
3,991,067 ready_for_fw is high
3,991,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,765 UART: [idev] Erasing UDS.KEYID = 0
7,328,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,269 UART: [idev] --
7,355,267 UART: [ldev] ++
7,355,836 UART: [ldev] CDI.KEYID = 6
7,356,774 UART: [ldev] SUBJECT.KEYID = 5
7,358,036 UART: [ldev] AUTHORITY.KEYID = 7
7,359,190 UART: [ldev] FE.KEYID = 1
7,403,620 UART: [ldev] Erasing FE.KEYID = 1
10,737,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,365 UART: [ldev] --
13,119,094 UART: [fwproc] Waiting for Commands...
13,121,895 UART: [fwproc] Received command 0x46574c44
13,124,130 UART: [fwproc] Received Image of size 114124 bytes
17,177,405 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,981 >>> mbox cmd response: success
17,641,785 UART: [afmc] ++
17,642,428 UART: [afmc] CDI.KEYID = 6
17,643,317 UART: [afmc] SUBJECT.KEYID = 7
17,644,682 UART: [afmc] AUTHORITY.KEYID = 5
21,009,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,757 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,182 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,027 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,510 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,136 UART: [afmc] --
23,381,497 UART: [cold-reset] --
23,385,792 UART: [state] Locking Datavault
23,392,665 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,412 UART: [state] Locking ICCM
23,396,752 UART: [exit] Launching FMC @ 0x40000130
23,405,143 UART:
23,405,379 UART: Running Caliptra FMC ...
23,406,476 UART:
23,406,652 UART: [state] CFI Enabled
23,468,635 UART: [fht] FMC Alias Private Key: 7
25,806,227 UART: [art] Extend RT PCRs Done
25,807,449 UART: [art] Lock RT PCRs Done
25,808,889 UART: [art] Populate DV Done
25,814,303 UART: [fht] FMC Alias Private Key: 7
25,816,002 UART: [art] Derive CDI
25,816,824 UART: [art] Store in in slot 0x4
25,876,515 UART: [art] Derive Key Pair
25,877,553 UART: [art] Store priv key in slot 0x5
29,170,011 UART: [art] Derive Key Pair - Done
29,182,844 UART: [art] Signing Cert with AUTHO
29,184,150 UART: RITY.KEYID = 7
31,471,215 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,716 UART: [art] PUB.X = 95DA912638B370683C073452BFA83EA7DEE31C7D2490E4CF07224A78D6634E588D4579D812EE132DF2F4CC1464C90322
31,479,915 UART: [art] PUB.Y = E35BE518BB0B2874D7F1CC764140159CD53E0F455830E2F6B1054F0CAD3FA9545895817DEAC03823D1DEE8E4FA3B58AF
31,487,188 UART: [art] SIG.R = 9D574F2DFF3B184F04FD663681CD8B3B658F33AD981DF6A7FDBD4A39599795FF3103DC102FF4AB65D940019F23A0C18F
31,494,586 UART: [art] SIG.S = E33ACB44FFCB949A8FDD2C307E2246DCEA2C31537FC3D9F2E3EDCFBF879D13E4CF57BA1825A6ACDC7A8F5E82C4322A3A
32,799,356 UART: Caliptra RT
32,800,042 UART: [state] CFI Enabled
32,962,208 UART: [rt] RT listening for mailbox commands...
32,964,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,994,974 UART: [rt]cmd =0x44504543, len=96
33,001,704 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,805,775 ready_for_fw is high
3,806,196 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,904,249 >>> mbox cmd response: success
23,589,282 UART:
23,589,674 UART: Running Caliptra FMC ...
23,590,790 UART:
23,590,944 UART: [state] CFI Enabled
23,657,830 UART: [fht] FMC Alias Private Key: 7
25,995,827 UART: [art] Extend RT PCRs Done
25,997,054 UART: [art] Lock RT PCRs Done
25,998,396 UART: [art] Populate DV Done
26,003,943 UART: [fht] FMC Alias Private Key: 7
26,005,660 UART: [art] Derive CDI
26,006,483 UART: [art] Store in in slot 0x4
26,066,330 UART: [art] Derive Key Pair
26,067,361 UART: [art] Store priv key in slot 0x5
29,359,907 UART: [art] Derive Key Pair - Done
29,373,282 UART: [art] Signing Cert with AUTHO
29,374,587 UART: RITY.KEYID = 7
31,660,790 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,303 UART: [art] PUB.X = A3894E66BF082F25589252C982415940208F24BC952C6C61CDF2547A7555D56FDE075A1CA578FA46415BFEBCF2BA4D3A
31,669,497 UART: [art] PUB.Y = C00DD501C56676C4D44019E3CCA6ED5D1A0639D6A89B1B654BA55169DE4C639FF7D5D427A40B68009942AAB76FFF148A
31,676,783 UART: [art] SIG.R = 599811DD61FDDCDE18B691F610EEA0ECA424C0974B8809B0632991C785C57AE9428B673FF885963E8CED8E94ACBE9A69
31,684,177 UART: [art] SIG.S = A8D060CE3850B60E75CA3B4AA74C41D66E76A908F483DAD38D4FFF66B69157568650D3D01292E7611811EC3556C97A28
32,988,556 UART: Caliptra RT
32,989,256 UART: [state] CFI Enabled
33,152,683 UART: [rt] RT listening for mailbox commands...
33,154,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,185,028 UART: [rt]cmd =0x44504543, len=96
33,191,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,426 UART:
192,794 UART: Running Caliptra ROM ...
193,973 UART:
603,505 UART: [state] CFI Enabled
621,069 UART: [state] LifecycleState = Unprovisioned
623,038 UART: [state] DebugLocked = No
624,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,572 UART: [kat] SHA2-256
800,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,885 UART: [kat] ++
811,414 UART: [kat] sha1
823,279 UART: [kat] SHA2-256
825,990 UART: [kat] SHA2-384
832,681 UART: [kat] SHA2-512-ACC
835,050 UART: [kat] ECC-384
3,120,685 UART: [kat] HMAC-384Kdf
3,132,354 UART: [kat] LMS
4,322,507 UART: [kat] --
4,328,273 UART: [cold-reset] ++
4,329,488 UART: [fht] Storing FHT @ 0x50003400
4,341,527 UART: [idev] ++
4,342,109 UART: [idev] CDI.KEYID = 6
4,343,061 UART: [idev] SUBJECT.KEYID = 7
4,344,304 UART: [idev] UDS.KEYID = 0
4,345,338 ready_for_fw is high
4,345,564 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,937 UART: [idev] Erasing UDS.KEYID = 0
7,630,338 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,528 UART: [idev] --
7,656,077 UART: [ldev] ++
7,656,652 UART: [ldev] CDI.KEYID = 6
7,657,587 UART: [ldev] SUBJECT.KEYID = 5
7,658,786 UART: [ldev] AUTHORITY.KEYID = 7
7,660,060 UART: [ldev] FE.KEYID = 1
7,670,785 UART: [ldev] Erasing FE.KEYID = 1
10,961,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,595 UART: [ldev] --
13,324,119 UART: [fwproc] Waiting for Commands...
13,325,869 UART: [fwproc] Received command 0x46574c44
13,328,103 UART: [fwproc] Received Image of size 114124 bytes
17,379,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,876 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,417 >>> mbox cmd response: success
17,843,671 UART: [afmc] ++
17,844,265 UART: [afmc] CDI.KEYID = 6
17,845,150 UART: [afmc] SUBJECT.KEYID = 7
17,846,414 UART: [afmc] AUTHORITY.KEYID = 5
21,162,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,030 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,424 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,233 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,721 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,970 UART: [afmc] --
23,531,051 UART: [cold-reset] --
23,534,158 UART: [state] Locking Datavault
23,538,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,399 UART: [state] Locking ICCM
23,542,540 UART: [exit] Launching FMC @ 0x40000130
23,550,940 UART:
23,551,170 UART: Running Caliptra FMC ...
23,552,268 UART:
23,552,420 UART: [state] CFI Enabled
23,560,328 UART: [fht] FMC Alias Private Key: 7
25,891,974 UART: [art] Extend RT PCRs Done
25,893,197 UART: [art] Lock RT PCRs Done
25,894,858 UART: [art] Populate DV Done
25,900,428 UART: [fht] FMC Alias Private Key: 7
25,901,960 UART: [art] Derive CDI
25,902,766 UART: [art] Store in in slot 0x4
25,945,350 UART: [art] Derive Key Pair
25,946,344 UART: [art] Store priv key in slot 0x5
29,187,968 UART: [art] Derive Key Pair - Done
29,201,071 UART: [art] Signing Cert with AUTHO
29,202,369 UART: RITY.KEYID = 7
31,481,539 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,173 UART: [art] PUB.X = 36569860D4D70F26511F6BE24FCA4874D88E9561E7748CD845D73A693168B6A9F14E68E5312F1408847C6AE2686E4AD5
31,490,236 UART: [art] PUB.Y = C579CADF9D6884A1B75CD2B88D2A64FECA5AEC5C7ACA80EF7BCA73335EEF6BA032FE634D326BF6F3335216B73126FA89
31,497,531 UART: [art] SIG.R = 4926C432F8675BD3A9DC40B6DDF73A0F10E3B88467F66C454E095DCAA23336B408CA16ABF792A5AB717BD487D468FFE4
31,504,892 UART: [art] SIG.S = D376F1AA6AE1A3ED277D61D52AEB28E6DF885D936A1D382A02D94BADDD64EE6C89F553F1BD6CD3D0649EBA9C540C1519
32,810,329 UART: Caliptra RT
32,811,045 UART: [state] CFI Enabled
32,929,317 UART: [rt] RT listening for mailbox commands...
32,931,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,961,956 UART: [rt]cmd =0x44504543, len=96
32,968,243 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
4,131,233 ready_for_fw is high
4,131,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,735 >>> mbox cmd response: success
23,717,591 UART:
23,717,985 UART: Running Caliptra FMC ...
23,719,299 UART:
23,719,468 UART: [state] CFI Enabled
23,727,036 UART: [fht] FMC Alias Private Key: 7
26,057,884 UART: [art] Extend RT PCRs Done
26,059,105 UART: [art] Lock RT PCRs Done
26,061,066 UART: [art] Populate DV Done
26,066,382 UART: [fht] FMC Alias Private Key: 7
26,068,112 UART: [art] Derive CDI
26,068,933 UART: [art] Store in in slot 0x4
26,111,810 UART: [art] Derive Key Pair
26,112,851 UART: [art] Store priv key in slot 0x5
29,355,316 UART: [art] Derive Key Pair - Done
29,368,043 UART: [art] Signing Cert with AUTHO
29,369,378 UART: RITY.KEYID = 7
31,649,018 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,523 UART: [art] PUB.X = 7661B059869CA49ABE7F92D0351FE7A1FC76ACC32E543C1104DAF60AE18773EA7B336E99B61005DEA87739556CA2E94A
31,657,759 UART: [art] PUB.Y = 2D7814FB012DAC87EAB94EC784B53CE759669E398613F043C2FE35C38E241BE89508C0F98D9EB6803345ABCE278FEB34
31,665,044 UART: [art] SIG.R = 603869DB3631F2A9E8056F03FBB3E2398807DF094D126F12AC5B53B0A403DC223ABE30A47366838162F5044A95BE769C
31,672,410 UART: [art] SIG.S = B230AB22C496942960AC0A5CFE5E85B0A4797EA8702BF3D28F398575A088FF261288B6872D81598F362E161D238D6162
32,977,575 UART: Caliptra RT
32,978,282 UART: [state] CFI Enabled
33,095,214 UART: [rt] RT listening for mailbox commands...
33,097,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,940 UART: [rt]cmd =0x44504543, len=96
33,134,377 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,258 UART:
192,620 UART: Running Caliptra ROM ...
193,822 UART:
193,975 UART: [state] CFI Enabled
266,496 UART: [state] LifecycleState = Unprovisioned
268,421 UART: [state] DebugLocked = No
270,806 UART: [state] WD Timer not started. Device not locked for debugging
274,344 UART: [kat] SHA2-256
453,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,038 UART: [kat] ++
465,497 UART: [kat] sha1
476,015 UART: [kat] SHA2-256
479,027 UART: [kat] SHA2-384
485,302 UART: [kat] SHA2-512-ACC
488,322 UART: [kat] ECC-384
2,945,656 UART: [kat] HMAC-384Kdf
2,971,174 UART: [kat] LMS
3,500,637 UART: [kat] --
3,504,410 UART: [cold-reset] ++
3,505,694 UART: [fht] FHT @ 0x50003400
3,515,602 UART: [idev] ++
3,516,168 UART: [idev] CDI.KEYID = 6
3,517,148 UART: [idev] SUBJECT.KEYID = 7
3,518,317 UART: [idev] UDS.KEYID = 0
3,519,240 ready_for_fw is high
3,519,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,347 UART: [idev] Erasing UDS.KEYID = 0
6,029,497 UART: [idev] Sha1 KeyId Algorithm
6,051,102 UART: [idev] --
6,055,146 UART: [ldev] ++
6,055,731 UART: [ldev] CDI.KEYID = 6
6,056,645 UART: [ldev] SUBJECT.KEYID = 5
6,057,857 UART: [ldev] AUTHORITY.KEYID = 7
6,059,089 UART: [ldev] FE.KEYID = 1
6,099,468 UART: [ldev] Erasing FE.KEYID = 1
8,599,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,437 UART: [ldev] --
10,393,489 UART: [fwproc] Wait for Commands...
10,394,988 UART: [fwproc] Recv command 0x46574c44
10,397,077 UART: [fwproc] Recv'd Img size: 114448 bytes
13,796,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,252,739 >>> mbox cmd response: success
14,257,126 UART: [afmc] ++
14,257,723 UART: [afmc] CDI.KEYID = 6
14,258,637 UART: [afmc] SUBJECT.KEYID = 7
14,259,851 UART: [afmc] AUTHORITY.KEYID = 5
16,785,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,692 UART: [afmc] --
18,583,988 UART: [cold-reset] --
18,588,546 UART: [state] Locking Datavault
18,593,905 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,623 UART: [state] Locking ICCM
18,597,319 UART: [exit] Launching FMC @ 0x40000130
18,605,712 UART:
18,605,943 UART: Running Caliptra FMC ...
18,606,971 UART:
18,607,120 UART: [state] CFI Enabled
18,666,614 UART: [fht] FMC Alias Private Key: 7
20,430,110 UART: [art] Extend RT PCRs Done
20,431,327 UART: [art] Lock RT PCRs Done
20,433,298 UART: [art] Populate DV Done
20,438,812 UART: [fht] FMC Alias Private Key: 7
20,440,399 UART: [art] Derive CDI
20,441,135 UART: [art] Store in in slot 0x4
20,498,657 UART: [art] Derive Key Pair
20,499,694 UART: [art] Store priv key in slot 0x5
22,963,010 UART: [art] Derive Key Pair - Done
22,976,126 UART: [art] Signing Cert with AUTHO
22,977,429 UART: RITY.KEYID = 7
24,688,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,536 UART: [art] PUB.X = 397969792D99E2A2EBE337BE6F4C08947CAB8083053B96658039479422BADF72E1C9E24F32D0304864772E7EF9D9B85E
24,696,784 UART: [art] PUB.Y = 8B82406D251135112D89422BD25A11E7E18005630C9F29F9398167D1F94780E0F89E991929D81D0F61967CC183714B29
24,703,985 UART: [art] SIG.R = FFBEFECB560D2E89C52E6F83E23EFC7EBE637E1CECD4164CF0E5EB6931726BA9A782B7DDDAB8113F65112D2C14D7E354
24,711,433 UART: [art] SIG.S = B99379443657FE3E04E6753FB225214ED6801B0211517B467B2605B66A0BE72C1CF3C16CD4A677E7BBE6D3EBB32E1CAE
25,690,328 UART: Caliptra RT
25,691,034 UART: [state] CFI Enabled
25,857,292 UART: [rt] RT listening for mailbox commands...
25,859,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,890,362 UART: [rt]cmd =0x44504543, len=96
25,896,635 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,359,141 ready_for_fw is high
3,359,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,296 >>> mbox cmd response: success
18,346,168 UART:
18,346,563 UART: Running Caliptra FMC ...
18,347,759 UART:
18,347,945 UART: [state] CFI Enabled
18,410,503 UART: [fht] FMC Alias Private Key: 7
20,174,221 UART: [art] Extend RT PCRs Done
20,175,435 UART: [art] Lock RT PCRs Done
20,177,066 UART: [art] Populate DV Done
20,182,537 UART: [fht] FMC Alias Private Key: 7
20,184,190 UART: [art] Derive CDI
20,184,928 UART: [art] Store in in slot 0x4
20,243,216 UART: [art] Derive Key Pair
20,244,262 UART: [art] Store priv key in slot 0x5
22,707,414 UART: [art] Derive Key Pair - Done
22,720,099 UART: [art] Signing Cert with AUTHO
22,721,405 UART: RITY.KEYID = 7
24,432,695 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,192 UART: [art] PUB.X = 6E4CCB8B162FE1C98288A2E73C6E257954529E00131A8F2717785F5BEE3EC431399681D8DCDEE2EA5EE9E0C0A4C0A401
24,441,457 UART: [art] PUB.Y = 297A62CBEC9917A648B9D79C5E7EC067164D9A5DC83D88CBC8B9D5FE1A5FA8D4DB00568E37973435D0DFA216A64A1009
24,448,734 UART: [art] SIG.R = 03DACCC9D5E9AB083B78803BF3E021E5907E0EF7F540E582F7586F8588C4F0CF1B7E69A2BD1952D9EE802F7DFA269873
24,456,152 UART: [art] SIG.S = C053540CBB12DA73BC85BBBF849BA0E6CB02C62D4F97A7D5A232CF74813E9B4FB19A00299655CB48C7BC6EF538A19913
25,434,209 UART: Caliptra RT
25,434,924 UART: [state] CFI Enabled
25,600,019 UART: [rt] RT listening for mailbox commands...
25,601,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,633,317 UART: [rt]cmd =0x44504543, len=96
25,639,748 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,498 UART:
192,860 UART: Running Caliptra ROM ...
194,038 UART:
603,480 UART: [state] CFI Enabled
619,189 UART: [state] LifecycleState = Unprovisioned
621,098 UART: [state] DebugLocked = No
623,903 UART: [state] WD Timer not started. Device not locked for debugging
627,011 UART: [kat] SHA2-256
806,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,689 UART: [kat] ++
818,128 UART: [kat] sha1
828,139 UART: [kat] SHA2-256
831,207 UART: [kat] SHA2-384
838,825 UART: [kat] SHA2-512-ACC
841,817 UART: [kat] ECC-384
3,282,745 UART: [kat] HMAC-384Kdf
3,295,544 UART: [kat] LMS
3,825,029 UART: [kat] --
3,829,449 UART: [cold-reset] ++
3,831,660 UART: [fht] FHT @ 0x50003400
3,843,999 UART: [idev] ++
3,844,557 UART: [idev] CDI.KEYID = 6
3,845,463 UART: [idev] SUBJECT.KEYID = 7
3,846,625 UART: [idev] UDS.KEYID = 0
3,847,662 ready_for_fw is high
3,847,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,511 UART: [idev] Erasing UDS.KEYID = 0
6,316,447 UART: [idev] Sha1 KeyId Algorithm
6,339,563 UART: [idev] --
6,342,532 UART: [ldev] ++
6,343,094 UART: [ldev] CDI.KEYID = 6
6,343,999 UART: [ldev] SUBJECT.KEYID = 5
6,345,200 UART: [ldev] AUTHORITY.KEYID = 7
6,346,473 UART: [ldev] FE.KEYID = 1
6,358,836 UART: [ldev] Erasing FE.KEYID = 1
8,834,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,736 UART: [ldev] --
10,624,652 UART: [fwproc] Wait for Commands...
10,627,277 UART: [fwproc] Recv command 0x46574c44
10,629,368 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,179 >>> mbox cmd response: success
14,488,142 UART: [afmc] ++
14,488,738 UART: [afmc] CDI.KEYID = 6
14,489,615 UART: [afmc] SUBJECT.KEYID = 7
14,490,762 UART: [afmc] AUTHORITY.KEYID = 5
16,994,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,349 UART: [afmc] --
18,791,949 UART: [cold-reset] --
18,794,833 UART: [state] Locking Datavault
18,800,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,034 UART: [state] Locking ICCM
18,804,314 UART: [exit] Launching FMC @ 0x40000130
18,812,698 UART:
18,812,922 UART: Running Caliptra FMC ...
18,813,936 UART:
18,814,073 UART: [state] CFI Enabled
18,822,242 UART: [fht] FMC Alias Private Key: 7
20,579,388 UART: [art] Extend RT PCRs Done
20,580,604 UART: [art] Lock RT PCRs Done
20,582,119 UART: [art] Populate DV Done
20,587,467 UART: [fht] FMC Alias Private Key: 7
20,588,994 UART: [art] Derive CDI
20,589,799 UART: [art] Store in in slot 0x4
20,632,147 UART: [art] Derive Key Pair
20,633,181 UART: [art] Store priv key in slot 0x5
23,059,624 UART: [art] Derive Key Pair - Done
23,072,838 UART: [art] Signing Cert with AUTHO
23,074,142 UART: RITY.KEYID = 7
24,779,429 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,925 UART: [art] PUB.X = F30DB3AACE74E8D1C05ABC04C476ECAC8D57E703268CB93741EB3362986C510E0270D715BCD3D724C868CCE7FF357DEB
24,788,271 UART: [art] PUB.Y = 53A7ABF19B34209272DDB04517937CC6EF09AC95D5AB3002509046FDF48233AC9D99783BBA2D53C6D3F4DD8689A69C83
24,795,532 UART: [art] SIG.R = A3DA76BF502248267653E6E947FBFABD67FC12910786ECACDD83386E3B7836DC9A69A4D2011930FFDC235D1FB04B9077
24,802,929 UART: [art] SIG.S = 1FF4B0AA689C26AAD86A57211E3D12AAF9D6E3D9ED39E531CECED0D2CC1CA20ED00BB552EABFF57F894CC55ED4AF0E35
25,782,222 UART: Caliptra RT
25,782,928 UART: [state] CFI Enabled
25,899,723 UART: [rt] RT listening for mailbox commands...
25,901,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,066 UART: [rt]cmd =0x44504543, len=96
25,938,626 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,695,517 ready_for_fw is high
3,695,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,345 >>> mbox cmd response: success
18,520,536 UART:
18,520,937 UART: Running Caliptra FMC ...
18,522,066 UART:
18,522,223 UART: [state] CFI Enabled
18,530,412 UART: [fht] FMC Alias Private Key: 7
20,287,412 UART: [art] Extend RT PCRs Done
20,288,642 UART: [art] Lock RT PCRs Done
20,290,313 UART: [art] Populate DV Done
20,295,723 UART: [fht] FMC Alias Private Key: 7
20,297,266 UART: [art] Derive CDI
20,298,072 UART: [art] Store in in slot 0x4
20,340,413 UART: [art] Derive Key Pair
20,341,413 UART: [art] Store priv key in slot 0x5
22,768,386 UART: [art] Derive Key Pair - Done
22,781,238 UART: [art] Signing Cert with AUTHO
22,782,543 UART: RITY.KEYID = 7
24,487,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,029 UART: [art] PUB.X = 5C63FA639993B5D3E0B42EE3C8A9B493C31CC9C4A79F1392F4863CD0A577849EAF20E64960511A91F142A398C3A66A03
24,496,323 UART: [art] PUB.Y = 1FAAF190EA3B1699E8EA19B36A5C80DF0185855E47E8D3A9DE42B098042865C81901EECC349580A64E363249D53B88F3
24,503,535 UART: [art] SIG.R = C6B541A611AB237A833A05371C6ADF576FD109BE2B5D7D90B9BED23CB21E6B6039B0A7C735288F1E79F55F19581E6F45
24,510,958 UART: [art] SIG.S = B1D760D80E22C469685C4E487DC98BD12E5162E6E42B61A90F6CCBFBB2111AD15CB6327128E5024F0B97B8F097C15C98
25,489,720 UART: Caliptra RT
25,490,426 UART: [state] CFI Enabled
25,607,488 UART: [rt] RT listening for mailbox commands...
25,609,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,639,953 UART: [rt]cmd =0x44504543, len=96
25,646,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,079 UART:
192,441 UART: Running Caliptra ROM ...
193,638 UART:
193,793 UART: [state] CFI Enabled
264,480 UART: [state] LifecycleState = Unprovisioned
266,901 UART: [state] DebugLocked = No
269,503 UART: [state] WD Timer not started. Device not locked for debugging
274,313 UART: [kat] SHA2-256
464,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,976 UART: [kat] ++
475,427 UART: [kat] sha1
487,152 UART: [kat] SHA2-256
490,175 UART: [kat] SHA2-384
495,521 UART: [kat] SHA2-512-ACC
498,106 UART: [kat] ECC-384
2,948,006 UART: [kat] HMAC-384Kdf
2,973,736 UART: [kat] LMS
3,505,460 UART: [kat] --
3,509,967 UART: [cold-reset] ++
3,511,258 UART: [fht] FHT @ 0x50003400
3,521,668 UART: [idev] ++
3,522,373 UART: [idev] CDI.KEYID = 6
3,523,278 UART: [idev] SUBJECT.KEYID = 7
3,524,519 UART: [idev] UDS.KEYID = 0
3,525,447 ready_for_fw is high
3,525,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,601 UART: [idev] Erasing UDS.KEYID = 0
6,029,904 UART: [idev] Sha1 KeyId Algorithm
6,052,067 UART: [idev] --
6,056,852 UART: [ldev] ++
6,057,541 UART: [ldev] CDI.KEYID = 6
6,058,453 UART: [ldev] SUBJECT.KEYID = 5
6,059,671 UART: [ldev] AUTHORITY.KEYID = 7
6,060,853 UART: [ldev] FE.KEYID = 1
6,101,634 UART: [ldev] Erasing FE.KEYID = 1
8,604,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,463 UART: [ldev] --
10,395,437 UART: [fwproc] Wait for Commands...
10,397,103 UART: [fwproc] Recv command 0x46574c44
10,399,412 UART: [fwproc] Recv'd Img size: 114448 bytes
13,846,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,041,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,584,627 >>> mbox cmd response: success
14,589,275 UART: [afmc] ++
14,590,043 UART: [afmc] CDI.KEYID = 6
14,591,236 UART: [afmc] SUBJECT.KEYID = 7
14,592,621 UART: [afmc] AUTHORITY.KEYID = 5
17,134,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,872,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,532 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,927,421 UART: [afmc] --
18,931,883 UART: [cold-reset] --
18,935,424 UART: [state] Locking Datavault
18,942,906 UART: [state] Locking PCR0, PCR1 and PCR31
18,945,045 UART: [state] Locking ICCM
18,946,602 UART: [exit] Launching FMC @ 0x40000130
18,955,269 UART:
18,955,513 UART: Running Caliptra FMC ...
18,956,616 UART:
18,956,777 UART: [state] CFI Enabled
19,013,949 UART: [fht] FMC Alias Private Key: 7
20,778,436 UART: [art] Extend RT PCRs Done
20,779,642 UART: [art] Lock RT PCRs Done
20,781,586 UART: [art] Populate DV Done
20,787,154 UART: [fht] FMC Alias Private Key: 7
20,788,691 UART: [art] Derive CDI
20,789,503 UART: [art] Store in in slot 0x4
20,847,034 UART: [art] Derive Key Pair
20,848,048 UART: [art] Store priv key in slot 0x5
23,310,851 UART: [art] Derive Key Pair - Done
23,323,950 UART: [art] Signing Cert with AUTHO
23,325,247 UART: RITY.KEYID = 7
25,037,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,038,970 UART: [art] PUB.X = 992927028775BE496344FDF6C9F346F69840B640DAC7748B32EB2A55FD3DD2865BBF5304F733704BADFCA11D337B6559
25,046,266 UART: [art] PUB.Y = 721EAAE42084F00C266E1A86B441A48641171257945C86E2A9FD0A494EA225F027B793D699D20FD8D5CFAE9C20404D7C
25,053,498 UART: [art] SIG.R = B1B3FE1A3121B764FF5B1EE0C7B81974757D7125988BFD2FCBEF5BE338C92EC3188E23047D6412F68863971447B7F75F
25,060,888 UART: [art] SIG.S = 64BE9C8DD0D6F8464ADAA9F86620D0367B1FCDB596DAA0802FCC2A37AF51CC0C5F668F9E66BC1838D27D13768D7813D1
26,039,926 UART: Caliptra RT
26,040,611 UART: [state] CFI Enabled
26,205,194 UART: [rt] RT listening for mailbox commands...
26,207,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,238,206 UART: [rt]cmd =0x44504543, len=96
26,244,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,406,197 ready_for_fw is high
3,406,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,708,824 >>> mbox cmd response: success
18,997,426 UART:
18,997,815 UART: Running Caliptra FMC ...
18,999,010 UART:
18,999,184 UART: [state] CFI Enabled
19,060,216 UART: [fht] FMC Alias Private Key: 7
20,823,687 UART: [art] Extend RT PCRs Done
20,824,907 UART: [art] Lock RT PCRs Done
20,826,535 UART: [art] Populate DV Done
20,832,103 UART: [fht] FMC Alias Private Key: 7
20,833,800 UART: [art] Derive CDI
20,834,616 UART: [art] Store in in slot 0x4
20,892,634 UART: [art] Derive Key Pair
20,893,676 UART: [art] Store priv key in slot 0x5
23,356,668 UART: [art] Derive Key Pair - Done
23,370,044 UART: [art] Signing Cert with AUTHO
23,371,349 UART: RITY.KEYID = 7
25,082,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,084,481 UART: [art] PUB.X = 3810D28F765D0D93F48DFA1DB454A04DFAC0B8B81839B7966EC460760607879C5E13E7C1DD9025014B51D251F25C7AE0
25,091,730 UART: [art] PUB.Y = 8A93DF896913702DFAF023C623BF80F8E026CE2523725E21AD93AE053A7E4FA5F32A21EA036A2659C58342E4C865D055
25,098,993 UART: [art] SIG.R = 117E414093FC12BF72E87DB03C21F39A2EB989B314295AB9F91F9768F27F94C5D767EE57F5813161F4D12AC546315F03
25,106,383 UART: [art] SIG.S = EDE051F83C241FA6931D317EB67703FD4E4B2A64DC823710C5E80ED8541CE340F7E541BFC381B6F75B40692052CBB829
26,085,706 UART: Caliptra RT
26,086,416 UART: [state] CFI Enabled
26,251,320 UART: [rt] RT listening for mailbox commands...
26,253,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,578 UART: [rt]cmd =0x44504543, len=96
26,291,239 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,319 UART:
192,712 UART: Running Caliptra ROM ...
193,827 UART:
603,612 UART: [state] CFI Enabled
616,219 UART: [state] LifecycleState = Unprovisioned
618,584 UART: [state] DebugLocked = No
620,237 UART: [state] WD Timer not started. Device not locked for debugging
624,122 UART: [kat] SHA2-256
813,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,717 UART: [kat] ++
825,236 UART: [kat] sha1
836,455 UART: [kat] SHA2-256
839,530 UART: [kat] SHA2-384
845,656 UART: [kat] SHA2-512-ACC
848,225 UART: [kat] ECC-384
3,289,010 UART: [kat] HMAC-384Kdf
3,302,184 UART: [kat] LMS
3,834,006 UART: [kat] --
3,838,603 UART: [cold-reset] ++
3,839,963 UART: [fht] FHT @ 0x50003400
3,852,566 UART: [idev] ++
3,853,197 UART: [idev] CDI.KEYID = 6
3,854,143 UART: [idev] SUBJECT.KEYID = 7
3,855,374 UART: [idev] UDS.KEYID = 0
3,856,268 ready_for_fw is high
3,856,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,202 UART: [idev] Erasing UDS.KEYID = 0
6,330,653 UART: [idev] Sha1 KeyId Algorithm
6,352,134 UART: [idev] --
6,356,157 UART: [ldev] ++
6,356,884 UART: [ldev] CDI.KEYID = 6
6,357,790 UART: [ldev] SUBJECT.KEYID = 5
6,358,939 UART: [ldev] AUTHORITY.KEYID = 7
6,360,178 UART: [ldev] FE.KEYID = 1
6,369,571 UART: [ldev] Erasing FE.KEYID = 1
8,850,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,525 UART: [ldev] --
10,643,429 UART: [fwproc] Wait for Commands...
10,646,596 UART: [fwproc] Recv command 0x46574c44
10,648,901 UART: [fwproc] Recv'd Img size: 114448 bytes
14,085,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,823,271 >>> mbox cmd response: success
14,828,012 UART: [afmc] ++
14,828,734 UART: [afmc] CDI.KEYID = 6
14,829,921 UART: [afmc] SUBJECT.KEYID = 7
14,831,351 UART: [afmc] AUTHORITY.KEYID = 5
17,340,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,191 UART: [afmc] --
19,138,940 UART: [cold-reset] --
19,142,519 UART: [state] Locking Datavault
19,148,163 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,316 UART: [state] Locking ICCM
19,151,766 UART: [exit] Launching FMC @ 0x40000130
19,160,437 UART:
19,160,684 UART: Running Caliptra FMC ...
19,161,781 UART:
19,161,930 UART: [state] CFI Enabled
19,169,700 UART: [fht] FMC Alias Private Key: 7
20,926,817 UART: [art] Extend RT PCRs Done
20,928,019 UART: [art] Lock RT PCRs Done
20,929,662 UART: [art] Populate DV Done
20,935,282 UART: [fht] FMC Alias Private Key: 7
20,936,862 UART: [art] Derive CDI
20,937,600 UART: [art] Store in in slot 0x4
20,980,182 UART: [art] Derive Key Pair
20,981,173 UART: [art] Store priv key in slot 0x5
23,408,646 UART: [art] Derive Key Pair - Done
23,421,643 UART: [art] Signing Cert with AUTHO
23,422,951 UART: RITY.KEYID = 7
25,128,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,119 UART: [art] PUB.X = BBBAE835C4083254923A0AB34DACE983947AB37D86EEC7BC91B9A970764D916B60CF96DF74CFC5E9F5F67F928AB6201D
25,137,404 UART: [art] PUB.Y = 186B6B2A9D8AA863BFAEF8403A02B0280382099701A01A9FF4EBF29CA8352181ADDE81ADD1DC6F4344256D1489E7259F
25,144,642 UART: [art] SIG.R = FC9B3E27EF5FC1148BFCDA8FB09EC799DBABC70819FA08009D9553FB456FF8863AFB73724A088202FBE7B5A0451E8BC2
25,152,022 UART: [art] SIG.S = 883EA53E0296F3DDD60E008798CC50BC3EE000BA10799CC4E3747FD247C70B3DB35F96C04E9953CDE943EDB3629DE7FA
26,131,624 UART: Caliptra RT
26,132,325 UART: [state] CFI Enabled
26,249,522 UART: [rt] RT listening for mailbox commands...
26,251,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,022 UART: [rt]cmd =0x44504543, len=96
26,288,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,758,676 ready_for_fw is high
3,759,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,971,968 >>> mbox cmd response: success
19,225,728 UART:
19,226,131 UART: Running Caliptra FMC ...
19,227,329 UART:
19,227,496 UART: [state] CFI Enabled
19,235,336 UART: [fht] FMC Alias Private Key: 7
20,992,449 UART: [art] Extend RT PCRs Done
20,993,672 UART: [art] Lock RT PCRs Done
20,995,401 UART: [art] Populate DV Done
21,000,806 UART: [fht] FMC Alias Private Key: 7
21,002,510 UART: [art] Derive CDI
21,003,326 UART: [art] Store in in slot 0x4
21,045,715 UART: [art] Derive Key Pair
21,046,759 UART: [art] Store priv key in slot 0x5
23,473,329 UART: [art] Derive Key Pair - Done
23,486,055 UART: [art] Signing Cert with AUTHO
23,487,386 UART: RITY.KEYID = 7
25,192,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,269 UART: [art] PUB.X = 268667A67C9D641B1F8638B44BF07526892F85413F621E2753545297D0AF4556FDB33C97D3315635498342BB89373A2D
25,201,487 UART: [art] PUB.Y = 091A81BD739F2193E6E8CBB4AA3CF840297D461D71B25114ED3A3C7FDA445EF419298825DF8AAE3C2D214B19BB16B520
25,208,777 UART: [art] SIG.R = ABD7A39464C8C6B00337EF7C5814941948D6D977BF0F3BCF87F2738A450DA3A7E8E625B0D2CB7AB6E719D2C2491F113A
25,216,176 UART: [art] SIG.S = 9AF45CC9513314D427E900C5D3E75D8948923711F150306B01B27115E1F9C107B5D68DFD871F250BCB2E2165CF4A5D3C
26,194,553 UART: Caliptra RT
26,195,269 UART: [state] CFI Enabled
26,311,760 UART: [rt] RT listening for mailbox commands...
26,313,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,344,537 UART: [rt]cmd =0x44504543, len=96
26,351,261 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,843 UART: [kat] SHA2-256
892,781 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,760 UART: [kat] LMS
1,475,956 UART: [kat] --
1,476,755 UART: [cold-reset] ++
1,477,161 UART: [fht] Storing FHT @ 0x50003400
1,480,146 UART: [idev] ++
1,480,314 UART: [idev] CDI.KEYID = 6
1,480,674 UART: [idev] SUBJECT.KEYID = 7
1,481,098 UART: [idev] UDS.KEYID = 0
1,481,443 ready_for_fw is high
1,481,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,924 UART: [idev] Erasing UDS.KEYID = 0
1,505,742 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,296 UART: [idev] --
1,515,455 UART: [ldev] ++
1,515,623 UART: [ldev] CDI.KEYID = 6
1,515,986 UART: [ldev] SUBJECT.KEYID = 5
1,516,412 UART: [ldev] AUTHORITY.KEYID = 7
1,516,875 UART: [ldev] FE.KEYID = 1
1,521,949 UART: [ldev] Erasing FE.KEYID = 1
1,547,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,380 UART: [ldev] --
1,586,701 UART: [fwproc] Waiting for Commands...
1,587,460 UART: [fwproc] Received command 0x46574c44
1,588,251 UART: [fwproc] Received Image of size 114448 bytes
2,888,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,335 >>> mbox cmd response: success
3,082,491 UART: [afmc] ++
3,082,659 UART: [afmc] CDI.KEYID = 6
3,083,021 UART: [afmc] SUBJECT.KEYID = 7
3,083,446 UART: [afmc] AUTHORITY.KEYID = 5
3,118,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,003 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,511 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,396 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,086 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,943 UART: [afmc] --
3,162,057 UART: [cold-reset] --
3,162,941 UART: [state] Locking Datavault
3,163,850 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,454 UART: [state] Locking ICCM
3,164,890 UART: [exit] Launching FMC @ 0x40000130
3,170,219 UART:
3,170,235 UART: Running Caliptra FMC ...
3,170,643 UART:
3,170,697 UART: [state] CFI Enabled
3,181,570 UART: [fht] FMC Alias Private Key: 7
3,289,561 UART: [art] Extend RT PCRs Done
3,289,989 UART: [art] Lock RT PCRs Done
3,291,749 UART: [art] Populate DV Done
3,300,276 UART: [fht] FMC Alias Private Key: 7
3,301,322 UART: [art] Derive CDI
3,301,602 UART: [art] Store in in slot 0x4
3,387,591 UART: [art] Derive Key Pair
3,387,951 UART: [art] Store priv key in slot 0x5
3,401,633 UART: [art] Derive Key Pair - Done
3,416,644 UART: [art] Signing Cert with AUTHO
3,417,124 UART: RITY.KEYID = 7
3,432,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,173 UART: [art] PUB.X = A5BEACE8228093A3AC9628C0576E7CA0CBD502CEED71534DA25BD03D938FEA3D34A5DCE6B81A555D85C52D7AE0339E35
3,439,960 UART: [art] PUB.Y = 88A70775CF1B8FB2A9D91F07F3F04A00212DFA04A0D40344D80FAAB4CA0325FD3DAF20F1B028620348E5649219DFBB4B
3,446,879 UART: [art] SIG.R = B52BAC6EC17F4AE7EAA7D848546615E07EF5DF866837475D4E218681B933B41BE9E7B6764F246E31895EF256390F3422
3,453,646 UART: [art] SIG.S = B822CCFDDD1E69324CD1B72FD5DDF349BF1E0FB122B2C6E9370ECB132A65990181BDE794D7EBFD4A027B641EBF06130C
3,477,327 UART: Caliptra RT
3,477,580 UART: [state] CFI Enabled
3,585,212 UART: [rt] RT listening for mailbox commands...
3,585,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,192 UART: [rt]cmd =0x44504543, len=96
3,623,391 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,855 ready_for_fw is high
1,361,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,409 >>> mbox cmd response: success
2,991,261 UART:
2,991,277 UART: Running Caliptra FMC ...
2,991,685 UART:
2,991,739 UART: [state] CFI Enabled
3,002,106 UART: [fht] FMC Alias Private Key: 7
3,109,649 UART: [art] Extend RT PCRs Done
3,110,077 UART: [art] Lock RT PCRs Done
3,111,543 UART: [art] Populate DV Done
3,119,574 UART: [fht] FMC Alias Private Key: 7
3,120,668 UART: [art] Derive CDI
3,120,948 UART: [art] Store in in slot 0x4
3,205,977 UART: [art] Derive Key Pair
3,206,337 UART: [art] Store priv key in slot 0x5
3,219,461 UART: [art] Derive Key Pair - Done
3,233,987 UART: [art] Signing Cert with AUTHO
3,234,467 UART: RITY.KEYID = 7
3,249,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,466 UART: [art] PUB.X = F54240D2C2A63779984C5AFF348B3AF1C2EAA2232427FA9584249EEC98ADD2FE960381D32CAF321EB82A83A3EAFBED04
3,257,246 UART: [art] PUB.Y = B6D38F9169023DC891EAFE07E622A730F40404F5700105EC41DA1D78B79BC4AFAA80D17DB3C9B3DCE8F747596ADF28F4
3,264,192 UART: [art] SIG.R = 51A8F561F93D3CA6A514451E3B73692192FA5D568CFEDC93A68325DF304DE6C920528743BDF4EEB544196A78D7EB9992
3,270,966 UART: [art] SIG.S = 4983EAA5E93EC3B29D430837774C0597FD7719830B791F1E444C063C0E0CA541F919A1D55494829204B5A4502DC502ED
3,294,153 UART: Caliptra RT
3,294,406 UART: [state] CFI Enabled
3,402,518 UART: [rt] RT listening for mailbox commands...
3,403,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,806 UART: [rt]cmd =0x44504543, len=96
3,441,359 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,813 UART: [idev] ++
1,479,981 UART: [idev] CDI.KEYID = 6
1,480,341 UART: [idev] SUBJECT.KEYID = 7
1,480,765 UART: [idev] UDS.KEYID = 0
1,481,110 ready_for_fw is high
1,481,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,161 UART: [idev] Erasing UDS.KEYID = 0
1,506,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,949 UART: [idev] --
1,515,944 UART: [ldev] ++
1,516,112 UART: [ldev] CDI.KEYID = 6
1,516,475 UART: [ldev] SUBJECT.KEYID = 5
1,516,901 UART: [ldev] AUTHORITY.KEYID = 7
1,517,364 UART: [ldev] FE.KEYID = 1
1,522,640 UART: [ldev] Erasing FE.KEYID = 1
1,547,485 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,935 UART: [ldev] --
1,586,248 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 114448 bytes
2,885,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,467 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,819 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,944 >>> mbox cmd response: success
3,079,028 UART: [afmc] ++
3,079,196 UART: [afmc] CDI.KEYID = 6
3,079,558 UART: [afmc] SUBJECT.KEYID = 7
3,079,983 UART: [afmc] AUTHORITY.KEYID = 5
3,115,392 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,321 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,011 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,114 UART: [afmc] --
3,159,078 UART: [cold-reset] --
3,159,916 UART: [state] Locking Datavault
3,161,149 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,753 UART: [state] Locking ICCM
3,162,379 UART: [exit] Launching FMC @ 0x40000130
3,167,708 UART:
3,167,724 UART: Running Caliptra FMC ...
3,168,132 UART:
3,168,275 UART: [state] CFI Enabled
3,178,884 UART: [fht] FMC Alias Private Key: 7
3,286,447 UART: [art] Extend RT PCRs Done
3,286,875 UART: [art] Lock RT PCRs Done
3,288,337 UART: [art] Populate DV Done
3,296,522 UART: [fht] FMC Alias Private Key: 7
3,297,518 UART: [art] Derive CDI
3,297,798 UART: [art] Store in in slot 0x4
3,383,621 UART: [art] Derive Key Pair
3,383,981 UART: [art] Store priv key in slot 0x5
3,397,691 UART: [art] Derive Key Pair - Done
3,412,460 UART: [art] Signing Cert with AUTHO
3,412,940 UART: RITY.KEYID = 7
3,427,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,247 UART: [art] PUB.X = E6A15EED0D32ADE2498C4F5893F91BFEFD2B6EF822673A468967B44F80D69196D87B4D8636AEE2806A89FCF3A62A65A0
3,435,026 UART: [art] PUB.Y = 29D77631345DC6FC92AF711CEB3E8672DBE633EA55C4FCB208D6E7E55D533C942BB6AD6DB4E15F55D83B250A547787F9
3,441,982 UART: [art] SIG.R = 3FC70B38808F57FB447030815B375C435A672B89168BC5708F18FE8D9F5E4ACF92F8591477811E3F30F6CD949C50839A
3,448,745 UART: [art] SIG.S = DD02441000FAEA3BEC26921DE564FAE139826D4CCAB6D84C37863CE160245D1DCD01D9F4CA61FA0BC9E4481AA07E855F
3,472,281 UART: Caliptra RT
3,472,626 UART: [state] CFI Enabled
3,580,149 UART: [rt] RT listening for mailbox commands...
3,580,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,345 UART: [rt]cmd =0x44504543, len=96
3,618,852 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 ready_for_fw is high
1,362,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,502 >>> mbox cmd response: success
2,991,284 UART:
2,991,300 UART: Running Caliptra FMC ...
2,991,708 UART:
2,991,851 UART: [state] CFI Enabled
3,002,296 UART: [fht] FMC Alias Private Key: 7
3,110,301 UART: [art] Extend RT PCRs Done
3,110,729 UART: [art] Lock RT PCRs Done
3,112,341 UART: [art] Populate DV Done
3,120,556 UART: [fht] FMC Alias Private Key: 7
3,121,528 UART: [art] Derive CDI
3,121,808 UART: [art] Store in in slot 0x4
3,207,425 UART: [art] Derive Key Pair
3,207,785 UART: [art] Store priv key in slot 0x5
3,220,997 UART: [art] Derive Key Pair - Done
3,235,923 UART: [art] Signing Cert with AUTHO
3,236,403 UART: RITY.KEYID = 7
3,251,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,998 UART: [art] PUB.X = 2CBA560D7CA3AE9F2C3B1FA0578D41C3CFD5AEC76BD7F0B4DB879EE6418848C5FCF083FE8FEC3D7C49E28F118ED218F6
3,258,793 UART: [art] PUB.Y = 1912BAB1D36E573E962C5C891527E116E78D87651E27FDB341E6FDFBCBF8108F077BC3DF33F91012FB617A481E3DE140
3,265,748 UART: [art] SIG.R = 8C57D7D26CAC1D787CB571AB3E1CE07FE9C713DC81B63AE1B4F6A152D70ED40909CDEA4C2988B10D66BF186E494DEEA7
3,272,528 UART: [art] SIG.S = 4378F8EEDBA43C04721F8EFA303C7A3FF826F860666ECF9C10787E6B1729E05B0635029F658628F246D8D4938D4F8B3E
3,296,446 UART: Caliptra RT
3,296,791 UART: [state] CFI Enabled
3,404,634 UART: [rt] RT listening for mailbox commands...
3,405,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,902 UART: [rt]cmd =0x44504543, len=96
3,443,275 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,456 UART: [kat] HMAC-384Kdf
923,228 UART: [kat] LMS
1,171,556 UART: [kat] --
1,172,519 UART: [cold-reset] ++
1,172,977 UART: [fht] FHT @ 0x50003400
1,175,642 UART: [idev] ++
1,175,810 UART: [idev] CDI.KEYID = 6
1,176,170 UART: [idev] SUBJECT.KEYID = 7
1,176,594 UART: [idev] UDS.KEYID = 0
1,176,939 ready_for_fw is high
1,176,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,540 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,761 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,298 UART: [ldev] SUBJECT.KEYID = 5
1,211,724 UART: [ldev] AUTHORITY.KEYID = 7
1,212,187 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,363 UART: [ldev] --
1,282,800 UART: [fwproc] Wait for Commands...
1,283,476 UART: [fwproc] Recv command 0x46574c44
1,284,204 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,034 >>> mbox cmd response: success
2,778,252 UART: [afmc] ++
2,778,420 UART: [afmc] CDI.KEYID = 6
2,778,782 UART: [afmc] SUBJECT.KEYID = 7
2,779,207 UART: [afmc] AUTHORITY.KEYID = 5
2,814,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,999 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,675 UART: [afmc] --
2,857,563 UART: [cold-reset] --
2,858,411 UART: [state] Locking Datavault
2,859,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,164 UART: [state] Locking ICCM
2,860,780 UART: [exit] Launching FMC @ 0x40000130
2,866,109 UART:
2,866,125 UART: Running Caliptra FMC ...
2,866,533 UART:
2,866,587 UART: [state] CFI Enabled
2,877,156 UART: [fht] FMC Alias Private Key: 7
2,985,055 UART: [art] Extend RT PCRs Done
2,985,483 UART: [art] Lock RT PCRs Done
2,986,537 UART: [art] Populate DV Done
2,994,768 UART: [fht] FMC Alias Private Key: 7
2,995,878 UART: [art] Derive CDI
2,996,158 UART: [art] Store in in slot 0x4
3,082,101 UART: [art] Derive Key Pair
3,082,461 UART: [art] Store priv key in slot 0x5
3,095,297 UART: [art] Derive Key Pair - Done
3,110,055 UART: [art] Signing Cert with AUTHO
3,110,535 UART: RITY.KEYID = 7
3,125,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,266 UART: [art] PUB.X = 53E9BC00E843CBCA73E0F89F4171D9A953E079FB949EC91D637886EF693C202CC422E8AABD7C1E4F4538A77FC8E35F49
3,133,026 UART: [art] PUB.Y = 03A409F0DE8D92CA2D94FD68E0A621FAFADA5448FCE037E079135A8B003832FAA86AA59722CF37098DCCEBEC9CF3EA79
3,139,967 UART: [art] SIG.R = 360AACA28B2BD1DBE4086468C45B6F606B71AE68AEEADC52D41EBEA5C7D285C4675C46087F3C0F31531E393E47E8396E
3,146,739 UART: [art] SIG.S = 9562194119D58DE3E217EE5FC129464E3BAD45F2CD22E44374298D3D2C4FEF2CAC4AC5FA692ECFC941C4D7FFE5DEEEE8
3,170,204 UART: Caliptra RT
3,170,457 UART: [state] CFI Enabled
3,277,684 UART: [rt] RT listening for mailbox commands...
3,278,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,862 UART: [rt]cmd =0x44504543, len=96
3,316,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 ready_for_fw is high
1,060,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,441 >>> mbox cmd response: success
2,690,903 UART:
2,690,919 UART: Running Caliptra FMC ...
2,691,327 UART:
2,691,381 UART: [state] CFI Enabled
2,701,890 UART: [fht] FMC Alias Private Key: 7
2,809,933 UART: [art] Extend RT PCRs Done
2,810,361 UART: [art] Lock RT PCRs Done
2,812,143 UART: [art] Populate DV Done
2,820,290 UART: [fht] FMC Alias Private Key: 7
2,821,222 UART: [art] Derive CDI
2,821,502 UART: [art] Store in in slot 0x4
2,907,165 UART: [art] Derive Key Pair
2,907,525 UART: [art] Store priv key in slot 0x5
2,921,153 UART: [art] Derive Key Pair - Done
2,935,912 UART: [art] Signing Cert with AUTHO
2,936,392 UART: RITY.KEYID = 7
2,951,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,419 UART: [art] PUB.X = 89D95647E4FA843C1C1534C14A2905E7E6F0666FD66236E3080D66684DBBEBE8F815EE3F81B4AF50889EF19A0C07AE5A
2,959,182 UART: [art] PUB.Y = 984D8C4D3C7DCD73E928D3C63CABAD9254F91E9C333A769C2C67B3100AAB4725162472FFE43E3C851BC92D9F69CD4460
2,966,139 UART: [art] SIG.R = 2353DBC875A4DA6875FDBEE30B3D5128796879364C1E2C29B3C95AEA8ECAC8CD29D30C491EF342C822BAF6159B202DA3
2,972,917 UART: [art] SIG.S = 912729471E3DD1009D2C6138EEE4D8225449BC7D0D26C3CE7851283E38DF4E52BE67DFE77D536A61B884714DAD4BB006
2,997,002 UART: Caliptra RT
2,997,255 UART: [state] CFI Enabled
3,104,242 UART: [rt] RT listening for mailbox commands...
3,104,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,474 UART: [rt]cmd =0x44504543, len=96
3,142,465 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,069 UART: [kat] LMS
1,171,397 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,556 UART: [fht] FHT @ 0x50003400
1,175,171 UART: [idev] ++
1,175,339 UART: [idev] CDI.KEYID = 6
1,175,699 UART: [idev] SUBJECT.KEYID = 7
1,176,123 UART: [idev] UDS.KEYID = 0
1,176,468 ready_for_fw is high
1,176,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,086 UART: [idev] --
1,211,324 UART: [ldev] ++
1,211,492 UART: [ldev] CDI.KEYID = 6
1,211,855 UART: [ldev] SUBJECT.KEYID = 5
1,212,281 UART: [ldev] AUTHORITY.KEYID = 7
1,212,744 UART: [ldev] FE.KEYID = 1
1,217,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,846 UART: [ldev] --
1,283,119 UART: [fwproc] Wait for Commands...
1,283,749 UART: [fwproc] Recv command 0x46574c44
1,284,477 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,101 >>> mbox cmd response: success
2,777,175 UART: [afmc] ++
2,777,343 UART: [afmc] CDI.KEYID = 6
2,777,705 UART: [afmc] SUBJECT.KEYID = 7
2,778,130 UART: [afmc] AUTHORITY.KEYID = 5
2,813,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,426 UART: [afmc] --
2,856,456 UART: [cold-reset] --
2,857,256 UART: [state] Locking Datavault
2,858,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,985 UART: [state] Locking ICCM
2,859,493 UART: [exit] Launching FMC @ 0x40000130
2,864,822 UART:
2,864,838 UART: Running Caliptra FMC ...
2,865,246 UART:
2,865,389 UART: [state] CFI Enabled
2,875,828 UART: [fht] FMC Alias Private Key: 7
2,984,739 UART: [art] Extend RT PCRs Done
2,985,167 UART: [art] Lock RT PCRs Done
2,986,561 UART: [art] Populate DV Done
2,994,696 UART: [fht] FMC Alias Private Key: 7
2,995,738 UART: [art] Derive CDI
2,996,018 UART: [art] Store in in slot 0x4
3,081,437 UART: [art] Derive Key Pair
3,081,797 UART: [art] Store priv key in slot 0x5
3,094,891 UART: [art] Derive Key Pair - Done
3,109,927 UART: [art] Signing Cert with AUTHO
3,110,407 UART: RITY.KEYID = 7
3,125,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,532 UART: [art] PUB.X = C23A5311A44A02B7EBDF3D3B8EAB3C1A28725C8A7B127C151F008FF47B8033C832209076BCA348F2A995F31F1455F157
3,133,281 UART: [art] PUB.Y = CBFADD896436203A6FB3DE7F1EE2766C17625D19BB3F171C09041672EFE5490E48F2EFCBA5A24A90DD4E19BC6D113673
3,140,236 UART: [art] SIG.R = 831C0D898C58F7E2075D7F2FD4A181D2CA16F86C2922DAF6EA16D4602B9D3A59D364E9FA0094E4C23146CF4F0546C270
3,146,981 UART: [art] SIG.S = 900398453797966582AB38608767547CD93B893A255AC2CAEB611447DA615DA22CB5690414F8DD4D8D2D790693DB8B25
3,171,137 UART: Caliptra RT
3,171,482 UART: [state] CFI Enabled
3,279,254 UART: [rt] RT listening for mailbox commands...
3,279,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,038 UART: [rt]cmd =0x44504543, len=96
3,317,413 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 ready_for_fw is high
1,060,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,206 >>> mbox cmd response: success
2,690,312 UART:
2,690,328 UART: Running Caliptra FMC ...
2,690,736 UART:
2,690,879 UART: [state] CFI Enabled
2,701,758 UART: [fht] FMC Alias Private Key: 7
2,808,945 UART: [art] Extend RT PCRs Done
2,809,373 UART: [art] Lock RT PCRs Done
2,810,779 UART: [art] Populate DV Done
2,819,178 UART: [fht] FMC Alias Private Key: 7
2,820,136 UART: [art] Derive CDI
2,820,416 UART: [art] Store in in slot 0x4
2,905,949 UART: [art] Derive Key Pair
2,906,309 UART: [art] Store priv key in slot 0x5
2,919,645 UART: [art] Derive Key Pair - Done
2,934,153 UART: [art] Signing Cert with AUTHO
2,934,633 UART: RITY.KEYID = 7
2,949,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,564 UART: [art] PUB.X = CCD2A2CB1EB88CB48E8EAF8D3EEDA8BFC67061AF2142F51B2EDD9C941AC2B5C236B9C6A98F1294BA00E50DA50819E65A
2,957,334 UART: [art] PUB.Y = 67E5CF9A00D85133821D1DB655C91F3D956B162D3C1FA4234B71D635B7AE78CC207734718DA1E97BC079CE71B8DB8ECA
2,964,272 UART: [art] SIG.R = AB416B8ECEBB8933478AE27F262A4AACF21DE25E2A4F6C0D694C72088E15636D5D284CB7A7F97F48B83F4379A486FDBE
2,971,052 UART: [art] SIG.S = 769A3494B3E9878324855053405DE11A738F81F0182B1D31F9922CB777499C27F194CA63587FC5ADE84034C6ACD0EBF2
2,995,177 UART: Caliptra RT
2,995,522 UART: [state] CFI Enabled
3,102,987 UART: [rt] RT listening for mailbox commands...
3,103,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,139 UART: [rt]cmd =0x44504543, len=96
3,141,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,174,409 ready_for_fw is high
1,174,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,673 UART: [fwproc] Recv command 0x46574c44
1,282,406 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,212 >>> mbox cmd response: success
2,775,281 UART: [afmc] ++
2,775,449 UART: [afmc] CDI.KEYID = 6
2,775,812 UART: [afmc] SUBJECT.KEYID = 7
2,776,238 UART: [afmc] AUTHORITY.KEYID = 5
2,811,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,190 UART: [afmc] --
2,855,198 UART: [cold-reset] --
2,855,934 UART: [state] Locking Datavault
2,857,003 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,607 UART: [state] Locking ICCM
2,858,159 UART: [exit] Launching FMC @ 0x40000130
2,863,488 UART:
2,863,504 UART: Running Caliptra FMC ...
2,863,912 UART:
2,863,966 UART: [state] CFI Enabled
2,874,829 UART: [fht] FMC Alias Private Key: 7
2,982,692 UART: [art] Extend RT PCRs Done
2,983,120 UART: [art] Lock RT PCRs Done
2,984,518 UART: [art] Populate DV Done
2,992,749 UART: [fht] FMC Alias Private Key: 7
2,993,725 UART: [art] Derive CDI
2,994,005 UART: [art] Store in in slot 0x4
3,079,504 UART: [art] Derive Key Pair
3,079,864 UART: [art] Store priv key in slot 0x5
3,093,326 UART: [art] Derive Key Pair - Done
3,108,454 UART: [art] Signing Cert with AUTHO
3,108,934 UART: RITY.KEYID = 7
3,124,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,211 UART: [art] PUB.X = 63DEACC5CC9A69B35B253A6991BF2A7ED1410A8A76DFA480985961B90606503FE83D93BCD815E4441E5BCEAB6F10505E
3,131,984 UART: [art] PUB.Y = 6E5D114D6E796D8FE5305C2A634FA0E5205D64275DAE2CC1B33ABCAE60E0F8CCDD101B07F2301C8E8755980DAD24D97C
3,138,944 UART: [art] SIG.R = B04E4F6D976ECDA28A5B050B266F853BDC71022ACA583AE46966DC1EFB4799FDC0BF4353B13728915B2C5C658850C31C
3,145,715 UART: [art] SIG.S = C91E531DA1E352CBB85C8D479B3FA33FD65071F0485E4520C8748B9AF12EC3A24D08741E9E799D8BEE7E3AB224F15048
3,169,373 UART: Caliptra RT
3,169,626 UART: [state] CFI Enabled
3,276,980 UART: [rt] RT listening for mailbox commands...
3,277,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,166 UART: [rt]cmd =0x44504543, len=96
3,315,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,992 ready_for_fw is high
1,055,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,290 >>> mbox cmd response: success
2,686,260 UART:
2,686,276 UART: Running Caliptra FMC ...
2,686,684 UART:
2,686,738 UART: [state] CFI Enabled
2,696,923 UART: [fht] FMC Alias Private Key: 7
2,804,622 UART: [art] Extend RT PCRs Done
2,805,050 UART: [art] Lock RT PCRs Done
2,806,440 UART: [art] Populate DV Done
2,814,611 UART: [fht] FMC Alias Private Key: 7
2,815,751 UART: [art] Derive CDI
2,816,031 UART: [art] Store in in slot 0x4
2,901,892 UART: [art] Derive Key Pair
2,902,252 UART: [art] Store priv key in slot 0x5
2,915,596 UART: [art] Derive Key Pair - Done
2,930,426 UART: [art] Signing Cert with AUTHO
2,930,906 UART: RITY.KEYID = 7
2,946,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,929 UART: [art] PUB.X = 048D4FFA14AB7DEAFF97272271C0F5E35524347D760B6C71E2F168DBEEB9649501E617014B6173BACDD854F5764FC2C7
2,953,695 UART: [art] PUB.Y = 74D87A01E0D608E72C7D18EAB580600ABB43E82AB42335D9D6A1DA3DE9CC1C0BBC95D31C055121AA0C1D5A3C7B1025B4
2,960,643 UART: [art] SIG.R = C50744917BB8A23F97C8B600A054D3F374B381165625D287403AF64BD00C5686A26FCE02B83E9500AA0E2435C4BA1E7B
2,967,357 UART: [art] SIG.S = A1DE91F83F071E2D118A23B98EDAF8E65FDC24560727918C3C01B84B52BA82F20BACE12A436D7594ED6E199CD8419EBC
2,991,070 UART: Caliptra RT
2,991,323 UART: [state] CFI Enabled
3,099,431 UART: [rt] RT listening for mailbox commands...
3,100,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,411 UART: [rt]cmd =0x44504543, len=96
3,137,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 ready_for_fw is high
1,174,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,376 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,299 >>> mbox cmd response: success
2,776,468 UART: [afmc] ++
2,776,636 UART: [afmc] CDI.KEYID = 6
2,776,999 UART: [afmc] SUBJECT.KEYID = 7
2,777,425 UART: [afmc] AUTHORITY.KEYID = 5
2,813,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,403 UART: [afmc] --
2,856,369 UART: [cold-reset] --
2,857,325 UART: [state] Locking Datavault
2,858,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,064 UART: [state] Locking ICCM
2,859,648 UART: [exit] Launching FMC @ 0x40000130
2,864,977 UART:
2,864,993 UART: Running Caliptra FMC ...
2,865,401 UART:
2,865,544 UART: [state] CFI Enabled
2,876,237 UART: [fht] FMC Alias Private Key: 7
2,984,198 UART: [art] Extend RT PCRs Done
2,984,626 UART: [art] Lock RT PCRs Done
2,985,942 UART: [art] Populate DV Done
2,994,161 UART: [fht] FMC Alias Private Key: 7
2,995,213 UART: [art] Derive CDI
2,995,493 UART: [art] Store in in slot 0x4
3,081,620 UART: [art] Derive Key Pair
3,081,980 UART: [art] Store priv key in slot 0x5
3,094,820 UART: [art] Derive Key Pair - Done
3,109,795 UART: [art] Signing Cert with AUTHO
3,110,275 UART: RITY.KEYID = 7
3,125,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,134 UART: [art] PUB.X = FF8BFF0165F5F7027300C700DDFF18AB04D1945E9F7BD7870D84BB2906977246297179722E21063A4328B8353765814A
3,132,832 UART: [art] PUB.Y = 9017D1B482698C8C4C71CDAFAEDA036822F833DBD27A98F28E3A6E6AB247BC475C9235E2A42BE0087B22587118F6413D
3,139,782 UART: [art] SIG.R = 91A05CC9AF0E5007270EC2402FD4B46CA84B6B174730725A46BA8BA47AC03097CC011C37212AE2F24E0CE05AADC16BDB
3,146,551 UART: [art] SIG.S = 74E17B46DB18EEBF041EAF9D1A96DA32AC5A833EED8EC9C9099F191B101F2D5D920A9F009DD4F5F7203BF88DE12E5A35
3,170,839 UART: Caliptra RT
3,171,184 UART: [state] CFI Enabled
3,278,177 UART: [rt] RT listening for mailbox commands...
3,278,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,361 UART: [rt]cmd =0x44504543, len=96
3,316,792 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,325 ready_for_fw is high
1,057,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,981 >>> mbox cmd response: success
2,687,005 UART:
2,687,021 UART: Running Caliptra FMC ...
2,687,429 UART:
2,687,572 UART: [state] CFI Enabled
2,698,109 UART: [fht] FMC Alias Private Key: 7
2,806,838 UART: [art] Extend RT PCRs Done
2,807,266 UART: [art] Lock RT PCRs Done
2,808,802 UART: [art] Populate DV Done
2,817,067 UART: [fht] FMC Alias Private Key: 7
2,818,043 UART: [art] Derive CDI
2,818,323 UART: [art] Store in in slot 0x4
2,903,698 UART: [art] Derive Key Pair
2,904,058 UART: [art] Store priv key in slot 0x5
2,917,246 UART: [art] Derive Key Pair - Done
2,932,082 UART: [art] Signing Cert with AUTHO
2,932,562 UART: RITY.KEYID = 7
2,947,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,227 UART: [art] PUB.X = B5FB2DA40ABBD0D94D86073405F64CA4372F17AF7EF10C8F1D09124B50E788658A02200B3BF76C59D3B0184D4BB2E0AE
2,954,988 UART: [art] PUB.Y = B94A7B3910F813090803C4905A18E62EA5C131B162F744DEA1B906B6161586A9339F37B7C64DC7189D7B3AC08FFAF483
2,961,926 UART: [art] SIG.R = C7679CEFE2BBF756F4D1288FB31B03F6DEF6B76E26661BB92B4427EAAFD3D9DC07DACAAAF1E153E581343DA5C365AF90
2,968,716 UART: [art] SIG.S = C7696BEE32AEFF829592C5127EF52DA2F72F62E496558CAE68604968CDF9D37F783A44AF49282DA9A581DCFEAA05ECFB
2,992,322 UART: Caliptra RT
2,992,667 UART: [state] CFI Enabled
3,099,767 UART: [rt] RT listening for mailbox commands...
3,100,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,029 UART: [rt]cmd =0x44504543, len=96
3,138,262 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,145 UART:
192,499 UART: Running Caliptra ROM ...
193,684 UART:
193,841 UART: [state] CFI Enabled
264,791 UART: [state] LifecycleState = Unprovisioned
266,710 UART: [state] DebugLocked = No
269,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,536 UART: [kat] SHA2-256
443,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,710 UART: [kat] ++
454,161 UART: [kat] sha1
464,540 UART: [kat] SHA2-256
467,245 UART: [kat] SHA2-384
472,886 UART: [kat] SHA2-512-ACC
475,258 UART: [kat] ECC-384
2,766,306 UART: [kat] HMAC-384Kdf
2,778,197 UART: [kat] LMS
3,968,483 UART: [kat] --
3,973,781 UART: [cold-reset] ++
3,975,925 UART: [fht] Storing FHT @ 0x50003400
3,987,991 UART: [idev] ++
3,988,604 UART: [idev] CDI.KEYID = 6
3,989,496 UART: [idev] SUBJECT.KEYID = 7
3,990,814 UART: [idev] UDS.KEYID = 0
3,991,777 ready_for_fw is high
3,991,990 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,880 UART: [idev] Erasing UDS.KEYID = 0
7,327,954 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,017 UART: [idev] --
7,354,206 UART: [ldev] ++
7,354,785 UART: [ldev] CDI.KEYID = 6
7,355,749 UART: [ldev] SUBJECT.KEYID = 5
7,356,964 UART: [ldev] AUTHORITY.KEYID = 7
7,358,193 UART: [ldev] FE.KEYID = 1
7,400,759 UART: [ldev] Erasing FE.KEYID = 1
10,734,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,372 UART: [ldev] --
13,117,719 UART: [fwproc] Waiting for Commands...
13,121,113 UART: [fwproc] Received command 0x46574c44
13,123,293 UART: [fwproc] Received Image of size 114124 bytes
17,179,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,022 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,646,080 >>> mbox cmd response: success
17,649,675 UART: [afmc] ++
17,650,268 UART: [afmc] CDI.KEYID = 6
17,651,183 UART: [afmc] SUBJECT.KEYID = 7
17,652,454 UART: [afmc] AUTHORITY.KEYID = 5
21,006,713 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,486 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,871 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,726 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,221 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,558 UART: [afmc] --
23,379,153 UART: [cold-reset] --
23,383,940 UART: [state] Locking Datavault
23,388,698 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,453 UART: [state] Locking ICCM
23,392,769 UART: [exit] Launching FMC @ 0x40000130
23,401,162 UART:
23,401,403 UART: Running Caliptra FMC ...
23,402,451 UART:
23,402,603 UART: [state] CFI Enabled
23,465,939 UART: [fht] FMC Alias Private Key: 7
25,804,163 UART: [art] Extend RT PCRs Done
25,805,382 UART: [art] Lock RT PCRs Done
25,807,112 UART: [art] Populate DV Done
25,812,414 UART: [fht] FMC Alias Private Key: 7
25,813,977 UART: [art] Derive CDI
25,814,740 UART: [art] Store in in slot 0x4
25,875,184 UART: [art] Derive Key Pair
25,876,225 UART: [art] Store priv key in slot 0x5
29,168,963 UART: [art] Derive Key Pair - Done
29,181,849 UART: [art] Signing Cert with AUTHO
29,183,177 UART: RITY.KEYID = 7
31,471,233 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,734 UART: [art] PUB.X = C969DE3B779C5BC21A36A15FCE46078E10ED1DE2BA1983E4E6E05C56DEC62CAA2B48BCF88271B282028368E017B40B2D
31,479,949 UART: [art] PUB.Y = B0C3A209549F195339F99FA5262117AE9BF405C3206C85ACD84875AAD5C18357C6D30AA307B3D99BFF4192949D26257A
31,487,186 UART: [art] SIG.R = 0E4BE985744DC137F3AA64D5D30B268263CE2AC851F407E38F0A74687BC2EFD3F976A0A583CA746946C0BB6A7987A636
31,494,586 UART: [art] SIG.S = 242D841145C94BF2B1193980F39A9546FB7F139059FBABAF7D9F1CCA7167A6050D8555181FD7DA7D5C32AB59685D751D
32,799,393 UART: Caliptra RT
32,800,089 UART: [state] CFI Enabled
32,961,294 UART: [rt] RT listening for mailbox commands...
32,963,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,993,769 UART: [rt]cmd =0x4d454153, len=108
33,012,281 >>> mbox cmd response data (12 bytes)
33,012,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,043,500 UART: [rt]cmd =0x4d454153, len=108
33,061,774 >>> mbox cmd response data (12 bytes)
33,062,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,092,910 UART: [rt]cmd =0x4d454153, len=108
33,111,479 >>> mbox cmd response data (12 bytes)
33,111,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,142,432 UART: [rt]cmd =0x4d454153, len=108
33,161,100 >>> mbox cmd response data (12 bytes)
33,161,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,192,232 UART: [rt]cmd =0x4d454153, len=108
33,211,192 >>> mbox cmd response data (12 bytes)
33,211,621 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,242,594 UART: [rt]cmd =0x4d454153, len=108
33,261,378 >>> mbox cmd response data (12 bytes)
33,262,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,292,515 UART: [rt]cmd =0x4d454153, len=108
33,311,010 >>> mbox cmd response data (12 bytes)
33,311,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,342,151 UART: [rt]cmd =0x4d454153, len=108
33,360,026 >>> mbox cmd response data (12 bytes)
33,360,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,390,991 UART: [rt]cmd =0x4d454153, len=108
33,409,383 >>> mbox cmd response data (12 bytes)
33,409,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,440,458 UART: [rt]cmd =0x4d454153, len=108
33,458,662 >>> mbox cmd response data (12 bytes)
33,459,092 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,489,794 UART: [rt]cmd =0x4d454153, len=108
33,508,674 >>> mbox cmd response data (12 bytes)
33,509,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,539,799 UART: [rt]cmd =0x4d454153, len=108
33,557,919 >>> mbox cmd response data (12 bytes)
33,558,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,589,003 UART: [rt]cmd =0x4d454153, len=108
33,607,375 >>> mbox cmd response data (12 bytes)
33,607,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,638,500 UART: [rt]cmd =0x4d454153, len=108
33,657,151 >>> mbox cmd response data (12 bytes)
33,657,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,688,012 UART: [rt]cmd =0x4d454153, len=108
33,706,648 >>> mbox cmd response data (12 bytes)
33,707,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,737,840 UART: [rt]cmd =0x4d454153, len=108
33,740,116 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,148 writing to cptra_bootfsm_go
3,803,827 ready_for_fw is high
3,804,354 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,541 >>> mbox cmd response: success
23,562,662 UART:
23,563,071 UART: Running Caliptra FMC ...
23,564,195 UART:
23,564,352 UART: [state] CFI Enabled
23,635,451 UART: [fht] FMC Alias Private Key: 7
25,973,273 UART: [art] Extend RT PCRs Done
25,974,495 UART: [art] Lock RT PCRs Done
25,976,259 UART: [art] Populate DV Done
25,981,622 UART: [fht] FMC Alias Private Key: 7
25,983,274 UART: [art] Derive CDI
25,984,013 UART: [art] Store in in slot 0x4
26,044,420 UART: [art] Derive Key Pair
26,045,465 UART: [art] Store priv key in slot 0x5
29,338,398 UART: [art] Derive Key Pair - Done
29,351,826 UART: [art] Signing Cert with AUTHO
29,353,133 UART: RITY.KEYID = 7
31,640,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,088 UART: [art] PUB.X = 0BD36AAA5E70FFF306FA4C4A3891672F2E3F74A286EAA7772E2E2198863318EE00D9F6A1D12049F0D6DF67A59E0445A9
31,649,290 UART: [art] PUB.Y = 65441AA594DAF9E0E7ECF0D22E189A4FA9DA4B4083B648BE441A44027906B6D10FFC34A0360F47ADA2864E2EB5D07ECD
31,656,534 UART: [art] SIG.R = EDCBFFFB2013256A12954E0B5A468316DB84F6E4644A5D1FE57473A3E98452CDA46FC6E2B4D4086645C6DE0077F2BEA9
31,663,933 UART: [art] SIG.S = 7B55B1076EC8E5BFF5C365918780998416F9247B94A5E645767CE60E96549DD1EE9901F8EAD14DA08AF08847253B459A
32,969,487 UART: Caliptra RT
32,970,197 UART: [state] CFI Enabled
33,131,589 UART: [rt] RT listening for mailbox commands...
33,133,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,000 UART: [rt]cmd =0x4d454153, len=108
33,182,566 >>> mbox cmd response data (12 bytes)
33,183,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,213,698 UART: [rt]cmd =0x4d454153, len=108
33,232,122 >>> mbox cmd response data (12 bytes)
33,232,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,263,108 UART: [rt]cmd =0x4d454153, len=108
33,281,738 >>> mbox cmd response data (12 bytes)
33,282,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,313,082 UART: [rt]cmd =0x4d454153, len=108
33,331,117 >>> mbox cmd response data (12 bytes)
33,331,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,362,111 UART: [rt]cmd =0x4d454153, len=108
33,379,998 >>> mbox cmd response data (12 bytes)
33,380,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,410,980 UART: [rt]cmd =0x4d454153, len=108
33,429,750 >>> mbox cmd response data (12 bytes)
33,430,171 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,460,668 UART: [rt]cmd =0x4d454153, len=108
33,479,097 >>> mbox cmd response data (12 bytes)
33,479,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,510,241 UART: [rt]cmd =0x4d454153, len=108
33,528,644 >>> mbox cmd response data (12 bytes)
33,529,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,559,833 UART: [rt]cmd =0x4d454153, len=108
33,578,230 >>> mbox cmd response data (12 bytes)
33,578,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,609,200 UART: [rt]cmd =0x4d454153, len=108
33,626,868 >>> mbox cmd response data (12 bytes)
33,627,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,657,892 UART: [rt]cmd =0x4d454153, len=108
33,676,282 >>> mbox cmd response data (12 bytes)
33,676,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,707,254 UART: [rt]cmd =0x4d454153, len=108
33,726,598 >>> mbox cmd response data (12 bytes)
33,727,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,757,843 UART: [rt]cmd =0x4d454153, len=108
33,775,753 >>> mbox cmd response data (12 bytes)
33,776,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,806,835 UART: [rt]cmd =0x4d454153, len=108
33,825,392 >>> mbox cmd response data (12 bytes)
33,825,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,856,218 UART: [rt]cmd =0x4d454153, len=108
33,875,256 >>> mbox cmd response data (12 bytes)
33,875,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,906,352 UART: [rt]cmd =0x4d454153, len=108
33,908,634 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,540 UART:
192,894 UART: Running Caliptra ROM ...
194,091 UART:
603,509 UART: [state] CFI Enabled
617,809 UART: [state] LifecycleState = Unprovisioned
619,729 UART: [state] DebugLocked = No
622,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,544 UART: [kat] SHA2-256
797,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,823 UART: [kat] ++
808,359 UART: [kat] sha1
818,385 UART: [kat] SHA2-256
821,107 UART: [kat] SHA2-384
826,949 UART: [kat] SHA2-512-ACC
829,260 UART: [kat] ECC-384
3,112,998 UART: [kat] HMAC-384Kdf
3,126,224 UART: [kat] LMS
4,316,313 UART: [kat] --
4,320,616 UART: [cold-reset] ++
4,322,763 UART: [fht] Storing FHT @ 0x50003400
4,333,813 UART: [idev] ++
4,334,373 UART: [idev] CDI.KEYID = 6
4,335,274 UART: [idev] SUBJECT.KEYID = 7
4,336,515 UART: [idev] UDS.KEYID = 0
4,337,545 ready_for_fw is high
4,337,738 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,053 UART: [idev] Erasing UDS.KEYID = 0
7,631,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,496 UART: [idev] --
7,655,952 UART: [ldev] ++
7,656,592 UART: [ldev] CDI.KEYID = 6
7,657,472 UART: [ldev] SUBJECT.KEYID = 5
7,658,731 UART: [ldev] AUTHORITY.KEYID = 7
7,660,534 UART: [ldev] FE.KEYID = 1
7,671,864 UART: [ldev] Erasing FE.KEYID = 1
10,964,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,185 UART: [ldev] --
13,325,277 UART: [fwproc] Waiting for Commands...
13,328,602 UART: [fwproc] Received command 0x46574c44
13,330,776 UART: [fwproc] Received Image of size 114124 bytes
17,383,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,397 >>> mbox cmd response: success
17,845,908 UART: [afmc] ++
17,846,503 UART: [afmc] CDI.KEYID = 6
17,847,516 UART: [afmc] SUBJECT.KEYID = 7
17,848,667 UART: [afmc] AUTHORITY.KEYID = 5
21,162,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,095 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,505 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,326 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,798 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,161 UART: [afmc] --
23,527,858 UART: [cold-reset] --
23,531,451 UART: [state] Locking Datavault
23,537,343 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,110 UART: [state] Locking ICCM
23,540,236 UART: [exit] Launching FMC @ 0x40000130
23,548,636 UART:
23,548,874 UART: Running Caliptra FMC ...
23,549,971 UART:
23,550,138 UART: [state] CFI Enabled
23,558,339 UART: [fht] FMC Alias Private Key: 7
25,889,795 UART: [art] Extend RT PCRs Done
25,891,016 UART: [art] Lock RT PCRs Done
25,892,748 UART: [art] Populate DV Done
25,898,261 UART: [fht] FMC Alias Private Key: 7
25,899,784 UART: [art] Derive CDI
25,900,529 UART: [art] Store in in slot 0x4
25,943,336 UART: [art] Derive Key Pair
25,944,331 UART: [art] Store priv key in slot 0x5
29,186,753 UART: [art] Derive Key Pair - Done
29,199,662 UART: [art] Signing Cert with AUTHO
29,200,958 UART: RITY.KEYID = 7
31,480,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,179 UART: [art] PUB.X = C85AB453A102937AA611F12BC6116BD73B4F7FF9E8588668DE359026850D171C2576C555A32289378A65A5FF3AEAE2EE
31,489,407 UART: [art] PUB.Y = 6F900D34A47A8833B1768B6FA8F5687032729A392CB99BBF485B74F118C59A896781B8141CA52D897107CF7F1FFE5095
31,496,605 UART: [art] SIG.R = 148C3548A2C3CD38F1F285FB46BD18314FF76B2D2BFADDDB7B2B8FFC0C44092F3B38C418C4290C92C8D041B33010AFD6
31,504,021 UART: [art] SIG.S = B55B3303A065C08471356C798E8D61D5F5DF7202988A8E22FA20EAFFC26028F6F159A4D71279E0B8D24B9BC8BAAEFF48
32,809,176 UART: Caliptra RT
32,809,885 UART: [state] CFI Enabled
32,926,956 UART: [rt] RT listening for mailbox commands...
32,928,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,959,399 UART: [rt]cmd =0x4d454153, len=108
32,977,761 >>> mbox cmd response data (12 bytes)
32,978,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,008,750 UART: [rt]cmd =0x4d454153, len=108
33,026,349 >>> mbox cmd response data (12 bytes)
33,026,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,057,600 UART: [rt]cmd =0x4d454153, len=108
33,075,989 >>> mbox cmd response data (12 bytes)
33,076,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,106,859 UART: [rt]cmd =0x4d454153, len=108
33,125,221 >>> mbox cmd response data (12 bytes)
33,125,655 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,156,134 UART: [rt]cmd =0x4d454153, len=108
33,174,355 >>> mbox cmd response data (12 bytes)
33,174,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,205,376 UART: [rt]cmd =0x4d454153, len=108
33,224,013 >>> mbox cmd response data (12 bytes)
33,224,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,255,143 UART: [rt]cmd =0x4d454153, len=108
33,274,080 >>> mbox cmd response data (12 bytes)
33,274,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,305,106 UART: [rt]cmd =0x4d454153, len=108
33,324,087 >>> mbox cmd response data (12 bytes)
33,324,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,355,052 UART: [rt]cmd =0x4d454153, len=108
33,373,531 >>> mbox cmd response data (12 bytes)
33,373,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,404,610 UART: [rt]cmd =0x4d454153, len=108
33,423,373 >>> mbox cmd response data (12 bytes)
33,423,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,454,587 UART: [rt]cmd =0x4d454153, len=108
33,473,346 >>> mbox cmd response data (12 bytes)
33,473,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,504,480 UART: [rt]cmd =0x4d454153, len=108
33,523,005 >>> mbox cmd response data (12 bytes)
33,523,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,554,195 UART: [rt]cmd =0x4d454153, len=108
33,573,021 >>> mbox cmd response data (12 bytes)
33,573,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,604,069 UART: [rt]cmd =0x4d454153, len=108
33,623,091 >>> mbox cmd response data (12 bytes)
33,623,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,654,050 UART: [rt]cmd =0x4d454153, len=108
33,672,390 >>> mbox cmd response data (12 bytes)
33,672,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,703,452 UART: [rt]cmd =0x4d454153, len=108
33,705,621 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,128,538 ready_for_fw is high
4,129,194 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,983 >>> mbox cmd response: success
23,722,041 UART:
23,722,428 UART: Running Caliptra FMC ...
23,723,556 UART:
23,723,717 UART: [state] CFI Enabled
23,731,807 UART: [fht] FMC Alias Private Key: 7
26,062,585 UART: [art] Extend RT PCRs Done
26,063,808 UART: [art] Lock RT PCRs Done
26,065,377 UART: [art] Populate DV Done
26,070,411 UART: [fht] FMC Alias Private Key: 7
26,072,110 UART: [art] Derive CDI
26,072,922 UART: [art] Store in in slot 0x4
26,115,688 UART: [art] Derive Key Pair
26,116,751 UART: [art] Store priv key in slot 0x5
29,358,652 UART: [art] Derive Key Pair - Done
29,372,033 UART: [art] Signing Cert with AUTHO
29,373,334 UART: RITY.KEYID = 7
31,652,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,483 UART: [art] PUB.X = 183B78AD1F3E7F1E8F7FB78E328B19ECB787D0D7FF6E0D8B99A134472BDA325C66D9B4381D7810BEA289C750B5906496
31,661,769 UART: [art] PUB.Y = 3D2AA93D6AE0D63C65B6F58894004CD544B37C9DEB16038076D5423BDD2E29B5F97A5231F65EA0136D318ED15FF95C74
31,669,019 UART: [art] SIG.R = BA3480265C48E4646A5D0F1AAB7186F31FA32754288D50737ACD3888AEFFC843A458033F7914200FDE2831EF52561FE1
31,676,376 UART: [art] SIG.S = 1840C29C90C0FD0B4430F0F39524F84E49030C293740B87663E7C8CDA51AB11D81E9151725BB8CF878989DBA637A6C54
32,981,176 UART: Caliptra RT
32,981,878 UART: [state] CFI Enabled
33,099,931 UART: [rt] RT listening for mailbox commands...
33,101,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,132,489 UART: [rt]cmd =0x4d454153, len=108
33,150,568 >>> mbox cmd response data (12 bytes)
33,151,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,181,808 UART: [rt]cmd =0x4d454153, len=108
33,200,045 >>> mbox cmd response data (12 bytes)
33,200,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,231,148 UART: [rt]cmd =0x4d454153, len=108
33,249,360 >>> mbox cmd response data (12 bytes)
33,249,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,280,381 UART: [rt]cmd =0x4d454153, len=108
33,298,898 >>> mbox cmd response data (12 bytes)
33,299,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,330,089 UART: [rt]cmd =0x4d454153, len=108
33,348,460 >>> mbox cmd response data (12 bytes)
33,348,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,379,751 UART: [rt]cmd =0x4d454153, len=108
33,398,204 >>> mbox cmd response data (12 bytes)
33,398,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,429,310 UART: [rt]cmd =0x4d454153, len=108
33,447,393 >>> mbox cmd response data (12 bytes)
33,447,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,478,526 UART: [rt]cmd =0x4d454153, len=108
33,497,160 >>> mbox cmd response data (12 bytes)
33,497,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,528,232 UART: [rt]cmd =0x4d454153, len=108
33,546,995 >>> mbox cmd response data (12 bytes)
33,547,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,578,624 UART: [rt]cmd =0x4d454153, len=108
33,596,489 >>> mbox cmd response data (12 bytes)
33,596,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,627,644 UART: [rt]cmd =0x4d454153, len=108
33,646,013 >>> mbox cmd response data (12 bytes)
33,646,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,676,878 UART: [rt]cmd =0x4d454153, len=108
33,695,477 >>> mbox cmd response data (12 bytes)
33,695,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,726,705 UART: [rt]cmd =0x4d454153, len=108
33,745,130 >>> mbox cmd response data (12 bytes)
33,745,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,776,305 UART: [rt]cmd =0x4d454153, len=108
33,794,479 >>> mbox cmd response data (12 bytes)
33,794,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,825,470 UART: [rt]cmd =0x4d454153, len=108
33,844,072 >>> mbox cmd response data (12 bytes)
33,844,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,874,941 UART: [rt]cmd =0x4d454153, len=108
33,877,254 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,158 UART:
192,534 UART: Running Caliptra ROM ...
193,638 UART:
193,781 UART: [state] CFI Enabled
261,984 UART: [state] LifecycleState = Unprovisioned
263,903 UART: [state] DebugLocked = No
266,275 UART: [state] WD Timer not started. Device not locked for debugging
269,529 UART: [kat] SHA2-256
448,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,280 UART: [kat] ++
460,726 UART: [kat] sha1
471,932 UART: [kat] SHA2-256
475,006 UART: [kat] SHA2-384
482,169 UART: [kat] SHA2-512-ACC
485,103 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,970,861 UART: [kat] LMS
3,500,282 UART: [kat] --
3,505,985 UART: [cold-reset] ++
3,508,577 UART: [fht] FHT @ 0x50003400
3,519,416 UART: [idev] ++
3,519,988 UART: [idev] CDI.KEYID = 6
3,520,898 UART: [idev] SUBJECT.KEYID = 7
3,522,144 UART: [idev] UDS.KEYID = 0
3,523,067 ready_for_fw is high
3,523,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,163 UART: [idev] Erasing UDS.KEYID = 0
6,030,744 UART: [idev] Sha1 KeyId Algorithm
6,054,131 UART: [idev] --
6,057,547 UART: [ldev] ++
6,058,122 UART: [ldev] CDI.KEYID = 6
6,059,035 UART: [ldev] SUBJECT.KEYID = 5
6,060,252 UART: [ldev] AUTHORITY.KEYID = 7
6,061,664 UART: [ldev] FE.KEYID = 1
6,100,775 UART: [ldev] Erasing FE.KEYID = 1
8,605,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,107 UART: [ldev] --
10,415,557 UART: [fwproc] Wait for Commands...
10,417,602 UART: [fwproc] Recv command 0x46574c44
10,419,688 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,280,499 >>> mbox cmd response: success
14,285,420 UART: [afmc] ++
14,286,014 UART: [afmc] CDI.KEYID = 6
14,286,906 UART: [afmc] SUBJECT.KEYID = 7
14,288,116 UART: [afmc] AUTHORITY.KEYID = 5
16,828,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,237 UART: [afmc] --
18,626,974 UART: [cold-reset] --
18,630,514 UART: [state] Locking Datavault
18,636,316 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,964 UART: [state] Locking ICCM
18,639,231 UART: [exit] Launching FMC @ 0x40000130
18,647,675 UART:
18,647,908 UART: Running Caliptra FMC ...
18,648,933 UART:
18,649,080 UART: [state] CFI Enabled
18,710,311 UART: [fht] FMC Alias Private Key: 7
20,474,670 UART: [art] Extend RT PCRs Done
20,475,893 UART: [art] Lock RT PCRs Done
20,477,653 UART: [art] Populate DV Done
20,482,905 UART: [fht] FMC Alias Private Key: 7
20,484,394 UART: [art] Derive CDI
20,485,157 UART: [art] Store in in slot 0x4
20,543,406 UART: [art] Derive Key Pair
20,544,449 UART: [art] Store priv key in slot 0x5
23,006,976 UART: [art] Derive Key Pair - Done
23,019,980 UART: [art] Signing Cert with AUTHO
23,021,285 UART: RITY.KEYID = 7
24,733,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,630 UART: [art] PUB.X = C963C3368387153020A7DBF43184396CA7F630E85E0D9935661290A1F460C1410723D5DA562AC8304D47748508C90469
24,741,823 UART: [art] PUB.Y = 459618419C2E0229AD5A35D99B354B8AAA19342BD3498D740A21A25B506BAEE405B37D150A598E8816AA2772613F2351
24,749,106 UART: [art] SIG.R = 70F9357DF6BABFB22E4C6B827D4A9130726DF8F798E39FD65E5DAA411F18EA69435F709520CE542D8982E2FB2F487B10
24,756,493 UART: [art] SIG.S = 70B60586A4BBF6835F0AD9443CDDE9454281E70D5B5C655D7232D6EB1C6236E6964E6146A682B23E3D91F338302D5FB1
25,735,297 UART: Caliptra RT
25,736,009 UART: [state] CFI Enabled
25,899,994 UART: [rt] RT listening for mailbox commands...
25,902,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,933,351 UART: [rt]cmd =0x4d454153, len=108
25,952,322 >>> mbox cmd response data (12 bytes)
25,952,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,983,442 UART: [rt]cmd =0x4d454153, len=108
26,001,677 >>> mbox cmd response data (12 bytes)
26,002,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,032,840 UART: [rt]cmd =0x4d454153, len=108
26,050,851 >>> mbox cmd response data (12 bytes)
26,051,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,081,838 UART: [rt]cmd =0x4d454153, len=108
26,100,427 >>> mbox cmd response data (12 bytes)
26,100,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,131,558 UART: [rt]cmd =0x4d454153, len=108
26,150,017 >>> mbox cmd response data (12 bytes)
26,150,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,181,082 UART: [rt]cmd =0x4d454153, len=108
26,199,748 >>> mbox cmd response data (12 bytes)
26,200,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,230,941 UART: [rt]cmd =0x4d454153, len=108
26,248,984 >>> mbox cmd response data (12 bytes)
26,249,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,280,171 UART: [rt]cmd =0x4d454153, len=108
26,298,611 >>> mbox cmd response data (12 bytes)
26,299,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,329,752 UART: [rt]cmd =0x4d454153, len=108
26,348,982 >>> mbox cmd response data (12 bytes)
26,349,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,380,215 UART: [rt]cmd =0x4d454153, len=108
26,399,195 >>> mbox cmd response data (12 bytes)
26,399,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,430,260 UART: [rt]cmd =0x4d454153, len=108
26,449,291 >>> mbox cmd response data (12 bytes)
26,449,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,480,438 UART: [rt]cmd =0x4d454153, len=108
26,498,489 >>> mbox cmd response data (12 bytes)
26,498,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,529,480 UART: [rt]cmd =0x4d454153, len=108
26,548,145 >>> mbox cmd response data (12 bytes)
26,548,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,579,256 UART: [rt]cmd =0x4d454153, len=108
26,597,804 >>> mbox cmd response data (12 bytes)
26,598,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,628,897 UART: [rt]cmd =0x4d454153, len=108
26,647,867 >>> mbox cmd response data (12 bytes)
26,648,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,678,680 UART: [rt]cmd =0x4d454153, len=108
26,680,956 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,381,550 ready_for_fw is high
3,382,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,098,182 >>> mbox cmd response: success
18,389,976 UART:
18,390,393 UART: Running Caliptra FMC ...
18,391,537 UART:
18,391,698 UART: [state] CFI Enabled
18,455,326 UART: [fht] FMC Alias Private Key: 7
20,219,354 UART: [art] Extend RT PCRs Done
20,220,576 UART: [art] Lock RT PCRs Done
20,222,203 UART: [art] Populate DV Done
20,227,623 UART: [fht] FMC Alias Private Key: 7
20,229,325 UART: [art] Derive CDI
20,230,139 UART: [art] Store in in slot 0x4
20,288,320 UART: [art] Derive Key Pair
20,289,365 UART: [art] Store priv key in slot 0x5
22,752,313 UART: [art] Derive Key Pair - Done
22,765,198 UART: [art] Signing Cert with AUTHO
22,766,504 UART: RITY.KEYID = 7
24,478,913 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,400 UART: [art] PUB.X = F2F51F8635F72B6838BF5AB65D056F8445483464839E30B4C28AFE612B8507218286F5B97654B0376CAB623A508C6A5F
24,487,648 UART: [art] PUB.Y = 4D27C9B11E7488451D7A66838D195069BD51807416810D3457ADA529FC08BF60E413E4BF3C1262BAD5C490B9BE9DC826
24,494,923 UART: [art] SIG.R = 3A708F9AA9217060AF050FDAF9E3FC419C67E154DCC420C56CC2E54D4C51534E908D879F2DB5AD93BBCCFB92360D5606
24,502,282 UART: [art] SIG.S = EA02C623AADE8D79BCE6D03C0C5F9B13495C3EFA69B0BD8A3E1EE09C66A4CDF710235F9E7102BB078F60795D998A70DC
25,481,371 UART: Caliptra RT
25,482,084 UART: [state] CFI Enabled
25,647,267 UART: [rt] RT listening for mailbox commands...
25,649,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,680,536 UART: [rt]cmd =0x4d454153, len=108
25,698,599 >>> mbox cmd response data (12 bytes)
25,699,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,729,816 UART: [rt]cmd =0x4d454153, len=108
25,748,427 >>> mbox cmd response data (12 bytes)
25,748,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,779,544 UART: [rt]cmd =0x4d454153, len=108
25,797,935 >>> mbox cmd response data (12 bytes)
25,798,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,829,067 UART: [rt]cmd =0x4d454153, len=108
25,847,729 >>> mbox cmd response data (12 bytes)
25,848,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,878,861 UART: [rt]cmd =0x4d454153, len=108
25,897,733 >>> mbox cmd response data (12 bytes)
25,898,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,928,560 UART: [rt]cmd =0x4d454153, len=108
25,947,036 >>> mbox cmd response data (12 bytes)
25,947,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,977,949 UART: [rt]cmd =0x4d454153, len=108
25,996,444 >>> mbox cmd response data (12 bytes)
25,996,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,027,629 UART: [rt]cmd =0x4d454153, len=108
26,046,804 >>> mbox cmd response data (12 bytes)
26,047,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,077,641 UART: [rt]cmd =0x4d454153, len=108
26,096,475 >>> mbox cmd response data (12 bytes)
26,096,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,127,593 UART: [rt]cmd =0x4d454153, len=108
26,145,817 >>> mbox cmd response data (12 bytes)
26,146,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,177,065 UART: [rt]cmd =0x4d454153, len=108
26,195,703 >>> mbox cmd response data (12 bytes)
26,196,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,226,803 UART: [rt]cmd =0x4d454153, len=108
26,246,125 >>> mbox cmd response data (12 bytes)
26,246,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,277,193 UART: [rt]cmd =0x4d454153, len=108
26,295,531 >>> mbox cmd response data (12 bytes)
26,295,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,326,524 UART: [rt]cmd =0x4d454153, len=108
26,345,810 >>> mbox cmd response data (12 bytes)
26,346,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,376,843 UART: [rt]cmd =0x4d454153, len=108
26,394,751 >>> mbox cmd response data (12 bytes)
26,395,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,425,722 UART: [rt]cmd =0x4d454153, len=108
26,427,929 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,419 UART:
192,891 UART: Running Caliptra ROM ...
194,040 UART:
603,482 UART: [state] CFI Enabled
616,883 UART: [state] LifecycleState = Unprovisioned
618,774 UART: [state] DebugLocked = No
620,863 UART: [state] WD Timer not started. Device not locked for debugging
623,967 UART: [kat] SHA2-256
803,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,694 UART: [kat] ++
815,135 UART: [kat] sha1
826,216 UART: [kat] SHA2-256
829,192 UART: [kat] SHA2-384
835,185 UART: [kat] SHA2-512-ACC
838,184 UART: [kat] ECC-384
3,280,116 UART: [kat] HMAC-384Kdf
3,293,571 UART: [kat] LMS
3,823,070 UART: [kat] --
3,827,764 UART: [cold-reset] ++
3,829,340 UART: [fht] FHT @ 0x50003400
3,839,394 UART: [idev] ++
3,839,950 UART: [idev] CDI.KEYID = 6
3,840,824 UART: [idev] SUBJECT.KEYID = 7
3,842,053 UART: [idev] UDS.KEYID = 0
3,842,946 ready_for_fw is high
3,843,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,954 UART: [idev] Erasing UDS.KEYID = 0
6,317,390 UART: [idev] Sha1 KeyId Algorithm
6,340,612 UART: [idev] --
6,345,894 UART: [ldev] ++
6,346,494 UART: [ldev] CDI.KEYID = 6
6,347,372 UART: [ldev] SUBJECT.KEYID = 5
6,348,596 UART: [ldev] AUTHORITY.KEYID = 7
6,349,820 UART: [ldev] FE.KEYID = 1
6,359,298 UART: [ldev] Erasing FE.KEYID = 1
8,836,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,136 UART: [ldev] --
10,623,903 UART: [fwproc] Wait for Commands...
10,626,432 UART: [fwproc] Recv command 0x46574c44
10,628,515 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,479 >>> mbox cmd response: success
14,496,344 UART: [afmc] ++
14,496,932 UART: [afmc] CDI.KEYID = 6
14,497,809 UART: [afmc] SUBJECT.KEYID = 7
14,499,015 UART: [afmc] AUTHORITY.KEYID = 5
17,001,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,463 UART: [afmc] --
18,799,371 UART: [cold-reset] --
18,802,147 UART: [state] Locking Datavault
18,809,169 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,861 UART: [state] Locking ICCM
18,813,276 UART: [exit] Launching FMC @ 0x40000130
18,821,683 UART:
18,821,921 UART: Running Caliptra FMC ...
18,823,018 UART:
18,823,171 UART: [state] CFI Enabled
18,831,175 UART: [fht] FMC Alias Private Key: 7
20,587,482 UART: [art] Extend RT PCRs Done
20,588,710 UART: [art] Lock RT PCRs Done
20,590,201 UART: [art] Populate DV Done
20,595,397 UART: [fht] FMC Alias Private Key: 7
20,597,039 UART: [art] Derive CDI
20,597,769 UART: [art] Store in in slot 0x4
20,640,621 UART: [art] Derive Key Pair
20,641,615 UART: [art] Store priv key in slot 0x5
23,069,057 UART: [art] Derive Key Pair - Done
23,082,058 UART: [art] Signing Cert with AUTHO
23,083,365 UART: RITY.KEYID = 7
24,788,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,078 UART: [art] PUB.X = 7A34AA0654FFFF199551F3FEF26BDAE0F47F4E40281E0BAFCA7280848D398EBCE252733759EA73C0A9409E3537B6B098
24,797,361 UART: [art] PUB.Y = B6BB43713E04EE20AC9984A0D76777F981124BE4213A90E205B0B74D76B8022A15E62D4D6D85CA1F22E6DDB26314328E
24,804,626 UART: [art] SIG.R = 0B4D11FFD3607CE6D1569BD7885871870C7D80550EAD73D6736024D94F43348566FA94A2F95CAA41D6DB94279CA7996D
24,811,994 UART: [art] SIG.S = 513F6A128EF558285DB8DCE97FDF3CE81D82ABE6B9AB663BEC6965D81FA00E7F311852DA4C2753FFA581A7B3F7F0CDF8
25,790,917 UART: Caliptra RT
25,791,617 UART: [state] CFI Enabled
25,907,647 UART: [rt] RT listening for mailbox commands...
25,909,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,940,185 UART: [rt]cmd =0x4d454153, len=108
25,958,634 >>> mbox cmd response data (12 bytes)
25,959,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,989,763 UART: [rt]cmd =0x4d454153, len=108
26,008,747 >>> mbox cmd response data (12 bytes)
26,009,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,039,735 UART: [rt]cmd =0x4d454153, len=108
26,058,448 >>> mbox cmd response data (12 bytes)
26,058,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,089,530 UART: [rt]cmd =0x4d454153, len=108
26,107,981 >>> mbox cmd response data (12 bytes)
26,108,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,138,977 UART: [rt]cmd =0x4d454153, len=108
26,156,982 >>> mbox cmd response data (12 bytes)
26,157,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,187,882 UART: [rt]cmd =0x4d454153, len=108
26,206,354 >>> mbox cmd response data (12 bytes)
26,206,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,237,478 UART: [rt]cmd =0x4d454153, len=108
26,256,020 >>> mbox cmd response data (12 bytes)
26,256,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,287,040 UART: [rt]cmd =0x4d454153, len=108
26,305,944 >>> mbox cmd response data (12 bytes)
26,306,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,336,864 UART: [rt]cmd =0x4d454153, len=108
26,355,515 >>> mbox cmd response data (12 bytes)
26,355,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,386,667 UART: [rt]cmd =0x4d454153, len=108
26,406,123 >>> mbox cmd response data (12 bytes)
26,406,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,339 UART: [rt]cmd =0x4d454153, len=108
26,455,689 >>> mbox cmd response data (12 bytes)
26,456,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,486,813 UART: [rt]cmd =0x4d454153, len=108
26,505,408 >>> mbox cmd response data (12 bytes)
26,505,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,559 UART: [rt]cmd =0x4d454153, len=108
26,555,310 >>> mbox cmd response data (12 bytes)
26,555,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,444 UART: [rt]cmd =0x4d454153, len=108
26,604,693 >>> mbox cmd response data (12 bytes)
26,605,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,815 UART: [rt]cmd =0x4d454153, len=108
26,654,784 >>> mbox cmd response data (12 bytes)
26,655,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,845 UART: [rt]cmd =0x4d454153, len=108
26,688,424 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,696,560 ready_for_fw is high
3,696,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,093 >>> mbox cmd response: success
18,526,123 UART:
18,526,498 UART: Running Caliptra FMC ...
18,527,694 UART:
18,527,851 UART: [state] CFI Enabled
18,535,303 UART: [fht] FMC Alias Private Key: 7
20,292,628 UART: [art] Extend RT PCRs Done
20,293,861 UART: [art] Lock RT PCRs Done
20,295,376 UART: [art] Populate DV Done
20,300,890 UART: [fht] FMC Alias Private Key: 7
20,302,413 UART: [art] Derive CDI
20,303,179 UART: [art] Store in in slot 0x4
20,345,714 UART: [art] Derive Key Pair
20,346,708 UART: [art] Store priv key in slot 0x5
22,773,018 UART: [art] Derive Key Pair - Done
22,786,054 UART: [art] Signing Cert with AUTHO
22,787,388 UART: RITY.KEYID = 7
24,492,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,318 UART: [art] PUB.X = 8C02C0676FFC529894D532F5596E2366B659954F818712B75333EE6751E5048557B0173FF7039F5C86E06C54C547FC3A
24,501,549 UART: [art] PUB.Y = 40E7A1FBF73BDD96F61687C58C82EC10008A1F2101C702570050297CDA185835CC331FF79E98C9870B7E25CB48008325
24,508,734 UART: [art] SIG.R = 824EADF56673E681107A92B53B030B6890B938F359FD33193CB876D7698F9DDAEA2137A1F5AA75454E0C85B3D959C306
24,516,119 UART: [art] SIG.S = 20B2C2ADB8D34331D076BB0A2E524644F269231A2A3FF53197FB5E4808F70B6CAD4208E980E2496AF6F601FF939E4978
25,494,872 UART: Caliptra RT
25,495,574 UART: [state] CFI Enabled
25,613,190 UART: [rt] RT listening for mailbox commands...
25,615,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,645,841 UART: [rt]cmd =0x4d454153, len=108
25,664,771 >>> mbox cmd response data (12 bytes)
25,665,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,695,860 UART: [rt]cmd =0x4d454153, len=108
25,714,108 >>> mbox cmd response data (12 bytes)
25,714,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,745,090 UART: [rt]cmd =0x4d454153, len=108
25,763,728 >>> mbox cmd response data (12 bytes)
25,764,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,794,747 UART: [rt]cmd =0x4d454153, len=108
25,813,213 >>> mbox cmd response data (12 bytes)
25,813,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,844,032 UART: [rt]cmd =0x4d454153, len=108
25,861,913 >>> mbox cmd response data (12 bytes)
25,862,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,892,787 UART: [rt]cmd =0x4d454153, len=108
25,911,012 >>> mbox cmd response data (12 bytes)
25,911,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,942,069 UART: [rt]cmd =0x4d454153, len=108
25,960,726 >>> mbox cmd response data (12 bytes)
25,961,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,991,869 UART: [rt]cmd =0x4d454153, len=108
26,010,342 >>> mbox cmd response data (12 bytes)
26,010,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,041,476 UART: [rt]cmd =0x4d454153, len=108
26,060,131 >>> mbox cmd response data (12 bytes)
26,060,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,091,185 UART: [rt]cmd =0x4d454153, len=108
26,109,839 >>> mbox cmd response data (12 bytes)
26,110,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,140,987 UART: [rt]cmd =0x4d454153, len=108
26,158,613 >>> mbox cmd response data (12 bytes)
26,159,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,189,915 UART: [rt]cmd =0x4d454153, len=108
26,207,974 >>> mbox cmd response data (12 bytes)
26,208,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,239,130 UART: [rt]cmd =0x4d454153, len=108
26,257,441 >>> mbox cmd response data (12 bytes)
26,257,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,288,398 UART: [rt]cmd =0x4d454153, len=108
26,306,457 >>> mbox cmd response data (12 bytes)
26,306,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,879 UART: [rt]cmd =0x4d454153, len=108
26,356,365 >>> mbox cmd response data (12 bytes)
26,356,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,266 UART: [rt]cmd =0x4d454153, len=108
26,389,736 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,214 UART:
192,649 UART: Running Caliptra ROM ...
193,787 UART:
193,934 UART: [state] CFI Enabled
265,560 UART: [state] LifecycleState = Unprovisioned
267,914 UART: [state] DebugLocked = No
269,462 UART: [state] WD Timer not started. Device not locked for debugging
274,356 UART: [kat] SHA2-256
464,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,972 UART: [kat] ++
475,457 UART: [kat] sha1
486,757 UART: [kat] SHA2-256
489,765 UART: [kat] SHA2-384
496,745 UART: [kat] SHA2-512-ACC
499,325 UART: [kat] ECC-384
2,949,042 UART: [kat] HMAC-384Kdf
2,969,388 UART: [kat] LMS
3,501,187 UART: [kat] --
3,506,406 UART: [cold-reset] ++
3,507,631 UART: [fht] FHT @ 0x50003400
3,519,243 UART: [idev] ++
3,519,956 UART: [idev] CDI.KEYID = 6
3,520,865 UART: [idev] SUBJECT.KEYID = 7
3,522,110 UART: [idev] UDS.KEYID = 0
3,523,052 ready_for_fw is high
3,523,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,246 UART: [idev] Erasing UDS.KEYID = 0
6,026,134 UART: [idev] Sha1 KeyId Algorithm
6,047,310 UART: [idev] --
6,053,137 UART: [ldev] ++
6,053,817 UART: [ldev] CDI.KEYID = 6
6,054,785 UART: [ldev] SUBJECT.KEYID = 5
6,055,944 UART: [ldev] AUTHORITY.KEYID = 7
6,057,123 UART: [ldev] FE.KEYID = 1
6,098,017 UART: [ldev] Erasing FE.KEYID = 1
8,602,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,000 UART: [ldev] --
10,409,108 UART: [fwproc] Wait for Commands...
10,410,979 UART: [fwproc] Recv command 0x46574c44
10,413,283 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,603,212 >>> mbox cmd response: success
14,606,463 UART: [afmc] ++
14,607,166 UART: [afmc] CDI.KEYID = 6
14,608,413 UART: [afmc] SUBJECT.KEYID = 7
14,609,850 UART: [afmc] AUTHORITY.KEYID = 5
17,146,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,759 UART: [afmc] --
18,944,473 UART: [cold-reset] --
18,948,774 UART: [state] Locking Datavault
18,953,271 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,415 UART: [state] Locking ICCM
18,958,001 UART: [exit] Launching FMC @ 0x40000130
18,966,629 UART:
18,966,864 UART: Running Caliptra FMC ...
18,967,964 UART:
18,968,127 UART: [state] CFI Enabled
19,028,761 UART: [fht] FMC Alias Private Key: 7
20,792,375 UART: [art] Extend RT PCRs Done
20,793,595 UART: [art] Lock RT PCRs Done
20,795,379 UART: [art] Populate DV Done
20,800,805 UART: [fht] FMC Alias Private Key: 7
20,802,298 UART: [art] Derive CDI
20,803,058 UART: [art] Store in in slot 0x4
20,861,398 UART: [art] Derive Key Pair
20,862,428 UART: [art] Store priv key in slot 0x5
23,325,638 UART: [art] Derive Key Pair - Done
23,338,597 UART: [art] Signing Cert with AUTHO
23,339,900 UART: RITY.KEYID = 7
25,051,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,458 UART: [art] PUB.X = B44A83FB398131DC974DB6F34223ABE398552EDC87DE31859BFD665930AB3A0D1B5FF15C53925CA07EA77A2BD5B31CE8
25,060,709 UART: [art] PUB.Y = 020DDF7961EF7ABE24940F869EFBEB7FED9ACFAE6E794F0D498F0C8D3225E21F86A770D7D88C6F256D48706D9462D469
25,067,994 UART: [art] SIG.R = DFAE141D4CF49F6BCD52AC2848D4C5D73D3A24BE16C2B4EA9A68CD6E5D535C668EEDB3B4F46A9B9537AECBB40E67601A
25,075,435 UART: [art] SIG.S = C58B19E88592928A8E90E2C7E0967952E4A11690D7FAE3DC9C64B2CC06406A4E5B7DC42518FAFCC971D2E7BE5FA5D506
26,054,422 UART: Caliptra RT
26,055,110 UART: [state] CFI Enabled
26,220,710 UART: [rt] RT listening for mailbox commands...
26,222,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,254,022 UART: [rt]cmd =0x4d454153, len=108
26,272,612 >>> mbox cmd response data (12 bytes)
26,273,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,303,709 UART: [rt]cmd =0x4d454153, len=108
26,322,049 >>> mbox cmd response data (12 bytes)
26,322,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,353,369 UART: [rt]cmd =0x4d454153, len=108
26,371,825 >>> mbox cmd response data (12 bytes)
26,372,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,402,979 UART: [rt]cmd =0x4d454153, len=108
26,421,623 >>> mbox cmd response data (12 bytes)
26,422,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,452,590 UART: [rt]cmd =0x4d454153, len=108
26,471,317 >>> mbox cmd response data (12 bytes)
26,471,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,502,241 UART: [rt]cmd =0x4d454153, len=108
26,521,009 >>> mbox cmd response data (12 bytes)
26,521,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,552,040 UART: [rt]cmd =0x4d454153, len=108
26,571,384 >>> mbox cmd response data (12 bytes)
26,571,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,602,357 UART: [rt]cmd =0x4d454153, len=108
26,620,956 >>> mbox cmd response data (12 bytes)
26,621,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,652,192 UART: [rt]cmd =0x4d454153, len=108
26,671,494 >>> mbox cmd response data (12 bytes)
26,671,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,702,727 UART: [rt]cmd =0x4d454153, len=108
26,721,254 >>> mbox cmd response data (12 bytes)
26,721,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,752,111 UART: [rt]cmd =0x4d454153, len=108
26,770,730 >>> mbox cmd response data (12 bytes)
26,771,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,801,766 UART: [rt]cmd =0x4d454153, len=108
26,820,516 >>> mbox cmd response data (12 bytes)
26,820,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,851,267 UART: [rt]cmd =0x4d454153, len=108
26,869,666 >>> mbox cmd response data (12 bytes)
26,870,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,900,828 UART: [rt]cmd =0x4d454153, len=108
26,919,594 >>> mbox cmd response data (12 bytes)
26,920,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,950,672 UART: [rt]cmd =0x4d454153, len=108
26,969,741 >>> mbox cmd response data (12 bytes)
26,970,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,001,036 UART: [rt]cmd =0x4d454153, len=108
27,003,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,437,087 ready_for_fw is high
3,437,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,455 >>> mbox cmd response: success
19,041,518 UART:
19,041,952 UART: Running Caliptra FMC ...
19,043,073 UART:
19,043,233 UART: [state] CFI Enabled
19,110,333 UART: [fht] FMC Alias Private Key: 7
20,874,064 UART: [art] Extend RT PCRs Done
20,875,290 UART: [art] Lock RT PCRs Done
20,876,730 UART: [art] Populate DV Done
20,882,146 UART: [fht] FMC Alias Private Key: 7
20,883,851 UART: [art] Derive CDI
20,884,588 UART: [art] Store in in slot 0x4
20,942,496 UART: [art] Derive Key Pair
20,943,534 UART: [art] Store priv key in slot 0x5
23,406,354 UART: [art] Derive Key Pair - Done
23,419,723 UART: [art] Signing Cert with AUTHO
23,421,031 UART: RITY.KEYID = 7
25,131,760 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,270 UART: [art] PUB.X = 4A0D5E5CBFD64D44E25B702A589345C2F139800B60D2E52F0C5163F647A9F24FC2CD98AAF20BE0F3CFA5AA3446E0B4FD
25,140,518 UART: [art] PUB.Y = C563958ED25AE0D827FE828F52F586A15BC321B2ADD7E0929FAF3F280DCE536A35263DBD7C1109B3AF2DC6B6165EB3EA
25,147,818 UART: [art] SIG.R = 2AB0FD9B4DAE5B3B339E33D3D501438F93273410E5D32A86459F8507F4592F6C7CB7CAE176ABCF6107A8DE195DCDD52B
25,155,205 UART: [art] SIG.S = BB7948564AF32A18D29BC4B3BE30AD9767F819502571EB1EEEE39993BADC4E6CAD2D5DB4DA6CFD1B6F56AD1AF377D94C
26,133,998 UART: Caliptra RT
26,134,691 UART: [state] CFI Enabled
26,301,056 UART: [rt] RT listening for mailbox commands...
26,302,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,283 UART: [rt]cmd =0x4d454153, len=108
26,353,570 >>> mbox cmd response data (12 bytes)
26,354,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,384,504 UART: [rt]cmd =0x4d454153, len=108
26,402,496 >>> mbox cmd response data (12 bytes)
26,402,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,433,486 UART: [rt]cmd =0x4d454153, len=108
26,452,417 >>> mbox cmd response data (12 bytes)
26,452,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,550 UART: [rt]cmd =0x4d454153, len=108
26,502,131 >>> mbox cmd response data (12 bytes)
26,502,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,533,434 UART: [rt]cmd =0x4d454153, len=108
26,552,614 >>> mbox cmd response data (12 bytes)
26,553,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,583,486 UART: [rt]cmd =0x4d454153, len=108
26,601,936 >>> mbox cmd response data (12 bytes)
26,602,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,632,937 UART: [rt]cmd =0x4d454153, len=108
26,652,128 >>> mbox cmd response data (12 bytes)
26,652,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,683,312 UART: [rt]cmd =0x4d454153, len=108
26,702,264 >>> mbox cmd response data (12 bytes)
26,702,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,733,516 UART: [rt]cmd =0x4d454153, len=108
26,752,119 >>> mbox cmd response data (12 bytes)
26,752,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,783,027 UART: [rt]cmd =0x4d454153, len=108
26,801,127 >>> mbox cmd response data (12 bytes)
26,801,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,832,315 UART: [rt]cmd =0x4d454153, len=108
26,851,733 >>> mbox cmd response data (12 bytes)
26,852,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,882,776 UART: [rt]cmd =0x4d454153, len=108
26,901,806 >>> mbox cmd response data (12 bytes)
26,902,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,932,618 UART: [rt]cmd =0x4d454153, len=108
26,951,522 >>> mbox cmd response data (12 bytes)
26,951,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,982,662 UART: [rt]cmd =0x4d454153, len=108
27,002,050 >>> mbox cmd response data (12 bytes)
27,002,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,033,223 UART: [rt]cmd =0x4d454153, len=108
27,051,991 >>> mbox cmd response data (12 bytes)
27,052,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,083,023 UART: [rt]cmd =0x4d454153, len=108
27,085,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,566 UART:
192,928 UART: Running Caliptra ROM ...
194,102 UART:
603,515 UART: [state] CFI Enabled
615,276 UART: [state] LifecycleState = Unprovisioned
617,646 UART: [state] DebugLocked = No
619,236 UART: [state] WD Timer not started. Device not locked for debugging
623,682 UART: [kat] SHA2-256
813,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,364 UART: [kat] ++
824,884 UART: [kat] sha1
837,312 UART: [kat] SHA2-256
840,318 UART: [kat] SHA2-384
847,647 UART: [kat] SHA2-512-ACC
850,216 UART: [kat] ECC-384
3,290,833 UART: [kat] HMAC-384Kdf
3,303,713 UART: [kat] LMS
3,835,514 UART: [kat] --
3,842,277 UART: [cold-reset] ++
3,843,273 UART: [fht] FHT @ 0x50003400
3,855,177 UART: [idev] ++
3,855,873 UART: [idev] CDI.KEYID = 6
3,856,813 UART: [idev] SUBJECT.KEYID = 7
3,857,973 UART: [idev] UDS.KEYID = 0
3,858,962 ready_for_fw is high
3,859,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,861 UART: [idev] Erasing UDS.KEYID = 0
6,331,696 UART: [idev] Sha1 KeyId Algorithm
6,353,948 UART: [idev] --
6,359,008 UART: [ldev] ++
6,359,684 UART: [ldev] CDI.KEYID = 6
6,360,639 UART: [ldev] SUBJECT.KEYID = 5
6,361,789 UART: [ldev] AUTHORITY.KEYID = 7
6,363,008 UART: [ldev] FE.KEYID = 1
6,375,429 UART: [ldev] Erasing FE.KEYID = 1
8,848,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,178 UART: [ldev] --
10,641,308 UART: [fwproc] Wait for Commands...
10,642,797 UART: [fwproc] Recv command 0x46574c44
10,645,098 UART: [fwproc] Recv'd Img size: 114448 bytes
14,091,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,823,496 >>> mbox cmd response: success
14,827,602 UART: [afmc] ++
14,828,301 UART: [afmc] CDI.KEYID = 6
14,829,479 UART: [afmc] SUBJECT.KEYID = 7
14,830,968 UART: [afmc] AUTHORITY.KEYID = 5
17,332,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,071,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,086,981 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,251 UART: [afmc] --
19,129,266 UART: [cold-reset] --
19,132,591 UART: [state] Locking Datavault
19,138,867 UART: [state] Locking PCR0, PCR1 and PCR31
19,141,060 UART: [state] Locking ICCM
19,142,890 UART: [exit] Launching FMC @ 0x40000130
19,151,520 UART:
19,151,751 UART: Running Caliptra FMC ...
19,152,845 UART:
19,152,995 UART: [state] CFI Enabled
19,161,108 UART: [fht] FMC Alias Private Key: 7
20,918,493 UART: [art] Extend RT PCRs Done
20,919,721 UART: [art] Lock RT PCRs Done
20,921,049 UART: [art] Populate DV Done
20,926,563 UART: [fht] FMC Alias Private Key: 7
20,928,321 UART: [art] Derive CDI
20,929,134 UART: [art] Store in in slot 0x4
20,971,558 UART: [art] Derive Key Pair
20,972,596 UART: [art] Store priv key in slot 0x5
23,399,043 UART: [art] Derive Key Pair - Done
23,412,040 UART: [art] Signing Cert with AUTHO
23,413,347 UART: RITY.KEYID = 7
25,118,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,318 UART: [art] PUB.X = F5CB485BA82ABE3835FE371D031AC5F916FB875A793EF2C2FBF68FAAB8A1BFB98729352D108370028C98B426E48C7EBE
25,127,594 UART: [art] PUB.Y = AA644B94FB631A9AB078114772C73C93A401172E65C098CB9F67E7463BD88D14B27D01644051D861B50033F7B75AC965
25,134,796 UART: [art] SIG.R = 939BD0393D0485363723E7B4687C1C5FE681D7686C3A0D161670927BC3E063330358BAE932C4EC9644FCED3107308AC6
25,142,191 UART: [art] SIG.S = 8D965074E573DA71360B9CEE12E31C601DDD43B79B318B0294F8F3DD2CC74F31B24B8A430E117E019160A6CBA5ABA856
26,121,426 UART: Caliptra RT
26,122,134 UART: [state] CFI Enabled
26,238,027 UART: [rt] RT listening for mailbox commands...
26,239,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,270,691 UART: [rt]cmd =0x4d454153, len=108
26,288,910 >>> mbox cmd response data (12 bytes)
26,289,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,320,117 UART: [rt]cmd =0x4d454153, len=108
26,337,519 >>> mbox cmd response data (12 bytes)
26,337,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,368,606 UART: [rt]cmd =0x4d454153, len=108
26,387,920 >>> mbox cmd response data (12 bytes)
26,388,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,419,031 UART: [rt]cmd =0x4d454153, len=108
26,437,745 >>> mbox cmd response data (12 bytes)
26,438,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,468,992 UART: [rt]cmd =0x4d454153, len=108
26,487,359 >>> mbox cmd response data (12 bytes)
26,487,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,518,746 UART: [rt]cmd =0x4d454153, len=108
26,537,827 >>> mbox cmd response data (12 bytes)
26,538,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,568,792 UART: [rt]cmd =0x4d454153, len=108
26,588,400 >>> mbox cmd response data (12 bytes)
26,588,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,619,403 UART: [rt]cmd =0x4d454153, len=108
26,637,743 >>> mbox cmd response data (12 bytes)
26,638,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,668,847 UART: [rt]cmd =0x4d454153, len=108
26,687,929 >>> mbox cmd response data (12 bytes)
26,688,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,719,174 UART: [rt]cmd =0x4d454153, len=108
26,738,728 >>> mbox cmd response data (12 bytes)
26,739,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,769,746 UART: [rt]cmd =0x4d454153, len=108
26,788,943 >>> mbox cmd response data (12 bytes)
26,789,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,819,879 UART: [rt]cmd =0x4d454153, len=108
26,838,424 >>> mbox cmd response data (12 bytes)
26,838,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,869,598 UART: [rt]cmd =0x4d454153, len=108
26,887,634 >>> mbox cmd response data (12 bytes)
26,888,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,918,600 UART: [rt]cmd =0x4d454153, len=108
26,938,221 >>> mbox cmd response data (12 bytes)
26,938,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,969,229 UART: [rt]cmd =0x4d454153, len=108
26,987,655 >>> mbox cmd response data (12 bytes)
26,988,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,018,517 UART: [rt]cmd =0x4d454153, len=108
27,021,057 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,758,007 ready_for_fw is high
3,758,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,445 >>> mbox cmd response: success
19,204,915 UART:
19,205,307 UART: Running Caliptra FMC ...
19,206,488 UART:
19,206,641 UART: [state] CFI Enabled
19,214,364 UART: [fht] FMC Alias Private Key: 7
20,970,733 UART: [art] Extend RT PCRs Done
20,971,965 UART: [art] Lock RT PCRs Done
20,973,482 UART: [art] Populate DV Done
20,978,891 UART: [fht] FMC Alias Private Key: 7
20,980,483 UART: [art] Derive CDI
20,981,292 UART: [art] Store in in slot 0x4
21,023,743 UART: [art] Derive Key Pair
21,024,782 UART: [art] Store priv key in slot 0x5
23,451,495 UART: [art] Derive Key Pair - Done
23,464,426 UART: [art] Signing Cert with AUTHO
23,465,731 UART: RITY.KEYID = 7
25,171,589 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,094 UART: [art] PUB.X = AD075327ACE0B8D68B462577D962602C8C6BFCC3E1B613CC2D93665BB1AB835BEA2D3A70D161A794E47F28E86BAE412D
25,180,263 UART: [art] PUB.Y = 66574F68505B1EB22BADFF782AF809858D4446988B46D661C2C05F17830F1FDDFCEC5B6FC2179C0D3EB3E4B1214E1C47
25,187,530 UART: [art] SIG.R = EDD4D9FF49ED3F25FD36B476F3D9F875D2FB3162C60FD36A89A99286AEABE2B4A8A5E3E5F34E9EB060BCAD27EF915A73
25,194,955 UART: [art] SIG.S = 571E4CA26D80303F42E21FD8D56167DE428C57ADA8A07593D95923B007AB17E36964C47CCA1B073DE55D35539D8C1C88
26,173,433 UART: Caliptra RT
26,174,116 UART: [state] CFI Enabled
26,291,279 UART: [rt] RT listening for mailbox commands...
26,293,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,324,297 UART: [rt]cmd =0x4d454153, len=108
26,342,580 >>> mbox cmd response data (12 bytes)
26,343,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,373,802 UART: [rt]cmd =0x4d454153, len=108
26,392,762 >>> mbox cmd response data (12 bytes)
26,393,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,423,606 UART: [rt]cmd =0x4d454153, len=108
26,441,937 >>> mbox cmd response data (12 bytes)
26,442,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,473,124 UART: [rt]cmd =0x4d454153, len=108
26,491,408 >>> mbox cmd response data (12 bytes)
26,491,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,522,653 UART: [rt]cmd =0x4d454153, len=108
26,541,364 >>> mbox cmd response data (12 bytes)
26,541,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,572,526 UART: [rt]cmd =0x4d454153, len=108
26,591,233 >>> mbox cmd response data (12 bytes)
26,591,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,622,376 UART: [rt]cmd =0x4d454153, len=108
26,641,033 >>> mbox cmd response data (12 bytes)
26,641,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,672,180 UART: [rt]cmd =0x4d454153, len=108
26,690,669 >>> mbox cmd response data (12 bytes)
26,691,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,721,634 UART: [rt]cmd =0x4d454153, len=108
26,740,810 >>> mbox cmd response data (12 bytes)
26,741,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,771,738 UART: [rt]cmd =0x4d454153, len=108
26,790,214 >>> mbox cmd response data (12 bytes)
26,790,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,821,173 UART: [rt]cmd =0x4d454153, len=108
26,839,603 >>> mbox cmd response data (12 bytes)
26,840,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,870,556 UART: [rt]cmd =0x4d454153, len=108
26,889,106 >>> mbox cmd response data (12 bytes)
26,889,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,919,912 UART: [rt]cmd =0x4d454153, len=108
26,939,158 >>> mbox cmd response data (12 bytes)
26,939,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,970,323 UART: [rt]cmd =0x4d454153, len=108
26,988,814 >>> mbox cmd response data (12 bytes)
26,989,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,019,884 UART: [rt]cmd =0x4d454153, len=108
27,037,926 >>> mbox cmd response data (12 bytes)
27,038,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,069,059 UART: [rt]cmd =0x4d454153, len=108
27,071,278 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,340 UART: [kat] HMAC-384Kdf
907,040 UART: [kat] LMS
1,475,236 UART: [kat] --
1,476,113 UART: [cold-reset] ++
1,476,591 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 ready_for_fw is high
1,480,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,196 UART: [idev] --
1,514,215 UART: [ldev] ++
1,514,383 UART: [ldev] CDI.KEYID = 6
1,514,746 UART: [ldev] SUBJECT.KEYID = 5
1,515,172 UART: [ldev] AUTHORITY.KEYID = 7
1,515,635 UART: [ldev] FE.KEYID = 1
1,520,845 UART: [ldev] Erasing FE.KEYID = 1
1,545,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,588 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,742 UART: [fwproc] Received command 0x46574c44
1,586,533 UART: [fwproc] Received Image of size 114448 bytes
2,885,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,784 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,111 >>> mbox cmd response: success
3,079,367 UART: [afmc] ++
3,079,535 UART: [afmc] CDI.KEYID = 6
3,079,897 UART: [afmc] SUBJECT.KEYID = 7
3,080,322 UART: [afmc] AUTHORITY.KEYID = 5
3,115,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,362 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,052 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,957 UART: [afmc] --
3,157,873 UART: [cold-reset] --
3,158,509 UART: [state] Locking Datavault
3,159,822 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,426 UART: [state] Locking ICCM
3,161,000 UART: [exit] Launching FMC @ 0x40000130
3,166,329 UART:
3,166,345 UART: Running Caliptra FMC ...
3,166,753 UART:
3,166,807 UART: [state] CFI Enabled
3,177,524 UART: [fht] FMC Alias Private Key: 7
3,285,661 UART: [art] Extend RT PCRs Done
3,286,089 UART: [art] Lock RT PCRs Done
3,287,691 UART: [art] Populate DV Done
3,296,016 UART: [fht] FMC Alias Private Key: 7
3,297,092 UART: [art] Derive CDI
3,297,372 UART: [art] Store in in slot 0x4
3,382,743 UART: [art] Derive Key Pair
3,383,103 UART: [art] Store priv key in slot 0x5
3,396,229 UART: [art] Derive Key Pair - Done
3,410,760 UART: [art] Signing Cert with AUTHO
3,411,240 UART: RITY.KEYID = 7
3,426,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,987 UART: [art] PUB.X = 05269379987415819F90A3DE8ED1C5127F633F22B21D5F4856AA3120F22B6290CA42BD8966E9A88CD6A167D6F2A4685B
3,433,750 UART: [art] PUB.Y = 5A0585034DA3981E11B321D829A222223C9C9CFD20CC2DE579DC608516028C51A9633EDC54FC0B39D0CFF66B89112055
3,440,688 UART: [art] SIG.R = 07A3195A48C649E67B9692ADACBDA7EDDB930E3D60A2765431EABD7E64E049494D8CC7EE04CF86C0BD03E1251D094980
3,447,455 UART: [art] SIG.S = 51448892A5BB4513F7A7731FC766818A45F99A881719F74E4A09B53B35650BCB2870D3ABE85D911EE01DD6B98D10E609
3,471,145 UART: Caliptra RT
3,471,398 UART: [state] CFI Enabled
3,578,756 UART: [rt] RT listening for mailbox commands...
3,579,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,020 UART: [rt]cmd =0x4d454153, len=108
3,630,238 >>> mbox cmd response data (12 bytes)
3,630,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,382 UART: [rt]cmd =0x4d454153, len=108
3,680,688 >>> mbox cmd response data (12 bytes)
3,680,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,620 UART: [rt]cmd =0x4d454153, len=108
3,731,274 >>> mbox cmd response data (12 bytes)
3,731,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,076 UART: [rt]cmd =0x4d454153, len=108
3,781,966 >>> mbox cmd response data (12 bytes)
3,781,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,866 UART: [rt]cmd =0x4d454153, len=108
3,832,446 >>> mbox cmd response data (12 bytes)
3,832,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,222 UART: [rt]cmd =0x4d454153, len=108
3,882,778 >>> mbox cmd response data (12 bytes)
3,882,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,838 UART: [rt]cmd =0x4d454153, len=108
3,932,614 >>> mbox cmd response data (12 bytes)
3,932,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,660 UART: [rt]cmd =0x4d454153, len=108
3,982,898 >>> mbox cmd response data (12 bytes)
3,982,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,086 UART: [rt]cmd =0x4d454153, len=108
4,032,994 >>> mbox cmd response data (12 bytes)
4,032,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,062,998 UART: [rt]cmd =0x4d454153, len=108
4,083,908 >>> mbox cmd response data (12 bytes)
4,083,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,113,762 UART: [rt]cmd =0x4d454153, len=108
4,135,294 >>> mbox cmd response data (12 bytes)
4,135,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,228 UART: [rt]cmd =0x4d454153, len=108
4,186,120 >>> mbox cmd response data (12 bytes)
4,186,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,216,230 UART: [rt]cmd =0x4d454153, len=108
4,236,982 >>> mbox cmd response data (12 bytes)
4,236,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,022 UART: [rt]cmd =0x4d454153, len=108
4,288,136 >>> mbox cmd response data (12 bytes)
4,288,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,318,334 UART: [rt]cmd =0x4d454153, len=108
4,339,602 >>> mbox cmd response data (12 bytes)
4,339,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,369,746 UART: [rt]cmd =0x4d454153, len=108
4,371,833 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,549 >>> mbox cmd response: success
2,991,725 UART:
2,991,741 UART: Running Caliptra FMC ...
2,992,149 UART:
2,992,203 UART: [state] CFI Enabled
3,002,792 UART: [fht] FMC Alias Private Key: 7
3,110,267 UART: [art] Extend RT PCRs Done
3,110,695 UART: [art] Lock RT PCRs Done
3,112,291 UART: [art] Populate DV Done
3,120,402 UART: [fht] FMC Alias Private Key: 7
3,121,552 UART: [art] Derive CDI
3,121,832 UART: [art] Store in in slot 0x4
3,207,779 UART: [art] Derive Key Pair
3,208,139 UART: [art] Store priv key in slot 0x5
3,221,747 UART: [art] Derive Key Pair - Done
3,236,342 UART: [art] Signing Cert with AUTHO
3,236,822 UART: RITY.KEYID = 7
3,251,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,663 UART: [art] PUB.X = 4437F5DD382B2BEEF8EF4D91BF4DF4CE4ED2C5A96ED8585D100C8F58AF67A42B50FBEAD0283CD1111198EBDC4AAF067D
3,259,455 UART: [art] PUB.Y = 3B840917A8F348B9B226100DAF38D83A892D0D5A1E231C57BC5A9867946B647FF4F78FBB4A27F0BB341B71B163E67896
3,266,398 UART: [art] SIG.R = 9428167DF454202B423A0497B9155F9F6D60DD71503E59E09EE0082CDA2557F503634B1A1852C43AA5128DDB62EB1605
3,273,150 UART: [art] SIG.S = 809026E2695342530401D139B437C6D68A86A46282333B4C0EEBDAD19ECB0CB6EFA11912C94D23C6D975D24D9A14D038
3,297,159 UART: Caliptra RT
3,297,412 UART: [state] CFI Enabled
3,405,624 UART: [rt] RT listening for mailbox commands...
3,406,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,868 UART: [rt]cmd =0x4d454153, len=108
3,458,474 >>> mbox cmd response data (12 bytes)
3,458,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,512 UART: [rt]cmd =0x4d454153, len=108
3,509,836 >>> mbox cmd response data (12 bytes)
3,509,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,996 UART: [rt]cmd =0x4d454153, len=108
3,560,158 >>> mbox cmd response data (12 bytes)
3,560,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,990 UART: [rt]cmd =0x4d454153, len=108
3,610,452 >>> mbox cmd response data (12 bytes)
3,610,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,570 UART: [rt]cmd =0x4d454153, len=108
3,661,646 >>> mbox cmd response data (12 bytes)
3,661,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,594 UART: [rt]cmd =0x4d454153, len=108
3,712,304 >>> mbox cmd response data (12 bytes)
3,712,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,338 UART: [rt]cmd =0x4d454153, len=108
3,762,684 >>> mbox cmd response data (12 bytes)
3,762,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,876 UART: [rt]cmd =0x4d454153, len=108
3,813,540 >>> mbox cmd response data (12 bytes)
3,813,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,602 UART: [rt]cmd =0x4d454153, len=108
3,863,982 >>> mbox cmd response data (12 bytes)
3,863,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,106 UART: [rt]cmd =0x4d454153, len=108
3,915,050 >>> mbox cmd response data (12 bytes)
3,915,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,108 UART: [rt]cmd =0x4d454153, len=108
3,965,856 >>> mbox cmd response data (12 bytes)
3,965,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,906 UART: [rt]cmd =0x4d454153, len=108
4,016,626 >>> mbox cmd response data (12 bytes)
4,016,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,750 UART: [rt]cmd =0x4d454153, len=108
4,068,364 >>> mbox cmd response data (12 bytes)
4,068,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,306 UART: [rt]cmd =0x4d454153, len=108
4,119,100 >>> mbox cmd response data (12 bytes)
4,119,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,140 UART: [rt]cmd =0x4d454153, len=108
4,170,216 >>> mbox cmd response data (12 bytes)
4,170,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,200,308 UART: [rt]cmd =0x4d454153, len=108
4,201,941 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,479,887 UART: [idev] ++
1,480,055 UART: [idev] CDI.KEYID = 6
1,480,415 UART: [idev] SUBJECT.KEYID = 7
1,480,839 UART: [idev] UDS.KEYID = 0
1,481,184 ready_for_fw is high
1,481,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,329 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,522,086 UART: [ldev] Erasing FE.KEYID = 1
1,547,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,171 UART: [ldev] --
1,586,654 UART: [fwproc] Waiting for Commands...
1,587,337 UART: [fwproc] Received command 0x46574c44
1,588,128 UART: [fwproc] Received Image of size 114448 bytes
2,887,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,386 >>> mbox cmd response: success
3,080,606 UART: [afmc] ++
3,080,774 UART: [afmc] CDI.KEYID = 6
3,081,136 UART: [afmc] SUBJECT.KEYID = 7
3,081,561 UART: [afmc] AUTHORITY.KEYID = 5
3,117,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,855 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,545 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,446 UART: [afmc] --
3,160,396 UART: [cold-reset] --
3,161,332 UART: [state] Locking Datavault
3,162,411 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,015 UART: [state] Locking ICCM
3,163,545 UART: [exit] Launching FMC @ 0x40000130
3,168,874 UART:
3,168,890 UART: Running Caliptra FMC ...
3,169,298 UART:
3,169,441 UART: [state] CFI Enabled
3,180,184 UART: [fht] FMC Alias Private Key: 7
3,288,741 UART: [art] Extend RT PCRs Done
3,289,169 UART: [art] Lock RT PCRs Done
3,290,841 UART: [art] Populate DV Done
3,299,102 UART: [fht] FMC Alias Private Key: 7
3,300,066 UART: [art] Derive CDI
3,300,346 UART: [art] Store in in slot 0x4
3,386,073 UART: [art] Derive Key Pair
3,386,433 UART: [art] Store priv key in slot 0x5
3,400,437 UART: [art] Derive Key Pair - Done
3,415,253 UART: [art] Signing Cert with AUTHO
3,415,733 UART: RITY.KEYID = 7
3,431,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,270 UART: [art] PUB.X = D056CF0AB88A5C268DD5DA0837167553C5A32A7C89D85B05FC354E864CD1043F1257BD822AD98CF6F970B5184EE2C40A
3,439,033 UART: [art] PUB.Y = B68EE3A5A51E915E9EAB75954C7A954873404E11681066479B6B1217C4D2AA8263BFB8E2FFE0BC82CB3C3FC4522CA903
3,445,988 UART: [art] SIG.R = CF2CBC2A301131A55828F027A66EFABFD2CCCED339E9A921C3CAC09661DCE8F6E62BB356AD530BF3E3C65E75CB85D0F5
3,452,781 UART: [art] SIG.S = A7BF1D57D0EB9260C8D4CB861C8871DA73F9335456FADE335512AB7E089EDB0E051ACD55A397D6BCD6BDE0797A7EA2BD
3,476,483 UART: Caliptra RT
3,476,828 UART: [state] CFI Enabled
3,584,790 UART: [rt] RT listening for mailbox commands...
3,585,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,976 UART: [rt]cmd =0x4d454153, len=108
3,637,070 >>> mbox cmd response data (12 bytes)
3,637,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,190 UART: [rt]cmd =0x4d454153, len=108
3,687,486 >>> mbox cmd response data (12 bytes)
3,687,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,358 UART: [rt]cmd =0x4d454153, len=108
3,737,852 >>> mbox cmd response data (12 bytes)
3,737,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,142 UART: [rt]cmd =0x4d454153, len=108
3,788,658 >>> mbox cmd response data (12 bytes)
3,788,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,814 UART: [rt]cmd =0x4d454153, len=108
3,838,922 >>> mbox cmd response data (12 bytes)
3,838,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,078 UART: [rt]cmd =0x4d454153, len=108
3,890,140 >>> mbox cmd response data (12 bytes)
3,890,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,182 UART: [rt]cmd =0x4d454153, len=108
3,941,052 >>> mbox cmd response data (12 bytes)
3,941,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,112 UART: [rt]cmd =0x4d454153, len=108
3,992,066 >>> mbox cmd response data (12 bytes)
3,992,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,934 UART: [rt]cmd =0x4d454153, len=108
4,042,360 >>> mbox cmd response data (12 bytes)
4,042,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,392 UART: [rt]cmd =0x4d454153, len=108
4,093,256 >>> mbox cmd response data (12 bytes)
4,093,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,408 UART: [rt]cmd =0x4d454153, len=108
4,144,192 >>> mbox cmd response data (12 bytes)
4,144,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,174,430 UART: [rt]cmd =0x4d454153, len=108
4,195,366 >>> mbox cmd response data (12 bytes)
4,195,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,628 UART: [rt]cmd =0x4d454153, len=108
4,246,112 >>> mbox cmd response data (12 bytes)
4,246,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,276,018 UART: [rt]cmd =0x4d454153, len=108
4,296,996 >>> mbox cmd response data (12 bytes)
4,296,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,034 UART: [rt]cmd =0x4d454153, len=108
4,348,346 >>> mbox cmd response data (12 bytes)
4,348,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,378,404 UART: [rt]cmd =0x4d454153, len=108
4,380,399 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,366 ready_for_fw is high
1,363,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,680 >>> mbox cmd response: success
2,990,744 UART:
2,990,760 UART: Running Caliptra FMC ...
2,991,168 UART:
2,991,311 UART: [state] CFI Enabled
3,001,758 UART: [fht] FMC Alias Private Key: 7
3,109,345 UART: [art] Extend RT PCRs Done
3,109,773 UART: [art] Lock RT PCRs Done
3,111,421 UART: [art] Populate DV Done
3,119,556 UART: [fht] FMC Alias Private Key: 7
3,120,700 UART: [art] Derive CDI
3,120,980 UART: [art] Store in in slot 0x4
3,207,053 UART: [art] Derive Key Pair
3,207,413 UART: [art] Store priv key in slot 0x5
3,220,377 UART: [art] Derive Key Pair - Done
3,235,482 UART: [art] Signing Cert with AUTHO
3,235,962 UART: RITY.KEYID = 7
3,251,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,077 UART: [art] PUB.X = 69A66DD1B622A27D6F1D17FDF71F26CA51F839DCC2F531F1C1B5674560F2A7FE27EAC73C7DDE1EADA3DBD0ED545E5533
3,258,871 UART: [art] PUB.Y = C46F34FBE9A5E799C7F9C12259FFA4146D4EAFE3B9F13CDC30A7B6481702F7341E58D91CD23CBA9D67A5524F2949E0C6
3,265,832 UART: [art] SIG.R = 6A1CE218E482713EE95B8ED7B6668341A3CE3D8376AF3F57F63C04CE4DBFAD3D2043AFE8C8D7149D147B0DB2870ECD07
3,272,606 UART: [art] SIG.S = A4DE2FC9D8CA75F499580DF0EC1E712F0F4757AA681710CD902F8BA2313CFBFA51C71154D5B428B778AE41CD5E00D281
3,296,437 UART: Caliptra RT
3,296,782 UART: [state] CFI Enabled
3,404,847 UART: [rt] RT listening for mailbox commands...
3,405,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,107 UART: [rt]cmd =0x4d454153, len=108
3,456,155 >>> mbox cmd response data (12 bytes)
3,456,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,089 UART: [rt]cmd =0x4d454153, len=108
3,506,857 >>> mbox cmd response data (12 bytes)
3,506,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,061 UART: [rt]cmd =0x4d454153, len=108
3,557,467 >>> mbox cmd response data (12 bytes)
3,557,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,429 UART: [rt]cmd =0x4d454153, len=108
3,607,801 >>> mbox cmd response data (12 bytes)
3,607,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,943 UART: [rt]cmd =0x4d454153, len=108
3,658,659 >>> mbox cmd response data (12 bytes)
3,658,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,609 UART: [rt]cmd =0x4d454153, len=108
3,708,919 >>> mbox cmd response data (12 bytes)
3,708,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,949 UART: [rt]cmd =0x4d454153, len=108
3,759,477 >>> mbox cmd response data (12 bytes)
3,759,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,291 UART: [rt]cmd =0x4d454153, len=108
3,809,791 >>> mbox cmd response data (12 bytes)
3,809,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,775 UART: [rt]cmd =0x4d454153, len=108
3,861,305 >>> mbox cmd response data (12 bytes)
3,861,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,393 UART: [rt]cmd =0x4d454153, len=108
3,911,971 >>> mbox cmd response data (12 bytes)
3,911,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,913 UART: [rt]cmd =0x4d454153, len=108
3,962,243 >>> mbox cmd response data (12 bytes)
3,962,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,201 UART: [rt]cmd =0x4d454153, len=108
4,012,297 >>> mbox cmd response data (12 bytes)
4,012,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,387 UART: [rt]cmd =0x4d454153, len=108
4,063,187 >>> mbox cmd response data (12 bytes)
4,063,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,207 UART: [rt]cmd =0x4d454153, len=108
4,113,857 >>> mbox cmd response data (12 bytes)
4,113,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,821 UART: [rt]cmd =0x4d454153, len=108
4,164,845 >>> mbox cmd response data (12 bytes)
4,164,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,003 UART: [rt]cmd =0x4d454153, len=108
4,197,052 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
892,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,091 UART: [kat] ++
897,243 UART: [kat] sha1
901,497 UART: [kat] SHA2-256
903,437 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,715 UART: [cold-reset] ++
1,172,179 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 ready_for_fw is high
1,176,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,825 UART: [idev] Sha1 KeyId Algorithm
1,209,151 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,762 UART: [ldev] SUBJECT.KEYID = 5
1,211,188 UART: [ldev] AUTHORITY.KEYID = 7
1,211,651 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,628 >>> mbox cmd response: success
2,776,812 UART: [afmc] ++
2,776,980 UART: [afmc] CDI.KEYID = 6
2,777,342 UART: [afmc] SUBJECT.KEYID = 7
2,777,767 UART: [afmc] AUTHORITY.KEYID = 5
2,812,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,967 UART: [afmc] --
2,856,073 UART: [cold-reset] --
2,857,023 UART: [state] Locking Datavault
2,858,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,704 UART: [state] Locking ICCM
2,859,124 UART: [exit] Launching FMC @ 0x40000130
2,864,453 UART:
2,864,469 UART: Running Caliptra FMC ...
2,864,877 UART:
2,864,931 UART: [state] CFI Enabled
2,875,776 UART: [fht] FMC Alias Private Key: 7
2,983,953 UART: [art] Extend RT PCRs Done
2,984,381 UART: [art] Lock RT PCRs Done
2,986,241 UART: [art] Populate DV Done
2,994,346 UART: [fht] FMC Alias Private Key: 7
2,995,468 UART: [art] Derive CDI
2,995,748 UART: [art] Store in in slot 0x4
3,081,549 UART: [art] Derive Key Pair
3,081,909 UART: [art] Store priv key in slot 0x5
3,095,097 UART: [art] Derive Key Pair - Done
3,109,822 UART: [art] Signing Cert with AUTHO
3,110,302 UART: RITY.KEYID = 7
3,125,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,549 UART: [art] PUB.X = 879FC20679E16E020B0031C4F1AC761ADDD069D3D8E078BE5336687F7B0891B02C767B625224DC41BD9358E443E14110
3,133,281 UART: [art] PUB.Y = 98E48E1BF69C23F589B12633526370FF67C91F26FF6747AFB05CC3BEE6421E9376E77EDB3AF19F1B51E99BAC69AF1C63
3,140,243 UART: [art] SIG.R = 31EFF4411D7EA62CA5B0109AC9FA0F8D7D9BD37AFCB0FD8D6AC0A5E5B006537BE45025771163C00A5A57CCEECF9B15AE
3,147,030 UART: [art] SIG.S = 5AB394B3B1E92138DE1E8C683D57DF79C03E0641EFEFFD4FD6C0C19E45ECD2FA43ADFD12393272A892C2A9281AF25439
3,170,224 UART: Caliptra RT
3,170,477 UART: [state] CFI Enabled
3,277,082 UART: [rt] RT listening for mailbox commands...
3,277,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,190 UART: [rt]cmd =0x4d454153, len=108
3,329,682 >>> mbox cmd response data (12 bytes)
3,329,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,658 UART: [rt]cmd =0x4d454153, len=108
3,380,868 >>> mbox cmd response data (12 bytes)
3,380,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,918 UART: [rt]cmd =0x4d454153, len=108
3,431,996 >>> mbox cmd response data (12 bytes)
3,431,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,090 UART: [rt]cmd =0x4d454153, len=108
3,482,754 >>> mbox cmd response data (12 bytes)
3,482,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,716 UART: [rt]cmd =0x4d454153, len=108
3,533,742 >>> mbox cmd response data (12 bytes)
3,533,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,898 UART: [rt]cmd =0x4d454153, len=108
3,584,378 >>> mbox cmd response data (12 bytes)
3,584,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,702 UART: [rt]cmd =0x4d454153, len=108
3,635,038 >>> mbox cmd response data (12 bytes)
3,635,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,160 UART: [rt]cmd =0x4d454153, len=108
3,686,530 >>> mbox cmd response data (12 bytes)
3,686,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,636 UART: [rt]cmd =0x4d454153, len=108
3,738,010 >>> mbox cmd response data (12 bytes)
3,738,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,828 UART: [rt]cmd =0x4d454153, len=108
3,788,962 >>> mbox cmd response data (12 bytes)
3,788,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,828 UART: [rt]cmd =0x4d454153, len=108
3,839,540 >>> mbox cmd response data (12 bytes)
3,839,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,654 UART: [rt]cmd =0x4d454153, len=108
3,890,486 >>> mbox cmd response data (12 bytes)
3,890,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,650 UART: [rt]cmd =0x4d454153, len=108
3,941,288 >>> mbox cmd response data (12 bytes)
3,941,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,570 UART: [rt]cmd =0x4d454153, len=108
3,992,644 >>> mbox cmd response data (12 bytes)
3,992,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,838 UART: [rt]cmd =0x4d454153, len=108
4,043,708 >>> mbox cmd response data (12 bytes)
4,043,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,806 UART: [rt]cmd =0x4d454153, len=108
4,075,411 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 ready_for_fw is high
1,060,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,549 >>> mbox cmd response: success
2,687,687 UART:
2,687,703 UART: Running Caliptra FMC ...
2,688,111 UART:
2,688,165 UART: [state] CFI Enabled
2,698,512 UART: [fht] FMC Alias Private Key: 7
2,806,127 UART: [art] Extend RT PCRs Done
2,806,555 UART: [art] Lock RT PCRs Done
2,807,993 UART: [art] Populate DV Done
2,816,062 UART: [fht] FMC Alias Private Key: 7
2,817,034 UART: [art] Derive CDI
2,817,314 UART: [art] Store in in slot 0x4
2,903,195 UART: [art] Derive Key Pair
2,903,555 UART: [art] Store priv key in slot 0x5
2,916,623 UART: [art] Derive Key Pair - Done
2,931,301 UART: [art] Signing Cert with AUTHO
2,931,781 UART: RITY.KEYID = 7
2,947,219 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,984 UART: [art] PUB.X = 7E7C8EF1B21E6E5ABAAB76BAE879BE2D207051E997C98CF91BC9575731AB61B7AA229C83D4E5E980B6D29878FFFED49E
2,954,774 UART: [art] PUB.Y = B9EFD0E1857BA5ECF1E3F81CD6B9823403ABE3464A40BA8A8347E0F2035412329BA1EBAB5186AE9026D8F87FDA35B580
2,961,732 UART: [art] SIG.R = 5FFEF002F4CA4F7F327636ABA7497E4FF8B093EDE3DB93A0A3788CCA0D641C797FF500196B67E2E9FEE4C01D9FB98BF4
2,968,496 UART: [art] SIG.S = 52D1E4EA5C4D67E19B026059534ADEB60435FDC5391D7BB3A71C318EEA80C15E5108EC5893C7822E8C46AAA263CBDD8B
2,992,674 UART: Caliptra RT
2,992,927 UART: [state] CFI Enabled
3,100,770 UART: [rt] RT listening for mailbox commands...
3,101,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,742 UART: [rt]cmd =0x4d454153, len=108
3,152,038 >>> mbox cmd response data (12 bytes)
3,152,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,096 UART: [rt]cmd =0x4d454153, len=108
3,203,226 >>> mbox cmd response data (12 bytes)
3,203,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,062 UART: [rt]cmd =0x4d454153, len=108
3,253,596 >>> mbox cmd response data (12 bytes)
3,253,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,698 UART: [rt]cmd =0x4d454153, len=108
3,304,010 >>> mbox cmd response data (12 bytes)
3,304,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,062 UART: [rt]cmd =0x4d454153, len=108
3,356,060 >>> mbox cmd response data (12 bytes)
3,356,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,050 UART: [rt]cmd =0x4d454153, len=108
3,407,000 >>> mbox cmd response data (12 bytes)
3,407,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,084 UART: [rt]cmd =0x4d454153, len=108
3,457,490 >>> mbox cmd response data (12 bytes)
3,457,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,568 UART: [rt]cmd =0x4d454153, len=108
3,509,040 >>> mbox cmd response data (12 bytes)
3,509,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,056 UART: [rt]cmd =0x4d454153, len=108
3,559,526 >>> mbox cmd response data (12 bytes)
3,559,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,640 UART: [rt]cmd =0x4d454153, len=108
3,610,822 >>> mbox cmd response data (12 bytes)
3,610,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,912 UART: [rt]cmd =0x4d454153, len=108
3,661,248 >>> mbox cmd response data (12 bytes)
3,661,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,460 UART: [rt]cmd =0x4d454153, len=108
3,712,078 >>> mbox cmd response data (12 bytes)
3,712,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,808 UART: [rt]cmd =0x4d454153, len=108
3,762,080 >>> mbox cmd response data (12 bytes)
3,762,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,958 UART: [rt]cmd =0x4d454153, len=108
3,812,720 >>> mbox cmd response data (12 bytes)
3,812,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,944 UART: [rt]cmd =0x4d454153, len=108
3,864,032 >>> mbox cmd response data (12 bytes)
3,864,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,210 UART: [rt]cmd =0x4d454153, len=108
3,896,337 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,190 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
893,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,304 UART: [kat] ++
897,456 UART: [kat] sha1
901,772 UART: [kat] SHA2-256
903,712 UART: [kat] SHA2-384
906,363 UART: [kat] SHA2-512-ACC
908,264 UART: [kat] ECC-384
918,249 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,094 UART: [cold-reset] ++
1,172,626 UART: [fht] FHT @ 0x50003400
1,175,183 UART: [idev] ++
1,175,351 UART: [idev] CDI.KEYID = 6
1,175,711 UART: [idev] SUBJECT.KEYID = 7
1,176,135 UART: [idev] UDS.KEYID = 0
1,176,480 ready_for_fw is high
1,176,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,295 UART: [idev] Erasing UDS.KEYID = 0
1,201,114 UART: [idev] Sha1 KeyId Algorithm
1,209,722 UART: [idev] --
1,210,680 UART: [ldev] ++
1,210,848 UART: [ldev] CDI.KEYID = 6
1,211,211 UART: [ldev] SUBJECT.KEYID = 5
1,211,637 UART: [ldev] AUTHORITY.KEYID = 7
1,212,100 UART: [ldev] FE.KEYID = 1
1,217,424 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,106 UART: [ldev] --
1,283,589 UART: [fwproc] Wait for Commands...
1,284,323 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,223 >>> mbox cmd response: success
2,776,399 UART: [afmc] ++
2,776,567 UART: [afmc] CDI.KEYID = 6
2,776,929 UART: [afmc] SUBJECT.KEYID = 7
2,777,354 UART: [afmc] AUTHORITY.KEYID = 5
2,813,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,080 UART: [afmc] --
2,856,050 UART: [cold-reset] --
2,856,750 UART: [state] Locking Datavault
2,857,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,297 UART: [state] Locking ICCM
2,858,939 UART: [exit] Launching FMC @ 0x40000130
2,864,268 UART:
2,864,284 UART: Running Caliptra FMC ...
2,864,692 UART:
2,864,835 UART: [state] CFI Enabled
2,875,612 UART: [fht] FMC Alias Private Key: 7
2,983,005 UART: [art] Extend RT PCRs Done
2,983,433 UART: [art] Lock RT PCRs Done
2,985,137 UART: [art] Populate DV Done
2,993,284 UART: [fht] FMC Alias Private Key: 7
2,994,224 UART: [art] Derive CDI
2,994,504 UART: [art] Store in in slot 0x4
3,079,901 UART: [art] Derive Key Pair
3,080,261 UART: [art] Store priv key in slot 0x5
3,094,129 UART: [art] Derive Key Pair - Done
3,108,952 UART: [art] Signing Cert with AUTHO
3,109,432 UART: RITY.KEYID = 7
3,124,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,347 UART: [art] PUB.X = 6CB6FF77E614DDB82D77687475DD71BD41D9634E12FBEBCA6958D503501F2A1F21B42A4FB220CC9BDAB40A9469019A92
3,132,120 UART: [art] PUB.Y = 8387D44E476AD5C24E6DBEC8DCB0746BCC5876A57C305E207A3BAACF2B44F691A655BAAEC869AF2E1247FA2A837EAF56
3,139,092 UART: [art] SIG.R = 59119896FBEE1EB515AD8A7A6E5B8CE158D32F80007F42647D0C865BE068558A22B2FA2AF6A4544FCBDD24520A95FCA7
3,145,846 UART: [art] SIG.S = 22F22FD8E50FA2A2932FE11A4DF65F5A85671ADA065963C3257345C9023C6FD0F89407475DD2B595689E427B214DEBCF
3,169,855 UART: Caliptra RT
3,170,200 UART: [state] CFI Enabled
3,278,247 UART: [rt] RT listening for mailbox commands...
3,278,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,575 UART: [rt]cmd =0x4d454153, len=108
3,329,903 >>> mbox cmd response data (12 bytes)
3,329,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,129 UART: [rt]cmd =0x4d454153, len=108
3,380,795 >>> mbox cmd response data (12 bytes)
3,380,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,823 UART: [rt]cmd =0x4d454153, len=108
3,431,777 >>> mbox cmd response data (12 bytes)
3,431,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,787 UART: [rt]cmd =0x4d454153, len=108
3,482,265 >>> mbox cmd response data (12 bytes)
3,482,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,259 UART: [rt]cmd =0x4d454153, len=108
3,532,875 >>> mbox cmd response data (12 bytes)
3,532,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,019 UART: [rt]cmd =0x4d454153, len=108
3,583,827 >>> mbox cmd response data (12 bytes)
3,583,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,919 UART: [rt]cmd =0x4d454153, len=108
3,634,087 >>> mbox cmd response data (12 bytes)
3,634,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,035 UART: [rt]cmd =0x4d454153, len=108
3,684,573 >>> mbox cmd response data (12 bytes)
3,684,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,589 UART: [rt]cmd =0x4d454153, len=108
3,735,169 >>> mbox cmd response data (12 bytes)
3,735,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,261 UART: [rt]cmd =0x4d454153, len=108
3,786,889 >>> mbox cmd response data (12 bytes)
3,786,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,813 UART: [rt]cmd =0x4d454153, len=108
3,837,525 >>> mbox cmd response data (12 bytes)
3,837,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,399 UART: [rt]cmd =0x4d454153, len=108
3,888,429 >>> mbox cmd response data (12 bytes)
3,888,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,549 UART: [rt]cmd =0x4d454153, len=108
3,939,761 >>> mbox cmd response data (12 bytes)
3,939,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,629 UART: [rt]cmd =0x4d454153, len=108
3,989,587 >>> mbox cmd response data (12 bytes)
3,989,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,495 UART: [rt]cmd =0x4d454153, len=108
4,041,071 >>> mbox cmd response data (12 bytes)
4,041,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,101 UART: [rt]cmd =0x4d454153, len=108
4,072,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,244 ready_for_fw is high
1,060,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,470 >>> mbox cmd response: success
2,689,596 UART:
2,689,612 UART: Running Caliptra FMC ...
2,690,020 UART:
2,690,163 UART: [state] CFI Enabled
2,700,626 UART: [fht] FMC Alias Private Key: 7
2,808,821 UART: [art] Extend RT PCRs Done
2,809,249 UART: [art] Lock RT PCRs Done
2,811,095 UART: [art] Populate DV Done
2,819,220 UART: [fht] FMC Alias Private Key: 7
2,820,400 UART: [art] Derive CDI
2,820,680 UART: [art] Store in in slot 0x4
2,906,737 UART: [art] Derive Key Pair
2,907,097 UART: [art] Store priv key in slot 0x5
2,919,725 UART: [art] Derive Key Pair - Done
2,934,833 UART: [art] Signing Cert with AUTHO
2,935,313 UART: RITY.KEYID = 7
2,950,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,808 UART: [art] PUB.X = 7FC20E93AC37E21DB3E03F0B262B24C3782213681CA8C50B32BDD3CFE2BC6D0351720ABE59BAC7666E9B0D02FD1DD701
2,957,570 UART: [art] PUB.Y = 85DA1B762F7554D04200B7A9F41ADFF5989DE40C05A3B7E0BC7638670D18B0BD8CB8B50A74E372BF78C4C598C5D4EDA9
2,964,500 UART: [art] SIG.R = BB542FB2DF3F9A44DE9A31C11C2D727C0986C46F503FA8DCC040978B220FA574F4925A805B7625ADE6840AFFE28B2810
2,971,271 UART: [art] SIG.S = A8B1F50DDF2FF73C3F80BC75315EED9604B4C2F3E514165B554C5FC7627FB0A32088839FC880E1C0885BFCE3D7804B06
2,995,515 UART: Caliptra RT
2,995,860 UART: [state] CFI Enabled
3,103,956 UART: [rt] RT listening for mailbox commands...
3,104,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,990 UART: [rt]cmd =0x4d454153, len=108
3,154,832 >>> mbox cmd response data (12 bytes)
3,154,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,762 UART: [rt]cmd =0x4d454153, len=108
3,205,526 >>> mbox cmd response data (12 bytes)
3,205,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,600 UART: [rt]cmd =0x4d454153, len=108
3,257,042 >>> mbox cmd response data (12 bytes)
3,257,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,160 UART: [rt]cmd =0x4d454153, len=108
3,308,476 >>> mbox cmd response data (12 bytes)
3,308,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,714 UART: [rt]cmd =0x4d454153, len=108
3,359,732 >>> mbox cmd response data (12 bytes)
3,359,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,674 UART: [rt]cmd =0x4d454153, len=108
3,410,510 >>> mbox cmd response data (12 bytes)
3,410,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,640 UART: [rt]cmd =0x4d454153, len=108
3,462,086 >>> mbox cmd response data (12 bytes)
3,462,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,206 UART: [rt]cmd =0x4d454153, len=108
3,512,950 >>> mbox cmd response data (12 bytes)
3,512,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,104 UART: [rt]cmd =0x4d454153, len=108
3,564,424 >>> mbox cmd response data (12 bytes)
3,564,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,318 UART: [rt]cmd =0x4d454153, len=108
3,614,722 >>> mbox cmd response data (12 bytes)
3,614,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,832 UART: [rt]cmd =0x4d454153, len=108
3,665,602 >>> mbox cmd response data (12 bytes)
3,665,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,700 UART: [rt]cmd =0x4d454153, len=108
3,716,792 >>> mbox cmd response data (12 bytes)
3,716,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,746,682 UART: [rt]cmd =0x4d454153, len=108
3,768,032 >>> mbox cmd response data (12 bytes)
3,768,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,032 UART: [rt]cmd =0x4d454153, len=108
3,818,714 >>> mbox cmd response data (12 bytes)
3,818,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,848,776 UART: [rt]cmd =0x4d454153, len=108
3,869,710 >>> mbox cmd response data (12 bytes)
3,869,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,830 UART: [rt]cmd =0x4d454153, len=108
3,901,693 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 ready_for_fw is high
1,174,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,133 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,240,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,786 UART: [ldev] --
1,280,124 UART: [fwproc] Wait for Commands...
1,280,875 UART: [fwproc] Recv command 0x46574c44
1,281,608 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,326 >>> mbox cmd response: success
2,773,507 UART: [afmc] ++
2,773,675 UART: [afmc] CDI.KEYID = 6
2,774,038 UART: [afmc] SUBJECT.KEYID = 7
2,774,464 UART: [afmc] AUTHORITY.KEYID = 5
2,809,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,463 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,414 UART: [afmc] --
2,853,516 UART: [cold-reset] --
2,854,268 UART: [state] Locking Datavault
2,855,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,929 UART: [state] Locking ICCM
2,856,483 UART: [exit] Launching FMC @ 0x40000130
2,861,812 UART:
2,861,828 UART: Running Caliptra FMC ...
2,862,236 UART:
2,862,290 UART: [state] CFI Enabled
2,872,931 UART: [fht] FMC Alias Private Key: 7
2,980,602 UART: [art] Extend RT PCRs Done
2,981,030 UART: [art] Lock RT PCRs Done
2,982,482 UART: [art] Populate DV Done
2,990,467 UART: [fht] FMC Alias Private Key: 7
2,991,585 UART: [art] Derive CDI
2,991,865 UART: [art] Store in in slot 0x4
3,077,818 UART: [art] Derive Key Pair
3,078,178 UART: [art] Store priv key in slot 0x5
3,090,706 UART: [art] Derive Key Pair - Done
3,105,297 UART: [art] Signing Cert with AUTHO
3,105,777 UART: RITY.KEYID = 7
3,120,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,542 UART: [art] PUB.X = A971B76DA46357E6E3F4ABC9EB6A11D111E44C0AADF30BA9DB4B202C72B9C215CFF09132FDC5145476A40C84F66E405F
3,128,319 UART: [art] PUB.Y = 825090FA62C8B83D36BDA5ADE7AEE6AA49FC3CCC4C6D18AA650E34E55C4B61B1314E6E9E8857F5D06AD43678089DD002
3,135,276 UART: [art] SIG.R = 7DFC5B9DE2A96FAFAF9433507A5A2BC74F75AB921A19A3E43F7095917FFEE310205E1102AE7C0D5D6D057F2BD0D15837
3,142,051 UART: [art] SIG.S = 5DC1ADFA4A2B3EB84EF973D02BBA690E2920B238ADDB2FC2A26F31F54D8B8C4D0ADC0B515E620BA3DCCFBE8CA3C56C31
3,165,394 UART: Caliptra RT
3,165,647 UART: [state] CFI Enabled
3,273,590 UART: [rt] RT listening for mailbox commands...
3,274,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,670 UART: [rt]cmd =0x4d454153, len=108
3,324,832 >>> mbox cmd response data (12 bytes)
3,324,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,840 UART: [rt]cmd =0x4d454153, len=108
3,375,534 >>> mbox cmd response data (12 bytes)
3,375,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,546 UART: [rt]cmd =0x4d454153, len=108
3,426,352 >>> mbox cmd response data (12 bytes)
3,426,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,184 UART: [rt]cmd =0x4d454153, len=108
3,476,586 >>> mbox cmd response data (12 bytes)
3,476,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,600 UART: [rt]cmd =0x4d454153, len=108
3,527,700 >>> mbox cmd response data (12 bytes)
3,527,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,806 UART: [rt]cmd =0x4d454153, len=108
3,578,814 >>> mbox cmd response data (12 bytes)
3,578,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,138 UART: [rt]cmd =0x4d454153, len=108
3,628,826 >>> mbox cmd response data (12 bytes)
3,628,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,684 UART: [rt]cmd =0x4d454153, len=108
3,679,842 >>> mbox cmd response data (12 bytes)
3,679,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,870 UART: [rt]cmd =0x4d454153, len=108
3,729,940 >>> mbox cmd response data (12 bytes)
3,729,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,094 UART: [rt]cmd =0x4d454153, len=108
3,780,892 >>> mbox cmd response data (12 bytes)
3,780,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,074 UART: [rt]cmd =0x4d454153, len=108
3,831,064 >>> mbox cmd response data (12 bytes)
3,831,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,014 UART: [rt]cmd =0x4d454153, len=108
3,881,274 >>> mbox cmd response data (12 bytes)
3,881,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,160 UART: [rt]cmd =0x4d454153, len=108
3,932,318 >>> mbox cmd response data (12 bytes)
3,932,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,530 UART: [rt]cmd =0x4d454153, len=108
3,983,408 >>> mbox cmd response data (12 bytes)
3,983,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,216 UART: [rt]cmd =0x4d454153, len=108
4,034,306 >>> mbox cmd response data (12 bytes)
4,034,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,562 UART: [rt]cmd =0x4d454153, len=108
4,066,705 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 ready_for_fw is high
1,055,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,396 >>> mbox cmd response: success
2,685,854 UART:
2,685,870 UART: Running Caliptra FMC ...
2,686,278 UART:
2,686,332 UART: [state] CFI Enabled
2,697,001 UART: [fht] FMC Alias Private Key: 7
2,804,496 UART: [art] Extend RT PCRs Done
2,804,924 UART: [art] Lock RT PCRs Done
2,806,158 UART: [art] Populate DV Done
2,814,707 UART: [fht] FMC Alias Private Key: 7
2,815,773 UART: [art] Derive CDI
2,816,053 UART: [art] Store in in slot 0x4
2,902,044 UART: [art] Derive Key Pair
2,902,404 UART: [art] Store priv key in slot 0x5
2,915,606 UART: [art] Derive Key Pair - Done
2,930,536 UART: [art] Signing Cert with AUTHO
2,931,016 UART: RITY.KEYID = 7
2,946,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,085 UART: [art] PUB.X = 532C4E6EED518D286D3C0C985414599785064B689043BA7F6054EF48B182B6874A844D73366053232442350B489B836A
2,953,828 UART: [art] PUB.Y = 79925A4F223812CAE97F3A64F3513A81192C1F3C5D51CD5B42EA375CDA3C06273886CF550111587EF61E8A38C5686538
2,960,768 UART: [art] SIG.R = 97CD351388B58FD2CAF35670CEC24195648711AD249153CE915050C540A135748EDDAED2FB56C07D38A81BEF233D0086
2,967,518 UART: [art] SIG.S = 9F35B182EC48FBA87C09B749065AA92ECF6527A7F7E1A15AD43DA8F1D5FFD509780F6168833C747480ACD1F610617BA5
2,990,865 UART: Caliptra RT
2,991,118 UART: [state] CFI Enabled
3,098,898 UART: [rt] RT listening for mailbox commands...
3,099,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,004 UART: [rt]cmd =0x4d454153, len=108
3,150,662 >>> mbox cmd response data (12 bytes)
3,150,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,494 UART: [rt]cmd =0x4d454153, len=108
3,201,020 >>> mbox cmd response data (12 bytes)
3,201,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,766 UART: [rt]cmd =0x4d454153, len=108
3,251,770 >>> mbox cmd response data (12 bytes)
3,251,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,988 UART: [rt]cmd =0x4d454153, len=108
3,302,298 >>> mbox cmd response data (12 bytes)
3,302,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,308 UART: [rt]cmd =0x4d454153, len=108
3,353,218 >>> mbox cmd response data (12 bytes)
3,353,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,378 UART: [rt]cmd =0x4d454153, len=108
3,403,668 >>> mbox cmd response data (12 bytes)
3,403,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,804 UART: [rt]cmd =0x4d454153, len=108
3,454,140 >>> mbox cmd response data (12 bytes)
3,454,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,204 UART: [rt]cmd =0x4d454153, len=108
3,504,630 >>> mbox cmd response data (12 bytes)
3,504,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,502 UART: [rt]cmd =0x4d454153, len=108
3,555,460 >>> mbox cmd response data (12 bytes)
3,555,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,436 UART: [rt]cmd =0x4d454153, len=108
3,606,630 >>> mbox cmd response data (12 bytes)
3,606,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,838 UART: [rt]cmd =0x4d454153, len=108
3,657,536 >>> mbox cmd response data (12 bytes)
3,657,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,402 UART: [rt]cmd =0x4d454153, len=108
3,708,420 >>> mbox cmd response data (12 bytes)
3,708,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,380 UART: [rt]cmd =0x4d454153, len=108
3,759,896 >>> mbox cmd response data (12 bytes)
3,759,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,964 UART: [rt]cmd =0x4d454153, len=108
3,810,664 >>> mbox cmd response data (12 bytes)
3,810,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,762 UART: [rt]cmd =0x4d454153, len=108
3,861,828 >>> mbox cmd response data (12 bytes)
3,861,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,938 UART: [rt]cmd =0x4d454153, len=108
3,893,665 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,695 UART: [state] LifecycleState = Unprovisioned
85,350 UART: [state] DebugLocked = No
86,066 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,490 UART: [kat] SHA2-256
901,430 UART: [kat] SHA2-384
904,207 UART: [kat] SHA2-512-ACC
906,108 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,356 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 ready_for_fw is high
1,174,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,020 UART: [fwproc] Recv command 0x46574c44
1,282,753 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,869 >>> mbox cmd response: success
2,775,038 UART: [afmc] ++
2,775,206 UART: [afmc] CDI.KEYID = 6
2,775,569 UART: [afmc] SUBJECT.KEYID = 7
2,775,995 UART: [afmc] AUTHORITY.KEYID = 5
2,811,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,661 UART: [afmc] --
2,854,563 UART: [cold-reset] --
2,855,451 UART: [state] Locking Datavault
2,856,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,174 UART: [state] Locking ICCM
2,857,766 UART: [exit] Launching FMC @ 0x40000130
2,863,095 UART:
2,863,111 UART: Running Caliptra FMC ...
2,863,519 UART:
2,863,662 UART: [state] CFI Enabled
2,874,339 UART: [fht] FMC Alias Private Key: 7
2,981,962 UART: [art] Extend RT PCRs Done
2,982,390 UART: [art] Lock RT PCRs Done
2,983,896 UART: [art] Populate DV Done
2,992,245 UART: [fht] FMC Alias Private Key: 7
2,993,231 UART: [art] Derive CDI
2,993,511 UART: [art] Store in in slot 0x4
3,078,836 UART: [art] Derive Key Pair
3,079,196 UART: [art] Store priv key in slot 0x5
3,092,518 UART: [art] Derive Key Pair - Done
3,107,450 UART: [art] Signing Cert with AUTHO
3,107,930 UART: RITY.KEYID = 7
3,122,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,637 UART: [art] PUB.X = 9DA41064025191A63FDD85BB5106222A358C4FE07D96E41DB28451A4F34C632E6BA1E0DC9C5B7523459BF06C243692AA
3,130,403 UART: [art] PUB.Y = 45451876F178D5FA703C168096C620AFFEED1A2011A5D46A5D358B9B45508A23D636DE6B40E84053AD3E5FDFB2B5F9A4
3,137,361 UART: [art] SIG.R = 14C870112BECA3C0D17887B02EB1366EEEFA0778BC2E7CC65765D52B51781E34D803BDDFB624AC3237504232730BB932
3,144,126 UART: [art] SIG.S = F63C383371B8A3C371372FCD7FF77A1A3BB37E2A053F779CBB24683B7BB24918319E3409168715328DE5F2B0A991B4D5
3,168,149 UART: Caliptra RT
3,168,494 UART: [state] CFI Enabled
3,275,589 UART: [rt] RT listening for mailbox commands...
3,276,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,857 UART: [rt]cmd =0x4d454153, len=108
3,328,089 >>> mbox cmd response data (12 bytes)
3,328,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,265 UART: [rt]cmd =0x4d454153, len=108
3,378,257 >>> mbox cmd response data (12 bytes)
3,378,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,041 UART: [rt]cmd =0x4d454153, len=108
3,428,195 >>> mbox cmd response data (12 bytes)
3,428,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,349 UART: [rt]cmd =0x4d454153, len=108
3,478,759 >>> mbox cmd response data (12 bytes)
3,478,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,859 UART: [rt]cmd =0x4d454153, len=108
3,529,137 >>> mbox cmd response data (12 bytes)
3,529,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,151 UART: [rt]cmd =0x4d454153, len=108
3,580,811 >>> mbox cmd response data (12 bytes)
3,580,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,955 UART: [rt]cmd =0x4d454153, len=108
3,631,663 >>> mbox cmd response data (12 bytes)
3,631,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,687 UART: [rt]cmd =0x4d454153, len=108
3,682,779 >>> mbox cmd response data (12 bytes)
3,682,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,713 UART: [rt]cmd =0x4d454153, len=108
3,733,489 >>> mbox cmd response data (12 bytes)
3,733,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,755 UART: [rt]cmd =0x4d454153, len=108
3,784,625 >>> mbox cmd response data (12 bytes)
3,784,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,737 UART: [rt]cmd =0x4d454153, len=108
3,835,211 >>> mbox cmd response data (12 bytes)
3,835,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,393 UART: [rt]cmd =0x4d454153, len=108
3,885,587 >>> mbox cmd response data (12 bytes)
3,885,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,657 UART: [rt]cmd =0x4d454153, len=108
3,936,841 >>> mbox cmd response data (12 bytes)
3,936,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,775 UART: [rt]cmd =0x4d454153, len=108
3,987,257 >>> mbox cmd response data (12 bytes)
3,987,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,247 UART: [rt]cmd =0x4d454153, len=108
4,038,117 >>> mbox cmd response data (12 bytes)
4,038,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,115 UART: [rt]cmd =0x4d454153, len=108
4,070,060 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 ready_for_fw is high
1,056,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,945 >>> mbox cmd response: success
2,686,757 UART:
2,686,773 UART: Running Caliptra FMC ...
2,687,181 UART:
2,687,324 UART: [state] CFI Enabled
2,697,661 UART: [fht] FMC Alias Private Key: 7
2,805,122 UART: [art] Extend RT PCRs Done
2,805,550 UART: [art] Lock RT PCRs Done
2,807,238 UART: [art] Populate DV Done
2,815,379 UART: [fht] FMC Alias Private Key: 7
2,816,449 UART: [art] Derive CDI
2,816,729 UART: [art] Store in in slot 0x4
2,902,672 UART: [art] Derive Key Pair
2,903,032 UART: [art] Store priv key in slot 0x5
2,915,846 UART: [art] Derive Key Pair - Done
2,930,751 UART: [art] Signing Cert with AUTHO
2,931,231 UART: RITY.KEYID = 7
2,945,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,496 UART: [art] PUB.X = 8605678F215E02A34CD831FBCF8A10F7860C5C7D4A467E98EE76277CA6905BC83048C2759DF113E2D4149FDC4FCCFF07
2,953,262 UART: [art] PUB.Y = F4D73778ECC98D2661411C4B7F6B6511D3816DC00B4B1030817396C91FE04D744B2AA0494831241E5B8432DC1491F537
2,960,201 UART: [art] SIG.R = D00E0619E2AFAA5D5B9B5D72A60436054D456D9037C2C63E1AF6CAF9CC43B23A56C558FF347239D3BEBB36244F552C1D
2,966,971 UART: [art] SIG.S = 1C5E5C18C4CE0B61FDC3596916736E8B6982EFDCA6548C59C6806EB07EB9C66C38A4ED8FA6C90557D4300D95058BF22B
2,990,508 UART: Caliptra RT
2,990,853 UART: [state] CFI Enabled
3,098,828 UART: [rt] RT listening for mailbox commands...
3,099,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,142 UART: [rt]cmd =0x4d454153, len=108
3,150,136 >>> mbox cmd response data (12 bytes)
3,150,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,086 UART: [rt]cmd =0x4d454153, len=108
3,200,708 >>> mbox cmd response data (12 bytes)
3,200,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,876 UART: [rt]cmd =0x4d454153, len=108
3,251,002 >>> mbox cmd response data (12 bytes)
3,251,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,884 UART: [rt]cmd =0x4d454153, len=108
3,301,974 >>> mbox cmd response data (12 bytes)
3,301,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,890 UART: [rt]cmd =0x4d454153, len=108
3,352,720 >>> mbox cmd response data (12 bytes)
3,352,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,546 UART: [rt]cmd =0x4d454153, len=108
3,403,374 >>> mbox cmd response data (12 bytes)
3,403,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,342 UART: [rt]cmd =0x4d454153, len=108
3,453,956 >>> mbox cmd response data (12 bytes)
3,453,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,976 UART: [rt]cmd =0x4d454153, len=108
3,503,994 >>> mbox cmd response data (12 bytes)
3,503,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,936 UART: [rt]cmd =0x4d454153, len=108
3,555,296 >>> mbox cmd response data (12 bytes)
3,555,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,162 UART: [rt]cmd =0x4d454153, len=108
3,606,128 >>> mbox cmd response data (12 bytes)
3,606,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,070 UART: [rt]cmd =0x4d454153, len=108
3,656,090 >>> mbox cmd response data (12 bytes)
3,656,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,036 UART: [rt]cmd =0x4d454153, len=108
3,707,352 >>> mbox cmd response data (12 bytes)
3,707,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,466 UART: [rt]cmd =0x4d454153, len=108
3,757,294 >>> mbox cmd response data (12 bytes)
3,757,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,328 UART: [rt]cmd =0x4d454153, len=108
3,807,204 >>> mbox cmd response data (12 bytes)
3,807,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,958 UART: [rt]cmd =0x4d454153, len=108
3,857,294 >>> mbox cmd response data (12 bytes)
3,857,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,282 UART: [rt]cmd =0x4d454153, len=108
3,889,417 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,996 UART:
192,362 UART: Running Caliptra ROM ...
193,560 UART:
193,718 UART: [state] CFI Enabled
263,220 UART: [state] LifecycleState = Unprovisioned
265,479 UART: [state] DebugLocked = No
267,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,024 UART: [kat] SHA2-256
442,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,188 UART: [kat] ++
453,750 UART: [kat] sha1
466,191 UART: [kat] SHA2-256
468,913 UART: [kat] SHA2-384
473,773 UART: [kat] SHA2-512-ACC
476,142 UART: [kat] ECC-384
2,767,189 UART: [kat] HMAC-384Kdf
2,799,661 UART: [kat] LMS
3,989,986 UART: [kat] --
3,993,768 UART: [cold-reset] ++
3,995,480 UART: [fht] Storing FHT @ 0x50003400
4,007,810 UART: [idev] ++
4,008,380 UART: [idev] CDI.KEYID = 6
4,009,342 UART: [idev] SUBJECT.KEYID = 7
4,010,594 UART: [idev] UDS.KEYID = 0
4,011,568 ready_for_fw is high
4,011,769 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,424 UART: [idev] Erasing UDS.KEYID = 0
7,347,746 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,474 UART: [idev] --
7,375,124 UART: [ldev] ++
7,375,690 UART: [ldev] CDI.KEYID = 6
7,376,678 UART: [ldev] SUBJECT.KEYID = 5
7,377,894 UART: [ldev] AUTHORITY.KEYID = 7
7,379,125 UART: [ldev] FE.KEYID = 1
7,422,944 UART: [ldev] Erasing FE.KEYID = 1
10,755,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,787 UART: [ldev] --
13,113,970 UART: [fwproc] Waiting for Commands...
13,117,311 UART: [fwproc] Received command 0x46574c44
13,119,496 UART: [fwproc] Received Image of size 114124 bytes
17,175,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,004 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,625 >>> mbox cmd response: success
17,637,933 UART: [afmc] ++
17,638,529 UART: [afmc] CDI.KEYID = 6
17,639,476 UART: [afmc] SUBJECT.KEYID = 7
17,640,693 UART: [afmc] AUTHORITY.KEYID = 5
21,007,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,098 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,347 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,776 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,355 UART: [afmc] --
23,375,549 UART: [cold-reset] --
23,379,574 UART: [state] Locking Datavault
23,383,904 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,699 UART: [state] Locking ICCM
23,386,798 UART: [exit] Launching FMC @ 0x40000130
23,395,198 UART:
23,395,445 UART: Running Caliptra FMC ...
23,396,548 UART:
23,396,707 UART: [state] CFI Enabled
23,466,584 UART: [fht] FMC Alias Private Key: 7
25,804,546 UART: [art] Extend RT PCRs Done
25,805,776 UART: [art] Lock RT PCRs Done
25,807,378 UART: [art] Populate DV Done
25,812,890 UART: [fht] FMC Alias Private Key: 7
25,814,589 UART: [art] Derive CDI
25,815,335 UART: [art] Store in in slot 0x4
25,874,631 UART: [art] Derive Key Pair
25,875,676 UART: [art] Store priv key in slot 0x5
29,167,983 UART: [art] Derive Key Pair - Done
29,180,755 UART: [art] Signing Cert with AUTHO
29,182,085 UART: RITY.KEYID = 7
31,469,548 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,054 UART: [art] PUB.X = 88D2A8E5296790DD983E1097AD3385E48B7F0676B1E3C4F16885693990F1C17253DCC0F4F0E72C20826ACD50F1918DED
31,478,254 UART: [art] PUB.Y = F1667E89CA58CB12EA9A7427840A000EEF95337F569E257B17657750D3C787B2C8C42FFB361BFAA52E97B3B7E30F823A
31,485,501 UART: [art] SIG.R = 5E86EB51703A9E6CCA971A985A04D641588FC4F80E641A9F0245AF75FB16E8DF4FE92CFCAEA8B14396645F55BB66218D
31,492,898 UART: [art] SIG.S = 6B7074AFE942F2823A0DF9DAE652731D485B9E6D6D7BE137F21245DD003B3E8E819CC41B823A538D71228822BFB5E94E
32,797,787 UART: Caliptra RT
32,798,485 UART: [state] CFI Enabled
32,958,927 UART: [rt] RT listening for mailbox commands...
32,960,852 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,990,855 UART: [rt]cmd =0x44504543, len=40
33,033,544 >>> mbox cmd response data (40 bytes)
33,034,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,065,706 UART: [rt]cmd =0x44504543, len=96
33,125,210 >>> mbox cmd response data (56 bytes)
33,125,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,156,463 UART: [rt]cmd =0x44504543, len=96
33,231,734 >>> mbox cmd response data (56 bytes)
33,232,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,263,009 UART: [rt]cmd =0x44504543, len=96
33,338,262 >>> mbox cmd response data (56 bytes)
33,338,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,369,361 UART: [rt]cmd =0x44504543, len=96
33,444,952 >>> mbox cmd response data (56 bytes)
33,445,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,476,169 UART: [rt]cmd =0x44504543, len=96
33,552,406 >>> mbox cmd response data (56 bytes)
33,553,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,583,613 UART: [rt]cmd =0x44504543, len=96
33,658,639 >>> mbox cmd response data (56 bytes)
33,659,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,690,004 UART: [rt]cmd =0x44504543, len=96
33,765,433 >>> mbox cmd response data (56 bytes)
33,766,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,796,669 UART: [rt]cmd =0x44504543, len=96
33,872,190 >>> mbox cmd response data (56 bytes)
33,872,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,903,281 UART: [rt]cmd =0x44504543, len=96
33,978,411 >>> mbox cmd response data (56 bytes)
33,979,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,009,611 UART: [rt]cmd =0x44504543, len=96
34,085,669 >>> mbox cmd response data (56 bytes)
34,086,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,116,838 UART: [rt]cmd =0x44504543, len=96
34,192,138 >>> mbox cmd response data (56 bytes)
34,192,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,223,072 UART: [rt]cmd =0x44504543, len=96
34,299,006 >>> mbox cmd response data (56 bytes)
34,299,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,330,381 UART: [rt]cmd =0x44504543, len=96
34,406,216 >>> mbox cmd response data (56 bytes)
34,406,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,437,445 UART: [rt]cmd =0x44504543, len=96
34,512,602 >>> mbox cmd response data (56 bytes)
34,513,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,543,760 UART: [rt]cmd =0x44504543, len=96
34,619,639 >>> mbox cmd response data (56 bytes)
34,620,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,650,682 UART: [rt]cmd =0x44504543, len=96
34,656,867 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,784,421 ready_for_fw is high
3,784,954 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,484 >>> mbox cmd response: success
23,558,791 UART:
23,559,175 UART: Running Caliptra FMC ...
23,560,369 UART:
23,560,542 UART: [state] CFI Enabled
23,628,208 UART: [fht] FMC Alias Private Key: 7
25,965,542 UART: [art] Extend RT PCRs Done
25,966,769 UART: [art] Lock RT PCRs Done
25,968,509 UART: [art] Populate DV Done
25,973,791 UART: [fht] FMC Alias Private Key: 7
25,975,434 UART: [art] Derive CDI
25,976,264 UART: [art] Store in in slot 0x4
26,036,828 UART: [art] Derive Key Pair
26,037,834 UART: [art] Store priv key in slot 0x5
29,330,941 UART: [art] Derive Key Pair - Done
29,344,251 UART: [art] Signing Cert with AUTHO
29,345,582 UART: RITY.KEYID = 7
31,632,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,968 UART: [art] PUB.X = DA69547DF0F1313FD4720959D08404D8AC0FF656011B3D4848E11F838272FB7F10F02F049DD1397BF1E0293A37C358BC
31,641,172 UART: [art] PUB.Y = E27F6CFB06E58B4F65CAF3323A06DBE5F5C623F110934583AC41906E7857BDA4DF4E21C1B2531B4C59849A7BE1752F6E
31,648,462 UART: [art] SIG.R = ED32FD24EE29C1853215C20C811190481044F6B54565C9FB232A38063C44A0A5900A3889B65CD209C51DE814A5D6742A
31,655,843 UART: [art] SIG.S = 196F1D8B3BB45ACD73AB28FC1D6DF3FFC8C1B3F70B5C48FB3939BE3C1341170F0FC1F1AA1C45D83B64DB20E3F12F60DA
32,961,248 UART: Caliptra RT
32,961,956 UART: [state] CFI Enabled
33,124,091 UART: [rt] RT listening for mailbox commands...
33,126,027 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,156,144 UART: [rt]cmd =0x44504543, len=40
33,197,925 >>> mbox cmd response data (40 bytes)
33,199,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,230,063 UART: [rt]cmd =0x44504543, len=96
33,289,450 >>> mbox cmd response data (56 bytes)
33,290,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,320,684 UART: [rt]cmd =0x44504543, len=96
33,396,051 >>> mbox cmd response data (56 bytes)
33,396,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,427,279 UART: [rt]cmd =0x44504543, len=96
33,503,161 >>> mbox cmd response data (56 bytes)
33,503,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,534,287 UART: [rt]cmd =0x44504543, len=96
33,610,004 >>> mbox cmd response data (56 bytes)
33,610,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,641,327 UART: [rt]cmd =0x44504543, len=96
33,716,569 >>> mbox cmd response data (56 bytes)
33,717,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,747,794 UART: [rt]cmd =0x44504543, len=96
33,823,211 >>> mbox cmd response data (56 bytes)
33,823,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,854,516 UART: [rt]cmd =0x44504543, len=96
33,930,292 >>> mbox cmd response data (56 bytes)
33,931,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,961,720 UART: [rt]cmd =0x44504543, len=96
34,037,076 >>> mbox cmd response data (56 bytes)
34,037,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,068,458 UART: [rt]cmd =0x44504543, len=96
34,143,683 >>> mbox cmd response data (56 bytes)
34,144,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,174,788 UART: [rt]cmd =0x44504543, len=96
34,250,555 >>> mbox cmd response data (56 bytes)
34,251,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,281,969 UART: [rt]cmd =0x44504543, len=96
34,357,204 >>> mbox cmd response data (56 bytes)
34,357,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,388,702 UART: [rt]cmd =0x44504543, len=96
34,464,333 >>> mbox cmd response data (56 bytes)
34,465,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,495,594 UART: [rt]cmd =0x44504543, len=96
34,570,770 >>> mbox cmd response data (56 bytes)
34,571,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,602,035 UART: [rt]cmd =0x44504543, len=96
34,677,549 >>> mbox cmd response data (56 bytes)
34,678,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,708,745 UART: [rt]cmd =0x44504543, len=96
34,784,247 >>> mbox cmd response data (56 bytes)
34,784,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,815,480 UART: [rt]cmd =0x44504543, len=96
34,821,992 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,468 UART:
192,919 UART: Running Caliptra ROM ...
194,095 UART:
603,607 UART: [state] CFI Enabled
616,774 UART: [state] LifecycleState = Unprovisioned
618,722 UART: [state] DebugLocked = No
621,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,193 UART: [kat] SHA2-256
795,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,492 UART: [kat] ++
806,932 UART: [kat] sha1
817,706 UART: [kat] SHA2-256
820,425 UART: [kat] SHA2-384
825,270 UART: [kat] SHA2-512-ACC
827,631 UART: [kat] ECC-384
3,111,657 UART: [kat] HMAC-384Kdf
3,124,461 UART: [kat] LMS
4,314,581 UART: [kat] --
4,319,896 UART: [cold-reset] ++
4,322,328 UART: [fht] Storing FHT @ 0x50003400
4,332,590 UART: [idev] ++
4,333,145 UART: [idev] CDI.KEYID = 6
4,334,086 UART: [idev] SUBJECT.KEYID = 7
4,335,321 UART: [idev] UDS.KEYID = 0
4,336,282 ready_for_fw is high
4,336,475 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,838 UART: [idev] Erasing UDS.KEYID = 0
7,618,249 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,840 UART: [idev] --
7,645,445 UART: [ldev] ++
7,646,007 UART: [ldev] CDI.KEYID = 6
7,646,941 UART: [ldev] SUBJECT.KEYID = 5
7,648,194 UART: [ldev] AUTHORITY.KEYID = 7
7,649,468 UART: [ldev] FE.KEYID = 1
7,661,805 UART: [ldev] Erasing FE.KEYID = 1
10,951,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,253 UART: [ldev] --
13,312,404 UART: [fwproc] Waiting for Commands...
13,315,032 UART: [fwproc] Received command 0x46574c44
13,317,317 UART: [fwproc] Received Image of size 114124 bytes
17,363,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,441 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,935 >>> mbox cmd response: success
17,830,705 UART: [afmc] ++
17,831,356 UART: [afmc] CDI.KEYID = 6
17,832,257 UART: [afmc] SUBJECT.KEYID = 7
17,833,472 UART: [afmc] AUTHORITY.KEYID = 5
21,147,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,396 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,702 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,031 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,908 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,318 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,970 UART: [afmc] --
23,511,134 UART: [cold-reset] --
23,515,808 UART: [state] Locking Datavault
23,521,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,074 UART: [state] Locking ICCM
23,525,685 UART: [exit] Launching FMC @ 0x40000130
23,534,073 UART:
23,534,307 UART: Running Caliptra FMC ...
23,535,347 UART:
23,535,490 UART: [state] CFI Enabled
23,544,206 UART: [fht] FMC Alias Private Key: 7
25,874,935 UART: [art] Extend RT PCRs Done
25,876,147 UART: [art] Lock RT PCRs Done
25,877,903 UART: [art] Populate DV Done
25,883,468 UART: [fht] FMC Alias Private Key: 7
25,884,955 UART: [art] Derive CDI
25,885,710 UART: [art] Store in in slot 0x4
25,928,304 UART: [art] Derive Key Pair
25,929,344 UART: [art] Store priv key in slot 0x5
29,171,141 UART: [art] Derive Key Pair - Done
29,183,979 UART: [art] Signing Cert with AUTHO
29,185,807 UART: RITY.KEYID = 7
31,464,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,051 UART: [art] PUB.X = 7F56286C1637509E433198827642C97AC6D3B626463A009456E7BFC959AB96EAD7D63E48206E922BB2C3F26501EAACA4
31,473,303 UART: [art] PUB.Y = BA6893ADDF9F3740002B1234186AFA5B0ACB0653FF590935F3EF09110244B23E90FAA809C6C7D0869B24973C73BFB6BE
31,480,517 UART: [art] SIG.R = 2BEC963C4F1F41370F69CE4AF1DF7CECA30F478E6BBD5994087FCC63B90D4F2E20E50102F6B77E7F260DF6D06B1F19C2
31,487,894 UART: [art] SIG.S = 601BC0700A7BEFC9FD34BEF612178BE750F1B93D0CDD772778B1888501C1CD62E24A6B219505730F739CCB803DF7F1BD
32,793,311 UART: Caliptra RT
32,794,011 UART: [state] CFI Enabled
32,911,882 UART: [rt] RT listening for mailbox commands...
32,913,799 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,943,898 UART: [rt]cmd =0x44504543, len=40
32,970,073 >>> mbox cmd response data (40 bytes)
32,971,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,001,911 UART: [rt]cmd =0x44504543, len=96
33,042,660 >>> mbox cmd response data (56 bytes)
33,043,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,073,898 UART: [rt]cmd =0x44504543, len=96
33,115,106 >>> mbox cmd response data (56 bytes)
33,115,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,146,452 UART: [rt]cmd =0x44504543, len=96
33,187,388 >>> mbox cmd response data (56 bytes)
33,188,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,218,425 UART: [rt]cmd =0x44504543, len=96
33,260,103 >>> mbox cmd response data (56 bytes)
33,260,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,291,495 UART: [rt]cmd =0x44504543, len=96
33,332,938 >>> mbox cmd response data (56 bytes)
33,333,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,364,150 UART: [rt]cmd =0x44504543, len=96
33,405,125 >>> mbox cmd response data (56 bytes)
33,405,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,436,378 UART: [rt]cmd =0x44504543, len=96
33,478,042 >>> mbox cmd response data (56 bytes)
33,478,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,509,399 UART: [rt]cmd =0x44504543, len=96
33,551,407 >>> mbox cmd response data (56 bytes)
33,552,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,582,792 UART: [rt]cmd =0x44504543, len=96
33,625,613 >>> mbox cmd response data (56 bytes)
33,626,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,656,707 UART: [rt]cmd =0x44504543, len=96
33,700,070 >>> mbox cmd response data (56 bytes)
33,700,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,731,320 UART: [rt]cmd =0x44504543, len=96
33,774,820 >>> mbox cmd response data (56 bytes)
33,775,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,805,902 UART: [rt]cmd =0x44504543, len=96
33,848,998 >>> mbox cmd response data (56 bytes)
33,849,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,880,351 UART: [rt]cmd =0x44504543, len=96
33,925,064 >>> mbox cmd response data (56 bytes)
33,925,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,956,227 UART: [rt]cmd =0x44504543, len=96
34,000,396 >>> mbox cmd response data (56 bytes)
34,001,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,031,705 UART: [rt]cmd =0x44504543, len=96
34,076,792 >>> mbox cmd response data (56 bytes)
34,077,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,108,109 UART: [rt]cmd =0x44504543, len=96
34,114,616 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
4,130,564 ready_for_fw is high
4,130,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,578 >>> mbox cmd response: success
23,700,173 UART:
23,700,579 UART: Running Caliptra FMC ...
23,701,773 UART:
23,701,936 UART: [state] CFI Enabled
23,709,875 UART: [fht] FMC Alias Private Key: 7
26,040,125 UART: [art] Extend RT PCRs Done
26,041,355 UART: [art] Lock RT PCRs Done
26,042,852 UART: [art] Populate DV Done
26,048,451 UART: [fht] FMC Alias Private Key: 7
26,049,993 UART: [art] Derive CDI
26,050,728 UART: [art] Store in in slot 0x4
26,093,165 UART: [art] Derive Key Pair
26,094,210 UART: [art] Store priv key in slot 0x5
29,336,010 UART: [art] Derive Key Pair - Done
29,349,367 UART: [art] Signing Cert with AUTHO
29,350,683 UART: RITY.KEYID = 7
31,629,808 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,632 UART: [art] PUB.X = 9C58104154BB2E3C4EE5AF0C3ED9FB619D5FAA0F2F21AD671A84C7017D89B450DBE80241FD5DA3E410D64A261413B8A7
31,638,586 UART: [art] PUB.Y = F0C911701832DEE92B504699EFFC299D6A49D0573A5BC218E54456AFA8539871E60CD387C5BB34AD00A1A64ABBBCC06F
31,645,813 UART: [art] SIG.R = EB1EF1C1BB08222A88E80EF8974FD5454917CB667DD854CEDFC5FF9E29849F327737ED06292495A0D2C18C1BB8CDFB71
31,653,231 UART: [art] SIG.S = 6F0F00824D8B64CCE77389268BC75ACE109E899F183EFE7A36FB65E2638817AFA544A1F181FF101CC56076854E0FA566
32,958,242 UART: Caliptra RT
32,958,970 UART: [state] CFI Enabled
33,076,655 UART: [rt] RT listening for mailbox commands...
33,078,618 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,108,903 UART: [rt]cmd =0x44504543, len=40
33,135,702 >>> mbox cmd response data (40 bytes)
33,137,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,577 UART: [rt]cmd =0x44504543, len=96
33,208,238 >>> mbox cmd response data (56 bytes)
33,208,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,239,343 UART: [rt]cmd =0x44504543, len=96
33,280,357 >>> mbox cmd response data (56 bytes)
33,281,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,311,710 UART: [rt]cmd =0x44504543, len=96
33,353,519 >>> mbox cmd response data (56 bytes)
33,354,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,384,708 UART: [rt]cmd =0x44504543, len=96
33,425,493 >>> mbox cmd response data (56 bytes)
33,426,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,456,748 UART: [rt]cmd =0x44504543, len=96
33,498,193 >>> mbox cmd response data (56 bytes)
33,498,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,529,670 UART: [rt]cmd =0x44504543, len=96
33,570,651 >>> mbox cmd response data (56 bytes)
33,571,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,602,168 UART: [rt]cmd =0x44504543, len=96
33,645,271 >>> mbox cmd response data (56 bytes)
33,645,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,676,519 UART: [rt]cmd =0x44504543, len=96
33,719,079 >>> mbox cmd response data (56 bytes)
33,719,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,750,165 UART: [rt]cmd =0x44504543, len=96
33,792,931 >>> mbox cmd response data (56 bytes)
33,793,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,824,235 UART: [rt]cmd =0x44504543, len=96
33,867,509 >>> mbox cmd response data (56 bytes)
33,868,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,898,769 UART: [rt]cmd =0x44504543, len=96
33,942,085 >>> mbox cmd response data (56 bytes)
33,942,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,973,283 UART: [rt]cmd =0x44504543, len=96
34,016,585 >>> mbox cmd response data (56 bytes)
34,017,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,047,786 UART: [rt]cmd =0x44504543, len=96
34,091,802 >>> mbox cmd response data (56 bytes)
34,092,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,122,940 UART: [rt]cmd =0x44504543, len=96
34,167,147 >>> mbox cmd response data (56 bytes)
34,167,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,198,314 UART: [rt]cmd =0x44504543, len=96
34,243,106 >>> mbox cmd response data (56 bytes)
34,243,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,274,153 UART: [rt]cmd =0x44504543, len=96
34,280,826 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,153 UART:
192,518 UART: Running Caliptra ROM ...
193,708 UART:
193,865 UART: [state] CFI Enabled
264,184 UART: [state] LifecycleState = Unprovisioned
266,019 UART: [state] DebugLocked = No
267,345 UART: [state] WD Timer not started. Device not locked for debugging
271,594 UART: [kat] SHA2-256
450,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,266 UART: [kat] ++
462,814 UART: [kat] sha1
472,806 UART: [kat] SHA2-256
475,863 UART: [kat] SHA2-384
482,215 UART: [kat] SHA2-512-ACC
485,152 UART: [kat] ECC-384
2,948,177 UART: [kat] HMAC-384Kdf
2,970,795 UART: [kat] LMS
3,500,250 UART: [kat] --
3,506,228 UART: [cold-reset] ++
3,508,232 UART: [fht] FHT @ 0x50003400
3,519,156 UART: [idev] ++
3,519,761 UART: [idev] CDI.KEYID = 6
3,520,677 UART: [idev] SUBJECT.KEYID = 7
3,521,851 UART: [idev] UDS.KEYID = 0
3,522,776 ready_for_fw is high
3,522,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,773 UART: [idev] Erasing UDS.KEYID = 0
6,026,429 UART: [idev] Sha1 KeyId Algorithm
6,048,525 UART: [idev] --
6,052,896 UART: [ldev] ++
6,053,464 UART: [ldev] CDI.KEYID = 6
6,054,427 UART: [ldev] SUBJECT.KEYID = 5
6,055,589 UART: [ldev] AUTHORITY.KEYID = 7
6,056,816 UART: [ldev] FE.KEYID = 1
6,099,765 UART: [ldev] Erasing FE.KEYID = 1
8,602,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,649 UART: [ldev] --
10,394,536 UART: [fwproc] Wait for Commands...
10,396,687 UART: [fwproc] Recv command 0x46574c44
10,398,789 UART: [fwproc] Recv'd Img size: 114448 bytes
13,804,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,082 >>> mbox cmd response: success
14,270,505 UART: [afmc] ++
14,271,100 UART: [afmc] CDI.KEYID = 6
14,272,010 UART: [afmc] SUBJECT.KEYID = 7
14,273,174 UART: [afmc] AUTHORITY.KEYID = 5
16,810,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,536,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,538,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,585,649 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,608,629 UART: [afmc] --
18,612,230 UART: [cold-reset] --
18,615,605 UART: [state] Locking Datavault
18,619,067 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,709 UART: [state] Locking ICCM
18,621,778 UART: [exit] Launching FMC @ 0x40000130
18,630,226 UART:
18,630,467 UART: Running Caliptra FMC ...
18,631,570 UART:
18,631,731 UART: [state] CFI Enabled
18,694,440 UART: [fht] FMC Alias Private Key: 7
20,457,915 UART: [art] Extend RT PCRs Done
20,459,131 UART: [art] Lock RT PCRs Done
20,460,707 UART: [art] Populate DV Done
20,466,168 UART: [fht] FMC Alias Private Key: 7
20,467,648 UART: [art] Derive CDI
20,468,431 UART: [art] Store in in slot 0x4
20,527,216 UART: [art] Derive Key Pair
20,528,260 UART: [art] Store priv key in slot 0x5
22,991,023 UART: [art] Derive Key Pair - Done
23,004,016 UART: [art] Signing Cert with AUTHO
23,005,319 UART: RITY.KEYID = 7
24,716,627 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,125 UART: [art] PUB.X = 3C2BCC7CB75158D4638EEDD99DBDD842440AC48127516C4607BDC5B390CCA7FC81B8354323038E0E355759CF33484D1D
24,725,421 UART: [art] PUB.Y = FC0B2AB02242739C1C50ECD3A152187972B66486D5B0C85CAA7C0825BC01E62EF8F9444056B9AFE2FEB825A24BC54E29
24,732,658 UART: [art] SIG.R = C8A7517C955216DC696DDF66DE8C71F7ADE51CAA83EC5DC2062D95FB79145EEB94BD3019F8110D226D2294833CE0ACAB
24,740,100 UART: [art] SIG.S = 08970C333B2173B6420CCFD2E232D09EF7423FECDA6B5F8497B0CD2E586ABF2BC52A8879614853F05585C9C20D856C36
25,718,768 UART: Caliptra RT
25,719,465 UART: [state] CFI Enabled
25,884,515 UART: [rt] RT listening for mailbox commands...
25,886,432 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,917,159 UART: [rt]cmd =0x44504543, len=40
25,958,863 >>> mbox cmd response data (40 bytes)
25,959,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,990,590 UART: [rt]cmd =0x44504543, len=96
26,051,329 >>> mbox cmd response data (56 bytes)
26,052,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,082,653 UART: [rt]cmd =0x44504543, len=96
26,158,470 >>> mbox cmd response data (56 bytes)
26,159,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,189,790 UART: [rt]cmd =0x44504543, len=96
26,265,140 >>> mbox cmd response data (56 bytes)
26,265,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,296,347 UART: [rt]cmd =0x44504543, len=96
26,371,703 >>> mbox cmd response data (56 bytes)
26,372,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,022 UART: [rt]cmd =0x44504543, len=96
26,478,330 >>> mbox cmd response data (56 bytes)
26,479,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,509,545 UART: [rt]cmd =0x44504543, len=96
26,585,638 >>> mbox cmd response data (56 bytes)
26,586,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,617,045 UART: [rt]cmd =0x44504543, len=96
26,692,646 >>> mbox cmd response data (56 bytes)
26,693,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,723,932 UART: [rt]cmd =0x44504543, len=96
26,799,623 >>> mbox cmd response data (56 bytes)
26,800,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,830,765 UART: [rt]cmd =0x44504543, len=96
26,906,543 >>> mbox cmd response data (56 bytes)
26,907,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,937,727 UART: [rt]cmd =0x44504543, len=96
27,013,596 >>> mbox cmd response data (56 bytes)
27,014,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,044,994 UART: [rt]cmd =0x44504543, len=96
27,120,525 >>> mbox cmd response data (56 bytes)
27,121,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,151,837 UART: [rt]cmd =0x44504543, len=96
27,227,392 >>> mbox cmd response data (56 bytes)
27,228,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,258,641 UART: [rt]cmd =0x44504543, len=96
27,334,354 >>> mbox cmd response data (56 bytes)
27,335,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,365,664 UART: [rt]cmd =0x44504543, len=96
27,441,220 >>> mbox cmd response data (56 bytes)
27,441,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,472,422 UART: [rt]cmd =0x44504543, len=96
27,547,872 >>> mbox cmd response data (56 bytes)
27,548,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,579,118 UART: [rt]cmd =0x44504543, len=96
27,585,706 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,383,699 ready_for_fw is high
3,384,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,079,641 >>> mbox cmd response: success
18,372,024 UART:
18,372,406 UART: Running Caliptra FMC ...
18,373,617 UART:
18,373,787 UART: [state] CFI Enabled
18,437,404 UART: [fht] FMC Alias Private Key: 7
20,201,406 UART: [art] Extend RT PCRs Done
20,202,638 UART: [art] Lock RT PCRs Done
20,204,455 UART: [art] Populate DV Done
20,209,927 UART: [fht] FMC Alias Private Key: 7
20,211,470 UART: [art] Derive CDI
20,212,238 UART: [art] Store in in slot 0x4
20,271,006 UART: [art] Derive Key Pair
20,272,013 UART: [art] Store priv key in slot 0x5
22,734,997 UART: [art] Derive Key Pair - Done
22,747,831 UART: [art] Signing Cert with AUTHO
22,749,134 UART: RITY.KEYID = 7
24,460,551 UART: [art] Erasing AUTHORITY.KEYID = 7
24,462,030 UART: [art] PUB.X = 42CF772A2BEEA3BC34AA06AA72A218A058BD396319A7477BF7D3D18A1A8369DA8E59BD5941C00FC1788715401EAC8FD3
24,469,360 UART: [art] PUB.Y = 45EEADBDC47387AFECD883C601BDA01C7B971BC049583D8CE1F7C6917A427ADBABBFF9A33D4B67935662B02FCC8F2D6E
24,476,628 UART: [art] SIG.R = EED510A77FD4E60860D3153CF03BEC2862569FCBA1D2F37639205DCCFC8B8B37FD78E931296715F5A6AFC69EB566C122
24,484,033 UART: [art] SIG.S = 1A49510550173963101573BB0738F5C0B89FD56A3D67E8D68FBBCE1BF16594A3D20A5B0617F723668CFCE308E3524EC9
25,463,071 UART: Caliptra RT
25,463,796 UART: [state] CFI Enabled
25,629,285 UART: [rt] RT listening for mailbox commands...
25,631,208 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,662,130 UART: [rt]cmd =0x44504543, len=40
25,703,274 >>> mbox cmd response data (40 bytes)
25,704,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,735,119 UART: [rt]cmd =0x44504543, len=96
25,795,262 >>> mbox cmd response data (56 bytes)
25,795,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,826,586 UART: [rt]cmd =0x44504543, len=96
25,901,954 >>> mbox cmd response data (56 bytes)
25,902,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,387 UART: [rt]cmd =0x44504543, len=96
26,009,038 >>> mbox cmd response data (56 bytes)
26,009,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,040,359 UART: [rt]cmd =0x44504543, len=96
26,115,686 >>> mbox cmd response data (56 bytes)
26,116,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,146,898 UART: [rt]cmd =0x44504543, len=96
26,222,748 >>> mbox cmd response data (56 bytes)
26,223,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,942 UART: [rt]cmd =0x44504543, len=96
26,329,618 >>> mbox cmd response data (56 bytes)
26,330,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,361,050 UART: [rt]cmd =0x44504543, len=96
26,436,309 >>> mbox cmd response data (56 bytes)
26,437,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,467,444 UART: [rt]cmd =0x44504543, len=96
26,543,099 >>> mbox cmd response data (56 bytes)
26,543,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,574,521 UART: [rt]cmd =0x44504543, len=96
26,650,290 >>> mbox cmd response data (56 bytes)
26,651,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,681,598 UART: [rt]cmd =0x44504543, len=96
26,756,988 >>> mbox cmd response data (56 bytes)
26,757,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,788,081 UART: [rt]cmd =0x44504543, len=96
26,863,867 >>> mbox cmd response data (56 bytes)
26,864,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,895,070 UART: [rt]cmd =0x44504543, len=96
26,970,963 >>> mbox cmd response data (56 bytes)
26,971,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,001,967 UART: [rt]cmd =0x44504543, len=96
27,077,598 >>> mbox cmd response data (56 bytes)
27,078,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,108,958 UART: [rt]cmd =0x44504543, len=96
27,184,219 >>> mbox cmd response data (56 bytes)
27,184,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,215,363 UART: [rt]cmd =0x44504543, len=96
27,290,863 >>> mbox cmd response data (56 bytes)
27,291,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,322,117 UART: [rt]cmd =0x44504543, len=96
27,328,716 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,400 UART:
192,773 UART: Running Caliptra ROM ...
193,901 UART:
603,632 UART: [state] CFI Enabled
616,957 UART: [state] LifecycleState = Unprovisioned
618,841 UART: [state] DebugLocked = No
620,436 UART: [state] WD Timer not started. Device not locked for debugging
624,459 UART: [kat] SHA2-256
803,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,121 UART: [kat] ++
815,670 UART: [kat] sha1
826,899 UART: [kat] SHA2-256
829,977 UART: [kat] SHA2-384
836,098 UART: [kat] SHA2-512-ACC
839,104 UART: [kat] ECC-384
3,279,118 UART: [kat] HMAC-384Kdf
3,291,857 UART: [kat] LMS
3,821,363 UART: [kat] --
3,825,356 UART: [cold-reset] ++
3,827,135 UART: [fht] FHT @ 0x50003400
3,837,888 UART: [idev] ++
3,838,444 UART: [idev] CDI.KEYID = 6
3,839,350 UART: [idev] SUBJECT.KEYID = 7
3,840,511 UART: [idev] UDS.KEYID = 0
3,841,550 ready_for_fw is high
3,841,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,583 UART: [idev] Erasing UDS.KEYID = 0
6,308,868 UART: [idev] Sha1 KeyId Algorithm
6,330,254 UART: [idev] --
6,333,754 UART: [ldev] ++
6,334,316 UART: [ldev] CDI.KEYID = 6
6,335,326 UART: [ldev] SUBJECT.KEYID = 5
6,336,418 UART: [ldev] AUTHORITY.KEYID = 7
6,337,691 UART: [ldev] FE.KEYID = 1
6,348,383 UART: [ldev] Erasing FE.KEYID = 1
8,823,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,871 UART: [ldev] --
10,611,544 UART: [fwproc] Wait for Commands...
10,614,412 UART: [fwproc] Recv command 0x46574c44
10,616,451 UART: [fwproc] Recv'd Img size: 114448 bytes
14,017,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,217 >>> mbox cmd response: success
14,483,213 UART: [afmc] ++
14,483,801 UART: [afmc] CDI.KEYID = 6
14,484,706 UART: [afmc] SUBJECT.KEYID = 7
14,485,857 UART: [afmc] AUTHORITY.KEYID = 5
16,986,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,603 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,251 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,299 UART: [afmc] --
18,783,505 UART: [cold-reset] --
18,788,113 UART: [state] Locking Datavault
18,793,786 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,485 UART: [state] Locking ICCM
18,796,706 UART: [exit] Launching FMC @ 0x40000130
18,805,152 UART:
18,805,377 UART: Running Caliptra FMC ...
18,806,466 UART:
18,806,622 UART: [state] CFI Enabled
18,814,499 UART: [fht] FMC Alias Private Key: 7
20,571,838 UART: [art] Extend RT PCRs Done
20,573,055 UART: [art] Lock RT PCRs Done
20,574,484 UART: [art] Populate DV Done
20,579,891 UART: [fht] FMC Alias Private Key: 7
20,581,430 UART: [art] Derive CDI
20,582,255 UART: [art] Store in in slot 0x4
20,624,853 UART: [art] Derive Key Pair
20,625,887 UART: [art] Store priv key in slot 0x5
23,052,549 UART: [art] Derive Key Pair - Done
23,065,817 UART: [art] Signing Cert with AUTHO
23,067,120 UART: RITY.KEYID = 7
24,772,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,942 UART: [art] PUB.X = B3525D87B1B099E0F0E34AF719A2AB06881F1177772457EFEB252401F8B5DBEF3FEBF50C17203C414B15E17F7926A0B3
24,781,164 UART: [art] PUB.Y = E7D1F8EABDFA93DB665F8936DC924DCFF70DF0956C8BD7D6D70F7A21B42F7940E713910A56E5137EFC7853055528A026
24,788,460 UART: [art] SIG.R = 3B815D63E7E02EB3AA5DB44975597AB57734C74BE84A5A8846783ABAF9F6402DAD081B362DF986CECE46C407B2D67E63
24,795,878 UART: [art] SIG.S = 34722EBBD3CC5989B8DC709BE876EBF42C1EDB6ED780F13D0BC3D260E714A3C4B6525EC691C779C01A3BBF27F40D7272
25,774,967 UART: Caliptra RT
25,775,676 UART: [state] CFI Enabled
25,891,886 UART: [rt] RT listening for mailbox commands...
25,893,791 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,924,154 UART: [rt]cmd =0x44504543, len=40
25,950,735 >>> mbox cmd response data (40 bytes)
25,952,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,982,655 UART: [rt]cmd =0x44504543, len=96
26,022,872 >>> mbox cmd response data (56 bytes)
26,023,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,054,162 UART: [rt]cmd =0x44504543, len=96
26,094,809 >>> mbox cmd response data (56 bytes)
26,095,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,126,065 UART: [rt]cmd =0x44504543, len=96
26,167,295 >>> mbox cmd response data (56 bytes)
26,167,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,198,406 UART: [rt]cmd =0x44504543, len=96
26,239,133 >>> mbox cmd response data (56 bytes)
26,239,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,270,439 UART: [rt]cmd =0x44504543, len=96
26,312,565 >>> mbox cmd response data (56 bytes)
26,313,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,343,942 UART: [rt]cmd =0x44504543, len=96
26,385,954 >>> mbox cmd response data (56 bytes)
26,386,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,255 UART: [rt]cmd =0x44504543, len=96
26,459,161 >>> mbox cmd response data (56 bytes)
26,459,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,490,293 UART: [rt]cmd =0x44504543, len=96
26,532,393 >>> mbox cmd response data (56 bytes)
26,533,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,563,474 UART: [rt]cmd =0x44504543, len=96
26,606,510 >>> mbox cmd response data (56 bytes)
26,607,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,637,766 UART: [rt]cmd =0x44504543, len=96
26,680,521 >>> mbox cmd response data (56 bytes)
26,681,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,120 UART: [rt]cmd =0x44504543, len=96
26,755,167 >>> mbox cmd response data (56 bytes)
26,755,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,786,177 UART: [rt]cmd =0x44504543, len=96
26,830,374 >>> mbox cmd response data (56 bytes)
26,831,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,861,732 UART: [rt]cmd =0x44504543, len=96
26,905,885 >>> mbox cmd response data (56 bytes)
26,906,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,937,053 UART: [rt]cmd =0x44504543, len=96
26,981,093 >>> mbox cmd response data (56 bytes)
26,981,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,012,379 UART: [rt]cmd =0x44504543, len=96
27,057,550 >>> mbox cmd response data (56 bytes)
27,058,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,088,898 UART: [rt]cmd =0x44504543, len=96
27,095,306 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,695,312 ready_for_fw is high
3,695,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,767 >>> mbox cmd response: success
18,505,683 UART:
18,506,070 UART: Running Caliptra FMC ...
18,507,265 UART:
18,507,424 UART: [state] CFI Enabled
18,515,356 UART: [fht] FMC Alias Private Key: 7
20,271,910 UART: [art] Extend RT PCRs Done
20,273,134 UART: [art] Lock RT PCRs Done
20,274,672 UART: [art] Populate DV Done
20,280,075 UART: [fht] FMC Alias Private Key: 7
20,281,558 UART: [art] Derive CDI
20,282,284 UART: [art] Store in in slot 0x4
20,325,118 UART: [art] Derive Key Pair
20,326,158 UART: [art] Store priv key in slot 0x5
22,753,709 UART: [art] Derive Key Pair - Done
22,766,655 UART: [art] Signing Cert with AUTHO
22,767,948 UART: RITY.KEYID = 7
24,473,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,073 UART: [art] PUB.X = AEE9A307952334629862312B52F5D00E037FE1E8B7455F5FA0C8249D59AC2B555E90B19BE99C941F7F890D51FC1B9BF4
24,482,305 UART: [art] PUB.Y = A295E9A817DDCEBA1CF534D7F436071BE8AF85C7D14E159155358CFE24D9E8C608BAC2D462E9810493BF14E3848CFF02
24,489,590 UART: [art] SIG.R = 5DFF255969A208B36F5794EF7FB9687A5CB336F2D515A830E639E77567AA50E7E6800B600B43F03D263E5A602344F31B
24,496,972 UART: [art] SIG.S = FD154C2F3E8AA995A6DC2EE58DC6A754DB00AC404D5F16356FFCE46A4886E1000A09F748A36E777EA5745F53AFBC80B6
25,475,326 UART: Caliptra RT
25,476,022 UART: [state] CFI Enabled
25,593,738 UART: [rt] RT listening for mailbox commands...
25,595,674 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,625,709 UART: [rt]cmd =0x44504543, len=40
25,652,007 >>> mbox cmd response data (40 bytes)
25,653,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,683,732 UART: [rt]cmd =0x44504543, len=96
25,724,169 >>> mbox cmd response data (56 bytes)
25,724,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,755,225 UART: [rt]cmd =0x44504543, len=96
25,795,982 >>> mbox cmd response data (56 bytes)
25,796,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,827,210 UART: [rt]cmd =0x44504543, len=96
25,868,184 >>> mbox cmd response data (56 bytes)
25,868,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,899,396 UART: [rt]cmd =0x44504543, len=96
25,940,767 >>> mbox cmd response data (56 bytes)
25,941,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,971,914 UART: [rt]cmd =0x44504543, len=96
26,013,329 >>> mbox cmd response data (56 bytes)
26,014,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,044,778 UART: [rt]cmd =0x44504543, len=96
26,086,531 >>> mbox cmd response data (56 bytes)
26,087,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,117,731 UART: [rt]cmd =0x44504543, len=96
26,159,774 >>> mbox cmd response data (56 bytes)
26,160,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,191,285 UART: [rt]cmd =0x44504543, len=96
26,233,318 >>> mbox cmd response data (56 bytes)
26,234,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,264,246 UART: [rt]cmd =0x44504543, len=96
26,307,331 >>> mbox cmd response data (56 bytes)
26,308,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,500 UART: [rt]cmd =0x44504543, len=96
26,381,034 >>> mbox cmd response data (56 bytes)
26,381,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,107 UART: [rt]cmd =0x44504543, len=96
26,455,032 >>> mbox cmd response data (56 bytes)
26,455,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,486,186 UART: [rt]cmd =0x44504543, len=96
26,529,162 >>> mbox cmd response data (56 bytes)
26,529,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,250 UART: [rt]cmd =0x44504543, len=96
26,604,940 >>> mbox cmd response data (56 bytes)
26,605,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,279 UART: [rt]cmd =0x44504543, len=96
26,681,184 >>> mbox cmd response data (56 bytes)
26,681,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,477 UART: [rt]cmd =0x44504543, len=96
26,756,839 >>> mbox cmd response data (56 bytes)
26,757,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,788,105 UART: [rt]cmd =0x44504543, len=96
26,794,897 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,968 UART:
192,342 UART: Running Caliptra ROM ...
193,449 UART:
193,599 UART: [state] CFI Enabled
261,621 UART: [state] LifecycleState = Unprovisioned
263,973 UART: [state] DebugLocked = No
266,383 UART: [state] WD Timer not started. Device not locked for debugging
270,574 UART: [kat] SHA2-256
460,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,249 UART: [kat] ++
471,700 UART: [kat] sha1
483,509 UART: [kat] SHA2-256
486,520 UART: [kat] SHA2-384
491,512 UART: [kat] SHA2-512-ACC
494,112 UART: [kat] ECC-384
2,950,349 UART: [kat] HMAC-384Kdf
2,973,241 UART: [kat] LMS
3,505,020 UART: [kat] --
3,509,318 UART: [cold-reset] ++
3,510,752 UART: [fht] FHT @ 0x50003400
3,522,508 UART: [idev] ++
3,523,147 UART: [idev] CDI.KEYID = 6
3,524,101 UART: [idev] SUBJECT.KEYID = 7
3,525,341 UART: [idev] UDS.KEYID = 0
3,526,240 ready_for_fw is high
3,526,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,448 UART: [idev] Erasing UDS.KEYID = 0
6,029,197 UART: [idev] Sha1 KeyId Algorithm
6,051,068 UART: [idev] --
6,054,624 UART: [ldev] ++
6,055,327 UART: [ldev] CDI.KEYID = 6
6,056,215 UART: [ldev] SUBJECT.KEYID = 5
6,057,378 UART: [ldev] AUTHORITY.KEYID = 7
6,058,614 UART: [ldev] FE.KEYID = 1
6,101,602 UART: [ldev] Erasing FE.KEYID = 1
8,608,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,934 UART: [ldev] --
10,412,489 UART: [fwproc] Wait for Commands...
10,415,603 UART: [fwproc] Recv command 0x46574c44
10,417,859 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,610,892 >>> mbox cmd response: success
14,615,378 UART: [afmc] ++
14,616,086 UART: [afmc] CDI.KEYID = 6
14,617,334 UART: [afmc] SUBJECT.KEYID = 7
14,618,694 UART: [afmc] AUTHORITY.KEYID = 5
17,151,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,106 UART: [afmc] --
18,949,940 UART: [cold-reset] --
18,954,883 UART: [state] Locking Datavault
18,960,186 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,394 UART: [state] Locking ICCM
18,963,661 UART: [exit] Launching FMC @ 0x40000130
18,972,329 UART:
18,972,567 UART: Running Caliptra FMC ...
18,973,592 UART:
18,973,737 UART: [state] CFI Enabled
19,031,023 UART: [fht] FMC Alias Private Key: 7
20,794,389 UART: [art] Extend RT PCRs Done
20,795,683 UART: [art] Lock RT PCRs Done
20,797,227 UART: [art] Populate DV Done
20,802,532 UART: [fht] FMC Alias Private Key: 7
20,804,227 UART: [art] Derive CDI
20,805,039 UART: [art] Store in in slot 0x4
20,863,492 UART: [art] Derive Key Pair
20,864,532 UART: [art] Store priv key in slot 0x5
23,326,983 UART: [art] Derive Key Pair - Done
23,339,720 UART: [art] Signing Cert with AUTHO
23,341,030 UART: RITY.KEYID = 7
25,052,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,185 UART: [art] PUB.X = C1D9CE358136DC2666579CDC6508DF40801CCE4C94932C8D5E3F19CD0CDBF2B0781BF25039FB2AC9B5E7861D81870DA9
25,061,429 UART: [art] PUB.Y = E877681057BAFF0AD4CE52ED29D4B65182D9ECA5B7526808E32F8A1B9D8B73C011C65CD9C30ABB3A006035418CBF7DB0
25,068,689 UART: [art] SIG.R = 1BEA2A64E2B4B4D8AD2849C3D2522674C13E57FB61A6CCE4E113612D4B796EDA010AE44B2DEFDEA18AD2CA1293796790
25,076,150 UART: [art] SIG.S = AF510466AE5606922FBB6B9EA735C325C125876449FF9EA927CC6BD740121F27A8AFE53FA3B7AE62440025668BB4BDF5
26,055,085 UART: Caliptra RT
26,055,778 UART: [state] CFI Enabled
26,221,152 UART: [rt] RT listening for mailbox commands...
26,223,100 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,253,638 UART: [rt]cmd =0x44504543, len=40
26,295,740 >>> mbox cmd response data (40 bytes)
26,297,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,506 UART: [rt]cmd =0x44504543, len=96
26,387,176 >>> mbox cmd response data (56 bytes)
26,387,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,418,611 UART: [rt]cmd =0x44504543, len=96
26,494,231 >>> mbox cmd response data (56 bytes)
26,494,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,525,242 UART: [rt]cmd =0x44504543, len=96
26,600,881 >>> mbox cmd response data (56 bytes)
26,601,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,632,137 UART: [rt]cmd =0x44504543, len=96
26,707,852 >>> mbox cmd response data (56 bytes)
26,708,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,739,005 UART: [rt]cmd =0x44504543, len=96
26,814,237 >>> mbox cmd response data (56 bytes)
26,814,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,845,338 UART: [rt]cmd =0x44504543, len=96
26,921,219 >>> mbox cmd response data (56 bytes)
26,921,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,952,711 UART: [rt]cmd =0x44504543, len=96
27,027,567 >>> mbox cmd response data (56 bytes)
27,028,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,881 UART: [rt]cmd =0x44504543, len=96
27,134,820 >>> mbox cmd response data (56 bytes)
27,135,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,166,190 UART: [rt]cmd =0x44504543, len=96
27,241,725 >>> mbox cmd response data (56 bytes)
27,242,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,272,862 UART: [rt]cmd =0x44504543, len=96
27,347,937 >>> mbox cmd response data (56 bytes)
27,348,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,379,138 UART: [rt]cmd =0x44504543, len=96
27,454,965 >>> mbox cmd response data (56 bytes)
27,455,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,486,447 UART: [rt]cmd =0x44504543, len=96
27,562,014 >>> mbox cmd response data (56 bytes)
27,562,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,593,288 UART: [rt]cmd =0x44504543, len=96
27,668,345 >>> mbox cmd response data (56 bytes)
27,669,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,699,602 UART: [rt]cmd =0x44504543, len=96
27,775,646 >>> mbox cmd response data (56 bytes)
27,776,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,806,912 UART: [rt]cmd =0x44504543, len=96
27,882,065 >>> mbox cmd response data (56 bytes)
27,882,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,913,104 UART: [rt]cmd =0x44504543, len=96
27,919,609 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,437,927 ready_for_fw is high
3,438,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,713,343 >>> mbox cmd response: success
19,026,566 UART:
19,026,960 UART: Running Caliptra FMC ...
19,028,158 UART:
19,028,332 UART: [state] CFI Enabled
19,094,256 UART: [fht] FMC Alias Private Key: 7
20,858,575 UART: [art] Extend RT PCRs Done
20,859,786 UART: [art] Lock RT PCRs Done
20,861,304 UART: [art] Populate DV Done
20,866,829 UART: [fht] FMC Alias Private Key: 7
20,868,317 UART: [art] Derive CDI
20,869,077 UART: [art] Store in in slot 0x4
20,927,263 UART: [art] Derive Key Pair
20,928,312 UART: [art] Store priv key in slot 0x5
23,390,963 UART: [art] Derive Key Pair - Done
23,404,118 UART: [art] Signing Cert with AUTHO
23,405,426 UART: RITY.KEYID = 7
25,117,229 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,726 UART: [art] PUB.X = A3BD8AD49CB736CF3E8818A21F120B677A07B79DA09DAB179079AA9FB3A28927808BC6A2FD65E12EDA228B3B52A2F7CC
25,126,017 UART: [art] PUB.Y = 1525C93DE3C72459EE3CB11675E6CE4090CD67E7518A869CFBE49DE401692D0299E3E274FC94CFE30B5177F694DB1130
25,133,273 UART: [art] SIG.R = D60843651C545648113E6AE4D2B864588F799A3E686629ABBB84946710BB85C16B60B69F2257921E3DF53BDDBA4418DE
25,140,620 UART: [art] SIG.S = 26B6958D31FFEBE2189FA8D6EC631A8DD94FA39317A853193D716A5BB703265C758C539B39772DE3B87211F90CD612DF
26,120,120 UART: Caliptra RT
26,120,831 UART: [state] CFI Enabled
26,284,929 UART: [rt] RT listening for mailbox commands...
26,286,855 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,317,380 UART: [rt]cmd =0x44504543, len=40
26,359,875 >>> mbox cmd response data (40 bytes)
26,361,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,708 UART: [rt]cmd =0x44504543, len=96
26,451,782 >>> mbox cmd response data (56 bytes)
26,452,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,483,308 UART: [rt]cmd =0x44504543, len=96
26,558,523 >>> mbox cmd response data (56 bytes)
26,559,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,589,786 UART: [rt]cmd =0x44504543, len=96
26,665,138 >>> mbox cmd response data (56 bytes)
26,665,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,696,603 UART: [rt]cmd =0x44504543, len=96
26,772,172 >>> mbox cmd response data (56 bytes)
26,772,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,803,592 UART: [rt]cmd =0x44504543, len=96
26,879,183 >>> mbox cmd response data (56 bytes)
26,879,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,910,489 UART: [rt]cmd =0x44504543, len=96
26,985,649 >>> mbox cmd response data (56 bytes)
26,986,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,855 UART: [rt]cmd =0x44504543, len=96
27,092,365 >>> mbox cmd response data (56 bytes)
27,093,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,123,695 UART: [rt]cmd =0x44504543, len=96
27,199,389 >>> mbox cmd response data (56 bytes)
27,200,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,230,802 UART: [rt]cmd =0x44504543, len=96
27,306,143 >>> mbox cmd response data (56 bytes)
27,306,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,337,454 UART: [rt]cmd =0x44504543, len=96
27,412,594 >>> mbox cmd response data (56 bytes)
27,413,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,443,935 UART: [rt]cmd =0x44504543, len=96
27,519,643 >>> mbox cmd response data (56 bytes)
27,520,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,550,580 UART: [rt]cmd =0x44504543, len=96
27,626,657 >>> mbox cmd response data (56 bytes)
27,627,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,658,037 UART: [rt]cmd =0x44504543, len=96
27,733,168 >>> mbox cmd response data (56 bytes)
27,733,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,764,390 UART: [rt]cmd =0x44504543, len=96
27,840,084 >>> mbox cmd response data (56 bytes)
27,840,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,871,663 UART: [rt]cmd =0x44504543, len=96
27,947,084 >>> mbox cmd response data (56 bytes)
27,947,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,978,198 UART: [rt]cmd =0x44504543, len=96
27,984,659 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,236 UART:
192,740 UART: Running Caliptra ROM ...
193,879 UART:
603,437 UART: [state] CFI Enabled
616,606 UART: [state] LifecycleState = Unprovisioned
618,991 UART: [state] DebugLocked = No
621,927 UART: [state] WD Timer not started. Device not locked for debugging
626,314 UART: [kat] SHA2-256
816,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,994 UART: [kat] ++
827,437 UART: [kat] sha1
838,939 UART: [kat] SHA2-256
841,964 UART: [kat] SHA2-384
848,454 UART: [kat] SHA2-512-ACC
851,037 UART: [kat] ECC-384
3,292,064 UART: [kat] HMAC-384Kdf
3,304,223 UART: [kat] LMS
3,836,035 UART: [kat] --
3,840,667 UART: [cold-reset] ++
3,841,735 UART: [fht] FHT @ 0x50003400
3,852,911 UART: [idev] ++
3,853,610 UART: [idev] CDI.KEYID = 6
3,854,555 UART: [idev] SUBJECT.KEYID = 7
3,855,791 UART: [idev] UDS.KEYID = 0
3,856,686 ready_for_fw is high
3,856,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,922 UART: [idev] Erasing UDS.KEYID = 0
6,329,952 UART: [idev] Sha1 KeyId Algorithm
6,351,758 UART: [idev] --
6,357,532 UART: [ldev] ++
6,358,222 UART: [ldev] CDI.KEYID = 6
6,359,101 UART: [ldev] SUBJECT.KEYID = 5
6,360,301 UART: [ldev] AUTHORITY.KEYID = 7
6,361,526 UART: [ldev] FE.KEYID = 1
6,371,731 UART: [ldev] Erasing FE.KEYID = 1
8,845,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,450 UART: [ldev] --
10,634,056 UART: [fwproc] Wait for Commands...
10,637,004 UART: [fwproc] Recv command 0x46574c44
10,639,254 UART: [fwproc] Recv'd Img size: 114448 bytes
14,086,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,712 >>> mbox cmd response: success
14,833,356 UART: [afmc] ++
14,834,060 UART: [afmc] CDI.KEYID = 6
14,835,303 UART: [afmc] SUBJECT.KEYID = 7
14,836,741 UART: [afmc] AUTHORITY.KEYID = 5
17,343,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,487 UART: [afmc] --
19,136,313 UART: [cold-reset] --
19,142,516 UART: [state] Locking Datavault
19,147,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,441 UART: [state] Locking ICCM
19,151,567 UART: [exit] Launching FMC @ 0x40000130
19,160,194 UART:
19,160,431 UART: Running Caliptra FMC ...
19,161,524 UART:
19,161,673 UART: [state] CFI Enabled
19,169,872 UART: [fht] FMC Alias Private Key: 7
20,926,775 UART: [art] Extend RT PCRs Done
20,927,993 UART: [art] Lock RT PCRs Done
20,929,855 UART: [art] Populate DV Done
20,935,205 UART: [fht] FMC Alias Private Key: 7
20,936,795 UART: [art] Derive CDI
20,937,601 UART: [art] Store in in slot 0x4
20,979,815 UART: [art] Derive Key Pair
20,980,824 UART: [art] Store priv key in slot 0x5
23,407,831 UART: [art] Derive Key Pair - Done
23,420,445 UART: [art] Signing Cert with AUTHO
23,421,748 UART: RITY.KEYID = 7
25,126,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,240 UART: [art] PUB.X = C5BD7CAEA9ACAB7F3125A5E239C54689F4F9B647693691B79D3EE6C3A33CCAF6DC2C6B57625A3B6B5022E04424540C02
25,135,523 UART: [art] PUB.Y = 6655C9640AB12033E4493991D2BF99B43760326F7FB3BD9F6E36924091BD2370FFEC390643741805E1CB4C9D13FDCC6B
25,142,762 UART: [art] SIG.R = FD1DAB17BC1C91CFF5BB884241A9DC10D9ACC709E677A9B73CD02301A0FC5C239E7E588D63C0A4D48444E6C3F231F4C5
25,150,174 UART: [art] SIG.S = F77AAAD60A22CB86B8DF6CB1007C2AA50B935BB96679415E9C631D9F29F6A9EB1D2C3E44413A05E12715C637ED83F0B2
26,128,546 UART: Caliptra RT
26,129,230 UART: [state] CFI Enabled
26,245,578 UART: [rt] RT listening for mailbox commands...
26,247,487 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,277,426 UART: [rt]cmd =0x44504543, len=40
26,303,909 >>> mbox cmd response data (40 bytes)
26,305,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,128 UART: [rt]cmd =0x44504543, len=96
26,376,370 >>> mbox cmd response data (56 bytes)
26,377,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,407,778 UART: [rt]cmd =0x44504543, len=96
26,448,335 >>> mbox cmd response data (56 bytes)
26,449,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,479,438 UART: [rt]cmd =0x44504543, len=96
26,520,537 >>> mbox cmd response data (56 bytes)
26,521,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,551,682 UART: [rt]cmd =0x44504543, len=96
26,592,995 >>> mbox cmd response data (56 bytes)
26,593,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,624,354 UART: [rt]cmd =0x44504543, len=96
26,666,470 >>> mbox cmd response data (56 bytes)
26,667,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,697,772 UART: [rt]cmd =0x44504543, len=96
26,739,685 >>> mbox cmd response data (56 bytes)
26,740,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,770,743 UART: [rt]cmd =0x44504543, len=96
26,812,991 >>> mbox cmd response data (56 bytes)
26,813,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,844,331 UART: [rt]cmd =0x44504543, len=96
26,886,417 >>> mbox cmd response data (56 bytes)
26,887,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,917,644 UART: [rt]cmd =0x44504543, len=96
26,960,545 >>> mbox cmd response data (56 bytes)
26,961,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,991,870 UART: [rt]cmd =0x44504543, len=96
27,034,477 >>> mbox cmd response data (56 bytes)
27,035,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,065,860 UART: [rt]cmd =0x44504543, len=96
27,108,609 >>> mbox cmd response data (56 bytes)
27,109,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,139,951 UART: [rt]cmd =0x44504543, len=96
27,183,124 >>> mbox cmd response data (56 bytes)
27,183,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,214,424 UART: [rt]cmd =0x44504543, len=96
27,258,666 >>> mbox cmd response data (56 bytes)
27,259,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,289,700 UART: [rt]cmd =0x44504543, len=96
27,333,381 >>> mbox cmd response data (56 bytes)
27,334,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,364,522 UART: [rt]cmd =0x44504543, len=96
27,408,798 >>> mbox cmd response data (56 bytes)
27,409,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,440,036 UART: [rt]cmd =0x44504543, len=96
27,446,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,758,608 ready_for_fw is high
3,759,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,976,426 >>> mbox cmd response: success
19,222,761 UART:
19,223,145 UART: Running Caliptra FMC ...
19,224,273 UART:
19,224,419 UART: [state] CFI Enabled
19,232,155 UART: [fht] FMC Alias Private Key: 7
20,988,532 UART: [art] Extend RT PCRs Done
20,989,772 UART: [art] Lock RT PCRs Done
20,991,229 UART: [art] Populate DV Done
20,996,531 UART: [fht] FMC Alias Private Key: 7
20,998,072 UART: [art] Derive CDI
20,998,884 UART: [art] Store in in slot 0x4
21,041,096 UART: [art] Derive Key Pair
21,042,145 UART: [art] Store priv key in slot 0x5
23,468,729 UART: [art] Derive Key Pair - Done
23,481,389 UART: [art] Signing Cert with AUTHO
23,482,689 UART: RITY.KEYID = 7
25,188,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,915 UART: [art] PUB.X = 0B78ED86BE7CDB2FF6BDEBE14BB2C8D7A2C207A366E2E2014D015E31E9AE02E85BCEA74C21ADD744E7DB5EF93061B3EB
25,197,251 UART: [art] PUB.Y = 1489F4E7132FD0AC3BBFB3BBA70EE2212CB9639075385F47E76A29A7B331965FDBB187FE71241C2DEEB769141AC6AFB4
25,204,478 UART: [art] SIG.R = 3688D76FF412F3B3EE75B9234FE58DDDD700C31899CEB7B17BB0A2FD37E280E6A7DC969EA63E4D0EF447C581E2DAF6B0
25,211,906 UART: [art] SIG.S = 39ABE8376B32B6396FFCFFF882D1769996C7B7CA92F74303A1C6FD3645661E27D72E14B297AA698C5ECF2B43BC428286
26,190,549 UART: Caliptra RT
26,191,287 UART: [state] CFI Enabled
26,308,627 UART: [rt] RT listening for mailbox commands...
26,310,559 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,340,755 UART: [rt]cmd =0x44504543, len=40
26,366,996 >>> mbox cmd response data (40 bytes)
26,368,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,398,908 UART: [rt]cmd =0x44504543, len=96
26,439,496 >>> mbox cmd response data (56 bytes)
26,440,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,470,810 UART: [rt]cmd =0x44504543, len=96
26,511,232 >>> mbox cmd response data (56 bytes)
26,511,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,542,456 UART: [rt]cmd =0x44504543, len=96
26,583,257 >>> mbox cmd response data (56 bytes)
26,583,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,614,405 UART: [rt]cmd =0x44504543, len=96
26,655,989 >>> mbox cmd response data (56 bytes)
26,656,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,686,948 UART: [rt]cmd =0x44504543, len=96
26,728,101 >>> mbox cmd response data (56 bytes)
26,728,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,759,353 UART: [rt]cmd =0x44504543, len=96
26,800,931 >>> mbox cmd response data (56 bytes)
26,801,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,832,070 UART: [rt]cmd =0x44504543, len=96
26,874,894 >>> mbox cmd response data (56 bytes)
26,875,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,906,359 UART: [rt]cmd =0x44504543, len=96
26,948,969 >>> mbox cmd response data (56 bytes)
26,949,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,980,376 UART: [rt]cmd =0x44504543, len=96
27,023,792 >>> mbox cmd response data (56 bytes)
27,024,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,055,169 UART: [rt]cmd =0x44504543, len=96
27,098,154 >>> mbox cmd response data (56 bytes)
27,098,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,129,183 UART: [rt]cmd =0x44504543, len=96
27,172,370 >>> mbox cmd response data (56 bytes)
27,173,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,203,657 UART: [rt]cmd =0x44504543, len=96
27,247,387 >>> mbox cmd response data (56 bytes)
27,248,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,278,547 UART: [rt]cmd =0x44504543, len=96
27,322,252 >>> mbox cmd response data (56 bytes)
27,322,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,353,684 UART: [rt]cmd =0x44504543, len=96
27,397,719 >>> mbox cmd response data (56 bytes)
27,398,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,428,799 UART: [rt]cmd =0x44504543, len=96
27,472,791 >>> mbox cmd response data (56 bytes)
27,473,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,504,029 UART: [rt]cmd =0x44504543, len=96
27,510,680 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,804 UART: [idev] Erasing UDS.KEYID = 0
1,505,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,346 UART: [idev] --
1,515,511 UART: [ldev] ++
1,515,679 UART: [ldev] CDI.KEYID = 6
1,516,042 UART: [ldev] SUBJECT.KEYID = 5
1,516,468 UART: [ldev] AUTHORITY.KEYID = 7
1,516,931 UART: [ldev] FE.KEYID = 1
1,522,395 UART: [ldev] Erasing FE.KEYID = 1
1,547,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,110 UART: [ldev] --
1,586,579 UART: [fwproc] Waiting for Commands...
1,587,318 UART: [fwproc] Received command 0x46574c44
1,588,109 UART: [fwproc] Received Image of size 114448 bytes
2,887,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,784 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,129 >>> mbox cmd response: success
3,082,209 UART: [afmc] ++
3,082,377 UART: [afmc] CDI.KEYID = 6
3,082,739 UART: [afmc] SUBJECT.KEYID = 7
3,083,164 UART: [afmc] AUTHORITY.KEYID = 5
3,117,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,477 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,870 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,560 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,291 UART: [afmc] --
3,160,349 UART: [cold-reset] --
3,161,139 UART: [state] Locking Datavault
3,162,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,790 UART: [state] Locking ICCM
3,163,410 UART: [exit] Launching FMC @ 0x40000130
3,168,739 UART:
3,168,755 UART: Running Caliptra FMC ...
3,169,163 UART:
3,169,217 UART: [state] CFI Enabled
3,179,518 UART: [fht] FMC Alias Private Key: 7
3,287,105 UART: [art] Extend RT PCRs Done
3,287,533 UART: [art] Lock RT PCRs Done
3,289,299 UART: [art] Populate DV Done
3,297,532 UART: [fht] FMC Alias Private Key: 7
3,298,554 UART: [art] Derive CDI
3,298,834 UART: [art] Store in in slot 0x4
3,384,605 UART: [art] Derive Key Pair
3,384,965 UART: [art] Store priv key in slot 0x5
3,398,021 UART: [art] Derive Key Pair - Done
3,412,890 UART: [art] Signing Cert with AUTHO
3,413,370 UART: RITY.KEYID = 7
3,428,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,381 UART: [art] PUB.X = 78B94C204AA5CD61E89401F77C7BBD9BEDAA6E005BCEF8614AB6862A15F949AAEC470D92A541F75D8D08F5E53E799493
3,436,134 UART: [art] PUB.Y = 91D6865DB2F5A1B201152E73ED5F90207C2D4BE6317EB5F5E228D541BB0A84DF24C9434B5E5F2E1FA312912017C33D3C
3,443,084 UART: [art] SIG.R = 050D73E996EC3411CEF5F30547EAACFEB9E77E806D8706C80C20057DEE53834FF42AB63D59080699E27CCD4A7B79214A
3,449,838 UART: [art] SIG.S = 7EBF416CF0A698B1F5776C1798CFD7AAC5E738D29106C3C5634CFFBD6B50DA9E80D81ADB7C133A67ED7C2476BA54D0AB
3,473,592 UART: Caliptra RT
3,473,845 UART: [state] CFI Enabled
3,581,255 UART: [rt] RT listening for mailbox commands...
3,581,925 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,851 UART: [rt]cmd =0x44504543, len=40
3,637,905 >>> mbox cmd response data (40 bytes)
3,637,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,631 UART: [rt]cmd =0x44504543, len=96
3,707,861 >>> mbox cmd response data (56 bytes)
3,707,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,573 UART: [rt]cmd =0x44504543, len=96
3,778,612 >>> mbox cmd response data (56 bytes)
3,778,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,568 UART: [rt]cmd =0x44504543, len=96
3,849,411 >>> mbox cmd response data (56 bytes)
3,849,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,401 UART: [rt]cmd =0x44504543, len=96
3,920,866 >>> mbox cmd response data (56 bytes)
3,920,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,724 UART: [rt]cmd =0x44504543, len=96
3,992,391 >>> mbox cmd response data (56 bytes)
3,992,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,347 UART: [rt]cmd =0x44504543, len=96
4,063,932 >>> mbox cmd response data (56 bytes)
4,063,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,990 UART: [rt]cmd =0x44504543, len=96
4,135,589 >>> mbox cmd response data (56 bytes)
4,135,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,323 UART: [rt]cmd =0x44504543, len=96
4,208,014 >>> mbox cmd response data (56 bytes)
4,208,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,238,092 UART: [rt]cmd =0x44504543, len=96
4,280,667 >>> mbox cmd response data (56 bytes)
4,280,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,310,631 UART: [rt]cmd =0x44504543, len=96
4,354,086 >>> mbox cmd response data (56 bytes)
4,354,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,384,048 UART: [rt]cmd =0x44504543, len=96
4,427,863 >>> mbox cmd response data (56 bytes)
4,427,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,457,879 UART: [rt]cmd =0x44504543, len=96
4,500,770 >>> mbox cmd response data (56 bytes)
4,500,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,530,874 UART: [rt]cmd =0x44504543, len=96
4,574,705 >>> mbox cmd response data (56 bytes)
4,574,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,604,665 UART: [rt]cmd =0x44504543, len=96
4,648,418 >>> mbox cmd response data (56 bytes)
4,648,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,678,588 UART: [rt]cmd =0x44504543, len=96
4,722,035 >>> mbox cmd response data (56 bytes)
4,722,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,752,061 UART: [rt]cmd =0x44504543, len=96
4,759,335 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,343 ready_for_fw is high
1,362,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,687 >>> mbox cmd response: success
2,990,169 UART:
2,990,185 UART: Running Caliptra FMC ...
2,990,593 UART:
2,990,647 UART: [state] CFI Enabled
3,001,172 UART: [fht] FMC Alias Private Key: 7
3,108,769 UART: [art] Extend RT PCRs Done
3,109,197 UART: [art] Lock RT PCRs Done
3,110,675 UART: [art] Populate DV Done
3,118,934 UART: [fht] FMC Alias Private Key: 7
3,120,032 UART: [art] Derive CDI
3,120,312 UART: [art] Store in in slot 0x4
3,206,111 UART: [art] Derive Key Pair
3,206,471 UART: [art] Store priv key in slot 0x5
3,219,379 UART: [art] Derive Key Pair - Done
3,234,115 UART: [art] Signing Cert with AUTHO
3,234,595 UART: RITY.KEYID = 7
3,249,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,706 UART: [art] PUB.X = C38FB9104E38EA9BAE496DA6EEE62D1084316D817806DCB4D5D22229B1ED57DCB0EA0988F7E2F6ABCA79A1E72A262520
3,257,486 UART: [art] PUB.Y = FA46954666FC9B76BECC857E86F2C3F5DCEFB32B36B410893204AAB1A57E8A4097F0F561752687140E95095F7837ED77
3,264,429 UART: [art] SIG.R = FE94597478BFC7DC1C5D24C33E5263A5E40E169F5615B9D1F798E8AA15118FD4A0B3E546EEB149B885DD9C99BB7BACEC
3,271,214 UART: [art] SIG.S = E168C06F602DE884192157C8F42212666E7A8C5649FDB97A65BD585FC8F60313AC919DBAF6D67C5551792F9CC9D069B6
3,294,906 UART: Caliptra RT
3,295,159 UART: [state] CFI Enabled
3,404,839 UART: [rt] RT listening for mailbox commands...
3,405,509 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,447 UART: [rt]cmd =0x44504543, len=40
3,461,683 >>> mbox cmd response data (40 bytes)
3,461,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,781 UART: [rt]cmd =0x44504543, len=96
3,532,303 >>> mbox cmd response data (56 bytes)
3,532,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,443 UART: [rt]cmd =0x44504543, len=96
3,602,652 >>> mbox cmd response data (56 bytes)
3,602,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,760 UART: [rt]cmd =0x44504543, len=96
3,673,599 >>> mbox cmd response data (56 bytes)
3,673,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,577 UART: [rt]cmd =0x44504543, len=96
3,744,188 >>> mbox cmd response data (56 bytes)
3,744,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,062 UART: [rt]cmd =0x44504543, len=96
3,815,839 >>> mbox cmd response data (56 bytes)
3,815,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,891 UART: [rt]cmd =0x44504543, len=96
3,887,040 >>> mbox cmd response data (56 bytes)
3,887,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,098 UART: [rt]cmd =0x44504543, len=96
3,958,965 >>> mbox cmd response data (56 bytes)
3,958,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,065 UART: [rt]cmd =0x44504543, len=96
4,031,162 >>> mbox cmd response data (56 bytes)
4,031,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,060,956 UART: [rt]cmd =0x44504543, len=96
4,103,937 >>> mbox cmd response data (56 bytes)
4,103,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,134,073 UART: [rt]cmd =0x44504543, len=96
4,177,294 >>> mbox cmd response data (56 bytes)
4,177,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,207,230 UART: [rt]cmd =0x44504543, len=96
4,250,303 >>> mbox cmd response data (56 bytes)
4,250,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,280,423 UART: [rt]cmd =0x44504543, len=96
4,324,216 >>> mbox cmd response data (56 bytes)
4,324,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,354,360 UART: [rt]cmd =0x44504543, len=96
4,396,937 >>> mbox cmd response data (56 bytes)
4,396,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,427,047 UART: [rt]cmd =0x44504543, len=96
4,471,258 >>> mbox cmd response data (56 bytes)
4,471,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,374 UART: [rt]cmd =0x44504543, len=96
4,545,979 >>> mbox cmd response data (56 bytes)
4,545,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,576,037 UART: [rt]cmd =0x44504543, len=96
4,583,495 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,433 UART: [kat] LMS
1,475,629 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 ready_for_fw is high
1,480,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,291 UART: [idev] Erasing UDS.KEYID = 0
1,505,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,739 UART: [idev] --
1,514,680 UART: [ldev] ++
1,514,848 UART: [ldev] CDI.KEYID = 6
1,515,211 UART: [ldev] SUBJECT.KEYID = 5
1,515,637 UART: [ldev] AUTHORITY.KEYID = 7
1,516,100 UART: [ldev] FE.KEYID = 1
1,521,508 UART: [ldev] Erasing FE.KEYID = 1
1,546,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,817 UART: [ldev] --
1,586,108 UART: [fwproc] Waiting for Commands...
1,586,967 UART: [fwproc] Received command 0x46574c44
1,587,758 UART: [fwproc] Received Image of size 114448 bytes
2,886,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,691 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,178 >>> mbox cmd response: success
3,080,394 UART: [afmc] ++
3,080,562 UART: [afmc] CDI.KEYID = 6
3,080,924 UART: [afmc] SUBJECT.KEYID = 7
3,081,349 UART: [afmc] AUTHORITY.KEYID = 5
3,116,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,088 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,481 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,171 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,114 UART: [afmc] --
3,160,184 UART: [cold-reset] --
3,161,150 UART: [state] Locking Datavault
3,162,353 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,957 UART: [state] Locking ICCM
3,163,587 UART: [exit] Launching FMC @ 0x40000130
3,168,916 UART:
3,168,932 UART: Running Caliptra FMC ...
3,169,340 UART:
3,169,483 UART: [state] CFI Enabled
3,180,024 UART: [fht] FMC Alias Private Key: 7
3,287,507 UART: [art] Extend RT PCRs Done
3,287,935 UART: [art] Lock RT PCRs Done
3,289,301 UART: [art] Populate DV Done
3,297,242 UART: [fht] FMC Alias Private Key: 7
3,298,272 UART: [art] Derive CDI
3,298,552 UART: [art] Store in in slot 0x4
3,384,023 UART: [art] Derive Key Pair
3,384,383 UART: [art] Store priv key in slot 0x5
3,397,583 UART: [art] Derive Key Pair - Done
3,412,506 UART: [art] Signing Cert with AUTHO
3,412,986 UART: RITY.KEYID = 7
3,428,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,131 UART: [art] PUB.X = 82E7B04DC12BDBA430A22A69C66260929969959A73510E827C1FA80EE03C79752D42DB9E7C4A5F180556FB12555C4530
3,435,888 UART: [art] PUB.Y = 4C2452008D30CB894E25BB747179B71E5861812BD83B8849F1AFC080981A2A19FB4EF0A42541E2A2EAD14B4FB205AFB9
3,442,819 UART: [art] SIG.R = DB9CF06C738D4A6CC560F5920CF6EF4534C99EA55F7C3967D643C84882F6F38C77F283277CF27253789FEBEFBB309705
3,449,589 UART: [art] SIG.S = F09A9AFD9E392C3BB64433DE72A0CB8D4F32FC6AF6A404A117BA343881F435735AF9EEBD7F816F92DC8105D9AE08D4AE
3,473,527 UART: Caliptra RT
3,473,872 UART: [state] CFI Enabled
3,582,488 UART: [rt] RT listening for mailbox commands...
3,583,158 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,392 UART: [rt]cmd =0x44504543, len=40
3,639,558 >>> mbox cmd response data (40 bytes)
3,639,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,484 UART: [rt]cmd =0x44504543, len=96
3,709,084 >>> mbox cmd response data (56 bytes)
3,709,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,186 UART: [rt]cmd =0x44504543, len=96
3,779,599 >>> mbox cmd response data (56 bytes)
3,779,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,471 UART: [rt]cmd =0x44504543, len=96
3,850,414 >>> mbox cmd response data (56 bytes)
3,850,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,420 UART: [rt]cmd =0x44504543, len=96
3,922,127 >>> mbox cmd response data (56 bytes)
3,922,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,139 UART: [rt]cmd =0x44504543, len=96
3,992,766 >>> mbox cmd response data (56 bytes)
3,992,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,760 UART: [rt]cmd =0x44504543, len=96
4,064,483 >>> mbox cmd response data (56 bytes)
4,064,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,387 UART: [rt]cmd =0x44504543, len=96
4,136,848 >>> mbox cmd response data (56 bytes)
4,136,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,686 UART: [rt]cmd =0x44504543, len=96
4,209,061 >>> mbox cmd response data (56 bytes)
4,209,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,239,013 UART: [rt]cmd =0x44504543, len=96
4,281,312 >>> mbox cmd response data (56 bytes)
4,281,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,311,268 UART: [rt]cmd =0x44504543, len=96
4,354,713 >>> mbox cmd response data (56 bytes)
4,354,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,384,527 UART: [rt]cmd =0x44504543, len=96
4,427,056 >>> mbox cmd response data (56 bytes)
4,427,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,457,152 UART: [rt]cmd =0x44504543, len=96
4,501,321 >>> mbox cmd response data (56 bytes)
4,501,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,531,163 UART: [rt]cmd =0x44504543, len=96
4,574,332 >>> mbox cmd response data (56 bytes)
4,574,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,604,156 UART: [rt]cmd =0x44504543, len=96
4,649,167 >>> mbox cmd response data (56 bytes)
4,649,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,679,325 UART: [rt]cmd =0x44504543, len=96
4,724,126 >>> mbox cmd response data (56 bytes)
4,724,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,754,014 UART: [rt]cmd =0x44504543, len=96
4,761,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 ready_for_fw is high
1,363,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,964 >>> mbox cmd response: success
2,991,262 UART:
2,991,278 UART: Running Caliptra FMC ...
2,991,686 UART:
2,991,829 UART: [state] CFI Enabled
3,002,652 UART: [fht] FMC Alias Private Key: 7
3,109,871 UART: [art] Extend RT PCRs Done
3,110,299 UART: [art] Lock RT PCRs Done
3,111,535 UART: [art] Populate DV Done
3,119,462 UART: [fht] FMC Alias Private Key: 7
3,120,402 UART: [art] Derive CDI
3,120,682 UART: [art] Store in in slot 0x4
3,206,671 UART: [art] Derive Key Pair
3,207,031 UART: [art] Store priv key in slot 0x5
3,220,077 UART: [art] Derive Key Pair - Done
3,234,830 UART: [art] Signing Cert with AUTHO
3,235,310 UART: RITY.KEYID = 7
3,250,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,289 UART: [art] PUB.X = 2741ED08CE65C842B9C985FBBF10A4D4FA7445D053837ABAA64A464392A5B6DF9445FB69B30CE9D74733787431C0444A
3,258,057 UART: [art] PUB.Y = 6CC557D608D70CFCD3CC71DDBE51EBF11B2BED2FF14B3FE4437079C651A49CAFB6CF2A87D855A98A285C71AB9FE467F1
3,265,027 UART: [art] SIG.R = 73CBA4E4D64372AA2E3C410FE91EB90867D5F3C5D907AC0CAA16B60FE5ACF6D68905B06D12E1A3A76857423CE9F28F52
3,271,793 UART: [art] SIG.S = 710226F044F8EFA1C400A6886EFA53BFBF006681DCBFBA23B27A505DE79A6308138D27FFC147C2A9C3BDA1FC2C19584A
3,295,260 UART: Caliptra RT
3,295,605 UART: [state] CFI Enabled
3,403,151 UART: [rt] RT listening for mailbox commands...
3,403,821 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,037 UART: [rt]cmd =0x44504543, len=40
3,460,523 >>> mbox cmd response data (40 bytes)
3,460,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,309 UART: [rt]cmd =0x44504543, len=96
3,530,815 >>> mbox cmd response data (56 bytes)
3,530,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,747 UART: [rt]cmd =0x44504543, len=96
3,601,216 >>> mbox cmd response data (56 bytes)
3,601,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,146 UART: [rt]cmd =0x44504543, len=96
3,671,705 >>> mbox cmd response data (56 bytes)
3,671,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,655 UART: [rt]cmd =0x44504543, len=96
3,743,484 >>> mbox cmd response data (56 bytes)
3,743,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,536 UART: [rt]cmd =0x44504543, len=96
3,815,349 >>> mbox cmd response data (56 bytes)
3,815,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,113 UART: [rt]cmd =0x44504543, len=96
3,886,852 >>> mbox cmd response data (56 bytes)
3,886,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,892 UART: [rt]cmd =0x44504543, len=96
3,959,153 >>> mbox cmd response data (56 bytes)
3,959,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,873 UART: [rt]cmd =0x44504543, len=96
4,031,256 >>> mbox cmd response data (56 bytes)
4,031,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,274 UART: [rt]cmd =0x44504543, len=96
4,103,807 >>> mbox cmd response data (56 bytes)
4,103,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,133,687 UART: [rt]cmd =0x44504543, len=96
4,176,458 >>> mbox cmd response data (56 bytes)
4,176,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,206,260 UART: [rt]cmd =0x44504543, len=96
4,249,485 >>> mbox cmd response data (56 bytes)
4,249,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,565 UART: [rt]cmd =0x44504543, len=96
4,323,120 >>> mbox cmd response data (56 bytes)
4,323,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,352,984 UART: [rt]cmd =0x44504543, len=96
4,397,105 >>> mbox cmd response data (56 bytes)
4,397,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,426,939 UART: [rt]cmd =0x44504543, len=96
4,471,078 >>> mbox cmd response data (56 bytes)
4,471,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,944 UART: [rt]cmd =0x44504543, len=96
4,544,767 >>> mbox cmd response data (56 bytes)
4,544,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,574,617 UART: [rt]cmd =0x44504543, len=96
4,581,783 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
918,398 UART: [kat] HMAC-384Kdf
922,994 UART: [kat] LMS
1,171,322 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 ready_for_fw is high
1,176,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,960 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,397 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,041 UART: [ldev] --
1,283,486 UART: [fwproc] Wait for Commands...
1,284,142 UART: [fwproc] Recv command 0x46574c44
1,284,870 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,444 >>> mbox cmd response: success
2,778,694 UART: [afmc] ++
2,778,862 UART: [afmc] CDI.KEYID = 6
2,779,224 UART: [afmc] SUBJECT.KEYID = 7
2,779,649 UART: [afmc] AUTHORITY.KEYID = 5
2,815,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,970 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,619 UART: [afmc] --
2,858,687 UART: [cold-reset] --
2,859,455 UART: [state] Locking Datavault
2,860,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,890 UART: [state] Locking ICCM
2,861,434 UART: [exit] Launching FMC @ 0x40000130
2,866,763 UART:
2,866,779 UART: Running Caliptra FMC ...
2,867,187 UART:
2,867,241 UART: [state] CFI Enabled
2,877,830 UART: [fht] FMC Alias Private Key: 7
2,986,379 UART: [art] Extend RT PCRs Done
2,986,807 UART: [art] Lock RT PCRs Done
2,988,285 UART: [art] Populate DV Done
2,996,470 UART: [fht] FMC Alias Private Key: 7
2,997,510 UART: [art] Derive CDI
2,997,790 UART: [art] Store in in slot 0x4
3,083,851 UART: [art] Derive Key Pair
3,084,211 UART: [art] Store priv key in slot 0x5
3,097,593 UART: [art] Derive Key Pair - Done
3,112,435 UART: [art] Signing Cert with AUTHO
3,112,915 UART: RITY.KEYID = 7
3,127,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,584 UART: [art] PUB.X = 82441048EE26DF9537DD3723FAAB1FC183BB377D36A3E05F51F15975EB9EB546A94C2B6B2EF5DABF898AEE3F2EB77B71
3,135,372 UART: [art] PUB.Y = 5B2736EABAB25E5FFB5657BBA10AA3A2891CBC511ED08889DDE43423B662981D906837B676274D5657462F25BFD44A20
3,142,323 UART: [art] SIG.R = 3C2763B08A841AF87973A41A31F98B3CC45C8AC248B5F391546A6B6B1CE6368BCE81A57345669FF74B66B482C95E3940
3,149,093 UART: [art] SIG.S = 3D40CC5301CDCBC79ECCAB45453964DF5A000097DBC44813D1919EA2B8140DD58B52399D77816551CE3ABC53D49E2969
3,172,880 UART: Caliptra RT
3,173,133 UART: [state] CFI Enabled
3,281,376 UART: [rt] RT listening for mailbox commands...
3,282,046 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,968 UART: [rt]cmd =0x44504543, len=40
3,337,804 >>> mbox cmd response data (40 bytes)
3,337,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,418 UART: [rt]cmd =0x44504543, len=96
3,407,360 >>> mbox cmd response data (56 bytes)
3,407,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,196 UART: [rt]cmd =0x44504543, len=96
3,477,935 >>> mbox cmd response data (56 bytes)
3,477,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,927 UART: [rt]cmd =0x44504543, len=96
3,549,044 >>> mbox cmd response data (56 bytes)
3,549,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,136 UART: [rt]cmd =0x44504543, len=96
3,619,815 >>> mbox cmd response data (56 bytes)
3,619,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,927 UART: [rt]cmd =0x44504543, len=96
3,690,440 >>> mbox cmd response data (56 bytes)
3,690,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,302 UART: [rt]cmd =0x44504543, len=96
3,761,291 >>> mbox cmd response data (56 bytes)
3,761,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,197 UART: [rt]cmd =0x44504543, len=96
3,833,472 >>> mbox cmd response data (56 bytes)
3,833,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,586 UART: [rt]cmd =0x44504543, len=96
3,905,379 >>> mbox cmd response data (56 bytes)
3,905,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,325 UART: [rt]cmd =0x44504543, len=96
3,977,498 >>> mbox cmd response data (56 bytes)
3,977,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,394 UART: [rt]cmd =0x44504543, len=96
4,050,035 >>> mbox cmd response data (56 bytes)
4,050,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,851 UART: [rt]cmd =0x44504543, len=96
4,122,886 >>> mbox cmd response data (56 bytes)
4,122,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,152,700 UART: [rt]cmd =0x44504543, len=96
4,195,449 >>> mbox cmd response data (56 bytes)
4,195,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,279 UART: [rt]cmd =0x44504543, len=96
4,269,264 >>> mbox cmd response data (56 bytes)
4,269,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,200 UART: [rt]cmd =0x44504543, len=96
4,343,079 >>> mbox cmd response data (56 bytes)
4,343,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,953 UART: [rt]cmd =0x44504543, len=96
4,417,170 >>> mbox cmd response data (56 bytes)
4,417,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,010 UART: [rt]cmd =0x44504543, len=96
4,453,952 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,567 ready_for_fw is high
1,060,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,859 >>> mbox cmd response: success
2,689,671 UART:
2,689,687 UART: Running Caliptra FMC ...
2,690,095 UART:
2,690,149 UART: [state] CFI Enabled
2,701,042 UART: [fht] FMC Alias Private Key: 7
2,808,735 UART: [art] Extend RT PCRs Done
2,809,163 UART: [art] Lock RT PCRs Done
2,810,655 UART: [art] Populate DV Done
2,819,048 UART: [fht] FMC Alias Private Key: 7
2,820,088 UART: [art] Derive CDI
2,820,368 UART: [art] Store in in slot 0x4
2,906,333 UART: [art] Derive Key Pair
2,906,693 UART: [art] Store priv key in slot 0x5
2,919,803 UART: [art] Derive Key Pair - Done
2,934,568 UART: [art] Signing Cert with AUTHO
2,935,048 UART: RITY.KEYID = 7
2,950,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,971 UART: [art] PUB.X = A8A498AFD01560BD791B648EA1412AC97AAA4D0A04ED2F5C7CC03F38FFBA0783D5A7FC2A2BED32456A68996E81B26753
2,957,748 UART: [art] PUB.Y = 5C6AF9DC9FE45EA00935BCFB12E5E32E60476DB40895AA1DBC7D0D27AC5BB3869D3BBA56EF5D96B431C715BCE9F34461
2,964,711 UART: [art] SIG.R = 8EAB760738BAB2FD585A106D152BB9780B1A8058E23F4BB1DBD82E013C5A753484D5503BE9AA2BE649A6338DF17B0ABD
2,971,483 UART: [art] SIG.S = 788C176AA3464954DA0B824A9087459242511ECA77374911317CB785157E262B2C6B94485D5781E48531DDCCAC0209D7
2,995,593 UART: Caliptra RT
2,995,846 UART: [state] CFI Enabled
3,103,659 UART: [rt] RT listening for mailbox commands...
3,104,329 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,077 UART: [rt]cmd =0x44504543, len=40
3,159,849 >>> mbox cmd response data (40 bytes)
3,159,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,881 UART: [rt]cmd =0x44504543, len=96
3,229,989 >>> mbox cmd response data (56 bytes)
3,229,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,015 UART: [rt]cmd =0x44504543, len=96
3,301,044 >>> mbox cmd response data (56 bytes)
3,301,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,004 UART: [rt]cmd =0x44504543, len=96
3,372,793 >>> mbox cmd response data (56 bytes)
3,372,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,003 UART: [rt]cmd =0x44504543, len=96
3,444,178 >>> mbox cmd response data (56 bytes)
3,444,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,014 UART: [rt]cmd =0x44504543, len=96
3,516,355 >>> mbox cmd response data (56 bytes)
3,516,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,245 UART: [rt]cmd =0x44504543, len=96
3,587,818 >>> mbox cmd response data (56 bytes)
3,587,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,490 UART: [rt]cmd =0x44504543, len=96
3,660,137 >>> mbox cmd response data (56 bytes)
3,660,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,029 UART: [rt]cmd =0x44504543, len=96
3,731,736 >>> mbox cmd response data (56 bytes)
3,731,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,798 UART: [rt]cmd =0x44504543, len=96
3,804,757 >>> mbox cmd response data (56 bytes)
3,804,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,601 UART: [rt]cmd =0x44504543, len=96
3,877,234 >>> mbox cmd response data (56 bytes)
3,877,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,246 UART: [rt]cmd =0x44504543, len=96
3,950,659 >>> mbox cmd response data (56 bytes)
3,950,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,980,689 UART: [rt]cmd =0x44504543, len=96
4,023,532 >>> mbox cmd response data (56 bytes)
4,023,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,053,462 UART: [rt]cmd =0x44504543, len=96
4,097,789 >>> mbox cmd response data (56 bytes)
4,097,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,127,529 UART: [rt]cmd =0x44504543, len=96
4,172,166 >>> mbox cmd response data (56 bytes)
4,172,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,202,228 UART: [rt]cmd =0x44504543, len=96
4,246,295 >>> mbox cmd response data (56 bytes)
4,246,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,276,177 UART: [rt]cmd =0x44504543, len=96
4,283,169 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,818 UART: [kat] SHA2-256
903,758 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,007 UART: [kat] HMAC-384Kdf
922,607 UART: [kat] LMS
1,170,935 UART: [kat] --
1,171,720 UART: [cold-reset] ++
1,172,046 UART: [fht] FHT @ 0x50003400
1,174,827 UART: [idev] ++
1,174,995 UART: [idev] CDI.KEYID = 6
1,175,355 UART: [idev] SUBJECT.KEYID = 7
1,175,779 UART: [idev] UDS.KEYID = 0
1,176,124 ready_for_fw is high
1,176,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,473 UART: [idev] Erasing UDS.KEYID = 0
1,200,848 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,216,964 UART: [ldev] Erasing FE.KEYID = 1
1,243,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,550 UART: [ldev] --
1,282,955 UART: [fwproc] Wait for Commands...
1,283,673 UART: [fwproc] Recv command 0x46574c44
1,284,401 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,271 >>> mbox cmd response: success
2,775,377 UART: [afmc] ++
2,775,545 UART: [afmc] CDI.KEYID = 6
2,775,907 UART: [afmc] SUBJECT.KEYID = 7
2,776,332 UART: [afmc] AUTHORITY.KEYID = 5
2,811,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,961 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,680 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,646 UART: [afmc] --
2,855,620 UART: [cold-reset] --
2,856,294 UART: [state] Locking Datavault
2,857,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,051 UART: [state] Locking ICCM
2,858,565 UART: [exit] Launching FMC @ 0x40000130
2,863,894 UART:
2,863,910 UART: Running Caliptra FMC ...
2,864,318 UART:
2,864,461 UART: [state] CFI Enabled
2,875,274 UART: [fht] FMC Alias Private Key: 7
2,983,143 UART: [art] Extend RT PCRs Done
2,983,571 UART: [art] Lock RT PCRs Done
2,984,967 UART: [art] Populate DV Done
2,993,272 UART: [fht] FMC Alias Private Key: 7
2,994,232 UART: [art] Derive CDI
2,994,512 UART: [art] Store in in slot 0x4
3,080,263 UART: [art] Derive Key Pair
3,080,623 UART: [art] Store priv key in slot 0x5
3,093,357 UART: [art] Derive Key Pair - Done
3,107,691 UART: [art] Signing Cert with AUTHO
3,108,171 UART: RITY.KEYID = 7
3,123,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,266 UART: [art] PUB.X = 22F26268D5952C9458D177EFFD8F163F417483ED0A7F2087D4BA1F05EA8376C964BE2F279E0452DF9B98872EB03765EC
3,131,029 UART: [art] PUB.Y = 56F18135BB4C17435958CFE86F4E8056F41B2F2849DC4F67DBA3948351714FD9E6650D04C4D0487B9FC52F63A31E7C6E
3,137,975 UART: [art] SIG.R = 9ED6F8ACDAB9661B3F86399EE18227A80104DBA912DB9B5500CE2115FFCD7A234C33578C1BBE9893196EB4B8C7F95F87
3,144,729 UART: [art] SIG.S = 8EAB36923D90778C3516BB427F7635F31368E94D2A943D01682559D845F2ACE279E5AA28E781432752C8C251261C6B25
3,168,131 UART: Caliptra RT
3,168,476 UART: [state] CFI Enabled
3,276,434 UART: [rt] RT listening for mailbox commands...
3,277,104 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,374 UART: [rt]cmd =0x44504543, len=40
3,333,546 >>> mbox cmd response data (40 bytes)
3,333,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,528 UART: [rt]cmd =0x44504543, len=96
3,404,304 >>> mbox cmd response data (56 bytes)
3,404,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,174 UART: [rt]cmd =0x44504543, len=96
3,475,223 >>> mbox cmd response data (56 bytes)
3,475,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,363 UART: [rt]cmd =0x44504543, len=96
3,546,400 >>> mbox cmd response data (56 bytes)
3,546,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,384 UART: [rt]cmd =0x44504543, len=96
3,616,651 >>> mbox cmd response data (56 bytes)
3,616,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,477 UART: [rt]cmd =0x44504543, len=96
3,688,308 >>> mbox cmd response data (56 bytes)
3,688,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,138 UART: [rt]cmd =0x44504543, len=96
3,759,843 >>> mbox cmd response data (56 bytes)
3,759,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,881 UART: [rt]cmd =0x44504543, len=96
3,831,934 >>> mbox cmd response data (56 bytes)
3,831,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,814 UART: [rt]cmd =0x44504543, len=96
3,904,519 >>> mbox cmd response data (56 bytes)
3,904,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,461 UART: [rt]cmd =0x44504543, len=96
3,977,164 >>> mbox cmd response data (56 bytes)
3,977,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,252 UART: [rt]cmd =0x44504543, len=96
4,050,511 >>> mbox cmd response data (56 bytes)
4,050,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,080,539 UART: [rt]cmd =0x44504543, len=96
4,123,844 >>> mbox cmd response data (56 bytes)
4,123,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,890 UART: [rt]cmd =0x44504543, len=96
4,196,901 >>> mbox cmd response data (56 bytes)
4,196,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,701 UART: [rt]cmd =0x44504543, len=96
4,270,382 >>> mbox cmd response data (56 bytes)
4,270,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,286 UART: [rt]cmd =0x44504543, len=96
4,344,921 >>> mbox cmd response data (56 bytes)
4,344,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,975 UART: [rt]cmd =0x44504543, len=96
4,419,602 >>> mbox cmd response data (56 bytes)
4,419,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,444 UART: [rt]cmd =0x44504543, len=96
4,456,718 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,278 ready_for_fw is high
1,061,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,142 >>> mbox cmd response: success
2,693,084 UART:
2,693,100 UART: Running Caliptra FMC ...
2,693,508 UART:
2,693,651 UART: [state] CFI Enabled
2,704,378 UART: [fht] FMC Alias Private Key: 7
2,813,077 UART: [art] Extend RT PCRs Done
2,813,505 UART: [art] Lock RT PCRs Done
2,815,193 UART: [art] Populate DV Done
2,823,378 UART: [fht] FMC Alias Private Key: 7
2,824,516 UART: [art] Derive CDI
2,824,796 UART: [art] Store in in slot 0x4
2,910,199 UART: [art] Derive Key Pair
2,910,559 UART: [art] Store priv key in slot 0x5
2,923,763 UART: [art] Derive Key Pair - Done
2,938,738 UART: [art] Signing Cert with AUTHO
2,939,218 UART: RITY.KEYID = 7
2,954,380 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,145 UART: [art] PUB.X = 97C5914B6B03E78BAC70910A76A8B5E9267B005F140E4F2D4EE7982B8AE82556F8972A60FA167EDBD603A8E3603E8B9C
2,961,887 UART: [art] PUB.Y = 668F4A62DAD6522AB1190E99DDFCD510245B69262BFF4DA1440F7CEFA6D10C895803B8A1BB968750D7F5B6421950082B
2,968,828 UART: [art] SIG.R = 9422CC7F0AEB5AE8B117C92B4E8A1DCDC69B612ABF6485E897DA24F795594551429253282AC1D5ACBCFDB5138C7226C9
2,975,607 UART: [art] SIG.S = E77EFF97C2DC17526586E3EABC367F8F04EA1898DA15E70A0DC61A8E1D9B59EF49EED3AAB23EA45BFF397AE65CB889D3
2,999,967 UART: Caliptra RT
3,000,312 UART: [state] CFI Enabled
3,108,608 UART: [rt] RT listening for mailbox commands...
3,109,278 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,338 UART: [rt]cmd =0x44504543, len=40
3,165,430 >>> mbox cmd response data (40 bytes)
3,165,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,494 UART: [rt]cmd =0x44504543, len=96
3,236,576 >>> mbox cmd response data (56 bytes)
3,236,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,266,486 UART: [rt]cmd =0x44504543, len=96
3,306,957 >>> mbox cmd response data (56 bytes)
3,306,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,815 UART: [rt]cmd =0x44504543, len=96
3,377,688 >>> mbox cmd response data (56 bytes)
3,377,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,752 UART: [rt]cmd =0x44504543, len=96
3,448,729 >>> mbox cmd response data (56 bytes)
3,448,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,571 UART: [rt]cmd =0x44504543, len=96
3,519,728 >>> mbox cmd response data (56 bytes)
3,519,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,610 UART: [rt]cmd =0x44504543, len=96
3,590,241 >>> mbox cmd response data (56 bytes)
3,590,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,017 UART: [rt]cmd =0x44504543, len=96
3,662,184 >>> mbox cmd response data (56 bytes)
3,662,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,094 UART: [rt]cmd =0x44504543, len=96
3,734,885 >>> mbox cmd response data (56 bytes)
3,734,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,903 UART: [rt]cmd =0x44504543, len=96
3,808,494 >>> mbox cmd response data (56 bytes)
3,808,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,492 UART: [rt]cmd =0x44504543, len=96
3,881,163 >>> mbox cmd response data (56 bytes)
3,881,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,075 UART: [rt]cmd =0x44504543, len=96
3,953,794 >>> mbox cmd response data (56 bytes)
3,953,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,983,754 UART: [rt]cmd =0x44504543, len=96
4,027,329 >>> mbox cmd response data (56 bytes)
4,027,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,279 UART: [rt]cmd =0x44504543, len=96
4,100,990 >>> mbox cmd response data (56 bytes)
4,100,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,982 UART: [rt]cmd =0x44504543, len=96
4,175,261 >>> mbox cmd response data (56 bytes)
4,175,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,205,041 UART: [rt]cmd =0x44504543, len=96
4,249,246 >>> mbox cmd response data (56 bytes)
4,249,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,934 UART: [rt]cmd =0x44504543, len=96
4,285,856 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,310 UART: [kat] HMAC-384Kdf
919,938 UART: [kat] LMS
1,168,250 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 ready_for_fw is high
1,173,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,503 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,658 >>> mbox cmd response: success
2,774,813 UART: [afmc] ++
2,774,981 UART: [afmc] CDI.KEYID = 6
2,775,344 UART: [afmc] SUBJECT.KEYID = 7
2,775,770 UART: [afmc] AUTHORITY.KEYID = 5
2,811,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,730 UART: [afmc] --
2,854,828 UART: [cold-reset] --
2,855,624 UART: [state] Locking Datavault
2,857,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,729 UART: [state] Locking ICCM
2,858,389 UART: [exit] Launching FMC @ 0x40000130
2,863,718 UART:
2,863,734 UART: Running Caliptra FMC ...
2,864,142 UART:
2,864,196 UART: [state] CFI Enabled
2,874,895 UART: [fht] FMC Alias Private Key: 7
2,982,742 UART: [art] Extend RT PCRs Done
2,983,170 UART: [art] Lock RT PCRs Done
2,984,708 UART: [art] Populate DV Done
2,992,887 UART: [fht] FMC Alias Private Key: 7
2,993,837 UART: [art] Derive CDI
2,994,117 UART: [art] Store in in slot 0x4
3,079,998 UART: [art] Derive Key Pair
3,080,358 UART: [art] Store priv key in slot 0x5
3,093,568 UART: [art] Derive Key Pair - Done
3,108,187 UART: [art] Signing Cert with AUTHO
3,108,667 UART: RITY.KEYID = 7
3,123,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,712 UART: [art] PUB.X = B198627AC9653F36D3974F6AEAB50C29DAAF3BEEB7514FF5789FAE5F8FA7ED7E2C400EB3F1CDFEAEDAE7430714F17DBA
3,131,505 UART: [art] PUB.Y = 3C4FD1C5B4B0D371CBD15FF2CAF1F86F307BC728F11FC4ECBB2105E01961472E88168CE6A3204CE1FCE9C57BD47E43D7
3,138,472 UART: [art] SIG.R = 5E519CE459BE1FCF3FB0F85B86BC6B425DE2C257A24B5DE059DE865293859C7AFFF5507795D82B98B44E8EDF36EA03AB
3,145,257 UART: [art] SIG.S = 6294CBFD89114252B977F0B2E90B3BA75B67B42E1222B5C71A12270D1BE65ACA8821D8AFA9B01C06F0892471D6943D8B
3,169,211 UART: Caliptra RT
3,169,464 UART: [state] CFI Enabled
3,277,275 UART: [rt] RT listening for mailbox commands...
3,277,945 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,933 UART: [rt]cmd =0x44504543, len=40
3,333,811 >>> mbox cmd response data (40 bytes)
3,333,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,695 UART: [rt]cmd =0x44504543, len=96
3,403,967 >>> mbox cmd response data (56 bytes)
3,403,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,817 UART: [rt]cmd =0x44504543, len=96
3,473,792 >>> mbox cmd response data (56 bytes)
3,473,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,746 UART: [rt]cmd =0x44504543, len=96
3,545,153 >>> mbox cmd response data (56 bytes)
3,545,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,243 UART: [rt]cmd =0x44504543, len=96
3,616,554 >>> mbox cmd response data (56 bytes)
3,616,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,476 UART: [rt]cmd =0x44504543, len=96
3,687,411 >>> mbox cmd response data (56 bytes)
3,687,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,259 UART: [rt]cmd =0x44504543, len=96
3,758,750 >>> mbox cmd response data (56 bytes)
3,758,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,702 UART: [rt]cmd =0x44504543, len=96
3,830,783 >>> mbox cmd response data (56 bytes)
3,830,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,735 UART: [rt]cmd =0x44504543, len=96
3,902,738 >>> mbox cmd response data (56 bytes)
3,902,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,662 UART: [rt]cmd =0x44504543, len=96
3,975,269 >>> mbox cmd response data (56 bytes)
3,975,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,277 UART: [rt]cmd =0x44504543, len=96
4,048,772 >>> mbox cmd response data (56 bytes)
4,048,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,078,882 UART: [rt]cmd =0x44504543, len=96
4,121,665 >>> mbox cmd response data (56 bytes)
4,121,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,713 UART: [rt]cmd =0x44504543, len=96
4,195,352 >>> mbox cmd response data (56 bytes)
4,195,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,148 UART: [rt]cmd =0x44504543, len=96
4,268,107 >>> mbox cmd response data (56 bytes)
4,268,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,075 UART: [rt]cmd =0x44504543, len=96
4,341,026 >>> mbox cmd response data (56 bytes)
4,341,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,258 UART: [rt]cmd =0x44504543, len=96
4,416,435 >>> mbox cmd response data (56 bytes)
4,416,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,446,383 UART: [rt]cmd =0x44504543, len=96
4,453,573 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,374 ready_for_fw is high
1,055,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,082 >>> mbox cmd response: success
2,685,168 UART:
2,685,184 UART: Running Caliptra FMC ...
2,685,592 UART:
2,685,646 UART: [state] CFI Enabled
2,695,887 UART: [fht] FMC Alias Private Key: 7
2,803,398 UART: [art] Extend RT PCRs Done
2,803,826 UART: [art] Lock RT PCRs Done
2,805,210 UART: [art] Populate DV Done
2,813,607 UART: [fht] FMC Alias Private Key: 7
2,814,545 UART: [art] Derive CDI
2,814,825 UART: [art] Store in in slot 0x4
2,900,646 UART: [art] Derive Key Pair
2,901,006 UART: [art] Store priv key in slot 0x5
2,913,912 UART: [art] Derive Key Pair - Done
2,928,943 UART: [art] Signing Cert with AUTHO
2,929,423 UART: RITY.KEYID = 7
2,944,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,352 UART: [art] PUB.X = A67FC472719F64B2B51D00DB3AFF92202858AACB5A2E4A67573A9592C98BC0E3BD66D7123BB7E30982190200DE9F04D1
2,952,075 UART: [art] PUB.Y = C903BA7DDF86A21CEDEEC9A97FD0CFFB32B775735BA86966D4ADB699AA1F9AF7826633B456C9858D88F4CA708687AB73
2,959,040 UART: [art] SIG.R = 394CE2F4946E22D7D9FD4892B7608F2FD775DF48DD64F57863133E555179DD7A1A3C870EAD90871EE8D8C37167AAB998
2,965,811 UART: [art] SIG.S = 1707EB6C0EA7B819954AA69DE2EB87209CCEAE5434F05A001D0F2066673FD356647FEBEA8890F779C83D20022AA656C8
2,989,566 UART: Caliptra RT
2,989,819 UART: [state] CFI Enabled
3,096,954 UART: [rt] RT listening for mailbox commands...
3,097,624 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,736 UART: [rt]cmd =0x44504543, len=40
3,153,778 >>> mbox cmd response data (40 bytes)
3,153,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,618 UART: [rt]cmd =0x44504543, len=96
3,223,906 >>> mbox cmd response data (56 bytes)
3,223,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,253,634 UART: [rt]cmd =0x44504543, len=96
3,294,541 >>> mbox cmd response data (56 bytes)
3,294,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,335 UART: [rt]cmd =0x44504543, len=96
3,365,256 >>> mbox cmd response data (56 bytes)
3,365,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,096 UART: [rt]cmd =0x44504543, len=96
3,435,903 >>> mbox cmd response data (56 bytes)
3,435,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,831 UART: [rt]cmd =0x44504543, len=96
3,507,022 >>> mbox cmd response data (56 bytes)
3,507,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,862 UART: [rt]cmd =0x44504543, len=96
3,578,883 >>> mbox cmd response data (56 bytes)
3,578,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,749 UART: [rt]cmd =0x44504543, len=96
3,650,884 >>> mbox cmd response data (56 bytes)
3,650,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,876 UART: [rt]cmd =0x44504543, len=96
3,723,341 >>> mbox cmd response data (56 bytes)
3,723,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,365 UART: [rt]cmd =0x44504543, len=96
3,796,266 >>> mbox cmd response data (56 bytes)
3,796,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,146 UART: [rt]cmd =0x44504543, len=96
3,868,591 >>> mbox cmd response data (56 bytes)
3,868,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,385 UART: [rt]cmd =0x44504543, len=96
3,941,566 >>> mbox cmd response data (56 bytes)
3,941,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,406 UART: [rt]cmd =0x44504543, len=96
4,014,283 >>> mbox cmd response data (56 bytes)
4,014,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,351 UART: [rt]cmd =0x44504543, len=96
4,087,856 >>> mbox cmd response data (56 bytes)
4,087,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,624 UART: [rt]cmd =0x44504543, len=96
4,161,159 >>> mbox cmd response data (56 bytes)
4,161,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,191,105 UART: [rt]cmd =0x44504543, len=96
4,235,288 >>> mbox cmd response data (56 bytes)
4,235,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,198 UART: [rt]cmd =0x44504543, len=96
4,272,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,423 UART: [kat] SHA2-256
890,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,174,708 ready_for_fw is high
1,174,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,514 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,079 UART: [ldev] --
1,281,487 UART: [fwproc] Wait for Commands...
1,282,124 UART: [fwproc] Recv command 0x46574c44
1,282,857 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,771 >>> mbox cmd response: success
2,776,816 UART: [afmc] ++
2,776,984 UART: [afmc] CDI.KEYID = 6
2,777,347 UART: [afmc] SUBJECT.KEYID = 7
2,777,773 UART: [afmc] AUTHORITY.KEYID = 5
2,812,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,285 UART: [afmc] --
2,856,215 UART: [cold-reset] --
2,856,967 UART: [state] Locking Datavault
2,858,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,990 UART: [state] Locking ICCM
2,859,490 UART: [exit] Launching FMC @ 0x40000130
2,864,819 UART:
2,864,835 UART: Running Caliptra FMC ...
2,865,243 UART:
2,865,386 UART: [state] CFI Enabled
2,876,027 UART: [fht] FMC Alias Private Key: 7
2,984,128 UART: [art] Extend RT PCRs Done
2,984,556 UART: [art] Lock RT PCRs Done
2,985,834 UART: [art] Populate DV Done
2,994,071 UART: [fht] FMC Alias Private Key: 7
2,995,111 UART: [art] Derive CDI
2,995,391 UART: [art] Store in in slot 0x4
3,081,012 UART: [art] Derive Key Pair
3,081,372 UART: [art] Store priv key in slot 0x5
3,095,200 UART: [art] Derive Key Pair - Done
3,110,342 UART: [art] Signing Cert with AUTHO
3,110,822 UART: RITY.KEYID = 7
3,126,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,157 UART: [art] PUB.X = 35FBD23AD34A793993F181AE97A0E918E16D54F704EEC7F1CEABA1A6759B05C1458325B0DB164B61D2109BB7FC5903DC
3,133,930 UART: [art] PUB.Y = 28410CCC27DEA288BF21B261175962671D8A3F6A1798C476349D416077754BEFDFBEE6668724CC3B1BEBD838B5B80E12
3,140,878 UART: [art] SIG.R = 503F85787E674DB6C7A38E3D5B7F69E3CF54E6FAB48E13D5BFA3CD92C9E1019B9A467E6A9D4E97EADEF43C522FEAC2E8
3,147,669 UART: [art] SIG.S = 71B64F6063FD7C0813547AB885949B9A8FCCE131B5681027FDEFEFFE559727F81E57EFE4502675E539986A50EE0C8F2D
3,171,146 UART: Caliptra RT
3,171,491 UART: [state] CFI Enabled
3,279,090 UART: [rt] RT listening for mailbox commands...
3,279,760 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,716 UART: [rt]cmd =0x44504543, len=40
3,335,848 >>> mbox cmd response data (40 bytes)
3,335,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,556 UART: [rt]cmd =0x44504543, len=96
3,405,156 >>> mbox cmd response data (56 bytes)
3,405,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,006 UART: [rt]cmd =0x44504543, len=96
3,475,167 >>> mbox cmd response data (56 bytes)
3,475,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,221 UART: [rt]cmd =0x44504543, len=96
3,546,298 >>> mbox cmd response data (56 bytes)
3,546,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,288 UART: [rt]cmd =0x44504543, len=96
3,618,471 >>> mbox cmd response data (56 bytes)
3,618,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,309 UART: [rt]cmd =0x44504543, len=96
3,690,246 >>> mbox cmd response data (56 bytes)
3,690,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,336 UART: [rt]cmd =0x44504543, len=96
3,762,471 >>> mbox cmd response data (56 bytes)
3,762,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,487 UART: [rt]cmd =0x44504543, len=96
3,834,508 >>> mbox cmd response data (56 bytes)
3,834,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,614 UART: [rt]cmd =0x44504543, len=96
3,907,493 >>> mbox cmd response data (56 bytes)
3,907,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,475 UART: [rt]cmd =0x44504543, len=96
3,980,162 >>> mbox cmd response data (56 bytes)
3,980,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,010,016 UART: [rt]cmd =0x44504543, len=96
4,053,245 >>> mbox cmd response data (56 bytes)
4,053,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,041 UART: [rt]cmd =0x44504543, len=96
4,126,548 >>> mbox cmd response data (56 bytes)
4,126,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,514 UART: [rt]cmd =0x44504543, len=96
4,200,123 >>> mbox cmd response data (56 bytes)
4,200,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,929 UART: [rt]cmd =0x44504543, len=96
4,273,834 >>> mbox cmd response data (56 bytes)
4,273,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,842 UART: [rt]cmd =0x44504543, len=96
4,348,041 >>> mbox cmd response data (56 bytes)
4,348,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,378,057 UART: [rt]cmd =0x44504543, len=96
4,422,632 >>> mbox cmd response data (56 bytes)
4,422,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,828 UART: [rt]cmd =0x44504543, len=96
4,460,140 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,453 ready_for_fw is high
1,056,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,691 >>> mbox cmd response: success
2,687,873 UART:
2,687,889 UART: Running Caliptra FMC ...
2,688,297 UART:
2,688,440 UART: [state] CFI Enabled
2,699,303 UART: [fht] FMC Alias Private Key: 7
2,807,544 UART: [art] Extend RT PCRs Done
2,807,972 UART: [art] Lock RT PCRs Done
2,809,724 UART: [art] Populate DV Done
2,817,941 UART: [fht] FMC Alias Private Key: 7
2,818,971 UART: [art] Derive CDI
2,819,251 UART: [art] Store in in slot 0x4
2,904,760 UART: [art] Derive Key Pair
2,905,120 UART: [art] Store priv key in slot 0x5
2,918,816 UART: [art] Derive Key Pair - Done
2,933,746 UART: [art] Signing Cert with AUTHO
2,934,226 UART: RITY.KEYID = 7
2,949,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,909 UART: [art] PUB.X = 497CE165A283523F7BC3684F06A024AE5A185766624208146DA304476251DB3C9F3FEC7DA0FAE18B7B985E2CCF77BA82
2,956,674 UART: [art] PUB.Y = 2632F2FC5B257206AF88AB81FB4B43F128F87F392FF22036CD8C13DD9661550E2F6BA34C673619786D28CD7D00A0FC89
2,963,600 UART: [art] SIG.R = 21E63A5CEE5BB71759D7350F4A0DC5E74FFB1B78EF6B58BB252D2DE4E86691347555A89C274E116A68A78845E660E1E1
2,970,370 UART: [art] SIG.S = 80B89EE7D4D8D870808AF22E7700AE3EA4B6B1DFD3D2CF24D4EA7D60AB1FB91B42E330B8EE332407C6DA0801CBB9335E
2,994,012 UART: Caliptra RT
2,994,357 UART: [state] CFI Enabled
3,102,560 UART: [rt] RT listening for mailbox commands...
3,103,230 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,364 UART: [rt]cmd =0x44504543, len=40
3,159,400 >>> mbox cmd response data (40 bytes)
3,159,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,318 UART: [rt]cmd =0x44504543, len=96
3,229,430 >>> mbox cmd response data (56 bytes)
3,229,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,288 UART: [rt]cmd =0x44504543, len=96
3,299,841 >>> mbox cmd response data (56 bytes)
3,299,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,953 UART: [rt]cmd =0x44504543, len=96
3,370,416 >>> mbox cmd response data (56 bytes)
3,370,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,326 UART: [rt]cmd =0x44504543, len=96
3,441,455 >>> mbox cmd response data (56 bytes)
3,441,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,493 UART: [rt]cmd =0x44504543, len=96
3,513,146 >>> mbox cmd response data (56 bytes)
3,513,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,198 UART: [rt]cmd =0x44504543, len=96
3,584,613 >>> mbox cmd response data (56 bytes)
3,584,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,527 UART: [rt]cmd =0x44504543, len=96
3,656,626 >>> mbox cmd response data (56 bytes)
3,656,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,324 UART: [rt]cmd =0x44504543, len=96
3,728,407 >>> mbox cmd response data (56 bytes)
3,728,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,357 UART: [rt]cmd =0x44504543, len=96
3,801,418 >>> mbox cmd response data (56 bytes)
3,801,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,358 UART: [rt]cmd =0x44504543, len=96
3,873,809 >>> mbox cmd response data (56 bytes)
3,873,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,735 UART: [rt]cmd =0x44504543, len=96
3,946,838 >>> mbox cmd response data (56 bytes)
3,946,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,690 UART: [rt]cmd =0x44504543, len=96
4,020,063 >>> mbox cmd response data (56 bytes)
4,020,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,863 UART: [rt]cmd =0x44504543, len=96
4,093,868 >>> mbox cmd response data (56 bytes)
4,093,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,048 UART: [rt]cmd =0x44504543, len=96
4,167,681 >>> mbox cmd response data (56 bytes)
4,167,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,941 UART: [rt]cmd =0x44504543, len=96
4,241,892 >>> mbox cmd response data (56 bytes)
4,241,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,838 UART: [rt]cmd =0x44504543, len=96
4,279,062 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,085 UART:
192,477 UART: Running Caliptra ROM ...
193,686 UART:
193,846 UART: [state] CFI Enabled
266,312 UART: [state] LifecycleState = Unprovisioned
268,213 UART: [state] DebugLocked = No
270,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,397 UART: [kat] SHA2-256
444,292 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,608 UART: [kat] ++
455,086 UART: [kat] sha1
466,888 UART: [kat] SHA2-256
469,545 UART: [kat] SHA2-384
475,178 UART: [kat] SHA2-512-ACC
477,543 UART: [kat] ECC-384
2,768,022 UART: [kat] HMAC-384Kdf
2,801,212 UART: [kat] LMS
3,991,546 UART: [kat] --
3,993,785 UART: [cold-reset] ++
3,995,645 UART: [fht] Storing FHT @ 0x50003400
4,007,482 UART: [idev] ++
4,008,061 UART: [idev] CDI.KEYID = 6
4,008,982 UART: [idev] SUBJECT.KEYID = 7
4,010,234 UART: [idev] UDS.KEYID = 0
4,011,278 ready_for_fw is high
4,011,484 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,011 UART: [idev] Erasing UDS.KEYID = 0
7,348,798 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,560 UART: [idev] --
7,374,478 UART: [ldev] ++
7,375,100 UART: [ldev] CDI.KEYID = 6
7,376,017 UART: [ldev] SUBJECT.KEYID = 5
7,377,237 UART: [ldev] AUTHORITY.KEYID = 7
7,378,539 UART: [ldev] FE.KEYID = 1
7,422,581 UART: [ldev] Erasing FE.KEYID = 1
10,755,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,025 UART: [ldev] --
13,137,451 UART: [fwproc] Waiting for Commands...
13,140,354 UART: [fwproc] Received command 0x46574c44
13,142,533 UART: [fwproc] Received Image of size 114124 bytes
17,192,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,593 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,655,891 >>> mbox cmd response: success
17,660,141 UART: [afmc] ++
17,660,758 UART: [afmc] CDI.KEYID = 6
17,661,676 UART: [afmc] SUBJECT.KEYID = 7
17,662,892 UART: [afmc] AUTHORITY.KEYID = 5
21,030,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,238 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,624 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,491 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,914 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,554 UART: [afmc] --
23,402,903 UART: [cold-reset] --
23,407,415 UART: [state] Locking Datavault
23,411,780 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,482 UART: [state] Locking ICCM
23,415,367 UART: [exit] Launching FMC @ 0x40000130
23,423,760 UART:
23,424,020 UART: Running Caliptra FMC ...
23,425,125 UART:
23,425,286 UART: [state] CFI Enabled
23,491,764 UART: [fht] FMC Alias Private Key: 7
25,829,369 UART: [art] Extend RT PCRs Done
25,830,592 UART: [art] Lock RT PCRs Done
25,832,005 UART: [art] Populate DV Done
25,837,425 UART: [fht] FMC Alias Private Key: 7
25,838,965 UART: [art] Derive CDI
25,839,730 UART: [art] Store in in slot 0x4
25,900,277 UART: [art] Derive Key Pair
25,901,314 UART: [art] Store priv key in slot 0x5
29,194,663 UART: [art] Derive Key Pair - Done
29,207,613 UART: [art] Signing Cert with AUTHO
29,208,918 UART: RITY.KEYID = 7
31,496,855 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,381 UART: [art] PUB.X = 2EA41FD86FFD3BD77C2C9EC3FCC279652375BD39114F87DE967A2417D214E393E842A392B3C72239C93B07C776617604
31,505,641 UART: [art] PUB.Y = 37D1CCCB245064A08B374CECAB10BC22BB10A0C1219FA55A76EBFEBA5035B8885A08C29AB059F1E0890867EE590BD81B
31,512,839 UART: [art] SIG.R = A1F8D912B75F5733A9998CD15B49F242D5BA10A3ECFFB622E6B50BDC2F1A4D997121E131B7DAB6DAEDD178EE5671CCF1
31,520,247 UART: [art] SIG.S = E2139F1B49889CC6D559028C87EBE398024419375E3CAB4D717829E90BDD59D91B061692D756F863F4CA24F1256710F4
32,824,989 UART: Caliptra RT
32,825,707 UART: [state] CFI Enabled
32,987,125 UART: [rt] RT listening for mailbox commands...
32,989,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,019,080 UART: [rt]cmd =0x44504543, len=24
33,062,872 >>> mbox cmd response data (40 bytes)
33,063,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,093,748 UART: [rt]cmd =0x44504543, len=24
33,126,723 >>> mbox cmd response data (40 bytes)
33,127,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,157,594 UART: [rt]cmd =0x44504543, len=24
33,190,926 >>> mbox cmd response data (40 bytes)
33,191,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,221,351 UART: [rt]cmd =0x44504543, len=24
33,254,526 >>> mbox cmd response data (40 bytes)
33,255,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,284,917 UART: [rt]cmd =0x44504543, len=24
33,319,157 >>> mbox cmd response data (40 bytes)
33,319,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,349,905 UART: [rt]cmd =0x44504543, len=24
33,383,095 >>> mbox cmd response data (40 bytes)
33,383,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,413,422 UART: [rt]cmd =0x44504543, len=24
33,447,034 >>> mbox cmd response data (40 bytes)
33,447,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,477,668 UART: [rt]cmd =0x44504543, len=24
33,510,845 >>> mbox cmd response data (40 bytes)
33,511,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,541,531 UART: [rt]cmd =0x44504543, len=24
33,574,884 >>> mbox cmd response data (40 bytes)
33,575,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,605,432 UART: [rt]cmd =0x44504543, len=24
33,639,120 >>> mbox cmd response data (40 bytes)
33,639,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,669,691 UART: [rt]cmd =0x44504543, len=24
33,703,417 >>> mbox cmd response data (40 bytes)
33,704,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,733,779 UART: [rt]cmd =0x44504543, len=24
33,767,283 >>> mbox cmd response data (40 bytes)
33,767,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,797,641 UART: [rt]cmd =0x44504543, len=24
33,831,345 >>> mbox cmd response data (40 bytes)
33,831,983 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,861,997 UART: [rt]cmd =0x44504543, len=24
33,895,573 >>> mbox cmd response data (40 bytes)
33,896,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,926,124 UART: [rt]cmd =0x44504543, len=24
33,959,439 >>> mbox cmd response data (40 bytes)
33,960,039 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,990,166 UART: [rt]cmd =0x44504543, len=24
33,996,544 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,785,115 ready_for_fw is high
3,785,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,402 >>> mbox cmd response: success
23,568,897 UART:
23,569,296 UART: Running Caliptra FMC ...
23,570,617 UART:
23,570,787 UART: [state] CFI Enabled
23,638,253 UART: [fht] FMC Alias Private Key: 7
25,976,505 UART: [art] Extend RT PCRs Done
25,977,720 UART: [art] Lock RT PCRs Done
25,979,510 UART: [art] Populate DV Done
25,984,889 UART: [fht] FMC Alias Private Key: 7
25,986,488 UART: [art] Derive CDI
25,987,319 UART: [art] Store in in slot 0x4
26,037,605 UART: [art] Derive Key Pair
26,038,629 UART: [art] Store priv key in slot 0x5
29,331,233 UART: [art] Derive Key Pair - Done
29,344,098 UART: [art] Signing Cert with AUTHO
29,345,431 UART: RITY.KEYID = 7
31,632,200 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,702 UART: [art] PUB.X = B19D395453826AE6D2A5129B6B2F5F4CB5E2B8660E6EBAD406A7D1E6BCB32193B8C9E640A3EF6652264871EAC9995F09
31,640,961 UART: [art] PUB.Y = 271A81040619572383985082EA120023070EBD9E7501B11C5B57E319EADE5BACEBDF498132451028F53A3BC7F9D93B72
31,648,207 UART: [art] SIG.R = 47FAF208BAB0CD3FEAF068F1AAF3D0061A3A63C42FC44A546C374A3675A481D89654D1A84EBDA819EAE7F835DEC5C865
31,655,603 UART: [art] SIG.S = 97FC9F7ECB9F44A0C70EA641FAC7C61084F0D3212715633E177177C846E4889AAD84B9FAE06133B6D5669270286BA17D
32,960,433 UART: Caliptra RT
32,961,146 UART: [state] CFI Enabled
33,121,293 UART: [rt] RT listening for mailbox commands...
33,123,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,153,314 UART: [rt]cmd =0x44504543, len=24
33,195,233 >>> mbox cmd response data (40 bytes)
33,196,052 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,226,150 UART: [rt]cmd =0x44504543, len=24
33,259,314 >>> mbox cmd response data (40 bytes)
33,259,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,289,917 UART: [rt]cmd =0x44504543, len=24
33,323,542 >>> mbox cmd response data (40 bytes)
33,324,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,354,263 UART: [rt]cmd =0x44504543, len=24
33,387,588 >>> mbox cmd response data (40 bytes)
33,388,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,418,294 UART: [rt]cmd =0x44504543, len=24
33,451,401 >>> mbox cmd response data (40 bytes)
33,452,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,481,819 UART: [rt]cmd =0x44504543, len=24
33,515,596 >>> mbox cmd response data (40 bytes)
33,516,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,546,057 UART: [rt]cmd =0x44504543, len=24
33,579,676 >>> mbox cmd response data (40 bytes)
33,580,289 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,610,048 UART: [rt]cmd =0x44504543, len=24
33,643,775 >>> mbox cmd response data (40 bytes)
33,644,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,674,274 UART: [rt]cmd =0x44504543, len=24
33,707,788 >>> mbox cmd response data (40 bytes)
33,708,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,738,157 UART: [rt]cmd =0x44504543, len=24
33,771,967 >>> mbox cmd response data (40 bytes)
33,772,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,802,582 UART: [rt]cmd =0x44504543, len=24
33,835,698 >>> mbox cmd response data (40 bytes)
33,836,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,866,310 UART: [rt]cmd =0x44504543, len=24
33,899,677 >>> mbox cmd response data (40 bytes)
33,900,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,930,252 UART: [rt]cmd =0x44504543, len=24
33,963,875 >>> mbox cmd response data (40 bytes)
33,964,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,994,464 UART: [rt]cmd =0x44504543, len=24
34,028,255 >>> mbox cmd response data (40 bytes)
34,028,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,058,840 UART: [rt]cmd =0x44504543, len=24
34,092,332 >>> mbox cmd response data (40 bytes)
34,092,982 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,122,888 UART: [rt]cmd =0x44504543, len=24
34,129,240 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,276 UART:
192,663 UART: Running Caliptra ROM ...
193,860 UART:
603,620 UART: [state] CFI Enabled
620,027 UART: [state] LifecycleState = Unprovisioned
622,013 UART: [state] DebugLocked = No
623,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,921 UART: [kat] SHA2-256
797,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,169 UART: [kat] ++
808,771 UART: [kat] sha1
819,432 UART: [kat] SHA2-256
822,155 UART: [kat] SHA2-384
827,146 UART: [kat] SHA2-512-ACC
829,508 UART: [kat] ECC-384
3,113,326 UART: [kat] HMAC-384Kdf
3,124,281 UART: [kat] LMS
4,314,400 UART: [kat] --
4,319,968 UART: [cold-reset] ++
4,322,611 UART: [fht] Storing FHT @ 0x50003400
4,334,724 UART: [idev] ++
4,335,293 UART: [idev] CDI.KEYID = 6
4,336,354 UART: [idev] SUBJECT.KEYID = 7
4,337,458 UART: [idev] UDS.KEYID = 0
4,338,509 ready_for_fw is high
4,338,726 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,106 UART: [idev] Erasing UDS.KEYID = 0
7,622,983 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,094 UART: [idev] --
7,647,757 UART: [ldev] ++
7,648,331 UART: [ldev] CDI.KEYID = 6
7,649,293 UART: [ldev] SUBJECT.KEYID = 5
7,650,501 UART: [ldev] AUTHORITY.KEYID = 7
7,651,743 UART: [ldev] FE.KEYID = 1
7,663,055 UART: [ldev] Erasing FE.KEYID = 1
10,952,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,990 UART: [ldev] --
13,310,897 UART: [fwproc] Waiting for Commands...
13,313,314 UART: [fwproc] Received command 0x46574c44
13,315,546 UART: [fwproc] Received Image of size 114124 bytes
17,368,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,381 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,228 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,014 >>> mbox cmd response: success
17,842,060 UART: [afmc] ++
17,842,675 UART: [afmc] CDI.KEYID = 6
17,843,564 UART: [afmc] SUBJECT.KEYID = 7
17,844,831 UART: [afmc] AUTHORITY.KEYID = 5
21,159,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,971 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,385 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,209 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,644 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,908 UART: [afmc] --
23,523,015 UART: [cold-reset] --
23,526,121 UART: [state] Locking Datavault
23,529,637 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,330 UART: [state] Locking ICCM
23,533,854 UART: [exit] Launching FMC @ 0x40000130
23,542,247 UART:
23,542,495 UART: Running Caliptra FMC ...
23,543,595 UART:
23,543,747 UART: [state] CFI Enabled
23,551,839 UART: [fht] FMC Alias Private Key: 7
25,882,016 UART: [art] Extend RT PCRs Done
25,883,233 UART: [art] Lock RT PCRs Done
25,884,828 UART: [art] Populate DV Done
25,890,557 UART: [fht] FMC Alias Private Key: 7
25,892,090 UART: [art] Derive CDI
25,892,856 UART: [art] Store in in slot 0x4
25,935,606 UART: [art] Derive Key Pair
25,936,607 UART: [art] Store priv key in slot 0x5
29,178,379 UART: [art] Derive Key Pair - Done
29,191,153 UART: [art] Signing Cert with AUTHO
29,192,458 UART: RITY.KEYID = 7
31,472,191 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,714 UART: [art] PUB.X = 18DC3260F53E4AC4ED0C76F50ACCD0F40C4F05934D4157B4BB849A198063A3A37FB5E1728B7772C3065A86B49499940F
31,480,949 UART: [art] PUB.Y = F760080F523A8B65A9B47075B71EBFBC30334F35970A317FCD1088EE2CB61A8DDA707665683AC1B65325A7DD787C563E
31,488,217 UART: [art] SIG.R = 5381DEF1AB598F94941E971A5A357912B38596FE382BDDC090E80A0DED34DBC124EACD34E1FC062781550E0AFC98D680
31,495,629 UART: [art] SIG.S = E773728AB8C8A500AAF3D0AB5DD48BF50E8B78CAE636BF40C1E10905C47A8E04FFE7D17FB9B8755660CA504085A2B068
32,800,809 UART: Caliptra RT
32,801,519 UART: [state] CFI Enabled
32,918,896 UART: [rt] RT listening for mailbox commands...
32,920,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,950,659 UART: [rt]cmd =0x44504543, len=24
32,977,584 >>> mbox cmd response data (40 bytes)
32,978,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,008,160 UART: [rt]cmd =0x44504543, len=24
33,033,988 >>> mbox cmd response data (40 bytes)
33,034,663 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,064,572 UART: [rt]cmd =0x44504543, len=24
33,090,871 >>> mbox cmd response data (40 bytes)
33,091,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,121,416 UART: [rt]cmd =0x44504543, len=24
33,147,852 >>> mbox cmd response data (40 bytes)
33,148,479 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,178,284 UART: [rt]cmd =0x44504543, len=24
33,204,820 >>> mbox cmd response data (40 bytes)
33,205,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,235,342 UART: [rt]cmd =0x44504543, len=24
33,262,076 >>> mbox cmd response data (40 bytes)
33,262,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,292,640 UART: [rt]cmd =0x44504543, len=24
33,318,440 >>> mbox cmd response data (40 bytes)
33,319,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,348,911 UART: [rt]cmd =0x44504543, len=24
33,374,641 >>> mbox cmd response data (40 bytes)
33,375,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,405,049 UART: [rt]cmd =0x44504543, len=24
33,431,762 >>> mbox cmd response data (40 bytes)
33,432,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,462,375 UART: [rt]cmd =0x44504543, len=24
33,488,937 >>> mbox cmd response data (40 bytes)
33,489,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,519,346 UART: [rt]cmd =0x44504543, len=24
33,545,911 >>> mbox cmd response data (40 bytes)
33,546,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,576,352 UART: [rt]cmd =0x44504543, len=24
33,602,843 >>> mbox cmd response data (40 bytes)
33,603,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,633,255 UART: [rt]cmd =0x44504543, len=24
33,659,771 >>> mbox cmd response data (40 bytes)
33,660,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,690,105 UART: [rt]cmd =0x44504543, len=24
33,716,251 >>> mbox cmd response data (40 bytes)
33,716,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,746,818 UART: [rt]cmd =0x44504543, len=24
33,772,928 >>> mbox cmd response data (40 bytes)
33,773,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,803,385 UART: [rt]cmd =0x44504543, len=24
33,809,724 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,224 writing to cptra_bootfsm_go
4,124,599 ready_for_fw is high
4,124,987 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,094 >>> mbox cmd response: success
23,723,576 UART:
23,723,969 UART: Running Caliptra FMC ...
23,725,172 UART:
23,725,337 UART: [state] CFI Enabled
23,732,959 UART: [fht] FMC Alias Private Key: 7
26,063,425 UART: [art] Extend RT PCRs Done
26,064,652 UART: [art] Lock RT PCRs Done
26,066,227 UART: [art] Populate DV Done
26,071,533 UART: [fht] FMC Alias Private Key: 7
26,073,291 UART: [art] Derive CDI
26,074,110 UART: [art] Store in in slot 0x4
26,116,449 UART: [art] Derive Key Pair
26,117,513 UART: [art] Store priv key in slot 0x5
29,359,496 UART: [art] Derive Key Pair - Done
29,372,659 UART: [art] Signing Cert with AUTHO
29,374,000 UART: RITY.KEYID = 7
31,653,627 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,132 UART: [art] PUB.X = 0FB33BE84B273340FAB42570B8200CA70BDEEEB4C27283A811F965C016F41F3E30DD4BCDA366B8A92BC9FB168D5ED0B8
31,662,418 UART: [art] PUB.Y = 917DC2A3245D14AA3A363481862D122494F83CE26EDB3713BDF5A60296022842D3D35A4CDD8F80529919AF0E3C358108
31,669,636 UART: [art] SIG.R = A3332E7B4D672EACB1ABA09FEA02A77A16380C8A7E78A381462224C916364CA277A08799373F2CE345B819F11C2CB9AD
31,677,019 UART: [art] SIG.S = 69B76B3E33336086A47F63F528A561A636A6BD9802B65874F0B2851ED8C40D6DE2E4DE3F3D854DADA7D6A515E6EA3E58
32,981,842 UART: Caliptra RT
32,982,549 UART: [state] CFI Enabled
33,099,884 UART: [rt] RT listening for mailbox commands...
33,101,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,131,655 UART: [rt]cmd =0x44504543, len=24
33,158,113 >>> mbox cmd response data (40 bytes)
33,158,898 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,188,928 UART: [rt]cmd =0x44504543, len=24
33,215,026 >>> mbox cmd response data (40 bytes)
33,215,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,245,659 UART: [rt]cmd =0x44504543, len=24
33,271,851 >>> mbox cmd response data (40 bytes)
33,272,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,302,495 UART: [rt]cmd =0x44504543, len=24
33,328,691 >>> mbox cmd response data (40 bytes)
33,329,322 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,359,380 UART: [rt]cmd =0x44504543, len=24
33,385,210 >>> mbox cmd response data (40 bytes)
33,385,867 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,415,661 UART: [rt]cmd =0x44504543, len=24
33,441,856 >>> mbox cmd response data (40 bytes)
33,442,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,472,408 UART: [rt]cmd =0x44504543, len=24
33,498,170 >>> mbox cmd response data (40 bytes)
33,498,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,528,803 UART: [rt]cmd =0x44504543, len=24
33,555,187 >>> mbox cmd response data (40 bytes)
33,555,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,585,759 UART: [rt]cmd =0x44504543, len=24
33,612,117 >>> mbox cmd response data (40 bytes)
33,612,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,642,668 UART: [rt]cmd =0x44504543, len=24
33,669,073 >>> mbox cmd response data (40 bytes)
33,669,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,699,589 UART: [rt]cmd =0x44504543, len=24
33,725,534 >>> mbox cmd response data (40 bytes)
33,726,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,755,989 UART: [rt]cmd =0x44504543, len=24
33,782,404 >>> mbox cmd response data (40 bytes)
33,783,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,813,068 UART: [rt]cmd =0x44504543, len=24
33,839,044 >>> mbox cmd response data (40 bytes)
33,839,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,869,690 UART: [rt]cmd =0x44504543, len=24
33,896,023 >>> mbox cmd response data (40 bytes)
33,896,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,926,529 UART: [rt]cmd =0x44504543, len=24
33,952,636 >>> mbox cmd response data (40 bytes)
33,953,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,983,095 UART: [rt]cmd =0x44504543, len=24
33,989,985 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,158 UART:
192,501 UART: Running Caliptra ROM ...
193,604 UART:
193,745 UART: [state] CFI Enabled
265,404 UART: [state] LifecycleState = Unprovisioned
267,319 UART: [state] DebugLocked = No
270,075 UART: [state] WD Timer not started. Device not locked for debugging
273,053 UART: [kat] SHA2-256
452,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,724 UART: [kat] ++
464,259 UART: [kat] sha1
475,226 UART: [kat] SHA2-256
478,216 UART: [kat] SHA2-384
485,138 UART: [kat] SHA2-512-ACC
488,142 UART: [kat] ECC-384
2,945,602 UART: [kat] HMAC-384Kdf
2,970,506 UART: [kat] LMS
3,500,025 UART: [kat] --
3,504,118 UART: [cold-reset] ++
3,504,918 UART: [fht] FHT @ 0x50003400
3,517,047 UART: [idev] ++
3,517,650 UART: [idev] CDI.KEYID = 6
3,518,582 UART: [idev] SUBJECT.KEYID = 7
3,519,759 UART: [idev] UDS.KEYID = 0
3,520,685 ready_for_fw is high
3,520,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,643 UART: [idev] Erasing UDS.KEYID = 0
6,028,171 UART: [idev] Sha1 KeyId Algorithm
6,051,663 UART: [idev] --
6,055,277 UART: [ldev] ++
6,055,842 UART: [ldev] CDI.KEYID = 6
6,056,904 UART: [ldev] SUBJECT.KEYID = 5
6,058,013 UART: [ldev] AUTHORITY.KEYID = 7
6,059,194 UART: [ldev] FE.KEYID = 1
6,099,422 UART: [ldev] Erasing FE.KEYID = 1
8,604,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,833 UART: [ldev] --
10,411,707 UART: [fwproc] Wait for Commands...
10,413,958 UART: [fwproc] Recv command 0x46574c44
10,416,049 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,609 >>> mbox cmd response: success
14,279,208 UART: [afmc] ++
14,279,801 UART: [afmc] CDI.KEYID = 6
14,280,710 UART: [afmc] SUBJECT.KEYID = 7
14,281,872 UART: [afmc] AUTHORITY.KEYID = 5
16,809,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,752 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,623 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,053 UART: [afmc] --
18,608,616 UART: [cold-reset] --
18,610,588 UART: [state] Locking Datavault
18,616,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,454 UART: [state] Locking ICCM
18,620,981 UART: [exit] Launching FMC @ 0x40000130
18,629,370 UART:
18,629,613 UART: Running Caliptra FMC ...
18,630,713 UART:
18,630,873 UART: [state] CFI Enabled
18,690,639 UART: [fht] FMC Alias Private Key: 7
20,454,748 UART: [art] Extend RT PCRs Done
20,455,984 UART: [art] Lock RT PCRs Done
20,457,773 UART: [art] Populate DV Done
20,463,304 UART: [fht] FMC Alias Private Key: 7
20,465,006 UART: [art] Derive CDI
20,465,751 UART: [art] Store in in slot 0x4
20,523,465 UART: [art] Derive Key Pair
20,524,498 UART: [art] Store priv key in slot 0x5
22,987,615 UART: [art] Derive Key Pair - Done
23,000,178 UART: [art] Signing Cert with AUTHO
23,001,484 UART: RITY.KEYID = 7
24,712,988 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,485 UART: [art] PUB.X = 8A06D39407E8C676669240E77EDDA26CE2E4B78D543AAAC2143DFDC16C71E827CE80A2C79592172390DD30DC6547B9BE
24,721,746 UART: [art] PUB.Y = C5760DA5A2BFD6F0088102FE4841E0FCF1BCBED249DEF12217A6AB6D4DDD37B5788D8DBCBC4A62C09C8F578B2284CD7B
24,729,042 UART: [art] SIG.R = C4B86F28F54910666087256529A438A6B49BD7F423C4B7D6B026C4D8BEB9B5F0DCBBBB32C9750E92CF35EA2DFD55C480
24,736,429 UART: [art] SIG.S = 1DF6A760D5E5686374566394ED12B3B1AAFEF13F2948D3E004E0B3B152B5099E30635304FD1E6154E58A5BD45B088A1B
25,715,256 UART: Caliptra RT
25,715,970 UART: [state] CFI Enabled
25,881,963 UART: [rt] RT listening for mailbox commands...
25,883,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,914,252 UART: [rt]cmd =0x44504543, len=24
25,956,557 >>> mbox cmd response data (40 bytes)
25,957,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,987,168 UART: [rt]cmd =0x44504543, len=24
26,020,578 >>> mbox cmd response data (40 bytes)
26,021,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,051,321 UART: [rt]cmd =0x44504543, len=24
26,084,442 >>> mbox cmd response data (40 bytes)
26,085,093 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,115,058 UART: [rt]cmd =0x44504543, len=24
26,148,600 >>> mbox cmd response data (40 bytes)
26,149,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,179,128 UART: [rt]cmd =0x44504543, len=24
26,212,721 >>> mbox cmd response data (40 bytes)
26,213,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,243,253 UART: [rt]cmd =0x44504543, len=24
26,276,873 >>> mbox cmd response data (40 bytes)
26,277,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,307,443 UART: [rt]cmd =0x44504543, len=24
26,340,829 >>> mbox cmd response data (40 bytes)
26,341,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,371,377 UART: [rt]cmd =0x44504543, len=24
26,404,865 >>> mbox cmd response data (40 bytes)
26,405,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,435,522 UART: [rt]cmd =0x44504543, len=24
26,468,676 >>> mbox cmd response data (40 bytes)
26,469,278 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,499,037 UART: [rt]cmd =0x44504543, len=24
26,533,415 >>> mbox cmd response data (40 bytes)
26,534,056 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,564,142 UART: [rt]cmd =0x44504543, len=24
26,597,167 >>> mbox cmd response data (40 bytes)
26,597,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,627,518 UART: [rt]cmd =0x44504543, len=24
26,661,166 >>> mbox cmd response data (40 bytes)
26,661,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,691,715 UART: [rt]cmd =0x44504543, len=24
26,725,306 >>> mbox cmd response data (40 bytes)
26,725,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,756,013 UART: [rt]cmd =0x44504543, len=24
26,788,843 >>> mbox cmd response data (40 bytes)
26,789,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,819,195 UART: [rt]cmd =0x44504543, len=24
26,853,355 >>> mbox cmd response data (40 bytes)
26,853,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,883,796 UART: [rt]cmd =0x44504543, len=24
26,890,236 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,372,232 ready_for_fw is high
3,372,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,499 >>> mbox cmd response: success
18,354,890 UART:
18,355,283 UART: Running Caliptra FMC ...
18,356,387 UART:
18,356,542 UART: [state] CFI Enabled
18,424,721 UART: [fht] FMC Alias Private Key: 7
20,188,011 UART: [art] Extend RT PCRs Done
20,189,236 UART: [art] Lock RT PCRs Done
20,190,675 UART: [art] Populate DV Done
20,196,196 UART: [fht] FMC Alias Private Key: 7
20,197,845 UART: [art] Derive CDI
20,198,657 UART: [art] Store in in slot 0x4
20,257,871 UART: [art] Derive Key Pair
20,258,914 UART: [art] Store priv key in slot 0x5
22,721,757 UART: [art] Derive Key Pair - Done
22,734,916 UART: [art] Signing Cert with AUTHO
22,736,238 UART: RITY.KEYID = 7
24,447,436 UART: [art] Erasing AUTHORITY.KEYID = 7
24,448,935 UART: [art] PUB.X = C2B6CA049596B1B8C162B6D8874D473CA3D26370AEEF7AC7425E7B77B5D17D0B75CF062C0F997CAC4BB3873257D7D071
24,456,242 UART: [art] PUB.Y = 5B4A7E966572D7C5177347532F235D2B068624D4CDC3A59E5AB2045C260DC4CEAA11E109E0831F6EA65B0088DBB9B89A
24,463,460 UART: [art] SIG.R = A87A8AFC8D3B9576BB668E91941A389712DD3877825D36B9F21BED1B21F0D077B2DCBBD662E097B278AF264E8E399C1F
24,470,952 UART: [art] SIG.S = 6B2104780AF05F909C63558D0BC783945484F1FB2413573C169EFCAD10D43F032DC05B6BFD119D2E0149D5BF0048688B
25,449,161 UART: Caliptra RT
25,449,860 UART: [state] CFI Enabled
25,616,929 UART: [rt] RT listening for mailbox commands...
25,618,852 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,649,432 UART: [rt]cmd =0x44504543, len=24
25,690,843 >>> mbox cmd response data (40 bytes)
25,691,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,721,566 UART: [rt]cmd =0x44504543, len=24
25,754,255 >>> mbox cmd response data (40 bytes)
25,754,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,784,682 UART: [rt]cmd =0x44504543, len=24
25,818,436 >>> mbox cmd response data (40 bytes)
25,819,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,849,093 UART: [rt]cmd =0x44504543, len=24
25,882,525 >>> mbox cmd response data (40 bytes)
25,883,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,912,902 UART: [rt]cmd =0x44504543, len=24
25,946,579 >>> mbox cmd response data (40 bytes)
25,947,201 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,977,053 UART: [rt]cmd =0x44504543, len=24
26,010,672 >>> mbox cmd response data (40 bytes)
26,011,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,041,379 UART: [rt]cmd =0x44504543, len=24
26,074,522 >>> mbox cmd response data (40 bytes)
26,075,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,105,304 UART: [rt]cmd =0x44504543, len=24
26,138,377 >>> mbox cmd response data (40 bytes)
26,138,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,169,070 UART: [rt]cmd =0x44504543, len=24
26,202,862 >>> mbox cmd response data (40 bytes)
26,203,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,233,467 UART: [rt]cmd =0x44504543, len=24
26,266,709 >>> mbox cmd response data (40 bytes)
26,267,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,297,024 UART: [rt]cmd =0x44504543, len=24
26,330,683 >>> mbox cmd response data (40 bytes)
26,331,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,361,299 UART: [rt]cmd =0x44504543, len=24
26,395,282 >>> mbox cmd response data (40 bytes)
26,395,936 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,425,946 UART: [rt]cmd =0x44504543, len=24
26,458,878 >>> mbox cmd response data (40 bytes)
26,459,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,489,642 UART: [rt]cmd =0x44504543, len=24
26,522,776 >>> mbox cmd response data (40 bytes)
26,523,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,553,519 UART: [rt]cmd =0x44504543, len=24
26,587,080 >>> mbox cmd response data (40 bytes)
26,587,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,617,493 UART: [rt]cmd =0x44504543, len=24
26,624,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,213 UART:
192,591 UART: Running Caliptra ROM ...
193,769 UART:
603,461 UART: [state] CFI Enabled
617,967 UART: [state] LifecycleState = Unprovisioned
619,871 UART: [state] DebugLocked = No
621,754 UART: [state] WD Timer not started. Device not locked for debugging
625,210 UART: [kat] SHA2-256
804,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,894 UART: [kat] ++
816,416 UART: [kat] sha1
827,094 UART: [kat] SHA2-256
830,094 UART: [kat] SHA2-384
836,928 UART: [kat] SHA2-512-ACC
839,865 UART: [kat] ECC-384
3,281,656 UART: [kat] HMAC-384Kdf
3,293,210 UART: [kat] LMS
3,822,669 UART: [kat] --
3,826,971 UART: [cold-reset] ++
3,828,826 UART: [fht] FHT @ 0x50003400
3,840,079 UART: [idev] ++
3,840,646 UART: [idev] CDI.KEYID = 6
3,841,552 UART: [idev] SUBJECT.KEYID = 7
3,842,784 UART: [idev] UDS.KEYID = 0
3,843,701 ready_for_fw is high
3,843,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,734 UART: [idev] Erasing UDS.KEYID = 0
6,312,186 UART: [idev] Sha1 KeyId Algorithm
6,335,425 UART: [idev] --
6,338,924 UART: [ldev] ++
6,339,489 UART: [ldev] CDI.KEYID = 6
6,340,391 UART: [ldev] SUBJECT.KEYID = 5
6,341,593 UART: [ldev] AUTHORITY.KEYID = 7
6,342,816 UART: [ldev] FE.KEYID = 1
6,354,912 UART: [ldev] Erasing FE.KEYID = 1
8,831,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,308 UART: [ldev] --
10,622,447 UART: [fwproc] Wait for Commands...
10,624,490 UART: [fwproc] Recv command 0x46574c44
10,626,596 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,221 >>> mbox cmd response: success
14,504,972 UART: [afmc] ++
14,505,563 UART: [afmc] CDI.KEYID = 6
14,506,468 UART: [afmc] SUBJECT.KEYID = 7
14,507,616 UART: [afmc] AUTHORITY.KEYID = 5
17,008,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,064 UART: [afmc] --
18,805,483 UART: [cold-reset] --
18,809,665 UART: [state] Locking Datavault
18,815,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,876 UART: [state] Locking ICCM
18,819,502 UART: [exit] Launching FMC @ 0x40000130
18,827,947 UART:
18,828,174 UART: Running Caliptra FMC ...
18,829,264 UART:
18,829,418 UART: [state] CFI Enabled
18,837,564 UART: [fht] FMC Alias Private Key: 7
20,594,254 UART: [art] Extend RT PCRs Done
20,595,467 UART: [art] Lock RT PCRs Done
20,597,193 UART: [art] Populate DV Done
20,602,701 UART: [fht] FMC Alias Private Key: 7
20,604,394 UART: [art] Derive CDI
20,605,199 UART: [art] Store in in slot 0x4
20,647,482 UART: [art] Derive Key Pair
20,648,516 UART: [art] Store priv key in slot 0x5
23,076,048 UART: [art] Derive Key Pair - Done
23,089,420 UART: [art] Signing Cert with AUTHO
23,090,729 UART: RITY.KEYID = 7
24,796,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,518 UART: [art] PUB.X = E682B59D7B670816727841E825D519453DEBEE7558BF9CECE886768460B93ABF1F87379D8DB3A1AFE07EBBBFE4DFCD3E
24,804,807 UART: [art] PUB.Y = C1C68B181E280C2C814AE578232B04E5530FC181A89714CA987D5EDA17F8A8A81EB247DAD71E0348AFDA391FBEF8A965
24,812,081 UART: [art] SIG.R = 347060E56844D36E3D0A6EDB64C03F82D5679D0A7FA6D6501A77D045672553FBB44B198045CDF7D47088C7764B8F5B32
24,819,401 UART: [art] SIG.S = CB56E9F9C1626D720D282F7BA0245098A20B84BEC3C4004990A82BCA3EFDAA46DACC679D3734BBFD8428A03356254A5F
25,798,400 UART: Caliptra RT
25,799,092 UART: [state] CFI Enabled
25,916,119 UART: [rt] RT listening for mailbox commands...
25,918,033 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,947,676 UART: [rt]cmd =0x44504543, len=24
25,974,020 >>> mbox cmd response data (40 bytes)
25,974,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,004,556 UART: [rt]cmd =0x44504543, len=24
26,031,003 >>> mbox cmd response data (40 bytes)
26,031,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,061,493 UART: [rt]cmd =0x44504543, len=24
26,087,487 >>> mbox cmd response data (40 bytes)
26,088,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,118,065 UART: [rt]cmd =0x44504543, len=24
26,144,145 >>> mbox cmd response data (40 bytes)
26,144,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,174,687 UART: [rt]cmd =0x44504543, len=24
26,200,921 >>> mbox cmd response data (40 bytes)
26,201,520 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,231,532 UART: [rt]cmd =0x44504543, len=24
26,257,588 >>> mbox cmd response data (40 bytes)
26,258,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,288,057 UART: [rt]cmd =0x44504543, len=24
26,313,822 >>> mbox cmd response data (40 bytes)
26,314,528 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,344,535 UART: [rt]cmd =0x44504543, len=24
26,370,777 >>> mbox cmd response data (40 bytes)
26,371,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,401,384 UART: [rt]cmd =0x44504543, len=24
26,427,818 >>> mbox cmd response data (40 bytes)
26,428,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,458,063 UART: [rt]cmd =0x44504543, len=24
26,484,442 >>> mbox cmd response data (40 bytes)
26,485,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,514,848 UART: [rt]cmd =0x44504543, len=24
26,541,033 >>> mbox cmd response data (40 bytes)
26,541,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,571,567 UART: [rt]cmd =0x44504543, len=24
26,598,207 >>> mbox cmd response data (40 bytes)
26,598,818 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,628,948 UART: [rt]cmd =0x44504543, len=24
26,655,220 >>> mbox cmd response data (40 bytes)
26,655,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,685,564 UART: [rt]cmd =0x44504543, len=24
26,712,452 >>> mbox cmd response data (40 bytes)
26,713,095 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,743,101 UART: [rt]cmd =0x44504543, len=24
26,769,445 >>> mbox cmd response data (40 bytes)
26,770,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,800,168 UART: [rt]cmd =0x44504543, len=24
26,807,143 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,695,930 ready_for_fw is high
3,696,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,224 >>> mbox cmd response: success
18,524,342 UART:
18,524,774 UART: Running Caliptra FMC ...
18,525,867 UART:
18,526,008 UART: [state] CFI Enabled
18,534,289 UART: [fht] FMC Alias Private Key: 7
20,290,544 UART: [art] Extend RT PCRs Done
20,291,768 UART: [art] Lock RT PCRs Done
20,293,865 UART: [art] Populate DV Done
20,299,303 UART: [fht] FMC Alias Private Key: 7
20,300,787 UART: [art] Derive CDI
20,301,515 UART: [art] Store in in slot 0x4
20,344,009 UART: [art] Derive Key Pair
20,345,012 UART: [art] Store priv key in slot 0x5
22,772,567 UART: [art] Derive Key Pair - Done
22,785,870 UART: [art] Signing Cert with AUTHO
22,787,180 UART: RITY.KEYID = 7
24,492,563 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,064 UART: [art] PUB.X = F6A858F789CACC111909519E1EEE34CD632B157BF5A45F098671043C35FF948D32FFE0986150A524C7F6DB478E52570B
24,501,347 UART: [art] PUB.Y = 7EC6F5243F7530AB054E5034657A949A3315C7A200D1EEB95541D40590308273C4A67E09C4B485AE89075991D8393FAD
24,508,556 UART: [art] SIG.R = F99013DF586EE8A106AF9AECA8981B9DB3FC1FE44E92A387CE667D2D93BA014C53841D0848FEE1ED295E6EC277772266
24,515,990 UART: [art] SIG.S = 5487C029A2510D45E551F742BC934E76267117ED29B349FD88A1D0CA43644688A4CFD28EECCE4BCCC01B3F88E214CD56
25,494,972 UART: Caliptra RT
25,495,687 UART: [state] CFI Enabled
25,612,861 UART: [rt] RT listening for mailbox commands...
25,614,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,644,757 UART: [rt]cmd =0x44504543, len=24
25,671,208 >>> mbox cmd response data (40 bytes)
25,672,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,701,734 UART: [rt]cmd =0x44504543, len=24
25,727,924 >>> mbox cmd response data (40 bytes)
25,728,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,758,521 UART: [rt]cmd =0x44504543, len=24
25,784,968 >>> mbox cmd response data (40 bytes)
25,785,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,815,512 UART: [rt]cmd =0x44504543, len=24
25,841,872 >>> mbox cmd response data (40 bytes)
25,842,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,872,391 UART: [rt]cmd =0x44504543, len=24
25,898,523 >>> mbox cmd response data (40 bytes)
25,899,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,929,074 UART: [rt]cmd =0x44504543, len=24
25,954,770 >>> mbox cmd response data (40 bytes)
25,955,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,985,421 UART: [rt]cmd =0x44504543, len=24
26,011,700 >>> mbox cmd response data (40 bytes)
26,012,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,042,274 UART: [rt]cmd =0x44504543, len=24
26,069,007 >>> mbox cmd response data (40 bytes)
26,069,668 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,099,571 UART: [rt]cmd =0x44504543, len=24
26,126,025 >>> mbox cmd response data (40 bytes)
26,126,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,156,496 UART: [rt]cmd =0x44504543, len=24
26,182,824 >>> mbox cmd response data (40 bytes)
26,183,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,213,226 UART: [rt]cmd =0x44504543, len=24
26,240,043 >>> mbox cmd response data (40 bytes)
26,240,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,270,508 UART: [rt]cmd =0x44504543, len=24
26,297,039 >>> mbox cmd response data (40 bytes)
26,297,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,327,549 UART: [rt]cmd =0x44504543, len=24
26,353,999 >>> mbox cmd response data (40 bytes)
26,354,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,384,303 UART: [rt]cmd =0x44504543, len=24
26,410,733 >>> mbox cmd response data (40 bytes)
26,411,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,441,247 UART: [rt]cmd =0x44504543, len=24
26,467,656 >>> mbox cmd response data (40 bytes)
26,468,298 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,498,308 UART: [rt]cmd =0x44504543, len=24
26,504,872 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
192,108 UART:
192,491 UART: Running Caliptra ROM ...
193,641 UART:
193,790 UART: [state] CFI Enabled
265,248 UART: [state] LifecycleState = Unprovisioned
267,658 UART: [state] DebugLocked = No
270,177 UART: [state] WD Timer not started. Device not locked for debugging
275,554 UART: [kat] SHA2-256
465,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,213 UART: [kat] ++
476,658 UART: [kat] sha1
487,743 UART: [kat] SHA2-256
490,747 UART: [kat] SHA2-384
496,522 UART: [kat] SHA2-512-ACC
499,107 UART: [kat] ECC-384
2,948,111 UART: [kat] HMAC-384Kdf
2,971,354 UART: [kat] LMS
3,503,144 UART: [kat] --
3,506,785 UART: [cold-reset] ++
3,507,719 UART: [fht] FHT @ 0x50003400
3,519,327 UART: [idev] ++
3,520,033 UART: [idev] CDI.KEYID = 6
3,520,988 UART: [idev] SUBJECT.KEYID = 7
3,522,111 UART: [idev] UDS.KEYID = 0
3,523,095 ready_for_fw is high
3,523,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,641 UART: [idev] Erasing UDS.KEYID = 0
6,026,668 UART: [idev] Sha1 KeyId Algorithm
6,047,624 UART: [idev] --
6,052,054 UART: [ldev] ++
6,052,726 UART: [ldev] CDI.KEYID = 6
6,053,647 UART: [ldev] SUBJECT.KEYID = 5
6,054,816 UART: [ldev] AUTHORITY.KEYID = 7
6,056,070 UART: [ldev] FE.KEYID = 1
6,099,453 UART: [ldev] Erasing FE.KEYID = 1
8,604,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,114 UART: [ldev] --
10,413,756 UART: [fwproc] Wait for Commands...
10,416,494 UART: [fwproc] Recv command 0x46574c44
10,418,747 UART: [fwproc] Recv'd Img size: 114448 bytes
13,868,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,925 >>> mbox cmd response: success
14,605,816 UART: [afmc] ++
14,606,535 UART: [afmc] CDI.KEYID = 6
14,607,727 UART: [afmc] SUBJECT.KEYID = 7
14,609,215 UART: [afmc] AUTHORITY.KEYID = 5
17,149,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,255 UART: [afmc] --
18,948,636 UART: [cold-reset] --
18,953,476 UART: [state] Locking Datavault
18,957,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,116 UART: [state] Locking ICCM
18,962,538 UART: [exit] Launching FMC @ 0x40000130
18,971,209 UART:
18,971,469 UART: Running Caliptra FMC ...
18,972,570 UART:
18,972,726 UART: [state] CFI Enabled
19,031,850 UART: [fht] FMC Alias Private Key: 7
20,795,731 UART: [art] Extend RT PCRs Done
20,796,954 UART: [art] Lock RT PCRs Done
20,798,576 UART: [art] Populate DV Done
20,804,260 UART: [fht] FMC Alias Private Key: 7
20,805,904 UART: [art] Derive CDI
20,806,718 UART: [art] Store in in slot 0x4
20,865,389 UART: [art] Derive Key Pair
20,866,424 UART: [art] Store priv key in slot 0x5
23,328,902 UART: [art] Derive Key Pair - Done
23,341,838 UART: [art] Signing Cert with AUTHO
23,343,133 UART: RITY.KEYID = 7
25,054,659 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,181 UART: [art] PUB.X = BA71182E3A9F9A783FCE37F55817859A90B0DD6EB79AACB4E3F743C79BA38283A38201AE78C9001846DAF803C88054EE
25,063,420 UART: [art] PUB.Y = CBDA72340B895109F293E16D37185019C3BED699B80A358CA4EFFF3224B3D20BB3055DD84A24B27921A7250C6F5DEDD6
25,070,647 UART: [art] SIG.R = F4F6804118356D438CAF74189513EC67D13D89C7F7CFC704284784396DA51662BC0C9E0EA7B7C228685E9043EE3AEA9A
25,078,048 UART: [art] SIG.S = C8C91A8E539F5415A2BB3D534830644C5FC5A53C25822AAEA07C8A19EE9433304CBAFFB2C2F21794A96F1B5FDF26890C
26,057,309 UART: Caliptra RT
26,057,996 UART: [state] CFI Enabled
26,222,458 UART: [rt] RT listening for mailbox commands...
26,224,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,254,759 UART: [rt]cmd =0x44504543, len=24
26,297,844 >>> mbox cmd response data (40 bytes)
26,298,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,434 UART: [rt]cmd =0x44504543, len=24
26,361,427 >>> mbox cmd response data (40 bytes)
26,362,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,968 UART: [rt]cmd =0x44504543, len=24
26,425,695 >>> mbox cmd response data (40 bytes)
26,426,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,456,366 UART: [rt]cmd =0x44504543, len=24
26,489,682 >>> mbox cmd response data (40 bytes)
26,490,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,314 UART: [rt]cmd =0x44504543, len=24
26,553,596 >>> mbox cmd response data (40 bytes)
26,554,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,584,100 UART: [rt]cmd =0x44504543, len=24
26,618,024 >>> mbox cmd response data (40 bytes)
26,618,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,570 UART: [rt]cmd =0x44504543, len=24
26,681,676 >>> mbox cmd response data (40 bytes)
26,682,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,712,080 UART: [rt]cmd =0x44504543, len=24
26,745,924 >>> mbox cmd response data (40 bytes)
26,746,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,776,530 UART: [rt]cmd =0x44504543, len=24
26,809,550 >>> mbox cmd response data (40 bytes)
26,810,161 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,840,004 UART: [rt]cmd =0x44504543, len=24
26,873,720 >>> mbox cmd response data (40 bytes)
26,874,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,904,424 UART: [rt]cmd =0x44504543, len=24
26,937,648 >>> mbox cmd response data (40 bytes)
26,938,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,968,075 UART: [rt]cmd =0x44504543, len=24
27,001,604 >>> mbox cmd response data (40 bytes)
27,002,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,032,181 UART: [rt]cmd =0x44504543, len=24
27,065,479 >>> mbox cmd response data (40 bytes)
27,066,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,095,961 UART: [rt]cmd =0x44504543, len=24
27,129,967 >>> mbox cmd response data (40 bytes)
27,130,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,160,630 UART: [rt]cmd =0x44504543, len=24
27,193,738 >>> mbox cmd response data (40 bytes)
27,194,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,224,221 UART: [rt]cmd =0x44504543, len=24
27,230,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,440,361 ready_for_fw is high
3,441,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,662 >>> mbox cmd response: success
19,051,718 UART:
19,052,097 UART: Running Caliptra FMC ...
19,053,221 UART:
19,053,375 UART: [state] CFI Enabled
19,118,466 UART: [fht] FMC Alias Private Key: 7
20,882,333 UART: [art] Extend RT PCRs Done
20,883,561 UART: [art] Lock RT PCRs Done
20,885,053 UART: [art] Populate DV Done
20,890,420 UART: [fht] FMC Alias Private Key: 7
20,891,962 UART: [art] Derive CDI
20,892,781 UART: [art] Store in in slot 0x4
20,951,394 UART: [art] Derive Key Pair
20,952,439 UART: [art] Store priv key in slot 0x5
23,415,267 UART: [art] Derive Key Pair - Done
23,428,335 UART: [art] Signing Cert with AUTHO
23,429,637 UART: RITY.KEYID = 7
25,141,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,174 UART: [art] PUB.X = DD26AE34C554788D3D1DB713E123E78C4CE7C0FFE1C8513527E67E852D9D82BD13D2F22B4A3C0D41E1816AB9872525E7
25,150,420 UART: [art] PUB.Y = C7C412C1DEE93F09B5A969C05CC3CE52FD3A38022B4124FDC7A6D4B2E7FC9056ABA0790FC965A25B45005B4F3B9647D4
25,157,727 UART: [art] SIG.R = D6E5BA46917742883FC05940CD022EF40499EC9891EA7893DD4594AB04C7F596BB46FA9A16FD2BCD58DD134F7DDBF0F2
25,165,157 UART: [art] SIG.S = 036836FA8657713EC995595763D038E9899516676514E1C0F7A366BE5CD300F4922F406A292EF22BD263CF15F6AA8783
26,143,808 UART: Caliptra RT
26,144,492 UART: [state] CFI Enabled
26,309,993 UART: [rt] RT listening for mailbox commands...
26,311,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,342,402 UART: [rt]cmd =0x44504543, len=24
26,385,801 >>> mbox cmd response data (40 bytes)
26,386,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,416,627 UART: [rt]cmd =0x44504543, len=24
26,450,775 >>> mbox cmd response data (40 bytes)
26,451,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,481,145 UART: [rt]cmd =0x44504543, len=24
26,514,847 >>> mbox cmd response data (40 bytes)
26,515,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,545,253 UART: [rt]cmd =0x44504543, len=24
26,578,954 >>> mbox cmd response data (40 bytes)
26,579,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,609,496 UART: [rt]cmd =0x44504543, len=24
26,642,792 >>> mbox cmd response data (40 bytes)
26,643,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,673,084 UART: [rt]cmd =0x44504543, len=24
26,707,010 >>> mbox cmd response data (40 bytes)
26,707,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,737,671 UART: [rt]cmd =0x44504543, len=24
26,771,036 >>> mbox cmd response data (40 bytes)
26,771,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,801,575 UART: [rt]cmd =0x44504543, len=24
26,835,006 >>> mbox cmd response data (40 bytes)
26,835,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,865,647 UART: [rt]cmd =0x44504543, len=24
26,898,952 >>> mbox cmd response data (40 bytes)
26,899,569 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,929,275 UART: [rt]cmd =0x44504543, len=24
26,963,330 >>> mbox cmd response data (40 bytes)
26,963,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,993,678 UART: [rt]cmd =0x44504543, len=24
27,027,335 >>> mbox cmd response data (40 bytes)
27,027,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,057,835 UART: [rt]cmd =0x44504543, len=24
27,091,273 >>> mbox cmd response data (40 bytes)
27,091,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,121,766 UART: [rt]cmd =0x44504543, len=24
27,155,421 >>> mbox cmd response data (40 bytes)
27,156,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,185,945 UART: [rt]cmd =0x44504543, len=24
27,219,349 >>> mbox cmd response data (40 bytes)
27,219,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,249,988 UART: [rt]cmd =0x44504543, len=24
27,283,336 >>> mbox cmd response data (40 bytes)
27,283,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,313,739 UART: [rt]cmd =0x44504543, len=24
27,320,147 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,545 UART:
192,962 UART: Running Caliptra ROM ...
194,108 UART:
603,798 UART: [state] CFI Enabled
620,506 UART: [state] LifecycleState = Unprovisioned
622,817 UART: [state] DebugLocked = No
625,827 UART: [state] WD Timer not started. Device not locked for debugging
630,421 UART: [kat] SHA2-256
820,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,127 UART: [kat] ++
831,718 UART: [kat] sha1
843,561 UART: [kat] SHA2-256
846,576 UART: [kat] SHA2-384
851,504 UART: [kat] SHA2-512-ACC
854,150 UART: [kat] ECC-384
3,295,142 UART: [kat] HMAC-384Kdf
3,307,246 UART: [kat] LMS
3,839,080 UART: [kat] --
3,843,287 UART: [cold-reset] ++
3,844,565 UART: [fht] FHT @ 0x50003400
3,855,550 UART: [idev] ++
3,856,247 UART: [idev] CDI.KEYID = 6
3,857,194 UART: [idev] SUBJECT.KEYID = 7
3,858,423 UART: [idev] UDS.KEYID = 0
3,859,317 ready_for_fw is high
3,859,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,285 UART: [idev] Erasing UDS.KEYID = 0
6,334,763 UART: [idev] Sha1 KeyId Algorithm
6,356,657 UART: [idev] --
6,361,396 UART: [ldev] ++
6,362,134 UART: [ldev] CDI.KEYID = 6
6,363,038 UART: [ldev] SUBJECT.KEYID = 5
6,364,211 UART: [ldev] AUTHORITY.KEYID = 7
6,365,439 UART: [ldev] FE.KEYID = 1
6,376,241 UART: [ldev] Erasing FE.KEYID = 1
8,857,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,179 UART: [ldev] --
10,646,011 UART: [fwproc] Wait for Commands...
10,647,501 UART: [fwproc] Recv command 0x46574c44
10,649,477 UART: [fwproc] Recv'd Img size: 114448 bytes
14,104,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,010 >>> mbox cmd response: success
14,848,288 UART: [afmc] ++
14,848,995 UART: [afmc] CDI.KEYID = 6
14,850,240 UART: [afmc] SUBJECT.KEYID = 7
14,851,674 UART: [afmc] AUTHORITY.KEYID = 5
17,350,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,633 UART: [afmc] --
19,147,818 UART: [cold-reset] --
19,151,895 UART: [state] Locking Datavault
19,158,163 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,327 UART: [state] Locking ICCM
19,162,046 UART: [exit] Launching FMC @ 0x40000130
19,170,686 UART:
19,170,919 UART: Running Caliptra FMC ...
19,172,011 UART:
19,172,164 UART: [state] CFI Enabled
19,180,415 UART: [fht] FMC Alias Private Key: 7
20,937,248 UART: [art] Extend RT PCRs Done
20,938,462 UART: [art] Lock RT PCRs Done
20,940,054 UART: [art] Populate DV Done
20,945,457 UART: [fht] FMC Alias Private Key: 7
20,946,930 UART: [art] Derive CDI
20,947,657 UART: [art] Store in in slot 0x4
20,990,397 UART: [art] Derive Key Pair
20,991,384 UART: [art] Store priv key in slot 0x5
23,418,168 UART: [art] Derive Key Pair - Done
23,431,319 UART: [art] Signing Cert with AUTHO
23,432,614 UART: RITY.KEYID = 7
25,138,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,616 UART: [art] PUB.X = 7A9F6A2E2E4B8B18D23B93AD4A425B20A7FA794A93D766C50C2F384540E4C99C37F90EC4D417DD7F521BAB0D93D89BFB
25,146,893 UART: [art] PUB.Y = D230BB8DC8A6B2DBE6AB388380190C1F7A336EEDDAA4A0D2B7698FB8A852850D90B4A6DF1FC5FEF3435469AC3BD18EDC
25,154,187 UART: [art] SIG.R = 85A062A8FBF4F3C1EEE523D5CE12333E48D40DA656BC8EAFDFB1D319284DCFA844CCADB913E31A4E2A4CF51C6E17D041
25,161,633 UART: [art] SIG.S = 017EE271758B22B9E67204CBAB681A92E00C60EBA6D839E81C7F012880A0BDECF5196397CAC4AF20E34053038B4B9F02
26,140,473 UART: Caliptra RT
26,141,159 UART: [state] CFI Enabled
26,257,664 UART: [rt] RT listening for mailbox commands...
26,259,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,289,422 UART: [rt]cmd =0x44504543, len=24
26,315,692 >>> mbox cmd response data (40 bytes)
26,316,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,346,317 UART: [rt]cmd =0x44504543, len=24
26,372,395 >>> mbox cmd response data (40 bytes)
26,373,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,403,133 UART: [rt]cmd =0x44504543, len=24
26,429,497 >>> mbox cmd response data (40 bytes)
26,430,095 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,459,954 UART: [rt]cmd =0x44504543, len=24
26,486,280 >>> mbox cmd response data (40 bytes)
26,486,892 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,516,799 UART: [rt]cmd =0x44504543, len=24
26,542,693 >>> mbox cmd response data (40 bytes)
26,543,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,573,256 UART: [rt]cmd =0x44504543, len=24
26,599,439 >>> mbox cmd response data (40 bytes)
26,600,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,629,872 UART: [rt]cmd =0x44504543, len=24
26,656,213 >>> mbox cmd response data (40 bytes)
26,656,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,686,777 UART: [rt]cmd =0x44504543, len=24
26,713,586 >>> mbox cmd response data (40 bytes)
26,714,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,744,120 UART: [rt]cmd =0x44504543, len=24
26,770,370 >>> mbox cmd response data (40 bytes)
26,771,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,800,861 UART: [rt]cmd =0x44504543, len=24
26,827,094 >>> mbox cmd response data (40 bytes)
26,827,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,857,608 UART: [rt]cmd =0x44504543, len=24
26,883,773 >>> mbox cmd response data (40 bytes)
26,884,395 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,914,574 UART: [rt]cmd =0x44504543, len=24
26,940,736 >>> mbox cmd response data (40 bytes)
26,941,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,971,249 UART: [rt]cmd =0x44504543, len=24
26,997,589 >>> mbox cmd response data (40 bytes)
26,998,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,028,197 UART: [rt]cmd =0x44504543, len=24
27,054,652 >>> mbox cmd response data (40 bytes)
27,055,259 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,085,279 UART: [rt]cmd =0x44504543, len=24
27,111,493 >>> mbox cmd response data (40 bytes)
27,112,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,141,992 UART: [rt]cmd =0x44504543, len=24
27,148,437 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,752,626 ready_for_fw is high
3,753,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,849 >>> mbox cmd response: success
19,208,058 UART:
19,208,456 UART: Running Caliptra FMC ...
19,209,584 UART:
19,209,758 UART: [state] CFI Enabled
19,217,323 UART: [fht] FMC Alias Private Key: 7
20,974,341 UART: [art] Extend RT PCRs Done
20,975,569 UART: [art] Lock RT PCRs Done
20,977,109 UART: [art] Populate DV Done
20,982,683 UART: [fht] FMC Alias Private Key: 7
20,984,386 UART: [art] Derive CDI
20,985,198 UART: [art] Store in in slot 0x4
21,027,893 UART: [art] Derive Key Pair
21,029,544 UART: [art] Store priv key in slot 0x5
23,456,182 UART: [art] Derive Key Pair - Done
23,469,182 UART: [art] Signing Cert with AUTHO
23,470,481 UART: RITY.KEYID = 7
25,176,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,665 UART: [art] PUB.X = BC94A0D3F20591943DC9BC6585D6B098C63B2EC9864E934241E4B7A0394E3630B9B14DE9E10F052EB5A6544BB489EDA5
25,184,921 UART: [art] PUB.Y = C4C7D33D07C0B2E530CD1F0E506DE43ABE580CDFA6AA13B504ECD7D1BC08E3EADAACC2645F23A0241F19B84F81ACEA47
25,192,231 UART: [art] SIG.R = E7BF954581BC7E90A145C45A24083A0D6168FF2B1D01F40EC13F7936EBF221B7D7AB96EED19D39C8D72026511EEC5877
25,199,615 UART: [art] SIG.S = 2C0ADCD08D0F5058F71DD8F7C02960C1314A3FE182AE870D5E62C23B2516A504A70E19EF05E5FCEE4FDDF4AE265C716D
26,178,836 UART: Caliptra RT
26,179,514 UART: [state] CFI Enabled
26,297,158 UART: [rt] RT listening for mailbox commands...
26,299,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,868 UART: [rt]cmd =0x44504543, len=24
26,355,036 >>> mbox cmd response data (40 bytes)
26,355,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,385,544 UART: [rt]cmd =0x44504543, len=24
26,411,385 >>> mbox cmd response data (40 bytes)
26,412,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,441,861 UART: [rt]cmd =0x44504543, len=24
26,468,213 >>> mbox cmd response data (40 bytes)
26,469,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,498,843 UART: [rt]cmd =0x44504543, len=24
26,525,518 >>> mbox cmd response data (40 bytes)
26,526,143 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,555,842 UART: [rt]cmd =0x44504543, len=24
26,582,434 >>> mbox cmd response data (40 bytes)
26,583,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,612,944 UART: [rt]cmd =0x44504543, len=24
26,639,016 >>> mbox cmd response data (40 bytes)
26,639,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,669,774 UART: [rt]cmd =0x44504543, len=24
26,696,542 >>> mbox cmd response data (40 bytes)
26,697,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,726,994 UART: [rt]cmd =0x44504543, len=24
26,752,983 >>> mbox cmd response data (40 bytes)
26,753,591 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,783,539 UART: [rt]cmd =0x44504543, len=24
26,809,885 >>> mbox cmd response data (40 bytes)
26,810,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,840,450 UART: [rt]cmd =0x44504543, len=24
26,866,787 >>> mbox cmd response data (40 bytes)
26,867,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,897,450 UART: [rt]cmd =0x44504543, len=24
26,923,760 >>> mbox cmd response data (40 bytes)
26,924,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,954,437 UART: [rt]cmd =0x44504543, len=24
26,980,811 >>> mbox cmd response data (40 bytes)
26,981,414 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,011,198 UART: [rt]cmd =0x44504543, len=24
27,037,434 >>> mbox cmd response data (40 bytes)
27,038,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,068,084 UART: [rt]cmd =0x44504543, len=24
27,094,370 >>> mbox cmd response data (40 bytes)
27,094,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,125,107 UART: [rt]cmd =0x44504543, len=24
27,150,898 >>> mbox cmd response data (40 bytes)
27,151,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,181,519 UART: [rt]cmd =0x44504543, len=24
27,188,185 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,444 UART: [kat] LMS
1,475,640 UART: [kat] --
1,476,565 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,732 UART: [idev] ++
1,479,900 UART: [idev] CDI.KEYID = 6
1,480,260 UART: [idev] SUBJECT.KEYID = 7
1,480,684 UART: [idev] UDS.KEYID = 0
1,481,029 ready_for_fw is high
1,481,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,528 UART: [idev] Erasing UDS.KEYID = 0
1,504,984 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,600 UART: [idev] --
1,514,565 UART: [ldev] ++
1,514,733 UART: [ldev] CDI.KEYID = 6
1,515,096 UART: [ldev] SUBJECT.KEYID = 5
1,515,522 UART: [ldev] AUTHORITY.KEYID = 7
1,515,985 UART: [ldev] FE.KEYID = 1
1,521,255 UART: [ldev] Erasing FE.KEYID = 1
1,545,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,590 UART: [ldev] --
1,584,973 UART: [fwproc] Waiting for Commands...
1,585,684 UART: [fwproc] Received command 0x46574c44
1,586,475 UART: [fwproc] Received Image of size 114448 bytes
2,884,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,075 >>> mbox cmd response: success
3,078,099 UART: [afmc] ++
3,078,267 UART: [afmc] CDI.KEYID = 6
3,078,629 UART: [afmc] SUBJECT.KEYID = 7
3,079,054 UART: [afmc] AUTHORITY.KEYID = 5
3,114,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,999 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,507 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,392 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,082 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,771 UART: [afmc] --
3,157,709 UART: [cold-reset] --
3,158,731 UART: [state] Locking Datavault
3,159,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,192 UART: [state] Locking ICCM
3,160,766 UART: [exit] Launching FMC @ 0x40000130
3,166,095 UART:
3,166,111 UART: Running Caliptra FMC ...
3,166,519 UART:
3,166,573 UART: [state] CFI Enabled
3,177,008 UART: [fht] FMC Alias Private Key: 7
3,285,021 UART: [art] Extend RT PCRs Done
3,285,449 UART: [art] Lock RT PCRs Done
3,286,921 UART: [art] Populate DV Done
3,295,258 UART: [fht] FMC Alias Private Key: 7
3,296,282 UART: [art] Derive CDI
3,296,562 UART: [art] Store in in slot 0x4
3,382,231 UART: [art] Derive Key Pair
3,382,591 UART: [art] Store priv key in slot 0x5
3,395,649 UART: [art] Derive Key Pair - Done
3,410,176 UART: [art] Signing Cert with AUTHO
3,410,656 UART: RITY.KEYID = 7
3,426,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,961 UART: [art] PUB.X = 22ED3190FD05FB2B0B242ACAD07A94A74F8C2A2A7CF577D529F1448EFDF39EC490CEDFB5508F0286BB855BC4214E8814
3,433,738 UART: [art] PUB.Y = 03A8E198D92DEC081B4F4D081DB2BE929403006FE56B59FE3357E9E181737607F97F34B778658DFB98FAFFD1657880A7
3,440,653 UART: [art] SIG.R = D542EB1E615DFBC02A64045E074C3811FA329CB70829983F8414741E61A61F11B7F8F3414298AF384DA575EF0BCAA48A
3,447,415 UART: [art] SIG.S = 21112CAE4563614A843ED820F918634EBF263CBA24D4FCC3F9B6E432368A3E1DB8391CFF86370CE81ED3603601FB3A85
3,471,442 UART: Caliptra RT
3,471,695 UART: [state] CFI Enabled
3,578,750 UART: [rt] RT listening for mailbox commands...
3,579,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,280 UART: [rt]cmd =0x44504543, len=24
3,635,881 >>> mbox cmd response data (40 bytes)
3,635,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,207 UART: [rt]cmd =0x44504543, len=24
3,691,440 >>> mbox cmd response data (40 bytes)
3,691,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,794 UART: [rt]cmd =0x44504543, len=24
3,747,077 >>> mbox cmd response data (40 bytes)
3,747,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,785 UART: [rt]cmd =0x44504543, len=24
3,803,174 >>> mbox cmd response data (40 bytes)
3,803,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,452 UART: [rt]cmd =0x44504543, len=24
3,859,033 >>> mbox cmd response data (40 bytes)
3,859,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,387 UART: [rt]cmd =0x44504543, len=24
3,914,798 >>> mbox cmd response data (40 bytes)
3,914,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,054 UART: [rt]cmd =0x44504543, len=24
3,970,805 >>> mbox cmd response data (40 bytes)
3,970,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,151 UART: [rt]cmd =0x44504543, len=24
4,026,572 >>> mbox cmd response data (40 bytes)
4,026,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,342 UART: [rt]cmd =0x44504543, len=24
4,083,181 >>> mbox cmd response data (40 bytes)
4,083,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,619 UART: [rt]cmd =0x44504543, len=24
4,138,420 >>> mbox cmd response data (40 bytes)
4,138,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,764 UART: [rt]cmd =0x44504543, len=24
4,194,229 >>> mbox cmd response data (40 bytes)
4,194,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,901 UART: [rt]cmd =0x44504543, len=24
4,250,056 >>> mbox cmd response data (40 bytes)
4,250,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,642 UART: [rt]cmd =0x44504543, len=24
4,306,467 >>> mbox cmd response data (40 bytes)
4,306,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,959 UART: [rt]cmd =0x44504543, len=24
4,362,482 >>> mbox cmd response data (40 bytes)
4,362,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,392,060 UART: [rt]cmd =0x44504543, len=24
4,418,557 >>> mbox cmd response data (40 bytes)
4,418,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,995 UART: [rt]cmd =0x44504543, len=24
4,455,192 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,169 ready_for_fw is high
1,362,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,867 >>> mbox cmd response: success
2,991,459 UART:
2,991,475 UART: Running Caliptra FMC ...
2,991,883 UART:
2,991,937 UART: [state] CFI Enabled
3,002,816 UART: [fht] FMC Alias Private Key: 7
3,111,223 UART: [art] Extend RT PCRs Done
3,111,651 UART: [art] Lock RT PCRs Done
3,113,145 UART: [art] Populate DV Done
3,121,610 UART: [fht] FMC Alias Private Key: 7
3,122,556 UART: [art] Derive CDI
3,122,836 UART: [art] Store in in slot 0x4
3,208,531 UART: [art] Derive Key Pair
3,208,891 UART: [art] Store priv key in slot 0x5
3,221,507 UART: [art] Derive Key Pair - Done
3,236,167 UART: [art] Signing Cert with AUTHO
3,236,647 UART: RITY.KEYID = 7
3,251,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,154 UART: [art] PUB.X = 5EDBC3F7C8311B1085BC9621E1B62F600D283A8C8D723415464EA65A8D76F32D1413F10C7F87129F00DFC6C14A9BEAFC
3,258,906 UART: [art] PUB.Y = 942BC7E2146C76DA956367F16C17C8F23B758B834D0A48CFE283618FD04FD86C9B3985EC0AFE5DAF24CE683DD12C9AA9
3,265,864 UART: [art] SIG.R = 7D5FE82F0FACDE1F71B71773C38E3E6F2654FE9B5A111824342DEA3C05F1DEE6A474BD876229B9219DF9F3E77AAE8631
3,272,642 UART: [art] SIG.S = 744FFD6D62CD97BB378EBE9B482423A52DA36BA093DA7FF9FD94D077561A5BD8B0A9E060611A4A4498FB06267964D132
3,296,436 UART: Caliptra RT
3,296,689 UART: [state] CFI Enabled
3,405,203 UART: [rt] RT listening for mailbox commands...
3,405,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,123 UART: [rt]cmd =0x44504543, len=24
3,462,186 >>> mbox cmd response data (40 bytes)
3,462,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,712 UART: [rt]cmd =0x44504543, len=24
3,518,011 >>> mbox cmd response data (40 bytes)
3,518,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,437 UART: [rt]cmd =0x44504543, len=24
3,573,610 >>> mbox cmd response data (40 bytes)
3,573,611 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,603,092 UART: [rt]cmd =0x44504543, len=24
3,629,499 >>> mbox cmd response data (40 bytes)
3,629,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,963 UART: [rt]cmd =0x44504543, len=24
3,685,526 >>> mbox cmd response data (40 bytes)
3,685,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,846 UART: [rt]cmd =0x44504543, len=24
3,741,013 >>> mbox cmd response data (40 bytes)
3,741,014 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,349 UART: [rt]cmd =0x44504543, len=24
3,796,248 >>> mbox cmd response data (40 bytes)
3,796,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,828 UART: [rt]cmd =0x44504543, len=24
3,851,697 >>> mbox cmd response data (40 bytes)
3,851,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,177 UART: [rt]cmd =0x44504543, len=24
3,907,678 >>> mbox cmd response data (40 bytes)
3,907,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,974 UART: [rt]cmd =0x44504543, len=24
3,963,255 >>> mbox cmd response data (40 bytes)
3,963,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,667 UART: [rt]cmd =0x44504543, len=24
4,018,852 >>> mbox cmd response data (40 bytes)
4,018,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,442 UART: [rt]cmd =0x44504543, len=24
4,074,831 >>> mbox cmd response data (40 bytes)
4,074,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,104,397 UART: [rt]cmd =0x44504543, len=24
4,130,280 >>> mbox cmd response data (40 bytes)
4,130,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,632 UART: [rt]cmd =0x44504543, len=24
4,186,035 >>> mbox cmd response data (40 bytes)
4,186,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,215,753 UART: [rt]cmd =0x44504543, len=24
4,242,100 >>> mbox cmd response data (40 bytes)
4,242,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,746 UART: [rt]cmd =0x44504543, len=24
4,278,799 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,640 UART: [kat] SHA2-256
882,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,686 UART: [kat] ++
886,838 UART: [kat] sha1
891,192 UART: [kat] SHA2-256
893,130 UART: [kat] SHA2-384
895,919 UART: [kat] SHA2-512-ACC
897,820 UART: [kat] ECC-384
903,691 UART: [kat] HMAC-384Kdf
908,395 UART: [kat] LMS
1,476,591 UART: [kat] --
1,477,406 UART: [cold-reset] ++
1,477,782 UART: [fht] Storing FHT @ 0x50003400
1,480,563 UART: [idev] ++
1,480,731 UART: [idev] CDI.KEYID = 6
1,481,091 UART: [idev] SUBJECT.KEYID = 7
1,481,515 UART: [idev] UDS.KEYID = 0
1,481,860 ready_for_fw is high
1,481,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,375 UART: [idev] Erasing UDS.KEYID = 0
1,506,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,091 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,764 UART: [ldev] Erasing FE.KEYID = 1
1,548,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,289 UART: [ldev] --
1,587,696 UART: [fwproc] Waiting for Commands...
1,588,519 UART: [fwproc] Received command 0x46574c44
1,589,310 UART: [fwproc] Received Image of size 114448 bytes
2,888,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,462 >>> mbox cmd response: success
3,081,566 UART: [afmc] ++
3,081,734 UART: [afmc] CDI.KEYID = 6
3,082,096 UART: [afmc] SUBJECT.KEYID = 7
3,082,521 UART: [afmc] AUTHORITY.KEYID = 5
3,117,708 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,547 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,237 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,226 UART: [afmc] --
3,161,170 UART: [cold-reset] --
3,162,136 UART: [state] Locking Datavault
3,163,635 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,239 UART: [state] Locking ICCM
3,164,905 UART: [exit] Launching FMC @ 0x40000130
3,170,234 UART:
3,170,250 UART: Running Caliptra FMC ...
3,170,658 UART:
3,170,801 UART: [state] CFI Enabled
3,181,970 UART: [fht] FMC Alias Private Key: 7
3,290,217 UART: [art] Extend RT PCRs Done
3,290,645 UART: [art] Lock RT PCRs Done
3,291,679 UART: [art] Populate DV Done
3,299,582 UART: [fht] FMC Alias Private Key: 7
3,300,602 UART: [art] Derive CDI
3,300,882 UART: [art] Store in in slot 0x4
3,386,493 UART: [art] Derive Key Pair
3,386,853 UART: [art] Store priv key in slot 0x5
3,399,651 UART: [art] Derive Key Pair - Done
3,413,947 UART: [art] Signing Cert with AUTHO
3,414,427 UART: RITY.KEYID = 7
3,429,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,536 UART: [art] PUB.X = D4CFFD0BDFB0356607DDE8986FD95CF64A54BF46615F6F4D54816CAAC5E65A5912D911E589D249C638F856915711751E
3,437,306 UART: [art] PUB.Y = ADEE78DECF36F954C9D661F684CB2026599AB26F660ECB5EE5C4D1CA5E21F880471E578640774C922B582B33464F0B5B
3,444,258 UART: [art] SIG.R = B3D7AC8D857A9A5C7AC5A145DD6258720BE5845019DC816003C777EE8B2360BC3D532474583A9F1D43D659675A2A0F87
3,451,019 UART: [art] SIG.S = A6BB14E6B442348EE0C05CE3DF6FFE2FC68257A795DE54F2D8C9F66A3EC0AC182DC7BC0C0429E9CA122DA57A04A959B3
3,474,577 UART: Caliptra RT
3,474,922 UART: [state] CFI Enabled
3,583,008 UART: [rt] RT listening for mailbox commands...
3,583,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,340 UART: [rt]cmd =0x44504543, len=24
3,639,763 >>> mbox cmd response data (40 bytes)
3,639,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,159 UART: [rt]cmd =0x44504543, len=24
3,695,808 >>> mbox cmd response data (40 bytes)
3,695,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,725,246 UART: [rt]cmd =0x44504543, len=24
3,751,811 >>> mbox cmd response data (40 bytes)
3,751,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,345 UART: [rt]cmd =0x44504543, len=24
3,807,646 >>> mbox cmd response data (40 bytes)
3,807,647 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,912 UART: [rt]cmd =0x44504543, len=24
3,862,909 >>> mbox cmd response data (40 bytes)
3,862,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,359 UART: [rt]cmd =0x44504543, len=24
3,919,138 >>> mbox cmd response data (40 bytes)
3,919,139 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,878 UART: [rt]cmd =0x44504543, len=24
3,975,227 >>> mbox cmd response data (40 bytes)
3,975,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,443 UART: [rt]cmd =0x44504543, len=24
4,030,728 >>> mbox cmd response data (40 bytes)
4,030,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,060,434 UART: [rt]cmd =0x44504543, len=24
4,086,705 >>> mbox cmd response data (40 bytes)
4,086,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,116,251 UART: [rt]cmd =0x44504543, len=24
4,143,108 >>> mbox cmd response data (40 bytes)
4,143,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,172,710 UART: [rt]cmd =0x44504543, len=24
4,199,143 >>> mbox cmd response data (40 bytes)
4,199,144 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,609 UART: [rt]cmd =0x44504543, len=24
4,254,964 >>> mbox cmd response data (40 bytes)
4,254,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,284,542 UART: [rt]cmd =0x44504543, len=24
4,310,811 >>> mbox cmd response data (40 bytes)
4,310,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,340,473 UART: [rt]cmd =0x44504543, len=24
4,366,612 >>> mbox cmd response data (40 bytes)
4,366,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,396,188 UART: [rt]cmd =0x44504543, len=24
4,422,635 >>> mbox cmd response data (40 bytes)
4,422,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,179 UART: [rt]cmd =0x44504543, len=24
4,459,648 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,222 ready_for_fw is high
1,362,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,384 >>> mbox cmd response: success
2,988,162 UART:
2,988,178 UART: Running Caliptra FMC ...
2,988,586 UART:
2,988,729 UART: [state] CFI Enabled
2,999,192 UART: [fht] FMC Alias Private Key: 7
3,107,035 UART: [art] Extend RT PCRs Done
3,107,463 UART: [art] Lock RT PCRs Done
3,108,667 UART: [art] Populate DV Done
3,116,720 UART: [fht] FMC Alias Private Key: 7
3,117,760 UART: [art] Derive CDI
3,118,040 UART: [art] Store in in slot 0x4
3,203,321 UART: [art] Derive Key Pair
3,203,681 UART: [art] Store priv key in slot 0x5
3,216,803 UART: [art] Derive Key Pair - Done
3,231,565 UART: [art] Signing Cert with AUTHO
3,232,045 UART: RITY.KEYID = 7
3,247,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,378 UART: [art] PUB.X = 5FFE172B3D43C6607BC3AF080970E60D989CFD7431393846BC267B7A0ECAAD0E6ADCA3B8472E9556CF8491976FD7AFE3
3,255,147 UART: [art] PUB.Y = 71835F58B2A36A4579C4A654C7FFF3FE1487303146B753EAAA69B35A9C20D1BE079170781C7040C6697A6A0AC9E13029
3,262,089 UART: [art] SIG.R = 0C1F3FB09643368D4EF183DC0CDCDA40A5365CAB966F4E518D691714A0A14845CCBF9E337AE5B642CAAB7E75D3057988
3,268,862 UART: [art] SIG.S = A140073AFC2A102598B721485198EBFE252BB90237B5C6299EFDEDE3174AEA5C0DF96A0FBD8F6F10B0A9AC45375CC734
3,292,703 UART: Caliptra RT
3,293,048 UART: [state] CFI Enabled
3,401,819 UART: [rt] RT listening for mailbox commands...
3,402,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,239 UART: [rt]cmd =0x44504543, len=24
3,458,296 >>> mbox cmd response data (40 bytes)
3,458,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,858 UART: [rt]cmd =0x44504543, len=24
3,513,627 >>> mbox cmd response data (40 bytes)
3,513,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,951 UART: [rt]cmd =0x44504543, len=24
3,568,926 >>> mbox cmd response data (40 bytes)
3,568,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,192 UART: [rt]cmd =0x44504543, len=24
3,624,159 >>> mbox cmd response data (40 bytes)
3,624,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,737 UART: [rt]cmd =0x44504543, len=24
3,680,014 >>> mbox cmd response data (40 bytes)
3,680,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,418 UART: [rt]cmd =0x44504543, len=24
3,736,341 >>> mbox cmd response data (40 bytes)
3,736,342 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,851 UART: [rt]cmd =0x44504543, len=24
3,792,220 >>> mbox cmd response data (40 bytes)
3,792,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,752 UART: [rt]cmd =0x44504543, len=24
3,847,455 >>> mbox cmd response data (40 bytes)
3,847,456 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,025 UART: [rt]cmd =0x44504543, len=24
3,903,058 >>> mbox cmd response data (40 bytes)
3,903,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,504 UART: [rt]cmd =0x44504543, len=24
3,958,663 >>> mbox cmd response data (40 bytes)
3,958,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,211 UART: [rt]cmd =0x44504543, len=24
4,014,496 >>> mbox cmd response data (40 bytes)
4,014,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,850 UART: [rt]cmd =0x44504543, len=24
4,070,231 >>> mbox cmd response data (40 bytes)
4,070,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,099,693 UART: [rt]cmd =0x44504543, len=24
4,125,998 >>> mbox cmd response data (40 bytes)
4,125,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,440 UART: [rt]cmd =0x44504543, len=24
4,182,275 >>> mbox cmd response data (40 bytes)
4,182,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,211,807 UART: [rt]cmd =0x44504543, len=24
4,238,234 >>> mbox cmd response data (40 bytes)
4,238,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,574 UART: [rt]cmd =0x44504543, len=24
4,274,655 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,425 UART: [kat] SHA2-256
903,365 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
917,424 UART: [kat] HMAC-384Kdf
922,130 UART: [kat] LMS
1,170,458 UART: [kat] --
1,171,311 UART: [cold-reset] ++
1,171,695 UART: [fht] FHT @ 0x50003400
1,174,260 UART: [idev] ++
1,174,428 UART: [idev] CDI.KEYID = 6
1,174,788 UART: [idev] SUBJECT.KEYID = 7
1,175,212 UART: [idev] UDS.KEYID = 0
1,175,557 ready_for_fw is high
1,175,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,475 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,640 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,827 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,478 >>> mbox cmd response: success
2,775,524 UART: [afmc] ++
2,775,692 UART: [afmc] CDI.KEYID = 6
2,776,054 UART: [afmc] SUBJECT.KEYID = 7
2,776,479 UART: [afmc] AUTHORITY.KEYID = 5
2,812,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,639 UART: [afmc] --
2,855,537 UART: [cold-reset] --
2,856,317 UART: [state] Locking Datavault
2,857,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,992 UART: [state] Locking ICCM
2,858,604 UART: [exit] Launching FMC @ 0x40000130
2,863,933 UART:
2,863,949 UART: Running Caliptra FMC ...
2,864,357 UART:
2,864,411 UART: [state] CFI Enabled
2,874,710 UART: [fht] FMC Alias Private Key: 7
2,983,119 UART: [art] Extend RT PCRs Done
2,983,547 UART: [art] Lock RT PCRs Done
2,985,281 UART: [art] Populate DV Done
2,993,576 UART: [fht] FMC Alias Private Key: 7
2,994,574 UART: [art] Derive CDI
2,994,854 UART: [art] Store in in slot 0x4
3,080,281 UART: [art] Derive Key Pair
3,080,641 UART: [art] Store priv key in slot 0x5
3,093,409 UART: [art] Derive Key Pair - Done
3,108,042 UART: [art] Signing Cert with AUTHO
3,108,522 UART: RITY.KEYID = 7
3,123,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,129 UART: [art] PUB.X = C922BF8FEA51C455ADC0B8F5B97CDC740FD5B70D5D6ADD07F7A1FEAD6BABC4F432EB963E029D52A4FEC9DF9BFE7F7085
3,130,923 UART: [art] PUB.Y = CE3B20123521E8E35B55165CCFB70F80A911DEB3B2C338F74BBE70D15FFF506265368AE356B676DC91EE611F42ACBB38
3,137,882 UART: [art] SIG.R = 1A8A2832ADA5D10CBF12F33C6953A9A9B3FCAEE0831A1F52EBA46D4C0B26E2BA588D110F37B6E00E265A0107F8BF4B1E
3,144,654 UART: [art] SIG.S = ABFD54188ED5C23ECC7C55DCE1C7F5E335C3AA0B7B7CFF9F2770AF120280C7065C260AC61EE1351DA98E6A6C870C98E9
3,168,492 UART: Caliptra RT
3,168,745 UART: [state] CFI Enabled
3,276,298 UART: [rt] RT listening for mailbox commands...
3,276,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,842 UART: [rt]cmd =0x44504543, len=24
3,332,755 >>> mbox cmd response data (40 bytes)
3,332,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,329 UART: [rt]cmd =0x44504543, len=24
3,388,586 >>> mbox cmd response data (40 bytes)
3,388,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,164 UART: [rt]cmd =0x44504543, len=24
3,444,709 >>> mbox cmd response data (40 bytes)
3,444,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,497 UART: [rt]cmd =0x44504543, len=24
3,500,794 >>> mbox cmd response data (40 bytes)
3,500,795 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,360 UART: [rt]cmd =0x44504543, len=24
3,556,711 >>> mbox cmd response data (40 bytes)
3,556,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,191 UART: [rt]cmd =0x44504543, len=24
3,612,638 >>> mbox cmd response data (40 bytes)
3,612,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,112 UART: [rt]cmd =0x44504543, len=24
3,667,701 >>> mbox cmd response data (40 bytes)
3,667,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,077 UART: [rt]cmd =0x44504543, len=24
3,723,408 >>> mbox cmd response data (40 bytes)
3,723,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,878 UART: [rt]cmd =0x44504543, len=24
3,779,295 >>> mbox cmd response data (40 bytes)
3,779,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,509 UART: [rt]cmd =0x44504543, len=24
3,834,714 >>> mbox cmd response data (40 bytes)
3,834,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,400 UART: [rt]cmd =0x44504543, len=24
3,890,757 >>> mbox cmd response data (40 bytes)
3,890,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,339 UART: [rt]cmd =0x44504543, len=24
3,946,452 >>> mbox cmd response data (40 bytes)
3,946,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,860 UART: [rt]cmd =0x44504543, len=24
4,002,189 >>> mbox cmd response data (40 bytes)
4,002,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,565 UART: [rt]cmd =0x44504543, len=24
4,057,938 >>> mbox cmd response data (40 bytes)
4,057,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,470 UART: [rt]cmd =0x44504543, len=24
4,113,459 >>> mbox cmd response data (40 bytes)
4,113,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,839 UART: [rt]cmd =0x44504543, len=24
4,150,156 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 ready_for_fw is high
1,059,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,731 >>> mbox cmd response: success
2,691,495 UART:
2,691,511 UART: Running Caliptra FMC ...
2,691,919 UART:
2,691,973 UART: [state] CFI Enabled
2,702,738 UART: [fht] FMC Alias Private Key: 7
2,810,545 UART: [art] Extend RT PCRs Done
2,810,973 UART: [art] Lock RT PCRs Done
2,812,561 UART: [art] Populate DV Done
2,820,718 UART: [fht] FMC Alias Private Key: 7
2,821,692 UART: [art] Derive CDI
2,821,972 UART: [art] Store in in slot 0x4
2,907,321 UART: [art] Derive Key Pair
2,907,681 UART: [art] Store priv key in slot 0x5
2,921,061 UART: [art] Derive Key Pair - Done
2,935,966 UART: [art] Signing Cert with AUTHO
2,936,446 UART: RITY.KEYID = 7
2,952,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,817 UART: [art] PUB.X = 200E1D16D4781B58A79072DFAD8A52DB6B85562AFDEBE0658200FAE1AB022C31374BFD67CEC9C92C11D4EA8D15A49CA9
2,959,577 UART: [art] PUB.Y = 40820164803326F4A0FE097F1B872C98BD4848F34438CB157B04C47560A3398880FB9D9CA971B5C5984BA194F16DDE1A
2,966,514 UART: [art] SIG.R = ED846D0925E882F5F1EE8986C44FEB244C6AB25094D535A2B6593B0751E4420A31F90D41A39940D48A81C4632507BD90
2,973,265 UART: [art] SIG.S = 3856700540B525644784DA4B14ECDDC7FA417202D23D7AE2C9C3A69F77201ABCEBD1F81398E8D1EE31C2D280A027598F
2,996,600 UART: Caliptra RT
2,996,853 UART: [state] CFI Enabled
3,104,668 UART: [rt] RT listening for mailbox commands...
3,105,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,712 UART: [rt]cmd =0x44504543, len=24
3,161,799 >>> mbox cmd response data (40 bytes)
3,161,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,341 UART: [rt]cmd =0x44504543, len=24
3,217,178 >>> mbox cmd response data (40 bytes)
3,217,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,798 UART: [rt]cmd =0x44504543, len=24
3,273,165 >>> mbox cmd response data (40 bytes)
3,273,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,749 UART: [rt]cmd =0x44504543, len=24
3,328,986 >>> mbox cmd response data (40 bytes)
3,328,987 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,568 UART: [rt]cmd =0x44504543, len=24
3,384,685 >>> mbox cmd response data (40 bytes)
3,384,686 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,989 UART: [rt]cmd =0x44504543, len=24
3,440,622 >>> mbox cmd response data (40 bytes)
3,440,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,910 UART: [rt]cmd =0x44504543, len=24
3,496,173 >>> mbox cmd response data (40 bytes)
3,496,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,485 UART: [rt]cmd =0x44504543, len=24
3,552,216 >>> mbox cmd response data (40 bytes)
3,552,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,734 UART: [rt]cmd =0x44504543, len=24
3,607,735 >>> mbox cmd response data (40 bytes)
3,607,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,433 UART: [rt]cmd =0x44504543, len=24
3,663,766 >>> mbox cmd response data (40 bytes)
3,663,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,462 UART: [rt]cmd =0x44504543, len=24
3,719,909 >>> mbox cmd response data (40 bytes)
3,719,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,421 UART: [rt]cmd =0x44504543, len=24
3,775,748 >>> mbox cmd response data (40 bytes)
3,775,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,090 UART: [rt]cmd =0x44504543, len=24
3,831,207 >>> mbox cmd response data (40 bytes)
3,831,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,871 UART: [rt]cmd =0x44504543, len=24
3,887,198 >>> mbox cmd response data (40 bytes)
3,887,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,708 UART: [rt]cmd =0x44504543, len=24
3,943,445 >>> mbox cmd response data (40 bytes)
3,943,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,811 UART: [rt]cmd =0x44504543, len=24
3,980,244 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,639 UART: [kat] SHA2-512-ACC
908,540 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,327 UART: [kat] LMS
1,171,655 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,539 UART: [idev] ++
1,175,707 UART: [idev] CDI.KEYID = 6
1,176,067 UART: [idev] SUBJECT.KEYID = 7
1,176,491 UART: [idev] UDS.KEYID = 0
1,176,836 ready_for_fw is high
1,176,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,210,150 UART: [idev] --
1,211,320 UART: [ldev] ++
1,211,488 UART: [ldev] CDI.KEYID = 6
1,211,851 UART: [ldev] SUBJECT.KEYID = 5
1,212,277 UART: [ldev] AUTHORITY.KEYID = 7
1,212,740 UART: [ldev] FE.KEYID = 1
1,217,820 UART: [ldev] Erasing FE.KEYID = 1
1,243,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,914 UART: [ldev] --
1,283,355 UART: [fwproc] Wait for Commands...
1,284,147 UART: [fwproc] Recv command 0x46574c44
1,284,875 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,943 >>> mbox cmd response: success
2,777,969 UART: [afmc] ++
2,778,137 UART: [afmc] CDI.KEYID = 6
2,778,499 UART: [afmc] SUBJECT.KEYID = 7
2,778,924 UART: [afmc] AUTHORITY.KEYID = 5
2,815,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,864 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,688 UART: [afmc] --
2,858,636 UART: [cold-reset] --
2,859,440 UART: [state] Locking Datavault
2,860,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,851 UART: [state] Locking ICCM
2,861,375 UART: [exit] Launching FMC @ 0x40000130
2,866,704 UART:
2,866,720 UART: Running Caliptra FMC ...
2,867,128 UART:
2,867,271 UART: [state] CFI Enabled
2,878,354 UART: [fht] FMC Alias Private Key: 7
2,985,783 UART: [art] Extend RT PCRs Done
2,986,211 UART: [art] Lock RT PCRs Done
2,987,577 UART: [art] Populate DV Done
2,995,906 UART: [fht] FMC Alias Private Key: 7
2,996,952 UART: [art] Derive CDI
2,997,232 UART: [art] Store in in slot 0x4
3,082,427 UART: [art] Derive Key Pair
3,082,787 UART: [art] Store priv key in slot 0x5
3,096,489 UART: [art] Derive Key Pair - Done
3,111,326 UART: [art] Signing Cert with AUTHO
3,111,806 UART: RITY.KEYID = 7
3,126,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,647 UART: [art] PUB.X = AB179A3452A4E51B98DDB748AAB83F9186B16071D419162B6DBB7C7193841D7B463868642A6436FC5B6F53E62600302D
3,134,391 UART: [art] PUB.Y = 4CA21D1A8A7EA40BB6844604967B439E4F6F739D0F8BE3E2A7385D7AC086BDF3BE22510B928FC1E5D6329F13E50AE6C7
3,141,338 UART: [art] SIG.R = 0D9A1AD3D4D2CF937B32DA66B3B0CD153F06BF6AB3CA4CA658C018BE6B4294BF136DD21D54F7AC6A99E3C58FF6271D26
3,148,124 UART: [art] SIG.S = 0C9626B2779815F3E92CAA55F79926994982EC54917656F240A7DDCE07C8756C42C4C90C8B0C76B03E735BDEBA5600BA
3,171,335 UART: Caliptra RT
3,171,680 UART: [state] CFI Enabled
3,279,333 UART: [rt] RT listening for mailbox commands...
3,280,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,009 UART: [rt]cmd =0x44504543, len=24
3,336,676 >>> mbox cmd response data (40 bytes)
3,336,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,928 UART: [rt]cmd =0x44504543, len=24
3,392,075 >>> mbox cmd response data (40 bytes)
3,392,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,421,507 UART: [rt]cmd =0x44504543, len=24
3,447,230 >>> mbox cmd response data (40 bytes)
3,447,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,998 UART: [rt]cmd =0x44504543, len=24
3,502,885 >>> mbox cmd response data (40 bytes)
3,502,886 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,485 UART: [rt]cmd =0x44504543, len=24
3,558,194 >>> mbox cmd response data (40 bytes)
3,558,195 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,740 UART: [rt]cmd =0x44504543, len=24
3,614,147 >>> mbox cmd response data (40 bytes)
3,614,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,623 UART: [rt]cmd =0x44504543, len=24
3,670,204 >>> mbox cmd response data (40 bytes)
3,670,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,642 UART: [rt]cmd =0x44504543, len=24
3,726,197 >>> mbox cmd response data (40 bytes)
3,726,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,595 UART: [rt]cmd =0x44504543, len=24
3,782,198 >>> mbox cmd response data (40 bytes)
3,782,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,592 UART: [rt]cmd =0x44504543, len=24
3,838,445 >>> mbox cmd response data (40 bytes)
3,838,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,757 UART: [rt]cmd =0x44504543, len=24
3,893,592 >>> mbox cmd response data (40 bytes)
3,893,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,170 UART: [rt]cmd =0x44504543, len=24
3,949,629 >>> mbox cmd response data (40 bytes)
3,949,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,041 UART: [rt]cmd =0x44504543, len=24
4,005,566 >>> mbox cmd response data (40 bytes)
4,005,567 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,035,144 UART: [rt]cmd =0x44504543, len=24
4,061,839 >>> mbox cmd response data (40 bytes)
4,061,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,247 UART: [rt]cmd =0x44504543, len=24
4,117,648 >>> mbox cmd response data (40 bytes)
4,117,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,974 UART: [rt]cmd =0x44504543, len=24
4,154,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,308 ready_for_fw is high
1,060,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,338 >>> mbox cmd response: success
2,690,430 UART:
2,690,446 UART: Running Caliptra FMC ...
2,690,854 UART:
2,690,997 UART: [state] CFI Enabled
2,701,794 UART: [fht] FMC Alias Private Key: 7
2,809,653 UART: [art] Extend RT PCRs Done
2,810,081 UART: [art] Lock RT PCRs Done
2,811,803 UART: [art] Populate DV Done
2,819,886 UART: [fht] FMC Alias Private Key: 7
2,820,884 UART: [art] Derive CDI
2,821,164 UART: [art] Store in in slot 0x4
2,906,963 UART: [art] Derive Key Pair
2,907,323 UART: [art] Store priv key in slot 0x5
2,920,419 UART: [art] Derive Key Pair - Done
2,935,292 UART: [art] Signing Cert with AUTHO
2,935,772 UART: RITY.KEYID = 7
2,950,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,645 UART: [art] PUB.X = 16B7A288FA4FC933996529BD7C0F8739C378069DFFF010CD752B482242053C0253A81EF9B0E997A60A0F7C140539DABA
2,958,396 UART: [art] PUB.Y = 2F160D8B5BFBCAB827562790DE227CC34383210E41171A8C6E56957F37821AA7C40DE78DF276BC15F36EBA8E1F02FFC0
2,965,344 UART: [art] SIG.R = BC28D81E21E54835EA048418EFD953F9AE2E726FE5061F0E4473C1A025CF57CCD2ABFE89BCE05EA927E133767C4749F7
2,972,117 UART: [art] SIG.S = E4C28D694A819D755C67EE2B1F70D898597E9BCB12E3748D7E67DDF2D4BB62848D82708903DE4A8D6C44D09390D6FAC8
2,995,947 UART: Caliptra RT
2,996,292 UART: [state] CFI Enabled
3,104,378 UART: [rt] RT listening for mailbox commands...
3,105,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,308 UART: [rt]cmd =0x44504543, len=24
3,161,533 >>> mbox cmd response data (40 bytes)
3,161,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,041 UART: [rt]cmd =0x44504543, len=24
3,217,412 >>> mbox cmd response data (40 bytes)
3,217,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,822 UART: [rt]cmd =0x44504543, len=24
3,273,171 >>> mbox cmd response data (40 bytes)
3,273,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,915 UART: [rt]cmd =0x44504543, len=24
3,329,224 >>> mbox cmd response data (40 bytes)
3,329,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,670 UART: [rt]cmd =0x44504543, len=24
3,385,097 >>> mbox cmd response data (40 bytes)
3,385,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,767 UART: [rt]cmd =0x44504543, len=24
3,440,752 >>> mbox cmd response data (40 bytes)
3,440,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,556 UART: [rt]cmd =0x44504543, len=24
3,496,861 >>> mbox cmd response data (40 bytes)
3,496,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,019 UART: [rt]cmd =0x44504543, len=24
3,552,306 >>> mbox cmd response data (40 bytes)
3,552,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,908 UART: [rt]cmd =0x44504543, len=24
3,608,043 >>> mbox cmd response data (40 bytes)
3,608,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,493 UART: [rt]cmd =0x44504543, len=24
3,663,524 >>> mbox cmd response data (40 bytes)
3,663,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,252 UART: [rt]cmd =0x44504543, len=24
3,719,613 >>> mbox cmd response data (40 bytes)
3,719,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,275 UART: [rt]cmd =0x44504543, len=24
3,775,362 >>> mbox cmd response data (40 bytes)
3,775,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,826 UART: [rt]cmd =0x44504543, len=24
3,831,159 >>> mbox cmd response data (40 bytes)
3,831,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,453 UART: [rt]cmd =0x44504543, len=24
3,886,900 >>> mbox cmd response data (40 bytes)
3,886,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,482 UART: [rt]cmd =0x44504543, len=24
3,942,955 >>> mbox cmd response data (40 bytes)
3,942,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,503 UART: [rt]cmd =0x44504543, len=24
3,979,592 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,174,243 ready_for_fw is high
1,174,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,926 UART: [ldev] ++
1,209,094 UART: [ldev] CDI.KEYID = 6
1,209,458 UART: [ldev] SUBJECT.KEYID = 5
1,209,885 UART: [ldev] AUTHORITY.KEYID = 7
1,210,348 UART: [ldev] FE.KEYID = 1
1,215,446 UART: [ldev] Erasing FE.KEYID = 1
1,241,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,349 UART: [fwproc] Recv command 0x46574c44
1,282,082 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,308 >>> mbox cmd response: success
2,774,577 UART: [afmc] ++
2,774,745 UART: [afmc] CDI.KEYID = 6
2,775,108 UART: [afmc] SUBJECT.KEYID = 7
2,775,534 UART: [afmc] AUTHORITY.KEYID = 5
2,811,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,875 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,648 UART: [afmc] --
2,854,696 UART: [cold-reset] --
2,855,586 UART: [state] Locking Datavault
2,856,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,313 UART: [state] Locking ICCM
2,857,809 UART: [exit] Launching FMC @ 0x40000130
2,863,138 UART:
2,863,154 UART: Running Caliptra FMC ...
2,863,562 UART:
2,863,616 UART: [state] CFI Enabled
2,874,045 UART: [fht] FMC Alias Private Key: 7
2,981,774 UART: [art] Extend RT PCRs Done
2,982,202 UART: [art] Lock RT PCRs Done
2,983,720 UART: [art] Populate DV Done
2,991,909 UART: [fht] FMC Alias Private Key: 7
2,993,007 UART: [art] Derive CDI
2,993,287 UART: [art] Store in in slot 0x4
3,079,024 UART: [art] Derive Key Pair
3,079,384 UART: [art] Store priv key in slot 0x5
3,092,072 UART: [art] Derive Key Pair - Done
3,106,823 UART: [art] Signing Cert with AUTHO
3,107,303 UART: RITY.KEYID = 7
3,122,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,780 UART: [art] PUB.X = ED0440F64DCEC6335A9BF0FEFD0A4A74EDD00A83BADA828170D65291DDB33FC97CEB443C3BEDCA2F50DFE3653449D01B
3,129,569 UART: [art] PUB.Y = 99B23E701E7D69974EF7F178A55D7EAF4E8FBA51A028EEA88F063E8EC73BEDB0050A47C4074464D9808AC7150DE86D86
3,136,514 UART: [art] SIG.R = 210529D3B11AA97720EC266C21D80F3CF59C4E5A28603291E5C154E57BA27F77053AE4930551A13323A3CAB78DF1BD75
3,143,272 UART: [art] SIG.S = 43BA5D94A93FF996F36F06C26DF167CEBD552E533E8212E544C20B6A9AF35BEECA76377914561E579E50CF0EA413F390
3,167,322 UART: Caliptra RT
3,167,575 UART: [state] CFI Enabled
3,276,220 UART: [rt] RT listening for mailbox commands...
3,276,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,106 UART: [rt]cmd =0x44504543, len=24
3,333,393 >>> mbox cmd response data (40 bytes)
3,333,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,801 UART: [rt]cmd =0x44504543, len=24
3,389,374 >>> mbox cmd response data (40 bytes)
3,389,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,862 UART: [rt]cmd =0x44504543, len=24
3,444,687 >>> mbox cmd response data (40 bytes)
3,444,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,233 UART: [rt]cmd =0x44504543, len=24
3,500,224 >>> mbox cmd response data (40 bytes)
3,500,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,750 UART: [rt]cmd =0x44504543, len=24
3,556,247 >>> mbox cmd response data (40 bytes)
3,556,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,651 UART: [rt]cmd =0x44504543, len=24
3,611,458 >>> mbox cmd response data (40 bytes)
3,611,459 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,228 UART: [rt]cmd =0x44504543, len=24
3,667,109 >>> mbox cmd response data (40 bytes)
3,667,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,789 UART: [rt]cmd =0x44504543, len=24
3,723,218 >>> mbox cmd response data (40 bytes)
3,723,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,940 UART: [rt]cmd =0x44504543, len=24
3,779,133 >>> mbox cmd response data (40 bytes)
3,779,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,861 UART: [rt]cmd =0x44504543, len=24
3,835,124 >>> mbox cmd response data (40 bytes)
3,835,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,526 UART: [rt]cmd =0x44504543, len=24
3,890,389 >>> mbox cmd response data (40 bytes)
3,890,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,783 UART: [rt]cmd =0x44504543, len=24
3,945,642 >>> mbox cmd response data (40 bytes)
3,945,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,462 UART: [rt]cmd =0x44504543, len=24
4,001,787 >>> mbox cmd response data (40 bytes)
4,001,788 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,165 UART: [rt]cmd =0x44504543, len=24
4,057,390 >>> mbox cmd response data (40 bytes)
4,057,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,054 UART: [rt]cmd =0x44504543, len=24
4,113,229 >>> mbox cmd response data (40 bytes)
4,113,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,665 UART: [rt]cmd =0x44504543, len=24
4,149,864 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,434 ready_for_fw is high
1,055,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,486 >>> mbox cmd response: success
2,685,314 UART:
2,685,330 UART: Running Caliptra FMC ...
2,685,738 UART:
2,685,792 UART: [state] CFI Enabled
2,696,389 UART: [fht] FMC Alias Private Key: 7
2,804,034 UART: [art] Extend RT PCRs Done
2,804,462 UART: [art] Lock RT PCRs Done
2,806,306 UART: [art] Populate DV Done
2,814,635 UART: [fht] FMC Alias Private Key: 7
2,815,665 UART: [art] Derive CDI
2,815,945 UART: [art] Store in in slot 0x4
2,901,666 UART: [art] Derive Key Pair
2,902,026 UART: [art] Store priv key in slot 0x5
2,915,136 UART: [art] Derive Key Pair - Done
2,930,043 UART: [art] Signing Cert with AUTHO
2,930,523 UART: RITY.KEYID = 7
2,945,705 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,470 UART: [art] PUB.X = 9C34B3D22C57F04E9731351C1932ABE49CBEA2C939E39B49D2DA7B1781E312D5AFA0DA6C64744957094D3328967BFF34
2,953,241 UART: [art] PUB.Y = E4A78E6FA9B3496EA8D5237142D1B1DF7D07E552791B1D305A9F0F851E480140B67D6C536690291623AD048CDB6A3252
2,960,177 UART: [art] SIG.R = AD8CAC800D492D7D012298321A179AA8DB6A59A1060CDD001E02DD8B3F021CD9A142D1F3C22B729D20D1E551F8ECE96B
2,966,921 UART: [art] SIG.S = 2A2C1490F254BAB9268FF79777FB45CD450477BE72CC8A5A055D0E731C62E89DC8A391ABF739721CF7B80347B0716FB4
2,989,870 UART: Caliptra RT
2,990,123 UART: [state] CFI Enabled
3,097,756 UART: [rt] RT listening for mailbox commands...
3,098,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,572 UART: [rt]cmd =0x44504543, len=24
3,155,019 >>> mbox cmd response data (40 bytes)
3,155,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,517 UART: [rt]cmd =0x44504543, len=24
3,210,748 >>> mbox cmd response data (40 bytes)
3,210,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,240,220 UART: [rt]cmd =0x44504543, len=24
3,266,087 >>> mbox cmd response data (40 bytes)
3,266,088 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,625 UART: [rt]cmd =0x44504543, len=24
3,321,956 >>> mbox cmd response data (40 bytes)
3,321,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,232 UART: [rt]cmd =0x44504543, len=24
3,377,539 >>> mbox cmd response data (40 bytes)
3,377,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,047 UART: [rt]cmd =0x44504543, len=24
3,433,502 >>> mbox cmd response data (40 bytes)
3,433,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,138 UART: [rt]cmd =0x44504543, len=24
3,489,267 >>> mbox cmd response data (40 bytes)
3,489,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,655 UART: [rt]cmd =0x44504543, len=24
3,545,098 >>> mbox cmd response data (40 bytes)
3,545,099 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,254 UART: [rt]cmd =0x44504543, len=24
3,599,953 >>> mbox cmd response data (40 bytes)
3,599,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,369 UART: [rt]cmd =0x44504543, len=24
3,655,754 >>> mbox cmd response data (40 bytes)
3,655,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,338 UART: [rt]cmd =0x44504543, len=24
3,711,811 >>> mbox cmd response data (40 bytes)
3,711,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,223 UART: [rt]cmd =0x44504543, len=24
3,767,442 >>> mbox cmd response data (40 bytes)
3,767,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,926 UART: [rt]cmd =0x44504543, len=24
3,822,553 >>> mbox cmd response data (40 bytes)
3,822,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,851,949 UART: [rt]cmd =0x44504543, len=24
3,878,680 >>> mbox cmd response data (40 bytes)
3,878,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,228 UART: [rt]cmd =0x44504543, len=24
3,934,681 >>> mbox cmd response data (40 bytes)
3,934,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,981 UART: [rt]cmd =0x44504543, len=24
3,971,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
891,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
915,463 UART: [kat] HMAC-384Kdf
920,061 UART: [kat] LMS
1,168,373 UART: [kat] --
1,169,478 UART: [cold-reset] ++
1,170,040 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,677 UART: [ldev] ++
1,208,845 UART: [ldev] CDI.KEYID = 6
1,209,209 UART: [ldev] SUBJECT.KEYID = 5
1,209,636 UART: [ldev] AUTHORITY.KEYID = 7
1,210,099 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,401 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,710 UART: [fwproc] Recv command 0x46574c44
1,283,443 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,993 >>> mbox cmd response: success
2,777,106 UART: [afmc] ++
2,777,274 UART: [afmc] CDI.KEYID = 6
2,777,637 UART: [afmc] SUBJECT.KEYID = 7
2,778,063 UART: [afmc] AUTHORITY.KEYID = 5
2,813,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,647 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,366 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,163 UART: [afmc] --
2,856,149 UART: [cold-reset] --
2,857,243 UART: [state] Locking Datavault
2,858,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,082 UART: [state] Locking ICCM
2,859,542 UART: [exit] Launching FMC @ 0x40000130
2,864,871 UART:
2,864,887 UART: Running Caliptra FMC ...
2,865,295 UART:
2,865,438 UART: [state] CFI Enabled
2,876,439 UART: [fht] FMC Alias Private Key: 7
2,984,464 UART: [art] Extend RT PCRs Done
2,984,892 UART: [art] Lock RT PCRs Done
2,986,550 UART: [art] Populate DV Done
2,994,865 UART: [fht] FMC Alias Private Key: 7
2,995,965 UART: [art] Derive CDI
2,996,245 UART: [art] Store in in slot 0x4
3,081,950 UART: [art] Derive Key Pair
3,082,310 UART: [art] Store priv key in slot 0x5
3,095,980 UART: [art] Derive Key Pair - Done
3,110,791 UART: [art] Signing Cert with AUTHO
3,111,271 UART: RITY.KEYID = 7
3,126,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,300 UART: [art] PUB.X = 0261C4A3161264C9864C9023EE15CE4C7E4622ADCF269E96BAD678EC4A0ECFC54D3991B99F6DE07DE8A65680E5F25949
3,134,072 UART: [art] PUB.Y = CBD0597C8AEE20C193E9CC937B90705E5D096A429466E4E53150533C7E00B4FEC995DD66D58374577BE68E584AEFAEA4
3,141,005 UART: [art] SIG.R = 611AF4967F731A7E3FEBE0E524709BC246288D85496ED28C5DB2AC613DF01301E0CCA8C468DE6667FAA8C76CD7EC70C9
3,147,786 UART: [art] SIG.S = 631E26EB16377DD8A869DA943B63DA07CA13CBFCE39AEE5D7D222D2B8D01BAA9FA3ACE3A4323D1B639F41FEC6B738F95
3,171,639 UART: Caliptra RT
3,171,984 UART: [state] CFI Enabled
3,279,135 UART: [rt] RT listening for mailbox commands...
3,279,805 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,967 UART: [rt]cmd =0x44504543, len=24
3,336,058 >>> mbox cmd response data (40 bytes)
3,336,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,506 UART: [rt]cmd =0x44504543, len=24
3,392,021 >>> mbox cmd response data (40 bytes)
3,392,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,421,473 UART: [rt]cmd =0x44504543, len=24
3,447,746 >>> mbox cmd response data (40 bytes)
3,447,747 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,314 UART: [rt]cmd =0x44504543, len=24
3,503,365 >>> mbox cmd response data (40 bytes)
3,503,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,715 UART: [rt]cmd =0x44504543, len=24
3,558,520 >>> mbox cmd response data (40 bytes)
3,558,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,140 UART: [rt]cmd =0x44504543, len=24
3,614,165 >>> mbox cmd response data (40 bytes)
3,614,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,747 UART: [rt]cmd =0x44504543, len=24
3,669,740 >>> mbox cmd response data (40 bytes)
3,669,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,376 UART: [rt]cmd =0x44504543, len=24
3,725,665 >>> mbox cmd response data (40 bytes)
3,725,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,239 UART: [rt]cmd =0x44504543, len=24
3,781,612 >>> mbox cmd response data (40 bytes)
3,781,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,150 UART: [rt]cmd =0x44504543, len=24
3,837,613 >>> mbox cmd response data (40 bytes)
3,837,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,047 UART: [rt]cmd =0x44504543, len=24
3,893,362 >>> mbox cmd response data (40 bytes)
3,893,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,782 UART: [rt]cmd =0x44504543, len=24
3,949,539 >>> mbox cmd response data (40 bytes)
3,949,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,045 UART: [rt]cmd =0x44504543, len=24
4,005,272 >>> mbox cmd response data (40 bytes)
4,005,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,690 UART: [rt]cmd =0x44504543, len=24
4,061,523 >>> mbox cmd response data (40 bytes)
4,061,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,993 UART: [rt]cmd =0x44504543, len=24
4,117,372 >>> mbox cmd response data (40 bytes)
4,117,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,682 UART: [rt]cmd =0x44504543, len=24
4,153,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,215 ready_for_fw is high
1,056,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,503 >>> mbox cmd response: success
2,689,581 UART:
2,689,597 UART: Running Caliptra FMC ...
2,690,005 UART:
2,690,148 UART: [state] CFI Enabled
2,700,703 UART: [fht] FMC Alias Private Key: 7
2,808,806 UART: [art] Extend RT PCRs Done
2,809,234 UART: [art] Lock RT PCRs Done
2,810,668 UART: [art] Populate DV Done
2,818,977 UART: [fht] FMC Alias Private Key: 7
2,820,013 UART: [art] Derive CDI
2,820,293 UART: [art] Store in in slot 0x4
2,905,770 UART: [art] Derive Key Pair
2,906,130 UART: [art] Store priv key in slot 0x5
2,919,336 UART: [art] Derive Key Pair - Done
2,933,834 UART: [art] Signing Cert with AUTHO
2,934,314 UART: RITY.KEYID = 7
2,949,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,159 UART: [art] PUB.X = C1173BF4EC7BFDA89F836DBF80EA0E444816C93BC3CBC4C5DD1A481B1D4D65FE455A83BE0B1C2417EEA68DDB733D5479
2,956,947 UART: [art] PUB.Y = 05133CA09284FA6AF9AB1D8E6DD3AD50DFD47D8779C74E0674A6B92CA404ECE5B6A2313990A0AF601B5E6A574AD3954F
2,963,902 UART: [art] SIG.R = D0D9019599BBF95AD49B51E210656F1FFB49C1191B345337386FE92CE377F8FA6B360A28CDE4983978963B1E0E987200
2,970,639 UART: [art] SIG.S = 4ACD2C094FA6C57927B1A732E7374A78464081B5550C56533FA2C57829E4DC98E61E9F75FBC2D21A6A7711C2A3AFB103
2,994,649 UART: Caliptra RT
2,994,994 UART: [state] CFI Enabled
3,102,891 UART: [rt] RT listening for mailbox commands...
3,103,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,481 UART: [rt]cmd =0x44504543, len=24
3,160,198 >>> mbox cmd response data (40 bytes)
3,160,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,510 UART: [rt]cmd =0x44504543, len=24
3,215,861 >>> mbox cmd response data (40 bytes)
3,215,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,245,371 UART: [rt]cmd =0x44504543, len=24
3,271,934 >>> mbox cmd response data (40 bytes)
3,271,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,564 UART: [rt]cmd =0x44504543, len=24
3,327,969 >>> mbox cmd response data (40 bytes)
3,327,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,371 UART: [rt]cmd =0x44504543, len=24
3,384,388 >>> mbox cmd response data (40 bytes)
3,384,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,872 UART: [rt]cmd =0x44504543, len=24
3,440,127 >>> mbox cmd response data (40 bytes)
3,440,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,631 UART: [rt]cmd =0x44504543, len=24
3,496,044 >>> mbox cmd response data (40 bytes)
3,496,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,580 UART: [rt]cmd =0x44504543, len=24
3,551,729 >>> mbox cmd response data (40 bytes)
3,551,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,237 UART: [rt]cmd =0x44504543, len=24
3,608,368 >>> mbox cmd response data (40 bytes)
3,608,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,864 UART: [rt]cmd =0x44504543, len=24
3,664,325 >>> mbox cmd response data (40 bytes)
3,664,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,031 UART: [rt]cmd =0x44504543, len=24
3,720,280 >>> mbox cmd response data (40 bytes)
3,720,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,768 UART: [rt]cmd =0x44504543, len=24
3,776,411 >>> mbox cmd response data (40 bytes)
3,776,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,069 UART: [rt]cmd =0x44504543, len=24
3,832,326 >>> mbox cmd response data (40 bytes)
3,832,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,842 UART: [rt]cmd =0x44504543, len=24
3,887,913 >>> mbox cmd response data (40 bytes)
3,887,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,527 UART: [rt]cmd =0x44504543, len=24
3,943,966 >>> mbox cmd response data (40 bytes)
3,943,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,474 UART: [rt]cmd =0x44504543, len=24
3,980,537 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,000 UART:
192,370 UART: Running Caliptra ROM ...
193,484 UART:
193,630 UART: [state] CFI Enabled
265,583 UART: [state] LifecycleState = Unprovisioned
267,495 UART: [state] DebugLocked = No
268,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,811 UART: [kat] SHA2-256
443,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,073 UART: [kat] ++
454,523 UART: [kat] sha1
465,109 UART: [kat] SHA2-256
467,833 UART: [kat] SHA2-384
473,605 UART: [kat] SHA2-512-ACC
475,975 UART: [kat] ECC-384
2,768,313 UART: [kat] HMAC-384Kdf
2,799,750 UART: [kat] LMS
3,990,048 UART: [kat] --
3,994,985 UART: [cold-reset] ++
3,996,208 UART: [fht] Storing FHT @ 0x50003400
4,007,259 UART: [idev] ++
4,007,835 UART: [idev] CDI.KEYID = 6
4,008,824 UART: [idev] SUBJECT.KEYID = 7
4,010,008 UART: [idev] UDS.KEYID = 0
4,011,058 ready_for_fw is high
4,011,265 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,805 UART: [idev] Erasing UDS.KEYID = 0
7,349,713 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,801 UART: [idev] --
7,375,606 UART: [ldev] ++
7,376,229 UART: [ldev] CDI.KEYID = 6
7,377,163 UART: [ldev] SUBJECT.KEYID = 5
7,378,398 UART: [ldev] AUTHORITY.KEYID = 7
7,379,634 UART: [ldev] FE.KEYID = 1
7,422,005 UART: [ldev] Erasing FE.KEYID = 1
10,755,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,277 UART: [ldev] --
13,135,735 UART: [fwproc] Waiting for Commands...
13,137,829 UART: [fwproc] Received command 0x46574c44
13,140,007 UART: [fwproc] Received Image of size 114124 bytes
17,197,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,102 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,662,265 >>> mbox cmd response: success
17,667,314 UART: [afmc] ++
17,667,917 UART: [afmc] CDI.KEYID = 6
17,668,835 UART: [afmc] SUBJECT.KEYID = 7
17,670,051 UART: [afmc] AUTHORITY.KEYID = 5
21,024,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,675 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,935 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,365 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,173 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,654 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,322 UART: [afmc] --
23,397,407 UART: [cold-reset] --
23,399,379 UART: [state] Locking Datavault
23,404,632 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,392 UART: [state] Locking ICCM
23,408,061 UART: [exit] Launching FMC @ 0x40000130
23,416,481 UART:
23,416,719 UART: Running Caliptra FMC ...
23,417,821 UART:
23,417,981 UART: [state] CFI Enabled
23,485,462 UART: [fht] FMC Alias Private Key: 7
25,823,490 UART: [art] Extend RT PCRs Done
25,824,710 UART: [art] Lock RT PCRs Done
25,826,495 UART: [art] Populate DV Done
25,831,849 UART: [fht] FMC Alias Private Key: 7
25,833,388 UART: [art] Derive CDI
25,834,150 UART: [art] Store in in slot 0x4
25,894,596 UART: [art] Derive Key Pair
25,895,642 UART: [art] Store priv key in slot 0x5
29,188,366 UART: [art] Derive Key Pair - Done
29,201,300 UART: [art] Signing Cert with AUTHO
29,202,600 UART: RITY.KEYID = 7
31,489,542 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,046 UART: [art] PUB.X = 4CCBF47C9432AADA93A7ED4DA9CF75F9F8B3FA42E8DEFB23C929B1B5E30F4F1312B880A68635F6BD91E618CE8ADA14C7
31,498,357 UART: [art] PUB.Y = E3F549D6D58506EF18DDB3A8B621703B97E24F63835ECB84A775BA7257D84EC9134F92DEA0686B4FA36D2AF6FC6C408C
31,505,609 UART: [art] SIG.R = 039AEE8311DCF581D8FC504528F5DE3624D14851E8D4DCECFAC59C8C651B3FF9A3BA5047F211CDEA7EA9C4FCE466B89E
31,513,013 UART: [art] SIG.S = E737E15F23478679C827ECC09A29EC5AEF0BB1EE4ED2F6D826931EB8CC6AB9871B5537A56DA3E735B3540AF7B10239D5
32,818,468 UART: Caliptra RT
32,819,185 UART: [state] CFI Enabled
32,979,895 UART: [rt] RT listening for mailbox commands...
32,981,810 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,011,912 UART: [rt]cmd =0x44504543, len=24
33,053,262 >>> mbox cmd response data (40 bytes)
33,054,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,085,119 UART: [rt]cmd =0x44504543, len=96
33,144,970 >>> mbox cmd response data (56 bytes)
33,145,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,176,274 UART: [rt]cmd =0x44504543, len=96
33,251,291 >>> mbox cmd response data (56 bytes)
33,252,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,282,736 UART: [rt]cmd =0x44504543, len=96
33,358,218 >>> mbox cmd response data (56 bytes)
33,358,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,389,621 UART: [rt]cmd =0x44504543, len=96
33,465,058 >>> mbox cmd response data (56 bytes)
33,465,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,496,377 UART: [rt]cmd =0x44504543, len=96
33,572,052 >>> mbox cmd response data (56 bytes)
33,572,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,603,363 UART: [rt]cmd =0x44504543, len=96
33,678,554 >>> mbox cmd response data (56 bytes)
33,679,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,709,723 UART: [rt]cmd =0x44504543, len=96
33,785,516 >>> mbox cmd response data (56 bytes)
33,786,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,816,789 UART: [rt]cmd =0x44504543, len=96
33,892,618 >>> mbox cmd response data (56 bytes)
33,893,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,923,877 UART: [rt]cmd =0x44504543, len=96
33,999,000 >>> mbox cmd response data (56 bytes)
33,999,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,030,486 UART: [rt]cmd =0x44504543, len=96
34,105,748 >>> mbox cmd response data (56 bytes)
34,106,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,136,946 UART: [rt]cmd =0x44504543, len=96
34,212,668 >>> mbox cmd response data (56 bytes)
34,213,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,244,035 UART: [rt]cmd =0x44504543, len=96
34,320,052 >>> mbox cmd response data (56 bytes)
34,320,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,351,332 UART: [rt]cmd =0x44504543, len=96
34,426,114 >>> mbox cmd response data (56 bytes)
34,426,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,457,106 UART: [rt]cmd =0x44504543, len=96
34,533,061 >>> mbox cmd response data (56 bytes)
34,533,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,564,272 UART: [rt]cmd =0x44504543, len=96
34,570,897 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,786,901 ready_for_fw is high
3,787,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,849,212 >>> mbox cmd response: success
23,543,951 UART:
23,544,341 UART: Running Caliptra FMC ...
23,545,479 UART:
23,545,645 UART: [state] CFI Enabled
23,614,536 UART: [fht] FMC Alias Private Key: 7
25,953,093 UART: [art] Extend RT PCRs Done
25,954,327 UART: [art] Lock RT PCRs Done
25,955,796 UART: [art] Populate DV Done
25,961,483 UART: [fht] FMC Alias Private Key: 7
25,963,134 UART: [art] Derive CDI
25,963,951 UART: [art] Store in in slot 0x4
26,022,349 UART: [art] Derive Key Pair
26,023,396 UART: [art] Store priv key in slot 0x5
29,316,704 UART: [art] Derive Key Pair - Done
29,329,764 UART: [art] Signing Cert with AUTHO
29,331,075 UART: RITY.KEYID = 7
31,617,509 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,016 UART: [art] PUB.X = 349DCB7C7AE4C1916A7FC3BD5D46167EF9C67438FF6D8F8B8A4D201A7C15C36FC2BFE310932778D1F98DF710977E1B8E
31,626,268 UART: [art] PUB.Y = 0E37CB77B176A1A025C14956A5762CCA86300D7CF485BEDA2E472A64F6A03E91327DCC095D1813300FB4BE8710D99A58
31,633,509 UART: [art] SIG.R = FF482A70965DB1FEAB7C6716D8F31DCF45D3D58BC1929026380D1B2C0B7103CACD15F9E0ECB6185E9CB578DB52C38ABD
31,640,925 UART: [art] SIG.S = 7DCBFE35F0FA4AA7C764ECB0FF9C608580044F70D27C612EAA30B9FDCC46A54F4D569609108D2A690A0BF24A4AD7D2C9
32,945,746 UART: Caliptra RT
32,946,459 UART: [state] CFI Enabled
33,107,200 UART: [rt] RT listening for mailbox commands...
33,109,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,138,856 UART: [rt]cmd =0x44504543, len=24
33,180,959 >>> mbox cmd response data (40 bytes)
33,182,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,212,969 UART: [rt]cmd =0x44504543, len=96
33,272,528 >>> mbox cmd response data (56 bytes)
33,273,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,303,869 UART: [rt]cmd =0x44504543, len=96
33,378,942 >>> mbox cmd response data (56 bytes)
33,379,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,410,050 UART: [rt]cmd =0x44504543, len=96
33,485,966 >>> mbox cmd response data (56 bytes)
33,486,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,517,228 UART: [rt]cmd =0x44504543, len=96
33,592,818 >>> mbox cmd response data (56 bytes)
33,593,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,624,080 UART: [rt]cmd =0x44504543, len=96
33,699,813 >>> mbox cmd response data (56 bytes)
33,700,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,730,972 UART: [rt]cmd =0x44504543, len=96
33,806,544 >>> mbox cmd response data (56 bytes)
33,807,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,837,871 UART: [rt]cmd =0x44504543, len=96
33,913,133 >>> mbox cmd response data (56 bytes)
33,913,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,944,288 UART: [rt]cmd =0x44504543, len=96
34,020,454 >>> mbox cmd response data (56 bytes)
34,021,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,051,795 UART: [rt]cmd =0x44504543, len=96
34,126,669 >>> mbox cmd response data (56 bytes)
34,127,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,157,992 UART: [rt]cmd =0x44504543, len=96
34,233,365 >>> mbox cmd response data (56 bytes)
34,234,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,264,622 UART: [rt]cmd =0x44504543, len=96
34,340,400 >>> mbox cmd response data (56 bytes)
34,341,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,371,712 UART: [rt]cmd =0x44504543, len=96
34,447,335 >>> mbox cmd response data (56 bytes)
34,448,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,478,829 UART: [rt]cmd =0x44504543, len=96
34,554,193 >>> mbox cmd response data (56 bytes)
34,554,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,585,390 UART: [rt]cmd =0x44504543, len=96
34,660,826 >>> mbox cmd response data (56 bytes)
34,661,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,692,277 UART: [rt]cmd =0x44504543, len=96
34,698,635 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,440 UART:
192,804 UART: Running Caliptra ROM ...
193,992 UART:
603,688 UART: [state] CFI Enabled
618,364 UART: [state] LifecycleState = Unprovisioned
620,340 UART: [state] DebugLocked = No
622,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,210 UART: [kat] SHA2-256
798,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,536 UART: [kat] ++
808,976 UART: [kat] sha1
819,345 UART: [kat] SHA2-256
822,062 UART: [kat] SHA2-384
827,128 UART: [kat] SHA2-512-ACC
829,490 UART: [kat] ECC-384
3,114,947 UART: [kat] HMAC-384Kdf
3,128,130 UART: [kat] LMS
4,318,266 UART: [kat] --
4,322,305 UART: [cold-reset] ++
4,324,390 UART: [fht] Storing FHT @ 0x50003400
4,334,590 UART: [idev] ++
4,335,149 UART: [idev] CDI.KEYID = 6
4,336,124 UART: [idev] SUBJECT.KEYID = 7
4,337,361 UART: [idev] UDS.KEYID = 0
4,338,416 ready_for_fw is high
4,338,644 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,045 UART: [idev] Erasing UDS.KEYID = 0
7,626,897 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,186 UART: [idev] --
7,654,523 UART: [ldev] ++
7,655,099 UART: [ldev] CDI.KEYID = 6
7,656,117 UART: [ldev] SUBJECT.KEYID = 5
7,657,290 UART: [ldev] AUTHORITY.KEYID = 7
7,658,515 UART: [ldev] FE.KEYID = 1
7,669,858 UART: [ldev] Erasing FE.KEYID = 1
10,961,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,919 UART: [ldev] --
13,320,927 UART: [fwproc] Waiting for Commands...
13,323,873 UART: [fwproc] Received command 0x46574c44
13,326,046 UART: [fwproc] Received Image of size 114124 bytes
17,373,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,294 >>> mbox cmd response: success
17,844,128 UART: [afmc] ++
17,844,726 UART: [afmc] CDI.KEYID = 6
17,845,632 UART: [afmc] SUBJECT.KEYID = 7
17,846,896 UART: [afmc] AUTHORITY.KEYID = 5
21,156,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,960 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,228 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,563 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,391 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,870 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,692 UART: [afmc] --
23,520,854 UART: [cold-reset] --
23,524,439 UART: [state] Locking Datavault
23,528,763 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,518 UART: [state] Locking ICCM
23,532,983 UART: [exit] Launching FMC @ 0x40000130
23,541,405 UART:
23,541,636 UART: Running Caliptra FMC ...
23,542,737 UART:
23,542,893 UART: [state] CFI Enabled
23,551,102 UART: [fht] FMC Alias Private Key: 7
25,882,567 UART: [art] Extend RT PCRs Done
25,883,794 UART: [art] Lock RT PCRs Done
25,885,283 UART: [art] Populate DV Done
25,890,535 UART: [fht] FMC Alias Private Key: 7
25,892,111 UART: [art] Derive CDI
25,892,874 UART: [art] Store in in slot 0x4
25,934,981 UART: [art] Derive Key Pair
25,935,979 UART: [art] Store priv key in slot 0x5
29,178,414 UART: [art] Derive Key Pair - Done
29,191,252 UART: [art] Signing Cert with AUTHO
29,192,550 UART: RITY.KEYID = 7
31,472,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,561 UART: [art] PUB.X = 0EB799377B92F95CEB4F6BA73EC47862D1517130F8213151309C35D78899298CCC66A0D4F409FA84C34E40233FF8D322
31,480,806 UART: [art] PUB.Y = 07A629350AAFBA0428D98CE308B453E70025F7EA2DB87A523A2075AEE1429682906B38A0EFF7435E13569D29D0B4AFBB
31,488,016 UART: [art] SIG.R = 931CE395828F1BAFFAFCC9CFFE9ECC0141DED409B5B6C65B47E7922CB0BE561439B4F26A2E1B82722A91205C912D2754
31,495,441 UART: [art] SIG.S = 6B3B925487E06A8AF4F42B1524A13FE1ADD87F6283FF482E5DC6C7456AB629CF6DCF26985D3DFC09996A21CE23A39962
32,800,216 UART: Caliptra RT
32,800,907 UART: [state] CFI Enabled
32,918,668 UART: [rt] RT listening for mailbox commands...
32,920,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,950,452 UART: [rt]cmd =0x44504543, len=24
32,976,834 >>> mbox cmd response data (40 bytes)
32,978,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,008,916 UART: [rt]cmd =0x44504543, len=96
33,048,981 >>> mbox cmd response data (56 bytes)
33,049,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,080,456 UART: [rt]cmd =0x44504543, len=96
33,121,377 >>> mbox cmd response data (56 bytes)
33,122,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,152,659 UART: [rt]cmd =0x44504543, len=96
33,193,334 >>> mbox cmd response data (56 bytes)
33,194,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,224,336 UART: [rt]cmd =0x44504543, len=96
33,264,629 >>> mbox cmd response data (56 bytes)
33,265,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,295,893 UART: [rt]cmd =0x44504543, len=96
33,337,696 >>> mbox cmd response data (56 bytes)
33,338,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,368,895 UART: [rt]cmd =0x44504543, len=96
33,410,663 >>> mbox cmd response data (56 bytes)
33,411,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,442,111 UART: [rt]cmd =0x44504543, len=96
33,483,958 >>> mbox cmd response data (56 bytes)
33,484,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,515,482 UART: [rt]cmd =0x44504543, len=96
33,557,574 >>> mbox cmd response data (56 bytes)
33,558,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,588,813 UART: [rt]cmd =0x44504543, len=96
33,631,070 >>> mbox cmd response data (56 bytes)
33,631,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,662,464 UART: [rt]cmd =0x44504543, len=96
33,705,422 >>> mbox cmd response data (56 bytes)
33,706,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,736,808 UART: [rt]cmd =0x44504543, len=96
33,780,043 >>> mbox cmd response data (56 bytes)
33,780,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,811,331 UART: [rt]cmd =0x44504543, len=96
33,855,422 >>> mbox cmd response data (56 bytes)
33,856,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,886,763 UART: [rt]cmd =0x44504543, len=96
33,930,996 >>> mbox cmd response data (56 bytes)
33,931,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,962,089 UART: [rt]cmd =0x44504543, len=96
34,006,756 >>> mbox cmd response data (56 bytes)
34,007,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,037,963 UART: [rt]cmd =0x44504543, len=96
34,044,421 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
4,129,368 ready_for_fw is high
4,129,781 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,627 >>> mbox cmd response: success
23,707,826 UART:
23,708,226 UART: Running Caliptra FMC ...
23,709,360 UART:
23,709,514 UART: [state] CFI Enabled
23,717,583 UART: [fht] FMC Alias Private Key: 7
26,048,297 UART: [art] Extend RT PCRs Done
26,049,524 UART: [art] Lock RT PCRs Done
26,051,108 UART: [art] Populate DV Done
26,056,579 UART: [fht] FMC Alias Private Key: 7
26,058,241 UART: [art] Derive CDI
26,059,055 UART: [art] Store in in slot 0x4
26,101,704 UART: [art] Derive Key Pair
26,102,698 UART: [art] Store priv key in slot 0x5
29,345,184 UART: [art] Derive Key Pair - Done
29,357,917 UART: [art] Signing Cert with AUTHO
29,359,229 UART: RITY.KEYID = 7
31,638,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,010 UART: [art] PUB.X = 7DD55758688984402AC0F22DD285810BF09EB0DD3D2FE9CC8998010190F41EDF807BA0D01354A3DEE747B34463B04E15
31,647,270 UART: [art] PUB.Y = DA9B58B297AE6DBA54501561899B8823EFBB45E73D98B52797772AEB232F88BAB71DD3A9911CF6A7000BBCC63D9996A0
31,654,492 UART: [art] SIG.R = 640C5F8C569DA7EE3B7ED9C3A85FDC46F9141D76060A44E7B25F196E5CE5D1FA7DE927758396B3CC062062FFBC832C97
31,661,871 UART: [art] SIG.S = CACC76633D9B2DB14F4D2662A88C413C64A504BF11E9DC48705E94B75DFBC0BF7C3837C22FC9BB392D9E96DD1A556C69
32,967,117 UART: Caliptra RT
32,967,827 UART: [state] CFI Enabled
33,085,129 UART: [rt] RT listening for mailbox commands...
33,087,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,116,968 UART: [rt]cmd =0x44504543, len=24
33,142,889 >>> mbox cmd response data (40 bytes)
33,144,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,174,698 UART: [rt]cmd =0x44504543, len=96
33,215,287 >>> mbox cmd response data (56 bytes)
33,216,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,246,661 UART: [rt]cmd =0x44504543, len=96
33,287,407 >>> mbox cmd response data (56 bytes)
33,288,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,318,520 UART: [rt]cmd =0x44504543, len=96
33,358,802 >>> mbox cmd response data (56 bytes)
33,359,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,389,811 UART: [rt]cmd =0x44504543, len=96
33,431,023 >>> mbox cmd response data (56 bytes)
33,431,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,462,120 UART: [rt]cmd =0x44504543, len=96
33,503,431 >>> mbox cmd response data (56 bytes)
33,504,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,534,900 UART: [rt]cmd =0x44504543, len=96
33,576,703 >>> mbox cmd response data (56 bytes)
33,577,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,607,840 UART: [rt]cmd =0x44504543, len=96
33,649,312 >>> mbox cmd response data (56 bytes)
33,650,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,680,506 UART: [rt]cmd =0x44504543, len=96
33,723,184 >>> mbox cmd response data (56 bytes)
33,723,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,754,485 UART: [rt]cmd =0x44504543, len=96
33,796,647 >>> mbox cmd response data (56 bytes)
33,797,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,828,036 UART: [rt]cmd =0x44504543, len=96
33,870,480 >>> mbox cmd response data (56 bytes)
33,871,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,901,915 UART: [rt]cmd =0x44504543, len=96
33,944,922 >>> mbox cmd response data (56 bytes)
33,945,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,976,149 UART: [rt]cmd =0x44504543, len=96
34,019,863 >>> mbox cmd response data (56 bytes)
34,020,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,051,049 UART: [rt]cmd =0x44504543, len=96
34,094,330 >>> mbox cmd response data (56 bytes)
34,095,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,125,315 UART: [rt]cmd =0x44504543, len=96
34,169,242 >>> mbox cmd response data (56 bytes)
34,169,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,200,467 UART: [rt]cmd =0x44504543, len=96
34,206,895 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,236 UART:
192,597 UART: Running Caliptra ROM ...
193,789 UART:
193,940 UART: [state] CFI Enabled
260,204 UART: [state] LifecycleState = Unprovisioned
262,114 UART: [state] DebugLocked = No
264,713 UART: [state] WD Timer not started. Device not locked for debugging
268,462 UART: [kat] SHA2-256
447,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,144 UART: [kat] ++
459,674 UART: [kat] sha1
471,510 UART: [kat] SHA2-256
474,564 UART: [kat] SHA2-384
479,700 UART: [kat] SHA2-512-ACC
482,654 UART: [kat] ECC-384
2,946,938 UART: [kat] HMAC-384Kdf
2,971,154 UART: [kat] LMS
3,500,579 UART: [kat] --
3,507,669 UART: [cold-reset] ++
3,508,504 UART: [fht] FHT @ 0x50003400
3,518,560 UART: [idev] ++
3,519,124 UART: [idev] CDI.KEYID = 6
3,520,017 UART: [idev] SUBJECT.KEYID = 7
3,521,194 UART: [idev] UDS.KEYID = 0
3,522,200 ready_for_fw is high
3,522,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,381 UART: [idev] Erasing UDS.KEYID = 0
6,025,288 UART: [idev] Sha1 KeyId Algorithm
6,047,548 UART: [idev] --
6,052,138 UART: [ldev] ++
6,052,726 UART: [ldev] CDI.KEYID = 6
6,053,617 UART: [ldev] SUBJECT.KEYID = 5
6,054,829 UART: [ldev] AUTHORITY.KEYID = 7
6,056,013 UART: [ldev] FE.KEYID = 1
6,100,481 UART: [ldev] Erasing FE.KEYID = 1
8,600,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,329 UART: [ldev] --
10,393,092 UART: [fwproc] Wait for Commands...
10,394,654 UART: [fwproc] Recv command 0x46574c44
10,396,697 UART: [fwproc] Recv'd Img size: 114448 bytes
13,802,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,269,276 >>> mbox cmd response: success
14,272,857 UART: [afmc] ++
14,273,452 UART: [afmc] CDI.KEYID = 6
14,274,335 UART: [afmc] SUBJECT.KEYID = 7
14,275,437 UART: [afmc] AUTHORITY.KEYID = 5
16,808,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,935 UART: [afmc] --
18,608,063 UART: [cold-reset] --
18,612,733 UART: [state] Locking Datavault
18,618,351 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,018 UART: [state] Locking ICCM
18,622,767 UART: [exit] Launching FMC @ 0x40000130
18,631,206 UART:
18,631,455 UART: Running Caliptra FMC ...
18,632,481 UART:
18,632,631 UART: [state] CFI Enabled
18,690,177 UART: [fht] FMC Alias Private Key: 7
20,454,514 UART: [art] Extend RT PCRs Done
20,455,725 UART: [art] Lock RT PCRs Done
20,457,454 UART: [art] Populate DV Done
20,462,705 UART: [fht] FMC Alias Private Key: 7
20,464,222 UART: [art] Derive CDI
20,464,967 UART: [art] Store in in slot 0x4
20,522,329 UART: [art] Derive Key Pair
20,523,323 UART: [art] Store priv key in slot 0x5
22,986,528 UART: [art] Derive Key Pair - Done
22,999,478 UART: [art] Signing Cert with AUTHO
23,000,777 UART: RITY.KEYID = 7
24,713,202 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,711 UART: [art] PUB.X = F2AD14A48AAF4A1B443F943573BBB3EDF3BD132D42A233DC1FA694BF43819E31015F3A5BB6352D33387E49E0961AA7CE
24,721,952 UART: [art] PUB.Y = 5809C5107B2BB455343C40C042F5D204C4FEBCFA244AA97EAAEF6B693587B6CF875611A27250842E4D8093D8FFA774B7
24,729,242 UART: [art] SIG.R = 3700F19D382E6A979CD14F695602136B655E2DCCDCD318283BDEE398644C330AD6C5B7BB6161801802DBC6E4B0180FBA
24,736,634 UART: [art] SIG.S = 1D3C5A1E0661BE63C28CDCE52831918644C2B92ADD1628428EAAF1A39418FD1236B7EEBA5350B478AC738FB174957365
25,715,529 UART: Caliptra RT
25,716,228 UART: [state] CFI Enabled
25,881,016 UART: [rt] RT listening for mailbox commands...
25,882,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,913,376 UART: [rt]cmd =0x44504543, len=24
25,955,593 >>> mbox cmd response data (40 bytes)
25,956,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,987,361 UART: [rt]cmd =0x44504543, len=96
26,047,198 >>> mbox cmd response data (56 bytes)
26,047,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,078,678 UART: [rt]cmd =0x44504543, len=96
26,153,570 >>> mbox cmd response data (56 bytes)
26,154,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,184,685 UART: [rt]cmd =0x44504543, len=96
26,260,145 >>> mbox cmd response data (56 bytes)
26,260,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,291,349 UART: [rt]cmd =0x44504543, len=96
26,367,234 >>> mbox cmd response data (56 bytes)
26,367,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,398,672 UART: [rt]cmd =0x44504543, len=96
26,473,875 >>> mbox cmd response data (56 bytes)
26,474,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,505,132 UART: [rt]cmd =0x44504543, len=96
26,581,178 >>> mbox cmd response data (56 bytes)
26,581,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,612,504 UART: [rt]cmd =0x44504543, len=96
26,687,851 >>> mbox cmd response data (56 bytes)
26,688,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,876 UART: [rt]cmd =0x44504543, len=96
26,794,130 >>> mbox cmd response data (56 bytes)
26,794,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,652 UART: [rt]cmd =0x44504543, len=96
26,901,423 >>> mbox cmd response data (56 bytes)
26,902,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,932,618 UART: [rt]cmd =0x44504543, len=96
27,007,743 >>> mbox cmd response data (56 bytes)
27,008,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,038,692 UART: [rt]cmd =0x44504543, len=96
27,114,655 >>> mbox cmd response data (56 bytes)
27,115,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,146,016 UART: [rt]cmd =0x44504543, len=96
27,221,706 >>> mbox cmd response data (56 bytes)
27,222,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,253,016 UART: [rt]cmd =0x44504543, len=96
27,328,522 >>> mbox cmd response data (56 bytes)
27,329,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,359,513 UART: [rt]cmd =0x44504543, len=96
27,434,818 >>> mbox cmd response data (56 bytes)
27,435,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,465,869 UART: [rt]cmd =0x44504543, len=96
27,472,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,362,137 ready_for_fw is high
3,362,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,037,668 >>> mbox cmd response: success
18,323,459 UART:
18,323,846 UART: Running Caliptra FMC ...
18,324,994 UART:
18,325,152 UART: [state] CFI Enabled
18,388,870 UART: [fht] FMC Alias Private Key: 7
20,152,867 UART: [art] Extend RT PCRs Done
20,154,103 UART: [art] Lock RT PCRs Done
20,155,814 UART: [art] Populate DV Done
20,161,237 UART: [fht] FMC Alias Private Key: 7
20,162,706 UART: [art] Derive CDI
20,163,469 UART: [art] Store in in slot 0x4
20,221,967 UART: [art] Derive Key Pair
20,222,966 UART: [art] Store priv key in slot 0x5
22,686,240 UART: [art] Derive Key Pair - Done
22,698,917 UART: [art] Signing Cert with AUTHO
22,700,221 UART: RITY.KEYID = 7
24,411,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,142 UART: [art] PUB.X = 900EAC62B6284C714D5D13218008E3E2DF1EEE8AAEB4C702159BB20CFCCD9689E17B4254D533B2E40C54EAA4352939C9
24,420,457 UART: [art] PUB.Y = 14F192037B413593B3C8913FD9608FA46F970DBBF657F5DA1E7FA467E7BD2460F0AB053E064D580A575CB6522F91D280
24,427,675 UART: [art] SIG.R = B31F10C3272FC7DFFE607533E6E7F831EBD577351E43758B5DDBB876DE4DE37B6BFFD9C5683F8A967BC00B8B6EB83281
24,435,071 UART: [art] SIG.S = 34C9F65A1E53BA4FED7AB3CF88E9B8237C28B2869AC39CD73530269D75427F099764725CC604572D2B77B9F59FE644EA
25,413,698 UART: Caliptra RT
25,414,398 UART: [state] CFI Enabled
25,579,305 UART: [rt] RT listening for mailbox commands...
25,581,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,611,853 UART: [rt]cmd =0x44504543, len=24
25,654,925 >>> mbox cmd response data (40 bytes)
25,656,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,686,941 UART: [rt]cmd =0x44504543, len=96
25,746,168 >>> mbox cmd response data (56 bytes)
25,746,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,777,339 UART: [rt]cmd =0x44504543, len=96
25,852,921 >>> mbox cmd response data (56 bytes)
25,853,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,884,027 UART: [rt]cmd =0x44504543, len=96
25,959,676 >>> mbox cmd response data (56 bytes)
25,960,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,990,881 UART: [rt]cmd =0x44504543, len=96
26,066,283 >>> mbox cmd response data (56 bytes)
26,067,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,097,343 UART: [rt]cmd =0x44504543, len=96
26,172,763 >>> mbox cmd response data (56 bytes)
26,173,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,204,248 UART: [rt]cmd =0x44504543, len=96
26,279,870 >>> mbox cmd response data (56 bytes)
26,280,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,310,961 UART: [rt]cmd =0x44504543, len=96
26,386,285 >>> mbox cmd response data (56 bytes)
26,387,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,590 UART: [rt]cmd =0x44504543, len=96
26,493,334 >>> mbox cmd response data (56 bytes)
26,494,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,586 UART: [rt]cmd =0x44504543, len=96
26,600,093 >>> mbox cmd response data (56 bytes)
26,600,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,631,295 UART: [rt]cmd =0x44504543, len=96
26,706,208 >>> mbox cmd response data (56 bytes)
26,706,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,737,538 UART: [rt]cmd =0x44504543, len=96
26,813,562 >>> mbox cmd response data (56 bytes)
26,814,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,844,914 UART: [rt]cmd =0x44504543, len=96
26,920,429 >>> mbox cmd response data (56 bytes)
26,921,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,951,729 UART: [rt]cmd =0x44504543, len=96
27,027,669 >>> mbox cmd response data (56 bytes)
27,028,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,713 UART: [rt]cmd =0x44504543, len=96
27,134,405 >>> mbox cmd response data (56 bytes)
27,135,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,165,765 UART: [rt]cmd =0x44504543, len=96
27,172,115 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,245 UART:
192,625 UART: Running Caliptra ROM ...
193,747 UART:
603,392 UART: [state] CFI Enabled
615,417 UART: [state] LifecycleState = Unprovisioned
617,286 UART: [state] DebugLocked = No
619,369 UART: [state] WD Timer not started. Device not locked for debugging
622,687 UART: [kat] SHA2-256
801,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,357 UART: [kat] ++
813,822 UART: [kat] sha1
826,249 UART: [kat] SHA2-256
829,316 UART: [kat] SHA2-384
836,365 UART: [kat] SHA2-512-ACC
839,366 UART: [kat] ECC-384
3,281,106 UART: [kat] HMAC-384Kdf
3,293,350 UART: [kat] LMS
3,822,796 UART: [kat] --
3,827,143 UART: [cold-reset] ++
3,828,573 UART: [fht] FHT @ 0x50003400
3,840,534 UART: [idev] ++
3,841,090 UART: [idev] CDI.KEYID = 6
3,842,153 UART: [idev] SUBJECT.KEYID = 7
3,843,253 UART: [idev] UDS.KEYID = 0
3,844,171 ready_for_fw is high
3,844,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,100 UART: [idev] Erasing UDS.KEYID = 0
6,314,835 UART: [idev] Sha1 KeyId Algorithm
6,337,140 UART: [idev] --
6,341,347 UART: [ldev] ++
6,341,906 UART: [ldev] CDI.KEYID = 6
6,342,782 UART: [ldev] SUBJECT.KEYID = 5
6,343,982 UART: [ldev] AUTHORITY.KEYID = 7
6,345,267 UART: [ldev] FE.KEYID = 1
6,356,210 UART: [ldev] Erasing FE.KEYID = 1
8,824,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,770 UART: [ldev] --
10,615,848 UART: [fwproc] Wait for Commands...
10,617,796 UART: [fwproc] Recv command 0x46574c44
10,619,883 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,644 >>> mbox cmd response: success
14,488,834 UART: [afmc] ++
14,489,420 UART: [afmc] CDI.KEYID = 6
14,490,297 UART: [afmc] SUBJECT.KEYID = 7
14,491,502 UART: [afmc] AUTHORITY.KEYID = 5
16,990,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,547 UART: [afmc] --
18,787,939 UART: [cold-reset] --
18,791,523 UART: [state] Locking Datavault
18,798,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,769 UART: [state] Locking ICCM
18,800,783 UART: [exit] Launching FMC @ 0x40000130
18,809,181 UART:
18,809,411 UART: Running Caliptra FMC ...
18,810,507 UART:
18,810,659 UART: [state] CFI Enabled
18,818,587 UART: [fht] FMC Alias Private Key: 7
20,575,910 UART: [art] Extend RT PCRs Done
20,577,125 UART: [art] Lock RT PCRs Done
20,579,175 UART: [art] Populate DV Done
20,584,796 UART: [fht] FMC Alias Private Key: 7
20,586,441 UART: [art] Derive CDI
20,587,264 UART: [art] Store in in slot 0x4
20,629,596 UART: [art] Derive Key Pair
20,630,633 UART: [art] Store priv key in slot 0x5
23,057,331 UART: [art] Derive Key Pair - Done
23,070,285 UART: [art] Signing Cert with AUTHO
23,071,590 UART: RITY.KEYID = 7
24,777,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,729 UART: [art] PUB.X = A080EA2259E13784BC873CAF4659AF7A9FFC8AE331129D750556643E6E355D0155161BC131D15027C15882A52644C1DC
24,786,011 UART: [art] PUB.Y = 87BEEC0CA6C06B734C89C9D0396F675FC974538222B6BCECC0027F449FE4F84534705DC5D9BB14DC5E588BD107BB4F6C
24,793,282 UART: [art] SIG.R = 2CD262F4142FAB249B0EE0B1DB675B2C07DC18506528560E0607C5A4A2782ABBEA42F279BA3E7E00F02DD7334F415F3E
24,800,664 UART: [art] SIG.S = 7417B98E9D716D87FD1B716E595DFCAF6C91E3AD30F7D3D803BCD7CAA7ACCE90DBF52A17D9F6D55FE553C5A2F615B02A
25,779,300 UART: Caliptra RT
25,780,000 UART: [state] CFI Enabled
25,897,506 UART: [rt] RT listening for mailbox commands...
25,899,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,929,176 UART: [rt]cmd =0x44504543, len=24
25,955,706 >>> mbox cmd response data (40 bytes)
25,957,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,987,709 UART: [rt]cmd =0x44504543, len=96
26,027,565 >>> mbox cmd response data (56 bytes)
26,028,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,058,741 UART: [rt]cmd =0x44504543, len=96
26,099,117 >>> mbox cmd response data (56 bytes)
26,099,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,130,416 UART: [rt]cmd =0x44504543, len=96
26,171,860 >>> mbox cmd response data (56 bytes)
26,172,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,203,066 UART: [rt]cmd =0x44504543, len=96
26,244,363 >>> mbox cmd response data (56 bytes)
26,245,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,275,424 UART: [rt]cmd =0x44504543, len=96
26,316,938 >>> mbox cmd response data (56 bytes)
26,317,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,348,084 UART: [rt]cmd =0x44504543, len=96
26,390,930 >>> mbox cmd response data (56 bytes)
26,391,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,422,286 UART: [rt]cmd =0x44504543, len=96
26,464,576 >>> mbox cmd response data (56 bytes)
26,465,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,495,873 UART: [rt]cmd =0x44504543, len=96
26,538,804 >>> mbox cmd response data (56 bytes)
26,539,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,569,839 UART: [rt]cmd =0x44504543, len=96
26,612,130 >>> mbox cmd response data (56 bytes)
26,612,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,425 UART: [rt]cmd =0x44504543, len=96
26,686,142 >>> mbox cmd response data (56 bytes)
26,686,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,717,525 UART: [rt]cmd =0x44504543, len=96
26,760,878 >>> mbox cmd response data (56 bytes)
26,761,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,791,983 UART: [rt]cmd =0x44504543, len=96
26,834,831 >>> mbox cmd response data (56 bytes)
26,835,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,866,093 UART: [rt]cmd =0x44504543, len=96
26,910,186 >>> mbox cmd response data (56 bytes)
26,910,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,941,438 UART: [rt]cmd =0x44504543, len=96
26,986,008 >>> mbox cmd response data (56 bytes)
26,986,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,017,236 UART: [rt]cmd =0x44504543, len=96
27,023,607 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,692,728 ready_for_fw is high
3,693,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,245 >>> mbox cmd response: success
18,515,486 UART:
18,515,877 UART: Running Caliptra FMC ...
18,517,175 UART:
18,517,338 UART: [state] CFI Enabled
18,524,949 UART: [fht] FMC Alias Private Key: 7
20,282,721 UART: [art] Extend RT PCRs Done
20,283,935 UART: [art] Lock RT PCRs Done
20,285,772 UART: [art] Populate DV Done
20,291,131 UART: [fht] FMC Alias Private Key: 7
20,292,771 UART: [art] Derive CDI
20,293,580 UART: [art] Store in in slot 0x4
20,336,131 UART: [art] Derive Key Pair
20,337,161 UART: [art] Store priv key in slot 0x5
22,763,692 UART: [art] Derive Key Pair - Done
22,776,483 UART: [art] Signing Cert with AUTHO
22,777,793 UART: RITY.KEYID = 7
24,483,497 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,981 UART: [art] PUB.X = 96CA7BE767CB94DD17AB10E6B045D4E3393C59DFD18A028F2F93C42784E810C072E23AE813935B50D53ADF6F050C1334
24,492,285 UART: [art] PUB.Y = 160B35D57B48E071C98B98C9636CB4B5F56783927A37FA2E75A5514A113D0CE588EC1A3B5C864EF820CBFB0878E5F85D
24,499,544 UART: [art] SIG.R = B785A9A8297B540D6BE642511BF0B7F8877CFA9A6E1A495037B51060A18926EF70A2EA8C0B8AA0A5085A8D5CE5E03127
24,506,924 UART: [art] SIG.S = 28E02CF54E8FE33C15CA79241D2854DF7E94F7FEBFE0EF3DD2459E64103F4443EFDE79E517C0138998201D910E9FE7D1
25,486,032 UART: Caliptra RT
25,486,750 UART: [state] CFI Enabled
25,603,597 UART: [rt] RT listening for mailbox commands...
25,605,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,635,435 UART: [rt]cmd =0x44504543, len=24
25,661,982 >>> mbox cmd response data (40 bytes)
25,663,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,693,993 UART: [rt]cmd =0x44504543, len=96
25,734,958 >>> mbox cmd response data (56 bytes)
25,735,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,766,417 UART: [rt]cmd =0x44504543, len=96
25,807,458 >>> mbox cmd response data (56 bytes)
25,808,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,838,938 UART: [rt]cmd =0x44504543, len=96
25,879,428 >>> mbox cmd response data (56 bytes)
25,880,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,910,759 UART: [rt]cmd =0x44504543, len=96
25,951,581 >>> mbox cmd response data (56 bytes)
25,952,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,983,100 UART: [rt]cmd =0x44504543, len=96
26,024,779 >>> mbox cmd response data (56 bytes)
26,025,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,056,139 UART: [rt]cmd =0x44504543, len=96
26,098,138 >>> mbox cmd response data (56 bytes)
26,098,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,129,106 UART: [rt]cmd =0x44504543, len=96
26,170,409 >>> mbox cmd response data (56 bytes)
26,171,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,201,812 UART: [rt]cmd =0x44504543, len=96
26,245,179 >>> mbox cmd response data (56 bytes)
26,245,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,276,505 UART: [rt]cmd =0x44504543, len=96
26,320,028 >>> mbox cmd response data (56 bytes)
26,320,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,351,533 UART: [rt]cmd =0x44504543, len=96
26,395,089 >>> mbox cmd response data (56 bytes)
26,395,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,426,270 UART: [rt]cmd =0x44504543, len=96
26,469,558 >>> mbox cmd response data (56 bytes)
26,470,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,500,779 UART: [rt]cmd =0x44504543, len=96
26,545,035 >>> mbox cmd response data (56 bytes)
26,545,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,155 UART: [rt]cmd =0x44504543, len=96
26,620,078 >>> mbox cmd response data (56 bytes)
26,620,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,651,465 UART: [rt]cmd =0x44504543, len=96
26,695,558 >>> mbox cmd response data (56 bytes)
26,696,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,726,570 UART: [rt]cmd =0x44504543, len=96
26,733,360 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,116 UART:
192,481 UART: Running Caliptra ROM ...
193,678 UART:
193,834 UART: [state] CFI Enabled
263,233 UART: [state] LifecycleState = Unprovisioned
265,649 UART: [state] DebugLocked = No
268,128 UART: [state] WD Timer not started. Device not locked for debugging
272,020 UART: [kat] SHA2-256
461,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,604 UART: [kat] ++
473,054 UART: [kat] sha1
483,293 UART: [kat] SHA2-256
486,303 UART: [kat] SHA2-384
493,073 UART: [kat] SHA2-512-ACC
495,650 UART: [kat] ECC-384
2,948,124 UART: [kat] HMAC-384Kdf
2,972,435 UART: [kat] LMS
3,504,208 UART: [kat] --
3,508,846 UART: [cold-reset] ++
3,511,345 UART: [fht] FHT @ 0x50003400
3,522,317 UART: [idev] ++
3,523,030 UART: [idev] CDI.KEYID = 6
3,524,086 UART: [idev] SUBJECT.KEYID = 7
3,525,196 UART: [idev] UDS.KEYID = 0
3,526,142 ready_for_fw is high
3,526,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,385 UART: [idev] Erasing UDS.KEYID = 0
6,028,607 UART: [idev] Sha1 KeyId Algorithm
6,050,701 UART: [idev] --
6,055,074 UART: [ldev] ++
6,055,755 UART: [ldev] CDI.KEYID = 6
6,056,769 UART: [ldev] SUBJECT.KEYID = 5
6,057,875 UART: [ldev] AUTHORITY.KEYID = 7
6,059,102 UART: [ldev] FE.KEYID = 1
6,099,904 UART: [ldev] Erasing FE.KEYID = 1
8,606,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,651 UART: [ldev] --
10,415,724 UART: [fwproc] Wait for Commands...
10,418,570 UART: [fwproc] Recv command 0x46574c44
10,420,866 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,955 >>> mbox cmd response: success
14,605,756 UART: [afmc] ++
14,606,459 UART: [afmc] CDI.KEYID = 6
14,607,570 UART: [afmc] SUBJECT.KEYID = 7
14,609,109 UART: [afmc] AUTHORITY.KEYID = 5
17,147,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,428 UART: [afmc] --
18,947,753 UART: [cold-reset] --
18,950,860 UART: [state] Locking Datavault
18,958,319 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,461 UART: [state] Locking ICCM
18,962,933 UART: [exit] Launching FMC @ 0x40000130
18,971,601 UART:
18,971,830 UART: Running Caliptra FMC ...
18,972,930 UART:
18,973,093 UART: [state] CFI Enabled
19,029,563 UART: [fht] FMC Alias Private Key: 7
20,793,752 UART: [art] Extend RT PCRs Done
20,794,989 UART: [art] Lock RT PCRs Done
20,796,455 UART: [art] Populate DV Done
20,801,806 UART: [fht] FMC Alias Private Key: 7
20,803,338 UART: [art] Derive CDI
20,804,102 UART: [art] Store in in slot 0x4
20,861,953 UART: [art] Derive Key Pair
20,862,991 UART: [art] Store priv key in slot 0x5
23,325,898 UART: [art] Derive Key Pair - Done
23,338,673 UART: [art] Signing Cert with AUTHO
23,339,965 UART: RITY.KEYID = 7
25,050,938 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,447 UART: [art] PUB.X = A6810A440D955D23F94FDF861EF442A75EE9142AF06DB27F9EF5BCC1FB000B473C6BEBF9A39F7640959602B8B56FC7B0
25,059,882 UART: [art] PUB.Y = 605AD66B4D3FB606AE73028864C084413C574103F62B5D42C37DD3CDEF9A80C1ED0339FEA364814523C2A25AD627211A
25,067,011 UART: [art] SIG.R = 535C585236F700CC509DF4C9898B6D8E05B268ED9EDED1F215CE5E80474B922A2FDE90A6910B7A123211D540914641C8
25,074,348 UART: [art] SIG.S = 22C0A1D8D1261781579F7B2C337E9CEB8A937594FA4783EA7B58A1C5C208D40916740BC5803903D28C050C414110CF57
26,052,816 UART: Caliptra RT
26,053,524 UART: [state] CFI Enabled
26,218,785 UART: [rt] RT listening for mailbox commands...
26,220,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,251,368 UART: [rt]cmd =0x44504543, len=24
26,292,899 >>> mbox cmd response data (40 bytes)
26,294,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,795 UART: [rt]cmd =0x44504543, len=96
26,384,382 >>> mbox cmd response data (56 bytes)
26,385,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,618 UART: [rt]cmd =0x44504543, len=96
26,491,403 >>> mbox cmd response data (56 bytes)
26,492,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,522,673 UART: [rt]cmd =0x44504543, len=96
26,598,031 >>> mbox cmd response data (56 bytes)
26,598,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,629,335 UART: [rt]cmd =0x44504543, len=96
26,704,689 >>> mbox cmd response data (56 bytes)
26,705,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,839 UART: [rt]cmd =0x44504543, len=96
26,812,135 >>> mbox cmd response data (56 bytes)
26,812,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,843,550 UART: [rt]cmd =0x44504543, len=96
26,918,797 >>> mbox cmd response data (56 bytes)
26,919,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,950,049 UART: [rt]cmd =0x44504543, len=96
27,025,225 >>> mbox cmd response data (56 bytes)
27,025,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,056,534 UART: [rt]cmd =0x44504543, len=96
27,132,628 >>> mbox cmd response data (56 bytes)
27,133,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,163,880 UART: [rt]cmd =0x44504543, len=96
27,239,629 >>> mbox cmd response data (56 bytes)
27,240,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,270,794 UART: [rt]cmd =0x44504543, len=96
27,346,632 >>> mbox cmd response data (56 bytes)
27,347,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,377,825 UART: [rt]cmd =0x44504543, len=96
27,453,748 >>> mbox cmd response data (56 bytes)
27,454,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,484,826 UART: [rt]cmd =0x44504543, len=96
27,560,800 >>> mbox cmd response data (56 bytes)
27,561,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,592,112 UART: [rt]cmd =0x44504543, len=96
27,667,832 >>> mbox cmd response data (56 bytes)
27,668,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,698,916 UART: [rt]cmd =0x44504543, len=96
27,774,550 >>> mbox cmd response data (56 bytes)
27,775,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,805,586 UART: [rt]cmd =0x44504543, len=96
27,812,129 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,436,771 ready_for_fw is high
3,437,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,036 >>> mbox cmd response: success
19,026,877 UART:
19,027,284 UART: Running Caliptra FMC ...
19,028,435 UART:
19,028,605 UART: [state] CFI Enabled
19,096,025 UART: [fht] FMC Alias Private Key: 7
20,860,460 UART: [art] Extend RT PCRs Done
20,861,684 UART: [art] Lock RT PCRs Done
20,863,146 UART: [art] Populate DV Done
20,868,716 UART: [fht] FMC Alias Private Key: 7
20,870,366 UART: [art] Derive CDI
20,871,181 UART: [art] Store in in slot 0x4
20,928,923 UART: [art] Derive Key Pair
20,929,960 UART: [art] Store priv key in slot 0x5
23,392,745 UART: [art] Derive Key Pair - Done
23,406,120 UART: [art] Signing Cert with AUTHO
23,407,434 UART: RITY.KEYID = 7
25,118,296 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,807 UART: [art] PUB.X = D4F20C2DF10DEEBE6CE7D7B7AF0FFA2E85349BA77ACF4BE9F4C1EE41BF7647514ADC825872BE584D53D5F33075318ACC
25,127,111 UART: [art] PUB.Y = 40C5A0C60B46BD9F9179DEB7BB31EAEDCCC796DAA3B987916761B0A3433818817AB13898EE945BDB516228D0094A122E
25,134,355 UART: [art] SIG.R = 386960BEB142A25F7C05CB125935A1901EF841D76EB6308930115F8D7C4F3FBA5FC1F3EEFAFC3EB09B5877E8DD03A178
25,141,792 UART: [art] SIG.S = 368E8FF735AAF28F84ED584027586C75DAF9B07952BCA2F4A77D3DEDB9F665181E0B71283BC4359F37CDA1BF60E12FBB
26,120,824 UART: Caliptra RT
26,121,537 UART: [state] CFI Enabled
26,286,860 UART: [rt] RT listening for mailbox commands...
26,288,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,319,143 UART: [rt]cmd =0x44504543, len=24
26,360,502 >>> mbox cmd response data (40 bytes)
26,361,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,392,582 UART: [rt]cmd =0x44504543, len=96
26,451,844 >>> mbox cmd response data (56 bytes)
26,452,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,483,121 UART: [rt]cmd =0x44504543, len=96
26,559,265 >>> mbox cmd response data (56 bytes)
26,560,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,590,771 UART: [rt]cmd =0x44504543, len=96
26,665,525 >>> mbox cmd response data (56 bytes)
26,666,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,696,624 UART: [rt]cmd =0x44504543, len=96
26,772,479 >>> mbox cmd response data (56 bytes)
26,773,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,803,747 UART: [rt]cmd =0x44504543, len=96
26,879,416 >>> mbox cmd response data (56 bytes)
26,880,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,910,784 UART: [rt]cmd =0x44504543, len=96
26,986,303 >>> mbox cmd response data (56 bytes)
26,987,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,017,671 UART: [rt]cmd =0x44504543, len=96
27,093,334 >>> mbox cmd response data (56 bytes)
27,094,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,124,393 UART: [rt]cmd =0x44504543, len=96
27,200,059 >>> mbox cmd response data (56 bytes)
27,200,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,231,600 UART: [rt]cmd =0x44504543, len=96
27,307,226 >>> mbox cmd response data (56 bytes)
27,307,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,338,597 UART: [rt]cmd =0x44504543, len=96
27,413,664 >>> mbox cmd response data (56 bytes)
27,414,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,444,939 UART: [rt]cmd =0x44504543, len=96
27,520,338 >>> mbox cmd response data (56 bytes)
27,521,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,551,767 UART: [rt]cmd =0x44504543, len=96
27,627,347 >>> mbox cmd response data (56 bytes)
27,628,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,658,616 UART: [rt]cmd =0x44504543, len=96
27,734,550 >>> mbox cmd response data (56 bytes)
27,735,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,765,578 UART: [rt]cmd =0x44504543, len=96
27,841,394 >>> mbox cmd response data (56 bytes)
27,842,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,872,533 UART: [rt]cmd =0x44504543, len=96
27,878,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,283 UART:
192,664 UART: Running Caliptra ROM ...
193,780 UART:
603,491 UART: [state] CFI Enabled
617,159 UART: [state] LifecycleState = Unprovisioned
619,524 UART: [state] DebugLocked = No
621,260 UART: [state] WD Timer not started. Device not locked for debugging
625,078 UART: [kat] SHA2-256
814,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,720 UART: [kat] ++
826,321 UART: [kat] sha1
837,976 UART: [kat] SHA2-256
840,977 UART: [kat] SHA2-384
846,135 UART: [kat] SHA2-512-ACC
848,698 UART: [kat] ECC-384
3,289,834 UART: [kat] HMAC-384Kdf
3,302,435 UART: [kat] LMS
3,834,263 UART: [kat] --
3,840,440 UART: [cold-reset] ++
3,842,084 UART: [fht] FHT @ 0x50003400
3,853,125 UART: [idev] ++
3,853,760 UART: [idev] CDI.KEYID = 6
3,854,708 UART: [idev] SUBJECT.KEYID = 7
3,855,941 UART: [idev] UDS.KEYID = 0
3,856,833 ready_for_fw is high
3,857,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,854 UART: [idev] Erasing UDS.KEYID = 0
6,332,282 UART: [idev] Sha1 KeyId Algorithm
6,353,803 UART: [idev] --
6,357,738 UART: [ldev] ++
6,358,427 UART: [ldev] CDI.KEYID = 6
6,359,302 UART: [ldev] SUBJECT.KEYID = 5
6,360,506 UART: [ldev] AUTHORITY.KEYID = 7
6,361,729 UART: [ldev] FE.KEYID = 1
6,372,568 UART: [ldev] Erasing FE.KEYID = 1
8,849,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,477 UART: [ldev] --
10,642,165 UART: [fwproc] Wait for Commands...
10,644,895 UART: [fwproc] Recv command 0x46574c44
10,647,201 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,507 >>> mbox cmd response: success
14,834,909 UART: [afmc] ++
14,835,615 UART: [afmc] CDI.KEYID = 6
14,836,774 UART: [afmc] SUBJECT.KEYID = 7
14,838,313 UART: [afmc] AUTHORITY.KEYID = 5
17,341,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,936 UART: [afmc] --
19,134,826 UART: [cold-reset] --
19,139,440 UART: [state] Locking Datavault
19,144,424 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,589 UART: [state] Locking ICCM
19,149,442 UART: [exit] Launching FMC @ 0x40000130
19,158,115 UART:
19,158,342 UART: Running Caliptra FMC ...
19,159,433 UART:
19,159,579 UART: [state] CFI Enabled
19,167,355 UART: [fht] FMC Alias Private Key: 7
20,924,290 UART: [art] Extend RT PCRs Done
20,925,515 UART: [art] Lock RT PCRs Done
20,927,683 UART: [art] Populate DV Done
20,933,359 UART: [fht] FMC Alias Private Key: 7
20,934,940 UART: [art] Derive CDI
20,935,744 UART: [art] Store in in slot 0x4
20,978,226 UART: [art] Derive Key Pair
20,979,216 UART: [art] Store priv key in slot 0x5
23,406,278 UART: [art] Derive Key Pair - Done
23,419,133 UART: [art] Signing Cert with AUTHO
23,420,439 UART: RITY.KEYID = 7
25,125,529 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,030 UART: [art] PUB.X = D005082C0F316720DE2E87E644EC8B005E44C7644F83CB548693FED97C0291DDC8AFF510D4F3E310ED384CE263FE20F0
25,134,248 UART: [art] PUB.Y = 54FAE4EE9CF3CF743C1FEF43AE9FB6D5E255C0B8DDA28D902323D7F6F83E07810AE0033819999ECCA76AB4584495B28E
25,141,570 UART: [art] SIG.R = 474A76EBB754AC6DDB583ACC25EBE7045A623ED87C25518A78CC2E0F558ED5D53E3732F58CFAB242AD14B7CD6DD85DA5
25,148,997 UART: [art] SIG.S = 6E9DBF10636FF0A51343A348CC64A9EE1C733CBF109D94B743F248AFD0B73ED790B314A6C31BE047BAEE1B8A3BF212FC
26,128,017 UART: Caliptra RT
26,128,704 UART: [state] CFI Enabled
26,245,432 UART: [rt] RT listening for mailbox commands...
26,247,333 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,277,288 UART: [rt]cmd =0x44504543, len=24
26,303,910 >>> mbox cmd response data (40 bytes)
26,305,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,997 UART: [rt]cmd =0x44504543, len=96
26,375,502 >>> mbox cmd response data (56 bytes)
26,376,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,406,827 UART: [rt]cmd =0x44504543, len=96
26,447,770 >>> mbox cmd response data (56 bytes)
26,448,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,479,141 UART: [rt]cmd =0x44504543, len=96
26,519,148 >>> mbox cmd response data (56 bytes)
26,519,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,550,276 UART: [rt]cmd =0x44504543, len=96
26,592,043 >>> mbox cmd response data (56 bytes)
26,592,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,623,442 UART: [rt]cmd =0x44504543, len=96
26,664,778 >>> mbox cmd response data (56 bytes)
26,665,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,696,167 UART: [rt]cmd =0x44504543, len=96
26,737,067 >>> mbox cmd response data (56 bytes)
26,737,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,768,271 UART: [rt]cmd =0x44504543, len=96
26,810,797 >>> mbox cmd response data (56 bytes)
26,811,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,841,914 UART: [rt]cmd =0x44504543, len=96
26,885,008 >>> mbox cmd response data (56 bytes)
26,885,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,916,098 UART: [rt]cmd =0x44504543, len=96
26,959,334 >>> mbox cmd response data (56 bytes)
26,960,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,990,470 UART: [rt]cmd =0x44504543, len=96
27,033,076 >>> mbox cmd response data (56 bytes)
27,033,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,064,216 UART: [rt]cmd =0x44504543, len=96
27,107,204 >>> mbox cmd response data (56 bytes)
27,107,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,138,452 UART: [rt]cmd =0x44504543, len=96
27,181,942 >>> mbox cmd response data (56 bytes)
27,182,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,213,132 UART: [rt]cmd =0x44504543, len=96
27,256,649 >>> mbox cmd response data (56 bytes)
27,257,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,288,009 UART: [rt]cmd =0x44504543, len=96
27,332,013 >>> mbox cmd response data (56 bytes)
27,332,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,363,143 UART: [rt]cmd =0x44504543, len=96
27,369,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,755,492 ready_for_fw is high
3,756,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,809 >>> mbox cmd response: success
19,210,775 UART:
19,211,173 UART: Running Caliptra FMC ...
19,212,304 UART:
19,212,452 UART: [state] CFI Enabled
19,220,462 UART: [fht] FMC Alias Private Key: 7
20,977,216 UART: [art] Extend RT PCRs Done
20,978,454 UART: [art] Lock RT PCRs Done
20,979,973 UART: [art] Populate DV Done
20,985,220 UART: [fht] FMC Alias Private Key: 7
20,986,909 UART: [art] Derive CDI
20,987,681 UART: [art] Store in in slot 0x4
21,030,271 UART: [art] Derive Key Pair
21,031,272 UART: [art] Store priv key in slot 0x5
23,458,181 UART: [art] Derive Key Pair - Done
23,470,907 UART: [art] Signing Cert with AUTHO
23,472,238 UART: RITY.KEYID = 7
25,177,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,291 UART: [art] PUB.X = F097150223690DA2C99F3E622D14C9F8CF4711B27734315623A44C1AF3253D9FC2EC2DE7273939392A0527D239FAF254
25,186,514 UART: [art] PUB.Y = 117BBB4E3962A4A54D8769CF2B3AAC57BD800DCA4B28B46D2E2DDECDAA31E734B7ECB1977E739D485B11C9A71115E1AF
25,193,847 UART: [art] SIG.R = F68369D3D19DFD0E80127DAD055C6614A4C7B224D25B988F6F2C01B215D3DD8E0200446B8B3F1AC3CF14D3F49ACC6D68
25,201,218 UART: [art] SIG.S = 308FF95FBC860B63D46943CE91A50B64943625BC4117F386AF2E85C37EBD5B6236928883E5C40468B76D3AFB00006D8C
26,179,641 UART: Caliptra RT
26,180,329 UART: [state] CFI Enabled
26,296,912 UART: [rt] RT listening for mailbox commands...
26,298,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,688 UART: [rt]cmd =0x44504543, len=24
26,354,768 >>> mbox cmd response data (40 bytes)
26,356,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,709 UART: [rt]cmd =0x44504543, len=96
26,427,253 >>> mbox cmd response data (56 bytes)
26,428,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,542 UART: [rt]cmd =0x44504543, len=96
26,498,501 >>> mbox cmd response data (56 bytes)
26,499,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,529,572 UART: [rt]cmd =0x44504543, len=96
26,569,752 >>> mbox cmd response data (56 bytes)
26,570,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,600,774 UART: [rt]cmd =0x44504543, len=96
26,641,576 >>> mbox cmd response data (56 bytes)
26,642,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,672,766 UART: [rt]cmd =0x44504543, len=96
26,714,856 >>> mbox cmd response data (56 bytes)
26,715,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,746,139 UART: [rt]cmd =0x44504543, len=96
26,788,936 >>> mbox cmd response data (56 bytes)
26,789,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,820,341 UART: [rt]cmd =0x44504543, len=96
26,862,578 >>> mbox cmd response data (56 bytes)
26,863,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,893,835 UART: [rt]cmd =0x44504543, len=96
26,937,202 >>> mbox cmd response data (56 bytes)
26,937,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,968,614 UART: [rt]cmd =0x44504543, len=96
27,011,764 >>> mbox cmd response data (56 bytes)
27,012,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,042,912 UART: [rt]cmd =0x44504543, len=96
27,086,006 >>> mbox cmd response data (56 bytes)
27,086,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,117,353 UART: [rt]cmd =0x44504543, len=96
27,160,623 >>> mbox cmd response data (56 bytes)
27,161,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,191,629 UART: [rt]cmd =0x44504543, len=96
27,235,052 >>> mbox cmd response data (56 bytes)
27,235,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,266,474 UART: [rt]cmd =0x44504543, len=96
27,309,944 >>> mbox cmd response data (56 bytes)
27,310,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,340,923 UART: [rt]cmd =0x44504543, len=96
27,385,517 >>> mbox cmd response data (56 bytes)
27,386,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,416,642 UART: [rt]cmd =0x44504543, len=96
27,423,101 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,709 UART: [kat] SHA2-256
881,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,755 UART: [kat] ++
885,907 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,848 UART: [kat] SHA2-512-ACC
896,749 UART: [kat] ECC-384
902,154 UART: [kat] HMAC-384Kdf
906,728 UART: [kat] LMS
1,474,924 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,479,078 UART: [idev] ++
1,479,246 UART: [idev] CDI.KEYID = 6
1,479,606 UART: [idev] SUBJECT.KEYID = 7
1,480,030 UART: [idev] UDS.KEYID = 0
1,480,375 ready_for_fw is high
1,480,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,156 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,558 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,520,935 UART: [ldev] Erasing FE.KEYID = 1
1,545,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,134 UART: [ldev] --
1,585,603 UART: [fwproc] Waiting for Commands...
1,586,400 UART: [fwproc] Received command 0x46574c44
1,587,191 UART: [fwproc] Received Image of size 114448 bytes
2,886,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,073 >>> mbox cmd response: success
3,080,159 UART: [afmc] ++
3,080,327 UART: [afmc] CDI.KEYID = 6
3,080,689 UART: [afmc] SUBJECT.KEYID = 7
3,081,114 UART: [afmc] AUTHORITY.KEYID = 5
3,115,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,210 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,900 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,823 UART: [afmc] --
3,158,767 UART: [cold-reset] --
3,159,681 UART: [state] Locking Datavault
3,160,788 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,392 UART: [state] Locking ICCM
3,161,928 UART: [exit] Launching FMC @ 0x40000130
3,167,257 UART:
3,167,273 UART: Running Caliptra FMC ...
3,167,681 UART:
3,167,735 UART: [state] CFI Enabled
3,178,098 UART: [fht] FMC Alias Private Key: 7
3,285,573 UART: [art] Extend RT PCRs Done
3,286,001 UART: [art] Lock RT PCRs Done
3,287,535 UART: [art] Populate DV Done
3,295,714 UART: [fht] FMC Alias Private Key: 7
3,296,828 UART: [art] Derive CDI
3,297,108 UART: [art] Store in in slot 0x4
3,382,849 UART: [art] Derive Key Pair
3,383,209 UART: [art] Store priv key in slot 0x5
3,396,643 UART: [art] Derive Key Pair - Done
3,411,333 UART: [art] Signing Cert with AUTHO
3,411,813 UART: RITY.KEYID = 7
3,426,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,748 UART: [art] PUB.X = F545E14A014D5DE01437C475530C55D1FC2F1AE85615B510E94B1C20A92A88B39C28B54A4237D2630C785E51DAD53FA0
3,434,511 UART: [art] PUB.Y = 13ED854CBA0531D2ED06D82D8F7CBA1B618F33B91C3CB3980CE6B86EE08F2AB73E062EA8607B34E22576C5285F04E115
3,441,456 UART: [art] SIG.R = 1EA2FDF4686BC6E488B1D5AF3861F2966E17FA2D5BB273CD58BBD64B221E73CE92D481612AFD06A9F47C41D6614199A7
3,448,235 UART: [art] SIG.S = 7D90FB1CA1C4042107A5E20556CEA64EFD4DAAA2A0A0C6F414120F26055A6496C37744AB37E5C9A8798F22554C68261B
3,472,307 UART: Caliptra RT
3,472,560 UART: [state] CFI Enabled
3,580,550 UART: [rt] RT listening for mailbox commands...
3,581,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,126 UART: [rt]cmd =0x44504543, len=24
3,637,328 >>> mbox cmd response data (40 bytes)
3,637,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,114 UART: [rt]cmd =0x44504543, len=96
3,707,105 >>> mbox cmd response data (56 bytes)
3,707,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,275 UART: [rt]cmd =0x44504543, len=96
3,777,923 >>> mbox cmd response data (56 bytes)
3,777,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,755 UART: [rt]cmd =0x44504543, len=96
3,848,201 >>> mbox cmd response data (56 bytes)
3,848,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,345 UART: [rt]cmd =0x44504543, len=96
3,920,069 >>> mbox cmd response data (56 bytes)
3,920,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,063 UART: [rt]cmd =0x44504543, len=96
3,991,723 >>> mbox cmd response data (56 bytes)
3,991,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,723 UART: [rt]cmd =0x44504543, len=96
4,062,499 >>> mbox cmd response data (56 bytes)
4,062,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,653 UART: [rt]cmd =0x44504543, len=96
4,135,315 >>> mbox cmd response data (56 bytes)
4,135,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,109 UART: [rt]cmd =0x44504543, len=96
4,207,725 >>> mbox cmd response data (56 bytes)
4,207,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,237,765 UART: [rt]cmd =0x44504543, len=96
4,280,461 >>> mbox cmd response data (56 bytes)
4,280,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,310,529 UART: [rt]cmd =0x44504543, len=96
4,353,331 >>> mbox cmd response data (56 bytes)
4,353,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,383,441 UART: [rt]cmd =0x44504543, len=96
4,426,331 >>> mbox cmd response data (56 bytes)
4,426,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,456,141 UART: [rt]cmd =0x44504543, len=96
4,500,125 >>> mbox cmd response data (56 bytes)
4,500,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,529,879 UART: [rt]cmd =0x44504543, len=96
4,574,025 >>> mbox cmd response data (56 bytes)
4,574,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,603,817 UART: [rt]cmd =0x44504543, len=96
4,648,747 >>> mbox cmd response data (56 bytes)
4,648,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,678,687 UART: [rt]cmd =0x44504543, len=96
4,685,872 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 ready_for_fw is high
1,362,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,549 >>> mbox cmd response: success
2,991,437 UART:
2,991,453 UART: Running Caliptra FMC ...
2,991,861 UART:
2,991,915 UART: [state] CFI Enabled
3,002,656 UART: [fht] FMC Alias Private Key: 7
3,111,105 UART: [art] Extend RT PCRs Done
3,111,533 UART: [art] Lock RT PCRs Done
3,113,323 UART: [art] Populate DV Done
3,121,508 UART: [fht] FMC Alias Private Key: 7
3,122,566 UART: [art] Derive CDI
3,122,846 UART: [art] Store in in slot 0x4
3,208,639 UART: [art] Derive Key Pair
3,208,999 UART: [art] Store priv key in slot 0x5
3,222,193 UART: [art] Derive Key Pair - Done
3,237,012 UART: [art] Signing Cert with AUTHO
3,237,492 UART: RITY.KEYID = 7
3,252,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,617 UART: [art] PUB.X = B6072E212510D343FD7AB34A7787834D6225C2BA1FB6BA33533ADB4B7973F0EEB67C11A7693C9FF010E88CA407852E02
3,260,382 UART: [art] PUB.Y = E27778640F7ABD30796BB7FBDA0A658B50B0D50587212CFCB63AD1020359DF53FBD60F4143B226087F4DB40AC7846F94
3,267,314 UART: [art] SIG.R = B009D9D43CAAFDC801FB2D5E310C002284115CB5DB36B4C725BEE9FF41526E849926E1A119F00518C412A264DF3432F8
3,274,056 UART: [art] SIG.S = E77FAEF2BF7CC581B25756EA47F000DFD5DD3F93C0B6A0839E1743CE467BC7E0EC2A2BDBBA7A229F8D0EF2D48F11C1DC
3,297,880 UART: Caliptra RT
3,298,133 UART: [state] CFI Enabled
3,405,567 UART: [rt] RT listening for mailbox commands...
3,406,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,987 UART: [rt]cmd =0x44504543, len=24
3,461,991 >>> mbox cmd response data (40 bytes)
3,461,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,965 UART: [rt]cmd =0x44504543, len=96
3,531,742 >>> mbox cmd response data (56 bytes)
3,531,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,628 UART: [rt]cmd =0x44504543, len=96
3,602,002 >>> mbox cmd response data (56 bytes)
3,602,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,840 UART: [rt]cmd =0x44504543, len=96
3,672,650 >>> mbox cmd response data (56 bytes)
3,672,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,644 UART: [rt]cmd =0x44504543, len=96
3,743,704 >>> mbox cmd response data (56 bytes)
3,743,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,852 UART: [rt]cmd =0x44504543, len=96
3,815,124 >>> mbox cmd response data (56 bytes)
3,815,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,028 UART: [rt]cmd =0x44504543, len=96
3,886,558 >>> mbox cmd response data (56 bytes)
3,886,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,378 UART: [rt]cmd =0x44504543, len=96
3,958,122 >>> mbox cmd response data (56 bytes)
3,958,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,050 UART: [rt]cmd =0x44504543, len=96
4,030,184 >>> mbox cmd response data (56 bytes)
4,030,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,060,284 UART: [rt]cmd =0x44504543, len=96
4,102,664 >>> mbox cmd response data (56 bytes)
4,102,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,498 UART: [rt]cmd =0x44504543, len=96
4,175,478 >>> mbox cmd response data (56 bytes)
4,175,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,205,378 UART: [rt]cmd =0x44504543, len=96
4,248,736 >>> mbox cmd response data (56 bytes)
4,248,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,744 UART: [rt]cmd =0x44504543, len=96
4,321,346 >>> mbox cmd response data (56 bytes)
4,321,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,351,294 UART: [rt]cmd =0x44504543, len=96
4,394,670 >>> mbox cmd response data (56 bytes)
4,394,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,424,720 UART: [rt]cmd =0x44504543, len=96
4,469,090 >>> mbox cmd response data (56 bytes)
4,469,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,046 UART: [rt]cmd =0x44504543, len=96
4,506,297 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,586 UART: [kat] SHA2-256
882,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,632 UART: [kat] ++
886,784 UART: [kat] sha1
891,102 UART: [kat] SHA2-256
893,040 UART: [kat] SHA2-384
895,637 UART: [kat] SHA2-512-ACC
897,538 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,755 UART: [kat] LMS
1,475,951 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,176 UART: [fht] Storing FHT @ 0x50003400
1,480,103 UART: [idev] ++
1,480,271 UART: [idev] CDI.KEYID = 6
1,480,631 UART: [idev] SUBJECT.KEYID = 7
1,481,055 UART: [idev] UDS.KEYID = 0
1,481,400 ready_for_fw is high
1,481,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,506,107 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,660 UART: [ldev] ++
1,515,828 UART: [ldev] CDI.KEYID = 6
1,516,191 UART: [ldev] SUBJECT.KEYID = 5
1,516,617 UART: [ldev] AUTHORITY.KEYID = 7
1,517,080 UART: [ldev] FE.KEYID = 1
1,522,192 UART: [ldev] Erasing FE.KEYID = 1
1,547,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,877 UART: [ldev] --
1,586,276 UART: [fwproc] Waiting for Commands...
1,586,947 UART: [fwproc] Received command 0x46574c44
1,587,738 UART: [fwproc] Received Image of size 114448 bytes
2,887,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,725 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,168 >>> mbox cmd response: success
3,081,244 UART: [afmc] ++
3,081,412 UART: [afmc] CDI.KEYID = 6
3,081,774 UART: [afmc] SUBJECT.KEYID = 7
3,082,199 UART: [afmc] AUTHORITY.KEYID = 5
3,117,422 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,088 UART: [afmc] --
3,160,978 UART: [cold-reset] --
3,161,672 UART: [state] Locking Datavault
3,162,701 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,305 UART: [state] Locking ICCM
3,163,835 UART: [exit] Launching FMC @ 0x40000130
3,169,164 UART:
3,169,180 UART: Running Caliptra FMC ...
3,169,588 UART:
3,169,731 UART: [state] CFI Enabled
3,180,594 UART: [fht] FMC Alias Private Key: 7
3,288,833 UART: [art] Extend RT PCRs Done
3,289,261 UART: [art] Lock RT PCRs Done
3,290,665 UART: [art] Populate DV Done
3,298,968 UART: [fht] FMC Alias Private Key: 7
3,300,014 UART: [art] Derive CDI
3,300,294 UART: [art] Store in in slot 0x4
3,385,781 UART: [art] Derive Key Pair
3,386,141 UART: [art] Store priv key in slot 0x5
3,399,743 UART: [art] Derive Key Pair - Done
3,414,282 UART: [art] Signing Cert with AUTHO
3,414,762 UART: RITY.KEYID = 7
3,429,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,419 UART: [art] PUB.X = 6F99C3144485D3F1E8768EF9A37D6EDE98FFA5BC37070B02265D7A596765FBFDBB6E08FD1201A126EC4E2E01C99F2DD9
3,437,185 UART: [art] PUB.Y = F6D70FB09C3D8DD847E6E863B1E7892997D6B78D097330B6D1513C9A65A3B6102929C84A5A6A6A10039C7486E7718A7C
3,444,124 UART: [art] SIG.R = 09831ADCE24F17CAF2BF51E367A3124AED0D7AF9B4B47CF7A1D309CC1FE889952610807A2603789CC8C911B685A39227
3,450,888 UART: [art] SIG.S = 190B357764F0DC2688089614BA322399A483375F5ADD21A96B5A285656D40805BEAFB9DACBDFE9C8FDDF5303DF076C6D
3,474,989 UART: Caliptra RT
3,475,334 UART: [state] CFI Enabled
3,582,808 UART: [rt] RT listening for mailbox commands...
3,583,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,272 UART: [rt]cmd =0x44504543, len=24
3,639,648 >>> mbox cmd response data (40 bytes)
3,639,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,534 UART: [rt]cmd =0x44504543, len=96
3,709,887 >>> mbox cmd response data (56 bytes)
3,709,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,943 UART: [rt]cmd =0x44504543, len=96
3,780,267 >>> mbox cmd response data (56 bytes)
3,780,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,457 UART: [rt]cmd =0x44504543, len=96
3,850,959 >>> mbox cmd response data (56 bytes)
3,850,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,037 UART: [rt]cmd =0x44504543, len=96
3,922,355 >>> mbox cmd response data (56 bytes)
3,922,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,257 UART: [rt]cmd =0x44504543, len=96
3,993,579 >>> mbox cmd response data (56 bytes)
3,993,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,565 UART: [rt]cmd =0x44504543, len=96
4,064,877 >>> mbox cmd response data (56 bytes)
4,064,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,717 UART: [rt]cmd =0x44504543, len=96
4,136,675 >>> mbox cmd response data (56 bytes)
4,136,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,673 UART: [rt]cmd =0x44504543, len=96
4,208,617 >>> mbox cmd response data (56 bytes)
4,208,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,238,691 UART: [rt]cmd =0x44504543, len=96
4,281,223 >>> mbox cmd response data (56 bytes)
4,281,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,311,189 UART: [rt]cmd =0x44504543, len=96
4,354,439 >>> mbox cmd response data (56 bytes)
4,354,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,384,405 UART: [rt]cmd =0x44504543, len=96
4,427,337 >>> mbox cmd response data (56 bytes)
4,427,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,457,407 UART: [rt]cmd =0x44504543, len=96
4,501,113 >>> mbox cmd response data (56 bytes)
4,501,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,531,121 UART: [rt]cmd =0x44504543, len=96
4,574,065 >>> mbox cmd response data (56 bytes)
4,574,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,603,825 UART: [rt]cmd =0x44504543, len=96
4,647,233 >>> mbox cmd response data (56 bytes)
4,647,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,677,081 UART: [rt]cmd =0x44504543, len=96
4,684,488 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,312 ready_for_fw is high
1,363,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,804 >>> mbox cmd response: success
2,991,868 UART:
2,991,884 UART: Running Caliptra FMC ...
2,992,292 UART:
2,992,435 UART: [state] CFI Enabled
3,002,934 UART: [fht] FMC Alias Private Key: 7
3,111,295 UART: [art] Extend RT PCRs Done
3,111,723 UART: [art] Lock RT PCRs Done
3,113,187 UART: [art] Populate DV Done
3,121,418 UART: [fht] FMC Alias Private Key: 7
3,122,414 UART: [art] Derive CDI
3,122,694 UART: [art] Store in in slot 0x4
3,208,309 UART: [art] Derive Key Pair
3,208,669 UART: [art] Store priv key in slot 0x5
3,221,715 UART: [art] Derive Key Pair - Done
3,236,730 UART: [art] Signing Cert with AUTHO
3,237,210 UART: RITY.KEYID = 7
3,252,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,593 UART: [art] PUB.X = DDA639105AB228FE288A71629B37398F5F27AB20A83097D5D41A2E9298E1AD94CBD3831C0A5997D62B29606D415A1523
3,260,358 UART: [art] PUB.Y = 90EFD7996DA1BD848DAABE37D3AD4DDBD1F30632189CEC7A9099EBDBF2511348900D8307397D67D4869A44F6AF837A51
3,267,311 UART: [art] SIG.R = 5433AF544895ACEEB2BE4222735817CEA935C1F9B0F3A2C17B7FE53FA3FB48818B1682A354E586994438AF74B15B4C49
3,274,085 UART: [art] SIG.S = FDBC44560C4BAAF31CECD0FDEE6B278803C325A05F8FE4934014411194A2B240D8D27B7DC620F6BB1954A43BFEDF08EE
3,297,193 UART: Caliptra RT
3,297,538 UART: [state] CFI Enabled
3,405,041 UART: [rt] RT listening for mailbox commands...
3,405,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,581 UART: [rt]cmd =0x44504543, len=24
3,461,693 >>> mbox cmd response data (40 bytes)
3,461,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,729 UART: [rt]cmd =0x44504543, len=96
3,532,270 >>> mbox cmd response data (56 bytes)
3,532,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,228 UART: [rt]cmd =0x44504543, len=96
3,603,134 >>> mbox cmd response data (56 bytes)
3,603,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,986 UART: [rt]cmd =0x44504543, len=96
3,673,732 >>> mbox cmd response data (56 bytes)
3,673,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,620 UART: [rt]cmd =0x44504543, len=96
3,744,724 >>> mbox cmd response data (56 bytes)
3,744,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,568 UART: [rt]cmd =0x44504543, len=96
3,816,158 >>> mbox cmd response data (56 bytes)
3,816,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,384 UART: [rt]cmd =0x44504543, len=96
3,888,264 >>> mbox cmd response data (56 bytes)
3,888,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,232 UART: [rt]cmd =0x44504543, len=96
3,960,712 >>> mbox cmd response data (56 bytes)
3,960,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,798 UART: [rt]cmd =0x44504543, len=96
4,034,010 >>> mbox cmd response data (56 bytes)
4,034,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,218 UART: [rt]cmd =0x44504543, len=96
4,107,428 >>> mbox cmd response data (56 bytes)
4,107,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,137,412 UART: [rt]cmd =0x44504543, len=96
4,180,874 >>> mbox cmd response data (56 bytes)
4,180,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,210,834 UART: [rt]cmd =0x44504543, len=96
4,254,136 >>> mbox cmd response data (56 bytes)
4,254,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,283,954 UART: [rt]cmd =0x44504543, len=96
4,328,334 >>> mbox cmd response data (56 bytes)
4,328,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,358,236 UART: [rt]cmd =0x44504543, len=96
4,402,408 >>> mbox cmd response data (56 bytes)
4,402,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,432,158 UART: [rt]cmd =0x44504543, len=96
4,476,886 >>> mbox cmd response data (56 bytes)
4,476,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,506,752 UART: [rt]cmd =0x44504543, len=96
4,513,859 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
892,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,035 UART: [kat] ++
897,187 UART: [kat] sha1
901,371 UART: [kat] SHA2-256
903,311 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
917,766 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,703 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 ready_for_fw is high
1,176,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,069 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,429 UART: [ldev] ++
1,210,597 UART: [ldev] CDI.KEYID = 6
1,210,960 UART: [ldev] SUBJECT.KEYID = 5
1,211,386 UART: [ldev] AUTHORITY.KEYID = 7
1,211,849 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,282,896 UART: [fwproc] Recv command 0x46574c44
1,283,624 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,793 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,778 >>> mbox cmd response: success
2,776,790 UART: [afmc] ++
2,776,958 UART: [afmc] CDI.KEYID = 6
2,777,320 UART: [afmc] SUBJECT.KEYID = 7
2,777,745 UART: [afmc] AUTHORITY.KEYID = 5
2,813,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,403 UART: [afmc] --
2,856,481 UART: [cold-reset] --
2,857,517 UART: [state] Locking Datavault
2,858,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,394 UART: [state] Locking ICCM
2,859,836 UART: [exit] Launching FMC @ 0x40000130
2,865,165 UART:
2,865,181 UART: Running Caliptra FMC ...
2,865,589 UART:
2,865,643 UART: [state] CFI Enabled
2,875,822 UART: [fht] FMC Alias Private Key: 7
2,983,783 UART: [art] Extend RT PCRs Done
2,984,211 UART: [art] Lock RT PCRs Done
2,985,709 UART: [art] Populate DV Done
2,993,928 UART: [fht] FMC Alias Private Key: 7
2,994,912 UART: [art] Derive CDI
2,995,192 UART: [art] Store in in slot 0x4
3,080,613 UART: [art] Derive Key Pair
3,080,973 UART: [art] Store priv key in slot 0x5
3,094,065 UART: [art] Derive Key Pair - Done
3,109,236 UART: [art] Signing Cert with AUTHO
3,109,716 UART: RITY.KEYID = 7
3,125,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,899 UART: [art] PUB.X = 0D59C7FD3C8F9E2B5A99C4A0135280D739404FFD82F82E52B218599565BE1459BEC01826B1C078524B6D949B7FA232DE
3,132,668 UART: [art] PUB.Y = FF2CCA835561A397888B1577823809C0D288E11515DA4A70AEE043821A2C9EE51DB9B9FD6071DA9A78D6262FC75677C1
3,139,617 UART: [art] SIG.R = 71C7B9F74740021DE6E840384FADA6E80A4D1BF69269A6D28A38B3551E52909387BF8B2BCE6B56777FAEFCF1DFD66D1A
3,146,395 UART: [art] SIG.S = D5227DFF271BC17616E48F0DAB4A26F05BB962C5B2AEBB90F64B992AC70C7AA9D54180E1DFA87D42995F292371D946B2
3,169,796 UART: Caliptra RT
3,170,049 UART: [state] CFI Enabled
3,277,350 UART: [rt] RT listening for mailbox commands...
3,278,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,282 UART: [rt]cmd =0x44504543, len=24
3,334,378 >>> mbox cmd response data (40 bytes)
3,334,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,184 UART: [rt]cmd =0x44504543, len=96
3,403,925 >>> mbox cmd response data (56 bytes)
3,403,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,919 UART: [rt]cmd =0x44504543, len=96
3,474,289 >>> mbox cmd response data (56 bytes)
3,474,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,213 UART: [rt]cmd =0x44504543, len=96
3,545,035 >>> mbox cmd response data (56 bytes)
3,545,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,839 UART: [rt]cmd =0x44504543, len=96
3,615,565 >>> mbox cmd response data (56 bytes)
3,615,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,593 UART: [rt]cmd =0x44504543, len=96
3,686,163 >>> mbox cmd response data (56 bytes)
3,686,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,135 UART: [rt]cmd =0x44504543, len=96
3,758,059 >>> mbox cmd response data (56 bytes)
3,758,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,951 UART: [rt]cmd =0x44504543, len=96
3,830,707 >>> mbox cmd response data (56 bytes)
3,830,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,529 UART: [rt]cmd =0x44504543, len=96
3,902,707 >>> mbox cmd response data (56 bytes)
3,902,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,731 UART: [rt]cmd =0x44504543, len=96
3,975,007 >>> mbox cmd response data (56 bytes)
3,975,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,031 UART: [rt]cmd =0x44504543, len=96
4,047,867 >>> mbox cmd response data (56 bytes)
4,047,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,729 UART: [rt]cmd =0x44504543, len=96
4,121,091 >>> mbox cmd response data (56 bytes)
4,121,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,055 UART: [rt]cmd =0x44504543, len=96
4,194,699 >>> mbox cmd response data (56 bytes)
4,194,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,739 UART: [rt]cmd =0x44504543, len=96
4,268,687 >>> mbox cmd response data (56 bytes)
4,268,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,575 UART: [rt]cmd =0x44504543, len=96
4,342,387 >>> mbox cmd response data (56 bytes)
4,342,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,487 UART: [rt]cmd =0x44504543, len=96
4,379,636 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,723 ready_for_fw is high
1,060,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,921 >>> mbox cmd response: success
2,690,119 UART:
2,690,135 UART: Running Caliptra FMC ...
2,690,543 UART:
2,690,597 UART: [state] CFI Enabled
2,701,408 UART: [fht] FMC Alias Private Key: 7
2,808,593 UART: [art] Extend RT PCRs Done
2,809,021 UART: [art] Lock RT PCRs Done
2,810,615 UART: [art] Populate DV Done
2,818,844 UART: [fht] FMC Alias Private Key: 7
2,819,800 UART: [art] Derive CDI
2,820,080 UART: [art] Store in in slot 0x4
2,905,521 UART: [art] Derive Key Pair
2,905,881 UART: [art] Store priv key in slot 0x5
2,918,953 UART: [art] Derive Key Pair - Done
2,933,985 UART: [art] Signing Cert with AUTHO
2,934,465 UART: RITY.KEYID = 7
2,949,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,516 UART: [art] PUB.X = 1A223B9C3C996A84D0462B1D5BD1B9A4907954BC6B8788CC874634060EEEBEFD1E271A09AE90703E70C2A800FD472C25
2,957,261 UART: [art] PUB.Y = C26CB42655504D218B541FFE158E3894B95DA85F4F0B9D6CE4B79CF62007DA0B9A5B9D2D2855A1B6A5896659F03EB51A
2,964,210 UART: [art] SIG.R = 08BB9ED64DAE70B3AD1149F205FF82DFBEC7B387DB5D951EA04B7F186AB8511EECE34C0F623A3F9E709D85B9FA68AF62
2,970,995 UART: [art] SIG.S = BA3546990EADEAF12DA44356433860738D80B3426FF5233BC8718AA8D00A4FACD23333E2DB6DEF22B7C521D081C02F91
2,994,488 UART: Caliptra RT
2,994,741 UART: [state] CFI Enabled
3,103,090 UART: [rt] RT listening for mailbox commands...
3,103,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,856 UART: [rt]cmd =0x44504543, len=24
3,160,316 >>> mbox cmd response data (40 bytes)
3,160,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,438 UART: [rt]cmd =0x44504543, len=96
3,230,431 >>> mbox cmd response data (56 bytes)
3,230,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,529 UART: [rt]cmd =0x44504543, len=96
3,300,655 >>> mbox cmd response data (56 bytes)
3,300,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,793 UART: [rt]cmd =0x44504543, len=96
3,371,675 >>> mbox cmd response data (56 bytes)
3,371,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,819 UART: [rt]cmd =0x44504543, len=96
3,443,167 >>> mbox cmd response data (56 bytes)
3,443,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,287 UART: [rt]cmd =0x44504543, len=96
3,514,321 >>> mbox cmd response data (56 bytes)
3,514,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,367 UART: [rt]cmd =0x44504543, len=96
3,586,463 >>> mbox cmd response data (56 bytes)
3,586,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,639 UART: [rt]cmd =0x44504543, len=96
3,658,799 >>> mbox cmd response data (56 bytes)
3,658,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,667 UART: [rt]cmd =0x44504543, len=96
3,731,633 >>> mbox cmd response data (56 bytes)
3,731,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,593 UART: [rt]cmd =0x44504543, len=96
3,804,333 >>> mbox cmd response data (56 bytes)
3,804,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,153 UART: [rt]cmd =0x44504543, len=96
3,876,501 >>> mbox cmd response data (56 bytes)
3,876,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,601 UART: [rt]cmd =0x44504543, len=96
3,949,979 >>> mbox cmd response data (56 bytes)
3,949,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,893 UART: [rt]cmd =0x44504543, len=96
4,023,243 >>> mbox cmd response data (56 bytes)
4,023,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,053,199 UART: [rt]cmd =0x44504543, len=96
4,096,491 >>> mbox cmd response data (56 bytes)
4,096,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,563 UART: [rt]cmd =0x44504543, len=96
4,169,977 >>> mbox cmd response data (56 bytes)
4,169,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,881 UART: [rt]cmd =0x44504543, len=96
4,207,034 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
893,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,376 UART: [kat] ++
897,528 UART: [kat] sha1
901,818 UART: [kat] SHA2-256
903,758 UART: [kat] SHA2-384
906,389 UART: [kat] SHA2-512-ACC
908,290 UART: [kat] ECC-384
917,883 UART: [kat] HMAC-384Kdf
922,703 UART: [kat] LMS
1,171,031 UART: [kat] --
1,172,054 UART: [cold-reset] ++
1,172,576 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 ready_for_fw is high
1,176,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,489 UART: [idev] Erasing UDS.KEYID = 0
1,201,488 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,211,006 UART: [ldev] ++
1,211,174 UART: [ldev] CDI.KEYID = 6
1,211,537 UART: [ldev] SUBJECT.KEYID = 5
1,211,963 UART: [ldev] AUTHORITY.KEYID = 7
1,212,426 UART: [ldev] FE.KEYID = 1
1,217,786 UART: [ldev] Erasing FE.KEYID = 1
1,244,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,182 UART: [ldev] --
1,283,641 UART: [fwproc] Wait for Commands...
1,284,375 UART: [fwproc] Recv command 0x46574c44
1,285,103 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,157 >>> mbox cmd response: success
2,777,259 UART: [afmc] ++
2,777,427 UART: [afmc] CDI.KEYID = 6
2,777,789 UART: [afmc] SUBJECT.KEYID = 7
2,778,214 UART: [afmc] AUTHORITY.KEYID = 5
2,813,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,204 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,014 UART: [afmc] --
2,856,956 UART: [cold-reset] --
2,857,728 UART: [state] Locking Datavault
2,858,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,333 UART: [state] Locking ICCM
2,859,857 UART: [exit] Launching FMC @ 0x40000130
2,865,186 UART:
2,865,202 UART: Running Caliptra FMC ...
2,865,610 UART:
2,865,753 UART: [state] CFI Enabled
2,876,686 UART: [fht] FMC Alias Private Key: 7
2,984,937 UART: [art] Extend RT PCRs Done
2,985,365 UART: [art] Lock RT PCRs Done
2,986,927 UART: [art] Populate DV Done
2,994,890 UART: [fht] FMC Alias Private Key: 7
2,996,056 UART: [art] Derive CDI
2,996,336 UART: [art] Store in in slot 0x4
3,082,253 UART: [art] Derive Key Pair
3,082,613 UART: [art] Store priv key in slot 0x5
3,095,771 UART: [art] Derive Key Pair - Done
3,110,410 UART: [art] Signing Cert with AUTHO
3,110,890 UART: RITY.KEYID = 7
3,126,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,777 UART: [art] PUB.X = 12AFAEEF4FF31D4ECAB6537A092F0678D4D2184D7040BA340BBA04F0201FD37C83406866E8A5D819ACA8F11C947CCA56
3,133,549 UART: [art] PUB.Y = 7A2955771A4A14935C3A0162DECA7E2AB4AF3775BD73383F211A32F08C7FA2B3353312EB430E4FC235E313004BAF200B
3,140,472 UART: [art] SIG.R = 9876380C169D1CEFF52EDC16CCAC6E6CA2D29FB8FEFDE573DD72F5428DE4AE0D4E296AD696AA880F93B46BC743A91CF7
3,147,259 UART: [art] SIG.S = E622CA8CC60813DDB276E37AF5C6C7EE7EBBB5AA6A390D03A09DAF97A7CE92D4FE47DD81AC1605B657B48309797CA0EC
3,171,735 UART: Caliptra RT
3,172,080 UART: [state] CFI Enabled
3,279,356 UART: [rt] RT listening for mailbox commands...
3,280,026 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,204 UART: [rt]cmd =0x44504543, len=24
3,336,880 >>> mbox cmd response data (40 bytes)
3,336,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,902 UART: [rt]cmd =0x44504543, len=96
3,407,987 >>> mbox cmd response data (56 bytes)
3,407,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,933 UART: [rt]cmd =0x44504543, len=96
3,478,653 >>> mbox cmd response data (56 bytes)
3,478,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,513 UART: [rt]cmd =0x44504543, len=96
3,549,247 >>> mbox cmd response data (56 bytes)
3,549,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,403 UART: [rt]cmd =0x44504543, len=96
3,620,387 >>> mbox cmd response data (56 bytes)
3,620,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,141 UART: [rt]cmd =0x44504543, len=96
3,691,941 >>> mbox cmd response data (56 bytes)
3,691,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,869 UART: [rt]cmd =0x44504543, len=96
3,762,729 >>> mbox cmd response data (56 bytes)
3,762,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,757 UART: [rt]cmd =0x44504543, len=96
3,834,671 >>> mbox cmd response data (56 bytes)
3,834,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,483 UART: [rt]cmd =0x44504543, len=96
3,906,997 >>> mbox cmd response data (56 bytes)
3,906,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,891 UART: [rt]cmd =0x44504543, len=96
3,979,195 >>> mbox cmd response data (56 bytes)
3,979,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,149 UART: [rt]cmd =0x44504543, len=96
4,052,593 >>> mbox cmd response data (56 bytes)
4,052,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,381 UART: [rt]cmd =0x44504543, len=96
4,125,825 >>> mbox cmd response data (56 bytes)
4,125,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,721 UART: [rt]cmd =0x44504543, len=96
4,199,797 >>> mbox cmd response data (56 bytes)
4,199,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,585 UART: [rt]cmd =0x44504543, len=96
4,273,401 >>> mbox cmd response data (56 bytes)
4,273,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,559 UART: [rt]cmd =0x44504543, len=96
4,347,493 >>> mbox cmd response data (56 bytes)
4,347,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,279 UART: [rt]cmd =0x44504543, len=96
4,384,492 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,324 ready_for_fw is high
1,061,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,296 >>> mbox cmd response: success
2,691,562 UART:
2,691,578 UART: Running Caliptra FMC ...
2,691,986 UART:
2,692,129 UART: [state] CFI Enabled
2,702,864 UART: [fht] FMC Alias Private Key: 7
2,811,003 UART: [art] Extend RT PCRs Done
2,811,431 UART: [art] Lock RT PCRs Done
2,812,793 UART: [art] Populate DV Done
2,821,004 UART: [fht] FMC Alias Private Key: 7
2,822,148 UART: [art] Derive CDI
2,822,428 UART: [art] Store in in slot 0x4
2,907,911 UART: [art] Derive Key Pair
2,908,271 UART: [art] Store priv key in slot 0x5
2,921,227 UART: [art] Derive Key Pair - Done
2,936,048 UART: [art] Signing Cert with AUTHO
2,936,528 UART: RITY.KEYID = 7
2,951,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,517 UART: [art] PUB.X = 630DEBC8102499B0A7D59B2646AA89F5F101FF757D360EA57C6E3EB85A8A02AC1C52A00125601A825B74F94B1BF50572
2,959,273 UART: [art] PUB.Y = E9954A3A79C6B2F629D3E611AAF93856E2FD35528050C3FFE74DE1D8C0B6BA27C7961A5A6C0F3A9BBF781C7322679EAB
2,966,234 UART: [art] SIG.R = 592FDF6F512C933728D0D8EF966A0ECE50DDE6664BE7F695953863296A1B59D32378F40EC64AE08862CC8EAE60C9AE95
2,973,006 UART: [art] SIG.S = B77F9C4EC2A7D3B5BE520B601326F746D6B53E3BA01BB97DC43F4CAFE6DA4D55FF73BC295137315CA8C19558FCF9C702
2,997,577 UART: Caliptra RT
2,997,922 UART: [state] CFI Enabled
3,105,785 UART: [rt] RT listening for mailbox commands...
3,106,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,573 UART: [rt]cmd =0x44504543, len=24
3,162,887 >>> mbox cmd response data (40 bytes)
3,162,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,023 UART: [rt]cmd =0x44504543, len=96
3,232,486 >>> mbox cmd response data (56 bytes)
3,232,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,262,458 UART: [rt]cmd =0x44504543, len=96
3,303,086 >>> mbox cmd response data (56 bytes)
3,303,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,952 UART: [rt]cmd =0x44504543, len=96
3,373,490 >>> mbox cmd response data (56 bytes)
3,373,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,348 UART: [rt]cmd =0x44504543, len=96
3,444,690 >>> mbox cmd response data (56 bytes)
3,444,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,862 UART: [rt]cmd =0x44504543, len=96
3,517,016 >>> mbox cmd response data (56 bytes)
3,517,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,808 UART: [rt]cmd =0x44504543, len=96
3,588,586 >>> mbox cmd response data (56 bytes)
3,588,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,726 UART: [rt]cmd =0x44504543, len=96
3,660,884 >>> mbox cmd response data (56 bytes)
3,660,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,690 UART: [rt]cmd =0x44504543, len=96
3,733,026 >>> mbox cmd response data (56 bytes)
3,733,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,276 UART: [rt]cmd =0x44504543, len=96
3,806,042 >>> mbox cmd response data (56 bytes)
3,806,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,858 UART: [rt]cmd =0x44504543, len=96
3,879,068 >>> mbox cmd response data (56 bytes)
3,879,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,020 UART: [rt]cmd =0x44504543, len=96
3,952,286 >>> mbox cmd response data (56 bytes)
3,952,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,982,326 UART: [rt]cmd =0x44504543, len=96
4,026,398 >>> mbox cmd response data (56 bytes)
4,026,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,486 UART: [rt]cmd =0x44504543, len=96
4,100,358 >>> mbox cmd response data (56 bytes)
4,100,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,476 UART: [rt]cmd =0x44504543, len=96
4,174,436 >>> mbox cmd response data (56 bytes)
4,174,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,208 UART: [rt]cmd =0x44504543, len=96
4,211,491 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,136 UART: [kat] LMS
1,168,448 UART: [kat] --
1,169,311 UART: [cold-reset] ++
1,169,649 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,173,645 ready_for_fw is high
1,173,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,419 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,266 UART: [ldev] ++
1,208,434 UART: [ldev] CDI.KEYID = 6
1,208,798 UART: [ldev] SUBJECT.KEYID = 5
1,209,225 UART: [ldev] AUTHORITY.KEYID = 7
1,209,688 UART: [ldev] FE.KEYID = 1
1,214,700 UART: [ldev] Erasing FE.KEYID = 1
1,240,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,344 UART: [fwproc] Wait for Commands...
1,281,157 UART: [fwproc] Recv command 0x46574c44
1,281,890 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,756 >>> mbox cmd response: success
2,775,021 UART: [afmc] ++
2,775,189 UART: [afmc] CDI.KEYID = 6
2,775,552 UART: [afmc] SUBJECT.KEYID = 7
2,775,978 UART: [afmc] AUTHORITY.KEYID = 5
2,811,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,338 UART: [afmc] --
2,854,382 UART: [cold-reset] --
2,855,178 UART: [state] Locking Datavault
2,856,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,927 UART: [state] Locking ICCM
2,857,557 UART: [exit] Launching FMC @ 0x40000130
2,862,886 UART:
2,862,902 UART: Running Caliptra FMC ...
2,863,310 UART:
2,863,364 UART: [state] CFI Enabled
2,873,777 UART: [fht] FMC Alias Private Key: 7
2,981,082 UART: [art] Extend RT PCRs Done
2,981,510 UART: [art] Lock RT PCRs Done
2,983,066 UART: [art] Populate DV Done
2,991,663 UART: [fht] FMC Alias Private Key: 7
2,992,699 UART: [art] Derive CDI
2,992,979 UART: [art] Store in in slot 0x4
3,078,644 UART: [art] Derive Key Pair
3,079,004 UART: [art] Store priv key in slot 0x5
3,091,948 UART: [art] Derive Key Pair - Done
3,106,872 UART: [art] Signing Cert with AUTHO
3,107,352 UART: RITY.KEYID = 7
3,122,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,211 UART: [art] PUB.X = BAF87293F8BA84F636F433CF34DDB10E603FD432F1F206E4363F54E71A477F01A38E8A4880AB6AA9CB219574A374B5A3
3,129,980 UART: [art] PUB.Y = 483238EDF436E7A3B9C92A5DB1B1EF86587E96FEEB1A552196C7C30B52FBFD0A75F57AFAE37BA6AD5C974449966131A5
3,136,938 UART: [art] SIG.R = 1A16437E222967914732BDC48502AAA13395637DF2C0B79138385AD151CE76758DCC396815F80845C81126C73502FDAA
3,143,689 UART: [art] SIG.S = 2D83F7CFFBE7D1714DBB9E05AE45AD3A941941BD97259E759A040716FF1A181CAAB4A009682BD764EA324FC1454872A9
3,166,766 UART: Caliptra RT
3,167,019 UART: [state] CFI Enabled
3,274,706 UART: [rt] RT listening for mailbox commands...
3,275,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,314 UART: [rt]cmd =0x44504543, len=24
3,331,594 >>> mbox cmd response data (40 bytes)
3,331,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,522 UART: [rt]cmd =0x44504543, len=96
3,402,187 >>> mbox cmd response data (56 bytes)
3,402,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,201 UART: [rt]cmd =0x44504543, len=96
3,472,427 >>> mbox cmd response data (56 bytes)
3,472,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,491 UART: [rt]cmd =0x44504543, len=96
3,542,909 >>> mbox cmd response data (56 bytes)
3,542,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,763 UART: [rt]cmd =0x44504543, len=96
3,613,859 >>> mbox cmd response data (56 bytes)
3,613,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,889 UART: [rt]cmd =0x44504543, len=96
3,685,359 >>> mbox cmd response data (56 bytes)
3,685,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,429 UART: [rt]cmd =0x44504543, len=96
3,757,175 >>> mbox cmd response data (56 bytes)
3,757,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,249 UART: [rt]cmd =0x44504543, len=96
3,828,193 >>> mbox cmd response data (56 bytes)
3,828,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,081 UART: [rt]cmd =0x44504543, len=96
3,899,763 >>> mbox cmd response data (56 bytes)
3,899,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,661 UART: [rt]cmd =0x44504543, len=96
3,971,903 >>> mbox cmd response data (56 bytes)
3,971,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,823 UART: [rt]cmd =0x44504543, len=96
4,044,983 >>> mbox cmd response data (56 bytes)
4,044,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,921 UART: [rt]cmd =0x44504543, len=96
4,118,169 >>> mbox cmd response data (56 bytes)
4,118,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,191 UART: [rt]cmd =0x44504543, len=96
4,191,733 >>> mbox cmd response data (56 bytes)
4,191,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,805 UART: [rt]cmd =0x44504543, len=96
4,265,499 >>> mbox cmd response data (56 bytes)
4,265,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,295,315 UART: [rt]cmd =0x44504543, len=96
4,339,269 >>> mbox cmd response data (56 bytes)
4,339,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,369,287 UART: [rt]cmd =0x44504543, len=96
4,376,274 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,102 ready_for_fw is high
1,055,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,194 >>> mbox cmd response: success
2,684,692 UART:
2,684,708 UART: Running Caliptra FMC ...
2,685,116 UART:
2,685,170 UART: [state] CFI Enabled
2,695,585 UART: [fht] FMC Alias Private Key: 7
2,803,616 UART: [art] Extend RT PCRs Done
2,804,044 UART: [art] Lock RT PCRs Done
2,805,262 UART: [art] Populate DV Done
2,813,343 UART: [fht] FMC Alias Private Key: 7
2,814,361 UART: [art] Derive CDI
2,814,641 UART: [art] Store in in slot 0x4
2,900,118 UART: [art] Derive Key Pair
2,900,478 UART: [art] Store priv key in slot 0x5
2,913,672 UART: [art] Derive Key Pair - Done
2,928,408 UART: [art] Signing Cert with AUTHO
2,928,888 UART: RITY.KEYID = 7
2,943,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,549 UART: [art] PUB.X = 4768EB72F732612654B45DA2EFF1BFAE7892B3E2721F3AEB8160F0801A1BF41B6E5DC8353820092FB911672AE5F8C392
2,951,320 UART: [art] PUB.Y = EB9B5F4463FA519E3C2118C24BADA67D481A09FBBD59E0ED9AE2ABDA77438C1851F8BCB5B5B16437565FFA304E0B0290
2,958,279 UART: [art] SIG.R = 0AF73A8B22A287D83E41EC928FB02813563D4EEF51E8556CBCA13D80B3B86465FF22BFB044C7C562C3747A099451DE56
2,965,049 UART: [art] SIG.S = 715DAE6E39945B466F5ECD70DD9E1C6DCFF0C5155EE9A2945A5032E80145CF664AA265B5F60AC95C1A32255192343A93
2,988,796 UART: Caliptra RT
2,989,049 UART: [state] CFI Enabled
3,096,842 UART: [rt] RT listening for mailbox commands...
3,097,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,614 UART: [rt]cmd =0x44504543, len=24
3,153,848 >>> mbox cmd response data (40 bytes)
3,153,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,032 UART: [rt]cmd =0x44504543, len=96
3,224,177 >>> mbox cmd response data (56 bytes)
3,224,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,117 UART: [rt]cmd =0x44504543, len=96
3,294,221 >>> mbox cmd response data (56 bytes)
3,294,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,193 UART: [rt]cmd =0x44504543, len=96
3,364,371 >>> mbox cmd response data (56 bytes)
3,364,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,309 UART: [rt]cmd =0x44504543, len=96
3,435,205 >>> mbox cmd response data (56 bytes)
3,435,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,115 UART: [rt]cmd =0x44504543, len=96
3,507,069 >>> mbox cmd response data (56 bytes)
3,507,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,193 UART: [rt]cmd =0x44504543, len=96
3,578,913 >>> mbox cmd response data (56 bytes)
3,578,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,895 UART: [rt]cmd =0x44504543, len=96
3,651,179 >>> mbox cmd response data (56 bytes)
3,651,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,201 UART: [rt]cmd =0x44504543, len=96
3,724,215 >>> mbox cmd response data (56 bytes)
3,724,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,387 UART: [rt]cmd =0x44504543, len=96
3,796,709 >>> mbox cmd response data (56 bytes)
3,796,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,775 UART: [rt]cmd =0x44504543, len=96
3,869,783 >>> mbox cmd response data (56 bytes)
3,869,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,697 UART: [rt]cmd =0x44504543, len=96
3,942,863 >>> mbox cmd response data (56 bytes)
3,942,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,847 UART: [rt]cmd =0x44504543, len=96
4,016,595 >>> mbox cmd response data (56 bytes)
4,016,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,477 UART: [rt]cmd =0x44504543, len=96
4,090,549 >>> mbox cmd response data (56 bytes)
4,090,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,357 UART: [rt]cmd =0x44504543, len=96
4,163,967 >>> mbox cmd response data (56 bytes)
4,163,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,125 UART: [rt]cmd =0x44504543, len=96
4,201,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
1,169,487 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,518 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,209,019 UART: [ldev] ++
1,209,187 UART: [ldev] CDI.KEYID = 6
1,209,551 UART: [ldev] SUBJECT.KEYID = 5
1,209,978 UART: [ldev] AUTHORITY.KEYID = 7
1,210,441 UART: [ldev] FE.KEYID = 1
1,215,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,123 UART: [fwproc] Wait for Commands...
1,281,800 UART: [fwproc] Recv command 0x46574c44
1,282,533 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,931 >>> mbox cmd response: success
2,774,982 UART: [afmc] ++
2,775,150 UART: [afmc] CDI.KEYID = 6
2,775,513 UART: [afmc] SUBJECT.KEYID = 7
2,775,939 UART: [afmc] AUTHORITY.KEYID = 5
2,811,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,031 UART: [afmc] --
2,855,079 UART: [cold-reset] --
2,855,925 UART: [state] Locking Datavault
2,857,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,838 UART: [state] Locking ICCM
2,858,298 UART: [exit] Launching FMC @ 0x40000130
2,863,627 UART:
2,863,643 UART: Running Caliptra FMC ...
2,864,051 UART:
2,864,194 UART: [state] CFI Enabled
2,875,201 UART: [fht] FMC Alias Private Key: 7
2,983,246 UART: [art] Extend RT PCRs Done
2,983,674 UART: [art] Lock RT PCRs Done
2,985,044 UART: [art] Populate DV Done
2,993,183 UART: [fht] FMC Alias Private Key: 7
2,994,123 UART: [art] Derive CDI
2,994,403 UART: [art] Store in in slot 0x4
3,080,170 UART: [art] Derive Key Pair
3,080,530 UART: [art] Store priv key in slot 0x5
3,093,606 UART: [art] Derive Key Pair - Done
3,108,390 UART: [art] Signing Cert with AUTHO
3,108,870 UART: RITY.KEYID = 7
3,124,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,995 UART: [art] PUB.X = 08C7AAFE7072D0D40DB01987B014E9E352BFE3E4B60A57EDE67BBA47DE87E72C5D67550390E6D6BA1CB19A55DC96C351
3,131,769 UART: [art] PUB.Y = FED103C605D77079A426AD7496A6DBBA9D0063AB5CE02B0833C9DE2C01CDCA53D8579D96E1F9EA31D03D01649B6C29DC
3,138,698 UART: [art] SIG.R = 40BFADF6846F3C0FE75B0C9EDA0693F6C0D7060D86AEE481C25CFF71E6FAA4B57FF721041FC7AA504E072CC8135B226E
3,145,467 UART: [art] SIG.S = F43D85A044A338AAAC80C63DB03176A79A1493B311DE22AC96BF367F25C98439DAF2E105CBB26A0D2CC80200BA8325DA
3,169,187 UART: Caliptra RT
3,169,532 UART: [state] CFI Enabled
3,278,421 UART: [rt] RT listening for mailbox commands...
3,279,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,133 UART: [rt]cmd =0x44504543, len=24
3,335,141 >>> mbox cmd response data (40 bytes)
3,335,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,943 UART: [rt]cmd =0x44504543, len=96
3,405,370 >>> mbox cmd response data (56 bytes)
3,405,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,240 UART: [rt]cmd =0x44504543, len=96
3,476,022 >>> mbox cmd response data (56 bytes)
3,476,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,904 UART: [rt]cmd =0x44504543, len=96
3,546,398 >>> mbox cmd response data (56 bytes)
3,546,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,608 UART: [rt]cmd =0x44504543, len=96
3,616,814 >>> mbox cmd response data (56 bytes)
3,616,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,898 UART: [rt]cmd =0x44504543, len=96
3,688,292 >>> mbox cmd response data (56 bytes)
3,688,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,360 UART: [rt]cmd =0x44504543, len=96
3,760,006 >>> mbox cmd response data (56 bytes)
3,760,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,024 UART: [rt]cmd =0x44504543, len=96
3,831,532 >>> mbox cmd response data (56 bytes)
3,831,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,322 UART: [rt]cmd =0x44504543, len=96
3,903,240 >>> mbox cmd response data (56 bytes)
3,903,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,384 UART: [rt]cmd =0x44504543, len=96
3,976,172 >>> mbox cmd response data (56 bytes)
3,976,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,256 UART: [rt]cmd =0x44504543, len=96
4,048,976 >>> mbox cmd response data (56 bytes)
4,048,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,022 UART: [rt]cmd =0x44504543, len=96
4,122,328 >>> mbox cmd response data (56 bytes)
4,122,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,152,542 UART: [rt]cmd =0x44504543, len=96
4,196,562 >>> mbox cmd response data (56 bytes)
4,196,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,662 UART: [rt]cmd =0x44504543, len=96
4,269,620 >>> mbox cmd response data (56 bytes)
4,269,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,512 UART: [rt]cmd =0x44504543, len=96
4,342,772 >>> mbox cmd response data (56 bytes)
4,342,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,596 UART: [rt]cmd =0x44504543, len=96
4,379,685 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,473 >>> mbox cmd response: success
2,686,189 UART:
2,686,205 UART: Running Caliptra FMC ...
2,686,613 UART:
2,686,756 UART: [state] CFI Enabled
2,697,679 UART: [fht] FMC Alias Private Key: 7
2,805,682 UART: [art] Extend RT PCRs Done
2,806,110 UART: [art] Lock RT PCRs Done
2,808,026 UART: [art] Populate DV Done
2,816,125 UART: [fht] FMC Alias Private Key: 7
2,817,231 UART: [art] Derive CDI
2,817,511 UART: [art] Store in in slot 0x4
2,902,788 UART: [art] Derive Key Pair
2,903,148 UART: [art] Store priv key in slot 0x5
2,916,978 UART: [art] Derive Key Pair - Done
2,931,938 UART: [art] Signing Cert with AUTHO
2,932,418 UART: RITY.KEYID = 7
2,947,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,219 UART: [art] PUB.X = 7DB58CDB90B574A03307D0CAFD2FC0202DD1FDD31144BECCD2317B7B278C802DB89DBEB5EBCE6109114542870F86A220
2,954,996 UART: [art] PUB.Y = C1132CB682C5035FF6E6F06EE37F622073CFA6244BFBF6EDA6A252EB4FB9B6EE12832D2906EA6955B97345F9B46DFA38
2,961,954 UART: [art] SIG.R = E79FD864FB78E1A110F06863A29ADAA7EB702D0CAED46636FCD0BDA45A4498D556C038AE7BC94AA75CD71C51EBD8705B
2,968,743 UART: [art] SIG.S = 551937EB093AEA4E4B049B6B7B317E3A1671D4229A28722A16CF1A8DF5027F595F2AB365CB28EC90E3BD70A64BBC5135
2,993,077 UART: Caliptra RT
2,993,422 UART: [state] CFI Enabled
3,101,307 UART: [rt] RT listening for mailbox commands...
3,101,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,777 UART: [rt]cmd =0x44504543, len=24
3,157,665 >>> mbox cmd response data (40 bytes)
3,157,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,601 UART: [rt]cmd =0x44504543, len=96
3,227,390 >>> mbox cmd response data (56 bytes)
3,227,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,262 UART: [rt]cmd =0x44504543, len=96
3,297,776 >>> mbox cmd response data (56 bytes)
3,297,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,662 UART: [rt]cmd =0x44504543, len=96
3,368,688 >>> mbox cmd response data (56 bytes)
3,368,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,694 UART: [rt]cmd =0x44504543, len=96
3,439,524 >>> mbox cmd response data (56 bytes)
3,439,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,572 UART: [rt]cmd =0x44504543, len=96
3,510,570 >>> mbox cmd response data (56 bytes)
3,510,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,606 UART: [rt]cmd =0x44504543, len=96
3,582,040 >>> mbox cmd response data (56 bytes)
3,582,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,852 UART: [rt]cmd =0x44504543, len=96
3,653,696 >>> mbox cmd response data (56 bytes)
3,653,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,600 UART: [rt]cmd =0x44504543, len=96
3,726,044 >>> mbox cmd response data (56 bytes)
3,726,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,112 UART: [rt]cmd =0x44504543, len=96
3,799,200 >>> mbox cmd response data (56 bytes)
3,799,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,172 UART: [rt]cmd =0x44504543, len=96
3,871,822 >>> mbox cmd response data (56 bytes)
3,871,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,901,736 UART: [rt]cmd =0x44504543, len=96
3,945,318 >>> mbox cmd response data (56 bytes)
3,945,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,396 UART: [rt]cmd =0x44504543, len=96
4,019,704 >>> mbox cmd response data (56 bytes)
4,019,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,776 UART: [rt]cmd =0x44504543, len=96
4,093,942 >>> mbox cmd response data (56 bytes)
4,093,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,762 UART: [rt]cmd =0x44504543, len=96
4,168,204 >>> mbox cmd response data (56 bytes)
4,168,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,246 UART: [rt]cmd =0x44504543, len=96
4,205,539 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,032 UART:
192,405 UART: Running Caliptra ROM ...
193,609 UART:
193,764 UART: [state] CFI Enabled
261,177 UART: [state] LifecycleState = Unprovisioned
263,156 UART: [state] DebugLocked = No
264,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,416 UART: [kat] SHA2-256
439,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,609 UART: [kat] ++
450,105 UART: [kat] sha1
461,924 UART: [kat] SHA2-256
464,650 UART: [kat] SHA2-384
470,779 UART: [kat] SHA2-512-ACC
473,143 UART: [kat] ECC-384
2,767,036 UART: [kat] HMAC-384Kdf
2,781,771 UART: [kat] LMS
3,972,024 UART: [kat] --
3,977,323 UART: [cold-reset] ++
3,979,471 UART: [fht] Storing FHT @ 0x50003400
3,991,163 UART: [idev] ++
3,991,806 UART: [idev] CDI.KEYID = 6
3,992,721 UART: [idev] SUBJECT.KEYID = 7
3,993,969 UART: [idev] UDS.KEYID = 0
3,994,956 ready_for_fw is high
3,995,150 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,707 UART: [idev] Erasing UDS.KEYID = 0
7,324,909 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,843 UART: [idev] --
7,349,999 UART: [ldev] ++
7,350,624 UART: [ldev] CDI.KEYID = 6
7,351,532 UART: [ldev] SUBJECT.KEYID = 5
7,352,745 UART: [ldev] AUTHORITY.KEYID = 7
7,354,031 UART: [ldev] FE.KEYID = 1
7,381,043 UART: [ldev] Erasing FE.KEYID = 1
10,712,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,646 UART: [ldev] --
13,077,022 UART: [fwproc] Waiting for Commands...
13,080,210 UART: [fwproc] Received command 0x46574c44
13,082,452 UART: [fwproc] Received Image of size 114124 bytes
17,134,397 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,214,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,283,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,601,314 >>> mbox cmd response: success
17,604,637 UART: [afmc] ++
17,605,234 UART: [afmc] CDI.KEYID = 6
17,606,147 UART: [afmc] SUBJECT.KEYID = 7
17,607,412 UART: [afmc] AUTHORITY.KEYID = 5
20,961,127 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,260,244 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,262,505 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,276,893 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,291,758 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,306,182 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,327,271 UART: [afmc] --
23,331,494 UART: [cold-reset] --
23,335,630 UART: [state] Locking Datavault
23,339,151 UART: [state] Locking PCR0, PCR1 and PCR31
23,340,899 UART: [state] Locking ICCM
23,343,749 UART: [exit] Launching FMC @ 0x40000130
23,352,139 UART:
23,352,373 UART: Running Caliptra FMC ...
23,353,475 UART:
23,353,635 UART: [state] CFI Enabled
23,423,170 UART: [fht] FMC Alias Private Key: 7
25,760,939 UART: [art] Extend RT PCRs Done
25,762,169 UART: [art] Lock RT PCRs Done
25,763,903 UART: [art] Populate DV Done
25,769,050 UART: [fht] FMC Alias Private Key: 7
25,770,703 UART: [art] Derive CDI
25,771,445 UART: [art] Store in in slot 0x4
25,830,773 UART: [art] Derive Key Pair
25,831,814 UART: [art] Store priv key in slot 0x5
29,124,498 UART: [art] Derive Key Pair - Done
29,137,170 UART: [art] Signing Cert with AUTHO
29,138,478 UART: RITY.KEYID = 7
31,425,793 UART: [art] Erasing AUTHORITY.KEYID = 7
31,427,317 UART: [art] PUB.X = 8D11D1FA4CEA5B9754E20F6695E1FFE985161B7BF5A6E7E5445ECB6B4B5520E4E7A91158EE5BBD50E9F03E64337A4E71
31,434,520 UART: [art] PUB.Y = 96D0175474C3B2D3139E66E8DFF18BF73A628EA1A3E01FC43606B3CA7E268E84DB92A7CC59316B2D9AA043674A55EAD4
31,441,768 UART: [art] SIG.R = 7E0B7AE39893D0501953315F08E430D743E8116E1DA06E461A16DAF7DE520F3D79448B83C5FB61470BC6178C29F93C15
31,449,167 UART: [art] SIG.S = DF9EA134839058AB38F1E5EBDA5358D5809697A0FB1388825FF307445240E28CFCA214E4D8D317A805CDB381DDD18401
32,754,478 UART: Caliptra RT
32,755,194 UART: [state] CFI Enabled
32,935,931 UART: [rt] RT listening for mailbox commands...
32,937,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,968,076 UART: [rt]cmd =0x44504543, len=24
33,009,838 >>> mbox cmd response data (40 bytes)
33,010,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,040,667 UART: [rt]cmd =0x44504543, len=24
33,073,782 >>> mbox cmd response data (40 bytes)
33,074,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,104,228 UART: [rt]cmd =0x44504543, len=24
33,137,587 >>> mbox cmd response data (40 bytes)
33,138,216 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,168,193 UART: [rt]cmd =0x44504543, len=24
33,201,598 >>> mbox cmd response data (40 bytes)
33,202,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,232,346 UART: [rt]cmd =0x44504543, len=24
33,265,676 >>> mbox cmd response data (40 bytes)
33,266,330 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,296,342 UART: [rt]cmd =0x44504543, len=24
33,329,898 >>> mbox cmd response data (40 bytes)
33,330,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,360,429 UART: [rt]cmd =0x44504543, len=24
33,393,862 >>> mbox cmd response data (40 bytes)
33,394,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,424,391 UART: [rt]cmd =0x44504543, len=24
33,457,959 >>> mbox cmd response data (40 bytes)
33,458,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,488,605 UART: [rt]cmd =0x44504543, len=24
33,521,789 >>> mbox cmd response data (40 bytes)
33,522,400 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,552,353 UART: [rt]cmd =0x44504543, len=24
33,585,901 >>> mbox cmd response data (40 bytes)
33,586,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,616,513 UART: [rt]cmd =0x44504543, len=24
33,649,906 >>> mbox cmd response data (40 bytes)
33,650,550 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,680,508 UART: [rt]cmd =0x44504543, len=24
33,714,060 >>> mbox cmd response data (40 bytes)
33,714,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,744,482 UART: [rt]cmd =0x44504543, len=24
33,777,828 >>> mbox cmd response data (40 bytes)
33,778,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,808,194 UART: [rt]cmd =0x44504543, len=24
33,842,289 >>> mbox cmd response data (40 bytes)
33,842,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,872,531 UART: [rt]cmd =0x44504543, len=24
33,905,914 >>> mbox cmd response data (40 bytes)
33,906,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,936,623 UART: [rt]cmd =0x44504543, len=24
33,942,916 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,783,095 ready_for_fw is high
3,783,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,853,244 >>> mbox cmd response: success
23,548,537 UART:
23,548,909 UART: Running Caliptra FMC ...
23,550,006 UART:
23,550,162 UART: [state] CFI Enabled
23,617,296 UART: [fht] FMC Alias Private Key: 7
25,954,521 UART: [art] Extend RT PCRs Done
25,955,744 UART: [art] Lock RT PCRs Done
25,957,458 UART: [art] Populate DV Done
25,962,808 UART: [fht] FMC Alias Private Key: 7
25,964,298 UART: [art] Derive CDI
25,965,035 UART: [art] Store in in slot 0x4
26,025,719 UART: [art] Derive Key Pair
26,026,784 UART: [art] Store priv key in slot 0x5
29,319,629 UART: [art] Derive Key Pair - Done
29,332,516 UART: [art] Signing Cert with AUTHO
29,333,854 UART: RITY.KEYID = 7
31,620,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,305 UART: [art] PUB.X = D7EA82C380FA840B4523F341E07BBDBF34F321D9E054E28516BE210819846898550EFA5E92B6E8D2B5EFAD7B733FE01F
31,629,497 UART: [art] PUB.Y = 62A070B96A80E20149F08D6DDB8446B6349FB12253468E7F14A1C7728948E72E84F0068AAD3FF4FEE8324FC089FF0BF8
31,636,774 UART: [art] SIG.R = D0E638E52F04065D05E635AC451FF162B1B256A6A5595D1DE66CA36A4379EC21AB5FE924E43AEE15657452E3A8A9AFAE
31,644,174 UART: [art] SIG.S = DD3798B82C05D1A27685C39399AE096DC3FF818656AB508BE1D1AC616BC050D5A069A89B0E4731E6E9D4583F11D03348
32,949,064 UART: Caliptra RT
32,949,776 UART: [state] CFI Enabled
33,110,710 UART: [rt] RT listening for mailbox commands...
33,112,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,142,542 UART: [rt]cmd =0x44504543, len=24
33,184,075 >>> mbox cmd response data (40 bytes)
33,184,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,214,732 UART: [rt]cmd =0x44504543, len=24
33,247,795 >>> mbox cmd response data (40 bytes)
33,248,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,278,537 UART: [rt]cmd =0x44504543, len=24
33,311,971 >>> mbox cmd response data (40 bytes)
33,312,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,342,455 UART: [rt]cmd =0x44504543, len=24
33,376,105 >>> mbox cmd response data (40 bytes)
33,376,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,406,430 UART: [rt]cmd =0x44504543, len=24
33,439,822 >>> mbox cmd response data (40 bytes)
33,440,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,470,534 UART: [rt]cmd =0x44504543, len=24
33,504,091 >>> mbox cmd response data (40 bytes)
33,504,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,534,967 UART: [rt]cmd =0x44504543, len=24
33,568,486 >>> mbox cmd response data (40 bytes)
33,569,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,598,999 UART: [rt]cmd =0x44504543, len=24
33,631,994 >>> mbox cmd response data (40 bytes)
33,632,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,662,475 UART: [rt]cmd =0x44504543, len=24
33,696,316 >>> mbox cmd response data (40 bytes)
33,696,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,726,676 UART: [rt]cmd =0x44504543, len=24
33,760,595 >>> mbox cmd response data (40 bytes)
33,761,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,791,223 UART: [rt]cmd =0x44504543, len=24
33,824,811 >>> mbox cmd response data (40 bytes)
33,825,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,855,413 UART: [rt]cmd =0x44504543, len=24
33,888,633 >>> mbox cmd response data (40 bytes)
33,889,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,919,043 UART: [rt]cmd =0x44504543, len=24
33,952,579 >>> mbox cmd response data (40 bytes)
33,953,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,983,106 UART: [rt]cmd =0x44504543, len=24
34,016,721 >>> mbox cmd response data (40 bytes)
34,017,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,047,463 UART: [rt]cmd =0x44504543, len=24
34,080,767 >>> mbox cmd response data (40 bytes)
34,081,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,111,350 UART: [rt]cmd =0x44504543, len=24
34,117,695 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,396 UART:
192,765 UART: Running Caliptra ROM ...
193,886 UART:
603,523 UART: [state] CFI Enabled
616,047 UART: [state] LifecycleState = Unprovisioned
618,011 UART: [state] DebugLocked = No
619,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,405 UART: [kat] SHA2-256
794,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,726 UART: [kat] ++
805,205 UART: [kat] sha1
817,418 UART: [kat] SHA2-256
820,143 UART: [kat] SHA2-384
825,348 UART: [kat] SHA2-512-ACC
827,710 UART: [kat] ECC-384
3,111,202 UART: [kat] HMAC-384Kdf
3,123,574 UART: [kat] LMS
4,313,653 UART: [kat] --
4,319,724 UART: [cold-reset] ++
4,321,581 UART: [fht] Storing FHT @ 0x50003400
4,333,548 UART: [idev] ++
4,334,176 UART: [idev] CDI.KEYID = 6
4,335,078 UART: [idev] SUBJECT.KEYID = 7
4,336,316 UART: [idev] UDS.KEYID = 0
4,337,338 ready_for_fw is high
4,337,532 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,266 UART: [idev] Erasing UDS.KEYID = 0
7,628,555 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,526 UART: [idev] --
7,655,275 UART: [ldev] ++
7,655,849 UART: [ldev] CDI.KEYID = 6
7,656,780 UART: [ldev] SUBJECT.KEYID = 5
7,657,986 UART: [ldev] AUTHORITY.KEYID = 7
7,659,188 UART: [ldev] FE.KEYID = 1
7,670,356 UART: [ldev] Erasing FE.KEYID = 1
10,959,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,203 UART: [ldev] --
13,323,081 UART: [fwproc] Waiting for Commands...
13,325,052 UART: [fwproc] Received command 0x46574c44
13,327,248 UART: [fwproc] Received Image of size 114124 bytes
17,384,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,467,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,536,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,852,952 >>> mbox cmd response: success
17,857,135 UART: [afmc] ++
17,857,729 UART: [afmc] CDI.KEYID = 6
17,858,657 UART: [afmc] SUBJECT.KEYID = 7
17,859,870 UART: [afmc] AUTHORITY.KEYID = 5
21,172,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,007 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,358 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,222 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,643 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,371 UART: [afmc] --
23,538,931 UART: [cold-reset] --
23,543,433 UART: [state] Locking Datavault
23,548,081 UART: [state] Locking PCR0, PCR1 and PCR31
23,549,778 UART: [state] Locking ICCM
23,551,899 UART: [exit] Launching FMC @ 0x40000130
23,560,289 UART:
23,560,517 UART: Running Caliptra FMC ...
23,561,631 UART:
23,561,792 UART: [state] CFI Enabled
23,569,847 UART: [fht] FMC Alias Private Key: 7
25,900,637 UART: [art] Extend RT PCRs Done
25,901,863 UART: [art] Lock RT PCRs Done
25,903,276 UART: [art] Populate DV Done
25,908,679 UART: [fht] FMC Alias Private Key: 7
25,910,369 UART: [art] Derive CDI
25,911,175 UART: [art] Store in in slot 0x4
25,953,652 UART: [art] Derive Key Pair
25,954,644 UART: [art] Store priv key in slot 0x5
29,196,612 UART: [art] Derive Key Pair - Done
29,209,668 UART: [art] Signing Cert with AUTHO
29,210,972 UART: RITY.KEYID = 7
31,490,088 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,595 UART: [art] PUB.X = A91A8EFC4249CEEF67582C55212448C69AF54C1C79E05C4FC70225ED86406EE55B2E09B69672639CEDCEABA45B595129
31,498,848 UART: [art] PUB.Y = FC1D93EDA95D59DABCBDD80455EA53F69C1DC04532EA9FFC1FB894F1B7457B89113A8D1DCA48D94044298F8BA656EF29
31,506,058 UART: [art] SIG.R = DE283E280D160C9B49E46F5B6DE23AF247AB4F6B5F5BDD9AF4208EF77DC595A6D8C2B5FBF9903DE98AE4F1B452F48642
31,513,495 UART: [art] SIG.S = A6F5127F003EA21E6DB95FBB217FAFD43EEBA877B1BE6FF51E392488778C80BA4B9D1C876EC266BF0691E39A28111D39
32,818,685 UART: Caliptra RT
32,819,399 UART: [state] CFI Enabled
32,937,658 UART: [rt] RT listening for mailbox commands...
32,939,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,969,605 UART: [rt]cmd =0x44504543, len=24
32,995,467 >>> mbox cmd response data (40 bytes)
32,996,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,025,986 UART: [rt]cmd =0x44504543, len=24
33,052,643 >>> mbox cmd response data (40 bytes)
33,053,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,083,286 UART: [rt]cmd =0x44504543, len=24
33,109,643 >>> mbox cmd response data (40 bytes)
33,110,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,140,109 UART: [rt]cmd =0x44504543, len=24
33,166,576 >>> mbox cmd response data (40 bytes)
33,167,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,196,972 UART: [rt]cmd =0x44504543, len=24
33,223,476 >>> mbox cmd response data (40 bytes)
33,224,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,253,739 UART: [rt]cmd =0x44504543, len=24
33,280,387 >>> mbox cmd response data (40 bytes)
33,281,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,310,856 UART: [rt]cmd =0x44504543, len=24
33,337,157 >>> mbox cmd response data (40 bytes)
33,337,815 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,367,708 UART: [rt]cmd =0x44504543, len=24
33,393,615 >>> mbox cmd response data (40 bytes)
33,394,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,424,243 UART: [rt]cmd =0x44504543, len=24
33,450,798 >>> mbox cmd response data (40 bytes)
33,451,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,481,416 UART: [rt]cmd =0x44504543, len=24
33,507,556 >>> mbox cmd response data (40 bytes)
33,508,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,538,182 UART: [rt]cmd =0x44504543, len=24
33,564,369 >>> mbox cmd response data (40 bytes)
33,565,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,594,941 UART: [rt]cmd =0x44504543, len=24
33,621,067 >>> mbox cmd response data (40 bytes)
33,621,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,651,475 UART: [rt]cmd =0x44504543, len=24
33,678,117 >>> mbox cmd response data (40 bytes)
33,678,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,708,733 UART: [rt]cmd =0x44504543, len=24
33,734,972 >>> mbox cmd response data (40 bytes)
33,735,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,765,649 UART: [rt]cmd =0x44504543, len=24
33,791,773 >>> mbox cmd response data (40 bytes)
33,792,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,822,553 UART: [rt]cmd =0x44504543, len=24
33,829,095 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,121,519 ready_for_fw is high
4,122,138 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,189 >>> mbox cmd response: success
23,703,405 UART:
23,703,813 UART: Running Caliptra FMC ...
23,704,951 UART:
23,705,115 UART: [state] CFI Enabled
23,712,921 UART: [fht] FMC Alias Private Key: 7
26,043,996 UART: [art] Extend RT PCRs Done
26,045,228 UART: [art] Lock RT PCRs Done
26,047,026 UART: [art] Populate DV Done
26,052,718 UART: [fht] FMC Alias Private Key: 7
26,054,421 UART: [art] Derive CDI
26,055,233 UART: [art] Store in in slot 0x4
26,098,046 UART: [art] Derive Key Pair
26,099,048 UART: [art] Store priv key in slot 0x5
29,340,991 UART: [art] Derive Key Pair - Done
29,353,948 UART: [art] Signing Cert with AUTHO
29,355,252 UART: RITY.KEYID = 7
31,634,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,342 UART: [art] PUB.X = 33860A0F7AC96DE977262449A464745F0C8EAF1FC60BD23F49942E6A57F7FE926875ED44A43723C3EFBD1C6929FF84FD
31,643,577 UART: [art] PUB.Y = BE5ABD6F63E45C485BFF181915E688254E6A635FEE7F027397BB152751766917665489BE407128DBFBA4ECF91064B800
31,650,810 UART: [art] SIG.R = 041A4808D4047317F3323610319B449DEC19A3B4B5B0F2D9845B2337AD9AC823524864E30F66D0B52E19889EE4111062
31,658,215 UART: [art] SIG.S = 2327E23DCC1D3FF1D8A4EFF1E8E25C5FAA03934EFEE37FC2BBF0ABF041DA09DC24273CBAAE94F7D9AA875C12CBB645A4
32,963,898 UART: Caliptra RT
32,964,611 UART: [state] CFI Enabled
33,082,840 UART: [rt] RT listening for mailbox commands...
33,084,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,114,790 UART: [rt]cmd =0x44504543, len=24
33,141,302 >>> mbox cmd response data (40 bytes)
33,142,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,172,121 UART: [rt]cmd =0x44504543, len=24
33,198,187 >>> mbox cmd response data (40 bytes)
33,198,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,228,639 UART: [rt]cmd =0x44504543, len=24
33,255,343 >>> mbox cmd response data (40 bytes)
33,255,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,286,089 UART: [rt]cmd =0x44504543, len=24
33,312,489 >>> mbox cmd response data (40 bytes)
33,313,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,343,096 UART: [rt]cmd =0x44504543, len=24
33,369,181 >>> mbox cmd response data (40 bytes)
33,369,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,399,613 UART: [rt]cmd =0x44504543, len=24
33,425,832 >>> mbox cmd response data (40 bytes)
33,426,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,456,580 UART: [rt]cmd =0x44504543, len=24
33,482,457 >>> mbox cmd response data (40 bytes)
33,483,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,513,011 UART: [rt]cmd =0x44504543, len=24
33,539,032 >>> mbox cmd response data (40 bytes)
33,539,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,569,492 UART: [rt]cmd =0x44504543, len=24
33,595,764 >>> mbox cmd response data (40 bytes)
33,596,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,626,422 UART: [rt]cmd =0x44504543, len=24
33,652,527 >>> mbox cmd response data (40 bytes)
33,653,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,683,149 UART: [rt]cmd =0x44504543, len=24
33,709,715 >>> mbox cmd response data (40 bytes)
33,710,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,740,108 UART: [rt]cmd =0x44504543, len=24
33,766,887 >>> mbox cmd response data (40 bytes)
33,767,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,797,402 UART: [rt]cmd =0x44504543, len=24
33,823,566 >>> mbox cmd response data (40 bytes)
33,824,184 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,854,296 UART: [rt]cmd =0x44504543, len=24
33,880,275 >>> mbox cmd response data (40 bytes)
33,880,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,910,819 UART: [rt]cmd =0x44504543, len=24
33,937,665 >>> mbox cmd response data (40 bytes)
33,938,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,968,023 UART: [rt]cmd =0x44504543, len=24
33,974,516 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,120 UART:
192,497 UART: Running Caliptra ROM ...
193,696 UART:
193,851 UART: [state] CFI Enabled
264,861 UART: [state] LifecycleState = Unprovisioned
266,564 UART: [state] DebugLocked = No
268,594 UART: [state] WD Timer not started. Device not locked for debugging
272,269 UART: [kat] SHA2-256
451,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,011 UART: [kat] ++
463,546 UART: [kat] sha1
474,218 UART: [kat] SHA2-256
477,288 UART: [kat] SHA2-384
483,626 UART: [kat] SHA2-512-ACC
486,562 UART: [kat] ECC-384
2,947,159 UART: [kat] HMAC-384Kdf
2,971,831 UART: [kat] LMS
3,501,308 UART: [kat] --
3,505,088 UART: [cold-reset] ++
3,506,022 UART: [fht] FHT @ 0x50003400
3,516,577 UART: [idev] ++
3,517,134 UART: [idev] CDI.KEYID = 6
3,518,024 UART: [idev] SUBJECT.KEYID = 7
3,519,266 UART: [idev] UDS.KEYID = 0
3,520,167 ready_for_fw is high
3,520,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,416 UART: [idev] Erasing UDS.KEYID = 0
6,027,129 UART: [idev] Sha1 KeyId Algorithm
6,050,406 UART: [idev] --
6,053,587 UART: [ldev] ++
6,054,158 UART: [ldev] CDI.KEYID = 6
6,055,068 UART: [ldev] SUBJECT.KEYID = 5
6,056,280 UART: [ldev] AUTHORITY.KEYID = 7
6,057,506 UART: [ldev] FE.KEYID = 1
6,098,183 UART: [ldev] Erasing FE.KEYID = 1
8,602,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,777 UART: [ldev] --
10,411,191 UART: [fwproc] Wait for Commands...
10,413,875 UART: [fwproc] Recv command 0x46574c44
10,415,964 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,724 >>> mbox cmd response: success
14,282,165 UART: [afmc] ++
14,282,763 UART: [afmc] CDI.KEYID = 6
14,283,649 UART: [afmc] SUBJECT.KEYID = 7
14,284,863 UART: [afmc] AUTHORITY.KEYID = 5
16,829,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,589,805 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,605,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,621,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,643,661 UART: [afmc] --
18,646,875 UART: [cold-reset] --
18,650,728 UART: [state] Locking Datavault
18,657,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,019 UART: [state] Locking ICCM
18,661,283 UART: [exit] Launching FMC @ 0x40000130
18,669,689 UART:
18,669,968 UART: Running Caliptra FMC ...
18,671,072 UART:
18,671,237 UART: [state] CFI Enabled
18,730,784 UART: [fht] FMC Alias Private Key: 7
20,495,174 UART: [art] Extend RT PCRs Done
20,496,392 UART: [art] Lock RT PCRs Done
20,498,174 UART: [art] Populate DV Done
20,503,528 UART: [fht] FMC Alias Private Key: 7
20,505,065 UART: [art] Derive CDI
20,505,813 UART: [art] Store in in slot 0x4
20,563,660 UART: [art] Derive Key Pair
20,564,661 UART: [art] Store priv key in slot 0x5
23,027,777 UART: [art] Derive Key Pair - Done
23,040,722 UART: [art] Signing Cert with AUTHO
23,042,024 UART: RITY.KEYID = 7
24,754,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,913 UART: [art] PUB.X = 6E9A97FA770FCB5F2DCD16B3ECA63E44EC24B81E385A7E89DF9397B02FBCD6DE0A0E6607EE766C8FDEBCA03EEC04C4DD
24,763,207 UART: [art] PUB.Y = 760D8A89C6B332CC0BA2F3AA8A288CDFAD59124A4C775A64E8E3AAB022CB12AD7488342328D4102732BC5E22510B0BD2
24,770,494 UART: [art] SIG.R = 2C32834FEC0E5D6F3B01F25F79655682022E82850A54D5B62AF2960E1C6DF5252602CFBC4FC4FF81847E9B5087330E14
24,777,878 UART: [art] SIG.S = E2563385360CB18AABCBA9999F23F70B803B30BE13C2668D744D1DE32068F32A8FC8AE4919D04E492900272D4C3D96F5
25,757,010 UART: Caliptra RT
25,757,723 UART: [state] CFI Enabled
25,922,476 UART: [rt] RT listening for mailbox commands...
25,924,410 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,955,009 UART: [rt]cmd =0x44504543, len=24
25,996,916 >>> mbox cmd response data (40 bytes)
25,997,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,027,761 UART: [rt]cmd =0x44504543, len=24
26,060,735 >>> mbox cmd response data (40 bytes)
26,061,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,091,171 UART: [rt]cmd =0x44504543, len=24
26,124,660 >>> mbox cmd response data (40 bytes)
26,125,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,155,496 UART: [rt]cmd =0x44504543, len=24
26,188,988 >>> mbox cmd response data (40 bytes)
26,189,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,219,430 UART: [rt]cmd =0x44504543, len=24
26,252,701 >>> mbox cmd response data (40 bytes)
26,253,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,283,175 UART: [rt]cmd =0x44504543, len=24
26,316,707 >>> mbox cmd response data (40 bytes)
26,317,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,347,019 UART: [rt]cmd =0x44504543, len=24
26,381,232 >>> mbox cmd response data (40 bytes)
26,381,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,411,921 UART: [rt]cmd =0x44504543, len=24
26,445,356 >>> mbox cmd response data (40 bytes)
26,446,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,476,014 UART: [rt]cmd =0x44504543, len=24
26,509,453 >>> mbox cmd response data (40 bytes)
26,510,108 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,540,009 UART: [rt]cmd =0x44504543, len=24
26,573,269 >>> mbox cmd response data (40 bytes)
26,573,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,603,681 UART: [rt]cmd =0x44504543, len=24
26,637,297 >>> mbox cmd response data (40 bytes)
26,637,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,668,075 UART: [rt]cmd =0x44504543, len=24
26,701,365 >>> mbox cmd response data (40 bytes)
26,701,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,717 UART: [rt]cmd =0x44504543, len=24
26,765,413 >>> mbox cmd response data (40 bytes)
26,766,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,796,028 UART: [rt]cmd =0x44504543, len=24
26,829,745 >>> mbox cmd response data (40 bytes)
26,830,395 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,860,137 UART: [rt]cmd =0x44504543, len=24
26,893,503 >>> mbox cmd response data (40 bytes)
26,894,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,924,073 UART: [rt]cmd =0x44504543, len=24
26,930,514 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,360,198 ready_for_fw is high
3,360,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,519 >>> mbox cmd response: success
18,368,421 UART:
18,368,832 UART: Running Caliptra FMC ...
18,370,032 UART:
18,370,223 UART: [state] CFI Enabled
18,434,503 UART: [fht] FMC Alias Private Key: 7
20,198,513 UART: [art] Extend RT PCRs Done
20,199,730 UART: [art] Lock RT PCRs Done
20,201,196 UART: [art] Populate DV Done
20,206,390 UART: [fht] FMC Alias Private Key: 7
20,207,942 UART: [art] Derive CDI
20,208,869 UART: [art] Store in in slot 0x4
20,267,100 UART: [art] Derive Key Pair
20,268,097 UART: [art] Store priv key in slot 0x5
22,731,285 UART: [art] Derive Key Pair - Done
22,744,222 UART: [art] Signing Cert with AUTHO
22,745,525 UART: RITY.KEYID = 7
24,456,572 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,098 UART: [art] PUB.X = 99AA016114E1D192D1A57E6C031BDB0FB56E46E05F79F20C1B2D1655B031002D90256C4C1F3C2E491474B11C9E31993B
24,465,310 UART: [art] PUB.Y = 017EF5BCDE1B542ABE31CD2D6BAD9C2E18C23ACB099C62A59BB9616C238A4039D53EBBA68ED7036F851795D69737BC9D
24,472,583 UART: [art] SIG.R = BC73D0C383F8311ECFABA48E378EF424003DCEA1FDBDECB09882E599949DA7CE416F22CDCEB1D0724E2C9814F20E3A2D
24,479,982 UART: [art] SIG.S = 38B1E3165394F63D68FE233DD63CFD5C16568A3A44FFA02E3D3728FDE2A7F020C053DC5E28B7DE0BB94E7052BFD6A6C1
25,459,556 UART: Caliptra RT
25,460,263 UART: [state] CFI Enabled
25,623,499 UART: [rt] RT listening for mailbox commands...
25,625,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,655,796 UART: [rt]cmd =0x44504543, len=24
25,698,395 >>> mbox cmd response data (40 bytes)
25,699,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,729,089 UART: [rt]cmd =0x44504543, len=24
25,762,560 >>> mbox cmd response data (40 bytes)
25,763,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,793,168 UART: [rt]cmd =0x44504543, len=24
25,826,567 >>> mbox cmd response data (40 bytes)
25,827,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,856,999 UART: [rt]cmd =0x44504543, len=24
25,890,852 >>> mbox cmd response data (40 bytes)
25,891,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,921,303 UART: [rt]cmd =0x44504543, len=24
25,955,069 >>> mbox cmd response data (40 bytes)
25,955,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,985,845 UART: [rt]cmd =0x44504543, len=24
26,018,948 >>> mbox cmd response data (40 bytes)
26,019,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,049,478 UART: [rt]cmd =0x44504543, len=24
26,082,990 >>> mbox cmd response data (40 bytes)
26,083,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,113,422 UART: [rt]cmd =0x44504543, len=24
26,147,150 >>> mbox cmd response data (40 bytes)
26,147,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,177,741 UART: [rt]cmd =0x44504543, len=24
26,211,170 >>> mbox cmd response data (40 bytes)
26,211,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,241,994 UART: [rt]cmd =0x44504543, len=24
26,275,322 >>> mbox cmd response data (40 bytes)
26,275,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,305,880 UART: [rt]cmd =0x44504543, len=24
26,339,360 >>> mbox cmd response data (40 bytes)
26,339,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,369,982 UART: [rt]cmd =0x44504543, len=24
26,403,329 >>> mbox cmd response data (40 bytes)
26,403,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,433,745 UART: [rt]cmd =0x44504543, len=24
26,467,424 >>> mbox cmd response data (40 bytes)
26,468,038 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,782 UART: [rt]cmd =0x44504543, len=24
26,531,341 >>> mbox cmd response data (40 bytes)
26,531,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,562,109 UART: [rt]cmd =0x44504543, len=24
26,595,222 >>> mbox cmd response data (40 bytes)
26,595,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,625,763 UART: [rt]cmd =0x44504543, len=24
26,632,162 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,375 UART:
192,745 UART: Running Caliptra ROM ...
193,925 UART:
603,430 UART: [state] CFI Enabled
614,264 UART: [state] LifecycleState = Unprovisioned
616,162 UART: [state] DebugLocked = No
617,675 UART: [state] WD Timer not started. Device not locked for debugging
621,132 UART: [kat] SHA2-256
800,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,889 UART: [kat] ++
812,333 UART: [kat] sha1
823,125 UART: [kat] SHA2-256
826,120 UART: [kat] SHA2-384
830,826 UART: [kat] SHA2-512-ACC
833,751 UART: [kat] ECC-384
3,276,407 UART: [kat] HMAC-384Kdf
3,289,757 UART: [kat] LMS
3,819,313 UART: [kat] --
3,824,376 UART: [cold-reset] ++
3,826,804 UART: [fht] FHT @ 0x50003400
3,838,980 UART: [idev] ++
3,839,532 UART: [idev] CDI.KEYID = 6
3,840,473 UART: [idev] SUBJECT.KEYID = 7
3,841,701 UART: [idev] UDS.KEYID = 0
3,842,616 ready_for_fw is high
3,842,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,546 UART: [idev] Erasing UDS.KEYID = 0
6,313,636 UART: [idev] Sha1 KeyId Algorithm
6,335,884 UART: [idev] --
6,339,169 UART: [ldev] ++
6,339,732 UART: [ldev] CDI.KEYID = 6
6,340,634 UART: [ldev] SUBJECT.KEYID = 5
6,341,779 UART: [ldev] AUTHORITY.KEYID = 7
6,343,101 UART: [ldev] FE.KEYID = 1
6,353,304 UART: [ldev] Erasing FE.KEYID = 1
8,827,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,469 UART: [ldev] --
10,618,538 UART: [fwproc] Wait for Commands...
10,621,286 UART: [fwproc] Recv command 0x46574c44
10,623,375 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,239 >>> mbox cmd response: success
14,492,924 UART: [afmc] ++
14,493,517 UART: [afmc] CDI.KEYID = 6
14,494,420 UART: [afmc] SUBJECT.KEYID = 7
14,495,576 UART: [afmc] AUTHORITY.KEYID = 5
16,992,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,418 UART: [afmc] --
18,787,513 UART: [cold-reset] --
18,792,883 UART: [state] Locking Datavault
18,798,016 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,665 UART: [state] Locking ICCM
18,802,183 UART: [exit] Launching FMC @ 0x40000130
18,810,571 UART:
18,810,802 UART: Running Caliptra FMC ...
18,811,892 UART:
18,812,051 UART: [state] CFI Enabled
18,820,155 UART: [fht] FMC Alias Private Key: 7
20,577,118 UART: [art] Extend RT PCRs Done
20,578,311 UART: [art] Lock RT PCRs Done
20,579,817 UART: [art] Populate DV Done
20,585,120 UART: [fht] FMC Alias Private Key: 7
20,586,672 UART: [art] Derive CDI
20,587,432 UART: [art] Store in in slot 0x4
20,630,077 UART: [art] Derive Key Pair
20,631,117 UART: [art] Store priv key in slot 0x5
23,057,704 UART: [art] Derive Key Pair - Done
23,070,549 UART: [art] Signing Cert with AUTHO
23,071,849 UART: RITY.KEYID = 7
24,777,282 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,770 UART: [art] PUB.X = 6140E96B40CA9A472E6DEA3E4EA1636576B232383501A173832723B13853CF2D24002C88B33B07E4F8D07A00B37EF7DE
24,785,933 UART: [art] PUB.Y = 1A1188764058077DEEC1B030F211DA0F4A166066B668EFF7E87E6AEF52FE10311BD1F2E348368CA5A7095847E173BDF6
24,793,253 UART: [art] SIG.R = 5FAC4571C92CC0BF37560113846028214C9DD0996E16B055F02A868DBEE18011B0147F1D7AE4FBE2C4B5DDF3DDED8C67
24,800,627 UART: [art] SIG.S = 52AE75121206B49D0B736F28E3725EE8DE21F79BB86DBC61828271607DAA94A6895D931285A59C2BED122FA799D7D8E9
25,779,840 UART: Caliptra RT
25,780,550 UART: [state] CFI Enabled
25,897,305 UART: [rt] RT listening for mailbox commands...
25,899,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,929,320 UART: [rt]cmd =0x44504543, len=24
25,956,099 >>> mbox cmd response data (40 bytes)
25,956,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,986,910 UART: [rt]cmd =0x44504543, len=24
26,013,294 >>> mbox cmd response data (40 bytes)
26,013,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,043,672 UART: [rt]cmd =0x44504543, len=24
26,069,984 >>> mbox cmd response data (40 bytes)
26,070,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,100,708 UART: [rt]cmd =0x44504543, len=24
26,126,894 >>> mbox cmd response data (40 bytes)
26,127,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,157,346 UART: [rt]cmd =0x44504543, len=24
26,183,311 >>> mbox cmd response data (40 bytes)
26,183,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,213,991 UART: [rt]cmd =0x44504543, len=24
26,240,122 >>> mbox cmd response data (40 bytes)
26,240,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,270,363 UART: [rt]cmd =0x44504543, len=24
26,296,561 >>> mbox cmd response data (40 bytes)
26,297,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,327,160 UART: [rt]cmd =0x44504543, len=24
26,353,509 >>> mbox cmd response data (40 bytes)
26,354,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,383,800 UART: [rt]cmd =0x44504543, len=24
26,410,347 >>> mbox cmd response data (40 bytes)
26,410,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,440,745 UART: [rt]cmd =0x44504543, len=24
26,466,889 >>> mbox cmd response data (40 bytes)
26,467,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,267 UART: [rt]cmd =0x44504543, len=24
26,523,822 >>> mbox cmd response data (40 bytes)
26,524,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,554,406 UART: [rt]cmd =0x44504543, len=24
26,580,569 >>> mbox cmd response data (40 bytes)
26,581,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,611,032 UART: [rt]cmd =0x44504543, len=24
26,637,202 >>> mbox cmd response data (40 bytes)
26,637,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,667,594 UART: [rt]cmd =0x44504543, len=24
26,693,785 >>> mbox cmd response data (40 bytes)
26,694,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,724,327 UART: [rt]cmd =0x44504543, len=24
26,750,614 >>> mbox cmd response data (40 bytes)
26,751,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,781,125 UART: [rt]cmd =0x44504543, len=24
26,787,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,697,309 ready_for_fw is high
3,697,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,724 >>> mbox cmd response: success
18,520,938 UART:
18,521,346 UART: Running Caliptra FMC ...
18,522,486 UART:
18,522,644 UART: [state] CFI Enabled
18,530,160 UART: [fht] FMC Alias Private Key: 7
20,286,864 UART: [art] Extend RT PCRs Done
20,288,089 UART: [art] Lock RT PCRs Done
20,289,719 UART: [art] Populate DV Done
20,295,178 UART: [fht] FMC Alias Private Key: 7
20,296,824 UART: [art] Derive CDI
20,297,634 UART: [art] Store in in slot 0x4
20,340,277 UART: [art] Derive Key Pair
20,341,315 UART: [art] Store priv key in slot 0x5
22,767,828 UART: [art] Derive Key Pair - Done
22,781,207 UART: [art] Signing Cert with AUTHO
22,782,531 UART: RITY.KEYID = 7
24,487,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,001 UART: [art] PUB.X = 56700FE6688507538404E33A1BDB035639B6709ABDEA44B247A27A99C797C3E6E552C711D519734CC5AF3B79C4FB0CA4
24,496,237 UART: [art] PUB.Y = 22552FEC9B565A7C3E8A1E7788695C6EBE4E4F802500AC9433C8C9CE02849D47740FC5EE9065D4C73D40871E249D5F66
24,503,464 UART: [art] SIG.R = D372F096E396303604C02FD1CB483BFF8200588602D414339B333C0E263872546B92B5A15A87EA8F406281F6C32AB578
24,510,785 UART: [art] SIG.S = C49FFC96FFA6A8BF907D8DABAB3D92148037BE98E4407FF9DA2791B34F4DAA347777109F7564AB42CBC4D2E2B57B10FC
25,489,892 UART: Caliptra RT
25,490,592 UART: [state] CFI Enabled
25,607,941 UART: [rt] RT listening for mailbox commands...
25,609,852 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,640,040 UART: [rt]cmd =0x44504543, len=24
25,666,015 >>> mbox cmd response data (40 bytes)
25,666,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,696,846 UART: [rt]cmd =0x44504543, len=24
25,723,287 >>> mbox cmd response data (40 bytes)
25,723,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,753,643 UART: [rt]cmd =0x44504543, len=24
25,780,010 >>> mbox cmd response data (40 bytes)
25,780,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,810,684 UART: [rt]cmd =0x44504543, len=24
25,836,957 >>> mbox cmd response data (40 bytes)
25,837,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,867,717 UART: [rt]cmd =0x44504543, len=24
25,894,289 >>> mbox cmd response data (40 bytes)
25,894,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,924,777 UART: [rt]cmd =0x44504543, len=24
25,951,440 >>> mbox cmd response data (40 bytes)
25,952,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,982,127 UART: [rt]cmd =0x44504543, len=24
26,008,162 >>> mbox cmd response data (40 bytes)
26,008,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,038,770 UART: [rt]cmd =0x44504543, len=24
26,064,972 >>> mbox cmd response data (40 bytes)
26,065,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,095,605 UART: [rt]cmd =0x44504543, len=24
26,121,768 >>> mbox cmd response data (40 bytes)
26,122,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,152,334 UART: [rt]cmd =0x44504543, len=24
26,178,579 >>> mbox cmd response data (40 bytes)
26,179,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,209,017 UART: [rt]cmd =0x44504543, len=24
26,235,474 >>> mbox cmd response data (40 bytes)
26,236,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,266,294 UART: [rt]cmd =0x44504543, len=24
26,292,702 >>> mbox cmd response data (40 bytes)
26,293,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,323,174 UART: [rt]cmd =0x44504543, len=24
26,349,823 >>> mbox cmd response data (40 bytes)
26,350,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,380,404 UART: [rt]cmd =0x44504543, len=24
26,406,589 >>> mbox cmd response data (40 bytes)
26,407,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,436,864 UART: [rt]cmd =0x44504543, len=24
26,463,213 >>> mbox cmd response data (40 bytes)
26,463,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,493,779 UART: [rt]cmd =0x44504543, len=24
26,500,053 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,173 UART:
192,530 UART: Running Caliptra ROM ...
193,720 UART:
193,872 UART: [state] CFI Enabled
265,804 UART: [state] LifecycleState = Unprovisioned
268,215 UART: [state] DebugLocked = No
270,957 UART: [state] WD Timer not started. Device not locked for debugging
274,712 UART: [kat] SHA2-256
464,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,394 UART: [kat] ++
475,844 UART: [kat] sha1
488,070 UART: [kat] SHA2-256
491,083 UART: [kat] SHA2-384
498,206 UART: [kat] SHA2-512-ACC
500,786 UART: [kat] ECC-384
2,948,808 UART: [kat] HMAC-384Kdf
2,971,448 UART: [kat] LMS
3,503,188 UART: [kat] --
3,508,215 UART: [cold-reset] ++
3,510,101 UART: [fht] FHT @ 0x50003400
3,522,397 UART: [idev] ++
3,523,118 UART: [idev] CDI.KEYID = 6
3,524,031 UART: [idev] SUBJECT.KEYID = 7
3,525,283 UART: [idev] UDS.KEYID = 0
3,526,362 ready_for_fw is high
3,526,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,557 UART: [idev] Erasing UDS.KEYID = 0
6,029,137 UART: [idev] Sha1 KeyId Algorithm
6,052,527 UART: [idev] --
6,057,761 UART: [ldev] ++
6,058,441 UART: [ldev] CDI.KEYID = 6
6,059,381 UART: [ldev] SUBJECT.KEYID = 5
6,060,558 UART: [ldev] AUTHORITY.KEYID = 7
6,061,794 UART: [ldev] FE.KEYID = 1
6,099,910 UART: [ldev] Erasing FE.KEYID = 1
8,605,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,708 UART: [ldev] --
10,413,658 UART: [fwproc] Wait for Commands...
10,416,287 UART: [fwproc] Recv command 0x46574c44
10,418,595 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,603,867 >>> mbox cmd response: success
14,608,766 UART: [afmc] ++
14,609,473 UART: [afmc] CDI.KEYID = 6
14,610,633 UART: [afmc] SUBJECT.KEYID = 7
14,612,171 UART: [afmc] AUTHORITY.KEYID = 5
17,150,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,262 UART: [afmc] --
18,947,931 UART: [cold-reset] --
18,950,348 UART: [state] Locking Datavault
18,956,832 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,041 UART: [state] Locking ICCM
18,961,903 UART: [exit] Launching FMC @ 0x40000130
18,970,541 UART:
18,970,779 UART: Running Caliptra FMC ...
18,971,875 UART:
18,972,031 UART: [state] CFI Enabled
19,030,559 UART: [fht] FMC Alias Private Key: 7
20,793,920 UART: [art] Extend RT PCRs Done
20,795,127 UART: [art] Lock RT PCRs Done
20,796,615 UART: [art] Populate DV Done
20,801,973 UART: [fht] FMC Alias Private Key: 7
20,803,464 UART: [art] Derive CDI
20,804,227 UART: [art] Store in in slot 0x4
20,862,942 UART: [art] Derive Key Pair
20,863,938 UART: [art] Store priv key in slot 0x5
23,326,256 UART: [art] Derive Key Pair - Done
23,339,092 UART: [art] Signing Cert with AUTHO
23,340,392 UART: RITY.KEYID = 7
25,051,998 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,497 UART: [art] PUB.X = 426F84871BD6BF6B08EE780FE9EED7726C0638791469490C39C815210A714D9E0AD5B2BEC8D29C2469DFF53A95CE8D99
25,060,743 UART: [art] PUB.Y = 4F0CC75AF4241DBDE7F31BEAB358D73CEFDDB9F1255FD8EC6BE6DB926DB30F2E5E7D8C7618DA2E8A37FAC699E4FF7415
25,068,078 UART: [art] SIG.R = 1C8E2402E0600665778515D91595BF9D2E4DC326369FC4A87594C9C03C2E2F0A5935ED606CF719ACF23384FDC029194A
25,075,409 UART: [art] SIG.S = 7E32A4C053DAC97B463F27984C4703BE589221C415BA42D854200E1401C42B75AE3DDF28D8F2BDF40515949ECC11B191
26,054,916 UART: Caliptra RT
26,055,623 UART: [state] CFI Enabled
26,220,359 UART: [rt] RT listening for mailbox commands...
26,222,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,252,771 UART: [rt]cmd =0x44504543, len=24
26,293,591 >>> mbox cmd response data (40 bytes)
26,294,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,324,140 UART: [rt]cmd =0x44504543, len=24
26,357,813 >>> mbox cmd response data (40 bytes)
26,358,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,388,292 UART: [rt]cmd =0x44504543, len=24
26,421,702 >>> mbox cmd response data (40 bytes)
26,422,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,452,257 UART: [rt]cmd =0x44504543, len=24
26,486,291 >>> mbox cmd response data (40 bytes)
26,486,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,516,852 UART: [rt]cmd =0x44504543, len=24
26,550,125 >>> mbox cmd response data (40 bytes)
26,550,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,580,832 UART: [rt]cmd =0x44504543, len=24
26,613,880 >>> mbox cmd response data (40 bytes)
26,614,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,644,463 UART: [rt]cmd =0x44504543, len=24
26,678,028 >>> mbox cmd response data (40 bytes)
26,678,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,708,875 UART: [rt]cmd =0x44504543, len=24
26,742,073 >>> mbox cmd response data (40 bytes)
26,742,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,772,885 UART: [rt]cmd =0x44504543, len=24
26,806,267 >>> mbox cmd response data (40 bytes)
26,806,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,836,706 UART: [rt]cmd =0x44504543, len=24
26,870,149 >>> mbox cmd response data (40 bytes)
26,870,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,900,584 UART: [rt]cmd =0x44504543, len=24
26,934,223 >>> mbox cmd response data (40 bytes)
26,934,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,964,868 UART: [rt]cmd =0x44504543, len=24
26,998,263 >>> mbox cmd response data (40 bytes)
26,998,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,028,718 UART: [rt]cmd =0x44504543, len=24
27,062,299 >>> mbox cmd response data (40 bytes)
27,062,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,093,023 UART: [rt]cmd =0x44504543, len=24
27,126,414 >>> mbox cmd response data (40 bytes)
27,127,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,157,072 UART: [rt]cmd =0x44504543, len=24
27,190,186 >>> mbox cmd response data (40 bytes)
27,190,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,220,934 UART: [rt]cmd =0x44504543, len=24
27,227,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,439,919 ready_for_fw is high
3,440,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,747,112 >>> mbox cmd response: success
19,045,359 UART:
19,045,742 UART: Running Caliptra FMC ...
19,046,885 UART:
19,047,052 UART: [state] CFI Enabled
19,111,600 UART: [fht] FMC Alias Private Key: 7
20,875,601 UART: [art] Extend RT PCRs Done
20,876,844 UART: [art] Lock RT PCRs Done
20,878,255 UART: [art] Populate DV Done
20,883,613 UART: [fht] FMC Alias Private Key: 7
20,885,207 UART: [art] Derive CDI
20,886,024 UART: [art] Store in in slot 0x4
20,943,613 UART: [art] Derive Key Pair
20,944,654 UART: [art] Store priv key in slot 0x5
23,407,476 UART: [art] Derive Key Pair - Done
23,420,199 UART: [art] Signing Cert with AUTHO
23,421,501 UART: RITY.KEYID = 7
25,133,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,952 UART: [art] PUB.X = 300A00984467C6C6B0EDEC0BA4EBDB7194B22BEF106F0997A61D74D52ED026A48229040C9AA32D6D0F292E101ED9F1B8
25,142,213 UART: [art] PUB.Y = 72809229B1899648F2F143AC422EDA9F3006FF414B64365F33569BEB432F019A2B3B3268E0B7471D961F916980862E53
25,149,424 UART: [art] SIG.R = EAD24AF15EBCF516C13C84BDA172EA5D78E04459F7A3CA6D89DA22BAD463EFE22D0D9AD45C2AB71DEDF543B5C4C46FAC
25,156,869 UART: [art] SIG.S = C84A478BD14A2B03636E3AED44DD604D4C36714340B1B25F4935B729F5E496FBE213FDA85241C8F77E156F738BA1BA55
26,135,700 UART: Caliptra RT
26,136,416 UART: [state] CFI Enabled
26,308,072 UART: [rt] RT listening for mailbox commands...
26,310,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,340,612 UART: [rt]cmd =0x44504543, len=24
26,382,895 >>> mbox cmd response data (40 bytes)
26,383,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,413,694 UART: [rt]cmd =0x44504543, len=24
26,447,770 >>> mbox cmd response data (40 bytes)
26,448,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,478,163 UART: [rt]cmd =0x44504543, len=24
26,511,656 >>> mbox cmd response data (40 bytes)
26,512,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,542,327 UART: [rt]cmd =0x44504543, len=24
26,575,911 >>> mbox cmd response data (40 bytes)
26,576,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,606,451 UART: [rt]cmd =0x44504543, len=24
26,640,331 >>> mbox cmd response data (40 bytes)
26,640,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,808 UART: [rt]cmd =0x44504543, len=24
26,703,777 >>> mbox cmd response data (40 bytes)
26,704,395 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,734,241 UART: [rt]cmd =0x44504543, len=24
26,768,267 >>> mbox cmd response data (40 bytes)
26,768,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,798,627 UART: [rt]cmd =0x44504543, len=24
26,832,443 >>> mbox cmd response data (40 bytes)
26,833,093 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,863,215 UART: [rt]cmd =0x44504543, len=24
26,896,214 >>> mbox cmd response data (40 bytes)
26,896,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,926,819 UART: [rt]cmd =0x44504543, len=24
26,960,352 >>> mbox cmd response data (40 bytes)
26,960,983 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,990,731 UART: [rt]cmd =0x44504543, len=24
27,024,673 >>> mbox cmd response data (40 bytes)
27,025,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,055,363 UART: [rt]cmd =0x44504543, len=24
27,088,444 >>> mbox cmd response data (40 bytes)
27,089,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,118,964 UART: [rt]cmd =0x44504543, len=24
27,152,870 >>> mbox cmd response data (40 bytes)
27,153,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,183,356 UART: [rt]cmd =0x44504543, len=24
27,216,459 >>> mbox cmd response data (40 bytes)
27,217,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,247,105 UART: [rt]cmd =0x44504543, len=24
27,280,851 >>> mbox cmd response data (40 bytes)
27,281,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,311,269 UART: [rt]cmd =0x44504543, len=24
27,317,435 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,414 UART:
192,776 UART: Running Caliptra ROM ...
193,884 UART:
603,583 UART: [state] CFI Enabled
616,679 UART: [state] LifecycleState = Unprovisioned
619,097 UART: [state] DebugLocked = No
620,262 UART: [state] WD Timer not started. Device not locked for debugging
623,651 UART: [kat] SHA2-256
813,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,250 UART: [kat] ++
824,761 UART: [kat] sha1
837,118 UART: [kat] SHA2-256
840,120 UART: [kat] SHA2-384
845,816 UART: [kat] SHA2-512-ACC
848,382 UART: [kat] ECC-384
3,287,807 UART: [kat] HMAC-384Kdf
3,301,112 UART: [kat] LMS
3,832,971 UART: [kat] --
3,838,663 UART: [cold-reset] ++
3,841,082 UART: [fht] FHT @ 0x50003400
3,851,696 UART: [idev] ++
3,852,393 UART: [idev] CDI.KEYID = 6
3,853,415 UART: [idev] SUBJECT.KEYID = 7
3,854,508 UART: [idev] UDS.KEYID = 0
3,855,517 ready_for_fw is high
3,855,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,939 UART: [idev] Erasing UDS.KEYID = 0
6,333,106 UART: [idev] Sha1 KeyId Algorithm
6,355,388 UART: [idev] --
6,361,439 UART: [ldev] ++
6,362,116 UART: [ldev] CDI.KEYID = 6
6,363,015 UART: [ldev] SUBJECT.KEYID = 5
6,364,228 UART: [ldev] AUTHORITY.KEYID = 7
6,365,448 UART: [ldev] FE.KEYID = 1
6,376,872 UART: [ldev] Erasing FE.KEYID = 1
8,850,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,299 UART: [ldev] --
10,640,077 UART: [fwproc] Wait for Commands...
10,641,629 UART: [fwproc] Recv command 0x46574c44
10,643,873 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,424 >>> mbox cmd response: success
14,841,206 UART: [afmc] ++
14,841,919 UART: [afmc] CDI.KEYID = 6
14,843,104 UART: [afmc] SUBJECT.KEYID = 7
14,844,537 UART: [afmc] AUTHORITY.KEYID = 5
17,347,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,362 UART: [afmc] --
19,144,166 UART: [cold-reset] --
19,149,873 UART: [state] Locking Datavault
19,156,368 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,518 UART: [state] Locking ICCM
19,160,794 UART: [exit] Launching FMC @ 0x40000130
19,169,469 UART:
19,169,699 UART: Running Caliptra FMC ...
19,170,791 UART:
19,170,942 UART: [state] CFI Enabled
19,178,985 UART: [fht] FMC Alias Private Key: 7
20,935,694 UART: [art] Extend RT PCRs Done
20,936,910 UART: [art] Lock RT PCRs Done
20,938,368 UART: [art] Populate DV Done
20,943,629 UART: [fht] FMC Alias Private Key: 7
20,945,322 UART: [art] Derive CDI
20,946,050 UART: [art] Store in in slot 0x4
20,989,175 UART: [art] Derive Key Pair
20,990,170 UART: [art] Store priv key in slot 0x5
23,416,523 UART: [art] Derive Key Pair - Done
23,429,535 UART: [art] Signing Cert with AUTHO
23,430,855 UART: RITY.KEYID = 7
25,135,856 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,363 UART: [art] PUB.X = 7622216766665C5F87D369AF458C4A3B3A0069AFBBBF7057FDDD9CA370A816AA16B8D155ADE7B36B13E804EABD28D166
25,144,652 UART: [art] PUB.Y = 9168E1976DB5E107F037C868C01FAD76AF3CE4D2C66A92E62A1406405A137793B9ABD57A137091E5B710ECA87B67D7E9
25,151,915 UART: [art] SIG.R = F8177DA79719936483F7D0C6C95B5CD7D1DAEA2249054D75844540C571ECB89001CF70467772F9707FDA47F43C46CB0C
25,159,283 UART: [art] SIG.S = EE4F91675D3373FC33CABDD4F3CE472E75986E16F0FAE12A0494D9551AAD97CF62148F6123DBC384080B8F990B078404
26,138,180 UART: Caliptra RT
26,138,865 UART: [state] CFI Enabled
26,255,644 UART: [rt] RT listening for mailbox commands...
26,257,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,287,574 UART: [rt]cmd =0x44504543, len=24
26,313,600 >>> mbox cmd response data (40 bytes)
26,314,400 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,344,361 UART: [rt]cmd =0x44504543, len=24
26,370,708 >>> mbox cmd response data (40 bytes)
26,371,322 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,401,151 UART: [rt]cmd =0x44504543, len=24
26,427,698 >>> mbox cmd response data (40 bytes)
26,428,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,458,275 UART: [rt]cmd =0x44504543, len=24
26,484,551 >>> mbox cmd response data (40 bytes)
26,485,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,515,223 UART: [rt]cmd =0x44504543, len=24
26,541,030 >>> mbox cmd response data (40 bytes)
26,541,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,571,305 UART: [rt]cmd =0x44504543, len=24
26,597,373 >>> mbox cmd response data (40 bytes)
26,597,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,628,036 UART: [rt]cmd =0x44504543, len=24
26,654,032 >>> mbox cmd response data (40 bytes)
26,654,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,684,709 UART: [rt]cmd =0x44504543, len=24
26,711,128 >>> mbox cmd response data (40 bytes)
26,711,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,741,783 UART: [rt]cmd =0x44504543, len=24
26,768,074 >>> mbox cmd response data (40 bytes)
26,768,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,798,586 UART: [rt]cmd =0x44504543, len=24
26,824,910 >>> mbox cmd response data (40 bytes)
26,825,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,855,145 UART: [rt]cmd =0x44504543, len=24
26,881,457 >>> mbox cmd response data (40 bytes)
26,882,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,912,094 UART: [rt]cmd =0x44504543, len=24
26,938,622 >>> mbox cmd response data (40 bytes)
26,939,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,969,386 UART: [rt]cmd =0x44504543, len=24
26,995,351 >>> mbox cmd response data (40 bytes)
26,995,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,025,781 UART: [rt]cmd =0x44504543, len=24
27,052,060 >>> mbox cmd response data (40 bytes)
27,052,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,082,465 UART: [rt]cmd =0x44504543, len=24
27,108,388 >>> mbox cmd response data (40 bytes)
27,109,026 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,139,086 UART: [rt]cmd =0x44504543, len=24
27,145,809 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,753,095 ready_for_fw is high
3,753,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,395 >>> mbox cmd response: success
19,220,785 UART:
19,221,171 UART: Running Caliptra FMC ...
19,222,360 UART:
19,222,522 UART: [state] CFI Enabled
19,230,245 UART: [fht] FMC Alias Private Key: 7
20,986,610 UART: [art] Extend RT PCRs Done
20,987,833 UART: [art] Lock RT PCRs Done
20,989,264 UART: [art] Populate DV Done
20,994,730 UART: [fht] FMC Alias Private Key: 7
20,996,210 UART: [art] Derive CDI
20,996,959 UART: [art] Store in in slot 0x4
21,039,446 UART: [art] Derive Key Pair
21,040,487 UART: [art] Store priv key in slot 0x5
23,467,179 UART: [art] Derive Key Pair - Done
23,480,555 UART: [art] Signing Cert with AUTHO
23,481,853 UART: RITY.KEYID = 7
25,187,557 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,061 UART: [art] PUB.X = BB067CE3BFDA99A65765990818E6C26559579A6195F647ABE5E233A90592C6237CE86EDBDDB6D02B6875260D413CEEA9
25,196,370 UART: [art] PUB.Y = 628060B1AD307CE9EC00082FFC0AED83AA805A059B9B2037ACF2153146371005BB024F0F47CE352F7CFE4C3C03EA84F6
25,203,591 UART: [art] SIG.R = 4CD4E4335CBC56181C92AC188DE5CC0DBBDBBE8F3FE7FE80286BD4638E987EE2C07F91E4BFE7358922EA84ED28BCF800
25,210,968 UART: [art] SIG.S = A69F8ACFDCA2BD550DC170B7B9ABB7E1E9DCAA6F7FB23F7DFFFC35D14CC69099FF0432D101E0BD5F4C089BC74B6050A6
26,189,954 UART: Caliptra RT
26,190,660 UART: [state] CFI Enabled
26,307,988 UART: [rt] RT listening for mailbox commands...
26,309,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,339,966 UART: [rt]cmd =0x44504543, len=24
26,365,663 >>> mbox cmd response data (40 bytes)
26,366,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,396,129 UART: [rt]cmd =0x44504543, len=24
26,422,134 >>> mbox cmd response data (40 bytes)
26,422,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,452,663 UART: [rt]cmd =0x44504543, len=24
26,478,691 >>> mbox cmd response data (40 bytes)
26,479,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,509,089 UART: [rt]cmd =0x44504543, len=24
26,535,622 >>> mbox cmd response data (40 bytes)
26,536,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,566,024 UART: [rt]cmd =0x44504543, len=24
26,592,141 >>> mbox cmd response data (40 bytes)
26,592,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,622,814 UART: [rt]cmd =0x44504543, len=24
26,649,107 >>> mbox cmd response data (40 bytes)
26,649,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,679,727 UART: [rt]cmd =0x44504543, len=24
26,705,749 >>> mbox cmd response data (40 bytes)
26,706,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,361 UART: [rt]cmd =0x44504543, len=24
26,762,852 >>> mbox cmd response data (40 bytes)
26,763,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,793,598 UART: [rt]cmd =0x44504543, len=24
26,820,143 >>> mbox cmd response data (40 bytes)
26,820,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,850,598 UART: [rt]cmd =0x44504543, len=24
26,876,688 >>> mbox cmd response data (40 bytes)
26,877,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,907,227 UART: [rt]cmd =0x44504543, len=24
26,933,354 >>> mbox cmd response data (40 bytes)
26,933,962 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,963,781 UART: [rt]cmd =0x44504543, len=24
26,989,949 >>> mbox cmd response data (40 bytes)
26,990,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,020,456 UART: [rt]cmd =0x44504543, len=24
27,046,271 >>> mbox cmd response data (40 bytes)
27,046,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,076,915 UART: [rt]cmd =0x44504543, len=24
27,103,315 >>> mbox cmd response data (40 bytes)
27,103,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,133,557 UART: [rt]cmd =0x44504543, len=24
27,159,934 >>> mbox cmd response data (40 bytes)
27,160,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,190,599 UART: [rt]cmd =0x44504543, len=24
27,196,777 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,331 UART: [kat] SHA2-256
892,269 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,216 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,475,897 UART: [cold-reset] ++
1,476,285 UART: [fht] Storing FHT @ 0x50003400
1,479,292 UART: [idev] ++
1,479,460 UART: [idev] CDI.KEYID = 6
1,479,820 UART: [idev] SUBJECT.KEYID = 7
1,480,244 UART: [idev] UDS.KEYID = 0
1,480,589 ready_for_fw is high
1,480,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,038 UART: [idev] Erasing UDS.KEYID = 0
1,504,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,408 UART: [idev] --
1,514,411 UART: [ldev] ++
1,514,579 UART: [ldev] CDI.KEYID = 6
1,514,942 UART: [ldev] SUBJECT.KEYID = 5
1,515,368 UART: [ldev] AUTHORITY.KEYID = 7
1,515,831 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,546,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,906 UART: [ldev] --
1,586,347 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46574c44
1,587,907 UART: [fwproc] Received Image of size 114448 bytes
2,887,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,208 >>> mbox cmd response: success
3,081,410 UART: [afmc] ++
3,081,578 UART: [afmc] CDI.KEYID = 6
3,081,940 UART: [afmc] SUBJECT.KEYID = 7
3,082,365 UART: [afmc] AUTHORITY.KEYID = 5
3,117,146 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,687 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,377 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,206 UART: [afmc] --
3,160,276 UART: [cold-reset] --
3,161,110 UART: [state] Locking Datavault
3,162,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,051 UART: [state] Locking ICCM
3,163,723 UART: [exit] Launching FMC @ 0x40000130
3,169,052 UART:
3,169,068 UART: Running Caliptra FMC ...
3,169,476 UART:
3,169,530 UART: [state] CFI Enabled
3,179,949 UART: [fht] FMC Alias Private Key: 7
3,287,408 UART: [art] Extend RT PCRs Done
3,287,836 UART: [art] Lock RT PCRs Done
3,289,488 UART: [art] Populate DV Done
3,297,771 UART: [fht] FMC Alias Private Key: 7
3,298,905 UART: [art] Derive CDI
3,299,185 UART: [art] Store in in slot 0x4
3,384,926 UART: [art] Derive Key Pair
3,385,286 UART: [art] Store priv key in slot 0x5
3,398,164 UART: [art] Derive Key Pair - Done
3,412,961 UART: [art] Signing Cert with AUTHO
3,413,441 UART: RITY.KEYID = 7
3,428,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,746 UART: [art] PUB.X = 2B89D00C2D2B215393293665AA8EC25AC7F50AB7715F4E3D6F95F1694E0D46CDD27B0DC15AF98D8EF0733191364E4793
3,436,508 UART: [art] PUB.Y = 9111CD72C0AB50FBB3BE455EF27833E18963BCD3C10D5E3D67B0E872E0419F23ECEBB6FD473E48F34B137BE2BC663463
3,443,469 UART: [art] SIG.R = 1AA7F505128C817F851AE4A8BCCC81DEA072E06624BE6EB380A43850E32FBCC31A520843A52A7A948BDA265158C96508
3,450,236 UART: [art] SIG.S = D45E2CBD3F6D41F33D5926F8A7F8A9AC49269F00CCA67E0AA213D99999C4DEC92E6C611DD308B2517549FE045EBE51BF
3,474,394 UART: Caliptra RT
3,474,647 UART: [state] CFI Enabled
3,583,398 UART: [rt] RT listening for mailbox commands...
3,584,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,062 UART: [rt]cmd =0x44504543, len=24
3,640,570 >>> mbox cmd response data (40 bytes)
3,640,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,124 UART: [rt]cmd =0x44504543, len=24
3,696,284 >>> mbox cmd response data (40 bytes)
3,696,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,725,712 UART: [rt]cmd =0x44504543, len=24
3,751,932 >>> mbox cmd response data (40 bytes)
3,751,933 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,304 UART: [rt]cmd =0x44504543, len=24
3,808,066 >>> mbox cmd response data (40 bytes)
3,808,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,628 UART: [rt]cmd =0x44504543, len=24
3,863,818 >>> mbox cmd response data (40 bytes)
3,863,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,272 UART: [rt]cmd =0x44504543, len=24
3,919,062 >>> mbox cmd response data (40 bytes)
3,919,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,554 UART: [rt]cmd =0x44504543, len=24
3,974,364 >>> mbox cmd response data (40 bytes)
3,974,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,610 UART: [rt]cmd =0x44504543, len=24
4,030,046 >>> mbox cmd response data (40 bytes)
4,030,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,486 UART: [rt]cmd =0x44504543, len=24
4,085,638 >>> mbox cmd response data (40 bytes)
4,085,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,144 UART: [rt]cmd =0x44504543, len=24
4,141,706 >>> mbox cmd response data (40 bytes)
4,141,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,142 UART: [rt]cmd =0x44504543, len=24
4,197,092 >>> mbox cmd response data (40 bytes)
4,197,093 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,504 UART: [rt]cmd =0x44504543, len=24
4,252,950 >>> mbox cmd response data (40 bytes)
4,252,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,282,546 UART: [rt]cmd =0x44504543, len=24
4,308,784 >>> mbox cmd response data (40 bytes)
4,308,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,346 UART: [rt]cmd =0x44504543, len=24
4,364,862 >>> mbox cmd response data (40 bytes)
4,364,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,394,120 UART: [rt]cmd =0x44504543, len=24
4,420,466 >>> mbox cmd response data (40 bytes)
4,420,467 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,964 UART: [rt]cmd =0x44504543, len=24
4,457,134 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 ready_for_fw is high
1,362,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,607 >>> mbox cmd response: success
2,992,173 UART:
2,992,189 UART: Running Caliptra FMC ...
2,992,597 UART:
2,992,651 UART: [state] CFI Enabled
3,003,240 UART: [fht] FMC Alias Private Key: 7
3,111,343 UART: [art] Extend RT PCRs Done
3,111,771 UART: [art] Lock RT PCRs Done
3,113,675 UART: [art] Populate DV Done
3,121,748 UART: [fht] FMC Alias Private Key: 7
3,122,808 UART: [art] Derive CDI
3,123,088 UART: [art] Store in in slot 0x4
3,208,653 UART: [art] Derive Key Pair
3,209,013 UART: [art] Store priv key in slot 0x5
3,221,949 UART: [art] Derive Key Pair - Done
3,236,858 UART: [art] Signing Cert with AUTHO
3,237,338 UART: RITY.KEYID = 7
3,252,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,483 UART: [art] PUB.X = 8B56F3BD007036FB83A2DDCBD3B9237B7DFC375D7AA32794BEE8ADBAA4E5D6072C7A8B70AD6B8E5FE9934A1E5EE959BF
3,260,256 UART: [art] PUB.Y = A20CAC8E35F4C952EBE50AA54BAF7A9EA6C447ABFC585989A565E8979BBC3143F4F8C8EF33A3316EA2E45E76C262606B
3,267,218 UART: [art] SIG.R = 6AC090B16E30D42FF57E9BFA3F0912FEDE73CC64EC45705EC9F47D6EE442D3FD1CA293175542ADA14A3FC729ED96A1B4
3,274,005 UART: [art] SIG.S = 4E5CDBE7C77B9B5E6E08E2D286E9A78FD45B9219666DC94F6C345C2DDEAF83578A7F912DF6E495FA584A8F118EDD2C8C
3,298,093 UART: Caliptra RT
3,298,346 UART: [state] CFI Enabled
3,407,042 UART: [rt] RT listening for mailbox commands...
3,407,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,892 UART: [rt]cmd =0x44504543, len=24
3,464,504 >>> mbox cmd response data (40 bytes)
3,464,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,030 UART: [rt]cmd =0x44504543, len=24
3,519,968 >>> mbox cmd response data (40 bytes)
3,519,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,426 UART: [rt]cmd =0x44504543, len=24
3,575,540 >>> mbox cmd response data (40 bytes)
3,575,541 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,186 UART: [rt]cmd =0x44504543, len=24
3,631,414 >>> mbox cmd response data (40 bytes)
3,631,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,936 UART: [rt]cmd =0x44504543, len=24
3,687,244 >>> mbox cmd response data (40 bytes)
3,687,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,796 UART: [rt]cmd =0x44504543, len=24
3,742,764 >>> mbox cmd response data (40 bytes)
3,742,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,238 UART: [rt]cmd =0x44504543, len=24
3,798,242 >>> mbox cmd response data (40 bytes)
3,798,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,800 UART: [rt]cmd =0x44504543, len=24
3,854,150 >>> mbox cmd response data (40 bytes)
3,854,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,540 UART: [rt]cmd =0x44504543, len=24
3,910,126 >>> mbox cmd response data (40 bytes)
3,910,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,466 UART: [rt]cmd =0x44504543, len=24
3,965,742 >>> mbox cmd response data (40 bytes)
3,965,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,352 UART: [rt]cmd =0x44504543, len=24
4,021,120 >>> mbox cmd response data (40 bytes)
4,021,121 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,462 UART: [rt]cmd =0x44504543, len=24
4,076,992 >>> mbox cmd response data (40 bytes)
4,076,993 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,106,630 UART: [rt]cmd =0x44504543, len=24
4,133,214 >>> mbox cmd response data (40 bytes)
4,133,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,762 UART: [rt]cmd =0x44504543, len=24
4,189,054 >>> mbox cmd response data (40 bytes)
4,189,055 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,218,568 UART: [rt]cmd =0x44504543, len=24
4,245,130 >>> mbox cmd response data (40 bytes)
4,245,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,274,528 UART: [rt]cmd =0x44504543, len=24
4,281,696 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,619 UART: [kat] LMS
1,475,815 UART: [kat] --
1,476,840 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,479,937 UART: [idev] ++
1,480,105 UART: [idev] CDI.KEYID = 6
1,480,465 UART: [idev] SUBJECT.KEYID = 7
1,480,889 UART: [idev] UDS.KEYID = 0
1,481,234 ready_for_fw is high
1,481,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,063 UART: [idev] Erasing UDS.KEYID = 0
1,505,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,433 UART: [idev] --
1,515,666 UART: [ldev] ++
1,515,834 UART: [ldev] CDI.KEYID = 6
1,516,197 UART: [ldev] SUBJECT.KEYID = 5
1,516,623 UART: [ldev] AUTHORITY.KEYID = 7
1,517,086 UART: [ldev] FE.KEYID = 1
1,522,262 UART: [ldev] Erasing FE.KEYID = 1
1,548,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,933 UART: [ldev] --
1,587,292 UART: [fwproc] Waiting for Commands...
1,588,159 UART: [fwproc] Received command 0x46574c44
1,588,950 UART: [fwproc] Received Image of size 114448 bytes
2,889,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,748 >>> mbox cmd response: success
3,082,774 UART: [afmc] ++
3,082,942 UART: [afmc] CDI.KEYID = 6
3,083,304 UART: [afmc] SUBJECT.KEYID = 7
3,083,729 UART: [afmc] AUTHORITY.KEYID = 5
3,119,114 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,596 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,989 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,679 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,710 UART: [afmc] --
3,162,754 UART: [cold-reset] --
3,163,498 UART: [state] Locking Datavault
3,164,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,175 UART: [state] Locking ICCM
3,165,649 UART: [exit] Launching FMC @ 0x40000130
3,170,978 UART:
3,170,994 UART: Running Caliptra FMC ...
3,171,402 UART:
3,171,545 UART: [state] CFI Enabled
3,182,344 UART: [fht] FMC Alias Private Key: 7
3,290,467 UART: [art] Extend RT PCRs Done
3,290,895 UART: [art] Lock RT PCRs Done
3,292,295 UART: [art] Populate DV Done
3,300,362 UART: [fht] FMC Alias Private Key: 7
3,301,464 UART: [art] Derive CDI
3,301,744 UART: [art] Store in in slot 0x4
3,387,271 UART: [art] Derive Key Pair
3,387,631 UART: [art] Store priv key in slot 0x5
3,400,801 UART: [art] Derive Key Pair - Done
3,415,444 UART: [art] Signing Cert with AUTHO
3,415,924 UART: RITY.KEYID = 7
3,431,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,975 UART: [art] PUB.X = 6672566A319E023A7C7B2086378FABA88804943B97C50115EFE1944B4C4027688A47BF5FDADBA4FBE1495810AF0A0520
3,438,730 UART: [art] PUB.Y = DECB5C50A34E9D34CEAC13E19B1E6F070D7D394550074FA6CF2B649E0E7F4AFE8E2E1F4BEA2D6C71074883E4C64A718E
3,445,685 UART: [art] SIG.R = B28A80D91AC64E606A5B82CD812CEFC1FFCD2F5FA29288DD2EF5F0DF9411A9C2FB4099F4B58DCAB6E841A089F1BE1CB4
3,452,483 UART: [art] SIG.S = 068C7F070B6EC726CDFBD9471FFC57CBD527915B825DD3FDAD15C036219592847CE489C7EE320E9CF17B616808826424
3,476,513 UART: Caliptra RT
3,476,858 UART: [state] CFI Enabled
3,586,061 UART: [rt] RT listening for mailbox commands...
3,586,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,847 UART: [rt]cmd =0x44504543, len=24
3,642,681 >>> mbox cmd response data (40 bytes)
3,642,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,295 UART: [rt]cmd =0x44504543, len=24
3,698,935 >>> mbox cmd response data (40 bytes)
3,698,936 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,728,261 UART: [rt]cmd =0x44504543, len=24
3,754,979 >>> mbox cmd response data (40 bytes)
3,754,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,391 UART: [rt]cmd =0x44504543, len=24
3,811,369 >>> mbox cmd response data (40 bytes)
3,811,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,935 UART: [rt]cmd =0x44504543, len=24
3,867,203 >>> mbox cmd response data (40 bytes)
3,867,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,487 UART: [rt]cmd =0x44504543, len=24
3,923,165 >>> mbox cmd response data (40 bytes)
3,923,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,773 UART: [rt]cmd =0x44504543, len=24
3,979,251 >>> mbox cmd response data (40 bytes)
3,979,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,453 UART: [rt]cmd =0x44504543, len=24
4,034,787 >>> mbox cmd response data (40 bytes)
4,034,788 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,415 UART: [rt]cmd =0x44504543, len=24
4,090,909 >>> mbox cmd response data (40 bytes)
4,090,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,459 UART: [rt]cmd =0x44504543, len=24
4,146,835 >>> mbox cmd response data (40 bytes)
4,146,836 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,176,269 UART: [rt]cmd =0x44504543, len=24
4,202,993 >>> mbox cmd response data (40 bytes)
4,202,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,232,265 UART: [rt]cmd =0x44504543, len=24
4,258,641 >>> mbox cmd response data (40 bytes)
4,258,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,288,183 UART: [rt]cmd =0x44504543, len=24
4,314,983 >>> mbox cmd response data (40 bytes)
4,314,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,344,413 UART: [rt]cmd =0x44504543, len=24
4,370,785 >>> mbox cmd response data (40 bytes)
4,370,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,400,593 UART: [rt]cmd =0x44504543, len=24
4,426,593 >>> mbox cmd response data (40 bytes)
4,426,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,456,039 UART: [rt]cmd =0x44504543, len=24
4,463,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,060 ready_for_fw is high
1,363,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,110 >>> mbox cmd response: success
2,991,828 UART:
2,991,844 UART: Running Caliptra FMC ...
2,992,252 UART:
2,992,395 UART: [state] CFI Enabled
3,003,278 UART: [fht] FMC Alias Private Key: 7
3,111,499 UART: [art] Extend RT PCRs Done
3,111,927 UART: [art] Lock RT PCRs Done
3,113,435 UART: [art] Populate DV Done
3,121,302 UART: [fht] FMC Alias Private Key: 7
3,122,406 UART: [art] Derive CDI
3,122,686 UART: [art] Store in in slot 0x4
3,208,589 UART: [art] Derive Key Pair
3,208,949 UART: [art] Store priv key in slot 0x5
3,222,365 UART: [art] Derive Key Pair - Done
3,237,141 UART: [art] Signing Cert with AUTHO
3,237,621 UART: RITY.KEYID = 7
3,252,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,548 UART: [art] PUB.X = C8EFF5CDFDF3B6E499FCC7E6D9B6BF550FE3A1BC05C89AF748926092AFE6C518344AAA52086D94E32DE26102B4881B25
3,260,324 UART: [art] PUB.Y = 6A6972DFFB5A24748109482D658F054B1264279A925B8E9B12042BBAA28F7C3DF6562AB37142BB4ABED66700BB9780E5
3,267,245 UART: [art] SIG.R = 2386C9A1EA230216560BB32B91539F4AF9448B703E5FFEDAC08A30D5990C5DDF275071D0A47B538F6B9736F0C7A120A5
3,274,010 UART: [art] SIG.S = 9313B71B190E84A70EE36BE514A7494592E2AC7114A005E74BE4ADA8F232A6EE1BD78F9326AA80743FDAC30D9DA05724
3,297,899 UART: Caliptra RT
3,298,244 UART: [state] CFI Enabled
3,406,773 UART: [rt] RT listening for mailbox commands...
3,407,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,361 UART: [rt]cmd =0x44504543, len=24
3,464,005 >>> mbox cmd response data (40 bytes)
3,464,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,595 UART: [rt]cmd =0x44504543, len=24
3,520,129 >>> mbox cmd response data (40 bytes)
3,520,130 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,559 UART: [rt]cmd =0x44504543, len=24
3,575,983 >>> mbox cmd response data (40 bytes)
3,575,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,491 UART: [rt]cmd =0x44504543, len=24
3,631,791 >>> mbox cmd response data (40 bytes)
3,631,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,391 UART: [rt]cmd =0x44504543, len=24
3,687,749 >>> mbox cmd response data (40 bytes)
3,687,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,189 UART: [rt]cmd =0x44504543, len=24
3,743,237 >>> mbox cmd response data (40 bytes)
3,743,238 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,575 UART: [rt]cmd =0x44504543, len=24
3,799,103 >>> mbox cmd response data (40 bytes)
3,799,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,555 UART: [rt]cmd =0x44504543, len=24
3,855,113 >>> mbox cmd response data (40 bytes)
3,855,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,575 UART: [rt]cmd =0x44504543, len=24
3,910,619 >>> mbox cmd response data (40 bytes)
3,910,620 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,113 UART: [rt]cmd =0x44504543, len=24
3,966,191 >>> mbox cmd response data (40 bytes)
3,966,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,713 UART: [rt]cmd =0x44504543, len=24
4,021,425 >>> mbox cmd response data (40 bytes)
4,021,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,683 UART: [rt]cmd =0x44504543, len=24
4,076,627 >>> mbox cmd response data (40 bytes)
4,076,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,106,153 UART: [rt]cmd =0x44504543, len=24
4,132,637 >>> mbox cmd response data (40 bytes)
4,132,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,145 UART: [rt]cmd =0x44504543, len=24
4,188,605 >>> mbox cmd response data (40 bytes)
4,188,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,217,817 UART: [rt]cmd =0x44504543, len=24
4,244,101 >>> mbox cmd response data (40 bytes)
4,244,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,665 UART: [rt]cmd =0x44504543, len=24
4,280,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,673 UART: [kat] SHA2-256
903,613 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
918,238 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 ready_for_fw is high
1,176,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,365 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,576 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,640 UART: [fwproc] Wait for Commands...
1,283,418 UART: [fwproc] Recv command 0x46574c44
1,284,146 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,934 >>> mbox cmd response: success
2,778,012 UART: [afmc] ++
2,778,180 UART: [afmc] CDI.KEYID = 6
2,778,542 UART: [afmc] SUBJECT.KEYID = 7
2,778,967 UART: [afmc] AUTHORITY.KEYID = 5
2,814,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,639 UART: [afmc] --
2,857,591 UART: [cold-reset] --
2,858,427 UART: [state] Locking Datavault
2,859,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,398 UART: [state] Locking ICCM
2,860,850 UART: [exit] Launching FMC @ 0x40000130
2,866,179 UART:
2,866,195 UART: Running Caliptra FMC ...
2,866,603 UART:
2,866,657 UART: [state] CFI Enabled
2,877,016 UART: [fht] FMC Alias Private Key: 7
2,984,977 UART: [art] Extend RT PCRs Done
2,985,405 UART: [art] Lock RT PCRs Done
2,986,755 UART: [art] Populate DV Done
2,994,742 UART: [fht] FMC Alias Private Key: 7
2,995,692 UART: [art] Derive CDI
2,995,972 UART: [art] Store in in slot 0x4
3,081,611 UART: [art] Derive Key Pair
3,081,971 UART: [art] Store priv key in slot 0x5
3,094,729 UART: [art] Derive Key Pair - Done
3,109,766 UART: [art] Signing Cert with AUTHO
3,110,246 UART: RITY.KEYID = 7
3,125,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,229 UART: [art] PUB.X = 9C6980CC8ACCCB849CC2F2DDD5814ED1DBAA06587302649C75C67CDF42FA9EC5A5B386DB406870E548678BDB9993A15A
3,133,009 UART: [art] PUB.Y = 3CF4937C1B0A6055A037746DF3BAA8EF54819C7213376CCCA079482D91D295D21F24719086463078A7838CB1437BD29A
3,139,950 UART: [art] SIG.R = 6004615532E6DF96DA9CB562B5C5A1F8D92423E982CCBE399EB0F4C983BE3389EDE2A510A96B59B201DEB6DAA75A5CCF
3,146,732 UART: [art] SIG.S = D5748EEE85B133206BF17C5BDDCC1532BAA7A9D781506713771A58F06CBFFCE86E2930243348F12BA6C08D19D6768404
3,170,758 UART: Caliptra RT
3,171,011 UART: [state] CFI Enabled
3,280,062 UART: [rt] RT listening for mailbox commands...
3,280,732 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,766 UART: [rt]cmd =0x44504543, len=24
3,337,102 >>> mbox cmd response data (40 bytes)
3,337,103 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,640 UART: [rt]cmd =0x44504543, len=24
3,392,718 >>> mbox cmd response data (40 bytes)
3,392,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,078 UART: [rt]cmd =0x44504543, len=24
3,448,194 >>> mbox cmd response data (40 bytes)
3,448,195 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,656 UART: [rt]cmd =0x44504543, len=24
3,503,744 >>> mbox cmd response data (40 bytes)
3,503,745 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,268 UART: [rt]cmd =0x44504543, len=24
3,559,156 >>> mbox cmd response data (40 bytes)
3,559,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,740 UART: [rt]cmd =0x44504543, len=24
3,615,112 >>> mbox cmd response data (40 bytes)
3,615,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,582 UART: [rt]cmd =0x44504543, len=24
3,670,644 >>> mbox cmd response data (40 bytes)
3,670,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,170 UART: [rt]cmd =0x44504543, len=24
3,726,522 >>> mbox cmd response data (40 bytes)
3,726,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,796 UART: [rt]cmd =0x44504543, len=24
3,782,356 >>> mbox cmd response data (40 bytes)
3,782,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,798 UART: [rt]cmd =0x44504543, len=24
3,838,170 >>> mbox cmd response data (40 bytes)
3,838,171 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,746 UART: [rt]cmd =0x44504543, len=24
3,894,362 >>> mbox cmd response data (40 bytes)
3,894,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,040 UART: [rt]cmd =0x44504543, len=24
3,949,880 >>> mbox cmd response data (40 bytes)
3,949,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,330 UART: [rt]cmd =0x44504543, len=24
4,005,638 >>> mbox cmd response data (40 bytes)
4,005,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,035,170 UART: [rt]cmd =0x44504543, len=24
4,061,714 >>> mbox cmd response data (40 bytes)
4,061,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,156 UART: [rt]cmd =0x44504543, len=24
4,117,446 >>> mbox cmd response data (40 bytes)
4,117,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,134 UART: [rt]cmd =0x44504543, len=24
4,154,418 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,459 >>> mbox cmd response: success
2,688,527 UART:
2,688,543 UART: Running Caliptra FMC ...
2,688,951 UART:
2,689,005 UART: [state] CFI Enabled
2,699,406 UART: [fht] FMC Alias Private Key: 7
2,806,425 UART: [art] Extend RT PCRs Done
2,806,853 UART: [art] Lock RT PCRs Done
2,808,341 UART: [art] Populate DV Done
2,816,626 UART: [fht] FMC Alias Private Key: 7
2,817,632 UART: [art] Derive CDI
2,817,912 UART: [art] Store in in slot 0x4
2,903,249 UART: [art] Derive Key Pair
2,903,609 UART: [art] Store priv key in slot 0x5
2,917,039 UART: [art] Derive Key Pair - Done
2,931,951 UART: [art] Signing Cert with AUTHO
2,932,431 UART: RITY.KEYID = 7
2,948,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,810 UART: [art] PUB.X = E8E4B16CE305418CDAC0F87A02CA364EC9DF1C77EF42E85961E43054940A51523D62A0BDB04664798710BC26E5E2BA49
2,955,577 UART: [art] PUB.Y = 094A085E9248151122845D1D025102191BD38269D2C428989046C08D52391CB89DD68C04844CAEAC4E98A8FC6A533F5C
2,962,504 UART: [art] SIG.R = FDFAD9DD233AD8025A5EDA6A9CF08EF985313F0AC944DAD1A84B895685B70F677EFE25EAC7622F1B95F50019528C1E25
2,969,259 UART: [art] SIG.S = 11C46282F030618846626D04169455BD421031ED46F95F7E9AE1A462BD7B18B288760C82556493722002A8E7B1C744FB
2,992,611 UART: Caliptra RT
2,992,864 UART: [state] CFI Enabled
3,101,327 UART: [rt] RT listening for mailbox commands...
3,101,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,089 UART: [rt]cmd =0x44504543, len=24
3,158,985 >>> mbox cmd response data (40 bytes)
3,158,986 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,301 UART: [rt]cmd =0x44504543, len=24
3,214,829 >>> mbox cmd response data (40 bytes)
3,214,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,405 UART: [rt]cmd =0x44504543, len=24
3,270,173 >>> mbox cmd response data (40 bytes)
3,270,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,599 UART: [rt]cmd =0x44504543, len=24
3,325,659 >>> mbox cmd response data (40 bytes)
3,325,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,255 UART: [rt]cmd =0x44504543, len=24
3,381,945 >>> mbox cmd response data (40 bytes)
3,381,946 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,415 UART: [rt]cmd =0x44504543, len=24
3,437,637 >>> mbox cmd response data (40 bytes)
3,437,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,069 UART: [rt]cmd =0x44504543, len=24
3,493,185 >>> mbox cmd response data (40 bytes)
3,493,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,701 UART: [rt]cmd =0x44504543, len=24
3,549,091 >>> mbox cmd response data (40 bytes)
3,549,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,549 UART: [rt]cmd =0x44504543, len=24
3,604,639 >>> mbox cmd response data (40 bytes)
3,604,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,129 UART: [rt]cmd =0x44504543, len=24
3,660,361 >>> mbox cmd response data (40 bytes)
3,660,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,855 UART: [rt]cmd =0x44504543, len=24
3,716,401 >>> mbox cmd response data (40 bytes)
3,716,402 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,997 UART: [rt]cmd =0x44504543, len=24
3,772,035 >>> mbox cmd response data (40 bytes)
3,772,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,519 UART: [rt]cmd =0x44504543, len=24
3,828,107 >>> mbox cmd response data (40 bytes)
3,828,108 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,567 UART: [rt]cmd =0x44504543, len=24
3,884,411 >>> mbox cmd response data (40 bytes)
3,884,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,831 UART: [rt]cmd =0x44504543, len=24
3,939,815 >>> mbox cmd response data (40 bytes)
3,939,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,275 UART: [rt]cmd =0x44504543, len=24
3,976,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,091 UART: [state] LifecycleState = Unprovisioned
86,746 UART: [state] DebugLocked = No
87,466 UART: [state] WD Timer not started. Device not locked for debugging
88,767 UART: [kat] SHA2-256
894,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,542 UART: [kat] ++
898,694 UART: [kat] sha1
902,940 UART: [kat] SHA2-256
904,880 UART: [kat] SHA2-384
907,697 UART: [kat] SHA2-512-ACC
909,598 UART: [kat] ECC-384
919,509 UART: [kat] HMAC-384Kdf
924,217 UART: [kat] LMS
1,172,545 UART: [kat] --
1,173,540 UART: [cold-reset] ++
1,173,888 UART: [fht] FHT @ 0x50003400
1,176,633 UART: [idev] ++
1,176,801 UART: [idev] CDI.KEYID = 6
1,177,161 UART: [idev] SUBJECT.KEYID = 7
1,177,585 UART: [idev] UDS.KEYID = 0
1,177,930 ready_for_fw is high
1,177,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,249 UART: [idev] Erasing UDS.KEYID = 0
1,202,848 UART: [idev] Sha1 KeyId Algorithm
1,211,252 UART: [idev] --
1,212,288 UART: [ldev] ++
1,212,456 UART: [ldev] CDI.KEYID = 6
1,212,819 UART: [ldev] SUBJECT.KEYID = 5
1,213,245 UART: [ldev] AUTHORITY.KEYID = 7
1,213,708 UART: [ldev] FE.KEYID = 1
1,218,748 UART: [ldev] Erasing FE.KEYID = 1
1,245,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,226 UART: [ldev] --
1,284,595 UART: [fwproc] Wait for Commands...
1,285,201 UART: [fwproc] Recv command 0x46574c44
1,285,929 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,257 >>> mbox cmd response: success
2,778,319 UART: [afmc] ++
2,778,487 UART: [afmc] CDI.KEYID = 6
2,778,849 UART: [afmc] SUBJECT.KEYID = 7
2,779,274 UART: [afmc] AUTHORITY.KEYID = 5
2,815,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,490 UART: [afmc] --
2,858,594 UART: [cold-reset] --
2,859,686 UART: [state] Locking Datavault
2,860,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,471 UART: [state] Locking ICCM
2,862,133 UART: [exit] Launching FMC @ 0x40000130
2,867,462 UART:
2,867,478 UART: Running Caliptra FMC ...
2,867,886 UART:
2,868,029 UART: [state] CFI Enabled
2,878,488 UART: [fht] FMC Alias Private Key: 7
2,986,339 UART: [art] Extend RT PCRs Done
2,986,767 UART: [art] Lock RT PCRs Done
2,988,059 UART: [art] Populate DV Done
2,996,630 UART: [fht] FMC Alias Private Key: 7
2,997,600 UART: [art] Derive CDI
2,997,880 UART: [art] Store in in slot 0x4
3,083,637 UART: [art] Derive Key Pair
3,083,997 UART: [art] Store priv key in slot 0x5
3,096,845 UART: [art] Derive Key Pair - Done
3,111,580 UART: [art] Signing Cert with AUTHO
3,112,060 UART: RITY.KEYID = 7
3,127,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,137 UART: [art] PUB.X = DA91AE5CA7D998D0CADA84FD388D3734CA359C958EA69F7E95A588B86624BDF8F00C3C61D1929CD42FB3E092BFDC9AD6
3,134,926 UART: [art] PUB.Y = D943298C9F28682C2AA3959EACA879C9B4AF4AC7CE13C7F7A39030D62D93FD3E97F882C329C4CD691EDF7B467635E940
3,141,886 UART: [art] SIG.R = 86AA4B7097CC200BE8BF8CA606471172305B3AF223AEF64449720F9FDFE2EFD50AFBA315917FB5EAACBE4497E47DD236
3,148,662 UART: [art] SIG.S = 419EFC213DCD5A8CE8F6042C4F8CDED75FC1BACAE50B91B7D2084D82653A2912B7312C0905AA4EFF336E9E93409D24F2
3,172,362 UART: Caliptra RT
3,172,707 UART: [state] CFI Enabled
3,281,076 UART: [rt] RT listening for mailbox commands...
3,281,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,568 UART: [rt]cmd =0x44504543, len=24
3,337,790 >>> mbox cmd response data (40 bytes)
3,337,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,506 UART: [rt]cmd =0x44504543, len=24
3,393,516 >>> mbox cmd response data (40 bytes)
3,393,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,984 UART: [rt]cmd =0x44504543, len=24
3,449,490 >>> mbox cmd response data (40 bytes)
3,449,491 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,934 UART: [rt]cmd =0x44504543, len=24
3,505,130 >>> mbox cmd response data (40 bytes)
3,505,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,476 UART: [rt]cmd =0x44504543, len=24
3,560,636 >>> mbox cmd response data (40 bytes)
3,560,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,228 UART: [rt]cmd =0x44504543, len=24
3,616,996 >>> mbox cmd response data (40 bytes)
3,616,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,598 UART: [rt]cmd =0x44504543, len=24
3,672,912 >>> mbox cmd response data (40 bytes)
3,672,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,406 UART: [rt]cmd =0x44504543, len=24
3,728,652 >>> mbox cmd response data (40 bytes)
3,728,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,072 UART: [rt]cmd =0x44504543, len=24
3,784,292 >>> mbox cmd response data (40 bytes)
3,784,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,714 UART: [rt]cmd =0x44504543, len=24
3,839,920 >>> mbox cmd response data (40 bytes)
3,839,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,420 UART: [rt]cmd =0x44504543, len=24
3,895,948 >>> mbox cmd response data (40 bytes)
3,895,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,925,550 UART: [rt]cmd =0x44504543, len=24
3,952,274 >>> mbox cmd response data (40 bytes)
3,952,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,981,704 UART: [rt]cmd =0x44504543, len=24
4,007,928 >>> mbox cmd response data (40 bytes)
4,007,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,458 UART: [rt]cmd =0x44504543, len=24
4,064,062 >>> mbox cmd response data (40 bytes)
4,064,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,330 UART: [rt]cmd =0x44504543, len=24
4,119,770 >>> mbox cmd response data (40 bytes)
4,119,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,490 UART: [rt]cmd =0x44504543, len=24
4,156,844 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,394 ready_for_fw is high
1,060,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,166 >>> mbox cmd response: success
2,689,202 UART:
2,689,218 UART: Running Caliptra FMC ...
2,689,626 UART:
2,689,769 UART: [state] CFI Enabled
2,700,142 UART: [fht] FMC Alias Private Key: 7
2,807,985 UART: [art] Extend RT PCRs Done
2,808,413 UART: [art] Lock RT PCRs Done
2,809,969 UART: [art] Populate DV Done
2,818,126 UART: [fht] FMC Alias Private Key: 7
2,819,112 UART: [art] Derive CDI
2,819,392 UART: [art] Store in in slot 0x4
2,905,053 UART: [art] Derive Key Pair
2,905,413 UART: [art] Store priv key in slot 0x5
2,918,799 UART: [art] Derive Key Pair - Done
2,933,966 UART: [art] Signing Cert with AUTHO
2,934,446 UART: RITY.KEYID = 7
2,949,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,399 UART: [art] PUB.X = D58CC488844CEE2B7AA89E16AD97C483B8E60E6B9FF0F36D7C405C2EBFEF415636D3E0691B7CF38DC0BA8963193370DD
2,957,182 UART: [art] PUB.Y = 5A212432AC4814EF8AD40328DE428992DD45FCB66FA1569928D78B0C0365B5AEEF1581CB484F501DD8E34913371F7499
2,964,123 UART: [art] SIG.R = 4E2F8F113FBE4D605F8744E662CA525830CBC249126EF59A6A54259B4B80CEF43B7E58D3140CB73C8B7931C937C98119
2,970,892 UART: [art] SIG.S = 0CCEA88EE34FA0C182C43BC87057904E2F12F59F802E68D34444EF0641A4093504221334B64A96D4F3831DF8F51F9952
2,994,991 UART: Caliptra RT
2,995,336 UART: [state] CFI Enabled
3,102,375 UART: [rt] RT listening for mailbox commands...
3,103,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,999 UART: [rt]cmd =0x44504543, len=24
3,159,477 >>> mbox cmd response data (40 bytes)
3,159,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,939 UART: [rt]cmd =0x44504543, len=24
3,214,993 >>> mbox cmd response data (40 bytes)
3,214,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,461 UART: [rt]cmd =0x44504543, len=24
3,270,937 >>> mbox cmd response data (40 bytes)
3,270,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,211 UART: [rt]cmd =0x44504543, len=24
3,326,585 >>> mbox cmd response data (40 bytes)
3,326,586 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,033 UART: [rt]cmd =0x44504543, len=24
3,382,033 >>> mbox cmd response data (40 bytes)
3,382,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,667 UART: [rt]cmd =0x44504543, len=24
3,437,983 >>> mbox cmd response data (40 bytes)
3,437,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,427 UART: [rt]cmd =0x44504543, len=24
3,493,785 >>> mbox cmd response data (40 bytes)
3,493,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,147 UART: [rt]cmd =0x44504543, len=24
3,549,171 >>> mbox cmd response data (40 bytes)
3,549,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,781 UART: [rt]cmd =0x44504543, len=24
3,604,589 >>> mbox cmd response data (40 bytes)
3,604,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,115 UART: [rt]cmd =0x44504543, len=24
3,660,589 >>> mbox cmd response data (40 bytes)
3,660,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,179 UART: [rt]cmd =0x44504543, len=24
3,716,401 >>> mbox cmd response data (40 bytes)
3,716,402 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,913 UART: [rt]cmd =0x44504543, len=24
3,772,105 >>> mbox cmd response data (40 bytes)
3,772,106 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,591 UART: [rt]cmd =0x44504543, len=24
3,828,065 >>> mbox cmd response data (40 bytes)
3,828,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,393 UART: [rt]cmd =0x44504543, len=24
3,883,571 >>> mbox cmd response data (40 bytes)
3,883,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,135 UART: [rt]cmd =0x44504543, len=24
3,939,037 >>> mbox cmd response data (40 bytes)
3,939,038 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,569 UART: [rt]cmd =0x44504543, len=24
3,975,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 ready_for_fw is high
1,174,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,538 UART: [ldev] ++
1,209,706 UART: [ldev] CDI.KEYID = 6
1,210,070 UART: [ldev] SUBJECT.KEYID = 5
1,210,497 UART: [ldev] AUTHORITY.KEYID = 7
1,210,960 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,282,815 UART: [fwproc] Recv command 0x46574c44
1,283,548 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,618 >>> mbox cmd response: success
2,775,745 UART: [afmc] ++
2,775,913 UART: [afmc] CDI.KEYID = 6
2,776,276 UART: [afmc] SUBJECT.KEYID = 7
2,776,702 UART: [afmc] AUTHORITY.KEYID = 5
2,811,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,548 UART: [afmc] --
2,855,460 UART: [cold-reset] --
2,856,244 UART: [state] Locking Datavault
2,857,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,305 UART: [state] Locking ICCM
2,858,871 UART: [exit] Launching FMC @ 0x40000130
2,864,200 UART:
2,864,216 UART: Running Caliptra FMC ...
2,864,624 UART:
2,864,678 UART: [state] CFI Enabled
2,875,197 UART: [fht] FMC Alias Private Key: 7
2,983,162 UART: [art] Extend RT PCRs Done
2,983,590 UART: [art] Lock RT PCRs Done
2,984,992 UART: [art] Populate DV Done
2,993,335 UART: [fht] FMC Alias Private Key: 7
2,994,299 UART: [art] Derive CDI
2,994,579 UART: [art] Store in in slot 0x4
3,080,196 UART: [art] Derive Key Pair
3,080,556 UART: [art] Store priv key in slot 0x5
3,093,614 UART: [art] Derive Key Pair - Done
3,108,617 UART: [art] Signing Cert with AUTHO
3,109,097 UART: RITY.KEYID = 7
3,124,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,344 UART: [art] PUB.X = BD457772AF2529681AFBD76A3408FA7564B045C469893EADE20D472E57A901BF68DADBD364F0FE7DD003A0B4CB6F976A
3,132,116 UART: [art] PUB.Y = 59154E134A137C9B88009E9A75E21A0540B1BC212A2A0479EDDF97D784CDA0B350F0100715AC2FC7BE8F9F7FD39E3EB2
3,139,045 UART: [art] SIG.R = BA310A514CE5762002E0498F296D3EE3609C2E9A00967F423B1D67A285C12EA22F1336EF8D27448CF524B699035AF3FC
3,145,784 UART: [art] SIG.S = 43B4E790EF9647552087CC203E3733884E07B3FB922757AC87FB42420BFBDFC3DCAAA8983CDEBD1F03BC503948F60629
3,169,679 UART: Caliptra RT
3,169,932 UART: [state] CFI Enabled
3,277,793 UART: [rt] RT listening for mailbox commands...
3,278,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,603 UART: [rt]cmd =0x44504543, len=24
3,334,753 >>> mbox cmd response data (40 bytes)
3,334,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,421 UART: [rt]cmd =0x44504543, len=24
3,390,267 >>> mbox cmd response data (40 bytes)
3,390,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,649 UART: [rt]cmd =0x44504543, len=24
3,445,769 >>> mbox cmd response data (40 bytes)
3,445,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,187 UART: [rt]cmd =0x44504543, len=24
3,501,871 >>> mbox cmd response data (40 bytes)
3,501,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,705 UART: [rt]cmd =0x44504543, len=24
3,558,089 >>> mbox cmd response data (40 bytes)
3,558,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,527 UART: [rt]cmd =0x44504543, len=24
3,613,633 >>> mbox cmd response data (40 bytes)
3,613,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,089 UART: [rt]cmd =0x44504543, len=24
3,669,851 >>> mbox cmd response data (40 bytes)
3,669,852 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,423 UART: [rt]cmd =0x44504543, len=24
3,726,315 >>> mbox cmd response data (40 bytes)
3,726,316 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,659 UART: [rt]cmd =0x44504543, len=24
3,782,181 >>> mbox cmd response data (40 bytes)
3,782,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,787 UART: [rt]cmd =0x44504543, len=24
3,838,249 >>> mbox cmd response data (40 bytes)
3,838,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,505 UART: [rt]cmd =0x44504543, len=24
3,893,695 >>> mbox cmd response data (40 bytes)
3,893,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,147 UART: [rt]cmd =0x44504543, len=24
3,949,113 >>> mbox cmd response data (40 bytes)
3,949,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,559 UART: [rt]cmd =0x44504543, len=24
4,005,049 >>> mbox cmd response data (40 bytes)
4,005,050 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,593 UART: [rt]cmd =0x44504543, len=24
4,061,251 >>> mbox cmd response data (40 bytes)
4,061,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,687 UART: [rt]cmd =0x44504543, len=24
4,117,089 >>> mbox cmd response data (40 bytes)
4,117,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,577 UART: [rt]cmd =0x44504543, len=24
4,153,901 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,640 ready_for_fw is high
1,056,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,672 >>> mbox cmd response: success
2,688,380 UART:
2,688,396 UART: Running Caliptra FMC ...
2,688,804 UART:
2,688,858 UART: [state] CFI Enabled
2,699,395 UART: [fht] FMC Alias Private Key: 7
2,807,422 UART: [art] Extend RT PCRs Done
2,807,850 UART: [art] Lock RT PCRs Done
2,809,420 UART: [art] Populate DV Done
2,817,381 UART: [fht] FMC Alias Private Key: 7
2,818,469 UART: [art] Derive CDI
2,818,749 UART: [art] Store in in slot 0x4
2,904,608 UART: [art] Derive Key Pair
2,904,968 UART: [art] Store priv key in slot 0x5
2,918,268 UART: [art] Derive Key Pair - Done
2,933,015 UART: [art] Signing Cert with AUTHO
2,933,495 UART: RITY.KEYID = 7
2,948,083 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,848 UART: [art] PUB.X = 9CAAD38659F3B2F239A9FED81233287FF69734FD3EAF5467556FA19A4B795ADDEB2C4AE20FCB9C3D49DFFCF3BA65DA15
2,955,641 UART: [art] PUB.Y = 19D1D5B46C340852A9B9B091563F9F2E87D377F0B004999E872EF0E27B5AFC195CF9284BBD9E1CE0278094970100FBC4
2,962,562 UART: [art] SIG.R = E6A1753D75F5899C7795097934B8F5D76C67397B22FED990EBF127788268E64083C789B45FBB264F07FF9B2062277C54
2,969,318 UART: [art] SIG.S = BA5E086F2EF0220268B07B60B3635ECF306AD766C78B446A171BF1EBC7A1FE14F2E4CC64411B0874E08D930BDD8CC363
2,993,711 UART: Caliptra RT
2,993,964 UART: [state] CFI Enabled
3,101,004 UART: [rt] RT listening for mailbox commands...
3,101,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,612 UART: [rt]cmd =0x44504543, len=24
3,157,994 >>> mbox cmd response data (40 bytes)
3,157,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,638 UART: [rt]cmd =0x44504543, len=24
3,214,030 >>> mbox cmd response data (40 bytes)
3,214,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,243,676 UART: [rt]cmd =0x44504543, len=24
3,270,028 >>> mbox cmd response data (40 bytes)
3,270,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,378 UART: [rt]cmd =0x44504543, len=24
3,325,650 >>> mbox cmd response data (40 bytes)
3,325,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,198 UART: [rt]cmd =0x44504543, len=24
3,381,242 >>> mbox cmd response data (40 bytes)
3,381,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,610 UART: [rt]cmd =0x44504543, len=24
3,436,930 >>> mbox cmd response data (40 bytes)
3,436,931 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,456 UART: [rt]cmd =0x44504543, len=24
3,492,194 >>> mbox cmd response data (40 bytes)
3,492,195 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,842 UART: [rt]cmd =0x44504543, len=24
3,548,360 >>> mbox cmd response data (40 bytes)
3,548,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,000 UART: [rt]cmd =0x44504543, len=24
3,604,276 >>> mbox cmd response data (40 bytes)
3,604,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,854 UART: [rt]cmd =0x44504543, len=24
3,659,746 >>> mbox cmd response data (40 bytes)
3,659,747 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,254 UART: [rt]cmd =0x44504543, len=24
3,715,312 >>> mbox cmd response data (40 bytes)
3,715,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,718 UART: [rt]cmd =0x44504543, len=24
3,770,980 >>> mbox cmd response data (40 bytes)
3,770,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,600 UART: [rt]cmd =0x44504543, len=24
3,827,124 >>> mbox cmd response data (40 bytes)
3,827,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,534 UART: [rt]cmd =0x44504543, len=24
3,882,694 >>> mbox cmd response data (40 bytes)
3,882,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,066 UART: [rt]cmd =0x44504543, len=24
3,938,564 >>> mbox cmd response data (40 bytes)
3,938,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,082 UART: [rt]cmd =0x44504543, len=24
3,975,222 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
903,917 UART: [kat] SHA2-512-ACC
905,818 UART: [kat] ECC-384
915,527 UART: [kat] HMAC-384Kdf
920,099 UART: [kat] LMS
1,168,411 UART: [kat] --
1,169,322 UART: [cold-reset] ++
1,169,768 UART: [fht] FHT @ 0x50003400
1,172,342 UART: [idev] ++
1,172,510 UART: [idev] CDI.KEYID = 6
1,172,871 UART: [idev] SUBJECT.KEYID = 7
1,173,296 UART: [idev] UDS.KEYID = 0
1,173,642 ready_for_fw is high
1,173,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,904 UART: [idev] Erasing UDS.KEYID = 0
1,198,338 UART: [idev] Sha1 KeyId Algorithm
1,207,166 UART: [idev] --
1,208,259 UART: [ldev] ++
1,208,427 UART: [ldev] CDI.KEYID = 6
1,208,791 UART: [ldev] SUBJECT.KEYID = 5
1,209,218 UART: [ldev] AUTHORITY.KEYID = 7
1,209,681 UART: [ldev] FE.KEYID = 1
1,214,631 UART: [ldev] Erasing FE.KEYID = 1
1,241,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,043 UART: [ldev] --
1,280,379 UART: [fwproc] Wait for Commands...
1,280,960 UART: [fwproc] Recv command 0x46574c44
1,281,693 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,511 >>> mbox cmd response: success
2,773,706 UART: [afmc] ++
2,773,874 UART: [afmc] CDI.KEYID = 6
2,774,237 UART: [afmc] SUBJECT.KEYID = 7
2,774,663 UART: [afmc] AUTHORITY.KEYID = 5
2,809,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,198 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,081 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,633 UART: [afmc] --
2,853,755 UART: [cold-reset] --
2,854,505 UART: [state] Locking Datavault
2,855,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,182 UART: [state] Locking ICCM
2,856,642 UART: [exit] Launching FMC @ 0x40000130
2,861,971 UART:
2,861,987 UART: Running Caliptra FMC ...
2,862,395 UART:
2,862,538 UART: [state] CFI Enabled
2,873,649 UART: [fht] FMC Alias Private Key: 7
2,981,534 UART: [art] Extend RT PCRs Done
2,981,962 UART: [art] Lock RT PCRs Done
2,983,668 UART: [art] Populate DV Done
2,991,967 UART: [fht] FMC Alias Private Key: 7
2,993,063 UART: [art] Derive CDI
2,993,343 UART: [art] Store in in slot 0x4
3,079,408 UART: [art] Derive Key Pair
3,079,768 UART: [art] Store priv key in slot 0x5
3,093,360 UART: [art] Derive Key Pair - Done
3,107,955 UART: [art] Signing Cert with AUTHO
3,108,435 UART: RITY.KEYID = 7
3,123,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,486 UART: [art] PUB.X = ADE2EF40E4B74070F83286B446B337FEDD77B480C74BC7845BDE6EAFDF837CD40FE0CC7B8595CFD392B81276B9F454E8
3,131,271 UART: [art] PUB.Y = F18E9698386B44F1CF671D57D7E481CC39FAEB1A5D619F521B857B403EB9F690E70D4FE4A188FE6A7F0868D5C49A7B50
3,138,225 UART: [art] SIG.R = 031869B488A1AEF257C55EE0EB7FDC332DD32F92CACBFBD439189EA91F050C6AAF1F90FB774A21142322BCB770268A41
3,145,000 UART: [art] SIG.S = 1E1B807CEEE6B4EFD0E2A4DA32903009506B3364BEA91180DD74B3ED5D10A9CF54033A576687E3E92F1F882AF584E51E
3,168,751 UART: Caliptra RT
3,169,096 UART: [state] CFI Enabled
3,277,247 UART: [rt] RT listening for mailbox commands...
3,277,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,561 UART: [rt]cmd =0x44504543, len=24
3,333,695 >>> mbox cmd response data (40 bytes)
3,333,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,197 UART: [rt]cmd =0x44504543, len=24
3,389,019 >>> mbox cmd response data (40 bytes)
3,389,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,357 UART: [rt]cmd =0x44504543, len=24
3,444,475 >>> mbox cmd response data (40 bytes)
3,444,476 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,073 UART: [rt]cmd =0x44504543, len=24
3,500,031 >>> mbox cmd response data (40 bytes)
3,500,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,423 UART: [rt]cmd =0x44504543, len=24
3,556,165 >>> mbox cmd response data (40 bytes)
3,556,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,801 UART: [rt]cmd =0x44504543, len=24
3,612,599 >>> mbox cmd response data (40 bytes)
3,612,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,943 UART: [rt]cmd =0x44504543, len=24
3,668,113 >>> mbox cmd response data (40 bytes)
3,668,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,753 UART: [rt]cmd =0x44504543, len=24
3,723,387 >>> mbox cmd response data (40 bytes)
3,723,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,657 UART: [rt]cmd =0x44504543, len=24
3,778,959 >>> mbox cmd response data (40 bytes)
3,778,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,329 UART: [rt]cmd =0x44504543, len=24
3,834,157 >>> mbox cmd response data (40 bytes)
3,834,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,549 UART: [rt]cmd =0x44504543, len=24
3,890,179 >>> mbox cmd response data (40 bytes)
3,890,180 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,705 UART: [rt]cmd =0x44504543, len=24
3,946,557 >>> mbox cmd response data (40 bytes)
3,946,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,995 UART: [rt]cmd =0x44504543, len=24
4,002,407 >>> mbox cmd response data (40 bytes)
4,002,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,077 UART: [rt]cmd =0x44504543, len=24
4,058,643 >>> mbox cmd response data (40 bytes)
4,058,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,201 UART: [rt]cmd =0x44504543, len=24
4,114,929 >>> mbox cmd response data (40 bytes)
4,114,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,335 UART: [rt]cmd =0x44504543, len=24
4,151,503 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,017 ready_for_fw is high
1,056,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,445 >>> mbox cmd response: success
2,686,245 UART:
2,686,261 UART: Running Caliptra FMC ...
2,686,669 UART:
2,686,812 UART: [state] CFI Enabled
2,697,639 UART: [fht] FMC Alias Private Key: 7
2,805,804 UART: [art] Extend RT PCRs Done
2,806,232 UART: [art] Lock RT PCRs Done
2,807,954 UART: [art] Populate DV Done
2,816,177 UART: [fht] FMC Alias Private Key: 7
2,817,115 UART: [art] Derive CDI
2,817,395 UART: [art] Store in in slot 0x4
2,903,154 UART: [art] Derive Key Pair
2,903,514 UART: [art] Store priv key in slot 0x5
2,917,102 UART: [art] Derive Key Pair - Done
2,931,799 UART: [art] Signing Cert with AUTHO
2,932,279 UART: RITY.KEYID = 7
2,947,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,418 UART: [art] PUB.X = A2193FFFFC440860FEF38C3BDD82BB93B338A984A90ED93E944A9FBA56AAF72CBE32CF76AA983763DD9E96F18A21CF85
2,955,204 UART: [art] PUB.Y = E1BFD58FC5F0BEAFDC847CBC2A0E7EAD969554DAD616B8D13DF5BD0E20E093EE12A1905E38FE3F5434A4C6FB24E1B895
2,962,176 UART: [art] SIG.R = C37F908EFD7F9A9146183ACCE36BE9E0DA659260666475B77F6F8BD616DFD0B9D36743D214BF292920A89B4E5349BBD8
2,968,954 UART: [art] SIG.S = D7163A0576BCE89CDB5DE106DEBD23B112B9C5B46DDC9D83FCAE4F3873DF822E9E1C6186E61ACFB605352716998EE3D6
2,992,178 UART: Caliptra RT
2,992,523 UART: [state] CFI Enabled
3,100,955 UART: [rt] RT listening for mailbox commands...
3,101,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,629 UART: [rt]cmd =0x44504543, len=24
3,157,689 >>> mbox cmd response data (40 bytes)
3,157,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,127 UART: [rt]cmd =0x44504543, len=24
3,213,363 >>> mbox cmd response data (40 bytes)
3,213,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,242,817 UART: [rt]cmd =0x44504543, len=24
3,269,229 >>> mbox cmd response data (40 bytes)
3,269,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,659 UART: [rt]cmd =0x44504543, len=24
3,325,673 >>> mbox cmd response data (40 bytes)
3,325,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,051 UART: [rt]cmd =0x44504543, len=24
3,380,933 >>> mbox cmd response data (40 bytes)
3,380,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,503 UART: [rt]cmd =0x44504543, len=24
3,437,359 >>> mbox cmd response data (40 bytes)
3,437,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,005 UART: [rt]cmd =0x44504543, len=24
3,493,573 >>> mbox cmd response data (40 bytes)
3,493,574 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,983 UART: [rt]cmd =0x44504543, len=24
3,549,363 >>> mbox cmd response data (40 bytes)
3,549,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,613 UART: [rt]cmd =0x44504543, len=24
3,604,915 >>> mbox cmd response data (40 bytes)
3,604,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,449 UART: [rt]cmd =0x44504543, len=24
3,660,839 >>> mbox cmd response data (40 bytes)
3,660,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,429 UART: [rt]cmd =0x44504543, len=24
3,716,457 >>> mbox cmd response data (40 bytes)
3,716,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,905 UART: [rt]cmd =0x44504543, len=24
3,772,459 >>> mbox cmd response data (40 bytes)
3,772,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,802,003 UART: [rt]cmd =0x44504543, len=24
3,828,457 >>> mbox cmd response data (40 bytes)
3,828,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,249 UART: [rt]cmd =0x44504543, len=24
3,884,481 >>> mbox cmd response data (40 bytes)
3,884,482 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,965 UART: [rt]cmd =0x44504543, len=24
3,940,193 >>> mbox cmd response data (40 bytes)
3,940,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,597 UART: [rt]cmd =0x44504543, len=24
3,976,847 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,022 UART:
192,392 UART: Running Caliptra ROM ...
193,492 UART:
193,633 UART: [state] CFI Enabled
260,587 UART: [state] LifecycleState = Unprovisioned
262,568 UART: [state] DebugLocked = No
264,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,679 UART: [kat] SHA2-256
438,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,849 UART: [kat] ++
449,325 UART: [kat] sha1
460,818 UART: [kat] SHA2-256
463,556 UART: [kat] SHA2-384
469,141 UART: [kat] SHA2-512-ACC
471,516 UART: [kat] ECC-384
2,768,940 UART: [kat] HMAC-384Kdf
2,798,504 UART: [kat] LMS
3,988,766 UART: [kat] --
3,993,195 UART: [cold-reset] ++
3,994,415 UART: [fht] Storing FHT @ 0x50003400
4,006,770 UART: [idev] ++
4,007,345 UART: [idev] CDI.KEYID = 6
4,008,259 UART: [idev] SUBJECT.KEYID = 7
4,009,508 UART: [idev] UDS.KEYID = 0
4,010,584 ready_for_fw is high
4,010,803 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,426 UART: [idev] Erasing UDS.KEYID = 0
7,345,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,162 UART: [idev] --
7,372,131 UART: [ldev] ++
7,372,754 UART: [ldev] CDI.KEYID = 6
7,373,642 UART: [ldev] SUBJECT.KEYID = 5
7,374,907 UART: [ldev] AUTHORITY.KEYID = 7
7,376,150 UART: [ldev] FE.KEYID = 1
7,420,372 UART: [ldev] Erasing FE.KEYID = 1
10,753,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,755 UART: [ldev] --
13,134,993 UART: [fwproc] Waiting for Commands...
13,137,787 UART: [fwproc] Received command 0x46574c44
13,139,967 UART: [fwproc] Received Image of size 114124 bytes
17,193,209 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,244 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,656,287 >>> mbox cmd response: success
17,661,027 UART: [afmc] ++
17,661,633 UART: [afmc] CDI.KEYID = 6
17,662,549 UART: [afmc] SUBJECT.KEYID = 7
17,663,765 UART: [afmc] AUTHORITY.KEYID = 5
21,023,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,622 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,884 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,362 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,139 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,565 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,088 UART: [afmc] --
23,396,099 UART: [cold-reset] --
23,399,912 UART: [state] Locking Datavault
23,404,406 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,104 UART: [state] Locking ICCM
23,408,090 UART: [exit] Launching FMC @ 0x40000130
23,416,459 UART:
23,416,739 UART: Running Caliptra FMC ...
23,417,798 UART:
23,417,959 UART: [state] CFI Enabled
23,483,345 UART: [fht] FMC Alias Private Key: 7
25,821,594 UART: [art] Extend RT PCRs Done
25,822,819 UART: [art] Lock RT PCRs Done
25,824,501 UART: [art] Populate DV Done
25,829,964 UART: [fht] FMC Alias Private Key: 7
25,831,562 UART: [art] Derive CDI
25,832,375 UART: [art] Store in in slot 0x4
25,892,281 UART: [art] Derive Key Pair
25,893,320 UART: [art] Store priv key in slot 0x5
29,185,945 UART: [art] Derive Key Pair - Done
29,199,048 UART: [art] Signing Cert with AUTHO
29,200,350 UART: RITY.KEYID = 7
31,487,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,480 UART: [art] PUB.X = E940BE00211BEDBB0081A78CD8F793FDA5F70193E193B797F3898DD8896F4849FDBD08A45A226D50FA89D4F07B668ACE
31,496,707 UART: [art] PUB.Y = 61EA2F42BB65A7725643DDF11AC361E6FB227A64F1A6D31606B78A609BF94FC8689E54AC76EC75BD41AF5B6843EC9AD9
31,504,007 UART: [art] SIG.R = 5441806FD6759E73CE4A35D206136FAA9CD9930DEA23754908DAA70EC255F7713C2C2FE8689B5FACEFBFA5EEF6DDE2BF
31,511,431 UART: [art] SIG.S = E1912740EFECF087A8D0011BFF672C7EDFE6231CDC854B66510F4E9809AE36CAA690D7249EA995F6A2355C79B6714385
32,816,454 UART: Caliptra RT
32,817,167 UART: [state] CFI Enabled
32,978,325 UART: [rt] RT listening for mailbox commands...
32,980,760 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,010,654 UART: [rt]cmd =0x49444550, len=8
33,012,975 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,805,549 ready_for_fw is high
3,806,143 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,857,677 >>> mbox cmd response: success
23,555,803 UART:
23,556,208 UART: Running Caliptra FMC ...
23,557,357 UART:
23,557,538 UART: [state] CFI Enabled
23,625,822 UART: [fht] FMC Alias Private Key: 7
25,963,431 UART: [art] Extend RT PCRs Done
25,964,698 UART: [art] Lock RT PCRs Done
25,966,361 UART: [art] Populate DV Done
25,971,680 UART: [fht] FMC Alias Private Key: 7
25,973,260 UART: [art] Derive CDI
25,974,029 UART: [art] Store in in slot 0x4
26,033,889 UART: [art] Derive Key Pair
26,034,898 UART: [art] Store priv key in slot 0x5
29,327,422 UART: [art] Derive Key Pair - Done
29,340,412 UART: [art] Signing Cert with AUTHO
29,341,735 UART: RITY.KEYID = 7
31,629,039 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,557 UART: [art] PUB.X = 6D9590EA70C2E56B877FFF4AE5DDBF7E565BF26EB72F82E759E515ED0EB0042A5E099471079A1BA0FD677AD57FF8C073
31,637,810 UART: [art] PUB.Y = 6764549B9C4E25F6656C28DEE1CBD6149FB7D8DE0A28B34A9788C8DE54C7DBF08ED040D355FA5213BE490D6912204809
31,645,066 UART: [art] SIG.R = D6E90F2B096D0DF4B073C57248AC18642E1CF328EA5B37F9AE6817AE92BF3EEB5BACAFB6426AAF03996D8BCC7F986F6E
31,652,514 UART: [art] SIG.S = 7E93F84B775A49583A2AD9A5C12F8771429BD1AB96B33626BA278FD4A462631F5407BC1D08EB1F35CB88089F45D448F1
32,958,015 UART: Caliptra RT
32,958,718 UART: [state] CFI Enabled
33,120,229 UART: [rt] RT listening for mailbox commands...
33,122,673 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,152,722 UART: [rt]cmd =0x49444550, len=8
33,155,115 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,241 writing to cptra_bootfsm_go
193,502 UART:
193,860 UART: Running Caliptra ROM ...
194,964 UART:
604,712 UART: [state] CFI Enabled
616,830 UART: [state] LifecycleState = Unprovisioned
618,791 UART: [state] DebugLocked = No
621,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,453 UART: [kat] SHA2-256
796,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,738 UART: [kat] ++
807,183 UART: [kat] sha1
817,974 UART: [kat] SHA2-256
820,689 UART: [kat] SHA2-384
825,132 UART: [kat] SHA2-512-ACC
827,497 UART: [kat] ECC-384
3,111,252 UART: [kat] HMAC-384Kdf
3,123,100 UART: [kat] LMS
4,313,236 UART: [kat] --
4,318,394 UART: [cold-reset] ++
4,320,894 UART: [fht] Storing FHT @ 0x50003400
4,332,711 UART: [idev] ++
4,333,355 UART: [idev] CDI.KEYID = 6
4,334,231 UART: [idev] SUBJECT.KEYID = 7
4,335,470 UART: [idev] UDS.KEYID = 0
4,336,426 ready_for_fw is high
4,336,631 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,855 UART: [idev] Erasing UDS.KEYID = 0
7,618,267 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,914 UART: [idev] --
7,644,463 UART: [ldev] ++
7,645,035 UART: [ldev] CDI.KEYID = 6
7,646,001 UART: [ldev] SUBJECT.KEYID = 5
7,647,213 UART: [ldev] AUTHORITY.KEYID = 7
7,648,494 UART: [ldev] FE.KEYID = 1
7,658,051 UART: [ldev] Erasing FE.KEYID = 1
10,946,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,507 UART: [ldev] --
13,309,766 UART: [fwproc] Waiting for Commands...
13,312,772 UART: [fwproc] Received command 0x46574c44
13,315,003 UART: [fwproc] Received Image of size 114124 bytes
17,375,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,579 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,116 >>> mbox cmd response: success
17,842,842 UART: [afmc] ++
17,843,461 UART: [afmc] CDI.KEYID = 6
17,844,373 UART: [afmc] SUBJECT.KEYID = 7
17,845,587 UART: [afmc] AUTHORITY.KEYID = 5
21,161,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,434 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,692 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,083 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,902 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,324 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,663 UART: [afmc] --
23,526,327 UART: [cold-reset] --
23,530,253 UART: [state] Locking Datavault
23,534,718 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,474 UART: [state] Locking ICCM
23,539,105 UART: [exit] Launching FMC @ 0x40000130
23,547,501 UART:
23,547,731 UART: Running Caliptra FMC ...
23,548,829 UART:
23,548,989 UART: [state] CFI Enabled
23,557,689 UART: [fht] FMC Alias Private Key: 7
25,887,885 UART: [art] Extend RT PCRs Done
25,889,105 UART: [art] Lock RT PCRs Done
25,890,603 UART: [art] Populate DV Done
25,896,017 UART: [fht] FMC Alias Private Key: 7
25,897,662 UART: [art] Derive CDI
25,898,393 UART: [art] Store in in slot 0x4
25,940,987 UART: [art] Derive Key Pair
25,942,027 UART: [art] Store priv key in slot 0x5
29,184,516 UART: [art] Derive Key Pair - Done
29,197,349 UART: [art] Signing Cert with AUTHO
29,198,654 UART: RITY.KEYID = 7
31,478,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,044 UART: [art] PUB.X = EA82331E4361FC635E30D38932E95C1CBCEE206023CF6FF29C10085AF6D9821DE1755EC0FDA3B2DFBC63853813F6D93F
31,487,249 UART: [art] PUB.Y = 8F4B8D0E77B072B5D9E826EAF2B5378C2D13759A24D5BF06E140CFA0ED13B3C9ECC3D696A07C1C87DB17E507BE38FDB7
31,494,513 UART: [art] SIG.R = BC52842CEEB8F7554BB2B8502480B803EB433AD0DBF67EB73E7AE6F8F14C40ED7BCC8BACE4B201FC41295738B26725CA
31,501,954 UART: [art] SIG.S = 93241CF44896D5EB38C3CFD8F886CA3BF8E217AEDC619176C793FED7EAD8E181EC3CC7C238BA630C79DEF039124A2E66
32,806,420 UART: Caliptra RT
32,807,118 UART: [state] CFI Enabled
32,924,876 UART: [rt] RT listening for mailbox commands...
32,927,005 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,956,695 UART: [rt]cmd =0x49444550, len=8
32,958,803 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,125,603 ready_for_fw is high
4,126,167 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,514 >>> mbox cmd response: success
23,706,521 UART:
23,706,918 UART: Running Caliptra FMC ...
23,708,057 UART:
23,708,219 UART: [state] CFI Enabled
23,715,993 UART: [fht] FMC Alias Private Key: 7
26,046,488 UART: [art] Extend RT PCRs Done
26,047,720 UART: [art] Lock RT PCRs Done
26,049,267 UART: [art] Populate DV Done
26,054,741 UART: [fht] FMC Alias Private Key: 7
26,056,454 UART: [art] Derive CDI
26,057,273 UART: [art] Store in in slot 0x4
26,099,664 UART: [art] Derive Key Pair
26,100,711 UART: [art] Store priv key in slot 0x5
29,342,802 UART: [art] Derive Key Pair - Done
29,355,743 UART: [art] Signing Cert with AUTHO
29,357,078 UART: RITY.KEYID = 7
31,636,671 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,174 UART: [art] PUB.X = CBF70F4E2AF7C557184068145EE7528E021C236BAC1FF6F30001230E175D791EC5C381F85FC6776B03354EE9F357DA5D
31,645,412 UART: [art] PUB.Y = 57DFFC0287D5BFB89A92F1E6EF139A197B94887701B0FB754A4BBB35448FA3F085FC3C094265C2EB1D12E818F47962D4
31,652,693 UART: [art] SIG.R = 9A7C34FD1904CA7FF7F585508DE0493ECA3D712442CB43F31FC57FBB0B68AFF76DE230DE7D435B5EE9A2115A6EB61049
31,660,103 UART: [art] SIG.S = E303C59651D86C6CC051D6B7E249E51B2F14AE142E5CCB1FF5B5FE30601BFE4482DFDE0F9149E46F1E56076C0295F6B0
32,965,739 UART: Caliptra RT
32,966,431 UART: [state] CFI Enabled
33,084,891 UART: [rt] RT listening for mailbox commands...
33,087,207 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,116,918 UART: [rt]cmd =0x49444550, len=8
33,119,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,057 UART:
192,421 UART: Running Caliptra ROM ...
193,564 UART:
193,709 UART: [state] CFI Enabled
264,282 UART: [state] LifecycleState = Unprovisioned
266,199 UART: [state] DebugLocked = No
267,329 UART: [state] WD Timer not started. Device not locked for debugging
271,007 UART: [kat] SHA2-256
450,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,697 UART: [kat] ++
462,145 UART: [kat] sha1
472,166 UART: [kat] SHA2-256
475,178 UART: [kat] SHA2-384
480,672 UART: [kat] SHA2-512-ACC
483,604 UART: [kat] ECC-384
2,926,593 UART: [kat] HMAC-384Kdf
2,950,309 UART: [kat] LMS
3,479,742 UART: [kat] --
3,483,968 UART: [cold-reset] ++
3,486,276 UART: [fht] FHT @ 0x50003400
3,497,827 UART: [idev] ++
3,498,398 UART: [idev] CDI.KEYID = 6
3,499,327 UART: [idev] SUBJECT.KEYID = 7
3,500,502 UART: [idev] UDS.KEYID = 0
3,501,426 ready_for_fw is high
3,501,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,655 UART: [idev] Erasing UDS.KEYID = 0
6,007,415 UART: [idev] Sha1 KeyId Algorithm
6,030,430 UART: [idev] --
6,034,535 UART: [ldev] ++
6,035,109 UART: [ldev] CDI.KEYID = 6
6,036,023 UART: [ldev] SUBJECT.KEYID = 5
6,037,127 UART: [ldev] AUTHORITY.KEYID = 7
6,038,464 UART: [ldev] FE.KEYID = 1
6,078,880 UART: [ldev] Erasing FE.KEYID = 1
8,580,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,901 UART: [ldev] --
10,391,571 UART: [fwproc] Wait for Commands...
10,394,372 UART: [fwproc] Recv command 0x46574c44
10,396,465 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,256,971 >>> mbox cmd response: success
14,261,055 UART: [afmc] ++
14,261,651 UART: [afmc] CDI.KEYID = 6
14,262,564 UART: [afmc] SUBJECT.KEYID = 7
14,263,780 UART: [afmc] AUTHORITY.KEYID = 5
16,801,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,680 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,310 UART: [afmc] --
18,606,856 UART: [cold-reset] --
18,609,435 UART: [state] Locking Datavault
18,613,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,582 UART: [state] Locking ICCM
18,617,299 UART: [exit] Launching FMC @ 0x40000130
18,625,693 UART:
18,625,927 UART: Running Caliptra FMC ...
18,627,028 UART:
18,627,195 UART: [state] CFI Enabled
18,688,624 UART: [fht] FMC Alias Private Key: 7
20,453,626 UART: [art] Extend RT PCRs Done
20,454,844 UART: [art] Lock RT PCRs Done
20,456,303 UART: [art] Populate DV Done
20,461,762 UART: [fht] FMC Alias Private Key: 7
20,463,240 UART: [art] Derive CDI
20,464,161 UART: [art] Store in in slot 0x4
20,521,520 UART: [art] Derive Key Pair
20,522,518 UART: [art] Store priv key in slot 0x5
22,985,820 UART: [art] Derive Key Pair - Done
22,998,814 UART: [art] Signing Cert with AUTHO
23,000,118 UART: RITY.KEYID = 7
24,711,095 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,596 UART: [art] PUB.X = AD2C0284D227991D271CCD10A18F4FEBBADBDDAB785FEC81D1A537F7F0DFEAEF373D5CBC710F96E8E10B77EB5451F526
24,719,884 UART: [art] PUB.Y = 1B91171AA74775C952278A372A1B094DA87D1ADD4E3B0B604837AD980427873C284F2F149093D1AFAC78C216F479BCD0
24,727,109 UART: [art] SIG.R = C4D13A82FC089B051E4C785BD96401D782AD81F11120E8E9F2D2ED473EBDC5976B296C47F3F81E64C236CCC55D650CD0
24,734,503 UART: [art] SIG.S = EEA493704C6F88DC53EE45A4A4CF8534C64AB81024B923EA126B522F872969B3530E9A75F8365B629524C3138E97C1E4
25,713,550 UART: Caliptra RT
25,714,280 UART: [state] CFI Enabled
25,877,398 UART: [rt] RT listening for mailbox commands...
25,879,786 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,909,972 UART: [rt]cmd =0x49444550, len=8
25,912,398 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,380,550 ready_for_fw is high
3,380,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,127 >>> mbox cmd response: success
18,367,819 UART:
18,368,217 UART: Running Caliptra FMC ...
18,369,414 UART:
18,369,585 UART: [state] CFI Enabled
18,436,598 UART: [fht] FMC Alias Private Key: 7
20,200,730 UART: [art] Extend RT PCRs Done
20,201,958 UART: [art] Lock RT PCRs Done
20,203,593 UART: [art] Populate DV Done
20,208,946 UART: [fht] FMC Alias Private Key: 7
20,210,494 UART: [art] Derive CDI
20,211,306 UART: [art] Store in in slot 0x4
20,270,072 UART: [art] Derive Key Pair
20,271,073 UART: [art] Store priv key in slot 0x5
22,734,016 UART: [art] Derive Key Pair - Done
22,746,908 UART: [art] Signing Cert with AUTHO
22,748,214 UART: RITY.KEYID = 7
24,459,986 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,501 UART: [art] PUB.X = 06464AE74DEBF3971BAA6AE6A60E3E75B908794A9854D65EDCA440C31D488BEF8FB6FD190CA861D2CF559661CF1460F7
24,468,817 UART: [art] PUB.Y = 422A5EAF96884DAE822E9CDE46CDD88E0E3C07A9AF07C758C4E1C324F3106F977FEDD71D9A2A76F4D5C3703C34248108
24,476,083 UART: [art] SIG.R = 59D33416CF679DD2BB2340559FAEC1E5AEE81434901CC3FFD6D2F9431A6DE390BCC5A53017EA38EC4897F71B9FEA4D99
24,483,484 UART: [art] SIG.S = 427B742DCBF441B7A492CFE794715B8D92F240322D8D1022DB33562AB6A6BEC9C33BCD9995495980475C1BB15FAB6F4A
25,462,780 UART: Caliptra RT
25,463,480 UART: [state] CFI Enabled
25,628,121 UART: [rt] RT listening for mailbox commands...
25,630,357 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,660,895 UART: [rt]cmd =0x49444550, len=8
25,662,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,477 UART:
192,843 UART: Running Caliptra ROM ...
194,035 UART:
603,732 UART: [state] CFI Enabled
617,739 UART: [state] LifecycleState = Unprovisioned
619,610 UART: [state] DebugLocked = No
621,584 UART: [state] WD Timer not started. Device not locked for debugging
625,827 UART: [kat] SHA2-256
804,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,506 UART: [kat] ++
817,028 UART: [kat] sha1
827,405 UART: [kat] SHA2-256
830,457 UART: [kat] SHA2-384
835,596 UART: [kat] SHA2-512-ACC
838,552 UART: [kat] ECC-384
3,280,403 UART: [kat] HMAC-384Kdf
3,294,052 UART: [kat] LMS
3,823,554 UART: [kat] --
3,829,053 UART: [cold-reset] ++
3,831,619 UART: [fht] FHT @ 0x50003400
3,841,741 UART: [idev] ++
3,842,298 UART: [idev] CDI.KEYID = 6
3,843,323 UART: [idev] SUBJECT.KEYID = 7
3,844,417 UART: [idev] UDS.KEYID = 0
3,845,454 ready_for_fw is high
3,845,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,369 UART: [idev] Erasing UDS.KEYID = 0
6,319,102 UART: [idev] Sha1 KeyId Algorithm
6,341,625 UART: [idev] --
6,345,022 UART: [ldev] ++
6,345,607 UART: [ldev] CDI.KEYID = 6
6,346,487 UART: [ldev] SUBJECT.KEYID = 5
6,347,862 UART: [ldev] AUTHORITY.KEYID = 7
6,349,065 UART: [ldev] FE.KEYID = 1
6,360,758 UART: [ldev] Erasing FE.KEYID = 1
8,833,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,260 UART: [ldev] --
10,622,380 UART: [fwproc] Wait for Commands...
10,625,163 UART: [fwproc] Recv command 0x46574c44
10,627,251 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,504 >>> mbox cmd response: success
14,490,559 UART: [afmc] ++
14,491,148 UART: [afmc] CDI.KEYID = 6
14,492,055 UART: [afmc] SUBJECT.KEYID = 7
14,493,210 UART: [afmc] AUTHORITY.KEYID = 5
16,990,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,492 UART: [afmc] --
18,785,563 UART: [cold-reset] --
18,789,855 UART: [state] Locking Datavault
18,795,687 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,397 UART: [state] Locking ICCM
18,799,811 UART: [exit] Launching FMC @ 0x40000130
18,808,259 UART:
18,808,495 UART: Running Caliptra FMC ...
18,809,590 UART:
18,809,741 UART: [state] CFI Enabled
18,817,778 UART: [fht] FMC Alias Private Key: 7
20,574,660 UART: [art] Extend RT PCRs Done
20,575,886 UART: [art] Lock RT PCRs Done
20,577,504 UART: [art] Populate DV Done
20,582,856 UART: [fht] FMC Alias Private Key: 7
20,584,491 UART: [art] Derive CDI
20,585,294 UART: [art] Store in in slot 0x4
20,627,643 UART: [art] Derive Key Pair
20,628,679 UART: [art] Store priv key in slot 0x5
23,055,904 UART: [art] Derive Key Pair - Done
23,069,018 UART: [art] Signing Cert with AUTHO
23,070,353 UART: RITY.KEYID = 7
24,775,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,902 UART: [art] PUB.X = DB5E986C177595D9AFF1941BE7697CD9DC8DDE43302C68AFF1B4B87E05B2B712BC324AFB16D5EB316104E7DAE3EDCFBA
24,784,186 UART: [art] PUB.Y = FA5FA583E3140A94D0DCCE18EEBF0576AE2F551928DB1238FE03737820490C2DFDD8DB8ADCAC3C1BB1F30B7138D9E9D4
24,791,507 UART: [art] SIG.R = FB6FDAD01E41C91D23BF64F1E493877DA9E8949F3CAECF480A1EC6DC5D69B1CCB250FA26FF6C6709AA61CAB46909F7DC
24,798,937 UART: [art] SIG.S = C8C8A677A1F8E261605C4DD431853BC2A8C7F3EF89B1571891001A4C0377E7F7B384A9E04BB0F2137E957446F26ED7B3
25,778,017 UART: Caliptra RT
25,778,705 UART: [state] CFI Enabled
25,896,741 UART: [rt] RT listening for mailbox commands...
25,898,877 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,928,579 UART: [rt]cmd =0x49444550, len=8
25,930,858 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
3,692,000 ready_for_fw is high
3,692,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,261,884 >>> mbox cmd response: success
18,513,476 UART:
18,513,864 UART: Running Caliptra FMC ...
18,515,065 UART:
18,515,254 UART: [state] CFI Enabled
18,522,704 UART: [fht] FMC Alias Private Key: 7
20,279,785 UART: [art] Extend RT PCRs Done
20,280,996 UART: [art] Lock RT PCRs Done
20,282,344 UART: [art] Populate DV Done
20,287,898 UART: [fht] FMC Alias Private Key: 7
20,289,431 UART: [art] Derive CDI
20,290,240 UART: [art] Store in in slot 0x4
20,332,778 UART: [art] Derive Key Pair
20,333,819 UART: [art] Store priv key in slot 0x5
22,760,759 UART: [art] Derive Key Pair - Done
22,773,442 UART: [art] Signing Cert with AUTHO
22,774,745 UART: RITY.KEYID = 7
24,480,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,726 UART: [art] PUB.X = 1F3C7E936A4EA15C4D7714169BC29D4934525343E200953E3638F102FFFDC29508385437E1AD440443DF0CA7C1AD0055
24,488,955 UART: [art] PUB.Y = 796222E43C31D4D3C30C2C198100AA65F188EECD3F9A948E7264C5023A0F98E56801933EA5B7B5157AFF50F3BB59F025
24,496,163 UART: [art] SIG.R = 90AC55685CD6FCA246144616CFDD74CAD9972BD8C344DB1311E5F8C069EA98E2B7DB51E5901D3AA3BBAF501C0548A9EA
24,503,596 UART: [art] SIG.S = 7B89976CD9657577583D7C0BAA1DACE00FDDC10444513D6C70C77FD178D1314AB4FB22D62E7C5BB2C0A70A40DCE4339A
25,482,490 UART: Caliptra RT
25,483,203 UART: [state] CFI Enabled
25,601,253 UART: [rt] RT listening for mailbox commands...
25,603,671 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,633,772 UART: [rt]cmd =0x49444550, len=8
25,636,100 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,119 UART:
192,482 UART: Running Caliptra ROM ...
193,681 UART:
193,838 UART: [state] CFI Enabled
258,765 UART: [state] LifecycleState = Unprovisioned
261,184 UART: [state] DebugLocked = No
263,857 UART: [state] WD Timer not started. Device not locked for debugging
267,674 UART: [kat] SHA2-256
457,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,343 UART: [kat] ++
468,798 UART: [kat] sha1
480,951 UART: [kat] SHA2-256
483,967 UART: [kat] SHA2-384
489,677 UART: [kat] SHA2-512-ACC
492,259 UART: [kat] ECC-384
2,946,228 UART: [kat] HMAC-384Kdf
2,970,954 UART: [kat] LMS
3,502,707 UART: [kat] --
3,507,986 UART: [cold-reset] ++
3,509,879 UART: [fht] FHT @ 0x50003400
3,519,959 UART: [idev] ++
3,520,668 UART: [idev] CDI.KEYID = 6
3,521,548 UART: [idev] SUBJECT.KEYID = 7
3,522,787 UART: [idev] UDS.KEYID = 0
3,523,691 ready_for_fw is high
3,523,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,885 UART: [idev] Erasing UDS.KEYID = 0
6,028,204 UART: [idev] Sha1 KeyId Algorithm
6,050,649 UART: [idev] --
6,056,862 UART: [ldev] ++
6,057,544 UART: [ldev] CDI.KEYID = 6
6,058,474 UART: [ldev] SUBJECT.KEYID = 5
6,059,646 UART: [ldev] AUTHORITY.KEYID = 7
6,060,827 UART: [ldev] FE.KEYID = 1
6,099,141 UART: [ldev] Erasing FE.KEYID = 1
8,606,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,949 UART: [ldev] --
10,410,837 UART: [fwproc] Wait for Commands...
10,412,766 UART: [fwproc] Recv command 0x46574c44
10,415,020 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,504 >>> mbox cmd response: success
14,610,152 UART: [afmc] ++
14,610,860 UART: [afmc] CDI.KEYID = 6
14,612,102 UART: [afmc] SUBJECT.KEYID = 7
14,613,539 UART: [afmc] AUTHORITY.KEYID = 5
17,150,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,586 UART: [afmc] --
18,946,476 UART: [cold-reset] --
18,950,052 UART: [state] Locking Datavault
18,954,885 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,089 UART: [state] Locking ICCM
18,960,107 UART: [exit] Launching FMC @ 0x40000130
18,968,779 UART:
18,969,012 UART: Running Caliptra FMC ...
18,970,110 UART:
18,970,268 UART: [state] CFI Enabled
19,028,917 UART: [fht] FMC Alias Private Key: 7
20,793,018 UART: [art] Extend RT PCRs Done
20,794,244 UART: [art] Lock RT PCRs Done
20,795,898 UART: [art] Populate DV Done
20,801,145 UART: [fht] FMC Alias Private Key: 7
20,802,840 UART: [art] Derive CDI
20,803,656 UART: [art] Store in in slot 0x4
20,861,997 UART: [art] Derive Key Pair
20,862,996 UART: [art] Store priv key in slot 0x5
23,325,970 UART: [art] Derive Key Pair - Done
23,338,798 UART: [art] Signing Cert with AUTHO
23,340,106 UART: RITY.KEYID = 7
25,052,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,508 UART: [art] PUB.X = 035B1C594E9A266E4FCAA0144992A1EC234C7840DD088CDB7A0BA00845CA50F6F77A89B1C5012CB405510F3A4B979BA8
25,060,810 UART: [art] PUB.Y = 87D7FBD5D0A4566A77721E35347D3C1C24C188ECB3CF30F1426AF1B01D2845DD40C4E3E46780E375930A4DE28D391046
25,068,041 UART: [art] SIG.R = CC1513F02F3CE9A4BD703D29A46B1021F70178DDD8A759BEDBEF8C099CEC7A3A9A3F9BE1A77BF34B887DEE0029FD2AFE
25,075,446 UART: [art] SIG.S = DAD1CEBBA147EA5BFD1865FE7D565C8AA1E5C1017F078FD23C90D1CFF0FA1B322AB594C52E015734CC419AF1C835B7E5
26,054,179 UART: Caliptra RT
26,054,895 UART: [state] CFI Enabled
26,220,983 UART: [rt] RT listening for mailbox commands...
26,223,135 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,253,364 UART: [rt]cmd =0x49444550, len=8
26,255,522 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
3,436,641 ready_for_fw is high
3,437,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,207 >>> mbox cmd response: success
19,029,594 UART:
19,029,987 UART: Running Caliptra FMC ...
19,031,103 UART:
19,031,272 UART: [state] CFI Enabled
19,097,649 UART: [fht] FMC Alias Private Key: 7
20,861,880 UART: [art] Extend RT PCRs Done
20,863,091 UART: [art] Lock RT PCRs Done
20,864,611 UART: [art] Populate DV Done
20,870,402 UART: [fht] FMC Alias Private Key: 7
20,871,887 UART: [art] Derive CDI
20,872,652 UART: [art] Store in in slot 0x4
20,929,967 UART: [art] Derive Key Pair
20,931,013 UART: [art] Store priv key in slot 0x5
23,393,795 UART: [art] Derive Key Pair - Done
23,406,823 UART: [art] Signing Cert with AUTHO
23,408,136 UART: RITY.KEYID = 7
25,119,475 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,983 UART: [art] PUB.X = BB3A67DEC4BE7A1A54275EA678A4C300672AD732EF8DA8DE46E8887D4182375836729EF5ED3F03A7B568B6D6FFACB3A4
25,128,257 UART: [art] PUB.Y = AEE12842832EA69A04F2961DADCB52D7EE992951C3EED054FF58779778ED6D6D5978DA688EC8EE7E10B50A67E00437AE
25,135,515 UART: [art] SIG.R = 56C8DE6155DAFD2FFC23AB552B21B82E1219753E90181455C622A399FFBF2D71AA2769AD16DE7F0D53CC6EE434C965D9
25,142,908 UART: [art] SIG.S = 5E7BF707526B5939B837671C61CE63DF3C0FF3D5A3F268ECBBDE75C15C971C6DB695D45591E08163427C66CAE35DB5A0
26,121,869 UART: Caliptra RT
26,122,573 UART: [state] CFI Enabled
26,289,002 UART: [rt] RT listening for mailbox commands...
26,291,406 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,321,807 UART: [rt]cmd =0x49444550, len=8
26,324,275 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,508 UART:
192,890 UART: Running Caliptra ROM ...
194,027 UART:
603,545 UART: [state] CFI Enabled
618,333 UART: [state] LifecycleState = Unprovisioned
620,709 UART: [state] DebugLocked = No
623,168 UART: [state] WD Timer not started. Device not locked for debugging
627,970 UART: [kat] SHA2-256
817,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,597 UART: [kat] ++
829,111 UART: [kat] sha1
840,259 UART: [kat] SHA2-256
843,268 UART: [kat] SHA2-384
849,773 UART: [kat] SHA2-512-ACC
852,388 UART: [kat] ECC-384
3,293,947 UART: [kat] HMAC-384Kdf
3,306,878 UART: [kat] LMS
3,838,668 UART: [kat] --
3,841,341 UART: [cold-reset] ++
3,843,760 UART: [fht] FHT @ 0x50003400
3,854,583 UART: [idev] ++
3,855,278 UART: [idev] CDI.KEYID = 6
3,856,317 UART: [idev] SUBJECT.KEYID = 7
3,857,486 UART: [idev] UDS.KEYID = 0
3,858,409 ready_for_fw is high
3,858,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,845 UART: [idev] Erasing UDS.KEYID = 0
6,332,561 UART: [idev] Sha1 KeyId Algorithm
6,355,859 UART: [idev] --
6,360,558 UART: [ldev] ++
6,361,290 UART: [ldev] CDI.KEYID = 6
6,362,194 UART: [ldev] SUBJECT.KEYID = 5
6,363,348 UART: [ldev] AUTHORITY.KEYID = 7
6,364,784 UART: [ldev] FE.KEYID = 1
6,377,140 UART: [ldev] Erasing FE.KEYID = 1
8,855,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,875 UART: [ldev] --
10,647,807 UART: [fwproc] Wait for Commands...
10,649,300 UART: [fwproc] Recv command 0x46574c44
10,651,595 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,829,866 >>> mbox cmd response: success
14,834,484 UART: [afmc] ++
14,835,189 UART: [afmc] CDI.KEYID = 6
14,836,435 UART: [afmc] SUBJECT.KEYID = 7
14,837,875 UART: [afmc] AUTHORITY.KEYID = 5
17,339,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,604 UART: [afmc] --
19,137,844 UART: [cold-reset] --
19,142,029 UART: [state] Locking Datavault
19,147,496 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,698 UART: [state] Locking ICCM
19,151,572 UART: [exit] Launching FMC @ 0x40000130
19,160,246 UART:
19,160,475 UART: Running Caliptra FMC ...
19,161,566 UART:
19,161,720 UART: [state] CFI Enabled
19,169,718 UART: [fht] FMC Alias Private Key: 7
20,926,672 UART: [art] Extend RT PCRs Done
20,927,904 UART: [art] Lock RT PCRs Done
20,929,552 UART: [art] Populate DV Done
20,935,120 UART: [fht] FMC Alias Private Key: 7
20,936,815 UART: [art] Derive CDI
20,937,544 UART: [art] Store in in slot 0x4
20,980,555 UART: [art] Derive Key Pair
20,981,547 UART: [art] Store priv key in slot 0x5
23,408,556 UART: [art] Derive Key Pair - Done
23,421,612 UART: [art] Signing Cert with AUTHO
23,422,909 UART: RITY.KEYID = 7
25,128,617 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,121 UART: [art] PUB.X = 8FCCEB55F122261BCB03B11AFA162230F4D6A18A41AD090CAD3080D8557328F60B7DB4342C74FA031AB1DC5162AE6FFE
25,137,376 UART: [art] PUB.Y = 7E34F162066149DFC9D1BF5BDAC47BDEDC189755F4CBC88D5E27D096F9B0E3AA5F7FC8C48AF42AF6B04D77FDC22EE684
25,144,692 UART: [art] SIG.R = 4C4418EC33C1B6170522B98A0763D7145C4518A84E5276BA264B7EE0B5CBA95FDD01D4A791DE416995A457E75C8F673E
25,152,067 UART: [art] SIG.S = 08E88817F8C8B87681EF849EAF67AE43C777C3CB257EC9A94E786E393614633BD80CEE65B0278975AD5EE065DF491E11
26,131,247 UART: Caliptra RT
26,131,947 UART: [state] CFI Enabled
26,249,593 UART: [rt] RT listening for mailbox commands...
26,251,998 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,281,767 UART: [rt]cmd =0x49444550, len=8
26,284,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,756,094 ready_for_fw is high
3,756,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,629 >>> mbox cmd response: success
19,213,665 UART:
19,214,067 UART: Running Caliptra FMC ...
19,215,200 UART:
19,215,356 UART: [state] CFI Enabled
19,223,394 UART: [fht] FMC Alias Private Key: 7
20,980,248 UART: [art] Extend RT PCRs Done
20,981,477 UART: [art] Lock RT PCRs Done
20,983,367 UART: [art] Populate DV Done
20,988,757 UART: [fht] FMC Alias Private Key: 7
20,990,310 UART: [art] Derive CDI
20,991,123 UART: [art] Store in in slot 0x4
21,033,663 UART: [art] Derive Key Pair
21,034,692 UART: [art] Store priv key in slot 0x5
23,461,376 UART: [art] Derive Key Pair - Done
23,474,710 UART: [art] Signing Cert with AUTHO
23,476,044 UART: RITY.KEYID = 7
25,181,297 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,788 UART: [art] PUB.X = 1BB22E442B1961F486EA9326E7CE4D666297FC116F76D54327706A04017BE7749EA271BF679FCD66B77D35A59A1D9852
25,190,009 UART: [art] PUB.Y = 2838F5384954483CC19FCF2F2F50BB0E7D644CE8F9A9D70245E1CCD7518C573D03E199D878A520FFA36B4AE488C820ED
25,197,258 UART: [art] SIG.R = 110AB49DBBD12F190590800DE703BFD973FFDB30E95647402608B550763BB5ACADFE0FFB66902F336E9CD2FDBC47CF28
25,204,686 UART: [art] SIG.S = 8106345A839D53611FF6859B55BCFA72CD48DBBBDFB074D0B36F9CBCA1A42E2619B822F4C42ABB857CA7A9C4A293699F
26,183,621 UART: Caliptra RT
26,184,459 UART: [state] CFI Enabled
26,302,006 UART: [rt] RT listening for mailbox commands...
26,304,368 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,334,384 UART: [rt]cmd =0x49444550, len=8
26,336,603 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,599 UART: [kat] SHA2-256
881,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,645 UART: [kat] ++
885,797 UART: [kat] sha1
890,135 UART: [kat] SHA2-256
892,073 UART: [kat] SHA2-384
894,654 UART: [kat] SHA2-512-ACC
896,555 UART: [kat] ECC-384
901,824 UART: [kat] HMAC-384Kdf
906,594 UART: [kat] LMS
1,474,790 UART: [kat] --
1,475,651 UART: [cold-reset] ++
1,476,061 UART: [fht] Storing FHT @ 0x50003400
1,478,918 UART: [idev] ++
1,479,086 UART: [idev] CDI.KEYID = 6
1,479,446 UART: [idev] SUBJECT.KEYID = 7
1,479,870 UART: [idev] UDS.KEYID = 0
1,480,215 ready_for_fw is high
1,480,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,128 UART: [idev] Erasing UDS.KEYID = 0
1,504,412 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,174 UART: [idev] --
1,514,097 UART: [ldev] ++
1,514,265 UART: [ldev] CDI.KEYID = 6
1,514,628 UART: [ldev] SUBJECT.KEYID = 5
1,515,054 UART: [ldev] AUTHORITY.KEYID = 7
1,515,517 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,124 UART: [ldev] --
1,585,575 UART: [fwproc] Waiting for Commands...
1,586,254 UART: [fwproc] Received command 0x46574c44
1,587,045 UART: [fwproc] Received Image of size 114448 bytes
2,886,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,925 >>> mbox cmd response: success
3,079,009 UART: [afmc] ++
3,079,177 UART: [afmc] CDI.KEYID = 6
3,079,539 UART: [afmc] SUBJECT.KEYID = 7
3,079,964 UART: [afmc] AUTHORITY.KEYID = 5
3,115,149 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,750 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,440 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,159 UART: [afmc] --
3,158,043 UART: [cold-reset] --
3,159,233 UART: [state] Locking Datavault
3,160,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,000 UART: [state] Locking ICCM
3,161,600 UART: [exit] Launching FMC @ 0x40000130
3,166,929 UART:
3,166,945 UART: Running Caliptra FMC ...
3,167,353 UART:
3,167,407 UART: [state] CFI Enabled
3,177,684 UART: [fht] FMC Alias Private Key: 7
3,286,833 UART: [art] Extend RT PCRs Done
3,287,261 UART: [art] Lock RT PCRs Done
3,288,875 UART: [art] Populate DV Done
3,297,444 UART: [fht] FMC Alias Private Key: 7
3,298,536 UART: [art] Derive CDI
3,298,816 UART: [art] Store in in slot 0x4
3,384,629 UART: [art] Derive Key Pair
3,384,989 UART: [art] Store priv key in slot 0x5
3,397,615 UART: [art] Derive Key Pair - Done
3,412,234 UART: [art] Signing Cert with AUTHO
3,412,714 UART: RITY.KEYID = 7
3,427,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,169 UART: [art] PUB.X = 9F8685D3BB5F0E7AE0D212835F0F1CAAA3CD7C975D220D2EA2BB19F9990AB91F859E15EF648C6B3DBC60CA0A0EA07FD2
3,434,945 UART: [art] PUB.Y = CDEDCEFFB2F789035D43060993AB4D69CD29F49799F810DE6BB726D9889E810BBFBA7771CAF1EED9E6789CBAE50DF40A
3,441,901 UART: [art] SIG.R = 319D47115ECD475D5229CF9133758FCF27328B2015CB0C3035547E9E5B341EDEAF4A6A86ADDD10E4EADFA83C01EEF547
3,448,679 UART: [art] SIG.S = 7676086A9E250860BDBC1099635450B02C51A0F7E9C3B7B18562535B949A62292836595FA4A229A9E8C69519D04A6978
3,472,494 UART: Caliptra RT
3,472,747 UART: [state] CFI Enabled
3,581,535 UART: [rt] RT listening for mailbox commands...
3,582,205 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,875 UART: [rt]cmd =0x49444550, len=8
3,613,677 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,423 ready_for_fw is high
1,362,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,891 >>> mbox cmd response: success
2,989,965 UART:
2,989,981 UART: Running Caliptra FMC ...
2,990,389 UART:
2,990,443 UART: [state] CFI Enabled
3,001,136 UART: [fht] FMC Alias Private Key: 7
3,108,987 UART: [art] Extend RT PCRs Done
3,109,415 UART: [art] Lock RT PCRs Done
3,110,745 UART: [art] Populate DV Done
3,118,990 UART: [fht] FMC Alias Private Key: 7
3,119,994 UART: [art] Derive CDI
3,120,274 UART: [art] Store in in slot 0x4
3,206,063 UART: [art] Derive Key Pair
3,206,423 UART: [art] Store priv key in slot 0x5
3,219,293 UART: [art] Derive Key Pair - Done
3,234,152 UART: [art] Signing Cert with AUTHO
3,234,632 UART: RITY.KEYID = 7
3,249,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,085 UART: [art] PUB.X = 22FC5F541880E0C3E5170B9B7AE6FD17BD3225233BD668158BA4610EB5844EF83D70746D5B5DDD40B6099C2165DB147B
3,256,850 UART: [art] PUB.Y = 8928FC88208F91DF8FBABE5C0B3F8AC1EA80DF0849849B38F433D88836C061D55191A343D9E9F8D2BDFAF043071D8868
3,263,799 UART: [art] SIG.R = CAA06ECEA74DE2CDBF32A43A1C20C9C83F4B7F431DFE51AA8F02C91A8DA1362FF047B0B10E6478CCCBA027B72DD1DB08
3,270,590 UART: [art] SIG.S = 20906019C2F0DFFE564DA53EADBDFECFDF2AE6FE23C8B91960912FAE3361AD1FBA4E666DA5E57F5B6F436DCB8026F7DA
3,294,097 UART: Caliptra RT
3,294,350 UART: [state] CFI Enabled
3,402,955 UART: [rt] RT listening for mailbox commands...
3,403,625 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,299 UART: [rt]cmd =0x49444550, len=8
3,435,069 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,834 UART: [kat] SHA2-256
881,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,880 UART: [kat] ++
886,032 UART: [kat] sha1
890,252 UART: [kat] SHA2-256
892,190 UART: [kat] SHA2-384
894,761 UART: [kat] SHA2-512-ACC
896,662 UART: [kat] ECC-384
902,399 UART: [kat] HMAC-384Kdf
907,005 UART: [kat] LMS
1,475,201 UART: [kat] --
1,476,000 UART: [cold-reset] ++
1,476,466 UART: [fht] Storing FHT @ 0x50003400
1,479,241 UART: [idev] ++
1,479,409 UART: [idev] CDI.KEYID = 6
1,479,769 UART: [idev] SUBJECT.KEYID = 7
1,480,193 UART: [idev] UDS.KEYID = 0
1,480,538 ready_for_fw is high
1,480,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,183 UART: [idev] Erasing UDS.KEYID = 0
1,504,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,039 UART: [idev] --
1,514,000 UART: [ldev] ++
1,514,168 UART: [ldev] CDI.KEYID = 6
1,514,531 UART: [ldev] SUBJECT.KEYID = 5
1,514,957 UART: [ldev] AUTHORITY.KEYID = 7
1,515,420 UART: [ldev] FE.KEYID = 1
1,520,842 UART: [ldev] Erasing FE.KEYID = 1
1,546,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,207 UART: [ldev] --
1,585,510 UART: [fwproc] Waiting for Commands...
1,586,203 UART: [fwproc] Received command 0x46574c44
1,586,994 UART: [fwproc] Received Image of size 114448 bytes
2,886,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,529 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,966 >>> mbox cmd response: success
3,080,222 UART: [afmc] ++
3,080,390 UART: [afmc] CDI.KEYID = 6
3,080,752 UART: [afmc] SUBJECT.KEYID = 7
3,081,177 UART: [afmc] AUTHORITY.KEYID = 5
3,116,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,691 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,381 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,246 UART: [afmc] --
3,159,236 UART: [cold-reset] --
3,160,146 UART: [state] Locking Datavault
3,161,249 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,853 UART: [state] Locking ICCM
3,162,499 UART: [exit] Launching FMC @ 0x40000130
3,167,828 UART:
3,167,844 UART: Running Caliptra FMC ...
3,168,252 UART:
3,168,395 UART: [state] CFI Enabled
3,179,022 UART: [fht] FMC Alias Private Key: 7
3,286,691 UART: [art] Extend RT PCRs Done
3,287,119 UART: [art] Lock RT PCRs Done
3,288,687 UART: [art] Populate DV Done
3,296,796 UART: [fht] FMC Alias Private Key: 7
3,297,786 UART: [art] Derive CDI
3,298,066 UART: [art] Store in in slot 0x4
3,384,293 UART: [art] Derive Key Pair
3,384,653 UART: [art] Store priv key in slot 0x5
3,397,547 UART: [art] Derive Key Pair - Done
3,412,425 UART: [art] Signing Cert with AUTHO
3,412,905 UART: RITY.KEYID = 7
3,427,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,628 UART: [art] PUB.X = EC2C72475AFEB57DAFDDFAC5B107B0B56E650C0A22D1DC99E639EF730483DD09005BEEB4D2B4BAE1B3E10EB3ACFBCB4D
3,435,394 UART: [art] PUB.Y = 4F7C130E6B7DA3686BD35283B1B719F2B57CFC026E9EE55231C3ED75D2DD3E807B58D56982D2E8361968D24A9A1CD034
3,442,344 UART: [art] SIG.R = 71022F764D30D3F13890F8E9CBEB1FEDE63910C18CD0E1E4EE929B31E1837533FD418061C94C8A80F35C30B8EF7D974F
3,449,119 UART: [art] SIG.S = 7B1213B0F21FC3D26D885BFDA445B3F985D14454F4C363D865F749797288E84632B287103890BB0A49E5FFD3E384B4C3
3,472,861 UART: Caliptra RT
3,473,206 UART: [state] CFI Enabled
3,581,382 UART: [rt] RT listening for mailbox commands...
3,582,052 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,116 UART: [rt]cmd =0x49444550, len=8
3,613,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,660 ready_for_fw is high
1,362,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,906 >>> mbox cmd response: success
2,993,590 UART:
2,993,606 UART: Running Caliptra FMC ...
2,994,014 UART:
2,994,157 UART: [state] CFI Enabled
3,004,496 UART: [fht] FMC Alias Private Key: 7
3,112,721 UART: [art] Extend RT PCRs Done
3,113,149 UART: [art] Lock RT PCRs Done
3,114,505 UART: [art] Populate DV Done
3,122,678 UART: [fht] FMC Alias Private Key: 7
3,123,614 UART: [art] Derive CDI
3,123,894 UART: [art] Store in in slot 0x4
3,209,575 UART: [art] Derive Key Pair
3,209,935 UART: [art] Store priv key in slot 0x5
3,223,389 UART: [art] Derive Key Pair - Done
3,238,401 UART: [art] Signing Cert with AUTHO
3,238,881 UART: RITY.KEYID = 7
3,253,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,672 UART: [art] PUB.X = 8FF7F85F11A6C4D019572A89CB1C66D17EA26E67815320FCE2D1D577D5C7750191E4F0A085179DC50599F421319F92B8
3,261,434 UART: [art] PUB.Y = 773A625B91C926629645B02663164984B62BBBADF0AEE4D47D5245C9BC3A7A92139867F3510FB92D56E23E306130A551
3,268,375 UART: [art] SIG.R = 6E88F104ED936DB63061E1B5981A9872D920E2008B0860CEB02173059A011E6487DD9B3B190458CB4B0EE2F68929471B
3,275,099 UART: [art] SIG.S = 131AB134A56EC3B8E1AA78F10799FCCCBEFC054B06B65C5F0B70DB7A0391A816C024B016F858D03A64BF054ACB145629
3,299,324 UART: Caliptra RT
3,299,669 UART: [state] CFI Enabled
3,407,429 UART: [rt] RT listening for mailbox commands...
3,408,099 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,033 UART: [rt]cmd =0x49444550, len=8
3,439,841 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,566 UART: [kat] SHA2-512-ACC
908,467 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,835 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,852 UART: [idev] ++
1,175,020 UART: [idev] CDI.KEYID = 6
1,175,380 UART: [idev] SUBJECT.KEYID = 7
1,175,804 UART: [idev] UDS.KEYID = 0
1,176,149 ready_for_fw is high
1,176,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,289 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,640 UART: [fwproc] Recv command 0x46574c44
1,284,368 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,580 >>> mbox cmd response: success
2,777,660 UART: [afmc] ++
2,777,828 UART: [afmc] CDI.KEYID = 6
2,778,190 UART: [afmc] SUBJECT.KEYID = 7
2,778,615 UART: [afmc] AUTHORITY.KEYID = 5
2,813,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,587 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,389 UART: [afmc] --
2,857,409 UART: [cold-reset] --
2,858,227 UART: [state] Locking Datavault
2,859,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,132 UART: [state] Locking ICCM
2,860,804 UART: [exit] Launching FMC @ 0x40000130
2,866,133 UART:
2,866,149 UART: Running Caliptra FMC ...
2,866,557 UART:
2,866,611 UART: [state] CFI Enabled
2,877,064 UART: [fht] FMC Alias Private Key: 7
2,984,857 UART: [art] Extend RT PCRs Done
2,985,285 UART: [art] Lock RT PCRs Done
2,986,993 UART: [art] Populate DV Done
2,995,074 UART: [fht] FMC Alias Private Key: 7
2,996,088 UART: [art] Derive CDI
2,996,368 UART: [art] Store in in slot 0x4
3,081,931 UART: [art] Derive Key Pair
3,082,291 UART: [art] Store priv key in slot 0x5
3,095,255 UART: [art] Derive Key Pair - Done
3,110,043 UART: [art] Signing Cert with AUTHO
3,110,523 UART: RITY.KEYID = 7
3,125,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,590 UART: [art] PUB.X = D3A74CD46D1DCDCCB7CA15A8F85EC86194A126BD168757337208FEB7AD984077F6DE2C23531E32CB9EC5A268C1F79904
3,133,366 UART: [art] PUB.Y = 836444FBA471CA0D27DDD837BCEE5294D3136B870B374B9DC206410AA024CF94F112580CA17C44CF928BCB1693D2DCA8
3,140,311 UART: [art] SIG.R = 79E8C216669EF4D7161E1B8A0E50F0B4DA05B7AF5A4236DC591456C5DAAFC0501375BF1A964307534E1778CBF0EE7DA5
3,147,082 UART: [art] SIG.S = FB29E9C6F581769115ACCEBD2D756ADE59BC5859951C79481C76F943819FC849CCBD6251CF6113F69A582867F7FFE4C1
3,170,967 UART: Caliptra RT
3,171,220 UART: [state] CFI Enabled
3,278,125 UART: [rt] RT listening for mailbox commands...
3,278,795 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,333 UART: [rt]cmd =0x49444550, len=8
3,310,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,653 ready_for_fw is high
1,060,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,157 >>> mbox cmd response: success
2,690,757 UART:
2,690,773 UART: Running Caliptra FMC ...
2,691,181 UART:
2,691,235 UART: [state] CFI Enabled
2,701,656 UART: [fht] FMC Alias Private Key: 7
2,810,197 UART: [art] Extend RT PCRs Done
2,810,625 UART: [art] Lock RT PCRs Done
2,811,951 UART: [art] Populate DV Done
2,820,036 UART: [fht] FMC Alias Private Key: 7
2,820,988 UART: [art] Derive CDI
2,821,268 UART: [art] Store in in slot 0x4
2,906,999 UART: [art] Derive Key Pair
2,907,359 UART: [art] Store priv key in slot 0x5
2,920,863 UART: [art] Derive Key Pair - Done
2,935,424 UART: [art] Signing Cert with AUTHO
2,935,904 UART: RITY.KEYID = 7
2,950,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,641 UART: [art] PUB.X = BB107B6BC5D73C7946C186C8EB0ED43CEEB3FDB02B8F7762A532D87CDD79B61FDDF68AA5B0693210E615E7957EB3CA35
2,958,428 UART: [art] PUB.Y = 761142E5D5363A7ABB771ED9A6ADC2DA97FBC9479F94B1943AC3BD50D1BA5415627F7AD6CC8CC1D7378F313F70583125
2,965,388 UART: [art] SIG.R = E45FEE53831D4D0904E02BED41F2B57144139EF0DB2096A3F536D0D1821882791429F58E57AA658015B115FBD8DD9101
2,972,147 UART: [art] SIG.S = 1B2B32874C7EDB77DDF2581FA78D8B205709389DCBA88B2A0735FCF2E4934FDF5A5728833D7528DA7B2401271C04A2C1
2,995,966 UART: Caliptra RT
2,996,219 UART: [state] CFI Enabled
3,104,628 UART: [rt] RT listening for mailbox commands...
3,105,298 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,156 UART: [rt]cmd =0x49444550, len=8
3,137,058 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,927 UART: [kat] SHA2-512-ACC
908,828 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,265 UART: [kat] LMS
1,171,593 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,173,200 UART: [fht] FHT @ 0x50003400
1,175,729 UART: [idev] ++
1,175,897 UART: [idev] CDI.KEYID = 6
1,176,257 UART: [idev] SUBJECT.KEYID = 7
1,176,681 UART: [idev] UDS.KEYID = 0
1,177,026 ready_for_fw is high
1,177,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,343 UART: [idev] Erasing UDS.KEYID = 0
1,201,202 UART: [idev] Sha1 KeyId Algorithm
1,209,656 UART: [idev] --
1,210,676 UART: [ldev] ++
1,210,844 UART: [ldev] CDI.KEYID = 6
1,211,207 UART: [ldev] SUBJECT.KEYID = 5
1,211,633 UART: [ldev] AUTHORITY.KEYID = 7
1,212,096 UART: [ldev] FE.KEYID = 1
1,217,384 UART: [ldev] Erasing FE.KEYID = 1
1,244,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,743 >>> mbox cmd response: success
2,775,837 UART: [afmc] ++
2,776,005 UART: [afmc] CDI.KEYID = 6
2,776,367 UART: [afmc] SUBJECT.KEYID = 7
2,776,792 UART: [afmc] AUTHORITY.KEYID = 5
2,811,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,280 UART: [afmc] --
2,855,296 UART: [cold-reset] --
2,855,950 UART: [state] Locking Datavault
2,857,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,811 UART: [state] Locking ICCM
2,858,445 UART: [exit] Launching FMC @ 0x40000130
2,863,774 UART:
2,863,790 UART: Running Caliptra FMC ...
2,864,198 UART:
2,864,341 UART: [state] CFI Enabled
2,874,856 UART: [fht] FMC Alias Private Key: 7
2,982,721 UART: [art] Extend RT PCRs Done
2,983,149 UART: [art] Lock RT PCRs Done
2,984,687 UART: [art] Populate DV Done
2,993,066 UART: [fht] FMC Alias Private Key: 7
2,994,076 UART: [art] Derive CDI
2,994,356 UART: [art] Store in in slot 0x4
3,080,175 UART: [art] Derive Key Pair
3,080,535 UART: [art] Store priv key in slot 0x5
3,094,329 UART: [art] Derive Key Pair - Done
3,109,112 UART: [art] Signing Cert with AUTHO
3,109,592 UART: RITY.KEYID = 7
3,124,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,551 UART: [art] PUB.X = 7F952DD0F39084F0303379EF0A0E51E3AD8B6BA9158F3516D452A6C0AAE008EF771C3855593735E3EDC04D768186766D
3,132,312 UART: [art] PUB.Y = AEFB5B2F27F4EB3C2AC1ED49011D8C8C362D08439DB45F980E39093DAB5BC6CCC0A1CAA1D8E717251FA742AAF53C6750
3,139,272 UART: [art] SIG.R = 13387DC05A5A7B53D7AFFA44A0E36DE978D8BED868A6B23092D20A141F7906C7C1EAF09394E58DBC38F126E15F1B6E72
3,146,048 UART: [art] SIG.S = ED70F1DB7751CE5BE8E9CDF54F5D16BF14E2AD7742C443DE5DBBBC99518E44E268E0FB0BAEAED73B98D35A22533966D0
3,170,502 UART: Caliptra RT
3,170,847 UART: [state] CFI Enabled
3,278,778 UART: [rt] RT listening for mailbox commands...
3,279,448 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,316 UART: [rt]cmd =0x49444550, len=8
3,311,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,568 ready_for_fw is high
1,060,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,714 >>> mbox cmd response: success
2,690,992 UART:
2,691,008 UART: Running Caliptra FMC ...
2,691,416 UART:
2,691,559 UART: [state] CFI Enabled
2,702,078 UART: [fht] FMC Alias Private Key: 7
2,809,779 UART: [art] Extend RT PCRs Done
2,810,207 UART: [art] Lock RT PCRs Done
2,811,577 UART: [art] Populate DV Done
2,819,722 UART: [fht] FMC Alias Private Key: 7
2,820,788 UART: [art] Derive CDI
2,821,068 UART: [art] Store in in slot 0x4
2,906,651 UART: [art] Derive Key Pair
2,907,011 UART: [art] Store priv key in slot 0x5
2,920,875 UART: [art] Derive Key Pair - Done
2,935,806 UART: [art] Signing Cert with AUTHO
2,936,286 UART: RITY.KEYID = 7
2,951,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,021 UART: [art] PUB.X = 104618F170D6A6F53286A087DCF30E2ED5513C614B88B661F2508C6993D996470B958D472B72B7AD4405B48982292BA9
2,958,772 UART: [art] PUB.Y = CB788477BFA55EA2304A51C32F081A5957A8F2C45EB3889C8E81A8FF873E28A9A16B70CBCD78D3BA877AB1BA63C26567
2,965,731 UART: [art] SIG.R = CED44F4FFAA443412B9F67B15FDC4449148DB3405E3E523F9AEEFCCBD71C5E5ACFA755C8D8371A2041BC802D75E21530
2,972,519 UART: [art] SIG.S = 230ADD2ABF77B3ED9303A87CC65DC0509A620028DF4087BFA50E515D078FA301CA05B0DB65D917C239C695E29191ED6D
2,995,494 UART: Caliptra RT
2,995,839 UART: [state] CFI Enabled
3,103,680 UART: [rt] RT listening for mailbox commands...
3,104,350 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,116 UART: [rt]cmd =0x49444550, len=8
3,136,020 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,588 UART: [state] LifecycleState = Unprovisioned
85,243 UART: [state] DebugLocked = No
85,901 UART: [state] WD Timer not started. Device not locked for debugging
87,140 UART: [kat] SHA2-256
890,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,819 UART: [kat] ++
894,971 UART: [kat] sha1
899,333 UART: [kat] SHA2-256
901,273 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,174,073 ready_for_fw is high
1,174,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,421 UART: [fwproc] Recv command 0x46574c44
1,282,154 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,400 >>> mbox cmd response: success
2,773,515 UART: [afmc] ++
2,773,683 UART: [afmc] CDI.KEYID = 6
2,774,046 UART: [afmc] SUBJECT.KEYID = 7
2,774,472 UART: [afmc] AUTHORITY.KEYID = 5
2,809,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,564 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,283 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,050 UART: [afmc] --
2,852,944 UART: [cold-reset] --
2,853,774 UART: [state] Locking Datavault
2,855,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,645 UART: [state] Locking ICCM
2,856,095 UART: [exit] Launching FMC @ 0x40000130
2,861,424 UART:
2,861,440 UART: Running Caliptra FMC ...
2,861,848 UART:
2,861,902 UART: [state] CFI Enabled
2,872,215 UART: [fht] FMC Alias Private Key: 7
2,980,172 UART: [art] Extend RT PCRs Done
2,980,600 UART: [art] Lock RT PCRs Done
2,982,328 UART: [art] Populate DV Done
2,990,579 UART: [fht] FMC Alias Private Key: 7
2,991,715 UART: [art] Derive CDI
2,991,995 UART: [art] Store in in slot 0x4
3,077,630 UART: [art] Derive Key Pair
3,077,990 UART: [art] Store priv key in slot 0x5
3,091,342 UART: [art] Derive Key Pair - Done
3,106,281 UART: [art] Signing Cert with AUTHO
3,106,761 UART: RITY.KEYID = 7
3,122,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,858 UART: [art] PUB.X = BB230801476B870D010BFA479AE0EED5F59DD8A07EC34C1604C0BF4B753FCBE812BB357675BAEACCA37AC02C9C240916
3,129,625 UART: [art] PUB.Y = 1F3B860E95F0F3630D068A0EA8D4856EA1040ADA6C26FDE232E51BC424E09F23FA4533CFE895AE9658CB1D6F49908294
3,136,565 UART: [art] SIG.R = E1D0876ECAEFAF8533CC480201C8C35931BD5AA49B81C0479BB6B9D91580E0DF0BFFE513A2DB3751E5FF6BCCD38EF034
3,143,348 UART: [art] SIG.S = 5139EAF9E1125350DE06990F56BB3402D7CAF348FD4445425CA7FB4DFDDC31063CD9F631A3EA9AA7D583E2E3260677A4
3,167,866 UART: Caliptra RT
3,168,119 UART: [state] CFI Enabled
3,274,962 UART: [rt] RT listening for mailbox commands...
3,275,632 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,342 UART: [rt]cmd =0x49444550, len=8
3,307,250 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,616 ready_for_fw is high
1,056,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,950 >>> mbox cmd response: success
2,685,826 UART:
2,685,842 UART: Running Caliptra FMC ...
2,686,250 UART:
2,686,304 UART: [state] CFI Enabled
2,696,295 UART: [fht] FMC Alias Private Key: 7
2,804,126 UART: [art] Extend RT PCRs Done
2,804,554 UART: [art] Lock RT PCRs Done
2,806,078 UART: [art] Populate DV Done
2,814,413 UART: [fht] FMC Alias Private Key: 7
2,815,395 UART: [art] Derive CDI
2,815,675 UART: [art] Store in in slot 0x4
2,901,086 UART: [art] Derive Key Pair
2,901,446 UART: [art] Store priv key in slot 0x5
2,914,816 UART: [art] Derive Key Pair - Done
2,929,654 UART: [art] Signing Cert with AUTHO
2,930,134 UART: RITY.KEYID = 7
2,945,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,081 UART: [art] PUB.X = BE49C18D59E907DAEDB4950980DBBA6BC8E1B2914C835AB405179FE90444F0E28E785E2F6507B7E3CC7E358755A87C1B
2,952,846 UART: [art] PUB.Y = E84FABD217A8BBB6EA851D15A94E70F74CB208750D087D4C671C479AD9607E58680031E092A5A514C194C2DAEC83F6C4
2,959,773 UART: [art] SIG.R = 654F8333FEC6CBFC57A3C847278A35ABA3F680D2FB49AA1D550757485C8BAD4D7AA55D5B3440D6DBE21024CFBF33A415
2,966,556 UART: [art] SIG.S = E17E5363F2B4E918965BF733B706DCFFB541B46576AF55D703219C300087562915D462BCF1D774D79C8B31CBDEF85861
2,990,463 UART: Caliptra RT
2,990,716 UART: [state] CFI Enabled
3,097,833 UART: [rt] RT listening for mailbox commands...
3,098,503 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,351 UART: [rt]cmd =0x49444550, len=8
3,130,123 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,654 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,756 UART: [idev] ++
1,173,924 UART: [idev] CDI.KEYID = 6
1,174,285 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
1,175,056 ready_for_fw is high
1,175,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,710 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,203 UART: [ldev] --
1,282,681 UART: [fwproc] Wait for Commands...
1,283,406 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,773 >>> mbox cmd response: success
2,775,806 UART: [afmc] ++
2,775,974 UART: [afmc] CDI.KEYID = 6
2,776,337 UART: [afmc] SUBJECT.KEYID = 7
2,776,763 UART: [afmc] AUTHORITY.KEYID = 5
2,813,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,343 UART: [afmc] --
2,856,401 UART: [cold-reset] --
2,857,057 UART: [state] Locking Datavault
2,858,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,974 UART: [state] Locking ICCM
2,859,630 UART: [exit] Launching FMC @ 0x40000130
2,864,959 UART:
2,864,975 UART: Running Caliptra FMC ...
2,865,383 UART:
2,865,526 UART: [state] CFI Enabled
2,876,039 UART: [fht] FMC Alias Private Key: 7
2,983,496 UART: [art] Extend RT PCRs Done
2,983,924 UART: [art] Lock RT PCRs Done
2,985,538 UART: [art] Populate DV Done
2,993,867 UART: [fht] FMC Alias Private Key: 7
2,994,859 UART: [art] Derive CDI
2,995,139 UART: [art] Store in in slot 0x4
3,080,462 UART: [art] Derive Key Pair
3,080,822 UART: [art] Store priv key in slot 0x5
3,094,424 UART: [art] Derive Key Pair - Done
3,109,123 UART: [art] Signing Cert with AUTHO
3,109,603 UART: RITY.KEYID = 7
3,124,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,594 UART: [art] PUB.X = 4EA248950D2048F43E477E2F852BAD4A0B6EBF6FFE9ED6C0261C7B3DBA0005AEC768AE54BD731A8CA61E28618505A23E
3,132,346 UART: [art] PUB.Y = B796B2C4B2DBFB25F0AE352DE3A6A577C6D2B7F7929C4E3ADCABA27BE69F11EA413CA47FB41E107B9D3CBAAA69CDDF74
3,139,330 UART: [art] SIG.R = C0D0E27467109B46CC4BA8EC303C872E9CD29FE3E21471D2958D7CF244C5E510A63948A315DA3193B891C879843334FA
3,146,100 UART: [art] SIG.S = A0B413D2FBAD100647A2C409A699560D42E5293140E2524FA9BF66806DA2591B5B841E4A63DD35692134310E6A140CEB
3,169,112 UART: Caliptra RT
3,169,457 UART: [state] CFI Enabled
3,277,853 UART: [rt] RT listening for mailbox commands...
3,278,523 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,231 UART: [rt]cmd =0x49444550, len=8
3,310,193 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,987 ready_for_fw is high
1,055,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,265 >>> mbox cmd response: success
2,684,973 UART:
2,684,989 UART: Running Caliptra FMC ...
2,685,397 UART:
2,685,540 UART: [state] CFI Enabled
2,696,523 UART: [fht] FMC Alias Private Key: 7
2,804,430 UART: [art] Extend RT PCRs Done
2,804,858 UART: [art] Lock RT PCRs Done
2,806,400 UART: [art] Populate DV Done
2,814,845 UART: [fht] FMC Alias Private Key: 7
2,815,899 UART: [art] Derive CDI
2,816,179 UART: [art] Store in in slot 0x4
2,902,018 UART: [art] Derive Key Pair
2,902,378 UART: [art] Store priv key in slot 0x5
2,915,712 UART: [art] Derive Key Pair - Done
2,930,622 UART: [art] Signing Cert with AUTHO
2,931,102 UART: RITY.KEYID = 7
2,946,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,415 UART: [art] PUB.X = 598A92BC1E0095F3E35827DAB99D6455AFEE9BCD22ABB4AB8C817E3BC541E593DF6CFBC2DDAC17ABC11C2B525F91658F
2,954,189 UART: [art] PUB.Y = 546CCF2086952A1FE381C716633B917CCA3A2B3878C622552CA869AD3A5B3884B4D68A4113521A728D9AD9C44A855BEF
2,961,141 UART: [art] SIG.R = D7D73AD7698B8289783CCE880F58BD91193637BB4BCCF971E2E2E2BBAD8F2A11C0D808AD231763F37B9C228618C564AB
2,967,915 UART: [art] SIG.S = 4EFB48DE5F1E31FA88F09D9520E3DEDDCF2FE8A73F687291DB3EB46C0393FAA6C38577CCCEC0EB35159C027F076052A3
2,991,585 UART: Caliptra RT
2,991,930 UART: [state] CFI Enabled
3,099,477 UART: [rt] RT listening for mailbox commands...
3,100,147 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,801 UART: [rt]cmd =0x49444550, len=8
3,131,923 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,122 UART:
192,489 UART: Running Caliptra ROM ...
193,704 UART:
193,868 UART: [state] CFI Enabled
264,885 UART: [state] LifecycleState = Unprovisioned
266,790 UART: [state] DebugLocked = No
268,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,870 UART: [kat] SHA2-256
442,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,108 UART: [kat] ++
453,649 UART: [kat] sha1
465,102 UART: [kat] SHA2-256
467,824 UART: [kat] SHA2-384
473,321 UART: [kat] SHA2-512-ACC
475,696 UART: [kat] ECC-384
2,770,475 UART: [kat] HMAC-384Kdf
2,800,257 UART: [kat] LMS
3,990,558 UART: [kat] --
3,992,565 UART: [cold-reset] ++
3,994,282 UART: [fht] Storing FHT @ 0x50003400
4,005,980 UART: [idev] ++
4,006,555 UART: [idev] CDI.KEYID = 6
4,007,511 UART: [idev] SUBJECT.KEYID = 7
4,008,697 UART: [idev] UDS.KEYID = 0
4,009,734 ready_for_fw is high
4,009,932 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,477 UART: [idev] Erasing UDS.KEYID = 0
7,348,203 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,490 UART: [idev] --
7,375,125 UART: [ldev] ++
7,375,742 UART: [ldev] CDI.KEYID = 6
7,376,669 UART: [ldev] SUBJECT.KEYID = 5
7,377,749 UART: [ldev] AUTHORITY.KEYID = 7
7,379,091 UART: [ldev] FE.KEYID = 1
7,423,042 UART: [ldev] Erasing FE.KEYID = 1
10,757,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,742 UART: [ldev] --
13,117,220 UART: [fwproc] Waiting for Commands...
13,118,888 UART: [fwproc] Received command 0x46574c44
13,121,077 UART: [fwproc] Received Image of size 114124 bytes
17,169,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,160 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,062 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,661 >>> mbox cmd response: success
17,629,544 UART: [afmc] ++
17,630,148 UART: [afmc] CDI.KEYID = 6
17,631,037 UART: [afmc] SUBJECT.KEYID = 7
17,632,261 UART: [afmc] AUTHORITY.KEYID = 5
20,983,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,143 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,419 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,849 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,633 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,066 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,514 UART: [afmc] --
23,356,790 UART: [cold-reset] --
23,360,594 UART: [state] Locking Datavault
23,365,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,164 UART: [state] Locking ICCM
23,369,398 UART: [exit] Launching FMC @ 0x40000130
23,377,757 UART:
23,378,032 UART: Running Caliptra FMC ...
23,379,072 UART:
23,379,222 UART: [state] CFI Enabled
23,446,962 UART: [fht] FMC Alias Private Key: 7
25,785,793 UART: [art] Extend RT PCRs Done
25,787,032 UART: [art] Lock RT PCRs Done
25,788,718 UART: [art] Populate DV Done
25,794,292 UART: [fht] FMC Alias Private Key: 7
25,795,990 UART: [art] Derive CDI
25,796,803 UART: [art] Store in in slot 0x4
25,856,387 UART: [art] Derive Key Pair
25,857,425 UART: [art] Store priv key in slot 0x5
29,150,164 UART: [art] Derive Key Pair - Done
29,163,379 UART: [art] Signing Cert with AUTHO
29,164,691 UART: RITY.KEYID = 7
31,451,819 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,325 UART: [art] PUB.X = 6F0EBB49A03BE7E437A9C9B47184DFDB0A04524556FEB3B139CF148C58820FBE8B138D0D0338D78445E24A64773804BE
31,460,582 UART: [art] PUB.Y = AA1DFE6D1E3447093FDDB9F5F9A09AE8C5FE675083AEE1A319D87E4097222B360B5C1E1E66DBD579C451025659E961ED
31,467,786 UART: [art] SIG.R = 163100A4A36A38AD94C907F2CF06F133811012372B8351730896C2E9AA83C472448C817426220855BE496A913C09A7C4
31,475,143 UART: [art] SIG.S = EA477C203B14623405A4E7F922EB918D50127059376C8E18718AB682FE2F98B853A0D57D46A4665E673F3736D216E730
32,780,715 UART: Caliptra RT
32,781,462 UART: [state] CFI Enabled
32,944,956 UART: [rt] RT listening for mailbox commands...
32,946,845 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,976,832 UART: [rt]cmd =0x52564348, len=36
32,978,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,784,203 ready_for_fw is high
3,784,607 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,848,275 >>> mbox cmd response: success
23,546,916 UART:
23,547,284 UART: Running Caliptra FMC ...
23,548,488 UART:
23,548,665 UART: [state] CFI Enabled
23,614,132 UART: [fht] FMC Alias Private Key: 7
25,951,310 UART: [art] Extend RT PCRs Done
25,952,526 UART: [art] Lock RT PCRs Done
25,953,842 UART: [art] Populate DV Done
25,959,319 UART: [fht] FMC Alias Private Key: 7
25,960,859 UART: [art] Derive CDI
25,961,697 UART: [art] Store in in slot 0x4
26,021,872 UART: [art] Derive Key Pair
26,022,869 UART: [art] Store priv key in slot 0x5
29,315,783 UART: [art] Derive Key Pair - Done
29,328,939 UART: [art] Signing Cert with AUTHO
29,330,244 UART: RITY.KEYID = 7
31,617,224 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,724 UART: [art] PUB.X = A8F2E729DF665CF7738B3931D86FBCAF1DDFDF76E19CE29CDF3F293D202F85936AB32D76E033A2575DE0FF762237E5D0
31,626,028 UART: [art] PUB.Y = 87AB0295FD774E9E01F75AA908A3E0C4C0F6C2AA7B4958EDA8EB9E3418519238E955B4139FDBF46A2BED9404077551AC
31,633,265 UART: [art] SIG.R = 5D70880367A4E30419EDC579AC01C2876B63894CD39DE6D353DBC301A11312A2E11B320520DB60D544D9AB86822CBCF2
31,640,618 UART: [art] SIG.S = 57F4470B8C09D200C830A7D7C684803B0C9289DCDB7BD79FAAA92BBB3DBC6E90DE1EF4AFE103A192078CF5C2489767FC
32,946,562 UART: Caliptra RT
32,947,273 UART: [state] CFI Enabled
33,108,400 UART: [rt] RT listening for mailbox commands...
33,110,296 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,140,592 UART: [rt]cmd =0x52564348, len=36
33,142,374 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,336 UART:
192,716 UART: Running Caliptra ROM ...
193,818 UART:
603,378 UART: [state] CFI Enabled
615,558 UART: [state] LifecycleState = Unprovisioned
617,457 UART: [state] DebugLocked = No
618,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,845 UART: [kat] SHA2-256
792,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,168 UART: [kat] ++
803,609 UART: [kat] sha1
815,421 UART: [kat] SHA2-256
818,143 UART: [kat] SHA2-384
823,558 UART: [kat] SHA2-512-ACC
825,931 UART: [kat] ECC-384
3,108,785 UART: [kat] HMAC-384Kdf
3,121,732 UART: [kat] LMS
4,311,866 UART: [kat] --
4,317,801 UART: [cold-reset] ++
4,319,523 UART: [fht] Storing FHT @ 0x50003400
4,330,359 UART: [idev] ++
4,330,946 UART: [idev] CDI.KEYID = 6
4,331,978 UART: [idev] SUBJECT.KEYID = 7
4,333,153 UART: [idev] UDS.KEYID = 0
4,334,133 ready_for_fw is high
4,334,328 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,660 UART: [idev] Erasing UDS.KEYID = 0
7,616,647 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,906 UART: [idev] --
7,642,037 UART: [ldev] ++
7,642,612 UART: [ldev] CDI.KEYID = 6
7,643,575 UART: [ldev] SUBJECT.KEYID = 5
7,644,780 UART: [ldev] AUTHORITY.KEYID = 7
7,646,004 UART: [ldev] FE.KEYID = 1
7,658,809 UART: [ldev] Erasing FE.KEYID = 1
10,951,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,144 UART: [ldev] --
13,311,588 UART: [fwproc] Waiting for Commands...
13,313,834 UART: [fwproc] Received command 0x46574c44
13,316,006 UART: [fwproc] Received Image of size 114124 bytes
17,365,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,825,605 >>> mbox cmd response: success
17,830,442 UART: [afmc] ++
17,831,036 UART: [afmc] CDI.KEYID = 6
17,831,948 UART: [afmc] SUBJECT.KEYID = 7
17,833,216 UART: [afmc] AUTHORITY.KEYID = 5
21,147,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,712 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,094 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,924 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,341 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,771 UART: [afmc] --
23,512,954 UART: [cold-reset] --
23,516,008 UART: [state] Locking Datavault
23,520,983 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,734 UART: [state] Locking ICCM
23,524,287 UART: [exit] Launching FMC @ 0x40000130
23,532,672 UART:
23,532,900 UART: Running Caliptra FMC ...
23,533,996 UART:
23,534,154 UART: [state] CFI Enabled
23,542,356 UART: [fht] FMC Alias Private Key: 7
25,873,657 UART: [art] Extend RT PCRs Done
25,874,880 UART: [art] Lock RT PCRs Done
25,876,588 UART: [art] Populate DV Done
25,882,124 UART: [fht] FMC Alias Private Key: 7
25,883,632 UART: [art] Derive CDI
25,884,363 UART: [art] Store in in slot 0x4
25,927,107 UART: [art] Derive Key Pair
25,928,099 UART: [art] Store priv key in slot 0x5
29,170,797 UART: [art] Derive Key Pair - Done
29,183,789 UART: [art] Signing Cert with AUTHO
29,185,100 UART: RITY.KEYID = 7
31,464,351 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,852 UART: [art] PUB.X = C4591F820BD9172FEE3B252F29FFBA4F5DD21825D58AF0FA35D1EE4B0CFFAEF041224C5C341888564FBB13B12C4DE069
31,473,136 UART: [art] PUB.Y = 7958F32D18994F95E7310CB2B8CDE42F4D0F2242DCB07CE34C1FC62CA2B8DFE6816D4A1BC88E5C31536B3DC2343F71CA
31,480,415 UART: [art] SIG.R = 2C58A091C3ECC4680B367812AA162F45FFCCAF89A91136958CF2E271548D01AF69427BCA7C7F5E3CE5F890A82E8D4994
31,487,779 UART: [art] SIG.S = 5389347BEBC8428F4E18C02531696E7C577C03FF88BBDE35D68311F848EDA133EDDE7CF8D6EFEAEA45A10ACD9B869DF4
32,792,981 UART: Caliptra RT
32,793,687 UART: [state] CFI Enabled
32,911,562 UART: [rt] RT listening for mailbox commands...
32,913,438 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,943,581 UART: [rt]cmd =0x52564348, len=36
32,945,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,124,936 ready_for_fw is high
4,125,332 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,785 >>> mbox cmd response: success
23,722,868 UART:
23,723,235 UART: Running Caliptra FMC ...
23,724,366 UART:
23,724,521 UART: [state] CFI Enabled
23,732,254 UART: [fht] FMC Alias Private Key: 7
26,062,952 UART: [art] Extend RT PCRs Done
26,064,186 UART: [art] Lock RT PCRs Done
26,065,921 UART: [art] Populate DV Done
26,071,279 UART: [fht] FMC Alias Private Key: 7
26,072,926 UART: [art] Derive CDI
26,073,737 UART: [art] Store in in slot 0x4
26,116,231 UART: [art] Derive Key Pair
26,117,274 UART: [art] Store priv key in slot 0x5
29,358,916 UART: [art] Derive Key Pair - Done
29,371,955 UART: [art] Signing Cert with AUTHO
29,373,283 UART: RITY.KEYID = 7
31,652,864 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,366 UART: [art] PUB.X = 3B815DD861D036A0254C04DD149DAB772865EBAEB6DAFBEA64F0E46C694D3343A1FD81709D3AC92032B8BC4A5B4E941B
31,661,654 UART: [art] PUB.Y = D3834A3326CF7E8F4D95AD4EBBA3D7BE88E6373CC69C2EE9CB0EE5AD7249785FE5B92265CAF0DDD6F8786FD686710589
31,668,891 UART: [art] SIG.R = 3157E62E2E4861E67D01A5C04005B81772C359FA3ECA8C0AA7557E4AC8D01E2C309290ABB2ECFA68DF21A98983587835
31,676,269 UART: [art] SIG.S = A753633AC949737CDAD96C053EAA4EB692DF4DC300CF437454BE8FAD08E9D57358D8ED305E21891136AACC4FD2C84CAC
32,980,608 UART: Caliptra RT
32,981,307 UART: [state] CFI Enabled
33,099,527 UART: [rt] RT listening for mailbox commands...
33,101,409 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,131,397 UART: [rt]cmd =0x52564348, len=36
33,133,260 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,140 UART:
192,506 UART: Running Caliptra ROM ...
193,606 UART:
193,749 UART: [state] CFI Enabled
262,880 UART: [state] LifecycleState = Unprovisioned
264,831 UART: [state] DebugLocked = No
266,227 UART: [state] WD Timer not started. Device not locked for debugging
270,688 UART: [kat] SHA2-256
449,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,409 UART: [kat] ++
461,937 UART: [kat] sha1
471,611 UART: [kat] SHA2-256
474,633 UART: [kat] SHA2-384
480,335 UART: [kat] SHA2-512-ACC
483,339 UART: [kat] ECC-384
2,945,324 UART: [kat] HMAC-384Kdf
2,970,853 UART: [kat] LMS
3,500,283 UART: [kat] --
3,504,568 UART: [cold-reset] ++
3,505,569 UART: [fht] FHT @ 0x50003400
3,516,186 UART: [idev] ++
3,516,747 UART: [idev] CDI.KEYID = 6
3,517,623 UART: [idev] SUBJECT.KEYID = 7
3,518,865 UART: [idev] UDS.KEYID = 0
3,519,761 ready_for_fw is high
3,519,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,867 UART: [idev] Erasing UDS.KEYID = 0
6,029,728 UART: [idev] Sha1 KeyId Algorithm
6,051,938 UART: [idev] --
6,055,343 UART: [ldev] ++
6,055,917 UART: [ldev] CDI.KEYID = 6
6,056,851 UART: [ldev] SUBJECT.KEYID = 5
6,058,017 UART: [ldev] AUTHORITY.KEYID = 7
6,059,251 UART: [ldev] FE.KEYID = 1
6,101,776 UART: [ldev] Erasing FE.KEYID = 1
8,603,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,841 UART: [ldev] --
10,415,943 UART: [fwproc] Wait for Commands...
10,418,412 UART: [fwproc] Recv command 0x46574c44
10,420,598 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,290,304 >>> mbox cmd response: success
14,293,722 UART: [afmc] ++
14,294,319 UART: [afmc] CDI.KEYID = 6
14,295,233 UART: [afmc] SUBJECT.KEYID = 7
14,296,395 UART: [afmc] AUTHORITY.KEYID = 5
16,832,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,118 UART: [afmc] --
18,626,055 UART: [cold-reset] --
18,630,312 UART: [state] Locking Datavault
18,636,206 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,903 UART: [state] Locking ICCM
18,640,050 UART: [exit] Launching FMC @ 0x40000130
18,648,452 UART:
18,648,685 UART: Running Caliptra FMC ...
18,649,787 UART:
18,649,949 UART: [state] CFI Enabled
18,711,887 UART: [fht] FMC Alias Private Key: 7
20,475,466 UART: [art] Extend RT PCRs Done
20,476,676 UART: [art] Lock RT PCRs Done
20,478,677 UART: [art] Populate DV Done
20,483,979 UART: [fht] FMC Alias Private Key: 7
20,485,568 UART: [art] Derive CDI
20,486,379 UART: [art] Store in in slot 0x4
20,544,450 UART: [art] Derive Key Pair
20,545,504 UART: [art] Store priv key in slot 0x5
23,007,653 UART: [art] Derive Key Pair - Done
23,020,974 UART: [art] Signing Cert with AUTHO
23,022,282 UART: RITY.KEYID = 7
24,734,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,650 UART: [art] PUB.X = 2AFA2478C6FF6FA47B0336130EF5C6B134646B3A3ED2D92A4E8661AAF6B83A7897503A801E038DAB9177F713F5EA1015
24,742,910 UART: [art] PUB.Y = 51CA9DA968C1DA1899EFCC0DCF6F8B08CAC089C1B8AEFF22A34FED289E6297F2676F3429102EFBED3757CA3286EF48E8
24,750,203 UART: [art] SIG.R = B7907DE592E22E2DEC1A572C11577AA89AE0223F1B72899C35896DCE77CF582CB091252EF69CA886A65AD789677CD378
24,757,597 UART: [art] SIG.S = 7F4F3E55B755AF3D4B606CDDC36DBFDF5B22704C0882C67951F4D720C69B789A79F889D61190614FCD80F1A030B7D511
25,736,576 UART: Caliptra RT
25,737,288 UART: [state] CFI Enabled
25,901,748 UART: [rt] RT listening for mailbox commands...
25,903,631 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,934,363 UART: [rt]cmd =0x52564348, len=36
25,936,253 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,362,121 ready_for_fw is high
3,362,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,040,718 >>> mbox cmd response: success
18,321,190 UART:
18,321,598 UART: Running Caliptra FMC ...
18,322,798 UART:
18,322,965 UART: [state] CFI Enabled
18,389,243 UART: [fht] FMC Alias Private Key: 7
20,153,392 UART: [art] Extend RT PCRs Done
20,154,604 UART: [art] Lock RT PCRs Done
20,156,197 UART: [art] Populate DV Done
20,161,771 UART: [fht] FMC Alias Private Key: 7
20,163,472 UART: [art] Derive CDI
20,164,207 UART: [art] Store in in slot 0x4
20,222,084 UART: [art] Derive Key Pair
20,223,152 UART: [art] Store priv key in slot 0x5
22,685,908 UART: [art] Derive Key Pair - Done
22,698,872 UART: [art] Signing Cert with AUTHO
22,700,176 UART: RITY.KEYID = 7
24,411,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,961 UART: [art] PUB.X = 674D8E9F5FE3682C5E731B1DBDCCBFB9AAFF7B68214B014FB04166CF43DDEDB6E5BA45BF014BDF126021A02F2CE6BC49
24,420,228 UART: [art] PUB.Y = 104B11A2733C40363D513702C08E763039E59A414274989342E642E099330AB99673B0D80D6A2FFF05EF3E86CE48E762
24,427,500 UART: [art] SIG.R = 1500157B2A75C4E4FCC10502473C3948BDC309BCBBAE75B8BC0A7AFB6597D517DDEDB941E92EE9E0F8F66BC5446A79EF
24,435,124 UART: [art] SIG.S = 3CD355345A79B7633DA55A799C2D9D2F36B40A6002FA7E1496C6FE4C5E4020989C147B0A6A30CC748730F8617E0A422D
25,413,733 UART: Caliptra RT
25,414,434 UART: [state] CFI Enabled
25,581,274 UART: [rt] RT listening for mailbox commands...
25,583,148 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,613,817 UART: [rt]cmd =0x52564348, len=36
25,615,613 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,317 UART:
192,682 UART: Running Caliptra ROM ...
193,876 UART:
603,313 UART: [state] CFI Enabled
614,084 UART: [state] LifecycleState = Unprovisioned
615,981 UART: [state] DebugLocked = No
618,658 UART: [state] WD Timer not started. Device not locked for debugging
622,905 UART: [kat] SHA2-256
802,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,620 UART: [kat] ++
814,152 UART: [kat] sha1
826,448 UART: [kat] SHA2-256
829,452 UART: [kat] SHA2-384
835,215 UART: [kat] SHA2-512-ACC
838,209 UART: [kat] ECC-384
3,281,495 UART: [kat] HMAC-384Kdf
3,294,156 UART: [kat] LMS
3,823,648 UART: [kat] --
3,828,495 UART: [cold-reset] ++
3,829,568 UART: [fht] FHT @ 0x50003400
3,839,414 UART: [idev] ++
3,840,011 UART: [idev] CDI.KEYID = 6
3,840,944 UART: [idev] SUBJECT.KEYID = 7
3,842,112 UART: [idev] UDS.KEYID = 0
3,843,027 ready_for_fw is high
3,843,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,782 UART: [idev] Erasing UDS.KEYID = 0
6,318,876 UART: [idev] Sha1 KeyId Algorithm
6,342,643 UART: [idev] --
6,346,417 UART: [ldev] ++
6,346,977 UART: [ldev] CDI.KEYID = 6
6,347,883 UART: [ldev] SUBJECT.KEYID = 5
6,349,085 UART: [ldev] AUTHORITY.KEYID = 7
6,350,307 UART: [ldev] FE.KEYID = 1
6,362,230 UART: [ldev] Erasing FE.KEYID = 1
8,835,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,395 UART: [ldev] --
10,624,102 UART: [fwproc] Wait for Commands...
10,626,517 UART: [fwproc] Recv command 0x46574c44
10,628,599 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,499,510 >>> mbox cmd response: success
14,503,766 UART: [afmc] ++
14,504,354 UART: [afmc] CDI.KEYID = 6
14,505,261 UART: [afmc] SUBJECT.KEYID = 7
14,506,409 UART: [afmc] AUTHORITY.KEYID = 5
17,010,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,768 UART: [afmc] --
18,805,880 UART: [cold-reset] --
18,807,735 UART: [state] Locking Datavault
18,812,005 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,646 UART: [state] Locking ICCM
18,815,515 UART: [exit] Launching FMC @ 0x40000130
18,823,968 UART:
18,824,201 UART: Running Caliptra FMC ...
18,825,294 UART:
18,825,444 UART: [state] CFI Enabled
18,833,903 UART: [fht] FMC Alias Private Key: 7
20,591,320 UART: [art] Extend RT PCRs Done
20,592,559 UART: [art] Lock RT PCRs Done
20,594,259 UART: [art] Populate DV Done
20,599,778 UART: [fht] FMC Alias Private Key: 7
20,601,429 UART: [art] Derive CDI
20,602,238 UART: [art] Store in in slot 0x4
20,644,997 UART: [art] Derive Key Pair
20,646,036 UART: [art] Store priv key in slot 0x5
23,073,170 UART: [art] Derive Key Pair - Done
23,086,004 UART: [art] Signing Cert with AUTHO
23,087,307 UART: RITY.KEYID = 7
24,793,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,025 UART: [art] PUB.X = E7A0AC3DF97AA0C112F46C5A247A8FC2FD400DBEBEB33999E5D2A865381C30FED70142D9A8A7BB6AFE9B98050DC1A423
24,802,197 UART: [art] PUB.Y = D3CF389ADD4DBE897F26AF1E2257EF6100A69AB3B4EF3CC98854A2BD7BB06B2F9FF2C334D79A1DEAB9111EB7FDB2E560
24,809,511 UART: [art] SIG.R = BC36912295319330260BBA5583711F3C32935DEF18D01DA51AA11B956A6F308CEAC3EBDB4307585CC0AC117D8A37C3A9
24,816,880 UART: [art] SIG.S = 66CF2633B836ECD95624E5BA3422A4BC993774187207FAA387B733875960E042A9E38BC963ADF71367F7C6FE6F799650
25,795,968 UART: Caliptra RT
25,796,694 UART: [state] CFI Enabled
25,914,539 UART: [rt] RT listening for mailbox commands...
25,916,424 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,946,503 UART: [rt]cmd =0x52564348, len=36
25,948,260 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,695,930 ready_for_fw is high
3,696,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,472 >>> mbox cmd response: success
18,520,820 UART:
18,521,228 UART: Running Caliptra FMC ...
18,522,339 UART:
18,522,490 UART: [state] CFI Enabled
18,530,333 UART: [fht] FMC Alias Private Key: 7
20,287,592 UART: [art] Extend RT PCRs Done
20,288,810 UART: [art] Lock RT PCRs Done
20,290,540 UART: [art] Populate DV Done
20,296,021 UART: [fht] FMC Alias Private Key: 7
20,297,672 UART: [art] Derive CDI
20,298,482 UART: [art] Store in in slot 0x4
20,340,806 UART: [art] Derive Key Pair
20,341,849 UART: [art] Store priv key in slot 0x5
22,768,236 UART: [art] Derive Key Pair - Done
22,780,959 UART: [art] Signing Cert with AUTHO
22,782,254 UART: RITY.KEYID = 7
24,487,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,209 UART: [art] PUB.X = 4B1AFB8034AB8AB4F5300A9CA45FA55BE7152C40154B3E96D0B7E3247BAE0DE14E18A17521529E2AB0254839AAA72E53
24,496,499 UART: [art] PUB.Y = 1A1AFCCCD2AFCD5D246764419E54A39194D18C38278E88D0B90495535450233FB6C12EDD0555F46069F98F94D7FC253E
24,503,778 UART: [art] SIG.R = 19F91DBD2EB3AA47DD7880863CB5AD8BD2EC2E2EF352BF62480851043BAF87B9941C2CF4AA9E198481E0CE3C77C860A7
24,511,151 UART: [art] SIG.S = E9A803FE0DADBAA5677B45DD3D072B19D3573B271169F3420B8DCD77A75258652E1845E642D237AE6B04AB27D0B912A1
25,489,932 UART: Caliptra RT
25,490,622 UART: [state] CFI Enabled
25,607,965 UART: [rt] RT listening for mailbox commands...
25,609,870 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,639,852 UART: [rt]cmd =0x52564348, len=36
25,641,819 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,164 UART:
192,524 UART: Running Caliptra ROM ...
193,708 UART:
193,863 UART: [state] CFI Enabled
261,904 UART: [state] LifecycleState = Unprovisioned
264,311 UART: [state] DebugLocked = No
266,770 UART: [state] WD Timer not started. Device not locked for debugging
271,226 UART: [kat] SHA2-256
461,092 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,845 UART: [kat] ++
472,341 UART: [kat] sha1
484,214 UART: [kat] SHA2-256
487,228 UART: [kat] SHA2-384
492,882 UART: [kat] SHA2-512-ACC
495,463 UART: [kat] ECC-384
2,949,698 UART: [kat] HMAC-384Kdf
2,969,817 UART: [kat] LMS
3,501,590 UART: [kat] --
3,505,872 UART: [cold-reset] ++
3,508,019 UART: [fht] FHT @ 0x50003400
3,520,274 UART: [idev] ++
3,520,985 UART: [idev] CDI.KEYID = 6
3,521,896 UART: [idev] SUBJECT.KEYID = 7
3,523,141 UART: [idev] UDS.KEYID = 0
3,524,067 ready_for_fw is high
3,524,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,599 UART: [idev] Erasing UDS.KEYID = 0
6,026,599 UART: [idev] Sha1 KeyId Algorithm
6,048,574 UART: [idev] --
6,054,907 UART: [ldev] ++
6,055,588 UART: [ldev] CDI.KEYID = 6
6,056,567 UART: [ldev] SUBJECT.KEYID = 5
6,057,725 UART: [ldev] AUTHORITY.KEYID = 7
6,058,902 UART: [ldev] FE.KEYID = 1
6,098,399 UART: [ldev] Erasing FE.KEYID = 1
8,605,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,394 UART: [ldev] --
10,411,955 UART: [fwproc] Wait for Commands...
10,414,097 UART: [fwproc] Recv command 0x46574c44
10,416,416 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,988 >>> mbox cmd response: success
14,608,651 UART: [afmc] ++
14,609,360 UART: [afmc] CDI.KEYID = 6
14,610,596 UART: [afmc] SUBJECT.KEYID = 7
14,612,028 UART: [afmc] AUTHORITY.KEYID = 5
17,148,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,232 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,354 UART: [afmc] --
18,945,229 UART: [cold-reset] --
18,949,261 UART: [state] Locking Datavault
18,955,947 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,091 UART: [state] Locking ICCM
18,960,409 UART: [exit] Launching FMC @ 0x40000130
18,969,083 UART:
18,969,320 UART: Running Caliptra FMC ...
18,970,424 UART:
18,970,582 UART: [state] CFI Enabled
19,029,112 UART: [fht] FMC Alias Private Key: 7
20,793,928 UART: [art] Extend RT PCRs Done
20,795,143 UART: [art] Lock RT PCRs Done
20,796,925 UART: [art] Populate DV Done
20,802,447 UART: [fht] FMC Alias Private Key: 7
20,804,036 UART: [art] Derive CDI
20,804,848 UART: [art] Store in in slot 0x4
20,862,379 UART: [art] Derive Key Pair
20,863,416 UART: [art] Store priv key in slot 0x5
23,327,000 UART: [art] Derive Key Pair - Done
23,340,316 UART: [art] Signing Cert with AUTHO
23,341,618 UART: RITY.KEYID = 7
25,052,318 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,818 UART: [art] PUB.X = 34CC58B2F77FE7BABD51D027DE6E9E06A150797F87A90AD7F3F80B7C1DE8783B1F7CDDB01E74FDE13A30E07168CBE116
25,061,116 UART: [art] PUB.Y = FA039B3665C58B823EC6777ABDC7967EF030D0D2F7A271A4D4FD7A0E61BA4A7906311E19A30BBF79B25B3399468E9DCC
25,068,400 UART: [art] SIG.R = F9628503043F423926B963B3ADA1B65894E038E0218E03414D72F1F1A24AD3A2C5D2D8F563056AC539E7D056976B2B2F
25,075,736 UART: [art] SIG.S = DAF3F3542E3461447E11D945C7D8BF9EE44E9D486EC6600DF5C2661313776EFBA58BE39DB8CB92232F83C89EECBCF1E5
26,055,069 UART: Caliptra RT
26,055,764 UART: [state] CFI Enabled
26,219,962 UART: [rt] RT listening for mailbox commands...
26,221,841 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,252,861 UART: [rt]cmd =0x52564348, len=36
26,254,938 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,437,149 ready_for_fw is high
3,437,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,915 >>> mbox cmd response: success
19,021,949 UART:
19,022,391 UART: Running Caliptra FMC ...
19,023,540 UART:
19,023,706 UART: [state] CFI Enabled
19,090,367 UART: [fht] FMC Alias Private Key: 7
20,854,355 UART: [art] Extend RT PCRs Done
20,855,573 UART: [art] Lock RT PCRs Done
20,857,095 UART: [art] Populate DV Done
20,862,668 UART: [fht] FMC Alias Private Key: 7
20,864,156 UART: [art] Derive CDI
20,864,920 UART: [art] Store in in slot 0x4
20,923,807 UART: [art] Derive Key Pair
20,924,849 UART: [art] Store priv key in slot 0x5
23,388,015 UART: [art] Derive Key Pair - Done
23,401,234 UART: [art] Signing Cert with AUTHO
23,402,540 UART: RITY.KEYID = 7
25,114,058 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,585 UART: [art] PUB.X = 1C6C3C1B7454E198CCF6454C050CE8FF08B6537BBA159AD2C9BD1F3BFB914EC9783B92FD888AEFB1FA46860A849B56EA
25,122,831 UART: [art] PUB.Y = C59302C34A83564A5F9257D5A1DC8BDAF2146A1AD3EB38BFB071B3AD18FB298747D3D960AF5F617F52AC3B4BA325EADA
25,130,131 UART: [art] SIG.R = 41CE3AC9CEB05EC131FD2C0B69D6916139FF61338CBB31E11229014A19BF99B710737E1A94CDE0B827F2E6C95D376849
25,137,531 UART: [art] SIG.S = 49E30206B4A5EF560B357E140F3F312115396F62D8B27473349E0B3ED76A8A40C87F3E949899914B455242244AEFA71E
26,116,076 UART: Caliptra RT
26,116,789 UART: [state] CFI Enabled
26,282,787 UART: [rt] RT listening for mailbox commands...
26,284,681 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,315,537 UART: [rt]cmd =0x52564348, len=36
26,317,006 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,360 UART:
192,736 UART: Running Caliptra ROM ...
193,826 UART:
603,362 UART: [state] CFI Enabled
616,669 UART: [state] LifecycleState = Unprovisioned
619,038 UART: [state] DebugLocked = No
620,777 UART: [state] WD Timer not started. Device not locked for debugging
624,728 UART: [kat] SHA2-256
814,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,360 UART: [kat] ++
825,902 UART: [kat] sha1
837,551 UART: [kat] SHA2-256
840,551 UART: [kat] SHA2-384
846,463 UART: [kat] SHA2-512-ACC
849,043 UART: [kat] ECC-384
3,289,079 UART: [kat] HMAC-384Kdf
3,302,862 UART: [kat] LMS
3,834,658 UART: [kat] --
3,839,879 UART: [cold-reset] ++
3,840,811 UART: [fht] FHT @ 0x50003400
3,853,150 UART: [idev] ++
3,853,889 UART: [idev] CDI.KEYID = 6
3,854,806 UART: [idev] SUBJECT.KEYID = 7
3,855,968 UART: [idev] UDS.KEYID = 0
3,856,885 ready_for_fw is high
3,857,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,665 UART: [idev] Erasing UDS.KEYID = 0
6,333,551 UART: [idev] Sha1 KeyId Algorithm
6,357,465 UART: [idev] --
6,363,871 UART: [ldev] ++
6,364,548 UART: [ldev] CDI.KEYID = 6
6,365,423 UART: [ldev] SUBJECT.KEYID = 5
6,366,622 UART: [ldev] AUTHORITY.KEYID = 7
6,367,842 UART: [ldev] FE.KEYID = 1
6,379,397 UART: [ldev] Erasing FE.KEYID = 1
8,854,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,686 UART: [ldev] --
10,642,776 UART: [fwproc] Wait for Commands...
10,644,881 UART: [fwproc] Recv command 0x46574c44
10,647,132 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,798 >>> mbox cmd response: success
14,835,558 UART: [afmc] ++
14,836,270 UART: [afmc] CDI.KEYID = 6
14,837,503 UART: [afmc] SUBJECT.KEYID = 7
14,838,930 UART: [afmc] AUTHORITY.KEYID = 5
17,342,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,757 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,913 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,348 UART: [afmc] --
19,138,471 UART: [cold-reset] --
19,142,339 UART: [state] Locking Datavault
19,146,294 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,434 UART: [state] Locking ICCM
19,151,284 UART: [exit] Launching FMC @ 0x40000130
19,159,959 UART:
19,160,183 UART: Running Caliptra FMC ...
19,161,275 UART:
19,161,428 UART: [state] CFI Enabled
19,169,250 UART: [fht] FMC Alias Private Key: 7
20,925,886 UART: [art] Extend RT PCRs Done
20,927,099 UART: [art] Lock RT PCRs Done
20,929,098 UART: [art] Populate DV Done
20,934,666 UART: [fht] FMC Alias Private Key: 7
20,936,353 UART: [art] Derive CDI
20,937,180 UART: [art] Store in in slot 0x4
20,979,717 UART: [art] Derive Key Pair
20,980,748 UART: [art] Store priv key in slot 0x5
23,407,120 UART: [art] Derive Key Pair - Done
23,419,999 UART: [art] Signing Cert with AUTHO
23,421,291 UART: RITY.KEYID = 7
25,126,968 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,467 UART: [art] PUB.X = 86178739D17DFCD1903605ACFACAFD36FBDD83B95BCD0CFC598DF40BC8C26A0A03A3C49D4645A725BC461A02DAC93473
25,135,820 UART: [art] PUB.Y = 5BEC8A8486B84F7B9598F07AF838F539DF7D20C846FE9AF1BB41BEBB3F5B8F6ABF532C590FCCCE6C5EDF7AFEFCE5E722
25,143,092 UART: [art] SIG.R = F3313E18FCE8E2E2FF3B747E166B9661A685A384A9A5022C0FD49150FD451C6EAAD54309D8E2EA8458F6D8DD21111AE9
25,150,461 UART: [art] SIG.S = 9BE4D199FFC62BEC703A53D628D300374709279D06F694A93BFF4CC5A17B8A02DDB04257B3DD8D601037A7A021EECFFC
26,129,238 UART: Caliptra RT
26,129,916 UART: [state] CFI Enabled
26,246,963 UART: [rt] RT listening for mailbox commands...
26,248,831 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,278,943 UART: [rt]cmd =0x52564348, len=36
26,280,525 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,754,005 ready_for_fw is high
3,754,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,562 >>> mbox cmd response: success
19,204,133 UART:
19,204,527 UART: Running Caliptra FMC ...
19,205,622 UART:
19,205,770 UART: [state] CFI Enabled
19,213,733 UART: [fht] FMC Alias Private Key: 7
20,969,556 UART: [art] Extend RT PCRs Done
20,970,781 UART: [art] Lock RT PCRs Done
20,972,429 UART: [art] Populate DV Done
20,977,914 UART: [fht] FMC Alias Private Key: 7
20,979,506 UART: [art] Derive CDI
20,980,312 UART: [art] Store in in slot 0x4
21,022,860 UART: [art] Derive Key Pair
21,023,903 UART: [art] Store priv key in slot 0x5
23,451,165 UART: [art] Derive Key Pair - Done
23,463,686 UART: [art] Signing Cert with AUTHO
23,465,024 UART: RITY.KEYID = 7
25,170,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,105 UART: [art] PUB.X = 164197F9BA72D13A44965037B076E31A9B9B66220306B07D541888EAE0CBC435024948F3C0BB4C909604FCE92436A956
25,179,340 UART: [art] PUB.Y = 92F64094B307B9F32392E0FCFE8A5757A1547455D8802A234110B70D9EEA4616E099E82F2787128A40BE26FA6164FABB
25,186,601 UART: [art] SIG.R = B8DBCF5C468FFE070BA30DA69DB8D2F94F9E0412DDB00313A9080881A1E773CBA7F703BB1A03B5C4BE29F60420332197
25,193,968 UART: [art] SIG.S = A5D577315D70CA9855931BE48CCDE4391C4CF347CB2EEEF2A99778C288230D8494DC3F558D4C1742EBE82B9773AB145F
26,173,243 UART: Caliptra RT
26,173,953 UART: [state] CFI Enabled
26,291,618 UART: [rt] RT listening for mailbox commands...
26,293,521 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,323,451 UART: [rt]cmd =0x52564348, len=36
26,325,525 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,412 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,476,129 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,374 UART: [idev] ++
1,479,542 UART: [idev] CDI.KEYID = 6
1,479,902 UART: [idev] SUBJECT.KEYID = 7
1,480,326 UART: [idev] UDS.KEYID = 0
1,480,671 ready_for_fw is high
1,480,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,526 UART: [idev] Erasing UDS.KEYID = 0
1,505,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,362 UART: [idev] --
1,515,363 UART: [ldev] ++
1,515,531 UART: [ldev] CDI.KEYID = 6
1,515,894 UART: [ldev] SUBJECT.KEYID = 5
1,516,320 UART: [ldev] AUTHORITY.KEYID = 7
1,516,783 UART: [ldev] FE.KEYID = 1
1,521,993 UART: [ldev] Erasing FE.KEYID = 1
1,546,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,568 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,720 UART: [fwproc] Received command 0x46574c44
1,587,511 UART: [fwproc] Received Image of size 114448 bytes
2,887,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,976 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,333 >>> mbox cmd response: success
3,081,485 UART: [afmc] ++
3,081,653 UART: [afmc] CDI.KEYID = 6
3,082,015 UART: [afmc] SUBJECT.KEYID = 7
3,082,440 UART: [afmc] AUTHORITY.KEYID = 5
3,117,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,083 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,476 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,166 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,109 UART: [afmc] --
3,161,179 UART: [cold-reset] --
3,162,079 UART: [state] Locking Datavault
3,163,380 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,984 UART: [state] Locking ICCM
3,164,636 UART: [exit] Launching FMC @ 0x40000130
3,169,965 UART:
3,169,981 UART: Running Caliptra FMC ...
3,170,389 UART:
3,170,443 UART: [state] CFI Enabled
3,180,946 UART: [fht] FMC Alias Private Key: 7
3,289,235 UART: [art] Extend RT PCRs Done
3,289,663 UART: [art] Lock RT PCRs Done
3,291,275 UART: [art] Populate DV Done
3,299,680 UART: [fht] FMC Alias Private Key: 7
3,300,692 UART: [art] Derive CDI
3,300,972 UART: [art] Store in in slot 0x4
3,387,217 UART: [art] Derive Key Pair
3,387,577 UART: [art] Store priv key in slot 0x5
3,400,849 UART: [art] Derive Key Pair - Done
3,415,634 UART: [art] Signing Cert with AUTHO
3,416,114 UART: RITY.KEYID = 7
3,431,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,043 UART: [art] PUB.X = 135501392D0C0B67C45D6B6B489D27D99C701875746CDB7232F15F7C2A453777801059B0D3085A922C346048B5372196
3,438,783 UART: [art] PUB.Y = 4792C113DD366CD5AD5E2151DE5347FBCE7F572D14A878966B834E7CF127BC2129AA6E44FB80D249851A1371D26E440F
3,445,734 UART: [art] SIG.R = 09F330FD5DE2192EBD87DCA93AD1E6A53E8DC521B4ACD21C122DBA59AEB807C9AD246E4ED8210A31C70891EC93A74F90
3,452,512 UART: [art] SIG.S = 350DBC4982978A433948AB99096CE3F7FC5770768B821984C3AC5709DA32BE28D5BB501BD207733621B511BC4F76D1E0
3,476,429 UART: Caliptra RT
3,476,682 UART: [state] CFI Enabled
3,583,774 UART: [rt] RT listening for mailbox commands...
3,584,444 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,480 UART: [rt]cmd =0x52564348, len=36
3,615,768 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,385 ready_for_fw is high
1,362,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,573 >>> mbox cmd response: success
2,989,659 UART:
2,989,675 UART: Running Caliptra FMC ...
2,990,083 UART:
2,990,137 UART: [state] CFI Enabled
3,000,352 UART: [fht] FMC Alias Private Key: 7
3,108,181 UART: [art] Extend RT PCRs Done
3,108,609 UART: [art] Lock RT PCRs Done
3,110,523 UART: [art] Populate DV Done
3,118,536 UART: [fht] FMC Alias Private Key: 7
3,119,532 UART: [art] Derive CDI
3,119,812 UART: [art] Store in in slot 0x4
3,205,203 UART: [art] Derive Key Pair
3,205,563 UART: [art] Store priv key in slot 0x5
3,218,773 UART: [art] Derive Key Pair - Done
3,233,755 UART: [art] Signing Cert with AUTHO
3,234,235 UART: RITY.KEYID = 7
3,249,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,786 UART: [art] PUB.X = 827FDABDF511609275135B1D4FEFBDB696BBA4C35C60C5578EBC01FDDF3477694D5CC4676E732AD864F153B408A4523B
3,256,562 UART: [art] PUB.Y = 9478B09690CB0D9077FF9612A3394F887FB5A2F91E1200E6A9F2B4334B9C5C970BABB0117B76381623E11BAFA89C260B
3,263,483 UART: [art] SIG.R = 10529D5E2A14942DB1B77C7B4AA6F93167D47094AFD0C3AFC034F07C83D1F54C639F98022CA6B14AC4170F4A5522DE3F
3,270,255 UART: [art] SIG.S = C9C01DE709E2DDE311C44EF7FF983B9796C6392102671F6CADDBF2F210219AD9989B3346D5374B0F78D32BDB62CB74E6
3,294,095 UART: Caliptra RT
3,294,348 UART: [state] CFI Enabled
3,402,505 UART: [rt] RT listening for mailbox commands...
3,403,175 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,229 UART: [rt]cmd =0x52564348, len=36
3,434,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,764 UART: [kat] SHA2-256
882,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,810 UART: [kat] ++
886,962 UART: [kat] sha1
891,156 UART: [kat] SHA2-256
893,094 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,337 UART: [kat] HMAC-384Kdf
908,065 UART: [kat] LMS
1,476,261 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,490 UART: [fht] Storing FHT @ 0x50003400
1,480,443 UART: [idev] ++
1,480,611 UART: [idev] CDI.KEYID = 6
1,480,971 UART: [idev] SUBJECT.KEYID = 7
1,481,395 UART: [idev] UDS.KEYID = 0
1,481,740 ready_for_fw is high
1,481,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,391 UART: [idev] Erasing UDS.KEYID = 0
1,506,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,694 UART: [ldev] ++
1,515,862 UART: [ldev] CDI.KEYID = 6
1,516,225 UART: [ldev] SUBJECT.KEYID = 5
1,516,651 UART: [ldev] AUTHORITY.KEYID = 7
1,517,114 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,587,022 UART: [fwproc] Waiting for Commands...
1,587,781 UART: [fwproc] Received command 0x46574c44
1,588,572 UART: [fwproc] Received Image of size 114448 bytes
2,887,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,260 >>> mbox cmd response: success
3,081,366 UART: [afmc] ++
3,081,534 UART: [afmc] CDI.KEYID = 6
3,081,896 UART: [afmc] SUBJECT.KEYID = 7
3,082,321 UART: [afmc] AUTHORITY.KEYID = 5
3,118,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,796 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,189 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,879 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,678 UART: [afmc] --
3,161,588 UART: [cold-reset] --
3,162,216 UART: [state] Locking Datavault
3,163,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,925 UART: [state] Locking ICCM
3,164,355 UART: [exit] Launching FMC @ 0x40000130
3,169,684 UART:
3,169,700 UART: Running Caliptra FMC ...
3,170,108 UART:
3,170,251 UART: [state] CFI Enabled
3,180,542 UART: [fht] FMC Alias Private Key: 7
3,288,651 UART: [art] Extend RT PCRs Done
3,289,079 UART: [art] Lock RT PCRs Done
3,290,437 UART: [art] Populate DV Done
3,298,572 UART: [fht] FMC Alias Private Key: 7
3,299,662 UART: [art] Derive CDI
3,299,942 UART: [art] Store in in slot 0x4
3,385,861 UART: [art] Derive Key Pair
3,386,221 UART: [art] Store priv key in slot 0x5
3,399,641 UART: [art] Derive Key Pair - Done
3,414,302 UART: [art] Signing Cert with AUTHO
3,414,782 UART: RITY.KEYID = 7
3,430,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,831 UART: [art] PUB.X = D270540D266F1FF58E20FCC66F033ECAD8DE8179DA8E1DEDF8D0E9FAC485B0F639C18BC55928AA5D50817AFE2F440A7B
3,437,614 UART: [art] PUB.Y = 2511D4BA8FC6194D4DF284D905E27C5E9B64EAE8E168DE0F10501104BD4974C705AD5D3131A77E546E3595AD4F2EAA06
3,444,557 UART: [art] SIG.R = DE33C2590DF378C7DC5EBEC082C9DB5E4F818280D7FEFE621FA5F88A81EABE462390FE39F333982189B859BD8DFD6248
3,451,340 UART: [art] SIG.S = 5833A15249DAEB8B0432B2A94C184D84FE8B676A061951D6DA6FBA1C00E71154808C362DFDCE030F86C7A0D51CEC9ABE
3,474,785 UART: Caliptra RT
3,475,130 UART: [state] CFI Enabled
3,582,867 UART: [rt] RT listening for mailbox commands...
3,583,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,647 UART: [rt]cmd =0x52564348, len=36
3,614,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 ready_for_fw is high
1,362,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,832 >>> mbox cmd response: success
2,991,556 UART:
2,991,572 UART: Running Caliptra FMC ...
2,991,980 UART:
2,992,123 UART: [state] CFI Enabled
3,002,508 UART: [fht] FMC Alias Private Key: 7
3,111,029 UART: [art] Extend RT PCRs Done
3,111,457 UART: [art] Lock RT PCRs Done
3,112,957 UART: [art] Populate DV Done
3,121,152 UART: [fht] FMC Alias Private Key: 7
3,122,152 UART: [art] Derive CDI
3,122,432 UART: [art] Store in in slot 0x4
3,208,191 UART: [art] Derive Key Pair
3,208,551 UART: [art] Store priv key in slot 0x5
3,221,939 UART: [art] Derive Key Pair - Done
3,236,884 UART: [art] Signing Cert with AUTHO
3,237,364 UART: RITY.KEYID = 7
3,252,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,065 UART: [art] PUB.X = BE09797F5FF45E9B6B331DF3627F396B1AEADBDA4F852BD3ADD54D88755434BE9376D81ADA27EF0D498D97FF2160AC34
3,259,847 UART: [art] PUB.Y = 52E8794FC2223F4BC89C2210518D6842FB5532F8AB7474765401851B6855055D048358FD765E1C9A7B63AA7E65844846
3,266,774 UART: [art] SIG.R = E0D21FA2E1D468A0DBB26DA5AE797518F9667B0FEDC84356EDB17B39CD3F527A686CBDB4F38E4113B98361FD0641055D
3,273,549 UART: [art] SIG.S = F46107350A8BFA45803F0665A226F513DB781987F6E0ED293D08D17CFC3796D52E303686C10AD960E7D553DE7A66C4A0
3,297,409 UART: Caliptra RT
3,297,754 UART: [state] CFI Enabled
3,405,978 UART: [rt] RT listening for mailbox commands...
3,406,648 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,660 UART: [rt]cmd =0x52564348, len=36
3,438,136 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,568 UART: [kat] LMS
1,170,896 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,175,088 UART: [idev] ++
1,175,256 UART: [idev] CDI.KEYID = 6
1,175,616 UART: [idev] SUBJECT.KEYID = 7
1,176,040 UART: [idev] UDS.KEYID = 0
1,176,385 ready_for_fw is high
1,176,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,899 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,466 UART: [ldev] SUBJECT.KEYID = 5
1,211,892 UART: [ldev] AUTHORITY.KEYID = 7
1,212,355 UART: [ldev] FE.KEYID = 1
1,217,477 UART: [ldev] Erasing FE.KEYID = 1
1,244,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,035 UART: [ldev] --
1,283,542 UART: [fwproc] Wait for Commands...
1,284,294 UART: [fwproc] Recv command 0x46574c44
1,285,022 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,556 >>> mbox cmd response: success
2,778,670 UART: [afmc] ++
2,778,838 UART: [afmc] CDI.KEYID = 6
2,779,200 UART: [afmc] SUBJECT.KEYID = 7
2,779,625 UART: [afmc] AUTHORITY.KEYID = 5
2,816,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,473 UART: [afmc] --
2,859,591 UART: [cold-reset] --
2,860,295 UART: [state] Locking Datavault
2,861,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,978 UART: [state] Locking ICCM
2,862,524 UART: [exit] Launching FMC @ 0x40000130
2,867,853 UART:
2,867,869 UART: Running Caliptra FMC ...
2,868,277 UART:
2,868,331 UART: [state] CFI Enabled
2,878,694 UART: [fht] FMC Alias Private Key: 7
2,986,655 UART: [art] Extend RT PCRs Done
2,987,083 UART: [art] Lock RT PCRs Done
2,988,837 UART: [art] Populate DV Done
2,997,198 UART: [fht] FMC Alias Private Key: 7
2,998,154 UART: [art] Derive CDI
2,998,434 UART: [art] Store in in slot 0x4
3,083,751 UART: [art] Derive Key Pair
3,084,111 UART: [art] Store priv key in slot 0x5
3,097,095 UART: [art] Derive Key Pair - Done
3,111,569 UART: [art] Signing Cert with AUTHO
3,112,049 UART: RITY.KEYID = 7
3,126,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,746 UART: [art] PUB.X = C68055A54632C9016B1075E99EC7F6C0008896537740403266D51CCE1DD3EFEED66A32B1FB4008853FA52A0703CA8B5D
3,134,482 UART: [art] PUB.Y = B938B666B219157DE85E04E8FD14F5FD26694B0879BCE1827B24CC83742DCD51C7A121F62F99026275D6748EC608507B
3,141,418 UART: [art] SIG.R = 7BB9994DFF32D628962A4951013E11EC6449F99D46F3B4777488C4D15B2AA347824DF35F0AF6CF50C9DD9C64AAD341DF
3,148,190 UART: [art] SIG.S = 6408A3FC36D942835E92EF7816D12278BD777F765EBBF4C64C76FD501390289A81B8859028E9EC3CC1A0C7B92FB33748
3,171,800 UART: Caliptra RT
3,172,053 UART: [state] CFI Enabled
3,278,966 UART: [rt] RT listening for mailbox commands...
3,279,636 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,720 UART: [rt]cmd =0x52564348, len=36
3,311,118 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 ready_for_fw is high
1,059,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,003 >>> mbox cmd response: success
2,690,333 UART:
2,690,349 UART: Running Caliptra FMC ...
2,690,757 UART:
2,690,811 UART: [state] CFI Enabled
2,701,674 UART: [fht] FMC Alias Private Key: 7
2,809,557 UART: [art] Extend RT PCRs Done
2,809,985 UART: [art] Lock RT PCRs Done
2,811,327 UART: [art] Populate DV Done
2,819,266 UART: [fht] FMC Alias Private Key: 7
2,820,352 UART: [art] Derive CDI
2,820,632 UART: [art] Store in in slot 0x4
2,906,089 UART: [art] Derive Key Pair
2,906,449 UART: [art] Store priv key in slot 0x5
2,919,995 UART: [art] Derive Key Pair - Done
2,934,662 UART: [art] Signing Cert with AUTHO
2,935,142 UART: RITY.KEYID = 7
2,950,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,805 UART: [art] PUB.X = 99BFE3E84C23FB566EB373B1D69C40CBB464F1B33115AB10FF52F9AE8E16F876FB69244F4B68949AFA1562671AE5ABB9
2,957,589 UART: [art] PUB.Y = 878185A86507A3DBCA0EC77C8955136A9B66DC1B914DDFE5FA8243FD1A93F08B4EF236757125DCF4E67B8CFAF4CAB201
2,964,546 UART: [art] SIG.R = DEC6C9725B57673FFE39322F38BC8B383FC247611ECCDDFFD5FA4AC0E448EC58733337AC9C2EE64597A621AF9481710C
2,971,327 UART: [art] SIG.S = 3625238B3A8312152ECA8D075B90D8F30174811DC280ED76578FA6EA36538FF4A411CA018D74224A11BE2FB3EBFCE656
2,994,967 UART: Caliptra RT
2,995,220 UART: [state] CFI Enabled
3,103,451 UART: [rt] RT listening for mailbox commands...
3,104,121 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,187 UART: [rt]cmd =0x52564348, len=36
3,135,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,703 UART: [kat] LMS
1,171,031 UART: [kat] --
1,171,788 UART: [cold-reset] ++
1,172,282 UART: [fht] FHT @ 0x50003400
1,174,811 UART: [idev] ++
1,174,979 UART: [idev] CDI.KEYID = 6
1,175,339 UART: [idev] SUBJECT.KEYID = 7
1,175,763 UART: [idev] UDS.KEYID = 0
1,176,108 ready_for_fw is high
1,176,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,401 UART: [idev] Erasing UDS.KEYID = 0
1,200,940 UART: [idev] Sha1 KeyId Algorithm
1,209,532 UART: [idev] --
1,210,750 UART: [ldev] ++
1,210,918 UART: [ldev] CDI.KEYID = 6
1,211,281 UART: [ldev] SUBJECT.KEYID = 5
1,211,707 UART: [ldev] AUTHORITY.KEYID = 7
1,212,170 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,719 UART: [fwproc] Wait for Commands...
1,283,531 UART: [fwproc] Recv command 0x46574c44
1,284,259 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,455 >>> mbox cmd response: success
2,777,711 UART: [afmc] ++
2,777,879 UART: [afmc] CDI.KEYID = 6
2,778,241 UART: [afmc] SUBJECT.KEYID = 7
2,778,666 UART: [afmc] AUTHORITY.KEYID = 5
2,814,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,692 UART: [afmc] --
2,857,786 UART: [cold-reset] --
2,858,544 UART: [state] Locking Datavault
2,859,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,377 UART: [state] Locking ICCM
2,860,989 UART: [exit] Launching FMC @ 0x40000130
2,866,318 UART:
2,866,334 UART: Running Caliptra FMC ...
2,866,742 UART:
2,866,885 UART: [state] CFI Enabled
2,877,472 UART: [fht] FMC Alias Private Key: 7
2,985,805 UART: [art] Extend RT PCRs Done
2,986,233 UART: [art] Lock RT PCRs Done
2,987,949 UART: [art] Populate DV Done
2,996,242 UART: [fht] FMC Alias Private Key: 7
2,997,250 UART: [art] Derive CDI
2,997,530 UART: [art] Store in in slot 0x4
3,083,235 UART: [art] Derive Key Pair
3,083,595 UART: [art] Store priv key in slot 0x5
3,097,327 UART: [art] Derive Key Pair - Done
3,112,222 UART: [art] Signing Cert with AUTHO
3,112,702 UART: RITY.KEYID = 7
3,128,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,973 UART: [art] PUB.X = C51A0F71DF5B4C6AB53BCADBD19B14C3F7FE353DCF97241DD3BE522161278B7476D97D77970F7A21FEEA55C600BA9A60
3,135,733 UART: [art] PUB.Y = 90F21963ECB9867B9F45CBA135C38E3E08627053FF46BD664B5C6D129C76C79920BB975386DE098662481D2A964CFB30
3,142,675 UART: [art] SIG.R = 61E27CF95E89B61F1023A7427E7C1CD6B938098810DB6375D75ED054E4EF2BD12DAA7E34A0C51C2FC641CA578F8538BB
3,149,452 UART: [art] SIG.S = B86E3F70DF8E7859910FE5735BDEDC304F3BEF178F7405C558FC5FDCF6711F6666993E7A639F8EE0AAC982AFBF8B2787
3,173,569 UART: Caliptra RT
3,173,914 UART: [state] CFI Enabled
3,281,947 UART: [rt] RT listening for mailbox commands...
3,282,617 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,789 UART: [rt]cmd =0x52564348, len=36
3,313,995 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,854 ready_for_fw is high
1,060,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,042 >>> mbox cmd response: success
2,691,656 UART:
2,691,672 UART: Running Caliptra FMC ...
2,692,080 UART:
2,692,223 UART: [state] CFI Enabled
2,703,054 UART: [fht] FMC Alias Private Key: 7
2,810,671 UART: [art] Extend RT PCRs Done
2,811,099 UART: [art] Lock RT PCRs Done
2,812,493 UART: [art] Populate DV Done
2,820,540 UART: [fht] FMC Alias Private Key: 7
2,821,536 UART: [art] Derive CDI
2,821,816 UART: [art] Store in in slot 0x4
2,907,273 UART: [art] Derive Key Pair
2,907,633 UART: [art] Store priv key in slot 0x5
2,921,591 UART: [art] Derive Key Pair - Done
2,936,200 UART: [art] Signing Cert with AUTHO
2,936,680 UART: RITY.KEYID = 7
2,952,258 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,023 UART: [art] PUB.X = 2B0E4953067B81DD2DBEFBD0D2C6743A87B758A364819D0C0235530C681C03965663B932CF096703F6F04FE1D73B66FC
2,959,769 UART: [art] PUB.Y = C9C68F75497EC2B4887FBA9F700903BCAB5BE8D5B73513BD701039C4E87CA29F2E78C3AEE88E382D826AB2893EC8BC6F
2,966,729 UART: [art] SIG.R = 2914B11146533C25F11A65DC82FD796CF354BB67CDCB4FE97FA7AC4220B4D26638F12DD7E924C0425D29DC46DAED9A3E
2,973,513 UART: [art] SIG.S = DE2180152B9F321022FFD587B0DBE15FFFBC2DF7BE65EA31EE3F858CA0DCA1E5CFAC1320B312E49F56D6CBD5B0E48D4A
2,996,580 UART: Caliptra RT
2,996,925 UART: [state] CFI Enabled
3,104,714 UART: [rt] RT listening for mailbox commands...
3,105,384 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,222 UART: [rt]cmd =0x52564348, len=36
3,136,634 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 ready_for_fw is high
1,174,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,018 UART: [ldev] ++
1,208,186 UART: [ldev] CDI.KEYID = 6
1,208,550 UART: [ldev] SUBJECT.KEYID = 5
1,208,977 UART: [ldev] AUTHORITY.KEYID = 7
1,209,440 UART: [ldev] FE.KEYID = 1
1,214,272 UART: [ldev] Erasing FE.KEYID = 1
1,240,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,592 UART: [fwproc] Wait for Commands...
1,281,247 UART: [fwproc] Recv command 0x46574c44
1,281,980 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,578 >>> mbox cmd response: success
2,774,731 UART: [afmc] ++
2,774,899 UART: [afmc] CDI.KEYID = 6
2,775,262 UART: [afmc] SUBJECT.KEYID = 7
2,775,688 UART: [afmc] AUTHORITY.KEYID = 5
2,811,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,624 UART: [afmc] --
2,854,720 UART: [cold-reset] --
2,855,648 UART: [state] Locking Datavault
2,856,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,407 UART: [state] Locking ICCM
2,857,835 UART: [exit] Launching FMC @ 0x40000130
2,863,164 UART:
2,863,180 UART: Running Caliptra FMC ...
2,863,588 UART:
2,863,642 UART: [state] CFI Enabled
2,874,111 UART: [fht] FMC Alias Private Key: 7
2,982,570 UART: [art] Extend RT PCRs Done
2,982,998 UART: [art] Lock RT PCRs Done
2,984,366 UART: [art] Populate DV Done
2,992,381 UART: [fht] FMC Alias Private Key: 7
2,993,339 UART: [art] Derive CDI
2,993,619 UART: [art] Store in in slot 0x4
3,078,926 UART: [art] Derive Key Pair
3,079,286 UART: [art] Store priv key in slot 0x5
3,092,632 UART: [art] Derive Key Pair - Done
3,107,243 UART: [art] Signing Cert with AUTHO
3,107,723 UART: RITY.KEYID = 7
3,122,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,208 UART: [art] PUB.X = 660A365C0991A133C17412DFF64ACEBDA971824B6F32880C283B782F584B1ADD6945D8AB4D311ABC2ED77550ACB73C87
3,129,977 UART: [art] PUB.Y = BFBC2D1363D4B076B0A9416234B2A7CDCE8868BD004327A2AC3E2107DF5F34C5F3A3752A1F3868B9A20E414AF3F258A8
3,136,909 UART: [art] SIG.R = B9CA6A867641A26FA5DAFE339AA32A53A6AF0C96327D9B6B5E273C9AFD2DE3B8A812413F48FE5A16D19CD547609E7348
3,143,690 UART: [art] SIG.S = E4ABC16C8721FD0ECBDB85BEB1C6A49ECF89E9E1E0A336E58836E8C180FD79F7B3B99CEF01F0CF6B1BA26CE5B9AD8292
3,167,747 UART: Caliptra RT
3,168,000 UART: [state] CFI Enabled
3,275,324 UART: [rt] RT listening for mailbox commands...
3,275,994 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,030 UART: [rt]cmd =0x52564348, len=36
3,307,490 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,420 ready_for_fw is high
1,056,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,260 >>> mbox cmd response: success
2,684,056 UART:
2,684,072 UART: Running Caliptra FMC ...
2,684,480 UART:
2,684,534 UART: [state] CFI Enabled
2,695,073 UART: [fht] FMC Alias Private Key: 7
2,803,126 UART: [art] Extend RT PCRs Done
2,803,554 UART: [art] Lock RT PCRs Done
2,804,948 UART: [art] Populate DV Done
2,813,455 UART: [fht] FMC Alias Private Key: 7
2,814,477 UART: [art] Derive CDI
2,814,757 UART: [art] Store in in slot 0x4
2,900,402 UART: [art] Derive Key Pair
2,900,762 UART: [art] Store priv key in slot 0x5
2,913,712 UART: [art] Derive Key Pair - Done
2,928,759 UART: [art] Signing Cert with AUTHO
2,929,239 UART: RITY.KEYID = 7
2,944,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,036 UART: [art] PUB.X = EEE65ABA13A1E1F0915268BF68F86BF750000AE0F21F7098314837FFE4C2F5B9630826E868D47ADE9CD9ECFDFF07562F
2,951,789 UART: [art] PUB.Y = F2DA788962255DA222EFC824B1370276E07FD1A6538CC56A6FBA84CEBFAB3ED950126F53B924B9DF7EC87B6FCD305F10
2,958,752 UART: [art] SIG.R = E8A490B45B4AC01F9D25E3368E20E00DBBAB196B5827AED6A655E5A8AF213CACA680B93BA09D5C0E186FD2A429E475D8
2,965,534 UART: [art] SIG.S = C80F583F2FE131D61BC9B3BA05CC3DFA7482419DB372C07EEFD888A755335CC0B77575BD293AB232065B325E70D8B5E4
2,989,322 UART: Caliptra RT
2,989,575 UART: [state] CFI Enabled
3,097,353 UART: [rt] RT listening for mailbox commands...
3,098,023 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,077 UART: [rt]cmd =0x52564348, len=36
3,129,477 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,958 UART: [idev] ++
1,173,126 UART: [idev] CDI.KEYID = 6
1,173,487 UART: [idev] SUBJECT.KEYID = 7
1,173,912 UART: [idev] UDS.KEYID = 0
1,174,258 ready_for_fw is high
1,174,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,316 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,715 UART: [fwproc] Wait for Commands...
1,282,390 UART: [fwproc] Recv command 0x46574c44
1,283,123 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,563 >>> mbox cmd response: success
2,774,756 UART: [afmc] ++
2,774,924 UART: [afmc] CDI.KEYID = 6
2,775,287 UART: [afmc] SUBJECT.KEYID = 7
2,775,713 UART: [afmc] AUTHORITY.KEYID = 5
2,810,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,661 UART: [afmc] --
2,854,675 UART: [cold-reset] --
2,855,643 UART: [state] Locking Datavault
2,856,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,462 UART: [state] Locking ICCM
2,858,136 UART: [exit] Launching FMC @ 0x40000130
2,863,465 UART:
2,863,481 UART: Running Caliptra FMC ...
2,863,889 UART:
2,864,032 UART: [state] CFI Enabled
2,874,971 UART: [fht] FMC Alias Private Key: 7
2,982,730 UART: [art] Extend RT PCRs Done
2,983,158 UART: [art] Lock RT PCRs Done
2,984,690 UART: [art] Populate DV Done
2,993,023 UART: [fht] FMC Alias Private Key: 7
2,994,191 UART: [art] Derive CDI
2,994,471 UART: [art] Store in in slot 0x4
3,080,166 UART: [art] Derive Key Pair
3,080,526 UART: [art] Store priv key in slot 0x5
3,093,520 UART: [art] Derive Key Pair - Done
3,108,267 UART: [art] Signing Cert with AUTHO
3,108,747 UART: RITY.KEYID = 7
3,123,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,536 UART: [art] PUB.X = 36E50CA1E991AD07EA8216E0F2FE59EAC5FAF93DC9AF60D7D24012470089402B840A73D8CD1222FF97E3B159AD6F3FD8
3,131,289 UART: [art] PUB.Y = DC57893E2F66A70161553A45E4816F683923A4872E7658BCF2E9B16E9BDBA5B6C967394EEF0D625AE263CF7109A13920
3,138,230 UART: [art] SIG.R = 557F9AC894243EA6CA198BC44026E0D600DB8446371E4A387A0906448EA070CD8F3871CC14A55F2F2FDBA71E677B8A3D
3,144,978 UART: [art] SIG.S = 0B351404F376AF52B404B4CD69FE5A327D1AE40CE9C7D7108B57F7D67300CACC6A3557FCD68194812C7BD560694974DD
3,168,713 UART: Caliptra RT
3,169,058 UART: [state] CFI Enabled
3,276,659 UART: [rt] RT listening for mailbox commands...
3,277,329 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,637 UART: [rt]cmd =0x52564348, len=36
3,308,941 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,289 ready_for_fw is high
1,057,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,161 >>> mbox cmd response: success
2,688,243 UART:
2,688,259 UART: Running Caliptra FMC ...
2,688,667 UART:
2,688,810 UART: [state] CFI Enabled
2,699,243 UART: [fht] FMC Alias Private Key: 7
2,806,628 UART: [art] Extend RT PCRs Done
2,807,056 UART: [art] Lock RT PCRs Done
2,808,456 UART: [art] Populate DV Done
2,816,571 UART: [fht] FMC Alias Private Key: 7
2,817,705 UART: [art] Derive CDI
2,817,985 UART: [art] Store in in slot 0x4
2,903,938 UART: [art] Derive Key Pair
2,904,298 UART: [art] Store priv key in slot 0x5
2,917,436 UART: [art] Derive Key Pair - Done
2,932,225 UART: [art] Signing Cert with AUTHO
2,932,705 UART: RITY.KEYID = 7
2,948,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,822 UART: [art] PUB.X = 18DE844CF0AFEE27F6AF0D88AB7ACC88DF87AE95EC510856FDC00F9DE3BD7E56642AED7E02FDD6158A392620699A9926
2,955,600 UART: [art] PUB.Y = F6E0E272998F8BB566841B30B5946636533D4BB9AF465B36F9E37362A68822CE8CB44E308D0B883EEDA72C11FFAA00BF
2,962,533 UART: [art] SIG.R = BDCE8D1DBE82252AA0492D71E4D738E53DE7CCD845D8F607281DA1E48E54D48F4E726FA9AB7AE76A005F363B13BF360B
2,969,293 UART: [art] SIG.S = 064AE8554B2FF460FABBE890D151AE1A4407BDE764071D0AC72D74CE31D4C70063CC7BDE7A6F4617137E7430859016C6
2,993,118 UART: Caliptra RT
2,993,463 UART: [state] CFI Enabled
3,101,592 UART: [rt] RT listening for mailbox commands...
3,102,262 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,248 UART: [rt]cmd =0x52564348, len=36
3,133,424 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,040 UART:
192,412 UART: Running Caliptra ROM ...
193,548 UART:
193,700 UART: [state] CFI Enabled
263,245 UART: [state] LifecycleState = Unprovisioned
265,226 UART: [state] DebugLocked = No
267,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,762 UART: [kat] SHA2-256
441,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,955 UART: [kat] ++
452,523 UART: [kat] sha1
464,461 UART: [kat] SHA2-256
467,119 UART: [kat] SHA2-384
474,032 UART: [kat] SHA2-512-ACC
476,405 UART: [kat] ECC-384
2,766,824 UART: [kat] HMAC-384Kdf
2,778,848 UART: [kat] LMS
3,969,119 UART: [kat] --
3,972,921 UART: [cold-reset] ++
3,975,494 UART: [fht] Storing FHT @ 0x50003400
3,987,110 UART: [idev] ++
3,987,671 UART: [idev] CDI.KEYID = 6
3,988,625 UART: [idev] SUBJECT.KEYID = 7
3,989,868 UART: [idev] UDS.KEYID = 0
3,990,829 ready_for_fw is high
3,991,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,642 UART: [idev] Erasing UDS.KEYID = 0
7,324,815 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,893 UART: [idev] --
7,350,504 UART: [ldev] ++
7,351,069 UART: [ldev] CDI.KEYID = 6
7,352,088 UART: [ldev] SUBJECT.KEYID = 5
7,353,255 UART: [ldev] AUTHORITY.KEYID = 7
7,354,489 UART: [ldev] FE.KEYID = 1
7,399,856 UART: [ldev] Erasing FE.KEYID = 1
10,732,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,510 UART: [ldev] --
13,093,677 UART: [fwproc] Waiting for Commands...
13,096,441 UART: [fwproc] Received command 0x46574c44
13,098,632 UART: [fwproc] Received Image of size 114124 bytes
17,144,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,219,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,288,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,605,892 >>> mbox cmd response: success
17,609,275 UART: [afmc] ++
17,609,869 UART: [afmc] CDI.KEYID = 6
17,610,814 UART: [afmc] SUBJECT.KEYID = 7
17,612,026 UART: [afmc] AUTHORITY.KEYID = 5
20,981,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,528 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,933 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,314,755 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,177 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,471 UART: [afmc] --
23,352,467 UART: [cold-reset] --
23,356,972 UART: [state] Locking Datavault
23,363,298 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,046 UART: [state] Locking ICCM
23,367,712 UART: [exit] Launching FMC @ 0x40000130
23,376,100 UART:
23,376,371 UART: Running Caliptra FMC ...
23,377,401 UART:
23,377,554 UART: [state] CFI Enabled
23,442,056 UART: [fht] FMC Alias Private Key: 7
25,780,439 UART: [art] Extend RT PCRs Done
25,781,662 UART: [art] Lock RT PCRs Done
25,783,418 UART: [art] Populate DV Done
25,788,610 UART: [fht] FMC Alias Private Key: 7
25,790,147 UART: [art] Derive CDI
25,790,900 UART: [art] Store in in slot 0x4
25,850,590 UART: [art] Derive Key Pair
25,851,589 UART: [art] Store priv key in slot 0x5
29,144,546 UART: [art] Derive Key Pair - Done
29,157,695 UART: [art] Signing Cert with AUTHO
29,159,004 UART: RITY.KEYID = 7
31,446,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,529 UART: [art] PUB.X = FB56A33FE130DA12515AEB1C81BFBE7A606E17677C2A5986C5CB5483DC685CFE96087D2EECF88EAA86A331A0F43734EB
31,454,962 UART: [art] PUB.Y = 05C040F9E53D7FC9DCD692A62043F626CE7F65BDBE043FF9531FEF502BA8F43644A624E360C728CB2A9DF4ED37DB427D
31,462,078 UART: [art] SIG.R = 974923643C1EFE7552452400EF377EB84740E45AB91C9715B6450B90387FD0226146C73D60C980A0D0C81B80132FBBF3
31,469,429 UART: [art] SIG.S = EAF626DBA21816725A139F2A4F2635B101ADAE0D8B4827959BE8671289F4F46D6683148340E3CB25C0ADB06D851A5292
32,774,566 UART: Caliptra RT
32,775,280 UART: [state] CFI Enabled
32,936,496 UART: [rt] RT listening for mailbox commands...
32,938,381 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,968,847 UART: [rt]cmd =0x53574545, len=84
32,970,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,805,051 ready_for_fw is high
3,805,442 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,863,963 >>> mbox cmd response: success
23,560,917 UART:
23,561,366 UART: Running Caliptra FMC ...
23,562,477 UART:
23,562,631 UART: [state] CFI Enabled
23,632,540 UART: [fht] FMC Alias Private Key: 7
25,970,187 UART: [art] Extend RT PCRs Done
25,971,414 UART: [art] Lock RT PCRs Done
25,972,858 UART: [art] Populate DV Done
25,978,281 UART: [fht] FMC Alias Private Key: 7
25,979,932 UART: [art] Derive CDI
25,980,672 UART: [art] Store in in slot 0x4
26,040,688 UART: [art] Derive Key Pair
26,041,734 UART: [art] Store priv key in slot 0x5
29,333,554 UART: [art] Derive Key Pair - Done
29,346,389 UART: [art] Signing Cert with AUTHO
29,347,701 UART: RITY.KEYID = 7
31,636,104 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,604 UART: [art] PUB.X = 21BC9309EFB0CF2A9358BE96FBF44B07075C86FE67469BE0DEE593BB457455DF22DAC1E28D9963AD481916D741E94626
31,644,857 UART: [art] PUB.Y = 7658331EE5269F27DBD315054CB2CE00F1E26684F18047574793714055CECC7E7BA77B7AF3C6726B716ADB495F994D4D
31,652,102 UART: [art] SIG.R = 0EC48B6C809AA9B54394B6D6B6E0AF2BE3DB5E32886B1AF4CCE178934D5B84534ADF61CE004949CA170BD4B090914A5C
31,659,497 UART: [art] SIG.S = B6C1CA73B4B214F632CC59B7BDE00DE675C3CFA3E4B2D6B94C06C7E39F51DA47181655F5FB4308272F3FC0D17773C0E7
32,964,633 UART: Caliptra RT
32,965,347 UART: [state] CFI Enabled
33,128,450 UART: [rt] RT listening for mailbox commands...
33,130,336 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,161,090 UART: [rt]cmd =0x53574545, len=84
33,162,832 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,447 UART:
192,809 UART: Running Caliptra ROM ...
194,016 UART:
603,609 UART: [state] CFI Enabled
620,330 UART: [state] LifecycleState = Unprovisioned
622,281 UART: [state] DebugLocked = No
624,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,745 UART: [kat] SHA2-256
798,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,014 UART: [kat] ++
809,462 UART: [kat] sha1
820,468 UART: [kat] SHA2-256
823,182 UART: [kat] SHA2-384
829,391 UART: [kat] SHA2-512-ACC
831,760 UART: [kat] ECC-384
3,117,023 UART: [kat] HMAC-384Kdf
3,128,337 UART: [kat] LMS
4,318,500 UART: [kat] --
4,321,028 UART: [cold-reset] ++
4,322,391 UART: [fht] Storing FHT @ 0x50003400
4,334,149 UART: [idev] ++
4,334,708 UART: [idev] CDI.KEYID = 6
4,335,737 UART: [idev] SUBJECT.KEYID = 7
4,336,910 UART: [idev] UDS.KEYID = 0
4,337,890 ready_for_fw is high
4,338,072 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,389 UART: [idev] Erasing UDS.KEYID = 0
7,627,291 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,455 UART: [idev] --
7,651,903 UART: [ldev] ++
7,652,525 UART: [ldev] CDI.KEYID = 6
7,653,501 UART: [ldev] SUBJECT.KEYID = 5
7,654,658 UART: [ldev] AUTHORITY.KEYID = 7
7,655,943 UART: [ldev] FE.KEYID = 1
7,668,665 UART: [ldev] Erasing FE.KEYID = 1
10,962,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,877 UART: [ldev] --
13,322,597 UART: [fwproc] Waiting for Commands...
13,324,743 UART: [fwproc] Received command 0x46574c44
13,326,919 UART: [fwproc] Received Image of size 114124 bytes
17,375,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,487 >>> mbox cmd response: success
17,838,595 UART: [afmc] ++
17,839,190 UART: [afmc] CDI.KEYID = 6
17,840,153 UART: [afmc] SUBJECT.KEYID = 7
17,841,364 UART: [afmc] AUTHORITY.KEYID = 5
21,154,475 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,092 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,365 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,749 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,572 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,016 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,837 UART: [afmc] --
23,521,171 UART: [cold-reset] --
23,523,356 UART: [state] Locking Datavault
23,531,462 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,156 UART: [state] Locking ICCM
23,536,025 UART: [exit] Launching FMC @ 0x40000130
23,544,373 UART:
23,544,606 UART: Running Caliptra FMC ...
23,545,705 UART:
23,545,859 UART: [state] CFI Enabled
23,553,845 UART: [fht] FMC Alias Private Key: 7
25,884,595 UART: [art] Extend RT PCRs Done
25,885,812 UART: [art] Lock RT PCRs Done
25,887,254 UART: [art] Populate DV Done
25,892,773 UART: [fht] FMC Alias Private Key: 7
25,894,465 UART: [art] Derive CDI
25,895,273 UART: [art] Store in in slot 0x4
25,937,651 UART: [art] Derive Key Pair
25,938,693 UART: [art] Store priv key in slot 0x5
29,180,857 UART: [art] Derive Key Pair - Done
29,193,851 UART: [art] Signing Cert with AUTHO
29,195,200 UART: RITY.KEYID = 7
31,474,309 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,818 UART: [art] PUB.X = 14E0172C337555E6010F3F1E7A8FCFF508877A8EE2A5700B425DBFFA408F52185C9201043DD109D089147F75F5D4D1F2
31,483,060 UART: [art] PUB.Y = 719E1054AA78D1A04FD646F8CBDA22C41C2182765E1075C090A1F31CA74F13A1573A49588FBC6386333A9D381B2D0D8E
31,490,332 UART: [art] SIG.R = 646E7F61894F8752EC8DA0959EA23CD8F82602B52465CD9F63FA99EEE5AAF3CDE3D3A4F14D8B55F230B8B8CAA8A36C67
31,497,686 UART: [art] SIG.S = F5884148CE4FF17620F3AC9B82C8BE568B3525498C27B10150C08AAE387269DBD3A98BF94FEADA681ECAE8B22E0038A2
32,803,299 UART: Caliptra RT
32,804,012 UART: [state] CFI Enabled
32,921,399 UART: [rt] RT listening for mailbox commands...
32,923,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,953,745 UART: [rt]cmd =0x53574545, len=84
32,955,481 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
4,125,405 ready_for_fw is high
4,126,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,047,657 >>> mbox cmd response: success
23,695,466 UART:
23,695,866 UART: Running Caliptra FMC ...
23,696,965 UART:
23,697,107 UART: [state] CFI Enabled
23,705,115 UART: [fht] FMC Alias Private Key: 7
26,036,158 UART: [art] Extend RT PCRs Done
26,037,391 UART: [art] Lock RT PCRs Done
26,039,028 UART: [art] Populate DV Done
26,044,137 UART: [fht] FMC Alias Private Key: 7
26,045,671 UART: [art] Derive CDI
26,046,439 UART: [art] Store in in slot 0x4
26,089,197 UART: [art] Derive Key Pair
26,090,221 UART: [art] Store priv key in slot 0x5
29,332,053 UART: [art] Derive Key Pair - Done
29,345,063 UART: [art] Signing Cert with AUTHO
29,346,381 UART: RITY.KEYID = 7
31,625,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,165 UART: [art] PUB.X = B664A270389CFD1EFA3F847E860DFD2CFA4CDA9059924D5C121C9B98F27E2A624E066789583478FDAD5E4BCEE764B90A
31,634,433 UART: [art] PUB.Y = 3DD541815B534DA9C15C51688987644ABFBCAE934576CA3C5FD8980815D76654B92725032FFF1A052314EC8DFDAB8EEE
31,641,681 UART: [art] SIG.R = BDD8A2724E8216F408F6AA374D5465752B4EBAEB7B0345E071A794685122F0658F676B14EDD97779A738A7E067D0614E
31,649,051 UART: [art] SIG.S = D84B72FC44E8BB673D8459E13C9D188A8A01B01A428240898C9906A62FA8ADC65563A6FD2B49D21CAE0473D651C5F1F8
32,953,685 UART: Caliptra RT
32,954,394 UART: [state] CFI Enabled
33,071,405 UART: [rt] RT listening for mailbox commands...
33,073,296 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,103,789 UART: [rt]cmd =0x53574545, len=84
33,105,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,148 UART:
192,509 UART: Running Caliptra ROM ...
193,688 UART:
193,844 UART: [state] CFI Enabled
265,045 UART: [state] LifecycleState = Unprovisioned
266,889 UART: [state] DebugLocked = No
268,710 UART: [state] WD Timer not started. Device not locked for debugging
273,025 UART: [kat] SHA2-256
452,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,692 UART: [kat] ++
464,224 UART: [kat] sha1
474,321 UART: [kat] SHA2-256
477,334 UART: [kat] SHA2-384
483,677 UART: [kat] SHA2-512-ACC
486,609 UART: [kat] ECC-384
2,950,163 UART: [kat] HMAC-384Kdf
2,971,995 UART: [kat] LMS
3,501,445 UART: [kat] --
3,506,525 UART: [cold-reset] ++
3,509,098 UART: [fht] FHT @ 0x50003400
3,520,926 UART: [idev] ++
3,521,485 UART: [idev] CDI.KEYID = 6
3,522,366 UART: [idev] SUBJECT.KEYID = 7
3,523,556 UART: [idev] UDS.KEYID = 0
3,524,543 ready_for_fw is high
3,524,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,881 UART: [idev] Erasing UDS.KEYID = 0
6,024,808 UART: [idev] Sha1 KeyId Algorithm
6,047,936 UART: [idev] --
6,051,880 UART: [ldev] ++
6,052,485 UART: [ldev] CDI.KEYID = 6
6,053,405 UART: [ldev] SUBJECT.KEYID = 5
6,054,569 UART: [ldev] AUTHORITY.KEYID = 7
6,055,808 UART: [ldev] FE.KEYID = 1
6,100,999 UART: [ldev] Erasing FE.KEYID = 1
8,603,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,840 UART: [ldev] --
10,414,084 UART: [fwproc] Wait for Commands...
10,417,150 UART: [fwproc] Recv command 0x46574c44
10,419,240 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,696 >>> mbox cmd response: success
14,291,718 UART: [afmc] ++
14,292,338 UART: [afmc] CDI.KEYID = 6
14,293,233 UART: [afmc] SUBJECT.KEYID = 7
14,294,394 UART: [afmc] AUTHORITY.KEYID = 5
16,832,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,591,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,607,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,623,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,436 UART: [afmc] --
18,648,758 UART: [cold-reset] --
18,653,219 UART: [state] Locking Datavault
18,658,300 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,943 UART: [state] Locking ICCM
18,661,857 UART: [exit] Launching FMC @ 0x40000130
18,670,254 UART:
18,670,497 UART: Running Caliptra FMC ...
18,671,599 UART:
18,671,759 UART: [state] CFI Enabled
18,731,964 UART: [fht] FMC Alias Private Key: 7
20,496,097 UART: [art] Extend RT PCRs Done
20,497,322 UART: [art] Lock RT PCRs Done
20,498,732 UART: [art] Populate DV Done
20,503,984 UART: [fht] FMC Alias Private Key: 7
20,505,574 UART: [art] Derive CDI
20,506,386 UART: [art] Store in in slot 0x4
20,564,024 UART: [art] Derive Key Pair
20,565,065 UART: [art] Store priv key in slot 0x5
23,028,037 UART: [art] Derive Key Pair - Done
23,040,978 UART: [art] Signing Cert with AUTHO
23,042,304 UART: RITY.KEYID = 7
24,753,769 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,268 UART: [art] PUB.X = CACCC87A34DA496206860264F0C4675C506A1996C418DC8E06122C505F11691A65C61CFCDB63FB64BAEC33A780884F17
24,762,566 UART: [art] PUB.Y = F50C4872328DC717D83869A17E67C3E335DA98B8DD25D3959E876FAE9AF518790D54D6B2A17C68E70A9E4A9608F5CD2B
24,769,791 UART: [art] SIG.R = D0DE7DDB5A0CD9440E294992551C150FC3D99A25F1462C00F80A6271046EC9052A8D73D6AF537A19FD23AB3A3DF5EA83
24,777,223 UART: [art] SIG.S = F7AD8F6674507F783018CF26E31A9A8FEA43E96E71AA4FEC8B1897B982ED3B098AAE6F07CA54B770E3070BCC92E4DDDB
25,756,549 UART: Caliptra RT
25,757,244 UART: [state] CFI Enabled
25,921,613 UART: [rt] RT listening for mailbox commands...
25,923,490 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,954,526 UART: [rt]cmd =0x53574545, len=84
25,956,479 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,360,457 ready_for_fw is high
3,360,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,382 >>> mbox cmd response: success
18,346,183 UART:
18,346,572 UART: Running Caliptra FMC ...
18,347,771 UART:
18,347,946 UART: [state] CFI Enabled
18,411,027 UART: [fht] FMC Alias Private Key: 7
20,175,018 UART: [art] Extend RT PCRs Done
20,176,227 UART: [art] Lock RT PCRs Done
20,178,018 UART: [art] Populate DV Done
20,183,373 UART: [fht] FMC Alias Private Key: 7
20,184,915 UART: [art] Derive CDI
20,185,729 UART: [art] Store in in slot 0x4
20,242,989 UART: [art] Derive Key Pair
20,244,022 UART: [art] Store priv key in slot 0x5
22,707,253 UART: [art] Derive Key Pair - Done
22,720,191 UART: [art] Signing Cert with AUTHO
22,721,523 UART: RITY.KEYID = 7
24,433,382 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,887 UART: [art] PUB.X = D5584B780ABEEE5E2168A3FE4418AC90D6AA113BD30C9A8B2EF3AB82876952E64678AC7A07D823773085CCE817AFD002
24,442,144 UART: [art] PUB.Y = 8A3A9D994121DBD04EBBE81C1480211ABA3651E93A5C3042D16A60219ED203DFC616397E5D5E04DF0493324B2E57059E
24,449,419 UART: [art] SIG.R = BDC4DE41BF8564844C62E678437B562CF40EC8EAC4FF4B50B3888ACBC897F3A132A48659008DA95B05CBAA15083471D7
24,456,820 UART: [art] SIG.S = 2EAB7785DB79C0A9AA22622962D6251D3EAD67D20E438A596B5CCBC1D4BE12AF27B650BF43FB99B535BDFC217C599CFD
25,435,766 UART: Caliptra RT
25,436,477 UART: [state] CFI Enabled
25,601,767 UART: [rt] RT listening for mailbox commands...
25,603,667 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,634,755 UART: [rt]cmd =0x53574545, len=84
25,636,660 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,350 UART:
192,731 UART: Running Caliptra ROM ...
193,907 UART:
603,402 UART: [state] CFI Enabled
618,197 UART: [state] LifecycleState = Unprovisioned
620,072 UART: [state] DebugLocked = No
621,458 UART: [state] WD Timer not started. Device not locked for debugging
624,842 UART: [kat] SHA2-256
804,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,538 UART: [kat] ++
816,136 UART: [kat] sha1
827,457 UART: [kat] SHA2-256
830,498 UART: [kat] SHA2-384
836,486 UART: [kat] SHA2-512-ACC
839,425 UART: [kat] ECC-384
3,282,830 UART: [kat] HMAC-384Kdf
3,293,852 UART: [kat] LMS
3,823,341 UART: [kat] --
3,828,841 UART: [cold-reset] ++
3,830,979 UART: [fht] FHT @ 0x50003400
3,841,587 UART: [idev] ++
3,842,148 UART: [idev] CDI.KEYID = 6
3,843,019 UART: [idev] SUBJECT.KEYID = 7
3,844,257 UART: [idev] UDS.KEYID = 0
3,845,170 ready_for_fw is high
3,845,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,064 UART: [idev] Erasing UDS.KEYID = 0
6,318,113 UART: [idev] Sha1 KeyId Algorithm
6,341,180 UART: [idev] --
6,344,794 UART: [ldev] ++
6,345,398 UART: [ldev] CDI.KEYID = 6
6,346,312 UART: [ldev] SUBJECT.KEYID = 5
6,347,464 UART: [ldev] AUTHORITY.KEYID = 7
6,348,686 UART: [ldev] FE.KEYID = 1
6,358,730 UART: [ldev] Erasing FE.KEYID = 1
8,834,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,713 UART: [ldev] --
10,628,866 UART: [fwproc] Wait for Commands...
10,631,002 UART: [fwproc] Recv command 0x46574c44
10,633,088 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,503,799 >>> mbox cmd response: success
14,508,782 UART: [afmc] ++
14,509,370 UART: [afmc] CDI.KEYID = 6
14,510,276 UART: [afmc] SUBJECT.KEYID = 7
14,511,428 UART: [afmc] AUTHORITY.KEYID = 5
17,010,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,297 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,285 UART: [afmc] --
18,808,923 UART: [cold-reset] --
18,811,372 UART: [state] Locking Datavault
18,817,637 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,329 UART: [state] Locking ICCM
18,820,336 UART: [exit] Launching FMC @ 0x40000130
18,828,787 UART:
18,829,054 UART: Running Caliptra FMC ...
18,830,157 UART:
18,830,309 UART: [state] CFI Enabled
18,838,297 UART: [fht] FMC Alias Private Key: 7
20,595,823 UART: [art] Extend RT PCRs Done
20,597,047 UART: [art] Lock RT PCRs Done
20,598,696 UART: [art] Populate DV Done
20,604,447 UART: [fht] FMC Alias Private Key: 7
20,605,978 UART: [art] Derive CDI
20,606,787 UART: [art] Store in in slot 0x4
20,649,316 UART: [art] Derive Key Pair
20,650,309 UART: [art] Store priv key in slot 0x5
23,076,744 UART: [art] Derive Key Pair - Done
23,089,789 UART: [art] Signing Cert with AUTHO
23,091,094 UART: RITY.KEYID = 7
24,797,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,524 UART: [art] PUB.X = F53831BFF9178E02213DB8264F4AAB61CD2BF001A1CCF7A60A44800EED6B4DF51F12095862906C0E7DCA92FD30938DD2
24,805,800 UART: [art] PUB.Y = 14BD6372CFF854421FA9858A61AEF23641F1E712DA60BE719FC1C169D8026EEDF4637BD33CFA6C25800DE22AA8548378
24,813,125 UART: [art] SIG.R = E0DC47031598A92BA2D17DECAA3FC7E61AE5240FD8D79BF73508E2E837199A94DE9EFAE894E15192575F9F53D24FADAB
24,820,499 UART: [art] SIG.S = 5F2676012019E39E9AE109834494C8075CE85DBF162EBCBE3B17EC0D1F10B76FD0EB9BD24150FB1C03CD1C1A719DF4F4
25,799,319 UART: Caliptra RT
25,800,035 UART: [state] CFI Enabled
25,917,262 UART: [rt] RT listening for mailbox commands...
25,919,150 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,949,727 UART: [rt]cmd =0x53574545, len=84
25,951,676 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,696,979 ready_for_fw is high
3,697,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,246 >>> mbox cmd response: success
18,511,811 UART:
18,512,197 UART: Running Caliptra FMC ...
18,513,385 UART:
18,513,543 UART: [state] CFI Enabled
18,521,440 UART: [fht] FMC Alias Private Key: 7
20,278,040 UART: [art] Extend RT PCRs Done
20,279,261 UART: [art] Lock RT PCRs Done
20,280,948 UART: [art] Populate DV Done
20,286,357 UART: [fht] FMC Alias Private Key: 7
20,287,892 UART: [art] Derive CDI
20,288,702 UART: [art] Store in in slot 0x4
20,331,123 UART: [art] Derive Key Pair
20,332,139 UART: [art] Store priv key in slot 0x5
22,758,891 UART: [art] Derive Key Pair - Done
22,771,722 UART: [art] Signing Cert with AUTHO
22,773,023 UART: RITY.KEYID = 7
24,478,476 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,982 UART: [art] PUB.X = B8A7EA30685F98861ECA53487A44B41565386ACB3789539FAF6708E2E7AD60D4B64193D01858C53A72B5EB2BE071EC63
24,487,220 UART: [art] PUB.Y = 309A83A5216DED0059462E77AB31FAE88DDD385AFC7D8FC196C4FF2F12C56F3DB0B188B724926803A7BD2FC2A35064DB
24,494,517 UART: [art] SIG.R = 10D2FBE01FEAFC41EA265CDB2C88990FE1E9C973212AD0D3CA990CF438810CC8A87F7635E6704AB1E1C9F447E1C0EFD8
24,501,961 UART: [art] SIG.S = BF08CF06DDE61D139EB274EBB2EDD4C14546E3F041B2625FF00CCC770A74B06079B071E53384439A40C13615333D05DC
25,480,653 UART: Caliptra RT
25,481,367 UART: [state] CFI Enabled
25,598,327 UART: [rt] RT listening for mailbox commands...
25,600,213 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,630,571 UART: [rt]cmd =0x53574545, len=84
25,632,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,200 UART:
192,546 UART: Running Caliptra ROM ...
193,751 UART:
193,901 UART: [state] CFI Enabled
263,996 UART: [state] LifecycleState = Unprovisioned
266,348 UART: [state] DebugLocked = No
268,310 UART: [state] WD Timer not started. Device not locked for debugging
273,047 UART: [kat] SHA2-256
462,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,702 UART: [kat] ++
474,154 UART: [kat] sha1
485,951 UART: [kat] SHA2-256
488,963 UART: [kat] SHA2-384
495,165 UART: [kat] SHA2-512-ACC
497,740 UART: [kat] ECC-384
2,947,274 UART: [kat] HMAC-384Kdf
2,970,034 UART: [kat] LMS
3,501,798 UART: [kat] --
3,504,798 UART: [cold-reset] ++
3,506,369 UART: [fht] FHT @ 0x50003400
3,517,792 UART: [idev] ++
3,518,499 UART: [idev] CDI.KEYID = 6
3,519,481 UART: [idev] SUBJECT.KEYID = 7
3,520,650 UART: [idev] UDS.KEYID = 0
3,521,589 ready_for_fw is high
3,521,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,739 UART: [idev] Erasing UDS.KEYID = 0
6,025,963 UART: [idev] Sha1 KeyId Algorithm
6,049,273 UART: [idev] --
6,053,102 UART: [ldev] ++
6,053,784 UART: [ldev] CDI.KEYID = 6
6,054,701 UART: [ldev] SUBJECT.KEYID = 5
6,056,045 UART: [ldev] AUTHORITY.KEYID = 7
6,057,251 UART: [ldev] FE.KEYID = 1
6,091,296 UART: [ldev] Erasing FE.KEYID = 1
8,600,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,320 UART: [ldev] --
10,405,744 UART: [fwproc] Wait for Commands...
10,408,333 UART: [fwproc] Recv command 0x46574c44
10,410,589 UART: [fwproc] Recv'd Img size: 114448 bytes
13,853,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,155 >>> mbox cmd response: success
14,602,947 UART: [afmc] ++
14,603,666 UART: [afmc] CDI.KEYID = 6
14,604,855 UART: [afmc] SUBJECT.KEYID = 7
14,606,289 UART: [afmc] AUTHORITY.KEYID = 5
17,140,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,924 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,912,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,217 UART: [afmc] --
18,938,697 UART: [cold-reset] --
18,942,544 UART: [state] Locking Datavault
18,947,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,949,839 UART: [state] Locking ICCM
18,951,558 UART: [exit] Launching FMC @ 0x40000130
18,960,228 UART:
18,960,527 UART: Running Caliptra FMC ...
18,961,803 UART:
18,961,971 UART: [state] CFI Enabled
19,023,638 UART: [fht] FMC Alias Private Key: 7
20,787,496 UART: [art] Extend RT PCRs Done
20,788,699 UART: [art] Lock RT PCRs Done
20,790,376 UART: [art] Populate DV Done
20,795,621 UART: [fht] FMC Alias Private Key: 7
20,797,315 UART: [art] Derive CDI
20,798,128 UART: [art] Store in in slot 0x4
20,856,420 UART: [art] Derive Key Pair
20,857,462 UART: [art] Store priv key in slot 0x5
23,320,788 UART: [art] Derive Key Pair - Done
23,334,002 UART: [art] Signing Cert with AUTHO
23,335,315 UART: RITY.KEYID = 7
25,046,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,799 UART: [art] PUB.X = 74DA1ECD7EA62AE9C6C60782A3A92178823E555CEA1042713E31AA76AF509FD4D9542A23FEBDE03D7CB59EA39675DD44
25,055,096 UART: [art] PUB.Y = 8542DF6B6A3E71B95B4CB11C1CD75A12F94FA66FB8F52B84BE47F097A6764EC5D745BB54C292686CBF00A72848018DEF
25,062,323 UART: [art] SIG.R = 8FDEED0DFACAECB0CB33A8A9520EF49EC1E9EEA4D395A676F1EFF8A0E0BDA89D0F82D1458E5526DF632F13826CE46E9C
25,069,790 UART: [art] SIG.S = D8F5AAA2C2663BD184B6BF044135AC77B8A3A13B264E4FCF6E7CFED67B3CCFA6D3BA5CC46F87DEEA7336A75CBDD9E692
26,048,871 UART: Caliptra RT
26,049,579 UART: [state] CFI Enabled
26,215,240 UART: [rt] RT listening for mailbox commands...
26,217,260 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,248,170 UART: [rt]cmd =0x53574545, len=84
26,249,743 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,420,061 ready_for_fw is high
3,420,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,553 >>> mbox cmd response: success
19,027,901 UART:
19,028,335 UART: Running Caliptra FMC ...
19,029,649 UART:
19,029,825 UART: [state] CFI Enabled
19,080,529 UART: [fht] FMC Alias Private Key: 7
20,844,546 UART: [art] Extend RT PCRs Done
20,845,768 UART: [art] Lock RT PCRs Done
20,847,691 UART: [art] Populate DV Done
20,853,204 UART: [fht] FMC Alias Private Key: 7
20,854,690 UART: [art] Derive CDI
20,855,424 UART: [art] Store in in slot 0x4
20,912,789 UART: [art] Derive Key Pair
20,913,835 UART: [art] Store priv key in slot 0x5
23,376,009 UART: [art] Derive Key Pair - Done
23,388,905 UART: [art] Signing Cert with AUTHO
23,390,389 UART: RITY.KEYID = 7
25,101,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,102,869 UART: [art] PUB.X = 661ED4FF62EC28C94733863C76F1BFB522216ED004547FB5901971F13867C8B06D09939DFF04FBC22CC0D360DCC90DBD
25,110,126 UART: [art] PUB.Y = C9E9D7AEDA023EA66B080E790EE786DC92306EF3FDAA01A30F17B31DA042EE188DF194E032381D69004760690A035315
25,117,375 UART: [art] SIG.R = 6CCD5530569C65C4DCC3917AABD4568609A15B373681D42EFC55B046EB0C2604E31CA7708B25B936227D99BFEE8F3891
25,124,707 UART: [art] SIG.S = BB6DD4685A2F5012BB8BC013857CF914FC3E8DC290176290F38A833037B28AB8484E13F798F1612F94303D0DEEDA75B7
26,104,440 UART: Caliptra RT
26,105,148 UART: [state] CFI Enabled
26,267,525 UART: [rt] RT listening for mailbox commands...
26,269,551 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,300,548 UART: [rt]cmd =0x53574545, len=84
26,302,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,369 UART:
192,737 UART: Running Caliptra ROM ...
193,932 UART:
603,447 UART: [state] CFI Enabled
619,824 UART: [state] LifecycleState = Unprovisioned
622,206 UART: [state] DebugLocked = No
624,370 UART: [state] WD Timer not started. Device not locked for debugging
629,257 UART: [kat] SHA2-256
819,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,963 UART: [kat] ++
830,557 UART: [kat] sha1
842,001 UART: [kat] SHA2-256
845,010 UART: [kat] SHA2-384
851,279 UART: [kat] SHA2-512-ACC
853,847 UART: [kat] ECC-384
3,296,401 UART: [kat] HMAC-384Kdf
3,309,219 UART: [kat] LMS
3,841,048 UART: [kat] --
3,846,247 UART: [cold-reset] ++
3,848,170 UART: [fht] FHT @ 0x50003400
3,860,273 UART: [idev] ++
3,860,970 UART: [idev] CDI.KEYID = 6
3,861,919 UART: [idev] SUBJECT.KEYID = 7
3,863,151 UART: [idev] UDS.KEYID = 0
3,864,072 ready_for_fw is high
3,864,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,992 UART: [idev] Erasing UDS.KEYID = 0
6,344,746 UART: [idev] Sha1 KeyId Algorithm
6,368,150 UART: [idev] --
6,373,598 UART: [ldev] ++
6,374,324 UART: [ldev] CDI.KEYID = 6
6,375,230 UART: [ldev] SUBJECT.KEYID = 5
6,376,399 UART: [ldev] AUTHORITY.KEYID = 7
6,377,671 UART: [ldev] FE.KEYID = 1
6,388,889 UART: [ldev] Erasing FE.KEYID = 1
8,866,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,117 UART: [ldev] --
10,657,808 UART: [fwproc] Wait for Commands...
10,660,546 UART: [fwproc] Recv command 0x46574c44
10,662,792 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,530 >>> mbox cmd response: success
14,852,217 UART: [afmc] ++
14,852,936 UART: [afmc] CDI.KEYID = 6
14,854,122 UART: [afmc] SUBJECT.KEYID = 7
14,855,558 UART: [afmc] AUTHORITY.KEYID = 5
17,359,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,083,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,085,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,100,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,115,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,130,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,759 UART: [afmc] --
19,157,573 UART: [cold-reset] --
19,160,678 UART: [state] Locking Datavault
19,167,170 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,365 UART: [state] Locking ICCM
19,172,267 UART: [exit] Launching FMC @ 0x40000130
19,180,957 UART:
19,181,186 UART: Running Caliptra FMC ...
19,182,280 UART:
19,182,434 UART: [state] CFI Enabled
19,190,752 UART: [fht] FMC Alias Private Key: 7
20,947,766 UART: [art] Extend RT PCRs Done
20,949,113 UART: [art] Lock RT PCRs Done
20,950,736 UART: [art] Populate DV Done
20,956,249 UART: [fht] FMC Alias Private Key: 7
20,957,953 UART: [art] Derive CDI
20,958,759 UART: [art] Store in in slot 0x4
21,001,408 UART: [art] Derive Key Pair
21,002,408 UART: [art] Store priv key in slot 0x5
23,428,685 UART: [art] Derive Key Pair - Done
23,442,004 UART: [art] Signing Cert with AUTHO
23,443,300 UART: RITY.KEYID = 7
25,148,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,324 UART: [art] PUB.X = EC310EB40E77AAD0B17F8E1CA7E0B483FE05E23E95D5FDACEED200A40C7C8515CFCF79BAD71E6B3700EEFBD62701A03A
25,157,545 UART: [art] PUB.Y = CD6E28FE6AF85A4F936F1BD13F9F752332E4195C7738879D00BE464E0CD4B75FA6A13CDD6DE631F47A0EFDA21B4225B5
25,164,803 UART: [art] SIG.R = 5C225FCA4A357EDD1DB7BE56B37CAEBD0B6750D9ED2782D36EAE75A615387CCB1D051459E93FEE49D0744165F217B321
25,172,235 UART: [art] SIG.S = E5D949E7E956FEA52FCC29CAB0A19BE65D8FD6F385F9EF6737FA9A6DE1A573540D521104ADCCDA114F74E609A2D6F0B6
26,151,226 UART: Caliptra RT
26,151,925 UART: [state] CFI Enabled
26,268,826 UART: [rt] RT listening for mailbox commands...
26,270,706 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,301,008 UART: [rt]cmd =0x53574545, len=84
26,302,768 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,756,153 ready_for_fw is high
3,756,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,971,962 >>> mbox cmd response: success
19,221,779 UART:
19,222,184 UART: Running Caliptra FMC ...
19,223,290 UART:
19,223,443 UART: [state] CFI Enabled
19,231,547 UART: [fht] FMC Alias Private Key: 7
20,989,352 UART: [art] Extend RT PCRs Done
20,990,570 UART: [art] Lock RT PCRs Done
20,992,328 UART: [art] Populate DV Done
20,997,952 UART: [fht] FMC Alias Private Key: 7
20,999,438 UART: [art] Derive CDI
21,000,167 UART: [art] Store in in slot 0x4
21,042,716 UART: [art] Derive Key Pair
21,043,760 UART: [art] Store priv key in slot 0x5
23,470,124 UART: [art] Derive Key Pair - Done
23,483,070 UART: [art] Signing Cert with AUTHO
23,484,400 UART: RITY.KEYID = 7
25,189,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,397 UART: [art] PUB.X = 894715473720995F4AC5D6DDCDB0CE29A8D348BE6EEBF0390BEB32A492F8EFD14102D848A8966B0396638892FF608BB5
25,198,717 UART: [art] PUB.Y = 09E286B5C94AA7ED55CE4265138D671788818909A64AD59F5C5C21ED07593D74F87321414894D116479582BDB1D989B2
25,205,903 UART: [art] SIG.R = 332A7EDFFA24EE53C9D7258F9FB82605B5EDE56009E8D394F4A5E3BA109B67D4BD681A9EB595DC3A3EC1FA4484158B55
25,213,337 UART: [art] SIG.S = 989BE8AA2793AE6C95869FAA769C21DE08DDA6D997EBD486E59A332BBCD472D82107909834074CB8F582224D03F3AA84
26,192,847 UART: Caliptra RT
26,193,537 UART: [state] CFI Enabled
26,310,335 UART: [rt] RT listening for mailbox commands...
26,312,217 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,342,698 UART: [rt]cmd =0x53574545, len=84
26,344,505 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,965 UART: [kat] SHA2-256
881,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,011 UART: [kat] ++
886,163 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,310 UART: [kat] LMS
1,475,506 UART: [kat] --
1,476,231 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,140 UART: [idev] Erasing UDS.KEYID = 0
1,504,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,512 UART: [idev] --
1,514,597 UART: [ldev] ++
1,514,765 UART: [ldev] CDI.KEYID = 6
1,515,128 UART: [ldev] SUBJECT.KEYID = 5
1,515,554 UART: [ldev] AUTHORITY.KEYID = 7
1,516,017 UART: [ldev] FE.KEYID = 1
1,521,427 UART: [ldev] Erasing FE.KEYID = 1
1,546,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,580 UART: [ldev] --
1,585,955 UART: [fwproc] Waiting for Commands...
1,586,754 UART: [fwproc] Received command 0x46574c44
1,587,545 UART: [fwproc] Received Image of size 114448 bytes
2,886,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,726 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,087 >>> mbox cmd response: success
3,080,107 UART: [afmc] ++
3,080,275 UART: [afmc] CDI.KEYID = 6
3,080,637 UART: [afmc] SUBJECT.KEYID = 7
3,081,062 UART: [afmc] AUTHORITY.KEYID = 5
3,115,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,474 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,164 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,995 UART: [afmc] --
3,159,061 UART: [cold-reset] --
3,160,039 UART: [state] Locking Datavault
3,160,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,534 UART: [state] Locking ICCM
3,162,036 UART: [exit] Launching FMC @ 0x40000130
3,167,365 UART:
3,167,381 UART: Running Caliptra FMC ...
3,167,789 UART:
3,167,843 UART: [state] CFI Enabled
3,178,194 UART: [fht] FMC Alias Private Key: 7
3,286,227 UART: [art] Extend RT PCRs Done
3,286,655 UART: [art] Lock RT PCRs Done
3,288,251 UART: [art] Populate DV Done
3,296,564 UART: [fht] FMC Alias Private Key: 7
3,297,690 UART: [art] Derive CDI
3,297,970 UART: [art] Store in in slot 0x4
3,383,583 UART: [art] Derive Key Pair
3,383,943 UART: [art] Store priv key in slot 0x5
3,397,119 UART: [art] Derive Key Pair - Done
3,411,600 UART: [art] Signing Cert with AUTHO
3,412,080 UART: RITY.KEYID = 7
3,427,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,921 UART: [art] PUB.X = 74AD6EF4632E8CAEAAB6904498891DAF9183C34457F7974AFB5D10E44C33492AEF282ECAB62B1D61488713F76924FC7B
3,434,699 UART: [art] PUB.Y = D034FB8A48C3B5F2094370A4A5BF5884946A74C679E6AB77F738CDE83F2E884FA0A4A0B0B4694340D21F000F4868D2AB
3,441,627 UART: [art] SIG.R = 1492DAB8CA9E8F81FE3E6C14F3EDEA99B4B560C3686350CAC6F0BEB69F8B60857E29366E22FC1E3870D48EBB68401B28
3,448,411 UART: [art] SIG.S = 5F3A09F1A2A788D8FBFBF0BF935FFA78CAB182264B91BD9EBA03184706627BE7308292629043DD7F52CB276EF0DBE798
3,471,809 UART: Caliptra RT
3,472,062 UART: [state] CFI Enabled
3,581,058 UART: [rt] RT listening for mailbox commands...
3,581,728 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,240 UART: [rt]cmd =0x53574545, len=84
3,613,551 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,415 ready_for_fw is high
1,362,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,765 >>> mbox cmd response: success
2,991,017 UART:
2,991,033 UART: Running Caliptra FMC ...
2,991,441 UART:
2,991,495 UART: [state] CFI Enabled
3,001,786 UART: [fht] FMC Alias Private Key: 7
3,109,517 UART: [art] Extend RT PCRs Done
3,109,945 UART: [art] Lock RT PCRs Done
3,111,691 UART: [art] Populate DV Done
3,120,000 UART: [fht] FMC Alias Private Key: 7
3,121,130 UART: [art] Derive CDI
3,121,410 UART: [art] Store in in slot 0x4
3,207,105 UART: [art] Derive Key Pair
3,207,465 UART: [art] Store priv key in slot 0x5
3,220,705 UART: [art] Derive Key Pair - Done
3,235,531 UART: [art] Signing Cert with AUTHO
3,236,011 UART: RITY.KEYID = 7
3,250,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,332 UART: [art] PUB.X = D0A321AF8ECC7F2E79BA3769B91E75B7B4DD7FEE9CC493CC53DCA02785CDFD66DBE0560549BE4EB896D7132B17551710
3,258,117 UART: [art] PUB.Y = 0319BC85E0E69D55A44488676EDFDE9FE14CC4654E714C4557724C7C81BBB144EC8A11E53FD2F3C2913336F62370DF83
3,265,068 UART: [art] SIG.R = A3D6251BFB8A9E224D5BB4E3A1A39FAF1A28E44F6BC658E1D4023CA61FE9516E71FF4D64E6D691DFDABDA79573B8079C
3,271,854 UART: [art] SIG.S = E38DBB5E2A79DA871FCDFE029988CDF1FDD1856B8DAB5B89CA695A882DFF3A7DB6BCC27E440AEBA650E729D4CD1506E0
3,295,778 UART: Caliptra RT
3,296,031 UART: [state] CFI Enabled
3,403,451 UART: [rt] RT listening for mailbox commands...
3,404,121 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,233 UART: [rt]cmd =0x53574545, len=84
3,435,804 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
891,036 UART: [kat] SHA2-256
892,974 UART: [kat] SHA2-384
895,821 UART: [kat] SHA2-512-ACC
897,722 UART: [kat] ECC-384
903,423 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,266 UART: [cold-reset] ++
1,477,692 UART: [fht] Storing FHT @ 0x50003400
1,480,515 UART: [idev] ++
1,480,683 UART: [idev] CDI.KEYID = 6
1,481,043 UART: [idev] SUBJECT.KEYID = 7
1,481,467 UART: [idev] UDS.KEYID = 0
1,481,812 ready_for_fw is high
1,481,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,313 UART: [idev] Erasing UDS.KEYID = 0
1,506,025 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,655 UART: [idev] --
1,515,796 UART: [ldev] ++
1,515,964 UART: [ldev] CDI.KEYID = 6
1,516,327 UART: [ldev] SUBJECT.KEYID = 5
1,516,753 UART: [ldev] AUTHORITY.KEYID = 7
1,517,216 UART: [ldev] FE.KEYID = 1
1,522,664 UART: [ldev] Erasing FE.KEYID = 1
1,548,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,923 UART: [ldev] --
1,587,198 UART: [fwproc] Waiting for Commands...
1,587,837 UART: [fwproc] Received command 0x46574c44
1,588,628 UART: [fwproc] Received Image of size 114448 bytes
2,887,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,734 >>> mbox cmd response: success
3,082,924 UART: [afmc] ++
3,083,092 UART: [afmc] CDI.KEYID = 6
3,083,454 UART: [afmc] SUBJECT.KEYID = 7
3,083,879 UART: [afmc] AUTHORITY.KEYID = 5
3,119,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,520 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,913 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,603 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,466 UART: [afmc] --
3,162,520 UART: [cold-reset] --
3,163,294 UART: [state] Locking Datavault
3,164,529 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,133 UART: [state] Locking ICCM
3,165,563 UART: [exit] Launching FMC @ 0x40000130
3,170,892 UART:
3,170,908 UART: Running Caliptra FMC ...
3,171,316 UART:
3,171,459 UART: [state] CFI Enabled
3,182,462 UART: [fht] FMC Alias Private Key: 7
3,290,437 UART: [art] Extend RT PCRs Done
3,290,865 UART: [art] Lock RT PCRs Done
3,292,857 UART: [art] Populate DV Done
3,301,034 UART: [fht] FMC Alias Private Key: 7
3,302,108 UART: [art] Derive CDI
3,302,388 UART: [art] Store in in slot 0x4
3,388,053 UART: [art] Derive Key Pair
3,388,413 UART: [art] Store priv key in slot 0x5
3,401,231 UART: [art] Derive Key Pair - Done
3,416,201 UART: [art] Signing Cert with AUTHO
3,416,681 UART: RITY.KEYID = 7
3,431,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,638 UART: [art] PUB.X = 5B43F5863586589B0565BB5CA9510C380007226298B7E4BB15FAE9E93640BDDBD6EA660C174EF32760ABED1254FF03AC
3,439,377 UART: [art] PUB.Y = AEFF3D2F6501983F46CC47B4783F06D6FED1AB2A8B5A05D7C453B4ED6697DC6AECC70D93A5DE2A40FA95C0D6B591D05B
3,446,339 UART: [art] SIG.R = 6F365071B75075E84375017EF98A7B13F20CBB81638EF4AB271140A92A0EEF5FC9EA151F813098DDE07018B64F9A8046
3,453,100 UART: [art] SIG.S = C7CBAFB31AE8501BAA5F7C2F37D68EB9F8621329F3F70D346C98E6A5F472ABA233F678D93E3CE2024C81AE3BBA707540
3,476,763 UART: Caliptra RT
3,477,108 UART: [state] CFI Enabled
3,585,671 UART: [rt] RT listening for mailbox commands...
3,586,341 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,649 UART: [rt]cmd =0x53574545, len=84
3,618,134 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 ready_for_fw is high
1,362,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,714 >>> mbox cmd response: success
2,994,252 UART:
2,994,268 UART: Running Caliptra FMC ...
2,994,676 UART:
2,994,819 UART: [state] CFI Enabled
3,005,644 UART: [fht] FMC Alias Private Key: 7
3,113,469 UART: [art] Extend RT PCRs Done
3,113,897 UART: [art] Lock RT PCRs Done
3,115,585 UART: [art] Populate DV Done
3,124,104 UART: [fht] FMC Alias Private Key: 7
3,125,152 UART: [art] Derive CDI
3,125,432 UART: [art] Store in in slot 0x4
3,211,483 UART: [art] Derive Key Pair
3,211,843 UART: [art] Store priv key in slot 0x5
3,224,693 UART: [art] Derive Key Pair - Done
3,239,574 UART: [art] Signing Cert with AUTHO
3,240,054 UART: RITY.KEYID = 7
3,255,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,115 UART: [art] PUB.X = 0246B046764EEE231B61032F0658C47EFDD3B4413ADA73F61EB7C71D1F8A424545E7AB8C08239E2F4FCCF1843E966E0B
3,262,878 UART: [art] PUB.Y = 2577091FBDB3A69BFF4502BA9279CD4894BDAC54121D45ED5E089A4060CEEA082B5AF938C5FEF590AED5816843A5274B
3,269,828 UART: [art] SIG.R = 7A8225F89BF076E5FECEF942180B6A13EC68490E72E636B323895424185C4790A8FB2DE9C26C7346FE2529E213FD09E8
3,276,589 UART: [art] SIG.S = CCA421EE10BDDDF0BBD8195774ABCC9243BF12567A6020B583A8D3B51EBFAF87B214738CDF9E66EA34B46720A6A91BF3
3,300,164 UART: Caliptra RT
3,300,509 UART: [state] CFI Enabled
3,408,228 UART: [rt] RT listening for mailbox commands...
3,408,898 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,270 UART: [rt]cmd =0x53574545, len=84
3,440,895 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,898 UART: [kat] SHA2-512-ACC
908,799 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,203 UART: [cold-reset] ++
1,172,647 UART: [fht] FHT @ 0x50003400
1,175,262 UART: [idev] ++
1,175,430 UART: [idev] CDI.KEYID = 6
1,175,790 UART: [idev] SUBJECT.KEYID = 7
1,176,214 UART: [idev] UDS.KEYID = 0
1,176,559 ready_for_fw is high
1,176,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,791 UART: [idev] Sha1 KeyId Algorithm
1,209,327 UART: [idev] --
1,210,393 UART: [ldev] ++
1,210,561 UART: [ldev] CDI.KEYID = 6
1,210,924 UART: [ldev] SUBJECT.KEYID = 5
1,211,350 UART: [ldev] AUTHORITY.KEYID = 7
1,211,813 UART: [ldev] FE.KEYID = 1
1,217,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,611 UART: [ldev] --
1,283,094 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,558 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,434 >>> mbox cmd response: success
2,778,676 UART: [afmc] ++
2,778,844 UART: [afmc] CDI.KEYID = 6
2,779,206 UART: [afmc] SUBJECT.KEYID = 7
2,779,631 UART: [afmc] AUTHORITY.KEYID = 5
2,814,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,165 UART: [afmc] --
2,858,107 UART: [cold-reset] --
2,859,117 UART: [state] Locking Datavault
2,860,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,924 UART: [state] Locking ICCM
2,861,344 UART: [exit] Launching FMC @ 0x40000130
2,866,673 UART:
2,866,689 UART: Running Caliptra FMC ...
2,867,097 UART:
2,867,151 UART: [state] CFI Enabled
2,877,734 UART: [fht] FMC Alias Private Key: 7
2,984,783 UART: [art] Extend RT PCRs Done
2,985,211 UART: [art] Lock RT PCRs Done
2,986,635 UART: [art] Populate DV Done
2,995,040 UART: [fht] FMC Alias Private Key: 7
2,996,144 UART: [art] Derive CDI
2,996,424 UART: [art] Store in in slot 0x4
3,081,891 UART: [art] Derive Key Pair
3,082,251 UART: [art] Store priv key in slot 0x5
3,095,399 UART: [art] Derive Key Pair - Done
3,110,441 UART: [art] Signing Cert with AUTHO
3,110,921 UART: RITY.KEYID = 7
3,126,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,782 UART: [art] PUB.X = 144298D581003D9957ABCB3B2D35D1433F7855B6139E4D7BB09DD3CB70121F51F40EF2A09DA21BF8D68E77E80012FCFB
3,133,513 UART: [art] PUB.Y = 334B4136E49D70C966C624EC8811045155B9567CCDE562EF0A94F89451392FADFE7163D3439FD97A5C405FE2C59B04E8
3,140,454 UART: [art] SIG.R = 2ADE116A02681B4165D779AC4062B96049C44FE2399412C6835789B283E081EA129678A19E99C77AC3D93A8A8052394C
3,147,211 UART: [art] SIG.S = B3E32A5FFBF27C4EF7BC5AEF6C5654CE86E353C4123A9F017CC5F4B8F0C4497454A843ABC2B32500348202ABAEF02002
3,171,377 UART: Caliptra RT
3,171,630 UART: [state] CFI Enabled
3,278,663 UART: [rt] RT listening for mailbox commands...
3,279,333 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,501 UART: [rt]cmd =0x53574545, len=84
3,310,742 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,781 ready_for_fw is high
1,059,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,445 >>> mbox cmd response: success
2,688,921 UART:
2,688,937 UART: Running Caliptra FMC ...
2,689,345 UART:
2,689,399 UART: [state] CFI Enabled
2,699,732 UART: [fht] FMC Alias Private Key: 7
2,807,749 UART: [art] Extend RT PCRs Done
2,808,177 UART: [art] Lock RT PCRs Done
2,809,953 UART: [art] Populate DV Done
2,818,414 UART: [fht] FMC Alias Private Key: 7
2,819,402 UART: [art] Derive CDI
2,819,682 UART: [art] Store in in slot 0x4
2,905,209 UART: [art] Derive Key Pair
2,905,569 UART: [art] Store priv key in slot 0x5
2,919,243 UART: [art] Derive Key Pair - Done
2,934,149 UART: [art] Signing Cert with AUTHO
2,934,629 UART: RITY.KEYID = 7
2,949,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,362 UART: [art] PUB.X = 155E3D698D726630972394E77380C86F9CF2E02E143591D5681E5B6ACC9C9B71F17D3A7703C531971A075F7F02258C99
2,957,113 UART: [art] PUB.Y = BE6594BEA964C349D1AF640216A4D83925D4F0EEC01E3ED0BFCE75851CD32AFC4B9912090D140412FB8A1C30CF9F098F
2,964,062 UART: [art] SIG.R = 1C52EEF2212376B0D81BA25762B9B44EA0C04C68F8E7B504659912615108A320742AE44C5AA4FEB745AEAFEF40C4F1DF
2,970,836 UART: [art] SIG.S = 695866256489CDAAD372E40E8B7BF158EC9E2E19C5B264767EDCE9B105C32F81DC2B68EB908F1E714C624AE1810F8384
2,993,796 UART: Caliptra RT
2,994,049 UART: [state] CFI Enabled
3,101,838 UART: [rt] RT listening for mailbox commands...
3,102,508 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,792 UART: [rt]cmd =0x53574545, len=84
3,134,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
893,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,050 UART: [kat] ++
898,202 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,062 UART: [cold-reset] ++
1,172,444 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 ready_for_fw is high
1,176,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,933 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,120 UART: [ldev] ++
1,210,288 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,077 UART: [ldev] AUTHORITY.KEYID = 7
1,211,540 UART: [ldev] FE.KEYID = 1
1,216,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,784 UART: [ldev] --
1,282,257 UART: [fwproc] Wait for Commands...
1,282,909 UART: [fwproc] Recv command 0x46574c44
1,283,637 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,021 >>> mbox cmd response: success
2,777,243 UART: [afmc] ++
2,777,411 UART: [afmc] CDI.KEYID = 6
2,777,773 UART: [afmc] SUBJECT.KEYID = 7
2,778,198 UART: [afmc] AUTHORITY.KEYID = 5
2,814,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,792 UART: [afmc] --
2,857,690 UART: [cold-reset] --
2,858,780 UART: [state] Locking Datavault
2,859,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,563 UART: [state] Locking ICCM
2,861,003 UART: [exit] Launching FMC @ 0x40000130
2,866,332 UART:
2,866,348 UART: Running Caliptra FMC ...
2,866,756 UART:
2,866,899 UART: [state] CFI Enabled
2,877,554 UART: [fht] FMC Alias Private Key: 7
2,985,401 UART: [art] Extend RT PCRs Done
2,985,829 UART: [art] Lock RT PCRs Done
2,987,687 UART: [art] Populate DV Done
2,995,864 UART: [fht] FMC Alias Private Key: 7
2,996,958 UART: [art] Derive CDI
2,997,238 UART: [art] Store in in slot 0x4
3,083,465 UART: [art] Derive Key Pair
3,083,825 UART: [art] Store priv key in slot 0x5
3,097,579 UART: [art] Derive Key Pair - Done
3,112,211 UART: [art] Signing Cert with AUTHO
3,112,691 UART: RITY.KEYID = 7
3,127,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,660 UART: [art] PUB.X = 4F69F2905147C3DAD2C7403518CDD5018222FBF2126E061AC8F8B567F0CF73219F7411DDFD77CC06695A6A10E08000C6
3,135,401 UART: [art] PUB.Y = F0960D3C4377162D029B17D322A898FF73C6AC0C77389D39A7AAE65994914076BFAEB175181880045EC37E312CBCCEDF
3,142,343 UART: [art] SIG.R = 31C1B2B31F44D578B1BCA4E410DEC3DA5A1C346736191593189DC00CD77E2CB66D2AE226B085ECED5799D4AC973513B3
3,149,120 UART: [art] SIG.S = 3A795CBF0F55DE7FA700CAC0CD88EC443F800D6D226287D9DC153675E537460075B1FC1F577D7722E7B8E59C7F110F8D
3,172,422 UART: Caliptra RT
3,172,767 UART: [state] CFI Enabled
3,281,054 UART: [rt] RT listening for mailbox commands...
3,281,724 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,006 UART: [rt]cmd =0x53574545, len=84
3,313,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,946 ready_for_fw is high
1,060,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,576 >>> mbox cmd response: success
2,691,694 UART:
2,691,710 UART: Running Caliptra FMC ...
2,692,118 UART:
2,692,261 UART: [state] CFI Enabled
2,702,716 UART: [fht] FMC Alias Private Key: 7
2,809,567 UART: [art] Extend RT PCRs Done
2,809,995 UART: [art] Lock RT PCRs Done
2,811,375 UART: [art] Populate DV Done
2,819,858 UART: [fht] FMC Alias Private Key: 7
2,820,792 UART: [art] Derive CDI
2,821,072 UART: [art] Store in in slot 0x4
2,906,669 UART: [art] Derive Key Pair
2,907,029 UART: [art] Store priv key in slot 0x5
2,920,573 UART: [art] Derive Key Pair - Done
2,935,206 UART: [art] Signing Cert with AUTHO
2,935,686 UART: RITY.KEYID = 7
2,951,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,015 UART: [art] PUB.X = DCDEA4C03BCE65924A29B1C4B95AD1114B497C656952945D3A91B40F2E801942FCAFE2AEC3F2E5DA8B70C52A6FF661EE
2,958,802 UART: [art] PUB.Y = AE773906273C2EBABE1EDBD63BE27B4372A7205709400B36B653DA36F1505DA6A708BAD0F430E5693E292BB72A9CCBE8
2,965,752 UART: [art] SIG.R = FA38EB363188E1372991310BD4C2AEB720DCDC0402B1CDEA234264C8672A1E4808D6C08BB2B1C6BFC9186416D508483D
2,972,513 UART: [art] SIG.S = 2EA743CB54F4F3DC11C6AE01C69CA603A086D394338AD08469721E41FA4C8F9185039E8016737E0E6EA64AA7FFA1F693
2,996,298 UART: Caliptra RT
2,996,643 UART: [state] CFI Enabled
3,104,024 UART: [rt] RT listening for mailbox commands...
3,104,694 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,854 UART: [rt]cmd =0x53574545, len=84
3,136,239 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,894 UART: [state] LifecycleState = Unprovisioned
86,549 UART: [state] DebugLocked = No
87,079 UART: [state] WD Timer not started. Device not locked for debugging
88,410 UART: [kat] SHA2-256
891,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,555 UART: [kat] SHA2-256
902,495 UART: [kat] SHA2-384
905,156 UART: [kat] SHA2-512-ACC
907,057 UART: [kat] ECC-384
917,154 UART: [kat] HMAC-384Kdf
921,684 UART: [kat] LMS
1,169,996 UART: [kat] --
1,170,823 UART: [cold-reset] ++
1,171,269 UART: [fht] FHT @ 0x50003400
1,173,995 UART: [idev] ++
1,174,163 UART: [idev] CDI.KEYID = 6
1,174,524 UART: [idev] SUBJECT.KEYID = 7
1,174,949 UART: [idev] UDS.KEYID = 0
1,175,295 ready_for_fw is high
1,175,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,979 UART: [idev] Erasing UDS.KEYID = 0
1,199,529 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,518 UART: [ldev] ++
1,209,686 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,477 UART: [ldev] AUTHORITY.KEYID = 7
1,210,940 UART: [ldev] FE.KEYID = 1
1,216,018 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,281,973 UART: [fwproc] Recv command 0x46574c44
1,282,706 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,764 >>> mbox cmd response: success
2,775,807 UART: [afmc] ++
2,775,975 UART: [afmc] CDI.KEYID = 6
2,776,338 UART: [afmc] SUBJECT.KEYID = 7
2,776,764 UART: [afmc] AUTHORITY.KEYID = 5
2,812,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,648 UART: [afmc] --
2,855,528 UART: [cold-reset] --
2,856,310 UART: [state] Locking Datavault
2,857,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,095 UART: [state] Locking ICCM
2,858,695 UART: [exit] Launching FMC @ 0x40000130
2,864,024 UART:
2,864,040 UART: Running Caliptra FMC ...
2,864,448 UART:
2,864,502 UART: [state] CFI Enabled
2,875,119 UART: [fht] FMC Alias Private Key: 7
2,982,846 UART: [art] Extend RT PCRs Done
2,983,274 UART: [art] Lock RT PCRs Done
2,984,906 UART: [art] Populate DV Done
2,993,035 UART: [fht] FMC Alias Private Key: 7
2,993,991 UART: [art] Derive CDI
2,994,271 UART: [art] Store in in slot 0x4
3,080,036 UART: [art] Derive Key Pair
3,080,396 UART: [art] Store priv key in slot 0x5
3,093,764 UART: [art] Derive Key Pair - Done
3,108,459 UART: [art] Signing Cert with AUTHO
3,108,939 UART: RITY.KEYID = 7
3,124,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,808 UART: [art] PUB.X = B16E72593DBAFD72B2DB27ECD0AA4DFE24EB111E1DB6967983392D46BAA1A0F1DD7E145A015E8B5A8B39FCCBAB326CEE
3,131,605 UART: [art] PUB.Y = 53A4B111210454ED7B38BB5078A68EDDBF906053D11D89175E6552087886A31C57202CB01A21435F225C8D04B3661895
3,138,534 UART: [art] SIG.R = 99EB40D8405CD52036E5A98E7858DA3B14A9760F6100E885E08DC3EF5EA6BA7C2A00B2691EDCF9B689E7D110E11697FE
3,145,267 UART: [art] SIG.S = 56F960DD92546F0BEA701F19ADBD1D51E1F5B7A223282DAA6BFC77B2B46C3CA98D3A2D8B35732AA7F07E6D9BC89504B8
3,169,114 UART: Caliptra RT
3,169,367 UART: [state] CFI Enabled
3,278,390 UART: [rt] RT listening for mailbox commands...
3,279,060 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,224 UART: [rt]cmd =0x53574545, len=84
3,310,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,336 ready_for_fw is high
1,056,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,060 >>> mbox cmd response: success
2,685,858 UART:
2,685,874 UART: Running Caliptra FMC ...
2,686,282 UART:
2,686,336 UART: [state] CFI Enabled
2,696,893 UART: [fht] FMC Alias Private Key: 7
2,804,688 UART: [art] Extend RT PCRs Done
2,805,116 UART: [art] Lock RT PCRs Done
2,806,654 UART: [art] Populate DV Done
2,814,771 UART: [fht] FMC Alias Private Key: 7
2,815,787 UART: [art] Derive CDI
2,816,067 UART: [art] Store in in slot 0x4
2,901,650 UART: [art] Derive Key Pair
2,902,010 UART: [art] Store priv key in slot 0x5
2,914,848 UART: [art] Derive Key Pair - Done
2,929,646 UART: [art] Signing Cert with AUTHO
2,930,126 UART: RITY.KEYID = 7
2,945,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,927 UART: [art] PUB.X = 915D26DE5EAB6D7D937C2F195C2605BF21FE9D43323F461BB4D3ADC4DD8E3F77708D5B9DA1D1DECFA388FE7A29D9E616
2,952,716 UART: [art] PUB.Y = 717190240132C6ECF8D67090EC7AFE3CFC1DE11691D445A81A63D956A8364B9AD1616B0C4E77C2C4B6E696C347CDFB79
2,959,668 UART: [art] SIG.R = CB3BCE739352CA31C23A996EE9F64302D9739DDC476EC65B5A1C0B7AAD81033B51FF7E8BC430826F4FA7544EDC9E09AF
2,966,444 UART: [art] SIG.S = 9E4940666E0F36447FEBD6E82D01F0AF8432ECC3967522212F420D62C08432B77B6ABB416CA6101A77E745A16CF96D63
2,990,224 UART: Caliptra RT
2,990,477 UART: [state] CFI Enabled
3,098,891 UART: [rt] RT listening for mailbox commands...
3,099,561 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,595 UART: [rt]cmd =0x53574545, len=84
3,131,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,822 UART: [idev] ++
1,173,990 UART: [idev] CDI.KEYID = 6
1,174,351 UART: [idev] SUBJECT.KEYID = 7
1,174,776 UART: [idev] UDS.KEYID = 0
1,175,122 ready_for_fw is high
1,175,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,450 UART: [idev] Sha1 KeyId Algorithm
1,209,332 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,761 UART: [ldev] SUBJECT.KEYID = 5
1,211,188 UART: [ldev] AUTHORITY.KEYID = 7
1,211,651 UART: [ldev] FE.KEYID = 1
1,216,783 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,855 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,355 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,995 >>> mbox cmd response: success
2,778,142 UART: [afmc] ++
2,778,310 UART: [afmc] CDI.KEYID = 6
2,778,673 UART: [afmc] SUBJECT.KEYID = 7
2,779,099 UART: [afmc] AUTHORITY.KEYID = 5
2,814,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,341 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,672 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,363 UART: [afmc] --
2,858,471 UART: [cold-reset] --
2,859,325 UART: [state] Locking Datavault
2,860,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,338 UART: [state] Locking ICCM
2,861,890 UART: [exit] Launching FMC @ 0x40000130
2,867,219 UART:
2,867,235 UART: Running Caliptra FMC ...
2,867,643 UART:
2,867,786 UART: [state] CFI Enabled
2,878,583 UART: [fht] FMC Alias Private Key: 7
2,986,066 UART: [art] Extend RT PCRs Done
2,986,494 UART: [art] Lock RT PCRs Done
2,988,286 UART: [art] Populate DV Done
2,996,477 UART: [fht] FMC Alias Private Key: 7
2,997,427 UART: [art] Derive CDI
2,997,707 UART: [art] Store in in slot 0x4
3,083,188 UART: [art] Derive Key Pair
3,083,548 UART: [art] Store priv key in slot 0x5
3,096,954 UART: [art] Derive Key Pair - Done
3,112,121 UART: [art] Signing Cert with AUTHO
3,112,601 UART: RITY.KEYID = 7
3,127,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,284 UART: [art] PUB.X = CD76ECF5D699CAAA49ACF544DDB98C150ADE213D24505B25CE9DE3B36E94D579F6F635173816BFABC332ED6D162EB176
3,135,071 UART: [art] PUB.Y = 99E6E5B387017C39BA80A5DA9D067243055C1E24324D812D6C6E74AFDCAB277C946CA47EC269075AC57815738F4456BA
3,142,011 UART: [art] SIG.R = E6F63367C302E6939046DE67C299F4C8C1092AC9EFC11461CF8B9FFFD146C39DA322F53E98FE5650AFDCD901FCE60184
3,148,781 UART: [art] SIG.S = A0E3DE5347568A9ADEB66C197DBA078470C8ED6F26C7B70782322AA3365D32BA9D43D9F4C8533CDA6A0A844602337E98
3,172,716 UART: Caliptra RT
3,173,061 UART: [state] CFI Enabled
3,281,053 UART: [rt] RT listening for mailbox commands...
3,281,723 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,161 UART: [rt]cmd =0x53574545, len=84
3,313,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,567 ready_for_fw is high
1,055,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,777 >>> mbox cmd response: success
2,687,087 UART:
2,687,103 UART: Running Caliptra FMC ...
2,687,511 UART:
2,687,654 UART: [state] CFI Enabled
2,698,191 UART: [fht] FMC Alias Private Key: 7
2,805,772 UART: [art] Extend RT PCRs Done
2,806,200 UART: [art] Lock RT PCRs Done
2,808,020 UART: [art] Populate DV Done
2,816,021 UART: [fht] FMC Alias Private Key: 7
2,817,071 UART: [art] Derive CDI
2,817,351 UART: [art] Store in in slot 0x4
2,903,058 UART: [art] Derive Key Pair
2,903,418 UART: [art] Store priv key in slot 0x5
2,916,906 UART: [art] Derive Key Pair - Done
2,931,748 UART: [art] Signing Cert with AUTHO
2,932,228 UART: RITY.KEYID = 7
2,947,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,075 UART: [art] PUB.X = 661C8126BEE2926E543E764EBF9A6336BADA9377C3832B3F046FBDBAE5BF0B204DAB8F5FF79F21EE9B47A96BEF04FE95
2,954,858 UART: [art] PUB.Y = B19B3B31DBB28D3D17FB40BB8C2AA7DF726BFD7B5921DFF900F96C95CA69E722592EA06C6034EE7B711B87036DCC7189
2,961,799 UART: [art] SIG.R = D912358BDC65362753A4E322CD53450CC7D88AF5BBF2B30CA7D32BCCD99817DD8538A0C4144C47A890BFD209C4C8110B
2,968,567 UART: [art] SIG.S = 85697891605920266151F987681EE5FA74EB8D1CB7CC1D2B0BEA35FD6A9627AE4D96FEB73CD1BE25E52C26DEAF119FE2
2,991,995 UART: Caliptra RT
2,992,340 UART: [state] CFI Enabled
3,100,720 UART: [rt] RT listening for mailbox commands...
3,101,390 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,572 UART: [rt]cmd =0x53574545, len=84
3,132,901 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,023 UART:
192,391 UART: Running Caliptra ROM ...
193,542 UART:
193,694 UART: [state] CFI Enabled
265,107 UART: [state] LifecycleState = Unprovisioned
267,092 UART: [state] DebugLocked = No
268,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,850 UART: [kat] SHA2-256
443,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,090 UART: [kat] ++
454,540 UART: [kat] sha1
464,206 UART: [kat] SHA2-256
466,931 UART: [kat] SHA2-384
471,214 UART: [kat] SHA2-512-ACC
473,601 UART: [kat] ECC-384
2,767,879 UART: [kat] HMAC-384Kdf
2,799,582 UART: [kat] LMS
3,989,901 UART: [kat] --
3,994,885 UART: [cold-reset] ++
3,996,039 UART: [fht] Storing FHT @ 0x50003400
4,007,528 UART: [idev] ++
4,008,093 UART: [idev] CDI.KEYID = 6
4,008,986 UART: [idev] SUBJECT.KEYID = 7
4,010,236 UART: [idev] UDS.KEYID = 0
4,011,259 ready_for_fw is high
4,011,460 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,111 UART: [idev] Erasing UDS.KEYID = 0
7,347,613 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,852 UART: [idev] --
7,372,332 UART: [ldev] ++
7,372,922 UART: [ldev] CDI.KEYID = 6
7,373,862 UART: [ldev] SUBJECT.KEYID = 5
7,375,076 UART: [ldev] AUTHORITY.KEYID = 7
7,376,367 UART: [ldev] FE.KEYID = 1
7,422,846 UART: [ldev] Erasing FE.KEYID = 1
10,756,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,856 UART: [ldev] --
13,115,481 UART: [fwproc] Waiting for Commands...
13,117,309 UART: [fwproc] Received command 0x46574c44
13,119,490 UART: [fwproc] Received Image of size 114124 bytes
17,171,273 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,207 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,488 >>> mbox cmd response: success
17,639,975 UART: [afmc] ++
17,640,582 UART: [afmc] CDI.KEYID = 6
17,641,496 UART: [afmc] SUBJECT.KEYID = 7
17,642,775 UART: [afmc] AUTHORITY.KEYID = 5
21,007,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,685 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,939 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,326 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,190 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,138 UART: [afmc] --
23,378,240 UART: [cold-reset] --
23,382,265 UART: [state] Locking Datavault
23,386,580 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,373 UART: [state] Locking ICCM
23,390,530 UART: [exit] Launching FMC @ 0x40000130
23,398,871 UART:
23,399,110 UART: Running Caliptra FMC ...
23,400,210 UART:
23,400,368 UART: [state] CFI Enabled
23,466,113 UART: [fht] FMC Alias Private Key: 7
25,804,556 UART: [art] Extend RT PCRs Done
25,805,777 UART: [art] Lock RT PCRs Done
25,807,811 UART: [art] Populate DV Done
25,813,221 UART: [fht] FMC Alias Private Key: 7
25,814,864 UART: [art] Derive CDI
25,815,675 UART: [art] Store in in slot 0x4
25,874,611 UART: [art] Derive Key Pair
25,875,643 UART: [art] Store priv key in slot 0x5
29,168,886 UART: [art] Derive Key Pair - Done
29,181,948 UART: [art] Signing Cert with AUTHO
29,183,256 UART: RITY.KEYID = 7
31,470,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,553 UART: [art] PUB.X = E25ADD05A42AE0F445E188492E9D127D2B619DC5A448F0B57CCD141406ABF0BEA9133723E46BAC84946DB954E4990D6D
31,478,811 UART: [art] PUB.Y = 6BFEFA59681D09995BEEE937B27B8BF2CBB649E469272F32F83C0946305486F0C7AFCC0F67FCE19106B600F6E34C0FDB
31,486,059 UART: [art] SIG.R = 2626A7245698B05646918C75F6A286E8893EED41AD07E647E58D42E0ABA64867550A5F7ADD150E74F055BFD35C7A0FBF
31,493,458 UART: [art] SIG.S = A0EECD19D3367DFB36047956677A28F9286FDEEA54083931724FCA2C4CB27ACFD5A9C3A200C909A3064AC2AE0599427B
32,798,461 UART: Caliptra RT
32,799,170 UART: [state] CFI Enabled
32,960,596 UART: [rt] RT listening for mailbox commands...
32,962,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,993,050 UART: [rt]cmd =0x4d454153, len=108
32,994,876 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,784,477 ready_for_fw is high
3,784,903 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,884,427 >>> mbox cmd response: success
23,586,433 UART:
23,586,816 UART: Running Caliptra FMC ...
23,587,928 UART:
23,588,081 UART: [state] CFI Enabled
23,654,261 UART: [fht] FMC Alias Private Key: 7
25,992,301 UART: [art] Extend RT PCRs Done
25,993,532 UART: [art] Lock RT PCRs Done
25,995,049 UART: [art] Populate DV Done
26,000,627 UART: [fht] FMC Alias Private Key: 7
26,002,284 UART: [art] Derive CDI
26,003,028 UART: [art] Store in in slot 0x4
26,061,872 UART: [art] Derive Key Pair
26,062,921 UART: [art] Store priv key in slot 0x5
29,356,179 UART: [art] Derive Key Pair - Done
29,369,116 UART: [art] Signing Cert with AUTHO
29,370,453 UART: RITY.KEYID = 7
31,656,777 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,281 UART: [art] PUB.X = B5CB4A2EF6A8C9B8981717C8F6DF86497D1CD50865A2E0AFC6EF7B021BBAD43FC17EBDABA663857F0918F70FBDE69EBF
31,665,587 UART: [art] PUB.Y = 546629037379A3D72AF098DB3FC6ABC94637670FB254BD9FB2E01A6F684DBDEDA526DE1FDBA6878705ABC64BE3066BA7
31,672,866 UART: [art] SIG.R = 796F20AF6284656464B9A8DD2B4EEFF867827C0AFD79BEED6AF83A89BD2219CD1061F61CB600A9FABC768C81C84664FB
31,680,257 UART: [art] SIG.S = 198A03965ACB45D3F82FAFA033F2DC27BB72784A4A7DDA6BE14EA5A82733CBBE6C709B15E46C1D20FD4AD24AAB757DBE
32,985,698 UART: Caliptra RT
32,986,414 UART: [state] CFI Enabled
33,167,391 UART: [rt] RT listening for mailbox commands...
33,169,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,199,729 UART: [rt]cmd =0x4d454153, len=108
33,201,309 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,334 UART:
192,718 UART: Running Caliptra ROM ...
193,819 UART:
603,600 UART: [state] CFI Enabled
619,263 UART: [state] LifecycleState = Unprovisioned
621,143 UART: [state] DebugLocked = No
622,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,254 UART: [kat] SHA2-256
798,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,574 UART: [kat] ++
809,049 UART: [kat] sha1
819,138 UART: [kat] SHA2-256
821,857 UART: [kat] SHA2-384
827,862 UART: [kat] SHA2-512-ACC
830,205 UART: [kat] ECC-384
3,113,403 UART: [kat] HMAC-384Kdf
3,125,653 UART: [kat] LMS
4,315,743 UART: [kat] --
4,319,275 UART: [cold-reset] ++
4,321,785 UART: [fht] Storing FHT @ 0x50003400
4,333,066 UART: [idev] ++
4,333,635 UART: [idev] CDI.KEYID = 6
4,334,616 UART: [idev] SUBJECT.KEYID = 7
4,335,859 UART: [idev] UDS.KEYID = 0
4,336,871 ready_for_fw is high
4,337,090 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,522 UART: [idev] Erasing UDS.KEYID = 0
7,624,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,247 UART: [idev] --
7,649,518 UART: [ldev] ++
7,650,085 UART: [ldev] CDI.KEYID = 6
7,651,044 UART: [ldev] SUBJECT.KEYID = 5
7,652,250 UART: [ldev] AUTHORITY.KEYID = 7
7,653,528 UART: [ldev] FE.KEYID = 1
7,663,519 UART: [ldev] Erasing FE.KEYID = 1
10,953,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,685 UART: [ldev] --
13,314,716 UART: [fwproc] Waiting for Commands...
13,316,914 UART: [fwproc] Received command 0x46574c44
13,319,088 UART: [fwproc] Received Image of size 114124 bytes
17,365,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,930 >>> mbox cmd response: success
17,834,674 UART: [afmc] ++
17,835,269 UART: [afmc] CDI.KEYID = 6
17,836,231 UART: [afmc] SUBJECT.KEYID = 7
17,837,441 UART: [afmc] AUTHORITY.KEYID = 5
21,151,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,952 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,610 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,432 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,874 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,286 UART: [afmc] --
23,517,845 UART: [cold-reset] --
23,523,112 UART: [state] Locking Datavault
23,527,818 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,569 UART: [state] Locking ICCM
23,532,090 UART: [exit] Launching FMC @ 0x40000130
23,540,488 UART:
23,540,722 UART: Running Caliptra FMC ...
23,541,819 UART:
23,541,976 UART: [state] CFI Enabled
23,549,916 UART: [fht] FMC Alias Private Key: 7
25,880,790 UART: [art] Extend RT PCRs Done
25,882,007 UART: [art] Lock RT PCRs Done
25,883,661 UART: [art] Populate DV Done
25,888,956 UART: [fht] FMC Alias Private Key: 7
25,890,489 UART: [art] Derive CDI
25,891,215 UART: [art] Store in in slot 0x4
25,934,014 UART: [art] Derive Key Pair
25,935,013 UART: [art] Store priv key in slot 0x5
29,177,499 UART: [art] Derive Key Pair - Done
29,190,060 UART: [art] Signing Cert with AUTHO
29,191,365 UART: RITY.KEYID = 7
31,470,912 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,460 UART: [art] PUB.X = 99A79882D2CC922D02C51B51B08E09635FECCBB7369FD8B9586FCE81206D8C3BA972BEF31FD3FED7D6F2E06804843C87
31,479,664 UART: [art] PUB.Y = 850FF8AE66E17B9B47A02B4546E5DB1D0C30DF74B6350368A2766E215E1047E124DEB0B300062AB47DFCBA8EB9E56818
31,486,941 UART: [art] SIG.R = 08A1217177958D19BF9A607DC86F326595606BBB80E606DB555A19642E3F8B6594FAB1E104603967545795DA497AB2C6
31,494,277 UART: [art] SIG.S = 9338B7851360C0D9A34A8E6F109A72207EE594F794F28D0A3EDB31539FB024644A67F7D693C07219134B968946AC639A
32,798,875 UART: Caliptra RT
32,799,585 UART: [state] CFI Enabled
32,918,072 UART: [rt] RT listening for mailbox commands...
32,919,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,950,971 UART: [rt]cmd =0x4d454153, len=108
32,952,820 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
4,129,610 ready_for_fw is high
4,129,991 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,134 >>> mbox cmd response: success
23,723,015 UART:
23,723,458 UART: Running Caliptra FMC ...
23,724,572 UART:
23,724,717 UART: [state] CFI Enabled
23,732,548 UART: [fht] FMC Alias Private Key: 7
26,063,017 UART: [art] Extend RT PCRs Done
26,064,245 UART: [art] Lock RT PCRs Done
26,065,519 UART: [art] Populate DV Done
26,071,101 UART: [fht] FMC Alias Private Key: 7
26,072,751 UART: [art] Derive CDI
26,073,485 UART: [art] Store in in slot 0x4
26,115,759 UART: [art] Derive Key Pair
26,116,799 UART: [art] Store priv key in slot 0x5
29,358,964 UART: [art] Derive Key Pair - Done
29,372,177 UART: [art] Signing Cert with AUTHO
29,373,516 UART: RITY.KEYID = 7
31,652,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,193 UART: [art] PUB.X = D71AAB7270773C4588714FF024A30B40B3625B8CF6464B97EDF5862E1076F31BAD67F0896796338D4EC4C6BD09348D3B
31,661,404 UART: [art] PUB.Y = D9D08FF0ED58BCE0FB31BACD1065F8A232ACBA00AA4FD3F5A79983D75AD9C5FA01CCD404C7D136181DA2E6BE3188AF6C
31,668,672 UART: [art] SIG.R = 6892F99B5CC66F83D78A0225EF90579EEFE6C3492E3170D8254BB019E28A9B45101F976F2AD8594B19AA8E7FB4C00080
31,676,068 UART: [art] SIG.S = 71C9FCE7BD8167540F69ABAD62C6013FDF77E355ABD2B4C6304BB67AC457315FBEA398A55CD4933782CFB5D34AE42453
32,980,902 UART: Caliptra RT
32,981,618 UART: [state] CFI Enabled
33,099,815 UART: [rt] RT listening for mailbox commands...
33,101,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,132,358 UART: [rt]cmd =0x4d454153, len=108
33,134,242 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,010 UART:
192,376 UART: Running Caliptra ROM ...
193,581 UART:
193,735 UART: [state] CFI Enabled
266,797 UART: [state] LifecycleState = Unprovisioned
268,711 UART: [state] DebugLocked = No
271,593 UART: [state] WD Timer not started. Device not locked for debugging
275,480 UART: [kat] SHA2-256
454,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,153 UART: [kat] ++
466,707 UART: [kat] sha1
477,025 UART: [kat] SHA2-256
480,037 UART: [kat] SHA2-384
485,954 UART: [kat] SHA2-512-ACC
488,885 UART: [kat] ECC-384
2,949,899 UART: [kat] HMAC-384Kdf
2,973,430 UART: [kat] LMS
3,502,889 UART: [kat] --
3,507,450 UART: [cold-reset] ++
3,508,735 UART: [fht] FHT @ 0x50003400
3,518,961 UART: [idev] ++
3,519,527 UART: [idev] CDI.KEYID = 6
3,520,409 UART: [idev] SUBJECT.KEYID = 7
3,521,649 UART: [idev] UDS.KEYID = 0
3,522,571 ready_for_fw is high
3,522,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,138 UART: [idev] Erasing UDS.KEYID = 0
6,028,491 UART: [idev] Sha1 KeyId Algorithm
6,051,553 UART: [idev] --
6,057,035 UART: [ldev] ++
6,057,613 UART: [ldev] CDI.KEYID = 6
6,058,499 UART: [ldev] SUBJECT.KEYID = 5
6,059,712 UART: [ldev] AUTHORITY.KEYID = 7
6,060,997 UART: [ldev] FE.KEYID = 1
6,100,918 UART: [ldev] Erasing FE.KEYID = 1
8,604,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,477 UART: [ldev] --
10,414,527 UART: [fwproc] Wait for Commands...
10,416,592 UART: [fwproc] Recv command 0x46574c44
10,418,691 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,632 >>> mbox cmd response: success
14,278,608 UART: [afmc] ++
14,279,207 UART: [afmc] CDI.KEYID = 6
14,280,124 UART: [afmc] SUBJECT.KEYID = 7
14,281,282 UART: [afmc] AUTHORITY.KEYID = 5
16,805,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,470 UART: [afmc] --
18,607,981 UART: [cold-reset] --
18,612,485 UART: [state] Locking Datavault
18,617,170 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,820 UART: [state] Locking ICCM
18,620,051 UART: [exit] Launching FMC @ 0x40000130
18,628,446 UART:
18,628,679 UART: Running Caliptra FMC ...
18,629,778 UART:
18,629,936 UART: [state] CFI Enabled
18,688,931 UART: [fht] FMC Alias Private Key: 7
20,453,614 UART: [art] Extend RT PCRs Done
20,454,839 UART: [art] Lock RT PCRs Done
20,456,516 UART: [art] Populate DV Done
20,461,870 UART: [fht] FMC Alias Private Key: 7
20,463,358 UART: [art] Derive CDI
20,464,139 UART: [art] Store in in slot 0x4
20,521,555 UART: [art] Derive Key Pair
20,522,553 UART: [art] Store priv key in slot 0x5
22,985,113 UART: [art] Derive Key Pair - Done
22,997,997 UART: [art] Signing Cert with AUTHO
22,999,300 UART: RITY.KEYID = 7
24,711,800 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,309 UART: [art] PUB.X = 7249B2FD5FC43DEEE2E31F6844AB8E002499853E85874F1A5833826C958B9D0CE5EF9942C70C51A4D1EFC19A4B447EA4
24,720,557 UART: [art] PUB.Y = A1F6EB9D301D83EC546B99D4DAB2A83106D9D5E1D90795AE80BE31828414BEA3C806CCC9F34224B4E9E71AB5150D721E
24,727,838 UART: [art] SIG.R = 4EA8DC33769055D4209CC6820D683A9B56FB4FF885B18B72703D36F60D0EC24DF516610278ADBAEAAC0859C476EFFE23
24,735,171 UART: [art] SIG.S = 845D568C6B52DEE503F5610E644200EBD2D689D750F3AB9261A008098DBEEA66E268B6C785F77C6E8E58EF051ED9E181
25,714,280 UART: Caliptra RT
25,714,978 UART: [state] CFI Enabled
25,879,749 UART: [rt] RT listening for mailbox commands...
25,881,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,912,904 UART: [rt]cmd =0x4d454153, len=108
25,914,816 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,361,032 ready_for_fw is high
3,361,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,018,770 >>> mbox cmd response: success
18,301,654 UART:
18,302,059 UART: Running Caliptra FMC ...
18,303,169 UART:
18,303,324 UART: [state] CFI Enabled
18,367,442 UART: [fht] FMC Alias Private Key: 7
20,131,230 UART: [art] Extend RT PCRs Done
20,132,447 UART: [art] Lock RT PCRs Done
20,134,181 UART: [art] Populate DV Done
20,139,430 UART: [fht] FMC Alias Private Key: 7
20,141,144 UART: [art] Derive CDI
20,141,984 UART: [art] Store in in slot 0x4
20,200,334 UART: [art] Derive Key Pair
20,201,370 UART: [art] Store priv key in slot 0x5
22,664,189 UART: [art] Derive Key Pair - Done
22,676,919 UART: [art] Signing Cert with AUTHO
22,678,289 UART: RITY.KEYID = 7
24,390,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,391,683 UART: [art] PUB.X = B5839BE34BC67D18B5EE66F2802279AE37090345CACE0B1285C14CB0D00496681743DA71726A5EAE147779982928CC19
24,398,985 UART: [art] PUB.Y = 68EEFA9FACB9668340523F565DF43840077E53BE3BDBE3424D37BE63CD74FD580695C78227C7E7D3DA004F8195732163
24,406,189 UART: [art] SIG.R = EF2D7E6F50759B98A9C3CCE332A0271EB8F8FCFEAC32DFB0479AC367CB39BD5AFF324E97D227B3CD18CEFFD8B5232863
24,413,643 UART: [art] SIG.S = 810F620A272268F866961523EC190E7D9C1E82AA8372FC9D4D05C172DF5928DAC1081091750A58CA3CCBB4C468F67C86
25,392,973 UART: Caliptra RT
25,393,682 UART: [state] CFI Enabled
25,558,210 UART: [rt] RT listening for mailbox commands...
25,560,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,591,517 UART: [rt]cmd =0x4d454153, len=108
25,593,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,245 UART:
192,616 UART: Running Caliptra ROM ...
193,717 UART:
603,552 UART: [state] CFI Enabled
621,228 UART: [state] LifecycleState = Unprovisioned
623,155 UART: [state] DebugLocked = No
625,067 UART: [state] WD Timer not started. Device not locked for debugging
629,252 UART: [kat] SHA2-256
808,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,955 UART: [kat] ++
820,483 UART: [kat] sha1
831,357 UART: [kat] SHA2-256
834,358 UART: [kat] SHA2-384
839,843 UART: [kat] SHA2-512-ACC
842,837 UART: [kat] ECC-384
3,283,362 UART: [kat] HMAC-384Kdf
3,296,663 UART: [kat] LMS
3,826,192 UART: [kat] --
3,831,610 UART: [cold-reset] ++
3,833,247 UART: [fht] FHT @ 0x50003400
3,845,376 UART: [idev] ++
3,845,929 UART: [idev] CDI.KEYID = 6
3,846,802 UART: [idev] SUBJECT.KEYID = 7
3,848,033 UART: [idev] UDS.KEYID = 0
3,848,951 ready_for_fw is high
3,849,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,964 UART: [idev] Erasing UDS.KEYID = 0
6,322,608 UART: [idev] Sha1 KeyId Algorithm
6,345,795 UART: [idev] --
6,349,734 UART: [ldev] ++
6,350,297 UART: [ldev] CDI.KEYID = 6
6,351,199 UART: [ldev] SUBJECT.KEYID = 5
6,352,406 UART: [ldev] AUTHORITY.KEYID = 7
6,353,627 UART: [ldev] FE.KEYID = 1
6,365,234 UART: [ldev] Erasing FE.KEYID = 1
8,842,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,772 UART: [ldev] --
10,634,244 UART: [fwproc] Wait for Commands...
10,636,868 UART: [fwproc] Recv command 0x46574c44
10,638,947 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,502,408 >>> mbox cmd response: success
14,507,263 UART: [afmc] ++
14,507,857 UART: [afmc] CDI.KEYID = 6
14,508,758 UART: [afmc] SUBJECT.KEYID = 7
14,509,911 UART: [afmc] AUTHORITY.KEYID = 5
17,008,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,358 UART: [afmc] --
18,808,061 UART: [cold-reset] --
18,812,996 UART: [state] Locking Datavault
18,817,373 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,010 UART: [state] Locking ICCM
18,821,672 UART: [exit] Launching FMC @ 0x40000130
18,830,057 UART:
18,830,290 UART: Running Caliptra FMC ...
18,831,382 UART:
18,831,536 UART: [state] CFI Enabled
18,839,539 UART: [fht] FMC Alias Private Key: 7
20,596,804 UART: [art] Extend RT PCRs Done
20,598,047 UART: [art] Lock RT PCRs Done
20,599,676 UART: [art] Populate DV Done
20,604,920 UART: [fht] FMC Alias Private Key: 7
20,606,624 UART: [art] Derive CDI
20,607,617 UART: [art] Store in in slot 0x4
20,650,271 UART: [art] Derive Key Pair
20,651,268 UART: [art] Store priv key in slot 0x5
23,078,294 UART: [art] Derive Key Pair - Done
23,091,348 UART: [art] Signing Cert with AUTHO
23,092,672 UART: RITY.KEYID = 7
24,798,056 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,558 UART: [art] PUB.X = 430EA231B1F959914EF8BFB8C9E80BC0A5607FB76D124F2CCD2246E0E30E6D41719764AEAE90F38D6568A69D1D3AC9CB
24,806,839 UART: [art] PUB.Y = 7D93EE35F0B67D9A7211B7AA509424FC7BB40572E078D3D5D616D3AD2104CEC30AC87AA99C6130A122EFD8CC495AE8CE
24,814,155 UART: [art] SIG.R = DF518CB615A18913C50317B91A0F1B3D9A0C9B2F92BDC11FB9FF92B2192913F9694F814511EFB3F7FBBC5546867F7152
24,821,556 UART: [art] SIG.S = B496F669A4F468CFFFE7B2FB28838322646A7823DFB26BB0B0F838D95ECA023798CF0FF1B3FC65DDD1FF04D545ACEBC2
25,800,193 UART: Caliptra RT
25,800,911 UART: [state] CFI Enabled
25,916,975 UART: [rt] RT listening for mailbox commands...
25,918,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,949,793 UART: [rt]cmd =0x4d454153, len=108
25,951,694 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,700,577 ready_for_fw is high
3,701,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,670 >>> mbox cmd response: success
18,522,358 UART:
18,522,752 UART: Running Caliptra FMC ...
18,523,845 UART:
18,524,012 UART: [state] CFI Enabled
18,531,799 UART: [fht] FMC Alias Private Key: 7
20,289,594 UART: [art] Extend RT PCRs Done
20,290,868 UART: [art] Lock RT PCRs Done
20,292,414 UART: [art] Populate DV Done
20,298,044 UART: [fht] FMC Alias Private Key: 7
20,299,588 UART: [art] Derive CDI
20,300,395 UART: [art] Store in in slot 0x4
20,343,482 UART: [art] Derive Key Pair
20,344,522 UART: [art] Store priv key in slot 0x5
22,771,275 UART: [art] Derive Key Pair - Done
22,784,277 UART: [art] Signing Cert with AUTHO
22,785,579 UART: RITY.KEYID = 7
24,490,900 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,384 UART: [art] PUB.X = C6EA6D5D111990B1BA5582C6DE61B73D603624392763A4FA13ED39F2C99C14247449732E3CD24E58F4DB2C03024009CE
24,499,670 UART: [art] PUB.Y = FEAD8B7DB5FDC31B56F5095FA597802C14E3F8A022288C1AD61D767737F2A5C27C8B66833237AF70124794A68015CA80
24,506,938 UART: [art] SIG.R = 0BE15D140837A4FAA1F2CDB9DCD9A09C7BFDEF092315EDE84C4B882D05C9CD12266A2320CF064CBE45E7601860CB0540
24,514,329 UART: [art] SIG.S = 49B42836A83A1A1B1569217DD17BC6ABF7BE19B1FA224754347147F15CEDFFC0F6874FF31D7E771A5E3BC9D7E91D39A8
25,493,757 UART: Caliptra RT
25,494,473 UART: [state] CFI Enabled
25,610,476 UART: [rt] RT listening for mailbox commands...
25,612,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,643,083 UART: [rt]cmd =0x4d454153, len=108
25,644,881 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,958 UART:
192,315 UART: Running Caliptra ROM ...
193,422 UART:
193,564 UART: [state] CFI Enabled
264,119 UART: [state] LifecycleState = Unprovisioned
266,533 UART: [state] DebugLocked = No
268,418 UART: [state] WD Timer not started. Device not locked for debugging
273,448 UART: [kat] SHA2-256
463,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,077 UART: [kat] ++
474,537 UART: [kat] sha1
485,979 UART: [kat] SHA2-256
488,995 UART: [kat] SHA2-384
495,480 UART: [kat] SHA2-512-ACC
498,060 UART: [kat] ECC-384
2,946,833 UART: [kat] HMAC-384Kdf
2,972,489 UART: [kat] LMS
3,504,238 UART: [kat] --
3,510,144 UART: [cold-reset] ++
3,511,998 UART: [fht] FHT @ 0x50003400
3,522,140 UART: [idev] ++
3,522,719 UART: [idev] CDI.KEYID = 6
3,523,640 UART: [idev] SUBJECT.KEYID = 7
3,524,820 UART: [idev] UDS.KEYID = 0
3,525,743 ready_for_fw is high
3,525,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,892 UART: [idev] Erasing UDS.KEYID = 0
6,028,648 UART: [idev] Sha1 KeyId Algorithm
6,051,558 UART: [idev] --
6,056,432 UART: [ldev] ++
6,057,132 UART: [ldev] CDI.KEYID = 6
6,058,049 UART: [ldev] SUBJECT.KEYID = 5
6,059,213 UART: [ldev] AUTHORITY.KEYID = 7
6,060,442 UART: [ldev] FE.KEYID = 1
6,101,340 UART: [ldev] Erasing FE.KEYID = 1
8,609,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,812 UART: [ldev] --
10,414,696 UART: [fwproc] Wait for Commands...
10,416,842 UART: [fwproc] Recv command 0x46574c44
10,419,149 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,607,749 >>> mbox cmd response: success
14,612,461 UART: [afmc] ++
14,613,189 UART: [afmc] CDI.KEYID = 6
14,614,379 UART: [afmc] SUBJECT.KEYID = 7
14,615,815 UART: [afmc] AUTHORITY.KEYID = 5
17,145,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,958 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,327 UART: [afmc] --
18,947,466 UART: [cold-reset] --
18,950,250 UART: [state] Locking Datavault
18,956,202 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,401 UART: [state] Locking ICCM
18,961,205 UART: [exit] Launching FMC @ 0x40000130
18,969,873 UART:
18,970,105 UART: Running Caliptra FMC ...
18,971,200 UART:
18,971,365 UART: [state] CFI Enabled
19,030,998 UART: [fht] FMC Alias Private Key: 7
20,794,907 UART: [art] Extend RT PCRs Done
20,796,121 UART: [art] Lock RT PCRs Done
20,797,880 UART: [art] Populate DV Done
20,803,340 UART: [fht] FMC Alias Private Key: 7
20,804,989 UART: [art] Derive CDI
20,805,727 UART: [art] Store in in slot 0x4
20,863,369 UART: [art] Derive Key Pair
20,864,408 UART: [art] Store priv key in slot 0x5
23,328,017 UART: [art] Derive Key Pair - Done
23,341,014 UART: [art] Signing Cert with AUTHO
23,342,355 UART: RITY.KEYID = 7
25,053,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,778 UART: [art] PUB.X = AEEBF5084A4EA6626FBDC2F3D1DC324DCE93BE2D4BADCB92CB5043E5D2A430675029F7A3F233C737E0BCD7826B677835
25,062,075 UART: [art] PUB.Y = 4DE39177E246B81A72AAD89F23E28C0DE191462771512231E84A26975CEA6A52FA1B11C1659197A392A781181503CB3F
25,069,301 UART: [art] SIG.R = C343CAB542B5437CEC570337661A958816E5B85D542DCE492CA46ABDCF786718EFF08C679B71285EC4336F3B31026BBF
25,076,707 UART: [art] SIG.S = B443E37D0CACBAFDCA852DD25B80C5C78C1EDDEAE1E7A33D2514F14F53BEB26D9CB9F0B914C815D413A0B4141225E524
26,055,488 UART: Caliptra RT
26,056,196 UART: [state] CFI Enabled
26,221,828 UART: [rt] RT listening for mailbox commands...
26,223,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,255,197 UART: [rt]cmd =0x4d454153, len=108
26,257,192 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,438,696 ready_for_fw is high
3,439,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,748,535 >>> mbox cmd response: success
19,041,569 UART:
19,041,953 UART: Running Caliptra FMC ...
19,043,152 UART:
19,043,326 UART: [state] CFI Enabled
19,094,707 UART: [fht] FMC Alias Private Key: 7
20,858,815 UART: [art] Extend RT PCRs Done
20,860,034 UART: [art] Lock RT PCRs Done
20,861,853 UART: [art] Populate DV Done
20,867,428 UART: [fht] FMC Alias Private Key: 7
20,869,023 UART: [art] Derive CDI
20,869,842 UART: [art] Store in in slot 0x4
20,928,342 UART: [art] Derive Key Pair
20,929,357 UART: [art] Store priv key in slot 0x5
23,392,608 UART: [art] Derive Key Pair - Done
23,405,387 UART: [art] Signing Cert with AUTHO
23,406,686 UART: RITY.KEYID = 7
25,118,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,888 UART: [art] PUB.X = 8D974E5E17DE56428377FC42842EA21A033E97CE02A568164C1D9816864395852B8C3F0B928BC194C4C79310C3ED1C73
25,127,129 UART: [art] PUB.Y = 58FA77FB74ECFBAAC815E4D04FAEC2032BAE83BE3895CD34A205E5F1FBDA13DC32AED5A287057679DD16C23A536CD452
25,134,387 UART: [art] SIG.R = B023B9CC7D3205F81B814B31096817FE1A9355EE4A8CB79392166BE0BAF2B91D1B3CDECDF7644C8354CAC36719B23A5C
25,141,774 UART: [art] SIG.S = D287AB2320524C857BDAFD5970914AEB9483274D6ACE46A7DF5AB24B818E60A2D262C8F923AF16DFDCC5B5F373D96723
26,120,929 UART: Caliptra RT
26,121,637 UART: [state] CFI Enabled
26,287,340 UART: [rt] RT listening for mailbox commands...
26,289,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,320,382 UART: [rt]cmd =0x4d454153, len=108
26,322,333 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,430 UART:
192,799 UART: Running Caliptra ROM ...
193,903 UART:
603,804 UART: [state] CFI Enabled
618,025 UART: [state] LifecycleState = Unprovisioned
620,406 UART: [state] DebugLocked = No
621,927 UART: [state] WD Timer not started. Device not locked for debugging
625,734 UART: [kat] SHA2-256
815,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,441 UART: [kat] ++
827,040 UART: [kat] sha1
838,661 UART: [kat] SHA2-256
841,640 UART: [kat] SHA2-384
848,266 UART: [kat] SHA2-512-ACC
850,837 UART: [kat] ECC-384
3,290,805 UART: [kat] HMAC-384Kdf
3,304,092 UART: [kat] LMS
3,835,918 UART: [kat] --
3,839,200 UART: [cold-reset] ++
3,840,480 UART: [fht] FHT @ 0x50003400
3,852,721 UART: [idev] ++
3,853,414 UART: [idev] CDI.KEYID = 6
3,854,386 UART: [idev] SUBJECT.KEYID = 7
3,855,547 UART: [idev] UDS.KEYID = 0
3,856,540 ready_for_fw is high
3,856,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,808 UART: [idev] Erasing UDS.KEYID = 0
6,331,638 UART: [idev] Sha1 KeyId Algorithm
6,353,360 UART: [idev] --
6,359,163 UART: [ldev] ++
6,359,844 UART: [ldev] CDI.KEYID = 6
6,360,747 UART: [ldev] SUBJECT.KEYID = 5
6,361,949 UART: [ldev] AUTHORITY.KEYID = 7
6,363,117 UART: [ldev] FE.KEYID = 1
6,374,832 UART: [ldev] Erasing FE.KEYID = 1
8,854,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,763 UART: [ldev] --
10,646,797 UART: [fwproc] Wait for Commands...
10,648,452 UART: [fwproc] Recv command 0x46574c44
10,650,695 UART: [fwproc] Recv'd Img size: 114448 bytes
14,097,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,453 >>> mbox cmd response: success
14,840,401 UART: [afmc] ++
14,841,106 UART: [afmc] CDI.KEYID = 6
14,842,284 UART: [afmc] SUBJECT.KEYID = 7
14,843,767 UART: [afmc] AUTHORITY.KEYID = 5
17,346,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,966 UART: [afmc] --
19,139,687 UART: [cold-reset] --
19,143,403 UART: [state] Locking Datavault
19,148,713 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,901 UART: [state] Locking ICCM
19,153,006 UART: [exit] Launching FMC @ 0x40000130
19,161,631 UART:
19,161,860 UART: Running Caliptra FMC ...
19,162,952 UART:
19,163,105 UART: [state] CFI Enabled
19,171,355 UART: [fht] FMC Alias Private Key: 7
20,927,527 UART: [art] Extend RT PCRs Done
20,928,745 UART: [art] Lock RT PCRs Done
20,930,411 UART: [art] Populate DV Done
20,935,597 UART: [fht] FMC Alias Private Key: 7
20,937,234 UART: [art] Derive CDI
20,938,039 UART: [art] Store in in slot 0x4
20,980,895 UART: [art] Derive Key Pair
20,981,908 UART: [art] Store priv key in slot 0x5
23,408,865 UART: [art] Derive Key Pair - Done
23,421,963 UART: [art] Signing Cert with AUTHO
23,423,252 UART: RITY.KEYID = 7
25,128,625 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,131 UART: [art] PUB.X = 32BD1170CDD31BA2DE25187A8A2AFF0A3F4239F185837BD51D1A6293ABEE5EF7BBAF32E2EF0CB155C1963B7D3B601A5D
25,137,459 UART: [art] PUB.Y = 94ADD51CE59CAC062EC591414D0D9ABF7FF6239137E5A12FA885EC1787A3CEB62E004B6200BA45BB43524B811416B7D8
25,144,666 UART: [art] SIG.R = 4B59E36EAEFD77C7710E7D54A53573AC36FE78C2439956DD52CEFB1403C28244A6164BC2BC6F61B34312F8C3BF56B6B6
25,152,063 UART: [art] SIG.S = 13DE031CB150EB7E1CC173F4B24E81E9378DB022366A47CC434B5B2D7BB97FEFE46D4CB6049585796864A4969AFA11A2
26,131,110 UART: Caliptra RT
26,131,791 UART: [state] CFI Enabled
26,247,546 UART: [rt] RT listening for mailbox commands...
26,249,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,279,969 UART: [rt]cmd =0x4d454153, len=108
26,281,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,753,919 ready_for_fw is high
3,754,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,076 >>> mbox cmd response: success
19,216,262 UART:
19,216,649 UART: Running Caliptra FMC ...
19,217,772 UART:
19,217,945 UART: [state] CFI Enabled
19,225,874 UART: [fht] FMC Alias Private Key: 7
20,983,000 UART: [art] Extend RT PCRs Done
20,984,218 UART: [art] Lock RT PCRs Done
20,985,836 UART: [art] Populate DV Done
20,991,406 UART: [fht] FMC Alias Private Key: 7
20,993,117 UART: [art] Derive CDI
20,993,925 UART: [art] Store in in slot 0x4
21,036,626 UART: [art] Derive Key Pair
21,037,674 UART: [art] Store priv key in slot 0x5
23,464,621 UART: [art] Derive Key Pair - Done
23,477,564 UART: [art] Signing Cert with AUTHO
23,478,865 UART: RITY.KEYID = 7
25,184,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,618 UART: [art] PUB.X = 3F632952A981BA99980F74D3E0D20FE614220C1B419FE910BF16801F389EF4AFEE4E255E61503E6797DD4890BC621502
25,192,898 UART: [art] PUB.Y = 063066C181F6F0126A3F48693E076AC523353009D81CB89C7E416A0F17D517DA98EDE942734D5063A603E096FB9ADE52
25,200,094 UART: [art] SIG.R = A43DB251AC00FA26F7628180E869CC0FB1B922F3665DA6A5C7CA7A6DC7DC86F5EE23AADD0B092F462EB20E33AF963218
25,207,535 UART: [art] SIG.S = 0F30BB119BE36CF51AF440015AC7EF8D19B431CBA875DC5B3360125E4512530EFDED8139B24F0AD03D912C2240BA0852
26,186,739 UART: Caliptra RT
26,187,446 UART: [state] CFI Enabled
26,304,847 UART: [rt] RT listening for mailbox commands...
26,306,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,495 UART: [rt]cmd =0x4d454153, len=108
26,339,770 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,835 UART: [kat] SHA2-256
881,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,881 UART: [kat] ++
886,033 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,475,849 UART: [cold-reset] ++
1,476,401 UART: [fht] Storing FHT @ 0x50003400
1,479,182 UART: [idev] ++
1,479,350 UART: [idev] CDI.KEYID = 6
1,479,710 UART: [idev] SUBJECT.KEYID = 7
1,480,134 UART: [idev] UDS.KEYID = 0
1,480,479 ready_for_fw is high
1,480,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,000 UART: [idev] Erasing UDS.KEYID = 0
1,505,388 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,084 UART: [idev] --
1,515,075 UART: [ldev] ++
1,515,243 UART: [ldev] CDI.KEYID = 6
1,515,606 UART: [ldev] SUBJECT.KEYID = 5
1,516,032 UART: [ldev] AUTHORITY.KEYID = 7
1,516,495 UART: [ldev] FE.KEYID = 1
1,521,727 UART: [ldev] Erasing FE.KEYID = 1
1,547,610 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,280 UART: [ldev] --
1,586,549 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 114448 bytes
2,887,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,187 >>> mbox cmd response: success
3,081,297 UART: [afmc] ++
3,081,465 UART: [afmc] CDI.KEYID = 6
3,081,827 UART: [afmc] SUBJECT.KEYID = 7
3,082,252 UART: [afmc] AUTHORITY.KEYID = 5
3,117,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,152 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,842 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,681 UART: [afmc] --
3,160,623 UART: [cold-reset] --
3,161,651 UART: [state] Locking Datavault
3,162,944 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,548 UART: [state] Locking ICCM
3,164,042 UART: [exit] Launching FMC @ 0x40000130
3,169,371 UART:
3,169,387 UART: Running Caliptra FMC ...
3,169,795 UART:
3,169,849 UART: [state] CFI Enabled
3,180,200 UART: [fht] FMC Alias Private Key: 7
3,287,849 UART: [art] Extend RT PCRs Done
3,288,277 UART: [art] Lock RT PCRs Done
3,289,961 UART: [art] Populate DV Done
3,298,152 UART: [fht] FMC Alias Private Key: 7
3,299,200 UART: [art] Derive CDI
3,299,480 UART: [art] Store in in slot 0x4
3,385,139 UART: [art] Derive Key Pair
3,385,499 UART: [art] Store priv key in slot 0x5
3,398,379 UART: [art] Derive Key Pair - Done
3,413,121 UART: [art] Signing Cert with AUTHO
3,413,601 UART: RITY.KEYID = 7
3,429,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,100 UART: [art] PUB.X = B86EC3E305CE8F20BD78781AF409C4BE257327B9A689B6D39639FCB58F820E16C17D520556FDD6CFD36F89BD98687B75
3,436,866 UART: [art] PUB.Y = E2C0451282D69508838FAB80F56F990ACB30A6D14AB01FF78FE33C82A29A9B78C9D20C065CC56F5FD804C16DFAFCED4A
3,443,819 UART: [art] SIG.R = 05726A31F91D97C45EB9A67935E09A0253A68DA132438A86C43CBEFE249EBFA477F39AE18E8F580FF91929045D1EB82F
3,450,583 UART: [art] SIG.S = 9A9E16D5F93C6A4422D4CFBF03ECC3151F99B6A9C0CB0D2049BF0E8CB6B54E46866F03219DE27AD910DFCF7E191602ED
3,474,649 UART: Caliptra RT
3,474,902 UART: [state] CFI Enabled
3,583,009 UART: [rt] RT listening for mailbox commands...
3,583,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,097 UART: [rt]cmd =0x4d454153, len=108
3,615,687 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,667 >>> mbox cmd response: success
2,991,627 UART:
2,991,643 UART: Running Caliptra FMC ...
2,992,051 UART:
2,992,105 UART: [state] CFI Enabled
3,002,570 UART: [fht] FMC Alias Private Key: 7
3,110,251 UART: [art] Extend RT PCRs Done
3,110,679 UART: [art] Lock RT PCRs Done
3,112,467 UART: [art] Populate DV Done
3,120,952 UART: [fht] FMC Alias Private Key: 7
3,122,052 UART: [art] Derive CDI
3,122,332 UART: [art] Store in in slot 0x4
3,207,929 UART: [art] Derive Key Pair
3,208,289 UART: [art] Store priv key in slot 0x5
3,221,173 UART: [art] Derive Key Pair - Done
3,236,265 UART: [art] Signing Cert with AUTHO
3,236,745 UART: RITY.KEYID = 7
3,251,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,504 UART: [art] PUB.X = BEA51BCC2992F26C18D3A249768846F26950120CC41775FBFD084A936868F20AF66DDA370A6CC927F57CCCDC3F70C830
3,259,270 UART: [art] PUB.Y = 7F32D80007FB8590C7867200162DC5F49FE592BB3B96DA8B7EE646D6863919FFADE9B041C9AB6B076D27F10DA1554A34
3,266,173 UART: [art] SIG.R = A10A543E05B701E2726504B2867BA5D0836693460F0FDAB8B623D7450226C1832873ECB1A57B09E2B7C971A29110B77E
3,272,913 UART: [art] SIG.S = 5DC0C5B9FA4E9612D54828E71F4D1A61352F7681FDEAB04098DBA26097FA7BA4EA67C0DF38B0008E208FE1497EA83EDA
3,296,858 UART: Caliptra RT
3,297,111 UART: [state] CFI Enabled
3,404,040 UART: [rt] RT listening for mailbox commands...
3,404,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,178 UART: [rt]cmd =0x4d454153, len=108
3,436,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
891,020 UART: [kat] SHA2-256
892,958 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,451 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,204 UART: [cold-reset] ++
1,477,572 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 ready_for_fw is high
1,481,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,221 UART: [idev] Erasing UDS.KEYID = 0
1,505,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,599 UART: [idev] --
1,515,642 UART: [ldev] ++
1,515,810 UART: [ldev] CDI.KEYID = 6
1,516,173 UART: [ldev] SUBJECT.KEYID = 5
1,516,599 UART: [ldev] AUTHORITY.KEYID = 7
1,517,062 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,815 UART: [ldev] --
1,587,144 UART: [fwproc] Waiting for Commands...
1,587,875 UART: [fwproc] Received command 0x46574c44
1,588,666 UART: [fwproc] Received Image of size 114448 bytes
2,888,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,855 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,274 >>> mbox cmd response: success
3,082,296 UART: [afmc] ++
3,082,464 UART: [afmc] CDI.KEYID = 6
3,082,826 UART: [afmc] SUBJECT.KEYID = 7
3,083,251 UART: [afmc] AUTHORITY.KEYID = 5
3,117,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,571 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,261 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,066 UART: [afmc] --
3,161,050 UART: [cold-reset] --
3,161,986 UART: [state] Locking Datavault
3,163,267 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,871 UART: [state] Locking ICCM
3,164,475 UART: [exit] Launching FMC @ 0x40000130
3,169,804 UART:
3,169,820 UART: Running Caliptra FMC ...
3,170,228 UART:
3,170,371 UART: [state] CFI Enabled
3,180,926 UART: [fht] FMC Alias Private Key: 7
3,288,679 UART: [art] Extend RT PCRs Done
3,289,107 UART: [art] Lock RT PCRs Done
3,290,745 UART: [art] Populate DV Done
3,298,818 UART: [fht] FMC Alias Private Key: 7
3,299,938 UART: [art] Derive CDI
3,300,218 UART: [art] Store in in slot 0x4
3,386,473 UART: [art] Derive Key Pair
3,386,833 UART: [art] Store priv key in slot 0x5
3,400,721 UART: [art] Derive Key Pair - Done
3,415,799 UART: [art] Signing Cert with AUTHO
3,416,279 UART: RITY.KEYID = 7
3,431,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,254 UART: [art] PUB.X = F736E062EBA26B6B05F8DA870DFB486B706373273D570868F71EBB9B7975A5C4286E423AC0B74033715914DCB8CBC530
3,439,017 UART: [art] PUB.Y = 94C470AC8E113BF6687AB3683485D13BFC7DD5BCFA35DCB2FB2583BFEBBE41BCE80B0DBE01E382F716B38FAB96B5CEE1
3,445,988 UART: [art] SIG.R = 0FD832A2AA13E8AFD5D26CD0F36E3549DDF4E17ECF07CBD7424DB19A0DBF64BB760215BF13F72BF69C13F9455FE85913
3,452,766 UART: [art] SIG.S = CC79D4E67FC8EEE79D3DB191679C1FC3522BF62E04F692490DDC329AADC9DC09B5EDF897BAC39B053F2780D4857250A6
3,476,511 UART: Caliptra RT
3,476,856 UART: [state] CFI Enabled
3,584,193 UART: [rt] RT listening for mailbox commands...
3,584,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,503 UART: [rt]cmd =0x4d454153, len=108
3,617,349 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,778 ready_for_fw is high
1,362,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,072 >>> mbox cmd response: success
2,992,340 UART:
2,992,356 UART: Running Caliptra FMC ...
2,992,764 UART:
2,992,907 UART: [state] CFI Enabled
3,003,226 UART: [fht] FMC Alias Private Key: 7
3,110,785 UART: [art] Extend RT PCRs Done
3,111,213 UART: [art] Lock RT PCRs Done
3,112,865 UART: [art] Populate DV Done
3,121,016 UART: [fht] FMC Alias Private Key: 7
3,122,110 UART: [art] Derive CDI
3,122,390 UART: [art] Store in in slot 0x4
3,207,993 UART: [art] Derive Key Pair
3,208,353 UART: [art] Store priv key in slot 0x5
3,221,097 UART: [art] Derive Key Pair - Done
3,235,898 UART: [art] Signing Cert with AUTHO
3,236,378 UART: RITY.KEYID = 7
3,251,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,477 UART: [art] PUB.X = 7D2E0A8FA9FA98D94E83D557A1989F1449E1A8E4D381C657AD86F8B61D280C9097BD383032E356872172B73B2635B013
3,259,237 UART: [art] PUB.Y = C3EE6BD581ED940E99DDD65AB1DEC5E7D297CDED441FF7FC5270C7B53FEDDB22CAAB8723FBC2B85719735C0963583292
3,266,203 UART: [art] SIG.R = 939E75707924C0C9F14135EE3374BC10D00541047258D186267A6674864D206A0EB3A172BD9C471FFC9A09F3C228B9B5
3,272,953 UART: [art] SIG.S = 4B7161F85F98E8C58B2BF4193D810571D0ACCAD57D62EE15EEDB9059C6859CB0790F49AEE1528031C66B9BD29C57FEA8
3,296,546 UART: Caliptra RT
3,296,891 UART: [state] CFI Enabled
3,405,824 UART: [rt] RT listening for mailbox commands...
3,406,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,796 UART: [rt]cmd =0x4d454153, len=108
3,438,110 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
902,197 UART: [kat] SHA2-256
904,137 UART: [kat] SHA2-384
906,830 UART: [kat] SHA2-512-ACC
908,731 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
923,090 UART: [kat] LMS
1,171,418 UART: [kat] --
1,172,397 UART: [cold-reset] ++
1,172,925 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,402 UART: [idev] Erasing UDS.KEYID = 0
1,201,649 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,221 UART: [ldev] ++
1,211,389 UART: [ldev] CDI.KEYID = 6
1,211,752 UART: [ldev] SUBJECT.KEYID = 5
1,212,178 UART: [ldev] AUTHORITY.KEYID = 7
1,212,641 UART: [ldev] FE.KEYID = 1
1,217,763 UART: [ldev] Erasing FE.KEYID = 1
1,244,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,535 UART: [ldev] --
1,284,020 UART: [fwproc] Wait for Commands...
1,284,718 UART: [fwproc] Recv command 0x46574c44
1,285,446 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,970 >>> mbox cmd response: success
2,778,018 UART: [afmc] ++
2,778,186 UART: [afmc] CDI.KEYID = 6
2,778,548 UART: [afmc] SUBJECT.KEYID = 7
2,778,973 UART: [afmc] AUTHORITY.KEYID = 5
2,814,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,899 UART: [afmc] --
2,857,807 UART: [cold-reset] --
2,858,469 UART: [state] Locking Datavault
2,859,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,264 UART: [state] Locking ICCM
2,860,776 UART: [exit] Launching FMC @ 0x40000130
2,866,105 UART:
2,866,121 UART: Running Caliptra FMC ...
2,866,529 UART:
2,866,583 UART: [state] CFI Enabled
2,877,358 UART: [fht] FMC Alias Private Key: 7
2,984,985 UART: [art] Extend RT PCRs Done
2,985,413 UART: [art] Lock RT PCRs Done
2,986,823 UART: [art] Populate DV Done
2,995,008 UART: [fht] FMC Alias Private Key: 7
2,996,072 UART: [art] Derive CDI
2,996,352 UART: [art] Store in in slot 0x4
3,082,711 UART: [art] Derive Key Pair
3,083,071 UART: [art] Store priv key in slot 0x5
3,096,061 UART: [art] Derive Key Pair - Done
3,110,616 UART: [art] Signing Cert with AUTHO
3,111,096 UART: RITY.KEYID = 7
3,125,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,499 UART: [art] PUB.X = 3B9A1D11EAC3CF647BEE66EE93BAB956120CC2C4C28306D59D9BA8C1ABF82497C6E8FD58D42ED6AB3B5CABE4F736FE05
3,133,288 UART: [art] PUB.Y = 131A002F4E1D1D3ED214248DBC538F27F4CB4D6DA5E7042C6C32647F3FF8E2D151058C01D909F7E5BE63F2C171623713
3,140,208 UART: [art] SIG.R = E679DE03AA0C77162301CAA3AD97AC5CBDECDD760B7977FDA33CFBA7DC4A16DD8DBF956A94FF26386798E3901AC070A6
3,146,990 UART: [art] SIG.S = 9E8495EC580C3C076D2FD5292478D4062AB4C8C145523CDEA74F6DFB928ABF5DE6B34F8C0AE44EFB5D4FE1517C74B0A2
3,171,237 UART: Caliptra RT
3,171,490 UART: [state] CFI Enabled
3,279,012 UART: [rt] RT listening for mailbox commands...
3,279,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,370 UART: [rt]cmd =0x4d454153, len=108
3,311,934 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,215 ready_for_fw is high
1,059,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,189 >>> mbox cmd response: success
2,687,773 UART:
2,687,789 UART: Running Caliptra FMC ...
2,688,197 UART:
2,688,251 UART: [state] CFI Enabled
2,698,622 UART: [fht] FMC Alias Private Key: 7
2,806,867 UART: [art] Extend RT PCRs Done
2,807,295 UART: [art] Lock RT PCRs Done
2,809,149 UART: [art] Populate DV Done
2,817,144 UART: [fht] FMC Alias Private Key: 7
2,818,208 UART: [art] Derive CDI
2,818,488 UART: [art] Store in in slot 0x4
2,904,227 UART: [art] Derive Key Pair
2,904,587 UART: [art] Store priv key in slot 0x5
2,917,835 UART: [art] Derive Key Pair - Done
2,932,366 UART: [art] Signing Cert with AUTHO
2,932,846 UART: RITY.KEYID = 7
2,948,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,297 UART: [art] PUB.X = 45B18C47981271AC7E9E56A7E45EC69736EB40504887389E5E3246F1AC63CB87A578E57C4D84D0B63FE504AEC5002882
2,956,040 UART: [art] PUB.Y = AF399441E411B1B3C30EAE144FA10B7130A5C2EC38D06529C75499336712351C6D40FD8FD537CACC00653D8A2031BE17
2,962,964 UART: [art] SIG.R = 7E6CE043B553120EF24CF2BFD320D20089C38E9963DCCF9BDFC81F3A0CEB7408CC780ACD208B79CE1C433FBE732E1F0A
2,969,719 UART: [art] SIG.S = 7D1C6BD33AEF104D0368586B3220A20DC48DFCA8342758E17DAFD32756FC2B95E283C47263B49AA900323FB1FC09A7F1
2,993,497 UART: Caliptra RT
2,993,750 UART: [state] CFI Enabled
3,101,091 UART: [rt] RT listening for mailbox commands...
3,101,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,083 UART: [rt]cmd =0x4d454153, len=108
3,133,455 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,747 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,548 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 ready_for_fw is high
1,176,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,202,460 UART: [idev] Sha1 KeyId Algorithm
1,210,998 UART: [idev] --
1,211,962 UART: [ldev] ++
1,212,130 UART: [ldev] CDI.KEYID = 6
1,212,493 UART: [ldev] SUBJECT.KEYID = 5
1,212,919 UART: [ldev] AUTHORITY.KEYID = 7
1,213,382 UART: [ldev] FE.KEYID = 1
1,218,634 UART: [ldev] Erasing FE.KEYID = 1
1,245,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,122 UART: [ldev] --
1,284,477 UART: [fwproc] Wait for Commands...
1,285,165 UART: [fwproc] Recv command 0x46574c44
1,285,893 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,169 >>> mbox cmd response: success
2,777,249 UART: [afmc] ++
2,777,417 UART: [afmc] CDI.KEYID = 6
2,777,779 UART: [afmc] SUBJECT.KEYID = 7
2,778,204 UART: [afmc] AUTHORITY.KEYID = 5
2,813,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,669 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,164 UART: [afmc] --
2,857,122 UART: [cold-reset] --
2,858,202 UART: [state] Locking Datavault
2,859,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,119 UART: [state] Locking ICCM
2,860,663 UART: [exit] Launching FMC @ 0x40000130
2,865,992 UART:
2,866,008 UART: Running Caliptra FMC ...
2,866,416 UART:
2,866,559 UART: [state] CFI Enabled
2,877,602 UART: [fht] FMC Alias Private Key: 7
2,986,011 UART: [art] Extend RT PCRs Done
2,986,439 UART: [art] Lock RT PCRs Done
2,987,831 UART: [art] Populate DV Done
2,996,118 UART: [fht] FMC Alias Private Key: 7
2,997,272 UART: [art] Derive CDI
2,997,552 UART: [art] Store in in slot 0x4
3,083,127 UART: [art] Derive Key Pair
3,083,487 UART: [art] Store priv key in slot 0x5
3,096,531 UART: [art] Derive Key Pair - Done
3,111,036 UART: [art] Signing Cert with AUTHO
3,111,516 UART: RITY.KEYID = 7
3,126,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,621 UART: [art] PUB.X = 94C1AD9539227900656AC9CE1884EB3F665D9B046010519D2A9ED6D9204C21A102DF84234E5F55DC9EEB226569710308
3,134,351 UART: [art] PUB.Y = 73B580918B6AADCEC04362C8C5A17B9C7EA3F4F06C268B9A2AE1126A3A7D7B95456E4E7BA135C154B35E5CDF7442FFE3
3,141,317 UART: [art] SIG.R = 579DCC8BF1F16528AC5988AEDCAFB79D4F112799162F8121A67D35C8ED2CF002EF984E1878BB11114A72AD77F73C15B1
3,148,094 UART: [art] SIG.S = 4B8CCB413274D77FADBEE35B6B411972BD878F266314B6DFF1ECC4824D8237BDA99A6A479CF29FF1F75A2B46FFD41288
3,171,605 UART: Caliptra RT
3,171,950 UART: [state] CFI Enabled
3,280,203 UART: [rt] RT listening for mailbox commands...
3,280,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,413 UART: [rt]cmd =0x4d454153, len=108
3,312,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,656 ready_for_fw is high
1,060,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,114 >>> mbox cmd response: success
2,690,192 UART:
2,690,208 UART: Running Caliptra FMC ...
2,690,616 UART:
2,690,759 UART: [state] CFI Enabled
2,701,528 UART: [fht] FMC Alias Private Key: 7
2,810,109 UART: [art] Extend RT PCRs Done
2,810,537 UART: [art] Lock RT PCRs Done
2,812,389 UART: [art] Populate DV Done
2,820,664 UART: [fht] FMC Alias Private Key: 7
2,821,816 UART: [art] Derive CDI
2,822,096 UART: [art] Store in in slot 0x4
2,907,997 UART: [art] Derive Key Pair
2,908,357 UART: [art] Store priv key in slot 0x5
2,921,759 UART: [art] Derive Key Pair - Done
2,936,401 UART: [art] Signing Cert with AUTHO
2,936,881 UART: RITY.KEYID = 7
2,951,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,664 UART: [art] PUB.X = DE0A3F8A633D8B858BD9B6CD028017E5048F6015AB1913A4F7EC41D2F550BCA4C44E6D1114AF3492E21B0155601E5A61
2,959,428 UART: [art] PUB.Y = E94B4C63A285F01BB8E782B870FD44B3DA88B3966835FFC9FC53BF81D0E6BDE28F265E0F4B02AC72A2A5FC7B786626ED
2,966,390 UART: [art] SIG.R = 4CDCCAD9F3E8F569E50A0E962FCED0BF12C0C9FE41AB70800DCB8AD9B65723D630951EACE00EA436F1EB716C635BDCB1
2,973,176 UART: [art] SIG.S = 436ACFD6DBD94C8C067ACD4CA1D3EA070BFF9B2F48B5E4B4AFE69E8322A79970CDB4A86582B053051863AD457F36F324
2,996,745 UART: Caliptra RT
2,997,090 UART: [state] CFI Enabled
3,104,561 UART: [rt] RT listening for mailbox commands...
3,105,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,837 UART: [rt]cmd =0x4d454153, len=108
3,137,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,169,985 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,174,067 ready_for_fw is high
1,174,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,383 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,162 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,473 UART: [fwproc] Recv command 0x46574c44
1,282,206 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,388 >>> mbox cmd response: success
2,774,529 UART: [afmc] ++
2,774,697 UART: [afmc] CDI.KEYID = 6
2,775,060 UART: [afmc] SUBJECT.KEYID = 7
2,775,486 UART: [afmc] AUTHORITY.KEYID = 5
2,810,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,830 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,161 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,874 UART: [afmc] --
2,853,752 UART: [cold-reset] --
2,854,598 UART: [state] Locking Datavault
2,855,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,583 UART: [state] Locking ICCM
2,857,175 UART: [exit] Launching FMC @ 0x40000130
2,862,504 UART:
2,862,520 UART: Running Caliptra FMC ...
2,862,928 UART:
2,862,982 UART: [state] CFI Enabled
2,873,369 UART: [fht] FMC Alias Private Key: 7
2,981,900 UART: [art] Extend RT PCRs Done
2,982,328 UART: [art] Lock RT PCRs Done
2,983,902 UART: [art] Populate DV Done
2,992,331 UART: [fht] FMC Alias Private Key: 7
2,993,359 UART: [art] Derive CDI
2,993,639 UART: [art] Store in in slot 0x4
3,079,102 UART: [art] Derive Key Pair
3,079,462 UART: [art] Store priv key in slot 0x5
3,093,104 UART: [art] Derive Key Pair - Done
3,107,449 UART: [art] Signing Cert with AUTHO
3,107,929 UART: RITY.KEYID = 7
3,123,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,022 UART: [art] PUB.X = 167FDED3AEF4A03E1BFB973A45286C6A18110CCBEC2280E54D6A17068C80B8FC41399E5DEF65867554769D4E5AB50E2E
3,130,795 UART: [art] PUB.Y = 3FA393A58C6BD35DD9D1A0F1B2F73DAAAA50032671264606D43CDA1074DDE028B25525DA88DCBD68F7B2B0B02C716F97
3,137,753 UART: [art] SIG.R = 1D8A76362DD1817AB36262B9DFEE57EAB7065405651139E578C421C838CB83C08246C1FF5D89F7ACEC5ABF5A87456D35
3,144,523 UART: [art] SIG.S = C61392829406648FB84D4E32DEC7C66500358A6236224D870C0F4270EFE3B6ED42195C3BA0DFCD418FD3B0642740EDDD
3,168,063 UART: Caliptra RT
3,168,316 UART: [state] CFI Enabled
3,277,521 UART: [rt] RT listening for mailbox commands...
3,278,191 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,609 UART: [rt]cmd =0x4d454153, len=108
3,310,205 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,094 ready_for_fw is high
1,056,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,580 >>> mbox cmd response: success
2,687,074 UART:
2,687,090 UART: Running Caliptra FMC ...
2,687,498 UART:
2,687,552 UART: [state] CFI Enabled
2,697,789 UART: [fht] FMC Alias Private Key: 7
2,806,456 UART: [art] Extend RT PCRs Done
2,806,884 UART: [art] Lock RT PCRs Done
2,808,718 UART: [art] Populate DV Done
2,816,897 UART: [fht] FMC Alias Private Key: 7
2,817,849 UART: [art] Derive CDI
2,818,129 UART: [art] Store in in slot 0x4
2,903,962 UART: [art] Derive Key Pair
2,904,322 UART: [art] Store priv key in slot 0x5
2,917,764 UART: [art] Derive Key Pair - Done
2,932,273 UART: [art] Signing Cert with AUTHO
2,932,753 UART: RITY.KEYID = 7
2,947,903 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,668 UART: [art] PUB.X = F2E879F1490E8B5663AB55F17BDB405017F4CFF39EED072C8273F19B2BC46739E014F0AC0E3094EE31C490664F73D1E0
2,955,435 UART: [art] PUB.Y = BCFCE8C98CE055FF1825354140135A852FC1DB88100101B67E8680CB47ECA87DB74C913DC5E5AB58D50092FCA7924E60
2,962,365 UART: [art] SIG.R = 4AF08D974D810FCD98EC114075649D15C970770470E3BEBE8530471804915FE9160F5C2507C428FB454073D0D5230885
2,969,105 UART: [art] SIG.S = BBA3609FAAD03D97982CC835D98900B9CA11AA7AAADE082028AA5C9F1D8B9CA1DA23854D64F2450EA802AC37143512CC
2,993,143 UART: Caliptra RT
2,993,396 UART: [state] CFI Enabled
3,100,987 UART: [rt] RT listening for mailbox commands...
3,101,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,301 UART: [rt]cmd =0x4d454153, len=108
3,133,531 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,231 UART: [kat] SHA2-512-ACC
907,132 UART: [kat] ECC-384
917,071 UART: [kat] HMAC-384Kdf
921,639 UART: [kat] LMS
1,169,951 UART: [kat] --
1,170,706 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,712 UART: [idev] ++
1,173,880 UART: [idev] CDI.KEYID = 6
1,174,241 UART: [idev] SUBJECT.KEYID = 7
1,174,666 UART: [idev] UDS.KEYID = 0
1,175,012 ready_for_fw is high
1,175,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,438 UART: [idev] Erasing UDS.KEYID = 0
1,200,358 UART: [idev] Sha1 KeyId Algorithm
1,209,134 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,745 >>> mbox cmd response: success
2,776,894 UART: [afmc] ++
2,777,062 UART: [afmc] CDI.KEYID = 6
2,777,425 UART: [afmc] SUBJECT.KEYID = 7
2,777,851 UART: [afmc] AUTHORITY.KEYID = 5
2,813,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,059 UART: [afmc] --
2,857,123 UART: [cold-reset] --
2,857,933 UART: [state] Locking Datavault
2,859,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,870 UART: [state] Locking ICCM
2,860,384 UART: [exit] Launching FMC @ 0x40000130
2,865,713 UART:
2,865,729 UART: Running Caliptra FMC ...
2,866,137 UART:
2,866,280 UART: [state] CFI Enabled
2,877,025 UART: [fht] FMC Alias Private Key: 7
2,985,100 UART: [art] Extend RT PCRs Done
2,985,528 UART: [art] Lock RT PCRs Done
2,987,172 UART: [art] Populate DV Done
2,995,281 UART: [fht] FMC Alias Private Key: 7
2,996,407 UART: [art] Derive CDI
2,996,687 UART: [art] Store in in slot 0x4
3,082,272 UART: [art] Derive Key Pair
3,082,632 UART: [art] Store priv key in slot 0x5
3,096,334 UART: [art] Derive Key Pair - Done
3,110,852 UART: [art] Signing Cert with AUTHO
3,111,332 UART: RITY.KEYID = 7
3,127,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,881 UART: [art] PUB.X = 16307BBE42C6BA9A91AF456CCC86D4C0B0FC3E7BF849934DA75BC108C97116F920AD40841E33ADF495961B755D16360F
3,134,653 UART: [art] PUB.Y = 97DD9B0E4BF0C575BAEBA61DDB3EEB43E29A182BC7BE7910572ED2B5BC3DEA548FE0369EAAAC12BD9FDDCF0C4D731610
3,141,631 UART: [art] SIG.R = F852C4C5988AC4B760F964297376D32FAF186B350D07EEB32B71F4729869B7896574C914FB64DF9F8D055F32A33CD717
3,148,390 UART: [art] SIG.S = 667DFB3653F9593693A3D42B0BBC66212E6B2B7553B0E597BEBA6BB0628C163845F723FE7BA0BFB772C55E9046329E6A
3,172,718 UART: Caliptra RT
3,173,063 UART: [state] CFI Enabled
3,280,732 UART: [rt] RT listening for mailbox commands...
3,281,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,928 UART: [rt]cmd =0x4d454153, len=108
3,313,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,681 ready_for_fw is high
1,056,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,380 >>> mbox cmd response: success
2,688,048 UART:
2,688,064 UART: Running Caliptra FMC ...
2,688,472 UART:
2,688,615 UART: [state] CFI Enabled
2,698,968 UART: [fht] FMC Alias Private Key: 7
2,807,217 UART: [art] Extend RT PCRs Done
2,807,645 UART: [art] Lock RT PCRs Done
2,809,433 UART: [art] Populate DV Done
2,817,660 UART: [fht] FMC Alias Private Key: 7
2,818,724 UART: [art] Derive CDI
2,819,004 UART: [art] Store in in slot 0x4
2,904,223 UART: [art] Derive Key Pair
2,904,583 UART: [art] Store priv key in slot 0x5
2,917,379 UART: [art] Derive Key Pair - Done
2,932,383 UART: [art] Signing Cert with AUTHO
2,932,863 UART: RITY.KEYID = 7
2,948,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,056 UART: [art] PUB.X = 97C0FD52D6FDDDC48B22AB04FF99C8E8E3BFC80A600410E6532682B2CA0A306E5D30C59E49ED92CD4D71409FF3E97199
2,955,828 UART: [art] PUB.Y = B58F1D6A84BAA800B772C62C9D1B7B415826C1EC0E25BBD662FF52C4F0C60246B02B6818D245F9F8FD4EBB90D8B1175D
2,962,764 UART: [art] SIG.R = 838A2A25E6CF16B2BDD4ED72F751AA1B89123E69E95E84521171EC1E60FBF178327E641B7A130CBF36AC0C346EC4608E
2,969,538 UART: [art] SIG.S = 2280B122F225F28C70C10B0F171006CB228EA6F7FF17A8C5DDFDCE949708258F6FAFAE11C838665BA71A2C039B02805D
2,993,135 UART: Caliptra RT
2,993,480 UART: [state] CFI Enabled
3,101,209 UART: [rt] RT listening for mailbox commands...
3,101,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,557 UART: [rt]cmd =0x4d454153, len=108
3,133,867 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
952 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,204 writing to cptra_bootfsm_go
193,255 UART:
193,609 UART: Running Caliptra ROM ...
194,781 UART:
194,935 UART: [state] CFI Enabled
265,128 UART: [state] LifecycleState = Unprovisioned
267,116 UART: [state] DebugLocked = No
270,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,977 UART: [kat] SHA2-256
444,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,221 UART: [kat] ++
455,753 UART: [kat] sha1
466,937 UART: [kat] SHA2-256
469,674 UART: [kat] SHA2-384
475,164 UART: [kat] SHA2-512-ACC
477,529 UART: [kat] ECC-384
2,767,981 UART: [kat] HMAC-384Kdf
2,800,336 UART: [kat] LMS
3,990,631 UART: [kat] --
3,994,001 UART: [cold-reset] ++
3,995,441 UART: [fht] Storing FHT @ 0x50003400
4,007,802 UART: [idev] ++
4,008,412 UART: [idev] CDI.KEYID = 6
4,009,344 UART: [idev] SUBJECT.KEYID = 7
4,010,598 UART: [idev] UDS.KEYID = 0
4,011,644 ready_for_fw is high
4,011,855 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,291 UART: [idev] Erasing UDS.KEYID = 0
7,344,804 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,194 UART: [idev] --
7,370,272 UART: [ldev] ++
7,370,852 UART: [ldev] CDI.KEYID = 6
7,371,765 UART: [ldev] SUBJECT.KEYID = 5
7,372,978 UART: [ldev] AUTHORITY.KEYID = 7
7,374,263 UART: [ldev] FE.KEYID = 1
7,421,151 UART: [ldev] Erasing FE.KEYID = 1
10,756,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,158 UART: [ldev] --
13,134,534 UART: [fwproc] Waiting for Commands...
13,136,411 UART: [fwproc] Received command 0x46574c44
13,138,587 UART: [fwproc] Received Image of size 114124 bytes
17,204,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,352,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,669,848 >>> mbox cmd response: success
17,674,803 UART: [afmc] ++
17,675,465 UART: [afmc] CDI.KEYID = 6
17,676,379 UART: [afmc] SUBJECT.KEYID = 7
17,677,598 UART: [afmc] AUTHORITY.KEYID = 5
21,044,838 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,346,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,176 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,363,638 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,378,449 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,392,871 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,414,908 UART: [afmc] --
23,418,498 UART: [cold-reset] --
23,422,479 UART: [state] Locking Datavault
23,427,838 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,585 UART: [state] Locking ICCM
23,431,467 UART: [exit] Launching FMC @ 0x40000130
23,439,867 UART:
23,440,104 UART: Running Caliptra FMC ...
23,441,765 UART:
23,441,937 UART: [state] CFI Enabled
23,506,489 UART: [fht] FMC Alias Private Key: 7
25,843,954 UART: [art] Extend RT PCRs Done
25,845,174 UART: [art] Lock RT PCRs Done
25,846,662 UART: [art] Populate DV Done
25,852,343 UART: [fht] FMC Alias Private Key: 7
25,854,048 UART: [art] Derive CDI
25,854,866 UART: [art] Store in in slot 0x4
25,914,774 UART: [art] Derive Key Pair
25,915,793 UART: [art] Store priv key in slot 0x5
29,208,893 UART: [art] Derive Key Pair - Done
29,221,939 UART: [art] Signing Cert with AUTHO
29,223,233 UART: RITY.KEYID = 7
31,510,776 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,275 UART: [art] PUB.X = 1F2A74B57C0A3A50FE803A35C9255D968082F62F276BF60B8022590A0D6744800A4F573E8D8ACE412AE07B55F3CC05B3
31,519,478 UART: [art] PUB.Y = AB528B2970707F62FEE4835A781F8957CC5B36E5D3BBD7BC4457CD33BAFC39E1C6A1669C219F52E467F89C4106179453
31,526,731 UART: [art] SIG.R = 67BE73D3B12C403D43A9BDB8E6BDD551114F63FFA4B87C08FB2BF100A8383A2F777E5B448BFEF48E8E26A800FD3BC869
31,534,138 UART: [art] SIG.S = 9B9BEB2C8BF5EA9844BFE6722F3D04C0924A763B53BBAB637631E3859C323437B38F2777BFF720283F081256FD2E4781
32,839,239 UART: Caliptra RT
32,839,952 UART: [state] CFI Enabled
32,999,412 UART: [rt] RT listening for mailbox commands...
33,001,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,031,906 UART: [rt]cmd =0x4d454153, len=108
33,050,195 >>> mbox cmd response data (12 bytes)
33,050,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,081,196 UART: [rt]cmd =0x4d454153, len=108
33,099,435 >>> mbox cmd response data (12 bytes)
33,099,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,130,536 UART: [rt]cmd =0x4d454153, len=108
33,148,587 >>> mbox cmd response data (12 bytes)
33,149,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,179,824 UART: [rt]cmd =0x4d454153, len=108
33,197,400 >>> mbox cmd response data (12 bytes)
33,197,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,228,319 UART: [rt]cmd =0x4d454153, len=108
33,246,848 >>> mbox cmd response data (12 bytes)
33,247,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,277,758 UART: [rt]cmd =0x4d454153, len=108
33,296,478 >>> mbox cmd response data (12 bytes)
33,296,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,327,467 UART: [rt]cmd =0x4d454153, len=108
33,346,529 >>> mbox cmd response data (12 bytes)
33,346,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,377,443 UART: [rt]cmd =0x4d454153, len=108
33,396,183 >>> mbox cmd response data (12 bytes)
33,396,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,426,987 UART: [rt]cmd =0x4d454153, len=108
33,445,708 >>> mbox cmd response data (12 bytes)
33,446,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,476,872 UART: [rt]cmd =0x4d454153, len=108
33,494,712 >>> mbox cmd response data (12 bytes)
33,495,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,525,837 UART: [rt]cmd =0x4d454153, len=108
33,544,895 >>> mbox cmd response data (12 bytes)
33,545,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,575,853 UART: [rt]cmd =0x4d454153, len=108
33,594,506 >>> mbox cmd response data (12 bytes)
33,594,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,625,540 UART: [rt]cmd =0x4d454153, len=108
33,643,952 >>> mbox cmd response data (12 bytes)
33,644,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,675,085 UART: [rt]cmd =0x4d454153, len=108
33,693,639 >>> mbox cmd response data (12 bytes)
33,694,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,724,896 UART: [rt]cmd =0x4d454153, len=108
33,744,257 >>> mbox cmd response data (12 bytes)
33,744,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,775,219 UART: [rt]cmd =0x4d454153, len=108
33,777,576 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,806,776 ready_for_fw is high
3,807,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,890,236 >>> mbox cmd response: success
23,590,285 UART:
23,590,654 UART: Running Caliptra FMC ...
23,591,796 UART:
23,591,958 UART: [state] CFI Enabled
23,659,952 UART: [fht] FMC Alias Private Key: 7
25,997,871 UART: [art] Extend RT PCRs Done
25,999,101 UART: [art] Lock RT PCRs Done
26,000,920 UART: [art] Populate DV Done
26,006,510 UART: [fht] FMC Alias Private Key: 7
26,008,114 UART: [art] Derive CDI
26,008,939 UART: [art] Store in in slot 0x4
26,068,756 UART: [art] Derive Key Pair
26,069,799 UART: [art] Store priv key in slot 0x5
29,362,434 UART: [art] Derive Key Pair - Done
29,375,379 UART: [art] Signing Cert with AUTHO
29,376,728 UART: RITY.KEYID = 7
31,665,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,586 UART: [art] PUB.X = FF67D82C457EA751F722BE92CE8501A19819443C9AD9B1590E1D3CFB24EB1C9BB56C73585732A5C577C93C97CA4420F3
31,673,843 UART: [art] PUB.Y = C2C32BD7BC5F9C8F03A8BD5FC234DB8C26316660E2F0E0EB86A8804B7C9F92840E0C4A0F614D88791E1380D7A76515E4
31,681,086 UART: [art] SIG.R = 5FB48036CCE35A514AB483ED67C1DD90CE30E49C218DA513DCB1027DB9D33AF92DDD6B31B980A9BFFC342F5E1A14625C
31,688,486 UART: [art] SIG.S = 5BE4635E0378B9F7E010C85593DDC8FADB5C97567FE55106442E3FFD053231821450CE88C354AD79592139B0818028F1
32,993,429 UART: Caliptra RT
32,994,131 UART: [state] CFI Enabled
33,155,190 UART: [rt] RT listening for mailbox commands...
33,157,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,187,713 UART: [rt]cmd =0x4d454153, len=108
33,206,272 >>> mbox cmd response data (12 bytes)
33,206,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,237,211 UART: [rt]cmd =0x4d454153, len=108
33,255,225 >>> mbox cmd response data (12 bytes)
33,255,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,286,166 UART: [rt]cmd =0x4d454153, len=108
33,304,892 >>> mbox cmd response data (12 bytes)
33,305,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,335,899 UART: [rt]cmd =0x4d454153, len=108
33,355,122 >>> mbox cmd response data (12 bytes)
33,355,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,386,104 UART: [rt]cmd =0x4d454153, len=108
33,405,180 >>> mbox cmd response data (12 bytes)
33,405,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,436,117 UART: [rt]cmd =0x4d454153, len=108
33,454,563 >>> mbox cmd response data (12 bytes)
33,455,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,485,704 UART: [rt]cmd =0x4d454153, len=108
33,504,909 >>> mbox cmd response data (12 bytes)
33,505,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,535,794 UART: [rt]cmd =0x4d454153, len=108
33,554,163 >>> mbox cmd response data (12 bytes)
33,554,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,585,357 UART: [rt]cmd =0x4d454153, len=108
33,603,747 >>> mbox cmd response data (12 bytes)
33,604,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,634,710 UART: [rt]cmd =0x4d454153, len=108
33,652,642 >>> mbox cmd response data (12 bytes)
33,653,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,683,498 UART: [rt]cmd =0x4d454153, len=108
33,702,584 >>> mbox cmd response data (12 bytes)
33,703,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,733,691 UART: [rt]cmd =0x4d454153, len=108
33,751,808 >>> mbox cmd response data (12 bytes)
33,752,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,782,671 UART: [rt]cmd =0x4d454153, len=108
33,800,829 >>> mbox cmd response data (12 bytes)
33,801,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,831,798 UART: [rt]cmd =0x4d454153, len=108
33,850,236 >>> mbox cmd response data (12 bytes)
33,850,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,881,201 UART: [rt]cmd =0x4d454153, len=108
33,899,793 >>> mbox cmd response data (12 bytes)
33,900,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,930,709 UART: [rt]cmd =0x4d454153, len=108
33,933,046 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,450 UART:
192,819 UART: Running Caliptra ROM ...
194,005 UART:
603,615 UART: [state] CFI Enabled
618,991 UART: [state] LifecycleState = Unprovisioned
620,894 UART: [state] DebugLocked = No
622,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,866 UART: [kat] SHA2-256
796,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,092 UART: [kat] ++
807,610 UART: [kat] sha1
818,402 UART: [kat] SHA2-256
821,122 UART: [kat] SHA2-384
827,679 UART: [kat] SHA2-512-ACC
830,043 UART: [kat] ECC-384
3,112,271 UART: [kat] HMAC-384Kdf
3,124,152 UART: [kat] LMS
4,314,235 UART: [kat] --
4,318,157 UART: [cold-reset] ++
4,320,153 UART: [fht] Storing FHT @ 0x50003400
4,331,774 UART: [idev] ++
4,332,333 UART: [idev] CDI.KEYID = 6
4,333,380 UART: [idev] SUBJECT.KEYID = 7
4,334,484 UART: [idev] UDS.KEYID = 0
4,335,518 ready_for_fw is high
4,335,707 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,018 UART: [idev] Erasing UDS.KEYID = 0
7,624,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,143 UART: [idev] --
7,649,649 UART: [ldev] ++
7,650,215 UART: [ldev] CDI.KEYID = 6
7,651,171 UART: [ldev] SUBJECT.KEYID = 5
7,652,374 UART: [ldev] AUTHORITY.KEYID = 7
7,653,763 UART: [ldev] FE.KEYID = 1
7,667,093 UART: [ldev] Erasing FE.KEYID = 1
10,955,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,620 UART: [ldev] --
13,313,630 UART: [fwproc] Waiting for Commands...
13,316,633 UART: [fwproc] Received command 0x46574c44
13,318,873 UART: [fwproc] Received Image of size 114124 bytes
17,376,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,727 >>> mbox cmd response: success
17,843,305 UART: [afmc] ++
17,843,900 UART: [afmc] CDI.KEYID = 6
17,844,808 UART: [afmc] SUBJECT.KEYID = 7
17,846,072 UART: [afmc] AUTHORITY.KEYID = 5
21,165,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,470 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,868 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,695 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,172 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,017 UART: [afmc] --
23,531,609 UART: [cold-reset] --
23,536,282 UART: [state] Locking Datavault
23,541,578 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,324 UART: [state] Locking ICCM
23,545,278 UART: [exit] Launching FMC @ 0x40000130
23,553,664 UART:
23,553,900 UART: Running Caliptra FMC ...
23,554,994 UART:
23,555,142 UART: [state] CFI Enabled
23,563,342 UART: [fht] FMC Alias Private Key: 7
25,894,674 UART: [art] Extend RT PCRs Done
25,895,914 UART: [art] Lock RT PCRs Done
25,897,426 UART: [art] Populate DV Done
25,902,996 UART: [fht] FMC Alias Private Key: 7
25,904,485 UART: [art] Derive CDI
25,905,243 UART: [art] Store in in slot 0x4
25,948,043 UART: [art] Derive Key Pair
25,949,038 UART: [art] Store priv key in slot 0x5
29,191,359 UART: [art] Derive Key Pair - Done
29,204,361 UART: [art] Signing Cert with AUTHO
29,205,655 UART: RITY.KEYID = 7
31,485,138 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,644 UART: [art] PUB.X = BB2BD2BC32D64EDAA2677045B8CD9B648002256A403C06437A80698A7AF826A81D0ED1FAC01CC1F2C7D650F7DD315018
31,493,896 UART: [art] PUB.Y = D2449978CBD6DCE5E2F0B8029BBBEE1082EBAB0BBC740360D6FE6394B68E61F1F90A0088B7DA88D54D1CD3C2794B79A9
31,501,134 UART: [art] SIG.R = 48AF8CABD94B8BC1D450A390294DF58996B3773E776C947CE275CA0981E45B489F165BAB8BA6133265FFB9FE8F853FD1
31,508,564 UART: [art] SIG.S = A220681F79A6AAE1050E2BC8F95DAA52414143D656D0688D2B9EF1AC42D2FB92325FC76B38690783D87D5612C8D3C11E
32,814,126 UART: Caliptra RT
32,814,859 UART: [state] CFI Enabled
32,933,236 UART: [rt] RT listening for mailbox commands...
32,935,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,965,942 UART: [rt]cmd =0x4d454153, len=108
32,984,986 >>> mbox cmd response data (12 bytes)
32,985,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,016,115 UART: [rt]cmd =0x4d454153, len=108
33,035,036 >>> mbox cmd response data (12 bytes)
33,035,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,066,242 UART: [rt]cmd =0x4d454153, len=108
33,085,227 >>> mbox cmd response data (12 bytes)
33,085,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,116,263 UART: [rt]cmd =0x4d454153, len=108
33,134,686 >>> mbox cmd response data (12 bytes)
33,135,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,165,810 UART: [rt]cmd =0x4d454153, len=108
33,184,984 >>> mbox cmd response data (12 bytes)
33,185,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,216,264 UART: [rt]cmd =0x4d454153, len=108
33,235,136 >>> mbox cmd response data (12 bytes)
33,235,559 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,266,320 UART: [rt]cmd =0x4d454153, len=108
33,285,115 >>> mbox cmd response data (12 bytes)
33,285,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,316,410 UART: [rt]cmd =0x4d454153, len=108
33,335,662 >>> mbox cmd response data (12 bytes)
33,336,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,366,504 UART: [rt]cmd =0x4d454153, len=108
33,384,240 >>> mbox cmd response data (12 bytes)
33,384,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,415,416 UART: [rt]cmd =0x4d454153, len=108
33,433,936 >>> mbox cmd response data (12 bytes)
33,434,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,465,186 UART: [rt]cmd =0x4d454153, len=108
33,483,884 >>> mbox cmd response data (12 bytes)
33,484,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,514,789 UART: [rt]cmd =0x4d454153, len=108
33,533,638 >>> mbox cmd response data (12 bytes)
33,534,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,564,680 UART: [rt]cmd =0x4d454153, len=108
33,583,277 >>> mbox cmd response data (12 bytes)
33,583,741 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,614,386 UART: [rt]cmd =0x4d454153, len=108
33,633,036 >>> mbox cmd response data (12 bytes)
33,633,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,664,002 UART: [rt]cmd =0x4d454153, len=108
33,682,046 >>> mbox cmd response data (12 bytes)
33,682,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,713,085 UART: [rt]cmd =0x4d454153, len=108
33,715,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
4,123,877 ready_for_fw is high
4,124,554 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,059,401 >>> mbox cmd response: success
23,699,683 UART:
23,700,077 UART: Running Caliptra FMC ...
23,701,206 UART:
23,701,363 UART: [state] CFI Enabled
23,709,100 UART: [fht] FMC Alias Private Key: 7
26,039,605 UART: [art] Extend RT PCRs Done
26,040,821 UART: [art] Lock RT PCRs Done
26,042,718 UART: [art] Populate DV Done
26,048,079 UART: [fht] FMC Alias Private Key: 7
26,049,732 UART: [art] Derive CDI
26,050,549 UART: [art] Store in in slot 0x4
26,093,609 UART: [art] Derive Key Pair
26,094,647 UART: [art] Store priv key in slot 0x5
29,336,784 UART: [art] Derive Key Pair - Done
29,349,896 UART: [art] Signing Cert with AUTHO
29,351,203 UART: RITY.KEYID = 7
31,630,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,011 UART: [art] PUB.X = 52CB74A8525EA886CC523432BD980D2363DAFD5962C5128EFAA7406F44FF8C05626F61B5EFB2712A977BFE31B4FA81C9
31,639,248 UART: [art] PUB.Y = 834F002934735AEBAF98F0D8335633D8E8F5908B901468469E02726B859147AA47AC468FC7E304AEBA1CEB01E01E280E
31,646,523 UART: [art] SIG.R = 601DFAA05774C254899A0B8CF6FBC7596F531C125F20CCF3044916677959F4BEEA9526B4143DFFE382A0EDF9564697E8
31,653,894 UART: [art] SIG.S = D38DCBE98C2DE30508ABA1400FEAD5358E4F16C70DA636E32D7F761CB17C458AB740B6E60BB75DD9BE4EE28D3DCAD0E4
32,959,095 UART: Caliptra RT
32,959,800 UART: [state] CFI Enabled
33,077,790 UART: [rt] RT listening for mailbox commands...
33,079,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,110,499 UART: [rt]cmd =0x4d454153, len=108
33,128,514 >>> mbox cmd response data (12 bytes)
33,129,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,159,568 UART: [rt]cmd =0x4d454153, len=108
33,177,617 >>> mbox cmd response data (12 bytes)
33,178,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,208,538 UART: [rt]cmd =0x4d454153, len=108
33,226,363 >>> mbox cmd response data (12 bytes)
33,226,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,257,369 UART: [rt]cmd =0x4d454153, len=108
33,276,044 >>> mbox cmd response data (12 bytes)
33,276,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,307,023 UART: [rt]cmd =0x4d454153, len=108
33,325,171 >>> mbox cmd response data (12 bytes)
33,325,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,356,511 UART: [rt]cmd =0x4d454153, len=108
33,374,686 >>> mbox cmd response data (12 bytes)
33,375,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,405,738 UART: [rt]cmd =0x4d454153, len=108
33,423,801 >>> mbox cmd response data (12 bytes)
33,424,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,454,960 UART: [rt]cmd =0x4d454153, len=108
33,473,346 >>> mbox cmd response data (12 bytes)
33,473,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,504,703 UART: [rt]cmd =0x4d454153, len=108
33,524,008 >>> mbox cmd response data (12 bytes)
33,524,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,555,102 UART: [rt]cmd =0x4d454153, len=108
33,573,904 >>> mbox cmd response data (12 bytes)
33,574,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,604,920 UART: [rt]cmd =0x4d454153, len=108
33,624,070 >>> mbox cmd response data (12 bytes)
33,624,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,655,233 UART: [rt]cmd =0x4d454153, len=108
33,673,508 >>> mbox cmd response data (12 bytes)
33,673,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,704,582 UART: [rt]cmd =0x4d454153, len=108
33,722,788 >>> mbox cmd response data (12 bytes)
33,723,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,753,924 UART: [rt]cmd =0x4d454153, len=108
33,772,753 >>> mbox cmd response data (12 bytes)
33,773,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,803,964 UART: [rt]cmd =0x4d454153, len=108
33,822,406 >>> mbox cmd response data (12 bytes)
33,822,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,853,267 UART: [rt]cmd =0x4d454153, len=108
33,855,473 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,976 UART:
192,347 UART: Running Caliptra ROM ...
193,544 UART:
193,703 UART: [state] CFI Enabled
250,279 UART: [state] LifecycleState = Unprovisioned
252,146 UART: [state] DebugLocked = No
254,311 UART: [state] WD Timer not started. Device not locked for debugging
258,394 UART: [kat] SHA2-256
437,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,046 UART: [kat] ++
449,499 UART: [kat] sha1
461,294 UART: [kat] SHA2-256
464,367 UART: [kat] SHA2-384
470,210 UART: [kat] SHA2-512-ACC
473,141 UART: [kat] ECC-384
2,933,773 UART: [kat] HMAC-384Kdf
2,958,720 UART: [kat] LMS
3,488,200 UART: [kat] --
3,492,127 UART: [cold-reset] ++
3,493,767 UART: [fht] FHT @ 0x50003400
3,503,974 UART: [idev] ++
3,504,544 UART: [idev] CDI.KEYID = 6
3,505,473 UART: [idev] SUBJECT.KEYID = 7
3,506,644 UART: [idev] UDS.KEYID = 0
3,507,568 ready_for_fw is high
3,507,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,651,679 UART: [idev] Erasing UDS.KEYID = 0
6,012,835 UART: [idev] Sha1 KeyId Algorithm
6,035,479 UART: [idev] --
6,040,852 UART: [ldev] ++
6,041,436 UART: [ldev] CDI.KEYID = 6
6,042,370 UART: [ldev] SUBJECT.KEYID = 5
6,043,483 UART: [ldev] AUTHORITY.KEYID = 7
6,044,769 UART: [ldev] FE.KEYID = 1
6,085,595 UART: [ldev] Erasing FE.KEYID = 1
8,588,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,696 UART: [ldev] --
10,397,307 UART: [fwproc] Wait for Commands...
10,399,883 UART: [fwproc] Recv command 0x46574c44
10,401,971 UART: [fwproc] Recv'd Img size: 114448 bytes
13,808,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,269,047 >>> mbox cmd response: success
14,273,943 UART: [afmc] ++
14,274,537 UART: [afmc] CDI.KEYID = 6
14,275,450 UART: [afmc] SUBJECT.KEYID = 7
14,276,612 UART: [afmc] AUTHORITY.KEYID = 5
16,805,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,820 UART: [afmc] --
18,605,136 UART: [cold-reset] --
18,609,425 UART: [state] Locking Datavault
18,615,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,959 UART: [state] Locking ICCM
18,619,536 UART: [exit] Launching FMC @ 0x40000130
18,627,927 UART:
18,628,168 UART: Running Caliptra FMC ...
18,629,194 UART:
18,629,341 UART: [state] CFI Enabled
18,688,680 UART: [fht] FMC Alias Private Key: 7
20,452,841 UART: [art] Extend RT PCRs Done
20,454,042 UART: [art] Lock RT PCRs Done
20,455,701 UART: [art] Populate DV Done
20,461,275 UART: [fht] FMC Alias Private Key: 7
20,462,812 UART: [art] Derive CDI
20,463,578 UART: [art] Store in in slot 0x4
20,520,622 UART: [art] Derive Key Pair
20,521,671 UART: [art] Store priv key in slot 0x5
22,984,269 UART: [art] Derive Key Pair - Done
22,997,418 UART: [art] Signing Cert with AUTHO
22,998,732 UART: RITY.KEYID = 7
24,710,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,518 UART: [art] PUB.X = 7D0AF9E4B3E83157031FD41D99B4BA8CAE39641308F626C435489D137A11799B30AF6092780C0560E5D654E52EF59609
24,718,755 UART: [art] PUB.Y = 52D3F869574241DCB1A682E35EFC3A9CFD0BC4FC57BB72D256190BF9F26AA84342218E23EC2AA2075E67FF4511C430DC
24,726,031 UART: [art] SIG.R = BBE47CB10B5031C9F45F473ECF18208D4B2D638E894342C52CA359B8BEB97AA7701115FC9E2509ABB6C3AE36D2F9A359
24,733,415 UART: [art] SIG.S = F274F1499A1BC3252272097A447604A0E33AF81979BB874730604F441149EDFC90204741682BC28AE7ED5ABCFB8EC16D
25,712,597 UART: Caliptra RT
25,713,294 UART: [state] CFI Enabled
25,878,792 UART: [rt] RT listening for mailbox commands...
25,880,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,911,881 UART: [rt]cmd =0x4d454153, len=108
25,930,248 >>> mbox cmd response data (12 bytes)
25,930,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,961,250 UART: [rt]cmd =0x4d454153, len=108
25,980,114 >>> mbox cmd response data (12 bytes)
25,980,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,011,215 UART: [rt]cmd =0x4d454153, len=108
26,029,508 >>> mbox cmd response data (12 bytes)
26,029,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,060,845 UART: [rt]cmd =0x4d454153, len=108
26,079,559 >>> mbox cmd response data (12 bytes)
26,079,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,110,755 UART: [rt]cmd =0x4d454153, len=108
26,129,332 >>> mbox cmd response data (12 bytes)
26,129,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,160,400 UART: [rt]cmd =0x4d454153, len=108
26,179,765 >>> mbox cmd response data (12 bytes)
26,180,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,210,870 UART: [rt]cmd =0x4d454153, len=108
26,229,253 >>> mbox cmd response data (12 bytes)
26,229,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,260,172 UART: [rt]cmd =0x4d454153, len=108
26,279,581 >>> mbox cmd response data (12 bytes)
26,280,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,310,497 UART: [rt]cmd =0x4d454153, len=108
26,328,828 >>> mbox cmd response data (12 bytes)
26,329,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,359,741 UART: [rt]cmd =0x4d454153, len=108
26,378,485 >>> mbox cmd response data (12 bytes)
26,378,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,409,337 UART: [rt]cmd =0x4d454153, len=108
26,427,890 >>> mbox cmd response data (12 bytes)
26,428,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,458,935 UART: [rt]cmd =0x4d454153, len=108
26,476,676 >>> mbox cmd response data (12 bytes)
26,477,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,507,869 UART: [rt]cmd =0x4d454153, len=108
26,526,660 >>> mbox cmd response data (12 bytes)
26,527,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,557,699 UART: [rt]cmd =0x4d454153, len=108
26,576,904 >>> mbox cmd response data (12 bytes)
26,577,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,607,848 UART: [rt]cmd =0x4d454153, len=108
26,626,990 >>> mbox cmd response data (12 bytes)
26,627,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,658,012 UART: [rt]cmd =0x4d454153, len=108
26,660,488 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,359,429 ready_for_fw is high
3,359,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,949 >>> mbox cmd response: success
18,344,396 UART:
18,344,783 UART: Running Caliptra FMC ...
18,345,983 UART:
18,346,156 UART: [state] CFI Enabled
18,411,670 UART: [fht] FMC Alias Private Key: 7
20,175,361 UART: [art] Extend RT PCRs Done
20,176,577 UART: [art] Lock RT PCRs Done
20,177,827 UART: [art] Populate DV Done
20,183,187 UART: [fht] FMC Alias Private Key: 7
20,184,667 UART: [art] Derive CDI
20,185,436 UART: [art] Store in in slot 0x4
20,244,312 UART: [art] Derive Key Pair
20,245,313 UART: [art] Store priv key in slot 0x5
22,708,110 UART: [art] Derive Key Pair - Done
22,721,070 UART: [art] Signing Cert with AUTHO
22,722,381 UART: RITY.KEYID = 7
24,434,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,698 UART: [art] PUB.X = EF2F7BD1D4FFDC056D97692934C2C0AADDC4586970A81928222A47EB5580A2E6E0A5FD9C5A8A2671E2EE06D9C77868EA
24,443,014 UART: [art] PUB.Y = FBF578DB2E6A538F3F05E411CD6E7ED607FB26943F2011AA95059C44808FBD95BE12DF23566BCF2308AD135157ECA34A
24,450,281 UART: [art] SIG.R = 19CE10A1EBCCD0132538CC67351C78EEC23188A8EAC94A27E7418CB7759D967D9EB7BB758207FC86339DE70EB3B38B95
24,457,643 UART: [art] SIG.S = 4F436207D0CB89712795CBA2CFB98D95B8E49F64CD88EA6A2E654D0C85C12072656AB98A90EFFD80FE667652BA485B25
25,436,344 UART: Caliptra RT
25,437,045 UART: [state] CFI Enabled
25,600,592 UART: [rt] RT listening for mailbox commands...
25,602,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,633,805 UART: [rt]cmd =0x4d454153, len=108
25,652,361 >>> mbox cmd response data (12 bytes)
25,652,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,683,541 UART: [rt]cmd =0x4d454153, len=108
25,702,409 >>> mbox cmd response data (12 bytes)
25,702,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,733,572 UART: [rt]cmd =0x4d454153, len=108
25,752,720 >>> mbox cmd response data (12 bytes)
25,753,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,783,802 UART: [rt]cmd =0x4d454153, len=108
25,802,148 >>> mbox cmd response data (12 bytes)
25,802,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,833,246 UART: [rt]cmd =0x4d454153, len=108
25,852,133 >>> mbox cmd response data (12 bytes)
25,852,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,883,192 UART: [rt]cmd =0x4d454153, len=108
25,901,374 >>> mbox cmd response data (12 bytes)
25,901,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,932,410 UART: [rt]cmd =0x4d454153, len=108
25,951,154 >>> mbox cmd response data (12 bytes)
25,951,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,982,099 UART: [rt]cmd =0x4d454153, len=108
26,001,137 >>> mbox cmd response data (12 bytes)
26,001,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,032,391 UART: [rt]cmd =0x4d454153, len=108
26,051,305 >>> mbox cmd response data (12 bytes)
26,051,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,082,504 UART: [rt]cmd =0x4d454153, len=108
26,100,847 >>> mbox cmd response data (12 bytes)
26,101,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,131,964 UART: [rt]cmd =0x4d454153, len=108
26,150,741 >>> mbox cmd response data (12 bytes)
26,151,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,181,812 UART: [rt]cmd =0x4d454153, len=108
26,200,776 >>> mbox cmd response data (12 bytes)
26,201,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,231,852 UART: [rt]cmd =0x4d454153, len=108
26,250,696 >>> mbox cmd response data (12 bytes)
26,251,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,281,809 UART: [rt]cmd =0x4d454153, len=108
26,300,254 >>> mbox cmd response data (12 bytes)
26,300,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,331,113 UART: [rt]cmd =0x4d454153, len=108
26,349,582 >>> mbox cmd response data (12 bytes)
26,350,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,380,723 UART: [rt]cmd =0x4d454153, len=108
26,382,994 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,382 UART:
192,765 UART: Running Caliptra ROM ...
193,851 UART:
603,688 UART: [state] CFI Enabled
619,573 UART: [state] LifecycleState = Unprovisioned
621,450 UART: [state] DebugLocked = No
624,188 UART: [state] WD Timer not started. Device not locked for debugging
628,286 UART: [kat] SHA2-256
807,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,977 UART: [kat] ++
819,419 UART: [kat] sha1
830,425 UART: [kat] SHA2-256
833,422 UART: [kat] SHA2-384
838,271 UART: [kat] SHA2-512-ACC
841,200 UART: [kat] ECC-384
3,285,242 UART: [kat] HMAC-384Kdf
3,297,999 UART: [kat] LMS
3,827,421 UART: [kat] --
3,831,834 UART: [cold-reset] ++
3,833,683 UART: [fht] FHT @ 0x50003400
3,845,286 UART: [idev] ++
3,845,840 UART: [idev] CDI.KEYID = 6
3,846,758 UART: [idev] SUBJECT.KEYID = 7
3,847,927 UART: [idev] UDS.KEYID = 0
3,848,969 ready_for_fw is high
3,849,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,987 UART: [idev] Erasing UDS.KEYID = 0
6,326,059 UART: [idev] Sha1 KeyId Algorithm
6,348,747 UART: [idev] --
6,352,578 UART: [ldev] ++
6,353,141 UART: [ldev] CDI.KEYID = 6
6,354,040 UART: [ldev] SUBJECT.KEYID = 5
6,355,249 UART: [ldev] AUTHORITY.KEYID = 7
6,356,471 UART: [ldev] FE.KEYID = 1
6,366,405 UART: [ldev] Erasing FE.KEYID = 1
8,843,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,480 UART: [ldev] --
10,636,321 UART: [fwproc] Wait for Commands...
10,639,168 UART: [fwproc] Recv command 0x46574c44
10,641,198 UART: [fwproc] Recv'd Img size: 114448 bytes
14,043,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,123,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,192,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,511,459 >>> mbox cmd response: success
14,515,053 UART: [afmc] ++
14,515,647 UART: [afmc] CDI.KEYID = 6
14,516,529 UART: [afmc] SUBJECT.KEYID = 7
14,517,737 UART: [afmc] AUTHORITY.KEYID = 5
17,019,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,742,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,744,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,760,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,776,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,792,176 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,815,369 UART: [afmc] --
18,819,659 UART: [cold-reset] --
18,824,488 UART: [state] Locking Datavault
18,829,358 UART: [state] Locking PCR0, PCR1 and PCR31
18,831,052 UART: [state] Locking ICCM
18,832,772 UART: [exit] Launching FMC @ 0x40000130
18,841,160 UART:
18,841,390 UART: Running Caliptra FMC ...
18,842,482 UART:
18,842,637 UART: [state] CFI Enabled
18,850,729 UART: [fht] FMC Alias Private Key: 7
20,606,965 UART: [art] Extend RT PCRs Done
20,608,431 UART: [art] Lock RT PCRs Done
20,610,032 UART: [art] Populate DV Done
20,615,552 UART: [fht] FMC Alias Private Key: 7
20,617,253 UART: [art] Derive CDI
20,617,982 UART: [art] Store in in slot 0x4
20,660,223 UART: [art] Derive Key Pair
20,661,262 UART: [art] Store priv key in slot 0x5
23,087,755 UART: [art] Derive Key Pair - Done
23,100,660 UART: [art] Signing Cert with AUTHO
23,101,961 UART: RITY.KEYID = 7
24,807,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,809,270 UART: [art] PUB.X = 1602A6A7A3D5F43EE2A40805D2B7669428C1B68767661DAF201BDE89B9054AC3D71EFDEAECCBFF79305C3D42BACC410D
24,816,552 UART: [art] PUB.Y = 02119E08990C545C645460B9C7491D172355C3A5C1A2D23487BEE813B23F5E8F867A541D831F6811112B97A4CF05CB37
24,823,770 UART: [art] SIG.R = EB4FBCBA03DB2AA2FC4058F63A198097400611BB574C2BC8BB3C08AC91CE7BA444B3033FBD7666F7EBB4CDD8D2FD9364
24,831,196 UART: [art] SIG.S = 7C24C5F887E5B3D7504D42D88756420D24A8852CA4AC99BCE594A82D127E982945C975A5908B901EAE70DEE5045B18BC
25,809,763 UART: Caliptra RT
25,810,488 UART: [state] CFI Enabled
25,926,806 UART: [rt] RT listening for mailbox commands...
25,928,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,959,360 UART: [rt]cmd =0x4d454153, len=108
25,978,771 >>> mbox cmd response data (12 bytes)
25,979,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,009,994 UART: [rt]cmd =0x4d454153, len=108
26,028,315 >>> mbox cmd response data (12 bytes)
26,028,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,059,576 UART: [rt]cmd =0x4d454153, len=108
26,078,077 >>> mbox cmd response data (12 bytes)
26,078,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,109,394 UART: [rt]cmd =0x4d454153, len=108
26,128,328 >>> mbox cmd response data (12 bytes)
26,128,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,159,476 UART: [rt]cmd =0x4d454153, len=108
26,177,864 >>> mbox cmd response data (12 bytes)
26,178,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,209,001 UART: [rt]cmd =0x4d454153, len=108
26,227,670 >>> mbox cmd response data (12 bytes)
26,228,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,258,771 UART: [rt]cmd =0x4d454153, len=108
26,277,040 >>> mbox cmd response data (12 bytes)
26,277,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,308,320 UART: [rt]cmd =0x4d454153, len=108
26,327,273 >>> mbox cmd response data (12 bytes)
26,327,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,358,332 UART: [rt]cmd =0x4d454153, len=108
26,376,538 >>> mbox cmd response data (12 bytes)
26,376,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,407,595 UART: [rt]cmd =0x4d454153, len=108
26,426,719 >>> mbox cmd response data (12 bytes)
26,427,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,457,855 UART: [rt]cmd =0x4d454153, len=108
26,477,001 >>> mbox cmd response data (12 bytes)
26,477,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,508,372 UART: [rt]cmd =0x4d454153, len=108
26,527,397 >>> mbox cmd response data (12 bytes)
26,527,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,558,735 UART: [rt]cmd =0x4d454153, len=108
26,578,024 >>> mbox cmd response data (12 bytes)
26,578,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,608,931 UART: [rt]cmd =0x4d454153, len=108
26,628,077 >>> mbox cmd response data (12 bytes)
26,628,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,659,183 UART: [rt]cmd =0x4d454153, len=108
26,678,368 >>> mbox cmd response data (12 bytes)
26,678,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,709,430 UART: [rt]cmd =0x4d454153, len=108
26,711,633 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,692,787 ready_for_fw is high
3,693,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,677 >>> mbox cmd response: success
18,516,868 UART:
18,517,260 UART: Running Caliptra FMC ...
18,518,448 UART:
18,518,626 UART: [state] CFI Enabled
18,526,622 UART: [fht] FMC Alias Private Key: 7
20,284,400 UART: [art] Extend RT PCRs Done
20,285,625 UART: [art] Lock RT PCRs Done
20,287,139 UART: [art] Populate DV Done
20,292,487 UART: [fht] FMC Alias Private Key: 7
20,294,234 UART: [art] Derive CDI
20,295,042 UART: [art] Store in in slot 0x4
20,337,035 UART: [art] Derive Key Pair
20,338,033 UART: [art] Store priv key in slot 0x5
22,765,318 UART: [art] Derive Key Pair - Done
22,778,261 UART: [art] Signing Cert with AUTHO
22,779,572 UART: RITY.KEYID = 7
24,485,328 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,831 UART: [art] PUB.X = 09D443737B9138F1A96F494C902C9AC06AF98ABE76015B0E69BA81E9F643555F9A25CB38D06BF3DD18CF7B352318E0E4
24,494,146 UART: [art] PUB.Y = C2D5430CA3FD5E9520934689BC8DA345E2828B8B0CA59DD47838B1584C41E3FF9605198ABD23F40BB51A0848CD31C77C
24,501,487 UART: [art] SIG.R = EC699B84150310A6910352488FE1511D37703B3504C4F2CC9C8A244AE5CB014C1B5FF7EFE60F868F0FD102B4FF0A8699
24,508,767 UART: [art] SIG.S = 49600F08E70E0A7ACC029F0DCF31B7826420E59AC5086D0733697DFE6DB6750BF888EFE84155BF90A2033E40C0BAEC81
25,488,341 UART: Caliptra RT
25,489,052 UART: [state] CFI Enabled
25,606,868 UART: [rt] RT listening for mailbox commands...
25,608,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,639,406 UART: [rt]cmd =0x4d454153, len=108
25,658,155 >>> mbox cmd response data (12 bytes)
25,658,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,689,411 UART: [rt]cmd =0x4d454153, len=108
25,707,428 >>> mbox cmd response data (12 bytes)
25,707,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,738,705 UART: [rt]cmd =0x4d454153, len=108
25,757,310 >>> mbox cmd response data (12 bytes)
25,757,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,788,658 UART: [rt]cmd =0x4d454153, len=108
25,806,697 >>> mbox cmd response data (12 bytes)
25,807,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,837,845 UART: [rt]cmd =0x4d454153, len=108
25,856,230 >>> mbox cmd response data (12 bytes)
25,856,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,887,304 UART: [rt]cmd =0x4d454153, len=108
25,905,931 >>> mbox cmd response data (12 bytes)
25,906,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,936,886 UART: [rt]cmd =0x4d454153, len=108
25,956,122 >>> mbox cmd response data (12 bytes)
25,956,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,987,171 UART: [rt]cmd =0x4d454153, len=108
26,005,447 >>> mbox cmd response data (12 bytes)
26,005,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,522 UART: [rt]cmd =0x4d454153, len=108
26,055,043 >>> mbox cmd response data (12 bytes)
26,055,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,086,026 UART: [rt]cmd =0x4d454153, len=108
26,105,498 >>> mbox cmd response data (12 bytes)
26,105,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,136,493 UART: [rt]cmd =0x4d454153, len=108
26,154,606 >>> mbox cmd response data (12 bytes)
26,155,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,185,678 UART: [rt]cmd =0x4d454153, len=108
26,204,254 >>> mbox cmd response data (12 bytes)
26,204,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,235,483 UART: [rt]cmd =0x4d454153, len=108
26,254,880 >>> mbox cmd response data (12 bytes)
26,255,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,285,990 UART: [rt]cmd =0x4d454153, len=108
26,305,165 >>> mbox cmd response data (12 bytes)
26,305,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,336,144 UART: [rt]cmd =0x4d454153, len=108
26,354,849 >>> mbox cmd response data (12 bytes)
26,355,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,386,162 UART: [rt]cmd =0x4d454153, len=108
26,388,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,146 UART:
192,554 UART: Running Caliptra ROM ...
193,709 UART:
193,855 UART: [state] CFI Enabled
264,427 UART: [state] LifecycleState = Unprovisioned
266,781 UART: [state] DebugLocked = No
269,507 UART: [state] WD Timer not started. Device not locked for debugging
273,945 UART: [kat] SHA2-256
463,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,587 UART: [kat] ++
475,035 UART: [kat] sha1
487,405 UART: [kat] SHA2-256
490,474 UART: [kat] SHA2-384
495,963 UART: [kat] SHA2-512-ACC
498,536 UART: [kat] ECC-384
2,946,451 UART: [kat] HMAC-384Kdf
2,970,204 UART: [kat] LMS
3,501,958 UART: [kat] --
3,506,191 UART: [cold-reset] ++
3,508,272 UART: [fht] FHT @ 0x50003400
3,519,176 UART: [idev] ++
3,519,890 UART: [idev] CDI.KEYID = 6
3,520,923 UART: [idev] SUBJECT.KEYID = 7
3,522,023 UART: [idev] UDS.KEYID = 0
3,522,955 ready_for_fw is high
3,523,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,126 UART: [idev] Erasing UDS.KEYID = 0
6,028,884 UART: [idev] Sha1 KeyId Algorithm
6,051,273 UART: [idev] --
6,055,103 UART: [ldev] ++
6,055,784 UART: [ldev] CDI.KEYID = 6
6,056,668 UART: [ldev] SUBJECT.KEYID = 5
6,057,896 UART: [ldev] AUTHORITY.KEYID = 7
6,059,074 UART: [ldev] FE.KEYID = 1
6,097,787 UART: [ldev] Erasing FE.KEYID = 1
8,605,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,084 UART: [ldev] --
10,412,373 UART: [fwproc] Wait for Commands...
10,414,243 UART: [fwproc] Recv command 0x46574c44
10,416,547 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,111 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,489 >>> mbox cmd response: success
14,604,222 UART: [afmc] ++
14,604,931 UART: [afmc] CDI.KEYID = 6
14,606,119 UART: [afmc] SUBJECT.KEYID = 7
14,607,476 UART: [afmc] AUTHORITY.KEYID = 5
17,147,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,838 UART: [afmc] --
18,943,997 UART: [cold-reset] --
18,948,561 UART: [state] Locking Datavault
18,953,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,121 UART: [state] Locking ICCM
18,959,138 UART: [exit] Launching FMC @ 0x40000130
18,967,777 UART:
18,968,012 UART: Running Caliptra FMC ...
18,969,112 UART:
18,969,273 UART: [state] CFI Enabled
19,030,347 UART: [fht] FMC Alias Private Key: 7
20,794,157 UART: [art] Extend RT PCRs Done
20,795,367 UART: [art] Lock RT PCRs Done
20,797,262 UART: [art] Populate DV Done
20,802,677 UART: [fht] FMC Alias Private Key: 7
20,804,155 UART: [art] Derive CDI
20,804,918 UART: [art] Store in in slot 0x4
20,862,662 UART: [art] Derive Key Pair
20,863,699 UART: [art] Store priv key in slot 0x5
23,325,868 UART: [art] Derive Key Pair - Done
23,339,184 UART: [art] Signing Cert with AUTHO
23,340,486 UART: RITY.KEYID = 7
25,052,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,799 UART: [art] PUB.X = F06D4795E9228C21639BE80285C9B7AB228C4A249BEE041F3CFA9AE9EA4386D33719661C52B8CFD4C34E7644F451F97C
25,061,039 UART: [art] PUB.Y = 4DC38E54C9EA4F0B6F47A7043E86662D111594A4F6C1990DB0F70650B98D7CEDC168E03355CBA73296C7963E2C75D933
25,068,321 UART: [art] SIG.R = 714ED934E32ECA9A7BB7F5B1ED67D790937DD7FA4C4C15FB62DB89944D21A0FBADF865DF2E3A3CE2A505F934BC5546D8
25,075,740 UART: [art] SIG.S = B57F14439588BA698B99171844D6A1C76A6B942FEBB7560F9D00568B7D8AC0EA32736BCB99CD3353205D80E5EC296F61
26,055,202 UART: Caliptra RT
26,055,908 UART: [state] CFI Enabled
26,220,919 UART: [rt] RT listening for mailbox commands...
26,222,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,253,987 UART: [rt]cmd =0x4d454153, len=108
26,272,426 >>> mbox cmd response data (12 bytes)
26,272,994 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,303,866 UART: [rt]cmd =0x4d454153, len=108
26,321,989 >>> mbox cmd response data (12 bytes)
26,322,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,352,981 UART: [rt]cmd =0x4d454153, len=108
26,371,209 >>> mbox cmd response data (12 bytes)
26,371,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,402,235 UART: [rt]cmd =0x4d454153, len=108
26,420,838 >>> mbox cmd response data (12 bytes)
26,421,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,451,692 UART: [rt]cmd =0x4d454153, len=108
26,470,761 >>> mbox cmd response data (12 bytes)
26,471,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,501,893 UART: [rt]cmd =0x4d454153, len=108
26,520,989 >>> mbox cmd response data (12 bytes)
26,521,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,552,312 UART: [rt]cmd =0x4d454153, len=108
26,570,754 >>> mbox cmd response data (12 bytes)
26,571,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,601,994 UART: [rt]cmd =0x4d454153, len=108
26,620,461 >>> mbox cmd response data (12 bytes)
26,620,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,651,506 UART: [rt]cmd =0x4d454153, len=108
26,670,165 >>> mbox cmd response data (12 bytes)
26,670,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,701,192 UART: [rt]cmd =0x4d454153, len=108
26,720,660 >>> mbox cmd response data (12 bytes)
26,721,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,751,851 UART: [rt]cmd =0x4d454153, len=108
26,771,564 >>> mbox cmd response data (12 bytes)
26,771,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,802,550 UART: [rt]cmd =0x4d454153, len=108
26,821,854 >>> mbox cmd response data (12 bytes)
26,822,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,853,096 UART: [rt]cmd =0x4d454153, len=108
26,871,788 >>> mbox cmd response data (12 bytes)
26,872,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,902,993 UART: [rt]cmd =0x4d454153, len=108
26,921,547 >>> mbox cmd response data (12 bytes)
26,922,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,952,820 UART: [rt]cmd =0x4d454153, len=108
26,972,228 >>> mbox cmd response data (12 bytes)
26,972,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,003,476 UART: [rt]cmd =0x4d454153, len=108
27,005,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,438,028 ready_for_fw is high
3,438,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,721,504 >>> mbox cmd response: success
19,004,348 UART:
19,004,724 UART: Running Caliptra FMC ...
19,005,920 UART:
19,006,098 UART: [state] CFI Enabled
19,068,652 UART: [fht] FMC Alias Private Key: 7
20,832,736 UART: [art] Extend RT PCRs Done
20,833,951 UART: [art] Lock RT PCRs Done
20,835,746 UART: [art] Populate DV Done
20,841,373 UART: [fht] FMC Alias Private Key: 7
20,842,858 UART: [art] Derive CDI
20,843,619 UART: [art] Store in in slot 0x4
20,900,992 UART: [art] Derive Key Pair
20,902,030 UART: [art] Store priv key in slot 0x5
23,364,876 UART: [art] Derive Key Pair - Done
23,378,038 UART: [art] Signing Cert with AUTHO
23,379,347 UART: RITY.KEYID = 7
25,090,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,092,240 UART: [art] PUB.X = AE6DE4FFFE701B2DEE1670B354139C81305E834FB1760973523C6C7A5E4E371C1B5E00F7E52937D43462BA94DDB4E55B
25,099,509 UART: [art] PUB.Y = 828C031282A31F6E278D2B450A492D25623BF1958415ACC73875466921C0E3514CEBCC3038EE239AF137E40FA9E911DD
25,106,765 UART: [art] SIG.R = F7279E006B62D3FE7043FA0D8BA42F2EA8408AC2A26DD35227233703DD9F5B0669953C56D3B34F5442078FF0FD8AE5E1
25,114,165 UART: [art] SIG.S = 39E6AE67F06ADE5330CBE62F8E7135FADC464D3A7D620A3A5BA2561338BC6E6869ABF3E990D8424AE88E27485884672E
26,092,739 UART: Caliptra RT
26,093,426 UART: [state] CFI Enabled
26,257,453 UART: [rt] RT listening for mailbox commands...
26,259,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,290,509 UART: [rt]cmd =0x4d454153, len=108
26,309,014 >>> mbox cmd response data (12 bytes)
26,309,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,340,226 UART: [rt]cmd =0x4d454153, len=108
26,358,403 >>> mbox cmd response data (12 bytes)
26,358,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,389,401 UART: [rt]cmd =0x4d454153, len=108
26,408,214 >>> mbox cmd response data (12 bytes)
26,408,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,439,259 UART: [rt]cmd =0x4d454153, len=108
26,457,853 >>> mbox cmd response data (12 bytes)
26,458,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,488,977 UART: [rt]cmd =0x4d454153, len=108
26,507,043 >>> mbox cmd response data (12 bytes)
26,507,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,538,348 UART: [rt]cmd =0x4d454153, len=108
26,556,387 >>> mbox cmd response data (12 bytes)
26,556,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,587,382 UART: [rt]cmd =0x4d454153, len=108
26,606,098 >>> mbox cmd response data (12 bytes)
26,606,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,915 UART: [rt]cmd =0x4d454153, len=108
26,654,842 >>> mbox cmd response data (12 bytes)
26,655,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,993 UART: [rt]cmd =0x4d454153, len=108
26,704,384 >>> mbox cmd response data (12 bytes)
26,704,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,735,386 UART: [rt]cmd =0x4d454153, len=108
26,753,721 >>> mbox cmd response data (12 bytes)
26,754,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,784,814 UART: [rt]cmd =0x4d454153, len=108
26,803,096 >>> mbox cmd response data (12 bytes)
26,803,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,834,089 UART: [rt]cmd =0x4d454153, len=108
26,851,722 >>> mbox cmd response data (12 bytes)
26,852,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,882,910 UART: [rt]cmd =0x4d454153, len=108
26,901,388 >>> mbox cmd response data (12 bytes)
26,901,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,932,440 UART: [rt]cmd =0x4d454153, len=108
26,951,004 >>> mbox cmd response data (12 bytes)
26,951,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,982,065 UART: [rt]cmd =0x4d454153, len=108
27,000,938 >>> mbox cmd response data (12 bytes)
27,001,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,032,207 UART: [rt]cmd =0x4d454153, len=108
27,034,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,220 writing to cptra_bootfsm_go
193,396 UART:
193,764 UART: Running Caliptra ROM ...
194,865 UART:
604,577 UART: [state] CFI Enabled
620,158 UART: [state] LifecycleState = Unprovisioned
622,520 UART: [state] DebugLocked = No
625,177 UART: [state] WD Timer not started. Device not locked for debugging
629,694 UART: [kat] SHA2-256
819,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,327 UART: [kat] ++
830,926 UART: [kat] sha1
842,579 UART: [kat] SHA2-256
845,576 UART: [kat] SHA2-384
851,767 UART: [kat] SHA2-512-ACC
854,338 UART: [kat] ECC-384
3,293,214 UART: [kat] HMAC-384Kdf
3,305,812 UART: [kat] LMS
3,837,619 UART: [kat] --
3,842,499 UART: [cold-reset] ++
3,843,554 UART: [fht] FHT @ 0x50003400
3,855,459 UART: [idev] ++
3,856,170 UART: [idev] CDI.KEYID = 6
3,857,147 UART: [idev] SUBJECT.KEYID = 7
3,858,314 UART: [idev] UDS.KEYID = 0
3,859,232 ready_for_fw is high
3,859,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,144 UART: [idev] Erasing UDS.KEYID = 0
6,334,950 UART: [idev] Sha1 KeyId Algorithm
6,357,247 UART: [idev] --
6,362,467 UART: [ldev] ++
6,363,191 UART: [ldev] CDI.KEYID = 6
6,364,091 UART: [ldev] SUBJECT.KEYID = 5
6,365,243 UART: [ldev] AUTHORITY.KEYID = 7
6,366,463 UART: [ldev] FE.KEYID = 1
6,378,016 UART: [ldev] Erasing FE.KEYID = 1
8,860,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,938 UART: [ldev] --
10,652,648 UART: [fwproc] Wait for Commands...
10,655,118 UART: [fwproc] Recv command 0x46574c44
10,657,425 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,840,151 >>> mbox cmd response: success
14,844,902 UART: [afmc] ++
14,845,607 UART: [afmc] CDI.KEYID = 6
14,846,790 UART: [afmc] SUBJECT.KEYID = 7
14,848,296 UART: [afmc] AUTHORITY.KEYID = 5
17,349,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,792 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,073 UART: [afmc] --
19,146,114 UART: [cold-reset] --
19,149,921 UART: [state] Locking Datavault
19,155,492 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,629 UART: [state] Locking ICCM
19,160,532 UART: [exit] Launching FMC @ 0x40000130
19,169,217 UART:
19,169,446 UART: Running Caliptra FMC ...
19,170,538 UART:
19,170,715 UART: [state] CFI Enabled
19,178,379 UART: [fht] FMC Alias Private Key: 7
20,935,922 UART: [art] Extend RT PCRs Done
20,937,143 UART: [art] Lock RT PCRs Done
20,938,899 UART: [art] Populate DV Done
20,944,302 UART: [fht] FMC Alias Private Key: 7
20,945,890 UART: [art] Derive CDI
20,946,617 UART: [art] Store in in slot 0x4
20,989,695 UART: [art] Derive Key Pair
20,990,727 UART: [art] Store priv key in slot 0x5
23,417,850 UART: [art] Derive Key Pair - Done
23,430,843 UART: [art] Signing Cert with AUTHO
23,432,137 UART: RITY.KEYID = 7
25,137,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,273 UART: [art] PUB.X = 7FB9220A50C2D12F639ADA72DE775BC520F264C02BDB2BC4E500CA108794230F5EBD5A0D7F29D98014E909BC3CC19D09
25,146,488 UART: [art] PUB.Y = E9ED7CEA8325F0998BB0D58532CC15CD20C557793F9D71E6C5398BD074FF977B77AAD752B7F4468B608B5522A37B8C67
25,153,766 UART: [art] SIG.R = 31FDA38CCD233C111F4720421825B121A7A61D9DE84F3FCD0EE5010C3C2BA30F2BC0644CB34A547E3ACD3FF0B08D9523
25,161,201 UART: [art] SIG.S = 2001CEA204620C181E92E5CAF6C63929C07C56684E77A0465D730C5D2A09C89D9EAE6EDA06DB12C5BA1935D20C8F7557
26,140,115 UART: Caliptra RT
26,140,804 UART: [state] CFI Enabled
26,258,012 UART: [rt] RT listening for mailbox commands...
26,259,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,290,762 UART: [rt]cmd =0x4d454153, len=108
26,309,525 >>> mbox cmd response data (12 bytes)
26,310,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,340,790 UART: [rt]cmd =0x4d454153, len=108
26,359,057 >>> mbox cmd response data (12 bytes)
26,359,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,195 UART: [rt]cmd =0x4d454153, len=108
26,408,746 >>> mbox cmd response data (12 bytes)
26,409,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,439,797 UART: [rt]cmd =0x4d454153, len=108
26,458,788 >>> mbox cmd response data (12 bytes)
26,459,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,489,853 UART: [rt]cmd =0x4d454153, len=108
26,507,888 >>> mbox cmd response data (12 bytes)
26,508,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,539,165 UART: [rt]cmd =0x4d454153, len=108
26,557,541 >>> mbox cmd response data (12 bytes)
26,557,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,588,554 UART: [rt]cmd =0x4d454153, len=108
26,607,515 >>> mbox cmd response data (12 bytes)
26,607,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,638,521 UART: [rt]cmd =0x4d454153, len=108
26,657,286 >>> mbox cmd response data (12 bytes)
26,657,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,688,221 UART: [rt]cmd =0x4d454153, len=108
26,707,035 >>> mbox cmd response data (12 bytes)
26,707,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,738,068 UART: [rt]cmd =0x4d454153, len=108
26,757,413 >>> mbox cmd response data (12 bytes)
26,757,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,788,262 UART: [rt]cmd =0x4d454153, len=108
26,807,352 >>> mbox cmd response data (12 bytes)
26,807,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,838,298 UART: [rt]cmd =0x4d454153, len=108
26,857,113 >>> mbox cmd response data (12 bytes)
26,857,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,888,112 UART: [rt]cmd =0x4d454153, len=108
26,906,743 >>> mbox cmd response data (12 bytes)
26,907,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,937,915 UART: [rt]cmd =0x4d454153, len=108
26,956,398 >>> mbox cmd response data (12 bytes)
26,956,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,987,377 UART: [rt]cmd =0x4d454153, len=108
27,006,233 >>> mbox cmd response data (12 bytes)
27,006,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,037,256 UART: [rt]cmd =0x4d454153, len=108
27,039,582 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,753,872 ready_for_fw is high
3,754,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,342 >>> mbox cmd response: success
19,203,829 UART:
19,204,236 UART: Running Caliptra FMC ...
19,205,334 UART:
19,205,488 UART: [state] CFI Enabled
19,213,657 UART: [fht] FMC Alias Private Key: 7
20,970,649 UART: [art] Extend RT PCRs Done
20,971,859 UART: [art] Lock RT PCRs Done
20,973,476 UART: [art] Populate DV Done
20,978,887 UART: [fht] FMC Alias Private Key: 7
20,980,593 UART: [art] Derive CDI
20,981,403 UART: [art] Store in in slot 0x4
21,024,174 UART: [art] Derive Key Pair
21,025,213 UART: [art] Store priv key in slot 0x5
23,452,498 UART: [art] Derive Key Pair - Done
23,465,445 UART: [art] Signing Cert with AUTHO
23,466,740 UART: RITY.KEYID = 7
25,171,948 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,462 UART: [art] PUB.X = 923AB05E1455F12AAB668C002DAF7D83F4438D8A72327F57943296C82D7752AE12FCFA97767385DFCE3868D0321E116D
25,180,672 UART: [art] PUB.Y = E9F16A6116469C666BE7D77893E28195E82034FB37610434B68CE4E70C5199EEA8CC369F5F4E0B7B4765959546E163AD
25,187,894 UART: [art] SIG.R = A848C1BD927E36D4D2224AED5A4D16587EC54A800FA2F0780F13F8A3EAB90EDE7EC53186ECCB86837B8AFB3FCD2BF815
25,195,364 UART: [art] SIG.S = 798FB70CB2819AE930D6E6AE5DA0E0717FD9E0A3B36E3FD8AAD1E95C8B06118A4FC0B54FCE61D5C260245D66D2418A70
26,174,121 UART: Caliptra RT
26,174,825 UART: [state] CFI Enabled
26,292,320 UART: [rt] RT listening for mailbox commands...
26,294,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,324,924 UART: [rt]cmd =0x4d454153, len=108
26,343,347 >>> mbox cmd response data (12 bytes)
26,343,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,374,444 UART: [rt]cmd =0x4d454153, len=108
26,392,969 >>> mbox cmd response data (12 bytes)
26,393,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,424,363 UART: [rt]cmd =0x4d454153, len=108
26,442,371 >>> mbox cmd response data (12 bytes)
26,442,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,473,437 UART: [rt]cmd =0x4d454153, len=108
26,493,021 >>> mbox cmd response data (12 bytes)
26,493,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,523,884 UART: [rt]cmd =0x4d454153, len=108
26,542,988 >>> mbox cmd response data (12 bytes)
26,543,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,574,089 UART: [rt]cmd =0x4d454153, len=108
26,592,151 >>> mbox cmd response data (12 bytes)
26,592,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,623,271 UART: [rt]cmd =0x4d454153, len=108
26,641,416 >>> mbox cmd response data (12 bytes)
26,641,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,672,446 UART: [rt]cmd =0x4d454153, len=108
26,690,933 >>> mbox cmd response data (12 bytes)
26,691,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,722,054 UART: [rt]cmd =0x4d454153, len=108
26,741,229 >>> mbox cmd response data (12 bytes)
26,741,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,772,180 UART: [rt]cmd =0x4d454153, len=108
26,790,729 >>> mbox cmd response data (12 bytes)
26,791,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,821,990 UART: [rt]cmd =0x4d454153, len=108
26,840,751 >>> mbox cmd response data (12 bytes)
26,841,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,871,756 UART: [rt]cmd =0x4d454153, len=108
26,889,954 >>> mbox cmd response data (12 bytes)
26,890,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,920,933 UART: [rt]cmd =0x4d454153, len=108
26,940,349 >>> mbox cmd response data (12 bytes)
26,940,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,971,290 UART: [rt]cmd =0x4d454153, len=108
26,989,671 >>> mbox cmd response data (12 bytes)
26,990,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,020,797 UART: [rt]cmd =0x4d454153, len=108
27,039,263 >>> mbox cmd response data (12 bytes)
27,039,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,070,437 UART: [rt]cmd =0x4d454153, len=108
27,072,867 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,731 UART: [kat] SHA2-256
892,669 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
902,936 UART: [kat] HMAC-384Kdf
907,398 UART: [kat] LMS
1,475,594 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 ready_for_fw is high
1,481,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,800 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,877 UART: [ldev] Erasing FE.KEYID = 1
1,547,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,848 UART: [ldev] --
1,586,287 UART: [fwproc] Waiting for Commands...
1,586,966 UART: [fwproc] Received command 0x46574c44
1,587,757 UART: [fwproc] Received Image of size 114448 bytes
2,887,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,943 >>> mbox cmd response: success
3,082,189 UART: [afmc] ++
3,082,357 UART: [afmc] CDI.KEYID = 6
3,082,719 UART: [afmc] SUBJECT.KEYID = 7
3,083,144 UART: [afmc] AUTHORITY.KEYID = 5
3,118,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,894 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,584 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,413 UART: [afmc] --
3,161,487 UART: [cold-reset] --
3,162,399 UART: [state] Locking Datavault
3,163,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,180 UART: [state] Locking ICCM
3,164,704 UART: [exit] Launching FMC @ 0x40000130
3,170,033 UART:
3,170,049 UART: Running Caliptra FMC ...
3,170,457 UART:
3,170,511 UART: [state] CFI Enabled
3,180,974 UART: [fht] FMC Alias Private Key: 7
3,289,309 UART: [art] Extend RT PCRs Done
3,289,737 UART: [art] Lock RT PCRs Done
3,290,935 UART: [art] Populate DV Done
3,298,978 UART: [fht] FMC Alias Private Key: 7
3,300,036 UART: [art] Derive CDI
3,300,316 UART: [art] Store in in slot 0x4
3,386,241 UART: [art] Derive Key Pair
3,386,601 UART: [art] Store priv key in slot 0x5
3,399,941 UART: [art] Derive Key Pair - Done
3,414,454 UART: [art] Signing Cert with AUTHO
3,414,934 UART: RITY.KEYID = 7
3,429,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,663 UART: [art] PUB.X = 200EC3ED985F58D9062656B5D2F10EC9F413D46B01BAD51963FD3D7CE7D234E93CBFA24944DEEEB38176D4A939C70D80
3,437,430 UART: [art] PUB.Y = E98C092E27CBB0C4E33270EB0D88840F04E5D941C58E3AF0EC32FCDEAF5A7C007DEEDB1587740A899E7B06BC2F020833
3,444,350 UART: [art] SIG.R = 3D02350C81AFC80B4237B40F03CFA1D028FE1E0CE046DB70F5B512E671DB0172046E1ECB9E9ECAB59C23F5E4363D0FC8
3,451,109 UART: [art] SIG.S = 5D2BA1A3B797B98D2EB054BB21B80629197CC85275E52629468B78DBB96EDE6836FC36F3F8BE3C7BAC07FEFC043CCA9C
3,475,557 UART: Caliptra RT
3,475,810 UART: [state] CFI Enabled
3,583,864 UART: [rt] RT listening for mailbox commands...
3,584,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,330 UART: [rt]cmd =0x4d454153, len=108
3,635,478 >>> mbox cmd response data (12 bytes)
3,635,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,498 UART: [rt]cmd =0x4d454153, len=108
3,686,812 >>> mbox cmd response data (12 bytes)
3,686,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,916 UART: [rt]cmd =0x4d454153, len=108
3,737,194 >>> mbox cmd response data (12 bytes)
3,737,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,356 UART: [rt]cmd =0x4d454153, len=108
3,788,684 >>> mbox cmd response data (12 bytes)
3,788,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,508 UART: [rt]cmd =0x4d454153, len=108
3,839,292 >>> mbox cmd response data (12 bytes)
3,839,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,282 UART: [rt]cmd =0x4d454153, len=108
3,889,006 >>> mbox cmd response data (12 bytes)
3,889,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,806 UART: [rt]cmd =0x4d454153, len=108
3,938,594 >>> mbox cmd response data (12 bytes)
3,938,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,706 UART: [rt]cmd =0x4d454153, len=108
3,989,560 >>> mbox cmd response data (12 bytes)
3,989,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,514 UART: [rt]cmd =0x4d454153, len=108
4,040,030 >>> mbox cmd response data (12 bytes)
4,040,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,178 UART: [rt]cmd =0x4d454153, len=108
4,090,766 >>> mbox cmd response data (12 bytes)
4,090,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,040 UART: [rt]cmd =0x4d454153, len=108
4,141,786 >>> mbox cmd response data (12 bytes)
4,141,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,750 UART: [rt]cmd =0x4d454153, len=108
4,192,058 >>> mbox cmd response data (12 bytes)
4,192,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,354 UART: [rt]cmd =0x4d454153, len=108
4,242,750 >>> mbox cmd response data (12 bytes)
4,242,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,714 UART: [rt]cmd =0x4d454153, len=108
4,293,474 >>> mbox cmd response data (12 bytes)
4,293,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,506 UART: [rt]cmd =0x4d454153, len=108
4,344,128 >>> mbox cmd response data (12 bytes)
4,344,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,294 UART: [rt]cmd =0x4d454153, len=108
4,376,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,791 ready_for_fw is high
1,362,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,995 >>> mbox cmd response: success
2,990,453 UART:
2,990,469 UART: Running Caliptra FMC ...
2,990,877 UART:
2,990,931 UART: [state] CFI Enabled
3,001,452 UART: [fht] FMC Alias Private Key: 7
3,109,363 UART: [art] Extend RT PCRs Done
3,109,791 UART: [art] Lock RT PCRs Done
3,111,245 UART: [art] Populate DV Done
3,119,468 UART: [fht] FMC Alias Private Key: 7
3,120,650 UART: [art] Derive CDI
3,120,930 UART: [art] Store in in slot 0x4
3,206,123 UART: [art] Derive Key Pair
3,206,483 UART: [art] Store priv key in slot 0x5
3,219,733 UART: [art] Derive Key Pair - Done
3,234,582 UART: [art] Signing Cert with AUTHO
3,235,062 UART: RITY.KEYID = 7
3,250,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,809 UART: [art] PUB.X = 2AAF778B78E7D17EEDA7CC99355B1FCE7E1A10A04ED4D12F994D30F1B2DBB53471A361B5F755C85430C2259972231283
3,257,585 UART: [art] PUB.Y = 304163E1C0E0010DC6C472242DEF010C2E5FE0EFCDD1B3F83F59272CD140B6BE0AEA90DA82E9C365FBD755E53CBB0518
3,264,535 UART: [art] SIG.R = 755879609F42AC001EBF25D1FBF5A1E68DFBC88EF35C96D96950AB698ADE53B87F8365F740C6E0579E3BB6EC0FA5E4C4
3,271,296 UART: [art] SIG.S = 659DF3DC0BF00D5510B869D385C285344A1F6BDE81EF266C8F6EA539B7CA15AADA83D383F71D03EBDAFBF286793E7D4C
3,295,408 UART: Caliptra RT
3,295,661 UART: [state] CFI Enabled
3,403,625 UART: [rt] RT listening for mailbox commands...
3,404,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,867 UART: [rt]cmd =0x4d454153, len=108
3,455,121 >>> mbox cmd response data (12 bytes)
3,455,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,043 UART: [rt]cmd =0x4d454153, len=108
3,505,563 >>> mbox cmd response data (12 bytes)
3,505,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,465 UART: [rt]cmd =0x4d454153, len=108
3,555,613 >>> mbox cmd response data (12 bytes)
3,555,614 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,569 UART: [rt]cmd =0x4d454153, len=108
3,606,449 >>> mbox cmd response data (12 bytes)
3,606,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,515 UART: [rt]cmd =0x4d454153, len=108
3,656,571 >>> mbox cmd response data (12 bytes)
3,656,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,517 UART: [rt]cmd =0x4d454153, len=108
3,706,721 >>> mbox cmd response data (12 bytes)
3,706,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,703 UART: [rt]cmd =0x4d454153, len=108
3,757,697 >>> mbox cmd response data (12 bytes)
3,757,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,665 UART: [rt]cmd =0x4d454153, len=108
3,808,095 >>> mbox cmd response data (12 bytes)
3,808,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,259 UART: [rt]cmd =0x4d454153, len=108
3,858,875 >>> mbox cmd response data (12 bytes)
3,858,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,097 UART: [rt]cmd =0x4d454153, len=108
3,910,167 >>> mbox cmd response data (12 bytes)
3,910,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,281 UART: [rt]cmd =0x4d454153, len=108
3,961,139 >>> mbox cmd response data (12 bytes)
3,961,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,249 UART: [rt]cmd =0x4d454153, len=108
4,011,445 >>> mbox cmd response data (12 bytes)
4,011,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,421 UART: [rt]cmd =0x4d454153, len=108
4,062,479 >>> mbox cmd response data (12 bytes)
4,062,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,561 UART: [rt]cmd =0x4d454153, len=108
4,113,631 >>> mbox cmd response data (12 bytes)
4,113,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,629 UART: [rt]cmd =0x4d454153, len=108
4,164,473 >>> mbox cmd response data (12 bytes)
4,164,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,257 UART: [rt]cmd =0x4d454153, len=108
4,196,130 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,002 UART: [kat] SHA2-256
881,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,048 UART: [kat] ++
886,200 UART: [kat] sha1
890,390 UART: [kat] SHA2-256
892,328 UART: [kat] SHA2-384
895,043 UART: [kat] SHA2-512-ACC
896,944 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,517 UART: [kat] LMS
1,475,713 UART: [kat] --
1,476,764 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,991 UART: [idev] --
1,514,942 UART: [ldev] ++
1,515,110 UART: [ldev] CDI.KEYID = 6
1,515,473 UART: [ldev] SUBJECT.KEYID = 5
1,515,899 UART: [ldev] AUTHORITY.KEYID = 7
1,516,362 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,157 UART: [ldev] --
1,586,612 UART: [fwproc] Waiting for Commands...
1,587,301 UART: [fwproc] Received command 0x46574c44
1,588,092 UART: [fwproc] Received Image of size 114448 bytes
2,886,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,906 >>> mbox cmd response: success
3,081,110 UART: [afmc] ++
3,081,278 UART: [afmc] CDI.KEYID = 6
3,081,640 UART: [afmc] SUBJECT.KEYID = 7
3,082,065 UART: [afmc] AUTHORITY.KEYID = 5
3,116,846 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,529 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,219 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,050 UART: [afmc] --
3,159,980 UART: [cold-reset] --
3,160,918 UART: [state] Locking Datavault
3,162,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,627 UART: [state] Locking ICCM
3,163,151 UART: [exit] Launching FMC @ 0x40000130
3,168,480 UART:
3,168,496 UART: Running Caliptra FMC ...
3,168,904 UART:
3,169,047 UART: [state] CFI Enabled
3,179,424 UART: [fht] FMC Alias Private Key: 7
3,287,715 UART: [art] Extend RT PCRs Done
3,288,143 UART: [art] Lock RT PCRs Done
3,289,837 UART: [art] Populate DV Done
3,298,292 UART: [fht] FMC Alias Private Key: 7
3,299,240 UART: [art] Derive CDI
3,299,520 UART: [art] Store in in slot 0x4
3,385,135 UART: [art] Derive Key Pair
3,385,495 UART: [art] Store priv key in slot 0x5
3,398,589 UART: [art] Derive Key Pair - Done
3,413,632 UART: [art] Signing Cert with AUTHO
3,414,112 UART: RITY.KEYID = 7
3,429,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,309 UART: [art] PUB.X = 0107519DE9E170AB9831E2A57117C22703A0E68039BC5D3B2A107E63F2D25A3DB4AE61D68092463A646ED7CCB7C9AC25
3,437,074 UART: [art] PUB.Y = 3BEED2751CAC223DB805A3F164B6135687DE13FCBAF7B530FD30F937CF233B591A7F07C9A60CAE2938C773F7EAB6B9CB
3,444,035 UART: [art] SIG.R = C7A9EAE64C790D1A91579B5E550466BDCBCF3EF8254ED4165DC9E3F6574133E00D151D7528A0284F42C061620F94B445
3,450,795 UART: [art] SIG.S = 4D9CC4309D5418DED5B92D2E2932CD6AC32D12A5ED77B45DEEC51FA20C9639DCBC87A2861B46C4F02D8FA85395CE84A8
3,474,627 UART: Caliptra RT
3,474,972 UART: [state] CFI Enabled
3,582,495 UART: [rt] RT listening for mailbox commands...
3,583,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,431 UART: [rt]cmd =0x4d454153, len=108
3,634,239 >>> mbox cmd response data (12 bytes)
3,634,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,445 UART: [rt]cmd =0x4d454153, len=108
3,685,247 >>> mbox cmd response data (12 bytes)
3,685,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,053 UART: [rt]cmd =0x4d454153, len=108
3,735,811 >>> mbox cmd response data (12 bytes)
3,735,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,019 UART: [rt]cmd =0x4d454153, len=108
3,786,557 >>> mbox cmd response data (12 bytes)
3,786,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,425 UART: [rt]cmd =0x4d454153, len=108
3,837,229 >>> mbox cmd response data (12 bytes)
3,837,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,269 UART: [rt]cmd =0x4d454153, len=108
3,887,461 >>> mbox cmd response data (12 bytes)
3,887,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,831 UART: [rt]cmd =0x4d454153, len=108
3,938,787 >>> mbox cmd response data (12 bytes)
3,938,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,777 UART: [rt]cmd =0x4d454153, len=108
3,989,247 >>> mbox cmd response data (12 bytes)
3,989,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,193 UART: [rt]cmd =0x4d454153, len=108
4,039,645 >>> mbox cmd response data (12 bytes)
4,039,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,809 UART: [rt]cmd =0x4d454153, len=108
4,090,349 >>> mbox cmd response data (12 bytes)
4,090,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,239 UART: [rt]cmd =0x4d454153, len=108
4,140,693 >>> mbox cmd response data (12 bytes)
4,140,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,415 UART: [rt]cmd =0x4d454153, len=108
4,191,693 >>> mbox cmd response data (12 bytes)
4,191,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,705 UART: [rt]cmd =0x4d454153, len=108
4,242,647 >>> mbox cmd response data (12 bytes)
4,242,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,665 UART: [rt]cmd =0x4d454153, len=108
4,293,461 >>> mbox cmd response data (12 bytes)
4,293,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,715 UART: [rt]cmd =0x4d454153, len=108
4,344,309 >>> mbox cmd response data (12 bytes)
4,344,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,437 UART: [rt]cmd =0x4d454153, len=108
4,376,712 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,916 >>> mbox cmd response: success
2,992,994 UART:
2,993,010 UART: Running Caliptra FMC ...
2,993,418 UART:
2,993,561 UART: [state] CFI Enabled
3,004,446 UART: [fht] FMC Alias Private Key: 7
3,112,067 UART: [art] Extend RT PCRs Done
3,112,495 UART: [art] Lock RT PCRs Done
3,114,191 UART: [art] Populate DV Done
3,122,566 UART: [fht] FMC Alias Private Key: 7
3,123,510 UART: [art] Derive CDI
3,123,790 UART: [art] Store in in slot 0x4
3,209,337 UART: [art] Derive Key Pair
3,209,697 UART: [art] Store priv key in slot 0x5
3,223,207 UART: [art] Derive Key Pair - Done
3,237,833 UART: [art] Signing Cert with AUTHO
3,238,313 UART: RITY.KEYID = 7
3,253,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,360 UART: [art] PUB.X = F67B6AE8B9BA715774F49ED9C7B9CC483C3E1822420E408B41D3523534B3A2F94DBBF4BEB48F9D5D4F6F15BBA571B0C2
3,261,143 UART: [art] PUB.Y = 617D56F76EF3A6F8CC645FA54009424E9EA4276C1102449375B3DA40F057F7392E7641937DA5DDD243F53F427EF13F81
3,268,085 UART: [art] SIG.R = 0D115DEF42B46084166DCE66B3973D94EE07E15A547C1B85421976EA7531284A75404277F8A712A381BCF45BC00558D6
3,274,840 UART: [art] SIG.S = 499D5464425EA5B122E8C46EEC98997F0B4845D9D237031E426E11A7878690134FF12E6D08CFDC792976888863F66103
3,298,067 UART: Caliptra RT
3,298,412 UART: [state] CFI Enabled
3,406,314 UART: [rt] RT listening for mailbox commands...
3,406,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,202 UART: [rt]cmd =0x4d454153, len=108
3,457,502 >>> mbox cmd response data (12 bytes)
3,457,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,620 UART: [rt]cmd =0x4d454153, len=108
3,508,624 >>> mbox cmd response data (12 bytes)
3,508,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,570 UART: [rt]cmd =0x4d454153, len=108
3,559,364 >>> mbox cmd response data (12 bytes)
3,559,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,232 UART: [rt]cmd =0x4d454153, len=108
3,609,840 >>> mbox cmd response data (12 bytes)
3,609,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,724 UART: [rt]cmd =0x4d454153, len=108
3,660,596 >>> mbox cmd response data (12 bytes)
3,660,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,622 UART: [rt]cmd =0x4d454153, len=108
3,711,892 >>> mbox cmd response data (12 bytes)
3,711,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,882 UART: [rt]cmd =0x4d454153, len=108
3,763,040 >>> mbox cmd response data (12 bytes)
3,763,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,800 UART: [rt]cmd =0x4d454153, len=108
3,813,902 >>> mbox cmd response data (12 bytes)
3,813,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,170 UART: [rt]cmd =0x4d454153, len=108
3,864,104 >>> mbox cmd response data (12 bytes)
3,864,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,054 UART: [rt]cmd =0x4d454153, len=108
3,914,476 >>> mbox cmd response data (12 bytes)
3,914,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,536 UART: [rt]cmd =0x4d454153, len=108
3,964,674 >>> mbox cmd response data (12 bytes)
3,964,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,994,908 UART: [rt]cmd =0x4d454153, len=108
4,014,642 >>> mbox cmd response data (12 bytes)
4,014,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,758 UART: [rt]cmd =0x4d454153, len=108
4,065,704 >>> mbox cmd response data (12 bytes)
4,065,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,496 UART: [rt]cmd =0x4d454153, len=108
4,116,968 >>> mbox cmd response data (12 bytes)
4,116,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,872 UART: [rt]cmd =0x4d454153, len=108
4,167,780 >>> mbox cmd response data (12 bytes)
4,167,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,744 UART: [rt]cmd =0x4d454153, len=108
4,199,557 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,294 UART: [kat] SHA2-512-ACC
908,195 UART: [kat] ECC-384
917,734 UART: [kat] HMAC-384Kdf
922,526 UART: [kat] LMS
1,170,854 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,171,967 UART: [fht] FHT @ 0x50003400
1,174,498 UART: [idev] ++
1,174,666 UART: [idev] CDI.KEYID = 6
1,175,026 UART: [idev] SUBJECT.KEYID = 7
1,175,450 UART: [idev] UDS.KEYID = 0
1,175,795 ready_for_fw is high
1,175,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,605 UART: [idev] --
1,209,459 UART: [ldev] ++
1,209,627 UART: [ldev] CDI.KEYID = 6
1,209,990 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,521 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,460 >>> mbox cmd response: success
2,777,656 UART: [afmc] ++
2,777,824 UART: [afmc] CDI.KEYID = 6
2,778,186 UART: [afmc] SUBJECT.KEYID = 7
2,778,611 UART: [afmc] AUTHORITY.KEYID = 5
2,814,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,289 UART: [afmc] --
2,857,231 UART: [cold-reset] --
2,858,237 UART: [state] Locking Datavault
2,859,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,888 UART: [state] Locking ICCM
2,860,400 UART: [exit] Launching FMC @ 0x40000130
2,865,729 UART:
2,865,745 UART: Running Caliptra FMC ...
2,866,153 UART:
2,866,207 UART: [state] CFI Enabled
2,876,700 UART: [fht] FMC Alias Private Key: 7
2,983,969 UART: [art] Extend RT PCRs Done
2,984,397 UART: [art] Lock RT PCRs Done
2,985,719 UART: [art] Populate DV Done
2,994,050 UART: [fht] FMC Alias Private Key: 7
2,995,036 UART: [art] Derive CDI
2,995,316 UART: [art] Store in in slot 0x4
3,080,987 UART: [art] Derive Key Pair
3,081,347 UART: [art] Store priv key in slot 0x5
3,094,035 UART: [art] Derive Key Pair - Done
3,108,770 UART: [art] Signing Cert with AUTHO
3,109,250 UART: RITY.KEYID = 7
3,124,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,697 UART: [art] PUB.X = EFF998C99ACC2539C026B91C6D1EF1DA1BF00034CCAA2B0B9D105CDCBDCB6BEEE56802FB6C80764343B113B4E1CD4777
3,132,463 UART: [art] PUB.Y = 1BF49F843B7623968492D1FF6032E19A0816112CC79A90374DB624B75B28FAA0A88F77F91DE821FBF551A8F053B5D4C9
3,139,412 UART: [art] SIG.R = A93096D59D3EEC097EB2933304D3DE111477760A9B753950F900B3DB98316DE0CF9185F99094D14235E0D89897071E15
3,146,138 UART: [art] SIG.S = 37CD045BD3ABF636DA302B133C8BDD04287EEB4228AB034C3AA43362DE664E32447E8F4408C70AF488FBAEF6CDD9B21A
3,169,256 UART: Caliptra RT
3,169,509 UART: [state] CFI Enabled
3,277,394 UART: [rt] RT listening for mailbox commands...
3,278,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,458 UART: [rt]cmd =0x4d454153, len=108
3,329,242 >>> mbox cmd response data (12 bytes)
3,329,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,258 UART: [rt]cmd =0x4d454153, len=108
3,380,114 >>> mbox cmd response data (12 bytes)
3,380,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,144 UART: [rt]cmd =0x4d454153, len=108
3,430,530 >>> mbox cmd response data (12 bytes)
3,430,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,454 UART: [rt]cmd =0x4d454153, len=108
3,481,062 >>> mbox cmd response data (12 bytes)
3,481,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,920 UART: [rt]cmd =0x4d454153, len=108
3,531,502 >>> mbox cmd response data (12 bytes)
3,531,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,802 UART: [rt]cmd =0x4d454153, len=108
3,581,876 >>> mbox cmd response data (12 bytes)
3,581,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,690 UART: [rt]cmd =0x4d454153, len=108
3,632,764 >>> mbox cmd response data (12 bytes)
3,632,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,826 UART: [rt]cmd =0x4d454153, len=108
3,683,508 >>> mbox cmd response data (12 bytes)
3,683,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,454 UART: [rt]cmd =0x4d454153, len=108
3,734,474 >>> mbox cmd response data (12 bytes)
3,734,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,552 UART: [rt]cmd =0x4d454153, len=108
3,785,004 >>> mbox cmd response data (12 bytes)
3,785,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,980 UART: [rt]cmd =0x4d454153, len=108
3,835,260 >>> mbox cmd response data (12 bytes)
3,835,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,306 UART: [rt]cmd =0x4d454153, len=108
3,885,510 >>> mbox cmd response data (12 bytes)
3,885,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,506 UART: [rt]cmd =0x4d454153, len=108
3,936,602 >>> mbox cmd response data (12 bytes)
3,936,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,490 UART: [rt]cmd =0x4d454153, len=108
3,987,438 >>> mbox cmd response data (12 bytes)
3,987,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,440 UART: [rt]cmd =0x4d454153, len=108
4,038,066 >>> mbox cmd response data (12 bytes)
4,038,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,198 UART: [rt]cmd =0x4d454153, len=108
4,070,049 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 ready_for_fw is high
1,060,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,947 >>> mbox cmd response: success
2,691,069 UART:
2,691,085 UART: Running Caliptra FMC ...
2,691,493 UART:
2,691,547 UART: [state] CFI Enabled
2,701,922 UART: [fht] FMC Alias Private Key: 7
2,809,109 UART: [art] Extend RT PCRs Done
2,809,537 UART: [art] Lock RT PCRs Done
2,810,883 UART: [art] Populate DV Done
2,819,180 UART: [fht] FMC Alias Private Key: 7
2,820,134 UART: [art] Derive CDI
2,820,414 UART: [art] Store in in slot 0x4
2,906,521 UART: [art] Derive Key Pair
2,906,881 UART: [art] Store priv key in slot 0x5
2,919,481 UART: [art] Derive Key Pair - Done
2,934,388 UART: [art] Signing Cert with AUTHO
2,934,868 UART: RITY.KEYID = 7
2,950,198 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,963 UART: [art] PUB.X = 06317A8F064712A46B9CCBC40B4ECE3B410BE4073FEF755CD5D76E00491081659F2E7495D4BAD6D406ABD63EB368DB30
2,957,703 UART: [art] PUB.Y = 755CDA3E64BA25D61B2E5B29C5B1776FDD7569A0DF67BF0C9E8EEB042BCDC2A4AE850A909CC13BFB4FCADA01D23249CA
2,964,671 UART: [art] SIG.R = 7752EABF115CDEB32F9E20741F17208395B760C38BE161031F03906CCC30D5FA244EB0D27B38DF41C3A38D542C78267A
2,971,439 UART: [art] SIG.S = 2AC213D1353966152048405DE4F743F9DE0D9FBE95DAB0996AC109F7A0D08CE81EB3E3E044CC107F6B7974C0ADDE6634
2,995,118 UART: Caliptra RT
2,995,371 UART: [state] CFI Enabled
3,101,966 UART: [rt] RT listening for mailbox commands...
3,102,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,326 UART: [rt]cmd =0x4d454153, len=108
3,154,106 >>> mbox cmd response data (12 bytes)
3,154,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,292 UART: [rt]cmd =0x4d454153, len=108
3,204,888 >>> mbox cmd response data (12 bytes)
3,204,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,848 UART: [rt]cmd =0x4d454153, len=108
3,255,104 >>> mbox cmd response data (12 bytes)
3,255,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,112 UART: [rt]cmd =0x4d454153, len=108
3,305,494 >>> mbox cmd response data (12 bytes)
3,305,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,546 UART: [rt]cmd =0x4d454153, len=108
3,356,860 >>> mbox cmd response data (12 bytes)
3,356,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,698 UART: [rt]cmd =0x4d454153, len=108
3,407,456 >>> mbox cmd response data (12 bytes)
3,407,457 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,490 UART: [rt]cmd =0x4d454153, len=108
3,458,626 >>> mbox cmd response data (12 bytes)
3,458,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,754 UART: [rt]cmd =0x4d454153, len=108
3,509,760 >>> mbox cmd response data (12 bytes)
3,509,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,660 UART: [rt]cmd =0x4d454153, len=108
3,561,256 >>> mbox cmd response data (12 bytes)
3,561,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,438 UART: [rt]cmd =0x4d454153, len=108
3,613,234 >>> mbox cmd response data (12 bytes)
3,613,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,306 UART: [rt]cmd =0x4d454153, len=108
3,664,064 >>> mbox cmd response data (12 bytes)
3,664,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,224 UART: [rt]cmd =0x4d454153, len=108
3,714,780 >>> mbox cmd response data (12 bytes)
3,714,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,864 UART: [rt]cmd =0x4d454153, len=108
3,765,014 >>> mbox cmd response data (12 bytes)
3,765,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,888 UART: [rt]cmd =0x4d454153, len=108
3,815,836 >>> mbox cmd response data (12 bytes)
3,815,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,724 UART: [rt]cmd =0x4d454153, len=108
3,866,786 >>> mbox cmd response data (12 bytes)
3,866,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,916 UART: [rt]cmd =0x4d454153, len=108
3,898,515 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,109 UART: [kat] HMAC-384Kdf
922,769 UART: [kat] LMS
1,171,097 UART: [kat] --
1,172,010 UART: [cold-reset] ++
1,172,474 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 ready_for_fw is high
1,176,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,161 UART: [idev] Erasing UDS.KEYID = 0
1,201,038 UART: [idev] Sha1 KeyId Algorithm
1,209,532 UART: [idev] --
1,210,522 UART: [ldev] ++
1,210,690 UART: [ldev] CDI.KEYID = 6
1,211,053 UART: [ldev] SUBJECT.KEYID = 5
1,211,479 UART: [ldev] AUTHORITY.KEYID = 7
1,211,942 UART: [ldev] FE.KEYID = 1
1,217,250 UART: [ldev] Erasing FE.KEYID = 1
1,243,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,638 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,729 UART: [fwproc] Recv command 0x46574c44
1,284,457 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,051 >>> mbox cmd response: success
2,777,107 UART: [afmc] ++
2,777,275 UART: [afmc] CDI.KEYID = 6
2,777,637 UART: [afmc] SUBJECT.KEYID = 7
2,778,062 UART: [afmc] AUTHORITY.KEYID = 5
2,813,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,794 UART: [afmc] --
2,856,724 UART: [cold-reset] --
2,857,686 UART: [state] Locking Datavault
2,858,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,325 UART: [state] Locking ICCM
2,859,747 UART: [exit] Launching FMC @ 0x40000130
2,865,076 UART:
2,865,092 UART: Running Caliptra FMC ...
2,865,500 UART:
2,865,643 UART: [state] CFI Enabled
2,875,876 UART: [fht] FMC Alias Private Key: 7
2,983,669 UART: [art] Extend RT PCRs Done
2,984,097 UART: [art] Lock RT PCRs Done
2,985,507 UART: [art] Populate DV Done
2,993,972 UART: [fht] FMC Alias Private Key: 7
2,995,102 UART: [art] Derive CDI
2,995,382 UART: [art] Store in in slot 0x4
3,081,003 UART: [art] Derive Key Pair
3,081,363 UART: [art] Store priv key in slot 0x5
3,094,923 UART: [art] Derive Key Pair - Done
3,110,096 UART: [art] Signing Cert with AUTHO
3,110,576 UART: RITY.KEYID = 7
3,125,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,177 UART: [art] PUB.X = E74D595C951FCA200ED4CFBA8008DF04A0AFC72C07A3EA04710281820BC85447F8E36A2DBE076C266FB290563C874226
3,132,929 UART: [art] PUB.Y = 4BC79B324209088A2C12D902F018FB23F73237EA65CDCFAF25C453403BBBAE78E8289B71DF5306933066560253639AEF
3,139,864 UART: [art] SIG.R = F189810C1E476CCC8A89BFEEDE860E34924BFDD5707C961C169C95E528F9770FD308DD1E13E3014708C2BA7AE5312D18
3,146,624 UART: [art] SIG.S = 0BB3BD714A8572730334F9015E0D749107A72182A59F0ABA45A11FA7EC3C24C40318D04D254C2965E5804020D4796CF0
3,170,166 UART: Caliptra RT
3,170,511 UART: [state] CFI Enabled
3,277,346 UART: [rt] RT listening for mailbox commands...
3,278,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,412 UART: [rt]cmd =0x4d454153, len=108
3,329,290 >>> mbox cmd response data (12 bytes)
3,329,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,198 UART: [rt]cmd =0x4d454153, len=108
3,379,238 >>> mbox cmd response data (12 bytes)
3,379,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,114 UART: [rt]cmd =0x4d454153, len=108
3,429,850 >>> mbox cmd response data (12 bytes)
3,429,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,656 UART: [rt]cmd =0x4d454153, len=108
3,480,962 >>> mbox cmd response data (12 bytes)
3,480,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,194 UART: [rt]cmd =0x4d454153, len=108
3,531,376 >>> mbox cmd response data (12 bytes)
3,531,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,404 UART: [rt]cmd =0x4d454153, len=108
3,581,510 >>> mbox cmd response data (12 bytes)
3,581,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,594 UART: [rt]cmd =0x4d454153, len=108
3,632,982 >>> mbox cmd response data (12 bytes)
3,632,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,840 UART: [rt]cmd =0x4d454153, len=108
3,683,668 >>> mbox cmd response data (12 bytes)
3,683,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,682 UART: [rt]cmd =0x4d454153, len=108
3,735,218 >>> mbox cmd response data (12 bytes)
3,735,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,252 UART: [rt]cmd =0x4d454153, len=108
3,786,198 >>> mbox cmd response data (12 bytes)
3,786,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,106 UART: [rt]cmd =0x4d454153, len=108
3,836,992 >>> mbox cmd response data (12 bytes)
3,836,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,324 UART: [rt]cmd =0x4d454153, len=108
3,888,274 >>> mbox cmd response data (12 bytes)
3,888,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,440 UART: [rt]cmd =0x4d454153, len=108
3,939,204 >>> mbox cmd response data (12 bytes)
3,939,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,104 UART: [rt]cmd =0x4d454153, len=108
3,990,348 >>> mbox cmd response data (12 bytes)
3,990,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,400 UART: [rt]cmd =0x4d454153, len=108
4,042,168 >>> mbox cmd response data (12 bytes)
4,042,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,086 UART: [rt]cmd =0x4d454153, len=108
4,073,953 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 ready_for_fw is high
1,060,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,631,446 >>> mbox cmd response: success
2,693,880 UART:
2,693,896 UART: Running Caliptra FMC ...
2,694,304 UART:
2,694,447 UART: [state] CFI Enabled
2,705,100 UART: [fht] FMC Alias Private Key: 7
2,812,825 UART: [art] Extend RT PCRs Done
2,813,253 UART: [art] Lock RT PCRs Done
2,814,687 UART: [art] Populate DV Done
2,822,916 UART: [fht] FMC Alias Private Key: 7
2,823,988 UART: [art] Derive CDI
2,824,268 UART: [art] Store in in slot 0x4
2,909,829 UART: [art] Derive Key Pair
2,910,189 UART: [art] Store priv key in slot 0x5
2,923,493 UART: [art] Derive Key Pair - Done
2,938,128 UART: [art] Signing Cert with AUTHO
2,938,608 UART: RITY.KEYID = 7
2,953,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,649 UART: [art] PUB.X = 2CABB1E5C16D24B382DF4B12C115B9087F149B73504210A96ED80F991C65870F2612E300E1B30FB883380DD3C1603CF0
2,961,382 UART: [art] PUB.Y = 34C362C0811694D95D803366A90AACE82BA5EA748F4F33961F8BF44911569EE78CFF55FF256C259EA13F58F2721480A3
2,968,329 UART: [art] SIG.R = 4606C900E2C25527AEDE1D1F6B2681190CF01F02F89D8E3F4AC1C77726EAAB1BF2DE1ADD2134705081311010506ED132
2,975,072 UART: [art] SIG.S = DF4EFE30991055DEBFB2F3DB766ECDF77EA605CF142B9664B1214F0EA9E8415BB6E8D0A8B5F40CDBD62EF2C1B3478F48
2,997,884 UART: Caliptra RT
2,998,229 UART: [state] CFI Enabled
3,106,558 UART: [rt] RT listening for mailbox commands...
3,107,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,408 UART: [rt]cmd =0x4d454153, len=108
3,158,128 >>> mbox cmd response data (12 bytes)
3,158,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,970 UART: [rt]cmd =0x4d454153, len=108
3,209,518 >>> mbox cmd response data (12 bytes)
3,209,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,650 UART: [rt]cmd =0x4d454153, len=108
3,260,450 >>> mbox cmd response data (12 bytes)
3,260,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,686 UART: [rt]cmd =0x4d454153, len=108
3,311,700 >>> mbox cmd response data (12 bytes)
3,311,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,804 UART: [rt]cmd =0x4d454153, len=108
3,362,466 >>> mbox cmd response data (12 bytes)
3,362,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,234 UART: [rt]cmd =0x4d454153, len=108
3,413,176 >>> mbox cmd response data (12 bytes)
3,413,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,084 UART: [rt]cmd =0x4d454153, len=108
3,463,902 >>> mbox cmd response data (12 bytes)
3,463,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,166 UART: [rt]cmd =0x4d454153, len=108
3,515,924 >>> mbox cmd response data (12 bytes)
3,515,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,900 UART: [rt]cmd =0x4d454153, len=108
3,566,282 >>> mbox cmd response data (12 bytes)
3,566,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,168 UART: [rt]cmd =0x4d454153, len=108
3,617,596 >>> mbox cmd response data (12 bytes)
3,617,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,728 UART: [rt]cmd =0x4d454153, len=108
3,668,476 >>> mbox cmd response data (12 bytes)
3,668,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,440 UART: [rt]cmd =0x4d454153, len=108
3,719,592 >>> mbox cmd response data (12 bytes)
3,719,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,850 UART: [rt]cmd =0x4d454153, len=108
3,770,738 >>> mbox cmd response data (12 bytes)
3,770,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,746 UART: [rt]cmd =0x4d454153, len=108
3,821,628 >>> mbox cmd response data (12 bytes)
3,821,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,851,648 UART: [rt]cmd =0x4d454153, len=108
3,872,354 >>> mbox cmd response data (12 bytes)
3,872,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,170 UART: [rt]cmd =0x4d454153, len=108
3,903,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,174,003 ready_for_fw is high
1,174,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,730 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,988 >>> mbox cmd response: success
2,774,071 UART: [afmc] ++
2,774,239 UART: [afmc] CDI.KEYID = 6
2,774,602 UART: [afmc] SUBJECT.KEYID = 7
2,775,028 UART: [afmc] AUTHORITY.KEYID = 5
2,810,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,360 UART: [afmc] --
2,853,432 UART: [cold-reset] --
2,854,410 UART: [state] Locking Datavault
2,855,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,253 UART: [state] Locking ICCM
2,856,811 UART: [exit] Launching FMC @ 0x40000130
2,862,140 UART:
2,862,156 UART: Running Caliptra FMC ...
2,862,564 UART:
2,862,618 UART: [state] CFI Enabled
2,873,225 UART: [fht] FMC Alias Private Key: 7
2,981,236 UART: [art] Extend RT PCRs Done
2,981,664 UART: [art] Lock RT PCRs Done
2,983,346 UART: [art] Populate DV Done
2,991,645 UART: [fht] FMC Alias Private Key: 7
2,992,677 UART: [art] Derive CDI
2,992,957 UART: [art] Store in in slot 0x4
3,078,782 UART: [art] Derive Key Pair
3,079,142 UART: [art] Store priv key in slot 0x5
3,092,260 UART: [art] Derive Key Pair - Done
3,106,883 UART: [art] Signing Cert with AUTHO
3,107,363 UART: RITY.KEYID = 7
3,123,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,858 UART: [art] PUB.X = 696534ECD3B44170E499050033DD0CF168D3F39DF223B2279F0DFA5456CFA8ABE489D4459600EE3AFF4E0023B6BA58A6
3,130,561 UART: [art] PUB.Y = BE43DA1074F388A6F21011F178B4796A026C1698CF9EF08AE3E53031346CB55EC0D22B22DE0E8E8619BE0B0CEC6AB592
3,137,509 UART: [art] SIG.R = 5A7E684E6FAEE0E1B42C4CAEF2B0CB9F283785AE6212E0D46B25220F8E494EBFD56C03028B55CAB87FACB98B42761505
3,144,283 UART: [art] SIG.S = 87E052981F4A98C7E17067F9EA823B4A1FC816AB912A629BE94B3CF3F5AB34B631DF417DE0B78BB4DB5B4F2AFC3396F4
3,168,374 UART: Caliptra RT
3,168,627 UART: [state] CFI Enabled
3,276,552 UART: [rt] RT listening for mailbox commands...
3,277,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,636 UART: [rt]cmd =0x4d454153, len=108
3,328,244 >>> mbox cmd response data (12 bytes)
3,328,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,308 UART: [rt]cmd =0x4d454153, len=108
3,378,862 >>> mbox cmd response data (12 bytes)
3,378,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,004 UART: [rt]cmd =0x4d454153, len=108
3,430,790 >>> mbox cmd response data (12 bytes)
3,430,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,772 UART: [rt]cmd =0x4d454153, len=108
3,481,256 >>> mbox cmd response data (12 bytes)
3,481,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,274 UART: [rt]cmd =0x4d454153, len=108
3,532,292 >>> mbox cmd response data (12 bytes)
3,532,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,080 UART: [rt]cmd =0x4d454153, len=108
3,583,220 >>> mbox cmd response data (12 bytes)
3,583,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,486 UART: [rt]cmd =0x4d454153, len=108
3,634,640 >>> mbox cmd response data (12 bytes)
3,634,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,612 UART: [rt]cmd =0x4d454153, len=108
3,684,902 >>> mbox cmd response data (12 bytes)
3,684,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,082 UART: [rt]cmd =0x4d454153, len=108
3,735,820 >>> mbox cmd response data (12 bytes)
3,735,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,876 UART: [rt]cmd =0x4d454153, len=108
3,787,114 >>> mbox cmd response data (12 bytes)
3,787,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,122 UART: [rt]cmd =0x4d454153, len=108
3,838,050 >>> mbox cmd response data (12 bytes)
3,838,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,142 UART: [rt]cmd =0x4d454153, len=108
3,888,614 >>> mbox cmd response data (12 bytes)
3,888,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,572 UART: [rt]cmd =0x4d454153, len=108
3,938,996 >>> mbox cmd response data (12 bytes)
3,938,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,198 UART: [rt]cmd =0x4d454153, len=108
3,990,410 >>> mbox cmd response data (12 bytes)
3,990,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,574 UART: [rt]cmd =0x4d454153, len=108
4,041,046 >>> mbox cmd response data (12 bytes)
4,041,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,138 UART: [rt]cmd =0x4d454153, len=108
4,072,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,592 ready_for_fw is high
1,056,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,116 >>> mbox cmd response: success
2,684,304 UART:
2,684,320 UART: Running Caliptra FMC ...
2,684,728 UART:
2,684,782 UART: [state] CFI Enabled
2,695,235 UART: [fht] FMC Alias Private Key: 7
2,803,264 UART: [art] Extend RT PCRs Done
2,803,692 UART: [art] Lock RT PCRs Done
2,805,336 UART: [art] Populate DV Done
2,813,659 UART: [fht] FMC Alias Private Key: 7
2,814,769 UART: [art] Derive CDI
2,815,049 UART: [art] Store in in slot 0x4
2,901,098 UART: [art] Derive Key Pair
2,901,458 UART: [art] Store priv key in slot 0x5
2,914,794 UART: [art] Derive Key Pair - Done
2,929,612 UART: [art] Signing Cert with AUTHO
2,930,092 UART: RITY.KEYID = 7
2,945,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,969 UART: [art] PUB.X = 7BFDCE001C2718F6AE4FBC9E88E0B872350253AD13003430BA82BF6DE75829EB02E9303A3FD71056F4B617F9E3D1F3F8
2,952,699 UART: [art] PUB.Y = 72EDAD141632D160E42EF4FA61FDBC5BD5E9871B13A5FCBE3AB402EF8B9730D2B3D5BFAEEA0C5CE4ECE87F9F50D2FF90
2,959,677 UART: [art] SIG.R = 3467EDEB9D19A56027A6F55F7607EE52D229BD78616B25D9718022F8752D43EF88637FF2F0040F9B95CB20670BF24DE6
2,966,435 UART: [art] SIG.S = 0D9617D6CAE33AEF03CBFEDD6715066A74989126E43555ECD99684BF7182A45B31A8180AEA0F9278FEBB96F3935895A0
2,989,735 UART: Caliptra RT
2,989,988 UART: [state] CFI Enabled
3,097,477 UART: [rt] RT listening for mailbox commands...
3,098,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,691 UART: [rt]cmd =0x4d454153, len=108
3,149,345 >>> mbox cmd response data (12 bytes)
3,149,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,495 UART: [rt]cmd =0x4d454153, len=108
3,199,487 >>> mbox cmd response data (12 bytes)
3,199,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,379 UART: [rt]cmd =0x4d454153, len=108
3,249,445 >>> mbox cmd response data (12 bytes)
3,249,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,415 UART: [rt]cmd =0x4d454153, len=108
3,299,945 >>> mbox cmd response data (12 bytes)
3,299,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,791 UART: [rt]cmd =0x4d454153, len=108
3,350,669 >>> mbox cmd response data (12 bytes)
3,350,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,613 UART: [rt]cmd =0x4d454153, len=108
3,401,291 >>> mbox cmd response data (12 bytes)
3,401,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,181 UART: [rt]cmd =0x4d454153, len=108
3,451,263 >>> mbox cmd response data (12 bytes)
3,451,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,333 UART: [rt]cmd =0x4d454153, len=108
3,502,153 >>> mbox cmd response data (12 bytes)
3,502,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,905 UART: [rt]cmd =0x4d454153, len=108
3,552,959 >>> mbox cmd response data (12 bytes)
3,552,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,147 UART: [rt]cmd =0x4d454153, len=108
3,604,517 >>> mbox cmd response data (12 bytes)
3,604,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,545 UART: [rt]cmd =0x4d454153, len=108
3,655,779 >>> mbox cmd response data (12 bytes)
3,655,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,975 UART: [rt]cmd =0x4d454153, len=108
3,706,435 >>> mbox cmd response data (12 bytes)
3,706,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,587 UART: [rt]cmd =0x4d454153, len=108
3,757,149 >>> mbox cmd response data (12 bytes)
3,757,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,063 UART: [rt]cmd =0x4d454153, len=108
3,807,943 >>> mbox cmd response data (12 bytes)
3,807,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,053 UART: [rt]cmd =0x4d454153, len=108
3,858,285 >>> mbox cmd response data (12 bytes)
3,858,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,293 UART: [rt]cmd =0x4d454153, len=108
3,890,054 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 ready_for_fw is high
1,174,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,198,862 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,529 UART: [ldev] ++
1,208,697 UART: [ldev] CDI.KEYID = 6
1,209,061 UART: [ldev] SUBJECT.KEYID = 5
1,209,488 UART: [ldev] AUTHORITY.KEYID = 7
1,209,951 UART: [ldev] FE.KEYID = 1
1,214,925 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,547 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,237 >>> mbox cmd response: success
2,775,256 UART: [afmc] ++
2,775,424 UART: [afmc] CDI.KEYID = 6
2,775,787 UART: [afmc] SUBJECT.KEYID = 7
2,776,213 UART: [afmc] AUTHORITY.KEYID = 5
2,811,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,381 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,993 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,712 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,651 UART: [afmc] --
2,855,697 UART: [cold-reset] --
2,856,499 UART: [state] Locking Datavault
2,857,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,300 UART: [state] Locking ICCM
2,858,804 UART: [exit] Launching FMC @ 0x40000130
2,864,133 UART:
2,864,149 UART: Running Caliptra FMC ...
2,864,557 UART:
2,864,700 UART: [state] CFI Enabled
2,875,483 UART: [fht] FMC Alias Private Key: 7
2,982,780 UART: [art] Extend RT PCRs Done
2,983,208 UART: [art] Lock RT PCRs Done
2,984,942 UART: [art] Populate DV Done
2,993,127 UART: [fht] FMC Alias Private Key: 7
2,994,199 UART: [art] Derive CDI
2,994,479 UART: [art] Store in in slot 0x4
3,080,338 UART: [art] Derive Key Pair
3,080,698 UART: [art] Store priv key in slot 0x5
3,093,938 UART: [art] Derive Key Pair - Done
3,108,727 UART: [art] Signing Cert with AUTHO
3,109,207 UART: RITY.KEYID = 7
3,124,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,354 UART: [art] PUB.X = E7CA1D2228E1FF52F17DE7F504C0C24F7B11C1C98548801B4D15A9BAEEB2503EC640236A0024C70B1633AE30ADB5F720
3,132,106 UART: [art] PUB.Y = D2D210DE078F612B608B4DB5BBC7DC6E56ABF0296AA607EDB56FE8F3BB438569C68FA25B2504FAD37BB8B2A956D56D81
3,139,067 UART: [art] SIG.R = 3CA23C165EC1D29722555408C53B5D73FE1D2DF8EA5F691CF2AFA7F1E6FA7ED80321D38DBAAB953BD4D190B8DCB9E441
3,145,853 UART: [art] SIG.S = EC3AAE394650824BBF7D5BE63A73A8885C5D6A05F3E9AF11D83055A8BC9C4A51608994CE919D79219D0A13BB3671CF42
3,170,092 UART: Caliptra RT
3,170,437 UART: [state] CFI Enabled
3,278,222 UART: [rt] RT listening for mailbox commands...
3,278,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,484 UART: [rt]cmd =0x4d454153, len=108
3,330,948 >>> mbox cmd response data (12 bytes)
3,330,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,914 UART: [rt]cmd =0x4d454153, len=108
3,382,086 >>> mbox cmd response data (12 bytes)
3,382,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,132 UART: [rt]cmd =0x4d454153, len=108
3,432,982 >>> mbox cmd response data (12 bytes)
3,432,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,220 UART: [rt]cmd =0x4d454153, len=108
3,483,714 >>> mbox cmd response data (12 bytes)
3,483,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,868 UART: [rt]cmd =0x4d454153, len=108
3,534,178 >>> mbox cmd response data (12 bytes)
3,534,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,236 UART: [rt]cmd =0x4d454153, len=108
3,584,388 >>> mbox cmd response data (12 bytes)
3,584,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,570 UART: [rt]cmd =0x4d454153, len=108
3,635,942 >>> mbox cmd response data (12 bytes)
3,635,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,026 UART: [rt]cmd =0x4d454153, len=108
3,686,688 >>> mbox cmd response data (12 bytes)
3,686,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,936 UART: [rt]cmd =0x4d454153, len=108
3,737,604 >>> mbox cmd response data (12 bytes)
3,737,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,610 UART: [rt]cmd =0x4d454153, len=108
3,788,550 >>> mbox cmd response data (12 bytes)
3,788,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,554 UART: [rt]cmd =0x4d454153, len=108
3,839,770 >>> mbox cmd response data (12 bytes)
3,839,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,848 UART: [rt]cmd =0x4d454153, len=108
3,890,426 >>> mbox cmd response data (12 bytes)
3,890,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,244 UART: [rt]cmd =0x4d454153, len=108
3,941,580 >>> mbox cmd response data (12 bytes)
3,941,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,454 UART: [rt]cmd =0x4d454153, len=108
3,992,224 >>> mbox cmd response data (12 bytes)
3,992,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,078 UART: [rt]cmd =0x4d454153, len=108
4,043,214 >>> mbox cmd response data (12 bytes)
4,043,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,528 UART: [rt]cmd =0x4d454153, len=108
4,075,219 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 ready_for_fw is high
1,056,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,511 >>> mbox cmd response: success
2,687,169 UART:
2,687,185 UART: Running Caliptra FMC ...
2,687,593 UART:
2,687,736 UART: [state] CFI Enabled
2,698,575 UART: [fht] FMC Alias Private Key: 7
2,805,950 UART: [art] Extend RT PCRs Done
2,806,378 UART: [art] Lock RT PCRs Done
2,807,978 UART: [art] Populate DV Done
2,816,249 UART: [fht] FMC Alias Private Key: 7
2,817,345 UART: [art] Derive CDI
2,817,625 UART: [art] Store in in slot 0x4
2,903,544 UART: [art] Derive Key Pair
2,903,904 UART: [art] Store priv key in slot 0x5
2,917,476 UART: [art] Derive Key Pair - Done
2,932,078 UART: [art] Signing Cert with AUTHO
2,932,558 UART: RITY.KEYID = 7
2,948,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,265 UART: [art] PUB.X = 9A3EEF681038C8749FCB69AFA140B4B04AD599937D7BE55696BBCB3E15DA9841391111202C630B2D1536DF6D14C009A7
2,956,033 UART: [art] PUB.Y = 857AC9A38482243FA4ECC1769AD05CE67328A30F4312BF84E4C4A4B84FC3AA8B5C0D4058F529D517780963894A71A8CC
2,962,978 UART: [art] SIG.R = 94A173CD666055A1E138F5A9C97C874EFBB50159BB8A2E7296AE5C0B90025ADD7708A2D062F52A21CE38D0AB3990D3D8
2,969,744 UART: [art] SIG.S = E798D30B5FD28222E855A1724F77EBB49DEB6E001928A37F78ABB36B301954FAD00FABA19B06910338EBD6BB0D7872EC
2,993,366 UART: Caliptra RT
2,993,711 UART: [state] CFI Enabled
3,101,375 UART: [rt] RT listening for mailbox commands...
3,102,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,417 UART: [rt]cmd =0x4d454153, len=108
3,153,327 >>> mbox cmd response data (12 bytes)
3,153,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,345 UART: [rt]cmd =0x4d454153, len=108
3,204,187 >>> mbox cmd response data (12 bytes)
3,204,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,187 UART: [rt]cmd =0x4d454153, len=108
3,254,545 >>> mbox cmd response data (12 bytes)
3,254,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,695 UART: [rt]cmd =0x4d454153, len=108
3,305,353 >>> mbox cmd response data (12 bytes)
3,305,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,329 UART: [rt]cmd =0x4d454153, len=108
3,356,103 >>> mbox cmd response data (12 bytes)
3,356,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,301 UART: [rt]cmd =0x4d454153, len=108
3,406,719 >>> mbox cmd response data (12 bytes)
3,406,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,993 UART: [rt]cmd =0x4d454153, len=108
3,457,333 >>> mbox cmd response data (12 bytes)
3,457,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,363 UART: [rt]cmd =0x4d454153, len=108
3,507,423 >>> mbox cmd response data (12 bytes)
3,507,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,477 UART: [rt]cmd =0x4d454153, len=108
3,558,279 >>> mbox cmd response data (12 bytes)
3,558,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,223 UART: [rt]cmd =0x4d454153, len=108
3,609,777 >>> mbox cmd response data (12 bytes)
3,609,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,719 UART: [rt]cmd =0x4d454153, len=108
3,660,349 >>> mbox cmd response data (12 bytes)
3,660,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,409 UART: [rt]cmd =0x4d454153, len=108
3,711,351 >>> mbox cmd response data (12 bytes)
3,711,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,313 UART: [rt]cmd =0x4d454153, len=108
3,762,111 >>> mbox cmd response data (12 bytes)
3,762,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,217 UART: [rt]cmd =0x4d454153, len=108
3,812,949 >>> mbox cmd response data (12 bytes)
3,812,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,175 UART: [rt]cmd =0x4d454153, len=108
3,864,017 >>> mbox cmd response data (12 bytes)
3,864,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,023 UART: [rt]cmd =0x4d454153, len=108
3,895,916 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,290,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,434,776 UART:
2,435,193 UART: Running Caliptra ROM ...
2,436,364 UART:
2,436,540 UART: [state] CFI Enabled
2,437,499 UART: [state] LifecycleState = Unprovisioned
2,439,155 UART: [state] DebugLocked = No
2,440,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,443,566 UART: [kat] SHA2-256
2,444,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,447,263 UART: [kat] ++
2,447,724 UART: [kat] sha1
2,448,243 UART: [kat] SHA2-256
2,448,982 UART: [kat] SHA2-384
2,449,650 UART: [kat] SHA2-512-ACC
2,450,486 UART: [kat] ECC-384
2,767,266 UART: [kat] HMAC-384Kdf
2,796,538 UART: [kat] LMS
3,986,822 UART: [kat] --
3,992,587 UART: [cold-reset] ++
3,994,643 UART: [fht] Storing FHT @ 0x50003400
4,005,369 UART: [idev] ++
4,005,958 UART: [idev] CDI.KEYID = 6
4,006,885 UART: [idev] SUBJECT.KEYID = 7
4,008,106 UART: [idev] UDS.KEYID = 0
4,031,418 UART: [idev] Erasing UDS.KEYID = 0
7,343,565 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,207 UART: [idev] --
7,368,680 UART: [ldev] ++
7,369,265 UART: [ldev] CDI.KEYID = 6
7,370,154 UART: [ldev] SUBJECT.KEYID = 5
7,371,343 UART: [ldev] AUTHORITY.KEYID = 7
7,372,686 UART: [ldev] FE.KEYID = 1
7,417,487 UART: [ldev] Erasing FE.KEYID = 1
10,747,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,304 UART: [ldev] --
13,109,244 UART: [fwproc] Waiting for Commands...
13,111,072 UART: [fwproc] Received command 0x46574c44
13,113,266 UART: [fwproc] Received Image of size 114124 bytes
17,153,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,204 >>> mbox cmd response: success
17,620,568 UART: [afmc] ++
17,621,156 UART: [afmc] CDI.KEYID = 6
17,622,040 UART: [afmc] SUBJECT.KEYID = 7
17,623,326 UART: [afmc] AUTHORITY.KEYID = 5
20,981,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,466 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,766 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,162 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,312,978 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,451 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,348,615 UART: [afmc] --
23,352,372 UART: [cold-reset] --
23,355,810 UART: [state] Locking Datavault
23,361,962 UART: [state] Locking PCR0, PCR1 and PCR31
23,363,729 UART: [state] Locking ICCM
23,366,260 UART: [exit] Launching FMC @ 0x40000130
23,374,656 UART:
23,374,889 UART: Running Caliptra FMC ...
23,375,992 UART:
23,376,173 UART: [state] CFI Enabled
23,444,061 UART: [fht] FMC Alias Private Key: 7
25,781,667 UART: [art] Extend RT PCRs Done
25,782,891 UART: [art] Lock RT PCRs Done
25,784,317 UART: [art] Populate DV Done
25,789,619 UART: [fht] FMC Alias Private Key: 7
25,791,107 UART: [art] Derive CDI
25,791,876 UART: [art] Store in in slot 0x4
25,852,756 UART: [art] Derive Key Pair
25,853,804 UART: [art] Store priv key in slot 0x5
29,146,464 UART: [art] Derive Key Pair - Done
29,159,470 UART: [art] Signing Cert with AUTHO
29,160,778 UART: RITY.KEYID = 7
31,448,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,581 UART: [art] PUB.X = E3CBFF1615A1578A29D802849EF4FA1E686182B738F380DC948DC1E9A88814A59671C0D333668702B068657756C9DAAF
31,456,793 UART: [art] PUB.Y = DB37EDC2AA73B1C070984C5A91CA3AE2270899192E517BBA74B17C518108E4B125DECA2803AB7FBDF3A0B6986DFDF9BB
31,464,060 UART: [art] SIG.R = EC77E8CA182158901598B277A578AF037C285FC7641F40493634644A6F048FEB17318F6B5CB2A96D0BBC943EECE0DDD8
31,471,423 UART: [art] SIG.S = 73D5ACDDD90A3876AC2EEA94933359220F2AF0D3DE2EEC282F265357353AF247C9186548B413D1AF7F948612A561627C
32,776,661 UART: Caliptra RT
32,777,363 UART: [state] CFI Enabled
32,938,527 UART: [rt] RT listening for mailbox commands...
32,940,459 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,970,893 UART: [rt]cmd =0x44504543, len=92
32,977,420 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,292,754 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,840,200 >>> mbox cmd response: success
23,527,580 UART:
23,527,978 UART: Running Caliptra FMC ...
23,529,196 UART:
23,529,372 UART: [state] CFI Enabled
23,596,298 UART: [fht] FMC Alias Private Key: 7
25,934,110 UART: [art] Extend RT PCRs Done
25,935,333 UART: [art] Lock RT PCRs Done
25,937,338 UART: [art] Populate DV Done
25,942,558 UART: [fht] FMC Alias Private Key: 7
25,944,121 UART: [art] Derive CDI
25,944,910 UART: [art] Store in in slot 0x4
26,006,180 UART: [art] Derive Key Pair
26,007,194 UART: [art] Store priv key in slot 0x5
29,300,002 UART: [art] Derive Key Pair - Done
29,312,630 UART: [art] Signing Cert with AUTHO
29,313,937 UART: RITY.KEYID = 7
31,601,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,874 UART: [art] PUB.X = 19A3C015C8C5659875864FE1A73615B98F6A8AD734DE764ECA83902F33E0C71CC73D529907725D45CE19E1DD318995BC
31,610,081 UART: [art] PUB.Y = F42D582265DD29E1341D8F43CA0C471E30D085966FFBAD41AA9D5D63565E47B9B832C8F59052C5277FDFBFA92B74264A
31,617,327 UART: [art] SIG.R = 32A01EB0AEBCA1C14FEC617BC6777DBBA1BA123826E45B1E42A3A22611BCDACEBA27812FD93CFE3759EB106C48D6CAA3
31,624,787 UART: [art] SIG.S = 4B57F58AB3B021CA96CB1DA7DCADEF17ADD5831790A72F73BE484050BBE77B798D5949C050378631DA10CDE0B740E8D7
32,930,041 UART: Caliptra RT
32,930,765 UART: [state] CFI Enabled
33,111,352 UART: [rt] RT listening for mailbox commands...
33,113,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,143,663 UART: [rt]cmd =0x44504543, len=92
33,150,168 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,222,003 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,366,423 UART:
2,366,838 UART: Running Caliptra ROM ...
2,368,002 UART:
2,368,175 UART: [state] CFI Enabled
2,369,078 UART: [state] LifecycleState = Unprovisioned
2,370,735 UART: [state] DebugLocked = No
2,371,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,375,141 UART: [kat] SHA2-256
2,375,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,378,802 UART: [kat] ++
2,379,250 UART: [kat] sha1
2,379,756 UART: [kat] SHA2-256
2,380,490 UART: [kat] SHA2-384
2,381,153 UART: [kat] SHA2-512-ACC
2,381,975 UART: [kat] ECC-384
3,111,139 UART: [kat] HMAC-384Kdf
3,123,855 UART: [kat] LMS
4,313,996 UART: [kat] --
4,319,221 UART: [cold-reset] ++
4,321,589 UART: [fht] Storing FHT @ 0x50003400
4,334,203 UART: [idev] ++
4,334,826 UART: [idev] CDI.KEYID = 6
4,335,734 UART: [idev] SUBJECT.KEYID = 7
4,336,998 UART: [idev] UDS.KEYID = 0
4,351,560 UART: [idev] Erasing UDS.KEYID = 0
7,625,936 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,477 UART: [idev] --
7,652,230 UART: [ldev] ++
7,652,852 UART: [ldev] CDI.KEYID = 6
7,653,809 UART: [ldev] SUBJECT.KEYID = 5
7,655,019 UART: [ldev] AUTHORITY.KEYID = 7
7,656,249 UART: [ldev] FE.KEYID = 1
7,667,018 UART: [ldev] Erasing FE.KEYID = 1
10,956,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,062 UART: [ldev] --
13,319,887 UART: [fwproc] Waiting for Commands...
13,322,365 UART: [fwproc] Received command 0x46574c44
13,324,548 UART: [fwproc] Received Image of size 114124 bytes
17,386,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,461,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,530,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,847,256 >>> mbox cmd response: success
17,851,899 UART: [afmc] ++
17,852,483 UART: [afmc] CDI.KEYID = 6
17,853,459 UART: [afmc] SUBJECT.KEYID = 7
17,854,669 UART: [afmc] AUTHORITY.KEYID = 5
21,171,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,467,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,715 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,484,123 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,920 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,513,393 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,536,048 UART: [afmc] --
23,540,071 UART: [cold-reset] --
23,544,478 UART: [state] Locking Datavault
23,548,258 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,019 UART: [state] Locking ICCM
23,552,437 UART: [exit] Launching FMC @ 0x40000130
23,560,830 UART:
23,561,065 UART: Running Caliptra FMC ...
23,562,182 UART:
23,562,337 UART: [state] CFI Enabled
23,570,403 UART: [fht] FMC Alias Private Key: 7
25,901,451 UART: [art] Extend RT PCRs Done
25,902,663 UART: [art] Lock RT PCRs Done
25,904,230 UART: [art] Populate DV Done
25,909,856 UART: [fht] FMC Alias Private Key: 7
25,911,392 UART: [art] Derive CDI
25,912,202 UART: [art] Store in in slot 0x4
25,954,633 UART: [art] Derive Key Pair
25,955,669 UART: [art] Store priv key in slot 0x5
29,197,815 UART: [art] Derive Key Pair - Done
29,210,919 UART: [art] Signing Cert with AUTHO
29,212,226 UART: RITY.KEYID = 7
31,491,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,999 UART: [art] PUB.X = 2085FB6FA9F6BC33E1030BDA62DD48FFAE3AC51B56C7DCC8CD6FDE17CE4510ABCAA347B8F8AFB400C9883A7FAF3A4DDF
31,500,282 UART: [art] PUB.Y = 430407964C9216CE787156411BD0035AAD88BA8A4CCB0C6A38EFDE92371D5782950EE1CE8D91C96EBB6075BCA32A804F
31,507,549 UART: [art] SIG.R = 6218C423646C71F17E333F2650DEACDF0E6C767FF03EFB28B1DA0B7C3DA4457BD65E31A4FDC4089A7BFC26600BE6F65C
31,514,930 UART: [art] SIG.S = AC2D66BD6BFEAD942F37F43FBA6E865BACC084592298D7DDE6482219AC928C90E2AC3CC03EB683FBA3588262ECBE4534
32,820,437 UART: Caliptra RT
32,821,137 UART: [state] CFI Enabled
32,939,016 UART: [rt] RT listening for mailbox commands...
32,940,954 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,971,292 UART: [rt]cmd =0x44504543, len=92
32,977,690 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,221,452 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,509 >>> mbox cmd response: success
23,712,522 UART:
23,712,916 UART: Running Caliptra FMC ...
23,714,021 UART:
23,714,174 UART: [state] CFI Enabled
23,722,027 UART: [fht] FMC Alias Private Key: 7
26,053,414 UART: [art] Extend RT PCRs Done
26,054,645 UART: [art] Lock RT PCRs Done
26,056,028 UART: [art] Populate DV Done
26,061,615 UART: [fht] FMC Alias Private Key: 7
26,063,317 UART: [art] Derive CDI
26,064,052 UART: [art] Store in in slot 0x4
26,106,979 UART: [art] Derive Key Pair
26,108,019 UART: [art] Store priv key in slot 0x5
29,349,580 UART: [art] Derive Key Pair - Done
29,362,468 UART: [art] Signing Cert with AUTHO
29,363,768 UART: RITY.KEYID = 7
31,643,075 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,587 UART: [art] PUB.X = 28788D42E8FE8BF37CF9BF78B00AD027EF8D56F735EA6D24E35715D924CED57024612749C541DAA0509EF98F838153CF
31,651,828 UART: [art] PUB.Y = A18EEF15A39EDC3D46A0D31686FE4D5795EF57DC9288BC6697AB1BEAC42345230EADD84F0AC1EBE33A16F10997D6A7D6
31,659,080 UART: [art] SIG.R = 51145892155EC1EB9EA497C5DD6D0B21FCA34C49C8E8BC95F13317CB127728329E16FF1F5C8B17A2522F1D47B2D367AF
31,666,466 UART: [art] SIG.S = 848AC8C2B313659640A847EE41C4B9BFA1E37B4CC88E188D7A1481A1B2DF7F83D7C36D73AFBA44C5F86544BA7F23590F
32,971,750 UART: Caliptra RT
32,972,467 UART: [state] CFI Enabled
33,089,970 UART: [rt] RT listening for mailbox commands...
33,091,903 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,122,463 UART: [rt]cmd =0x44504543, len=92
33,129,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,216,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,362,205 UART:
2,362,605 UART: Running Caliptra ROM ...
2,363,877 UART:
2,364,049 UART: [state] CFI Enabled
2,365,024 UART: [state] LifecycleState = Unprovisioned
2,366,699 UART: [state] DebugLocked = No
2,367,811 UART: [state] WD Timer not started. Device not locked for debugging
2,370,280 UART: [kat] SHA2-256
2,370,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,373,965 UART: [kat] ++
2,374,416 UART: [kat] sha1
2,374,965 UART: [kat] SHA2-256
2,375,627 UART: [kat] SHA2-384
2,376,317 UART: [kat] SHA2-512-ACC
2,377,120 UART: [kat] ECC-384
2,948,979 UART: [kat] HMAC-384Kdf
2,970,114 UART: [kat] LMS
3,499,597 UART: [kat] --
3,502,780 UART: [cold-reset] ++
3,505,141 UART: [fht] FHT @ 0x50003400
3,515,269 UART: [idev] ++
3,515,863 UART: [idev] CDI.KEYID = 6
3,516,771 UART: [idev] SUBJECT.KEYID = 7
3,517,982 UART: [idev] UDS.KEYID = 0
3,542,495 UART: [idev] Erasing UDS.KEYID = 0
6,026,244 UART: [idev] Sha1 KeyId Algorithm
6,048,992 UART: [idev] --
6,053,235 UART: [ldev] ++
6,053,818 UART: [ldev] CDI.KEYID = 6
6,054,705 UART: [ldev] SUBJECT.KEYID = 5
6,055,865 UART: [ldev] AUTHORITY.KEYID = 7
6,057,155 UART: [ldev] FE.KEYID = 1
6,099,699 UART: [ldev] Erasing FE.KEYID = 1
8,601,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,354 UART: [ldev] --
10,409,078 UART: [fwproc] Wait for Commands...
10,410,963 UART: [fwproc] Recv command 0x46574c44
10,412,998 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,072 >>> mbox cmd response: success
14,275,115 UART: [afmc] ++
14,275,702 UART: [afmc] CDI.KEYID = 6
14,276,615 UART: [afmc] SUBJECT.KEYID = 7
14,277,774 UART: [afmc] AUTHORITY.KEYID = 5
16,804,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,137 UART: [afmc] --
18,605,846 UART: [cold-reset] --
18,610,515 UART: [state] Locking Datavault
18,614,586 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,272 UART: [state] Locking ICCM
18,617,432 UART: [exit] Launching FMC @ 0x40000130
18,625,830 UART:
18,626,066 UART: Running Caliptra FMC ...
18,627,168 UART:
18,627,325 UART: [state] CFI Enabled
18,687,530 UART: [fht] FMC Alias Private Key: 7
20,451,729 UART: [art] Extend RT PCRs Done
20,452,943 UART: [art] Lock RT PCRs Done
20,454,592 UART: [art] Populate DV Done
20,460,007 UART: [fht] FMC Alias Private Key: 7
20,461,597 UART: [art] Derive CDI
20,462,334 UART: [art] Store in in slot 0x4
20,520,355 UART: [art] Derive Key Pair
20,521,394 UART: [art] Store priv key in slot 0x5
22,984,278 UART: [art] Derive Key Pair - Done
22,997,724 UART: [art] Signing Cert with AUTHO
22,999,058 UART: RITY.KEYID = 7
24,709,875 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,385 UART: [art] PUB.X = BE8CCEC699A6DEC4126C59D3D1F8DC66FB5101F1ED6CFEA191D23867119E17B18A7DAC4C520107196DD66F646620712F
24,718,681 UART: [art] PUB.Y = 7805BAC5836B9050B59F2A90D67C1D1A71EB631DDB8735888A60DA10B9ED762F24AFD97219FA24B51242BA63C2EF8B05
24,725,958 UART: [art] SIG.R = 42FA325E2065B9035DAB9BED1F1DFFC0CD53BB65D6EB612AA27CED92E26A2004851C66DF8400C4AFD13912E0C59E8777
24,733,344 UART: [art] SIG.S = DD9F2AA5CDB05E99FBE1772A03F50C55F6B8E4015258776824C5652966B373760F8D052EA28CDBC3AFDBC889FEBB588F
25,712,453 UART: Caliptra RT
25,713,144 UART: [state] CFI Enabled
25,879,318 UART: [rt] RT listening for mailbox commands...
25,881,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,911,749 UART: [rt]cmd =0x44504543, len=92
25,918,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,221,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,879 >>> mbox cmd response: success
18,361,233 UART:
18,361,644 UART: Running Caliptra FMC ...
18,362,747 UART:
18,362,901 UART: [state] CFI Enabled
18,433,244 UART: [fht] FMC Alias Private Key: 7
20,196,910 UART: [art] Extend RT PCRs Done
20,198,141 UART: [art] Lock RT PCRs Done
20,199,743 UART: [art] Populate DV Done
20,205,214 UART: [fht] FMC Alias Private Key: 7
20,206,859 UART: [art] Derive CDI
20,207,595 UART: [art] Store in in slot 0x4
20,266,585 UART: [art] Derive Key Pair
20,267,647 UART: [art] Store priv key in slot 0x5
22,730,611 UART: [art] Derive Key Pair - Done
22,743,768 UART: [art] Signing Cert with AUTHO
22,745,071 UART: RITY.KEYID = 7
24,456,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,232 UART: [art] PUB.X = 59494A7A927FE8E771795A50A30BAA5CF4F2950B8B87118318556BD3902B930CF6851AB56D96BBAD67013902690C383A
24,465,344 UART: [art] PUB.Y = 25953E09D74A22B8163F71648654B64F1ED08C7067E3884C8E1FE646BFBCCAEE76D4AA0F2ACCAB727BDCBDF8D073B5D8
24,472,624 UART: [art] SIG.R = BC5C8305919B8502C77BE10B5CCF403A745D3A640F458D21584FB5578FB7728F7873F8CA5BE9CF391C35D41C5D9B419F
24,479,973 UART: [art] SIG.S = 2B5CD7862C52BC3CDA513F362512989274DA951A01922F420EC6443FD5AC25949D9FE9A64F20D560D772C1144394340D
25,459,124 UART: Caliptra RT
25,459,826 UART: [state] CFI Enabled
25,623,601 UART: [rt] RT listening for mailbox commands...
25,625,532 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,656,009 UART: [rt]cmd =0x44504543, len=92
25,662,539 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,222,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,366,668 UART:
2,367,080 UART: Running Caliptra ROM ...
2,368,250 UART:
2,368,421 UART: [state] CFI Enabled
2,369,406 UART: [state] LifecycleState = Unprovisioned
2,371,063 UART: [state] DebugLocked = No
2,372,088 UART: [state] WD Timer not started. Device not locked for debugging
2,374,555 UART: [kat] SHA2-256
2,375,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,221 UART: [kat] ++
2,378,662 UART: [kat] sha1
2,379,165 UART: [kat] SHA2-256
2,379,812 UART: [kat] SHA2-384
2,380,458 UART: [kat] SHA2-512-ACC
2,381,337 UART: [kat] ECC-384
3,280,977 UART: [kat] HMAC-384Kdf
3,294,831 UART: [kat] LMS
3,824,318 UART: [kat] --
3,828,465 UART: [cold-reset] ++
3,829,635 UART: [fht] FHT @ 0x50003400
3,840,953 UART: [idev] ++
3,841,521 UART: [idev] CDI.KEYID = 6
3,842,532 UART: [idev] SUBJECT.KEYID = 7
3,843,631 UART: [idev] UDS.KEYID = 0
3,859,494 UART: [idev] Erasing UDS.KEYID = 0
6,317,056 UART: [idev] Sha1 KeyId Algorithm
6,340,779 UART: [idev] --
6,344,177 UART: [ldev] ++
6,344,744 UART: [ldev] CDI.KEYID = 6
6,345,662 UART: [ldev] SUBJECT.KEYID = 5
6,346,816 UART: [ldev] AUTHORITY.KEYID = 7
6,348,099 UART: [ldev] FE.KEYID = 1
6,358,587 UART: [ldev] Erasing FE.KEYID = 1
8,834,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,333 UART: [ldev] --
10,626,432 UART: [fwproc] Wait for Commands...
10,628,687 UART: [fwproc] Recv command 0x46574c44
10,630,775 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,201 >>> mbox cmd response: success
14,503,283 UART: [afmc] ++
14,503,866 UART: [afmc] CDI.KEYID = 6
14,504,766 UART: [afmc] SUBJECT.KEYID = 7
14,505,971 UART: [afmc] AUTHORITY.KEYID = 5
17,004,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,488 UART: [afmc] --
18,798,382 UART: [cold-reset] --
18,802,886 UART: [state] Locking Datavault
18,806,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,365 UART: [state] Locking ICCM
18,810,340 UART: [exit] Launching FMC @ 0x40000130
18,818,789 UART:
18,819,027 UART: Running Caliptra FMC ...
18,820,075 UART:
18,820,229 UART: [state] CFI Enabled
18,828,377 UART: [fht] FMC Alias Private Key: 7
20,584,429 UART: [art] Extend RT PCRs Done
20,585,666 UART: [art] Lock RT PCRs Done
20,587,313 UART: [art] Populate DV Done
20,592,883 UART: [fht] FMC Alias Private Key: 7
20,594,467 UART: [art] Derive CDI
20,595,195 UART: [art] Store in in slot 0x4
20,637,786 UART: [art] Derive Key Pair
20,638,815 UART: [art] Store priv key in slot 0x5
23,065,469 UART: [art] Derive Key Pair - Done
23,078,561 UART: [art] Signing Cert with AUTHO
23,079,892 UART: RITY.KEYID = 7
24,785,459 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,969 UART: [art] PUB.X = 1B0FBC8157FA135F4F7F3E586DAE7F96B26571156F575FECCA82A25344070896129C3C92395CA5045EEA5AF0FA2621CA
24,794,262 UART: [art] PUB.Y = C27B98807497DE0999E9FD02891C85165700770D2E7A1945C9995B5E602FB94C075C6437BD6F63FE0A450AB6BA3A09B6
24,801,471 UART: [art] SIG.R = BF5F608A19F11B41744A0E68418A1FF618915C1D9A7098BC049EF80FA506C11851F9B3E1D654D2257EAA4DBF7EE2A1BB
24,808,842 UART: [art] SIG.S = A5CB08CA24E43EC87415BBA8486A41E032010525ACA1944C24C849662FE15171BCE4A12318B0D105088CD941FC46C1C7
25,787,741 UART: Caliptra RT
25,788,445 UART: [state] CFI Enabled
25,905,643 UART: [rt] RT listening for mailbox commands...
25,907,593 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,938,033 UART: [rt]cmd =0x44504543, len=92
25,944,922 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,220,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,130 >>> mbox cmd response: success
18,529,030 UART:
18,529,429 UART: Running Caliptra FMC ...
18,530,735 UART:
18,530,904 UART: [state] CFI Enabled
18,538,631 UART: [fht] FMC Alias Private Key: 7
20,295,830 UART: [art] Extend RT PCRs Done
20,297,057 UART: [art] Lock RT PCRs Done
20,298,788 UART: [art] Populate DV Done
20,304,105 UART: [fht] FMC Alias Private Key: 7
20,305,806 UART: [art] Derive CDI
20,306,622 UART: [art] Store in in slot 0x4
20,348,962 UART: [art] Derive Key Pair
20,349,999 UART: [art] Store priv key in slot 0x5
22,776,493 UART: [art] Derive Key Pair - Done
22,789,374 UART: [art] Signing Cert with AUTHO
22,790,679 UART: RITY.KEYID = 7
24,496,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,682 UART: [art] PUB.X = 18B327D3CE1AD4F39FE369478BF2C7687CB9AA8ED2A2DA8545215BD94ED14406110586CB05EE5B23E8C7C7C58A443470
24,504,963 UART: [art] PUB.Y = C303254137C150DAB4117CB6D835D669E3D82279F681B0673FAC1311B265C8E7381ABEF29FE1B84D1634C7D2083A93FA
24,512,207 UART: [art] SIG.R = 72AFB86D7857BBF82690417F0B26D923850CD59F029CFB7A6B12BB00D29F3462737401BF3EBF3FDC53C0E14DA142AF31
24,519,584 UART: [art] SIG.S = 7DAD7F95A9D74E55012D008C0C66DFB9AB511E29BAEE318232DD1EACAE3EA249D60F8C461A58F7FE394FF9EC03B19389
25,497,932 UART: Caliptra RT
25,498,633 UART: [state] CFI Enabled
25,615,760 UART: [rt] RT listening for mailbox commands...
25,617,715 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,648,162 UART: [rt]cmd =0x44504543, len=92
25,654,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,226,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,371,492 UART:
2,371,881 UART: Running Caliptra ROM ...
2,373,048 UART:
2,373,221 UART: [state] CFI Enabled
2,374,176 UART: [state] LifecycleState = Unprovisioned
2,375,825 UART: [state] DebugLocked = No
2,376,929 UART: [state] WD Timer not started. Device not locked for debugging
2,379,395 UART: [kat] SHA2-256
2,380,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,383,326 UART: [kat] ++
2,383,809 UART: [kat] sha1
2,384,334 UART: [kat] SHA2-256
2,385,159 UART: [kat] SHA2-384
2,385,831 UART: [kat] SHA2-512-ACC
2,386,633 UART: [kat] ECC-384
2,946,967 UART: [kat] HMAC-384Kdf
2,970,674 UART: [kat] LMS
3,502,525 UART: [kat] --
3,505,112 UART: [cold-reset] ++
3,506,613 UART: [fht] FHT @ 0x50003400
3,518,576 UART: [idev] ++
3,519,246 UART: [idev] CDI.KEYID = 6
3,520,218 UART: [idev] SUBJECT.KEYID = 7
3,521,425 UART: [idev] UDS.KEYID = 0
3,542,533 UART: [idev] Erasing UDS.KEYID = 0
6,026,883 UART: [idev] Sha1 KeyId Algorithm
6,049,184 UART: [idev] --
6,054,312 UART: [ldev] ++
6,054,996 UART: [ldev] CDI.KEYID = 6
6,055,907 UART: [ldev] SUBJECT.KEYID = 5
6,057,070 UART: [ldev] AUTHORITY.KEYID = 7
6,058,304 UART: [ldev] FE.KEYID = 1
6,098,116 UART: [ldev] Erasing FE.KEYID = 1
8,605,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,449 UART: [ldev] --
10,410,258 UART: [fwproc] Wait for Commands...
10,412,039 UART: [fwproc] Recv command 0x46574c44
10,414,301 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,722 >>> mbox cmd response: success
14,602,682 UART: [afmc] ++
14,603,388 UART: [afmc] CDI.KEYID = 6
14,604,629 UART: [afmc] SUBJECT.KEYID = 7
14,606,071 UART: [afmc] AUTHORITY.KEYID = 5
17,150,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,038 UART: [afmc] --
18,970,093 UART: [cold-reset] --
18,974,300 UART: [state] Locking Datavault
18,980,798 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,937 UART: [state] Locking ICCM
18,985,359 UART: [exit] Launching FMC @ 0x40000130
18,994,031 UART:
18,994,264 UART: Running Caliptra FMC ...
18,995,360 UART:
18,995,520 UART: [state] CFI Enabled
19,051,566 UART: [fht] FMC Alias Private Key: 7
20,815,161 UART: [art] Extend RT PCRs Done
20,816,383 UART: [art] Lock RT PCRs Done
20,817,847 UART: [art] Populate DV Done
20,822,985 UART: [fht] FMC Alias Private Key: 7
20,824,528 UART: [art] Derive CDI
20,825,293 UART: [art] Store in in slot 0x4
20,884,166 UART: [art] Derive Key Pair
20,885,226 UART: [art] Store priv key in slot 0x5
23,348,435 UART: [art] Derive Key Pair - Done
23,361,101 UART: [art] Signing Cert with AUTHO
23,362,401 UART: RITY.KEYID = 7
25,074,268 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,770 UART: [art] PUB.X = 6DBF1A390BA3629FAA03898042FFF995D41801BAB6EBF232A4B9DE475E043A0FFE9A777770FBBF18CC1AD2EDB34F6701
25,083,070 UART: [art] PUB.Y = 6D8565D3D114293102BD1E671807FC8D86DD1F6B15BA70B73349AA460FDFA856C6D0CA05B64704ED5BB648506852A4EF
25,090,305 UART: [art] SIG.R = 3CDAF63C7219BD3BE3549D52604AD7EA2A3B96322276B1F7DDA51DE1F9F810D1B49204E13BDA07E0C51BDEBC23677E13
25,097,744 UART: [art] SIG.S = 98633657FA96B5CB11752A3541F921C399894835D6B6E63E65350C2439DC6D1BBF3B2BC08F3CC777A54A5CC0640F944F
26,076,410 UART: Caliptra RT
26,077,111 UART: [state] CFI Enabled
26,242,290 UART: [rt] RT listening for mailbox commands...
26,244,209 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,274,762 UART: [rt]cmd =0x44504543, len=92
26,281,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,221,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,780 >>> mbox cmd response: success
19,021,931 UART:
19,022,374 UART: Running Caliptra FMC ...
19,023,490 UART:
19,023,656 UART: [state] CFI Enabled
19,088,654 UART: [fht] FMC Alias Private Key: 7
20,853,071 UART: [art] Extend RT PCRs Done
20,854,312 UART: [art] Lock RT PCRs Done
20,855,838 UART: [art] Populate DV Done
20,861,365 UART: [fht] FMC Alias Private Key: 7
20,862,879 UART: [art] Derive CDI
20,863,648 UART: [art] Store in in slot 0x4
20,920,919 UART: [art] Derive Key Pair
20,921,965 UART: [art] Store priv key in slot 0x5
23,384,198 UART: [art] Derive Key Pair - Done
23,397,251 UART: [art] Signing Cert with AUTHO
23,398,549 UART: RITY.KEYID = 7
25,109,749 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,255 UART: [art] PUB.X = 2E0F74216DD84341DD5DF7F426D597D68AED3FF990D49C62F60D244727AC8C390E63A004F7AFDE6097B85B14F0428DB1
25,118,581 UART: [art] PUB.Y = 83CAAFF3C8C842D19589A1D8AB5D5B98F207BE81A714D425B0B706A2C39F19B199D844AA1FDBDCDFED491C0FF9BA68AD
25,125,804 UART: [art] SIG.R = 28854A84FF187566E3FB89E0554F8E0C5F528054CDAAC3A7A5982FA58A660025BD476A9587C995C349FD032702355B82
25,133,202 UART: [art] SIG.S = 03DBAF52925B7AA5CB113DA10C04DD20553FD2A6971E5C8DE40DF086CA2C98D6CC6BF8E81A4DE8B2ECE59CEA9096E6B7
26,112,298 UART: Caliptra RT
26,113,007 UART: [state] CFI Enabled
26,275,706 UART: [rt] RT listening for mailbox commands...
26,277,645 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,308,079 UART: [rt]cmd =0x44504543, len=92
26,314,448 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,225,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,369,591 UART:
2,369,971 UART: Running Caliptra ROM ...
2,371,156 UART:
2,371,318 UART: [state] CFI Enabled
2,372,278 UART: [state] LifecycleState = Unprovisioned
2,373,924 UART: [state] DebugLocked = No
2,375,026 UART: [state] WD Timer not started. Device not locked for debugging
2,377,496 UART: [kat] SHA2-256
2,378,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,381,164 UART: [kat] ++
2,381,611 UART: [kat] sha1
2,382,115 UART: [kat] SHA2-256
2,382,762 UART: [kat] SHA2-384
2,383,406 UART: [kat] SHA2-512-ACC
2,384,511 UART: [kat] ECC-384
3,294,329 UART: [kat] HMAC-384Kdf
3,307,097 UART: [kat] LMS
3,838,925 UART: [kat] --
3,842,507 UART: [cold-reset] ++
3,843,841 UART: [fht] FHT @ 0x50003400
3,854,649 UART: [idev] ++
3,855,372 UART: [idev] CDI.KEYID = 6
3,856,330 UART: [idev] SUBJECT.KEYID = 7
3,857,537 UART: [idev] UDS.KEYID = 0
3,874,581 UART: [idev] Erasing UDS.KEYID = 0
6,332,963 UART: [idev] Sha1 KeyId Algorithm
6,354,572 UART: [idev] --
6,359,430 UART: [ldev] ++
6,360,105 UART: [ldev] CDI.KEYID = 6
6,360,981 UART: [ldev] SUBJECT.KEYID = 5
6,362,127 UART: [ldev] AUTHORITY.KEYID = 7
6,363,408 UART: [ldev] FE.KEYID = 1
6,376,019 UART: [ldev] Erasing FE.KEYID = 1
8,853,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,536 UART: [ldev] --
10,645,535 UART: [fwproc] Wait for Commands...
10,648,550 UART: [fwproc] Recv command 0x46574c44
10,650,805 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,650 >>> mbox cmd response: success
14,834,286 UART: [afmc] ++
14,834,979 UART: [afmc] CDI.KEYID = 6
14,836,218 UART: [afmc] SUBJECT.KEYID = 7
14,837,647 UART: [afmc] AUTHORITY.KEYID = 5
17,340,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,331 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,631 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,633 UART: [afmc] --
19,137,002 UART: [cold-reset] --
19,140,972 UART: [state] Locking Datavault
19,144,384 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,581 UART: [state] Locking ICCM
19,148,996 UART: [exit] Launching FMC @ 0x40000130
19,157,666 UART:
19,157,899 UART: Running Caliptra FMC ...
19,158,993 UART:
19,159,145 UART: [state] CFI Enabled
19,166,936 UART: [fht] FMC Alias Private Key: 7
20,923,596 UART: [art] Extend RT PCRs Done
20,924,809 UART: [art] Lock RT PCRs Done
20,926,757 UART: [art] Populate DV Done
20,932,001 UART: [fht] FMC Alias Private Key: 7
20,933,702 UART: [art] Derive CDI
20,934,505 UART: [art] Store in in slot 0x4
20,976,927 UART: [art] Derive Key Pair
20,977,956 UART: [art] Store priv key in slot 0x5
23,404,587 UART: [art] Derive Key Pair - Done
23,417,359 UART: [art] Signing Cert with AUTHO
23,418,660 UART: RITY.KEYID = 7
25,123,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,492 UART: [art] PUB.X = 46D833AD299EAD79FC328C7B68EE779C678129F9EAB8BAF7F321694F77296219F5E21A09D4708784BBE09507F6E92025
25,132,726 UART: [art] PUB.Y = C146C0E2D528FC6B02DE69A105EB1672CCF0A536EC2AD3DF968B14669014646DC2EF4966FB27AEAFC97D1B8EDB0E62B2
25,140,054 UART: [art] SIG.R = CC4E886D82E13D8DC50620398C16FF7C5903C1AF65D8609D55CDCE97119929D79E15F8FB34C2EA7B19C9D9E99E5073EC
25,147,445 UART: [art] SIG.S = CBB46835C06111C2A28B0EDC0A76C4D903CF8750F2A14A175235DACB5514AD44A6291A85B7392DC4548C612BA5A04CFE
26,126,037 UART: Caliptra RT
26,126,743 UART: [state] CFI Enabled
26,243,604 UART: [rt] RT listening for mailbox commands...
26,245,532 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,276,249 UART: [rt]cmd =0x44504543, len=92
26,282,591 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,224,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,949,799 >>> mbox cmd response: success
19,205,266 UART:
19,205,672 UART: Running Caliptra FMC ...
19,206,973 UART:
19,207,132 UART: [state] CFI Enabled
19,214,212 UART: [fht] FMC Alias Private Key: 7
20,971,326 UART: [art] Extend RT PCRs Done
20,972,555 UART: [art] Lock RT PCRs Done
20,974,241 UART: [art] Populate DV Done
20,979,862 UART: [fht] FMC Alias Private Key: 7
20,981,509 UART: [art] Derive CDI
20,982,316 UART: [art] Store in in slot 0x4
21,024,863 UART: [art] Derive Key Pair
21,025,905 UART: [art] Store priv key in slot 0x5
23,452,427 UART: [art] Derive Key Pair - Done
23,465,702 UART: [art] Signing Cert with AUTHO
23,467,008 UART: RITY.KEYID = 7
25,172,514 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,024 UART: [art] PUB.X = 7531F1091E3A37807EAB8DBCA947804A0D58B98934AE2659FA94059AD9A195FC8C4B05C74A25678CBF15F8CA4C3BB2ED
25,181,312 UART: [art] PUB.Y = 7D094843D53B0438BF732B88192D20AB9E3E364BADAFE8CD83082051757FCA7B1A03E0DAD9B90E0C49644553F1D64CF3
25,188,541 UART: [art] SIG.R = 713387D8C8C0E88F460BFB7A572435C0FD234644DF91B851BEC10E8FEC93AA3C1549A77031E500AC079F6E3415AEBD3C
25,195,922 UART: [art] SIG.S = F747DBE37482F5838DD81DAB68BDDA5BB3EACA7E4A82C6FDCADD6C367723E3A0FDAEB3546965D2AD09F8D4B43A9101B1
26,175,363 UART: Caliptra RT
26,176,080 UART: [state] CFI Enabled
26,292,408 UART: [rt] RT listening for mailbox commands...
26,294,348 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,324,895 UART: [rt]cmd =0x44504543, len=92
26,331,457 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,650 UART: [kat] HMAC-384Kdf
907,318 UART: [kat] LMS
1,475,514 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,598 UART: [idev] ++
1,479,766 UART: [idev] CDI.KEYID = 6
1,480,126 UART: [idev] SUBJECT.KEYID = 7
1,480,550 UART: [idev] UDS.KEYID = 0
1,488,944 UART: [idev] Erasing UDS.KEYID = 0
1,505,844 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,496 UART: [idev] --
1,515,575 UART: [ldev] ++
1,515,743 UART: [ldev] CDI.KEYID = 6
1,516,106 UART: [ldev] SUBJECT.KEYID = 5
1,516,532 UART: [ldev] AUTHORITY.KEYID = 7
1,516,995 UART: [ldev] FE.KEYID = 1
1,522,037 UART: [ldev] Erasing FE.KEYID = 1
1,547,054 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,204 UART: [ldev] --
1,586,625 UART: [fwproc] Waiting for Commands...
1,587,304 UART: [fwproc] Received command 0x46574c44
1,588,095 UART: [fwproc] Received Image of size 114448 bytes
2,887,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,927 >>> mbox cmd response: success
3,080,975 UART: [afmc] ++
3,081,143 UART: [afmc] CDI.KEYID = 6
3,081,505 UART: [afmc] SUBJECT.KEYID = 7
3,081,930 UART: [afmc] AUTHORITY.KEYID = 5
3,117,263 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,260 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,950 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,801 UART: [afmc] --
3,160,679 UART: [cold-reset] --
3,161,575 UART: [state] Locking Datavault
3,162,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,364 UART: [state] Locking ICCM
3,163,830 UART: [exit] Launching FMC @ 0x40000130
3,169,159 UART:
3,169,175 UART: Running Caliptra FMC ...
3,169,583 UART:
3,169,637 UART: [state] CFI Enabled
3,180,248 UART: [fht] FMC Alias Private Key: 7
3,288,003 UART: [art] Extend RT PCRs Done
3,288,431 UART: [art] Lock RT PCRs Done
3,290,069 UART: [art] Populate DV Done
3,298,174 UART: [fht] FMC Alias Private Key: 7
3,299,294 UART: [art] Derive CDI
3,299,574 UART: [art] Store in in slot 0x4
3,385,357 UART: [art] Derive Key Pair
3,385,717 UART: [art] Store priv key in slot 0x5
3,399,419 UART: [art] Derive Key Pair - Done
3,414,108 UART: [art] Signing Cert with AUTHO
3,414,588 UART: RITY.KEYID = 7
3,429,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,667 UART: [art] PUB.X = D1EA12DF4F09C6D805D68DC70EA769BDE2A7168C5F5D54AF85D36413886CE92D90F5865BC4C2F24A94BA0DC2BF354DD1
3,437,443 UART: [art] PUB.Y = A67F9C3912B23FDF5119568CDADA73B8BC00E546FBD691AB6421FE2CF9EBB882D2ACB5408E173636D2CE9D9E573460F9
3,444,387 UART: [art] SIG.R = 08EE07A5323FFDBDAE5E9250136B9B1E6B04432F5D387E2F1F0635C434327A27A1BD30F5FBC0ACCCCAB9CB4BF02FE708
3,451,164 UART: [art] SIG.S = 0FB49BD128A357CB3141F4357AF2F3EEF6B0EC81509B45E0A02348B89471058C5E6A48A4F35B24BB5BF3F15B07E25562
3,474,818 UART: Caliptra RT
3,475,071 UART: [state] CFI Enabled
3,583,477 UART: [rt] RT listening for mailbox commands...
3,584,147 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,419 UART: [rt]cmd =0x44504543, len=92
3,621,798 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,063 >>> mbox cmd response: success
2,989,923 UART:
2,989,939 UART: Running Caliptra FMC ...
2,990,347 UART:
2,990,401 UART: [state] CFI Enabled
3,000,744 UART: [fht] FMC Alias Private Key: 7
3,108,647 UART: [art] Extend RT PCRs Done
3,109,075 UART: [art] Lock RT PCRs Done
3,110,817 UART: [art] Populate DV Done
3,119,152 UART: [fht] FMC Alias Private Key: 7
3,120,118 UART: [art] Derive CDI
3,120,398 UART: [art] Store in in slot 0x4
3,205,949 UART: [art] Derive Key Pair
3,206,309 UART: [art] Store priv key in slot 0x5
3,219,395 UART: [art] Derive Key Pair - Done
3,234,178 UART: [art] Signing Cert with AUTHO
3,234,658 UART: RITY.KEYID = 7
3,249,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,457 UART: [art] PUB.X = F8F213B06B11A452C5245F811E9834265E26E53A9526350BB2466A223108D261FB1FAA144484ECC4BE895B5EB26DC0C7
3,257,221 UART: [art] PUB.Y = 429547A1435B8F98146840A6D39A36EECF74B7C364A623AEE0E0D9FEDE416A0CA13F9B30F22ECD9104A04417F15D73EE
3,264,175 UART: [art] SIG.R = EA21CCAD1C89DCB6A011AB2DE73F60F03896C85A8A864FE25DF811586658944950064FDCF83F4A7C64DAD04A93CC03F4
3,270,953 UART: [art] SIG.S = FD11B95A329614E8C3349A68D7BB7B0195B0C3C7B9FBB743DFE135A4848504DC7DB25A22A421ABA4DE8A2CC5FAA855CE
3,294,832 UART: Caliptra RT
3,295,085 UART: [state] CFI Enabled
3,403,999 UART: [rt] RT listening for mailbox commands...
3,404,669 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,127 UART: [rt]cmd =0x44504543, len=92
3,442,362 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,670 UART: [kat] SHA2-256
882,601 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,716 UART: [kat] ++
886,868 UART: [kat] sha1
891,108 UART: [kat] SHA2-256
893,046 UART: [kat] SHA2-384
895,815 UART: [kat] SHA2-512-ACC
897,716 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,354 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,489,221 UART: [idev] Erasing UDS.KEYID = 0
1,505,947 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,415 UART: [idev] --
1,515,458 UART: [ldev] ++
1,515,626 UART: [ldev] CDI.KEYID = 6
1,515,989 UART: [ldev] SUBJECT.KEYID = 5
1,516,415 UART: [ldev] AUTHORITY.KEYID = 7
1,516,878 UART: [ldev] FE.KEYID = 1
1,522,328 UART: [ldev] Erasing FE.KEYID = 1
1,547,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,647 UART: [ldev] --
1,586,932 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 114448 bytes
2,888,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,906 >>> mbox cmd response: success
3,082,042 UART: [afmc] ++
3,082,210 UART: [afmc] CDI.KEYID = 6
3,082,572 UART: [afmc] SUBJECT.KEYID = 7
3,082,997 UART: [afmc] AUTHORITY.KEYID = 5
3,117,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,113 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,803 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,746 UART: [afmc] --
3,160,696 UART: [cold-reset] --
3,161,474 UART: [state] Locking Datavault
3,162,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,141 UART: [state] Locking ICCM
3,163,601 UART: [exit] Launching FMC @ 0x40000130
3,168,930 UART:
3,168,946 UART: Running Caliptra FMC ...
3,169,354 UART:
3,169,497 UART: [state] CFI Enabled
3,179,930 UART: [fht] FMC Alias Private Key: 7
3,288,015 UART: [art] Extend RT PCRs Done
3,288,443 UART: [art] Lock RT PCRs Done
3,290,133 UART: [art] Populate DV Done
3,298,260 UART: [fht] FMC Alias Private Key: 7
3,299,220 UART: [art] Derive CDI
3,299,500 UART: [art] Store in in slot 0x4
3,385,265 UART: [art] Derive Key Pair
3,385,625 UART: [art] Store priv key in slot 0x5
3,398,789 UART: [art] Derive Key Pair - Done
3,413,641 UART: [art] Signing Cert with AUTHO
3,414,121 UART: RITY.KEYID = 7
3,429,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,344 UART: [art] PUB.X = 97F69DA274FC44590064947F9B24069A77BF1312B7DA3863BD11A11D764CD68E5852BFE99DCFD4F52FFE2F54256938EF
3,437,095 UART: [art] PUB.Y = C3DA69570EA2E1A8429A3D3A3EF412AB98B2147EB6A076D825BE51A8C80D8BF0A1B65168AECD19D6EF7F2866D2DE5594
3,444,055 UART: [art] SIG.R = A147D7B5D857619FF0802CB9714C9169899D27596021337D9D0D2F544B175D1B467A3DC88658981916F5D78B4A3D675F
3,450,812 UART: [art] SIG.S = 44BD9CA67CA9A8568157E7C0CCCE3E9C31D06868958FC625A9EA8EDFF0E3B31BB5297EDE1C735275D3F4A9742F5E2AA7
3,474,451 UART: Caliptra RT
3,474,796 UART: [state] CFI Enabled
3,583,659 UART: [rt] RT listening for mailbox commands...
3,584,329 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,731 UART: [rt]cmd =0x44504543, len=92
3,622,078 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,822 >>> mbox cmd response: success
2,993,022 UART:
2,993,038 UART: Running Caliptra FMC ...
2,993,446 UART:
2,993,589 UART: [state] CFI Enabled
3,004,018 UART: [fht] FMC Alias Private Key: 7
3,112,539 UART: [art] Extend RT PCRs Done
3,112,967 UART: [art] Lock RT PCRs Done
3,114,431 UART: [art] Populate DV Done
3,122,692 UART: [fht] FMC Alias Private Key: 7
3,123,714 UART: [art] Derive CDI
3,123,994 UART: [art] Store in in slot 0x4
3,209,743 UART: [art] Derive Key Pair
3,210,103 UART: [art] Store priv key in slot 0x5
3,223,525 UART: [art] Derive Key Pair - Done
3,238,418 UART: [art] Signing Cert with AUTHO
3,238,898 UART: RITY.KEYID = 7
3,253,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,753 UART: [art] PUB.X = 8684A9E05CBE4CE4458A43AAC08C16B7EE68FC32C3ECAC32415504134AF8B8E072048C8D5C3399638C659BF38B2BFC34
3,261,527 UART: [art] PUB.Y = B41B7716221EBE8370C773A32A447843A28A5B7367AA5714FB27014021498B0F2B042C1B5E1DB9AEF78D0710D50B06C1
3,268,457 UART: [art] SIG.R = 0E4CCED968A66BD15D49D6798ACCD342381ECF4C13032787E260B3DD515EA7C6CB7C4A3A3656986D1F43358843C26782
3,275,225 UART: [art] SIG.S = 738CBAC35F655D1A462341D7333574770BC60AC78A744D016F119594BFA512DC7662F80895E26AB5F49FAFD59C8F7451
3,299,270 UART: Caliptra RT
3,299,615 UART: [state] CFI Enabled
3,407,785 UART: [rt] RT listening for mailbox commands...
3,408,455 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,711 UART: [rt]cmd =0x44504543, len=92
3,445,596 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,291 UART: [kat] SHA2-256
904,231 UART: [kat] SHA2-384
906,796 UART: [kat] SHA2-512-ACC
908,697 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
923,060 UART: [kat] LMS
1,171,388 UART: [kat] --
1,172,367 UART: [cold-reset] ++
1,172,791 UART: [fht] FHT @ 0x50003400
1,175,576 UART: [idev] ++
1,175,744 UART: [idev] CDI.KEYID = 6
1,176,104 UART: [idev] SUBJECT.KEYID = 7
1,176,528 UART: [idev] UDS.KEYID = 0
1,184,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,871 UART: [idev] Sha1 KeyId Algorithm
1,209,267 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,216,883 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,088 >>> mbox cmd response: success
2,775,228 UART: [afmc] ++
2,775,396 UART: [afmc] CDI.KEYID = 6
2,775,758 UART: [afmc] SUBJECT.KEYID = 7
2,776,183 UART: [afmc] AUTHORITY.KEYID = 5
2,811,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,871 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,751 UART: [afmc] --
2,854,639 UART: [cold-reset] --
2,855,327 UART: [state] Locking Datavault
2,856,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,864 UART: [state] Locking ICCM
2,857,358 UART: [exit] Launching FMC @ 0x40000130
2,862,687 UART:
2,862,703 UART: Running Caliptra FMC ...
2,863,111 UART:
2,863,165 UART: [state] CFI Enabled
2,873,926 UART: [fht] FMC Alias Private Key: 7
2,982,161 UART: [art] Extend RT PCRs Done
2,982,589 UART: [art] Lock RT PCRs Done
2,983,877 UART: [art] Populate DV Done
2,992,402 UART: [fht] FMC Alias Private Key: 7
2,993,460 UART: [art] Derive CDI
2,993,740 UART: [art] Store in in slot 0x4
3,079,257 UART: [art] Derive Key Pair
3,079,617 UART: [art] Store priv key in slot 0x5
3,092,363 UART: [art] Derive Key Pair - Done
3,107,009 UART: [art] Signing Cert with AUTHO
3,107,489 UART: RITY.KEYID = 7
3,122,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,346 UART: [art] PUB.X = 296444D4B742EFA19BE8DF27D267BAF51BEC0CFFE96B67A78074E136E7947AE6253FBB463252797B31376766DAF6DE39
3,130,121 UART: [art] PUB.Y = 0663F9487EF8E7ABFA7B9EAAD20C6316C3F51D8D08BA02F4A538199332C52E93BF139F9FDD7551F53D6C4E993B86A997
3,137,069 UART: [art] SIG.R = 29E9EA515CA3600ED2AAA18F8AF69C5C2A141DEF5073597AEB6BC0AB62F763968228D8033F56575C8B51F6025E1FB4A7
3,143,840 UART: [art] SIG.S = 4D29DD24633FA3A15DAB73200822F86E88ED8196450C2FF2017E9DEB29023697319F6C291F14627EA3D0DC28D1B22643
3,167,921 UART: Caliptra RT
3,168,174 UART: [state] CFI Enabled
3,274,511 UART: [rt] RT listening for mailbox commands...
3,275,181 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,671 UART: [rt]cmd =0x44504543, len=92
3,312,712 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,465 >>> mbox cmd response: success
2,689,317 UART:
2,689,333 UART: Running Caliptra FMC ...
2,689,741 UART:
2,689,795 UART: [state] CFI Enabled
2,700,636 UART: [fht] FMC Alias Private Key: 7
2,808,595 UART: [art] Extend RT PCRs Done
2,809,023 UART: [art] Lock RT PCRs Done
2,810,879 UART: [art] Populate DV Done
2,819,092 UART: [fht] FMC Alias Private Key: 7
2,820,156 UART: [art] Derive CDI
2,820,436 UART: [art] Store in in slot 0x4
2,905,873 UART: [art] Derive Key Pair
2,906,233 UART: [art] Store priv key in slot 0x5
2,919,147 UART: [art] Derive Key Pair - Done
2,934,077 UART: [art] Signing Cert with AUTHO
2,934,557 UART: RITY.KEYID = 7
2,949,457 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,222 UART: [art] PUB.X = 107DD8ECDB328BF4C7227E94701A6C1750D3CAAB7D49C8AFA0804D6E5B2B0895A4EA3B85428A676964E05DD71A01713F
2,956,996 UART: [art] PUB.Y = 3646E9ED217B1411055D90FCD973826FA485B5C0D709FE8257E0666ADE28FC9574724809284D202833CDF4F954FC01B5
2,963,930 UART: [art] SIG.R = 125E21933C459237455589DA994244D3880E2DD6B47CD5B284A884D2557D0B648776678DF632ACA855E7F222FD2E6918
2,970,684 UART: [art] SIG.S = 127BB1C69E9C5007FBB5EDFA6F8F26138BB72D1FB60A2F2EECF21419502183EFC0F595A67576A1623391FC9F317275EC
2,993,685 UART: Caliptra RT
2,993,938 UART: [state] CFI Enabled
3,101,657 UART: [rt] RT listening for mailbox commands...
3,102,327 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,461 UART: [rt]cmd =0x44504543, len=92
3,139,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,743 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,402 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,609 UART: [idev] ++
1,175,777 UART: [idev] CDI.KEYID = 6
1,176,137 UART: [idev] SUBJECT.KEYID = 7
1,176,561 UART: [idev] UDS.KEYID = 0
1,184,411 UART: [idev] Erasing UDS.KEYID = 0
1,201,924 UART: [idev] Sha1 KeyId Algorithm
1,210,598 UART: [idev] --
1,211,708 UART: [ldev] ++
1,211,876 UART: [ldev] CDI.KEYID = 6
1,212,239 UART: [ldev] SUBJECT.KEYID = 5
1,212,665 UART: [ldev] AUTHORITY.KEYID = 7
1,213,128 UART: [ldev] FE.KEYID = 1
1,218,260 UART: [ldev] Erasing FE.KEYID = 1
1,244,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,928 UART: [ldev] --
1,284,385 UART: [fwproc] Wait for Commands...
1,285,081 UART: [fwproc] Recv command 0x46574c44
1,285,809 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,903 >>> mbox cmd response: success
2,778,931 UART: [afmc] ++
2,779,099 UART: [afmc] CDI.KEYID = 6
2,779,461 UART: [afmc] SUBJECT.KEYID = 7
2,779,886 UART: [afmc] AUTHORITY.KEYID = 5
2,815,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,720 UART: [afmc] --
2,858,666 UART: [cold-reset] --
2,859,688 UART: [state] Locking Datavault
2,860,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,455 UART: [state] Locking ICCM
2,861,951 UART: [exit] Launching FMC @ 0x40000130
2,867,280 UART:
2,867,296 UART: Running Caliptra FMC ...
2,867,704 UART:
2,867,847 UART: [state] CFI Enabled
2,878,654 UART: [fht] FMC Alias Private Key: 7
2,986,473 UART: [art] Extend RT PCRs Done
2,986,901 UART: [art] Lock RT PCRs Done
2,988,427 UART: [art] Populate DV Done
2,996,776 UART: [fht] FMC Alias Private Key: 7
2,997,802 UART: [art] Derive CDI
2,998,082 UART: [art] Store in in slot 0x4
3,083,805 UART: [art] Derive Key Pair
3,084,165 UART: [art] Store priv key in slot 0x5
3,097,293 UART: [art] Derive Key Pair - Done
3,111,813 UART: [art] Signing Cert with AUTHO
3,112,293 UART: RITY.KEYID = 7
3,127,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,064 UART: [art] PUB.X = 9E089A858B3F2DB6FF9A8F086A6121223D0CF6816E07A7F551323731B29E7689DAEDE202F11F3FFF1F779C8D019D6622
3,134,820 UART: [art] PUB.Y = 7E74699BC48DE8B02E07D94913698008D4D8854416ED9FFBDFEB3F7880F6C7C8601B12E2ABBB7FD50A4158903B17315A
3,141,767 UART: [art] SIG.R = BBBC581B84FF965E09106272E8AB4277151D346D137F74D0F0D0508C73D605A54CCC2A96A95BCB97AD6374CF50057AE8
3,148,534 UART: [art] SIG.S = 1D27380EBDFD84B296EADB655C151E89689753B6BB303E3BAEDC31DE272F318D83CA2E023E0C0C5CB23EB309DEDBAA05
3,172,699 UART: Caliptra RT
3,173,044 UART: [state] CFI Enabled
3,281,021 UART: [rt] RT listening for mailbox commands...
3,281,691 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,133 UART: [rt]cmd =0x44504543, len=92
3,319,164 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,304 >>> mbox cmd response: success
2,687,672 UART:
2,687,688 UART: Running Caliptra FMC ...
2,688,096 UART:
2,688,239 UART: [state] CFI Enabled
2,699,166 UART: [fht] FMC Alias Private Key: 7
2,806,857 UART: [art] Extend RT PCRs Done
2,807,285 UART: [art] Lock RT PCRs Done
2,808,667 UART: [art] Populate DV Done
2,816,692 UART: [fht] FMC Alias Private Key: 7
2,817,660 UART: [art] Derive CDI
2,817,940 UART: [art] Store in in slot 0x4
2,903,551 UART: [art] Derive Key Pair
2,903,911 UART: [art] Store priv key in slot 0x5
2,917,051 UART: [art] Derive Key Pair - Done
2,932,160 UART: [art] Signing Cert with AUTHO
2,932,640 UART: RITY.KEYID = 7
2,947,696 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,461 UART: [art] PUB.X = 9401906071045D4976BFCDAA26901395E97EAFD1B16D893FCF16354ADFBF0601E6423CF32385DD5075ADC159E26B09A1
2,955,220 UART: [art] PUB.Y = 5E62642C87980EC1A2525CA6E72E522DC76569A07490EC890A05678237D5983B6DF1202F22C055C14657607EB815A3FD
2,962,153 UART: [art] SIG.R = BB80D99266FAF3FCD9F5CB207EA926E0987A0C20473787674F9EDA23B671E898DB300112D9A5AD71A21FC251651DAA5B
2,968,927 UART: [art] SIG.S = FBAECB1DC933042BEFF7665006B8BD5FF88C5E6445B47C2792CE392E4588BA6E1BFA5C728F55C10DAD331E26850BC402
2,992,753 UART: Caliptra RT
2,993,098 UART: [state] CFI Enabled
3,101,166 UART: [rt] RT listening for mailbox commands...
3,101,836 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,174 UART: [rt]cmd =0x44504543, len=92
3,139,347 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
919,936 UART: [kat] LMS
1,168,248 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,685 UART: [fht] FHT @ 0x50003400
1,172,231 UART: [idev] ++
1,172,399 UART: [idev] CDI.KEYID = 6
1,172,760 UART: [idev] SUBJECT.KEYID = 7
1,173,185 UART: [idev] UDS.KEYID = 0
1,181,149 UART: [idev] Erasing UDS.KEYID = 0
1,197,973 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,890 UART: [ldev] ++
1,208,058 UART: [ldev] CDI.KEYID = 6
1,208,422 UART: [ldev] SUBJECT.KEYID = 5
1,208,849 UART: [ldev] AUTHORITY.KEYID = 7
1,209,312 UART: [ldev] FE.KEYID = 1
1,214,782 UART: [ldev] Erasing FE.KEYID = 1
1,240,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,532 UART: [fwproc] Wait for Commands...
1,280,233 UART: [fwproc] Recv command 0x46574c44
1,280,966 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,900 >>> mbox cmd response: success
2,772,991 UART: [afmc] ++
2,773,159 UART: [afmc] CDI.KEYID = 6
2,773,522 UART: [afmc] SUBJECT.KEYID = 7
2,773,948 UART: [afmc] AUTHORITY.KEYID = 5
2,808,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,178 UART: [afmc] --
2,852,296 UART: [cold-reset] --
2,853,128 UART: [state] Locking Datavault
2,854,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,085 UART: [state] Locking ICCM
2,855,535 UART: [exit] Launching FMC @ 0x40000130
2,860,864 UART:
2,860,880 UART: Running Caliptra FMC ...
2,861,288 UART:
2,861,342 UART: [state] CFI Enabled
2,871,631 UART: [fht] FMC Alias Private Key: 7
2,979,232 UART: [art] Extend RT PCRs Done
2,979,660 UART: [art] Lock RT PCRs Done
2,981,224 UART: [art] Populate DV Done
2,989,273 UART: [fht] FMC Alias Private Key: 7
2,990,395 UART: [art] Derive CDI
2,990,675 UART: [art] Store in in slot 0x4
3,076,154 UART: [art] Derive Key Pair
3,076,514 UART: [art] Store priv key in slot 0x5
3,089,552 UART: [art] Derive Key Pair - Done
3,104,769 UART: [art] Signing Cert with AUTHO
3,105,249 UART: RITY.KEYID = 7
3,120,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,020 UART: [art] PUB.X = 9C4A759A0DFF16EF4DC8E45F5E4E32F0E76FDCD0FA495D4AE17F3EB24639E6EECC76DE5D57AC5A9710C5E2CCA52CE442
3,127,817 UART: [art] PUB.Y = 3EC7BF157786F8080FAEC6FFC5526F28BB1666C6C2F8EAA638F4C9DAEFCC8113FD184BD94D5ABA2A5207A07C8A94E3E9
3,134,782 UART: [art] SIG.R = EE77837DC99C375229460F3D0033B5A34CFA3280719E659B0839D8C69F72CB9E5558C4676F550F4C7B6225B54C7D40A2
3,141,517 UART: [art] SIG.S = 1A4A4C6E46CA46A457B42A812D3A17E85B3AFBCF0B8B319222CA973FF428B547D6198F5CB08A098CCE94D6BC940EA4F2
3,165,233 UART: Caliptra RT
3,165,486 UART: [state] CFI Enabled
3,272,439 UART: [rt] RT listening for mailbox commands...
3,273,109 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,565 UART: [rt]cmd =0x44504543, len=92
3,310,900 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,756 >>> mbox cmd response: success
2,686,528 UART:
2,686,544 UART: Running Caliptra FMC ...
2,686,952 UART:
2,687,006 UART: [state] CFI Enabled
2,697,697 UART: [fht] FMC Alias Private Key: 7
2,805,398 UART: [art] Extend RT PCRs Done
2,805,826 UART: [art] Lock RT PCRs Done
2,807,242 UART: [art] Populate DV Done
2,815,393 UART: [fht] FMC Alias Private Key: 7
2,816,567 UART: [art] Derive CDI
2,816,847 UART: [art] Store in in slot 0x4
2,902,570 UART: [art] Derive Key Pair
2,902,930 UART: [art] Store priv key in slot 0x5
2,915,874 UART: [art] Derive Key Pair - Done
2,931,038 UART: [art] Signing Cert with AUTHO
2,931,518 UART: RITY.KEYID = 7
2,946,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,593 UART: [art] PUB.X = 2B6C6B4C409443D99019BA52AE2560F867EA34A0905B86597DD1FD62C1937A4D29FE006DC42E85B655A6D1F7AEEDBB9B
2,954,353 UART: [art] PUB.Y = 044283AAB8BFB325E0BDCA277B45D634C1B28379DDB76F9897B33D6DD24138A0B3EA3B52638FB5DC3CAFE616E646F44C
2,961,316 UART: [art] SIG.R = E6FA8464C5594E9457F1183D102649FD921749DFF959212191BB1F02F085750015750633778883DCAA5759CC0BF567B6
2,968,043 UART: [art] SIG.S = 309DE4C8237CDC743033F4A11957E16890A16A706272A39E1B4BFCA542798685FCF8A4A38AA0FCB579684C563CE14E42
2,991,560 UART: Caliptra RT
2,991,813 UART: [state] CFI Enabled
3,099,560 UART: [rt] RT listening for mailbox commands...
3,100,230 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,494 UART: [rt]cmd =0x44504543, len=92
3,137,739 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,949 UART: [kat] HMAC-384Kdf
921,435 UART: [kat] LMS
1,169,747 UART: [kat] --
1,170,752 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,340 UART: [fwproc] Recv command 0x46574c44
1,284,073 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,921 >>> mbox cmd response: success
2,780,032 UART: [afmc] ++
2,780,200 UART: [afmc] CDI.KEYID = 6
2,780,563 UART: [afmc] SUBJECT.KEYID = 7
2,780,989 UART: [afmc] AUTHORITY.KEYID = 5
2,816,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,733 UART: [afmc] --
2,859,667 UART: [cold-reset] --
2,860,643 UART: [state] Locking Datavault
2,861,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,598 UART: [state] Locking ICCM
2,863,234 UART: [exit] Launching FMC @ 0x40000130
2,868,563 UART:
2,868,579 UART: Running Caliptra FMC ...
2,868,987 UART:
2,869,130 UART: [state] CFI Enabled
2,879,611 UART: [fht] FMC Alias Private Key: 7
2,987,860 UART: [art] Extend RT PCRs Done
2,988,288 UART: [art] Lock RT PCRs Done
2,990,322 UART: [art] Populate DV Done
2,998,645 UART: [fht] FMC Alias Private Key: 7
2,999,813 UART: [art] Derive CDI
3,000,093 UART: [art] Store in in slot 0x4
3,086,222 UART: [art] Derive Key Pair
3,086,582 UART: [art] Store priv key in slot 0x5
3,099,720 UART: [art] Derive Key Pair - Done
3,114,489 UART: [art] Signing Cert with AUTHO
3,114,969 UART: RITY.KEYID = 7
3,130,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,098 UART: [art] PUB.X = 743BBF4FD30CB550C156B60BA8F0764BE567B8D4C6833A1199E9CD2C616A99C8AACE61E1409BD7AC11DE3D612FF9D015
3,137,878 UART: [art] PUB.Y = 49CFA01A5CD302F34D55747086F186160042EF8006A58A38BB4514BF33CFAA516B06AFE804385A4BA9838E35F02BAADD
3,144,802 UART: [art] SIG.R = 3AE18D7FAF713F940C0939C4F09F18CE1625CDC551F9F2D8AE9900419BD3336C9D93BB25D9AD3D6FC0EDD1D06A63806E
3,151,560 UART: [art] SIG.S = 5A9FD755E16153B875F991A142682632A6D5F2558777986AFF5E2BC97480EC10E511593F7C781A93EBEDCF9AA12468F2
3,175,311 UART: Caliptra RT
3,175,656 UART: [state] CFI Enabled
3,283,477 UART: [rt] RT listening for mailbox commands...
3,284,147 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,585 UART: [rt]cmd =0x44504543, len=92
3,321,608 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,043 >>> mbox cmd response: success
2,686,949 UART:
2,686,965 UART: Running Caliptra FMC ...
2,687,373 UART:
2,687,516 UART: [state] CFI Enabled
2,698,019 UART: [fht] FMC Alias Private Key: 7
2,805,506 UART: [art] Extend RT PCRs Done
2,805,934 UART: [art] Lock RT PCRs Done
2,807,488 UART: [art] Populate DV Done
2,815,723 UART: [fht] FMC Alias Private Key: 7
2,816,851 UART: [art] Derive CDI
2,817,131 UART: [art] Store in in slot 0x4
2,903,074 UART: [art] Derive Key Pair
2,903,434 UART: [art] Store priv key in slot 0x5
2,916,424 UART: [art] Derive Key Pair - Done
2,930,816 UART: [art] Signing Cert with AUTHO
2,931,296 UART: RITY.KEYID = 7
2,946,586 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,351 UART: [art] PUB.X = 70B39D846AA8202D26A1D84B85BA695E7F9BEC43AA829EC42E8B733F30A529F0E878B4B217C8EF8201751FED8410B1D6
2,954,126 UART: [art] PUB.Y = 1140C434BC38AA1B3BD9F60728310D7C2EF8EE9A0EF83177CC67BECDB6AAE67B315A7A7092057D238ED8ABD14BB5E9E8
2,961,084 UART: [art] SIG.R = E6BF841F6B4CDA039F5B8CEAF98EF1CA0D0DF61AEAE8F241ED969355B348B406DFD332C9DA4C94F4EA3FC7FE7ABF2F28
2,967,876 UART: [art] SIG.S = 26A2A0AA219BC1F18E8EC0B3265CD554A3BC79F269E6F9317A8E03536910F7EFDA25A0A90DD3ABA6289B043757467117
2,991,482 UART: Caliptra RT
2,991,827 UART: [state] CFI Enabled
3,100,388 UART: [rt] RT listening for mailbox commands...
3,101,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,496 UART: [rt]cmd =0x44504543, len=92
3,138,777 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,276 UART:
192,639 UART: Running Caliptra ROM ...
193,824 UART:
193,981 UART: [state] CFI Enabled
262,417 UART: [state] LifecycleState = Unprovisioned
264,405 UART: [state] DebugLocked = No
266,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,011 UART: [kat] SHA2-256
441,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,232 UART: [kat] ++
452,713 UART: [kat] sha1
463,802 UART: [kat] SHA2-256
466,515 UART: [kat] SHA2-384
473,083 UART: [kat] SHA2-512-ACC
475,456 UART: [kat] ECC-384
2,766,399 UART: [kat] HMAC-384Kdf
2,798,754 UART: [kat] LMS
3,989,096 UART: [kat] --
3,993,752 UART: [cold-reset] ++
3,995,494 UART: [fht] Storing FHT @ 0x50003400
4,006,202 UART: [idev] ++
4,006,792 UART: [idev] CDI.KEYID = 6
4,007,760 UART: [idev] SUBJECT.KEYID = 7
4,008,940 UART: [idev] UDS.KEYID = 0
4,009,977 ready_for_fw is high
4,010,188 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,572 UART: [idev] Erasing UDS.KEYID = 0
7,347,228 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,214 UART: [idev] --
7,374,049 UART: [ldev] ++
7,374,631 UART: [ldev] CDI.KEYID = 6
7,375,599 UART: [ldev] SUBJECT.KEYID = 5
7,376,753 UART: [ldev] AUTHORITY.KEYID = 7
7,378,038 UART: [ldev] FE.KEYID = 1
7,420,501 UART: [ldev] Erasing FE.KEYID = 1
10,753,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,279 UART: [ldev] --
13,115,841 UART: [fwproc] Waiting for Commands...
13,118,570 UART: [fwproc] Received command 0x46574c44
13,120,757 UART: [fwproc] Received Image of size 114124 bytes
17,171,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,405 >>> mbox cmd response: success
17,634,945 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,638,941 UART: [afmc] ++
17,639,532 UART: [afmc] CDI.KEYID = 6
17,640,506 UART: [afmc] SUBJECT.KEYID = 7
17,641,723 UART: [afmc] AUTHORITY.KEYID = 5
21,008,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,771 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,212 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,048 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,460 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,800 UART: [afmc] --
23,380,325 UART: [cold-reset] --
23,383,760 UART: [state] Locking Datavault
23,389,280 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,989 UART: [state] Locking ICCM
23,393,520 UART: [exit] Launching FMC @ 0x40000130
23,401,913 UART:
23,402,146 UART: Running Caliptra FMC ...
23,403,251 UART:
23,403,410 UART: [state] CFI Enabled
23,468,350 UART: [fht] FMC Alias Private Key: 7
25,807,113 UART: [art] Extend RT PCRs Done
25,808,337 UART: [art] Lock RT PCRs Done
25,809,716 UART: [art] Populate DV Done
25,814,914 UART: [fht] FMC Alias Private Key: 7
25,816,556 UART: [art] Derive CDI
25,817,294 UART: [art] Store in in slot 0x4
25,876,957 UART: [art] Derive Key Pair
25,877,989 UART: [art] Store priv key in slot 0x5
29,171,269 UART: [art] Derive Key Pair - Done
29,183,992 UART: [art] Signing Cert with AUTHO
29,185,301 UART: RITY.KEYID = 7
31,473,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,709 UART: [art] PUB.X = 9C8808D4CB920F6A3777928FFDBC6BE373BBE9F9B9981DC82AA8911082DC73008A45FA70AFC012DC823E2583A00834BE
31,481,910 UART: [art] PUB.Y = F1BDE68D52A69EA20561A31B35C455AD17CBC71F2F5F2BD95EC255714F3D26F21CB141CD3B173658041A563B5507BC32
31,489,202 UART: [art] SIG.R = A536EB54A44A8734D6A40A4CF4D7999F0915DBB692B12F34E03A1B66E6C257D4196C0D4C264DBFD26ECE7CA9F8499051
31,496,619 UART: [art] SIG.S = B028579BAA0E1AF26BAF6AC4DED6DEF0C1217994AE8888899FF14411CC0AAAA3F27773EDD95EE65173C28C3C78DE813A
32,801,607 UART: Caliptra RT
32,802,324 UART: [state] CFI Enabled
32,963,590 UART: [rt] RT listening for mailbox commands...
32,995,166 UART: [rt]cmd =0x50435245, len=56
32,996,875 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,807,973 ready_for_fw is high
3,808,360 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,302 >>> mbox cmd response: success
17,878,899 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,568,601 UART:
23,568,963 UART: Running Caliptra FMC ...
23,570,155 UART:
23,570,320 UART: [state] CFI Enabled
23,637,399 UART: [fht] FMC Alias Private Key: 7
25,975,202 UART: [art] Extend RT PCRs Done
25,976,426 UART: [art] Lock RT PCRs Done
25,977,841 UART: [art] Populate DV Done
25,983,205 UART: [fht] FMC Alias Private Key: 7
25,984,696 UART: [art] Derive CDI
25,985,463 UART: [art] Store in in slot 0x4
26,045,224 UART: [art] Derive Key Pair
26,046,284 UART: [art] Store priv key in slot 0x5
29,338,666 UART: [art] Derive Key Pair - Done
29,351,762 UART: [art] Signing Cert with AUTHO
29,353,070 UART: RITY.KEYID = 7
31,639,984 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,493 UART: [art] PUB.X = CB55303C97C70E5AE489A7CAF1EE553A40139759D50228BA719447865C4CF61A8DAD05E9A53F452515DB9AC2FE9A9486
31,648,740 UART: [art] PUB.Y = 580FE5B4B9BA004644A3CDFF736220E424B80D37A8518B2C8D8AE7C2DF8A7497329603678C1F9A443E271B5697F84B48
31,655,979 UART: [art] SIG.R = 706B01104F90C3476972B0C0D3667DC1EE8DA4AFD76F6488F1F1DD61F2277F89D6FF10C55CBDC2A0D33DD6B0A175907E
31,663,383 UART: [art] SIG.S = E425F09EBCB142CB8A5C47486848CC059549A577BC2084B61CB741D63AF7A023B33BF6228342125BD5DCEA15E0DEC20D
32,967,928 UART: Caliptra RT
32,968,628 UART: [state] CFI Enabled
33,130,494 UART: [rt] RT listening for mailbox commands...
33,162,071 UART: [rt]cmd =0x50435245, len=56
33,163,646 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,393 UART:
192,779 UART: Running Caliptra ROM ...
193,885 UART:
603,597 UART: [state] CFI Enabled
615,239 UART: [state] LifecycleState = Unprovisioned
617,160 UART: [state] DebugLocked = No
618,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,913 UART: [kat] SHA2-256
793,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,180 UART: [kat] ++
804,649 UART: [kat] sha1
816,014 UART: [kat] SHA2-256
818,665 UART: [kat] SHA2-384
823,520 UART: [kat] SHA2-512-ACC
825,922 UART: [kat] ECC-384
3,108,720 UART: [kat] HMAC-384Kdf
3,119,393 UART: [kat] LMS
4,309,462 UART: [kat] --
4,313,738 UART: [cold-reset] ++
4,315,379 UART: [fht] Storing FHT @ 0x50003400
4,326,663 UART: [idev] ++
4,327,234 UART: [idev] CDI.KEYID = 6
4,328,263 UART: [idev] SUBJECT.KEYID = 7
4,329,437 UART: [idev] UDS.KEYID = 0
4,330,463 ready_for_fw is high
4,330,667 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,473,973 UART: [idev] Erasing UDS.KEYID = 0
7,615,309 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,797 UART: [idev] --
7,639,530 UART: [ldev] ++
7,640,105 UART: [ldev] CDI.KEYID = 6
7,641,039 UART: [ldev] SUBJECT.KEYID = 5
7,642,188 UART: [ldev] AUTHORITY.KEYID = 7
7,643,519 UART: [ldev] FE.KEYID = 1
7,654,644 UART: [ldev] Erasing FE.KEYID = 1
10,943,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,512 UART: [ldev] --
13,307,643 UART: [fwproc] Waiting for Commands...
13,310,819 UART: [fwproc] Received command 0x46574c44
13,312,995 UART: [fwproc] Received Image of size 114124 bytes
17,371,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,596 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,741 >>> mbox cmd response: success
17,837,270 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,840,981 UART: [afmc] ++
17,841,571 UART: [afmc] CDI.KEYID = 6
17,842,582 UART: [afmc] SUBJECT.KEYID = 7
17,843,756 UART: [afmc] AUTHORITY.KEYID = 5
21,156,550 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,168 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,449 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,856 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,644 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,095 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,278 UART: [afmc] --
23,521,300 UART: [cold-reset] --
23,524,726 UART: [state] Locking Datavault
23,528,622 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,376 UART: [state] Locking ICCM
23,532,466 UART: [exit] Launching FMC @ 0x40000130
23,540,857 UART:
23,541,275 UART: Running Caliptra FMC ...
23,542,411 UART:
23,542,597 UART: [state] CFI Enabled
23,550,654 UART: [fht] FMC Alias Private Key: 7
25,881,885 UART: [art] Extend RT PCRs Done
25,883,109 UART: [art] Lock RT PCRs Done
25,884,841 UART: [art] Populate DV Done
25,890,416 UART: [fht] FMC Alias Private Key: 7
25,892,058 UART: [art] Derive CDI
25,892,872 UART: [art] Store in in slot 0x4
25,935,087 UART: [art] Derive Key Pair
25,936,086 UART: [art] Store priv key in slot 0x5
29,177,981 UART: [art] Derive Key Pair - Done
29,191,251 UART: [art] Signing Cert with AUTHO
29,192,554 UART: RITY.KEYID = 7
31,471,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,477 UART: [art] PUB.X = 920912B5B3D1414764CC73F063F3D3257CA04D92F9886A5A88ED57F0B36D19B2AB531E312BEF3D2DDBF5AD3769674E6A
31,480,726 UART: [art] PUB.Y = 9150A9C167412D8E48BA9566935D5EB64EF1F79F58028410BE7C00D61C97DDAC4D437B44A1F1241BFB4B44244A69DF84
31,487,972 UART: [art] SIG.R = 295A7438B074F03139F18CD48F0A5A43A6B82F18DC850CBC10972A00F5CA9C00E9BF3F2439EACF05BFE19DA8E4D38AA2
31,495,358 UART: [art] SIG.S = D474DBA8B8A7277F63E3FD6AF536BEC8847D1C2D6970C5302102F1D95106416AA9A5879097F9C2EEA4F2BB3EF79261E5
32,800,578 UART: Caliptra RT
32,801,295 UART: [state] CFI Enabled
32,918,592 UART: [rt] RT listening for mailbox commands...
32,950,332 UART: [rt]cmd =0x50435245, len=56
32,952,302 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,128,886 ready_for_fw is high
4,129,493 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,240 >>> mbox cmd response: success
18,071,905 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,709,360 UART:
23,709,738 UART: Running Caliptra FMC ...
23,710,848 UART:
23,710,993 UART: [state] CFI Enabled
23,719,008 UART: [fht] FMC Alias Private Key: 7
26,049,573 UART: [art] Extend RT PCRs Done
26,050,793 UART: [art] Lock RT PCRs Done
26,052,550 UART: [art] Populate DV Done
26,057,760 UART: [fht] FMC Alias Private Key: 7
26,059,477 UART: [art] Derive CDI
26,060,292 UART: [art] Store in in slot 0x4
26,102,943 UART: [art] Derive Key Pair
26,103,942 UART: [art] Store priv key in slot 0x5
29,345,663 UART: [art] Derive Key Pair - Done
29,358,947 UART: [art] Signing Cert with AUTHO
29,360,251 UART: RITY.KEYID = 7
31,639,184 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,758 UART: [art] PUB.X = 43CF9A21082DD38058A28253A7D145A6DF24DA4E91DA4E516BC7139AE2E919A53B04D5B97D12A838610B4310E8C33EDD
31,647,902 UART: [art] PUB.Y = 3C5483E46AF19C87DC0627967A95958AFA0692D816BD857143F69D0DDB57561661C94A76B5FEBAF6478D91D59B9FF576
31,655,175 UART: [art] SIG.R = B3518F409CEC8F6CB6E919D049F68A76BA03C508241C06C8B3DA2830C26E09D8053513F4F866259629EC5EECFDFB163B
31,662,517 UART: [art] SIG.S = 9F437FEDA93A64AE3D229A2A2CD1B6C91505320DB82187BB893EE87AC02AF7C1A67BE2BF05CEDC38CD788CAFDDA43854
32,967,809 UART: Caliptra RT
32,968,504 UART: [state] CFI Enabled
33,086,169 UART: [rt] RT listening for mailbox commands...
33,118,177 UART: [rt]cmd =0x50435245, len=56
33,119,938 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,979 UART:
192,354 UART: Running Caliptra ROM ...
193,549 UART:
193,704 UART: [state] CFI Enabled
267,149 UART: [state] LifecycleState = Unprovisioned
269,056 UART: [state] DebugLocked = No
270,980 UART: [state] WD Timer not started. Device not locked for debugging
274,666 UART: [kat] SHA2-256
453,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,312 UART: [kat] ++
465,842 UART: [kat] sha1
478,355 UART: [kat] SHA2-256
481,363 UART: [kat] SHA2-384
488,665 UART: [kat] SHA2-512-ACC
491,591 UART: [kat] ECC-384
2,948,030 UART: [kat] HMAC-384Kdf
2,973,525 UART: [kat] LMS
3,503,011 UART: [kat] --
3,506,238 UART: [cold-reset] ++
3,507,743 UART: [fht] FHT @ 0x50003400
3,519,079 UART: [idev] ++
3,519,641 UART: [idev] CDI.KEYID = 6
3,520,523 UART: [idev] SUBJECT.KEYID = 7
3,521,765 UART: [idev] UDS.KEYID = 0
3,522,703 ready_for_fw is high
3,522,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,910 UART: [idev] Erasing UDS.KEYID = 0
6,027,345 UART: [idev] Sha1 KeyId Algorithm
6,050,789 UART: [idev] --
6,054,693 UART: [ldev] ++
6,055,263 UART: [ldev] CDI.KEYID = 6
6,056,144 UART: [ldev] SUBJECT.KEYID = 5
6,057,302 UART: [ldev] AUTHORITY.KEYID = 7
6,058,589 UART: [ldev] FE.KEYID = 1
6,100,726 UART: [ldev] Erasing FE.KEYID = 1
8,603,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,196 UART: [ldev] --
10,412,853 UART: [fwproc] Wait for Commands...
10,414,792 UART: [fwproc] Recv command 0x46574c44
10,416,883 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,394 >>> mbox cmd response: success
14,285,925 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,288,859 UART: [afmc] ++
14,289,475 UART: [afmc] CDI.KEYID = 6
14,290,391 UART: [afmc] SUBJECT.KEYID = 7
14,291,561 UART: [afmc] AUTHORITY.KEYID = 5
16,829,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,434 UART: [afmc] --
18,630,080 UART: [cold-reset] --
18,633,095 UART: [state] Locking Datavault
18,638,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,372 UART: [state] Locking ICCM
18,642,416 UART: [exit] Launching FMC @ 0x40000130
18,650,818 UART:
18,651,090 UART: Running Caliptra FMC ...
18,652,195 UART:
18,652,358 UART: [state] CFI Enabled
18,711,926 UART: [fht] FMC Alias Private Key: 7
20,476,704 UART: [art] Extend RT PCRs Done
20,477,930 UART: [art] Lock RT PCRs Done
20,479,529 UART: [art] Populate DV Done
20,484,884 UART: [fht] FMC Alias Private Key: 7
20,486,457 UART: [art] Derive CDI
20,487,200 UART: [art] Store in in slot 0x4
20,544,965 UART: [art] Derive Key Pair
20,545,985 UART: [art] Store priv key in slot 0x5
23,009,179 UART: [art] Derive Key Pair - Done
23,022,227 UART: [art] Signing Cert with AUTHO
23,023,537 UART: RITY.KEYID = 7
24,735,445 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,940 UART: [art] PUB.X = CA2AC92220F7A9EBA9F5DAEF5FE001950983E38414AA1289714ED1EDEB9FDC96E1D9554B796C4A10B5A246F1BBCF85EC
24,744,236 UART: [art] PUB.Y = 16C1F6D7679320E4DE0BDB278C21C324FB093C1CE8F0A6997D068B523368F12D2B537E2CD8319DCFBAB80EEC485BD258
24,751,513 UART: [art] SIG.R = F8F021EE58B1FA89FB0FF2764421CAFB1A67996915E90D124A8900DC376F6ACA327B05CE8A948655A3D70740F97C7147
24,758,901 UART: [art] SIG.S = B5F93361AC7FE714B3A3231061DAEB999E193C30735D013143D2FCFBC6D8F799AFA6144319F795C59A9E87713BD54ECC
25,737,312 UART: Caliptra RT
25,738,032 UART: [state] CFI Enabled
25,903,539 UART: [rt] RT listening for mailbox commands...
25,935,327 UART: [rt]cmd =0x50435245, len=56
25,937,380 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,358,795 ready_for_fw is high
3,359,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,289 >>> mbox cmd response: success
14,070,946 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,367,055 UART:
18,367,440 UART: Running Caliptra FMC ...
18,368,544 UART:
18,368,715 UART: [state] CFI Enabled
18,432,145 UART: [fht] FMC Alias Private Key: 7
20,196,876 UART: [art] Extend RT PCRs Done
20,198,097 UART: [art] Lock RT PCRs Done
20,199,636 UART: [art] Populate DV Done
20,204,997 UART: [fht] FMC Alias Private Key: 7
20,206,599 UART: [art] Derive CDI
20,207,338 UART: [art] Store in in slot 0x4
20,265,127 UART: [art] Derive Key Pair
20,266,171 UART: [art] Store priv key in slot 0x5
22,728,811 UART: [art] Derive Key Pair - Done
22,741,694 UART: [art] Signing Cert with AUTHO
22,742,992 UART: RITY.KEYID = 7
24,455,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,603 UART: [art] PUB.X = 5C9B72B12A24A04C688D4EC25B7A55A6F88346D24FD1864617E6EFC5984A0FA2D155143F40564151EEE84F62F2DAF8CC
24,463,928 UART: [art] PUB.Y = FDE951A2A93DC0026334E8A5B988DED05DB948D09F3E35F358DA9956023E1F105D124FE6B56ADB2E510CC0E8B8454A2B
24,471,166 UART: [art] SIG.R = D323E6458B62726FB58F14C8385A65B0657B7520DDFE277E10D754DE64CD3276E8DF9F5E56A080F50E00C30A1963C343
24,478,517 UART: [art] SIG.S = 3993217AF857AC59B61E87CA2FF6980B6334626CBD456656F50D67A712F2DDF78A118683BF84C7DCE340629506100FC4
25,457,436 UART: Caliptra RT
25,458,119 UART: [state] CFI Enabled
25,623,424 UART: [rt] RT listening for mailbox commands...
25,655,265 UART: [rt]cmd =0x50435245, len=56
25,657,014 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,296 UART:
192,673 UART: Running Caliptra ROM ...
193,868 UART:
603,255 UART: [state] CFI Enabled
619,212 UART: [state] LifecycleState = Unprovisioned
621,125 UART: [state] DebugLocked = No
623,298 UART: [state] WD Timer not started. Device not locked for debugging
627,254 UART: [kat] SHA2-256
806,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,943 UART: [kat] ++
818,475 UART: [kat] sha1
830,372 UART: [kat] SHA2-256
833,444 UART: [kat] SHA2-384
839,068 UART: [kat] SHA2-512-ACC
842,073 UART: [kat] ECC-384
3,282,432 UART: [kat] HMAC-384Kdf
3,295,495 UART: [kat] LMS
3,825,032 UART: [kat] --
3,829,900 UART: [cold-reset] ++
3,831,121 UART: [fht] FHT @ 0x50003400
3,842,579 UART: [idev] ++
3,843,144 UART: [idev] CDI.KEYID = 6
3,844,044 UART: [idev] SUBJECT.KEYID = 7
3,845,211 UART: [idev] UDS.KEYID = 0
3,846,250 ready_for_fw is high
3,846,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,150 UART: [idev] Erasing UDS.KEYID = 0
6,323,608 UART: [idev] Sha1 KeyId Algorithm
6,347,412 UART: [idev] --
6,351,024 UART: [ldev] ++
6,351,591 UART: [ldev] CDI.KEYID = 6
6,352,492 UART: [ldev] SUBJECT.KEYID = 5
6,353,641 UART: [ldev] AUTHORITY.KEYID = 7
6,354,919 UART: [ldev] FE.KEYID = 1
6,364,963 UART: [ldev] Erasing FE.KEYID = 1
8,838,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,272 UART: [ldev] --
10,626,581 UART: [fwproc] Wait for Commands...
10,629,216 UART: [fwproc] Recv command 0x46574c44
10,631,300 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,209 >>> mbox cmd response: success
14,489,749 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,494,322 UART: [afmc] ++
14,494,915 UART: [afmc] CDI.KEYID = 6
14,495,793 UART: [afmc] SUBJECT.KEYID = 7
14,497,002 UART: [afmc] AUTHORITY.KEYID = 5
16,997,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,818 UART: [afmc] --
18,791,983 UART: [cold-reset] --
18,794,007 UART: [state] Locking Datavault
18,798,337 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,972 UART: [state] Locking ICCM
18,802,765 UART: [exit] Launching FMC @ 0x40000130
18,811,150 UART:
18,811,378 UART: Running Caliptra FMC ...
18,812,471 UART:
18,812,624 UART: [state] CFI Enabled
18,820,959 UART: [fht] FMC Alias Private Key: 7
20,577,946 UART: [art] Extend RT PCRs Done
20,579,169 UART: [art] Lock RT PCRs Done
20,580,787 UART: [art] Populate DV Done
20,586,372 UART: [fht] FMC Alias Private Key: 7
20,587,905 UART: [art] Derive CDI
20,588,710 UART: [art] Store in in slot 0x4
20,631,691 UART: [art] Derive Key Pair
20,632,751 UART: [art] Store priv key in slot 0x5
23,059,918 UART: [art] Derive Key Pair - Done
23,072,758 UART: [art] Signing Cert with AUTHO
23,074,063 UART: RITY.KEYID = 7
24,779,715 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,214 UART: [art] PUB.X = 60E539059222D64F07A635ED557495513D2D3876DBE7D0C8A1DC741DD7A22CB20EBBFD99750039C0AE75636F96C2712E
24,788,446 UART: [art] PUB.Y = FAF00CA781F6AC13BFE20CC33E079A28F7E1005DBF6485BBFE03E30EE80DCD30BBCA518D8EE3C7E128BB0298A5F32CF8
24,795,722 UART: [art] SIG.R = FFF2599C57E07080E131E7820711002C3F9AD46461B29DF96428563BC931EF5024EE651BE3069A8E47E3DF52A9B98115
24,803,049 UART: [art] SIG.S = 3AFAC718BD25E9DCD2C74BF094A52209D5C5A95B433374C7240DC4A3A7B4162C3957F707A318E98F43147BB4B274B207
25,781,782 UART: Caliptra RT
25,782,482 UART: [state] CFI Enabled
25,899,234 UART: [rt] RT listening for mailbox commands...
25,930,932 UART: [rt]cmd =0x50435245, len=56
25,932,523 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,697,586 ready_for_fw is high
3,698,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,206 >>> mbox cmd response: success
14,276,031 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,525,693 UART:
18,526,114 UART: Running Caliptra FMC ...
18,527,251 UART:
18,527,400 UART: [state] CFI Enabled
18,535,127 UART: [fht] FMC Alias Private Key: 7
20,292,194 UART: [art] Extend RT PCRs Done
20,293,413 UART: [art] Lock RT PCRs Done
20,295,196 UART: [art] Populate DV Done
20,300,392 UART: [fht] FMC Alias Private Key: 7
20,302,031 UART: [art] Derive CDI
20,302,842 UART: [art] Store in in slot 0x4
20,345,652 UART: [art] Derive Key Pair
20,346,694 UART: [art] Store priv key in slot 0x5
22,773,645 UART: [art] Derive Key Pair - Done
22,786,856 UART: [art] Signing Cert with AUTHO
22,788,152 UART: RITY.KEYID = 7
24,493,731 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,251 UART: [art] PUB.X = D1636D6EBD295115641507BCB6CE86C2C7C5BB55B9BADF451E4E46C489F848FAA0585225E45E675A8B9AB96FB91B1749
24,502,566 UART: [art] PUB.Y = 991397829073D63F8BA51ADB8D7036C1128731E1D8C6FD95F4F975D80F305E86C6A37C8959968D53936C4883315DFE37
24,509,772 UART: [art] SIG.R = 49F36A66DB353AA81F422B45A6EA42277472D62681F79751FDA6D1A1DDF379CA902882EE8D284795394D0C2D54599596
24,517,107 UART: [art] SIG.S = BE6986972813D5040B05B5BB0AB386936DAB7C04F97B56D13A50503BEAB85BF47E4C0FCDAE3C88077A4F38A2DB2B9E37
25,496,662 UART: Caliptra RT
25,497,377 UART: [state] CFI Enabled
25,615,837 UART: [rt] RT listening for mailbox commands...
25,647,720 UART: [rt]cmd =0x50435245, len=56
25,649,554 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,063 UART:
192,438 UART: Running Caliptra ROM ...
193,629 UART:
193,786 UART: [state] CFI Enabled
265,289 UART: [state] LifecycleState = Unprovisioned
267,704 UART: [state] DebugLocked = No
269,731 UART: [state] WD Timer not started. Device not locked for debugging
274,329 UART: [kat] SHA2-256
464,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,978 UART: [kat] ++
475,427 UART: [kat] sha1
486,085 UART: [kat] SHA2-256
489,090 UART: [kat] SHA2-384
494,722 UART: [kat] SHA2-512-ACC
497,306 UART: [kat] ECC-384
2,948,478 UART: [kat] HMAC-384Kdf
2,973,244 UART: [kat] LMS
3,505,004 UART: [kat] --
3,511,580 UART: [cold-reset] ++
3,513,863 UART: [fht] FHT @ 0x50003400
3,525,413 UART: [idev] ++
3,526,044 UART: [idev] CDI.KEYID = 6
3,526,998 UART: [idev] SUBJECT.KEYID = 7
3,528,238 UART: [idev] UDS.KEYID = 0
3,529,166 ready_for_fw is high
3,529,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,398 UART: [idev] Erasing UDS.KEYID = 0
6,051,610 UART: [idev] Sha1 KeyId Algorithm
6,073,925 UART: [idev] --
6,078,887 UART: [ldev] ++
6,079,565 UART: [ldev] CDI.KEYID = 6
6,080,583 UART: [ldev] SUBJECT.KEYID = 5
6,081,708 UART: [ldev] AUTHORITY.KEYID = 7
6,082,885 UART: [ldev] FE.KEYID = 1
6,121,632 UART: [ldev] Erasing FE.KEYID = 1
8,626,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,372 UART: [ldev] --
10,434,331 UART: [fwproc] Wait for Commands...
10,437,292 UART: [fwproc] Recv command 0x46574c44
10,439,638 UART: [fwproc] Recv'd Img size: 114448 bytes
13,882,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,621,907 >>> mbox cmd response: success
14,622,463 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,625,334 UART: [afmc] ++
14,626,057 UART: [afmc] CDI.KEYID = 6
14,627,255 UART: [afmc] SUBJECT.KEYID = 7
14,628,689 UART: [afmc] AUTHORITY.KEYID = 5
17,174,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,910,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,912,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,928,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,943,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,958,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,982,619 UART: [afmc] --
18,986,260 UART: [cold-reset] --
18,991,031 UART: [state] Locking Datavault
18,995,426 UART: [state] Locking PCR0, PCR1 and PCR31
18,997,564 UART: [state] Locking ICCM
18,998,846 UART: [exit] Launching FMC @ 0x40000130
19,007,159 UART:
19,007,417 UART: Running Caliptra FMC ...
19,008,475 UART:
19,008,630 UART: [state] CFI Enabled
19,070,038 UART: [fht] FMC Alias Private Key: 7
20,834,072 UART: [art] Extend RT PCRs Done
20,835,290 UART: [art] Lock RT PCRs Done
20,837,081 UART: [art] Populate DV Done
20,842,496 UART: [fht] FMC Alias Private Key: 7
20,844,180 UART: [art] Derive CDI
20,845,003 UART: [art] Store in in slot 0x4
20,903,367 UART: [art] Derive Key Pair
20,904,366 UART: [art] Store priv key in slot 0x5
23,367,479 UART: [art] Derive Key Pair - Done
23,380,362 UART: [art] Signing Cert with AUTHO
23,381,682 UART: RITY.KEYID = 7
25,093,300 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,806 UART: [art] PUB.X = 6E44827723A502ACC81453509C6692155D214F1CE294038DEBFD30B60FA097AE9AB67492664889A1E3CFFA2BCA39A348
25,102,055 UART: [art] PUB.Y = 91A4B361DC17656E8CE153CC4A15EBB32E544EE4DD84D25534076F72EBAF52ECC12B6CC4D5FB4FBBEEDD86DB04D95B57
25,109,388 UART: [art] SIG.R = 8B4E49E9FC3863BBCF86D398E1A73513F5E170BE66DA4C567C19A56FFC80F86CDA04B966625F86B6FF769F201FAAA7BA
25,116,779 UART: [art] SIG.S = 3913A178FD350379A52FB4C1EC50B7869B0F815ACC5B1B3595B17B572C65FD3819AF96AFFE99C617BA74EE04C6751C75
26,095,384 UART: Caliptra RT
26,096,077 UART: [state] CFI Enabled
26,260,897 UART: [rt] RT listening for mailbox commands...
26,292,785 UART: [rt]cmd =0x50435245, len=56
26,294,621 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,438,935 ready_for_fw is high
3,439,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,623 >>> mbox cmd response: success
14,732,484 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,026,292 UART:
19,026,673 UART: Running Caliptra FMC ...
19,027,875 UART:
19,028,045 UART: [state] CFI Enabled
19,094,660 UART: [fht] FMC Alias Private Key: 7
20,858,667 UART: [art] Extend RT PCRs Done
20,859,889 UART: [art] Lock RT PCRs Done
20,861,429 UART: [art] Populate DV Done
20,866,888 UART: [fht] FMC Alias Private Key: 7
20,868,492 UART: [art] Derive CDI
20,869,234 UART: [art] Store in in slot 0x4
20,927,068 UART: [art] Derive Key Pair
20,928,136 UART: [art] Store priv key in slot 0x5
23,390,748 UART: [art] Derive Key Pair - Done
23,403,746 UART: [art] Signing Cert with AUTHO
23,405,043 UART: RITY.KEYID = 7
25,116,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,521 UART: [art] PUB.X = 11088EF78AB2E3F6EA65356660CC9E229640687ADCF6D51318F8EDF433B3278607591C5429F7B1D19BF4140E8F677EB1
25,124,769 UART: [art] PUB.Y = 713D81D8CB1EB983A4841675EC9DD448D507803059530C20829FDF78B77D0565158960006C13686A7D9F46101AA6A914
25,132,011 UART: [art] SIG.R = 7F5E8EDCFFDEFB0C6EF0A5A4BA8450959E384038B30644D59362E751943E8E29050BE812346084388387394A7EF366E0
25,139,381 UART: [art] SIG.S = 4B64B0EB6D3A1913920979D53CC4F1F62D2902B3F0B8571DAD7FEA1177B19715A8728F5F0A255563DA1284E514F4A448
26,118,391 UART: Caliptra RT
26,119,097 UART: [state] CFI Enabled
26,284,942 UART: [rt] RT listening for mailbox commands...
26,316,897 UART: [rt]cmd =0x50435245, len=56
26,318,921 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,330 UART:
192,693 UART: Running Caliptra ROM ...
193,783 UART:
603,439 UART: [state] CFI Enabled
615,047 UART: [state] LifecycleState = Unprovisioned
617,475 UART: [state] DebugLocked = No
619,224 UART: [state] WD Timer not started. Device not locked for debugging
624,244 UART: [kat] SHA2-256
814,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,907 UART: [kat] ++
825,527 UART: [kat] sha1
837,184 UART: [kat] SHA2-256
840,182 UART: [kat] SHA2-384
846,134 UART: [kat] SHA2-512-ACC
848,678 UART: [kat] ECC-384
3,290,651 UART: [kat] HMAC-384Kdf
3,303,640 UART: [kat] LMS
3,835,517 UART: [kat] --
3,839,762 UART: [cold-reset] ++
3,841,976 UART: [fht] FHT @ 0x50003400
3,852,803 UART: [idev] ++
3,853,440 UART: [idev] CDI.KEYID = 6
3,854,413 UART: [idev] SUBJECT.KEYID = 7
3,855,580 UART: [idev] UDS.KEYID = 0
3,856,568 ready_for_fw is high
3,856,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,579 UART: [idev] Erasing UDS.KEYID = 0
6,331,006 UART: [idev] Sha1 KeyId Algorithm
6,352,504 UART: [idev] --
6,357,026 UART: [ldev] ++
6,357,699 UART: [ldev] CDI.KEYID = 6
6,358,599 UART: [ldev] SUBJECT.KEYID = 5
6,359,801 UART: [ldev] AUTHORITY.KEYID = 7
6,361,024 UART: [ldev] FE.KEYID = 1
6,372,800 UART: [ldev] Erasing FE.KEYID = 1
8,853,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,243 UART: [ldev] --
10,646,833 UART: [fwproc] Wait for Commands...
10,648,399 UART: [fwproc] Recv command 0x46574c44
10,650,706 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,754 >>> mbox cmd response: success
14,837,268 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,840,544 UART: [afmc] ++
14,841,233 UART: [afmc] CDI.KEYID = 6
14,842,467 UART: [afmc] SUBJECT.KEYID = 7
14,843,891 UART: [afmc] AUTHORITY.KEYID = 5
17,347,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,692 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,645 UART: [afmc] --
19,147,823 UART: [cold-reset] --
19,151,571 UART: [state] Locking Datavault
19,155,951 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,101 UART: [state] Locking ICCM
19,159,602 UART: [exit] Launching FMC @ 0x40000130
19,168,274 UART:
19,168,545 UART: Running Caliptra FMC ...
19,169,646 UART:
19,169,805 UART: [state] CFI Enabled
19,177,361 UART: [fht] FMC Alias Private Key: 7
20,934,371 UART: [art] Extend RT PCRs Done
20,935,586 UART: [art] Lock RT PCRs Done
20,937,450 UART: [art] Populate DV Done
20,942,740 UART: [fht] FMC Alias Private Key: 7
20,944,450 UART: [art] Derive CDI
20,945,181 UART: [art] Store in in slot 0x4
20,987,766 UART: [art] Derive Key Pair
20,988,754 UART: [art] Store priv key in slot 0x5
23,415,383 UART: [art] Derive Key Pair - Done
23,428,379 UART: [art] Signing Cert with AUTHO
23,429,671 UART: RITY.KEYID = 7
25,135,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,716 UART: [art] PUB.X = 73D55BA93D45A0A0224ECAFEDF415098E4AE9C5AFD5B7E77719C6C36F66908CDF43D1D886FF3D5541501F165ED21360F
25,144,003 UART: [art] PUB.Y = 50027782382A32AE1400C1F9EA5BB1A02048A82368D38B9A9520A68478922285D7C228E2E0CC9BE5FA5D9797F322B65B
25,151,224 UART: [art] SIG.R = 461AA51BB0CBF43FE173363151A2E1944E4BBFDAE362E07456E6FA99C213BF05B80F5B39EE6495BE9120390A7645698F
25,158,611 UART: [art] SIG.S = C204039DF789BB232099681627697CAB30C64DE059BEC6DDC4468D5ACCCB465FDCDD5C9BEC55EC4A6641DF0AA3629C44
26,137,803 UART: Caliptra RT
26,138,512 UART: [state] CFI Enabled
26,256,385 UART: [rt] RT listening for mailbox commands...
26,288,160 UART: [rt]cmd =0x50435245, len=56
26,289,854 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,755,231 ready_for_fw is high
3,755,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,959,443 >>> mbox cmd response: success
14,960,083 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,215,473 UART:
19,215,875 UART: Running Caliptra FMC ...
19,217,003 UART:
19,217,155 UART: [state] CFI Enabled
19,224,776 UART: [fht] FMC Alias Private Key: 7
20,981,052 UART: [art] Extend RT PCRs Done
20,982,264 UART: [art] Lock RT PCRs Done
20,984,164 UART: [art] Populate DV Done
20,989,262 UART: [fht] FMC Alias Private Key: 7
20,990,781 UART: [art] Derive CDI
20,991,516 UART: [art] Store in in slot 0x4
21,034,174 UART: [art] Derive Key Pair
21,035,175 UART: [art] Store priv key in slot 0x5
23,461,824 UART: [art] Derive Key Pair - Done
23,474,812 UART: [art] Signing Cert with AUTHO
23,476,137 UART: RITY.KEYID = 7
25,181,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,884 UART: [art] PUB.X = A3B0C4A6831DB1DD24485A4D49B3989BA298CC9E51DC52FD76F82DF4D617CB3EB356D86A1E956C6FD8CCDEB7A601FE54
25,190,173 UART: [art] PUB.Y = 770A3EA47FF0517E5615E5E8219F154F07F7EA32893C1929DF1EF2A659285CAB42E3EBA802F647F0128B6BFA1B6AC764
25,197,476 UART: [art] SIG.R = D7B9BFE88DFBB3E437609F12A6097B663806421A1A457609FCCBF2BE9A9DC4ABD2138ADE4AE6F6AC4F345DEC400D14B8
25,204,860 UART: [art] SIG.S = 2B2E5A9224095003495161808A9153CE9BDBC1517844226C06CE1423CBCC2FF6BF7F296FAAB9EFEB0A455D2D72C6AA60
26,184,136 UART: Caliptra RT
26,184,845 UART: [state] CFI Enabled
26,301,325 UART: [rt] RT listening for mailbox commands...
26,333,386 UART: [rt]cmd =0x50435245, len=56
26,335,137 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,653 UART: [kat] SHA2-256
882,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,699 UART: [kat] ++
886,851 UART: [kat] sha1
890,987 UART: [kat] SHA2-256
892,925 UART: [kat] SHA2-384
895,688 UART: [kat] SHA2-512-ACC
897,589 UART: [kat] ECC-384
903,202 UART: [kat] HMAC-384Kdf
907,938 UART: [kat] LMS
1,476,134 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,235 UART: [fht] Storing FHT @ 0x50003400
1,480,156 UART: [idev] ++
1,480,324 UART: [idev] CDI.KEYID = 6
1,480,684 UART: [idev] SUBJECT.KEYID = 7
1,481,108 UART: [idev] UDS.KEYID = 0
1,481,453 ready_for_fw is high
1,481,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,922 UART: [idev] Erasing UDS.KEYID = 0
1,505,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,568 UART: [idev] --
1,515,623 UART: [ldev] ++
1,515,791 UART: [ldev] CDI.KEYID = 6
1,516,154 UART: [ldev] SUBJECT.KEYID = 5
1,516,580 UART: [ldev] AUTHORITY.KEYID = 7
1,517,043 UART: [ldev] FE.KEYID = 1
1,522,069 UART: [ldev] Erasing FE.KEYID = 1
1,547,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,480 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,480 UART: [fwproc] Received command 0x46574c44
1,588,271 UART: [fwproc] Received Image of size 114448 bytes
2,887,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,932 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,389 >>> mbox cmd response: success
3,079,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,080,553 UART: [afmc] ++
3,080,721 UART: [afmc] CDI.KEYID = 6
3,081,083 UART: [afmc] SUBJECT.KEYID = 7
3,081,508 UART: [afmc] AUTHORITY.KEYID = 5
3,116,701 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,923 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,316 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,006 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,919 UART: [afmc] --
3,159,987 UART: [cold-reset] --
3,160,777 UART: [state] Locking Datavault
3,161,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,348 UART: [state] Locking ICCM
3,162,814 UART: [exit] Launching FMC @ 0x40000130
3,168,143 UART:
3,168,159 UART: Running Caliptra FMC ...
3,168,567 UART:
3,168,621 UART: [state] CFI Enabled
3,179,210 UART: [fht] FMC Alias Private Key: 7
3,287,373 UART: [art] Extend RT PCRs Done
3,287,801 UART: [art] Lock RT PCRs Done
3,289,495 UART: [art] Populate DV Done
3,297,952 UART: [fht] FMC Alias Private Key: 7
3,298,980 UART: [art] Derive CDI
3,299,260 UART: [art] Store in in slot 0x4
3,384,649 UART: [art] Derive Key Pair
3,385,009 UART: [art] Store priv key in slot 0x5
3,398,305 UART: [art] Derive Key Pair - Done
3,413,024 UART: [art] Signing Cert with AUTHO
3,413,504 UART: RITY.KEYID = 7
3,428,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,435 UART: [art] PUB.X = 2C41B68FF3C50269802F73ECE7A253A567582A35907D65D2869A55DD89F0166F152B96A6E775648317B842A2789904D5
3,436,187 UART: [art] PUB.Y = 5A272F143F84E11C6AE76F5E8F44371A4B9C4D1A481D49DD22A0C63B5038690684FDD982505FD38FC13D74D26E43DD24
3,443,138 UART: [art] SIG.R = A76B85A48F0075CFD8F5996210FFC08FCEEE80C971232CBC662C05B2C8064CB80DA2993D70D77867BC8E24DB7AEFD6FC
3,449,895 UART: [art] SIG.S = 902E80D5EDD41890E44CBB78BF8CEAAC38FDD0F6CE5A7DACC25444B33B385920E66BF15FFF9B913DD1FE03F74C321BF2
3,473,873 UART: Caliptra RT
3,474,126 UART: [state] CFI Enabled
3,582,488 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,218 UART: [rt]cmd =0x50435245, len=56
3,614,784 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,457 ready_for_fw is high
1,362,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,293 >>> mbox cmd response: success
2,930,293 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,992,183 UART:
2,992,199 UART: Running Caliptra FMC ...
2,992,607 UART:
2,992,661 UART: [state] CFI Enabled
3,002,712 UART: [fht] FMC Alias Private Key: 7
3,110,463 UART: [art] Extend RT PCRs Done
3,110,891 UART: [art] Lock RT PCRs Done
3,112,459 UART: [art] Populate DV Done
3,120,490 UART: [fht] FMC Alias Private Key: 7
3,121,654 UART: [art] Derive CDI
3,121,934 UART: [art] Store in in slot 0x4
3,207,391 UART: [art] Derive Key Pair
3,207,751 UART: [art] Store priv key in slot 0x5
3,220,905 UART: [art] Derive Key Pair - Done
3,235,659 UART: [art] Signing Cert with AUTHO
3,236,139 UART: RITY.KEYID = 7
3,251,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,192 UART: [art] PUB.X = D813CB2D505D5D4B9ABE120DC64290DA3942562AB97AC7F65E741B1CEFEC7DCB576D3EAB8AB8B30AF3CCA3A9A7CB1117
3,258,984 UART: [art] PUB.Y = E87AC9F9E909CF13F23518510B1B37FC11D27ED774E000AAFC11CF853C5AC7EF40D2DC2124376906450A434BA57CA565
3,265,908 UART: [art] SIG.R = 869FEBB8689B835A73AE1E7899F60BFBA5567C1A1C2399D19AE492AE629BFBBBB441763661A27EA9C39017BD7799729A
3,272,683 UART: [art] SIG.S = C9E2022239B4C8DA099669288B469A965810EC22944213238A93D2AC2F1279A593AEB688B9ADEF4BE5CA41603F370D74
3,297,027 UART: Caliptra RT
3,297,280 UART: [state] CFI Enabled
3,405,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,768 UART: [rt]cmd =0x50435245, len=56
3,438,326 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,681 UART: [kat] SHA2-512-ACC
897,582 UART: [kat] ECC-384
903,271 UART: [kat] HMAC-384Kdf
907,847 UART: [kat] LMS
1,476,043 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,318 UART: [fht] Storing FHT @ 0x50003400
1,480,141 UART: [idev] ++
1,480,309 UART: [idev] CDI.KEYID = 6
1,480,669 UART: [idev] SUBJECT.KEYID = 7
1,481,093 UART: [idev] UDS.KEYID = 0
1,481,438 ready_for_fw is high
1,481,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,091 UART: [idev] Erasing UDS.KEYID = 0
1,505,951 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,436 UART: [ldev] Erasing FE.KEYID = 1
1,547,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,083 UART: [ldev] --
1,586,458 UART: [fwproc] Waiting for Commands...
1,587,115 UART: [fwproc] Received command 0x46574c44
1,587,906 UART: [fwproc] Received Image of size 114448 bytes
2,886,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,733 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,070 >>> mbox cmd response: success
3,079,070 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,080,274 UART: [afmc] ++
3,080,442 UART: [afmc] CDI.KEYID = 6
3,080,804 UART: [afmc] SUBJECT.KEYID = 7
3,081,229 UART: [afmc] AUTHORITY.KEYID = 5
3,116,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,689 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,379 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,310 UART: [afmc] --
3,159,230 UART: [cold-reset] --
3,160,108 UART: [state] Locking Datavault
3,161,499 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,103 UART: [state] Locking ICCM
3,162,685 UART: [exit] Launching FMC @ 0x40000130
3,168,014 UART:
3,168,030 UART: Running Caliptra FMC ...
3,168,438 UART:
3,168,581 UART: [state] CFI Enabled
3,179,228 UART: [fht] FMC Alias Private Key: 7
3,287,119 UART: [art] Extend RT PCRs Done
3,287,547 UART: [art] Lock RT PCRs Done
3,289,147 UART: [art] Populate DV Done
3,297,438 UART: [fht] FMC Alias Private Key: 7
3,298,594 UART: [art] Derive CDI
3,298,874 UART: [art] Store in in slot 0x4
3,384,537 UART: [art] Derive Key Pair
3,384,897 UART: [art] Store priv key in slot 0x5
3,398,443 UART: [art] Derive Key Pair - Done
3,413,379 UART: [art] Signing Cert with AUTHO
3,413,859 UART: RITY.KEYID = 7
3,429,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,150 UART: [art] PUB.X = 0B16961A353EF42C2122B17FAE67070BB18FFFC7CF22ADD638FE689121121984B0BEAF325131F6EF54B5C29F9443B52F
3,436,919 UART: [art] PUB.Y = AD1E2446350CA85B931BCB38573AB168212BB99A5E2619354E74559DD503E0CC332717B1B2E455C4BF0B5DA932753B4B
3,443,862 UART: [art] SIG.R = 4F827639DCE07D3DB44EA389DF4E9B94ED09B6C3CA6F6ECE6598AEF9302CF4A485C932BC95DAD27370C6A7573F2D5ECA
3,450,651 UART: [art] SIG.S = 58F8533850D6C60856F2CB133A10BA18375B3D5A7C270EE26F060C34B8AA119D0ABE3DEE30009919D16D19FD12716823
3,474,569 UART: Caliptra RT
3,474,914 UART: [state] CFI Enabled
3,582,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,352 UART: [rt]cmd =0x50435245, len=56
3,614,860 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,240 >>> mbox cmd response: success
2,930,240 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,991,380 UART:
2,991,396 UART: Running Caliptra FMC ...
2,991,804 UART:
2,991,947 UART: [state] CFI Enabled
3,002,570 UART: [fht] FMC Alias Private Key: 7
3,110,711 UART: [art] Extend RT PCRs Done
3,111,139 UART: [art] Lock RT PCRs Done
3,112,295 UART: [art] Populate DV Done
3,120,566 UART: [fht] FMC Alias Private Key: 7
3,121,660 UART: [art] Derive CDI
3,121,940 UART: [art] Store in in slot 0x4
3,207,583 UART: [art] Derive Key Pair
3,207,943 UART: [art] Store priv key in slot 0x5
3,221,599 UART: [art] Derive Key Pair - Done
3,236,278 UART: [art] Signing Cert with AUTHO
3,236,758 UART: RITY.KEYID = 7
3,252,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,881 UART: [art] PUB.X = F13884FEBF99A5910907A3795C530709A19EE329639003EACC36F3EEE077CD10DDEF5F413E7DB6365AD4642DE566ECC5
3,259,646 UART: [art] PUB.Y = BFA25B5826C8521458B0B4A0F841262B573CF7EDD8B15A022575246E5E690370BF4986E0FEB275C159E96034B7EAF5F0
3,266,592 UART: [art] SIG.R = 11BE650994AA59EEE128CBF7BF0D48D16373F01F01994F9106B02FF182F360191A22406E7A45A25BFCC0A7F35F9DCADE
3,273,362 UART: [art] SIG.S = F06F9C7D0B63BC380015C687371DE5A3BAEFCB66023210AFDEFCB650D8B1470231C633F1B84AD08EF0DFF41B3D9B8ED5
3,297,204 UART: Caliptra RT
3,297,549 UART: [state] CFI Enabled
3,405,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,454 UART: [rt]cmd =0x50435245, len=56
3,437,826 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,982 UART: [kat] HMAC-384Kdf
922,696 UART: [kat] LMS
1,171,024 UART: [kat] --
1,172,053 UART: [cold-reset] ++
1,172,605 UART: [fht] FHT @ 0x50003400
1,175,290 UART: [idev] ++
1,175,458 UART: [idev] CDI.KEYID = 6
1,175,818 UART: [idev] SUBJECT.KEYID = 7
1,176,242 UART: [idev] UDS.KEYID = 0
1,176,587 ready_for_fw is high
1,176,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,201,153 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,438 UART: [fwproc] Wait for Commands...
1,284,120 UART: [fwproc] Recv command 0x46574c44
1,284,848 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,054 >>> mbox cmd response: success
2,776,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,192 UART: [afmc] ++
2,777,360 UART: [afmc] CDI.KEYID = 6
2,777,722 UART: [afmc] SUBJECT.KEYID = 7
2,778,147 UART: [afmc] AUTHORITY.KEYID = 5
2,814,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,293 UART: [afmc] --
2,858,351 UART: [cold-reset] --
2,859,009 UART: [state] Locking Datavault
2,860,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,782 UART: [state] Locking ICCM
2,861,434 UART: [exit] Launching FMC @ 0x40000130
2,866,763 UART:
2,866,779 UART: Running Caliptra FMC ...
2,867,187 UART:
2,867,241 UART: [state] CFI Enabled
2,877,846 UART: [fht] FMC Alias Private Key: 7
2,985,677 UART: [art] Extend RT PCRs Done
2,986,105 UART: [art] Lock RT PCRs Done
2,987,523 UART: [art] Populate DV Done
2,995,908 UART: [fht] FMC Alias Private Key: 7
2,996,914 UART: [art] Derive CDI
2,997,194 UART: [art] Store in in slot 0x4
3,083,013 UART: [art] Derive Key Pair
3,083,373 UART: [art] Store priv key in slot 0x5
3,096,709 UART: [art] Derive Key Pair - Done
3,111,122 UART: [art] Signing Cert with AUTHO
3,111,602 UART: RITY.KEYID = 7
3,126,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,417 UART: [art] PUB.X = C09AF0A08CABDDCCBBA263EE042DE69D7B53406A5F3400468C21CC863086F111CF15518FE2913D622C0323AFF292E707
3,134,166 UART: [art] PUB.Y = 60E4B2A0C3E7CBEDA0CEA76CCB39EDAEDB480A326628451BB6BC29436288CA08DD994B215F70943C6022BBB1BF38DE26
3,141,130 UART: [art] SIG.R = 33B9EF0FC999017429754DBD50439B835FE75EA22FB7B391969D4792B4BC6D9D06A7B44116730C49405A6B51D87B5D5D
3,147,888 UART: [art] SIG.S = 092DE86DFFA67C0FE10054D9C2CCD0E0F44A63723906EF802845922319B6CAE57D2A9D0B3D0CFD35C6B36BB6D0F3A5E2
3,171,924 UART: Caliptra RT
3,172,177 UART: [state] CFI Enabled
3,280,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,436 UART: [rt]cmd =0x50435245, len=56
3,313,276 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,255 ready_for_fw is high
1,061,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,185 >>> mbox cmd response: success
2,628,185 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,923 UART:
2,689,939 UART: Running Caliptra FMC ...
2,690,347 UART:
2,690,401 UART: [state] CFI Enabled
2,700,826 UART: [fht] FMC Alias Private Key: 7
2,808,551 UART: [art] Extend RT PCRs Done
2,808,979 UART: [art] Lock RT PCRs Done
2,810,445 UART: [art] Populate DV Done
2,818,684 UART: [fht] FMC Alias Private Key: 7
2,819,624 UART: [art] Derive CDI
2,819,904 UART: [art] Store in in slot 0x4
2,905,597 UART: [art] Derive Key Pair
2,905,957 UART: [art] Store priv key in slot 0x5
2,919,247 UART: [art] Derive Key Pair - Done
2,934,155 UART: [art] Signing Cert with AUTHO
2,934,635 UART: RITY.KEYID = 7
2,950,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,008 UART: [art] PUB.X = F27877DA9515170E22762ED84401306A4BB49439D25A7DCA3A3C373DADF803FBE219C9EAC6347140452B3627355A1750
2,957,765 UART: [art] PUB.Y = 6E7D61E3BC8A16208FD5A099C4E22895D52A404CDE0A8AE7D0C1D19FAAA5F1C7ED99B3A47CC84974797A60F59B7A4906
2,964,723 UART: [art] SIG.R = 5A5E9F1CEF0CFDF0FFB566092023BB379E164CBBA5F799BF5DEBEBF928E1130AB32E32F7D3592B64069B3399236F2DE0
2,971,499 UART: [art] SIG.S = 61A640F754EFD3F0880D10A3D7D767105DC471403C6E68F161D8A432E75DFB2101E8A086E1DCDCF2F4E4D0C12C0F1120
2,995,409 UART: Caliptra RT
2,995,662 UART: [state] CFI Enabled
3,102,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,187 UART: [rt]cmd =0x50435245, len=56
3,134,641 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,174,729 UART: [idev] ++
1,174,897 UART: [idev] CDI.KEYID = 6
1,175,257 UART: [idev] SUBJECT.KEYID = 7
1,175,681 UART: [idev] UDS.KEYID = 0
1,176,026 ready_for_fw is high
1,176,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,669 UART: [idev] Erasing UDS.KEYID = 0
1,200,676 UART: [idev] Sha1 KeyId Algorithm
1,209,088 UART: [idev] --
1,210,180 UART: [ldev] ++
1,210,348 UART: [ldev] CDI.KEYID = 6
1,210,711 UART: [ldev] SUBJECT.KEYID = 5
1,211,137 UART: [ldev] AUTHORITY.KEYID = 7
1,211,600 UART: [ldev] FE.KEYID = 1
1,216,630 UART: [ldev] Erasing FE.KEYID = 1
1,243,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,246 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,361 UART: [fwproc] Recv command 0x46574c44
1,284,089 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,863 >>> mbox cmd response: success
2,776,863 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,778,013 UART: [afmc] ++
2,778,181 UART: [afmc] CDI.KEYID = 6
2,778,543 UART: [afmc] SUBJECT.KEYID = 7
2,778,968 UART: [afmc] AUTHORITY.KEYID = 5
2,814,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,156 UART: [afmc] --
2,857,064 UART: [cold-reset] --
2,858,032 UART: [state] Locking Datavault
2,858,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,601 UART: [state] Locking ICCM
2,860,089 UART: [exit] Launching FMC @ 0x40000130
2,865,418 UART:
2,865,434 UART: Running Caliptra FMC ...
2,865,842 UART:
2,865,985 UART: [state] CFI Enabled
2,876,506 UART: [fht] FMC Alias Private Key: 7
2,984,649 UART: [art] Extend RT PCRs Done
2,985,077 UART: [art] Lock RT PCRs Done
2,986,571 UART: [art] Populate DV Done
2,994,714 UART: [fht] FMC Alias Private Key: 7
2,995,750 UART: [art] Derive CDI
2,996,030 UART: [art] Store in in slot 0x4
3,081,919 UART: [art] Derive Key Pair
3,082,279 UART: [art] Store priv key in slot 0x5
3,095,365 UART: [art] Derive Key Pair - Done
3,110,204 UART: [art] Signing Cert with AUTHO
3,110,684 UART: RITY.KEYID = 7
3,125,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,461 UART: [art] PUB.X = 1917C6992D60302790FB8C3ED7A792F8CA3395511AEA026B9F95A44402ADA92D77481A883D70E84E3D79504A8680EF15
3,133,221 UART: [art] PUB.Y = CDD90812FC4FBFFF001AA22599446C03968BC3437F75F7D9D590CE92ED5258DCF7829D5009FF6DAFAFF51F4993F7095D
3,140,151 UART: [art] SIG.R = 8C485C454A792F28D493474307546483B5D9EEB1E41518F68B6A5B1934FB017A70214594BE1822B0D0C4BA8989F81B90
3,146,907 UART: [art] SIG.S = 0D55CBEB56C445078D75EDFD1ECAB2CB7EF6CE43674504167765711BE0DA8898C8EAEEFF6F71995292E725043F84DDB1
3,171,176 UART: Caliptra RT
3,171,521 UART: [state] CFI Enabled
3,279,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,018 UART: [rt]cmd =0x50435245, len=56
3,312,466 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,820 ready_for_fw is high
1,060,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,368 >>> mbox cmd response: success
2,628,368 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,746 UART:
2,690,762 UART: Running Caliptra FMC ...
2,691,170 UART:
2,691,313 UART: [state] CFI Enabled
2,701,768 UART: [fht] FMC Alias Private Key: 7
2,809,763 UART: [art] Extend RT PCRs Done
2,810,191 UART: [art] Lock RT PCRs Done
2,811,719 UART: [art] Populate DV Done
2,820,076 UART: [fht] FMC Alias Private Key: 7
2,821,196 UART: [art] Derive CDI
2,821,476 UART: [art] Store in in slot 0x4
2,907,525 UART: [art] Derive Key Pair
2,907,885 UART: [art] Store priv key in slot 0x5
2,920,773 UART: [art] Derive Key Pair - Done
2,935,343 UART: [art] Signing Cert with AUTHO
2,935,823 UART: RITY.KEYID = 7
2,951,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,874 UART: [art] PUB.X = 0EC19D8D5AA810BF3CE2884D41A54D50FE12D76F1C8B2CD63B47F6789C37661C86571D5CACBBC20AB8A15928A88775AD
2,958,652 UART: [art] PUB.Y = 87B3D6B677EDA9392BDEDD2EBD4D051F2DA2F3DE1A7372D4E6BB4FC3D63B77431FC40AE580871CEF16A73441E7617C62
2,965,614 UART: [art] SIG.R = 48B951580034FBFD4BA3BA220728F91F7D831809FBB9EE8A5829647DBA04DA435DCE4434AAA1C89340E4913230F23394
2,972,355 UART: [art] SIG.S = EA1A3C0877D4F4D127829EDF1D6C1AA65336195B07A47FCBB0D98C229335832DC1F703298B40DDE6BF46995875B66E36
2,996,357 UART: Caliptra RT
2,996,702 UART: [state] CFI Enabled
3,104,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,455 UART: [rt]cmd =0x50435245, len=56
3,137,181 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 ready_for_fw is high
1,174,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,460 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,555 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,564 >>> mbox cmd response: success
2,773,564 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,771 UART: [afmc] ++
2,774,939 UART: [afmc] CDI.KEYID = 6
2,775,302 UART: [afmc] SUBJECT.KEYID = 7
2,775,728 UART: [afmc] AUTHORITY.KEYID = 5
2,811,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,377 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,316 UART: [afmc] --
2,855,440 UART: [cold-reset] --
2,856,176 UART: [state] Locking Datavault
2,857,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,127 UART: [state] Locking ICCM
2,858,723 UART: [exit] Launching FMC @ 0x40000130
2,864,052 UART:
2,864,068 UART: Running Caliptra FMC ...
2,864,476 UART:
2,864,530 UART: [state] CFI Enabled
2,875,005 UART: [fht] FMC Alias Private Key: 7
2,982,852 UART: [art] Extend RT PCRs Done
2,983,280 UART: [art] Lock RT PCRs Done
2,984,896 UART: [art] Populate DV Done
2,993,059 UART: [fht] FMC Alias Private Key: 7
2,994,207 UART: [art] Derive CDI
2,994,487 UART: [art] Store in in slot 0x4
3,080,342 UART: [art] Derive Key Pair
3,080,702 UART: [art] Store priv key in slot 0x5
3,094,580 UART: [art] Derive Key Pair - Done
3,109,176 UART: [art] Signing Cert with AUTHO
3,109,656 UART: RITY.KEYID = 7
3,124,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,339 UART: [art] PUB.X = 5707521CED64AC740FDC750F0394407BB0E0EC503D3FC03E18278EBBACBA0EC149AB3E62322E6AD2349C8881D6A314F2
3,132,106 UART: [art] PUB.Y = 0E8728F8501A9CF3BB5E2E80E07CB44641967B5C90231882BD47F8C7CEDF72A7F90182B36546A3471B6794EBDF096852
3,139,047 UART: [art] SIG.R = AE3B908FBEBD4CDE43BDB38C64A0F199C4F8DCB2B15D6A66AC5C3EAACD09B172CCEB0C878B27586A71556DFB395FA6D5
3,145,843 UART: [art] SIG.S = 02B55D8533C4F51DE22CE5FD1867CA59D7B570D2252DFDBAA202A323B3CE42E0FBCCF466822F7AEB86FF8A47FF6B2F0C
3,169,527 UART: Caliptra RT
3,169,780 UART: [state] CFI Enabled
3,275,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,837 UART: [rt]cmd =0x50435245, len=56
3,308,245 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,020 ready_for_fw is high
1,056,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,742 >>> mbox cmd response: success
2,625,742 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,024 UART:
2,687,040 UART: Running Caliptra FMC ...
2,687,448 UART:
2,687,502 UART: [state] CFI Enabled
2,698,179 UART: [fht] FMC Alias Private Key: 7
2,806,176 UART: [art] Extend RT PCRs Done
2,806,604 UART: [art] Lock RT PCRs Done
2,808,284 UART: [art] Populate DV Done
2,816,479 UART: [fht] FMC Alias Private Key: 7
2,817,549 UART: [art] Derive CDI
2,817,829 UART: [art] Store in in slot 0x4
2,903,172 UART: [art] Derive Key Pair
2,903,532 UART: [art] Store priv key in slot 0x5
2,916,346 UART: [art] Derive Key Pair - Done
2,931,159 UART: [art] Signing Cert with AUTHO
2,931,639 UART: RITY.KEYID = 7
2,947,125 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,890 UART: [art] PUB.X = 1414619024E2528294BC3265CA5F640A526E14D0188B2292C7BAB331BFDF336EFE02B4E6DCA4EF09687D4CDD989AADEA
2,954,663 UART: [art] PUB.Y = 345D970C0756EDC8456168A40312CF943053B00BF5B59444EFFF1D80594FEE2BE344EEA6D2A73F0F93B0A5C5A96E2C6E
2,961,608 UART: [art] SIG.R = EBC990BF9E0A9772DE1E506F0C53C0710BC38B67995274E0A5CE2B3B7B86976E389A8258DD2FD3CD711F0E13F83BA444
2,968,376 UART: [art] SIG.S = 879C341602A80F7F3C70A84180C3CB89DC3681AE097D45C668B3A9AE349850F52C69B5EE12B5FA30C2E783CB5CFE643F
2,992,596 UART: Caliptra RT
2,992,849 UART: [state] CFI Enabled
3,100,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,235 UART: [rt]cmd =0x50435245, len=56
3,132,691 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,321 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,803 >>> mbox cmd response: success
2,775,803 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,776,954 UART: [afmc] ++
2,777,122 UART: [afmc] CDI.KEYID = 6
2,777,485 UART: [afmc] SUBJECT.KEYID = 7
2,777,911 UART: [afmc] AUTHORITY.KEYID = 5
2,813,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,033 UART: [afmc] --
2,857,089 UART: [cold-reset] --
2,858,009 UART: [state] Locking Datavault
2,859,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,898 UART: [state] Locking ICCM
2,860,330 UART: [exit] Launching FMC @ 0x40000130
2,865,659 UART:
2,865,675 UART: Running Caliptra FMC ...
2,866,083 UART:
2,866,226 UART: [state] CFI Enabled
2,877,145 UART: [fht] FMC Alias Private Key: 7
2,984,864 UART: [art] Extend RT PCRs Done
2,985,292 UART: [art] Lock RT PCRs Done
2,986,956 UART: [art] Populate DV Done
2,994,883 UART: [fht] FMC Alias Private Key: 7
2,996,061 UART: [art] Derive CDI
2,996,341 UART: [art] Store in in slot 0x4
3,082,018 UART: [art] Derive Key Pair
3,082,378 UART: [art] Store priv key in slot 0x5
3,095,654 UART: [art] Derive Key Pair - Done
3,110,305 UART: [art] Signing Cert with AUTHO
3,110,785 UART: RITY.KEYID = 7
3,126,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,382 UART: [art] PUB.X = B672C077A1A1DB613F9CDE11B28AACCCA627466C9975B4C0128E1E68CEB914BD3162FBB704B9C6EA4A5FFD1F56C6E6F2
3,134,171 UART: [art] PUB.Y = 5DD567F502BC3CE88BEB2D985FB77DA54674C9DBE6B350994F8C7F49F799B2813B5C2118D5ACC298B56077A4042F5A7B
3,141,125 UART: [art] SIG.R = 757DB7CCF7584A81D3E116824336263235985CA39D49D61ABD703C01B90D5EAC712677A51C8FFC61C4B9A088F56E5400
3,147,867 UART: [art] SIG.S = 33C2FD9D86626CC4CE18319DA39BF2D6E2CA7673087D5BEFA97F6B9DDAA6354F419A01C902CDBE6D8BAFD36C2C1A4FBC
3,171,709 UART: Caliptra RT
3,172,054 UART: [state] CFI Enabled
3,279,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,219 UART: [rt]cmd =0x50435245, len=56
3,311,453 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,913 ready_for_fw is high
1,055,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,039 >>> mbox cmd response: success
2,624,039 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,531 UART:
2,686,547 UART: Running Caliptra FMC ...
2,686,955 UART:
2,687,098 UART: [state] CFI Enabled
2,697,763 UART: [fht] FMC Alias Private Key: 7
2,805,858 UART: [art] Extend RT PCRs Done
2,806,286 UART: [art] Lock RT PCRs Done
2,807,898 UART: [art] Populate DV Done
2,815,893 UART: [fht] FMC Alias Private Key: 7
2,816,943 UART: [art] Derive CDI
2,817,223 UART: [art] Store in in slot 0x4
2,903,002 UART: [art] Derive Key Pair
2,903,362 UART: [art] Store priv key in slot 0x5
2,916,230 UART: [art] Derive Key Pair - Done
2,931,257 UART: [art] Signing Cert with AUTHO
2,931,737 UART: RITY.KEYID = 7
2,946,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,758 UART: [art] PUB.X = 9E7A9CE2B4A2434D3961F1046D9E3A2335ACF2837F2CDF2A4EB453462F7F41BB68D2A81F027D9BF81E91A685ADA0F161
2,954,534 UART: [art] PUB.Y = E0F86F4BBA9B719544F635D943DD6600B65761B21960FDC3468F16437D6C865631FA82448CE5599E8B5750F920DDE586
2,961,458 UART: [art] SIG.R = A73521A902D53CBEC471AE7C34F8CDB50870372ED82DEB58F2CE600C11E317C55E329366F93797B500DFD5840AC19A23
2,968,200 UART: [art] SIG.S = A07B628ADD66D0D260650FD96159608CF4DAC9F1CF6EDEC6A99AEFF65C162D1B83E1501ADF63269AE9F6FAEBF7CBF83C
2,991,852 UART: Caliptra RT
2,992,197 UART: [state] CFI Enabled
3,100,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,247 UART: [rt]cmd =0x50435245, len=56
3,132,833 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,124 UART:
192,482 UART: Running Caliptra ROM ...
193,581 UART:
193,727 UART: [state] CFI Enabled
262,207 UART: [state] LifecycleState = Unprovisioned
264,200 UART: [state] DebugLocked = No
265,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,168 UART: [kat] SHA2-256
439,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,475 UART: [kat] ++
450,952 UART: [kat] sha1
461,121 UART: [kat] SHA2-256
463,857 UART: [kat] SHA2-384
469,994 UART: [kat] SHA2-512-ACC
472,366 UART: [kat] ECC-384
2,765,870 UART: [kat] HMAC-384Kdf
2,777,436 UART: [kat] LMS
3,967,719 UART: [kat] --
3,973,207 UART: [cold-reset] ++
3,975,453 UART: [fht] Storing FHT @ 0x50003400
3,986,086 UART: [idev] ++
3,986,657 UART: [idev] CDI.KEYID = 6
3,987,691 UART: [idev] SUBJECT.KEYID = 7
3,988,869 UART: [idev] UDS.KEYID = 0
3,989,933 ready_for_fw is high
3,990,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,198 UART: [idev] Erasing UDS.KEYID = 0
7,324,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,677 UART: [idev] --
7,352,728 UART: [ldev] ++
7,353,357 UART: [ldev] CDI.KEYID = 6
7,354,299 UART: [ldev] SUBJECT.KEYID = 5
7,355,513 UART: [ldev] AUTHORITY.KEYID = 7
7,356,745 UART: [ldev] FE.KEYID = 1
7,400,596 UART: [ldev] Erasing FE.KEYID = 1
10,733,342 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,766 UART: [ldev] --
13,113,446 UART: [fwproc] Waiting for Commands...
13,115,218 UART: [fwproc] Received command 0x46574c44
13,117,397 UART: [fwproc] Received Image of size 114124 bytes
17,172,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,566 >>> mbox cmd response: success
17,637,112 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,639,890 UART: [afmc] ++
17,640,486 UART: [afmc] CDI.KEYID = 6
17,641,378 UART: [afmc] SUBJECT.KEYID = 7
17,642,649 UART: [afmc] AUTHORITY.KEYID = 5
21,005,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,571 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,959 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,836 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,237 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,508 UART: [afmc] --
23,377,375 UART: [cold-reset] --
23,380,381 UART: [state] Locking Datavault
23,384,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,897 UART: [state] Locking ICCM
23,388,691 UART: [exit] Launching FMC @ 0x40000130
23,397,085 UART:
23,397,323 UART: Running Caliptra FMC ...
23,398,421 UART:
23,398,580 UART: [state] CFI Enabled
23,464,521 UART: [fht] FMC Alias Private Key: 7
25,802,505 UART: [art] Extend RT PCRs Done
25,803,722 UART: [art] Lock RT PCRs Done
25,805,460 UART: [art] Populate DV Done
25,810,709 UART: [fht] FMC Alias Private Key: 7
25,812,233 UART: [art] Derive CDI
25,813,003 UART: [art] Store in in slot 0x4
25,872,182 UART: [art] Derive Key Pair
25,873,179 UART: [art] Store priv key in slot 0x5
29,165,987 UART: [art] Derive Key Pair - Done
29,178,990 UART: [art] Signing Cert with AUTHO
29,180,313 UART: RITY.KEYID = 7
31,466,986 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,490 UART: [art] PUB.X = 5B44EEAA13EADA7C3407761C2FCAC035B58E26CA1111E454D9ECE874DA9A7690CC5C5AA3B0949BCC937981DC17EC4E94
31,475,752 UART: [art] PUB.Y = DAD3733E82F1B72C8F0FB021A4A472A1A3A2DB2E0523AEC6DDAD66AEC7BDFEA4E74A527B023F3FC0497B286E1932ABE2
31,482,993 UART: [art] SIG.R = 4643CA93B85DFA9C6FECB8D2D4AB94A96D8B8B00C5B7A198AF27817859FEEC0A81D824204A0DC7FD419FDCA028864147
31,490,403 UART: [art] SIG.S = 7147067F63A8AEAA29A03B2A5A90E51F1BBA8C56C35DB497F4ED61FB22A6904617687C16B81459FBFE5EA871C42AEC9B
32,795,281 UART: Caliptra RT
32,795,977 UART: [state] CFI Enabled
32,956,583 UART: [rt] RT listening for mailbox commands...
32,987,988 UART: [rt]cmd =0x50435251, len=36
34,163,008 >>> mbox cmd response data (1848 bytes)
34,171,909 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,202,391 UART: [rt]cmd =0x50435245, len=56
34,205,361 >>> mbox cmd response data (8 bytes)
34,206,254 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,236,581 UART: [rt]cmd =0x50435251, len=36
35,400,119 >>> mbox cmd response data (1848 bytes)
35,410,152 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,440,585 UART: [rt]cmd =0x50435245, len=56
35,443,760 >>> mbox cmd response data (8 bytes)
35,444,472 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,474,411 UART: [rt]cmd =0x50435251, len=36
36,637,416 >>> mbox cmd response data (1848 bytes)
36,646,352 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,676,417 UART: [rt]cmd =0x50435245, len=56
36,679,602 >>> mbox cmd response data (8 bytes)
36,680,164 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,710,282 UART: [rt]cmd =0x50435251, len=36
37,875,074 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,805,370 ready_for_fw is high
3,805,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,844,231 >>> mbox cmd response: success
17,844,886 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,548,576 UART:
23,548,956 UART: Running Caliptra FMC ...
23,550,103 UART:
23,550,262 UART: [state] CFI Enabled
23,615,850 UART: [fht] FMC Alias Private Key: 7
25,953,792 UART: [art] Extend RT PCRs Done
25,955,024 UART: [art] Lock RT PCRs Done
25,956,877 UART: [art] Populate DV Done
25,962,291 UART: [fht] FMC Alias Private Key: 7
25,964,015 UART: [art] Derive CDI
25,964,846 UART: [art] Store in in slot 0x4
26,024,581 UART: [art] Derive Key Pair
26,025,629 UART: [art] Store priv key in slot 0x5
29,318,619 UART: [art] Derive Key Pair - Done
29,331,615 UART: [art] Signing Cert with AUTHO
29,332,921 UART: RITY.KEYID = 7
31,620,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,112 UART: [art] PUB.X = 4857DD06012A376C6193F96FE6153E1DB1192C0C0ED321AD311CB1B69E46E849FF9249282875E732A87C3C3EE71BEE51
31,629,359 UART: [art] PUB.Y = 6576E041149A3D664CEC3F89AB649BA1BA7BAC0EF09F2086844529AF3A711C2CFA12D2D5398E7EA0A1CC98DA0FBE20F5
31,636,657 UART: [art] SIG.R = 576B2B677499EC95AED8D97DE04484C38EF10AB4B670EDD0B14B813B07633C4DCE62572079F770503ABD5C91E0319293
31,643,992 UART: [art] SIG.S = B7AB6322E6BD8959FF43FCE068486737965171DED865B0F1B2D0699EB4E95345BDC206E3C54D6EDBF9707F2F163AACA1
32,949,263 UART: Caliptra RT
32,949,974 UART: [state] CFI Enabled
33,112,326 UART: [rt] RT listening for mailbox commands...
33,143,853 UART: [rt]cmd =0x50435251, len=36
34,318,362 >>> mbox cmd response data (1848 bytes)
34,327,304 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,357,900 UART: [rt]cmd =0x50435245, len=56
34,361,034 >>> mbox cmd response data (8 bytes)
34,361,943 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,392,221 UART: [rt]cmd =0x50435251, len=36
35,555,893 >>> mbox cmd response data (1848 bytes)
35,565,861 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,596,290 UART: [rt]cmd =0x50435245, len=56
35,599,403 >>> mbox cmd response data (8 bytes)
35,600,137 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,630,129 UART: [rt]cmd =0x50435251, len=36
36,792,810 >>> mbox cmd response data (1848 bytes)
36,801,739 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,832,075 UART: [rt]cmd =0x50435245, len=56
36,835,270 >>> mbox cmd response data (8 bytes)
36,835,833 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,865,847 UART: [rt]cmd =0x50435251, len=36
38,030,270 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,389 UART:
192,758 UART: Running Caliptra ROM ...
193,911 UART:
603,551 UART: [state] CFI Enabled
615,948 UART: [state] LifecycleState = Unprovisioned
617,925 UART: [state] DebugLocked = No
620,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,607 UART: [kat] SHA2-256
794,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,869 UART: [kat] ++
805,312 UART: [kat] sha1
816,884 UART: [kat] SHA2-256
819,626 UART: [kat] SHA2-384
825,187 UART: [kat] SHA2-512-ACC
827,548 UART: [kat] ECC-384
3,111,349 UART: [kat] HMAC-384Kdf
3,123,353 UART: [kat] LMS
4,313,422 UART: [kat] --
4,318,866 UART: [cold-reset] ++
4,320,029 UART: [fht] Storing FHT @ 0x50003400
4,331,938 UART: [idev] ++
4,332,495 UART: [idev] CDI.KEYID = 6
4,333,448 UART: [idev] SUBJECT.KEYID = 7
4,334,683 UART: [idev] UDS.KEYID = 0
4,335,667 ready_for_fw is high
4,335,878 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,661 UART: [idev] Erasing UDS.KEYID = 0
7,621,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,457 UART: [idev] --
7,646,961 UART: [ldev] ++
7,647,522 UART: [ldev] CDI.KEYID = 6
7,648,479 UART: [ldev] SUBJECT.KEYID = 5
7,649,734 UART: [ldev] AUTHORITY.KEYID = 7
7,651,120 UART: [ldev] FE.KEYID = 1
7,664,851 UART: [ldev] Erasing FE.KEYID = 1
10,950,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,007 UART: [ldev] --
13,311,787 UART: [fwproc] Waiting for Commands...
13,313,718 UART: [fwproc] Received command 0x46574c44
13,315,895 UART: [fwproc] Received Image of size 114124 bytes
17,369,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,758 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,607 >>> mbox cmd response: success
17,835,137 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,839,419 UART: [afmc] ++
17,839,998 UART: [afmc] CDI.KEYID = 6
17,840,966 UART: [afmc] SUBJECT.KEYID = 7
17,842,174 UART: [afmc] AUTHORITY.KEYID = 5
21,160,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,144 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,968 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,398 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,041 UART: [afmc] --
23,524,550 UART: [cold-reset] --
23,529,977 UART: [state] Locking Datavault
23,535,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,344 UART: [state] Locking ICCM
23,538,836 UART: [exit] Launching FMC @ 0x40000130
23,547,226 UART:
23,547,462 UART: Running Caliptra FMC ...
23,548,558 UART:
23,548,719 UART: [state] CFI Enabled
23,556,872 UART: [fht] FMC Alias Private Key: 7
25,888,420 UART: [art] Extend RT PCRs Done
25,889,639 UART: [art] Lock RT PCRs Done
25,891,377 UART: [art] Populate DV Done
25,896,617 UART: [fht] FMC Alias Private Key: 7
25,898,275 UART: [art] Derive CDI
25,899,013 UART: [art] Store in in slot 0x4
25,941,512 UART: [art] Derive Key Pair
25,942,510 UART: [art] Store priv key in slot 0x5
29,184,648 UART: [art] Derive Key Pair - Done
29,197,972 UART: [art] Signing Cert with AUTHO
29,199,315 UART: RITY.KEYID = 7
31,478,544 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,062 UART: [art] PUB.X = 6E5D2D6A835A5AE90124DEFEC25972C5F551FA0B1CC1C18FE87716546CF68BC4337337474A8283339A9C394A5F6CC132
31,487,306 UART: [art] PUB.Y = EF353CCE9FC07B3A213507264424B2AE35D60D41137528E34F234B05A8A58A856F7AC624230DB5BFF4D9EE2734FF5B4A
31,494,583 UART: [art] SIG.R = 52CC45EE9BAD4C50FA72A6BEFA35ADB45BB4B206EA8ECF2F7EF962E6AC1687297ABB7F656F3A0891982A4F88DE4DE2CE
31,501,987 UART: [art] SIG.S = 139E3298B94B9ED292A46FFFA40C25A7A208D81DD6F412B804FB65F270A96AD65C3C34D232B9F72AFA95BDBF526DB19F
32,807,426 UART: Caliptra RT
32,808,130 UART: [state] CFI Enabled
32,926,207 UART: [rt] RT listening for mailbox commands...
32,957,657 UART: [rt]cmd =0x50435251, len=36
34,113,148 >>> mbox cmd response data (1848 bytes)
34,122,059 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,152,267 UART: [rt]cmd =0x50435245, len=56
34,155,591 >>> mbox cmd response data (8 bytes)
34,156,480 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,186,298 UART: [rt]cmd =0x50435251, len=36
35,341,852 >>> mbox cmd response data (1848 bytes)
35,351,820 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,382,123 UART: [rt]cmd =0x50435245, len=56
35,385,153 >>> mbox cmd response data (8 bytes)
35,385,858 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,415,775 UART: [rt]cmd =0x50435251, len=36
36,571,406 >>> mbox cmd response data (1848 bytes)
36,580,391 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,611,057 UART: [rt]cmd =0x50435245, len=56
36,613,849 >>> mbox cmd response data (8 bytes)
36,614,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,644,410 UART: [rt]cmd =0x50435251, len=36
37,799,586 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
4,128,126 ready_for_fw is high
4,128,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,305 >>> mbox cmd response: success
18,063,273 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,701,828 UART:
23,702,219 UART: Running Caliptra FMC ...
23,703,527 UART:
23,703,684 UART: [state] CFI Enabled
23,711,903 UART: [fht] FMC Alias Private Key: 7
26,043,201 UART: [art] Extend RT PCRs Done
26,044,437 UART: [art] Lock RT PCRs Done
26,045,835 UART: [art] Populate DV Done
26,051,468 UART: [fht] FMC Alias Private Key: 7
26,053,061 UART: [art] Derive CDI
26,053,800 UART: [art] Store in in slot 0x4
26,096,616 UART: [art] Derive Key Pair
26,097,657 UART: [art] Store priv key in slot 0x5
29,339,524 UART: [art] Derive Key Pair - Done
29,352,909 UART: [art] Signing Cert with AUTHO
29,354,242 UART: RITY.KEYID = 7
31,633,404 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,909 UART: [art] PUB.X = 7E5CE36372B802506BF9604B0C40731FC04AB81FD7B3BAF3166067379B8C27E76696CFF6B2C6A292D0969A91F518C313
31,642,103 UART: [art] PUB.Y = D3A4B41D5698F110DD3FC1C2CD1739DBFD9F694BA5F889C6A791B61FF4591428D4AB5D79ABFB733B51C20CFDF4912FCB
31,649,388 UART: [art] SIG.R = 16A5E4D0E3652FD4510FECAED21E007B9760F6EC590B9010914B4C4A1BD111337F5E96A891D5ABB7BA52EC7899AB2A41
31,656,781 UART: [art] SIG.S = 40938FD9201ED239C53CEFCB142A97979BF059C50EED5D38B7A2034CB814C966FE6F8DF0B849CC5D440614FFFD87008F
32,962,169 UART: Caliptra RT
32,962,881 UART: [state] CFI Enabled
33,081,352 UART: [rt] RT listening for mailbox commands...
33,112,919 UART: [rt]cmd =0x50435251, len=36
34,268,191 >>> mbox cmd response data (1848 bytes)
34,277,087 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,307,383 UART: [rt]cmd =0x50435245, len=56
34,310,811 >>> mbox cmd response data (8 bytes)
34,311,745 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,341,778 UART: [rt]cmd =0x50435251, len=36
35,496,964 >>> mbox cmd response data (1848 bytes)
35,507,097 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,537,368 UART: [rt]cmd =0x50435245, len=56
35,540,504 >>> mbox cmd response data (8 bytes)
35,541,163 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,571,313 UART: [rt]cmd =0x50435251, len=36
36,726,587 >>> mbox cmd response data (1848 bytes)
36,735,512 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,765,619 UART: [rt]cmd =0x50435245, len=56
36,768,369 >>> mbox cmd response data (8 bytes)
36,768,919 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,799,079 UART: [rt]cmd =0x50435251, len=36
37,954,648 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,202 UART:
192,557 UART: Running Caliptra ROM ...
193,666 UART:
193,811 UART: [state] CFI Enabled
262,896 UART: [state] LifecycleState = Unprovisioned
264,735 UART: [state] DebugLocked = No
266,048 UART: [state] WD Timer not started. Device not locked for debugging
270,652 UART: [kat] SHA2-256
449,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,364 UART: [kat] ++
461,814 UART: [kat] sha1
472,688 UART: [kat] SHA2-256
475,699 UART: [kat] SHA2-384
482,347 UART: [kat] SHA2-512-ACC
485,283 UART: [kat] ECC-384
2,945,933 UART: [kat] HMAC-384Kdf
2,970,745 UART: [kat] LMS
3,500,146 UART: [kat] --
3,504,921 UART: [cold-reset] ++
3,507,203 UART: [fht] FHT @ 0x50003400
3,518,318 UART: [idev] ++
3,518,886 UART: [idev] CDI.KEYID = 6
3,519,800 UART: [idev] SUBJECT.KEYID = 7
3,520,975 UART: [idev] UDS.KEYID = 0
3,521,901 ready_for_fw is high
3,522,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,047 UART: [idev] Erasing UDS.KEYID = 0
6,027,072 UART: [idev] Sha1 KeyId Algorithm
6,049,884 UART: [idev] --
6,052,609 UART: [ldev] ++
6,053,198 UART: [ldev] CDI.KEYID = 6
6,054,271 UART: [ldev] SUBJECT.KEYID = 5
6,055,380 UART: [ldev] AUTHORITY.KEYID = 7
6,056,557 UART: [ldev] FE.KEYID = 1
6,100,477 UART: [ldev] Erasing FE.KEYID = 1
8,603,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,777 UART: [ldev] --
10,413,910 UART: [fwproc] Wait for Commands...
10,415,624 UART: [fwproc] Recv command 0x46574c44
10,417,717 UART: [fwproc] Recv'd Img size: 114448 bytes
13,813,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,894 >>> mbox cmd response: success
14,276,436 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,279,987 UART: [afmc] ++
14,280,624 UART: [afmc] CDI.KEYID = 6
14,281,547 UART: [afmc] SUBJECT.KEYID = 7
14,282,655 UART: [afmc] AUTHORITY.KEYID = 5
16,807,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,432 UART: [afmc] --
18,607,737 UART: [cold-reset] --
18,611,191 UART: [state] Locking Datavault
18,616,556 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,252 UART: [state] Locking ICCM
18,619,647 UART: [exit] Launching FMC @ 0x40000130
18,628,043 UART:
18,628,279 UART: Running Caliptra FMC ...
18,629,376 UART:
18,629,551 UART: [state] CFI Enabled
18,692,491 UART: [fht] FMC Alias Private Key: 7
20,456,374 UART: [art] Extend RT PCRs Done
20,457,586 UART: [art] Lock RT PCRs Done
20,459,075 UART: [art] Populate DV Done
20,464,646 UART: [fht] FMC Alias Private Key: 7
20,466,288 UART: [art] Derive CDI
20,467,025 UART: [art] Store in in slot 0x4
20,525,123 UART: [art] Derive Key Pair
20,526,178 UART: [art] Store priv key in slot 0x5
22,989,335 UART: [art] Derive Key Pair - Done
23,002,217 UART: [art] Signing Cert with AUTHO
23,003,566 UART: RITY.KEYID = 7
24,715,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,578 UART: [art] PUB.X = 88A998442EB9095C9286D29ECA25009B2A2E57D0FA9F6CC6918B186E4563C57C90DE3B433B7E8182D4E123C6C61C454D
24,723,816 UART: [art] PUB.Y = D5DB3936A9B0DD32541BD7D949953DDA54062A226345CAA38B7192C6B598CBE10D634327575B083505CF40592F1C90E7
24,731,038 UART: [art] SIG.R = BE940CBBF2E230F032FE7FFD09CA4C21A50B52CBAD61C2EC3E57110D6BB26AB1131A6DA18028B883792D122E16FA8CAE
24,738,488 UART: [art] SIG.S = 7FE21BFD5AA7739CC4891B422B324B768A33A664E45068A8E490D199BAF29F66B98436C192852A1F66A891EA271D3438
25,717,857 UART: Caliptra RT
25,718,561 UART: [state] CFI Enabled
25,883,729 UART: [rt] RT listening for mailbox commands...
25,915,372 UART: [rt]cmd =0x50435251, len=36
26,843,358 >>> mbox cmd response data (1848 bytes)
26,852,283 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,882,452 UART: [rt]cmd =0x50435245, len=56
26,885,709 >>> mbox cmd response data (8 bytes)
26,886,504 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,916,747 UART: [rt]cmd =0x50435251, len=36
27,824,434 >>> mbox cmd response data (1848 bytes)
27,834,398 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,864,748 UART: [rt]cmd =0x50435245, len=56
27,867,997 >>> mbox cmd response data (8 bytes)
27,868,703 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,898,566 UART: [rt]cmd =0x50435251, len=36
28,826,783 >>> mbox cmd response data (1848 bytes)
28,835,684 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,865,947 UART: [rt]cmd =0x50435245, len=56
28,868,998 >>> mbox cmd response data (8 bytes)
28,869,494 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,899,584 UART: [rt]cmd =0x50435251, len=36
29,808,017 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,374,174 ready_for_fw is high
3,374,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,036,554 >>> mbox cmd response: success
14,037,218 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,311,097 UART:
18,311,502 UART: Running Caliptra FMC ...
18,312,627 UART:
18,312,779 UART: [state] CFI Enabled
18,382,094 UART: [fht] FMC Alias Private Key: 7
20,146,389 UART: [art] Extend RT PCRs Done
20,147,617 UART: [art] Lock RT PCRs Done
20,149,246 UART: [art] Populate DV Done
20,154,772 UART: [fht] FMC Alias Private Key: 7
20,156,421 UART: [art] Derive CDI
20,157,233 UART: [art] Store in in slot 0x4
20,215,122 UART: [art] Derive Key Pair
20,216,170 UART: [art] Store priv key in slot 0x5
22,678,385 UART: [art] Derive Key Pair - Done
22,691,337 UART: [art] Signing Cert with AUTHO
22,692,646 UART: RITY.KEYID = 7
24,404,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,406,126 UART: [art] PUB.X = 378A07874A41042A28C4F0083909E68E2831814CEFE08EDF69BBEF164B3041947436EFFDBDA04F957B0161D002F1AC09
24,413,417 UART: [art] PUB.Y = 393126ECFC37733FBF03C5E6AF731240C4F6BC701F856694FFC9B23DB31F15B599F9D3DF85325809A338CCD99E66D23C
24,420,653 UART: [art] SIG.R = 285B69BA37C62EEE6207FAA50B13D4EB1EBE8C216DD23A46D768420546F9A1EF2970BC6331FEB73461F8B118DD43DC33
24,428,053 UART: [art] SIG.S = 6FBCB0E2CD285B0857221C5E08C2BC2D5241F2E0D038DCF59E04030A2C8AC842FC4056814E7869C7D3A0EFA2B7754F4C
25,406,388 UART: Caliptra RT
25,407,085 UART: [state] CFI Enabled
25,572,706 UART: [rt] RT listening for mailbox commands...
25,604,301 UART: [rt]cmd =0x50435251, len=36
26,532,425 >>> mbox cmd response data (1848 bytes)
26,541,312 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,571,650 UART: [rt]cmd =0x50435245, len=56
26,574,860 >>> mbox cmd response data (8 bytes)
26,575,625 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,605,604 UART: [rt]cmd =0x50435251, len=36
27,513,341 >>> mbox cmd response data (1848 bytes)
27,523,547 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,553,828 UART: [rt]cmd =0x50435245, len=56
27,556,706 >>> mbox cmd response data (8 bytes)
27,557,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,587,372 UART: [rt]cmd =0x50435251, len=36
28,515,945 >>> mbox cmd response data (1848 bytes)
28,524,863 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,554,929 UART: [rt]cmd =0x50435245, len=56
28,558,007 >>> mbox cmd response data (8 bytes)
28,558,568 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,588,571 UART: [rt]cmd =0x50435251, len=36
29,497,633 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,512 UART:
192,892 UART: Running Caliptra ROM ...
194,182 UART:
603,495 UART: [state] CFI Enabled
619,375 UART: [state] LifecycleState = Unprovisioned
621,245 UART: [state] DebugLocked = No
622,707 UART: [state] WD Timer not started. Device not locked for debugging
626,376 UART: [kat] SHA2-256
805,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,113 UART: [kat] ++
817,641 UART: [kat] sha1
829,538 UART: [kat] SHA2-256
832,508 UART: [kat] SHA2-384
837,570 UART: [kat] SHA2-512-ACC
840,498 UART: [kat] ECC-384
3,282,280 UART: [kat] HMAC-384Kdf
3,293,943 UART: [kat] LMS
3,823,401 UART: [kat] --
3,830,161 UART: [cold-reset] ++
3,832,508 UART: [fht] FHT @ 0x50003400
3,843,971 UART: [idev] ++
3,844,528 UART: [idev] CDI.KEYID = 6
3,845,547 UART: [idev] SUBJECT.KEYID = 7
3,846,642 UART: [idev] UDS.KEYID = 0
3,847,679 ready_for_fw is high
3,847,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,596 UART: [idev] Erasing UDS.KEYID = 0
6,316,734 UART: [idev] Sha1 KeyId Algorithm
6,339,137 UART: [idev] --
6,343,157 UART: [ldev] ++
6,343,729 UART: [ldev] CDI.KEYID = 6
6,344,650 UART: [ldev] SUBJECT.KEYID = 5
6,345,803 UART: [ldev] AUTHORITY.KEYID = 7
6,347,074 UART: [ldev] FE.KEYID = 1
6,358,475 UART: [ldev] Erasing FE.KEYID = 1
8,832,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,863 UART: [ldev] --
10,625,470 UART: [fwproc] Wait for Commands...
10,627,514 UART: [fwproc] Recv command 0x46574c44
10,629,550 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,548 >>> mbox cmd response: success
14,501,107 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,505,437 UART: [afmc] ++
14,506,030 UART: [afmc] CDI.KEYID = 6
14,506,911 UART: [afmc] SUBJECT.KEYID = 7
14,508,117 UART: [afmc] AUTHORITY.KEYID = 5
17,003,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,631 UART: [afmc] --
18,803,134 UART: [cold-reset] --
18,805,582 UART: [state] Locking Datavault
18,811,573 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,225 UART: [state] Locking ICCM
18,815,889 UART: [exit] Launching FMC @ 0x40000130
18,824,280 UART:
18,824,552 UART: Running Caliptra FMC ...
18,825,576 UART:
18,825,714 UART: [state] CFI Enabled
18,833,863 UART: [fht] FMC Alias Private Key: 7
20,590,560 UART: [art] Extend RT PCRs Done
20,591,777 UART: [art] Lock RT PCRs Done
20,593,692 UART: [art] Populate DV Done
20,599,207 UART: [fht] FMC Alias Private Key: 7
20,600,738 UART: [art] Derive CDI
20,601,488 UART: [art] Store in in slot 0x4
20,643,908 UART: [art] Derive Key Pair
20,644,904 UART: [art] Store priv key in slot 0x5
23,071,691 UART: [art] Derive Key Pair - Done
23,084,872 UART: [art] Signing Cert with AUTHO
23,086,175 UART: RITY.KEYID = 7
24,791,347 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,847 UART: [art] PUB.X = 5C7634D85430629E48B66A102BB014EC9778283FE496EF4CD13CE3ABF950EAE76D1DA880C3C8A2D48ADA47A3FC556572
24,800,084 UART: [art] PUB.Y = 8D7ADC50281928D00715F3078C23E4A510E088E0C02B2BE1BB8079A0856AB2B386C434D3D3CC00E7FA4226DBDDC896E9
24,807,370 UART: [art] SIG.R = C8E70040F776C77D69A4D32D0083B4427F446B47C81DA6A0118F8197B5A4BAB8F57AF2A2FDB5742EF7BEE45624FB9ACA
24,814,696 UART: [art] SIG.S = 66FF64CFAB2A839A626494960A7899E2E55F463DCC4C758FC7E30329F4D53510F7E18414CE166B8723F2507A585E3C21
25,793,634 UART: Caliptra RT
25,794,352 UART: [state] CFI Enabled
25,910,389 UART: [rt] RT listening for mailbox commands...
25,941,948 UART: [rt]cmd =0x50435251, len=36
26,850,086 >>> mbox cmd response data (1848 bytes)
26,858,987 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,889,201 UART: [rt]cmd =0x50435245, len=56
26,892,274 >>> mbox cmd response data (8 bytes)
26,893,210 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,923,261 UART: [rt]cmd =0x50435251, len=36
27,830,796 >>> mbox cmd response data (1848 bytes)
27,840,762 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,871,312 UART: [rt]cmd =0x50435245, len=56
27,874,541 >>> mbox cmd response data (8 bytes)
27,875,265 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,905,308 UART: [rt]cmd =0x50435251, len=36
28,812,604 >>> mbox cmd response data (1848 bytes)
28,821,717 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,852,008 UART: [rt]cmd =0x50435245, len=56
28,855,052 >>> mbox cmd response data (8 bytes)
28,855,620 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,885,865 UART: [rt]cmd =0x50435251, len=36
29,793,626 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,697,806 ready_for_fw is high
3,698,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,487 >>> mbox cmd response: success
14,270,114 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,517,946 UART:
18,518,331 UART: Running Caliptra FMC ...
18,519,416 UART:
18,519,563 UART: [state] CFI Enabled
18,527,611 UART: [fht] FMC Alias Private Key: 7
20,284,329 UART: [art] Extend RT PCRs Done
20,285,557 UART: [art] Lock RT PCRs Done
20,287,203 UART: [art] Populate DV Done
20,292,438 UART: [fht] FMC Alias Private Key: 7
20,293,972 UART: [art] Derive CDI
20,294,702 UART: [art] Store in in slot 0x4
20,337,580 UART: [art] Derive Key Pair
20,338,590 UART: [art] Store priv key in slot 0x5
22,765,297 UART: [art] Derive Key Pair - Done
22,778,215 UART: [art] Signing Cert with AUTHO
22,779,545 UART: RITY.KEYID = 7
24,485,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,131 UART: [art] PUB.X = 0A3A0C752A64C799365D80A4152B022FFD0A8BF2FE3B3E1D63BA35CA0AEFF20BC7047E77780B0EF595A93CB2C14B9B03
24,494,385 UART: [art] PUB.Y = 403B83BEC0D1CAB9794CC987C13B77BD1E42C08C4746E9FC3834062CCBA58E4E00F8474543DDCDCDACDF1A49FED49AEE
24,501,695 UART: [art] SIG.R = A74ACD568BD723E3A2EF45059B6B77CC3EAEF2EB7BDB65585C5E1D03559DBFD5356DC40C2A8282C6725085316E7FE0A5
24,509,083 UART: [art] SIG.S = A8065B14CAAFA1B77F71152ABE56B6FBE2D8D70B2DD2DC30509527E5DA948F45E457520731D04FBFC4B812CE012FFC1F
25,487,836 UART: Caliptra RT
25,488,537 UART: [state] CFI Enabled
25,606,032 UART: [rt] RT listening for mailbox commands...
25,637,954 UART: [rt]cmd =0x50435251, len=36
26,545,468 >>> mbox cmd response data (1848 bytes)
26,554,344 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,584,729 UART: [rt]cmd =0x50435245, len=56
26,588,077 >>> mbox cmd response data (8 bytes)
26,588,819 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,618,926 UART: [rt]cmd =0x50435251, len=36
27,526,685 >>> mbox cmd response data (1848 bytes)
27,536,853 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,567,264 UART: [rt]cmd =0x50435245, len=56
27,570,542 >>> mbox cmd response data (8 bytes)
27,571,248 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,601,229 UART: [rt]cmd =0x50435251, len=36
28,508,584 >>> mbox cmd response data (1848 bytes)
28,517,510 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,547,802 UART: [rt]cmd =0x50435245, len=56
28,550,975 >>> mbox cmd response data (8 bytes)
28,551,586 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,581,683 UART: [rt]cmd =0x50435251, len=36
29,489,143 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,057 UART:
192,427 UART: Running Caliptra ROM ...
193,618 UART:
193,775 UART: [state] CFI Enabled
265,168 UART: [state] LifecycleState = Unprovisioned
267,587 UART: [state] DebugLocked = No
268,766 UART: [state] WD Timer not started. Device not locked for debugging
271,946 UART: [kat] SHA2-256
461,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,591 UART: [kat] ++
473,035 UART: [kat] sha1
484,341 UART: [kat] SHA2-256
487,342 UART: [kat] SHA2-384
493,819 UART: [kat] SHA2-512-ACC
496,417 UART: [kat] ECC-384
2,946,596 UART: [kat] HMAC-384Kdf
2,971,610 UART: [kat] LMS
3,503,348 UART: [kat] --
3,507,199 UART: [cold-reset] ++
3,509,472 UART: [fht] FHT @ 0x50003400
3,520,872 UART: [idev] ++
3,521,573 UART: [idev] CDI.KEYID = 6
3,522,599 UART: [idev] SUBJECT.KEYID = 7
3,523,696 UART: [idev] UDS.KEYID = 0
3,524,665 ready_for_fw is high
3,524,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,895 UART: [idev] Erasing UDS.KEYID = 0
6,030,136 UART: [idev] Sha1 KeyId Algorithm
6,052,032 UART: [idev] --
6,058,629 UART: [ldev] ++
6,059,304 UART: [ldev] CDI.KEYID = 6
6,060,220 UART: [ldev] SUBJECT.KEYID = 5
6,061,381 UART: [ldev] AUTHORITY.KEYID = 7
6,062,610 UART: [ldev] FE.KEYID = 1
6,100,114 UART: [ldev] Erasing FE.KEYID = 1
8,608,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,518 UART: [ldev] --
10,412,243 UART: [fwproc] Wait for Commands...
10,415,259 UART: [fwproc] Recv command 0x46574c44
10,417,558 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,286 >>> mbox cmd response: success
14,601,865 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,605,864 UART: [afmc] ++
14,606,593 UART: [afmc] CDI.KEYID = 6
14,607,788 UART: [afmc] SUBJECT.KEYID = 7
14,609,281 UART: [afmc] AUTHORITY.KEYID = 5
17,150,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,453 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,561 UART: [afmc] --
18,949,049 UART: [cold-reset] --
18,952,484 UART: [state] Locking Datavault
18,956,762 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,901 UART: [state] Locking ICCM
18,960,512 UART: [exit] Launching FMC @ 0x40000130
18,969,185 UART:
18,969,425 UART: Running Caliptra FMC ...
18,970,521 UART:
18,970,674 UART: [state] CFI Enabled
19,032,220 UART: [fht] FMC Alias Private Key: 7
20,796,015 UART: [art] Extend RT PCRs Done
20,797,233 UART: [art] Lock RT PCRs Done
20,799,015 UART: [art] Populate DV Done
20,804,486 UART: [fht] FMC Alias Private Key: 7
20,806,131 UART: [art] Derive CDI
20,806,944 UART: [art] Store in in slot 0x4
20,864,390 UART: [art] Derive Key Pair
20,865,426 UART: [art] Store priv key in slot 0x5
23,327,822 UART: [art] Derive Key Pair - Done
23,341,309 UART: [art] Signing Cert with AUTHO
23,342,605 UART: RITY.KEYID = 7
25,054,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,267 UART: [art] PUB.X = 34F4068BF290A751AA8542D2B5D5B844E2EFFBEAB0383580EADF2FDFD25D72F33BEFB8EC1ACDFBF4935141C5AFBEC00C
25,063,402 UART: [art] PUB.Y = ADAC159F1945D0FFCACE5919D6C2BE5A366BB94333B1F301707DA6C9DF6B533C21201427213D4256CC4350AB5528AED5
25,070,685 UART: [art] SIG.R = 24E35B750B9E111F7CA8D9442D13499281F21D87FD7D5A827CBBC452BDDE1BE2EFD856438E395C0E9436C821D360D2DC
25,078,067 UART: [art] SIG.S = 9399C9068AA4D749FD96EBAB2818466470191DDAEC3973A636142169CBFA9BE6EB1897C96F2F1CC76287E923C0F32B2E
26,057,071 UART: Caliptra RT
26,057,786 UART: [state] CFI Enabled
26,221,707 UART: [rt] RT listening for mailbox commands...
26,253,448 UART: [rt]cmd =0x50435251, len=36
27,180,934 >>> mbox cmd response data (1848 bytes)
27,189,828 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,220,114 UART: [rt]cmd =0x50435245, len=56
27,223,112 >>> mbox cmd response data (8 bytes)
27,223,744 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,253,612 UART: [rt]cmd =0x50435251, len=36
28,161,572 >>> mbox cmd response data (1848 bytes)
28,171,525 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,201,911 UART: [rt]cmd =0x50435245, len=56
28,204,806 >>> mbox cmd response data (8 bytes)
28,205,538 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,235,641 UART: [rt]cmd =0x50435251, len=36
29,163,638 >>> mbox cmd response data (1848 bytes)
29,172,557 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,202,903 UART: [rt]cmd =0x50435245, len=56
29,206,089 >>> mbox cmd response data (8 bytes)
29,206,656 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,236,560 UART: [rt]cmd =0x50435251, len=36
30,144,420 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,416,033 ready_for_fw is high
3,416,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,711,680 >>> mbox cmd response: success
14,712,452 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,023,257 UART:
19,023,635 UART: Running Caliptra FMC ...
19,024,776 UART:
19,024,939 UART: [state] CFI Enabled
19,093,650 UART: [fht] FMC Alias Private Key: 7
20,858,092 UART: [art] Extend RT PCRs Done
20,859,313 UART: [art] Lock RT PCRs Done
20,861,048 UART: [art] Populate DV Done
20,866,575 UART: [fht] FMC Alias Private Key: 7
20,868,067 UART: [art] Derive CDI
20,868,835 UART: [art] Store in in slot 0x4
20,926,284 UART: [art] Derive Key Pair
20,927,319 UART: [art] Store priv key in slot 0x5
23,390,747 UART: [art] Derive Key Pair - Done
23,403,478 UART: [art] Signing Cert with AUTHO
23,404,782 UART: RITY.KEYID = 7
25,116,271 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,779 UART: [art] PUB.X = 1C056530D6E4466253448059142A77DF8087D8AF2B77ABFFC4E950BFBF48B4B5FDEECBF1985D79AB5A21DB0D20481209
25,125,025 UART: [art] PUB.Y = CCF0CAF6314440C3C6CC7491D7C6C71433C03F40EB3D4B490A4B33738D2C8B0633D9D99F990238BFB4B8C38A040A365A
25,132,275 UART: [art] SIG.R = 2599EB8EA3994A6E3E8AED91D8BA75517BD2990BB77A1C88961C9CBF35508AC5BFB5DB1B74B164BA7322FBBC4CE59CAB
25,139,717 UART: [art] SIG.S = 1FE049B20B688019F6400EEA966911C0F30F91BB17590D1146BBED187671E016857BE097980BF3F899A127CC4003AC3F
26,118,568 UART: Caliptra RT
26,119,257 UART: [state] CFI Enabled
26,285,207 UART: [rt] RT listening for mailbox commands...
26,316,841 UART: [rt]cmd =0x50435251, len=36
27,244,483 >>> mbox cmd response data (1848 bytes)
27,253,388 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,283,712 UART: [rt]cmd =0x50435245, len=56
27,286,676 >>> mbox cmd response data (8 bytes)
27,287,482 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,317,474 UART: [rt]cmd =0x50435251, len=36
28,225,171 >>> mbox cmd response data (1848 bytes)
28,235,125 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,265,397 UART: [rt]cmd =0x50435245, len=56
28,268,249 >>> mbox cmd response data (8 bytes)
28,268,886 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,298,820 UART: [rt]cmd =0x50435251, len=36
29,206,705 >>> mbox cmd response data (1848 bytes)
29,215,623 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,246,074 UART: [rt]cmd =0x50435245, len=56
29,249,346 >>> mbox cmd response data (8 bytes)
29,249,934 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,280,027 UART: [rt]cmd =0x50435251, len=36
30,188,048 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,644 UART:
193,012 UART: Running Caliptra ROM ...
194,197 UART:
603,990 UART: [state] CFI Enabled
620,413 UART: [state] LifecycleState = Unprovisioned
622,779 UART: [state] DebugLocked = No
624,870 UART: [state] WD Timer not started. Device not locked for debugging
629,950 UART: [kat] SHA2-256
819,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,619 UART: [kat] ++
831,164 UART: [kat] sha1
842,811 UART: [kat] SHA2-256
845,806 UART: [kat] SHA2-384
851,568 UART: [kat] SHA2-512-ACC
854,219 UART: [kat] ECC-384
3,296,655 UART: [kat] HMAC-384Kdf
3,310,061 UART: [kat] LMS
3,841,887 UART: [kat] --
3,848,030 UART: [cold-reset] ++
3,849,042 UART: [fht] FHT @ 0x50003400
3,859,934 UART: [idev] ++
3,860,552 UART: [idev] CDI.KEYID = 6
3,861,499 UART: [idev] SUBJECT.KEYID = 7
3,862,733 UART: [idev] UDS.KEYID = 0
3,863,626 ready_for_fw is high
3,863,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,606 UART: [idev] Erasing UDS.KEYID = 0
6,341,198 UART: [idev] Sha1 KeyId Algorithm
6,363,713 UART: [idev] --
6,368,593 UART: [ldev] ++
6,369,273 UART: [ldev] CDI.KEYID = 6
6,370,176 UART: [ldev] SUBJECT.KEYID = 5
6,371,394 UART: [ldev] AUTHORITY.KEYID = 7
6,372,566 UART: [ldev] FE.KEYID = 1
6,383,286 UART: [ldev] Erasing FE.KEYID = 1
8,860,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,162 UART: [ldev] --
10,654,581 UART: [fwproc] Wait for Commands...
10,657,477 UART: [fwproc] Recv command 0x46574c44
10,659,720 UART: [fwproc] Recv'd Img size: 114448 bytes
14,107,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,854,882 >>> mbox cmd response: success
14,855,417 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,858,457 UART: [afmc] ++
14,859,156 UART: [afmc] CDI.KEYID = 6
14,860,392 UART: [afmc] SUBJECT.KEYID = 7
14,861,816 UART: [afmc] AUTHORITY.KEYID = 5
17,366,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,089,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,091,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,106,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,122,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,136,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,160,463 UART: [afmc] --
19,164,223 UART: [cold-reset] --
19,169,701 UART: [state] Locking Datavault
19,177,047 UART: [state] Locking PCR0, PCR1 and PCR31
19,179,190 UART: [state] Locking ICCM
19,182,006 UART: [exit] Launching FMC @ 0x40000130
19,190,679 UART:
19,190,906 UART: Running Caliptra FMC ...
19,191,996 UART:
19,192,144 UART: [state] CFI Enabled
19,200,180 UART: [fht] FMC Alias Private Key: 7
20,957,032 UART: [art] Extend RT PCRs Done
20,958,253 UART: [art] Lock RT PCRs Done
20,959,749 UART: [art] Populate DV Done
20,965,207 UART: [fht] FMC Alias Private Key: 7
20,966,739 UART: [art] Derive CDI
20,967,542 UART: [art] Store in in slot 0x4
21,009,913 UART: [art] Derive Key Pair
21,010,947 UART: [art] Store priv key in slot 0x5
23,437,545 UART: [art] Derive Key Pair - Done
23,450,535 UART: [art] Signing Cert with AUTHO
23,451,841 UART: RITY.KEYID = 7
25,157,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,729 UART: [art] PUB.X = 38EA16C90E3AB6AEB16B7C5F732D778C31FCD85ECC216FF243A79013D56CDFC7E6D8B3FD5281F5A7594341F6A07E00C0
25,166,015 UART: [art] PUB.Y = D28B2F20DDBB814E730DCF6DEA91D069BD4C39D8EAF9D48255EF04D56113A86B0E84EADB51CEB8FF397806ECA8755AAD
25,173,338 UART: [art] SIG.R = 2E0B8C1FF0B1A292390232A6B559248E80A529EA8A0594FE44E421CF4D4DE3FA17F9527CCAEE1087096AB7EE4F098B00
25,180,725 UART: [art] SIG.S = 525DC66DBF66382964F7E201DCF16B23EDF50498BD94789E1951C5A980DF48E82B2A6C02E21D9AD1E92A69FFD97AE746
26,159,125 UART: Caliptra RT
26,159,808 UART: [state] CFI Enabled
26,277,251 UART: [rt] RT listening for mailbox commands...
26,308,870 UART: [rt]cmd =0x50435251, len=36
27,216,841 >>> mbox cmd response data (1848 bytes)
27,225,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,255,892 UART: [rt]cmd =0x50435245, len=56
27,258,944 >>> mbox cmd response data (8 bytes)
27,259,824 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,289,671 UART: [rt]cmd =0x50435251, len=36
28,197,414 >>> mbox cmd response data (1848 bytes)
28,207,362 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,237,715 UART: [rt]cmd =0x50435245, len=56
28,240,906 >>> mbox cmd response data (8 bytes)
28,241,609 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,271,575 UART: [rt]cmd =0x50435251, len=36
29,179,116 >>> mbox cmd response data (1848 bytes)
29,188,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,218,586 UART: [rt]cmd =0x50435245, len=56
29,221,442 >>> mbox cmd response data (8 bytes)
29,222,011 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,252,027 UART: [rt]cmd =0x50435251, len=36
30,159,728 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,755,665 ready_for_fw is high
3,756,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,375 >>> mbox cmd response: success
14,952,079 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,202,565 UART:
19,202,958 UART: Running Caliptra FMC ...
19,204,095 UART:
19,204,250 UART: [state] CFI Enabled
19,212,306 UART: [fht] FMC Alias Private Key: 7
20,968,714 UART: [art] Extend RT PCRs Done
20,969,947 UART: [art] Lock RT PCRs Done
20,971,473 UART: [art] Populate DV Done
20,977,093 UART: [fht] FMC Alias Private Key: 7
20,978,787 UART: [art] Derive CDI
20,979,598 UART: [art] Store in in slot 0x4
21,022,479 UART: [art] Derive Key Pair
21,023,525 UART: [art] Store priv key in slot 0x5
23,450,347 UART: [art] Derive Key Pair - Done
23,463,233 UART: [art] Signing Cert with AUTHO
23,464,537 UART: RITY.KEYID = 7
25,170,218 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,734 UART: [art] PUB.X = B81669D16774CE7A66E098A3AB1CEFC3D58D015689A2667D105002780FF2B0F2C02C4C25230481F9505D37E4A8EF0C8E
25,178,976 UART: [art] PUB.Y = 001F2E48ADB0D9A547F39F9E4832CB813818E03EAC770F7AC4EFB2E37D41DD02040C02FEB91928D8B5AC8B855904793D
25,186,223 UART: [art] SIG.R = 82BE030A80B6C55F1EE4E5041545C02B7D3E7B33E5D123FAF1E78C878AEEFD7DCAF46EFC126E657B10917D52DF35F50B
25,193,659 UART: [art] SIG.S = 32C8084C5620F95E584D172063FBE75C240D93ACAB1157DFC01DBC7F829A17B40CE46E627E1A522740CFA110C2FC8AFD
26,172,568 UART: Caliptra RT
26,173,276 UART: [state] CFI Enabled
26,290,961 UART: [rt] RT listening for mailbox commands...
26,322,528 UART: [rt]cmd =0x50435251, len=36
27,229,947 >>> mbox cmd response data (1848 bytes)
27,238,976 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,269,234 UART: [rt]cmd =0x50435245, len=56
27,272,526 >>> mbox cmd response data (8 bytes)
27,273,402 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,303,544 UART: [rt]cmd =0x50435251, len=36
28,211,042 >>> mbox cmd response data (1848 bytes)
28,220,988 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,250,968 UART: [rt]cmd =0x50435245, len=56
28,253,961 >>> mbox cmd response data (8 bytes)
28,254,687 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,284,656 UART: [rt]cmd =0x50435251, len=36
29,192,532 >>> mbox cmd response data (1848 bytes)
29,201,423 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,231,740 UART: [rt]cmd =0x50435245, len=56
29,234,910 >>> mbox cmd response data (8 bytes)
29,235,504 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,265,596 UART: [rt]cmd =0x50435251, len=36
30,172,965 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,551 UART: [kat] SHA2-256
882,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,597 UART: [kat] ++
886,749 UART: [kat] sha1
891,155 UART: [kat] SHA2-256
893,093 UART: [kat] SHA2-384
895,776 UART: [kat] SHA2-512-ACC
897,677 UART: [kat] ECC-384
903,078 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,631 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,772 UART: [idev] Erasing UDS.KEYID = 0
1,505,322 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,824 UART: [idev] --
1,514,875 UART: [ldev] ++
1,515,043 UART: [ldev] CDI.KEYID = 6
1,515,406 UART: [ldev] SUBJECT.KEYID = 5
1,515,832 UART: [ldev] AUTHORITY.KEYID = 7
1,516,295 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,546,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,570 UART: [ldev] --
1,586,085 UART: [fwproc] Waiting for Commands...
1,586,844 UART: [fwproc] Received command 0x46574c44
1,587,635 UART: [fwproc] Received Image of size 114448 bytes
2,887,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,062 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,391 >>> mbox cmd response: success
3,080,391 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,081,597 UART: [afmc] ++
3,081,765 UART: [afmc] CDI.KEYID = 6
3,082,127 UART: [afmc] SUBJECT.KEYID = 7
3,082,552 UART: [afmc] AUTHORITY.KEYID = 5
3,117,033 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,094 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,784 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,775 UART: [afmc] --
3,160,729 UART: [cold-reset] --
3,161,753 UART: [state] Locking Datavault
3,162,890 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,494 UART: [state] Locking ICCM
3,164,132 UART: [exit] Launching FMC @ 0x40000130
3,169,461 UART:
3,169,477 UART: Running Caliptra FMC ...
3,169,885 UART:
3,169,939 UART: [state] CFI Enabled
3,180,654 UART: [fht] FMC Alias Private Key: 7
3,289,341 UART: [art] Extend RT PCRs Done
3,289,769 UART: [art] Lock RT PCRs Done
3,291,325 UART: [art] Populate DV Done
3,299,588 UART: [fht] FMC Alias Private Key: 7
3,300,736 UART: [art] Derive CDI
3,301,016 UART: [art] Store in in slot 0x4
3,386,235 UART: [art] Derive Key Pair
3,386,595 UART: [art] Store priv key in slot 0x5
3,399,927 UART: [art] Derive Key Pair - Done
3,414,927 UART: [art] Signing Cert with AUTHO
3,415,407 UART: RITY.KEYID = 7
3,430,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,448 UART: [art] PUB.X = 74330A2D46285FDFB5F31900BBDA96AD8EB7185E64ED1BD35A2C42CD319A99EEF088221BB6BFF15D92759E1DCC154BCC
3,438,213 UART: [art] PUB.Y = 9703306A2D79052B0996FF4279F20B76B99D20D8FDBC3CFB2813C6B99024E45AAFC065F8EB2A8EAAA3A4C07642EEB86B
3,445,165 UART: [art] SIG.R = 53E08FB205297D6D6C96C56063DE39271D715CBFA306984FBA92C5F855AF18348CF8C7C4E870094CF853B5EF899CC893
3,451,930 UART: [art] SIG.S = 309A430A40FB759EE79C0B08A534C8846A0B113BAD01E405E5FF5388B937F9DEF2F870EB935659B15441D99990EE04EF
3,475,878 UART: Caliptra RT
3,476,131 UART: [state] CFI Enabled
3,584,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,825 UART: [rt]cmd =0x50435251, len=36
3,782,125 >>> mbox cmd response data (1848 bytes)
3,782,126 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,759 UART: [rt]cmd =0x50435245, len=56
3,815,306 >>> mbox cmd response data (8 bytes)
3,815,307 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,928 UART: [rt]cmd =0x50435251, len=36
4,012,278 >>> mbox cmd response data (1848 bytes)
4,012,279 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,114 UART: [rt]cmd =0x50435245, len=56
4,045,571 >>> mbox cmd response data (8 bytes)
4,045,572 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,869 UART: [rt]cmd =0x50435251, len=36
4,242,371 >>> mbox cmd response data (1848 bytes)
4,242,372 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,791 UART: [rt]cmd =0x50435245, len=56
4,275,318 >>> mbox cmd response data (8 bytes)
4,275,319 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,304,994 UART: [rt]cmd =0x50435251, len=36
4,472,542 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,731 ready_for_fw is high
1,362,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,071 >>> mbox cmd response: success
2,928,071 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,990,471 UART:
2,990,487 UART: Running Caliptra FMC ...
2,990,895 UART:
2,990,949 UART: [state] CFI Enabled
3,001,546 UART: [fht] FMC Alias Private Key: 7
3,109,431 UART: [art] Extend RT PCRs Done
3,109,859 UART: [art] Lock RT PCRs Done
3,111,207 UART: [art] Populate DV Done
3,119,370 UART: [fht] FMC Alias Private Key: 7
3,120,334 UART: [art] Derive CDI
3,120,614 UART: [art] Store in in slot 0x4
3,206,215 UART: [art] Derive Key Pair
3,206,575 UART: [art] Store priv key in slot 0x5
3,219,721 UART: [art] Derive Key Pair - Done
3,234,350 UART: [art] Signing Cert with AUTHO
3,234,830 UART: RITY.KEYID = 7
3,250,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,971 UART: [art] PUB.X = BC71AF3ED40901B01CEE96C5F2B67B814DC27EDA298E9C1465BFDC961FCB403D84E95BF089B3794CEDB9B8B306E29A28
3,257,752 UART: [art] PUB.Y = 195D2043D561B6BF5354CDE392D270E9FB9CC04F0537D494DE8D30100CC30EAA4CAC86C917C3CC9FDFB3A1540209917D
3,264,699 UART: [art] SIG.R = 9815B5452021583090E8B67F695D38A7D27BB8591855A63563432213A705A29A67F3391627C4DDF3DDB6C1603F364536
3,271,450 UART: [art] SIG.S = 9AA6D68886DED4194E1076605D703477BC4A81873B532A8169FF58379ABD0F241A220C7FDDA0DE31FFE7710D9FC0FA33
3,295,390 UART: Caliptra RT
3,295,643 UART: [state] CFI Enabled
3,403,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,729 UART: [rt]cmd =0x50435251, len=36
3,601,191 >>> mbox cmd response data (1848 bytes)
3,601,192 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,115 UART: [rt]cmd =0x50435245, len=56
3,634,638 >>> mbox cmd response data (8 bytes)
3,634,639 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,226 UART: [rt]cmd =0x50435251, len=36
3,831,730 >>> mbox cmd response data (1848 bytes)
3,831,731 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,576 UART: [rt]cmd =0x50435245, len=56
3,865,025 >>> mbox cmd response data (8 bytes)
3,865,026 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,787 UART: [rt]cmd =0x50435251, len=36
4,062,535 >>> mbox cmd response data (1848 bytes)
4,062,536 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,217 UART: [rt]cmd =0x50435245, len=56
4,095,734 >>> mbox cmd response data (8 bytes)
4,095,735 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,125,554 UART: [rt]cmd =0x50435251, len=36
4,292,840 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,650 UART: [kat] SHA2-256
892,588 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,515,156 UART: [ldev] ++
1,515,324 UART: [ldev] CDI.KEYID = 6
1,515,687 UART: [ldev] SUBJECT.KEYID = 5
1,516,113 UART: [ldev] AUTHORITY.KEYID = 7
1,516,576 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,953 UART: [ldev] --
1,587,320 UART: [fwproc] Waiting for Commands...
1,587,981 UART: [fwproc] Received command 0x46574c44
1,588,772 UART: [fwproc] Received Image of size 114448 bytes
2,887,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,162 >>> mbox cmd response: success
3,079,162 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,080,408 UART: [afmc] ++
3,080,576 UART: [afmc] CDI.KEYID = 6
3,080,938 UART: [afmc] SUBJECT.KEYID = 7
3,081,363 UART: [afmc] AUTHORITY.KEYID = 5
3,117,094 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,769 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,459 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,536 UART: [afmc] --
3,160,480 UART: [cold-reset] --
3,161,264 UART: [state] Locking Datavault
3,162,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,175 UART: [state] Locking ICCM
3,163,815 UART: [exit] Launching FMC @ 0x40000130
3,169,144 UART:
3,169,160 UART: Running Caliptra FMC ...
3,169,568 UART:
3,169,711 UART: [state] CFI Enabled
3,180,298 UART: [fht] FMC Alias Private Key: 7
3,287,713 UART: [art] Extend RT PCRs Done
3,288,141 UART: [art] Lock RT PCRs Done
3,289,431 UART: [art] Populate DV Done
3,297,542 UART: [fht] FMC Alias Private Key: 7
3,298,598 UART: [art] Derive CDI
3,298,878 UART: [art] Store in in slot 0x4
3,384,489 UART: [art] Derive Key Pair
3,384,849 UART: [art] Store priv key in slot 0x5
3,397,993 UART: [art] Derive Key Pair - Done
3,412,988 UART: [art] Signing Cert with AUTHO
3,413,468 UART: RITY.KEYID = 7
3,428,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,047 UART: [art] PUB.X = 89BECE5A4C8EFB30F80C64B92DEC1DD511DF0E43FBEACACD54CE04DA08F3C3AD2AA028EBA248B2186B2C92EA16773579
3,435,835 UART: [art] PUB.Y = 56D8522779DE2DDFD48B8E67D8E882E4EDEA6040ED09E963960E444C6333E795A1F36B85E1283273FCD970595A4AD7EA
3,442,785 UART: [art] SIG.R = 85094766EB88410372AA03E4DA7FC0406B7CF0C8843632C13583E2A2D2D6804CDC348FB1CAC9FC665E79C7D3D48C4179
3,449,550 UART: [art] SIG.S = 636E45C9466F81A2A39C18E80C127BEAE27D139022E38832EC50CC9146F40C03F94D597F3F0432ADE6F8428F7DDB80E9
3,472,893 UART: Caliptra RT
3,473,238 UART: [state] CFI Enabled
3,581,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,235 UART: [rt]cmd =0x50435251, len=36
3,779,655 >>> mbox cmd response data (1848 bytes)
3,779,656 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,261 UART: [rt]cmd =0x50435245, len=56
3,812,868 >>> mbox cmd response data (8 bytes)
3,812,869 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,516 UART: [rt]cmd =0x50435251, len=36
4,009,974 >>> mbox cmd response data (1848 bytes)
4,009,975 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,796 UART: [rt]cmd =0x50435245, len=56
4,043,323 >>> mbox cmd response data (8 bytes)
4,043,324 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,927 UART: [rt]cmd =0x50435251, len=36
4,240,245 >>> mbox cmd response data (1848 bytes)
4,240,246 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,059 UART: [rt]cmd =0x50435245, len=56
4,273,744 >>> mbox cmd response data (8 bytes)
4,273,745 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,274 UART: [rt]cmd =0x50435251, len=36
4,470,872 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,434 ready_for_fw is high
1,363,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,124 >>> mbox cmd response: success
2,930,124 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,992,052 UART:
2,992,068 UART: Running Caliptra FMC ...
2,992,476 UART:
2,992,619 UART: [state] CFI Enabled
3,002,902 UART: [fht] FMC Alias Private Key: 7
3,111,171 UART: [art] Extend RT PCRs Done
3,111,599 UART: [art] Lock RT PCRs Done
3,113,183 UART: [art] Populate DV Done
3,121,450 UART: [fht] FMC Alias Private Key: 7
3,122,556 UART: [art] Derive CDI
3,122,836 UART: [art] Store in in slot 0x4
3,208,705 UART: [art] Derive Key Pair
3,209,065 UART: [art] Store priv key in slot 0x5
3,222,599 UART: [art] Derive Key Pair - Done
3,237,162 UART: [art] Signing Cert with AUTHO
3,237,642 UART: RITY.KEYID = 7
3,252,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,737 UART: [art] PUB.X = 3BA11CDA43E96E4B9AEBE1DADC0B8A48A0D442C688B9B0EA18F5B5EDA37DCB817AEA78346A7B4521AC4A5AC51BAC75EB
3,260,538 UART: [art] PUB.Y = 17E31486CEE1217217C461DA9514F887EE7BDBBC0DBB178050FBE72B9D65F9D6D2116C00DD16948534F3BA4F2E031735
3,267,466 UART: [art] SIG.R = 93600BD1EB728F83A26D48E4C24B21A34FAD3325B8BF1A59136952AF5C7C715DB02B604EDB7C107C270E8ED2C0EDF575
3,274,242 UART: [art] SIG.S = EA03CF53EA6447253809116D8952B1B570EFC2DFF0F9B11EEDE61077884E26C74DFD1260E91E46D45F6AE6BFB2F77B74
3,297,621 UART: Caliptra RT
3,297,966 UART: [state] CFI Enabled
3,405,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,716 UART: [rt]cmd =0x50435251, len=36
3,603,978 >>> mbox cmd response data (1848 bytes)
3,603,979 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,596 UART: [rt]cmd =0x50435245, len=56
3,637,253 >>> mbox cmd response data (8 bytes)
3,637,254 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,837 UART: [rt]cmd =0x50435251, len=36
3,834,521 >>> mbox cmd response data (1848 bytes)
3,834,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,487 UART: [rt]cmd =0x50435245, len=56
3,868,240 >>> mbox cmd response data (8 bytes)
3,868,241 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,864 UART: [rt]cmd =0x50435251, len=36
4,065,342 >>> mbox cmd response data (1848 bytes)
4,065,343 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,914 UART: [rt]cmd =0x50435245, len=56
4,098,461 >>> mbox cmd response data (8 bytes)
4,098,462 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,127,923 UART: [rt]cmd =0x50435251, len=36
4,295,575 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,779 UART: [kat] SHA2-256
903,719 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,576 UART: [kat] HMAC-384Kdf
921,974 UART: [kat] LMS
1,170,302 UART: [kat] --
1,171,243 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,522 UART: [idev] ++
1,174,690 UART: [idev] CDI.KEYID = 6
1,175,050 UART: [idev] SUBJECT.KEYID = 7
1,175,474 UART: [idev] UDS.KEYID = 0
1,175,819 ready_for_fw is high
1,175,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,242 UART: [idev] Erasing UDS.KEYID = 0
1,200,011 UART: [idev] Sha1 KeyId Algorithm
1,208,427 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,548 >>> mbox cmd response: success
2,776,548 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,777,580 UART: [afmc] ++
2,777,748 UART: [afmc] CDI.KEYID = 6
2,778,110 UART: [afmc] SUBJECT.KEYID = 7
2,778,535 UART: [afmc] AUTHORITY.KEYID = 5
2,813,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,848 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,567 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,297 UART: [afmc] --
2,857,409 UART: [cold-reset] --
2,858,437 UART: [state] Locking Datavault
2,859,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,142 UART: [state] Locking ICCM
2,860,752 UART: [exit] Launching FMC @ 0x40000130
2,866,081 UART:
2,866,097 UART: Running Caliptra FMC ...
2,866,505 UART:
2,866,559 UART: [state] CFI Enabled
2,876,760 UART: [fht] FMC Alias Private Key: 7
2,984,447 UART: [art] Extend RT PCRs Done
2,984,875 UART: [art] Lock RT PCRs Done
2,986,103 UART: [art] Populate DV Done
2,994,518 UART: [fht] FMC Alias Private Key: 7
2,995,652 UART: [art] Derive CDI
2,995,932 UART: [art] Store in in slot 0x4
3,081,673 UART: [art] Derive Key Pair
3,082,033 UART: [art] Store priv key in slot 0x5
3,094,849 UART: [art] Derive Key Pair - Done
3,109,793 UART: [art] Signing Cert with AUTHO
3,110,273 UART: RITY.KEYID = 7
3,125,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,316 UART: [art] PUB.X = AEB1334494E20DF7FD3ED1A57C5927493D3ED017B15D37EC703A3FB5576F94BF3A06AC1DA7370F475BEDEE814A483C9E
3,133,093 UART: [art] PUB.Y = CC32F4F5845607D87C4703B7BF5454DA4EDDBB6E9B999CA4BBAF1285FCC13C393DE69D1DF1A5D86F3BDAC8B77E5BBF5A
3,140,067 UART: [art] SIG.R = A620FE086DD4455A8DE165B5A84609CBE1DC54AA9BAB68B896ACA5B1E0F7B2650E3198F4D08CAB268C0C848815EAB6BC
3,146,845 UART: [art] SIG.S = 8B85F928A3808125A17328C4B9143E316998821C9BDC785EC26DCA37F429A95D36B7994A4662761CF28F82457C995B70
3,170,352 UART: Caliptra RT
3,170,605 UART: [state] CFI Enabled
3,278,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,501 UART: [rt]cmd =0x50435251, len=36
3,477,167 >>> mbox cmd response data (1848 bytes)
3,477,168 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,779 UART: [rt]cmd =0x50435245, len=56
3,510,344 >>> mbox cmd response data (8 bytes)
3,510,345 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,962 UART: [rt]cmd =0x50435251, len=36
3,707,424 >>> mbox cmd response data (1848 bytes)
3,707,425 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,076 UART: [rt]cmd =0x50435245, len=56
3,740,657 >>> mbox cmd response data (8 bytes)
3,740,658 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,237 UART: [rt]cmd =0x50435251, len=36
3,937,587 >>> mbox cmd response data (1848 bytes)
3,937,588 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,617 UART: [rt]cmd =0x50435245, len=56
3,971,252 >>> mbox cmd response data (8 bytes)
3,971,253 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,542 UART: [rt]cmd =0x50435251, len=36
4,168,178 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 ready_for_fw is high
1,060,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,603 >>> mbox cmd response: success
2,629,603 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,692,149 UART:
2,692,165 UART: Running Caliptra FMC ...
2,692,573 UART:
2,692,627 UART: [state] CFI Enabled
2,703,442 UART: [fht] FMC Alias Private Key: 7
2,812,627 UART: [art] Extend RT PCRs Done
2,813,055 UART: [art] Lock RT PCRs Done
2,814,461 UART: [art] Populate DV Done
2,822,542 UART: [fht] FMC Alias Private Key: 7
2,823,558 UART: [art] Derive CDI
2,823,838 UART: [art] Store in in slot 0x4
2,909,893 UART: [art] Derive Key Pair
2,910,253 UART: [art] Store priv key in slot 0x5
2,923,449 UART: [art] Derive Key Pair - Done
2,938,160 UART: [art] Signing Cert with AUTHO
2,938,640 UART: RITY.KEYID = 7
2,953,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,467 UART: [art] PUB.X = 83735C51F83F89A40FDA1E9C6B886B1C3A42E63FDE5C3CE918566CEA38BDEE56DFEA827A652AB02435C29C08A451198A
2,961,245 UART: [art] PUB.Y = 3080E6A4EB06A9013F58041CC63C239FCE58573040076912CCCEB4AE632AEBC6EE22BF218032A286561E39D2A0D829BC
2,968,189 UART: [art] SIG.R = E8A45CA8D6E0D906841F4A84C7302E2D2F4FB4AA6AFC8A6B937879BF75BD61A94DB024744D5364717ED4B75F0208F01D
2,974,960 UART: [art] SIG.S = 5A7E5518AE33C804CFA673259F348372A9C9831CFBCB95B05E2C8C6D7D96FD089802000DE3D62165350A983CD339EEFA
2,999,106 UART: Caliptra RT
2,999,359 UART: [state] CFI Enabled
3,105,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,652 UART: [rt]cmd =0x50435251, len=36
3,304,012 >>> mbox cmd response data (1848 bytes)
3,304,013 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,674 UART: [rt]cmd =0x50435245, len=56
3,337,289 >>> mbox cmd response data (8 bytes)
3,337,290 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,981 UART: [rt]cmd =0x50435251, len=36
3,533,873 >>> mbox cmd response data (1848 bytes)
3,533,874 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,759 UART: [rt]cmd =0x50435245, len=56
3,567,522 >>> mbox cmd response data (8 bytes)
3,567,523 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,044 UART: [rt]cmd =0x50435251, len=36
3,764,754 >>> mbox cmd response data (1848 bytes)
3,764,755 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,500 UART: [rt]cmd =0x50435245, len=56
3,798,123 >>> mbox cmd response data (8 bytes)
3,798,124 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,823 UART: [rt]cmd =0x50435251, len=36
3,995,247 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,677 UART: [kat] SHA2-512-ACC
908,578 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,128 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 ready_for_fw is high
1,176,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,342 UART: [idev] Sha1 KeyId Algorithm
1,209,866 UART: [idev] --
1,210,888 UART: [ldev] ++
1,211,056 UART: [ldev] CDI.KEYID = 6
1,211,419 UART: [ldev] SUBJECT.KEYID = 5
1,211,845 UART: [ldev] AUTHORITY.KEYID = 7
1,212,308 UART: [ldev] FE.KEYID = 1
1,217,200 UART: [ldev] Erasing FE.KEYID = 1
1,243,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,108 UART: [ldev] --
1,283,599 UART: [fwproc] Wait for Commands...
1,284,383 UART: [fwproc] Recv command 0x46574c44
1,285,111 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,905 >>> mbox cmd response: success
2,775,905 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,777,141 UART: [afmc] ++
2,777,309 UART: [afmc] CDI.KEYID = 6
2,777,671 UART: [afmc] SUBJECT.KEYID = 7
2,778,096 UART: [afmc] AUTHORITY.KEYID = 5
2,813,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,234 UART: [afmc] --
2,856,170 UART: [cold-reset] --
2,857,102 UART: [state] Locking Datavault
2,858,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,735 UART: [state] Locking ICCM
2,859,293 UART: [exit] Launching FMC @ 0x40000130
2,864,622 UART:
2,864,638 UART: Running Caliptra FMC ...
2,865,046 UART:
2,865,189 UART: [state] CFI Enabled
2,875,366 UART: [fht] FMC Alias Private Key: 7
2,983,821 UART: [art] Extend RT PCRs Done
2,984,249 UART: [art] Lock RT PCRs Done
2,985,605 UART: [art] Populate DV Done
2,994,144 UART: [fht] FMC Alias Private Key: 7
2,995,110 UART: [art] Derive CDI
2,995,390 UART: [art] Store in in slot 0x4
3,080,719 UART: [art] Derive Key Pair
3,081,079 UART: [art] Store priv key in slot 0x5
3,094,369 UART: [art] Derive Key Pair - Done
3,109,335 UART: [art] Signing Cert with AUTHO
3,109,815 UART: RITY.KEYID = 7
3,124,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,632 UART: [art] PUB.X = 709EC7B9857D1092DE18349618B64F1076BF73978CA55C759E47E2418EF3D90D32EAF3DC3DC187764A48319B8D7F1628
3,132,397 UART: [art] PUB.Y = DD0E99D21D2CEC0C1551623E6CD7E3BABBA71A19028456E8365ACAAEF1908F6D461B80DFDA46A52FA863A4BDFF611092
3,139,358 UART: [art] SIG.R = FC6DDDE9380D1466C96F8D7157D7BE3222B4DCBD0286416F42CBA4940231D91FCAA54454650A925E5F300F41FF0F26D4
3,146,118 UART: [art] SIG.S = 3C565D1D6A8C78AED49560AFDC5BE5A823E4D7186B7278917D4B063377944B846A695532972612EA48C6C195282518C7
3,170,476 UART: Caliptra RT
3,170,821 UART: [state] CFI Enabled
3,278,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,354 UART: [rt]cmd =0x50435251, len=36
3,477,056 >>> mbox cmd response data (1848 bytes)
3,477,057 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,788 UART: [rt]cmd =0x50435245, len=56
3,510,233 >>> mbox cmd response data (8 bytes)
3,510,234 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,971 UART: [rt]cmd =0x50435251, len=36
3,707,057 >>> mbox cmd response data (1848 bytes)
3,707,058 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,855 UART: [rt]cmd =0x50435245, len=56
3,740,314 >>> mbox cmd response data (8 bytes)
3,740,315 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,008 UART: [rt]cmd =0x50435251, len=36
3,937,220 >>> mbox cmd response data (1848 bytes)
3,937,221 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,042 UART: [rt]cmd =0x50435245, len=56
3,970,245 >>> mbox cmd response data (8 bytes)
3,970,246 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,627 UART: [rt]cmd =0x50435251, len=36
4,166,943 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,616 ready_for_fw is high
1,060,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,376 >>> mbox cmd response: success
2,629,376 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,691,492 UART:
2,691,508 UART: Running Caliptra FMC ...
2,691,916 UART:
2,692,059 UART: [state] CFI Enabled
2,702,398 UART: [fht] FMC Alias Private Key: 7
2,810,403 UART: [art] Extend RT PCRs Done
2,810,831 UART: [art] Lock RT PCRs Done
2,812,441 UART: [art] Populate DV Done
2,820,484 UART: [fht] FMC Alias Private Key: 7
2,821,450 UART: [art] Derive CDI
2,821,730 UART: [art] Store in in slot 0x4
2,907,741 UART: [art] Derive Key Pair
2,908,101 UART: [art] Store priv key in slot 0x5
2,921,407 UART: [art] Derive Key Pair - Done
2,936,523 UART: [art] Signing Cert with AUTHO
2,937,003 UART: RITY.KEYID = 7
2,951,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,682 UART: [art] PUB.X = 8FC3688C8C45413575B60B25E3EE1BE2099A2B0C5397D005E8DC0F97A0933E7AA77B5BC7A9285E5356E245058C58F5F3
2,959,436 UART: [art] PUB.Y = E8F7DC5E76BEF72A4EAF03F9241B1F17347230616464D4E89EC164B08ABCF6C3570F3DD2796F017C99E1E464A8FD3EA6
2,966,389 UART: [art] SIG.R = 25C041FB83E9E1E6D230E2446D0F6896E109CE80E1D2508C17F2AB95FA887B1578519C7AC4CAE209EEBB6C8CF3B5D6D9
2,973,164 UART: [art] SIG.S = A7ECC20CD4C2F05894E4BDB2246702475894D570B8A2725F657297FE3A42AAC9208C65896A473394741B756B28BE91CE
2,997,063 UART: Caliptra RT
2,997,408 UART: [state] CFI Enabled
3,105,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,411 UART: [rt]cmd =0x50435251, len=36
3,303,895 >>> mbox cmd response data (1848 bytes)
3,303,896 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,581 UART: [rt]cmd =0x50435245, len=56
3,337,156 >>> mbox cmd response data (8 bytes)
3,337,157 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,576 UART: [rt]cmd =0x50435251, len=36
3,534,112 >>> mbox cmd response data (1848 bytes)
3,534,113 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,800 UART: [rt]cmd =0x50435245, len=56
3,567,431 >>> mbox cmd response data (8 bytes)
3,567,432 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,099 UART: [rt]cmd =0x50435251, len=36
3,764,661 >>> mbox cmd response data (1848 bytes)
3,764,662 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,403 UART: [rt]cmd =0x50435245, len=56
3,797,962 >>> mbox cmd response data (8 bytes)
3,797,963 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,594 UART: [rt]cmd =0x50435251, len=36
3,995,234 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 ready_for_fw is high
1,174,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,929 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,208,884 UART: [ldev] ++
1,209,052 UART: [ldev] CDI.KEYID = 6
1,209,416 UART: [ldev] SUBJECT.KEYID = 5
1,209,843 UART: [ldev] AUTHORITY.KEYID = 7
1,210,306 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,264 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,482 >>> mbox cmd response: success
2,775,482 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,776,659 UART: [afmc] ++
2,776,827 UART: [afmc] CDI.KEYID = 6
2,777,190 UART: [afmc] SUBJECT.KEYID = 7
2,777,616 UART: [afmc] AUTHORITY.KEYID = 5
2,813,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,520 UART: [afmc] --
2,856,468 UART: [cold-reset] --
2,857,512 UART: [state] Locking Datavault
2,858,653 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,257 UART: [state] Locking ICCM
2,859,677 UART: [exit] Launching FMC @ 0x40000130
2,865,006 UART:
2,865,022 UART: Running Caliptra FMC ...
2,865,430 UART:
2,865,484 UART: [state] CFI Enabled
2,876,261 UART: [fht] FMC Alias Private Key: 7
2,984,418 UART: [art] Extend RT PCRs Done
2,984,846 UART: [art] Lock RT PCRs Done
2,986,390 UART: [art] Populate DV Done
2,994,663 UART: [fht] FMC Alias Private Key: 7
2,995,679 UART: [art] Derive CDI
2,995,959 UART: [art] Store in in slot 0x4
3,081,818 UART: [art] Derive Key Pair
3,082,178 UART: [art] Store priv key in slot 0x5
3,095,400 UART: [art] Derive Key Pair - Done
3,110,006 UART: [art] Signing Cert with AUTHO
3,110,486 UART: RITY.KEYID = 7
3,125,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,471 UART: [art] PUB.X = 2BFED51C19588690672A3D38742B7122A0DA06DB5F9F039D0D9BAF839E84B5929DA4795C5262720D3BD9520CCC4BF9CE
3,133,234 UART: [art] PUB.Y = 3EECCF96179E7713CE25818EE07173FC61C086CA2E49CC785A836BC5E9285A8CD2D872051F61F6848730A3D47E148D65
3,140,183 UART: [art] SIG.R = 8C9285F6A49F1F7DBD34560B5AACDBC064366CCFEDF3332BD5CCFE35285F181CE9E954BEC1B6C5AFBAAA9BF1B20948C8
3,146,977 UART: [art] SIG.S = BB4DAC5C0BD6C14441B78D019A037BD425AE259D322E95BAF2B8C7932AFF21F38A0F7D309AF909968F82FFBE60F739F0
3,171,105 UART: Caliptra RT
3,171,358 UART: [state] CFI Enabled
3,279,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,964 UART: [rt]cmd =0x50435251, len=36
3,477,406 >>> mbox cmd response data (1848 bytes)
3,477,407 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,192 UART: [rt]cmd =0x50435245, len=56
3,510,511 >>> mbox cmd response data (8 bytes)
3,510,512 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,321 UART: [rt]cmd =0x50435251, len=36
3,707,615 >>> mbox cmd response data (1848 bytes)
3,707,616 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,451 UART: [rt]cmd =0x50435245, len=56
3,741,022 >>> mbox cmd response data (8 bytes)
3,741,023 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,372 UART: [rt]cmd =0x50435251, len=36
3,938,026 >>> mbox cmd response data (1848 bytes)
3,938,027 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,718 UART: [rt]cmd =0x50435245, len=56
3,971,367 >>> mbox cmd response data (8 bytes)
3,971,368 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,025 UART: [rt]cmd =0x50435251, len=36
4,168,523 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,848 ready_for_fw is high
1,055,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,174 >>> mbox cmd response: success
2,624,174 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,686,602 UART:
2,686,618 UART: Running Caliptra FMC ...
2,687,026 UART:
2,687,080 UART: [state] CFI Enabled
2,698,013 UART: [fht] FMC Alias Private Key: 7
2,806,068 UART: [art] Extend RT PCRs Done
2,806,496 UART: [art] Lock RT PCRs Done
2,808,186 UART: [art] Populate DV Done
2,816,679 UART: [fht] FMC Alias Private Key: 7
2,817,825 UART: [art] Derive CDI
2,818,105 UART: [art] Store in in slot 0x4
2,904,026 UART: [art] Derive Key Pair
2,904,386 UART: [art] Store priv key in slot 0x5
2,917,726 UART: [art] Derive Key Pair - Done
2,932,313 UART: [art] Signing Cert with AUTHO
2,932,793 UART: RITY.KEYID = 7
2,947,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,416 UART: [art] PUB.X = 073482C5576A802A3DBC19CDA91A20660B8C95A07942EEE2D4469329D7D3A1CD25CF7EBD623F7F2FA02753B5E96E1C6F
2,955,190 UART: [art] PUB.Y = 6AEBA42AD0F1A48759A625283E4929B31ABF50CD0669E19258096324544DFB537F0102480B263509DCCE3DB7518F7AEE
2,962,124 UART: [art] SIG.R = 14E7B3707808FFE6943B8D1120CDDDDA6B398F08655E003B92A6942F1E24EAC01143BFB43F67582547BCD4E414EE9672
2,968,870 UART: [art] SIG.S = 0B9D89DA05C5FB2FA244D0192FB81E786DC461A4F644D477D000A3DCDBF117273F7DD1A295C135E2223A92E25DB5888D
2,992,557 UART: Caliptra RT
2,992,810 UART: [state] CFI Enabled
3,101,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,867 UART: [rt]cmd =0x50435251, len=36
3,299,163 >>> mbox cmd response data (1848 bytes)
3,299,164 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,947 UART: [rt]cmd =0x50435245, len=56
3,332,646 >>> mbox cmd response data (8 bytes)
3,332,647 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,214 UART: [rt]cmd =0x50435251, len=36
3,529,476 >>> mbox cmd response data (1848 bytes)
3,529,477 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,334 UART: [rt]cmd =0x50435245, len=56
3,563,147 >>> mbox cmd response data (8 bytes)
3,563,148 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,851 UART: [rt]cmd =0x50435251, len=36
3,759,899 >>> mbox cmd response data (1848 bytes)
3,759,900 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,647 UART: [rt]cmd =0x50435245, len=56
3,793,132 >>> mbox cmd response data (8 bytes)
3,793,133 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,894 UART: [rt]cmd =0x50435251, len=36
3,990,306 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,503 UART: [kat] LMS
1,168,815 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 ready_for_fw is high
1,174,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,594 UART: [idev] Erasing UDS.KEYID = 0
1,199,040 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,433 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,799 >>> mbox cmd response: success
2,772,799 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,878 UART: [afmc] ++
2,774,046 UART: [afmc] CDI.KEYID = 6
2,774,409 UART: [afmc] SUBJECT.KEYID = 7
2,774,835 UART: [afmc] AUTHORITY.KEYID = 5
2,810,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,935 UART: [afmc] --
2,854,021 UART: [cold-reset] --
2,854,691 UART: [state] Locking Datavault
2,855,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,544 UART: [state] Locking ICCM
2,857,156 UART: [exit] Launching FMC @ 0x40000130
2,862,485 UART:
2,862,501 UART: Running Caliptra FMC ...
2,862,909 UART:
2,863,052 UART: [state] CFI Enabled
2,873,483 UART: [fht] FMC Alias Private Key: 7
2,981,546 UART: [art] Extend RT PCRs Done
2,981,974 UART: [art] Lock RT PCRs Done
2,983,786 UART: [art] Populate DV Done
2,992,007 UART: [fht] FMC Alias Private Key: 7
2,993,073 UART: [art] Derive CDI
2,993,353 UART: [art] Store in in slot 0x4
3,078,798 UART: [art] Derive Key Pair
3,079,158 UART: [art] Store priv key in slot 0x5
3,092,670 UART: [art] Derive Key Pair - Done
3,107,634 UART: [art] Signing Cert with AUTHO
3,108,114 UART: RITY.KEYID = 7
3,123,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,421 UART: [art] PUB.X = 49A47F385C6B9E3AE71D6C15F1122C2B4FA6F95DFF7016945D93C3B0999A6142E170215B1A5D7E0899A5CA8EB19C54DD
3,131,196 UART: [art] PUB.Y = 8B949E20CBFDE39654E89CCF0F43F73809FE61EA6563E62E50EE022DDD99A2E858BA51394D728FDBFE3AD69A778DB372
3,138,153 UART: [art] SIG.R = B8AECC7DAA7DC50A485D09097A7170C64DD7F08135FC769D3C5DE83E793F07782E288997D81EF9065D142262634799F0
3,144,908 UART: [art] SIG.S = 23D5A429DEEBE77370BB5B609B7815E66B41761DA668639216FDE42B4D8B6C11FEFA3F31CE34477FA3621F3115157541
3,168,495 UART: Caliptra RT
3,168,840 UART: [state] CFI Enabled
3,276,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,915 UART: [rt]cmd =0x50435251, len=36
3,474,229 >>> mbox cmd response data (1848 bytes)
3,474,230 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,171 UART: [rt]cmd =0x50435245, len=56
3,507,594 >>> mbox cmd response data (8 bytes)
3,507,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,394 UART: [rt]cmd =0x50435251, len=36
3,705,198 >>> mbox cmd response data (1848 bytes)
3,705,199 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,766 UART: [rt]cmd =0x50435245, len=56
3,738,283 >>> mbox cmd response data (8 bytes)
3,738,284 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,929 UART: [rt]cmd =0x50435251, len=36
3,935,367 >>> mbox cmd response data (1848 bytes)
3,935,368 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,841 UART: [rt]cmd =0x50435245, len=56
3,968,370 >>> mbox cmd response data (8 bytes)
3,968,371 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,998,092 UART: [rt]cmd =0x50435251, len=36
4,165,240 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,629 ready_for_fw is high
1,056,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,409 >>> mbox cmd response: success
2,626,409 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,689,161 UART:
2,689,177 UART: Running Caliptra FMC ...
2,689,585 UART:
2,689,728 UART: [state] CFI Enabled
2,700,085 UART: [fht] FMC Alias Private Key: 7
2,808,448 UART: [art] Extend RT PCRs Done
2,808,876 UART: [art] Lock RT PCRs Done
2,810,526 UART: [art] Populate DV Done
2,818,763 UART: [fht] FMC Alias Private Key: 7
2,819,791 UART: [art] Derive CDI
2,820,071 UART: [art] Store in in slot 0x4
2,905,722 UART: [art] Derive Key Pair
2,906,082 UART: [art] Store priv key in slot 0x5
2,919,990 UART: [art] Derive Key Pair - Done
2,934,874 UART: [art] Signing Cert with AUTHO
2,935,354 UART: RITY.KEYID = 7
2,950,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,125 UART: [art] PUB.X = CA9BB81304A15F4BA4C109945156FD4387A9D420601D0F356EB2D1043D87F576697D8CB50B5922C6B32B10495429F0A6
2,957,876 UART: [art] PUB.Y = 77DE241B16DDF8C758CE374B934587D07813A4CE03235E89EBF700219D593DC2CD6DA03C82E5128DF762D18A84F8174A
2,964,805 UART: [art] SIG.R = 2F2699ED2017C65532C51683640F652E24A564D30CAFE75D8041581350B63788EB5E8D1CB2F7B77F4AEC84F7D018D52D
2,971,569 UART: [art] SIG.S = F0B7813FAF1A756F303596919D952E842FCD1615B4241D2F33757B82199C3A1EA8D37913BAC1AE3BFD0D872F861A1DBD
2,995,185 UART: Caliptra RT
2,995,530 UART: [state] CFI Enabled
3,103,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,577 UART: [rt]cmd =0x50435251, len=36
3,301,167 >>> mbox cmd response data (1848 bytes)
3,301,168 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,833 UART: [rt]cmd =0x50435245, len=56
3,334,560 >>> mbox cmd response data (8 bytes)
3,334,561 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,266 UART: [rt]cmd =0x50435251, len=36
3,531,602 >>> mbox cmd response data (1848 bytes)
3,531,603 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,226 UART: [rt]cmd =0x50435245, len=56
3,564,961 >>> mbox cmd response data (8 bytes)
3,564,962 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,621 UART: [rt]cmd =0x50435251, len=36
3,762,131 >>> mbox cmd response data (1848 bytes)
3,762,132 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,899 UART: [rt]cmd =0x50435245, len=56
3,795,324 >>> mbox cmd response data (8 bytes)
3,795,325 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,746 UART: [rt]cmd =0x50435251, len=36
3,991,968 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,980 UART:
192,355 UART: Running Caliptra ROM ...
193,499 UART:
193,648 UART: [state] CFI Enabled
262,915 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
267,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,762 UART: [kat] SHA2-256
441,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,977 UART: [kat] ++
452,458 UART: [kat] sha1
462,570 UART: [kat] SHA2-256
465,301 UART: [kat] SHA2-384
471,295 UART: [kat] SHA2-512-ACC
473,663 UART: [kat] ECC-384
2,769,534 UART: [kat] HMAC-384Kdf
2,800,033 UART: [kat] LMS
3,990,322 UART: [kat] --
3,995,787 UART: [cold-reset] ++
3,997,021 UART: [fht] Storing FHT @ 0x50003400
4,008,717 UART: [idev] ++
4,009,295 UART: [idev] CDI.KEYID = 6
4,010,214 UART: [idev] SUBJECT.KEYID = 7
4,011,458 UART: [idev] UDS.KEYID = 0
4,012,528 ready_for_fw is high
4,012,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,365 UART: [idev] Erasing UDS.KEYID = 0
7,345,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,702 UART: [idev] --
7,370,099 UART: [ldev] ++
7,370,676 UART: [ldev] CDI.KEYID = 6
7,371,643 UART: [ldev] SUBJECT.KEYID = 5
7,372,859 UART: [ldev] AUTHORITY.KEYID = 7
7,374,086 UART: [ldev] FE.KEYID = 1
7,401,982 UART: [ldev] Erasing FE.KEYID = 1
10,734,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,890 UART: [ldev] --
13,097,381 UART: [fwproc] Waiting for Commands...
13,100,668 UART: [fwproc] Received command 0x46574c44
13,102,867 UART: [fwproc] Received Image of size 114124 bytes
17,149,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,424 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,611,783 >>> mbox cmd response: success
17,612,338 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,615,096 UART: [afmc] ++
17,615,685 UART: [afmc] CDI.KEYID = 6
17,616,567 UART: [afmc] SUBJECT.KEYID = 7
17,617,836 UART: [afmc] AUTHORITY.KEYID = 5
20,986,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,345 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,602 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,996 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,845 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,266 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,855 UART: [afmc] --
23,358,913 UART: [cold-reset] --
23,363,431 UART: [state] Locking Datavault
23,368,517 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,213 UART: [state] Locking ICCM
23,371,502 UART: [exit] Launching FMC @ 0x40000130
23,379,899 UART:
23,380,140 UART: Running Caliptra FMC ...
23,381,248 UART:
23,381,404 UART: [state] CFI Enabled
23,446,593 UART: [fht] FMC Alias Private Key: 7
25,784,323 UART: [art] Extend RT PCRs Done
25,785,539 UART: [art] Lock RT PCRs Done
25,787,463 UART: [art] Populate DV Done
25,792,765 UART: [fht] FMC Alias Private Key: 7
25,794,357 UART: [art] Derive CDI
25,795,141 UART: [art] Store in in slot 0x4
25,854,706 UART: [art] Derive Key Pair
25,855,711 UART: [art] Store priv key in slot 0x5
29,148,151 UART: [art] Derive Key Pair - Done
29,161,114 UART: [art] Signing Cert with AUTHO
29,162,436 UART: RITY.KEYID = 7
31,450,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,664 UART: [art] PUB.X = F089AE9C9AFAF2316C1E0F426AA1BC500B032F488C325D6120133B6198E8266C0AA882E900A082201EE71B432FF1F135
31,458,875 UART: [art] PUB.Y = EC02C7E94080C427AA84D7484FADAF66E0B62100271D93883634DB7F0634A15DD5BE5DE946705E4FA1933ED200086DB5
31,466,117 UART: [art] SIG.R = BD6E7889DA168B1AE1218ED9225F958CBBB36E4064890F51E29F83498AE21AE91F3FF88370BD04289E1C2E7FA4199958
31,473,460 UART: [art] SIG.S = 4BEA44546E9BB98C562F93E72B45AAE6E9787A747A63CB876FD2DA851BF7F1B83698C6614281DB82228E94057C918157
32,779,197 UART: Caliptra RT
32,779,913 UART: [state] CFI Enabled
32,940,585 UART: [rt] RT listening for mailbox commands...
32,972,601 UART: [rt]cmd =0x50435245, len=56
32,974,463 >>> mbox cmd response: failed
32,974,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,004,776 UART: [rt]cmd =0x50435245, len=56
33,006,523 >>> mbox cmd response: failed
33,006,803 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,036,837 UART: [rt]cmd =0x50435245, len=56
33,038,489 >>> mbox cmd response: failed
33,038,756 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,068,783 UART: [rt]cmd =0x50435245, len=56
33,070,368 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,785,969 ready_for_fw is high
3,786,581 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,881,892 >>> mbox cmd response: success
17,882,543 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,567,334 UART:
23,567,722 UART: Running Caliptra FMC ...
23,569,037 UART:
23,569,210 UART: [state] CFI Enabled
23,636,083 UART: [fht] FMC Alias Private Key: 7
25,974,206 UART: [art] Extend RT PCRs Done
25,975,468 UART: [art] Lock RT PCRs Done
25,976,971 UART: [art] Populate DV Done
25,982,448 UART: [fht] FMC Alias Private Key: 7
25,984,012 UART: [art] Derive CDI
25,984,791 UART: [art] Store in in slot 0x4
26,043,808 UART: [art] Derive Key Pair
26,044,804 UART: [art] Store priv key in slot 0x5
29,337,314 UART: [art] Derive Key Pair - Done
29,350,254 UART: [art] Signing Cert with AUTHO
29,351,551 UART: RITY.KEYID = 7
31,638,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,819 UART: [art] PUB.X = 0A136D5B12D950958B21D2A2F4EF7BDDA67EF677938F909B420FE8E5F55D0D2E4D7B2750DD82EE170839E0929EE6DECF
31,647,072 UART: [art] PUB.Y = AFD32497C9AFB2332378006442BAFCFBFFEBD2701C5BBC248842A43496AC55E0D826AC77986508E6054B5234035023E7
31,654,291 UART: [art] SIG.R = D00B74F0E7257A0D4FF2A9F7E6A879198B6DEDA9C0AF072F193F077097A3019CE06AEB9FE20EA1EE27D927435F184737
31,661,694 UART: [art] SIG.S = 317F6DB198C4E4966957A2F43C30629B57C86CF105355C49C7817A5DC457BEE6153AE39BFD1714BBF65844F60A04EBFD
32,966,790 UART: Caliptra RT
32,967,497 UART: [state] CFI Enabled
33,129,730 UART: [rt] RT listening for mailbox commands...
33,161,635 UART: [rt]cmd =0x50435245, len=56
33,163,250 >>> mbox cmd response: failed
33,163,571 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,193,460 UART: [rt]cmd =0x50435245, len=56
33,195,035 >>> mbox cmd response: failed
33,195,346 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,225,324 UART: [rt]cmd =0x50435245, len=56
33,227,187 >>> mbox cmd response: failed
33,227,457 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,257,436 UART: [rt]cmd =0x50435245, len=56
33,259,131 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,377 UART:
192,738 UART: Running Caliptra ROM ...
193,869 UART:
603,496 UART: [state] CFI Enabled
618,859 UART: [state] LifecycleState = Unprovisioned
620,796 UART: [state] DebugLocked = No
623,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,675 UART: [kat] SHA2-256
797,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,879 UART: [kat] ++
808,426 UART: [kat] sha1
818,159 UART: [kat] SHA2-256
820,895 UART: [kat] SHA2-384
826,855 UART: [kat] SHA2-512-ACC
829,196 UART: [kat] ECC-384
3,114,434 UART: [kat] HMAC-384Kdf
3,125,301 UART: [kat] LMS
4,315,404 UART: [kat] --
4,320,297 UART: [cold-reset] ++
4,321,450 UART: [fht] Storing FHT @ 0x50003400
4,333,948 UART: [idev] ++
4,334,577 UART: [idev] CDI.KEYID = 6
4,335,458 UART: [idev] SUBJECT.KEYID = 7
4,336,695 UART: [idev] UDS.KEYID = 0
4,337,669 ready_for_fw is high
4,337,891 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,289 UART: [idev] Erasing UDS.KEYID = 0
7,623,720 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,849 UART: [idev] --
7,646,919 UART: [ldev] ++
7,647,542 UART: [ldev] CDI.KEYID = 6
7,648,606 UART: [ldev] SUBJECT.KEYID = 5
7,649,708 UART: [ldev] AUTHORITY.KEYID = 7
7,650,935 UART: [ldev] FE.KEYID = 1
7,662,224 UART: [ldev] Erasing FE.KEYID = 1
10,955,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,646 UART: [ldev] --
13,314,186 UART: [fwproc] Waiting for Commands...
13,316,816 UART: [fwproc] Received command 0x46574c44
13,318,989 UART: [fwproc] Received Image of size 114124 bytes
17,375,528 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,241 >>> mbox cmd response: success
17,839,791 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,844,156 UART: [afmc] ++
17,844,739 UART: [afmc] CDI.KEYID = 6
17,845,647 UART: [afmc] SUBJECT.KEYID = 7
17,846,956 UART: [afmc] AUTHORITY.KEYID = 5
21,164,811 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,554 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,949 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,739 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,189 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,140 UART: [afmc] --
23,527,314 UART: [cold-reset] --
23,531,715 UART: [state] Locking Datavault
23,536,467 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,156 UART: [state] Locking ICCM
23,540,790 UART: [exit] Launching FMC @ 0x40000130
23,549,182 UART:
23,549,460 UART: Running Caliptra FMC ...
23,550,565 UART:
23,550,726 UART: [state] CFI Enabled
23,558,663 UART: [fht] FMC Alias Private Key: 7
25,889,755 UART: [art] Extend RT PCRs Done
25,890,980 UART: [art] Lock RT PCRs Done
25,892,611 UART: [art] Populate DV Done
25,898,345 UART: [fht] FMC Alias Private Key: 7
25,900,093 UART: [art] Derive CDI
25,900,907 UART: [art] Store in in slot 0x4
25,943,704 UART: [art] Derive Key Pair
25,944,704 UART: [art] Store priv key in slot 0x5
29,186,613 UART: [art] Derive Key Pair - Done
29,199,397 UART: [art] Signing Cert with AUTHO
29,200,703 UART: RITY.KEYID = 7
31,480,257 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,765 UART: [art] PUB.X = C0AF0DCDE421C853F103307A0469DE3F366A1E792D05F6DDFF9FD2022A5351F257648EE7B20776F66ED92CF2FB404C0F
31,489,007 UART: [art] PUB.Y = 5878F155F1C80B326413D82411D4BDBC0F2BC05A93C8A6843D9DC8FC67E23D98F73B00B7EEDA9A4E2ECC2D17690BFE25
31,496,290 UART: [art] SIG.R = 60F9430925B55619EFCC2393DD72E8A0DF5235D6890D5359727E91644AF8779E4A49B221857F85F3AE9B8D6922E5B2F9
31,503,677 UART: [art] SIG.S = FAEF945BAF1FBF41EF597567F8724E30FFFDE6AA657C69B59A6D769772119812CBBEB26C1B5089C5B43A5ED85A120740
32,808,796 UART: Caliptra RT
32,809,509 UART: [state] CFI Enabled
32,926,646 UART: [rt] RT listening for mailbox commands...
32,958,220 UART: [rt]cmd =0x50435245, len=56
32,959,864 >>> mbox cmd response: failed
32,960,207 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,990,166 UART: [rt]cmd =0x50435245, len=56
32,991,842 >>> mbox cmd response: failed
32,992,112 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,022,030 UART: [rt]cmd =0x50435245, len=56
33,023,457 >>> mbox cmd response: failed
33,023,722 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,054,071 UART: [rt]cmd =0x50435245, len=56
33,055,815 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,128,806 ready_for_fw is high
4,129,372 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,748 >>> mbox cmd response: success
18,072,638 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,715,679 UART:
23,716,069 UART: Running Caliptra FMC ...
23,717,167 UART:
23,717,314 UART: [state] CFI Enabled
23,725,052 UART: [fht] FMC Alias Private Key: 7
26,056,095 UART: [art] Extend RT PCRs Done
26,057,330 UART: [art] Lock RT PCRs Done
26,058,927 UART: [art] Populate DV Done
26,064,573 UART: [fht] FMC Alias Private Key: 7
26,066,286 UART: [art] Derive CDI
26,067,101 UART: [art] Store in in slot 0x4
26,109,638 UART: [art] Derive Key Pair
26,110,633 UART: [art] Store priv key in slot 0x5
29,352,920 UART: [art] Derive Key Pair - Done
29,365,755 UART: [art] Signing Cert with AUTHO
29,367,061 UART: RITY.KEYID = 7
31,646,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,717 UART: [art] PUB.X = 0283253613223A52F6EB8312D26A0A04D43FA4A2550A55EF94BC888C266123DDBF26D4211C4D8E350F355549E16EADFC
31,654,993 UART: [art] PUB.Y = 46F4C494AF0242834E07D5CEF5802B1F00C2FB70B3D7FEB2E83B919D6148319681B46F38AA69F72DFEAA9098681FC5D2
31,662,231 UART: [art] SIG.R = 9EF7D4155C1895B8DA34DE88270C12BC1A06A932E00630FC19A918DFE9D2669B86B470482A28099C07C79729C22F1369
31,669,571 UART: [art] SIG.S = E966567E81B324F5EE08E40BD281702BA20EE33C5258095FC1F34C4927202F8B812BA8826DEDE5A3E884A14C89A43CCA
32,974,868 UART: Caliptra RT
32,975,581 UART: [state] CFI Enabled
33,093,398 UART: [rt] RT listening for mailbox commands...
33,124,981 UART: [rt]cmd =0x50435245, len=56
33,126,846 >>> mbox cmd response: failed
33,127,172 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,157,249 UART: [rt]cmd =0x50435245, len=56
33,158,890 >>> mbox cmd response: failed
33,159,153 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,189,189 UART: [rt]cmd =0x50435245, len=56
33,190,760 >>> mbox cmd response: failed
33,191,047 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,221,127 UART: [rt]cmd =0x50435245, len=56
33,222,996 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
191,984 UART:
192,360 UART: Running Caliptra ROM ...
193,494 UART:
193,639 UART: [state] CFI Enabled
264,260 UART: [state] LifecycleState = Unprovisioned
266,166 UART: [state] DebugLocked = No
267,911 UART: [state] WD Timer not started. Device not locked for debugging
271,650 UART: [kat] SHA2-256
450,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,342 UART: [kat] ++
462,877 UART: [kat] sha1
473,119 UART: [kat] SHA2-256
476,125 UART: [kat] SHA2-384
482,109 UART: [kat] SHA2-512-ACC
485,111 UART: [kat] ECC-384
2,945,518 UART: [kat] HMAC-384Kdf
2,969,929 UART: [kat] LMS
3,499,338 UART: [kat] --
3,505,034 UART: [cold-reset] ++
3,507,111 UART: [fht] FHT @ 0x50003400
3,519,099 UART: [idev] ++
3,519,664 UART: [idev] CDI.KEYID = 6
3,520,579 UART: [idev] SUBJECT.KEYID = 7
3,521,750 UART: [idev] UDS.KEYID = 0
3,522,792 ready_for_fw is high
3,523,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,046 UART: [idev] Erasing UDS.KEYID = 0
6,024,329 UART: [idev] Sha1 KeyId Algorithm
6,047,557 UART: [idev] --
6,051,763 UART: [ldev] ++
6,052,396 UART: [ldev] CDI.KEYID = 6
6,053,296 UART: [ldev] SUBJECT.KEYID = 5
6,054,458 UART: [ldev] AUTHORITY.KEYID = 7
6,055,692 UART: [ldev] FE.KEYID = 1
6,099,663 UART: [ldev] Erasing FE.KEYID = 1
8,602,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,250 UART: [ldev] --
10,413,321 UART: [fwproc] Wait for Commands...
10,415,952 UART: [fwproc] Recv command 0x46574c44
10,418,043 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,157 >>> mbox cmd response: success
14,281,704 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,285,602 UART: [afmc] ++
14,286,222 UART: [afmc] CDI.KEYID = 6
14,287,137 UART: [afmc] SUBJECT.KEYID = 7
14,288,321 UART: [afmc] AUTHORITY.KEYID = 5
16,826,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,162 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,363 UART: [afmc] --
18,622,909 UART: [cold-reset] --
18,627,096 UART: [state] Locking Datavault
18,631,431 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,071 UART: [state] Locking ICCM
18,635,601 UART: [exit] Launching FMC @ 0x40000130
18,644,052 UART:
18,644,290 UART: Running Caliptra FMC ...
18,645,387 UART:
18,645,584 UART: [state] CFI Enabled
18,707,442 UART: [fht] FMC Alias Private Key: 7
20,471,173 UART: [art] Extend RT PCRs Done
20,472,372 UART: [art] Lock RT PCRs Done
20,474,127 UART: [art] Populate DV Done
20,479,534 UART: [fht] FMC Alias Private Key: 7
20,481,127 UART: [art] Derive CDI
20,481,941 UART: [art] Store in in slot 0x4
20,539,930 UART: [art] Derive Key Pair
20,540,961 UART: [art] Store priv key in slot 0x5
23,004,036 UART: [art] Derive Key Pair - Done
23,016,663 UART: [art] Signing Cert with AUTHO
23,018,002 UART: RITY.KEYID = 7
24,730,132 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,610 UART: [art] PUB.X = 64586690A2BB59F47610379A778492B23968F18004D89FEE9035F115D1431D2E55D606D7C2702A3CB08325AC1CA0313F
24,738,897 UART: [art] PUB.Y = 34E34A8280CE700BE87C5F0356ECC6D8933C42984F54921AE3F2E0B16F77C2F0FD581257EC850DE77BE729773242E039
24,746,138 UART: [art] SIG.R = 195FFCE3F3BB430AF10FF73DBD2B546B570F3E7B66BA9576AC1D862E8DAB3BB1F7105D8D461864841A104CCA525F5295
24,753,535 UART: [art] SIG.S = 0827C402A4624D76E17377864D599945111E55F293D80E8E10DA1DEAC29C2E45F78DC488F500012A8880FC960D61ED1A
25,732,559 UART: Caliptra RT
25,733,270 UART: [state] CFI Enabled
25,898,910 UART: [rt] RT listening for mailbox commands...
25,930,865 UART: [rt]cmd =0x50435245, len=56
25,932,624 >>> mbox cmd response: failed
25,932,933 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,963,076 UART: [rt]cmd =0x50435245, len=56
25,964,777 >>> mbox cmd response: failed
25,965,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,995,188 UART: [rt]cmd =0x50435245, len=56
25,997,084 >>> mbox cmd response: failed
25,997,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,027,435 UART: [rt]cmd =0x50435245, len=56
26,029,349 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,383,209 ready_for_fw is high
3,383,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,076,141 >>> mbox cmd response: success
14,076,862 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,361,132 UART:
18,361,538 UART: Running Caliptra FMC ...
18,362,629 UART:
18,362,784 UART: [state] CFI Enabled
18,432,194 UART: [fht] FMC Alias Private Key: 7
20,196,270 UART: [art] Extend RT PCRs Done
20,197,496 UART: [art] Lock RT PCRs Done
20,199,202 UART: [art] Populate DV Done
20,204,404 UART: [fht] FMC Alias Private Key: 7
20,206,061 UART: [art] Derive CDI
20,206,879 UART: [art] Store in in slot 0x4
20,265,627 UART: [art] Derive Key Pair
20,266,661 UART: [art] Store priv key in slot 0x5
22,729,029 UART: [art] Derive Key Pair - Done
22,742,154 UART: [art] Signing Cert with AUTHO
22,743,644 UART: RITY.KEYID = 7
24,454,903 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,401 UART: [art] PUB.X = 740E50F65433EA8D8947BEAB8B2E555C895FDD20DD52F83E88A04B8A11E94253D1DB2D71F1FE16C12F7E22C6B1267615
24,463,663 UART: [art] PUB.Y = 3AEC1680A3F6D8DFABD05837BD8D9F4440F9C105EB2ACD87FAE55E3D940F48D159FFF368A946DEB796F11193715F92A0
24,470,979 UART: [art] SIG.R = C7E68DEC9AE79F9ECB7E8D0B5455E4F9F9EC15DE4B8E9122C4603BD6547A1D7B13B73DC2ED0BF02FB256B0E0D43D9E5E
24,478,376 UART: [art] SIG.S = 5B1A93D25D7BCB4194671907458AF66118605635C7F6342E9E9AC79C6132C75E43E97845A9E140A81F52EC09AE807F93
25,457,518 UART: Caliptra RT
25,458,225 UART: [state] CFI Enabled
25,622,351 UART: [rt] RT listening for mailbox commands...
25,654,182 UART: [rt]cmd =0x50435245, len=56
25,655,947 >>> mbox cmd response: failed
25,656,266 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,686,468 UART: [rt]cmd =0x50435245, len=56
25,688,117 >>> mbox cmd response: failed
25,688,387 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,718,502 UART: [rt]cmd =0x50435245, len=56
25,720,070 >>> mbox cmd response: failed
25,720,342 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,750,477 UART: [rt]cmd =0x50435245, len=56
25,752,434 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,419 UART:
192,764 UART: Running Caliptra ROM ...
193,938 UART:
603,676 UART: [state] CFI Enabled
617,614 UART: [state] LifecycleState = Unprovisioned
619,410 UART: [state] DebugLocked = No
621,631 UART: [state] WD Timer not started. Device not locked for debugging
624,804 UART: [kat] SHA2-256
803,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,470 UART: [kat] ++
815,914 UART: [kat] sha1
827,984 UART: [kat] SHA2-256
830,992 UART: [kat] SHA2-384
835,722 UART: [kat] SHA2-512-ACC
838,655 UART: [kat] ECC-384
3,279,477 UART: [kat] HMAC-384Kdf
3,292,499 UART: [kat] LMS
3,821,982 UART: [kat] --
3,826,837 UART: [cold-reset] ++
3,828,433 UART: [fht] FHT @ 0x50003400
3,838,345 UART: [idev] ++
3,838,897 UART: [idev] CDI.KEYID = 6
3,839,918 UART: [idev] SUBJECT.KEYID = 7
3,841,136 UART: [idev] UDS.KEYID = 0
3,842,036 ready_for_fw is high
3,842,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,957 UART: [idev] Erasing UDS.KEYID = 0
6,311,428 UART: [idev] Sha1 KeyId Algorithm
6,335,130 UART: [idev] --
6,339,933 UART: [ldev] ++
6,340,498 UART: [ldev] CDI.KEYID = 6
6,341,405 UART: [ldev] SUBJECT.KEYID = 5
6,342,551 UART: [ldev] AUTHORITY.KEYID = 7
6,343,827 UART: [ldev] FE.KEYID = 1
6,353,042 UART: [ldev] Erasing FE.KEYID = 1
8,826,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,631 UART: [ldev] --
10,617,916 UART: [fwproc] Wait for Commands...
10,619,902 UART: [fwproc] Recv command 0x46574c44
10,621,988 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,319 >>> mbox cmd response: success
14,482,882 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,486,760 UART: [afmc] ++
14,487,338 UART: [afmc] CDI.KEYID = 6
14,488,263 UART: [afmc] SUBJECT.KEYID = 7
14,489,418 UART: [afmc] AUTHORITY.KEYID = 5
16,987,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,451 UART: [afmc] --
18,784,532 UART: [cold-reset] --
18,787,574 UART: [state] Locking Datavault
18,793,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,934 UART: [state] Locking ICCM
18,796,101 UART: [exit] Launching FMC @ 0x40000130
18,804,495 UART:
18,804,727 UART: Running Caliptra FMC ...
18,805,836 UART:
18,805,995 UART: [state] CFI Enabled
18,814,143 UART: [fht] FMC Alias Private Key: 7
20,570,876 UART: [art] Extend RT PCRs Done
20,572,093 UART: [art] Lock RT PCRs Done
20,573,606 UART: [art] Populate DV Done
20,578,953 UART: [fht] FMC Alias Private Key: 7
20,580,644 UART: [art] Derive CDI
20,581,448 UART: [art] Store in in slot 0x4
20,623,658 UART: [art] Derive Key Pair
20,624,694 UART: [art] Store priv key in slot 0x5
23,051,348 UART: [art] Derive Key Pair - Done
23,064,332 UART: [art] Signing Cert with AUTHO
23,065,639 UART: RITY.KEYID = 7
24,771,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,850 UART: [art] PUB.X = F025AF512C5ACC3944FFDCC9C6DCC473F97B5FC455DCFC2073408EC44E2698D26ED03F9630F8FB01D5DC4389B589A9DA
24,780,193 UART: [art] PUB.Y = 9D010BD418EE470D0DA68BB534311D4EC70C2C87147A51E51B8C69534A8AC114BCBC4CE4636FF78CE8E519B18C2E5886
24,787,423 UART: [art] SIG.R = 1C4D40DC8C82A8FA288B4F5D1889D826678DEFDCBFEE5D8A2ECB4FA88A7F15607FC3F99313B3035E6FDA121768220D7D
24,794,857 UART: [art] SIG.S = 9288AABB59CB06DE1BECCA74E790747ACE68FC59968CDC2C984356B98211EEBAF0482C16ECDEF887F0C812A9C7045BE6
25,773,781 UART: Caliptra RT
25,774,475 UART: [state] CFI Enabled
25,891,225 UART: [rt] RT listening for mailbox commands...
25,922,906 UART: [rt]cmd =0x50435245, len=56
25,924,542 >>> mbox cmd response: failed
25,924,838 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,954,992 UART: [rt]cmd =0x50435245, len=56
25,956,506 >>> mbox cmd response: failed
25,956,765 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,986,896 UART: [rt]cmd =0x50435245, len=56
25,988,798 >>> mbox cmd response: failed
25,989,060 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,019,033 UART: [rt]cmd =0x50435245, len=56
26,020,682 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,697,890 ready_for_fw is high
3,698,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,591 >>> mbox cmd response: success
14,276,405 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,522,648 UART:
18,523,069 UART: Running Caliptra FMC ...
18,524,206 UART:
18,524,354 UART: [state] CFI Enabled
18,532,091 UART: [fht] FMC Alias Private Key: 7
20,289,228 UART: [art] Extend RT PCRs Done
20,290,447 UART: [art] Lock RT PCRs Done
20,292,134 UART: [art] Populate DV Done
20,297,327 UART: [fht] FMC Alias Private Key: 7
20,299,019 UART: [art] Derive CDI
20,299,830 UART: [art] Store in in slot 0x4
20,342,265 UART: [art] Derive Key Pair
20,343,294 UART: [art] Store priv key in slot 0x5
22,770,336 UART: [art] Derive Key Pair - Done
22,783,283 UART: [art] Signing Cert with AUTHO
22,784,580 UART: RITY.KEYID = 7
24,489,767 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,270 UART: [art] PUB.X = 2E3ED9940E8AC24F57B415CD4110144FAAA755A087CFD2415F36C01510938354992AF029D578E11A742B50BBC6CA17A6
24,498,506 UART: [art] PUB.Y = EE609FA455E157550F1230A4A83B244006AF93DE53DCF62EC1651376CB531CE339B8A98951F0F009B209F183436733D3
24,505,762 UART: [art] SIG.R = 775DB51DA2B9F06FD6C1A18178D7C6AAE061A552EA69DAB599F1E3BE988717CD1AA7820CB4BAE352077D7B722E260893
24,513,144 UART: [art] SIG.S = 5C8307D869B3C2B1D40F52A18463E075FE8F859A7CFE61BCE47C40BEAF1B655D8C080C982540A0C8F93A47194A3E1C43
25,492,176 UART: Caliptra RT
25,492,891 UART: [state] CFI Enabled
25,610,528 UART: [rt] RT listening for mailbox commands...
25,642,264 UART: [rt]cmd =0x50435245, len=56
25,643,901 >>> mbox cmd response: failed
25,644,209 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,674,621 UART: [rt]cmd =0x50435245, len=56
25,676,353 >>> mbox cmd response: failed
25,676,619 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,706,702 UART: [rt]cmd =0x50435245, len=56
25,708,227 >>> mbox cmd response: failed
25,708,484 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,738,614 UART: [rt]cmd =0x50435245, len=56
25,740,399 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,202 UART:
192,583 UART: Running Caliptra ROM ...
193,772 UART:
193,925 UART: [state] CFI Enabled
265,380 UART: [state] LifecycleState = Unprovisioned
267,802 UART: [state] DebugLocked = No
269,693 UART: [state] WD Timer not started. Device not locked for debugging
274,163 UART: [kat] SHA2-256
464,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,854 UART: [kat] ++
475,301 UART: [kat] sha1
486,743 UART: [kat] SHA2-256
489,760 UART: [kat] SHA2-384
494,117 UART: [kat] SHA2-512-ACC
496,712 UART: [kat] ECC-384
2,949,210 UART: [kat] HMAC-384Kdf
2,971,956 UART: [kat] LMS
3,503,796 UART: [kat] --
3,508,717 UART: [cold-reset] ++
3,510,574 UART: [fht] FHT @ 0x50003400
3,522,542 UART: [idev] ++
3,523,254 UART: [idev] CDI.KEYID = 6
3,524,176 UART: [idev] SUBJECT.KEYID = 7
3,525,346 UART: [idev] UDS.KEYID = 0
3,526,272 ready_for_fw is high
3,526,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,473 UART: [idev] Erasing UDS.KEYID = 0
6,032,531 UART: [idev] Sha1 KeyId Algorithm
6,056,194 UART: [idev] --
6,061,589 UART: [ldev] ++
6,062,308 UART: [ldev] CDI.KEYID = 6
6,063,228 UART: [ldev] SUBJECT.KEYID = 5
6,064,338 UART: [ldev] AUTHORITY.KEYID = 7
6,065,570 UART: [ldev] FE.KEYID = 1
6,102,200 UART: [ldev] Erasing FE.KEYID = 1
8,608,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,212 UART: [ldev] --
10,414,935 UART: [fwproc] Wait for Commands...
10,416,645 UART: [fwproc] Recv command 0x46574c44
10,418,949 UART: [fwproc] Recv'd Img size: 114448 bytes
13,876,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,756 >>> mbox cmd response: success
14,607,333 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,610,982 UART: [afmc] ++
14,611,625 UART: [afmc] CDI.KEYID = 6
14,612,682 UART: [afmc] SUBJECT.KEYID = 7
14,614,143 UART: [afmc] AUTHORITY.KEYID = 5
17,155,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,631 UART: [afmc] --
18,949,368 UART: [cold-reset] --
18,953,554 UART: [state] Locking Datavault
18,959,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,345 UART: [state] Locking ICCM
18,962,829 UART: [exit] Launching FMC @ 0x40000130
18,971,498 UART:
18,971,726 UART: Running Caliptra FMC ...
18,972,749 UART:
18,972,896 UART: [state] CFI Enabled
19,034,473 UART: [fht] FMC Alias Private Key: 7
20,798,472 UART: [art] Extend RT PCRs Done
20,799,692 UART: [art] Lock RT PCRs Done
20,801,238 UART: [art] Populate DV Done
20,806,810 UART: [fht] FMC Alias Private Key: 7
20,808,515 UART: [art] Derive CDI
20,809,328 UART: [art] Store in in slot 0x4
20,867,509 UART: [art] Derive Key Pair
20,868,540 UART: [art] Store priv key in slot 0x5
23,331,135 UART: [art] Derive Key Pair - Done
23,344,343 UART: [art] Signing Cert with AUTHO
23,345,644 UART: RITY.KEYID = 7
25,057,344 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,857 UART: [art] PUB.X = A10349E7CC8D23192E6B9BBA7987A40AA0EE180C3451C474EC723CE152B0D7D420F613F00E36366816CF99E9117CBD9E
25,066,106 UART: [art] PUB.Y = 5F245B19D0EE80CD7EB3FCF42C958E3C8EBA329004C5FE50D86714BF83AD7EE57F1F8644A78DA606089425B627C3C3F0
25,073,336 UART: [art] SIG.R = 0C26A0D9293B3B6B333FDDE1764EB8E8BFC9B0CA5EE659FCF6706061547BF49C8B1A9D88EE7E18A5A065A302F5201BDF
25,080,773 UART: [art] SIG.S = 16FCFE89C40F720CA2722A1882FDF37DC3C11202D195D137BD9CC8CC642F15B4932751C0FBFD782AEC567E06B90A66D9
26,059,483 UART: Caliptra RT
26,060,193 UART: [state] CFI Enabled
26,226,286 UART: [rt] RT listening for mailbox commands...
26,257,970 UART: [rt]cmd =0x50435245, len=56
26,259,828 >>> mbox cmd response: failed
26,260,117 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,290,430 UART: [rt]cmd =0x50435245, len=56
26,292,321 >>> mbox cmd response: failed
26,292,612 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,322,812 UART: [rt]cmd =0x50435245, len=56
26,324,672 >>> mbox cmd response: failed
26,324,931 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,355,011 UART: [rt]cmd =0x50435245, len=56
26,356,979 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,418,711 ready_for_fw is high
3,419,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,721,475 >>> mbox cmd response: success
14,722,249 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,003,224 UART:
19,003,623 UART: Running Caliptra FMC ...
19,004,733 UART:
19,004,889 UART: [state] CFI Enabled
19,073,344 UART: [fht] FMC Alias Private Key: 7
20,837,081 UART: [art] Extend RT PCRs Done
20,838,304 UART: [art] Lock RT PCRs Done
20,840,009 UART: [art] Populate DV Done
20,845,589 UART: [fht] FMC Alias Private Key: 7
20,847,244 UART: [art] Derive CDI
20,847,980 UART: [art] Store in in slot 0x4
20,905,761 UART: [art] Derive Key Pair
20,906,797 UART: [art] Store priv key in slot 0x5
23,369,546 UART: [art] Derive Key Pair - Done
23,382,601 UART: [art] Signing Cert with AUTHO
23,383,939 UART: RITY.KEYID = 7
25,096,277 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,766 UART: [art] PUB.X = 22895DA54F1EE422E847432265CF0146DB8E14F0860CE3B1F5C8940D97016CB627AE1DF5F27BAE51D7B5C4AFEF1201F1
25,105,077 UART: [art] PUB.Y = 90E31CC0748EE09C448BC8B244168D5603329842E527D12CB9181DC4C8A97B32675B4A29A1F448F11ECE6C65BB0B8C23
25,112,325 UART: [art] SIG.R = 8597167C9F17BE99E81A03F1E5DA641E0441F20CA14B25692FFECA4A05CED840B09858EECE78EB03F1C554EC1C26EDE0
25,119,708 UART: [art] SIG.S = 85AEF0EF58CF03DAA4D6A24F7651450A6120E230B7CE9632E9FC164057D97F1D5335869CC87D4712B57A4BC89C3CF20B
26,098,666 UART: Caliptra RT
26,099,373 UART: [state] CFI Enabled
26,263,926 UART: [rt] RT listening for mailbox commands...
26,295,776 UART: [rt]cmd =0x50435245, len=56
26,297,749 >>> mbox cmd response: failed
26,298,085 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,328,178 UART: [rt]cmd =0x50435245, len=56
26,329,932 >>> mbox cmd response: failed
26,330,215 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,360,370 UART: [rt]cmd =0x50435245, len=56
26,362,266 >>> mbox cmd response: failed
26,362,539 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,392,728 UART: [rt]cmd =0x50435245, len=56
26,394,427 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,427 UART:
192,893 UART: Running Caliptra ROM ...
194,032 UART:
603,548 UART: [state] CFI Enabled
615,012 UART: [state] LifecycleState = Unprovisioned
617,391 UART: [state] DebugLocked = No
619,122 UART: [state] WD Timer not started. Device not locked for debugging
624,146 UART: [kat] SHA2-256
814,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,855 UART: [kat] ++
825,341 UART: [kat] sha1
836,800 UART: [kat] SHA2-256
839,771 UART: [kat] SHA2-384
845,904 UART: [kat] SHA2-512-ACC
848,498 UART: [kat] ECC-384
3,291,704 UART: [kat] HMAC-384Kdf
3,305,522 UART: [kat] LMS
3,837,362 UART: [kat] --
3,840,453 UART: [cold-reset] ++
3,841,668 UART: [fht] FHT @ 0x50003400
3,853,699 UART: [idev] ++
3,854,330 UART: [idev] CDI.KEYID = 6
3,855,354 UART: [idev] SUBJECT.KEYID = 7
3,856,519 UART: [idev] UDS.KEYID = 0
3,857,438 ready_for_fw is high
3,857,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,422 UART: [idev] Erasing UDS.KEYID = 0
6,330,506 UART: [idev] Sha1 KeyId Algorithm
6,352,816 UART: [idev] --
6,357,776 UART: [ldev] ++
6,358,504 UART: [ldev] CDI.KEYID = 6
6,359,417 UART: [ldev] SUBJECT.KEYID = 5
6,360,570 UART: [ldev] AUTHORITY.KEYID = 7
6,361,739 UART: [ldev] FE.KEYID = 1
6,374,321 UART: [ldev] Erasing FE.KEYID = 1
8,853,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,109 UART: [ldev] --
10,644,361 UART: [fwproc] Wait for Commands...
10,647,522 UART: [fwproc] Recv command 0x46574c44
10,649,776 UART: [fwproc] Recv'd Img size: 114448 bytes
14,102,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,834,707 >>> mbox cmd response: success
14,835,237 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,839,324 UART: [afmc] ++
14,840,048 UART: [afmc] CDI.KEYID = 6
14,841,239 UART: [afmc] SUBJECT.KEYID = 7
14,842,683 UART: [afmc] AUTHORITY.KEYID = 5
17,347,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,017 UART: [afmc] --
19,144,277 UART: [cold-reset] --
19,149,154 UART: [state] Locking Datavault
19,155,710 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,935 UART: [state] Locking ICCM
19,159,531 UART: [exit] Launching FMC @ 0x40000130
19,168,195 UART:
19,168,422 UART: Running Caliptra FMC ...
19,169,441 UART:
19,169,580 UART: [state] CFI Enabled
19,177,783 UART: [fht] FMC Alias Private Key: 7
20,934,721 UART: [art] Extend RT PCRs Done
20,935,938 UART: [art] Lock RT PCRs Done
20,937,630 UART: [art] Populate DV Done
20,942,920 UART: [fht] FMC Alias Private Key: 7
20,944,557 UART: [art] Derive CDI
20,945,284 UART: [art] Store in in slot 0x4
20,988,132 UART: [art] Derive Key Pair
20,989,117 UART: [art] Store priv key in slot 0x5
23,416,082 UART: [art] Derive Key Pair - Done
23,428,965 UART: [art] Signing Cert with AUTHO
23,430,265 UART: RITY.KEYID = 7
25,135,508 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,018 UART: [art] PUB.X = FAD3AAD59AF160E8B566123202849AA2B100F8C767B5C886DA1F85924F8294789D6F0DB1C29B439DA67FB47335F949E2
25,144,315 UART: [art] PUB.Y = 52247222DF29F9ED6A8206DBBF815BCA139868032755FFBF719090FE931CF2D718966F40D34569BD21075379553118C2
25,151,531 UART: [art] SIG.R = 4FFE9059D6A98EE6DFD80B994565D52A947E9F94C098C5D7213022CB71542854EA68DE370C5A1881341E7AB4DC1BDA43
25,158,951 UART: [art] SIG.S = 7EC50346324EBE692F9586DA86B8E8EFECAA195A495914D106300E1F9CF39B1D3CD5F43226CCF627F29EFE148650066E
26,137,993 UART: Caliptra RT
26,138,679 UART: [state] CFI Enabled
26,256,267 UART: [rt] RT listening for mailbox commands...
26,287,782 UART: [rt]cmd =0x50435245, len=56
26,289,802 >>> mbox cmd response: failed
26,290,096 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,320,075 UART: [rt]cmd =0x50435245, len=56
26,321,668 >>> mbox cmd response: failed
26,321,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,352,133 UART: [rt]cmd =0x50435245, len=56
26,353,927 >>> mbox cmd response: failed
26,354,191 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,384,175 UART: [rt]cmd =0x50435245, len=56
26,385,855 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,759,457 ready_for_fw is high
3,759,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,289 >>> mbox cmd response: success
14,951,902 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,210,672 UART:
19,211,064 UART: Running Caliptra FMC ...
19,212,153 UART:
19,212,298 UART: [state] CFI Enabled
19,220,211 UART: [fht] FMC Alias Private Key: 7
20,976,727 UART: [art] Extend RT PCRs Done
20,977,957 UART: [art] Lock RT PCRs Done
20,979,765 UART: [art] Populate DV Done
20,985,121 UART: [fht] FMC Alias Private Key: 7
20,986,655 UART: [art] Derive CDI
20,987,410 UART: [art] Store in in slot 0x4
21,030,162 UART: [art] Derive Key Pair
21,031,207 UART: [art] Store priv key in slot 0x5
23,457,946 UART: [art] Derive Key Pair - Done
23,471,208 UART: [art] Signing Cert with AUTHO
23,472,511 UART: RITY.KEYID = 7
25,178,002 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,510 UART: [art] PUB.X = F219831B14AEDC722C5B6DAF6D118F41D3207C6A04AC461A8391E733937D5B37EB1E02822E691C764AB993AB4AB532C7
25,186,740 UART: [art] PUB.Y = 0176DBE3AE0E225182A9EFFBB3C58FD85627CFEAD35BF3EA0144D02F1E84E801D1AF2604F68583D81E34CEFA7B50DCC7
25,194,043 UART: [art] SIG.R = 6D600E4ADDACDA90A29340ED157920FE300AC23123E2EBBC7F3D0792FA4D4914C85ABE68E8392371B3A9390816B08524
25,201,448 UART: [art] SIG.S = 27462D8897877CA2CF9C95FFCF8F481A8F2320002B3269970B6AE05C66523338D46249AAF748B8D8A488266053AB7CF6
26,180,294 UART: Caliptra RT
26,180,976 UART: [state] CFI Enabled
26,298,866 UART: [rt] RT listening for mailbox commands...
26,330,787 UART: [rt]cmd =0x50435245, len=56
26,332,818 >>> mbox cmd response: failed
26,333,150 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,363,235 UART: [rt]cmd =0x50435245, len=56
26,365,077 >>> mbox cmd response: failed
26,365,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,395,485 UART: [rt]cmd =0x50435245, len=56
26,397,285 >>> mbox cmd response: failed
26,397,542 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,427,510 UART: [rt]cmd =0x50435245, len=56
26,429,269 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,089 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,110 UART: [idev] Erasing UDS.KEYID = 0
1,504,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,426 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,520,865 UART: [ldev] Erasing FE.KEYID = 1
1,546,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,715 UART: [fwproc] Waiting for Commands...
1,586,504 UART: [fwproc] Received command 0x46574c44
1,587,295 UART: [fwproc] Received Image of size 114448 bytes
2,886,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,783 >>> mbox cmd response: success
3,078,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,080,041 UART: [afmc] ++
3,080,209 UART: [afmc] CDI.KEYID = 6
3,080,571 UART: [afmc] SUBJECT.KEYID = 7
3,080,996 UART: [afmc] AUTHORITY.KEYID = 5
3,115,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,388 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,078 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,065 UART: [afmc] --
3,158,979 UART: [cold-reset] --
3,160,059 UART: [state] Locking Datavault
3,161,098 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,702 UART: [state] Locking ICCM
3,162,230 UART: [exit] Launching FMC @ 0x40000130
3,167,559 UART:
3,167,575 UART: Running Caliptra FMC ...
3,167,983 UART:
3,168,037 UART: [state] CFI Enabled
3,178,440 UART: [fht] FMC Alias Private Key: 7
3,286,219 UART: [art] Extend RT PCRs Done
3,286,647 UART: [art] Lock RT PCRs Done
3,288,225 UART: [art] Populate DV Done
3,296,560 UART: [fht] FMC Alias Private Key: 7
3,297,490 UART: [art] Derive CDI
3,297,770 UART: [art] Store in in slot 0x4
3,383,421 UART: [art] Derive Key Pair
3,383,781 UART: [art] Store priv key in slot 0x5
3,396,825 UART: [art] Derive Key Pair - Done
3,411,546 UART: [art] Signing Cert with AUTHO
3,412,026 UART: RITY.KEYID = 7
3,427,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,523 UART: [art] PUB.X = 2C900EC9065BF9AFFCCCDADB8E3B09D1D79A19C1A714BC7B39815CA0BE404E3A936C2C55CF949D521A0B4BA55F9582CF
3,435,305 UART: [art] PUB.Y = 0948D532D97E7D484FECA5EA0772FE74D6767165732ACB9CACA8C4FB628FAC99A842C2B8E62148A331072C49DBA6F89A
3,442,258 UART: [art] SIG.R = 26817147D5CF03495340D69D938A160EF6631C2FC1456AA786AB681769E569994ACB188B70D92BABD35D5E9C18004F3A
3,448,998 UART: [art] SIG.S = 8C736F0E7444A558574478BBA0DCE8F72EB7B0D218222F5681ACE0DC7006BCC4295B19672C673639DDDC75C52DDC41D6
3,473,291 UART: Caliptra RT
3,473,544 UART: [state] CFI Enabled
3,582,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,945 UART: [rt]cmd =0x50435245, len=56
3,614,605 >>> mbox cmd response: failed
3,614,605 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,283 UART: [rt]cmd =0x50435245, len=56
3,645,779 >>> mbox cmd response: failed
3,645,779 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,457 UART: [rt]cmd =0x50435245, len=56
3,676,869 >>> mbox cmd response: failed
3,676,869 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,867 UART: [rt]cmd =0x50435245, len=56
3,708,323 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,231 ready_for_fw is high
1,362,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,269 >>> mbox cmd response: success
2,928,269 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,829 UART:
2,989,845 UART: Running Caliptra FMC ...
2,990,253 UART:
2,990,307 UART: [state] CFI Enabled
3,001,196 UART: [fht] FMC Alias Private Key: 7
3,109,557 UART: [art] Extend RT PCRs Done
3,109,985 UART: [art] Lock RT PCRs Done
3,111,201 UART: [art] Populate DV Done
3,119,560 UART: [fht] FMC Alias Private Key: 7
3,120,606 UART: [art] Derive CDI
3,120,886 UART: [art] Store in in slot 0x4
3,206,477 UART: [art] Derive Key Pair
3,206,837 UART: [art] Store priv key in slot 0x5
3,220,105 UART: [art] Derive Key Pair - Done
3,234,770 UART: [art] Signing Cert with AUTHO
3,235,250 UART: RITY.KEYID = 7
3,250,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,285 UART: [art] PUB.X = 0831FB116F491E41FFA63DDE44E8FB47FBDBB76877ACA43EC8C335412A70579AAA5FEA2DF099B91ECD5DD97E63ECFD33
3,258,078 UART: [art] PUB.Y = BD419AA127013058C2B79F371231D4111581CDE72E4595758ECFEC6A030248F863E4FB97224B6547618AC7EC5B541E30
3,265,015 UART: [art] SIG.R = C9C6C56621EFF8D782884BD73A76D193F79A19EDD7349183E8F882F695ED4B549BB1811B33594A061A0C4EDEF63721C4
3,271,783 UART: [art] SIG.S = EB0BBD905A97BCE3EF8C3C94338611859B7319EC050F924F2A65F7298B05DDCE877B757ABD45A3944FDDCF1D20971DD2
3,295,230 UART: Caliptra RT
3,295,483 UART: [state] CFI Enabled
3,403,195 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,191 UART: [rt]cmd =0x50435245, len=56
3,435,639 >>> mbox cmd response: failed
3,435,639 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,185 UART: [rt]cmd =0x50435245, len=56
3,466,433 >>> mbox cmd response: failed
3,466,433 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,327 UART: [rt]cmd =0x50435245, len=56
3,497,705 >>> mbox cmd response: failed
3,497,705 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,345 UART: [rt]cmd =0x50435245, len=56
3,529,007 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,704 UART: [kat] SHA2-256
892,642 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,298 UART: [cold-reset] ++
1,476,684 UART: [fht] Storing FHT @ 0x50003400
1,479,497 UART: [idev] ++
1,479,665 UART: [idev] CDI.KEYID = 6
1,480,025 UART: [idev] SUBJECT.KEYID = 7
1,480,449 UART: [idev] UDS.KEYID = 0
1,480,794 ready_for_fw is high
1,480,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,179 UART: [idev] --
1,515,184 UART: [ldev] ++
1,515,352 UART: [ldev] CDI.KEYID = 6
1,515,715 UART: [ldev] SUBJECT.KEYID = 5
1,516,141 UART: [ldev] AUTHORITY.KEYID = 7
1,516,604 UART: [ldev] FE.KEYID = 1
1,522,068 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,518 UART: [fwproc] Waiting for Commands...
1,588,153 UART: [fwproc] Received command 0x46574c44
1,588,944 UART: [fwproc] Received Image of size 114448 bytes
2,888,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,875 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,376 >>> mbox cmd response: success
3,081,376 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,082,538 UART: [afmc] ++
3,082,706 UART: [afmc] CDI.KEYID = 6
3,083,068 UART: [afmc] SUBJECT.KEYID = 7
3,083,493 UART: [afmc] AUTHORITY.KEYID = 5
3,117,976 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,457 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,147 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,006 UART: [afmc] --
3,160,972 UART: [cold-reset] --
3,161,742 UART: [state] Locking Datavault
3,162,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,547 UART: [state] Locking ICCM
3,164,105 UART: [exit] Launching FMC @ 0x40000130
3,169,434 UART:
3,169,450 UART: Running Caliptra FMC ...
3,169,858 UART:
3,170,001 UART: [state] CFI Enabled
3,181,016 UART: [fht] FMC Alias Private Key: 7
3,289,829 UART: [art] Extend RT PCRs Done
3,290,257 UART: [art] Lock RT PCRs Done
3,291,907 UART: [art] Populate DV Done
3,300,222 UART: [fht] FMC Alias Private Key: 7
3,301,200 UART: [art] Derive CDI
3,301,480 UART: [art] Store in in slot 0x4
3,387,231 UART: [art] Derive Key Pair
3,387,591 UART: [art] Store priv key in slot 0x5
3,400,741 UART: [art] Derive Key Pair - Done
3,415,999 UART: [art] Signing Cert with AUTHO
3,416,479 UART: RITY.KEYID = 7
3,431,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,346 UART: [art] PUB.X = F055417727A4AB0FE5FCDF83C8A0C76A2AFFDBBDE03D4AAA5C1BA4E3C4275A1AB4EC07EAD0B8A660153CB8EB0B635010
3,439,137 UART: [art] PUB.Y = 6F9C7B3679B4820AD8FF03D5D4A4BB4BBB29DF8747AB0D982E41C31BA7ADEFFB01B895718C801AF13D15F946794C0773
3,446,086 UART: [art] SIG.R = C5377BB3A95741D2F9B73F6E7FD4FE4796AAFDF609BC1D02B2D857B8778608068AE8740FD543B8FDC535551ED61B754D
3,452,851 UART: [art] SIG.S = 5B0B36A9CB88121F3005BD131D5C8E149D9A8E82D570BADE4D46D808B8248A91F3F8A4EC0655CA1D697AA7810364B5D3
3,476,573 UART: Caliptra RT
3,476,918 UART: [state] CFI Enabled
3,585,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,671 UART: [rt]cmd =0x50435245, len=56
3,618,063 >>> mbox cmd response: failed
3,618,063 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,077 UART: [rt]cmd =0x50435245, len=56
3,649,397 >>> mbox cmd response: failed
3,649,397 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,999 UART: [rt]cmd =0x50435245, len=56
3,680,569 >>> mbox cmd response: failed
3,680,569 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,163 UART: [rt]cmd =0x50435245, len=56
3,711,595 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,106 >>> mbox cmd response: success
2,930,106 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,992,800 UART:
2,992,816 UART: Running Caliptra FMC ...
2,993,224 UART:
2,993,367 UART: [state] CFI Enabled
3,004,158 UART: [fht] FMC Alias Private Key: 7
3,111,905 UART: [art] Extend RT PCRs Done
3,112,333 UART: [art] Lock RT PCRs Done
3,113,745 UART: [art] Populate DV Done
3,121,920 UART: [fht] FMC Alias Private Key: 7
3,123,064 UART: [art] Derive CDI
3,123,344 UART: [art] Store in in slot 0x4
3,208,989 UART: [art] Derive Key Pair
3,209,349 UART: [art] Store priv key in slot 0x5
3,222,429 UART: [art] Derive Key Pair - Done
3,236,956 UART: [art] Signing Cert with AUTHO
3,237,436 UART: RITY.KEYID = 7
3,252,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,137 UART: [art] PUB.X = 553C3E64D504F35B8E77AA8D34A16067EC50464D38B7D7F6BD86C3D15EDDAC8C144B238415A79C7D3B42B7E66E66CBD9
3,259,916 UART: [art] PUB.Y = E8EDB05608E3B41E21383D4675061FB95AB96C513CE710DAEDD14FA8A678D5193479F2C0FCDA1FE30DD47E905C3CF8A5
3,266,873 UART: [art] SIG.R = 5F4C3641403471F9D993F69EFB99183AC7BD1726F3272ED51456363838F815341F9E3C88E806FE8A4866D7C8DA553F78
3,273,634 UART: [art] SIG.S = 7508C72690E30F13763FAC0BB46A8DD0E45B21004B21731BD8AE45C332CDE7648469451C4628C671BA16B112E393724F
3,297,308 UART: Caliptra RT
3,297,653 UART: [state] CFI Enabled
3,406,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,877 UART: [rt]cmd =0x50435245, len=56
3,438,493 >>> mbox cmd response: failed
3,438,493 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,021 UART: [rt]cmd =0x50435245, len=56
3,469,559 >>> mbox cmd response: failed
3,469,559 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,361 UART: [rt]cmd =0x50435245, len=56
3,500,717 >>> mbox cmd response: failed
3,500,717 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,361 UART: [rt]cmd =0x50435245, len=56
3,531,737 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
893,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,763 UART: [kat] ++
897,915 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,966 UART: [kat] SHA2-512-ACC
908,867 UART: [kat] ECC-384
918,814 UART: [kat] HMAC-384Kdf
923,560 UART: [kat] LMS
1,171,888 UART: [kat] --
1,172,965 UART: [cold-reset] ++
1,173,461 UART: [fht] FHT @ 0x50003400
1,176,022 UART: [idev] ++
1,176,190 UART: [idev] CDI.KEYID = 6
1,176,550 UART: [idev] SUBJECT.KEYID = 7
1,176,974 UART: [idev] UDS.KEYID = 0
1,177,319 ready_for_fw is high
1,177,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,548 UART: [idev] Erasing UDS.KEYID = 0
1,200,965 UART: [idev] Sha1 KeyId Algorithm
1,209,655 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,725 UART: [ldev] --
1,283,234 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,754 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,502 >>> mbox cmd response: success
2,776,502 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,580 UART: [afmc] ++
2,777,748 UART: [afmc] CDI.KEYID = 6
2,778,110 UART: [afmc] SUBJECT.KEYID = 7
2,778,535 UART: [afmc] AUTHORITY.KEYID = 5
2,814,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,633 UART: [afmc] --
2,857,669 UART: [cold-reset] --
2,858,439 UART: [state] Locking Datavault
2,859,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,062 UART: [state] Locking ICCM
2,860,632 UART: [exit] Launching FMC @ 0x40000130
2,865,961 UART:
2,865,977 UART: Running Caliptra FMC ...
2,866,385 UART:
2,866,439 UART: [state] CFI Enabled
2,876,818 UART: [fht] FMC Alias Private Key: 7
2,984,601 UART: [art] Extend RT PCRs Done
2,985,029 UART: [art] Lock RT PCRs Done
2,986,271 UART: [art] Populate DV Done
2,994,296 UART: [fht] FMC Alias Private Key: 7
2,995,234 UART: [art] Derive CDI
2,995,514 UART: [art] Store in in slot 0x4
3,080,899 UART: [art] Derive Key Pair
3,081,259 UART: [art] Store priv key in slot 0x5
3,093,709 UART: [art] Derive Key Pair - Done
3,108,657 UART: [art] Signing Cert with AUTHO
3,109,137 UART: RITY.KEYID = 7
3,124,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,204 UART: [art] PUB.X = 600D65B1D32133756D58B1271BD3B1737AC948DE0A8119D937D9C6FAB05B6C069787554A60519B2BD6D35ACC2EFFE2F7
3,131,971 UART: [art] PUB.Y = 74860B9B40F35024F9C62EFE4597E8F8D007490FA248DBB6C7EC3848C94581246A0E2BC0D484B8CC54C1C8AEB336F718
3,138,915 UART: [art] SIG.R = 3ABC6625E452B5E69CA1A697A6DD31CF16ADE7E30D36BC6B267B71C843C8A5E2E30BD310EE358DE2BC8EDBD6A6826DE6
3,145,703 UART: [art] SIG.S = 474E1ED46C10A75DE44C71375700264DC8E221AEDFC8D8990406F739FC62463E922680C2988D574C7E5C53FD52DE1842
3,169,044 UART: Caliptra RT
3,169,297 UART: [state] CFI Enabled
3,277,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,662 UART: [rt]cmd =0x50435245, len=56
3,310,192 >>> mbox cmd response: failed
3,310,192 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,866 UART: [rt]cmd =0x50435245, len=56
3,341,342 >>> mbox cmd response: failed
3,341,342 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,024 UART: [rt]cmd =0x50435245, len=56
3,372,686 >>> mbox cmd response: failed
3,372,686 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,294 UART: [rt]cmd =0x50435245, len=56
3,403,792 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,197 >>> mbox cmd response: success
2,628,197 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,575 UART:
2,689,591 UART: Running Caliptra FMC ...
2,689,999 UART:
2,690,053 UART: [state] CFI Enabled
2,700,742 UART: [fht] FMC Alias Private Key: 7
2,809,439 UART: [art] Extend RT PCRs Done
2,809,867 UART: [art] Lock RT PCRs Done
2,811,423 UART: [art] Populate DV Done
2,819,654 UART: [fht] FMC Alias Private Key: 7
2,820,686 UART: [art] Derive CDI
2,820,966 UART: [art] Store in in slot 0x4
2,906,613 UART: [art] Derive Key Pair
2,906,973 UART: [art] Store priv key in slot 0x5
2,920,017 UART: [art] Derive Key Pair - Done
2,934,746 UART: [art] Signing Cert with AUTHO
2,935,226 UART: RITY.KEYID = 7
2,950,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,399 UART: [art] PUB.X = 3593087E24758539B1D42E7637F814253BBA04668F1375D28CF2733CF267E2DFB40D7F0083E8B3608E7B26BBCA9BB493
2,958,136 UART: [art] PUB.Y = F7AFDDEA400A2B89F0FFC02B460F801BE6734C93563BDBD1E480864A5D53175A7C82808AE4E22FF8E9A045F43B724C87
2,965,092 UART: [art] SIG.R = B957B8C20E7012F33C52E82498B1FFFB1BA0A3A69C0DE3474B452083D7944A8D81A817041BAC323E1A7CCCBFDC9CFFEF
2,971,873 UART: [art] SIG.S = 4CC9599D300A928E8B92F13427C97348500A9256AC0A9537BB065524DBFFC936B4CE8985F097D8EBCF9C88817E46D42D
2,995,412 UART: Caliptra RT
2,995,665 UART: [state] CFI Enabled
3,103,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,800 UART: [rt]cmd =0x50435245, len=56
3,134,960 >>> mbox cmd response: failed
3,134,960 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,502 UART: [rt]cmd =0x50435245, len=56
3,165,816 >>> mbox cmd response: failed
3,165,816 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,512 UART: [rt]cmd =0x50435245, len=56
3,197,162 >>> mbox cmd response: failed
3,197,162 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,772 UART: [rt]cmd =0x50435245, len=56
3,228,178 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
919,097 UART: [kat] HMAC-384Kdf
923,615 UART: [kat] LMS
1,171,943 UART: [kat] --
1,172,914 UART: [cold-reset] ++
1,173,300 UART: [fht] FHT @ 0x50003400
1,176,049 UART: [idev] ++
1,176,217 UART: [idev] CDI.KEYID = 6
1,176,577 UART: [idev] SUBJECT.KEYID = 7
1,177,001 UART: [idev] UDS.KEYID = 0
1,177,346 ready_for_fw is high
1,177,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,139 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,370 UART: [ldev] ++
1,211,538 UART: [ldev] CDI.KEYID = 6
1,211,901 UART: [ldev] SUBJECT.KEYID = 5
1,212,327 UART: [ldev] AUTHORITY.KEYID = 7
1,212,790 UART: [ldev] FE.KEYID = 1
1,218,262 UART: [ldev] Erasing FE.KEYID = 1
1,244,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,734 UART: [ldev] --
1,283,997 UART: [fwproc] Wait for Commands...
1,284,609 UART: [fwproc] Recv command 0x46574c44
1,285,337 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,461 >>> mbox cmd response: success
2,777,461 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,778,709 UART: [afmc] ++
2,778,877 UART: [afmc] CDI.KEYID = 6
2,779,239 UART: [afmc] SUBJECT.KEYID = 7
2,779,664 UART: [afmc] AUTHORITY.KEYID = 5
2,815,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,922 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,535 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,014 UART: [afmc] --
2,859,022 UART: [cold-reset] --
2,859,766 UART: [state] Locking Datavault
2,860,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,185 UART: [state] Locking ICCM
2,861,699 UART: [exit] Launching FMC @ 0x40000130
2,867,028 UART:
2,867,044 UART: Running Caliptra FMC ...
2,867,452 UART:
2,867,595 UART: [state] CFI Enabled
2,878,046 UART: [fht] FMC Alias Private Key: 7
2,986,199 UART: [art] Extend RT PCRs Done
2,986,627 UART: [art] Lock RT PCRs Done
2,988,353 UART: [art] Populate DV Done
2,996,720 UART: [fht] FMC Alias Private Key: 7
2,997,768 UART: [art] Derive CDI
2,998,048 UART: [art] Store in in slot 0x4
3,083,809 UART: [art] Derive Key Pair
3,084,169 UART: [art] Store priv key in slot 0x5
3,097,999 UART: [art] Derive Key Pair - Done
3,112,825 UART: [art] Signing Cert with AUTHO
3,113,305 UART: RITY.KEYID = 7
3,128,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,406 UART: [art] PUB.X = 978586216BC0DFDCFACE86979327627994B64B21C9B44689D2C872808390978AEDEB25A37B916ED20F916707BDD888D9
3,136,168 UART: [art] PUB.Y = 9909D40C99B54F6D7F4906DE32964481A14D7A8E2AA46785AE157349AFA8EBE8ED9E833FCB0B4C9901FEC87CB7C367B7
3,143,115 UART: [art] SIG.R = 09C49E3A4966E30D4766BA85BD370F273D81204C413164E91F33FAFB0BDCD90730A7A5195570B8D55726C8D6BFF71EF3
3,149,874 UART: [art] SIG.S = F3B33A8A386B6D0D90A0E5927D86F748241430ACE73CD8656F69700812B45FCD8E5D442EB2D7B5C56EE0C9C9B646D9D9
3,174,189 UART: Caliptra RT
3,174,534 UART: [state] CFI Enabled
3,283,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,707 UART: [rt]cmd =0x50435245, len=56
3,315,043 >>> mbox cmd response: failed
3,315,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,029 UART: [rt]cmd =0x50435245, len=56
3,346,355 >>> mbox cmd response: failed
3,346,355 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,113 UART: [rt]cmd =0x50435245, len=56
3,377,695 >>> mbox cmd response: failed
3,377,695 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,239 UART: [rt]cmd =0x50435245, len=56
3,408,543 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 ready_for_fw is high
1,060,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,998 >>> mbox cmd response: success
2,627,998 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,192 UART:
2,690,208 UART: Running Caliptra FMC ...
2,690,616 UART:
2,690,759 UART: [state] CFI Enabled
2,701,128 UART: [fht] FMC Alias Private Key: 7
2,809,655 UART: [art] Extend RT PCRs Done
2,810,083 UART: [art] Lock RT PCRs Done
2,811,463 UART: [art] Populate DV Done
2,819,758 UART: [fht] FMC Alias Private Key: 7
2,820,734 UART: [art] Derive CDI
2,821,014 UART: [art] Store in in slot 0x4
2,907,191 UART: [art] Derive Key Pair
2,907,551 UART: [art] Store priv key in slot 0x5
2,921,759 UART: [art] Derive Key Pair - Done
2,936,483 UART: [art] Signing Cert with AUTHO
2,936,963 UART: RITY.KEYID = 7
2,952,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,096 UART: [art] PUB.X = 0CC7BE724ACDBD89EA6064D5461F90684B85C8354DF6AB480B3B095796F396FCDE3D9EBE9017F1B25AE7A21285C9C018
2,959,869 UART: [art] PUB.Y = 977A8079573CB6F47FB2EDD3DCE6D2BBD2970ED11A5F0FEB6BAB579E23C944E06DA5F401310CFF69BB90DFF9ECEE2609
2,966,830 UART: [art] SIG.R = 4CE395E4101AB3E920EF0EF344CB129A86DE278335CF07EA5187CCD73D536BA4490241207B117B71B3AB39C228385AD6
2,973,595 UART: [art] SIG.S = 1AB82C3383DE7DA18796E9640D4B46865EFC198897DF65A32D4A2B87BCB2592E7B707AB5FA2B13746CA6999B1566C7CA
2,997,523 UART: Caliptra RT
2,997,868 UART: [state] CFI Enabled
3,106,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,241 UART: [rt]cmd =0x50435245, len=56
3,138,657 >>> mbox cmd response: failed
3,138,657 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,285 UART: [rt]cmd =0x50435245, len=56
3,169,697 >>> mbox cmd response: failed
3,169,697 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,349 UART: [rt]cmd =0x50435245, len=56
3,200,823 >>> mbox cmd response: failed
3,200,823 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,291 UART: [rt]cmd =0x50435245, len=56
3,231,567 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,167 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,241,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,846 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,836 >>> mbox cmd response: success
2,774,836 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,871 UART: [afmc] ++
2,776,039 UART: [afmc] CDI.KEYID = 6
2,776,402 UART: [afmc] SUBJECT.KEYID = 7
2,776,828 UART: [afmc] AUTHORITY.KEYID = 5
2,812,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,020 UART: [afmc] --
2,855,926 UART: [cold-reset] --
2,856,742 UART: [state] Locking Datavault
2,858,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,637 UART: [state] Locking ICCM
2,859,073 UART: [exit] Launching FMC @ 0x40000130
2,864,402 UART:
2,864,418 UART: Running Caliptra FMC ...
2,864,826 UART:
2,864,880 UART: [state] CFI Enabled
2,875,387 UART: [fht] FMC Alias Private Key: 7
2,983,380 UART: [art] Extend RT PCRs Done
2,983,808 UART: [art] Lock RT PCRs Done
2,985,408 UART: [art] Populate DV Done
2,993,475 UART: [fht] FMC Alias Private Key: 7
2,994,541 UART: [art] Derive CDI
2,994,821 UART: [art] Store in in slot 0x4
3,080,406 UART: [art] Derive Key Pair
3,080,766 UART: [art] Store priv key in slot 0x5
3,093,900 UART: [art] Derive Key Pair - Done
3,109,056 UART: [art] Signing Cert with AUTHO
3,109,536 UART: RITY.KEYID = 7
3,124,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,201 UART: [art] PUB.X = C9B28354A59A21CA29826F447233129899E8BD54C588A0EA7B590CDEAD63F3CA7E94F315BD15766499494F621ED42E32
3,131,968 UART: [art] PUB.Y = FFBDFA7E6FFD8DDC01735E3A4EC4D0FEB73C34BDA5428A4EE7A69B87B0C3AB3CCF67BAFA0D2BCB9DD2C107F4C6BC1632
3,138,951 UART: [art] SIG.R = A28D3395BBC454708F484D40BF162FA0BFE89DB4618E1EA287E2EA17FF9529A272BD49592212A91A60BD986EB86D01D1
3,145,726 UART: [art] SIG.S = DBF31A307ACBD9A9CF3548047A27EDBF10BC0AA800D7388EEEFBDEA71BFEC634FDD9E7002F9B25F3974DEF76A6E8F6C6
3,169,135 UART: Caliptra RT
3,169,388 UART: [state] CFI Enabled
3,276,468 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,306 UART: [rt]cmd =0x50435245, len=56
3,308,856 >>> mbox cmd response: failed
3,308,856 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,568 UART: [rt]cmd =0x50435245, len=56
3,339,950 >>> mbox cmd response: failed
3,339,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,806 UART: [rt]cmd =0x50435245, len=56
3,371,154 >>> mbox cmd response: failed
3,371,154 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,002 UART: [rt]cmd =0x50435245, len=56
3,402,200 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,168 ready_for_fw is high
1,057,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,820 >>> mbox cmd response: success
2,624,820 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,916 UART:
2,686,932 UART: Running Caliptra FMC ...
2,687,340 UART:
2,687,394 UART: [state] CFI Enabled
2,698,111 UART: [fht] FMC Alias Private Key: 7
2,806,104 UART: [art] Extend RT PCRs Done
2,806,532 UART: [art] Lock RT PCRs Done
2,807,852 UART: [art] Populate DV Done
2,816,061 UART: [fht] FMC Alias Private Key: 7
2,816,995 UART: [art] Derive CDI
2,817,275 UART: [art] Store in in slot 0x4
2,902,732 UART: [art] Derive Key Pair
2,903,092 UART: [art] Store priv key in slot 0x5
2,917,006 UART: [art] Derive Key Pair - Done
2,931,857 UART: [art] Signing Cert with AUTHO
2,932,337 UART: RITY.KEYID = 7
2,947,429 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,194 UART: [art] PUB.X = 99C5DF02CEB0E46C61E0F8A56492C8062CBD40008D2D0CF1EF315A72455D737C4E9EF41793BD87D7C2FD922A3115D2BE
2,954,945 UART: [art] PUB.Y = 4B7E9B139059D3DEAFA5A074D1B2FA9E0CC434BF0762BD7C62199671F29162C88955B121C27533E5827E8A9E7CC156C5
2,961,893 UART: [art] SIG.R = CEFBACC93ACA316620F82D086EA98C720D7A584544227D9E3EF79F0584FA8AE62309AAE4B0CADE67882F440A8DEC69DA
2,968,668 UART: [art] SIG.S = 4FBE9A56A183D47DBB3D26511026A5BC156300AE2EBD22436EA7857B72739122DF40DC5D94CE42A6F7B681BAFC721F5F
2,992,655 UART: Caliptra RT
2,992,908 UART: [state] CFI Enabled
3,100,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,355 UART: [rt]cmd =0x50435245, len=56
3,132,853 >>> mbox cmd response: failed
3,132,853 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,341 UART: [rt]cmd =0x50435245, len=56
3,163,827 >>> mbox cmd response: failed
3,163,827 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,579 UART: [rt]cmd =0x50435245, len=56
3,194,869 >>> mbox cmd response: failed
3,194,869 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,413 UART: [rt]cmd =0x50435245, len=56
3,225,917 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 ready_for_fw is high
1,174,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,693 UART: [ldev] ++
1,208,861 UART: [ldev] CDI.KEYID = 6
1,209,225 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,335 UART: [ldev] Erasing FE.KEYID = 1
1,242,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,695 >>> mbox cmd response: success
2,773,695 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,750 UART: [afmc] ++
2,774,918 UART: [afmc] CDI.KEYID = 6
2,775,281 UART: [afmc] SUBJECT.KEYID = 7
2,775,707 UART: [afmc] AUTHORITY.KEYID = 5
2,811,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,643 UART: [afmc] --
2,854,585 UART: [cold-reset] --
2,855,247 UART: [state] Locking Datavault
2,856,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,068 UART: [state] Locking ICCM
2,857,594 UART: [exit] Launching FMC @ 0x40000130
2,862,923 UART:
2,862,939 UART: Running Caliptra FMC ...
2,863,347 UART:
2,863,490 UART: [state] CFI Enabled
2,874,303 UART: [fht] FMC Alias Private Key: 7
2,982,590 UART: [art] Extend RT PCRs Done
2,983,018 UART: [art] Lock RT PCRs Done
2,984,264 UART: [art] Populate DV Done
2,992,651 UART: [fht] FMC Alias Private Key: 7
2,993,741 UART: [art] Derive CDI
2,994,021 UART: [art] Store in in slot 0x4
3,079,718 UART: [art] Derive Key Pair
3,080,078 UART: [art] Store priv key in slot 0x5
3,093,918 UART: [art] Derive Key Pair - Done
3,108,745 UART: [art] Signing Cert with AUTHO
3,109,225 UART: RITY.KEYID = 7
3,124,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,334 UART: [art] PUB.X = 07F35D9E8679305CDF27C24A606674356F652FB5DFC27F2E38B18905F7EE2289A5F56772840DEFAD5B40A3CA01D529F8
3,132,096 UART: [art] PUB.Y = A4ACFC63704CECB0BE21A614399685269B6F634D8B5DF83475F0305BE53E5A529BFBC2C8CBB77B71D4A5BEFA62009EF3
3,139,042 UART: [art] SIG.R = 4CB91BF048047CC938388196147E12B0E4422C06073722C551B339730DDFC8DB66A05FA1A45CDABBEDDC02108C29E849
3,145,801 UART: [art] SIG.S = 35005E70D197AD35086BE8A41E9492CDC63C8A57C29101D7A8921D64B8324F24A49D000AFC89246C2EBA9D7612ECE308
3,169,476 UART: Caliptra RT
3,169,821 UART: [state] CFI Enabled
3,279,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,784 UART: [rt]cmd =0x50435245, len=56
3,310,928 >>> mbox cmd response: failed
3,310,928 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,550 UART: [rt]cmd =0x50435245, len=56
3,342,136 >>> mbox cmd response: failed
3,342,136 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,888 UART: [rt]cmd =0x50435245, len=56
3,373,330 >>> mbox cmd response: failed
3,373,330 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,130 UART: [rt]cmd =0x50435245, len=56
3,404,512 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,983 ready_for_fw is high
1,055,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,959 >>> mbox cmd response: success
2,624,959 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,355 UART:
2,687,371 UART: Running Caliptra FMC ...
2,687,779 UART:
2,687,922 UART: [state] CFI Enabled
2,697,949 UART: [fht] FMC Alias Private Key: 7
2,805,932 UART: [art] Extend RT PCRs Done
2,806,360 UART: [art] Lock RT PCRs Done
2,807,772 UART: [art] Populate DV Done
2,815,883 UART: [fht] FMC Alias Private Key: 7
2,816,915 UART: [art] Derive CDI
2,817,195 UART: [art] Store in in slot 0x4
2,902,976 UART: [art] Derive Key Pair
2,903,336 UART: [art] Store priv key in slot 0x5
2,916,488 UART: [art] Derive Key Pair - Done
2,931,584 UART: [art] Signing Cert with AUTHO
2,932,064 UART: RITY.KEYID = 7
2,947,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,099 UART: [art] PUB.X = 0320DC158702E16DD2897D7377E77D551507D240CF8277228548F7303FDD3E87CD49ED2F61D0E2F33F4767FF9B555355
2,954,854 UART: [art] PUB.Y = 0AC320E3D36A0802F5911D074CC45B81E51B8BBB6B88357BC5A7E59B7DE15043862888AEDF44842ABB81DE39D0B0FAEB
2,961,806 UART: [art] SIG.R = 76271A8742E9648C8AD45D618F003956EFA28CCC614D83F5766EA850DE178E150D8D0306DD596E4A6F89201E26C4679F
2,968,543 UART: [art] SIG.S = D1C144D572F21D28F36B1C3C4F4DA4593B9F1A7A528F6D5BA1CF975EC1581EC1BA4EB64506B8ECA92C40526A2DE9178B
2,992,395 UART: Caliptra RT
2,992,740 UART: [state] CFI Enabled
3,100,321 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,279 UART: [rt]cmd =0x50435245, len=56
3,132,711 >>> mbox cmd response: failed
3,132,711 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,383 UART: [rt]cmd =0x50435245, len=56
3,163,977 >>> mbox cmd response: failed
3,163,977 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,729 UART: [rt]cmd =0x50435245, len=56
3,195,155 >>> mbox cmd response: failed
3,195,155 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,939 UART: [rt]cmd =0x50435245, len=56
3,226,341 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,119 UART:
192,480 UART: Running Caliptra ROM ...
193,664 UART:
193,828 UART: [state] CFI Enabled
265,410 UART: [state] LifecycleState = Unprovisioned
267,338 UART: [state] DebugLocked = No
269,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,957 UART: [kat] SHA2-256
444,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,151 UART: [kat] ++
455,753 UART: [kat] sha1
466,280 UART: [kat] SHA2-256
468,993 UART: [kat] SHA2-384
474,412 UART: [kat] SHA2-512-ACC
476,785 UART: [kat] ECC-384
2,769,837 UART: [kat] HMAC-384Kdf
2,800,972 UART: [kat] LMS
3,991,275 UART: [kat] --
3,995,431 UART: [cold-reset] ++
3,997,303 UART: [fht] Storing FHT @ 0x50003400
4,009,649 UART: [idev] ++
4,010,222 UART: [idev] CDI.KEYID = 6
4,011,261 UART: [idev] SUBJECT.KEYID = 7
4,012,437 UART: [idev] UDS.KEYID = 0
4,013,473 ready_for_fw is high
4,013,675 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,210 UART: [idev] Erasing UDS.KEYID = 0
7,346,591 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,593 UART: [idev] --
7,373,642 UART: [ldev] ++
7,374,216 UART: [ldev] CDI.KEYID = 6
7,375,335 UART: [ldev] SUBJECT.KEYID = 5
7,376,441 UART: [ldev] AUTHORITY.KEYID = 7
7,377,620 UART: [ldev] FE.KEYID = 1
7,423,382 UART: [ldev] Erasing FE.KEYID = 1
10,755,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,785 UART: [ldev] --
13,136,808 UART: [fwproc] Waiting for Commands...
13,138,792 UART: [fwproc] Received command 0x46574c44
13,140,970 UART: [fwproc] Received Image of size 114124 bytes
17,185,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,648,278 >>> mbox cmd response: success
17,648,860 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,652,475 UART: [afmc] ++
17,653,069 UART: [afmc] CDI.KEYID = 6
17,653,962 UART: [afmc] SUBJECT.KEYID = 7
17,655,195 UART: [afmc] AUTHORITY.KEYID = 5
21,027,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,157 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,458 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,827 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,670 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,127 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,113 UART: [afmc] --
23,397,756 UART: [cold-reset] --
23,402,434 UART: [state] Locking Datavault
23,407,519 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,270 UART: [state] Locking ICCM
23,410,772 UART: [exit] Launching FMC @ 0x40000130
23,419,164 UART:
23,419,405 UART: Running Caliptra FMC ...
23,420,507 UART:
23,420,687 UART: [state] CFI Enabled
23,486,480 UART: [fht] FMC Alias Private Key: 7
25,824,223 UART: [art] Extend RT PCRs Done
25,825,448 UART: [art] Lock RT PCRs Done
25,827,368 UART: [art] Populate DV Done
25,832,724 UART: [fht] FMC Alias Private Key: 7
25,834,309 UART: [art] Derive CDI
25,835,045 UART: [art] Store in in slot 0x4
25,894,212 UART: [art] Derive Key Pair
25,895,249 UART: [art] Store priv key in slot 0x5
29,188,354 UART: [art] Derive Key Pair - Done
29,201,348 UART: [art] Signing Cert with AUTHO
29,202,646 UART: RITY.KEYID = 7
31,489,087 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,599 UART: [art] PUB.X = 0453A56B901DDF62D18870D9CB799A149210E54985EDFE0F85DD239B96ED467CAE406D4E43E2BBDE3FB035449225416B
31,497,803 UART: [art] PUB.Y = 95A05B6EA596A1174D2C74800394D720F42AE85B28E352FABBB4E8DE866AEBE5289030325D957D75BE76E3AEA1CD7E3C
31,505,114 UART: [art] SIG.R = 46ADDEC60C731BA2C848938534788615ECBD50A7AC2D8111456B6A8309DBB61393A444D6572041FAE67B6D5511C8CC80
31,512,462 UART: [art] SIG.S = 64932D6F4B25E6DC8EDD17C040427263EE775D2AD5C839F9092EBEEB12CDE707A3E3B4AB41AC1C7452AE971CBE3A04AD
32,817,193 UART: Caliptra RT
32,817,897 UART: [state] CFI Enabled
32,978,171 UART: [rt] RT listening for mailbox commands...
33,009,446 UART: [rt]cmd =0x50435252, len=8
33,011,446 >>> mbox cmd response data (8 bytes)
33,012,405 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,042,823 UART: [rt]cmd =0x50435251, len=36
34,205,645 >>> mbox cmd response data (1848 bytes)
34,215,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,245,628 UART: [rt]cmd =0x43455246, len=4
34,258,618 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,806,464 ready_for_fw is high
3,806,873 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,902,207 >>> mbox cmd response: success
17,903,052 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,588,729 UART:
23,589,136 UART: Running Caliptra FMC ...
23,590,345 UART:
23,590,513 UART: [state] CFI Enabled
23,657,004 UART: [fht] FMC Alias Private Key: 7
25,995,319 UART: [art] Extend RT PCRs Done
25,996,541 UART: [art] Lock RT PCRs Done
25,998,520 UART: [art] Populate DV Done
26,003,773 UART: [fht] FMC Alias Private Key: 7
26,005,321 UART: [art] Derive CDI
26,006,062 UART: [art] Store in in slot 0x4
26,065,412 UART: [art] Derive Key Pair
26,066,458 UART: [art] Store priv key in slot 0x5
29,360,014 UART: [art] Derive Key Pair - Done
29,373,106 UART: [art] Signing Cert with AUTHO
29,374,422 UART: RITY.KEYID = 7
31,660,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,361 UART: [art] PUB.X = A84788D856A3C4E2533EC2132C7F49E3AF67F57DD3D5E0B432171EEC2EC1DB27B7761F981234408FF2A6D0B1C26C5AE6
31,669,612 UART: [art] PUB.Y = D93EDA9AD5CB24F95D5D326CA7645B9E3D2B1729D32E60AF3E994A27299B617532404AC881646D7ECB9144920E4AEBE9
31,676,873 UART: [art] SIG.R = CBEFBFED46119FD0F4A5B27518A01D43E091FE9ED5C52D25AE87FCC6D32A45763A2D13103144CF2D8F950272C8EA0C6A
31,684,264 UART: [art] SIG.S = 3F64C8A460E6852A0970669654E542935F5998C33B221B7DAE84F8487959A29C0F85B659DCAB418A3D045135430ECCBF
32,989,614 UART: Caliptra RT
32,990,319 UART: [state] CFI Enabled
33,151,039 UART: [rt] RT listening for mailbox commands...
33,182,451 UART: [rt]cmd =0x50435252, len=8
33,184,736 >>> mbox cmd response data (8 bytes)
33,185,528 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,215,536 UART: [rt]cmd =0x50435251, len=36
34,378,045 >>> mbox cmd response data (1848 bytes)
34,388,299 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,418,164 UART: [rt]cmd =0x43455246, len=4
34,431,395 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,418 UART:
192,788 UART: Running Caliptra ROM ...
193,940 UART:
603,786 UART: [state] CFI Enabled
617,098 UART: [state] LifecycleState = Unprovisioned
618,976 UART: [state] DebugLocked = No
620,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,580 UART: [kat] SHA2-256
795,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,840 UART: [kat] ++
806,286 UART: [kat] sha1
816,443 UART: [kat] SHA2-256
819,157 UART: [kat] SHA2-384
825,350 UART: [kat] SHA2-512-ACC
827,721 UART: [kat] ECC-384
3,110,024 UART: [kat] HMAC-384Kdf
3,121,125 UART: [kat] LMS
4,311,207 UART: [kat] --
4,316,063 UART: [cold-reset] ++
4,317,425 UART: [fht] Storing FHT @ 0x50003400
4,327,901 UART: [idev] ++
4,328,467 UART: [idev] CDI.KEYID = 6
4,329,372 UART: [idev] SUBJECT.KEYID = 7
4,330,606 UART: [idev] UDS.KEYID = 0
4,331,548 ready_for_fw is high
4,331,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,065 UART: [idev] Erasing UDS.KEYID = 0
7,615,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,671 UART: [idev] --
7,641,872 UART: [ldev] ++
7,642,458 UART: [ldev] CDI.KEYID = 6
7,643,423 UART: [ldev] SUBJECT.KEYID = 5
7,644,629 UART: [ldev] AUTHORITY.KEYID = 7
7,645,906 UART: [ldev] FE.KEYID = 1
7,657,516 UART: [ldev] Erasing FE.KEYID = 1
10,944,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,229 UART: [ldev] --
13,304,728 UART: [fwproc] Waiting for Commands...
13,308,105 UART: [fwproc] Received command 0x46574c44
13,310,275 UART: [fwproc] Received Image of size 114124 bytes
17,369,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,605 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,623 >>> mbox cmd response: success
17,837,220 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,840,177 UART: [afmc] ++
17,840,775 UART: [afmc] CDI.KEYID = 6
17,841,793 UART: [afmc] SUBJECT.KEYID = 7
17,842,948 UART: [afmc] AUTHORITY.KEYID = 5
21,157,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,199 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,608 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,432 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,892 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,438 UART: [afmc] --
23,524,440 UART: [cold-reset] --
23,527,753 UART: [state] Locking Datavault
23,532,292 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,035 UART: [state] Locking ICCM
23,536,129 UART: [exit] Launching FMC @ 0x40000130
23,544,524 UART:
23,544,772 UART: Running Caliptra FMC ...
23,545,871 UART:
23,546,032 UART: [state] CFI Enabled
23,553,861 UART: [fht] FMC Alias Private Key: 7
25,885,071 UART: [art] Extend RT PCRs Done
25,886,300 UART: [art] Lock RT PCRs Done
25,887,701 UART: [art] Populate DV Done
25,893,054 UART: [fht] FMC Alias Private Key: 7
25,894,587 UART: [art] Derive CDI
25,895,396 UART: [art] Store in in slot 0x4
25,938,685 UART: [art] Derive Key Pair
25,939,676 UART: [art] Store priv key in slot 0x5
29,181,834 UART: [art] Derive Key Pair - Done
29,195,117 UART: [art] Signing Cert with AUTHO
29,196,411 UART: RITY.KEYID = 7
31,475,684 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,220 UART: [art] PUB.X = 9045D31E08516F4D055CA3D00D877A2237F97C3604ED5EC8034E8858E3D77758EE14D4EBAC3127729C7F3C31FAF71C66
31,484,411 UART: [art] PUB.Y = 580AEAD592F7C7E345422676EDDF8DCFC45B9D734CB1A0AAF3B170A8790640CD2585024687505751E3AB78EE6F32DA1D
31,491,634 UART: [art] SIG.R = 2A440A808A0AE3D4D4248C598C5425C509AB382143CDC471E189D90D516101D7106467D1DEDD2E39E9F9191E9D3216B8
31,499,016 UART: [art] SIG.S = 7C16B93D612092F0FE0CF8254AA51552CCABF14503CDA8E6492948D533CC01CBBF90A8EEE169B35CD4432B7DAEBB6CB2
32,803,823 UART: Caliptra RT
32,804,540 UART: [state] CFI Enabled
32,922,271 UART: [rt] RT listening for mailbox commands...
32,954,006 UART: [rt]cmd =0x50435252, len=8
32,956,235 >>> mbox cmd response data (8 bytes)
32,957,052 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,987,028 UART: [rt]cmd =0x50435251, len=36
34,142,131 >>> mbox cmd response data (1848 bytes)
34,152,415 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,182,280 UART: [rt]cmd =0x43455246, len=4
34,195,674 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,130,244 ready_for_fw is high
4,130,677 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,543 >>> mbox cmd response: success
18,081,286 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,719,700 UART:
23,720,090 UART: Running Caliptra FMC ...
23,721,234 UART:
23,721,407 UART: [state] CFI Enabled
23,729,103 UART: [fht] FMC Alias Private Key: 7
26,059,514 UART: [art] Extend RT PCRs Done
26,060,739 UART: [art] Lock RT PCRs Done
26,062,799 UART: [art] Populate DV Done
26,068,544 UART: [fht] FMC Alias Private Key: 7
26,070,260 UART: [art] Derive CDI
26,071,078 UART: [art] Store in in slot 0x4
26,114,226 UART: [art] Derive Key Pair
26,115,223 UART: [art] Store priv key in slot 0x5
29,356,945 UART: [art] Derive Key Pair - Done
29,369,784 UART: [art] Signing Cert with AUTHO
29,371,091 UART: RITY.KEYID = 7
31,650,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,308 UART: [art] PUB.X = 51FA30A00B654AD646CB8DBD7DAC1C96E6126878E3775189845E211DDE988AF06219FB5F199FAC99A0733AAD2F8B88E0
31,659,550 UART: [art] PUB.Y = 7BAEA3012D42CCF941C35F55A978ACBE23DBA786A9C0E4B24C8CB7E162EDAD9ACD5569882C817CEC5C2EF6FB698C09DD
31,666,873 UART: [art] SIG.R = 648E62800A62DC1B8D00B49249B3763534EBC03648DA4254BE93D698929AFD711C2297790B1E6444E47C311F7AF699DB
31,674,209 UART: [art] SIG.S = 47B68DBDFD951080662087D9619D5593E84A4B26C71472AC5AC4B907AC441DEBE1E8B060574440D71A2C11AF967D2FAF
32,979,330 UART: Caliptra RT
32,980,042 UART: [state] CFI Enabled
33,098,363 UART: [rt] RT listening for mailbox commands...
33,130,107 UART: [rt]cmd =0x50435252, len=8
33,132,223 >>> mbox cmd response data (8 bytes)
33,133,250 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,163,379 UART: [rt]cmd =0x50435251, len=36
34,318,889 >>> mbox cmd response data (1848 bytes)
34,329,100 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,359,012 UART: [rt]cmd =0x43455246, len=4
34,372,073 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,311 UART:
192,673 UART: Running Caliptra ROM ...
193,878 UART:
194,035 UART: [state] CFI Enabled
262,476 UART: [state] LifecycleState = Unprovisioned
264,395 UART: [state] DebugLocked = No
266,429 UART: [state] WD Timer not started. Device not locked for debugging
269,897 UART: [kat] SHA2-256
449,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,604 UART: [kat] ++
461,130 UART: [kat] sha1
471,299 UART: [kat] SHA2-256
474,305 UART: [kat] SHA2-384
479,576 UART: [kat] SHA2-512-ACC
482,578 UART: [kat] ECC-384
2,961,546 UART: [kat] HMAC-384Kdf
2,983,886 UART: [kat] LMS
3,513,315 UART: [kat] --
3,518,469 UART: [cold-reset] ++
3,519,830 UART: [fht] FHT @ 0x50003400
3,530,183 UART: [idev] ++
3,530,779 UART: [idev] CDI.KEYID = 6
3,531,713 UART: [idev] SUBJECT.KEYID = 7
3,532,887 UART: [idev] UDS.KEYID = 0
3,533,811 ready_for_fw is high
3,534,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,677,862 UART: [idev] Erasing UDS.KEYID = 0
6,038,676 UART: [idev] Sha1 KeyId Algorithm
6,060,957 UART: [idev] --
6,064,956 UART: [ldev] ++
6,065,526 UART: [ldev] CDI.KEYID = 6
6,066,413 UART: [ldev] SUBJECT.KEYID = 5
6,067,625 UART: [ldev] AUTHORITY.KEYID = 7
6,068,860 UART: [ldev] FE.KEYID = 1
6,113,944 UART: [ldev] Erasing FE.KEYID = 1
8,616,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,861 UART: [ldev] --
10,428,810 UART: [fwproc] Wait for Commands...
10,430,631 UART: [fwproc] Recv command 0x46574c44
10,432,720 UART: [fwproc] Recv'd Img size: 114448 bytes
13,836,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,978,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,297,148 >>> mbox cmd response: success
14,297,710 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,300,524 UART: [afmc] ++
14,301,158 UART: [afmc] CDI.KEYID = 6
14,302,074 UART: [afmc] SUBJECT.KEYID = 7
14,303,185 UART: [afmc] AUTHORITY.KEYID = 5
16,840,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,564,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,566,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,582,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,598,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,614,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,637,595 UART: [afmc] --
18,642,105 UART: [cold-reset] --
18,645,797 UART: [state] Locking Datavault
18,651,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,652,981 UART: [state] Locking ICCM
18,654,383 UART: [exit] Launching FMC @ 0x40000130
18,662,779 UART:
18,663,033 UART: Running Caliptra FMC ...
18,664,141 UART:
18,664,305 UART: [state] CFI Enabled
18,722,394 UART: [fht] FMC Alias Private Key: 7
20,486,462 UART: [art] Extend RT PCRs Done
20,487,805 UART: [art] Lock RT PCRs Done
20,489,537 UART: [art] Populate DV Done
20,494,681 UART: [fht] FMC Alias Private Key: 7
20,496,215 UART: [art] Derive CDI
20,496,945 UART: [art] Store in in slot 0x4
20,556,276 UART: [art] Derive Key Pair
20,557,279 UART: [art] Store priv key in slot 0x5
23,020,281 UART: [art] Derive Key Pair - Done
23,033,059 UART: [art] Signing Cert with AUTHO
23,034,363 UART: RITY.KEYID = 7
24,745,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,746,913 UART: [art] PUB.X = 93A3C432326C8BDF08294ECEEE20F550AD07D5844A40C43ECB2E863A5D085D14ABF4A94C5A55C81FA122728656B232FB
24,754,213 UART: [art] PUB.Y = FF7E9B89F91A9A4FDB07EDD007AFFBF0597AE8FB8ACE56485772FACD9E2611464C8062D86972F14F5F62BD5FE69062F0
24,761,493 UART: [art] SIG.R = E244B8FE06041D370CA6825B7E0E18DB51C0BDC2C01D473408C60E423A1310A368E900B28B7B03C8A65D4025466CEB80
24,768,823 UART: [art] SIG.S = D974776C9A25C86F91FA9358C6F7A14567DD0DD7FB9C238DA7A635026F65AD319DD4955BA35DE504B92B0F4114834926
25,747,886 UART: Caliptra RT
25,748,604 UART: [state] CFI Enabled
25,912,895 UART: [rt] RT listening for mailbox commands...
25,944,365 UART: [rt]cmd =0x50435252, len=8
25,946,194 >>> mbox cmd response data (8 bytes)
25,946,920 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,976,902 UART: [rt]cmd =0x50435251, len=36
26,895,239 >>> mbox cmd response data (1848 bytes)
26,905,482 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,935,612 UART: [rt]cmd =0x43455246, len=4
26,948,222 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,361,471 ready_for_fw is high
3,362,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,456 >>> mbox cmd response: success
14,043,172 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,318,178 UART:
18,318,573 UART: Running Caliptra FMC ...
18,319,711 UART:
18,319,868 UART: [state] CFI Enabled
18,388,070 UART: [fht] FMC Alias Private Key: 7
20,151,994 UART: [art] Extend RT PCRs Done
20,153,219 UART: [art] Lock RT PCRs Done
20,154,948 UART: [art] Populate DV Done
20,160,200 UART: [fht] FMC Alias Private Key: 7
20,161,910 UART: [art] Derive CDI
20,162,729 UART: [art] Store in in slot 0x4
20,220,578 UART: [art] Derive Key Pair
20,221,622 UART: [art] Store priv key in slot 0x5
22,684,525 UART: [art] Derive Key Pair - Done
22,697,264 UART: [art] Signing Cert with AUTHO
22,698,573 UART: RITY.KEYID = 7
24,410,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,683 UART: [art] PUB.X = 46C21B7FCB06019D0713ABF1B8649DF7ABC2246ED796805054A274C1F0760EB13942A567D670FA19297E3D2625C15A43
24,418,944 UART: [art] PUB.Y = D3B4879F7D458458B1C9B4066D9144A9CACA5B8458A6F6991E4B1EAEFB50ACB1F0531F17EA9BDF0B02AE1F769D3D326B
24,426,255 UART: [art] SIG.R = 7604AD59F303DE60CE71E5A3352842E9D7A5D15FCCFE0BD754675521B30B38910C7DB6B135898CC63C03CC4CDFDA77F7
24,433,626 UART: [art] SIG.S = 396D6507912305E52E4410F4A4853CE9DE423C96CAB8903E69CC710EB0C7B5499A8237FDA7615A6D69C1939083B818DF
25,412,320 UART: Caliptra RT
25,413,037 UART: [state] CFI Enabled
25,579,002 UART: [rt] RT listening for mailbox commands...
25,610,373 UART: [rt]cmd =0x50435252, len=8
25,612,280 >>> mbox cmd response data (8 bytes)
25,613,265 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,643,329 UART: [rt]cmd =0x50435251, len=36
26,559,034 >>> mbox cmd response data (1848 bytes)
26,569,240 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,599,125 UART: [rt]cmd =0x43455246, len=4
26,611,606 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,546 UART:
192,914 UART: Running Caliptra ROM ...
194,003 UART:
603,773 UART: [state] CFI Enabled
617,931 UART: [state] LifecycleState = Unprovisioned
619,800 UART: [state] DebugLocked = No
621,837 UART: [state] WD Timer not started. Device not locked for debugging
625,308 UART: [kat] SHA2-256
804,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,005 UART: [kat] ++
816,539 UART: [kat] sha1
826,770 UART: [kat] SHA2-256
829,770 UART: [kat] SHA2-384
836,887 UART: [kat] SHA2-512-ACC
839,894 UART: [kat] ECC-384
3,280,653 UART: [kat] HMAC-384Kdf
3,292,898 UART: [kat] LMS
3,822,382 UART: [kat] --
3,827,735 UART: [cold-reset] ++
3,829,776 UART: [fht] FHT @ 0x50003400
3,841,261 UART: [idev] ++
3,841,828 UART: [idev] CDI.KEYID = 6
3,842,826 UART: [idev] SUBJECT.KEYID = 7
3,844,000 UART: [idev] UDS.KEYID = 0
3,844,923 ready_for_fw is high
3,845,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,220 UART: [idev] Erasing UDS.KEYID = 0
6,317,088 UART: [idev] Sha1 KeyId Algorithm
6,338,846 UART: [idev] --
6,341,536 UART: [ldev] ++
6,342,102 UART: [ldev] CDI.KEYID = 6
6,343,109 UART: [ldev] SUBJECT.KEYID = 5
6,344,205 UART: [ldev] AUTHORITY.KEYID = 7
6,345,485 UART: [ldev] FE.KEYID = 1
6,356,931 UART: [ldev] Erasing FE.KEYID = 1
8,833,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,754 UART: [ldev] --
10,624,091 UART: [fwproc] Wait for Commands...
10,625,805 UART: [fwproc] Recv command 0x46574c44
10,627,895 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,693 >>> mbox cmd response: success
14,490,306 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,494,777 UART: [afmc] ++
14,495,363 UART: [afmc] CDI.KEYID = 6
14,496,244 UART: [afmc] SUBJECT.KEYID = 7
14,497,452 UART: [afmc] AUTHORITY.KEYID = 5
16,998,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,183 UART: [afmc] --
18,794,538 UART: [cold-reset] --
18,799,371 UART: [state] Locking Datavault
18,806,720 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,415 UART: [state] Locking ICCM
18,811,157 UART: [exit] Launching FMC @ 0x40000130
18,819,544 UART:
18,819,770 UART: Running Caliptra FMC ...
18,820,861 UART:
18,821,016 UART: [state] CFI Enabled
18,829,273 UART: [fht] FMC Alias Private Key: 7
20,586,473 UART: [art] Extend RT PCRs Done
20,587,676 UART: [art] Lock RT PCRs Done
20,589,612 UART: [art] Populate DV Done
20,594,959 UART: [fht] FMC Alias Private Key: 7
20,596,594 UART: [art] Derive CDI
20,597,397 UART: [art] Store in in slot 0x4
20,640,064 UART: [art] Derive Key Pair
20,641,128 UART: [art] Store priv key in slot 0x5
23,067,708 UART: [art] Derive Key Pair - Done
23,080,815 UART: [art] Signing Cert with AUTHO
23,082,109 UART: RITY.KEYID = 7
24,787,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,337 UART: [art] PUB.X = 5C7501AE1DA8ACFAF485432F882B53ECF9A7D6AFEB937A78E1B77550BA3B93E68C1693E66800EAF5DDDA8E59FE7FEF76
24,796,192 UART: [art] PUB.Y = 8EFBA589B8FAE7CE35EBBDD0196167696095917D642D3602A9CD2E536C3427DB16E8DB870DD7E3D8EBDB9E32E3E669A6
24,803,465 UART: [art] SIG.R = 1F38A5954E54347136CBDC856854A570A4724FF63E5556666CA852FF83C6587905A17BA564B5A38340EF68BDC7F7698A
24,810,840 UART: [art] SIG.S = BC0E01FA1FE9EC1EB2B0EE86EBDBC69036423C54E3AC29A9E11F590A26C63BBF609180C72033AC75E8AB45656C986AEB
25,788,971 UART: Caliptra RT
25,789,670 UART: [state] CFI Enabled
25,906,187 UART: [rt] RT listening for mailbox commands...
25,937,539 UART: [rt]cmd =0x50435252, len=8
25,939,573 >>> mbox cmd response data (8 bytes)
25,940,565 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,970,465 UART: [rt]cmd =0x50435251, len=36
26,878,010 >>> mbox cmd response data (1848 bytes)
26,888,279 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,918,205 UART: [rt]cmd =0x43455246, len=4
26,930,922 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,697,279 ready_for_fw is high
3,697,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,758 >>> mbox cmd response: success
14,269,405 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,523,065 UART:
18,523,452 UART: Running Caliptra FMC ...
18,524,575 UART:
18,524,724 UART: [state] CFI Enabled
18,532,662 UART: [fht] FMC Alias Private Key: 7
20,289,685 UART: [art] Extend RT PCRs Done
20,290,903 UART: [art] Lock RT PCRs Done
20,292,576 UART: [art] Populate DV Done
20,297,919 UART: [fht] FMC Alias Private Key: 7
20,299,457 UART: [art] Derive CDI
20,300,267 UART: [art] Store in in slot 0x4
20,342,964 UART: [art] Derive Key Pair
20,344,022 UART: [art] Store priv key in slot 0x5
22,771,144 UART: [art] Derive Key Pair - Done
22,784,249 UART: [art] Signing Cert with AUTHO
22,785,551 UART: RITY.KEYID = 7
24,490,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,173 UART: [art] PUB.X = 0E10CD55ED5F1ED5391A1AE9126D4D79608DD3CE4FA6E9B9BDB7E5511B41E8B1AA7A9BEF504A7C13D0D4C22D94DE2853
24,499,499 UART: [art] PUB.Y = 085EA0C677196CAF0EA5ADBF78E4A1B052315450F51360EC1DA9934B2A853DD2CD2B1C54FF952676E56CAEC481A0C50D
24,506,753 UART: [art] SIG.R = D5D596F5F481C15891B228777D0B28214E480EBE76CB30F0303CD911D573BE25E7FBE99441EF2C284BFC3E1AFDA1AA44
24,514,144 UART: [art] SIG.S = 4EE7747D4CA70B2EE3DC388EEF6BB58F459A0E5E9EEADEC8071F31EC9312E8682B5E147EC96D1B818189AABAA08FC4A5
25,492,480 UART: Caliptra RT
25,493,183 UART: [state] CFI Enabled
25,610,238 UART: [rt] RT listening for mailbox commands...
25,641,696 UART: [rt]cmd =0x50435252, len=8
25,643,912 >>> mbox cmd response data (8 bytes)
25,644,759 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,674,629 UART: [rt]cmd =0x50435251, len=36
26,582,416 >>> mbox cmd response data (1848 bytes)
26,592,615 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,622,199 UART: [rt]cmd =0x43455246, len=4
26,634,753 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,071 UART:
192,454 UART: Running Caliptra ROM ...
193,659 UART:
193,822 UART: [state] CFI Enabled
268,062 UART: [state] LifecycleState = Unprovisioned
270,477 UART: [state] DebugLocked = No
273,218 UART: [state] WD Timer not started. Device not locked for debugging
277,462 UART: [kat] SHA2-256
467,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,098 UART: [kat] ++
478,546 UART: [kat] sha1
490,129 UART: [kat] SHA2-256
493,132 UART: [kat] SHA2-384
499,260 UART: [kat] SHA2-512-ACC
501,843 UART: [kat] ECC-384
2,948,694 UART: [kat] HMAC-384Kdf
2,973,629 UART: [kat] LMS
3,505,431 UART: [kat] --
3,509,942 UART: [cold-reset] ++
3,511,372 UART: [fht] FHT @ 0x50003400
3,522,791 UART: [idev] ++
3,523,511 UART: [idev] CDI.KEYID = 6
3,524,505 UART: [idev] SUBJECT.KEYID = 7
3,525,619 UART: [idev] UDS.KEYID = 0
3,526,602 ready_for_fw is high
3,526,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,821 UART: [idev] Erasing UDS.KEYID = 0
6,030,248 UART: [idev] Sha1 KeyId Algorithm
6,052,236 UART: [idev] --
6,057,573 UART: [ldev] ++
6,058,310 UART: [ldev] CDI.KEYID = 6
6,059,194 UART: [ldev] SUBJECT.KEYID = 5
6,060,297 UART: [ldev] AUTHORITY.KEYID = 7
6,061,584 UART: [ldev] FE.KEYID = 1
6,101,643 UART: [ldev] Erasing FE.KEYID = 1
8,610,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,904 UART: [ldev] --
10,419,379 UART: [fwproc] Wait for Commands...
10,422,179 UART: [fwproc] Recv command 0x46574c44
10,424,641 UART: [fwproc] Recv'd Img size: 114448 bytes
13,882,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,616,754 >>> mbox cmd response: success
14,617,297 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,620,851 UART: [afmc] ++
14,621,566 UART: [afmc] CDI.KEYID = 6
14,622,754 UART: [afmc] SUBJECT.KEYID = 7
14,624,259 UART: [afmc] AUTHORITY.KEYID = 5
17,152,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,823 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,484 UART: [afmc] --
18,952,563 UART: [cold-reset] --
18,956,694 UART: [state] Locking Datavault
18,961,998 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,134 UART: [state] Locking ICCM
18,966,557 UART: [exit] Launching FMC @ 0x40000130
18,975,226 UART:
18,975,469 UART: Running Caliptra FMC ...
18,976,569 UART:
18,976,750 UART: [state] CFI Enabled
19,034,537 UART: [fht] FMC Alias Private Key: 7
20,797,845 UART: [art] Extend RT PCRs Done
20,799,070 UART: [art] Lock RT PCRs Done
20,800,542 UART: [art] Populate DV Done
20,806,117 UART: [fht] FMC Alias Private Key: 7
20,807,704 UART: [art] Derive CDI
20,808,514 UART: [art] Store in in slot 0x4
20,867,378 UART: [art] Derive Key Pair
20,868,415 UART: [art] Store priv key in slot 0x5
23,331,015 UART: [art] Derive Key Pair - Done
23,343,958 UART: [art] Signing Cert with AUTHO
23,345,256 UART: RITY.KEYID = 7
25,057,536 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,048 UART: [art] PUB.X = 43D7E6CE97FA93E4A00602037A5428C9416E57DE26A388F6FD481BBE2D6BD81FE3E742000A1037C55DD91F198FE35511
25,066,325 UART: [art] PUB.Y = E5E4206C4424B3010C7C84288C3E3E13B8DA8691716A3CECAB732846AF4C5DEA5E83AC7503E1E2C6FAD77B2B9B195150
25,073,578 UART: [art] SIG.R = BF0CB5820E6E575064174AFF0001F349D5D7CB5B675524E86B8337B188A42478460292CBD7E0446DA683F1E50BE28433
25,080,922 UART: [art] SIG.S = C6EC7BEB1970B2D9F72B0362875D3749FC9C8CDE750B5289ED3F22A33B585D74A77E5E52351F1BD65F0E913211B0D6FE
26,060,332 UART: Caliptra RT
26,061,020 UART: [state] CFI Enabled
26,225,583 UART: [rt] RT listening for mailbox commands...
26,257,071 UART: [rt]cmd =0x50435252, len=8
26,258,969 >>> mbox cmd response data (8 bytes)
26,259,815 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,290,042 UART: [rt]cmd =0x50435251, len=36
27,206,776 >>> mbox cmd response data (1848 bytes)
27,217,020 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,246,906 UART: [rt]cmd =0x43455246, len=4
27,259,604 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,435,867 ready_for_fw is high
3,436,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,732,836 >>> mbox cmd response: success
14,733,527 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,049,588 UART:
19,049,971 UART: Running Caliptra FMC ...
19,051,166 UART:
19,051,352 UART: [state] CFI Enabled
19,117,262 UART: [fht] FMC Alias Private Key: 7
20,881,796 UART: [art] Extend RT PCRs Done
20,883,018 UART: [art] Lock RT PCRs Done
20,884,868 UART: [art] Populate DV Done
20,890,514 UART: [fht] FMC Alias Private Key: 7
20,892,108 UART: [art] Derive CDI
20,892,923 UART: [art] Store in in slot 0x4
20,951,351 UART: [art] Derive Key Pair
20,952,388 UART: [art] Store priv key in slot 0x5
23,414,788 UART: [art] Derive Key Pair - Done
23,427,947 UART: [art] Signing Cert with AUTHO
23,429,242 UART: RITY.KEYID = 7
25,140,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,113 UART: [art] PUB.X = ABAA4B31ECE75CC5D5D0145672E959F0A4F064559FE7A6D835C1FE32886B5D8219D5289774AF939C21C47DFD2ABE6230
25,149,357 UART: [art] PUB.Y = BD9E05FF7E09E2820A5E36C2687235496283FDF851B26C66EADD46797881231208C740A3631D1EC2E8E013F6047A9B61
25,156,615 UART: [art] SIG.R = 42013874469A8952A02536766C185810F1BCBCC0CBC175911DE2F512D313841CB906DFD91C278E40E4ADBD646D8050FF
25,164,043 UART: [art] SIG.S = 19ECF7B5E0C80B10B6203C6073CD13D01B07ED4E16381114C27E149381F40FF150996B6748B898C3B8C7841680572BF8
26,142,938 UART: Caliptra RT
26,143,626 UART: [state] CFI Enabled
26,309,808 UART: [rt] RT listening for mailbox commands...
26,341,158 UART: [rt]cmd =0x50435252, len=8
26,343,176 >>> mbox cmd response data (8 bytes)
26,343,970 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,373,869 UART: [rt]cmd =0x50435251, len=36
27,289,982 >>> mbox cmd response data (1848 bytes)
27,300,188 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,330,017 UART: [rt]cmd =0x43455246, len=4
27,342,715 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,356 UART:
192,736 UART: Running Caliptra ROM ...
193,864 UART:
603,583 UART: [state] CFI Enabled
615,678 UART: [state] LifecycleState = Unprovisioned
618,054 UART: [state] DebugLocked = No
620,442 UART: [state] WD Timer not started. Device not locked for debugging
625,216 UART: [kat] SHA2-256
815,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,889 UART: [kat] ++
826,409 UART: [kat] sha1
838,217 UART: [kat] SHA2-256
841,214 UART: [kat] SHA2-384
847,203 UART: [kat] SHA2-512-ACC
849,777 UART: [kat] ECC-384
3,290,450 UART: [kat] HMAC-384Kdf
3,303,943 UART: [kat] LMS
3,835,737 UART: [kat] --
3,839,584 UART: [cold-reset] ++
3,841,519 UART: [fht] FHT @ 0x50003400
3,852,776 UART: [idev] ++
3,853,472 UART: [idev] CDI.KEYID = 6
3,854,445 UART: [idev] SUBJECT.KEYID = 7
3,855,697 UART: [idev] UDS.KEYID = 0
3,856,616 ready_for_fw is high
3,856,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,595 UART: [idev] Erasing UDS.KEYID = 0
6,328,370 UART: [idev] Sha1 KeyId Algorithm
6,350,957 UART: [idev] --
6,354,784 UART: [ldev] ++
6,355,513 UART: [ldev] CDI.KEYID = 6
6,356,412 UART: [ldev] SUBJECT.KEYID = 5
6,357,561 UART: [ldev] AUTHORITY.KEYID = 7
6,358,783 UART: [ldev] FE.KEYID = 1
6,370,660 UART: [ldev] Erasing FE.KEYID = 1
8,846,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,750 UART: [ldev] --
10,638,829 UART: [fwproc] Wait for Commands...
10,641,896 UART: [fwproc] Recv command 0x46574c44
10,644,198 UART: [fwproc] Recv'd Img size: 114448 bytes
14,094,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,832,940 >>> mbox cmd response: success
14,833,494 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,837,579 UART: [afmc] ++
14,838,273 UART: [afmc] CDI.KEYID = 6
14,839,453 UART: [afmc] SUBJECT.KEYID = 7
14,840,933 UART: [afmc] AUTHORITY.KEYID = 5
17,349,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,352 UART: [afmc] --
19,145,774 UART: [cold-reset] --
19,149,842 UART: [state] Locking Datavault
19,153,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,883 UART: [state] Locking ICCM
19,158,038 UART: [exit] Launching FMC @ 0x40000130
19,166,707 UART:
19,166,936 UART: Running Caliptra FMC ...
19,167,955 UART:
19,168,095 UART: [state] CFI Enabled
19,176,406 UART: [fht] FMC Alias Private Key: 7
20,933,756 UART: [art] Extend RT PCRs Done
20,934,999 UART: [art] Lock RT PCRs Done
20,936,551 UART: [art] Populate DV Done
20,941,855 UART: [fht] FMC Alias Private Key: 7
20,943,484 UART: [art] Derive CDI
20,944,223 UART: [art] Store in in slot 0x4
20,986,808 UART: [art] Derive Key Pair
20,987,804 UART: [art] Store priv key in slot 0x5
23,414,569 UART: [art] Derive Key Pair - Done
23,427,544 UART: [art] Signing Cert with AUTHO
23,428,873 UART: RITY.KEYID = 7
25,134,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,667 UART: [art] PUB.X = 75B37B47BB96790CA78FE28088BA973DA35CED61CD7267747290E5101FA6484BC8BD1BEBB34380780C727960CA4C19A0
25,142,951 UART: [art] PUB.Y = 834B6E1E367F7BF0A0E8446C83B29944AAB797D386C85AB59BF7CD3367A7A54AFBC24095E5789BF6EE115113F1DC9AF9
25,150,230 UART: [art] SIG.R = 662D927EBC6AEE32759F3B7481416D4BA3170CAC6CED50C53B9F5FB54A9A56ACA97D107D31DC5FC12FAB90F8D4D8ED7F
25,157,608 UART: [art] SIG.S = 190D12AEB8F54A1D3BFDE3A024289A6DF821C88BADF74F36ACF656E30A6169D1F430FFB8D40835F84CFE598F13EC7901
26,136,785 UART: Caliptra RT
26,137,508 UART: [state] CFI Enabled
26,254,967 UART: [rt] RT listening for mailbox commands...
26,286,052 UART: [rt]cmd =0x50435252, len=8
26,288,110 >>> mbox cmd response data (8 bytes)
26,289,163 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,319,207 UART: [rt]cmd =0x50435251, len=36
27,227,039 >>> mbox cmd response data (1848 bytes)
27,237,318 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,267,244 UART: [rt]cmd =0x43455246, len=4
27,279,879 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,753,791 ready_for_fw is high
3,754,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,949,031 >>> mbox cmd response: success
14,949,672 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,207,569 UART:
19,207,947 UART: Running Caliptra FMC ...
19,209,135 UART:
19,209,296 UART: [state] CFI Enabled
19,217,347 UART: [fht] FMC Alias Private Key: 7
20,974,709 UART: [art] Extend RT PCRs Done
20,976,306 UART: [art] Lock RT PCRs Done
20,977,313 UART: [art] Populate DV Done
20,982,609 UART: [fht] FMC Alias Private Key: 7
20,984,221 UART: [art] Derive CDI
20,985,037 UART: [art] Store in in slot 0x4
21,027,648 UART: [art] Derive Key Pair
21,028,684 UART: [art] Store priv key in slot 0x5
23,454,910 UART: [art] Derive Key Pair - Done
23,468,244 UART: [art] Signing Cert with AUTHO
23,469,542 UART: RITY.KEYID = 7
25,175,307 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,168 UART: [art] PUB.X = 5D0961973801622E8EEDDA7036DED797F126CE0E2A8A7077A4DC52A0979CEB0C7CE5F24A7BCA7D8303A388367B1006D1
25,184,089 UART: [art] PUB.Y = 39BE7C912342B42E1743EBF8850E4EDF3A1ED3D6C272A0B523980DD3E288259C27815922D90954ED52514884B066A892
25,191,300 UART: [art] SIG.R = 47D72215CC4E8687BC98BF6EA6008B8A40D19D807F6140B11F5C99108F1C5F73C18CF9919C26F1D7246F56D6F8CCB220
25,198,634 UART: [art] SIG.S = D5D38554993A4AAF8A68F8BA553A33E83E0348F0A3EA28F23133F1F9E1D988E4E325F6669C8C13E76AB5229E30DD7810
26,177,431 UART: Caliptra RT
26,178,162 UART: [state] CFI Enabled
26,296,114 UART: [rt] RT listening for mailbox commands...
26,327,912 UART: [rt]cmd =0x50435252, len=8
26,330,153 >>> mbox cmd response data (8 bytes)
26,331,256 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,361,170 UART: [rt]cmd =0x50435251, len=36
27,268,997 >>> mbox cmd response data (1848 bytes)
27,279,233 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,309,081 UART: [rt]cmd =0x43455246, len=4
27,321,713 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
895,014 UART: [kat] SHA2-512-ACC
896,915 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,237 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 ready_for_fw is high
1,480,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,504,614 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,274 UART: [idev] --
1,514,205 UART: [ldev] ++
1,514,373 UART: [ldev] CDI.KEYID = 6
1,514,736 UART: [ldev] SUBJECT.KEYID = 5
1,515,162 UART: [ldev] AUTHORITY.KEYID = 7
1,515,625 UART: [ldev] FE.KEYID = 1
1,520,685 UART: [ldev] Erasing FE.KEYID = 1
1,545,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,338 UART: [ldev] --
1,584,819 UART: [fwproc] Waiting for Commands...
1,585,548 UART: [fwproc] Received command 0x46574c44
1,586,339 UART: [fwproc] Received Image of size 114448 bytes
2,886,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,882 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,151 >>> mbox cmd response: success
3,078,151 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,079,265 UART: [afmc] ++
3,079,433 UART: [afmc] CDI.KEYID = 6
3,079,795 UART: [afmc] SUBJECT.KEYID = 7
3,080,220 UART: [afmc] AUTHORITY.KEYID = 5
3,114,723 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,461 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,074 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,764 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,521 UART: [afmc] --
3,157,467 UART: [cold-reset] --
3,158,413 UART: [state] Locking Datavault
3,159,410 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,014 UART: [state] Locking ICCM
3,160,632 UART: [exit] Launching FMC @ 0x40000130
3,165,961 UART:
3,165,977 UART: Running Caliptra FMC ...
3,166,385 UART:
3,166,439 UART: [state] CFI Enabled
3,176,772 UART: [fht] FMC Alias Private Key: 7
3,285,035 UART: [art] Extend RT PCRs Done
3,285,463 UART: [art] Lock RT PCRs Done
3,286,847 UART: [art] Populate DV Done
3,295,062 UART: [fht] FMC Alias Private Key: 7
3,296,138 UART: [art] Derive CDI
3,296,418 UART: [art] Store in in slot 0x4
3,381,995 UART: [art] Derive Key Pair
3,382,355 UART: [art] Store priv key in slot 0x5
3,395,209 UART: [art] Derive Key Pair - Done
3,409,752 UART: [art] Signing Cert with AUTHO
3,410,232 UART: RITY.KEYID = 7
3,425,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,409 UART: [art] PUB.X = 6AD4EC5DFCA9717ED58C486731A3CB37B1C6A99ACD232F581E395DAFCA1E8C545B7210600526CE005D9CB72D32F6FFA0
3,433,172 UART: [art] PUB.Y = B61F678CD8B9AEFB802388A6A44059B66E3AE3E6E798A405EB85AC08517FECF2C8E7836B96EE1DC4EF5CA03A22EE85F3
3,440,136 UART: [art] SIG.R = 0276A26A7BBFEE5370155261434E2C1C840F1485160EE29008430F17E3F420BF5F43DE14E72C940A688D25EB348557E8
3,446,882 UART: [art] SIG.S = CDB699CAFE3ADAFE73AE882EC1519191042C6A720BE01CE3720D19F750A0FD6E15C8AD9A0F35020AE34841CE1A82B61D
3,470,999 UART: Caliptra RT
3,471,252 UART: [state] CFI Enabled
3,578,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,003 UART: [rt]cmd =0x50435252, len=8
3,610,750 >>> mbox cmd response data (8 bytes)
3,610,751 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,374 UART: [rt]cmd =0x50435251, len=36
3,807,676 >>> mbox cmd response data (1848 bytes)
3,807,677 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,034 UART: [rt]cmd =0x43455246, len=4
3,849,460 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 ready_for_fw is high
1,362,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,207 >>> mbox cmd response: success
2,927,207 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,988,925 UART:
2,988,941 UART: Running Caliptra FMC ...
2,989,349 UART:
2,989,403 UART: [state] CFI Enabled
3,000,102 UART: [fht] FMC Alias Private Key: 7
3,107,721 UART: [art] Extend RT PCRs Done
3,108,149 UART: [art] Lock RT PCRs Done
3,109,751 UART: [art] Populate DV Done
3,117,826 UART: [fht] FMC Alias Private Key: 7
3,118,820 UART: [art] Derive CDI
3,119,100 UART: [art] Store in in slot 0x4
3,204,657 UART: [art] Derive Key Pair
3,205,017 UART: [art] Store priv key in slot 0x5
3,218,813 UART: [art] Derive Key Pair - Done
3,233,504 UART: [art] Signing Cert with AUTHO
3,233,984 UART: RITY.KEYID = 7
3,249,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,951 UART: [art] PUB.X = E0840E62C43F591E3F52D892B79224FF6AAD25D18DBA8BC51E8F017CC8AEFA2C34A3BCA2E05A385BC4F413213AFBAEFF
3,256,741 UART: [art] PUB.Y = 7B7839E38BCC410F8614D9247F8E3189EFF9E18268187DD02566ED86155FAD46B87BC1E1EFE0FB29B002B4992A05D08E
3,263,688 UART: [art] SIG.R = F47AC52D07945514B47B1E21857C167C6BB66007C19FCCF25C4036BD89497127C536F4A65288A3597FE84476F5D3A9BC
3,270,450 UART: [art] SIG.S = DA1BB7D326BC76B650EEF67BDCAD9AD4E324629819219C45E460405C5CC395E99218A41618FDCD133667024CC599C5F1
3,293,958 UART: Caliptra RT
3,294,211 UART: [state] CFI Enabled
3,402,867 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,299 UART: [rt]cmd =0x50435252, len=8
3,434,878 >>> mbox cmd response data (8 bytes)
3,434,879 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,478 UART: [rt]cmd =0x50435251, len=36
3,631,700 >>> mbox cmd response data (1848 bytes)
3,631,701 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,018 UART: [rt]cmd =0x43455246, len=4
3,673,386 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,040 UART: [kat] SHA2-256
881,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,086 UART: [kat] ++
886,238 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,700 UART: [cold-reset] ++
1,477,190 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 ready_for_fw is high
1,481,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,813 UART: [idev] Erasing UDS.KEYID = 0
1,505,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,829 UART: [idev] --
1,514,778 UART: [ldev] ++
1,514,946 UART: [ldev] CDI.KEYID = 6
1,515,309 UART: [ldev] SUBJECT.KEYID = 5
1,515,735 UART: [ldev] AUTHORITY.KEYID = 7
1,516,198 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,546,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,657 UART: [ldev] --
1,586,018 UART: [fwproc] Waiting for Commands...
1,586,673 UART: [fwproc] Received command 0x46574c44
1,587,464 UART: [fwproc] Received Image of size 114448 bytes
2,886,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,232 >>> mbox cmd response: success
3,079,232 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,080,442 UART: [afmc] ++
3,080,610 UART: [afmc] CDI.KEYID = 6
3,080,972 UART: [afmc] SUBJECT.KEYID = 7
3,081,397 UART: [afmc] AUTHORITY.KEYID = 5
3,116,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,049 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,739 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,742 UART: [afmc] --
3,159,724 UART: [cold-reset] --
3,160,340 UART: [state] Locking Datavault
3,161,727 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,331 UART: [state] Locking ICCM
3,162,901 UART: [exit] Launching FMC @ 0x40000130
3,168,230 UART:
3,168,246 UART: Running Caliptra FMC ...
3,168,654 UART:
3,168,797 UART: [state] CFI Enabled
3,179,418 UART: [fht] FMC Alias Private Key: 7
3,287,471 UART: [art] Extend RT PCRs Done
3,287,899 UART: [art] Lock RT PCRs Done
3,289,393 UART: [art] Populate DV Done
3,297,786 UART: [fht] FMC Alias Private Key: 7
3,298,814 UART: [art] Derive CDI
3,299,094 UART: [art] Store in in slot 0x4
3,385,111 UART: [art] Derive Key Pair
3,385,471 UART: [art] Store priv key in slot 0x5
3,398,605 UART: [art] Derive Key Pair - Done
3,413,518 UART: [art] Signing Cert with AUTHO
3,413,998 UART: RITY.KEYID = 7
3,429,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,845 UART: [art] PUB.X = E60DBEB125E1939144174D4BB590CF1A6E6625645DCFC0D0749C8054EBAF0EE217AB89E3A775A2500A3E0789DFBE1D35
3,436,615 UART: [art] PUB.Y = 4489313AE35CB10822CCD96222838632D6C1B849178D355FF665D15C4B99E1FC3466D0E378EAD3A1BED7590BD666212F
3,443,559 UART: [art] SIG.R = 02E257F427D816F1C9995D9A56C369AEF49BCBDDE353D77DB9F66304DAE8DEF1EFA43C59D3C680A37275D89AD06BEBF3
3,450,343 UART: [art] SIG.S = 88FEDA895FE35B172698324194960B8BBCD914085053F1FDEA62635E4BCDD27CDC90684FD143B3EFD3C204BE1EDBC653
3,474,027 UART: Caliptra RT
3,474,372 UART: [state] CFI Enabled
3,582,663 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,195 UART: [rt]cmd =0x50435252, len=8
3,614,804 >>> mbox cmd response data (8 bytes)
3,614,805 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,192 UART: [rt]cmd =0x50435251, len=36
3,811,440 >>> mbox cmd response data (1848 bytes)
3,811,441 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,896 UART: [rt]cmd =0x43455246, len=4
3,853,134 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,096 ready_for_fw is high
1,362,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,687 >>> mbox cmd response: success
2,928,687 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,990,621 UART:
2,990,637 UART: Running Caliptra FMC ...
2,991,045 UART:
2,991,188 UART: [state] CFI Enabled
3,002,047 UART: [fht] FMC Alias Private Key: 7
3,110,560 UART: [art] Extend RT PCRs Done
3,110,988 UART: [art] Lock RT PCRs Done
3,112,410 UART: [art] Populate DV Done
3,120,437 UART: [fht] FMC Alias Private Key: 7
3,121,443 UART: [art] Derive CDI
3,121,723 UART: [art] Store in in slot 0x4
3,207,712 UART: [art] Derive Key Pair
3,208,072 UART: [art] Store priv key in slot 0x5
3,221,290 UART: [art] Derive Key Pair - Done
3,236,256 UART: [art] Signing Cert with AUTHO
3,236,736 UART: RITY.KEYID = 7
3,251,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,453 UART: [art] PUB.X = A2D67AF075A7C7DE34754206894B97303FF54D25C419B21CA3C119A878BF2AD218C5316E316FF46D329196880C04B513
3,259,210 UART: [art] PUB.Y = 39B2C6431129DB099846004386184BA1B5FF3F0A70BCBEB61820065DE1B33113DDB3246A9AF9EF129FFE91FBF5867656
3,266,133 UART: [art] SIG.R = 50CE5A74FEE97875ED1824318D5087A4C11C419015F387C417DB5B7EA15C5F362759A5131C4533481ED6C4D676970690
3,272,892 UART: [art] SIG.S = 1C78960EC78DF639A549CA1B851465E1C7E2FC245022B260198AEEBE36CDC53577027B8509AF1760204F135784BD668C
3,297,186 UART: Caliptra RT
3,297,531 UART: [state] CFI Enabled
3,406,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,711 UART: [rt]cmd =0x50435252, len=8
3,438,082 >>> mbox cmd response data (8 bytes)
3,438,083 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,514 UART: [rt]cmd =0x50435251, len=36
3,634,966 >>> mbox cmd response data (1848 bytes)
3,634,967 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,244 UART: [rt]cmd =0x43455246, len=4
3,676,578 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,084 UART: [idev] ++
1,175,252 UART: [idev] CDI.KEYID = 6
1,175,612 UART: [idev] SUBJECT.KEYID = 7
1,176,036 UART: [idev] UDS.KEYID = 0
1,176,381 ready_for_fw is high
1,176,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,836 UART: [idev] Erasing UDS.KEYID = 0
1,200,561 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,180 >>> mbox cmd response: success
2,775,180 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,776,426 UART: [afmc] ++
2,776,594 UART: [afmc] CDI.KEYID = 6
2,776,956 UART: [afmc] SUBJECT.KEYID = 7
2,777,381 UART: [afmc] AUTHORITY.KEYID = 5
2,811,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,405 UART: [afmc] --
2,854,295 UART: [cold-reset] --
2,855,165 UART: [state] Locking Datavault
2,856,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,888 UART: [state] Locking ICCM
2,857,438 UART: [exit] Launching FMC @ 0x40000130
2,862,767 UART:
2,862,783 UART: Running Caliptra FMC ...
2,863,191 UART:
2,863,245 UART: [state] CFI Enabled
2,873,262 UART: [fht] FMC Alias Private Key: 7
2,980,647 UART: [art] Extend RT PCRs Done
2,981,075 UART: [art] Lock RT PCRs Done
2,982,897 UART: [art] Populate DV Done
2,991,060 UART: [fht] FMC Alias Private Key: 7
2,992,102 UART: [art] Derive CDI
2,992,382 UART: [art] Store in in slot 0x4
3,077,707 UART: [art] Derive Key Pair
3,078,067 UART: [art] Store priv key in slot 0x5
3,091,509 UART: [art] Derive Key Pair - Done
3,106,521 UART: [art] Signing Cert with AUTHO
3,107,001 UART: RITY.KEYID = 7
3,122,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,206 UART: [art] PUB.X = A09CEB749032239864E7ADED37AD5485A09F98E665FB414E6FD4DB8CCA3F37B18E6764E5BC81ABBA9BB3AE0738E51189
3,129,989 UART: [art] PUB.Y = 011229FF63047B1EF536D61829DAF8D79642BCA5B9DF2A4C4BFBC09C9E8A154D248BC07E83BA00854F5B1A0DF860A3B4
3,136,922 UART: [art] SIG.R = DB86451A3A9C5DF05480B3FC969B03D6A006C8AA5DAB85E8BE25D91F6EE9A76B4016BBBF4689522C953D612A8E498375
3,143,696 UART: [art] SIG.S = BDB3C0FDBDD8D4C7861537FC54D6D6090A10851ED6A5037D9DE1F6732E6128D810DED31D90C3DFFC2D0736EDC1948E73
3,167,579 UART: Caliptra RT
3,167,832 UART: [state] CFI Enabled
3,275,376 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,948 UART: [rt]cmd =0x50435252, len=8
3,307,501 >>> mbox cmd response data (8 bytes)
3,307,502 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,989 UART: [rt]cmd =0x50435251, len=36
3,504,381 >>> mbox cmd response data (1848 bytes)
3,504,382 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,551 UART: [rt]cmd =0x43455246, len=4
3,545,777 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,557 ready_for_fw is high
1,060,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,377 >>> mbox cmd response: success
2,628,377 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,690,299 UART:
2,690,315 UART: Running Caliptra FMC ...
2,690,723 UART:
2,690,777 UART: [state] CFI Enabled
2,701,230 UART: [fht] FMC Alias Private Key: 7
2,809,569 UART: [art] Extend RT PCRs Done
2,809,997 UART: [art] Lock RT PCRs Done
2,811,665 UART: [art] Populate DV Done
2,819,840 UART: [fht] FMC Alias Private Key: 7
2,820,818 UART: [art] Derive CDI
2,821,098 UART: [art] Store in in slot 0x4
2,906,585 UART: [art] Derive Key Pair
2,906,945 UART: [art] Store priv key in slot 0x5
2,919,991 UART: [art] Derive Key Pair - Done
2,934,961 UART: [art] Signing Cert with AUTHO
2,935,441 UART: RITY.KEYID = 7
2,950,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,972 UART: [art] PUB.X = DC95EA7DCA5DC5A32B26DCDF13D78D112B88CC50FB5BFC646EA5C2870A939960CA5878F39AB27236FFCEE82C6206054C
2,957,753 UART: [art] PUB.Y = F23A0650B73F7598CB3A8F8C02859711F4C8F20036DFA294AC312E693CBF66A6A2FA138E940ADE695FCCA142EF6D2202
2,964,679 UART: [art] SIG.R = 5B45A57A6DDD395C11C533B8A4A17BED7327AD58C881FFD0CA2A62FDAE33BDF6816CB2E21D9120FF25DAC022D2C5F96C
2,971,473 UART: [art] SIG.S = 30F4D549732E2140D0213BAE484F25DAA0575D2F3604FA879800878A51595B3099687BE457525CF7C69C4C70572BAD45
2,994,463 UART: Caliptra RT
2,994,716 UART: [state] CFI Enabled
3,102,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,125 UART: [rt]cmd =0x50435252, len=8
3,134,686 >>> mbox cmd response data (8 bytes)
3,134,687 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,070 UART: [rt]cmd =0x50435251, len=36
3,331,368 >>> mbox cmd response data (1848 bytes)
3,331,369 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,842 UART: [rt]cmd =0x43455246, len=4
3,372,946 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,911 UART: [kat] SHA2-512-ACC
908,812 UART: [kat] ECC-384
919,129 UART: [kat] HMAC-384Kdf
923,879 UART: [kat] LMS
1,172,207 UART: [kat] --
1,172,958 UART: [cold-reset] ++
1,173,462 UART: [fht] FHT @ 0x50003400
1,176,175 UART: [idev] ++
1,176,343 UART: [idev] CDI.KEYID = 6
1,176,703 UART: [idev] SUBJECT.KEYID = 7
1,177,127 UART: [idev] UDS.KEYID = 0
1,177,472 ready_for_fw is high
1,177,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,391 UART: [idev] Erasing UDS.KEYID = 0
1,202,116 UART: [idev] Sha1 KeyId Algorithm
1,210,652 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,200 UART: [ldev] Erasing FE.KEYID = 1
1,244,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,160 UART: [ldev] --
1,284,619 UART: [fwproc] Wait for Commands...
1,285,277 UART: [fwproc] Recv command 0x46574c44
1,286,005 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,201 >>> mbox cmd response: success
2,777,201 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,778,357 UART: [afmc] ++
2,778,525 UART: [afmc] CDI.KEYID = 6
2,778,887 UART: [afmc] SUBJECT.KEYID = 7
2,779,312 UART: [afmc] AUTHORITY.KEYID = 5
2,815,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,730 UART: [afmc] --
2,858,794 UART: [cold-reset] --
2,859,636 UART: [state] Locking Datavault
2,860,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,543 UART: [state] Locking ICCM
2,862,027 UART: [exit] Launching FMC @ 0x40000130
2,867,356 UART:
2,867,372 UART: Running Caliptra FMC ...
2,867,780 UART:
2,867,923 UART: [state] CFI Enabled
2,878,706 UART: [fht] FMC Alias Private Key: 7
2,987,207 UART: [art] Extend RT PCRs Done
2,987,635 UART: [art] Lock RT PCRs Done
2,989,493 UART: [art] Populate DV Done
2,997,652 UART: [fht] FMC Alias Private Key: 7
2,998,722 UART: [art] Derive CDI
2,999,002 UART: [art] Store in in slot 0x4
3,084,725 UART: [art] Derive Key Pair
3,085,085 UART: [art] Store priv key in slot 0x5
3,098,281 UART: [art] Derive Key Pair - Done
3,113,371 UART: [art] Signing Cert with AUTHO
3,113,851 UART: RITY.KEYID = 7
3,128,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,726 UART: [art] PUB.X = 5667C3302FC0AE55DE51F8E750864B8377D2AE2A18311C9951ED12B97157571C41E9BE629C4C333146FE58ACE09E96A1
3,136,496 UART: [art] PUB.Y = CE2CA370240EBD2249F00A624D0FD5D48512E263195216894E5207EDAA7CB047D4047B17EE6F46584573A2052DF6C3BA
3,143,430 UART: [art] SIG.R = 0543D74305E79227282CAA840B35C3092FD804FCDEE47AEA7C86EB44BF5BE1745E095CBA5443C199087B0ABDB63981B9
3,150,184 UART: [art] SIG.S = 62244A9D80E84DA44944CEAC5FC10EB7C0261BC005A9B52BEA3063EB5BA92203F738D4D99E757D49AD3EAE7D1033BD82
3,174,200 UART: Caliptra RT
3,174,545 UART: [state] CFI Enabled
3,281,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,504 UART: [rt]cmd =0x50435252, len=8
3,313,851 >>> mbox cmd response data (8 bytes)
3,313,852 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,193 UART: [rt]cmd =0x50435251, len=36
3,510,371 >>> mbox cmd response data (1848 bytes)
3,510,372 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,563 UART: [rt]cmd =0x43455246, len=4
3,551,779 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,796 ready_for_fw is high
1,060,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,590 >>> mbox cmd response: success
2,628,590 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,690,238 UART:
2,690,254 UART: Running Caliptra FMC ...
2,690,662 UART:
2,690,805 UART: [state] CFI Enabled
2,701,408 UART: [fht] FMC Alias Private Key: 7
2,809,501 UART: [art] Extend RT PCRs Done
2,809,929 UART: [art] Lock RT PCRs Done
2,811,441 UART: [art] Populate DV Done
2,819,750 UART: [fht] FMC Alias Private Key: 7
2,820,800 UART: [art] Derive CDI
2,821,080 UART: [art] Store in in slot 0x4
2,906,673 UART: [art] Derive Key Pair
2,907,033 UART: [art] Store priv key in slot 0x5
2,919,667 UART: [art] Derive Key Pair - Done
2,934,384 UART: [art] Signing Cert with AUTHO
2,934,864 UART: RITY.KEYID = 7
2,949,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,435 UART: [art] PUB.X = D4C6F0CE26C1B5679CE3498E771DF83F589CC68AF784ECCC01CC6DFEEAE346478581C9658D605AED8640C44B9C658AE9
2,957,218 UART: [art] PUB.Y = 78B5027BA86F1F1EF8DEB8BDFEB997256B0A375248C3E5416F8B5CDB8AA921936322CC1CE3006FCB5F2D89513B140C03
2,964,146 UART: [art] SIG.R = D10FE59D7D9FC1EBF9B97AA63438EBE13E14463BB8AAED66B5306E93375F01D54EF35A9F2B8E462494A19C92BE09E721
2,970,921 UART: [art] SIG.S = 3CD2232FBCA5749898BF281FF5260CCFE95CB747ACA464426137F778C01F73BFAC3379735F73C64FCC23D2B9B06B91BC
2,994,689 UART: Caliptra RT
2,995,034 UART: [state] CFI Enabled
3,101,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,453 UART: [rt]cmd =0x50435252, len=8
3,134,358 >>> mbox cmd response data (8 bytes)
3,134,359 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,928 UART: [rt]cmd =0x50435251, len=36
3,331,416 >>> mbox cmd response data (1848 bytes)
3,331,417 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,966 UART: [rt]cmd =0x43455246, len=4
3,372,934 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,453 UART: [idev] ++
1,173,621 UART: [idev] CDI.KEYID = 6
1,173,982 UART: [idev] SUBJECT.KEYID = 7
1,174,407 UART: [idev] UDS.KEYID = 0
1,174,753 ready_for_fw is high
1,174,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,377 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,332 UART: [ldev] ++
1,209,500 UART: [ldev] CDI.KEYID = 6
1,209,864 UART: [ldev] SUBJECT.KEYID = 5
1,210,291 UART: [ldev] AUTHORITY.KEYID = 7
1,210,754 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,172 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,087 UART: [fwproc] Recv command 0x46574c44
1,281,820 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,942 >>> mbox cmd response: success
2,773,942 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,775,173 UART: [afmc] ++
2,775,341 UART: [afmc] CDI.KEYID = 6
2,775,704 UART: [afmc] SUBJECT.KEYID = 7
2,776,130 UART: [afmc] AUTHORITY.KEYID = 5
2,812,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,150 UART: [afmc] --
2,856,112 UART: [cold-reset] --
2,856,980 UART: [state] Locking Datavault
2,858,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,711 UART: [state] Locking ICCM
2,859,261 UART: [exit] Launching FMC @ 0x40000130
2,864,590 UART:
2,864,606 UART: Running Caliptra FMC ...
2,865,014 UART:
2,865,068 UART: [state] CFI Enabled
2,875,773 UART: [fht] FMC Alias Private Key: 7
2,983,726 UART: [art] Extend RT PCRs Done
2,984,154 UART: [art] Lock RT PCRs Done
2,985,498 UART: [art] Populate DV Done
2,993,487 UART: [fht] FMC Alias Private Key: 7
2,994,589 UART: [art] Derive CDI
2,994,869 UART: [art] Store in in slot 0x4
3,080,364 UART: [art] Derive Key Pair
3,080,724 UART: [art] Store priv key in slot 0x5
3,094,428 UART: [art] Derive Key Pair - Done
3,109,391 UART: [art] Signing Cert with AUTHO
3,109,871 UART: RITY.KEYID = 7
3,125,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,444 UART: [art] PUB.X = DBC91756E784AC6442C5F4543D99E0CC954FF7A8C8AC314F2378A6444472871FE494B7A91DBE9F55484CBD643E38EC0B
3,133,219 UART: [art] PUB.Y = 40418967F5F35DF2D1816B1497A91F747931CCA24BA23CFE4844128D93CCA724429B74C416E17AE67CB305AA207EE10A
3,140,165 UART: [art] SIG.R = 3CE1CB7C057EE010AB802275E9F7B5F14A40F5F92354AFD25FCEC6D8198EB24FD77A2C924996AFDEA522A334B3C7D6A6
3,146,950 UART: [art] SIG.S = 28203EDCA37D0C09D4F9EB11CE2917E3BA3572293BB08134E7CDF2D796CCB784F3FEA1E2969A69057032F41828DAEF29
3,170,838 UART: Caliptra RT
3,171,091 UART: [state] CFI Enabled
3,279,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,974 UART: [rt]cmd =0x50435252, len=8
3,311,445 >>> mbox cmd response data (8 bytes)
3,311,446 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,007 UART: [rt]cmd =0x50435251, len=36
3,508,519 >>> mbox cmd response data (1848 bytes)
3,508,520 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,883 UART: [rt]cmd =0x43455246, len=4
3,549,919 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,458 ready_for_fw is high
1,055,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,676 >>> mbox cmd response: success
2,621,676 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,684,060 UART:
2,684,076 UART: Running Caliptra FMC ...
2,684,484 UART:
2,684,538 UART: [state] CFI Enabled
2,695,021 UART: [fht] FMC Alias Private Key: 7
2,802,386 UART: [art] Extend RT PCRs Done
2,802,814 UART: [art] Lock RT PCRs Done
2,804,090 UART: [art] Populate DV Done
2,812,195 UART: [fht] FMC Alias Private Key: 7
2,813,325 UART: [art] Derive CDI
2,813,605 UART: [art] Store in in slot 0x4
2,898,962 UART: [art] Derive Key Pair
2,899,322 UART: [art] Store priv key in slot 0x5
2,912,044 UART: [art] Derive Key Pair - Done
2,926,473 UART: [art] Signing Cert with AUTHO
2,926,953 UART: RITY.KEYID = 7
2,942,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,266 UART: [art] PUB.X = A3AC82258CDD66DCB221DF489565994C80C3DB98615A80ACF8A4CEF5EDD6DEDA858B2A9AF87F8911B366174BD405CCCB
2,950,055 UART: [art] PUB.Y = 1DA7D2D0C845E3E419EAC3F9F6F74A9FCDE88D2F7972088AC34D935208C87CD4308D226A40500A1738D9562E611F725D
2,957,000 UART: [art] SIG.R = 81125F294542179BE3D48D178E5C89D97C21BDA96B46B4F93A52F9F0B057C318A9E3F43E25E60AA3D4E9A0E43605D4AE
2,963,770 UART: [art] SIG.S = 689C7E0F62A470A2E92934D84F0CE922662B1F2A9B6A6211E5D09C23B84C2432DBE148C707C68BF57CCD22EBEFE77863
2,987,598 UART: Caliptra RT
2,987,851 UART: [state] CFI Enabled
3,096,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,234 UART: [rt]cmd =0x50435252, len=8
3,128,879 >>> mbox cmd response data (8 bytes)
3,128,880 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,167 UART: [rt]cmd =0x50435251, len=36
3,325,513 >>> mbox cmd response data (1848 bytes)
3,325,514 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,859 UART: [rt]cmd =0x43455246, len=4
3,367,117 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,174,716 ready_for_fw is high
1,174,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,198,974 UART: [idev] Sha1 KeyId Algorithm
1,207,730 UART: [idev] --
1,208,775 UART: [ldev] ++
1,208,943 UART: [ldev] CDI.KEYID = 6
1,209,307 UART: [ldev] SUBJECT.KEYID = 5
1,209,734 UART: [ldev] AUTHORITY.KEYID = 7
1,210,197 UART: [ldev] FE.KEYID = 1
1,215,363 UART: [ldev] Erasing FE.KEYID = 1
1,241,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,921 UART: [ldev] --
1,280,339 UART: [fwproc] Wait for Commands...
1,281,154 UART: [fwproc] Recv command 0x46574c44
1,281,887 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,057 >>> mbox cmd response: success
2,773,057 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,322 UART: [afmc] ++
2,774,490 UART: [afmc] CDI.KEYID = 6
2,774,853 UART: [afmc] SUBJECT.KEYID = 7
2,775,279 UART: [afmc] AUTHORITY.KEYID = 5
2,810,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,921 UART: [afmc] --
2,854,027 UART: [cold-reset] --
2,854,769 UART: [state] Locking Datavault
2,856,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,616 UART: [state] Locking ICCM
2,857,106 UART: [exit] Launching FMC @ 0x40000130
2,862,435 UART:
2,862,451 UART: Running Caliptra FMC ...
2,862,859 UART:
2,863,002 UART: [state] CFI Enabled
2,873,587 UART: [fht] FMC Alias Private Key: 7
2,981,734 UART: [art] Extend RT PCRs Done
2,982,162 UART: [art] Lock RT PCRs Done
2,983,348 UART: [art] Populate DV Done
2,991,695 UART: [fht] FMC Alias Private Key: 7
2,992,695 UART: [art] Derive CDI
2,992,975 UART: [art] Store in in slot 0x4
3,078,810 UART: [art] Derive Key Pair
3,079,170 UART: [art] Store priv key in slot 0x5
3,092,870 UART: [art] Derive Key Pair - Done
3,107,670 UART: [art] Signing Cert with AUTHO
3,108,150 UART: RITY.KEYID = 7
3,123,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,187 UART: [art] PUB.X = 64AAB99ADC1AE4CA3D7CC5C40A7DC7B8A7C01D566DBCC82EAD89AD4D09E40D95660665157F25DC977129057191EC06B0
3,130,955 UART: [art] PUB.Y = C64DFB7B93E7018852035F576C9E66D1F09638CE560881656760895710148347DDCA71FB3E77931E42DF781C0CAA5FE9
3,137,889 UART: [art] SIG.R = ADF46A99E5F2C82D55C369324A413AB78228AA66EBC7B36975A5BF134F6D0CB68DB3F30ADEA6AFA1E1D2DCCB1BF44CFE
3,144,683 UART: [art] SIG.S = 23FA02C0D9722D65681D9E0C603761D529DCE4EF17FDEB204D5A38338F1A869304A4337295F62872341A350C6F7D7D3D
3,169,048 UART: Caliptra RT
3,169,393 UART: [state] CFI Enabled
3,276,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,374 UART: [rt]cmd =0x50435252, len=8
3,309,185 >>> mbox cmd response data (8 bytes)
3,309,186 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,521 UART: [rt]cmd =0x50435251, len=36
3,506,085 >>> mbox cmd response data (1848 bytes)
3,506,086 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,459 UART: [rt]cmd =0x43455246, len=4
3,547,547 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,151 ready_for_fw is high
1,056,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,553 >>> mbox cmd response: success
2,624,553 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,687,147 UART:
2,687,163 UART: Running Caliptra FMC ...
2,687,571 UART:
2,687,714 UART: [state] CFI Enabled
2,698,437 UART: [fht] FMC Alias Private Key: 7
2,806,542 UART: [art] Extend RT PCRs Done
2,806,970 UART: [art] Lock RT PCRs Done
2,808,324 UART: [art] Populate DV Done
2,816,249 UART: [fht] FMC Alias Private Key: 7
2,817,359 UART: [art] Derive CDI
2,817,639 UART: [art] Store in in slot 0x4
2,903,132 UART: [art] Derive Key Pair
2,903,492 UART: [art] Store priv key in slot 0x5
2,916,842 UART: [art] Derive Key Pair - Done
2,931,267 UART: [art] Signing Cert with AUTHO
2,931,747 UART: RITY.KEYID = 7
2,947,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,008 UART: [art] PUB.X = E8025C3474BE109B27473F8383399966D1B08BD6AEA532101A4D82E3368E03536DA658AC568875156EA76418B104409D
2,954,757 UART: [art] PUB.Y = 1EB9B5BC32777D6AA56F43F0446C87E52E3E537972A0F92C8236F440D7FF7C23642A36E1B113BA2DF9E1DF1584C9E46F
2,961,715 UART: [art] SIG.R = B2D1C9D697BD4A744DA24E4C6E3277473AD8832760FCCE4FFEDA66BDBD5B5FB85FD817923D5B9A031B86194448C2396B
2,968,496 UART: [art] SIG.S = EB35B08764849A8132EC47DD139F8671E62E9B9AA2E2C5838BE3944EA0EF18733AB6637A559B5D77A2A39671CDC200FB
2,991,997 UART: Caliptra RT
2,992,342 UART: [state] CFI Enabled
3,099,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,038 UART: [rt]cmd =0x50435252, len=8
3,131,337 >>> mbox cmd response data (8 bytes)
3,131,338 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,853 UART: [rt]cmd =0x50435251, len=36
3,328,343 >>> mbox cmd response data (1848 bytes)
3,328,344 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,695 UART: [rt]cmd =0x43455246, len=4
3,369,813 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,144 UART:
192,511 UART: Running Caliptra ROM ...
194,182 UART:
194,347 UART: [state] CFI Enabled
266,979 UART: [state] LifecycleState = Unprovisioned
268,908 UART: [state] DebugLocked = No
270,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,157 UART: [kat] SHA2-256
444,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,422 UART: [kat] ++
455,901 UART: [kat] sha1
466,636 UART: [kat] SHA2-256
469,285 UART: [kat] SHA2-384
474,935 UART: [kat] SHA2-512-ACC
477,313 UART: [kat] ECC-384
2,766,627 UART: [kat] HMAC-384Kdf
2,778,604 UART: [kat] LMS
3,968,940 UART: [kat] --
3,974,249 UART: [cold-reset] ++
3,976,471 UART: [fht] Storing FHT @ 0x50003400
3,989,014 UART: [idev] ++
3,989,584 UART: [idev] CDI.KEYID = 6
3,990,617 UART: [idev] SUBJECT.KEYID = 7
3,991,794 UART: [idev] UDS.KEYID = 0
3,992,841 ready_for_fw is high
3,993,041 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,619 UART: [idev] Erasing UDS.KEYID = 0
7,325,356 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,078 UART: [idev] --
7,350,906 UART: [ldev] ++
7,351,479 UART: [ldev] CDI.KEYID = 6
7,352,446 UART: [ldev] SUBJECT.KEYID = 5
7,353,602 UART: [ldev] AUTHORITY.KEYID = 7
7,354,886 UART: [ldev] FE.KEYID = 1
7,401,131 UART: [ldev] Erasing FE.KEYID = 1
10,735,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,175 UART: [ldev] --
13,117,165 UART: [fwproc] Waiting for Commands...
13,118,823 UART: [fwproc] Received command 0x46574c44
13,121,012 UART: [fwproc] Received Image of size 114124 bytes
17,168,800 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,631,190 >>> mbox cmd response: success
17,635,196 UART: [afmc] ++
17,635,811 UART: [afmc] CDI.KEYID = 6
17,636,701 UART: [afmc] SUBJECT.KEYID = 7
17,637,973 UART: [afmc] AUTHORITY.KEYID = 5
21,011,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,912 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,339 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,108 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,589 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,572 UART: [afmc] --
23,379,605 UART: [cold-reset] --
23,384,381 UART: [state] Locking Datavault
23,391,640 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,514 UART: [state] Locking ICCM
23,396,033 UART: [exit] Launching FMC @ 0x40000130
23,404,430 UART:
23,404,668 UART: Running Caliptra FMC ...
23,405,704 UART:
23,405,853 UART: [state] CFI Enabled
23,469,161 UART: [fht] FMC Alias Private Key: 7
25,807,110 UART: [art] Extend RT PCRs Done
25,808,331 UART: [art] Lock RT PCRs Done
25,810,204 UART: [art] Populate DV Done
25,815,508 UART: [fht] FMC Alias Private Key: 7
25,816,994 UART: [art] Derive CDI
25,817,758 UART: [art] Store in in slot 0x4
25,877,824 UART: [art] Derive Key Pair
25,878,856 UART: [art] Store priv key in slot 0x5
29,171,424 UART: [art] Derive Key Pair - Done
29,184,484 UART: [art] Signing Cert with AUTHO
29,185,797 UART: RITY.KEYID = 7
31,472,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,540 UART: [art] PUB.X = A17825B97F0400EC6C0E07B309C1F3E9DDAEAF51B7A616B2BBD7FD76B9016CF920F3DDB6390C903F6A116FE667DE1386
31,481,689 UART: [art] PUB.Y = F9FB06AC0EDA0F71BFB46D45E80D6FA093E6388540CEEA79A3AA0B5DA966A48A8D835FBF160C56757BCC6E8C204FB52E
31,488,979 UART: [art] SIG.R = 6710E23D03A5278A09ADAE313F967E0453297955B27B6FC8A59CF05FEACA1C07A6212C79063C9CC8FAE6E15DCF736759
31,496,387 UART: [art] SIG.S = EF9682F1355AF64E32AF63E046235650F2BDBC9269290090029ECD61CB3A8E0F49633803944D81D318098D23C8474D3A
32,801,369 UART: Caliptra RT
32,802,080 UART: [state] CFI Enabled
32,962,268 UART: [rt] RT listening for mailbox commands...
32,964,201 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,994,342 UART: [rt]cmd =0x44504543, len=28
33,037,105 >>> mbox cmd response data (2076 bytes)
33,047,111 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,076,886 UART: [rt]cmd =0x44504543, len=28
33,117,448 >>> mbox cmd response data (2076 bytes)
33,460,709 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,493,539 UART: [rt]cmd =0x49444550, len=352
33,504,681 >>> mbox cmd response data (8 bytes)
33,505,169 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,534,936 UART: [rt]cmd =0x44504543, len=28
33,577,466 >>> mbox cmd response data (2076 bytes)
33,587,495 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,617,468 UART: [rt]cmd =0x44504543, len=28
33,658,312 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,805,434 ready_for_fw is high
3,805,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,897,788 >>> mbox cmd response: success
23,591,148 UART:
23,591,536 UART: Running Caliptra FMC ...
23,592,697 UART:
23,592,859 UART: [state] CFI Enabled
23,659,014 UART: [fht] FMC Alias Private Key: 7
25,996,545 UART: [art] Extend RT PCRs Done
25,997,778 UART: [art] Lock RT PCRs Done
25,999,629 UART: [art] Populate DV Done
26,005,055 UART: [fht] FMC Alias Private Key: 7
26,006,656 UART: [art] Derive CDI
26,007,477 UART: [art] Store in in slot 0x4
26,069,383 UART: [art] Derive Key Pair
26,070,388 UART: [art] Store priv key in slot 0x5
29,363,850 UART: [art] Derive Key Pair - Done
29,376,518 UART: [art] Signing Cert with AUTHO
29,377,858 UART: RITY.KEYID = 7
31,664,983 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,489 UART: [art] PUB.X = E110B12B83A99E4C26043F6E1AE5A8F955D5EC9F7BC023704E6E860D4CD059B6D08F34F1C97EDF9D9A49FB6C364DCDC2
31,673,758 UART: [art] PUB.Y = EB11513773D4B4D808CF503CC10F2063B79F683ECC9AA34555D17A977CE7EBDB3138FF67ED15A3D3B075F4995B04E9A8
31,680,989 UART: [art] SIG.R = 321B9F0126E0B1CCCD722DCA48BAAE4925B90E398EABDEAF51C0E7E01C5FE007F73EDAA7695440E0346AC46DCE456C97
31,688,486 UART: [art] SIG.S = E2A73C54E9D37E330FA36886AEA3C418B308AD10DBA67EB624A486E44995A9911D95C7BF2DD39AF1E7F6B1338B53B550
32,993,257 UART: Caliptra RT
32,993,966 UART: [state] CFI Enabled
33,154,212 UART: [rt] RT listening for mailbox commands...
33,156,157 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,186,134 UART: [rt]cmd =0x44504543, len=28
33,228,760 >>> mbox cmd response data (2076 bytes)
33,238,762 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,269,000 UART: [rt]cmd =0x44504543, len=28
33,309,420 >>> mbox cmd response data (2076 bytes)
33,652,530 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,685,417 UART: [rt]cmd =0x49444550, len=353
33,699,259 >>> mbox cmd response data (8 bytes)
33,699,778 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,729,695 UART: [rt]cmd =0x44504543, len=28
33,772,157 >>> mbox cmd response data (2076 bytes)
33,782,082 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,812,396 UART: [rt]cmd =0x44504543, len=28
33,853,412 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,390 UART:
192,761 UART: Running Caliptra ROM ...
193,890 UART:
603,520 UART: [state] CFI Enabled
617,966 UART: [state] LifecycleState = Unprovisioned
619,912 UART: [state] DebugLocked = No
622,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,659 UART: [kat] SHA2-256
797,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,929 UART: [kat] ++
808,368 UART: [kat] sha1
817,813 UART: [kat] SHA2-256
820,529 UART: [kat] SHA2-384
825,093 UART: [kat] SHA2-512-ACC
827,523 UART: [kat] ECC-384
3,110,263 UART: [kat] HMAC-384Kdf
3,121,290 UART: [kat] LMS
4,311,426 UART: [kat] --
4,316,349 UART: [cold-reset] ++
4,318,908 UART: [fht] Storing FHT @ 0x50003400
4,331,015 UART: [idev] ++
4,331,583 UART: [idev] CDI.KEYID = 6
4,332,527 UART: [idev] SUBJECT.KEYID = 7
4,333,764 UART: [idev] UDS.KEYID = 0
4,334,731 ready_for_fw is high
4,334,917 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,227 UART: [idev] Erasing UDS.KEYID = 0
7,620,505 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,295 UART: [idev] --
7,646,888 UART: [ldev] ++
7,647,459 UART: [ldev] CDI.KEYID = 6
7,648,419 UART: [ldev] SUBJECT.KEYID = 5
7,649,628 UART: [ldev] AUTHORITY.KEYID = 7
7,650,909 UART: [ldev] FE.KEYID = 1
7,660,522 UART: [ldev] Erasing FE.KEYID = 1
10,951,780 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,325 UART: [ldev] --
13,313,569 UART: [fwproc] Waiting for Commands...
13,316,905 UART: [fwproc] Received command 0x46574c44
13,319,082 UART: [fwproc] Received Image of size 114124 bytes
17,370,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,614 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,935 >>> mbox cmd response: success
17,837,598 UART: [afmc] ++
17,838,198 UART: [afmc] CDI.KEYID = 6
17,839,104 UART: [afmc] SUBJECT.KEYID = 7
17,840,366 UART: [afmc] AUTHORITY.KEYID = 5
21,157,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,340 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,736 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,564 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,987 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,105 UART: [afmc] --
23,519,909 UART: [cold-reset] --
23,523,828 UART: [state] Locking Datavault
23,529,340 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,092 UART: [state] Locking ICCM
23,532,212 UART: [exit] Launching FMC @ 0x40000130
23,540,603 UART:
23,540,841 UART: Running Caliptra FMC ...
23,541,936 UART:
23,542,091 UART: [state] CFI Enabled
23,550,118 UART: [fht] FMC Alias Private Key: 7
25,881,406 UART: [art] Extend RT PCRs Done
25,882,624 UART: [art] Lock RT PCRs Done
25,884,404 UART: [art] Populate DV Done
25,889,937 UART: [fht] FMC Alias Private Key: 7
25,891,479 UART: [art] Derive CDI
25,892,233 UART: [art] Store in in slot 0x4
25,935,193 UART: [art] Derive Key Pair
25,936,184 UART: [art] Store priv key in slot 0x5
29,178,941 UART: [art] Derive Key Pair - Done
29,191,771 UART: [art] Signing Cert with AUTHO
29,193,065 UART: RITY.KEYID = 7
31,472,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,892 UART: [art] PUB.X = A4CFF974C8BACBC8478D225CEFF96D1B6C492E73F4B3E9AC32C38833AFB150BE87994AB8AEBA49EA48D266549FD527B3
31,481,122 UART: [art] PUB.Y = 09463B8615EBEC31E4D340348D1CF11916EBB381EBE531AC1CAFF25440BDC8A4E45FBC7E75A39BC80208745FEA0E9D74
31,488,399 UART: [art] SIG.R = FF3F3CFBBCF3125659F98422117CED06416439CAB9F6E88931B43D87050C192F70D0944A7E6FD33C56E56145850FFAFE
31,495,774 UART: [art] SIG.S = 830A7A1B7FAF04CBDA7167CF9775107C7BA8DD877BB59DA862D6E3924448966759507F622FEC65ABD34DC149A8A11FE3
32,800,995 UART: Caliptra RT
32,801,710 UART: [state] CFI Enabled
32,919,710 UART: [rt] RT listening for mailbox commands...
32,921,660 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,951,571 UART: [rt]cmd =0x44504543, len=28
32,994,245 >>> mbox cmd response data (2076 bytes)
33,004,274 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,034,508 UART: [rt]cmd =0x44504543, len=28
33,075,243 >>> mbox cmd response data (2076 bytes)
33,418,629 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,451,587 UART: [rt]cmd =0x49444550, len=352
33,462,840 >>> mbox cmd response data (8 bytes)
33,463,306 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,493,545 UART: [rt]cmd =0x44504543, len=28
33,536,202 >>> mbox cmd response data (2076 bytes)
33,546,399 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,576,215 UART: [rt]cmd =0x44504543, len=28
33,617,425 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
4,126,779 ready_for_fw is high
4,127,416 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,332 >>> mbox cmd response: success
23,717,274 UART:
23,717,667 UART: Running Caliptra FMC ...
23,718,988 UART:
23,719,152 UART: [state] CFI Enabled
23,727,095 UART: [fht] FMC Alias Private Key: 7
26,058,132 UART: [art] Extend RT PCRs Done
26,059,361 UART: [art] Lock RT PCRs Done
26,061,208 UART: [art] Populate DV Done
26,066,678 UART: [fht] FMC Alias Private Key: 7
26,068,227 UART: [art] Derive CDI
26,068,990 UART: [art] Store in in slot 0x4
26,111,431 UART: [art] Derive Key Pair
26,112,474 UART: [art] Store priv key in slot 0x5
29,354,772 UART: [art] Derive Key Pair - Done
29,367,720 UART: [art] Signing Cert with AUTHO
29,369,027 UART: RITY.KEYID = 7
31,648,613 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,129 UART: [art] PUB.X = F491562CCE516C91064606ADDDC40BF8DAC1189DFE81361A6D30572E0F2F916918EA97845C051E9A59E0FFC8D048AD51
31,657,371 UART: [art] PUB.Y = F55CE5287ABB2EC4522CAE5E8112474EA8F8395C1A5CD6E01221BB07ABFF0104F655426C854877A9ADDF208C313DCF06
31,664,619 UART: [art] SIG.R = 38E3CDA7D2A2BC29D40B9601657DA75824A4749AEB4DB5575185130AD348A127A4F19F115F5E67287537A264ABB6E366
31,672,013 UART: [art] SIG.S = A8D639C0EA7A1A2F16AF7C9772072DE4EF68039B0F8976CE130F064AA02386A1FB69029758AC2A981CD23C583A186153
32,976,683 UART: Caliptra RT
32,977,402 UART: [state] CFI Enabled
33,094,627 UART: [rt] RT listening for mailbox commands...
33,096,563 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,126,597 UART: [rt]cmd =0x44504543, len=28
33,169,171 >>> mbox cmd response data (2076 bytes)
33,179,203 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,209,109 UART: [rt]cmd =0x44504543, len=28
33,249,611 >>> mbox cmd response data (2076 bytes)
33,593,411 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,626,526 UART: [rt]cmd =0x49444550, len=353
33,640,358 >>> mbox cmd response data (8 bytes)
33,640,851 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,670,654 UART: [rt]cmd =0x44504543, len=28
33,713,536 >>> mbox cmd response data (2076 bytes)
33,723,468 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,753,427 UART: [rt]cmd =0x44504543, len=28
33,794,443 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,164 UART:
192,536 UART: Running Caliptra ROM ...
193,713 UART:
193,865 UART: [state] CFI Enabled
264,333 UART: [state] LifecycleState = Unprovisioned
266,257 UART: [state] DebugLocked = No
267,885 UART: [state] WD Timer not started. Device not locked for debugging
272,067 UART: [kat] SHA2-256
451,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,756 UART: [kat] ++
463,289 UART: [kat] sha1
474,028 UART: [kat] SHA2-256
477,032 UART: [kat] SHA2-384
483,303 UART: [kat] SHA2-512-ACC
486,242 UART: [kat] ECC-384
2,948,905 UART: [kat] HMAC-384Kdf
2,971,500 UART: [kat] LMS
3,500,966 UART: [kat] --
3,504,462 UART: [cold-reset] ++
3,505,254 UART: [fht] FHT @ 0x50003400
3,516,650 UART: [idev] ++
3,517,208 UART: [idev] CDI.KEYID = 6
3,518,215 UART: [idev] SUBJECT.KEYID = 7
3,519,267 UART: [idev] UDS.KEYID = 0
3,520,380 ready_for_fw is high
3,520,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,574 UART: [idev] Erasing UDS.KEYID = 0
6,029,225 UART: [idev] Sha1 KeyId Algorithm
6,052,565 UART: [idev] --
6,055,536 UART: [ldev] ++
6,056,106 UART: [ldev] CDI.KEYID = 6
6,056,994 UART: [ldev] SUBJECT.KEYID = 5
6,058,210 UART: [ldev] AUTHORITY.KEYID = 7
6,059,523 UART: [ldev] FE.KEYID = 1
6,103,583 UART: [ldev] Erasing FE.KEYID = 1
8,608,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,649 UART: [ldev] --
10,417,938 UART: [fwproc] Wait for Commands...
10,419,920 UART: [fwproc] Recv command 0x46574c44
10,422,018 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,566 >>> mbox cmd response: success
14,283,316 UART: [afmc] ++
14,283,908 UART: [afmc] CDI.KEYID = 6
14,284,824 UART: [afmc] SUBJECT.KEYID = 7
14,285,983 UART: [afmc] AUTHORITY.KEYID = 5
16,810,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,721 UART: [afmc] --
18,611,309 UART: [cold-reset] --
18,613,657 UART: [state] Locking Datavault
18,618,197 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,990 UART: [state] Locking ICCM
18,621,187 UART: [exit] Launching FMC @ 0x40000130
18,629,589 UART:
18,629,827 UART: Running Caliptra FMC ...
18,630,927 UART:
18,631,085 UART: [state] CFI Enabled
18,693,335 UART: [fht] FMC Alias Private Key: 7
20,457,383 UART: [art] Extend RT PCRs Done
20,458,604 UART: [art] Lock RT PCRs Done
20,460,056 UART: [art] Populate DV Done
20,465,585 UART: [fht] FMC Alias Private Key: 7
20,467,124 UART: [art] Derive CDI
20,467,886 UART: [art] Store in in slot 0x4
20,525,836 UART: [art] Derive Key Pair
20,526,832 UART: [art] Store priv key in slot 0x5
22,989,997 UART: [art] Derive Key Pair - Done
23,002,883 UART: [art] Signing Cert with AUTHO
23,004,187 UART: RITY.KEYID = 7
24,715,492 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,990 UART: [art] PUB.X = 3175E92DD8D096D4197C03B6322D949196CCC452BE4E2E114EB12F56377CA550A734AC731895898F3B216DC575DA9CFE
24,724,291 UART: [art] PUB.Y = 10D2160ED57B143DC71917D702411D8998D1CE2751B5F2F5BBEE908B999D8AB1083B6915547F59672831D8C5052CAF39
24,731,515 UART: [art] SIG.R = 5D5232723D4CBDC79C4E0F8B6FFBBCE955EDF7B1B982CD94C49AB68653F5FFBD091A53B41FC4717CA73081D9BABE2693
24,738,953 UART: [art] SIG.S = 0805AA30C4B802A4DF6AC215B6994963600C8810CD6D5AC1724172AD87F909E588A038C3008BA34A2FB2968D6680AE18
25,718,262 UART: Caliptra RT
25,718,983 UART: [state] CFI Enabled
25,883,456 UART: [rt] RT listening for mailbox commands...
25,885,395 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,915,906 UART: [rt]cmd =0x44504543, len=28
25,958,729 >>> mbox cmd response data (2076 bytes)
25,968,743 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,998,885 UART: [rt]cmd =0x44504543, len=28
26,039,207 >>> mbox cmd response data (2076 bytes)
26,383,692 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,416,818 UART: [rt]cmd =0x49444550, len=353
26,430,547 >>> mbox cmd response data (8 bytes)
26,431,010 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,460,847 UART: [rt]cmd =0x44504543, len=28
26,503,183 >>> mbox cmd response data (2076 bytes)
26,513,176 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,543,122 UART: [rt]cmd =0x44504543, len=28
26,583,831 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,380,260 ready_for_fw is high
3,380,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,079,084 >>> mbox cmd response: success
18,366,560 UART:
18,366,958 UART: Running Caliptra FMC ...
18,368,068 UART:
18,368,223 UART: [state] CFI Enabled
18,433,413 UART: [fht] FMC Alias Private Key: 7
20,197,200 UART: [art] Extend RT PCRs Done
20,198,411 UART: [art] Lock RT PCRs Done
20,200,166 UART: [art] Populate DV Done
20,205,573 UART: [fht] FMC Alias Private Key: 7
20,207,114 UART: [art] Derive CDI
20,207,852 UART: [art] Store in in slot 0x4
20,266,080 UART: [art] Derive Key Pair
20,267,082 UART: [art] Store priv key in slot 0x5
22,730,108 UART: [art] Derive Key Pair - Done
22,742,854 UART: [art] Signing Cert with AUTHO
22,744,157 UART: RITY.KEYID = 7
24,455,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,975 UART: [art] PUB.X = A3814C74392D793DD13F3DC5E0908F463DF302CBF6C2B5A7386907BDEBC4CBB6149AB42DD7C4378E07CCC2AAD78E5116
24,464,283 UART: [art] PUB.Y = F876190D03B020B12566DECC82691044466F17A6CEF45CA33E55DFD230FCC7450C45DB6E346CD3894FCD36F84DD7D9B1
24,471,544 UART: [art] SIG.R = 4FEFBB57301D76BF05C23B8273E87AEED2F2D4D66D5AA552C953F0713B6F0AE9A7CEB6ED944E92B51FD7E6B688BB3AD5
24,478,944 UART: [art] SIG.S = DBD68E17A0DE9E17008FAC1F3426BB5041E2BE3BD0687D0C6DFA9D9B112D1A1031A4245AE8702C20F978C1AE6114987C
25,457,948 UART: Caliptra RT
25,458,656 UART: [state] CFI Enabled
25,622,471 UART: [rt] RT listening for mailbox commands...
25,624,402 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,654,732 UART: [rt]cmd =0x44504543, len=28
25,697,446 >>> mbox cmd response data (2076 bytes)
25,707,465 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,737,433 UART: [rt]cmd =0x44504543, len=28
25,777,920 >>> mbox cmd response data (2076 bytes)
26,122,134 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,155,320 UART: [rt]cmd =0x49444550, len=353
26,169,046 >>> mbox cmd response data (8 bytes)
26,169,542 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,199,508 UART: [rt]cmd =0x44504543, len=28
26,242,598 >>> mbox cmd response data (2076 bytes)
26,252,487 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,282,584 UART: [rt]cmd =0x44504543, len=28
26,323,668 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,392 UART:
192,756 UART: Running Caliptra ROM ...
193,845 UART:
603,746 UART: [state] CFI Enabled
617,071 UART: [state] LifecycleState = Unprovisioned
618,951 UART: [state] DebugLocked = No
620,621 UART: [state] WD Timer not started. Device not locked for debugging
624,009 UART: [kat] SHA2-256
803,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,754 UART: [kat] ++
815,199 UART: [kat] sha1
826,771 UART: [kat] SHA2-256
829,773 UART: [kat] SHA2-384
835,190 UART: [kat] SHA2-512-ACC
838,117 UART: [kat] ECC-384
3,277,638 UART: [kat] HMAC-384Kdf
3,290,469 UART: [kat] LMS
3,819,938 UART: [kat] --
3,824,238 UART: [cold-reset] ++
3,826,167 UART: [fht] FHT @ 0x50003400
3,835,544 UART: [idev] ++
3,836,161 UART: [idev] CDI.KEYID = 6
3,837,049 UART: [idev] SUBJECT.KEYID = 7
3,838,222 UART: [idev] UDS.KEYID = 0
3,839,119 ready_for_fw is high
3,839,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,912 UART: [idev] Erasing UDS.KEYID = 0
6,308,881 UART: [idev] Sha1 KeyId Algorithm
6,331,675 UART: [idev] --
6,336,489 UART: [ldev] ++
6,337,065 UART: [ldev] CDI.KEYID = 6
6,337,978 UART: [ldev] SUBJECT.KEYID = 5
6,339,135 UART: [ldev] AUTHORITY.KEYID = 7
6,340,411 UART: [ldev] FE.KEYID = 1
6,350,884 UART: [ldev] Erasing FE.KEYID = 1
8,831,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,461 UART: [ldev] --
10,619,930 UART: [fwproc] Wait for Commands...
10,623,150 UART: [fwproc] Recv command 0x46574c44
10,625,243 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,453 >>> mbox cmd response: success
14,496,515 UART: [afmc] ++
14,497,144 UART: [afmc] CDI.KEYID = 6
14,498,028 UART: [afmc] SUBJECT.KEYID = 7
14,499,184 UART: [afmc] AUTHORITY.KEYID = 5
16,998,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,615 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,665 UART: [afmc] --
18,794,723 UART: [cold-reset] --
18,799,178 UART: [state] Locking Datavault
18,804,956 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,657 UART: [state] Locking ICCM
18,808,036 UART: [exit] Launching FMC @ 0x40000130
18,816,431 UART:
18,816,657 UART: Running Caliptra FMC ...
18,817,750 UART:
18,817,899 UART: [state] CFI Enabled
18,826,172 UART: [fht] FMC Alias Private Key: 7
20,583,389 UART: [art] Extend RT PCRs Done
20,584,604 UART: [art] Lock RT PCRs Done
20,586,221 UART: [art] Populate DV Done
20,591,679 UART: [fht] FMC Alias Private Key: 7
20,593,313 UART: [art] Derive CDI
20,594,121 UART: [art] Store in in slot 0x4
20,636,446 UART: [art] Derive Key Pair
20,637,478 UART: [art] Store priv key in slot 0x5
23,063,732 UART: [art] Derive Key Pair - Done
23,076,786 UART: [art] Signing Cert with AUTHO
23,078,081 UART: RITY.KEYID = 7
24,783,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,951 UART: [art] PUB.X = 2A6B686596EF853217D3081F0397F5689A0623E06AA9B0D41A4672B8F0F8F7990767BDE360702FA1D1A57A9E8F7E249C
24,792,194 UART: [art] PUB.Y = 94D1784F7421E6D663DFA9CA1A9A185E8E143F9C4E1351A466224BAD9DA1A17C5D2B023236AB4481AC7014C438896DE6
24,799,443 UART: [art] SIG.R = 5EB1961848112AC02C7CF0FDDBDD304EB392C96E4943E19BCD4797AF9574182ECA5ACF5681FB114B9A1ECBCE70284F40
24,806,902 UART: [art] SIG.S = 6C8E03E20B1C3C169E80F70ED0229E2CDC43BC9017FF482ECE3C089E328EB3A5D4FB56A20739AA7F57BD358AA4A8289C
25,786,650 UART: Caliptra RT
25,787,342 UART: [state] CFI Enabled
25,903,634 UART: [rt] RT listening for mailbox commands...
25,905,571 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,935,603 UART: [rt]cmd =0x44504543, len=28
25,978,564 >>> mbox cmd response data (2076 bytes)
25,988,771 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,018,807 UART: [rt]cmd =0x44504543, len=28
26,058,991 >>> mbox cmd response data (2076 bytes)
26,404,277 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,437,317 UART: [rt]cmd =0x49444550, len=352
26,448,725 >>> mbox cmd response data (8 bytes)
26,449,209 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,479,302 UART: [rt]cmd =0x44504543, len=28
26,521,803 >>> mbox cmd response data (2076 bytes)
26,531,811 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,561,899 UART: [rt]cmd =0x44504543, len=28
26,602,602 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,696,939 ready_for_fw is high
3,697,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,820 >>> mbox cmd response: success
18,531,388 UART:
18,531,889 UART: Running Caliptra FMC ...
18,532,996 UART:
18,533,148 UART: [state] CFI Enabled
18,541,250 UART: [fht] FMC Alias Private Key: 7
20,297,764 UART: [art] Extend RT PCRs Done
20,298,997 UART: [art] Lock RT PCRs Done
20,300,999 UART: [art] Populate DV Done
20,306,451 UART: [fht] FMC Alias Private Key: 7
20,307,940 UART: [art] Derive CDI
20,308,721 UART: [art] Store in in slot 0x4
20,351,647 UART: [art] Derive Key Pair
20,352,688 UART: [art] Store priv key in slot 0x5
22,779,538 UART: [art] Derive Key Pair - Done
22,792,696 UART: [art] Signing Cert with AUTHO
22,793,989 UART: RITY.KEYID = 7
24,499,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,027 UART: [art] PUB.X = 6480B6AA2F4F3EFFE3E3B3C7D824A2BF78E1B94FED9ACC8DF75E7C2219F3B4C263990622300C7F097C948D94B532D270
24,508,312 UART: [art] PUB.Y = DA7056DCD7990A7D8F4FC8EFD372D8D19B62671C31C4353FDD7A7A8D26A726830F5733CFF45373726965B44D26701D9D
24,515,580 UART: [art] SIG.R = 6048F0071BFC5151F3B8692D78FFD760CB5DA9ED1F37325BF8E24077B32E7C547DFB38B771F93959784C6EF0BB9D1E98
24,522,963 UART: [art] SIG.S = 140BEC58B334576A172B870D485E9E77AE2C0315F563C113E966C03D017B855D09B5AD4AAD6AD1EB284EF4326482B4A2
25,502,327 UART: Caliptra RT
25,503,023 UART: [state] CFI Enabled
25,620,702 UART: [rt] RT listening for mailbox commands...
25,622,659 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,652,786 UART: [rt]cmd =0x44504543, len=28
25,695,158 >>> mbox cmd response data (2076 bytes)
25,705,200 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,735,101 UART: [rt]cmd =0x44504543, len=28
25,775,773 >>> mbox cmd response data (2076 bytes)
26,119,920 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,153,055 UART: [rt]cmd =0x49444550, len=354
26,166,761 >>> mbox cmd response data (8 bytes)
26,167,278 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,197,242 UART: [rt]cmd =0x44504543, len=28
26,240,091 >>> mbox cmd response data (2076 bytes)
26,250,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,280,019 UART: [rt]cmd =0x44504543, len=28
26,320,972 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,122 UART:
192,490 UART: Running Caliptra ROM ...
193,612 UART:
193,762 UART: [state] CFI Enabled
263,175 UART: [state] LifecycleState = Unprovisioned
265,601 UART: [state] DebugLocked = No
267,851 UART: [state] WD Timer not started. Device not locked for debugging
272,526 UART: [kat] SHA2-256
462,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,185 UART: [kat] ++
473,666 UART: [kat] sha1
484,686 UART: [kat] SHA2-256
487,720 UART: [kat] SHA2-384
494,214 UART: [kat] SHA2-512-ACC
496,798 UART: [kat] ECC-384
2,949,131 UART: [kat] HMAC-384Kdf
2,971,523 UART: [kat] LMS
3,503,254 UART: [kat] --
3,509,027 UART: [cold-reset] ++
3,510,817 UART: [fht] FHT @ 0x50003400
3,523,429 UART: [idev] ++
3,524,070 UART: [idev] CDI.KEYID = 6
3,525,055 UART: [idev] SUBJECT.KEYID = 7
3,526,229 UART: [idev] UDS.KEYID = 0
3,527,153 ready_for_fw is high
3,527,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,385 UART: [idev] Erasing UDS.KEYID = 0
6,029,711 UART: [idev] Sha1 KeyId Algorithm
6,052,090 UART: [idev] --
6,056,388 UART: [ldev] ++
6,057,084 UART: [ldev] CDI.KEYID = 6
6,058,000 UART: [ldev] SUBJECT.KEYID = 5
6,059,167 UART: [ldev] AUTHORITY.KEYID = 7
6,060,405 UART: [ldev] FE.KEYID = 1
6,101,135 UART: [ldev] Erasing FE.KEYID = 1
8,607,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,964 UART: [ldev] --
10,415,683 UART: [fwproc] Wait for Commands...
10,418,811 UART: [fwproc] Recv command 0x46574c44
10,421,067 UART: [fwproc] Recv'd Img size: 114448 bytes
13,869,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,402 >>> mbox cmd response: success
14,608,427 UART: [afmc] ++
14,609,136 UART: [afmc] CDI.KEYID = 6
14,610,251 UART: [afmc] SUBJECT.KEYID = 7
14,611,806 UART: [afmc] AUTHORITY.KEYID = 5
17,150,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,851 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,574 UART: [afmc] --
18,951,822 UART: [cold-reset] --
18,956,845 UART: [state] Locking Datavault
18,963,394 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,586 UART: [state] Locking ICCM
18,967,575 UART: [exit] Launching FMC @ 0x40000130
18,976,248 UART:
18,976,489 UART: Running Caliptra FMC ...
18,977,590 UART:
18,977,754 UART: [state] CFI Enabled
19,033,413 UART: [fht] FMC Alias Private Key: 7
20,797,234 UART: [art] Extend RT PCRs Done
20,798,441 UART: [art] Lock RT PCRs Done
20,800,146 UART: [art] Populate DV Done
20,805,553 UART: [fht] FMC Alias Private Key: 7
20,807,139 UART: [art] Derive CDI
20,807,873 UART: [art] Store in in slot 0x4
20,865,878 UART: [art] Derive Key Pair
20,866,933 UART: [art] Store priv key in slot 0x5
23,330,169 UART: [art] Derive Key Pair - Done
23,342,792 UART: [art] Signing Cert with AUTHO
23,344,094 UART: RITY.KEYID = 7
25,056,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,771 UART: [art] PUB.X = 1A54E96A46E130452AF71BA55CB5C618F97B22735E4E9794EAD66AA2EFCFB0B3A8C8EC9FC82EF7B820603BEB06A6367E
25,065,060 UART: [art] PUB.Y = A3A6953BC37C1B3428F1F4866B393E37CC257E1BB8DFB1C397A7D3CCDC40807C2866240D3B1E696780D5256B4022BA77
25,072,290 UART: [art] SIG.R = 8BC3C9C85ABFC2B88A4BBAAB48409837965A9297D8747F73E256F47BE9984EE92E3E6CB7B0944B7D69E560F4E0326418
25,079,686 UART: [art] SIG.S = 5205652E4BA0E18DFC86E160B9939CD2B35ADCACC5BB198DA77EDABBEFC933C9D66915067DBB9B4F153952D6F1CBFBE4
26,058,525 UART: Caliptra RT
26,059,238 UART: [state] CFI Enabled
26,224,495 UART: [rt] RT listening for mailbox commands...
26,226,445 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,256,984 UART: [rt]cmd =0x44504543, len=28
26,299,924 >>> mbox cmd response data (2076 bytes)
26,310,030 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,340,178 UART: [rt]cmd =0x44504543, len=28
26,381,008 >>> mbox cmd response data (2076 bytes)
26,725,437 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,758,470 UART: [rt]cmd =0x49444550, len=353
26,772,148 >>> mbox cmd response data (8 bytes)
26,772,684 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,802,601 UART: [rt]cmd =0x44504543, len=28
26,845,223 >>> mbox cmd response data (2076 bytes)
26,855,576 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,885,628 UART: [rt]cmd =0x44504543, len=28
26,926,304 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,438,553 ready_for_fw is high
3,439,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,610 >>> mbox cmd response: success
19,029,055 UART:
19,029,439 UART: Running Caliptra FMC ...
19,030,630 UART:
19,030,799 UART: [state] CFI Enabled
19,097,737 UART: [fht] FMC Alias Private Key: 7
20,861,150 UART: [art] Extend RT PCRs Done
20,862,371 UART: [art] Lock RT PCRs Done
20,863,945 UART: [art] Populate DV Done
20,869,138 UART: [fht] FMC Alias Private Key: 7
20,870,619 UART: [art] Derive CDI
20,871,434 UART: [art] Store in in slot 0x4
20,930,155 UART: [art] Derive Key Pair
20,931,196 UART: [art] Store priv key in slot 0x5
23,394,581 UART: [art] Derive Key Pair - Done
23,407,737 UART: [art] Signing Cert with AUTHO
23,409,037 UART: RITY.KEYID = 7
25,120,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,200 UART: [art] PUB.X = B4ED6B70D03D3A8CC7997C4E075A2F77ECACA72BC94A02C18A99279BD9338F7FB56CDC85A718723523D6A0CCC9A45ABB
25,129,212 UART: [art] PUB.Y = C8C97B178DC78E1C81666A81517026701FA88F7741CA6E25C6D82D72021AA670E37C22A2B14FF6B9E9C51A56E8BD0A3D
25,136,468 UART: [art] SIG.R = 8BE77516AEE542C4914E82828C27C1F3DF6D244A81276F7FE20597F8F0B2FB0CE88B4EEB55BFDAED0892F0F4A755C105
25,143,884 UART: [art] SIG.S = 6FB4B4884B377DFEBB382A7BF23E768EED7287F753EB2F3E9330BE0984568A609D40472CBA502A9EE00232219AE8AD73
26,123,158 UART: Caliptra RT
26,123,865 UART: [state] CFI Enabled
26,287,854 UART: [rt] RT listening for mailbox commands...
26,289,816 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,320,596 UART: [rt]cmd =0x44504543, len=28
26,362,935 >>> mbox cmd response data (2076 bytes)
26,373,012 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,403,255 UART: [rt]cmd =0x44504543, len=28
26,443,896 >>> mbox cmd response data (2076 bytes)
26,787,977 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,820,833 UART: [rt]cmd =0x49444550, len=354
26,834,651 >>> mbox cmd response data (8 bytes)
26,835,130 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,865,204 UART: [rt]cmd =0x44504543, len=28
26,907,577 >>> mbox cmd response data (2076 bytes)
26,917,488 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,947,667 UART: [rt]cmd =0x44504543, len=28
26,988,724 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,349 UART:
192,722 UART: Running Caliptra ROM ...
193,903 UART:
603,389 UART: [state] CFI Enabled
617,641 UART: [state] LifecycleState = Unprovisioned
620,026 UART: [state] DebugLocked = No
621,483 UART: [state] WD Timer not started. Device not locked for debugging
626,791 UART: [kat] SHA2-256
816,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,510 UART: [kat] ++
827,986 UART: [kat] sha1
839,211 UART: [kat] SHA2-256
842,210 UART: [kat] SHA2-384
849,618 UART: [kat] SHA2-512-ACC
852,192 UART: [kat] ECC-384
3,294,494 UART: [kat] HMAC-384Kdf
3,306,630 UART: [kat] LMS
3,838,505 UART: [kat] --
3,843,422 UART: [cold-reset] ++
3,844,570 UART: [fht] FHT @ 0x50003400
3,855,400 UART: [idev] ++
3,856,097 UART: [idev] CDI.KEYID = 6
3,857,121 UART: [idev] SUBJECT.KEYID = 7
3,858,285 UART: [idev] UDS.KEYID = 0
3,859,225 ready_for_fw is high
3,859,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,208 UART: [idev] Erasing UDS.KEYID = 0
6,335,711 UART: [idev] Sha1 KeyId Algorithm
6,358,562 UART: [idev] --
6,364,340 UART: [ldev] ++
6,365,015 UART: [ldev] CDI.KEYID = 6
6,365,923 UART: [ldev] SUBJECT.KEYID = 5
6,367,072 UART: [ldev] AUTHORITY.KEYID = 7
6,368,293 UART: [ldev] FE.KEYID = 1
6,380,277 UART: [ldev] Erasing FE.KEYID = 1
8,857,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,172 UART: [ldev] --
10,646,178 UART: [fwproc] Wait for Commands...
10,648,921 UART: [fwproc] Recv command 0x46574c44
10,651,224 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,832,880 >>> mbox cmd response: success
14,836,502 UART: [afmc] ++
14,837,242 UART: [afmc] CDI.KEYID = 6
14,838,375 UART: [afmc] SUBJECT.KEYID = 7
14,839,876 UART: [afmc] AUTHORITY.KEYID = 5
17,339,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,492 UART: [afmc] --
19,135,763 UART: [cold-reset] --
19,139,891 UART: [state] Locking Datavault
19,146,489 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,683 UART: [state] Locking ICCM
19,150,325 UART: [exit] Launching FMC @ 0x40000130
19,159,005 UART:
19,159,238 UART: Running Caliptra FMC ...
19,160,254 UART:
19,160,396 UART: [state] CFI Enabled
19,169,088 UART: [fht] FMC Alias Private Key: 7
20,926,185 UART: [art] Extend RT PCRs Done
20,927,393 UART: [art] Lock RT PCRs Done
20,929,067 UART: [art] Populate DV Done
20,934,596 UART: [fht] FMC Alias Private Key: 7
20,936,135 UART: [art] Derive CDI
20,936,891 UART: [art] Store in in slot 0x4
20,979,727 UART: [art] Derive Key Pair
20,980,748 UART: [art] Store priv key in slot 0x5
23,407,784 UART: [art] Derive Key Pair - Done
23,421,101 UART: [art] Signing Cert with AUTHO
23,422,396 UART: RITY.KEYID = 7
25,128,201 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,696 UART: [art] PUB.X = 7FC80AFF77773F93465678DDAC92C07AE1C56EEDBD9913CE8782B55CCFB49F14805EFFCA31F214BD192B4812C53D179C
25,137,033 UART: [art] PUB.Y = D109A52D576BB9888E2DD40BF4832ACBF8AF8B3E8E7B28F00A82A6E0B58A4CB47B328D337E38C1BC2170E7AD91D084E9
25,144,304 UART: [art] SIG.R = 332FDBCD092AED2F204B9ED8F1D19B3D1CBB7273064B7930E4110D54643A7A38F3871792423A7EB2AB51ADC4E8F181B6
25,151,677 UART: [art] SIG.S = 00894615A8313FE12AF622BA06296BC3E85E5B2284CEBA2F8351B562F94C2B8F08F8B24D82F11A54F4675B2FC7F337F3
26,130,998 UART: Caliptra RT
26,131,715 UART: [state] CFI Enabled
26,248,167 UART: [rt] RT listening for mailbox commands...
26,250,132 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,280,058 UART: [rt]cmd =0x44504543, len=28
26,322,957 >>> mbox cmd response data (2076 bytes)
26,333,033 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,363,211 UART: [rt]cmd =0x44504543, len=28
26,403,461 >>> mbox cmd response data (2076 bytes)
26,747,901 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,781,176 UART: [rt]cmd =0x49444550, len=353
26,794,780 >>> mbox cmd response data (8 bytes)
26,795,303 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,825,212 UART: [rt]cmd =0x44504543, len=28
26,868,043 >>> mbox cmd response data (2076 bytes)
26,878,212 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,908,472 UART: [rt]cmd =0x44504543, len=28
26,949,092 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,753,226 ready_for_fw is high
3,753,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,946,168 >>> mbox cmd response: success
19,201,630 UART:
19,202,019 UART: Running Caliptra FMC ...
19,203,145 UART:
19,203,294 UART: [state] CFI Enabled
19,211,421 UART: [fht] FMC Alias Private Key: 7
20,967,758 UART: [art] Extend RT PCRs Done
20,968,983 UART: [art] Lock RT PCRs Done
20,970,687 UART: [art] Populate DV Done
20,975,880 UART: [fht] FMC Alias Private Key: 7
20,977,522 UART: [art] Derive CDI
20,978,333 UART: [art] Store in in slot 0x4
21,021,078 UART: [art] Derive Key Pair
21,022,080 UART: [art] Store priv key in slot 0x5
23,448,674 UART: [art] Derive Key Pair - Done
23,461,779 UART: [art] Signing Cert with AUTHO
23,463,071 UART: RITY.KEYID = 7
25,168,503 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,012 UART: [art] PUB.X = 6794805ACBB59DE0140D02107B8EE4E2422CE8902014FCD77EA54109FE27397D9A988FACE67D19C062B2A81F52B400B7
25,177,237 UART: [art] PUB.Y = 16FE2630837FB22181D9F8A184F0DB7E5DAF262290FAAEB6A40387E3D14F9F7256633D26B76EC190661BF95170E4E76B
25,184,524 UART: [art] SIG.R = ECDD646116225C77A7B23ADE3907ED4850DB85A2F1A1D2DEAEAACAEB875BBBAF455A78CFE28D6E4A3C1A3F8FE305C45A
25,191,948 UART: [art] SIG.S = F37404E9935D56DDF333C0EFA16E879CAD048137B1B0F0F1A4C6C24ADB41A751C54FDAEE6451E227F73376E1FE40BFF4
26,170,840 UART: Caliptra RT
26,171,551 UART: [state] CFI Enabled
26,287,968 UART: [rt] RT listening for mailbox commands...
26,289,905 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,319,995 UART: [rt]cmd =0x44504543, len=28
26,362,641 >>> mbox cmd response data (2076 bytes)
26,372,633 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,402,760 UART: [rt]cmd =0x44504543, len=28
26,443,303 >>> mbox cmd response data (2076 bytes)
26,787,903 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,821,024 UART: [rt]cmd =0x49444550, len=352
26,832,367 >>> mbox cmd response data (8 bytes)
26,832,846 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,862,918 UART: [rt]cmd =0x44504543, len=28
26,905,355 >>> mbox cmd response data (2076 bytes)
26,915,264 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,945,322 UART: [rt]cmd =0x44504543, len=28
26,986,415 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,319 UART: [cold-reset] ++
1,476,871 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 ready_for_fw is high
1,481,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,810 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,018 UART: [idev] --
1,515,005 UART: [ldev] ++
1,515,173 UART: [ldev] CDI.KEYID = 6
1,515,536 UART: [ldev] SUBJECT.KEYID = 5
1,515,962 UART: [ldev] AUTHORITY.KEYID = 7
1,516,425 UART: [ldev] FE.KEYID = 1
1,521,637 UART: [ldev] Erasing FE.KEYID = 1
1,547,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,846 UART: [ldev] --
1,586,275 UART: [fwproc] Waiting for Commands...
1,587,132 UART: [fwproc] Received command 0x46574c44
1,587,923 UART: [fwproc] Received Image of size 114448 bytes
2,887,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,431 >>> mbox cmd response: success
3,080,463 UART: [afmc] ++
3,080,631 UART: [afmc] CDI.KEYID = 6
3,080,993 UART: [afmc] SUBJECT.KEYID = 7
3,081,418 UART: [afmc] AUTHORITY.KEYID = 5
3,116,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,202 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,892 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,867 UART: [afmc] --
3,159,801 UART: [cold-reset] --
3,160,723 UART: [state] Locking Datavault
3,161,926 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,530 UART: [state] Locking ICCM
3,163,054 UART: [exit] Launching FMC @ 0x40000130
3,168,383 UART:
3,168,399 UART: Running Caliptra FMC ...
3,168,807 UART:
3,168,861 UART: [state] CFI Enabled
3,179,526 UART: [fht] FMC Alias Private Key: 7
3,287,201 UART: [art] Extend RT PCRs Done
3,287,629 UART: [art] Lock RT PCRs Done
3,289,271 UART: [art] Populate DV Done
3,297,272 UART: [fht] FMC Alias Private Key: 7
3,298,218 UART: [art] Derive CDI
3,298,498 UART: [art] Store in in slot 0x4
3,384,387 UART: [art] Derive Key Pair
3,384,747 UART: [art] Store priv key in slot 0x5
3,397,847 UART: [art] Derive Key Pair - Done
3,412,844 UART: [art] Signing Cert with AUTHO
3,413,324 UART: RITY.KEYID = 7
3,428,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,975 UART: [art] PUB.X = 68BB4E735D6F4BC2D833963F2311A96016ABB7085FF533BF2DB8F07369FF5C2308E9B1EA861ECC07CB832BDC3A81886F
3,435,748 UART: [art] PUB.Y = 44D25668C28F287F150F46C4F047322BB4C3D506CA73B7FEBCD3138E66CF5C0C964304AA144E048F9038D463F459FEDF
3,442,689 UART: [art] SIG.R = 61672CC2DE770C16CBF4437A2E03F1FDC785DEEFF69194C61E7A05DC69E1CD2846E46F2F8AB02B86B7912C87D975503E
3,449,462 UART: [art] SIG.S = 8FC6F641610F1FD39E1BAB81F3E6B69446F6CACAE8D515EAC570466CAD8BD8A7556D7C2AE5C388BBFAEC31E049EB2C0E
3,473,575 UART: Caliptra RT
3,473,828 UART: [state] CFI Enabled
3,581,927 UART: [rt] RT listening for mailbox commands...
3,582,597 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,809 UART: [rt]cmd =0x44504543, len=28
3,655,974 >>> mbox cmd response data (2076 bytes)
3,655,975 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,600 UART: [rt]cmd =0x44504543, len=28
3,726,676 >>> mbox cmd response data (2076 bytes)
3,726,677 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,322 UART: [rt]cmd =0x49444550, len=352
3,769,075 >>> mbox cmd response data (8 bytes)
3,769,076 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,625 UART: [rt]cmd =0x44504543, len=28
3,841,848 >>> mbox cmd response data (2076 bytes)
3,841,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,871,424 UART: [rt]cmd =0x44504543, len=28
3,913,002 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,819 ready_for_fw is high
1,362,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,805 >>> mbox cmd response: success
2,991,265 UART:
2,991,281 UART: Running Caliptra FMC ...
2,991,689 UART:
2,991,743 UART: [state] CFI Enabled
3,002,470 UART: [fht] FMC Alias Private Key: 7
3,110,619 UART: [art] Extend RT PCRs Done
3,111,047 UART: [art] Lock RT PCRs Done
3,112,709 UART: [art] Populate DV Done
3,120,862 UART: [fht] FMC Alias Private Key: 7
3,122,036 UART: [art] Derive CDI
3,122,316 UART: [art] Store in in slot 0x4
3,207,879 UART: [art] Derive Key Pair
3,208,239 UART: [art] Store priv key in slot 0x5
3,221,341 UART: [art] Derive Key Pair - Done
3,235,958 UART: [art] Signing Cert with AUTHO
3,236,438 UART: RITY.KEYID = 7
3,251,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,705 UART: [art] PUB.X = 9891A305A5FC0ABF2631337DD666C61C83E81F61E78C88FC3F2A91592B78F1B72782CE802A6E653B7CE3C1BB78D93506
3,259,470 UART: [art] PUB.Y = 65C4C602E98E1E0C5844F7499E453FB2A07C9A7C67F3005BB8729A9F768BBDA8F0BEA75F0DFB14C2E009E712C84BFE5B
3,266,402 UART: [art] SIG.R = 8AD52F96E3DC710473EADB602E7D47788C78D3F7F51328BCEFE05BF1509D22D5669B9FA5907DCE17064CE628F4D021C0
3,273,176 UART: [art] SIG.S = 55339D5DF2242993AA84D7B6F9D9595D2D9DA95AE4A9482916DB96F7DBA157E120C82D68CC0A8B3628D462A887BC33ED
3,296,580 UART: Caliptra RT
3,296,833 UART: [state] CFI Enabled
3,403,596 UART: [rt] RT listening for mailbox commands...
3,404,266 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,074 UART: [rt]cmd =0x44504543, len=28
3,477,287 >>> mbox cmd response data (2076 bytes)
3,477,288 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,809 UART: [rt]cmd =0x44504543, len=28
3,547,901 >>> mbox cmd response data (2076 bytes)
3,547,902 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,635 UART: [rt]cmd =0x49444550, len=352
3,590,626 >>> mbox cmd response data (8 bytes)
3,590,627 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,996 UART: [rt]cmd =0x44504543, len=28
3,663,113 >>> mbox cmd response data (2076 bytes)
3,663,114 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,445 UART: [rt]cmd =0x44504543, len=28
3,734,341 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,576 UART: [kat] SHA2-256
892,514 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,239 UART: [kat] LMS
1,475,435 UART: [kat] --
1,476,214 UART: [cold-reset] ++
1,476,546 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 ready_for_fw is high
1,480,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,683 UART: [idev] --
1,514,674 UART: [ldev] ++
1,514,842 UART: [ldev] CDI.KEYID = 6
1,515,205 UART: [ldev] SUBJECT.KEYID = 5
1,515,631 UART: [ldev] AUTHORITY.KEYID = 7
1,516,094 UART: [ldev] FE.KEYID = 1
1,520,916 UART: [ldev] Erasing FE.KEYID = 1
1,546,921 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,139 UART: [ldev] --
1,586,568 UART: [fwproc] Waiting for Commands...
1,587,271 UART: [fwproc] Received command 0x46574c44
1,588,062 UART: [fwproc] Received Image of size 114448 bytes
2,886,957 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,157 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,432 >>> mbox cmd response: success
3,080,536 UART: [afmc] ++
3,080,704 UART: [afmc] CDI.KEYID = 6
3,081,066 UART: [afmc] SUBJECT.KEYID = 7
3,081,491 UART: [afmc] AUTHORITY.KEYID = 5
3,117,352 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,150 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,035 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,725 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,586 UART: [afmc] --
3,160,652 UART: [cold-reset] --
3,161,590 UART: [state] Locking Datavault
3,163,059 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,663 UART: [state] Locking ICCM
3,164,295 UART: [exit] Launching FMC @ 0x40000130
3,169,624 UART:
3,169,640 UART: Running Caliptra FMC ...
3,170,048 UART:
3,170,191 UART: [state] CFI Enabled
3,180,888 UART: [fht] FMC Alias Private Key: 7
3,288,759 UART: [art] Extend RT PCRs Done
3,289,187 UART: [art] Lock RT PCRs Done
3,290,583 UART: [art] Populate DV Done
3,298,418 UART: [fht] FMC Alias Private Key: 7
3,299,420 UART: [art] Derive CDI
3,299,700 UART: [art] Store in in slot 0x4
3,385,345 UART: [art] Derive Key Pair
3,385,705 UART: [art] Store priv key in slot 0x5
3,398,857 UART: [art] Derive Key Pair - Done
3,413,590 UART: [art] Signing Cert with AUTHO
3,414,070 UART: RITY.KEYID = 7
3,429,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,153 UART: [art] PUB.X = A7EBFC5D297FBB08541FA44DC1ADE2C79D15509CE60A943258640D49704E9438D4C685326170C66766E6212A7FAF5BF1
3,436,918 UART: [art] PUB.Y = AFA53AAAD74A24B1220B318705C2DD18D5F2838F00658C7A35F81B2B6B093B1CA19DDF5E1908E0B3194415A872423B26
3,443,838 UART: [art] SIG.R = 718696B5A8D275D83C872CF7C8F6FD766FAE6CB1D1AB46AE345508E77DC13EFDDE5964AAF00A5BB48E6949F623B8F92A
3,450,620 UART: [art] SIG.S = D38B12B985D1B4A54E870011055578E09F6554B78C83D2FE8FABBC37E35EEEDEFF4B5FBE492377E16BE13FE15C5A9F0C
3,474,179 UART: Caliptra RT
3,474,524 UART: [state] CFI Enabled
3,582,797 UART: [rt] RT listening for mailbox commands...
3,583,467 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,283 UART: [rt]cmd =0x44504543, len=28
3,656,476 >>> mbox cmd response data (2076 bytes)
3,656,477 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,806 UART: [rt]cmd =0x44504543, len=28
3,726,952 >>> mbox cmd response data (2076 bytes)
3,726,953 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,466 UART: [rt]cmd =0x49444550, len=352
3,769,289 >>> mbox cmd response data (8 bytes)
3,769,290 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,995 UART: [rt]cmd =0x44504543, len=28
3,842,220 >>> mbox cmd response data (2076 bytes)
3,842,221 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,871,624 UART: [rt]cmd =0x44504543, len=28
3,912,696 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,918 ready_for_fw is high
1,362,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,024 >>> mbox cmd response: success
2,991,888 UART:
2,991,904 UART: Running Caliptra FMC ...
2,992,312 UART:
2,992,455 UART: [state] CFI Enabled
3,003,264 UART: [fht] FMC Alias Private Key: 7
3,111,461 UART: [art] Extend RT PCRs Done
3,111,889 UART: [art] Lock RT PCRs Done
3,113,459 UART: [art] Populate DV Done
3,121,744 UART: [fht] FMC Alias Private Key: 7
3,122,768 UART: [art] Derive CDI
3,123,048 UART: [art] Store in in slot 0x4
3,208,355 UART: [art] Derive Key Pair
3,208,715 UART: [art] Store priv key in slot 0x5
3,221,879 UART: [art] Derive Key Pair - Done
3,236,606 UART: [art] Signing Cert with AUTHO
3,237,086 UART: RITY.KEYID = 7
3,252,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,399 UART: [art] PUB.X = 75ED416CB1C89338A63C5074FAC173206AA6CD98A5D8391B5FB76BCA04E946E2B5CFB2613B5693C2F26378885DB694D9
3,260,172 UART: [art] PUB.Y = 2AB70189B16B51A11FA2AF57E35A15E79E8CB62362FEAA2AFBFD9E1E7C9D78C4F6FC506FB6E443F96F190B423A44B34B
3,267,136 UART: [art] SIG.R = 34B03359E59EBC9AEC750A4DC0E8279B62413911C26670FA38D3800C49FC947638493333FE7AA72ACD33A0B1CEC118E4
3,273,904 UART: [art] SIG.S = DFB4230F1AB96D999E12B8B78C87CB5B0D925B69498CB9005390098048E3FEEE0EDE2DA14D6ADC6167AA8F71B1B38922
3,296,867 UART: Caliptra RT
3,297,212 UART: [state] CFI Enabled
3,405,287 UART: [rt] RT listening for mailbox commands...
3,405,957 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,677 UART: [rt]cmd =0x44504543, len=28
3,478,948 >>> mbox cmd response data (2076 bytes)
3,478,949 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,432 UART: [rt]cmd =0x44504543, len=28
3,549,484 >>> mbox cmd response data (2076 bytes)
3,549,485 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,082 UART: [rt]cmd =0x49444550, len=354
3,594,312 >>> mbox cmd response data (8 bytes)
3,594,313 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,990 UART: [rt]cmd =0x44504543, len=28
3,667,563 >>> mbox cmd response data (2076 bytes)
3,667,564 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,001 UART: [rt]cmd =0x44504543, len=28
3,738,617 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,098 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,171,375 UART: [cold-reset] ++
1,171,763 UART: [fht] FHT @ 0x50003400
1,174,222 UART: [idev] ++
1,174,390 UART: [idev] CDI.KEYID = 6
1,174,750 UART: [idev] SUBJECT.KEYID = 7
1,175,174 UART: [idev] UDS.KEYID = 0
1,175,519 ready_for_fw is high
1,175,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,307 UART: [idev] Sha1 KeyId Algorithm
1,208,809 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,442 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,866 >>> mbox cmd response: success
2,775,954 UART: [afmc] ++
2,776,122 UART: [afmc] CDI.KEYID = 6
2,776,484 UART: [afmc] SUBJECT.KEYID = 7
2,776,909 UART: [afmc] AUTHORITY.KEYID = 5
2,812,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,357 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,663 UART: [afmc] --
2,855,617 UART: [cold-reset] --
2,856,585 UART: [state] Locking Datavault
2,857,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,412 UART: [state] Locking ICCM
2,858,970 UART: [exit] Launching FMC @ 0x40000130
2,864,299 UART:
2,864,315 UART: Running Caliptra FMC ...
2,864,723 UART:
2,864,777 UART: [state] CFI Enabled
2,874,890 UART: [fht] FMC Alias Private Key: 7
2,983,361 UART: [art] Extend RT PCRs Done
2,983,789 UART: [art] Lock RT PCRs Done
2,984,935 UART: [art] Populate DV Done
2,993,210 UART: [fht] FMC Alias Private Key: 7
2,994,138 UART: [art] Derive CDI
2,994,418 UART: [art] Store in in slot 0x4
3,080,279 UART: [art] Derive Key Pair
3,080,639 UART: [art] Store priv key in slot 0x5
3,093,697 UART: [art] Derive Key Pair - Done
3,108,556 UART: [art] Signing Cert with AUTHO
3,109,036 UART: RITY.KEYID = 7
3,124,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,823 UART: [art] PUB.X = AB002255891896F83ECBC93BD170BFF75B357B3611961A03B35AB3F0935E80486177A7BA1B0CE3E089DC3D693CA40A8C
3,131,568 UART: [art] PUB.Y = 01FBEBCA3CDD97F632078C684DCA493FC0B1CE52ABEE95662BB6B6DCED9F13E69813D9CD95EB3AD6F66104A97296E7A0
3,138,533 UART: [art] SIG.R = A809F052BD6F5185823E8DF1ADFB45EE161A6D3C6A248C3D2B0F5DBFA95FA1ACE7F967465E85016D395EBB5B939008F4
3,145,307 UART: [art] SIG.S = 0030842A1880378CDA0AC57E1D37632943F172A5C66A7E0EE62339E65A5C5348DDB576644AF29A5A7AAB2D87101B8049
3,168,950 UART: Caliptra RT
3,169,203 UART: [state] CFI Enabled
3,276,589 UART: [rt] RT listening for mailbox commands...
3,277,259 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,427 UART: [rt]cmd =0x44504543, len=28
3,350,616 >>> mbox cmd response data (2076 bytes)
3,350,617 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,078 UART: [rt]cmd =0x44504543, len=28
3,421,387 >>> mbox cmd response data (2076 bytes)
3,421,388 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,965 UART: [rt]cmd =0x49444550, len=352
3,463,725 >>> mbox cmd response data (8 bytes)
3,463,726 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,227 UART: [rt]cmd =0x44504543, len=28
3,536,488 >>> mbox cmd response data (2076 bytes)
3,536,489 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,138 UART: [rt]cmd =0x44504543, len=28
3,607,231 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,743 ready_for_fw is high
1,060,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,635 >>> mbox cmd response: success
2,691,643 UART:
2,691,659 UART: Running Caliptra FMC ...
2,692,067 UART:
2,692,121 UART: [state] CFI Enabled
2,702,694 UART: [fht] FMC Alias Private Key: 7
2,810,415 UART: [art] Extend RT PCRs Done
2,810,843 UART: [art] Lock RT PCRs Done
2,812,373 UART: [art] Populate DV Done
2,820,476 UART: [fht] FMC Alias Private Key: 7
2,821,574 UART: [art] Derive CDI
2,821,854 UART: [art] Store in in slot 0x4
2,907,457 UART: [art] Derive Key Pair
2,907,817 UART: [art] Store priv key in slot 0x5
2,920,929 UART: [art] Derive Key Pair - Done
2,935,986 UART: [art] Signing Cert with AUTHO
2,936,466 UART: RITY.KEYID = 7
2,951,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,137 UART: [art] PUB.X = 270AE3AABC8AC72D24B0D0CF2E5060E7AACEA002DDCB9324B181AAF0F93C866C76CCA7B7B1090E71965106B5482AF7C3
2,958,912 UART: [art] PUB.Y = 2FC9EA91B6753DE5078053ED85DC9B9144095645466982A3E8F5698A54C7D96D596800635AAC05ED2C62BE6AD1D3046A
2,965,828 UART: [art] SIG.R = 0E48FF5DAB6EA6C614EAA55AE97E29BC46458AE9EF96FE08A7508A498FB6244FD5EE90D140359A9EF171C962F61E2789
2,972,606 UART: [art] SIG.S = A01EC73F1762FB1907655BB9C63B24AFE2812582CA70882B339F3814244351733E7F90D9E46316E0226A34B0F71BAFCF
2,996,160 UART: Caliptra RT
2,996,413 UART: [state] CFI Enabled
3,103,758 UART: [rt] RT listening for mailbox commands...
3,104,428 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,310 UART: [rt]cmd =0x44504543, len=28
3,177,423 >>> mbox cmd response data (2076 bytes)
3,177,424 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,206,883 UART: [rt]cmd =0x44504543, len=28
3,248,022 >>> mbox cmd response data (2076 bytes)
3,248,023 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,771 UART: [rt]cmd =0x49444550, len=353
3,292,935 >>> mbox cmd response data (8 bytes)
3,292,936 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,519 UART: [rt]cmd =0x44504543, len=28
3,365,494 >>> mbox cmd response data (2076 bytes)
3,365,495 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,194 UART: [rt]cmd =0x44504543, len=28
3,436,574 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
893,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,108 UART: [kat] ++
898,260 UART: [kat] sha1
902,570 UART: [kat] SHA2-256
904,510 UART: [kat] SHA2-384
907,447 UART: [kat] SHA2-512-ACC
909,348 UART: [kat] ECC-384
918,689 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,173,170 UART: [fht] FHT @ 0x50003400
1,175,781 UART: [idev] ++
1,175,949 UART: [idev] CDI.KEYID = 6
1,176,309 UART: [idev] SUBJECT.KEYID = 7
1,176,733 UART: [idev] UDS.KEYID = 0
1,177,078 ready_for_fw is high
1,177,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,719 UART: [idev] Erasing UDS.KEYID = 0
1,201,682 UART: [idev] Sha1 KeyId Algorithm
1,210,100 UART: [idev] --
1,211,070 UART: [ldev] ++
1,211,238 UART: [ldev] CDI.KEYID = 6
1,211,601 UART: [ldev] SUBJECT.KEYID = 5
1,212,027 UART: [ldev] AUTHORITY.KEYID = 7
1,212,490 UART: [ldev] FE.KEYID = 1
1,217,752 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,762 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,761 UART: [fwproc] Recv command 0x46574c44
1,284,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,105 >>> mbox cmd response: success
2,776,359 UART: [afmc] ++
2,776,527 UART: [afmc] CDI.KEYID = 6
2,776,889 UART: [afmc] SUBJECT.KEYID = 7
2,777,314 UART: [afmc] AUTHORITY.KEYID = 5
2,812,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,110 UART: [afmc] --
2,856,230 UART: [cold-reset] --
2,857,008 UART: [state] Locking Datavault
2,858,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,667 UART: [state] Locking ICCM
2,859,321 UART: [exit] Launching FMC @ 0x40000130
2,864,650 UART:
2,864,666 UART: Running Caliptra FMC ...
2,865,074 UART:
2,865,217 UART: [state] CFI Enabled
2,875,930 UART: [fht] FMC Alias Private Key: 7
2,983,561 UART: [art] Extend RT PCRs Done
2,983,989 UART: [art] Lock RT PCRs Done
2,985,613 UART: [art] Populate DV Done
2,994,134 UART: [fht] FMC Alias Private Key: 7
2,995,168 UART: [art] Derive CDI
2,995,448 UART: [art] Store in in slot 0x4
3,080,801 UART: [art] Derive Key Pair
3,081,161 UART: [art] Store priv key in slot 0x5
3,094,855 UART: [art] Derive Key Pair - Done
3,109,528 UART: [art] Signing Cert with AUTHO
3,110,008 UART: RITY.KEYID = 7
3,125,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,045 UART: [art] PUB.X = FDCF03451522585D5CB654070B2BFB13A55ECB4CEA204C7957B2D54BA72A65CDA25F5F2990D753E56DD0CA43EC30CB55
3,132,822 UART: [art] PUB.Y = E8291FC53B76228EC07A3341DB09974323CCB18141AE63C72D4037F9ADAA9F2BB7E7D5CB96F6565D9E9CAAEA2989EA3E
3,139,785 UART: [art] SIG.R = CDFD60AE55E9FC9C6BA1E1C5993AD9C1AAA73E0E9E48968A792D6111CAF9B19D079F6F34C939B7AD10ABDBF9FD2D4C6E
3,146,579 UART: [art] SIG.S = FDF2B71211ECC33ACD712E1B67E812DD2A53E195B66A33A73C3E7AA946618512691883182CA77EE4AF4463C6FCDA2B93
3,170,790 UART: Caliptra RT
3,171,135 UART: [state] CFI Enabled
3,279,023 UART: [rt] RT listening for mailbox commands...
3,279,693 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,621 UART: [rt]cmd =0x44504543, len=28
3,352,694 >>> mbox cmd response data (2076 bytes)
3,352,695 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,160 UART: [rt]cmd =0x44504543, len=28
3,423,234 >>> mbox cmd response data (2076 bytes)
3,423,235 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,963 UART: [rt]cmd =0x49444550, len=353
3,468,300 >>> mbox cmd response data (8 bytes)
3,468,301 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,870 UART: [rt]cmd =0x44504543, len=28
3,541,133 >>> mbox cmd response data (2076 bytes)
3,541,134 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,523 UART: [rt]cmd =0x44504543, len=28
3,611,804 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,706 >>> mbox cmd response: success
2,690,548 UART:
2,690,564 UART: Running Caliptra FMC ...
2,690,972 UART:
2,691,115 UART: [state] CFI Enabled
2,701,876 UART: [fht] FMC Alias Private Key: 7
2,809,917 UART: [art] Extend RT PCRs Done
2,810,345 UART: [art] Lock RT PCRs Done
2,812,131 UART: [art] Populate DV Done
2,820,410 UART: [fht] FMC Alias Private Key: 7
2,821,574 UART: [art] Derive CDI
2,821,854 UART: [art] Store in in slot 0x4
2,907,125 UART: [art] Derive Key Pair
2,907,485 UART: [art] Store priv key in slot 0x5
2,920,895 UART: [art] Derive Key Pair - Done
2,935,726 UART: [art] Signing Cert with AUTHO
2,936,206 UART: RITY.KEYID = 7
2,951,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,001 UART: [art] PUB.X = 46E20FFE04D05AD3D9415CAE125F3416572A8212A001F0D1E01E8B37FC500D00C7AE082C64FC8BDA7960B88C1694B8C5
2,958,742 UART: [art] PUB.Y = DFD79084E999A62E69A2B437F9290C13376A2AB43AF12EFD10B7ED8C9F4DA31A306998A545D1A0AF70B0AAB0FD6F3739
2,965,703 UART: [art] SIG.R = CD591D92A2704534FD2BF93CD9D997A58F1F99AE4EBEF7119181AC855BDE193283BF8CAB10BCCA0CCDFF83E255317551
2,972,488 UART: [art] SIG.S = 009373FFD73E0E7B94C22EF32B98ECA9CFF1C05271C037044499E016C8A7EA4B5D0F16A563072CFA650D4CD12E009915
2,996,288 UART: Caliptra RT
2,996,633 UART: [state] CFI Enabled
3,105,525 UART: [rt] RT listening for mailbox commands...
3,106,195 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,109 UART: [rt]cmd =0x44504543, len=28
3,179,114 >>> mbox cmd response data (2076 bytes)
3,179,115 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,654 UART: [rt]cmd =0x44504543, len=28
3,249,981 >>> mbox cmd response data (2076 bytes)
3,249,982 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,714 UART: [rt]cmd =0x49444550, len=353
3,295,020 >>> mbox cmd response data (8 bytes)
3,295,021 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,680 UART: [rt]cmd =0x44504543, len=28
3,368,003 >>> mbox cmd response data (2076 bytes)
3,368,004 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,527 UART: [rt]cmd =0x44504543, len=28
3,438,851 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 ready_for_fw is high
1,174,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,277 UART: [idev] Sha1 KeyId Algorithm
1,208,275 UART: [idev] --
1,209,294 UART: [ldev] ++
1,209,462 UART: [ldev] CDI.KEYID = 6
1,209,826 UART: [ldev] SUBJECT.KEYID = 5
1,210,253 UART: [ldev] AUTHORITY.KEYID = 7
1,210,716 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,810 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,738 >>> mbox cmd response: success
2,774,923 UART: [afmc] ++
2,775,091 UART: [afmc] CDI.KEYID = 6
2,775,454 UART: [afmc] SUBJECT.KEYID = 7
2,775,880 UART: [afmc] AUTHORITY.KEYID = 5
2,811,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,652 UART: [afmc] --
2,854,694 UART: [cold-reset] --
2,855,352 UART: [state] Locking Datavault
2,856,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,329 UART: [state] Locking ICCM
2,857,811 UART: [exit] Launching FMC @ 0x40000130
2,863,140 UART:
2,863,156 UART: Running Caliptra FMC ...
2,863,564 UART:
2,863,618 UART: [state] CFI Enabled
2,873,933 UART: [fht] FMC Alias Private Key: 7
2,982,196 UART: [art] Extend RT PCRs Done
2,982,624 UART: [art] Lock RT PCRs Done
2,984,198 UART: [art] Populate DV Done
2,992,333 UART: [fht] FMC Alias Private Key: 7
2,993,367 UART: [art] Derive CDI
2,993,647 UART: [art] Store in in slot 0x4
3,079,130 UART: [art] Derive Key Pair
3,079,490 UART: [art] Store priv key in slot 0x5
3,092,730 UART: [art] Derive Key Pair - Done
3,107,439 UART: [art] Signing Cert with AUTHO
3,107,919 UART: RITY.KEYID = 7
3,123,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,874 UART: [art] PUB.X = FE75E8FAC5B4198CA40C04379F5D59212D0A2A0F43F96F5F13A334ECCBD52CBD2F6897A2BE4C77B4C8CF36848682208F
3,130,646 UART: [art] PUB.Y = AA33781222B3BE586A19FB26B9E4E140F51517AA4DB6418D27030C80D8CC39F1AD89E845580BFDC50F7B68E00FF01A41
3,137,589 UART: [art] SIG.R = 3E6778F0C96DF7129A0F356DEB4ECBEB24D693A6DB059168C5F92587B8443AE196656700EDBF65C9F1EF20065E3EE63C
3,144,338 UART: [art] SIG.S = 54434C0A1995F53FF2AF747A74130AFE2C08960E9A538496E51BC33994A291F4A1A39AC6C55590227888FAC9CEBDE299
3,168,265 UART: Caliptra RT
3,168,518 UART: [state] CFI Enabled
3,276,027 UART: [rt] RT listening for mailbox commands...
3,276,697 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,793 UART: [rt]cmd =0x44504543, len=28
3,350,438 >>> mbox cmd response data (2076 bytes)
3,350,439 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,974 UART: [rt]cmd =0x44504543, len=28
3,421,093 >>> mbox cmd response data (2076 bytes)
3,421,094 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,586 UART: [rt]cmd =0x49444550, len=353
3,465,747 >>> mbox cmd response data (8 bytes)
3,465,748 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,545 UART: [rt]cmd =0x44504543, len=28
3,538,790 >>> mbox cmd response data (2076 bytes)
3,538,791 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,378 UART: [rt]cmd =0x44504543, len=28
3,610,009 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,946 ready_for_fw is high
1,055,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,450 >>> mbox cmd response: success
2,685,208 UART:
2,685,224 UART: Running Caliptra FMC ...
2,685,632 UART:
2,685,686 UART: [state] CFI Enabled
2,696,257 UART: [fht] FMC Alias Private Key: 7
2,804,688 UART: [art] Extend RT PCRs Done
2,805,116 UART: [art] Lock RT PCRs Done
2,806,930 UART: [art] Populate DV Done
2,814,839 UART: [fht] FMC Alias Private Key: 7
2,815,817 UART: [art] Derive CDI
2,816,097 UART: [art] Store in in slot 0x4
2,901,570 UART: [art] Derive Key Pair
2,901,930 UART: [art] Store priv key in slot 0x5
2,915,228 UART: [art] Derive Key Pair - Done
2,930,028 UART: [art] Signing Cert with AUTHO
2,930,508 UART: RITY.KEYID = 7
2,945,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,407 UART: [art] PUB.X = B1C4B2F844B68FC937759BAC3DE2666FA3B5069CB040A37067C75A7C5693298B086E022919DA823168E1594BB9ACDAAF
2,953,174 UART: [art] PUB.Y = DA7BBA9C5C6908048E1DA5B155B7F05036C95E027555D7ED288BFB3664C724E1BAC7EA5C67FDC2041F578AEFD6989D2D
2,960,128 UART: [art] SIG.R = 7542FD39C0F49EAE757AF5BEB5F58D479DA905A08EE78AF89279064C0CE0D9DD09FEF6BEA1F7ECB0202C54509BA0272B
2,966,906 UART: [art] SIG.S = ADF170FB23A91A5F868F4CF1690595B9A3A7331ABCEEF2E746967E24B651F436483C97C48B31BBDB6CABE412B5EF82D7
2,990,720 UART: Caliptra RT
2,990,973 UART: [state] CFI Enabled
3,099,010 UART: [rt] RT listening for mailbox commands...
3,099,680 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,498 UART: [rt]cmd =0x44504543, len=28
3,172,945 >>> mbox cmd response data (2076 bytes)
3,172,946 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,202,379 UART: [rt]cmd =0x44504543, len=28
3,243,462 >>> mbox cmd response data (2076 bytes)
3,243,463 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,788 UART: [rt]cmd =0x49444550, len=352
3,285,544 >>> mbox cmd response data (8 bytes)
3,285,545 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,116 UART: [rt]cmd =0x44504543, len=28
3,358,147 >>> mbox cmd response data (2076 bytes)
3,358,148 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,733 UART: [rt]cmd =0x44504543, len=28
3,429,314 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 ready_for_fw is high
1,174,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,051 >>> mbox cmd response: success
2,776,152 UART: [afmc] ++
2,776,320 UART: [afmc] CDI.KEYID = 6
2,776,683 UART: [afmc] SUBJECT.KEYID = 7
2,777,109 UART: [afmc] AUTHORITY.KEYID = 5
2,813,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,112 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,463 UART: [afmc] --
2,856,507 UART: [cold-reset] --
2,857,229 UART: [state] Locking Datavault
2,858,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,020 UART: [state] Locking ICCM
2,859,666 UART: [exit] Launching FMC @ 0x40000130
2,864,995 UART:
2,865,011 UART: Running Caliptra FMC ...
2,865,419 UART:
2,865,562 UART: [state] CFI Enabled
2,876,079 UART: [fht] FMC Alias Private Key: 7
2,984,594 UART: [art] Extend RT PCRs Done
2,985,022 UART: [art] Lock RT PCRs Done
2,986,548 UART: [art] Populate DV Done
2,994,869 UART: [fht] FMC Alias Private Key: 7
2,995,887 UART: [art] Derive CDI
2,996,167 UART: [art] Store in in slot 0x4
3,081,832 UART: [art] Derive Key Pair
3,082,192 UART: [art] Store priv key in slot 0x5
3,095,300 UART: [art] Derive Key Pair - Done
3,110,592 UART: [art] Signing Cert with AUTHO
3,111,072 UART: RITY.KEYID = 7
3,126,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,191 UART: [art] PUB.X = 8E926E55235EDDD6E2CE31E9C80CE6EF5A92B9E79AC402A7D95CBDB187F3659F323B9487A052F6D86679979C2CDCE31F
3,133,969 UART: [art] PUB.Y = C1730ED13BDC463678E39EE3EA1335A91F6630D41E3BBC50EDAB49EE7074900B08A137ED4580ADE22BFBFC5E781AE61D
3,140,928 UART: [art] SIG.R = 09D61979A8F296D5B3F6BFA9FF16E19779BE3CBBA19A72F26ACBEBF8476BA0536296803567F4799D0CE84A3FA91D6189
3,147,702 UART: [art] SIG.S = E09A25A08B09C1A9EB8C172A50BEB4F4C48A5571B0F86E9E72C5BE9E61191A17659F7F68F71BF88A498D233E9EBB122D
3,171,752 UART: Caliptra RT
3,172,097 UART: [state] CFI Enabled
3,280,728 UART: [rt] RT listening for mailbox commands...
3,281,398 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,040 UART: [rt]cmd =0x44504543, len=28
3,354,579 >>> mbox cmd response data (2076 bytes)
3,354,580 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,091 UART: [rt]cmd =0x44504543, len=28
3,425,204 >>> mbox cmd response data (2076 bytes)
3,425,205 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,057 UART: [rt]cmd =0x49444550, len=353
3,470,253 >>> mbox cmd response data (8 bytes)
3,470,254 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,653 UART: [rt]cmd =0x44504543, len=28
3,542,828 >>> mbox cmd response data (2076 bytes)
3,542,829 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,232 UART: [rt]cmd =0x44504543, len=28
3,613,564 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,839 ready_for_fw is high
1,055,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,633 >>> mbox cmd response: success
2,685,341 UART:
2,685,357 UART: Running Caliptra FMC ...
2,685,765 UART:
2,685,908 UART: [state] CFI Enabled
2,696,283 UART: [fht] FMC Alias Private Key: 7
2,804,692 UART: [art] Extend RT PCRs Done
2,805,120 UART: [art] Lock RT PCRs Done
2,806,530 UART: [art] Populate DV Done
2,814,657 UART: [fht] FMC Alias Private Key: 7
2,815,681 UART: [art] Derive CDI
2,815,961 UART: [art] Store in in slot 0x4
2,901,504 UART: [art] Derive Key Pair
2,901,864 UART: [art] Store priv key in slot 0x5
2,915,716 UART: [art] Derive Key Pair - Done
2,930,489 UART: [art] Signing Cert with AUTHO
2,930,969 UART: RITY.KEYID = 7
2,946,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,072 UART: [art] PUB.X = 196B80E2CA85767D9E26389850062CBB278170A2EC32E430940D7D867A7E707C88A20D2ACB12B7CE41CFA2D32F124972
2,953,833 UART: [art] PUB.Y = 6C9AFCC74EA2B866E0BD14A003CD28E58093530912AB51A267A91366B9B206F0D6281BC9A0ECF6AD58801A7B9D665646
2,960,780 UART: [art] SIG.R = 9091403D1038AEA8EB004CF88D1E207901CF6C70CBD947BFA8DEA7716D934E5D3E15C32288E69B065CDCD72AEF6055C2
2,967,534 UART: [art] SIG.S = C098C5F5BFE7E7DD9A12DA06E5051DFA60D682BC5C85F1793537BE98AEAFC342D66DD3FEF74DAF7916E6EE54C7667D9A
2,991,597 UART: Caliptra RT
2,991,942 UART: [state] CFI Enabled
3,099,434 UART: [rt] RT listening for mailbox commands...
3,100,104 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,218 UART: [rt]cmd =0x44504543, len=28
3,173,377 >>> mbox cmd response data (2076 bytes)
3,173,378 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,202,789 UART: [rt]cmd =0x44504543, len=28
3,243,801 >>> mbox cmd response data (2076 bytes)
3,243,802 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,321 UART: [rt]cmd =0x49444550, len=352
3,286,078 >>> mbox cmd response data (8 bytes)
3,286,079 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,720 UART: [rt]cmd =0x44504543, len=28
3,358,979 >>> mbox cmd response data (2076 bytes)
3,358,980 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,315 UART: [rt]cmd =0x44504543, len=28
3,429,639 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,108 UART:
192,470 UART: Running Caliptra ROM ...
193,602 UART:
193,772 UART: [state] CFI Enabled
266,615 UART: [state] LifecycleState = Unprovisioned
268,765 UART: [state] DebugLocked = No
270,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,262 UART: [kat] SHA2-256
444,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,453 UART: [kat] ++
455,955 UART: [kat] sha1
465,978 UART: [kat] SHA2-256
468,700 UART: [kat] SHA2-384
474,404 UART: [kat] SHA2-512-ACC
476,708 UART: [kat] ECC-384
2,769,781 UART: [kat] HMAC-384Kdf
2,801,037 UART: [kat] LMS
3,991,292 UART: [kat] --
3,996,497 UART: [cold-reset] ++
3,997,898 UART: [fht] Storing FHT @ 0x50003400
4,008,598 UART: [idev] ++
4,009,167 UART: [idev] CDI.KEYID = 6
4,010,205 UART: [idev] SUBJECT.KEYID = 7
4,011,381 UART: [idev] UDS.KEYID = 0
4,012,503 ready_for_fw is high
4,012,738 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,431 UART: [idev] Erasing UDS.KEYID = 0
7,347,226 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,743 UART: [idev] --
7,373,619 UART: [ldev] ++
7,374,197 UART: [ldev] CDI.KEYID = 6
7,375,173 UART: [ldev] SUBJECT.KEYID = 5
7,376,384 UART: [ldev] AUTHORITY.KEYID = 7
7,377,665 UART: [ldev] FE.KEYID = 1
7,422,703 UART: [ldev] Erasing FE.KEYID = 1
10,758,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,212 UART: [ldev] --
13,136,608 UART: [fwproc] Waiting for Commands...
13,139,890 UART: [fwproc] Received command 0x46574c44
13,142,075 UART: [fwproc] Received Image of size 114124 bytes
17,201,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,658,097 >>> mbox cmd response: success
17,662,162 UART: [afmc] ++
17,662,761 UART: [afmc] CDI.KEYID = 6
17,663,728 UART: [afmc] SUBJECT.KEYID = 7
17,664,961 UART: [afmc] AUTHORITY.KEYID = 5
21,034,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,660 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,042 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,921 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,345 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,819 UART: [afmc] --
23,401,876 UART: [cold-reset] --
23,406,332 UART: [state] Locking Datavault
23,412,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,671 UART: [state] Locking ICCM
23,417,050 UART: [exit] Launching FMC @ 0x40000130
23,425,449 UART:
23,425,681 UART: Running Caliptra FMC ...
23,426,782 UART:
23,426,964 UART: [state] CFI Enabled
23,491,525 UART: [fht] FMC Alias Private Key: 7
25,829,718 UART: [art] Extend RT PCRs Done
25,830,944 UART: [art] Lock RT PCRs Done
25,832,353 UART: [art] Populate DV Done
25,838,033 UART: [fht] FMC Alias Private Key: 7
25,839,682 UART: [art] Derive CDI
25,840,496 UART: [art] Store in in slot 0x4
25,900,954 UART: [art] Derive Key Pair
25,901,994 UART: [art] Store priv key in slot 0x5
29,194,969 UART: [art] Derive Key Pair - Done
29,207,853 UART: [art] Signing Cert with AUTHO
29,209,156 UART: RITY.KEYID = 7
31,496,400 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,905 UART: [art] PUB.X = 4344333A0B62C3C55D93A0B74C35E754F9BB04A08268664A035A841FDF71A621CF02E303883BD3A13BBE7432481A7A5A
31,505,161 UART: [art] PUB.Y = 30DDFFC3409F4BA9A805AE50199D9ACD2C06124FBF5CDC4F6E830C5DE216479F3BAB3DB393DB2DDEAF9490AE492AFD9C
31,512,433 UART: [art] SIG.R = 54BAC7B894113B9A35C00068EFD7FCE5084BFB79F0EBCEB0D3E0E17A79927A3DA7419F10EA0C9148E9268165E11A238B
31,519,785 UART: [art] SIG.S = A503322C946E9255E28EEC4071094CC7110D1B833C2B34DF42690878E3816EFB37CF279206D1DD746E24DFD419C164D8
32,826,082 UART: Caliptra RT
32,826,784 UART: [state] CFI Enabled
32,987,981 UART: [rt] RT listening for mailbox commands...
32,990,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,020,981 UART: [rt]cmd =0x44504543, len=96
38,805,198 >>> mbox cmd response data (6236 bytes)
38,834,305 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,864,442 UART: [rt]cmd =0x52564348, len=36
38,866,907 >>> mbox cmd response data (8 bytes)
38,867,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,897,931 UART: [rt]cmd =0x44504543, len=96
44,668,720 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,786,498 ready_for_fw is high
3,787,030 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,533 >>> mbox cmd response: success
23,569,711 UART:
23,570,093 UART: Running Caliptra FMC ...
23,571,240 UART:
23,571,399 UART: [state] CFI Enabled
23,638,976 UART: [fht] FMC Alias Private Key: 7
25,976,400 UART: [art] Extend RT PCRs Done
25,977,617 UART: [art] Lock RT PCRs Done
25,979,463 UART: [art] Populate DV Done
25,984,873 UART: [fht] FMC Alias Private Key: 7
25,986,525 UART: [art] Derive CDI
25,987,343 UART: [art] Store in in slot 0x4
26,047,417 UART: [art] Derive Key Pair
26,048,466 UART: [art] Store priv key in slot 0x5
29,341,391 UART: [art] Derive Key Pair - Done
29,354,544 UART: [art] Signing Cert with AUTHO
29,355,880 UART: RITY.KEYID = 7
31,643,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,990 UART: [art] PUB.X = 53C3E7A111A44FA02750820F8C7AA596D4B6E5AF0E9D4EA4DBC905F7BE0DB45CE38F3C92899F3C38256797C8F56E5DD2
31,652,199 UART: [art] PUB.Y = 9C4B92CA8E813948169D64A203303575DC3251559F7C85B6BA037A42DC0CB8AE5E62D68D53092F7288518069CA84C4F9
31,659,401 UART: [art] SIG.R = 3DDC40945D523AE52374CBD21DE06BE31772893E524097FB231DAF890769E0C27D575DA76AE4881CC1E70471A72D27BA
31,666,798 UART: [art] SIG.S = 910E68F72C61CBE883DCEC7FA13ED26EC1CC55E7B1B2328A05A2056A481A989677E8029F67F2AEBB42C1FDB904EE14AC
32,972,572 UART: Caliptra RT
32,973,286 UART: [state] CFI Enabled
33,134,937 UART: [rt] RT listening for mailbox commands...
33,137,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,168,059 UART: [rt]cmd =0x44504543, len=96
38,952,968 >>> mbox cmd response data (6236 bytes)
38,982,233 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,012,152 UART: [rt]cmd =0x52564348, len=36
39,014,658 >>> mbox cmd response data (8 bytes)
39,015,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,045,410 UART: [rt]cmd =0x44504543, len=96
44,798,334 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,517 UART:
192,882 UART: Running Caliptra ROM ...
194,073 UART:
603,919 UART: [state] CFI Enabled
620,918 UART: [state] LifecycleState = Unprovisioned
622,774 UART: [state] DebugLocked = No
625,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,302 UART: [kat] SHA2-256
800,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,605 UART: [kat] ++
811,046 UART: [kat] sha1
821,626 UART: [kat] SHA2-256
824,347 UART: [kat] SHA2-384
829,765 UART: [kat] SHA2-512-ACC
832,125 UART: [kat] ECC-384
3,116,451 UART: [kat] HMAC-384Kdf
3,128,407 UART: [kat] LMS
4,318,458 UART: [kat] --
4,323,156 UART: [cold-reset] ++
4,324,451 UART: [fht] Storing FHT @ 0x50003400
4,336,499 UART: [idev] ++
4,337,062 UART: [idev] CDI.KEYID = 6
4,338,098 UART: [idev] SUBJECT.KEYID = 7
4,339,294 UART: [idev] UDS.KEYID = 0
4,340,364 ready_for_fw is high
4,340,582 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,945 UART: [idev] Erasing UDS.KEYID = 0
7,625,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,664 UART: [idev] --
7,650,656 UART: [ldev] ++
7,651,278 UART: [ldev] CDI.KEYID = 6
7,652,182 UART: [ldev] SUBJECT.KEYID = 5
7,653,440 UART: [ldev] AUTHORITY.KEYID = 7
7,654,669 UART: [ldev] FE.KEYID = 1
7,664,282 UART: [ldev] Erasing FE.KEYID = 1
10,953,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,994 UART: [ldev] --
13,311,094 UART: [fwproc] Waiting for Commands...
13,313,345 UART: [fwproc] Received command 0x46574c44
13,315,524 UART: [fwproc] Received Image of size 114124 bytes
17,366,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,539 >>> mbox cmd response: success
17,833,780 UART: [afmc] ++
17,834,381 UART: [afmc] CDI.KEYID = 6
17,835,463 UART: [afmc] SUBJECT.KEYID = 7
17,836,582 UART: [afmc] AUTHORITY.KEYID = 5
21,148,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,267 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,662 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,478 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,919 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,209 UART: [afmc] --
23,516,815 UART: [cold-reset] --
23,521,797 UART: [state] Locking Datavault
23,526,623 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,383 UART: [state] Locking ICCM
23,530,509 UART: [exit] Launching FMC @ 0x40000130
23,538,901 UART:
23,539,127 UART: Running Caliptra FMC ...
23,540,161 UART:
23,540,302 UART: [state] CFI Enabled
23,548,178 UART: [fht] FMC Alias Private Key: 7
25,878,599 UART: [art] Extend RT PCRs Done
25,879,814 UART: [art] Lock RT PCRs Done
25,881,680 UART: [art] Populate DV Done
25,887,033 UART: [fht] FMC Alias Private Key: 7
25,888,622 UART: [art] Derive CDI
25,889,432 UART: [art] Store in in slot 0x4
25,931,713 UART: [art] Derive Key Pair
25,932,755 UART: [art] Store priv key in slot 0x5
29,174,950 UART: [art] Derive Key Pair - Done
29,187,728 UART: [art] Signing Cert with AUTHO
29,189,029 UART: RITY.KEYID = 7
31,468,956 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,463 UART: [art] PUB.X = AB1A55B0212A0C7074DC80870D2DFB2116B9D98DC32D7E681FA8EEE6872CBF88A627BA177B470B6DEFC7CC4930EAE09D
31,477,751 UART: [art] PUB.Y = 7198B2760350B51136328A5FD0F7FADECFB6A0E5F8293F111EFA7D452B49255878CB8B4CF00AC93957BE172A10D64E7C
31,485,018 UART: [art] SIG.R = CD53ED6C2D94FA4C0BB265CBF69B55ABF3A19FE065128905D5ECBAB4111A851BBEAC785EDA0B73DF814BA9338BBD7A87
31,492,393 UART: [art] SIG.S = 3540E844220733E87E10D918B21AF09C7933151DC35032CAFC7B760F53476388E0227489AE60D0D11B4B5307CCC69D02
32,798,236 UART: Caliptra RT
32,798,937 UART: [state] CFI Enabled
32,915,699 UART: [rt] RT listening for mailbox commands...
32,918,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,948,612 UART: [rt]cmd =0x44504543, len=96
38,622,272 >>> mbox cmd response data (6236 bytes)
38,651,566 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,681,804 UART: [rt]cmd =0x52564348, len=36
38,684,401 >>> mbox cmd response data (8 bytes)
38,684,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,715,144 UART: [rt]cmd =0x44504543, len=96
44,387,470 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,126,779 ready_for_fw is high
4,127,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,282 >>> mbox cmd response: success
23,714,059 UART:
23,714,461 UART: Running Caliptra FMC ...
23,715,577 UART:
23,715,724 UART: [state] CFI Enabled
23,723,885 UART: [fht] FMC Alias Private Key: 7
26,055,397 UART: [art] Extend RT PCRs Done
26,056,623 UART: [art] Lock RT PCRs Done
26,058,436 UART: [art] Populate DV Done
26,063,961 UART: [fht] FMC Alias Private Key: 7
26,065,611 UART: [art] Derive CDI
26,066,420 UART: [art] Store in in slot 0x4
26,108,955 UART: [art] Derive Key Pair
26,109,957 UART: [art] Store priv key in slot 0x5
29,352,578 UART: [art] Derive Key Pair - Done
29,365,786 UART: [art] Signing Cert with AUTHO
29,367,087 UART: RITY.KEYID = 7
31,646,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,020 UART: [art] PUB.X = 4784385026449D117EE94E75F984FB2CB456462E65FFE49E800A3CCD6F9A15F323BF77D8FB171A05737A56FA664D588F
31,655,262 UART: [art] PUB.Y = F60BDCAB5B05FA2468E95DEF5C0D56318F08EB46E0A936BEDCECD0F695CE29D53F967F005548EA7A754394156A35E167
31,662,480 UART: [art] SIG.R = B37CE3C7126E2379829B9625873713E35A43D3E0B3E6E55EC2BA54E063C002E2F253C78C593BB1F7F7E4A65226524405
31,669,853 UART: [art] SIG.S = D38EEA68FAB8D91B0FD4EE822AD4C0BBDDDE15B463D369176EE629AB26C345AB1265E91D395A21DCD1E0FC9952B47A73
32,974,687 UART: Caliptra RT
32,975,403 UART: [state] CFI Enabled
33,091,834 UART: [rt] RT listening for mailbox commands...
33,094,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,722 UART: [rt]cmd =0x44504543, len=96
38,797,900 >>> mbox cmd response data (6236 bytes)
38,826,989 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,857,234 UART: [rt]cmd =0x52564348, len=36
38,859,867 >>> mbox cmd response data (8 bytes)
38,860,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,890,790 UART: [rt]cmd =0x44504543, len=96
44,563,911 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,227 UART:
192,566 UART: Running Caliptra ROM ...
193,752 UART:
193,904 UART: [state] CFI Enabled
263,705 UART: [state] LifecycleState = Unprovisioned
265,618 UART: [state] DebugLocked = No
268,363 UART: [state] WD Timer not started. Device not locked for debugging
271,257 UART: [kat] SHA2-256
450,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,938 UART: [kat] ++
462,407 UART: [kat] sha1
474,511 UART: [kat] SHA2-256
477,552 UART: [kat] SHA2-384
483,615 UART: [kat] SHA2-512-ACC
486,615 UART: [kat] ECC-384
2,946,026 UART: [kat] HMAC-384Kdf
2,970,717 UART: [kat] LMS
3,500,194 UART: [kat] --
3,505,719 UART: [cold-reset] ++
3,507,510 UART: [fht] FHT @ 0x50003400
3,516,868 UART: [idev] ++
3,517,463 UART: [idev] CDI.KEYID = 6
3,518,389 UART: [idev] SUBJECT.KEYID = 7
3,519,563 UART: [idev] UDS.KEYID = 0
3,520,613 ready_for_fw is high
3,520,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,657 UART: [idev] Erasing UDS.KEYID = 0
6,024,006 UART: [idev] Sha1 KeyId Algorithm
6,046,757 UART: [idev] --
6,050,751 UART: [ldev] ++
6,051,321 UART: [ldev] CDI.KEYID = 6
6,052,239 UART: [ldev] SUBJECT.KEYID = 5
6,053,402 UART: [ldev] AUTHORITY.KEYID = 7
6,054,637 UART: [ldev] FE.KEYID = 1
6,098,453 UART: [ldev] Erasing FE.KEYID = 1
8,602,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,591 UART: [ldev] --
10,412,516 UART: [fwproc] Wait for Commands...
10,414,032 UART: [fwproc] Recv command 0x46574c44
10,416,075 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,138 >>> mbox cmd response: success
14,287,596 UART: [afmc] ++
14,288,188 UART: [afmc] CDI.KEYID = 6
14,289,071 UART: [afmc] SUBJECT.KEYID = 7
14,290,288 UART: [afmc] AUTHORITY.KEYID = 5
16,824,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,988 UART: [afmc] --
18,624,120 UART: [cold-reset] --
18,628,622 UART: [state] Locking Datavault
18,633,289 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,976 UART: [state] Locking ICCM
18,637,267 UART: [exit] Launching FMC @ 0x40000130
18,645,665 UART:
18,645,903 UART: Running Caliptra FMC ...
18,647,004 UART:
18,647,166 UART: [state] CFI Enabled
18,705,364 UART: [fht] FMC Alias Private Key: 7
20,469,765 UART: [art] Extend RT PCRs Done
20,471,132 UART: [art] Lock RT PCRs Done
20,472,535 UART: [art] Populate DV Done
20,477,858 UART: [fht] FMC Alias Private Key: 7
20,479,614 UART: [art] Derive CDI
20,480,372 UART: [art] Store in in slot 0x4
20,537,200 UART: [art] Derive Key Pair
20,538,203 UART: [art] Store priv key in slot 0x5
23,001,132 UART: [art] Derive Key Pair - Done
23,014,340 UART: [art] Signing Cert with AUTHO
23,015,641 UART: RITY.KEYID = 7
24,726,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,896 UART: [art] PUB.X = 2B06F82E7B96A145D91812141FA4D12D36EB4EA625C95A1BA6DE9A9D1CC94C302E52BC644C5FB05E57D94763BBB926B5
24,735,194 UART: [art] PUB.Y = D59ADA5F5B8D51DEF087A3E2077A637F9DF4DBA72048206ADAD1EB7D6C4E9B842636377F732AE7EACC9E35F2CEB68E37
24,742,480 UART: [art] SIG.R = 6628CD0D418C03C92C95839760C404563F4DD1F29E1067BCA0EB429FC89F503D2095C5118FE35D2E978F24126AF688DC
24,749,867 UART: [art] SIG.S = 27E60E0DCD734D0C6B6BAD392E5337C852409BDAD243ECB1B182E173FF4C17683BB1173DF01347819D7478A443FC162A
25,729,311 UART: Caliptra RT
25,730,020 UART: [state] CFI Enabled
25,893,793 UART: [rt] RT listening for mailbox commands...
25,896,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,927,348 UART: [rt]cmd =0x44504543, len=96
30,306,464 >>> mbox cmd response data (6236 bytes)
30,335,705 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,365,944 UART: [rt]cmd =0x52564348, len=36
30,368,387 >>> mbox cmd response data (8 bytes)
30,368,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,399,575 UART: [rt]cmd =0x44504543, len=96
34,763,140 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,381,693 ready_for_fw is high
3,382,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,666 >>> mbox cmd response: success
18,389,041 UART:
18,389,426 UART: Running Caliptra FMC ...
18,390,618 UART:
18,390,807 UART: [state] CFI Enabled
18,454,389 UART: [fht] FMC Alias Private Key: 7
20,218,622 UART: [art] Extend RT PCRs Done
20,219,836 UART: [art] Lock RT PCRs Done
20,221,572 UART: [art] Populate DV Done
20,226,926 UART: [fht] FMC Alias Private Key: 7
20,228,413 UART: [art] Derive CDI
20,229,176 UART: [art] Store in in slot 0x4
20,287,421 UART: [art] Derive Key Pair
20,288,457 UART: [art] Store priv key in slot 0x5
22,751,007 UART: [art] Derive Key Pair - Done
22,763,998 UART: [art] Signing Cert with AUTHO
22,765,293 UART: RITY.KEYID = 7
24,476,709 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,223 UART: [art] PUB.X = AFB5EF77E5F4ED8356D8AE8826949BCE4AA379CCE6D40514EBF4A03C521AF1EEAF8019749FF8778A85536A3F9EA5B9A2
24,485,489 UART: [art] PUB.Y = 4D7606D22902D7F7584A2A9B0474AB26908D65344DE518D968687A5B0CD0F9364F74F616CD1E13B67923CC29E3B90D3F
24,492,777 UART: [art] SIG.R = 5AE249A65D747C6A5AC9E1D5ECFBC387CEF88ADB06F67353238FC56D1252D78D1222C8744CADDD42105EB618BF5B3CA7
24,500,178 UART: [art] SIG.S = F970612D52F13AD0EA2CBA757389E6369D6AF1433BF9F7CFCAAD44B17D7A72826F6A97D66DAE4C51751F956B74E72925
25,478,857 UART: Caliptra RT
25,479,557 UART: [state] CFI Enabled
25,645,267 UART: [rt] RT listening for mailbox commands...
25,647,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,678,779 UART: [rt]cmd =0x44504543, len=96
30,057,991 >>> mbox cmd response data (6236 bytes)
30,087,484 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,117,777 UART: [rt]cmd =0x52564348, len=36
30,120,207 >>> mbox cmd response data (8 bytes)
30,120,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,151,211 UART: [rt]cmd =0x44504543, len=96
34,515,970 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,317 UART:
192,696 UART: Running Caliptra ROM ...
193,841 UART:
603,497 UART: [state] CFI Enabled
618,814 UART: [state] LifecycleState = Unprovisioned
620,652 UART: [state] DebugLocked = No
622,525 UART: [state] WD Timer not started. Device not locked for debugging
626,402 UART: [kat] SHA2-256
805,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,080 UART: [kat] ++
817,528 UART: [kat] sha1
828,531 UART: [kat] SHA2-256
831,547 UART: [kat] SHA2-384
838,878 UART: [kat] SHA2-512-ACC
841,803 UART: [kat] ECC-384
3,284,934 UART: [kat] HMAC-384Kdf
3,297,730 UART: [kat] LMS
3,827,170 UART: [kat] --
3,832,084 UART: [cold-reset] ++
3,834,079 UART: [fht] FHT @ 0x50003400
3,845,051 UART: [idev] ++
3,845,621 UART: [idev] CDI.KEYID = 6
3,846,518 UART: [idev] SUBJECT.KEYID = 7
3,847,753 UART: [idev] UDS.KEYID = 0
3,848,644 ready_for_fw is high
3,848,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,542 UART: [idev] Erasing UDS.KEYID = 0
6,322,760 UART: [idev] Sha1 KeyId Algorithm
6,346,111 UART: [idev] --
6,351,447 UART: [ldev] ++
6,352,004 UART: [ldev] CDI.KEYID = 6
6,353,014 UART: [ldev] SUBJECT.KEYID = 5
6,354,112 UART: [ldev] AUTHORITY.KEYID = 7
6,355,392 UART: [ldev] FE.KEYID = 1
6,366,674 UART: [ldev] Erasing FE.KEYID = 1
8,841,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,303 UART: [ldev] --
10,634,342 UART: [fwproc] Wait for Commands...
10,637,509 UART: [fwproc] Recv command 0x46574c44
10,639,601 UART: [fwproc] Recv'd Img size: 114448 bytes
14,048,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,706 >>> mbox cmd response: success
14,506,403 UART: [afmc] ++
14,507,001 UART: [afmc] CDI.KEYID = 6
14,507,923 UART: [afmc] SUBJECT.KEYID = 7
14,509,077 UART: [afmc] AUTHORITY.KEYID = 5
17,006,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,922 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,805 UART: [afmc] --
18,805,908 UART: [cold-reset] --
18,809,674 UART: [state] Locking Datavault
18,815,131 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,764 UART: [state] Locking ICCM
18,818,689 UART: [exit] Launching FMC @ 0x40000130
18,827,126 UART:
18,827,353 UART: Running Caliptra FMC ...
18,828,444 UART:
18,828,599 UART: [state] CFI Enabled
18,836,585 UART: [fht] FMC Alias Private Key: 7
20,593,557 UART: [art] Extend RT PCRs Done
20,594,771 UART: [art] Lock RT PCRs Done
20,596,500 UART: [art] Populate DV Done
20,601,739 UART: [fht] FMC Alias Private Key: 7
20,603,273 UART: [art] Derive CDI
20,604,076 UART: [art] Store in in slot 0x4
20,646,666 UART: [art] Derive Key Pair
20,647,721 UART: [art] Store priv key in slot 0x5
23,074,932 UART: [art] Derive Key Pair - Done
23,087,980 UART: [art] Signing Cert with AUTHO
23,089,311 UART: RITY.KEYID = 7
24,794,669 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,168 UART: [art] PUB.X = 022EF9629EA2C193D0621EB8396E5FB3FCA1644A7C2FF210AC52DD29AA01E534FFAB3F9100D0145ABAE1BA3A860B5DE3
24,803,449 UART: [art] PUB.Y = A409B3253026B27F8C425D149F65D8387C1C8A459A1FB5066F3AADD9AB28283BAA4A5EDE61A99591A70AA6C4215F5581
24,810,707 UART: [art] SIG.R = 58CE3EAACF7C8CA6CA14DB80E72222D8937D4DF5F7F26075C3EF40BD181F82D529599C454D3FDE7B2844199AC67E9ADD
24,818,142 UART: [art] SIG.S = 28841D51FB1F2DA793F59BCB3B40AC257889A7724B314B8F01B5301BD53939DC3161888F2ECC79AA2FEC7478D3C6AE6F
25,797,298 UART: Caliptra RT
25,798,000 UART: [state] CFI Enabled
25,915,239 UART: [rt] RT listening for mailbox commands...
25,917,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,948,333 UART: [rt]cmd =0x44504543, len=96
30,232,838 >>> mbox cmd response data (6236 bytes)
30,261,941 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,292,086 UART: [rt]cmd =0x52564348, len=36
30,294,454 >>> mbox cmd response data (8 bytes)
30,294,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,325,289 UART: [rt]cmd =0x44504543, len=96
34,609,990 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,694,687 ready_for_fw is high
3,695,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,066 >>> mbox cmd response: success
18,518,850 UART:
18,519,237 UART: Running Caliptra FMC ...
18,520,365 UART:
18,520,513 UART: [state] CFI Enabled
18,528,543 UART: [fht] FMC Alias Private Key: 7
20,284,938 UART: [art] Extend RT PCRs Done
20,286,172 UART: [art] Lock RT PCRs Done
20,287,899 UART: [art] Populate DV Done
20,293,200 UART: [fht] FMC Alias Private Key: 7
20,294,792 UART: [art] Derive CDI
20,295,599 UART: [art] Store in in slot 0x4
20,338,348 UART: [art] Derive Key Pair
20,339,345 UART: [art] Store priv key in slot 0x5
22,765,938 UART: [art] Derive Key Pair - Done
22,778,502 UART: [art] Signing Cert with AUTHO
22,779,824 UART: RITY.KEYID = 7
24,485,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,963 UART: [art] PUB.X = 45F548451DD5FFA615CAF7A27DF41F0286F9F24BB4D6EC0E146B61161B43F2F456C2F9E9EDD24A31DB83AA266488DCB0
24,494,252 UART: [art] PUB.Y = 5F5B4136284519396F69810CA218407AC7EC35C7AEF100109EC7F83E6FDF9D88845FAA314045DA36AABB7C0769EAAF6C
24,501,471 UART: [art] SIG.R = 05336AFB774D16BC501B9C081BD5E2BBB1793BAE3392543CB4DB933BA8D24C7334E27BB1294EE59489482E32BD59FFBE
24,508,937 UART: [art] SIG.S = 3878371088C04C36F64E6686C72724B5BD1A27AFBE8EF5856901503A81F515154EFF711B1B0604BF0916FFBC0B5E4D40
25,486,958 UART: Caliptra RT
25,487,668 UART: [state] CFI Enabled
25,605,549 UART: [rt] RT listening for mailbox commands...
25,607,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,638,244 UART: [rt]cmd =0x44504543, len=96
29,922,106 >>> mbox cmd response data (6236 bytes)
29,951,628 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,981,713 UART: [rt]cmd =0x52564348, len=36
29,984,316 >>> mbox cmd response data (8 bytes)
29,984,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,015,129 UART: [rt]cmd =0x44504543, len=96
34,298,754 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,174 UART:
192,544 UART: Running Caliptra ROM ...
193,748 UART:
193,901 UART: [state] CFI Enabled
264,771 UART: [state] LifecycleState = Unprovisioned
267,196 UART: [state] DebugLocked = No
269,583 UART: [state] WD Timer not started. Device not locked for debugging
273,971 UART: [kat] SHA2-256
463,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,615 UART: [kat] ++
475,066 UART: [kat] sha1
486,846 UART: [kat] SHA2-256
489,853 UART: [kat] SHA2-384
495,556 UART: [kat] SHA2-512-ACC
498,129 UART: [kat] ECC-384
2,947,848 UART: [kat] HMAC-384Kdf
2,971,021 UART: [kat] LMS
3,502,829 UART: [kat] --
3,507,952 UART: [cold-reset] ++
3,509,736 UART: [fht] FHT @ 0x50003400
3,520,421 UART: [idev] ++
3,521,125 UART: [idev] CDI.KEYID = 6
3,522,054 UART: [idev] SUBJECT.KEYID = 7
3,523,237 UART: [idev] UDS.KEYID = 0
3,524,164 ready_for_fw is high
3,524,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,218 UART: [idev] Erasing UDS.KEYID = 0
6,028,914 UART: [idev] Sha1 KeyId Algorithm
6,050,899 UART: [idev] --
6,056,402 UART: [ldev] ++
6,057,081 UART: [ldev] CDI.KEYID = 6
6,058,004 UART: [ldev] SUBJECT.KEYID = 5
6,059,165 UART: [ldev] AUTHORITY.KEYID = 7
6,060,398 UART: [ldev] FE.KEYID = 1
6,100,491 UART: [ldev] Erasing FE.KEYID = 1
8,608,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,938 UART: [ldev] --
10,413,568 UART: [fwproc] Wait for Commands...
10,416,687 UART: [fwproc] Recv command 0x46574c44
10,418,995 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,603,300 >>> mbox cmd response: success
14,606,979 UART: [afmc] ++
14,607,689 UART: [afmc] CDI.KEYID = 6
14,608,990 UART: [afmc] SUBJECT.KEYID = 7
14,610,297 UART: [afmc] AUTHORITY.KEYID = 5
17,151,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,547 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,645 UART: [afmc] --
18,949,376 UART: [cold-reset] --
18,953,561 UART: [state] Locking Datavault
18,959,121 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,320 UART: [state] Locking ICCM
18,963,689 UART: [exit] Launching FMC @ 0x40000130
18,972,369 UART:
18,972,606 UART: Running Caliptra FMC ...
18,973,703 UART:
18,973,858 UART: [state] CFI Enabled
19,031,035 UART: [fht] FMC Alias Private Key: 7
20,794,754 UART: [art] Extend RT PCRs Done
20,795,972 UART: [art] Lock RT PCRs Done
20,797,761 UART: [art] Populate DV Done
20,803,014 UART: [fht] FMC Alias Private Key: 7
20,804,551 UART: [art] Derive CDI
20,805,362 UART: [art] Store in in slot 0x4
20,863,812 UART: [art] Derive Key Pair
20,864,809 UART: [art] Store priv key in slot 0x5
23,327,438 UART: [art] Derive Key Pair - Done
23,340,539 UART: [art] Signing Cert with AUTHO
23,341,832 UART: RITY.KEYID = 7
25,053,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,419 UART: [art] PUB.X = 3C99121C710E855C378BD080F9C8E0D7629CD99569DC198742F5A6C84140E48E76FDF3B615030E3239CFD0834CE289C6
25,062,658 UART: [art] PUB.Y = 986BDD3A7C892F9A74820902A77E944475097AAC8F3348A1F38EA82304514063D2765460BBA52A3E6113E2EA74BB44F8
25,069,945 UART: [art] SIG.R = E8343C3A2072993DE0974D65891CE19FBA119DAC39DA13F49A62A78BB10E25939C448C132E88C2CE5ED723F1815BEC04
25,077,351 UART: [art] SIG.S = 9670E0528CDCC28B18C91C34435E12287FDB085575DDE05F8251D0AC7B6DDB5CF0AE6675DE5747A5D9485916196CC335
26,056,353 UART: Caliptra RT
26,057,042 UART: [state] CFI Enabled
26,222,119 UART: [rt] RT listening for mailbox commands...
26,224,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,692 UART: [rt]cmd =0x44504543, len=96
30,633,660 >>> mbox cmd response data (6236 bytes)
30,662,935 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,693,196 UART: [rt]cmd =0x52564348, len=36
30,695,792 >>> mbox cmd response data (8 bytes)
30,696,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,726,696 UART: [rt]cmd =0x44504543, len=96
35,090,696 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,417,753 ready_for_fw is high
3,418,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,716,642 >>> mbox cmd response: success
19,009,355 UART:
19,009,732 UART: Running Caliptra FMC ...
19,010,876 UART:
19,011,044 UART: [state] CFI Enabled
19,075,914 UART: [fht] FMC Alias Private Key: 7
20,840,320 UART: [art] Extend RT PCRs Done
20,841,549 UART: [art] Lock RT PCRs Done
20,843,067 UART: [art] Populate DV Done
20,848,341 UART: [fht] FMC Alias Private Key: 7
20,850,027 UART: [art] Derive CDI
20,850,882 UART: [art] Store in in slot 0x4
20,908,310 UART: [art] Derive Key Pair
20,909,310 UART: [art] Store priv key in slot 0x5
23,372,381 UART: [art] Derive Key Pair - Done
23,385,003 UART: [art] Signing Cert with AUTHO
23,386,315 UART: RITY.KEYID = 7
25,097,489 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,005 UART: [art] PUB.X = DC637E044D56E31D78DC0278F7205CE9298190113E742B9B5FFEFF7F40A023420A1D98D544BE12F508D43B3B7C344199
25,106,271 UART: [art] PUB.Y = 6DA8C9C9269A346902CCB8D0B653E08EFEE47F3AB1993C59BFD8F590BEAFC520229CC667FCEB562952FC0D9AD809F7C2
25,113,577 UART: [art] SIG.R = 51A3B2B2EF3AB2B9D2D620D51CED9E201E4D8AD92C81233D253ADFF612DCBAC95418E6E5D10713C1605C60BF6B13EDE3
25,120,964 UART: [art] SIG.S = 84A6ED39E09169402DB30D9AE4FC22A98B9DEC6F3820341A8956BC4E74D859B9166752CDB55F018C401FFEA04A7436E5
26,100,269 UART: Caliptra RT
26,100,981 UART: [state] CFI Enabled
26,265,377 UART: [rt] RT listening for mailbox commands...
26,267,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,298,963 UART: [rt]cmd =0x44504543, len=96
30,676,852 >>> mbox cmd response data (6236 bytes)
30,706,093 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,736,383 UART: [rt]cmd =0x52564348, len=36
30,738,927 >>> mbox cmd response data (8 bytes)
30,739,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,769,776 UART: [rt]cmd =0x44504543, len=96
35,134,698 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,328 UART:
192,707 UART: Running Caliptra ROM ...
193,848 UART:
603,479 UART: [state] CFI Enabled
614,739 UART: [state] LifecycleState = Unprovisioned
617,177 UART: [state] DebugLocked = No
618,926 UART: [state] WD Timer not started. Device not locked for debugging
624,093 UART: [kat] SHA2-256
813,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,734 UART: [kat] ++
825,338 UART: [kat] sha1
836,215 UART: [kat] SHA2-256
839,208 UART: [kat] SHA2-384
845,185 UART: [kat] SHA2-512-ACC
847,756 UART: [kat] ECC-384
3,291,638 UART: [kat] HMAC-384Kdf
3,303,928 UART: [kat] LMS
3,835,719 UART: [kat] --
3,838,029 UART: [cold-reset] ++
3,840,453 UART: [fht] FHT @ 0x50003400
3,852,839 UART: [idev] ++
3,853,531 UART: [idev] CDI.KEYID = 6
3,854,479 UART: [idev] SUBJECT.KEYID = 7
3,855,709 UART: [idev] UDS.KEYID = 0
3,856,598 ready_for_fw is high
3,856,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,637 UART: [idev] Erasing UDS.KEYID = 0
6,339,262 UART: [idev] Sha1 KeyId Algorithm
6,362,109 UART: [idev] --
6,366,419 UART: [ldev] ++
6,367,087 UART: [ldev] CDI.KEYID = 6
6,368,019 UART: [ldev] SUBJECT.KEYID = 5
6,369,223 UART: [ldev] AUTHORITY.KEYID = 7
6,370,389 UART: [ldev] FE.KEYID = 1
6,379,278 UART: [ldev] Erasing FE.KEYID = 1
8,856,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,523 UART: [ldev] --
10,646,205 UART: [fwproc] Wait for Commands...
10,648,022 UART: [fwproc] Recv command 0x46574c44
10,650,324 UART: [fwproc] Recv'd Img size: 114448 bytes
14,098,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,831,334 >>> mbox cmd response: success
14,835,718 UART: [afmc] ++
14,836,477 UART: [afmc] CDI.KEYID = 6
14,837,581 UART: [afmc] SUBJECT.KEYID = 7
14,839,125 UART: [afmc] AUTHORITY.KEYID = 5
17,340,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,873 UART: [afmc] --
19,137,338 UART: [cold-reset] --
19,139,366 UART: [state] Locking Datavault
19,143,644 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,849 UART: [state] Locking ICCM
19,147,459 UART: [exit] Launching FMC @ 0x40000130
19,156,144 UART:
19,156,380 UART: Running Caliptra FMC ...
19,157,476 UART:
19,157,628 UART: [state] CFI Enabled
19,165,507 UART: [fht] FMC Alias Private Key: 7
20,922,085 UART: [art] Extend RT PCRs Done
20,923,310 UART: [art] Lock RT PCRs Done
20,924,809 UART: [art] Populate DV Done
20,930,160 UART: [fht] FMC Alias Private Key: 7
20,931,821 UART: [art] Derive CDI
20,932,555 UART: [art] Store in in slot 0x4
20,975,205 UART: [art] Derive Key Pair
20,976,243 UART: [art] Store priv key in slot 0x5
23,402,874 UART: [art] Derive Key Pair - Done
23,416,081 UART: [art] Signing Cert with AUTHO
23,417,575 UART: RITY.KEYID = 7
25,122,470 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,969 UART: [art] PUB.X = 36492837FDD455E1A1D88A3126D921F12FF2117F8FBD8021BC1719BBA369AD6F9477759E06121A71E088B4B8D7F0C066
25,131,252 UART: [art] PUB.Y = 9B7A0B49DD0748DE545AAE3906A3B9BCD11BE699D8F04E07EF3EA7AC6636F24061B9EE429584B8A3A3E78F0EBF232C81
25,138,517 UART: [art] SIG.R = 919F72B017DDCECAB3B8EA19213BBED9E5EB6AD9E6D288338A5A643DF939E8B6254EB125BEB8F0E8EC067A968BAFFE31
25,145,943 UART: [art] SIG.S = 40A71996207321DFF2344267669DA564EF046E939B03EA39008AA5BB2FACFE3E48F0E3742CD35BCFCE217DD79B5F89B9
26,125,086 UART: Caliptra RT
26,125,770 UART: [state] CFI Enabled
26,243,750 UART: [rt] RT listening for mailbox commands...
26,246,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,276,866 UART: [rt]cmd =0x44504543, len=96
30,562,304 >>> mbox cmd response data (6236 bytes)
30,591,425 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,621,612 UART: [rt]cmd =0x52564348, len=36
30,624,244 >>> mbox cmd response data (8 bytes)
30,624,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,655,083 UART: [rt]cmd =0x44504543, len=96
34,937,655 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,753,045 ready_for_fw is high
3,753,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,137 >>> mbox cmd response: success
19,219,245 UART:
19,219,622 UART: Running Caliptra FMC ...
19,220,748 UART:
19,220,896 UART: [state] CFI Enabled
19,228,625 UART: [fht] FMC Alias Private Key: 7
20,985,633 UART: [art] Extend RT PCRs Done
20,986,857 UART: [art] Lock RT PCRs Done
20,988,251 UART: [art] Populate DV Done
20,993,837 UART: [fht] FMC Alias Private Key: 7
20,995,419 UART: [art] Derive CDI
20,996,239 UART: [art] Store in in slot 0x4
21,038,237 UART: [art] Derive Key Pair
21,039,237 UART: [art] Store priv key in slot 0x5
23,466,437 UART: [art] Derive Key Pair - Done
23,479,703 UART: [art] Signing Cert with AUTHO
23,481,038 UART: RITY.KEYID = 7
25,186,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,734 UART: [art] PUB.X = 0E366ECD659C3DD982045624A98806692678DC689DDCFE68F40DBDD6A46567B5449142CE14CD2CA7D62A769159B20D9B
25,195,022 UART: [art] PUB.Y = 6EEEDF35D86B3ACE638A15ACA9CD24856E744A2B5F9070A3DEE1D52F19FF6AB65576BF835C33B4C68274362BABA3550B
25,202,287 UART: [art] SIG.R = 75EBD27B83049754DF87FB3D0ECD471863B8264D982D05E8F58BFB5A963B97A308469F1D691B0CDBE0D32B12C4CF7E95
25,209,657 UART: [art] SIG.S = 773D7BA89FC01695E7C3A2B1C09A4FA7FDF2509B565B739F943FC425538CC6FE1C723B9DD6AB81C3C3BD676BD54E68E4
26,188,306 UART: Caliptra RT
26,188,997 UART: [state] CFI Enabled
26,305,685 UART: [rt] RT listening for mailbox commands...
26,308,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,544 UART: [rt]cmd =0x44504543, len=96
30,622,334 >>> mbox cmd response data (6236 bytes)
30,651,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,681,508 UART: [rt]cmd =0x52564348, len=36
30,684,193 >>> mbox cmd response data (8 bytes)
30,684,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,714,991 UART: [rt]cmd =0x44504543, len=96
34,998,846 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,537 UART: [fht] Storing FHT @ 0x50003400
1,479,348 UART: [idev] ++
1,479,516 UART: [idev] CDI.KEYID = 6
1,479,876 UART: [idev] SUBJECT.KEYID = 7
1,480,300 UART: [idev] UDS.KEYID = 0
1,480,645 ready_for_fw is high
1,480,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,438 UART: [idev] Erasing UDS.KEYID = 0
1,505,244 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,844 UART: [idev] --
1,514,867 UART: [ldev] ++
1,515,035 UART: [ldev] CDI.KEYID = 6
1,515,398 UART: [ldev] SUBJECT.KEYID = 5
1,515,824 UART: [ldev] AUTHORITY.KEYID = 7
1,516,287 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,958 UART: [ldev] --
1,586,435 UART: [fwproc] Waiting for Commands...
1,587,080 UART: [fwproc] Received command 0x46574c44
1,587,871 UART: [fwproc] Received Image of size 114448 bytes
2,886,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,389 >>> mbox cmd response: success
3,080,513 UART: [afmc] ++
3,080,681 UART: [afmc] CDI.KEYID = 6
3,081,043 UART: [afmc] SUBJECT.KEYID = 7
3,081,468 UART: [afmc] AUTHORITY.KEYID = 5
3,116,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,615 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,500 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,190 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,061 UART: [afmc] --
3,160,103 UART: [cold-reset] --
3,161,035 UART: [state] Locking Datavault
3,162,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,818 UART: [state] Locking ICCM
3,163,314 UART: [exit] Launching FMC @ 0x40000130
3,168,643 UART:
3,168,659 UART: Running Caliptra FMC ...
3,169,067 UART:
3,169,121 UART: [state] CFI Enabled
3,179,406 UART: [fht] FMC Alias Private Key: 7
3,286,575 UART: [art] Extend RT PCRs Done
3,287,003 UART: [art] Lock RT PCRs Done
3,288,795 UART: [art] Populate DV Done
3,297,058 UART: [fht] FMC Alias Private Key: 7
3,298,096 UART: [art] Derive CDI
3,298,376 UART: [art] Store in in slot 0x4
3,383,673 UART: [art] Derive Key Pair
3,384,033 UART: [art] Store priv key in slot 0x5
3,396,915 UART: [art] Derive Key Pair - Done
3,411,821 UART: [art] Signing Cert with AUTHO
3,412,301 UART: RITY.KEYID = 7
3,427,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,364 UART: [art] PUB.X = 19D99E65AAE45288DAED83C6760169C9290CFC3281325151DB7CB1AC890B30936FC503F2A65EE890E5CE98818FD5C34C
3,435,128 UART: [art] PUB.Y = E75F8A7D43466167AA394D8E609BD0ADD197B7AD177333028CCC99F968436BA44DE32268B319B4BD7524D1D2C34476F7
3,442,077 UART: [art] SIG.R = E54EC168FE691709E2CBDA6C0C0AA03EB61F446852A928D9A7F66BC80C427A2D8D218D6E8846F4BC3312DD0C250FC8D6
3,448,843 UART: [art] SIG.S = 7540B11A425B4DBDF197EDCCC0CC9D060F9E55F525CD19BE8A917EA9C2F36FA0C59EA46727EC863D5B7BC07ADB220DD8
3,472,567 UART: Caliptra RT
3,472,820 UART: [state] CFI Enabled
3,579,955 UART: [rt] RT listening for mailbox commands...
3,580,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,853 UART: [rt]cmd =0x44504543, len=96
3,791,070 >>> mbox cmd response data (6236 bytes)
3,791,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,744 UART: [rt]cmd =0x52564348, len=36
3,822,652 >>> mbox cmd response data (8 bytes)
3,822,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,760 UART: [rt]cmd =0x44504543, len=96
4,033,265 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,081 >>> mbox cmd response: success
2,991,679 UART:
2,991,695 UART: Running Caliptra FMC ...
2,992,103 UART:
2,992,157 UART: [state] CFI Enabled
3,002,300 UART: [fht] FMC Alias Private Key: 7
3,109,967 UART: [art] Extend RT PCRs Done
3,110,395 UART: [art] Lock RT PCRs Done
3,111,833 UART: [art] Populate DV Done
3,119,876 UART: [fht] FMC Alias Private Key: 7
3,120,962 UART: [art] Derive CDI
3,121,242 UART: [art] Store in in slot 0x4
3,206,779 UART: [art] Derive Key Pair
3,207,139 UART: [art] Store priv key in slot 0x5
3,220,533 UART: [art] Derive Key Pair - Done
3,235,261 UART: [art] Signing Cert with AUTHO
3,235,741 UART: RITY.KEYID = 7
3,250,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,604 UART: [art] PUB.X = 21B3140B8CFBF5007885ECEB173EC853F88463C9DF8FBBFB7A47A34DF4DF3EF5552666C64A99F96F1EEFF77D1A927EE6
3,258,369 UART: [art] PUB.Y = 2667C5AA2EBCD7566A86855E384CDA4CB23F562F696B7089186BE170809719789F4938745FDF57D13C5B8CD22C4BDF06
3,265,318 UART: [art] SIG.R = 819C844A9F2F0C1A74ECB37720B4A4C3FA9963338DAF643E1BED49ECC23086EFBF03BDCD4285576777AAFCF88441D88C
3,272,098 UART: [art] SIG.S = 6857E66D7767D6475B30FEED102F31351824597FC5B6067F5CDA4578F5F689EE42C7297B0C3B341F77B8EFAB78808F79
3,295,697 UART: Caliptra RT
3,295,950 UART: [state] CFI Enabled
3,405,073 UART: [rt] RT listening for mailbox commands...
3,405,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,211 UART: [rt]cmd =0x44504543, len=96
3,617,986 >>> mbox cmd response data (6236 bytes)
3,617,987 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,406 UART: [rt]cmd =0x52564348, len=36
3,649,566 >>> mbox cmd response data (8 bytes)
3,649,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,722 UART: [rt]cmd =0x44504543, len=96
3,860,561 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,145 UART: [state] LifecycleState = Unprovisioned
86,800 UART: [state] DebugLocked = No
87,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,144 UART: [kat] SHA2-256
883,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,190 UART: [kat] ++
887,342 UART: [kat] sha1
891,462 UART: [kat] SHA2-256
893,400 UART: [kat] SHA2-384
896,163 UART: [kat] SHA2-512-ACC
898,064 UART: [kat] ECC-384
903,613 UART: [kat] HMAC-384Kdf
908,447 UART: [kat] LMS
1,476,643 UART: [kat] --
1,477,562 UART: [cold-reset] ++
1,478,058 UART: [fht] Storing FHT @ 0x50003400
1,480,827 UART: [idev] ++
1,480,995 UART: [idev] CDI.KEYID = 6
1,481,355 UART: [idev] SUBJECT.KEYID = 7
1,481,779 UART: [idev] UDS.KEYID = 0
1,482,124 ready_for_fw is high
1,482,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,207 UART: [idev] Erasing UDS.KEYID = 0
1,506,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,255 UART: [idev] --
1,516,452 UART: [ldev] ++
1,516,620 UART: [ldev] CDI.KEYID = 6
1,516,983 UART: [ldev] SUBJECT.KEYID = 5
1,517,409 UART: [ldev] AUTHORITY.KEYID = 7
1,517,872 UART: [ldev] FE.KEYID = 1
1,523,108 UART: [ldev] Erasing FE.KEYID = 1
1,548,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,695 UART: [ldev] --
1,587,962 UART: [fwproc] Waiting for Commands...
1,588,725 UART: [fwproc] Received command 0x46574c44
1,589,516 UART: [fwproc] Received Image of size 114448 bytes
2,887,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,956 >>> mbox cmd response: success
3,082,102 UART: [afmc] ++
3,082,270 UART: [afmc] CDI.KEYID = 6
3,082,632 UART: [afmc] SUBJECT.KEYID = 7
3,083,057 UART: [afmc] AUTHORITY.KEYID = 5
3,117,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,511 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,201 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,080 UART: [afmc] --
3,161,132 UART: [cold-reset] --
3,161,782 UART: [state] Locking Datavault
3,162,937 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,541 UART: [state] Locking ICCM
3,164,137 UART: [exit] Launching FMC @ 0x40000130
3,169,466 UART:
3,169,482 UART: Running Caliptra FMC ...
3,169,890 UART:
3,170,033 UART: [state] CFI Enabled
3,180,672 UART: [fht] FMC Alias Private Key: 7
3,287,991 UART: [art] Extend RT PCRs Done
3,288,419 UART: [art] Lock RT PCRs Done
3,289,989 UART: [art] Populate DV Done
3,298,304 UART: [fht] FMC Alias Private Key: 7
3,299,460 UART: [art] Derive CDI
3,299,740 UART: [art] Store in in slot 0x4
3,385,589 UART: [art] Derive Key Pair
3,385,949 UART: [art] Store priv key in slot 0x5
3,399,123 UART: [art] Derive Key Pair - Done
3,413,420 UART: [art] Signing Cert with AUTHO
3,413,900 UART: RITY.KEYID = 7
3,429,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,815 UART: [art] PUB.X = 932F2889739F7A30950FA78A08F0B0030B22A7EAA099ED0FC55D188FAAE6EFF874079D579F6ADE87EB711AB77B75A9E1
3,436,579 UART: [art] PUB.Y = 0E62DC4B0A2480D9920E6CC27425AE0BF99BA35798EF5C21608CEACA76CC04C1177F3FC7DCCA3C8D55A0A39DE5AD7FBC
3,443,540 UART: [art] SIG.R = 27F7C64D687545582560141AA60AF660D11F46F91983BD925945ACDD24404FFCB8F0EA8429A77D982C76A3C0F016E461
3,450,305 UART: [art] SIG.S = B93ADE021D761BBB3F4125DD4911A82C35E76FF30E8866CB9BF88B83F539B9F747F405B1112862357497CB3EFF2925B6
3,474,121 UART: Caliptra RT
3,474,466 UART: [state] CFI Enabled
3,582,571 UART: [rt] RT listening for mailbox commands...
3,583,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,791 UART: [rt]cmd =0x44504543, len=96
3,794,827 >>> mbox cmd response data (6236 bytes)
3,794,828 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,411 UART: [rt]cmd =0x52564348, len=36
3,826,383 >>> mbox cmd response data (8 bytes)
3,826,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,251 UART: [rt]cmd =0x44504543, len=96
4,036,507 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,456 ready_for_fw is high
1,363,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,744 >>> mbox cmd response: success
2,993,492 UART:
2,993,508 UART: Running Caliptra FMC ...
2,993,916 UART:
2,994,059 UART: [state] CFI Enabled
3,004,510 UART: [fht] FMC Alias Private Key: 7
3,112,851 UART: [art] Extend RT PCRs Done
3,113,279 UART: [art] Lock RT PCRs Done
3,114,899 UART: [art] Populate DV Done
3,123,252 UART: [fht] FMC Alias Private Key: 7
3,124,312 UART: [art] Derive CDI
3,124,592 UART: [art] Store in in slot 0x4
3,210,131 UART: [art] Derive Key Pair
3,210,491 UART: [art] Store priv key in slot 0x5
3,223,913 UART: [art] Derive Key Pair - Done
3,239,044 UART: [art] Signing Cert with AUTHO
3,239,524 UART: RITY.KEYID = 7
3,255,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,925 UART: [art] PUB.X = 46432132F8E2B122B578C23FA48A6949723BD3CE499A4C639CBB73529E72E1D9F2EF04084CA5181D2CD1B862A619F056
3,262,689 UART: [art] PUB.Y = 068CD18EF28DAAA8A660255CAABE165817A78A6AF18234860889A0B2E78037AC2986943B1DB09580B2D1EA56F9396D8C
3,269,637 UART: [art] SIG.R = 72D8E34048CE998421D2EE55835F6FDA0060DA4255D9ED1B07DF8A16408AAA48A317941C8DC4EB6D06E656152D609F20
3,276,383 UART: [art] SIG.S = 335B41680E3BF342DACC2F18A38736A33853816CA915F21599F7FFEA2C567864C6A1FDB07E631C11617EB86F4A91901A
3,299,955 UART: Caliptra RT
3,300,300 UART: [state] CFI Enabled
3,407,452 UART: [rt] RT listening for mailbox commands...
3,408,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,724 UART: [rt]cmd =0x44504543, len=96
3,620,389 >>> mbox cmd response data (6236 bytes)
3,620,390 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,849 UART: [rt]cmd =0x52564348, len=36
3,651,733 >>> mbox cmd response data (8 bytes)
3,651,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,859 UART: [rt]cmd =0x44504543, len=96
3,862,784 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,921 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
893,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,951 UART: [kat] ++
898,103 UART: [kat] sha1
902,247 UART: [kat] SHA2-256
904,187 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,918 UART: [kat] LMS
1,171,246 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,639 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 ready_for_fw is high
1,176,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,240 UART: [idev] Erasing UDS.KEYID = 0
1,201,151 UART: [idev] Sha1 KeyId Algorithm
1,209,387 UART: [idev] --
1,210,413 UART: [ldev] ++
1,210,581 UART: [ldev] CDI.KEYID = 6
1,210,944 UART: [ldev] SUBJECT.KEYID = 5
1,211,370 UART: [ldev] AUTHORITY.KEYID = 7
1,211,833 UART: [ldev] FE.KEYID = 1
1,217,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,938 UART: [fwproc] Recv command 0x46574c44
1,284,666 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,028 >>> mbox cmd response: success
2,777,242 UART: [afmc] ++
2,777,410 UART: [afmc] CDI.KEYID = 6
2,777,772 UART: [afmc] SUBJECT.KEYID = 7
2,778,197 UART: [afmc] AUTHORITY.KEYID = 5
2,813,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,117 UART: [afmc] --
2,857,197 UART: [cold-reset] --
2,858,091 UART: [state] Locking Datavault
2,859,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,074 UART: [state] Locking ICCM
2,860,594 UART: [exit] Launching FMC @ 0x40000130
2,865,923 UART:
2,865,939 UART: Running Caliptra FMC ...
2,866,347 UART:
2,866,401 UART: [state] CFI Enabled
2,876,904 UART: [fht] FMC Alias Private Key: 7
2,984,853 UART: [art] Extend RT PCRs Done
2,985,281 UART: [art] Lock RT PCRs Done
2,986,563 UART: [art] Populate DV Done
2,994,710 UART: [fht] FMC Alias Private Key: 7
2,995,706 UART: [art] Derive CDI
2,995,986 UART: [art] Store in in slot 0x4
3,081,759 UART: [art] Derive Key Pair
3,082,119 UART: [art] Store priv key in slot 0x5
3,094,927 UART: [art] Derive Key Pair - Done
3,109,896 UART: [art] Signing Cert with AUTHO
3,110,376 UART: RITY.KEYID = 7
3,126,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,803 UART: [art] PUB.X = 0B64D45CA39F0E358EBB350D53A8C9FF8DF0FD01AEDAF0BEF68A10C82FFA65B77912E5595CEF7100B57E4AE40BE2D526
3,133,560 UART: [art] PUB.Y = B2A95C16904371B9B4300228774B53981F14EAAB73B1A651ED0F0DCE5EC5CBA1C313A4B066AB1C3AAAADF74C46BFE0E0
3,140,521 UART: [art] SIG.R = C1ED9B8AA25D3FD0EA3E4460ACCE30B52AD65C224B459F15A9B683C9B30AA4755043C75FC37D07DCB8A93A4F21CF8F36
3,147,305 UART: [art] SIG.S = 6F71F2A7EEE3DAEFBEAB75EAF3F54ABB3D5B05CC7F8D10742C69501F17535C0E80571C2D6B4FA70D23589566565434E4
3,170,915 UART: Caliptra RT
3,171,168 UART: [state] CFI Enabled
3,278,773 UART: [rt] RT listening for mailbox commands...
3,279,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,045 UART: [rt]cmd =0x44504543, len=96
3,491,153 >>> mbox cmd response data (6236 bytes)
3,491,154 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,621 UART: [rt]cmd =0x52564348, len=36
3,522,441 >>> mbox cmd response data (8 bytes)
3,522,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,417 UART: [rt]cmd =0x44504543, len=96
3,732,683 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 ready_for_fw is high
1,060,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,737 >>> mbox cmd response: success
2,690,467 UART:
2,690,483 UART: Running Caliptra FMC ...
2,690,891 UART:
2,690,945 UART: [state] CFI Enabled
2,701,268 UART: [fht] FMC Alias Private Key: 7
2,809,433 UART: [art] Extend RT PCRs Done
2,809,861 UART: [art] Lock RT PCRs Done
2,811,805 UART: [art] Populate DV Done
2,819,914 UART: [fht] FMC Alias Private Key: 7
2,820,994 UART: [art] Derive CDI
2,821,274 UART: [art] Store in in slot 0x4
2,906,881 UART: [art] Derive Key Pair
2,907,241 UART: [art] Store priv key in slot 0x5
2,920,665 UART: [art] Derive Key Pair - Done
2,935,652 UART: [art] Signing Cert with AUTHO
2,936,132 UART: RITY.KEYID = 7
2,951,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,805 UART: [art] PUB.X = 4C5A73091491B549240BF0BCF0CFC8A30F65412B242B22C396F814ABED38063B7EB20443575A742DA7E3785EAE67B98A
2,958,564 UART: [art] PUB.Y = 292B2E6A0AE9514B9574C1316532B9C29DEC74B20E7C36D6D2A36773CBFE7FB3A81F1DA85C219860E5DEB77C8FE2D808
2,965,517 UART: [art] SIG.R = CD94F9A4E777F9B66EAD047CC3EE8EB1E1FBF03A5B408B4E850CA203E53A5E66323FD662F407825A512204EBA5100906
2,972,276 UART: [art] SIG.S = 1ABE8E72AFAE0338499C1AF0DE6606E62A5690A87370201608DEC3306E1D9DA28E552840D5BEF85D1527545F55601F9F
2,995,968 UART: Caliptra RT
2,996,221 UART: [state] CFI Enabled
3,102,986 UART: [rt] RT listening for mailbox commands...
3,103,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,862 UART: [rt]cmd =0x44504543, len=96
3,314,913 >>> mbox cmd response data (6236 bytes)
3,314,914 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,521 UART: [rt]cmd =0x52564348, len=36
3,346,553 >>> mbox cmd response data (8 bytes)
3,346,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,481 UART: [rt]cmd =0x44504543, len=96
3,556,722 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
893,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,208 UART: [kat] ++
897,360 UART: [kat] sha1
901,734 UART: [kat] SHA2-256
903,674 UART: [kat] SHA2-384
906,421 UART: [kat] SHA2-512-ACC
908,322 UART: [kat] ECC-384
918,005 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,171,846 UART: [cold-reset] ++
1,172,186 UART: [fht] FHT @ 0x50003400
1,174,703 UART: [idev] ++
1,174,871 UART: [idev] CDI.KEYID = 6
1,175,231 UART: [idev] SUBJECT.KEYID = 7
1,175,655 UART: [idev] UDS.KEYID = 0
1,176,000 ready_for_fw is high
1,176,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,186 UART: [idev] Sha1 KeyId Algorithm
1,209,650 UART: [idev] --
1,210,464 UART: [ldev] ++
1,210,632 UART: [ldev] CDI.KEYID = 6
1,210,995 UART: [ldev] SUBJECT.KEYID = 5
1,211,421 UART: [ldev] AUTHORITY.KEYID = 7
1,211,884 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,068 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,191 UART: [fwproc] Recv command 0x46574c44
1,283,919 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,484 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,655 >>> mbox cmd response: success
2,776,879 UART: [afmc] ++
2,777,047 UART: [afmc] CDI.KEYID = 6
2,777,409 UART: [afmc] SUBJECT.KEYID = 7
2,777,834 UART: [afmc] AUTHORITY.KEYID = 5
2,813,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,081 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,592 UART: [afmc] --
2,856,560 UART: [cold-reset] --
2,857,418 UART: [state] Locking Datavault
2,858,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,189 UART: [state] Locking ICCM
2,859,839 UART: [exit] Launching FMC @ 0x40000130
2,865,168 UART:
2,865,184 UART: Running Caliptra FMC ...
2,865,592 UART:
2,865,735 UART: [state] CFI Enabled
2,876,478 UART: [fht] FMC Alias Private Key: 7
2,984,221 UART: [art] Extend RT PCRs Done
2,984,649 UART: [art] Lock RT PCRs Done
2,986,501 UART: [art] Populate DV Done
2,994,644 UART: [fht] FMC Alias Private Key: 7
2,995,736 UART: [art] Derive CDI
2,996,016 UART: [art] Store in in slot 0x4
3,082,135 UART: [art] Derive Key Pair
3,082,495 UART: [art] Store priv key in slot 0x5
3,096,167 UART: [art] Derive Key Pair - Done
3,110,674 UART: [art] Signing Cert with AUTHO
3,111,154 UART: RITY.KEYID = 7
3,126,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,463 UART: [art] PUB.X = 41073B2773A85349EDDF85DFD84384194B72C954F32B095A44591BBD741AA1C2680E70FFE821EEBC210FD126DD2399B0
3,134,225 UART: [art] PUB.Y = 2773BD371BEA910E2A97F2E844F632E5E73337509FAE369274910B3575ED52D813E8CD2FCD4D0795AF9909E300B9E136
3,141,141 UART: [art] SIG.R = 8068A01CC48243BA17F299B1D7399C2D1070344DDDF1F012302124E220352D0FAB6519BB466905A37E0F86A4FF2507E4
3,147,895 UART: [art] SIG.S = 85D55178506C41711223E254DF8DA1F8BB7A8E1985E3434EBEEB02ED55D25F2535C015950A54173979030F8BEAD83E44
3,171,778 UART: Caliptra RT
3,172,123 UART: [state] CFI Enabled
3,279,615 UART: [rt] RT listening for mailbox commands...
3,280,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,707 UART: [rt]cmd =0x44504543, len=96
3,491,659 >>> mbox cmd response data (6236 bytes)
3,491,660 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,235 UART: [rt]cmd =0x52564348, len=36
3,523,315 >>> mbox cmd response data (8 bytes)
3,523,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,319 UART: [rt]cmd =0x44504543, len=96
3,733,369 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 ready_for_fw is high
1,060,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,530 >>> mbox cmd response: success
2,688,606 UART:
2,688,622 UART: Running Caliptra FMC ...
2,689,030 UART:
2,689,173 UART: [state] CFI Enabled
2,699,972 UART: [fht] FMC Alias Private Key: 7
2,807,995 UART: [art] Extend RT PCRs Done
2,808,423 UART: [art] Lock RT PCRs Done
2,809,969 UART: [art] Populate DV Done
2,818,156 UART: [fht] FMC Alias Private Key: 7
2,819,130 UART: [art] Derive CDI
2,819,410 UART: [art] Store in in slot 0x4
2,905,121 UART: [art] Derive Key Pair
2,905,481 UART: [art] Store priv key in slot 0x5
2,919,407 UART: [art] Derive Key Pair - Done
2,934,152 UART: [art] Signing Cert with AUTHO
2,934,632 UART: RITY.KEYID = 7
2,949,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,541 UART: [art] PUB.X = F9871845EBA0657FA1F001F2F50C993E3E2B892988BD56720BDDE32CBBA31110B2E111D38AC97531D6A1BDECC5E1B700
2,957,292 UART: [art] PUB.Y = 8632E146EBB05749D4A4F6E1A7D8A229539F56EF94FD79C6FEF9D9A8FFEDADBBD266782C53CD48007090A2193A070321
2,964,224 UART: [art] SIG.R = 33CB87444DDB5E1A09A2AA95FC34FDA2BCED5273346B984FBDEFE3AC836F3F5A80FDAF9B28350A2FEDDF3E3B46E8DC38
2,971,020 UART: [art] SIG.S = 7E058CF6CF6D34DC8DACB7F4C3845C5743F4D32F55ED62C4B2110C8BA4960BDA34C9E23AF130622EFA72E49C32EA50EC
2,995,332 UART: Caliptra RT
2,995,677 UART: [state] CFI Enabled
3,103,352 UART: [rt] RT listening for mailbox commands...
3,104,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,096 UART: [rt]cmd =0x44504543, len=96
3,315,001 >>> mbox cmd response data (6236 bytes)
3,315,002 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,347 UART: [rt]cmd =0x52564348, len=36
3,346,805 >>> mbox cmd response data (8 bytes)
3,346,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,057 UART: [rt]cmd =0x44504543, len=96
3,557,788 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 ready_for_fw is high
1,174,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,363 UART: [idev] --
1,209,474 UART: [ldev] ++
1,209,642 UART: [ldev] CDI.KEYID = 6
1,210,006 UART: [ldev] SUBJECT.KEYID = 5
1,210,433 UART: [ldev] AUTHORITY.KEYID = 7
1,210,896 UART: [ldev] FE.KEYID = 1
1,216,176 UART: [ldev] Erasing FE.KEYID = 1
1,242,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,664 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,617 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,264 >>> mbox cmd response: success
2,775,517 UART: [afmc] ++
2,775,685 UART: [afmc] CDI.KEYID = 6
2,776,048 UART: [afmc] SUBJECT.KEYID = 7
2,776,474 UART: [afmc] AUTHORITY.KEYID = 5
2,811,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,094 UART: [afmc] --
2,855,044 UART: [cold-reset] --
2,855,994 UART: [state] Locking Datavault
2,857,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,767 UART: [state] Locking ICCM
2,858,321 UART: [exit] Launching FMC @ 0x40000130
2,863,650 UART:
2,863,666 UART: Running Caliptra FMC ...
2,864,074 UART:
2,864,128 UART: [state] CFI Enabled
2,874,847 UART: [fht] FMC Alias Private Key: 7
2,983,048 UART: [art] Extend RT PCRs Done
2,983,476 UART: [art] Lock RT PCRs Done
2,984,906 UART: [art] Populate DV Done
2,993,185 UART: [fht] FMC Alias Private Key: 7
2,994,183 UART: [art] Derive CDI
2,994,463 UART: [art] Store in in slot 0x4
3,080,268 UART: [art] Derive Key Pair
3,080,628 UART: [art] Store priv key in slot 0x5
3,093,686 UART: [art] Derive Key Pair - Done
3,108,489 UART: [art] Signing Cert with AUTHO
3,108,969 UART: RITY.KEYID = 7
3,124,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,894 UART: [art] PUB.X = B3AF61FAE29A7EC80286E5958BAEC95480E3F987BA5451044A3F895DFF1E4CC9B2D9C77CBCBC3945F4A4D10AB3EE8302
3,131,672 UART: [art] PUB.Y = 8281A1C10108D6AF0AFF50E626B686F076F1B6929477C262A5295649E8289B9086DC9F5F38E500B4670FDE2676F0A107
3,138,579 UART: [art] SIG.R = 70F3564A4EA6709612232AA043D9B86FF9E78AD43C767146103675D94C5EA0D118BA31A53E4EEDD4F463A21BE1A7B29B
3,145,355 UART: [art] SIG.S = 02754C0452BEF1E46306F643E4387CE7F6B2AFFD859E938937BF0226F7D43D5DDE82BC883E605C657E843B7ECDD72105
3,168,857 UART: Caliptra RT
3,169,110 UART: [state] CFI Enabled
3,276,287 UART: [rt] RT listening for mailbox commands...
3,276,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,127 UART: [rt]cmd =0x44504543, len=96
3,487,517 >>> mbox cmd response data (6236 bytes)
3,487,518 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,055 UART: [rt]cmd =0x52564348, len=36
3,519,001 >>> mbox cmd response data (8 bytes)
3,519,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,913 UART: [rt]cmd =0x44504543, len=96
3,729,933 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,602 ready_for_fw is high
1,056,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,024 >>> mbox cmd response: success
2,686,364 UART:
2,686,380 UART: Running Caliptra FMC ...
2,686,788 UART:
2,686,842 UART: [state] CFI Enabled
2,697,157 UART: [fht] FMC Alias Private Key: 7
2,804,446 UART: [art] Extend RT PCRs Done
2,804,874 UART: [art] Lock RT PCRs Done
2,806,486 UART: [art] Populate DV Done
2,814,689 UART: [fht] FMC Alias Private Key: 7
2,815,823 UART: [art] Derive CDI
2,816,103 UART: [art] Store in in slot 0x4
2,901,516 UART: [art] Derive Key Pair
2,901,876 UART: [art] Store priv key in slot 0x5
2,915,128 UART: [art] Derive Key Pair - Done
2,929,907 UART: [art] Signing Cert with AUTHO
2,930,387 UART: RITY.KEYID = 7
2,945,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,362 UART: [art] PUB.X = F88191CBC62234D5023BF1143B3BCE5961EF0BAD3038007DBDB5CBE469DD2F0B83BB991F099D12746F6A8A377C6737B7
2,953,108 UART: [art] PUB.Y = 8651999DE39314F157E3528925C4E3B6214875DD7CA01873522A2F6641AE8BAB37B39B0C0A1A192F51752FDF8F1E8A5C
2,960,052 UART: [art] SIG.R = 7BCF92834A90C9E48880CAAE233DD1433A33AA5E0B58B492A90ACFB8F1B9BEB0B2856B8F2E8BAE7C0C988EDD51ACAE3F
2,966,841 UART: [art] SIG.S = 511751D32D7B374EF250DA7F893FAD68B37321DB0466DA8EACE06DD96026C77A1A8BF61A785CD7637AB1DD7DDAC048A3
2,990,661 UART: Caliptra RT
2,990,914 UART: [state] CFI Enabled
3,098,745 UART: [rt] RT listening for mailbox commands...
3,099,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,955 UART: [rt]cmd =0x44504543, len=96
3,309,845 >>> mbox cmd response data (6236 bytes)
3,309,846 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,577 UART: [rt]cmd =0x52564348, len=36
3,341,613 >>> mbox cmd response data (8 bytes)
3,341,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,427 UART: [rt]cmd =0x44504543, len=96
3,552,931 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,346 UART: [kat] SHA2-256
902,286 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
917,079 UART: [kat] HMAC-384Kdf
921,753 UART: [kat] LMS
1,170,065 UART: [kat] --
1,170,876 UART: [cold-reset] ++
1,171,438 UART: [fht] FHT @ 0x50003400
1,173,876 UART: [idev] ++
1,174,044 UART: [idev] CDI.KEYID = 6
1,174,405 UART: [idev] SUBJECT.KEYID = 7
1,174,830 UART: [idev] UDS.KEYID = 0
1,175,176 ready_for_fw is high
1,175,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,639 UART: [fwproc] Wait for Commands...
1,282,256 UART: [fwproc] Recv command 0x46574c44
1,282,989 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,967 >>> mbox cmd response: success
2,776,028 UART: [afmc] ++
2,776,196 UART: [afmc] CDI.KEYID = 6
2,776,559 UART: [afmc] SUBJECT.KEYID = 7
2,776,985 UART: [afmc] AUTHORITY.KEYID = 5
2,812,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,305 UART: [afmc] --
2,856,311 UART: [cold-reset] --
2,857,257 UART: [state] Locking Datavault
2,858,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,238 UART: [state] Locking ICCM
2,859,884 UART: [exit] Launching FMC @ 0x40000130
2,865,213 UART:
2,865,229 UART: Running Caliptra FMC ...
2,865,637 UART:
2,865,780 UART: [state] CFI Enabled
2,876,509 UART: [fht] FMC Alias Private Key: 7
2,984,594 UART: [art] Extend RT PCRs Done
2,985,022 UART: [art] Lock RT PCRs Done
2,986,638 UART: [art] Populate DV Done
2,994,967 UART: [fht] FMC Alias Private Key: 7
2,996,099 UART: [art] Derive CDI
2,996,379 UART: [art] Store in in slot 0x4
3,081,912 UART: [art] Derive Key Pair
3,082,272 UART: [art] Store priv key in slot 0x5
3,095,536 UART: [art] Derive Key Pair - Done
3,110,256 UART: [art] Signing Cert with AUTHO
3,110,736 UART: RITY.KEYID = 7
3,126,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,767 UART: [art] PUB.X = 98A1EB890A76359B0B624CFF201BB945BD17DD598D82BF0A54526272A5968A2CAB548CA0F85C9BC83EDAB076B8BDD493
3,133,542 UART: [art] PUB.Y = A4C85959DAF7A0C9486B1B9C5AE090B67F59F7BEC14D017A99B2AB64F2F9F817D10118CD79014862FD25C172089176CE
3,140,486 UART: [art] SIG.R = 4D662BEDAC3E9CD52B56AF18D2FAED8915D35FAB033D36FA36142118897A57F76025459F711A1E11205EF34988D846EA
3,147,259 UART: [art] SIG.S = 1B360E9D82EBC5D3821709F133D063A3B576AC7843A90372D54B986E6FCE5688C229F3C8781E2EBABFF9315A52F58CAF
3,171,563 UART: Caliptra RT
3,171,908 UART: [state] CFI Enabled
3,279,511 UART: [rt] RT listening for mailbox commands...
3,280,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,565 UART: [rt]cmd =0x44504543, len=96
3,491,097 >>> mbox cmd response data (6236 bytes)
3,491,098 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,553 UART: [rt]cmd =0x52564348, len=36
3,522,677 >>> mbox cmd response data (8 bytes)
3,522,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,615 UART: [rt]cmd =0x44504543, len=96
3,733,421 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,565 ready_for_fw is high
1,057,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,447 >>> mbox cmd response: success
2,687,885 UART:
2,687,901 UART: Running Caliptra FMC ...
2,688,309 UART:
2,688,452 UART: [state] CFI Enabled
2,699,435 UART: [fht] FMC Alias Private Key: 7
2,806,582 UART: [art] Extend RT PCRs Done
2,807,010 UART: [art] Lock RT PCRs Done
2,808,572 UART: [art] Populate DV Done
2,817,003 UART: [fht] FMC Alias Private Key: 7
2,818,105 UART: [art] Derive CDI
2,818,385 UART: [art] Store in in slot 0x4
2,904,134 UART: [art] Derive Key Pair
2,904,494 UART: [art] Store priv key in slot 0x5
2,917,748 UART: [art] Derive Key Pair - Done
2,932,192 UART: [art] Signing Cert with AUTHO
2,932,672 UART: RITY.KEYID = 7
2,948,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,777 UART: [art] PUB.X = 6D63917A330133E67364133598F0BB2FB6D7D6FC2E22A028B90F6E09EAB8C3F72195D80C330977977024C44EE65F2B94
2,955,528 UART: [art] PUB.Y = 2D120C42874C8243D4B813751038C55E62468D9DFC44B25790A6BE67CA670D681429741D0BB99AE3F7B574D4955C7A2B
2,962,465 UART: [art] SIG.R = 08DF0BC3D0FCB2C00C64BDEB899B60FA612F39E74FBC0BFF11DC227FD667F09270B399BEBDFB760C6E88C5DBDFA2DF99
2,969,252 UART: [art] SIG.S = 0A9DE5E1908DD435DDC62028E8DE5AF52C10868A6881305659D9C6E60DDF8A3E56D5131E80F491416E7979D22D99469D
2,993,023 UART: Caliptra RT
2,993,368 UART: [state] CFI Enabled
3,099,913 UART: [rt] RT listening for mailbox commands...
3,100,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,153 UART: [rt]cmd =0x44504543, len=96
3,311,503 >>> mbox cmd response data (6236 bytes)
3,311,504 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,899 UART: [rt]cmd =0x52564348, len=36
3,343,087 >>> mbox cmd response data (8 bytes)
3,343,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,967 UART: [rt]cmd =0x44504543, len=96
3,552,877 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,016 UART:
192,395 UART: Running Caliptra ROM ...
193,594 UART:
193,746 UART: [state] CFI Enabled
265,257 UART: [state] LifecycleState = Unprovisioned
267,244 UART: [state] DebugLocked = No
270,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,709 UART: [kat] SHA2-256
445,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,877 UART: [kat] ++
456,412 UART: [kat] sha1
467,435 UART: [kat] SHA2-256
470,160 UART: [kat] SHA2-384
477,070 UART: [kat] SHA2-512-ACC
479,439 UART: [kat] ECC-384
2,768,714 UART: [kat] HMAC-384Kdf
2,800,767 UART: [kat] LMS
3,991,060 UART: [kat] --
3,997,071 UART: [cold-reset] ++
3,999,505 UART: [fht] Storing FHT @ 0x50003400
4,011,426 UART: [idev] ++
4,012,077 UART: [idev] CDI.KEYID = 6
4,012,993 UART: [idev] SUBJECT.KEYID = 7
4,014,238 UART: [idev] UDS.KEYID = 0
4,015,281 ready_for_fw is high
4,015,479 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,025 UART: [idev] Erasing UDS.KEYID = 0
7,348,007 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,790 UART: [idev] --
7,374,701 UART: [ldev] ++
7,375,319 UART: [ldev] CDI.KEYID = 6
7,376,297 UART: [ldev] SUBJECT.KEYID = 5
7,377,454 UART: [ldev] AUTHORITY.KEYID = 7
7,378,742 UART: [ldev] FE.KEYID = 1
7,422,386 UART: [ldev] Erasing FE.KEYID = 1
10,755,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,445 UART: [ldev] --
13,116,763 UART: [fwproc] Waiting for Commands...
13,119,719 UART: [fwproc] Received command 0x46574c44
13,121,898 UART: [fwproc] Received Image of size 114124 bytes
17,176,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,639,199 >>> mbox cmd response: success
17,644,137 UART: [afmc] ++
17,644,762 UART: [afmc] CDI.KEYID = 6
17,645,679 UART: [afmc] SUBJECT.KEYID = 7
17,646,898 UART: [afmc] AUTHORITY.KEYID = 5
21,011,836 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,163 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,613 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,413 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,839 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,430 UART: [afmc] --
23,379,615 UART: [cold-reset] --
23,384,247 UART: [state] Locking Datavault
23,389,431 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,191 UART: [state] Locking ICCM
23,392,314 UART: [exit] Launching FMC @ 0x40000130
23,400,661 UART:
23,400,895 UART: Running Caliptra FMC ...
23,401,999 UART:
23,402,158 UART: [state] CFI Enabled
23,470,064 UART: [fht] FMC Alias Private Key: 7
25,807,945 UART: [art] Extend RT PCRs Done
25,809,169 UART: [art] Lock RT PCRs Done
25,810,769 UART: [art] Populate DV Done
25,816,071 UART: [fht] FMC Alias Private Key: 7
25,817,722 UART: [art] Derive CDI
25,818,534 UART: [art] Store in in slot 0x4
25,879,258 UART: [art] Derive Key Pair
25,880,304 UART: [art] Store priv key in slot 0x5
29,173,561 UART: [art] Derive Key Pair - Done
29,186,289 UART: [art] Signing Cert with AUTHO
29,187,593 UART: RITY.KEYID = 7
31,474,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,974 UART: [art] PUB.X = 37F45598A868287BBC65811BAE0E72E2456D4A46C6D38F05FD5DB6EED54543D76254234CDD24FA4BDAE7B4CAD72409D6
31,483,232 UART: [art] PUB.Y = 60C989C8EE776DF621324845933D2F59BF17535689FE0393E6B6D445F48FCFD47A215C22A8B2234208442E8305FF7773
31,490,461 UART: [art] SIG.R = C7C44618634FADC109CAFBBFF03A54C20FE8AEF76E29EDA0CBFABA9056DFEA7B85573CA1FF2CD3197F62EA71251F382C
31,497,877 UART: [art] SIG.S = 805557F5CE77CB62AF63269B0E3F6249C406D1BEA657D15309D9F9A813AAD278754C3646E9D97899957CB736E09335F5
32,802,665 UART: Caliptra RT
32,803,366 UART: [state] CFI Enabled
32,965,808 UART: [rt] RT listening for mailbox commands...
32,967,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,998,423 UART: [rt]cmd =0x44504543, len=96
38,761,148 >>> mbox cmd response data (6236 bytes)
38,790,358 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,820,577 UART: [rt]cmd =0x52564348, len=36
38,823,414 >>> mbox cmd response data (8 bytes)
38,823,878 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,853,847 UART: [rt]cmd =0x52564348, len=36
38,855,491 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,801,727 ready_for_fw is high
3,802,265 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,866 >>> mbox cmd response: success
23,562,585 UART:
23,562,980 UART: Running Caliptra FMC ...
23,564,118 UART:
23,564,286 UART: [state] CFI Enabled
23,614,493 UART: [fht] FMC Alias Private Key: 7
25,952,440 UART: [art] Extend RT PCRs Done
25,953,662 UART: [art] Lock RT PCRs Done
25,955,615 UART: [art] Populate DV Done
25,961,038 UART: [fht] FMC Alias Private Key: 7
25,962,701 UART: [art] Derive CDI
25,963,519 UART: [art] Store in in slot 0x4
26,022,297 UART: [art] Derive Key Pair
26,023,342 UART: [art] Store priv key in slot 0x5
29,315,672 UART: [art] Derive Key Pair - Done
29,328,612 UART: [art] Signing Cert with AUTHO
29,329,909 UART: RITY.KEYID = 7
31,616,848 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,344 UART: [art] PUB.X = A687820987FF5025119ABA6FF0D3A3A8C118564DC53657910CB60E03429F5B38FEA02AA4FB71B1B2D4AA86DAC7162A5F
31,625,619 UART: [art] PUB.Y = 10635C936DBF3E60338692652B3531972ECE3D4C92ADE1298A26DCB00C225E52AC345C6B4976F703B48BF2F8368887E7
31,632,856 UART: [art] SIG.R = 9B796EFE761585536BCA99E26D9A2541499BFE1A790146FBD313796DB64FE98626C9A20ABEC80113FD96114BFCA1506B
31,640,198 UART: [art] SIG.S = E0E212AA7C9E0541CF66436CAE5EDFF6D4A4C86E2501D2C94707711F1C1F9C11956C0F5DD5966CFD87B4E5E35F669857
32,944,558 UART: Caliptra RT
32,945,274 UART: [state] CFI Enabled
33,105,513 UART: [rt] RT listening for mailbox commands...
33,107,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,138,007 UART: [rt]cmd =0x44504543, len=96
38,880,778 >>> mbox cmd response data (6236 bytes)
38,910,001 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,940,202 UART: [rt]cmd =0x52564348, len=36
38,942,531 >>> mbox cmd response data (8 bytes)
38,942,945 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,973,094 UART: [rt]cmd =0x52564348, len=36
38,975,052 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,381 UART:
192,733 UART: Running Caliptra ROM ...
193,912 UART:
603,728 UART: [state] CFI Enabled
617,892 UART: [state] LifecycleState = Unprovisioned
619,756 UART: [state] DebugLocked = No
622,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,836 UART: [kat] SHA2-256
797,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,110 UART: [kat] ++
808,646 UART: [kat] sha1
820,717 UART: [kat] SHA2-256
823,437 UART: [kat] SHA2-384
829,492 UART: [kat] SHA2-512-ACC
831,854 UART: [kat] ECC-384
3,115,481 UART: [kat] HMAC-384Kdf
3,126,814 UART: [kat] LMS
4,316,977 UART: [kat] --
4,321,143 UART: [cold-reset] ++
4,322,808 UART: [fht] Storing FHT @ 0x50003400
4,334,497 UART: [idev] ++
4,335,062 UART: [idev] CDI.KEYID = 6
4,335,940 UART: [idev] SUBJECT.KEYID = 7
4,337,245 UART: [idev] UDS.KEYID = 0
4,338,197 ready_for_fw is high
4,338,381 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,300 UART: [idev] Erasing UDS.KEYID = 0
7,627,505 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,756 UART: [idev] --
7,652,093 UART: [ldev] ++
7,652,665 UART: [ldev] CDI.KEYID = 6
7,653,602 UART: [ldev] SUBJECT.KEYID = 5
7,654,860 UART: [ldev] AUTHORITY.KEYID = 7
7,656,084 UART: [ldev] FE.KEYID = 1
7,666,593 UART: [ldev] Erasing FE.KEYID = 1
10,956,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,711 UART: [ldev] --
13,319,078 UART: [fwproc] Waiting for Commands...
13,321,283 UART: [fwproc] Received command 0x46574c44
13,323,513 UART: [fwproc] Received Image of size 114124 bytes
17,379,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,139 >>> mbox cmd response: success
17,842,672 UART: [afmc] ++
17,843,296 UART: [afmc] CDI.KEYID = 6
17,844,389 UART: [afmc] SUBJECT.KEYID = 7
17,845,491 UART: [afmc] AUTHORITY.KEYID = 5
21,161,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,138 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,503 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,333 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,781 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,024 UART: [afmc] --
23,525,145 UART: [cold-reset] --
23,528,640 UART: [state] Locking Datavault
23,533,685 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,444 UART: [state] Locking ICCM
23,538,027 UART: [exit] Launching FMC @ 0x40000130
23,546,368 UART:
23,546,598 UART: Running Caliptra FMC ...
23,547,695 UART:
23,547,854 UART: [state] CFI Enabled
23,556,245 UART: [fht] FMC Alias Private Key: 7
25,887,450 UART: [art] Extend RT PCRs Done
25,888,661 UART: [art] Lock RT PCRs Done
25,890,170 UART: [art] Populate DV Done
25,895,630 UART: [fht] FMC Alias Private Key: 7
25,897,187 UART: [art] Derive CDI
25,898,004 UART: [art] Store in in slot 0x4
25,940,496 UART: [art] Derive Key Pair
25,941,533 UART: [art] Store priv key in slot 0x5
29,183,768 UART: [art] Derive Key Pair - Done
29,196,936 UART: [art] Signing Cert with AUTHO
29,198,424 UART: RITY.KEYID = 7
31,478,099 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,610 UART: [art] PUB.X = C7537C9D820D4D899661D87FE7C52EF3A39CF2527FEED1DBA94032C2050D7C31521DC480092BDA1B0A350D4602E23001
31,486,872 UART: [art] PUB.Y = 2DD4A5E0808B36E1FAA86ABB367F21C0B5C1A8B99D233894947ECD23A21374E2F4289DBC19B703C9BFAF687C1C2295D2
31,494,137 UART: [art] SIG.R = 20D1062307E0BE06E2735ADA7742E3AC92E29FABC065114F9FB81D9C673E0B82894FCE6E33D6F353C869BDF0E92A9E6E
31,501,518 UART: [art] SIG.S = 89D05BA521946F578ADC9AE2B0964DF89BE4ED2BF7FB36724075546228EBC73BC96345DF46E50B6CCBC0A9EE120D124B
32,806,858 UART: Caliptra RT
32,807,568 UART: [state] CFI Enabled
32,925,651 UART: [rt] RT listening for mailbox commands...
32,927,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,958,064 UART: [rt]cmd =0x44504543, len=96
38,630,301 >>> mbox cmd response data (6236 bytes)
38,659,896 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,689,915 UART: [rt]cmd =0x52564348, len=36
38,692,467 >>> mbox cmd response data (8 bytes)
38,692,895 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,722,882 UART: [rt]cmd =0x52564348, len=36
38,724,401 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,127,443 ready_for_fw is high
4,127,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,488 >>> mbox cmd response: success
23,706,175 UART:
23,706,573 UART: Running Caliptra FMC ...
23,707,784 UART:
23,707,950 UART: [state] CFI Enabled
23,715,579 UART: [fht] FMC Alias Private Key: 7
26,046,430 UART: [art] Extend RT PCRs Done
26,047,650 UART: [art] Lock RT PCRs Done
26,049,221 UART: [art] Populate DV Done
26,054,589 UART: [fht] FMC Alias Private Key: 7
26,056,193 UART: [art] Derive CDI
26,056,961 UART: [art] Store in in slot 0x4
26,099,669 UART: [art] Derive Key Pair
26,100,674 UART: [art] Store priv key in slot 0x5
29,342,674 UART: [art] Derive Key Pair - Done
29,355,463 UART: [art] Signing Cert with AUTHO
29,356,769 UART: RITY.KEYID = 7
31,636,480 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,987 UART: [art] PUB.X = DDBB6EA502CAD3EE0891F5B2947D01820622FE7E90E3F47E84E491142EC543E6793E2DC896D7AB4D4350C0E814971163
31,645,303 UART: [art] PUB.Y = 78A4085F319A39B4DD7D8CF925D78AB530CC4ADD6864E3F0E08FBDE721ADBF29386DDBE2B310FB87EE8BB127D46F2617
31,652,516 UART: [art] SIG.R = 8FCAE84ED788C0C2BCB3F220A7BB802A2DEF73236D731706545C771210DA4BC81B56A546A038F0EBCDB7EDAA61DB2024
31,659,899 UART: [art] SIG.S = 1E84624F143AF81360C102FD9B13FAEB11F89ECD18AD791FB2C6482539EEA6F5B0DFE225C78523114A50E613E0A8705C
32,964,911 UART: Caliptra RT
32,965,624 UART: [state] CFI Enabled
33,083,444 UART: [rt] RT listening for mailbox commands...
33,085,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,380 UART: [rt]cmd =0x44504543, len=96
38,787,686 >>> mbox cmd response data (6236 bytes)
38,816,802 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,846,930 UART: [rt]cmd =0x52564348, len=36
38,849,397 >>> mbox cmd response data (8 bytes)
38,849,779 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,879,840 UART: [rt]cmd =0x52564348, len=36
38,881,545 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,213 UART:
192,577 UART: Running Caliptra ROM ...
193,758 UART:
193,919 UART: [state] CFI Enabled
263,646 UART: [state] LifecycleState = Unprovisioned
265,494 UART: [state] DebugLocked = No
267,379 UART: [state] WD Timer not started. Device not locked for debugging
270,350 UART: [kat] SHA2-256
449,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,088 UART: [kat] ++
461,546 UART: [kat] sha1
472,346 UART: [kat] SHA2-256
475,362 UART: [kat] SHA2-384
482,276 UART: [kat] SHA2-512-ACC
485,212 UART: [kat] ECC-384
2,949,718 UART: [kat] HMAC-384Kdf
2,971,211 UART: [kat] LMS
3,500,685 UART: [kat] --
3,505,268 UART: [cold-reset] ++
3,506,772 UART: [fht] FHT @ 0x50003400
3,517,186 UART: [idev] ++
3,517,748 UART: [idev] CDI.KEYID = 6
3,518,780 UART: [idev] SUBJECT.KEYID = 7
3,519,883 UART: [idev] UDS.KEYID = 0
3,520,821 ready_for_fw is high
3,521,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,141 UART: [idev] Erasing UDS.KEYID = 0
6,025,976 UART: [idev] Sha1 KeyId Algorithm
6,049,855 UART: [idev] --
6,053,747 UART: [ldev] ++
6,054,321 UART: [ldev] CDI.KEYID = 6
6,055,211 UART: [ldev] SUBJECT.KEYID = 5
6,056,399 UART: [ldev] AUTHORITY.KEYID = 7
6,057,743 UART: [ldev] FE.KEYID = 1
6,100,020 UART: [ldev] Erasing FE.KEYID = 1
8,603,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,235 UART: [ldev] --
10,414,699 UART: [fwproc] Wait for Commands...
10,417,400 UART: [fwproc] Recv command 0x46574c44
10,419,496 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,178 >>> mbox cmd response: success
14,277,776 UART: [afmc] ++
14,278,388 UART: [afmc] CDI.KEYID = 6
14,279,309 UART: [afmc] SUBJECT.KEYID = 7
14,280,418 UART: [afmc] AUTHORITY.KEYID = 5
16,807,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,899 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,842 UART: [afmc] --
18,604,492 UART: [cold-reset] --
18,606,510 UART: [state] Locking Datavault
18,610,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,543 UART: [state] Locking ICCM
18,614,851 UART: [exit] Launching FMC @ 0x40000130
18,623,251 UART:
18,623,524 UART: Running Caliptra FMC ...
18,624,630 UART:
18,624,799 UART: [state] CFI Enabled
18,689,110 UART: [fht] FMC Alias Private Key: 7
20,452,560 UART: [art] Extend RT PCRs Done
20,453,780 UART: [art] Lock RT PCRs Done
20,455,248 UART: [art] Populate DV Done
20,461,042 UART: [fht] FMC Alias Private Key: 7
20,462,675 UART: [art] Derive CDI
20,463,497 UART: [art] Store in in slot 0x4
20,521,351 UART: [art] Derive Key Pair
20,522,354 UART: [art] Store priv key in slot 0x5
22,985,150 UART: [art] Derive Key Pair - Done
22,997,983 UART: [art] Signing Cert with AUTHO
22,999,293 UART: RITY.KEYID = 7
24,711,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,883 UART: [art] PUB.X = 09F75733AA1128D7D6098AB6473CDC6CDAEB53F669DE121D778A24EE4B20BFD93BD619F11CA7835E1FADFD420A82190A
24,720,176 UART: [art] PUB.Y = DFD6A4FCB6E92C160CEF4FCDA098BD7051D3DECB6F06279CD4C7125921A1340178E32AFCE23EBF7DC0C0CA86E7CFE9B3
24,727,462 UART: [art] SIG.R = C57A7E22A7C06859EB37A1391765F65D281CE3E43D53F672B4AE7CB362D681DE5015F362B707DE8F95CC2D82DC1B2FEF
24,734,858 UART: [art] SIG.S = 586A3E3AEEE245335A7EB0CC51F19532D08FFE0D53AD36C8DFDDD1F591D2518767DBE68B9969F52631ADDB1A7EBF9A53
25,713,699 UART: Caliptra RT
25,714,392 UART: [state] CFI Enabled
25,892,770 UART: [rt] RT listening for mailbox commands...
25,894,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,925,761 UART: [rt]cmd =0x44504543, len=96
30,284,299 >>> mbox cmd response data (6236 bytes)
30,313,594 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,343,626 UART: [rt]cmd =0x52564348, len=36
30,346,382 >>> mbox cmd response data (8 bytes)
30,346,809 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,376,993 UART: [rt]cmd =0x52564348, len=36
30,378,900 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,380,153 ready_for_fw is high
3,380,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,878 >>> mbox cmd response: success
18,368,192 UART:
18,368,596 UART: Running Caliptra FMC ...
18,369,790 UART:
18,369,964 UART: [state] CFI Enabled
18,435,007 UART: [fht] FMC Alias Private Key: 7
20,199,482 UART: [art] Extend RT PCRs Done
20,200,704 UART: [art] Lock RT PCRs Done
20,202,387 UART: [art] Populate DV Done
20,207,524 UART: [fht] FMC Alias Private Key: 7
20,209,066 UART: [art] Derive CDI
20,209,885 UART: [art] Store in in slot 0x4
20,268,122 UART: [art] Derive Key Pair
20,269,156 UART: [art] Store priv key in slot 0x5
22,731,849 UART: [art] Derive Key Pair - Done
22,744,742 UART: [art] Signing Cert with AUTHO
22,746,064 UART: RITY.KEYID = 7
24,458,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,604 UART: [art] PUB.X = FB0F26E7D64F5D4AC6880C6B693E6EA4E821BCC5E0B139BCBF991B7A38046A8A6D5CDE80093022759E684790B9B08366
24,466,858 UART: [art] PUB.Y = 9A269B4D28D11AAD3B78B2052F8F8F59505E2A7E2D584764814901C27ED0F2152063003BA4576E647FF351AD3D7E4383
24,474,079 UART: [art] SIG.R = 404AB9C4B7971BCB9633EE0BB0E954DC7762C8AB28A8B3EFC37E4F9854F90A046C771FD3245004931AFC70615167AB42
24,481,486 UART: [art] SIG.S = 88FE1BE25EE0BB37D67DD1CA3EFF5A8E3D81A467CEA1DE9CD4508A68BF36AC1C7CEAD64D736C30374DD1164638F7579C
25,460,746 UART: Caliptra RT
25,461,446 UART: [state] CFI Enabled
25,626,890 UART: [rt] RT listening for mailbox commands...
25,628,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,659,706 UART: [rt]cmd =0x44504543, len=96
30,018,142 >>> mbox cmd response data (6236 bytes)
30,047,502 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,077,424 UART: [rt]cmd =0x52564348, len=36
30,080,224 >>> mbox cmd response data (8 bytes)
30,080,564 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,110,493 UART: [rt]cmd =0x52564348, len=36
30,112,200 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,466 UART:
192,833 UART: Running Caliptra ROM ...
194,023 UART:
603,540 UART: [state] CFI Enabled
615,991 UART: [state] LifecycleState = Unprovisioned
617,799 UART: [state] DebugLocked = No
619,317 UART: [state] WD Timer not started. Device not locked for debugging
622,138 UART: [kat] SHA2-256
801,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,856 UART: [kat] ++
813,396 UART: [kat] sha1
824,912 UART: [kat] SHA2-256
827,990 UART: [kat] SHA2-384
833,827 UART: [kat] SHA2-512-ACC
836,826 UART: [kat] ECC-384
3,277,999 UART: [kat] HMAC-384Kdf
3,291,795 UART: [kat] LMS
3,821,247 UART: [kat] --
3,824,174 UART: [cold-reset] ++
3,825,529 UART: [fht] FHT @ 0x50003400
3,836,426 UART: [idev] ++
3,836,983 UART: [idev] CDI.KEYID = 6
3,837,884 UART: [idev] SUBJECT.KEYID = 7
3,839,049 UART: [idev] UDS.KEYID = 0
3,840,094 ready_for_fw is high
3,840,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,048 UART: [idev] Erasing UDS.KEYID = 0
6,314,311 UART: [idev] Sha1 KeyId Algorithm
6,336,617 UART: [idev] --
6,341,196 UART: [ldev] ++
6,341,763 UART: [ldev] CDI.KEYID = 6
6,342,635 UART: [ldev] SUBJECT.KEYID = 5
6,343,833 UART: [ldev] AUTHORITY.KEYID = 7
6,345,053 UART: [ldev] FE.KEYID = 1
6,355,209 UART: [ldev] Erasing FE.KEYID = 1
8,835,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,164 UART: [ldev] --
10,626,359 UART: [fwproc] Wait for Commands...
10,628,879 UART: [fwproc] Recv command 0x46574c44
10,630,963 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,499,060 >>> mbox cmd response: success
14,502,692 UART: [afmc] ++
14,503,298 UART: [afmc] CDI.KEYID = 6
14,504,209 UART: [afmc] SUBJECT.KEYID = 7
14,505,363 UART: [afmc] AUTHORITY.KEYID = 5
17,008,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,817 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,053 UART: [afmc] --
18,803,913 UART: [cold-reset] --
18,807,496 UART: [state] Locking Datavault
18,812,623 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,316 UART: [state] Locking ICCM
18,815,917 UART: [exit] Launching FMC @ 0x40000130
18,824,310 UART:
18,824,540 UART: Running Caliptra FMC ...
18,825,631 UART:
18,825,782 UART: [state] CFI Enabled
18,833,764 UART: [fht] FMC Alias Private Key: 7
20,591,332 UART: [art] Extend RT PCRs Done
20,592,551 UART: [art] Lock RT PCRs Done
20,594,337 UART: [art] Populate DV Done
20,599,743 UART: [fht] FMC Alias Private Key: 7
20,601,290 UART: [art] Derive CDI
20,602,055 UART: [art] Store in in slot 0x4
20,645,026 UART: [art] Derive Key Pair
20,646,025 UART: [art] Store priv key in slot 0x5
23,072,913 UART: [art] Derive Key Pair - Done
23,085,627 UART: [art] Signing Cert with AUTHO
23,086,951 UART: RITY.KEYID = 7
24,792,784 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,286 UART: [art] PUB.X = 8EE466AFBF35C3E881D2D4ABA4F1C3B3F839723B72FC1BC9A936A944C513EA94359DE7371512388A76B865D5817F866D
24,801,563 UART: [art] PUB.Y = B028B46A677F730CF4310A237D5FB667BD65909E3E421F464B8CCDFBF9BDC8C3C780F2677F0A754FBE5A2B5EABA67C56
24,808,826 UART: [art] SIG.R = 6B34C8ECD7620D6DE0AE91AF382A470EF55875FB870286E5F80E8CFA30E23D0B896ED55778240A3E43DAC1294CA2F136
24,816,261 UART: [art] SIG.S = AF0D30A0AF2A7A2F7E694EF9486B9587F9F68BD099EAB82A24686D119E1838614351A72B503FEB93BE2761580E8D5B93
25,794,893 UART: Caliptra RT
25,795,588 UART: [state] CFI Enabled
25,912,227 UART: [rt] RT listening for mailbox commands...
25,914,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,944,996 UART: [rt]cmd =0x44504543, len=96
30,228,689 >>> mbox cmd response data (6236 bytes)
30,257,794 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,288,145 UART: [rt]cmd =0x52564348, len=36
30,290,789 >>> mbox cmd response data (8 bytes)
30,291,229 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,321,082 UART: [rt]cmd =0x52564348, len=36
30,322,562 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,696,752 ready_for_fw is high
3,697,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,822 >>> mbox cmd response: success
18,533,929 UART:
18,534,329 UART: Running Caliptra FMC ...
18,535,428 UART:
18,535,572 UART: [state] CFI Enabled
18,543,630 UART: [fht] FMC Alias Private Key: 7
20,300,817 UART: [art] Extend RT PCRs Done
20,302,040 UART: [art] Lock RT PCRs Done
20,303,853 UART: [art] Populate DV Done
20,309,418 UART: [fht] FMC Alias Private Key: 7
20,311,082 UART: [art] Derive CDI
20,311,820 UART: [art] Store in in slot 0x4
20,354,454 UART: [art] Derive Key Pair
20,355,487 UART: [art] Store priv key in slot 0x5
22,782,055 UART: [art] Derive Key Pair - Done
22,795,039 UART: [art] Signing Cert with AUTHO
22,796,376 UART: RITY.KEYID = 7
24,501,747 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,294 UART: [art] PUB.X = 2F5DCED3D09F3C18BBB9AB990607DDC40D87DDE544A636C821231E56142253ECF83DA2F963B604AA5D063124843E642A
24,510,539 UART: [art] PUB.Y = 8EFC52EA9108AECC19BC42BFC3D752B771D313813C5538789623E1048DB11B08AF6B65763437AB0BF81CB6408A46A181
24,517,794 UART: [art] SIG.R = 1EDA0E7D1217BCAF186B59CB023E04084EEABB45D2FA146BC3751FBBAB2E4FD5CDD6C7734ECF3AC1A53C9D916FC7343F
24,525,229 UART: [art] SIG.S = E9AD6EBE0F88901F69EDBF5F6E2DD0873E4D5E4B70F592EABAA779F14AE7E68E2CE4796CCB8DED1BCC74185C37F8FA10
25,504,123 UART: Caliptra RT
25,504,824 UART: [state] CFI Enabled
25,621,898 UART: [rt] RT listening for mailbox commands...
25,623,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,654,489 UART: [rt]cmd =0x44504543, len=96
29,936,597 >>> mbox cmd response data (6236 bytes)
29,966,815 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,997,239 UART: [rt]cmd =0x52564348, len=36
29,999,808 >>> mbox cmd response data (8 bytes)
30,000,151 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,030,135 UART: [rt]cmd =0x52564348, len=36
30,032,005 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,025 UART:
192,422 UART: Running Caliptra ROM ...
193,610 UART:
193,766 UART: [state] CFI Enabled
263,861 UART: [state] LifecycleState = Unprovisioned
266,260 UART: [state] DebugLocked = No
267,931 UART: [state] WD Timer not started. Device not locked for debugging
271,757 UART: [kat] SHA2-256
461,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,433 UART: [kat] ++
472,881 UART: [kat] sha1
484,108 UART: [kat] SHA2-256
487,185 UART: [kat] SHA2-384
492,605 UART: [kat] SHA2-512-ACC
495,180 UART: [kat] ECC-384
2,950,653 UART: [kat] HMAC-384Kdf
2,973,221 UART: [kat] LMS
3,504,998 UART: [kat] --
3,509,875 UART: [cold-reset] ++
3,512,232 UART: [fht] FHT @ 0x50003400
3,522,215 UART: [idev] ++
3,522,856 UART: [idev] CDI.KEYID = 6
3,523,887 UART: [idev] SUBJECT.KEYID = 7
3,525,060 UART: [idev] UDS.KEYID = 0
3,526,005 ready_for_fw is high
3,526,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,232 UART: [idev] Erasing UDS.KEYID = 0
6,030,758 UART: [idev] Sha1 KeyId Algorithm
6,051,831 UART: [idev] --
6,056,313 UART: [ldev] ++
6,056,992 UART: [ldev] CDI.KEYID = 6
6,057,969 UART: [ldev] SUBJECT.KEYID = 5
6,059,130 UART: [ldev] AUTHORITY.KEYID = 7
6,060,328 UART: [ldev] FE.KEYID = 1
6,102,043 UART: [ldev] Erasing FE.KEYID = 1
8,608,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,448 UART: [ldev] --
10,415,305 UART: [fwproc] Wait for Commands...
10,417,556 UART: [fwproc] Recv command 0x46574c44
10,419,889 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,098 >>> mbox cmd response: success
14,609,913 UART: [afmc] ++
14,610,666 UART: [afmc] CDI.KEYID = 6
14,611,860 UART: [afmc] SUBJECT.KEYID = 7
14,613,292 UART: [afmc] AUTHORITY.KEYID = 5
17,152,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,147 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,599 UART: [afmc] --
18,947,593 UART: [cold-reset] --
18,950,967 UART: [state] Locking Datavault
18,957,673 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,869 UART: [state] Locking ICCM
18,962,775 UART: [exit] Launching FMC @ 0x40000130
18,971,390 UART:
18,971,642 UART: Running Caliptra FMC ...
18,972,746 UART:
18,972,904 UART: [state] CFI Enabled
19,033,318 UART: [fht] FMC Alias Private Key: 7
20,797,729 UART: [art] Extend RT PCRs Done
20,798,945 UART: [art] Lock RT PCRs Done
20,800,730 UART: [art] Populate DV Done
20,806,192 UART: [fht] FMC Alias Private Key: 7
20,807,726 UART: [art] Derive CDI
20,808,539 UART: [art] Store in in slot 0x4
20,865,807 UART: [art] Derive Key Pair
20,866,846 UART: [art] Store priv key in slot 0x5
23,329,866 UART: [art] Derive Key Pair - Done
23,342,535 UART: [art] Signing Cert with AUTHO
23,343,842 UART: RITY.KEYID = 7
25,065,791 UART: [art] Erasing AUTHORITY.KEYID = 7
25,067,319 UART: [art] PUB.X = 85B88DDCDE424767C696D69B8C24C9A335389CA54A01CB84A0296C1FA49C97ADE270737CB1B620F4EDF003A18377FA3F
25,074,565 UART: [art] PUB.Y = EC1EF00FCE35FDA64426F025CCFD722517FFD9CB91DEC07878CA0F342353C1BDE0BE67F03E216D40BCA0F63A8F14E072
25,081,859 UART: [art] SIG.R = 144EA518D64EA229A19A37EC23F10A92EC0C493F5B416AD94980DEA2A513846CACC98F9E7FF426FE7E756D02E4015071
25,089,254 UART: [art] SIG.S = 323932058BFDA3BBF263F6EBCCF67297506FE41385869EAE3A111A18F0030B2597753BF8D541C8155DD133AC33B3A039
26,068,441 UART: Caliptra RT
26,069,132 UART: [state] CFI Enabled
26,234,011 UART: [rt] RT listening for mailbox commands...
26,235,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,267,008 UART: [rt]cmd =0x44504543, len=96
30,625,645 >>> mbox cmd response data (6236 bytes)
30,654,793 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,685,081 UART: [rt]cmd =0x52564348, len=36
30,687,601 >>> mbox cmd response data (8 bytes)
30,688,039 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,718,061 UART: [rt]cmd =0x52564348, len=36
30,720,094 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,439,082 ready_for_fw is high
3,439,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,920 >>> mbox cmd response: success
19,005,816 UART:
19,006,212 UART: Running Caliptra FMC ...
19,007,369 UART:
19,007,542 UART: [state] CFI Enabled
19,074,841 UART: [fht] FMC Alias Private Key: 7
20,837,707 UART: [art] Extend RT PCRs Done
20,838,949 UART: [art] Lock RT PCRs Done
20,840,687 UART: [art] Populate DV Done
20,846,162 UART: [fht] FMC Alias Private Key: 7
20,847,701 UART: [art] Derive CDI
20,848,462 UART: [art] Store in in slot 0x4
20,907,567 UART: [art] Derive Key Pair
20,908,607 UART: [art] Store priv key in slot 0x5
23,371,726 UART: [art] Derive Key Pair - Done
23,384,409 UART: [art] Signing Cert with AUTHO
23,385,754 UART: RITY.KEYID = 7
25,097,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,281 UART: [art] PUB.X = 06D5DDF205B9BC91B089B633021527E6327B91F8CC1782341C66764869A198183534F3D2481616C2152147CE136E97E2
25,106,482 UART: [art] PUB.Y = E7A067BB63B5B5402C027A8B2526300E88B3A35AE53D4AD5C69D398144688798AB5F4675169D38ECBD8834CA3B992C57
25,113,732 UART: [art] SIG.R = E80E0BD17EA703EA19D04E3BCB5E5B3D2302A13016E74F2EF680D9E56F7FC7AD116D4C6EC3E702FDE99F5A96BEE1329A
25,121,175 UART: [art] SIG.S = 845C0D6E85C8B1DE3C62C591C96157652C544B4C1428904B83011340D81B033563F61F5A2E8214A3EA80F08CC95730C9
26,100,049 UART: Caliptra RT
26,100,789 UART: [state] CFI Enabled
26,264,792 UART: [rt] RT listening for mailbox commands...
26,266,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,297,867 UART: [rt]cmd =0x44504543, len=96
30,657,502 >>> mbox cmd response data (6236 bytes)
30,686,760 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,717,105 UART: [rt]cmd =0x52564348, len=36
30,720,084 >>> mbox cmd response data (8 bytes)
30,720,513 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,750,498 UART: [rt]cmd =0x52564348, len=36
30,752,405 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,417 UART:
192,784 UART: Running Caliptra ROM ...
193,975 UART:
603,440 UART: [state] CFI Enabled
616,966 UART: [state] LifecycleState = Unprovisioned
619,333 UART: [state] DebugLocked = No
620,923 UART: [state] WD Timer not started. Device not locked for debugging
625,725 UART: [kat] SHA2-256
815,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,351 UART: [kat] ++
826,948 UART: [kat] sha1
837,686 UART: [kat] SHA2-256
840,747 UART: [kat] SHA2-384
846,373 UART: [kat] SHA2-512-ACC
848,964 UART: [kat] ECC-384
3,291,753 UART: [kat] HMAC-384Kdf
3,305,476 UART: [kat] LMS
3,837,330 UART: [kat] --
3,842,553 UART: [cold-reset] ++
3,843,557 UART: [fht] FHT @ 0x50003400
3,855,090 UART: [idev] ++
3,855,798 UART: [idev] CDI.KEYID = 6
3,856,672 UART: [idev] SUBJECT.KEYID = 7
3,857,910 UART: [idev] UDS.KEYID = 0
3,858,850 ready_for_fw is high
3,859,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,848 UART: [idev] Erasing UDS.KEYID = 0
6,339,752 UART: [idev] Sha1 KeyId Algorithm
6,362,440 UART: [idev] --
6,368,312 UART: [ldev] ++
6,369,006 UART: [ldev] CDI.KEYID = 6
6,369,916 UART: [ldev] SUBJECT.KEYID = 5
6,371,066 UART: [ldev] AUTHORITY.KEYID = 7
6,372,291 UART: [ldev] FE.KEYID = 1
6,381,848 UART: [ldev] Erasing FE.KEYID = 1
8,859,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,290 UART: [ldev] --
10,649,723 UART: [fwproc] Wait for Commands...
10,651,593 UART: [fwproc] Recv command 0x46574c44
10,653,897 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,846,599 >>> mbox cmd response: success
14,850,707 UART: [afmc] ++
14,851,427 UART: [afmc] CDI.KEYID = 6
14,852,589 UART: [afmc] SUBJECT.KEYID = 7
14,854,072 UART: [afmc] AUTHORITY.KEYID = 5
17,356,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,922 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,942 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,681 UART: [afmc] --
19,154,726 UART: [cold-reset] --
19,157,663 UART: [state] Locking Datavault
19,163,667 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,824 UART: [state] Locking ICCM
19,168,333 UART: [exit] Launching FMC @ 0x40000130
19,177,005 UART:
19,177,237 UART: Running Caliptra FMC ...
19,178,256 UART:
19,178,397 UART: [state] CFI Enabled
19,186,818 UART: [fht] FMC Alias Private Key: 7
20,943,470 UART: [art] Extend RT PCRs Done
20,944,817 UART: [art] Lock RT PCRs Done
20,946,492 UART: [art] Populate DV Done
20,951,901 UART: [fht] FMC Alias Private Key: 7
20,953,542 UART: [art] Derive CDI
20,954,347 UART: [art] Store in in slot 0x4
20,997,146 UART: [art] Derive Key Pair
20,998,139 UART: [art] Store priv key in slot 0x5
23,424,817 UART: [art] Derive Key Pair - Done
23,437,450 UART: [art] Signing Cert with AUTHO
23,438,749 UART: RITY.KEYID = 7
25,144,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,781 UART: [art] PUB.X = 8DE7C23904FD3C773C685F16A460036E6068C01A98412D576DCF568C28E6A5A29B3904E3A1EAF9FA6A20D545B17E8C5E
25,153,064 UART: [art] PUB.Y = 8E16720A2265EB5201F384F86B146B9B3C050C6390BE8F816031D64E5285F916E4FF44C7FE15AE3BAD12246D155DA7CB
25,160,336 UART: [art] SIG.R = 0C8E2B99C808EFA52561D39A72472246C344C356F0C0831BB41FFDA2DBA5D0A5011AAA72D36D4A4E44ECC89F1BECB088
25,167,709 UART: [art] SIG.S = 59D1BDD8EAD44B3639D67C14589439FCE3DA0DD9D04C8E426D14F75AD51FA524420F38C1746EE5C11A1A1C7AEAB9DAFC
26,146,663 UART: Caliptra RT
26,147,370 UART: [state] CFI Enabled
26,265,650 UART: [rt] RT listening for mailbox commands...
26,267,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,298,164 UART: [rt]cmd =0x44504543, len=96
30,581,220 >>> mbox cmd response data (6236 bytes)
30,610,353 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,640,645 UART: [rt]cmd =0x52564348, len=36
30,643,754 >>> mbox cmd response data (8 bytes)
30,644,207 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,674,064 UART: [rt]cmd =0x52564348, len=36
30,675,923 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,760,151 ready_for_fw is high
3,760,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,161 >>> mbox cmd response: success
19,212,979 UART:
19,213,380 UART: Running Caliptra FMC ...
19,214,485 UART:
19,214,630 UART: [state] CFI Enabled
19,222,746 UART: [fht] FMC Alias Private Key: 7
20,980,037 UART: [art] Extend RT PCRs Done
20,981,265 UART: [art] Lock RT PCRs Done
20,983,071 UART: [art] Populate DV Done
20,988,530 UART: [fht] FMC Alias Private Key: 7
20,990,011 UART: [art] Derive CDI
20,990,743 UART: [art] Store in in slot 0x4
21,033,878 UART: [art] Derive Key Pair
21,034,920 UART: [art] Store priv key in slot 0x5
23,462,036 UART: [art] Derive Key Pair - Done
23,475,033 UART: [art] Signing Cert with AUTHO
23,476,361 UART: RITY.KEYID = 7
25,181,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,450 UART: [art] PUB.X = 5BF54A3A84866F55D474FEA518FBEC213152DD38998D12F44F0720EE9280EB7EB20EE64951A7DB8A436F98A3CC888A3C
25,190,763 UART: [art] PUB.Y = 129FE65A77B85AC1C695677187255307CFCCF7F67B8AC161C5572AC00607FD6896EF8B49CA9A94797656163431FC85C3
25,198,009 UART: [art] SIG.R = FDEAD2B99AD64ABEAB2804970B59847975B6540D07C7E17E0BC701F515AAC553F13EA2FC05D5936DDCF63176BF886BDA
25,205,388 UART: [art] SIG.S = F64F6103A569BCAC3A6EC9576BB8401AEE6BE847CC438D5C4D763876749DBE758D23C05B65472CAA64588FE826075794
26,184,893 UART: Caliptra RT
26,185,597 UART: [state] CFI Enabled
26,301,256 UART: [rt] RT listening for mailbox commands...
26,303,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,960 UART: [rt]cmd =0x44504543, len=96
30,615,903 >>> mbox cmd response data (6236 bytes)
30,645,108 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,675,120 UART: [rt]cmd =0x52564348, len=36
30,677,506 >>> mbox cmd response data (8 bytes)
30,677,918 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,708,033 UART: [rt]cmd =0x52564348, len=36
30,709,664 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,727 UART: [kat] SHA2-256
881,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,773 UART: [kat] ++
885,925 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,708 UART: [kat] SHA2-512-ACC
896,609 UART: [kat] ECC-384
901,944 UART: [kat] HMAC-384Kdf
906,624 UART: [kat] LMS
1,474,820 UART: [kat] --
1,475,625 UART: [cold-reset] ++
1,476,031 UART: [fht] Storing FHT @ 0x50003400
1,478,852 UART: [idev] ++
1,479,020 UART: [idev] CDI.KEYID = 6
1,479,380 UART: [idev] SUBJECT.KEYID = 7
1,479,804 UART: [idev] UDS.KEYID = 0
1,480,149 ready_for_fw is high
1,480,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,544 UART: [idev] Erasing UDS.KEYID = 0
1,504,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,732 UART: [idev] --
1,513,843 UART: [ldev] ++
1,514,011 UART: [ldev] CDI.KEYID = 6
1,514,374 UART: [ldev] SUBJECT.KEYID = 5
1,514,800 UART: [ldev] AUTHORITY.KEYID = 7
1,515,263 UART: [ldev] FE.KEYID = 1
1,520,493 UART: [ldev] Erasing FE.KEYID = 1
1,546,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,614 UART: [ldev] --
1,586,095 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 114448 bytes
2,885,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,413 >>> mbox cmd response: success
3,079,491 UART: [afmc] ++
3,079,659 UART: [afmc] CDI.KEYID = 6
3,080,021 UART: [afmc] SUBJECT.KEYID = 7
3,080,446 UART: [afmc] AUTHORITY.KEYID = 5
3,115,331 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,112 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,802 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,845 UART: [afmc] --
3,158,879 UART: [cold-reset] --
3,159,983 UART: [state] Locking Datavault
3,160,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,560 UART: [state] Locking ICCM
3,162,088 UART: [exit] Launching FMC @ 0x40000130
3,167,417 UART:
3,167,433 UART: Running Caliptra FMC ...
3,167,841 UART:
3,167,895 UART: [state] CFI Enabled
3,178,470 UART: [fht] FMC Alias Private Key: 7
3,287,171 UART: [art] Extend RT PCRs Done
3,287,599 UART: [art] Lock RT PCRs Done
3,289,099 UART: [art] Populate DV Done
3,297,290 UART: [fht] FMC Alias Private Key: 7
3,298,316 UART: [art] Derive CDI
3,298,596 UART: [art] Store in in slot 0x4
3,384,027 UART: [art] Derive Key Pair
3,384,387 UART: [art] Store priv key in slot 0x5
3,397,679 UART: [art] Derive Key Pair - Done
3,412,865 UART: [art] Signing Cert with AUTHO
3,413,345 UART: RITY.KEYID = 7
3,428,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,336 UART: [art] PUB.X = 64BF1F2D95E1EE9B949E7063E8A1AACD3B8C5BF6D538587C76F71EB41FB5B58657A832F7BBEF5ED01693F67A4EDD5E51
3,436,126 UART: [art] PUB.Y = 925E05C51E2AE6DDBD299764CA06638EFA85FAF093BB870E68FB873F828CF577147E691A2952CD9C07007E1F74AEF4FA
3,443,054 UART: [art] SIG.R = D8D7B1375A3CD89E6E135A613B1708FC6F49C4B809B7F216E332FB7DFD826D03FAA66F24DB6DD230EC8699AB5D27D62A
3,449,831 UART: [art] SIG.S = 504A12434FC93084ED900B682F70ABEA448B1CD14E62753FD43532813BCFB099833E196FE99A1342D2ECA17D39983134
3,474,159 UART: Caliptra RT
3,474,412 UART: [state] CFI Enabled
3,583,021 UART: [rt] RT listening for mailbox commands...
3,583,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,195 UART: [rt]cmd =0x44504543, len=96
3,793,791 >>> mbox cmd response data (6236 bytes)
3,793,792 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,315 UART: [rt]cmd =0x52564348, len=36
3,825,923 >>> mbox cmd response data (8 bytes)
3,825,924 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,509 UART: [rt]cmd =0x52564348, len=36
3,857,116 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 ready_for_fw is high
1,362,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,063 >>> mbox cmd response: success
2,990,751 UART:
2,990,767 UART: Running Caliptra FMC ...
2,991,175 UART:
2,991,229 UART: [state] CFI Enabled
3,001,720 UART: [fht] FMC Alias Private Key: 7
3,109,489 UART: [art] Extend RT PCRs Done
3,109,917 UART: [art] Lock RT PCRs Done
3,111,221 UART: [art] Populate DV Done
3,119,378 UART: [fht] FMC Alias Private Key: 7
3,120,362 UART: [art] Derive CDI
3,120,642 UART: [art] Store in in slot 0x4
3,206,405 UART: [art] Derive Key Pair
3,206,765 UART: [art] Store priv key in slot 0x5
3,219,687 UART: [art] Derive Key Pair - Done
3,234,744 UART: [art] Signing Cert with AUTHO
3,235,224 UART: RITY.KEYID = 7
3,250,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,303 UART: [art] PUB.X = 3C080A8D5A4D19166E613CBB5AA1FF2457289C5C43DA8EECA735FD660632CB97F0A69FB91028B8052FC86860039DE85E
3,258,066 UART: [art] PUB.Y = 12895AB545DCC2E29C1B64B63BAF0AC74BCE854D01B9933DD267E594B952A955F172D46CB5BEB5FBED28B7EA3862DB71
3,265,028 UART: [art] SIG.R = 5C141241EFD2D43AFAE624E47C67845EE4AB3944FCD422CC9641CE481DAA1A0C8AF103317410B1521F055A4B770B6024
3,271,792 UART: [art] SIG.S = D276BBB89B7076B8F1F9A729C578389AEBBAD0B108AE7E7E31A6510438254E485EAFF28E78FFDB5EFBCBD7E11D6C000E
3,295,754 UART: Caliptra RT
3,296,007 UART: [state] CFI Enabled
3,405,098 UART: [rt] RT listening for mailbox commands...
3,405,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,250 UART: [rt]cmd =0x44504543, len=96
3,616,166 >>> mbox cmd response data (6236 bytes)
3,616,167 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,722 UART: [rt]cmd =0x52564348, len=36
3,647,732 >>> mbox cmd response data (8 bytes)
3,647,733 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,096 UART: [rt]cmd =0x52564348, len=36
3,678,525 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,433 UART: [kat] SHA2-512-ACC
897,334 UART: [kat] ECC-384
902,955 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,054 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,735 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,220 UART: [ldev] ++
1,515,388 UART: [ldev] CDI.KEYID = 6
1,515,751 UART: [ldev] SUBJECT.KEYID = 5
1,516,177 UART: [ldev] AUTHORITY.KEYID = 7
1,516,640 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,546,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,457 UART: [ldev] --
1,585,892 UART: [fwproc] Waiting for Commands...
1,586,583 UART: [fwproc] Received command 0x46574c44
1,587,374 UART: [fwproc] Received Image of size 114448 bytes
2,885,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,475 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,827 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,942 >>> mbox cmd response: success
3,080,156 UART: [afmc] ++
3,080,324 UART: [afmc] CDI.KEYID = 6
3,080,686 UART: [afmc] SUBJECT.KEYID = 7
3,081,111 UART: [afmc] AUTHORITY.KEYID = 5
3,115,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,423 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,113 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,974 UART: [afmc] --
3,158,964 UART: [cold-reset] --
3,159,740 UART: [state] Locking Datavault
3,160,907 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,511 UART: [state] Locking ICCM
3,162,139 UART: [exit] Launching FMC @ 0x40000130
3,167,468 UART:
3,167,484 UART: Running Caliptra FMC ...
3,167,892 UART:
3,168,035 UART: [state] CFI Enabled
3,178,686 UART: [fht] FMC Alias Private Key: 7
3,286,477 UART: [art] Extend RT PCRs Done
3,286,905 UART: [art] Lock RT PCRs Done
3,288,505 UART: [art] Populate DV Done
3,296,700 UART: [fht] FMC Alias Private Key: 7
3,297,800 UART: [art] Derive CDI
3,298,080 UART: [art] Store in in slot 0x4
3,383,345 UART: [art] Derive Key Pair
3,383,705 UART: [art] Store priv key in slot 0x5
3,397,253 UART: [art] Derive Key Pair - Done
3,411,796 UART: [art] Signing Cert with AUTHO
3,412,276 UART: RITY.KEYID = 7
3,427,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,337 UART: [art] PUB.X = B49C9E518AB1114550EB03F5F194121E348D1F560606F90A1078CF2713E4F9DBC2BF9FE8D824CA7E432FED566208644B
3,435,096 UART: [art] PUB.Y = 100DE76B8B41FF41F699E6030C4AB553BC122FBA5399ABB7F870924491E29F533873E224684E9CF44F2A6B8303F98B0F
3,442,033 UART: [art] SIG.R = EB1A77C88DB81B8D86E7DE1A2C564E520D0784771210C59F60D35FB2E1A95F4CE56EC813B8AD8297804EC092A757D870
3,448,803 UART: [art] SIG.S = D0F81FA91ACDDB4AC4C16FFE8EE9797D64FBA6B9C384FA213F683A8B8E749D7DC0AC86BEF4BDA3208B82EACC27936118
3,473,364 UART: Caliptra RT
3,473,709 UART: [state] CFI Enabled
3,582,615 UART: [rt] RT listening for mailbox commands...
3,583,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,581 UART: [rt]cmd =0x44504543, len=96
3,794,858 >>> mbox cmd response data (6236 bytes)
3,794,859 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,514 UART: [rt]cmd =0x52564348, len=36
3,826,756 >>> mbox cmd response data (8 bytes)
3,826,757 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,364 UART: [rt]cmd =0x52564348, len=36
3,857,691 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,996 >>> mbox cmd response: success
2,990,606 UART:
2,990,622 UART: Running Caliptra FMC ...
2,991,030 UART:
2,991,173 UART: [state] CFI Enabled
3,002,018 UART: [fht] FMC Alias Private Key: 7
3,109,339 UART: [art] Extend RT PCRs Done
3,109,767 UART: [art] Lock RT PCRs Done
3,111,369 UART: [art] Populate DV Done
3,119,370 UART: [fht] FMC Alias Private Key: 7
3,120,304 UART: [art] Derive CDI
3,120,584 UART: [art] Store in in slot 0x4
3,205,961 UART: [art] Derive Key Pair
3,206,321 UART: [art] Store priv key in slot 0x5
3,219,443 UART: [art] Derive Key Pair - Done
3,234,492 UART: [art] Signing Cert with AUTHO
3,234,972 UART: RITY.KEYID = 7
3,250,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,021 UART: [art] PUB.X = 9AA9C688F96335AAC8D5B5B665A05EC188F3AAC4C8629714E207F0FCF95786C3122C46165DE9F071DB8DC6B425DE224E
3,257,798 UART: [art] PUB.Y = F76BB02023D2BB7ECF48CABDB4DA6B3861A2EC97A910A0C71F68531EFAE9F8A73CA818A92D83BDBACC071C44814E1605
3,264,764 UART: [art] SIG.R = 720A913CB444A1531EB59FB36958940002870EBE4F4FAF280E28101611D06D03BC611B5AFB227C783BAEB61AD09539B3
3,271,499 UART: [art] SIG.S = E94E08E876F92798F89B8A052D7CF0142417290FE18B68F44BC10E77EF08202292C2D8D33894B0E7FD369E9C607806DF
3,295,374 UART: Caliptra RT
3,295,719 UART: [state] CFI Enabled
3,403,194 UART: [rt] RT listening for mailbox commands...
3,403,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,602 UART: [rt]cmd =0x44504543, len=96
3,615,111 >>> mbox cmd response data (6236 bytes)
3,615,112 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,765 UART: [rt]cmd =0x52564348, len=36
3,646,945 >>> mbox cmd response data (8 bytes)
3,646,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,435 UART: [rt]cmd =0x52564348, len=36
3,677,828 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,142 UART: [kat] SHA2-256
893,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,917 UART: [kat] ++
898,069 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,998 UART: [kat] SHA2-512-ACC
908,899 UART: [kat] ECC-384
918,552 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 ready_for_fw is high
1,176,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,974 UART: [idev] Erasing UDS.KEYID = 0
1,201,403 UART: [idev] Sha1 KeyId Algorithm
1,209,655 UART: [idev] --
1,210,715 UART: [ldev] ++
1,210,883 UART: [ldev] CDI.KEYID = 6
1,211,246 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,155 UART: [ldev] Erasing FE.KEYID = 1
1,243,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,875 UART: [ldev] --
1,283,292 UART: [fwproc] Wait for Commands...
1,284,050 UART: [fwproc] Recv command 0x46574c44
1,284,778 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,780 >>> mbox cmd response: success
2,777,976 UART: [afmc] ++
2,778,144 UART: [afmc] CDI.KEYID = 6
2,778,506 UART: [afmc] SUBJECT.KEYID = 7
2,778,931 UART: [afmc] AUTHORITY.KEYID = 5
2,813,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,001 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,785 UART: [afmc] --
2,856,671 UART: [cold-reset] --
2,857,547 UART: [state] Locking Datavault
2,858,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,076 UART: [state] Locking ICCM
2,859,572 UART: [exit] Launching FMC @ 0x40000130
2,864,901 UART:
2,864,917 UART: Running Caliptra FMC ...
2,865,325 UART:
2,865,379 UART: [state] CFI Enabled
2,875,576 UART: [fht] FMC Alias Private Key: 7
2,983,319 UART: [art] Extend RT PCRs Done
2,983,747 UART: [art] Lock RT PCRs Done
2,985,551 UART: [art] Populate DV Done
2,994,150 UART: [fht] FMC Alias Private Key: 7
2,995,154 UART: [art] Derive CDI
2,995,434 UART: [art] Store in in slot 0x4
3,081,331 UART: [art] Derive Key Pair
3,081,691 UART: [art] Store priv key in slot 0x5
3,095,081 UART: [art] Derive Key Pair - Done
3,109,501 UART: [art] Signing Cert with AUTHO
3,109,981 UART: RITY.KEYID = 7
3,125,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,768 UART: [art] PUB.X = AC3F9EBB7FAB4C349ECC9F2D05A9A6E7DF68D1DD30F4A00EB5E256490651C4F6BF762EFD26BD95B186297D760EBC5820
3,132,548 UART: [art] PUB.Y = 08D491C2AA4CC9738608FC178C469A23E239509545B3D46315141E06E7352861DB1ECAC191E6E1E8605B824E4498DA16
3,139,483 UART: [art] SIG.R = 2CA64A3D46A6AC35D93E006060DDC1B91FEB9EB6A676543D1125672C90F5ABDAB30020E9D61DCEDF37761D643B21E731
3,146,221 UART: [art] SIG.S = F9A3EBB651B2872D71FECA535A1B55BBF42DCF2EE1515B96905AD08A76C94B2E510A95D42810A02451C1BF07CC9E2257
3,169,978 UART: Caliptra RT
3,170,231 UART: [state] CFI Enabled
3,276,702 UART: [rt] RT listening for mailbox commands...
3,277,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,708 UART: [rt]cmd =0x44504543, len=96
3,486,954 >>> mbox cmd response data (6236 bytes)
3,486,955 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,454 UART: [rt]cmd =0x52564348, len=36
3,518,564 >>> mbox cmd response data (8 bytes)
3,518,565 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,208 UART: [rt]cmd =0x52564348, len=36
3,549,443 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 ready_for_fw is high
1,059,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,413 >>> mbox cmd response: success
2,688,811 UART:
2,688,827 UART: Running Caliptra FMC ...
2,689,235 UART:
2,689,289 UART: [state] CFI Enabled
2,699,188 UART: [fht] FMC Alias Private Key: 7
2,807,393 UART: [art] Extend RT PCRs Done
2,807,821 UART: [art] Lock RT PCRs Done
2,809,587 UART: [art] Populate DV Done
2,817,592 UART: [fht] FMC Alias Private Key: 7
2,818,570 UART: [art] Derive CDI
2,818,850 UART: [art] Store in in slot 0x4
2,904,023 UART: [art] Derive Key Pair
2,904,383 UART: [art] Store priv key in slot 0x5
2,917,767 UART: [art] Derive Key Pair - Done
2,932,484 UART: [art] Signing Cert with AUTHO
2,932,964 UART: RITY.KEYID = 7
2,948,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,815 UART: [art] PUB.X = C1B91FC1939C476450FBD705ECE5F8DEF0E4B99A6E9248A044C5B8E7EF74DE3D024A376C1ED36D40B323EBB7A6FC60FE
2,955,601 UART: [art] PUB.Y = 4F6D8F89A87C504BB627C6D11EFB6A3AC970389B1022ABEF06215F91673B3A10D399F08A52B9143D1355CF26B49794DA
2,962,552 UART: [art] SIG.R = 9C527D85614CF7B03BB0AFAA7CFEAB8BBA22CAED145BE2A8F217DB6E2DEBB783CCC02354A4A7C394091B68B2AA4D2FEB
2,969,353 UART: [art] SIG.S = F22FB9973417C99C683858A54D655CD85C2A568BA0A4371EBB453BB1CFE9A3D0C7A95005B96890CD13C23ADD90A81CE2
2,992,773 UART: Caliptra RT
2,993,026 UART: [state] CFI Enabled
3,101,312 UART: [rt] RT listening for mailbox commands...
3,101,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,714 UART: [rt]cmd =0x44504543, len=96
3,314,230 >>> mbox cmd response data (6236 bytes)
3,314,231 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,070 UART: [rt]cmd =0x52564348, len=36
3,345,904 >>> mbox cmd response data (8 bytes)
3,345,905 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,524 UART: [rt]cmd =0x52564348, len=36
3,376,839 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,601 UART: [kat] SHA2-512-ACC
908,502 UART: [kat] ECC-384
918,217 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,172,100 UART: [cold-reset] ++
1,172,526 UART: [fht] FHT @ 0x50003400
1,174,967 UART: [idev] ++
1,175,135 UART: [idev] CDI.KEYID = 6
1,175,495 UART: [idev] SUBJECT.KEYID = 7
1,175,919 UART: [idev] UDS.KEYID = 0
1,176,264 ready_for_fw is high
1,176,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,200,724 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,086 UART: [ldev] ++
1,210,254 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,043 UART: [ldev] AUTHORITY.KEYID = 7
1,211,506 UART: [ldev] FE.KEYID = 1
1,216,692 UART: [ldev] Erasing FE.KEYID = 1
1,243,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,662 UART: [ldev] --
1,282,963 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,795 >>> mbox cmd response: success
2,776,811 UART: [afmc] ++
2,776,979 UART: [afmc] CDI.KEYID = 6
2,777,341 UART: [afmc] SUBJECT.KEYID = 7
2,777,766 UART: [afmc] AUTHORITY.KEYID = 5
2,813,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,358 UART: [afmc] --
2,857,360 UART: [cold-reset] --
2,858,394 UART: [state] Locking Datavault
2,859,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,185 UART: [state] Locking ICCM
2,860,665 UART: [exit] Launching FMC @ 0x40000130
2,865,994 UART:
2,866,010 UART: Running Caliptra FMC ...
2,866,418 UART:
2,866,561 UART: [state] CFI Enabled
2,877,102 UART: [fht] FMC Alias Private Key: 7
2,985,741 UART: [art] Extend RT PCRs Done
2,986,169 UART: [art] Lock RT PCRs Done
2,987,557 UART: [art] Populate DV Done
2,995,704 UART: [fht] FMC Alias Private Key: 7
2,996,706 UART: [art] Derive CDI
2,996,986 UART: [art] Store in in slot 0x4
3,082,815 UART: [art] Derive Key Pair
3,083,175 UART: [art] Store priv key in slot 0x5
3,096,537 UART: [art] Derive Key Pair - Done
3,111,237 UART: [art] Signing Cert with AUTHO
3,111,717 UART: RITY.KEYID = 7
3,127,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,890 UART: [art] PUB.X = C766AD3F0A972D2CEBDA3F754AE3E4D0D0E7D90D9359BCFECA4C0909541BB018858162DFA43F2AB9B0307B5375B9EF8F
3,134,668 UART: [art] PUB.Y = 9E46E90FE29B6153FBD119677C8C31631E47F4EEB2B6D6B95BF3F213CD80C03D5678A90FDBDB4467956C24CC23C1C163
3,141,622 UART: [art] SIG.R = AAD4990B97AE4E76F8D7A90EF115C587BE064EDC81B872EACA85E68A8746D9BA5379B3ACBF64C673CAA38F058974B2AF
3,148,400 UART: [art] SIG.S = 2EB5B9F20DCE55D1D75BFB5C8B9608B0672812BC18BEFA934EA592515EE2372BA68E237FBEBBAD5AAECD2BDBA85C5E0A
3,171,662 UART: Caliptra RT
3,172,007 UART: [state] CFI Enabled
3,279,764 UART: [rt] RT listening for mailbox commands...
3,280,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,988 UART: [rt]cmd =0x44504543, len=96
3,491,070 >>> mbox cmd response data (6236 bytes)
3,491,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,698 UART: [rt]cmd =0x52564348, len=36
3,522,910 >>> mbox cmd response data (8 bytes)
3,522,911 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,422 UART: [rt]cmd =0x52564348, len=36
3,554,149 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,314 ready_for_fw is high
1,060,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,170 >>> mbox cmd response: success
2,689,322 UART:
2,689,338 UART: Running Caliptra FMC ...
2,689,746 UART:
2,689,889 UART: [state] CFI Enabled
2,700,446 UART: [fht] FMC Alias Private Key: 7
2,808,083 UART: [art] Extend RT PCRs Done
2,808,511 UART: [art] Lock RT PCRs Done
2,809,941 UART: [art] Populate DV Done
2,818,348 UART: [fht] FMC Alias Private Key: 7
2,819,320 UART: [art] Derive CDI
2,819,600 UART: [art] Store in in slot 0x4
2,905,769 UART: [art] Derive Key Pair
2,906,129 UART: [art] Store priv key in slot 0x5
2,919,683 UART: [art] Derive Key Pair - Done
2,934,418 UART: [art] Signing Cert with AUTHO
2,934,898 UART: RITY.KEYID = 7
2,950,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,205 UART: [art] PUB.X = 3FD1F12C170D20DA3CCB1674AD03A8C6E7510879E4E8D8689922ABDB569F093C312787713788616AFB885F9C1887981C
2,957,961 UART: [art] PUB.Y = 35A30071829888D28A8D45DB65259E830A3F0262068030386F8E0C3AC6E482516AA8C78DE8A46EE49D8F34DE037B5456
2,964,868 UART: [art] SIG.R = A483777751A10430B296731BE5CBB2B32B00BAF2C50D6026FA3D586740E93253809C5902CC78F7D24CC014720C045FEE
2,971,599 UART: [art] SIG.S = BA85D8C6666FF48CE6C966A43CF05E6E27B78E790247D9F26B8B1C45EA3C61A0EDF14F695AE4A1FCFE78AA81C8CB93C0
2,994,987 UART: Caliptra RT
2,995,332 UART: [state] CFI Enabled
3,102,250 UART: [rt] RT listening for mailbox commands...
3,102,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,274 UART: [rt]cmd =0x44504543, len=96
3,314,125 >>> mbox cmd response data (6236 bytes)
3,314,126 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,619 UART: [rt]cmd =0x52564348, len=36
3,345,803 >>> mbox cmd response data (8 bytes)
3,345,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,277 UART: [rt]cmd =0x52564348, len=36
3,376,644 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,174,507 ready_for_fw is high
1,174,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,199,931 UART: [idev] Sha1 KeyId Algorithm
1,208,809 UART: [idev] --
1,209,684 UART: [ldev] ++
1,209,852 UART: [ldev] CDI.KEYID = 6
1,210,216 UART: [ldev] SUBJECT.KEYID = 5
1,210,643 UART: [ldev] AUTHORITY.KEYID = 7
1,211,106 UART: [ldev] FE.KEYID = 1
1,216,470 UART: [ldev] Erasing FE.KEYID = 1
1,242,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,872 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,065 UART: [fwproc] Recv command 0x46574c44
1,283,798 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,464 >>> mbox cmd response: success
2,774,569 UART: [afmc] ++
2,774,737 UART: [afmc] CDI.KEYID = 6
2,775,100 UART: [afmc] SUBJECT.KEYID = 7
2,775,526 UART: [afmc] AUTHORITY.KEYID = 5
2,811,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,567 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,170 UART: [afmc] --
2,854,158 UART: [cold-reset] --
2,855,046 UART: [state] Locking Datavault
2,856,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,863 UART: [state] Locking ICCM
2,857,449 UART: [exit] Launching FMC @ 0x40000130
2,862,778 UART:
2,862,794 UART: Running Caliptra FMC ...
2,863,202 UART:
2,863,256 UART: [state] CFI Enabled
2,873,653 UART: [fht] FMC Alias Private Key: 7
2,981,500 UART: [art] Extend RT PCRs Done
2,981,928 UART: [art] Lock RT PCRs Done
2,983,654 UART: [art] Populate DV Done
2,991,847 UART: [fht] FMC Alias Private Key: 7
2,992,843 UART: [art] Derive CDI
2,993,123 UART: [art] Store in in slot 0x4
3,078,866 UART: [art] Derive Key Pair
3,079,226 UART: [art] Store priv key in slot 0x5
3,092,664 UART: [art] Derive Key Pair - Done
3,107,484 UART: [art] Signing Cert with AUTHO
3,107,964 UART: RITY.KEYID = 7
3,123,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,051 UART: [art] PUB.X = 1DC3167346C321D628A0E4E068EE5EC56C2C800D3EEF093BAFFAB5A16D701B8D321E70C21A84C5DD06DAD68F4E8EF52F
3,130,832 UART: [art] PUB.Y = 7E47E132528B5C6E0FF0933DB714221CD5676B60EBC47A65883F7520C64C821BCD49308B44E4385535CC29205713D030
3,137,771 UART: [art] SIG.R = 9BA0731DDC7E8E019FE2859C46FB0ADBA45C938EB19BC82657194C4552DEE831D398C50AFAD3A01896285914F5F60C82
3,144,537 UART: [art] SIG.S = CCAE0DBBDC798214E99CB3677B78FCE33FC57F08F570F4B75AB604599D17A9B1CA49CCC89280DED0E270A37D0136C43B
3,168,042 UART: Caliptra RT
3,168,295 UART: [state] CFI Enabled
3,275,321 UART: [rt] RT listening for mailbox commands...
3,275,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,191 UART: [rt]cmd =0x44504543, len=96
3,486,296 >>> mbox cmd response data (6236 bytes)
3,486,297 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,924 UART: [rt]cmd =0x52564348, len=36
3,517,878 >>> mbox cmd response data (8 bytes)
3,517,879 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,294 UART: [rt]cmd =0x52564348, len=36
3,548,387 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,846 ready_for_fw is high
1,056,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,478 >>> mbox cmd response: success
2,687,392 UART:
2,687,408 UART: Running Caliptra FMC ...
2,687,816 UART:
2,687,870 UART: [state] CFI Enabled
2,698,387 UART: [fht] FMC Alias Private Key: 7
2,806,428 UART: [art] Extend RT PCRs Done
2,806,856 UART: [art] Lock RT PCRs Done
2,808,430 UART: [art] Populate DV Done
2,816,673 UART: [fht] FMC Alias Private Key: 7
2,817,831 UART: [art] Derive CDI
2,818,111 UART: [art] Store in in slot 0x4
2,904,102 UART: [art] Derive Key Pair
2,904,462 UART: [art] Store priv key in slot 0x5
2,917,904 UART: [art] Derive Key Pair - Done
2,932,804 UART: [art] Signing Cert with AUTHO
2,933,284 UART: RITY.KEYID = 7
2,948,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,573 UART: [art] PUB.X = 792C1BEA015437674EC6AE75474AD1CE2AD86240E70CDB5A44A3C636E27ABFB495FF69361A809A3006AE603A68B85621
2,956,340 UART: [art] PUB.Y = 858DCBCB03636B7FF1E085F439024439F345F06CCE4D35DDDC8C70E61FD6457A9C0414DA57C46AE5CCD64D71132FC082
2,963,293 UART: [art] SIG.R = D07047ED0127C2B0C5C9309DECF5B1DEAC1C80BA2DE21B95EF9DF8569563965FE26175A5C6204CFF8C50A7B2C57C212E
2,970,076 UART: [art] SIG.S = 7E67CC9EA9249064AC16EEE3F7BFDE1DD3CB54A2090E60E7BD6F677609D5F29ADB4B691947DF20322D19BC573F6B77A7
2,993,522 UART: Caliptra RT
2,993,775 UART: [state] CFI Enabled
3,101,276 UART: [rt] RT listening for mailbox commands...
3,101,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,024 UART: [rt]cmd =0x44504543, len=96
3,312,436 >>> mbox cmd response data (6236 bytes)
3,312,437 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,108 UART: [rt]cmd =0x52564348, len=36
3,344,110 >>> mbox cmd response data (8 bytes)
3,344,111 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,486 UART: [rt]cmd =0x52564348, len=36
3,374,863 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,174,524 ready_for_fw is high
1,174,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,123 >>> mbox cmd response: success
2,775,188 UART: [afmc] ++
2,775,356 UART: [afmc] CDI.KEYID = 6
2,775,719 UART: [afmc] SUBJECT.KEYID = 7
2,776,145 UART: [afmc] AUTHORITY.KEYID = 5
2,811,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,172 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,979 UART: [afmc] --
2,854,953 UART: [cold-reset] --
2,855,883 UART: [state] Locking Datavault
2,857,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,724 UART: [state] Locking ICCM
2,858,200 UART: [exit] Launching FMC @ 0x40000130
2,863,529 UART:
2,863,545 UART: Running Caliptra FMC ...
2,863,953 UART:
2,864,096 UART: [state] CFI Enabled
2,874,675 UART: [fht] FMC Alias Private Key: 7
2,983,542 UART: [art] Extend RT PCRs Done
2,983,970 UART: [art] Lock RT PCRs Done
2,985,842 UART: [art] Populate DV Done
2,994,293 UART: [fht] FMC Alias Private Key: 7
2,995,245 UART: [art] Derive CDI
2,995,525 UART: [art] Store in in slot 0x4
3,081,330 UART: [art] Derive Key Pair
3,081,690 UART: [art] Store priv key in slot 0x5
3,094,702 UART: [art] Derive Key Pair - Done
3,109,822 UART: [art] Signing Cert with AUTHO
3,110,302 UART: RITY.KEYID = 7
3,124,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,721 UART: [art] PUB.X = A46AC730F47BDC809C01CB0C7039C510433087F98D35EBEA99D6AE2A71D28E0F3D233C8AD311ACA282F69108250C501B
3,132,484 UART: [art] PUB.Y = 974A3F9C60C9801D4CD4A456EEDB136547B1CC54709F14A8514F038457677889D9EF95A852F3A63A5346A5641EB556AD
3,139,429 UART: [art] SIG.R = 30678C0C20E00E97AF93AAB7382210AA4EDBEACC3525A7C1497A2D0985CB2633DCC497E14F8C9F05C2E8557075409CD9
3,146,195 UART: [art] SIG.S = 06760B7E0BCE967AF603452C7410E4C28D02159FBC402177655F371FA8C84FD5E7AC4B529F59FCCC97A593803BB0B559
3,169,981 UART: Caliptra RT
3,170,326 UART: [state] CFI Enabled
3,278,461 UART: [rt] RT listening for mailbox commands...
3,279,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,411 UART: [rt]cmd =0x44504543, len=96
3,488,845 >>> mbox cmd response data (6236 bytes)
3,488,846 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,479 UART: [rt]cmd =0x52564348, len=36
3,521,107 >>> mbox cmd response data (8 bytes)
3,521,108 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,659 UART: [rt]cmd =0x52564348, len=36
3,551,844 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,021 ready_for_fw is high
1,056,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,111 >>> mbox cmd response: success
2,685,861 UART:
2,685,877 UART: Running Caliptra FMC ...
2,686,285 UART:
2,686,428 UART: [state] CFI Enabled
2,697,277 UART: [fht] FMC Alias Private Key: 7
2,805,058 UART: [art] Extend RT PCRs Done
2,805,486 UART: [art] Lock RT PCRs Done
2,806,816 UART: [art] Populate DV Done
2,815,253 UART: [fht] FMC Alias Private Key: 7
2,816,327 UART: [art] Derive CDI
2,816,607 UART: [art] Store in in slot 0x4
2,902,210 UART: [art] Derive Key Pair
2,902,570 UART: [art] Store priv key in slot 0x5
2,916,176 UART: [art] Derive Key Pair - Done
2,930,823 UART: [art] Signing Cert with AUTHO
2,931,303 UART: RITY.KEYID = 7
2,946,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,310 UART: [art] PUB.X = 71349DE85DE71C32BA8C4CE46D885EAA5C9312C703D4B5D9EFF89DC23506240C0C88955FFD460BE53D6E4894F0459828
2,954,071 UART: [art] PUB.Y = A0FF57CE253AE286B13ABF51BFFB543BBB4A2A393E20FEBDAA338FE6D88744A8974E1518D3AB9F596BC42211E143A98D
2,961,041 UART: [art] SIG.R = 8FB6308B6B7E651417FB0997165B78847CC5E215DB5666ADA31339C5E202D709DBD2A2E30C3CB05666AEA9487224A4CF
2,967,803 UART: [art] SIG.S = D53DF6895C6E6648B3F96857A2F5EC16B5B780795B850CED2E3803C6F8A35EDF1AA73CA0DE31619B01049095546B9A6C
2,992,128 UART: Caliptra RT
2,992,473 UART: [state] CFI Enabled
3,100,073 UART: [rt] RT listening for mailbox commands...
3,100,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,199 UART: [rt]cmd =0x44504543, len=96
3,312,407 >>> mbox cmd response data (6236 bytes)
3,312,408 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,851 UART: [rt]cmd =0x52564348, len=36
3,344,071 >>> mbox cmd response data (8 bytes)
3,344,072 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,591 UART: [rt]cmd =0x52564348, len=36
3,374,846 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,193 UART:
192,546 UART: Running Caliptra ROM ...
193,727 UART:
193,883 UART: [state] CFI Enabled
264,622 UART: [state] LifecycleState = Unprovisioned
266,618 UART: [state] DebugLocked = No
269,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,726 UART: [kat] SHA2-256
444,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,960 UART: [kat] ++
455,407 UART: [kat] sha1
467,064 UART: [kat] SHA2-256
469,786 UART: [kat] SHA2-384
476,625 UART: [kat] SHA2-512-ACC
479,030 UART: [kat] ECC-384
2,769,669 UART: [kat] HMAC-384Kdf
2,801,097 UART: [kat] LMS
3,991,385 UART: [kat] --
3,996,713 UART: [cold-reset] ++
3,999,228 UART: [fht] Storing FHT @ 0x50003400
4,009,858 UART: [idev] ++
4,010,432 UART: [idev] CDI.KEYID = 6
4,011,365 UART: [idev] SUBJECT.KEYID = 7
4,012,614 UART: [idev] UDS.KEYID = 0
4,013,696 ready_for_fw is high
4,013,906 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,514 UART: [idev] Erasing UDS.KEYID = 0
7,347,313 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,002 UART: [idev] --
7,371,804 UART: [ldev] ++
7,372,407 UART: [ldev] CDI.KEYID = 6
7,373,292 UART: [ldev] SUBJECT.KEYID = 5
7,374,478 UART: [ldev] AUTHORITY.KEYID = 7
7,375,812 UART: [ldev] FE.KEYID = 1
7,421,756 UART: [ldev] Erasing FE.KEYID = 1
10,755,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,327 UART: [ldev] --
13,135,619 UART: [fwproc] Waiting for Commands...
13,138,795 UART: [fwproc] Received command 0x46574c44
13,140,980 UART: [fwproc] Received Image of size 114124 bytes
17,188,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,972 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,656,572 >>> mbox cmd response: success
17,661,322 UART: [afmc] ++
17,661,949 UART: [afmc] CDI.KEYID = 6
17,662,865 UART: [afmc] SUBJECT.KEYID = 7
17,664,087 UART: [afmc] AUTHORITY.KEYID = 5
21,023,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,969 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,358 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,231 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,669 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,132 UART: [afmc] --
23,398,802 UART: [cold-reset] --
23,402,011 UART: [state] Locking Datavault
23,406,664 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,437 UART: [state] Locking ICCM
23,410,562 UART: [exit] Launching FMC @ 0x40000130
23,418,954 UART:
23,419,193 UART: Running Caliptra FMC ...
23,420,219 UART:
23,420,363 UART: [state] CFI Enabled
23,486,169 UART: [fht] FMC Alias Private Key: 7
25,823,708 UART: [art] Extend RT PCRs Done
25,824,924 UART: [art] Lock RT PCRs Done
25,826,684 UART: [art] Populate DV Done
25,832,364 UART: [fht] FMC Alias Private Key: 7
25,833,884 UART: [art] Derive CDI
25,834,625 UART: [art] Store in in slot 0x4
25,894,582 UART: [art] Derive Key Pair
25,895,582 UART: [art] Store priv key in slot 0x5
29,188,977 UART: [art] Derive Key Pair - Done
29,201,916 UART: [art] Signing Cert with AUTHO
29,203,247 UART: RITY.KEYID = 7
31,490,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,664 UART: [art] PUB.X = 4955C5FF67889A1C85FF9309787C62BF2C0E6FE84E170B86EDFC80AF66D313F0CD813D1589AFFAA63B02DB6AA691FD8E
31,498,977 UART: [art] PUB.Y = D47652558F787FB0131EA9B5443C0C99A48DD867EFF42A347A674B7310FFC993F0F567F47C25329FE00FE4ABB153B257
31,506,213 UART: [art] SIG.R = 1FF0F06FFAAC9CB6A8635135FC76540EDCB16FEE91B15450A3125311B859D8C38B5F7AE9988C6C8AB7A1E1E92E4E16DA
31,513,615 UART: [art] SIG.S = 539975ED94B32A0725BBE79CA993C993A8BAF9F2191E6710A6B211DFFE686B2F77BD11CBFAC0A02BB9A65DC41520FE54
32,819,363 UART: Caliptra RT
32,820,080 UART: [state] CFI Enabled
33,000,604 UART: [rt] RT listening for mailbox commands...
33,002,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,033,039 UART: [rt]cmd =0x44504543, len=96
38,796,300 >>> mbox cmd response data (6236 bytes)
38,825,384 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,855,652 UART: [rt]cmd =0x52564348, len=36
38,858,136 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,782,920 ready_for_fw is high
3,783,526 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,844,516 >>> mbox cmd response: success
23,547,605 UART:
23,547,998 UART: Running Caliptra FMC ...
23,549,114 UART:
23,549,264 UART: [state] CFI Enabled
23,613,439 UART: [fht] FMC Alias Private Key: 7
25,951,233 UART: [art] Extend RT PCRs Done
25,952,465 UART: [art] Lock RT PCRs Done
25,953,987 UART: [art] Populate DV Done
25,959,518 UART: [fht] FMC Alias Private Key: 7
25,961,116 UART: [art] Derive CDI
25,961,931 UART: [art] Store in in slot 0x4
26,021,318 UART: [art] Derive Key Pair
26,022,385 UART: [art] Store priv key in slot 0x5
29,314,946 UART: [art] Derive Key Pair - Done
29,328,106 UART: [art] Signing Cert with AUTHO
29,329,414 UART: RITY.KEYID = 7
31,616,143 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,644 UART: [art] PUB.X = A0FFF5AD418DF0D45CBF83FA4320F7CD214EB0D18D214898CC688A8033869B188272E86E26677709B53ED0B690748799
31,624,887 UART: [art] PUB.Y = C1244976CA9A7A694B7BE3908FB7B252BDF93576775D5D6E36EE7D9B21F194A043248FF7EAA408AE18BC1DB2F5C36769
31,632,126 UART: [art] SIG.R = 41CB9AC4134F7EFD85C4D6200E10BDD451A42A67A576E1337940384489F7E188E14E7D7E6A3D2F78D5944E1E3B4D4997
31,639,466 UART: [art] SIG.S = 45AC885D969981F1515B6D2D6DA9764953011F2A4175CB2C4C16323B716A6C1AD450C9E0D122C031CB381FD3AF779871
32,944,934 UART: Caliptra RT
32,945,650 UART: [state] CFI Enabled
33,104,803 UART: [rt] RT listening for mailbox commands...
33,106,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,137,414 UART: [rt]cmd =0x44504543, len=96
38,902,265 >>> mbox cmd response data (6236 bytes)
38,931,342 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,961,633 UART: [rt]cmd =0x52564348, len=36
38,964,175 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,596 UART:
192,967 UART: Running Caliptra ROM ...
194,164 UART:
603,731 UART: [state] CFI Enabled
617,958 UART: [state] LifecycleState = Unprovisioned
619,826 UART: [state] DebugLocked = No
622,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,559 UART: [kat] SHA2-256
797,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,853 UART: [kat] ++
808,334 UART: [kat] sha1
819,439 UART: [kat] SHA2-256
822,144 UART: [kat] SHA2-384
828,281 UART: [kat] SHA2-512-ACC
830,655 UART: [kat] ECC-384
3,114,509 UART: [kat] HMAC-384Kdf
3,127,174 UART: [kat] LMS
4,317,305 UART: [kat] --
4,319,418 UART: [cold-reset] ++
4,320,430 UART: [fht] Storing FHT @ 0x50003400
4,331,998 UART: [idev] ++
4,332,602 UART: [idev] CDI.KEYID = 6
4,333,511 UART: [idev] SUBJECT.KEYID = 7
4,334,756 UART: [idev] UDS.KEYID = 0
4,335,793 ready_for_fw is high
4,335,991 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,154 UART: [idev] Erasing UDS.KEYID = 0
7,619,377 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,496 UART: [idev] --
7,645,271 UART: [ldev] ++
7,645,832 UART: [ldev] CDI.KEYID = 6
7,646,791 UART: [ldev] SUBJECT.KEYID = 5
7,647,993 UART: [ldev] AUTHORITY.KEYID = 7
7,649,271 UART: [ldev] FE.KEYID = 1
7,661,742 UART: [ldev] Erasing FE.KEYID = 1
10,950,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,964 UART: [ldev] --
13,310,849 UART: [fwproc] Waiting for Commands...
13,313,636 UART: [fwproc] Received command 0x46574c44
13,315,808 UART: [fwproc] Received Image of size 114124 bytes
17,360,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,480 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,041 >>> mbox cmd response: success
17,827,715 UART: [afmc] ++
17,828,341 UART: [afmc] CDI.KEYID = 6
17,829,224 UART: [afmc] SUBJECT.KEYID = 7
17,830,492 UART: [afmc] AUTHORITY.KEYID = 5
21,147,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,754 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,012 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,394 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,207 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,680 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,062 UART: [afmc] --
23,512,443 UART: [cold-reset] --
23,516,538 UART: [state] Locking Datavault
23,523,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,163 UART: [state] Locking ICCM
23,526,984 UART: [exit] Launching FMC @ 0x40000130
23,535,329 UART:
23,535,601 UART: Running Caliptra FMC ...
23,536,706 UART:
23,536,866 UART: [state] CFI Enabled
23,544,585 UART: [fht] FMC Alias Private Key: 7
25,875,959 UART: [art] Extend RT PCRs Done
25,877,248 UART: [art] Lock RT PCRs Done
25,878,789 UART: [art] Populate DV Done
25,884,475 UART: [fht] FMC Alias Private Key: 7
25,885,971 UART: [art] Derive CDI
25,886,708 UART: [art] Store in in slot 0x4
25,929,305 UART: [art] Derive Key Pair
25,930,322 UART: [art] Store priv key in slot 0x5
29,172,333 UART: [art] Derive Key Pair - Done
29,185,775 UART: [art] Signing Cert with AUTHO
29,187,081 UART: RITY.KEYID = 7
31,466,526 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,031 UART: [art] PUB.X = 7B5D4784D16F8262C20D95E990CC964288F6EBCA7CDAFE971101D964FDC516B84D5919848DB8947236B1E4A2CB8B7519
31,475,235 UART: [art] PUB.Y = F7C463C72A1C4DF602111296F87DC16214AD5D56E8F340E2CBA0A1F44281AC4001F9B15E5915A9B9BDF4241EE0FB2432
31,482,499 UART: [art] SIG.R = 4E53E9BAAF272DB3A2BD060E541A30C0A6AE5561CC0A2179D8445D6E6A19B8F267AD753FAC1F01FF2297FAE10B4BA727
31,489,881 UART: [art] SIG.S = B468398CE8441E175CDFA4E6FB779528067D0AFD6FE7E929FA4C5806CE5D87B2096FF06A1168363F0651272D3CCFA8B1
32,795,150 UART: Caliptra RT
32,795,865 UART: [state] CFI Enabled
32,912,825 UART: [rt] RT listening for mailbox commands...
32,914,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,945,519 UART: [rt]cmd =0x44504543, len=96
38,617,773 >>> mbox cmd response data (6236 bytes)
38,647,052 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,677,106 UART: [rt]cmd =0x52564348, len=36
38,679,630 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,128,977 ready_for_fw is high
4,129,361 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,954 >>> mbox cmd response: success
23,711,198 UART:
23,711,595 UART: Running Caliptra FMC ...
23,712,705 UART:
23,712,855 UART: [state] CFI Enabled
23,720,916 UART: [fht] FMC Alias Private Key: 7
26,052,569 UART: [art] Extend RT PCRs Done
26,053,802 UART: [art] Lock RT PCRs Done
26,055,402 UART: [art] Populate DV Done
26,060,595 UART: [fht] FMC Alias Private Key: 7
26,062,134 UART: [art] Derive CDI
26,062,899 UART: [art] Store in in slot 0x4
26,105,549 UART: [art] Derive Key Pair
26,106,551 UART: [art] Store priv key in slot 0x5
29,348,171 UART: [art] Derive Key Pair - Done
29,361,233 UART: [art] Signing Cert with AUTHO
29,362,536 UART: RITY.KEYID = 7
31,641,964 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,473 UART: [art] PUB.X = 18032A893B817718DA1FB68BC0B39C7506BF49B40662234B32F8BCA39CF064060EDEA5F191EE5DA044CC97F0C7C9FA6E
31,650,758 UART: [art] PUB.Y = 92A55DDF338B237B8129C953CB41D0F0AA6F3CBC077190EC78BD92A8C0C0382082EE532E0DE5C4BD3E76A22020B107B1
31,657,988 UART: [art] SIG.R = A7C155030C94DEB7A3BD6EF282C41CD61C55610BC1822E48BB8DA72F9CFF8E6A7252A171B4F5714D885829CECC9E0D8D
31,665,408 UART: [art] SIG.S = 4AAAD961C0EA28EBE292B6EB3C6B32A1381A31333098C36F8EACFCFD372AECFBE0380513ACB492E262252463AD0A2302
32,970,832 UART: Caliptra RT
32,971,529 UART: [state] CFI Enabled
33,089,341 UART: [rt] RT listening for mailbox commands...
33,091,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,121,809 UART: [rt]cmd =0x44504543, len=96
38,793,802 >>> mbox cmd response data (6236 bytes)
38,822,890 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,853,212 UART: [rt]cmd =0x52564348, len=36
38,855,757 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,168 UART:
192,529 UART: Running Caliptra ROM ...
193,707 UART:
193,867 UART: [state] CFI Enabled
262,393 UART: [state] LifecycleState = Unprovisioned
264,242 UART: [state] DebugLocked = No
266,136 UART: [state] WD Timer not started. Device not locked for debugging
270,605 UART: [kat] SHA2-256
449,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,276 UART: [kat] ++
461,816 UART: [kat] sha1
472,485 UART: [kat] SHA2-256
475,489 UART: [kat] SHA2-384
482,896 UART: [kat] SHA2-512-ACC
485,896 UART: [kat] ECC-384
2,947,401 UART: [kat] HMAC-384Kdf
2,970,553 UART: [kat] LMS
3,500,046 UART: [kat] --
3,503,830 UART: [cold-reset] ++
3,505,690 UART: [fht] FHT @ 0x50003400
3,516,027 UART: [idev] ++
3,516,593 UART: [idev] CDI.KEYID = 6
3,517,503 UART: [idev] SUBJECT.KEYID = 7
3,518,670 UART: [idev] UDS.KEYID = 0
3,519,666 ready_for_fw is high
3,519,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,321 UART: [idev] Erasing UDS.KEYID = 0
6,024,414 UART: [idev] Sha1 KeyId Algorithm
6,046,798 UART: [idev] --
6,052,254 UART: [ldev] ++
6,052,822 UART: [ldev] CDI.KEYID = 6
6,053,735 UART: [ldev] SUBJECT.KEYID = 5
6,054,918 UART: [ldev] AUTHORITY.KEYID = 7
6,056,333 UART: [ldev] FE.KEYID = 1
6,098,606 UART: [ldev] Erasing FE.KEYID = 1
8,604,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,837 UART: [ldev] --
10,416,125 UART: [fwproc] Wait for Commands...
10,417,900 UART: [fwproc] Recv command 0x46574c44
10,419,993 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,291,023 >>> mbox cmd response: success
14,295,564 UART: [afmc] ++
14,296,184 UART: [afmc] CDI.KEYID = 6
14,297,265 UART: [afmc] SUBJECT.KEYID = 7
14,298,383 UART: [afmc] AUTHORITY.KEYID = 5
16,826,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,005 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,864 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,501 UART: [afmc] --
18,629,213 UART: [cold-reset] --
18,632,209 UART: [state] Locking Datavault
18,636,049 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,687 UART: [state] Locking ICCM
18,640,135 UART: [exit] Launching FMC @ 0x40000130
18,648,548 UART:
18,648,781 UART: Running Caliptra FMC ...
18,649,812 UART:
18,649,959 UART: [state] CFI Enabled
18,709,728 UART: [fht] FMC Alias Private Key: 7
20,473,540 UART: [art] Extend RT PCRs Done
20,474,754 UART: [art] Lock RT PCRs Done
20,476,567 UART: [art] Populate DV Done
20,481,652 UART: [fht] FMC Alias Private Key: 7
20,483,298 UART: [art] Derive CDI
20,484,114 UART: [art] Store in in slot 0x4
20,542,120 UART: [art] Derive Key Pair
20,543,148 UART: [art] Store priv key in slot 0x5
23,006,076 UART: [art] Derive Key Pair - Done
23,018,966 UART: [art] Signing Cert with AUTHO
23,020,303 UART: RITY.KEYID = 7
24,732,691 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,189 UART: [art] PUB.X = AD4472EED20A23F24B16D4AA895FFB810EB2A888A76BE0AF56F8267F81F3F342095EAF23291D593391346CFC76C7B12A
24,741,497 UART: [art] PUB.Y = A54BF2F80ABFE3C02020B8BED72E46FBEE31EFA2EE78FA97CD8BB132863BD20284D1C72B1AF9F5120711DC903FCD1BA3
24,748,783 UART: [art] SIG.R = 491EC2554605D1159BEEAD60063BD8FAF27ADAC815F0292009327212E5DEEB11443C2BBD117D4A2393CDF9D2A18FA401
24,756,170 UART: [art] SIG.S = 83F97E14D8BC1A80F7665B6D9CBA7CE23CEF80208348E85C5A45475D8872CC775F48C59AADE770E84689F58FABD7FEC7
25,735,375 UART: Caliptra RT
25,736,068 UART: [state] CFI Enabled
25,901,572 UART: [rt] RT listening for mailbox commands...
25,903,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,934,686 UART: [rt]cmd =0x44504543, len=96
30,313,649 >>> mbox cmd response data (6236 bytes)
30,342,776 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,372,888 UART: [rt]cmd =0x52564348, len=36
30,375,585 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,362,211 ready_for_fw is high
3,362,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,284 >>> mbox cmd response: success
18,342,713 UART:
18,343,128 UART: Running Caliptra FMC ...
18,344,259 UART:
18,344,412 UART: [state] CFI Enabled
18,409,487 UART: [fht] FMC Alias Private Key: 7
20,172,977 UART: [art] Extend RT PCRs Done
20,174,194 UART: [art] Lock RT PCRs Done
20,175,874 UART: [art] Populate DV Done
20,181,402 UART: [fht] FMC Alias Private Key: 7
20,182,898 UART: [art] Derive CDI
20,183,634 UART: [art] Store in in slot 0x4
20,242,243 UART: [art] Derive Key Pair
20,243,245 UART: [art] Store priv key in slot 0x5
22,705,731 UART: [art] Derive Key Pair - Done
22,718,777 UART: [art] Signing Cert with AUTHO
22,720,073 UART: RITY.KEYID = 7
24,433,092 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,598 UART: [art] PUB.X = 6A5CCC6786DD8735C57D95B81B682CACB5AA00ADA41A9DE782F500F12208C7D200DE1655BEC26C4E416F6606456466EC
24,441,826 UART: [art] PUB.Y = 64559F80EB106CA690F3341B153696231DE01B3ED565D6737B00B4E53A727CB5B7B80E1475741B75528C844C14FB930E
24,448,997 UART: [art] SIG.R = 9726C990425B2E0A6FD9D9DC82B8EA6AD5924DAE308D2EBD675FC4A58FD91D3A35FF5A47E093A47688CABD1F325382E5
24,456,455 UART: [art] SIG.S = CF9E3D757A3644286215DA466027E8DD8E06E4D2DF05D300C2D154DB5CB48BBAF9A086CA403A14A957DB07EC755C255B
25,435,072 UART: Caliptra RT
25,435,778 UART: [state] CFI Enabled
25,599,884 UART: [rt] RT listening for mailbox commands...
25,601,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,633,060 UART: [rt]cmd =0x44504543, len=96
30,008,566 >>> mbox cmd response data (6236 bytes)
30,037,896 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,068,397 UART: [rt]cmd =0x52564348, len=36
30,071,105 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,315 UART:
192,690 UART: Running Caliptra ROM ...
193,889 UART:
603,377 UART: [state] CFI Enabled
617,676 UART: [state] LifecycleState = Unprovisioned
619,478 UART: [state] DebugLocked = No
622,308 UART: [state] WD Timer not started. Device not locked for debugging
625,834 UART: [kat] SHA2-256
804,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,466 UART: [kat] ++
816,989 UART: [kat] sha1
827,793 UART: [kat] SHA2-256
830,790 UART: [kat] SHA2-384
836,850 UART: [kat] SHA2-512-ACC
839,780 UART: [kat] ECC-384
3,280,292 UART: [kat] HMAC-384Kdf
3,292,526 UART: [kat] LMS
3,821,998 UART: [kat] --
3,827,761 UART: [cold-reset] ++
3,830,253 UART: [fht] FHT @ 0x50003400
3,841,732 UART: [idev] ++
3,842,330 UART: [idev] CDI.KEYID = 6
3,843,255 UART: [idev] SUBJECT.KEYID = 7
3,844,427 UART: [idev] UDS.KEYID = 0
3,845,345 ready_for_fw is high
3,845,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,097 UART: [idev] Erasing UDS.KEYID = 0
6,318,224 UART: [idev] Sha1 KeyId Algorithm
6,340,640 UART: [idev] --
6,343,977 UART: [ldev] ++
6,344,538 UART: [ldev] CDI.KEYID = 6
6,345,442 UART: [ldev] SUBJECT.KEYID = 5
6,346,593 UART: [ldev] AUTHORITY.KEYID = 7
6,347,868 UART: [ldev] FE.KEYID = 1
6,355,210 UART: [ldev] Erasing FE.KEYID = 1
8,827,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,352 UART: [ldev] --
10,617,420 UART: [fwproc] Wait for Commands...
10,618,906 UART: [fwproc] Recv command 0x46574c44
10,620,986 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,241 >>> mbox cmd response: success
14,486,237 UART: [afmc] ++
14,486,859 UART: [afmc] CDI.KEYID = 6
14,487,743 UART: [afmc] SUBJECT.KEYID = 7
14,488,897 UART: [afmc] AUTHORITY.KEYID = 5
16,988,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,099 UART: [afmc] --
18,782,592 UART: [cold-reset] --
18,787,918 UART: [state] Locking Datavault
18,792,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,420 UART: [state] Locking ICCM
18,796,787 UART: [exit] Launching FMC @ 0x40000130
18,805,226 UART:
18,805,472 UART: Running Caliptra FMC ...
18,806,573 UART:
18,806,730 UART: [state] CFI Enabled
18,815,097 UART: [fht] FMC Alias Private Key: 7
20,571,563 UART: [art] Extend RT PCRs Done
20,572,809 UART: [art] Lock RT PCRs Done
20,574,428 UART: [art] Populate DV Done
20,579,837 UART: [fht] FMC Alias Private Key: 7
20,581,529 UART: [art] Derive CDI
20,582,334 UART: [art] Store in in slot 0x4
20,624,920 UART: [art] Derive Key Pair
20,625,912 UART: [art] Store priv key in slot 0x5
23,052,637 UART: [art] Derive Key Pair - Done
23,065,424 UART: [art] Signing Cert with AUTHO
23,066,735 UART: RITY.KEYID = 7
24,772,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,848 UART: [art] PUB.X = D48BB4E7E8868D3A785FB2F53BF0BAD650AC005A44A4E896E098AB5847B73FA18055254F2AFD928B78791639523FCF9C
24,781,162 UART: [art] PUB.Y = 09D55B6DC16C987CDE7A8B4DCA11869492DA8CB0B020439D898AB1E98FA1606CA9D4557C9C47613CF348861FF8E63512
24,788,427 UART: [art] SIG.R = 98D0BDC953E5E1BB6A4454296655403A805662D772F366BEF71C2DDD4146CD435366C62EA22549367602B2C9D704CBCC
24,795,802 UART: [art] SIG.S = A278547983686289A20B222751B38399AD56F5FEE011B2225B891B7CB033AB5B0B751CA87DB1BA3745C1C7F9C5AA1BA4
25,774,281 UART: Caliptra RT
25,775,012 UART: [state] CFI Enabled
25,892,023 UART: [rt] RT listening for mailbox commands...
25,893,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,924,616 UART: [rt]cmd =0x44504543, len=96
30,207,346 >>> mbox cmd response data (6236 bytes)
30,236,731 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,266,692 UART: [rt]cmd =0x52564348, len=36
30,269,618 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,701,370 ready_for_fw is high
3,701,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,290,596 >>> mbox cmd response: success
18,537,327 UART:
18,537,729 UART: Running Caliptra FMC ...
18,538,930 UART:
18,539,090 UART: [state] CFI Enabled
18,546,512 UART: [fht] FMC Alias Private Key: 7
20,303,687 UART: [art] Extend RT PCRs Done
20,304,916 UART: [art] Lock RT PCRs Done
20,306,645 UART: [art] Populate DV Done
20,311,780 UART: [fht] FMC Alias Private Key: 7
20,313,318 UART: [art] Derive CDI
20,314,071 UART: [art] Store in in slot 0x4
20,356,662 UART: [art] Derive Key Pair
20,357,661 UART: [art] Store priv key in slot 0x5
22,784,366 UART: [art] Derive Key Pair - Done
22,797,387 UART: [art] Signing Cert with AUTHO
22,798,696 UART: RITY.KEYID = 7
24,504,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,018 UART: [art] PUB.X = B4BF7BA442B1099836D89FAEB0C8D179DD03AEADABCB9F23312E42ED632C295D6F9E6A8CA8BB697EF7AC4FF6D784068A
24,513,302 UART: [art] PUB.Y = E34431F5472C728E46AA37C2A7F9D7415FBB4CC031439FA88ABCF9798CB9D7D988C49581F6EDD621D53882AE6F0B8996
24,520,556 UART: [art] SIG.R = 53B23A614239A979E466ACF5BC6BBCC83066E44B9AD6E6989B1BD9B2A50E63F573122A0EF3E674EF6F911BC81B8FA8B4
24,528,023 UART: [art] SIG.S = 25A63C97177B6B28F1AD2D189682A799A4AA955E05017812FFE336762D73E3200D4952E07C5E14C301E1077D013C718E
25,507,121 UART: Caliptra RT
25,507,817 UART: [state] CFI Enabled
25,625,358 UART: [rt] RT listening for mailbox commands...
25,627,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,657,985 UART: [rt]cmd =0x44504543, len=96
29,940,859 >>> mbox cmd response data (6236 bytes)
29,970,714 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,000,792 UART: [rt]cmd =0x52564348, len=36
30,003,720 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,071 UART:
192,441 UART: Running Caliptra ROM ...
193,664 UART:
193,826 UART: [state] CFI Enabled
264,743 UART: [state] LifecycleState = Unprovisioned
267,151 UART: [state] DebugLocked = No
268,828 UART: [state] WD Timer not started. Device not locked for debugging
273,204 UART: [kat] SHA2-256
463,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,892 UART: [kat] ++
474,388 UART: [kat] sha1
486,046 UART: [kat] SHA2-256
489,058 UART: [kat] SHA2-384
494,841 UART: [kat] SHA2-512-ACC
497,418 UART: [kat] ECC-384
2,949,397 UART: [kat] HMAC-384Kdf
2,972,082 UART: [kat] LMS
3,503,859 UART: [kat] --
3,506,195 UART: [cold-reset] ++
3,507,211 UART: [fht] FHT @ 0x50003400
3,518,615 UART: [idev] ++
3,519,319 UART: [idev] CDI.KEYID = 6
3,520,350 UART: [idev] SUBJECT.KEYID = 7
3,521,453 UART: [idev] UDS.KEYID = 0
3,522,384 ready_for_fw is high
3,522,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,524 UART: [idev] Erasing UDS.KEYID = 0
6,030,279 UART: [idev] Sha1 KeyId Algorithm
6,051,786 UART: [idev] --
6,056,619 UART: [ldev] ++
6,057,307 UART: [ldev] CDI.KEYID = 6
6,058,192 UART: [ldev] SUBJECT.KEYID = 5
6,059,405 UART: [ldev] AUTHORITY.KEYID = 7
6,060,639 UART: [ldev] FE.KEYID = 1
6,100,608 UART: [ldev] Erasing FE.KEYID = 1
8,604,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,916 UART: [ldev] --
10,412,722 UART: [fwproc] Wait for Commands...
10,414,223 UART: [fwproc] Recv command 0x46574c44
10,416,481 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,612,027 >>> mbox cmd response: success
14,616,150 UART: [afmc] ++
14,616,881 UART: [afmc] CDI.KEYID = 6
14,618,087 UART: [afmc] SUBJECT.KEYID = 7
14,619,527 UART: [afmc] AUTHORITY.KEYID = 5
17,146,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,978 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,050 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,430 UART: [afmc] --
18,949,672 UART: [cold-reset] --
18,954,292 UART: [state] Locking Datavault
18,959,972 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,161 UART: [state] Locking ICCM
18,963,857 UART: [exit] Launching FMC @ 0x40000130
18,972,528 UART:
18,972,759 UART: Running Caliptra FMC ...
18,973,810 UART:
18,973,962 UART: [state] CFI Enabled
19,029,081 UART: [fht] FMC Alias Private Key: 7
20,793,801 UART: [art] Extend RT PCRs Done
20,795,015 UART: [art] Lock RT PCRs Done
20,796,347 UART: [art] Populate DV Done
20,801,440 UART: [fht] FMC Alias Private Key: 7
20,803,029 UART: [art] Derive CDI
20,803,772 UART: [art] Store in in slot 0x4
20,862,111 UART: [art] Derive Key Pair
20,863,152 UART: [art] Store priv key in slot 0x5
23,326,549 UART: [art] Derive Key Pair - Done
23,339,600 UART: [art] Signing Cert with AUTHO
23,340,897 UART: RITY.KEYID = 7
25,052,208 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,717 UART: [art] PUB.X = F3189526A25A30F693CAC8418CA42005F6CC5369ED44509911BD7308A8947F5025943D4B12265CF3684A0B8614799F8F
25,060,975 UART: [art] PUB.Y = E8601DA98EA7517325BAA9CB3FB939266B83E8C66771AB18D81AFC27009A4CBFE3C4814A517F6DC74DB0146E009F4027
25,068,212 UART: [art] SIG.R = 0EF09554BFF355E606325A4BA65C35C04DF83CB774568A6AE13DB05D13C93340951F067BC7DCD5BFB35CB6780A82F24D
25,075,601 UART: [art] SIG.S = A20582A22FB91CC2DD194C3A71F66A191C96DB4F70BA8662A94EE4B893B249C8EF35D3D093B8E264688B22378C2C850E
26,054,723 UART: Caliptra RT
26,055,441 UART: [state] CFI Enabled
26,221,642 UART: [rt] RT listening for mailbox commands...
26,223,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,731 UART: [rt]cmd =0x44504543, len=96
30,612,413 >>> mbox cmd response data (6236 bytes)
30,641,497 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,671,604 UART: [rt]cmd =0x52564348, len=36
30,674,412 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,415,432 ready_for_fw is high
3,416,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,715,310 >>> mbox cmd response: success
19,004,998 UART:
19,005,375 UART: Running Caliptra FMC ...
19,006,505 UART:
19,006,663 UART: [state] CFI Enabled
19,073,885 UART: [fht] FMC Alias Private Key: 7
20,838,250 UART: [art] Extend RT PCRs Done
20,839,459 UART: [art] Lock RT PCRs Done
20,841,455 UART: [art] Populate DV Done
20,846,703 UART: [fht] FMC Alias Private Key: 7
20,848,352 UART: [art] Derive CDI
20,849,093 UART: [art] Store in in slot 0x4
20,907,169 UART: [art] Derive Key Pair
20,908,210 UART: [art] Store priv key in slot 0x5
23,371,181 UART: [art] Derive Key Pair - Done
23,384,176 UART: [art] Signing Cert with AUTHO
23,385,483 UART: RITY.KEYID = 7
25,097,569 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,065 UART: [art] PUB.X = B7B637BF57A39284E62308E051AAC22850E0D1C621FC2C48D36A17BDFA945D711E3BCE085BE41E97C6ACB9F22310D1DC
25,106,306 UART: [art] PUB.Y = 0CE54D20D496D13C98E872EAE90AFB97D22071D89F59E6374390CFED1EB52D23142A1C8E01BACAC254F4AFA27AC4F2FA
25,113,604 UART: [art] SIG.R = E801A3CD427B3B74FB34B82088CA5BBB4C0294864073CB7486F052248DA3F36E090B52FE5706040D3F3565F6B51B1AA7
25,120,996 UART: [art] SIG.S = 80C7FA3E0E8B34B2140BF52C123594DC877309E92479D69CEA2194A73CD75B447B7811EA1A09D1DBC7A39EAE03817B51
26,100,297 UART: Caliptra RT
26,101,007 UART: [state] CFI Enabled
26,266,209 UART: [rt] RT listening for mailbox commands...
26,268,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,299,342 UART: [rt]cmd =0x44504543, len=96
30,658,199 >>> mbox cmd response data (6236 bytes)
30,687,239 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,717,137 UART: [rt]cmd =0x52564348, len=36
30,719,736 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,401 UART:
192,896 UART: Running Caliptra ROM ...
194,040 UART:
603,759 UART: [state] CFI Enabled
614,457 UART: [state] LifecycleState = Unprovisioned
616,858 UART: [state] DebugLocked = No
618,090 UART: [state] WD Timer not started. Device not locked for debugging
621,130 UART: [kat] SHA2-256
811,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
821,863 UART: [kat] ++
822,307 UART: [kat] sha1
834,665 UART: [kat] SHA2-256
837,658 UART: [kat] SHA2-384
844,003 UART: [kat] SHA2-512-ACC
846,580 UART: [kat] ECC-384
3,289,597 UART: [kat] HMAC-384Kdf
3,303,480 UART: [kat] LMS
3,835,319 UART: [kat] --
3,839,834 UART: [cold-reset] ++
3,841,625 UART: [fht] FHT @ 0x50003400
3,854,581 UART: [idev] ++
3,855,208 UART: [idev] CDI.KEYID = 6
3,856,230 UART: [idev] SUBJECT.KEYID = 7
3,857,395 UART: [idev] UDS.KEYID = 0
3,858,334 ready_for_fw is high
3,858,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,619 UART: [idev] Erasing UDS.KEYID = 0
6,334,283 UART: [idev] Sha1 KeyId Algorithm
6,356,703 UART: [idev] --
6,360,959 UART: [ldev] ++
6,361,629 UART: [ldev] CDI.KEYID = 6
6,362,534 UART: [ldev] SUBJECT.KEYID = 5
6,363,739 UART: [ldev] AUTHORITY.KEYID = 7
6,364,962 UART: [ldev] FE.KEYID = 1
6,376,554 UART: [ldev] Erasing FE.KEYID = 1
8,858,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,605 UART: [ldev] --
10,649,565 UART: [fwproc] Wait for Commands...
10,651,109 UART: [fwproc] Recv command 0x46574c44
10,653,419 UART: [fwproc] Recv'd Img size: 114448 bytes
14,112,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,848,960 >>> mbox cmd response: success
14,853,437 UART: [afmc] ++
14,854,173 UART: [afmc] CDI.KEYID = 6
14,855,367 UART: [afmc] SUBJECT.KEYID = 7
14,856,802 UART: [afmc] AUTHORITY.KEYID = 5
17,361,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,087,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,089,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,104,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,119,403 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,134,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,158,156 UART: [afmc] --
19,161,311 UART: [cold-reset] --
19,165,277 UART: [state] Locking Datavault
19,171,721 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,903 UART: [state] Locking ICCM
19,176,869 UART: [exit] Launching FMC @ 0x40000130
19,185,488 UART:
19,185,716 UART: Running Caliptra FMC ...
19,186,814 UART:
19,186,963 UART: [state] CFI Enabled
19,194,952 UART: [fht] FMC Alias Private Key: 7
20,951,818 UART: [art] Extend RT PCRs Done
20,953,036 UART: [art] Lock RT PCRs Done
20,954,795 UART: [art] Populate DV Done
20,959,895 UART: [fht] FMC Alias Private Key: 7
20,961,592 UART: [art] Derive CDI
20,962,322 UART: [art] Store in in slot 0x4
21,005,447 UART: [art] Derive Key Pair
21,006,443 UART: [art] Store priv key in slot 0x5
23,433,122 UART: [art] Derive Key Pair - Done
23,446,225 UART: [art] Signing Cert with AUTHO
23,447,524 UART: RITY.KEYID = 7
25,153,098 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,611 UART: [art] PUB.X = 88FA9E6F8BE5A9759B111A7E60C32A0F7835F5BE827D85B495D8C734846B0933A8A18B069ECB82B2DC6D86F6548E7563
25,161,832 UART: [art] PUB.Y = 11B470BBA0E9D7DF138B1D1A966977A4B5263D9459D551ADF2ABB8A637DC138CEB0A4CB6610BF419E9466C4465A7DCEE
25,169,154 UART: [art] SIG.R = 8207252D884646E6E3BDAF9B4E65541E96A87ECB916E8B5560ADBDA18D56401F46545075CC286F97EE7ADB4C2EA82E8E
25,176,545 UART: [art] SIG.S = 0A985D39C134DA80EE6A8548CB6F90EE674E2831330F7AC1F6ED1CF68A1E54E94BDA7E20F52639939B8CF8C43090DAD2
26,155,596 UART: Caliptra RT
26,156,281 UART: [state] CFI Enabled
26,273,122 UART: [rt] RT listening for mailbox commands...
26,275,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,305,559 UART: [rt]cmd =0x44504543, len=96
30,588,406 >>> mbox cmd response data (6236 bytes)
30,618,062 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,648,416 UART: [rt]cmd =0x52564348, len=36
30,651,174 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,761,722 ready_for_fw is high
3,762,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,204 >>> mbox cmd response: success
19,215,388 UART:
19,215,787 UART: Running Caliptra FMC ...
19,216,885 UART:
19,217,029 UART: [state] CFI Enabled
19,224,836 UART: [fht] FMC Alias Private Key: 7
20,981,472 UART: [art] Extend RT PCRs Done
20,982,690 UART: [art] Lock RT PCRs Done
20,984,314 UART: [art] Populate DV Done
20,989,712 UART: [fht] FMC Alias Private Key: 7
20,991,370 UART: [art] Derive CDI
20,992,102 UART: [art] Store in in slot 0x4
21,034,852 UART: [art] Derive Key Pair
21,035,849 UART: [art] Store priv key in slot 0x5
23,462,354 UART: [art] Derive Key Pair - Done
23,475,075 UART: [art] Signing Cert with AUTHO
23,476,414 UART: RITY.KEYID = 7
25,181,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,066 UART: [art] PUB.X = 45B00806C905BE10806DB0D64C9CEC9F23A574978C61471B5BAE146036737B36BF91B4836C62A5D4CCB879666C86C17D
25,190,305 UART: [art] PUB.Y = 559BA609CB2CE1B7114B05FE2117393E1C51DD793CB91C3FDFE6C7B43C1142B921F312BBE1860D4576CEAA3DDF6CFFE1
25,197,624 UART: [art] SIG.R = 63AD193C23CB3165402A534A76A3BCB00F264039A1B6AC177D305DFBED5080BEC687DAC92170494F4A5CCA4733259A62
25,204,994 UART: [art] SIG.S = 06050239A47603C7C47AF31ACC8F7F0840E9E0589C471699A3CDBC5EFBD7D9F8D373DB48EED134517F9643C7296BEBD2
26,183,739 UART: Caliptra RT
26,184,455 UART: [state] CFI Enabled
26,301,431 UART: [rt] RT listening for mailbox commands...
26,303,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,121 UART: [rt]cmd =0x44504543, len=96
30,617,194 >>> mbox cmd response data (6236 bytes)
30,646,324 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,672 UART: [rt]cmd =0x52564348, len=36
30,679,300 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,752 UART: [state] LifecycleState = Unprovisioned
86,407 UART: [state] DebugLocked = No
87,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,609 UART: [kat] SHA2-256
882,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,655 UART: [kat] ++
886,807 UART: [kat] sha1
891,099 UART: [kat] SHA2-256
893,037 UART: [kat] SHA2-384
895,836 UART: [kat] SHA2-512-ACC
897,737 UART: [kat] ECC-384
903,474 UART: [kat] HMAC-384Kdf
907,970 UART: [kat] LMS
1,476,166 UART: [kat] --
1,476,935 UART: [cold-reset] ++
1,477,411 UART: [fht] Storing FHT @ 0x50003400
1,480,358 UART: [idev] ++
1,480,526 UART: [idev] CDI.KEYID = 6
1,480,886 UART: [idev] SUBJECT.KEYID = 7
1,481,310 UART: [idev] UDS.KEYID = 0
1,481,655 ready_for_fw is high
1,481,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,124 UART: [idev] Erasing UDS.KEYID = 0
1,505,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,516 UART: [idev] --
1,515,625 UART: [ldev] ++
1,515,793 UART: [ldev] CDI.KEYID = 6
1,516,156 UART: [ldev] SUBJECT.KEYID = 5
1,516,582 UART: [ldev] AUTHORITY.KEYID = 7
1,517,045 UART: [ldev] FE.KEYID = 1
1,522,067 UART: [ldev] Erasing FE.KEYID = 1
1,547,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,680 UART: [fwproc] Received command 0x46574c44
1,587,471 UART: [fwproc] Received Image of size 114448 bytes
2,886,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,465 >>> mbox cmd response: success
3,080,721 UART: [afmc] ++
3,080,889 UART: [afmc] CDI.KEYID = 6
3,081,251 UART: [afmc] SUBJECT.KEYID = 7
3,081,676 UART: [afmc] AUTHORITY.KEYID = 5
3,117,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,377 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,770 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,460 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,383 UART: [afmc] --
3,160,335 UART: [cold-reset] --
3,161,245 UART: [state] Locking Datavault
3,162,434 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,038 UART: [state] Locking ICCM
3,163,670 UART: [exit] Launching FMC @ 0x40000130
3,168,999 UART:
3,169,015 UART: Running Caliptra FMC ...
3,169,423 UART:
3,169,477 UART: [state] CFI Enabled
3,180,136 UART: [fht] FMC Alias Private Key: 7
3,287,991 UART: [art] Extend RT PCRs Done
3,288,419 UART: [art] Lock RT PCRs Done
3,289,883 UART: [art] Populate DV Done
3,298,156 UART: [fht] FMC Alias Private Key: 7
3,299,318 UART: [art] Derive CDI
3,299,598 UART: [art] Store in in slot 0x4
3,385,479 UART: [art] Derive Key Pair
3,385,839 UART: [art] Store priv key in slot 0x5
3,399,317 UART: [art] Derive Key Pair - Done
3,414,110 UART: [art] Signing Cert with AUTHO
3,414,590 UART: RITY.KEYID = 7
3,429,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,503 UART: [art] PUB.X = 7E6EEE6EAD6A5B694CCFC7B96DA5BE95698D031ED37DA360BCED5101619DC4C102CF47F38DD4F7AC4665A6745111C039
3,437,282 UART: [art] PUB.Y = 9E31ED982D76A0A898B7CFC78FD168D65D4F99E23465708DB720222D913B23509B196C478C69DBE1B3EA314D123D70D6
3,444,234 UART: [art] SIG.R = 3CA9605DD6393FA1B0B4AE62A5999CF9DBB4696330B8AA280D97C846193B159D799E3A1333400950027E400665AAC1F8
3,450,990 UART: [art] SIG.S = 48F668EB1365432E90965E72CD2C05E88321D7C96559A9531D77CA33A2EEF7C40C6F93A16B097524D02ABD4E7D7BE52F
3,475,264 UART: Caliptra RT
3,475,517 UART: [state] CFI Enabled
3,583,613 UART: [rt] RT listening for mailbox commands...
3,584,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,879 UART: [rt]cmd =0x44504543, len=96
3,794,869 >>> mbox cmd response data (6236 bytes)
3,794,870 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,403 UART: [rt]cmd =0x52564348, len=36
3,826,441 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,385 ready_for_fw is high
1,362,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,419 >>> mbox cmd response: success
2,992,495 UART:
2,992,511 UART: Running Caliptra FMC ...
2,992,919 UART:
2,992,973 UART: [state] CFI Enabled
3,003,088 UART: [fht] FMC Alias Private Key: 7
3,110,883 UART: [art] Extend RT PCRs Done
3,111,311 UART: [art] Lock RT PCRs Done
3,112,773 UART: [art] Populate DV Done
3,121,052 UART: [fht] FMC Alias Private Key: 7
3,122,234 UART: [art] Derive CDI
3,122,514 UART: [art] Store in in slot 0x4
3,208,019 UART: [art] Derive Key Pair
3,208,379 UART: [art] Store priv key in slot 0x5
3,221,253 UART: [art] Derive Key Pair - Done
3,235,715 UART: [art] Signing Cert with AUTHO
3,236,195 UART: RITY.KEYID = 7
3,251,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,166 UART: [art] PUB.X = 07E93BA891DDA44B45882E593C7D2872A6A456E552810406D1BC681605C59E1D65B3EFC672558F1B5DA31AE06D458C01
3,258,921 UART: [art] PUB.Y = DF68ECC5E31D4D805B185DA67D3F45BDD83A5CEDCB0729C9CB76611E25E6318EAC0E9FBF8F3DE839B74E07A463858BE2
3,265,884 UART: [art] SIG.R = 09BDCE23124F47BE5EB7594F4FBE152323D719083039E2A8DDF65624BAA72F126A6B9E22A2CC7187F50D71FCDE423DBF
3,272,659 UART: [art] SIG.S = E6B252B3B73BA29CFA96D058C2B35070C0DD805F109C74E6DFC89BBFD9386C23726461958F96734EFFB8895042634F6F
3,296,544 UART: Caliptra RT
3,296,797 UART: [state] CFI Enabled
3,405,438 UART: [rt] RT listening for mailbox commands...
3,406,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,272 UART: [rt]cmd =0x44504543, len=96
3,616,752 >>> mbox cmd response data (6236 bytes)
3,616,753 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,522 UART: [rt]cmd =0x52564348, len=36
3,648,580 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,459 UART: [kat] LMS
1,475,655 UART: [kat] --
1,476,680 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,779 UART: [idev] ++
1,479,947 UART: [idev] CDI.KEYID = 6
1,480,307 UART: [idev] SUBJECT.KEYID = 7
1,480,731 UART: [idev] UDS.KEYID = 0
1,481,076 ready_for_fw is high
1,481,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,013 UART: [idev] Erasing UDS.KEYID = 0
1,506,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,943 UART: [idev] --
1,515,906 UART: [ldev] ++
1,516,074 UART: [ldev] CDI.KEYID = 6
1,516,437 UART: [ldev] SUBJECT.KEYID = 5
1,516,863 UART: [ldev] AUTHORITY.KEYID = 7
1,517,326 UART: [ldev] FE.KEYID = 1
1,522,456 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,601 UART: [ldev] --
1,585,984 UART: [fwproc] Waiting for Commands...
1,586,841 UART: [fwproc] Received command 0x46574c44
1,587,632 UART: [fwproc] Received Image of size 114448 bytes
2,886,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,733 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,170 >>> mbox cmd response: success
3,080,200 UART: [afmc] ++
3,080,368 UART: [afmc] CDI.KEYID = 6
3,080,730 UART: [afmc] SUBJECT.KEYID = 7
3,081,155 UART: [afmc] AUTHORITY.KEYID = 5
3,117,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,760 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,645 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,335 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,400 UART: [afmc] --
3,160,490 UART: [cold-reset] --
3,161,476 UART: [state] Locking Datavault
3,162,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,203 UART: [state] Locking ICCM
3,163,871 UART: [exit] Launching FMC @ 0x40000130
3,169,200 UART:
3,169,216 UART: Running Caliptra FMC ...
3,169,624 UART:
3,169,767 UART: [state] CFI Enabled
3,180,822 UART: [fht] FMC Alias Private Key: 7
3,289,039 UART: [art] Extend RT PCRs Done
3,289,467 UART: [art] Lock RT PCRs Done
3,291,229 UART: [art] Populate DV Done
3,299,596 UART: [fht] FMC Alias Private Key: 7
3,300,742 UART: [art] Derive CDI
3,301,022 UART: [art] Store in in slot 0x4
3,386,919 UART: [art] Derive Key Pair
3,387,279 UART: [art] Store priv key in slot 0x5
3,400,581 UART: [art] Derive Key Pair - Done
3,415,500 UART: [art] Signing Cert with AUTHO
3,415,980 UART: RITY.KEYID = 7
3,431,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,183 UART: [art] PUB.X = 0549F1F40AA91CBB74F7CAC6E68A63E064B023B31A26774A4B4F500D0C8839AB482678A87630AC6F7AC7427B3DF1007A
3,438,925 UART: [art] PUB.Y = 9DED26B264BA6EFBCC3F62BE46C27BD1C0D255A8747332664D9D015C8C795A73915C180EB0C724AFC5881243B580D560
3,445,875 UART: [art] SIG.R = 5EDA90922A1FF97E04761DCED9B08A30912958CCB6B1D89D74C9BDD0590554F4EF54BFD060ABD26A2B3CA36282FDF797
3,452,655 UART: [art] SIG.S = 77E3BDF1F2A6C61C44FDB9C2BFE41AA665F7D64EDEE617A76EDD1148656DACF430873574D248EDF134B5EC6B950C9707
3,476,856 UART: Caliptra RT
3,477,201 UART: [state] CFI Enabled
3,585,721 UART: [rt] RT listening for mailbox commands...
3,586,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,533 UART: [rt]cmd =0x44504543, len=96
3,796,672 >>> mbox cmd response data (6236 bytes)
3,796,673 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,218 UART: [rt]cmd =0x52564348, len=36
3,828,476 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,750 >>> mbox cmd response: success
2,991,958 UART:
2,991,974 UART: Running Caliptra FMC ...
2,992,382 UART:
2,992,525 UART: [state] CFI Enabled
3,003,328 UART: [fht] FMC Alias Private Key: 7
3,111,399 UART: [art] Extend RT PCRs Done
3,111,827 UART: [art] Lock RT PCRs Done
3,113,243 UART: [art] Populate DV Done
3,121,452 UART: [fht] FMC Alias Private Key: 7
3,122,454 UART: [art] Derive CDI
3,122,734 UART: [art] Store in in slot 0x4
3,208,357 UART: [art] Derive Key Pair
3,208,717 UART: [art] Store priv key in slot 0x5
3,222,227 UART: [art] Derive Key Pair - Done
3,236,661 UART: [art] Signing Cert with AUTHO
3,237,141 UART: RITY.KEYID = 7
3,252,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,228 UART: [art] PUB.X = 5FF5F9A35B12EC2A79C406AC1036D96656A8AB2EDF2785740D36707B159CC77E790C8BE624A48C02A161DBEB7FF02CB4
3,259,998 UART: [art] PUB.Y = 50A332D3F48A5E42C066C32053767A839FAF5AEF96ED0B58C94902F75521A7E50CF9860380C34E634253562A8CD0A348
3,266,932 UART: [art] SIG.R = 6F4D1A1745C47C8109596FD670F88FFF7CF9D072CECE37BE0B26FB1D6EAE67FF5665569C6EC1D5F43974821EC9F77F0C
3,273,709 UART: [art] SIG.S = 6222F4F0BF87CDE78FEA4E1B2F2EC4240A74A9D2FF287DA24ACB123ABB52C0CC30383476D35342EDE43FF0678062FC3E
3,297,625 UART: Caliptra RT
3,297,970 UART: [state] CFI Enabled
3,406,112 UART: [rt] RT listening for mailbox commands...
3,406,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,648 UART: [rt]cmd =0x44504543, len=96
3,617,850 >>> mbox cmd response data (6236 bytes)
3,617,851 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,702 UART: [rt]cmd =0x52564348, len=36
3,649,958 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
893,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,365 UART: [kat] ++
897,517 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
918,348 UART: [kat] HMAC-384Kdf
923,010 UART: [kat] LMS
1,171,338 UART: [kat] --
1,172,419 UART: [cold-reset] ++
1,172,791 UART: [fht] FHT @ 0x50003400
1,175,368 UART: [idev] ++
1,175,536 UART: [idev] CDI.KEYID = 6
1,175,896 UART: [idev] SUBJECT.KEYID = 7
1,176,320 UART: [idev] UDS.KEYID = 0
1,176,665 ready_for_fw is high
1,176,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,470 UART: [idev] Erasing UDS.KEYID = 0
1,201,285 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,623 UART: [ldev] Erasing FE.KEYID = 1
1,243,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,827 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,114 >>> mbox cmd response: success
2,777,136 UART: [afmc] ++
2,777,304 UART: [afmc] CDI.KEYID = 6
2,777,666 UART: [afmc] SUBJECT.KEYID = 7
2,778,091 UART: [afmc] AUTHORITY.KEYID = 5
2,812,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,097 UART: [afmc] --
2,856,047 UART: [cold-reset] --
2,856,913 UART: [state] Locking Datavault
2,857,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,574 UART: [state] Locking ICCM
2,859,024 UART: [exit] Launching FMC @ 0x40000130
2,864,353 UART:
2,864,369 UART: Running Caliptra FMC ...
2,864,777 UART:
2,864,831 UART: [state] CFI Enabled
2,875,282 UART: [fht] FMC Alias Private Key: 7
2,982,985 UART: [art] Extend RT PCRs Done
2,983,413 UART: [art] Lock RT PCRs Done
2,984,919 UART: [art] Populate DV Done
2,993,236 UART: [fht] FMC Alias Private Key: 7
2,994,372 UART: [art] Derive CDI
2,994,652 UART: [art] Store in in slot 0x4
3,080,287 UART: [art] Derive Key Pair
3,080,647 UART: [art] Store priv key in slot 0x5
3,094,463 UART: [art] Derive Key Pair - Done
3,108,990 UART: [art] Signing Cert with AUTHO
3,109,470 UART: RITY.KEYID = 7
3,124,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,947 UART: [art] PUB.X = 00A2CA93D0F3D26513B35A7668F16CF5D51E6CAAD05A34E627CC4C5712A5A050264B9FCDA3DB5A2147136F5286F2E5E8
3,131,705 UART: [art] PUB.Y = 309BA416CD4185C87AB9B564D0EE6B88B0557BD439E0959006D97DC021221CB6DAECB784D144549EBB17A065CCD8785D
3,138,660 UART: [art] SIG.R = 692D71AA78E9FA06EB90AB0A3B334A044C01344767190CC3686F6D05DF251696BAE53B0DD5BFC4F17FC2275A4FF5F6F0
3,145,421 UART: [art] SIG.S = 2F2B2EBE89A03B407CE0B486B0603796D14E69D9738BCFF8C8EEA6FE6E942AE70517B12CC5362EBC9F7E7EB591E78206
3,169,456 UART: Caliptra RT
3,169,709 UART: [state] CFI Enabled
3,277,250 UART: [rt] RT listening for mailbox commands...
3,277,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,402 UART: [rt]cmd =0x44504543, len=96
3,489,173 >>> mbox cmd response data (6236 bytes)
3,489,174 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,829 UART: [rt]cmd =0x52564348, len=36
3,521,135 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,499 ready_for_fw is high
1,060,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,887 >>> mbox cmd response: success
2,690,209 UART:
2,690,225 UART: Running Caliptra FMC ...
2,690,633 UART:
2,690,687 UART: [state] CFI Enabled
2,701,106 UART: [fht] FMC Alias Private Key: 7
2,809,331 UART: [art] Extend RT PCRs Done
2,809,759 UART: [art] Lock RT PCRs Done
2,811,179 UART: [art] Populate DV Done
2,819,360 UART: [fht] FMC Alias Private Key: 7
2,820,310 UART: [art] Derive CDI
2,820,590 UART: [art] Store in in slot 0x4
2,906,477 UART: [art] Derive Key Pair
2,906,837 UART: [art] Store priv key in slot 0x5
2,920,459 UART: [art] Derive Key Pair - Done
2,935,020 UART: [art] Signing Cert with AUTHO
2,935,500 UART: RITY.KEYID = 7
2,950,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,375 UART: [art] PUB.X = 82F41295BABA0F46064AE432038CF208FAD7CF691DFE9F89F28DC69FDE8E492537E52ED57E3C4E77A966CBA28CE0EF2E
2,958,153 UART: [art] PUB.Y = D1674F95D69959887D5BD1979CFEEAAE7E2AB21A8E0B7192609AFF6F9E95803A07413DEC0BC1265123615F5EA3D88754
2,965,100 UART: [art] SIG.R = 8FD18DF8EA18D2AF98872B6A9494B0E0B613127E601F545A7FCA22A125611B93E00DFB36956004EC61183A95D7726641
2,971,862 UART: [art] SIG.S = AB7A1E1B86C49EAD7183BA942E72F64BD4D6A0E7B95BC4491B58E0CFCB2C553F893BCFEB2A8306EBCF60F3CB3532DED7
2,995,628 UART: Caliptra RT
2,995,881 UART: [state] CFI Enabled
3,103,397 UART: [rt] RT listening for mailbox commands...
3,104,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,395 UART: [rt]cmd =0x44504543, len=96
3,314,691 >>> mbox cmd response data (6236 bytes)
3,314,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,313 UART: [rt]cmd =0x52564348, len=36
3,346,347 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,651 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,635 UART: [idev] ++
1,175,803 UART: [idev] CDI.KEYID = 6
1,176,163 UART: [idev] SUBJECT.KEYID = 7
1,176,587 UART: [idev] UDS.KEYID = 0
1,176,932 ready_for_fw is high
1,176,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,779 UART: [idev] Erasing UDS.KEYID = 0
1,201,106 UART: [idev] Sha1 KeyId Algorithm
1,209,586 UART: [idev] --
1,210,798 UART: [ldev] ++
1,210,966 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,755 UART: [ldev] AUTHORITY.KEYID = 7
1,212,218 UART: [ldev] FE.KEYID = 1
1,217,500 UART: [ldev] Erasing FE.KEYID = 1
1,244,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,196 UART: [ldev] --
1,283,645 UART: [fwproc] Wait for Commands...
1,284,263 UART: [fwproc] Recv command 0x46574c44
1,284,991 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,383 >>> mbox cmd response: success
2,777,537 UART: [afmc] ++
2,777,705 UART: [afmc] CDI.KEYID = 6
2,778,067 UART: [afmc] SUBJECT.KEYID = 7
2,778,492 UART: [afmc] AUTHORITY.KEYID = 5
2,813,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,652 UART: [afmc] --
2,856,700 UART: [cold-reset] --
2,857,538 UART: [state] Locking Datavault
2,858,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,181 UART: [state] Locking ICCM
2,859,847 UART: [exit] Launching FMC @ 0x40000130
2,865,176 UART:
2,865,192 UART: Running Caliptra FMC ...
2,865,600 UART:
2,865,743 UART: [state] CFI Enabled
2,876,036 UART: [fht] FMC Alias Private Key: 7
2,983,833 UART: [art] Extend RT PCRs Done
2,984,261 UART: [art] Lock RT PCRs Done
2,985,785 UART: [art] Populate DV Done
2,994,348 UART: [fht] FMC Alias Private Key: 7
2,995,500 UART: [art] Derive CDI
2,995,780 UART: [art] Store in in slot 0x4
3,081,297 UART: [art] Derive Key Pair
3,081,657 UART: [art] Store priv key in slot 0x5
3,095,125 UART: [art] Derive Key Pair - Done
3,110,264 UART: [art] Signing Cert with AUTHO
3,110,744 UART: RITY.KEYID = 7
3,126,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,897 UART: [art] PUB.X = 68A34A67D1320C435CCB373D3DB97132B2F0BB25AFBBF74C5A18FE6E80B2EA52CCB8FA5CB053F8200DF0D9E4630A8DCC
3,133,682 UART: [art] PUB.Y = BB59D8D73E9DAE3FE34E104119AB9BA996BAB73AAD82CDD13E1B0693C44D6DFC984B53D47DE83D1D69CE6F2124E964F1
3,140,651 UART: [art] SIG.R = 4BCEDF8BC64D62DF126C7699DC0F4E15A213595A601ED8695CDD09340A0965F3B4682F3CF49BE3ADF8C3A33BC3C05F5A
3,147,427 UART: [art] SIG.S = AD67A8D301394EA85B374E140982E646715E4ACAD3DAB69C911BFD0612E1C061C96C06DC259461850C05197E6C54A412
3,171,562 UART: Caliptra RT
3,171,907 UART: [state] CFI Enabled
3,278,824 UART: [rt] RT listening for mailbox commands...
3,279,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,750 UART: [rt]cmd =0x44504543, len=96
3,489,408 >>> mbox cmd response data (6236 bytes)
3,489,409 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,976 UART: [rt]cmd =0x52564348, len=36
3,521,422 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,246 ready_for_fw is high
1,060,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,794 >>> mbox cmd response: success
2,688,698 UART:
2,688,714 UART: Running Caliptra FMC ...
2,689,122 UART:
2,689,265 UART: [state] CFI Enabled
2,699,960 UART: [fht] FMC Alias Private Key: 7
2,808,031 UART: [art] Extend RT PCRs Done
2,808,459 UART: [art] Lock RT PCRs Done
2,810,085 UART: [art] Populate DV Done
2,818,082 UART: [fht] FMC Alias Private Key: 7
2,819,262 UART: [art] Derive CDI
2,819,542 UART: [art] Store in in slot 0x4
2,905,451 UART: [art] Derive Key Pair
2,905,811 UART: [art] Store priv key in slot 0x5
2,918,907 UART: [art] Derive Key Pair - Done
2,933,607 UART: [art] Signing Cert with AUTHO
2,934,087 UART: RITY.KEYID = 7
2,949,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,036 UART: [art] PUB.X = 64A94DA3009958CACD301EA58959B18DC31C90008FE153FCBCFB45AA2744347AE1691924A0C1B04202FC5E2A2E958869
2,956,763 UART: [art] PUB.Y = 34E3FE6D0E25B2E069091EB966634CE2D8A841863480996187202DAF2FAE1E4DE35A4DB0600D3CB2C87E5F7E48EF2027
2,963,710 UART: [art] SIG.R = 543D459B01A8EE906A71BD375077B97AFE724BAB1CC4685E1CA8D2447832590512D54973FA46C83B9846B82B1118AB8B
2,970,474 UART: [art] SIG.S = 4A6820916BA0856882138E58ED6057F85287F42422D9848E53D913DF4754BA98998D8A81FF18937E34699DDCE555B506
2,993,552 UART: Caliptra RT
2,993,897 UART: [state] CFI Enabled
3,101,834 UART: [rt] RT listening for mailbox commands...
3,102,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,858 UART: [rt]cmd =0x44504543, len=96
3,313,255 >>> mbox cmd response data (6236 bytes)
3,313,256 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,903 UART: [rt]cmd =0x52564348, len=36
3,345,301 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 ready_for_fw is high
1,174,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,067 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,242,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,348 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,327 UART: [fwproc] Recv command 0x46574c44
1,283,060 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,328 >>> mbox cmd response: success
2,775,573 UART: [afmc] ++
2,775,741 UART: [afmc] CDI.KEYID = 6
2,776,104 UART: [afmc] SUBJECT.KEYID = 7
2,776,530 UART: [afmc] AUTHORITY.KEYID = 5
2,812,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,120 UART: [afmc] --
2,855,046 UART: [cold-reset] --
2,855,944 UART: [state] Locking Datavault
2,857,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,021 UART: [state] Locking ICCM
2,858,565 UART: [exit] Launching FMC @ 0x40000130
2,863,894 UART:
2,863,910 UART: Running Caliptra FMC ...
2,864,318 UART:
2,864,372 UART: [state] CFI Enabled
2,874,683 UART: [fht] FMC Alias Private Key: 7
2,982,446 UART: [art] Extend RT PCRs Done
2,982,874 UART: [art] Lock RT PCRs Done
2,984,224 UART: [art] Populate DV Done
2,992,323 UART: [fht] FMC Alias Private Key: 7
2,993,341 UART: [art] Derive CDI
2,993,621 UART: [art] Store in in slot 0x4
3,079,218 UART: [art] Derive Key Pair
3,079,578 UART: [art] Store priv key in slot 0x5
3,092,672 UART: [art] Derive Key Pair - Done
3,107,722 UART: [art] Signing Cert with AUTHO
3,108,202 UART: RITY.KEYID = 7
3,122,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,675 UART: [art] PUB.X = 1EC1E277F5A3BC5B8B5701FC18EF5F274FA2568DCD864626D52A77E480E5D3EAA5D7BDF188D831C92B2D7E9B12CE4597
3,130,458 UART: [art] PUB.Y = D4B356B64B03EEFCEF716A11F38DEB818F1BA1A2EC6833CE8C712FA1DFE5964044A2C7F28FE4D28497D32D9D6815ED64
3,137,423 UART: [art] SIG.R = 9052120A29735834663F504F2022AE9BE91056378B2BCEA7D45288E7039B08D7A321D7670D0669193BEB7BC5E727A7F7
3,144,170 UART: [art] SIG.S = 534E6D490166772D719DF8FE9383C32E19571A3227A597CB7E02C9379350D3A909F5EF4B87747BA077FD2FB22A4FD714
3,167,892 UART: Caliptra RT
3,168,145 UART: [state] CFI Enabled
3,275,888 UART: [rt] RT listening for mailbox commands...
3,276,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,956 UART: [rt]cmd =0x44504543, len=96
3,487,343 >>> mbox cmd response data (6236 bytes)
3,487,344 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,847 UART: [rt]cmd =0x52564348, len=36
3,519,009 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,202 ready_for_fw is high
1,056,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,924 >>> mbox cmd response: success
2,686,138 UART:
2,686,154 UART: Running Caliptra FMC ...
2,686,562 UART:
2,686,616 UART: [state] CFI Enabled
2,696,811 UART: [fht] FMC Alias Private Key: 7
2,804,564 UART: [art] Extend RT PCRs Done
2,804,992 UART: [art] Lock RT PCRs Done
2,806,598 UART: [art] Populate DV Done
2,815,015 UART: [fht] FMC Alias Private Key: 7
2,816,041 UART: [art] Derive CDI
2,816,321 UART: [art] Store in in slot 0x4
2,901,882 UART: [art] Derive Key Pair
2,902,242 UART: [art] Store priv key in slot 0x5
2,915,586 UART: [art] Derive Key Pair - Done
2,930,370 UART: [art] Signing Cert with AUTHO
2,930,850 UART: RITY.KEYID = 7
2,946,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,977 UART: [art] PUB.X = E174BCE52194933B4F9079C5715625423EB0BC09370DC0A65B15F9C605C97AF66C9785288EA15EEF70359A59D804B756
2,953,731 UART: [art] PUB.Y = 5D986E3BABAA4D20604469ADE5EFBDA8FE42D9607F60D382E5FD9BB77C73C1A245F3027BA586196DC031D1F25B34A29E
2,960,694 UART: [art] SIG.R = 2E569F2AAC08887407A319DAEA4D58862ADDFF0C47F47CC2FB203A57DC528A8E9FE728D88DDB1CBEBB8B63299C95DD52
2,967,477 UART: [art] SIG.S = 56AF0B0C53FF4EB73439C994502C6A2F2B8A2BAD8FC5CD31BF2D17A206A43327D22C41F2C95A396597928AE5AD69C56A
2,992,007 UART: Caliptra RT
2,992,260 UART: [state] CFI Enabled
3,100,165 UART: [rt] RT listening for mailbox commands...
3,100,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,841 UART: [rt]cmd =0x44504543, len=96
3,311,002 >>> mbox cmd response data (6236 bytes)
3,311,003 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,604 UART: [rt]cmd =0x52564348, len=36
3,342,826 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,174,124 ready_for_fw is high
1,174,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,610 UART: [idev] Erasing UDS.KEYID = 0
1,198,726 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,241,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,201 UART: [fwproc] Wait for Commands...
1,282,022 UART: [fwproc] Recv command 0x46574c44
1,282,755 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,479 >>> mbox cmd response: success
2,776,598 UART: [afmc] ++
2,776,766 UART: [afmc] CDI.KEYID = 6
2,777,129 UART: [afmc] SUBJECT.KEYID = 7
2,777,555 UART: [afmc] AUTHORITY.KEYID = 5
2,813,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,863 UART: [afmc] --
2,856,995 UART: [cold-reset] --
2,858,033 UART: [state] Locking Datavault
2,859,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,904 UART: [state] Locking ICCM
2,860,386 UART: [exit] Launching FMC @ 0x40000130
2,865,715 UART:
2,865,731 UART: Running Caliptra FMC ...
2,866,139 UART:
2,866,282 UART: [state] CFI Enabled
2,877,171 UART: [fht] FMC Alias Private Key: 7
2,984,862 UART: [art] Extend RT PCRs Done
2,985,290 UART: [art] Lock RT PCRs Done
2,986,604 UART: [art] Populate DV Done
2,994,717 UART: [fht] FMC Alias Private Key: 7
2,995,663 UART: [art] Derive CDI
2,995,943 UART: [art] Store in in slot 0x4
3,082,124 UART: [art] Derive Key Pair
3,082,484 UART: [art] Store priv key in slot 0x5
3,095,354 UART: [art] Derive Key Pair - Done
3,110,262 UART: [art] Signing Cert with AUTHO
3,110,742 UART: RITY.KEYID = 7
3,125,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,465 UART: [art] PUB.X = 91EA6F11737D4517A0577213A3CE766AC4F2176D6B74398627192413C4262AA55E5E220BFE2A1F112BD07CF5243E5D91
3,133,228 UART: [art] PUB.Y = 39B1C168A429D4ABBA88FB0ADEF4EE291AECB47E164A29B948A724DC334F0475283F915B506014AB54F401B1318B3AE2
3,140,179 UART: [art] SIG.R = B26B37945E0F2EE944EA9C38A8A52D77AF658996D0825CF599A16A373D2BAF71D51B06A61AE3E6AB8B9943C3394B9BE9
3,146,953 UART: [art] SIG.S = EF32549C9018C38B8476E9A765C265D9E79B66699717B3ABDC8758CCCA39CFDBAB1A8EB94D8EB0E0EC418CCF1F167DE3
3,170,582 UART: Caliptra RT
3,170,927 UART: [state] CFI Enabled
3,279,797 UART: [rt] RT listening for mailbox commands...
3,280,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,929 UART: [rt]cmd =0x44504543, len=96
3,492,585 >>> mbox cmd response data (6236 bytes)
3,492,586 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,153 UART: [rt]cmd =0x52564348, len=36
3,524,377 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 ready_for_fw is high
1,056,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,215 >>> mbox cmd response: success
2,686,033 UART:
2,686,049 UART: Running Caliptra FMC ...
2,686,457 UART:
2,686,600 UART: [state] CFI Enabled
2,697,493 UART: [fht] FMC Alias Private Key: 7
2,804,840 UART: [art] Extend RT PCRs Done
2,805,268 UART: [art] Lock RT PCRs Done
2,806,828 UART: [art] Populate DV Done
2,815,385 UART: [fht] FMC Alias Private Key: 7
2,816,369 UART: [art] Derive CDI
2,816,649 UART: [art] Store in in slot 0x4
2,902,336 UART: [art] Derive Key Pair
2,902,696 UART: [art] Store priv key in slot 0x5
2,915,816 UART: [art] Derive Key Pair - Done
2,930,706 UART: [art] Signing Cert with AUTHO
2,931,186 UART: RITY.KEYID = 7
2,946,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,053 UART: [art] PUB.X = 65866C7B7DD91B45FE587FC18190F67BE07D5BEC2B65834BD55058B37037578436F432DDA90F6A6F8AF0AF8BDA820F2A
2,953,827 UART: [art] PUB.Y = 3D6E106A32AAA7C4FDA2BB07B2D28DB054B4BDB22C5711E5B43D63A1D6EEE88093152B2B9F13EA083E2811C13E4CB02B
2,960,789 UART: [art] SIG.R = 9F89460ABBE7968A3F71C76FEE50512EFFDC39DBA61C8E8382CF9499C25C01F1989F0687BC0D1DA944EEE3E060E04E94
2,967,561 UART: [art] SIG.S = EC78252FFE70CAE162F200B218F360D4E76CB8F7281B3C87E993423B30AF1FBFD6945D858A411D75D01C39E059C4541F
2,991,640 UART: Caliptra RT
2,991,985 UART: [state] CFI Enabled
3,099,319 UART: [rt] RT listening for mailbox commands...
3,099,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,533 UART: [rt]cmd =0x44504543, len=96
3,310,573 >>> mbox cmd response data (6236 bytes)
3,310,574 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,111 UART: [rt]cmd =0x52564348, len=36
3,342,585 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,038 UART:
192,418 UART: Running Caliptra ROM ...
193,623 UART:
193,780 UART: [state] CFI Enabled
261,716 UART: [state] LifecycleState = Unprovisioned
263,651 UART: [state] DebugLocked = No
266,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,842 UART: [kat] SHA2-256
440,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,019 UART: [kat] ++
451,472 UART: [kat] sha1
461,796 UART: [kat] SHA2-256
464,451 UART: [kat] SHA2-384
469,518 UART: [kat] SHA2-512-ACC
471,885 UART: [kat] ECC-384
2,768,780 UART: [kat] HMAC-384Kdf
2,800,573 UART: [kat] LMS
3,990,906 UART: [kat] --
3,995,617 UART: [cold-reset] ++
3,997,263 UART: [fht] Storing FHT @ 0x50003400
4,007,884 UART: [idev] ++
4,008,463 UART: [idev] CDI.KEYID = 6
4,009,354 UART: [idev] SUBJECT.KEYID = 7
4,010,600 UART: [idev] UDS.KEYID = 0
4,011,679 ready_for_fw is high
4,011,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,498 UART: [idev] Erasing UDS.KEYID = 0
7,340,778 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,238 UART: [idev] --
7,365,340 UART: [ldev] ++
7,365,912 UART: [ldev] CDI.KEYID = 6
7,366,841 UART: [ldev] SUBJECT.KEYID = 5
7,368,052 UART: [ldev] AUTHORITY.KEYID = 7
7,369,348 UART: [ldev] FE.KEYID = 1
7,400,257 UART: [ldev] Erasing FE.KEYID = 1
10,735,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,121 UART: [ldev] --
13,113,681 UART: [fwproc] Waiting for Commands...
13,115,559 UART: [fwproc] Received command 0x46574c44
13,117,756 UART: [fwproc] Received Image of size 114124 bytes
17,161,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,642 >>> mbox cmd response: success
17,630,150 UART: [afmc] ++
17,630,771 UART: [afmc] CDI.KEYID = 6
17,631,686 UART: [afmc] SUBJECT.KEYID = 7
17,632,907 UART: [afmc] AUTHORITY.KEYID = 5
21,002,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,202 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,520 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,945 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,758 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,172 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,134 UART: [afmc] --
23,376,473 UART: [cold-reset] --
23,378,932 UART: [state] Locking Datavault
23,384,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,156 UART: [state] Locking ICCM
23,388,527 UART: [exit] Launching FMC @ 0x40000130
23,396,909 UART:
23,397,151 UART: Running Caliptra FMC ...
23,398,250 UART:
23,398,410 UART: [state] CFI Enabled
23,466,943 UART: [fht] FMC Alias Private Key: 7
25,805,437 UART: [art] Extend RT PCRs Done
25,806,657 UART: [art] Lock RT PCRs Done
25,808,261 UART: [art] Populate DV Done
25,813,457 UART: [fht] FMC Alias Private Key: 7
25,815,110 UART: [art] Derive CDI
25,815,846 UART: [art] Store in in slot 0x4
25,875,936 UART: [art] Derive Key Pair
25,876,976 UART: [art] Store priv key in slot 0x5
29,169,944 UART: [art] Derive Key Pair - Done
29,183,205 UART: [art] Signing Cert with AUTHO
29,184,501 UART: RITY.KEYID = 7
31,471,947 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,452 UART: [art] PUB.X = C9FF64148985CE9376782FAA0997AB058E97D34879DA07659D8E49456B465CEF2C660C56074775884C74A69006BAC5BF
31,480,665 UART: [art] PUB.Y = ECE12FCA310E7F0A66399002ABB0BA49717AECE92C74AEE3520D375BB9D8D7EA93911EC5E3165B09E504C9DF7F804953
31,487,961 UART: [art] SIG.R = 41DBF932CB5E1B8E4778A2163C58E8E25085060BE26586BCC3EB72E9733338D0A60C98D1D571A2368A5A9A150B25AC41
31,495,310 UART: [art] SIG.S = 7A6C96EF4079D5C894BF76E07FF900A99BFE7E932FBC7FAEB809AF3B06B9DA7EECDD003DC14DB57B6B319503F1EDDAAD
32,800,768 UART: Caliptra RT
32,801,483 UART: [state] CFI Enabled
32,962,326 UART: [rt] RT listening for mailbox commands...
32,964,210 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,994,019 UART: [rt]cmd =0x52564348, len=36
32,995,870 >>> mbox cmd response: failed
32,996,195 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,026,313 UART: [rt]cmd =0x52564348, len=36
33,028,077 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,816,871 ready_for_fw is high
3,817,440 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,901,128 >>> mbox cmd response: success
23,600,867 UART:
23,601,269 UART: Running Caliptra FMC ...
23,602,385 UART:
23,602,553 UART: [state] CFI Enabled
23,652,339 UART: [fht] FMC Alias Private Key: 7
25,990,179 UART: [art] Extend RT PCRs Done
25,991,400 UART: [art] Lock RT PCRs Done
25,993,122 UART: [art] Populate DV Done
25,998,547 UART: [fht] FMC Alias Private Key: 7
26,000,197 UART: [art] Derive CDI
26,000,948 UART: [art] Store in in slot 0x4
26,061,239 UART: [art] Derive Key Pair
26,062,284 UART: [art] Store priv key in slot 0x5
29,354,778 UART: [art] Derive Key Pair - Done
29,367,501 UART: [art] Signing Cert with AUTHO
29,368,826 UART: RITY.KEYID = 7
31,656,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,876 UART: [art] PUB.X = F18B09AF3A0BBCB9FA6A8285CD4FC948385B6D6D642739F12AABEB87D911F3CBD8A05E9316290106A901BACF4856A99D
31,665,125 UART: [art] PUB.Y = 5926079BAC3226252ED01886012A40BA050019CA0E8A66621238D244E282BD7C052CB49FC1635ACD29CBEDF63B0280DD
31,672,357 UART: [art] SIG.R = 0CBBEDB40E2FD2BE56D8EAB15CE1D742E88B231FDBBC6AA9B817124DFE3F72230706244F30C1D5E7A255236EEAE6E739
31,679,808 UART: [art] SIG.S = 3DD29844BD2F17E0396AF7D9ADC7C9E7B81778BAD4BE9C6720FEB2FB248886C5EBE28E1A9F2D47EC45EF35D20CE9EAB1
32,984,765 UART: Caliptra RT
32,985,481 UART: [state] CFI Enabled
33,147,571 UART: [rt] RT listening for mailbox commands...
33,149,561 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,179,704 UART: [rt]cmd =0x52564348, len=36
33,181,462 >>> mbox cmd response: failed
33,181,764 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,211,655 UART: [rt]cmd =0x52564348, len=36
33,213,678 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,201 UART:
192,569 UART: Running Caliptra ROM ...
193,764 UART:
603,209 UART: [state] CFI Enabled
617,866 UART: [state] LifecycleState = Unprovisioned
619,813 UART: [state] DebugLocked = No
622,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,125 UART: [kat] SHA2-256
796,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,430 UART: [kat] ++
807,874 UART: [kat] sha1
818,171 UART: [kat] SHA2-256
820,892 UART: [kat] SHA2-384
826,594 UART: [kat] SHA2-512-ACC
828,959 UART: [kat] ECC-384
3,112,035 UART: [kat] HMAC-384Kdf
3,124,078 UART: [kat] LMS
4,314,237 UART: [kat] --
4,319,287 UART: [cold-reset] ++
4,321,440 UART: [fht] Storing FHT @ 0x50003400
4,331,632 UART: [idev] ++
4,332,258 UART: [idev] CDI.KEYID = 6
4,333,140 UART: [idev] SUBJECT.KEYID = 7
4,334,450 UART: [idev] UDS.KEYID = 0
4,335,433 ready_for_fw is high
4,335,637 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,997 UART: [idev] Erasing UDS.KEYID = 0
7,621,148 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,447 UART: [idev] --
7,646,629 UART: [ldev] ++
7,647,196 UART: [ldev] CDI.KEYID = 6
7,648,164 UART: [ldev] SUBJECT.KEYID = 5
7,649,391 UART: [ldev] AUTHORITY.KEYID = 7
7,650,619 UART: [ldev] FE.KEYID = 1
7,661,200 UART: [ldev] Erasing FE.KEYID = 1
10,949,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,899 UART: [ldev] --
13,310,293 UART: [fwproc] Waiting for Commands...
13,312,591 UART: [fwproc] Received command 0x46574c44
13,314,771 UART: [fwproc] Received Image of size 114124 bytes
17,367,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,197 >>> mbox cmd response: success
17,831,257 UART: [afmc] ++
17,832,048 UART: [afmc] CDI.KEYID = 6
17,832,963 UART: [afmc] SUBJECT.KEYID = 7
17,834,002 UART: [afmc] AUTHORITY.KEYID = 5
21,146,722 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,404 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,668 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,045 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,870 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,342 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,329 UART: [afmc] --
23,511,324 UART: [cold-reset] --
23,513,965 UART: [state] Locking Datavault
23,520,577 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,387 UART: [state] Locking ICCM
23,524,189 UART: [exit] Launching FMC @ 0x40000130
23,532,607 UART:
23,532,850 UART: Running Caliptra FMC ...
23,533,954 UART:
23,534,111 UART: [state] CFI Enabled
23,542,045 UART: [fht] FMC Alias Private Key: 7
25,873,033 UART: [art] Extend RT PCRs Done
25,874,257 UART: [art] Lock RT PCRs Done
25,875,818 UART: [art] Populate DV Done
25,881,115 UART: [fht] FMC Alias Private Key: 7
25,882,605 UART: [art] Derive CDI
25,883,336 UART: [art] Store in in slot 0x4
25,926,030 UART: [art] Derive Key Pair
25,927,066 UART: [art] Store priv key in slot 0x5
29,169,116 UART: [art] Derive Key Pair - Done
29,181,946 UART: [art] Signing Cert with AUTHO
29,183,245 UART: RITY.KEYID = 7
31,462,590 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,098 UART: [art] PUB.X = C13FB71B8D5BCA1178886D13927102AAC9FF8FF9A848B64C63807D41B3D039362695E3C122549AD256922E82791E2901
31,471,307 UART: [art] PUB.Y = 05C0C6F88BC8ABDF62429298B607BB7C52DC696E01CDF23B61CA7C481F785D6A5633960D86C97384FC8DB8F100B7BBBC
31,478,584 UART: [art] SIG.R = 0913087D8259BB61CF69979616A8B437F62F1E54DA75FAC70A8D1BC9690BB0299782E8CAB1B5B50D0B8C9D0823CDB2AC
31,485,961 UART: [art] SIG.S = C04918E0337F41C3BE171243D3EEEEC1A185191D9D07332FFED1A28524484123C41CE09E81F041F5C8D5511A96B4D4EB
32,790,755 UART: Caliptra RT
32,791,498 UART: [state] CFI Enabled
32,909,546 UART: [rt] RT listening for mailbox commands...
32,911,428 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,941,526 UART: [rt]cmd =0x52564348, len=36
32,943,066 >>> mbox cmd response: failed
32,943,374 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,973,488 UART: [rt]cmd =0x52564348, len=36
32,975,544 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,129,118 ready_for_fw is high
4,129,527 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,110 >>> mbox cmd response: success
23,715,325 UART:
23,715,713 UART: Running Caliptra FMC ...
23,716,907 UART:
23,717,072 UART: [state] CFI Enabled
23,725,152 UART: [fht] FMC Alias Private Key: 7
26,054,910 UART: [art] Extend RT PCRs Done
26,056,142 UART: [art] Lock RT PCRs Done
26,057,578 UART: [art] Populate DV Done
26,063,061 UART: [fht] FMC Alias Private Key: 7
26,064,653 UART: [art] Derive CDI
26,065,385 UART: [art] Store in in slot 0x4
26,107,919 UART: [art] Derive Key Pair
26,108,909 UART: [art] Store priv key in slot 0x5
29,350,829 UART: [art] Derive Key Pair - Done
29,364,094 UART: [art] Signing Cert with AUTHO
29,365,406 UART: RITY.KEYID = 7
31,644,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,309 UART: [art] PUB.X = BD44AAB3AAA9E5B003FDCF4B09E63E62FA0CDC22823BC1C9632D01641F546F08E14A007B2407D765ABB53926243B8C5D
31,653,579 UART: [art] PUB.Y = 2F1664826BD2339B3FB4313B8C78FE2DD2F5212EE91782349B2724CBFC663A19CC919AEC86D3C0AF458FCE1033326BFD
31,660,837 UART: [art] SIG.R = 88DD4B8AE5E1BECBA9F6818242296813ED80F7B9BDAA759812A826A41B0245F28575DDA1409CB2EDDB1453A456FFE701
31,668,224 UART: [art] SIG.S = F21BCD1B08E47A253893D58A59213C07489228AA88ABFA3831D61CF375C15C98099B5945A4F25678C3C22B9A59E18FA7
32,973,437 UART: Caliptra RT
32,974,152 UART: [state] CFI Enabled
33,092,364 UART: [rt] RT listening for mailbox commands...
33,094,256 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,124,351 UART: [rt]cmd =0x52564348, len=36
33,126,003 >>> mbox cmd response: failed
33,126,354 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,156,372 UART: [rt]cmd =0x52564348, len=36
33,158,164 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,152 UART:
192,534 UART: Running Caliptra ROM ...
193,723 UART:
193,873 UART: [state] CFI Enabled
264,821 UART: [state] LifecycleState = Unprovisioned
266,729 UART: [state] DebugLocked = No
267,997 UART: [state] WD Timer not started. Device not locked for debugging
272,453 UART: [kat] SHA2-256
451,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,141 UART: [kat] ++
463,689 UART: [kat] sha1
475,209 UART: [kat] SHA2-256
478,285 UART: [kat] SHA2-384
484,556 UART: [kat] SHA2-512-ACC
487,556 UART: [kat] ECC-384
2,948,504 UART: [kat] HMAC-384Kdf
2,972,125 UART: [kat] LMS
3,501,537 UART: [kat] --
3,507,023 UART: [cold-reset] ++
3,509,317 UART: [fht] FHT @ 0x50003400
3,520,508 UART: [idev] ++
3,521,074 UART: [idev] CDI.KEYID = 6
3,521,992 UART: [idev] SUBJECT.KEYID = 7
3,523,234 UART: [idev] UDS.KEYID = 0
3,524,133 ready_for_fw is high
3,524,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,247 UART: [idev] Erasing UDS.KEYID = 0
6,025,902 UART: [idev] Sha1 KeyId Algorithm
6,048,864 UART: [idev] --
6,053,186 UART: [ldev] ++
6,053,755 UART: [ldev] CDI.KEYID = 6
6,055,046 UART: [ldev] SUBJECT.KEYID = 5
6,056,169 UART: [ldev] AUTHORITY.KEYID = 7
6,057,365 UART: [ldev] FE.KEYID = 1
6,101,229 UART: [ldev] Erasing FE.KEYID = 1
8,604,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,245 UART: [ldev] --
10,415,456 UART: [fwproc] Wait for Commands...
10,418,686 UART: [fwproc] Recv command 0x46574c44
10,420,779 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,578 >>> mbox cmd response: success
14,285,771 UART: [afmc] ++
14,286,395 UART: [afmc] CDI.KEYID = 6
14,287,310 UART: [afmc] SUBJECT.KEYID = 7
14,288,474 UART: [afmc] AUTHORITY.KEYID = 5
16,829,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,684 UART: [afmc] --
18,629,989 UART: [cold-reset] --
18,633,257 UART: [state] Locking Datavault
18,638,824 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,464 UART: [state] Locking ICCM
18,641,804 UART: [exit] Launching FMC @ 0x40000130
18,650,202 UART:
18,650,464 UART: Running Caliptra FMC ...
18,651,564 UART:
18,651,740 UART: [state] CFI Enabled
18,714,438 UART: [fht] FMC Alias Private Key: 7
20,478,523 UART: [art] Extend RT PCRs Done
20,480,019 UART: [art] Lock RT PCRs Done
20,481,583 UART: [art] Populate DV Done
20,486,990 UART: [fht] FMC Alias Private Key: 7
20,488,633 UART: [art] Derive CDI
20,489,442 UART: [art] Store in in slot 0x4
20,548,284 UART: [art] Derive Key Pair
20,549,333 UART: [art] Store priv key in slot 0x5
23,012,412 UART: [art] Derive Key Pair - Done
23,025,492 UART: [art] Signing Cert with AUTHO
23,026,828 UART: RITY.KEYID = 7
24,740,407 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,932 UART: [art] PUB.X = 534391F95C6296C2618E57D051DAA7D9691EAC55A27E75820241775B372820F2B44C62BE7ACB28CFF8AB9791BF7E63EF
24,749,139 UART: [art] PUB.Y = D0BB9A3F67EE460AD85DD4E804AE2ED4AEF29060908DA08A969E627859EB0E21F900CB96C9E366E3206EE7CCE9C1A63B
24,756,424 UART: [art] SIG.R = 1C4C369D68AF73163FA2D467DC4D193DE59FCED9CFFA795B20C5D7EB7ABD04428FF9C7A850292FEBEF55A27645C49897
24,763,866 UART: [art] SIG.S = 3A6EE05A88030AB8B0F27EB7614E823F778B36166B058A6AD0B443CC528419EA1CDDD9DF0C76A7930E3CA67949796935
25,743,026 UART: Caliptra RT
25,743,725 UART: [state] CFI Enabled
25,908,140 UART: [rt] RT listening for mailbox commands...
25,910,021 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,940,740 UART: [rt]cmd =0x52564348, len=36
25,942,259 >>> mbox cmd response: failed
25,942,564 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,972,520 UART: [rt]cmd =0x52564348, len=36
25,974,389 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,361,930 ready_for_fw is high
3,362,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,313 >>> mbox cmd response: success
18,346,663 UART:
18,347,069 UART: Running Caliptra FMC ...
18,348,198 UART:
18,348,359 UART: [state] CFI Enabled
18,411,864 UART: [fht] FMC Alias Private Key: 7
20,176,161 UART: [art] Extend RT PCRs Done
20,177,375 UART: [art] Lock RT PCRs Done
20,179,129 UART: [art] Populate DV Done
20,184,536 UART: [fht] FMC Alias Private Key: 7
20,186,123 UART: [art] Derive CDI
20,186,867 UART: [art] Store in in slot 0x4
20,244,015 UART: [art] Derive Key Pair
20,245,050 UART: [art] Store priv key in slot 0x5
22,707,746 UART: [art] Derive Key Pair - Done
22,720,475 UART: [art] Signing Cert with AUTHO
22,721,806 UART: RITY.KEYID = 7
24,432,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,840 UART: [art] PUB.X = 0A272A29D9B8078DB58355B324810E05D0315FFEB81384D286518359542F53780FD6F7B75AA70485FC69E8B577954201
24,441,116 UART: [art] PUB.Y = C5A18745329A13135C982E10429C0842068D8024571986AC6948FB7099ED7E949703829A442A744B69817BD6971AB21E
24,448,280 UART: [art] SIG.R = 4B203A730C918389055CD6C2B55C368B4DC797C2CEB5854FF3D2CC26655E7D2B7B989E7AE2F520BE753B3CF26B6133A3
24,455,681 UART: [art] SIG.S = C728C634EE54F8F22E3B60E8714A36FCF512753B3A7FAA72E2D5101F4B8DA80A891E922B9675CC4FB710D2331747E59A
25,434,768 UART: Caliptra RT
25,435,481 UART: [state] CFI Enabled
25,601,098 UART: [rt] RT listening for mailbox commands...
25,602,982 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,633,515 UART: [rt]cmd =0x52564348, len=36
25,635,357 >>> mbox cmd response: failed
25,635,667 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,665,619 UART: [rt]cmd =0x52564348, len=36
25,667,373 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,537 UART:
192,903 UART: Running Caliptra ROM ...
194,538 UART:
603,568 UART: [state] CFI Enabled
614,672 UART: [state] LifecycleState = Unprovisioned
616,540 UART: [state] DebugLocked = No
619,116 UART: [state] WD Timer not started. Device not locked for debugging
623,694 UART: [kat] SHA2-256
802,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,388 UART: [kat] ++
814,832 UART: [kat] sha1
826,901 UART: [kat] SHA2-256
829,965 UART: [kat] SHA2-384
836,764 UART: [kat] SHA2-512-ACC
839,741 UART: [kat] ECC-384
3,280,019 UART: [kat] HMAC-384Kdf
3,291,545 UART: [kat] LMS
3,820,998 UART: [kat] --
3,825,810 UART: [cold-reset] ++
3,828,377 UART: [fht] FHT @ 0x50003400
3,839,698 UART: [idev] ++
3,840,263 UART: [idev] CDI.KEYID = 6
3,841,181 UART: [idev] SUBJECT.KEYID = 7
3,842,350 UART: [idev] UDS.KEYID = 0
3,843,388 ready_for_fw is high
3,843,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,462 UART: [idev] Erasing UDS.KEYID = 0
6,315,177 UART: [idev] Sha1 KeyId Algorithm
6,337,758 UART: [idev] --
6,340,939 UART: [ldev] ++
6,341,502 UART: [ldev] CDI.KEYID = 6
6,342,507 UART: [ldev] SUBJECT.KEYID = 5
6,343,601 UART: [ldev] AUTHORITY.KEYID = 7
6,344,874 UART: [ldev] FE.KEYID = 1
6,354,775 UART: [ldev] Erasing FE.KEYID = 1
8,828,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,155 UART: [ldev] --
10,618,495 UART: [fwproc] Wait for Commands...
10,620,805 UART: [fwproc] Recv command 0x46574c44
10,622,888 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,316 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,981 >>> mbox cmd response: success
14,490,849 UART: [afmc] ++
14,491,440 UART: [afmc] CDI.KEYID = 6
14,492,346 UART: [afmc] SUBJECT.KEYID = 7
14,493,499 UART: [afmc] AUTHORITY.KEYID = 5
16,994,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,908 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,106 UART: [afmc] --
18,790,105 UART: [cold-reset] --
18,792,605 UART: [state] Locking Datavault
18,796,339 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,037 UART: [state] Locking ICCM
18,799,752 UART: [exit] Launching FMC @ 0x40000130
18,808,145 UART:
18,808,380 UART: Running Caliptra FMC ...
18,809,477 UART:
18,809,634 UART: [state] CFI Enabled
18,817,892 UART: [fht] FMC Alias Private Key: 7
20,575,564 UART: [art] Extend RT PCRs Done
20,576,781 UART: [art] Lock RT PCRs Done
20,578,508 UART: [art] Populate DV Done
20,583,963 UART: [fht] FMC Alias Private Key: 7
20,585,572 UART: [art] Derive CDI
20,586,385 UART: [art] Store in in slot 0x4
20,628,708 UART: [art] Derive Key Pair
20,629,747 UART: [art] Store priv key in slot 0x5
23,056,277 UART: [art] Derive Key Pair - Done
23,069,384 UART: [art] Signing Cert with AUTHO
23,070,691 UART: RITY.KEYID = 7
24,776,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,613 UART: [art] PUB.X = 735913C2C57C999F2CAACFF4F02C6AD8FB9323E6B6A7C1C95DA4A33D73EED6CC7CB1D4754E3532023F9FB48210D857D3
24,784,911 UART: [art] PUB.Y = 60C42A20F2C9E371AD59CAFAABD2407C0A5E46408507AFD63FE55931B01BE1EB1D27956D4EB538700B2F8681AE62AAF5
24,792,173 UART: [art] SIG.R = 10F03CCAC3DF99881E079E99B1BFE9DF848DF5429292683DAD8D7D6E6C0BA685797918FBC08F64BBFB355F6814B0EB6B
24,799,582 UART: [art] SIG.S = 403D44D4EF7D3AB0E5ABFBA342278A90069DBD1D86E0F787064BF6223587C1B2127F15267FEA7DC2D8223157095FEF9B
25,778,992 UART: Caliptra RT
25,779,683 UART: [state] CFI Enabled
25,896,977 UART: [rt] RT listening for mailbox commands...
25,898,859 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,928,902 UART: [rt]cmd =0x52564348, len=36
25,930,608 >>> mbox cmd response: failed
25,930,906 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,960,963 UART: [rt]cmd =0x52564348, len=36
25,962,861 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,694,366 ready_for_fw is high
3,694,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,224 >>> mbox cmd response: success
18,506,242 UART:
18,506,642 UART: Running Caliptra FMC ...
18,507,833 UART:
18,507,998 UART: [state] CFI Enabled
18,515,893 UART: [fht] FMC Alias Private Key: 7
20,272,990 UART: [art] Extend RT PCRs Done
20,274,217 UART: [art] Lock RT PCRs Done
20,275,846 UART: [art] Populate DV Done
20,281,201 UART: [fht] FMC Alias Private Key: 7
20,282,681 UART: [art] Derive CDI
20,283,435 UART: [art] Store in in slot 0x4
20,326,072 UART: [art] Derive Key Pair
20,327,068 UART: [art] Store priv key in slot 0x5
22,753,543 UART: [art] Derive Key Pair - Done
22,766,375 UART: [art] Signing Cert with AUTHO
22,767,672 UART: RITY.KEYID = 7
24,472,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,491 UART: [art] PUB.X = 3D0D9C3580969C55E86FD3DE57479F249B8C3C00BDDA1FDABC4ADAE67AC0AA9CF97441224EB5BB1A2E3B1589B09CBB08
24,481,771 UART: [art] PUB.Y = 7E2FC0EE4716B05160C12277F0F8CE53EB9FE15AB8E5A5945E90D329E6A4179C50DB479BB36A4D3D7865DEF034F47136
24,489,062 UART: [art] SIG.R = FADB05FD7E7E5221977614923465AFAB9E3E1AC87C476493E90DA7442ECA416606899E165277BDAEC40402D06C939B55
24,496,397 UART: [art] SIG.S = CFA2CEE3E893CA4F67061873954C830262C36D5A3083CE1CB8793DA20E557307F73892DC69C7BAABF3B61E5FA3C99C17
25,475,719 UART: Caliptra RT
25,476,440 UART: [state] CFI Enabled
25,593,286 UART: [rt] RT listening for mailbox commands...
25,595,169 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,624,996 UART: [rt]cmd =0x52564348, len=36
25,627,115 >>> mbox cmd response: failed
25,627,423 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,657,319 UART: [rt]cmd =0x52564348, len=36
25,659,398 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,012 UART:
192,379 UART: Running Caliptra ROM ...
193,533 UART:
193,684 UART: [state] CFI Enabled
264,946 UART: [state] LifecycleState = Unprovisioned
267,383 UART: [state] DebugLocked = No
270,085 UART: [state] WD Timer not started. Device not locked for debugging
274,133 UART: [kat] SHA2-256
463,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,782 UART: [kat] ++
475,260 UART: [kat] sha1
486,844 UART: [kat] SHA2-256
489,916 UART: [kat] SHA2-384
495,839 UART: [kat] SHA2-512-ACC
498,418 UART: [kat] ECC-384
2,948,012 UART: [kat] HMAC-384Kdf
2,973,034 UART: [kat] LMS
3,504,768 UART: [kat] --
3,507,842 UART: [cold-reset] ++
3,508,777 UART: [fht] FHT @ 0x50003400
3,520,532 UART: [idev] ++
3,521,237 UART: [idev] CDI.KEYID = 6
3,522,163 UART: [idev] SUBJECT.KEYID = 7
3,523,336 UART: [idev] UDS.KEYID = 0
3,524,258 ready_for_fw is high
3,524,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,395 UART: [idev] Erasing UDS.KEYID = 0
6,028,738 UART: [idev] Sha1 KeyId Algorithm
6,050,605 UART: [idev] --
6,056,531 UART: [ldev] ++
6,057,219 UART: [ldev] CDI.KEYID = 6
6,058,133 UART: [ldev] SUBJECT.KEYID = 5
6,059,291 UART: [ldev] AUTHORITY.KEYID = 7
6,060,524 UART: [ldev] FE.KEYID = 1
6,100,111 UART: [ldev] Erasing FE.KEYID = 1
8,607,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,448 UART: [ldev] --
10,415,688 UART: [fwproc] Wait for Commands...
10,417,671 UART: [fwproc] Recv command 0x46574c44
10,420,071 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,612,060 >>> mbox cmd response: success
14,616,091 UART: [afmc] ++
14,616,796 UART: [afmc] CDI.KEYID = 6
14,617,960 UART: [afmc] SUBJECT.KEYID = 7
14,619,500 UART: [afmc] AUTHORITY.KEYID = 5
17,152,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,479 UART: [afmc] --
18,948,562 UART: [cold-reset] --
18,953,178 UART: [state] Locking Datavault
18,958,323 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,456 UART: [state] Locking ICCM
18,961,803 UART: [exit] Launching FMC @ 0x40000130
18,970,479 UART:
18,970,711 UART: Running Caliptra FMC ...
18,971,750 UART:
18,971,898 UART: [state] CFI Enabled
19,032,421 UART: [fht] FMC Alias Private Key: 7
20,796,571 UART: [art] Extend RT PCRs Done
20,797,797 UART: [art] Lock RT PCRs Done
20,799,369 UART: [art] Populate DV Done
20,805,050 UART: [fht] FMC Alias Private Key: 7
20,806,643 UART: [art] Derive CDI
20,807,404 UART: [art] Store in in slot 0x4
20,864,660 UART: [art] Derive Key Pair
20,865,699 UART: [art] Store priv key in slot 0x5
23,328,587 UART: [art] Derive Key Pair - Done
23,341,854 UART: [art] Signing Cert with AUTHO
23,343,154 UART: RITY.KEYID = 7
25,054,151 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,642 UART: [art] PUB.X = BF6460C60EDE45E8682F87A93AF55E7EBAD5B0812B3F3CCDEFDC5233606C9048D856A23BB1F1894CB5D36924149EA90F
25,062,965 UART: [art] PUB.Y = 138D2B7A556B032C8926DBACF677DB22ABE011A8ED24952CE5C8F308142833C270F8B84A28DDA64702E29DCDB50AFD36
25,070,212 UART: [art] SIG.R = 6ED7571EF75D400BDF2E27A99233FC1BC429398011E6D7ED488188A91438D96CCE65BA7C9E996E0253DD1088A4AC726C
25,077,604 UART: [art] SIG.S = 126FA8D3ACA013E9FCC086871130BA43E49155BA36DC822CBDCE70D01C33AA9C2B8B309253F1DE6120891226E2306C00
26,056,696 UART: Caliptra RT
26,057,429 UART: [state] CFI Enabled
26,221,454 UART: [rt] RT listening for mailbox commands...
26,223,341 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,254,197 UART: [rt]cmd =0x52564348, len=36
26,255,988 >>> mbox cmd response: failed
26,256,296 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,286,111 UART: [rt]cmd =0x52564348, len=36
26,287,749 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,438,287 ready_for_fw is high
3,438,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,671 >>> mbox cmd response: success
19,045,863 UART:
19,046,296 UART: Running Caliptra FMC ...
19,047,434 UART:
19,047,603 UART: [state] CFI Enabled
19,115,018 UART: [fht] FMC Alias Private Key: 7
20,878,246 UART: [art] Extend RT PCRs Done
20,879,470 UART: [art] Lock RT PCRs Done
20,881,424 UART: [art] Populate DV Done
20,886,992 UART: [fht] FMC Alias Private Key: 7
20,888,687 UART: [art] Derive CDI
20,889,520 UART: [art] Store in in slot 0x4
20,946,998 UART: [art] Derive Key Pair
20,948,041 UART: [art] Store priv key in slot 0x5
23,411,408 UART: [art] Derive Key Pair - Done
23,424,350 UART: [art] Signing Cert with AUTHO
23,425,649 UART: RITY.KEYID = 7
25,136,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,182 UART: [art] PUB.X = D7AD8F3BB67E5127CEB5EB7AE22A8C60D478F603A66CD55D11B696F9C39767D66EFCBED8E3117406063F358E1BEE4A66
25,145,479 UART: [art] PUB.Y = A1AD5C4B36B1890D7EDC95CE8B8D35A2B7369B7C0028A3FF4D3D27F985D4A6FB97045BAA29FB16209919EAB3218DE2D1
25,152,735 UART: [art] SIG.R = 3F9321B5515554AE2834350779C42EE1F7C8A8C7C30A399AFC1F2370D27CBEE94A2875BD4C2916DC2B71A0E1CE321587
25,160,122 UART: [art] SIG.S = 62FE385E1136D715A11C2C182ACD9DA39D3FB52576C9ABC37456412609F08036278431FEAD0BCD0E81F2C2EC7CAF9C78
26,139,493 UART: Caliptra RT
26,140,182 UART: [state] CFI Enabled
26,305,914 UART: [rt] RT listening for mailbox commands...
26,307,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,338,373 UART: [rt]cmd =0x52564348, len=36
26,340,253 >>> mbox cmd response: failed
26,340,569 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,370,364 UART: [rt]cmd =0x52564348, len=36
26,372,118 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,437 UART:
192,796 UART: Running Caliptra ROM ...
193,980 UART:
603,640 UART: [state] CFI Enabled
618,185 UART: [state] LifecycleState = Unprovisioned
620,515 UART: [state] DebugLocked = No
621,833 UART: [state] WD Timer not started. Device not locked for debugging
626,708 UART: [kat] SHA2-256
816,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,387 UART: [kat] ++
827,983 UART: [kat] sha1
839,424 UART: [kat] SHA2-256
842,492 UART: [kat] SHA2-384
847,984 UART: [kat] SHA2-512-ACC
850,625 UART: [kat] ECC-384
3,295,397 UART: [kat] HMAC-384Kdf
3,307,342 UART: [kat] LMS
3,839,187 UART: [kat] --
3,842,801 UART: [cold-reset] ++
3,843,952 UART: [fht] FHT @ 0x50003400
3,855,513 UART: [idev] ++
3,856,145 UART: [idev] CDI.KEYID = 6
3,857,168 UART: [idev] SUBJECT.KEYID = 7
3,858,334 UART: [idev] UDS.KEYID = 0
3,859,254 ready_for_fw is high
3,859,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,157 UART: [idev] Erasing UDS.KEYID = 0
6,331,171 UART: [idev] Sha1 KeyId Algorithm
6,353,257 UART: [idev] --
6,357,896 UART: [ldev] ++
6,358,576 UART: [ldev] CDI.KEYID = 6
6,359,484 UART: [ldev] SUBJECT.KEYID = 5
6,360,686 UART: [ldev] AUTHORITY.KEYID = 7
6,361,863 UART: [ldev] FE.KEYID = 1
6,371,070 UART: [ldev] Erasing FE.KEYID = 1
8,850,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,425 UART: [ldev] --
10,642,010 UART: [fwproc] Wait for Commands...
10,643,883 UART: [fwproc] Recv command 0x46574c44
10,646,127 UART: [fwproc] Recv'd Img size: 114448 bytes
14,091,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,124 >>> mbox cmd response: success
14,832,105 UART: [afmc] ++
14,832,816 UART: [afmc] CDI.KEYID = 6
14,833,928 UART: [afmc] SUBJECT.KEYID = 7
14,835,469 UART: [afmc] AUTHORITY.KEYID = 5
17,338,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,471 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,327 UART: [afmc] --
19,134,736 UART: [cold-reset] --
19,139,567 UART: [state] Locking Datavault
19,147,191 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,332 UART: [state] Locking ICCM
19,150,619 UART: [exit] Launching FMC @ 0x40000130
19,159,297 UART:
19,159,524 UART: Running Caliptra FMC ...
19,160,613 UART:
19,160,769 UART: [state] CFI Enabled
19,168,824 UART: [fht] FMC Alias Private Key: 7
20,925,826 UART: [art] Extend RT PCRs Done
20,927,040 UART: [art] Lock RT PCRs Done
20,928,845 UART: [art] Populate DV Done
20,934,728 UART: [fht] FMC Alias Private Key: 7
20,936,144 UART: [art] Derive CDI
20,936,875 UART: [art] Store in in slot 0x4
20,979,455 UART: [art] Derive Key Pair
20,980,446 UART: [art] Store priv key in slot 0x5
23,407,195 UART: [art] Derive Key Pair - Done
23,420,177 UART: [art] Signing Cert with AUTHO
23,421,502 UART: RITY.KEYID = 7
25,126,892 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,393 UART: [art] PUB.X = 2EB72DA39B17CC8538E0C1925C908FF67C1ACCA74FAF9E13323720A61A40ABF02ED82C219E0C8512E40C0A38F906950A
25,135,670 UART: [art] PUB.Y = 3F92133B463EAEA42E350FA883454B5C6E66D2B1B0A82FB71382B5E0D090530F215C537139A6739C78C05B4CB57EFFA5
25,142,924 UART: [art] SIG.R = 50D20DB8EEE3F98D0AEFBAE490CA12723DDCCCA85B787E36BE09C925C30D1CD08F886C12B1EC2DEEBAEAAF6F48E8A5F6
25,150,372 UART: [art] SIG.S = 8D2EEEE251144749658FFB4AB894CE85312B0FE046729E99081F5D08A24D4B801AD0CFDC03779D1ECBAA482362C26E35
26,128,756 UART: Caliptra RT
26,129,459 UART: [state] CFI Enabled
26,246,369 UART: [rt] RT listening for mailbox commands...
26,248,255 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,278,399 UART: [rt]cmd =0x52564348, len=36
26,280,258 >>> mbox cmd response: failed
26,280,548 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,310,659 UART: [rt]cmd =0x52564348, len=36
26,312,336 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,254 writing to cptra_bootfsm_go
3,757,603 ready_for_fw is high
3,757,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,746 >>> mbox cmd response: success
19,216,589 UART:
19,216,995 UART: Running Caliptra FMC ...
19,218,126 UART:
19,218,280 UART: [state] CFI Enabled
19,226,326 UART: [fht] FMC Alias Private Key: 7
20,983,284 UART: [art] Extend RT PCRs Done
20,984,525 UART: [art] Lock RT PCRs Done
20,986,312 UART: [art] Populate DV Done
20,991,881 UART: [fht] FMC Alias Private Key: 7
20,993,362 UART: [art] Derive CDI
20,994,093 UART: [art] Store in in slot 0x4
21,037,016 UART: [art] Derive Key Pair
21,038,018 UART: [art] Store priv key in slot 0x5
23,464,646 UART: [art] Derive Key Pair - Done
23,477,700 UART: [art] Signing Cert with AUTHO
23,479,003 UART: RITY.KEYID = 7
25,184,612 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,120 UART: [art] PUB.X = 00FF20F827FAC882B73BB244BC8776995450F59C30524A83A73445CF417DCE29BF61437F90AB6A0E2891F1A2DE6AA655
25,193,352 UART: [art] PUB.Y = 7D1C9699CEBBF36670B61DC81FE585144C8F50A9BEAAD4444FE55AF2559E96908184556DFFE6B1290693F20B89A8D338
25,200,618 UART: [art] SIG.R = D2CFAB65E8C5ED1982539FA91C21E4047A713DE754EF89DDA2C97E457B38ECC194D05C802C6BE55DD9A19BCA1F5E9504
25,208,031 UART: [art] SIG.S = 5FD85F845033F04DEDD54FFF879F86002CD778887F6362313260E493D2EBACC2F5F232290D3FE2FA16B30EB59674217C
26,186,574 UART: Caliptra RT
26,187,280 UART: [state] CFI Enabled
26,303,965 UART: [rt] RT listening for mailbox commands...
26,305,863 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,335,799 UART: [rt]cmd =0x52564348, len=36
26,337,647 >>> mbox cmd response: failed
26,337,945 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,367,939 UART: [rt]cmd =0x52564348, len=36
26,369,745 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
889,985 UART: [kat] SHA2-256
891,923 UART: [kat] SHA2-384
894,498 UART: [kat] SHA2-512-ACC
896,399 UART: [kat] ECC-384
902,006 UART: [kat] HMAC-384Kdf
906,752 UART: [kat] LMS
1,474,948 UART: [kat] --
1,475,857 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,479,012 UART: [idev] ++
1,479,180 UART: [idev] CDI.KEYID = 6
1,479,540 UART: [idev] SUBJECT.KEYID = 7
1,479,964 UART: [idev] UDS.KEYID = 0
1,480,309 ready_for_fw is high
1,480,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,478 UART: [idev] Erasing UDS.KEYID = 0
1,503,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,624 UART: [idev] --
1,513,873 UART: [ldev] ++
1,514,041 UART: [ldev] CDI.KEYID = 6
1,514,404 UART: [ldev] SUBJECT.KEYID = 5
1,514,830 UART: [ldev] AUTHORITY.KEYID = 7
1,515,293 UART: [ldev] FE.KEYID = 1
1,520,233 UART: [ldev] Erasing FE.KEYID = 1
1,545,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,026 UART: [ldev] --
1,584,521 UART: [fwproc] Waiting for Commands...
1,585,356 UART: [fwproc] Received command 0x46574c44
1,586,147 UART: [fwproc] Received Image of size 114448 bytes
2,884,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,368 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,829 >>> mbox cmd response: success
3,079,009 UART: [afmc] ++
3,079,177 UART: [afmc] CDI.KEYID = 6
3,079,539 UART: [afmc] SUBJECT.KEYID = 7
3,079,964 UART: [afmc] AUTHORITY.KEYID = 5
3,115,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,851 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,244 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,934 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,613 UART: [afmc] --
3,158,543 UART: [cold-reset] --
3,159,273 UART: [state] Locking Datavault
3,160,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,142 UART: [state] Locking ICCM
3,161,574 UART: [exit] Launching FMC @ 0x40000130
3,166,903 UART:
3,166,919 UART: Running Caliptra FMC ...
3,167,327 UART:
3,167,381 UART: [state] CFI Enabled
3,177,650 UART: [fht] FMC Alias Private Key: 7
3,285,519 UART: [art] Extend RT PCRs Done
3,285,947 UART: [art] Lock RT PCRs Done
3,287,457 UART: [art] Populate DV Done
3,295,608 UART: [fht] FMC Alias Private Key: 7
3,296,772 UART: [art] Derive CDI
3,297,052 UART: [art] Store in in slot 0x4
3,381,917 UART: [art] Derive Key Pair
3,382,277 UART: [art] Store priv key in slot 0x5
3,394,929 UART: [art] Derive Key Pair - Done
3,409,717 UART: [art] Signing Cert with AUTHO
3,410,197 UART: RITY.KEYID = 7
3,425,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,046 UART: [art] PUB.X = E0CB5E002793FC3C232B3481DEBFEADFCAFA3D5CD8B76320BAAD020706D3610A86040F6BB0F95763D4D0C684F9A20268
3,432,789 UART: [art] PUB.Y = 37E5FE79D14E4FDB3A3E377E0A625B6104F25AA057D5AD09E9C8B71BC08B01F563B2A01232AA05A8F7C65B4D6659D3F9
3,439,736 UART: [art] SIG.R = 241B232D5C5B54C945BDBEDCA01A9784150A5E2AB5B59AF8ADFB7D7A739A16082FFF2CEE0195CD264EECD0EAA3731D78
3,446,521 UART: [art] SIG.S = 4A0AE559CB8F998E2B279FBE5D18EF8B2FDAA3621A62786794450130706C735578F73BFE6DD2B216E6F9CE082387E3D6
3,470,283 UART: Caliptra RT
3,470,536 UART: [state] CFI Enabled
3,578,076 UART: [rt] RT listening for mailbox commands...
3,578,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,524 UART: [rt]cmd =0x52564348, len=36
3,609,949 >>> mbox cmd response: failed
3,609,949 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,479 UART: [rt]cmd =0x52564348, len=36
3,640,860 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 ready_for_fw is high
1,362,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,585 >>> mbox cmd response: success
2,990,511 UART:
2,990,527 UART: Running Caliptra FMC ...
2,990,935 UART:
2,990,989 UART: [state] CFI Enabled
3,001,472 UART: [fht] FMC Alias Private Key: 7
3,109,761 UART: [art] Extend RT PCRs Done
3,110,189 UART: [art] Lock RT PCRs Done
3,111,923 UART: [art] Populate DV Done
3,120,228 UART: [fht] FMC Alias Private Key: 7
3,121,226 UART: [art] Derive CDI
3,121,506 UART: [art] Store in in slot 0x4
3,207,019 UART: [art] Derive Key Pair
3,207,379 UART: [art] Store priv key in slot 0x5
3,220,579 UART: [art] Derive Key Pair - Done
3,235,320 UART: [art] Signing Cert with AUTHO
3,235,800 UART: RITY.KEYID = 7
3,251,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,839 UART: [art] PUB.X = 0363CCB96DDFBF6EB53217D68EB498DC9283EE23FACCB5DD8D27CE91220FDFB95759D2B15B27DDE0DECE2AC173F553B9
3,258,631 UART: [art] PUB.Y = 407C1915554187F81CB6E320F599B33633EE71BFB08C99AAFC661D9025E79843E7FC646F57572C7E3186BA092F86B053
3,265,574 UART: [art] SIG.R = A01591D7978A6380D89C66B7913D487E1972566511BBA494D2BAB56F396014BA0489DEB550A6530A42487010E02A5A5C
3,272,330 UART: [art] SIG.S = 6FBBC6D25101F3A6616CCDDD19237AE07E9CED60F0C079224FDC9B3A9867C2937EE5F8943ED29840A41CB636220D4DD4
3,296,727 UART: Caliptra RT
3,296,980 UART: [state] CFI Enabled
3,404,475 UART: [rt] RT listening for mailbox commands...
3,405,145 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,057 UART: [rt]cmd =0x52564348, len=36
3,436,478 >>> mbox cmd response: failed
3,436,478 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,222 UART: [rt]cmd =0x52564348, len=36
3,467,715 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 ready_for_fw is high
1,480,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,661 UART: [idev] Erasing UDS.KEYID = 0
1,505,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,853 UART: [idev] --
1,514,894 UART: [ldev] ++
1,515,062 UART: [ldev] CDI.KEYID = 6
1,515,425 UART: [ldev] SUBJECT.KEYID = 5
1,515,851 UART: [ldev] AUTHORITY.KEYID = 7
1,516,314 UART: [ldev] FE.KEYID = 1
1,521,484 UART: [ldev] Erasing FE.KEYID = 1
1,547,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,833 UART: [ldev] --
1,586,348 UART: [fwproc] Waiting for Commands...
1,587,037 UART: [fwproc] Received command 0x46574c44
1,587,828 UART: [fwproc] Received Image of size 114448 bytes
2,885,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,598 >>> mbox cmd response: success
3,079,664 UART: [afmc] ++
3,079,832 UART: [afmc] CDI.KEYID = 6
3,080,194 UART: [afmc] SUBJECT.KEYID = 7
3,080,619 UART: [afmc] AUTHORITY.KEYID = 5
3,115,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,575 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,265 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,124 UART: [afmc] --
3,159,036 UART: [cold-reset] --
3,160,140 UART: [state] Locking Datavault
3,161,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,905 UART: [state] Locking ICCM
3,162,473 UART: [exit] Launching FMC @ 0x40000130
3,167,802 UART:
3,167,818 UART: Running Caliptra FMC ...
3,168,226 UART:
3,168,369 UART: [state] CFI Enabled
3,179,114 UART: [fht] FMC Alias Private Key: 7
3,287,041 UART: [art] Extend RT PCRs Done
3,287,469 UART: [art] Lock RT PCRs Done
3,288,919 UART: [art] Populate DV Done
3,297,210 UART: [fht] FMC Alias Private Key: 7
3,298,302 UART: [art] Derive CDI
3,298,582 UART: [art] Store in in slot 0x4
3,384,245 UART: [art] Derive Key Pair
3,384,605 UART: [art] Store priv key in slot 0x5
3,397,853 UART: [art] Derive Key Pair - Done
3,412,441 UART: [art] Signing Cert with AUTHO
3,412,921 UART: RITY.KEYID = 7
3,427,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,448 UART: [art] PUB.X = 1CDF20468451D048C06EA1162877D2088C4BD4DC479EE256AED99E95495F7E900A1EEC1446051EB973EA4EEFAE5F283F
3,435,219 UART: [art] PUB.Y = 85AADAD357585AD64B23F34FC745BDECC5244C6766206893B7D2A9CBBD4D7F432306554986588570A549655F436D3E20
3,442,164 UART: [art] SIG.R = 5B268F25962DD6294F79138A8BC03D3C29D68424185581C8E219ACFA9698F0892C1E8A3690E605F6FA602A26F9CE90A2
3,448,929 UART: [art] SIG.S = 759528E5A902C057BD1402EE80A0F03D31263DEE48A6973C1E5F3B292264BE69E5EC8FCD7ED068411F548BCA3391A0E9
3,472,496 UART: Caliptra RT
3,472,841 UART: [state] CFI Enabled
3,580,979 UART: [rt] RT listening for mailbox commands...
3,581,649 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,687 UART: [rt]cmd =0x52564348, len=36
3,613,044 >>> mbox cmd response: failed
3,613,044 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,538 UART: [rt]cmd =0x52564348, len=36
3,644,099 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,240 ready_for_fw is high
1,363,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,822 >>> mbox cmd response: success
2,995,774 UART:
2,995,790 UART: Running Caliptra FMC ...
2,996,198 UART:
2,996,341 UART: [state] CFI Enabled
3,006,940 UART: [fht] FMC Alias Private Key: 7
3,114,847 UART: [art] Extend RT PCRs Done
3,115,275 UART: [art] Lock RT PCRs Done
3,116,881 UART: [art] Populate DV Done
3,125,248 UART: [fht] FMC Alias Private Key: 7
3,126,400 UART: [art] Derive CDI
3,126,680 UART: [art] Store in in slot 0x4
3,212,309 UART: [art] Derive Key Pair
3,212,669 UART: [art] Store priv key in slot 0x5
3,225,483 UART: [art] Derive Key Pair - Done
3,240,267 UART: [art] Signing Cert with AUTHO
3,240,747 UART: RITY.KEYID = 7
3,256,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,872 UART: [art] PUB.X = 8041660D745324CAE77D8C47F32EB85A4FC7E56547C128E12361F8BC00CCE72D97AE1871088DF6FA4E4A2FD7F840CBCA
3,263,626 UART: [art] PUB.Y = 5BA70C2F553C686A9C09022EC5EB2FB497C5B73DC12EE713952AD605624A91CB83A2977DC375B9BAECB8E0B180D6B590
3,270,576 UART: [art] SIG.R = FFE898C418A0A50927E4CD718DD7DC702BF05E04B6325E08F01D36D44B188D8698A2EA17DB98573E38C277883AB39DCA
3,277,345 UART: [art] SIG.S = A4BA47931C8F633DADA832F0C1AA50572BDB317B5A6CF00319BAA97F6CD35283E4F2978AB91C76B250A62C56473AE6D1
3,300,821 UART: Caliptra RT
3,301,166 UART: [state] CFI Enabled
3,409,718 UART: [rt] RT listening for mailbox commands...
3,410,388 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,688 UART: [rt]cmd =0x52564348, len=36
3,442,211 >>> mbox cmd response: failed
3,442,211 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,603 UART: [rt]cmd =0x52564348, len=36
3,473,198 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,163 UART: [kat] SHA2-256
904,103 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
923,018 UART: [kat] LMS
1,171,346 UART: [kat] --
1,172,465 UART: [cold-reset] ++
1,172,993 UART: [fht] FHT @ 0x50003400
1,175,848 UART: [idev] ++
1,176,016 UART: [idev] CDI.KEYID = 6
1,176,376 UART: [idev] SUBJECT.KEYID = 7
1,176,800 UART: [idev] UDS.KEYID = 0
1,177,145 ready_for_fw is high
1,177,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,580 UART: [idev] Erasing UDS.KEYID = 0
1,201,607 UART: [idev] Sha1 KeyId Algorithm
1,210,075 UART: [idev] --
1,211,181 UART: [ldev] ++
1,211,349 UART: [ldev] CDI.KEYID = 6
1,211,712 UART: [ldev] SUBJECT.KEYID = 5
1,212,138 UART: [ldev] AUTHORITY.KEYID = 7
1,212,601 UART: [ldev] FE.KEYID = 1
1,217,801 UART: [ldev] Erasing FE.KEYID = 1
1,243,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,283,048 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,704 >>> mbox cmd response: success
2,777,804 UART: [afmc] ++
2,777,972 UART: [afmc] CDI.KEYID = 6
2,778,334 UART: [afmc] SUBJECT.KEYID = 7
2,778,759 UART: [afmc] AUTHORITY.KEYID = 5
2,814,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,151 UART: [afmc] --
2,858,199 UART: [cold-reset] --
2,859,045 UART: [state] Locking Datavault
2,860,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,604 UART: [state] Locking ICCM
2,861,092 UART: [exit] Launching FMC @ 0x40000130
2,866,421 UART:
2,866,437 UART: Running Caliptra FMC ...
2,866,845 UART:
2,866,899 UART: [state] CFI Enabled
2,877,742 UART: [fht] FMC Alias Private Key: 7
2,985,155 UART: [art] Extend RT PCRs Done
2,985,583 UART: [art] Lock RT PCRs Done
2,987,067 UART: [art] Populate DV Done
2,995,638 UART: [fht] FMC Alias Private Key: 7
2,996,694 UART: [art] Derive CDI
2,996,974 UART: [art] Store in in slot 0x4
3,082,379 UART: [art] Derive Key Pair
3,082,739 UART: [art] Store priv key in slot 0x5
3,096,253 UART: [art] Derive Key Pair - Done
3,111,001 UART: [art] Signing Cert with AUTHO
3,111,481 UART: RITY.KEYID = 7
3,126,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,960 UART: [art] PUB.X = B4B17E5148F24B2B8D2EE5B7EFC09C54718A6BF210E2A82480795C5325D872926AC06A43928ACB66E06FDC89E5D235BC
3,133,738 UART: [art] PUB.Y = CF5872D9A7605DC90BCE27C59A86D33DDE0D6D43FCA9A94094449546489413E93FD066AB665C72F72695D69CF741C2DB
3,140,688 UART: [art] SIG.R = 9FAB0126B23079B4944B0A098F552AECEE3532FCAE8941BE453228F82D4F2E1954E78E5006474FED0C22AECE15B0C28D
3,147,453 UART: [art] SIG.S = 8D11F215FE3AFCF51B2C8C403024A3DD7C1DDE4E077650213C1124B82CB61EB8FBE4265D822425599C44E8ED2EF06D4D
3,170,729 UART: Caliptra RT
3,170,982 UART: [state] CFI Enabled
3,278,554 UART: [rt] RT listening for mailbox commands...
3,279,224 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,360 UART: [rt]cmd =0x52564348, len=36
3,311,071 >>> mbox cmd response: failed
3,311,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,497 UART: [rt]cmd =0x52564348, len=36
3,341,982 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,425 ready_for_fw is high
1,060,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,561 >>> mbox cmd response: success
2,689,577 UART:
2,689,593 UART: Running Caliptra FMC ...
2,690,001 UART:
2,690,055 UART: [state] CFI Enabled
2,700,666 UART: [fht] FMC Alias Private Key: 7
2,809,187 UART: [art] Extend RT PCRs Done
2,809,615 UART: [art] Lock RT PCRs Done
2,811,197 UART: [art] Populate DV Done
2,819,566 UART: [fht] FMC Alias Private Key: 7
2,820,736 UART: [art] Derive CDI
2,821,016 UART: [art] Store in in slot 0x4
2,906,567 UART: [art] Derive Key Pair
2,906,927 UART: [art] Store priv key in slot 0x5
2,920,309 UART: [art] Derive Key Pair - Done
2,935,132 UART: [art] Signing Cert with AUTHO
2,935,612 UART: RITY.KEYID = 7
2,951,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,851 UART: [art] PUB.X = 0F3921F1DFB8026031A075C290EACF564D77DC66F6FEA849067BF279D65364E994B6160200ED0827688491AB2566AA0B
2,958,579 UART: [art] PUB.Y = F0CF7660D79D10DC7A8A3720D6F807723AC663A5C7A1EDC975B57168B10026A195FC4F0A33E6A4D060E9DC8A28A6AAB7
2,965,513 UART: [art] SIG.R = 583D2A8842596F2DF8E22E4491927C35EFC763809D29AE51E048E6F21447B201F26A4C747D0BA3D8AE60B015EC577391
2,972,275 UART: [art] SIG.S = 07CC3C1F33C3EC0485283F2780B5A68D013DD219E53FFFEFA9A0C876C1E1A8E6EF39A2F31162D232CB7C9F1067A70EB6
2,995,854 UART: Caliptra RT
2,996,107 UART: [state] CFI Enabled
3,103,242 UART: [rt] RT listening for mailbox commands...
3,103,912 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,220 UART: [rt]cmd =0x52564348, len=36
3,135,967 >>> mbox cmd response: failed
3,135,967 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,717 UART: [rt]cmd =0x52564348, len=36
3,167,162 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,348 UART: [kat] SHA2-256
904,288 UART: [kat] SHA2-384
907,165 UART: [kat] SHA2-512-ACC
909,066 UART: [kat] ECC-384
918,913 UART: [kat] HMAC-384Kdf
923,741 UART: [kat] LMS
1,172,069 UART: [kat] --
1,173,060 UART: [cold-reset] ++
1,173,518 UART: [fht] FHT @ 0x50003400
1,176,239 UART: [idev] ++
1,176,407 UART: [idev] CDI.KEYID = 6
1,176,767 UART: [idev] SUBJECT.KEYID = 7
1,177,191 UART: [idev] UDS.KEYID = 0
1,177,536 ready_for_fw is high
1,177,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,431 UART: [idev] Erasing UDS.KEYID = 0
1,202,592 UART: [idev] Sha1 KeyId Algorithm
1,210,948 UART: [idev] --
1,212,074 UART: [ldev] ++
1,212,242 UART: [ldev] CDI.KEYID = 6
1,212,605 UART: [ldev] SUBJECT.KEYID = 5
1,213,031 UART: [ldev] AUTHORITY.KEYID = 7
1,213,494 UART: [ldev] FE.KEYID = 1
1,218,656 UART: [ldev] Erasing FE.KEYID = 1
1,245,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,028 UART: [ldev] --
1,284,313 UART: [fwproc] Wait for Commands...
1,284,987 UART: [fwproc] Recv command 0x46574c44
1,285,715 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,817 >>> mbox cmd response: success
2,777,917 UART: [afmc] ++
2,778,085 UART: [afmc] CDI.KEYID = 6
2,778,447 UART: [afmc] SUBJECT.KEYID = 7
2,778,872 UART: [afmc] AUTHORITY.KEYID = 5
2,814,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,258 UART: [afmc] --
2,858,174 UART: [cold-reset] --
2,859,058 UART: [state] Locking Datavault
2,860,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,945 UART: [state] Locking ICCM
2,861,529 UART: [exit] Launching FMC @ 0x40000130
2,866,858 UART:
2,866,874 UART: Running Caliptra FMC ...
2,867,282 UART:
2,867,425 UART: [state] CFI Enabled
2,878,124 UART: [fht] FMC Alias Private Key: 7
2,986,705 UART: [art] Extend RT PCRs Done
2,987,133 UART: [art] Lock RT PCRs Done
2,988,579 UART: [art] Populate DV Done
2,997,058 UART: [fht] FMC Alias Private Key: 7
2,998,138 UART: [art] Derive CDI
2,998,418 UART: [art] Store in in slot 0x4
3,083,633 UART: [art] Derive Key Pair
3,083,993 UART: [art] Store priv key in slot 0x5
3,096,617 UART: [art] Derive Key Pair - Done
3,111,685 UART: [art] Signing Cert with AUTHO
3,112,165 UART: RITY.KEYID = 7
3,127,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,206 UART: [art] PUB.X = 9C8F7218C569566E0AB7EA48FD7CDBDA1056A2A0617B29A4B24272C87501E0E9BA004F9831C61AE54B0746CEAAFF2D96
3,134,957 UART: [art] PUB.Y = 41B6EA050DC9F289907030718C0CF8D2EF7739937F1FCF97B200BD03F0EA6D69BFE34BBD0F5C349BEEA227BC26BA5764
3,141,886 UART: [art] SIG.R = 4E8B58DDB036C8A3B426806951055A6757BA07507105A098A23B6E475E9B89B4B3F403B96B66866EFED42B96EDED3D9F
3,148,648 UART: [art] SIG.S = A5C962E77F3F1EAE4330FE118CB29BD252356A9CB170C2073AD7CFC897BF58D9BA699B1063683FB3439A5C3AA1FE039B
3,172,651 UART: Caliptra RT
3,172,996 UART: [state] CFI Enabled
3,280,621 UART: [rt] RT listening for mailbox commands...
3,281,291 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,517 UART: [rt]cmd =0x52564348, len=36
3,312,856 >>> mbox cmd response: failed
3,312,856 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,464 UART: [rt]cmd =0x52564348, len=36
3,343,941 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 ready_for_fw is high
1,060,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,072 >>> mbox cmd response: success
2,690,018 UART:
2,690,034 UART: Running Caliptra FMC ...
2,690,442 UART:
2,690,585 UART: [state] CFI Enabled
2,701,528 UART: [fht] FMC Alias Private Key: 7
2,809,387 UART: [art] Extend RT PCRs Done
2,809,815 UART: [art] Lock RT PCRs Done
2,811,305 UART: [art] Populate DV Done
2,819,718 UART: [fht] FMC Alias Private Key: 7
2,820,768 UART: [art] Derive CDI
2,821,048 UART: [art] Store in in slot 0x4
2,906,731 UART: [art] Derive Key Pair
2,907,091 UART: [art] Store priv key in slot 0x5
2,920,355 UART: [art] Derive Key Pair - Done
2,935,187 UART: [art] Signing Cert with AUTHO
2,935,667 UART: RITY.KEYID = 7
2,950,889 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,654 UART: [art] PUB.X = 8142EE9790603A2528E4A3C0092FBEF8065238CDEB6F7F470F0B27C9B544959EA08A7C363FD325B4F18FD9688FD10D1C
2,958,415 UART: [art] PUB.Y = 9EBC0392FA36651102F4D5546EDEFBD43957631649A7988904B243DC97633D23772FA71E22EBC4F01246BC5DE5D6EE92
2,965,358 UART: [art] SIG.R = A4C99D81047545E81DA47F310D6FB58BF8C482C17EB72A80506D6B18A8E09D3AC13ED116E06660D10A4E54C2CA48A14B
2,972,127 UART: [art] SIG.S = A0B56AEBDADC29C0F8E5F84FAF0003D8E8C96FD9C4401B6BF1802F179A6297B3B09789BB30A9F92E072B4D32A0797F34
2,996,024 UART: Caliptra RT
2,996,369 UART: [state] CFI Enabled
3,104,293 UART: [rt] RT listening for mailbox commands...
3,104,963 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,009 UART: [rt]cmd =0x52564348, len=36
3,136,486 >>> mbox cmd response: failed
3,136,486 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,960 UART: [rt]cmd =0x52564348, len=36
3,167,481 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,279 UART: [kat] SHA2-256
902,219 UART: [kat] SHA2-384
905,104 UART: [kat] SHA2-512-ACC
907,005 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,985 UART: [idev] --
1,208,932 UART: [ldev] ++
1,209,100 UART: [ldev] CDI.KEYID = 6
1,209,464 UART: [ldev] SUBJECT.KEYID = 5
1,209,891 UART: [ldev] AUTHORITY.KEYID = 7
1,210,354 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,406 UART: [fwproc] Wait for Commands...
1,281,143 UART: [fwproc] Recv command 0x46574c44
1,281,876 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,328 >>> mbox cmd response: success
2,774,467 UART: [afmc] ++
2,774,635 UART: [afmc] CDI.KEYID = 6
2,774,998 UART: [afmc] SUBJECT.KEYID = 7
2,775,424 UART: [afmc] AUTHORITY.KEYID = 5
2,810,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,899 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,654 UART: [afmc] --
2,853,586 UART: [cold-reset] --
2,854,584 UART: [state] Locking Datavault
2,855,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,409 UART: [state] Locking ICCM
2,857,029 UART: [exit] Launching FMC @ 0x40000130
2,862,358 UART:
2,862,374 UART: Running Caliptra FMC ...
2,862,782 UART:
2,862,836 UART: [state] CFI Enabled
2,873,367 UART: [fht] FMC Alias Private Key: 7
2,980,140 UART: [art] Extend RT PCRs Done
2,980,568 UART: [art] Lock RT PCRs Done
2,982,118 UART: [art] Populate DV Done
2,990,175 UART: [fht] FMC Alias Private Key: 7
2,991,229 UART: [art] Derive CDI
2,991,509 UART: [art] Store in in slot 0x4
3,076,898 UART: [art] Derive Key Pair
3,077,258 UART: [art] Store priv key in slot 0x5
3,090,858 UART: [art] Derive Key Pair - Done
3,105,380 UART: [art] Signing Cert with AUTHO
3,105,860 UART: RITY.KEYID = 7
3,121,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,967 UART: [art] PUB.X = CAE640517FF6FF8E55B691F1C4F5EB53234D6DC0F994DFE30FCAE065E38A0CAD2CC7F1F24C0A217433D377106F346EC6
3,128,746 UART: [art] PUB.Y = 8BA9D7F4627E347A23BF6B89B17ED55D4DAED8661CE227B0D9050A8D64511B1E29C3992EF677B2A7B66967F73BA7EAE3
3,135,702 UART: [art] SIG.R = F89CA251FE818C3F88999B83571C09626ACB6665BC5F83BEE8DD3581546D5EF4D2ED62C856AB0BF86DFAE56CA9556BD7
3,142,482 UART: [art] SIG.S = 866CA736B2D26B16A563F9CEAFC301E0222BDC8E70D608FC5606F42998F506083006C1F44581A2597FD609F98BD4BF7B
3,165,944 UART: Caliptra RT
3,166,197 UART: [state] CFI Enabled
3,273,461 UART: [rt] RT listening for mailbox commands...
3,274,131 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,155 UART: [rt]cmd =0x52564348, len=36
3,305,922 >>> mbox cmd response: failed
3,305,922 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,378 UART: [rt]cmd =0x52564348, len=36
3,336,631 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 ready_for_fw is high
1,056,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,482 >>> mbox cmd response: success
2,688,672 UART:
2,688,688 UART: Running Caliptra FMC ...
2,689,096 UART:
2,689,150 UART: [state] CFI Enabled
2,699,683 UART: [fht] FMC Alias Private Key: 7
2,807,812 UART: [art] Extend RT PCRs Done
2,808,240 UART: [art] Lock RT PCRs Done
2,809,690 UART: [art] Populate DV Done
2,817,901 UART: [fht] FMC Alias Private Key: 7
2,818,879 UART: [art] Derive CDI
2,819,159 UART: [art] Store in in slot 0x4
2,904,594 UART: [art] Derive Key Pair
2,904,954 UART: [art] Store priv key in slot 0x5
2,918,348 UART: [art] Derive Key Pair - Done
2,933,259 UART: [art] Signing Cert with AUTHO
2,933,739 UART: RITY.KEYID = 7
2,948,753 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,518 UART: [art] PUB.X = 02C34108D3698F335C8E06CBAFC183C5293B940A75D52BE89128405354148838EC9A9BA6DA50E1D57A7F6F74BEAB4484
2,956,278 UART: [art] PUB.Y = BA6658A77235D2763E9DB8B0F1664C5BAFBEA3F1546FE32735FA400FD28E719F32EC927517CB5E58D220B888B4590682
2,963,226 UART: [art] SIG.R = 60CADEB61C48C9AA6F628D3746B7330BD4B678BEBECA84C3E50D90B4DD515B482205C2EA702792178F6D980839A9CF45
2,969,994 UART: [art] SIG.S = D84CDC7630435D6F1B9A94DEEE37F533371C0BD5476C03A3F65D8BFBCC7F7C9023009531C081031DE4BE7AAD9A767B42
2,993,374 UART: Caliptra RT
2,993,627 UART: [state] CFI Enabled
3,101,276 UART: [rt] RT listening for mailbox commands...
3,101,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,888 UART: [rt]cmd =0x52564348, len=36
3,133,187 >>> mbox cmd response: failed
3,133,187 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,787 UART: [rt]cmd =0x52564348, len=36
3,164,376 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 ready_for_fw is high
1,174,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,867 >>> mbox cmd response: success
2,778,064 UART: [afmc] ++
2,778,232 UART: [afmc] CDI.KEYID = 6
2,778,595 UART: [afmc] SUBJECT.KEYID = 7
2,779,021 UART: [afmc] AUTHORITY.KEYID = 5
2,814,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,240 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,753 UART: [afmc] --
2,857,783 UART: [cold-reset] --
2,858,607 UART: [state] Locking Datavault
2,860,026 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,630 UART: [state] Locking ICCM
2,861,288 UART: [exit] Launching FMC @ 0x40000130
2,866,617 UART:
2,866,633 UART: Running Caliptra FMC ...
2,867,041 UART:
2,867,184 UART: [state] CFI Enabled
2,877,659 UART: [fht] FMC Alias Private Key: 7
2,985,512 UART: [art] Extend RT PCRs Done
2,985,940 UART: [art] Lock RT PCRs Done
2,987,444 UART: [art] Populate DV Done
2,995,547 UART: [fht] FMC Alias Private Key: 7
2,996,711 UART: [art] Derive CDI
2,996,991 UART: [art] Store in in slot 0x4
3,083,136 UART: [art] Derive Key Pair
3,083,496 UART: [art] Store priv key in slot 0x5
3,097,048 UART: [art] Derive Key Pair - Done
3,111,648 UART: [art] Signing Cert with AUTHO
3,112,128 UART: RITY.KEYID = 7
3,126,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,267 UART: [art] PUB.X = 9BFA1A774EE11344A51138F00A3621E54C1158AA9E42665D08EF47194E44312E57499FEB4048300904A1EF0993DD7574
3,134,014 UART: [art] PUB.Y = C2F6887429603FBB31FB35C7C0BA87BA83E2D2A4DD3235141375F4424315533429752669F7FEC1A013FCAF301E4B2B2E
3,140,966 UART: [art] SIG.R = 43201F5487A8BCE0CD8AA43C81B83500E361D6711D79825E8291C5DA0E85ACF74E89C1BEFF4A9E8BE9592596F61098E2
3,147,717 UART: [art] SIG.S = D23845F8D605F6087B67022BB5F96CAA02338CC4A8588FAF9AEF96AD518CA54598C56D8E65D3FB9E1D80425F042D4B4C
3,171,719 UART: Caliptra RT
3,172,064 UART: [state] CFI Enabled
3,280,419 UART: [rt] RT listening for mailbox commands...
3,281,089 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,297 UART: [rt]cmd =0x52564348, len=36
3,312,960 >>> mbox cmd response: failed
3,312,960 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,552 UART: [rt]cmd =0x52564348, len=36
3,344,093 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,729 ready_for_fw is high
1,056,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,981 >>> mbox cmd response: success
2,687,191 UART:
2,687,207 UART: Running Caliptra FMC ...
2,687,615 UART:
2,687,758 UART: [state] CFI Enabled
2,698,109 UART: [fht] FMC Alias Private Key: 7
2,805,932 UART: [art] Extend RT PCRs Done
2,806,360 UART: [art] Lock RT PCRs Done
2,807,824 UART: [art] Populate DV Done
2,816,005 UART: [fht] FMC Alias Private Key: 7
2,816,983 UART: [art] Derive CDI
2,817,263 UART: [art] Store in in slot 0x4
2,903,026 UART: [art] Derive Key Pair
2,903,386 UART: [art] Store priv key in slot 0x5
2,916,326 UART: [art] Derive Key Pair - Done
2,931,301 UART: [art] Signing Cert with AUTHO
2,931,781 UART: RITY.KEYID = 7
2,947,387 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,152 UART: [art] PUB.X = CF6EBA091DE76CA498424010AF834C6EB0306DDB8B51B76334127E491FD1ABF0D9E1BDDF0ED1F20744652FE2F7022095
2,954,922 UART: [art] PUB.Y = 4CE2094E20055637F58033A54BD91C4AB3E330B466E6076A2134791622B4DA2D09A7EBF40661477E693D1D567CEE23FF
2,961,855 UART: [art] SIG.R = 0D9FB973AA91E9C171AB91C4401F0561143E23E6B611A82F7468FDC1702EC13DF4BF786F132178C96811FBA79DE6DE12
2,968,625 UART: [art] SIG.S = 684A704202248B7C63789E8993797B51B6EB3C934F3F7644923BFB7B1576805FEB4969131D8B0C59AA0AFD1BF12E3ADB
2,992,397 UART: Caliptra RT
2,992,742 UART: [state] CFI Enabled
3,099,873 UART: [rt] RT listening for mailbox commands...
3,100,543 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,645 UART: [rt]cmd =0x52564348, len=36
3,132,158 >>> mbox cmd response: failed
3,132,158 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,774 UART: [rt]cmd =0x52564348, len=36
3,163,353 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,116 UART:
192,493 UART: Running Caliptra ROM ...
193,689 UART:
193,850 UART: [state] CFI Enabled
263,370 UART: [state] LifecycleState = Unprovisioned
265,357 UART: [state] DebugLocked = No
267,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,110 UART: [kat] SHA2-256
441,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,296 UART: [kat] ++
452,848 UART: [kat] sha1
463,018 UART: [kat] SHA2-256
465,747 UART: [kat] SHA2-384
471,906 UART: [kat] SHA2-512-ACC
474,265 UART: [kat] ECC-384
2,766,758 UART: [kat] HMAC-384Kdf
2,779,350 UART: [kat] LMS
3,969,620 UART: [kat] --
3,974,396 UART: [cold-reset] ++
3,975,982 UART: [fht] Storing FHT @ 0x50003400
3,987,032 UART: [idev] ++
3,987,602 UART: [idev] CDI.KEYID = 6
3,988,836 UART: [idev] SUBJECT.KEYID = 7
3,989,877 UART: [idev] UDS.KEYID = 0
3,990,916 ready_for_fw is high
3,991,132 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,507 UART: [idev] Erasing UDS.KEYID = 0
7,326,538 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,651 UART: [idev] --
7,352,880 UART: [ldev] ++
7,353,463 UART: [ldev] CDI.KEYID = 6
7,354,438 UART: [ldev] SUBJECT.KEYID = 5
7,355,548 UART: [ldev] AUTHORITY.KEYID = 7
7,356,885 UART: [ldev] FE.KEYID = 1
7,401,641 UART: [ldev] Erasing FE.KEYID = 1
10,734,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,203 UART: [ldev] --
13,116,305 UART: [fwproc] Waiting for Commands...
13,119,010 UART: [fwproc] Received command 0x46574c44
13,121,196 UART: [fwproc] Received Image of size 114124 bytes
21,518,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,607,314 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,676,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,993,132 >>> mbox cmd response: success
21,996,807 UART: [afmc] ++
21,997,406 UART: [afmc] CDI.KEYID = 6
21,998,327 UART: [afmc] SUBJECT.KEYID = 7
21,999,545 UART: [afmc] AUTHORITY.KEYID = 5
25,355,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,655,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,657,617 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,672,201 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,686,919 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,701,165 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,722,732 UART: [afmc] --
27,727,353 UART: [cold-reset] --
27,730,944 UART: [state] Locking Datavault
27,735,707 UART: [state] Locking PCR0, PCR1 and PCR31
27,737,412 UART: [state] Locking ICCM
27,739,430 UART: [exit] Launching FMC @ 0x40000130
27,747,822 UART:
27,748,056 UART: Running Caliptra FMC ...
27,749,370 UART:
27,749,541 UART: [state] CFI Enabled
27,815,904 UART: [fht] FMC Alias Private Key: 7
30,154,219 UART: [art] Extend RT PCRs Done
30,155,439 UART: [art] Lock RT PCRs Done
30,156,978 UART: [art] Populate DV Done
30,162,170 UART: [fht] FMC Alias Private Key: 7
30,163,667 UART: [art] Derive CDI
30,164,400 UART: [art] Store in in slot 0x4
30,224,139 UART: [art] Derive Key Pair
30,225,141 UART: [art] Store priv key in slot 0x5
33,517,670 UART: [art] Derive Key Pair - Done
33,530,562 UART: [art] Signing Cert with AUTHO
33,531,868 UART: RITY.KEYID = 7
35,819,699 UART: [art] Erasing AUTHORITY.KEYID = 7
35,821,202 UART: [art] PUB.X = 0ABC195CC074996F38970AB854F8F9897F8E1CD996531AD127A8108FFB1990AE49C43714FEAE420C02B24125C1766FC2
35,828,460 UART: [art] PUB.Y = A2E1589E0CAA7E184FDB47F2884D85A70B5E72F4EB432FE3F8C8AB790DBBCAB73AD840E5100809B3E617907A4EB61707
35,835,737 UART: [art] SIG.R = 543007FFC2B26A10C7C19DA9B1C74427EDB93909D903521298A9023C25E9894BAB06FE17286E97C9E2EFE38A9C3E7F8E
35,843,093 UART: [art] SIG.S = 646C4716DD68BE41FEB8691389CB291E43CA369A2C6206EE42D9D29807859BD1FB8FFFF661AEC3BE3C2E93539BF86B3A
37,148,335 UART: Caliptra RT
37,149,022 UART: [state] CFI Enabled
37,311,235 UART: [rt] RT listening for mailbox commands...
41,485,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,641,691 UART: [rt]cmd =0x41544d4e, len=14344
49,928,155 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,783,825 ready_for_fw is high
3,784,228 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,155,329 >>> mbox cmd response: success
27,853,663 UART:
27,854,055 UART: Running Caliptra FMC ...
27,855,195 UART:
27,855,366 UART: [state] CFI Enabled
27,924,617 UART: [fht] FMC Alias Private Key: 7
30,262,058 UART: [art] Extend RT PCRs Done
30,263,286 UART: [art] Lock RT PCRs Done
30,264,837 UART: [art] Populate DV Done
30,270,225 UART: [fht] FMC Alias Private Key: 7
30,271,830 UART: [art] Derive CDI
30,272,576 UART: [art] Store in in slot 0x4
30,333,385 UART: [art] Derive Key Pair
30,334,428 UART: [art] Store priv key in slot 0x5
33,626,530 UART: [art] Derive Key Pair - Done
33,639,854 UART: [art] Signing Cert with AUTHO
33,641,157 UART: RITY.KEYID = 7
35,928,581 UART: [art] Erasing AUTHORITY.KEYID = 7
35,930,086 UART: [art] PUB.X = 7CA5EAB3DCE9AF21E55DF1108B2D63AEF0D16F02F3C48F4E79F3DC265CCAC02C59EA104174475BDD74C51C3FC8642CBA
35,937,341 UART: [art] PUB.Y = 2479267A7C182A48AD0C1CFB25C7A6095FBB7470F71B9D30737FAF9656D4D106CE8A6FA88890591285CFF00FD696A024
35,944,572 UART: [art] SIG.R = 447690D9D39CB3FA178966BD4676D1392D20333FB48DDD8865678E3CDDFC1E19943C1AC92A567327248EFF2DA33348B9
35,951,968 UART: [art] SIG.S = 53ED876351EC25F3221BE0AF76649DDC567D253D750AAB08288E448FA47B8711D9A550391D23E97509176FAEDA087706
37,257,964 UART: Caliptra RT
37,258,671 UART: [state] CFI Enabled
37,440,062 UART: [rt] RT listening for mailbox commands...
41,613,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,768,691 UART: [rt]cmd =0x41544d4e, len=14344
50,133,087 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,442 UART:
192,823 UART: Running Caliptra ROM ...
193,922 UART:
603,741 UART: [state] CFI Enabled
616,345 UART: [state] LifecycleState = Unprovisioned
618,294 UART: [state] DebugLocked = No
620,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,467 UART: [kat] SHA2-256
794,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,742 UART: [kat] ++
805,202 UART: [kat] sha1
815,357 UART: [kat] SHA2-256
818,004 UART: [kat] SHA2-384
823,437 UART: [kat] SHA2-512-ACC
825,803 UART: [kat] ECC-384
3,108,731 UART: [kat] HMAC-384Kdf
3,120,775 UART: [kat] LMS
4,310,890 UART: [kat] --
4,314,760 UART: [cold-reset] ++
4,316,836 UART: [fht] Storing FHT @ 0x50003400
4,329,466 UART: [idev] ++
4,330,068 UART: [idev] CDI.KEYID = 6
4,330,956 UART: [idev] SUBJECT.KEYID = 7
4,332,113 UART: [idev] UDS.KEYID = 0
4,333,221 ready_for_fw is high
4,333,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,609 UART: [idev] Erasing UDS.KEYID = 0
7,621,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,485 UART: [idev] --
7,646,370 UART: [ldev] ++
7,646,993 UART: [ldev] CDI.KEYID = 6
7,647,900 UART: [ldev] SUBJECT.KEYID = 5
7,649,179 UART: [ldev] AUTHORITY.KEYID = 7
7,650,416 UART: [ldev] FE.KEYID = 1
7,663,030 UART: [ldev] Erasing FE.KEYID = 1
10,952,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,548 UART: [ldev] --
13,313,701 UART: [fwproc] Waiting for Commands...
13,315,410 UART: [fwproc] Received command 0x46574c44
13,317,645 UART: [fwproc] Received Image of size 114124 bytes
22,426,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,512,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,581,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,898,136 >>> mbox cmd response: success
22,902,019 UART: [afmc] ++
22,902,624 UART: [afmc] CDI.KEYID = 6
22,903,584 UART: [afmc] SUBJECT.KEYID = 7
22,904,796 UART: [afmc] AUTHORITY.KEYID = 5
26,216,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,510,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,512,279 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,526,855 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,541,621 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,555,828 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,576,029 UART: [afmc] --
28,579,253 UART: [cold-reset] --
28,583,542 UART: [state] Locking Datavault
28,588,524 UART: [state] Locking PCR0, PCR1 and PCR31
28,590,274 UART: [state] Locking ICCM
28,592,850 UART: [exit] Launching FMC @ 0x40000130
28,601,209 UART:
28,601,443 UART: Running Caliptra FMC ...
28,602,543 UART:
28,602,695 UART: [state] CFI Enabled
28,610,735 UART: [fht] FMC Alias Private Key: 7
30,941,885 UART: [art] Extend RT PCRs Done
30,943,097 UART: [art] Lock RT PCRs Done
30,944,807 UART: [art] Populate DV Done
30,950,265 UART: [fht] FMC Alias Private Key: 7
30,951,794 UART: [art] Derive CDI
30,952,521 UART: [art] Store in in slot 0x4
30,994,620 UART: [art] Derive Key Pair
30,995,654 UART: [art] Store priv key in slot 0x5
34,237,556 UART: [art] Derive Key Pair - Done
34,250,631 UART: [art] Signing Cert with AUTHO
34,251,972 UART: RITY.KEYID = 7
36,531,442 UART: [art] Erasing AUTHORITY.KEYID = 7
36,532,953 UART: [art] PUB.X = C5D89776058E598ABB963897154D79478F23DD64345AE391060E8524A3C8B8786BCFFC46DF8514DE575F485180EB0353
36,540,130 UART: [art] PUB.Y = D90B50D08D2CC8E15E99D7ADF9A89ACA9E428405D60E60B2B380D89B832E3D8E1456F37739575BDB9C1E9B2A69506014
36,547,395 UART: [art] SIG.R = D2719D0D108D79FD52D5491D4762DFA9E32218BA4649738056F118DED4F185EA7F9DFBDAA4177221D4667AB7E8358C72
36,554,756 UART: [art] SIG.S = 063F382213E576FBDE9E882BAD6B0AEB8D64F9F75F51BD3866024A025AD0AA4F85C39C5721EC6C79BCCE98706237D87E
37,859,724 UART: Caliptra RT
37,860,425 UART: [state] CFI Enabled
37,978,241 UART: [rt] RT listening for mailbox commands...
41,998,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,154,551 UART: [rt]cmd =0x41544d4e, len=14344
50,466,682 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,129,899 ready_for_fw is high
4,130,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,263,047 >>> mbox cmd response: success
27,910,211 UART:
27,910,601 UART: Running Caliptra FMC ...
27,911,693 UART:
27,911,839 UART: [state] CFI Enabled
27,919,855 UART: [fht] FMC Alias Private Key: 7
30,250,650 UART: [art] Extend RT PCRs Done
30,251,889 UART: [art] Lock RT PCRs Done
30,253,219 UART: [art] Populate DV Done
30,258,366 UART: [fht] FMC Alias Private Key: 7
30,259,853 UART: [art] Derive CDI
30,260,615 UART: [art] Store in in slot 0x4
30,303,065 UART: [art] Derive Key Pair
30,304,098 UART: [art] Store priv key in slot 0x5
33,545,787 UART: [art] Derive Key Pair - Done
33,558,678 UART: [art] Signing Cert with AUTHO
33,560,009 UART: RITY.KEYID = 7
35,839,495 UART: [art] Erasing AUTHORITY.KEYID = 7
35,841,001 UART: [art] PUB.X = DDFDEE73FDA46A94B0DF8C0A70EAE04629EFA81694582B0A4B4A6C5BFEC4C696687B9DDAC2DA123A0A77139E034A60A0
35,848,300 UART: [art] PUB.Y = 3D8C67F5555B157DB28D9E158EE76FF18477C495B39F71034E4FAAE5A24B1484BF57A7B23EA1A2986EE4E99675F9C0CB
35,855,528 UART: [art] SIG.R = 20D384823E421FCBE83DB04B6BBAECABE608E6FCDB79C428623A5764944FA9ECBCABB262F8ACB935D75B0601E6CF51DA
35,862,965 UART: [art] SIG.S = 1CDC45E387C929FEB5DA5392D49C2C672C69650CCC7BC2653185AC5B8C966A74D671FF8699DAFBEBE1A2B104A0BD0B9C
37,167,842 UART: Caliptra RT
37,168,529 UART: [state] CFI Enabled
37,286,235 UART: [rt] RT listening for mailbox commands...
41,308,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,464,213 UART: [rt]cmd =0x41544d4e, len=14344
49,828,117 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,221 UART:
192,581 UART: Running Caliptra ROM ...
193,768 UART:
193,921 UART: [state] CFI Enabled
262,761 UART: [state] LifecycleState = Unprovisioned
264,603 UART: [state] DebugLocked = No
267,270 UART: [state] WD Timer not started. Device not locked for debugging
271,158 UART: [kat] SHA2-256
450,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,841 UART: [kat] ++
462,377 UART: [kat] sha1
472,900 UART: [kat] SHA2-256
475,904 UART: [kat] SHA2-384
481,607 UART: [kat] SHA2-512-ACC
484,545 UART: [kat] ECC-384
2,948,678 UART: [kat] HMAC-384Kdf
2,970,702 UART: [kat] LMS
3,500,131 UART: [kat] --
3,505,328 UART: [cold-reset] ++
3,507,060 UART: [fht] FHT @ 0x50003400
3,517,417 UART: [idev] ++
3,517,983 UART: [idev] CDI.KEYID = 6
3,518,913 UART: [idev] SUBJECT.KEYID = 7
3,520,086 UART: [idev] UDS.KEYID = 0
3,521,015 ready_for_fw is high
3,521,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,221 UART: [idev] Erasing UDS.KEYID = 0
6,027,144 UART: [idev] Sha1 KeyId Algorithm
6,048,700 UART: [idev] --
6,053,825 UART: [ldev] ++
6,054,399 UART: [ldev] CDI.KEYID = 6
6,055,315 UART: [ldev] SUBJECT.KEYID = 5
6,056,477 UART: [ldev] AUTHORITY.KEYID = 7
6,057,764 UART: [ldev] FE.KEYID = 1
6,098,340 UART: [ldev] Erasing FE.KEYID = 1
8,601,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,840 UART: [ldev] --
10,389,003 UART: [fwproc] Wait for Commands...
10,391,753 UART: [fwproc] Recv command 0x46574c44
10,393,849 UART: [fwproc] Recv'd Img size: 114448 bytes
14,943,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,025,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,093,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,412,532 >>> mbox cmd response: success
15,416,325 UART: [afmc] ++
15,416,919 UART: [afmc] CDI.KEYID = 6
15,417,804 UART: [afmc] SUBJECT.KEYID = 7
15,419,020 UART: [afmc] AUTHORITY.KEYID = 5
17,957,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,678,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,680,908 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,696,847 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,712,823 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,728,574 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,750,769 UART: [afmc] --
19,755,129 UART: [cold-reset] --
19,759,643 UART: [state] Locking Datavault
19,764,186 UART: [state] Locking PCR0, PCR1 and PCR31
19,765,826 UART: [state] Locking ICCM
19,768,191 UART: [exit] Launching FMC @ 0x40000130
19,776,643 UART:
19,776,884 UART: Running Caliptra FMC ...
19,777,989 UART:
19,778,156 UART: [state] CFI Enabled
19,838,905 UART: [fht] FMC Alias Private Key: 7
21,602,804 UART: [art] Extend RT PCRs Done
21,604,068 UART: [art] Lock RT PCRs Done
21,605,511 UART: [art] Populate DV Done
21,611,035 UART: [fht] FMC Alias Private Key: 7
21,612,685 UART: [art] Derive CDI
21,613,450 UART: [art] Store in in slot 0x4
21,671,691 UART: [art] Derive Key Pair
21,672,724 UART: [art] Store priv key in slot 0x5
24,136,278 UART: [art] Derive Key Pair - Done
24,149,423 UART: [art] Signing Cert with AUTHO
24,150,755 UART: RITY.KEYID = 7
25,862,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,808 UART: [art] PUB.X = 8841642C662B86FBA16335A11CD58E324C5902FD07603B10D0059D31AD1CCF68E2C61F1B30822C6BF398BB3B54C66B0A
25,871,054 UART: [art] PUB.Y = 184899FE5F075A8B58E85CBC09CE60162047FBF662AE50A2AC7824EF2F76CBF2EDE3F3BF557EE6951180B9BB44F83E67
25,878,350 UART: [art] SIG.R = A53073716A000867D157AA2996BCCF265D5AC58B84F599144B1A2C69BBE020F7D4AB649DD1D0E37B465ACB37C29DBA64
25,885,754 UART: [art] SIG.S = F82C990BDF8FE3318D20300960F8328567A975EEF68D37FFAB2F8CF827B749543DD060627B794453CE40C2740FCC0251
26,864,324 UART: Caliptra RT
26,865,011 UART: [state] CFI Enabled
27,030,924 UART: [rt] RT listening for mailbox commands...
31,055,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,211,246 UART: [rt]cmd =0x41544d4e, len=14344
36,006,934 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,360,688 ready_for_fw is high
3,361,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,032,118 >>> mbox cmd response: success
19,329,874 UART:
19,330,277 UART: Running Caliptra FMC ...
19,331,475 UART:
19,331,641 UART: [state] CFI Enabled
19,396,460 UART: [fht] FMC Alias Private Key: 7
21,159,375 UART: [art] Extend RT PCRs Done
21,160,605 UART: [art] Lock RT PCRs Done
21,162,293 UART: [art] Populate DV Done
21,167,826 UART: [fht] FMC Alias Private Key: 7
21,169,373 UART: [art] Derive CDI
21,170,134 UART: [art] Store in in slot 0x4
21,228,383 UART: [art] Derive Key Pair
21,229,426 UART: [art] Store priv key in slot 0x5
23,692,069 UART: [art] Derive Key Pair - Done
23,705,125 UART: [art] Signing Cert with AUTHO
23,706,431 UART: RITY.KEYID = 7
25,417,667 UART: [art] Erasing AUTHORITY.KEYID = 7
25,419,160 UART: [art] PUB.X = E8D15A2500360CEAA2E50AF6C49DF485628F9B54D2321CF149C161630FFD449BE99264BF017E2BBA0659C14105998711
25,426,413 UART: [art] PUB.Y = 2483E8F36E172480E00B6CEA84F8F8329FE40902A670B5B6C029D1DE62F230563DD8A209FC012A1D36BDF8611DAAA8C2
25,433,674 UART: [art] SIG.R = E928045CCAA86A9BD67554C2683DE902F02ECFD2842A36F06FAFA892584CBF4F1239316DF41C83611E6EC09F6C16DF45
25,441,101 UART: [art] SIG.S = 23F0AAAD58793F50DC3FB2B4C90AF940714F37A16827A477CD6C725F50251BA422EACD057056BAFBD88D1F308A977140
26,419,607 UART: Caliptra RT
26,420,299 UART: [state] CFI Enabled
26,585,210 UART: [rt] RT listening for mailbox commands...
30,627,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,783,703 UART: [rt]cmd =0x41544d4e, len=14344
35,574,265 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,451 UART:
192,829 UART: Running Caliptra ROM ...
194,023 UART:
603,633 UART: [state] CFI Enabled
618,475 UART: [state] LifecycleState = Unprovisioned
620,374 UART: [state] DebugLocked = No
622,113 UART: [state] WD Timer not started. Device not locked for debugging
625,068 UART: [kat] SHA2-256
804,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,814 UART: [kat] ++
816,342 UART: [kat] sha1
826,933 UART: [kat] SHA2-256
830,002 UART: [kat] SHA2-384
836,419 UART: [kat] SHA2-512-ACC
839,354 UART: [kat] ECC-384
3,282,464 UART: [kat] HMAC-384Kdf
3,295,209 UART: [kat] LMS
3,824,675 UART: [kat] --
3,829,654 UART: [cold-reset] ++
3,831,643 UART: [fht] FHT @ 0x50003400
3,843,129 UART: [idev] ++
3,843,686 UART: [idev] CDI.KEYID = 6
3,844,706 UART: [idev] SUBJECT.KEYID = 7
3,845,796 UART: [idev] UDS.KEYID = 0
3,846,834 ready_for_fw is high
3,847,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,718 UART: [idev] Erasing UDS.KEYID = 0
6,320,882 UART: [idev] Sha1 KeyId Algorithm
6,344,296 UART: [idev] --
6,349,690 UART: [ldev] ++
6,350,258 UART: [ldev] CDI.KEYID = 6
6,351,223 UART: [ldev] SUBJECT.KEYID = 5
6,352,368 UART: [ldev] AUTHORITY.KEYID = 7
6,353,645 UART: [ldev] FE.KEYID = 1
6,364,065 UART: [ldev] Erasing FE.KEYID = 1
8,835,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,289 UART: [ldev] --
10,627,337 UART: [fwproc] Wait for Commands...
10,629,913 UART: [fwproc] Recv command 0x46574c44
10,631,998 UART: [fwproc] Recv'd Img size: 114448 bytes
15,210,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,291,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,360,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,678,565 >>> mbox cmd response: success
15,683,551 UART: [afmc] ++
15,684,146 UART: [afmc] CDI.KEYID = 6
15,685,200 UART: [afmc] SUBJECT.KEYID = 7
15,686,297 UART: [afmc] AUTHORITY.KEYID = 5
18,188,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,908,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,910,778 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,926,774 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,942,737 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,958,474 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,981,485 UART: [afmc] --
19,984,392 UART: [cold-reset] --
19,987,284 UART: [state] Locking Datavault
19,992,797 UART: [state] Locking PCR0, PCR1 and PCR31
19,994,430 UART: [state] Locking ICCM
19,996,032 UART: [exit] Launching FMC @ 0x40000130
20,004,483 UART:
20,004,722 UART: Running Caliptra FMC ...
20,005,818 UART:
20,005,975 UART: [state] CFI Enabled
20,013,927 UART: [fht] FMC Alias Private Key: 7
21,770,653 UART: [art] Extend RT PCRs Done
21,771,862 UART: [art] Lock RT PCRs Done
21,773,850 UART: [art] Populate DV Done
21,779,412 UART: [fht] FMC Alias Private Key: 7
21,780,993 UART: [art] Derive CDI
21,781,797 UART: [art] Store in in slot 0x4
21,824,066 UART: [art] Derive Key Pair
21,825,126 UART: [art] Store priv key in slot 0x5
24,251,468 UART: [art] Derive Key Pair - Done
24,264,664 UART: [art] Signing Cert with AUTHO
24,265,960 UART: RITY.KEYID = 7
25,971,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,972,694 UART: [art] PUB.X = 7D478A68D69A52EB8FC99439937A45E76FA5F27EE65B7462D6D19D282BCE5134732009CCC70F8A3D6626F7B50657FE2F
25,979,982 UART: [art] PUB.Y = AE602C7E6FBAAA90D3FE787BFB7A6FFA17AD9C303D3966DF4034890EB7BBFCD7DA4395D9DBE14B897BDF25F54BA4681A
25,987,306 UART: [art] SIG.R = 4D549D44C0659CC6FF7BAFDBBF21A36DA23D965482EA781EEA426891CDBC81BBB52FC1A678D7E005FB5F3E945597AF73
25,994,702 UART: [art] SIG.S = 19D125BFF31BACECC0F4F48DE89DEB2AAD64514DCFD4E64E40A9DADAC0805C58DE84498C0289E75D9D2E3340ECFE65B1
26,973,875 UART: Caliptra RT
26,974,561 UART: [state] CFI Enabled
27,092,006 UART: [rt] RT listening for mailbox commands...
31,114,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,269,943 UART: [rt]cmd =0x41544d4e, len=14344
36,064,813 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,693,748 ready_for_fw is high
3,694,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,249,543 >>> mbox cmd response: success
19,501,226 UART:
19,501,629 UART: Running Caliptra FMC ...
19,502,723 UART:
19,502,870 UART: [state] CFI Enabled
19,511,080 UART: [fht] FMC Alias Private Key: 7
21,267,784 UART: [art] Extend RT PCRs Done
21,269,011 UART: [art] Lock RT PCRs Done
21,270,716 UART: [art] Populate DV Done
21,276,174 UART: [fht] FMC Alias Private Key: 7
21,277,709 UART: [art] Derive CDI
21,278,439 UART: [art] Store in in slot 0x4
21,321,249 UART: [art] Derive Key Pair
21,322,282 UART: [art] Store priv key in slot 0x5
23,748,792 UART: [art] Derive Key Pair - Done
23,761,465 UART: [art] Signing Cert with AUTHO
23,762,766 UART: RITY.KEYID = 7
25,467,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,469,303 UART: [art] PUB.X = 3B840947F622E7EABA70C34644A0081DEA9B894CA369582A3565C883BB06E261CD5E22D1A32644EBE019A26B56FF63CF
25,476,582 UART: [art] PUB.Y = 49CE6BC40801BD34909F8B350BEC1E3EE3A3A4E0A20E35E5E406BEB1CDFFC8F2D3F1ABDCB2AF82DA92BADB8B36E6242C
25,483,866 UART: [art] SIG.R = B388A75E03E35B75B3907F15E1F4A6FA3BCDC1BE37357BA6DDEFC5A17AD9A2FA899830497F36BED62F5F2BF366CD0336
25,491,312 UART: [art] SIG.S = 2CF130DB8D5B565DDBD5BEBD23083A015ADE52CB2A0FD2A2F8003829A82730AACBA8EE33708C3C4C55675F29C2A5BA9C
26,470,606 UART: Caliptra RT
26,471,313 UART: [state] CFI Enabled
26,587,560 UART: [rt] RT listening for mailbox commands...
30,611,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,767,275 UART: [rt]cmd =0x41544d4e, len=14344
35,566,424 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,068 UART:
192,433 UART: Running Caliptra ROM ...
193,620 UART:
193,776 UART: [state] CFI Enabled
265,493 UART: [state] LifecycleState = Unprovisioned
267,919 UART: [state] DebugLocked = No
269,878 UART: [state] WD Timer not started. Device not locked for debugging
274,835 UART: [kat] SHA2-256
464,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,491 UART: [kat] ++
475,940 UART: [kat] sha1
486,460 UART: [kat] SHA2-256
489,542 UART: [kat] SHA2-384
495,391 UART: [kat] SHA2-512-ACC
497,970 UART: [kat] ECC-384
2,948,921 UART: [kat] HMAC-384Kdf
2,971,167 UART: [kat] LMS
3,502,927 UART: [kat] --
3,509,275 UART: [cold-reset] ++
3,511,370 UART: [fht] FHT @ 0x50003400
3,523,082 UART: [idev] ++
3,523,736 UART: [idev] CDI.KEYID = 6
3,524,721 UART: [idev] SUBJECT.KEYID = 7
3,525,890 UART: [idev] UDS.KEYID = 0
3,526,813 ready_for_fw is high
3,527,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,957 UART: [idev] Erasing UDS.KEYID = 0
6,029,938 UART: [idev] Sha1 KeyId Algorithm
6,052,025 UART: [idev] --
6,056,557 UART: [ldev] ++
6,057,231 UART: [ldev] CDI.KEYID = 6
6,058,300 UART: [ldev] SUBJECT.KEYID = 5
6,059,410 UART: [ldev] AUTHORITY.KEYID = 7
6,060,589 UART: [ldev] FE.KEYID = 1
6,101,651 UART: [ldev] Erasing FE.KEYID = 1
8,607,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,321 UART: [ldev] --
10,414,098 UART: [fwproc] Wait for Commands...
10,416,735 UART: [fwproc] Recv command 0x46574c44
10,419,049 UART: [fwproc] Recv'd Img size: 114448 bytes
15,059,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,146,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,262,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,805,446 >>> mbox cmd response: success
15,809,895 UART: [afmc] ++
15,810,606 UART: [afmc] CDI.KEYID = 6
15,811,791 UART: [afmc] SUBJECT.KEYID = 7
15,813,224 UART: [afmc] AUTHORITY.KEYID = 5
18,343,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,066,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,068,674 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,083,741 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,956 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,777 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,137,396 UART: [afmc] --
20,141,527 UART: [cold-reset] --
20,147,175 UART: [state] Locking Datavault
20,152,907 UART: [state] Locking PCR0, PCR1 and PCR31
20,155,113 UART: [state] Locking ICCM
20,156,834 UART: [exit] Launching FMC @ 0x40000130
20,165,504 UART:
20,165,736 UART: Running Caliptra FMC ...
20,166,782 UART:
20,166,945 UART: [state] CFI Enabled
20,223,536 UART: [fht] FMC Alias Private Key: 7
21,987,209 UART: [art] Extend RT PCRs Done
21,988,550 UART: [art] Lock RT PCRs Done
21,990,286 UART: [art] Populate DV Done
21,995,799 UART: [fht] FMC Alias Private Key: 7
21,997,341 UART: [art] Derive CDI
21,998,103 UART: [art] Store in in slot 0x4
22,055,626 UART: [art] Derive Key Pair
22,056,624 UART: [art] Store priv key in slot 0x5
24,519,537 UART: [art] Derive Key Pair - Done
24,532,479 UART: [art] Signing Cert with AUTHO
24,533,780 UART: RITY.KEYID = 7
26,244,801 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,295 UART: [art] PUB.X = 3C49FB880F85327110585E981C0B818B44E9FF5BDE163B7AE4F22CF7C6B57D2275CE6BABB91DD5E91B16F66560101C7F
26,253,597 UART: [art] PUB.Y = 5492712B78C3776149D6CA2B2137E52E33AB5C7B8EC37E173D1DADC72830015095942DDC4AE8F9CDF2D1A87D5110E154
26,260,822 UART: [art] SIG.R = D1ECA5DD8DB232043B474980DDC9B62088AF8A99A69932410B093AA0057B0AE5B63D19A172ABA9513776589B3F832405
26,268,229 UART: [art] SIG.S = 16559D62CB3BD322E068318FC2ED08415F01E9937E9993DBE121999AEE7C144AADABAAA8B3DFC61AFAFFAD3E4E887C11
27,247,115 UART: Caliptra RT
27,247,820 UART: [state] CFI Enabled
27,411,645 UART: [rt] RT listening for mailbox commands...
31,433,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,588,927 UART: [rt]cmd =0x41544d4e, len=14344
36,374,975 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,438,342 ready_for_fw is high
3,438,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,816,823 >>> mbox cmd response: success
20,095,852 UART:
20,096,247 UART: Running Caliptra FMC ...
20,097,355 UART:
20,097,513 UART: [state] CFI Enabled
20,162,586 UART: [fht] FMC Alias Private Key: 7
21,927,302 UART: [art] Extend RT PCRs Done
21,928,519 UART: [art] Lock RT PCRs Done
21,930,280 UART: [art] Populate DV Done
21,935,636 UART: [fht] FMC Alias Private Key: 7
21,937,238 UART: [art] Derive CDI
21,937,980 UART: [art] Store in in slot 0x4
21,995,334 UART: [art] Derive Key Pair
21,996,401 UART: [art] Store priv key in slot 0x5
24,459,492 UART: [art] Derive Key Pair - Done
24,472,638 UART: [art] Signing Cert with AUTHO
24,473,973 UART: RITY.KEYID = 7
26,185,590 UART: [art] Erasing AUTHORITY.KEYID = 7
26,187,095 UART: [art] PUB.X = B11487BBA550D6B39BF575C4BB2F4B7A28AF80A4B7E7DD3DDA9A4859B9C5A3487D24B5D2D198B0EF5A763B330A8F7E0A
26,194,353 UART: [art] PUB.Y = DA1D353FFA05294AE823E2F7E257B55E8452BF11DABDE01929008363B28BCF424B7EB50197129D037B425D49318D1334
26,201,601 UART: [art] SIG.R = ABB88463EA480E7C336A01EDF437652ED0852512F64FFA71E121CEE552FF0E234919D6A57406035D7E192BA8BB348AEF
26,208,989 UART: [art] SIG.S = 075A0940584D14AB6D01E1A9F189ACD666B9F6DD0DEA50DE9929D81DD85BB033B02C79A521FC31B46DE0773F8495ECD5
27,187,633 UART: Caliptra RT
27,188,351 UART: [state] CFI Enabled
27,353,762 UART: [rt] RT listening for mailbox commands...
31,406,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,562,714 UART: [rt]cmd =0x41544d4e, len=14344
36,364,020 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,237 UART:
192,605 UART: Running Caliptra ROM ...
193,797 UART:
603,268 UART: [state] CFI Enabled
615,448 UART: [state] LifecycleState = Unprovisioned
617,831 UART: [state] DebugLocked = No
620,127 UART: [state] WD Timer not started. Device not locked for debugging
623,998 UART: [kat] SHA2-256
813,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,604 UART: [kat] ++
825,119 UART: [kat] sha1
837,185 UART: [kat] SHA2-256
840,181 UART: [kat] SHA2-384
847,440 UART: [kat] SHA2-512-ACC
850,020 UART: [kat] ECC-384
3,291,003 UART: [kat] HMAC-384Kdf
3,302,806 UART: [kat] LMS
3,834,615 UART: [kat] --
3,839,624 UART: [cold-reset] ++
3,841,550 UART: [fht] FHT @ 0x50003400
3,851,522 UART: [idev] ++
3,852,237 UART: [idev] CDI.KEYID = 6
3,853,114 UART: [idev] SUBJECT.KEYID = 7
3,854,345 UART: [idev] UDS.KEYID = 0
3,855,237 ready_for_fw is high
3,855,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,140 UART: [idev] Erasing UDS.KEYID = 0
6,331,826 UART: [idev] Sha1 KeyId Algorithm
6,354,940 UART: [idev] --
6,359,898 UART: [ldev] ++
6,360,577 UART: [ldev] CDI.KEYID = 6
6,361,530 UART: [ldev] SUBJECT.KEYID = 5
6,362,678 UART: [ldev] AUTHORITY.KEYID = 7
6,363,902 UART: [ldev] FE.KEYID = 1
6,373,892 UART: [ldev] Erasing FE.KEYID = 1
8,853,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,821 UART: [ldev] --
10,643,394 UART: [fwproc] Wait for Commands...
10,644,946 UART: [fwproc] Recv command 0x46574c44
10,647,244 UART: [fwproc] Recv'd Img size: 114448 bytes
15,274,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,355,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,471,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,014,852 >>> mbox cmd response: success
16,018,626 UART: [afmc] ++
16,019,335 UART: [afmc] CDI.KEYID = 6
16,020,584 UART: [afmc] SUBJECT.KEYID = 7
16,022,016 UART: [afmc] AUTHORITY.KEYID = 5
18,526,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,249,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,251,675 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,266,730 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,281,927 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,296,764 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,320,704 UART: [afmc] --
20,324,440 UART: [cold-reset] --
20,328,040 UART: [state] Locking Datavault
20,334,533 UART: [state] Locking PCR0, PCR1 and PCR31
20,336,669 UART: [state] Locking ICCM
20,338,300 UART: [exit] Launching FMC @ 0x40000130
20,346,913 UART:
20,347,146 UART: Running Caliptra FMC ...
20,348,161 UART:
20,348,297 UART: [state] CFI Enabled
20,356,335 UART: [fht] FMC Alias Private Key: 7
22,112,911 UART: [art] Extend RT PCRs Done
22,114,139 UART: [art] Lock RT PCRs Done
22,115,896 UART: [art] Populate DV Done
22,121,247 UART: [fht] FMC Alias Private Key: 7
22,122,935 UART: [art] Derive CDI
22,123,663 UART: [art] Store in in slot 0x4
22,166,622 UART: [art] Derive Key Pair
22,167,654 UART: [art] Store priv key in slot 0x5
24,594,133 UART: [art] Derive Key Pair - Done
24,607,231 UART: [art] Signing Cert with AUTHO
24,608,531 UART: RITY.KEYID = 7
26,313,890 UART: [art] Erasing AUTHORITY.KEYID = 7
26,315,525 UART: [art] PUB.X = 95B7E3A27B0387046BD2F10E0BEADD9760A52CF0DDE6277BBEF7EDF98EA4AB9B926165AE9B3A4F3DDA0EC51A0E0F71C0
26,322,693 UART: [art] PUB.Y = A674488C23D7923799374159B3A06D2D7BB9469F31021C4C0A63C1E004DA2F2950E9DA06C315BC36B4BEF6646677E8D3
26,329,954 UART: [art] SIG.R = 2CA7EC5CA4B593FF1EF339282F4E27D58ECCC0D8434C1DE457818677C77AE074BAE0014F268126C43321CEC41FB5B231
26,337,375 UART: [art] SIG.S = 01FE76579E939B4A00CC3993E6ED99CFFD53102F297E380DE143526476EF8D69EE9521EEF1D5D326380EF6C0D302F8F0
27,315,905 UART: Caliptra RT
27,316,593 UART: [state] CFI Enabled
27,433,575 UART: [rt] RT listening for mailbox commands...
31,456,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,611,991 UART: [rt]cmd =0x41544d4e, len=14344
36,399,397 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,758,669 ready_for_fw is high
3,759,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,068,708 >>> mbox cmd response: success
20,324,102 UART:
20,324,505 UART: Running Caliptra FMC ...
20,325,604 UART:
20,325,749 UART: [state] CFI Enabled
20,334,072 UART: [fht] FMC Alias Private Key: 7
22,090,917 UART: [art] Extend RT PCRs Done
22,092,130 UART: [art] Lock RT PCRs Done
22,093,939 UART: [art] Populate DV Done
22,099,196 UART: [fht] FMC Alias Private Key: 7
22,100,896 UART: [art] Derive CDI
22,101,709 UART: [art] Store in in slot 0x4
22,143,924 UART: [art] Derive Key Pair
22,145,128 UART: [art] Store priv key in slot 0x5
24,571,180 UART: [art] Derive Key Pair - Done
24,584,338 UART: [art] Signing Cert with AUTHO
24,585,632 UART: RITY.KEYID = 7
26,291,547 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,045 UART: [art] PUB.X = D8B4BC92A969663EB21EC0C2EE8C28CBCC6A8FB989775AC1EA7AE7B1247C9033A572C03D85F2D2137B4F93D41D25E097
26,300,333 UART: [art] PUB.Y = 4B79C1BBD8EC9AFDFA474A2EBE392F443D3CEF3BB0741E3F44BAD06702236933B28041B56C93D503AB8E74009D204F0F
26,307,591 UART: [art] SIG.R = 89AC0301119C5B248DD8F2559DA9004BFCEB9ED7C83BA01D33B44DAE63691C87AEA76783477858B0BF55F9F3B91C9FCE
26,314,981 UART: [art] SIG.S = 09A87E1BAFA55CE1825E003EB710753E0C2173E4F8BC499365A0552539DF7A7EF1E951FA6135855CD3A3D6F19253499A
27,294,002 UART: Caliptra RT
27,294,726 UART: [state] CFI Enabled
27,410,978 UART: [rt] RT listening for mailbox commands...
31,433,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,588,699 UART: [rt]cmd =0x41544d4e, len=14344
36,373,168 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,019 UART: [kat] SHA2-256
881,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,065 UART: [kat] ++
886,217 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,366 UART: [kat] LMS
1,475,562 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 ready_for_fw is high
1,481,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,770 UART: [idev] --
1,514,969 UART: [ldev] ++
1,515,137 UART: [ldev] CDI.KEYID = 6
1,515,500 UART: [ldev] SUBJECT.KEYID = 5
1,515,926 UART: [ldev] AUTHORITY.KEYID = 7
1,516,389 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,188 UART: [ldev] --
1,585,573 UART: [fwproc] Waiting for Commands...
1,586,344 UART: [fwproc] Received command 0x46574c44
1,587,135 UART: [fwproc] Received Image of size 114448 bytes
5,122,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,577 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,315,920 >>> mbox cmd response: success
5,316,962 UART: [afmc] ++
5,317,130 UART: [afmc] CDI.KEYID = 6
5,317,492 UART: [afmc] SUBJECT.KEYID = 7
5,317,917 UART: [afmc] AUTHORITY.KEYID = 5
5,353,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,753 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,533 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,242 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,134 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,835 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,769 UART: [afmc] --
5,396,675 UART: [cold-reset] --
5,397,579 UART: [state] Locking Datavault
5,398,474 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,078 UART: [state] Locking ICCM
5,399,498 UART: [exit] Launching FMC @ 0x40000130
5,404,827 UART:
5,404,843 UART: Running Caliptra FMC ...
5,405,251 UART:
5,405,305 UART: [state] CFI Enabled
5,416,019 UART: [fht] FMC Alias Private Key: 7
5,524,341 UART: [art] Extend RT PCRs Done
5,524,769 UART: [art] Lock RT PCRs Done
5,526,291 UART: [art] Populate DV Done
5,534,823 UART: [fht] FMC Alias Private Key: 7
5,535,867 UART: [art] Derive CDI
5,536,147 UART: [art] Store in in slot 0x4
5,621,596 UART: [art] Derive Key Pair
5,621,956 UART: [art] Store priv key in slot 0x5
5,635,636 UART: [art] Derive Key Pair - Done
5,650,194 UART: [art] Signing Cert with AUTHO
5,650,674 UART: RITY.KEYID = 7
5,665,876 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,641 UART: [art] PUB.X = 51CB8C5A5DE7651EFCF67761C920D9781E379584B502C65248ACB1A0E488A3E6E6CEA787679C6C0C61F515FA024FD5ED
5,673,412 UART: [art] PUB.Y = 17D0045323155A988A4779230768B3DB1EE11E93B924C1C5B6FE62A760E160998ABA385612D79D513896DB3592745A05
5,680,341 UART: [art] SIG.R = AC4ABB93242AE58775EEFCB33375A88221D575E851BA0DC9CF2BC45EDDD0CA5B686C786EDF017F32628E2E3852DF320E
5,687,120 UART: [art] SIG.S = 58800ED247EC80A0808F5F4F31A92B64EDA72339C1ECC89388AC8784783F5AC3BCBA924D245A7FB15AFE085FDAE15AA6
5,710,537 UART: Caliptra RT
5,710,790 UART: [state] CFI Enabled
5,819,907 UART: [rt] RT listening for mailbox commands...
5,820,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,629 UART: [rt]cmd =0x41544d4e, len=14344
7,182,377 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 ready_for_fw is high
1,362,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,238,674 >>> mbox cmd response: success
5,301,597 UART:
5,301,613 UART: Running Caliptra FMC ...
5,302,021 UART:
5,302,075 UART: [state] CFI Enabled
5,313,055 UART: [fht] FMC Alias Private Key: 7
5,420,963 UART: [art] Extend RT PCRs Done
5,421,391 UART: [art] Lock RT PCRs Done
5,422,767 UART: [art] Populate DV Done
5,430,981 UART: [fht] FMC Alias Private Key: 7
5,432,055 UART: [art] Derive CDI
5,432,335 UART: [art] Store in in slot 0x4
5,518,378 UART: [art] Derive Key Pair
5,518,738 UART: [art] Store priv key in slot 0x5
5,531,564 UART: [art] Derive Key Pair - Done
5,546,392 UART: [art] Signing Cert with AUTHO
5,546,872 UART: RITY.KEYID = 7
5,562,168 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,933 UART: [art] PUB.X = B2A8D77626D6F19A525C6C7E7313A33481484DA51EC759662F89D4C7BBAEDAF54A64FA33E0E271B8A178160E5F845B20
5,569,706 UART: [art] PUB.Y = 2ADB23B65B748FE8069F66FCA5A18CA46E304708E1520A9ACDB95F2224F7183509FC10E5EE03E88A47DD3D46C0559166
5,576,647 UART: [art] SIG.R = A8259056B1368AA29CA3AC145E787A55F09EC2C73BEEAE59FC17988B6CE383EBA0C53FB18AB418D9A4AA90F7633F421C
5,583,433 UART: [art] SIG.S = 66138D8E75E8D2889E2187BDC486906A21F35166B34CF36FBEF93FE523398643CE13D627468FDF1CC4FD359CEDF55291
5,606,952 UART: Caliptra RT
5,607,205 UART: [state] CFI Enabled
5,714,400 UART: [rt] RT listening for mailbox commands...
5,715,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,970 UART: [rt]cmd =0x41544d4e, len=14344
7,076,726 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,707 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,276 UART: [cold-reset] ++
1,476,726 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 ready_for_fw is high
1,480,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,803 UART: [idev] Erasing UDS.KEYID = 0
1,505,909 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,408 UART: [ldev] Erasing FE.KEYID = 1
1,547,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,297 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,503 UART: [fwproc] Received command 0x46574c44
1,588,294 UART: [fwproc] Received Image of size 114448 bytes
4,972,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,001,328 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,030,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,166,793 >>> mbox cmd response: success
5,167,931 UART: [afmc] ++
5,168,099 UART: [afmc] CDI.KEYID = 6
5,168,461 UART: [afmc] SUBJECT.KEYID = 7
5,168,886 UART: [afmc] AUTHORITY.KEYID = 5
5,203,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,220,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,220,850 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,226,559 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,232,451 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,238,152 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,245,874 UART: [afmc] --
5,246,986 UART: [cold-reset] --
5,247,714 UART: [state] Locking Datavault
5,248,739 UART: [state] Locking PCR0, PCR1 and PCR31
5,249,343 UART: [state] Locking ICCM
5,249,945 UART: [exit] Launching FMC @ 0x40000130
5,255,274 UART:
5,255,290 UART: Running Caliptra FMC ...
5,255,698 UART:
5,255,841 UART: [state] CFI Enabled
5,266,303 UART: [fht] FMC Alias Private Key: 7
5,374,613 UART: [art] Extend RT PCRs Done
5,375,041 UART: [art] Lock RT PCRs Done
5,376,579 UART: [art] Populate DV Done
5,385,209 UART: [fht] FMC Alias Private Key: 7
5,386,355 UART: [art] Derive CDI
5,386,635 UART: [art] Store in in slot 0x4
5,472,446 UART: [art] Derive Key Pair
5,472,806 UART: [art] Store priv key in slot 0x5
5,485,912 UART: [art] Derive Key Pair - Done
5,500,599 UART: [art] Signing Cert with AUTHO
5,501,079 UART: RITY.KEYID = 7
5,516,475 UART: [art] Erasing AUTHORITY.KEYID = 7
5,517,240 UART: [art] PUB.X = 9562801434A9A5A7254C23F7DF9AA87F74172D39CD3AACD1BEE320CBACC2217882E8A49FAFD40930EDB3245ADE6F9C05
5,524,020 UART: [art] PUB.Y = 1EC9C4D4204CDEBE62740BF20904605087077EDA7389C65749776B9388D583A5CA0C1A7D7D134D6E04A9BDACEDC6C68C
5,530,962 UART: [art] SIG.R = 463D1FD2DDACF254190414732BBD903D790555CAA958F68092D4727B56969961A760CC71770374AB8B166A7385E828F4
5,537,715 UART: [art] SIG.S = 38EC2E2D98B4F93F03B881FCB75F3BCF78D1FCA3C08D1983EC65ADCD578D4923B96ACA173FA69A8835ACC92D858512DE
5,561,585 UART: Caliptra RT
5,561,930 UART: [state] CFI Enabled
5,669,956 UART: [rt] RT listening for mailbox commands...
5,670,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,793,674 UART: [rt]cmd =0x41544d4e, len=14344
7,008,066 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,000 ready_for_fw is high
1,363,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,529 >>> mbox cmd response: success
5,379,122 UART:
5,379,138 UART: Running Caliptra FMC ...
5,379,546 UART:
5,379,689 UART: [state] CFI Enabled
5,390,167 UART: [fht] FMC Alias Private Key: 7
5,497,759 UART: [art] Extend RT PCRs Done
5,498,187 UART: [art] Lock RT PCRs Done
5,499,937 UART: [art] Populate DV Done
5,508,081 UART: [fht] FMC Alias Private Key: 7
5,509,257 UART: [art] Derive CDI
5,509,537 UART: [art] Store in in slot 0x4
5,595,216 UART: [art] Derive Key Pair
5,595,576 UART: [art] Store priv key in slot 0x5
5,609,526 UART: [art] Derive Key Pair - Done
5,624,433 UART: [art] Signing Cert with AUTHO
5,624,913 UART: RITY.KEYID = 7
5,640,181 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,946 UART: [art] PUB.X = C80EE3F7EB92A7299B7A68730210CA2E76336AABB22AE890FAACC5134FDF267F7B44CDFDD33C7A27F5D87B22F6FAC4C5
5,647,734 UART: [art] PUB.Y = 5745BD42B9916B504CDF42BCFBBE2AD0F6318CAC703B1D63B02DBA7622FBB2BD3396DC7809599A6362ABB2CF7AB82E00
5,654,679 UART: [art] SIG.R = 6D3B7E99127FD38D47D7F38581460C471ACDA0A49A45A25D798E294FC3C864164CE6E759D4E6B8CDD0DB86016AC2D42C
5,661,453 UART: [art] SIG.S = CB3197B45C49312FE4A6A618C1A6AB76F2C4C40126E8E31AB58376FA01938ACC823BACBA8E00F4A68620E639AF7AA9B8
5,685,418 UART: Caliptra RT
5,685,763 UART: [state] CFI Enabled
5,793,946 UART: [rt] RT listening for mailbox commands...
5,794,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,917,738 UART: [rt]cmd =0x41544d4e, len=14344
7,156,118 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,158 UART: [kat] SHA2-512-ACC
908,059 UART: [kat] ECC-384
917,912 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,499 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 ready_for_fw is high
1,176,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,250 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,493 UART: [ldev] ++
1,210,661 UART: [ldev] CDI.KEYID = 6
1,211,024 UART: [ldev] SUBJECT.KEYID = 5
1,211,450 UART: [ldev] AUTHORITY.KEYID = 7
1,211,913 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,473 UART: [ldev] --
1,282,918 UART: [fwproc] Wait for Commands...
1,283,604 UART: [fwproc] Recv command 0x46574c44
1,284,332 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,569 >>> mbox cmd response: success
3,319,661 UART: [afmc] ++
3,319,829 UART: [afmc] CDI.KEYID = 6
3,320,191 UART: [afmc] SUBJECT.KEYID = 7
3,320,616 UART: [afmc] AUTHORITY.KEYID = 5
3,356,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,611 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,320 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,212 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,923 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,674 UART: [afmc] --
3,399,806 UART: [cold-reset] --
3,400,848 UART: [state] Locking Datavault
3,401,961 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,565 UART: [state] Locking ICCM
3,403,193 UART: [exit] Launching FMC @ 0x40000130
3,408,522 UART:
3,408,538 UART: Running Caliptra FMC ...
3,408,946 UART:
3,409,000 UART: [state] CFI Enabled
3,419,420 UART: [fht] FMC Alias Private Key: 7
3,526,966 UART: [art] Extend RT PCRs Done
3,527,394 UART: [art] Lock RT PCRs Done
3,529,014 UART: [art] Populate DV Done
3,537,378 UART: [fht] FMC Alias Private Key: 7
3,538,342 UART: [art] Derive CDI
3,538,622 UART: [art] Store in in slot 0x4
3,624,351 UART: [art] Derive Key Pair
3,624,711 UART: [art] Store priv key in slot 0x5
3,638,127 UART: [art] Derive Key Pair - Done
3,653,130 UART: [art] Signing Cert with AUTHO
3,653,610 UART: RITY.KEYID = 7
3,668,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,303 UART: [art] PUB.X = 22EE2FC3A60464C32AB1A740D8E5843443D097C9A324BD6D818F485C112375F7A70BE5CE033CB9B4064482F49B897EA0
3,676,063 UART: [art] PUB.Y = 538DCDC97C77FA31F8CE7982DD1D45707BF6869BE13323237971E850201830C8C3E3B38225C9C81B9DBBE62CD0F6C09F
3,683,019 UART: [art] SIG.R = 9F3F8F81CC60E10D3F5408065FBED0A73CBE1F90EC2830005A6CB1E6FC4634DA204E8FF0F7A5DE79BFFA934C650CB6EE
3,689,779 UART: [art] SIG.S = D170BD8C342F82B0E5901E737B8CC6E9B3B0827218458A02AADF78388E0C281EAD924FA48AA272BEA6BF84FBB4E6FB22
3,713,536 UART: Caliptra RT
3,713,789 UART: [state] CFI Enabled
3,820,604 UART: [rt] RT listening for mailbox commands...
3,821,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,606 UART: [rt]cmd =0x41544d4e, len=14344
5,172,946 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,409 ready_for_fw is high
1,060,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,179,108 >>> mbox cmd response: success
3,240,741 UART:
3,240,757 UART: Running Caliptra FMC ...
3,241,165 UART:
3,241,219 UART: [state] CFI Enabled
3,251,683 UART: [fht] FMC Alias Private Key: 7
3,359,935 UART: [art] Extend RT PCRs Done
3,360,363 UART: [art] Lock RT PCRs Done
3,361,957 UART: [art] Populate DV Done
3,369,909 UART: [fht] FMC Alias Private Key: 7
3,371,019 UART: [art] Derive CDI
3,371,299 UART: [art] Store in in slot 0x4
3,457,018 UART: [art] Derive Key Pair
3,457,378 UART: [art] Store priv key in slot 0x5
3,470,810 UART: [art] Derive Key Pair - Done
3,485,703 UART: [art] Signing Cert with AUTHO
3,486,183 UART: RITY.KEYID = 7
3,501,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,312 UART: [art] PUB.X = 03B57C70B3F6924D34F9BF6BDFA20CACD3DF3DF7294D21652E34AEFB4AE9056AAC9D525008C780FF045204FD381E8843
3,509,078 UART: [art] PUB.Y = 0DADB0852FBE13804BD65A38B5F113C9E6063B12EEFEAC2E138A7284E20A33CA874F622766D2B93FEFE34FCA3142ECAB
3,516,039 UART: [art] SIG.R = B7CC640B83A36AEE20E6A3804327888D0883A2B389B81116051B5176EF5C6FC2972B0296C48F7B04A11937211BD1DAE5
3,522,792 UART: [art] SIG.S = 298517409C023EC4A2E89E84846D74BDF60AA66AB02B6690B5914F5021B8712D2AF550B161687A6E90B0EAB379CF9457
3,546,391 UART: Caliptra RT
3,546,644 UART: [state] CFI Enabled
3,653,430 UART: [rt] RT listening for mailbox commands...
3,654,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,278 UART: [rt]cmd =0x41544d4e, len=14344
5,020,804 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
906,935 UART: [kat] SHA2-512-ACC
908,836 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,118 UART: [cold-reset] ++
1,172,474 UART: [fht] FHT @ 0x50003400
1,175,247 UART: [idev] ++
1,175,415 UART: [idev] CDI.KEYID = 6
1,175,775 UART: [idev] SUBJECT.KEYID = 7
1,176,199 UART: [idev] UDS.KEYID = 0
1,176,544 ready_for_fw is high
1,176,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,611 UART: [idev] Erasing UDS.KEYID = 0
1,201,068 UART: [idev] Sha1 KeyId Algorithm
1,209,458 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,164 UART: [ldev] Erasing FE.KEYID = 1
1,243,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,172 UART: [ldev] --
1,282,613 UART: [fwproc] Wait for Commands...
1,283,355 UART: [fwproc] Recv command 0x46574c44
1,284,083 UART: [fwproc] Recv'd Img size: 114448 bytes
3,135,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,350 >>> mbox cmd response: success
3,328,558 UART: [afmc] ++
3,328,726 UART: [afmc] CDI.KEYID = 6
3,329,088 UART: [afmc] SUBJECT.KEYID = 7
3,329,513 UART: [afmc] AUTHORITY.KEYID = 5
3,365,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,274 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,983 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,875 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,586 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,471 UART: [afmc] --
3,408,551 UART: [cold-reset] --
3,409,353 UART: [state] Locking Datavault
3,410,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,262 UART: [state] Locking ICCM
3,411,814 UART: [exit] Launching FMC @ 0x40000130
3,417,143 UART:
3,417,159 UART: Running Caliptra FMC ...
3,417,567 UART:
3,417,710 UART: [state] CFI Enabled
3,428,676 UART: [fht] FMC Alias Private Key: 7
3,535,744 UART: [art] Extend RT PCRs Done
3,536,172 UART: [art] Lock RT PCRs Done
3,537,916 UART: [art] Populate DV Done
3,545,888 UART: [fht] FMC Alias Private Key: 7
3,546,832 UART: [art] Derive CDI
3,547,112 UART: [art] Store in in slot 0x4
3,632,563 UART: [art] Derive Key Pair
3,632,923 UART: [art] Store priv key in slot 0x5
3,645,703 UART: [art] Derive Key Pair - Done
3,660,419 UART: [art] Signing Cert with AUTHO
3,660,899 UART: RITY.KEYID = 7
3,675,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,672 UART: [art] PUB.X = 9B91B96437F456ABBCF76193A2958DDD33522525144DC2050AB38BCB13792F1A4C28720984AD5D15E0DF00880BFE48D0
3,683,410 UART: [art] PUB.Y = E1F81A349B5974FFEEFDFBF44B7AB96A6F302C2EF153A07AFDED759BA6919496E1086AC3877276CBE15B32F04C4C81F1
3,690,375 UART: [art] SIG.R = E4AD231AB5E53C2E4185E8395B0B1D22FDAFEB60BB1C87B93447BACD564BEB8E92F1C03B1DF400002BA550E0194F5E80
3,697,116 UART: [art] SIG.S = C8151D7EC8CCCEC74B76124951E849745CF7CC84DAC42E3589E4079CE038A97F825011E66AA7AA522FDA81AACDAE356D
3,721,432 UART: Caliptra RT
3,721,777 UART: [state] CFI Enabled
3,828,794 UART: [rt] RT listening for mailbox commands...
3,829,464 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,610 UART: [rt]cmd =0x41544d4e, len=14344
5,190,918 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,484 ready_for_fw is high
1,060,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,660 >>> mbox cmd response: success
3,232,715 UART:
3,232,731 UART: Running Caliptra FMC ...
3,233,139 UART:
3,233,282 UART: [state] CFI Enabled
3,243,818 UART: [fht] FMC Alias Private Key: 7
3,351,514 UART: [art] Extend RT PCRs Done
3,351,942 UART: [art] Lock RT PCRs Done
3,353,570 UART: [art] Populate DV Done
3,361,958 UART: [fht] FMC Alias Private Key: 7
3,363,084 UART: [art] Derive CDI
3,363,364 UART: [art] Store in in slot 0x4
3,449,223 UART: [art] Derive Key Pair
3,449,583 UART: [art] Store priv key in slot 0x5
3,462,895 UART: [art] Derive Key Pair - Done
3,477,483 UART: [art] Signing Cert with AUTHO
3,477,963 UART: RITY.KEYID = 7
3,493,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,046 UART: [art] PUB.X = B31F3F0434ACEE111E792F4D8F96F722EB6E22BF5413A91BC310D7E5FD0A680644FA67763C550A22B91897E68A4F048B
3,500,807 UART: [art] PUB.Y = FD01010DA17E651AE238152D57F222AB8E907425F18A9F760685DF7C990530199CD17496626342A3001807841C0F5BA3
3,507,702 UART: [art] SIG.R = C8DEE5D5C002D71746136310000D888FF10C6D9A38177949FC8AFEC38006D2D9CC39DE3B090957362215FFB60C73D829
3,514,429 UART: [art] SIG.S = 79E38317B3756BACDDED0443AEDCB2D60F4E4BE955FCC265C1C10C2C0E49D14CFC5EA280FB19996D350F3CCF9CC9A825
3,538,235 UART: Caliptra RT
3,538,580 UART: [state] CFI Enabled
3,647,732 UART: [rt] RT listening for mailbox commands...
3,648,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,124 UART: [rt]cmd =0x41544d4e, len=14344
5,002,353 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,174,485 ready_for_fw is high
1,174,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,843 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,362 UART: [ldev] --
1,280,668 UART: [fwproc] Wait for Commands...
1,281,371 UART: [fwproc] Recv command 0x46574c44
1,282,104 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,060 >>> mbox cmd response: success
3,327,167 UART: [afmc] ++
3,327,335 UART: [afmc] CDI.KEYID = 6
3,327,698 UART: [afmc] SUBJECT.KEYID = 7
3,328,124 UART: [afmc] AUTHORITY.KEYID = 5
3,363,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,927 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,637 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,527 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,238 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,044 UART: [afmc] --
3,406,984 UART: [cold-reset] --
3,407,784 UART: [state] Locking Datavault
3,408,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,539 UART: [state] Locking ICCM
3,410,111 UART: [exit] Launching FMC @ 0x40000130
3,415,440 UART:
3,415,456 UART: Running Caliptra FMC ...
3,415,864 UART:
3,415,918 UART: [state] CFI Enabled
3,426,338 UART: [fht] FMC Alias Private Key: 7
3,533,856 UART: [art] Extend RT PCRs Done
3,534,284 UART: [art] Lock RT PCRs Done
3,535,700 UART: [art] Populate DV Done
3,544,098 UART: [fht] FMC Alias Private Key: 7
3,545,084 UART: [art] Derive CDI
3,545,364 UART: [art] Store in in slot 0x4
3,630,931 UART: [art] Derive Key Pair
3,631,291 UART: [art] Store priv key in slot 0x5
3,644,433 UART: [art] Derive Key Pair - Done
3,658,969 UART: [art] Signing Cert with AUTHO
3,659,449 UART: RITY.KEYID = 7
3,674,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,322 UART: [art] PUB.X = A27A47A4B597AA5DDCCE238A725A376CBB85E1182F151F27921F8F4C4A0A4D7A8AA0E89F959B62D5844ED8B8454E48CF
3,682,103 UART: [art] PUB.Y = 24E68B16001890E2EEB3FE1478EBAAC16AAE7547EB1B4AC15CB9CDBFD5EA72711B1B22A8D35A3527FD76860F9A79334D
3,689,046 UART: [art] SIG.R = D47905FA166D05F30117082804EABF15AC84E8B1CBA3D9B2954426CC76528B99EC3232ADEB2D5BF64ADED577A15DA1B5
3,695,815 UART: [art] SIG.S = 7F894DDBB45BFAC70581C744EDFE3EEDD9D5C6655CDCCCBDEA0278B81D363AA38D7195D1570FC5D359D63BF7E6D44D51
3,719,461 UART: Caliptra RT
3,719,714 UART: [state] CFI Enabled
3,827,608 UART: [rt] RT listening for mailbox commands...
3,828,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,314 UART: [rt]cmd =0x41544d4e, len=14344
5,182,107 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 ready_for_fw is high
1,055,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,994 >>> mbox cmd response: success
3,223,233 UART:
3,223,249 UART: Running Caliptra FMC ...
3,223,657 UART:
3,223,711 UART: [state] CFI Enabled
3,234,043 UART: [fht] FMC Alias Private Key: 7
3,341,787 UART: [art] Extend RT PCRs Done
3,342,215 UART: [art] Lock RT PCRs Done
3,343,741 UART: [art] Populate DV Done
3,351,961 UART: [fht] FMC Alias Private Key: 7
3,352,913 UART: [art] Derive CDI
3,353,193 UART: [art] Store in in slot 0x4
3,438,698 UART: [art] Derive Key Pair
3,439,058 UART: [art] Store priv key in slot 0x5
3,451,668 UART: [art] Derive Key Pair - Done
3,466,608 UART: [art] Signing Cert with AUTHO
3,467,088 UART: RITY.KEYID = 7
3,482,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,101 UART: [art] PUB.X = 0CECF564024EA093263243A6802CFEC2F875C1D1890AF04DE452B4BDF5104E1BA8DC668E0FAE71F91B68452BF46283B6
3,489,869 UART: [art] PUB.Y = 67680080EA44D449AC88DB58267189D712B25C8752FCB600270E45110AE8F83305630ACE25316B01FFE6384D27C1063E
3,496,749 UART: [art] SIG.R = E67796AA1A61D1CBB23B6914F11EAD84DBABA6432B621BD167470A18961F9BFB90C7907371D7B412EA7DCF814A6637B9
3,503,526 UART: [art] SIG.S = EE956FB388B23536669D579B9B3199046518387CA38328C4CAEF1BDDD87BDF8E88DDC870001C26D74464FAA47A4AC7B4
3,527,568 UART: Caliptra RT
3,527,821 UART: [state] CFI Enabled
3,635,926 UART: [rt] RT listening for mailbox commands...
3,636,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,794 UART: [rt]cmd =0x41544d4e, len=14344
4,993,440 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
916,803 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,590 UART: [fwproc] Recv command 0x46574c44
1,283,323 UART: [fwproc] Recv'd Img size: 114448 bytes
3,139,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,167,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,196,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,333,089 >>> mbox cmd response: success
3,334,202 UART: [afmc] ++
3,334,370 UART: [afmc] CDI.KEYID = 6
3,334,733 UART: [afmc] SUBJECT.KEYID = 7
3,335,159 UART: [afmc] AUTHORITY.KEYID = 5
3,370,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,387,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,387,920 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,393,630 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,399,520 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,405,231 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,413,009 UART: [afmc] --
3,414,037 UART: [cold-reset] --
3,414,945 UART: [state] Locking Datavault
3,416,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,416,954 UART: [state] Locking ICCM
3,417,620 UART: [exit] Launching FMC @ 0x40000130
3,422,949 UART:
3,422,965 UART: Running Caliptra FMC ...
3,423,373 UART:
3,423,516 UART: [state] CFI Enabled
3,434,034 UART: [fht] FMC Alias Private Key: 7
3,541,856 UART: [art] Extend RT PCRs Done
3,542,284 UART: [art] Lock RT PCRs Done
3,543,718 UART: [art] Populate DV Done
3,551,958 UART: [fht] FMC Alias Private Key: 7
3,553,050 UART: [art] Derive CDI
3,553,330 UART: [art] Store in in slot 0x4
3,639,233 UART: [art] Derive Key Pair
3,639,593 UART: [art] Store priv key in slot 0x5
3,652,741 UART: [art] Derive Key Pair - Done
3,667,278 UART: [art] Signing Cert with AUTHO
3,667,758 UART: RITY.KEYID = 7
3,682,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,683,635 UART: [art] PUB.X = 81155B99E4207BD2BCF75762F343B9B86EB4A8A49169E4488496F52766FF7B23130D3D122661DC63848517EB8AF88417
3,690,394 UART: [art] PUB.Y = 2FFE414BFE0717FBCF72EE3EB1266CBC84AB4814427C1DEDCAAC65ADC4565139FABE6358D8F1A91F6934CC52DE6D5270
3,697,365 UART: [art] SIG.R = 0923A7F658562A07654CF56F5D46B601D2D48D03B8E84064EAACBF80E612B3E7A572BBBE23E4CE4A2A8D8A27C2349D8C
3,704,135 UART: [art] SIG.S = A7B14B17AA01331E556181788DA293B006D639C546B2CB0C6EBD3227264EC0BD0EAFA01A1BC2A7AF5B54C68796075EED
3,727,733 UART: Caliptra RT
3,728,078 UART: [state] CFI Enabled
3,834,996 UART: [rt] RT listening for mailbox commands...
3,835,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,958,836 UART: [rt]cmd =0x41544d4e, len=14344
5,199,421 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,241 ready_for_fw is high
1,056,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,938 >>> mbox cmd response: success
3,237,421 UART:
3,237,437 UART: Running Caliptra FMC ...
3,237,845 UART:
3,237,988 UART: [state] CFI Enabled
3,248,618 UART: [fht] FMC Alias Private Key: 7
3,356,328 UART: [art] Extend RT PCRs Done
3,356,756 UART: [art] Lock RT PCRs Done
3,358,496 UART: [art] Populate DV Done
3,366,748 UART: [fht] FMC Alias Private Key: 7
3,367,804 UART: [art] Derive CDI
3,368,084 UART: [art] Store in in slot 0x4
3,453,991 UART: [art] Derive Key Pair
3,454,351 UART: [art] Store priv key in slot 0x5
3,467,729 UART: [art] Derive Key Pair - Done
3,482,802 UART: [art] Signing Cert with AUTHO
3,483,282 UART: RITY.KEYID = 7
3,498,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,821 UART: [art] PUB.X = 98EA95B5ACF15A88BA0DA3003111AABF3572722602A87C34FB4DE81DFAB1C897735FED07C90B4E370E3F32476E109CF3
3,505,566 UART: [art] PUB.Y = 79E7CEFB7F5C1C7A036923DA1FEE80081021404ECB4DA8F318D37A45C5134B679BA004757B2DC9F51347CF4350B2E8CC
3,512,517 UART: [art] SIG.R = F40689D9AD88F86C30AA475B6A030EFA2BE68C004E8126118C02BDAD28A570CF792E3F626E8A9FF39235D7D90219B294
3,519,256 UART: [art] SIG.S = 14167DF6EAAFCB232F50CA34C604D146A31F5DED4E9F9C5DFEF5FEABF6A007B211F7910087CB2949FDBEB8FE76FFF30B
3,543,530 UART: Caliptra RT
3,543,875 UART: [state] CFI Enabled
3,651,265 UART: [rt] RT listening for mailbox commands...
3,651,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,055 UART: [rt]cmd =0x41544d4e, len=14344
5,015,734 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,143 UART:
192,509 UART: Running Caliptra ROM ...
193,593 UART:
193,739 UART: [state] CFI Enabled
261,012 UART: [state] LifecycleState = Unprovisioned
262,981 UART: [state] DebugLocked = No
264,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,368 UART: [kat] SHA2-256
439,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,564 UART: [kat] ++
450,047 UART: [kat] sha1
460,433 UART: [kat] SHA2-256
463,171 UART: [kat] SHA2-384
468,235 UART: [kat] SHA2-512-ACC
470,581 UART: [kat] ECC-384
2,767,778 UART: [kat] HMAC-384Kdf
2,798,520 UART: [kat] LMS
3,988,821 UART: [kat] --
3,993,907 UART: [cold-reset] ++
3,995,417 UART: [fht] Storing FHT @ 0x50003400
4,007,608 UART: [idev] ++
4,008,172 UART: [idev] CDI.KEYID = 6
4,009,135 UART: [idev] SUBJECT.KEYID = 7
4,010,385 UART: [idev] UDS.KEYID = 0
4,011,375 ready_for_fw is high
4,011,575 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,190 UART: [idev] Erasing UDS.KEYID = 0
7,343,669 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,932 UART: [idev] --
7,370,725 UART: [ldev] ++
7,371,301 UART: [ldev] CDI.KEYID = 6
7,372,215 UART: [ldev] SUBJECT.KEYID = 5
7,373,426 UART: [ldev] AUTHORITY.KEYID = 7
7,374,712 UART: [ldev] FE.KEYID = 1
7,422,892 UART: [ldev] Erasing FE.KEYID = 1
10,753,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,399 UART: [ldev] --
13,116,001 UART: [fwproc] Waiting for Commands...
13,118,207 UART: [fwproc] Received command 0x46574c44
13,120,440 UART: [fwproc] Received Image of size 114124 bytes
21,998,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,075,517 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,144,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,462,529 >>> mbox cmd response: success
22,467,583 UART: [afmc] ++
22,468,207 UART: [afmc] CDI.KEYID = 6
22,469,097 UART: [afmc] SUBJECT.KEYID = 7
22,470,318 UART: [afmc] AUTHORITY.KEYID = 5
25,825,223 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,126,014 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,128,323 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,142,880 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,157,625 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,171,831 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,194,063 UART: [afmc] --
28,198,739 UART: [cold-reset] --
28,203,053 UART: [state] Locking Datavault
28,208,043 UART: [state] Locking PCR0, PCR1 and PCR31
28,209,744 UART: [state] Locking ICCM
28,212,462 UART: [exit] Launching FMC @ 0x40000130
28,220,904 UART:
28,221,147 UART: Running Caliptra FMC ...
28,222,184 UART:
28,222,333 UART: [state] CFI Enabled
28,283,568 UART: [fht] FMC Alias Private Key: 7
30,620,967 UART: [art] Extend RT PCRs Done
30,622,193 UART: [art] Lock RT PCRs Done
30,623,957 UART: [art] Populate DV Done
30,629,280 UART: [fht] FMC Alias Private Key: 7
30,630,925 UART: [art] Derive CDI
30,631,674 UART: [art] Store in in slot 0x4
30,691,260 UART: [art] Derive Key Pair
30,692,286 UART: [art] Store priv key in slot 0x5
33,985,313 UART: [art] Derive Key Pair - Done
33,998,379 UART: [art] Signing Cert with AUTHO
33,999,676 UART: RITY.KEYID = 7
36,286,373 UART: [art] Erasing AUTHORITY.KEYID = 7
36,287,882 UART: [art] PUB.X = 8FB1B0A798356130D4DDFFCCBDFDFADA3CC8BB49FA6B0E2FA06B59FDC57FF2F7B83C4A61DE0074C92A083ABEE2A954B7
36,295,155 UART: [art] PUB.Y = AA7A092F75DB6BD687DF8AEABF455B4DF026CA2D03683DFBB84EF24A4B099C2EA1F4695B5A3836DC14BD785F23848712
36,302,451 UART: [art] SIG.R = 0C419D0273F5E758ECB511A71AAE3A610BB4A749BDD6C453C88CC87983B07B5932ED14C017F419194B207695A128B198
36,309,844 UART: [art] SIG.S = 0FF53BE3F9724336FD64CA9061888511BF409BD1D01C974733CCB9E3BE1A4F57A6E4A26545533465838D47BC60821E8E
37,614,567 UART: Caliptra RT
37,615,283 UART: [state] CFI Enabled
37,777,205 UART: [rt] RT listening for mailbox commands...
37,779,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,934,803 UART: [rt]cmd =0x41544d4e, len=14344
44,117,205 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,808,414 ready_for_fw is high
3,808,800 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,082,028 >>> mbox cmd response: success
27,763,456 UART:
27,764,303 UART: Running Caliptra FMC ...
27,765,441 UART:
27,765,594 UART: [state] CFI Enabled
27,815,373 UART: [fht] FMC Alias Private Key: 7
30,152,707 UART: [art] Extend RT PCRs Done
30,153,957 UART: [art] Lock RT PCRs Done
30,155,882 UART: [art] Populate DV Done
30,161,203 UART: [fht] FMC Alias Private Key: 7
30,162,781 UART: [art] Derive CDI
30,163,528 UART: [art] Store in in slot 0x4
30,223,756 UART: [art] Derive Key Pair
30,224,758 UART: [art] Store priv key in slot 0x5
33,518,105 UART: [art] Derive Key Pair - Done
33,531,213 UART: [art] Signing Cert with AUTHO
33,532,515 UART: RITY.KEYID = 7
35,818,756 UART: [art] Erasing AUTHORITY.KEYID = 7
35,820,260 UART: [art] PUB.X = 85B558C76A0BC4ADDAFFDA3A91A343158E9D1C7A457A738298A0610BF5ACADE11ACEF14E0EE65DCB5A1574F311737817
35,827,511 UART: [art] PUB.Y = 4635A98A65F76FBB4C6CC63AD4FC76A6506368A3811C112CB389DDCB299A52BF07B5F1295173616A20CD0BC8E9776292
35,834,780 UART: [art] SIG.R = 495B2590070108DE972FE33791FF7B9647F12A587BB7C1AB4F326C56412E7E109D808F930917C81C7E4966E6F34927D5
35,842,153 UART: [art] SIG.S = 729F2A4CADEC2BD50AA9684BCEE69BB0D5A6A6587C85F0E7096285A34C123DAC4D8E6757C0D9B3E28B998977C3D2A232
37,147,481 UART: Caliptra RT
37,148,207 UART: [state] CFI Enabled
37,309,783 UART: [rt] RT listening for mailbox commands...
37,312,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,467,645 UART: [rt]cmd =0x41544d4e, len=14344
43,935,761 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,498 UART:
192,845 UART: Running Caliptra ROM ...
194,021 UART:
603,758 UART: [state] CFI Enabled
616,362 UART: [state] LifecycleState = Unprovisioned
618,249 UART: [state] DebugLocked = No
620,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,064 UART: [kat] SHA2-256
794,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,325 UART: [kat] ++
805,809 UART: [kat] sha1
817,674 UART: [kat] SHA2-256
820,399 UART: [kat] SHA2-384
825,177 UART: [kat] SHA2-512-ACC
827,537 UART: [kat] ECC-384
3,111,457 UART: [kat] HMAC-384Kdf
3,122,676 UART: [kat] LMS
4,312,839 UART: [kat] --
4,316,931 UART: [cold-reset] ++
4,318,805 UART: [fht] Storing FHT @ 0x50003400
4,329,501 UART: [idev] ++
4,330,060 UART: [idev] CDI.KEYID = 6
4,331,036 UART: [idev] SUBJECT.KEYID = 7
4,332,273 UART: [idev] UDS.KEYID = 0
4,333,376 ready_for_fw is high
4,333,591 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,954 UART: [idev] Erasing UDS.KEYID = 0
7,616,296 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,746 UART: [idev] --
7,643,061 UART: [ldev] ++
7,643,631 UART: [ldev] CDI.KEYID = 6
7,644,610 UART: [ldev] SUBJECT.KEYID = 5
7,645,814 UART: [ldev] AUTHORITY.KEYID = 7
7,647,035 UART: [ldev] FE.KEYID = 1
7,660,108 UART: [ldev] Erasing FE.KEYID = 1
10,949,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,262 UART: [ldev] --
13,308,652 UART: [fwproc] Waiting for Commands...
13,311,704 UART: [fwproc] Received command 0x46574c44
13,313,939 UART: [fwproc] Received Image of size 114124 bytes
22,110,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,189,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,258,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,576,222 >>> mbox cmd response: success
22,581,185 UART: [afmc] ++
22,581,777 UART: [afmc] CDI.KEYID = 6
22,582,715 UART: [afmc] SUBJECT.KEYID = 7
22,583,979 UART: [afmc] AUTHORITY.KEYID = 5
25,900,066 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,193,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,195,774 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,210,372 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,225,100 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,239,322 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,261,468 UART: [afmc] --
28,265,795 UART: [cold-reset] --
28,270,480 UART: [state] Locking Datavault
28,276,763 UART: [state] Locking PCR0, PCR1 and PCR31
28,278,421 UART: [state] Locking ICCM
28,279,844 UART: [exit] Launching FMC @ 0x40000130
28,288,257 UART:
28,288,539 UART: Running Caliptra FMC ...
28,289,590 UART:
28,289,735 UART: [state] CFI Enabled
28,297,857 UART: [fht] FMC Alias Private Key: 7
30,628,401 UART: [art] Extend RT PCRs Done
30,629,627 UART: [art] Lock RT PCRs Done
30,631,007 UART: [art] Populate DV Done
30,636,427 UART: [fht] FMC Alias Private Key: 7
30,638,073 UART: [art] Derive CDI
30,638,806 UART: [art] Store in in slot 0x4
30,681,710 UART: [art] Derive Key Pair
30,682,703 UART: [art] Store priv key in slot 0x5
33,925,490 UART: [art] Derive Key Pair - Done
33,938,233 UART: [art] Signing Cert with AUTHO
33,939,599 UART: RITY.KEYID = 7
36,218,673 UART: [art] Erasing AUTHORITY.KEYID = 7
36,220,185 UART: [art] PUB.X = FE1CBE200A2B00D4851FA13CD72D0CF180303D79087AFBECB2304AC53E742C471F584E5418C631CD3D34D63C75738D24
36,227,429 UART: [art] PUB.Y = 7EF19700F1A66B5072754A27B3C1D68343A5F778EFF53193D73A20080DF62FB2A3D2D1B9F5824CDE5CC32C47FE73BB17
36,234,651 UART: [art] SIG.R = C0BD28C9FECCA84B4C1D9B3C75548A5BF92F2FF8BBA6FD177CD7B5383DD5566FECFB1532223A8F55A23E455931EEEF96
36,242,090 UART: [art] SIG.S = 41D149BB50C69F83E9C3E4A396EFFF05E87BA43A9C65DD51020D7375DA1FD83EEDF1F149EC0B4B5D32BCCFECE0201684
37,547,268 UART: Caliptra RT
37,547,982 UART: [state] CFI Enabled
37,665,387 UART: [rt] RT listening for mailbox commands...
37,667,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,823,219 UART: [rt]cmd =0x41544d4e, len=14344
44,031,634 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,126,038 ready_for_fw is high
4,126,677 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,976,116 >>> mbox cmd response: success
27,611,597 UART:
27,612,007 UART: Running Caliptra FMC ...
27,613,320 UART:
27,613,484 UART: [state] CFI Enabled
27,621,350 UART: [fht] FMC Alias Private Key: 7
29,952,175 UART: [art] Extend RT PCRs Done
29,953,392 UART: [art] Lock RT PCRs Done
29,955,339 UART: [art] Populate DV Done
29,960,641 UART: [fht] FMC Alias Private Key: 7
29,962,129 UART: [art] Derive CDI
29,962,886 UART: [art] Store in in slot 0x4
30,005,591 UART: [art] Derive Key Pair
30,006,641 UART: [art] Store priv key in slot 0x5
33,248,956 UART: [art] Derive Key Pair - Done
33,262,000 UART: [art] Signing Cert with AUTHO
33,263,325 UART: RITY.KEYID = 7
35,542,496 UART: [art] Erasing AUTHORITY.KEYID = 7
35,544,009 UART: [art] PUB.X = 54B94A466E83D02C28282C6F9CE33002DD4064690468E1D4283DE5A5F6B77242B676DCE8645C018309144D2686A7DB37
35,551,192 UART: [art] PUB.Y = 5A5F04DF943E8E3684417DE2C56F2A4D319ECCDB21CBB52FCBDD4D470ED00596D1BEFAE81D40B8E75A7CF3EE38D7E7DD
35,558,493 UART: [art] SIG.R = 691B0AA598FEB2C80231196A9690EA01816B5FA45B035F0A4886D21CD2EA09183EA1D8E17DDE9666EA05C2901E521A03
35,565,874 UART: [art] SIG.S = 7F0175C9B4D72F033A8E5143F53FA1AFC4E0129D2890558F5E3FB4178269F7900C1F4E12F4EF81A21F8F3DBAAE0135A0
36,871,486 UART: Caliptra RT
36,872,202 UART: [state] CFI Enabled
36,991,129 UART: [rt] RT listening for mailbox commands...
36,993,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,148,567 UART: [rt]cmd =0x41544d4e, len=14344
43,383,405 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,043 UART:
192,414 UART: Running Caliptra ROM ...
193,505 UART:
193,644 UART: [state] CFI Enabled
263,621 UART: [state] LifecycleState = Unprovisioned
265,538 UART: [state] DebugLocked = No
268,199 UART: [state] WD Timer not started. Device not locked for debugging
271,322 UART: [kat] SHA2-256
450,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,984 UART: [kat] ++
462,437 UART: [kat] sha1
474,940 UART: [kat] SHA2-256
478,023 UART: [kat] SHA2-384
484,379 UART: [kat] SHA2-512-ACC
487,389 UART: [kat] ECC-384
2,947,321 UART: [kat] HMAC-384Kdf
2,972,126 UART: [kat] LMS
3,501,590 UART: [kat] --
3,505,656 UART: [cold-reset] ++
3,507,867 UART: [fht] FHT @ 0x50003400
3,518,915 UART: [idev] ++
3,519,486 UART: [idev] CDI.KEYID = 6
3,520,477 UART: [idev] SUBJECT.KEYID = 7
3,521,673 UART: [idev] UDS.KEYID = 0
3,522,596 ready_for_fw is high
3,522,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,726 UART: [idev] Erasing UDS.KEYID = 0
6,027,989 UART: [idev] Sha1 KeyId Algorithm
6,050,608 UART: [idev] --
6,053,704 UART: [ldev] ++
6,054,277 UART: [ldev] CDI.KEYID = 6
6,055,191 UART: [ldev] SUBJECT.KEYID = 5
6,056,345 UART: [ldev] AUTHORITY.KEYID = 7
6,057,633 UART: [ldev] FE.KEYID = 1
6,101,979 UART: [ldev] Erasing FE.KEYID = 1
8,607,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,749 UART: [ldev] --
10,416,036 UART: [fwproc] Wait for Commands...
10,418,613 UART: [fwproc] Recv command 0x46574c44
10,420,705 UART: [fwproc] Recv'd Img size: 114448 bytes
14,999,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,079,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,148,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,466,489 >>> mbox cmd response: success
15,470,399 UART: [afmc] ++
15,470,997 UART: [afmc] CDI.KEYID = 6
15,471,910 UART: [afmc] SUBJECT.KEYID = 7
15,473,121 UART: [afmc] AUTHORITY.KEYID = 5
18,003,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,726,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,939 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,743,973 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,759,911 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,775,663 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,797,777 UART: [afmc] --
19,801,151 UART: [cold-reset] --
19,804,630 UART: [state] Locking Datavault
19,811,006 UART: [state] Locking PCR0, PCR1 and PCR31
19,812,691 UART: [state] Locking ICCM
19,815,092 UART: [exit] Launching FMC @ 0x40000130
19,823,489 UART:
19,823,722 UART: Running Caliptra FMC ...
19,824,817 UART:
19,824,978 UART: [state] CFI Enabled
19,884,416 UART: [fht] FMC Alias Private Key: 7
21,648,708 UART: [art] Extend RT PCRs Done
21,650,080 UART: [art] Lock RT PCRs Done
21,651,625 UART: [art] Populate DV Done
21,656,829 UART: [fht] FMC Alias Private Key: 7
21,658,421 UART: [art] Derive CDI
21,659,230 UART: [art] Store in in slot 0x4
21,716,918 UART: [art] Derive Key Pair
21,717,914 UART: [art] Store priv key in slot 0x5
24,181,209 UART: [art] Derive Key Pair - Done
24,194,155 UART: [art] Signing Cert with AUTHO
24,195,456 UART: RITY.KEYID = 7
25,907,007 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,513 UART: [art] PUB.X = 75E36BE6A7DE0FBE3E729140C4F1AB17B5DDA178A5EE611FCB3DA76615C98AD4A20D5B05C6E2869C9A2D099912EFB80E
25,915,818 UART: [art] PUB.Y = AFA2275ECF3D138903E7062391510C7EB353674FC829B4B4581CB37A7F48142E8B9372B953683D0C888F5D77C0D32243
25,923,051 UART: [art] SIG.R = BE0D0A290B82838075EEE1FEABDFCB7A104BACFB54E82A4FCA85A084DA32E8D34226B7F54F3C97756C4862F5DF0B07A5
25,930,497 UART: [art] SIG.S = 87E1B4E16D6DDF4DCB108C987EDE2002DA1E417B4A26A87B816E1A728F3A983E4E1D956D9283B9A6DD048889D9B1AB77
26,909,551 UART: Caliptra RT
26,910,251 UART: [state] CFI Enabled
27,074,822 UART: [rt] RT listening for mailbox commands...
27,077,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,233,004 UART: [rt]cmd =0x41544d4e, len=14344
30,830,455 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,360,789 ready_for_fw is high
3,361,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,019,543 >>> mbox cmd response: success
19,307,559 UART:
19,307,985 UART: Running Caliptra FMC ...
19,309,120 UART:
19,309,283 UART: [state] CFI Enabled
19,374,001 UART: [fht] FMC Alias Private Key: 7
21,137,361 UART: [art] Extend RT PCRs Done
21,138,581 UART: [art] Lock RT PCRs Done
21,140,204 UART: [art] Populate DV Done
21,145,444 UART: [fht] FMC Alias Private Key: 7
21,147,054 UART: [art] Derive CDI
21,147,876 UART: [art] Store in in slot 0x4
21,207,145 UART: [art] Derive Key Pair
21,208,183 UART: [art] Store priv key in slot 0x5
23,671,252 UART: [art] Derive Key Pair - Done
23,683,817 UART: [art] Signing Cert with AUTHO
23,685,124 UART: RITY.KEYID = 7
25,397,561 UART: [art] Erasing AUTHORITY.KEYID = 7
25,399,232 UART: [art] PUB.X = B8D0ED5933E70FBE02032D320EFFA1F000D95BE793FB6C17B64576C17F9CD93C2BF008551E6D380DB97E2401C3109429
25,406,334 UART: [art] PUB.Y = C216A51F3BB69D9B01E359BB864188D1F257E797984605A64065EA909EB2670FE28D1D8A6F50A68E7EBEAFB1F860F8F6
25,413,611 UART: [art] SIG.R = ADC00FD1C16C119782C2E60733C3D65C2EDC605DCD3A3520311CEDA0B1A3B592716200362566F2D4070CA15282021953
25,420,914 UART: [art] SIG.S = 638FABA392031F608AE9850C43DFDBC87124613D143A5260636EA216130BC65CB3338E76B68300AC2E6E726023D56313
26,399,590 UART: Caliptra RT
26,400,302 UART: [state] CFI Enabled
26,566,307 UART: [rt] RT listening for mailbox commands...
26,568,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,724,445 UART: [rt]cmd =0x41544d4e, len=14344
30,342,148 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,379 UART:
192,756 UART: Running Caliptra ROM ...
193,942 UART:
603,507 UART: [state] CFI Enabled
612,653 UART: [state] LifecycleState = Unprovisioned
614,516 UART: [state] DebugLocked = No
617,315 UART: [state] WD Timer not started. Device not locked for debugging
620,830 UART: [kat] SHA2-256
800,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,535 UART: [kat] ++
812,066 UART: [kat] sha1
822,236 UART: [kat] SHA2-256
825,226 UART: [kat] SHA2-384
830,432 UART: [kat] SHA2-512-ACC
833,356 UART: [kat] ECC-384
3,276,104 UART: [kat] HMAC-384Kdf
3,288,732 UART: [kat] LMS
3,818,224 UART: [kat] --
3,822,094 UART: [cold-reset] ++
3,823,880 UART: [fht] FHT @ 0x50003400
3,836,089 UART: [idev] ++
3,836,691 UART: [idev] CDI.KEYID = 6
3,837,569 UART: [idev] SUBJECT.KEYID = 7
3,838,807 UART: [idev] UDS.KEYID = 0
3,839,699 ready_for_fw is high
3,839,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,523 UART: [idev] Erasing UDS.KEYID = 0
6,312,347 UART: [idev] Sha1 KeyId Algorithm
6,335,027 UART: [idev] --
6,339,987 UART: [ldev] ++
6,340,552 UART: [ldev] CDI.KEYID = 6
6,341,455 UART: [ldev] SUBJECT.KEYID = 5
6,342,623 UART: [ldev] AUTHORITY.KEYID = 7
6,343,900 UART: [ldev] FE.KEYID = 1
6,353,799 UART: [ldev] Erasing FE.KEYID = 1
8,827,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,044 UART: [ldev] --
10,612,326 UART: [fwproc] Wait for Commands...
10,615,001 UART: [fwproc] Recv command 0x46574c44
10,617,092 UART: [fwproc] Recv'd Img size: 114448 bytes
15,162,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,240,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,308,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,627,721 >>> mbox cmd response: success
15,631,321 UART: [afmc] ++
15,631,930 UART: [afmc] CDI.KEYID = 6
15,632,833 UART: [afmc] SUBJECT.KEYID = 7
15,634,038 UART: [afmc] AUTHORITY.KEYID = 5
18,136,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,856,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,858,833 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,874,785 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,890,742 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,906,511 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,929,052 UART: [afmc] --
19,932,332 UART: [cold-reset] --
19,936,146 UART: [state] Locking Datavault
19,940,688 UART: [state] Locking PCR0, PCR1 and PCR31
19,942,324 UART: [state] Locking ICCM
19,944,733 UART: [exit] Launching FMC @ 0x40000130
19,953,196 UART:
19,953,435 UART: Running Caliptra FMC ...
19,954,535 UART:
19,954,688 UART: [state] CFI Enabled
19,962,781 UART: [fht] FMC Alias Private Key: 7
21,719,337 UART: [art] Extend RT PCRs Done
21,720,550 UART: [art] Lock RT PCRs Done
21,722,061 UART: [art] Populate DV Done
21,727,897 UART: [fht] FMC Alias Private Key: 7
21,729,375 UART: [art] Derive CDI
21,730,122 UART: [art] Store in in slot 0x4
21,772,544 UART: [art] Derive Key Pair
21,773,576 UART: [art] Store priv key in slot 0x5
24,200,686 UART: [art] Derive Key Pair - Done
24,213,732 UART: [art] Signing Cert with AUTHO
24,215,026 UART: RITY.KEYID = 7
25,920,265 UART: [art] Erasing AUTHORITY.KEYID = 7
25,921,763 UART: [art] PUB.X = 463D7941204046489A70A90ABA1BBEA4E0AC19727D6981AD494D8DC93641E1B9DE5EC36D228A97132E5914F3BFA97988
25,929,049 UART: [art] PUB.Y = 4B95611DDA572BD90B0FE86A3C37F7140271150CF6279BD91530D76686968772FDA702D53D53EFEBF8C49F3E7CDE722B
25,936,319 UART: [art] SIG.R = 3A22EA2A107B5E55CC3EB592E4FFD7153AAEB12AAC1C41A509710B2FE1867BC10E0B6119DBAA0D07E914D68646807926
25,943,694 UART: [art] SIG.S = 346BBC894095E449E9A2DB02E140CA869F88D1FC778A395BF5C6ACAFF566A1FCB20A9F57027E3D379AA4294994297B06
26,922,556 UART: Caliptra RT
26,923,266 UART: [state] CFI Enabled
27,040,447 UART: [rt] RT listening for mailbox commands...
27,042,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,197,838 UART: [rt]cmd =0x41544d4e, len=14344
30,816,408 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,694,825 ready_for_fw is high
3,695,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,238,916 >>> mbox cmd response: success
19,493,643 UART:
19,494,355 UART: Running Caliptra FMC ...
19,495,477 UART:
19,495,620 UART: [state] CFI Enabled
19,502,985 UART: [fht] FMC Alias Private Key: 7
21,261,007 UART: [art] Extend RT PCRs Done
21,262,219 UART: [art] Lock RT PCRs Done
21,264,111 UART: [art] Populate DV Done
21,269,416 UART: [fht] FMC Alias Private Key: 7
21,271,047 UART: [art] Derive CDI
21,271,801 UART: [art] Store in in slot 0x4
21,314,388 UART: [art] Derive Key Pair
21,315,379 UART: [art] Store priv key in slot 0x5
23,742,848 UART: [art] Derive Key Pair - Done
23,755,891 UART: [art] Signing Cert with AUTHO
23,757,215 UART: RITY.KEYID = 7
25,463,369 UART: [art] Erasing AUTHORITY.KEYID = 7
25,464,858 UART: [art] PUB.X = B3C8D69C1ABC692CB0422259FA46D9F71F7EABC6CB45387A56A118CDDAE59BB8AB4251B7EA357FABE11AAE486EEEAF84
25,472,168 UART: [art] PUB.Y = 6DF41132658DFFC9772F18FE69BF5BD03F2A2D90D6D68DC330F2D9CDF5D791F4A374091CF7EC097937BFF4ED3498E816
25,479,457 UART: [art] SIG.R = 1742F61418D1E94123BF9B9128F08594B7C4F2577368C40AA5300DB0638880F8597CC06232AFB6463D1DD954DD9CE40E
25,486,800 UART: [art] SIG.S = 819F1FFCF71810A089BDFCD008F2F6A8831F91D180B78A1C6F23B1FBAD03B04D3E767DEFE7924A2FD70F6E28F282264F
26,465,469 UART: Caliptra RT
26,466,304 UART: [state] CFI Enabled
26,582,171 UART: [rt] RT listening for mailbox commands...
26,584,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,739,702 UART: [rt]cmd =0x41544d4e, len=14344
30,349,009 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,182 UART:
192,549 UART: Running Caliptra ROM ...
193,632 UART:
193,774 UART: [state] CFI Enabled
263,948 UART: [state] LifecycleState = Unprovisioned
266,370 UART: [state] DebugLocked = No
268,388 UART: [state] WD Timer not started. Device not locked for debugging
273,764 UART: [kat] SHA2-256
463,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,430 UART: [kat] ++
474,875 UART: [kat] sha1
486,688 UART: [kat] SHA2-256
489,699 UART: [kat] SHA2-384
496,894 UART: [kat] SHA2-512-ACC
499,470 UART: [kat] ECC-384
2,948,472 UART: [kat] HMAC-384Kdf
2,970,662 UART: [kat] LMS
3,502,411 UART: [kat] --
3,507,755 UART: [cold-reset] ++
3,509,830 UART: [fht] FHT @ 0x50003400
3,520,804 UART: [idev] ++
3,521,506 UART: [idev] CDI.KEYID = 6
3,522,392 UART: [idev] SUBJECT.KEYID = 7
3,523,631 UART: [idev] UDS.KEYID = 0
3,524,530 ready_for_fw is high
3,524,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,684 UART: [idev] Erasing UDS.KEYID = 0
6,029,340 UART: [idev] Sha1 KeyId Algorithm
6,050,627 UART: [idev] --
6,056,243 UART: [ldev] ++
6,056,963 UART: [ldev] CDI.KEYID = 6
6,057,856 UART: [ldev] SUBJECT.KEYID = 5
6,059,070 UART: [ldev] AUTHORITY.KEYID = 7
6,060,254 UART: [ldev] FE.KEYID = 1
6,098,420 UART: [ldev] Erasing FE.KEYID = 1
8,607,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,146 UART: [ldev] --
10,413,145 UART: [fwproc] Wait for Commands...
10,414,695 UART: [fwproc] Recv command 0x46574c44
10,416,971 UART: [fwproc] Recv'd Img size: 114448 bytes
15,066,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,146,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,262,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,804,867 >>> mbox cmd response: success
15,809,189 UART: [afmc] ++
15,809,897 UART: [afmc] CDI.KEYID = 6
15,811,058 UART: [afmc] SUBJECT.KEYID = 7
15,812,599 UART: [afmc] AUTHORITY.KEYID = 5
18,358,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,101,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,103,075 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,118,143 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,133,342 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,148,176 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,172,127 UART: [afmc] --
20,175,573 UART: [cold-reset] --
20,180,088 UART: [state] Locking Datavault
20,184,426 UART: [state] Locking PCR0, PCR1 and PCR31
20,186,672 UART: [state] Locking ICCM
20,188,370 UART: [exit] Launching FMC @ 0x40000130
20,197,036 UART:
20,197,271 UART: Running Caliptra FMC ...
20,198,297 UART:
20,198,443 UART: [state] CFI Enabled
20,257,622 UART: [fht] FMC Alias Private Key: 7
22,021,174 UART: [art] Extend RT PCRs Done
22,022,403 UART: [art] Lock RT PCRs Done
22,023,788 UART: [art] Populate DV Done
22,028,990 UART: [fht] FMC Alias Private Key: 7
22,030,689 UART: [art] Derive CDI
22,031,428 UART: [art] Store in in slot 0x4
22,090,117 UART: [art] Derive Key Pair
22,091,161 UART: [art] Store priv key in slot 0x5
24,553,833 UART: [art] Derive Key Pair - Done
24,566,614 UART: [art] Signing Cert with AUTHO
24,567,916 UART: RITY.KEYID = 7
26,279,260 UART: [art] Erasing AUTHORITY.KEYID = 7
26,280,762 UART: [art] PUB.X = 14EE7AFBFEF498ED5F020055BABDCD01DA940C9C3126BB44BA8983DE94A7DDB5BB8B67C56C92CF42A5B885E2BFF909D5
26,288,057 UART: [art] PUB.Y = 853A2B4961CDF46882D4B22A40D559EBF63E42149BC5421F4138D5F62CB9CF6273631709471E1423E0979DB253C414A8
26,295,313 UART: [art] SIG.R = FB59FBD4281A79332E60F5C3F2AC396500A80EF93685B8B8641F9CE20A7222624A19AB732F93DA292607FBD149613A84
26,302,662 UART: [art] SIG.S = E592F919EA33A7AD8DF365FDAF9465327CEC92C1E0DDC91771B33737842DE2B49FE0E56EB853DE48EF48EC7AEC99601F
27,281,418 UART: Caliptra RT
27,282,109 UART: [state] CFI Enabled
27,444,960 UART: [rt] RT listening for mailbox commands...
27,447,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,603,030 UART: [rt]cmd =0x41544d4e, len=14344
31,219,725 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,438,241 ready_for_fw is high
3,438,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,841,997 >>> mbox cmd response: success
20,156,359 UART:
20,156,735 UART: Running Caliptra FMC ...
20,157,925 UART:
20,158,094 UART: [state] CFI Enabled
20,226,623 UART: [fht] FMC Alias Private Key: 7
21,990,399 UART: [art] Extend RT PCRs Done
21,991,649 UART: [art] Lock RT PCRs Done
21,993,280 UART: [art] Populate DV Done
21,998,532 UART: [fht] FMC Alias Private Key: 7
22,000,018 UART: [art] Derive CDI
22,000,790 UART: [art] Store in in slot 0x4
22,060,701 UART: [art] Derive Key Pair
22,061,712 UART: [art] Store priv key in slot 0x5
24,524,630 UART: [art] Derive Key Pair - Done
24,537,796 UART: [art] Signing Cert with AUTHO
24,539,096 UART: RITY.KEYID = 7
26,250,798 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,300 UART: [art] PUB.X = 77D1FAD25DB71E41A2556B1E720998CE600CB87F0894989D16441B3A3EB7CB4D4ED94BA06273E46F13985837300F65B2
26,259,548 UART: [art] PUB.Y = B2E1F594466C6409D2017A8E104D42ADFB8F3BACA65E0BCD907B4315F5C731698C68CCFDFAE2B2392EE493B2FF7BE6A4
26,266,810 UART: [art] SIG.R = 22853E380F213EC50169A52A886E2267896D1DBB5058FFF4D2C7BDD3B96AA7D18034A837A3433ED1DFF451C1774AD5C9
26,274,203 UART: [art] SIG.S = 23D0CE2B20FA1A4F222BDEDD15D70E51326EC715EB504AF3A1D4CC001C8CC9AE646ADED2FEBF36CA1A88D32ACE62643F
27,252,249 UART: Caliptra RT
27,252,947 UART: [state] CFI Enabled
27,418,670 UART: [rt] RT listening for mailbox commands...
27,420,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,577,145 UART: [rt]cmd =0x41544d4e, len=14344
31,190,836 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,414 UART:
192,777 UART: Running Caliptra ROM ...
194,095 UART:
603,403 UART: [state] CFI Enabled
615,577 UART: [state] LifecycleState = Unprovisioned
617,960 UART: [state] DebugLocked = No
619,686 UART: [state] WD Timer not started. Device not locked for debugging
623,913 UART: [kat] SHA2-256
813,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,602 UART: [kat] ++
825,142 UART: [kat] sha1
836,475 UART: [kat] SHA2-256
839,523 UART: [kat] SHA2-384
844,659 UART: [kat] SHA2-512-ACC
847,233 UART: [kat] ECC-384
3,291,462 UART: [kat] HMAC-384Kdf
3,304,756 UART: [kat] LMS
3,836,548 UART: [kat] --
3,842,129 UART: [cold-reset] ++
3,843,633 UART: [fht] FHT @ 0x50003400
3,855,591 UART: [idev] ++
3,856,298 UART: [idev] CDI.KEYID = 6
3,857,197 UART: [idev] SUBJECT.KEYID = 7
3,858,426 UART: [idev] UDS.KEYID = 0
3,859,340 ready_for_fw is high
3,859,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,674 UART: [idev] Erasing UDS.KEYID = 0
6,335,095 UART: [idev] Sha1 KeyId Algorithm
6,357,463 UART: [idev] --
6,362,990 UART: [ldev] ++
6,363,670 UART: [ldev] CDI.KEYID = 6
6,364,575 UART: [ldev] SUBJECT.KEYID = 5
6,365,777 UART: [ldev] AUTHORITY.KEYID = 7
6,366,999 UART: [ldev] FE.KEYID = 1
6,378,329 UART: [ldev] Erasing FE.KEYID = 1
8,855,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,035 UART: [ldev] --
10,646,616 UART: [fwproc] Wait for Commands...
10,649,638 UART: [fwproc] Recv command 0x46574c44
10,651,940 UART: [fwproc] Recv'd Img size: 114448 bytes
15,288,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,367,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,483,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,027,058 >>> mbox cmd response: success
16,031,417 UART: [afmc] ++
16,032,126 UART: [afmc] CDI.KEYID = 6
16,033,882 UART: [afmc] SUBJECT.KEYID = 7
16,035,007 UART: [afmc] AUTHORITY.KEYID = 5
18,534,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,254,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,256,475 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,271,526 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,286,722 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,301,580 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,325,690 UART: [afmc] --
20,328,415 UART: [cold-reset] --
20,330,549 UART: [state] Locking Datavault
20,335,002 UART: [state] Locking PCR0, PCR1 and PCR31
20,337,206 UART: [state] Locking ICCM
20,339,726 UART: [exit] Launching FMC @ 0x40000130
20,348,399 UART:
20,348,628 UART: Running Caliptra FMC ...
20,349,722 UART:
20,349,876 UART: [state] CFI Enabled
20,357,600 UART: [fht] FMC Alias Private Key: 7
22,113,903 UART: [art] Extend RT PCRs Done
22,115,132 UART: [art] Lock RT PCRs Done
22,116,914 UART: [art] Populate DV Done
22,122,318 UART: [fht] FMC Alias Private Key: 7
22,124,011 UART: [art] Derive CDI
22,124,845 UART: [art] Store in in slot 0x4
22,167,499 UART: [art] Derive Key Pair
22,168,497 UART: [art] Store priv key in slot 0x5
24,596,075 UART: [art] Derive Key Pair - Done
24,609,190 UART: [art] Signing Cert with AUTHO
24,610,497 UART: RITY.KEYID = 7
26,315,778 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,255 UART: [art] PUB.X = 3DE571F8FF3AFC5EF1E9C5F7C3876AA31C0AE1F9C4FF8CDCACF4ADC3FADF1062A56AAF561AB9FFF8A53C805B703D6271
26,324,584 UART: [art] PUB.Y = 6612C0E342369D48858E931F480EDC296DEF867E9A3A229965AC62C5C7778CFB5798366B4839FECDC3155E4A38BDC95F
26,331,852 UART: [art] SIG.R = 56E9A497F5B7C0FC7CF9EB6B8516D0DF75DD125BBAA21FE44E6AC6B2D37FB6552552B2FA217483990491D375B1F3A2A6
26,339,224 UART: [art] SIG.S = A0B62B664B65F91E3C0CECD8C727B34DA38F2226A76CA98A04C07172296CB39454D0574B4F9D8282658F3C2E96BAADAD
27,317,801 UART: Caliptra RT
27,318,517 UART: [state] CFI Enabled
27,435,041 UART: [rt] RT listening for mailbox commands...
27,437,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,592,677 UART: [rt]cmd =0x41544d4e, len=14344
31,193,093 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,752,673 ready_for_fw is high
3,753,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,077,352 >>> mbox cmd response: success
20,332,954 UART:
20,333,348 UART: Running Caliptra FMC ...
20,334,472 UART:
20,334,618 UART: [state] CFI Enabled
20,342,666 UART: [fht] FMC Alias Private Key: 7
22,099,486 UART: [art] Extend RT PCRs Done
22,100,714 UART: [art] Lock RT PCRs Done
22,102,519 UART: [art] Populate DV Done
22,107,872 UART: [fht] FMC Alias Private Key: 7
22,109,351 UART: [art] Derive CDI
22,110,110 UART: [art] Store in in slot 0x4
22,152,488 UART: [art] Derive Key Pair
22,153,521 UART: [art] Store priv key in slot 0x5
24,580,324 UART: [art] Derive Key Pair - Done
24,593,168 UART: [art] Signing Cert with AUTHO
24,594,468 UART: RITY.KEYID = 7
26,300,297 UART: [art] Erasing AUTHORITY.KEYID = 7
26,301,800 UART: [art] PUB.X = 7FD69EA082AFD68A7A02070A0B8DF9ABA806F3A05935D187029D075FD3EBC56E7AA8D14C48CD1B6724F423EB87A68EF2
26,309,090 UART: [art] PUB.Y = A2013B61233E2377F893CBF2F0AB1C3A957E889F7728895BAEB44B78CBC6C5A0CBC7C36A9656971EFFC55FBB0975F53B
26,316,330 UART: [art] SIG.R = 9586E75628D011B43BEF5BF8B47062A1AE6AD190C05C230DC2C8B48A4E6907064FFA14EF70040BFFFCD52283BEEDFF4E
26,323,733 UART: [art] SIG.S = A05B89E2AD49667B84F5195AC26650CAA75D5BBC1FCE02E2C4E1AA1860398A030AF0F1C90BB37D44E52ACEF1B974C3CE
27,303,180 UART: Caliptra RT
27,303,887 UART: [state] CFI Enabled
27,422,118 UART: [rt] RT listening for mailbox commands...
27,424,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,623 UART: [rt]cmd =0x41544d4e, len=14344
31,192,264 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,949 UART: [kat] SHA2-256
881,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,995 UART: [kat] ++
886,147 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,573 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 ready_for_fw is high
1,480,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,330 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,514,783 UART: [ldev] ++
1,514,951 UART: [ldev] CDI.KEYID = 6
1,515,314 UART: [ldev] SUBJECT.KEYID = 5
1,515,740 UART: [ldev] AUTHORITY.KEYID = 7
1,516,203 UART: [ldev] FE.KEYID = 1
1,521,303 UART: [ldev] Erasing FE.KEYID = 1
1,546,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,954 UART: [ldev] --
1,585,253 UART: [fwproc] Waiting for Commands...
1,585,890 UART: [fwproc] Received command 0x46574c44
1,586,681 UART: [fwproc] Received Image of size 114448 bytes
5,160,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,188,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,217,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,353,669 >>> mbox cmd response: success
5,354,699 UART: [afmc] ++
5,354,867 UART: [afmc] CDI.KEYID = 6
5,355,229 UART: [afmc] SUBJECT.KEYID = 7
5,355,654 UART: [afmc] AUTHORITY.KEYID = 5
5,390,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,407,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,407,854 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,413,563 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,419,455 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,425,156 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,432,984 UART: [afmc] --
5,433,976 UART: [cold-reset] --
5,434,656 UART: [state] Locking Datavault
5,436,137 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,741 UART: [state] Locking ICCM
5,437,299 UART: [exit] Launching FMC @ 0x40000130
5,442,628 UART:
5,442,644 UART: Running Caliptra FMC ...
5,443,052 UART:
5,443,106 UART: [state] CFI Enabled
5,453,576 UART: [fht] FMC Alias Private Key: 7
5,560,986 UART: [art] Extend RT PCRs Done
5,561,414 UART: [art] Lock RT PCRs Done
5,562,704 UART: [art] Populate DV Done
5,570,926 UART: [fht] FMC Alias Private Key: 7
5,571,900 UART: [art] Derive CDI
5,572,180 UART: [art] Store in in slot 0x4
5,657,357 UART: [art] Derive Key Pair
5,657,717 UART: [art] Store priv key in slot 0x5
5,671,471 UART: [art] Derive Key Pair - Done
5,686,293 UART: [art] Signing Cert with AUTHO
5,686,773 UART: RITY.KEYID = 7
5,701,679 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,444 UART: [art] PUB.X = 9EDEC837A99F4713CD2F610D184769889053666080E4F2DEA4FEF876D1D7BE87AE30B57B0231424AEB16194588C150B4
5,709,208 UART: [art] PUB.Y = 6B48F7BAABA64D3B0D76FDB45C849F4068016EA3D3038A4B3398F67439937FF21BBDE4FD57C6E3E8DE4019025F04069E
5,716,150 UART: [art] SIG.R = D31C6770434E2C323E0875104421D0F026EA858E06A8A83CE66F11C168A9607E7073DF4EB740273DF54100FDE1F59F11
5,722,888 UART: [art] SIG.S = 5A7BF4177D83F5FF19675D40729763CD4722F91910C0ECB770ED76811FBD80519D788573DDB1294513A1249BD479099E
5,746,588 UART: Caliptra RT
5,746,841 UART: [state] CFI Enabled
5,853,998 UART: [rt] RT listening for mailbox commands...
5,854,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,018 UART: [rt]cmd =0x41544d4e, len=14344
6,947,449 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,075 ready_for_fw is high
1,363,075 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,241,608 >>> mbox cmd response: success
5,303,429 UART:
5,303,445 UART: Running Caliptra FMC ...
5,303,853 UART:
5,303,907 UART: [state] CFI Enabled
5,314,547 UART: [fht] FMC Alias Private Key: 7
5,421,773 UART: [art] Extend RT PCRs Done
5,422,201 UART: [art] Lock RT PCRs Done
5,423,655 UART: [art] Populate DV Done
5,431,837 UART: [fht] FMC Alias Private Key: 7
5,432,821 UART: [art] Derive CDI
5,433,101 UART: [art] Store in in slot 0x4
5,518,436 UART: [art] Derive Key Pair
5,518,796 UART: [art] Store priv key in slot 0x5
5,532,116 UART: [art] Derive Key Pair - Done
5,546,701 UART: [art] Signing Cert with AUTHO
5,547,181 UART: RITY.KEYID = 7
5,561,763 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,528 UART: [art] PUB.X = 3F54A78CE05D6859FE8812D7545689A15194C42E4DAF40A07FF253DE616C54EE6628333FF51F1B73F6C0EF760EB890DB
5,569,301 UART: [art] PUB.Y = 0DA7D2B6BD738171460118004885F74611607979036BAD2E5C6C3CC6E31424D2A562F5A2348B2433D98ABFF823B22B31
5,576,214 UART: [art] SIG.R = 51A861AC9FFD23629DA2E31EE05690D461167BB519C480D2A91E5B870A5A961BECF99DA561654378233C3D0169831FC1
5,582,978 UART: [art] SIG.S = 1FFEBCD29F39E77D26E7A811E20678682C549011D385D88867CB41468E9FFB6F9316CC6ADCE26E1DEB080D081EBE2F76
5,606,367 UART: Caliptra RT
5,606,620 UART: [state] CFI Enabled
5,715,650 UART: [rt] RT listening for mailbox commands...
5,716,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,246 UART: [rt]cmd =0x41544d4e, len=14344
6,784,787 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,545 UART: [kat] SHA2-512-ACC
897,446 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,875 UART: [kat] LMS
1,476,071 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 ready_for_fw is high
1,481,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,403 UART: [idev] Erasing UDS.KEYID = 0
1,506,325 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,971 UART: [idev] --
1,516,038 UART: [ldev] ++
1,516,206 UART: [ldev] CDI.KEYID = 6
1,516,569 UART: [ldev] SUBJECT.KEYID = 5
1,516,995 UART: [ldev] AUTHORITY.KEYID = 7
1,517,458 UART: [ldev] FE.KEYID = 1
1,522,866 UART: [ldev] Erasing FE.KEYID = 1
1,548,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,193 UART: [ldev] --
1,587,584 UART: [fwproc] Waiting for Commands...
1,588,325 UART: [fwproc] Received command 0x46574c44
1,589,116 UART: [fwproc] Received Image of size 114448 bytes
5,237,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,265,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,294,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,430,554 >>> mbox cmd response: success
5,431,566 UART: [afmc] ++
5,431,734 UART: [afmc] CDI.KEYID = 6
5,432,096 UART: [afmc] SUBJECT.KEYID = 7
5,432,521 UART: [afmc] AUTHORITY.KEYID = 5
5,467,769 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,484,523 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,485,303 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,491,012 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,496,904 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,502,605 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,510,697 UART: [afmc] --
5,511,727 UART: [cold-reset] --
5,512,865 UART: [state] Locking Datavault
5,514,010 UART: [state] Locking PCR0, PCR1 and PCR31
5,514,614 UART: [state] Locking ICCM
5,515,062 UART: [exit] Launching FMC @ 0x40000130
5,520,391 UART:
5,520,407 UART: Running Caliptra FMC ...
5,520,815 UART:
5,520,958 UART: [state] CFI Enabled
5,531,388 UART: [fht] FMC Alias Private Key: 7
5,638,718 UART: [art] Extend RT PCRs Done
5,639,146 UART: [art] Lock RT PCRs Done
5,640,734 UART: [art] Populate DV Done
5,648,756 UART: [fht] FMC Alias Private Key: 7
5,649,698 UART: [art] Derive CDI
5,649,978 UART: [art] Store in in slot 0x4
5,735,893 UART: [art] Derive Key Pair
5,736,253 UART: [art] Store priv key in slot 0x5
5,749,317 UART: [art] Derive Key Pair - Done
5,763,993 UART: [art] Signing Cert with AUTHO
5,764,473 UART: RITY.KEYID = 7
5,779,269 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,034 UART: [art] PUB.X = 564B3674F630CDD742B067F858CAE2D61948D64B99E40DC107BE8AB2A32F50B3504A0A9C6BD34268A23DDF648C8D1DE5
5,786,805 UART: [art] PUB.Y = 4BEBB2FA6F1FC1EFA7E6614E7CB8500B4DB1200717473AC0E383878E89A2A2776A225B26C28AD3E719A8581C368EB141
5,793,757 UART: [art] SIG.R = 30AEE34B4DB4694AFBEC1BBCD65823542618D54899BF4013EE2198E09B3E7BD425E68F860D0C36AEFE36EC38DC441D45
5,800,535 UART: [art] SIG.S = ACC544C8FEA3D629F49637F8764D8D7AB1B77CBA00C5D6EEA266C9FF9416C87DB1A6B69615847DB05E94876099AA2143
5,823,950 UART: Caliptra RT
5,824,295 UART: [state] CFI Enabled
5,932,244 UART: [rt] RT listening for mailbox commands...
5,932,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,056,064 UART: [rt]cmd =0x41544d4e, len=14344
7,003,794 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,070 ready_for_fw is high
1,363,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,206,088 >>> mbox cmd response: success
5,267,131 UART:
5,267,147 UART: Running Caliptra FMC ...
5,267,555 UART:
5,267,698 UART: [state] CFI Enabled
5,278,202 UART: [fht] FMC Alias Private Key: 7
5,386,702 UART: [art] Extend RT PCRs Done
5,387,130 UART: [art] Lock RT PCRs Done
5,388,662 UART: [art] Populate DV Done
5,397,134 UART: [fht] FMC Alias Private Key: 7
5,398,190 UART: [art] Derive CDI
5,398,470 UART: [art] Store in in slot 0x4
5,484,063 UART: [art] Derive Key Pair
5,484,423 UART: [art] Store priv key in slot 0x5
5,497,369 UART: [art] Derive Key Pair - Done
5,512,388 UART: [art] Signing Cert with AUTHO
5,512,868 UART: RITY.KEYID = 7
5,528,418 UART: [art] Erasing AUTHORITY.KEYID = 7
5,529,183 UART: [art] PUB.X = 06AEC765474862A04DAB69D2183D573203053CE3F46B1C6FE3AC4F48D793D6AC3E7314DD674E58A592C3C9C7D496A888
5,535,948 UART: [art] PUB.Y = 2AC8F557AA4288C08E498825313C5D6BD846081112291F5A245B03034662E860BF74A9BA49E0983346DEF8D6290B662F
5,542,878 UART: [art] SIG.R = 7B4D2F219DC19C47958BDCDC5FC947CCB990CBE1454DB039913C161F40D5B0BE0B1948B3A45FD53CEFD3630FA9CF694E
5,549,662 UART: [art] SIG.S = 32742EB927518F1EBFCAE304BC67BCA27444B084FB40B6BAEF8E625ABFE1B5095F13CFD324857F1691082910DA45747E
5,573,222 UART: Caliptra RT
5,573,567 UART: [state] CFI Enabled
5,681,575 UART: [rt] RT listening for mailbox commands...
5,682,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,805,457 UART: [rt]cmd =0x41544d4e, len=14344
6,763,195 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
892,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,921 UART: [kat] ++
897,073 UART: [kat] sha1
901,399 UART: [kat] SHA2-256
903,339 UART: [kat] SHA2-384
906,048 UART: [kat] SHA2-512-ACC
907,949 UART: [kat] ECC-384
917,368 UART: [kat] HMAC-384Kdf
921,950 UART: [kat] LMS
1,170,278 UART: [kat] --
1,171,317 UART: [cold-reset] ++
1,171,691 UART: [fht] FHT @ 0x50003400
1,174,344 UART: [idev] ++
1,174,512 UART: [idev] CDI.KEYID = 6
1,174,872 UART: [idev] SUBJECT.KEYID = 7
1,175,296 UART: [idev] UDS.KEYID = 0
1,175,641 ready_for_fw is high
1,175,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,805 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,874 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 114448 bytes
3,113,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,307,729 >>> mbox cmd response: success
3,308,831 UART: [afmc] ++
3,308,999 UART: [afmc] CDI.KEYID = 6
3,309,361 UART: [afmc] SUBJECT.KEYID = 7
3,309,786 UART: [afmc] AUTHORITY.KEYID = 5
3,345,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,587 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,296 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,188 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,899 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,684 UART: [afmc] --
3,388,790 UART: [cold-reset] --
3,389,410 UART: [state] Locking Datavault
3,390,683 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,287 UART: [state] Locking ICCM
3,391,729 UART: [exit] Launching FMC @ 0x40000130
3,397,058 UART:
3,397,074 UART: Running Caliptra FMC ...
3,397,482 UART:
3,397,536 UART: [state] CFI Enabled
3,407,996 UART: [fht] FMC Alias Private Key: 7
3,515,652 UART: [art] Extend RT PCRs Done
3,516,080 UART: [art] Lock RT PCRs Done
3,517,412 UART: [art] Populate DV Done
3,525,558 UART: [fht] FMC Alias Private Key: 7
3,526,706 UART: [art] Derive CDI
3,526,986 UART: [art] Store in in slot 0x4
3,612,405 UART: [art] Derive Key Pair
3,612,765 UART: [art] Store priv key in slot 0x5
3,626,373 UART: [art] Derive Key Pair - Done
3,641,175 UART: [art] Signing Cert with AUTHO
3,641,655 UART: RITY.KEYID = 7
3,656,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,610 UART: [art] PUB.X = 8EC7266CB9383C041990DCD7A0E6E3F3B64329FDD380CEF83B5A48CAA855B0E68830CDBBD7B95DADD075DF916985BA25
3,664,395 UART: [art] PUB.Y = C27031BD142CFC6642C526C66951C5D97A0C84840A49DB0EEF5D977CC39F4CEB696E8CA6C1FCC4C8E290B1FA11CC73C3
3,671,354 UART: [art] SIG.R = 077ABF219EE4742FE5CE3F3A932BBDDF778546FCF02EB464B41A5DA1E1A11711AE22A95BA63FD3E98D866E77A97E6CAE
3,678,143 UART: [art] SIG.S = 6F0AF14533E7CCD8438209E02E4E83290018977E35EC6C697986444BA73E514A379D3F5D6F49CD1D74A595B538C2C5BC
3,701,414 UART: Caliptra RT
3,701,667 UART: [state] CFI Enabled
3,808,542 UART: [rt] RT listening for mailbox commands...
3,809,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,084 UART: [rt]cmd =0x41544d4e, len=14344
4,904,208 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,315 ready_for_fw is high
1,060,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,187,433 >>> mbox cmd response: success
3,249,224 UART:
3,249,240 UART: Running Caliptra FMC ...
3,249,648 UART:
3,249,702 UART: [state] CFI Enabled
3,260,086 UART: [fht] FMC Alias Private Key: 7
3,368,266 UART: [art] Extend RT PCRs Done
3,368,694 UART: [art] Lock RT PCRs Done
3,370,254 UART: [art] Populate DV Done
3,378,314 UART: [fht] FMC Alias Private Key: 7
3,379,358 UART: [art] Derive CDI
3,379,638 UART: [art] Store in in slot 0x4
3,465,263 UART: [art] Derive Key Pair
3,465,623 UART: [art] Store priv key in slot 0x5
3,478,921 UART: [art] Derive Key Pair - Done
3,494,269 UART: [art] Signing Cert with AUTHO
3,494,749 UART: RITY.KEYID = 7
3,509,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,510,644 UART: [art] PUB.X = 392023207E07095D7CDBC03029A813A6D83D210302EC6A690CAD06B32913C52B46365B7823755D691962A6406A7B5258
3,517,382 UART: [art] PUB.Y = DA1D9B42A36231F33AA980F254E00F5DA22CE845296704BBAD4DB149F2A67566B56C1833BD304B22DFE54370E7BFE4AA
3,524,338 UART: [art] SIG.R = BAA999A2F1490B402203A78E7272C3EEDDE02D53E4B8307E0F733DD3C98FF8950C5BD3E179EFB34318DB42F91D359606
3,531,101 UART: [art] SIG.S = 2DE1DED0C335A35D810B4D99EB423334C1EF0B30BF31F08E30BFB58F718BAE73162C5AE573911BA1CCBCECDDAED75EB3
3,554,818 UART: Caliptra RT
3,555,071 UART: [state] CFI Enabled
3,663,433 UART: [rt] RT listening for mailbox commands...
3,664,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,079 UART: [rt]cmd =0x41544d4e, len=14344
4,757,036 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
893,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,798 UART: [kat] ++
897,950 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,785 UART: [kat] SHA2-512-ACC
908,686 UART: [kat] ECC-384
918,607 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,384 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,461 UART: [idev] ++
1,175,629 UART: [idev] CDI.KEYID = 6
1,175,989 UART: [idev] SUBJECT.KEYID = 7
1,176,413 UART: [idev] UDS.KEYID = 0
1,176,758 ready_for_fw is high
1,176,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,641 UART: [idev] Erasing UDS.KEYID = 0
1,201,432 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,900 UART: [ldev] ++
1,211,068 UART: [ldev] CDI.KEYID = 6
1,211,431 UART: [ldev] SUBJECT.KEYID = 5
1,211,857 UART: [ldev] AUTHORITY.KEYID = 7
1,212,320 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,336 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,459 UART: [fwproc] Recv command 0x46574c44
1,285,187 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,953 >>> mbox cmd response: success
3,317,133 UART: [afmc] ++
3,317,301 UART: [afmc] CDI.KEYID = 6
3,317,663 UART: [afmc] SUBJECT.KEYID = 7
3,318,088 UART: [afmc] AUTHORITY.KEYID = 5
3,353,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,333 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,042 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,934 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,645 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,406 UART: [afmc] --
3,397,380 UART: [cold-reset] --
3,398,254 UART: [state] Locking Datavault
3,399,201 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,805 UART: [state] Locking ICCM
3,400,373 UART: [exit] Launching FMC @ 0x40000130
3,405,702 UART:
3,405,718 UART: Running Caliptra FMC ...
3,406,126 UART:
3,406,269 UART: [state] CFI Enabled
3,416,655 UART: [fht] FMC Alias Private Key: 7
3,525,279 UART: [art] Extend RT PCRs Done
3,525,707 UART: [art] Lock RT PCRs Done
3,527,185 UART: [art] Populate DV Done
3,535,315 UART: [fht] FMC Alias Private Key: 7
3,536,455 UART: [art] Derive CDI
3,536,735 UART: [art] Store in in slot 0x4
3,622,362 UART: [art] Derive Key Pair
3,622,722 UART: [art] Store priv key in slot 0x5
3,636,040 UART: [art] Derive Key Pair - Done
3,650,609 UART: [art] Signing Cert with AUTHO
3,651,089 UART: RITY.KEYID = 7
3,666,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,340 UART: [art] PUB.X = FCAACD336F809CDDA559A41A49D70BD6A964758AFEB8AC2F01F64C533FAA2C53FE3548733D93D70819360CB374CD1D13
3,674,114 UART: [art] PUB.Y = B14AE8748A368527D123BAC4B3F7FF0372FCD5996B59C5CE07447DE6544721E2F3D7D95BE0F9ECA7C64DF146DA3F0DEB
3,681,073 UART: [art] SIG.R = 6E82D0C8813D47F990E21B8D45247E83071D0C5DB3876330350326237835B62EA4BBC55FEEE3F24F32666DC590D258F7
3,687,830 UART: [art] SIG.S = 8C56A4F59DCB0ECDBB432D55998C0E389CD33BAAC9FF69FA9E0B9C1DCAE4A3F42D5983809078C48614293E39BB6A7715
3,711,428 UART: Caliptra RT
3,711,773 UART: [state] CFI Enabled
3,819,391 UART: [rt] RT listening for mailbox commands...
3,820,061 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,049 UART: [rt]cmd =0x41544d4e, len=14344
4,899,449 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 ready_for_fw is high
1,061,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,178,136 >>> mbox cmd response: success
3,239,693 UART:
3,239,709 UART: Running Caliptra FMC ...
3,240,117 UART:
3,240,260 UART: [state] CFI Enabled
3,250,980 UART: [fht] FMC Alias Private Key: 7
3,358,892 UART: [art] Extend RT PCRs Done
3,359,320 UART: [art] Lock RT PCRs Done
3,361,018 UART: [art] Populate DV Done
3,369,186 UART: [fht] FMC Alias Private Key: 7
3,370,202 UART: [art] Derive CDI
3,370,482 UART: [art] Store in in slot 0x4
3,456,463 UART: [art] Derive Key Pair
3,456,823 UART: [art] Store priv key in slot 0x5
3,469,725 UART: [art] Derive Key Pair - Done
3,484,629 UART: [art] Signing Cert with AUTHO
3,485,109 UART: RITY.KEYID = 7
3,500,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,168 UART: [art] PUB.X = 63539D323CA1234DB8E7FCD0DEC5750FCBB0A045EB70FD5848EFDD7580210642DF4C991F38D7F1A3B4AA5B8E2A8F21D9
3,507,950 UART: [art] PUB.Y = 8A326AF744DD50669E67196329EA8848C84562CA98F04275C4239D10E0223C75961B8064E93170E510090A35D1FD6EF0
3,514,882 UART: [art] SIG.R = 09138697DEB7629E775513ECC5AF996784F49740DF6FADB6455E93677B2A583C32DB4C8E69427888D67F5E678E273191
3,521,643 UART: [art] SIG.S = 9E5B2558FB309EFE6E590A66F83B0BFAF970523D76E1392227D581E1C239455D64F8344394B975A58E7B97F1B5BD408D
3,545,310 UART: Caliptra RT
3,545,655 UART: [state] CFI Enabled
3,653,079 UART: [rt] RT listening for mailbox commands...
3,653,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,581 UART: [rt]cmd =0x41544d4e, len=14344
4,743,819 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,174,107 ready_for_fw is high
1,174,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,087 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,208,040 UART: [ldev] ++
1,208,208 UART: [ldev] CDI.KEYID = 6
1,208,572 UART: [ldev] SUBJECT.KEYID = 5
1,208,999 UART: [ldev] AUTHORITY.KEYID = 7
1,209,462 UART: [ldev] FE.KEYID = 1
1,214,512 UART: [ldev] Erasing FE.KEYID = 1
1,240,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,380 UART: [ldev] --
1,279,884 UART: [fwproc] Wait for Commands...
1,280,697 UART: [fwproc] Recv command 0x46574c44
1,281,430 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,077 >>> mbox cmd response: success
3,316,136 UART: [afmc] ++
3,316,304 UART: [afmc] CDI.KEYID = 6
3,316,667 UART: [afmc] SUBJECT.KEYID = 7
3,317,093 UART: [afmc] AUTHORITY.KEYID = 5
3,351,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,380 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,090 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,980 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,691 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,507 UART: [afmc] --
3,395,509 UART: [cold-reset] --
3,396,561 UART: [state] Locking Datavault
3,397,676 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,280 UART: [state] Locking ICCM
3,398,724 UART: [exit] Launching FMC @ 0x40000130
3,404,053 UART:
3,404,069 UART: Running Caliptra FMC ...
3,404,477 UART:
3,404,531 UART: [state] CFI Enabled
3,415,393 UART: [fht] FMC Alias Private Key: 7
3,523,381 UART: [art] Extend RT PCRs Done
3,523,809 UART: [art] Lock RT PCRs Done
3,525,449 UART: [art] Populate DV Done
3,533,671 UART: [fht] FMC Alias Private Key: 7
3,534,613 UART: [art] Derive CDI
3,534,893 UART: [art] Store in in slot 0x4
3,620,586 UART: [art] Derive Key Pair
3,620,946 UART: [art] Store priv key in slot 0x5
3,634,222 UART: [art] Derive Key Pair - Done
3,649,024 UART: [art] Signing Cert with AUTHO
3,649,504 UART: RITY.KEYID = 7
3,664,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,077 UART: [art] PUB.X = 02D293895B0FE2144FBB4BD433D3A7F069B6CB81F7B0699F4B03F293E47AF3E70E8253575DC879B293A9E0F6E80DE22D
3,671,840 UART: [art] PUB.Y = D9EF39385859EAB772F0DF8EEE471DC0B3BA0DD9256B743BD3744590CFCEA14B139255C54164B77DF9DEC564EA76C719
3,678,801 UART: [art] SIG.R = F13209C5FFF90B5254B88961B32431FB9A8A6C14C5355C8797E0BEB04F3C943B497251529AD1E894D0AC91AA8D2F98A7
3,685,569 UART: [art] SIG.S = 0133AB162E944D7114C5FA672804E21347086A1C66E883ACA2A4F3B41E397D2798E39467926C8E874DA084201693C2EC
3,709,821 UART: Caliptra RT
3,710,074 UART: [state] CFI Enabled
3,817,930 UART: [rt] RT listening for mailbox commands...
3,818,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,652 UART: [rt]cmd =0x41544d4e, len=14344
4,901,931 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,768 ready_for_fw is high
1,055,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,956 >>> mbox cmd response: success
3,232,609 UART:
3,232,625 UART: Running Caliptra FMC ...
3,233,033 UART:
3,233,087 UART: [state] CFI Enabled
3,243,291 UART: [fht] FMC Alias Private Key: 7
3,351,033 UART: [art] Extend RT PCRs Done
3,351,461 UART: [art] Lock RT PCRs Done
3,353,157 UART: [art] Populate DV Done
3,361,231 UART: [fht] FMC Alias Private Key: 7
3,362,243 UART: [art] Derive CDI
3,362,523 UART: [art] Store in in slot 0x4
3,448,158 UART: [art] Derive Key Pair
3,448,518 UART: [art] Store priv key in slot 0x5
3,461,552 UART: [art] Derive Key Pair - Done
3,476,787 UART: [art] Signing Cert with AUTHO
3,477,267 UART: RITY.KEYID = 7
3,492,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,500 UART: [art] PUB.X = 6B3BEE6D370A46456EADB8906386F2BFD292482AC13050165558D6063E07C15660E42438E3BA3CFF4071AC3ECC1A9C9C
3,500,267 UART: [art] PUB.Y = 053BDC480AAA0A99F1DF24ABDDB79D8433D045264ABDB4EE472B8F4D18A1E4463332B8692902E18E8B4262CC93653937
3,507,211 UART: [art] SIG.R = E65A68314A815E28B9623675ED129D5A6F16C35682920C1B7F3DB964DE7736DBC625D4881E11D8F0C8FD864372BA1340
3,513,976 UART: [art] SIG.S = 08AAAD3648C00B641BB6303D7E7A37807BB1A77684237D7807B2514AB6C2DC3BECB83B81F80EFADF4D9787752BAC34F9
3,537,851 UART: Caliptra RT
3,538,104 UART: [state] CFI Enabled
3,645,768 UART: [rt] RT listening for mailbox commands...
3,646,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,686 UART: [rt]cmd =0x41544d4e, len=14344
4,724,339 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,398 UART: [idev] ++
1,173,566 UART: [idev] CDI.KEYID = 6
1,173,927 UART: [idev] SUBJECT.KEYID = 7
1,174,352 UART: [idev] UDS.KEYID = 0
1,174,698 ready_for_fw is high
1,174,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,198,716 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,523 UART: [ldev] ++
1,208,691 UART: [ldev] CDI.KEYID = 6
1,209,055 UART: [ldev] SUBJECT.KEYID = 5
1,209,482 UART: [ldev] AUTHORITY.KEYID = 7
1,209,945 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,701 >>> mbox cmd response: success
3,323,798 UART: [afmc] ++
3,323,966 UART: [afmc] CDI.KEYID = 6
3,324,329 UART: [afmc] SUBJECT.KEYID = 7
3,324,755 UART: [afmc] AUTHORITY.KEYID = 5
3,359,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,088 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,798 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,688 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,399 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,215 UART: [afmc] --
3,403,177 UART: [cold-reset] --
3,403,887 UART: [state] Locking Datavault
3,404,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,552 UART: [state] Locking ICCM
3,406,184 UART: [exit] Launching FMC @ 0x40000130
3,411,513 UART:
3,411,529 UART: Running Caliptra FMC ...
3,411,937 UART:
3,412,080 UART: [state] CFI Enabled
3,422,950 UART: [fht] FMC Alias Private Key: 7
3,530,798 UART: [art] Extend RT PCRs Done
3,531,226 UART: [art] Lock RT PCRs Done
3,532,972 UART: [art] Populate DV Done
3,541,180 UART: [fht] FMC Alias Private Key: 7
3,542,168 UART: [art] Derive CDI
3,542,448 UART: [art] Store in in slot 0x4
3,628,229 UART: [art] Derive Key Pair
3,628,589 UART: [art] Store priv key in slot 0x5
3,642,013 UART: [art] Derive Key Pair - Done
3,656,943 UART: [art] Signing Cert with AUTHO
3,657,423 UART: RITY.KEYID = 7
3,672,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,496 UART: [art] PUB.X = 8BCF22358C23D8E196B9026409A3ECA64A8740C48DBBA7ED15053A34558CCD405CBB04C1DCE6DBC3BFDED5B15EF76D16
3,680,276 UART: [art] PUB.Y = 7652EBBBF70E30D37BB5384848D301F294E8FDC5486F23DFF71FCF12B151B067ECB5B827CADE37ABE34A2ED1D4C3CB6A
3,687,244 UART: [art] SIG.R = FAC031BE09B3C7A022FE628201994E606A8D3144A9BAFE0CF130CBA86139A8A55AAAE487CE30E38C5D3999D28ED9B9C8
3,694,021 UART: [art] SIG.S = 033BF51492E94DF5BF6FCFAD10134B3FF7107248D442BBCEEED32CEAFE3A5B392A03EB8224257A4509D88D837AFC1B48
3,718,103 UART: Caliptra RT
3,718,448 UART: [state] CFI Enabled
3,825,992 UART: [rt] RT listening for mailbox commands...
3,826,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,714 UART: [rt]cmd =0x41544d4e, len=14344
4,894,885 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,679 ready_for_fw is high
1,056,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,901 >>> mbox cmd response: success
3,230,030 UART:
3,230,046 UART: Running Caliptra FMC ...
3,230,454 UART:
3,230,597 UART: [state] CFI Enabled
3,240,991 UART: [fht] FMC Alias Private Key: 7
3,349,127 UART: [art] Extend RT PCRs Done
3,349,555 UART: [art] Lock RT PCRs Done
3,351,313 UART: [art] Populate DV Done
3,359,657 UART: [fht] FMC Alias Private Key: 7
3,360,679 UART: [art] Derive CDI
3,360,959 UART: [art] Store in in slot 0x4
3,446,714 UART: [art] Derive Key Pair
3,447,074 UART: [art] Store priv key in slot 0x5
3,460,410 UART: [art] Derive Key Pair - Done
3,474,685 UART: [art] Signing Cert with AUTHO
3,475,165 UART: RITY.KEYID = 7
3,490,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,020 UART: [art] PUB.X = 41673F662C59609059A5022CEC92A0E389D509596D6881EEC723BECC05D6CE8C8B6C21BAEAD8BDD6F19DEAE1CECA107B
3,497,801 UART: [art] PUB.Y = F5A934C89F65BE4502D228999DBEED6036B658C8E8AF25F731367EEAB68A9861FA5F60BBA73BB3E77B31C4EBB4EA732C
3,504,766 UART: [art] SIG.R = 00354AFD418AAA75D34C4CD9EF138B3D43270FDE1FBF7136C24142379A039B09B21CA09D8CAFCCD54204806163B7C2A8
3,511,512 UART: [art] SIG.S = BC9E845C7B5DA3FDF3BB05D635CC547370E95E50CDD03038105B3FC82A045D2CAE858C27E64AB7B4D2F2BE212B049BFC
3,535,254 UART: Caliptra RT
3,535,599 UART: [state] CFI Enabled
3,643,401 UART: [rt] RT listening for mailbox commands...
3,644,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,317 UART: [rt]cmd =0x41544d4e, len=14344
4,710,015 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,400 UART:
192,748 UART: Running Caliptra ROM ...
193,913 UART:
194,070 UART: [state] CFI Enabled
263,773 UART: [state] LifecycleState = Unprovisioned
265,774 UART: [state] DebugLocked = No
267,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,831 UART: [kat] SHA2-256
441,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,043 UART: [kat] ++
453,301 UART: [kat] sha1
464,971 UART: [kat] SHA2-256
467,707 UART: [kat] SHA2-384
473,485 UART: [kat] SHA2-512-ACC
475,859 UART: [kat] ECC-384
2,767,450 UART: [kat] HMAC-384Kdf
2,779,425 UART: [kat] LMS
3,969,710 UART: [kat] --
3,971,361 UART: [cold-reset] ++
3,973,524 UART: [fht] Storing FHT @ 0x50003400
3,986,754 UART: [idev] ++
3,987,329 UART: [idev] CDI.KEYID = 6
3,988,362 UART: [idev] SUBJECT.KEYID = 7
3,989,563 UART: [idev] UDS.KEYID = 0
3,990,647 ready_for_fw is high
3,990,858 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,445 UART: [idev] Erasing UDS.KEYID = 0
7,323,764 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,924 UART: [idev] --
7,349,161 UART: [ldev] ++
7,349,743 UART: [ldev] CDI.KEYID = 6
7,350,712 UART: [ldev] SUBJECT.KEYID = 5
7,351,926 UART: [ldev] AUTHORITY.KEYID = 7
7,353,157 UART: [ldev] FE.KEYID = 1
7,399,877 UART: [ldev] Erasing FE.KEYID = 1
10,732,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,761 UART: [ldev] --
13,114,304 UART: [fwproc] Waiting for Commands...
13,116,558 UART: [fwproc] Received command 0x46574c44
13,118,745 UART: [fwproc] Received Image of size 114124 bytes
21,598,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,680,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,749,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,066,027 >>> mbox cmd response: success
22,069,783 UART: [afmc] ++
22,070,383 UART: [afmc] CDI.KEYID = 6
22,071,270 UART: [afmc] SUBJECT.KEYID = 7
22,072,542 UART: [afmc] AUTHORITY.KEYID = 5
25,436,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,736,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,738,838 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,753,405 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,768,106 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,782,324 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,803,862 UART: [afmc] --
27,807,073 UART: [cold-reset] --
27,811,477 UART: [state] Locking Datavault
27,815,914 UART: [state] Locking PCR0, PCR1 and PCR31
27,817,678 UART: [state] Locking ICCM
27,819,748 UART: [exit] Launching FMC @ 0x40000130
27,828,139 UART:
27,828,372 UART: Running Caliptra FMC ...
27,829,399 UART:
27,829,546 UART: [state] CFI Enabled
27,895,106 UART: [fht] FMC Alias Private Key: 7
30,232,893 UART: [art] Extend RT PCRs Done
30,234,113 UART: [art] Lock RT PCRs Done
30,236,217 UART: [art] Populate DV Done
30,241,899 UART: [fht] FMC Alias Private Key: 7
30,243,601 UART: [art] Derive CDI
30,244,417 UART: [art] Store in in slot 0x4
30,303,781 UART: [art] Derive Key Pair
30,304,826 UART: [art] Store priv key in slot 0x5
33,597,345 UART: [art] Derive Key Pair - Done
33,610,060 UART: [art] Signing Cert with AUTHO
33,611,374 UART: RITY.KEYID = 7
35,899,727 UART: [art] Erasing AUTHORITY.KEYID = 7
35,901,244 UART: [art] PUB.X = AD30004F9E682FA12502084A6AD99252B34093AFF9242A8363DD39180E9E4B7D22E32D31C1F8EBD8E1C60E74AA01609D
35,908,455 UART: [art] PUB.Y = 6C836E14B1BD60D4D12EE9F8DA6EE8ACC28DE6A08EDDCC7AA0A9008E148DB4FEAE36D1EC0111E68E523841BA751EE747
35,915,710 UART: [art] SIG.R = 67430E844A54235300E55F57004365AAA60C5EC98FD9B94B62FB934BE7CCD4016DEE9DE350B2908AB051CD8045801C7A
35,923,068 UART: [art] SIG.S = EB439E86C346E0219EDDA4CEACD98210E042FC65605019B415B6A606349772F613919601B6E69F9580ECA83D2EACF2CA
37,228,517 UART: Caliptra RT
37,229,220 UART: [state] CFI Enabled
37,390,385 UART: [rt] RT listening for mailbox commands...
37,392,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,547,884 UART: [rt]cmd =0x41544d4e, len=14344
43,860,804 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,804,966 ready_for_fw is high
3,805,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,150,658 >>> mbox cmd response: success
27,854,070 UART:
27,854,455 UART: Running Caliptra FMC ...
27,855,586 UART:
27,855,747 UART: [state] CFI Enabled
27,923,749 UART: [fht] FMC Alias Private Key: 7
30,262,119 UART: [art] Extend RT PCRs Done
30,263,351 UART: [art] Lock RT PCRs Done
30,265,185 UART: [art] Populate DV Done
30,270,606 UART: [fht] FMC Alias Private Key: 7
30,272,263 UART: [art] Derive CDI
30,273,002 UART: [art] Store in in slot 0x4
30,332,281 UART: [art] Derive Key Pair
30,333,320 UART: [art] Store priv key in slot 0x5
33,626,017 UART: [art] Derive Key Pair - Done
33,639,228 UART: [art] Signing Cert with AUTHO
33,640,537 UART: RITY.KEYID = 7
35,926,981 UART: [art] Erasing AUTHORITY.KEYID = 7
35,928,482 UART: [art] PUB.X = EE1381209DF55CDC8FBB3B5A9F648785994DC9463E15145DEC348191EE3A2D83DF3C175DDA77ED5AC1F076DF97522BE7
35,935,752 UART: [art] PUB.Y = 3C107333681014ACDA0F6E091D6BC6A27410991A8317FD8E6926F7AD84318B2A10072236D532FB9D14ABC50D3A719562
35,942,961 UART: [art] SIG.R = 564D5931496B874F9C5B758947C0C867638F55B473A227AAA871774A99CE3CBD07C04986F864581698A7587F6704DB3E
35,950,312 UART: [art] SIG.S = 86DF689280454FEC783CB71174CC69E4C2C930497B125526EB70A248BB246E4B5ED277BBD999AFC8AD24FC8FB169C6F0
37,255,052 UART: Caliptra RT
37,255,766 UART: [state] CFI Enabled
37,417,288 UART: [rt] RT listening for mailbox commands...
37,419,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,574,993 UART: [rt]cmd =0x41544d4e, len=14344
43,965,682 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,541 UART:
192,901 UART: Running Caliptra ROM ...
194,194 UART:
603,704 UART: [state] CFI Enabled
617,519 UART: [state] LifecycleState = Unprovisioned
619,469 UART: [state] DebugLocked = No
620,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,447 UART: [kat] SHA2-256
796,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,706 UART: [kat] ++
807,308 UART: [kat] sha1
817,216 UART: [kat] SHA2-256
819,974 UART: [kat] SHA2-384
825,752 UART: [kat] SHA2-512-ACC
828,123 UART: [kat] ECC-384
3,111,772 UART: [kat] HMAC-384Kdf
3,123,380 UART: [kat] LMS
4,313,521 UART: [kat] --
4,318,123 UART: [cold-reset] ++
4,319,635 UART: [fht] Storing FHT @ 0x50003400
4,331,416 UART: [idev] ++
4,332,023 UART: [idev] CDI.KEYID = 6
4,332,949 UART: [idev] SUBJECT.KEYID = 7
4,334,137 UART: [idev] UDS.KEYID = 0
4,335,253 ready_for_fw is high
4,335,483 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,751 UART: [idev] Erasing UDS.KEYID = 0
7,624,463 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,515 UART: [idev] --
7,650,415 UART: [ldev] ++
7,650,977 UART: [ldev] CDI.KEYID = 6
7,652,134 UART: [ldev] SUBJECT.KEYID = 5
7,653,289 UART: [ldev] AUTHORITY.KEYID = 7
7,654,417 UART: [ldev] FE.KEYID = 1
7,666,969 UART: [ldev] Erasing FE.KEYID = 1
10,957,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,016 UART: [ldev] --
13,317,420 UART: [fwproc] Waiting for Commands...
13,319,561 UART: [fwproc] Received command 0x46574c44
13,321,732 UART: [fwproc] Received Image of size 114124 bytes
21,803,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,887,275 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,956,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,273,215 >>> mbox cmd response: success
22,277,333 UART: [afmc] ++
22,277,931 UART: [afmc] CDI.KEYID = 6
22,278,872 UART: [afmc] SUBJECT.KEYID = 7
22,280,140 UART: [afmc] AUTHORITY.KEYID = 5
25,598,153 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,892,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,894,674 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,909,275 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,923,993 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,938,212 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,958,707 UART: [afmc] --
27,961,706 UART: [cold-reset] --
27,966,436 UART: [state] Locking Datavault
27,970,763 UART: [state] Locking PCR0, PCR1 and PCR31
27,972,458 UART: [state] Locking ICCM
27,974,493 UART: [exit] Launching FMC @ 0x40000130
27,982,888 UART:
27,983,127 UART: Running Caliptra FMC ...
27,984,228 UART:
27,984,381 UART: [state] CFI Enabled
27,992,234 UART: [fht] FMC Alias Private Key: 7
30,323,814 UART: [art] Extend RT PCRs Done
30,325,035 UART: [art] Lock RT PCRs Done
30,326,548 UART: [art] Populate DV Done
30,332,111 UART: [fht] FMC Alias Private Key: 7
30,333,794 UART: [art] Derive CDI
30,334,614 UART: [art] Store in in slot 0x4
30,376,933 UART: [art] Derive Key Pair
30,377,929 UART: [art] Store priv key in slot 0x5
33,619,958 UART: [art] Derive Key Pair - Done
33,632,906 UART: [art] Signing Cert with AUTHO
33,634,215 UART: RITY.KEYID = 7
35,914,016 UART: [art] Erasing AUTHORITY.KEYID = 7
35,915,531 UART: [art] PUB.X = 41651AC614D7A2B8F875F3EF799FF36BE3F833B4B0C60C10C06DB2D8A1D54BB4439982DB3DB3607A8124BEA848A93A73
35,922,762 UART: [art] PUB.Y = A6E5AB0CA13AC4BC9103AB5BF95A0FD6E2162511AE47AD088345715E66EE30F6DDD8B78D0CC3FD5E6F52770825DAC66E
35,930,035 UART: [art] SIG.R = 47A4A6A4D9F9CDF18F0AE6A43DB0191C4B191148EB5818E13AD9EB80EF36AFA88CA4CB137B3E6D084EE9FBE80E40B001
35,937,456 UART: [art] SIG.S = 18D80B2992ABCF2F5F1C74402CF8543FE8F7D917BECAF9EFEC8351597C6CA4A572629184081EE48633F2593020C70847
37,242,704 UART: Caliptra RT
37,243,403 UART: [state] CFI Enabled
37,360,422 UART: [rt] RT listening for mailbox commands...
37,362,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,518,136 UART: [rt]cmd =0x41544d4e, len=14344
43,960,810 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
4,126,491 ready_for_fw is high
4,126,918 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,114,142 >>> mbox cmd response: success
27,752,120 UART:
27,752,524 UART: Running Caliptra FMC ...
27,753,654 UART:
27,753,836 UART: [state] CFI Enabled
27,761,675 UART: [fht] FMC Alias Private Key: 7
30,091,876 UART: [art] Extend RT PCRs Done
30,093,102 UART: [art] Lock RT PCRs Done
30,094,998 UART: [art] Populate DV Done
30,100,370 UART: [fht] FMC Alias Private Key: 7
30,101,956 UART: [art] Derive CDI
30,102,698 UART: [art] Store in in slot 0x4
30,145,395 UART: [art] Derive Key Pair
30,146,391 UART: [art] Store priv key in slot 0x5
33,388,587 UART: [art] Derive Key Pair - Done
33,401,534 UART: [art] Signing Cert with AUTHO
33,402,836 UART: RITY.KEYID = 7
35,681,958 UART: [art] Erasing AUTHORITY.KEYID = 7
35,683,487 UART: [art] PUB.X = A32AF8715F6ABD913E192CC2FEAE4B8E9489D61F4A3FDB20DEBF058FDC518F5A0DD2DD3B36BFEB395BFEBF4C050A71B2
35,690,750 UART: [art] PUB.Y = 547020C6785A9C9BBC80965A414BD88C8C0045C5D5FDBE8F6938154231700EEE5421B97DD4576F61C60CD8CDCDA1B466
35,698,029 UART: [art] SIG.R = 71DA53E01E4DA968EDBF90EBA5EC207B89ECA50973EC5C28AAB699B66ADBD96D5C2EEC1365B9947AB35259ABC928C91F
35,705,466 UART: [art] SIG.S = EF60372B2F5B0BD0C48A2C6E89874D305F0F512CBA15E45152E782FBED1059DBECDF2C1F26C95EF52E2AEAFD73716528
37,010,577 UART: Caliptra RT
37,011,294 UART: [state] CFI Enabled
37,128,521 UART: [rt] RT listening for mailbox commands...
37,130,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,286,177 UART: [rt]cmd =0x41544d4e, len=14344
43,702,431 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,069 UART:
192,442 UART: Running Caliptra ROM ...
193,611 UART:
193,770 UART: [state] CFI Enabled
262,604 UART: [state] LifecycleState = Unprovisioned
264,461 UART: [state] DebugLocked = No
267,209 UART: [state] WD Timer not started. Device not locked for debugging
270,583 UART: [kat] SHA2-256
449,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,300 UART: [kat] ++
461,749 UART: [kat] sha1
473,330 UART: [kat] SHA2-256
476,340 UART: [kat] SHA2-384
482,894 UART: [kat] SHA2-512-ACC
485,828 UART: [kat] ECC-384
2,949,016 UART: [kat] HMAC-384Kdf
2,971,957 UART: [kat] LMS
3,501,350 UART: [kat] --
3,505,648 UART: [cold-reset] ++
3,506,519 UART: [fht] FHT @ 0x50003400
3,517,936 UART: [idev] ++
3,518,497 UART: [idev] CDI.KEYID = 6
3,519,382 UART: [idev] SUBJECT.KEYID = 7
3,520,622 UART: [idev] UDS.KEYID = 0
3,521,519 ready_for_fw is high
3,521,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,708 UART: [idev] Erasing UDS.KEYID = 0
6,025,360 UART: [idev] Sha1 KeyId Algorithm
6,049,307 UART: [idev] --
6,053,192 UART: [ldev] ++
6,053,757 UART: [ldev] CDI.KEYID = 6
6,054,642 UART: [ldev] SUBJECT.KEYID = 5
6,055,859 UART: [ldev] AUTHORITY.KEYID = 7
6,057,088 UART: [ldev] FE.KEYID = 1
6,100,227 UART: [ldev] Erasing FE.KEYID = 1
8,605,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,482 UART: [ldev] --
10,414,557 UART: [fwproc] Wait for Commands...
10,416,045 UART: [fwproc] Recv command 0x46574c44
10,418,137 UART: [fwproc] Recv'd Img size: 114448 bytes
15,005,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,079,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,148,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,467,020 >>> mbox cmd response: success
15,471,289 UART: [afmc] ++
15,471,879 UART: [afmc] CDI.KEYID = 6
15,472,810 UART: [afmc] SUBJECT.KEYID = 7
15,473,964 UART: [afmc] AUTHORITY.KEYID = 5
18,003,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,726,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,728,125 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,744,060 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,760,038 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,775,783 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,799,067 UART: [afmc] --
19,802,090 UART: [cold-reset] --
19,804,713 UART: [state] Locking Datavault
19,809,035 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,681 UART: [state] Locking ICCM
19,811,752 UART: [exit] Launching FMC @ 0x40000130
19,820,201 UART:
19,820,441 UART: Running Caliptra FMC ...
19,821,543 UART:
19,821,701 UART: [state] CFI Enabled
19,884,410 UART: [fht] FMC Alias Private Key: 7
21,648,104 UART: [art] Extend RT PCRs Done
21,649,291 UART: [art] Lock RT PCRs Done
21,651,155 UART: [art] Populate DV Done
21,656,560 UART: [fht] FMC Alias Private Key: 7
21,658,036 UART: [art] Derive CDI
21,658,804 UART: [art] Store in in slot 0x4
21,717,249 UART: [art] Derive Key Pair
21,718,287 UART: [art] Store priv key in slot 0x5
24,181,092 UART: [art] Derive Key Pair - Done
24,194,140 UART: [art] Signing Cert with AUTHO
24,195,469 UART: RITY.KEYID = 7
25,907,496 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,979 UART: [art] PUB.X = 3BD958F2A154D6004BBD6C2310DA04937F442292D888FF5728D2F395790418DD13942A8543170ED39E6DF2C73C0D81D7
25,916,213 UART: [art] PUB.Y = D25564E31BFD76E8F59D2334CBED9021376795D7406EA344075CE8638408ED587AB28148ECA19B4D26CA8B6BD59BA809
25,923,502 UART: [art] SIG.R = F7955CA5B876DA51FFA96B16AA0BDA6D539767311F6BD832631452AC3CD1DA1733051BEF03886BCA30EC5CE33488202F
25,930,906 UART: [art] SIG.S = 8B7EF70D18C0C94D81160C121D657F0EFFF5338E11BA7CB25427D4C9B01F3F47B93BD169445234CEE2CCF713F11CF235
26,910,019 UART: Caliptra RT
26,910,733 UART: [state] CFI Enabled
27,074,559 UART: [rt] RT listening for mailbox commands...
27,076,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,641 UART: [rt]cmd =0x41544d4e, len=14344
30,845,165 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,045 writing to cptra_bootfsm_go
3,382,935 ready_for_fw is high
3,383,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,041,108 >>> mbox cmd response: success
19,324,141 UART:
19,324,552 UART: Running Caliptra FMC ...
19,325,652 UART:
19,325,808 UART: [state] CFI Enabled
19,390,167 UART: [fht] FMC Alias Private Key: 7
21,154,361 UART: [art] Extend RT PCRs Done
21,155,593 UART: [art] Lock RT PCRs Done
21,157,067 UART: [art] Populate DV Done
21,162,483 UART: [fht] FMC Alias Private Key: 7
21,163,969 UART: [art] Derive CDI
21,164,733 UART: [art] Store in in slot 0x4
21,222,915 UART: [art] Derive Key Pair
21,223,959 UART: [art] Store priv key in slot 0x5
23,686,501 UART: [art] Derive Key Pair - Done
23,699,502 UART: [art] Signing Cert with AUTHO
23,700,808 UART: RITY.KEYID = 7
25,412,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,414,003 UART: [art] PUB.X = F3C4FA785D2F4F9E062BB68EE7907C9EE95554EE036D070B262AA7CFE19104757DA45E403381BC1B375A2FAAC6BDC269
25,421,270 UART: [art] PUB.Y = C0E6518E3915D7770CF64C31FBC398608D5DC69324184FA588493A472D4191E4EBE17D7A51930570708A403289F6C501
25,428,485 UART: [art] SIG.R = E40BC8B49333F2FAFA1A398D635DF6307A1BB33C346FAEE0FBDE10671C2F382AC5BD692DC3AEC4CEFE885B3DC1638A47
25,435,968 UART: [art] SIG.S = FEADE194159271302D0C43515DEFC8CF987B95CF37A1A6E2DAD808FF110D7B8F29563F3FCC83108EB69D2D36115F7311
26,414,875 UART: Caliptra RT
26,415,577 UART: [state] CFI Enabled
26,581,545 UART: [rt] RT listening for mailbox commands...
26,583,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,739,868 UART: [rt]cmd =0x41544d4e, len=14344
30,347,245 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,413 UART:
192,779 UART: Running Caliptra ROM ...
193,959 UART:
603,387 UART: [state] CFI Enabled
618,647 UART: [state] LifecycleState = Unprovisioned
620,474 UART: [state] DebugLocked = No
622,840 UART: [state] WD Timer not started. Device not locked for debugging
625,647 UART: [kat] SHA2-256
804,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,382 UART: [kat] ++
816,824 UART: [kat] sha1
827,900 UART: [kat] SHA2-256
830,933 UART: [kat] SHA2-384
837,775 UART: [kat] SHA2-512-ACC
840,707 UART: [kat] ECC-384
3,281,680 UART: [kat] HMAC-384Kdf
3,294,266 UART: [kat] LMS
3,823,770 UART: [kat] --
3,826,764 UART: [cold-reset] ++
3,828,474 UART: [fht] FHT @ 0x50003400
3,838,949 UART: [idev] ++
3,839,505 UART: [idev] CDI.KEYID = 6
3,840,526 UART: [idev] SUBJECT.KEYID = 7
3,841,621 UART: [idev] UDS.KEYID = 0
3,842,614 ready_for_fw is high
3,842,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,904 UART: [idev] Erasing UDS.KEYID = 0
6,311,931 UART: [idev] Sha1 KeyId Algorithm
6,335,762 UART: [idev] --
6,338,508 UART: [ldev] ++
6,339,067 UART: [ldev] CDI.KEYID = 6
6,340,004 UART: [ldev] SUBJECT.KEYID = 5
6,341,076 UART: [ldev] AUTHORITY.KEYID = 7
6,342,409 UART: [ldev] FE.KEYID = 1
6,353,775 UART: [ldev] Erasing FE.KEYID = 1
8,828,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,278 UART: [ldev] --
10,618,431 UART: [fwproc] Wait for Commands...
10,620,941 UART: [fwproc] Recv command 0x46574c44
10,623,035 UART: [fwproc] Recv'd Img size: 114448 bytes
15,197,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,272,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,341,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,658,880 >>> mbox cmd response: success
15,663,668 UART: [afmc] ++
15,664,258 UART: [afmc] CDI.KEYID = 6
15,665,132 UART: [afmc] SUBJECT.KEYID = 7
15,666,339 UART: [afmc] AUTHORITY.KEYID = 5
18,161,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,881,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,883,510 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,899,499 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,915,478 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,931,237 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,954,194 UART: [afmc] --
19,957,566 UART: [cold-reset] --
19,961,274 UART: [state] Locking Datavault
19,966,947 UART: [state] Locking PCR0, PCR1 and PCR31
19,968,581 UART: [state] Locking ICCM
19,971,074 UART: [exit] Launching FMC @ 0x40000130
19,979,507 UART:
19,979,771 UART: Running Caliptra FMC ...
19,980,790 UART:
19,980,930 UART: [state] CFI Enabled
19,989,084 UART: [fht] FMC Alias Private Key: 7
21,745,958 UART: [art] Extend RT PCRs Done
21,747,178 UART: [art] Lock RT PCRs Done
21,748,988 UART: [art] Populate DV Done
21,754,286 UART: [fht] FMC Alias Private Key: 7
21,755,990 UART: [art] Derive CDI
21,756,800 UART: [art] Store in in slot 0x4
21,799,604 UART: [art] Derive Key Pair
21,800,617 UART: [art] Store priv key in slot 0x5
24,227,568 UART: [art] Derive Key Pair - Done
24,240,455 UART: [art] Signing Cert with AUTHO
24,241,749 UART: RITY.KEYID = 7
25,947,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,949,004 UART: [art] PUB.X = 6653187DA686BC59FFE825D3E52E06060FF9A01F4DC1864811BD722EB5C636242A0EEC6F17DAB03A0C7FE6B21423374C
25,956,292 UART: [art] PUB.Y = 46A6AF319F9B49140F416A913650B4D171CADA9A396E90246DA70DDD00F34B732D8D261D8E865160A3F7BAA79D1E71A4
25,963,557 UART: [art] SIG.R = 4D04306CD2C003DAA83A5AAA01296B60635399E1F563370F044737CAACC7B775775DBBEFC8329EB0B2387256CFD2F219
25,970,940 UART: [art] SIG.S = 7FC8282AAD220EA33CC7300DD206BAE182F59329DCF665D9C7D983C6B3AC479B21176714B0BFE082B0EF8E5A6FFD490D
26,949,736 UART: Caliptra RT
26,950,447 UART: [state] CFI Enabled
27,067,662 UART: [rt] RT listening for mailbox commands...
27,069,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,462 UART: [rt]cmd =0x41544d4e, len=14344
30,838,182 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,695,604 ready_for_fw is high
3,696,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,251,314 >>> mbox cmd response: success
19,503,539 UART:
19,503,931 UART: Running Caliptra FMC ...
19,505,031 UART:
19,505,177 UART: [state] CFI Enabled
19,513,506 UART: [fht] FMC Alias Private Key: 7
21,269,913 UART: [art] Extend RT PCRs Done
21,271,171 UART: [art] Lock RT PCRs Done
21,272,772 UART: [art] Populate DV Done
21,278,622 UART: [fht] FMC Alias Private Key: 7
21,280,270 UART: [art] Derive CDI
21,281,082 UART: [art] Store in in slot 0x4
21,323,784 UART: [art] Derive Key Pair
21,324,981 UART: [art] Store priv key in slot 0x5
23,751,863 UART: [art] Derive Key Pair - Done
23,764,751 UART: [art] Signing Cert with AUTHO
23,766,047 UART: RITY.KEYID = 7
25,471,321 UART: [art] Erasing AUTHORITY.KEYID = 7
25,472,828 UART: [art] PUB.X = B3D6EEF026537B77C4C11EC624BF1A59B57F4E212D64B5DCFEFE43305943ECCA4950C9247245423A3669159385F5920E
25,480,114 UART: [art] PUB.Y = 32FF0D523F6357AE1911EB9B400D39CEF862228E1A1F917DB692755F4F0E91FB42D76F79D563338219513F247DDA31C3
25,487,329 UART: [art] SIG.R = 0D7CED75E56F509D7DBFFEBFD19C2A1DBACD7D76EE67069AC25CC4B2DB777C9CEA6983ECF0D35785E43225E1FB260E9D
25,494,776 UART: [art] SIG.S = B7BD7920D1537C210EA0D171D67F5F1105432B41AC2E4B750CC07BA8B4B1B616F32FA6C44D5369237DB5C333AA553F61
26,473,915 UART: Caliptra RT
26,474,633 UART: [state] CFI Enabled
26,591,534 UART: [rt] RT listening for mailbox commands...
26,593,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,749,346 UART: [rt]cmd =0x41544d4e, len=14344
30,370,730 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,172 UART:
192,512 UART: Running Caliptra ROM ...
193,708 UART:
193,864 UART: [state] CFI Enabled
259,981 UART: [state] LifecycleState = Unprovisioned
262,402 UART: [state] DebugLocked = No
264,718 UART: [state] WD Timer not started. Device not locked for debugging
269,611 UART: [kat] SHA2-256
459,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,279 UART: [kat] ++
470,808 UART: [kat] sha1
481,489 UART: [kat] SHA2-256
484,547 UART: [kat] SHA2-384
490,650 UART: [kat] SHA2-512-ACC
493,241 UART: [kat] ECC-384
2,945,338 UART: [kat] HMAC-384Kdf
2,969,535 UART: [kat] LMS
3,501,268 UART: [kat] --
3,506,839 UART: [cold-reset] ++
3,508,773 UART: [fht] FHT @ 0x50003400
3,520,237 UART: [idev] ++
3,520,912 UART: [idev] CDI.KEYID = 6
3,521,800 UART: [idev] SUBJECT.KEYID = 7
3,523,045 UART: [idev] UDS.KEYID = 0
3,523,989 ready_for_fw is high
3,524,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,961 UART: [idev] Erasing UDS.KEYID = 0
6,030,536 UART: [idev] Sha1 KeyId Algorithm
6,052,985 UART: [idev] --
6,057,961 UART: [ldev] ++
6,058,649 UART: [ldev] CDI.KEYID = 6
6,059,563 UART: [ldev] SUBJECT.KEYID = 5
6,060,722 UART: [ldev] AUTHORITY.KEYID = 7
6,061,955 UART: [ldev] FE.KEYID = 1
6,098,557 UART: [ldev] Erasing FE.KEYID = 1
8,605,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,861 UART: [ldev] --
10,413,887 UART: [fwproc] Wait for Commands...
10,415,927 UART: [fwproc] Recv command 0x46574c44
10,418,180 UART: [fwproc] Recv'd Img size: 114448 bytes
15,062,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,145,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,261,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,804,447 >>> mbox cmd response: success
15,809,004 UART: [afmc] ++
15,809,713 UART: [afmc] CDI.KEYID = 6
15,810,980 UART: [afmc] SUBJECT.KEYID = 7
15,812,426 UART: [afmc] AUTHORITY.KEYID = 5
18,341,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,066,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,068,851 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,083,985 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,099,119 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,951 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,137,739 UART: [afmc] --
20,141,270 UART: [cold-reset] --
20,145,075 UART: [state] Locking Datavault
20,150,489 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,686 UART: [state] Locking ICCM
20,155,407 UART: [exit] Launching FMC @ 0x40000130
20,164,075 UART:
20,164,320 UART: Running Caliptra FMC ...
20,165,440 UART:
20,165,603 UART: [state] CFI Enabled
20,223,475 UART: [fht] FMC Alias Private Key: 7
21,987,198 UART: [art] Extend RT PCRs Done
21,988,414 UART: [art] Lock RT PCRs Done
21,990,334 UART: [art] Populate DV Done
21,995,846 UART: [fht] FMC Alias Private Key: 7
21,997,480 UART: [art] Derive CDI
21,998,224 UART: [art] Store in in slot 0x4
22,055,804 UART: [art] Derive Key Pair
22,056,805 UART: [art] Store priv key in slot 0x5
24,519,725 UART: [art] Derive Key Pair - Done
24,532,887 UART: [art] Signing Cert with AUTHO
24,534,192 UART: RITY.KEYID = 7
26,245,557 UART: [art] Erasing AUTHORITY.KEYID = 7
26,247,032 UART: [art] PUB.X = 9EB624F835C94C351A4E33B12236B683054D9A91A71A9098FC3845AB19823BE6C4EB49C06714B9C099410EC050963947
26,254,342 UART: [art] PUB.Y = F50666945AC5F408E5CDFBA4C6A7F45D219EFCF85BEB804B47CFDE2E54495D0BD9BA08A96133F858091AA6AD79D5C1C5
26,261,576 UART: [art] SIG.R = 26AC6238A5E1B6C699341223E72D73014F8CBDBE482A42A02A91F7AD70815DB4861D9A75751BCABE23FBF3584DD12FEA
26,268,969 UART: [art] SIG.S = 08BC81725E5983B59BCB8D8AB04604907EDE6C8D2E8088B8286B24791B9DC1F70B5B0E43D99E05D73BE340CC5C7DECCA
27,248,618 UART: Caliptra RT
27,249,324 UART: [state] CFI Enabled
27,413,806 UART: [rt] RT listening for mailbox commands...
27,416,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,017 UART: [rt]cmd =0x41544d4e, len=14344
31,188,765 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,422,237 ready_for_fw is high
3,422,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,812,122 >>> mbox cmd response: success
20,100,232 UART:
20,100,611 UART: Running Caliptra FMC ...
20,101,803 UART:
20,101,992 UART: [state] CFI Enabled
20,167,562 UART: [fht] FMC Alias Private Key: 7
21,931,432 UART: [art] Extend RT PCRs Done
21,932,659 UART: [art] Lock RT PCRs Done
21,934,098 UART: [art] Populate DV Done
21,939,454 UART: [fht] FMC Alias Private Key: 7
21,941,059 UART: [art] Derive CDI
21,941,803 UART: [art] Store in in slot 0x4
22,000,740 UART: [art] Derive Key Pair
22,001,785 UART: [art] Store priv key in slot 0x5
24,464,490 UART: [art] Derive Key Pair - Done
24,477,456 UART: [art] Signing Cert with AUTHO
24,478,766 UART: RITY.KEYID = 7
26,190,385 UART: [art] Erasing AUTHORITY.KEYID = 7
26,191,883 UART: [art] PUB.X = DF326307D71F4279FBDB7191A8E1B910A409FA2696F93CAB4B1C8B28C6E8C3C0CD043E29BB8570A46C85CAC2AC4AD8EF
26,199,215 UART: [art] PUB.Y = 4BFA3CBB53343E2AC5D55F2539B1F676F320C7183C8EBCE36543A8D657E93EE37DEBEF196EE9F3D7E05D352B16CC7D9E
26,206,483 UART: [art] SIG.R = F53B8D8786000458BAE1C7798361B0405BE6E7C90843E454DA7EC418C1D6EB636E9B7BA6F6D6F719579487BFA84AA1DE
26,213,872 UART: [art] SIG.S = 3C2E7F4AE11E4C00C23681928219465919C8031954FFD0CDC7790926E4E20B68908FF7F95F5630E72475B993C2582DB2
27,192,831 UART: Caliptra RT
27,193,527 UART: [state] CFI Enabled
27,358,958 UART: [rt] RT listening for mailbox commands...
27,361,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,517,253 UART: [rt]cmd =0x41544d4e, len=14344
31,121,031 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,710 writing to cptra_bootfsm_go
193,969 UART:
194,316 UART: Running Caliptra ROM ...
195,398 UART:
605,066 UART: [state] CFI Enabled
619,089 UART: [state] LifecycleState = Unprovisioned
621,476 UART: [state] DebugLocked = No
623,213 UART: [state] WD Timer not started. Device not locked for debugging
627,588 UART: [kat] SHA2-256
817,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,255 UART: [kat] ++
828,787 UART: [kat] sha1
841,796 UART: [kat] SHA2-256
844,825 UART: [kat] SHA2-384
849,105 UART: [kat] SHA2-512-ACC
851,678 UART: [kat] ECC-384
3,292,662 UART: [kat] HMAC-384Kdf
3,304,608 UART: [kat] LMS
3,836,411 UART: [kat] --
3,841,117 UART: [cold-reset] ++
3,843,614 UART: [fht] FHT @ 0x50003400
3,855,246 UART: [idev] ++
3,855,952 UART: [idev] CDI.KEYID = 6
3,856,970 UART: [idev] SUBJECT.KEYID = 7
3,858,139 UART: [idev] UDS.KEYID = 0
3,859,066 ready_for_fw is high
3,859,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,024 UART: [idev] Erasing UDS.KEYID = 0
6,337,701 UART: [idev] Sha1 KeyId Algorithm
6,361,159 UART: [idev] --
6,365,529 UART: [ldev] ++
6,366,199 UART: [ldev] CDI.KEYID = 6
6,367,129 UART: [ldev] SUBJECT.KEYID = 5
6,368,275 UART: [ldev] AUTHORITY.KEYID = 7
6,369,553 UART: [ldev] FE.KEYID = 1
6,380,756 UART: [ldev] Erasing FE.KEYID = 1
8,858,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,549 UART: [ldev] --
10,647,152 UART: [fwproc] Wait for Commands...
10,648,601 UART: [fwproc] Recv command 0x46574c44
10,650,528 UART: [fwproc] Recv'd Img size: 114448 bytes
15,280,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,363,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,479,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,023,273 >>> mbox cmd response: success
16,027,128 UART: [afmc] ++
16,027,837 UART: [afmc] CDI.KEYID = 6
16,029,085 UART: [afmc] SUBJECT.KEYID = 7
16,030,529 UART: [afmc] AUTHORITY.KEYID = 5
18,532,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,257,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,259,249 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,274,326 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,289,532 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,304,377 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,327,233 UART: [afmc] --
20,330,600 UART: [cold-reset] --
20,335,899 UART: [state] Locking Datavault
20,340,946 UART: [state] Locking PCR0, PCR1 and PCR31
20,343,093 UART: [state] Locking ICCM
20,345,457 UART: [exit] Launching FMC @ 0x40000130
20,354,133 UART:
20,354,366 UART: Running Caliptra FMC ...
20,355,463 UART:
20,355,614 UART: [state] CFI Enabled
20,363,764 UART: [fht] FMC Alias Private Key: 7
22,121,182 UART: [art] Extend RT PCRs Done
22,122,407 UART: [art] Lock RT PCRs Done
22,124,377 UART: [art] Populate DV Done
22,130,055 UART: [fht] FMC Alias Private Key: 7
22,131,699 UART: [art] Derive CDI
22,132,429 UART: [art] Store in in slot 0x4
22,174,909 UART: [art] Derive Key Pair
22,175,966 UART: [art] Store priv key in slot 0x5
24,602,446 UART: [art] Derive Key Pair - Done
24,615,610 UART: [art] Signing Cert with AUTHO
24,616,911 UART: RITY.KEYID = 7
26,322,408 UART: [art] Erasing AUTHORITY.KEYID = 7
26,323,911 UART: [art] PUB.X = 1C6E481C5C6C0B37F87F87F7391162BEE379969259A980414756A51FB16B79AB65D8C3B2C800C3BAD1BAD952AC071072
26,331,137 UART: [art] PUB.Y = C6CB4EE677CE85647CFF0528BF36E4689B142B33BCCF05A369DE152358CAFB7957B11D763F462F86FD49BA1F3F87DAF5
26,338,397 UART: [art] SIG.R = 48C61F7A3C111F81C3CDB2324C35EB4F91068EA9BB6E9B5E5B2C7C026404EACA2E0AAC3226FD8C6A8024082D502DFEF5
26,345,829 UART: [art] SIG.S = 02211B54E6E88F2C431F5452BF2E882B743238EFACB86D7583A320DF3572FB44A40E98C08C974149A1B1AC6F894805AF
27,324,301 UART: Caliptra RT
27,325,003 UART: [state] CFI Enabled
27,441,578 UART: [rt] RT listening for mailbox commands...
27,443,860 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,599,304 UART: [rt]cmd =0x41544d4e, len=14344
31,219,062 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,752,591 ready_for_fw is high
3,753,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,080,171 >>> mbox cmd response: success
20,332,599 UART:
20,332,994 UART: Running Caliptra FMC ...
20,334,086 UART:
20,334,238 UART: [state] CFI Enabled
20,342,357 UART: [fht] FMC Alias Private Key: 7
22,099,464 UART: [art] Extend RT PCRs Done
22,100,674 UART: [art] Lock RT PCRs Done
22,102,241 UART: [art] Populate DV Done
22,107,393 UART: [fht] FMC Alias Private Key: 7
22,109,064 UART: [art] Derive CDI
22,109,807 UART: [art] Store in in slot 0x4
22,152,560 UART: [art] Derive Key Pair
22,153,558 UART: [art] Store priv key in slot 0x5
24,580,451 UART: [art] Derive Key Pair - Done
24,593,427 UART: [art] Signing Cert with AUTHO
24,594,737 UART: RITY.KEYID = 7
26,300,383 UART: [art] Erasing AUTHORITY.KEYID = 7
26,301,887 UART: [art] PUB.X = 74A7AD8D4F03EB8C9F94517BD8E9AEE8576D266175704F1EA0C95DB64737F383AA680C669B0516CB1F5C5F3ACE50D2C3
26,309,118 UART: [art] PUB.Y = 13D9DB8ACE650B90634EC8A3D9E8DC649B7F11707C034662F8C930D211254CD4C97447A8A108AE6FABD8520EF8388C36
26,316,420 UART: [art] SIG.R = 3C4BF37114AF1B6C8E330E0A37ECFA621A3E9A8DA4976B4720FD94C13943F6B9C98669CE1632379BC09F16A3499206B4
26,323,793 UART: [art] SIG.S = CFF0DA6B286B3D38685A52AC1943458A824CCA5AD4E5AA23DFEDAF0CDF03B3CA882D5AD01896B334401A3E42E4344E50
27,302,503 UART: Caliptra RT
27,303,222 UART: [state] CFI Enabled
27,419,695 UART: [rt] RT listening for mailbox commands...
27,422,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,577,170 UART: [rt]cmd =0x41544d4e, len=14344
31,195,798 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,806 UART: [state] LifecycleState = Unprovisioned
86,461 UART: [state] DebugLocked = No
87,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,815 UART: [kat] SHA2-256
882,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,861 UART: [kat] ++
887,013 UART: [kat] sha1
891,409 UART: [kat] SHA2-256
893,347 UART: [kat] SHA2-384
896,240 UART: [kat] SHA2-512-ACC
898,141 UART: [kat] ECC-384
903,700 UART: [kat] HMAC-384Kdf
908,218 UART: [kat] LMS
1,476,414 UART: [kat] --
1,477,465 UART: [cold-reset] ++
1,477,795 UART: [fht] Storing FHT @ 0x50003400
1,480,636 UART: [idev] ++
1,480,804 UART: [idev] CDI.KEYID = 6
1,481,164 UART: [idev] SUBJECT.KEYID = 7
1,481,588 UART: [idev] UDS.KEYID = 0
1,481,933 ready_for_fw is high
1,481,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,472 UART: [idev] Erasing UDS.KEYID = 0
1,506,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,612 UART: [idev] --
1,515,423 UART: [ldev] ++
1,515,591 UART: [ldev] CDI.KEYID = 6
1,515,954 UART: [ldev] SUBJECT.KEYID = 5
1,516,380 UART: [ldev] AUTHORITY.KEYID = 7
1,516,843 UART: [ldev] FE.KEYID = 1
1,521,925 UART: [ldev] Erasing FE.KEYID = 1
1,547,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,208 UART: [ldev] --
1,586,575 UART: [fwproc] Waiting for Commands...
1,587,214 UART: [fwproc] Received command 0x46574c44
1,588,005 UART: [fwproc] Received Image of size 114448 bytes
5,083,954 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,032 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,384 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,277,361 >>> mbox cmd response: success
5,278,497 UART: [afmc] ++
5,278,665 UART: [afmc] CDI.KEYID = 6
5,279,027 UART: [afmc] SUBJECT.KEYID = 7
5,279,452 UART: [afmc] AUTHORITY.KEYID = 5
5,314,326 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,330,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,331,584 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,293 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,185 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,348,886 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,356,874 UART: [afmc] --
5,357,910 UART: [cold-reset] --
5,358,634 UART: [state] Locking Datavault
5,359,915 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,519 UART: [state] Locking ICCM
5,361,001 UART: [exit] Launching FMC @ 0x40000130
5,366,330 UART:
5,366,346 UART: Running Caliptra FMC ...
5,366,754 UART:
5,366,808 UART: [state] CFI Enabled
5,377,454 UART: [fht] FMC Alias Private Key: 7
5,484,948 UART: [art] Extend RT PCRs Done
5,485,376 UART: [art] Lock RT PCRs Done
5,486,940 UART: [art] Populate DV Done
5,495,252 UART: [fht] FMC Alias Private Key: 7
5,496,184 UART: [art] Derive CDI
5,496,464 UART: [art] Store in in slot 0x4
5,581,953 UART: [art] Derive Key Pair
5,582,313 UART: [art] Store priv key in slot 0x5
5,595,981 UART: [art] Derive Key Pair - Done
5,610,633 UART: [art] Signing Cert with AUTHO
5,611,113 UART: RITY.KEYID = 7
5,626,421 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,186 UART: [art] PUB.X = 460DD0458145642F4651B224738896761374381B65F1B9F3CFDC599D1789B00B8C52AC67F118FCB193D11369C5F8C3EB
5,633,944 UART: [art] PUB.Y = B0CA09CA9BE06B14ECE2B85A924F702A3C189FEE0DC2FA8ED15D3B7DA012D49B94A5E547579E753F213EDB1E36AC263B
5,640,910 UART: [art] SIG.R = 01D176DEF37EFB5BC9349AA7DC882FB535702946CE44D213F4D8B4D85BF42D3CA581F1E6E7CE38CA518E034C20B65EED
5,647,692 UART: [art] SIG.S = 90C32FC95CB6F9EA7CEDFB0C121E7882331EA5D5E5011B3FA1BE04E242F0F3840FE96DC417029E92790BA87CF12099CE
5,671,091 UART: Caliptra RT
5,671,344 UART: [state] CFI Enabled
5,778,605 UART: [rt] RT listening for mailbox commands...
5,779,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,227 UART: [rt]cmd =0x41544d4e, len=14344
6,869,155 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,099 ready_for_fw is high
1,363,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,090,578 >>> mbox cmd response: success
5,152,885 UART:
5,152,901 UART: Running Caliptra FMC ...
5,153,309 UART:
5,153,363 UART: [state] CFI Enabled
5,164,115 UART: [fht] FMC Alias Private Key: 7
5,272,007 UART: [art] Extend RT PCRs Done
5,272,435 UART: [art] Lock RT PCRs Done
5,274,001 UART: [art] Populate DV Done
5,282,271 UART: [fht] FMC Alias Private Key: 7
5,283,301 UART: [art] Derive CDI
5,283,581 UART: [art] Store in in slot 0x4
5,369,406 UART: [art] Derive Key Pair
5,369,766 UART: [art] Store priv key in slot 0x5
5,382,954 UART: [art] Derive Key Pair - Done
5,398,003 UART: [art] Signing Cert with AUTHO
5,398,483 UART: RITY.KEYID = 7
5,413,545 UART: [art] Erasing AUTHORITY.KEYID = 7
5,414,310 UART: [art] PUB.X = EC8CFB6A03B02A31C3DADF9863E19E444B475F7BAA2CD5A0287D9837F78817AC60F74B6695DBA31EED47FE2A6272940E
5,421,090 UART: [art] PUB.Y = 0D9991C16610F10B461178215306A129ED8F1C3926F91AF2E9319F7802064FD559064B993A36B2041780F0BDE1906730
5,428,003 UART: [art] SIG.R = 0A9AE222E3FC14A83A785B11A30A25B91F03B625EFD595A424EE27BC61AA0DE25B4375735F89225A35FBC2E036F89692
5,434,767 UART: [art] SIG.S = 06C41C1C58AB05E3E9174534C511AB212749C4460E85F69A75526C2C8535872882265BD7601216FBC2F9EC14CD8446C5
5,458,867 UART: Caliptra RT
5,459,120 UART: [state] CFI Enabled
5,567,722 UART: [rt] RT listening for mailbox commands...
5,568,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,691,730 UART: [rt]cmd =0x41544d4e, len=14344
6,646,859 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,049 UART: [idev] Erasing UDS.KEYID = 0
1,504,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,981 UART: [idev] --
1,514,130 UART: [ldev] ++
1,514,298 UART: [ldev] CDI.KEYID = 6
1,514,661 UART: [ldev] SUBJECT.KEYID = 5
1,515,087 UART: [ldev] AUTHORITY.KEYID = 7
1,515,550 UART: [ldev] FE.KEYID = 1
1,520,660 UART: [ldev] Erasing FE.KEYID = 1
1,546,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,357 UART: [ldev] --
1,585,626 UART: [fwproc] Waiting for Commands...
1,586,299 UART: [fwproc] Received command 0x46574c44
1,587,090 UART: [fwproc] Received Image of size 114448 bytes
5,084,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,277,868 >>> mbox cmd response: success
5,279,062 UART: [afmc] ++
5,279,230 UART: [afmc] CDI.KEYID = 6
5,279,592 UART: [afmc] SUBJECT.KEYID = 7
5,280,017 UART: [afmc] AUTHORITY.KEYID = 5
5,315,603 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,977 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,757 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,466 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,358 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,350,059 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,853 UART: [afmc] --
5,358,771 UART: [cold-reset] --
5,359,491 UART: [state] Locking Datavault
5,360,676 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,280 UART: [state] Locking ICCM
5,361,702 UART: [exit] Launching FMC @ 0x40000130
5,367,031 UART:
5,367,047 UART: Running Caliptra FMC ...
5,367,455 UART:
5,367,598 UART: [state] CFI Enabled
5,378,246 UART: [fht] FMC Alias Private Key: 7
5,486,600 UART: [art] Extend RT PCRs Done
5,487,028 UART: [art] Lock RT PCRs Done
5,488,656 UART: [art] Populate DV Done
5,497,130 UART: [fht] FMC Alias Private Key: 7
5,498,134 UART: [art] Derive CDI
5,498,414 UART: [art] Store in in slot 0x4
5,584,035 UART: [art] Derive Key Pair
5,584,395 UART: [art] Store priv key in slot 0x5
5,597,075 UART: [art] Derive Key Pair - Done
5,611,660 UART: [art] Signing Cert with AUTHO
5,612,140 UART: RITY.KEYID = 7
5,627,310 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,075 UART: [art] PUB.X = 395B57929840441763214620296CB272D53F286AEB02C06A9CA868F5064DE0F897AA3B97E3BF29BC565A635DB04ED1ED
5,634,839 UART: [art] PUB.Y = 080552968CBE235AC452AD33B73EAAD3C1BFEC88D31035BEB35D088756782840D48C4575FEE7ACBBD372B5F49F66C455
5,641,790 UART: [art] SIG.R = C8520992694ACC8E9DC0887EFDA93CE0AC63FBEE682CEF24F9B345832CBCC68E1EF6397112BD39A559733D6D5688C9BB
5,648,573 UART: [art] SIG.S = 27E801A1A21EAA3A09C97497618FB11F73F7A54867132682A1A48009CF53B1E9C01D3AB085054441F5FF467E0F21068D
5,672,638 UART: Caliptra RT
5,672,983 UART: [state] CFI Enabled
5,780,714 UART: [rt] RT listening for mailbox commands...
5,781,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,556 UART: [rt]cmd =0x41544d4e, len=14344
6,884,021 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,974 ready_for_fw is high
1,362,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,205,944 >>> mbox cmd response: success
5,268,011 UART:
5,268,027 UART: Running Caliptra FMC ...
5,268,435 UART:
5,268,578 UART: [state] CFI Enabled
5,279,228 UART: [fht] FMC Alias Private Key: 7
5,387,108 UART: [art] Extend RT PCRs Done
5,387,536 UART: [art] Lock RT PCRs Done
5,389,136 UART: [art] Populate DV Done
5,397,302 UART: [fht] FMC Alias Private Key: 7
5,398,338 UART: [art] Derive CDI
5,398,618 UART: [art] Store in in slot 0x4
5,484,227 UART: [art] Derive Key Pair
5,484,587 UART: [art] Store priv key in slot 0x5
5,497,653 UART: [art] Derive Key Pair - Done
5,512,627 UART: [art] Signing Cert with AUTHO
5,513,107 UART: RITY.KEYID = 7
5,528,327 UART: [art] Erasing AUTHORITY.KEYID = 7
5,529,092 UART: [art] PUB.X = E31170F6B6F46E44EEFCA21C9DEFEF6DDBC0BC81F2261F65907D29135F56097AFD73A65DCEF3A1B8C70BE875B7C1CEA2
5,535,882 UART: [art] PUB.Y = 15D3D0AFA8B218620265B3F37B89F06E422F949950C673A9557FF13814FC711262DD05A1660D53F3928E5D574B373662
5,542,813 UART: [art] SIG.R = AD4D09BC7976EA5348378459AA16C310296323B5F16B321821D22B2C260F361E7077E3557ACA57F6627CC79359D64A3F
5,549,571 UART: [art] SIG.S = 70726AF1B23A63ABEFF6A6D51EBB44A83E74DDECD6666BCC135E49B1AA68C49395893061CE4780524DD0FC3896008C1A
5,573,108 UART: Caliptra RT
5,573,453 UART: [state] CFI Enabled
5,681,038 UART: [rt] RT listening for mailbox commands...
5,681,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,676 UART: [rt]cmd =0x41544d4e, len=14344
6,772,860 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
893,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,177 UART: [kat] ++
897,329 UART: [kat] sha1
901,367 UART: [kat] SHA2-256
903,307 UART: [kat] SHA2-384
905,970 UART: [kat] SHA2-512-ACC
907,871 UART: [kat] ECC-384
917,766 UART: [kat] HMAC-384Kdf
922,450 UART: [kat] LMS
1,170,778 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,920 UART: [idev] Erasing UDS.KEYID = 0
1,200,281 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,136 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,285 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,132 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,459 >>> mbox cmd response: success
3,324,547 UART: [afmc] ++
3,324,715 UART: [afmc] CDI.KEYID = 6
3,325,077 UART: [afmc] SUBJECT.KEYID = 7
3,325,502 UART: [afmc] AUTHORITY.KEYID = 5
3,360,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,001 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,710 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,602 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,313 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,058 UART: [afmc] --
3,404,128 UART: [cold-reset] --
3,404,888 UART: [state] Locking Datavault
3,405,899 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,503 UART: [state] Locking ICCM
3,407,139 UART: [exit] Launching FMC @ 0x40000130
3,412,468 UART:
3,412,484 UART: Running Caliptra FMC ...
3,412,892 UART:
3,412,946 UART: [state] CFI Enabled
3,423,074 UART: [fht] FMC Alias Private Key: 7
3,530,924 UART: [art] Extend RT PCRs Done
3,531,352 UART: [art] Lock RT PCRs Done
3,533,280 UART: [art] Populate DV Done
3,541,286 UART: [fht] FMC Alias Private Key: 7
3,542,288 UART: [art] Derive CDI
3,542,568 UART: [art] Store in in slot 0x4
3,628,243 UART: [art] Derive Key Pair
3,628,603 UART: [art] Store priv key in slot 0x5
3,641,643 UART: [art] Derive Key Pair - Done
3,656,393 UART: [art] Signing Cert with AUTHO
3,656,873 UART: RITY.KEYID = 7
3,672,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,860 UART: [art] PUB.X = 6002DD47A872842B4DFCB972135ED4BB6E6635D4CD36774A4A38177C5370C08246031F7A43CC68A3C691956E3556968D
3,679,618 UART: [art] PUB.Y = 7AF3F708642548E0A28FBA1A5C1D9E6DD6FE0F73649763E215D00484804FD3B154384D806B5D4987EBAEC8EC79ED9B1B
3,686,569 UART: [art] SIG.R = 2CCF808A49A76E5E19A6F8C8B22B18C2ADC78CF42C793A6A04590DD92E58C56E66388B7A97B4DA1B15C95265823E07D0
3,693,338 UART: [art] SIG.S = 92044A7BBD3BD637EC92749AF11FA783F1287725B25E98FFC1A882C289E25040CFD800C0F15EE1935DCDF4470FE770C2
3,717,325 UART: Caliptra RT
3,717,578 UART: [state] CFI Enabled
3,825,478 UART: [rt] RT listening for mailbox commands...
3,826,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,294 UART: [rt]cmd =0x41544d4e, len=14344
4,914,369 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 ready_for_fw is high
1,060,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,178,985 >>> mbox cmd response: success
3,241,018 UART:
3,241,034 UART: Running Caliptra FMC ...
3,241,442 UART:
3,241,496 UART: [state] CFI Enabled
3,251,596 UART: [fht] FMC Alias Private Key: 7
3,359,504 UART: [art] Extend RT PCRs Done
3,359,932 UART: [art] Lock RT PCRs Done
3,361,518 UART: [art] Populate DV Done
3,369,968 UART: [fht] FMC Alias Private Key: 7
3,370,906 UART: [art] Derive CDI
3,371,186 UART: [art] Store in in slot 0x4
3,456,493 UART: [art] Derive Key Pair
3,456,853 UART: [art] Store priv key in slot 0x5
3,470,199 UART: [art] Derive Key Pair - Done
3,484,986 UART: [art] Signing Cert with AUTHO
3,485,466 UART: RITY.KEYID = 7
3,500,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,569 UART: [art] PUB.X = 066ABA109E5ED106D1889D6A65B7F2292097A7488EE0F0616201EA8EC76FAB07C00AB867DCF86D1099425097D4F91498
3,508,324 UART: [art] PUB.Y = 3F7E85950C9626ABAC0129788E576BFF7367C8126C45518CB5B5865C050DC27B8407ED06262B0EBA680CCECE446E537B
3,515,254 UART: [art] SIG.R = 9F3BC0F6C85C70373C92A7A0A34B12871953D007DF34FDCB106BB4C156BD81967B4B4A5369361DADE39105D2370127D2
3,522,017 UART: [art] SIG.S = F73467514D234E7C67B76E9212A086ACFFE305E2448268380416320DF0C94EFDB09F16D4948770AB4F5F873EB28B1789
3,546,329 UART: Caliptra RT
3,546,582 UART: [state] CFI Enabled
3,654,683 UART: [rt] RT listening for mailbox commands...
3,655,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,463 UART: [rt]cmd =0x41544d4e, len=14344
4,733,692 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,743 UART: [state] LifecycleState = Unprovisioned
85,398 UART: [state] DebugLocked = No
85,936 UART: [state] WD Timer not started. Device not locked for debugging
87,285 UART: [kat] SHA2-256
892,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,060 UART: [kat] ++
897,212 UART: [kat] sha1
901,266 UART: [kat] SHA2-256
903,206 UART: [kat] SHA2-384
906,029 UART: [kat] SHA2-512-ACC
907,930 UART: [kat] ECC-384
917,525 UART: [kat] HMAC-384Kdf
922,153 UART: [kat] LMS
1,170,481 UART: [kat] --
1,171,394 UART: [cold-reset] ++
1,171,744 UART: [fht] FHT @ 0x50003400
1,174,439 UART: [idev] ++
1,174,607 UART: [idev] CDI.KEYID = 6
1,174,967 UART: [idev] SUBJECT.KEYID = 7
1,175,391 UART: [idev] UDS.KEYID = 0
1,175,736 ready_for_fw is high
1,175,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,531 UART: [idev] Erasing UDS.KEYID = 0
1,200,692 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,032 UART: [ldev] ++
1,210,200 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,989 UART: [ldev] AUTHORITY.KEYID = 7
1,211,452 UART: [ldev] FE.KEYID = 1
1,216,714 UART: [ldev] Erasing FE.KEYID = 1
1,243,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,074 UART: [ldev] --
1,282,555 UART: [fwproc] Wait for Commands...
1,283,233 UART: [fwproc] Recv command 0x46574c44
1,283,961 UART: [fwproc] Recv'd Img size: 114448 bytes
3,118,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,311,499 >>> mbox cmd response: success
3,312,649 UART: [afmc] ++
3,312,817 UART: [afmc] CDI.KEYID = 6
3,313,179 UART: [afmc] SUBJECT.KEYID = 7
3,313,604 UART: [afmc] AUTHORITY.KEYID = 5
3,349,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,089 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,798 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,690 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,401 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,350 UART: [afmc] --
3,392,318 UART: [cold-reset] --
3,393,164 UART: [state] Locking Datavault
3,394,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,009 UART: [state] Locking ICCM
3,395,577 UART: [exit] Launching FMC @ 0x40000130
3,400,906 UART:
3,400,922 UART: Running Caliptra FMC ...
3,401,330 UART:
3,401,473 UART: [state] CFI Enabled
3,412,075 UART: [fht] FMC Alias Private Key: 7
3,519,593 UART: [art] Extend RT PCRs Done
3,520,021 UART: [art] Lock RT PCRs Done
3,521,537 UART: [art] Populate DV Done
3,529,759 UART: [fht] FMC Alias Private Key: 7
3,530,731 UART: [art] Derive CDI
3,531,011 UART: [art] Store in in slot 0x4
3,616,644 UART: [art] Derive Key Pair
3,617,004 UART: [art] Store priv key in slot 0x5
3,629,946 UART: [art] Derive Key Pair - Done
3,644,725 UART: [art] Signing Cert with AUTHO
3,645,205 UART: RITY.KEYID = 7
3,660,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,432 UART: [art] PUB.X = 9B5A900CA590FA94E6D9E42C5283C33CD83B1C46A385FE240BF2C762CDDEA19033D1A4B769EEC2B484FE8E8DE47426C0
3,668,212 UART: [art] PUB.Y = 618D55594381A1B0C9F92070EA8DD7491996CD9DCF5DDFE3346ADF7FD246E3096D09B6D3CA727EF837E7C4490F4239AD
3,675,163 UART: [art] SIG.R = 248AEB7B9F8152F2DE1C00D06FFAB0B31B98CF333F24ECF87199AC17D01E034A606C5F08E3603CCD8A593647626F71DB
3,681,917 UART: [art] SIG.S = D03E7FC5751E2F708D63DC8FA2268252CF3D37778ED8CF6125BA42B46F091B5AE01A46FBB6FC4E70B78F7487EC73AFEE
3,705,701 UART: Caliptra RT
3,706,046 UART: [state] CFI Enabled
3,813,164 UART: [rt] RT listening for mailbox commands...
3,813,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,964 UART: [rt]cmd =0x41544d4e, len=14344
4,904,464 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,228 ready_for_fw is high
1,061,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,325 >>> mbox cmd response: success
3,229,768 UART:
3,229,784 UART: Running Caliptra FMC ...
3,230,192 UART:
3,230,335 UART: [state] CFI Enabled
3,241,043 UART: [fht] FMC Alias Private Key: 7
3,349,335 UART: [art] Extend RT PCRs Done
3,349,763 UART: [art] Lock RT PCRs Done
3,351,313 UART: [art] Populate DV Done
3,359,555 UART: [fht] FMC Alias Private Key: 7
3,360,617 UART: [art] Derive CDI
3,360,897 UART: [art] Store in in slot 0x4
3,446,778 UART: [art] Derive Key Pair
3,447,138 UART: [art] Store priv key in slot 0x5
3,460,100 UART: [art] Derive Key Pair - Done
3,475,032 UART: [art] Signing Cert with AUTHO
3,475,512 UART: RITY.KEYID = 7
3,490,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,705 UART: [art] PUB.X = 3A0CBD8507D415F68C0B61CFDFCDB86816001BBC0A5E3AB215F228BE5E27DAE0697282C04C305E53308AE3327ECAC6CE
3,498,459 UART: [art] PUB.Y = 4D802AE65C947707D3C82CA5230A7814A7FB9C4799E89A1985D22E64573774D18D9AAB137901081DC4C33D3D18A34615
3,505,391 UART: [art] SIG.R = A97DDAF41630FB4EB80FCE50AA06DCD76446FF725E58F589B3599E37F28509D25F26CC186FE984413FFD5F8BF5A42275
3,512,164 UART: [art] SIG.S = D7A927EBCF516EED3B94BAA2071C98D63052B00B5762F8156A24756572274BB7ABB905277B9017D0FBAD7F9B7EFD2330
3,535,964 UART: Caliptra RT
3,536,309 UART: [state] CFI Enabled
3,644,496 UART: [rt] RT listening for mailbox commands...
3,645,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,142 UART: [rt]cmd =0x41544d4e, len=14344
4,723,281 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 ready_for_fw is high
1,174,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,643 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,078 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,482 >>> mbox cmd response: success
3,318,625 UART: [afmc] ++
3,318,793 UART: [afmc] CDI.KEYID = 6
3,319,156 UART: [afmc] SUBJECT.KEYID = 7
3,319,582 UART: [afmc] AUTHORITY.KEYID = 5
3,354,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,083 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,793 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,683 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,394 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,230 UART: [afmc] --
3,398,246 UART: [cold-reset] --
3,399,060 UART: [state] Locking Datavault
3,400,029 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,633 UART: [state] Locking ICCM
3,401,147 UART: [exit] Launching FMC @ 0x40000130
3,406,476 UART:
3,406,492 UART: Running Caliptra FMC ...
3,406,900 UART:
3,406,954 UART: [state] CFI Enabled
3,417,104 UART: [fht] FMC Alias Private Key: 7
3,525,770 UART: [art] Extend RT PCRs Done
3,526,198 UART: [art] Lock RT PCRs Done
3,527,656 UART: [art] Populate DV Done
3,535,882 UART: [fht] FMC Alias Private Key: 7
3,536,922 UART: [art] Derive CDI
3,537,202 UART: [art] Store in in slot 0x4
3,622,723 UART: [art] Derive Key Pair
3,623,083 UART: [art] Store priv key in slot 0x5
3,636,185 UART: [art] Derive Key Pair - Done
3,650,879 UART: [art] Signing Cert with AUTHO
3,651,359 UART: RITY.KEYID = 7
3,666,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,372 UART: [art] PUB.X = 5AE245CFC2E9975609F8DA57BFAC7FC0EF09B94EAB9F8279AB5C54C0EA70549FCFF82628EB79DAD96995BC6009740FFB
3,674,152 UART: [art] PUB.Y = 3F9409C3B8B3F184DB1A516746205081744D390932065085F4ABB1DCB5029C3227B7767CC1F4DD75DD9F99106661B9FD
3,681,086 UART: [art] SIG.R = 94F8ED09B3E63841FB26578F002EDD9FF03070764E3DEB3DC20BFE57D88C9330FEE9D95CF3F174D7BC3F48C72E3237B9
3,687,842 UART: [art] SIG.S = 5A0038E1920840D495710E30C84C9271CACA94A6D925CCA7898F2004C7ECDF2988E009CE7FE9374F18A7B4FB151FD316
3,711,173 UART: Caliptra RT
3,711,426 UART: [state] CFI Enabled
3,818,332 UART: [rt] RT listening for mailbox commands...
3,819,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,894 UART: [rt]cmd =0x41544d4e, len=14344
4,899,756 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,652 ready_for_fw is high
1,055,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,020 >>> mbox cmd response: success
3,228,921 UART:
3,228,937 UART: Running Caliptra FMC ...
3,229,345 UART:
3,229,399 UART: [state] CFI Enabled
3,239,967 UART: [fht] FMC Alias Private Key: 7
3,347,749 UART: [art] Extend RT PCRs Done
3,348,177 UART: [art] Lock RT PCRs Done
3,349,989 UART: [art] Populate DV Done
3,358,231 UART: [fht] FMC Alias Private Key: 7
3,359,267 UART: [art] Derive CDI
3,359,547 UART: [art] Store in in slot 0x4
3,445,422 UART: [art] Derive Key Pair
3,445,782 UART: [art] Store priv key in slot 0x5
3,459,044 UART: [art] Derive Key Pair - Done
3,473,575 UART: [art] Signing Cert with AUTHO
3,474,055 UART: RITY.KEYID = 7
3,488,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,752 UART: [art] PUB.X = B1958427430B80C34808F2F2C54233B378869CECCF991818BF2FCE2A6B4C3F82326530639502EA9B84B4B7878BA44F19
3,496,509 UART: [art] PUB.Y = E637792B9E59971FC2A7635B21598F1D059127F41BBD9C13F551C4AC0C0ED3A69F696501F501E711AFC496FFD5708596
3,503,444 UART: [art] SIG.R = 364A0E7B010991A7F056657B8281E83C138834628FE8E5EDE10A72DC6085B1DD0DF836D7EA44EF3F986228B8C25608C8
3,510,196 UART: [art] SIG.S = 6FF6E0A088BE7BE61D94D4B5C1A6F2C9F3065A72106FAEC9D08AD17436312E9B055A0B09AAFAA44101339155989A1BBD
3,534,564 UART: Caliptra RT
3,534,817 UART: [state] CFI Enabled
3,641,132 UART: [rt] RT listening for mailbox commands...
3,641,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,076 UART: [rt]cmd =0x41544d4e, len=14344
4,725,385 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,093 UART: [state] LifecycleState = Unprovisioned
86,748 UART: [state] DebugLocked = No
87,428 UART: [state] WD Timer not started. Device not locked for debugging
88,613 UART: [kat] SHA2-256
892,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,292 UART: [kat] ++
896,444 UART: [kat] sha1
900,618 UART: [kat] SHA2-256
902,558 UART: [kat] SHA2-384
905,135 UART: [kat] SHA2-512-ACC
907,036 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,175,058 ready_for_fw is high
1,175,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,159 UART: [fwproc] Wait for Commands...
1,281,818 UART: [fwproc] Recv command 0x46574c44
1,282,551 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,258 >>> mbox cmd response: success
3,324,367 UART: [afmc] ++
3,324,535 UART: [afmc] CDI.KEYID = 6
3,324,898 UART: [afmc] SUBJECT.KEYID = 7
3,325,324 UART: [afmc] AUTHORITY.KEYID = 5
3,361,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,991 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,701 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,591 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,302 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,078 UART: [afmc] --
3,405,030 UART: [cold-reset] --
3,406,018 UART: [state] Locking Datavault
3,407,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,701 UART: [state] Locking ICCM
3,408,225 UART: [exit] Launching FMC @ 0x40000130
3,413,554 UART:
3,413,570 UART: Running Caliptra FMC ...
3,413,978 UART:
3,414,121 UART: [state] CFI Enabled
3,424,791 UART: [fht] FMC Alias Private Key: 7
3,532,651 UART: [art] Extend RT PCRs Done
3,533,079 UART: [art] Lock RT PCRs Done
3,534,655 UART: [art] Populate DV Done
3,542,729 UART: [fht] FMC Alias Private Key: 7
3,543,699 UART: [art] Derive CDI
3,543,979 UART: [art] Store in in slot 0x4
3,629,394 UART: [art] Derive Key Pair
3,629,754 UART: [art] Store priv key in slot 0x5
3,642,526 UART: [art] Derive Key Pair - Done
3,657,615 UART: [art] Signing Cert with AUTHO
3,658,095 UART: RITY.KEYID = 7
3,673,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,838 UART: [art] PUB.X = 0FFCCA12076805458CE31B05241B5E39C5016BC96BEB35DC1F8ED09E1781533B2466AFE373A80C847D9AA2DEFBD9182A
3,680,602 UART: [art] PUB.Y = 16C4903FA693E1694F0D35A3848628BEB44A610F8B8FE32CEED8741CDADD483B6DF078E254D91E13701D12BE0B85A236
3,687,551 UART: [art] SIG.R = 8BDECA6CA01434EB5BD0CD19C89039C6E4A50BD6FE721CC3FAFAD14EB7CE4D6AFC5C8A9407C8245D8059B977B8C90E0E
3,694,337 UART: [art] SIG.S = 950D8A26A3313951C5B52AF3552FF7BD7F90885FEF8140F4C0EF537BB3000FC709356B72EE6C257EE983CC51E17E250E
3,717,662 UART: Caliptra RT
3,718,007 UART: [state] CFI Enabled
3,826,052 UART: [rt] RT listening for mailbox commands...
3,826,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,570 UART: [rt]cmd =0x41544d4e, len=14344
4,921,314 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 ready_for_fw is high
1,056,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,150 >>> mbox cmd response: success
3,236,499 UART:
3,236,515 UART: Running Caliptra FMC ...
3,236,923 UART:
3,237,066 UART: [state] CFI Enabled
3,247,520 UART: [fht] FMC Alias Private Key: 7
3,355,134 UART: [art] Extend RT PCRs Done
3,355,562 UART: [art] Lock RT PCRs Done
3,357,106 UART: [art] Populate DV Done
3,365,344 UART: [fht] FMC Alias Private Key: 7
3,366,496 UART: [art] Derive CDI
3,366,776 UART: [art] Store in in slot 0x4
3,452,821 UART: [art] Derive Key Pair
3,453,181 UART: [art] Store priv key in slot 0x5
3,466,639 UART: [art] Derive Key Pair - Done
3,481,468 UART: [art] Signing Cert with AUTHO
3,481,948 UART: RITY.KEYID = 7
3,497,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,827 UART: [art] PUB.X = E516CB0F59B0F44C51712793A8E4F047AA41DDE74A65330963B2DE7A028E830CE24A1D6A53F6D2F7188F0E72253353B0
3,504,584 UART: [art] PUB.Y = 0C6201D8B1A3AFACA1B68CB6DF030C34D37534C6CB3C8BD8CAAE7E923E7BF8724EEB47F5E623FA4EC255C9B83E49BF5A
3,511,550 UART: [art] SIG.R = C55658C84CD809CC4B18FA638FE8F54ABABA9C0429713A208A0DD25C176C44F0C6EC0F4858EA49417DF4B1787F484075
3,518,316 UART: [art] SIG.S = 22260B4E2685AA5B6849613AFD8CB6E42F4812CC2F3CA24372DB2A4965020CB9778ACD68CB3A727BC5210E185F56DBE5
3,542,087 UART: Caliptra RT
3,542,432 UART: [state] CFI Enabled
3,649,524 UART: [rt] RT listening for mailbox commands...
3,650,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,162 UART: [rt]cmd =0x41544d4e, len=14344
4,733,333 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,216 UART:
192,575 UART: Running Caliptra ROM ...
193,681 UART:
193,823 UART: [state] CFI Enabled
263,291 UART: [state] LifecycleState = Unprovisioned
265,276 UART: [state] DebugLocked = No
266,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,755 UART: [kat] SHA2-256
440,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,980 UART: [kat] ++
451,513 UART: [kat] sha1
462,990 UART: [kat] SHA2-256
465,676 UART: [kat] SHA2-384
472,308 UART: [kat] SHA2-512-ACC
474,689 UART: [kat] ECC-384
2,767,033 UART: [kat] HMAC-384Kdf
2,799,877 UART: [kat] LMS
3,990,169 UART: [kat] --
3,994,853 UART: [cold-reset] ++
3,997,430 UART: [fht] Storing FHT @ 0x50003400
4,009,495 UART: [idev] ++
4,010,064 UART: [idev] CDI.KEYID = 6
4,011,005 UART: [idev] SUBJECT.KEYID = 7
4,012,184 UART: [idev] UDS.KEYID = 0
4,013,250 ready_for_fw is high
4,013,455 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,072 UART: [idev] Erasing UDS.KEYID = 0
7,348,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,549 UART: [idev] --
7,374,381 UART: [ldev] ++
7,374,961 UART: [ldev] CDI.KEYID = 6
7,375,903 UART: [ldev] SUBJECT.KEYID = 5
7,377,117 UART: [ldev] AUTHORITY.KEYID = 7
7,378,399 UART: [ldev] FE.KEYID = 1
7,422,062 UART: [ldev] Erasing FE.KEYID = 1
10,754,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,714 UART: [ldev] --
13,135,119 UART: [fwproc] Waiting for Commands...
13,138,294 UART: [fwproc] Received command 0x46574c44
13,140,481 UART: [fwproc] Received Image of size 114124 bytes
21,861,886 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,938,931 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,007,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,324,599 >>> mbox cmd response: success
22,328,848 UART: [afmc] ++
22,329,445 UART: [afmc] CDI.KEYID = 6
22,330,412 UART: [afmc] SUBJECT.KEYID = 7
22,331,628 UART: [afmc] AUTHORITY.KEYID = 5
25,696,833 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,993,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,995,785 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,010,345 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,025,100 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,039,318 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,059,772 UART: [afmc] --
28,063,679 UART: [cold-reset] --
28,066,901 UART: [state] Locking Datavault
28,070,860 UART: [state] Locking PCR0, PCR1 and PCR31
28,072,627 UART: [state] Locking ICCM
28,075,160 UART: [exit] Launching FMC @ 0x40000130
28,083,562 UART:
28,083,802 UART: Running Caliptra FMC ...
28,084,855 UART:
28,085,018 UART: [state] CFI Enabled
28,155,365 UART: [fht] FMC Alias Private Key: 7
30,493,586 UART: [art] Extend RT PCRs Done
30,494,810 UART: [art] Lock RT PCRs Done
30,496,467 UART: [art] Populate DV Done
30,501,719 UART: [fht] FMC Alias Private Key: 7
30,503,369 UART: [art] Derive CDI
30,504,197 UART: [art] Store in in slot 0x4
30,565,497 UART: [art] Derive Key Pair
30,566,544 UART: [art] Store priv key in slot 0x5
33,859,792 UART: [art] Derive Key Pair - Done
33,872,580 UART: [art] Signing Cert with AUTHO
33,873,884 UART: RITY.KEYID = 7
36,160,435 UART: [art] Erasing AUTHORITY.KEYID = 7
36,161,949 UART: [art] PUB.X = 798AABEE131262F54B7D3AC345F155AAE443DB922037B201FA114B71F91B1A802C664FD6C53AAA9FBD4F6508ED8E329D
36,169,214 UART: [art] PUB.Y = FB4B859DB26511FBE99121F04E57E799F707A276D4BC9312CB7A0C3725D1F564E542BF033CB354B7C081E91849B0A86B
36,176,452 UART: [art] SIG.R = 123CB28ED9928DC52243619941FA216C06745553636A2D5E540A03CA0A34F99218515F1ECE13FDA0FA3DCDA27981A44A
36,183,819 UART: [art] SIG.S = 420FDCDFA36B1B5DAFD836C96A7ED4D6C6E64AB2318A049329BD107E03904769604A4249E7E6C24FF07CDBCC1E412418
37,489,446 UART: Caliptra RT
37,490,154 UART: [state] CFI Enabled
37,650,393 UART: [rt] RT listening for mailbox commands...
37,653,087 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,808,567 UART: [rt]cmd =0x41544d4e, len=14344
37,810,493 >>> mbox cmd response: failed
37,811,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,966,570 UART: [rt]cmd =0x41544d4e, len=14344
37,968,330 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,805,640 ready_for_fw is high
3,806,236 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,860,621 >>> mbox cmd response: success
27,575,613 UART:
27,575,998 UART: Running Caliptra FMC ...
27,577,199 UART:
27,577,366 UART: [state] CFI Enabled
27,647,173 UART: [fht] FMC Alias Private Key: 7
29,985,058 UART: [art] Extend RT PCRs Done
29,986,282 UART: [art] Lock RT PCRs Done
29,988,128 UART: [art] Populate DV Done
29,993,330 UART: [fht] FMC Alias Private Key: 7
29,994,980 UART: [art] Derive CDI
29,995,800 UART: [art] Store in in slot 0x4
30,056,272 UART: [art] Derive Key Pair
30,057,312 UART: [art] Store priv key in slot 0x5
33,350,814 UART: [art] Derive Key Pair - Done
33,363,552 UART: [art] Signing Cert with AUTHO
33,364,875 UART: RITY.KEYID = 7
35,652,500 UART: [art] Erasing AUTHORITY.KEYID = 7
35,654,016 UART: [art] PUB.X = 66A6D06B4214EEB3BFCA6D28761B5FEDF2555B9F213DBC9F6E79F73EE53F3032DDEEA79D4802C8086A61E6EEF1676FDF
35,661,277 UART: [art] PUB.Y = E19991454AC02D36905127B019390B96C2796D8B154878C1DC1CE712932A8C8A1AC0AAD243A64F661479C05485D354F5
35,668,519 UART: [art] SIG.R = A5AA50DEDBAA5EF6B98F9D0C421622F7B6609CDE93ADB4C624AEDA7376727BF96B8D0DD083A92B3BFC76806941BDC194
35,675,913 UART: [art] SIG.S = FD765FE94CF783E3292B3B258CFF0DE77BA8AE189E957545BDDB5688FCD76B47B05821B01BC64AAD2619C71776FC4448
36,980,873 UART: Caliptra RT
36,981,583 UART: [state] CFI Enabled
37,140,857 UART: [rt] RT listening for mailbox commands...
37,143,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,299,162 UART: [rt]cmd =0x41544d4e, len=14344
37,301,146 >>> mbox cmd response: failed
37,301,860 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,457,280 UART: [rt]cmd =0x41544d4e, len=14344
37,459,092 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,394 UART:
192,753 UART: Running Caliptra ROM ...
193,929 UART:
603,724 UART: [state] CFI Enabled
616,743 UART: [state] LifecycleState = Unprovisioned
618,709 UART: [state] DebugLocked = No
620,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,877 UART: [kat] SHA2-256
795,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,158 UART: [kat] ++
806,690 UART: [kat] sha1
817,839 UART: [kat] SHA2-256
820,493 UART: [kat] SHA2-384
824,985 UART: [kat] SHA2-512-ACC
827,346 UART: [kat] ECC-384
3,110,586 UART: [kat] HMAC-384Kdf
3,122,835 UART: [kat] LMS
4,312,934 UART: [kat] --
4,318,653 UART: [cold-reset] ++
4,320,919 UART: [fht] Storing FHT @ 0x50003400
4,332,970 UART: [idev] ++
4,333,556 UART: [idev] CDI.KEYID = 6
4,334,507 UART: [idev] SUBJECT.KEYID = 7
4,335,742 UART: [idev] UDS.KEYID = 0
4,336,721 ready_for_fw is high
4,336,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,221 UART: [idev] Erasing UDS.KEYID = 0
7,622,041 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,254 UART: [idev] --
7,648,834 UART: [ldev] ++
7,649,398 UART: [ldev] CDI.KEYID = 6
7,650,336 UART: [ldev] SUBJECT.KEYID = 5
7,651,594 UART: [ldev] AUTHORITY.KEYID = 7
7,652,742 UART: [ldev] FE.KEYID = 1
7,664,043 UART: [ldev] Erasing FE.KEYID = 1
10,955,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,878 UART: [ldev] --
13,316,866 UART: [fwproc] Waiting for Commands...
13,318,571 UART: [fwproc] Received command 0x46574c44
13,320,752 UART: [fwproc] Received Image of size 114124 bytes
22,198,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,277,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,346,760 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,663,886 >>> mbox cmd response: success
22,667,774 UART: [afmc] ++
22,668,413 UART: [afmc] CDI.KEYID = 6
22,669,293 UART: [afmc] SUBJECT.KEYID = 7
22,670,555 UART: [afmc] AUTHORITY.KEYID = 5
25,982,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,275,011 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,277,273 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,291,821 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,306,590 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,320,813 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,341,673 UART: [afmc] --
28,345,315 UART: [cold-reset] --
28,349,654 UART: [state] Locking Datavault
28,353,815 UART: [state] Locking PCR0, PCR1 and PCR31
28,355,565 UART: [state] Locking ICCM
28,357,736 UART: [exit] Launching FMC @ 0x40000130
28,366,123 UART:
28,366,360 UART: Running Caliptra FMC ...
28,367,457 UART:
28,367,608 UART: [state] CFI Enabled
28,375,730 UART: [fht] FMC Alias Private Key: 7
30,706,885 UART: [art] Extend RT PCRs Done
30,708,092 UART: [art] Lock RT PCRs Done
30,709,771 UART: [art] Populate DV Done
30,715,125 UART: [fht] FMC Alias Private Key: 7
30,716,714 UART: [art] Derive CDI
30,717,477 UART: [art] Store in in slot 0x4
30,759,844 UART: [art] Derive Key Pair
30,760,875 UART: [art] Store priv key in slot 0x5
34,003,072 UART: [art] Derive Key Pair - Done
34,015,744 UART: [art] Signing Cert with AUTHO
34,017,048 UART: RITY.KEYID = 7
36,296,765 UART: [art] Erasing AUTHORITY.KEYID = 7
36,298,279 UART: [art] PUB.X = 634F50008F1002F1A874F1A8F5A2D92A9641EDF5B904065D0824212D587750335A33825FE710D0504A689B1998755970
36,305,450 UART: [art] PUB.Y = 1B31BEDEA9D142F29C9282CED66630A2FDC00CCD7656E6BF32583BF4B40B25387F195AD4E7D870D5510BDA30C25C77A3
36,312,718 UART: [art] SIG.R = CA72653EF5DA1E33131866E172AC46CF128DC617A586FB3D425E1380FD17F57DFA33F6CF36D0E3A458E63A0835828E7B
36,320,122 UART: [art] SIG.S = CE17E11CAFDE317D822B7B7DA79357040AD3ED0386174646BD6F90426D9061E096B7F10AAC87481721BFFD714B0B1FE6
37,625,064 UART: Caliptra RT
37,625,774 UART: [state] CFI Enabled
37,743,487 UART: [rt] RT listening for mailbox commands...
37,745,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,901,375 UART: [rt]cmd =0x41544d4e, len=14344
37,903,137 >>> mbox cmd response: failed
37,903,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,059,335 UART: [rt]cmd =0x41544d4e, len=14344
38,061,308 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,128,492 ready_for_fw is high
4,128,866 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,115,551 >>> mbox cmd response: success
27,757,700 UART:
27,758,083 UART: Running Caliptra FMC ...
27,759,226 UART:
27,759,380 UART: [state] CFI Enabled
27,767,597 UART: [fht] FMC Alias Private Key: 7
30,098,852 UART: [art] Extend RT PCRs Done
30,100,086 UART: [art] Lock RT PCRs Done
30,101,765 UART: [art] Populate DV Done
30,106,899 UART: [fht] FMC Alias Private Key: 7
30,108,440 UART: [art] Derive CDI
30,109,179 UART: [art] Store in in slot 0x4
30,152,036 UART: [art] Derive Key Pair
30,153,035 UART: [art] Store priv key in slot 0x5
33,395,013 UART: [art] Derive Key Pair - Done
33,407,850 UART: [art] Signing Cert with AUTHO
33,409,163 UART: RITY.KEYID = 7
35,688,250 UART: [art] Erasing AUTHORITY.KEYID = 7
35,689,763 UART: [art] PUB.X = 76EBAB87881071789E57D0239AFEF98F5515A66742E31A529A158990568D007A3C64DC58F4619901D5BCC0D25A90F407
35,696,990 UART: [art] PUB.Y = 3B512D2EA78BEC594AD26A308B83795079EBEFD05642929B61408C9A5A5CDA056D0F267865A729EE3DAF5F21CB342196
35,704,257 UART: [art] SIG.R = 586C210091757E5DDA7D1E9B9D07CCE4644DFB2C8BFFE52B9600B5E20818F14E3C11213DDE4124B9157D16C9952DC749
35,711,617 UART: [art] SIG.S = D560F96E6AF3EFBAA830046CD6617DF6AE8E8998F11EF8E90CA9F0A0DD7D155DE82DD817659246AB460D84CE452C67D7
37,016,841 UART: Caliptra RT
37,017,553 UART: [state] CFI Enabled
37,135,407 UART: [rt] RT listening for mailbox commands...
37,137,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,293,581 UART: [rt]cmd =0x41544d4e, len=14344
37,295,550 >>> mbox cmd response: failed
37,296,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,451,832 UART: [rt]cmd =0x41544d4e, len=14344
37,453,976 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,195 UART:
192,550 UART: Running Caliptra ROM ...
193,744 UART:
193,905 UART: [state] CFI Enabled
267,023 UART: [state] LifecycleState = Unprovisioned
268,876 UART: [state] DebugLocked = No
271,405 UART: [state] WD Timer not started. Device not locked for debugging
274,943 UART: [kat] SHA2-256
454,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,649 UART: [kat] ++
466,181 UART: [kat] sha1
477,420 UART: [kat] SHA2-256
480,431 UART: [kat] SHA2-384
486,491 UART: [kat] SHA2-512-ACC
489,429 UART: [kat] ECC-384
2,948,336 UART: [kat] HMAC-384Kdf
2,971,843 UART: [kat] LMS
3,501,277 UART: [kat] --
3,507,069 UART: [cold-reset] ++
3,509,577 UART: [fht] FHT @ 0x50003400
3,520,481 UART: [idev] ++
3,521,054 UART: [idev] CDI.KEYID = 6
3,521,986 UART: [idev] SUBJECT.KEYID = 7
3,523,160 UART: [idev] UDS.KEYID = 0
3,524,084 ready_for_fw is high
3,524,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,226 UART: [idev] Erasing UDS.KEYID = 0
6,024,581 UART: [idev] Sha1 KeyId Algorithm
6,046,885 UART: [idev] --
6,051,311 UART: [ldev] ++
6,051,881 UART: [ldev] CDI.KEYID = 6
6,052,768 UART: [ldev] SUBJECT.KEYID = 5
6,054,001 UART: [ldev] AUTHORITY.KEYID = 7
6,055,245 UART: [ldev] FE.KEYID = 1
6,099,243 UART: [ldev] Erasing FE.KEYID = 1
8,601,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,772 UART: [ldev] --
10,392,847 UART: [fwproc] Wait for Commands...
10,395,158 UART: [fwproc] Recv command 0x46574c44
10,397,251 UART: [fwproc] Recv'd Img size: 114448 bytes
14,949,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,026,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,094,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,414,013 >>> mbox cmd response: success
15,418,046 UART: [afmc] ++
15,418,646 UART: [afmc] CDI.KEYID = 6
15,419,570 UART: [afmc] SUBJECT.KEYID = 7
15,420,734 UART: [afmc] AUTHORITY.KEYID = 5
17,960,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,252 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,701,171 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,717,138 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,732,952 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,754,844 UART: [afmc] --
19,759,459 UART: [cold-reset] --
19,763,638 UART: [state] Locking Datavault
19,768,880 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,525 UART: [state] Locking ICCM
19,773,249 UART: [exit] Launching FMC @ 0x40000130
19,781,712 UART:
19,781,949 UART: Running Caliptra FMC ...
19,782,972 UART:
19,783,118 UART: [state] CFI Enabled
19,839,521 UART: [fht] FMC Alias Private Key: 7
21,603,505 UART: [art] Extend RT PCRs Done
21,604,738 UART: [art] Lock RT PCRs Done
21,606,204 UART: [art] Populate DV Done
21,611,671 UART: [fht] FMC Alias Private Key: 7
21,613,369 UART: [art] Derive CDI
21,614,182 UART: [art] Store in in slot 0x4
21,672,417 UART: [art] Derive Key Pair
21,673,453 UART: [art] Store priv key in slot 0x5
24,136,055 UART: [art] Derive Key Pair - Done
24,148,898 UART: [art] Signing Cert with AUTHO
24,150,202 UART: RITY.KEYID = 7
25,861,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,309 UART: [art] PUB.X = D4322D9B98DFAFB91AE1EA92C221F4B390B6C73C00306E56DECA7E7C3682BD13623A9BCE21534CFD81020B3577F4B69C
25,870,661 UART: [art] PUB.Y = 5189F0E114F225408FC14F6B66A72F4FCDD6486966B6FF9F05EE5245BF84D96E1F1F8BC72A464F65FF9D8C96ED451102
25,877,907 UART: [art] SIG.R = 2C7A85D89DE8B759B5A7B502C0A4872A85AF3BCE4EEA92C9D0D25A71C7279CD208CB578DC9C7B27CB7828151F933D0A1
25,885,300 UART: [art] SIG.S = 7280C1DC245319230B2B29F8532375F08487A5E0CC202F19AE28FF31A3C55F8EBA2A7F4F28AADED8987BF2E044CC7E78
26,863,591 UART: Caliptra RT
26,864,300 UART: [state] CFI Enabled
27,028,263 UART: [rt] RT listening for mailbox commands...
27,030,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,186,839 UART: [rt]cmd =0x41544d4e, len=14344
27,188,884 >>> mbox cmd response: failed
27,189,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,344,729 UART: [rt]cmd =0x41544d4e, len=14344
27,346,650 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,359,316 ready_for_fw is high
3,359,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,028,257 >>> mbox cmd response: success
19,306,659 UART:
19,307,050 UART: Running Caliptra FMC ...
19,308,154 UART:
19,308,326 UART: [state] CFI Enabled
19,375,947 UART: [fht] FMC Alias Private Key: 7
21,139,870 UART: [art] Extend RT PCRs Done
21,141,091 UART: [art] Lock RT PCRs Done
21,142,887 UART: [art] Populate DV Done
21,148,300 UART: [fht] FMC Alias Private Key: 7
21,150,066 UART: [art] Derive CDI
21,150,926 UART: [art] Store in in slot 0x4
21,208,028 UART: [art] Derive Key Pair
21,209,037 UART: [art] Store priv key in slot 0x5
23,672,179 UART: [art] Derive Key Pair - Done
23,685,450 UART: [art] Signing Cert with AUTHO
23,686,752 UART: RITY.KEYID = 7
25,397,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,398,895 UART: [art] PUB.X = F601A2A943146DF078FFB7F0F52F5EC706F5C4E32500536C2F3BFC439B65357AB3E4F165593264222CAABA9B4D59FED6
25,406,153 UART: [art] PUB.Y = BB83BAB73642625CB2DED6B6E61C9AB8E6BABB351E172630120275B0A40A3E4D77D97C0341590DC5960F971189C8895B
25,413,431 UART: [art] SIG.R = A9AC2A4819A9A7FD15D66A13E24D503426C443D0369724D0D959A6E315E3F2692671FB0EF8CB2688BDA6193087C2333D
25,420,827 UART: [art] SIG.S = 77CA2F43558E9AE265569B4B5645806ED2FEF19A282D1A1B900821038D0E1D49EAE3486EC0F64401C104440D399730AB
26,399,361 UART: Caliptra RT
26,400,053 UART: [state] CFI Enabled
26,564,956 UART: [rt] RT listening for mailbox commands...
26,567,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,723,458 UART: [rt]cmd =0x41544d4e, len=14344
26,725,665 >>> mbox cmd response: failed
26,726,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,881,811 UART: [rt]cmd =0x41544d4e, len=14344
26,883,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,733 writing to cptra_bootfsm_go
203,838 UART:
204,201 UART: Running Caliptra ROM ...
205,400 UART:
614,800 UART: [state] CFI Enabled
630,018 UART: [state] LifecycleState = Unprovisioned
631,900 UART: [state] DebugLocked = No
633,849 UART: [state] WD Timer not started. Device not locked for debugging
636,682 UART: [kat] SHA2-256
815,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
827,384 UART: [kat] ++
827,913 UART: [kat] sha1
838,856 UART: [kat] SHA2-256
841,921 UART: [kat] SHA2-384
847,698 UART: [kat] SHA2-512-ACC
850,626 UART: [kat] ECC-384
3,292,248 UART: [kat] HMAC-384Kdf
3,305,345 UART: [kat] LMS
3,834,790 UART: [kat] --
3,839,847 UART: [cold-reset] ++
3,841,924 UART: [fht] FHT @ 0x50003400
3,851,957 UART: [idev] ++
3,852,525 UART: [idev] CDI.KEYID = 6
3,853,401 UART: [idev] SUBJECT.KEYID = 7
3,854,657 UART: [idev] UDS.KEYID = 0
3,855,551 ready_for_fw is high
3,855,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,390 UART: [idev] Erasing UDS.KEYID = 0
6,329,029 UART: [idev] Sha1 KeyId Algorithm
6,352,478 UART: [idev] --
6,356,731 UART: [ldev] ++
6,357,295 UART: [ldev] CDI.KEYID = 6
6,358,166 UART: [ldev] SUBJECT.KEYID = 5
6,359,369 UART: [ldev] AUTHORITY.KEYID = 7
6,360,650 UART: [ldev] FE.KEYID = 1
6,371,855 UART: [ldev] Erasing FE.KEYID = 1
8,844,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,938 UART: [ldev] --
10,636,439 UART: [fwproc] Wait for Commands...
10,638,581 UART: [fwproc] Recv command 0x46574c44
10,640,667 UART: [fwproc] Recv'd Img size: 114448 bytes
15,186,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,258,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,326,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,645,717 >>> mbox cmd response: success
15,650,472 UART: [afmc] ++
15,651,069 UART: [afmc] CDI.KEYID = 6
15,651,983 UART: [afmc] SUBJECT.KEYID = 7
15,653,130 UART: [afmc] AUTHORITY.KEYID = 5
18,148,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,866,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,868,528 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,884,505 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,900,462 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,916,222 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,937,713 UART: [afmc] --
19,941,970 UART: [cold-reset] --
19,945,883 UART: [state] Locking Datavault
19,951,186 UART: [state] Locking PCR0, PCR1 and PCR31
19,952,827 UART: [state] Locking ICCM
19,955,561 UART: [exit] Launching FMC @ 0x40000130
19,964,005 UART:
19,964,238 UART: Running Caliptra FMC ...
19,965,333 UART:
19,965,485 UART: [state] CFI Enabled
19,973,525 UART: [fht] FMC Alias Private Key: 7
21,730,836 UART: [art] Extend RT PCRs Done
21,732,046 UART: [art] Lock RT PCRs Done
21,733,672 UART: [art] Populate DV Done
21,739,028 UART: [fht] FMC Alias Private Key: 7
21,740,726 UART: [art] Derive CDI
21,741,455 UART: [art] Store in in slot 0x4
21,783,896 UART: [art] Derive Key Pair
21,784,934 UART: [art] Store priv key in slot 0x5
24,211,313 UART: [art] Derive Key Pair - Done
24,224,207 UART: [art] Signing Cert with AUTHO
24,225,515 UART: RITY.KEYID = 7
25,931,014 UART: [art] Erasing AUTHORITY.KEYID = 7
25,932,522 UART: [art] PUB.X = AD4D3FE73A41428D1F3D9896E374C267CBBBBC6D906DC4F8BDF1BF6BF9A2E79D744126DA353C228F82247CB359CA1559
25,939,803 UART: [art] PUB.Y = 3C54C50E61B8713204C884781F943F161CE469BA011E2E48FB12EB837F003E0C84560C8C0E4AD006136C1CA5BC560505
25,947,020 UART: [art] SIG.R = C59CF85AEAC1A23EC44E389F83834E77D8CEDAD7517A15C40F88DB915A2A20BBF6716EA37D34D4117439996587DAF7AA
25,954,395 UART: [art] SIG.S = 7A7ABCA30A2E70972201E0B1AD5EB739A306141BE3E313D9981BF28327D75919AFF9502E0B74FD22CA3301A91370F4DF
26,933,113 UART: Caliptra RT
26,933,793 UART: [state] CFI Enabled
27,051,094 UART: [rt] RT listening for mailbox commands...
27,053,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,208 UART: [rt]cmd =0x41544d4e, len=14344
27,211,079 >>> mbox cmd response: failed
27,211,894 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,367,223 UART: [rt]cmd =0x41544d4e, len=14344
27,369,144 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,699,179 ready_for_fw is high
3,699,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,257,670 >>> mbox cmd response: success
19,499,602 UART:
19,499,984 UART: Running Caliptra FMC ...
19,501,075 UART:
19,501,222 UART: [state] CFI Enabled
19,509,233 UART: [fht] FMC Alias Private Key: 7
21,265,833 UART: [art] Extend RT PCRs Done
21,267,057 UART: [art] Lock RT PCRs Done
21,268,727 UART: [art] Populate DV Done
21,274,008 UART: [fht] FMC Alias Private Key: 7
21,275,556 UART: [art] Derive CDI
21,276,288 UART: [art] Store in in slot 0x4
21,318,983 UART: [art] Derive Key Pair
21,319,978 UART: [art] Store priv key in slot 0x5
23,746,930 UART: [art] Derive Key Pair - Done
23,759,781 UART: [art] Signing Cert with AUTHO
23,761,089 UART: RITY.KEYID = 7
25,466,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,467,729 UART: [art] PUB.X = C95700F43AC88E89710F2B8567CA5B6BA29655CA85C11E4775E54BA899DEE07D14392C61418E3AB0DD1AD51034C42F4C
25,474,986 UART: [art] PUB.Y = 20B0F4E1719200CE9446BB1F26ED32FEC1371E601AF77E383353A11A787F1164EDE0CBC9E3FCA1DA5200AC5823A9EE73
25,482,224 UART: [art] SIG.R = 70F3DEF93270A800853A19DDD78B96AE09B6D3B46869BC4DE6CE4C8A376916CC6863B73779D8205CAFAB4E404678BEA2
25,489,597 UART: [art] SIG.S = A2E9E7261EF8AFD41C0D2D4057D5CBC4348F484EB0C7A3F1A07A74F17267C8F7BB9CE437E218E1023B0CE4AB5F3BFC4D
26,468,551 UART: Caliptra RT
26,469,276 UART: [state] CFI Enabled
26,585,685 UART: [rt] RT listening for mailbox commands...
26,588,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,743,737 UART: [rt]cmd =0x41544d4e, len=14344
26,745,933 >>> mbox cmd response: failed
26,746,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,901,889 UART: [rt]cmd =0x41544d4e, len=14344
26,903,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,158 UART:
192,546 UART: Running Caliptra ROM ...
193,657 UART:
193,799 UART: [state] CFI Enabled
265,830 UART: [state] LifecycleState = Unprovisioned
268,173 UART: [state] DebugLocked = No
271,111 UART: [state] WD Timer not started. Device not locked for debugging
275,703 UART: [kat] SHA2-256
465,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,342 UART: [kat] ++
476,822 UART: [kat] sha1
488,759 UART: [kat] SHA2-256
491,768 UART: [kat] SHA2-384
497,752 UART: [kat] SHA2-512-ACC
500,368 UART: [kat] ECC-384
2,945,651 UART: [kat] HMAC-384Kdf
2,974,432 UART: [kat] LMS
3,506,189 UART: [kat] --
3,511,765 UART: [cold-reset] ++
3,513,694 UART: [fht] FHT @ 0x50003400
3,523,534 UART: [idev] ++
3,524,236 UART: [idev] CDI.KEYID = 6
3,525,143 UART: [idev] SUBJECT.KEYID = 7
3,526,383 UART: [idev] UDS.KEYID = 0
3,527,566 ready_for_fw is high
3,527,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,696 UART: [idev] Erasing UDS.KEYID = 0
6,031,770 UART: [idev] Sha1 KeyId Algorithm
6,054,680 UART: [idev] --
6,058,895 UART: [ldev] ++
6,059,580 UART: [ldev] CDI.KEYID = 6
6,060,493 UART: [ldev] SUBJECT.KEYID = 5
6,061,652 UART: [ldev] AUTHORITY.KEYID = 7
6,062,901 UART: [ldev] FE.KEYID = 1
6,103,100 UART: [ldev] Erasing FE.KEYID = 1
8,609,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,304 UART: [ldev] --
10,414,191 UART: [fwproc] Wait for Commands...
10,417,091 UART: [fwproc] Recv command 0x46574c44
10,419,557 UART: [fwproc] Recv'd Img size: 114448 bytes
15,037,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,120,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,236,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,780,215 >>> mbox cmd response: success
15,783,992 UART: [afmc] ++
15,784,717 UART: [afmc] CDI.KEYID = 6
15,785,826 UART: [afmc] SUBJECT.KEYID = 7
15,787,365 UART: [afmc] AUTHORITY.KEYID = 5
18,322,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,046,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,048,652 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,063,722 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,078,933 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,093,759 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,117,539 UART: [afmc] --
20,120,550 UART: [cold-reset] --
20,125,061 UART: [state] Locking Datavault
20,130,472 UART: [state] Locking PCR0, PCR1 and PCR31
20,132,661 UART: [state] Locking ICCM
20,134,674 UART: [exit] Launching FMC @ 0x40000130
20,143,341 UART:
20,143,596 UART: Running Caliptra FMC ...
20,144,624 UART:
20,144,771 UART: [state] CFI Enabled
20,202,818 UART: [fht] FMC Alias Private Key: 7
21,965,885 UART: [art] Extend RT PCRs Done
21,967,097 UART: [art] Lock RT PCRs Done
21,968,532 UART: [art] Populate DV Done
21,974,047 UART: [fht] FMC Alias Private Key: 7
21,975,528 UART: [art] Derive CDI
21,976,287 UART: [art] Store in in slot 0x4
22,035,754 UART: [art] Derive Key Pair
22,036,792 UART: [art] Store priv key in slot 0x5
24,499,939 UART: [art] Derive Key Pair - Done
24,512,715 UART: [art] Signing Cert with AUTHO
24,514,010 UART: RITY.KEYID = 7
26,225,612 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,129 UART: [art] PUB.X = B22C78B2F8CC8D1FDB34ECA6F9CCD06A06EF659174B40B5C763A1A902294CE0EBE30D7BAA4FB92233393EB1A262B20E4
26,234,368 UART: [art] PUB.Y = 623CC059D8D69B6F473E7A058278342C4E131DCB35B22F0F93B339F0C98BCD4E626DD006C68ED8D61A7A8105333B4A95
26,241,658 UART: [art] SIG.R = CD6E54157A64D932BB1654F042E1A2956AD5B39AD046A2911B0730E5303201C44C006F98514B4E476762BC508022D3E4
26,248,991 UART: [art] SIG.S = 2352BBE7290A3B2A3756E126C0A870383615969371A3005FE373732C15F357251CBDF9EF703D285BFA624F8014A79936
27,228,045 UART: Caliptra RT
27,228,758 UART: [state] CFI Enabled
27,392,860 UART: [rt] RT listening for mailbox commands...
27,395,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,026 UART: [rt]cmd =0x41544d4e, len=14344
27,552,800 >>> mbox cmd response: failed
27,553,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,708,833 UART: [rt]cmd =0x41544d4e, len=14344
27,710,746 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,436,115 ready_for_fw is high
3,436,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,879,835 >>> mbox cmd response: success
20,153,426 UART:
20,153,813 UART: Running Caliptra FMC ...
20,154,917 UART:
20,155,080 UART: [state] CFI Enabled
20,226,346 UART: [fht] FMC Alias Private Key: 7
21,989,480 UART: [art] Extend RT PCRs Done
21,990,709 UART: [art] Lock RT PCRs Done
21,992,174 UART: [art] Populate DV Done
21,997,753 UART: [fht] FMC Alias Private Key: 7
21,999,347 UART: [art] Derive CDI
22,000,164 UART: [art] Store in in slot 0x4
22,057,769 UART: [art] Derive Key Pair
22,058,771 UART: [art] Store priv key in slot 0x5
24,521,389 UART: [art] Derive Key Pair - Done
24,534,438 UART: [art] Signing Cert with AUTHO
24,535,744 UART: RITY.KEYID = 7
26,247,086 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,595 UART: [art] PUB.X = 85924FBBB5653248B65EC74A1AFB8C1BCE1A3876F81634FB98CCAD59BA6201E25B7838B19819F655EA45001BB16DFC51
26,255,845 UART: [art] PUB.Y = 92997CEB0A9D97A99E10D964B245BC89E2632CA5E97F5E933DC024B87009BE9943499509C796433EEB67FE64001D530C
26,263,091 UART: [art] SIG.R = 9A45A595DC7BA8FD193299BF2FE0A2D75D5C23AA4BDBD5439E44F6C4C7A0AE06BF5052C56B9D5C41F14DD96D4763F3D1
26,270,489 UART: [art] SIG.S = EC1A9A11F8C1FF6891E140333247F86F173EBE3C679C5F7690D9EEB64D1F225A48F2CEAE615B80986847F7802C4416E4
27,250,004 UART: Caliptra RT
27,250,703 UART: [state] CFI Enabled
27,415,189 UART: [rt] RT listening for mailbox commands...
27,417,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,573,927 UART: [rt]cmd =0x41544d4e, len=14344
27,575,689 >>> mbox cmd response: failed
27,576,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,731,803 UART: [rt]cmd =0x41544d4e, len=14344
27,733,564 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,676 writing to cptra_bootfsm_go
194,003 UART:
194,367 UART: Running Caliptra ROM ...
195,456 UART:
605,170 UART: [state] CFI Enabled
619,744 UART: [state] LifecycleState = Unprovisioned
622,107 UART: [state] DebugLocked = No
623,912 UART: [state] WD Timer not started. Device not locked for debugging
627,939 UART: [kat] SHA2-256
817,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,590 UART: [kat] ++
829,189 UART: [kat] sha1
839,497 UART: [kat] SHA2-256
842,519 UART: [kat] SHA2-384
848,930 UART: [kat] SHA2-512-ACC
851,574 UART: [kat] ECC-384
3,294,563 UART: [kat] HMAC-384Kdf
3,307,217 UART: [kat] LMS
3,839,012 UART: [kat] --
3,844,535 UART: [cold-reset] ++
3,846,355 UART: [fht] FHT @ 0x50003400
3,858,325 UART: [idev] ++
3,859,023 UART: [idev] CDI.KEYID = 6
3,859,902 UART: [idev] SUBJECT.KEYID = 7
3,861,134 UART: [idev] UDS.KEYID = 0
3,862,026 ready_for_fw is high
3,862,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,955 UART: [idev] Erasing UDS.KEYID = 0
6,339,829 UART: [idev] Sha1 KeyId Algorithm
6,362,364 UART: [idev] --
6,367,491 UART: [ldev] ++
6,368,225 UART: [ldev] CDI.KEYID = 6
6,369,116 UART: [ldev] SUBJECT.KEYID = 5
6,370,223 UART: [ldev] AUTHORITY.KEYID = 7
6,371,501 UART: [ldev] FE.KEYID = 1
6,381,792 UART: [ldev] Erasing FE.KEYID = 1
8,864,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,432 UART: [ldev] --
10,654,612 UART: [fwproc] Wait for Commands...
10,657,508 UART: [fwproc] Recv command 0x46574c44
10,659,808 UART: [fwproc] Recv'd Img size: 114448 bytes
15,307,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,388,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,504,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,048,369 >>> mbox cmd response: success
16,053,301 UART: [afmc] ++
16,054,004 UART: [afmc] CDI.KEYID = 6
16,055,113 UART: [afmc] SUBJECT.KEYID = 7
16,056,652 UART: [afmc] AUTHORITY.KEYID = 5
18,557,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,282,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,284,420 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,299,470 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,314,670 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,329,586 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,354,927 UART: [afmc] --
20,358,362 UART: [cold-reset] --
20,362,843 UART: [state] Locking Datavault
20,367,340 UART: [state] Locking PCR0, PCR1 and PCR31
20,369,481 UART: [state] Locking ICCM
20,371,114 UART: [exit] Launching FMC @ 0x40000130
20,379,781 UART:
20,380,005 UART: Running Caliptra FMC ...
20,381,027 UART:
20,381,167 UART: [state] CFI Enabled
20,389,587 UART: [fht] FMC Alias Private Key: 7
22,147,055 UART: [art] Extend RT PCRs Done
22,148,255 UART: [art] Lock RT PCRs Done
22,150,274 UART: [art] Populate DV Done
22,155,673 UART: [fht] FMC Alias Private Key: 7
22,157,311 UART: [art] Derive CDI
22,158,114 UART: [art] Store in in slot 0x4
22,200,625 UART: [art] Derive Key Pair
22,201,675 UART: [art] Store priv key in slot 0x5
24,627,723 UART: [art] Derive Key Pair - Done
24,640,497 UART: [art] Signing Cert with AUTHO
24,641,800 UART: RITY.KEYID = 7
26,346,992 UART: [art] Erasing AUTHORITY.KEYID = 7
26,348,475 UART: [art] PUB.X = EE614A488D345158769CD0318408E5F7337CC5678FC6F2895CF79816F54D565CAA32C12FFE2ECBCAFC95A4DCA9D13BFC
26,355,758 UART: [art] PUB.Y = 6D129EDD2048BE4405B864CE34BF097C4FD4ACF4E910B3E554BCA659504FDFA501887EFD1DFDD504A4B771433FE6546E
26,363,074 UART: [art] SIG.R = D125243103D019B918D062A4C6F570453FBE91A5FB24A4FD100F37CCB4DC15E4AC5FE3385C27555137ED4C2CF187AD30
26,370,456 UART: [art] SIG.S = 0DB0D8AC80FD421B13F2953C874C1D7CB83236DC41B4FC5575A139B527CC84732EA1C53635357E67AF84678FFF38C986
27,349,696 UART: Caliptra RT
27,350,404 UART: [state] CFI Enabled
27,467,087 UART: [rt] RT listening for mailbox commands...
27,469,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,625,278 UART: [rt]cmd =0x41544d4e, len=14344
27,627,078 >>> mbox cmd response: failed
27,627,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,782,803 UART: [rt]cmd =0x41544d4e, len=14344
27,784,555 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,759,158 ready_for_fw is high
3,759,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,045,129 >>> mbox cmd response: success
20,298,337 UART:
20,298,731 UART: Running Caliptra FMC ...
20,299,919 UART:
20,300,104 UART: [state] CFI Enabled
20,308,107 UART: [fht] FMC Alias Private Key: 7
22,064,550 UART: [art] Extend RT PCRs Done
22,065,775 UART: [art] Lock RT PCRs Done
22,067,296 UART: [art] Populate DV Done
22,072,597 UART: [fht] FMC Alias Private Key: 7
22,074,298 UART: [art] Derive CDI
22,075,106 UART: [art] Store in in slot 0x4
22,117,422 UART: [art] Derive Key Pair
22,118,412 UART: [art] Store priv key in slot 0x5
24,545,400 UART: [art] Derive Key Pair - Done
24,558,231 UART: [art] Signing Cert with AUTHO
24,559,532 UART: RITY.KEYID = 7
26,264,783 UART: [art] Erasing AUTHORITY.KEYID = 7
26,266,285 UART: [art] PUB.X = 1F83B2104750BD27B43480B337FE77BABFF828C9BA4DEFC9A2A51E5D32109FAFCB7FE5F2C0C1760A6287E8C7361B76BF
26,273,572 UART: [art] PUB.Y = D4A835A872C6A4E718FB15DD3F80ED8005C02A0104EF54407EE9EF6CC231E6170752B78A3D9D2FE4676E6908FE389B25
26,280,917 UART: [art] SIG.R = 6E27A3794F6C3D9D72A54C6788B7BDF3CC1793900B235134FEB23D2087F2FAF8E11F4662FFA1E1B69BB6E3C10E8A42E3
26,288,292 UART: [art] SIG.S = 928ACFA8A1F31962E59493AEE9B8666C2B90EACFC9DC465FD47EC564634B7109B6116B3345A7BBD792094707F1952372
27,266,804 UART: Caliptra RT
27,267,510 UART: [state] CFI Enabled
27,384,571 UART: [rt] RT listening for mailbox commands...
27,387,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,542,984 UART: [rt]cmd =0x41544d4e, len=14344
27,544,745 >>> mbox cmd response: failed
27,545,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,701,047 UART: [rt]cmd =0x41544d4e, len=14344
27,702,859 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,681 UART: [kat] SHA2-256
892,619 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,340 UART: [kat] LMS
1,475,536 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,480 UART: [idev] ++
1,479,648 UART: [idev] CDI.KEYID = 6
1,480,008 UART: [idev] SUBJECT.KEYID = 7
1,480,432 UART: [idev] UDS.KEYID = 0
1,480,777 ready_for_fw is high
1,480,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,501 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,901 UART: [fwproc] Waiting for Commands...
1,586,698 UART: [fwproc] Received command 0x46574c44
1,587,489 UART: [fwproc] Received Image of size 114448 bytes
5,198,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,390,940 >>> mbox cmd response: success
5,391,970 UART: [afmc] ++
5,392,138 UART: [afmc] CDI.KEYID = 6
5,392,500 UART: [afmc] SUBJECT.KEYID = 7
5,392,925 UART: [afmc] AUTHORITY.KEYID = 5
5,428,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,444,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,445,105 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,814 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,456,706 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,407 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,470,253 UART: [afmc] --
5,471,385 UART: [cold-reset] --
5,472,235 UART: [state] Locking Datavault
5,473,384 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,988 UART: [state] Locking ICCM
5,474,534 UART: [exit] Launching FMC @ 0x40000130
5,479,863 UART:
5,479,879 UART: Running Caliptra FMC ...
5,480,287 UART:
5,480,341 UART: [state] CFI Enabled
5,490,561 UART: [fht] FMC Alias Private Key: 7
5,598,503 UART: [art] Extend RT PCRs Done
5,598,931 UART: [art] Lock RT PCRs Done
5,600,517 UART: [art] Populate DV Done
5,608,709 UART: [fht] FMC Alias Private Key: 7
5,609,863 UART: [art] Derive CDI
5,610,143 UART: [art] Store in in slot 0x4
5,695,946 UART: [art] Derive Key Pair
5,696,306 UART: [art] Store priv key in slot 0x5
5,709,338 UART: [art] Derive Key Pair - Done
5,723,951 UART: [art] Signing Cert with AUTHO
5,724,431 UART: RITY.KEYID = 7
5,739,355 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,120 UART: [art] PUB.X = 706C6A97EC250252ACD16B082D21FFF77F6767C3AD09CD1EA39AD48218DD1F0D9F96602EEB36CFC38DEB357593BFF960
5,746,894 UART: [art] PUB.Y = D2F2D73BFCCA5ADC6B8E8B601244A1A754297EF34ECF1091221769ED55CC4D1847133C005994402D3466D6FDA679C6E9
5,753,828 UART: [art] SIG.R = 9268BE466EB6F6D5DF9FF06F0B0E9E0CBFFA1CAFCE48336D7A50BC29BD997EFBD5DD07163A8BB97D418B958DF35FBA76
5,760,616 UART: [art] SIG.S = 401A441A0C46DF03CAB51CE058EFD717A22100A50C9E3646973792F961B86BCA71BF855D0D8F15581E2AB7B5D93D677E
5,784,251 UART: Caliptra RT
5,784,504 UART: [state] CFI Enabled
5,892,735 UART: [rt] RT listening for mailbox commands...
5,893,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,201 UART: [rt]cmd =0x41544d4e, len=14344
6,017,909 >>> mbox cmd response: failed
6,017,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,140,557 UART: [rt]cmd =0x41544d4e, len=14344
6,141,847 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,955 ready_for_fw is high
1,362,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,167,276 >>> mbox cmd response: success
5,228,897 UART:
5,228,913 UART: Running Caliptra FMC ...
5,229,321 UART:
5,229,375 UART: [state] CFI Enabled
5,239,645 UART: [fht] FMC Alias Private Key: 7
5,347,871 UART: [art] Extend RT PCRs Done
5,348,299 UART: [art] Lock RT PCRs Done
5,349,785 UART: [art] Populate DV Done
5,357,967 UART: [fht] FMC Alias Private Key: 7
5,359,085 UART: [art] Derive CDI
5,359,365 UART: [art] Store in in slot 0x4
5,444,876 UART: [art] Derive Key Pair
5,445,236 UART: [art] Store priv key in slot 0x5
5,458,750 UART: [art] Derive Key Pair - Done
5,473,888 UART: [art] Signing Cert with AUTHO
5,474,368 UART: RITY.KEYID = 7
5,489,300 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,065 UART: [art] PUB.X = D29FAA216E0EC32ED613AD78CD7882FC4495317C8E17FD90CC64BF77B4AC91BA9E206D917AF3446D53A58057089C941C
5,496,839 UART: [art] PUB.Y = 05A37D4964929712E45D73AD9C1418268CACCECC28DB6B4332A3E0A6C97C951ED2BE742AA67F9F66B80E1C7B6B52C106
5,503,790 UART: [art] SIG.R = 753A039782B1AC0DF5C6C39CB04B0DE204946BCC3FD2DAD8D9DA54B2B5C9135AE0F20E2C60628A8802C4C9FDE0ED2CFA
5,510,566 UART: [art] SIG.S = 674AAD46D3C4D59C2DEAA8B1485901A30802FF64D7F21A0BDAC9C8010C895546A43C9BA551AEA80DF586565037C6974C
5,534,552 UART: Caliptra RT
5,534,805 UART: [state] CFI Enabled
5,643,551 UART: [rt] RT listening for mailbox commands...
5,644,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,766,981 UART: [rt]cmd =0x41544d4e, len=14344
5,768,627 >>> mbox cmd response: failed
5,768,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,073 UART: [rt]cmd =0x41544d4e, len=14344
5,892,559 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,582 UART: [kat] SHA2-256
892,520 UART: [kat] SHA2-384
895,355 UART: [kat] SHA2-512-ACC
897,256 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,507 UART: [kat] LMS
1,475,703 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,523 UART: [idev] ++
1,479,691 UART: [idev] CDI.KEYID = 6
1,480,051 UART: [idev] SUBJECT.KEYID = 7
1,480,475 UART: [idev] UDS.KEYID = 0
1,480,820 ready_for_fw is high
1,480,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,506,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,847 UART: [idev] --
1,515,702 UART: [ldev] ++
1,515,870 UART: [ldev] CDI.KEYID = 6
1,516,233 UART: [ldev] SUBJECT.KEYID = 5
1,516,659 UART: [ldev] AUTHORITY.KEYID = 7
1,517,122 UART: [ldev] FE.KEYID = 1
1,522,370 UART: [ldev] Erasing FE.KEYID = 1
1,547,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,423 UART: [ldev] --
1,586,684 UART: [fwproc] Waiting for Commands...
1,587,303 UART: [fwproc] Received command 0x46574c44
1,588,094 UART: [fwproc] Received Image of size 114448 bytes
5,160,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,189,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,218,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,354,730 >>> mbox cmd response: success
5,355,940 UART: [afmc] ++
5,356,108 UART: [afmc] CDI.KEYID = 6
5,356,470 UART: [afmc] SUBJECT.KEYID = 7
5,356,895 UART: [afmc] AUTHORITY.KEYID = 5
5,391,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,407,597 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,408,377 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,414,086 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,419,978 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,425,679 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,433,653 UART: [afmc] --
5,434,681 UART: [cold-reset] --
5,435,585 UART: [state] Locking Datavault
5,437,058 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,662 UART: [state] Locking ICCM
5,438,174 UART: [exit] Launching FMC @ 0x40000130
5,443,503 UART:
5,443,519 UART: Running Caliptra FMC ...
5,443,927 UART:
5,444,070 UART: [state] CFI Enabled
5,454,544 UART: [fht] FMC Alias Private Key: 7
5,562,688 UART: [art] Extend RT PCRs Done
5,563,116 UART: [art] Lock RT PCRs Done
5,564,596 UART: [art] Populate DV Done
5,572,906 UART: [fht] FMC Alias Private Key: 7
5,574,042 UART: [art] Derive CDI
5,574,322 UART: [art] Store in in slot 0x4
5,659,969 UART: [art] Derive Key Pair
5,660,329 UART: [art] Store priv key in slot 0x5
5,673,799 UART: [art] Derive Key Pair - Done
5,688,442 UART: [art] Signing Cert with AUTHO
5,688,922 UART: RITY.KEYID = 7
5,704,430 UART: [art] Erasing AUTHORITY.KEYID = 7
5,705,195 UART: [art] PUB.X = 755A84C09ECE91927E3AD03D7B9FB79760F4F0C5E666C3155783FEDC67BE41E16436276E9230172EDBA8286F85AD33E0
5,711,969 UART: [art] PUB.Y = 0A2B32D11F8E6860A5F46491354CEAE21631BC4E9B2962382BAADCB76011438C11E26F0378CA6176FC74114AAF4AD8CD
5,718,921 UART: [art] SIG.R = 783C68FB017C9F7F0FFBE4504B9F858B97D20CF2BFB4E1D0ADDD66ED604401FE70016C1AF20F3691D68C571FB16DCB79
5,725,691 UART: [art] SIG.S = E73415146F4FCCE2C55A81B6D0BC3BA4A281B6372335F71779BE26A764328ACA79FB967AAA6AC42ABB09A74E7D9CC0E7
5,748,717 UART: Caliptra RT
5,749,062 UART: [state] CFI Enabled
5,857,255 UART: [rt] RT listening for mailbox commands...
5,857,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,869 UART: [rt]cmd =0x41544d4e, len=14344
5,982,241 >>> mbox cmd response: failed
5,982,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,104,849 UART: [rt]cmd =0x41544d4e, len=14344
6,106,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,028 ready_for_fw is high
1,362,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,204,184 >>> mbox cmd response: success
5,266,571 UART:
5,266,587 UART: Running Caliptra FMC ...
5,266,995 UART:
5,267,138 UART: [state] CFI Enabled
5,277,536 UART: [fht] FMC Alias Private Key: 7
5,385,660 UART: [art] Extend RT PCRs Done
5,386,088 UART: [art] Lock RT PCRs Done
5,387,780 UART: [art] Populate DV Done
5,395,972 UART: [fht] FMC Alias Private Key: 7
5,397,062 UART: [art] Derive CDI
5,397,342 UART: [art] Store in in slot 0x4
5,483,473 UART: [art] Derive Key Pair
5,483,833 UART: [art] Store priv key in slot 0x5
5,496,581 UART: [art] Derive Key Pair - Done
5,511,073 UART: [art] Signing Cert with AUTHO
5,511,553 UART: RITY.KEYID = 7
5,526,871 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,636 UART: [art] PUB.X = B8C580BDB41543A29B531C40DF03E19157926828DDAE2E9506311AE91DD0AF12CC142659ADD06373EB8EC5248D762C56
5,534,404 UART: [art] PUB.Y = CF4235050059B5024F8C104A058D80A6BEF12D685C584E13FCE8002829747E56013295DCF211F9656B45344B826C7402
5,541,283 UART: [art] SIG.R = B7A36ED1F0FDDF7B4F99BF2D000B3EFC72F7AE4BD5FF8211030710F24DFF57813EC33E8F6546C9882F4531E8D891ADA8
5,548,040 UART: [art] SIG.S = 0115395A5E51E49EE0D434EFC62D8F3EC6AD5A3A8C9BF4955696C34017408CC349642FD86E8700D2E4AE2C5CD02900A7
5,571,130 UART: Caliptra RT
5,571,475 UART: [state] CFI Enabled
5,680,254 UART: [rt] RT listening for mailbox commands...
5,680,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,803,878 UART: [rt]cmd =0x41544d4e, len=14344
5,805,416 >>> mbox cmd response: failed
5,805,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,927,868 UART: [rt]cmd =0x41544d4e, len=14344
5,929,306 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,463 UART: [kat] SHA2-256
903,403 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,538 UART: [kat] HMAC-384Kdf
922,034 UART: [kat] LMS
1,170,362 UART: [kat] --
1,171,291 UART: [cold-reset] ++
1,171,721 UART: [fht] FHT @ 0x50003400
1,174,256 UART: [idev] ++
1,174,424 UART: [idev] CDI.KEYID = 6
1,174,784 UART: [idev] SUBJECT.KEYID = 7
1,175,208 UART: [idev] UDS.KEYID = 0
1,175,553 ready_for_fw is high
1,175,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,281 UART: [idev] Sha1 KeyId Algorithm
1,208,825 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 114448 bytes
3,135,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,274 >>> mbox cmd response: success
3,328,298 UART: [afmc] ++
3,328,466 UART: [afmc] CDI.KEYID = 6
3,328,828 UART: [afmc] SUBJECT.KEYID = 7
3,329,253 UART: [afmc] AUTHORITY.KEYID = 5
3,365,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,474 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,183 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,075 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,786 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,587 UART: [afmc] --
3,408,647 UART: [cold-reset] --
3,409,465 UART: [state] Locking Datavault
3,410,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,208 UART: [state] Locking ICCM
3,411,758 UART: [exit] Launching FMC @ 0x40000130
3,417,087 UART:
3,417,103 UART: Running Caliptra FMC ...
3,417,511 UART:
3,417,565 UART: [state] CFI Enabled
3,427,903 UART: [fht] FMC Alias Private Key: 7
3,536,069 UART: [art] Extend RT PCRs Done
3,536,497 UART: [art] Lock RT PCRs Done
3,537,785 UART: [art] Populate DV Done
3,546,005 UART: [fht] FMC Alias Private Key: 7
3,547,161 UART: [art] Derive CDI
3,547,441 UART: [art] Store in in slot 0x4
3,633,160 UART: [art] Derive Key Pair
3,633,520 UART: [art] Store priv key in slot 0x5
3,647,428 UART: [art] Derive Key Pair - Done
3,662,124 UART: [art] Signing Cert with AUTHO
3,662,604 UART: RITY.KEYID = 7
3,677,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,035 UART: [art] PUB.X = 80A324A18B49E0EB769346E2582A0C8FE15EEE5624304D87C7D143C011B99723DE881E8F0A0793735F943E0880D5FAD3
3,684,791 UART: [art] PUB.Y = 3D9E273A2A728F6218C519C86C40339C204AB9BFF6FA40274569C46A258A396541C3BF6164D59D2D68796FDC0F061567
3,691,731 UART: [art] SIG.R = 83FBA269EFA019EAF38265ED73CBE799D0E456AEBC4CE3AE598BE5B6EE1485DAD312837650DC34BF5D438BD5AB35182B
3,698,523 UART: [art] SIG.S = FE54CDE349112C68088CD49CA00A0C10D766D8FB490098075835B737CCAC2D76B2092F3509637653943162BE4FA4FBA2
3,722,396 UART: Caliptra RT
3,722,649 UART: [state] CFI Enabled
3,829,616 UART: [rt] RT listening for mailbox commands...
3,830,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,542 UART: [rt]cmd =0x41544d4e, len=14344
3,955,028 >>> mbox cmd response: failed
3,955,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,490 UART: [rt]cmd =0x41544d4e, len=14344
4,078,938 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,304 >>> mbox cmd response: success
3,224,507 UART:
3,224,523 UART: Running Caliptra FMC ...
3,224,931 UART:
3,224,985 UART: [state] CFI Enabled
3,235,319 UART: [fht] FMC Alias Private Key: 7
3,343,649 UART: [art] Extend RT PCRs Done
3,344,077 UART: [art] Lock RT PCRs Done
3,345,371 UART: [art] Populate DV Done
3,353,737 UART: [fht] FMC Alias Private Key: 7
3,354,783 UART: [art] Derive CDI
3,355,063 UART: [art] Store in in slot 0x4
3,440,390 UART: [art] Derive Key Pair
3,440,750 UART: [art] Store priv key in slot 0x5
3,453,604 UART: [art] Derive Key Pair - Done
3,468,246 UART: [art] Signing Cert with AUTHO
3,468,726 UART: RITY.KEYID = 7
3,484,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,913 UART: [art] PUB.X = B9F8E00C44CF35524F9275673224B4B088445E0AFE769E9D8B8D12244E74A4DA608B8AD3368C34A0C7E733EBD085566C
3,491,679 UART: [art] PUB.Y = 1578F5D67D44DFBCB7AA620A7A3C30F0F893C9BA8E6438F431A5CB07838CD15F68B92C4C3EB04039CC65D4BEAD5A045A
3,498,638 UART: [art] SIG.R = C95273DD869279DB67DFA05AB1EFD03579EC461B67C78A9B8F33E64539818092A68ADC8CA993F4B8E1B6F61DE5D573FA
3,505,420 UART: [art] SIG.S = F932032D6431806AD8EA6E7DFBECA7EA59D8D81B82DBD801DD51621FA143CBD250EEF84C60E04BC148718B357DA7A09A
3,529,081 UART: Caliptra RT
3,529,334 UART: [state] CFI Enabled
3,637,341 UART: [rt] RT listening for mailbox commands...
3,638,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,999 UART: [rt]cmd =0x41544d4e, len=14344
3,762,547 >>> mbox cmd response: failed
3,762,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,187 UART: [rt]cmd =0x41544d4e, len=14344
3,886,765 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
893,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,374 UART: [kat] ++
897,526 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,389 UART: [kat] SHA2-512-ACC
908,290 UART: [kat] ECC-384
918,113 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,032 UART: [cold-reset] ++
1,172,526 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,735 UART: [idev] Erasing UDS.KEYID = 0
1,201,418 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,976 UART: [ldev] ++
1,211,144 UART: [ldev] CDI.KEYID = 6
1,211,507 UART: [ldev] SUBJECT.KEYID = 5
1,211,933 UART: [ldev] AUTHORITY.KEYID = 7
1,212,396 UART: [ldev] FE.KEYID = 1
1,217,434 UART: [ldev] Erasing FE.KEYID = 1
1,244,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,320 UART: [ldev] --
1,283,721 UART: [fwproc] Wait for Commands...
1,284,325 UART: [fwproc] Recv command 0x46574c44
1,285,053 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,584 >>> mbox cmd response: success
3,314,626 UART: [afmc] ++
3,314,794 UART: [afmc] CDI.KEYID = 6
3,315,156 UART: [afmc] SUBJECT.KEYID = 7
3,315,581 UART: [afmc] AUTHORITY.KEYID = 5
3,350,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,842 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,551 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,443 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,154 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,875 UART: [afmc] --
3,393,929 UART: [cold-reset] --
3,394,547 UART: [state] Locking Datavault
3,395,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,498 UART: [state] Locking ICCM
3,396,970 UART: [exit] Launching FMC @ 0x40000130
3,402,299 UART:
3,402,315 UART: Running Caliptra FMC ...
3,402,723 UART:
3,402,866 UART: [state] CFI Enabled
3,413,322 UART: [fht] FMC Alias Private Key: 7
3,521,822 UART: [art] Extend RT PCRs Done
3,522,250 UART: [art] Lock RT PCRs Done
3,523,674 UART: [art] Populate DV Done
3,532,168 UART: [fht] FMC Alias Private Key: 7
3,533,304 UART: [art] Derive CDI
3,533,584 UART: [art] Store in in slot 0x4
3,619,521 UART: [art] Derive Key Pair
3,619,881 UART: [art] Store priv key in slot 0x5
3,633,295 UART: [art] Derive Key Pair - Done
3,647,947 UART: [art] Signing Cert with AUTHO
3,648,427 UART: RITY.KEYID = 7
3,663,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,230 UART: [art] PUB.X = 38A2C98B6C590B195AEF5A5B83F70095CD850FC09CBAB3853B6D11CFBF0E3DDF09F8F97D12A5411264BDEF25A98D5A35
3,670,984 UART: [art] PUB.Y = 183F286BAD97FFAF27F4331601AAA716801048537C16B208A39ABD552577B2E07AF087602D5A0D53D0C3064DE861F66E
3,677,922 UART: [art] SIG.R = E4C253792EBB1327D49533189D52EC46D850C4C9FD82BCEF67E36A3A6E21D8D4E9FDC38E70A941F05A8585446135D7B7
3,684,698 UART: [art] SIG.S = 4B3ADA46939D648711109B4559076AA49C63C0C9E792ED2EF41B90CCC29A602E513BB879D7A2D99CDC7AFDA8B789C878
3,708,920 UART: Caliptra RT
3,709,265 UART: [state] CFI Enabled
3,817,337 UART: [rt] RT listening for mailbox commands...
3,818,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,895 UART: [rt]cmd =0x41544d4e, len=14344
3,942,241 >>> mbox cmd response: failed
3,942,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,765 UART: [rt]cmd =0x41544d4e, len=14344
4,066,317 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,844 ready_for_fw is high
1,059,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,171,131 >>> mbox cmd response: success
3,233,906 UART:
3,233,922 UART: Running Caliptra FMC ...
3,234,330 UART:
3,234,473 UART: [state] CFI Enabled
3,245,279 UART: [fht] FMC Alias Private Key: 7
3,353,375 UART: [art] Extend RT PCRs Done
3,353,803 UART: [art] Lock RT PCRs Done
3,355,325 UART: [art] Populate DV Done
3,363,673 UART: [fht] FMC Alias Private Key: 7
3,364,821 UART: [art] Derive CDI
3,365,101 UART: [art] Store in in slot 0x4
3,451,002 UART: [art] Derive Key Pair
3,451,362 UART: [art] Store priv key in slot 0x5
3,465,096 UART: [art] Derive Key Pair - Done
3,479,775 UART: [art] Signing Cert with AUTHO
3,480,255 UART: RITY.KEYID = 7
3,495,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,188 UART: [art] PUB.X = A60EDBEDE217736B4751A840619613AD4A65CE0B5382BF3E283B64F1D3761799AF1EE65C807C911E5935E1276FE36EEA
3,502,958 UART: [art] PUB.Y = 19DE0B8E69977D55A1A3D958F58B0E208322B3343BE08B69E0F8321873056DF138D97BB8E96C5B961442939625440207
3,509,881 UART: [art] SIG.R = D475398555CCA4A9A44CE2F865CF778301CE1C9B905AAF28A7344A3E4BB557B11F902BD8E5ADA5E6CCDBD95C309212C2
3,516,664 UART: [art] SIG.S = 3B010A5F26E4AB82AB5351131F975A922A8E8840FE1FF7211B5B3C248602443D02A2F48B579EA52E2040D20863BAEF85
3,540,904 UART: Caliptra RT
3,541,249 UART: [state] CFI Enabled
3,648,465 UART: [rt] RT listening for mailbox commands...
3,649,135 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,657 UART: [rt]cmd =0x41544d4e, len=14344
3,773,371 >>> mbox cmd response: failed
3,773,371 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,119 UART: [rt]cmd =0x41544d4e, len=14344
3,897,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,333 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,173,973 ready_for_fw is high
1,173,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,587 UART: [fwproc] Recv command 0x46574c44
1,282,320 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,237 >>> mbox cmd response: success
3,317,426 UART: [afmc] ++
3,317,594 UART: [afmc] CDI.KEYID = 6
3,317,957 UART: [afmc] SUBJECT.KEYID = 7
3,318,383 UART: [afmc] AUTHORITY.KEYID = 5
3,353,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,976 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,686 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,576 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,287 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,865 UART: [afmc] --
3,396,835 UART: [cold-reset] --
3,397,409 UART: [state] Locking Datavault
3,398,518 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,122 UART: [state] Locking ICCM
3,399,706 UART: [exit] Launching FMC @ 0x40000130
3,405,035 UART:
3,405,051 UART: Running Caliptra FMC ...
3,405,459 UART:
3,405,513 UART: [state] CFI Enabled
3,415,499 UART: [fht] FMC Alias Private Key: 7
3,523,483 UART: [art] Extend RT PCRs Done
3,523,911 UART: [art] Lock RT PCRs Done
3,525,301 UART: [art] Populate DV Done
3,533,449 UART: [fht] FMC Alias Private Key: 7
3,534,433 UART: [art] Derive CDI
3,534,713 UART: [art] Store in in slot 0x4
3,620,260 UART: [art] Derive Key Pair
3,620,620 UART: [art] Store priv key in slot 0x5
3,633,288 UART: [art] Derive Key Pair - Done
3,648,137 UART: [art] Signing Cert with AUTHO
3,648,617 UART: RITY.KEYID = 7
3,663,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,732 UART: [art] PUB.X = BA8A0A9FE91F6984956E8B3D75C687F0EFB1D20B99A41CB24CB9C4111C47241957FBC9B2543F9A2F433B05D1FA8A3B5D
3,671,507 UART: [art] PUB.Y = F6A92C4E14DA656CC3A24E7B5CC3BD2A18BCE6E5E24E434E6B22D06A5E1A033BC8BEFA9377C1756C475DF58BE9B6AF7A
3,678,480 UART: [art] SIG.R = 703EEB8A699F4487F33B367875E12D3E86ED7F8B6B1BA37A520A6CF1CE4D34C1B071F86C48FE688CBFE6DAC820C496B9
3,685,263 UART: [art] SIG.S = A2BD11A538A9644DCD96CF54314157C28ADC0B2A70FBDEC210305998EF0249627B9761D98B6492BE61A4FAB6B17CDC37
3,709,260 UART: Caliptra RT
3,709,513 UART: [state] CFI Enabled
3,816,441 UART: [rt] RT listening for mailbox commands...
3,817,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,941 UART: [rt]cmd =0x41544d4e, len=14344
3,941,409 >>> mbox cmd response: failed
3,941,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,985 UART: [rt]cmd =0x41544d4e, len=14344
4,065,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,150 ready_for_fw is high
1,056,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,520 >>> mbox cmd response: success
3,229,941 UART:
3,229,957 UART: Running Caliptra FMC ...
3,230,365 UART:
3,230,419 UART: [state] CFI Enabled
3,240,997 UART: [fht] FMC Alias Private Key: 7
3,348,693 UART: [art] Extend RT PCRs Done
3,349,121 UART: [art] Lock RT PCRs Done
3,350,645 UART: [art] Populate DV Done
3,359,143 UART: [fht] FMC Alias Private Key: 7
3,360,271 UART: [art] Derive CDI
3,360,551 UART: [art] Store in in slot 0x4
3,446,438 UART: [art] Derive Key Pair
3,446,798 UART: [art] Store priv key in slot 0x5
3,459,948 UART: [art] Derive Key Pair - Done
3,474,834 UART: [art] Signing Cert with AUTHO
3,475,314 UART: RITY.KEYID = 7
3,490,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,701 UART: [art] PUB.X = 8ACD67E410028A9AA8BB6F8738AFA7846B33EF9D1CAB7B5FF8CE837554ED9C42D7B818588A67C2009C768920EB94EF5E
3,498,460 UART: [art] PUB.Y = A150BFCF4156E9858EE4F186E2F10B3BF67EF740405EF06846C85B8934D41EE6DDCDF81B9F986B1149AB2FFFF30DDB88
3,505,422 UART: [art] SIG.R = 4AA199945756D117331BC5301DE8E6E5F136B8AEF5521E2820AC7A904B1E3119284B520EA1307B1CB41A136619634B47
3,512,183 UART: [art] SIG.S = 2276FD374D255A9F6E7CD615A854EEF00606C8768C4DAB5CD6C621512D0BA6C08C0297B86CBE063F1E038E5E611AD488
3,536,888 UART: Caliptra RT
3,537,141 UART: [state] CFI Enabled
3,644,522 UART: [rt] RT listening for mailbox commands...
3,645,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,044 UART: [rt]cmd =0x41544d4e, len=14344
3,769,532 >>> mbox cmd response: failed
3,769,532 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,016 UART: [rt]cmd =0x41544d4e, len=14344
3,893,592 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,474 UART: [kat] SHA2-256
902,414 UART: [kat] SHA2-384
905,247 UART: [kat] SHA2-512-ACC
907,148 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,210 UART: [fht] FHT @ 0x50003400
1,173,946 UART: [idev] ++
1,174,114 UART: [idev] CDI.KEYID = 6
1,174,475 UART: [idev] SUBJECT.KEYID = 7
1,174,900 UART: [idev] UDS.KEYID = 0
1,175,246 ready_for_fw is high
1,175,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,200,302 UART: [idev] Sha1 KeyId Algorithm
1,209,286 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,243,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,301 UART: [ldev] --
1,282,683 UART: [fwproc] Wait for Commands...
1,283,370 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,217 >>> mbox cmd response: success
3,319,238 UART: [afmc] ++
3,319,406 UART: [afmc] CDI.KEYID = 6
3,319,769 UART: [afmc] SUBJECT.KEYID = 7
3,320,195 UART: [afmc] AUTHORITY.KEYID = 5
3,355,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,860 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,570 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,460 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,171 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,799 UART: [afmc] --
3,398,689 UART: [cold-reset] --
3,399,689 UART: [state] Locking Datavault
3,401,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,714 UART: [state] Locking ICCM
3,402,278 UART: [exit] Launching FMC @ 0x40000130
3,407,607 UART:
3,407,623 UART: Running Caliptra FMC ...
3,408,031 UART:
3,408,174 UART: [state] CFI Enabled
3,418,478 UART: [fht] FMC Alias Private Key: 7
3,526,476 UART: [art] Extend RT PCRs Done
3,526,904 UART: [art] Lock RT PCRs Done
3,528,516 UART: [art] Populate DV Done
3,536,766 UART: [fht] FMC Alias Private Key: 7
3,537,888 UART: [art] Derive CDI
3,538,168 UART: [art] Store in in slot 0x4
3,624,041 UART: [art] Derive Key Pair
3,624,401 UART: [art] Store priv key in slot 0x5
3,637,805 UART: [art] Derive Key Pair - Done
3,652,645 UART: [art] Signing Cert with AUTHO
3,653,125 UART: RITY.KEYID = 7
3,668,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,282 UART: [art] PUB.X = 41D1376A823836950E04708E3E6330A8DA0E0B6DD821E0E017B3E8A15BE6F633D39EC65636ABCE7FC59D5C269E68CEBA
3,676,050 UART: [art] PUB.Y = 02B4BFF5DDC2573F56FD1FE033644A0935314308FBBCF89EBC9AD4034F23B37995511881B45AC6EE7DA18D29E582E06C
3,682,998 UART: [art] SIG.R = 4791737B6ECE433A72DF24E7DC3B6AE8744C73E43A8287C7B5D8A1712A5C4749CEFC2228D518371FDDB4835553846EF3
3,689,772 UART: [art] SIG.S = 39DF007984DA1C499F47B56236B865BF45F9B2C3AEBCD513309FED8CC3128B791517BFB53CA26F03C37B3CE044532878
3,713,060 UART: Caliptra RT
3,713,405 UART: [state] CFI Enabled
3,820,962 UART: [rt] RT listening for mailbox commands...
3,821,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,786 UART: [rt]cmd =0x41544d4e, len=14344
3,946,392 >>> mbox cmd response: failed
3,946,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,130 UART: [rt]cmd =0x41544d4e, len=14344
4,070,260 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,627 ready_for_fw is high
1,055,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,712 >>> mbox cmd response: success
3,227,905 UART:
3,227,921 UART: Running Caliptra FMC ...
3,228,329 UART:
3,228,472 UART: [state] CFI Enabled
3,238,724 UART: [fht] FMC Alias Private Key: 7
3,345,852 UART: [art] Extend RT PCRs Done
3,346,280 UART: [art] Lock RT PCRs Done
3,347,562 UART: [art] Populate DV Done
3,355,696 UART: [fht] FMC Alias Private Key: 7
3,356,810 UART: [art] Derive CDI
3,357,090 UART: [art] Store in in slot 0x4
3,442,849 UART: [art] Derive Key Pair
3,443,209 UART: [art] Store priv key in slot 0x5
3,456,795 UART: [art] Derive Key Pair - Done
3,471,496 UART: [art] Signing Cert with AUTHO
3,471,976 UART: RITY.KEYID = 7
3,487,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,023 UART: [art] PUB.X = 092AF7F2EA53FFF484D75F45A5726F0CBFBC5C73F30C539503A735E3B66776A7D7F6F4499A9F0A23CED26BAC9C52D6FA
3,494,796 UART: [art] PUB.Y = 08EB4392AF774794B171DC1F9314E52AC9ECB7D8475E7982C1DD25EB40947FBCB61C562B80F310EC45F78CC4F40953B9
3,501,748 UART: [art] SIG.R = C636AB8328F46984BA408CD1CA49151D07FB15C6CDF44FCD6C45E21DE7F7EACB81421FFE1F9769F471058894BEFE737C
3,508,528 UART: [art] SIG.S = 7D703B0E2B2352BC54A561A50336421F95D75B567125F8A45B27003A910C7BF0E081981FE629081601E3BDFEB0207329
3,532,702 UART: Caliptra RT
3,533,047 UART: [state] CFI Enabled
3,640,551 UART: [rt] RT listening for mailbox commands...
3,641,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,359 UART: [rt]cmd =0x41544d4e, len=14344
3,765,941 >>> mbox cmd response: failed
3,765,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,545 UART: [rt]cmd =0x41544d4e, len=14344
3,890,147 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,017 UART:
192,378 UART: Running Caliptra ROM ...
193,526 UART:
193,675 UART: [state] CFI Enabled
265,652 UART: [state] LifecycleState = Unprovisioned
267,570 UART: [state] DebugLocked = No
268,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,886 UART: [kat] SHA2-256
442,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,145 UART: [kat] ++
453,681 UART: [kat] sha1
465,063 UART: [kat] SHA2-256
467,728 UART: [kat] SHA2-384
474,074 UART: [kat] SHA2-512-ACC
476,647 UART: [kat] ECC-384
2,766,637 UART: [kat] HMAC-384Kdf
2,779,305 UART: [kat] LMS
3,969,591 UART: [kat] --
3,975,970 UART: [cold-reset] ++
3,978,124 UART: [fht] Storing FHT @ 0x50003400
3,989,037 UART: [idev] ++
3,989,620 UART: [idev] CDI.KEYID = 6
3,990,505 UART: [idev] SUBJECT.KEYID = 7
3,991,752 UART: [idev] UDS.KEYID = 0
3,992,723 ready_for_fw is high
3,992,920 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,501 UART: [idev] Erasing UDS.KEYID = 0
7,325,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,063 UART: [idev] --
7,352,489 UART: [ldev] ++
7,353,059 UART: [ldev] CDI.KEYID = 6
7,354,027 UART: [ldev] SUBJECT.KEYID = 5
7,355,238 UART: [ldev] AUTHORITY.KEYID = 7
7,356,526 UART: [ldev] FE.KEYID = 1
7,402,235 UART: [ldev] Erasing FE.KEYID = 1
10,736,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,178 UART: [ldev] --
13,116,333 UART: [fwproc] Waiting for Commands...
13,119,400 UART: [fwproc] Received command 0x46574c44
13,121,580 UART: [fwproc] Received Image of size 114124 bytes
22,078,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,161,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,230,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,547,413 >>> mbox cmd response: success
22,551,405 UART: [afmc] ++
22,551,999 UART: [afmc] CDI.KEYID = 6
22,552,885 UART: [afmc] SUBJECT.KEYID = 7
22,554,152 UART: [afmc] AUTHORITY.KEYID = 5
25,913,029 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,214,523 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,216,791 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,231,341 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,246,077 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,260,306 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,281,157 UART: [afmc] --
28,284,105 UART: [cold-reset] --
28,289,423 UART: [state] Locking Datavault
28,295,160 UART: [state] Locking PCR0, PCR1 and PCR31
28,296,912 UART: [state] Locking ICCM
28,298,467 UART: [exit] Launching FMC @ 0x40000130
28,306,866 UART:
28,307,102 UART: Running Caliptra FMC ...
28,308,204 UART:
28,308,363 UART: [state] CFI Enabled
28,373,981 UART: [fht] FMC Alias Private Key: 7
30,711,603 UART: [art] Extend RT PCRs Done
30,712,825 UART: [art] Lock RT PCRs Done
30,714,339 UART: [art] Populate DV Done
30,719,916 UART: [fht] FMC Alias Private Key: 7
30,721,569 UART: [art] Derive CDI
30,722,388 UART: [art] Store in in slot 0x4
30,781,765 UART: [art] Derive Key Pair
30,782,806 UART: [art] Store priv key in slot 0x5
34,075,069 UART: [art] Derive Key Pair - Done
34,087,696 UART: [art] Signing Cert with AUTHO
34,089,034 UART: RITY.KEYID = 7
36,376,633 UART: [art] Erasing AUTHORITY.KEYID = 7
36,378,133 UART: [art] PUB.X = 315CEE4142FCE509B13ECD920BC53F461AF2D40A10D1DD2387705C869AB631E0F61C035E7C4FCDFA0731FF35BC283B1C
36,385,403 UART: [art] PUB.Y = 59A1CEBBC2228A1853A50769FB041F1FDEA2EB96E4379737D53AB19E91E126051F0B7CEFCA1E9AB5D0E62296A0BF00A8
36,392,640 UART: [art] SIG.R = AA7335DF79FB1861B082989895849DA5628184A07767C08832F32316BEC550DA8539FB473D0011F2D05D6396B2D277C3
36,399,988 UART: [art] SIG.S = 07DC576ABB355EFF80C69EEFD352E3EDB5DEDE137F1591BF4481953CA3CBC7ED0BD67B22872C8A9216E01548D958D49B
37,705,168 UART: Caliptra RT
37,705,855 UART: [state] CFI Enabled
37,866,785 UART: [rt] RT listening for mailbox commands...
37,869,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,024,307 UART: [rt]cmd =0x41544d4e, len=14344
46,468,320 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,808,898 ready_for_fw is high
3,809,308 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,799,507 >>> mbox cmd response: success
27,495,351 UART:
27,495,737 UART: Running Caliptra FMC ...
27,496,860 UART:
27,497,037 UART: [state] CFI Enabled
27,560,847 UART: [fht] FMC Alias Private Key: 7
29,899,456 UART: [art] Extend RT PCRs Done
29,900,687 UART: [art] Lock RT PCRs Done
29,902,431 UART: [art] Populate DV Done
29,907,610 UART: [fht] FMC Alias Private Key: 7
29,909,211 UART: [art] Derive CDI
29,910,027 UART: [art] Store in in slot 0x4
29,969,025 UART: [art] Derive Key Pair
29,970,069 UART: [art] Store priv key in slot 0x5
33,262,963 UART: [art] Derive Key Pair - Done
33,275,744 UART: [art] Signing Cert with AUTHO
33,277,049 UART: RITY.KEYID = 7
35,563,806 UART: [art] Erasing AUTHORITY.KEYID = 7
35,565,314 UART: [art] PUB.X = 692EA1C18F8E2304E73992D38E95A8820A4EC4A1B69A63B25D419C929FDA3B5B6DFE1F00008E0FD325CAAD809DD96C95
35,572,508 UART: [art] PUB.Y = 89680343E141B4E9678AED2F65431AE9D28E4F794A66CAF74D1BDF0BCB962669CD8150E1AAE20FB00F41B589C7A6A643
35,579,785 UART: [art] SIG.R = 139B69931592C87D1A208D743CDD834932A38D63B6A5EA4C54E935D44107DFBA2595B091003667A048FFD14CC5E8DAFB
35,587,185 UART: [art] SIG.S = D94E68FBA9674D90C45744C758547320B5B9BA17A2BB41FFB7005CC01C902E5F0638A9B6F53D8BA2500F43CA02595F88
36,892,758 UART: Caliptra RT
36,893,472 UART: [state] CFI Enabled
37,074,126 UART: [rt] RT listening for mailbox commands...
37,076,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,231,694 UART: [rt]cmd =0x41544d4e, len=14344
45,468,680 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,387 UART:
192,758 UART: Running Caliptra ROM ...
193,851 UART:
603,493 UART: [state] CFI Enabled
618,639 UART: [state] LifecycleState = Unprovisioned
620,563 UART: [state] DebugLocked = No
622,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,681 UART: [kat] SHA2-256
798,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,979 UART: [kat] ++
809,424 UART: [kat] sha1
820,359 UART: [kat] SHA2-256
823,086 UART: [kat] SHA2-384
829,322 UART: [kat] SHA2-512-ACC
831,684 UART: [kat] ECC-384
3,116,266 UART: [kat] HMAC-384Kdf
3,127,616 UART: [kat] LMS
4,317,717 UART: [kat] --
4,323,089 UART: [cold-reset] ++
4,324,181 UART: [fht] Storing FHT @ 0x50003400
4,334,685 UART: [idev] ++
4,335,245 UART: [idev] CDI.KEYID = 6
4,336,126 UART: [idev] SUBJECT.KEYID = 7
4,337,437 UART: [idev] UDS.KEYID = 0
4,338,392 ready_for_fw is high
4,338,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,988 UART: [idev] Erasing UDS.KEYID = 0
7,628,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,704 UART: [idev] --
7,653,852 UART: [ldev] ++
7,654,470 UART: [ldev] CDI.KEYID = 6
7,655,482 UART: [ldev] SUBJECT.KEYID = 5
7,656,633 UART: [ldev] AUTHORITY.KEYID = 7
7,657,852 UART: [ldev] FE.KEYID = 1
7,668,166 UART: [ldev] Erasing FE.KEYID = 1
10,956,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,461 UART: [ldev] --
13,318,732 UART: [fwproc] Waiting for Commands...
13,321,092 UART: [fwproc] Received command 0x46574c44
13,323,270 UART: [fwproc] Received Image of size 114124 bytes
21,876,097 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,952,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,021,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,338,498 >>> mbox cmd response: success
22,342,035 UART: [afmc] ++
22,342,650 UART: [afmc] CDI.KEYID = 6
22,343,568 UART: [afmc] SUBJECT.KEYID = 7
22,344,778 UART: [afmc] AUTHORITY.KEYID = 5
25,660,534 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,955,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,957,674 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,972,226 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,986,956 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,001,207 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,023,285 UART: [afmc] --
28,028,005 UART: [cold-reset] --
28,032,115 UART: [state] Locking Datavault
28,035,958 UART: [state] Locking PCR0, PCR1 and PCR31
28,037,656 UART: [state] Locking ICCM
28,039,000 UART: [exit] Launching FMC @ 0x40000130
28,047,398 UART:
28,047,638 UART: Running Caliptra FMC ...
28,048,741 UART:
28,048,897 UART: [state] CFI Enabled
28,056,990 UART: [fht] FMC Alias Private Key: 7
30,387,087 UART: [art] Extend RT PCRs Done
30,388,312 UART: [art] Lock RT PCRs Done
30,390,284 UART: [art] Populate DV Done
30,395,686 UART: [fht] FMC Alias Private Key: 7
30,397,324 UART: [art] Derive CDI
30,398,052 UART: [art] Store in in slot 0x4
30,440,653 UART: [art] Derive Key Pair
30,441,704 UART: [art] Store priv key in slot 0x5
33,683,200 UART: [art] Derive Key Pair - Done
33,696,373 UART: [art] Signing Cert with AUTHO
33,697,671 UART: RITY.KEYID = 7
35,977,100 UART: [art] Erasing AUTHORITY.KEYID = 7
35,978,605 UART: [art] PUB.X = D12183E4775C66DD9A678B0339A8C75B08EE02CD67F0D08CA7C4AB2713E495B6F6D334FCE89C2247A8A6594DB87FFFB3
35,985,857 UART: [art] PUB.Y = D9A3A52823FA96F94804459CBE933E08219E8CF8A1EF3DFD88CEDF9A544AE16AC838E9A7A3B9D280784805CA81258CE7
35,993,130 UART: [art] SIG.R = 0E177991E189104043A7CFCB0A39A5B41E53D6AB01F308D729D386C6A98F5D0676D08A1FF0F078B19C0DEE65DB68C1B1
36,000,503 UART: [art] SIG.S = C8B2E4F94379965111F04FAF7D12F35634E97D949BC92B83A6E600E995B7C79BDA011ECE9D12E822ABC61006C2E1898A
37,305,961 UART: Caliptra RT
37,306,672 UART: [state] CFI Enabled
37,424,924 UART: [rt] RT listening for mailbox commands...
37,427,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,582,506 UART: [rt]cmd =0x41544d4e, len=14344
45,766,603 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,122,659 ready_for_fw is high
4,123,075 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,038,685 >>> mbox cmd response: success
27,681,774 UART:
27,682,172 UART: Running Caliptra FMC ...
27,683,283 UART:
27,683,429 UART: [state] CFI Enabled
27,690,860 UART: [fht] FMC Alias Private Key: 7
30,021,097 UART: [art] Extend RT PCRs Done
30,022,332 UART: [art] Lock RT PCRs Done
30,024,015 UART: [art] Populate DV Done
30,029,682 UART: [fht] FMC Alias Private Key: 7
30,031,277 UART: [art] Derive CDI
30,032,088 UART: [art] Store in in slot 0x4
30,074,878 UART: [art] Derive Key Pair
30,075,883 UART: [art] Store priv key in slot 0x5
33,318,406 UART: [art] Derive Key Pair - Done
33,331,739 UART: [art] Signing Cert with AUTHO
33,333,048 UART: RITY.KEYID = 7
35,612,469 UART: [art] Erasing AUTHORITY.KEYID = 7
35,614,109 UART: [art] PUB.X = 51D24C4FF36DC6743BCFA79F099E8AE2766D0506C028180F4887D03F8D5A994613D79E34BD402BEDE2386418B7712462
35,621,208 UART: [art] PUB.Y = 3A72B1F282BD0AF41B523FAF6701A16200B7B4F3D6415E52E44236FCA9DBF51F1677F2FC2811DB763DD96FDD6438D6C6
35,628,452 UART: [art] SIG.R = 4A378A733CD4D5DD0BAEF34F63FDCB8106CACAA6444958DDFA018B01A044ACDB8E8518BF61AFF33863BFEE10E2DEB4E0
35,635,898 UART: [art] SIG.S = 5E5A0329A79FA68275F7F69FBB2DFFD22F371A2E3C4E74A670391D0FE393F399D083939582A1E56CA9D10C3FA6D9872C
36,941,102 UART: Caliptra RT
36,941,813 UART: [state] CFI Enabled
37,060,202 UART: [rt] RT listening for mailbox commands...
37,062,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,217,820 UART: [rt]cmd =0x41544d4e, len=14344
45,583,894 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,142 UART:
192,500 UART: Running Caliptra ROM ...
193,685 UART:
193,839 UART: [state] CFI Enabled
267,999 UART: [state] LifecycleState = Unprovisioned
269,913 UART: [state] DebugLocked = No
271,447 UART: [state] WD Timer not started. Device not locked for debugging
274,563 UART: [kat] SHA2-256
453,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,282 UART: [kat] ++
465,828 UART: [kat] sha1
475,934 UART: [kat] SHA2-256
479,005 UART: [kat] SHA2-384
485,707 UART: [kat] SHA2-512-ACC
488,718 UART: [kat] ECC-384
2,947,302 UART: [kat] HMAC-384Kdf
2,970,685 UART: [kat] LMS
3,500,183 UART: [kat] --
3,507,167 UART: [cold-reset] ++
3,509,099 UART: [fht] FHT @ 0x50003400
3,520,718 UART: [idev] ++
3,521,281 UART: [idev] CDI.KEYID = 6
3,522,163 UART: [idev] SUBJECT.KEYID = 7
3,523,400 UART: [idev] UDS.KEYID = 0
3,524,299 ready_for_fw is high
3,524,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,616 UART: [idev] Erasing UDS.KEYID = 0
6,028,377 UART: [idev] Sha1 KeyId Algorithm
6,052,524 UART: [idev] --
6,056,468 UART: [ldev] ++
6,057,081 UART: [ldev] CDI.KEYID = 6
6,058,018 UART: [ldev] SUBJECT.KEYID = 5
6,059,129 UART: [ldev] AUTHORITY.KEYID = 7
6,060,363 UART: [ldev] FE.KEYID = 1
6,099,525 UART: [ldev] Erasing FE.KEYID = 1
8,606,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,996 UART: [ldev] --
10,413,254 UART: [fwproc] Wait for Commands...
10,415,074 UART: [fwproc] Recv command 0x46574c44
10,417,165 UART: [fwproc] Recv'd Img size: 114448 bytes
14,995,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,073,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,142,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,461,299 >>> mbox cmd response: success
15,465,941 UART: [afmc] ++
15,466,531 UART: [afmc] CDI.KEYID = 6
15,467,445 UART: [afmc] SUBJECT.KEYID = 7
15,468,606 UART: [afmc] AUTHORITY.KEYID = 5
17,998,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,006 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,743,017 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,758,949 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,774,695 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,797,976 UART: [afmc] --
19,801,297 UART: [cold-reset] --
19,804,939 UART: [state] Locking Datavault
19,812,071 UART: [state] Locking PCR0, PCR1 and PCR31
19,813,711 UART: [state] Locking ICCM
19,816,232 UART: [exit] Launching FMC @ 0x40000130
19,824,683 UART:
19,824,929 UART: Running Caliptra FMC ...
19,826,033 UART:
19,826,197 UART: [state] CFI Enabled
19,882,823 UART: [fht] FMC Alias Private Key: 7
21,646,874 UART: [art] Extend RT PCRs Done
21,648,087 UART: [art] Lock RT PCRs Done
21,649,874 UART: [art] Populate DV Done
21,655,338 UART: [fht] FMC Alias Private Key: 7
21,656,848 UART: [art] Derive CDI
21,657,592 UART: [art] Store in in slot 0x4
21,715,445 UART: [art] Derive Key Pair
21,716,444 UART: [art] Store priv key in slot 0x5
24,179,231 UART: [art] Derive Key Pair - Done
24,192,600 UART: [art] Signing Cert with AUTHO
24,193,924 UART: RITY.KEYID = 7
25,905,637 UART: [art] Erasing AUTHORITY.KEYID = 7
25,907,136 UART: [art] PUB.X = 6B62D429ADFA4AB187C839B86ECE3F83825CEF534FD130242D8C26CBD9410010948DF9B64DC7930018392BEEA46BE9AE
25,914,383 UART: [art] PUB.Y = F6AECC730C3EBE982BEAD12FC043A77FF2F77A2803B83EECC78C79FA346968B70F0D876C6B408B28CCD9AF5D3B0BF2CE
25,921,658 UART: [art] SIG.R = 857984B7F73B9183ED5A4972D1D902915C822432A9F1C0D6AD70AB551A342FAC9B5454FBCC49B117825EB78F164913F0
25,929,043 UART: [art] SIG.S = 3CA6CACDBBF8A5371DD6D689151F297198E1863AE1D132269A5CB51B95FC8CE2D1BCBE1A672192B6424A67E3DA139191
26,908,411 UART: Caliptra RT
26,909,096 UART: [state] CFI Enabled
27,074,110 UART: [rt] RT listening for mailbox commands...
27,076,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,180 UART: [rt]cmd =0x41544d4e, len=14344
32,018,620 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,358,831 ready_for_fw is high
3,359,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,023,860 >>> mbox cmd response: success
19,302,414 UART:
19,302,795 UART: Running Caliptra FMC ...
19,303,895 UART:
19,304,052 UART: [state] CFI Enabled
19,371,831 UART: [fht] FMC Alias Private Key: 7
21,135,361 UART: [art] Extend RT PCRs Done
21,136,584 UART: [art] Lock RT PCRs Done
21,138,478 UART: [art] Populate DV Done
21,143,891 UART: [fht] FMC Alias Private Key: 7
21,145,418 UART: [art] Derive CDI
21,146,187 UART: [art] Store in in slot 0x4
21,204,367 UART: [art] Derive Key Pair
21,205,374 UART: [art] Store priv key in slot 0x5
23,668,791 UART: [art] Derive Key Pair - Done
23,681,571 UART: [art] Signing Cert with AUTHO
23,682,878 UART: RITY.KEYID = 7
25,394,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,773 UART: [art] PUB.X = DD80BE9572AC4F9189CFC5792C0D18BAF731252905C3521EE85C694C242E8A196DCB3E8267A6109048161ACBC9739708
25,403,035 UART: [art] PUB.Y = DEE23013C089BB0342B9CD0C76F521C2EA4C56A1130BD5645C302E05446124DF5793F0B9F6BADEF04B734CD932C7EC0F
25,410,323 UART: [art] SIG.R = 38715EF7910116FA3FF0A35121AC98AD41FC8C1EF44C3843193FDC378DC68C3141ABFAE90674125D5E5BDCAF69494E1A
25,417,731 UART: [art] SIG.S = BC12A2C978FAE169BD03DA48896A82EFE2C3005D20E85154EA3050BB038410AECDF9E17BB87E41F7C9E294105C9816EA
26,397,041 UART: Caliptra RT
26,397,752 UART: [state] CFI Enabled
26,563,684 UART: [rt] RT listening for mailbox commands...
26,565,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,721,828 UART: [rt]cmd =0x41544d4e, len=14344
31,506,501 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,386 UART:
192,745 UART: Running Caliptra ROM ...
193,935 UART:
603,513 UART: [state] CFI Enabled
617,059 UART: [state] LifecycleState = Unprovisioned
618,930 UART: [state] DebugLocked = No
620,867 UART: [state] WD Timer not started. Device not locked for debugging
624,045 UART: [kat] SHA2-256
803,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,699 UART: [kat] ++
815,209 UART: [kat] sha1
826,925 UART: [kat] SHA2-256
829,924 UART: [kat] SHA2-384
836,973 UART: [kat] SHA2-512-ACC
839,556 UART: [kat] ECC-384
3,282,303 UART: [kat] HMAC-384Kdf
3,294,889 UART: [kat] LMS
3,824,341 UART: [kat] --
3,828,489 UART: [cold-reset] ++
3,830,054 UART: [fht] FHT @ 0x50003400
3,842,253 UART: [idev] ++
3,842,811 UART: [idev] CDI.KEYID = 6
3,843,832 UART: [idev] SUBJECT.KEYID = 7
3,844,927 UART: [idev] UDS.KEYID = 0
3,845,963 ready_for_fw is high
3,846,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,871 UART: [idev] Erasing UDS.KEYID = 0
6,322,560 UART: [idev] Sha1 KeyId Algorithm
6,346,482 UART: [idev] --
6,350,035 UART: [ldev] ++
6,350,602 UART: [ldev] CDI.KEYID = 6
6,351,569 UART: [ldev] SUBJECT.KEYID = 5
6,352,718 UART: [ldev] AUTHORITY.KEYID = 7
6,353,941 UART: [ldev] FE.KEYID = 1
6,364,907 UART: [ldev] Erasing FE.KEYID = 1
8,840,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,985 UART: [ldev] --
10,636,131 UART: [fwproc] Wait for Commands...
10,639,188 UART: [fwproc] Recv command 0x46574c44
10,641,265 UART: [fwproc] Recv'd Img size: 114448 bytes
15,209,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,288,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,356,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,674,363 >>> mbox cmd response: success
15,678,215 UART: [afmc] ++
15,678,809 UART: [afmc] CDI.KEYID = 6
15,679,687 UART: [afmc] SUBJECT.KEYID = 7
15,680,896 UART: [afmc] AUTHORITY.KEYID = 5
18,181,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,901,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,903,165 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,919,118 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,935,103 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,950,875 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,973,474 UART: [afmc] --
19,977,772 UART: [cold-reset] --
19,980,064 UART: [state] Locking Datavault
19,984,069 UART: [state] Locking PCR0, PCR1 and PCR31
19,985,709 UART: [state] Locking ICCM
19,988,067 UART: [exit] Launching FMC @ 0x40000130
19,996,459 UART:
19,996,688 UART: Running Caliptra FMC ...
19,997,777 UART:
19,997,925 UART: [state] CFI Enabled
20,005,981 UART: [fht] FMC Alias Private Key: 7
21,762,697 UART: [art] Extend RT PCRs Done
21,763,914 UART: [art] Lock RT PCRs Done
21,765,501 UART: [art] Populate DV Done
21,770,579 UART: [fht] FMC Alias Private Key: 7
21,772,163 UART: [art] Derive CDI
21,772,890 UART: [art] Store in in slot 0x4
21,815,853 UART: [art] Derive Key Pair
21,816,878 UART: [art] Store priv key in slot 0x5
24,244,013 UART: [art] Derive Key Pair - Done
24,256,784 UART: [art] Signing Cert with AUTHO
24,258,073 UART: RITY.KEYID = 7
25,963,395 UART: [art] Erasing AUTHORITY.KEYID = 7
25,964,896 UART: [art] PUB.X = E09B8C56E3C8C9EBAD6AF7211F6CB3E92BC372EB2146E3EE80BCAD52D15858225AED73E8C86AB98820CF9EB21C802162
25,972,181 UART: [art] PUB.Y = 566CEB2F6E6779B828F62EC92DAC09B03DBC3D33D80F0B1362C366166FF8BE36200D1FF3665D1A0F836CFFE94201CF9F
25,979,508 UART: [art] SIG.R = B60C59D000F518C25FD6C4B47C8630A6EACC6EA625F12DCE9A05C834F0E72E52CB7B468E1F6460DB1B0F4F06E7DABA77
25,986,897 UART: [art] SIG.S = 3F34A037BD2528A885B548A0FBE57054F6D4FE744ACF0521CEF9CD8CA9A13A23C9B811D62EC423860BE21B7E4F308F78
26,966,125 UART: Caliptra RT
26,966,808 UART: [state] CFI Enabled
27,083,926 UART: [rt] RT listening for mailbox commands...
27,086,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,241,652 UART: [rt]cmd =0x41544d4e, len=14344
32,045,616 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,692,701 ready_for_fw is high
3,693,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,253,244 >>> mbox cmd response: success
19,504,217 UART:
19,504,598 UART: Running Caliptra FMC ...
19,505,724 UART:
19,505,874 UART: [state] CFI Enabled
19,513,975 UART: [fht] FMC Alias Private Key: 7
21,271,245 UART: [art] Extend RT PCRs Done
21,272,452 UART: [art] Lock RT PCRs Done
21,274,177 UART: [art] Populate DV Done
21,279,469 UART: [fht] FMC Alias Private Key: 7
21,281,095 UART: [art] Derive CDI
21,281,918 UART: [art] Store in in slot 0x4
21,324,506 UART: [art] Derive Key Pair
21,325,497 UART: [art] Store priv key in slot 0x5
23,752,346 UART: [art] Derive Key Pair - Done
23,765,168 UART: [art] Signing Cert with AUTHO
23,766,513 UART: RITY.KEYID = 7
25,471,639 UART: [art] Erasing AUTHORITY.KEYID = 7
25,473,114 UART: [art] PUB.X = 5EC53E50008C29D5A8FE0C61670C66487DF8F4022D2F7CC87E8F20883FAE3FACCE0AC2D2848FEF4DA16DCF5CD1B3FE52
25,480,404 UART: [art] PUB.Y = C7866F2AB327AEA9507DD7F72BCAA2CB7BB799F41FE1632E353D839272843758D3BC4AFE5A0F205F1DB788D58D0DE9E6
25,487,713 UART: [art] SIG.R = 3FFB4C40780321CE458F683B91EFEF4413A04384C6FA6B748D6FFB79E12284A20FE7C87AD7FA1C75125FB4F8E9436C80
25,495,088 UART: [art] SIG.S = A218613E41EB90515F74F65743DA5D3F98425E3F115EC18791886C3019E791B9A50066DAE1387F031E7DC810A39A925B
26,474,294 UART: Caliptra RT
26,475,013 UART: [state] CFI Enabled
26,592,031 UART: [rt] RT listening for mailbox commands...
26,594,344 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,749,760 UART: [rt]cmd =0x41544d4e, len=14344
31,539,741 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,010 UART:
192,386 UART: Running Caliptra ROM ...
193,578 UART:
193,731 UART: [state] CFI Enabled
265,252 UART: [state] LifecycleState = Unprovisioned
267,374 UART: [state] DebugLocked = No
268,911 UART: [state] WD Timer not started. Device not locked for debugging
272,714 UART: [kat] SHA2-256
462,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,366 UART: [kat] ++
473,819 UART: [kat] sha1
484,640 UART: [kat] SHA2-256
487,649 UART: [kat] SHA2-384
494,987 UART: [kat] SHA2-512-ACC
497,564 UART: [kat] ECC-384
2,950,560 UART: [kat] HMAC-384Kdf
2,973,393 UART: [kat] LMS
3,505,144 UART: [kat] --
3,509,348 UART: [cold-reset] ++
3,510,350 UART: [fht] FHT @ 0x50003400
3,521,040 UART: [idev] ++
3,521,747 UART: [idev] CDI.KEYID = 6
3,522,748 UART: [idev] SUBJECT.KEYID = 7
3,523,921 UART: [idev] UDS.KEYID = 0
3,525,127 ready_for_fw is high
3,525,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,472 UART: [idev] Erasing UDS.KEYID = 0
6,029,526 UART: [idev] Sha1 KeyId Algorithm
6,053,093 UART: [idev] --
6,058,655 UART: [ldev] ++
6,059,337 UART: [ldev] CDI.KEYID = 6
6,060,305 UART: [ldev] SUBJECT.KEYID = 5
6,061,464 UART: [ldev] AUTHORITY.KEYID = 7
6,062,699 UART: [ldev] FE.KEYID = 1
6,102,565 UART: [ldev] Erasing FE.KEYID = 1
8,609,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,729 UART: [ldev] --
10,416,097 UART: [fwproc] Wait for Commands...
10,418,189 UART: [fwproc] Recv command 0x46574c44
10,420,493 UART: [fwproc] Recv'd Img size: 114448 bytes
15,024,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,109,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,226,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,769,353 >>> mbox cmd response: success
15,774,212 UART: [afmc] ++
15,774,927 UART: [afmc] CDI.KEYID = 6
15,776,172 UART: [afmc] SUBJECT.KEYID = 7
15,777,603 UART: [afmc] AUTHORITY.KEYID = 5
18,324,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,047,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,049,795 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,064,866 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,080,052 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,094,899 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,119,622 UART: [afmc] --
20,122,592 UART: [cold-reset] --
20,125,917 UART: [state] Locking Datavault
20,129,820 UART: [state] Locking PCR0, PCR1 and PCR31
20,131,954 UART: [state] Locking ICCM
20,134,458 UART: [exit] Launching FMC @ 0x40000130
20,143,137 UART:
20,143,372 UART: Running Caliptra FMC ...
20,144,472 UART:
20,144,627 UART: [state] CFI Enabled
20,202,245 UART: [fht] FMC Alias Private Key: 7
21,966,698 UART: [art] Extend RT PCRs Done
21,967,917 UART: [art] Lock RT PCRs Done
21,969,190 UART: [art] Populate DV Done
21,974,517 UART: [fht] FMC Alias Private Key: 7
21,976,265 UART: [art] Derive CDI
21,977,000 UART: [art] Store in in slot 0x4
22,034,584 UART: [art] Derive Key Pair
22,035,625 UART: [art] Store priv key in slot 0x5
24,498,259 UART: [art] Derive Key Pair - Done
24,511,515 UART: [art] Signing Cert with AUTHO
24,512,846 UART: RITY.KEYID = 7
26,223,619 UART: [art] Erasing AUTHORITY.KEYID = 7
26,225,125 UART: [art] PUB.X = D79B197FF5A6947A6C596926B42EB9DAF05539F9ECA0C66DE602AB0EF21B35E67B8136DE782558736FF482A3B80FFD0D
26,232,367 UART: [art] PUB.Y = D08C0E7449ED5E6110583124A666016701FA4E5E1FEDF934F3C8F85B9523552135D41F2C640FDB1CE582086219B01C0F
26,239,651 UART: [art] SIG.R = 061599FCC91856D78E70F8886FBA14427BC64DC59213A04F0F3F7BC5D56E80E8AF96942F31AED5CFD5D6D1B443939630
26,246,985 UART: [art] SIG.S = DD9A645AA71260D68890790958946A05803517904A4A903B8BE6A43401A1A4BAD526AD895560F027EF83D3DE5689569B
27,226,009 UART: Caliptra RT
27,226,725 UART: [state] CFI Enabled
27,389,979 UART: [rt] RT listening for mailbox commands...
27,392,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,169 UART: [rt]cmd =0x41544d4e, len=14344
32,341,811 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,411,845 ready_for_fw is high
3,412,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,801,759 >>> mbox cmd response: success
20,084,659 UART:
20,085,043 UART: Running Caliptra FMC ...
20,086,255 UART:
20,086,432 UART: [state] CFI Enabled
20,150,783 UART: [fht] FMC Alias Private Key: 7
21,915,248 UART: [art] Extend RT PCRs Done
21,916,459 UART: [art] Lock RT PCRs Done
21,917,975 UART: [art] Populate DV Done
21,923,416 UART: [fht] FMC Alias Private Key: 7
21,925,008 UART: [art] Derive CDI
21,925,833 UART: [art] Store in in slot 0x4
21,983,136 UART: [art] Derive Key Pair
21,984,187 UART: [art] Store priv key in slot 0x5
24,446,801 UART: [art] Derive Key Pair - Done
24,459,847 UART: [art] Signing Cert with AUTHO
24,461,157 UART: RITY.KEYID = 7
26,172,377 UART: [art] Erasing AUTHORITY.KEYID = 7
26,173,878 UART: [art] PUB.X = 3096E1ACDFD836330F1BD14AA563C3854F7878BCFC0DEB90846B0B3CEEAB794CE1098FBEAAEDB474F133443DF529C239
26,181,203 UART: [art] PUB.Y = 6D3F211A42BAD316077BE95A23D993ED063AC8987044055D478ACF736952D98CB36BB0C320E8100AF010C15514B03387
26,188,410 UART: [art] SIG.R = 10DDC31A2770BBA64EE5A49455B6129AC99AE7A2686A36829516391C3CD00B20F3E3D9A46956ED752C2A6D9651A9B232
26,195,801 UART: [art] SIG.S = 48B3FCAF2898865B707E21651A0598213F5A25F791707A6739A93377EBB7BCB948E72053B85C49E539F66B0AB1F5C4CC
27,174,889 UART: Caliptra RT
27,175,587 UART: [state] CFI Enabled
27,339,282 UART: [rt] RT listening for mailbox commands...
27,341,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,497,585 UART: [rt]cmd =0x41544d4e, len=14344
32,288,089 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,463 UART:
192,854 UART: Running Caliptra ROM ...
194,036 UART:
603,448 UART: [state] CFI Enabled
620,325 UART: [state] LifecycleState = Unprovisioned
622,678 UART: [state] DebugLocked = No
624,118 UART: [state] WD Timer not started. Device not locked for debugging
628,899 UART: [kat] SHA2-256
818,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,586 UART: [kat] ++
830,105 UART: [kat] sha1
842,488 UART: [kat] SHA2-256
845,458 UART: [kat] SHA2-384
852,090 UART: [kat] SHA2-512-ACC
854,673 UART: [kat] ECC-384
3,296,109 UART: [kat] HMAC-384Kdf
3,309,620 UART: [kat] LMS
3,841,417 UART: [kat] --
3,846,908 UART: [cold-reset] ++
3,848,264 UART: [fht] FHT @ 0x50003400
3,859,868 UART: [idev] ++
3,860,562 UART: [idev] CDI.KEYID = 6
3,861,537 UART: [idev] SUBJECT.KEYID = 7
3,862,699 UART: [idev] UDS.KEYID = 0
3,863,613 ready_for_fw is high
3,863,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,632 UART: [idev] Erasing UDS.KEYID = 0
6,339,737 UART: [idev] Sha1 KeyId Algorithm
6,361,501 UART: [idev] --
6,366,818 UART: [ldev] ++
6,367,495 UART: [ldev] CDI.KEYID = 6
6,368,555 UART: [ldev] SUBJECT.KEYID = 5
6,369,651 UART: [ldev] AUTHORITY.KEYID = 7
6,370,841 UART: [ldev] FE.KEYID = 1
6,381,697 UART: [ldev] Erasing FE.KEYID = 1
8,859,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,198 UART: [ldev] --
10,648,100 UART: [fwproc] Wait for Commands...
10,649,802 UART: [fwproc] Recv command 0x46574c44
10,652,100 UART: [fwproc] Recv'd Img size: 114448 bytes
15,289,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,374,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,491,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,034,056 >>> mbox cmd response: success
16,037,586 UART: [afmc] ++
16,038,317 UART: [afmc] CDI.KEYID = 6
16,039,508 UART: [afmc] SUBJECT.KEYID = 7
16,041,004 UART: [afmc] AUTHORITY.KEYID = 5
18,545,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,266,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,268,008 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,283,086 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,298,278 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,313,125 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,338,081 UART: [afmc] --
20,342,534 UART: [cold-reset] --
20,346,448 UART: [state] Locking Datavault
20,352,814 UART: [state] Locking PCR0, PCR1 and PCR31
20,354,961 UART: [state] Locking ICCM
20,356,058 UART: [exit] Launching FMC @ 0x40000130
20,364,694 UART:
20,364,985 UART: Running Caliptra FMC ...
20,366,091 UART:
20,366,253 UART: [state] CFI Enabled
20,374,077 UART: [fht] FMC Alias Private Key: 7
22,131,481 UART: [art] Extend RT PCRs Done
22,132,700 UART: [art] Lock RT PCRs Done
22,134,266 UART: [art] Populate DV Done
22,139,399 UART: [fht] FMC Alias Private Key: 7
22,141,096 UART: [art] Derive CDI
22,141,912 UART: [art] Store in in slot 0x4
22,184,718 UART: [art] Derive Key Pair
22,185,713 UART: [art] Store priv key in slot 0x5
24,612,220 UART: [art] Derive Key Pair - Done
24,625,756 UART: [art] Signing Cert with AUTHO
24,627,055 UART: RITY.KEYID = 7
26,332,593 UART: [art] Erasing AUTHORITY.KEYID = 7
26,334,114 UART: [art] PUB.X = 01E85D751C07720A7D668CF3FDAA918C5B25FE2F750FE7C364B0D62D80771B3D689C3078B5F4B0A0193659758C1ACCD1
26,341,335 UART: [art] PUB.Y = 1888B050B5CB3CF953C961049CD49639F86AFA5CCAFB4018FD49CA76AEC2D6A5629ECFCCCCECCBB7E6C9260C9285CD24
26,348,640 UART: [art] SIG.R = 18CF75F94687F672733526A31055A296A59103FCDE8E5EC839862DAA9621C8921EA3401A9455C91320C1579255182F4B
26,355,955 UART: [art] SIG.S = 0FD133EDEF452E33B3934D305CC0ADD11995ED694A757E73995B16069DE912F56B4EEF507EC07B4BC3258DA7167988D1
27,334,477 UART: Caliptra RT
27,335,182 UART: [state] CFI Enabled
27,451,594 UART: [rt] RT listening for mailbox commands...
27,453,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,609,419 UART: [rt]cmd =0x41544d4e, len=14344
32,400,283 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,750,998 ready_for_fw is high
3,751,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,079,015 >>> mbox cmd response: success
20,335,802 UART:
20,336,206 UART: Running Caliptra FMC ...
20,337,339 UART:
20,337,493 UART: [state] CFI Enabled
20,345,198 UART: [fht] FMC Alias Private Key: 7
22,102,319 UART: [art] Extend RT PCRs Done
22,103,574 UART: [art] Lock RT PCRs Done
22,104,932 UART: [art] Populate DV Done
22,110,539 UART: [fht] FMC Alias Private Key: 7
22,112,234 UART: [art] Derive CDI
22,113,044 UART: [art] Store in in slot 0x4
22,155,649 UART: [art] Derive Key Pair
22,156,641 UART: [art] Store priv key in slot 0x5
24,583,232 UART: [art] Derive Key Pair - Done
24,595,958 UART: [art] Signing Cert with AUTHO
24,597,264 UART: RITY.KEYID = 7
26,302,597 UART: [art] Erasing AUTHORITY.KEYID = 7
26,304,099 UART: [art] PUB.X = 91F3438DC85E27A187E84B733E795FFA1735E859A517D9CB2D7193DDC58756FCF79ED84CF64AF19F2A775873F4A502EA
26,311,344 UART: [art] PUB.Y = FDE0F34D31801BC6DC05EB8E652CBC255AB8568F027A552DC9E5AE27432E6CDC8D0E02EAD7B53E248F9B676E179FAA8F
26,318,637 UART: [art] SIG.R = 1E14373575E8D45E98CDC65231A89E892684A0DF15AFA476B175E5B1501C9AB96C1CB1976B529EE2A02FF48495BDC460
26,326,009 UART: [art] SIG.S = B0075C2A8BEBC04CEA9524E5570987F2749A26C4C1694F17253CC5153A6A1E2107544C32781B9E5B7A4C09B3EBF7DA8F
27,305,736 UART: Caliptra RT
27,306,463 UART: [state] CFI Enabled
27,423,265 UART: [rt] RT listening for mailbox commands...
27,425,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,580,729 UART: [rt]cmd =0x41544d4e, len=14344
32,363,189 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,067 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 ready_for_fw is high
1,480,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,440 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,471 UART: [ldev] ++
1,514,639 UART: [ldev] CDI.KEYID = 6
1,515,002 UART: [ldev] SUBJECT.KEYID = 5
1,515,428 UART: [ldev] AUTHORITY.KEYID = 7
1,515,891 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,692 UART: [ldev] --
1,585,985 UART: [fwproc] Waiting for Commands...
1,586,692 UART: [fwproc] Received command 0x46574c44
1,587,483 UART: [fwproc] Received Image of size 114448 bytes
5,235,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,263,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,428,795 >>> mbox cmd response: success
5,430,021 UART: [afmc] ++
5,430,189 UART: [afmc] CDI.KEYID = 6
5,430,551 UART: [afmc] SUBJECT.KEYID = 7
5,430,976 UART: [afmc] AUTHORITY.KEYID = 5
5,465,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,482,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,866 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,488,575 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,494,467 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,500,168 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,508,060 UART: [afmc] --
5,509,136 UART: [cold-reset] --
5,509,794 UART: [state] Locking Datavault
5,511,083 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,687 UART: [state] Locking ICCM
5,512,163 UART: [exit] Launching FMC @ 0x40000130
5,517,492 UART:
5,517,508 UART: Running Caliptra FMC ...
5,517,916 UART:
5,517,970 UART: [state] CFI Enabled
5,528,172 UART: [fht] FMC Alias Private Key: 7
5,635,792 UART: [art] Extend RT PCRs Done
5,636,220 UART: [art] Lock RT PCRs Done
5,637,974 UART: [art] Populate DV Done
5,645,832 UART: [fht] FMC Alias Private Key: 7
5,646,772 UART: [art] Derive CDI
5,647,052 UART: [art] Store in in slot 0x4
5,732,609 UART: [art] Derive Key Pair
5,732,969 UART: [art] Store priv key in slot 0x5
5,746,983 UART: [art] Derive Key Pair - Done
5,761,656 UART: [art] Signing Cert with AUTHO
5,762,136 UART: RITY.KEYID = 7
5,777,352 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,117 UART: [art] PUB.X = CFA2CD206D4596EF9B6B393068D2250528793EAC60C05233E270F3954EB6B50C174954A9FA5D20D0B06680E9C77EAE2D
5,784,885 UART: [art] PUB.Y = 1F7A672B6697AD56B45971F7197DE47D2C273F9A0A15C511A8C874FE27DFAEA2C08B52ED9C2B26B178B7C4F7712AAB3A
5,791,846 UART: [art] SIG.R = 38B1E41659BDC32EB4F2AEA685935D7E5D5F22B0E16C2769F3E6287B8FD68BFC469EE5E6C1EA2943D216646E08AB17B1
5,798,625 UART: [art] SIG.S = A7F6E72761BE53EC0B88C983BA948A030A57056DEFAEF71C22AE17C0EC2F267F0EB74F56929B3F3D803173621219B51A
5,822,369 UART: Caliptra RT
5,822,622 UART: [state] CFI Enabled
5,930,509 UART: [rt] RT listening for mailbox commands...
5,931,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,459 UART: [rt]cmd =0x41544d4e, len=14344
7,282,594 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,019 ready_for_fw is high
1,362,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,127,699 >>> mbox cmd response: success
5,190,522 UART:
5,190,538 UART: Running Caliptra FMC ...
5,190,946 UART:
5,191,000 UART: [state] CFI Enabled
5,201,334 UART: [fht] FMC Alias Private Key: 7
5,309,378 UART: [art] Extend RT PCRs Done
5,309,806 UART: [art] Lock RT PCRs Done
5,311,580 UART: [art] Populate DV Done
5,319,636 UART: [fht] FMC Alias Private Key: 7
5,320,784 UART: [art] Derive CDI
5,321,064 UART: [art] Store in in slot 0x4
5,407,081 UART: [art] Derive Key Pair
5,407,441 UART: [art] Store priv key in slot 0x5
5,420,663 UART: [art] Derive Key Pair - Done
5,435,291 UART: [art] Signing Cert with AUTHO
5,435,771 UART: RITY.KEYID = 7
5,450,697 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,462 UART: [art] PUB.X = CCEE095FF61AD732CE04B4E909FA262DECB2758F4DFC0273B49C1B148C833E5384727F9B8A90B5ABE9D944CC773219B8
5,458,234 UART: [art] PUB.Y = CF5BB40C0A2AD6BDB3967FDE5D865EAC2ACD59363ACFAB701841E0ED64F6825E8AE1F4858B9CDE642A773E2AA7BFC89B
5,465,208 UART: [art] SIG.R = F2D9A7D363170E456183BBEC4738DC245CFB778EF50ED1273B91A0BCE77B323E6FE652AF8E091D7730B94E243F5787AA
5,471,979 UART: [art] SIG.S = E3FA7379805BFC031C839A38907B180E4054A3C239263466D42AC9A8B27A9AA7E1A04A4815BE55911CDB2DBE8B0A9512
5,496,209 UART: Caliptra RT
5,496,462 UART: [state] CFI Enabled
5,604,532 UART: [rt] RT listening for mailbox commands...
5,605,202 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,728,252 UART: [rt]cmd =0x41544d4e, len=14344
6,965,917 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,477,234 UART: [cold-reset] ++
1,477,670 UART: [fht] Storing FHT @ 0x50003400
1,480,493 UART: [idev] ++
1,480,661 UART: [idev] CDI.KEYID = 6
1,481,021 UART: [idev] SUBJECT.KEYID = 7
1,481,445 UART: [idev] UDS.KEYID = 0
1,481,790 ready_for_fw is high
1,481,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,053 UART: [idev] Erasing UDS.KEYID = 0
1,506,569 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,125 UART: [idev] --
1,516,096 UART: [ldev] ++
1,516,264 UART: [ldev] CDI.KEYID = 6
1,516,627 UART: [ldev] SUBJECT.KEYID = 5
1,517,053 UART: [ldev] AUTHORITY.KEYID = 7
1,517,516 UART: [ldev] FE.KEYID = 1
1,523,080 UART: [ldev] Erasing FE.KEYID = 1
1,548,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,145 UART: [ldev] --
1,587,516 UART: [fwproc] Waiting for Commands...
1,588,267 UART: [fwproc] Received command 0x46574c44
1,589,058 UART: [fwproc] Received Image of size 114448 bytes
5,048,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,077,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,106,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,242,659 >>> mbox cmd response: success
5,243,903 UART: [afmc] ++
5,244,071 UART: [afmc] CDI.KEYID = 6
5,244,433 UART: [afmc] SUBJECT.KEYID = 7
5,244,858 UART: [afmc] AUTHORITY.KEYID = 5
5,280,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,296,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,297,586 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,303,295 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,309,187 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,314,888 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,322,660 UART: [afmc] --
5,323,606 UART: [cold-reset] --
5,324,452 UART: [state] Locking Datavault
5,325,707 UART: [state] Locking PCR0, PCR1 and PCR31
5,326,311 UART: [state] Locking ICCM
5,326,931 UART: [exit] Launching FMC @ 0x40000130
5,332,260 UART:
5,332,276 UART: Running Caliptra FMC ...
5,332,684 UART:
5,332,827 UART: [state] CFI Enabled
5,343,503 UART: [fht] FMC Alias Private Key: 7
5,451,951 UART: [art] Extend RT PCRs Done
5,452,379 UART: [art] Lock RT PCRs Done
5,454,145 UART: [art] Populate DV Done
5,462,253 UART: [fht] FMC Alias Private Key: 7
5,463,377 UART: [art] Derive CDI
5,463,657 UART: [art] Store in in slot 0x4
5,549,458 UART: [art] Derive Key Pair
5,549,818 UART: [art] Store priv key in slot 0x5
5,563,324 UART: [art] Derive Key Pair - Done
5,578,072 UART: [art] Signing Cert with AUTHO
5,578,552 UART: RITY.KEYID = 7
5,593,790 UART: [art] Erasing AUTHORITY.KEYID = 7
5,594,555 UART: [art] PUB.X = 3E1D5394F1951158EC2606E3CF0E9DFF19BB282062049DA107A27783D40777B7CC18E569FEA1A8ECB93AAB2F7072527D
5,601,316 UART: [art] PUB.Y = BBFE0D2DF08383600E3FE93960A61254B44CE706A6F01FB4A53665FA74CB4BC8DCC0A98DF48D77B9F4D027345C1F0911
5,608,266 UART: [art] SIG.R = 5F627113156C82F4B885471317C09C9F7114DC99BD64F18648653482D3B867454CAB005538AA69D6BC832271C8C92635
5,615,000 UART: [art] SIG.S = B659E2C789489FE4B356B90613CFB8AB5F1C3A8BBAE6A1ACE2E4685C6D214DA7457E1FE0285D3C94400FD019BBEB451D
5,638,787 UART: Caliptra RT
5,639,132 UART: [state] CFI Enabled
5,747,577 UART: [rt] RT listening for mailbox commands...
5,748,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,871,413 UART: [rt]cmd =0x41544d4e, len=14344
7,109,172 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 ready_for_fw is high
1,363,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,205,346 >>> mbox cmd response: success
5,266,759 UART:
5,266,775 UART: Running Caliptra FMC ...
5,267,183 UART:
5,267,326 UART: [state] CFI Enabled
5,278,130 UART: [fht] FMC Alias Private Key: 7
5,385,628 UART: [art] Extend RT PCRs Done
5,386,056 UART: [art] Lock RT PCRs Done
5,387,640 UART: [art] Populate DV Done
5,395,686 UART: [fht] FMC Alias Private Key: 7
5,396,672 UART: [art] Derive CDI
5,396,952 UART: [art] Store in in slot 0x4
5,482,677 UART: [art] Derive Key Pair
5,483,037 UART: [art] Store priv key in slot 0x5
5,496,951 UART: [art] Derive Key Pair - Done
5,511,906 UART: [art] Signing Cert with AUTHO
5,512,386 UART: RITY.KEYID = 7
5,527,686 UART: [art] Erasing AUTHORITY.KEYID = 7
5,528,451 UART: [art] PUB.X = 9073744AF15B7DBA9EC0351F82F45D53BD91FA1B74D3A8B575CB51BF88EF673934F18F1DB7AB664AF3CDBAA52C599266
5,535,237 UART: [art] PUB.Y = D5BA8F2B19CEAF5C2D766569C74EEF8C23A6D3DAF81B7D17F756A264BE507568C7CBDC06A7BE5659C14F3296991A4702
5,542,195 UART: [art] SIG.R = 9CF9B3FD6C43B6A871EA06DD96086873630B2B57EA6450375028E93231D2CDE961E2686DE329AD834A453E78ABCB89C9
5,548,960 UART: [art] SIG.S = CABF0340F44731CC93C37655BC64472F6207612C7EC1F4DBDA94FABBC6CE683026402549CED22FA1FF8CD83ED92317BA
5,572,863 UART: Caliptra RT
5,573,208 UART: [state] CFI Enabled
5,682,126 UART: [rt] RT listening for mailbox commands...
5,682,796 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,805,904 UART: [rt]cmd =0x41544d4e, len=14344
7,038,769 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,791 UART: [kat] SHA2-256
903,731 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,390 UART: [kat] LMS
1,170,718 UART: [kat] --
1,171,461 UART: [cold-reset] ++
1,171,921 UART: [fht] FHT @ 0x50003400
1,174,726 UART: [idev] ++
1,174,894 UART: [idev] CDI.KEYID = 6
1,175,254 UART: [idev] SUBJECT.KEYID = 7
1,175,678 UART: [idev] UDS.KEYID = 0
1,176,023 ready_for_fw is high
1,176,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,055 UART: [ldev] Erasing FE.KEYID = 1
1,243,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,894 UART: [fwproc] Wait for Commands...
1,283,644 UART: [fwproc] Recv command 0x46574c44
1,284,372 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,065 >>> mbox cmd response: success
3,324,093 UART: [afmc] ++
3,324,261 UART: [afmc] CDI.KEYID = 6
3,324,623 UART: [afmc] SUBJECT.KEYID = 7
3,325,048 UART: [afmc] AUTHORITY.KEYID = 5
3,360,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,205 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,914 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,806 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,517 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,370 UART: [afmc] --
3,403,358 UART: [cold-reset] --
3,404,292 UART: [state] Locking Datavault
3,405,319 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,923 UART: [state] Locking ICCM
3,406,343 UART: [exit] Launching FMC @ 0x40000130
3,411,672 UART:
3,411,688 UART: Running Caliptra FMC ...
3,412,096 UART:
3,412,150 UART: [state] CFI Enabled
3,422,482 UART: [fht] FMC Alias Private Key: 7
3,530,264 UART: [art] Extend RT PCRs Done
3,530,692 UART: [art] Lock RT PCRs Done
3,532,300 UART: [art] Populate DV Done
3,540,642 UART: [fht] FMC Alias Private Key: 7
3,541,638 UART: [art] Derive CDI
3,541,918 UART: [art] Store in in slot 0x4
3,627,791 UART: [art] Derive Key Pair
3,628,151 UART: [art] Store priv key in slot 0x5
3,641,493 UART: [art] Derive Key Pair - Done
3,656,129 UART: [art] Signing Cert with AUTHO
3,656,609 UART: RITY.KEYID = 7
3,671,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,368 UART: [art] PUB.X = 9976549DF0D3255D852A2391AE0E7854AED72DFE599DC33CA197A1DE42E2AD2ADE67D10FEC162E974CD4B7464934481E
3,679,142 UART: [art] PUB.Y = E41B5E84FCDD824C92F72BB6A3EEBE730C1880C5EF412BD83AECDFED5A687ABB7450FE04E356A4CB29876AE95E1CA926
3,686,112 UART: [art] SIG.R = 48EAD20D1C881DB2C5E8B4C472B6D2DC8B1756BF0D3707E28F1530E6D4B25524E545A144AABB9D041CA4F06E0C75F11F
3,692,881 UART: [art] SIG.S = DE2146A10401229CA215B02E2C96331F088F7F8A78F530E2A3BA94346CEC49B0F32C71FC68DCE2D4870363EC4FC599FB
3,716,812 UART: Caliptra RT
3,717,065 UART: [state] CFI Enabled
3,824,459 UART: [rt] RT listening for mailbox commands...
3,825,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,991 UART: [rt]cmd =0x41544d4e, len=14344
5,168,339 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,397 ready_for_fw is high
1,059,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,826 >>> mbox cmd response: success
3,232,727 UART:
3,232,743 UART: Running Caliptra FMC ...
3,233,151 UART:
3,233,205 UART: [state] CFI Enabled
3,243,273 UART: [fht] FMC Alias Private Key: 7
3,351,199 UART: [art] Extend RT PCRs Done
3,351,627 UART: [art] Lock RT PCRs Done
3,353,211 UART: [art] Populate DV Done
3,361,537 UART: [fht] FMC Alias Private Key: 7
3,362,613 UART: [art] Derive CDI
3,362,893 UART: [art] Store in in slot 0x4
3,448,502 UART: [art] Derive Key Pair
3,448,862 UART: [art] Store priv key in slot 0x5
3,462,010 UART: [art] Derive Key Pair - Done
3,476,458 UART: [art] Signing Cert with AUTHO
3,476,938 UART: RITY.KEYID = 7
3,491,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,369 UART: [art] PUB.X = 14FFA7450E8E7693EE4E1BC1CCD334D4CEA7CD1A8F8B48B3604F933B8C29B2202A7B9F600A5FE3FCD872C38E823C3982
3,499,149 UART: [art] PUB.Y = C5C63C41DDA186B585C023DD7AA0D53E828DBCAB43F529428CC10102DA30F529DA64F71116DE82C55F23593ADDB8E85F
3,506,107 UART: [art] SIG.R = F839586F1984D19179E4D220673784DF62DA6A71FAFA7EDCCD1BABD8A555915B6307CE60ED09594BB6E3FDC826F5256A
3,512,883 UART: [art] SIG.S = 14471D716BA3FBA312A7FABC973E896F0DB9FA1ADA1F3B08D120FE1AD77981A988C8102B68CE0B1BC9214EB0397F63A4
3,536,257 UART: Caliptra RT
3,536,510 UART: [state] CFI Enabled
3,643,058 UART: [rt] RT listening for mailbox commands...
3,643,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,702 UART: [rt]cmd =0x41544d4e, len=14344
4,992,042 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,667 UART: [kat] SHA2-512-ACC
908,568 UART: [kat] ECC-384
918,225 UART: [kat] HMAC-384Kdf
922,785 UART: [kat] LMS
1,171,113 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,592 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 ready_for_fw is high
1,176,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,068 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,786 UART: [ldev] ++
1,210,954 UART: [ldev] CDI.KEYID = 6
1,211,317 UART: [ldev] SUBJECT.KEYID = 5
1,211,743 UART: [ldev] AUTHORITY.KEYID = 7
1,212,206 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,542 UART: [ldev] --
1,284,045 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,409 >>> mbox cmd response: success
3,323,501 UART: [afmc] ++
3,323,669 UART: [afmc] CDI.KEYID = 6
3,324,031 UART: [afmc] SUBJECT.KEYID = 7
3,324,456 UART: [afmc] AUTHORITY.KEYID = 5
3,359,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,279 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,988 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,880 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,591 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,498 UART: [afmc] --
3,403,540 UART: [cold-reset] --
3,404,376 UART: [state] Locking Datavault
3,405,723 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,327 UART: [state] Locking ICCM
3,406,851 UART: [exit] Launching FMC @ 0x40000130
3,412,180 UART:
3,412,196 UART: Running Caliptra FMC ...
3,412,604 UART:
3,412,747 UART: [state] CFI Enabled
3,423,331 UART: [fht] FMC Alias Private Key: 7
3,530,963 UART: [art] Extend RT PCRs Done
3,531,391 UART: [art] Lock RT PCRs Done
3,532,889 UART: [art] Populate DV Done
3,541,327 UART: [fht] FMC Alias Private Key: 7
3,542,273 UART: [art] Derive CDI
3,542,553 UART: [art] Store in in slot 0x4
3,628,180 UART: [art] Derive Key Pair
3,628,540 UART: [art] Store priv key in slot 0x5
3,642,106 UART: [art] Derive Key Pair - Done
3,656,772 UART: [art] Signing Cert with AUTHO
3,657,252 UART: RITY.KEYID = 7
3,671,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,651 UART: [art] PUB.X = DA9A245F1A35CA051EA97B699CF71635891F6901C58166D24652CF4775052D752B099C94AB4ED592CABEBEC5F1BDB28F
3,679,419 UART: [art] PUB.Y = 1D58F79C59CC530151820D237987C77D0208EC1748D61355DE78D2601E6601A85E55596EC65F83167481F7BA67C57910
3,686,340 UART: [art] SIG.R = 75E4BF1369001A4F784C970363CC68012562F1DE86B67868F00C1204B8144A6EC9CFD25A65A41055A998227D1414D041
3,693,066 UART: [art] SIG.S = A45E32E77CA56E1178E9393D4CAC0D1D53CCA4C4E2F897E679D6280F416AA9E8B106F2A499276B0BA0818CC93BFA622E
3,716,695 UART: Caliptra RT
3,717,040 UART: [state] CFI Enabled
3,825,478 UART: [rt] RT listening for mailbox commands...
3,826,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,182 UART: [rt]cmd =0x41544d4e, len=14344
5,184,302 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,638 ready_for_fw is high
1,060,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,134 >>> mbox cmd response: success
3,232,551 UART:
3,232,567 UART: Running Caliptra FMC ...
3,232,975 UART:
3,233,118 UART: [state] CFI Enabled
3,243,618 UART: [fht] FMC Alias Private Key: 7
3,352,376 UART: [art] Extend RT PCRs Done
3,352,804 UART: [art] Lock RT PCRs Done
3,354,356 UART: [art] Populate DV Done
3,362,278 UART: [fht] FMC Alias Private Key: 7
3,363,218 UART: [art] Derive CDI
3,363,498 UART: [art] Store in in slot 0x4
3,448,951 UART: [art] Derive Key Pair
3,449,311 UART: [art] Store priv key in slot 0x5
3,463,265 UART: [art] Derive Key Pair - Done
3,477,801 UART: [art] Signing Cert with AUTHO
3,478,281 UART: RITY.KEYID = 7
3,493,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,246 UART: [art] PUB.X = B996F2889533065ADB6C879274A404209070F1E3F2FC56E0BC7C0AD623C7EB7B1B79A81B148AA1A77F168439B8A8B9C9
3,501,011 UART: [art] PUB.Y = 09AB6BBC19582430929D31548ACFB304F775F2F72D1FEFC44E3BB9BFC1CADF9727A676895666892379193D2A7BA3C288
3,507,961 UART: [art] SIG.R = DD1EFFE9C8BA69E89D890B9C7BD2E56BC16F408FB312186ED3E37AD1C95493FCF32BA3ADDE39DED4238FBC582860E7C3
3,514,754 UART: [art] SIG.S = 9625EC9E70E6641F8A7BC767137F04BAA3B1DB82D82544360092E68136245C9E0B968CE83489ECB596E40160EC3FEDE3
3,538,948 UART: Caliptra RT
3,539,293 UART: [state] CFI Enabled
3,646,226 UART: [rt] RT listening for mailbox commands...
3,646,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,034 UART: [rt]cmd =0x41544d4e, len=14344
5,003,345 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 ready_for_fw is high
1,174,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,235 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114448 bytes
3,117,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,310,646 >>> mbox cmd response: success
3,311,871 UART: [afmc] ++
3,312,039 UART: [afmc] CDI.KEYID = 6
3,312,402 UART: [afmc] SUBJECT.KEYID = 7
3,312,828 UART: [afmc] AUTHORITY.KEYID = 5
3,348,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,883 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,593 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,483 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,194 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,176 UART: [afmc] --
3,392,294 UART: [cold-reset] --
3,393,280 UART: [state] Locking Datavault
3,394,393 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,997 UART: [state] Locking ICCM
3,395,443 UART: [exit] Launching FMC @ 0x40000130
3,400,772 UART:
3,400,788 UART: Running Caliptra FMC ...
3,401,196 UART:
3,401,250 UART: [state] CFI Enabled
3,411,746 UART: [fht] FMC Alias Private Key: 7
3,518,786 UART: [art] Extend RT PCRs Done
3,519,214 UART: [art] Lock RT PCRs Done
3,520,578 UART: [art] Populate DV Done
3,528,736 UART: [fht] FMC Alias Private Key: 7
3,529,724 UART: [art] Derive CDI
3,530,004 UART: [art] Store in in slot 0x4
3,615,511 UART: [art] Derive Key Pair
3,615,871 UART: [art] Store priv key in slot 0x5
3,628,927 UART: [art] Derive Key Pair - Done
3,643,674 UART: [art] Signing Cert with AUTHO
3,644,154 UART: RITY.KEYID = 7
3,659,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,259 UART: [art] PUB.X = C5764C4841AFE41DEC4B4839DAC8E3BF1A9F3F0CDD5839AE02E40B42AA57BD902AD057F20907CC28A3DDAFB12D60CF48
3,667,038 UART: [art] PUB.Y = 9EB9BFA2F0724931C3E5929CC29DCDBE546D3C513466E9072B94281A2A184E00778E20FFECEBA4E13C750FE58510B43E
3,673,970 UART: [art] SIG.R = 3C68DAAF32BAAA41CF62E0A7F6D9613233F170DDF50B04BDFD64B14C0133FE899165BB56327FB0A2690FBC0D83911B1F
3,680,741 UART: [art] SIG.S = A7494F88C7AA0EB3C8540ED9F43B09EFCC42EC150EFC24D7EFEADBAD12B1A3162440E2FF03F24C68917FF7CE03F6B77C
3,704,318 UART: Caliptra RT
3,704,571 UART: [state] CFI Enabled
3,812,371 UART: [rt] RT listening for mailbox commands...
3,813,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,193 UART: [rt]cmd =0x41544d4e, len=14344
5,176,813 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,108 ready_for_fw is high
1,056,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,159,137 >>> mbox cmd response: success
3,220,134 UART:
3,220,150 UART: Running Caliptra FMC ...
3,220,558 UART:
3,220,612 UART: [state] CFI Enabled
3,230,980 UART: [fht] FMC Alias Private Key: 7
3,337,896 UART: [art] Extend RT PCRs Done
3,338,324 UART: [art] Lock RT PCRs Done
3,340,090 UART: [art] Populate DV Done
3,348,048 UART: [fht] FMC Alias Private Key: 7
3,349,116 UART: [art] Derive CDI
3,349,396 UART: [art] Store in in slot 0x4
3,435,187 UART: [art] Derive Key Pair
3,435,547 UART: [art] Store priv key in slot 0x5
3,448,773 UART: [art] Derive Key Pair - Done
3,463,523 UART: [art] Signing Cert with AUTHO
3,464,003 UART: RITY.KEYID = 7
3,479,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,864 UART: [art] PUB.X = C748F0B751F63D092D8C1A8C725DA8053AEC626201B29C40EA0A4B4AC349EE6DFF9D1D49AA30BEE57DD033A74FCD4A5A
3,486,644 UART: [art] PUB.Y = BB65CE7E9F81B45E2C9B227DF2D4127DCBEC3CEE1FA0161031130004B83A0A55249E8641843A20D1E9A21BB9E97C703F
3,493,576 UART: [art] SIG.R = 08E91A5AB5237B69126381119FD3938CE867AF50B406A730872505A6A75468D045AA2FDD6D567A103798BDAC2FA175D6
3,500,335 UART: [art] SIG.S = B1F4C9C8367A0D34C3F9BE1CB0DDD296AAF80625818757E945BA6905D6C93D55C6FC9A2F91CCB773FBE621BDF80B3FA9
3,524,136 UART: Caliptra RT
3,524,389 UART: [state] CFI Enabled
3,632,203 UART: [rt] RT listening for mailbox commands...
3,632,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,135 UART: [rt]cmd =0x41544d4e, len=14344
4,996,013 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 ready_for_fw is high
1,174,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,329 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,956 >>> mbox cmd response: success
3,320,987 UART: [afmc] ++
3,321,155 UART: [afmc] CDI.KEYID = 6
3,321,518 UART: [afmc] SUBJECT.KEYID = 7
3,321,944 UART: [afmc] AUTHORITY.KEYID = 5
3,357,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,323 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,033 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,923 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,634 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,488 UART: [afmc] --
3,401,490 UART: [cold-reset] --
3,402,304 UART: [state] Locking Datavault
3,403,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,065 UART: [state] Locking ICCM
3,404,491 UART: [exit] Launching FMC @ 0x40000130
3,409,820 UART:
3,409,836 UART: Running Caliptra FMC ...
3,410,244 UART:
3,410,387 UART: [state] CFI Enabled
3,420,843 UART: [fht] FMC Alias Private Key: 7
3,528,895 UART: [art] Extend RT PCRs Done
3,529,323 UART: [art] Lock RT PCRs Done
3,530,859 UART: [art] Populate DV Done
3,538,995 UART: [fht] FMC Alias Private Key: 7
3,539,955 UART: [art] Derive CDI
3,540,235 UART: [art] Store in in slot 0x4
3,625,806 UART: [art] Derive Key Pair
3,626,166 UART: [art] Store priv key in slot 0x5
3,639,816 UART: [art] Derive Key Pair - Done
3,654,485 UART: [art] Signing Cert with AUTHO
3,654,965 UART: RITY.KEYID = 7
3,670,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,794 UART: [art] PUB.X = F9EF06B19F65E19E12E84F00314B33BF4D5CA6D593393B54F6D0FD3955372A2AD0A9AD81701F2D345DFAACF32082EB33
3,677,551 UART: [art] PUB.Y = 983F8593B78E2F51622CFCA61B5BFBCCEA87F23EFED6A833E3D619BB919626644FD0EB6B79E89308BCC7369D94E8524B
3,684,512 UART: [art] SIG.R = 704941BAD707BA306131E0F781FB4E0DEB46E7FC037FC3A3F5423F1DCF23C4B834AF76BA0FA35FE332C05518D44C23E1
3,691,284 UART: [art] SIG.S = 3951578414E0A161DB222122FDE27473AB84CE19C941CC91A8C35372CBCAF083E44BE8651218004D63F9BB220C7EA78A
3,715,292 UART: Caliptra RT
3,715,637 UART: [state] CFI Enabled
3,822,800 UART: [rt] RT listening for mailbox commands...
3,823,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,522 UART: [rt]cmd =0x41544d4e, len=14344
5,194,473 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,857 ready_for_fw is high
1,056,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,159,564 >>> mbox cmd response: success
3,221,941 UART:
3,221,957 UART: Running Caliptra FMC ...
3,222,365 UART:
3,222,508 UART: [state] CFI Enabled
3,233,192 UART: [fht] FMC Alias Private Key: 7
3,342,172 UART: [art] Extend RT PCRs Done
3,342,600 UART: [art] Lock RT PCRs Done
3,344,120 UART: [art] Populate DV Done
3,352,218 UART: [fht] FMC Alias Private Key: 7
3,353,334 UART: [art] Derive CDI
3,353,614 UART: [art] Store in in slot 0x4
3,439,533 UART: [art] Derive Key Pair
3,439,893 UART: [art] Store priv key in slot 0x5
3,453,307 UART: [art] Derive Key Pair - Done
3,467,870 UART: [art] Signing Cert with AUTHO
3,468,350 UART: RITY.KEYID = 7
3,483,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,163 UART: [art] PUB.X = 6AAD468E50DA0566BC9A4E78D607D66493B12A059449D3AA58156925EB135E14290BB269D4FD152660D6328124C2E008
3,490,912 UART: [art] PUB.Y = 23057FD3B24D7FBBCD15B83C23E4071620C1A1C69169787EC0C22FBDE0739F12311F84195A40E54BA28AC60B60206381
3,497,853 UART: [art] SIG.R = 2DC1394C4D4FE5BCE566B7BF6250068547398DF2CB5808C81AE811470DCE221ACF3B951C1DC2DA9B7BDDDB2E5A334D31
3,504,632 UART: [art] SIG.S = A7CFD327A6140AA785D48866BE1B7B480555312DD2F316EE4E514A9267043716A105D26B3D9ECE359D5A5DDC0F743C4B
3,528,494 UART: Caliptra RT
3,528,839 UART: [state] CFI Enabled
3,636,119 UART: [rt] RT listening for mailbox commands...
3,636,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,717 UART: [rt]cmd =0x41544d4e, len=14344
4,995,451 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,147 UART:
192,497 UART: Running Caliptra ROM ...
193,693 UART:
193,849 UART: [state] CFI Enabled
264,260 UART: [state] LifecycleState = Unprovisioned
266,226 UART: [state] DebugLocked = No
269,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,881 UART: [kat] SHA2-256
443,570 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,073 UART: [kat] ++
454,612 UART: [kat] sha1
466,347 UART: [kat] SHA2-256
469,063 UART: [kat] SHA2-384
475,194 UART: [kat] SHA2-512-ACC
477,558 UART: [kat] ECC-384
2,770,251 UART: [kat] HMAC-384Kdf
2,802,027 UART: [kat] LMS
3,992,309 UART: [kat] --
3,997,435 UART: [cold-reset] ++
3,999,020 UART: [fht] Storing FHT @ 0x50003400
4,011,993 UART: [idev] ++
4,012,567 UART: [idev] CDI.KEYID = 6
4,013,492 UART: [idev] SUBJECT.KEYID = 7
4,014,745 UART: [idev] UDS.KEYID = 0
4,015,794 ready_for_fw is high
4,016,007 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,629 UART: [idev] Erasing UDS.KEYID = 0
7,346,101 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,509 UART: [idev] --
7,371,638 UART: [ldev] ++
7,372,209 UART: [ldev] CDI.KEYID = 6
7,373,175 UART: [ldev] SUBJECT.KEYID = 5
7,374,389 UART: [ldev] AUTHORITY.KEYID = 7
7,375,619 UART: [ldev] FE.KEYID = 1
7,401,929 UART: [ldev] Erasing FE.KEYID = 1
10,736,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,500 UART: [ldev] --
13,117,583 UART: [fwproc] Waiting for Commands...
13,120,539 UART: [fwproc] Received command 0x46574c44
13,122,771 UART: [fwproc] Received Image of size 114124 bytes
21,760,225 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,843,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,912,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,229,303 >>> mbox cmd response: success
22,233,911 UART: [afmc] ++
22,234,504 UART: [afmc] CDI.KEYID = 6
22,235,420 UART: [afmc] SUBJECT.KEYID = 7
22,236,690 UART: [afmc] AUTHORITY.KEYID = 5
25,597,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,896,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,898,981 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,913,524 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,928,256 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,942,464 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,963,175 UART: [afmc] --
27,966,350 UART: [cold-reset] --
27,971,186 UART: [state] Locking Datavault
27,975,838 UART: [state] Locking PCR0, PCR1 and PCR31
27,977,535 UART: [state] Locking ICCM
27,978,817 UART: [exit] Launching FMC @ 0x40000130
27,987,209 UART:
27,987,451 UART: Running Caliptra FMC ...
27,988,554 UART:
27,988,717 UART: [state] CFI Enabled
28,055,450 UART: [fht] FMC Alias Private Key: 7
30,393,250 UART: [art] Extend RT PCRs Done
30,394,477 UART: [art] Lock RT PCRs Done
30,395,861 UART: [art] Populate DV Done
30,401,456 UART: [fht] FMC Alias Private Key: 7
30,403,053 UART: [art] Derive CDI
30,403,874 UART: [art] Store in in slot 0x4
30,463,510 UART: [art] Derive Key Pair
30,464,554 UART: [art] Store priv key in slot 0x5
33,757,513 UART: [art] Derive Key Pair - Done
33,770,183 UART: [art] Signing Cert with AUTHO
33,771,489 UART: RITY.KEYID = 7
36,058,650 UART: [art] Erasing AUTHORITY.KEYID = 7
36,060,153 UART: [art] PUB.X = 2A32C7F500803CF11D63442CB4308508BFCC96C44EDCA0208C9B550B91992A02756E28696F039169D71F05AFA929F37D
36,067,409 UART: [art] PUB.Y = 5A0C50F41B25B0E46E9F971550AC686F8BC109A59DFE36302809B1AF7D74095C8E478512D30031439DD5F3E0F6779BF5
36,074,652 UART: [art] SIG.R = 4CE0896DC9B9FB60893F267C8BDDF4D63EAA4E8DE4A1F4E4C655FD0475C15378D96E83D9218E91FDD603ADF330565DDC
36,082,056 UART: [art] SIG.S = 0D105482D9ED2AE6200CFEBF2EBAA4380F26B9796FECDCAF952E74F8E67746CA3F3624B706BE5216B20FA8712E5F426E
37,387,195 UART: Caliptra RT
37,387,901 UART: [state] CFI Enabled
37,548,232 UART: [rt] RT listening for mailbox commands...
37,550,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,705,940 UART: [rt]cmd =0x41544d4e, len=14344
41,814,870 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,886 writing to cptra_bootfsm_go
3,784,890 ready_for_fw is high
3,785,254 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,844,577 >>> mbox cmd response: success
27,541,495 UART:
27,541,867 UART: Running Caliptra FMC ...
27,543,017 UART:
27,543,182 UART: [state] CFI Enabled
27,612,128 UART: [fht] FMC Alias Private Key: 7
29,949,601 UART: [art] Extend RT PCRs Done
29,950,858 UART: [art] Lock RT PCRs Done
29,952,513 UART: [art] Populate DV Done
29,957,796 UART: [fht] FMC Alias Private Key: 7
29,959,341 UART: [art] Derive CDI
29,960,159 UART: [art] Store in in slot 0x4
30,020,145 UART: [art] Derive Key Pair
30,021,195 UART: [art] Store priv key in slot 0x5
33,313,847 UART: [art] Derive Key Pair - Done
33,326,741 UART: [art] Signing Cert with AUTHO
33,328,055 UART: RITY.KEYID = 7
35,614,941 UART: [art] Erasing AUTHORITY.KEYID = 7
35,616,458 UART: [art] PUB.X = 7CE9B168DF17819D4A4B243C659C9C50DED0FF8CF0CAAFA76DE66EBD3AA2257A8650094F44C7888AAF3FD5A65AE6EB9B
35,623,765 UART: [art] PUB.Y = 0F9F2A619BA203C1596AF7503E23AD05EEC0AB937EFF1C0EF8972825F83B05F749EF36122462DCF19917B4C40B4DC1A6
35,630,972 UART: [art] SIG.R = 76F1675DBECA431752B2C834163AAA5EBCEDDE65863242A388DED5D0B6C0C84CBA07B6F1004957A6A073AF89D39D70DB
35,638,371 UART: [art] SIG.S = 6F7C2C03D3C572B3E3152ABE8258BF3DCF3BB48F9D0A4334E16A4585CD8DA4A87F9BB1FD5BC8047E210BCE2684054563
36,943,201 UART: Caliptra RT
36,943,910 UART: [state] CFI Enabled
37,103,127 UART: [rt] RT listening for mailbox commands...
37,105,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,260,931 UART: [rt]cmd =0x41544d4e, len=14344
41,448,324 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,301 UART:
192,671 UART: Running Caliptra ROM ...
193,774 UART:
603,697 UART: [state] CFI Enabled
618,209 UART: [state] LifecycleState = Unprovisioned
620,135 UART: [state] DebugLocked = No
622,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,125 UART: [kat] SHA2-256
796,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,408 UART: [kat] ++
808,051 UART: [kat] sha1
819,576 UART: [kat] SHA2-256
822,288 UART: [kat] SHA2-384
829,647 UART: [kat] SHA2-512-ACC
831,984 UART: [kat] ECC-384
3,116,871 UART: [kat] HMAC-384Kdf
3,128,603 UART: [kat] LMS
4,318,770 UART: [kat] --
4,321,939 UART: [cold-reset] ++
4,323,665 UART: [fht] Storing FHT @ 0x50003400
4,334,356 UART: [idev] ++
4,334,985 UART: [idev] CDI.KEYID = 6
4,335,861 UART: [idev] SUBJECT.KEYID = 7
4,337,173 UART: [idev] UDS.KEYID = 0
4,338,122 ready_for_fw is high
4,338,319 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,633 UART: [idev] Erasing UDS.KEYID = 0
7,626,773 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,923 UART: [idev] --
7,652,323 UART: [ldev] ++
7,652,893 UART: [ldev] CDI.KEYID = 6
7,653,850 UART: [ldev] SUBJECT.KEYID = 5
7,655,054 UART: [ldev] AUTHORITY.KEYID = 7
7,656,354 UART: [ldev] FE.KEYID = 1
7,668,832 UART: [ldev] Erasing FE.KEYID = 1
10,957,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,364 UART: [ldev] --
13,318,801 UART: [fwproc] Waiting for Commands...
13,320,999 UART: [fwproc] Received command 0x46574c44
13,323,177 UART: [fwproc] Received Image of size 114124 bytes
22,350,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,428,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,497,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,813,611 >>> mbox cmd response: success
22,817,239 UART: [afmc] ++
22,817,850 UART: [afmc] CDI.KEYID = 6
22,818,813 UART: [afmc] SUBJECT.KEYID = 7
22,820,021 UART: [afmc] AUTHORITY.KEYID = 5
26,135,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,429,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,431,387 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,445,950 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,460,722 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,474,949 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,496,394 UART: [afmc] --
28,500,305 UART: [cold-reset] --
28,505,026 UART: [state] Locking Datavault
28,511,757 UART: [state] Locking PCR0, PCR1 and PCR31
28,513,524 UART: [state] Locking ICCM
28,514,711 UART: [exit] Launching FMC @ 0x40000130
28,523,109 UART:
28,523,370 UART: Running Caliptra FMC ...
28,524,473 UART:
28,524,635 UART: [state] CFI Enabled
28,532,620 UART: [fht] FMC Alias Private Key: 7
30,863,994 UART: [art] Extend RT PCRs Done
30,865,211 UART: [art] Lock RT PCRs Done
30,866,452 UART: [art] Populate DV Done
30,871,966 UART: [fht] FMC Alias Private Key: 7
30,873,607 UART: [art] Derive CDI
30,874,414 UART: [art] Store in in slot 0x4
30,916,633 UART: [art] Derive Key Pair
30,917,665 UART: [art] Store priv key in slot 0x5
34,159,379 UART: [art] Derive Key Pair - Done
34,172,431 UART: [art] Signing Cert with AUTHO
34,173,729 UART: RITY.KEYID = 7
36,453,222 UART: [art] Erasing AUTHORITY.KEYID = 7
36,454,741 UART: [art] PUB.X = 5E791E06B8681479C9F5A05FBFC195FB210C062CFB5A538FB0EFBD6A5EBB90E022E8118D3AD2D62F1549AE18F5411EB7
36,461,970 UART: [art] PUB.Y = 67F29022B1940795C53D07F0167CCAA53B3D6C4F6A3BA027F4CBACBF254B63860CA2BB576DDB9BBACACF360C0535768A
36,469,244 UART: [art] SIG.R = 9589CF4101C7FE2968243D473A3FBF5B2478963F02FE76FD02457BDEC45AE3F87D336547498312486C13157D90D22AA6
36,476,617 UART: [art] SIG.S = B6698F83416B1B78427C7139900610C9BE04CFCF40894AA2D9E5AA832AA68E788C49C183A715012EB4CC106C987CC8F7
37,782,415 UART: Caliptra RT
37,783,117 UART: [state] CFI Enabled
37,900,838 UART: [rt] RT listening for mailbox commands...
37,903,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,058,515 UART: [rt]cmd =0x41544d4e, len=14344
42,219,316 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
4,129,586 ready_for_fw is high
4,130,186 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,394,973 >>> mbox cmd response: success
28,037,902 UART:
28,038,295 UART: Running Caliptra FMC ...
28,039,599 UART:
28,039,765 UART: [state] CFI Enabled
28,047,703 UART: [fht] FMC Alias Private Key: 7
30,378,485 UART: [art] Extend RT PCRs Done
30,379,708 UART: [art] Lock RT PCRs Done
30,381,251 UART: [art] Populate DV Done
30,386,746 UART: [fht] FMC Alias Private Key: 7
30,388,233 UART: [art] Derive CDI
30,388,963 UART: [art] Store in in slot 0x4
30,431,818 UART: [art] Derive Key Pair
30,432,813 UART: [art] Store priv key in slot 0x5
33,674,468 UART: [art] Derive Key Pair - Done
33,687,748 UART: [art] Signing Cert with AUTHO
33,689,049 UART: RITY.KEYID = 7
35,968,257 UART: [art] Erasing AUTHORITY.KEYID = 7
35,969,760 UART: [art] PUB.X = 0571E861B88F0914A257E882BB5DADD83A6A4403D247A66A368AEE697FEEC954CF84545D542281CFDBB2F419307120F9
35,976,980 UART: [art] PUB.Y = 82C3893B74D4EBA68CA8A68F327DD82F4FAD6AD85D8AB187308B470331C83316DD92FD30BE4D150E12D4356ADEA6CC9C
35,984,235 UART: [art] SIG.R = 7B6F1D516C8AFCDDE66019D843D60D71B7D14BF19A117A0393CB2D3EC902E1FFF74C470C6B8AC59B10C9FE62A867FD1D
35,991,673 UART: [art] SIG.S = 26C5F8AAA45F46C21EEE517611C5829B83B8523DD85AE679493EBB097F8B0F0B50C9B58BA1CF92A88CCC52F05F0CAED8
37,296,814 UART: Caliptra RT
37,297,525 UART: [state] CFI Enabled
37,414,719 UART: [rt] RT listening for mailbox commands...
37,417,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,572,020 UART: [rt]cmd =0x41544d4e, len=14344
41,680,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,080 UART:
192,436 UART: Running Caliptra ROM ...
193,605 UART:
193,765 UART: [state] CFI Enabled
268,015 UART: [state] LifecycleState = Unprovisioned
269,934 UART: [state] DebugLocked = No
272,388 UART: [state] WD Timer not started. Device not locked for debugging
276,428 UART: [kat] SHA2-256
455,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,136 UART: [kat] ++
467,583 UART: [kat] sha1
478,341 UART: [kat] SHA2-256
481,385 UART: [kat] SHA2-384
487,591 UART: [kat] SHA2-512-ACC
490,528 UART: [kat] ECC-384
2,949,261 UART: [kat] HMAC-384Kdf
2,973,367 UART: [kat] LMS
3,502,810 UART: [kat] --
3,506,113 UART: [cold-reset] ++
3,507,828 UART: [fht] FHT @ 0x50003400
3,519,009 UART: [idev] ++
3,519,638 UART: [idev] CDI.KEYID = 6
3,520,530 UART: [idev] SUBJECT.KEYID = 7
3,521,589 UART: [idev] UDS.KEYID = 0
3,522,583 ready_for_fw is high
3,522,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,544 UART: [idev] Erasing UDS.KEYID = 0
6,023,953 UART: [idev] Sha1 KeyId Algorithm
6,047,776 UART: [idev] --
6,052,632 UART: [ldev] ++
6,053,207 UART: [ldev] CDI.KEYID = 6
6,054,123 UART: [ldev] SUBJECT.KEYID = 5
6,055,280 UART: [ldev] AUTHORITY.KEYID = 7
6,056,513 UART: [ldev] FE.KEYID = 1
6,102,207 UART: [ldev] Erasing FE.KEYID = 1
8,604,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,698 UART: [ldev] --
10,391,936 UART: [fwproc] Wait for Commands...
10,394,606 UART: [fwproc] Recv command 0x46574c44
10,396,710 UART: [fwproc] Recv'd Img size: 114448 bytes
14,981,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,056,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,125,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,442,860 >>> mbox cmd response: success
15,447,726 UART: [afmc] ++
15,448,329 UART: [afmc] CDI.KEYID = 6
15,449,242 UART: [afmc] SUBJECT.KEYID = 7
15,450,400 UART: [afmc] AUTHORITY.KEYID = 5
17,980,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,708,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,710,806 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,726,797 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,742,763 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,758,543 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,781,934 UART: [afmc] --
19,785,906 UART: [cold-reset] --
19,787,496 UART: [state] Locking Datavault
19,791,333 UART: [state] Locking PCR0, PCR1 and PCR31
19,793,027 UART: [state] Locking ICCM
19,794,425 UART: [exit] Launching FMC @ 0x40000130
19,802,869 UART:
19,803,098 UART: Running Caliptra FMC ...
19,804,199 UART:
19,804,361 UART: [state] CFI Enabled
19,867,239 UART: [fht] FMC Alias Private Key: 7
21,630,372 UART: [art] Extend RT PCRs Done
21,631,588 UART: [art] Lock RT PCRs Done
21,632,886 UART: [art] Populate DV Done
21,638,240 UART: [fht] FMC Alias Private Key: 7
21,639,936 UART: [art] Derive CDI
21,640,744 UART: [art] Store in in slot 0x4
21,700,061 UART: [art] Derive Key Pair
21,701,098 UART: [art] Store priv key in slot 0x5
24,164,066 UART: [art] Derive Key Pair - Done
24,177,060 UART: [art] Signing Cert with AUTHO
24,178,365 UART: RITY.KEYID = 7
25,890,194 UART: [art] Erasing AUTHORITY.KEYID = 7
25,891,683 UART: [art] PUB.X = 3C130E017815C8E5B77FABA18129F2EF3D082D8616065B3A8656487690F2D01150446F8BBC01309B1185E1BCDD28FF99
25,898,975 UART: [art] PUB.Y = C237818FD2BDBE97AB2B5F9080154ADF44CE3519D106CC409CDD7CDDEE726F8A9F80ED2D022CC246B108A99381C1B207
25,906,248 UART: [art] SIG.R = D2E074389CC03AA42E16F356FC20DCB308AAB7F52F1B1FD52603904AAD74F19F66584A7A329239E39F5AC569CC6DB195
25,913,691 UART: [art] SIG.S = 402209988F5FA0F7BE3B8EF6906ED4A9DFE6D8E5A9050B32363DEE6393EAA5F51F2A58FD515AE98932BE7FB006058BF6
26,892,414 UART: Caliptra RT
26,893,122 UART: [state] CFI Enabled
27,057,858 UART: [rt] RT listening for mailbox commands...
27,060,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,216,084 UART: [rt]cmd =0x41544d4e, len=14344
29,583,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,381,786 ready_for_fw is high
3,382,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,062,953 >>> mbox cmd response: success
19,342,018 UART:
19,342,415 UART: Running Caliptra FMC ...
19,343,524 UART:
19,343,683 UART: [state] CFI Enabled
19,413,423 UART: [fht] FMC Alias Private Key: 7
21,177,195 UART: [art] Extend RT PCRs Done
21,178,419 UART: [art] Lock RT PCRs Done
21,180,286 UART: [art] Populate DV Done
21,185,643 UART: [fht] FMC Alias Private Key: 7
21,187,235 UART: [art] Derive CDI
21,187,997 UART: [art] Store in in slot 0x4
21,245,204 UART: [art] Derive Key Pair
21,246,247 UART: [art] Store priv key in slot 0x5
23,709,838 UART: [art] Derive Key Pair - Done
23,722,995 UART: [art] Signing Cert with AUTHO
23,724,302 UART: RITY.KEYID = 7
25,434,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,436,305 UART: [art] PUB.X = 8EDEB177DED64F1611D4EDD6E2F7D0F6CD321CE50208F86B4CB766CA9281442C03FD36DAA1294717417211FA9E63A2D9
25,443,630 UART: [art] PUB.Y = BC156C2327E1AD1BBADA866BCC150EB62D85269126590F6FDC51036495577A81C432AC3ADAA8555C809CCFA40B67E975
25,450,903 UART: [art] SIG.R = FD46BD5CE35B97A2E7891DB68EDCB11036EA27C136073FEAA2245027E6863625CC1FBFA288DE5296088A64AB36EF6C96
25,458,296 UART: [art] SIG.S = D72B3C762CA111707FA04F7FADE337F4100FE253A4CD2B3F97DDDDC8A8F0413643615C8E8F72B440E7536566A5F454C8
26,437,840 UART: Caliptra RT
26,438,543 UART: [state] CFI Enabled
26,601,894 UART: [rt] RT listening for mailbox commands...
26,604,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,760,151 UART: [rt]cmd =0x41544d4e, len=14344
29,131,675 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,455 UART:
192,836 UART: Running Caliptra ROM ...
193,926 UART:
603,453 UART: [state] CFI Enabled
615,304 UART: [state] LifecycleState = Unprovisioned
617,106 UART: [state] DebugLocked = No
619,409 UART: [state] WD Timer not started. Device not locked for debugging
622,676 UART: [kat] SHA2-256
801,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,381 UART: [kat] ++
813,928 UART: [kat] sha1
824,808 UART: [kat] SHA2-256
827,902 UART: [kat] SHA2-384
835,488 UART: [kat] SHA2-512-ACC
838,433 UART: [kat] ECC-384
3,280,522 UART: [kat] HMAC-384Kdf
3,292,964 UART: [kat] LMS
3,822,453 UART: [kat] --
3,828,091 UART: [cold-reset] ++
3,830,021 UART: [fht] FHT @ 0x50003400
3,841,064 UART: [idev] ++
3,841,632 UART: [idev] CDI.KEYID = 6
3,842,539 UART: [idev] SUBJECT.KEYID = 7
3,843,707 UART: [idev] UDS.KEYID = 0
3,844,625 ready_for_fw is high
3,844,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,654 UART: [idev] Erasing UDS.KEYID = 0
6,314,446 UART: [idev] Sha1 KeyId Algorithm
6,338,157 UART: [idev] --
6,342,037 UART: [ldev] ++
6,342,604 UART: [ldev] CDI.KEYID = 6
6,343,506 UART: [ldev] SUBJECT.KEYID = 5
6,344,707 UART: [ldev] AUTHORITY.KEYID = 7
6,346,126 UART: [ldev] FE.KEYID = 1
6,356,412 UART: [ldev] Erasing FE.KEYID = 1
8,824,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,283 UART: [ldev] --
10,611,835 UART: [fwproc] Wait for Commands...
10,614,436 UART: [fwproc] Recv command 0x46574c44
10,616,522 UART: [fwproc] Recv'd Img size: 114448 bytes
15,185,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,263,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,332,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,649,533 >>> mbox cmd response: success
15,653,219 UART: [afmc] ++
15,653,812 UART: [afmc] CDI.KEYID = 6
15,654,713 UART: [afmc] SUBJECT.KEYID = 7
15,655,921 UART: [afmc] AUTHORITY.KEYID = 5
18,157,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,874,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,876,079 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,892,049 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,908,010 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,923,789 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,946,327 UART: [afmc] --
19,949,204 UART: [cold-reset] --
19,952,738 UART: [state] Locking Datavault
19,958,951 UART: [state] Locking PCR0, PCR1 and PCR31
19,960,643 UART: [state] Locking ICCM
19,962,355 UART: [exit] Launching FMC @ 0x40000130
19,970,798 UART:
19,971,025 UART: Running Caliptra FMC ...
19,972,120 UART:
19,972,270 UART: [state] CFI Enabled
19,980,256 UART: [fht] FMC Alias Private Key: 7
21,736,871 UART: [art] Extend RT PCRs Done
21,738,090 UART: [art] Lock RT PCRs Done
21,740,033 UART: [art] Populate DV Done
21,745,441 UART: [fht] FMC Alias Private Key: 7
21,747,143 UART: [art] Derive CDI
21,747,970 UART: [art] Store in in slot 0x4
21,790,292 UART: [art] Derive Key Pair
21,791,328 UART: [art] Store priv key in slot 0x5
24,217,908 UART: [art] Derive Key Pair - Done
24,230,846 UART: [art] Signing Cert with AUTHO
24,232,143 UART: RITY.KEYID = 7
25,937,560 UART: [art] Erasing AUTHORITY.KEYID = 7
25,939,067 UART: [art] PUB.X = 703742FECC28BEC5063BD3212A9922CB7D61896BE853353D64E606E7EF4CBC7C219D083726FF11A194B9B358986086B8
25,946,490 UART: [art] PUB.Y = 0037002ADE2668CED25FFF25A1E3049B9A3866A5D879F79F4DD502F6E186C803E53A672D3A1685FCA9D2FF9CD342AA93
25,953,547 UART: [art] SIG.R = F36A1CC1B316ABF1D56CA02E5C05CCDD8E063A340B42E31D2FE77779D49AFE80CEA62405B164A0B368B023D960CB651B
25,960,984 UART: [art] SIG.S = 37251D1B74D231F1627352E7EBDA6C8275ACB21090D7C883C5682758A515287B67E80A3AEC2D87E35C2929C820F5D693
26,940,080 UART: Caliptra RT
26,940,765 UART: [state] CFI Enabled
27,057,225 UART: [rt] RT listening for mailbox commands...
27,059,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,214,678 UART: [rt]cmd =0x41544d4e, len=14344
29,571,997 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,692,633 ready_for_fw is high
3,693,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,263,212 >>> mbox cmd response: success
19,511,519 UART:
19,511,915 UART: Running Caliptra FMC ...
19,513,016 UART:
19,513,174 UART: [state] CFI Enabled
19,521,109 UART: [fht] FMC Alias Private Key: 7
21,277,927 UART: [art] Extend RT PCRs Done
21,279,155 UART: [art] Lock RT PCRs Done
21,281,208 UART: [art] Populate DV Done
21,286,511 UART: [fht] FMC Alias Private Key: 7
21,288,219 UART: [art] Derive CDI
21,289,036 UART: [art] Store in in slot 0x4
21,331,878 UART: [art] Derive Key Pair
21,332,926 UART: [art] Store priv key in slot 0x5
23,759,317 UART: [art] Derive Key Pair - Done
23,771,993 UART: [art] Signing Cert with AUTHO
23,773,289 UART: RITY.KEYID = 7
25,479,032 UART: [art] Erasing AUTHORITY.KEYID = 7
25,480,537 UART: [art] PUB.X = 4669F9BD620049B1FEE509BF45DE6E1084D548A2C7329CDEDE68AFEBFFBAB03B0D19399A8F11DBEF441CABE992464E2F
25,487,821 UART: [art] PUB.Y = 39AF5C37D326CE813384049D3AED7C75D61935B6C9CBF5A306EA6F3650A9ED92D696D5BC415AFC9CD9D7F51C29EEE835
25,495,089 UART: [art] SIG.R = A8449ACF0950B2E5CB34A0626A8820484F7ACFDF0EBB9B635779E2C2BB9AA13CBDF3EA8A75CF951AE0F5F67DFFD50A96
25,502,527 UART: [art] SIG.S = 601C07DB894C727F12D9D2131DEDBB54E4D21D4C3952516A415A9A606A283836F9FE54A8F5A10C918A9CA3373044E893
26,481,470 UART: Caliptra RT
26,482,180 UART: [state] CFI Enabled
26,598,783 UART: [rt] RT listening for mailbox commands...
26,601,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,756,463 UART: [rt]cmd =0x41544d4e, len=14344
29,111,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,245 UART:
192,595 UART: Running Caliptra ROM ...
193,780 UART:
193,935 UART: [state] CFI Enabled
260,659 UART: [state] LifecycleState = Unprovisioned
263,058 UART: [state] DebugLocked = No
264,599 UART: [state] WD Timer not started. Device not locked for debugging
269,463 UART: [kat] SHA2-256
459,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,080 UART: [kat] ++
470,570 UART: [kat] sha1
481,091 UART: [kat] SHA2-256
484,111 UART: [kat] SHA2-384
491,027 UART: [kat] SHA2-512-ACC
493,633 UART: [kat] ECC-384
2,945,598 UART: [kat] HMAC-384Kdf
2,970,489 UART: [kat] LMS
3,502,295 UART: [kat] --
3,507,371 UART: [cold-reset] ++
3,509,899 UART: [fht] FHT @ 0x50003400
3,520,457 UART: [idev] ++
3,521,098 UART: [idev] CDI.KEYID = 6
3,522,135 UART: [idev] SUBJECT.KEYID = 7
3,523,307 UART: [idev] UDS.KEYID = 0
3,524,233 ready_for_fw is high
3,524,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,579 UART: [idev] Erasing UDS.KEYID = 0
6,025,922 UART: [idev] Sha1 KeyId Algorithm
6,047,913 UART: [idev] --
6,051,634 UART: [ldev] ++
6,052,333 UART: [ldev] CDI.KEYID = 6
6,053,254 UART: [ldev] SUBJECT.KEYID = 5
6,054,413 UART: [ldev] AUTHORITY.KEYID = 7
6,055,644 UART: [ldev] FE.KEYID = 1
6,097,391 UART: [ldev] Erasing FE.KEYID = 1
8,607,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,985 UART: [ldev] --
10,410,961 UART: [fwproc] Wait for Commands...
10,414,025 UART: [fwproc] Recv command 0x46574c44
10,416,342 UART: [fwproc] Recv'd Img size: 114448 bytes
15,038,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,117,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,233,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,776,905 >>> mbox cmd response: success
15,781,675 UART: [afmc] ++
15,782,384 UART: [afmc] CDI.KEYID = 6
15,783,581 UART: [afmc] SUBJECT.KEYID = 7
15,785,079 UART: [afmc] AUTHORITY.KEYID = 5
18,316,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,041,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,042,969 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,058,035 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,073,245 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,088,089 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,111,765 UART: [afmc] --
20,114,494 UART: [cold-reset] --
20,118,890 UART: [state] Locking Datavault
20,124,029 UART: [state] Locking PCR0, PCR1 and PCR31
20,126,251 UART: [state] Locking ICCM
20,127,247 UART: [exit] Launching FMC @ 0x40000130
20,135,921 UART:
20,136,155 UART: Running Caliptra FMC ...
20,137,183 UART:
20,137,333 UART: [state] CFI Enabled
20,198,400 UART: [fht] FMC Alias Private Key: 7
21,961,764 UART: [art] Extend RT PCRs Done
21,962,989 UART: [art] Lock RT PCRs Done
21,964,882 UART: [art] Populate DV Done
21,970,082 UART: [fht] FMC Alias Private Key: 7
21,971,794 UART: [art] Derive CDI
21,972,529 UART: [art] Store in in slot 0x4
22,030,869 UART: [art] Derive Key Pair
22,031,912 UART: [art] Store priv key in slot 0x5
24,494,382 UART: [art] Derive Key Pair - Done
24,507,074 UART: [art] Signing Cert with AUTHO
24,508,385 UART: RITY.KEYID = 7
26,219,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,221,391 UART: [art] PUB.X = 55C0730F366B4FDA01D866708D4898C913C2CE21C120B1FE83E945CD175925823D4B42F83D0D58D284A1E213E5A56219
26,228,716 UART: [art] PUB.Y = D2A83AC8C98D7B06ADA558FBDB0A3EF50577AF32E648021D39E4C7D818468EB96F0B27FCF359C6C59CF4A14038CD3252
26,235,913 UART: [art] SIG.R = 74C300FE7A911209C2611DB122B3DFD2EF384388196C95B10DE01E2845AB1114543B7716D34306A5298505BDEA1C2342
26,243,298 UART: [art] SIG.S = FDE15F739EADA8898961A99CE315BA0D6B476A8F85F746A15D28C7ECD643060FA46AE249A18663D967BFA66E98092FF4
27,221,998 UART: Caliptra RT
27,222,687 UART: [state] CFI Enabled
27,386,812 UART: [rt] RT listening for mailbox commands...
27,389,184 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,544,976 UART: [rt]cmd =0x41544d4e, len=14344
29,911,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,440,033 ready_for_fw is high
3,440,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,832,979 >>> mbox cmd response: success
20,110,848 UART:
20,111,230 UART: Running Caliptra FMC ...
20,112,422 UART:
20,112,591 UART: [state] CFI Enabled
20,183,045 UART: [fht] FMC Alias Private Key: 7
21,947,479 UART: [art] Extend RT PCRs Done
21,948,701 UART: [art] Lock RT PCRs Done
21,950,231 UART: [art] Populate DV Done
21,955,736 UART: [fht] FMC Alias Private Key: 7
21,957,279 UART: [art] Derive CDI
21,958,095 UART: [art] Store in in slot 0x4
22,016,394 UART: [art] Derive Key Pair
22,017,433 UART: [art] Store priv key in slot 0x5
24,480,500 UART: [art] Derive Key Pair - Done
24,493,500 UART: [art] Signing Cert with AUTHO
24,494,795 UART: RITY.KEYID = 7
26,206,525 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,043 UART: [art] PUB.X = 09A4A4CFB663CE6C2475C32BB38F3CB79AB840EF6044E855B30133DBE3F69A29EAB303BD0DB90870595D04AAF4818152
26,215,300 UART: [art] PUB.Y = 562E81E7FB8D81A88CAC882B355FFEDD4AE6A8B14221E870205691DF5EEBC7246671DD8A05AD4660A228B8E1691C1799
26,222,603 UART: [art] SIG.R = 7351735E4B444779E4C546A52C52DEABB93BBEC02F1338A9F5BB10E30AC51C514B357E8D431C8DAA0E1CBAC63D9FF189
26,230,005 UART: [art] SIG.S = F6F6B869F832FDF67579950BEDA69EDECF1363BE64EDC55078FE70D2C44AC85AF8ACD2CB3C1B5D1F57CBBF7479ECC470
27,209,059 UART: Caliptra RT
27,209,772 UART: [state] CFI Enabled
27,374,469 UART: [rt] RT listening for mailbox commands...
27,376,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,532,649 UART: [rt]cmd =0x41544d4e, len=14344
29,896,585 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,399 UART:
192,777 UART: Running Caliptra ROM ...
193,956 UART:
603,431 UART: [state] CFI Enabled
618,937 UART: [state] LifecycleState = Unprovisioned
621,354 UART: [state] DebugLocked = No
623,941 UART: [state] WD Timer not started. Device not locked for debugging
628,589 UART: [kat] SHA2-256
818,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,259 UART: [kat] ++
829,732 UART: [kat] sha1
842,625 UART: [kat] SHA2-256
845,636 UART: [kat] SHA2-384
852,614 UART: [kat] SHA2-512-ACC
855,182 UART: [kat] ECC-384
3,298,660 UART: [kat] HMAC-384Kdf
3,310,636 UART: [kat] LMS
3,842,452 UART: [kat] --
3,848,165 UART: [cold-reset] ++
3,849,536 UART: [fht] FHT @ 0x50003400
3,862,567 UART: [idev] ++
3,863,278 UART: [idev] CDI.KEYID = 6
3,864,304 UART: [idev] SUBJECT.KEYID = 7
3,865,398 UART: [idev] UDS.KEYID = 0
3,866,438 ready_for_fw is high
3,866,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,010,454 UART: [idev] Erasing UDS.KEYID = 0
6,345,365 UART: [idev] Sha1 KeyId Algorithm
6,367,945 UART: [idev] --
6,371,858 UART: [ldev] ++
6,372,539 UART: [ldev] CDI.KEYID = 6
6,373,502 UART: [ldev] SUBJECT.KEYID = 5
6,374,652 UART: [ldev] AUTHORITY.KEYID = 7
6,375,875 UART: [ldev] FE.KEYID = 1
6,387,223 UART: [ldev] Erasing FE.KEYID = 1
8,862,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,735 UART: [ldev] --
10,653,637 UART: [fwproc] Wait for Commands...
10,656,322 UART: [fwproc] Recv command 0x46574c44
10,658,625 UART: [fwproc] Recv'd Img size: 114448 bytes
15,299,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,385,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,501,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,045,303 >>> mbox cmd response: success
16,049,273 UART: [afmc] ++
16,049,981 UART: [afmc] CDI.KEYID = 6
16,051,226 UART: [afmc] SUBJECT.KEYID = 7
16,052,682 UART: [afmc] AUTHORITY.KEYID = 5
18,554,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,275,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,277,268 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,292,322 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,307,530 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,322,371 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,347,634 UART: [afmc] --
20,351,768 UART: [cold-reset] --
20,354,585 UART: [state] Locking Datavault
20,359,084 UART: [state] Locking PCR0, PCR1 and PCR31
20,361,229 UART: [state] Locking ICCM
20,363,911 UART: [exit] Launching FMC @ 0x40000130
20,372,530 UART:
20,372,757 UART: Running Caliptra FMC ...
20,373,850 UART:
20,374,023 UART: [state] CFI Enabled
20,382,287 UART: [fht] FMC Alias Private Key: 7
22,139,238 UART: [art] Extend RT PCRs Done
22,140,456 UART: [art] Lock RT PCRs Done
22,142,290 UART: [art] Populate DV Done
22,147,639 UART: [fht] FMC Alias Private Key: 7
22,149,337 UART: [art] Derive CDI
22,150,144 UART: [art] Store in in slot 0x4
22,192,731 UART: [art] Derive Key Pair
22,193,758 UART: [art] Store priv key in slot 0x5
24,620,623 UART: [art] Derive Key Pair - Done
24,633,604 UART: [art] Signing Cert with AUTHO
24,634,895 UART: RITY.KEYID = 7
26,340,510 UART: [art] Erasing AUTHORITY.KEYID = 7
26,342,010 UART: [art] PUB.X = AE9DCF54C5F0750C92C03721B6FC5B6E69861DF9C359CBE9D630BBF4E61E68755102F1082FE21599D8D26E1F50C1EAB5
26,349,285 UART: [art] PUB.Y = 89CA4F009A1AEDEA62EF9B3101ED8E42DDED785C0F26DB551731B785E5D5C288A5A02633CC0CDE520FDA8E16A67C3F29
26,356,597 UART: [art] SIG.R = E6DEB1F890E77C0DE9C530A06434402A1BB4D829912E9DC6CED4B3F84C3C241B324D3348A17F62724983A3414D8FF4C2
26,363,987 UART: [art] SIG.S = D2793B46DCD3C31F4ABC7D10E9B57A1C4FC39DAA28D9DA687B1B56B242D9B00AB7FF848CBE7C5B5D5E8AAD985795D8F8
27,343,532 UART: Caliptra RT
27,344,213 UART: [state] CFI Enabled
27,461,045 UART: [rt] RT listening for mailbox commands...
27,463,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,618,694 UART: [rt]cmd =0x41544d4e, len=14344
29,979,433 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
3,756,786 ready_for_fw is high
3,757,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,060,273 >>> mbox cmd response: success
20,310,256 UART:
20,310,959 UART: Running Caliptra FMC ...
20,312,091 UART:
20,312,245 UART: [state] CFI Enabled
20,319,889 UART: [fht] FMC Alias Private Key: 7
22,076,848 UART: [art] Extend RT PCRs Done
22,078,291 UART: [art] Lock RT PCRs Done
22,079,844 UART: [art] Populate DV Done
22,085,417 UART: [fht] FMC Alias Private Key: 7
22,087,011 UART: [art] Derive CDI
22,087,826 UART: [art] Store in in slot 0x4
22,130,583 UART: [art] Derive Key Pair
22,131,752 UART: [art] Store priv key in slot 0x5
24,557,987 UART: [art] Derive Key Pair - Done
24,571,199 UART: [art] Signing Cert with AUTHO
24,572,505 UART: RITY.KEYID = 7
26,277,763 UART: [art] Erasing AUTHORITY.KEYID = 7
26,279,265 UART: [art] PUB.X = D90523BD82E30516CFFF702F5E012FA14C0C9CAF708AF764A7957C61F00C51BA164744B6DF781872E11740113BC6CAA2
26,286,522 UART: [art] PUB.Y = E7F727149AE0900E52CD4D72DBFF4FC8059AE0C9DE70595C6746AD2F6AF6FA973463FEE1C36ED46FB03BAEF65DD3AB2A
26,293,806 UART: [art] SIG.R = 08DA1D1D0655DA811B998A2A41D84CD266143B664234FF4DD5554BF3240403759CA593922B8F56DA35BA084CC9FD8305
26,301,170 UART: [art] SIG.S = C11577A91D36C08F2D0C105991B75602B48F76EFC3808197AB6CA3292F502F1188476FF1A597B58CD660A65D79C851D2
27,280,015 UART: Caliptra RT
27,280,703 UART: [state] CFI Enabled
27,397,811 UART: [rt] RT listening for mailbox commands...
27,400,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,345 UART: [rt]cmd =0x41544d4e, len=14344
29,920,802 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,314 UART: [kat] SHA2-512-ACC
897,215 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,312 UART: [kat] LMS
1,475,508 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,603 UART: [fht] Storing FHT @ 0x50003400
1,479,330 UART: [idev] ++
1,479,498 UART: [idev] CDI.KEYID = 6
1,479,858 UART: [idev] SUBJECT.KEYID = 7
1,480,282 UART: [idev] UDS.KEYID = 0
1,480,627 ready_for_fw is high
1,480,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,724 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,521,427 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,558 UART: [ldev] --
1,586,041 UART: [fwproc] Waiting for Commands...
1,586,656 UART: [fwproc] Received command 0x46574c44
1,587,447 UART: [fwproc] Received Image of size 114448 bytes
5,159,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,189,038 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,218,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,354,375 >>> mbox cmd response: success
5,355,525 UART: [afmc] ++
5,355,693 UART: [afmc] CDI.KEYID = 6
5,356,055 UART: [afmc] SUBJECT.KEYID = 7
5,356,480 UART: [afmc] AUTHORITY.KEYID = 5
5,391,368 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,407,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,408,192 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,413,901 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,419,793 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,425,494 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,433,518 UART: [afmc] --
5,434,632 UART: [cold-reset] --
5,435,612 UART: [state] Locking Datavault
5,436,535 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,139 UART: [state] Locking ICCM
5,437,749 UART: [exit] Launching FMC @ 0x40000130
5,443,078 UART:
5,443,094 UART: Running Caliptra FMC ...
5,443,502 UART:
5,443,556 UART: [state] CFI Enabled
5,453,820 UART: [fht] FMC Alias Private Key: 7
5,562,256 UART: [art] Extend RT PCRs Done
5,562,684 UART: [art] Lock RT PCRs Done
5,564,056 UART: [art] Populate DV Done
5,572,462 UART: [fht] FMC Alias Private Key: 7
5,573,626 UART: [art] Derive CDI
5,573,906 UART: [art] Store in in slot 0x4
5,659,707 UART: [art] Derive Key Pair
5,660,067 UART: [art] Store priv key in slot 0x5
5,673,257 UART: [art] Derive Key Pair - Done
5,687,825 UART: [art] Signing Cert with AUTHO
5,688,305 UART: RITY.KEYID = 7
5,703,389 UART: [art] Erasing AUTHORITY.KEYID = 7
5,704,154 UART: [art] PUB.X = C9718E0EB34F999C85D7E5478812FD3FA3561DCA940D2EE57098B504F00926EF6086D4B0E0AD3E20F9C55ACBB419A1F5
5,710,922 UART: [art] PUB.Y = D65246FA740311D24980C912D6EC13BC441E21C0B7A171BB99C3C7B9704B4B70187BB3F0964662553708524B97064C17
5,717,853 UART: [art] SIG.R = 3AEA9C28FF4B4B696CE23C072ACC5C042E7B05153884F42C2B6C1CDC8F03EA45D7D730563AFD4F5E0163C40D4A3E9EB8
5,724,623 UART: [art] SIG.S = A25B70B5EEAA81B36B6124A0D1278E808AE09F8B600DA2A437EAE77CB5D0937A7921F0F413C7C03355D02437A52FE073
5,748,403 UART: Caliptra RT
5,748,656 UART: [state] CFI Enabled
5,857,967 UART: [rt] RT listening for mailbox commands...
5,858,637 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,525 UART: [rt]cmd =0x41544d4e, len=14344
6,537,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,965 ready_for_fw is high
1,361,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,238,750 >>> mbox cmd response: success
5,300,323 UART:
5,300,339 UART: Running Caliptra FMC ...
5,300,747 UART:
5,300,801 UART: [state] CFI Enabled
5,311,349 UART: [fht] FMC Alias Private Key: 7
5,420,103 UART: [art] Extend RT PCRs Done
5,420,531 UART: [art] Lock RT PCRs Done
5,422,361 UART: [art] Populate DV Done
5,430,511 UART: [fht] FMC Alias Private Key: 7
5,431,539 UART: [art] Derive CDI
5,431,819 UART: [art] Store in in slot 0x4
5,517,126 UART: [art] Derive Key Pair
5,517,486 UART: [art] Store priv key in slot 0x5
5,530,722 UART: [art] Derive Key Pair - Done
5,545,438 UART: [art] Signing Cert with AUTHO
5,545,918 UART: RITY.KEYID = 7
5,561,080 UART: [art] Erasing AUTHORITY.KEYID = 7
5,561,845 UART: [art] PUB.X = 2ED286269F6B2515BFDFCFCC5D233A5165ECF4B78EB1E1AE63913BC659AA7C544483AC2195AAB98B3795BE8894E558B9
5,568,629 UART: [art] PUB.Y = 29BB5417A517E371A40131A7BC1F061C4BC54EB81F634748E7A521EA37E99C361F83FACC564B58B87CC2FB7B25643CBF
5,575,583 UART: [art] SIG.R = 9FCD42769D57529176222E243E86566D2162FEBEBF1F5DE624EEBE3A07AB923C2399C17302A8F5931163CA24F1E7651F
5,582,349 UART: [art] SIG.S = D8E12179FB75837A8734F5E7B5DC266F2DBE96D7F5A741EE556BB43D54D3B5565DDC40FB0A532AFB7451DE1DC74A36DC
5,605,993 UART: Caliptra RT
5,606,246 UART: [state] CFI Enabled
5,714,650 UART: [rt] RT listening for mailbox commands...
5,715,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,384 UART: [rt]cmd =0x41544d4e, len=14344
6,403,888 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,288 UART: [kat] SHA2-256
892,226 UART: [kat] SHA2-384
894,837 UART: [kat] SHA2-512-ACC
896,738 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,351 UART: [kat] LMS
1,475,547 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,597 UART: [idev] ++
1,479,765 UART: [idev] CDI.KEYID = 6
1,480,125 UART: [idev] SUBJECT.KEYID = 7
1,480,549 UART: [idev] UDS.KEYID = 0
1,480,894 ready_for_fw is high
1,480,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,907 UART: [idev] Erasing UDS.KEYID = 0
1,504,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,505 UART: [idev] --
1,514,634 UART: [ldev] ++
1,514,802 UART: [ldev] CDI.KEYID = 6
1,515,165 UART: [ldev] SUBJECT.KEYID = 5
1,515,591 UART: [ldev] AUTHORITY.KEYID = 7
1,516,054 UART: [ldev] FE.KEYID = 1
1,521,454 UART: [ldev] Erasing FE.KEYID = 1
1,547,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,125 UART: [ldev] --
1,586,612 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 114448 bytes
5,199,348 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,227,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,256,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,392,685 >>> mbox cmd response: success
5,393,895 UART: [afmc] ++
5,394,063 UART: [afmc] CDI.KEYID = 6
5,394,425 UART: [afmc] SUBJECT.KEYID = 7
5,394,850 UART: [afmc] AUTHORITY.KEYID = 5
5,430,326 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,446,698 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,447,478 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,453,187 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,459,079 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,464,780 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,472,668 UART: [afmc] --
5,473,734 UART: [cold-reset] --
5,474,622 UART: [state] Locking Datavault
5,475,863 UART: [state] Locking PCR0, PCR1 and PCR31
5,476,467 UART: [state] Locking ICCM
5,476,929 UART: [exit] Launching FMC @ 0x40000130
5,482,258 UART:
5,482,274 UART: Running Caliptra FMC ...
5,482,682 UART:
5,482,825 UART: [state] CFI Enabled
5,493,703 UART: [fht] FMC Alias Private Key: 7
5,601,367 UART: [art] Extend RT PCRs Done
5,601,795 UART: [art] Lock RT PCRs Done
5,603,281 UART: [art] Populate DV Done
5,611,545 UART: [fht] FMC Alias Private Key: 7
5,612,483 UART: [art] Derive CDI
5,612,763 UART: [art] Store in in slot 0x4
5,698,348 UART: [art] Derive Key Pair
5,698,708 UART: [art] Store priv key in slot 0x5
5,712,232 UART: [art] Derive Key Pair - Done
5,727,077 UART: [art] Signing Cert with AUTHO
5,727,557 UART: RITY.KEYID = 7
5,743,081 UART: [art] Erasing AUTHORITY.KEYID = 7
5,743,846 UART: [art] PUB.X = 18EF7DFEE86C14B7119ECA92119E220842B9EAD5DCBA3F32D64D83CB3AA1812A15E82D032D346A3E01C3E2D513790616
5,750,614 UART: [art] PUB.Y = 7EBF5D98D95B96AF9A99292E62B3551553F338CC97173585BDD93B6754234C01CCE140459CDE295BDE2DFA1538385540
5,757,561 UART: [art] SIG.R = 88FF840295C9E450D7D880250E561430FE998C1C088EA5C597151BE21BC32684AE929F3E147367842FAE276D09E9DEFC
5,764,319 UART: [art] SIG.S = B4D4B951A30AD765074B2694BB17D0D312E1DBAB9616CFE5BD0A2A4C8B847376E43CDD0F5364893655B0E0A31CA8C958
5,788,424 UART: Caliptra RT
5,788,769 UART: [state] CFI Enabled
5,896,125 UART: [rt] RT listening for mailbox commands...
5,896,795 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,913 UART: [rt]cmd =0x41544d4e, len=14344
6,580,971 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,892 ready_for_fw is high
1,362,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,014,599 >>> mbox cmd response: success
5,075,932 UART:
5,075,948 UART: Running Caliptra FMC ...
5,076,356 UART:
5,076,499 UART: [state] CFI Enabled
5,086,777 UART: [fht] FMC Alias Private Key: 7
5,195,413 UART: [art] Extend RT PCRs Done
5,195,841 UART: [art] Lock RT PCRs Done
5,196,995 UART: [art] Populate DV Done
5,205,051 UART: [fht] FMC Alias Private Key: 7
5,206,053 UART: [art] Derive CDI
5,206,333 UART: [art] Store in in slot 0x4
5,291,888 UART: [art] Derive Key Pair
5,292,248 UART: [art] Store priv key in slot 0x5
5,305,430 UART: [art] Derive Key Pair - Done
5,320,105 UART: [art] Signing Cert with AUTHO
5,320,585 UART: RITY.KEYID = 7
5,336,075 UART: [art] Erasing AUTHORITY.KEYID = 7
5,336,840 UART: [art] PUB.X = 2253DF2FC253D7F1B5BFE0EA4CD7B1B7171AD09BAC6BDDE635DF4F22593CDB725E8B46B735D328A0433AC97D602550FD
5,343,630 UART: [art] PUB.Y = 08BC361210B12707E598C5BFE4DCF7C0229E2B4AE391DAD21727C1ED5097A0819D6D3BB3EC38A0FF77A3EEDE0996B231
5,350,585 UART: [art] SIG.R = DE98D72E2ACB684156C585DB8CB3015C8D458B4D8062237E595E1CB3FD180427DB7B6662DADE8431F5672B17B7762343
5,357,351 UART: [art] SIG.S = 07A644025F6E0D11AC9E6A7DC20EEC7AAA883551A22BB10F3523806003F95C2494E214C90573751D16EDD76733157F92
5,381,065 UART: Caliptra RT
5,381,410 UART: [state] CFI Enabled
5,490,533 UART: [rt] RT listening for mailbox commands...
5,491,203 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,614,357 UART: [rt]cmd =0x41544d4e, len=14344
6,172,766 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,760 UART: [kat] SHA2-512-ACC
908,661 UART: [kat] ECC-384
919,122 UART: [kat] HMAC-384Kdf
923,736 UART: [kat] LMS
1,172,064 UART: [kat] --
1,173,139 UART: [cold-reset] ++
1,173,595 UART: [fht] FHT @ 0x50003400
1,176,268 UART: [idev] ++
1,176,436 UART: [idev] CDI.KEYID = 6
1,176,796 UART: [idev] SUBJECT.KEYID = 7
1,177,220 UART: [idev] UDS.KEYID = 0
1,177,565 ready_for_fw is high
1,177,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,480 UART: [idev] Erasing UDS.KEYID = 0
1,202,623 UART: [idev] Sha1 KeyId Algorithm
1,211,015 UART: [idev] --
1,212,131 UART: [ldev] ++
1,212,299 UART: [ldev] CDI.KEYID = 6
1,212,662 UART: [ldev] SUBJECT.KEYID = 5
1,213,088 UART: [ldev] AUTHORITY.KEYID = 7
1,213,551 UART: [ldev] FE.KEYID = 1
1,218,619 UART: [ldev] Erasing FE.KEYID = 1
1,244,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,842 UART: [fwproc] Wait for Commands...
1,284,526 UART: [fwproc] Recv command 0x46574c44
1,285,254 UART: [fwproc] Recv'd Img size: 114448 bytes
3,134,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,328,336 >>> mbox cmd response: success
3,329,356 UART: [afmc] ++
3,329,524 UART: [afmc] CDI.KEYID = 6
3,329,886 UART: [afmc] SUBJECT.KEYID = 7
3,330,311 UART: [afmc] AUTHORITY.KEYID = 5
3,365,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,562 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,271 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,163 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,874 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,785 UART: [afmc] --
3,408,823 UART: [cold-reset] --
3,409,553 UART: [state] Locking Datavault
3,410,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,240 UART: [state] Locking ICCM
3,411,676 UART: [exit] Launching FMC @ 0x40000130
3,417,005 UART:
3,417,021 UART: Running Caliptra FMC ...
3,417,429 UART:
3,417,483 UART: [state] CFI Enabled
3,427,801 UART: [fht] FMC Alias Private Key: 7
3,535,667 UART: [art] Extend RT PCRs Done
3,536,095 UART: [art] Lock RT PCRs Done
3,537,581 UART: [art] Populate DV Done
3,545,769 UART: [fht] FMC Alias Private Key: 7
3,546,839 UART: [art] Derive CDI
3,547,119 UART: [art] Store in in slot 0x4
3,632,746 UART: [art] Derive Key Pair
3,633,106 UART: [art] Store priv key in slot 0x5
3,646,346 UART: [art] Derive Key Pair - Done
3,661,122 UART: [art] Signing Cert with AUTHO
3,661,602 UART: RITY.KEYID = 7
3,676,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,383 UART: [art] PUB.X = A7A3400E69BEF45AB45FC8B25AC1797369358681A3D34137CA145561D97233D63AAAF491E76118F213F044AA664B6F14
3,684,148 UART: [art] PUB.Y = 9A98AD0B668B30681D35247BE66E251229F57751FAF4C54D092F9603CF28B89507DE146F811E2A2BCB728F4EA73F914D
3,691,088 UART: [art] SIG.R = 4650020CFF02FEDFC574831487CEEA14380DD476342EE11B8AA3033A42EBF89A02107BB038FD71986D6954605F2767CF
3,697,842 UART: [art] SIG.S = 1C29D4344B5018FA7F2E3B9CC50DB2E1B93BDFEA92DF66B551AA4AEB1ED7BBAEFADBD14C306789834A70F993A311BDD7
3,721,636 UART: Caliptra RT
3,721,889 UART: [state] CFI Enabled
3,829,226 UART: [rt] RT listening for mailbox commands...
3,829,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,110 UART: [rt]cmd =0x41544d4e, len=14344
4,520,923 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,157 >>> mbox cmd response: success
3,228,548 UART:
3,228,564 UART: Running Caliptra FMC ...
3,228,972 UART:
3,229,026 UART: [state] CFI Enabled
3,239,664 UART: [fht] FMC Alias Private Key: 7
3,347,416 UART: [art] Extend RT PCRs Done
3,347,844 UART: [art] Lock RT PCRs Done
3,349,362 UART: [art] Populate DV Done
3,357,204 UART: [fht] FMC Alias Private Key: 7
3,358,296 UART: [art] Derive CDI
3,358,576 UART: [art] Store in in slot 0x4
3,444,035 UART: [art] Derive Key Pair
3,444,395 UART: [art] Store priv key in slot 0x5
3,457,443 UART: [art] Derive Key Pair - Done
3,472,379 UART: [art] Signing Cert with AUTHO
3,472,859 UART: RITY.KEYID = 7
3,488,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,956 UART: [art] PUB.X = 7064D8C7FDD2FEA3755EB52093820377B2DA473618192AA485D530237BEE0E056BE82022BA13B46CAD9DC9ACE0F7FA8F
3,495,729 UART: [art] PUB.Y = 721770696C69FFBB581F56CF9E42CC5C20BD14A12A9DB12E9D5724C92E50B1D7B47988DB522E8E63E191DC5216738692
3,502,681 UART: [art] SIG.R = 036A0FACBCD876F854491F076705023D2D639496B1B07D4B54A23EA96B9D5D544BBD46BBAF28F2AE39115AAD374007D6
3,509,441 UART: [art] SIG.S = D23A9185C58261AE7755C7CA4F249D1703564E9ACDAF3E12382AA01D42DB04CF867E49A667D7E0E381ED83317EAD05B5
3,533,605 UART: Caliptra RT
3,533,858 UART: [state] CFI Enabled
3,640,966 UART: [rt] RT listening for mailbox commands...
3,641,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,438 UART: [rt]cmd =0x41544d4e, len=14344
4,327,391 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,993 UART: [state] LifecycleState = Unprovisioned
86,648 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,401 UART: [kat] SHA2-256
894,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,176 UART: [kat] ++
898,328 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
918,807 UART: [kat] HMAC-384Kdf
923,477 UART: [kat] LMS
1,171,805 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,292 UART: [fht] FHT @ 0x50003400
1,175,929 UART: [idev] ++
1,176,097 UART: [idev] CDI.KEYID = 6
1,176,457 UART: [idev] SUBJECT.KEYID = 7
1,176,881 UART: [idev] UDS.KEYID = 0
1,177,226 ready_for_fw is high
1,177,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,775 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,904 UART: [idev] --
1,210,964 UART: [ldev] ++
1,211,132 UART: [ldev] CDI.KEYID = 6
1,211,495 UART: [ldev] SUBJECT.KEYID = 5
1,211,921 UART: [ldev] AUTHORITY.KEYID = 7
1,212,384 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,243,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,768 UART: [ldev] --
1,283,267 UART: [fwproc] Wait for Commands...
1,284,035 UART: [fwproc] Recv command 0x46574c44
1,284,763 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,766 >>> mbox cmd response: success
3,319,798 UART: [afmc] ++
3,319,966 UART: [afmc] CDI.KEYID = 6
3,320,328 UART: [afmc] SUBJECT.KEYID = 7
3,320,753 UART: [afmc] AUTHORITY.KEYID = 5
3,356,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,728 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,437 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,329 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,040 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,889 UART: [afmc] --
3,399,869 UART: [cold-reset] --
3,400,689 UART: [state] Locking Datavault
3,401,688 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,292 UART: [state] Locking ICCM
3,402,926 UART: [exit] Launching FMC @ 0x40000130
3,408,255 UART:
3,408,271 UART: Running Caliptra FMC ...
3,408,679 UART:
3,408,822 UART: [state] CFI Enabled
3,419,416 UART: [fht] FMC Alias Private Key: 7
3,527,464 UART: [art] Extend RT PCRs Done
3,527,892 UART: [art] Lock RT PCRs Done
3,529,594 UART: [art] Populate DV Done
3,537,868 UART: [fht] FMC Alias Private Key: 7
3,539,048 UART: [art] Derive CDI
3,539,328 UART: [art] Store in in slot 0x4
3,624,839 UART: [art] Derive Key Pair
3,625,199 UART: [art] Store priv key in slot 0x5
3,638,375 UART: [art] Derive Key Pair - Done
3,653,375 UART: [art] Signing Cert with AUTHO
3,653,855 UART: RITY.KEYID = 7
3,668,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,648 UART: [art] PUB.X = FD750A81B255753092F58B345591F66F8395E9EAC438061C872D88397152EE27FDA9707EE3236BC1CFD084259C3F7736
3,676,406 UART: [art] PUB.Y = C5227086D4CBF6B47FB21D95DD842D555DE53F16A8DDB428C44B4ADAA28411D688C6B436EFEEA2245A2440911011EF46
3,683,366 UART: [art] SIG.R = CF14F3F9F7E7BBABE82547FACEE00A7E0036D7651D4C937A27C5C0FA2548338CC66825CD0256E577A86AAF4884A699C5
3,690,120 UART: [art] SIG.S = 4738E9292880BA0ECCFE49BAEBE225178294E7ED2ABCD291208C72420D727446F3C66BAA2D863A997D7A4D10CD08211E
3,713,392 UART: Caliptra RT
3,713,737 UART: [state] CFI Enabled
3,820,769 UART: [rt] RT listening for mailbox commands...
3,821,439 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,373 UART: [rt]cmd =0x41544d4e, len=14344
4,502,628 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,779 >>> mbox cmd response: success
3,237,518 UART:
3,237,534 UART: Running Caliptra FMC ...
3,237,942 UART:
3,238,085 UART: [state] CFI Enabled
3,248,769 UART: [fht] FMC Alias Private Key: 7
3,356,175 UART: [art] Extend RT PCRs Done
3,356,603 UART: [art] Lock RT PCRs Done
3,358,045 UART: [art] Populate DV Done
3,366,335 UART: [fht] FMC Alias Private Key: 7
3,367,509 UART: [art] Derive CDI
3,367,789 UART: [art] Store in in slot 0x4
3,453,448 UART: [art] Derive Key Pair
3,453,808 UART: [art] Store priv key in slot 0x5
3,466,986 UART: [art] Derive Key Pair - Done
3,481,400 UART: [art] Signing Cert with AUTHO
3,481,880 UART: RITY.KEYID = 7
3,496,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,577 UART: [art] PUB.X = 414B44CD0EAEC739BF57D167352C1780FE6A2DA9F95723899658F15DD16F97D213EDE89E3B33B318BA77FB808C4E4BBC
3,504,356 UART: [art] PUB.Y = A463E96F870F35E2F96538D648BBD100E4BD0F6C797114F9FB1BC944C1761A76A48AF420EE17216E86D316380C75D483
3,511,275 UART: [art] SIG.R = 52381006AF3B09C44453094B13A40A1B2ED83EC75FB286CC0297D21ABB3AA4C71B0ABF245FAD4E65232CCC0471489837
3,518,030 UART: [art] SIG.S = 0269FBE8D56CAE7E846D218B3BE596EA82782650B7C66FCBD35B4D519FF87A5C666D80768CD6AA6BA8D1FBFFF1BE5643
3,541,790 UART: Caliptra RT
3,542,135 UART: [state] CFI Enabled
3,649,814 UART: [rt] RT listening for mailbox commands...
3,650,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,540 UART: [rt]cmd =0x41544d4e, len=14344
4,323,968 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,422 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,373 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,174,041 ready_for_fw is high
1,174,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,733 UART: [fwproc] Recv command 0x46574c44
1,282,466 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,912 >>> mbox cmd response: success
3,323,027 UART: [afmc] ++
3,323,195 UART: [afmc] CDI.KEYID = 6
3,323,558 UART: [afmc] SUBJECT.KEYID = 7
3,323,984 UART: [afmc] AUTHORITY.KEYID = 5
3,359,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,277 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,987 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,877 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,588 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,278 UART: [afmc] --
3,402,290 UART: [cold-reset] --
3,403,110 UART: [state] Locking Datavault
3,404,319 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,923 UART: [state] Locking ICCM
3,405,371 UART: [exit] Launching FMC @ 0x40000130
3,410,700 UART:
3,410,716 UART: Running Caliptra FMC ...
3,411,124 UART:
3,411,178 UART: [state] CFI Enabled
3,421,988 UART: [fht] FMC Alias Private Key: 7
3,529,668 UART: [art] Extend RT PCRs Done
3,530,096 UART: [art] Lock RT PCRs Done
3,531,514 UART: [art] Populate DV Done
3,539,680 UART: [fht] FMC Alias Private Key: 7
3,540,658 UART: [art] Derive CDI
3,540,938 UART: [art] Store in in slot 0x4
3,626,493 UART: [art] Derive Key Pair
3,626,853 UART: [art] Store priv key in slot 0x5
3,639,447 UART: [art] Derive Key Pair - Done
3,654,103 UART: [art] Signing Cert with AUTHO
3,654,583 UART: RITY.KEYID = 7
3,669,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,406 UART: [art] PUB.X = 5528693FD8CEDD5C0F8007D2A971BF813568D1EE40C950F58B82D8D7B9B564AE72F4A8CC82B2138906729337710BBB83
3,677,166 UART: [art] PUB.Y = FCBBB66C8428FE22FB97E26F53E44C6A4FDCAFE9B190C5E7A30C4BA0F4653F9893383972B1F1F70B58D7D6FF19CC55E5
3,684,130 UART: [art] SIG.R = 3771ABAC79D68B3543157A4CDD9B21A0F5D49753239003FA1C0B8C5DF5D0CA7F3470CBD7150B44F61DEE3952FF4BAB51
3,690,905 UART: [art] SIG.S = 56E31CED11D90A721DC55D7CA76418081F07BF69918C1BF5D998106B688537E7DD267F2CB1FD554099C86B87E99D74CB
3,714,819 UART: Caliptra RT
3,715,072 UART: [state] CFI Enabled
3,821,773 UART: [rt] RT listening for mailbox commands...
3,822,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,367 UART: [rt]cmd =0x41544d4e, len=14344
4,505,985 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,034 ready_for_fw is high
1,056,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,180,373 >>> mbox cmd response: success
3,242,772 UART:
3,242,788 UART: Running Caliptra FMC ...
3,243,196 UART:
3,243,250 UART: [state] CFI Enabled
3,253,740 UART: [fht] FMC Alias Private Key: 7
3,361,656 UART: [art] Extend RT PCRs Done
3,362,084 UART: [art] Lock RT PCRs Done
3,363,448 UART: [art] Populate DV Done
3,371,602 UART: [fht] FMC Alias Private Key: 7
3,372,542 UART: [art] Derive CDI
3,372,822 UART: [art] Store in in slot 0x4
3,458,449 UART: [art] Derive Key Pair
3,458,809 UART: [art] Store priv key in slot 0x5
3,471,797 UART: [art] Derive Key Pair - Done
3,486,325 UART: [art] Signing Cert with AUTHO
3,486,805 UART: RITY.KEYID = 7
3,502,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,900 UART: [art] PUB.X = 1BD803E9794BB82D9F4AB109A76B8D53D7A69A1B89A2A44678380996339A5883A8B21F7782C935563A52FF6CF2B441F2
3,509,659 UART: [art] PUB.Y = FB69F4EB543AEE5DB7746CDCF1F728919951C97D65ABC2B018549C11FFEEAEA69F76A53A0B873AB1B8DD6FD139E4A2DC
3,516,632 UART: [art] SIG.R = 1058AA75336DC3FC1E231D8E9390CC0CCFA25C5F211A090DEFD23933385B953AD9B28A8073D9C0F01D7809ED46EB98C0
3,523,400 UART: [art] SIG.S = 58F3F34CEE8BDEBC1D8E4C007D36BE6E2D345980F1736391755496B220210F9BF52FDFC000FDC844653A573556954922
3,547,876 UART: Caliptra RT
3,548,129 UART: [state] CFI Enabled
3,655,676 UART: [rt] RT listening for mailbox commands...
3,656,346 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,540 UART: [rt]cmd =0x41544d4e, len=14344
4,340,304 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
86,062 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
890,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,464 UART: [kat] SHA2-256
901,404 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,304 UART: [idev] Erasing UDS.KEYID = 0
1,197,846 UART: [idev] Sha1 KeyId Algorithm
1,206,734 UART: [idev] --
1,207,699 UART: [ldev] ++
1,207,867 UART: [ldev] CDI.KEYID = 6
1,208,231 UART: [ldev] SUBJECT.KEYID = 5
1,208,658 UART: [ldev] AUTHORITY.KEYID = 7
1,209,121 UART: [ldev] FE.KEYID = 1
1,214,291 UART: [ldev] Erasing FE.KEYID = 1
1,240,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,981 UART: [ldev] --
1,280,301 UART: [fwproc] Wait for Commands...
1,280,924 UART: [fwproc] Recv command 0x46574c44
1,281,657 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,649 >>> mbox cmd response: success
3,322,710 UART: [afmc] ++
3,322,878 UART: [afmc] CDI.KEYID = 6
3,323,241 UART: [afmc] SUBJECT.KEYID = 7
3,323,667 UART: [afmc] AUTHORITY.KEYID = 5
3,359,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,846 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,556 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,446 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,157 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,885 UART: [afmc] --
3,403,013 UART: [cold-reset] --
3,403,719 UART: [state] Locking Datavault
3,404,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,534 UART: [state] Locking ICCM
3,406,068 UART: [exit] Launching FMC @ 0x40000130
3,411,397 UART:
3,411,413 UART: Running Caliptra FMC ...
3,411,821 UART:
3,411,964 UART: [state] CFI Enabled
3,422,298 UART: [fht] FMC Alias Private Key: 7
3,530,090 UART: [art] Extend RT PCRs Done
3,530,518 UART: [art] Lock RT PCRs Done
3,531,990 UART: [art] Populate DV Done
3,540,256 UART: [fht] FMC Alias Private Key: 7
3,541,408 UART: [art] Derive CDI
3,541,688 UART: [art] Store in in slot 0x4
3,627,515 UART: [art] Derive Key Pair
3,627,875 UART: [art] Store priv key in slot 0x5
3,640,763 UART: [art] Derive Key Pair - Done
3,655,702 UART: [art] Signing Cert with AUTHO
3,656,182 UART: RITY.KEYID = 7
3,671,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,863 UART: [art] PUB.X = A1D0DC868D6C898EC7FE3714659BB3EFA0A84230015F59E32BC847FCB32874BF660825C1939F274B0F91D67192A5B59B
3,678,628 UART: [art] PUB.Y = 9FF7DC992FD5706B08E8A3BB21166CB7B582F370A9EE39B49725B836872ABCE25389041D210CB720CDCDF1C9987953DF
3,685,577 UART: [art] SIG.R = F0607DE7C0D6ED957C6DC129E317D73A9E5B655E0567765802BFA4F1B29F331B882E8CCD6E4D87698E2213D7D801DE55
3,692,344 UART: [art] SIG.S = 0527B85C21070FBC863F08F5F08A00377256949522B7D2D4BB62975D7B96CD886F374E51D4B8849D7BC54F505FAA47FB
3,715,627 UART: Caliptra RT
3,715,972 UART: [state] CFI Enabled
3,823,720 UART: [rt] RT listening for mailbox commands...
3,824,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,384 UART: [rt]cmd =0x41544d4e, len=14344
4,512,952 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,573 ready_for_fw is high
1,056,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,183,853 >>> mbox cmd response: success
3,246,264 UART:
3,246,280 UART: Running Caliptra FMC ...
3,246,688 UART:
3,246,831 UART: [state] CFI Enabled
3,257,507 UART: [fht] FMC Alias Private Key: 7
3,365,227 UART: [art] Extend RT PCRs Done
3,365,655 UART: [art] Lock RT PCRs Done
3,367,255 UART: [art] Populate DV Done
3,375,599 UART: [fht] FMC Alias Private Key: 7
3,376,595 UART: [art] Derive CDI
3,376,875 UART: [art] Store in in slot 0x4
3,462,514 UART: [art] Derive Key Pair
3,462,874 UART: [art] Store priv key in slot 0x5
3,476,328 UART: [art] Derive Key Pair - Done
3,491,064 UART: [art] Signing Cert with AUTHO
3,491,544 UART: RITY.KEYID = 7
3,506,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,443 UART: [art] PUB.X = BF66FB353F1ECA0B602032D0A2FD0101B69F2DC461065AAA1FFBACA38DA933C16971A35C0E4A590CC4E1B2C0C622E50E
3,514,212 UART: [art] PUB.Y = 6B67477812FB6782C24C735445E23006D783171D7C6684CB84B8499643DB47A5EA053F2548DF0F182923CAEB46DB3C63
3,521,147 UART: [art] SIG.R = BBF02F44BCB708A13BA1728033C9AC82784AD97384581CBBF60169456AB6149AB53EA1AECD0F3DCD15BE5926F5ADD26E
3,527,926 UART: [art] SIG.S = F01D38EC839F8579F597EFEF15A59AE32620E2B8D43A9ED3460F7089A844D036775330BED401A8E04E9C17555AB0AAAA
3,551,561 UART: Caliptra RT
3,551,906 UART: [state] CFI Enabled
3,660,373 UART: [rt] RT listening for mailbox commands...
3,661,043 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,067 UART: [rt]cmd =0x41544d4e, len=14344
4,346,838 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,173 UART:
192,539 UART: Running Caliptra ROM ...
193,718 UART:
193,873 UART: [state] CFI Enabled
261,783 UART: [state] LifecycleState = Unprovisioned
263,695 UART: [state] DebugLocked = No
265,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,244 UART: [kat] SHA2-256
439,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,462 UART: [kat] ++
450,917 UART: [kat] sha1
461,990 UART: [kat] SHA2-256
464,688 UART: [kat] SHA2-384
470,197 UART: [kat] SHA2-512-ACC
472,568 UART: [kat] ECC-384
2,767,348 UART: [kat] HMAC-384Kdf
2,799,771 UART: [kat] LMS
3,990,101 UART: [kat] --
3,995,260 UART: [cold-reset] ++
3,997,268 UART: [fht] Storing FHT @ 0x50003400
4,007,475 UART: [idev] ++
4,008,054 UART: [idev] CDI.KEYID = 6
4,008,986 UART: [idev] SUBJECT.KEYID = 7
4,010,239 UART: [idev] UDS.KEYID = 0
4,011,300 ready_for_fw is high
4,011,505 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,055 UART: [idev] Erasing UDS.KEYID = 0
7,345,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,352 UART: [idev] --
7,373,667 UART: [ldev] ++
7,374,235 UART: [ldev] CDI.KEYID = 6
7,375,221 UART: [ldev] SUBJECT.KEYID = 5
7,376,495 UART: [ldev] AUTHORITY.KEYID = 7
7,377,639 UART: [ldev] FE.KEYID = 1
7,421,399 UART: [ldev] Erasing FE.KEYID = 1
10,755,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,171 UART: [ldev] --
13,114,422 UART: [fwproc] Waiting for Commands...
13,116,517 UART: [fwproc] Received command 0x46574c44
13,118,697 UART: [fwproc] Received Image of size 114124 bytes
21,846,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,936,727 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,005,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,322,542 >>> mbox cmd response: success
22,326,357 UART: [afmc] ++
22,326,961 UART: [afmc] CDI.KEYID = 6
22,327,877 UART: [afmc] SUBJECT.KEYID = 7
22,329,159 UART: [afmc] AUTHORITY.KEYID = 5
25,700,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,999,328 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,001,585 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,016,143 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,030,898 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,045,109 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,067,608 UART: [afmc] --
28,071,377 UART: [cold-reset] --
28,077,183 UART: [state] Locking Datavault
28,082,871 UART: [state] Locking PCR0, PCR1 and PCR31
28,084,575 UART: [state] Locking ICCM
28,087,339 UART: [exit] Launching FMC @ 0x40000130
28,095,693 UART:
28,095,938 UART: Running Caliptra FMC ...
28,097,045 UART:
28,097,213 UART: [state] CFI Enabled
28,157,526 UART: [fht] FMC Alias Private Key: 7
30,495,353 UART: [art] Extend RT PCRs Done
30,496,573 UART: [art] Lock RT PCRs Done
30,498,120 UART: [art] Populate DV Done
30,503,480 UART: [fht] FMC Alias Private Key: 7
30,505,184 UART: [art] Derive CDI
30,505,993 UART: [art] Store in in slot 0x4
30,565,898 UART: [art] Derive Key Pair
30,566,926 UART: [art] Store priv key in slot 0x5
33,859,666 UART: [art] Derive Key Pair - Done
33,872,772 UART: [art] Signing Cert with AUTHO
33,874,103 UART: RITY.KEYID = 7
36,160,352 UART: [art] Erasing AUTHORITY.KEYID = 7
36,161,855 UART: [art] PUB.X = 8F93B8CF15589C2B1E628F2395C2C7A88B0B9BEA2B672EAEF66EEC6DA8B3EC00793D71C44571EFF33FF27BE5870F477D
36,169,115 UART: [art] PUB.Y = 172032397406E19BB09C0345EB850EC368684D0B160B9CF95E0F1530BAC1B721EEE6B3B34E0A7F68181488CA40B7511B
36,176,351 UART: [art] SIG.R = 0DFE5821FB3D3C014FDFD8AF365CD896167B021E8930ED5844ADCEC432C8B724143D677EC32BCCC4BD04868E7DAB2755
36,183,749 UART: [art] SIG.S = E15561AF3154C8937CFDE8EA52DB163E633FA115C261A80F20E9577F5E72D21AF5AEABB4A958223477578406A0CCB450
37,488,929 UART: Caliptra RT
37,489,630 UART: [state] CFI Enabled
37,650,664 UART: [rt] RT listening for mailbox commands...
37,652,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,808,335 UART: [rt]cmd =0x41544d4e, len=14344
42,047,652 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,782,723 ready_for_fw is high
3,783,091 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,684,776 >>> mbox cmd response: success
27,375,608 UART:
27,376,016 UART: Running Caliptra FMC ...
27,377,137 UART:
27,377,301 UART: [state] CFI Enabled
27,446,695 UART: [fht] FMC Alias Private Key: 7
29,784,847 UART: [art] Extend RT PCRs Done
29,786,068 UART: [art] Lock RT PCRs Done
29,787,974 UART: [art] Populate DV Done
29,793,452 UART: [fht] FMC Alias Private Key: 7
29,795,101 UART: [art] Derive CDI
29,795,915 UART: [art] Store in in slot 0x4
29,854,930 UART: [art] Derive Key Pair
29,855,972 UART: [art] Store priv key in slot 0x5
33,148,419 UART: [art] Derive Key Pair - Done
33,161,255 UART: [art] Signing Cert with AUTHO
33,162,563 UART: RITY.KEYID = 7
35,450,603 UART: [art] Erasing AUTHORITY.KEYID = 7
35,452,104 UART: [art] PUB.X = 0B46C8F5108BEFFC8811C2EFBD41229EE1D4A26A75B03364E0935179919FE8D5062CE42CF22ADE8F2EAC805C0D2C1926
35,459,359 UART: [art] PUB.Y = EA1F468A48DD1E5AAB8E9B1ABD48E919B9CA654BC088CDFD440CD95B9EB87EA72DF565136C3FE9190CC4016E79D14FA0
35,466,616 UART: [art] SIG.R = DFCE9531FE782F094B8064565D6B2456FB4F80879AC4F8D5F4830701F72D37D04D4A1D84D0ED1D699326EEDADDB9B567
35,474,014 UART: [art] SIG.S = 545939362D544DA1FD9709A1E4C5A8F8D6CFC06573E41106175976CAF0A8F4B7236475E090C9127416FC700770C5F112
36,779,068 UART: Caliptra RT
36,779,771 UART: [state] CFI Enabled
36,961,003 UART: [rt] RT listening for mailbox commands...
36,963,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,118,452 UART: [rt]cmd =0x41544d4e, len=14344
41,331,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,449 UART:
192,858 UART: Running Caliptra ROM ...
193,994 UART:
603,759 UART: [state] CFI Enabled
618,147 UART: [state] LifecycleState = Unprovisioned
620,098 UART: [state] DebugLocked = No
622,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,223 UART: [kat] SHA2-256
795,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,474 UART: [kat] ++
806,950 UART: [kat] sha1
817,607 UART: [kat] SHA2-256
820,278 UART: [kat] SHA2-384
827,614 UART: [kat] SHA2-512-ACC
829,975 UART: [kat] ECC-384
3,113,876 UART: [kat] HMAC-384Kdf
3,126,031 UART: [kat] LMS
4,316,163 UART: [kat] --
4,322,867 UART: [cold-reset] ++
4,324,296 UART: [fht] Storing FHT @ 0x50003400
4,334,921 UART: [idev] ++
4,335,552 UART: [idev] CDI.KEYID = 6
4,336,453 UART: [idev] SUBJECT.KEYID = 7
4,337,690 UART: [idev] UDS.KEYID = 0
4,338,752 ready_for_fw is high
4,338,944 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,267 UART: [idev] Erasing UDS.KEYID = 0
7,626,781 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,057 UART: [idev] --
7,652,126 UART: [ldev] ++
7,652,749 UART: [ldev] CDI.KEYID = 6
7,653,706 UART: [ldev] SUBJECT.KEYID = 5
7,654,951 UART: [ldev] AUTHORITY.KEYID = 7
7,656,100 UART: [ldev] FE.KEYID = 1
7,665,734 UART: [ldev] Erasing FE.KEYID = 1
10,955,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,046 UART: [ldev] --
13,312,492 UART: [fwproc] Waiting for Commands...
13,315,671 UART: [fwproc] Received command 0x46574c44
13,317,846 UART: [fwproc] Received Image of size 114124 bytes
21,802,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,877,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,946,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,263,659 >>> mbox cmd response: success
22,268,095 UART: [afmc] ++
22,268,690 UART: [afmc] CDI.KEYID = 6
22,269,704 UART: [afmc] SUBJECT.KEYID = 7
22,270,859 UART: [afmc] AUTHORITY.KEYID = 5
25,585,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,878,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,880,529 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,895,133 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,909,812 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,924,036 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,944,791 UART: [afmc] --
27,949,511 UART: [cold-reset] --
27,952,043 UART: [state] Locking Datavault
27,956,807 UART: [state] Locking PCR0, PCR1 and PCR31
27,958,500 UART: [state] Locking ICCM
27,960,372 UART: [exit] Launching FMC @ 0x40000130
27,968,734 UART:
27,968,978 UART: Running Caliptra FMC ...
27,970,078 UART:
27,970,238 UART: [state] CFI Enabled
27,978,344 UART: [fht] FMC Alias Private Key: 7
30,309,083 UART: [art] Extend RT PCRs Done
30,310,311 UART: [art] Lock RT PCRs Done
30,312,065 UART: [art] Populate DV Done
30,317,530 UART: [fht] FMC Alias Private Key: 7
30,319,222 UART: [art] Derive CDI
30,320,028 UART: [art] Store in in slot 0x4
30,362,521 UART: [art] Derive Key Pair
30,363,579 UART: [art] Store priv key in slot 0x5
33,606,379 UART: [art] Derive Key Pair - Done
33,619,374 UART: [art] Signing Cert with AUTHO
33,620,674 UART: RITY.KEYID = 7
35,900,516 UART: [art] Erasing AUTHORITY.KEYID = 7
35,902,038 UART: [art] PUB.X = 3BDA2BCFDE1ED0A58185B9967116B00B349168E5014192155831809B794DA5B3561933D452B41FA8B26C4F26A575229D
35,909,214 UART: [art] PUB.Y = F9944EEC13BE4DEBE94894D3834B698126585C3DFF90274125DB670F99FB5EBC898D65EE11ED70C77DC9F7D96B29CC7E
35,916,484 UART: [art] SIG.R = F419B5E9BA19A6355B7D92497D57C1D4D7AE74C313694106CDC70B30104D52ECF87EAD634A99DD6E7F249A4F159D9D8D
35,923,870 UART: [art] SIG.S = BA6862F88E6230B37CD8A4200623DD8EDB6E63A24228609219FA381B53E0777BCB7E74399DDFE251B4C625F8C4B181C6
37,229,333 UART: Caliptra RT
37,230,026 UART: [state] CFI Enabled
37,347,902 UART: [rt] RT listening for mailbox commands...
37,350,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,505,538 UART: [rt]cmd =0x41544d4e, len=14344
41,718,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,127,164 ready_for_fw is high
4,127,868 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,045,794 >>> mbox cmd response: success
27,684,278 UART:
27,684,668 UART: Running Caliptra FMC ...
27,685,823 UART:
27,685,986 UART: [state] CFI Enabled
27,693,870 UART: [fht] FMC Alias Private Key: 7
30,024,968 UART: [art] Extend RT PCRs Done
30,026,200 UART: [art] Lock RT PCRs Done
30,027,885 UART: [art] Populate DV Done
30,033,579 UART: [fht] FMC Alias Private Key: 7
30,035,177 UART: [art] Derive CDI
30,035,937 UART: [art] Store in in slot 0x4
30,079,029 UART: [art] Derive Key Pair
30,080,074 UART: [art] Store priv key in slot 0x5
33,322,450 UART: [art] Derive Key Pair - Done
33,335,649 UART: [art] Signing Cert with AUTHO
33,337,000 UART: RITY.KEYID = 7
35,616,153 UART: [art] Erasing AUTHORITY.KEYID = 7
35,617,649 UART: [art] PUB.X = 5B3A8F3C382880D5C6B73965ECA5FCC7E5B4E75D3288ED34846A21FBF8230A8E73BD63DC2EA549AD3735B809D6DA27DF
35,624,941 UART: [art] PUB.Y = 9E51F168E491F155EDEE5BDCEFDF384AE507F338740C6C34A12FC230F115045CC43F8C8B02AC3C14DF4D2F20191727D6
35,632,159 UART: [art] SIG.R = E79649700B0C724EAB2DDBFB76E046CD08504D4DEF498F57F3072093094FB45FF31A8D53F70CB4536A9276D097A64A9D
35,639,545 UART: [art] SIG.S = 4B58715E7F3F203FF6F1EF46F1C080847346A4C819CF8AF749C3700426678016603994DFC8A8A08B54E79BCE504AE009
36,944,878 UART: Caliptra RT
36,945,579 UART: [state] CFI Enabled
37,063,019 UART: [rt] RT listening for mailbox commands...
37,065,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,220,476 UART: [rt]cmd =0x41544d4e, len=14344
41,381,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,155 UART:
192,516 UART: Running Caliptra ROM ...
193,703 UART:
193,855 UART: [state] CFI Enabled
268,177 UART: [state] LifecycleState = Unprovisioned
270,139 UART: [state] DebugLocked = No
272,943 UART: [state] WD Timer not started. Device not locked for debugging
277,618 UART: [kat] SHA2-256
455,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,346 UART: [kat] ++
467,881 UART: [kat] sha1
479,682 UART: [kat] SHA2-256
482,692 UART: [kat] SHA2-384
488,539 UART: [kat] SHA2-512-ACC
491,537 UART: [kat] ECC-384
2,946,475 UART: [kat] HMAC-384Kdf
2,970,508 UART: [kat] LMS
3,499,922 UART: [kat] --
3,505,119 UART: [cold-reset] ++
3,505,978 UART: [fht] FHT @ 0x50003400
3,517,169 UART: [idev] ++
3,517,737 UART: [idev] CDI.KEYID = 6
3,518,766 UART: [idev] SUBJECT.KEYID = 7
3,519,864 UART: [idev] UDS.KEYID = 0
3,520,910 ready_for_fw is high
3,521,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,248 UART: [idev] Erasing UDS.KEYID = 0
6,025,444 UART: [idev] Sha1 KeyId Algorithm
6,049,342 UART: [idev] --
6,052,949 UART: [ldev] ++
6,053,531 UART: [ldev] CDI.KEYID = 6
6,054,484 UART: [ldev] SUBJECT.KEYID = 5
6,055,648 UART: [ldev] AUTHORITY.KEYID = 7
6,056,881 UART: [ldev] FE.KEYID = 1
6,098,471 UART: [ldev] Erasing FE.KEYID = 1
8,599,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,088 UART: [ldev] --
10,389,219 UART: [fwproc] Wait for Commands...
10,391,956 UART: [fwproc] Recv command 0x46574c44
10,394,044 UART: [fwproc] Recv'd Img size: 114448 bytes
14,955,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,034,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,103,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,421,623 >>> mbox cmd response: success
15,425,742 UART: [afmc] ++
15,426,333 UART: [afmc] CDI.KEYID = 6
15,427,226 UART: [afmc] SUBJECT.KEYID = 7
15,428,437 UART: [afmc] AUTHORITY.KEYID = 5
17,958,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,682,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,315 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,700,240 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,716,223 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,732,031 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,755,612 UART: [afmc] --
19,760,016 UART: [cold-reset] --
19,763,608 UART: [state] Locking Datavault
19,768,635 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,275 UART: [state] Locking ICCM
19,771,959 UART: [exit] Launching FMC @ 0x40000130
19,780,411 UART:
19,780,643 UART: Running Caliptra FMC ...
19,781,741 UART:
19,781,899 UART: [state] CFI Enabled
19,839,673 UART: [fht] FMC Alias Private Key: 7
21,603,612 UART: [art] Extend RT PCRs Done
21,604,825 UART: [art] Lock RT PCRs Done
21,606,665 UART: [art] Populate DV Done
21,612,018 UART: [fht] FMC Alias Private Key: 7
21,613,558 UART: [art] Derive CDI
21,614,366 UART: [art] Store in in slot 0x4
21,671,941 UART: [art] Derive Key Pair
21,672,975 UART: [art] Store priv key in slot 0x5
24,135,993 UART: [art] Derive Key Pair - Done
24,149,033 UART: [art] Signing Cert with AUTHO
24,150,351 UART: RITY.KEYID = 7
25,861,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,682 UART: [art] PUB.X = 967C43B0D66D00EAD29C67A1AB8BC057F0E7A1AC7E5CAFDF2E2A37961841AA499F487C00DC65A6C8B95838A95E03B85A
25,869,921 UART: [art] PUB.Y = D6AE29FA667A79FBA0DCECC1F9A25230CBC3A9088F6C5C8B17B765445818F9574E204DA6149AB971904CBE3DBA1B7AD5
25,877,503 UART: [art] SIG.R = 99BC7B723A3D7D7FD825E91217C4502D62E30B72013FA69A7F88FDBAAD724C733BC4AFAF5F84C4E5A153D819E62AFFEE
25,884,631 UART: [art] SIG.S = F53B3744187947A2346DD412297A99247D18492FD69E165F6E2BF381269F66975ECAD4C5492B6208F767BF43F2CD90B8
26,863,219 UART: Caliptra RT
26,863,906 UART: [state] CFI Enabled
27,029,059 UART: [rt] RT listening for mailbox commands...
27,031,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,187,186 UART: [rt]cmd =0x41544d4e, len=14344
29,554,900 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,362,098 ready_for_fw is high
3,362,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,019,259 >>> mbox cmd response: success
19,305,425 UART:
19,305,815 UART: Running Caliptra FMC ...
19,306,909 UART:
19,307,063 UART: [state] CFI Enabled
19,373,157 UART: [fht] FMC Alias Private Key: 7
21,137,370 UART: [art] Extend RT PCRs Done
21,138,578 UART: [art] Lock RT PCRs Done
21,140,311 UART: [art] Populate DV Done
21,145,667 UART: [fht] FMC Alias Private Key: 7
21,147,373 UART: [art] Derive CDI
21,148,188 UART: [art] Store in in slot 0x4
21,206,578 UART: [art] Derive Key Pair
21,207,611 UART: [art] Store priv key in slot 0x5
23,670,688 UART: [art] Derive Key Pair - Done
23,683,628 UART: [art] Signing Cert with AUTHO
23,684,965 UART: RITY.KEYID = 7
25,396,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,398,200 UART: [art] PUB.X = FFA372820487538D9941C067E018F08A07F16281BB6829E3958AA726D849BF6E3FE6C5E15057D362571F07BBD154894A
25,405,455 UART: [art] PUB.Y = A59E46CE0DF1588E466756F857A08741336A148CE7B7A558D02407EB2A1C32CEC12DFE6329492AC6DF851F693396A5A7
25,412,671 UART: [art] SIG.R = 5BB42789DA2009B22A9C092E9D3587B77738BD5DCA361E024318E8C61FB9E9C2526CC99CA29409B9197AEF21A2289E3A
25,420,091 UART: [art] SIG.S = 785844D48D4C7A007DE84E39EB065485CCF6D3FD5FA10CFA6A47649D3BA261F7130D2BC555E57A34B52975282E787A0B
26,399,125 UART: Caliptra RT
26,399,830 UART: [state] CFI Enabled
26,564,887 UART: [rt] RT listening for mailbox commands...
26,567,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,723,221 UART: [rt]cmd =0x41544d4e, len=14344
29,098,467 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,275 UART:
192,657 UART: Running Caliptra ROM ...
193,833 UART:
603,322 UART: [state] CFI Enabled
615,743 UART: [state] LifecycleState = Unprovisioned
617,633 UART: [state] DebugLocked = No
618,876 UART: [state] WD Timer not started. Device not locked for debugging
622,199 UART: [kat] SHA2-256
801,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,911 UART: [kat] ++
813,447 UART: [kat] sha1
824,888 UART: [kat] SHA2-256
827,886 UART: [kat] SHA2-384
835,217 UART: [kat] SHA2-512-ACC
838,143 UART: [kat] ECC-384
3,279,709 UART: [kat] HMAC-384Kdf
3,292,443 UART: [kat] LMS
3,821,931 UART: [kat] --
3,826,308 UART: [cold-reset] ++
3,828,877 UART: [fht] FHT @ 0x50003400
3,839,845 UART: [idev] ++
3,840,407 UART: [idev] CDI.KEYID = 6
3,841,306 UART: [idev] SUBJECT.KEYID = 7
3,842,540 UART: [idev] UDS.KEYID = 0
3,843,458 ready_for_fw is high
3,843,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,369 UART: [idev] Erasing UDS.KEYID = 0
6,314,388 UART: [idev] Sha1 KeyId Algorithm
6,337,280 UART: [idev] --
6,341,030 UART: [ldev] ++
6,341,607 UART: [ldev] CDI.KEYID = 6
6,342,513 UART: [ldev] SUBJECT.KEYID = 5
6,343,715 UART: [ldev] AUTHORITY.KEYID = 7
6,344,933 UART: [ldev] FE.KEYID = 1
6,354,562 UART: [ldev] Erasing FE.KEYID = 1
8,828,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,502 UART: [ldev] --
10,618,836 UART: [fwproc] Wait for Commands...
10,621,139 UART: [fwproc] Recv command 0x46574c44
10,623,223 UART: [fwproc] Recv'd Img size: 114448 bytes
15,188,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,259,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,328,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,646,624 >>> mbox cmd response: success
15,651,700 UART: [afmc] ++
15,652,289 UART: [afmc] CDI.KEYID = 6
15,653,211 UART: [afmc] SUBJECT.KEYID = 7
15,654,420 UART: [afmc] AUTHORITY.KEYID = 5
18,154,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,877,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,879,114 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,895,076 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,911,042 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,927,028 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,949,494 UART: [afmc] --
19,953,841 UART: [cold-reset] --
19,959,367 UART: [state] Locking Datavault
19,964,445 UART: [state] Locking PCR0, PCR1 and PCR31
19,966,149 UART: [state] Locking ICCM
19,967,268 UART: [exit] Launching FMC @ 0x40000130
19,975,716 UART:
19,975,946 UART: Running Caliptra FMC ...
19,977,056 UART:
19,977,216 UART: [state] CFI Enabled
19,985,364 UART: [fht] FMC Alias Private Key: 7
21,742,595 UART: [art] Extend RT PCRs Done
21,743,807 UART: [art] Lock RT PCRs Done
21,745,612 UART: [art] Populate DV Done
21,750,955 UART: [fht] FMC Alias Private Key: 7
21,752,539 UART: [art] Derive CDI
21,753,345 UART: [art] Store in in slot 0x4
21,796,093 UART: [art] Derive Key Pair
21,797,133 UART: [art] Store priv key in slot 0x5
24,223,498 UART: [art] Derive Key Pair - Done
24,236,485 UART: [art] Signing Cert with AUTHO
24,237,775 UART: RITY.KEYID = 7
25,943,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,944,633 UART: [art] PUB.X = 4A3C08DE835D1C8CED6E15496F08CF4E201241B48D1DD5C12B253F280AE2D20DE8126EC9DD89FD9768ACEBC1859C1574
25,951,985 UART: [art] PUB.Y = 1B68F85F66316D379E7C00F637966355B4251F0DB584A3D2C7862A1C630AF43BA7BA82371E65428FA462ED070747ABAF
25,959,195 UART: [art] SIG.R = 2620A46A4831C069D80F674B5B8F7E4A9AE98D3E667920EF7DA583290C246B795B3BDE705642EA3B3406B2A55AA59BF9
25,966,563 UART: [art] SIG.S = 36F03A096C73B3B87B027FBD6DA7627BCE4A1DDF2740B41BC4D642628320323C50B8C96C1A7526DF87EB66EB8C6406AF
26,944,979 UART: Caliptra RT
26,945,661 UART: [state] CFI Enabled
27,062,614 UART: [rt] RT listening for mailbox commands...
27,064,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,220,371 UART: [rt]cmd =0x41544d4e, len=14344
29,583,469 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,695,746 ready_for_fw is high
3,696,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,250,811 >>> mbox cmd response: success
19,500,371 UART:
19,500,769 UART: Running Caliptra FMC ...
19,501,976 UART:
19,502,140 UART: [state] CFI Enabled
19,510,115 UART: [fht] FMC Alias Private Key: 7
21,266,750 UART: [art] Extend RT PCRs Done
21,267,969 UART: [art] Lock RT PCRs Done
21,269,590 UART: [art] Populate DV Done
21,275,199 UART: [fht] FMC Alias Private Key: 7
21,276,878 UART: [art] Derive CDI
21,277,677 UART: [art] Store in in slot 0x4
21,320,338 UART: [art] Derive Key Pair
21,321,342 UART: [art] Store priv key in slot 0x5
23,748,544 UART: [art] Derive Key Pair - Done
23,761,692 UART: [art] Signing Cert with AUTHO
23,763,022 UART: RITY.KEYID = 7
25,468,457 UART: [art] Erasing AUTHORITY.KEYID = 7
25,469,953 UART: [art] PUB.X = 6346A5DCF57BD39CD7B224B92FC5A1A379E5718C5FF29528F117351640F3D18537E8CE35EF298084B29A2324D08C69A3
25,477,249 UART: [art] PUB.Y = C7BBACC7987512EA00B2BFE293DFCAD828986BC08CDB6E844BE2BB62DD94AB3AB0E69C1A52011AB2D905CD3B0F4FA2FC
25,484,491 UART: [art] SIG.R = EB7505AA88570EC2DACFA2A4099E4B1D3C31C8D6214B0928C2EC8ECEE7E082C66E7097413656F4C8E47F41AF0BECAED7
25,491,899 UART: [art] SIG.S = CD9FEA445B45698409D88619AE0501EA96AC10F10FF02395B8655BD851A570CBCD35F557A6CF0DC359B540222992EF8C
26,470,481 UART: Caliptra RT
26,471,180 UART: [state] CFI Enabled
26,588,314 UART: [rt] RT listening for mailbox commands...
26,590,597 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,745,810 UART: [rt]cmd =0x41544d4e, len=14344
29,115,605 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,248 UART:
192,613 UART: Running Caliptra ROM ...
193,762 UART:
193,913 UART: [state] CFI Enabled
264,953 UART: [state] LifecycleState = Unprovisioned
267,378 UART: [state] DebugLocked = No
269,199 UART: [state] WD Timer not started. Device not locked for debugging
273,952 UART: [kat] SHA2-256
463,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,636 UART: [kat] ++
475,116 UART: [kat] sha1
486,845 UART: [kat] SHA2-256
489,868 UART: [kat] SHA2-384
496,591 UART: [kat] SHA2-512-ACC
499,172 UART: [kat] ECC-384
2,952,183 UART: [kat] HMAC-384Kdf
2,972,943 UART: [kat] LMS
3,504,728 UART: [kat] --
3,508,893 UART: [cold-reset] ++
3,510,464 UART: [fht] FHT @ 0x50003400
3,520,476 UART: [idev] ++
3,521,191 UART: [idev] CDI.KEYID = 6
3,522,227 UART: [idev] SUBJECT.KEYID = 7
3,523,334 UART: [idev] UDS.KEYID = 0
3,524,259 ready_for_fw is high
3,524,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,349 UART: [idev] Erasing UDS.KEYID = 0
6,029,006 UART: [idev] Sha1 KeyId Algorithm
6,053,001 UART: [idev] --
6,058,159 UART: [ldev] ++
6,058,849 UART: [ldev] CDI.KEYID = 6
6,059,819 UART: [ldev] SUBJECT.KEYID = 5
6,060,983 UART: [ldev] AUTHORITY.KEYID = 7
6,062,164 UART: [ldev] FE.KEYID = 1
6,102,619 UART: [ldev] Erasing FE.KEYID = 1
8,605,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,695 UART: [ldev] --
10,417,018 UART: [fwproc] Wait for Commands...
10,419,119 UART: [fwproc] Recv command 0x46574c44
10,421,425 UART: [fwproc] Recv'd Img size: 114448 bytes
15,041,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,120,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,236,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,779,927 >>> mbox cmd response: success
15,784,350 UART: [afmc] ++
15,785,061 UART: [afmc] CDI.KEYID = 6
15,786,246 UART: [afmc] SUBJECT.KEYID = 7
15,787,735 UART: [afmc] AUTHORITY.KEYID = 5
18,327,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,068,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,070,378 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,085,207 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,100,436 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,115,261 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,138,339 UART: [afmc] --
20,141,983 UART: [cold-reset] --
20,145,746 UART: [state] Locking Datavault
20,150,654 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,897 UART: [state] Locking ICCM
20,155,002 UART: [exit] Launching FMC @ 0x40000130
20,163,686 UART:
20,163,929 UART: Running Caliptra FMC ...
20,164,958 UART:
20,165,106 UART: [state] CFI Enabled
20,225,679 UART: [fht] FMC Alias Private Key: 7
21,989,399 UART: [art] Extend RT PCRs Done
21,990,743 UART: [art] Lock RT PCRs Done
21,992,455 UART: [art] Populate DV Done
21,997,977 UART: [fht] FMC Alias Private Key: 7
21,999,566 UART: [art] Derive CDI
22,000,312 UART: [art] Store in in slot 0x4
22,057,896 UART: [art] Derive Key Pair
22,058,895 UART: [art] Store priv key in slot 0x5
24,521,878 UART: [art] Derive Key Pair - Done
24,535,317 UART: [art] Signing Cert with AUTHO
24,536,628 UART: RITY.KEYID = 7
26,246,769 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,263 UART: [art] PUB.X = BA3AC8BB9C3E76D9D0E0CCB8FEF281AF9451B78A955406FEBF71D53F91CA648045009E17B85BB0C4CA82AF49126C9EFA
26,255,558 UART: [art] PUB.Y = 5261E6C3C61C68531DC0026A242C38BBB95C349A960F57D0DD722E4590DEDC05914E8BBDA8893EEC9D96077A70D5D755
26,262,839 UART: [art] SIG.R = D3F41CCD6A7351466EF333D9B7E2642D7D9F42366EAA86165E1837B1358EB029366632BF02668749EF329460FF8C1F0C
26,270,183 UART: [art] SIG.S = 78FA35465872B6C5CF605F7144F7067F59A1CBB07CAD717B0EBFCB6C84B2ECDA31E8ED89DC6B6AA0017DECAD40A2CFEA
27,249,089 UART: Caliptra RT
27,249,798 UART: [state] CFI Enabled
27,414,178 UART: [rt] RT listening for mailbox commands...
27,416,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,449 UART: [rt]cmd =0x41544d4e, len=14344
29,931,158 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,435,558 ready_for_fw is high
3,435,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,851,340 >>> mbox cmd response: success
20,143,188 UART:
20,143,594 UART: Running Caliptra FMC ...
20,144,707 UART:
20,144,859 UART: [state] CFI Enabled
20,213,242 UART: [fht] FMC Alias Private Key: 7
21,977,512 UART: [art] Extend RT PCRs Done
21,978,737 UART: [art] Lock RT PCRs Done
21,980,710 UART: [art] Populate DV Done
21,985,913 UART: [fht] FMC Alias Private Key: 7
21,987,505 UART: [art] Derive CDI
21,988,242 UART: [art] Store in in slot 0x4
22,045,502 UART: [art] Derive Key Pair
22,046,545 UART: [art] Store priv key in slot 0x5
24,509,295 UART: [art] Derive Key Pair - Done
24,522,453 UART: [art] Signing Cert with AUTHO
24,523,757 UART: RITY.KEYID = 7
26,235,981 UART: [art] Erasing AUTHORITY.KEYID = 7
26,237,480 UART: [art] PUB.X = 2A06E091273B7C4A5B2BAD2E7917818CCA5E6F24D09874DFF8863238BFAF288CFF252FE4C11003420ED2BEA8EB736838
26,244,724 UART: [art] PUB.Y = C77D27700F661133A4FB9DBBCBC72C291C25170D9F72947F1BD7B93293B63F057DAA97FDD104915186F7F14B2C51F49B
26,251,975 UART: [art] SIG.R = 67BA83952C1CC8BA5CB3B384F250506B92E2296EF13CD8111A2628316CDE4521E5D2B7C9733E635FD3C658F9C759B687
26,259,363 UART: [art] SIG.S = E9D041FAD5F4D94B6FD0C3448009AF02BA4705AD978E45514BCDD3C6406AC3624DB66B6BD9AE4192B3DAE81E395D30CA
27,238,122 UART: Caliptra RT
27,238,852 UART: [state] CFI Enabled
27,402,996 UART: [rt] RT listening for mailbox commands...
27,405,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,561,154 UART: [rt]cmd =0x41544d4e, len=14344
29,933,453 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,516 UART:
192,898 UART: Running Caliptra ROM ...
194,034 UART:
603,699 UART: [state] CFI Enabled
619,285 UART: [state] LifecycleState = Unprovisioned
621,599 UART: [state] DebugLocked = No
623,609 UART: [state] WD Timer not started. Device not locked for debugging
628,193 UART: [kat] SHA2-256
818,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,832 UART: [kat] ++
829,424 UART: [kat] sha1
840,460 UART: [kat] SHA2-256
843,501 UART: [kat] SHA2-384
849,784 UART: [kat] SHA2-512-ACC
852,364 UART: [kat] ECC-384
3,291,329 UART: [kat] HMAC-384Kdf
3,305,135 UART: [kat] LMS
3,837,012 UART: [kat] --
3,841,886 UART: [cold-reset] ++
3,843,328 UART: [fht] FHT @ 0x50003400
3,854,306 UART: [idev] ++
3,854,933 UART: [idev] CDI.KEYID = 6
3,855,955 UART: [idev] SUBJECT.KEYID = 7
3,857,119 UART: [idev] UDS.KEYID = 0
3,858,036 ready_for_fw is high
3,858,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,977 UART: [idev] Erasing UDS.KEYID = 0
6,335,949 UART: [idev] Sha1 KeyId Algorithm
6,358,413 UART: [idev] --
6,363,837 UART: [ldev] ++
6,364,520 UART: [ldev] CDI.KEYID = 6
6,365,423 UART: [ldev] SUBJECT.KEYID = 5
6,366,650 UART: [ldev] AUTHORITY.KEYID = 7
6,367,830 UART: [ldev] FE.KEYID = 1
6,377,979 UART: [ldev] Erasing FE.KEYID = 1
8,853,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,170 UART: [ldev] --
10,644,999 UART: [fwproc] Wait for Commands...
10,646,543 UART: [fwproc] Recv command 0x46574c44
10,648,843 UART: [fwproc] Recv'd Img size: 114448 bytes
15,291,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,377,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,493,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,037,307 >>> mbox cmd response: success
16,041,817 UART: [afmc] ++
16,042,531 UART: [afmc] CDI.KEYID = 6
16,043,724 UART: [afmc] SUBJECT.KEYID = 7
16,045,165 UART: [afmc] AUTHORITY.KEYID = 5
18,549,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,270,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,272,386 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,287,486 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,302,697 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,317,499 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,341,807 UART: [afmc] --
20,344,693 UART: [cold-reset] --
20,349,259 UART: [state] Locking Datavault
20,353,319 UART: [state] Locking PCR0, PCR1 and PCR31
20,355,622 UART: [state] Locking ICCM
20,356,560 UART: [exit] Launching FMC @ 0x40000130
20,365,254 UART:
20,365,485 UART: Running Caliptra FMC ...
20,366,581 UART:
20,366,728 UART: [state] CFI Enabled
20,374,334 UART: [fht] FMC Alias Private Key: 7
22,131,636 UART: [art] Extend RT PCRs Done
22,132,837 UART: [art] Lock RT PCRs Done
22,134,698 UART: [art] Populate DV Done
22,139,936 UART: [fht] FMC Alias Private Key: 7
22,141,515 UART: [art] Derive CDI
22,142,242 UART: [art] Store in in slot 0x4
22,184,712 UART: [art] Derive Key Pair
22,185,705 UART: [art] Store priv key in slot 0x5
24,612,164 UART: [art] Derive Key Pair - Done
24,625,375 UART: [art] Signing Cert with AUTHO
24,626,674 UART: RITY.KEYID = 7
26,332,323 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,814 UART: [art] PUB.X = 9F09EC60FED917B7C0DD1B71760553B92DCE962700079D0615E410F21CC8F77A67D65AB61F9B27490F4C55A8F70E496F
26,341,030 UART: [art] PUB.Y = 5B327DBB78E18D10098EC2CBF7D905D6C48513686FECED0CFB8219ADABE4FF0B75A5DC719191BC6E3BFAC9478E5A53CC
26,348,353 UART: [art] SIG.R = 4A7B22CAB57E9C9BB236860D5FA616920DC3A2AAE4E142D787C406685A7B0FA1EB9457AC3975C17E883062B66F6F7236
26,355,758 UART: [art] SIG.S = E42AF49483DB966CB9C88093370FA3E12098D3C722075DEC2A2A827884B615E7035A08BD97EA2A48F3BF0836C4F31366
27,333,868 UART: Caliptra RT
27,334,576 UART: [state] CFI Enabled
27,451,617 UART: [rt] RT listening for mailbox commands...
27,453,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,609,188 UART: [rt]cmd =0x41544d4e, len=14344
29,979,487 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,754,377 ready_for_fw is high
3,754,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,062,409 >>> mbox cmd response: success
20,318,552 UART:
20,318,955 UART: Running Caliptra FMC ...
20,320,141 UART:
20,320,302 UART: [state] CFI Enabled
20,328,386 UART: [fht] FMC Alias Private Key: 7
22,085,213 UART: [art] Extend RT PCRs Done
22,086,439 UART: [art] Lock RT PCRs Done
22,088,037 UART: [art] Populate DV Done
22,093,250 UART: [fht] FMC Alias Private Key: 7
22,094,951 UART: [art] Derive CDI
22,095,765 UART: [art] Store in in slot 0x4
22,138,310 UART: [art] Derive Key Pair
22,139,350 UART: [art] Store priv key in slot 0x5
24,566,583 UART: [art] Derive Key Pair - Done
24,579,631 UART: [art] Signing Cert with AUTHO
24,580,934 UART: RITY.KEYID = 7
26,286,885 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,409 UART: [art] PUB.X = 61CC673B460199C045AA59483D1B78F76E57335F8BA83779F51B10C641ED9666995945F8476408FDDBC56EB6D10855E9
26,295,642 UART: [art] PUB.Y = C15749966A6F0E7D9AD2D15BB7A4083EA8F7E70D3D6BFC59AA6020D512C3275F872F612436ACD3462FDB50851D8A5A63
26,302,897 UART: [art] SIG.R = A5671191C7CB829AF20D98BF7F33072F9C872528BE7976B15449755687F768EA5336C0B2F6769FBF72A52E44F5C35B69
26,310,218 UART: [art] SIG.S = 7801B587893944E611044522DE51FC5E56B20DB549686675091ED059DB86A197123353A3561E30EAEF6049034173A539
27,289,399 UART: Caliptra RT
27,290,107 UART: [state] CFI Enabled
27,407,994 UART: [rt] RT listening for mailbox commands...
27,410,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,565,357 UART: [rt]cmd =0x41544d4e, len=14344
29,930,036 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,245 UART: [kat] SHA2-256
882,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,291 UART: [kat] ++
886,443 UART: [kat] sha1
890,807 UART: [kat] SHA2-256
892,745 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,650 UART: [kat] LMS
1,475,846 UART: [kat] --
1,476,613 UART: [cold-reset] ++
1,477,077 UART: [fht] Storing FHT @ 0x50003400
1,479,960 UART: [idev] ++
1,480,128 UART: [idev] CDI.KEYID = 6
1,480,488 UART: [idev] SUBJECT.KEYID = 7
1,480,912 UART: [idev] UDS.KEYID = 0
1,481,257 ready_for_fw is high
1,481,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,042 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,812 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,441 UART: [ldev] Erasing FE.KEYID = 1
1,546,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,654 UART: [ldev] --
1,585,961 UART: [fwproc] Waiting for Commands...
1,586,812 UART: [fwproc] Received command 0x46574c44
1,587,603 UART: [fwproc] Received Image of size 114448 bytes
5,009,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,037,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,066,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,202,975 >>> mbox cmd response: success
5,204,149 UART: [afmc] ++
5,204,317 UART: [afmc] CDI.KEYID = 6
5,204,679 UART: [afmc] SUBJECT.KEYID = 7
5,205,104 UART: [afmc] AUTHORITY.KEYID = 5
5,240,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,256,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,256,878 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,262,587 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,268,479 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,274,180 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,282,016 UART: [afmc] --
5,283,126 UART: [cold-reset] --
5,284,094 UART: [state] Locking Datavault
5,285,283 UART: [state] Locking PCR0, PCR1 and PCR31
5,285,887 UART: [state] Locking ICCM
5,286,437 UART: [exit] Launching FMC @ 0x40000130
5,291,766 UART:
5,291,782 UART: Running Caliptra FMC ...
5,292,190 UART:
5,292,244 UART: [state] CFI Enabled
5,302,506 UART: [fht] FMC Alias Private Key: 7
5,409,914 UART: [art] Extend RT PCRs Done
5,410,342 UART: [art] Lock RT PCRs Done
5,411,802 UART: [art] Populate DV Done
5,419,918 UART: [fht] FMC Alias Private Key: 7
5,421,004 UART: [art] Derive CDI
5,421,284 UART: [art] Store in in slot 0x4
5,507,223 UART: [art] Derive Key Pair
5,507,583 UART: [art] Store priv key in slot 0x5
5,520,107 UART: [art] Derive Key Pair - Done
5,534,869 UART: [art] Signing Cert with AUTHO
5,535,349 UART: RITY.KEYID = 7
5,550,711 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,476 UART: [art] PUB.X = 4EB29C661A826049F72EFE9993AE2544991DE0D6EFC6A38E18090B466C6806AEBC61A5319339954E729DB3BE6F2352DB
5,558,241 UART: [art] PUB.Y = DF9EF1B3389CDEC92EEC1122B9339A7C08CBC3100B27DC52B80BBC3254147B8C9226B233B7692CD3FEFCFFEC8E4F87F7
5,565,204 UART: [art] SIG.R = 449AF41561F457F8E5C3D14436B298EFC55EB9E7FC5726C68059E832921E4EC550569F2BAA30019E640D612E53CCA813
5,571,968 UART: [art] SIG.S = 8039300B440BC30530AA9E056D750894407430DDAB02EC264BA9B6E39B774EC3671ED919726F737CDAD2DE029901698A
5,595,891 UART: Caliptra RT
5,596,144 UART: [state] CFI Enabled
5,703,097 UART: [rt] RT listening for mailbox commands...
5,703,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,826,681 UART: [rt]cmd =0x41544d4e, len=14344
6,387,551 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,743 ready_for_fw is high
1,362,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,052,237 >>> mbox cmd response: success
5,113,286 UART:
5,113,302 UART: Running Caliptra FMC ...
5,113,710 UART:
5,113,764 UART: [state] CFI Enabled
5,124,362 UART: [fht] FMC Alias Private Key: 7
5,232,716 UART: [art] Extend RT PCRs Done
5,233,144 UART: [art] Lock RT PCRs Done
5,234,296 UART: [art] Populate DV Done
5,242,696 UART: [fht] FMC Alias Private Key: 7
5,243,640 UART: [art] Derive CDI
5,243,920 UART: [art] Store in in slot 0x4
5,329,665 UART: [art] Derive Key Pair
5,330,025 UART: [art] Store priv key in slot 0x5
5,342,933 UART: [art] Derive Key Pair - Done
5,357,834 UART: [art] Signing Cert with AUTHO
5,358,314 UART: RITY.KEYID = 7
5,373,574 UART: [art] Erasing AUTHORITY.KEYID = 7
5,374,339 UART: [art] PUB.X = 6FBCE01F51B5F4144558F248FE3E46D1C47DFB81394C439A6FFE0910436D1F4BAD707E2D1AD267E381B2C02F7B748840
5,381,114 UART: [art] PUB.Y = 0AE15CC2B0BF85A406751499706A10280F33FC72887BA62BA22CDE0972D19BD2EB7C5044B21A8FE7C6EECF38D3FB60C9
5,388,066 UART: [art] SIG.R = EA8AC2D9D31C0459F4F4793FFC975F01C39A124A38FECA7D596BA4DEBC400CCC1FC5EF7B595706E43AADF222E4EFC578
5,394,850 UART: [art] SIG.S = 5FC730739D84EFCF84C637604B514C11647B9F34E74E14F586850D0B242A208E236C8A93D295B932208B607CE5845703
5,418,646 UART: Caliptra RT
5,418,899 UART: [state] CFI Enabled
5,526,982 UART: [rt] RT listening for mailbox commands...
5,527,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,786 UART: [rt]cmd =0x41544d4e, len=14344
6,211,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,874 UART: [kat] SHA2-256
881,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,920 UART: [kat] ++
886,072 UART: [kat] sha1
890,540 UART: [kat] SHA2-256
892,478 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,599 UART: [kat] HMAC-384Kdf
907,429 UART: [kat] LMS
1,475,625 UART: [kat] --
1,476,636 UART: [cold-reset] ++
1,477,098 UART: [fht] Storing FHT @ 0x50003400
1,479,759 UART: [idev] ++
1,479,927 UART: [idev] CDI.KEYID = 6
1,480,287 UART: [idev] SUBJECT.KEYID = 7
1,480,711 UART: [idev] UDS.KEYID = 0
1,481,056 ready_for_fw is high
1,481,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,537 UART: [idev] --
1,515,670 UART: [ldev] ++
1,515,838 UART: [ldev] CDI.KEYID = 6
1,516,201 UART: [ldev] SUBJECT.KEYID = 5
1,516,627 UART: [ldev] AUTHORITY.KEYID = 7
1,517,090 UART: [ldev] FE.KEYID = 1
1,522,070 UART: [ldev] Erasing FE.KEYID = 1
1,547,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,587,078 UART: [fwproc] Waiting for Commands...
1,587,779 UART: [fwproc] Received command 0x46574c44
1,588,570 UART: [fwproc] Received Image of size 114448 bytes
5,123,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,151,502 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,180,854 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,316,839 >>> mbox cmd response: success
5,318,013 UART: [afmc] ++
5,318,181 UART: [afmc] CDI.KEYID = 6
5,318,543 UART: [afmc] SUBJECT.KEYID = 7
5,318,968 UART: [afmc] AUTHORITY.KEYID = 5
5,353,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,250 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,959 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,381,851 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,552 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,396 UART: [afmc] --
5,396,412 UART: [cold-reset] --
5,397,084 UART: [state] Locking Datavault
5,398,359 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,963 UART: [state] Locking ICCM
5,399,551 UART: [exit] Launching FMC @ 0x40000130
5,404,880 UART:
5,404,896 UART: Running Caliptra FMC ...
5,405,304 UART:
5,405,447 UART: [state] CFI Enabled
5,416,161 UART: [fht] FMC Alias Private Key: 7
5,523,691 UART: [art] Extend RT PCRs Done
5,524,119 UART: [art] Lock RT PCRs Done
5,526,085 UART: [art] Populate DV Done
5,534,339 UART: [fht] FMC Alias Private Key: 7
5,535,455 UART: [art] Derive CDI
5,535,735 UART: [art] Store in in slot 0x4
5,621,094 UART: [art] Derive Key Pair
5,621,454 UART: [art] Store priv key in slot 0x5
5,634,742 UART: [art] Derive Key Pair - Done
5,649,564 UART: [art] Signing Cert with AUTHO
5,650,044 UART: RITY.KEYID = 7
5,665,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,267 UART: [art] PUB.X = E43784E29E8CE4B1178A8AAF18E7DF3FE74984241A0B52365D1805440B5CB20FBA82D87A80728280F9890841BDB3AA8A
5,673,026 UART: [art] PUB.Y = EAF75A0E0E41F97735AB4D20333206D060E81134EAB7F1880A7A6830D13DBCD127EA0D7489C8EC770CF13C0F0D846E7D
5,679,962 UART: [art] SIG.R = 214C16062EC9C4626FF52679257069BAC4A34C563AD7CD909421B127A2372C60D9577D0D718AA2505835BD6DCB83397D
5,686,722 UART: [art] SIG.S = C4C9974A1D4D4DC6268A5E1DA5BD851ABFEA73A5F3CE30626692CB4BDF2B3D539E50C022468E6983355C858466A8366E
5,710,767 UART: Caliptra RT
5,711,112 UART: [state] CFI Enabled
5,818,741 UART: [rt] RT listening for mailbox commands...
5,819,411 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,942,169 UART: [rt]cmd =0x41544d4e, len=14344
6,510,286 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,190 ready_for_fw is high
1,363,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,204,506 >>> mbox cmd response: success
5,266,023 UART:
5,266,039 UART: Running Caliptra FMC ...
5,266,447 UART:
5,266,590 UART: [state] CFI Enabled
5,277,082 UART: [fht] FMC Alias Private Key: 7
5,385,152 UART: [art] Extend RT PCRs Done
5,385,580 UART: [art] Lock RT PCRs Done
5,387,092 UART: [art] Populate DV Done
5,395,332 UART: [fht] FMC Alias Private Key: 7
5,396,428 UART: [art] Derive CDI
5,396,708 UART: [art] Store in in slot 0x4
5,482,813 UART: [art] Derive Key Pair
5,483,173 UART: [art] Store priv key in slot 0x5
5,495,603 UART: [art] Derive Key Pair - Done
5,510,533 UART: [art] Signing Cert with AUTHO
5,511,013 UART: RITY.KEYID = 7
5,526,335 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,100 UART: [art] PUB.X = 7F0B62217FF33054EA23FBB136FB7EC6F08885E06128E697F1BD8EE0B126FFDB5A06ED72FAD30EE662A2C3ACF1AF8654
5,533,881 UART: [art] PUB.Y = 75D01E45E6D42679EF53D0E3FC08098F179CDE7DFB0E46AF3620D3DBEBEE77FCA4A3A75A5FAB0B49019617D93E078E64
5,540,831 UART: [art] SIG.R = EF54DE5933DF7A3EB2B2CAEEC60D14B4BE875BE25DB9AF92AADEA64149698986474062C7439382320C4314C8362CE35C
5,547,605 UART: [art] SIG.S = 6AD7DFC04AE781CDA59C8E2A39E76B2EDAC78EAD3D3E6FF3C334C529D49C2964D0737B49D1916DAF35C72DEBE6E6E78C
5,571,052 UART: Caliptra RT
5,571,397 UART: [state] CFI Enabled
5,679,274 UART: [rt] RT listening for mailbox commands...
5,679,944 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,802,832 UART: [rt]cmd =0x41544d4e, len=14344
6,368,486 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
893,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,557 UART: [kat] ++
897,709 UART: [kat] sha1
901,971 UART: [kat] SHA2-256
903,911 UART: [kat] SHA2-384
906,448 UART: [kat] SHA2-512-ACC
908,349 UART: [kat] ECC-384
918,388 UART: [kat] HMAC-384Kdf
922,892 UART: [kat] LMS
1,171,220 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,406 UART: [idev] ++
1,175,574 UART: [idev] CDI.KEYID = 6
1,175,934 UART: [idev] SUBJECT.KEYID = 7
1,176,358 UART: [idev] UDS.KEYID = 0
1,176,703 ready_for_fw is high
1,176,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,337 UART: [idev] Sha1 KeyId Algorithm
1,209,621 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,258 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,235 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,633 UART: [ldev] --
1,282,976 UART: [fwproc] Wait for Commands...
1,283,690 UART: [fwproc] Recv command 0x46574c44
1,284,418 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,250 >>> mbox cmd response: success
3,322,288 UART: [afmc] ++
3,322,456 UART: [afmc] CDI.KEYID = 6
3,322,818 UART: [afmc] SUBJECT.KEYID = 7
3,323,243 UART: [afmc] AUTHORITY.KEYID = 5
3,359,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,922 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,631 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,523 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,234 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,111 UART: [afmc] --
3,403,165 UART: [cold-reset] --
3,403,943 UART: [state] Locking Datavault
3,405,084 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,688 UART: [state] Locking ICCM
3,406,358 UART: [exit] Launching FMC @ 0x40000130
3,411,687 UART:
3,411,703 UART: Running Caliptra FMC ...
3,412,111 UART:
3,412,165 UART: [state] CFI Enabled
3,422,541 UART: [fht] FMC Alias Private Key: 7
3,529,603 UART: [art] Extend RT PCRs Done
3,530,031 UART: [art] Lock RT PCRs Done
3,531,693 UART: [art] Populate DV Done
3,539,961 UART: [fht] FMC Alias Private Key: 7
3,541,053 UART: [art] Derive CDI
3,541,333 UART: [art] Store in in slot 0x4
3,627,246 UART: [art] Derive Key Pair
3,627,606 UART: [art] Store priv key in slot 0x5
3,640,482 UART: [art] Derive Key Pair - Done
3,655,147 UART: [art] Signing Cert with AUTHO
3,655,627 UART: RITY.KEYID = 7
3,670,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,036 UART: [art] PUB.X = D87F648F9147F6334C2BE3B0B08D08283C1A357037BB27B1DF71732660CCE28A3B656C4FD0A29E39CCB20C57AD05A514
3,677,803 UART: [art] PUB.Y = B51A9E763DC0E10A0468B05285AD052BAF46F2E6040A3417F7E8F7B9FC40DC029A9CF37A573F421644BC6A3A5809EF27
3,684,740 UART: [art] SIG.R = E0E1F58F7B1F638D2F3493758A4EF4813BAB88CE06A473D37D4011964E142476E8DF8DF7B31FE8184083BD888867A540
3,691,507 UART: [art] SIG.S = 2E9281A1F731BD7A76FC2771789E823F7DEF802370E30EAA83965AB05957DDA8830CE68FB7781C9CECAF37381BDDB598
3,715,688 UART: Caliptra RT
3,715,941 UART: [state] CFI Enabled
3,823,959 UART: [rt] RT listening for mailbox commands...
3,824,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,585 UART: [rt]cmd =0x41544d4e, len=14344
4,498,277 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 ready_for_fw is high
1,059,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,825 >>> mbox cmd response: success
3,237,188 UART:
3,237,204 UART: Running Caliptra FMC ...
3,237,612 UART:
3,237,666 UART: [state] CFI Enabled
3,247,838 UART: [fht] FMC Alias Private Key: 7
3,356,138 UART: [art] Extend RT PCRs Done
3,356,566 UART: [art] Lock RT PCRs Done
3,358,236 UART: [art] Populate DV Done
3,366,490 UART: [fht] FMC Alias Private Key: 7
3,367,462 UART: [art] Derive CDI
3,367,742 UART: [art] Store in in slot 0x4
3,453,723 UART: [art] Derive Key Pair
3,454,083 UART: [art] Store priv key in slot 0x5
3,467,077 UART: [art] Derive Key Pair - Done
3,481,867 UART: [art] Signing Cert with AUTHO
3,482,347 UART: RITY.KEYID = 7
3,497,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,318 UART: [art] PUB.X = AF8E7B33AE1E3C0DA8005918C2665F2D0E25C73AB6A2EC4E48AA9D7949CEFAD10238AC1ACE9CAD45A2235F0B38439E1D
3,505,076 UART: [art] PUB.Y = C2EDBB3248A6BB84229A7CD124816E7541AE9BD91DCDBC274E3251285FC8A527D6B40EC833B4041649E8E7F0A76016CE
3,512,030 UART: [art] SIG.R = 792B382F5D6A37F678FD93BB076BF9826BB924F46CD915EE212BD4FF49F86266EF8B7BE0B0083FD6E84782F3073E463E
3,518,799 UART: [art] SIG.S = 4A676A062C5C7279D30AA0B5F29D2B012FC28A4C54B89BA7093E92C0D407953D3220A5F22EA35FE9D5530E0461D328AA
3,542,297 UART: Caliptra RT
3,542,550 UART: [state] CFI Enabled
3,650,275 UART: [rt] RT listening for mailbox commands...
3,650,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,905 UART: [rt]cmd =0x41544d4e, len=14344
4,336,934 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,217 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,140 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,411 UART: [idev] ++
1,175,579 UART: [idev] CDI.KEYID = 6
1,175,939 UART: [idev] SUBJECT.KEYID = 7
1,176,363 UART: [idev] UDS.KEYID = 0
1,176,708 ready_for_fw is high
1,176,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,131 UART: [idev] Erasing UDS.KEYID = 0
1,200,902 UART: [idev] Sha1 KeyId Algorithm
1,209,450 UART: [idev] --
1,210,672 UART: [ldev] ++
1,210,840 UART: [ldev] CDI.KEYID = 6
1,211,203 UART: [ldev] SUBJECT.KEYID = 5
1,211,629 UART: [ldev] AUTHORITY.KEYID = 7
1,212,092 UART: [ldev] FE.KEYID = 1
1,217,636 UART: [ldev] Erasing FE.KEYID = 1
1,244,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,479 UART: [fwproc] Wait for Commands...
1,284,281 UART: [fwproc] Recv command 0x46574c44
1,285,009 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,211 >>> mbox cmd response: success
3,327,279 UART: [afmc] ++
3,327,447 UART: [afmc] CDI.KEYID = 6
3,327,809 UART: [afmc] SUBJECT.KEYID = 7
3,328,234 UART: [afmc] AUTHORITY.KEYID = 5
3,363,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,929 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,638 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,530 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,241 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,080 UART: [afmc] --
3,407,178 UART: [cold-reset] --
3,407,876 UART: [state] Locking Datavault
3,409,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,831 UART: [state] Locking ICCM
3,410,401 UART: [exit] Launching FMC @ 0x40000130
3,415,730 UART:
3,415,746 UART: Running Caliptra FMC ...
3,416,154 UART:
3,416,297 UART: [state] CFI Enabled
3,426,955 UART: [fht] FMC Alias Private Key: 7
3,534,231 UART: [art] Extend RT PCRs Done
3,534,659 UART: [art] Lock RT PCRs Done
3,536,109 UART: [art] Populate DV Done
3,544,365 UART: [fht] FMC Alias Private Key: 7
3,545,523 UART: [art] Derive CDI
3,545,803 UART: [art] Store in in slot 0x4
3,631,390 UART: [art] Derive Key Pair
3,631,750 UART: [art] Store priv key in slot 0x5
3,644,742 UART: [art] Derive Key Pair - Done
3,659,526 UART: [art] Signing Cert with AUTHO
3,660,006 UART: RITY.KEYID = 7
3,675,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,017 UART: [art] PUB.X = E0668680B0487987DDE9E5A3743DC4CE939C172C035A93E586D3BEE9CC84C4476E673715AC39F6EC1D991AC31AA6057E
3,682,787 UART: [art] PUB.Y = 9D979C9FF9AB5089383A6DFA76E57508F62AE56580F8D943E7DC16C296175038E2FDCD789C28D52108BA0C941CFF9D5F
3,689,736 UART: [art] SIG.R = E34BAD9CED0778F36CFCF57009020BDE76F310BC246909C5395E1B49F622BCDB4912EFAE0284462592F02F09CA863B9D
3,696,495 UART: [art] SIG.S = 59CACAE92003BC90849109636A705E4BA0380E1B610231CC3FF35F8B93246A559B2217E49050208D5856D09DB0E9E08F
3,720,788 UART: Caliptra RT
3,721,133 UART: [state] CFI Enabled
3,828,737 UART: [rt] RT listening for mailbox commands...
3,829,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,185 UART: [rt]cmd =0x41544d4e, len=14344
4,509,988 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,162 ready_for_fw is high
1,060,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,184,044 >>> mbox cmd response: success
3,246,585 UART:
3,246,601 UART: Running Caliptra FMC ...
3,247,009 UART:
3,247,152 UART: [state] CFI Enabled
3,257,714 UART: [fht] FMC Alias Private Key: 7
3,365,874 UART: [art] Extend RT PCRs Done
3,366,302 UART: [art] Lock RT PCRs Done
3,367,604 UART: [art] Populate DV Done
3,375,536 UART: [fht] FMC Alias Private Key: 7
3,376,610 UART: [art] Derive CDI
3,376,890 UART: [art] Store in in slot 0x4
3,462,501 UART: [art] Derive Key Pair
3,462,861 UART: [art] Store priv key in slot 0x5
3,476,155 UART: [art] Derive Key Pair - Done
3,491,095 UART: [art] Signing Cert with AUTHO
3,491,575 UART: RITY.KEYID = 7
3,506,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,450 UART: [art] PUB.X = 21525BD38D83066E71A3873631707959FFAE9B74F7E89C1717E222FDC88BE38437477F5336CE9149E1C0B8798EAA5AF3
3,514,215 UART: [art] PUB.Y = 7DD7C55C7EA70F84E3780AD9A33BDB62132D845A703D34DA320C14B62B3F6CE0FB8301DFDABE737B29852B73C76C4DE9
3,521,169 UART: [art] SIG.R = 00BED416664C678F791607C5EA9C362EB737E69403BA2634ACC90505316F1445888B91CC1575252AD40AB1EA60CB6539
3,527,898 UART: [art] SIG.S = BDDB315D7362BBB743313543559FEC03333142473B83F54F0772F543B792B82B7A4E039150E242FF7EDDAF93C30EF11C
3,552,143 UART: Caliptra RT
3,552,488 UART: [state] CFI Enabled
3,660,587 UART: [rt] RT listening for mailbox commands...
3,661,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,537 UART: [rt]cmd =0x41544d4e, len=14344
4,347,918 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,228 UART: [kat] LMS
1,168,540 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 ready_for_fw is high
1,174,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,241,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,206 >>> mbox cmd response: success
3,326,245 UART: [afmc] ++
3,326,413 UART: [afmc] CDI.KEYID = 6
3,326,776 UART: [afmc] SUBJECT.KEYID = 7
3,327,202 UART: [afmc] AUTHORITY.KEYID = 5
3,362,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,807 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,517 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,407 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,118 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,710 UART: [afmc] --
3,405,590 UART: [cold-reset] --
3,406,498 UART: [state] Locking Datavault
3,407,269 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,873 UART: [state] Locking ICCM
3,408,485 UART: [exit] Launching FMC @ 0x40000130
3,413,814 UART:
3,413,830 UART: Running Caliptra FMC ...
3,414,238 UART:
3,414,292 UART: [state] CFI Enabled
3,424,828 UART: [fht] FMC Alias Private Key: 7
3,533,178 UART: [art] Extend RT PCRs Done
3,533,606 UART: [art] Lock RT PCRs Done
3,535,164 UART: [art] Populate DV Done
3,543,242 UART: [fht] FMC Alias Private Key: 7
3,544,214 UART: [art] Derive CDI
3,544,494 UART: [art] Store in in slot 0x4
3,629,869 UART: [art] Derive Key Pair
3,630,229 UART: [art] Store priv key in slot 0x5
3,643,499 UART: [art] Derive Key Pair - Done
3,658,319 UART: [art] Signing Cert with AUTHO
3,658,799 UART: RITY.KEYID = 7
3,673,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,226 UART: [art] PUB.X = 060209321E0530E662C2A24497609C6D193F3F929A6742F72114587ACF8152BE1AAC184C6CD09D31124EE8D1BC04B907
3,680,972 UART: [art] PUB.Y = 116BF43062D6D872E089F0AC5810F6887EC9F850F25A25ACE72D7D4A0D733BEB5AD0F1E968EADBB9C57F7F9E9FA8AE4D
3,687,941 UART: [art] SIG.R = 6FD607ED4EBF634D19637F4D6BD014955C6F900DA14AD9FAB3198BC34E78E5665DE5D6268BBBB7F86EBEC50D7031D41A
3,694,720 UART: [art] SIG.S = E2F1829D7E16B857D9D96583D5506AE10F8D6E91DEAF8927B4D9ADFD2B0A4949E755AB6495F208216226DF0048DF797A
3,718,936 UART: Caliptra RT
3,719,189 UART: [state] CFI Enabled
3,826,253 UART: [rt] RT listening for mailbox commands...
3,826,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,807 UART: [rt]cmd =0x41544d4e, len=14344
4,508,228 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 ready_for_fw is high
1,056,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,163,814 >>> mbox cmd response: success
3,226,173 UART:
3,226,189 UART: Running Caliptra FMC ...
3,226,597 UART:
3,226,651 UART: [state] CFI Enabled
3,236,897 UART: [fht] FMC Alias Private Key: 7
3,344,641 UART: [art] Extend RT PCRs Done
3,345,069 UART: [art] Lock RT PCRs Done
3,346,807 UART: [art] Populate DV Done
3,355,015 UART: [fht] FMC Alias Private Key: 7
3,356,189 UART: [art] Derive CDI
3,356,469 UART: [art] Store in in slot 0x4
3,442,248 UART: [art] Derive Key Pair
3,442,608 UART: [art] Store priv key in slot 0x5
3,455,584 UART: [art] Derive Key Pair - Done
3,470,750 UART: [art] Signing Cert with AUTHO
3,471,230 UART: RITY.KEYID = 7
3,486,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,947 UART: [art] PUB.X = 20BD3C943ED246496E78FEEED09B53EC1C646DBBBF8C03FD3C7D7F73BAD9582CC713AE1477A5A3553456087627B6993C
3,493,723 UART: [art] PUB.Y = C19388A422E2BBD318073FCFAB9EB0361CEDB0611888841766DEDA3876B87FEE2732FEA79C3619E21F920CA127BAA100
3,500,655 UART: [art] SIG.R = EB91399EFEEFE7A06AD7F5CD81637FAF807B273AEEB51E6E2FFE6CB5A6C7FE49BC978467A2A22FE7C1F163810FA72609
3,507,443 UART: [art] SIG.S = 14E36B927CAB1781DB1881AAD9568371CBEF980578414680E12E191F7C9C369C67DEF06DD9D4464EB04116F550CB34F7
3,531,521 UART: Caliptra RT
3,531,774 UART: [state] CFI Enabled
3,639,192 UART: [rt] RT listening for mailbox commands...
3,639,862 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,702 UART: [rt]cmd =0x41544d4e, len=14344
4,320,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 ready_for_fw is high
1,174,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,806 UART: [fwproc] Recv command 0x46574c44
1,283,539 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,647 >>> mbox cmd response: success
3,319,820 UART: [afmc] ++
3,319,988 UART: [afmc] CDI.KEYID = 6
3,320,351 UART: [afmc] SUBJECT.KEYID = 7
3,320,777 UART: [afmc] AUTHORITY.KEYID = 5
3,357,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,698 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,408 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,298 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,009 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,777 UART: [afmc] --
3,400,799 UART: [cold-reset] --
3,401,859 UART: [state] Locking Datavault
3,402,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,576 UART: [state] Locking ICCM
3,404,066 UART: [exit] Launching FMC @ 0x40000130
3,409,395 UART:
3,409,411 UART: Running Caliptra FMC ...
3,409,819 UART:
3,409,962 UART: [state] CFI Enabled
3,420,748 UART: [fht] FMC Alias Private Key: 7
3,528,328 UART: [art] Extend RT PCRs Done
3,528,756 UART: [art] Lock RT PCRs Done
3,530,276 UART: [art] Populate DV Done
3,538,826 UART: [fht] FMC Alias Private Key: 7
3,539,996 UART: [art] Derive CDI
3,540,276 UART: [art] Store in in slot 0x4
3,625,801 UART: [art] Derive Key Pair
3,626,161 UART: [art] Store priv key in slot 0x5
3,639,713 UART: [art] Derive Key Pair - Done
3,654,301 UART: [art] Signing Cert with AUTHO
3,654,781 UART: RITY.KEYID = 7
3,670,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,024 UART: [art] PUB.X = 1E14D5D210F648F76386FBB1DB2FFAD1C20B290CA0E8B4F096004B744A36E2DB207FC67DBFD0499999EF3FB1ECC2D3B6
3,677,786 UART: [art] PUB.Y = C4F33BD5EE70BE011E16FE22408CE72887FEE157BDC54A6BAF95B41240ACCCCB27CF97409DA3447358CB29A5C79FD537
3,684,751 UART: [art] SIG.R = 732177436DD796CCA06FF814A6B07FA3AE0E31AE1F1AB8A4E69AA89F92F47331787E290D5BDFBBF7C3F6959787D18810
3,691,525 UART: [art] SIG.S = 54E6CFE49F30079D7DEE854C313932E45FE95ABB4242FAF802840DDBCF8F052771EE219A12D7D1A74AFFFD18F7E1ED14
3,715,148 UART: Caliptra RT
3,715,493 UART: [state] CFI Enabled
3,824,068 UART: [rt] RT listening for mailbox commands...
3,824,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,534 UART: [rt]cmd =0x41544d4e, len=14344
4,515,739 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,739 ready_for_fw is high
1,055,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,457 >>> mbox cmd response: success
3,224,566 UART:
3,224,582 UART: Running Caliptra FMC ...
3,224,990 UART:
3,225,133 UART: [state] CFI Enabled
3,236,161 UART: [fht] FMC Alias Private Key: 7
3,343,709 UART: [art] Extend RT PCRs Done
3,344,137 UART: [art] Lock RT PCRs Done
3,345,573 UART: [art] Populate DV Done
3,353,615 UART: [fht] FMC Alias Private Key: 7
3,354,635 UART: [art] Derive CDI
3,354,915 UART: [art] Store in in slot 0x4
3,440,750 UART: [art] Derive Key Pair
3,441,110 UART: [art] Store priv key in slot 0x5
3,454,580 UART: [art] Derive Key Pair - Done
3,469,489 UART: [art] Signing Cert with AUTHO
3,469,969 UART: RITY.KEYID = 7
3,484,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,694 UART: [art] PUB.X = EE0E845AE720B14ACE27CD208EFF878AFCBFBA08F89893A6266AA7A8248D1A3715E75400773291EF7BD3C39EEF078EEF
3,492,451 UART: [art] PUB.Y = F273BE3F4AF963F729F3B932C0D9FB522E7626F98F83E8509678AA6B391F58903BF477A561239C2A06B7B411BEEA8D5F
3,499,404 UART: [art] SIG.R = 6FAA317B81F1A2BC54FB7F113E9C86188AA25A61FC583077BE9BBFA9A94ACBA8496AF110004C28E46275D314EA13B5A0
3,506,166 UART: [art] SIG.S = A39D0EC974A8774ED52E013A00231BD32EEE1C34A0DE70A9B92439B7BA3D1236A7A383F9B818EBBA0F19DABD07C9DACB
3,530,239 UART: Caliptra RT
3,530,584 UART: [state] CFI Enabled
3,638,920 UART: [rt] RT listening for mailbox commands...
3,639,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,462 UART: [rt]cmd =0x41544d4e, len=14344
4,330,517 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,951 UART:
192,320 UART: Running Caliptra ROM ...
193,410 UART:
193,553 UART: [state] CFI Enabled
263,587 UART: [state] LifecycleState = Unprovisioned
265,490 UART: [state] DebugLocked = No
267,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,792 UART: [kat] SHA2-256
441,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,026 UART: [kat] ++
452,503 UART: [kat] sha1
463,164 UART: [kat] SHA2-256
465,828 UART: [kat] SHA2-384
470,688 UART: [kat] SHA2-512-ACC
473,060 UART: [kat] ECC-384
2,767,650 UART: [kat] HMAC-384Kdf
2,799,715 UART: [kat] LMS
3,990,018 UART: [kat] --
3,992,824 UART: [cold-reset] ++
3,994,893 UART: [fht] Storing FHT @ 0x50003400
4,005,659 UART: [idev] ++
4,006,239 UART: [idev] CDI.KEYID = 6
4,007,279 UART: [idev] SUBJECT.KEYID = 7
4,008,457 UART: [idev] UDS.KEYID = 0
4,009,520 ready_for_fw is high
4,009,727 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,280 UART: [idev] Erasing UDS.KEYID = 0
7,344,432 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,668 UART: [idev] --
7,370,334 UART: [ldev] ++
7,370,958 UART: [ldev] CDI.KEYID = 6
7,371,874 UART: [ldev] SUBJECT.KEYID = 5
7,373,083 UART: [ldev] AUTHORITY.KEYID = 7
7,374,375 UART: [ldev] FE.KEYID = 1
7,422,446 UART: [ldev] Erasing FE.KEYID = 1
10,757,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,446 UART: [ldev] --
13,136,356 UART: [fwproc] Waiting for Commands...
13,138,417 UART: [fwproc] Received command 0x46574c44
13,140,612 UART: [fwproc] Received Image of size 114124 bytes
22,102,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,181,153 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,250,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,566,797 >>> mbox cmd response: success
22,570,370 UART: [afmc] ++
22,570,964 UART: [afmc] CDI.KEYID = 6
22,571,877 UART: [afmc] SUBJECT.KEYID = 7
22,573,095 UART: [afmc] AUTHORITY.KEYID = 5
25,937,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,238,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,241,126 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,255,678 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,270,442 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,284,655 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,306,923 UART: [afmc] --
28,310,681 UART: [cold-reset] --
28,313,249 UART: [state] Locking Datavault
28,318,333 UART: [state] Locking PCR0, PCR1 and PCR31
28,320,083 UART: [state] Locking ICCM
28,321,316 UART: [exit] Launching FMC @ 0x40000130
28,329,712 UART:
28,329,948 UART: Running Caliptra FMC ...
28,331,048 UART:
28,331,211 UART: [state] CFI Enabled
28,399,128 UART: [fht] FMC Alias Private Key: 7
30,737,009 UART: [art] Extend RT PCRs Done
30,738,357 UART: [art] Lock RT PCRs Done
30,739,744 UART: [art] Populate DV Done
30,745,104 UART: [fht] FMC Alias Private Key: 7
30,746,651 UART: [art] Derive CDI
30,747,490 UART: [art] Store in in slot 0x4
30,807,397 UART: [art] Derive Key Pair
30,808,398 UART: [art] Store priv key in slot 0x5
34,101,247 UART: [art] Derive Key Pair - Done
34,114,524 UART: [art] Signing Cert with AUTHO
34,115,829 UART: RITY.KEYID = 7
36,403,505 UART: [art] Erasing AUTHORITY.KEYID = 7
36,405,026 UART: [art] PUB.X = 884602704DC8E8455AB340864F6CD2EECC13BAFE4FE31D347C6E7C69F9523ACA657EA0BEC6F00D333E52312C5108452E
36,412,300 UART: [art] PUB.Y = 4F79DD433A6593F86A34F07BDB6CEC087332B2DD1E5DFBDE93305DC6D1163326762E45908D5966562C36CD85EBABBDB6
36,419,530 UART: [art] SIG.R = 587ACF10843237E6AFE76EB30FDEAD9C1A22C2E255D503AF9BBBCB2B1F5B925B12F6C3689B8F9EBC3D7D836E815A87DC
36,426,950 UART: [art] SIG.S = 93FBD6AB1193A8BEC8752EF81C16F91F3A9D2E836F2C36D274F40DDE449B11A1860090EB9BAAEFEBC8A59F612B0079C2
37,732,238 UART: Caliptra RT
37,732,938 UART: [state] CFI Enabled
37,895,343 UART: [rt] RT listening for mailbox commands...
37,897,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,053,103 UART: [rt]cmd =0x41544d4e, len=14344
42,162,141 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,780,009 ready_for_fw is high
3,780,454 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,083,985 >>> mbox cmd response: success
27,777,490 UART:
27,777,870 UART: Running Caliptra FMC ...
27,778,965 UART:
27,779,118 UART: [state] CFI Enabled
27,842,605 UART: [fht] FMC Alias Private Key: 7
30,181,166 UART: [art] Extend RT PCRs Done
30,182,409 UART: [art] Lock RT PCRs Done
30,184,369 UART: [art] Populate DV Done
30,189,838 UART: [fht] FMC Alias Private Key: 7
30,191,326 UART: [art] Derive CDI
30,192,090 UART: [art] Store in in slot 0x4
30,252,122 UART: [art] Derive Key Pair
30,253,164 UART: [art] Store priv key in slot 0x5
33,546,172 UART: [art] Derive Key Pair - Done
33,559,220 UART: [art] Signing Cert with AUTHO
33,560,528 UART: RITY.KEYID = 7
35,848,212 UART: [art] Erasing AUTHORITY.KEYID = 7
35,849,719 UART: [art] PUB.X = 2657E8A0A61A0F3741C05EE350EFDF6EF0CEC199B226F5A66ACA0714BBC1948D73621325EEBA05FB6A0CD83E61D37CD7
35,856,965 UART: [art] PUB.Y = 35F917D9CFE4DD596B079B136C4532DADEF063F28459ED0B686F1121FE8D461AC46AEA6254AB9C8BF34CDCD80BEEADA7
35,864,236 UART: [art] SIG.R = 1030FDA40BFB8775E81B28A31155B73171D62269FFE730C1B895FFDF49B1B5F4B52B53AF2E8D99CED83E595879AE6260
35,871,636 UART: [art] SIG.S = B668A35E5381F21A6E470DD8E523E71D617CE44574E3EA0B1477E22C822922906C4436C62B79B35D255C66760530E7B5
37,176,593 UART: Caliptra RT
37,177,319 UART: [state] CFI Enabled
37,340,268 UART: [rt] RT listening for mailbox commands...
37,342,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,497,722 UART: [rt]cmd =0x41544d4e, len=14344
41,658,549 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,431 UART:
192,794 UART: Running Caliptra ROM ...
193,918 UART:
603,625 UART: [state] CFI Enabled
616,078 UART: [state] LifecycleState = Unprovisioned
618,029 UART: [state] DebugLocked = No
620,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,277 UART: [kat] SHA2-256
795,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,533 UART: [kat] ++
805,978 UART: [kat] sha1
816,914 UART: [kat] SHA2-256
819,616 UART: [kat] SHA2-384
824,074 UART: [kat] SHA2-512-ACC
826,449 UART: [kat] ECC-384
3,111,097 UART: [kat] HMAC-384Kdf
3,122,189 UART: [kat] LMS
4,312,302 UART: [kat] --
4,316,180 UART: [cold-reset] ++
4,317,336 UART: [fht] Storing FHT @ 0x50003400
4,328,196 UART: [idev] ++
4,328,827 UART: [idev] CDI.KEYID = 6
4,329,707 UART: [idev] SUBJECT.KEYID = 7
4,330,964 UART: [idev] UDS.KEYID = 0
4,332,082 ready_for_fw is high
4,332,313 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,714 UART: [idev] Erasing UDS.KEYID = 0
7,618,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,639 UART: [idev] --
7,642,664 UART: [ldev] ++
7,643,231 UART: [ldev] CDI.KEYID = 6
7,644,251 UART: [ldev] SUBJECT.KEYID = 5
7,645,402 UART: [ldev] AUTHORITY.KEYID = 7
7,646,626 UART: [ldev] FE.KEYID = 1
7,656,997 UART: [ldev] Erasing FE.KEYID = 1
10,948,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,735 UART: [ldev] --
13,307,979 UART: [fwproc] Waiting for Commands...
13,310,191 UART: [fwproc] Received command 0x46574c44
13,312,367 UART: [fwproc] Received Image of size 114124 bytes
22,258,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,344,725 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,413,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,730,999 >>> mbox cmd response: success
22,734,299 UART: [afmc] ++
22,734,947 UART: [afmc] CDI.KEYID = 6
22,735,849 UART: [afmc] SUBJECT.KEYID = 7
22,737,061 UART: [afmc] AUTHORITY.KEYID = 5
26,046,017 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,338,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,340,829 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,355,419 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,370,138 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,384,361 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,405,051 UART: [afmc] --
28,409,447 UART: [cold-reset] --
28,413,623 UART: [state] Locking Datavault
28,418,373 UART: [state] Locking PCR0, PCR1 and PCR31
28,420,181 UART: [state] Locking ICCM
28,421,393 UART: [exit] Launching FMC @ 0x40000130
28,429,788 UART:
28,430,031 UART: Running Caliptra FMC ...
28,431,134 UART:
28,431,285 UART: [state] CFI Enabled
28,439,379 UART: [fht] FMC Alias Private Key: 7
30,770,556 UART: [art] Extend RT PCRs Done
30,771,771 UART: [art] Lock RT PCRs Done
30,773,664 UART: [art] Populate DV Done
30,779,022 UART: [fht] FMC Alias Private Key: 7
30,780,609 UART: [art] Derive CDI
30,781,419 UART: [art] Store in in slot 0x4
30,823,689 UART: [art] Derive Key Pair
30,824,717 UART: [art] Store priv key in slot 0x5
34,066,803 UART: [art] Derive Key Pair - Done
34,079,967 UART: [art] Signing Cert with AUTHO
34,081,266 UART: RITY.KEYID = 7
36,360,908 UART: [art] Erasing AUTHORITY.KEYID = 7
36,362,417 UART: [art] PUB.X = FCBCEA4CB810FDA8AD1A07CA655C2701842A001E9A0C892FE91A156F82B3DFA7EF4830A5D9C12658D6AF85BAE8F8EADF
36,369,628 UART: [art] PUB.Y = F5DFD6EF032CB92E8EB67404A73101536BA28A29E5AB176B3028219D5D1F1B750512C696B7655F0B97F437C0B0BF7098
36,376,902 UART: [art] SIG.R = 34DF925A76164DEC5ABCD0D8F3D3AD5D2387395C74929846D07259653C9FEB0644070B525E83823ADB73DEE6FC9250BA
36,384,271 UART: [art] SIG.S = 860A9D348505966862D7F6809C5291A07C46790AAAA2EA5FED1BD2BA21A8A24289C96FA9AAF3B796E501FF184544A949
37,689,277 UART: Caliptra RT
37,689,986 UART: [state] CFI Enabled
37,807,619 UART: [rt] RT listening for mailbox commands...
37,809,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,965,145 UART: [rt]cmd =0x41544d4e, len=14344
42,152,390 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
4,131,909 ready_for_fw is high
4,132,299 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,052,822 >>> mbox cmd response: success
27,694,697 UART:
27,695,106 UART: Running Caliptra FMC ...
27,696,210 UART:
27,696,355 UART: [state] CFI Enabled
27,704,125 UART: [fht] FMC Alias Private Key: 7
30,034,661 UART: [art] Extend RT PCRs Done
30,035,885 UART: [art] Lock RT PCRs Done
30,037,318 UART: [art] Populate DV Done
30,042,528 UART: [fht] FMC Alias Private Key: 7
30,044,001 UART: [art] Derive CDI
30,044,776 UART: [art] Store in in slot 0x4
30,087,125 UART: [art] Derive Key Pair
30,088,133 UART: [art] Store priv key in slot 0x5
33,330,586 UART: [art] Derive Key Pair - Done
33,343,268 UART: [art] Signing Cert with AUTHO
33,344,568 UART: RITY.KEYID = 7
35,624,443 UART: [art] Erasing AUTHORITY.KEYID = 7
35,625,948 UART: [art] PUB.X = 5C9AF0C5231A76E82A0DA8942AFB9D55B420AC5668CC328BE7A37CBCFB55B59EF4A81A11B56276FBDB4892D7AAF71133
35,633,243 UART: [art] PUB.Y = E73D43CFD6055410431E32DDE537500D4B3A460BDA4D19C0A82DDAD8B33DB8E6EDF86CF9C913A905D6283335C4A1A5D3
35,640,493 UART: [art] SIG.R = 29498ECE2AC695339EC42BFE369F5BA317CE98D30495FCC2B8B7617AA6F695C80985FA14A02EFFF78ED2EFA0AEE422A0
35,647,890 UART: [art] SIG.S = 60FF6D9C74BC292D897D4C0A3091B4D63A2026450BF57CCEDA919455A6DB75A7E3178303DC7E21E69A70199AB9F7DEF2
36,953,152 UART: Caliptra RT
36,953,852 UART: [state] CFI Enabled
37,072,586 UART: [rt] RT listening for mailbox commands...
37,074,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,230,340 UART: [rt]cmd =0x41544d4e, len=14344
41,417,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,980 UART:
192,348 UART: Running Caliptra ROM ...
193,547 UART:
193,701 UART: [state] CFI Enabled
267,741 UART: [state] LifecycleState = Unprovisioned
269,679 UART: [state] DebugLocked = No
272,476 UART: [state] WD Timer not started. Device not locked for debugging
276,736 UART: [kat] SHA2-256
455,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,376 UART: [kat] ++
467,912 UART: [kat] sha1
479,438 UART: [kat] SHA2-256
482,452 UART: [kat] SHA2-384
488,725 UART: [kat] SHA2-512-ACC
491,728 UART: [kat] ECC-384
2,949,105 UART: [kat] HMAC-384Kdf
2,963,044 UART: [kat] LMS
3,492,526 UART: [kat] --
3,497,512 UART: [cold-reset] ++
3,499,651 UART: [fht] FHT @ 0x50003400
3,511,834 UART: [idev] ++
3,512,400 UART: [idev] CDI.KEYID = 6
3,513,429 UART: [idev] SUBJECT.KEYID = 7
3,514,552 UART: [idev] UDS.KEYID = 0
3,515,498 ready_for_fw is high
3,515,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,660,119 UART: [idev] Erasing UDS.KEYID = 0
6,021,482 UART: [idev] Sha1 KeyId Algorithm
6,045,175 UART: [idev] --
6,048,999 UART: [ldev] ++
6,049,576 UART: [ldev] CDI.KEYID = 6
6,050,492 UART: [ldev] SUBJECT.KEYID = 5
6,051,653 UART: [ldev] AUTHORITY.KEYID = 7
6,052,888 UART: [ldev] FE.KEYID = 1
6,093,459 UART: [ldev] Erasing FE.KEYID = 1
8,597,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,375 UART: [ldev] --
10,408,620 UART: [fwproc] Wait for Commands...
10,411,686 UART: [fwproc] Recv command 0x46574c44
10,413,725 UART: [fwproc] Recv'd Img size: 114448 bytes
14,998,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,075,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,144,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,462,421 >>> mbox cmd response: success
15,466,252 UART: [afmc] ++
15,466,847 UART: [afmc] CDI.KEYID = 6
15,467,756 UART: [afmc] SUBJECT.KEYID = 7
15,468,916 UART: [afmc] AUTHORITY.KEYID = 5
17,994,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,719,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,721,025 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,737,033 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,752,964 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,768,708 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,792,004 UART: [afmc] --
19,796,576 UART: [cold-reset] --
19,800,831 UART: [state] Locking Datavault
19,806,330 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,985 UART: [state] Locking ICCM
19,810,732 UART: [exit] Launching FMC @ 0x40000130
19,819,185 UART:
19,819,428 UART: Running Caliptra FMC ...
19,820,531 UART:
19,820,690 UART: [state] CFI Enabled
19,877,693 UART: [fht] FMC Alias Private Key: 7
21,641,329 UART: [art] Extend RT PCRs Done
21,642,545 UART: [art] Lock RT PCRs Done
21,644,356 UART: [art] Populate DV Done
21,649,662 UART: [fht] FMC Alias Private Key: 7
21,651,194 UART: [art] Derive CDI
21,652,010 UART: [art] Store in in slot 0x4
21,710,296 UART: [art] Derive Key Pair
21,711,295 UART: [art] Store priv key in slot 0x5
24,174,738 UART: [art] Derive Key Pair - Done
24,187,776 UART: [art] Signing Cert with AUTHO
24,189,074 UART: RITY.KEYID = 7
25,900,673 UART: [art] Erasing AUTHORITY.KEYID = 7
25,902,174 UART: [art] PUB.X = 0D2FC74FC6FBAF116499F8EC12DABBEAC5FDD7CEB24AC72DB1C8F868B2961B6071B52CB57A9702C7CDDD4F1CB3BF3551
25,909,476 UART: [art] PUB.Y = 33CA413287EB3698E903A333EC4CCFC61370649D328F4073CE975294F4112B39B22E181270DA4ACBB6E096B4E052B331
25,916,703 UART: [art] SIG.R = D0E098F50EAE1498A8BDDB2FE7E302E299483E804B08084615444A468BFD7FFE1BD7F0B86629F2EE362AE3530A0FA135
25,924,151 UART: [art] SIG.S = 8861972CBA013AE683D56E8C27AB3607EA3F3C636C22BEDFA02381677210797A2AD63D32D65B49E69B19DBAE3E82FF06
26,902,417 UART: Caliptra RT
26,903,126 UART: [state] CFI Enabled
27,070,653 UART: [rt] RT listening for mailbox commands...
27,072,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,807 UART: [rt]cmd =0x41544d4e, len=14344
29,583,014 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,363,595 ready_for_fw is high
3,364,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,017,928 >>> mbox cmd response: success
19,298,647 UART:
19,299,036 UART: Running Caliptra FMC ...
19,300,136 UART:
19,300,294 UART: [state] CFI Enabled
19,366,566 UART: [fht] FMC Alias Private Key: 7
21,130,128 UART: [art] Extend RT PCRs Done
21,131,362 UART: [art] Lock RT PCRs Done
21,133,449 UART: [art] Populate DV Done
21,138,734 UART: [fht] FMC Alias Private Key: 7
21,140,383 UART: [art] Derive CDI
21,141,196 UART: [art] Store in in slot 0x4
21,199,299 UART: [art] Derive Key Pair
21,200,348 UART: [art] Store priv key in slot 0x5
23,662,745 UART: [art] Derive Key Pair - Done
23,675,580 UART: [art] Signing Cert with AUTHO
23,676,880 UART: RITY.KEYID = 7
25,389,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,391,242 UART: [art] PUB.X = 7B22D5B1726788295DF56421D14CACD46A2F90C342B07653E28D44DF7BE9369B847D99397B6ED91FF68E1E0E859EFC7F
25,398,502 UART: [art] PUB.Y = 1F6451F8D0CF0C24B78CF97BBFA1EE07BD77652A58DF1560BFEF339521762CBA29F97752ED3EEDABF1E06B90B5E4BAAB
25,405,815 UART: [art] SIG.R = DBAA8116F1698E53A0ED388DC3121C87E021A63A551F7DD48D838865B42094D1030C6F5F17A170DAFB40CC41E699ED6E
25,413,225 UART: [art] SIG.S = 18E309E02A0060817EB9E2A4DD1FCDE50629BE0E4ECC9945855C5399B4954B664AB0BFDC7FB0E181A5AB4F03BE547256
26,392,813 UART: Caliptra RT
26,393,524 UART: [state] CFI Enabled
26,557,360 UART: [rt] RT listening for mailbox commands...
26,559,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,715,717 UART: [rt]cmd =0x41544d4e, len=14344
29,069,189 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,257 UART:
192,623 UART: Running Caliptra ROM ...
193,770 UART:
603,179 UART: [state] CFI Enabled
616,017 UART: [state] LifecycleState = Unprovisioned
617,931 UART: [state] DebugLocked = No
620,669 UART: [state] WD Timer not started. Device not locked for debugging
625,200 UART: [kat] SHA2-256
804,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,899 UART: [kat] ++
816,345 UART: [kat] sha1
827,065 UART: [kat] SHA2-256
830,137 UART: [kat] SHA2-384
835,694 UART: [kat] SHA2-512-ACC
838,652 UART: [kat] ECC-384
3,280,173 UART: [kat] HMAC-384Kdf
3,293,177 UART: [kat] LMS
3,822,655 UART: [kat] --
3,827,514 UART: [cold-reset] ++
3,828,724 UART: [fht] FHT @ 0x50003400
3,837,980 UART: [idev] ++
3,838,532 UART: [idev] CDI.KEYID = 6
3,839,482 UART: [idev] SUBJECT.KEYID = 7
3,840,659 UART: [idev] UDS.KEYID = 0
3,841,615 ready_for_fw is high
3,841,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,495 UART: [idev] Erasing UDS.KEYID = 0
6,311,446 UART: [idev] Sha1 KeyId Algorithm
6,335,424 UART: [idev] --
6,339,464 UART: [ldev] ++
6,340,047 UART: [ldev] CDI.KEYID = 6
6,340,955 UART: [ldev] SUBJECT.KEYID = 5
6,342,109 UART: [ldev] AUTHORITY.KEYID = 7
6,343,384 UART: [ldev] FE.KEYID = 1
6,354,774 UART: [ldev] Erasing FE.KEYID = 1
8,829,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,932 UART: [ldev] --
10,618,011 UART: [fwproc] Wait for Commands...
10,620,745 UART: [fwproc] Recv command 0x46574c44
10,622,829 UART: [fwproc] Recv'd Img size: 114448 bytes
15,200,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,274,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,343,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,661,155 >>> mbox cmd response: success
15,665,211 UART: [afmc] ++
15,665,802 UART: [afmc] CDI.KEYID = 6
15,666,684 UART: [afmc] SUBJECT.KEYID = 7
15,667,895 UART: [afmc] AUTHORITY.KEYID = 5
18,168,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,891,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,893,717 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,909,677 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,925,643 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,941,374 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,963,686 UART: [afmc] --
19,967,668 UART: [cold-reset] --
19,971,781 UART: [state] Locking Datavault
19,977,677 UART: [state] Locking PCR0, PCR1 and PCR31
19,979,340 UART: [state] Locking ICCM
19,982,028 UART: [exit] Launching FMC @ 0x40000130
19,990,487 UART:
19,990,720 UART: Running Caliptra FMC ...
19,991,814 UART:
19,991,966 UART: [state] CFI Enabled
20,000,385 UART: [fht] FMC Alias Private Key: 7
21,757,255 UART: [art] Extend RT PCRs Done
21,758,474 UART: [art] Lock RT PCRs Done
21,760,495 UART: [art] Populate DV Done
21,766,280 UART: [fht] FMC Alias Private Key: 7
21,767,823 UART: [art] Derive CDI
21,768,554 UART: [art] Store in in slot 0x4
21,811,356 UART: [art] Derive Key Pair
21,812,391 UART: [art] Store priv key in slot 0x5
24,239,120 UART: [art] Derive Key Pair - Done
24,251,904 UART: [art] Signing Cert with AUTHO
24,253,203 UART: RITY.KEYID = 7
25,958,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,960,350 UART: [art] PUB.X = 77BA2A53DA3100CFD47C04AFED12EBD68ED1A6C55A4412DE4A305D3AAAF03030714DDA245C652BABD1F2A4F12BF2970C
25,967,656 UART: [art] PUB.Y = D346C1D9352758F9171F2AEE7526615F980C7F628A4F34F1F8F7CCC64AF9464BA0E90FDC368734A693058FCE86E07D07
25,974,859 UART: [art] SIG.R = 3901ACEB190A3147AE3A322DD8C57C5AF0B7CC82990BE8C53A37306B759DEC0304200BDC0970B894D87470161F706291
25,982,242 UART: [art] SIG.S = 59C8F9C9974076283C4F29DB55E6D22F5E8A34951F5DF4E3C4BC04F000EEC11C0D50A4C2F8D1DE3F5EB2BCB75F781193
26,961,167 UART: Caliptra RT
26,961,851 UART: [state] CFI Enabled
27,078,850 UART: [rt] RT listening for mailbox commands...
27,081,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,555 UART: [rt]cmd =0x41544d4e, len=14344
29,604,751 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,699,538 ready_for_fw is high
3,700,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,258,598 >>> mbox cmd response: success
19,504,832 UART:
19,505,223 UART: Running Caliptra FMC ...
19,506,350 UART:
19,506,509 UART: [state] CFI Enabled
19,514,393 UART: [fht] FMC Alias Private Key: 7
21,271,259 UART: [art] Extend RT PCRs Done
21,272,484 UART: [art] Lock RT PCRs Done
21,274,490 UART: [art] Populate DV Done
21,279,863 UART: [fht] FMC Alias Private Key: 7
21,281,399 UART: [art] Derive CDI
21,282,154 UART: [art] Store in in slot 0x4
21,324,864 UART: [art] Derive Key Pair
21,326,066 UART: [art] Store priv key in slot 0x5
23,752,301 UART: [art] Derive Key Pair - Done
23,765,632 UART: [art] Signing Cert with AUTHO
23,766,938 UART: RITY.KEYID = 7
25,472,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,473,812 UART: [art] PUB.X = 848D390BA70F9D62F743F97321AA6527CD7DF60AC92F97DB3AC77365E0096BA8832CF7FB2EBB8A5C214CB1F3C0F7DDD2
25,481,106 UART: [art] PUB.Y = 164692F97363D183F7C731E09878ACE3F5B19367E2C56E069D9907D1A7FE7C00171284952D063095A3B14BD3FC0EAEF2
25,488,324 UART: [art] SIG.R = 5408BBFB0867981CFCD27A1F413865FCB7846C356F8A8CAFE55BD7340BC68E5AEAAB6645302E8EBE7F22AC640FBFFDB6
25,495,796 UART: [art] SIG.S = FE9256C0943DBA58027F13E25B037999D5EAE5B577C21C06364910EECB13767696E6429A198FE6E6E1DB355154DE3A8E
26,474,649 UART: Caliptra RT
26,475,347 UART: [state] CFI Enabled
26,593,195 UART: [rt] RT listening for mailbox commands...
26,595,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,750,848 UART: [rt]cmd =0x41544d4e, len=14344
29,116,145 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,234 UART:
192,587 UART: Running Caliptra ROM ...
193,779 UART:
193,936 UART: [state] CFI Enabled
263,548 UART: [state] LifecycleState = Unprovisioned
265,951 UART: [state] DebugLocked = No
268,477 UART: [state] WD Timer not started. Device not locked for debugging
273,852 UART: [kat] SHA2-256
463,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,509 UART: [kat] ++
475,044 UART: [kat] sha1
485,933 UART: [kat] SHA2-256
488,956 UART: [kat] SHA2-384
494,730 UART: [kat] SHA2-512-ACC
497,304 UART: [kat] ECC-384
2,946,440 UART: [kat] HMAC-384Kdf
2,970,537 UART: [kat] LMS
3,502,286 UART: [kat] --
3,506,425 UART: [cold-reset] ++
3,508,989 UART: [fht] FHT @ 0x50003400
3,519,615 UART: [idev] ++
3,520,314 UART: [idev] CDI.KEYID = 6
3,521,266 UART: [idev] SUBJECT.KEYID = 7
3,522,507 UART: [idev] UDS.KEYID = 0
3,523,405 ready_for_fw is high
3,523,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,625 UART: [idev] Erasing UDS.KEYID = 0
6,031,731 UART: [idev] Sha1 KeyId Algorithm
6,054,024 UART: [idev] --
6,058,862 UART: [ldev] ++
6,059,615 UART: [ldev] CDI.KEYID = 6
6,060,546 UART: [ldev] SUBJECT.KEYID = 5
6,061,598 UART: [ldev] AUTHORITY.KEYID = 7
6,062,885 UART: [ldev] FE.KEYID = 1
6,098,161 UART: [ldev] Erasing FE.KEYID = 1
8,605,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,184 UART: [ldev] --
10,413,094 UART: [fwproc] Wait for Commands...
10,416,006 UART: [fwproc] Recv command 0x46574c44
10,418,319 UART: [fwproc] Recv'd Img size: 114448 bytes
15,057,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,141,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,258,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,801,112 >>> mbox cmd response: success
15,804,389 UART: [afmc] ++
15,805,096 UART: [afmc] CDI.KEYID = 6
15,806,290 UART: [afmc] SUBJECT.KEYID = 7
15,807,724 UART: [afmc] AUTHORITY.KEYID = 5
18,342,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,064,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,066,323 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,081,389 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,096,602 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,111,438 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,135,289 UART: [afmc] --
20,138,813 UART: [cold-reset] --
20,141,084 UART: [state] Locking Datavault
20,147,001 UART: [state] Locking PCR0, PCR1 and PCR31
20,149,198 UART: [state] Locking ICCM
20,151,887 UART: [exit] Launching FMC @ 0x40000130
20,160,560 UART:
20,160,796 UART: Running Caliptra FMC ...
20,161,899 UART:
20,162,056 UART: [state] CFI Enabled
20,224,313 UART: [fht] FMC Alias Private Key: 7
21,987,896 UART: [art] Extend RT PCRs Done
21,989,111 UART: [art] Lock RT PCRs Done
21,990,949 UART: [art] Populate DV Done
21,996,141 UART: [fht] FMC Alias Private Key: 7
21,997,781 UART: [art] Derive CDI
21,998,517 UART: [art] Store in in slot 0x4
22,057,448 UART: [art] Derive Key Pair
22,058,511 UART: [art] Store priv key in slot 0x5
24,521,740 UART: [art] Derive Key Pair - Done
24,534,522 UART: [art] Signing Cert with AUTHO
24,536,010 UART: RITY.KEYID = 7
26,247,297 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,797 UART: [art] PUB.X = FE1DA08A6370675D37C09B1119F200FAEF7C35C1061E1F1BD59315B859D17BFF56E3537F6438882ADEB597797FB61E6D
26,256,036 UART: [art] PUB.Y = E610F4FA53C447F6FE74523B113ABF21BC2C4E63B49FA0851FEAE2DFF8083873DF76238A41FC7D00A1D12D32B4974401
26,263,318 UART: [art] SIG.R = 576DA768C87C831AA6AFE093E941B9DB9CE30A1A72DE94574D08BEB1865E72C6392699175FF4F13CD2DD54A3763F2C0A
26,270,703 UART: [art] SIG.S = B8871DC2F4D42EF1011091735222E4565F603C314C5C31A6F34EEFB958BB9F6173C1CC830EDAC1A5629092C5E12AD7E1
27,249,833 UART: Caliptra RT
27,250,535 UART: [state] CFI Enabled
27,414,465 UART: [rt] RT listening for mailbox commands...
27,416,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,729 UART: [rt]cmd =0x41544d4e, len=14344
29,932,939 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,434,961 ready_for_fw is high
3,435,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,829,529 >>> mbox cmd response: success
20,135,565 UART:
20,135,945 UART: Running Caliptra FMC ...
20,137,142 UART:
20,137,309 UART: [state] CFI Enabled
20,203,997 UART: [fht] FMC Alias Private Key: 7
21,967,534 UART: [art] Extend RT PCRs Done
21,968,749 UART: [art] Lock RT PCRs Done
21,970,432 UART: [art] Populate DV Done
21,975,676 UART: [fht] FMC Alias Private Key: 7
21,977,324 UART: [art] Derive CDI
21,978,140 UART: [art] Store in in slot 0x4
22,036,854 UART: [art] Derive Key Pair
22,037,863 UART: [art] Store priv key in slot 0x5
24,500,731 UART: [art] Derive Key Pair - Done
24,513,344 UART: [art] Signing Cert with AUTHO
24,514,650 UART: RITY.KEYID = 7
26,226,798 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,303 UART: [art] PUB.X = C27FECEECE05441AE0F61024687C8B6E18111198551A2C6A402AEB2582356128832F7374165FECFCD2FA73E6C046A0A9
26,235,624 UART: [art] PUB.Y = 5308811C3427360EFCAB8F77763747509E434E15CF70F907EBABDCBE950A52E02F5BBC8D94397765E8046B88F336DE13
26,242,831 UART: [art] SIG.R = 40866F5D6FEADD64E7EC45286DF4EB61C30157B6BEF774BCE7A26D9DD83C5724A175639C25DFEB3FC6DC484375336470
26,250,219 UART: [art] SIG.S = CF012D577777BC98FCEC192B696A638AB20F3BC2EDC0A547B86AA35367C06DC926012818CFBC8A1322A7FF2C3A14A73D
27,229,476 UART: Caliptra RT
27,230,167 UART: [state] CFI Enabled
27,395,954 UART: [rt] RT listening for mailbox commands...
27,398,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,230 UART: [rt]cmd =0x41544d4e, len=14344
29,923,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,314 UART:
192,673 UART: Running Caliptra ROM ...
193,817 UART:
603,443 UART: [state] CFI Enabled
615,188 UART: [state] LifecycleState = Unprovisioned
617,558 UART: [state] DebugLocked = No
619,922 UART: [state] WD Timer not started. Device not locked for debugging
623,749 UART: [kat] SHA2-256
813,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,411 UART: [kat] ++
824,929 UART: [kat] sha1
836,146 UART: [kat] SHA2-256
839,218 UART: [kat] SHA2-384
843,855 UART: [kat] SHA2-512-ACC
846,426 UART: [kat] ECC-384
3,288,247 UART: [kat] HMAC-384Kdf
3,300,905 UART: [kat] LMS
3,832,793 UART: [kat] --
3,837,093 UART: [cold-reset] ++
3,839,099 UART: [fht] FHT @ 0x50003400
3,851,489 UART: [idev] ++
3,852,197 UART: [idev] CDI.KEYID = 6
3,853,144 UART: [idev] SUBJECT.KEYID = 7
3,854,395 UART: [idev] UDS.KEYID = 0
3,855,295 ready_for_fw is high
3,855,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,202 UART: [idev] Erasing UDS.KEYID = 0
6,335,755 UART: [idev] Sha1 KeyId Algorithm
6,356,658 UART: [idev] --
6,361,438 UART: [ldev] ++
6,362,119 UART: [ldev] CDI.KEYID = 6
6,363,026 UART: [ldev] SUBJECT.KEYID = 5
6,364,232 UART: [ldev] AUTHORITY.KEYID = 7
6,365,405 UART: [ldev] FE.KEYID = 1
6,375,504 UART: [ldev] Erasing FE.KEYID = 1
8,853,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,842 UART: [ldev] --
10,646,695 UART: [fwproc] Wait for Commands...
10,649,649 UART: [fwproc] Recv command 0x46574c44
10,651,951 UART: [fwproc] Recv'd Img size: 114448 bytes
15,268,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,349,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,465,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,008,084 >>> mbox cmd response: success
16,012,850 UART: [afmc] ++
16,013,553 UART: [afmc] CDI.KEYID = 6
16,014,717 UART: [afmc] SUBJECT.KEYID = 7
16,016,259 UART: [afmc] AUTHORITY.KEYID = 5
18,523,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,245,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,247,079 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,262,141 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,277,331 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,292,163 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,317,329 UART: [afmc] --
20,320,870 UART: [cold-reset] --
20,324,515 UART: [state] Locking Datavault
20,330,413 UART: [state] Locking PCR0, PCR1 and PCR31
20,332,567 UART: [state] Locking ICCM
20,334,169 UART: [exit] Launching FMC @ 0x40000130
20,342,854 UART:
20,343,127 UART: Running Caliptra FMC ...
20,344,149 UART:
20,344,290 UART: [state] CFI Enabled
20,352,301 UART: [fht] FMC Alias Private Key: 7
22,109,232 UART: [art] Extend RT PCRs Done
22,110,446 UART: [art] Lock RT PCRs Done
22,112,056 UART: [art] Populate DV Done
22,117,471 UART: [fht] FMC Alias Private Key: 7
22,119,223 UART: [art] Derive CDI
22,119,955 UART: [art] Store in in slot 0x4
22,162,276 UART: [art] Derive Key Pair
22,163,270 UART: [art] Store priv key in slot 0x5
24,590,476 UART: [art] Derive Key Pair - Done
24,603,308 UART: [art] Signing Cert with AUTHO
24,604,605 UART: RITY.KEYID = 7
26,310,175 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,681 UART: [art] PUB.X = 1A7AB9234AF3FD548891CFC7866B6BC80CB8A446D5A338E2D7C611C829ED2045C52F86B0A84D3829AFA7432CC6860520
26,318,902 UART: [art] PUB.Y = 8DEF8E5FF98A2D677F1AB6BCD58B8F6D9F6152A622D0ACC4C766153CC20B02E87A951402E78A42CF9BFC2E9D83B0B8AA
26,326,222 UART: [art] SIG.R = 701CD22C5ED310D7C103681A4306871AFEEA7E534182D53ED89AC3F30CE6E10144D8CCC540A49385A29E494AC3090278
26,333,598 UART: [art] SIG.S = E69808241F50D36CA2EE790507E760A572D3C715C87F2E3DEF409F8B6F2BDCA2DDC02F747289539040454273572512E2
27,312,504 UART: Caliptra RT
27,313,210 UART: [state] CFI Enabled
27,429,698 UART: [rt] RT listening for mailbox commands...
27,431,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,587,239 UART: [rt]cmd =0x41544d4e, len=14344
29,937,269 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,754,992 ready_for_fw is high
3,755,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,071,402 >>> mbox cmd response: success
20,326,648 UART:
20,327,026 UART: Running Caliptra FMC ...
20,328,123 UART:
20,328,267 UART: [state] CFI Enabled
20,335,991 UART: [fht] FMC Alias Private Key: 7
22,092,362 UART: [art] Extend RT PCRs Done
22,093,586 UART: [art] Lock RT PCRs Done
22,094,968 UART: [art] Populate DV Done
22,100,157 UART: [fht] FMC Alias Private Key: 7
22,101,906 UART: [art] Derive CDI
22,102,636 UART: [art] Store in in slot 0x4
22,145,578 UART: [art] Derive Key Pair
22,146,619 UART: [art] Store priv key in slot 0x5
24,573,832 UART: [art] Derive Key Pair - Done
24,586,935 UART: [art] Signing Cert with AUTHO
24,588,226 UART: RITY.KEYID = 7
26,293,520 UART: [art] Erasing AUTHORITY.KEYID = 7
26,295,033 UART: [art] PUB.X = 7B2E46210E03F7282B9F0B8F70C95ACFAF9E84BF7C972F9CC4B669959C68781F3ADD2918A86AFD1F124311C91F9CE2FE
26,302,269 UART: [art] PUB.Y = DEEB45D2E8A474F3C305E3B85B0C45DBE8E85155D75E0AEDEBD8C432A81EE7C5BE0EF2A3770CB6722C249EF32E1C35A8
26,309,554 UART: [art] SIG.R = A10CBD0EFECF76D703E06EDAA09C89927FC4BB5B753101B841D4C9BB855F1755D4FAFF981413C88093DDA0D7EDC111D0
26,316,981 UART: [art] SIG.S = 43F5B9982A67D6B89A365BFDC779AC7B0435BC093450128134E38441C8A214E6D06498587725FDB93EDE3FC7FFE5D1CB
27,295,954 UART: Caliptra RT
27,296,658 UART: [state] CFI Enabled
27,413,152 UART: [rt] RT listening for mailbox commands...
27,415,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,647 UART: [rt]cmd =0x41544d4e, len=14344
29,933,512 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,225 UART: [kat] SHA2-256
882,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,271 UART: [kat] ++
886,423 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,668 UART: [kat] LMS
1,475,864 UART: [kat] --
1,476,823 UART: [cold-reset] ++
1,477,247 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,110 UART: [idev] Erasing UDS.KEYID = 0
1,505,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,538 UART: [idev] --
1,515,509 UART: [ldev] ++
1,515,677 UART: [ldev] CDI.KEYID = 6
1,516,040 UART: [ldev] SUBJECT.KEYID = 5
1,516,466 UART: [ldev] AUTHORITY.KEYID = 7
1,516,929 UART: [ldev] FE.KEYID = 1
1,521,931 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,314 UART: [ldev] --
1,586,643 UART: [fwproc] Waiting for Commands...
1,587,404 UART: [fwproc] Received command 0x46574c44
1,588,195 UART: [fwproc] Received Image of size 114448 bytes
5,047,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,076,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,105,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,241,382 >>> mbox cmd response: success
5,242,626 UART: [afmc] ++
5,242,794 UART: [afmc] CDI.KEYID = 6
5,243,156 UART: [afmc] SUBJECT.KEYID = 7
5,243,581 UART: [afmc] AUTHORITY.KEYID = 5
5,278,297 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,294,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,295,437 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,301,146 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,307,038 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,312,739 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,320,593 UART: [afmc] --
5,321,495 UART: [cold-reset] --
5,322,175 UART: [state] Locking Datavault
5,323,154 UART: [state] Locking PCR0, PCR1 and PCR31
5,323,758 UART: [state] Locking ICCM
5,324,400 UART: [exit] Launching FMC @ 0x40000130
5,329,729 UART:
5,329,745 UART: Running Caliptra FMC ...
5,330,153 UART:
5,330,207 UART: [state] CFI Enabled
5,340,763 UART: [fht] FMC Alias Private Key: 7
5,449,057 UART: [art] Extend RT PCRs Done
5,449,485 UART: [art] Lock RT PCRs Done
5,451,291 UART: [art] Populate DV Done
5,459,767 UART: [fht] FMC Alias Private Key: 7
5,460,921 UART: [art] Derive CDI
5,461,201 UART: [art] Store in in slot 0x4
5,547,002 UART: [art] Derive Key Pair
5,547,362 UART: [art] Store priv key in slot 0x5
5,560,716 UART: [art] Derive Key Pair - Done
5,575,223 UART: [art] Signing Cert with AUTHO
5,575,703 UART: RITY.KEYID = 7
5,590,823 UART: [art] Erasing AUTHORITY.KEYID = 7
5,591,588 UART: [art] PUB.X = 455F9E5A4087B4A967AD503ACC42FA85A01F03239E9F0A639D89F57BB7F6EB1D0A4815DB2049FB0E42B207F40E8504AE
5,598,347 UART: [art] PUB.Y = DCF251B1CCC60BA9B7A979E035B47363C7F3F5C7D712DD8C964A95A7E564E2487C46C7C6AE680055E73148786221D321
5,605,274 UART: [art] SIG.R = 2BD2B87BEDF5499EBBE6148DFC9C252331BEB8643B0BD18F57FCA6134DCDC31C0F6912F3C10CE42E83BD42588C9D3096
5,612,053 UART: [art] SIG.S = 449F1E060C90A567EF733034E5C5961BBF3B6D3299A0A815A780B9BA68A259675095B8423E89C2D38795CE17213F83AC
5,636,360 UART: Caliptra RT
5,636,613 UART: [state] CFI Enabled
5,745,165 UART: [rt] RT listening for mailbox commands...
5,745,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,868,909 UART: [rt]cmd =0x41544d4e, len=14344
6,436,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,767 ready_for_fw is high
1,361,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,126,003 >>> mbox cmd response: success
5,188,334 UART:
5,188,350 UART: Running Caliptra FMC ...
5,188,758 UART:
5,188,812 UART: [state] CFI Enabled
5,199,048 UART: [fht] FMC Alias Private Key: 7
5,306,042 UART: [art] Extend RT PCRs Done
5,306,470 UART: [art] Lock RT PCRs Done
5,308,260 UART: [art] Populate DV Done
5,316,676 UART: [fht] FMC Alias Private Key: 7
5,317,626 UART: [art] Derive CDI
5,317,906 UART: [art] Store in in slot 0x4
5,403,759 UART: [art] Derive Key Pair
5,404,119 UART: [art] Store priv key in slot 0x5
5,417,717 UART: [art] Derive Key Pair - Done
5,432,087 UART: [art] Signing Cert with AUTHO
5,432,567 UART: RITY.KEYID = 7
5,448,183 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,948 UART: [art] PUB.X = 7BE0180919D6A9C8D2E41009F8B34F4217081CDFCD4BDDDFCADF9D351AEE4A41ECE2733F7530DBB759BF4DA522B5104A
5,455,731 UART: [art] PUB.Y = C1E4B6CEB34C101499703D42951ECE67E9D0F612F451BE81CDA15974B1976A5D1B3DCA12B12DC011B102BBBC600C0E49
5,462,684 UART: [art] SIG.R = 9F7E7D0AAD4B892FF21CF14B80760C0A6890B9489F911E7285E61AC78C60EE8BAD43B65CC4A57DF40B7BA3DA4A6AF643
5,469,460 UART: [art] SIG.S = 4D1A66653922241428C597DC91281437C2E38C95310E7FCB35AC7949F8CC6A56A7912274CDC6B8408921F52324C46E07
5,493,487 UART: Caliptra RT
5,493,740 UART: [state] CFI Enabled
5,601,325 UART: [rt] RT listening for mailbox commands...
5,601,995 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,933 UART: [rt]cmd =0x41544d4e, len=14344
6,285,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,341 UART: [kat] SHA2-512-ACC
897,242 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,698 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,480,009 UART: [idev] ++
1,480,177 UART: [idev] CDI.KEYID = 6
1,480,537 UART: [idev] SUBJECT.KEYID = 7
1,480,961 UART: [idev] UDS.KEYID = 0
1,481,306 ready_for_fw is high
1,481,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,145 UART: [idev] Erasing UDS.KEYID = 0
1,506,135 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,699 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,536 UART: [ldev] Erasing FE.KEYID = 1
1,548,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,107 UART: [ldev] --
1,587,554 UART: [fwproc] Waiting for Commands...
1,588,301 UART: [fwproc] Received command 0x46574c44
1,589,092 UART: [fwproc] Received Image of size 114448 bytes
5,312,291 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,340,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,370,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,506,258 >>> mbox cmd response: success
5,507,320 UART: [afmc] ++
5,507,488 UART: [afmc] CDI.KEYID = 6
5,507,850 UART: [afmc] SUBJECT.KEYID = 7
5,508,275 UART: [afmc] AUTHORITY.KEYID = 5
5,543,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,559,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,560,159 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,565,868 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,571,760 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,577,461 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,585,347 UART: [afmc] --
5,586,437 UART: [cold-reset] --
5,587,383 UART: [state] Locking Datavault
5,588,678 UART: [state] Locking PCR0, PCR1 and PCR31
5,589,282 UART: [state] Locking ICCM
5,589,956 UART: [exit] Launching FMC @ 0x40000130
5,595,285 UART:
5,595,301 UART: Running Caliptra FMC ...
5,595,709 UART:
5,595,852 UART: [state] CFI Enabled
5,606,342 UART: [fht] FMC Alias Private Key: 7
5,714,056 UART: [art] Extend RT PCRs Done
5,714,484 UART: [art] Lock RT PCRs Done
5,715,692 UART: [art] Populate DV Done
5,723,936 UART: [fht] FMC Alias Private Key: 7
5,725,034 UART: [art] Derive CDI
5,725,314 UART: [art] Store in in slot 0x4
5,810,923 UART: [art] Derive Key Pair
5,811,283 UART: [art] Store priv key in slot 0x5
5,824,731 UART: [art] Derive Key Pair - Done
5,839,697 UART: [art] Signing Cert with AUTHO
5,840,177 UART: RITY.KEYID = 7
5,855,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,856,752 UART: [art] PUB.X = 1E5833864BD8BE4D69B3D7563C44CC8F099F2856251AECAEA27F0A351941F84A42BCFFDE84D0BFDD47516C9443C304B5
5,863,525 UART: [art] PUB.Y = 4F12C4B2BCD4B58020624D13B0F9591421B4E17656D4ABB5D1B3A20B5C8C7CA521C57F11C91BF994936354109C4E1E18
5,870,474 UART: [art] SIG.R = 6239F4384942B6EF41DC77EA87A8862666204BF0EFEE6416F5810B0C6848C52666EE42AD4BD324B1C2130FDB1647AB59
5,877,237 UART: [art] SIG.S = EBAA7A0E5D74E04C7266348F38F9D99E89F1D1A2BAD9E8C5EB88F1A45A0D9295CDE414AE709B5E79345E405521F32D1C
5,900,968 UART: Caliptra RT
5,901,313 UART: [state] CFI Enabled
6,008,988 UART: [rt] RT listening for mailbox commands...
6,009,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,132,782 UART: [rt]cmd =0x41544d4e, len=14344
6,688,376 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,604 ready_for_fw is high
1,362,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,241,497 >>> mbox cmd response: success
5,304,040 UART:
5,304,056 UART: Running Caliptra FMC ...
5,304,464 UART:
5,304,607 UART: [state] CFI Enabled
5,315,059 UART: [fht] FMC Alias Private Key: 7
5,423,045 UART: [art] Extend RT PCRs Done
5,423,473 UART: [art] Lock RT PCRs Done
5,424,843 UART: [art] Populate DV Done
5,433,211 UART: [fht] FMC Alias Private Key: 7
5,434,221 UART: [art] Derive CDI
5,434,501 UART: [art] Store in in slot 0x4
5,520,312 UART: [art] Derive Key Pair
5,520,672 UART: [art] Store priv key in slot 0x5
5,534,032 UART: [art] Derive Key Pair - Done
5,548,698 UART: [art] Signing Cert with AUTHO
5,549,178 UART: RITY.KEYID = 7
5,564,200 UART: [art] Erasing AUTHORITY.KEYID = 7
5,564,965 UART: [art] PUB.X = CBF9CE4D8D8C09748DA05FDEE4402364B74D9765F2A4540DE865484143E6DFF8FF3BF8E977DBC5F8C8794FB6AC094212
5,571,740 UART: [art] PUB.Y = 8FF457329A856F8F6E191A2885B7A118E11E42AFBDFA08B13FB8D9D06BED969B0F5CF0A3C23E9687FC78210B6E003521
5,578,669 UART: [art] SIG.R = 901F276A6D58F20878C936DE2B0B32019B7E47BF88BBD0FE6AFB58DCC389C41458A5BA247D13627587D0BA196B815549
5,585,434 UART: [art] SIG.S = 2C05377DE7531829A5AD025F8C1B5A9D84D35F4D48603B1CB96CE785B0CE9412173E90AF4704FFFC130C03B02923AB64
5,608,780 UART: Caliptra RT
5,609,125 UART: [state] CFI Enabled
5,717,968 UART: [rt] RT listening for mailbox commands...
5,718,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,841,664 UART: [rt]cmd =0x41544d4e, len=14344
6,400,079 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
893,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,273 UART: [kat] ++
897,425 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,204 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 ready_for_fw is high
1,176,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,898 UART: [idev] Erasing UDS.KEYID = 0
1,201,681 UART: [idev] Sha1 KeyId Algorithm
1,210,243 UART: [idev] --
1,211,287 UART: [ldev] ++
1,211,455 UART: [ldev] CDI.KEYID = 6
1,211,818 UART: [ldev] SUBJECT.KEYID = 5
1,212,244 UART: [ldev] AUTHORITY.KEYID = 7
1,212,707 UART: [ldev] FE.KEYID = 1
1,217,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,505 UART: [ldev] --
1,282,926 UART: [fwproc] Wait for Commands...
1,283,518 UART: [fwproc] Recv command 0x46574c44
1,284,246 UART: [fwproc] Recv'd Img size: 114448 bytes
3,115,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,309,043 >>> mbox cmd response: success
3,310,297 UART: [afmc] ++
3,310,465 UART: [afmc] CDI.KEYID = 6
3,310,827 UART: [afmc] SUBJECT.KEYID = 7
3,311,252 UART: [afmc] AUTHORITY.KEYID = 5
3,347,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,255 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,964 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,856 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,567 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,170 UART: [afmc] --
3,390,164 UART: [cold-reset] --
3,391,108 UART: [state] Locking Datavault
3,392,251 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,855 UART: [state] Locking ICCM
3,393,469 UART: [exit] Launching FMC @ 0x40000130
3,398,798 UART:
3,398,814 UART: Running Caliptra FMC ...
3,399,222 UART:
3,399,276 UART: [state] CFI Enabled
3,409,928 UART: [fht] FMC Alias Private Key: 7
3,517,716 UART: [art] Extend RT PCRs Done
3,518,144 UART: [art] Lock RT PCRs Done
3,519,896 UART: [art] Populate DV Done
3,528,356 UART: [fht] FMC Alias Private Key: 7
3,529,390 UART: [art] Derive CDI
3,529,670 UART: [art] Store in in slot 0x4
3,615,325 UART: [art] Derive Key Pair
3,615,685 UART: [art] Store priv key in slot 0x5
3,628,323 UART: [art] Derive Key Pair - Done
3,642,971 UART: [art] Signing Cert with AUTHO
3,643,451 UART: RITY.KEYID = 7
3,658,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,708 UART: [art] PUB.X = 88D2B67B716058C0C68D19B610545D8126D6866407316A4B5B290F664B8A8499B651EDE2762BE410AFE3325D0264A40B
3,666,458 UART: [art] PUB.Y = 6033E5435584298B7C728B312172A66B850C5DB0C4B0310412BD05E34244BBAA26169032784C17EBE30F56457316E07E
3,673,384 UART: [art] SIG.R = 56428DE2C79BD54C3927C75798FB54F39B4F8552B3D482F45F62C8A768C1C6B307286A74072E6E5ABF5F0DC4C1877C3F
3,680,149 UART: [art] SIG.S = 267B6D9A4477AC273F21C76FE1C9E27049E3B1135D0258ACF3DC8568CE440D4728491F060B78E9E7633150D5E874D57C
3,704,052 UART: Caliptra RT
3,704,305 UART: [state] CFI Enabled
3,812,280 UART: [rt] RT listening for mailbox commands...
3,812,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,158 UART: [rt]cmd =0x41544d4e, len=14344
4,501,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,027 ready_for_fw is high
1,061,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,239 >>> mbox cmd response: success
3,235,394 UART:
3,235,410 UART: Running Caliptra FMC ...
3,235,818 UART:
3,235,872 UART: [state] CFI Enabled
3,246,282 UART: [fht] FMC Alias Private Key: 7
3,354,072 UART: [art] Extend RT PCRs Done
3,354,500 UART: [art] Lock RT PCRs Done
3,356,398 UART: [art] Populate DV Done
3,364,574 UART: [fht] FMC Alias Private Key: 7
3,365,532 UART: [art] Derive CDI
3,365,812 UART: [art] Store in in slot 0x4
3,450,859 UART: [art] Derive Key Pair
3,451,219 UART: [art] Store priv key in slot 0x5
3,464,821 UART: [art] Derive Key Pair - Done
3,479,733 UART: [art] Signing Cert with AUTHO
3,480,213 UART: RITY.KEYID = 7
3,496,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,848 UART: [art] PUB.X = BC7A52C800FCA46F751AB688BA1CE4BE30FCD04B54CBE92787501290EACF8547B4AB4527C32D4B4F41F559971316AC23
3,503,608 UART: [art] PUB.Y = AF46CFE3CB2DE761EC4A29E5B12202D13DF615A563FF327F5F0706AB0FBD4E4253FDE37572F7FD77FED7564929052D84
3,510,557 UART: [art] SIG.R = 2D11E82C3F0C80E3064D10F6A3B937D83A7B08B9F3EA0EADF7B60BF8ED2D2F9727EA94429EAF8E4DF379C5D17CECB918
3,517,334 UART: [art] SIG.S = 7160297FD51CD38D92ECBCDF2AECCE95833A26C29558A50DB997CC18E740A392DF1A0A0E2CBD31C7BD16CFDBA03A30BC
3,541,228 UART: Caliptra RT
3,541,481 UART: [state] CFI Enabled
3,648,818 UART: [rt] RT listening for mailbox commands...
3,649,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,590 UART: [rt]cmd =0x41544d4e, len=14344
4,328,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
901,984 UART: [kat] SHA2-256
903,924 UART: [kat] SHA2-384
906,879 UART: [kat] SHA2-512-ACC
908,780 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,119 UART: [kat] LMS
1,171,447 UART: [kat] --
1,172,448 UART: [cold-reset] ++
1,172,950 UART: [fht] FHT @ 0x50003400
1,175,665 UART: [idev] ++
1,175,833 UART: [idev] CDI.KEYID = 6
1,176,193 UART: [idev] SUBJECT.KEYID = 7
1,176,617 UART: [idev] UDS.KEYID = 0
1,176,962 ready_for_fw is high
1,176,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,202,112 UART: [idev] Sha1 KeyId Algorithm
1,210,614 UART: [idev] --
1,211,824 UART: [ldev] ++
1,211,992 UART: [ldev] CDI.KEYID = 6
1,212,355 UART: [ldev] SUBJECT.KEYID = 5
1,212,781 UART: [ldev] AUTHORITY.KEYID = 7
1,213,244 UART: [ldev] FE.KEYID = 1
1,218,646 UART: [ldev] Erasing FE.KEYID = 1
1,245,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,938 UART: [ldev] --
1,284,307 UART: [fwproc] Wait for Commands...
1,284,947 UART: [fwproc] Recv command 0x46574c44
1,285,675 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,813 >>> mbox cmd response: success
3,313,999 UART: [afmc] ++
3,314,167 UART: [afmc] CDI.KEYID = 6
3,314,529 UART: [afmc] SUBJECT.KEYID = 7
3,314,954 UART: [afmc] AUTHORITY.KEYID = 5
3,351,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,215 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,924 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,816 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,527 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,488 UART: [afmc] --
3,394,486 UART: [cold-reset] --
3,395,334 UART: [state] Locking Datavault
3,396,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,897 UART: [state] Locking ICCM
3,397,353 UART: [exit] Launching FMC @ 0x40000130
3,402,682 UART:
3,402,698 UART: Running Caliptra FMC ...
3,403,106 UART:
3,403,249 UART: [state] CFI Enabled
3,414,027 UART: [fht] FMC Alias Private Key: 7
3,521,603 UART: [art] Extend RT PCRs Done
3,522,031 UART: [art] Lock RT PCRs Done
3,523,717 UART: [art] Populate DV Done
3,532,297 UART: [fht] FMC Alias Private Key: 7
3,533,343 UART: [art] Derive CDI
3,533,623 UART: [art] Store in in slot 0x4
3,619,266 UART: [art] Derive Key Pair
3,619,626 UART: [art] Store priv key in slot 0x5
3,632,870 UART: [art] Derive Key Pair - Done
3,647,461 UART: [art] Signing Cert with AUTHO
3,647,941 UART: RITY.KEYID = 7
3,662,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,732 UART: [art] PUB.X = 7F06D7D854B5A9DB498EF40F524DF22C0A93CC33172DFCA25F5A779CC342742EE1CA27203582CF7E108DD014341432BC
3,670,501 UART: [art] PUB.Y = AED13921C70B376E57BF5DE6239ED7271707752505F9F77E3D66468B067E656AC4E4ACFA6310E3B31B1C3CBF824DB51F
3,677,447 UART: [art] SIG.R = 6EB0A750BC4E88633F74CFB6D69625776CDD4E2CF84616B2E922E0F7B3383FFA02664612333D1E763B02404FB594FAB5
3,684,215 UART: [art] SIG.S = FACCF18ECE24A693A5B715F36E202884ACE6E1F7AAA9C079BC02D640C621F4D087CACB33BA5F0B0FD15F4456DB434675
3,708,439 UART: Caliptra RT
3,708,784 UART: [state] CFI Enabled
3,817,192 UART: [rt] RT listening for mailbox commands...
3,817,862 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,930 UART: [rt]cmd =0x41544d4e, len=14344
4,504,521 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 ready_for_fw is high
1,060,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,180,551 >>> mbox cmd response: success
3,242,998 UART:
3,243,014 UART: Running Caliptra FMC ...
3,243,422 UART:
3,243,565 UART: [state] CFI Enabled
3,254,423 UART: [fht] FMC Alias Private Key: 7
3,361,753 UART: [art] Extend RT PCRs Done
3,362,181 UART: [art] Lock RT PCRs Done
3,363,563 UART: [art] Populate DV Done
3,371,953 UART: [fht] FMC Alias Private Key: 7
3,373,083 UART: [art] Derive CDI
3,373,363 UART: [art] Store in in slot 0x4
3,459,296 UART: [art] Derive Key Pair
3,459,656 UART: [art] Store priv key in slot 0x5
3,472,684 UART: [art] Derive Key Pair - Done
3,487,687 UART: [art] Signing Cert with AUTHO
3,488,167 UART: RITY.KEYID = 7
3,503,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,332 UART: [art] PUB.X = 5E9E79659FE27E766BA83D261308289E84285CC61D31C658385679749F0600EB0F604F0945F1666C0856FFA527005E60
3,511,029 UART: [art] PUB.Y = 27C022385F20451147517BA16D4F55A0D85F0EB7B39AC6463BCE28C65E23189F04A6631DDA54E87F45DBC06A5608B0F9
3,517,972 UART: [art] SIG.R = A96565533DFCFE0EBC54AD12ACE5566901FBDCC3E7688010F24FC310E0F29D4B9DCEC8B06C135BB258CDFE633460246C
3,524,754 UART: [art] SIG.S = 16319E18F68215A248FFF2752466D3128872EAFE6537D8427E4FD45A8238051D98F5716D652A0DF962A3D7F614B2342D
3,548,161 UART: Caliptra RT
3,548,506 UART: [state] CFI Enabled
3,656,826 UART: [rt] RT listening for mailbox commands...
3,657,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,448 UART: [rt]cmd =0x41544d4e, len=14344
4,338,241 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [kat] SHA2-256
891,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,783 UART: [kat] ++
895,935 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,884 UART: [kat] SHA2-512-ACC
906,785 UART: [kat] ECC-384
916,714 UART: [kat] HMAC-384Kdf
921,370 UART: [kat] LMS
1,169,682 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,861 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 ready_for_fw is high
1,174,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,823 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,464 UART: [ldev] ++
1,209,632 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,423 UART: [ldev] AUTHORITY.KEYID = 7
1,210,886 UART: [ldev] FE.KEYID = 1
1,216,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,819 >>> mbox cmd response: success
3,318,950 UART: [afmc] ++
3,319,118 UART: [afmc] CDI.KEYID = 6
3,319,481 UART: [afmc] SUBJECT.KEYID = 7
3,319,907 UART: [afmc] AUTHORITY.KEYID = 5
3,355,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,124 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,834 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,724 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,435 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,237 UART: [afmc] --
3,398,227 UART: [cold-reset] --
3,399,085 UART: [state] Locking Datavault
3,400,280 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,884 UART: [state] Locking ICCM
3,401,348 UART: [exit] Launching FMC @ 0x40000130
3,406,677 UART:
3,406,693 UART: Running Caliptra FMC ...
3,407,101 UART:
3,407,155 UART: [state] CFI Enabled
3,417,567 UART: [fht] FMC Alias Private Key: 7
3,525,837 UART: [art] Extend RT PCRs Done
3,526,265 UART: [art] Lock RT PCRs Done
3,527,681 UART: [art] Populate DV Done
3,535,869 UART: [fht] FMC Alias Private Key: 7
3,537,005 UART: [art] Derive CDI
3,537,285 UART: [art] Store in in slot 0x4
3,623,096 UART: [art] Derive Key Pair
3,623,456 UART: [art] Store priv key in slot 0x5
3,636,572 UART: [art] Derive Key Pair - Done
3,651,330 UART: [art] Signing Cert with AUTHO
3,651,810 UART: RITY.KEYID = 7
3,666,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,659 UART: [art] PUB.X = EE45C013939074CA5ABE56EDF18860E1C08D1AA040C02EB96C5FDE6D9CEC06D55A5605465EF70137DCE9FAA44365AFBC
3,674,440 UART: [art] PUB.Y = FA9EB095B9C240D1224B696CC95BD98EDC1239916465C62498B4B06C15FCF153763A47150A34C4B1CC11E3A0F80D149F
3,681,388 UART: [art] SIG.R = B5972A906CAEE875FFA0E12306C4F1E396EB487FCFA86F2A27FCA4BB60F72BBF4BCED89ED78428B6F91E98457175C7F3
3,688,175 UART: [art] SIG.S = DC40BDAB267BB5D7BC68600960862CEC0A084D502E2D316227DE167424A8261892FEE940A30DF257D769C1C99067CC4B
3,711,526 UART: Caliptra RT
3,711,779 UART: [state] CFI Enabled
3,818,582 UART: [rt] RT listening for mailbox commands...
3,819,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,874 UART: [rt]cmd =0x41544d4e, len=14344
4,502,552 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,974 ready_for_fw is high
1,055,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,329 >>> mbox cmd response: success
3,231,906 UART:
3,231,922 UART: Running Caliptra FMC ...
3,232,330 UART:
3,232,384 UART: [state] CFI Enabled
3,242,798 UART: [fht] FMC Alias Private Key: 7
3,350,296 UART: [art] Extend RT PCRs Done
3,350,724 UART: [art] Lock RT PCRs Done
3,351,914 UART: [art] Populate DV Done
3,360,214 UART: [fht] FMC Alias Private Key: 7
3,361,186 UART: [art] Derive CDI
3,361,466 UART: [art] Store in in slot 0x4
3,447,189 UART: [art] Derive Key Pair
3,447,549 UART: [art] Store priv key in slot 0x5
3,460,715 UART: [art] Derive Key Pair - Done
3,475,336 UART: [art] Signing Cert with AUTHO
3,475,816 UART: RITY.KEYID = 7
3,491,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,859 UART: [art] PUB.X = E3EDB04402F74F518E6BEFABE17EBA97C826B6ABA61D80B30D3AC4A8E6AC26B4F4DA11CB31B73842FF9457DDEBA80E41
3,498,648 UART: [art] PUB.Y = 8216EEE5279B70A46357475135DD0FF0EEA5FACCABFF74A1CD4452DF7CAFC4D4B91761A9E9A4E5EEF9E39CDC3D59D0C2
3,505,623 UART: [art] SIG.R = 1304025CCC12DAB0A1773BE8E88D65D2758242E27239402975F6B8531C4185797A024C27878805CE7E98E89744BED2F4
3,512,371 UART: [art] SIG.S = 3EB1F66C64F2EDDF5B301F28BFED4B4D860529D0BF90DDBAF8FFE8246279361E47B295534B041B17DBEBEB37C961E397
3,536,320 UART: Caliptra RT
3,536,573 UART: [state] CFI Enabled
3,643,562 UART: [rt] RT listening for mailbox commands...
3,644,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,206 UART: [rt]cmd =0x41544d4e, len=14344
4,327,734 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,422 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,215,817 UART: [ldev] Erasing FE.KEYID = 1
1,242,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,107 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,709 >>> mbox cmd response: success
3,324,778 UART: [afmc] ++
3,324,946 UART: [afmc] CDI.KEYID = 6
3,325,309 UART: [afmc] SUBJECT.KEYID = 7
3,325,735 UART: [afmc] AUTHORITY.KEYID = 5
3,361,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,254 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,964 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,854 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,565 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,209 UART: [afmc] --
3,405,329 UART: [cold-reset] --
3,406,423 UART: [state] Locking Datavault
3,407,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,344 UART: [state] Locking ICCM
3,408,874 UART: [exit] Launching FMC @ 0x40000130
3,414,203 UART:
3,414,219 UART: Running Caliptra FMC ...
3,414,627 UART:
3,414,770 UART: [state] CFI Enabled
3,425,420 UART: [fht] FMC Alias Private Key: 7
3,533,436 UART: [art] Extend RT PCRs Done
3,533,864 UART: [art] Lock RT PCRs Done
3,535,352 UART: [art] Populate DV Done
3,543,870 UART: [fht] FMC Alias Private Key: 7
3,545,036 UART: [art] Derive CDI
3,545,316 UART: [art] Store in in slot 0x4
3,631,197 UART: [art] Derive Key Pair
3,631,557 UART: [art] Store priv key in slot 0x5
3,644,835 UART: [art] Derive Key Pair - Done
3,659,964 UART: [art] Signing Cert with AUTHO
3,660,444 UART: RITY.KEYID = 7
3,675,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,183 UART: [art] PUB.X = B7525D1946CA86ECD3C2FED4B15280D685AA6638F2299A0516828A65F7658D89B2258BF5684E9714A047BE3EC72A1BD5
3,682,952 UART: [art] PUB.Y = 7414DBB851A0534C8B5CCB270271C9434D0D1B36FEEDD43B54A0A9DE8E480AC7A5CD355F1474934111C0F2569A06CDC7
3,689,900 UART: [art] SIG.R = F79E9357BA5A7729286F2EF815460709898B0F9B0C789F49A8B3105254ED5335EB16AE1794F8E2001B6EDE5BEB2974E9
3,696,636 UART: [art] SIG.S = 4DBCFBCFC21FB8EBEF805906C650D7460C11B3CBCD8A7762F46CBC268E2127204CC398C2B64BCFD941D954B80ABCBD37
3,720,696 UART: Caliptra RT
3,721,041 UART: [state] CFI Enabled
3,829,069 UART: [rt] RT listening for mailbox commands...
3,829,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,761 UART: [rt]cmd =0x41544d4e, len=14344
4,513,295 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,763 ready_for_fw is high
1,056,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,175,646 >>> mbox cmd response: success
3,238,609 UART:
3,238,625 UART: Running Caliptra FMC ...
3,239,033 UART:
3,239,176 UART: [state] CFI Enabled
3,249,844 UART: [fht] FMC Alias Private Key: 7
3,358,018 UART: [art] Extend RT PCRs Done
3,358,446 UART: [art] Lock RT PCRs Done
3,360,288 UART: [art] Populate DV Done
3,368,776 UART: [fht] FMC Alias Private Key: 7
3,369,732 UART: [art] Derive CDI
3,370,012 UART: [art] Store in in slot 0x4
3,455,597 UART: [art] Derive Key Pair
3,455,957 UART: [art] Store priv key in slot 0x5
3,468,783 UART: [art] Derive Key Pair - Done
3,483,687 UART: [art] Signing Cert with AUTHO
3,484,167 UART: RITY.KEYID = 7
3,499,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,194 UART: [art] PUB.X = 7823C002982C9250A7F618E9A496BCF2B6B8C02B7CFCCFA100159EEEB7F366FB52AF1747D70A418398C91F1515D335A8
3,506,942 UART: [art] PUB.Y = BF7BF82B1FA90CB12C748B20D92712BF1CDFA06A71D668E1949833531A487EE98F9E2ED1D4A249C2241A4ED88027F000
3,513,875 UART: [art] SIG.R = E4A6798F214D5759C21F21DB200BAE19F7E2B5BD44F148E1D2684124FCB87E6E2F0DCE4FE5695AE455E5858216792944
3,520,643 UART: [art] SIG.S = C15C862A92419BCB607B7E66430FB465D27870689E08AC7A92C0BA8423746A1C5DC339F6D98E4D0C915CA169292A8846
3,544,493 UART: Caliptra RT
3,544,838 UART: [state] CFI Enabled
3,652,875 UART: [rt] RT listening for mailbox commands...
3,653,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,381 UART: [rt]cmd =0x41544d4e, len=14344
4,334,584 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,046 UART:
192,446 UART: Running Caliptra ROM ...
193,585 UART:
193,737 UART: [state] CFI Enabled
267,796 UART: [state] LifecycleState = Unprovisioned
269,846 UART: [state] DebugLocked = No
271,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,466 UART: [kat] SHA2-256
446,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,632 UART: [kat] ++
457,152 UART: [kat] sha1
467,883 UART: [kat] SHA2-256
470,612 UART: [kat] SHA2-384
476,462 UART: [kat] SHA2-512-ACC
478,830 UART: [kat] ECC-384
2,767,885 UART: [kat] HMAC-384Kdf
2,798,240 UART: [kat] LMS
3,988,530 UART: [kat] --
3,993,683 UART: [cold-reset] ++
3,995,128 UART: [fht] Storing FHT @ 0x50003400
4,006,688 UART: [idev] ++
4,007,264 UART: [idev] CDI.KEYID = 6
4,008,304 UART: [idev] SUBJECT.KEYID = 7
4,009,489 UART: [idev] UDS.KEYID = 0
4,010,568 ready_for_fw is high
4,010,779 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,348 UART: [idev] Erasing UDS.KEYID = 0
7,341,911 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,982 UART: [idev] --
7,367,861 UART: [ldev] ++
7,368,431 UART: [ldev] CDI.KEYID = 6
7,369,404 UART: [ldev] SUBJECT.KEYID = 5
7,370,619 UART: [ldev] AUTHORITY.KEYID = 7
7,371,870 UART: [ldev] FE.KEYID = 1
7,399,691 UART: [ldev] Erasing FE.KEYID = 1
10,730,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,693 UART: [ldev] --
13,091,131 UART: [fwproc] Waiting for Commands...
13,093,179 UART: [fwproc] Received command 0x46574c44
13,095,364 UART: [fwproc] Received Image of size 114124 bytes
22,123,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,202,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,271,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,588,910 >>> mbox cmd response: success
22,593,613 UART: [afmc] ++
22,594,266 UART: [afmc] CDI.KEYID = 6
22,595,190 UART: [afmc] SUBJECT.KEYID = 7
22,596,357 UART: [afmc] AUTHORITY.KEYID = 5
25,955,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,257,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,259,354 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,273,942 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,288,643 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,302,865 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,323,017 UART: [afmc] --
28,327,045 UART: [cold-reset] --
28,330,853 UART: [state] Locking Datavault
28,335,608 UART: [state] Locking PCR0, PCR1 and PCR31
28,337,371 UART: [state] Locking ICCM
28,339,717 UART: [exit] Launching FMC @ 0x40000130
28,348,118 UART:
28,348,373 UART: Running Caliptra FMC ...
28,350,017 UART:
28,350,223 UART: [state] CFI Enabled
28,415,262 UART: [fht] FMC Alias Private Key: 7
30,753,627 UART: [art] Extend RT PCRs Done
30,754,851 UART: [art] Lock RT PCRs Done
30,756,533 UART: [art] Populate DV Done
30,761,892 UART: [fht] FMC Alias Private Key: 7
30,763,379 UART: [art] Derive CDI
30,764,145 UART: [art] Store in in slot 0x4
30,824,370 UART: [art] Derive Key Pair
30,825,365 UART: [art] Store priv key in slot 0x5
34,118,046 UART: [art] Derive Key Pair - Done
34,131,049 UART: [art] Signing Cert with AUTHO
34,132,364 UART: RITY.KEYID = 7
36,420,419 UART: [art] Erasing AUTHORITY.KEYID = 7
36,421,947 UART: [art] PUB.X = D6C12F613DF3CC42016D5C96CC3DE7B95AA21786DEB3219CAB56E54DA92AD9DB75397C17403E3F03D27B30C136B47054
36,429,215 UART: [art] PUB.Y = 5B975A0A76E18E5906D104A34C4F80CBDC76F75AC19D97E5928C3E6874A869A7B0EDD8281EF1073C53251EC7172FFE6F
36,436,460 UART: [art] SIG.R = B95FEF3B732320710022A9590682B54B90B45AE30EE0DB525C8E5B977B14D5844618546653D552392FE67EAD103C0EF9
36,443,768 UART: [art] SIG.S = 744912E97DF79DAEF1A2F701AF9CA5D4EE053F4E8870AFCE3E5FE80CBB5B5457EFDA9CB41AF8354211F2EE85445131BE
37,748,828 UART: Caliptra RT
37,749,539 UART: [state] CFI Enabled
37,912,148 UART: [rt] RT listening for mailbox commands...
37,914,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,069,618 UART: [rt]cmd =0x41544d4e, len=14344
40,153,852 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,803,786 ready_for_fw is high
3,804,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,142,192 >>> mbox cmd response: success
27,826,311 UART:
27,826,699 UART: Running Caliptra FMC ...
27,827,811 UART:
27,827,966 UART: [state] CFI Enabled
27,878,754 UART: [fht] FMC Alias Private Key: 7
30,216,776 UART: [art] Extend RT PCRs Done
30,218,006 UART: [art] Lock RT PCRs Done
30,219,722 UART: [art] Populate DV Done
30,225,237 UART: [fht] FMC Alias Private Key: 7
30,226,837 UART: [art] Derive CDI
30,227,576 UART: [art] Store in in slot 0x4
30,287,545 UART: [art] Derive Key Pair
30,288,556 UART: [art] Store priv key in slot 0x5
33,581,157 UART: [art] Derive Key Pair - Done
33,594,053 UART: [art] Signing Cert with AUTHO
33,595,368 UART: RITY.KEYID = 7
35,881,489 UART: [art] Erasing AUTHORITY.KEYID = 7
35,883,000 UART: [art] PUB.X = EB3A9822519FD10C911B85768D44C4FEE423BEF1E58542102C257BD912993A65666038922FBA976AFB504478C1942810
35,890,199 UART: [art] PUB.Y = 804FFB8C5D1811FD3F4FE180D355790B657097A2014454B2B2A3984656059B974E3D4D15866748A9798BE789A21988A7
35,897,444 UART: [art] SIG.R = A4ED004B7DB2DAFB69F3851E1EE97F235952EF4143468E473BC42F9C0A52BFE370042FCE777F755A44AD40D1DA89FE73
35,904,848 UART: [art] SIG.S = 8FD318EB6D888371371DF57B2A369D897725BFC7CDB7157B4F74D6882A403A2E3A0DE3AD2D45CD32E43B3913488DB4BF
37,209,900 UART: Caliptra RT
37,210,593 UART: [state] CFI Enabled
37,371,637 UART: [rt] RT listening for mailbox commands...
37,373,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,529,244 UART: [rt]cmd =0x41544d4e, len=14344
39,588,034 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,456 UART:
192,819 UART: Running Caliptra ROM ...
194,016 UART:
603,785 UART: [state] CFI Enabled
618,163 UART: [state] LifecycleState = Unprovisioned
620,104 UART: [state] DebugLocked = No
622,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,471 UART: [kat] SHA2-256
797,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,749 UART: [kat] ++
808,275 UART: [kat] sha1
818,226 UART: [kat] SHA2-256
820,942 UART: [kat] SHA2-384
826,147 UART: [kat] SHA2-512-ACC
828,507 UART: [kat] ECC-384
3,111,196 UART: [kat] HMAC-384Kdf
3,123,628 UART: [kat] LMS
4,313,778 UART: [kat] --
4,317,033 UART: [cold-reset] ++
4,318,476 UART: [fht] Storing FHT @ 0x50003400
4,329,171 UART: [idev] ++
4,329,799 UART: [idev] CDI.KEYID = 6
4,330,677 UART: [idev] SUBJECT.KEYID = 7
4,331,985 UART: [idev] UDS.KEYID = 0
4,333,221 ready_for_fw is high
4,333,436 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,873 UART: [idev] Erasing UDS.KEYID = 0
7,621,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,159 UART: [idev] --
7,646,910 UART: [ldev] ++
7,647,482 UART: [ldev] CDI.KEYID = 6
7,648,410 UART: [ldev] SUBJECT.KEYID = 5
7,649,673 UART: [ldev] AUTHORITY.KEYID = 7
7,650,946 UART: [ldev] FE.KEYID = 1
7,662,586 UART: [ldev] Erasing FE.KEYID = 1
10,947,898 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,762 UART: [ldev] --
13,307,267 UART: [fwproc] Waiting for Commands...
13,310,273 UART: [fwproc] Received command 0x46574c44
13,312,447 UART: [fwproc] Received Image of size 114124 bytes
22,104,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,183,909 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,252,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,569,491 >>> mbox cmd response: success
22,573,574 UART: [afmc] ++
22,574,178 UART: [afmc] CDI.KEYID = 6
22,575,090 UART: [afmc] SUBJECT.KEYID = 7
22,576,361 UART: [afmc] AUTHORITY.KEYID = 5
25,892,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,188,036 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,190,346 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,204,902 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,219,652 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,233,878 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,255,381 UART: [afmc] --
28,259,126 UART: [cold-reset] --
28,264,063 UART: [state] Locking Datavault
28,270,557 UART: [state] Locking PCR0, PCR1 and PCR31
28,272,308 UART: [state] Locking ICCM
28,273,809 UART: [exit] Launching FMC @ 0x40000130
28,282,205 UART:
28,282,484 UART: Running Caliptra FMC ...
28,283,601 UART:
28,283,762 UART: [state] CFI Enabled
28,291,860 UART: [fht] FMC Alias Private Key: 7
30,623,003 UART: [art] Extend RT PCRs Done
30,624,275 UART: [art] Lock RT PCRs Done
30,626,355 UART: [art] Populate DV Done
30,631,997 UART: [fht] FMC Alias Private Key: 7
30,633,545 UART: [art] Derive CDI
30,634,305 UART: [art] Store in in slot 0x4
30,677,057 UART: [art] Derive Key Pair
30,678,057 UART: [art] Store priv key in slot 0x5
33,919,794 UART: [art] Derive Key Pair - Done
33,932,978 UART: [art] Signing Cert with AUTHO
33,934,285 UART: RITY.KEYID = 7
36,213,757 UART: [art] Erasing AUTHORITY.KEYID = 7
36,215,266 UART: [art] PUB.X = 8740AACEA5CBFB72094EC03C1D158941AAE051A8CD11A275AF01BEB8E05BC2ACF31F38041CF633E82A8442FA5C36AA9E
36,222,497 UART: [art] PUB.Y = D8880705E9682C18BE6D6558341E0EF95506BC7D84C77B620E3C2B1130C8FE58AD37621B81BAE1007C858E343DA36884
36,229,716 UART: [art] SIG.R = ECB09278090C9829C67129A7DF47D46BEBFBF1CFD0F987CDC97E353A026B29DDCEBC325F2136FA75044EDA9D3D942655
36,237,147 UART: [art] SIG.S = 62DC89688AF70A849489B779B3715F2D0D724EA8E4F7BF3E7945ADAB883F859FE7F13E0186D43D8BA1CF17290C141F01
37,542,298 UART: Caliptra RT
37,543,019 UART: [state] CFI Enabled
37,660,320 UART: [rt] RT listening for mailbox commands...
37,662,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,817,939 UART: [rt]cmd =0x41544d4e, len=14344
39,903,109 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,132,134 ready_for_fw is high
4,132,509 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,510,076 >>> mbox cmd response: success
28,153,267 UART:
28,153,657 UART: Running Caliptra FMC ...
28,154,778 UART:
28,154,935 UART: [state] CFI Enabled
28,162,758 UART: [fht] FMC Alias Private Key: 7
30,493,595 UART: [art] Extend RT PCRs Done
30,494,821 UART: [art] Lock RT PCRs Done
30,496,783 UART: [art] Populate DV Done
30,502,565 UART: [fht] FMC Alias Private Key: 7
30,504,100 UART: [art] Derive CDI
30,504,907 UART: [art] Store in in slot 0x4
30,547,399 UART: [art] Derive Key Pair
30,548,433 UART: [art] Store priv key in slot 0x5
33,790,366 UART: [art] Derive Key Pair - Done
33,803,256 UART: [art] Signing Cert with AUTHO
33,804,585 UART: RITY.KEYID = 7
36,083,922 UART: [art] Erasing AUTHORITY.KEYID = 7
36,085,441 UART: [art] PUB.X = 27794CC2C1907307C55773F8B5C02B4AFCB32AA273388D49A15534043ADF40BB78AE023EC9C1F8BBE0034DEE985531BB
36,092,698 UART: [art] PUB.Y = B8A0E4F4A51A08B5F5167D7072E783FBD5EE97D3EAFBE7A77F53726A80AF4AAA5D94E178FDEBDBF49833ECCDE872465A
36,099,924 UART: [art] SIG.R = 569BE8065AD87D4CF22FA830D448529D7387E93EA7B03A2375EFE22DE8D2FD52AD75647FF2AE38A0FBC44EBF67F9C0DD
36,107,366 UART: [art] SIG.S = 5E6C508D9F832B15753C524DDD7CB18F971BAB074577128B9416031A016458160526135716B141A28D30DDEF06BA5285
37,413,023 UART: Caliptra RT
37,413,725 UART: [state] CFI Enabled
37,530,751 UART: [rt] RT listening for mailbox commands...
37,533,092 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,688,323 UART: [rt]cmd =0x41544d4e, len=14344
39,720,620 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,225 UART:
192,577 UART: Running Caliptra ROM ...
193,779 UART:
193,930 UART: [state] CFI Enabled
263,674 UART: [state] LifecycleState = Unprovisioned
265,588 UART: [state] DebugLocked = No
267,689 UART: [state] WD Timer not started. Device not locked for debugging
272,026 UART: [kat] SHA2-256
451,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,767 UART: [kat] ++
463,296 UART: [kat] sha1
474,529 UART: [kat] SHA2-256
477,573 UART: [kat] SHA2-384
484,670 UART: [kat] SHA2-512-ACC
487,613 UART: [kat] ECC-384
2,948,229 UART: [kat] HMAC-384Kdf
2,968,736 UART: [kat] LMS
3,498,180 UART: [kat] --
3,503,451 UART: [cold-reset] ++
3,505,028 UART: [fht] FHT @ 0x50003400
3,516,123 UART: [idev] ++
3,516,748 UART: [idev] CDI.KEYID = 6
3,517,639 UART: [idev] SUBJECT.KEYID = 7
3,518,836 UART: [idev] UDS.KEYID = 0
3,519,768 ready_for_fw is high
3,519,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,739 UART: [idev] Erasing UDS.KEYID = 0
6,025,474 UART: [idev] Sha1 KeyId Algorithm
6,049,902 UART: [idev] --
6,052,548 UART: [ldev] ++
6,053,129 UART: [ldev] CDI.KEYID = 6
6,054,044 UART: [ldev] SUBJECT.KEYID = 5
6,055,214 UART: [ldev] AUTHORITY.KEYID = 7
6,056,446 UART: [ldev] FE.KEYID = 1
6,098,270 UART: [ldev] Erasing FE.KEYID = 1
8,599,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,114 UART: [ldev] --
10,410,392 UART: [fwproc] Wait for Commands...
10,413,245 UART: [fwproc] Recv command 0x46574c44
10,415,289 UART: [fwproc] Recv'd Img size: 114448 bytes
14,999,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,080,350 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,149,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,468,204 >>> mbox cmd response: success
15,473,018 UART: [afmc] ++
15,473,619 UART: [afmc] CDI.KEYID = 6
15,474,532 UART: [afmc] SUBJECT.KEYID = 7
15,475,689 UART: [afmc] AUTHORITY.KEYID = 5
18,017,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,742,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,744,362 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,760,394 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,776,322 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,792,078 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,816,077 UART: [afmc] --
19,819,243 UART: [cold-reset] --
19,824,992 UART: [state] Locking Datavault
19,831,912 UART: [state] Locking PCR0, PCR1 and PCR31
19,833,607 UART: [state] Locking ICCM
19,834,985 UART: [exit] Launching FMC @ 0x40000130
19,843,431 UART:
19,843,679 UART: Running Caliptra FMC ...
19,844,785 UART:
19,844,955 UART: [state] CFI Enabled
19,902,878 UART: [fht] FMC Alias Private Key: 7
21,666,450 UART: [art] Extend RT PCRs Done
21,667,667 UART: [art] Lock RT PCRs Done
21,669,203 UART: [art] Populate DV Done
21,674,730 UART: [fht] FMC Alias Private Key: 7
21,676,271 UART: [art] Derive CDI
21,677,054 UART: [art] Store in in slot 0x4
21,735,022 UART: [art] Derive Key Pair
21,736,019 UART: [art] Store priv key in slot 0x5
24,198,942 UART: [art] Derive Key Pair - Done
24,212,251 UART: [art] Signing Cert with AUTHO
24,213,546 UART: RITY.KEYID = 7
25,923,935 UART: [art] Erasing AUTHORITY.KEYID = 7
25,925,445 UART: [art] PUB.X = 769A9706F9530B5C961A0A48562B63F54C8608E66DD0C0BD56166B99F8C0E6F155F49A4C1A848A84FEAA5E6D372D7565
25,932,689 UART: [art] PUB.Y = FF7EA0702338BA548A3BED286FD9ADA0EF16ED3A9900C1025C50A1A596690DF708287B178B9B82D12342A7804926BFAE
25,939,925 UART: [art] SIG.R = BB11C885C55584D75548DE5AE23F583CC20CFD6966257D2FA8C6CD9DB46AD3E0DB4E946942FE8F0A880185B79B3A2CA7
25,947,314 UART: [art] SIG.S = 024DFFF1C975C3785208E67007A07BE99411C57E8738DF6CB253C97CF6EF8CF452D36F47BCA8AE5240B9159F5546FADB
26,926,264 UART: Caliptra RT
26,926,952 UART: [state] CFI Enabled
27,091,711 UART: [rt] RT listening for mailbox commands...
27,094,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,249,840 UART: [rt]cmd =0x41544d4e, len=14344
28,430,244 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,358,250 ready_for_fw is high
3,358,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,012,838 >>> mbox cmd response: success
19,305,828 UART:
19,306,228 UART: Running Caliptra FMC ...
19,307,380 UART:
19,307,544 UART: [state] CFI Enabled
19,372,210 UART: [fht] FMC Alias Private Key: 7
21,136,430 UART: [art] Extend RT PCRs Done
21,137,646 UART: [art] Lock RT PCRs Done
21,139,379 UART: [art] Populate DV Done
21,144,827 UART: [fht] FMC Alias Private Key: 7
21,146,434 UART: [art] Derive CDI
21,147,257 UART: [art] Store in in slot 0x4
21,204,699 UART: [art] Derive Key Pair
21,205,746 UART: [art] Store priv key in slot 0x5
23,668,362 UART: [art] Derive Key Pair - Done
23,681,261 UART: [art] Signing Cert with AUTHO
23,682,565 UART: RITY.KEYID = 7
25,394,266 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,769 UART: [art] PUB.X = 6AB65D3BB89EFC12E9FC314FA5F6FD98005AB4F8AFB462C270508472531AC87C7D71C808141019752B3F5B2184C2F83B
25,403,033 UART: [art] PUB.Y = D77F15887FAF3DEAE54A7CBF90644CFD8C2609C0FACFE42E19F991B68354A2A134F268E20D6761C1E544A20C0893FBA7
25,410,344 UART: [art] SIG.R = 101A39DE93FE61C871FCBCAD0BD211CAA3BCB019E6FFBCEC8983E9CE5D2AD06354286B1581DF98B471F317ED9ED97B1D
25,417,749 UART: [art] SIG.S = EF2EF2E4788339AB2A0B9351AFD91C9153F191EAC8F929303A3AF1B7DC1C896ACD42F4428FE41DD2EB070229DC258CED
26,396,434 UART: Caliptra RT
26,397,138 UART: [state] CFI Enabled
26,563,232 UART: [rt] RT listening for mailbox commands...
26,565,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,721,741 UART: [rt]cmd =0x41544d4e, len=14344
27,906,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,551 UART:
192,911 UART: Running Caliptra ROM ...
194,096 UART:
603,499 UART: [state] CFI Enabled
619,805 UART: [state] LifecycleState = Unprovisioned
621,674 UART: [state] DebugLocked = No
623,414 UART: [state] WD Timer not started. Device not locked for debugging
627,514 UART: [kat] SHA2-256
806,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,149 UART: [kat] ++
818,685 UART: [kat] sha1
829,773 UART: [kat] SHA2-256
832,783 UART: [kat] SHA2-384
839,189 UART: [kat] SHA2-512-ACC
842,116 UART: [kat] ECC-384
3,285,608 UART: [kat] HMAC-384Kdf
3,297,283 UART: [kat] LMS
3,826,796 UART: [kat] --
3,830,726 UART: [cold-reset] ++
3,831,941 UART: [fht] FHT @ 0x50003400
3,843,093 UART: [idev] ++
3,843,676 UART: [idev] CDI.KEYID = 6
3,844,555 UART: [idev] SUBJECT.KEYID = 7
3,845,792 UART: [idev] UDS.KEYID = 0
3,846,685 ready_for_fw is high
3,846,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,016 UART: [idev] Erasing UDS.KEYID = 0
6,316,948 UART: [idev] Sha1 KeyId Algorithm
6,339,686 UART: [idev] --
6,343,245 UART: [ldev] ++
6,343,807 UART: [ldev] CDI.KEYID = 6
6,344,766 UART: [ldev] SUBJECT.KEYID = 5
6,345,917 UART: [ldev] AUTHORITY.KEYID = 7
6,347,196 UART: [ldev] FE.KEYID = 1
6,356,593 UART: [ldev] Erasing FE.KEYID = 1
8,829,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,157 UART: [ldev] --
10,623,273 UART: [fwproc] Wait for Commands...
10,625,956 UART: [fwproc] Recv command 0x46574c44
10,628,040 UART: [fwproc] Recv'd Img size: 114448 bytes
15,199,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,279,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,348,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,666,114 >>> mbox cmd response: success
15,670,390 UART: [afmc] ++
15,670,980 UART: [afmc] CDI.KEYID = 6
15,671,885 UART: [afmc] SUBJECT.KEYID = 7
15,673,205 UART: [afmc] AUTHORITY.KEYID = 5
18,172,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,891,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,893,321 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,909,287 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,925,231 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,941,038 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,964,147 UART: [afmc] --
19,968,330 UART: [cold-reset] --
19,971,913 UART: [state] Locking Datavault
19,977,204 UART: [state] Locking PCR0, PCR1 and PCR31
19,978,841 UART: [state] Locking ICCM
19,980,422 UART: [exit] Launching FMC @ 0x40000130
19,988,874 UART:
19,989,102 UART: Running Caliptra FMC ...
19,990,196 UART:
19,990,351 UART: [state] CFI Enabled
19,998,135 UART: [fht] FMC Alias Private Key: 7
21,754,334 UART: [art] Extend RT PCRs Done
21,755,553 UART: [art] Lock RT PCRs Done
21,757,172 UART: [art] Populate DV Done
21,762,575 UART: [fht] FMC Alias Private Key: 7
21,764,178 UART: [art] Derive CDI
21,764,985 UART: [art] Store in in slot 0x4
21,807,791 UART: [art] Derive Key Pair
21,808,785 UART: [art] Store priv key in slot 0x5
24,236,628 UART: [art] Derive Key Pair - Done
24,249,702 UART: [art] Signing Cert with AUTHO
24,251,008 UART: RITY.KEYID = 7
25,956,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,958,075 UART: [art] PUB.X = 23E477EE59CFBE6D547748346475E946D26543FCB242902AF93CB117E47CD41EE8C09A52CEDD4C6B544FFEC6695B8AFF
25,965,310 UART: [art] PUB.Y = BC52FF49B2EBB759E98BD86D006067178AB0397A0A6E4C76FC24179E9567DC643FBA23D24AA3641AC6994EAB7E3D50EC
25,972,619 UART: [art] SIG.R = C5B2E48430FE9E6EA701F1EC61CEE8E279982DEDB53D69E11FB39BB189074936504DD7ED48783AC38E48426B7FD7A7F0
25,979,998 UART: [art] SIG.S = 8F25278B02A39054BE81DAF57D8A1C90D7401819679081870E4CB63B8CB5463C074FE5460F6BEECDC69930777E8D89AB
26,958,690 UART: Caliptra RT
26,959,374 UART: [state] CFI Enabled
27,076,467 UART: [rt] RT listening for mailbox commands...
27,078,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,151 UART: [rt]cmd =0x41544d4e, len=14344
28,422,728 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,703,248 ready_for_fw is high
3,703,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,271,966 >>> mbox cmd response: success
19,522,449 UART:
19,522,829 UART: Running Caliptra FMC ...
19,523,919 UART:
19,524,062 UART: [state] CFI Enabled
19,532,169 UART: [fht] FMC Alias Private Key: 7
21,289,189 UART: [art] Extend RT PCRs Done
21,290,400 UART: [art] Lock RT PCRs Done
21,291,878 UART: [art] Populate DV Done
21,297,141 UART: [fht] FMC Alias Private Key: 7
21,298,622 UART: [art] Derive CDI
21,299,348 UART: [art] Store in in slot 0x4
21,341,882 UART: [art] Derive Key Pair
21,342,923 UART: [art] Store priv key in slot 0x5
23,769,742 UART: [art] Derive Key Pair - Done
23,782,378 UART: [art] Signing Cert with AUTHO
23,783,685 UART: RITY.KEYID = 7
25,489,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,491,100 UART: [art] PUB.X = 0AC3052DBEC0361B4B50673B53A9E37B10B6C3B6654A591743D2D5AAD400E4EC737A841DF31EEB776623F8D4173616C7
25,497,967 UART: [art] PUB.Y = 378D12ACDAC1B867AE880E56A4D8D404CB724DC10ED19B2473110C8047A1716B8CBC25E46CDAA6560F534A829565DAD8
25,505,214 UART: [art] SIG.R = FF3CAC162115F4D5E15366C8A586E49A8B35C07EA19A4DDBA534F42D19ADE83AB63B53DFDB385C2828AE74728E3F266E
25,512,595 UART: [art] SIG.S = 00BCE756495B83B9936013BD673C9674FFA92C88FC6FCCE829AC2FC9C93FC6BF76CC3497273126BFCC2D68F78F7611F9
26,491,449 UART: Caliptra RT
26,492,202 UART: [state] CFI Enabled
26,609,338 UART: [rt] RT listening for mailbox commands...
26,611,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,767,080 UART: [rt]cmd =0x41544d4e, len=14344
27,953,639 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,049 UART:
192,561 UART: Running Caliptra ROM ...
193,684 UART:
193,829 UART: [state] CFI Enabled
262,631 UART: [state] LifecycleState = Unprovisioned
264,991 UART: [state] DebugLocked = No
267,854 UART: [state] WD Timer not started. Device not locked for debugging
272,664 UART: [kat] SHA2-256
462,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,336 UART: [kat] ++
473,786 UART: [kat] sha1
486,364 UART: [kat] SHA2-256
489,372 UART: [kat] SHA2-384
493,960 UART: [kat] SHA2-512-ACC
496,540 UART: [kat] ECC-384
2,949,962 UART: [kat] HMAC-384Kdf
2,972,208 UART: [kat] LMS
3,504,003 UART: [kat] --
3,507,666 UART: [cold-reset] ++
3,508,957 UART: [fht] FHT @ 0x50003400
3,519,435 UART: [idev] ++
3,520,137 UART: [idev] CDI.KEYID = 6
3,521,090 UART: [idev] SUBJECT.KEYID = 7
3,522,336 UART: [idev] UDS.KEYID = 0
3,523,425 ready_for_fw is high
3,523,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,778 UART: [idev] Erasing UDS.KEYID = 0
6,031,480 UART: [idev] Sha1 KeyId Algorithm
6,053,481 UART: [idev] --
6,057,660 UART: [ldev] ++
6,058,347 UART: [ldev] CDI.KEYID = 6
6,059,264 UART: [ldev] SUBJECT.KEYID = 5
6,060,431 UART: [ldev] AUTHORITY.KEYID = 7
6,061,669 UART: [ldev] FE.KEYID = 1
6,100,405 UART: [ldev] Erasing FE.KEYID = 1
8,604,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,400 UART: [ldev] --
10,411,930 UART: [fwproc] Wait for Commands...
10,414,234 UART: [fwproc] Recv command 0x46574c44
10,416,538 UART: [fwproc] Recv'd Img size: 114448 bytes
15,052,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,140,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,256,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,799,532 >>> mbox cmd response: success
15,803,232 UART: [afmc] ++
15,803,938 UART: [afmc] CDI.KEYID = 6
15,805,049 UART: [afmc] SUBJECT.KEYID = 7
15,806,588 UART: [afmc] AUTHORITY.KEYID = 5
18,348,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,091,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,093,139 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,108,193 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,123,422 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,138,268 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,162,530 UART: [afmc] --
20,166,927 UART: [cold-reset] --
20,171,973 UART: [state] Locking Datavault
20,177,671 UART: [state] Locking PCR0, PCR1 and PCR31
20,179,811 UART: [state] Locking ICCM
20,182,204 UART: [exit] Launching FMC @ 0x40000130
20,190,872 UART:
20,191,102 UART: Running Caliptra FMC ...
20,192,126 UART:
20,192,274 UART: [state] CFI Enabled
20,247,234 UART: [fht] FMC Alias Private Key: 7
22,011,213 UART: [art] Extend RT PCRs Done
22,012,435 UART: [art] Lock RT PCRs Done
22,014,036 UART: [art] Populate DV Done
22,019,021 UART: [fht] FMC Alias Private Key: 7
22,020,568 UART: [art] Derive CDI
22,021,305 UART: [art] Store in in slot 0x4
22,081,001 UART: [art] Derive Key Pair
22,082,051 UART: [art] Store priv key in slot 0x5
24,544,782 UART: [art] Derive Key Pair - Done
24,557,613 UART: [art] Signing Cert with AUTHO
24,558,915 UART: RITY.KEYID = 7
26,271,482 UART: [art] Erasing AUTHORITY.KEYID = 7
26,273,114 UART: [art] PUB.X = C2F64C32A8D5D25C6E8BC525C4CC9867ED2B341D16EDEF3EE0FA76E17003D23A1FAFC10AC7C57DF2C20ABEED74ABA8F7
26,280,303 UART: [art] PUB.Y = 76B6D4387CDE8E7FE7F57976BD427E318AEF558478C74970763241CC89499E23FCE8C036B17AD1389435365729A2C540
26,287,585 UART: [art] SIG.R = ABBE6352B40345B7ACA6D85581102EFEBC4B121EFFB85972798097C7A829B75072E10AF5081AD6AA2B02D569D1E30CFC
26,294,966 UART: [art] SIG.S = EBB083EFD43FB57CFD68F7C46F45B4FFEF37A947FB216B81F96A0EACA297EE3F32C23CCF464AA84938F4D5123A46CB93
27,273,736 UART: Caliptra RT
27,274,439 UART: [state] CFI Enabled
27,437,673 UART: [rt] RT listening for mailbox commands...
27,439,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,595,716 UART: [rt]cmd =0x41544d4e, len=14344
28,782,652 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,438,250 ready_for_fw is high
3,438,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,845,708 >>> mbox cmd response: success
20,138,035 UART:
20,138,414 UART: Running Caliptra FMC ...
20,139,607 UART:
20,139,777 UART: [state] CFI Enabled
20,208,495 UART: [fht] FMC Alias Private Key: 7
21,972,467 UART: [art] Extend RT PCRs Done
21,973,674 UART: [art] Lock RT PCRs Done
21,974,921 UART: [art] Populate DV Done
21,980,330 UART: [fht] FMC Alias Private Key: 7
21,981,814 UART: [art] Derive CDI
21,982,581 UART: [art] Store in in slot 0x4
22,041,572 UART: [art] Derive Key Pair
22,042,611 UART: [art] Store priv key in slot 0x5
24,505,419 UART: [art] Derive Key Pair - Done
24,518,517 UART: [art] Signing Cert with AUTHO
24,519,814 UART: RITY.KEYID = 7
26,231,753 UART: [art] Erasing AUTHORITY.KEYID = 7
26,233,253 UART: [art] PUB.X = F443EAAC8CE16F26EAE45618D4BC02DAAEB27497FF970863C6DE1AD6F1FBA37A42217491802A4D3064C983D28A4DBCA5
26,240,496 UART: [art] PUB.Y = A4A0C2021314C2B055BBAEE566024DBE59F771D8891E467EB0EB1F92B7CAFC2973A3AD6CCCC7C2591F48E03B91C70444
26,247,809 UART: [art] SIG.R = 2DB2D542BB0FC94561798E1EE4B0D07E94174354C09ACEC0AD34148EE97E1274DE92FA089B96A170C90BE4E19BE9E9AF
26,255,216 UART: [art] SIG.S = 2AC08BFFCB57B65CC5269583DAA33663F7329F1B3C2DE825079F99EB13F011EBACB6F7847ABDE742C7ECCA6ABF1E2A79
27,234,063 UART: Caliptra RT
27,234,753 UART: [state] CFI Enabled
27,399,061 UART: [rt] RT listening for mailbox commands...
27,401,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,428 UART: [rt]cmd =0x41544d4e, len=14344
28,746,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,271 UART:
192,637 UART: Running Caliptra ROM ...
193,831 UART:
603,634 UART: [state] CFI Enabled
617,874 UART: [state] LifecycleState = Unprovisioned
620,245 UART: [state] DebugLocked = No
622,962 UART: [state] WD Timer not started. Device not locked for debugging
626,911 UART: [kat] SHA2-256
816,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,574 UART: [kat] ++
828,091 UART: [kat] sha1
839,814 UART: [kat] SHA2-256
842,813 UART: [kat] SHA2-384
850,355 UART: [kat] SHA2-512-ACC
852,959 UART: [kat] ECC-384
3,294,799 UART: [kat] HMAC-384Kdf
3,306,523 UART: [kat] LMS
3,838,383 UART: [kat] --
3,842,555 UART: [cold-reset] ++
3,843,419 UART: [fht] FHT @ 0x50003400
3,854,741 UART: [idev] ++
3,855,446 UART: [idev] CDI.KEYID = 6
3,856,470 UART: [idev] SUBJECT.KEYID = 7
3,857,563 UART: [idev] UDS.KEYID = 0
3,858,502 ready_for_fw is high
3,858,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,511 UART: [idev] Erasing UDS.KEYID = 0
6,333,846 UART: [idev] Sha1 KeyId Algorithm
6,354,800 UART: [idev] --
6,360,948 UART: [ldev] ++
6,361,642 UART: [ldev] CDI.KEYID = 6
6,362,546 UART: [ldev] SUBJECT.KEYID = 5
6,363,748 UART: [ldev] AUTHORITY.KEYID = 7
6,364,916 UART: [ldev] FE.KEYID = 1
6,377,876 UART: [ldev] Erasing FE.KEYID = 1
8,854,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,754 UART: [ldev] --
10,645,511 UART: [fwproc] Wait for Commands...
10,647,765 UART: [fwproc] Recv command 0x46574c44
10,650,067 UART: [fwproc] Recv'd Img size: 114448 bytes
15,286,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,365,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,481,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,025,019 >>> mbox cmd response: success
16,028,564 UART: [afmc] ++
16,029,268 UART: [afmc] CDI.KEYID = 6
16,030,375 UART: [afmc] SUBJECT.KEYID = 7
16,031,918 UART: [afmc] AUTHORITY.KEYID = 5
18,531,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,253,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,255,458 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,270,529 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,285,731 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,300,526 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,324,354 UART: [afmc] --
20,327,307 UART: [cold-reset] --
20,331,382 UART: [state] Locking Datavault
20,336,909 UART: [state] Locking PCR0, PCR1 and PCR31
20,339,079 UART: [state] Locking ICCM
20,340,501 UART: [exit] Launching FMC @ 0x40000130
20,349,181 UART:
20,349,408 UART: Running Caliptra FMC ...
20,350,502 UART:
20,350,656 UART: [state] CFI Enabled
20,358,313 UART: [fht] FMC Alias Private Key: 7
22,115,353 UART: [art] Extend RT PCRs Done
22,116,571 UART: [art] Lock RT PCRs Done
22,118,542 UART: [art] Populate DV Done
22,124,104 UART: [fht] FMC Alias Private Key: 7
22,125,685 UART: [art] Derive CDI
22,126,411 UART: [art] Store in in slot 0x4
22,168,831 UART: [art] Derive Key Pair
22,169,865 UART: [art] Store priv key in slot 0x5
24,596,953 UART: [art] Derive Key Pair - Done
24,609,966 UART: [art] Signing Cert with AUTHO
24,611,270 UART: RITY.KEYID = 7
26,316,643 UART: [art] Erasing AUTHORITY.KEYID = 7
26,318,148 UART: [art] PUB.X = 81C6603B0CCBEFEEA751BF2B77D938DE2731900712A507518DE952D334A6F5688BFBE4D5203177F7869F07363A95420A
26,325,428 UART: [art] PUB.Y = 29D6DF6329D55DF85B3B07B192518F690A54C706902414E98696A43999244796288CCC8451398CD6E1BE82ADF6EFD255
26,332,644 UART: [art] SIG.R = CC254FCC239AE51A607D7DB22973BAB4B8F511E05123007CDD12EC45AAC9FB5669A20EF72AA6F41B544A99A49326D6C8
26,340,009 UART: [art] SIG.S = D5BC7C5F86769B2B31AB00BCA3E3348AF4F3434281FE767B1E738227F034B4D1017F26B702980DD7366CF31CDA42414E
27,319,328 UART: Caliptra RT
27,320,040 UART: [state] CFI Enabled
27,436,476 UART: [rt] RT listening for mailbox commands...
27,438,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,594,286 UART: [rt]cmd =0x41544d4e, len=14344
28,782,885 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,754,431 ready_for_fw is high
3,755,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,070,103 >>> mbox cmd response: success
20,321,618 UART:
20,321,998 UART: Running Caliptra FMC ...
20,323,189 UART:
20,323,349 UART: [state] CFI Enabled
20,331,012 UART: [fht] FMC Alias Private Key: 7
22,087,385 UART: [art] Extend RT PCRs Done
22,088,604 UART: [art] Lock RT PCRs Done
22,090,233 UART: [art] Populate DV Done
22,095,315 UART: [fht] FMC Alias Private Key: 7
22,096,958 UART: [art] Derive CDI
22,097,769 UART: [art] Store in in slot 0x4
22,140,210 UART: [art] Derive Key Pair
22,141,243 UART: [art] Store priv key in slot 0x5
24,567,422 UART: [art] Derive Key Pair - Done
24,580,642 UART: [art] Signing Cert with AUTHO
24,581,944 UART: RITY.KEYID = 7
26,287,395 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,903 UART: [art] PUB.X = 21715D7EFCAFE815123229806ADE3B0FD78553769143C777D60D08EF82B92A171F0F3DAEAAAF3FD28EE4F1C7011B7911
26,296,181 UART: [art] PUB.Y = CDA90A1A0FEED24C43D5C011CD70D402DDE5730E639BC914D541B2C93D991B1EFF758006B7B9DE26CFFD0D89B6D840B3
26,303,471 UART: [art] SIG.R = 29A160735E106B1E4AE4471D6A3AA37D764CE659AC242F7EDF42D15EAA909BE8446416D527E443C3AB32ED384E0176B8
26,310,844 UART: [art] SIG.S = D85B5074F01081D14EEADE767E8FC0D1E2E01EBBF4450E36D5260121C4B5A8FECB94B8B37616265331F0F666376AB5B0
27,289,960 UART: Caliptra RT
27,290,671 UART: [state] CFI Enabled
27,408,453 UART: [rt] RT listening for mailbox commands...
27,410,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,108 UART: [rt]cmd =0x41544d4e, len=14344
28,739,985 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,476,875 UART: [fht] Storing FHT @ 0x50003400
1,479,532 UART: [idev] ++
1,479,700 UART: [idev] CDI.KEYID = 6
1,480,060 UART: [idev] SUBJECT.KEYID = 7
1,480,484 UART: [idev] UDS.KEYID = 0
1,480,829 ready_for_fw is high
1,480,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,623 UART: [ldev] ++
1,514,791 UART: [ldev] CDI.KEYID = 6
1,515,154 UART: [ldev] SUBJECT.KEYID = 5
1,515,580 UART: [ldev] AUTHORITY.KEYID = 7
1,516,043 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,832 UART: [ldev] --
1,586,323 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 114448 bytes
5,311,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,339,538 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,368,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,504,983 >>> mbox cmd response: success
5,506,039 UART: [afmc] ++
5,506,207 UART: [afmc] CDI.KEYID = 6
5,506,569 UART: [afmc] SUBJECT.KEYID = 7
5,506,994 UART: [afmc] AUTHORITY.KEYID = 5
5,541,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,680 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,558,460 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,564,169 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,570,061 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,762 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,722 UART: [afmc] --
5,584,606 UART: [cold-reset] --
5,585,730 UART: [state] Locking Datavault
5,586,985 UART: [state] Locking PCR0, PCR1 and PCR31
5,587,589 UART: [state] Locking ICCM
5,588,225 UART: [exit] Launching FMC @ 0x40000130
5,593,554 UART:
5,593,570 UART: Running Caliptra FMC ...
5,593,978 UART:
5,594,032 UART: [state] CFI Enabled
5,604,480 UART: [fht] FMC Alias Private Key: 7
5,712,118 UART: [art] Extend RT PCRs Done
5,712,546 UART: [art] Lock RT PCRs Done
5,714,196 UART: [art] Populate DV Done
5,722,704 UART: [fht] FMC Alias Private Key: 7
5,723,810 UART: [art] Derive CDI
5,724,090 UART: [art] Store in in slot 0x4
5,809,971 UART: [art] Derive Key Pair
5,810,331 UART: [art] Store priv key in slot 0x5
5,823,877 UART: [art] Derive Key Pair - Done
5,838,700 UART: [art] Signing Cert with AUTHO
5,839,180 UART: RITY.KEYID = 7
5,854,278 UART: [art] Erasing AUTHORITY.KEYID = 7
5,855,043 UART: [art] PUB.X = BCC8C986775269EEE0611DDC538EDA4A2C7FAB34E66837B97F86F38E100073EAF163CD3DEB8343913B5C7427E8013618
5,861,794 UART: [art] PUB.Y = 8165F87D7FB067790E1A915DCFF1CAFE5A61BB7B3F2ECFC735754545670D4437AE81075DD1A723000F52EC913E148B00
5,868,694 UART: [art] SIG.R = C1BB3CB23087CF0B402B245691643172B67C17DABB734B2500F488C7E051A816ABB556888E39A5764AF57677FA92AA78
5,875,439 UART: [art] SIG.S = 0EC18A562BD60AC82F787EA740B8A2CBAD828BE7C5538B533804C2852AAF3D624334FB44FDFE8B01D20BE84270021AC5
5,899,342 UART: Caliptra RT
5,899,595 UART: [state] CFI Enabled
6,006,714 UART: [rt] RT listening for mailbox commands...
6,007,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,130,368 UART: [rt]cmd =0x41544d4e, len=14344
6,423,640 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,007 ready_for_fw is high
1,362,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,201,713 >>> mbox cmd response: success
5,262,564 UART:
5,262,580 UART: Running Caliptra FMC ...
5,262,988 UART:
5,263,042 UART: [state] CFI Enabled
5,273,846 UART: [fht] FMC Alias Private Key: 7
5,381,866 UART: [art] Extend RT PCRs Done
5,382,294 UART: [art] Lock RT PCRs Done
5,383,624 UART: [art] Populate DV Done
5,391,952 UART: [fht] FMC Alias Private Key: 7
5,393,016 UART: [art] Derive CDI
5,393,296 UART: [art] Store in in slot 0x4
5,479,019 UART: [art] Derive Key Pair
5,479,379 UART: [art] Store priv key in slot 0x5
5,492,819 UART: [art] Derive Key Pair - Done
5,507,948 UART: [art] Signing Cert with AUTHO
5,508,428 UART: RITY.KEYID = 7
5,523,754 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,519 UART: [art] PUB.X = CDB3E44A680E1A3612CF135F341360827BC2A7CF1A1B7D872E4AA4DE9101E1FEA77E0B32977ACA2B5AAF4FABB6DF053E
5,531,301 UART: [art] PUB.Y = 9C10FE62EB150CC75DFBDC6BDD1B8C0B218F8B2798A51348A1C78D9BD67730BAD20E92ECB38DAC52616100192583E8CB
5,538,236 UART: [art] SIG.R = A577D5DB0CA3B41AC20DE78C80C45F02BB42BB054966D90566223BCA2E4E7720D6508DDCC46BA579741A90D5C1FD64D7
5,545,003 UART: [art] SIG.S = 7771A2C0E75C1D5686DC7565EC066B2808C8E00C0E7A23E281C6D36367947BE931D543AB111A82598E0FCD7F9C5E2F9F
5,568,987 UART: Caliptra RT
5,569,240 UART: [state] CFI Enabled
5,677,147 UART: [rt] RT listening for mailbox commands...
5,677,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,055 UART: [rt]cmd =0x41544d4e, len=14344
6,081,902 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,401 UART: [kat] HMAC-384Kdf
908,069 UART: [kat] LMS
1,476,265 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,498 UART: [fht] Storing FHT @ 0x50003400
1,480,315 UART: [idev] ++
1,480,483 UART: [idev] CDI.KEYID = 6
1,480,843 UART: [idev] SUBJECT.KEYID = 7
1,481,267 UART: [idev] UDS.KEYID = 0
1,481,612 ready_for_fw is high
1,481,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,505,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,597 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,553 UART: [ldev] --
1,586,832 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 114448 bytes
5,084,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,277,790 >>> mbox cmd response: success
5,279,010 UART: [afmc] ++
5,279,178 UART: [afmc] CDI.KEYID = 6
5,279,540 UART: [afmc] SUBJECT.KEYID = 7
5,279,965 UART: [afmc] AUTHORITY.KEYID = 5
5,315,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,197 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,906 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,798 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,499 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,369 UART: [afmc] --
5,358,303 UART: [cold-reset] --
5,358,945 UART: [state] Locking Datavault
5,360,190 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,794 UART: [state] Locking ICCM
5,361,440 UART: [exit] Launching FMC @ 0x40000130
5,366,769 UART:
5,366,785 UART: Running Caliptra FMC ...
5,367,193 UART:
5,367,336 UART: [state] CFI Enabled
5,377,832 UART: [fht] FMC Alias Private Key: 7
5,485,850 UART: [art] Extend RT PCRs Done
5,486,278 UART: [art] Lock RT PCRs Done
5,487,560 UART: [art] Populate DV Done
5,495,676 UART: [fht] FMC Alias Private Key: 7
5,496,810 UART: [art] Derive CDI
5,497,090 UART: [art] Store in in slot 0x4
5,582,683 UART: [art] Derive Key Pair
5,583,043 UART: [art] Store priv key in slot 0x5
5,595,871 UART: [art] Derive Key Pair - Done
5,610,763 UART: [art] Signing Cert with AUTHO
5,611,243 UART: RITY.KEYID = 7
5,626,459 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,224 UART: [art] PUB.X = 5B5E2043AF1347E510EA64CC5988A3E27EEFD72EC17A4EE407570945166B75B9E857BD1C1EE6F30BC98AD23905EAE396
5,633,992 UART: [art] PUB.Y = 497D304AAF453DD875A31B7CEE77BAE45EABA29B149C7E1B233483E6BC67404215C0E250A3E1489C67B6E61813D28253
5,640,946 UART: [art] SIG.R = DFF1EFD8ED4AB82C971F298B9CF559FBC6350DCCE1DD25C8446C058E81C65B3A71208BB65D9F4667D1DD7C6667ECC64A
5,647,732 UART: [art] SIG.S = AA16101C70455188C80EDE7246F1E404B586414047AD51BE75C4064856DFBF8969E0E3BC8B674B9E38D74462E91F421D
5,671,242 UART: Caliptra RT
5,671,587 UART: [state] CFI Enabled
5,780,693 UART: [rt] RT listening for mailbox commands...
5,781,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,415 UART: [rt]cmd =0x41544d4e, len=14344
6,192,537 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,168 ready_for_fw is high
1,363,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,392,539 >>> mbox cmd response: success
5,455,572 UART:
5,455,588 UART: Running Caliptra FMC ...
5,455,996 UART:
5,456,139 UART: [state] CFI Enabled
5,466,593 UART: [fht] FMC Alias Private Key: 7
5,574,125 UART: [art] Extend RT PCRs Done
5,574,553 UART: [art] Lock RT PCRs Done
5,575,947 UART: [art] Populate DV Done
5,584,249 UART: [fht] FMC Alias Private Key: 7
5,585,389 UART: [art] Derive CDI
5,585,669 UART: [art] Store in in slot 0x4
5,671,322 UART: [art] Derive Key Pair
5,671,682 UART: [art] Store priv key in slot 0x5
5,685,286 UART: [art] Derive Key Pair - Done
5,700,047 UART: [art] Signing Cert with AUTHO
5,700,527 UART: RITY.KEYID = 7
5,715,965 UART: [art] Erasing AUTHORITY.KEYID = 7
5,716,730 UART: [art] PUB.X = 1A088D372D0A7C7980A99CA51EF0E0FDA988A78172787919DB44FA6CEB1C7DBA9EDCA156AD06E8E97D1C8B202ED1D085
5,723,509 UART: [art] PUB.Y = BAE68ED4D0130637592F9366B93C7326537BB9CCE882D5546FF7F7B7752CF002699A5C625694B04E0BABA7332A3A6024
5,730,450 UART: [art] SIG.R = EC3B6FB49BE259964B2081AF1548FA09806EE71D00E211E84A4491BBCD493B68A69624756AB4F2C7B224C29C9EA6E034
5,737,201 UART: [art] SIG.S = 3D6E8C3A43C402B0FABFE63470796D6BBA1065C547DAD4735C45C13AC8C4F9CE308FD00F225B6760E5205D629FBD53A6
5,761,092 UART: Caliptra RT
5,761,437 UART: [state] CFI Enabled
5,870,348 UART: [rt] RT listening for mailbox commands...
5,871,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,886 UART: [rt]cmd =0x41544d4e, len=14344
6,282,138 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,843 UART: [kat] SHA2-256
903,783 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,656 UART: [kat] LMS
1,170,984 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,235 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 ready_for_fw is high
1,176,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,200,901 UART: [idev] Sha1 KeyId Algorithm
1,209,397 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,607 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,794 UART: [fwproc] Recv command 0x46574c44
1,284,522 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,503 >>> mbox cmd response: success
3,324,527 UART: [afmc] ++
3,324,695 UART: [afmc] CDI.KEYID = 6
3,325,057 UART: [afmc] SUBJECT.KEYID = 7
3,325,482 UART: [afmc] AUTHORITY.KEYID = 5
3,360,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,699 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,408 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,300 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,011 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,822 UART: [afmc] --
3,403,712 UART: [cold-reset] --
3,404,340 UART: [state] Locking Datavault
3,405,493 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,097 UART: [state] Locking ICCM
3,406,549 UART: [exit] Launching FMC @ 0x40000130
3,411,878 UART:
3,411,894 UART: Running Caliptra FMC ...
3,412,302 UART:
3,412,356 UART: [state] CFI Enabled
3,422,460 UART: [fht] FMC Alias Private Key: 7
3,531,090 UART: [art] Extend RT PCRs Done
3,531,518 UART: [art] Lock RT PCRs Done
3,532,928 UART: [art] Populate DV Done
3,541,090 UART: [fht] FMC Alias Private Key: 7
3,542,258 UART: [art] Derive CDI
3,542,538 UART: [art] Store in in slot 0x4
3,628,255 UART: [art] Derive Key Pair
3,628,615 UART: [art] Store priv key in slot 0x5
3,641,743 UART: [art] Derive Key Pair - Done
3,656,751 UART: [art] Signing Cert with AUTHO
3,657,231 UART: RITY.KEYID = 7
3,672,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,838 UART: [art] PUB.X = 9A3D49E6D92A8BAE77077EC5FA9E5067E4C3081A8A45A3057E624B65CD066BC39AEC8D9EFBA074995B2C2080FEFC8269
3,679,610 UART: [art] PUB.Y = EB409EFD87A3BDEBD64CE06A096420D803881F4520411A1350144C70D9074FBB2B1CD6445392E4809889A2B95477D3E4
3,686,549 UART: [art] SIG.R = 3DBBFE75BB85480D92C2D94E8962409DFBDB9B2E2053ED1B39EB4A26298B7CF1E535451508A7672016C4A08F35743594
3,693,315 UART: [art] SIG.S = FFA7569216388921F35FBC39842DC48E7BD609EE7D6A1B9EA8663EA94BC9630679B0DA20774EED1D27CA4D97DCE8BCD2
3,717,100 UART: Caliptra RT
3,717,353 UART: [state] CFI Enabled
3,824,201 UART: [rt] RT listening for mailbox commands...
3,824,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,969 UART: [rt]cmd =0x41544d4e, len=14344
4,228,612 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 ready_for_fw is high
1,060,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,158,950 >>> mbox cmd response: success
3,220,345 UART:
3,220,361 UART: Running Caliptra FMC ...
3,220,769 UART:
3,220,823 UART: [state] CFI Enabled
3,231,197 UART: [fht] FMC Alias Private Key: 7
3,338,871 UART: [art] Extend RT PCRs Done
3,339,299 UART: [art] Lock RT PCRs Done
3,340,569 UART: [art] Populate DV Done
3,348,857 UART: [fht] FMC Alias Private Key: 7
3,349,815 UART: [art] Derive CDI
3,350,095 UART: [art] Store in in slot 0x4
3,435,948 UART: [art] Derive Key Pair
3,436,308 UART: [art] Store priv key in slot 0x5
3,450,004 UART: [art] Derive Key Pair - Done
3,464,878 UART: [art] Signing Cert with AUTHO
3,465,358 UART: RITY.KEYID = 7
3,480,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,343 UART: [art] PUB.X = 4B6BF4BD3A8CD9B7231F8CBF9DB3EB97DE65EBFE533A8CEBCC25FA19CD2B9EFF8CC11A55B1E08DC5C19149FE955F7377
3,488,147 UART: [art] PUB.Y = 2976D4899DA5BE0B9961F79D1CD1071D60B5DDC2B45555153601BAED6EEAE902E82F5AD03FE57EA6A0B10763271923F1
3,495,090 UART: [art] SIG.R = 49EB2C8454EEDCEF948BC5A01D87AB81A7E7EDF3F76DB5F8DFC03EA677798FAF9051349917528BC2B96DD63C03BB271D
3,501,877 UART: [art] SIG.S = 9344C3E14EE1BFD8327B7A0D59E61A8C79A06264BDA2EA628919966404E4AA1D9ECFDCA9F1DC8B7C8D9CAA95CDC61DA2
3,526,100 UART: Caliptra RT
3,526,353 UART: [state] CFI Enabled
3,634,359 UART: [rt] RT listening for mailbox commands...
3,635,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,973 UART: [rt]cmd =0x41544d4e, len=14344
4,041,545 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,418 UART: [fht] FHT @ 0x50003400
1,175,099 UART: [idev] ++
1,175,267 UART: [idev] CDI.KEYID = 6
1,175,627 UART: [idev] SUBJECT.KEYID = 7
1,176,051 UART: [idev] UDS.KEYID = 0
1,176,396 ready_for_fw is high
1,176,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,855 UART: [idev] Erasing UDS.KEYID = 0
1,201,090 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,430 UART: [ldev] ++
1,210,598 UART: [ldev] CDI.KEYID = 6
1,210,961 UART: [ldev] SUBJECT.KEYID = 5
1,211,387 UART: [ldev] AUTHORITY.KEYID = 7
1,211,850 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,982 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,283,213 UART: [fwproc] Recv command 0x46574c44
1,283,941 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,333 >>> mbox cmd response: success
3,320,553 UART: [afmc] ++
3,320,721 UART: [afmc] CDI.KEYID = 6
3,321,083 UART: [afmc] SUBJECT.KEYID = 7
3,321,508 UART: [afmc] AUTHORITY.KEYID = 5
3,356,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,463 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,172 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,064 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,775 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,620 UART: [afmc] --
3,399,562 UART: [cold-reset] --
3,400,396 UART: [state] Locking Datavault
3,401,917 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,521 UART: [state] Locking ICCM
3,402,987 UART: [exit] Launching FMC @ 0x40000130
3,408,316 UART:
3,408,332 UART: Running Caliptra FMC ...
3,408,740 UART:
3,408,883 UART: [state] CFI Enabled
3,419,801 UART: [fht] FMC Alias Private Key: 7
3,528,167 UART: [art] Extend RT PCRs Done
3,528,595 UART: [art] Lock RT PCRs Done
3,530,119 UART: [art] Populate DV Done
3,538,357 UART: [fht] FMC Alias Private Key: 7
3,539,469 UART: [art] Derive CDI
3,539,749 UART: [art] Store in in slot 0x4
3,625,206 UART: [art] Derive Key Pair
3,625,566 UART: [art] Store priv key in slot 0x5
3,638,700 UART: [art] Derive Key Pair - Done
3,653,751 UART: [art] Signing Cert with AUTHO
3,654,231 UART: RITY.KEYID = 7
3,669,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,230 UART: [art] PUB.X = 7E33B05D75401AFA4B55DE8146257721B854D6355163FEE8E7B279DD9C83332BB8969ACC4A20CBA2AB200F4C9DFDA563
3,677,007 UART: [art] PUB.Y = BDC7ADF46FC48976FD19E808DDFE39180707DAB80D23DC2987EBB9746854F2542AFA9944E1272B6FD6599E971953B772
3,683,951 UART: [art] SIG.R = FC83A79169D645F30B02587B975A9028FCEC13AF3DA78BACC748798A0609A530D03A53DD4D15151D85CBBF22B9DCC4BB
3,690,723 UART: [art] SIG.S = 6C4483366C2D7F951DB8C9F9D88E39D8556E532F67D76BAE0D41930A359AFB90B44838F2BD7AA5AEF3C8E75E96997A28
3,714,416 UART: Caliptra RT
3,714,761 UART: [state] CFI Enabled
3,823,369 UART: [rt] RT listening for mailbox commands...
3,824,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,087 UART: [rt]cmd =0x41544d4e, len=14344
4,232,688 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,650 ready_for_fw is high
1,060,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,547 >>> mbox cmd response: success
3,227,558 UART:
3,227,574 UART: Running Caliptra FMC ...
3,227,982 UART:
3,228,125 UART: [state] CFI Enabled
3,239,101 UART: [fht] FMC Alias Private Key: 7
3,346,791 UART: [art] Extend RT PCRs Done
3,347,219 UART: [art] Lock RT PCRs Done
3,348,367 UART: [art] Populate DV Done
3,356,719 UART: [fht] FMC Alias Private Key: 7
3,357,685 UART: [art] Derive CDI
3,357,965 UART: [art] Store in in slot 0x4
3,443,714 UART: [art] Derive Key Pair
3,444,074 UART: [art] Store priv key in slot 0x5
3,457,494 UART: [art] Derive Key Pair - Done
3,472,180 UART: [art] Signing Cert with AUTHO
3,472,660 UART: RITY.KEYID = 7
3,488,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,861 UART: [art] PUB.X = 415FD7B37DAED62D41DB6C6C01B52A58626381F80F4B5B88636F504BD8F22FD2AC439D3B577D27DE82E9F93D737FC165
3,495,635 UART: [art] PUB.Y = 475BDD14A5DF7788AC9A8E9BFFDD483AED67321189EBDBCAF6F019F3E4B9C942B9912943CC1B0CB754CF0DDE64B5864B
3,502,603 UART: [art] SIG.R = 3B4E49D50863CF59EA9DD26C260A3818B94C74F63C7F71CFCD3191F56413B2B9524F780A556A64D33363E0305105587A
3,509,357 UART: [art] SIG.S = 4510FBCCBC487F818A21DEDFDF813C77CD241809739123184A7E855270C7F50F883A844B9420B8F29FD21D4E4C47CB5D
3,532,994 UART: Caliptra RT
3,533,339 UART: [state] CFI Enabled
3,641,726 UART: [rt] RT listening for mailbox commands...
3,642,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,454 UART: [rt]cmd =0x41544d4e, len=14344
4,053,424 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,174,789 ready_for_fw is high
1,174,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,645 UART: [idev] Sha1 KeyId Algorithm
1,208,555 UART: [idev] --
1,209,460 UART: [ldev] ++
1,209,628 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,419 UART: [ldev] AUTHORITY.KEYID = 7
1,210,882 UART: [ldev] FE.KEYID = 1
1,216,100 UART: [ldev] Erasing FE.KEYID = 1
1,243,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,016 UART: [ldev] --
1,282,472 UART: [fwproc] Wait for Commands...
1,283,277 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,951 >>> mbox cmd response: success
3,322,118 UART: [afmc] ++
3,322,286 UART: [afmc] CDI.KEYID = 6
3,322,649 UART: [afmc] SUBJECT.KEYID = 7
3,323,075 UART: [afmc] AUTHORITY.KEYID = 5
3,358,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,862 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,572 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,462 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,173 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,907 UART: [afmc] --
3,401,977 UART: [cold-reset] --
3,402,849 UART: [state] Locking Datavault
3,403,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,468 UART: [state] Locking ICCM
3,405,108 UART: [exit] Launching FMC @ 0x40000130
3,410,437 UART:
3,410,453 UART: Running Caliptra FMC ...
3,410,861 UART:
3,410,915 UART: [state] CFI Enabled
3,421,209 UART: [fht] FMC Alias Private Key: 7
3,529,647 UART: [art] Extend RT PCRs Done
3,530,075 UART: [art] Lock RT PCRs Done
3,531,813 UART: [art] Populate DV Done
3,539,955 UART: [fht] FMC Alias Private Key: 7
3,540,949 UART: [art] Derive CDI
3,541,229 UART: [art] Store in in slot 0x4
3,626,348 UART: [art] Derive Key Pair
3,626,708 UART: [art] Store priv key in slot 0x5
3,639,712 UART: [art] Derive Key Pair - Done
3,654,439 UART: [art] Signing Cert with AUTHO
3,654,919 UART: RITY.KEYID = 7
3,670,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,190 UART: [art] PUB.X = ED745E5EB7A9E596C3A34D27D8903771EE1DDF18533CF002AC4F3E4C3DFE26F6436655A0902BC27BAEDDB25B149DC28C
3,677,975 UART: [art] PUB.Y = 086A030E7AB2D5DA1FBC6B92B9FAFC8E2C350A1FD3F5C510DAED7BFE943B80FEEC348583D471006FE39F8B609505C933
3,684,908 UART: [art] SIG.R = B7A546407E488BEA788DDCBA9A6E85272AF862293F597F115F8F0B2C466B9798948BB53383AE65F9DB26582DFC176C08
3,691,676 UART: [art] SIG.S = E589A51D7D4DCE2202AFACB6485F15FF535C91E5C043CD5747DD7B82E3610FE44A12F06340FCF7A2999F4DC6D64FC2A3
3,715,333 UART: Caliptra RT
3,715,586 UART: [state] CFI Enabled
3,823,633 UART: [rt] RT listening for mailbox commands...
3,824,303 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,391 UART: [rt]cmd =0x41544d4e, len=14344
4,233,280 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,422 ready_for_fw is high
1,055,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,565 >>> mbox cmd response: success
3,234,786 UART:
3,234,802 UART: Running Caliptra FMC ...
3,235,210 UART:
3,235,264 UART: [state] CFI Enabled
3,245,814 UART: [fht] FMC Alias Private Key: 7
3,353,662 UART: [art] Extend RT PCRs Done
3,354,090 UART: [art] Lock RT PCRs Done
3,355,752 UART: [art] Populate DV Done
3,364,080 UART: [fht] FMC Alias Private Key: 7
3,365,186 UART: [art] Derive CDI
3,365,466 UART: [art] Store in in slot 0x4
3,451,065 UART: [art] Derive Key Pair
3,451,425 UART: [art] Store priv key in slot 0x5
3,464,837 UART: [art] Derive Key Pair - Done
3,479,759 UART: [art] Signing Cert with AUTHO
3,480,239 UART: RITY.KEYID = 7
3,495,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,518 UART: [art] PUB.X = 9FB4DA4276F65E23D58745E46C8B7700C5A42D9BD9A448FB258AFF20036FAC0CFE9C973B6D96D00D6117ED0538970D06
3,503,256 UART: [art] PUB.Y = D24B8D86743C9291B0BD1B5EE89F401772DCFDAAFCAB7BDB9F9BF06512691C7D244CAF705DD37A7044B0C5AA5A15AA1C
3,510,230 UART: [art] SIG.R = FF3D7E8BBA8B03FAED328F001950343313A042963714D8660449DCF2A83205CD8BB55DB0CEEE4349C637AD8D3D4234C7
3,516,977 UART: [art] SIG.S = 2E599A24680E478281979A5598B9E518A8BAE126F10D0BC0511785E0CCA91B7EC33D66964FE9A6ABD1F6281BDA52CA1E
3,540,963 UART: Caliptra RT
3,541,216 UART: [state] CFI Enabled
3,650,016 UART: [rt] RT listening for mailbox commands...
3,650,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,578 UART: [rt]cmd =0x41544d4e, len=14344
4,054,361 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 ready_for_fw is high
1,174,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,193 UART: [ldev] ++
1,209,361 UART: [ldev] CDI.KEYID = 6
1,209,725 UART: [ldev] SUBJECT.KEYID = 5
1,210,152 UART: [ldev] AUTHORITY.KEYID = 7
1,210,615 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 114448 bytes
3,135,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,328,807 >>> mbox cmd response: success
3,329,832 UART: [afmc] ++
3,330,000 UART: [afmc] CDI.KEYID = 6
3,330,363 UART: [afmc] SUBJECT.KEYID = 7
3,330,789 UART: [afmc] AUTHORITY.KEYID = 5
3,366,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,686 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,389,396 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,395,286 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,997 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,795 UART: [afmc] --
3,409,707 UART: [cold-reset] --
3,410,543 UART: [state] Locking Datavault
3,411,844 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,448 UART: [state] Locking ICCM
3,412,926 UART: [exit] Launching FMC @ 0x40000130
3,418,255 UART:
3,418,271 UART: Running Caliptra FMC ...
3,418,679 UART:
3,418,822 UART: [state] CFI Enabled
3,429,396 UART: [fht] FMC Alias Private Key: 7
3,537,494 UART: [art] Extend RT PCRs Done
3,537,922 UART: [art] Lock RT PCRs Done
3,539,512 UART: [art] Populate DV Done
3,547,924 UART: [fht] FMC Alias Private Key: 7
3,549,094 UART: [art] Derive CDI
3,549,374 UART: [art] Store in in slot 0x4
3,635,231 UART: [art] Derive Key Pair
3,635,591 UART: [art] Store priv key in slot 0x5
3,649,255 UART: [art] Derive Key Pair - Done
3,664,076 UART: [art] Signing Cert with AUTHO
3,664,556 UART: RITY.KEYID = 7
3,679,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,603 UART: [art] PUB.X = 47ED76EADCF0D0748FAB869675BC807A88DABB91303B21924B3B2C3B9CA6BBE55FEA5BCC0CBE9A9856DF965F8763DF5F
3,687,396 UART: [art] PUB.Y = 55BED7A8F509CCE578D109E169666E911ED7D79B002D6C5D40796770F4387AD5C9997170A63F738FF3755AC9DA7B0C07
3,694,314 UART: [art] SIG.R = 770D2A79D140FFA80A58B100F651BB21CA0F7B6C12686F3B2ABF478DE0CA5D98591E30C54AAF620C69D03148447979DB
3,701,058 UART: [art] SIG.S = 0BEBF9E8CA3C4C2C1FD4A3618A29CEEEE8CB5C2F65B7AC3429BABE4BB39AA47FAB810C4B0D4AED32A1CAA8A043267F56
3,724,944 UART: Caliptra RT
3,725,289 UART: [state] CFI Enabled
3,833,164 UART: [rt] RT listening for mailbox commands...
3,833,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,768 UART: [rt]cmd =0x41544d4e, len=14344
4,235,038 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,629 ready_for_fw is high
1,056,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,171,331 >>> mbox cmd response: success
3,233,856 UART:
3,233,872 UART: Running Caliptra FMC ...
3,234,280 UART:
3,234,423 UART: [state] CFI Enabled
3,244,653 UART: [fht] FMC Alias Private Key: 7
3,352,655 UART: [art] Extend RT PCRs Done
3,353,083 UART: [art] Lock RT PCRs Done
3,354,821 UART: [art] Populate DV Done
3,363,213 UART: [fht] FMC Alias Private Key: 7
3,364,351 UART: [art] Derive CDI
3,364,631 UART: [art] Store in in slot 0x4
3,450,386 UART: [art] Derive Key Pair
3,450,746 UART: [art] Store priv key in slot 0x5
3,463,796 UART: [art] Derive Key Pair - Done
3,478,579 UART: [art] Signing Cert with AUTHO
3,479,059 UART: RITY.KEYID = 7
3,494,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,202 UART: [art] PUB.X = 59A607F0143F948786241BD439330D975585BE131BABCC815C531153728888DA8029337157EB82EDB09082F97605AF88
3,501,949 UART: [art] PUB.Y = 66F5AC20D7C08201E72B9701D07A6F0F3FC1007B52294BBB0FE5A37CC398C6849F772ECAF18AC3B0C7CAFF40FF4C4718
3,508,881 UART: [art] SIG.R = CA0A30B41BB04453BE9FFA2761CBA9772D935B5DEEC70B138CD10F6212195B49C6EBBE060AEF3392DA9ABB0037E5010A
3,515,626 UART: [art] SIG.S = BD47D5AA21CB5BE1F5929697001F372181682CA61D34708B7BB02E588054BA0582C94C102A534D890C2D08952806069E
3,539,534 UART: Caliptra RT
3,539,879 UART: [state] CFI Enabled
3,646,672 UART: [rt] RT listening for mailbox commands...
3,647,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,336 UART: [rt]cmd =0x41544d4e, len=14344
4,063,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,130 UART:
192,491 UART: Running Caliptra ROM ...
193,686 UART:
193,846 UART: [state] CFI Enabled
261,907 UART: [state] LifecycleState = Unprovisioned
263,818 UART: [state] DebugLocked = No
266,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,056 UART: [kat] SHA2-256
440,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,282 UART: [kat] ++
451,763 UART: [kat] sha1
462,748 UART: [kat] SHA2-256
465,471 UART: [kat] SHA2-384
472,428 UART: [kat] SHA2-512-ACC
474,742 UART: [kat] ECC-384
2,768,379 UART: [kat] HMAC-384Kdf
2,800,436 UART: [kat] LMS
3,990,791 UART: [kat] --
3,995,083 UART: [cold-reset] ++
3,996,238 UART: [fht] Storing FHT @ 0x50003400
4,008,148 UART: [idev] ++
4,008,785 UART: [idev] CDI.KEYID = 6
4,009,679 UART: [idev] SUBJECT.KEYID = 7
4,010,921 UART: [idev] UDS.KEYID = 0
4,011,940 ready_for_fw is high
4,012,140 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,753 UART: [idev] Erasing UDS.KEYID = 0
7,343,947 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,457 UART: [idev] --
7,372,126 UART: [ldev] ++
7,372,702 UART: [ldev] CDI.KEYID = 6
7,373,738 UART: [ldev] SUBJECT.KEYID = 5
7,374,903 UART: [ldev] AUTHORITY.KEYID = 7
7,376,136 UART: [ldev] FE.KEYID = 1
7,423,080 UART: [ldev] Erasing FE.KEYID = 1
10,754,694 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,276 UART: [ldev] --
13,137,350 UART: [fwproc] Waiting for Commands...
13,139,606 UART: [fwproc] Received command 0x46574c44
13,141,787 UART: [fwproc] Received Image of size 114124 bytes
22,011,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,089,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,158,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,475,838 >>> mbox cmd response: success
22,479,657 UART: [afmc] ++
22,480,260 UART: [afmc] CDI.KEYID = 6
22,481,151 UART: [afmc] SUBJECT.KEYID = 7
22,482,421 UART: [afmc] AUTHORITY.KEYID = 5
25,849,389 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,145,664 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,147,933 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,162,494 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,177,195 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,191,448 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,213,261 UART: [afmc] --
28,216,757 UART: [cold-reset] --
28,221,869 UART: [state] Locking Datavault
28,225,010 UART: [state] Locking PCR0, PCR1 and PCR31
28,226,711 UART: [state] Locking ICCM
28,229,476 UART: [exit] Launching FMC @ 0x40000130
28,237,874 UART:
28,238,119 UART: Running Caliptra FMC ...
28,239,232 UART:
28,239,392 UART: [state] CFI Enabled
28,305,903 UART: [fht] FMC Alias Private Key: 7
30,644,102 UART: [art] Extend RT PCRs Done
30,645,325 UART: [art] Lock RT PCRs Done
30,647,084 UART: [art] Populate DV Done
30,652,346 UART: [fht] FMC Alias Private Key: 7
30,653,939 UART: [art] Derive CDI
30,654,757 UART: [art] Store in in slot 0x4
30,715,373 UART: [art] Derive Key Pair
30,716,412 UART: [art] Store priv key in slot 0x5
34,009,325 UART: [art] Derive Key Pair - Done
34,022,408 UART: [art] Signing Cert with AUTHO
34,023,738 UART: RITY.KEYID = 7
36,310,331 UART: [art] Erasing AUTHORITY.KEYID = 7
36,311,848 UART: [art] PUB.X = 32E6F39765CE53E63F7CCFEB058A6296F142EDAAF7F12CFEA2261E24CE6D2AE63974079938F3A7471C3BB8870F5DBB6F
36,319,122 UART: [art] PUB.Y = FF8C6267A72CB8DD95ACE501C81421707F6D1CB0A57E9399DCEC287E32BD53622B028A251CED0C1205564231FEF300C7
36,326,367 UART: [art] SIG.R = BF55B5A3C42BE2A6D2FE9BE95F4931B295B1BA96D3AE5FFF9C6C22B83FEF19076021D4F242B11BF7E8F411F2E5C2D5E2
36,333,770 UART: [art] SIG.S = C30DECF21946418AFC3F5C8AB8C859FACD0D821231A18FC107B08AC4CC4E5AF83D7FF2A62CC4A4520F44FE1DCBE19DF9
37,638,996 UART: Caliptra RT
37,639,716 UART: [state] CFI Enabled
37,799,686 UART: [rt] RT listening for mailbox commands...
37,802,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,957,394 UART: [rt]cmd =0x41544d4e, len=14344
41,381,772 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,803,581 ready_for_fw is high
3,803,981 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,826,362 >>> mbox cmd response: success
27,512,036 UART:
27,512,412 UART: Running Caliptra FMC ...
27,513,606 UART:
27,513,936 UART: [state] CFI Enabled
27,563,636 UART: [fht] FMC Alias Private Key: 7
29,901,990 UART: [art] Extend RT PCRs Done
29,903,218 UART: [art] Lock RT PCRs Done
29,905,072 UART: [art] Populate DV Done
29,910,278 UART: [fht] FMC Alias Private Key: 7
29,911,992 UART: [art] Derive CDI
29,912,832 UART: [art] Store in in slot 0x4
29,972,478 UART: [art] Derive Key Pair
29,973,494 UART: [art] Store priv key in slot 0x5
33,266,859 UART: [art] Derive Key Pair - Done
33,279,835 UART: [art] Signing Cert with AUTHO
33,281,163 UART: RITY.KEYID = 7
35,568,817 UART: [art] Erasing AUTHORITY.KEYID = 7
35,570,324 UART: [art] PUB.X = 0AC5EA5E2CDD6AE1E53036FBAD8C27D118CF1A01FD50795EC16C3554E7E4F74E73307BB6A3A1F8A83942760806CE75DA
35,577,636 UART: [art] PUB.Y = 573FAC2143A109BDC0C97FA59DE55760CA781A8267CECBA4FDD5470A0E1288CB81E72E48DD1BD968E9CB005FF0C41AC0
35,584,839 UART: [art] SIG.R = 208D3BA8775A0D5214026D67DCF5D5043411EAAFB52EF656E651B888EE509EDBBD47169DE45D9530ADF668CEE1284D50
35,592,290 UART: [art] SIG.S = 84866D35086994D5811B4B1A90C434583ECC4177F4BBC78BA27E20DABF5E3476AE1571423344FC40185E5ECAFDAD45BB
36,897,529 UART: Caliptra RT
36,898,242 UART: [state] CFI Enabled
37,059,563 UART: [rt] RT listening for mailbox commands...
37,061,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,217,064 UART: [rt]cmd =0x41544d4e, len=14344
40,563,526 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,544 UART:
192,902 UART: Running Caliptra ROM ...
194,085 UART:
603,786 UART: [state] CFI Enabled
620,174 UART: [state] LifecycleState = Unprovisioned
622,058 UART: [state] DebugLocked = No
624,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,754 UART: [kat] SHA2-256
799,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,076 UART: [kat] ++
810,566 UART: [kat] sha1
821,295 UART: [kat] SHA2-256
824,008 UART: [kat] SHA2-384
831,129 UART: [kat] SHA2-512-ACC
833,501 UART: [kat] ECC-384
3,116,215 UART: [kat] HMAC-384Kdf
3,128,446 UART: [kat] LMS
4,318,578 UART: [kat] --
4,321,803 UART: [cold-reset] ++
4,323,446 UART: [fht] Storing FHT @ 0x50003400
4,336,125 UART: [idev] ++
4,336,689 UART: [idev] CDI.KEYID = 6
4,337,665 UART: [idev] SUBJECT.KEYID = 7
4,338,922 UART: [idev] UDS.KEYID = 0
4,339,995 ready_for_fw is high
4,340,185 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,847 UART: [idev] Erasing UDS.KEYID = 0
7,623,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,370 UART: [idev] --
7,647,986 UART: [ldev] ++
7,648,551 UART: [ldev] CDI.KEYID = 6
7,649,486 UART: [ldev] SUBJECT.KEYID = 5
7,650,691 UART: [ldev] AUTHORITY.KEYID = 7
7,651,971 UART: [ldev] FE.KEYID = 1
7,666,269 UART: [ldev] Erasing FE.KEYID = 1
10,954,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,023 UART: [ldev] --
13,316,130 UART: [fwproc] Waiting for Commands...
13,319,030 UART: [fwproc] Received command 0x46574c44
13,321,212 UART: [fwproc] Received Image of size 114124 bytes
22,276,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,354,955 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,423,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,740,498 >>> mbox cmd response: success
22,745,295 UART: [afmc] ++
22,745,890 UART: [afmc] CDI.KEYID = 6
22,746,852 UART: [afmc] SUBJECT.KEYID = 7
22,748,065 UART: [afmc] AUTHORITY.KEYID = 5
26,062,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,354,564 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,356,836 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,371,462 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,386,168 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,400,387 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,422,325 UART: [afmc] --
28,426,729 UART: [cold-reset] --
28,431,567 UART: [state] Locking Datavault
28,437,405 UART: [state] Locking PCR0, PCR1 and PCR31
28,439,157 UART: [state] Locking ICCM
28,440,274 UART: [exit] Launching FMC @ 0x40000130
28,448,669 UART:
28,448,913 UART: Running Caliptra FMC ...
28,450,007 UART:
28,450,169 UART: [state] CFI Enabled
28,458,266 UART: [fht] FMC Alias Private Key: 7
30,788,696 UART: [art] Extend RT PCRs Done
30,789,911 UART: [art] Lock RT PCRs Done
30,791,636 UART: [art] Populate DV Done
30,797,269 UART: [fht] FMC Alias Private Key: 7
30,798,918 UART: [art] Derive CDI
30,799,646 UART: [art] Store in in slot 0x4
30,842,230 UART: [art] Derive Key Pair
30,843,222 UART: [art] Store priv key in slot 0x5
34,085,175 UART: [art] Derive Key Pair - Done
34,098,175 UART: [art] Signing Cert with AUTHO
34,099,487 UART: RITY.KEYID = 7
36,378,692 UART: [art] Erasing AUTHORITY.KEYID = 7
36,380,199 UART: [art] PUB.X = 0E1C0F74B114C340A1DE300E2A4E29A12C5E9CCEB0BE1147E6913EA217D6FCE6DCB377D48A36C966F5504427668B12EF
36,387,492 UART: [art] PUB.Y = 9A8C5A042C235ECD2785888C35D4EB38D3A17BC061FBF3985FE8C4A50833973835B179486215C763EC02C873365C6A45
36,394,658 UART: [art] SIG.R = 72FC6AE9FF8BA198F6084FBE0C2D19F4C3FF4D569AA63F558139609254E4DB281FDEFF572AC6CF9C6E31FA2D87EA5DFF
36,402,102 UART: [art] SIG.S = 0A023A663A574BCF47E167C9984613F609918CF26587B0439CC4FD33D7DF76B55A016D09427B853740786F623A40A453
37,707,190 UART: Caliptra RT
37,707,889 UART: [state] CFI Enabled
37,825,844 UART: [rt] RT listening for mailbox commands...
37,828,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,983,469 UART: [rt]cmd =0x41544d4e, len=14344
41,485,902 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,131,224 ready_for_fw is high
4,131,999 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,977,492 >>> mbox cmd response: success
27,620,117 UART:
27,620,532 UART: Running Caliptra FMC ...
27,621,674 UART:
27,621,832 UART: [state] CFI Enabled
27,629,707 UART: [fht] FMC Alias Private Key: 7
29,960,466 UART: [art] Extend RT PCRs Done
29,961,823 UART: [art] Lock RT PCRs Done
29,963,121 UART: [art] Populate DV Done
29,968,311 UART: [fht] FMC Alias Private Key: 7
29,969,850 UART: [art] Derive CDI
29,970,607 UART: [art] Store in in slot 0x4
30,013,250 UART: [art] Derive Key Pair
30,014,258 UART: [art] Store priv key in slot 0x5
33,256,653 UART: [art] Derive Key Pair - Done
33,269,549 UART: [art] Signing Cert with AUTHO
33,270,856 UART: RITY.KEYID = 7
35,550,526 UART: [art] Erasing AUTHORITY.KEYID = 7
35,552,050 UART: [art] PUB.X = C60E07D22ABEF1BA0668B8A7C61CF995D43EF250E0CA80F94CB1F1D9DABE63B4E6B44706FBF82B7F7F0E4C5A5F253B97
35,559,345 UART: [art] PUB.Y = D1448DD76FA51232C454912456691311B2B110B23DBC130A6F957F1D669F66EA0FC643968E0375D7B96DA544815A7946
35,566,574 UART: [art] SIG.R = 64C1D4521F823921267E99798F78DC2383CDEE389B52A19575C2572D5CF8449F478749CCA65EBA0C38E0154E1C0B3503
35,573,909 UART: [art] SIG.S = EDF309E056880801B3B19A1418F3CE46DC35AA9AA5738CF004B6025727FF5A68BB789F22677F4A977701875F8C758A3D
36,879,403 UART: Caliptra RT
36,880,116 UART: [state] CFI Enabled
36,998,745 UART: [rt] RT listening for mailbox commands...
37,001,083 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,156,546 UART: [rt]cmd =0x41544d4e, len=14344
40,580,933 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,215 UART:
192,564 UART: Running Caliptra ROM ...
193,783 UART:
193,937 UART: [state] CFI Enabled
262,470 UART: [state] LifecycleState = Unprovisioned
264,395 UART: [state] DebugLocked = No
266,076 UART: [state] WD Timer not started. Device not locked for debugging
268,995 UART: [kat] SHA2-256
448,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,705 UART: [kat] ++
460,231 UART: [kat] sha1
470,919 UART: [kat] SHA2-256
473,910 UART: [kat] SHA2-384
479,266 UART: [kat] SHA2-512-ACC
482,273 UART: [kat] ECC-384
2,926,490 UART: [kat] HMAC-384Kdf
2,948,996 UART: [kat] LMS
3,478,443 UART: [kat] --
3,482,308 UART: [cold-reset] ++
3,483,671 UART: [fht] FHT @ 0x50003400
3,494,506 UART: [idev] ++
3,495,068 UART: [idev] CDI.KEYID = 6
3,496,136 UART: [idev] SUBJECT.KEYID = 7
3,497,261 UART: [idev] UDS.KEYID = 0
3,498,203 ready_for_fw is high
3,498,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,642,549 UART: [idev] Erasing UDS.KEYID = 0
6,003,436 UART: [idev] Sha1 KeyId Algorithm
6,026,667 UART: [idev] --
6,031,092 UART: [ldev] ++
6,031,665 UART: [ldev] CDI.KEYID = 6
6,032,551 UART: [ldev] SUBJECT.KEYID = 5
6,033,766 UART: [ldev] AUTHORITY.KEYID = 7
6,035,053 UART: [ldev] FE.KEYID = 1
6,076,147 UART: [ldev] Erasing FE.KEYID = 1
8,581,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,158 UART: [ldev] --
10,389,433 UART: [fwproc] Wait for Commands...
10,392,222 UART: [fwproc] Recv command 0x46574c44
10,394,381 UART: [fwproc] Recv'd Img size: 114448 bytes
14,957,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,033,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,102,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,420,419 >>> mbox cmd response: success
15,425,415 UART: [afmc] ++
15,426,041 UART: [afmc] CDI.KEYID = 6
15,427,128 UART: [afmc] SUBJECT.KEYID = 7
15,428,235 UART: [afmc] AUTHORITY.KEYID = 5
17,955,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,852 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,699,794 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,715,769 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,731,518 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,753,036 UART: [afmc] --
19,755,987 UART: [cold-reset] --
19,760,872 UART: [state] Locking Datavault
19,766,658 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,306 UART: [state] Locking ICCM
19,769,606 UART: [exit] Launching FMC @ 0x40000130
19,778,058 UART:
19,778,295 UART: Running Caliptra FMC ...
19,779,395 UART:
19,779,558 UART: [state] CFI Enabled
19,839,483 UART: [fht] FMC Alias Private Key: 7
21,603,683 UART: [art] Extend RT PCRs Done
21,604,879 UART: [art] Lock RT PCRs Done
21,606,680 UART: [art] Populate DV Done
21,612,144 UART: [fht] FMC Alias Private Key: 7
21,613,794 UART: [art] Derive CDI
21,614,611 UART: [art] Store in in slot 0x4
21,672,296 UART: [art] Derive Key Pair
21,673,326 UART: [art] Store priv key in slot 0x5
24,136,546 UART: [art] Derive Key Pair - Done
24,149,371 UART: [art] Signing Cert with AUTHO
24,150,709 UART: RITY.KEYID = 7
25,861,166 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,679 UART: [art] PUB.X = EB2561FFF796128DA7553DA2D74C5DF3889011D5CFF3C85670DD1AC7D5E031416C683035DCF94D0E5AA48E8B5C2C3390
25,869,978 UART: [art] PUB.Y = 404F6CB5A4B3ED75C0DFF3CE17F9D52A7287DD1DC3CA8938B600022D9DB1A1647D339E4F97043256466D6A0F8F05EE38
25,877,201 UART: [art] SIG.R = B63E0170AD452C5DACFAD4BF96A9EE9C578B5A188642646F4A517C02219F7ACDFF8512223E77C503BDC85BF37030EFF1
25,884,641 UART: [art] SIG.S = F792D6FE8DAA76D72B2B0B986B0CF0F4A232BBDF4217CF2361922BF507BBEC511688BA82AF0182E44704191B4A7CA4C8
26,863,537 UART: Caliptra RT
26,864,251 UART: [state] CFI Enabled
27,030,086 UART: [rt] RT listening for mailbox commands...
27,032,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,188,280 UART: [rt]cmd =0x41544d4e, len=14344
29,336,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,380,698 ready_for_fw is high
3,381,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,054,422 >>> mbox cmd response: success
19,346,455 UART:
19,346,843 UART: Running Caliptra FMC ...
19,347,950 UART:
19,348,104 UART: [state] CFI Enabled
19,412,384 UART: [fht] FMC Alias Private Key: 7
21,175,998 UART: [art] Extend RT PCRs Done
21,177,218 UART: [art] Lock RT PCRs Done
21,178,871 UART: [art] Populate DV Done
21,184,206 UART: [fht] FMC Alias Private Key: 7
21,185,697 UART: [art] Derive CDI
21,186,466 UART: [art] Store in in slot 0x4
21,245,153 UART: [art] Derive Key Pair
21,246,200 UART: [art] Store priv key in slot 0x5
23,709,831 UART: [art] Derive Key Pair - Done
23,722,930 UART: [art] Signing Cert with AUTHO
23,724,229 UART: RITY.KEYID = 7
25,435,571 UART: [art] Erasing AUTHORITY.KEYID = 7
25,437,062 UART: [art] PUB.X = B8E5D7DC1D2578DBA13E6F6ACC2129DDED4C3240E7B121062FA05282E4C12B3B510696391252DAD7831E9630E5494C9A
25,444,319 UART: [art] PUB.Y = DDF9198819A303BA94B7398BD77FEF6A6103BEDBA1B312D0EFAE7F83EBABE6B599D37AE8D08153132F3C604A682569BB
25,451,626 UART: [art] SIG.R = B403EE743CB43A244958F953F849C56D190572C8DCBA75F1A2871A6D5EAD472C2C93640A3C1F9F98117D322DF4C95CB1
25,458,975 UART: [art] SIG.S = 3400114993066E81348F19FBC17559C17CF192C08F23BB26F17F49706E60557D939A028D244F959E7CB1D3D18F63F205
26,437,650 UART: Caliptra RT
26,438,362 UART: [state] CFI Enabled
26,602,574 UART: [rt] RT listening for mailbox commands...
26,604,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,760,934 UART: [rt]cmd =0x41544d4e, len=14344
28,915,089 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,233 UART:
192,613 UART: Running Caliptra ROM ...
193,718 UART:
603,269 UART: [state] CFI Enabled
617,154 UART: [state] LifecycleState = Unprovisioned
619,014 UART: [state] DebugLocked = No
620,531 UART: [state] WD Timer not started. Device not locked for debugging
623,713 UART: [kat] SHA2-256
802,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,462 UART: [kat] ++
814,905 UART: [kat] sha1
826,075 UART: [kat] SHA2-256
829,075 UART: [kat] SHA2-384
835,555 UART: [kat] SHA2-512-ACC
838,479 UART: [kat] ECC-384
3,278,306 UART: [kat] HMAC-384Kdf
3,290,614 UART: [kat] LMS
3,820,083 UART: [kat] --
3,824,729 UART: [cold-reset] ++
3,826,298 UART: [fht] FHT @ 0x50003400
3,837,076 UART: [idev] ++
3,837,680 UART: [idev] CDI.KEYID = 6
3,838,589 UART: [idev] SUBJECT.KEYID = 7
3,839,757 UART: [idev] UDS.KEYID = 0
3,840,674 ready_for_fw is high
3,840,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,423 UART: [idev] Erasing UDS.KEYID = 0
6,312,958 UART: [idev] Sha1 KeyId Algorithm
6,336,424 UART: [idev] --
6,339,664 UART: [ldev] ++
6,340,228 UART: [ldev] CDI.KEYID = 6
6,341,124 UART: [ldev] SUBJECT.KEYID = 5
6,342,329 UART: [ldev] AUTHORITY.KEYID = 7
6,343,554 UART: [ldev] FE.KEYID = 1
6,353,865 UART: [ldev] Erasing FE.KEYID = 1
8,828,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,363 UART: [ldev] --
10,620,429 UART: [fwproc] Wait for Commands...
10,623,215 UART: [fwproc] Recv command 0x46574c44
10,625,322 UART: [fwproc] Recv'd Img size: 114448 bytes
15,185,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,266,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,334,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,653,216 >>> mbox cmd response: success
15,657,056 UART: [afmc] ++
15,657,647 UART: [afmc] CDI.KEYID = 6
15,658,524 UART: [afmc] SUBJECT.KEYID = 7
15,659,735 UART: [afmc] AUTHORITY.KEYID = 5
18,157,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,875,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,877,692 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,893,597 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,909,599 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,925,371 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,947,544 UART: [afmc] --
19,951,639 UART: [cold-reset] --
19,955,764 UART: [state] Locking Datavault
19,960,030 UART: [state] Locking PCR0, PCR1 and PCR31
19,961,725 UART: [state] Locking ICCM
19,962,762 UART: [exit] Launching FMC @ 0x40000130
19,971,203 UART:
19,971,430 UART: Running Caliptra FMC ...
19,972,520 UART:
19,972,670 UART: [state] CFI Enabled
19,980,760 UART: [fht] FMC Alias Private Key: 7
21,737,333 UART: [art] Extend RT PCRs Done
21,738,553 UART: [art] Lock RT PCRs Done
21,740,194 UART: [art] Populate DV Done
21,745,762 UART: [fht] FMC Alias Private Key: 7
21,747,241 UART: [art] Derive CDI
21,747,968 UART: [art] Store in in slot 0x4
21,790,789 UART: [art] Derive Key Pair
21,791,827 UART: [art] Store priv key in slot 0x5
24,218,960 UART: [art] Derive Key Pair - Done
24,231,895 UART: [art] Signing Cert with AUTHO
24,233,186 UART: RITY.KEYID = 7
25,938,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,940,458 UART: [art] PUB.X = 54656F8FEDC879639B4364E70D1F87A4DABE946D5DF083D4BC43CAB875B847E7BD404A91F0D6925CD4B5F0245DE39519
25,947,738 UART: [art] PUB.Y = 7EC3B2B07FE0F3166474B545374C9C22D18D6C95A9E38472CA6E7E56E9F5C411D68D11D571A00C19F72BAF0CF2286B97
25,954,997 UART: [art] SIG.R = 7CB65CA750DEEF334E097331F078934488180E142A6DBB9493264E7E052A2A4720715ABE6B3273EDE995CA6F5A6541DA
25,962,367 UART: [art] SIG.S = 95A957D4A51E17A77353295D9E9AA19D42A001B0F328A56FD7E68F3983C6FF53735B488CC9E9D90A7EF2D2CF2735F8E6
26,941,020 UART: Caliptra RT
26,941,708 UART: [state] CFI Enabled
27,058,834 UART: [rt] RT listening for mailbox commands...
27,061,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,216,367 UART: [rt]cmd =0x41544d4e, len=14344
29,361,977 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,693,804 ready_for_fw is high
3,694,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,261,756 >>> mbox cmd response: success
19,508,598 UART:
19,508,981 UART: Running Caliptra FMC ...
19,510,109 UART:
19,510,263 UART: [state] CFI Enabled
19,518,069 UART: [fht] FMC Alias Private Key: 7
21,274,671 UART: [art] Extend RT PCRs Done
21,275,893 UART: [art] Lock RT PCRs Done
21,277,462 UART: [art] Populate DV Done
21,282,577 UART: [fht] FMC Alias Private Key: 7
21,284,220 UART: [art] Derive CDI
21,285,028 UART: [art] Store in in slot 0x4
21,328,282 UART: [art] Derive Key Pair
21,329,321 UART: [art] Store priv key in slot 0x5
23,755,765 UART: [art] Derive Key Pair - Done
23,768,707 UART: [art] Signing Cert with AUTHO
23,770,023 UART: RITY.KEYID = 7
25,475,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,476,635 UART: [art] PUB.X = 8A156A9BC142419099B03071B12F5F89BCF411AC464323D46D085164AE72AE0AA3B8E70055A73F33796E4B9FC516AC38
25,483,941 UART: [art] PUB.Y = 35C9AB09321ABF718362734D3397B7D26996EF9EF8EAE49309E25B897BEA74346AD250E87BB3AEFDD67B8D7B022061B8
25,491,166 UART: [art] SIG.R = 4849ABFF2B83BD790B97E500016BE6A384855DB762432990D7BA0F96FA2D782F1165836B05696E61567941181D04CD96
25,498,556 UART: [art] SIG.S = 28511E4D0A95811C68E876F9B090BE20B50AE3D74BF6BCD3F4004833F863645C9405B8C4A4EC35D14030B023E5FC28B1
26,477,639 UART: Caliptra RT
26,478,335 UART: [state] CFI Enabled
26,596,044 UART: [rt] RT listening for mailbox commands...
26,598,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,753,740 UART: [rt]cmd =0x41544d4e, len=14344
28,904,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,057 UART:
192,432 UART: Running Caliptra ROM ...
193,596 UART:
193,744 UART: [state] CFI Enabled
264,933 UART: [state] LifecycleState = Unprovisioned
267,317 UART: [state] DebugLocked = No
268,705 UART: [state] WD Timer not started. Device not locked for debugging
273,512 UART: [kat] SHA2-256
463,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,225 UART: [kat] ++
474,701 UART: [kat] sha1
487,279 UART: [kat] SHA2-256
490,288 UART: [kat] SHA2-384
497,202 UART: [kat] SHA2-512-ACC
499,777 UART: [kat] ECC-384
2,949,368 UART: [kat] HMAC-384Kdf
2,971,623 UART: [kat] LMS
3,503,363 UART: [kat] --
3,507,231 UART: [cold-reset] ++
3,508,733 UART: [fht] FHT @ 0x50003400
3,519,993 UART: [idev] ++
3,520,698 UART: [idev] CDI.KEYID = 6
3,521,729 UART: [idev] SUBJECT.KEYID = 7
3,522,829 UART: [idev] UDS.KEYID = 0
3,523,753 ready_for_fw is high
3,523,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,002 UART: [idev] Erasing UDS.KEYID = 0
6,027,337 UART: [idev] Sha1 KeyId Algorithm
6,048,612 UART: [idev] --
6,053,621 UART: [ldev] ++
6,054,309 UART: [ldev] CDI.KEYID = 6
6,055,375 UART: [ldev] SUBJECT.KEYID = 5
6,056,482 UART: [ldev] AUTHORITY.KEYID = 7
6,057,659 UART: [ldev] FE.KEYID = 1
6,100,140 UART: [ldev] Erasing FE.KEYID = 1
8,606,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,308 UART: [ldev] --
10,415,572 UART: [fwproc] Wait for Commands...
10,417,879 UART: [fwproc] Recv command 0x46574c44
10,420,128 UART: [fwproc] Recv'd Img size: 114448 bytes
15,043,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,124,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,240,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,783,162 >>> mbox cmd response: success
15,787,976 UART: [afmc] ++
15,788,678 UART: [afmc] CDI.KEYID = 6
15,789,891 UART: [afmc] SUBJECT.KEYID = 7
15,791,335 UART: [afmc] AUTHORITY.KEYID = 5
18,316,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,045,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,047,390 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,062,450 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,077,616 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,092,449 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,115,853 UART: [afmc] --
20,118,899 UART: [cold-reset] --
20,122,933 UART: [state] Locking Datavault
20,129,212 UART: [state] Locking PCR0, PCR1 and PCR31
20,131,404 UART: [state] Locking ICCM
20,133,690 UART: [exit] Launching FMC @ 0x40000130
20,142,363 UART:
20,142,596 UART: Running Caliptra FMC ...
20,143,641 UART:
20,143,794 UART: [state] CFI Enabled
20,201,830 UART: [fht] FMC Alias Private Key: 7
21,966,920 UART: [art] Extend RT PCRs Done
21,968,135 UART: [art] Lock RT PCRs Done
21,969,886 UART: [art] Populate DV Done
21,975,191 UART: [fht] FMC Alias Private Key: 7
21,976,725 UART: [art] Derive CDI
21,977,461 UART: [art] Store in in slot 0x4
22,035,038 UART: [art] Derive Key Pair
22,036,081 UART: [art] Store priv key in slot 0x5
24,498,984 UART: [art] Derive Key Pair - Done
24,512,080 UART: [art] Signing Cert with AUTHO
24,513,377 UART: RITY.KEYID = 7
26,225,606 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,108 UART: [art] PUB.X = C512FC1EC0ACB55FB2511F2E753EB3667EA188AB0FEDE01D21B947A87FC0CF023456B0E93F0FF23E0DED84195B8D669C
26,234,422 UART: [art] PUB.Y = 5350E070223D8690422E95BE994959047E04B550E0F2040EEDD12CAA4238F99D6A571800C2B441CC74D2FFCC6B0E7E0C
26,241,658 UART: [art] SIG.R = 8858C43CE2A448E7D49BD310515F3F5A488FD624C140CE0CA34610867B78DFC05E3E27219F6336743EF7E39B24015C20
26,249,043 UART: [art] SIG.S = 0CCDCDA2FD2997A873A1930F025B31878D2AABE39645BE6F77E11604902A52CE1B670816399611EE439B35F581A0ED34
27,227,868 UART: Caliptra RT
27,228,564 UART: [state] CFI Enabled
27,393,735 UART: [rt] RT listening for mailbox commands...
27,396,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,771 UART: [rt]cmd =0x41544d4e, len=14344
29,699,438 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,436,248 ready_for_fw is high
3,436,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,856,026 >>> mbox cmd response: success
20,134,534 UART:
20,134,929 UART: Running Caliptra FMC ...
20,136,130 UART:
20,136,297 UART: [state] CFI Enabled
20,203,854 UART: [fht] FMC Alias Private Key: 7
21,968,234 UART: [art] Extend RT PCRs Done
21,969,455 UART: [art] Lock RT PCRs Done
21,971,187 UART: [art] Populate DV Done
21,976,594 UART: [fht] FMC Alias Private Key: 7
21,978,185 UART: [art] Derive CDI
21,979,001 UART: [art] Store in in slot 0x4
22,036,173 UART: [art] Derive Key Pair
22,037,209 UART: [art] Store priv key in slot 0x5
24,499,949 UART: [art] Derive Key Pair - Done
24,512,784 UART: [art] Signing Cert with AUTHO
24,514,087 UART: RITY.KEYID = 7
26,226,435 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,956 UART: [art] PUB.X = C798C12836102BCFE3696352978884932E4438591F7035C2480079436FC9D69C15A6F423EB26C43247C967CDF7A633D1
26,235,141 UART: [art] PUB.Y = 27D0DBBDCAB111F547CFB7C3159DDD0BF3FBB12A26D5F30E54D03683E465D0FAA744C2509ED3A28EF038D2268D23E26D
26,242,404 UART: [art] SIG.R = 956418338C85DB6BB26979CCE642264EDA1883CB9F6C9A146C8260CC307F63A3CC35AF867E68DB77BD3197CD50C89E85
26,249,794 UART: [art] SIG.S = 66A48CE28285A00D92ADB450817EE36364F903080759AFEAA304E93D8CA6DBE92293AE94AD4C7D0F79119A4109D3767F
27,228,442 UART: Caliptra RT
27,229,149 UART: [state] CFI Enabled
27,395,787 UART: [rt] RT listening for mailbox commands...
27,398,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,844 UART: [rt]cmd =0x41544d4e, len=14344
29,705,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,409 UART:
192,776 UART: Running Caliptra ROM ...
193,867 UART:
603,510 UART: [state] CFI Enabled
615,772 UART: [state] LifecycleState = Unprovisioned
618,137 UART: [state] DebugLocked = No
619,792 UART: [state] WD Timer not started. Device not locked for debugging
624,526 UART: [kat] SHA2-256
814,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,215 UART: [kat] ++
825,658 UART: [kat] sha1
836,523 UART: [kat] SHA2-256
839,527 UART: [kat] SHA2-384
846,432 UART: [kat] SHA2-512-ACC
849,008 UART: [kat] ECC-384
3,291,113 UART: [kat] HMAC-384Kdf
3,304,981 UART: [kat] LMS
3,836,810 UART: [kat] --
3,843,087 UART: [cold-reset] ++
3,844,235 UART: [fht] FHT @ 0x50003400
3,856,405 UART: [idev] ++
3,857,085 UART: [idev] CDI.KEYID = 6
3,857,971 UART: [idev] SUBJECT.KEYID = 7
3,859,209 UART: [idev] UDS.KEYID = 0
3,860,105 ready_for_fw is high
3,860,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,890 UART: [idev] Erasing UDS.KEYID = 0
6,335,338 UART: [idev] Sha1 KeyId Algorithm
6,357,649 UART: [idev] --
6,361,858 UART: [ldev] ++
6,362,586 UART: [ldev] CDI.KEYID = 6
6,363,513 UART: [ldev] SUBJECT.KEYID = 5
6,364,667 UART: [ldev] AUTHORITY.KEYID = 7
6,365,889 UART: [ldev] FE.KEYID = 1
6,378,361 UART: [ldev] Erasing FE.KEYID = 1
8,856,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,336 UART: [ldev] --
10,651,434 UART: [fwproc] Wait for Commands...
10,653,239 UART: [fwproc] Recv command 0x46574c44
10,655,495 UART: [fwproc] Recv'd Img size: 114448 bytes
15,293,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,375,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,491,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,034,437 >>> mbox cmd response: success
16,037,898 UART: [afmc] ++
16,038,609 UART: [afmc] CDI.KEYID = 6
16,039,799 UART: [afmc] SUBJECT.KEYID = 7
16,041,233 UART: [afmc] AUTHORITY.KEYID = 5
18,548,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,272,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,274,645 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,289,719 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,304,924 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,319,772 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,343,631 UART: [afmc] --
20,346,797 UART: [cold-reset] --
20,351,091 UART: [state] Locking Datavault
20,357,208 UART: [state] Locking PCR0, PCR1 and PCR31
20,359,358 UART: [state] Locking ICCM
20,362,118 UART: [exit] Launching FMC @ 0x40000130
20,370,797 UART:
20,371,028 UART: Running Caliptra FMC ...
20,372,126 UART:
20,372,285 UART: [state] CFI Enabled
20,380,543 UART: [fht] FMC Alias Private Key: 7
22,137,081 UART: [art] Extend RT PCRs Done
22,138,297 UART: [art] Lock RT PCRs Done
22,140,132 UART: [art] Populate DV Done
22,145,538 UART: [fht] FMC Alias Private Key: 7
22,147,064 UART: [art] Derive CDI
22,147,874 UART: [art] Store in in slot 0x4
22,190,196 UART: [art] Derive Key Pair
22,191,229 UART: [art] Store priv key in slot 0x5
24,617,655 UART: [art] Derive Key Pair - Done
24,630,487 UART: [art] Signing Cert with AUTHO
24,631,801 UART: RITY.KEYID = 7
26,337,225 UART: [art] Erasing AUTHORITY.KEYID = 7
26,338,734 UART: [art] PUB.X = 26287C3F7767A5FA0ADF01E9587460A485F8B2A1A046010BADC0C9E8E62DE9C04959E23C84598A31E576C64EFF0095D0
26,345,959 UART: [art] PUB.Y = 559EDD0F3F6D2044A4A00DD53C9EF37C8C120D9CD8CCE898ABC4D36D10A0BA23A63522ED1A3CB42757F1C4859520EE81
26,353,250 UART: [art] SIG.R = BD72638B971BD0389D2844FBFAFD6F6D37EAE3F425B3793F126C3C468FA9BDF5AB02AC0EEB2E7BF7EDCFE07B866388A2
26,360,717 UART: [art] SIG.S = 3875697AD6B7F51B46D8D8DA8936ADB9F3A18FE79865EEF77DD8AD42D509F3AC91952C1889848C1714E87F57442F456B
27,339,592 UART: Caliptra RT
27,340,273 UART: [state] CFI Enabled
27,457,178 UART: [rt] RT listening for mailbox commands...
27,459,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,614,950 UART: [rt]cmd =0x41544d4e, len=14344
29,766,001 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,749,857 ready_for_fw is high
3,750,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,044,185 >>> mbox cmd response: success
20,297,456 UART:
20,297,898 UART: Running Caliptra FMC ...
20,298,994 UART:
20,299,144 UART: [state] CFI Enabled
20,306,921 UART: [fht] FMC Alias Private Key: 7
22,063,643 UART: [art] Extend RT PCRs Done
22,064,867 UART: [art] Lock RT PCRs Done
22,066,435 UART: [art] Populate DV Done
22,072,164 UART: [fht] FMC Alias Private Key: 7
22,073,754 UART: [art] Derive CDI
22,074,582 UART: [art] Store in in slot 0x4
22,116,900 UART: [art] Derive Key Pair
22,117,935 UART: [art] Store priv key in slot 0x5
24,544,817 UART: [art] Derive Key Pair - Done
24,557,704 UART: [art] Signing Cert with AUTHO
24,558,999 UART: RITY.KEYID = 7
26,264,263 UART: [art] Erasing AUTHORITY.KEYID = 7
26,265,763 UART: [art] PUB.X = 54D9EFD2012A6D3F29BFC48117E799844D36287A91B2D9D88DE1EBD3E0B92380AAE1E450A77E517DAA836CF38E94F6C3
26,273,048 UART: [art] PUB.Y = 389BF98561F49F9F746D2E498AE70F323F7A06943AFF2F4F5E7AAC951E279664EC9DF1B5D8C5298816893EFB500FDA24
26,280,296 UART: [art] SIG.R = 1925FDAA554C5349E28EB637283612BEE1557B2BB6215859E108995DA818E95AA06B3511829FD02D5BE46A526E759B1E
26,287,674 UART: [art] SIG.S = E461A77C23576127462F729A2F9696B053826FD53FE05882FAC8203D366BF6807AC98F1E42F6C0559028DA43646E9097
27,266,901 UART: Caliptra RT
27,267,589 UART: [state] CFI Enabled
27,385,199 UART: [rt] RT listening for mailbox commands...
27,387,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,542,612 UART: [rt]cmd =0x41544d4e, len=14344
29,694,658 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,067 UART: [kat] SHA2-256
881,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,113 UART: [kat] ++
886,265 UART: [kat] sha1
890,477 UART: [kat] SHA2-256
892,415 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,752 UART: [kat] HMAC-384Kdf
907,206 UART: [kat] LMS
1,475,402 UART: [kat] --
1,476,195 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 ready_for_fw is high
1,480,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,316 UART: [idev] Erasing UDS.KEYID = 0
1,504,986 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,521,331 UART: [ldev] Erasing FE.KEYID = 1
1,546,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,832 UART: [ldev] --
1,586,341 UART: [fwproc] Waiting for Commands...
1,587,148 UART: [fwproc] Received command 0x46574c44
1,587,939 UART: [fwproc] Received Image of size 114448 bytes
5,010,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,037,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,067,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,203,289 >>> mbox cmd response: success
5,204,435 UART: [afmc] ++
5,204,603 UART: [afmc] CDI.KEYID = 6
5,204,965 UART: [afmc] SUBJECT.KEYID = 7
5,205,390 UART: [afmc] AUTHORITY.KEYID = 5
5,240,736 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,257,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,257,902 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,263,611 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,269,503 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,275,204 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,283,212 UART: [afmc] --
5,284,140 UART: [cold-reset] --
5,285,034 UART: [state] Locking Datavault
5,286,003 UART: [state] Locking PCR0, PCR1 and PCR31
5,286,607 UART: [state] Locking ICCM
5,287,113 UART: [exit] Launching FMC @ 0x40000130
5,292,442 UART:
5,292,458 UART: Running Caliptra FMC ...
5,292,866 UART:
5,292,920 UART: [state] CFI Enabled
5,303,134 UART: [fht] FMC Alias Private Key: 7
5,411,036 UART: [art] Extend RT PCRs Done
5,411,464 UART: [art] Lock RT PCRs Done
5,412,926 UART: [art] Populate DV Done
5,421,174 UART: [fht] FMC Alias Private Key: 7
5,422,256 UART: [art] Derive CDI
5,422,536 UART: [art] Store in in slot 0x4
5,508,221 UART: [art] Derive Key Pair
5,508,581 UART: [art] Store priv key in slot 0x5
5,522,157 UART: [art] Derive Key Pair - Done
5,536,792 UART: [art] Signing Cert with AUTHO
5,537,272 UART: RITY.KEYID = 7
5,552,180 UART: [art] Erasing AUTHORITY.KEYID = 7
5,552,945 UART: [art] PUB.X = 2A1D519F42908CB34C88F2A6BFB1E2546C433A65775E21251FF81F347665DBF6FCD5CB6C8531D4F3F042BB715045E6C0
5,559,721 UART: [art] PUB.Y = 7621DDF5EF99BA09C7234B881E7631D48EE417A60FE169240C1D98A0CC09B21309E57BA92041B89565C05724431E7999
5,566,650 UART: [art] SIG.R = 5EFB70F3C94A9F93395AD9E0AE05365509B45042F5CF1E373AD6DF81D80D9DC6659EF84DCEC4D8589E84D940AC38ACEE
5,573,429 UART: [art] SIG.S = 0AA086D613887AE5E249E60318EC3EFF0C105B7D65607060253FE5C501053094AA6C654D8A4D4EAEBE3739DD06BF527D
5,597,160 UART: Caliptra RT
5,597,413 UART: [state] CFI Enabled
5,705,735 UART: [rt] RT listening for mailbox commands...
5,706,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,829,277 UART: [rt]cmd =0x41544d4e, len=14344
6,112,507 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,175 ready_for_fw is high
1,362,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,202,643 >>> mbox cmd response: success
5,263,662 UART:
5,263,678 UART: Running Caliptra FMC ...
5,264,086 UART:
5,264,140 UART: [state] CFI Enabled
5,274,660 UART: [fht] FMC Alias Private Key: 7
5,382,574 UART: [art] Extend RT PCRs Done
5,383,002 UART: [art] Lock RT PCRs Done
5,384,500 UART: [art] Populate DV Done
5,392,574 UART: [fht] FMC Alias Private Key: 7
5,393,678 UART: [art] Derive CDI
5,393,958 UART: [art] Store in in slot 0x4
5,479,909 UART: [art] Derive Key Pair
5,480,269 UART: [art] Store priv key in slot 0x5
5,493,711 UART: [art] Derive Key Pair - Done
5,508,747 UART: [art] Signing Cert with AUTHO
5,509,227 UART: RITY.KEYID = 7
5,524,347 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,112 UART: [art] PUB.X = 6801C7507AB19FE720000D51CEC15C2A582FD76A1CA643AA83AD2B1DFEF72B4DB0A1C80B1669DE6DF6A4B82320D896B7
5,531,867 UART: [art] PUB.Y = 53A4D7B1EE768D85A5F65FD89357933BD1A2F849F4241059591E179BF4342D429FEB0E1760199AAEAFD156E8E5D0DFAF
5,538,824 UART: [art] SIG.R = 414D14F95ABC455DD89FA0F669B1B6A8CD7ECB8CA7CDBA316D38EE2D3B9E19E45510664232F4795DF73921819D3E32D6
5,545,606 UART: [art] SIG.S = 7A0CE8DEFC85387778C7B4FE138F1D4B5A6CD0227B764070D0BA9C5FB843E248493415F462D23A47F7682E1D25CEB4E0
5,569,524 UART: Caliptra RT
5,569,777 UART: [state] CFI Enabled
5,678,085 UART: [rt] RT listening for mailbox commands...
5,678,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,789 UART: [rt]cmd =0x41544d4e, len=14344
6,084,995 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,410 UART: [kat] SHA2-256
892,348 UART: [kat] SHA2-384
894,975 UART: [kat] SHA2-512-ACC
896,876 UART: [kat] ECC-384
902,437 UART: [kat] HMAC-384Kdf
907,173 UART: [kat] LMS
1,475,369 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 ready_for_fw is high
1,481,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,981 UART: [ldev] --
1,586,266 UART: [fwproc] Waiting for Commands...
1,587,085 UART: [fwproc] Received command 0x46574c44
1,587,876 UART: [fwproc] Received Image of size 114448 bytes
5,160,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,189,133 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,218,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,354,424 >>> mbox cmd response: success
5,355,652 UART: [afmc] ++
5,355,820 UART: [afmc] CDI.KEYID = 6
5,356,182 UART: [afmc] SUBJECT.KEYID = 7
5,356,607 UART: [afmc] AUTHORITY.KEYID = 5
5,391,811 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,408,261 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,409,041 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,414,750 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,420,642 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,426,343 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,434,377 UART: [afmc] --
5,435,405 UART: [cold-reset] --
5,436,277 UART: [state] Locking Datavault
5,437,530 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,134 UART: [state] Locking ICCM
5,438,670 UART: [exit] Launching FMC @ 0x40000130
5,443,999 UART:
5,444,015 UART: Running Caliptra FMC ...
5,444,423 UART:
5,444,566 UART: [state] CFI Enabled
5,454,796 UART: [fht] FMC Alias Private Key: 7
5,563,380 UART: [art] Extend RT PCRs Done
5,563,808 UART: [art] Lock RT PCRs Done
5,565,364 UART: [art] Populate DV Done
5,573,504 UART: [fht] FMC Alias Private Key: 7
5,574,492 UART: [art] Derive CDI
5,574,772 UART: [art] Store in in slot 0x4
5,660,417 UART: [art] Derive Key Pair
5,660,777 UART: [art] Store priv key in slot 0x5
5,674,365 UART: [art] Derive Key Pair - Done
5,688,741 UART: [art] Signing Cert with AUTHO
5,689,221 UART: RITY.KEYID = 7
5,704,617 UART: [art] Erasing AUTHORITY.KEYID = 7
5,705,382 UART: [art] PUB.X = BF3D52FF9CFAC3252996F48E8349E96435BE168FFB7F7D9872491056782CA61EF2D01767EC0024AB83F11B072189D8AC
5,712,131 UART: [art] PUB.Y = F6A079E7343674BC89AB2B4696E2611D87FCA44834504A9F0A2CCDE8FC8085D313580A4A775C98B727E884081EA35469
5,719,070 UART: [art] SIG.R = F52E587351D45EDF2A05622668D6BFF32687709DC543AF50E3A8D7E7678A60B15E846B59CC4C4EC80D357E9E4CA3B580
5,725,840 UART: [art] SIG.S = FCBEC4BC35F69DB8A88DD043B94FFA96FA4526BBDF8846883B0257B8D0BF1A2B5AAEB863044C28144B4FD03B22142806
5,749,456 UART: Caliptra RT
5,749,801 UART: [state] CFI Enabled
5,856,957 UART: [rt] RT listening for mailbox commands...
5,857,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,435 UART: [rt]cmd =0x41544d4e, len=14344
6,265,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,204,556 >>> mbox cmd response: success
5,266,491 UART:
5,266,507 UART: Running Caliptra FMC ...
5,266,915 UART:
5,267,058 UART: [state] CFI Enabled
5,277,404 UART: [fht] FMC Alias Private Key: 7
5,385,718 UART: [art] Extend RT PCRs Done
5,386,146 UART: [art] Lock RT PCRs Done
5,387,344 UART: [art] Populate DV Done
5,395,384 UART: [fht] FMC Alias Private Key: 7
5,396,516 UART: [art] Derive CDI
5,396,796 UART: [art] Store in in slot 0x4
5,482,367 UART: [art] Derive Key Pair
5,482,727 UART: [art] Store priv key in slot 0x5
5,496,145 UART: [art] Derive Key Pair - Done
5,511,035 UART: [art] Signing Cert with AUTHO
5,511,515 UART: RITY.KEYID = 7
5,526,863 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,628 UART: [art] PUB.X = B7B89AAEB27DB22449F357A9C18E2C99741054F98475D49CAE0610C331EFBC1A0A7B0519074D8CCBE3C2B3C495FBD46C
5,534,400 UART: [art] PUB.Y = FF6EF719966C3EF11F7C4F966B05BD8F299907ED1AE03ECF837909464E0ABF2D89BD2DDA84D698729846991065C62B0E
5,541,343 UART: [art] SIG.R = 62113B7500E848EF1DC997F2471FD624A350DE98CAFAA1802BF94E8A2096A30B2BFB99F02D267D6267E6E0E74FC5CE74
5,548,098 UART: [art] SIG.S = D7CB4A736449D9C4B4229F305F3854393C51FF665A6E19BDF71C1BBB78AE9A833EF0210CF5E6CFD900719DB57FE8F4B3
5,571,856 UART: Caliptra RT
5,572,201 UART: [state] CFI Enabled
5,680,902 UART: [rt] RT listening for mailbox commands...
5,681,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,696 UART: [rt]cmd =0x41544d4e, len=14344
6,097,968 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
893,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,631 UART: [kat] ++
897,783 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,670 UART: [kat] SHA2-512-ACC
908,571 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,172,149 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,356 UART: [idev] ++
1,175,524 UART: [idev] CDI.KEYID = 6
1,175,884 UART: [idev] SUBJECT.KEYID = 7
1,176,308 UART: [idev] UDS.KEYID = 0
1,176,653 ready_for_fw is high
1,176,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,806 UART: [fwproc] Recv command 0x46574c44
1,283,534 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,494 >>> mbox cmd response: success
3,316,580 UART: [afmc] ++
3,316,748 UART: [afmc] CDI.KEYID = 6
3,317,110 UART: [afmc] SUBJECT.KEYID = 7
3,317,535 UART: [afmc] AUTHORITY.KEYID = 5
3,353,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,402 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,111 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,003 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,714 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,475 UART: [afmc] --
3,396,527 UART: [cold-reset] --
3,397,335 UART: [state] Locking Datavault
3,398,766 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,370 UART: [state] Locking ICCM
3,399,930 UART: [exit] Launching FMC @ 0x40000130
3,405,259 UART:
3,405,275 UART: Running Caliptra FMC ...
3,405,683 UART:
3,405,737 UART: [state] CFI Enabled
3,416,845 UART: [fht] FMC Alias Private Key: 7
3,524,093 UART: [art] Extend RT PCRs Done
3,524,521 UART: [art] Lock RT PCRs Done
3,526,417 UART: [art] Populate DV Done
3,534,725 UART: [fht] FMC Alias Private Key: 7
3,535,683 UART: [art] Derive CDI
3,535,963 UART: [art] Store in in slot 0x4
3,622,028 UART: [art] Derive Key Pair
3,622,388 UART: [art] Store priv key in slot 0x5
3,635,306 UART: [art] Derive Key Pair - Done
3,649,809 UART: [art] Signing Cert with AUTHO
3,650,289 UART: RITY.KEYID = 7
3,665,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,270 UART: [art] PUB.X = 28D4DA4209B2CDD4E876A1DE04C2DBA00D7A4BB1D1F3B9AB698186EF1C3AB985A961A4C764BDFBB9624D36BE5DFEF9D4
3,673,059 UART: [art] PUB.Y = 795ECB61ECD18550A7E25824DD5F9159BAAF34369F072172BBE4CFB0E092C4BE8B65E0B62509AE1CA5CE43918A044627
3,680,010 UART: [art] SIG.R = B52A0BECB0535C64696547A3A945CC433BD4CA2FB7F521E969FF7E79F1A0734D7290A91709EF94D9409ADDFF4559C004
3,686,779 UART: [art] SIG.S = 083F7CA9E299BF6D35BA9FE19FF264E4D17386334BB500BAF2402EF87BFC13CC4D2225EC32243E0B43675C1B7E8686FD
3,710,806 UART: Caliptra RT
3,711,059 UART: [state] CFI Enabled
3,818,449 UART: [rt] RT listening for mailbox commands...
3,819,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,259 UART: [rt]cmd =0x41544d4e, len=14344
4,228,016 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 ready_for_fw is high
1,060,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,901 >>> mbox cmd response: success
3,228,968 UART:
3,228,984 UART: Running Caliptra FMC ...
3,229,392 UART:
3,229,446 UART: [state] CFI Enabled
3,240,096 UART: [fht] FMC Alias Private Key: 7
3,347,704 UART: [art] Extend RT PCRs Done
3,348,132 UART: [art] Lock RT PCRs Done
3,349,354 UART: [art] Populate DV Done
3,357,496 UART: [fht] FMC Alias Private Key: 7
3,358,674 UART: [art] Derive CDI
3,358,954 UART: [art] Store in in slot 0x4
3,444,513 UART: [art] Derive Key Pair
3,444,873 UART: [art] Store priv key in slot 0x5
3,458,863 UART: [art] Derive Key Pair - Done
3,473,957 UART: [art] Signing Cert with AUTHO
3,474,437 UART: RITY.KEYID = 7
3,489,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,566 UART: [art] PUB.X = DF82A27E8E8E6995CA0209F9954620726DFE71390414577B47D66B0C0DC1E41E732B1589A0AAAE95E3FFABFA0F2C675A
3,497,328 UART: [art] PUB.Y = 5A7F414FA4B20C57871DF2BBC2FF0A7C634659A915581B278C5ACBFCDFFCEE613F088C6458982CFCB6AF86510042727F
3,504,261 UART: [art] SIG.R = DDCC71A1E1478ECF1DBE67F684142BCEB0ABE2A6922B9355059C68687E872B51725CE6C5B7943C22A23102FAFFB1CFE2
3,511,041 UART: [art] SIG.S = 161F97B4BF291CE8E1C2F9C83C5903A45F40FAE0C8CCC040B2C4E8FFEF88E5539DFE4BA6860C28D58FE7270F7FCC8B07
3,534,520 UART: Caliptra RT
3,534,773 UART: [state] CFI Enabled
3,643,107 UART: [rt] RT listening for mailbox commands...
3,643,777 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,857 UART: [rt]cmd =0x41544d4e, len=14344
4,059,821 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,629 UART: [kat] SHA2-512-ACC
908,530 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
923,031 UART: [kat] LMS
1,171,359 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,944 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 ready_for_fw is high
1,177,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,459 UART: [idev] Erasing UDS.KEYID = 0
1,201,660 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,194 UART: [ldev] ++
1,211,362 UART: [ldev] CDI.KEYID = 6
1,211,725 UART: [ldev] SUBJECT.KEYID = 5
1,212,151 UART: [ldev] AUTHORITY.KEYID = 7
1,212,614 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,616 UART: [ldev] --
1,283,987 UART: [fwproc] Wait for Commands...
1,284,587 UART: [fwproc] Recv command 0x46574c44
1,285,315 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,819 >>> mbox cmd response: success
3,322,919 UART: [afmc] ++
3,323,087 UART: [afmc] CDI.KEYID = 6
3,323,449 UART: [afmc] SUBJECT.KEYID = 7
3,323,874 UART: [afmc] AUTHORITY.KEYID = 5
3,360,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,633 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,342 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,234 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,945 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,966 UART: [afmc] --
3,403,938 UART: [cold-reset] --
3,404,666 UART: [state] Locking Datavault
3,405,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,117 UART: [state] Locking ICCM
3,406,597 UART: [exit] Launching FMC @ 0x40000130
3,411,926 UART:
3,411,942 UART: Running Caliptra FMC ...
3,412,350 UART:
3,412,493 UART: [state] CFI Enabled
3,422,915 UART: [fht] FMC Alias Private Key: 7
3,531,423 UART: [art] Extend RT PCRs Done
3,531,851 UART: [art] Lock RT PCRs Done
3,533,419 UART: [art] Populate DV Done
3,541,627 UART: [fht] FMC Alias Private Key: 7
3,542,729 UART: [art] Derive CDI
3,543,009 UART: [art] Store in in slot 0x4
3,628,750 UART: [art] Derive Key Pair
3,629,110 UART: [art] Store priv key in slot 0x5
3,642,218 UART: [art] Derive Key Pair - Done
3,656,880 UART: [art] Signing Cert with AUTHO
3,657,360 UART: RITY.KEYID = 7
3,672,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,491 UART: [art] PUB.X = 98555791A2DC9CEDD42C53A7F58849CD41B42481F086823DB2B2E977487E078D1F609C23D7588133DE2F6373E2DAB31C
3,680,258 UART: [art] PUB.Y = 11A7AD01AA49FC77D3AEF8C7B8A23D0035D91E29E5196F4DEE1033BA6C9E379E3C0F855E676D8967087EB2934E6EB13C
3,687,189 UART: [art] SIG.R = C50ECE99B87FEF4306B035DFC9675320F273634075C03634A6BC0F822A885B6DC9AFED3AE71F89DCA3F16D9A4F90DA3B
3,693,966 UART: [art] SIG.S = 618E6D78159539FFDB1B2C244BEE413D32F7CFDFFD77A812E2B36EB34F03E6710171F0DB56986C887B5F2A0F4331E055
3,717,484 UART: Caliptra RT
3,717,829 UART: [state] CFI Enabled
3,825,833 UART: [rt] RT listening for mailbox commands...
3,826,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,451 UART: [rt]cmd =0x41544d4e, len=14344
4,235,168 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 ready_for_fw is high
1,061,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,277 >>> mbox cmd response: success
3,235,536 UART:
3,235,552 UART: Running Caliptra FMC ...
3,235,960 UART:
3,236,103 UART: [state] CFI Enabled
3,246,785 UART: [fht] FMC Alias Private Key: 7
3,354,463 UART: [art] Extend RT PCRs Done
3,354,891 UART: [art] Lock RT PCRs Done
3,356,309 UART: [art] Populate DV Done
3,364,719 UART: [fht] FMC Alias Private Key: 7
3,365,899 UART: [art] Derive CDI
3,366,179 UART: [art] Store in in slot 0x4
3,451,488 UART: [art] Derive Key Pair
3,451,848 UART: [art] Store priv key in slot 0x5
3,465,286 UART: [art] Derive Key Pair - Done
3,480,271 UART: [art] Signing Cert with AUTHO
3,480,751 UART: RITY.KEYID = 7
3,495,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,508 UART: [art] PUB.X = 5F8D8A7F35EA12D34627675B27CA49325B03BD564BED267C45EAB387FFA36AEBA192F7B71F91C0AD9D5CD8A86EB83779
3,503,291 UART: [art] PUB.Y = 0DD50BA09B58883553B3D5448480FBF0A973EDE5BD2D1294267539B2CE2D334A82FA1520533E319CB5DCF0CE9D1D2ED8
3,510,245 UART: [art] SIG.R = 90CE407046975D5C0B6CC9D9304A4D7015135084E6795B13E05FF8B7032600F3C692A05B9D7322896165CD24376C9A86
3,516,975 UART: [art] SIG.S = 5929BE9D456BDF99B9D3376982969814D4CA874A5C405870AF5BE482B9A99BE399FE45C0D6A818EF1F66BCE7FF59D472
3,540,538 UART: Caliptra RT
3,540,883 UART: [state] CFI Enabled
3,648,823 UART: [rt] RT listening for mailbox commands...
3,649,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,847 UART: [rt]cmd =0x41544d4e, len=14344
4,063,166 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 ready_for_fw is high
1,174,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,144 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,642 UART: [fwproc] Wait for Commands...
1,281,289 UART: [fwproc] Recv command 0x46574c44
1,282,022 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,852 >>> mbox cmd response: success
3,327,981 UART: [afmc] ++
3,328,149 UART: [afmc] CDI.KEYID = 6
3,328,512 UART: [afmc] SUBJECT.KEYID = 7
3,328,938 UART: [afmc] AUTHORITY.KEYID = 5
3,363,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,053 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,763 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,653 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,364 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,148 UART: [afmc] --
3,407,260 UART: [cold-reset] --
3,408,098 UART: [state] Locking Datavault
3,409,113 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,717 UART: [state] Locking ICCM
3,410,265 UART: [exit] Launching FMC @ 0x40000130
3,415,594 UART:
3,415,610 UART: Running Caliptra FMC ...
3,416,018 UART:
3,416,072 UART: [state] CFI Enabled
3,426,410 UART: [fht] FMC Alias Private Key: 7
3,534,144 UART: [art] Extend RT PCRs Done
3,534,572 UART: [art] Lock RT PCRs Done
3,535,890 UART: [art] Populate DV Done
3,544,318 UART: [fht] FMC Alias Private Key: 7
3,545,368 UART: [art] Derive CDI
3,545,648 UART: [art] Store in in slot 0x4
3,631,161 UART: [art] Derive Key Pair
3,631,521 UART: [art] Store priv key in slot 0x5
3,644,893 UART: [art] Derive Key Pair - Done
3,659,625 UART: [art] Signing Cert with AUTHO
3,660,105 UART: RITY.KEYID = 7
3,675,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,096 UART: [art] PUB.X = DDB399525DD8D73C8017E9ED8520EAD374600F02B1FB2766AC21207FD6473170F4A1BC23D6C13D63184DA77680A34AA6
3,682,864 UART: [art] PUB.Y = CB3C80D583C88296BE6CDC2C0124F5ABB888BAAA1D0407064CCC8C91690389EFF66E91444ED2EA2DD77D0974DCC2776D
3,689,812 UART: [art] SIG.R = 9A6A2A5B4C4DDD73B6D1F77AEB9FC143718925B860519549A79DA6955D5C40333974962E729BF48B2C03D7C23BABB462
3,696,583 UART: [art] SIG.S = ABB83209E6B884E321C4BA593510BE31E35F365682125A4E34B274512A06D1BA21B5EDE63E468FDE1A49A6E7822B165F
3,719,776 UART: Caliptra RT
3,720,029 UART: [state] CFI Enabled
3,828,014 UART: [rt] RT listening for mailbox commands...
3,828,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,578 UART: [rt]cmd =0x41544d4e, len=14344
4,242,069 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,074 ready_for_fw is high
1,056,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,160 >>> mbox cmd response: success
3,229,151 UART:
3,229,167 UART: Running Caliptra FMC ...
3,229,575 UART:
3,229,629 UART: [state] CFI Enabled
3,240,191 UART: [fht] FMC Alias Private Key: 7
3,347,581 UART: [art] Extend RT PCRs Done
3,348,009 UART: [art] Lock RT PCRs Done
3,349,281 UART: [art] Populate DV Done
3,357,591 UART: [fht] FMC Alias Private Key: 7
3,358,617 UART: [art] Derive CDI
3,358,897 UART: [art] Store in in slot 0x4
3,444,156 UART: [art] Derive Key Pair
3,444,516 UART: [art] Store priv key in slot 0x5
3,457,992 UART: [art] Derive Key Pair - Done
3,472,929 UART: [art] Signing Cert with AUTHO
3,473,409 UART: RITY.KEYID = 7
3,488,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,494 UART: [art] PUB.X = 48C53C006B676C860CD119EE640D03ADCC3E08A887E5D94D7976678A6CDB1B9BBEE2994CFBED13570BA337B109DC006F
3,496,216 UART: [art] PUB.Y = CC2B364F2CDA5F8F02DFBC9605F2CDBEE474B784DB5363AAB25E7F45D5198316B730B18DBD419969D98E421961DC6534
3,503,172 UART: [art] SIG.R = FC0BF9C3EF3FFCB40B19C2A4AB385B661BD73EB201CB26A0FCF4E825084AB2A0BFF46227164BA1751211683D3DDB13F1
3,509,950 UART: [art] SIG.S = 4C144CA9AE1872AC33B058A4BBC73B95039ECAEFD895913733E2B6EC840559ECD4059BBE1B0C8EA174BE32666E874E0A
3,533,472 UART: Caliptra RT
3,533,725 UART: [state] CFI Enabled
3,640,603 UART: [rt] RT listening for mailbox commands...
3,641,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,063 UART: [rt]cmd =0x41544d4e, len=14344
4,052,055 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,793 UART: [ldev] --
1,281,193 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,188 >>> mbox cmd response: success
3,321,205 UART: [afmc] ++
3,321,373 UART: [afmc] CDI.KEYID = 6
3,321,736 UART: [afmc] SUBJECT.KEYID = 7
3,322,162 UART: [afmc] AUTHORITY.KEYID = 5
3,357,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,777 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,487 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,377 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,088 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,966 UART: [afmc] --
3,401,078 UART: [cold-reset] --
3,401,818 UART: [state] Locking Datavault
3,402,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,539 UART: [state] Locking ICCM
3,403,985 UART: [exit] Launching FMC @ 0x40000130
3,409,314 UART:
3,409,330 UART: Running Caliptra FMC ...
3,409,738 UART:
3,409,881 UART: [state] CFI Enabled
3,420,233 UART: [fht] FMC Alias Private Key: 7
3,527,863 UART: [art] Extend RT PCRs Done
3,528,291 UART: [art] Lock RT PCRs Done
3,529,883 UART: [art] Populate DV Done
3,537,981 UART: [fht] FMC Alias Private Key: 7
3,538,917 UART: [art] Derive CDI
3,539,197 UART: [art] Store in in slot 0x4
3,624,672 UART: [art] Derive Key Pair
3,625,032 UART: [art] Store priv key in slot 0x5
3,638,042 UART: [art] Derive Key Pair - Done
3,652,931 UART: [art] Signing Cert with AUTHO
3,653,411 UART: RITY.KEYID = 7
3,668,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,562 UART: [art] PUB.X = 61A4F3707F4E7665173D4419FC8FC658D548619E4FB7620835B6EA2224C51213654888090810498F556C8C2CB0B12CE8
3,676,311 UART: [art] PUB.Y = BE6D07423DF9C48DD749FD30659F322C42152021FAF8010D932CB56BFEF842BC498DCF967597FA52CACF363AD9303F1A
3,683,264 UART: [art] SIG.R = A6882CF581351403A1F2660B1D92D6F4EBFBCB928874A413BE7A0EA8B432CEDA6F5868709A2EC7AF51B5CBA9A46BE34A
3,690,043 UART: [art] SIG.S = 24A6B8C03B99AC83BBA028204446682617879F99271B481E8E8B4256892EEBEB90987C3C1047CF25DA776D2D0090F52B
3,713,470 UART: Caliptra RT
3,713,815 UART: [state] CFI Enabled
3,821,691 UART: [rt] RT listening for mailbox commands...
3,822,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,387 UART: [rt]cmd =0x41544d4e, len=14344
4,233,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,577 ready_for_fw is high
1,056,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,180,402 >>> mbox cmd response: success
3,242,581 UART:
3,242,597 UART: Running Caliptra FMC ...
3,243,005 UART:
3,243,148 UART: [state] CFI Enabled
3,253,854 UART: [fht] FMC Alias Private Key: 7
3,361,256 UART: [art] Extend RT PCRs Done
3,361,684 UART: [art] Lock RT PCRs Done
3,363,248 UART: [art] Populate DV Done
3,371,324 UART: [fht] FMC Alias Private Key: 7
3,372,340 UART: [art] Derive CDI
3,372,620 UART: [art] Store in in slot 0x4
3,458,635 UART: [art] Derive Key Pair
3,458,995 UART: [art] Store priv key in slot 0x5
3,471,605 UART: [art] Derive Key Pair - Done
3,486,493 UART: [art] Signing Cert with AUTHO
3,486,973 UART: RITY.KEYID = 7
3,502,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,900 UART: [art] PUB.X = E2A331C5ED5D14868771360FB9EC23CC0C28FC9F17A5F07E0C414E839F1458E1E48567C9D4F91DD4615C8ED2C3B932BA
3,509,671 UART: [art] PUB.Y = AB1D1BD71C4A6C9AC7DAB88F76CFBA2E15A3DA794DC426AA127A826B23527F24A494176AD93FEFD4217C08A8E344A7F2
3,516,638 UART: [art] SIG.R = 42A53F45A1C2B5E08C2975BD6E536C5D08EEC6B9226177922628B55C73D43075F58326FDD8EE053E05B803AB602569E7
3,523,394 UART: [art] SIG.S = CD613A879F80A90B791DDD3A0CBADD9274DD88FA7B16028B7E49D69422A6EBFC45D36AC5689CA0B257C8BFB1419BAA08
3,547,331 UART: Caliptra RT
3,547,676 UART: [state] CFI Enabled
3,655,220 UART: [rt] RT listening for mailbox commands...
3,655,890 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,060 UART: [rt]cmd =0x41544d4e, len=14344
4,065,153 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,107 UART:
192,474 UART: Running Caliptra ROM ...
193,613 UART:
193,762 UART: [state] CFI Enabled
266,440 UART: [state] LifecycleState = Unprovisioned
268,438 UART: [state] DebugLocked = No
270,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,756 UART: [kat] SHA2-256
444,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,956 UART: [kat] ++
455,403 UART: [kat] sha1
466,311 UART: [kat] SHA2-256
469,040 UART: [kat] SHA2-384
476,248 UART: [kat] SHA2-512-ACC
478,554 UART: [kat] ECC-384
2,768,384 UART: [kat] HMAC-384Kdf
2,799,935 UART: [kat] LMS
3,990,261 UART: [kat] --
3,993,432 UART: [cold-reset] ++
3,995,933 UART: [fht] Storing FHT @ 0x50003400
4,007,574 UART: [idev] ++
4,008,145 UART: [idev] CDI.KEYID = 6
4,009,039 UART: [idev] SUBJECT.KEYID = 7
4,010,291 UART: [idev] UDS.KEYID = 0
4,011,313 ready_for_fw is high
4,011,522 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,084 UART: [idev] Erasing UDS.KEYID = 0
7,341,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,680 UART: [idev] --
7,368,860 UART: [ldev] ++
7,369,429 UART: [ldev] CDI.KEYID = 6
7,370,368 UART: [ldev] SUBJECT.KEYID = 5
7,371,635 UART: [ldev] AUTHORITY.KEYID = 7
7,372,792 UART: [ldev] FE.KEYID = 1
7,400,762 UART: [ldev] Erasing FE.KEYID = 1
10,733,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,757 UART: [ldev] --
13,113,835 UART: [fwproc] Waiting for Commands...
13,116,468 UART: [fwproc] Received command 0x46574c44
13,118,713 UART: [fwproc] Received Image of size 114124 bytes
17,176,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,966 >>> mbox cmd response: success
17,637,806 UART: [afmc] ++
17,638,400 UART: [afmc] CDI.KEYID = 6
17,639,422 UART: [afmc] SUBJECT.KEYID = 7
17,640,580 UART: [afmc] AUTHORITY.KEYID = 5
21,003,974 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,446 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,827 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,686 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,106 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,400 UART: [afmc] --
23,377,052 UART: [cold-reset] --
23,381,299 UART: [state] Locking Datavault
23,386,499 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,238 UART: [state] Locking ICCM
23,389,640 UART: [exit] Launching FMC @ 0x40000130
23,397,992 UART:
23,398,235 UART: Running Caliptra FMC ...
23,399,340 UART:
23,399,498 UART: [state] CFI Enabled
23,464,668 UART: [fht] FMC Alias Private Key: 7
25,803,145 UART: [art] Extend RT PCRs Done
25,804,364 UART: [art] Lock RT PCRs Done
25,806,069 UART: [art] Populate DV Done
25,811,481 UART: [fht] FMC Alias Private Key: 7
25,813,127 UART: [art] Derive CDI
25,813,939 UART: [art] Store in in slot 0x4
25,871,904 UART: [art] Derive Key Pair
25,872,942 UART: [art] Store priv key in slot 0x5
29,165,394 UART: [art] Derive Key Pair - Done
29,178,768 UART: [art] Signing Cert with AUTHO
29,180,075 UART: RITY.KEYID = 7
31,466,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,412 UART: [art] PUB.X = D84F8C52B293569A1A12B8BEA5A0BB832EFB7730A98861234C1F449058322959E2A39B6B41103F6E09E47E15AB365560
31,475,671 UART: [art] PUB.Y = 9DE5724B7CE10D03CDD157F5A63D245C4577AFAE3DE187BA2CD6CDF68A5E4900F85A94482902DCBC872F07505283B4C6
31,482,917 UART: [art] SIG.R = 7014AC7D03C19C8212DA6DD8656E4566A0F61EC5783EB818BD546D85CD1C232DBF88F2457A30457595B394294ECC1E7A
31,490,338 UART: [art] SIG.S = 8A8857A1CC89C5014BB22F181223B125DEF4459A26866E4670B40309C14EF95C9BFB85D8B4D739BAFE2D90C2AF074952
32,795,574 UART: Caliptra RT
32,796,267 UART: [state] CFI Enabled
32,956,383 UART: [rt] RT listening for mailbox commands...
32,958,717 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,113,987 UART: [rt]cmd =0x41544d4e, len=14344
38,349,950 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,784,724 ready_for_fw is high
3,785,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,851,886 >>> mbox cmd response: success
23,547,573 UART:
23,547,987 UART: Running Caliptra FMC ...
23,549,095 UART:
23,549,253 UART: [state] CFI Enabled
23,615,469 UART: [fht] FMC Alias Private Key: 7
25,952,821 UART: [art] Extend RT PCRs Done
25,954,049 UART: [art] Lock RT PCRs Done
25,955,924 UART: [art] Populate DV Done
25,961,500 UART: [fht] FMC Alias Private Key: 7
25,963,206 UART: [art] Derive CDI
25,963,969 UART: [art] Store in in slot 0x4
26,023,293 UART: [art] Derive Key Pair
26,024,337 UART: [art] Store priv key in slot 0x5
29,317,264 UART: [art] Derive Key Pair - Done
29,330,435 UART: [art] Signing Cert with AUTHO
29,331,736 UART: RITY.KEYID = 7
31,618,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,654 UART: [art] PUB.X = E8DC55CAD68C745A9EABD4195C0710F896E8558ACF2E831D889FF0361248D068BE7979B1D80496ACE401E0E1871E5700
31,626,856 UART: [art] PUB.Y = 6BF2907AEEC76959FB3158CF7AAEF87CDFDB6F4958146DBD71144A2CD63DF928FF8A82696DDB9E3EC02FF0CDB01AD0E0
31,634,170 UART: [art] SIG.R = C2AD50DCBCF7CC9568FA3BA1ED65A30EC965099C39819102E0905184B34461398C4DC8ED9BA274744349185C6B6D8F99
31,641,571 UART: [art] SIG.S = 6EE1D3E646A5D0607B8529ABA5F65680EFBE911C7C7F7F513A88E4C239417F1490EFF5D41E55ED9DBC31A7F01F6DFD99
32,947,187 UART: Caliptra RT
32,947,879 UART: [state] CFI Enabled
33,128,443 UART: [rt] RT listening for mailbox commands...
33,130,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,286,178 UART: [rt]cmd =0x41544d4e, len=14344
38,521,992 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,423 UART:
192,812 UART: Running Caliptra ROM ...
193,970 UART:
603,488 UART: [state] CFI Enabled
615,892 UART: [state] LifecycleState = Unprovisioned
617,851 UART: [state] DebugLocked = No
620,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,439 UART: [kat] SHA2-256
794,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,655 UART: [kat] ++
805,121 UART: [kat] sha1
816,772 UART: [kat] SHA2-256
819,485 UART: [kat] SHA2-384
824,967 UART: [kat] SHA2-512-ACC
827,333 UART: [kat] ECC-384
3,113,120 UART: [kat] HMAC-384Kdf
3,125,275 UART: [kat] LMS
4,315,390 UART: [kat] --
4,319,132 UART: [cold-reset] ++
4,321,418 UART: [fht] Storing FHT @ 0x50003400
4,332,107 UART: [idev] ++
4,332,666 UART: [idev] CDI.KEYID = 6
4,333,692 UART: [idev] SUBJECT.KEYID = 7
4,334,862 UART: [idev] UDS.KEYID = 0
4,335,917 ready_for_fw is high
4,336,127 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,488 UART: [idev] Erasing UDS.KEYID = 0
7,621,336 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,915 UART: [idev] --
7,646,829 UART: [ldev] ++
7,647,398 UART: [ldev] CDI.KEYID = 6
7,648,334 UART: [ldev] SUBJECT.KEYID = 5
7,649,539 UART: [ldev] AUTHORITY.KEYID = 7
7,650,822 UART: [ldev] FE.KEYID = 1
7,662,970 UART: [ldev] Erasing FE.KEYID = 1
10,949,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,137 UART: [ldev] --
13,309,376 UART: [fwproc] Waiting for Commands...
13,311,238 UART: [fwproc] Received command 0x46574c44
13,313,422 UART: [fwproc] Received Image of size 114124 bytes
17,363,348 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,822,851 >>> mbox cmd response: success
17,826,984 UART: [afmc] ++
17,827,575 UART: [afmc] CDI.KEYID = 6
17,828,502 UART: [afmc] SUBJECT.KEYID = 7
17,829,728 UART: [afmc] AUTHORITY.KEYID = 5
21,139,348 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,315 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,450,737 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,465,553 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,079 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,501,994 UART: [afmc] --
23,505,861 UART: [cold-reset] --
23,509,720 UART: [state] Locking Datavault
23,516,098 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,861 UART: [state] Locking ICCM
23,520,252 UART: [exit] Launching FMC @ 0x40000130
23,528,638 UART:
23,528,867 UART: Running Caliptra FMC ...
23,529,985 UART:
23,530,151 UART: [state] CFI Enabled
23,537,823 UART: [fht] FMC Alias Private Key: 7
25,869,591 UART: [art] Extend RT PCRs Done
25,870,811 UART: [art] Lock RT PCRs Done
25,872,458 UART: [art] Populate DV Done
25,877,600 UART: [fht] FMC Alias Private Key: 7
25,879,185 UART: [art] Derive CDI
25,879,993 UART: [art] Store in in slot 0x4
25,922,681 UART: [art] Derive Key Pair
25,923,681 UART: [art] Store priv key in slot 0x5
29,166,038 UART: [art] Derive Key Pair - Done
29,178,926 UART: [art] Signing Cert with AUTHO
29,180,228 UART: RITY.KEYID = 7
31,459,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,253 UART: [art] PUB.X = F09D8D3D810ECD8687CD6C3991E4DE517CD3C3112AEA2922519062515268CD8394FA943052B5246B7E16D2FE0EBBBBB3
31,468,520 UART: [art] PUB.Y = B25DCFC9BB16F7F6CE4A20683B378C12427829FD11021D9BCE3C2242BCC41B9D795A86235C321FAE04DE574B39BC9784
31,475,747 UART: [art] SIG.R = 548EE2338A2C30DE5D1B368A10E75E857BBD8008B87DF1EC63F51768BFF5B196993BA42711081CD2F44E1BAEE479F3D4
31,483,164 UART: [art] SIG.S = 011C813AEA945AEFA68202E8CDF64EEE3CF38B08983A27DC853AF881CB0A84E1D3B4D18E3475344E84FC112A531DD827
32,788,682 UART: Caliptra RT
32,789,387 UART: [state] CFI Enabled
32,906,937 UART: [rt] RT listening for mailbox commands...
32,909,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,064,795 UART: [rt]cmd =0x41544d4e, len=14344
38,300,534 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,135,241 ready_for_fw is high
4,135,672 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,561 >>> mbox cmd response: success
23,727,519 UART:
23,727,935 UART: Running Caliptra FMC ...
23,729,046 UART:
23,729,226 UART: [state] CFI Enabled
23,736,956 UART: [fht] FMC Alias Private Key: 7
26,067,426 UART: [art] Extend RT PCRs Done
26,068,666 UART: [art] Lock RT PCRs Done
26,070,242 UART: [art] Populate DV Done
26,075,436 UART: [fht] FMC Alias Private Key: 7
26,077,140 UART: [art] Derive CDI
26,077,957 UART: [art] Store in in slot 0x4
26,120,544 UART: [art] Derive Key Pair
26,121,583 UART: [art] Store priv key in slot 0x5
29,363,460 UART: [art] Derive Key Pair - Done
29,376,519 UART: [art] Signing Cert with AUTHO
29,377,827 UART: RITY.KEYID = 7
31,657,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,594 UART: [art] PUB.X = 7B5FB904BBDEACFADEA3BBD26B100EBFC2960C70212DD2C10BAC5707F00981B8F078C1B0861D101B408F19039EC21630
31,665,830 UART: [art] PUB.Y = 169A13F8F0B2F3ED7998987D802C701094F9B1DA6D8843B19B4D478D3EAE5080B141B66C79E0AE6334A304C697666698
31,673,032 UART: [art] SIG.R = 8CD6E84DAA1F72FB571D260CA902D9705443C7810D945C293B5968B7790D23A9B68B14CCC0779567263DE2B06108C13E
31,680,425 UART: [art] SIG.S = 12C6532EB49CEB71C06F329E5CE951FD384783D70D277FE6F202DD0DF47002FEEE48B68AB2E8921A205936F302336F0B
32,985,163 UART: Caliptra RT
32,985,852 UART: [state] CFI Enabled
33,104,261 UART: [rt] RT listening for mailbox commands...
33,106,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,262,047 UART: [rt]cmd =0x41544d4e, len=14344
38,497,793 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,014 UART:
192,382 UART: Running Caliptra ROM ...
193,560 UART:
193,717 UART: [state] CFI Enabled
267,397 UART: [state] LifecycleState = Unprovisioned
269,306 UART: [state] DebugLocked = No
272,188 UART: [state] WD Timer not started. Device not locked for debugging
275,370 UART: [kat] SHA2-256
454,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,052 UART: [kat] ++
466,604 UART: [kat] sha1
478,031 UART: [kat] SHA2-256
481,050 UART: [kat] SHA2-384
488,175 UART: [kat] SHA2-512-ACC
491,106 UART: [kat] ECC-384
2,947,644 UART: [kat] HMAC-384Kdf
2,971,103 UART: [kat] LMS
3,500,538 UART: [kat] --
3,505,908 UART: [cold-reset] ++
3,508,190 UART: [fht] FHT @ 0x50003400
3,518,951 UART: [idev] ++
3,519,517 UART: [idev] CDI.KEYID = 6
3,520,401 UART: [idev] SUBJECT.KEYID = 7
3,521,640 UART: [idev] UDS.KEYID = 0
3,522,617 ready_for_fw is high
3,522,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,756 UART: [idev] Erasing UDS.KEYID = 0
6,030,613 UART: [idev] Sha1 KeyId Algorithm
6,053,031 UART: [idev] --
6,056,728 UART: [ldev] ++
6,057,305 UART: [ldev] CDI.KEYID = 6
6,058,219 UART: [ldev] SUBJECT.KEYID = 5
6,059,321 UART: [ldev] AUTHORITY.KEYID = 7
6,060,663 UART: [ldev] FE.KEYID = 1
6,099,578 UART: [ldev] Erasing FE.KEYID = 1
8,605,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,423 UART: [ldev] --
10,413,603 UART: [fwproc] Wait for Commands...
10,415,694 UART: [fwproc] Recv command 0x46574c44
10,417,786 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,267 >>> mbox cmd response: success
14,287,860 UART: [afmc] ++
14,288,450 UART: [afmc] CDI.KEYID = 6
14,289,362 UART: [afmc] SUBJECT.KEYID = 7
14,290,522 UART: [afmc] AUTHORITY.KEYID = 5
16,829,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,816 UART: [afmc] --
18,627,306 UART: [cold-reset] --
18,630,839 UART: [state] Locking Datavault
18,637,595 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,244 UART: [state] Locking ICCM
18,640,530 UART: [exit] Launching FMC @ 0x40000130
18,648,976 UART:
18,649,222 UART: Running Caliptra FMC ...
18,650,344 UART:
18,650,508 UART: [state] CFI Enabled
18,713,735 UART: [fht] FMC Alias Private Key: 7
20,477,920 UART: [art] Extend RT PCRs Done
20,479,131 UART: [art] Lock RT PCRs Done
20,480,591 UART: [art] Populate DV Done
20,486,005 UART: [fht] FMC Alias Private Key: 7
20,487,498 UART: [art] Derive CDI
20,488,313 UART: [art] Store in in slot 0x4
20,546,495 UART: [art] Derive Key Pair
20,547,531 UART: [art] Store priv key in slot 0x5
23,010,497 UART: [art] Derive Key Pair - Done
23,023,211 UART: [art] Signing Cert with AUTHO
23,024,515 UART: RITY.KEYID = 7
24,736,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,805 UART: [art] PUB.X = 7D7348EBB259E364C921209011F0B5D21097105AFAA749ED65D62132E0E270826A3FF0D226BBDA1056D85E7087C8746C
24,745,074 UART: [art] PUB.Y = 52D0AC7A0517979A964BB963F199D6AC403A95F239D6BE56817A5377C341B7E43F4E9B27EEADC288BF6D82C8390E90A6
24,752,304 UART: [art] SIG.R = ADAE8702F546EF8EE82964E309863276CAE4BE2DFCAF42C4D19A4FC2D5E8386BBA31E229DE553F5C0BE59AA8591B9490
24,759,747 UART: [art] SIG.S = 2A87AB51782366D00E9EEC55C744354C5D4010BD04788595426D1973D1BC99FEA86070D21A2D2E544C9914EFA1333839
25,738,395 UART: Caliptra RT
25,739,105 UART: [state] CFI Enabled
25,903,516 UART: [rt] RT listening for mailbox commands...
25,905,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,526 UART: [rt]cmd =0x41544d4e, len=14344
29,991,685 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,382,566 ready_for_fw is high
3,383,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,387 >>> mbox cmd response: success
18,369,134 UART:
18,369,528 UART: Running Caliptra FMC ...
18,370,715 UART:
18,370,885 UART: [state] CFI Enabled
18,434,570 UART: [fht] FMC Alias Private Key: 7
20,198,375 UART: [art] Extend RT PCRs Done
20,199,572 UART: [art] Lock RT PCRs Done
20,201,253 UART: [art] Populate DV Done
20,206,582 UART: [fht] FMC Alias Private Key: 7
20,208,283 UART: [art] Derive CDI
20,209,097 UART: [art] Store in in slot 0x4
20,267,668 UART: [art] Derive Key Pair
20,268,725 UART: [art] Store priv key in slot 0x5
22,731,739 UART: [art] Derive Key Pair - Done
22,744,628 UART: [art] Signing Cert with AUTHO
22,745,927 UART: RITY.KEYID = 7
24,458,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,642 UART: [art] PUB.X = 2A03C05880B61DF141361B671296FAAB3D922442CB9DBD5C9748208FB31724DAE476C5397769F9FD8325FBE3C0EDD70C
24,466,905 UART: [art] PUB.Y = 0A14003DB1A94AF0A167C3C2DD6E1AFE8CC6A3F05FC05F64664DF34B9639A321E68AC0A4EBC340C55BCBC6046DA993EF
24,474,125 UART: [art] SIG.R = 6484D20F8D9639C44E4F8B55357BEF3F26705C4E1CF5C4CE86557CAAA875DEC97FA33B6CF2258BF00C334CE17C856D75
24,481,529 UART: [art] SIG.S = F542E9B8C2ABC191AADFF1F816CA6EFEBFC950F077EF24635DCD01E90D8278B5F4F8C4A3FF54CD0CC168933956361A04
25,460,459 UART: Caliptra RT
25,461,150 UART: [state] CFI Enabled
25,627,131 UART: [rt] RT listening for mailbox commands...
25,629,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,785,396 UART: [rt]cmd =0x41544d4e, len=14344
29,716,312 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,532 UART:
192,900 UART: Running Caliptra ROM ...
194,011 UART:
603,454 UART: [state] CFI Enabled
615,066 UART: [state] LifecycleState = Unprovisioned
616,942 UART: [state] DebugLocked = No
618,595 UART: [state] WD Timer not started. Device not locked for debugging
622,834 UART: [kat] SHA2-256
801,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,550 UART: [kat] ++
813,991 UART: [kat] sha1
825,989 UART: [kat] SHA2-256
829,007 UART: [kat] SHA2-384
834,341 UART: [kat] SHA2-512-ACC
837,285 UART: [kat] ECC-384
3,278,570 UART: [kat] HMAC-384Kdf
3,289,475 UART: [kat] LMS
3,818,957 UART: [kat] --
3,822,341 UART: [cold-reset] ++
3,824,487 UART: [fht] FHT @ 0x50003400
3,835,742 UART: [idev] ++
3,836,306 UART: [idev] CDI.KEYID = 6
3,837,213 UART: [idev] SUBJECT.KEYID = 7
3,838,449 UART: [idev] UDS.KEYID = 0
3,839,385 ready_for_fw is high
3,839,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,442 UART: [idev] Erasing UDS.KEYID = 0
6,313,739 UART: [idev] Sha1 KeyId Algorithm
6,336,268 UART: [idev] --
6,340,475 UART: [ldev] ++
6,341,041 UART: [ldev] CDI.KEYID = 6
6,341,947 UART: [ldev] SUBJECT.KEYID = 5
6,343,149 UART: [ldev] AUTHORITY.KEYID = 7
6,344,371 UART: [ldev] FE.KEYID = 1
6,354,212 UART: [ldev] Erasing FE.KEYID = 1
8,826,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,918 UART: [ldev] --
10,618,396 UART: [fwproc] Wait for Commands...
10,620,104 UART: [fwproc] Recv command 0x46574c44
10,622,140 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,320 >>> mbox cmd response: success
14,493,511 UART: [afmc] ++
14,494,099 UART: [afmc] CDI.KEYID = 6
14,495,005 UART: [afmc] SUBJECT.KEYID = 7
14,496,167 UART: [afmc] AUTHORITY.KEYID = 5
16,992,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,980 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,153 UART: [afmc] --
18,787,611 UART: [cold-reset] --
18,792,012 UART: [state] Locking Datavault
18,797,477 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,176 UART: [state] Locking ICCM
18,801,321 UART: [exit] Launching FMC @ 0x40000130
18,809,768 UART:
18,810,005 UART: Running Caliptra FMC ...
18,811,104 UART:
18,811,258 UART: [state] CFI Enabled
18,819,409 UART: [fht] FMC Alias Private Key: 7
20,575,930 UART: [art] Extend RT PCRs Done
20,577,139 UART: [art] Lock RT PCRs Done
20,578,812 UART: [art] Populate DV Done
20,584,126 UART: [fht] FMC Alias Private Key: 7
20,585,715 UART: [art] Derive CDI
20,586,521 UART: [art] Store in in slot 0x4
20,628,954 UART: [art] Derive Key Pair
20,629,991 UART: [art] Store priv key in slot 0x5
23,056,965 UART: [art] Derive Key Pair - Done
23,069,944 UART: [art] Signing Cert with AUTHO
23,071,268 UART: RITY.KEYID = 7
24,776,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,950 UART: [art] PUB.X = 80DEEB1EA6B35E2F27D235764DBADD8629CC2F12F85A765431BD4ACA245059A4C0CB0A6A7F235A961784A667B8471A5E
24,785,237 UART: [art] PUB.Y = 5BA748A57103BCB2603B058893306E08E44AC2469692EA66C5266C34845C870C84E9ED066FE76DFB8E947663EECA0F2C
24,792,445 UART: [art] SIG.R = 70D61DF8DAD8904E312E00D235E27536ADA67C42BD9C212F6AE5453A9D897D870E02CDA3ACE3880DFA5CA93ACCBEB66D
24,799,874 UART: [art] SIG.S = 80D4EC20C36412991364C6B3FB566EF6FC9F225D670E03B0BBA9E0C6A38C67B8916D824900E9491E14F735B6CDEA6B65
25,778,356 UART: Caliptra RT
25,779,044 UART: [state] CFI Enabled
25,896,153 UART: [rt] RT listening for mailbox commands...
25,898,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,053,991 UART: [rt]cmd =0x41544d4e, len=14344
29,984,367 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,695,262 ready_for_fw is high
3,695,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,817 >>> mbox cmd response: success
18,524,111 UART:
18,524,502 UART: Running Caliptra FMC ...
18,525,596 UART:
18,525,744 UART: [state] CFI Enabled
18,533,793 UART: [fht] FMC Alias Private Key: 7
20,290,592 UART: [art] Extend RT PCRs Done
20,291,804 UART: [art] Lock RT PCRs Done
20,293,390 UART: [art] Populate DV Done
20,298,802 UART: [fht] FMC Alias Private Key: 7
20,300,271 UART: [art] Derive CDI
20,301,014 UART: [art] Store in in slot 0x4
20,343,495 UART: [art] Derive Key Pair
20,344,490 UART: [art] Store priv key in slot 0x5
22,771,006 UART: [art] Derive Key Pair - Done
22,784,166 UART: [art] Signing Cert with AUTHO
22,785,496 UART: RITY.KEYID = 7
24,490,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,466 UART: [art] PUB.X = 2FF7AA82F5083AE41D7AE6C2F44DA130EF0BD3A9D7626BCB6E6856A3D3A161552C737B8942FD1E50E2CB5148231EC514
24,499,754 UART: [art] PUB.Y = 7C9D50D3BF850520FEC3C438ECCEBA8D4E79C320F84D0B2D8C2D22C58B76E5633709EC2A2A95CAE6C94F17423D10DB3E
24,506,997 UART: [art] SIG.R = BE1F54EBF37B46A81925C5C51AC608F5EEF5513E3D8DB0690D6C7D6E674922C5B09A8FD53269C17DB6CBFCBB8634D781
24,514,412 UART: [art] SIG.S = 8BCAEF9B0949C9D1EC657979F8343D3E0D5C2E5FE753D7B7A3BED6C510984AD33168422824ECD08F42F938F79C64162C
25,493,487 UART: Caliptra RT
25,494,174 UART: [state] CFI Enabled
25,612,273 UART: [rt] RT listening for mailbox commands...
25,614,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,769,750 UART: [rt]cmd =0x41544d4e, len=14344
29,699,687 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,037 UART:
192,400 UART: Running Caliptra ROM ...
193,504 UART:
193,645 UART: [state] CFI Enabled
263,857 UART: [state] LifecycleState = Unprovisioned
266,206 UART: [state] DebugLocked = No
268,575 UART: [state] WD Timer not started. Device not locked for debugging
272,741 UART: [kat] SHA2-256
462,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,366 UART: [kat] ++
473,814 UART: [kat] sha1
484,188 UART: [kat] SHA2-256
487,196 UART: [kat] SHA2-384
492,615 UART: [kat] SHA2-512-ACC
495,208 UART: [kat] ECC-384
2,946,708 UART: [kat] HMAC-384Kdf
2,972,322 UART: [kat] LMS
3,504,113 UART: [kat] --
3,507,181 UART: [cold-reset] ++
3,508,250 UART: [fht] FHT @ 0x50003400
3,519,358 UART: [idev] ++
3,519,992 UART: [idev] CDI.KEYID = 6
3,520,947 UART: [idev] SUBJECT.KEYID = 7
3,522,193 UART: [idev] UDS.KEYID = 0
3,523,096 ready_for_fw is high
3,523,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,349 UART: [idev] Erasing UDS.KEYID = 0
6,029,168 UART: [idev] Sha1 KeyId Algorithm
6,053,052 UART: [idev] --
6,058,562 UART: [ldev] ++
6,059,266 UART: [ldev] CDI.KEYID = 6
6,060,183 UART: [ldev] SUBJECT.KEYID = 5
6,061,346 UART: [ldev] AUTHORITY.KEYID = 7
6,062,524 UART: [ldev] FE.KEYID = 1
6,101,259 UART: [ldev] Erasing FE.KEYID = 1
8,604,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,547 UART: [ldev] --
10,413,725 UART: [fwproc] Wait for Commands...
10,416,408 UART: [fwproc] Recv command 0x46574c44
10,418,664 UART: [fwproc] Recv'd Img size: 114448 bytes
13,875,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,612,641 >>> mbox cmd response: success
14,616,541 UART: [afmc] ++
14,617,244 UART: [afmc] CDI.KEYID = 6
14,618,479 UART: [afmc] SUBJECT.KEYID = 7
14,619,913 UART: [afmc] AUTHORITY.KEYID = 5
17,153,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,588 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,727 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,014 UART: [afmc] --
18,947,448 UART: [cold-reset] --
18,952,656 UART: [state] Locking Datavault
18,957,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,961 UART: [state] Locking ICCM
18,962,796 UART: [exit] Launching FMC @ 0x40000130
18,971,410 UART:
18,971,643 UART: Running Caliptra FMC ...
18,972,666 UART:
18,972,814 UART: [state] CFI Enabled
19,032,334 UART: [fht] FMC Alias Private Key: 7
20,796,373 UART: [art] Extend RT PCRs Done
20,797,588 UART: [art] Lock RT PCRs Done
20,799,555 UART: [art] Populate DV Done
20,805,012 UART: [fht] FMC Alias Private Key: 7
20,806,552 UART: [art] Derive CDI
20,807,316 UART: [art] Store in in slot 0x4
20,864,135 UART: [art] Derive Key Pair
20,865,175 UART: [art] Store priv key in slot 0x5
23,327,888 UART: [art] Derive Key Pair - Done
23,341,031 UART: [art] Signing Cert with AUTHO
23,342,334 UART: RITY.KEYID = 7
25,053,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,360 UART: [art] PUB.X = 70BD709D1EA412C022D99B832E5C5DF59FE21AF07821F15A4998EDF6849F9C93CF40DBE2E7AC9C7AB330D29A041A6648
25,062,923 UART: [art] PUB.Y = 88159D08197A1E16E177E5111935925B2E418AC392049A7A071FF0F5E6A78A476CCCB8A1DAB359312FADAC12FE65E340
25,069,898 UART: [art] SIG.R = A3D1928ECAF5BC80DD3A6FB370E9B86A9A32E754019E568291C6804618052D68E4BE29FC8187DB6D823A2FD9E4A07EF2
25,077,296 UART: [art] SIG.S = EB893501DBDCF665546A41A10A20DCEA69AD86DE1A97B97FEC39D5E9A2646F65FA31989CDAA349D0F01CBA7A77613F2C
26,055,477 UART: Caliptra RT
26,056,183 UART: [state] CFI Enabled
26,220,595 UART: [rt] RT listening for mailbox commands...
26,222,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,378,984 UART: [rt]cmd =0x41544d4e, len=14344
30,309,014 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,438,864 ready_for_fw is high
3,439,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,711 >>> mbox cmd response: success
19,024,281 UART:
19,024,693 UART: Running Caliptra FMC ...
19,025,808 UART:
19,025,983 UART: [state] CFI Enabled
19,093,515 UART: [fht] FMC Alias Private Key: 7
20,857,786 UART: [art] Extend RT PCRs Done
20,859,016 UART: [art] Lock RT PCRs Done
20,860,651 UART: [art] Populate DV Done
20,865,956 UART: [fht] FMC Alias Private Key: 7
20,867,662 UART: [art] Derive CDI
20,868,478 UART: [art] Store in in slot 0x4
20,925,840 UART: [art] Derive Key Pair
20,926,890 UART: [art] Store priv key in slot 0x5
23,390,125 UART: [art] Derive Key Pair - Done
23,402,905 UART: [art] Signing Cert with AUTHO
23,404,213 UART: RITY.KEYID = 7
25,115,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,877 UART: [art] PUB.X = A3C76C572E28EAB6EB1A6C48D7B2310294F0CA860D2AA314B66790DFC02B4491A39A67BDA75C40A33DA4B1BCE86F6791
25,124,132 UART: [art] PUB.Y = C17E66AF8DFF45636CF8E79D681DF8A0216A5987BD8BD2812EE12CE349C822F601ED0F7B8560FA8623FEF068A641ECCF
25,131,427 UART: [art] SIG.R = D9E520EAB93A3C333DCA716E51E78437B0421E1F95E292D356665262219C8974993A0E2ACD6363F69E0969927A1F637E
25,138,772 UART: [art] SIG.S = 73EB086DBDD0F4D6971B181EC17F7A67510CFA252BF9BBA7702D8C0DD40583E29317A28DF78ADF0E8DD4948AC1AA0368
26,117,243 UART: Caliptra RT
26,117,942 UART: [state] CFI Enabled
26,282,745 UART: [rt] RT listening for mailbox commands...
26,285,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,441,176 UART: [rt]cmd =0x41544d4e, len=14344
30,371,802 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,679 UART:
193,114 UART: Running Caliptra ROM ...
194,464 UART:
603,799 UART: [state] CFI Enabled
614,434 UART: [state] LifecycleState = Unprovisioned
616,807 UART: [state] DebugLocked = No
619,392 UART: [state] WD Timer not started. Device not locked for debugging
623,409 UART: [kat] SHA2-256
813,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,085 UART: [kat] ++
824,604 UART: [kat] sha1
837,240 UART: [kat] SHA2-256
840,240 UART: [kat] SHA2-384
845,650 UART: [kat] SHA2-512-ACC
848,239 UART: [kat] ECC-384
3,291,543 UART: [kat] HMAC-384Kdf
3,305,342 UART: [kat] LMS
3,837,177 UART: [kat] --
3,841,820 UART: [cold-reset] ++
3,842,681 UART: [fht] FHT @ 0x50003400
3,854,494 UART: [idev] ++
3,855,193 UART: [idev] CDI.KEYID = 6
3,856,140 UART: [idev] SUBJECT.KEYID = 7
3,857,375 UART: [idev] UDS.KEYID = 0
3,858,268 ready_for_fw is high
3,858,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,232 UART: [idev] Erasing UDS.KEYID = 0
6,333,220 UART: [idev] Sha1 KeyId Algorithm
6,355,739 UART: [idev] --
6,360,694 UART: [ldev] ++
6,361,385 UART: [ldev] CDI.KEYID = 6
6,362,296 UART: [ldev] SUBJECT.KEYID = 5
6,363,448 UART: [ldev] AUTHORITY.KEYID = 7
6,364,670 UART: [ldev] FE.KEYID = 1
6,375,960 UART: [ldev] Erasing FE.KEYID = 1
8,855,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,528 UART: [ldev] --
10,647,577 UART: [fwproc] Wait for Commands...
10,650,751 UART: [fwproc] Recv command 0x46574c44
10,652,998 UART: [fwproc] Recv'd Img size: 114448 bytes
14,097,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,813 >>> mbox cmd response: success
14,839,344 UART: [afmc] ++
14,840,041 UART: [afmc] CDI.KEYID = 6
14,841,203 UART: [afmc] SUBJECT.KEYID = 7
14,842,751 UART: [afmc] AUTHORITY.KEYID = 5
17,344,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,349 UART: [afmc] --
19,140,317 UART: [cold-reset] --
19,144,177 UART: [state] Locking Datavault
19,148,295 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,457 UART: [state] Locking ICCM
19,152,068 UART: [exit] Launching FMC @ 0x40000130
19,160,750 UART:
19,160,981 UART: Running Caliptra FMC ...
19,162,074 UART:
19,162,229 UART: [state] CFI Enabled
19,170,270 UART: [fht] FMC Alias Private Key: 7
20,925,794 UART: [art] Extend RT PCRs Done
20,926,997 UART: [art] Lock RT PCRs Done
20,928,711 UART: [art] Populate DV Done
20,934,221 UART: [fht] FMC Alias Private Key: 7
20,935,857 UART: [art] Derive CDI
20,936,584 UART: [art] Store in in slot 0x4
20,979,121 UART: [art] Derive Key Pair
20,980,156 UART: [art] Store priv key in slot 0x5
23,407,112 UART: [art] Derive Key Pair - Done
23,420,229 UART: [art] Signing Cert with AUTHO
23,421,534 UART: RITY.KEYID = 7
25,126,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,408 UART: [art] PUB.X = B5C61ECE05C60B631CB7D39F397E49AC2FA794F9D2F5B7FD644BEDE494C9D0914E5C3BA06B6E0DBC40E722E005816AE7
25,135,735 UART: [art] PUB.Y = B958AA4A7BF0D430827EBE1BFABEF4912E8EA20674D9F7D406E21CB3A8BF869E9C8A6BBBCFEF933A57AD795B7E12ABAD
25,143,004 UART: [art] SIG.R = 8DEA6A1462F3E378B2F1690EC1F7593635BD933A5F57D14F98FF49BAFA7194B03531742B8CEC6A36EBD884AB605B1EF2
25,150,433 UART: [art] SIG.S = 7CBBEBDDEBA8630350F105664C088075C3BCFE9A4B2601F95E9DD4DB3407B837907D222460B76F924A7485CC567042A9
26,128,578 UART: Caliptra RT
26,129,288 UART: [state] CFI Enabled
26,246,901 UART: [rt] RT listening for mailbox commands...
26,249,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,404,620 UART: [rt]cmd =0x41544d4e, len=14344
30,335,318 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,883 writing to cptra_bootfsm_go
3,755,241 ready_for_fw is high
3,755,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,443 >>> mbox cmd response: success
19,217,928 UART:
19,218,339 UART: Running Caliptra FMC ...
19,219,489 UART:
19,219,647 UART: [state] CFI Enabled
19,227,742 UART: [fht] FMC Alias Private Key: 7
20,985,113 UART: [art] Extend RT PCRs Done
20,986,329 UART: [art] Lock RT PCRs Done
20,988,031 UART: [art] Populate DV Done
20,993,434 UART: [fht] FMC Alias Private Key: 7
20,995,091 UART: [art] Derive CDI
20,995,906 UART: [art] Store in in slot 0x4
21,038,444 UART: [art] Derive Key Pair
21,039,443 UART: [art] Store priv key in slot 0x5
23,466,520 UART: [art] Derive Key Pair - Done
23,479,251 UART: [art] Signing Cert with AUTHO
23,480,546 UART: RITY.KEYID = 7
25,186,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,708 UART: [art] PUB.X = 887FE06D5FD009762A4D2372B26156FDAE9DAEFC306C6591C903524FFA50D8A7930AAE10FB80A03B4668C3A097FB34D2
25,195,004 UART: [art] PUB.Y = C61C9AFB6B2A0D87BEAD31A66FA7C5FD7AD82487C1C19B40753EF8C11A93040BF43E367ECBE370551586067A0BBD7BCC
25,202,286 UART: [art] SIG.R = 1308C70AC8AD6D626F7469371C02272D037941A3EE4995CF4A07B2C1AF9149B3B97CBB3562BA63F3F9B87DD28236DCDC
25,209,679 UART: [art] SIG.S = 91B477384A3C9CB250F5E77B6E27794F0543C3339602C43C7DF140B13BAA10441EE51704D5F03BAA9DB5B1A5F6F67643
26,188,415 UART: Caliptra RT
26,189,125 UART: [state] CFI Enabled
26,306,613 UART: [rt] RT listening for mailbox commands...
26,308,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,464,672 UART: [rt]cmd =0x41544d4e, len=14344
30,394,345 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,479 UART: [kat] SHA2-256
882,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,525 UART: [kat] ++
886,677 UART: [kat] sha1
890,773 UART: [kat] SHA2-256
892,711 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,633 UART: [cold-reset] ++
1,477,175 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 ready_for_fw is high
1,481,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,942 UART: [idev] Erasing UDS.KEYID = 0
1,505,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,004 UART: [idev] --
1,514,915 UART: [ldev] ++
1,515,083 UART: [ldev] CDI.KEYID = 6
1,515,446 UART: [ldev] SUBJECT.KEYID = 5
1,515,872 UART: [ldev] AUTHORITY.KEYID = 7
1,516,335 UART: [ldev] FE.KEYID = 1
1,521,901 UART: [ldev] Erasing FE.KEYID = 1
1,546,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,992 UART: [ldev] --
1,586,399 UART: [fwproc] Waiting for Commands...
1,587,090 UART: [fwproc] Received command 0x46574c44
1,587,881 UART: [fwproc] Received Image of size 114448 bytes
2,886,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,049 >>> mbox cmd response: success
3,081,245 UART: [afmc] ++
3,081,413 UART: [afmc] CDI.KEYID = 6
3,081,775 UART: [afmc] SUBJECT.KEYID = 7
3,082,200 UART: [afmc] AUTHORITY.KEYID = 5
3,116,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,239 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,632 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,322 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,255 UART: [afmc] --
3,160,367 UART: [cold-reset] --
3,161,411 UART: [state] Locking Datavault
3,162,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,272 UART: [state] Locking ICCM
3,163,946 UART: [exit] Launching FMC @ 0x40000130
3,169,275 UART:
3,169,291 UART: Running Caliptra FMC ...
3,169,699 UART:
3,169,753 UART: [state] CFI Enabled
3,180,530 UART: [fht] FMC Alias Private Key: 7
3,288,011 UART: [art] Extend RT PCRs Done
3,288,439 UART: [art] Lock RT PCRs Done
3,290,215 UART: [art] Populate DV Done
3,298,648 UART: [fht] FMC Alias Private Key: 7
3,299,596 UART: [art] Derive CDI
3,299,876 UART: [art] Store in in slot 0x4
3,385,621 UART: [art] Derive Key Pair
3,385,981 UART: [art] Store priv key in slot 0x5
3,399,573 UART: [art] Derive Key Pair - Done
3,414,517 UART: [art] Signing Cert with AUTHO
3,414,997 UART: RITY.KEYID = 7
3,430,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,890 UART: [art] PUB.X = 121A329D42E6A32FDE78E434C480C4CE7EBF976569D80451412701C768186E4E526DFE6CAA994FA9B916A231A75ABC4C
3,437,660 UART: [art] PUB.Y = 46D980C5466FEE1E97F798805755050F37810F2D30B85C02C0EFF738525496335AC7A2109DA7898D63864B4ED79E9338
3,444,588 UART: [art] SIG.R = 4DD22C8C221F2011693D739F6A813A497C349774344764323965ABBD5E74E8FC409B7102CEEF2CEC296A536CF95C6FE1
3,451,357 UART: [art] SIG.S = 988C11E49799CFE8BF4D46959D75A038906F711383D35D83B85C69BA20792D20CDECD5534E0AFB933F3824DB98A1DF1E
3,474,943 UART: Caliptra RT
3,475,196 UART: [state] CFI Enabled
3,583,191 UART: [rt] RT listening for mailbox commands...
3,583,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,841 UART: [rt]cmd =0x41544d4e, len=14344
3,851,634 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,001 ready_for_fw is high
1,362,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,435 >>> mbox cmd response: success
2,989,687 UART:
2,989,703 UART: Running Caliptra FMC ...
2,990,111 UART:
2,990,165 UART: [state] CFI Enabled
3,000,818 UART: [fht] FMC Alias Private Key: 7
3,109,129 UART: [art] Extend RT PCRs Done
3,109,557 UART: [art] Lock RT PCRs Done
3,111,135 UART: [art] Populate DV Done
3,119,496 UART: [fht] FMC Alias Private Key: 7
3,120,486 UART: [art] Derive CDI
3,120,766 UART: [art] Store in in slot 0x4
3,206,345 UART: [art] Derive Key Pair
3,206,705 UART: [art] Store priv key in slot 0x5
3,220,127 UART: [art] Derive Key Pair - Done
3,234,866 UART: [art] Signing Cert with AUTHO
3,235,346 UART: RITY.KEYID = 7
3,250,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,901 UART: [art] PUB.X = F721F9DA127CE76E999BACD05F2ECEE0DF6A9F804FBF528A386A3ACAAD8D45160424F001D78E45D83A85F9199FC83280
3,257,681 UART: [art] PUB.Y = DC552C500FF8C037221788AA63DEC29E61AE92AC69ED8588876EC02D0D68429E43B6DDFD55F6FA4431E5653DB34B6953
3,264,633 UART: [art] SIG.R = 6940FA9AC863720F0655FC5D1D7231146D6A6C1D7834DD5CDDD1641C416EBC64D2C5D9D25D303DFDF3A6C5F3EBCC6D1F
3,271,417 UART: [art] SIG.S = DA3FF2D02645D3D31BEF34A744E1BF2CC3F01B00FE1C6C55AE5F265D8B91E018601A01E335234E3548FEFE30BCF15AD2
3,295,189 UART: Caliptra RT
3,295,442 UART: [state] CFI Enabled
3,403,647 UART: [rt] RT listening for mailbox commands...
3,404,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,417 UART: [rt]cmd =0x41544d4e, len=14344
3,672,438 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,662 UART: [cold-reset] ++
1,477,150 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 ready_for_fw is high
1,481,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,373 UART: [idev] Erasing UDS.KEYID = 0
1,506,311 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,001 UART: [idev] --
1,516,144 UART: [ldev] ++
1,516,312 UART: [ldev] CDI.KEYID = 6
1,516,675 UART: [ldev] SUBJECT.KEYID = 5
1,517,101 UART: [ldev] AUTHORITY.KEYID = 7
1,517,564 UART: [ldev] FE.KEYID = 1
1,523,154 UART: [ldev] Erasing FE.KEYID = 1
1,548,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,735 UART: [ldev] --
1,588,106 UART: [fwproc] Waiting for Commands...
1,588,855 UART: [fwproc] Received command 0x46574c44
1,589,646 UART: [fwproc] Received Image of size 114448 bytes
2,890,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,420 >>> mbox cmd response: success
3,083,534 UART: [afmc] ++
3,083,702 UART: [afmc] CDI.KEYID = 6
3,084,064 UART: [afmc] SUBJECT.KEYID = 7
3,084,489 UART: [afmc] AUTHORITY.KEYID = 5
3,120,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,560 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,445 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,135 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,852 UART: [afmc] --
3,162,854 UART: [cold-reset] --
3,163,728 UART: [state] Locking Datavault
3,164,799 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,403 UART: [state] Locking ICCM
3,165,953 UART: [exit] Launching FMC @ 0x40000130
3,171,282 UART:
3,171,298 UART: Running Caliptra FMC ...
3,171,706 UART:
3,171,849 UART: [state] CFI Enabled
3,182,458 UART: [fht] FMC Alias Private Key: 7
3,290,139 UART: [art] Extend RT PCRs Done
3,290,567 UART: [art] Lock RT PCRs Done
3,291,945 UART: [art] Populate DV Done
3,299,930 UART: [fht] FMC Alias Private Key: 7
3,301,016 UART: [art] Derive CDI
3,301,296 UART: [art] Store in in slot 0x4
3,387,009 UART: [art] Derive Key Pair
3,387,369 UART: [art] Store priv key in slot 0x5
3,400,459 UART: [art] Derive Key Pair - Done
3,415,347 UART: [art] Signing Cert with AUTHO
3,415,827 UART: RITY.KEYID = 7
3,431,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,908 UART: [art] PUB.X = B39502A5C3008C0D3EE91E8B7EC46A09EB4CCE9CB32FD1BAF190ED3A46F5CFAEDB2E51D20491BBEC773C3F8D4F5BF7A2
3,438,676 UART: [art] PUB.Y = 6B245E179D9987589310A8A1235ED9FE26681D21D43AA781265DE0A5E6DA08D77CC2FFC6D87674B627CF5F5DAFFA473D
3,445,633 UART: [art] SIG.R = 848D3EE960F191B74D049D538B8922CB555D162A13EB71BD86EF5F5DF47BDA5253CDE1881279BB7D6CC2156F2AECBC73
3,452,414 UART: [art] SIG.S = 65584375E402A181F4F473B1FED3F4682E83E1085465D459484A0C34B8EEC773C469A296A35E7C22355E7D47EB5D33DD
3,476,264 UART: Caliptra RT
3,476,609 UART: [state] CFI Enabled
3,584,396 UART: [rt] RT listening for mailbox commands...
3,585,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,778 UART: [rt]cmd =0x41544d4e, len=14344
3,852,595 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 ready_for_fw is high
1,363,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,612 >>> mbox cmd response: success
2,993,872 UART:
2,993,888 UART: Running Caliptra FMC ...
2,994,296 UART:
2,994,439 UART: [state] CFI Enabled
3,004,716 UART: [fht] FMC Alias Private Key: 7
3,113,489 UART: [art] Extend RT PCRs Done
3,113,917 UART: [art] Lock RT PCRs Done
3,115,337 UART: [art] Populate DV Done
3,123,494 UART: [fht] FMC Alias Private Key: 7
3,124,548 UART: [art] Derive CDI
3,124,828 UART: [art] Store in in slot 0x4
3,210,347 UART: [art] Derive Key Pair
3,210,707 UART: [art] Store priv key in slot 0x5
3,223,965 UART: [art] Derive Key Pair - Done
3,238,773 UART: [art] Signing Cert with AUTHO
3,239,253 UART: RITY.KEYID = 7
3,254,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,386 UART: [art] PUB.X = B7086EDF57E71A3CF82AA0DD91F92FB7128BEDA52DF41087278AB303FC3427461EEB40D963E2C15AF130BE32E44ACA3E
3,262,168 UART: [art] PUB.Y = EBEF08737D813A441CF81185DB9ECA2F4691E1768FC10B3F6991E8B352B0DB303FC0E5420DF919DA06C9B68DFBD6839F
3,269,120 UART: [art] SIG.R = 310498104B72C7460C88EEBB7C4F9A540C68653FC63D9E5011C523DECACD425D3CC0AF0B33976C2EFD4EA8C9EB3DA742
3,275,894 UART: [art] SIG.S = B7D1A83B99BEF71B0EE2E867B7D0E2195F0139B749C12A67B9FA4677DA9B08D8262EDF54C4AFACE13E9AAECEA4F494DB
3,299,678 UART: Caliptra RT
3,300,023 UART: [state] CFI Enabled
3,407,842 UART: [rt] RT listening for mailbox commands...
3,408,512 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,462 UART: [rt]cmd =0x41544d4e, len=14344
3,676,237 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
892,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,021 UART: [kat] ++
897,173 UART: [kat] sha1
901,517 UART: [kat] SHA2-256
903,457 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,438 UART: [kat] HMAC-384Kdf
922,136 UART: [kat] LMS
1,170,464 UART: [kat] --
1,171,397 UART: [cold-reset] ++
1,171,971 UART: [fht] FHT @ 0x50003400
1,174,544 UART: [idev] ++
1,174,712 UART: [idev] CDI.KEYID = 6
1,175,072 UART: [idev] SUBJECT.KEYID = 7
1,175,496 UART: [idev] UDS.KEYID = 0
1,175,841 ready_for_fw is high
1,175,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,243 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,214 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,894 >>> mbox cmd response: success
2,775,090 UART: [afmc] ++
2,775,258 UART: [afmc] CDI.KEYID = 6
2,775,620 UART: [afmc] SUBJECT.KEYID = 7
2,776,045 UART: [afmc] AUTHORITY.KEYID = 5
2,811,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,520 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,239 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,001 UART: [afmc] --
2,855,055 UART: [cold-reset] --
2,855,893 UART: [state] Locking Datavault
2,857,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,748 UART: [state] Locking ICCM
2,858,364 UART: [exit] Launching FMC @ 0x40000130
2,863,693 UART:
2,863,709 UART: Running Caliptra FMC ...
2,864,117 UART:
2,864,171 UART: [state] CFI Enabled
2,874,720 UART: [fht] FMC Alias Private Key: 7
2,982,485 UART: [art] Extend RT PCRs Done
2,982,913 UART: [art] Lock RT PCRs Done
2,984,105 UART: [art] Populate DV Done
2,992,438 UART: [fht] FMC Alias Private Key: 7
2,993,524 UART: [art] Derive CDI
2,993,804 UART: [art] Store in in slot 0x4
3,079,493 UART: [art] Derive Key Pair
3,079,853 UART: [art] Store priv key in slot 0x5
3,093,185 UART: [art] Derive Key Pair - Done
3,107,922 UART: [art] Signing Cert with AUTHO
3,108,402 UART: RITY.KEYID = 7
3,123,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,263 UART: [art] PUB.X = AFDF64234AC5B2C8CD3BF2C350E94B903ECB1E6ACA0BC7F77CA1D4CA92F95D64F933C6255492D8B8BE437262EE6720AE
3,131,052 UART: [art] PUB.Y = 964C72EBEB68BA3326F15CACB868552EEC57C0C38977A25C670610695D07BB1C4EE1CF9A69A854D2E91193205E7A2FE4
3,138,004 UART: [art] SIG.R = 3D7E4FBBAAFFE80FC6C356B3D03E901B55DCF8622F46B252C90894092806100EDBBC2000831FA0F4AEBD1DA66F730415
3,144,748 UART: [art] SIG.S = 6EE3F0D33CD69AAA6D95CA1F9E7BA5F23D8D12EC19F5B403CB50C6EF02CC1916C57CF548DB860EAFAE4DD710C1B4B813
3,168,472 UART: Caliptra RT
3,168,725 UART: [state] CFI Enabled
3,277,038 UART: [rt] RT listening for mailbox commands...
3,277,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,724 UART: [rt]cmd =0x41544d4e, len=14344
3,545,173 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,679 ready_for_fw is high
1,059,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,653 >>> mbox cmd response: success
2,688,769 UART:
2,688,785 UART: Running Caliptra FMC ...
2,689,193 UART:
2,689,247 UART: [state] CFI Enabled
2,700,000 UART: [fht] FMC Alias Private Key: 7
2,807,897 UART: [art] Extend RT PCRs Done
2,808,325 UART: [art] Lock RT PCRs Done
2,809,933 UART: [art] Populate DV Done
2,818,320 UART: [fht] FMC Alias Private Key: 7
2,819,424 UART: [art] Derive CDI
2,819,704 UART: [art] Store in in slot 0x4
2,905,529 UART: [art] Derive Key Pair
2,905,889 UART: [art] Store priv key in slot 0x5
2,918,707 UART: [art] Derive Key Pair - Done
2,933,282 UART: [art] Signing Cert with AUTHO
2,933,762 UART: RITY.KEYID = 7
2,949,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,861 UART: [art] PUB.X = 4C46A4D40A40338289B061D7EC1D5BF67568B912CBF96ACD242336BF08C55234E0E8E8A989694FE08AAE66AE71368896
2,956,627 UART: [art] PUB.Y = B9B9D799A302B1A459EB2907A82BE8B028C8FE4800C30E59B84F0441DDC2D1259A8B57E0A1B5CE6F0760861602FAD346
2,963,543 UART: [art] SIG.R = CF08AC97DDB61ED2959117831F52ED066D314DE7345E745BB5A17168EC778352E162FFDA1D8A3AC96F9CA600142A80F1
2,970,293 UART: [art] SIG.S = CF3BB58CFBFA0E87B487D2ADCFBD966CD4881A3C92A888E50C56B7912871DE2A9206DE8E3D934699A2E913AC047E80D4
2,994,758 UART: Caliptra RT
2,995,011 UART: [state] CFI Enabled
3,102,557 UART: [rt] RT listening for mailbox commands...
3,103,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,465 UART: [rt]cmd =0x41544d4e, len=14344
3,370,780 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,137 UART: [kat] LMS
1,171,465 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,173,016 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 ready_for_fw is high
1,176,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,433 UART: [idev] Erasing UDS.KEYID = 0
1,201,382 UART: [idev] Sha1 KeyId Algorithm
1,209,850 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,648 UART: [ldev] Erasing FE.KEYID = 1
1,244,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,396 UART: [ldev] --
1,283,739 UART: [fwproc] Wait for Commands...
1,284,317 UART: [fwproc] Recv command 0x46574c44
1,285,045 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,025 >>> mbox cmd response: success
2,777,077 UART: [afmc] ++
2,777,245 UART: [afmc] CDI.KEYID = 6
2,777,607 UART: [afmc] SUBJECT.KEYID = 7
2,778,032 UART: [afmc] AUTHORITY.KEYID = 5
2,813,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,680 UART: [afmc] --
2,856,732 UART: [cold-reset] --
2,857,478 UART: [state] Locking Datavault
2,858,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,123 UART: [state] Locking ICCM
2,859,575 UART: [exit] Launching FMC @ 0x40000130
2,864,904 UART:
2,864,920 UART: Running Caliptra FMC ...
2,865,328 UART:
2,865,471 UART: [state] CFI Enabled
2,875,894 UART: [fht] FMC Alias Private Key: 7
2,984,559 UART: [art] Extend RT PCRs Done
2,984,987 UART: [art] Lock RT PCRs Done
2,987,015 UART: [art] Populate DV Done
2,995,444 UART: [fht] FMC Alias Private Key: 7
2,996,596 UART: [art] Derive CDI
2,996,876 UART: [art] Store in in slot 0x4
3,082,577 UART: [art] Derive Key Pair
3,082,937 UART: [art] Store priv key in slot 0x5
3,096,315 UART: [art] Derive Key Pair - Done
3,110,869 UART: [art] Signing Cert with AUTHO
3,111,349 UART: RITY.KEYID = 7
3,126,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,604 UART: [art] PUB.X = BFC011F497BE918D7CAC09CA69CBADA8C9BEC219C13FD45D0B4E388114FAD6CAC1D2B899816C207373650D4C849DFCD3
3,134,387 UART: [art] PUB.Y = E4938EFA63AF2B54233F5FA03D5B7BE19F115E855B7AC9280252A3941350C5317B9667357D052EE90FEFB61BE53B755B
3,141,332 UART: [art] SIG.R = 67AC8713A9A59494DF27B2EAA9019A584133EB869A00A98D21DFDD93886F23FB144B063D1920026665E6DE29BD61165C
3,148,071 UART: [art] SIG.S = 36942483EBD72A8BFBE14B28EADD1C617851917807095ECBFCBBC289584B9B2AF9A99E86FD560D3B03D02819E5D15EE7
3,172,054 UART: Caliptra RT
3,172,399 UART: [state] CFI Enabled
3,281,548 UART: [rt] RT listening for mailbox commands...
3,282,218 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,228 UART: [rt]cmd =0x41544d4e, len=14344
3,549,597 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 ready_for_fw is high
1,060,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,132 >>> mbox cmd response: success
2,690,568 UART:
2,690,584 UART: Running Caliptra FMC ...
2,690,992 UART:
2,691,135 UART: [state] CFI Enabled
2,701,486 UART: [fht] FMC Alias Private Key: 7
2,810,297 UART: [art] Extend RT PCRs Done
2,810,725 UART: [art] Lock RT PCRs Done
2,812,103 UART: [art] Populate DV Done
2,820,472 UART: [fht] FMC Alias Private Key: 7
2,821,564 UART: [art] Derive CDI
2,821,844 UART: [art] Store in in slot 0x4
2,907,071 UART: [art] Derive Key Pair
2,907,431 UART: [art] Store priv key in slot 0x5
2,920,299 UART: [art] Derive Key Pair - Done
2,935,286 UART: [art] Signing Cert with AUTHO
2,935,766 UART: RITY.KEYID = 7
2,951,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,809 UART: [art] PUB.X = 34F6BEF4C15E106D20DA2D7D629A1D538B743D5D3FFBFA79F7B8AD6AC84177A34BBE3514A57D2C9C5777F375E1361124
2,958,591 UART: [art] PUB.Y = AD48CB828B7202C24D749AA5F507BECC7F1BFDE52935991427619A20D685752F22BDD5CADA75E9BDB6192E32E5E19C37
2,965,547 UART: [art] SIG.R = 0402ACA98B452755197C84B5C88DDB387389FE8053E2F1E0D044A56D993B8FB6AFB57510865B89D4374FB87739E5A9B9
2,972,311 UART: [art] SIG.S = 0EE1B3F2B0EB8324BD4DCD0096ACFC03ADAE52BA64966C89255925ACEA67E7F0F56C17AC0BE4A37BFBA1EB58CCA3E9D0
2,996,133 UART: Caliptra RT
2,996,478 UART: [state] CFI Enabled
3,105,141 UART: [rt] RT listening for mailbox commands...
3,105,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,963 UART: [rt]cmd =0x41544d4e, len=14344
3,373,926 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,556 UART: [kat] HMAC-384Kdf
920,188 UART: [kat] LMS
1,168,500 UART: [kat] --
1,169,271 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,497 UART: [idev] ++
1,172,665 UART: [idev] CDI.KEYID = 6
1,173,026 UART: [idev] SUBJECT.KEYID = 7
1,173,451 UART: [idev] UDS.KEYID = 0
1,173,797 ready_for_fw is high
1,173,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,069 UART: [idev] Erasing UDS.KEYID = 0
1,197,985 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] --
1,207,936 UART: [ldev] ++
1,208,104 UART: [ldev] CDI.KEYID = 6
1,208,468 UART: [ldev] SUBJECT.KEYID = 5
1,208,895 UART: [ldev] AUTHORITY.KEYID = 7
1,209,358 UART: [ldev] FE.KEYID = 1
1,214,712 UART: [ldev] Erasing FE.KEYID = 1
1,240,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,138 UART: [ldev] --
1,279,458 UART: [fwproc] Wait for Commands...
1,280,205 UART: [fwproc] Recv command 0x46574c44
1,280,938 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,436 >>> mbox cmd response: success
2,773,607 UART: [afmc] ++
2,773,775 UART: [afmc] CDI.KEYID = 6
2,774,138 UART: [afmc] SUBJECT.KEYID = 7
2,774,564 UART: [afmc] AUTHORITY.KEYID = 5
2,810,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,904 UART: [afmc] --
2,853,852 UART: [cold-reset] --
2,854,686 UART: [state] Locking Datavault
2,855,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,537 UART: [state] Locking ICCM
2,857,129 UART: [exit] Launching FMC @ 0x40000130
2,862,458 UART:
2,862,474 UART: Running Caliptra FMC ...
2,862,882 UART:
2,862,936 UART: [state] CFI Enabled
2,873,149 UART: [fht] FMC Alias Private Key: 7
2,981,372 UART: [art] Extend RT PCRs Done
2,981,800 UART: [art] Lock RT PCRs Done
2,983,278 UART: [art] Populate DV Done
2,991,555 UART: [fht] FMC Alias Private Key: 7
2,992,519 UART: [art] Derive CDI
2,992,799 UART: [art] Store in in slot 0x4
3,078,402 UART: [art] Derive Key Pair
3,078,762 UART: [art] Store priv key in slot 0x5
3,091,984 UART: [art] Derive Key Pair - Done
3,106,636 UART: [art] Signing Cert with AUTHO
3,107,116 UART: RITY.KEYID = 7
3,122,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,991 UART: [art] PUB.X = E1DF47E370CC1A7A67FFD30707829BC92DCA5D1790D9A4D52FFBE7B6C7FB4E651BB5DAC64426A21344A26199CAA5CC63
3,129,775 UART: [art] PUB.Y = 076BE61CE497752C1883552B37FE16498C03E53A8E40FAADCE2A12DE721A4B02BF4843883785E9CC7FC7841AD63C9304
3,136,717 UART: [art] SIG.R = D54CD482A23541C07F21036A5C57E2DEE6682A8A23C5532263026FF8313DB61253B4E5105874C65029C9E875C036E239
3,143,471 UART: [art] SIG.S = 0CC0FDF53352A15F68D8348D7E438FFE743C80AF58857B371E914FE5EA83F39E25D12F09618CAD112EA858148681A0A0
3,167,530 UART: Caliptra RT
3,167,783 UART: [state] CFI Enabled
3,274,860 UART: [rt] RT listening for mailbox commands...
3,275,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,564 UART: [rt]cmd =0x41544d4e, len=14344
3,543,481 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 ready_for_fw is high
1,056,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,752 >>> mbox cmd response: success
2,685,148 UART:
2,685,164 UART: Running Caliptra FMC ...
2,685,572 UART:
2,685,626 UART: [state] CFI Enabled
2,696,035 UART: [fht] FMC Alias Private Key: 7
2,804,080 UART: [art] Extend RT PCRs Done
2,804,508 UART: [art] Lock RT PCRs Done
2,806,210 UART: [art] Populate DV Done
2,814,253 UART: [fht] FMC Alias Private Key: 7
2,815,371 UART: [art] Derive CDI
2,815,651 UART: [art] Store in in slot 0x4
2,901,812 UART: [art] Derive Key Pair
2,902,172 UART: [art] Store priv key in slot 0x5
2,915,502 UART: [art] Derive Key Pair - Done
2,930,039 UART: [art] Signing Cert with AUTHO
2,930,519 UART: RITY.KEYID = 7
2,945,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,362 UART: [art] PUB.X = 2CA5A7A7B52B1D746B3BB76808088DB5E55D970DFBFA74FEF190CEFE8330380923A88EEA34041A204452E7B503105C7F
2,953,122 UART: [art] PUB.Y = 2B122140070E7EE7179F32E8D5EAABD21978C4DDDB31E626F8127AE42409C51C222161AE131E3921FAF91F56C476389E
2,960,065 UART: [art] SIG.R = 1166B7FECAE0A9CBFF7B35615EFF8ABB3DFD7B82D275333C1DFB3651B8C5525E9B4573FC7EFAC6702E470AB9633AC270
2,966,854 UART: [art] SIG.S = D615AF467DAC1A18444E835116EAB25DD09813AC4EFA86D84376F326BB5324FEC9457179D3CBD7BD1DEB107FCF5A5BDA
2,991,007 UART: Caliptra RT
2,991,260 UART: [state] CFI Enabled
3,099,681 UART: [rt] RT listening for mailbox commands...
3,100,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,489 UART: [rt]cmd =0x41544d4e, len=14344
3,367,926 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,224 UART: [kat] SHA2-256
902,164 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 ready_for_fw is high
1,174,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,241,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,155 UART: [fwproc] Wait for Commands...
1,281,756 UART: [fwproc] Recv command 0x46574c44
1,282,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,521 >>> mbox cmd response: success
2,774,566 UART: [afmc] ++
2,774,734 UART: [afmc] CDI.KEYID = 6
2,775,097 UART: [afmc] SUBJECT.KEYID = 7
2,775,523 UART: [afmc] AUTHORITY.KEYID = 5
2,811,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,432 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,367 UART: [afmc] --
2,854,321 UART: [cold-reset] --
2,855,285 UART: [state] Locking Datavault
2,856,762 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,366 UART: [state] Locking ICCM
2,857,922 UART: [exit] Launching FMC @ 0x40000130
2,863,251 UART:
2,863,267 UART: Running Caliptra FMC ...
2,863,675 UART:
2,863,818 UART: [state] CFI Enabled
2,874,555 UART: [fht] FMC Alias Private Key: 7
2,982,522 UART: [art] Extend RT PCRs Done
2,982,950 UART: [art] Lock RT PCRs Done
2,984,310 UART: [art] Populate DV Done
2,992,639 UART: [fht] FMC Alias Private Key: 7
2,993,807 UART: [art] Derive CDI
2,994,087 UART: [art] Store in in slot 0x4
3,079,708 UART: [art] Derive Key Pair
3,080,068 UART: [art] Store priv key in slot 0x5
3,093,574 UART: [art] Derive Key Pair - Done
3,108,277 UART: [art] Signing Cert with AUTHO
3,108,757 UART: RITY.KEYID = 7
3,123,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,756 UART: [art] PUB.X = 0DA67860A998E39050F685D860D48B7ED725310E7D8DD8490C19D03DF871FD9F2AADD673D18E9280FAAFEE483D6EE966
3,131,527 UART: [art] PUB.Y = 189BAB4A31FFBF9AF920832BE36F4B93A634C306A7A3476FC3ACE7268BE6DAE072BF951CB14B7355EFFF49B7B5BFF031
3,138,496 UART: [art] SIG.R = 5C1C905CC4CA85F36EA6FE155875AF86DEB166B828EEC351264EBCE9A732424A13A59F701E268B6DE19288BF63CEB967
3,145,278 UART: [art] SIG.S = CB169BE7C998E0BB6B69E026B82E246D6939C5500B5B61366BF478C1026CEB882B8618A720FAB9D29B776A038DB3F260
3,169,368 UART: Caliptra RT
3,169,713 UART: [state] CFI Enabled
3,277,748 UART: [rt] RT listening for mailbox commands...
3,278,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,220 UART: [rt]cmd =0x41544d4e, len=14344
3,545,831 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,885 ready_for_fw is high
1,056,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,881 >>> mbox cmd response: success
2,686,919 UART:
2,686,935 UART: Running Caliptra FMC ...
2,687,343 UART:
2,687,486 UART: [state] CFI Enabled
2,698,289 UART: [fht] FMC Alias Private Key: 7
2,806,264 UART: [art] Extend RT PCRs Done
2,806,692 UART: [art] Lock RT PCRs Done
2,808,286 UART: [art] Populate DV Done
2,816,339 UART: [fht] FMC Alias Private Key: 7
2,817,359 UART: [art] Derive CDI
2,817,639 UART: [art] Store in in slot 0x4
2,903,698 UART: [art] Derive Key Pair
2,904,058 UART: [art] Store priv key in slot 0x5
2,916,964 UART: [art] Derive Key Pair - Done
2,931,359 UART: [art] Signing Cert with AUTHO
2,931,839 UART: RITY.KEYID = 7
2,947,289 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,054 UART: [art] PUB.X = 94C90B68084991E846BD650B6A5DED256560F78DC49D60BB64B714113635AC9667440DD98A1B55CB354A08A9211E4748
2,954,803 UART: [art] PUB.Y = A65C8583532FF964C5352DD4FE72C33EA3DA63CF4EEE2F7E0306D5CEE9CA1917B593E0A6FAB1942BFECABCF7CA87CAED
2,961,779 UART: [art] SIG.R = 1CEE614F52FD5FD559D32AC9BA3AA754FA4F4B60680E8E7F307A4081BB492B223583F5F405B2D2DEDD5F60D5AA3553A5
2,968,559 UART: [art] SIG.S = F69513AA6916C2EAAFC64BFDF2CB233C70531E39BC02EB7790D66A52CC12A3F2256DBF6B366A4F7ED31694CF816B9E0C
2,992,358 UART: Caliptra RT
2,992,703 UART: [state] CFI Enabled
3,100,834 UART: [rt] RT listening for mailbox commands...
3,101,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,692 UART: [rt]cmd =0x41544d4e, len=14344
3,369,793 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,344 UART:
192,696 UART: Running Caliptra ROM ...
193,887 UART:
194,039 UART: [state] CFI Enabled
262,582 UART: [state] LifecycleState = Unprovisioned
264,553 UART: [state] DebugLocked = No
267,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,601 UART: [kat] SHA2-256
442,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,784 UART: [kat] ++
453,260 UART: [kat] sha1
464,717 UART: [kat] SHA2-256
467,360 UART: [kat] SHA2-384
472,442 UART: [kat] SHA2-512-ACC
474,813 UART: [kat] ECC-384
2,765,919 UART: [kat] HMAC-384Kdf
2,797,725 UART: [kat] LMS
3,988,041 UART: [kat] --
3,991,652 UART: [cold-reset] ++
3,993,170 UART: [fht] Storing FHT @ 0x50003400
4,003,868 UART: [idev] ++
4,004,437 UART: [idev] CDI.KEYID = 6
4,005,352 UART: [idev] SUBJECT.KEYID = 7
4,006,604 UART: [idev] UDS.KEYID = 0
4,007,676 ready_for_fw is high
4,007,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,438 UART: [idev] Erasing UDS.KEYID = 0
7,347,870 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,763 UART: [idev] --
7,374,218 UART: [ldev] ++
7,374,785 UART: [ldev] CDI.KEYID = 6
7,375,774 UART: [ldev] SUBJECT.KEYID = 5
7,376,933 UART: [ldev] AUTHORITY.KEYID = 7
7,378,214 UART: [ldev] FE.KEYID = 1
7,421,709 UART: [ldev] Erasing FE.KEYID = 1
10,754,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,537 UART: [ldev] --
13,116,225 UART: [fwproc] Waiting for Commands...
13,118,211 UART: [fwproc] Received command 0x46574c44
13,120,394 UART: [fwproc] Received Image of size 114124 bytes
21,911,848 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,998,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,067,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,385,434 >>> mbox cmd response: success
22,389,215 UART: [afmc] ++
22,389,814 UART: [afmc] CDI.KEYID = 6
22,390,761 UART: [afmc] SUBJECT.KEYID = 7
22,391,978 UART: [afmc] AUTHORITY.KEYID = 5
25,764,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,064,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,067,199 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,081,754 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,096,532 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,110,745 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,131,267 UART: [afmc] --
28,135,460 UART: [cold-reset] --
28,138,996 UART: [state] Locking Datavault
28,143,340 UART: [state] Locking PCR0, PCR1 and PCR31
28,145,132 UART: [state] Locking ICCM
28,146,775 UART: [exit] Launching FMC @ 0x40000130
28,155,186 UART:
28,155,423 UART: Running Caliptra FMC ...
28,156,523 UART:
28,156,681 UART: [state] CFI Enabled
28,223,646 UART: [fht] FMC Alias Private Key: 7
30,561,410 UART: [art] Extend RT PCRs Done
30,562,627 UART: [art] Lock RT PCRs Done
30,564,549 UART: [art] Populate DV Done
30,570,011 UART: [fht] FMC Alias Private Key: 7
30,571,551 UART: [art] Derive CDI
30,572,315 UART: [art] Store in in slot 0x4
30,631,636 UART: [art] Derive Key Pair
30,632,678 UART: [art] Store priv key in slot 0x5
33,925,051 UART: [art] Derive Key Pair - Done
33,938,209 UART: [art] Signing Cert with AUTHO
33,939,537 UART: RITY.KEYID = 7
36,226,594 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,097 UART: [art] PUB.X = 3898AA22442E6678F04FC4599303B74728DF5C3F84246DD27F6A206F80F474E720D83C96FC233AA3D4BAF11AF6970098
36,235,305 UART: [art] PUB.Y = C34437EFA88118817B1C690501E81C592210CC3640226C1FCA59C828D967FA8B3896F2F74C725AE7ADBD0A3783A69AD8
36,242,545 UART: [art] SIG.R = C183C7922D54DCF7A8133591CAA21D418D4BCD42A982F844F188D0651550CC3C54A4527ED7412FEEFD3011885571769F
36,249,946 UART: [art] SIG.S = 4B4296137C2D11B55661847DAA52B91A25AB05BA68203BD64D09FFF1D0AFC51DD6858E38AF4D83745B455267E07CD67B
37,554,993 UART: Caliptra RT
37,555,705 UART: [state] CFI Enabled
37,716,434 UART: [rt] RT listening for mailbox commands...
37,718,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,874,148 UART: [rt]cmd =0x41544d4e, len=14344
44,173,298 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,804,593 ready_for_fw is high
3,804,971 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,783,865 >>> mbox cmd response: success
27,473,365 UART:
27,473,734 UART: Running Caliptra FMC ...
27,474,930 UART:
27,475,097 UART: [state] CFI Enabled
27,542,712 UART: [fht] FMC Alias Private Key: 7
29,880,492 UART: [art] Extend RT PCRs Done
29,881,726 UART: [art] Lock RT PCRs Done
29,883,656 UART: [art] Populate DV Done
29,889,149 UART: [fht] FMC Alias Private Key: 7
29,890,645 UART: [art] Derive CDI
29,891,416 UART: [art] Store in in slot 0x4
29,952,582 UART: [art] Derive Key Pair
29,953,633 UART: [art] Store priv key in slot 0x5
33,246,629 UART: [art] Derive Key Pair - Done
33,259,525 UART: [art] Signing Cert with AUTHO
33,260,858 UART: RITY.KEYID = 7
35,548,084 UART: [art] Erasing AUTHORITY.KEYID = 7
35,549,588 UART: [art] PUB.X = 5790D62228D4C0A46DFBF9C07B1A99E7CD060B1231BE897860A4C4E340184390369395471BEA9998D085AFB5A7632382
35,556,842 UART: [art] PUB.Y = 0E0DCA713D4723B0AE68A51C2F1AB4C915727B1F1A7ADE62412F2858E6CCBF5F27CCA296AC064ECC4C517E3791952B62
35,564,048 UART: [art] SIG.R = CC08BB597CC4DD0EADA5445EE5125FB831E22073C88A396F4CC43A254D797B30C5402896A71C2D67686E2D97729F5F3E
35,571,439 UART: [art] SIG.S = 6B9D3328A882A728FD42F3E7621A26B679EA29CC84BC9D08085CB4BB2A0CB4BBB09F3B0F99B135979D45BE9CD899B2CC
36,876,273 UART: Caliptra RT
36,876,984 UART: [state] CFI Enabled
37,038,841 UART: [rt] RT listening for mailbox commands...
37,041,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,196,298 UART: [rt]cmd =0x41544d4e, len=14344
43,469,068 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,535 UART:
192,896 UART: Running Caliptra ROM ...
193,998 UART:
603,801 UART: [state] CFI Enabled
620,245 UART: [state] LifecycleState = Unprovisioned
622,218 UART: [state] DebugLocked = No
625,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,545 UART: [kat] SHA2-256
799,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,834 UART: [kat] ++
810,350 UART: [kat] sha1
822,848 UART: [kat] SHA2-256
825,525 UART: [kat] SHA2-384
831,164 UART: [kat] SHA2-512-ACC
833,528 UART: [kat] ECC-384
3,117,814 UART: [kat] HMAC-384Kdf
3,130,714 UART: [kat] LMS
4,320,860 UART: [kat] --
4,324,743 UART: [cold-reset] ++
4,326,392 UART: [fht] Storing FHT @ 0x50003400
4,338,790 UART: [idev] ++
4,339,358 UART: [idev] CDI.KEYID = 6
4,340,351 UART: [idev] SUBJECT.KEYID = 7
4,341,594 UART: [idev] UDS.KEYID = 0
4,342,697 ready_for_fw is high
4,342,915 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,294 UART: [idev] Erasing UDS.KEYID = 0
7,629,089 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,941 UART: [idev] --
7,653,829 UART: [ldev] ++
7,654,398 UART: [ldev] CDI.KEYID = 6
7,655,363 UART: [ldev] SUBJECT.KEYID = 5
7,656,565 UART: [ldev] AUTHORITY.KEYID = 7
7,657,849 UART: [ldev] FE.KEYID = 1
7,668,808 UART: [ldev] Erasing FE.KEYID = 1
10,959,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,473 UART: [ldev] --
13,321,413 UART: [fwproc] Waiting for Commands...
13,323,175 UART: [fwproc] Received command 0x46574c44
13,325,352 UART: [fwproc] Received Image of size 114124 bytes
22,277,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,358,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,427,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,745,837 >>> mbox cmd response: success
22,749,211 UART: [afmc] ++
22,749,810 UART: [afmc] CDI.KEYID = 6
22,750,702 UART: [afmc] SUBJECT.KEYID = 7
22,751,964 UART: [afmc] AUTHORITY.KEYID = 5
26,063,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,359,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,361,549 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,376,064 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,390,815 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,405,043 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,426,988 UART: [afmc] --
28,430,849 UART: [cold-reset] --
28,433,050 UART: [state] Locking Datavault
28,438,795 UART: [state] Locking PCR0, PCR1 and PCR31
28,440,546 UART: [state] Locking ICCM
28,443,023 UART: [exit] Launching FMC @ 0x40000130
28,451,415 UART:
28,451,645 UART: Running Caliptra FMC ...
28,452,743 UART:
28,452,903 UART: [state] CFI Enabled
28,461,545 UART: [fht] FMC Alias Private Key: 7
30,792,237 UART: [art] Extend RT PCRs Done
30,793,463 UART: [art] Lock RT PCRs Done
30,795,302 UART: [art] Populate DV Done
30,800,601 UART: [fht] FMC Alias Private Key: 7
30,802,133 UART: [art] Derive CDI
30,802,888 UART: [art] Store in in slot 0x4
30,845,531 UART: [art] Derive Key Pair
30,846,548 UART: [art] Store priv key in slot 0x5
34,087,826 UART: [art] Derive Key Pair - Done
34,100,997 UART: [art] Signing Cert with AUTHO
34,102,309 UART: RITY.KEYID = 7
36,381,386 UART: [art] Erasing AUTHORITY.KEYID = 7
36,383,315 UART: [art] PUB.X = 3143FB325368EC84F0B3BD577D2538F479AB20B3320F597F778B8F3FD3B8227358DB36154A298C1EE2D1F99DD393F48D
36,390,167 UART: [art] PUB.Y = D1268F92ADCF6C75AA0728B5EB25DA76517A2FC0460DA216D0EF44A457DA719F52F5D1F1EA6CBCA60F1F0D7488A9485E
36,397,438 UART: [art] SIG.R = BEA28BDD4F4FE36E3726B668E8A0A9D67102BEF8A823320D52F5957A98D23914EA66E1E12F623B2985E317609F05ABFF
36,404,822 UART: [art] SIG.S = BB51ED829C0FBD35E09EB2C3BBB748336A957B4D85F2D58F621720783C48F120B71A7EE2AE2FA3CB0F62BCB7F6C63927
37,709,402 UART: Caliptra RT
37,710,124 UART: [state] CFI Enabled
37,828,551 UART: [rt] RT listening for mailbox commands...
37,830,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,986,330 UART: [rt]cmd =0x41544d4e, len=14344
44,207,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,128,606 ready_for_fw is high
4,129,023 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,115,026 >>> mbox cmd response: success
27,759,421 UART:
27,759,809 UART: Running Caliptra FMC ...
27,761,001 UART:
27,761,190 UART: [state] CFI Enabled
27,769,129 UART: [fht] FMC Alias Private Key: 7
30,100,413 UART: [art] Extend RT PCRs Done
30,101,952 UART: [art] Lock RT PCRs Done
30,102,962 UART: [art] Populate DV Done
30,108,504 UART: [fht] FMC Alias Private Key: 7
30,110,152 UART: [art] Derive CDI
30,110,887 UART: [art] Store in in slot 0x4
30,153,637 UART: [art] Derive Key Pair
30,154,636 UART: [art] Store priv key in slot 0x5
33,396,800 UART: [art] Derive Key Pair - Done
33,409,828 UART: [art] Signing Cert with AUTHO
33,411,128 UART: RITY.KEYID = 7
35,690,432 UART: [art] Erasing AUTHORITY.KEYID = 7
35,691,950 UART: [art] PUB.X = 540C644A712FB5EC5C757B58AEDD042C8814A6D89647469F1A32CF394BCF53628604D0D457E3635B7AD3A9CB454BB7E4
35,699,220 UART: [art] PUB.Y = 7CEDEB1FAE5456EF5F8D3ED0544C3D9D02FE8589C7FD6886EA60A01F312C4A4E41D3336FF07A84840126170F0FBAD0EF
35,706,491 UART: [art] SIG.R = 22F2FF3783EA7883D8A35E595866479D8007E96D8167B11BA427299E56DD71D467F99B5B05ECDEB55C2D797D7D396192
35,713,828 UART: [art] SIG.S = 438FEF688DFFD2B8F8FA35DB48D6E3CA2F829D99A180A3D7691E40201CB7B10DE3C5DF6740E9291EE4A25DD5B2FD74D2
37,019,110 UART: Caliptra RT
37,019,830 UART: [state] CFI Enabled
37,137,872 UART: [rt] RT listening for mailbox commands...
37,140,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,295,600 UART: [rt]cmd =0x41544d4e, len=14344
43,542,567 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,091 UART:
192,454 UART: Running Caliptra ROM ...
193,677 UART:
193,838 UART: [state] CFI Enabled
262,084 UART: [state] LifecycleState = Unprovisioned
263,907 UART: [state] DebugLocked = No
265,225 UART: [state] WD Timer not started. Device not locked for debugging
269,186 UART: [kat] SHA2-256
448,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,832 UART: [kat] ++
460,370 UART: [kat] sha1
471,382 UART: [kat] SHA2-256
474,399 UART: [kat] SHA2-384
480,750 UART: [kat] SHA2-512-ACC
483,687 UART: [kat] ECC-384
2,946,904 UART: [kat] HMAC-384Kdf
2,971,639 UART: [kat] LMS
3,501,033 UART: [kat] --
3,507,275 UART: [cold-reset] ++
3,508,642 UART: [fht] FHT @ 0x50003400
3,520,404 UART: [idev] ++
3,520,968 UART: [idev] CDI.KEYID = 6
3,521,948 UART: [idev] SUBJECT.KEYID = 7
3,523,118 UART: [idev] UDS.KEYID = 0
3,524,039 ready_for_fw is high
3,524,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,176 UART: [idev] Erasing UDS.KEYID = 0
6,024,611 UART: [idev] Sha1 KeyId Algorithm
6,046,864 UART: [idev] --
6,051,066 UART: [ldev] ++
6,051,637 UART: [ldev] CDI.KEYID = 6
6,052,547 UART: [ldev] SUBJECT.KEYID = 5
6,053,706 UART: [ldev] AUTHORITY.KEYID = 7
6,054,890 UART: [ldev] FE.KEYID = 1
6,100,670 UART: [ldev] Erasing FE.KEYID = 1
8,604,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,412 UART: [ldev] --
10,414,489 UART: [fwproc] Wait for Commands...
10,416,804 UART: [fwproc] Recv command 0x46574c44
10,418,895 UART: [fwproc] Recv'd Img size: 114448 bytes
14,965,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,038,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,106,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,424,454 >>> mbox cmd response: success
15,428,173 UART: [afmc] ++
15,428,780 UART: [afmc] CDI.KEYID = 6
15,429,713 UART: [afmc] SUBJECT.KEYID = 7
15,430,818 UART: [afmc] AUTHORITY.KEYID = 5
17,964,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,687,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,689,777 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,705,760 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,721,733 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,737,484 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,759,357 UART: [afmc] --
19,762,735 UART: [cold-reset] --
19,767,781 UART: [state] Locking Datavault
19,773,411 UART: [state] Locking PCR0, PCR1 and PCR31
19,775,052 UART: [state] Locking ICCM
19,777,614 UART: [exit] Launching FMC @ 0x40000130
19,786,055 UART:
19,786,289 UART: Running Caliptra FMC ...
19,787,411 UART:
19,787,575 UART: [state] CFI Enabled
19,844,703 UART: [fht] FMC Alias Private Key: 7
21,608,567 UART: [art] Extend RT PCRs Done
21,609,784 UART: [art] Lock RT PCRs Done
21,611,676 UART: [art] Populate DV Done
21,617,029 UART: [fht] FMC Alias Private Key: 7
21,618,733 UART: [art] Derive CDI
21,619,543 UART: [art] Store in in slot 0x4
21,676,966 UART: [art] Derive Key Pair
21,678,007 UART: [art] Store priv key in slot 0x5
24,141,304 UART: [art] Derive Key Pair - Done
24,154,242 UART: [art] Signing Cert with AUTHO
24,155,548 UART: RITY.KEYID = 7
25,867,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,869,084 UART: [art] PUB.X = 628BABF8A266F09B41E8AADB39B3E2A6ABE5CE0C1CF69C6A1876D9E3822F288F73802E922A0E3E0D8A4513EECB4655AF
25,876,398 UART: [art] PUB.Y = 888860884A31FE59F8E1177D905DB2AEDDC637DAF31026DDD215BF7C6ACB10681A65814EDEF079D4F76832AAE1F2AF93
25,883,678 UART: [art] SIG.R = 1729856CC43AEF3A3D4FE09ACFBC0A34E47805D4DCED64631E332405DCBC4EE57C930CA54D00307ED71BC1F94DC0215A
25,891,065 UART: [art] SIG.S = 0F69B8367B04614BF0E986BA23D458FF742AD717FA98D384B611BEB5C53A9049CC3F088FF33631216F14034EC4D87C33
26,869,611 UART: Caliptra RT
26,870,356 UART: [state] CFI Enabled
27,035,216 UART: [rt] RT listening for mailbox commands...
27,037,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,193,219 UART: [rt]cmd =0x41544d4e, len=14344
30,769,872 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,361,055 ready_for_fw is high
3,361,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,038,045 >>> mbox cmd response: success
19,325,649 UART:
19,326,056 UART: Running Caliptra FMC ...
19,327,196 UART:
19,327,357 UART: [state] CFI Enabled
19,390,552 UART: [fht] FMC Alias Private Key: 7
21,154,332 UART: [art] Extend RT PCRs Done
21,155,569 UART: [art] Lock RT PCRs Done
21,157,143 UART: [art] Populate DV Done
21,162,487 UART: [fht] FMC Alias Private Key: 7
21,164,086 UART: [art] Derive CDI
21,164,903 UART: [art] Store in in slot 0x4
21,223,028 UART: [art] Derive Key Pair
21,224,069 UART: [art] Store priv key in slot 0x5
23,686,488 UART: [art] Derive Key Pair - Done
23,699,595 UART: [art] Signing Cert with AUTHO
23,700,896 UART: RITY.KEYID = 7
25,412,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,414,082 UART: [art] PUB.X = 9320739387980E6991396B0EB2D88F51E82ED8166C9E52C5B3AC566B88EB8A35A8AF48022C74C3F8D21E9B38C7E2D091
25,421,336 UART: [art] PUB.Y = C1C6A7D8F809C4C301D2EF8860227BAB9072905941E92BAA79B4CFB800BC581AD8F1DC690C7A6DA1F80CF8A799A9CFF0
25,428,635 UART: [art] SIG.R = 6A5ED5F7E7D08C222E3AFE2788861A7C4771F6650D0228FB7E214114ACF8850623BF2823D5E05C721AF365CE6FF10C80
25,435,989 UART: [art] SIG.S = 01B8BD0F01A8B5E0A070A95C29B74354176E798153B59B1F9CDC34BB0A902BCF476A494E87C611BEE34562E2AD4006CD
26,414,782 UART: Caliptra RT
26,415,488 UART: [state] CFI Enabled
26,580,522 UART: [rt] RT listening for mailbox commands...
26,582,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,738,436 UART: [rt]cmd =0x41544d4e, len=14344
30,313,848 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,612 UART:
192,973 UART: Running Caliptra ROM ...
194,115 UART:
603,916 UART: [state] CFI Enabled
618,289 UART: [state] LifecycleState = Unprovisioned
620,156 UART: [state] DebugLocked = No
623,016 UART: [state] WD Timer not started. Device not locked for debugging
625,930 UART: [kat] SHA2-256
805,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,656 UART: [kat] ++
817,099 UART: [kat] sha1
828,466 UART: [kat] SHA2-256
831,469 UART: [kat] SHA2-384
838,371 UART: [kat] SHA2-512-ACC
841,295 UART: [kat] ECC-384
3,284,627 UART: [kat] HMAC-384Kdf
3,295,933 UART: [kat] LMS
3,825,434 UART: [kat] --
3,831,081 UART: [cold-reset] ++
3,833,297 UART: [fht] FHT @ 0x50003400
3,845,202 UART: [idev] ++
3,845,814 UART: [idev] CDI.KEYID = 6
3,846,722 UART: [idev] SUBJECT.KEYID = 7
3,847,913 UART: [idev] UDS.KEYID = 0
3,848,890 ready_for_fw is high
3,849,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,662 UART: [idev] Erasing UDS.KEYID = 0
6,324,116 UART: [idev] Sha1 KeyId Algorithm
6,347,013 UART: [idev] --
6,350,841 UART: [ldev] ++
6,351,401 UART: [ldev] CDI.KEYID = 6
6,352,303 UART: [ldev] SUBJECT.KEYID = 5
6,353,506 UART: [ldev] AUTHORITY.KEYID = 7
6,354,729 UART: [ldev] FE.KEYID = 1
6,365,478 UART: [ldev] Erasing FE.KEYID = 1
8,838,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,861 UART: [ldev] --
10,630,791 UART: [fwproc] Wait for Commands...
10,633,686 UART: [fwproc] Recv command 0x46574c44
10,635,768 UART: [fwproc] Recv'd Img size: 114448 bytes
15,185,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,657,044 >>> mbox cmd response: success
15,660,785 UART: [afmc] ++
15,661,373 UART: [afmc] CDI.KEYID = 6
15,662,275 UART: [afmc] SUBJECT.KEYID = 7
15,663,482 UART: [afmc] AUTHORITY.KEYID = 5
18,162,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,882,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,884,640 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,900,604 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,916,704 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,932,367 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,955,118 UART: [afmc] --
19,958,758 UART: [cold-reset] --
19,963,367 UART: [state] Locking Datavault
19,967,903 UART: [state] Locking PCR0, PCR1 and PCR31
19,969,600 UART: [state] Locking ICCM
19,971,526 UART: [exit] Launching FMC @ 0x40000130
19,979,967 UART:
19,980,194 UART: Running Caliptra FMC ...
19,981,283 UART:
19,981,432 UART: [state] CFI Enabled
19,989,633 UART: [fht] FMC Alias Private Key: 7
21,746,398 UART: [art] Extend RT PCRs Done
21,747,611 UART: [art] Lock RT PCRs Done
21,748,974 UART: [art] Populate DV Done
21,754,382 UART: [fht] FMC Alias Private Key: 7
21,755,923 UART: [art] Derive CDI
21,756,929 UART: [art] Store in in slot 0x4
21,799,178 UART: [art] Derive Key Pair
21,800,170 UART: [art] Store priv key in slot 0x5
24,227,024 UART: [art] Derive Key Pair - Done
24,240,223 UART: [art] Signing Cert with AUTHO
24,241,548 UART: RITY.KEYID = 7
25,947,062 UART: [art] Erasing AUTHORITY.KEYID = 7
25,948,571 UART: [art] PUB.X = 5E32B7531C2C9123E0C16AC9C59CB1394F3096C7F973A7E554ADBCA48BE6E416E14363FADAA2DFCAAD72087D4757B3C8
25,955,851 UART: [art] PUB.Y = 90EA97921AD9AAA8FDFF89D08EA36143BEA4FAAC77EDCE2D04C0B1793DC22B11487E3A47F2903AA6883E810BB849E004
25,963,112 UART: [art] SIG.R = 468017CC9F4736F0A1F2E6D5A2435042B72802B6E2D7CC824A583723230B57FB799368AA56B993E0C23A6AD5858F919E
25,970,490 UART: [art] SIG.S = 5044CF8EF1355E625481BBA203764259C3F2CA88702B7453E480F308BDD2F5C634CC0044E368F8306A1A21A23DBF33E5
26,949,377 UART: Caliptra RT
26,950,094 UART: [state] CFI Enabled
27,066,489 UART: [rt] RT listening for mailbox commands...
27,068,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,224,094 UART: [rt]cmd =0x41544d4e, len=14344
30,788,989 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,692,230 ready_for_fw is high
3,692,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,264,723 >>> mbox cmd response: success
19,513,675 UART:
19,514,061 UART: Running Caliptra FMC ...
19,515,193 UART:
19,515,343 UART: [state] CFI Enabled
19,523,179 UART: [fht] FMC Alias Private Key: 7
21,280,418 UART: [art] Extend RT PCRs Done
21,281,649 UART: [art] Lock RT PCRs Done
21,283,432 UART: [art] Populate DV Done
21,288,926 UART: [fht] FMC Alias Private Key: 7
21,290,563 UART: [art] Derive CDI
21,291,333 UART: [art] Store in in slot 0x4
21,333,922 UART: [art] Derive Key Pair
21,334,918 UART: [art] Store priv key in slot 0x5
23,761,777 UART: [art] Derive Key Pair - Done
23,774,615 UART: [art] Signing Cert with AUTHO
23,775,952 UART: RITY.KEYID = 7
25,481,639 UART: [art] Erasing AUTHORITY.KEYID = 7
25,483,120 UART: [art] PUB.X = 0E0DEE21AD4083247DEBD16CDBF59A485C736A1CC838CF3A7B9B533C4BF554C05D100B35F029B84C4E09360775F480BB
25,490,431 UART: [art] PUB.Y = 13BD7747C3A4640941876B816F68EE6A1A3E935626ED4371B06F93AC35BA37DCDB8AF842D8189362DB72C9B19E9795E3
25,497,679 UART: [art] SIG.R = 798B66E3D465B64FEE71519A825F92A39E003DD941A1855E0AEE8427CF15BBDD088E4E116E2BB77D620940A1BD590DB5
25,505,027 UART: [art] SIG.S = D1B19524989EF04904A322E532EC239AF308D50D16FF8C1BB856FED5A52FBD4A81A26B3640C5B68C77B0E3A4EF2FA5D1
26,483,559 UART: Caliptra RT
26,484,270 UART: [state] CFI Enabled
26,600,701 UART: [rt] RT listening for mailbox commands...
26,603,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,758,220 UART: [rt]cmd =0x41544d4e, len=14344
30,320,829 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,042 UART:
192,447 UART: Running Caliptra ROM ...
193,574 UART:
193,726 UART: [state] CFI Enabled
265,772 UART: [state] LifecycleState = Unprovisioned
268,170 UART: [state] DebugLocked = No
271,051 UART: [state] WD Timer not started. Device not locked for debugging
276,003 UART: [kat] SHA2-256
465,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,695 UART: [kat] ++
477,173 UART: [kat] sha1
487,910 UART: [kat] SHA2-256
490,917 UART: [kat] SHA2-384
496,891 UART: [kat] SHA2-512-ACC
499,528 UART: [kat] ECC-384
2,947,249 UART: [kat] HMAC-384Kdf
2,972,326 UART: [kat] LMS
3,504,121 UART: [kat] --
3,509,562 UART: [cold-reset] ++
3,511,355 UART: [fht] FHT @ 0x50003400
3,523,395 UART: [idev] ++
3,524,106 UART: [idev] CDI.KEYID = 6
3,525,057 UART: [idev] SUBJECT.KEYID = 7
3,526,233 UART: [idev] UDS.KEYID = 0
3,527,137 ready_for_fw is high
3,527,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,472 UART: [idev] Erasing UDS.KEYID = 0
6,027,784 UART: [idev] Sha1 KeyId Algorithm
6,050,806 UART: [idev] --
6,055,890 UART: [ldev] ++
6,056,572 UART: [ldev] CDI.KEYID = 6
6,057,495 UART: [ldev] SUBJECT.KEYID = 5
6,058,657 UART: [ldev] AUTHORITY.KEYID = 7
6,059,890 UART: [ldev] FE.KEYID = 1
6,100,496 UART: [ldev] Erasing FE.KEYID = 1
8,609,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,313 UART: [ldev] --
10,413,316 UART: [fwproc] Wait for Commands...
10,416,204 UART: [fwproc] Recv command 0x46574c44
10,418,468 UART: [fwproc] Recv'd Img size: 114448 bytes
15,044,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,133,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,792,203 >>> mbox cmd response: success
15,797,062 UART: [afmc] ++
15,797,775 UART: [afmc] CDI.KEYID = 6
15,798,986 UART: [afmc] SUBJECT.KEYID = 7
15,800,430 UART: [afmc] AUTHORITY.KEYID = 5
18,342,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,067,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,069,356 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,084,416 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,099,613 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,114,455 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,137,201 UART: [afmc] --
20,140,578 UART: [cold-reset] --
20,144,986 UART: [state] Locking Datavault
20,150,616 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,764 UART: [state] Locking ICCM
20,154,538 UART: [exit] Launching FMC @ 0x40000130
20,163,152 UART:
20,163,386 UART: Running Caliptra FMC ...
20,164,508 UART:
20,164,677 UART: [state] CFI Enabled
20,222,295 UART: [fht] FMC Alias Private Key: 7
21,985,670 UART: [art] Extend RT PCRs Done
21,986,887 UART: [art] Lock RT PCRs Done
21,988,563 UART: [art] Populate DV Done
21,994,136 UART: [fht] FMC Alias Private Key: 7
21,995,789 UART: [art] Derive CDI
21,996,603 UART: [art] Store in in slot 0x4
22,055,003 UART: [art] Derive Key Pair
22,056,052 UART: [art] Store priv key in slot 0x5
24,519,206 UART: [art] Derive Key Pair - Done
24,532,527 UART: [art] Signing Cert with AUTHO
24,533,833 UART: RITY.KEYID = 7
26,245,163 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,671 UART: [art] PUB.X = E1DA657B20AD982F07E4EB94CBD69AE4BA74778D00A00984BC9E28B70E6F5A9B2139D40B58F1CB6C79FAB6AF32D4F575
26,253,966 UART: [art] PUB.Y = 6E20A046783DA25290FB26AC28C4D6FA4E9B95B902BB2EEC8590D3640A5BDBCBAEDCC2DB5CAC1F3D7A257392F7D9279A
26,261,207 UART: [art] SIG.R = 3A12CA6631B3A79516374DF531BBC04C486FB7E3A5494D7F8053F40EA8606504DBF5AC971B528FE239FD18CC5386C572
26,268,590 UART: [art] SIG.S = 36ED82BA33C4E434F27012707C8AE64F10AF30AE1D41FE17BFF122E0F70A232DDB0D375314B62C2B9A5E76EBE304604F
27,247,598 UART: Caliptra RT
27,248,288 UART: [state] CFI Enabled
27,415,491 UART: [rt] RT listening for mailbox commands...
27,417,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,573,567 UART: [rt]cmd =0x41544d4e, len=14344
31,150,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,438,760 ready_for_fw is high
3,439,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,855,771 >>> mbox cmd response: success
20,133,635 UART:
20,134,005 UART: Running Caliptra FMC ...
20,135,195 UART:
20,135,364 UART: [state] CFI Enabled
20,203,947 UART: [fht] FMC Alias Private Key: 7
21,967,189 UART: [art] Extend RT PCRs Done
21,968,405 UART: [art] Lock RT PCRs Done
21,969,924 UART: [art] Populate DV Done
21,975,491 UART: [fht] FMC Alias Private Key: 7
21,977,161 UART: [art] Derive CDI
21,977,978 UART: [art] Store in in slot 0x4
22,036,075 UART: [art] Derive Key Pair
22,037,146 UART: [art] Store priv key in slot 0x5
24,499,840 UART: [art] Derive Key Pair - Done
24,512,890 UART: [art] Signing Cert with AUTHO
24,514,216 UART: RITY.KEYID = 7
26,226,401 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,892 UART: [art] PUB.X = A8B6904133CB5DE6A66608E5A82815ED04A71D3BA1294D35E393AB93DF857B7C85AFA131075926F3E262299042652036
26,235,195 UART: [art] PUB.Y = 1B29AFDCDB4AC41B1894DE6A8FE38E88323C45A24051EA8B2F68B1C5587B415D107E8F5D340A6309A50FCDFBF3B95B1B
26,242,449 UART: [art] SIG.R = 389F281E0DF6E95299F9038DD54616F4505A853876A31280B4DD5A77C49E82944C4ED4D51BCBA3E2C55D905A016DDFC3
26,249,849 UART: [art] SIG.S = BE73EFD88ED404D6C09A2553A640A345F0B511B95A1886AFE739F4952491B6FF43EA802CE36D41C32BB1E300067CD71A
27,228,841 UART: Caliptra RT
27,229,549 UART: [state] CFI Enabled
27,396,180 UART: [rt] RT listening for mailbox commands...
27,398,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,119 UART: [rt]cmd =0x41544d4e, len=14344
31,130,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,408 UART:
192,794 UART: Running Caliptra ROM ...
193,989 UART:
603,565 UART: [state] CFI Enabled
617,402 UART: [state] LifecycleState = Unprovisioned
619,817 UART: [state] DebugLocked = No
621,987 UART: [state] WD Timer not started. Device not locked for debugging
626,161 UART: [kat] SHA2-256
816,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,889 UART: [kat] ++
827,414 UART: [kat] sha1
838,783 UART: [kat] SHA2-256
841,786 UART: [kat] SHA2-384
847,341 UART: [kat] SHA2-512-ACC
849,913 UART: [kat] ECC-384
3,292,439 UART: [kat] HMAC-384Kdf
3,305,890 UART: [kat] LMS
3,837,717 UART: [kat] --
3,842,360 UART: [cold-reset] ++
3,843,430 UART: [fht] FHT @ 0x50003400
3,855,323 UART: [idev] ++
3,855,977 UART: [idev] CDI.KEYID = 6
3,856,965 UART: [idev] SUBJECT.KEYID = 7
3,858,130 UART: [idev] UDS.KEYID = 0
3,859,046 ready_for_fw is high
3,859,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,038 UART: [idev] Erasing UDS.KEYID = 0
6,333,012 UART: [idev] Sha1 KeyId Algorithm
6,354,677 UART: [idev] --
6,359,041 UART: [ldev] ++
6,359,607 UART: [ldev] CDI.KEYID = 6
6,360,511 UART: [ldev] SUBJECT.KEYID = 5
6,361,660 UART: [ldev] AUTHORITY.KEYID = 7
6,362,878 UART: [ldev] FE.KEYID = 1
6,374,698 UART: [ldev] Erasing FE.KEYID = 1
8,851,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,915 UART: [ldev] --
10,641,585 UART: [fwproc] Wait for Commands...
10,643,077 UART: [fwproc] Recv command 0x46574c44
10,645,383 UART: [fwproc] Recv'd Img size: 114448 bytes
15,261,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,349,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,466,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,008,693 >>> mbox cmd response: success
16,012,639 UART: [afmc] ++
16,013,351 UART: [afmc] CDI.KEYID = 6
16,014,544 UART: [afmc] SUBJECT.KEYID = 7
16,015,987 UART: [afmc] AUTHORITY.KEYID = 5
18,520,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,243,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,245,810 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,260,895 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,276,101 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,290,909 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,315,270 UART: [afmc] --
20,318,387 UART: [cold-reset] --
20,322,907 UART: [state] Locking Datavault
20,328,919 UART: [state] Locking PCR0, PCR1 and PCR31
20,331,064 UART: [state] Locking ICCM
20,332,886 UART: [exit] Launching FMC @ 0x40000130
20,341,555 UART:
20,341,796 UART: Running Caliptra FMC ...
20,342,891 UART:
20,343,043 UART: [state] CFI Enabled
20,350,819 UART: [fht] FMC Alias Private Key: 7
22,107,382 UART: [art] Extend RT PCRs Done
22,108,605 UART: [art] Lock RT PCRs Done
22,110,442 UART: [art] Populate DV Done
22,115,744 UART: [fht] FMC Alias Private Key: 7
22,117,441 UART: [art] Derive CDI
22,118,252 UART: [art] Store in in slot 0x4
22,160,520 UART: [art] Derive Key Pair
22,161,560 UART: [art] Store priv key in slot 0x5
24,588,516 UART: [art] Derive Key Pair - Done
24,601,670 UART: [art] Signing Cert with AUTHO
24,602,973 UART: RITY.KEYID = 7
26,308,250 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,755 UART: [art] PUB.X = 67A7E955D18C7933605EDA0E8491C0E44B18FBBA816CFDC6D9581B25C55087267A547EC967125696AD717AE9CBD1380C
26,317,035 UART: [art] PUB.Y = 9E28B437AFA2E55D5926B5CEB9ABA9218996603187E1EACD1271671AA2441EE063B859A81066A115CE89469172227323
26,324,246 UART: [art] SIG.R = 82F45ABFA1E4BDF580FA3A72274494E9B7001432A0112BD3AD9C1A5185FE925B53386F7FC42FA409722CB986CBD466B6
26,331,672 UART: [art] SIG.S = E11E9290A35D3C14D4ADA3B108E922396D361E0DF11301D22AA86B846F0C7DFD234F47BE331FE0DB6F6B18E9209C1031
27,310,312 UART: Caliptra RT
27,311,024 UART: [state] CFI Enabled
27,428,267 UART: [rt] RT listening for mailbox commands...
27,430,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,585,983 UART: [rt]cmd =0x41544d4e, len=14344
31,153,146 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,750,541 ready_for_fw is high
3,751,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,053,129 >>> mbox cmd response: success
20,305,782 UART:
20,306,169 UART: Running Caliptra FMC ...
20,307,304 UART:
20,307,456 UART: [state] CFI Enabled
20,315,177 UART: [fht] FMC Alias Private Key: 7
22,071,422 UART: [art] Extend RT PCRs Done
22,072,644 UART: [art] Lock RT PCRs Done
22,074,105 UART: [art] Populate DV Done
22,079,776 UART: [fht] FMC Alias Private Key: 7
22,081,420 UART: [art] Derive CDI
22,082,232 UART: [art] Store in in slot 0x4
22,124,910 UART: [art] Derive Key Pair
22,125,951 UART: [art] Store priv key in slot 0x5
24,552,137 UART: [art] Derive Key Pair - Done
24,565,191 UART: [art] Signing Cert with AUTHO
24,566,499 UART: RITY.KEYID = 7
26,271,767 UART: [art] Erasing AUTHORITY.KEYID = 7
26,273,277 UART: [art] PUB.X = F989843D15D1EB7635D89860E4C4D00207776F5DE3C791D6E74ACEF8D527D2DA28B0F5694DEBEC39D3CAA5920D43F75F
26,280,508 UART: [art] PUB.Y = 7081655FCCF3BD62A7E6CB3904BF64F09E624199E3E37986A0529304EED405E874BF11B21B9AF2A4AA07E1B2453B8A29
26,287,760 UART: [art] SIG.R = 961898E59F016180617B8F4BF825064BACCEE148D9C3223CDFA54429BC8EA9106EA80D06B7091AAB97DB405329849B62
26,295,184 UART: [art] SIG.S = 98472E5ABF46B4432AC2D37B180EC852592C16619290F7903912BFDB1EF6989ABF21E3D898F5D7CF62EE1BDADCF5938A
27,274,501 UART: Caliptra RT
27,275,189 UART: [state] CFI Enabled
27,392,091 UART: [rt] RT listening for mailbox commands...
27,394,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,549,759 UART: [rt]cmd =0x41544d4e, len=14344
31,125,106 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,728 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,353 UART: [cold-reset] ++
1,476,793 UART: [fht] Storing FHT @ 0x50003400
1,479,748 UART: [idev] ++
1,479,916 UART: [idev] CDI.KEYID = 6
1,480,276 UART: [idev] SUBJECT.KEYID = 7
1,480,700 UART: [idev] UDS.KEYID = 0
1,481,045 ready_for_fw is high
1,481,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,775 UART: [ldev] Erasing FE.KEYID = 1
1,546,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,656 UART: [ldev] --
1,586,169 UART: [fwproc] Waiting for Commands...
1,587,024 UART: [fwproc] Received command 0x46574c44
1,587,815 UART: [fwproc] Received Image of size 114448 bytes
5,121,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,149,639 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,315,014 >>> mbox cmd response: success
5,316,158 UART: [afmc] ++
5,316,326 UART: [afmc] CDI.KEYID = 6
5,316,688 UART: [afmc] SUBJECT.KEYID = 7
5,317,113 UART: [afmc] AUTHORITY.KEYID = 5
5,352,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,368,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,317 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,026 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,918 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,619 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,394,655 UART: [afmc] --
5,395,551 UART: [cold-reset] --
5,396,253 UART: [state] Locking Datavault
5,397,260 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,864 UART: [state] Locking ICCM
5,398,400 UART: [exit] Launching FMC @ 0x40000130
5,403,729 UART:
5,403,745 UART: Running Caliptra FMC ...
5,404,153 UART:
5,404,207 UART: [state] CFI Enabled
5,414,651 UART: [fht] FMC Alias Private Key: 7
5,522,455 UART: [art] Extend RT PCRs Done
5,522,883 UART: [art] Lock RT PCRs Done
5,524,425 UART: [art] Populate DV Done
5,532,797 UART: [fht] FMC Alias Private Key: 7
5,533,733 UART: [art] Derive CDI
5,534,013 UART: [art] Store in in slot 0x4
5,619,754 UART: [art] Derive Key Pair
5,620,114 UART: [art] Store priv key in slot 0x5
5,633,444 UART: [art] Derive Key Pair - Done
5,648,505 UART: [art] Signing Cert with AUTHO
5,648,985 UART: RITY.KEYID = 7
5,664,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,260 UART: [art] PUB.X = AC2922423D367562A7BC6AD56650564A68219088A87AE93455803C12D401AEA75A302B451B3BC3D344D89E2D7083E06A
5,672,021 UART: [art] PUB.Y = 984DF4DD568BE1D7C1C7BCA8D65CCF4E0FF861CFD0F029133D8038D32FBE530D553689548BD4557E6A6060C7D0F61315
5,678,975 UART: [art] SIG.R = 62B7B4B0959BE32509EF3F07E71FADE5BF35C4B0450D16D79A50A86501FC1D9535303A567B0676AA1398252A2603D652
5,685,725 UART: [art] SIG.S = C1AD0215B0D00474E4C920F1FC1B637979BE11F9AF4CF4C52E5DDF01F32D469630ABDB0FB1EA6721066BE497EADE29C7
5,709,615 UART: Caliptra RT
5,709,868 UART: [state] CFI Enabled
5,816,963 UART: [rt] RT listening for mailbox commands...
5,817,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,609 UART: [rt]cmd =0x41544d4e, len=14344
6,870,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,166,122 >>> mbox cmd response: success
5,227,487 UART:
5,227,503 UART: Running Caliptra FMC ...
5,227,911 UART:
5,227,965 UART: [state] CFI Enabled
5,238,421 UART: [fht] FMC Alias Private Key: 7
5,346,989 UART: [art] Extend RT PCRs Done
5,347,417 UART: [art] Lock RT PCRs Done
5,349,077 UART: [art] Populate DV Done
5,357,455 UART: [fht] FMC Alias Private Key: 7
5,358,613 UART: [art] Derive CDI
5,358,893 UART: [art] Store in in slot 0x4
5,444,966 UART: [art] Derive Key Pair
5,445,326 UART: [art] Store priv key in slot 0x5
5,458,690 UART: [art] Derive Key Pair - Done
5,473,442 UART: [art] Signing Cert with AUTHO
5,473,922 UART: RITY.KEYID = 7
5,489,340 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,105 UART: [art] PUB.X = 04A0509A5421604C19B9CF4A21C6E5404268B8E3611AE15A42B26E76CBEA273666FAAC5B3CAEFA366D0237BBA6F4EE56
5,496,881 UART: [art] PUB.Y = D0112DD0F7E9234EA5457C78E590063DF4A9A557ACD12F8A9A8BD73057C96C055D48C137C368E397A7090633782E7F13
5,503,817 UART: [art] SIG.R = 21CF3D7E1023110D1E2B082D716A31C69960C6F2AA323C11D4B1EFCA4C32B03EC96AF4B7CC57434D45AE0637CC64ED67
5,510,590 UART: [art] SIG.S = BEA4858D5A94ED4B539C281F0A67C3222BE0A4D566780206A1ACC1E2C5B39871FFBDF342BCC54496B0665FFFC25F370F
5,534,235 UART: Caliptra RT
5,534,488 UART: [state] CFI Enabled
5,642,539 UART: [rt] RT listening for mailbox commands...
5,643,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,766,263 UART: [rt]cmd =0x41544d4e, len=14344
6,689,189 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,477,054 UART: [fht] Storing FHT @ 0x50003400
1,479,863 UART: [idev] ++
1,480,031 UART: [idev] CDI.KEYID = 6
1,480,391 UART: [idev] SUBJECT.KEYID = 7
1,480,815 UART: [idev] UDS.KEYID = 0
1,481,160 ready_for_fw is high
1,481,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,871 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,997 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,522,082 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,583 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,553 UART: [fwproc] Received command 0x46574c44
1,588,344 UART: [fwproc] Received Image of size 114448 bytes
5,160,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,189,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,218,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,354,436 >>> mbox cmd response: success
5,355,542 UART: [afmc] ++
5,355,710 UART: [afmc] CDI.KEYID = 6
5,356,072 UART: [afmc] SUBJECT.KEYID = 7
5,356,497 UART: [afmc] AUTHORITY.KEYID = 5
5,392,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,408,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,409,531 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,415,240 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,421,132 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,426,833 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,434,603 UART: [afmc] --
5,435,719 UART: [cold-reset] --
5,436,495 UART: [state] Locking Datavault
5,437,424 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,028 UART: [state] Locking ICCM
5,438,474 UART: [exit] Launching FMC @ 0x40000130
5,443,803 UART:
5,443,819 UART: Running Caliptra FMC ...
5,444,227 UART:
5,444,370 UART: [state] CFI Enabled
5,454,594 UART: [fht] FMC Alias Private Key: 7
5,562,826 UART: [art] Extend RT PCRs Done
5,563,254 UART: [art] Lock RT PCRs Done
5,564,836 UART: [art] Populate DV Done
5,572,936 UART: [fht] FMC Alias Private Key: 7
5,573,928 UART: [art] Derive CDI
5,574,208 UART: [art] Store in in slot 0x4
5,660,281 UART: [art] Derive Key Pair
5,660,641 UART: [art] Store priv key in slot 0x5
5,673,901 UART: [art] Derive Key Pair - Done
5,689,014 UART: [art] Signing Cert with AUTHO
5,689,494 UART: RITY.KEYID = 7
5,705,106 UART: [art] Erasing AUTHORITY.KEYID = 7
5,705,871 UART: [art] PUB.X = AA462251E47D49F0803FB4D4F7B7A470A43A54FDF79D16D9E764C57E9E9906074017C479ED0505B977FD78C6C8A6B758
5,712,631 UART: [art] PUB.Y = 9065E69BD9EE2BE240BDFACEFB36EF2EB1C150BAD56976B962D29ACC14384349F98E51E73A70AA3633AC0B17FE0D0859
5,719,590 UART: [art] SIG.R = CC4E8D404C5D7F998656344AF3B75FCF300F3DF0D0276C737AA6018DEDF50E73FB4A0A81BDC295BD5ABF9A83357F1F86
5,726,366 UART: [art] SIG.S = 8A12D4B7EE7A534F1B691A851F38A0CDE2A6B91AC111464F0A14D2428A8D5E70DF819469BF8E772C9A749E7F50873392
5,750,162 UART: Caliptra RT
5,750,507 UART: [state] CFI Enabled
5,858,079 UART: [rt] RT listening for mailbox commands...
5,858,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,695 UART: [rt]cmd =0x41544d4e, len=14344
6,894,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 ready_for_fw is high
1,363,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,202,906 >>> mbox cmd response: success
5,265,985 UART:
5,266,001 UART: Running Caliptra FMC ...
5,266,409 UART:
5,266,552 UART: [state] CFI Enabled
5,277,042 UART: [fht] FMC Alias Private Key: 7
5,384,420 UART: [art] Extend RT PCRs Done
5,384,848 UART: [art] Lock RT PCRs Done
5,386,352 UART: [art] Populate DV Done
5,394,700 UART: [fht] FMC Alias Private Key: 7
5,395,754 UART: [art] Derive CDI
5,396,034 UART: [art] Store in in slot 0x4
5,482,093 UART: [art] Derive Key Pair
5,482,453 UART: [art] Store priv key in slot 0x5
5,495,531 UART: [art] Derive Key Pair - Done
5,510,198 UART: [art] Signing Cert with AUTHO
5,510,678 UART: RITY.KEYID = 7
5,525,880 UART: [art] Erasing AUTHORITY.KEYID = 7
5,526,645 UART: [art] PUB.X = 171FCC7AF6CFF1ECD17C25EFA26868A6B78067AE1E97FB31FAC429FF08DF21F945EA0F9EE4300A7164C98DEEA198B612
5,533,428 UART: [art] PUB.Y = B5BAA890D2CAAAB74265DF131AC96C0DFC0513616FF31D24078002A34395F94D56FE0F11F77F6F03898BC4BE674F4DC6
5,540,372 UART: [art] SIG.R = 1A7DEA6FFEB75E4F5A8B9D4D81B0299A59CE7E168306439E37B306A956376EFAEB6676E0260B7F27BA20707A82F74F0F
5,547,140 UART: [art] SIG.S = E3ADEB38D843ED3DA86B8A61A38D61FDED802D5255DF9ABD6A6D1D51578C1BFE200FC6EE15C188F2DA62A756C2000A02
5,571,118 UART: Caliptra RT
5,571,463 UART: [state] CFI Enabled
5,680,712 UART: [rt] RT listening for mailbox commands...
5,681,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,454 UART: [rt]cmd =0x41544d4e, len=14344
6,727,154 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,302 UART: [kat] SHA2-512-ACC
908,203 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,818 UART: [kat] LMS
1,171,146 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,505 UART: [fht] FHT @ 0x50003400
1,175,188 UART: [idev] ++
1,175,356 UART: [idev] CDI.KEYID = 6
1,175,716 UART: [idev] SUBJECT.KEYID = 7
1,176,140 UART: [idev] UDS.KEYID = 0
1,176,485 ready_for_fw is high
1,176,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,411 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,282,012 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,975 >>> mbox cmd response: success
3,319,181 UART: [afmc] ++
3,319,349 UART: [afmc] CDI.KEYID = 6
3,319,711 UART: [afmc] SUBJECT.KEYID = 7
3,320,136 UART: [afmc] AUTHORITY.KEYID = 5
3,355,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,693 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,402 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,294 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,005 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,826 UART: [afmc] --
3,398,728 UART: [cold-reset] --
3,399,552 UART: [state] Locking Datavault
3,400,947 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,551 UART: [state] Locking ICCM
3,401,971 UART: [exit] Launching FMC @ 0x40000130
3,407,300 UART:
3,407,316 UART: Running Caliptra FMC ...
3,407,724 UART:
3,407,778 UART: [state] CFI Enabled
3,418,044 UART: [fht] FMC Alias Private Key: 7
3,526,092 UART: [art] Extend RT PCRs Done
3,526,520 UART: [art] Lock RT PCRs Done
3,528,466 UART: [art] Populate DV Done
3,536,668 UART: [fht] FMC Alias Private Key: 7
3,537,718 UART: [art] Derive CDI
3,537,998 UART: [art] Store in in slot 0x4
3,623,585 UART: [art] Derive Key Pair
3,623,945 UART: [art] Store priv key in slot 0x5
3,637,023 UART: [art] Derive Key Pair - Done
3,651,923 UART: [art] Signing Cert with AUTHO
3,652,403 UART: RITY.KEYID = 7
3,667,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,606 UART: [art] PUB.X = 4C003188BF46B20B7F29921CBBCE0083FAD868BC2136191446EA082434BF1031D6111B4239AF3DCB6FE56FBFF6CFA4F3
3,675,338 UART: [art] PUB.Y = 0CA237E4DC4A623988E6E6A02B7C389C48C86757C5CD1FF9FDB1D4FD458CC9A18617F4C00EC913E2CBA4DEBD700E42DF
3,682,301 UART: [art] SIG.R = EB89D903CC9FC899F24AEA4494DE83B50F20A08EAE07445E5EE0263CB77CC5421252B69B2B21F46FBFD79B850A7FAD30
3,689,075 UART: [art] SIG.S = 04DB6300C1CCCF6A1E0DE0C08473138BBA94EA5AF1DBBDE99708B66E8A4CBE758F5827605E51C8C96B8228030AE19778
3,713,123 UART: Caliptra RT
3,713,376 UART: [state] CFI Enabled
3,821,248 UART: [rt] RT listening for mailbox commands...
3,821,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,102 UART: [rt]cmd =0x41544d4e, len=14344
4,870,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,603 ready_for_fw is high
1,059,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,350 >>> mbox cmd response: success
3,233,949 UART:
3,233,965 UART: Running Caliptra FMC ...
3,234,373 UART:
3,234,427 UART: [state] CFI Enabled
3,244,891 UART: [fht] FMC Alias Private Key: 7
3,353,203 UART: [art] Extend RT PCRs Done
3,353,631 UART: [art] Lock RT PCRs Done
3,355,145 UART: [art] Populate DV Done
3,363,527 UART: [fht] FMC Alias Private Key: 7
3,364,689 UART: [art] Derive CDI
3,364,969 UART: [art] Store in in slot 0x4
3,450,628 UART: [art] Derive Key Pair
3,450,988 UART: [art] Store priv key in slot 0x5
3,463,474 UART: [art] Derive Key Pair - Done
3,478,336 UART: [art] Signing Cert with AUTHO
3,478,816 UART: RITY.KEYID = 7
3,494,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,969 UART: [art] PUB.X = 63B596F77B5ADF45670A06110C998D1240058EB5D8D1B90B757E310AD37E926B2D6EF70AA5EE99F5664ED72FCEAA0387
3,501,723 UART: [art] PUB.Y = 5F2DAC68E7AD720B32BA273FF013EF55915EC73670371E38A0497C914B1F21F35DC5C588794F26E26C8CE4788DE89E2A
3,508,676 UART: [art] SIG.R = AA2A50E1FAB057390B31EB71F8A857708812966F93B18A33E1FAEF10EA23D02899DC7F285A4DCD207118797DE0B4840D
3,515,446 UART: [art] SIG.S = C4EEFD7DE32B925EB163F02180C3FC6481F363B5A4F8168DDA522CBF375ABB0CBFB8A3D6E618229026446A1CE8CB270E
3,539,431 UART: Caliptra RT
3,539,684 UART: [state] CFI Enabled
3,647,077 UART: [rt] RT listening for mailbox commands...
3,647,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,573 UART: [rt]cmd =0x41544d4e, len=14344
4,703,567 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,294 UART: [state] WD Timer not started. Device not locked for debugging
88,653 UART: [kat] SHA2-256
894,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,428 UART: [kat] ++
898,580 UART: [kat] sha1
902,738 UART: [kat] SHA2-256
904,678 UART: [kat] SHA2-384
907,611 UART: [kat] SHA2-512-ACC
909,512 UART: [kat] ECC-384
919,623 UART: [kat] HMAC-384Kdf
924,059 UART: [kat] LMS
1,172,387 UART: [kat] --
1,173,636 UART: [cold-reset] ++
1,174,086 UART: [fht] FHT @ 0x50003400
1,176,807 UART: [idev] ++
1,176,975 UART: [idev] CDI.KEYID = 6
1,177,335 UART: [idev] SUBJECT.KEYID = 7
1,177,759 UART: [idev] UDS.KEYID = 0
1,178,104 ready_for_fw is high
1,178,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,607 UART: [idev] Erasing UDS.KEYID = 0
1,202,248 UART: [idev] Sha1 KeyId Algorithm
1,210,526 UART: [idev] --
1,211,540 UART: [ldev] ++
1,211,708 UART: [ldev] CDI.KEYID = 6
1,212,071 UART: [ldev] SUBJECT.KEYID = 5
1,212,497 UART: [ldev] AUTHORITY.KEYID = 7
1,212,960 UART: [ldev] FE.KEYID = 1
1,218,282 UART: [ldev] Erasing FE.KEYID = 1
1,244,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,290 UART: [ldev] --
1,283,789 UART: [fwproc] Wait for Commands...
1,284,359 UART: [fwproc] Recv command 0x46574c44
1,285,087 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,775 >>> mbox cmd response: success
3,321,983 UART: [afmc] ++
3,322,151 UART: [afmc] CDI.KEYID = 6
3,322,513 UART: [afmc] SUBJECT.KEYID = 7
3,322,938 UART: [afmc] AUTHORITY.KEYID = 5
3,358,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,619 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,328 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,220 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,931 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,662 UART: [afmc] --
3,401,734 UART: [cold-reset] --
3,402,664 UART: [state] Locking Datavault
3,403,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,245 UART: [state] Locking ICCM
3,404,843 UART: [exit] Launching FMC @ 0x40000130
3,410,172 UART:
3,410,188 UART: Running Caliptra FMC ...
3,410,596 UART:
3,410,739 UART: [state] CFI Enabled
3,421,101 UART: [fht] FMC Alias Private Key: 7
3,528,575 UART: [art] Extend RT PCRs Done
3,529,003 UART: [art] Lock RT PCRs Done
3,530,207 UART: [art] Populate DV Done
3,538,707 UART: [fht] FMC Alias Private Key: 7
3,539,741 UART: [art] Derive CDI
3,540,021 UART: [art] Store in in slot 0x4
3,625,898 UART: [art] Derive Key Pair
3,626,258 UART: [art] Store priv key in slot 0x5
3,639,404 UART: [art] Derive Key Pair - Done
3,654,197 UART: [art] Signing Cert with AUTHO
3,654,677 UART: RITY.KEYID = 7
3,669,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,438 UART: [art] PUB.X = 76D8006E57E82130CEABC1D597FA3090EC72C1573127E7CD33D50FACBB9FBB2BC205B2D49B7444025AD58135C34A14EB
3,677,189 UART: [art] PUB.Y = 177604F8ACE17D620705BF45832BB336815E582860198FE7BBE70C68E2D5925D4FE1B239F63ED2CB449605FE1BBE27F8
3,684,128 UART: [art] SIG.R = 0E0507EC7948B833DCB4A3A979E4F03570D9708EB974F244BDA81E73349A37202F006AEE0B63223679F4AA18105AD225
3,690,862 UART: [art] SIG.S = 1060159741E65F53452477E5360CE10782DD0B1C35638B3B29E7EBD89F99ADE517A3731A49C985A82321E4784E51954C
3,714,282 UART: Caliptra RT
3,714,627 UART: [state] CFI Enabled
3,822,184 UART: [rt] RT listening for mailbox commands...
3,822,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,708 UART: [rt]cmd =0x41544d4e, len=14344
4,863,708 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,950 ready_for_fw is high
1,061,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,962 >>> mbox cmd response: success
3,235,403 UART:
3,235,419 UART: Running Caliptra FMC ...
3,235,827 UART:
3,235,970 UART: [state] CFI Enabled
3,246,640 UART: [fht] FMC Alias Private Key: 7
3,353,908 UART: [art] Extend RT PCRs Done
3,354,336 UART: [art] Lock RT PCRs Done
3,356,150 UART: [art] Populate DV Done
3,364,444 UART: [fht] FMC Alias Private Key: 7
3,365,448 UART: [art] Derive CDI
3,365,728 UART: [art] Store in in slot 0x4
3,451,267 UART: [art] Derive Key Pair
3,451,627 UART: [art] Store priv key in slot 0x5
3,465,009 UART: [art] Derive Key Pair - Done
3,479,855 UART: [art] Signing Cert with AUTHO
3,480,335 UART: RITY.KEYID = 7
3,495,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,020 UART: [art] PUB.X = 0A4AC907414AB9D2E570CFBC73D45CD4A340A398C851C0F41190E10791337C89BE8326D6755BC192BCA0C959570037A2
3,502,759 UART: [art] PUB.Y = FBA6F48485299C5C8C5D9461ABF7CBCC9A7323C91B8E06E260E0CA9701331686AD99325EE8F98966289FF7483B8952DE
3,509,707 UART: [art] SIG.R = 3F2953DD4063C2AB16340527A0A2AD1FE706A1315D388392386CFA1B174C556361134B3EA276EB5237773C39F9A07B8E
3,516,467 UART: [art] SIG.S = B618F3706A71B370FFAE9E5593B2EC7F2D5A19CF32D79A527BEFB9ECC1603605510F442CAE132167F32666348F1679A4
3,540,910 UART: Caliptra RT
3,541,255 UART: [state] CFI Enabled
3,648,979 UART: [rt] RT listening for mailbox commands...
3,649,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,561 UART: [rt]cmd =0x41544d4e, len=14344
4,690,303 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 ready_for_fw is high
1,174,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,647 UART: [idev] Sha1 KeyId Algorithm
1,208,395 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,510 UART: [fwproc] Wait for Commands...
1,282,245 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,642 >>> mbox cmd response: success
3,313,855 UART: [afmc] ++
3,314,023 UART: [afmc] CDI.KEYID = 6
3,314,386 UART: [afmc] SUBJECT.KEYID = 7
3,314,812 UART: [afmc] AUTHORITY.KEYID = 5
3,350,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,217 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,927 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,817 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,528 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,262 UART: [afmc] --
3,393,160 UART: [cold-reset] --
3,394,072 UART: [state] Locking Datavault
3,395,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,941 UART: [state] Locking ICCM
3,396,549 UART: [exit] Launching FMC @ 0x40000130
3,401,878 UART:
3,401,894 UART: Running Caliptra FMC ...
3,402,302 UART:
3,402,356 UART: [state] CFI Enabled
3,412,678 UART: [fht] FMC Alias Private Key: 7
3,519,962 UART: [art] Extend RT PCRs Done
3,520,390 UART: [art] Lock RT PCRs Done
3,522,218 UART: [art] Populate DV Done
3,530,288 UART: [fht] FMC Alias Private Key: 7
3,531,334 UART: [art] Derive CDI
3,531,614 UART: [art] Store in in slot 0x4
3,617,567 UART: [art] Derive Key Pair
3,617,927 UART: [art] Store priv key in slot 0x5
3,630,851 UART: [art] Derive Key Pair - Done
3,645,663 UART: [art] Signing Cert with AUTHO
3,646,143 UART: RITY.KEYID = 7
3,661,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,996 UART: [art] PUB.X = AD9DDA3FB14A52DFDB61627312A58400182DF78CF1CF92370E849B5B3318C6A907A9D717193CE68967611C0A0BEDF1DC
3,668,742 UART: [art] PUB.Y = CEF2753DDBA7369A7B15E4F32508171E83AAA75D1E221AF859DDFD96A3E02C4DE57497A8C4BBEE378EED3CDACB8635A7
3,675,713 UART: [art] SIG.R = 2A0F8731CD2AA1BF2C4C1926FD413152CA45173790BC3966FBE2193DB14919F25113F6CBFDD5CBC450E8A7839D4D9DF7
3,682,492 UART: [art] SIG.S = 3D816AAFE02DAE28F9B967B9B5862D65A748CC0F9AB94B7A136D9BD9EA4A7638B59EECB9519E8D957810D5A0CD8684DF
3,706,498 UART: Caliptra RT
3,706,751 UART: [state] CFI Enabled
3,813,964 UART: [rt] RT listening for mailbox commands...
3,814,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,820 UART: [rt]cmd =0x41544d4e, len=14344
4,845,642 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,074 ready_for_fw is high
1,056,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,175,626 >>> mbox cmd response: success
3,238,097 UART:
3,238,113 UART: Running Caliptra FMC ...
3,238,521 UART:
3,238,575 UART: [state] CFI Enabled
3,249,137 UART: [fht] FMC Alias Private Key: 7
3,357,277 UART: [art] Extend RT PCRs Done
3,357,705 UART: [art] Lock RT PCRs Done
3,359,187 UART: [art] Populate DV Done
3,367,259 UART: [fht] FMC Alias Private Key: 7
3,368,257 UART: [art] Derive CDI
3,368,537 UART: [art] Store in in slot 0x4
3,453,934 UART: [art] Derive Key Pair
3,454,294 UART: [art] Store priv key in slot 0x5
3,467,566 UART: [art] Derive Key Pair - Done
3,482,508 UART: [art] Signing Cert with AUTHO
3,482,988 UART: RITY.KEYID = 7
3,498,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,789 UART: [art] PUB.X = 4D01DB959EB9A05F34E141E9356E3EC62BF4A5D97EF50D59993E9CF412C5B20206AEEE319FCB1C300FA79B84759C3710
3,505,554 UART: [art] PUB.Y = 857E95E97E7789EAA696B83707B3C8E34B539BCBEAB8C653B1B009F7F464FD715F4006765417943CFA142C5945C4EA8E
3,512,499 UART: [art] SIG.R = 0083A46C1F6949319CCAE4EF38E3BF481CD8FA558105B80D9CB7B232825C36C971742C7872C594422E284219336A337D
3,519,235 UART: [art] SIG.S = 9C68F351D3BD42B8D0925B20069F1E46B8A341AE10B3AB02EC7E561682432466E2174068990A3133164EE2DA9D3EAFEA
3,542,951 UART: Caliptra RT
3,543,204 UART: [state] CFI Enabled
3,651,289 UART: [rt] RT listening for mailbox commands...
3,651,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,899 UART: [rt]cmd =0x41544d4e, len=14344
4,705,456 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,094 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 ready_for_fw is high
1,174,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,207,866 UART: [idev] --
1,208,931 UART: [ldev] ++
1,209,099 UART: [ldev] CDI.KEYID = 6
1,209,463 UART: [ldev] SUBJECT.KEYID = 5
1,209,890 UART: [ldev] AUTHORITY.KEYID = 7
1,210,353 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,241,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,651 UART: [ldev] --
1,280,957 UART: [fwproc] Wait for Commands...
1,281,656 UART: [fwproc] Recv command 0x46574c44
1,282,389 UART: [fwproc] Recv'd Img size: 114448 bytes
3,113,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,306,785 >>> mbox cmd response: success
3,307,942 UART: [afmc] ++
3,308,110 UART: [afmc] CDI.KEYID = 6
3,308,473 UART: [afmc] SUBJECT.KEYID = 7
3,308,899 UART: [afmc] AUTHORITY.KEYID = 5
3,344,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,130 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,840 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,730 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,441 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,123 UART: [afmc] --
3,388,145 UART: [cold-reset] --
3,389,009 UART: [state] Locking Datavault
3,390,228 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,832 UART: [state] Locking ICCM
3,391,332 UART: [exit] Launching FMC @ 0x40000130
3,396,661 UART:
3,396,677 UART: Running Caliptra FMC ...
3,397,085 UART:
3,397,228 UART: [state] CFI Enabled
3,407,666 UART: [fht] FMC Alias Private Key: 7
3,516,128 UART: [art] Extend RT PCRs Done
3,516,556 UART: [art] Lock RT PCRs Done
3,517,898 UART: [art] Populate DV Done
3,526,002 UART: [fht] FMC Alias Private Key: 7
3,527,102 UART: [art] Derive CDI
3,527,382 UART: [art] Store in in slot 0x4
3,613,071 UART: [art] Derive Key Pair
3,613,431 UART: [art] Store priv key in slot 0x5
3,626,565 UART: [art] Derive Key Pair - Done
3,641,547 UART: [art] Signing Cert with AUTHO
3,642,027 UART: RITY.KEYID = 7
3,657,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,028 UART: [art] PUB.X = 28607C0A4A418FA6054110D1BF96CE431737A099E39B6A20E0EADD0241FB1D1470FADC23C60C86FA1E79687A1C300C95
3,664,789 UART: [art] PUB.Y = 30DD104555236EDEDC4307F166423DD0A0EC0F5A408B6E2D89C5626ADF79883675EA5AEFAE8F09D7CB34619CBCE8B577
3,671,744 UART: [art] SIG.R = 0A299A12F65D3F5A31BACAE3652426271B04E7C381DC750812294B0FCCFC27DEF222FCAFF24DC84FCC64ED2B082CD9F6
3,678,519 UART: [art] SIG.S = FDAFDB1115E9DBBF418CE83A5D9D80F0152292D5C8DAC203B165B5430CC7B7EC290CCEA6C1608144F6F0B93B6F7008D9
3,702,640 UART: Caliptra RT
3,702,985 UART: [state] CFI Enabled
3,811,341 UART: [rt] RT listening for mailbox commands...
3,812,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,901 UART: [rt]cmd =0x41544d4e, len=14344
4,850,078 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,739 ready_for_fw is high
1,056,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,827 >>> mbox cmd response: success
3,228,026 UART:
3,228,042 UART: Running Caliptra FMC ...
3,228,450 UART:
3,228,593 UART: [state] CFI Enabled
3,239,523 UART: [fht] FMC Alias Private Key: 7
3,347,409 UART: [art] Extend RT PCRs Done
3,347,837 UART: [art] Lock RT PCRs Done
3,349,197 UART: [art] Populate DV Done
3,357,381 UART: [fht] FMC Alias Private Key: 7
3,358,451 UART: [art] Derive CDI
3,358,731 UART: [art] Store in in slot 0x4
3,444,604 UART: [art] Derive Key Pair
3,444,964 UART: [art] Store priv key in slot 0x5
3,458,574 UART: [art] Derive Key Pair - Done
3,473,461 UART: [art] Signing Cert with AUTHO
3,473,941 UART: RITY.KEYID = 7
3,489,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,158 UART: [art] PUB.X = 1685D7CD766633AE957BB4572EA065DB6EF7EC6178411AAFC451426BEBCAC900311CC39F15FE0849C53D5783E06B4CAA
3,496,915 UART: [art] PUB.Y = 48214E2ED5AD74DC3C03EED34219D48C0D1D96CCF94A77B622A5533812FB7A7621D431E9B7FE35F1199260484FF5D507
3,503,860 UART: [art] SIG.R = C613B9F417BC4F6B6F4A0D1A1AD7CD67BA3E7DC88405C5D586BB750CDA6BE0ADB1D203EDD8AC92DD8A355181B1833244
3,510,640 UART: [art] SIG.S = F63EE0663CDF9D3F3A535A9457C76FF0C5BB6CE5E41667327F833E845865436977560E1B994BE3F3F51B2EEAB3FFFA18
3,534,266 UART: Caliptra RT
3,534,611 UART: [state] CFI Enabled
3,642,662 UART: [rt] RT listening for mailbox commands...
3,643,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,426 UART: [rt]cmd =0x41544d4e, len=14344
4,691,225 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,103 UART:
192,456 UART: Running Caliptra ROM ...
193,647 UART:
193,802 UART: [state] CFI Enabled
265,818 UART: [state] LifecycleState = Unprovisioned
267,831 UART: [state] DebugLocked = No
270,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,575 UART: [kat] SHA2-256
445,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,732 UART: [kat] ++
456,182 UART: [kat] sha1
466,988 UART: [kat] SHA2-256
469,719 UART: [kat] SHA2-384
476,136 UART: [kat] SHA2-512-ACC
478,506 UART: [kat] ECC-384
2,770,341 UART: [kat] HMAC-384Kdf
2,799,988 UART: [kat] LMS
3,990,271 UART: [kat] --
3,993,779 UART: [cold-reset] ++
3,995,066 UART: [fht] Storing FHT @ 0x50003400
4,006,900 UART: [idev] ++
4,007,495 UART: [idev] CDI.KEYID = 6
4,008,388 UART: [idev] SUBJECT.KEYID = 7
4,009,633 UART: [idev] UDS.KEYID = 0
4,010,708 ready_for_fw is high
4,010,913 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,488 UART: [idev] Erasing UDS.KEYID = 0
7,346,730 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,964 UART: [idev] --
7,373,173 UART: [ldev] ++
7,373,745 UART: [ldev] CDI.KEYID = 6
7,374,718 UART: [ldev] SUBJECT.KEYID = 5
7,375,931 UART: [ldev] AUTHORITY.KEYID = 7
7,377,112 UART: [ldev] FE.KEYID = 1
7,423,670 UART: [ldev] Erasing FE.KEYID = 1
10,754,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,901 UART: [ldev] --
13,115,333 UART: [fwproc] Waiting for Commands...
13,118,560 UART: [fwproc] Received command 0x46574c44
13,120,737 UART: [fwproc] Received Image of size 114124 bytes
21,995,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,073,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,142,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,459,703 >>> mbox cmd response: success
22,464,743 UART: [afmc] ++
22,465,340 UART: [afmc] CDI.KEYID = 6
22,466,364 UART: [afmc] SUBJECT.KEYID = 7
22,467,527 UART: [afmc] AUTHORITY.KEYID = 5
25,827,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,127,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,129,823 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,144,361 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,159,066 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,173,323 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,194,806 UART: [afmc] --
28,198,725 UART: [cold-reset] --
28,203,446 UART: [state] Locking Datavault
28,208,377 UART: [state] Locking PCR0, PCR1 and PCR31
28,210,127 UART: [state] Locking ICCM
28,212,711 UART: [exit] Launching FMC @ 0x40000130
28,221,115 UART:
28,221,352 UART: Running Caliptra FMC ...
28,222,379 UART:
28,222,529 UART: [state] CFI Enabled
28,287,839 UART: [fht] FMC Alias Private Key: 7
30,625,599 UART: [art] Extend RT PCRs Done
30,626,824 UART: [art] Lock RT PCRs Done
30,628,452 UART: [art] Populate DV Done
30,634,033 UART: [fht] FMC Alias Private Key: 7
30,635,734 UART: [art] Derive CDI
30,636,548 UART: [art] Store in in slot 0x4
30,696,741 UART: [art] Derive Key Pair
30,697,773 UART: [art] Store priv key in slot 0x5
33,990,864 UART: [art] Derive Key Pair - Done
34,003,816 UART: [art] Signing Cert with AUTHO
34,005,118 UART: RITY.KEYID = 7
36,291,890 UART: [art] Erasing AUTHORITY.KEYID = 7
36,293,405 UART: [art] PUB.X = 74CFB25A12C1F0E7A0158CD67683021DC7FCCA676F35CE14BF95C6E5C89DDAF64FA94CA2D2626A0104CEEF5448218771
36,300,621 UART: [art] PUB.Y = AE33F6037EF5346928D8808C7ABA2F58343BF0CDE201EFDB123DFCD12DECBA0B820B482F36302017C85C311B5B70A353
36,307,912 UART: [art] SIG.R = B899E66D9F3E257BC1EB5F7F163DBB21B7C6F56BD7F4EC2859D9729E902760607593CF1B4B565A5020E4F142545EEA5B
36,315,254 UART: [art] SIG.S = 62FBD2FFE1F733A18B3F1975A360C62E266F7F7DD29975B93A13576FFCBB768B35811CF787B9D636938B9AF719566A4C
37,620,297 UART: Caliptra RT
37,620,991 UART: [state] CFI Enabled
37,781,015 UART: [rt] RT listening for mailbox commands...
37,783,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,938,761 UART: [rt]cmd =0x41544d4e, len=14344
45,526,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,804,379 ready_for_fw is high
3,804,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,932,336 >>> mbox cmd response: success
27,627,932 UART:
27,628,294 UART: Running Caliptra FMC ...
27,629,442 UART:
27,629,600 UART: [state] CFI Enabled
27,698,605 UART: [fht] FMC Alias Private Key: 7
30,036,176 UART: [art] Extend RT PCRs Done
30,037,602 UART: [art] Lock RT PCRs Done
30,038,924 UART: [art] Populate DV Done
30,044,132 UART: [fht] FMC Alias Private Key: 7
30,045,736 UART: [art] Derive CDI
30,046,551 UART: [art] Store in in slot 0x4
30,107,109 UART: [art] Derive Key Pair
30,108,111 UART: [art] Store priv key in slot 0x5
33,400,631 UART: [art] Derive Key Pair - Done
33,413,470 UART: [art] Signing Cert with AUTHO
33,414,779 UART: RITY.KEYID = 7
35,703,445 UART: [art] Erasing AUTHORITY.KEYID = 7
35,704,954 UART: [art] PUB.X = 0DDE32235B0B7FC1F9B999A320B276775CEE13C4EBDDCE16DD5C76CA622780BA7AEAA2CADF8F5297227203CE1E4DD45E
35,712,203 UART: [art] PUB.Y = D5EDAFBF7FAFF59AC97F57785383B1A366E476BFE1C46C31BC01ADF5FDB5D6AFD3EA9FA10EE869EB193BD563AED80B16
35,719,495 UART: [art] SIG.R = 59732E52BFCD3612C1F201229EBBB794DB5533D9FE7CD9FC06DA3C231C972A39ECF473AD6EB5BC8B1A718F25C2E75D0D
35,726,898 UART: [art] SIG.S = 184BF8EDDA237B2FB51387BDD782A7BD14F74BDEE1E2EF5CFD533336AAAB960AED369032E6B98D006F29E7F4B813509D
37,032,285 UART: Caliptra RT
37,032,995 UART: [state] CFI Enabled
37,194,704 UART: [rt] RT listening for mailbox commands...
37,197,005 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,352,107 UART: [rt]cmd =0x41544d4e, len=14344
44,835,181 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,352 UART:
192,717 UART: Running Caliptra ROM ...
193,865 UART:
603,545 UART: [state] CFI Enabled
614,728 UART: [state] LifecycleState = Unprovisioned
616,671 UART: [state] DebugLocked = No
618,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,835 UART: [kat] SHA2-256
793,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,081 UART: [kat] ++
804,690 UART: [kat] sha1
817,015 UART: [kat] SHA2-256
819,666 UART: [kat] SHA2-384
825,312 UART: [kat] SHA2-512-ACC
827,688 UART: [kat] ECC-384
3,112,348 UART: [kat] HMAC-384Kdf
3,122,807 UART: [kat] LMS
4,312,917 UART: [kat] --
4,317,735 UART: [cold-reset] ++
4,318,746 UART: [fht] Storing FHT @ 0x50003400
4,330,647 UART: [idev] ++
4,331,291 UART: [idev] CDI.KEYID = 6
4,332,196 UART: [idev] SUBJECT.KEYID = 7
4,333,436 UART: [idev] UDS.KEYID = 0
4,334,690 ready_for_fw is high
4,334,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,161 UART: [idev] Erasing UDS.KEYID = 0
7,622,923 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,485 UART: [idev] --
7,646,883 UART: [ldev] ++
7,647,512 UART: [ldev] CDI.KEYID = 6
7,648,416 UART: [ldev] SUBJECT.KEYID = 5
7,649,619 UART: [ldev] AUTHORITY.KEYID = 7
7,650,940 UART: [ldev] FE.KEYID = 1
7,662,248 UART: [ldev] Erasing FE.KEYID = 1
10,956,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,897 UART: [ldev] --
13,316,422 UART: [fwproc] Waiting for Commands...
13,318,890 UART: [fwproc] Received command 0x46574c44
13,321,120 UART: [fwproc] Received Image of size 114124 bytes
22,432,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,509,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,578,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,896,184 >>> mbox cmd response: success
22,900,141 UART: [afmc] ++
22,900,737 UART: [afmc] CDI.KEYID = 6
22,901,698 UART: [afmc] SUBJECT.KEYID = 7
22,902,908 UART: [afmc] AUTHORITY.KEYID = 5
26,218,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,514,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,516,999 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,531,569 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,546,285 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,560,508 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,580,978 UART: [afmc] --
28,585,608 UART: [cold-reset] --
28,589,467 UART: [state] Locking Datavault
28,594,710 UART: [state] Locking PCR0, PCR1 and PCR31
28,596,460 UART: [state] Locking ICCM
28,598,950 UART: [exit] Launching FMC @ 0x40000130
28,607,294 UART:
28,607,524 UART: Running Caliptra FMC ...
28,608,617 UART:
28,608,776 UART: [state] CFI Enabled
28,616,868 UART: [fht] FMC Alias Private Key: 7
30,947,257 UART: [art] Extend RT PCRs Done
30,948,481 UART: [art] Lock RT PCRs Done
30,949,855 UART: [art] Populate DV Done
30,955,256 UART: [fht] FMC Alias Private Key: 7
30,956,891 UART: [art] Derive CDI
30,957,622 UART: [art] Store in in slot 0x4
31,000,697 UART: [art] Derive Key Pair
31,001,743 UART: [art] Store priv key in slot 0x5
34,244,022 UART: [art] Derive Key Pair - Done
34,256,808 UART: [art] Signing Cert with AUTHO
34,258,165 UART: RITY.KEYID = 7
36,537,261 UART: [art] Erasing AUTHORITY.KEYID = 7
36,538,770 UART: [art] PUB.X = 0408D93A5128624B412C57C3F2669322CE8E3C667B031703CCFE19D57CCF99C0BD635BD8F2BC46D7E67D9960FB2D7420
36,545,994 UART: [art] PUB.Y = 4EC04C6406CE9B246D8B7A9D24AC5A57FB881F522BAD0454C0F3E029666E00524416A3C97ED4CF44E1B223839101B920
36,553,205 UART: [art] SIG.R = DA45D6B96F4AFE0CD7C468A05652C8871F11E0FB8917F6B8624D82EE7FDA250CFB24077E213A869EDCB86CFADA67500A
36,560,645 UART: [art] SIG.S = 7CAB0CFC0323700E6826309C6033801001C8ED6671A0BF067523DAE2838BF400A7E1AB610B7CF1B9BDACE00B55FD20C1
37,866,346 UART: Caliptra RT
37,867,033 UART: [state] CFI Enabled
37,985,545 UART: [rt] RT listening for mailbox commands...
37,987,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,143,106 UART: [rt]cmd =0x41544d4e, len=14344
45,704,219 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,125,205 ready_for_fw is high
4,125,564 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,050,254 >>> mbox cmd response: success
27,692,316 UART:
27,692,738 UART: Running Caliptra FMC ...
27,693,850 UART:
27,693,995 UART: [state] CFI Enabled
27,702,108 UART: [fht] FMC Alias Private Key: 7
30,032,657 UART: [art] Extend RT PCRs Done
30,033,882 UART: [art] Lock RT PCRs Done
30,035,868 UART: [art] Populate DV Done
30,041,431 UART: [fht] FMC Alias Private Key: 7
30,042,920 UART: [art] Derive CDI
30,043,650 UART: [art] Store in in slot 0x4
30,086,250 UART: [art] Derive Key Pair
30,087,299 UART: [art] Store priv key in slot 0x5
33,329,469 UART: [art] Derive Key Pair - Done
33,342,441 UART: [art] Signing Cert with AUTHO
33,343,780 UART: RITY.KEYID = 7
35,622,989 UART: [art] Erasing AUTHORITY.KEYID = 7
35,624,491 UART: [art] PUB.X = 826BD5C2629950A582525C83170984847184D26220D93998AFA85D0F54AF4B799AF26831D0EB097D611F932CCF6D70D2
35,631,728 UART: [art] PUB.Y = 7A45BD5EF72C17538498FD910F5A707DBE79A26AECD65BBEA3DC5B69EB840EA39B10EB2216488EBCE76555BED5498C85
35,638,974 UART: [art] SIG.R = 4753931CAE56C8449585485204D0F8620F1C8DA8DF9BB8DB72646156C9F443550070F2C7C57C0A750AEF4871F4596D08
35,646,358 UART: [art] SIG.S = EC691DEA668AD77342DD27D8DE48C595281D048EDF0142B9C2B6B50353AB1C0101C7E4F1B1E6F49FDB4DB80F5392B322
36,951,644 UART: Caliptra RT
36,952,348 UART: [state] CFI Enabled
37,070,816 UART: [rt] RT listening for mailbox commands...
37,073,136 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,228,680 UART: [rt]cmd =0x41544d4e, len=14344
44,763,512 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,009 UART:
192,378 UART: Running Caliptra ROM ...
193,486 UART:
193,632 UART: [state] CFI Enabled
263,770 UART: [state] LifecycleState = Unprovisioned
265,696 UART: [state] DebugLocked = No
267,504 UART: [state] WD Timer not started. Device not locked for debugging
271,389 UART: [kat] SHA2-256
450,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,102 UART: [kat] ++
462,636 UART: [kat] sha1
473,023 UART: [kat] SHA2-256
476,040 UART: [kat] SHA2-384
481,110 UART: [kat] SHA2-512-ACC
484,036 UART: [kat] ECC-384
2,947,941 UART: [kat] HMAC-384Kdf
2,971,615 UART: [kat] LMS
3,501,048 UART: [kat] --
3,505,079 UART: [cold-reset] ++
3,506,660 UART: [fht] FHT @ 0x50003400
3,518,140 UART: [idev] ++
3,518,715 UART: [idev] CDI.KEYID = 6
3,519,604 UART: [idev] SUBJECT.KEYID = 7
3,520,774 UART: [idev] UDS.KEYID = 0
3,521,822 ready_for_fw is high
3,522,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,027 UART: [idev] Erasing UDS.KEYID = 0
6,028,722 UART: [idev] Sha1 KeyId Algorithm
6,050,706 UART: [idev] --
6,053,702 UART: [ldev] ++
6,054,279 UART: [ldev] CDI.KEYID = 6
6,055,170 UART: [ldev] SUBJECT.KEYID = 5
6,056,385 UART: [ldev] AUTHORITY.KEYID = 7
6,057,620 UART: [ldev] FE.KEYID = 1
6,099,303 UART: [ldev] Erasing FE.KEYID = 1
8,604,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,723 UART: [ldev] --
10,414,204 UART: [fwproc] Wait for Commands...
10,417,315 UART: [fwproc] Recv command 0x46574c44
10,419,403 UART: [fwproc] Recv'd Img size: 114448 bytes
14,997,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,075,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,144,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,462,895 >>> mbox cmd response: success
15,467,033 UART: [afmc] ++
15,467,626 UART: [afmc] CDI.KEYID = 6
15,468,512 UART: [afmc] SUBJECT.KEYID = 7
15,469,721 UART: [afmc] AUTHORITY.KEYID = 5
17,997,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,722,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,723,966 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,739,900 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,755,871 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,771,668 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,792,808 UART: [afmc] --
19,796,826 UART: [cold-reset] --
19,800,677 UART: [state] Locking Datavault
19,805,816 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,475 UART: [state] Locking ICCM
19,809,248 UART: [exit] Launching FMC @ 0x40000130
19,817,702 UART:
19,817,935 UART: Running Caliptra FMC ...
19,819,037 UART:
19,819,199 UART: [state] CFI Enabled
19,882,359 UART: [fht] FMC Alias Private Key: 7
21,646,005 UART: [art] Extend RT PCRs Done
21,647,208 UART: [art] Lock RT PCRs Done
21,648,798 UART: [art] Populate DV Done
21,654,365 UART: [fht] FMC Alias Private Key: 7
21,656,063 UART: [art] Derive CDI
21,656,879 UART: [art] Store in in slot 0x4
21,714,510 UART: [art] Derive Key Pair
21,715,510 UART: [art] Store priv key in slot 0x5
24,178,270 UART: [art] Derive Key Pair - Done
24,191,213 UART: [art] Signing Cert with AUTHO
24,192,518 UART: RITY.KEYID = 7
25,904,427 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,914 UART: [art] PUB.X = 1AF42562A46B088D9EAAC48F1A607FCD3D051E38DA90BD92F4FD18FAE7F364F64EBBD6266CBCA135FFD6044EDDF2E95B
25,913,201 UART: [art] PUB.Y = BEF276FB1D3867BAEED9E2F5CEF20D0DD9C963E2F6684AF8D9687440185C328A78C765099045DFC06857F78F7DB32FDA
25,920,485 UART: [art] SIG.R = F1694F2EEA0ABAE918FCD91DBA2D67B8A6CF482F997D66BE957A05AD45A2AFDFFFC9A71D0A77FA6A66ACA08EB403E7A4
25,927,918 UART: [art] SIG.S = 6962F9272212F9E88C709569CA5D8AC7F312136CB92F0A18E6648C054A959766F18477FBD6869E68A52458C1624A4921
26,906,017 UART: Caliptra RT
26,906,725 UART: [state] CFI Enabled
27,071,197 UART: [rt] RT listening for mailbox commands...
27,073,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,365 UART: [rt]cmd =0x41544d4e, len=14344
31,775,251 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,365,459 ready_for_fw is high
3,366,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,046,433 >>> mbox cmd response: success
19,327,168 UART:
19,327,577 UART: Running Caliptra FMC ...
19,328,724 UART:
19,328,913 UART: [state] CFI Enabled
19,396,703 UART: [fht] FMC Alias Private Key: 7
21,160,363 UART: [art] Extend RT PCRs Done
21,161,586 UART: [art] Lock RT PCRs Done
21,162,992 UART: [art] Populate DV Done
21,168,329 UART: [fht] FMC Alias Private Key: 7
21,169,981 UART: [art] Derive CDI
21,170,800 UART: [art] Store in in slot 0x4
21,229,688 UART: [art] Derive Key Pair
21,230,733 UART: [art] Store priv key in slot 0x5
23,693,337 UART: [art] Derive Key Pair - Done
23,706,339 UART: [art] Signing Cert with AUTHO
23,707,642 UART: RITY.KEYID = 7
25,419,794 UART: [art] Erasing AUTHORITY.KEYID = 7
25,421,303 UART: [art] PUB.X = CCD0F1C439CAE91460ADF69974E9DCE172D0C1210084A9652DAED912BFF9B40D851B506BB24007F4CF00DDC425B01B73
25,428,519 UART: [art] PUB.Y = BC92073B8FD2220D63F7567BF0CA2C48A3AC2D488030C0A0E813B680429B733A3A6A6E498250E29925229CE8015EFD0A
25,435,749 UART: [art] SIG.R = D35A638EE1696EA0BF62084EC3C1ABF9939513C185B995808BFA08C9EADA0999574E63E1E847533C179E615B7828BBC6
25,443,165 UART: [art] SIG.S = 9124DFF89C41DD4AF759A480974B0D546453503F83C7FA481517A39B64F88B957288F818D648AED437D067E5D3E396BD
26,421,809 UART: Caliptra RT
26,422,506 UART: [state] CFI Enabled
26,589,295 UART: [rt] RT listening for mailbox commands...
26,591,594 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,747,582 UART: [rt]cmd =0x41544d4e, len=14344
31,287,023 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,311 UART:
192,696 UART: Running Caliptra ROM ...
193,836 UART:
603,297 UART: [state] CFI Enabled
616,677 UART: [state] LifecycleState = Unprovisioned
618,563 UART: [state] DebugLocked = No
620,148 UART: [state] WD Timer not started. Device not locked for debugging
623,814 UART: [kat] SHA2-256
802,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,485 UART: [kat] ++
814,926 UART: [kat] sha1
826,148 UART: [kat] SHA2-256
829,218 UART: [kat] SHA2-384
835,201 UART: [kat] SHA2-512-ACC
838,128 UART: [kat] ECC-384
3,276,760 UART: [kat] HMAC-384Kdf
3,288,671 UART: [kat] LMS
3,818,169 UART: [kat] --
3,822,105 UART: [cold-reset] ++
3,824,533 UART: [fht] FHT @ 0x50003400
3,835,640 UART: [idev] ++
3,836,216 UART: [idev] CDI.KEYID = 6
3,837,093 UART: [idev] SUBJECT.KEYID = 7
3,838,262 UART: [idev] UDS.KEYID = 0
3,839,255 ready_for_fw is high
3,839,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,196 UART: [idev] Erasing UDS.KEYID = 0
6,312,882 UART: [idev] Sha1 KeyId Algorithm
6,336,055 UART: [idev] --
6,339,989 UART: [ldev] ++
6,340,554 UART: [ldev] CDI.KEYID = 6
6,341,429 UART: [ldev] SUBJECT.KEYID = 5
6,342,630 UART: [ldev] AUTHORITY.KEYID = 7
6,343,906 UART: [ldev] FE.KEYID = 1
6,356,031 UART: [ldev] Erasing FE.KEYID = 1
8,830,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,368 UART: [ldev] --
10,619,173 UART: [fwproc] Wait for Commands...
10,621,312 UART: [fwproc] Recv command 0x46574c44
10,623,393 UART: [fwproc] Recv'd Img size: 114448 bytes
15,197,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,277,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,345,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,664,799 >>> mbox cmd response: success
15,669,395 UART: [afmc] ++
15,669,986 UART: [afmc] CDI.KEYID = 6
15,670,889 UART: [afmc] SUBJECT.KEYID = 7
15,672,097 UART: [afmc] AUTHORITY.KEYID = 5
18,173,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,891,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,893,536 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,909,511 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,925,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,941,235 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,963,298 UART: [afmc] --
19,966,607 UART: [cold-reset] --
19,970,793 UART: [state] Locking Datavault
19,975,073 UART: [state] Locking PCR0, PCR1 and PCR31
19,976,715 UART: [state] Locking ICCM
19,979,290 UART: [exit] Launching FMC @ 0x40000130
19,987,734 UART:
19,987,962 UART: Running Caliptra FMC ...
19,989,054 UART:
19,989,204 UART: [state] CFI Enabled
19,997,676 UART: [fht] FMC Alias Private Key: 7
21,754,482 UART: [art] Extend RT PCRs Done
21,755,712 UART: [art] Lock RT PCRs Done
21,757,628 UART: [art] Populate DV Done
21,763,250 UART: [fht] FMC Alias Private Key: 7
21,764,782 UART: [art] Derive CDI
21,765,590 UART: [art] Store in in slot 0x4
21,808,029 UART: [art] Derive Key Pair
21,809,062 UART: [art] Store priv key in slot 0x5
24,235,975 UART: [art] Derive Key Pair - Done
24,248,918 UART: [art] Signing Cert with AUTHO
24,250,222 UART: RITY.KEYID = 7
25,955,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,957,031 UART: [art] PUB.X = 19383B38FF31E68B88712BB5BF12EC7C1C4965DA48822422C9EB7872BD4D9B251E3EFE58D6930ED8C65211B7C40B178E
25,964,314 UART: [art] PUB.Y = 366B713D94F5A2D8FB2846D012A05FB276028E61024C3295CEFBF97D5F1A3429E56021C3077EF043558CD92ABAF2F8A6
25,971,521 UART: [art] SIG.R = F8D0763AFCB5E25A2B7212D21D87F1816E5B9017ACC42D32B434B5DF85885C90DED1E3DF6F652A5677AE51D8623E7304
25,978,953 UART: [art] SIG.S = 02E4FB39021BD83D3A98E24468413E2DD93173497FCDFD70E9DA4C6D41F817023C2B61936443508046888F73CF3FAF1D
26,957,359 UART: Caliptra RT
26,958,046 UART: [state] CFI Enabled
27,075,540 UART: [rt] RT listening for mailbox commands...
27,077,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,233,388 UART: [rt]cmd =0x41544d4e, len=14344
31,777,554 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,696,117 ready_for_fw is high
3,696,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,259,790 >>> mbox cmd response: success
19,517,656 UART:
19,518,032 UART: Running Caliptra FMC ...
19,519,229 UART:
19,519,388 UART: [state] CFI Enabled
19,527,268 UART: [fht] FMC Alias Private Key: 7
21,284,144 UART: [art] Extend RT PCRs Done
21,285,369 UART: [art] Lock RT PCRs Done
21,287,375 UART: [art] Populate DV Done
21,292,867 UART: [fht] FMC Alias Private Key: 7
21,294,516 UART: [art] Derive CDI
21,295,329 UART: [art] Store in in slot 0x4
21,337,994 UART: [art] Derive Key Pair
21,338,992 UART: [art] Store priv key in slot 0x5
23,765,693 UART: [art] Derive Key Pair - Done
23,778,547 UART: [art] Signing Cert with AUTHO
23,779,851 UART: RITY.KEYID = 7
25,485,447 UART: [art] Erasing AUTHORITY.KEYID = 7
25,486,984 UART: [art] PUB.X = 0D3034F58590E2E571D64522F35A9801605089F8E7DF74DAE7B747F58D6952D150B7430EB9A36BD8D23EA3DEDA404513
25,494,209 UART: [art] PUB.Y = 46F83F466D7098634FF0C86F367D85AC7075203413CBE8AD0936419DDF28125108B3088618379EFF7FE1EBA3E851F194
25,501,449 UART: [art] SIG.R = 365F317FF1C8C66E51C550AEF5A9408014228E17B18F6090D6530AA31E740ADD86023BFF9084509907792157ACDD468E
25,508,836 UART: [art] SIG.S = FDCF633F6E9A2360E27E56B4BB9EAC08764B0474B8FF7AAF745FF35B16C98B46088415F97850A7442BCFFD963CB6B01B
26,488,521 UART: Caliptra RT
26,489,217 UART: [state] CFI Enabled
26,605,873 UART: [rt] RT listening for mailbox commands...
26,608,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,763,592 UART: [rt]cmd =0x41544d4e, len=14344
31,302,048 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,036 UART:
192,402 UART: Running Caliptra ROM ...
193,601 UART:
193,755 UART: [state] CFI Enabled
263,220 UART: [state] LifecycleState = Unprovisioned
265,542 UART: [state] DebugLocked = No
268,085 UART: [state] WD Timer not started. Device not locked for debugging
272,825 UART: [kat] SHA2-256
462,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,524 UART: [kat] ++
474,021 UART: [kat] sha1
486,674 UART: [kat] SHA2-256
489,688 UART: [kat] SHA2-384
496,171 UART: [kat] SHA2-512-ACC
498,818 UART: [kat] ECC-384
2,950,531 UART: [kat] HMAC-384Kdf
2,972,210 UART: [kat] LMS
3,504,009 UART: [kat] --
3,510,493 UART: [cold-reset] ++
3,512,275 UART: [fht] FHT @ 0x50003400
3,523,033 UART: [idev] ++
3,523,748 UART: [idev] CDI.KEYID = 6
3,524,750 UART: [idev] SUBJECT.KEYID = 7
3,525,933 UART: [idev] UDS.KEYID = 0
3,526,859 ready_for_fw is high
3,527,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,124 UART: [idev] Erasing UDS.KEYID = 0
6,029,126 UART: [idev] Sha1 KeyId Algorithm
6,050,550 UART: [idev] --
6,055,015 UART: [ldev] ++
6,055,718 UART: [ldev] CDI.KEYID = 6
6,056,633 UART: [ldev] SUBJECT.KEYID = 5
6,057,851 UART: [ldev] AUTHORITY.KEYID = 7
6,058,960 UART: [ldev] FE.KEYID = 1
6,103,464 UART: [ldev] Erasing FE.KEYID = 1
8,608,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,968 UART: [ldev] --
10,417,444 UART: [fwproc] Wait for Commands...
10,419,532 UART: [fwproc] Recv command 0x46574c44
10,421,837 UART: [fwproc] Recv'd Img size: 114448 bytes
15,051,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,133,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,792,954 >>> mbox cmd response: success
15,797,135 UART: [afmc] ++
15,797,840 UART: [afmc] CDI.KEYID = 6
15,799,090 UART: [afmc] SUBJECT.KEYID = 7
15,800,534 UART: [afmc] AUTHORITY.KEYID = 5
18,326,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,052,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,054,592 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,069,673 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,084,889 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,099,719 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,123,034 UART: [afmc] --
20,127,320 UART: [cold-reset] --
20,130,308 UART: [state] Locking Datavault
20,134,973 UART: [state] Locking PCR0, PCR1 and PCR31
20,137,112 UART: [state] Locking ICCM
20,139,871 UART: [exit] Launching FMC @ 0x40000130
20,148,494 UART:
20,148,725 UART: Running Caliptra FMC ...
20,149,818 UART:
20,149,978 UART: [state] CFI Enabled
20,207,423 UART: [fht] FMC Alias Private Key: 7
21,971,670 UART: [art] Extend RT PCRs Done
21,972,922 UART: [art] Lock RT PCRs Done
21,974,311 UART: [art] Populate DV Done
21,979,724 UART: [fht] FMC Alias Private Key: 7
21,981,311 UART: [art] Derive CDI
21,982,048 UART: [art] Store in in slot 0x4
22,040,052 UART: [art] Derive Key Pair
22,041,054 UART: [art] Store priv key in slot 0x5
24,504,436 UART: [art] Derive Key Pair - Done
24,517,560 UART: [art] Signing Cert with AUTHO
24,518,870 UART: RITY.KEYID = 7
26,229,656 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,166 UART: [art] PUB.X = A5046F01CD230F0B7E6C440285F111DBC22EDD99A56ABDD803497251C30057CF02275493B6EDC2069ED73A2144AA5705
26,238,362 UART: [art] PUB.Y = E94B702878A37F39CE22E913EED6504D6DF913E9F679A1C6637BD4FB3EDC2BEE068518855AF428BA3BAF8994C28DF19B
26,245,642 UART: [art] SIG.R = 477690975A48730C77773116D255A5F46A47E974C118D3C417050E296C4721FC2549F8356D5131014E0604DB3C5CDD7F
26,252,969 UART: [art] SIG.S = 44C40C167D654AA8C479C1DAB7E76A20456B315D8092422667DE3E438DF75A6B63EB02F8BD35E76357A982CFD17DB04C
27,231,782 UART: Caliptra RT
27,232,491 UART: [state] CFI Enabled
27,398,654 UART: [rt] RT listening for mailbox commands...
27,400,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,108 UART: [rt]cmd =0x41544d4e, len=14344
32,089,790 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,440,148 ready_for_fw is high
3,440,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,830,987 >>> mbox cmd response: success
20,117,912 UART:
20,118,296 UART: Running Caliptra FMC ...
20,119,405 UART:
20,119,555 UART: [state] CFI Enabled
20,184,955 UART: [fht] FMC Alias Private Key: 7
21,948,786 UART: [art] Extend RT PCRs Done
21,950,008 UART: [art] Lock RT PCRs Done
21,951,538 UART: [art] Populate DV Done
21,956,669 UART: [fht] FMC Alias Private Key: 7
21,958,223 UART: [art] Derive CDI
21,958,961 UART: [art] Store in in slot 0x4
22,017,659 UART: [art] Derive Key Pair
22,018,701 UART: [art] Store priv key in slot 0x5
24,481,430 UART: [art] Derive Key Pair - Done
24,494,159 UART: [art] Signing Cert with AUTHO
24,495,495 UART: RITY.KEYID = 7
26,207,986 UART: [art] Erasing AUTHORITY.KEYID = 7
26,209,492 UART: [art] PUB.X = AD91D314D4287995846E62754ADF02817A48CD30B47637E887B609F8B83DBD08BF1FDC480C288DA8532F9185D4866F33
26,216,742 UART: [art] PUB.Y = BD90A3045EB51C1FEBA62E28EDE9EA101EB4411A65806716D9AAE8F5B642120F908F0BBE9D2F3C557E56EE73A9C113D0
26,224,049 UART: [art] SIG.R = 998BFE7D267B9202324F059E96D2B40B5128512692DF53FCF374152025BEEEFF4AD1D030692FA50FED68A40B81E2098D
26,231,387 UART: [art] SIG.S = 68CD3A7081AD74092D7626A6B8A634A889E96DE9D36E49ADCE7CD2E59975B7C53BDF52EE7E37FC14CE3444292B32CD44
27,210,721 UART: Caliptra RT
27,211,428 UART: [state] CFI Enabled
27,376,281 UART: [rt] RT listening for mailbox commands...
27,378,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,534,456 UART: [rt]cmd =0x41544d4e, len=14344
32,061,065 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,527 UART:
192,910 UART: Running Caliptra ROM ...
194,109 UART:
603,744 UART: [state] CFI Enabled
616,714 UART: [state] LifecycleState = Unprovisioned
619,110 UART: [state] DebugLocked = No
621,132 UART: [state] WD Timer not started. Device not locked for debugging
625,580 UART: [kat] SHA2-256
815,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,244 UART: [kat] ++
826,836 UART: [kat] sha1
838,562 UART: [kat] SHA2-256
841,625 UART: [kat] SHA2-384
847,387 UART: [kat] SHA2-512-ACC
849,969 UART: [kat] ECC-384
3,293,460 UART: [kat] HMAC-384Kdf
3,306,436 UART: [kat] LMS
3,838,252 UART: [kat] --
3,843,198 UART: [cold-reset] ++
3,844,568 UART: [fht] FHT @ 0x50003400
3,857,549 UART: [idev] ++
3,858,234 UART: [idev] CDI.KEYID = 6
3,859,189 UART: [idev] SUBJECT.KEYID = 7
3,860,361 UART: [idev] UDS.KEYID = 0
3,861,255 ready_for_fw is high
3,861,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,003 UART: [idev] Erasing UDS.KEYID = 0
6,338,231 UART: [idev] Sha1 KeyId Algorithm
6,361,079 UART: [idev] --
6,367,173 UART: [ldev] ++
6,367,844 UART: [ldev] CDI.KEYID = 6
6,368,742 UART: [ldev] SUBJECT.KEYID = 5
6,369,945 UART: [ldev] AUTHORITY.KEYID = 7
6,371,166 UART: [ldev] FE.KEYID = 1
6,383,313 UART: [ldev] Erasing FE.KEYID = 1
8,859,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,460 UART: [ldev] --
10,650,985 UART: [fwproc] Wait for Commands...
10,652,963 UART: [fwproc] Recv command 0x46574c44
10,655,414 UART: [fwproc] Recv'd Img size: 114448 bytes
15,291,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,374,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,490,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,033,396 >>> mbox cmd response: success
16,036,922 UART: [afmc] ++
16,037,626 UART: [afmc] CDI.KEYID = 6
16,038,812 UART: [afmc] SUBJECT.KEYID = 7
16,040,295 UART: [afmc] AUTHORITY.KEYID = 5
18,546,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,268,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,270,466 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,285,522 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,300,720 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,315,563 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,339,506 UART: [afmc] --
20,343,350 UART: [cold-reset] --
20,348,618 UART: [state] Locking Datavault
20,353,176 UART: [state] Locking PCR0, PCR1 and PCR31
20,355,318 UART: [state] Locking ICCM
20,358,108 UART: [exit] Launching FMC @ 0x40000130
20,366,778 UART:
20,367,000 UART: Running Caliptra FMC ...
20,368,096 UART:
20,368,254 UART: [state] CFI Enabled
20,376,234 UART: [fht] FMC Alias Private Key: 7
22,133,173 UART: [art] Extend RT PCRs Done
22,134,385 UART: [art] Lock RT PCRs Done
22,136,107 UART: [art] Populate DV Done
22,141,614 UART: [fht] FMC Alias Private Key: 7
22,143,251 UART: [art] Derive CDI
22,144,058 UART: [art] Store in in slot 0x4
22,186,922 UART: [art] Derive Key Pair
22,187,950 UART: [art] Store priv key in slot 0x5
24,614,426 UART: [art] Derive Key Pair - Done
24,627,419 UART: [art] Signing Cert with AUTHO
24,628,721 UART: RITY.KEYID = 7
26,334,055 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,747 UART: [art] PUB.X = E2407CF8DAE5D41A12433281F46738B095C01F49E5713D52B6CF7D7B22847E71681564EA9774F74E124378153C13FE17
26,342,813 UART: [art] PUB.Y = B50C54922F7EE7C0C67363D12D4F9ED8D05DAA7B492B75F1B395BBED3F743ED93C2D3EF8DC2D72A5E3A2FA68DDB3140A
26,350,084 UART: [art] SIG.R = F57A067BE2F1D1B126053F6090FAA10166AF5419851AD461B46B92976D51749133B0AE9AC4B3FD34F75DB13B7140C865
26,357,457 UART: [art] SIG.S = 13DA67AA1946F6E6909011AE458D4B2D9AFD8DA4931E0FBDAFCE0DCC87A374224F6A4EC99A5DFBF6ED67D92FD643858B
27,336,437 UART: Caliptra RT
27,337,118 UART: [state] CFI Enabled
27,453,904 UART: [rt] RT listening for mailbox commands...
27,456,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,611,480 UART: [rt]cmd =0x41544d4e, len=14344
32,152,703 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,753,929 ready_for_fw is high
3,754,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,066,642 >>> mbox cmd response: success
20,317,891 UART:
20,318,277 UART: Running Caliptra FMC ...
20,319,364 UART:
20,319,514 UART: [state] CFI Enabled
20,327,347 UART: [fht] FMC Alias Private Key: 7
22,083,334 UART: [art] Extend RT PCRs Done
22,084,566 UART: [art] Lock RT PCRs Done
22,086,144 UART: [art] Populate DV Done
22,091,844 UART: [fht] FMC Alias Private Key: 7
22,093,495 UART: [art] Derive CDI
22,094,309 UART: [art] Store in in slot 0x4
22,137,174 UART: [art] Derive Key Pair
22,138,160 UART: [art] Store priv key in slot 0x5
24,564,453 UART: [art] Derive Key Pair - Done
24,577,286 UART: [art] Signing Cert with AUTHO
24,578,596 UART: RITY.KEYID = 7
26,283,871 UART: [art] Erasing AUTHORITY.KEYID = 7
26,285,389 UART: [art] PUB.X = 47EE6EF86060BE9FF6B755EFA1CEC727269CEBE3BE107C2AE87971F73598C17D62A8B8A7A3F54962D6EE35910FE6DF42
26,292,656 UART: [art] PUB.Y = E4D7DE75BB4106092A920B928497806EA921ACDAE54085F1FE654F57FD2BAEADDEF129402863D165532987268675E48D
26,299,899 UART: [art] SIG.R = 73ECBCD5FB22E7C26098C458DB39DA589C9500367511129B30653CCE738FCD81EB96687C15FDFB2F18254D68E1730E3F
26,307,277 UART: [art] SIG.S = 591FD7C0FFE63217ADEF96C46109D264B60925CD9B43CF8EB46A7683F0F59A4398F493F0C0CA7AA3DBE250441A3282D1
27,285,924 UART: Caliptra RT
27,286,618 UART: [state] CFI Enabled
27,403,026 UART: [rt] RT listening for mailbox commands...
27,405,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,560,566 UART: [rt]cmd =0x41544d4e, len=14344
32,104,371 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,360 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,995 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 ready_for_fw is high
1,481,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,356 UART: [idev] Erasing UDS.KEYID = 0
1,504,792 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,485 UART: [ldev] ++
1,514,653 UART: [ldev] CDI.KEYID = 6
1,515,016 UART: [ldev] SUBJECT.KEYID = 5
1,515,442 UART: [ldev] AUTHORITY.KEYID = 7
1,515,905 UART: [ldev] FE.KEYID = 1
1,521,227 UART: [ldev] Erasing FE.KEYID = 1
1,546,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,638 UART: [ldev] --
1,585,925 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 114448 bytes
5,084,306 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,113,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,142,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,278,501 >>> mbox cmd response: success
5,279,567 UART: [afmc] ++
5,279,735 UART: [afmc] CDI.KEYID = 6
5,280,097 UART: [afmc] SUBJECT.KEYID = 7
5,280,522 UART: [afmc] AUTHORITY.KEYID = 5
5,315,446 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,744 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,453 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,345 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,350,046 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,358,016 UART: [afmc] --
5,359,130 UART: [cold-reset] --
5,360,012 UART: [state] Locking Datavault
5,361,161 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,765 UART: [state] Locking ICCM
5,362,201 UART: [exit] Launching FMC @ 0x40000130
5,367,530 UART:
5,367,546 UART: Running Caliptra FMC ...
5,367,954 UART:
5,368,008 UART: [state] CFI Enabled
5,378,824 UART: [fht] FMC Alias Private Key: 7
5,486,390 UART: [art] Extend RT PCRs Done
5,486,818 UART: [art] Lock RT PCRs Done
5,488,126 UART: [art] Populate DV Done
5,496,434 UART: [fht] FMC Alias Private Key: 7
5,497,412 UART: [art] Derive CDI
5,497,692 UART: [art] Store in in slot 0x4
5,583,467 UART: [art] Derive Key Pair
5,583,827 UART: [art] Store priv key in slot 0x5
5,597,543 UART: [art] Derive Key Pair - Done
5,612,696 UART: [art] Signing Cert with AUTHO
5,613,176 UART: RITY.KEYID = 7
5,628,606 UART: [art] Erasing AUTHORITY.KEYID = 7
5,629,371 UART: [art] PUB.X = 03EF29E19E29F8221336768B8568570EDE3047F33D9E7BE2916276B3B5BF3881694BE8B6E5B600F6F02FC23C680966A7
5,636,106 UART: [art] PUB.Y = 1DC05DF8EF517FAFA10B4C9D5576657259CFFA3768F59F967C5D68C0337542D44BAFFF78605EC186F32412DD1C4CC766
5,643,063 UART: [art] SIG.R = 3E461ED68D29FA54D8C6A6AE2E7D72E4A119F2D32239ED55C56AC769EBB4C21CC733DFACFBBF8DCE99C50B84DBE563AB
5,649,860 UART: [art] SIG.S = D1EC4277CED870AD5A445F055282167EB9857515C458DFD767BB097C3EB3066E048177CF2DA3F813792712D6C7AE5381
5,673,755 UART: Caliptra RT
5,674,008 UART: [state] CFI Enabled
5,781,239 UART: [rt] RT listening for mailbox commands...
5,781,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,763 UART: [rt]cmd =0x41544d4e, len=14344
6,825,263 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 ready_for_fw is high
1,362,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,964 >>> mbox cmd response: success
5,379,457 UART:
5,379,473 UART: Running Caliptra FMC ...
5,379,881 UART:
5,379,935 UART: [state] CFI Enabled
5,390,645 UART: [fht] FMC Alias Private Key: 7
5,499,171 UART: [art] Extend RT PCRs Done
5,499,599 UART: [art] Lock RT PCRs Done
5,501,115 UART: [art] Populate DV Done
5,509,267 UART: [fht] FMC Alias Private Key: 7
5,510,287 UART: [art] Derive CDI
5,510,567 UART: [art] Store in in slot 0x4
5,596,302 UART: [art] Derive Key Pair
5,596,662 UART: [art] Store priv key in slot 0x5
5,610,450 UART: [art] Derive Key Pair - Done
5,625,101 UART: [art] Signing Cert with AUTHO
5,625,581 UART: RITY.KEYID = 7
5,640,773 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,538 UART: [art] PUB.X = E96C45BCA12DC3819A76EF552E145EDAF2C49A53ECAD127EFDF68606381394D67D42D7F47DE6409C1A3106F83BD4A762
5,648,314 UART: [art] PUB.Y = D81787E2A9A4011991F3858EB33954A95A3F6E652A0A0E270F361AD01D6556A164BD10D921C803D904CAC2ABD18862CA
5,655,248 UART: [art] SIG.R = CD0A82DE4C81BC77F2D7F35142C70913AFF631610EFFE67644A5FB4A6273AC90B349EC58B408034163719050C1C722E1
5,662,005 UART: [art] SIG.S = C0A6F2E03BBA1D4B6F45CAFF86F7DE41AE49C4986B9A5EB07381345BDAA3BC7AE7ED2A731A62253FEDBA12BE7DE7A861
5,685,910 UART: Caliptra RT
5,686,163 UART: [state] CFI Enabled
5,794,339 UART: [rt] RT listening for mailbox commands...
5,795,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,917,985 UART: [rt]cmd =0x41544d4e, len=14344
6,850,198 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,907 UART: [idev] ++
1,480,075 UART: [idev] CDI.KEYID = 6
1,480,435 UART: [idev] SUBJECT.KEYID = 7
1,480,859 UART: [idev] UDS.KEYID = 0
1,481,204 ready_for_fw is high
1,481,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,593 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,099 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,850 UART: [ldev] Erasing FE.KEYID = 1
1,547,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,065 UART: [ldev] --
1,587,352 UART: [fwproc] Waiting for Commands...
1,588,081 UART: [fwproc] Received command 0x46574c44
1,588,872 UART: [fwproc] Received Image of size 114448 bytes
5,349,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,377,328 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,406,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,542,609 >>> mbox cmd response: success
5,543,863 UART: [afmc] ++
5,544,031 UART: [afmc] CDI.KEYID = 6
5,544,393 UART: [afmc] SUBJECT.KEYID = 7
5,544,818 UART: [afmc] AUTHORITY.KEYID = 5
5,580,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,596,528 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,597,308 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,603,017 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,608,909 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,614,610 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,622,324 UART: [afmc] --
5,623,436 UART: [cold-reset] --
5,624,420 UART: [state] Locking Datavault
5,625,547 UART: [state] Locking PCR0, PCR1 and PCR31
5,626,151 UART: [state] Locking ICCM
5,626,655 UART: [exit] Launching FMC @ 0x40000130
5,631,984 UART:
5,632,000 UART: Running Caliptra FMC ...
5,632,408 UART:
5,632,551 UART: [state] CFI Enabled
5,643,109 UART: [fht] FMC Alias Private Key: 7
5,751,299 UART: [art] Extend RT PCRs Done
5,751,727 UART: [art] Lock RT PCRs Done
5,753,137 UART: [art] Populate DV Done
5,761,097 UART: [fht] FMC Alias Private Key: 7
5,762,189 UART: [art] Derive CDI
5,762,469 UART: [art] Store in in slot 0x4
5,847,442 UART: [art] Derive Key Pair
5,847,802 UART: [art] Store priv key in slot 0x5
5,861,248 UART: [art] Derive Key Pair - Done
5,875,982 UART: [art] Signing Cert with AUTHO
5,876,462 UART: RITY.KEYID = 7
5,892,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,892,775 UART: [art] PUB.X = 58AF2FA9BBF41591F648EE338DCE36B7A93F767BA4DAC94AEA18C10F1A5A7767F7F9B6FD3E24C21AB93BF2DB3A742B59
5,899,566 UART: [art] PUB.Y = A5FDF50D5C3EC3370FDCCEB575959FBA948F4DB6EF75E136F38BB1F54003FCDF432028472D47696E6D0E9556B84DE338
5,906,518 UART: [art] SIG.R = 293A08579D5810E0C8C7FD074A348D14D04881B9F1E732DE02E991873C2045519991EAF413266DA9D90A090C13B685BC
5,913,264 UART: [art] SIG.S = 44C2A3A5DC8D66DE8C9E06F2896970071E202B4A5F7D73541E1F3C74C4C06F77F35AC97BC33CAB3BE34FABC27006715E
5,936,924 UART: Caliptra RT
5,937,269 UART: [state] CFI Enabled
6,045,547 UART: [rt] RT listening for mailbox commands...
6,046,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,079 UART: [rt]cmd =0x41544d4e, len=14344
7,084,613 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,344 ready_for_fw is high
1,362,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,280,082 >>> mbox cmd response: success
5,341,883 UART:
5,341,899 UART: Running Caliptra FMC ...
5,342,307 UART:
5,342,450 UART: [state] CFI Enabled
5,352,900 UART: [fht] FMC Alias Private Key: 7
5,460,738 UART: [art] Extend RT PCRs Done
5,461,166 UART: [art] Lock RT PCRs Done
5,462,704 UART: [art] Populate DV Done
5,470,904 UART: [fht] FMC Alias Private Key: 7
5,471,990 UART: [art] Derive CDI
5,472,270 UART: [art] Store in in slot 0x4
5,557,931 UART: [art] Derive Key Pair
5,558,291 UART: [art] Store priv key in slot 0x5
5,571,583 UART: [art] Derive Key Pair - Done
5,586,580 UART: [art] Signing Cert with AUTHO
5,587,060 UART: RITY.KEYID = 7
5,602,406 UART: [art] Erasing AUTHORITY.KEYID = 7
5,603,171 UART: [art] PUB.X = 819397B41F367980D6D23456D335F8B8AFF405B22E09A6A7ADE23F45AED93FDD9EC26A0FF1580133E3FFA80BC1B16A93
5,609,938 UART: [art] PUB.Y = BCD8B510D726F6520074C1437634ED79812D72E0A7DC02147B6DF8A35602EFEFEE7B07F52AE31799EF8A575592854301
5,616,854 UART: [art] SIG.R = B1D2F0F83B8728BA3AEF98045F2867839DBA48600F4799EFF6C804780675C23F4F784E75F0BF81C58459A9E4972CA355
5,623,612 UART: [art] SIG.S = 1B907378B156631BD128D95D7DA20979B301B62B6D77DC7E9152B7D6B01382442D749A39F91B6FFB6FBCA3FA7B8AB0AD
5,647,687 UART: Caliptra RT
5,648,032 UART: [state] CFI Enabled
5,756,445 UART: [rt] RT listening for mailbox commands...
5,757,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,341 UART: [rt]cmd =0x41544d4e, len=14344
6,806,251 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
893,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,845 UART: [kat] ++
897,997 UART: [kat] sha1
902,291 UART: [kat] SHA2-256
904,231 UART: [kat] SHA2-384
906,796 UART: [kat] SHA2-512-ACC
908,697 UART: [kat] ECC-384
918,356 UART: [kat] HMAC-384Kdf
922,914 UART: [kat] LMS
1,171,242 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 ready_for_fw is high
1,176,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,158 UART: [idev] Erasing UDS.KEYID = 0
1,200,883 UART: [idev] Sha1 KeyId Algorithm
1,209,393 UART: [idev] --
1,210,323 UART: [ldev] ++
1,210,491 UART: [ldev] CDI.KEYID = 6
1,210,854 UART: [ldev] SUBJECT.KEYID = 5
1,211,280 UART: [ldev] AUTHORITY.KEYID = 7
1,211,743 UART: [ldev] FE.KEYID = 1
1,217,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 114448 bytes
3,135,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,919 >>> mbox cmd response: success
3,328,983 UART: [afmc] ++
3,329,151 UART: [afmc] CDI.KEYID = 6
3,329,513 UART: [afmc] SUBJECT.KEYID = 7
3,329,938 UART: [afmc] AUTHORITY.KEYID = 5
3,365,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,177 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,886 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,778 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,489 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,390 UART: [afmc] --
3,409,460 UART: [cold-reset] --
3,410,308 UART: [state] Locking Datavault
3,411,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,059 UART: [state] Locking ICCM
3,412,541 UART: [exit] Launching FMC @ 0x40000130
3,417,870 UART:
3,417,886 UART: Running Caliptra FMC ...
3,418,294 UART:
3,418,348 UART: [state] CFI Enabled
3,428,832 UART: [fht] FMC Alias Private Key: 7
3,537,074 UART: [art] Extend RT PCRs Done
3,537,502 UART: [art] Lock RT PCRs Done
3,539,026 UART: [art] Populate DV Done
3,547,254 UART: [fht] FMC Alias Private Key: 7
3,548,404 UART: [art] Derive CDI
3,548,684 UART: [art] Store in in slot 0x4
3,634,795 UART: [art] Derive Key Pair
3,635,155 UART: [art] Store priv key in slot 0x5
3,648,337 UART: [art] Derive Key Pair - Done
3,662,827 UART: [art] Signing Cert with AUTHO
3,663,307 UART: RITY.KEYID = 7
3,678,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,260 UART: [art] PUB.X = C776B1127176BF8D570770AC4E40BA3958DF2C738211AB3298985A4C60FD94598E05214B0BDB95166D61F04CD9C51ACB
3,686,023 UART: [art] PUB.Y = 00759210AA57F6B0B72EEA294B479F9976F700F95B4254A641E930A70C10B921B7D84F570B1FC949BB267A0CD49B829F
3,692,920 UART: [art] SIG.R = 933A01B0F1EEFB481F0DB1BAA5CB771158B98222D3309028630831814A4132FEAF9A21935E957E2EBD8F4795230D18F1
3,699,678 UART: [art] SIG.S = 8BE53CDEAEEDD2251F64E4EB0C6C47F0726C11A3D9E3EF157F5758D299423682C80204363FBDA686971A5409D4FB2AB9
3,723,833 UART: Caliptra RT
3,724,086 UART: [state] CFI Enabled
3,831,099 UART: [rt] RT listening for mailbox commands...
3,831,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,029 UART: [rt]cmd =0x41544d4e, len=14344
4,885,381 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,679 ready_for_fw is high
1,060,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,405 >>> mbox cmd response: success
3,235,826 UART:
3,235,842 UART: Running Caliptra FMC ...
3,236,250 UART:
3,236,304 UART: [state] CFI Enabled
3,246,598 UART: [fht] FMC Alias Private Key: 7
3,354,424 UART: [art] Extend RT PCRs Done
3,354,852 UART: [art] Lock RT PCRs Done
3,356,426 UART: [art] Populate DV Done
3,364,570 UART: [fht] FMC Alias Private Key: 7
3,365,596 UART: [art] Derive CDI
3,365,876 UART: [art] Store in in slot 0x4
3,451,791 UART: [art] Derive Key Pair
3,452,151 UART: [art] Store priv key in slot 0x5
3,464,799 UART: [art] Derive Key Pair - Done
3,479,636 UART: [art] Signing Cert with AUTHO
3,480,116 UART: RITY.KEYID = 7
3,495,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,181 UART: [art] PUB.X = CE39427AD48B3ED04D677DAEF25EEE9F8C6CB46D2D6B3F0057CDDA97B8CA7F0EE1127D2470E813A5033FC8A56ADB499C
3,502,947 UART: [art] PUB.Y = 695D4A1934CFAEE38636BA9B958331E5D774130A6ADC6E3D7F7212BA94F2AA83B0181FF9FBA64308763AEFAA28F1CAB0
3,509,907 UART: [art] SIG.R = 60B9127ED8AD3648A58BDEA556D956096840A19B23BC36D64CFD97F7F9DB95FAD04CAB5BE8F393C71268EF49E8D3F7A3
3,516,690 UART: [art] SIG.S = 938E03E45725EE19D2AD510DF004ACC104297BFC684ACE71E025A08B1C4E0D96F7D5F972FEFA3145825F60559C52C50A
3,540,443 UART: Caliptra RT
3,540,696 UART: [state] CFI Enabled
3,648,432 UART: [rt] RT listening for mailbox commands...
3,649,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,904 UART: [rt]cmd =0x41544d4e, len=14344
4,679,939 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,971 UART: [state] LifecycleState = Unprovisioned
86,626 UART: [state] DebugLocked = No
87,352 UART: [state] WD Timer not started. Device not locked for debugging
88,491 UART: [kat] SHA2-256
894,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,266 UART: [kat] ++
898,418 UART: [kat] sha1
902,746 UART: [kat] SHA2-256
904,686 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,522 UART: [cold-reset] ++
1,173,052 UART: [fht] FHT @ 0x50003400
1,175,875 UART: [idev] ++
1,176,043 UART: [idev] CDI.KEYID = 6
1,176,403 UART: [idev] SUBJECT.KEYID = 7
1,176,827 UART: [idev] UDS.KEYID = 0
1,177,172 ready_for_fw is high
1,177,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,899 UART: [idev] Erasing UDS.KEYID = 0
1,202,158 UART: [idev] Sha1 KeyId Algorithm
1,210,712 UART: [idev] --
1,211,870 UART: [ldev] ++
1,212,038 UART: [ldev] CDI.KEYID = 6
1,212,401 UART: [ldev] SUBJECT.KEYID = 5
1,212,827 UART: [ldev] AUTHORITY.KEYID = 7
1,213,290 UART: [ldev] FE.KEYID = 1
1,218,480 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,306 UART: [ldev] --
1,283,709 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,057 >>> mbox cmd response: success
3,327,085 UART: [afmc] ++
3,327,253 UART: [afmc] CDI.KEYID = 6
3,327,615 UART: [afmc] SUBJECT.KEYID = 7
3,328,040 UART: [afmc] AUTHORITY.KEYID = 5
3,363,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,517 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,226 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,118 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,829 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,566 UART: [afmc] --
3,406,584 UART: [cold-reset] --
3,407,638 UART: [state] Locking Datavault
3,408,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,505 UART: [state] Locking ICCM
3,409,991 UART: [exit] Launching FMC @ 0x40000130
3,415,320 UART:
3,415,336 UART: Running Caliptra FMC ...
3,415,744 UART:
3,415,887 UART: [state] CFI Enabled
3,426,327 UART: [fht] FMC Alias Private Key: 7
3,533,537 UART: [art] Extend RT PCRs Done
3,533,965 UART: [art] Lock RT PCRs Done
3,535,279 UART: [art] Populate DV Done
3,543,305 UART: [fht] FMC Alias Private Key: 7
3,544,485 UART: [art] Derive CDI
3,544,765 UART: [art] Store in in slot 0x4
3,630,186 UART: [art] Derive Key Pair
3,630,546 UART: [art] Store priv key in slot 0x5
3,644,302 UART: [art] Derive Key Pair - Done
3,658,920 UART: [art] Signing Cert with AUTHO
3,659,400 UART: RITY.KEYID = 7
3,674,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,665 UART: [art] PUB.X = BAD25432B82A58861B112F5A49BD20FC23535CE9EE6EBC1C176E54DE82B8D41917BE20B1C5CC11D96E26FDC680DC1813
3,682,449 UART: [art] PUB.Y = 60FA490A195EB35501C6B084FFE0688B6AF870290D3E184AB26BD51E7491AD3EA0FF44DC06856BC302D3718D804B1C34
3,689,390 UART: [art] SIG.R = 80C5A048FE1D3467A5678AB71A3A769D7CF7F43E9B565EF9E70FE4F5F68B8596D0D4B370A95E63B32327D7CA4B39E205
3,696,162 UART: [art] SIG.S = 460D8814156559841797D2152BCA7898D89A475FF7228735B5E79852E3A1D8BD8E737E6A2FA25815B1646A24823CE7B2
3,720,160 UART: Caliptra RT
3,720,505 UART: [state] CFI Enabled
3,828,593 UART: [rt] RT listening for mailbox commands...
3,829,263 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,271 UART: [rt]cmd =0x41544d4e, len=14344
4,877,053 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,830 ready_for_fw is high
1,060,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,320 >>> mbox cmd response: success
3,226,501 UART:
3,226,517 UART: Running Caliptra FMC ...
3,226,925 UART:
3,227,068 UART: [state] CFI Enabled
3,237,826 UART: [fht] FMC Alias Private Key: 7
3,345,802 UART: [art] Extend RT PCRs Done
3,346,230 UART: [art] Lock RT PCRs Done
3,348,030 UART: [art] Populate DV Done
3,356,238 UART: [fht] FMC Alias Private Key: 7
3,357,304 UART: [art] Derive CDI
3,357,584 UART: [art] Store in in slot 0x4
3,443,097 UART: [art] Derive Key Pair
3,443,457 UART: [art] Store priv key in slot 0x5
3,456,217 UART: [art] Derive Key Pair - Done
3,471,122 UART: [art] Signing Cert with AUTHO
3,471,602 UART: RITY.KEYID = 7
3,486,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,317 UART: [art] PUB.X = 0DCEDA21E8D074B845A36521C973CD5256CBCC1BBD4DBC26894FBA9185E5E1409E721EB53D7D5996B7DEE0B0F0F9182A
3,494,102 UART: [art] PUB.Y = 860C4375946D9AD7012FB8EEF105549451CEEA416ACF720E139B8C0459D76E3FF7FF4CAEDB131E38A9AF25293BD4672D
3,501,049 UART: [art] SIG.R = 4A810C0DCABE1AC07C22EBDCF6D548EABDD8207AB482747D84CDB10E0DD12E05930C0CCADD5D804002649B6AAB8E63E4
3,507,821 UART: [art] SIG.S = 22FEF51023E99542C21614FEBBC107D1311574454204BE40D51C37E04E1D69BCA4F6BE6AC07B5E1F5172756B41924620
3,532,050 UART: Caliptra RT
3,532,395 UART: [state] CFI Enabled
3,640,194 UART: [rt] RT listening for mailbox commands...
3,640,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,028 UART: [rt]cmd =0x41544d4e, len=14344
4,676,447 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,173,893 ready_for_fw is high
1,173,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,418 >>> mbox cmd response: success
3,316,511 UART: [afmc] ++
3,316,679 UART: [afmc] CDI.KEYID = 6
3,317,042 UART: [afmc] SUBJECT.KEYID = 7
3,317,468 UART: [afmc] AUTHORITY.KEYID = 5
3,353,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,407 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,117 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,007 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,718 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,372 UART: [afmc] --
3,396,370 UART: [cold-reset] --
3,397,180 UART: [state] Locking Datavault
3,398,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,929 UART: [state] Locking ICCM
3,399,575 UART: [exit] Launching FMC @ 0x40000130
3,404,904 UART:
3,404,920 UART: Running Caliptra FMC ...
3,405,328 UART:
3,405,382 UART: [state] CFI Enabled
3,416,106 UART: [fht] FMC Alias Private Key: 7
3,523,928 UART: [art] Extend RT PCRs Done
3,524,356 UART: [art] Lock RT PCRs Done
3,525,926 UART: [art] Populate DV Done
3,534,032 UART: [fht] FMC Alias Private Key: 7
3,535,046 UART: [art] Derive CDI
3,535,326 UART: [art] Store in in slot 0x4
3,620,779 UART: [art] Derive Key Pair
3,621,139 UART: [art] Store priv key in slot 0x5
3,634,813 UART: [art] Derive Key Pair - Done
3,649,944 UART: [art] Signing Cert with AUTHO
3,650,424 UART: RITY.KEYID = 7
3,665,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,481 UART: [art] PUB.X = 6FEF36A37ECB992DF2695CBCFE892ADC7AF119D890593E1019148E42FCB1915C55FEFF5BDF0A83E552CB3374B5E406D3
3,673,263 UART: [art] PUB.Y = 3A14B698E693B1B1F1338F210D217469535FD872DD2EC116EF5690B9E67E26F12A99B14DEAD202AD775819B769243C22
3,680,205 UART: [art] SIG.R = 415D68258D7CE4530C51B8E317FF416944FEDC32B740A0D1F96C105FA528DE8BB440755DABD91E417971050F851D241C
3,686,968 UART: [art] SIG.S = 740FEC7FED807A2ABE978C4DCA79DA906A3DE8415E2805632F537C3569D45466F544860F2813ED9831A131831F205083
3,710,982 UART: Caliptra RT
3,711,235 UART: [state] CFI Enabled
3,818,838 UART: [rt] RT listening for mailbox commands...
3,819,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,734 UART: [rt]cmd =0x41544d4e, len=14344
4,865,585 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 ready_for_fw is high
1,056,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,848 >>> mbox cmd response: success
3,228,725 UART:
3,228,741 UART: Running Caliptra FMC ...
3,229,149 UART:
3,229,203 UART: [state] CFI Enabled
3,239,821 UART: [fht] FMC Alias Private Key: 7
3,348,335 UART: [art] Extend RT PCRs Done
3,348,763 UART: [art] Lock RT PCRs Done
3,349,849 UART: [art] Populate DV Done
3,358,187 UART: [fht] FMC Alias Private Key: 7
3,359,173 UART: [art] Derive CDI
3,359,453 UART: [art] Store in in slot 0x4
3,444,982 UART: [art] Derive Key Pair
3,445,342 UART: [art] Store priv key in slot 0x5
3,458,248 UART: [art] Derive Key Pair - Done
3,472,995 UART: [art] Signing Cert with AUTHO
3,473,475 UART: RITY.KEYID = 7
3,488,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,722 UART: [art] PUB.X = 125F540A68E4E537E6985C0F871708F0D68AA2854AE91EA81CA7E0341A93EE2C5911468B8D0362FB38E2A4CFCAB1BFC4
3,496,490 UART: [art] PUB.Y = 9A1CE4CCE3219EC241AA4570403CDBFB8872011E1E14613F47AC62246E00140B032D49E36F9DD000A26D86DBB85DC04D
3,503,395 UART: [art] SIG.R = D138A33208DA9870A6BDCABA4DB47B8BE2BED8C9FAD4A46D4B48168E84F567BD15C471E3347FAA571E7EB524BCA0E5BE
3,510,188 UART: [art] SIG.S = 67115EC8F76B69668D721DB8400DC26272B978B31EB46B921C3A1D760DFEA39AFD3959B07D624CF72B7232B9B13AD098
3,534,015 UART: Caliptra RT
3,534,268 UART: [state] CFI Enabled
3,641,582 UART: [rt] RT listening for mailbox commands...
3,642,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,474 UART: [rt]cmd =0x41544d4e, len=14344
4,695,840 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,174,432 ready_for_fw is high
1,174,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,690 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,666 UART: [idev] --
1,208,605 UART: [ldev] ++
1,208,773 UART: [ldev] CDI.KEYID = 6
1,209,137 UART: [ldev] SUBJECT.KEYID = 5
1,209,564 UART: [ldev] AUTHORITY.KEYID = 7
1,210,027 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,263 UART: [ldev] --
1,280,573 UART: [fwproc] Wait for Commands...
1,281,260 UART: [fwproc] Recv command 0x46574c44
1,281,993 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,402 >>> mbox cmd response: success
3,324,501 UART: [afmc] ++
3,324,669 UART: [afmc] CDI.KEYID = 6
3,325,032 UART: [afmc] SUBJECT.KEYID = 7
3,325,458 UART: [afmc] AUTHORITY.KEYID = 5
3,361,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,535 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,245 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,135 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,846 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,612 UART: [afmc] --
3,404,572 UART: [cold-reset] --
3,405,326 UART: [state] Locking Datavault
3,406,665 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,269 UART: [state] Locking ICCM
3,407,771 UART: [exit] Launching FMC @ 0x40000130
3,413,100 UART:
3,413,116 UART: Running Caliptra FMC ...
3,413,524 UART:
3,413,667 UART: [state] CFI Enabled
3,424,319 UART: [fht] FMC Alias Private Key: 7
3,531,523 UART: [art] Extend RT PCRs Done
3,531,951 UART: [art] Lock RT PCRs Done
3,533,507 UART: [art] Populate DV Done
3,541,619 UART: [fht] FMC Alias Private Key: 7
3,542,763 UART: [art] Derive CDI
3,543,043 UART: [art] Store in in slot 0x4
3,628,662 UART: [art] Derive Key Pair
3,629,022 UART: [art] Store priv key in slot 0x5
3,642,772 UART: [art] Derive Key Pair - Done
3,657,388 UART: [art] Signing Cert with AUTHO
3,657,868 UART: RITY.KEYID = 7
3,673,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,833 UART: [art] PUB.X = 61C7E217656DC6DC7FB0D865317B9946C0207F835B10F635CC4773C1B09EEED5AA8F73C7C2817736191104C94DDEA169
3,680,602 UART: [art] PUB.Y = 04380F485BB2BA8C0F221755CE71FBBBB9FD92D9DFFFE3B19165669473742D86D5BBE0BDF5D092F1E75E59960A7FE861
3,687,554 UART: [art] SIG.R = 1C364E996485740B5A7D25BEFBFB6E1631140A1F01ECC2CF45B5DF23840B0DBD9065819E97287830215D361088F90D56
3,694,304 UART: [art] SIG.S = 21C993C31B60F74786CAAFDEC1438A438764D106EAC81DDD48FC70CC84D3544DC6B1DC344E3600B37EBA20B91075CAD3
3,718,440 UART: Caliptra RT
3,718,785 UART: [state] CFI Enabled
3,826,210 UART: [rt] RT listening for mailbox commands...
3,826,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,906 UART: [rt]cmd =0x41544d4e, len=14344
4,875,032 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,775 ready_for_fw is high
1,055,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,641 >>> mbox cmd response: success
3,236,974 UART:
3,236,990 UART: Running Caliptra FMC ...
3,237,398 UART:
3,237,541 UART: [state] CFI Enabled
3,248,393 UART: [fht] FMC Alias Private Key: 7
3,356,531 UART: [art] Extend RT PCRs Done
3,356,959 UART: [art] Lock RT PCRs Done
3,358,699 UART: [art] Populate DV Done
3,366,979 UART: [fht] FMC Alias Private Key: 7
3,368,001 UART: [art] Derive CDI
3,368,281 UART: [art] Store in in slot 0x4
3,454,002 UART: [art] Derive Key Pair
3,454,362 UART: [art] Store priv key in slot 0x5
3,466,984 UART: [art] Derive Key Pair - Done
3,481,756 UART: [art] Signing Cert with AUTHO
3,482,236 UART: RITY.KEYID = 7
3,497,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,193 UART: [art] PUB.X = 4DC631761A507286E6A94D532BDCD4E59DB514D035D5AB8F5458D797DD351DE5DB39CA72609E5A06F5859C6CE1B81D65
3,504,968 UART: [art] PUB.Y = 65EEE583D55A92EC15E06D7F2F3CE1E1459DC6E2C581B5D9531019D88BE60939C4407DECF89BA3B946ACFFCFE83E3493
3,511,931 UART: [art] SIG.R = 4EE86D97317555115D57196740746DF89FEF7F3E3706688B1C24425B47297D95A1B18EB86043888D35CE72599D3A8E86
3,518,686 UART: [art] SIG.S = CC95DE8401A23CB043A8E4895E642FBF924606FCC278657258B1AF28E54E5CA7E57AC1AE93F359AF5934610483416553
3,542,388 UART: Caliptra RT
3,542,733 UART: [state] CFI Enabled
3,650,205 UART: [rt] RT listening for mailbox commands...
3,650,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,215 UART: [rt]cmd =0x41544d4e, len=14344
4,701,722 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,271 UART:
192,624 UART: Running Caliptra ROM ...
193,820 UART:
193,979 UART: [state] CFI Enabled
265,299 UART: [state] LifecycleState = Unprovisioned
267,275 UART: [state] DebugLocked = No
269,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,443 UART: [kat] SHA2-256
444,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,620 UART: [kat] ++
455,070 UART: [kat] sha1
466,182 UART: [kat] SHA2-256
468,836 UART: [kat] SHA2-384
474,621 UART: [kat] SHA2-512-ACC
476,988 UART: [kat] ECC-384
2,767,847 UART: [kat] HMAC-384Kdf
2,779,309 UART: [kat] LMS
3,969,625 UART: [kat] --
3,974,932 UART: [cold-reset] ++
3,976,337 UART: [fht] Storing FHT @ 0x50003400
3,988,253 UART: [idev] ++
3,988,824 UART: [idev] CDI.KEYID = 6
3,989,740 UART: [idev] SUBJECT.KEYID = 7
3,990,981 UART: [idev] UDS.KEYID = 0
3,992,053 ready_for_fw is high
3,992,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,794 UART: [idev] Erasing UDS.KEYID = 0
7,328,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,183 UART: [idev] --
7,355,204 UART: [ldev] ++
7,355,782 UART: [ldev] CDI.KEYID = 6
7,356,695 UART: [ldev] SUBJECT.KEYID = 5
7,357,910 UART: [ldev] AUTHORITY.KEYID = 7
7,359,195 UART: [ldev] FE.KEYID = 1
7,400,842 UART: [ldev] Erasing FE.KEYID = 1
10,730,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,410 UART: [ldev] --
13,097,195 UART: [fwproc] Waiting for Commands...
13,099,285 UART: [fwproc] Received command 0x46574c44
13,101,498 UART: [fwproc] Received Image of size 114124 bytes
17,145,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,610,238 >>> mbox cmd response: success
17,614,096 UART: [afmc] ++
17,614,690 UART: [afmc] CDI.KEYID = 6
17,615,578 UART: [afmc] SUBJECT.KEYID = 7
17,616,853 UART: [afmc] AUTHORITY.KEYID = 5
20,988,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,222 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,613 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,472 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,905 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,741 UART: [afmc] --
23,356,965 UART: [cold-reset] --
23,361,368 UART: [state] Locking Datavault
23,368,730 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,490 UART: [state] Locking ICCM
23,372,780 UART: [exit] Launching FMC @ 0x40000130
23,381,172 UART:
23,381,405 UART: Running Caliptra FMC ...
23,382,431 UART:
23,382,581 UART: [state] CFI Enabled
23,447,703 UART: [fht] FMC Alias Private Key: 7
25,785,507 UART: [art] Extend RT PCRs Done
25,786,729 UART: [art] Lock RT PCRs Done
25,788,440 UART: [art] Populate DV Done
25,793,795 UART: [fht] FMC Alias Private Key: 7
25,795,329 UART: [art] Derive CDI
25,796,136 UART: [art] Store in in slot 0x4
25,855,040 UART: [art] Derive Key Pair
25,856,085 UART: [art] Store priv key in slot 0x5
29,148,263 UART: [art] Derive Key Pair - Done
29,161,249 UART: [art] Signing Cert with AUTHO
29,162,562 UART: RITY.KEYID = 7
31,449,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,147 UART: [art] PUB.X = D18D6C27126A0CD7753B09B9803872A57E233B4F5E54D02AC0CDF7F77EC5C33A2830DC401C2822989EF7CF243895870F
31,458,418 UART: [art] PUB.Y = A3172B14ECC7C763E2A697F5591E4F9E5E027184B9F9DCC2EF245496716ED0A13218B3B3396381AFCCBAD87D7C945D83
31,465,665 UART: [art] SIG.R = 6CF0CBEC210B7E3038633DDA1EC3D12E8D8F7236D4506833B968085CC3AFAE62D144F960BD61EB8D6D63C8F941DDF4F6
31,473,061 UART: [art] SIG.S = E32AC42EFCB695B32DD2598945CCB6CD04869CC0082ED8C1A78747CB48642DB3792AFC441B4677FEE80EEF46B99146D2
32,777,976 UART: Caliptra RT
32,778,680 UART: [state] CFI Enabled
32,938,286 UART: [rt] RT listening for mailbox commands...
32,940,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,095,776 UART: [rt]cmd =0x41544d4e, len=14344
38,331,631 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,806,554 ready_for_fw is high
3,806,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,896,757 >>> mbox cmd response: success
23,592,584 UART:
23,592,983 UART: Running Caliptra FMC ...
23,594,081 UART:
23,594,237 UART: [state] CFI Enabled
23,663,639 UART: [fht] FMC Alias Private Key: 7
26,001,924 UART: [art] Extend RT PCRs Done
26,003,163 UART: [art] Lock RT PCRs Done
26,005,309 UART: [art] Populate DV Done
26,010,725 UART: [fht] FMC Alias Private Key: 7
26,012,276 UART: [art] Derive CDI
26,013,092 UART: [art] Store in in slot 0x4
26,073,011 UART: [art] Derive Key Pair
26,074,057 UART: [art] Store priv key in slot 0x5
29,367,273 UART: [art] Derive Key Pair - Done
29,380,002 UART: [art] Signing Cert with AUTHO
29,381,318 UART: RITY.KEYID = 7
31,668,885 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,391 UART: [art] PUB.X = E4DE438265A09561812A98D779B8336B337B304D31A4CADB5B4CB87988DD3EB103807F77FDFA9C1D222B9D20598B6177
31,677,643 UART: [art] PUB.Y = B0AF75C0A45F200F6E9D24A004C1D5DDBA240C8DE50F3DB2816E3C6F8B45FFD2AAC48E6F2C3D937F686035AFF80BB46F
31,684,894 UART: [art] SIG.R = BA160348DE5AB09E3138E447E8B638E35EF1A05308123B53125DEEE7C250CC869A7D7BED04109B5A8844B261D8F00BB2
31,692,295 UART: [art] SIG.S = 580320C8D101A20EC5EBEA3D2BD42E7E4336E764989852A7DB89A47299F7A5A5E51986590608688B8A00CB2B60C5C927
32,997,840 UART: Caliptra RT
32,998,558 UART: [state] CFI Enabled
33,158,200 UART: [rt] RT listening for mailbox commands...
33,160,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,315,938 UART: [rt]cmd =0x41544d4e, len=14344
38,551,569 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,443 UART:
192,805 UART: Running Caliptra ROM ...
193,937 UART:
603,660 UART: [state] CFI Enabled
621,299 UART: [state] LifecycleState = Unprovisioned
623,249 UART: [state] DebugLocked = No
625,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,259 UART: [kat] SHA2-256
800,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,538 UART: [kat] ++
811,019 UART: [kat] sha1
821,536 UART: [kat] SHA2-256
824,257 UART: [kat] SHA2-384
829,324 UART: [kat] SHA2-512-ACC
831,685 UART: [kat] ECC-384
3,115,925 UART: [kat] HMAC-384Kdf
3,127,679 UART: [kat] LMS
4,317,815 UART: [kat] --
4,321,268 UART: [cold-reset] ++
4,323,209 UART: [fht] Storing FHT @ 0x50003400
4,335,134 UART: [idev] ++
4,335,741 UART: [idev] CDI.KEYID = 6
4,336,649 UART: [idev] SUBJECT.KEYID = 7
4,337,892 UART: [idev] UDS.KEYID = 0
4,338,973 ready_for_fw is high
4,339,182 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,351 UART: [idev] Erasing UDS.KEYID = 0
7,627,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,740 UART: [idev] --
7,653,352 UART: [ldev] ++
7,653,913 UART: [ldev] CDI.KEYID = 6
7,654,850 UART: [ldev] SUBJECT.KEYID = 5
7,656,108 UART: [ldev] AUTHORITY.KEYID = 7
7,657,385 UART: [ldev] FE.KEYID = 1
7,668,510 UART: [ldev] Erasing FE.KEYID = 1
10,960,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,716 UART: [ldev] --
13,320,439 UART: [fwproc] Waiting for Commands...
13,322,207 UART: [fwproc] Received command 0x46574c44
13,324,391 UART: [fwproc] Received Image of size 114124 bytes
17,393,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,466,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,535,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,852,530 >>> mbox cmd response: success
17,857,236 UART: [afmc] ++
17,857,827 UART: [afmc] CDI.KEYID = 6
17,858,732 UART: [afmc] SUBJECT.KEYID = 7
17,859,999 UART: [afmc] AUTHORITY.KEYID = 5
21,173,220 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,468,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,470,301 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,484,684 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,499,480 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,513,928 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,671 UART: [afmc] --
23,538,716 UART: [cold-reset] --
23,542,844 UART: [state] Locking Datavault
23,548,362 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,112 UART: [state] Locking ICCM
23,551,932 UART: [exit] Launching FMC @ 0x40000130
23,560,283 UART:
23,560,513 UART: Running Caliptra FMC ...
23,561,611 UART:
23,561,766 UART: [state] CFI Enabled
23,569,977 UART: [fht] FMC Alias Private Key: 7
25,900,909 UART: [art] Extend RT PCRs Done
25,902,123 UART: [art] Lock RT PCRs Done
25,903,665 UART: [art] Populate DV Done
25,909,038 UART: [fht] FMC Alias Private Key: 7
25,910,632 UART: [art] Derive CDI
25,911,360 UART: [art] Store in in slot 0x4
25,954,098 UART: [art] Derive Key Pair
25,955,158 UART: [art] Store priv key in slot 0x5
29,196,552 UART: [art] Derive Key Pair - Done
29,209,497 UART: [art] Signing Cert with AUTHO
29,210,832 UART: RITY.KEYID = 7
31,490,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,903 UART: [art] PUB.X = A9C9848F445AC2BDA933A576F95537F18D3079C4016452FB8B2F3B9DAFF4923238C9ABF95F37A2B3C42A8862223F4484
31,499,121 UART: [art] PUB.Y = 498DE9B3869CF22B589B93F848CADC035C94938C408CDB83B8975546A41585E6E05DE0E5F7CDB481C4ABC2225E197E3C
31,506,399 UART: [art] SIG.R = E04026E11CF93C1BDE73B492C023F471310769A01BDFB0BF65F60470909FCFE8EEFCBD4DADCEB910AFC3486F12079400
31,513,722 UART: [art] SIG.S = EE489B11208E134434A0A75D1C19112A0371FFCB3F26C0A1D284DCD52F362A70B7CD74ABD8AAECC50DC17708C737B384
32,818,641 UART: Caliptra RT
32,819,328 UART: [state] CFI Enabled
32,936,661 UART: [rt] RT listening for mailbox commands...
32,939,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,094,406 UART: [rt]cmd =0x41544d4e, len=14344
38,330,343 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
4,131,098 ready_for_fw is high
4,131,495 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,908 >>> mbox cmd response: success
23,714,827 UART:
23,715,196 UART: Running Caliptra FMC ...
23,716,392 UART:
23,716,556 UART: [state] CFI Enabled
23,724,817 UART: [fht] FMC Alias Private Key: 7
26,055,633 UART: [art] Extend RT PCRs Done
26,056,856 UART: [art] Lock RT PCRs Done
26,058,975 UART: [art] Populate DV Done
26,064,277 UART: [fht] FMC Alias Private Key: 7
26,065,877 UART: [art] Derive CDI
26,066,688 UART: [art] Store in in slot 0x4
26,109,237 UART: [art] Derive Key Pair
26,110,272 UART: [art] Store priv key in slot 0x5
29,353,420 UART: [art] Derive Key Pair - Done
29,366,526 UART: [art] Signing Cert with AUTHO
29,367,830 UART: RITY.KEYID = 7
31,647,224 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,727 UART: [art] PUB.X = 8948F03F9DA3357E43FBD2EC535F70062BAA9A3BE59498916481B0436A41913068E9E3E9B08D9FC68C90B62333717255
31,655,959 UART: [art] PUB.Y = 67C89498E02085BA5C3314F48236F07130A131141A90A6FB69DB2B3AA1121EFA6D091A80A32F3A31AA57F1F236F6D04E
31,663,240 UART: [art] SIG.R = 8AF556DE5F41F97A2A36F79225977E5FE9B6746C58A5A1BB5EF2515A2D146539093580A169287EAB804F978E6E6F9981
31,670,597 UART: [art] SIG.S = 2EEE309EA86D7B31398D282C3589CD1752049A3E48AE6803F29622E2B5E7B54DBCD5492C96DDE767B5330B3B36F45021
32,975,943 UART: Caliptra RT
32,976,648 UART: [state] CFI Enabled
33,093,453 UART: [rt] RT listening for mailbox commands...
33,095,812 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,250,935 UART: [rt]cmd =0x41544d4e, len=14344
38,486,701 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,134 UART:
192,509 UART: Running Caliptra ROM ...
193,664 UART:
193,814 UART: [state] CFI Enabled
263,881 UART: [state] LifecycleState = Unprovisioned
265,756 UART: [state] DebugLocked = No
267,718 UART: [state] WD Timer not started. Device not locked for debugging
270,817 UART: [kat] SHA2-256
449,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,496 UART: [kat] ++
461,943 UART: [kat] sha1
474,377 UART: [kat] SHA2-256
477,450 UART: [kat] SHA2-384
483,654 UART: [kat] SHA2-512-ACC
486,586 UART: [kat] ECC-384
2,945,870 UART: [kat] HMAC-384Kdf
2,971,456 UART: [kat] LMS
3,500,890 UART: [kat] --
3,505,027 UART: [cold-reset] ++
3,506,818 UART: [fht] FHT @ 0x50003400
3,516,658 UART: [idev] ++
3,517,224 UART: [idev] CDI.KEYID = 6
3,518,177 UART: [idev] SUBJECT.KEYID = 7
3,519,347 UART: [idev] UDS.KEYID = 0
3,520,269 ready_for_fw is high
3,520,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,515 UART: [idev] Erasing UDS.KEYID = 0
6,021,581 UART: [idev] Sha1 KeyId Algorithm
6,045,300 UART: [idev] --
6,050,419 UART: [ldev] ++
6,050,998 UART: [ldev] CDI.KEYID = 6
6,051,911 UART: [ldev] SUBJECT.KEYID = 5
6,053,072 UART: [ldev] AUTHORITY.KEYID = 7
6,054,310 UART: [ldev] FE.KEYID = 1
6,099,304 UART: [ldev] Erasing FE.KEYID = 1
8,602,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,968 UART: [ldev] --
10,411,476 UART: [fwproc] Wait for Commands...
10,412,971 UART: [fwproc] Recv command 0x46574c44
10,415,058 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,141 >>> mbox cmd response: success
14,280,352 UART: [afmc] ++
14,280,949 UART: [afmc] CDI.KEYID = 6
14,281,861 UART: [afmc] SUBJECT.KEYID = 7
14,283,025 UART: [afmc] AUTHORITY.KEYID = 5
16,827,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,460 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,839 UART: [afmc] --
18,625,600 UART: [cold-reset] --
18,630,804 UART: [state] Locking Datavault
18,635,512 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,219 UART: [state] Locking ICCM
18,638,344 UART: [exit] Launching FMC @ 0x40000130
18,646,740 UART:
18,646,972 UART: Running Caliptra FMC ...
18,648,071 UART:
18,648,237 UART: [state] CFI Enabled
18,709,037 UART: [fht] FMC Alias Private Key: 7
20,473,100 UART: [art] Extend RT PCRs Done
20,474,316 UART: [art] Lock RT PCRs Done
20,476,018 UART: [art] Populate DV Done
20,481,450 UART: [fht] FMC Alias Private Key: 7
20,483,048 UART: [art] Derive CDI
20,483,868 UART: [art] Store in in slot 0x4
20,541,513 UART: [art] Derive Key Pair
20,542,547 UART: [art] Store priv key in slot 0x5
23,005,316 UART: [art] Derive Key Pair - Done
23,018,321 UART: [art] Signing Cert with AUTHO
23,019,624 UART: RITY.KEYID = 7
24,731,149 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,643 UART: [art] PUB.X = B339D3E7592B8F057A083BBB99E169D5D7EB989A6776E2389A0785FEA3676ED1CCC864003A476E2C766FD128632DCD1D
24,739,898 UART: [art] PUB.Y = 20B7340190344CD6475531DD8132813C911F7F2AF186D0C27E59B6640E813C0A3F12A70BD97CB1DD604A7719A145484D
24,747,157 UART: [art] SIG.R = D94EC9C460E26534045DE3D66521D024DB4B04C4451F77F9649834FD74ED4328F8979BA19890778FBF0D23BBB154D5EB
24,754,501 UART: [art] SIG.S = F3C47BE7FD878E2098AEB6F36591B10C8B11335DB1F0C32B10DCCA755C7A796F6A85787822CF4BA7A15E4554FDCE469C
25,733,683 UART: Caliptra RT
25,734,390 UART: [state] CFI Enabled
25,897,831 UART: [rt] RT listening for mailbox commands...
25,900,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,056,302 UART: [rt]cmd =0x41544d4e, len=14344
29,986,197 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,362,320 ready_for_fw is high
3,362,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,724 >>> mbox cmd response: success
18,339,862 UART:
18,340,251 UART: Running Caliptra FMC ...
18,341,444 UART:
18,341,609 UART: [state] CFI Enabled
18,411,248 UART: [fht] FMC Alias Private Key: 7
20,175,637 UART: [art] Extend RT PCRs Done
20,176,853 UART: [art] Lock RT PCRs Done
20,178,263 UART: [art] Populate DV Done
20,183,751 UART: [fht] FMC Alias Private Key: 7
20,185,350 UART: [art] Derive CDI
20,186,163 UART: [art] Store in in slot 0x4
20,244,172 UART: [art] Derive Key Pair
20,245,237 UART: [art] Store priv key in slot 0x5
22,707,708 UART: [art] Derive Key Pair - Done
22,720,496 UART: [art] Signing Cert with AUTHO
22,721,805 UART: RITY.KEYID = 7
24,434,365 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,021 UART: [art] PUB.X = B48ADC6EF9E0BF5F10C0A927BFF6B8A0CA8C9C00F3FC9B4DF52DBCF07FF731507FE42D438D4D94E1A08A6505D8649417
24,443,188 UART: [art] PUB.Y = BAB6D96741B79251FFE1116E5962104563ECCB782DBE9BA777EFC58BB9FC4EB87E6370D4A41BD8ABAAA4CFFBEC7AB1F3
24,450,461 UART: [art] SIG.R = 79921252391A71B5840E10B139D71F3EC77EBE64B9770BF32A52AA150ADAFF1B7E2E12B74F43FB59FE9A3989C29BA2EE
24,457,857 UART: [art] SIG.S = A481BDEE973D46F2055217A656E709ACAF8339B247059E642C56820F0A65756498057B20DD9FE839271DD70F08839D2F
25,437,555 UART: Caliptra RT
25,438,243 UART: [state] CFI Enabled
25,601,627 UART: [rt] RT listening for mailbox commands...
25,603,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,759,842 UART: [rt]cmd =0x41544d4e, len=14344
29,690,106 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,458 UART:
192,825 UART: Running Caliptra ROM ...
194,026 UART:
603,421 UART: [state] CFI Enabled
618,069 UART: [state] LifecycleState = Unprovisioned
619,942 UART: [state] DebugLocked = No
622,172 UART: [state] WD Timer not started. Device not locked for debugging
626,328 UART: [kat] SHA2-256
805,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,078 UART: [kat] ++
817,525 UART: [kat] sha1
829,451 UART: [kat] SHA2-256
832,514 UART: [kat] SHA2-384
840,053 UART: [kat] SHA2-512-ACC
843,054 UART: [kat] ECC-384
3,284,248 UART: [kat] HMAC-384Kdf
3,297,042 UART: [kat] LMS
3,826,562 UART: [kat] --
3,832,158 UART: [cold-reset] ++
3,833,349 UART: [fht] FHT @ 0x50003400
3,843,190 UART: [idev] ++
3,843,748 UART: [idev] CDI.KEYID = 6
3,844,652 UART: [idev] SUBJECT.KEYID = 7
3,845,813 UART: [idev] UDS.KEYID = 0
3,846,872 ready_for_fw is high
3,847,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,755 UART: [idev] Erasing UDS.KEYID = 0
6,318,569 UART: [idev] Sha1 KeyId Algorithm
6,342,601 UART: [idev] --
6,344,857 UART: [ldev] ++
6,345,417 UART: [ldev] CDI.KEYID = 6
6,346,319 UART: [ldev] SUBJECT.KEYID = 5
6,347,518 UART: [ldev] AUTHORITY.KEYID = 7
6,348,743 UART: [ldev] FE.KEYID = 1
6,359,954 UART: [ldev] Erasing FE.KEYID = 1
8,834,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,741 UART: [ldev] --
10,624,915 UART: [fwproc] Wait for Commands...
10,627,761 UART: [fwproc] Recv command 0x46574c44
10,629,834 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,339 >>> mbox cmd response: success
14,498,011 UART: [afmc] ++
14,498,604 UART: [afmc] CDI.KEYID = 6
14,499,477 UART: [afmc] SUBJECT.KEYID = 7
14,500,681 UART: [afmc] AUTHORITY.KEYID = 5
17,002,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,732 UART: [afmc] --
18,794,820 UART: [cold-reset] --
18,798,087 UART: [state] Locking Datavault
18,802,575 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,220 UART: [state] Locking ICCM
18,805,796 UART: [exit] Launching FMC @ 0x40000130
18,814,244 UART:
18,814,470 UART: Running Caliptra FMC ...
18,815,559 UART:
18,815,708 UART: [state] CFI Enabled
18,823,637 UART: [fht] FMC Alias Private Key: 7
20,580,526 UART: [art] Extend RT PCRs Done
20,581,743 UART: [art] Lock RT PCRs Done
20,583,173 UART: [art] Populate DV Done
20,588,597 UART: [fht] FMC Alias Private Key: 7
20,590,303 UART: [art] Derive CDI
20,591,109 UART: [art] Store in in slot 0x4
20,633,752 UART: [art] Derive Key Pair
20,634,777 UART: [art] Store priv key in slot 0x5
23,061,824 UART: [art] Derive Key Pair - Done
23,074,926 UART: [art] Signing Cert with AUTHO
23,076,223 UART: RITY.KEYID = 7
24,781,649 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,152 UART: [art] PUB.X = FAFB119C55A0BD237A7BB8C291A64106B630057BCE51BE476AD879CB6C5DFE511DE98386E72840170D0F35E5D93A0401
24,790,460 UART: [art] PUB.Y = 86A0EF06394C902C068FB7516BF8523B75706BEFF2676BB4129E3DE06D50E620BEC735F8ED90C9506BFF8D7FF9C934A4
24,797,713 UART: [art] SIG.R = 7DEA4CE4BF02E15A767C5372DABD4657B3AC14175929CA9B38BEDB37E0317A6E38C19822103E67D965CAD581BDB63E5F
24,805,131 UART: [art] SIG.S = B1CBC4521DD9B2D4F484739A3300E0DCC071DDDF4FEA937B61F6AC2140AAEE7DFBC2F9550647B306794EAC6D0AF3D92C
25,784,186 UART: Caliptra RT
25,784,869 UART: [state] CFI Enabled
25,902,248 UART: [rt] RT listening for mailbox commands...
25,904,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,248 UART: [rt]cmd =0x41544d4e, len=14344
29,990,995 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,695,058 ready_for_fw is high
3,695,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,284,401 >>> mbox cmd response: success
18,535,434 UART:
18,535,816 UART: Running Caliptra FMC ...
18,537,001 UART:
18,537,183 UART: [state] CFI Enabled
18,545,024 UART: [fht] FMC Alias Private Key: 7
20,301,627 UART: [art] Extend RT PCRs Done
20,302,849 UART: [art] Lock RT PCRs Done
20,304,233 UART: [art] Populate DV Done
20,309,406 UART: [fht] FMC Alias Private Key: 7
20,311,108 UART: [art] Derive CDI
20,311,845 UART: [art] Store in in slot 0x4
20,354,446 UART: [art] Derive Key Pair
20,355,489 UART: [art] Store priv key in slot 0x5
22,782,752 UART: [art] Derive Key Pair - Done
22,795,585 UART: [art] Signing Cert with AUTHO
22,796,884 UART: RITY.KEYID = 7
24,502,288 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,797 UART: [art] PUB.X = 09D97E7A329429F76E8054F454D14EE338989C89840D498B8448D8F5417AECD39776ED23E8800F329D8644FBDD5D7E45
24,511,077 UART: [art] PUB.Y = F1EF72A61A647B3914979E51A9CCDD6ABDBD32AC7859125B0381DD2DC13A767EE74D4279384677A5A432E2C64556AB63
24,518,330 UART: [art] SIG.R = 8F753C34DE46A412104FA3BB90671F1E73495E0DA7FACFA74A58B705EC3E10D28E3C305861F6E4DB145D4D5F621BDA02
24,525,739 UART: [art] SIG.S = 6E401F144B2794C0D9BEDCF6CE198D85F417C7B03CE650625AA1515CA8CC3EE6A95C92F73448D3A69217F822585F9A63
25,505,354 UART: Caliptra RT
25,506,045 UART: [state] CFI Enabled
25,622,273 UART: [rt] RT listening for mailbox commands...
25,624,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,779,647 UART: [rt]cmd =0x41544d4e, len=14344
29,710,077 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,027 UART:
192,392 UART: Running Caliptra ROM ...
193,536 UART:
193,684 UART: [state] CFI Enabled
264,309 UART: [state] LifecycleState = Unprovisioned
266,725 UART: [state] DebugLocked = No
268,472 UART: [state] WD Timer not started. Device not locked for debugging
273,587 UART: [kat] SHA2-256
463,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,233 UART: [kat] ++
474,708 UART: [kat] sha1
486,082 UART: [kat] SHA2-256
489,103 UART: [kat] SHA2-384
494,296 UART: [kat] SHA2-512-ACC
496,885 UART: [kat] ECC-384
2,949,163 UART: [kat] HMAC-384Kdf
2,971,440 UART: [kat] LMS
3,503,203 UART: [kat] --
3,506,860 UART: [cold-reset] ++
3,508,225 UART: [fht] FHT @ 0x50003400
3,520,412 UART: [idev] ++
3,521,045 UART: [idev] CDI.KEYID = 6
3,522,080 UART: [idev] SUBJECT.KEYID = 7
3,523,279 UART: [idev] UDS.KEYID = 0
3,524,206 ready_for_fw is high
3,524,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,466 UART: [idev] Erasing UDS.KEYID = 0
6,028,101 UART: [idev] Sha1 KeyId Algorithm
6,050,638 UART: [idev] --
6,056,476 UART: [ldev] ++
6,057,155 UART: [ldev] CDI.KEYID = 6
6,058,093 UART: [ldev] SUBJECT.KEYID = 5
6,059,255 UART: [ldev] AUTHORITY.KEYID = 7
6,060,492 UART: [ldev] FE.KEYID = 1
6,097,975 UART: [ldev] Erasing FE.KEYID = 1
8,604,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,936 UART: [ldev] --
10,413,518 UART: [fwproc] Wait for Commands...
10,416,497 UART: [fwproc] Recv command 0x46574c44
10,418,810 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,609,216 >>> mbox cmd response: success
14,613,857 UART: [afmc] ++
14,614,559 UART: [afmc] CDI.KEYID = 6
14,615,665 UART: [afmc] SUBJECT.KEYID = 7
14,617,207 UART: [afmc] AUTHORITY.KEYID = 5
17,153,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,161 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,559 UART: [afmc] --
18,967,397 UART: [cold-reset] --
18,972,133 UART: [state] Locking Datavault
18,978,340 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,543 UART: [state] Locking ICCM
18,982,210 UART: [exit] Launching FMC @ 0x40000130
18,990,881 UART:
18,991,111 UART: Running Caliptra FMC ...
18,992,209 UART:
18,992,366 UART: [state] CFI Enabled
19,051,650 UART: [fht] FMC Alias Private Key: 7
20,815,111 UART: [art] Extend RT PCRs Done
20,816,322 UART: [art] Lock RT PCRs Done
20,818,123 UART: [art] Populate DV Done
20,823,426 UART: [fht] FMC Alias Private Key: 7
20,825,026 UART: [art] Derive CDI
20,825,846 UART: [art] Store in in slot 0x4
20,883,583 UART: [art] Derive Key Pair
20,884,582 UART: [art] Store priv key in slot 0x5
23,347,124 UART: [art] Derive Key Pair - Done
23,360,118 UART: [art] Signing Cert with AUTHO
23,361,413 UART: RITY.KEYID = 7
25,073,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,706 UART: [art] PUB.X = 15EAE699829D1746FFDAD16186D07B2CB74CC401B8582E3235F9630B76ECED1CAF4218966996379A771F50F1BA6B49EA
25,081,951 UART: [art] PUB.Y = 9DA47269BE906C55571A1ABB5DFB382DDECBEA31ED84BF478FCFC63B358AB438DA62A50CD9389E5F71875E5091B4AF78
25,089,235 UART: [art] SIG.R = 75967CB73FA7E095F0B57A06B8AE150E375626C04A6A481BF196DBF02DB116D0932917756FE8A9C1A7D5D75C7AC7B664
25,096,622 UART: [art] SIG.S = F45D8C03EFA5F202DC7AB69EBB41C2AC2468DDD0334D15C35DB2C716D7F06F831BCCE730FBBCAFB3E4959E6A43569BB4
26,075,246 UART: Caliptra RT
26,075,956 UART: [state] CFI Enabled
26,240,664 UART: [rt] RT listening for mailbox commands...
26,242,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,398,910 UART: [rt]cmd =0x41544d4e, len=14344
30,329,369 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,436,901 ready_for_fw is high
3,437,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,227 >>> mbox cmd response: success
19,031,055 UART:
19,031,464 UART: Running Caliptra FMC ...
19,032,567 UART:
19,032,722 UART: [state] CFI Enabled
19,095,354 UART: [fht] FMC Alias Private Key: 7
20,859,431 UART: [art] Extend RT PCRs Done
20,860,643 UART: [art] Lock RT PCRs Done
20,862,134 UART: [art] Populate DV Done
20,867,371 UART: [fht] FMC Alias Private Key: 7
20,868,907 UART: [art] Derive CDI
20,869,644 UART: [art] Store in in slot 0x4
20,928,131 UART: [art] Derive Key Pair
20,929,187 UART: [art] Store priv key in slot 0x5
23,392,631 UART: [art] Derive Key Pair - Done
23,405,761 UART: [art] Signing Cert with AUTHO
23,407,061 UART: RITY.KEYID = 7
25,118,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,658 UART: [art] PUB.X = 01D71F45DA5F3657E3A439D6D3ACF29AB7790D21228DC5DE2C3478AE3BED2BFC4784BCFCE81B63A0124EE9DF9F2A4925
25,126,960 UART: [art] PUB.Y = 7759FBB3571005E2D128BAA0E8A77F45D90BD34859364D662E269F0702512B0EDE1032F6BC90B26E07974B71B27563F9
25,134,171 UART: [art] SIG.R = 8AD7700968E0A43D24ED276DFB38C4CE34C9E907F11631C9E567B360F9CAD8D679EABB3D0737117C6AEE65EE58F9BD2C
25,141,721 UART: [art] SIG.S = C426C4CC7AA4E10906897D4F95839D9E590BDF11267DCE8D13156DFE62BBB6FEB57E94863EFF6E875928D9D01147809E
26,120,601 UART: Caliptra RT
26,121,317 UART: [state] CFI Enabled
26,286,719 UART: [rt] RT listening for mailbox commands...
26,289,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,445,023 UART: [rt]cmd =0x41544d4e, len=14344
30,375,494 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,430 UART:
192,791 UART: Running Caliptra ROM ...
193,982 UART:
603,456 UART: [state] CFI Enabled
619,042 UART: [state] LifecycleState = Unprovisioned
621,424 UART: [state] DebugLocked = No
623,929 UART: [state] WD Timer not started. Device not locked for debugging
629,000 UART: [kat] SHA2-256
818,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,691 UART: [kat] ++
830,133 UART: [kat] sha1
842,346 UART: [kat] SHA2-256
845,348 UART: [kat] SHA2-384
851,208 UART: [kat] SHA2-512-ACC
853,791 UART: [kat] ECC-384
3,296,413 UART: [kat] HMAC-384Kdf
3,309,073 UART: [kat] LMS
3,840,863 UART: [kat] --
3,845,452 UART: [cold-reset] ++
3,846,666 UART: [fht] FHT @ 0x50003400
3,858,779 UART: [idev] ++
3,859,484 UART: [idev] CDI.KEYID = 6
3,860,360 UART: [idev] SUBJECT.KEYID = 7
3,861,596 UART: [idev] UDS.KEYID = 0
3,862,515 ready_for_fw is high
3,862,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,428 UART: [idev] Erasing UDS.KEYID = 0
6,341,165 UART: [idev] Sha1 KeyId Algorithm
6,363,262 UART: [idev] --
6,368,245 UART: [ldev] ++
6,368,977 UART: [ldev] CDI.KEYID = 6
6,369,883 UART: [ldev] SUBJECT.KEYID = 5
6,371,035 UART: [ldev] AUTHORITY.KEYID = 7
6,372,262 UART: [ldev] FE.KEYID = 1
6,382,682 UART: [ldev] Erasing FE.KEYID = 1
8,862,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,581 UART: [ldev] --
10,652,555 UART: [fwproc] Wait for Commands...
10,654,975 UART: [fwproc] Recv command 0x46574c44
10,657,280 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,847,060 >>> mbox cmd response: success
14,850,682 UART: [afmc] ++
14,851,386 UART: [afmc] CDI.KEYID = 6
14,852,628 UART: [afmc] SUBJECT.KEYID = 7
14,854,064 UART: [afmc] AUTHORITY.KEYID = 5
17,355,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,460 UART: [afmc] --
19,150,101 UART: [cold-reset] --
19,154,284 UART: [state] Locking Datavault
19,157,721 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,865 UART: [state] Locking ICCM
19,162,449 UART: [exit] Launching FMC @ 0x40000130
19,171,128 UART:
19,171,365 UART: Running Caliptra FMC ...
19,172,456 UART:
19,172,609 UART: [state] CFI Enabled
19,180,809 UART: [fht] FMC Alias Private Key: 7
20,937,485 UART: [art] Extend RT PCRs Done
20,938,696 UART: [art] Lock RT PCRs Done
20,940,425 UART: [art] Populate DV Done
20,945,937 UART: [fht] FMC Alias Private Key: 7
20,947,521 UART: [art] Derive CDI
20,948,327 UART: [art] Store in in slot 0x4
20,991,177 UART: [art] Derive Key Pair
20,992,222 UART: [art] Store priv key in slot 0x5
23,418,657 UART: [art] Derive Key Pair - Done
23,431,590 UART: [art] Signing Cert with AUTHO
23,433,190 UART: RITY.KEYID = 7
25,138,178 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,686 UART: [art] PUB.X = 52A9EB41F6379EEEFEE0C9A1F01CE1571EE1B623B3014CCC6F623F4F9AD0A6C52FC928EC7620B83AE311A36A4D385D71
25,146,977 UART: [art] PUB.Y = AC49F69A45BA0C75406C77AEF7763485E5254B7E07D713AD3A745EB93CF37CA2703F043874A7A5C82C9B6FCAE9F5FBB6
25,154,242 UART: [art] SIG.R = 99806C8A5D26415AD6C3BB168A9FCF30FF03F7BB8DBB850D3D4E5851DC58A2F338442240CDC47E1C37904E96F047106A
25,161,668 UART: [art] SIG.S = 75D6B979373158E4FBC9DD1F2043187C46787255F5DC918C94111981CF6C7D3468680DD4297437A08EA5897466133910
26,140,102 UART: Caliptra RT
26,140,796 UART: [state] CFI Enabled
26,258,145 UART: [rt] RT listening for mailbox commands...
26,260,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,415,575 UART: [rt]cmd =0x41544d4e, len=14344
30,345,824 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,762,086 ready_for_fw is high
3,762,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,717 >>> mbox cmd response: success
19,222,881 UART:
19,223,267 UART: Running Caliptra FMC ...
19,224,396 UART:
19,224,544 UART: [state] CFI Enabled
19,232,419 UART: [fht] FMC Alias Private Key: 7
20,989,486 UART: [art] Extend RT PCRs Done
20,990,714 UART: [art] Lock RT PCRs Done
20,992,606 UART: [art] Populate DV Done
20,997,951 UART: [fht] FMC Alias Private Key: 7
20,999,648 UART: [art] Derive CDI
21,000,454 UART: [art] Store in in slot 0x4
21,043,543 UART: [art] Derive Key Pair
21,044,584 UART: [art] Store priv key in slot 0x5
23,470,833 UART: [art] Derive Key Pair - Done
23,483,718 UART: [art] Signing Cert with AUTHO
23,485,013 UART: RITY.KEYID = 7
25,190,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,897 UART: [art] PUB.X = DD8285215967F9E34F1EB63BEB15BE0E639850E3955118F510D7FDBFFD12B09C0C451A79F70B019C9B11124C93948670
25,199,128 UART: [art] PUB.Y = CF1363CE752AC8C84C72D92F6EF9A06007AD8D153BDCAF0827F89A67FC8CAA48BCD18143906DE863E9EAAC76BB46CA36
25,206,427 UART: [art] SIG.R = B55A780F1EE6DD5B83A375C259BDAE1FC66734616CC78DD4BBE806ABB78B4CE9F7E55FD075B4B8090DF547EAF18EC25F
25,213,820 UART: [art] SIG.S = CD11068CD7F160AA0431DE4395505378C4B39D67186D00A573E2AA88E99BAC4D4B81C7D4F0E0BAB5E36637405E34C9F9
26,192,736 UART: Caliptra RT
26,193,437 UART: [state] CFI Enabled
26,311,255 UART: [rt] RT listening for mailbox commands...
26,313,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,469,114 UART: [rt]cmd =0x41544d4e, len=14344
30,400,125 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,836 UART: [kat] SHA2-512-ACC
896,737 UART: [kat] ECC-384
902,106 UART: [kat] HMAC-384Kdf
906,736 UART: [kat] LMS
1,474,932 UART: [kat] --
1,475,711 UART: [cold-reset] ++
1,476,213 UART: [fht] Storing FHT @ 0x50003400
1,478,762 UART: [idev] ++
1,478,930 UART: [idev] CDI.KEYID = 6
1,479,290 UART: [idev] SUBJECT.KEYID = 7
1,479,714 UART: [idev] UDS.KEYID = 0
1,480,059 ready_for_fw is high
1,480,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,818 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,044 UART: [idev] --
1,514,031 UART: [ldev] ++
1,514,199 UART: [ldev] CDI.KEYID = 6
1,514,562 UART: [ldev] SUBJECT.KEYID = 5
1,514,988 UART: [ldev] AUTHORITY.KEYID = 7
1,515,451 UART: [ldev] FE.KEYID = 1
1,520,649 UART: [ldev] Erasing FE.KEYID = 1
1,545,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,770 UART: [ldev] --
1,585,057 UART: [fwproc] Waiting for Commands...
1,585,848 UART: [fwproc] Received command 0x46574c44
1,586,639 UART: [fwproc] Received Image of size 114448 bytes
2,886,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,695 >>> mbox cmd response: success
3,079,893 UART: [afmc] ++
3,080,061 UART: [afmc] CDI.KEYID = 6
3,080,423 UART: [afmc] SUBJECT.KEYID = 7
3,080,848 UART: [afmc] AUTHORITY.KEYID = 5
3,116,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,495 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,888 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,578 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,299 UART: [afmc] --
3,159,195 UART: [cold-reset] --
3,160,181 UART: [state] Locking Datavault
3,161,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,954 UART: [state] Locking ICCM
3,162,510 UART: [exit] Launching FMC @ 0x40000130
3,167,839 UART:
3,167,855 UART: Running Caliptra FMC ...
3,168,263 UART:
3,168,317 UART: [state] CFI Enabled
3,178,832 UART: [fht] FMC Alias Private Key: 7
3,286,393 UART: [art] Extend RT PCRs Done
3,286,821 UART: [art] Lock RT PCRs Done
3,288,391 UART: [art] Populate DV Done
3,296,378 UART: [fht] FMC Alias Private Key: 7
3,297,490 UART: [art] Derive CDI
3,297,770 UART: [art] Store in in slot 0x4
3,383,203 UART: [art] Derive Key Pair
3,383,563 UART: [art] Store priv key in slot 0x5
3,397,025 UART: [art] Derive Key Pair - Done
3,411,723 UART: [art] Signing Cert with AUTHO
3,412,203 UART: RITY.KEYID = 7
3,426,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,690 UART: [art] PUB.X = A77DDD44F6ABC0E1A8AB2C6B8D3B1C71333D5C9368F53771005B07598A6E417B290A6FB87F8C94034793A101F7A72EC5
3,434,432 UART: [art] PUB.Y = DB7BAA17B4B7CF88EB6DEEB370E23730E9DB52A7F8C186A657143B7AB0287A3E55CF202CC2A3F7BF04B9D39C6348517C
3,441,397 UART: [art] SIG.R = 65F4FF0E9847A3F726D0A5322472DC1B13138738EBDD068516E02EC801FBDD357155B561304CB9F10949CB489148F555
3,448,151 UART: [art] SIG.S = 54D2645C9C62675571CAD97AC1D1CBC83B2E767523FC228846BDB1DAA9D8559172042991CADFBFD2166D5791F7E9EBA3
3,472,013 UART: Caliptra RT
3,472,266 UART: [state] CFI Enabled
3,580,508 UART: [rt] RT listening for mailbox commands...
3,581,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,596 UART: [rt]cmd =0x41544d4e, len=14344
3,849,731 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 ready_for_fw is high
1,362,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,699 >>> mbox cmd response: success
2,990,897 UART:
2,990,913 UART: Running Caliptra FMC ...
2,991,321 UART:
2,991,375 UART: [state] CFI Enabled
3,001,886 UART: [fht] FMC Alias Private Key: 7
3,110,227 UART: [art] Extend RT PCRs Done
3,110,655 UART: [art] Lock RT PCRs Done
3,112,143 UART: [art] Populate DV Done
3,120,346 UART: [fht] FMC Alias Private Key: 7
3,121,382 UART: [art] Derive CDI
3,121,662 UART: [art] Store in in slot 0x4
3,207,419 UART: [art] Derive Key Pair
3,207,779 UART: [art] Store priv key in slot 0x5
3,220,751 UART: [art] Derive Key Pair - Done
3,235,531 UART: [art] Signing Cert with AUTHO
3,236,011 UART: RITY.KEYID = 7
3,252,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,776 UART: [art] PUB.X = 0A0B343B9544900716B39EA345DF74D15E537E5D3691961A50DFA01E65BBDEF3DA145092CEFB8C3C843A11547DD53775
3,259,541 UART: [art] PUB.Y = 6E99D52C91139465C851CCA4C80E05C13C5F195A18625B6BCE463C794613BDD760818EE58222F01B543AE468A6D89FEA
3,266,487 UART: [art] SIG.R = 8C822FDFBF266E12DE3C0487EA790AD1B2FB3659504AE343C279144C161DEB7EBEDF0447E79C47113412B52F08B5AAC7
3,273,257 UART: [art] SIG.S = D4961F012D9CCB5B873C5A6E2C8FA160A72B3EF9F166C99CBA5074B5647B4073648DA323F80334A124A3AB5E234133F8
3,296,710 UART: Caliptra RT
3,296,963 UART: [state] CFI Enabled
3,404,539 UART: [rt] RT listening for mailbox commands...
3,405,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,505 UART: [rt]cmd =0x41544d4e, len=14344
3,673,156 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,786 UART: [kat] SHA2-256
882,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,832 UART: [kat] ++
886,984 UART: [kat] sha1
891,338 UART: [kat] SHA2-256
893,276 UART: [kat] SHA2-384
895,969 UART: [kat] SHA2-512-ACC
897,870 UART: [kat] ECC-384
903,605 UART: [kat] HMAC-384Kdf
908,375 UART: [kat] LMS
1,476,571 UART: [kat] --
1,477,374 UART: [cold-reset] ++
1,477,798 UART: [fht] Storing FHT @ 0x50003400
1,480,731 UART: [idev] ++
1,480,899 UART: [idev] CDI.KEYID = 6
1,481,259 UART: [idev] SUBJECT.KEYID = 7
1,481,683 UART: [idev] UDS.KEYID = 0
1,482,028 ready_for_fw is high
1,482,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,681 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,685 UART: [idev] --
1,515,716 UART: [ldev] ++
1,515,884 UART: [ldev] CDI.KEYID = 6
1,516,247 UART: [ldev] SUBJECT.KEYID = 5
1,516,673 UART: [ldev] AUTHORITY.KEYID = 7
1,517,136 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,547,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,656 UART: [fwproc] Waiting for Commands...
1,587,431 UART: [fwproc] Received command 0x46574c44
1,588,222 UART: [fwproc] Received Image of size 114448 bytes
2,886,659 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,329 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,722 >>> mbox cmd response: success
3,079,748 UART: [afmc] ++
3,079,916 UART: [afmc] CDI.KEYID = 6
3,080,278 UART: [afmc] SUBJECT.KEYID = 7
3,080,703 UART: [afmc] AUTHORITY.KEYID = 5
3,116,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,520 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,405 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,095 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,950 UART: [afmc] --
3,160,050 UART: [cold-reset] --
3,160,738 UART: [state] Locking Datavault
3,161,799 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,403 UART: [state] Locking ICCM
3,162,979 UART: [exit] Launching FMC @ 0x40000130
3,168,308 UART:
3,168,324 UART: Running Caliptra FMC ...
3,168,732 UART:
3,168,875 UART: [state] CFI Enabled
3,179,352 UART: [fht] FMC Alias Private Key: 7
3,287,469 UART: [art] Extend RT PCRs Done
3,287,897 UART: [art] Lock RT PCRs Done
3,289,479 UART: [art] Populate DV Done
3,298,076 UART: [fht] FMC Alias Private Key: 7
3,299,226 UART: [art] Derive CDI
3,299,506 UART: [art] Store in in slot 0x4
3,384,939 UART: [art] Derive Key Pair
3,385,299 UART: [art] Store priv key in slot 0x5
3,398,517 UART: [art] Derive Key Pair - Done
3,413,392 UART: [art] Signing Cert with AUTHO
3,413,872 UART: RITY.KEYID = 7
3,429,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,087 UART: [art] PUB.X = 5479A6393346823471363EB3536E5ABCA283FC26E0B240EAD647A85454B49F612823403A12E3909D2DFC698D27ECF758
3,436,851 UART: [art] PUB.Y = 415FABEF2DBDCBD44CE6A7BD3AFDC8C071430A9E41B2291EC461FA28EC7B5ED5C20318849650B57E404FECE8AFF3B6B6
3,443,823 UART: [art] SIG.R = AA8558D22C0436B2B5AFB09B4EDE8A5D3B57A3007B064BAF8E0054B64FD8A3406B16D4CBEA8F320B69BF33FA161450D3
3,450,556 UART: [art] SIG.S = ED737B7A3F44EE0A36E27941E6131DB6A5C2A9658F9EAF04055B871745188104F8E6E00805CA1ACFD1B69D7B8415AD11
3,473,603 UART: Caliptra RT
3,473,948 UART: [state] CFI Enabled
3,582,584 UART: [rt] RT listening for mailbox commands...
3,583,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,476 UART: [rt]cmd =0x41544d4e, len=14344
3,850,983 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,840 ready_for_fw is high
1,363,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,920 >>> mbox cmd response: success
2,991,978 UART:
2,991,994 UART: Running Caliptra FMC ...
2,992,402 UART:
2,992,545 UART: [state] CFI Enabled
3,002,990 UART: [fht] FMC Alias Private Key: 7
3,110,879 UART: [art] Extend RT PCRs Done
3,111,307 UART: [art] Lock RT PCRs Done
3,112,911 UART: [art] Populate DV Done
3,121,236 UART: [fht] FMC Alias Private Key: 7
3,122,212 UART: [art] Derive CDI
3,122,492 UART: [art] Store in in slot 0x4
3,208,105 UART: [art] Derive Key Pair
3,208,465 UART: [art] Store priv key in slot 0x5
3,222,067 UART: [art] Derive Key Pair - Done
3,236,891 UART: [art] Signing Cert with AUTHO
3,237,371 UART: RITY.KEYID = 7
3,252,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,926 UART: [art] PUB.X = E543586A7547766A1819AF475FB5E297FCB1F5D2D53B2C6196D75DBA667DE5F5E1521240E926D2D6F8C131D949D3D554
3,259,698 UART: [art] PUB.Y = 4BA1E233FE942A95C7B6E78DB05AEB81EA3BE89462EF31E1D6BC430018FA1F17CEF1D9D6DB26FE5C57E9ED03212C09AD
3,266,644 UART: [art] SIG.R = AF1C802ADFF5C4DA3F15F1B82EB8F33971A390C854CAB9B2C3D01AC782590E0930ECB3449269DEBE36A35393AC0D608B
3,273,421 UART: [art] SIG.S = 06DC66D33889F1678E53C08CABC77D79854BA9098E5CA47DE668DB4D2E37239A7C23BE74F04262B80CDA0FB2ADDFA559
3,296,864 UART: Caliptra RT
3,297,209 UART: [state] CFI Enabled
3,405,542 UART: [rt] RT listening for mailbox commands...
3,406,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,126 UART: [rt]cmd =0x41544d4e, len=14344
3,673,913 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,864 UART: [kat] LMS
1,171,192 UART: [kat] --
1,172,093 UART: [cold-reset] ++
1,172,629 UART: [fht] FHT @ 0x50003400
1,175,334 UART: [idev] ++
1,175,502 UART: [idev] CDI.KEYID = 6
1,175,862 UART: [idev] SUBJECT.KEYID = 7
1,176,286 UART: [idev] UDS.KEYID = 0
1,176,631 ready_for_fw is high
1,176,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,474 UART: [idev] Erasing UDS.KEYID = 0
1,201,407 UART: [idev] Sha1 KeyId Algorithm
1,209,823 UART: [idev] --
1,211,069 UART: [ldev] ++
1,211,237 UART: [ldev] CDI.KEYID = 6
1,211,600 UART: [ldev] SUBJECT.KEYID = 5
1,212,026 UART: [ldev] AUTHORITY.KEYID = 7
1,212,489 UART: [ldev] FE.KEYID = 1
1,217,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,189 UART: [ldev] --
1,283,690 UART: [fwproc] Wait for Commands...
1,284,454 UART: [fwproc] Recv command 0x46574c44
1,285,182 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,998 >>> mbox cmd response: success
2,778,132 UART: [afmc] ++
2,778,300 UART: [afmc] CDI.KEYID = 6
2,778,662 UART: [afmc] SUBJECT.KEYID = 7
2,779,087 UART: [afmc] AUTHORITY.KEYID = 5
2,814,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,715 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,485 UART: [afmc] --
2,857,373 UART: [cold-reset] --
2,858,335 UART: [state] Locking Datavault
2,859,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,432 UART: [state] Locking ICCM
2,861,056 UART: [exit] Launching FMC @ 0x40000130
2,866,385 UART:
2,866,401 UART: Running Caliptra FMC ...
2,866,809 UART:
2,866,863 UART: [state] CFI Enabled
2,877,290 UART: [fht] FMC Alias Private Key: 7
2,985,039 UART: [art] Extend RT PCRs Done
2,985,467 UART: [art] Lock RT PCRs Done
2,986,773 UART: [art] Populate DV Done
2,995,128 UART: [fht] FMC Alias Private Key: 7
2,996,224 UART: [art] Derive CDI
2,996,504 UART: [art] Store in in slot 0x4
3,081,941 UART: [art] Derive Key Pair
3,082,301 UART: [art] Store priv key in slot 0x5
3,095,479 UART: [art] Derive Key Pair - Done
3,110,332 UART: [art] Signing Cert with AUTHO
3,110,812 UART: RITY.KEYID = 7
3,125,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,695 UART: [art] PUB.X = 5B1FFBAFB437F665F36CC1C073A8AC6E80DDAEA01D4256FCE660E36B1C82DE197D332D0544ED3CC22BDBA780F4E99E1E
3,133,488 UART: [art] PUB.Y = DEDFE6D7769E34871363D50231357345DC549AD6ECCCC350EC0B2AACA13DC779B3E588FF76148342E19C1199AF221B0D
3,140,439 UART: [art] SIG.R = E26D26CA8E34C802B28FB96FF26E8EA563EECA4658BC8AA13456E6601D212BD97F8D9E7655ED2A29D5982215ED994358
3,147,214 UART: [art] SIG.S = 594B4FF26DBC507094F55D1A524241FB06B8F82EF389D19BF81608A82BDE6869C3C9EA97705E6B56BB2D01A30927430B
3,171,442 UART: Caliptra RT
3,171,695 UART: [state] CFI Enabled
3,279,596 UART: [rt] RT listening for mailbox commands...
3,280,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,266 UART: [rt]cmd =0x41544d4e, len=14344
3,548,193 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,823 ready_for_fw is high
1,059,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,441 >>> mbox cmd response: success
2,690,041 UART:
2,690,057 UART: Running Caliptra FMC ...
2,690,465 UART:
2,690,519 UART: [state] CFI Enabled
2,700,972 UART: [fht] FMC Alias Private Key: 7
2,809,433 UART: [art] Extend RT PCRs Done
2,809,861 UART: [art] Lock RT PCRs Done
2,811,651 UART: [art] Populate DV Done
2,819,658 UART: [fht] FMC Alias Private Key: 7
2,820,672 UART: [art] Derive CDI
2,820,952 UART: [art] Store in in slot 0x4
2,906,829 UART: [art] Derive Key Pair
2,907,189 UART: [art] Store priv key in slot 0x5
2,920,649 UART: [art] Derive Key Pair - Done
2,935,431 UART: [art] Signing Cert with AUTHO
2,935,911 UART: RITY.KEYID = 7
2,951,197 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,962 UART: [art] PUB.X = 670DA043EDE47B163498FDE633B9C3FF0AC22501B693F09BD0C3531E2CB38E308E7230C6AF86DFC556A5F524D58286FB
2,958,733 UART: [art] PUB.Y = 60854B5800A8B4EDFB7357BDFCFDF0E363E4B88104B7D070BCBDD199AEC35B8772A75C68B46671DD87BE96B5197068B3
2,965,670 UART: [art] SIG.R = F56AA447FD1D1667AA83335D6B3FEA8D286CC7D7CB466E2756B8F6A34D58244474808A0E7D3ECD039F3D4F98D60EE0D1
2,972,443 UART: [art] SIG.S = 66FBE105723DDA23D17A65ED310098F4795BF5A0CC8AC8C8521B30A5C6A15B2ECC19B861EDBCDD2BEF376F6346160725
2,995,768 UART: Caliptra RT
2,996,021 UART: [state] CFI Enabled
3,102,936 UART: [rt] RT listening for mailbox commands...
3,103,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,442 UART: [rt]cmd =0x41544d4e, len=14344
3,371,555 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,209 UART: [kat] HMAC-384Kdf
922,617 UART: [kat] LMS
1,170,945 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,613 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,328 UART: [idev] --
1,211,592 UART: [ldev] ++
1,211,760 UART: [ldev] CDI.KEYID = 6
1,212,123 UART: [ldev] SUBJECT.KEYID = 5
1,212,549 UART: [ldev] AUTHORITY.KEYID = 7
1,213,012 UART: [ldev] FE.KEYID = 1
1,218,266 UART: [ldev] Erasing FE.KEYID = 1
1,244,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,180 UART: [ldev] --
1,283,675 UART: [fwproc] Wait for Commands...
1,284,343 UART: [fwproc] Recv command 0x46574c44
1,285,071 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,379 >>> mbox cmd response: success
2,778,395 UART: [afmc] ++
2,778,563 UART: [afmc] CDI.KEYID = 6
2,778,925 UART: [afmc] SUBJECT.KEYID = 7
2,779,350 UART: [afmc] AUTHORITY.KEYID = 5
2,814,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,058 UART: [afmc] --
2,857,936 UART: [cold-reset] --
2,858,716 UART: [state] Locking Datavault
2,859,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,487 UART: [state] Locking ICCM
2,861,143 UART: [exit] Launching FMC @ 0x40000130
2,866,472 UART:
2,866,488 UART: Running Caliptra FMC ...
2,866,896 UART:
2,867,039 UART: [state] CFI Enabled
2,877,754 UART: [fht] FMC Alias Private Key: 7
2,986,185 UART: [art] Extend RT PCRs Done
2,986,613 UART: [art] Lock RT PCRs Done
2,988,393 UART: [art] Populate DV Done
2,996,736 UART: [fht] FMC Alias Private Key: 7
2,997,780 UART: [art] Derive CDI
2,998,060 UART: [art] Store in in slot 0x4
3,083,615 UART: [art] Derive Key Pair
3,083,975 UART: [art] Store priv key in slot 0x5
3,096,861 UART: [art] Derive Key Pair - Done
3,111,857 UART: [art] Signing Cert with AUTHO
3,112,337 UART: RITY.KEYID = 7
3,127,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,082 UART: [art] PUB.X = 5B6FB8572D678FC400075D5650CE93BEDFA88FCCBC95784CE2642AF999F258462CC9A3C63A41F189A50879C3955CC076
3,134,830 UART: [art] PUB.Y = 52964A6C1B20571A81D4DCCC79244596786E9136B3482FDF5B65AF59DF7265A4D10161F56EE69B03C9F016240A792036
3,141,765 UART: [art] SIG.R = 9691792DA0CD4274FCA014DF4A822E342C5E57CCC7484C716154CABED8038C9B340D69D1E3572105203AD419DE4FEB99
3,148,532 UART: [art] SIG.S = 3ADB15BE11ECC2CDEC4824192C2DDEA213AD914162E513F644EB9DF3A094F5D1E1FA26CD40871DD581F57A953C436511
3,172,913 UART: Caliptra RT
3,173,258 UART: [state] CFI Enabled
3,281,543 UART: [rt] RT listening for mailbox commands...
3,282,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,179 UART: [rt]cmd =0x41544d4e, len=14344
3,550,514 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,184 ready_for_fw is high
1,060,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,074 >>> mbox cmd response: success
2,690,350 UART:
2,690,366 UART: Running Caliptra FMC ...
2,690,774 UART:
2,690,917 UART: [state] CFI Enabled
2,701,174 UART: [fht] FMC Alias Private Key: 7
2,809,291 UART: [art] Extend RT PCRs Done
2,809,719 UART: [art] Lock RT PCRs Done
2,811,159 UART: [art] Populate DV Done
2,819,462 UART: [fht] FMC Alias Private Key: 7
2,820,432 UART: [art] Derive CDI
2,820,712 UART: [art] Store in in slot 0x4
2,906,495 UART: [art] Derive Key Pair
2,906,855 UART: [art] Store priv key in slot 0x5
2,920,011 UART: [art] Derive Key Pair - Done
2,935,097 UART: [art] Signing Cert with AUTHO
2,935,577 UART: RITY.KEYID = 7
2,951,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,852 UART: [art] PUB.X = 0C370E76D46998498C20520A83D3DB3C986CADF1539DB3C7F353E700CF198C6CE9ACE3D2FDF4D49C03EC7FCB3B159B77
2,958,604 UART: [art] PUB.Y = 5CED02DEA308FAE36C71E1C9837353921DC1971CDBFE74CF92D6D1922CB1864E85341DC9AF0AE919A638CEFF21AF315D
2,965,563 UART: [art] SIG.R = 3AAF39C53172AD30ACA94A4875BE57815ACF8A11FA69C5502B76B537F2C5ECCF8A48E207BD7B8758464D3483839E17D7
2,972,338 UART: [art] SIG.S = A54EEDB9B8A9D5163CDAE39FE8A4BA6675FBCE4CD33136E7BC8C7E9542F942B95342F4A21B15012F7CE4CB2474B1F466
2,996,344 UART: Caliptra RT
2,996,689 UART: [state] CFI Enabled
3,103,626 UART: [rt] RT listening for mailbox commands...
3,104,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,364 UART: [rt]cmd =0x41544d4e, len=14344
3,372,147 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,699 UART: [kat] ++
895,851 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,170,113 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 ready_for_fw is high
1,174,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,500 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,132 >>> mbox cmd response: success
2,774,311 UART: [afmc] ++
2,774,479 UART: [afmc] CDI.KEYID = 6
2,774,842 UART: [afmc] SUBJECT.KEYID = 7
2,775,268 UART: [afmc] AUTHORITY.KEYID = 5
2,810,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,934 UART: [afmc] --
2,853,832 UART: [cold-reset] --
2,854,684 UART: [state] Locking Datavault
2,855,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,527 UART: [state] Locking ICCM
2,856,953 UART: [exit] Launching FMC @ 0x40000130
2,862,282 UART:
2,862,298 UART: Running Caliptra FMC ...
2,862,706 UART:
2,862,760 UART: [state] CFI Enabled
2,873,517 UART: [fht] FMC Alias Private Key: 7
2,981,862 UART: [art] Extend RT PCRs Done
2,982,290 UART: [art] Lock RT PCRs Done
2,984,172 UART: [art] Populate DV Done
2,992,181 UART: [fht] FMC Alias Private Key: 7
2,993,259 UART: [art] Derive CDI
2,993,539 UART: [art] Store in in slot 0x4
3,079,100 UART: [art] Derive Key Pair
3,079,460 UART: [art] Store priv key in slot 0x5
3,092,740 UART: [art] Derive Key Pair - Done
3,107,431 UART: [art] Signing Cert with AUTHO
3,107,911 UART: RITY.KEYID = 7
3,122,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,634 UART: [art] PUB.X = 3BF04A9EFD77D0535F0FBE8E9CF258B49436899A5AD3C3D50348ED1338D7C4D306FF9D3C7EB077CD2C36A2E813612D79
3,130,407 UART: [art] PUB.Y = AB281FE804C4678E6A2E3739B34CB30B76069997AA1B3B1CBA350AE6D79DA8842706A18BC5B6AC7B422566E565E8981C
3,137,348 UART: [art] SIG.R = C491D8BCD0D16C75F7C227C70AF6D242D8C154C056B268E604E0204C4880CC0C5344D57B72FB17BA23C7AF710A8A46E3
3,144,114 UART: [art] SIG.S = 45184C45B513B427E835FB91D58C46A0D495908A61797FE3AE7E1BF380763978525BC7F1884370703D0900FDC0ECD0D0
3,168,480 UART: Caliptra RT
3,168,733 UART: [state] CFI Enabled
3,276,948 UART: [rt] RT listening for mailbox commands...
3,277,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,574 UART: [rt]cmd =0x41544d4e, len=14344
3,545,467 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,672 ready_for_fw is high
1,056,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,536 >>> mbox cmd response: success
2,687,272 UART:
2,687,288 UART: Running Caliptra FMC ...
2,687,696 UART:
2,687,750 UART: [state] CFI Enabled
2,697,897 UART: [fht] FMC Alias Private Key: 7
2,805,640 UART: [art] Extend RT PCRs Done
2,806,068 UART: [art] Lock RT PCRs Done
2,807,624 UART: [art] Populate DV Done
2,815,829 UART: [fht] FMC Alias Private Key: 7
2,816,811 UART: [art] Derive CDI
2,817,091 UART: [art] Store in in slot 0x4
2,902,752 UART: [art] Derive Key Pair
2,903,112 UART: [art] Store priv key in slot 0x5
2,916,306 UART: [art] Derive Key Pair - Done
2,931,061 UART: [art] Signing Cert with AUTHO
2,931,541 UART: RITY.KEYID = 7
2,946,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,534 UART: [art] PUB.X = BC51531150EE70C34AE51E3F5FBF5A8F2481C131E388A0AB8DEBC1B726A7E39F0F064E8F67AB5B1153B6C1823392F19A
2,954,310 UART: [art] PUB.Y = 9A0FCF05B3C98AA5651788220DFB307D1C65D547DF8F4E7D159FD1638C4A36E382B63CEA6DC6F703BD5D37C8B5F5D1C9
2,961,264 UART: [art] SIG.R = 7E45DEE352C27CC7C435153ED21BAF87AF1DF25F5638945FF0C44219C85A7DFA5CED3607C3DD5CE4E82EA7DA38B58576
2,968,049 UART: [art] SIG.S = 375C7BB81CD8396DAC4005EFA09E4099556704D47E1DE0DD51888DEDA289019AF4C7516DE65378AB4EE81A559A0A17CE
2,991,788 UART: Caliptra RT
2,992,041 UART: [state] CFI Enabled
3,100,242 UART: [rt] RT listening for mailbox commands...
3,100,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,162 UART: [rt]cmd =0x41544d4e, len=14344
3,369,033 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,775 UART: [kat] HMAC-384Kdf
921,451 UART: [kat] LMS
1,169,763 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,209,356 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,837 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,217,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,321 UART: [fwproc] Wait for Commands...
1,283,138 UART: [fwproc] Recv command 0x46574c44
1,283,871 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,109 >>> mbox cmd response: success
2,778,252 UART: [afmc] ++
2,778,420 UART: [afmc] CDI.KEYID = 6
2,778,783 UART: [afmc] SUBJECT.KEYID = 7
2,779,209 UART: [afmc] AUTHORITY.KEYID = 5
2,814,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,557 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,001 UART: [afmc] --
2,858,059 UART: [cold-reset] --
2,858,959 UART: [state] Locking Datavault
2,860,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,758 UART: [state] Locking ICCM
2,861,428 UART: [exit] Launching FMC @ 0x40000130
2,866,757 UART:
2,866,773 UART: Running Caliptra FMC ...
2,867,181 UART:
2,867,324 UART: [state] CFI Enabled
2,878,243 UART: [fht] FMC Alias Private Key: 7
2,986,532 UART: [art] Extend RT PCRs Done
2,986,960 UART: [art] Lock RT PCRs Done
2,988,300 UART: [art] Populate DV Done
2,996,577 UART: [fht] FMC Alias Private Key: 7
2,997,515 UART: [art] Derive CDI
2,997,795 UART: [art] Store in in slot 0x4
3,083,428 UART: [art] Derive Key Pair
3,083,788 UART: [art] Store priv key in slot 0x5
3,097,260 UART: [art] Derive Key Pair - Done
3,112,012 UART: [art] Signing Cert with AUTHO
3,112,492 UART: RITY.KEYID = 7
3,127,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,295 UART: [art] PUB.X = FD3011F528381E7CB4B05598ADCEC3D348063456DD9C902371C33C68E22A565406C14FE8A64AC06A1B8E55407EA53EBC
3,135,065 UART: [art] PUB.Y = 5A5847FEBC4F2D88B63FC4E4DA15F7BB86304D8F1962BECC76E5EE5A56A1C9A78D260CAD928BA1D6E0069A9E8C0F633F
3,142,028 UART: [art] SIG.R = 72ABC9D910990746E43BA5A45BFB174C78313EE6AA21C618DC2CC50277D69216D3E807F3C25637EBE4D1E3E75FB52B4D
3,148,799 UART: [art] SIG.S = 7F1C4E54210A44565BF32CC0B586682493A125CC88CEED0C321964AA587218C269B94590867EA23FBA51EB44DB9AD8B3
3,173,120 UART: Caliptra RT
3,173,465 UART: [state] CFI Enabled
3,281,196 UART: [rt] RT listening for mailbox commands...
3,281,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,680 UART: [rt]cmd =0x41544d4e, len=14344
3,549,899 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,001 ready_for_fw is high
1,056,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,279 >>> mbox cmd response: success
2,685,855 UART:
2,685,871 UART: Running Caliptra FMC ...
2,686,279 UART:
2,686,422 UART: [state] CFI Enabled
2,697,199 UART: [fht] FMC Alias Private Key: 7
2,805,276 UART: [art] Extend RT PCRs Done
2,805,704 UART: [art] Lock RT PCRs Done
2,807,472 UART: [art] Populate DV Done
2,815,763 UART: [fht] FMC Alias Private Key: 7
2,816,911 UART: [art] Derive CDI
2,817,191 UART: [art] Store in in slot 0x4
2,902,950 UART: [art] Derive Key Pair
2,903,310 UART: [art] Store priv key in slot 0x5
2,916,294 UART: [art] Derive Key Pair - Done
2,931,187 UART: [art] Signing Cert with AUTHO
2,931,667 UART: RITY.KEYID = 7
2,946,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,486 UART: [art] PUB.X = A933EA2342F0BB438B61FE38E302BF69619D29086CF3347DF8941909759900E8BD7092C1A876769F8514D8AC1B420F15
2,954,216 UART: [art] PUB.Y = B9FC1B14B3FFF823D7E36B1AC2B0C43021A56719060283A283F815E02165DFEF222DB4322C7D4A549A8EBE4E3BA9C8BB
2,961,174 UART: [art] SIG.R = 722526B849FA1968672A66D588BBF89039829BA0C2B6ADEE0125B1DF56147F807272ECBA774E8730BB279977B645A8AC
2,967,941 UART: [art] SIG.S = 1E925CA415FC8E8CB2763D4FC69D5E57D0AD1BCF38F1C91ED5A736399783720C703F375415D851AB958ADCA1657C8394
2,992,453 UART: Caliptra RT
2,992,798 UART: [state] CFI Enabled
3,100,165 UART: [rt] RT listening for mailbox commands...
3,100,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,939 UART: [rt]cmd =0x41544d4e, len=14344
3,368,808 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,047 UART:
192,409 UART: Running Caliptra ROM ...
193,532 UART:
193,680 UART: [state] CFI Enabled
263,042 UART: [state] LifecycleState = Unprovisioned
264,954 UART: [state] DebugLocked = No
267,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,543 UART: [kat] SHA2-256
442,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,763 UART: [kat] ++
453,255 UART: [kat] sha1
463,625 UART: [kat] SHA2-256
466,300 UART: [kat] SHA2-384
473,504 UART: [kat] SHA2-512-ACC
475,877 UART: [kat] ECC-384
2,764,652 UART: [kat] HMAC-384Kdf
2,776,549 UART: [kat] LMS
3,966,795 UART: [kat] --
3,970,886 UART: [cold-reset] ++
3,972,700 UART: [fht] Storing FHT @ 0x50003400
3,985,417 UART: [idev] ++
3,985,991 UART: [idev] CDI.KEYID = 6
3,986,945 UART: [idev] SUBJECT.KEYID = 7
3,988,190 UART: [idev] UDS.KEYID = 0
3,989,176 ready_for_fw is high
3,989,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,031 UART: [idev] Erasing UDS.KEYID = 0
7,323,018 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,711 UART: [idev] --
7,348,248 UART: [ldev] ++
7,348,824 UART: [ldev] CDI.KEYID = 6
7,349,792 UART: [ldev] SUBJECT.KEYID = 5
7,351,002 UART: [ldev] AUTHORITY.KEYID = 7
7,352,242 UART: [ldev] FE.KEYID = 1
7,378,832 UART: [ldev] Erasing FE.KEYID = 1
10,713,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,043 UART: [ldev] --
13,096,059 UART: [fwproc] Waiting for Commands...
13,098,088 UART: [fwproc] Received command 0x46574c44
13,100,304 UART: [fwproc] Received Image of size 114124 bytes
21,583,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,665,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,734,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,051,037 >>> mbox cmd response: success
22,054,896 UART: [afmc] ++
22,055,527 UART: [afmc] CDI.KEYID = 6
22,056,448 UART: [afmc] SUBJECT.KEYID = 7
22,057,669 UART: [afmc] AUTHORITY.KEYID = 5
25,427,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,724,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,726,467 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,741,033 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,755,750 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,770,014 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,791,666 UART: [afmc] --
27,796,151 UART: [cold-reset] --
27,799,309 UART: [state] Locking Datavault
27,805,852 UART: [state] Locking PCR0, PCR1 and PCR31
27,807,550 UART: [state] Locking ICCM
27,808,951 UART: [exit] Launching FMC @ 0x40000130
27,817,395 UART:
27,817,692 UART: Running Caliptra FMC ...
27,818,804 UART:
27,818,984 UART: [state] CFI Enabled
27,883,942 UART: [fht] FMC Alias Private Key: 7
30,221,873 UART: [art] Extend RT PCRs Done
30,223,097 UART: [art] Lock RT PCRs Done
30,224,864 UART: [art] Populate DV Done
30,230,542 UART: [fht] FMC Alias Private Key: 7
30,232,184 UART: [art] Derive CDI
30,232,922 UART: [art] Store in in slot 0x4
30,292,685 UART: [art] Derive Key Pair
30,293,723 UART: [art] Store priv key in slot 0x5
33,586,785 UART: [art] Derive Key Pair - Done
33,599,570 UART: [art] Signing Cert with AUTHO
33,600,879 UART: RITY.KEYID = 7
35,888,980 UART: [art] Erasing AUTHORITY.KEYID = 7
35,890,485 UART: [art] PUB.X = 6013B1D06A350368F86E7C8AD23B6CB737EA45CF31173AC6E88CDC16FBBE64973119113A5289848D3DE2047BA2CB85A1
35,897,768 UART: [art] PUB.Y = 674C9B5A7C8711D0146DAB36B55C3F805F0CB3A99DC0228CB67D4957B732090BE6596846D0CA9767899FF6191F168309
35,904,978 UART: [art] SIG.R = 02B3AA5516E7F6B5E480E7E7FE1F510035CF7577D0327F2488E39C7EB64C31272C07C52763ACF4F9F542F4B10BA564B8
35,912,325 UART: [art] SIG.S = E369318D108A9EB91D1A4A55F54D44DCDCA986C3AE52D00625EC1A05F31786023D23C9C255C6648C54B819E4A87A6BF7
37,217,105 UART: Caliptra RT
37,217,808 UART: [state] CFI Enabled
37,380,900 UART: [rt] RT listening for mailbox commands...
37,383,216 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,538,370 UART: [rt]cmd =0x41544d4e, len=14344
37,540,391 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,807,695 ready_for_fw is high
3,808,274 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,937,530 >>> mbox cmd response: success
27,642,179 UART:
27,642,562 UART: Running Caliptra FMC ...
27,643,666 UART:
27,643,820 UART: [state] CFI Enabled
27,710,318 UART: [fht] FMC Alias Private Key: 7
30,047,653 UART: [art] Extend RT PCRs Done
30,048,886 UART: [art] Lock RT PCRs Done
30,050,494 UART: [art] Populate DV Done
30,056,018 UART: [fht] FMC Alias Private Key: 7
30,057,676 UART: [art] Derive CDI
30,058,419 UART: [art] Store in in slot 0x4
30,118,654 UART: [art] Derive Key Pair
30,119,692 UART: [art] Store priv key in slot 0x5
33,412,525 UART: [art] Derive Key Pair - Done
33,425,688 UART: [art] Signing Cert with AUTHO
33,426,996 UART: RITY.KEYID = 7
35,715,391 UART: [art] Erasing AUTHORITY.KEYID = 7
35,716,906 UART: [art] PUB.X = 7607516528943C4F9D1C9FD83E800D8317206C3DEA2E3F44EF3CFCAE61C5EFC38C6AF3932AB0C1E13431DCBA59FFA8FD
35,724,185 UART: [art] PUB.Y = 052C1B925896CFEC85757AF3239DF8CD0FD5466C974B0B6B7F7BF9D0A24AB0C6354EACC5574901E63AC9C0085411777E
35,731,409 UART: [art] SIG.R = D2F50F62B53DDC500F4F3E9D2E67B4396550F80B441C5F04FF3F45DCEA854E585C37F61C34D13BD32B5E5320641477E2
35,738,766 UART: [art] SIG.S = FDC30569CFB80DDB3867233DE207344B641ADBC92107D833F43F28CB8A490E70FA12E7D1F096D8D6C6C9FC48A88E32A0
37,043,733 UART: Caliptra RT
37,044,428 UART: [state] CFI Enabled
37,206,553 UART: [rt] RT listening for mailbox commands...
37,208,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,364,022 UART: [rt]cmd =0x41544d4e, len=14344
37,365,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,723 writing to cptra_bootfsm_go
193,949 UART:
194,289 UART: Running Caliptra ROM ...
195,466 UART:
605,279 UART: [state] CFI Enabled
616,002 UART: [state] LifecycleState = Unprovisioned
617,961 UART: [state] DebugLocked = No
620,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,708 UART: [kat] SHA2-256
794,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,005 UART: [kat] ++
805,456 UART: [kat] sha1
817,385 UART: [kat] SHA2-256
820,112 UART: [kat] SHA2-384
827,027 UART: [kat] SHA2-512-ACC
829,464 UART: [kat] ECC-384
3,113,781 UART: [kat] HMAC-384Kdf
3,125,001 UART: [kat] LMS
4,315,175 UART: [kat] --
4,318,469 UART: [cold-reset] ++
4,320,564 UART: [fht] Storing FHT @ 0x50003400
4,332,100 UART: [idev] ++
4,332,670 UART: [idev] CDI.KEYID = 6
4,333,552 UART: [idev] SUBJECT.KEYID = 7
4,334,860 UART: [idev] UDS.KEYID = 0
4,335,855 ready_for_fw is high
4,336,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,278 UART: [idev] Erasing UDS.KEYID = 0
7,620,063 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,554 UART: [idev] --
7,644,712 UART: [ldev] ++
7,645,278 UART: [ldev] CDI.KEYID = 6
7,646,242 UART: [ldev] SUBJECT.KEYID = 5
7,647,446 UART: [ldev] AUTHORITY.KEYID = 7
7,648,723 UART: [ldev] FE.KEYID = 1
7,661,256 UART: [ldev] Erasing FE.KEYID = 1
10,951,220 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,626 UART: [ldev] --
13,308,023 UART: [fwproc] Waiting for Commands...
13,310,059 UART: [fwproc] Received command 0x46574c44
13,312,291 UART: [fwproc] Received Image of size 114124 bytes
21,950,781 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,031,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,100,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,418,832 >>> mbox cmd response: success
22,423,155 UART: [afmc] ++
22,423,746 UART: [afmc] CDI.KEYID = 6
22,424,764 UART: [afmc] SUBJECT.KEYID = 7
22,425,919 UART: [afmc] AUTHORITY.KEYID = 5
25,740,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,033,688 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,035,955 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,050,471 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,065,242 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,079,473 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,100,262 UART: [afmc] --
28,104,024 UART: [cold-reset] --
28,108,208 UART: [state] Locking Datavault
28,115,667 UART: [state] Locking PCR0, PCR1 and PCR31
28,117,364 UART: [state] Locking ICCM
28,119,183 UART: [exit] Launching FMC @ 0x40000130
28,127,581 UART:
28,127,819 UART: Running Caliptra FMC ...
28,128,922 UART:
28,129,084 UART: [state] CFI Enabled
28,137,429 UART: [fht] FMC Alias Private Key: 7
30,468,731 UART: [art] Extend RT PCRs Done
30,469,958 UART: [art] Lock RT PCRs Done
30,471,440 UART: [art] Populate DV Done
30,476,902 UART: [fht] FMC Alias Private Key: 7
30,478,544 UART: [art] Derive CDI
30,479,276 UART: [art] Store in in slot 0x4
30,522,012 UART: [art] Derive Key Pair
30,523,046 UART: [art] Store priv key in slot 0x5
33,765,062 UART: [art] Derive Key Pair - Done
33,778,327 UART: [art] Signing Cert with AUTHO
33,779,628 UART: RITY.KEYID = 7
36,059,237 UART: [art] Erasing AUTHORITY.KEYID = 7
36,060,747 UART: [art] PUB.X = BC43DEA3E7AF325FD8740D9B0526F8848528DA9EF15DE813B747C0DF9DCE323299A93CBF1085B42EDD7D86EC6C41FD0D
36,067,977 UART: [art] PUB.Y = 53B31C033C9DACF72E42672EE06DEE76EC08D30F3729BCE6870A0F3B6A52D5C7C9475DEF0E3D5B73C9FEF194968D57CA
36,075,258 UART: [art] SIG.R = 4DFEAA79E0E8516BE3236FD67435BB99D00FFFC73F219629A37B59D6E8095648F95EFA66A37B20F831EEE846229D9806
36,082,666 UART: [art] SIG.S = 0BBFCB68D4ABA72256840D6156FFE61AF52A196939EB54942AC9DB9074589370004521FCE540277AAA7F4B5DF0749FE6
37,387,595 UART: Caliptra RT
37,388,282 UART: [state] CFI Enabled
37,506,363 UART: [rt] RT listening for mailbox commands...
37,508,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,664,202 UART: [rt]cmd =0x41544d4e, len=14344
37,665,845 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
4,132,890 ready_for_fw is high
4,133,532 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,332,023 >>> mbox cmd response: success
27,976,521 UART:
27,976,926 UART: Running Caliptra FMC ...
27,978,074 UART:
27,978,235 UART: [state] CFI Enabled
27,986,182 UART: [fht] FMC Alias Private Key: 7
30,316,332 UART: [art] Extend RT PCRs Done
30,317,565 UART: [art] Lock RT PCRs Done
30,319,003 UART: [art] Populate DV Done
30,324,474 UART: [fht] FMC Alias Private Key: 7
30,326,122 UART: [art] Derive CDI
30,326,931 UART: [art] Store in in slot 0x4
30,369,642 UART: [art] Derive Key Pair
30,370,692 UART: [art] Store priv key in slot 0x5
33,612,884 UART: [art] Derive Key Pair - Done
33,626,259 UART: [art] Signing Cert with AUTHO
33,627,586 UART: RITY.KEYID = 7
35,907,670 UART: [art] Erasing AUTHORITY.KEYID = 7
35,909,196 UART: [art] PUB.X = B63CF21D9B8E364043B50F996667D821E6EC8749965817B359BE0DCE6E821872BA471AEFBE8FA2591D758A297D0F85C9
35,916,421 UART: [art] PUB.Y = E09F3CF2FC329C362911FAC3356E936F07BEFE50C2A4092F7AC0E42CF56F8A86704EEE9CC3E0B8BD140B4D33ADD26250
35,923,650 UART: [art] SIG.R = DD4DF6ACE6287B9FE333F02F970A304FD79AA4989C8E346D53E47A3ECD8A8BB43D29EDBBD37BD8C690A533F39D0A66A6
35,931,083 UART: [art] SIG.S = B87D5BAB9CDA568E81DF331FB4FF4F691EF5270C3EAEE77CA94CDFA58811860EA04C495AFEA7D6F661597F51609D39A1
37,236,008 UART: Caliptra RT
37,236,727 UART: [state] CFI Enabled
37,354,758 UART: [rt] RT listening for mailbox commands...
37,357,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,512,546 UART: [rt]cmd =0x41544d4e, len=14344
37,514,350 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,236 UART:
192,590 UART: Running Caliptra ROM ...
193,804 UART:
193,961 UART: [state] CFI Enabled
264,296 UART: [state] LifecycleState = Unprovisioned
266,140 UART: [state] DebugLocked = No
268,515 UART: [state] WD Timer not started. Device not locked for debugging
271,696 UART: [kat] SHA2-256
450,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,371 UART: [kat] ++
462,900 UART: [kat] sha1
474,025 UART: [kat] SHA2-256
477,068 UART: [kat] SHA2-384
483,219 UART: [kat] SHA2-512-ACC
486,228 UART: [kat] ECC-384
2,946,379 UART: [kat] HMAC-384Kdf
2,970,428 UART: [kat] LMS
3,499,899 UART: [kat] --
3,506,200 UART: [cold-reset] ++
3,508,171 UART: [fht] FHT @ 0x50003400
3,518,800 UART: [idev] ++
3,519,372 UART: [idev] CDI.KEYID = 6
3,520,257 UART: [idev] SUBJECT.KEYID = 7
3,521,500 UART: [idev] UDS.KEYID = 0
3,522,439 ready_for_fw is high
3,522,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,545 UART: [idev] Erasing UDS.KEYID = 0
6,026,446 UART: [idev] Sha1 KeyId Algorithm
6,050,374 UART: [idev] --
6,054,481 UART: [ldev] ++
6,055,057 UART: [ldev] CDI.KEYID = 6
6,055,996 UART: [ldev] SUBJECT.KEYID = 5
6,057,163 UART: [ldev] AUTHORITY.KEYID = 7
6,058,400 UART: [ldev] FE.KEYID = 1
6,100,406 UART: [ldev] Erasing FE.KEYID = 1
8,602,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,906 UART: [ldev] --
10,416,006 UART: [fwproc] Wait for Commands...
10,417,517 UART: [fwproc] Recv command 0x46574c44
10,419,612 UART: [fwproc] Recv'd Img size: 114448 bytes
14,996,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,076,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,144,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,463,057 >>> mbox cmd response: success
15,467,174 UART: [afmc] ++
15,467,769 UART: [afmc] CDI.KEYID = 6
15,468,681 UART: [afmc] SUBJECT.KEYID = 7
15,469,839 UART: [afmc] AUTHORITY.KEYID = 5
18,001,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,723,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,725,716 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,741,653 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,757,624 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,773,383 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,795,388 UART: [afmc] --
19,798,663 UART: [cold-reset] --
19,801,827 UART: [state] Locking Datavault
19,805,933 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,631 UART: [state] Locking ICCM
19,809,586 UART: [exit] Launching FMC @ 0x40000130
19,818,037 UART:
19,818,278 UART: Running Caliptra FMC ...
19,819,376 UART:
19,819,534 UART: [state] CFI Enabled
19,882,067 UART: [fht] FMC Alias Private Key: 7
21,646,126 UART: [art] Extend RT PCRs Done
21,647,324 UART: [art] Lock RT PCRs Done
21,648,949 UART: [art] Populate DV Done
21,654,521 UART: [fht] FMC Alias Private Key: 7
21,656,164 UART: [art] Derive CDI
21,656,980 UART: [art] Store in in slot 0x4
21,714,628 UART: [art] Derive Key Pair
21,715,690 UART: [art] Store priv key in slot 0x5
24,178,410 UART: [art] Derive Key Pair - Done
24,191,465 UART: [art] Signing Cert with AUTHO
24,192,788 UART: RITY.KEYID = 7
25,904,431 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,936 UART: [art] PUB.X = 6FE681C88411D7A25F12C7331B2E0DCAAD4C933E5DE3C6AF6C47DC04FCC1EB3990D20D9ABA147CD8793DC8970E4C34D5
25,913,272 UART: [art] PUB.Y = 183CAB207BDA8F6F7B258B6989591A43F68108B3F67FF25C58FF4688BE996539460FFC1BFC5F233BCA3D8E455C034873
25,920,459 UART: [art] SIG.R = 104017301F3855C923A8D1A9632A320C4FA5BBC9F9571314D6A79CFB761EC4C1875BE6BA8DEC52F41BA217C656330F6D
25,927,851 UART: [art] SIG.S = 445EC23895BBB7F87091DCFEB30FD04A06D98CE0F4D7E2BC01EFCCA2060386CC876A5CB5580DF497B41783A7F6BC9D79
26,907,338 UART: Caliptra RT
26,908,031 UART: [state] CFI Enabled
27,072,749 UART: [rt] RT listening for mailbox commands...
27,075,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,230,908 UART: [rt]cmd =0x41544d4e, len=14344
27,232,998 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,361,870 ready_for_fw is high
3,362,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,055,865 >>> mbox cmd response: success
19,347,443 UART:
19,347,824 UART: Running Caliptra FMC ...
19,349,146 UART:
19,349,322 UART: [state] CFI Enabled
19,414,698 UART: [fht] FMC Alias Private Key: 7
21,178,113 UART: [art] Extend RT PCRs Done
21,179,332 UART: [art] Lock RT PCRs Done
21,181,418 UART: [art] Populate DV Done
21,186,807 UART: [fht] FMC Alias Private Key: 7
21,188,514 UART: [art] Derive CDI
21,189,325 UART: [art] Store in in slot 0x4
21,247,460 UART: [art] Derive Key Pair
21,248,463 UART: [art] Store priv key in slot 0x5
23,711,032 UART: [art] Derive Key Pair - Done
23,723,939 UART: [art] Signing Cert with AUTHO
23,725,252 UART: RITY.KEYID = 7
25,437,927 UART: [art] Erasing AUTHORITY.KEYID = 7
25,439,404 UART: [art] PUB.X = 458F59C973CC6FE853599AD31D4B4FD658E9538AAA04160F1945216443DB747BEBFC9E507FC61E1919629DC298E5FB2B
25,446,711 UART: [art] PUB.Y = 0D60103BCD4377F4E8A5837B55B3690CFD3D48C2EE60E827FC887CD70A0BBE58718DF4253C79CBDB6183E5A466781DD3
25,453,977 UART: [art] SIG.R = EA5F674967D68BBA9E4644BB7CE53CDB173A6466F4B497C44C6C99FA04A91BCCBF781854CBEE52FA68633FFD9C575591
25,461,377 UART: [art] SIG.S = B7F3711F91049EA69EA0614728F6F67BA536DE7403991BD296438F965866F43D89CC423E3AF69F6579AB19AD08F96044
26,440,380 UART: Caliptra RT
26,441,103 UART: [state] CFI Enabled
26,606,723 UART: [rt] RT listening for mailbox commands...
26,609,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,783 UART: [rt]cmd =0x41544d4e, len=14344
26,766,604 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,320 UART:
192,708 UART: Running Caliptra ROM ...
193,837 UART:
603,401 UART: [state] CFI Enabled
620,184 UART: [state] LifecycleState = Unprovisioned
621,985 UART: [state] DebugLocked = No
624,566 UART: [state] WD Timer not started. Device not locked for debugging
627,805 UART: [kat] SHA2-256
806,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,524 UART: [kat] ++
818,970 UART: [kat] sha1
831,396 UART: [kat] SHA2-256
834,405 UART: [kat] SHA2-384
840,245 UART: [kat] SHA2-512-ACC
843,149 UART: [kat] ECC-384
3,283,940 UART: [kat] HMAC-384Kdf
3,297,783 UART: [kat] LMS
3,827,294 UART: [kat] --
3,832,363 UART: [cold-reset] ++
3,834,784 UART: [fht] FHT @ 0x50003400
3,845,325 UART: [idev] ++
3,845,890 UART: [idev] CDI.KEYID = 6
3,846,791 UART: [idev] SUBJECT.KEYID = 7
3,848,022 UART: [idev] UDS.KEYID = 0
3,848,923 ready_for_fw is high
3,849,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,914 UART: [idev] Erasing UDS.KEYID = 0
6,318,034 UART: [idev] Sha1 KeyId Algorithm
6,341,917 UART: [idev] --
6,345,855 UART: [ldev] ++
6,346,415 UART: [ldev] CDI.KEYID = 6
6,347,291 UART: [ldev] SUBJECT.KEYID = 5
6,348,495 UART: [ldev] AUTHORITY.KEYID = 7
6,349,791 UART: [ldev] FE.KEYID = 1
6,359,217 UART: [ldev] Erasing FE.KEYID = 1
8,830,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,791 UART: [ldev] --
10,620,363 UART: [fwproc] Wait for Commands...
10,621,908 UART: [fwproc] Recv command 0x46574c44
10,623,993 UART: [fwproc] Recv'd Img size: 114448 bytes
15,203,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,280,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,349,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,667,822 >>> mbox cmd response: success
15,672,422 UART: [afmc] ++
15,673,031 UART: [afmc] CDI.KEYID = 6
15,673,943 UART: [afmc] SUBJECT.KEYID = 7
15,675,096 UART: [afmc] AUTHORITY.KEYID = 5
18,171,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,892,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,893,898 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,909,893 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,925,858 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,941,582 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,964,021 UART: [afmc] --
19,967,871 UART: [cold-reset] --
19,971,473 UART: [state] Locking Datavault
19,977,743 UART: [state] Locking PCR0, PCR1 and PCR31
19,979,381 UART: [state] Locking ICCM
19,981,144 UART: [exit] Launching FMC @ 0x40000130
19,989,536 UART:
19,989,791 UART: Running Caliptra FMC ...
19,990,890 UART:
19,991,039 UART: [state] CFI Enabled
19,999,673 UART: [fht] FMC Alias Private Key: 7
21,756,178 UART: [art] Extend RT PCRs Done
21,757,406 UART: [art] Lock RT PCRs Done
21,759,137 UART: [art] Populate DV Done
21,764,545 UART: [fht] FMC Alias Private Key: 7
21,766,130 UART: [art] Derive CDI
21,766,939 UART: [art] Store in in slot 0x4
21,809,378 UART: [art] Derive Key Pair
21,810,414 UART: [art] Store priv key in slot 0x5
24,237,367 UART: [art] Derive Key Pair - Done
24,250,468 UART: [art] Signing Cert with AUTHO
24,251,765 UART: RITY.KEYID = 7
25,957,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,958,605 UART: [art] PUB.X = 09B6F27C41AAEFCD9E183A5E775A45438DC58BAE54B17CEE5CD92325B29E007E63B38F07A472B30EE63871DE55211A14
25,965,871 UART: [art] PUB.Y = 8F35A74B2F29789CBED51AB5A3761EC33D5FB41D3C9054E73914816E2DF9C52F43CB432484F305E2E713D19A325C3BBB
25,973,092 UART: [art] SIG.R = EA61BE2FA94AB2F056B630D44073EDA7B3086BCDAB01A1C2B36E6E78DD95B671E79F345C9C37ACD7842C3EE9E634C894
25,980,525 UART: [art] SIG.S = 0D4674F55F37567CC291E422EE4452FC18C783E96D2C8F61997B0789026B4CA59ED3201F294C4569B17E04354D8E21A4
26,960,233 UART: Caliptra RT
26,960,916 UART: [state] CFI Enabled
27,076,777 UART: [rt] RT listening for mailbox commands...
27,079,074 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,620 UART: [rt]cmd =0x41544d4e, len=14344
27,236,581 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,689,514 ready_for_fw is high
3,690,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,254,303 >>> mbox cmd response: success
19,499,961 UART:
19,500,354 UART: Running Caliptra FMC ...
19,501,541 UART:
19,501,703 UART: [state] CFI Enabled
19,509,591 UART: [fht] FMC Alias Private Key: 7
21,266,124 UART: [art] Extend RT PCRs Done
21,267,340 UART: [art] Lock RT PCRs Done
21,269,019 UART: [art] Populate DV Done
21,274,520 UART: [fht] FMC Alias Private Key: 7
21,276,062 UART: [art] Derive CDI
21,276,821 UART: [art] Store in in slot 0x4
21,319,198 UART: [art] Derive Key Pair
21,320,234 UART: [art] Store priv key in slot 0x5
23,747,031 UART: [art] Derive Key Pair - Done
23,759,925 UART: [art] Signing Cert with AUTHO
23,761,221 UART: RITY.KEYID = 7
25,466,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,468,430 UART: [art] PUB.X = DB13A1522AC88CC8281BEF608751C93642A69A4D6A1618177B3DC2CA7C1F67C72C13173AB12599B1B39DF984E2D32086
25,475,703 UART: [art] PUB.Y = 54313D3CA15CAD143A04456CC89BDB66C36D1484471A030891A66B3556B2B9E0DAA82D9C51F329125B2A86746ADC8639
25,482,992 UART: [art] SIG.R = C588D0DCC20FD0006E2A972FB3A78D970EF50E6316FD00F73F48F5AF7396DA94FCC575E25683E96C631D42DBA207629D
25,490,324 UART: [art] SIG.S = 96FA66959DC9010D40A3A7F3B28FFD29EAD558C3BC7FDBABF1560DAF16D6D27B705139B0E6BCAC090C743FCE6FA5DC82
26,469,636 UART: Caliptra RT
26,470,351 UART: [state] CFI Enabled
26,588,007 UART: [rt] RT listening for mailbox commands...
26,590,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,745,688 UART: [rt]cmd =0x41544d4e, len=14344
26,747,545 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,093 UART:
192,466 UART: Running Caliptra ROM ...
193,577 UART:
193,720 UART: [state] CFI Enabled
260,633 UART: [state] LifecycleState = Unprovisioned
262,695 UART: [state] DebugLocked = No
264,287 UART: [state] WD Timer not started. Device not locked for debugging
269,326 UART: [kat] SHA2-256
459,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,934 UART: [kat] ++
470,384 UART: [kat] sha1
482,038 UART: [kat] SHA2-256
485,118 UART: [kat] SHA2-384
490,683 UART: [kat] SHA2-512-ACC
493,270 UART: [kat] ECC-384
2,948,466 UART: [kat] HMAC-384Kdf
2,969,430 UART: [kat] LMS
3,501,203 UART: [kat] --
3,506,818 UART: [cold-reset] ++
3,508,325 UART: [fht] FHT @ 0x50003400
3,519,516 UART: [idev] ++
3,520,219 UART: [idev] CDI.KEYID = 6
3,521,168 UART: [idev] SUBJECT.KEYID = 7
3,522,355 UART: [idev] UDS.KEYID = 0
3,523,257 ready_for_fw is high
3,523,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,384 UART: [idev] Erasing UDS.KEYID = 0
6,028,829 UART: [idev] Sha1 KeyId Algorithm
6,051,149 UART: [idev] --
6,055,797 UART: [ldev] ++
6,056,529 UART: [ldev] CDI.KEYID = 6
6,057,458 UART: [ldev] SUBJECT.KEYID = 5
6,058,618 UART: [ldev] AUTHORITY.KEYID = 7
6,059,794 UART: [ldev] FE.KEYID = 1
6,097,791 UART: [ldev] Erasing FE.KEYID = 1
8,602,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,967 UART: [ldev] --
10,412,506 UART: [fwproc] Wait for Commands...
10,414,599 UART: [fwproc] Recv command 0x46574c44
10,416,901 UART: [fwproc] Recv'd Img size: 114448 bytes
15,046,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,123,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,240,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,782,522 >>> mbox cmd response: success
15,786,464 UART: [afmc] ++
15,787,162 UART: [afmc] CDI.KEYID = 6
15,788,407 UART: [afmc] SUBJECT.KEYID = 7
15,789,841 UART: [afmc] AUTHORITY.KEYID = 5
18,322,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,065,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,067,174 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,082,257 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,097,417 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,112,244 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,135,042 UART: [afmc] --
20,139,014 UART: [cold-reset] --
20,143,435 UART: [state] Locking Datavault
20,149,263 UART: [state] Locking PCR0, PCR1 and PCR31
20,151,458 UART: [state] Locking ICCM
20,152,962 UART: [exit] Launching FMC @ 0x40000130
20,161,632 UART:
20,161,868 UART: Running Caliptra FMC ...
20,162,963 UART:
20,163,122 UART: [state] CFI Enabled
20,223,650 UART: [fht] FMC Alias Private Key: 7
21,987,373 UART: [art] Extend RT PCRs Done
21,988,605 UART: [art] Lock RT PCRs Done
21,990,250 UART: [art] Populate DV Done
21,995,609 UART: [fht] FMC Alias Private Key: 7
21,997,144 UART: [art] Derive CDI
21,997,954 UART: [art] Store in in slot 0x4
22,056,346 UART: [art] Derive Key Pair
22,057,345 UART: [art] Store priv key in slot 0x5
24,520,859 UART: [art] Derive Key Pair - Done
24,533,526 UART: [art] Signing Cert with AUTHO
24,534,822 UART: RITY.KEYID = 7
26,246,606 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,115 UART: [art] PUB.X = E8933C8230C838B35F748B764028CD33687E5CBF9EC6A5C52D6F46F2A362B576FFDC139036732BEA0C8F7F3CDD05C91B
26,255,410 UART: [art] PUB.Y = F5A7D68D9C10ADD27DBDC009BD4194F317065B4635E3D4C20AE5790D9589D8FE4751108AE85C44E508FE108BB40B3E1F
26,262,697 UART: [art] SIG.R = 79AD9CDF22246EF4098FEDB6B4505CD07F9C4042A4C5DDE1961D07490B9F7F1150D27E2CB446CEFEAE03B5658049443C
26,270,081 UART: [art] SIG.S = 9E9576D44E91D089A827C4C997E4740182063BDAAA575EE5431088B6E4AE4AC384A05F4AD68B3396A40521E73C874768
27,248,919 UART: Caliptra RT
27,249,630 UART: [state] CFI Enabled
27,414,669 UART: [rt] RT listening for mailbox commands...
27,416,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,794 UART: [rt]cmd =0x41544d4e, len=14344
27,574,559 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,438,835 ready_for_fw is high
3,439,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,854,456 >>> mbox cmd response: success
20,158,011 UART:
20,158,391 UART: Running Caliptra FMC ...
20,159,512 UART:
20,159,668 UART: [state] CFI Enabled
20,225,660 UART: [fht] FMC Alias Private Key: 7
21,989,543 UART: [art] Extend RT PCRs Done
21,990,763 UART: [art] Lock RT PCRs Done
21,992,359 UART: [art] Populate DV Done
21,997,548 UART: [fht] FMC Alias Private Key: 7
21,999,192 UART: [art] Derive CDI
21,999,949 UART: [art] Store in in slot 0x4
22,058,954 UART: [art] Derive Key Pair
22,059,997 UART: [art] Store priv key in slot 0x5
24,523,344 UART: [art] Derive Key Pair - Done
24,536,225 UART: [art] Signing Cert with AUTHO
24,537,531 UART: RITY.KEYID = 7
26,248,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,383 UART: [art] PUB.X = 072A86B2BF495428A02A3A01CC204094E053DF754762136C269AA74CCDB46788873294717A7FD8EBDAAE5E2BAD96C457
26,257,677 UART: [art] PUB.Y = 19FD442D16C00130CC1AE66005590F231930EE57D896C7002C34C23A13298FAA4010C9C02A5FA1472D56321E9168114F
26,264,879 UART: [art] SIG.R = 945C78E2D4538D6962140FD244DF18B0334320050C6F0B1392DAC958544E9CE500971AA262DB2C6E4F7848AEF5F262F4
26,272,430 UART: [art] SIG.S = 1207E574B77DDD30510973072D57502868D64BA83AF156CDF39B765F798105A29BE887831D3102242E4E81ED2D3520C2
27,251,002 UART: Caliptra RT
27,251,696 UART: [state] CFI Enabled
27,415,451 UART: [rt] RT listening for mailbox commands...
27,417,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,573,766 UART: [rt]cmd =0x41544d4e, len=14344
27,575,821 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,231 UART:
192,593 UART: Running Caliptra ROM ...
193,783 UART:
603,190 UART: [state] CFI Enabled
615,521 UART: [state] LifecycleState = Unprovisioned
617,898 UART: [state] DebugLocked = No
620,560 UART: [state] WD Timer not started. Device not locked for debugging
625,732 UART: [kat] SHA2-256
815,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,435 UART: [kat] ++
827,028 UART: [kat] sha1
839,399 UART: [kat] SHA2-256
842,393 UART: [kat] SHA2-384
849,030 UART: [kat] SHA2-512-ACC
851,648 UART: [kat] ECC-384
3,290,174 UART: [kat] HMAC-384Kdf
3,302,685 UART: [kat] LMS
3,834,505 UART: [kat] --
3,837,740 UART: [cold-reset] ++
3,839,948 UART: [fht] FHT @ 0x50003400
3,850,698 UART: [idev] ++
3,851,393 UART: [idev] CDI.KEYID = 6
3,852,334 UART: [idev] SUBJECT.KEYID = 7
3,853,582 UART: [idev] UDS.KEYID = 0
3,854,478 ready_for_fw is high
3,854,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,396 UART: [idev] Erasing UDS.KEYID = 0
6,328,692 UART: [idev] Sha1 KeyId Algorithm
6,351,063 UART: [idev] --
6,357,157 UART: [ldev] ++
6,357,828 UART: [ldev] CDI.KEYID = 6
6,358,702 UART: [ldev] SUBJECT.KEYID = 5
6,359,853 UART: [ldev] AUTHORITY.KEYID = 7
6,361,132 UART: [ldev] FE.KEYID = 1
6,373,055 UART: [ldev] Erasing FE.KEYID = 1
8,852,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,004 UART: [ldev] --
10,645,544 UART: [fwproc] Wait for Commands...
10,647,734 UART: [fwproc] Recv command 0x46574c44
10,650,033 UART: [fwproc] Recv'd Img size: 114448 bytes
15,292,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,374,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,490,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,033,982 >>> mbox cmd response: success
16,038,096 UART: [afmc] ++
16,038,808 UART: [afmc] CDI.KEYID = 6
16,040,059 UART: [afmc] SUBJECT.KEYID = 7
16,041,498 UART: [afmc] AUTHORITY.KEYID = 5
18,544,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,266,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,268,662 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,283,761 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,298,943 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,313,770 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,338,356 UART: [afmc] --
20,341,135 UART: [cold-reset] --
20,344,505 UART: [state] Locking Datavault
20,349,433 UART: [state] Locking PCR0, PCR1 and PCR31
20,351,584 UART: [state] Locking ICCM
20,353,189 UART: [exit] Launching FMC @ 0x40000130
20,361,862 UART:
20,362,095 UART: Running Caliptra FMC ...
20,363,187 UART:
20,363,339 UART: [state] CFI Enabled
20,371,687 UART: [fht] FMC Alias Private Key: 7
22,128,077 UART: [art] Extend RT PCRs Done
22,129,300 UART: [art] Lock RT PCRs Done
22,130,959 UART: [art] Populate DV Done
22,136,525 UART: [fht] FMC Alias Private Key: 7
22,138,163 UART: [art] Derive CDI
22,138,893 UART: [art] Store in in slot 0x4
22,181,795 UART: [art] Derive Key Pair
22,182,785 UART: [art] Store priv key in slot 0x5
24,609,510 UART: [art] Derive Key Pair - Done
24,622,722 UART: [art] Signing Cert with AUTHO
24,624,016 UART: RITY.KEYID = 7
26,329,477 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,962 UART: [art] PUB.X = 9438AEE7166363A9D88615DF390B93F8EBDD9EF4BAF37783ED7EA9FAA6C7E20345B5DE61DE43A67F21E644953682C04B
26,338,291 UART: [art] PUB.Y = D005A923F60A252636D11B4791E16451CE8D20E285075DA51E384BDAF1C5C372DF5F86103D27941DE12E6113A44185D4
26,345,500 UART: [art] SIG.R = 15E2AF8BE993B34C6EA4A784194BEBB3CDB1B8168733CB418AFC58630852691D264CE13FE97DFAF2BE8DC8D16533ED61
26,352,924 UART: [art] SIG.S = 6AB21305A38D4486D02EE672BEF969CBDB7B2CBCC011B78E61D3797F73C4AEB5EF2E543B4F4034BAF5C02C73EC6DC28F
27,332,124 UART: Caliptra RT
27,332,828 UART: [state] CFI Enabled
27,449,470 UART: [rt] RT listening for mailbox commands...
27,451,752 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,606,891 UART: [rt]cmd =0x41544d4e, len=14344
27,608,632 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,758,382 ready_for_fw is high
3,758,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,067,922 >>> mbox cmd response: success
20,322,408 UART:
20,322,794 UART: Running Caliptra FMC ...
20,323,931 UART:
20,324,083 UART: [state] CFI Enabled
20,331,897 UART: [fht] FMC Alias Private Key: 7
22,088,614 UART: [art] Extend RT PCRs Done
22,089,840 UART: [art] Lock RT PCRs Done
22,091,362 UART: [art] Populate DV Done
22,096,715 UART: [fht] FMC Alias Private Key: 7
22,098,420 UART: [art] Derive CDI
22,099,232 UART: [art] Store in in slot 0x4
22,142,090 UART: [art] Derive Key Pair
22,143,092 UART: [art] Store priv key in slot 0x5
24,569,774 UART: [art] Derive Key Pair - Done
24,582,659 UART: [art] Signing Cert with AUTHO
24,583,968 UART: RITY.KEYID = 7
26,289,309 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,824 UART: [art] PUB.X = 2A9C1215934A4A9F8000032CCC4CF8A481D54E277822B87750EA0CA72297F98FB9E49813417A78F386D26ACD5411D563
26,298,069 UART: [art] PUB.Y = DBB8F0E17D62E053D782E90CC8852220C1E7069CA8D5966D612731B47E101304BF065174FB3C2C5BA6D38E758E1B95B1
26,305,323 UART: [art] SIG.R = 43C1318AB121A7F3B5A8C4E4B8F418B6273D424035AB498D553F98CCB5CF93A990584386E8B62A46FA107B6AEE6104BA
26,312,702 UART: [art] SIG.S = EFDF1AA99ECD0491442EEFC28777E1F8E21096C9F6624F4D133374332502F11ECA885C2A38672202642705D69854B2DD
27,291,758 UART: Caliptra RT
27,292,476 UART: [state] CFI Enabled
27,409,385 UART: [rt] RT listening for mailbox commands...
27,411,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,022 UART: [rt]cmd =0x41544d4e, len=14344
27,568,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,325 UART: [kat] SHA2-256
882,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,371 UART: [kat] ++
886,523 UART: [kat] sha1
890,875 UART: [kat] SHA2-256
892,813 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,710 UART: [kat] LMS
1,475,906 UART: [kat] --
1,476,851 UART: [cold-reset] ++
1,477,267 UART: [fht] Storing FHT @ 0x50003400
1,480,112 UART: [idev] ++
1,480,280 UART: [idev] CDI.KEYID = 6
1,480,640 UART: [idev] SUBJECT.KEYID = 7
1,481,064 UART: [idev] UDS.KEYID = 0
1,481,409 ready_for_fw is high
1,481,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,174 UART: [idev] Erasing UDS.KEYID = 0
1,505,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,514,989 UART: [ldev] ++
1,515,157 UART: [ldev] CDI.KEYID = 6
1,515,520 UART: [ldev] SUBJECT.KEYID = 5
1,515,946 UART: [ldev] AUTHORITY.KEYID = 7
1,516,409 UART: [ldev] FE.KEYID = 1
1,521,601 UART: [ldev] Erasing FE.KEYID = 1
1,547,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,696 UART: [ldev] --
1,587,171 UART: [fwproc] Waiting for Commands...
1,587,992 UART: [fwproc] Received command 0x46574c44
1,588,783 UART: [fwproc] Received Image of size 114448 bytes
5,199,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,227,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,256,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,392,730 >>> mbox cmd response: success
5,393,888 UART: [afmc] ++
5,394,056 UART: [afmc] CDI.KEYID = 6
5,394,418 UART: [afmc] SUBJECT.KEYID = 7
5,394,843 UART: [afmc] AUTHORITY.KEYID = 5
5,429,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,445,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,446,659 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,452,368 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,458,260 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,463,961 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,471,775 UART: [afmc] --
5,472,861 UART: [cold-reset] --
5,473,801 UART: [state] Locking Datavault
5,475,076 UART: [state] Locking PCR0, PCR1 and PCR31
5,475,680 UART: [state] Locking ICCM
5,476,196 UART: [exit] Launching FMC @ 0x40000130
5,481,525 UART:
5,481,541 UART: Running Caliptra FMC ...
5,481,949 UART:
5,482,003 UART: [state] CFI Enabled
5,492,381 UART: [fht] FMC Alias Private Key: 7
5,599,741 UART: [art] Extend RT PCRs Done
5,600,169 UART: [art] Lock RT PCRs Done
5,601,707 UART: [art] Populate DV Done
5,609,991 UART: [fht] FMC Alias Private Key: 7
5,610,971 UART: [art] Derive CDI
5,611,251 UART: [art] Store in in slot 0x4
5,697,036 UART: [art] Derive Key Pair
5,697,396 UART: [art] Store priv key in slot 0x5
5,710,642 UART: [art] Derive Key Pair - Done
5,725,244 UART: [art] Signing Cert with AUTHO
5,725,724 UART: RITY.KEYID = 7
5,741,022 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,787 UART: [art] PUB.X = AA585317A92CA84A298938B3E8926500FF878B049E53AC30250917C2B599A7E8058D623B3EE5A6F0DD4AEC2844A60C15
5,748,523 UART: [art] PUB.Y = EB5AD9818BA6EE3F395BA0E880CAA526777C2715681C181E09CB2DC59BAD26BC23A6B657DB0588CED3FD1E650FF8C725
5,755,482 UART: [art] SIG.R = 068B79E2378CD99495DC3349A0D1421B59B1D0818D26B394E32F7F5F3DA9FD64EE3A65B8C12887AB5DAA82750DC30790
5,762,247 UART: [art] SIG.S = A317CA3ADAF6F91603335414D37CD6206972DCA0A6BB356CB3A4C2EEFC05EA1FE47F20C380FB673703A9D145711D45D4
5,786,039 UART: Caliptra RT
5,786,292 UART: [state] CFI Enabled
5,894,371 UART: [rt] RT listening for mailbox commands...
5,895,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,018,157 UART: [rt]cmd =0x41544d4e, len=14344
6,019,807 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 ready_for_fw is high
1,362,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,899,967 >>> mbox cmd response: success
4,961,300 UART:
4,961,316 UART: Running Caliptra FMC ...
4,961,724 UART:
4,961,778 UART: [state] CFI Enabled
4,972,148 UART: [fht] FMC Alias Private Key: 7
5,079,202 UART: [art] Extend RT PCRs Done
5,079,630 UART: [art] Lock RT PCRs Done
5,080,970 UART: [art] Populate DV Done
5,089,212 UART: [fht] FMC Alias Private Key: 7
5,090,374 UART: [art] Derive CDI
5,090,654 UART: [art] Store in in slot 0x4
5,175,939 UART: [art] Derive Key Pair
5,176,299 UART: [art] Store priv key in slot 0x5
5,189,589 UART: [art] Derive Key Pair - Done
5,204,173 UART: [art] Signing Cert with AUTHO
5,204,653 UART: RITY.KEYID = 7
5,219,989 UART: [art] Erasing AUTHORITY.KEYID = 7
5,220,754 UART: [art] PUB.X = F58CD91008D000CBD9F50DE6B44B6CB0B13502A336062233000CE2E48538EEB81BE424DD99F7A717CA48715AD4329687
5,227,467 UART: [art] PUB.Y = E22F50DEF275452400216C3F92A2AB80F76D2A22934DA5E20C55E0FE6A9AEFB267A19CBA397B259B7B7B7CE3CB013C99
5,234,403 UART: [art] SIG.R = 7FBFD2EDD5EAAB5F28A9BB70428F2A4A140E3C4E495529A0F6FE95BD91F7C723F245D6B4B669A99C7FF34069B128A93A
5,241,188 UART: [art] SIG.S = 16AF2E96AD3C8EFAC21FF583FD32C67D47B4EC530C3C79510C94ADBBBF03F24A7B059D42C5063702B47056080E856D71
5,264,413 UART: Caliptra RT
5,264,666 UART: [state] CFI Enabled
5,372,176 UART: [rt] RT listening for mailbox commands...
5,372,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,496,158 UART: [rt]cmd =0x41544d4e, len=14344
5,497,702 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,550 UART: [kat] SHA2-256
882,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,596 UART: [kat] ++
886,748 UART: [kat] sha1
891,096 UART: [kat] SHA2-256
893,034 UART: [kat] SHA2-384
895,993 UART: [kat] SHA2-512-ACC
897,894 UART: [kat] ECC-384
903,643 UART: [kat] HMAC-384Kdf
908,325 UART: [kat] LMS
1,476,521 UART: [kat] --
1,477,484 UART: [cold-reset] ++
1,478,050 UART: [fht] Storing FHT @ 0x50003400
1,480,989 UART: [idev] ++
1,481,157 UART: [idev] CDI.KEYID = 6
1,481,517 UART: [idev] SUBJECT.KEYID = 7
1,481,941 UART: [idev] UDS.KEYID = 0
1,482,286 ready_for_fw is high
1,482,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,871 UART: [idev] Erasing UDS.KEYID = 0
1,506,491 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,947 UART: [idev] --
1,515,814 UART: [ldev] ++
1,515,982 UART: [ldev] CDI.KEYID = 6
1,516,345 UART: [ldev] SUBJECT.KEYID = 5
1,516,771 UART: [ldev] AUTHORITY.KEYID = 7
1,517,234 UART: [ldev] FE.KEYID = 1
1,522,494 UART: [ldev] Erasing FE.KEYID = 1
1,548,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,083 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,161 UART: [fwproc] Received command 0x46574c44
1,588,952 UART: [fwproc] Received Image of size 114448 bytes
5,010,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,038,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,067,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,203,840 >>> mbox cmd response: success
5,204,946 UART: [afmc] ++
5,205,114 UART: [afmc] CDI.KEYID = 6
5,205,476 UART: [afmc] SUBJECT.KEYID = 7
5,205,901 UART: [afmc] AUTHORITY.KEYID = 5
5,241,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,257,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,258,491 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,264,200 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,270,092 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,275,793 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,283,615 UART: [afmc] --
5,284,669 UART: [cold-reset] --
5,285,461 UART: [state] Locking Datavault
5,286,396 UART: [state] Locking PCR0, PCR1 and PCR31
5,287,000 UART: [state] Locking ICCM
5,287,642 UART: [exit] Launching FMC @ 0x40000130
5,292,971 UART:
5,292,987 UART: Running Caliptra FMC ...
5,293,395 UART:
5,293,538 UART: [state] CFI Enabled
5,304,572 UART: [fht] FMC Alias Private Key: 7
5,412,370 UART: [art] Extend RT PCRs Done
5,412,798 UART: [art] Lock RT PCRs Done
5,414,058 UART: [art] Populate DV Done
5,422,492 UART: [fht] FMC Alias Private Key: 7
5,423,540 UART: [art] Derive CDI
5,423,820 UART: [art] Store in in slot 0x4
5,509,211 UART: [art] Derive Key Pair
5,509,571 UART: [art] Store priv key in slot 0x5
5,522,073 UART: [art] Derive Key Pair - Done
5,536,550 UART: [art] Signing Cert with AUTHO
5,537,030 UART: RITY.KEYID = 7
5,552,444 UART: [art] Erasing AUTHORITY.KEYID = 7
5,553,209 UART: [art] PUB.X = EF31280F3CD28EAF6392AF50679D12175487005E417E97B02062DDCBE299B65E9655D4C5C5158026585319A451004E1E
5,559,924 UART: [art] PUB.Y = EEC2E35BA010A82BF9D5581C7689C2776B2718223343FEE06ADD746F5D4229246DE653827229B4A034DC4492558459E6
5,566,868 UART: [art] SIG.R = 513435476D46D2A8ADDA8A90DF932D3DBA7E4C4DEB75C8F7E862EEDDC988950D4D656E9A56BBDD8F829E42707CCDA0E3
5,573,657 UART: [art] SIG.S = 481DF2FACFEEEA859A1EC40355B3A97EE936E78E4310D15CA6FDA991CF148721BBC2D42F0058554BE6F4F9694B9A7071
5,597,371 UART: Caliptra RT
5,597,716 UART: [state] CFI Enabled
5,706,076 UART: [rt] RT listening for mailbox commands...
5,706,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,829,806 UART: [rt]cmd =0x41544d4e, len=14344
5,831,200 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 ready_for_fw is high
1,363,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,091,119 >>> mbox cmd response: success
5,152,886 UART:
5,152,902 UART: Running Caliptra FMC ...
5,153,310 UART:
5,153,453 UART: [state] CFI Enabled
5,164,175 UART: [fht] FMC Alias Private Key: 7
5,271,233 UART: [art] Extend RT PCRs Done
5,271,661 UART: [art] Lock RT PCRs Done
5,273,269 UART: [art] Populate DV Done
5,281,421 UART: [fht] FMC Alias Private Key: 7
5,282,585 UART: [art] Derive CDI
5,282,865 UART: [art] Store in in slot 0x4
5,368,708 UART: [art] Derive Key Pair
5,369,068 UART: [art] Store priv key in slot 0x5
5,382,326 UART: [art] Derive Key Pair - Done
5,397,268 UART: [art] Signing Cert with AUTHO
5,397,748 UART: RITY.KEYID = 7
5,413,194 UART: [art] Erasing AUTHORITY.KEYID = 7
5,413,959 UART: [art] PUB.X = E51218E240E4DFD4909686F1D8B96F45C9D15C0C4BACE9F2F88CF0A4257EC69F6C3577FAD6AE5CB2912A275B4A31777E
5,420,740 UART: [art] PUB.Y = 1A23E699650E44F1214A11AFC0D16FA112BB2EF5FD304D358A4AF27516D8F2B80D516316C020377D19A14E95BBF40A30
5,427,685 UART: [art] SIG.R = 3623B6BD6BD2059CA7E40BE9B766744DEAC3A562D0B02E7813412CFEC25D4BCA02878E00DDD9F53BA4CEAC25BA8D8064
5,434,444 UART: [art] SIG.S = 43CF5F4E013840F938BDAB4C1AA784E871185B357E295FE7F1AC12332C2A6886C12B0929E684CBF198B22A11AF3AA423
5,458,359 UART: Caliptra RT
5,458,704 UART: [state] CFI Enabled
5,565,972 UART: [rt] RT listening for mailbox commands...
5,566,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,689,766 UART: [rt]cmd =0x41544d4e, len=14344
5,691,460 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,390 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,607 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 ready_for_fw is high
1,176,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,578 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,110 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,192 >>> mbox cmd response: success
3,322,446 UART: [afmc] ++
3,322,614 UART: [afmc] CDI.KEYID = 6
3,322,976 UART: [afmc] SUBJECT.KEYID = 7
3,323,401 UART: [afmc] AUTHORITY.KEYID = 5
3,359,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,032 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,741 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,633 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,344 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,127 UART: [afmc] --
3,403,159 UART: [cold-reset] --
3,404,101 UART: [state] Locking Datavault
3,404,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,586 UART: [state] Locking ICCM
3,406,196 UART: [exit] Launching FMC @ 0x40000130
3,411,525 UART:
3,411,541 UART: Running Caliptra FMC ...
3,411,949 UART:
3,412,003 UART: [state] CFI Enabled
3,422,495 UART: [fht] FMC Alias Private Key: 7
3,530,791 UART: [art] Extend RT PCRs Done
3,531,219 UART: [art] Lock RT PCRs Done
3,532,385 UART: [art] Populate DV Done
3,540,459 UART: [fht] FMC Alias Private Key: 7
3,541,451 UART: [art] Derive CDI
3,541,731 UART: [art] Store in in slot 0x4
3,627,480 UART: [art] Derive Key Pair
3,627,840 UART: [art] Store priv key in slot 0x5
3,641,258 UART: [art] Derive Key Pair - Done
3,656,037 UART: [art] Signing Cert with AUTHO
3,656,517 UART: RITY.KEYID = 7
3,671,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,616 UART: [art] PUB.X = E189CE88FC5586FD3C70BB48821857D350466A67CA67A75BBEBC7724A9FB5597928EBD1231764C43943E1E3D785297B7
3,679,386 UART: [art] PUB.Y = 1FA4D58B8DEEEEA489B5225C3A8AA316B4C9A9309BCB363F290262A5ADD820AB8718DD732A6AC44200477BFF89B95681
3,686,323 UART: [art] SIG.R = 7DDD8A691466E2DF3991B533747756C3BA87C315980A949D6E41074A3B4D5DCDAB504B407860BFA14A0245F0AE015060
3,693,081 UART: [art] SIG.S = E4C4975B9B2A2135C905CA82551AB2356C2BE66E229ED1FA9676C683F286F37EFACA4DC7A0FD4DF7BF06DAD8C38B75AC
3,716,928 UART: Caliptra RT
3,717,181 UART: [state] CFI Enabled
3,825,035 UART: [rt] RT listening for mailbox commands...
3,825,705 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,543 UART: [rt]cmd =0x41544d4e, len=14344
3,949,735 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 ready_for_fw is high
1,060,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,177,145 >>> mbox cmd response: success
3,239,726 UART:
3,239,742 UART: Running Caliptra FMC ...
3,240,150 UART:
3,240,204 UART: [state] CFI Enabled
3,250,452 UART: [fht] FMC Alias Private Key: 7
3,357,664 UART: [art] Extend RT PCRs Done
3,358,092 UART: [art] Lock RT PCRs Done
3,359,568 UART: [art] Populate DV Done
3,367,714 UART: [fht] FMC Alias Private Key: 7
3,368,768 UART: [art] Derive CDI
3,369,048 UART: [art] Store in in slot 0x4
3,454,411 UART: [art] Derive Key Pair
3,454,771 UART: [art] Store priv key in slot 0x5
3,468,083 UART: [art] Derive Key Pair - Done
3,482,945 UART: [art] Signing Cert with AUTHO
3,483,425 UART: RITY.KEYID = 7
3,498,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,272 UART: [art] PUB.X = FF9D390332AD5F8FEF35093899882C822474705E089DC9063EB3924B5E72AAEF582D93CA59F59566177F3B4517302C1E
3,506,026 UART: [art] PUB.Y = A252FBCD33F28BDE1A96E18DB527D55CC8A317DFE290C737EEE4EA8761A2547184340E9E502BC9BB55006B47F477D44B
3,512,963 UART: [art] SIG.R = 8195BC05304D35E3132511EBB9150356106B5CBBF6A54BA45F49EA979B1F9EFA9DECA11888639ED7412C804E24D4720F
3,519,728 UART: [art] SIG.S = 94565514C550E3F4865E75AAE9D60975FB8C577F283F3BAF6196273414F63322B6A6E60DE1557CE6DE781E999ECCF0BE
3,543,345 UART: Caliptra RT
3,543,598 UART: [state] CFI Enabled
3,651,609 UART: [rt] RT listening for mailbox commands...
3,652,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,355 UART: [rt]cmd =0x41544d4e, len=14344
3,776,621 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,242 UART: [kat] SHA2-256
904,182 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
919,017 UART: [kat] HMAC-384Kdf
923,769 UART: [kat] LMS
1,172,097 UART: [kat] --
1,173,070 UART: [cold-reset] ++
1,173,454 UART: [fht] FHT @ 0x50003400
1,176,175 UART: [idev] ++
1,176,343 UART: [idev] CDI.KEYID = 6
1,176,703 UART: [idev] SUBJECT.KEYID = 7
1,177,127 UART: [idev] UDS.KEYID = 0
1,177,472 ready_for_fw is high
1,177,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,091 UART: [idev] Erasing UDS.KEYID = 0
1,202,354 UART: [idev] Sha1 KeyId Algorithm
1,210,820 UART: [idev] --
1,212,042 UART: [ldev] ++
1,212,210 UART: [ldev] CDI.KEYID = 6
1,212,573 UART: [ldev] SUBJECT.KEYID = 5
1,212,999 UART: [ldev] AUTHORITY.KEYID = 7
1,213,462 UART: [ldev] FE.KEYID = 1
1,218,688 UART: [ldev] Erasing FE.KEYID = 1
1,244,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,938 UART: [ldev] --
1,284,319 UART: [fwproc] Wait for Commands...
1,285,033 UART: [fwproc] Recv command 0x46574c44
1,285,761 UART: [fwproc] Recv'd Img size: 114448 bytes
3,136,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,164,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,329,384 >>> mbox cmd response: success
3,330,566 UART: [afmc] ++
3,330,734 UART: [afmc] CDI.KEYID = 6
3,331,096 UART: [afmc] SUBJECT.KEYID = 7
3,331,521 UART: [afmc] AUTHORITY.KEYID = 5
3,367,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,282 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,389,991 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,395,883 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,401,594 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,409,231 UART: [afmc] --
3,410,179 UART: [cold-reset] --
3,411,165 UART: [state] Locking Datavault
3,412,348 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,952 UART: [state] Locking ICCM
3,413,478 UART: [exit] Launching FMC @ 0x40000130
3,418,807 UART:
3,418,823 UART: Running Caliptra FMC ...
3,419,231 UART:
3,419,374 UART: [state] CFI Enabled
3,429,876 UART: [fht] FMC Alias Private Key: 7
3,538,046 UART: [art] Extend RT PCRs Done
3,538,474 UART: [art] Lock RT PCRs Done
3,540,280 UART: [art] Populate DV Done
3,548,306 UART: [fht] FMC Alias Private Key: 7
3,549,244 UART: [art] Derive CDI
3,549,524 UART: [art] Store in in slot 0x4
3,635,193 UART: [art] Derive Key Pair
3,635,553 UART: [art] Store priv key in slot 0x5
3,648,923 UART: [art] Derive Key Pair - Done
3,663,536 UART: [art] Signing Cert with AUTHO
3,664,016 UART: RITY.KEYID = 7
3,679,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,893 UART: [art] PUB.X = 8764817842582428E1D7A82C62E70537F428455148C6D8C97F04C434E33909DB8D0476155EDF6FD6CA4E6EEFF8798190
3,686,643 UART: [art] PUB.Y = 7DF5E3989D7B6FC66B18F53A57CD1845AB0C404BB1D0038AE1B74BE8353AD50C91A3397162FF9FB5C4A8A2250E24F6F2
3,693,593 UART: [art] SIG.R = C32993FC947842F343E3C7ACB57D3F4D9EAD31AE10359CA11916A6EB121281D6D9EA3F1790C93DC8B9902D344550BE23
3,700,369 UART: [art] SIG.S = B16057A1A0EC5E8322FDCDE8B38DC0FA6E71E10864B8367B9DEEFE18B78CDCCBA08646A5EF76614F6B17139669DAD756
3,724,281 UART: Caliptra RT
3,724,626 UART: [state] CFI Enabled
3,832,375 UART: [rt] RT listening for mailbox commands...
3,833,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,965 UART: [rt]cmd =0x41544d4e, len=14344
3,957,489 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 ready_for_fw is high
1,060,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,179,268 >>> mbox cmd response: success
3,241,659 UART:
3,241,675 UART: Running Caliptra FMC ...
3,242,083 UART:
3,242,226 UART: [state] CFI Enabled
3,252,718 UART: [fht] FMC Alias Private Key: 7
3,360,554 UART: [art] Extend RT PCRs Done
3,360,982 UART: [art] Lock RT PCRs Done
3,362,286 UART: [art] Populate DV Done
3,370,584 UART: [fht] FMC Alias Private Key: 7
3,371,694 UART: [art] Derive CDI
3,371,974 UART: [art] Store in in slot 0x4
3,457,375 UART: [art] Derive Key Pair
3,457,735 UART: [art] Store priv key in slot 0x5
3,471,199 UART: [art] Derive Key Pair - Done
3,485,944 UART: [art] Signing Cert with AUTHO
3,486,424 UART: RITY.KEYID = 7
3,501,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,511 UART: [art] PUB.X = EF50FD712EF2A36E6BDCEF5F0CCAC589C8488F6B392BF5FFEAF7660A93AA0C5AB617493D861DBDB1F39B4E7EF085C4F1
3,509,302 UART: [art] PUB.Y = C4D449200F404233257E884594B5283900F9748E356FA1A6C4B3407E9130380D8B92DC4E6AE10DD611120B20ECA3AC70
3,516,212 UART: [art] SIG.R = B5FC2D1B287E5742B1591B4BD9CF7F758B2A09A784BAA009CBE9D574E8DA3A6F5D5B980314A00F00AFDF7979510BFA52
3,522,961 UART: [art] SIG.S = 828618C8DC9606B8F73FAFAA7A78E1D8B1FEAFFE3D9688BB2FEC6C639A6601A1D8BBEDF35A085B8E8AA7261DFD50FABE
3,546,553 UART: Caliptra RT
3,546,898 UART: [state] CFI Enabled
3,654,723 UART: [rt] RT listening for mailbox commands...
3,655,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,383 UART: [rt]cmd =0x41544d4e, len=14344
3,779,735 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,197 UART: [kat] SHA2-256
901,137 UART: [kat] SHA2-384
903,726 UART: [kat] SHA2-512-ACC
905,627 UART: [kat] ECC-384
915,274 UART: [kat] HMAC-384Kdf
919,836 UART: [kat] LMS
1,168,148 UART: [kat] --
1,168,899 UART: [cold-reset] ++
1,169,375 UART: [fht] FHT @ 0x50003400
1,172,197 UART: [idev] ++
1,172,365 UART: [idev] CDI.KEYID = 6
1,172,726 UART: [idev] SUBJECT.KEYID = 7
1,173,151 UART: [idev] UDS.KEYID = 0
1,173,497 ready_for_fw is high
1,173,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,197,851 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,634 UART: [ldev] ++
1,207,802 UART: [ldev] CDI.KEYID = 6
1,208,166 UART: [ldev] SUBJECT.KEYID = 5
1,208,593 UART: [ldev] AUTHORITY.KEYID = 7
1,209,056 UART: [ldev] FE.KEYID = 1
1,213,862 UART: [ldev] Erasing FE.KEYID = 1
1,240,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,254 UART: [ldev] --
1,279,534 UART: [fwproc] Wait for Commands...
1,280,311 UART: [fwproc] Recv command 0x46574c44
1,281,044 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,396 >>> mbox cmd response: success
3,319,463 UART: [afmc] ++
3,319,631 UART: [afmc] CDI.KEYID = 6
3,319,994 UART: [afmc] SUBJECT.KEYID = 7
3,320,420 UART: [afmc] AUTHORITY.KEYID = 5
3,356,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,673 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,383 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,273 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,984 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,888 UART: [afmc] --
3,399,960 UART: [cold-reset] --
3,401,026 UART: [state] Locking Datavault
3,402,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,897 UART: [state] Locking ICCM
3,403,473 UART: [exit] Launching FMC @ 0x40000130
3,408,802 UART:
3,408,818 UART: Running Caliptra FMC ...
3,409,226 UART:
3,409,280 UART: [state] CFI Enabled
3,419,880 UART: [fht] FMC Alias Private Key: 7
3,527,598 UART: [art] Extend RT PCRs Done
3,528,026 UART: [art] Lock RT PCRs Done
3,529,750 UART: [art] Populate DV Done
3,538,038 UART: [fht] FMC Alias Private Key: 7
3,539,060 UART: [art] Derive CDI
3,539,340 UART: [art] Store in in slot 0x4
3,624,833 UART: [art] Derive Key Pair
3,625,193 UART: [art] Store priv key in slot 0x5
3,638,113 UART: [art] Derive Key Pair - Done
3,652,938 UART: [art] Signing Cert with AUTHO
3,653,418 UART: RITY.KEYID = 7
3,668,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,269 UART: [art] PUB.X = B42A7F8703809D58A0373878A3DFA72D04DAB02770B5DDE4FBFEDDE165F04F536F84DBFAFCFC5EDE401821FF48353D90
3,676,053 UART: [art] PUB.Y = FBABB368A1332A2BAA679D34D754CD542A1952CF36407652DD86BF52CC4C1456CDDE88BD1FCCF461482F6F24CE32215F
3,683,019 UART: [art] SIG.R = 1D1A846B0FD94BEA5CC41753CC3EE5FFFB0328887955E473B06E731C108C8758AA59048970017E098E60DF7F5E087F1F
3,689,775 UART: [art] SIG.S = 90176DC16C78EED47DDB6A53DD0A39A17E52AFC867D21560BBA699BAAB1486C3491EFF8BC64EE176352DB4B5EDAFE324
3,713,971 UART: Caliptra RT
3,714,224 UART: [state] CFI Enabled
3,821,962 UART: [rt] RT listening for mailbox commands...
3,822,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,486 UART: [rt]cmd =0x41544d4e, len=14344
3,947,182 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,304 ready_for_fw is high
1,056,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,920 >>> mbox cmd response: success
3,233,053 UART:
3,233,069 UART: Running Caliptra FMC ...
3,233,477 UART:
3,233,531 UART: [state] CFI Enabled
3,243,573 UART: [fht] FMC Alias Private Key: 7
3,351,365 UART: [art] Extend RT PCRs Done
3,351,793 UART: [art] Lock RT PCRs Done
3,353,065 UART: [art] Populate DV Done
3,361,275 UART: [fht] FMC Alias Private Key: 7
3,362,233 UART: [art] Derive CDI
3,362,513 UART: [art] Store in in slot 0x4
3,448,280 UART: [art] Derive Key Pair
3,448,640 UART: [art] Store priv key in slot 0x5
3,461,606 UART: [art] Derive Key Pair - Done
3,476,307 UART: [art] Signing Cert with AUTHO
3,476,787 UART: RITY.KEYID = 7
3,492,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,822 UART: [art] PUB.X = CCC4C1A9084281CE21A7F6C19FC2D672935F78FBDB61741F48D017E3B61AEBC95F5C681EFC619BBDB8478B08E583CD0F
3,499,601 UART: [art] PUB.Y = BCFB00929847796D4EB1C7225E201D80044C5680147691EF4F9701FC4FAF73FCFAF393947B5DDEE6E8DCE2428BF8843A
3,506,533 UART: [art] SIG.R = FAC17791401E5890DCBAB5B1517E055C2E2D081728CBD4272EF65A50F7E9A497C686E931CFC01355CFE1291B819BAC1F
3,513,307 UART: [art] SIG.S = 318205E60410F3090E99A3F7DC5FFE67EFFF86B1A9195A531FFD65F8D508E0579DFC006E362CB181023C7AEE607E7D4A
3,537,460 UART: Caliptra RT
3,537,713 UART: [state] CFI Enabled
3,645,573 UART: [rt] RT listening for mailbox commands...
3,646,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,083 UART: [rt]cmd =0x41544d4e, len=14344
3,770,787 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,662 UART: [cold-reset] ++
1,171,152 UART: [fht] FHT @ 0x50003400
1,174,020 UART: [idev] ++
1,174,188 UART: [idev] CDI.KEYID = 6
1,174,549 UART: [idev] SUBJECT.KEYID = 7
1,174,974 UART: [idev] UDS.KEYID = 0
1,175,320 ready_for_fw is high
1,175,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,200,694 UART: [idev] Sha1 KeyId Algorithm
1,209,442 UART: [idev] --
1,210,355 UART: [ldev] ++
1,210,523 UART: [ldev] CDI.KEYID = 6
1,210,887 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,217,269 UART: [ldev] Erasing FE.KEYID = 1
1,244,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,109 UART: [fwproc] Wait for Commands...
1,283,804 UART: [fwproc] Recv command 0x46574c44
1,284,537 UART: [fwproc] Recv'd Img size: 114448 bytes
3,115,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,307,583 >>> mbox cmd response: success
3,308,704 UART: [afmc] ++
3,308,872 UART: [afmc] CDI.KEYID = 6
3,309,235 UART: [afmc] SUBJECT.KEYID = 7
3,309,661 UART: [afmc] AUTHORITY.KEYID = 5
3,345,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,040 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,750 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,640 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,351 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,247 UART: [afmc] --
3,389,331 UART: [cold-reset] --
3,390,295 UART: [state] Locking Datavault
3,391,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,268 UART: [state] Locking ICCM
3,392,900 UART: [exit] Launching FMC @ 0x40000130
3,398,229 UART:
3,398,245 UART: Running Caliptra FMC ...
3,398,653 UART:
3,398,796 UART: [state] CFI Enabled
3,409,256 UART: [fht] FMC Alias Private Key: 7
3,517,322 UART: [art] Extend RT PCRs Done
3,517,750 UART: [art] Lock RT PCRs Done
3,519,600 UART: [art] Populate DV Done
3,527,776 UART: [fht] FMC Alias Private Key: 7
3,528,814 UART: [art] Derive CDI
3,529,094 UART: [art] Store in in slot 0x4
3,614,739 UART: [art] Derive Key Pair
3,615,099 UART: [art] Store priv key in slot 0x5
3,628,523 UART: [art] Derive Key Pair - Done
3,643,834 UART: [art] Signing Cert with AUTHO
3,644,314 UART: RITY.KEYID = 7
3,659,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,409 UART: [art] PUB.X = 07C8F5B6A9EE8592C010464C048D25CC58B76D96A7951569D632C8FB4C3B7B2467A748F9E305751D92E3CCBF3332DBA9
3,667,174 UART: [art] PUB.Y = 9E259FE5C2B88EAEB7860A92A65779065DCCA7A0EAE57A81EA650C6FE72D2D1652BD80CFD3EE18CFF706999C9C356882
3,674,128 UART: [art] SIG.R = 494EA12C2F1E126E0705254E64C6A321E78768ACC3153E93F4E6D6602673A5EB05213B75FB83BE70079ACB37488256EE
3,680,884 UART: [art] SIG.S = 4AC982CC93CA8595705253D0F311E98BB67107B6C7B05E28F7567C27AA6C4EE13D637052A007473FB17612F26E63717A
3,704,517 UART: Caliptra RT
3,704,862 UART: [state] CFI Enabled
3,812,787 UART: [rt] RT listening for mailbox commands...
3,813,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,331 UART: [rt]cmd =0x41544d4e, len=14344
3,938,055 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,007 ready_for_fw is high
1,055,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,921 >>> mbox cmd response: success
3,233,036 UART:
3,233,052 UART: Running Caliptra FMC ...
3,233,460 UART:
3,233,603 UART: [state] CFI Enabled
3,244,353 UART: [fht] FMC Alias Private Key: 7
3,352,741 UART: [art] Extend RT PCRs Done
3,353,169 UART: [art] Lock RT PCRs Done
3,354,519 UART: [art] Populate DV Done
3,362,785 UART: [fht] FMC Alias Private Key: 7
3,363,743 UART: [art] Derive CDI
3,364,023 UART: [art] Store in in slot 0x4
3,449,704 UART: [art] Derive Key Pair
3,450,064 UART: [art] Store priv key in slot 0x5
3,463,622 UART: [art] Derive Key Pair - Done
3,478,243 UART: [art] Signing Cert with AUTHO
3,478,723 UART: RITY.KEYID = 7
3,493,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,448 UART: [art] PUB.X = DF6406B39ADCFBE2B862569B93FA0BFDB8CD6244ECC6EEFD06E4EB82B28B196BFDBED5791CB17902CBD4CC027772B7E4
3,501,233 UART: [art] PUB.Y = 82015AD9A7A9C6FF45DB43EDAFE6951D29CF7519307DA17BA0AE1FD165B9334DF2469DCDB68D87E0A54EC95E5F5A6D83
3,508,200 UART: [art] SIG.R = 153625DD2306A540C6654E3D3C87ACF558F092B24F0CA610E604EF54D8BE276D4E35DBDBCFDBD9602928BADD11B26529
3,514,973 UART: [art] SIG.S = 5A564D672529995D545D66D0F4160DB5C21D0E97149BC618D4A4BA0285C1F5C6D01A5BF6C558AFE3240EE6066E8415B4
3,538,539 UART: Caliptra RT
3,538,884 UART: [state] CFI Enabled
3,645,835 UART: [rt] RT listening for mailbox commands...
3,646,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,727 UART: [rt]cmd =0x41544d4e, len=14344
3,771,125 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,291 UART:
192,645 UART: Running Caliptra ROM ...
193,834 UART:
193,989 UART: [state] CFI Enabled
262,968 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
267,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,195 UART: [kat] SHA2-256
440,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,403 UART: [kat] ++
451,884 UART: [kat] sha1
463,525 UART: [kat] SHA2-256
466,234 UART: [kat] SHA2-384
472,657 UART: [kat] SHA2-512-ACC
475,023 UART: [kat] ECC-384
2,767,356 UART: [kat] HMAC-384Kdf
2,778,674 UART: [kat] LMS
3,968,981 UART: [kat] --
3,973,569 UART: [cold-reset] ++
3,974,551 UART: [fht] Storing FHT @ 0x50003400
3,987,100 UART: [idev] ++
3,987,672 UART: [idev] CDI.KEYID = 6
3,988,631 UART: [idev] SUBJECT.KEYID = 7
3,989,875 UART: [idev] UDS.KEYID = 0
3,990,862 ready_for_fw is high
3,991,053 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,552 UART: [idev] Erasing UDS.KEYID = 0
7,322,689 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,488 UART: [idev] --
7,348,074 UART: [ldev] ++
7,348,652 UART: [ldev] CDI.KEYID = 6
7,349,611 UART: [ldev] SUBJECT.KEYID = 5
7,350,823 UART: [ldev] AUTHORITY.KEYID = 7
7,352,053 UART: [ldev] FE.KEYID = 1
7,379,317 UART: [ldev] Erasing FE.KEYID = 1
10,714,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,183 UART: [ldev] --
13,094,235 UART: [fwproc] Waiting for Commands...
13,097,018 UART: [fwproc] Received command 0x46574c44
13,099,266 UART: [fwproc] Received Image of size 114124 bytes
21,499,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,579,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,648,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,964,596 >>> mbox cmd response: success
21,968,818 UART: [afmc] ++
21,969,406 UART: [afmc] CDI.KEYID = 6
21,970,354 UART: [afmc] SUBJECT.KEYID = 7
21,971,621 UART: [afmc] AUTHORITY.KEYID = 5
25,338,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,636,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,639,006 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,653,571 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,668,320 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,682,530 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,704,620 UART: [afmc] --
27,708,494 UART: [cold-reset] --
27,713,923 UART: [state] Locking Datavault
27,719,008 UART: [state] Locking PCR0, PCR1 and PCR31
27,720,768 UART: [state] Locking ICCM
27,723,101 UART: [exit] Launching FMC @ 0x40000130
27,731,510 UART:
27,731,746 UART: Running Caliptra FMC ...
27,732,848 UART:
27,733,008 UART: [state] CFI Enabled
27,794,950 UART: [fht] FMC Alias Private Key: 7
30,132,394 UART: [art] Extend RT PCRs Done
30,133,616 UART: [art] Lock RT PCRs Done
30,135,511 UART: [art] Populate DV Done
30,140,828 UART: [fht] FMC Alias Private Key: 7
30,142,423 UART: [art] Derive CDI
30,143,168 UART: [art] Store in in slot 0x4
30,203,823 UART: [art] Derive Key Pair
30,204,823 UART: [art] Store priv key in slot 0x5
33,497,316 UART: [art] Derive Key Pair - Done
33,510,318 UART: [art] Signing Cert with AUTHO
33,511,643 UART: RITY.KEYID = 7
35,800,117 UART: [art] Erasing AUTHORITY.KEYID = 7
35,801,638 UART: [art] PUB.X = B948B63E2309DBA49F1C7DC4219BFEB9F442438F7497A7300E4350CEC6B3FD56140C3C6B4BA27D4CF5D635253E677CE2
35,808,895 UART: [art] PUB.Y = 488C99681C9C4DC5F82618A969EEF40EE136D107CEA6C11DB321D6F3495DAACB745097953972435D7E890D03AFFD7EA5
35,816,120 UART: [art] SIG.R = 7F991714202EB07D3070A49DD34518BFB312B1D0E8E76A44B39809B60B3F12CE41E7A4F460B6600BFD492E3765FEAF15
35,823,537 UART: [art] SIG.S = 11E1D22928A454F1BB8623BB57EB104A1E39CE3BA9D8FD7841E1C257D7F9E2384C0B74A2DE27636B34A518209814DF28
37,128,687 UART: Caliptra RT
37,129,395 UART: [state] CFI Enabled
37,291,002 UART: [rt] RT listening for mailbox commands...
37,293,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,448,541 UART: [rt]cmd =0x41544d4e, len=14344
37,450,297 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,783,318 ready_for_fw is high
3,783,705 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,174,135 >>> mbox cmd response: success
27,874,900 UART:
27,875,294 UART: Running Caliptra FMC ...
27,876,441 UART:
27,876,600 UART: [state] CFI Enabled
27,927,016 UART: [fht] FMC Alias Private Key: 7
30,264,382 UART: [art] Extend RT PCRs Done
30,265,603 UART: [art] Lock RT PCRs Done
30,267,181 UART: [art] Populate DV Done
30,272,728 UART: [fht] FMC Alias Private Key: 7
30,274,432 UART: [art] Derive CDI
30,275,192 UART: [art] Store in in slot 0x4
30,335,794 UART: [art] Derive Key Pair
30,336,832 UART: [art] Store priv key in slot 0x5
33,629,457 UART: [art] Derive Key Pair - Done
33,642,722 UART: [art] Signing Cert with AUTHO
33,644,034 UART: RITY.KEYID = 7
35,932,087 UART: [art] Erasing AUTHORITY.KEYID = 7
35,933,595 UART: [art] PUB.X = 7494FEC1E1094FCF7997B7ABB069456D89FFF8D9A79BB4F33249A2D14104CA905C59378C3EEF80B0D705F750B4977CE1
35,940,854 UART: [art] PUB.Y = 97E74479F82390B54E1719C4820BBC52F32A8F9F8E6FDA577893EAAAD66C95CAC1ED95121C3DE3DBBD9CC31F04D69386
35,948,119 UART: [art] SIG.R = 17AD95F1C363AF77ADD432CC1AD8FAFE3F70D8BAD39DEB1CEA1F9677B73C4F676C17155B119CB3A581AAF8612461DB7F
35,955,516 UART: [art] SIG.S = E41F23A23875A843C1FABA44E7D00675F0DC6A93F466FC0FF07BBE281F7EA475FF815662F18D7A5F2CDB664CA6FC609F
37,261,056 UART: Caliptra RT
37,261,754 UART: [state] CFI Enabled
37,421,329 UART: [rt] RT listening for mailbox commands...
37,423,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,578,945 UART: [rt]cmd =0x41544d4e, len=14344
37,580,603 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,570 UART:
192,938 UART: Running Caliptra ROM ...
194,071 UART:
603,604 UART: [state] CFI Enabled
620,198 UART: [state] LifecycleState = Unprovisioned
622,077 UART: [state] DebugLocked = No
624,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,243 UART: [kat] SHA2-256
797,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,545 UART: [kat] ++
808,993 UART: [kat] sha1
821,072 UART: [kat] SHA2-256
823,801 UART: [kat] SHA2-384
829,363 UART: [kat] SHA2-512-ACC
831,728 UART: [kat] ECC-384
3,114,754 UART: [kat] HMAC-384Kdf
3,126,967 UART: [kat] LMS
4,317,102 UART: [kat] --
4,321,963 UART: [cold-reset] ++
4,322,899 UART: [fht] Storing FHT @ 0x50003400
4,334,158 UART: [idev] ++
4,334,715 UART: [idev] CDI.KEYID = 6
4,335,696 UART: [idev] SUBJECT.KEYID = 7
4,336,933 UART: [idev] UDS.KEYID = 0
4,338,016 ready_for_fw is high
4,338,234 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,607 UART: [idev] Erasing UDS.KEYID = 0
7,627,872 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,397 UART: [idev] --
7,653,686 UART: [ldev] ++
7,654,312 UART: [ldev] CDI.KEYID = 6
7,655,275 UART: [ldev] SUBJECT.KEYID = 5
7,656,502 UART: [ldev] AUTHORITY.KEYID = 7
7,657,737 UART: [ldev] FE.KEYID = 1
7,670,572 UART: [ldev] Erasing FE.KEYID = 1
10,954,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,014 UART: [ldev] --
13,311,680 UART: [fwproc] Waiting for Commands...
13,314,039 UART: [fwproc] Received command 0x46574c44
13,316,284 UART: [fwproc] Received Image of size 114124 bytes
22,109,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,191,040 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,259,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,576,537 >>> mbox cmd response: success
22,580,265 UART: [afmc] ++
22,580,917 UART: [afmc] CDI.KEYID = 6
22,581,824 UART: [afmc] SUBJECT.KEYID = 7
22,583,028 UART: [afmc] AUTHORITY.KEYID = 5
25,900,607 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,194,102 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,196,402 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,210,950 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,225,660 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,239,925 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,261,876 UART: [afmc] --
28,266,323 UART: [cold-reset] --
28,268,454 UART: [state] Locking Datavault
28,274,945 UART: [state] Locking PCR0, PCR1 and PCR31
28,276,750 UART: [state] Locking ICCM
28,278,987 UART: [exit] Launching FMC @ 0x40000130
28,287,403 UART:
28,287,631 UART: Running Caliptra FMC ...
28,288,729 UART:
28,288,880 UART: [state] CFI Enabled
28,297,191 UART: [fht] FMC Alias Private Key: 7
30,627,896 UART: [art] Extend RT PCRs Done
30,629,112 UART: [art] Lock RT PCRs Done
30,631,140 UART: [art] Populate DV Done
30,636,977 UART: [fht] FMC Alias Private Key: 7
30,638,618 UART: [art] Derive CDI
30,639,424 UART: [art] Store in in slot 0x4
30,681,911 UART: [art] Derive Key Pair
30,682,948 UART: [art] Store priv key in slot 0x5
33,925,268 UART: [art] Derive Key Pair - Done
33,938,587 UART: [art] Signing Cert with AUTHO
33,939,889 UART: RITY.KEYID = 7
36,219,303 UART: [art] Erasing AUTHORITY.KEYID = 7
36,220,806 UART: [art] PUB.X = ED439343E33A46D8FADE0CDD3FAF4983F5F28398A56BE739313B0AC83FD7BFD0E7DB38082C1A2530F1E45A3A3AA85567
36,228,092 UART: [art] PUB.Y = 337A2E0ECE6E7965C766CD754C1F383979BEF4E25B68F0293A5C5320809C6D58F0FA99F2B14E1696FFD93553243AD79F
36,235,306 UART: [art] SIG.R = 1590E5D1771BB71240671548524625F2446C18F2B617E01FFF7795B9F5125C347037310D8FF05AC6F2D974437964775D
36,242,682 UART: [art] SIG.S = E6474A56B2F39CC8F495966A83F97194DA06E60005383C97854B4B6552CB2F2B17E65E97A0CE8ED931AA8DACA187D9CB
37,547,908 UART: Caliptra RT
37,548,594 UART: [state] CFI Enabled
37,666,260 UART: [rt] RT listening for mailbox commands...
37,668,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,823,911 UART: [rt]cmd =0x41544d4e, len=14344
37,825,548 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,145 ready_for_fw is high
4,129,531 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,268,334 >>> mbox cmd response: success
27,904,667 UART:
27,905,048 UART: Running Caliptra FMC ...
27,906,149 UART:
27,906,294 UART: [state] CFI Enabled
27,914,610 UART: [fht] FMC Alias Private Key: 7
30,245,389 UART: [art] Extend RT PCRs Done
30,246,646 UART: [art] Lock RT PCRs Done
30,248,464 UART: [art] Populate DV Done
30,253,891 UART: [fht] FMC Alias Private Key: 7
30,255,491 UART: [art] Derive CDI
30,256,236 UART: [art] Store in in slot 0x4
30,298,954 UART: [art] Derive Key Pair
30,299,998 UART: [art] Store priv key in slot 0x5
33,542,254 UART: [art] Derive Key Pair - Done
33,555,360 UART: [art] Signing Cert with AUTHO
33,556,858 UART: RITY.KEYID = 7
35,836,116 UART: [art] Erasing AUTHORITY.KEYID = 7
35,837,624 UART: [art] PUB.X = 14A201BE772559B0890D9EF3C025B352266020D60F5AB5BECD2FA57554CEE3A34E2D6949834E709B51A46E8A5476FA39
35,844,896 UART: [art] PUB.Y = F3CF891CCD0C3D1566FBE955744B2A818B68B371218FB21AFFF959676E6A7E8D721EAD3AD4664DE73EE8E717CC56D8F2
35,852,122 UART: [art] SIG.R = B4BE04AD111C7542856841FB31AC4B88E9B65A0298F89B3EDCF9EDFF5DD9D8C523AD9297BEB59362A72717992D67D24E
35,859,508 UART: [art] SIG.S = E60A495FA5331B9A2E141C282768A1B36306B97D1C75DAFDD6186798404EA87589A71CEDEAD92B6F615DE6B641C9EB19
37,165,562 UART: Caliptra RT
37,166,274 UART: [state] CFI Enabled
37,284,259 UART: [rt] RT listening for mailbox commands...
37,286,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,441,847 UART: [rt]cmd =0x41544d4e, len=14344
37,443,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,105 UART:
192,464 UART: Running Caliptra ROM ...
193,649 UART:
193,806 UART: [state] CFI Enabled
264,772 UART: [state] LifecycleState = Unprovisioned
266,694 UART: [state] DebugLocked = No
268,941 UART: [state] WD Timer not started. Device not locked for debugging
272,834 UART: [kat] SHA2-256
451,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,528 UART: [kat] ++
464,058 UART: [kat] sha1
474,284 UART: [kat] SHA2-256
477,335 UART: [kat] SHA2-384
483,043 UART: [kat] SHA2-512-ACC
485,982 UART: [kat] ECC-384
2,947,710 UART: [kat] HMAC-384Kdf
2,972,741 UART: [kat] LMS
3,502,246 UART: [kat] --
3,506,618 UART: [cold-reset] ++
3,508,900 UART: [fht] FHT @ 0x50003400
3,520,925 UART: [idev] ++
3,521,545 UART: [idev] CDI.KEYID = 6
3,522,463 UART: [idev] SUBJECT.KEYID = 7
3,523,642 UART: [idev] UDS.KEYID = 0
3,524,566 ready_for_fw is high
3,524,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,607 UART: [idev] Erasing UDS.KEYID = 0
6,026,329 UART: [idev] Sha1 KeyId Algorithm
6,049,686 UART: [idev] --
6,053,301 UART: [ldev] ++
6,053,872 UART: [ldev] CDI.KEYID = 6
6,054,760 UART: [ldev] SUBJECT.KEYID = 5
6,056,008 UART: [ldev] AUTHORITY.KEYID = 7
6,057,196 UART: [ldev] FE.KEYID = 1
6,100,261 UART: [ldev] Erasing FE.KEYID = 1
8,604,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,811 UART: [ldev] --
10,414,222 UART: [fwproc] Wait for Commands...
10,417,081 UART: [fwproc] Recv command 0x46574c44
10,419,144 UART: [fwproc] Recv'd Img size: 114448 bytes
14,971,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,048,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,117,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,435,710 >>> mbox cmd response: success
15,440,437 UART: [afmc] ++
15,441,040 UART: [afmc] CDI.KEYID = 6
15,441,958 UART: [afmc] SUBJECT.KEYID = 7
15,443,117 UART: [afmc] AUTHORITY.KEYID = 5
17,980,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,704,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,706,361 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,722,323 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,738,287 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,754,077 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,690 UART: [afmc] --
19,780,409 UART: [cold-reset] --
19,785,886 UART: [state] Locking Datavault
19,790,703 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,350 UART: [state] Locking ICCM
19,795,016 UART: [exit] Launching FMC @ 0x40000130
19,803,461 UART:
19,803,694 UART: Running Caliptra FMC ...
19,804,793 UART:
19,804,949 UART: [state] CFI Enabled
19,862,549 UART: [fht] FMC Alias Private Key: 7
21,625,785 UART: [art] Extend RT PCRs Done
21,626,996 UART: [art] Lock RT PCRs Done
21,628,642 UART: [art] Populate DV Done
21,633,993 UART: [fht] FMC Alias Private Key: 7
21,635,581 UART: [art] Derive CDI
21,636,323 UART: [art] Store in in slot 0x4
21,695,102 UART: [art] Derive Key Pair
21,696,144 UART: [art] Store priv key in slot 0x5
24,159,229 UART: [art] Derive Key Pair - Done
24,172,445 UART: [art] Signing Cert with AUTHO
24,173,751 UART: RITY.KEYID = 7
25,884,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,447 UART: [art] PUB.X = 86CB96A513E3D33C885D2E22A5B9511FAF888E99E552774E66AE7D0E2B7273AD0C1F54A8ADE69CA9D0F444BB911E1D4D
25,893,749 UART: [art] PUB.Y = 27BF390A48693C2B1A7E9D22984B589C871429CE99FE121D37D33E43A03FCD8FDE622FC351F0288F0F5DCCAEC7D8AF89
25,901,034 UART: [art] SIG.R = C44A42CF67E80DD99ABA2A6A472CB6E6FACA71F334A65F4BD00F9FA1D8B6799764399FCCC2171AFC0AAE5FEA1A272F3D
25,908,422 UART: [art] SIG.S = FB4581D6C83DB018FD28C1B0493B7665C3E7ADD460E76D62219448B21B0B078184E6A81F8AC4034705D66AE7099443FA
26,887,799 UART: Caliptra RT
26,888,520 UART: [state] CFI Enabled
27,053,429 UART: [rt] RT listening for mailbox commands...
27,055,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,211,770 UART: [rt]cmd =0x41544d4e, len=14344
27,213,929 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,382,203 ready_for_fw is high
3,382,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,071,137 >>> mbox cmd response: success
19,370,636 UART:
19,371,019 UART: Running Caliptra FMC ...
19,372,156 UART:
19,372,317 UART: [state] CFI Enabled
19,436,751 UART: [fht] FMC Alias Private Key: 7
21,200,169 UART: [art] Extend RT PCRs Done
21,201,386 UART: [art] Lock RT PCRs Done
21,202,905 UART: [art] Populate DV Done
21,208,457 UART: [fht] FMC Alias Private Key: 7
21,209,937 UART: [art] Derive CDI
21,210,698 UART: [art] Store in in slot 0x4
21,269,790 UART: [art] Derive Key Pair
21,270,781 UART: [art] Store priv key in slot 0x5
23,733,578 UART: [art] Derive Key Pair - Done
23,746,775 UART: [art] Signing Cert with AUTHO
23,748,085 UART: RITY.KEYID = 7
25,460,121 UART: [art] Erasing AUTHORITY.KEYID = 7
25,461,627 UART: [art] PUB.X = 21FA0041BD7E63E8A4FAAECD415B8D272FC791463B3011A1008E6400D149FC32350481E1F80CD3912FE789C5A71CF33E
25,468,835 UART: [art] PUB.Y = D754F7B3F0A602469B6BBD1AA15111236330121FA256DABC4B84648144F25710A16D7BFC2754F653DB9A167A24835E70
25,476,108 UART: [art] SIG.R = 7C004970C8392D12569E91FB8515047A5939787C5C43847F87B7A4460859EC1659717358629BB64FFACF66FB6108DB47
25,483,407 UART: [art] SIG.S = DB6368C19A856185A08939374D19836EAEB8817DD59B6D15925C0334EF59CE0A1BE8591E5C8C60081E2DC3C4E327835E
26,461,790 UART: Caliptra RT
26,462,505 UART: [state] CFI Enabled
26,629,631 UART: [rt] RT listening for mailbox commands...
26,631,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,787,745 UART: [rt]cmd =0x41544d4e, len=14344
26,789,618 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,379 UART:
192,759 UART: Running Caliptra ROM ...
193,975 UART:
603,698 UART: [state] CFI Enabled
616,582 UART: [state] LifecycleState = Unprovisioned
618,445 UART: [state] DebugLocked = No
621,028 UART: [state] WD Timer not started. Device not locked for debugging
625,121 UART: [kat] SHA2-256
804,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,812 UART: [kat] ++
816,339 UART: [kat] sha1
828,421 UART: [kat] SHA2-256
831,485 UART: [kat] SHA2-384
837,193 UART: [kat] SHA2-512-ACC
840,132 UART: [kat] ECC-384
3,281,143 UART: [kat] HMAC-384Kdf
3,293,727 UART: [kat] LMS
3,823,234 UART: [kat] --
3,828,391 UART: [cold-reset] ++
3,829,896 UART: [fht] FHT @ 0x50003400
3,842,287 UART: [idev] ++
3,842,852 UART: [idev] CDI.KEYID = 6
3,843,727 UART: [idev] SUBJECT.KEYID = 7
3,844,958 UART: [idev] UDS.KEYID = 0
3,846,027 ready_for_fw is high
3,846,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,976 UART: [idev] Erasing UDS.KEYID = 0
6,316,928 UART: [idev] Sha1 KeyId Algorithm
6,339,354 UART: [idev] --
6,343,731 UART: [ldev] ++
6,344,293 UART: [ldev] CDI.KEYID = 6
6,345,225 UART: [ldev] SUBJECT.KEYID = 5
6,346,427 UART: [ldev] AUTHORITY.KEYID = 7
6,347,646 UART: [ldev] FE.KEYID = 1
6,360,197 UART: [ldev] Erasing FE.KEYID = 1
8,837,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,837 UART: [ldev] --
10,628,391 UART: [fwproc] Wait for Commands...
10,630,160 UART: [fwproc] Recv command 0x46574c44
10,632,243 UART: [fwproc] Recv'd Img size: 114448 bytes
15,183,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,261,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,330,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,648,305 >>> mbox cmd response: success
15,652,047 UART: [afmc] ++
15,652,642 UART: [afmc] CDI.KEYID = 6
15,653,552 UART: [afmc] SUBJECT.KEYID = 7
15,654,760 UART: [afmc] AUTHORITY.KEYID = 5
18,159,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,878,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,880,031 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,895,973 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,911,924 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,927,698 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,952,012 UART: [afmc] --
19,956,032 UART: [cold-reset] --
19,959,777 UART: [state] Locking Datavault
19,966,765 UART: [state] Locking PCR0, PCR1 and PCR31
19,968,449 UART: [state] Locking ICCM
19,970,658 UART: [exit] Launching FMC @ 0x40000130
19,979,109 UART:
19,979,334 UART: Running Caliptra FMC ...
19,980,425 UART:
19,980,575 UART: [state] CFI Enabled
19,988,667 UART: [fht] FMC Alias Private Key: 7
21,745,460 UART: [art] Extend RT PCRs Done
21,746,684 UART: [art] Lock RT PCRs Done
21,748,218 UART: [art] Populate DV Done
21,753,845 UART: [fht] FMC Alias Private Key: 7
21,755,319 UART: [art] Derive CDI
21,756,045 UART: [art] Store in in slot 0x4
21,799,278 UART: [art] Derive Key Pair
21,800,272 UART: [art] Store priv key in slot 0x5
24,227,302 UART: [art] Derive Key Pair - Done
24,239,967 UART: [art] Signing Cert with AUTHO
24,241,273 UART: RITY.KEYID = 7
25,946,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,948,254 UART: [art] PUB.X = FC27BFE956C82DD923D3E5FABBE82F30229B990F5780AFE09471D5D28566B6CE9481E040365B211CFC583CDF2923C1E4
25,955,535 UART: [art] PUB.Y = 1F0415B809BFF771D9A0F0B381F9F47CD019AD324A7516444218BD39EDD97C30416C78EC2119FBC832882C5BA7404E83
25,962,750 UART: [art] SIG.R = 3EBFC98FA1987121F0DFB68563D5D837308AC612E15D60CA27F70E8ACC7AA74766903AD0DB72F99687D7D59AEAADB39E
25,970,221 UART: [art] SIG.S = F34378337662FB064F47D8FB0F1C3F6CD8C40696D2CAA91513A929836B59E19A8EA328DAF5D191AF1DAEB36558315076
26,949,527 UART: Caliptra RT
26,950,229 UART: [state] CFI Enabled
27,066,912 UART: [rt] RT listening for mailbox commands...
27,069,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,224,659 UART: [rt]cmd =0x41544d4e, len=14344
27,226,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,695,110 ready_for_fw is high
3,695,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,247,536 >>> mbox cmd response: success
19,498,150 UART:
19,498,549 UART: Running Caliptra FMC ...
19,499,690 UART:
19,499,847 UART: [state] CFI Enabled
19,507,396 UART: [fht] FMC Alias Private Key: 7
21,263,542 UART: [art] Extend RT PCRs Done
21,264,762 UART: [art] Lock RT PCRs Done
21,266,491 UART: [art] Populate DV Done
21,271,661 UART: [fht] FMC Alias Private Key: 7
21,273,306 UART: [art] Derive CDI
21,274,112 UART: [art] Store in in slot 0x4
21,316,372 UART: [art] Derive Key Pair
21,317,388 UART: [art] Store priv key in slot 0x5
23,744,321 UART: [art] Derive Key Pair - Done
23,757,483 UART: [art] Signing Cert with AUTHO
23,758,783 UART: RITY.KEYID = 7
25,463,791 UART: [art] Erasing AUTHORITY.KEYID = 7
25,465,292 UART: [art] PUB.X = 37344B7426C01F7D07D811A70D71FFF77227C8566778B56E583AD7DE87AE40D837015D41F237E905396BF969460B0DFF
25,472,529 UART: [art] PUB.Y = 9CD813B3D1012E3F50C94FCE3B5563FE1E33E093957A07388BCF266767A59B8782773065C778A34CFA37A268FB952CA3
25,479,775 UART: [art] SIG.R = 941B19E3F4B5170936C38926313713957850199EE9364985008BD794D300BE7D1206A06F9C9A7A10C6B35438D4FCA6C4
25,487,096 UART: [art] SIG.S = 5BA96257E8CD401E353771ECB133FC0872D864A28E3B501CCF74E40214F19BE8FB42FD5C72A067128C85E5BEC6092576
26,466,118 UART: Caliptra RT
26,466,818 UART: [state] CFI Enabled
26,583,078 UART: [rt] RT listening for mailbox commands...
26,585,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,740,874 UART: [rt]cmd =0x41544d4e, len=14344
26,742,518 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,171 UART:
192,528 UART: Running Caliptra ROM ...
193,735 UART:
193,895 UART: [state] CFI Enabled
262,160 UART: [state] LifecycleState = Unprovisioned
264,567 UART: [state] DebugLocked = No
267,303 UART: [state] WD Timer not started. Device not locked for debugging
271,327 UART: [kat] SHA2-256
461,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,966 UART: [kat] ++
472,451 UART: [kat] sha1
483,385 UART: [kat] SHA2-256
486,358 UART: [kat] SHA2-384
492,067 UART: [kat] SHA2-512-ACC
494,650 UART: [kat] ECC-384
2,946,202 UART: [kat] HMAC-384Kdf
2,970,887 UART: [kat] LMS
3,502,590 UART: [kat] --
3,507,120 UART: [cold-reset] ++
3,509,416 UART: [fht] FHT @ 0x50003400
3,520,721 UART: [idev] ++
3,521,482 UART: [idev] CDI.KEYID = 6
3,522,368 UART: [idev] SUBJECT.KEYID = 7
3,523,612 UART: [idev] UDS.KEYID = 0
3,524,511 ready_for_fw is high
3,524,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,515 UART: [idev] Erasing UDS.KEYID = 0
6,025,730 UART: [idev] Sha1 KeyId Algorithm
6,048,154 UART: [idev] --
6,051,658 UART: [ldev] ++
6,052,335 UART: [ldev] CDI.KEYID = 6
6,053,407 UART: [ldev] SUBJECT.KEYID = 5
6,054,514 UART: [ldev] AUTHORITY.KEYID = 7
6,055,692 UART: [ldev] FE.KEYID = 1
6,098,583 UART: [ldev] Erasing FE.KEYID = 1
8,605,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,353 UART: [ldev] --
10,411,677 UART: [fwproc] Wait for Commands...
10,414,572 UART: [fwproc] Recv command 0x46574c44
10,416,876 UART: [fwproc] Recv'd Img size: 114448 bytes
15,037,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,121,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,238,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,781,129 >>> mbox cmd response: success
15,785,627 UART: [afmc] ++
15,786,334 UART: [afmc] CDI.KEYID = 6
15,787,544 UART: [afmc] SUBJECT.KEYID = 7
15,788,981 UART: [afmc] AUTHORITY.KEYID = 5
18,322,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,065,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,067,931 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,082,972 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,200 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,029 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,137,022 UART: [afmc] --
20,139,804 UART: [cold-reset] --
20,142,533 UART: [state] Locking Datavault
20,148,644 UART: [state] Locking PCR0, PCR1 and PCR31
20,150,836 UART: [state] Locking ICCM
20,153,473 UART: [exit] Launching FMC @ 0x40000130
20,162,148 UART:
20,162,434 UART: Running Caliptra FMC ...
20,163,564 UART:
20,163,728 UART: [state] CFI Enabled
20,223,332 UART: [fht] FMC Alias Private Key: 7
21,986,732 UART: [art] Extend RT PCRs Done
21,987,946 UART: [art] Lock RT PCRs Done
21,989,568 UART: [art] Populate DV Done
21,995,033 UART: [fht] FMC Alias Private Key: 7
21,996,518 UART: [art] Derive CDI
21,997,448 UART: [art] Store in in slot 0x4
22,055,804 UART: [art] Derive Key Pair
22,056,810 UART: [art] Store priv key in slot 0x5
24,519,771 UART: [art] Derive Key Pair - Done
24,532,875 UART: [art] Signing Cert with AUTHO
24,534,171 UART: RITY.KEYID = 7
26,245,943 UART: [art] Erasing AUTHORITY.KEYID = 7
26,247,467 UART: [art] PUB.X = 728C37406E01DDD66C795340E5702676FE89BC87CE3C74CD24B53A44E2BD279E664A4E494CF9253B611BD1F52EE7FE44
26,254,729 UART: [art] PUB.Y = E8FE2519502C6C8343E20CB3485F7718D3A4A37560BFCA7D861B803AF3AF74358CD2532005C89437F20E2D979D675BA2
26,261,957 UART: [art] SIG.R = 12EE68D723CA79FCD85D3A18A4E518A19717D9D0FC587914F95CB0A1ED538CD749969614BB21411FF5E7038BC102C042
26,269,345 UART: [art] SIG.S = CCFAA620CCB5EEEE0997072EB4D4181098757239FDCCC23336E931E01482B83E1B83F753B9590EED945C555174D9C52A
27,248,286 UART: Caliptra RT
27,248,976 UART: [state] CFI Enabled
27,413,382 UART: [rt] RT listening for mailbox commands...
27,415,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,718 UART: [rt]cmd =0x41544d4e, len=14344
27,573,755 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,439,128 ready_for_fw is high
3,439,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,823,799 >>> mbox cmd response: success
20,113,038 UART:
20,113,410 UART: Running Caliptra FMC ...
20,114,512 UART:
20,114,666 UART: [state] CFI Enabled
20,181,631 UART: [fht] FMC Alias Private Key: 7
21,945,307 UART: [art] Extend RT PCRs Done
21,946,530 UART: [art] Lock RT PCRs Done
21,947,805 UART: [art] Populate DV Done
21,953,210 UART: [fht] FMC Alias Private Key: 7
21,954,911 UART: [art] Derive CDI
21,955,724 UART: [art] Store in in slot 0x4
22,014,895 UART: [art] Derive Key Pair
22,015,942 UART: [art] Store priv key in slot 0x5
24,479,302 UART: [art] Derive Key Pair - Done
24,492,283 UART: [art] Signing Cert with AUTHO
24,493,578 UART: RITY.KEYID = 7
26,204,791 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,294 UART: [art] PUB.X = 1D3DCBA7CA7CA5B52E108E2B0CF4AAECCD77103C989E1DF9BC738B6C29C9D692927153ACBED328E0E751F388385CB668
26,213,587 UART: [art] PUB.Y = C7648AF1E5FCB0662593A63407C6EDF2FAC883CA173D724783980D79CC73B2F64180CFA583337AAD7AB1382F37C592B0
26,220,897 UART: [art] SIG.R = FB8F72B892C3EA5C9F8B6E4FE701A86F8967C70A785558B343E16A44055F710256F501FE213DBC55C9E18590357F36CF
26,228,271 UART: [art] SIG.S = F12D4836CB9A106F7B640F38EA29B8A1334A575365094B2D1951D755C9E4469EF27BAF11AD71C3254D6E2727900F829A
27,207,167 UART: Caliptra RT
27,207,851 UART: [state] CFI Enabled
27,372,800 UART: [rt] RT listening for mailbox commands...
27,375,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,918 UART: [rt]cmd =0x41544d4e, len=14344
27,532,693 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,351 UART:
192,708 UART: Running Caliptra ROM ...
193,912 UART:
603,696 UART: [state] CFI Enabled
619,554 UART: [state] LifecycleState = Unprovisioned
621,916 UART: [state] DebugLocked = No
624,358 UART: [state] WD Timer not started. Device not locked for debugging
628,866 UART: [kat] SHA2-256
818,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,565 UART: [kat] ++
830,123 UART: [kat] sha1
841,558 UART: [kat] SHA2-256
844,555 UART: [kat] SHA2-384
851,818 UART: [kat] SHA2-512-ACC
854,398 UART: [kat] ECC-384
3,297,449 UART: [kat] HMAC-384Kdf
3,310,470 UART: [kat] LMS
3,842,307 UART: [kat] --
3,848,673 UART: [cold-reset] ++
3,851,028 UART: [fht] FHT @ 0x50003400
3,862,787 UART: [idev] ++
3,863,487 UART: [idev] CDI.KEYID = 6
3,864,457 UART: [idev] SUBJECT.KEYID = 7
3,865,828 UART: [idev] UDS.KEYID = 0
3,866,753 ready_for_fw is high
3,866,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,010,504 UART: [idev] Erasing UDS.KEYID = 0
6,346,737 UART: [idev] Sha1 KeyId Algorithm
6,368,881 UART: [idev] --
6,372,869 UART: [ldev] ++
6,373,542 UART: [ldev] CDI.KEYID = 6
6,374,444 UART: [ldev] SUBJECT.KEYID = 5
6,375,648 UART: [ldev] AUTHORITY.KEYID = 7
6,376,873 UART: [ldev] FE.KEYID = 1
6,386,446 UART: [ldev] Erasing FE.KEYID = 1
8,866,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,589,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,604,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,886 UART: [ldev] --
10,662,004 UART: [fwproc] Wait for Commands...
10,663,716 UART: [fwproc] Recv command 0x46574c44
10,666,181 UART: [fwproc] Recv'd Img size: 114448 bytes
15,293,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,381,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,497,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,040,636 >>> mbox cmd response: success
16,045,288 UART: [afmc] ++
16,045,993 UART: [afmc] CDI.KEYID = 6
16,047,205 UART: [afmc] SUBJECT.KEYID = 7
16,048,642 UART: [afmc] AUTHORITY.KEYID = 5
18,554,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,278,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,279,999 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,295,047 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,310,247 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,325,097 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,348,767 UART: [afmc] --
20,352,559 UART: [cold-reset] --
20,355,187 UART: [state] Locking Datavault
20,361,530 UART: [state] Locking PCR0, PCR1 and PCR31
20,363,673 UART: [state] Locking ICCM
20,364,680 UART: [exit] Launching FMC @ 0x40000130
20,373,017 UART:
20,373,250 UART: Running Caliptra FMC ...
20,374,363 UART:
20,374,522 UART: [state] CFI Enabled
20,382,353 UART: [fht] FMC Alias Private Key: 7
22,139,516 UART: [art] Extend RT PCRs Done
22,140,734 UART: [art] Lock RT PCRs Done
22,142,786 UART: [art] Populate DV Done
22,148,255 UART: [fht] FMC Alias Private Key: 7
22,149,730 UART: [art] Derive CDI
22,150,483 UART: [art] Store in in slot 0x4
22,193,074 UART: [art] Derive Key Pair
22,194,110 UART: [art] Store priv key in slot 0x5
24,621,176 UART: [art] Derive Key Pair - Done
24,634,536 UART: [art] Signing Cert with AUTHO
24,635,839 UART: RITY.KEYID = 7
26,341,438 UART: [art] Erasing AUTHORITY.KEYID = 7
26,342,949 UART: [art] PUB.X = 9A537EA7095B56CE22F44782ABFC449D348ADD13F8549BEFBC181045FCA530B1AECC54A5A65A54C65EA60751B99F0CEF
26,350,271 UART: [art] PUB.Y = 023E88D130E04981B5A2011E5986EEE8D7331D8F872DF3452CB386EF2A2C16EEA3AE22BA6CEEACE0A462D41ED4CB1B7E
26,357,556 UART: [art] SIG.R = AC2669D08D29FEB481D2CEEA0C65789DE0250B311BF468B039A7D72BDDD528AFD5722C96DCDB089FEED5205FEBF743DE
26,364,984 UART: [art] SIG.S = 13EEA5975B1E0832CA51EFBC40787F48F2C22C305F52D7E5DD0AFFE7BCC9BA7151CB4B3863CA07B63E4ACB3766F929B2
27,344,599 UART: Caliptra RT
27,345,282 UART: [state] CFI Enabled
27,461,741 UART: [rt] RT listening for mailbox commands...
27,464,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,619,374 UART: [rt]cmd =0x41544d4e, len=14344
27,621,176 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,755,018 ready_for_fw is high
3,755,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,071,090 >>> mbox cmd response: success
20,327,101 UART:
20,327,484 UART: Running Caliptra FMC ...
20,328,609 UART:
20,328,760 UART: [state] CFI Enabled
20,336,460 UART: [fht] FMC Alias Private Key: 7
22,092,660 UART: [art] Extend RT PCRs Done
22,093,872 UART: [art] Lock RT PCRs Done
22,095,771 UART: [art] Populate DV Done
22,101,225 UART: [fht] FMC Alias Private Key: 7
22,102,758 UART: [art] Derive CDI
22,103,567 UART: [art] Store in in slot 0x4
22,145,949 UART: [art] Derive Key Pair
22,146,983 UART: [art] Store priv key in slot 0x5
24,574,183 UART: [art] Derive Key Pair - Done
24,586,851 UART: [art] Signing Cert with AUTHO
24,588,188 UART: RITY.KEYID = 7
26,294,052 UART: [art] Erasing AUTHORITY.KEYID = 7
26,295,546 UART: [art] PUB.X = 66F87AC4488681CC8093BD938F9CA0652145D040869869CE11AC20632B8272D39786CBF5CD4299430628E06E873393BC
26,302,814 UART: [art] PUB.Y = E0A7A9D40EBBE5A84EE0D9E0F24B3971023C44D791DE0649EA17C58FB3C98A52A2F7BFDC076F2C5AD46EDB33A3642F1A
26,310,107 UART: [art] SIG.R = 7E1CAF1E1289D8709D34D0F87577315C6C5744B885BF5C08D785458BD3C6A16CF7B402A66F01D94E9438C6D5BB2B52D0
26,317,470 UART: [art] SIG.S = 41A10C22A9FEB4C18E06911F0865D17D58AA4F700517CCF0B4216E4FD533DD2174D2EECE86B5420D5CB5456C27C9EA3A
27,296,127 UART: Caliptra RT
27,296,840 UART: [state] CFI Enabled
27,413,914 UART: [rt] RT listening for mailbox commands...
27,416,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,307 UART: [rt]cmd =0x41544d4e, len=14344
27,573,274 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
894,988 UART: [kat] SHA2-512-ACC
896,889 UART: [kat] ECC-384
902,452 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,685 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,734 UART: [idev] Erasing UDS.KEYID = 0
1,503,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,602 UART: [idev] --
1,513,597 UART: [ldev] ++
1,513,765 UART: [ldev] CDI.KEYID = 6
1,514,128 UART: [ldev] SUBJECT.KEYID = 5
1,514,554 UART: [ldev] AUTHORITY.KEYID = 7
1,515,017 UART: [ldev] FE.KEYID = 1
1,519,991 UART: [ldev] Erasing FE.KEYID = 1
1,545,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,872 UART: [ldev] --
1,584,333 UART: [fwproc] Waiting for Commands...
1,585,006 UART: [fwproc] Received command 0x46574c44
1,585,797 UART: [fwproc] Received Image of size 114448 bytes
5,120,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,313,676 >>> mbox cmd response: success
5,314,886 UART: [afmc] ++
5,315,054 UART: [afmc] CDI.KEYID = 6
5,315,416 UART: [afmc] SUBJECT.KEYID = 7
5,315,841 UART: [afmc] AUTHORITY.KEYID = 5
5,350,769 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,253 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,962 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,854 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,555 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,607 UART: [afmc] --
5,394,567 UART: [cold-reset] --
5,395,293 UART: [state] Locking Datavault
5,396,302 UART: [state] Locking PCR0, PCR1 and PCR31
5,396,906 UART: [state] Locking ICCM
5,397,564 UART: [exit] Launching FMC @ 0x40000130
5,402,893 UART:
5,402,909 UART: Running Caliptra FMC ...
5,403,317 UART:
5,403,371 UART: [state] CFI Enabled
5,413,941 UART: [fht] FMC Alias Private Key: 7
5,521,641 UART: [art] Extend RT PCRs Done
5,522,069 UART: [art] Lock RT PCRs Done
5,523,873 UART: [art] Populate DV Done
5,532,121 UART: [fht] FMC Alias Private Key: 7
5,533,059 UART: [art] Derive CDI
5,533,339 UART: [art] Store in in slot 0x4
5,619,276 UART: [art] Derive Key Pair
5,619,636 UART: [art] Store priv key in slot 0x5
5,633,124 UART: [art] Derive Key Pair - Done
5,648,021 UART: [art] Signing Cert with AUTHO
5,648,501 UART: RITY.KEYID = 7
5,663,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,482 UART: [art] PUB.X = 89D88E71F0903CCF35ADBCB242E09706171191BB3526CDE5C7F6D7C9D1342188383133BA3678DB1D1B59B2E0E8A00D07
5,671,247 UART: [art] PUB.Y = 2AA6D4AF6F573988D6C31F006587D05D78850299B0A5F3F788DFD952D7B977555E7E0D597EE2A9BC027BEEF0632B642E
5,678,172 UART: [art] SIG.R = E8EA807D97F0D4FCAAD6C3F67B0B4667A339CEB166FBCE59F882CDD4982D96366B98EED486C1B006DFACDDC20BB1F904
5,684,956 UART: [art] SIG.S = 1D16B6940C60806EFB65E551D092E6B78BE6B4CAE3CA38BF279B378BFEFD87A8C5A886B09F01ABF46C256888A39DFCE2
5,709,161 UART: Caliptra RT
5,709,414 UART: [state] CFI Enabled
5,818,223 UART: [rt] RT listening for mailbox commands...
5,818,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,963 UART: [rt]cmd =0x41544d4e, len=14344
5,943,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,243 ready_for_fw is high
1,362,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,353,987 >>> mbox cmd response: success
5,415,558 UART:
5,415,574 UART: Running Caliptra FMC ...
5,415,982 UART:
5,416,036 UART: [state] CFI Enabled
5,426,440 UART: [fht] FMC Alias Private Key: 7
5,534,272 UART: [art] Extend RT PCRs Done
5,534,700 UART: [art] Lock RT PCRs Done
5,536,384 UART: [art] Populate DV Done
5,544,918 UART: [fht] FMC Alias Private Key: 7
5,545,880 UART: [art] Derive CDI
5,546,160 UART: [art] Store in in slot 0x4
5,631,633 UART: [art] Derive Key Pair
5,631,993 UART: [art] Store priv key in slot 0x5
5,645,747 UART: [art] Derive Key Pair - Done
5,660,327 UART: [art] Signing Cert with AUTHO
5,660,807 UART: RITY.KEYID = 7
5,676,161 UART: [art] Erasing AUTHORITY.KEYID = 7
5,676,926 UART: [art] PUB.X = CB3DB111BD1A95B760321286D9875C25F62D19507C7CCE036E0B667B30AC3BD1148A4368DEE7E8181AF20B368D5E9026
5,683,691 UART: [art] PUB.Y = 10595C48295B86BF22ADDA8D9F85B98DEE0D491A5AF72D54751B83B546D7E6D924506D2BA76E245E42BC49A417E2B123
5,690,644 UART: [art] SIG.R = 01F702018C4D6D8F05794C67BFD0CD0341DC9DD29592507A0607D43DEB8E7C13758FB87386CD30ABBFA81DDAEC7DCC18
5,697,409 UART: [art] SIG.S = 30CE2BE976474B5D9C6A8FD2167FFCDE59EC1C05CD2DD6AD304A22CE11886627664C0883310BAA6B66DDB660AD86A04B
5,721,053 UART: Caliptra RT
5,721,306 UART: [state] CFI Enabled
5,829,488 UART: [rt] RT listening for mailbox commands...
5,830,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,358 UART: [rt]cmd =0x41544d4e, len=14344
5,954,984 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,664 UART: [kat] SHA2-256
882,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,710 UART: [kat] ++
886,862 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
907,977 UART: [kat] LMS
1,476,173 UART: [kat] --
1,476,848 UART: [cold-reset] ++
1,477,368 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 ready_for_fw is high
1,481,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,297 UART: [idev] Erasing UDS.KEYID = 0
1,506,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,935 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,624 UART: [ldev] Erasing FE.KEYID = 1
1,548,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,429 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,385 UART: [fwproc] Received command 0x46574c44
1,588,176 UART: [fwproc] Received Image of size 114448 bytes
5,123,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,151,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,181,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,317,091 >>> mbox cmd response: success
5,318,301 UART: [afmc] ++
5,318,469 UART: [afmc] CDI.KEYID = 6
5,318,831 UART: [afmc] SUBJECT.KEYID = 7
5,319,256 UART: [afmc] AUTHORITY.KEYID = 5
5,354,354 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,371,448 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,377,157 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,383,049 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,388,750 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,396,810 UART: [afmc] --
5,397,858 UART: [cold-reset] --
5,398,614 UART: [state] Locking Datavault
5,400,021 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,625 UART: [state] Locking ICCM
5,401,061 UART: [exit] Launching FMC @ 0x40000130
5,406,390 UART:
5,406,406 UART: Running Caliptra FMC ...
5,406,814 UART:
5,406,957 UART: [state] CFI Enabled
5,417,875 UART: [fht] FMC Alias Private Key: 7
5,525,443 UART: [art] Extend RT PCRs Done
5,525,871 UART: [art] Lock RT PCRs Done
5,527,427 UART: [art] Populate DV Done
5,535,447 UART: [fht] FMC Alias Private Key: 7
5,536,461 UART: [art] Derive CDI
5,536,741 UART: [art] Store in in slot 0x4
5,622,684 UART: [art] Derive Key Pair
5,623,044 UART: [art] Store priv key in slot 0x5
5,636,030 UART: [art] Derive Key Pair - Done
5,650,769 UART: [art] Signing Cert with AUTHO
5,651,249 UART: RITY.KEYID = 7
5,666,653 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,418 UART: [art] PUB.X = BFAFDBC654E73CE1749D25398BCC40AE3D0ECEA640B92614A6C67D258DB1FF78F4DFA92BD405E032C2EE755F6147B1F9
5,674,204 UART: [art] PUB.Y = 08AD3F9E3D7686F9A08996B5060EACC72F0315018BFFBD417364CAC8ED2463C5419CF9663CE72822C6BAB29CF06FD355
5,681,149 UART: [art] SIG.R = 4325A6153E52EF0BE1D19DE57683B2D3D5799A88F60F33E207BDC0DC810FCFF492EBABC118E720167E4EBCC5EE84551D
5,687,923 UART: [art] SIG.S = D28751E0767BC2F600E00E1A7A1B02F57C8A7399680426B85507192BE0D695157715F5261052A3B896BECDFF199E34D2
5,711,310 UART: Caliptra RT
5,711,655 UART: [state] CFI Enabled
5,820,032 UART: [rt] RT listening for mailbox commands...
5,820,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,402 UART: [rt]cmd =0x41544d4e, len=14344
5,945,074 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,674 ready_for_fw is high
1,363,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,240,823 >>> mbox cmd response: success
5,302,930 UART:
5,302,946 UART: Running Caliptra FMC ...
5,303,354 UART:
5,303,497 UART: [state] CFI Enabled
5,314,433 UART: [fht] FMC Alias Private Key: 7
5,422,047 UART: [art] Extend RT PCRs Done
5,422,475 UART: [art] Lock RT PCRs Done
5,423,877 UART: [art] Populate DV Done
5,432,279 UART: [fht] FMC Alias Private Key: 7
5,433,291 UART: [art] Derive CDI
5,433,571 UART: [art] Store in in slot 0x4
5,519,700 UART: [art] Derive Key Pair
5,520,060 UART: [art] Store priv key in slot 0x5
5,533,292 UART: [art] Derive Key Pair - Done
5,547,913 UART: [art] Signing Cert with AUTHO
5,548,393 UART: RITY.KEYID = 7
5,563,737 UART: [art] Erasing AUTHORITY.KEYID = 7
5,564,502 UART: [art] PUB.X = ED6FED8982A59E0A4C802ADCBFCE8D6256348587510B7451920FBFAF93AF79AA9C2F536D760064BCEE996C7D3328036F
5,571,250 UART: [art] PUB.Y = 619D05B22E8167CAC69BB323F293744DA375463B834C448CB13E7D7B71BF55BD047E47FC0ABCF77BEDBA5ACCB1ABC33A
5,578,213 UART: [art] SIG.R = 9E05B7319F044934A583EB2499C66C78B681F2407CC6053024806C484C35C5520F1713375EB12C316DA7796196EF9E98
5,584,957 UART: [art] SIG.S = BBD85A9004EE13B8D5C35BBC53D7571823CAB9EC96706E7833C4978851F3FA1D7CD0471BB0EC44E0C16C627173B33B51
5,608,713 UART: Caliptra RT
5,609,058 UART: [state] CFI Enabled
5,717,686 UART: [rt] RT listening for mailbox commands...
5,718,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,841,362 UART: [rt]cmd =0x41544d4e, len=14344
5,842,962 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,302 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,123 UART: [fht] FHT @ 0x50003400
1,174,664 UART: [idev] ++
1,174,832 UART: [idev] CDI.KEYID = 6
1,175,192 UART: [idev] SUBJECT.KEYID = 7
1,175,616 UART: [idev] UDS.KEYID = 0
1,175,961 ready_for_fw is high
1,175,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,208,899 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,283,106 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,317 >>> mbox cmd response: success
3,319,535 UART: [afmc] ++
3,319,703 UART: [afmc] CDI.KEYID = 6
3,320,065 UART: [afmc] SUBJECT.KEYID = 7
3,320,490 UART: [afmc] AUTHORITY.KEYID = 5
3,355,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,003 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,712 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,604 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,315 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,144 UART: [afmc] --
3,399,088 UART: [cold-reset] --
3,399,932 UART: [state] Locking Datavault
3,400,845 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,449 UART: [state] Locking ICCM
3,402,023 UART: [exit] Launching FMC @ 0x40000130
3,407,352 UART:
3,407,368 UART: Running Caliptra FMC ...
3,407,776 UART:
3,407,830 UART: [state] CFI Enabled
3,418,380 UART: [fht] FMC Alias Private Key: 7
3,526,628 UART: [art] Extend RT PCRs Done
3,527,056 UART: [art] Lock RT PCRs Done
3,528,460 UART: [art] Populate DV Done
3,536,668 UART: [fht] FMC Alias Private Key: 7
3,537,766 UART: [art] Derive CDI
3,538,046 UART: [art] Store in in slot 0x4
3,623,695 UART: [art] Derive Key Pair
3,624,055 UART: [art] Store priv key in slot 0x5
3,637,913 UART: [art] Derive Key Pair - Done
3,652,776 UART: [art] Signing Cert with AUTHO
3,653,256 UART: RITY.KEYID = 7
3,668,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,149 UART: [art] PUB.X = 1318DF88419DC80296E3D565D6584B14B7982FB8B495F4544EA36F4CA5DBFAD6D56A6C8EF8596E5A4F36AD81ED8E5B3A
3,675,930 UART: [art] PUB.Y = 621708662E2CE089EA4DBCE0B256BA2C543FD7599EF72F79B9A9FF7BCD4DE45357B4F0719A52B956E14624C802F2906A
3,682,882 UART: [art] SIG.R = D86ADF2F33D55A2915797C2184534B7D991238FBC9FF753FE2434E95EAE6DE7471B9048197B11CFF3D7769056D78BD1F
3,689,650 UART: [art] SIG.S = A046FA913E77C9BF37E129AB60163C123CF9734CB9CD77A9306A20DA495FCD64A1F36039B201A9AD64512FBC5EE1ACF1
3,714,282 UART: Caliptra RT
3,714,535 UART: [state] CFI Enabled
3,821,450 UART: [rt] RT listening for mailbox commands...
3,822,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,296 UART: [rt]cmd =0x41544d4e, len=14344
3,946,656 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,263 >>> mbox cmd response: success
3,229,118 UART:
3,229,134 UART: Running Caliptra FMC ...
3,229,542 UART:
3,229,596 UART: [state] CFI Enabled
3,239,638 UART: [fht] FMC Alias Private Key: 7
3,347,642 UART: [art] Extend RT PCRs Done
3,348,070 UART: [art] Lock RT PCRs Done
3,349,838 UART: [art] Populate DV Done
3,358,218 UART: [fht] FMC Alias Private Key: 7
3,359,216 UART: [art] Derive CDI
3,359,496 UART: [art] Store in in slot 0x4
3,444,889 UART: [art] Derive Key Pair
3,445,249 UART: [art] Store priv key in slot 0x5
3,457,899 UART: [art] Derive Key Pair - Done
3,472,629 UART: [art] Signing Cert with AUTHO
3,473,109 UART: RITY.KEYID = 7
3,488,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,530 UART: [art] PUB.X = 01F05890B815A6A1BCBF1FA55184CF589227BA4AE3DEEE0E4072C40F88ED6A1BD0FA175EE8E6498EB6F52537BCE3BF18
3,496,311 UART: [art] PUB.Y = 86FCF907911D2F6128AA95F90C6BC82399D141E7848E9E631CE7049FC4086C5E0B6E6AB930560EFB236E16CB32732E4F
3,503,247 UART: [art] SIG.R = D6C089106768614EFD2060DA13AB7C67B38EBFC91A7C94138C65EE088BD862B8B495BB5AC00AFD54765C6975F3C17021
3,510,017 UART: [art] SIG.S = F79DE0A6E345AF6DB01B65B74D4809EA2527593587D998B50917DE6376E55794B23B6213C049E9D1A042F3A0F2B4DF68
3,534,024 UART: Caliptra RT
3,534,277 UART: [state] CFI Enabled
3,642,264 UART: [rt] RT listening for mailbox commands...
3,642,934 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,296 UART: [rt]cmd =0x41544d4e, len=14344
3,767,824 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
907,093 UART: [kat] SHA2-512-ACC
908,994 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,093 UART: [kat] LMS
1,171,421 UART: [kat] --
1,172,352 UART: [cold-reset] ++
1,172,846 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,442 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,878 UART: [ldev] ++
1,211,046 UART: [ldev] CDI.KEYID = 6
1,211,409 UART: [ldev] SUBJECT.KEYID = 5
1,211,835 UART: [ldev] AUTHORITY.KEYID = 7
1,212,298 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,244,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,156 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,067 UART: [fwproc] Recv command 0x46574c44
1,284,795 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,989 >>> mbox cmd response: success
3,327,229 UART: [afmc] ++
3,327,397 UART: [afmc] CDI.KEYID = 6
3,327,759 UART: [afmc] SUBJECT.KEYID = 7
3,328,184 UART: [afmc] AUTHORITY.KEYID = 5
3,363,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,521 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,230 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,122 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,833 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,854 UART: [afmc] --
3,406,936 UART: [cold-reset] --
3,407,752 UART: [state] Locking Datavault
3,408,885 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,489 UART: [state] Locking ICCM
3,410,073 UART: [exit] Launching FMC @ 0x40000130
3,415,402 UART:
3,415,418 UART: Running Caliptra FMC ...
3,415,826 UART:
3,415,969 UART: [state] CFI Enabled
3,426,809 UART: [fht] FMC Alias Private Key: 7
3,534,711 UART: [art] Extend RT PCRs Done
3,535,139 UART: [art] Lock RT PCRs Done
3,536,669 UART: [art] Populate DV Done
3,544,537 UART: [fht] FMC Alias Private Key: 7
3,545,641 UART: [art] Derive CDI
3,545,921 UART: [art] Store in in slot 0x4
3,631,634 UART: [art] Derive Key Pair
3,631,994 UART: [art] Store priv key in slot 0x5
3,645,920 UART: [art] Derive Key Pair - Done
3,660,121 UART: [art] Signing Cert with AUTHO
3,660,601 UART: RITY.KEYID = 7
3,675,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,636 UART: [art] PUB.X = 9EF0BAF218494439427F69B84E8FF535DA853D483791074CAFB9F80348DDB0A57E6F8A2862793633DC7A14C0AEA8F817
3,683,404 UART: [art] PUB.Y = A8F0FFFDAF06E7B9D3641DAC3545DC18EED27E32544FE988513BF5A17356CB576E1CF6F8A55E904996B57DC271F392A8
3,690,365 UART: [art] SIG.R = 96A557C90287936517C25733C6252171377709FCC82345AD38188E80172F56843C03A98509E06CF15F31635A398EC7C8
3,697,103 UART: [art] SIG.S = 9609F32C0B223BAA19416BC6772A11A9FDB28E2E97AE8A94E9C078602D58D04771FA0C22F632E5D097D3AB9D1AC815DA
3,720,783 UART: Caliptra RT
3,721,128 UART: [state] CFI Enabled
3,828,537 UART: [rt] RT listening for mailbox commands...
3,829,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,279 UART: [rt]cmd =0x41544d4e, len=14344
3,953,663 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 ready_for_fw is high
1,061,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,432 >>> mbox cmd response: success
3,236,591 UART:
3,236,607 UART: Running Caliptra FMC ...
3,237,015 UART:
3,237,158 UART: [state] CFI Enabled
3,247,640 UART: [fht] FMC Alias Private Key: 7
3,355,582 UART: [art] Extend RT PCRs Done
3,356,010 UART: [art] Lock RT PCRs Done
3,357,482 UART: [art] Populate DV Done
3,365,564 UART: [fht] FMC Alias Private Key: 7
3,366,648 UART: [art] Derive CDI
3,366,928 UART: [art] Store in in slot 0x4
3,452,835 UART: [art] Derive Key Pair
3,453,195 UART: [art] Store priv key in slot 0x5
3,466,157 UART: [art] Derive Key Pair - Done
3,481,222 UART: [art] Signing Cert with AUTHO
3,481,702 UART: RITY.KEYID = 7
3,496,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,609 UART: [art] PUB.X = C005D351AC876B41A718891FE593825C3DACC470E6E520E180E72AC58AF71842F025D844B1B0B8B97E66F68CEE6750DA
3,504,382 UART: [art] PUB.Y = A5EBAC5BE80E2211A4119B954DB22A1DB292E7916532BF8F0CF16FAD5810DFA18A97C1B87F583311FA7C344D0A9D58BA
3,511,339 UART: [art] SIG.R = D118A119BA1BE910989F10850476D9F01EA4EA9D433E36AEDF2BAD9D0E60FBF5CA391570277422CE986731BCB876D6D6
3,518,113 UART: [art] SIG.S = 9D08B9D40299DF55111F85319487CA955A37CC1629458DC10370BF1425ECA8CABCB16019110C256541CC7832E90F1DA9
3,542,529 UART: Caliptra RT
3,542,874 UART: [state] CFI Enabled
3,650,193 UART: [rt] RT listening for mailbox commands...
3,650,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,943 UART: [rt]cmd =0x41544d4e, len=14344
3,775,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,534 UART: [kat] HMAC-384Kdf
920,090 UART: [kat] LMS
1,168,402 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,173,659 ready_for_fw is high
1,173,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,616 UART: [ldev] ++
1,208,784 UART: [ldev] CDI.KEYID = 6
1,209,148 UART: [ldev] SUBJECT.KEYID = 5
1,209,575 UART: [ldev] AUTHORITY.KEYID = 7
1,210,038 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,220 UART: [ldev] --
1,279,598 UART: [fwproc] Wait for Commands...
1,280,277 UART: [fwproc] Recv command 0x46574c44
1,281,010 UART: [fwproc] Recv'd Img size: 114448 bytes
3,118,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,041 >>> mbox cmd response: success
3,314,176 UART: [afmc] ++
3,314,344 UART: [afmc] CDI.KEYID = 6
3,314,707 UART: [afmc] SUBJECT.KEYID = 7
3,315,133 UART: [afmc] AUTHORITY.KEYID = 5
3,351,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,328 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,038 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,928 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,639 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,531 UART: [afmc] --
3,394,585 UART: [cold-reset] --
3,395,319 UART: [state] Locking Datavault
3,396,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,088 UART: [state] Locking ICCM
3,397,670 UART: [exit] Launching FMC @ 0x40000130
3,402,999 UART:
3,403,015 UART: Running Caliptra FMC ...
3,403,423 UART:
3,403,477 UART: [state] CFI Enabled
3,413,861 UART: [fht] FMC Alias Private Key: 7
3,521,525 UART: [art] Extend RT PCRs Done
3,521,953 UART: [art] Lock RT PCRs Done
3,523,753 UART: [art] Populate DV Done
3,531,885 UART: [fht] FMC Alias Private Key: 7
3,532,815 UART: [art] Derive CDI
3,533,095 UART: [art] Store in in slot 0x4
3,618,870 UART: [art] Derive Key Pair
3,619,230 UART: [art] Store priv key in slot 0x5
3,632,518 UART: [art] Derive Key Pair - Done
3,647,251 UART: [art] Signing Cert with AUTHO
3,647,731 UART: RITY.KEYID = 7
3,663,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,818 UART: [art] PUB.X = 3B4E1FDE3079C29830426CE965ADD4948F0834D328A6AB1874D7DC6A947F7045AD6977BC68DD08A0430FAB2FF329A56D
3,670,587 UART: [art] PUB.Y = AED84ABB329E7FFF717E31BCD73D162D527A9C0BD3DE1F923DFF6A10526A078094D12BFD10C1446E71524CB31C58CBF8
3,677,549 UART: [art] SIG.R = 5B254BD0D337F1503C760482D2884D2014FA667081B2A1AC137D99078E495D527948899794EAD99841FE881E9A7C0E73
3,684,300 UART: [art] SIG.S = 3BAD868F5B3405C9B1AD4518EE3D44CBDB2A4FD65ACEF5D79DC6B498DE929C80A9008AF904F6102E3FA3AB025EBF3686
3,707,956 UART: Caliptra RT
3,708,209 UART: [state] CFI Enabled
3,816,694 UART: [rt] RT listening for mailbox commands...
3,817,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,598 UART: [rt]cmd =0x41544d4e, len=14344
3,942,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,870 ready_for_fw is high
1,055,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,962 >>> mbox cmd response: success
3,229,109 UART:
3,229,125 UART: Running Caliptra FMC ...
3,229,533 UART:
3,229,587 UART: [state] CFI Enabled
3,240,057 UART: [fht] FMC Alias Private Key: 7
3,347,573 UART: [art] Extend RT PCRs Done
3,348,001 UART: [art] Lock RT PCRs Done
3,349,413 UART: [art] Populate DV Done
3,357,485 UART: [fht] FMC Alias Private Key: 7
3,358,591 UART: [art] Derive CDI
3,358,871 UART: [art] Store in in slot 0x4
3,444,326 UART: [art] Derive Key Pair
3,444,686 UART: [art] Store priv key in slot 0x5
3,457,794 UART: [art] Derive Key Pair - Done
3,472,630 UART: [art] Signing Cert with AUTHO
3,473,110 UART: RITY.KEYID = 7
3,487,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,585 UART: [art] PUB.X = 22603988637C9DE50B8FEC120C1AB3B45B7DCECBEE0C5D942DAE6AB607C889AADF1560ABB58B112922505042E878DFDA
3,495,361 UART: [art] PUB.Y = A9889D46A0C4F11B29C3AE357603669E53BFEF4CE4C2E7B469928892AB532A882D7D42A58902F25C2096EF8DF14D2687
3,502,307 UART: [art] SIG.R = 7CFEFF36C3F9613D93FB1D5C63749E82560C590A29626CC4C41548F46D04679D8575D9094867D5E045D4FBEE82CE7641
3,509,065 UART: [art] SIG.S = 9BCE7660FD2E6CCB10CD5ADB64B8B50FFC892B22B6336C80B1935C2928819E5D009482B56247997F6004EE8FC29349CF
3,532,980 UART: Caliptra RT
3,533,233 UART: [state] CFI Enabled
3,641,795 UART: [rt] RT listening for mailbox commands...
3,642,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,413 UART: [rt]cmd =0x41544d4e, len=14344
3,766,933 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,128 UART: [state] WD Timer not started. Device not locked for debugging
88,455 UART: [kat] SHA2-256
892,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,134 UART: [kat] ++
896,286 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,441 UART: [kat] LMS
1,169,753 UART: [kat] --
1,170,622 UART: [cold-reset] ++
1,171,080 UART: [fht] FHT @ 0x50003400
1,173,734 UART: [idev] ++
1,173,902 UART: [idev] CDI.KEYID = 6
1,174,263 UART: [idev] SUBJECT.KEYID = 7
1,174,688 UART: [idev] UDS.KEYID = 0
1,175,034 ready_for_fw is high
1,175,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,908 UART: [idev] Erasing UDS.KEYID = 0
1,200,700 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,529 UART: [ldev] ++
1,210,697 UART: [ldev] CDI.KEYID = 6
1,211,061 UART: [ldev] SUBJECT.KEYID = 5
1,211,488 UART: [ldev] AUTHORITY.KEYID = 7
1,211,951 UART: [ldev] FE.KEYID = 1
1,217,187 UART: [ldev] Erasing FE.KEYID = 1
1,243,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,887 UART: [ldev] --
1,283,361 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,873 UART: [fwproc] Recv'd Img size: 114448 bytes
3,138,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,195,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,331,316 >>> mbox cmd response: success
3,332,473 UART: [afmc] ++
3,332,641 UART: [afmc] CDI.KEYID = 6
3,333,004 UART: [afmc] SUBJECT.KEYID = 7
3,333,430 UART: [afmc] AUTHORITY.KEYID = 5
3,369,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,385,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,386,321 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,392,031 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,921 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,403,632 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,411,444 UART: [afmc] --
3,412,494 UART: [cold-reset] --
3,413,582 UART: [state] Locking Datavault
3,414,907 UART: [state] Locking PCR0, PCR1 and PCR31
3,415,511 UART: [state] Locking ICCM
3,415,947 UART: [exit] Launching FMC @ 0x40000130
3,421,276 UART:
3,421,292 UART: Running Caliptra FMC ...
3,421,700 UART:
3,421,843 UART: [state] CFI Enabled
3,432,435 UART: [fht] FMC Alias Private Key: 7
3,540,177 UART: [art] Extend RT PCRs Done
3,540,605 UART: [art] Lock RT PCRs Done
3,542,001 UART: [art] Populate DV Done
3,550,181 UART: [fht] FMC Alias Private Key: 7
3,551,327 UART: [art] Derive CDI
3,551,607 UART: [art] Store in in slot 0x4
3,637,982 UART: [art] Derive Key Pair
3,638,342 UART: [art] Store priv key in slot 0x5
3,651,668 UART: [art] Derive Key Pair - Done
3,666,660 UART: [art] Signing Cert with AUTHO
3,667,140 UART: RITY.KEYID = 7
3,682,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,683,301 UART: [art] PUB.X = F4FD3A5DA02BD31BE0E0AB4F51AF89E50BD465377451AA872CAB0D3D7738400E4D3457C0928611F6F44AE4A1F7E0A84A
3,690,076 UART: [art] PUB.Y = 6E2430AAE726903F16826FE9FC455F37D24A67D001701A8F153BFAF44BD8B1082FCAB8E5F3A47E2C4948010AC8377B9F
3,697,022 UART: [art] SIG.R = 29F2095B4A856AE9DC4BE76B4DFC58018CC27D70AA878D4C1F977AC902BCE3643F1CD66CD3CBBCC8B1B60765EA7A33EE
3,703,804 UART: [art] SIG.S = 69A84428315C10D3AD267D204784E2794ACA45FD1FBC831B061EB20F920E45999D8152AC070F33A010279BE0417CC476
3,727,324 UART: Caliptra RT
3,727,669 UART: [state] CFI Enabled
3,836,180 UART: [rt] RT listening for mailbox commands...
3,836,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,934 UART: [rt]cmd =0x41544d4e, len=14344
3,961,306 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,913 ready_for_fw is high
1,056,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,706 >>> mbox cmd response: success
3,232,503 UART:
3,232,519 UART: Running Caliptra FMC ...
3,232,927 UART:
3,233,070 UART: [state] CFI Enabled
3,243,682 UART: [fht] FMC Alias Private Key: 7
3,351,366 UART: [art] Extend RT PCRs Done
3,351,794 UART: [art] Lock RT PCRs Done
3,353,218 UART: [art] Populate DV Done
3,361,534 UART: [fht] FMC Alias Private Key: 7
3,362,558 UART: [art] Derive CDI
3,362,838 UART: [art] Store in in slot 0x4
3,448,677 UART: [art] Derive Key Pair
3,449,037 UART: [art] Store priv key in slot 0x5
3,462,371 UART: [art] Derive Key Pair - Done
3,477,394 UART: [art] Signing Cert with AUTHO
3,477,874 UART: RITY.KEYID = 7
3,493,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,575 UART: [art] PUB.X = AA1D0C427866FDE58A3C802425BFE5B99EF31C4CEE3EC8CDC19073A07FB759E0226879C796063E712B8B98AB559461DD
3,501,349 UART: [art] PUB.Y = 62A3F260EF96EC065F31EBC4DAED28E1C98B732EC7D4A5E036CCC7CF25E27705FC4D7FBC7009377395EBFBF6ED60A930
3,508,312 UART: [art] SIG.R = 8255AFDD26CDFD587B6956A9DB9A4C702FD5BA52B3D6DEF18CFA972D4F309F6567F38442EECE2AB846AFAF6CD1342CCA
3,515,110 UART: [art] SIG.S = 566B30078EDA6522018E0AA6B32D9E0B24253EF8446C324E38B96E5ACC7AAC03C0A4AA86A5A100DAF069D2E2F98E2295
3,538,598 UART: Caliptra RT
3,538,943 UART: [state] CFI Enabled
3,646,121 UART: [rt] RT listening for mailbox commands...
3,646,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,685 UART: [rt]cmd =0x41544d4e, len=14344
3,771,149 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,102 UART:
192,454 UART: Running Caliptra ROM ...
193,656 UART:
193,815 UART: [state] CFI Enabled
260,035 UART: [state] LifecycleState = Unprovisioned
262,009 UART: [state] DebugLocked = No
263,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,482 UART: [kat] SHA2-256
439,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,750 UART: [kat] ++
450,282 UART: [kat] sha1
460,797 UART: [kat] SHA2-256
463,488 UART: [kat] SHA2-384
469,626 UART: [kat] SHA2-512-ACC
471,994 UART: [kat] ECC-384
2,764,740 UART: [kat] HMAC-384Kdf
2,777,534 UART: [kat] LMS
3,967,793 UART: [kat] --
3,973,256 UART: [cold-reset] ++
3,974,299 UART: [fht] Storing FHT @ 0x50003400
3,985,809 UART: [idev] ++
3,986,383 UART: [idev] CDI.KEYID = 6
3,987,423 UART: [idev] SUBJECT.KEYID = 7
3,988,619 UART: [idev] UDS.KEYID = 0
3,989,742 ready_for_fw is high
3,989,959 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,580 UART: [idev] Erasing UDS.KEYID = 0
7,325,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,491 UART: [idev] --
7,352,404 UART: [ldev] ++
7,352,988 UART: [ldev] CDI.KEYID = 6
7,353,906 UART: [ldev] SUBJECT.KEYID = 5
7,355,123 UART: [ldev] AUTHORITY.KEYID = 7
7,356,412 UART: [ldev] FE.KEYID = 1
7,401,626 UART: [ldev] Erasing FE.KEYID = 1
10,738,324 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,604 UART: [ldev] --
13,115,277 UART: [fwproc] Waiting for Commands...
13,118,455 UART: [fwproc] Received command 0x46574c44
13,120,690 UART: [fwproc] Received Image of size 114124 bytes
22,076,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,156,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,225,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,542,239 >>> mbox cmd response: success
22,546,237 UART: [afmc] ++
22,546,833 UART: [afmc] CDI.KEYID = 6
22,547,861 UART: [afmc] SUBJECT.KEYID = 7
22,549,024 UART: [afmc] AUTHORITY.KEYID = 5
25,911,142 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,211,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,213,663 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,228,246 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,242,949 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,257,145 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,278,867 UART: [afmc] --
28,282,409 UART: [cold-reset] --
28,288,432 UART: [state] Locking Datavault
28,294,665 UART: [state] Locking PCR0, PCR1 and PCR31
28,296,404 UART: [state] Locking ICCM
28,298,078 UART: [exit] Launching FMC @ 0x40000130
28,306,482 UART:
28,306,727 UART: Running Caliptra FMC ...
28,307,832 UART:
28,308,001 UART: [state] CFI Enabled
28,371,027 UART: [fht] FMC Alias Private Key: 7
30,709,469 UART: [art] Extend RT PCRs Done
30,710,690 UART: [art] Lock RT PCRs Done
30,712,312 UART: [art] Populate DV Done
30,717,519 UART: [fht] FMC Alias Private Key: 7
30,719,056 UART: [art] Derive CDI
30,719,797 UART: [art] Store in in slot 0x4
30,778,685 UART: [art] Derive Key Pair
30,779,724 UART: [art] Store priv key in slot 0x5
34,072,706 UART: [art] Derive Key Pair - Done
34,085,922 UART: [art] Signing Cert with AUTHO
34,087,224 UART: RITY.KEYID = 7
36,375,872 UART: [art] Erasing AUTHORITY.KEYID = 7
36,377,382 UART: [art] PUB.X = 0138694E96648644EE5BC37F3E3C6A1E136223BC66B7C7058FD29C1CD174813FF71A56E12165222726CD0072E2448E1A
36,384,584 UART: [art] PUB.Y = B3A1C66AF1AF35007F48F6363EDC593824312595C0BAEA20CBE0EBF2C19250378BD02B827F4B7A2D429B80483E9F3678
36,391,830 UART: [art] SIG.R = 7BD4C1FE74055CFE8C5BCAE7E9923AFB71EEB11507EBE8289B3D0C50507A1F086AC87DBD9030707C1A206D49F5E98C37
36,399,244 UART: [art] SIG.S = 6CC035E61F7A0AA911ACB971839F1BDF4A8495BF237EE126F6FB2DA36E5BE59C7EAF29CE14FD63689154F777E33BA82F
37,704,432 UART: Caliptra RT
37,705,145 UART: [state] CFI Enabled
37,865,834 UART: [rt] RT listening for mailbox commands...
37,868,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,023,420 UART: [rt]cmd =0x41544d4e, len=14344
38,028,746 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,781,530 ready_for_fw is high
3,782,147 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,103,016 >>> mbox cmd response: success
27,789,854 UART:
27,790,229 UART: Running Caliptra FMC ...
27,791,341 UART:
27,791,496 UART: [state] CFI Enabled
27,860,791 UART: [fht] FMC Alias Private Key: 7
30,198,311 UART: [art] Extend RT PCRs Done
30,199,531 UART: [art] Lock RT PCRs Done
30,201,304 UART: [art] Populate DV Done
30,206,938 UART: [fht] FMC Alias Private Key: 7
30,208,586 UART: [art] Derive CDI
30,209,330 UART: [art] Store in in slot 0x4
30,267,729 UART: [art] Derive Key Pair
30,268,771 UART: [art] Store priv key in slot 0x5
33,562,042 UART: [art] Derive Key Pair - Done
33,575,052 UART: [art] Signing Cert with AUTHO
33,576,366 UART: RITY.KEYID = 7
35,863,971 UART: [art] Erasing AUTHORITY.KEYID = 7
35,865,489 UART: [art] PUB.X = 5003D75A7F4D6607CC0FDB950B8DC22C9711B5E6B6B8ABBFA0C8E9C70DA608AFFF6DB5B04DF17EF1CDA33D234B1E9414
35,872,740 UART: [art] PUB.Y = 32EE7E68D138BA9DB6D4BAD12AD87A81AB796A25CAD7AC39D066EF6F310BF6D1EBDB740827944FEB6544BAE4E1C22984
35,879,997 UART: [art] SIG.R = FEAA6AFF826C0FED18AA835FA5E731C25FE4D7409AD2D86157582AD5EF4985C00249B42F019A3D44F7F6F48863680D36
35,887,383 UART: [art] SIG.S = 6AC5CDC7AADDAD30B3F187C42DA6B3A11F48ABF9547988CC3C7B9F60FFADF9F3FC35F5916F358A44E65AD99F92257E79
37,192,802 UART: Caliptra RT
37,193,516 UART: [state] CFI Enabled
37,355,574 UART: [rt] RT listening for mailbox commands...
37,357,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,513,296 UART: [rt]cmd =0x41544d4e, len=14344
37,518,187 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,376 UART:
192,740 UART: Running Caliptra ROM ...
193,884 UART:
603,622 UART: [state] CFI Enabled
621,181 UART: [state] LifecycleState = Unprovisioned
623,134 UART: [state] DebugLocked = No
625,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,275 UART: [kat] SHA2-256
801,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,535 UART: [kat] ++
812,046 UART: [kat] sha1
824,120 UART: [kat] SHA2-256
826,831 UART: [kat] SHA2-384
832,604 UART: [kat] SHA2-512-ACC
834,968 UART: [kat] ECC-384
3,117,952 UART: [kat] HMAC-384Kdf
3,130,230 UART: [kat] LMS
4,320,287 UART: [kat] --
4,325,271 UART: [cold-reset] ++
4,327,633 UART: [fht] Storing FHT @ 0x50003400
4,339,816 UART: [idev] ++
4,340,371 UART: [idev] CDI.KEYID = 6
4,341,326 UART: [idev] SUBJECT.KEYID = 7
4,342,561 UART: [idev] UDS.KEYID = 0
4,343,596 ready_for_fw is high
4,343,786 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,167 UART: [idev] Erasing UDS.KEYID = 0
7,626,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,590 UART: [idev] --
7,651,800 UART: [ldev] ++
7,652,374 UART: [ldev] CDI.KEYID = 6
7,653,307 UART: [ldev] SUBJECT.KEYID = 5
7,654,567 UART: [ldev] AUTHORITY.KEYID = 7
7,655,710 UART: [ldev] FE.KEYID = 1
7,667,146 UART: [ldev] Erasing FE.KEYID = 1
10,951,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,593 UART: [ldev] --
13,313,580 UART: [fwproc] Waiting for Commands...
13,316,040 UART: [fwproc] Received command 0x46574c44
13,318,261 UART: [fwproc] Received Image of size 114124 bytes
22,350,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,430,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,498,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,816,959 >>> mbox cmd response: success
22,820,595 UART: [afmc] ++
22,821,186 UART: [afmc] CDI.KEYID = 6
22,822,112 UART: [afmc] SUBJECT.KEYID = 7
22,823,333 UART: [afmc] AUTHORITY.KEYID = 5
26,137,629 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,431,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,433,978 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,448,570 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,463,286 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,477,514 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,498,539 UART: [afmc] --
28,503,051 UART: [cold-reset] --
28,505,292 UART: [state] Locking Datavault
28,509,676 UART: [state] Locking PCR0, PCR1 and PCR31
28,511,436 UART: [state] Locking ICCM
28,513,146 UART: [exit] Launching FMC @ 0x40000130
28,521,498 UART:
28,521,777 UART: Running Caliptra FMC ...
28,522,907 UART:
28,523,066 UART: [state] CFI Enabled
28,530,759 UART: [fht] FMC Alias Private Key: 7
30,861,558 UART: [art] Extend RT PCRs Done
30,862,785 UART: [art] Lock RT PCRs Done
30,864,248 UART: [art] Populate DV Done
30,869,928 UART: [fht] FMC Alias Private Key: 7
30,871,623 UART: [art] Derive CDI
30,872,432 UART: [art] Store in in slot 0x4
30,915,233 UART: [art] Derive Key Pair
30,916,230 UART: [art] Store priv key in slot 0x5
34,158,020 UART: [art] Derive Key Pair - Done
34,171,128 UART: [art] Signing Cert with AUTHO
34,172,428 UART: RITY.KEYID = 7
36,452,067 UART: [art] Erasing AUTHORITY.KEYID = 7
36,453,588 UART: [art] PUB.X = 049175F12A31975545771C5448384A0E747CB591B66EEA383CDB92F32ED1CF54EE9669AE1CBBA94DD2DDEFE9F16188EE
36,460,848 UART: [art] PUB.Y = 1F0C3801BDF2EA2D64F2F99606A792FE993C49269E93384BDCF01C2902790E996FC46231E5167DF238CB8F3BBCF9431C
36,468,059 UART: [art] SIG.R = 4A198428D2A5D0DD36CF055DC89A3919ED62A91EE1A12B59B5E5157FFAD7F6419AF23ECC352F117ABDCDC161ED8B0B97
36,475,498 UART: [art] SIG.S = ECA9409DACE83858A79DD3A794E358E12E6DCC9330E96427FD90D9D5D383248F6E6FEB4B0FF9F1078195C0F176BCB7A7
37,780,741 UART: Caliptra RT
37,781,453 UART: [state] CFI Enabled
37,899,183 UART: [rt] RT listening for mailbox commands...
37,901,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,056,665 UART: [rt]cmd =0x41544d4e, len=14344
38,061,923 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,129,909 ready_for_fw is high
4,130,358 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,389,287 >>> mbox cmd response: success
28,033,521 UART:
28,033,922 UART: Running Caliptra FMC ...
28,035,022 UART:
28,035,183 UART: [state] CFI Enabled
28,043,146 UART: [fht] FMC Alias Private Key: 7
30,373,601 UART: [art] Extend RT PCRs Done
30,374,824 UART: [art] Lock RT PCRs Done
30,376,333 UART: [art] Populate DV Done
30,381,629 UART: [fht] FMC Alias Private Key: 7
30,383,230 UART: [art] Derive CDI
30,384,042 UART: [art] Store in in slot 0x4
30,426,210 UART: [art] Derive Key Pair
30,427,206 UART: [art] Store priv key in slot 0x5
33,668,957 UART: [art] Derive Key Pair - Done
33,681,691 UART: [art] Signing Cert with AUTHO
33,682,995 UART: RITY.KEYID = 7
35,962,298 UART: [art] Erasing AUTHORITY.KEYID = 7
35,963,815 UART: [art] PUB.X = EA430AF4A9852025DE55DEA4C5D6B0740A2D597BB0A6080B609503B9A142605BAE9F9CC09F2FF349864F26B7BB9A78CB
35,971,058 UART: [art] PUB.Y = C77B3675253DE9DC56A262DE2A33A28DEE07B6AA573A089950B13A0932721DDF689C831030C926BDF8C85D10E66162F4
35,978,305 UART: [art] SIG.R = 8D85AE006F0164ADD0B7831E676F53169D27B155134DC76232AD86B7F48E8B449E0E4216DA24CF68E91A4467F6B2960F
35,985,676 UART: [art] SIG.S = EF7B0AC4EBC11A130F4C23ED03DF04ABE1726D4F8304883EE84296F8A967A9D27A7B1B25EF115D8D2C45564F6C6B8008
37,290,379 UART: Caliptra RT
37,291,095 UART: [state] CFI Enabled
37,409,228 UART: [rt] RT listening for mailbox commands...
37,411,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,566,976 UART: [rt]cmd =0x41544d4e, len=14344
37,571,967 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,856 writing to cptra_bootfsm_go
193,095 UART:
193,460 UART: Running Caliptra ROM ...
194,577 UART:
194,721 UART: [state] CFI Enabled
264,835 UART: [state] LifecycleState = Unprovisioned
266,687 UART: [state] DebugLocked = No
268,210 UART: [state] WD Timer not started. Device not locked for debugging
272,598 UART: [kat] SHA2-256
451,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,232 UART: [kat] ++
463,748 UART: [kat] sha1
475,255 UART: [kat] SHA2-256
478,259 UART: [kat] SHA2-384
485,327 UART: [kat] SHA2-512-ACC
488,296 UART: [kat] ECC-384
2,949,951 UART: [kat] HMAC-384Kdf
2,971,572 UART: [kat] LMS
3,501,022 UART: [kat] --
3,503,601 UART: [cold-reset] ++
3,505,381 UART: [fht] FHT @ 0x50003400
3,515,789 UART: [idev] ++
3,516,380 UART: [idev] CDI.KEYID = 6
3,517,294 UART: [idev] SUBJECT.KEYID = 7
3,518,465 UART: [idev] UDS.KEYID = 0
3,519,507 ready_for_fw is high
3,519,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,762 UART: [idev] Erasing UDS.KEYID = 0
6,024,813 UART: [idev] Sha1 KeyId Algorithm
6,047,671 UART: [idev] --
6,052,257 UART: [ldev] ++
6,052,830 UART: [ldev] CDI.KEYID = 6
6,053,715 UART: [ldev] SUBJECT.KEYID = 5
6,054,929 UART: [ldev] AUTHORITY.KEYID = 7
6,056,161 UART: [ldev] FE.KEYID = 1
6,099,142 UART: [ldev] Erasing FE.KEYID = 1
8,601,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,043 UART: [ldev] --
10,411,347 UART: [fwproc] Wait for Commands...
10,413,119 UART: [fwproc] Recv command 0x46574c44
10,415,216 UART: [fwproc] Recv'd Img size: 114448 bytes
14,966,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,049,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,435,772 >>> mbox cmd response: success
15,439,293 UART: [afmc] ++
15,439,884 UART: [afmc] CDI.KEYID = 6
15,440,769 UART: [afmc] SUBJECT.KEYID = 7
15,441,979 UART: [afmc] AUTHORITY.KEYID = 5
17,975,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,700,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,702,818 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,718,806 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,734,781 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,750,523 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,773,259 UART: [afmc] --
19,777,414 UART: [cold-reset] --
19,780,139 UART: [state] Locking Datavault
19,785,926 UART: [state] Locking PCR0, PCR1 and PCR31
19,787,569 UART: [state] Locking ICCM
19,788,831 UART: [exit] Launching FMC @ 0x40000130
19,797,280 UART:
19,797,513 UART: Running Caliptra FMC ...
19,798,611 UART:
19,798,765 UART: [state] CFI Enabled
19,858,803 UART: [fht] FMC Alias Private Key: 7
21,623,377 UART: [art] Extend RT PCRs Done
21,624,596 UART: [art] Lock RT PCRs Done
21,626,355 UART: [art] Populate DV Done
21,631,925 UART: [fht] FMC Alias Private Key: 7
21,633,459 UART: [art] Derive CDI
21,634,280 UART: [art] Store in in slot 0x4
21,691,590 UART: [art] Derive Key Pair
21,692,622 UART: [art] Store priv key in slot 0x5
24,155,464 UART: [art] Derive Key Pair - Done
24,168,285 UART: [art] Signing Cert with AUTHO
24,169,612 UART: RITY.KEYID = 7
25,880,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,882,279 UART: [art] PUB.X = 5B52024E671FFB534CD3FE41489B350AF694927F48CDDC77515C3714AA17B438F5D72BF82E58B34FA3FAC7A7428DDE19
25,889,522 UART: [art] PUB.Y = 4DD427AC2ECE4CA7CCDB959F06742E6C1286518F7690AB9B15E7BFB01C8282ECCCCCBFB319FA5E723CC3FEA8D9758481
25,896,808 UART: [art] SIG.R = 9344086A4A081F5CA8072BF231A92494CE18DC428D691CBAC5C86B7E5A40676A512A115A4292B0F83A7F581144E6C1EE
25,904,201 UART: [art] SIG.S = 856B1BE2EBFA5F68A6666F3FCDFDBAE3BC530D07AC90E34EF9DCF45BDD59F12CBE027AB18347B5EC8ADA810E7BF5673E
26,883,033 UART: Caliptra RT
26,883,883 UART: [state] CFI Enabled
27,047,982 UART: [rt] RT listening for mailbox commands...
27,050,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,206,213 UART: [rt]cmd =0x41544d4e, len=14344
27,211,438 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,359,501 ready_for_fw is high
3,359,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,993,045 >>> mbox cmd response: success
19,283,126 UART:
19,283,559 UART: Running Caliptra FMC ...
19,284,660 UART:
19,284,815 UART: [state] CFI Enabled
19,350,556 UART: [fht] FMC Alias Private Key: 7
21,114,390 UART: [art] Extend RT PCRs Done
21,115,613 UART: [art] Lock RT PCRs Done
21,117,160 UART: [art] Populate DV Done
21,122,509 UART: [fht] FMC Alias Private Key: 7
21,124,209 UART: [art] Derive CDI
21,125,030 UART: [art] Store in in slot 0x4
21,183,335 UART: [art] Derive Key Pair
21,184,376 UART: [art] Store priv key in slot 0x5
23,647,259 UART: [art] Derive Key Pair - Done
23,660,470 UART: [art] Signing Cert with AUTHO
23,661,779 UART: RITY.KEYID = 7
25,373,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,375,027 UART: [art] PUB.X = 415216546CA6701D686255039A9A9F121FA3F0A18C7D63F9D84E0B0000BE314FEFDBD7D3DABB9D84FCABCC6E5D697DE6
25,382,249 UART: [art] PUB.Y = C4F889F4948A9D3286324BD588CA756E00E499DF426FD891C8D948A963714902CCB661431200B8A88757A5F7D4922380
25,389,408 UART: [art] SIG.R = E4D37421A39F8008AE3B19BD864BC304EEF0B48BC52FC4A03C3C845B06FABFADB388FF5C30F3BBC7E8BABCE1F8C68EEC
25,396,874 UART: [art] SIG.S = ED7379C6B2B2CD639CBF305F1E5DEA669AAB81CFA98317BC058760804A4D1737918181EEF1BD1770DABD8152945D800E
26,375,916 UART: Caliptra RT
26,376,629 UART: [state] CFI Enabled
26,541,592 UART: [rt] RT listening for mailbox commands...
26,543,903 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,699,929 UART: [rt]cmd =0x41544d4e, len=14344
26,704,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,568 UART:
192,930 UART: Running Caliptra ROM ...
194,146 UART:
603,613 UART: [state] CFI Enabled
619,423 UART: [state] LifecycleState = Unprovisioned
621,339 UART: [state] DebugLocked = No
623,293 UART: [state] WD Timer not started. Device not locked for debugging
627,681 UART: [kat] SHA2-256
806,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,347 UART: [kat] ++
818,946 UART: [kat] sha1
829,680 UART: [kat] SHA2-256
832,672 UART: [kat] SHA2-384
839,002 UART: [kat] SHA2-512-ACC
841,933 UART: [kat] ECC-384
3,285,463 UART: [kat] HMAC-384Kdf
3,297,956 UART: [kat] LMS
3,827,491 UART: [kat] --
3,832,059 UART: [cold-reset] ++
3,832,922 UART: [fht] FHT @ 0x50003400
3,842,893 UART: [idev] ++
3,843,465 UART: [idev] CDI.KEYID = 6
3,844,489 UART: [idev] SUBJECT.KEYID = 7
3,845,583 UART: [idev] UDS.KEYID = 0
3,846,588 ready_for_fw is high
3,846,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,610 UART: [idev] Erasing UDS.KEYID = 0
6,320,298 UART: [idev] Sha1 KeyId Algorithm
6,343,258 UART: [idev] --
6,347,135 UART: [ldev] ++
6,347,697 UART: [ldev] CDI.KEYID = 6
6,348,656 UART: [ldev] SUBJECT.KEYID = 5
6,349,800 UART: [ldev] AUTHORITY.KEYID = 7
6,351,079 UART: [ldev] FE.KEYID = 1
6,361,829 UART: [ldev] Erasing FE.KEYID = 1
8,841,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,051 UART: [ldev] --
10,632,518 UART: [fwproc] Wait for Commands...
10,635,311 UART: [fwproc] Recv command 0x46574c44
10,637,391 UART: [fwproc] Recv'd Img size: 114448 bytes
15,174,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,249,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,318,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,636,440 >>> mbox cmd response: success
15,640,853 UART: [afmc] ++
15,641,451 UART: [afmc] CDI.KEYID = 6
15,642,360 UART: [afmc] SUBJECT.KEYID = 7
15,643,566 UART: [afmc] AUTHORITY.KEYID = 5
18,143,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,863,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,865,447 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,881,405 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,897,400 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,913,172 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,936,195 UART: [afmc] --
19,940,051 UART: [cold-reset] --
19,943,159 UART: [state] Locking Datavault
19,949,537 UART: [state] Locking PCR0, PCR1 and PCR31
19,951,174 UART: [state] Locking ICCM
19,953,046 UART: [exit] Launching FMC @ 0x40000130
19,961,489 UART:
19,961,723 UART: Running Caliptra FMC ...
19,962,814 UART:
19,962,965 UART: [state] CFI Enabled
19,971,001 UART: [fht] FMC Alias Private Key: 7
21,727,064 UART: [art] Extend RT PCRs Done
21,728,285 UART: [art] Lock RT PCRs Done
21,730,204 UART: [art] Populate DV Done
21,735,622 UART: [fht] FMC Alias Private Key: 7
21,737,144 UART: [art] Derive CDI
21,737,904 UART: [art] Store in in slot 0x4
21,780,541 UART: [art] Derive Key Pair
21,781,538 UART: [art] Store priv key in slot 0x5
24,208,582 UART: [art] Derive Key Pair - Done
24,221,565 UART: [art] Signing Cert with AUTHO
24,222,899 UART: RITY.KEYID = 7
25,928,329 UART: [art] Erasing AUTHORITY.KEYID = 7
25,929,832 UART: [art] PUB.X = 7EA374E136BFEAAB8DCE211A95C35B5F41DB2F306EC1A349FEB83ACD5AA80F2F6F59B29BB1A6D68654E20C34F6875FC0
25,937,114 UART: [art] PUB.Y = A5E256496A73F22480CB0C0A2B26FBD1F927BA5A27DA43A1DA3303633B8FB229095B8035FDAF5F9A4D1406A02AA963B9
25,944,429 UART: [art] SIG.R = 4FE86102C9FD8C3F21C3A611E0296CCFA7B8B0BBA2F9B920E84A7514BAFA06487D8C96BDFCA9C2C52C45AB11E0C845F7
25,951,803 UART: [art] SIG.S = 41271CE2B5D2F211A43B5ABAB2852A36278463A1210EBFE78BBFF0F9473664F74FA2E82AF9FB115BD4A9ADE328594AF2
26,930,429 UART: Caliptra RT
26,931,112 UART: [state] CFI Enabled
27,048,289 UART: [rt] RT listening for mailbox commands...
27,050,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,206,093 UART: [rt]cmd =0x41544d4e, len=14344
27,211,145 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,694,277 ready_for_fw is high
3,694,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,254,631 >>> mbox cmd response: success
19,508,577 UART:
19,508,981 UART: Running Caliptra FMC ...
19,510,108 UART:
19,510,256 UART: [state] CFI Enabled
19,517,982 UART: [fht] FMC Alias Private Key: 7
21,275,261 UART: [art] Extend RT PCRs Done
21,276,482 UART: [art] Lock RT PCRs Done
21,278,186 UART: [art] Populate DV Done
21,283,626 UART: [fht] FMC Alias Private Key: 7
21,285,212 UART: [art] Derive CDI
21,285,937 UART: [art] Store in in slot 0x4
21,328,357 UART: [art] Derive Key Pair
21,329,343 UART: [art] Store priv key in slot 0x5
23,756,330 UART: [art] Derive Key Pair - Done
23,769,216 UART: [art] Signing Cert with AUTHO
23,770,518 UART: RITY.KEYID = 7
25,476,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,477,836 UART: [art] PUB.X = 2B3CD519AA445E755042045C42FA41C7A0BE85E4311F7ECA34FCF0F55C93B1DA9A9C437ADC10C69A9E7A55A04EFF7ED2
25,485,121 UART: [art] PUB.Y = 6CB2B37E2633C55AB14082C2F570A7581E16456A7F241458A3B26E764840656A09D73858487A2A8118D6CEBDDDE244CA
25,492,338 UART: [art] SIG.R = 38D689C67DBB909C5D6D51451F1B796C4B4AFF76AA6E5B72C52AE692E6D7D572EEB0CEE432711997A074D11B4F5D6786
25,499,770 UART: [art] SIG.S = 677066716CD876654920D2EFDDFE383F333C4EE1C4242A48BD13C8EF7CE8375910230302ED37D2FF87976064E99EA1E6
26,478,791 UART: Caliptra RT
26,479,515 UART: [state] CFI Enabled
26,597,388 UART: [rt] RT listening for mailbox commands...
26,599,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,755,060 UART: [rt]cmd =0x41544d4e, len=14344
26,760,209 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,084 UART:
192,452 UART: Running Caliptra ROM ...
193,652 UART:
193,807 UART: [state] CFI Enabled
267,390 UART: [state] LifecycleState = Unprovisioned
269,789 UART: [state] DebugLocked = No
271,883 UART: [state] WD Timer not started. Device not locked for debugging
276,903 UART: [kat] SHA2-256
466,780 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,585 UART: [kat] ++
478,070 UART: [kat] sha1
489,478 UART: [kat] SHA2-256
492,845 UART: [kat] SHA2-384
498,887 UART: [kat] SHA2-512-ACC
501,475 UART: [kat] ECC-384
2,948,380 UART: [kat] HMAC-384Kdf
2,972,673 UART: [kat] LMS
3,504,298 UART: [kat] --
3,509,801 UART: [cold-reset] ++
3,510,961 UART: [fht] FHT @ 0x50003400
3,522,363 UART: [idev] ++
3,523,067 UART: [idev] CDI.KEYID = 6
3,524,055 UART: [idev] SUBJECT.KEYID = 7
3,525,231 UART: [idev] UDS.KEYID = 0
3,526,157 ready_for_fw is high
3,526,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,416 UART: [idev] Erasing UDS.KEYID = 0
6,031,548 UART: [idev] Sha1 KeyId Algorithm
6,054,318 UART: [idev] --
6,059,019 UART: [ldev] ++
6,059,703 UART: [ldev] CDI.KEYID = 6
6,060,616 UART: [ldev] SUBJECT.KEYID = 5
6,061,777 UART: [ldev] AUTHORITY.KEYID = 7
6,063,004 UART: [ldev] FE.KEYID = 1
6,101,590 UART: [ldev] Erasing FE.KEYID = 1
8,606,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,068 UART: [ldev] --
10,416,025 UART: [fwproc] Wait for Commands...
10,418,969 UART: [fwproc] Recv command 0x46574c44
10,421,285 UART: [fwproc] Recv'd Img size: 114448 bytes
15,014,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,095,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,211,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,754,757 >>> mbox cmd response: success
15,758,173 UART: [afmc] ++
15,758,885 UART: [afmc] CDI.KEYID = 6
15,760,027 UART: [afmc] SUBJECT.KEYID = 7
15,761,518 UART: [afmc] AUTHORITY.KEYID = 5
18,303,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,025,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,027,085 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,042,162 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,057,338 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,072,166 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,096,512 UART: [afmc] --
20,100,578 UART: [cold-reset] --
20,103,927 UART: [state] Locking Datavault
20,110,530 UART: [state] Locking PCR0, PCR1 and PCR31
20,112,670 UART: [state] Locking ICCM
20,115,253 UART: [exit] Launching FMC @ 0x40000130
20,123,925 UART:
20,124,169 UART: Running Caliptra FMC ...
20,125,272 UART:
20,125,447 UART: [state] CFI Enabled
20,182,026 UART: [fht] FMC Alias Private Key: 7
21,945,668 UART: [art] Extend RT PCRs Done
21,946,884 UART: [art] Lock RT PCRs Done
21,948,723 UART: [art] Populate DV Done
21,954,082 UART: [fht] FMC Alias Private Key: 7
21,955,626 UART: [art] Derive CDI
21,956,440 UART: [art] Store in in slot 0x4
22,014,621 UART: [art] Derive Key Pair
22,015,677 UART: [art] Store priv key in slot 0x5
24,478,241 UART: [art] Derive Key Pair - Done
24,491,613 UART: [art] Signing Cert with AUTHO
24,493,101 UART: RITY.KEYID = 7
26,204,645 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,152 UART: [art] PUB.X = 17AD20A58087D60322F8C73E15A667C11FB4E8AB8FFC5F3231F1596E985206DE51934D66B8601A0A1ACB83162A0F3605
26,213,392 UART: [art] PUB.Y = 2675E285750230B1EADF84CEC12C012A51C9EE14E155B903AB58D9CEB823DEEA58EE46C20F4B0B855C8CA6AA01D4DBF1
26,220,674 UART: [art] SIG.R = 4B4C035BC213C9598136892C3FDA8034C9012113FFEFC646C28CE1844AFD5A4273C7A301B8BD0F1A54740E95A56A4EF3
26,228,115 UART: [art] SIG.S = 3BFCC5F52FAA7FD45CE5013FB010B5B9525EF2B2D3926F5FC07CDB45BC6FA9B914DC6B057E7FA1899D02B2856A4BBCDD
27,206,833 UART: Caliptra RT
27,207,539 UART: [state] CFI Enabled
27,372,564 UART: [rt] RT listening for mailbox commands...
27,375,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,741 UART: [rt]cmd =0x41544d4e, len=14344
27,535,749 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,436,856 ready_for_fw is high
3,437,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,857,882 >>> mbox cmd response: success
20,154,243 UART:
20,154,621 UART: Running Caliptra FMC ...
20,155,729 UART:
20,155,883 UART: [state] CFI Enabled
20,224,155 UART: [fht] FMC Alias Private Key: 7
21,988,192 UART: [art] Extend RT PCRs Done
21,989,416 UART: [art] Lock RT PCRs Done
21,991,182 UART: [art] Populate DV Done
21,996,697 UART: [fht] FMC Alias Private Key: 7
21,998,345 UART: [art] Derive CDI
21,999,160 UART: [art] Store in in slot 0x4
22,057,119 UART: [art] Derive Key Pair
22,058,121 UART: [art] Store priv key in slot 0x5
24,520,795 UART: [art] Derive Key Pair - Done
24,534,073 UART: [art] Signing Cert with AUTHO
24,535,381 UART: RITY.KEYID = 7
26,247,097 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,612 UART: [art] PUB.X = 9FCF48FBE811E05D3CEAECF7184D1C29CD24039102B14BF115B07E90936C9439D7BDEC5065F0033616C36B334F77CCF8
26,255,859 UART: [art] PUB.Y = 936CB7DBC86D339547B9B2ADC4895012D56E987BDB7136573D89A6EA33E21126118D1AAFBA689BA824B8F650D432ACA3
26,263,124 UART: [art] SIG.R = 213BAEB22941EDEAC8EE66951489FE99962ABCDABE78C2C53346571348F2827AB47E4EAB197731AB1E8D2651D1595339
26,270,522 UART: [art] SIG.S = 6F850AD8FAFF45F8C2CAA19B6CF7065B09A767AA8D66C1649247F2FC2288AF497278733AD236B854F64CE6C1FD208E8F
27,249,137 UART: Caliptra RT
27,249,833 UART: [state] CFI Enabled
27,415,783 UART: [rt] RT listening for mailbox commands...
27,418,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,574,122 UART: [rt]cmd =0x41544d4e, len=14344
27,579,727 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,157 writing to cptra_bootfsm_go
193,327 UART:
193,689 UART: Running Caliptra ROM ...
194,787 UART:
604,554 UART: [state] CFI Enabled
618,380 UART: [state] LifecycleState = Unprovisioned
620,748 UART: [state] DebugLocked = No
622,470 UART: [state] WD Timer not started. Device not locked for debugging
626,906 UART: [kat] SHA2-256
816,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,607 UART: [kat] ++
828,122 UART: [kat] sha1
839,551 UART: [kat] SHA2-256
842,559 UART: [kat] SHA2-384
847,760 UART: [kat] SHA2-512-ACC
850,338 UART: [kat] ECC-384
3,292,438 UART: [kat] HMAC-384Kdf
3,305,637 UART: [kat] LMS
3,837,438 UART: [kat] --
3,841,372 UART: [cold-reset] ++
3,842,659 UART: [fht] FHT @ 0x50003400
3,853,894 UART: [idev] ++
3,854,610 UART: [idev] CDI.KEYID = 6
3,855,487 UART: [idev] SUBJECT.KEYID = 7
3,856,666 UART: [idev] UDS.KEYID = 0
3,857,814 ready_for_fw is high
3,858,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,685 UART: [idev] Erasing UDS.KEYID = 0
6,333,744 UART: [idev] Sha1 KeyId Algorithm
6,354,970 UART: [idev] --
6,359,768 UART: [ldev] ++
6,360,440 UART: [ldev] CDI.KEYID = 6
6,361,368 UART: [ldev] SUBJECT.KEYID = 5
6,362,567 UART: [ldev] AUTHORITY.KEYID = 7
6,363,790 UART: [ldev] FE.KEYID = 1
6,373,966 UART: [ldev] Erasing FE.KEYID = 1
8,850,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,259 UART: [ldev] --
10,642,565 UART: [fwproc] Wait for Commands...
10,645,717 UART: [fwproc] Recv command 0x46574c44
10,648,032 UART: [fwproc] Recv'd Img size: 114448 bytes
15,273,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,356,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,473,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,015,766 >>> mbox cmd response: success
16,019,358 UART: [afmc] ++
16,020,076 UART: [afmc] CDI.KEYID = 6
16,021,328 UART: [afmc] SUBJECT.KEYID = 7
16,022,764 UART: [afmc] AUTHORITY.KEYID = 5
18,526,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,248,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,250,591 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,265,648 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,280,848 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,295,691 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,319,243 UART: [afmc] --
20,323,707 UART: [cold-reset] --
20,327,713 UART: [state] Locking Datavault
20,332,440 UART: [state] Locking PCR0, PCR1 and PCR31
20,334,638 UART: [state] Locking ICCM
20,335,751 UART: [exit] Launching FMC @ 0x40000130
20,344,424 UART:
20,344,661 UART: Running Caliptra FMC ...
20,345,757 UART:
20,345,904 UART: [state] CFI Enabled
20,354,015 UART: [fht] FMC Alias Private Key: 7
22,110,293 UART: [art] Extend RT PCRs Done
22,111,516 UART: [art] Lock RT PCRs Done
22,113,459 UART: [art] Populate DV Done
22,118,645 UART: [fht] FMC Alias Private Key: 7
22,120,176 UART: [art] Derive CDI
22,120,980 UART: [art] Store in in slot 0x4
22,163,303 UART: [art] Derive Key Pair
22,164,507 UART: [art] Store priv key in slot 0x5
24,591,822 UART: [art] Derive Key Pair - Done
24,604,866 UART: [art] Signing Cert with AUTHO
24,606,164 UART: RITY.KEYID = 7
26,311,478 UART: [art] Erasing AUTHORITY.KEYID = 7
26,312,978 UART: [art] PUB.X = DD19D9CADA3A12DED89662F27BE4D329E90C7D5507828DA85300C19A82190C78FD0532405143348260A6E99817BB7D09
26,320,210 UART: [art] PUB.Y = 7478C486CE020E3423B5B83DC5BD0E7470C3EAEFC0D43E2F80EFDDF03B8FCFFC9BCBCE6667E87D490AA7F2B6ED994835
26,327,503 UART: [art] SIG.R = 82B39AD040FE9A45F99FC8DD9535EBF97E116DFBB00B73A874AA70DCC6CD777531BD2CFA4DC8C7B2EE5A56E8E77C4D42
26,334,963 UART: [art] SIG.S = 9E8E4BF67BB8EECFDE325E5A86BC0A1BD444A2285925C13B60D8759D3FAE754F0FAC6513CF4E5798BFC14FA13EC778CA
27,314,369 UART: Caliptra RT
27,315,055 UART: [state] CFI Enabled
27,432,093 UART: [rt] RT listening for mailbox commands...
27,434,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,589,804 UART: [rt]cmd =0x41544d4e, len=14344
27,594,959 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,758,522 ready_for_fw is high
3,759,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,065,803 >>> mbox cmd response: success
20,320,088 UART:
20,320,489 UART: Running Caliptra FMC ...
20,321,792 UART:
20,321,952 UART: [state] CFI Enabled
20,329,509 UART: [fht] FMC Alias Private Key: 7
22,086,564 UART: [art] Extend RT PCRs Done
22,087,788 UART: [art] Lock RT PCRs Done
22,089,227 UART: [art] Populate DV Done
22,094,635 UART: [fht] FMC Alias Private Key: 7
22,096,341 UART: [art] Derive CDI
22,097,076 UART: [art] Store in in slot 0x4
22,139,620 UART: [art] Derive Key Pair
22,140,657 UART: [art] Store priv key in slot 0x5
24,567,006 UART: [art] Derive Key Pair - Done
24,579,517 UART: [art] Signing Cert with AUTHO
24,580,820 UART: RITY.KEYID = 7
26,285,576 UART: [art] Erasing AUTHORITY.KEYID = 7
26,287,080 UART: [art] PUB.X = F1CAA958A7662B68BA9DACD17EF75829190B59EEDA6ACC4D03DCBC2AB08D424685251FCCCC53720603EC6E5AF225E85C
26,294,438 UART: [art] PUB.Y = 96986549D84CADBD7329F9CB9BAEB3F1E20F65455B3ACF28B02B1C001AC4FD3FEF7A6147CC8E35C2C1C10020FF251AA1
26,301,628 UART: [art] SIG.R = 3774AD3C3649A7DBC3C90C41D943DB04B0DB6373D64A91AAEE0BF4B020BFA11FD2CAE33114361FEADC9F2B37326CE409
26,309,056 UART: [art] SIG.S = BACE626A24F76BC625DDDC97705660F68A996BC46F276D3A5C33583F788BD5D9809384DE7B9622790536764F9B5BECD6
27,287,426 UART: Caliptra RT
27,288,136 UART: [state] CFI Enabled
27,404,708 UART: [rt] RT listening for mailbox commands...
27,407,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,821 UART: [rt]cmd =0x41544d4e, len=14344
27,568,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,252 UART: [kat] SHA2-512-ACC
897,153 UART: [kat] ECC-384
902,702 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,553 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,458 UART: [idev] Erasing UDS.KEYID = 0
1,505,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,534 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,520,795 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,918 UART: [ldev] --
1,585,389 UART: [fwproc] Waiting for Commands...
1,586,180 UART: [fwproc] Received command 0x46574c44
1,586,971 UART: [fwproc] Received Image of size 114448 bytes
5,008,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,036,850 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,066,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,202,149 >>> mbox cmd response: success
5,203,245 UART: [afmc] ++
5,203,413 UART: [afmc] CDI.KEYID = 6
5,203,775 UART: [afmc] SUBJECT.KEYID = 7
5,204,200 UART: [afmc] AUTHORITY.KEYID = 5
5,239,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,255,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,256,706 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,262,415 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,268,307 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,274,008 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,281,846 UART: [afmc] --
5,282,736 UART: [cold-reset] --
5,283,564 UART: [state] Locking Datavault
5,284,419 UART: [state] Locking PCR0, PCR1 and PCR31
5,285,023 UART: [state] Locking ICCM
5,285,477 UART: [exit] Launching FMC @ 0x40000130
5,290,806 UART:
5,290,822 UART: Running Caliptra FMC ...
5,291,230 UART:
5,291,284 UART: [state] CFI Enabled
5,301,468 UART: [fht] FMC Alias Private Key: 7
5,409,656 UART: [art] Extend RT PCRs Done
5,410,084 UART: [art] Lock RT PCRs Done
5,411,582 UART: [art] Populate DV Done
5,419,754 UART: [fht] FMC Alias Private Key: 7
5,420,682 UART: [art] Derive CDI
5,420,962 UART: [art] Store in in slot 0x4
5,506,527 UART: [art] Derive Key Pair
5,506,887 UART: [art] Store priv key in slot 0x5
5,519,889 UART: [art] Derive Key Pair - Done
5,534,737 UART: [art] Signing Cert with AUTHO
5,535,217 UART: RITY.KEYID = 7
5,550,289 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,054 UART: [art] PUB.X = F98F85F901434DB323834E497382B6FB41A3CA184DE620B725FA86262C44DFD79EFA601A20EC2C137C9D0F95EC365139
5,557,822 UART: [art] PUB.Y = 0CFFB3D6B43EA6FC8733B6D8A614D5C5875B156D534029DC3AD5C7DF056AD8D800BE60C55A9C18740DB771BA741D5274
5,564,753 UART: [art] SIG.R = D58819DF376B721D9961690B63D8FF7ED0E6B97416ED56603A146E25E7D3AA3889BA57B7A9A51CC518FEDA232CA74434
5,571,526 UART: [art] SIG.S = 5A25C37DB2E0C6212E8909C4A8EC5FA42EC0D2B5CFA05A80A2AE58CD9DE0DDAF16A912AE5EE9E4A69D11D1AE63913D7F
5,595,066 UART: Caliptra RT
5,595,319 UART: [state] CFI Enabled
5,702,838 UART: [rt] RT listening for mailbox commands...
5,703,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,826,462 UART: [rt]cmd =0x41544d4e, len=14344
5,832,684 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 ready_for_fw is high
1,362,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,088,798 >>> mbox cmd response: success
5,149,943 UART:
5,149,959 UART: Running Caliptra FMC ...
5,150,367 UART:
5,150,421 UART: [state] CFI Enabled
5,161,039 UART: [fht] FMC Alias Private Key: 7
5,269,153 UART: [art] Extend RT PCRs Done
5,269,581 UART: [art] Lock RT PCRs Done
5,271,289 UART: [art] Populate DV Done
5,279,663 UART: [fht] FMC Alias Private Key: 7
5,280,599 UART: [art] Derive CDI
5,280,879 UART: [art] Store in in slot 0x4
5,366,346 UART: [art] Derive Key Pair
5,366,706 UART: [art] Store priv key in slot 0x5
5,380,018 UART: [art] Derive Key Pair - Done
5,394,940 UART: [art] Signing Cert with AUTHO
5,395,420 UART: RITY.KEYID = 7
5,410,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,531 UART: [art] PUB.X = F47B5C0ED37175751226DD06349B62F8D64D99B8F60737B707959A8487E816D6EC13ACDB4E18893588556A4B1FC4BA2C
5,418,289 UART: [art] PUB.Y = 9F9359449993C7360A33744F59ADF5478DA85878168902DA7D8F298FC54609866EFD870F84D2F7126BEB6383E6E1A6D5
5,425,221 UART: [art] SIG.R = 0302176E1D9485452BC0D51FEF00435942632DD8791B72A4BDB6959B9C727E7465DC4B59C50C62EB7BF54D928D4525A3
5,431,958 UART: [art] SIG.S = 43E9E7E0056E4F14B3D8D7B6A24858293A8E0C24A2C516BF3C338C5441318CEAFA16757730676D7ABA711D501D658B58
5,455,607 UART: Caliptra RT
5,455,860 UART: [state] CFI Enabled
5,564,144 UART: [rt] RT listening for mailbox commands...
5,564,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,687,772 UART: [rt]cmd =0x41544d4e, len=14344
5,694,036 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,582 UART: [kat] SHA2-256
892,520 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,559 UART: [kat] HMAC-384Kdf
907,027 UART: [kat] LMS
1,475,223 UART: [kat] --
1,475,988 UART: [cold-reset] ++
1,476,474 UART: [fht] Storing FHT @ 0x50003400
1,479,337 UART: [idev] ++
1,479,505 UART: [idev] CDI.KEYID = 6
1,479,865 UART: [idev] SUBJECT.KEYID = 7
1,480,289 UART: [idev] UDS.KEYID = 0
1,480,634 ready_for_fw is high
1,480,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,005 UART: [idev] Erasing UDS.KEYID = 0
1,504,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,595 UART: [idev] --
1,514,628 UART: [ldev] ++
1,514,796 UART: [ldev] CDI.KEYID = 6
1,515,159 UART: [ldev] SUBJECT.KEYID = 5
1,515,585 UART: [ldev] AUTHORITY.KEYID = 7
1,516,048 UART: [ldev] FE.KEYID = 1
1,521,110 UART: [ldev] Erasing FE.KEYID = 1
1,546,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,543 UART: [ldev] --
1,586,032 UART: [fwproc] Waiting for Commands...
1,586,845 UART: [fwproc] Received command 0x46574c44
1,587,636 UART: [fwproc] Received Image of size 114448 bytes
5,272,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,466,603 >>> mbox cmd response: success
5,467,721 UART: [afmc] ++
5,467,889 UART: [afmc] CDI.KEYID = 6
5,468,251 UART: [afmc] SUBJECT.KEYID = 7
5,468,676 UART: [afmc] AUTHORITY.KEYID = 5
5,503,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,520,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,521,096 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,805 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,697 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,538,398 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,546,230 UART: [afmc] --
5,547,194 UART: [cold-reset] --
5,548,210 UART: [state] Locking Datavault
5,549,613 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,217 UART: [state] Locking ICCM
5,550,747 UART: [exit] Launching FMC @ 0x40000130
5,556,076 UART:
5,556,092 UART: Running Caliptra FMC ...
5,556,500 UART:
5,556,643 UART: [state] CFI Enabled
5,566,935 UART: [fht] FMC Alias Private Key: 7
5,674,641 UART: [art] Extend RT PCRs Done
5,675,069 UART: [art] Lock RT PCRs Done
5,676,669 UART: [art] Populate DV Done
5,684,863 UART: [fht] FMC Alias Private Key: 7
5,685,919 UART: [art] Derive CDI
5,686,199 UART: [art] Store in in slot 0x4
5,772,110 UART: [art] Derive Key Pair
5,772,470 UART: [art] Store priv key in slot 0x5
5,785,984 UART: [art] Derive Key Pair - Done
5,800,747 UART: [art] Signing Cert with AUTHO
5,801,227 UART: RITY.KEYID = 7
5,816,645 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,410 UART: [art] PUB.X = 4612A25F80D1DA2938201FB2CE6D6D96A441A0CF2AB80F6D58FC5417334DCFD10FAE72AF52AE67B9E8C2539127F77EF0
5,824,188 UART: [art] PUB.Y = 22241F886A50340225D102CAC201B5DDD96CACFB126C6800399FE57E7FD651B4643FD61879871081ACE59B6FC18086B3
5,831,107 UART: [art] SIG.R = 31F71EC81229050517E59BCB3DB4723DD1F58D974CAA497923F017FFE0D51ABD3233624017D6A694DB249014C4A6ADA0
5,837,875 UART: [art] SIG.S = 79770969F3F0249D770D6B4F47C1A823A380A38DC486BC4CD312C2F47BD8C526341D7C00EACE3E5E911401A7F21131EA
5,862,233 UART: Caliptra RT
5,862,578 UART: [state] CFI Enabled
5,969,896 UART: [rt] RT listening for mailbox commands...
5,970,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,522 UART: [rt]cmd =0x41544d4e, len=14344
6,099,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,552 ready_for_fw is high
1,363,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,243,257 >>> mbox cmd response: success
5,305,230 UART:
5,305,246 UART: Running Caliptra FMC ...
5,305,654 UART:
5,305,797 UART: [state] CFI Enabled
5,316,345 UART: [fht] FMC Alias Private Key: 7
5,424,005 UART: [art] Extend RT PCRs Done
5,424,433 UART: [art] Lock RT PCRs Done
5,426,183 UART: [art] Populate DV Done
5,434,333 UART: [fht] FMC Alias Private Key: 7
5,435,295 UART: [art] Derive CDI
5,435,575 UART: [art] Store in in slot 0x4
5,521,314 UART: [art] Derive Key Pair
5,521,674 UART: [art] Store priv key in slot 0x5
5,535,426 UART: [art] Derive Key Pair - Done
5,550,073 UART: [art] Signing Cert with AUTHO
5,550,553 UART: RITY.KEYID = 7
5,565,435 UART: [art] Erasing AUTHORITY.KEYID = 7
5,566,200 UART: [art] PUB.X = EF21D4E28256778F517A28AB62C14078C39FB96EB2B2CEA941FE2D466ED10D9CD8826F57C6A95B77A9356083FD620BC6
5,572,972 UART: [art] PUB.Y = CC9EA90E8BEC926D223A1F2493F91138C6C296E1DBCBC24295E77DB6D5E82A4F2CAE4B79A2F6755426885F14E3F1EEF3
5,579,935 UART: [art] SIG.R = F24F8B5A7D3D8820A9B98FFA60A3EFF065BFDA6D50518376C16D78A544BEEA1D38E5A9D21DAE2245F95839E862BFD411
5,586,721 UART: [art] SIG.S = B760BF510193CDA547FCC189C581FDCD9690596613CFDA052BF6CC84BC4A1BE1ED3E34E684EC4BA92D8A948FB70FE16A
5,610,023 UART: Caliptra RT
5,610,368 UART: [state] CFI Enabled
5,719,132 UART: [rt] RT listening for mailbox commands...
5,719,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,844 UART: [rt]cmd =0x41544d4e, len=14344
5,849,048 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
892,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,991 UART: [kat] ++
897,143 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,655 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,954 UART: [idev] ++
1,175,122 UART: [idev] CDI.KEYID = 6
1,175,482 UART: [idev] SUBJECT.KEYID = 7
1,175,906 UART: [idev] UDS.KEYID = 0
1,176,251 ready_for_fw is high
1,176,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,906 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,863 UART: [ldev] ++
1,211,031 UART: [ldev] CDI.KEYID = 6
1,211,394 UART: [ldev] SUBJECT.KEYID = 5
1,211,820 UART: [ldev] AUTHORITY.KEYID = 7
1,212,283 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,465 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,304 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,663 >>> mbox cmd response: success
3,318,701 UART: [afmc] ++
3,318,869 UART: [afmc] CDI.KEYID = 6
3,319,231 UART: [afmc] SUBJECT.KEYID = 7
3,319,656 UART: [afmc] AUTHORITY.KEYID = 5
3,355,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,549 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,258 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,150 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,861 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,748 UART: [afmc] --
3,398,788 UART: [cold-reset] --
3,399,554 UART: [state] Locking Datavault
3,400,905 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,509 UART: [state] Locking ICCM
3,402,099 UART: [exit] Launching FMC @ 0x40000130
3,407,428 UART:
3,407,444 UART: Running Caliptra FMC ...
3,407,852 UART:
3,407,906 UART: [state] CFI Enabled
3,418,634 UART: [fht] FMC Alias Private Key: 7
3,527,094 UART: [art] Extend RT PCRs Done
3,527,522 UART: [art] Lock RT PCRs Done
3,529,084 UART: [art] Populate DV Done
3,537,384 UART: [fht] FMC Alias Private Key: 7
3,538,480 UART: [art] Derive CDI
3,538,760 UART: [art] Store in in slot 0x4
3,624,501 UART: [art] Derive Key Pair
3,624,861 UART: [art] Store priv key in slot 0x5
3,638,067 UART: [art] Derive Key Pair - Done
3,652,792 UART: [art] Signing Cert with AUTHO
3,653,272 UART: RITY.KEYID = 7
3,668,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,985 UART: [art] PUB.X = 92AAD07E452DDE19892E9FB3698ED480484926C461EE4E3EC7378AF519D4A46408B71BCBFD9D94D10C19D84505F5A0D4
3,675,754 UART: [art] PUB.Y = ED246D82ABD87E8036016EF4A52E2F33330C3093DB8B3094881B5382EDCE72C6D936FC10DE6A9E83FFB89C8FC7160CB8
3,682,707 UART: [art] SIG.R = 740A8395C7E1C5AEEBF1DCF721D3C0A92889FB4CD7268FC91E0C09BCA33C51AFEF6D0E1704673D57EAB04785F31BC79B
3,689,482 UART: [art] SIG.S = 2A4CC99056B360A41766A5226EC59DAA79D5B2A1197E5CCB53E74878E40A46482D521BAC3975921142FFD9AE030091FE
3,712,697 UART: Caliptra RT
3,712,950 UART: [state] CFI Enabled
3,820,971 UART: [rt] RT listening for mailbox commands...
3,821,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,671 UART: [rt]cmd =0x41544d4e, len=14344
3,950,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,923 ready_for_fw is high
1,060,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,175,054 >>> mbox cmd response: success
3,237,183 UART:
3,237,199 UART: Running Caliptra FMC ...
3,237,607 UART:
3,237,661 UART: [state] CFI Enabled
3,248,371 UART: [fht] FMC Alias Private Key: 7
3,355,893 UART: [art] Extend RT PCRs Done
3,356,321 UART: [art] Lock RT PCRs Done
3,357,575 UART: [art] Populate DV Done
3,366,035 UART: [fht] FMC Alias Private Key: 7
3,367,085 UART: [art] Derive CDI
3,367,365 UART: [art] Store in in slot 0x4
3,453,554 UART: [art] Derive Key Pair
3,453,914 UART: [art] Store priv key in slot 0x5
3,466,804 UART: [art] Derive Key Pair - Done
3,481,335 UART: [art] Signing Cert with AUTHO
3,481,815 UART: RITY.KEYID = 7
3,497,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,766 UART: [art] PUB.X = 2C8AF2FEC399CB0490637C6154BF1A15DE02012A5359E7FE00DD5E1F47A87A9A055ADD7C8433361E7EA4A5EA682AAA82
3,504,516 UART: [art] PUB.Y = 18C9271B1C73177215064B03C7A3C3DFC0FFC484DC97D3FB2147636B1E6CDE1DF59ED61998379C3449EE6DE919E0CE65
3,511,468 UART: [art] SIG.R = 7B4A9FA23E53C949D213D1CCD6AC47F9E9DBD6FB147699F60A16C31A70DB5D408FDF4AA2C6D6CADFF7E7B38449A48CDA
3,518,263 UART: [art] SIG.S = 825233AF926810DE38B156105633F157349FCE71DFAD07818CC80B2404AA6B72132977C7B6D119A2C783B2CC05EC34CE
3,541,812 UART: Caliptra RT
3,542,065 UART: [state] CFI Enabled
3,650,231 UART: [rt] RT listening for mailbox commands...
3,650,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,289 UART: [rt]cmd =0x41544d4e, len=14344
3,780,771 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
917,927 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,171,850 UART: [cold-reset] ++
1,172,230 UART: [fht] FHT @ 0x50003400
1,175,119 UART: [idev] ++
1,175,287 UART: [idev] CDI.KEYID = 6
1,175,647 UART: [idev] SUBJECT.KEYID = 7
1,176,071 UART: [idev] UDS.KEYID = 0
1,176,416 ready_for_fw is high
1,176,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,057 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,842 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,544 UART: [ldev] Erasing FE.KEYID = 1
1,243,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,754 UART: [ldev] --
1,283,243 UART: [fwproc] Wait for Commands...
1,283,873 UART: [fwproc] Recv command 0x46574c44
1,284,601 UART: [fwproc] Recv'd Img size: 114448 bytes
3,116,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,309,756 >>> mbox cmd response: success
3,310,860 UART: [afmc] ++
3,311,028 UART: [afmc] CDI.KEYID = 6
3,311,390 UART: [afmc] SUBJECT.KEYID = 7
3,311,815 UART: [afmc] AUTHORITY.KEYID = 5
3,347,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,068 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,777 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,669 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,380 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,217 UART: [afmc] --
3,390,187 UART: [cold-reset] --
3,391,013 UART: [state] Locking Datavault
3,392,314 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,918 UART: [state] Locking ICCM
3,393,472 UART: [exit] Launching FMC @ 0x40000130
3,398,801 UART:
3,398,817 UART: Running Caliptra FMC ...
3,399,225 UART:
3,399,368 UART: [state] CFI Enabled
3,410,100 UART: [fht] FMC Alias Private Key: 7
3,518,146 UART: [art] Extend RT PCRs Done
3,518,574 UART: [art] Lock RT PCRs Done
3,520,118 UART: [art] Populate DV Done
3,528,340 UART: [fht] FMC Alias Private Key: 7
3,529,268 UART: [art] Derive CDI
3,529,548 UART: [art] Store in in slot 0x4
3,615,189 UART: [art] Derive Key Pair
3,615,549 UART: [art] Store priv key in slot 0x5
3,628,617 UART: [art] Derive Key Pair - Done
3,643,399 UART: [art] Signing Cert with AUTHO
3,643,879 UART: RITY.KEYID = 7
3,658,727 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,492 UART: [art] PUB.X = D7F1BD4BA74922EE3FC7CDC84156759CC2F13F85B294FB68061D1B2531E09450D0A88DD426541C83FB2539CA601D1EAE
3,666,269 UART: [art] PUB.Y = ED564B23D9867314367029C9994058B7C35AB28480929BDF3BE5C0CC42889AF759EAF26EB47D847BC49EC3D0A165817E
3,673,221 UART: [art] SIG.R = 2BDDC048BCB2F349FCF00EDD30A4AB2AA6C25CEF9A6F495C1827B7C2E29D4C8FC10D7155C0C1D603A5A5BBBABC13E7C9
3,680,014 UART: [art] SIG.S = A0E437E3378A689912C08D270DA89550B16EF3F23921BF80AD960C05BB5EBA5E7717C0818DE29075472747A8F64A3E4D
3,703,032 UART: Caliptra RT
3,703,377 UART: [state] CFI Enabled
3,811,281 UART: [rt] RT listening for mailbox commands...
3,811,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,785 UART: [rt]cmd =0x41544d4e, len=14344
3,940,741 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,710 ready_for_fw is high
1,060,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,179,871 >>> mbox cmd response: success
3,242,162 UART:
3,242,178 UART: Running Caliptra FMC ...
3,242,586 UART:
3,242,729 UART: [state] CFI Enabled
3,253,383 UART: [fht] FMC Alias Private Key: 7
3,361,573 UART: [art] Extend RT PCRs Done
3,362,001 UART: [art] Lock RT PCRs Done
3,363,461 UART: [art] Populate DV Done
3,371,655 UART: [fht] FMC Alias Private Key: 7
3,372,699 UART: [art] Derive CDI
3,372,979 UART: [art] Store in in slot 0x4
3,457,926 UART: [art] Derive Key Pair
3,458,286 UART: [art] Store priv key in slot 0x5
3,471,306 UART: [art] Derive Key Pair - Done
3,486,100 UART: [art] Signing Cert with AUTHO
3,486,580 UART: RITY.KEYID = 7
3,502,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,777 UART: [art] PUB.X = 2549B8E58E78E5DCD46111B014E14E4D688C616FADBD02CEF46E77D1F6D620A0882AA3BA6D0490393F5DFA676DE5F1E0
3,509,555 UART: [art] PUB.Y = BBB89364E88D4912E1A6D21824E71FF9C4507073C322C865E87434AA7B0D57557B3BEF8C13141BD80B5B132B5C455673
3,516,497 UART: [art] SIG.R = A3CBBA9A6C031B45E1659B98EC1343D470458F01EACE56A4052B16B831301234FD984F643BA0CCD9E70E6009E5D01159
3,523,256 UART: [art] SIG.S = 6249CFD8C8C8A1E13700899043AD4C70F4952FC76FEA1978982CA785647BC4D1FDEBD2214CB889B9EA588A61291E1361
3,547,177 UART: Caliptra RT
3,547,522 UART: [state] CFI Enabled
3,655,454 UART: [rt] RT listening for mailbox commands...
3,656,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,018 UART: [rt]cmd =0x41544d4e, len=14344
3,785,458 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,719 UART: [idev] ++
1,173,887 UART: [idev] CDI.KEYID = 6
1,174,248 UART: [idev] SUBJECT.KEYID = 7
1,174,673 UART: [idev] UDS.KEYID = 0
1,175,019 ready_for_fw is high
1,175,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,523 UART: [idev] Erasing UDS.KEYID = 0
1,199,855 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,834 UART: [ldev] ++
1,210,002 UART: [ldev] CDI.KEYID = 6
1,210,366 UART: [ldev] SUBJECT.KEYID = 5
1,210,793 UART: [ldev] AUTHORITY.KEYID = 7
1,211,256 UART: [ldev] FE.KEYID = 1
1,216,286 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,156 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,314,243 >>> mbox cmd response: success
3,315,310 UART: [afmc] ++
3,315,478 UART: [afmc] CDI.KEYID = 6
3,315,841 UART: [afmc] SUBJECT.KEYID = 7
3,316,267 UART: [afmc] AUTHORITY.KEYID = 5
3,351,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,868 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,578 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,179 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,929 UART: [afmc] --
3,393,931 UART: [cold-reset] --
3,394,741 UART: [state] Locking Datavault
3,395,670 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,274 UART: [state] Locking ICCM
3,396,858 UART: [exit] Launching FMC @ 0x40000130
3,402,187 UART:
3,402,203 UART: Running Caliptra FMC ...
3,402,611 UART:
3,402,665 UART: [state] CFI Enabled
3,412,889 UART: [fht] FMC Alias Private Key: 7
3,521,469 UART: [art] Extend RT PCRs Done
3,521,897 UART: [art] Lock RT PCRs Done
3,523,525 UART: [art] Populate DV Done
3,531,865 UART: [fht] FMC Alias Private Key: 7
3,532,885 UART: [art] Derive CDI
3,533,165 UART: [art] Store in in slot 0x4
3,618,900 UART: [art] Derive Key Pair
3,619,260 UART: [art] Store priv key in slot 0x5
3,631,782 UART: [art] Derive Key Pair - Done
3,646,685 UART: [art] Signing Cert with AUTHO
3,647,165 UART: RITY.KEYID = 7
3,662,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,232 UART: [art] PUB.X = 92DC8A7875C7F75BEB9F6EACDF7B21DBEA825F571437218E12090A1F248AD6B5DAB65B6C05D284436424986EA6794640
3,669,999 UART: [art] PUB.Y = 8EFEF66B2FE64666F9F8109D9CB393EC86E09E2C9B06672B2FC3336953D2E34BEE3F05B5EA16B2044605119BA49C94CC
3,676,947 UART: [art] SIG.R = 31E436BC04AE666A932F4EB333BAA0C895204FC9FE991CEAEA71323CFA1461CBC998D0903FC9EA94E3B3A51AF1BB37E5
3,683,734 UART: [art] SIG.S = 7853D819C2E44014254A6D8CD71876F5172F00B609CE5D9B10783EE8EC146B4EB8A5FDB4B1C4BFF8958249D857389801
3,707,833 UART: Caliptra RT
3,708,086 UART: [state] CFI Enabled
3,816,117 UART: [rt] RT listening for mailbox commands...
3,816,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,773 UART: [rt]cmd =0x41544d4e, len=14344
3,946,425 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,468 ready_for_fw is high
1,056,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,755 >>> mbox cmd response: success
3,235,726 UART:
3,235,742 UART: Running Caliptra FMC ...
3,236,150 UART:
3,236,204 UART: [state] CFI Enabled
3,246,414 UART: [fht] FMC Alias Private Key: 7
3,354,696 UART: [art] Extend RT PCRs Done
3,355,124 UART: [art] Lock RT PCRs Done
3,356,846 UART: [art] Populate DV Done
3,364,948 UART: [fht] FMC Alias Private Key: 7
3,366,002 UART: [art] Derive CDI
3,366,282 UART: [art] Store in in slot 0x4
3,451,835 UART: [art] Derive Key Pair
3,452,195 UART: [art] Store priv key in slot 0x5
3,465,329 UART: [art] Derive Key Pair - Done
3,480,162 UART: [art] Signing Cert with AUTHO
3,480,642 UART: RITY.KEYID = 7
3,495,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,687 UART: [art] PUB.X = D8E9EF4955C6D2F6D8C2CA0D23B2AD936D127907B3D560C03F51D361761A1422715DEEE602DA345B6A4CE1E881F49AE6
3,503,458 UART: [art] PUB.Y = 61A35762C13E2ADF7959C697604B4C3F90F01E959808D9A87E94182D5433D8E76E5A3E12C84893FC600ADCD6D7B934D4
3,510,402 UART: [art] SIG.R = 649991D224BBEC80609D16D599BBEAAF34FA6D814EC58D4E2EEE54DEC9963FF918EF72D980132EBE67130178E54BEB84
3,517,183 UART: [art] SIG.S = BA24C17FE50A0B6661BC1475F76E48D6CE9D9380D627C07CA7391FF965D646EEDB741018D295ED06E8A562F3427A3E1A
3,540,641 UART: Caliptra RT
3,540,894 UART: [state] CFI Enabled
3,649,314 UART: [rt] RT listening for mailbox commands...
3,649,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,824 UART: [rt]cmd =0x41544d4e, len=14344
3,778,912 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,848 UART: [kat] ++
896,000 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 ready_for_fw is high
1,174,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,828 UART: [idev] Erasing UDS.KEYID = 0
1,198,776 UART: [idev] Sha1 KeyId Algorithm
1,207,498 UART: [idev] --
1,208,653 UART: [ldev] ++
1,208,821 UART: [ldev] CDI.KEYID = 6
1,209,185 UART: [ldev] SUBJECT.KEYID = 5
1,209,612 UART: [ldev] AUTHORITY.KEYID = 7
1,210,075 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,207 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,061 >>> mbox cmd response: success
3,314,300 UART: [afmc] ++
3,314,468 UART: [afmc] CDI.KEYID = 6
3,314,831 UART: [afmc] SUBJECT.KEYID = 7
3,315,257 UART: [afmc] AUTHORITY.KEYID = 5
3,351,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,068 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,778 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,668 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,379 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,123 UART: [afmc] --
3,395,143 UART: [cold-reset] --
3,395,833 UART: [state] Locking Datavault
3,396,942 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,546 UART: [state] Locking ICCM
3,398,062 UART: [exit] Launching FMC @ 0x40000130
3,403,391 UART:
3,403,407 UART: Running Caliptra FMC ...
3,403,815 UART:
3,403,958 UART: [state] CFI Enabled
3,414,124 UART: [fht] FMC Alias Private Key: 7
3,521,824 UART: [art] Extend RT PCRs Done
3,522,252 UART: [art] Lock RT PCRs Done
3,523,672 UART: [art] Populate DV Done
3,531,832 UART: [fht] FMC Alias Private Key: 7
3,532,838 UART: [art] Derive CDI
3,533,118 UART: [art] Store in in slot 0x4
3,618,839 UART: [art] Derive Key Pair
3,619,199 UART: [art] Store priv key in slot 0x5
3,632,587 UART: [art] Derive Key Pair - Done
3,647,407 UART: [art] Signing Cert with AUTHO
3,647,887 UART: RITY.KEYID = 7
3,662,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,670 UART: [art] PUB.X = 278C9A03E6C9BB59F7BBC0238771C276530B5713139A50D30CC2E70443FC31A983F24DDF7CB93FE27BE676BD7DFE3206
3,670,433 UART: [art] PUB.Y = 883DD45FF6770172CDA57FF5A4E73996627B13094539C361C8030D1840CDEB60D052B7E68F61C89D9C4C9A42BFEC2426
3,677,373 UART: [art] SIG.R = 7F3284CCEB81E78AC975E43FD148F4DF4B9FAF14E199D333A196D8254E8866C34E558128227E44CF98DD9EC4243E4515
3,684,147 UART: [art] SIG.S = FEB838A0D839BC9DA6EF286387CA4E508CFA7766C94EE383CC034CF0565CEAD30D3FF9236E6BD876948CA01A06218DC3
3,707,693 UART: Caliptra RT
3,708,038 UART: [state] CFI Enabled
3,815,502 UART: [rt] RT listening for mailbox commands...
3,816,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,180 UART: [rt]cmd =0x41544d4e, len=14344
3,945,408 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 ready_for_fw is high
1,056,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,951 >>> mbox cmd response: success
3,233,090 UART:
3,233,106 UART: Running Caliptra FMC ...
3,233,514 UART:
3,233,657 UART: [state] CFI Enabled
3,244,181 UART: [fht] FMC Alias Private Key: 7
3,351,815 UART: [art] Extend RT PCRs Done
3,352,243 UART: [art] Lock RT PCRs Done
3,353,729 UART: [art] Populate DV Done
3,361,753 UART: [fht] FMC Alias Private Key: 7
3,362,841 UART: [art] Derive CDI
3,363,121 UART: [art] Store in in slot 0x4
3,448,904 UART: [art] Derive Key Pair
3,449,264 UART: [art] Store priv key in slot 0x5
3,462,722 UART: [art] Derive Key Pair - Done
3,477,289 UART: [art] Signing Cert with AUTHO
3,477,769 UART: RITY.KEYID = 7
3,493,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,938 UART: [art] PUB.X = 2E864E8BC46B37837FB60F6A1A45F4C233A6E58A2B1E70BBB6897D53A9EB0FD8B7FE213473E612A2B953084D75DEC0EB
3,500,713 UART: [art] PUB.Y = 0FBE780BE18DA41F476B531D33438A4468D62D6CDCBCA1A8E3E3C6BBB700C4265BA3E566172CD5382D6798B72CEAFE23
3,507,651 UART: [art] SIG.R = 173DDB0D940A25E817B41D3518A58570B0DD1C9ED483152F2D79FE53ECD5F7423A3AD4CC3B6EC0C3D1C960F33885082F
3,514,422 UART: [art] SIG.S = 5EAB64BCDB66E23C458346627C2396764A6F4EABB23586B32A10545CDECC33AA4DCDBE8284607F2BFD16B92A7EAF6EF0
3,538,443 UART: Caliptra RT
3,538,788 UART: [state] CFI Enabled
3,646,225 UART: [rt] RT listening for mailbox commands...
3,646,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,165 UART: [rt]cmd =0x41544d4e, len=14344
3,776,557 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,007 UART:
192,376 UART: Running Caliptra ROM ...
193,539 UART:
193,692 UART: [state] CFI Enabled
265,336 UART: [state] LifecycleState = Unprovisioned
267,275 UART: [state] DebugLocked = No
269,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,767 UART: [kat] SHA2-256
444,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,977 UART: [kat] ++
455,455 UART: [kat] sha1
465,193 UART: [kat] SHA2-256
467,917 UART: [kat] SHA2-384
474,688 UART: [kat] SHA2-512-ACC
477,055 UART: [kat] ECC-384
2,767,988 UART: [kat] HMAC-384Kdf
2,799,548 UART: [kat] LMS
3,989,810 UART: [kat] --
3,995,198 UART: [cold-reset] ++
3,997,061 UART: [fht] Storing FHT @ 0x50003400
4,009,748 UART: [idev] ++
4,010,316 UART: [idev] CDI.KEYID = 6
4,011,233 UART: [idev] SUBJECT.KEYID = 7
4,012,480 UART: [idev] UDS.KEYID = 0
4,013,544 ready_for_fw is high
4,013,753 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,265 UART: [idev] Erasing UDS.KEYID = 0
7,348,242 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,451 UART: [idev] --
7,372,634 UART: [ldev] ++
7,373,202 UART: [ldev] CDI.KEYID = 6
7,374,168 UART: [ldev] SUBJECT.KEYID = 5
7,375,382 UART: [ldev] AUTHORITY.KEYID = 7
7,376,615 UART: [ldev] FE.KEYID = 1
7,422,662 UART: [ldev] Erasing FE.KEYID = 1
10,756,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,928 UART: [ldev] --
13,118,278 UART: [fwproc] Waiting for Commands...
13,119,941 UART: [fwproc] Received command 0x46574c44
13,122,170 UART: [fwproc] Received Image of size 114124 bytes
22,230,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,305,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,374,162 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,691,628 >>> mbox cmd response: success
22,696,572 UART: [afmc] ++
22,697,183 UART: [afmc] CDI.KEYID = 6
22,698,096 UART: [afmc] SUBJECT.KEYID = 7
22,699,381 UART: [afmc] AUTHORITY.KEYID = 5
26,059,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,364,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,366,878 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,381,433 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,396,179 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,410,392 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,432,876 UART: [afmc] --
28,436,290 UART: [cold-reset] --
28,439,724 UART: [state] Locking Datavault
28,443,671 UART: [state] Locking PCR0, PCR1 and PCR31
28,445,419 UART: [state] Locking ICCM
28,447,207 UART: [exit] Launching FMC @ 0x40000130
28,455,602 UART:
28,455,835 UART: Running Caliptra FMC ...
28,456,952 UART:
28,457,118 UART: [state] CFI Enabled
28,523,732 UART: [fht] FMC Alias Private Key: 7
30,861,968 UART: [art] Extend RT PCRs Done
30,863,188 UART: [art] Lock RT PCRs Done
30,865,108 UART: [art] Populate DV Done
30,870,520 UART: [fht] FMC Alias Private Key: 7
30,872,002 UART: [art] Derive CDI
30,872,741 UART: [art] Store in in slot 0x4
30,931,516 UART: [art] Derive Key Pair
30,932,579 UART: [art] Store priv key in slot 0x5
34,224,805 UART: [art] Derive Key Pair - Done
34,237,796 UART: [art] Signing Cert with AUTHO
34,239,103 UART: RITY.KEYID = 7
36,525,751 UART: [art] Erasing AUTHORITY.KEYID = 7
36,527,295 UART: [art] PUB.X = F2F526DC2BBE9283D59DFE023F7F41B175D85C9F3ED4D5DD2D0185B85A71DC5C7288C68067A06E8548A9E228603FCEF7
36,534,517 UART: [art] PUB.Y = B7971087F6E068D10AAD72FE8599FE34B187153CFCE594B68F302E69C7E747FFA7D2087C2A16D570DA50CA04C8E654C9
36,541,719 UART: [art] SIG.R = C671B5A6335BF9A2FEA4B93918E1B2A404456ED70A9F592A7A5AE65CE55906905D0F0DE6BCB39D1FE307DA2E9FAC26A7
36,549,113 UART: [art] SIG.S = DFAA893ECAFFA02909C074F997AADB620D53AC8928BCCFA62CA9BAE30A9B3E777EB016B1F693B2DF0FFB41B8F82B57B9
37,853,817 UART: Caliptra RT
37,854,527 UART: [state] CFI Enabled
38,019,556 UART: [rt] RT listening for mailbox commands...
38,021,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,177,379 UART: [rt]cmd =0x41544d4e, len=14344
39,470,285 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,806,106 ready_for_fw is high
3,806,485 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,918,210 >>> mbox cmd response: success
27,619,276 UART:
27,619,683 UART: Running Caliptra FMC ...
27,620,822 UART:
27,620,984 UART: [state] CFI Enabled
27,685,825 UART: [fht] FMC Alias Private Key: 7
30,023,768 UART: [art] Extend RT PCRs Done
30,025,006 UART: [art] Lock RT PCRs Done
30,026,599 UART: [art] Populate DV Done
30,031,968 UART: [fht] FMC Alias Private Key: 7
30,033,624 UART: [art] Derive CDI
30,034,448 UART: [art] Store in in slot 0x4
30,094,167 UART: [art] Derive Key Pair
30,095,219 UART: [art] Store priv key in slot 0x5
33,387,872 UART: [art] Derive Key Pair - Done
33,400,982 UART: [art] Signing Cert with AUTHO
33,402,295 UART: RITY.KEYID = 7
35,689,778 UART: [art] Erasing AUTHORITY.KEYID = 7
35,691,310 UART: [art] PUB.X = D8850386B2D483676409963AD4F4BCAE6266BC0D0AA3CDD646B14404954E7F7B503750D1D862A69EF12BAC869185F2A9
35,698,518 UART: [art] PUB.Y = EC4EC6A89FD6293D48C0A4D107DB437EDD78F01B0D82F2644A3F99BC71260EFB1BD98D41D1D3187D37AC851E8BBA302E
35,705,783 UART: [art] SIG.R = 8BF59660B95FE1C67EBDD7562DB152C7EA940DCC3DF9C51370A92213B7872D74FA0D370EC6CE09B5B2839B91762CCCFD
35,713,176 UART: [art] SIG.S = D3512C20C1E607021E80B821DB40B636C6413BF8B6EE623EF62E37DA8C02350A9E19F75AF7FF8D4A0B735F52F7A89C60
37,018,321 UART: Caliptra RT
37,019,020 UART: [state] CFI Enabled
37,178,608 UART: [rt] RT listening for mailbox commands...
37,180,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,336,128 UART: [rt]cmd =0x41544d4e, len=14344
38,629,033 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,537 UART:
192,891 UART: Running Caliptra ROM ...
194,083 UART:
603,537 UART: [state] CFI Enabled
614,215 UART: [state] LifecycleState = Unprovisioned
616,098 UART: [state] DebugLocked = No
618,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,243 UART: [kat] SHA2-256
792,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,509 UART: [kat] ++
803,949 UART: [kat] sha1
814,692 UART: [kat] SHA2-256
817,408 UART: [kat] SHA2-384
823,528 UART: [kat] SHA2-512-ACC
825,898 UART: [kat] ECC-384
3,110,215 UART: [kat] HMAC-384Kdf
3,121,568 UART: [kat] LMS
4,311,681 UART: [kat] --
4,318,122 UART: [cold-reset] ++
4,320,411 UART: [fht] Storing FHT @ 0x50003400
4,331,459 UART: [idev] ++
4,332,030 UART: [idev] CDI.KEYID = 6
4,332,939 UART: [idev] SUBJECT.KEYID = 7
4,334,178 UART: [idev] UDS.KEYID = 0
4,335,267 ready_for_fw is high
4,335,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,861 UART: [idev] Erasing UDS.KEYID = 0
7,620,167 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,975 UART: [idev] --
7,645,479 UART: [ldev] ++
7,646,096 UART: [ldev] CDI.KEYID = 6
7,647,033 UART: [ldev] SUBJECT.KEYID = 5
7,648,239 UART: [ldev] AUTHORITY.KEYID = 7
7,649,519 UART: [ldev] FE.KEYID = 1
7,663,269 UART: [ldev] Erasing FE.KEYID = 1
10,953,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,596 UART: [ldev] --
13,315,852 UART: [fwproc] Waiting for Commands...
13,317,671 UART: [fwproc] Received command 0x46574c44
13,319,870 UART: [fwproc] Received Image of size 114124 bytes
22,511,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,586,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,655,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,972,487 >>> mbox cmd response: success
22,976,431 UART: [afmc] ++
22,977,024 UART: [afmc] CDI.KEYID = 6
22,977,937 UART: [afmc] SUBJECT.KEYID = 7
22,979,205 UART: [afmc] AUTHORITY.KEYID = 5
26,299,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,593,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,595,688 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,610,263 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,625,016 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,639,269 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,661,856 UART: [afmc] --
28,664,818 UART: [cold-reset] --
28,669,327 UART: [state] Locking Datavault
28,673,383 UART: [state] Locking PCR0, PCR1 and PCR31
28,675,140 UART: [state] Locking ICCM
28,677,013 UART: [exit] Launching FMC @ 0x40000130
28,685,356 UART:
28,685,588 UART: Running Caliptra FMC ...
28,686,685 UART:
28,686,842 UART: [state] CFI Enabled
28,695,178 UART: [fht] FMC Alias Private Key: 7
31,026,052 UART: [art] Extend RT PCRs Done
31,027,274 UART: [art] Lock RT PCRs Done
31,028,655 UART: [art] Populate DV Done
31,034,181 UART: [fht] FMC Alias Private Key: 7
31,035,718 UART: [art] Derive CDI
31,036,533 UART: [art] Store in in slot 0x4
31,079,038 UART: [art] Derive Key Pair
31,080,044 UART: [art] Store priv key in slot 0x5
34,321,678 UART: [art] Derive Key Pair - Done
34,334,690 UART: [art] Signing Cert with AUTHO
34,335,998 UART: RITY.KEYID = 7
36,615,839 UART: [art] Erasing AUTHORITY.KEYID = 7
36,617,349 UART: [art] PUB.X = 1E3ADF1E45092B13B88963BD0BAF6865BE74022567E5243B72DE7F983F496B7E32A679A3FEB0491E35E6C8B882855691
36,624,619 UART: [art] PUB.Y = AB53658DA73AE00D00208A56E8A7B25E1B9B491F092284A12F409768F9D5463DB07982B4D609D3315DE9A46B57C450C6
36,631,791 UART: [art] SIG.R = 3D1EE690691C08F470977C13E1B232D9D25408AF1B987744CB7D1B874326661DA7EB3C73C83F9550E6060647D0F8F01C
36,639,173 UART: [art] SIG.S = 1004DD7BAF29D3C75B50E9B031CA0CCDF5EEB1DCEF4D866CD32B8764CE77DCC6B23E27FF8858F70980E8C47E22A61727
37,944,418 UART: Caliptra RT
37,945,105 UART: [state] CFI Enabled
38,062,165 UART: [rt] RT listening for mailbox commands...
38,064,625 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,219,904 UART: [rt]cmd =0x41544d4e, len=14344
39,512,807 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
4,130,997 ready_for_fw is high
4,131,385 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,048,429 >>> mbox cmd response: success
27,691,340 UART:
27,691,730 UART: Running Caliptra FMC ...
27,692,824 UART:
27,692,971 UART: [state] CFI Enabled
27,700,585 UART: [fht] FMC Alias Private Key: 7
30,031,272 UART: [art] Extend RT PCRs Done
30,032,507 UART: [art] Lock RT PCRs Done
30,034,053 UART: [art] Populate DV Done
30,039,786 UART: [fht] FMC Alias Private Key: 7
30,041,384 UART: [art] Derive CDI
30,042,201 UART: [art] Store in in slot 0x4
30,084,914 UART: [art] Derive Key Pair
30,085,981 UART: [art] Store priv key in slot 0x5
33,328,264 UART: [art] Derive Key Pair - Done
33,341,321 UART: [art] Signing Cert with AUTHO
33,342,625 UART: RITY.KEYID = 7
35,621,940 UART: [art] Erasing AUTHORITY.KEYID = 7
35,623,447 UART: [art] PUB.X = DDE52F816C82FEDB3F39B4B9C73703512AD1ECCA96ABDDA1F86B075C4248C4D8B8AD20C95049ED60E737E6452D28FBD4
35,630,724 UART: [art] PUB.Y = C3F5DBFB80C35AEF22A82BAA0BA9816DC1021842E12DEDAE73A662A63ACD8DA4BD4C1E2177CF38467BD34DC10EEABE99
35,637,992 UART: [art] SIG.R = D1DE7C36A0333456E9A29AB9732EAF3EBD6836642B9587CFC7D2CE30D2D13F6EDE32397F9CCFC87F01DD530CF5EE3871
35,645,429 UART: [art] SIG.S = 2631D5B09E90BF5C2FA771DD5F9F798510783F53B4F4DC41BD518CA91647D0B9DC06A8F75643E08544F7586ED4545DB5
36,950,819 UART: Caliptra RT
36,951,534 UART: [state] CFI Enabled
37,070,042 UART: [rt] RT listening for mailbox commands...
37,072,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,227,794 UART: [rt]cmd =0x41544d4e, len=14344
38,521,211 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,127 UART:
192,491 UART: Running Caliptra ROM ...
193,672 UART:
193,822 UART: [state] CFI Enabled
263,030 UART: [state] LifecycleState = Unprovisioned
264,885 UART: [state] DebugLocked = No
267,278 UART: [state] WD Timer not started. Device not locked for debugging
271,598 UART: [kat] SHA2-256
450,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,311 UART: [kat] ++
462,836 UART: [kat] sha1
473,433 UART: [kat] SHA2-256
476,501 UART: [kat] SHA2-384
481,207 UART: [kat] SHA2-512-ACC
484,217 UART: [kat] ECC-384
2,928,743 UART: [kat] HMAC-384Kdf
2,951,981 UART: [kat] LMS
3,481,427 UART: [kat] --
3,486,378 UART: [cold-reset] ++
3,488,312 UART: [fht] FHT @ 0x50003400
3,499,220 UART: [idev] ++
3,499,790 UART: [idev] CDI.KEYID = 6
3,500,777 UART: [idev] SUBJECT.KEYID = 7
3,501,948 UART: [idev] UDS.KEYID = 0
3,503,028 ready_for_fw is high
3,503,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,482 UART: [idev] Erasing UDS.KEYID = 0
6,022,756 UART: [idev] Sha1 KeyId Algorithm
6,045,715 UART: [idev] --
6,049,921 UART: [ldev] ++
6,050,491 UART: [ldev] CDI.KEYID = 6
6,051,425 UART: [ldev] SUBJECT.KEYID = 5
6,052,533 UART: [ldev] AUTHORITY.KEYID = 7
6,053,872 UART: [ldev] FE.KEYID = 1
6,093,961 UART: [ldev] Erasing FE.KEYID = 1
8,610,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,364,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,380,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,839 UART: [ldev] --
10,420,029 UART: [fwproc] Wait for Commands...
10,421,952 UART: [fwproc] Recv command 0x46574c44
10,424,055 UART: [fwproc] Recv'd Img size: 114448 bytes
15,013,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,092,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,161,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,479,294 >>> mbox cmd response: success
15,483,300 UART: [afmc] ++
15,483,895 UART: [afmc] CDI.KEYID = 6
15,484,810 UART: [afmc] SUBJECT.KEYID = 7
15,486,023 UART: [afmc] AUTHORITY.KEYID = 5
18,012,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,732,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,734,794 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,750,771 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,766,733 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,782,517 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,806,263 UART: [afmc] --
19,809,642 UART: [cold-reset] --
19,812,312 UART: [state] Locking Datavault
19,815,933 UART: [state] Locking PCR0, PCR1 and PCR31
19,817,575 UART: [state] Locking ICCM
19,818,612 UART: [exit] Launching FMC @ 0x40000130
19,827,004 UART:
19,827,238 UART: Running Caliptra FMC ...
19,828,337 UART:
19,828,498 UART: [state] CFI Enabled
19,891,253 UART: [fht] FMC Alias Private Key: 7
21,655,112 UART: [art] Extend RT PCRs Done
21,656,319 UART: [art] Lock RT PCRs Done
21,658,266 UART: [art] Populate DV Done
21,663,508 UART: [fht] FMC Alias Private Key: 7
21,664,988 UART: [art] Derive CDI
21,665,749 UART: [art] Store in in slot 0x4
21,724,137 UART: [art] Derive Key Pair
21,725,175 UART: [art] Store priv key in slot 0x5
24,188,214 UART: [art] Derive Key Pair - Done
24,201,097 UART: [art] Signing Cert with AUTHO
24,202,423 UART: RITY.KEYID = 7
25,914,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,915,876 UART: [art] PUB.X = ED48BCE0A83E1654BA3C4C8B9A443F8A79710FBABE8525C787811B2BF889D1A7212A0B6248E0BDF49C485E09C9857BB5
25,923,168 UART: [art] PUB.Y = BE9A1C7687DD2A16439A2EF0589102A1BC690273F7A8B6575FE9374C6DED454623A82A59FDD50A7DD98B2F78CE9B96B9
25,930,446 UART: [art] SIG.R = BD79BE53A65E5CD5C564B04970379515BEA4848CD7DD4790AF5B5A12B9227C27442670FAA3FC64FD8BB20DF4C53F4FA4
25,937,855 UART: [art] SIG.S = 50561ACF712C0ED4C1FE79D5F9AA865F9069447CD89D70BD620E433D8D5BE167704F8A75D70E1A2AD2B30ADA9220D8A6
26,916,483 UART: Caliptra RT
26,917,193 UART: [state] CFI Enabled
27,082,517 UART: [rt] RT listening for mailbox commands...
27,084,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,240,865 UART: [rt]cmd =0x41544d4e, len=14344
28,208,101 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,917 writing to cptra_bootfsm_go
3,360,449 ready_for_fw is high
3,360,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,033,509 >>> mbox cmd response: success
19,327,633 UART:
19,328,025 UART: Running Caliptra FMC ...
19,329,165 UART:
19,329,325 UART: [state] CFI Enabled
19,392,664 UART: [fht] FMC Alias Private Key: 7
21,156,042 UART: [art] Extend RT PCRs Done
21,157,265 UART: [art] Lock RT PCRs Done
21,158,645 UART: [art] Populate DV Done
21,164,028 UART: [fht] FMC Alias Private Key: 7
21,165,623 UART: [art] Derive CDI
21,166,359 UART: [art] Store in in slot 0x4
21,224,892 UART: [art] Derive Key Pair
21,225,924 UART: [art] Store priv key in slot 0x5
23,688,981 UART: [art] Derive Key Pair - Done
23,701,976 UART: [art] Signing Cert with AUTHO
23,703,284 UART: RITY.KEYID = 7
25,414,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,415,924 UART: [art] PUB.X = DE794A657798004A9205CA5C1F8569116BA10F347A55E899D69ED8CC2746D4D351A57EBD624FC0A1072C5730FE0AF351
25,423,183 UART: [art] PUB.Y = 715FC6D486E3B67FF6B6BC72E7C38B19A03D29210721898BF51C5D6E0BD9886042EB9C824060D02406D322FF5A248F39
25,430,460 UART: [art] SIG.R = F7E7901A60AC11B6D88D2B74E15C1A40EC1B7AA6DD972FD454E5246F8298A9B4A073039DED5FB885BC7E22D30A5C1883
25,437,855 UART: [art] SIG.S = 05C2770AAD328AA62A549A8203B41D8846570FDCDB4FEA57E541B4C151406DE3302BF48794A8A1725EECBD563AA3BAFD
26,416,942 UART: Caliptra RT
26,417,661 UART: [state] CFI Enabled
26,582,567 UART: [rt] RT listening for mailbox commands...
26,584,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,740,809 UART: [rt]cmd =0x41544d4e, len=14344
27,707,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,303 UART:
192,668 UART: Running Caliptra ROM ...
193,871 UART:
603,357 UART: [state] CFI Enabled
613,848 UART: [state] LifecycleState = Unprovisioned
615,646 UART: [state] DebugLocked = No
617,658 UART: [state] WD Timer not started. Device not locked for debugging
621,473 UART: [kat] SHA2-256
800,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,134 UART: [kat] ++
812,646 UART: [kat] sha1
824,435 UART: [kat] SHA2-256
827,430 UART: [kat] SHA2-384
834,545 UART: [kat] SHA2-512-ACC
837,488 UART: [kat] ECC-384
3,280,802 UART: [kat] HMAC-384Kdf
3,293,466 UART: [kat] LMS
3,822,992 UART: [kat] --
3,827,775 UART: [cold-reset] ++
3,829,635 UART: [fht] FHT @ 0x50003400
3,841,761 UART: [idev] ++
3,842,360 UART: [idev] CDI.KEYID = 6
3,843,270 UART: [idev] SUBJECT.KEYID = 7
3,844,434 UART: [idev] UDS.KEYID = 0
3,845,472 ready_for_fw is high
3,845,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,250 UART: [idev] Erasing UDS.KEYID = 0
6,314,634 UART: [idev] Sha1 KeyId Algorithm
6,337,689 UART: [idev] --
6,342,683 UART: [ldev] ++
6,343,270 UART: [ldev] CDI.KEYID = 6
6,344,174 UART: [ldev] SUBJECT.KEYID = 5
6,345,326 UART: [ldev] AUTHORITY.KEYID = 7
6,346,603 UART: [ldev] FE.KEYID = 1
6,357,945 UART: [ldev] Erasing FE.KEYID = 1
8,834,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,041 UART: [ldev] --
10,628,434 UART: [fwproc] Wait for Commands...
10,630,896 UART: [fwproc] Recv command 0x46574c44
10,632,977 UART: [fwproc] Recv'd Img size: 114448 bytes
15,177,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,251,484 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,320,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,638,158 >>> mbox cmd response: success
15,641,663 UART: [afmc] ++
15,642,251 UART: [afmc] CDI.KEYID = 6
15,643,127 UART: [afmc] SUBJECT.KEYID = 7
15,644,390 UART: [afmc] AUTHORITY.KEYID = 5
18,138,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,860,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,862,173 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,878,123 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,894,077 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,909,864 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,932,377 UART: [afmc] --
19,936,296 UART: [cold-reset] --
19,939,557 UART: [state] Locking Datavault
19,943,446 UART: [state] Locking PCR0, PCR1 and PCR31
19,945,156 UART: [state] Locking ICCM
19,947,841 UART: [exit] Launching FMC @ 0x40000130
19,956,285 UART:
19,956,522 UART: Running Caliptra FMC ...
19,957,616 UART:
19,957,767 UART: [state] CFI Enabled
19,966,348 UART: [fht] FMC Alias Private Key: 7
21,723,083 UART: [art] Extend RT PCRs Done
21,724,311 UART: [art] Lock RT PCRs Done
21,726,015 UART: [art] Populate DV Done
21,731,256 UART: [fht] FMC Alias Private Key: 7
21,732,733 UART: [art] Derive CDI
21,733,458 UART: [art] Store in in slot 0x4
21,776,040 UART: [art] Derive Key Pair
21,777,080 UART: [art] Store priv key in slot 0x5
24,203,760 UART: [art] Derive Key Pair - Done
24,216,604 UART: [art] Signing Cert with AUTHO
24,217,911 UART: RITY.KEYID = 7
25,923,117 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,628 UART: [art] PUB.X = B60998C2486789EBF5615C46BA153F9E68216050EBAF182880D3A600DDB10597CBC947279F8AB82212CED89AEF423585
25,931,865 UART: [art] PUB.Y = 4942CA7A072617E50383E29A3850E540185391A9CC2E0225DE8B33FF66A117937D382011C7B712452AF40D1AB8A14991
25,939,076 UART: [art] SIG.R = A430E437A88D9EF1DAAA73BAF65014D0B963826BF72A4BA4780AB307498A3A91F21E1402656E4E90D892DF89FF8EEED3
25,946,506 UART: [art] SIG.S = 7D49D042222FBCFEE8D7C6B6078E914EE0245C9E980DE1F09BF18CA0D3840ADA031DBD68DB4D3C16198665D044E27199
26,925,199 UART: Caliptra RT
26,925,885 UART: [state] CFI Enabled
27,043,548 UART: [rt] RT listening for mailbox commands...
27,045,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,201,250 UART: [rt]cmd =0x41544d4e, len=14344
28,168,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,695,867 ready_for_fw is high
3,696,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,248,958 >>> mbox cmd response: success
19,501,460 UART:
19,501,841 UART: Running Caliptra FMC ...
19,502,965 UART:
19,503,117 UART: [state] CFI Enabled
19,510,882 UART: [fht] FMC Alias Private Key: 7
21,267,719 UART: [art] Extend RT PCRs Done
21,268,937 UART: [art] Lock RT PCRs Done
21,270,720 UART: [art] Populate DV Done
21,276,373 UART: [fht] FMC Alias Private Key: 7
21,277,960 UART: [art] Derive CDI
21,278,925 UART: [art] Store in in slot 0x4
21,321,526 UART: [art] Derive Key Pair
21,322,539 UART: [art] Store priv key in slot 0x5
23,749,461 UART: [art] Derive Key Pair - Done
23,762,169 UART: [art] Signing Cert with AUTHO
23,763,496 UART: RITY.KEYID = 7
25,468,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,470,314 UART: [art] PUB.X = 57102414EA1A549E1C2E6893ED7C71EADCDDB5A249258A05E65419281490164D0E5E2663A2B05038696EE583823B5497
25,477,592 UART: [art] PUB.Y = 209D342B3C6301C69A0B39EB52983085BE8FA145EC0DC17ECFB93D758EAFBE898C6A1D743C1F012331029C9870E71DC4
25,484,872 UART: [art] SIG.R = 11C6168AA54F69E572B6AFB0C79EB1787719BD5C7A2E4F11410242CDA22539AC8CE996BB56F28A0FA4D5E58BB79704F3
25,492,247 UART: [art] SIG.S = 60C40138034006B1CDF003081FD1E0220FABFC88FBB0D0B56A80855266B297E245268B62F54607E036F6E83522DE5017
26,471,063 UART: Caliptra RT
26,471,766 UART: [state] CFI Enabled
26,588,683 UART: [rt] RT listening for mailbox commands...
26,590,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,746,440 UART: [rt]cmd =0x41544d4e, len=14344
27,713,493 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,205 UART:
192,558 UART: Running Caliptra ROM ...
193,746 UART:
193,906 UART: [state] CFI Enabled
261,678 UART: [state] LifecycleState = Unprovisioned
264,089 UART: [state] DebugLocked = No
266,482 UART: [state] WD Timer not started. Device not locked for debugging
271,080 UART: [kat] SHA2-256
460,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,738 UART: [kat] ++
472,184 UART: [kat] sha1
484,120 UART: [kat] SHA2-256
487,150 UART: [kat] SHA2-384
492,999 UART: [kat] SHA2-512-ACC
495,578 UART: [kat] ECC-384
2,945,798 UART: [kat] HMAC-384Kdf
2,969,980 UART: [kat] LMS
3,501,729 UART: [kat] --
3,505,530 UART: [cold-reset] ++
3,506,970 UART: [fht] FHT @ 0x50003400
3,518,445 UART: [idev] ++
3,519,086 UART: [idev] CDI.KEYID = 6
3,520,074 UART: [idev] SUBJECT.KEYID = 7
3,521,250 UART: [idev] UDS.KEYID = 0
3,522,178 ready_for_fw is high
3,522,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,402 UART: [idev] Erasing UDS.KEYID = 0
6,025,258 UART: [idev] Sha1 KeyId Algorithm
6,047,205 UART: [idev] --
6,051,093 UART: [ldev] ++
6,051,775 UART: [ldev] CDI.KEYID = 6
6,052,660 UART: [ldev] SUBJECT.KEYID = 5
6,053,872 UART: [ldev] AUTHORITY.KEYID = 7
6,055,051 UART: [ldev] FE.KEYID = 1
6,098,989 UART: [ldev] Erasing FE.KEYID = 1
8,607,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,878 UART: [ldev] --
10,412,063 UART: [fwproc] Wait for Commands...
10,415,074 UART: [fwproc] Recv command 0x46574c44
10,417,336 UART: [fwproc] Recv'd Img size: 114448 bytes
15,023,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,101,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,217,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,760,562 >>> mbox cmd response: success
15,765,413 UART: [afmc] ++
15,766,124 UART: [afmc] CDI.KEYID = 6
15,767,318 UART: [afmc] SUBJECT.KEYID = 7
15,768,757 UART: [afmc] AUTHORITY.KEYID = 5
18,298,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,021,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,023,629 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,038,688 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,053,858 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,068,736 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,093,286 UART: [afmc] --
20,096,070 UART: [cold-reset] --
20,100,499 UART: [state] Locking Datavault
20,103,858 UART: [state] Locking PCR0, PCR1 and PCR31
20,106,058 UART: [state] Locking ICCM
20,107,076 UART: [exit] Launching FMC @ 0x40000130
20,115,751 UART:
20,115,984 UART: Running Caliptra FMC ...
20,117,084 UART:
20,117,248 UART: [state] CFI Enabled
20,178,748 UART: [fht] FMC Alias Private Key: 7
21,942,819 UART: [art] Extend RT PCRs Done
21,944,023 UART: [art] Lock RT PCRs Done
21,945,972 UART: [art] Populate DV Done
21,951,379 UART: [fht] FMC Alias Private Key: 7
21,952,977 UART: [art] Derive CDI
21,953,790 UART: [art] Store in in slot 0x4
22,011,157 UART: [art] Derive Key Pair
22,012,214 UART: [art] Store priv key in slot 0x5
24,475,024 UART: [art] Derive Key Pair - Done
24,488,359 UART: [art] Signing Cert with AUTHO
24,489,669 UART: RITY.KEYID = 7
26,200,788 UART: [art] Erasing AUTHORITY.KEYID = 7
26,202,280 UART: [art] PUB.X = 8624F66326F162CB47A09829E62318FDD396F29E0F467025DA42113230F75ECC62821ADBD9A37BAF5565801AABAFB40F
26,209,577 UART: [art] PUB.Y = 4977E466058F6DFAA808C63A70B29A9834D6A496A63E8F0F92C106004CCF9EFC033E758C60C6A814730CA74A51FEC1D1
26,216,845 UART: [art] SIG.R = DD13F364D76BCC6E2AF73A66734E7100DDEB3CF28C2BBA85795B061B1B92957BEED929300A05360D3DB6726608BF4B4C
26,224,201 UART: [art] SIG.S = 4A07320B38C38D8F1A01427600B4541001012B8B4D7E8F5021C890236B85BA60C9E59880E78400EB923F04674DDF6FB6
27,202,587 UART: Caliptra RT
27,203,299 UART: [state] CFI Enabled
27,366,525 UART: [rt] RT listening for mailbox commands...
27,368,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,524,754 UART: [rt]cmd =0x41544d4e, len=14344
28,491,998 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,439,826 ready_for_fw is high
3,440,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,820,528 >>> mbox cmd response: success
20,112,857 UART:
20,113,239 UART: Running Caliptra FMC ...
20,114,353 UART:
20,114,506 UART: [state] CFI Enabled
20,181,785 UART: [fht] FMC Alias Private Key: 7
21,945,814 UART: [art] Extend RT PCRs Done
21,947,032 UART: [art] Lock RT PCRs Done
21,948,451 UART: [art] Populate DV Done
21,953,938 UART: [fht] FMC Alias Private Key: 7
21,955,475 UART: [art] Derive CDI
21,956,211 UART: [art] Store in in slot 0x4
22,014,825 UART: [art] Derive Key Pair
22,015,866 UART: [art] Store priv key in slot 0x5
24,478,684 UART: [art] Derive Key Pair - Done
24,491,725 UART: [art] Signing Cert with AUTHO
24,493,020 UART: RITY.KEYID = 7
26,204,718 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,234 UART: [art] PUB.X = 1B6F724F92EE33B058425A2F2C6E7123FB10E09B28DDD41C5E059E36BF91BFAECBC777FF05C5A5A5A280F08C04C926DB
26,213,537 UART: [art] PUB.Y = 5D9921D508016B9696AF2F61C152318CEDCDA709A6AE06D74C4B973988FF1D5198FDCC71E618E34464D7E4731B6C8D89
26,220,800 UART: [art] SIG.R = F99D07ED708678AC73E2B858F1009E5151A2FC045AE0F4A238AEC78C0C689A813AF80DBE370A6FBD515B4CF14E9E2FD9
26,228,194 UART: [art] SIG.S = 1537F6FC8578A6D8452828510867CCEBDCF0BC217FF50382B6C325F8F195BD985FF5615CF1B404514A7179A75B428BB2
27,207,075 UART: Caliptra RT
27,207,766 UART: [state] CFI Enabled
27,372,452 UART: [rt] RT listening for mailbox commands...
27,374,770 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,683 UART: [rt]cmd =0x41544d4e, len=14344
28,497,786 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,425 UART:
192,806 UART: Running Caliptra ROM ...
193,951 UART:
603,672 UART: [state] CFI Enabled
614,429 UART: [state] LifecycleState = Unprovisioned
616,800 UART: [state] DebugLocked = No
618,107 UART: [state] WD Timer not started. Device not locked for debugging
623,045 UART: [kat] SHA2-256
812,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,747 UART: [kat] ++
824,223 UART: [kat] sha1
836,510 UART: [kat] SHA2-256
839,514 UART: [kat] SHA2-384
844,099 UART: [kat] SHA2-512-ACC
846,684 UART: [kat] ECC-384
3,289,482 UART: [kat] HMAC-384Kdf
3,302,633 UART: [kat] LMS
3,834,413 UART: [kat] --
3,839,404 UART: [cold-reset] ++
3,840,971 UART: [fht] FHT @ 0x50003400
3,853,307 UART: [idev] ++
3,853,974 UART: [idev] CDI.KEYID = 6
3,855,005 UART: [idev] SUBJECT.KEYID = 7
3,856,103 UART: [idev] UDS.KEYID = 0
3,857,019 ready_for_fw is high
3,857,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,774 UART: [idev] Erasing UDS.KEYID = 0
6,334,091 UART: [idev] Sha1 KeyId Algorithm
6,355,921 UART: [idev] --
6,361,226 UART: [ldev] ++
6,361,958 UART: [ldev] CDI.KEYID = 6
6,362,831 UART: [ldev] SUBJECT.KEYID = 5
6,364,035 UART: [ldev] AUTHORITY.KEYID = 7
6,365,262 UART: [ldev] FE.KEYID = 1
6,375,390 UART: [ldev] Erasing FE.KEYID = 1
8,853,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,620 UART: [ldev] --
10,646,157 UART: [fwproc] Wait for Commands...
10,648,555 UART: [fwproc] Recv command 0x46574c44
10,650,871 UART: [fwproc] Recv'd Img size: 114448 bytes
15,267,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,342,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,458,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,002,069 >>> mbox cmd response: success
16,006,580 UART: [afmc] ++
16,007,327 UART: [afmc] CDI.KEYID = 6
16,008,441 UART: [afmc] SUBJECT.KEYID = 7
16,009,996 UART: [afmc] AUTHORITY.KEYID = 5
18,512,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,233,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,235,385 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,250,457 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,265,614 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,280,488 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,305,284 UART: [afmc] --
20,309,041 UART: [cold-reset] --
20,313,827 UART: [state] Locking Datavault
20,319,587 UART: [state] Locking PCR0, PCR1 and PCR31
20,321,733 UART: [state] Locking ICCM
20,324,360 UART: [exit] Launching FMC @ 0x40000130
20,333,029 UART:
20,333,271 UART: Running Caliptra FMC ...
20,334,370 UART:
20,334,523 UART: [state] CFI Enabled
20,342,563 UART: [fht] FMC Alias Private Key: 7
22,099,007 UART: [art] Extend RT PCRs Done
22,100,237 UART: [art] Lock RT PCRs Done
22,102,022 UART: [art] Populate DV Done
22,107,489 UART: [fht] FMC Alias Private Key: 7
22,109,188 UART: [art] Derive CDI
22,109,999 UART: [art] Store in in slot 0x4
22,152,634 UART: [art] Derive Key Pair
22,153,625 UART: [art] Store priv key in slot 0x5
24,580,290 UART: [art] Derive Key Pair - Done
24,592,958 UART: [art] Signing Cert with AUTHO
24,594,257 UART: RITY.KEYID = 7
26,299,465 UART: [art] Erasing AUTHORITY.KEYID = 7
26,300,963 UART: [art] PUB.X = 479949D15DDC13E2A0551358852D0FEDA1824DDB2A8EA7EE038F25D275580155C352CC58463735AADA26C7BD03269AA8
26,308,250 UART: [art] PUB.Y = 36F69D292BB65BC2BF32BEA6F302724C298B915A736719A73E140D12FB8135AD0315B8B2C069E3883CD305544FEE9E8D
26,315,509 UART: [art] SIG.R = A85D5D5E37407C56710A1FF0FEBC3B4B011CC896C254089294C68C230456BE38CE7EE7CA362E71B4C968673BF50D79B0
26,322,876 UART: [art] SIG.S = 79877D67696D8991DA1F859A7F76BD8E4F529C617B3E0B4449607575FA499A3AEAB7F1D188BC86BCF46388DC32EC390D
27,302,183 UART: Caliptra RT
27,302,889 UART: [state] CFI Enabled
27,419,188 UART: [rt] RT listening for mailbox commands...
27,421,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,576,838 UART: [rt]cmd =0x41544d4e, len=14344
28,543,726 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,754,888 ready_for_fw is high
3,755,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,052,946 >>> mbox cmd response: success
20,299,540 UART:
20,299,920 UART: Running Caliptra FMC ...
20,301,107 UART:
20,301,266 UART: [state] CFI Enabled
20,309,570 UART: [fht] FMC Alias Private Key: 7
22,065,611 UART: [art] Extend RT PCRs Done
22,066,836 UART: [art] Lock RT PCRs Done
22,068,515 UART: [art] Populate DV Done
22,073,819 UART: [fht] FMC Alias Private Key: 7
22,075,367 UART: [art] Derive CDI
22,076,181 UART: [art] Store in in slot 0x4
22,118,914 UART: [art] Derive Key Pair
22,119,955 UART: [art] Store priv key in slot 0x5
24,546,916 UART: [art] Derive Key Pair - Done
24,559,976 UART: [art] Signing Cert with AUTHO
24,561,275 UART: RITY.KEYID = 7
26,266,756 UART: [art] Erasing AUTHORITY.KEYID = 7
26,268,265 UART: [art] PUB.X = 163E7B0DBBB56A9104D368BA6337A3412529B8B173FCB857E3C84686BF37C5A70E9003236876B67EDBC071063325F511
26,275,488 UART: [art] PUB.Y = 670C9AEF8A0821D312723770331A0CFF19EDC73DC1EFE478D15BABD29D958BDA7EE052FB15A45B64304E9690B5D5D172
26,282,746 UART: [art] SIG.R = EF3D86185BBA7E22A21674B6E702B9B927146E4EC36CB26D2A68FC6464C94B6ACE13AD47864AD0DFF6B945D2A1F7299D
26,290,187 UART: [art] SIG.S = 3A19486E540DD13E63094F5518DD49F258998452A4C5C9100DEA2D9D4DFD248B0ECFFA22B321FB395B041630540DDC39
27,268,671 UART: Caliptra RT
27,269,362 UART: [state] CFI Enabled
27,386,113 UART: [rt] RT listening for mailbox commands...
27,388,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,543,734 UART: [rt]cmd =0x41544d4e, len=14344
28,510,850 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,693 UART: [kat] SHA2-256
892,631 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
903,026 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,169 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 ready_for_fw is high
1,481,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,505,174 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,764 UART: [idev] --
1,514,795 UART: [ldev] ++
1,514,963 UART: [ldev] CDI.KEYID = 6
1,515,326 UART: [ldev] SUBJECT.KEYID = 5
1,515,752 UART: [ldev] AUTHORITY.KEYID = 7
1,516,215 UART: [ldev] FE.KEYID = 1
1,521,083 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,592 UART: [ldev] --
1,585,967 UART: [fwproc] Waiting for Commands...
1,586,794 UART: [fwproc] Received command 0x46574c44
1,587,585 UART: [fwproc] Received Image of size 114448 bytes
5,161,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,189,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,218,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,354,845 >>> mbox cmd response: success
5,356,035 UART: [afmc] ++
5,356,203 UART: [afmc] CDI.KEYID = 6
5,356,565 UART: [afmc] SUBJECT.KEYID = 7
5,356,990 UART: [afmc] AUTHORITY.KEYID = 5
5,392,292 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,408,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,409,442 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,415,151 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,421,043 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,426,744 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,434,510 UART: [afmc] --
5,435,404 UART: [cold-reset] --
5,436,332 UART: [state] Locking Datavault
5,437,397 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,001 UART: [state] Locking ICCM
5,438,561 UART: [exit] Launching FMC @ 0x40000130
5,443,890 UART:
5,443,906 UART: Running Caliptra FMC ...
5,444,314 UART:
5,444,368 UART: [state] CFI Enabled
5,454,984 UART: [fht] FMC Alias Private Key: 7
5,563,740 UART: [art] Extend RT PCRs Done
5,564,168 UART: [art] Lock RT PCRs Done
5,566,072 UART: [art] Populate DV Done
5,574,214 UART: [fht] FMC Alias Private Key: 7
5,575,356 UART: [art] Derive CDI
5,575,636 UART: [art] Store in in slot 0x4
5,661,235 UART: [art] Derive Key Pair
5,661,595 UART: [art] Store priv key in slot 0x5
5,675,265 UART: [art] Derive Key Pair - Done
5,689,911 UART: [art] Signing Cert with AUTHO
5,690,391 UART: RITY.KEYID = 7
5,705,127 UART: [art] Erasing AUTHORITY.KEYID = 7
5,705,892 UART: [art] PUB.X = 22869E54E1BDD017E7DE960235502452DDC4F10379C20559374E7956029C32C19DEEAEB87B1B5E7BD4A21CD3FB1980C8
5,712,654 UART: [art] PUB.Y = 3BEC31A40A4339717D20C0F5AADC36D7B5FE22BF2CFA753852982C42D182F73129630DDC1D9E571063A7205F77BE9831
5,719,602 UART: [art] SIG.R = DEAFD59AB2BBD493E0EAC67E4EBF58F7AA0B4F43437C8B132FB3C1BA6B245C0D1A029040E7D333099C1EFDDB41B0E8CB
5,726,390 UART: [art] SIG.S = 6A02A8750BCDBA806E465365E3776992556E56E3067AB0632B6ECAC247EACEAF2E3AD9D1E5232230CE4B3A1B7AF5855D
5,749,916 UART: Caliptra RT
5,750,169 UART: [state] CFI Enabled
5,858,256 UART: [rt] RT listening for mailbox commands...
5,858,926 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,900 UART: [rt]cmd =0x41544d4e, len=14344
5,990,747 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 ready_for_fw is high
1,362,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,203,229 >>> mbox cmd response: success
5,264,760 UART:
5,264,776 UART: Running Caliptra FMC ...
5,265,184 UART:
5,265,238 UART: [state] CFI Enabled
5,275,780 UART: [fht] FMC Alias Private Key: 7
5,383,766 UART: [art] Extend RT PCRs Done
5,384,194 UART: [art] Lock RT PCRs Done
5,385,386 UART: [art] Populate DV Done
5,393,590 UART: [fht] FMC Alias Private Key: 7
5,394,756 UART: [art] Derive CDI
5,395,036 UART: [art] Store in in slot 0x4
5,481,005 UART: [art] Derive Key Pair
5,481,365 UART: [art] Store priv key in slot 0x5
5,494,215 UART: [art] Derive Key Pair - Done
5,508,888 UART: [art] Signing Cert with AUTHO
5,509,368 UART: RITY.KEYID = 7
5,524,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,343 UART: [art] PUB.X = 73044119DB235EBFD051059920B82978B04974AC1F6A48DE73540E9C43CBD161898C80F0B5EE7BC73BFF95AE4BED4C28
5,532,112 UART: [art] PUB.Y = FBA2523B647218EC19F589D6D0A53ACA5AE2ADDD0690B82E29C046085A6218993E93BAA825377619BE413F1CDD3252CF
5,539,064 UART: [art] SIG.R = D8F273E42A3BF5CFE0EEC1D8BD7299E945408743E8DB8AD9287E218DF4D6556E871C3CC6E87C60C9B9E49FAAF1A65F15
5,545,852 UART: [art] SIG.S = 778832D6580251271F61C6602FFA2127D645E39E4F002DA4CFDD6988DFCB1B58237ACAA57CB7F57953415FC5C42B52D8
5,569,754 UART: Caliptra RT
5,570,007 UART: [state] CFI Enabled
5,677,840 UART: [rt] RT listening for mailbox commands...
5,678,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,756 UART: [rt]cmd =0x41544d4e, len=14344
5,810,235 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,864 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 ready_for_fw is high
1,480,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,797 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,987 UART: [idev] --
1,514,972 UART: [ldev] ++
1,515,140 UART: [ldev] CDI.KEYID = 6
1,515,503 UART: [ldev] SUBJECT.KEYID = 5
1,515,929 UART: [ldev] AUTHORITY.KEYID = 7
1,516,392 UART: [ldev] FE.KEYID = 1
1,521,668 UART: [ldev] Erasing FE.KEYID = 1
1,547,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,261 UART: [ldev] --
1,586,572 UART: [fwproc] Waiting for Commands...
1,587,221 UART: [fwproc] Received command 0x46574c44
1,588,012 UART: [fwproc] Received Image of size 114448 bytes
5,197,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,958 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,255,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,391,433 >>> mbox cmd response: success
5,392,481 UART: [afmc] ++
5,392,649 UART: [afmc] CDI.KEYID = 6
5,393,011 UART: [afmc] SUBJECT.KEYID = 7
5,393,436 UART: [afmc] AUTHORITY.KEYID = 5
5,428,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,444,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,445,666 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,451,375 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,457,267 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,968 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,470,798 UART: [afmc] --
5,471,848 UART: [cold-reset] --
5,472,690 UART: [state] Locking Datavault
5,473,787 UART: [state] Locking PCR0, PCR1 and PCR31
5,474,391 UART: [state] Locking ICCM
5,474,867 UART: [exit] Launching FMC @ 0x40000130
5,480,196 UART:
5,480,212 UART: Running Caliptra FMC ...
5,480,620 UART:
5,480,763 UART: [state] CFI Enabled
5,491,125 UART: [fht] FMC Alias Private Key: 7
5,599,029 UART: [art] Extend RT PCRs Done
5,599,457 UART: [art] Lock RT PCRs Done
5,601,021 UART: [art] Populate DV Done
5,609,109 UART: [fht] FMC Alias Private Key: 7
5,610,183 UART: [art] Derive CDI
5,610,463 UART: [art] Store in in slot 0x4
5,696,252 UART: [art] Derive Key Pair
5,696,612 UART: [art] Store priv key in slot 0x5
5,709,754 UART: [art] Derive Key Pair - Done
5,724,686 UART: [art] Signing Cert with AUTHO
5,725,166 UART: RITY.KEYID = 7
5,740,326 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,091 UART: [art] PUB.X = 3DED5F97E29A782491F194DF96FC381DB2C1A1AED0877CDEC9035A4E6615B93C13A88F79EE546DAD41DA15315E84C5A6
5,747,872 UART: [art] PUB.Y = 8E9E38233B209327FCE45E9A44019E7D5DF45315207A5990232BAD57BE8AD818B894F25F82B809BDA518611DB46C176D
5,754,816 UART: [art] SIG.R = 1CA60FF60BA43DCD120BE9DF76B396D1E41018EE1AFD73655B8BD603B3A787FCD02C96508C5260AD7FEB5CD15AB250ED
5,761,596 UART: [art] SIG.S = A5146BEDB81E018D21FA0D96BFA59AE42323C88AE5D3927E98AAA46C2D101CB5EEBBF820BE5F0B58D7059B4752AA2905
5,785,184 UART: Caliptra RT
5,785,529 UART: [state] CFI Enabled
5,894,430 UART: [rt] RT listening for mailbox commands...
5,895,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,874 UART: [rt]cmd =0x41544d4e, len=14344
6,026,197 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,896 ready_for_fw is high
1,362,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,278,658 >>> mbox cmd response: success
5,340,195 UART:
5,340,211 UART: Running Caliptra FMC ...
5,340,619 UART:
5,340,762 UART: [state] CFI Enabled
5,351,476 UART: [fht] FMC Alias Private Key: 7
5,459,590 UART: [art] Extend RT PCRs Done
5,460,018 UART: [art] Lock RT PCRs Done
5,461,562 UART: [art] Populate DV Done
5,469,814 UART: [fht] FMC Alias Private Key: 7
5,470,896 UART: [art] Derive CDI
5,471,176 UART: [art] Store in in slot 0x4
5,556,687 UART: [art] Derive Key Pair
5,557,047 UART: [art] Store priv key in slot 0x5
5,569,783 UART: [art] Derive Key Pair - Done
5,584,268 UART: [art] Signing Cert with AUTHO
5,584,748 UART: RITY.KEYID = 7
5,599,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,501 UART: [art] PUB.X = 7D390EC765F6C7C0E8EC6122A218221EFEC3BF2E33063945C01C139D3021046408351E007FB975CE52651708A62FB9AF
5,607,232 UART: [art] PUB.Y = C820F901BDFE9A481C6E999342883418C8209733DC19E5338F766988EBD4B02BFDA844797C545E823B90D0839614BDF3
5,614,175 UART: [art] SIG.R = C1EEAD9E16E37A5686E7919F837D1020E9E7F10DF062DC423126E4638A32D316B4E2CC6DCE5B99C6E18E8280B790F683
5,620,948 UART: [art] SIG.S = 6C8474E076F4A1FE6A0384CF3B640B165979600781FB56589E95673A097E43DA466E4238FDB4DB13C8887E62BEED33B5
5,645,585 UART: Caliptra RT
5,645,930 UART: [state] CFI Enabled
5,753,989 UART: [rt] RT listening for mailbox commands...
5,754,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,131 UART: [rt]cmd =0x41544d4e, len=14344
5,886,802 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,654 UART: [kat] HMAC-384Kdf
922,248 UART: [kat] LMS
1,170,576 UART: [kat] --
1,171,267 UART: [cold-reset] ++
1,171,717 UART: [fht] FHT @ 0x50003400
1,174,400 UART: [idev] ++
1,174,568 UART: [idev] CDI.KEYID = 6
1,174,928 UART: [idev] SUBJECT.KEYID = 7
1,175,352 UART: [idev] UDS.KEYID = 0
1,175,697 ready_for_fw is high
1,175,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,927 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,044 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,904 UART: [fwproc] Recv command 0x46574c44
1,283,632 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,506 >>> mbox cmd response: success
3,324,752 UART: [afmc] ++
3,324,920 UART: [afmc] CDI.KEYID = 6
3,325,282 UART: [afmc] SUBJECT.KEYID = 7
3,325,707 UART: [afmc] AUTHORITY.KEYID = 5
3,361,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,166 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,875 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,767 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,478 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,223 UART: [afmc] --
3,404,171 UART: [cold-reset] --
3,405,137 UART: [state] Locking Datavault
3,406,482 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,086 UART: [state] Locking ICCM
3,407,702 UART: [exit] Launching FMC @ 0x40000130
3,413,031 UART:
3,413,047 UART: Running Caliptra FMC ...
3,413,455 UART:
3,413,509 UART: [state] CFI Enabled
3,423,993 UART: [fht] FMC Alias Private Key: 7
3,532,125 UART: [art] Extend RT PCRs Done
3,532,553 UART: [art] Lock RT PCRs Done
3,534,095 UART: [art] Populate DV Done
3,542,139 UART: [fht] FMC Alias Private Key: 7
3,543,123 UART: [art] Derive CDI
3,543,403 UART: [art] Store in in slot 0x4
3,628,976 UART: [art] Derive Key Pair
3,629,336 UART: [art] Store priv key in slot 0x5
3,643,460 UART: [art] Derive Key Pair - Done
3,658,270 UART: [art] Signing Cert with AUTHO
3,658,750 UART: RITY.KEYID = 7
3,673,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,695 UART: [art] PUB.X = 242009F4B86D91899C5CB4C1F9CD453E871140160CE43774D8B1E9AB649813DCEA36B6B9B5A8A52BD3A1B38E37BBDDD0
3,681,471 UART: [art] PUB.Y = 6D86845256752EDF92B6A876BA108F59E74D28A7869331A52FB69420189D6D558CFB2C62F36CE9F50B2E86BC739F86AB
3,688,420 UART: [art] SIG.R = 8F7CCA40AE15DE97020F9ECD7B5A522595B4D834410181873DBCD4D23BB91B877112CA1243125DE381234628A854A2C3
3,695,181 UART: [art] SIG.S = 65BB8BCD00372138B6E10235AC7E1ECB6D3398055765A33C86175FF2BD8E48EC79CCADB33259CB4395BD97E411E0FEBC
3,718,578 UART: Caliptra RT
3,718,831 UART: [state] CFI Enabled
3,826,731 UART: [rt] RT listening for mailbox commands...
3,827,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,709 UART: [rt]cmd =0x41544d4e, len=14344
3,959,284 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,765 ready_for_fw is high
1,059,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,401 >>> mbox cmd response: success
3,224,490 UART:
3,224,506 UART: Running Caliptra FMC ...
3,224,914 UART:
3,224,968 UART: [state] CFI Enabled
3,235,382 UART: [fht] FMC Alias Private Key: 7
3,343,600 UART: [art] Extend RT PCRs Done
3,344,028 UART: [art] Lock RT PCRs Done
3,345,488 UART: [art] Populate DV Done
3,353,910 UART: [fht] FMC Alias Private Key: 7
3,355,032 UART: [art] Derive CDI
3,355,312 UART: [art] Store in in slot 0x4
3,441,001 UART: [art] Derive Key Pair
3,441,361 UART: [art] Store priv key in slot 0x5
3,454,407 UART: [art] Derive Key Pair - Done
3,469,134 UART: [art] Signing Cert with AUTHO
3,469,614 UART: RITY.KEYID = 7
3,483,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,733 UART: [art] PUB.X = 57AD4753C4D7A25EE6894297C245862140B843A93CAF8624923B342A3BCEFF379B4184555474C46F11E5943F4C446EF2
3,491,497 UART: [art] PUB.Y = 5761CE58CE2849871A2EA561076C37E8584C298B30A811C729D89E71D594E65B89C66D53D771B55D091B27914EF6AED0
3,498,437 UART: [art] SIG.R = D2634AE073976113F95D7AFD9173408F36BBAFEEFD56A8DBDE8BEB4BD8FBDBA46598010D4361DCB14F0D855CE18F9F53
3,505,220 UART: [art] SIG.S = 540098C1D9A312250CC31EBA379CCCD7B3543EB782CF1E9CC1FCA3C946AF8542776F404FF166322BCCBC3B6CC6096937
3,528,553 UART: Caliptra RT
3,528,806 UART: [state] CFI Enabled
3,636,672 UART: [rt] RT listening for mailbox commands...
3,637,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,504 UART: [rt]cmd =0x41544d4e, len=14344
3,768,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,324 UART: [kat] SHA2-256
904,264 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,913 UART: [kat] HMAC-384Kdf
923,413 UART: [kat] LMS
1,171,741 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,034 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 ready_for_fw is high
1,176,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,627 UART: [idev] Erasing UDS.KEYID = 0
1,202,398 UART: [idev] Sha1 KeyId Algorithm
1,210,992 UART: [idev] --
1,212,202 UART: [ldev] ++
1,212,370 UART: [ldev] CDI.KEYID = 6
1,212,733 UART: [ldev] SUBJECT.KEYID = 5
1,213,159 UART: [ldev] AUTHORITY.KEYID = 7
1,213,622 UART: [ldev] FE.KEYID = 1
1,218,970 UART: [ldev] Erasing FE.KEYID = 1
1,245,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,656 UART: [ldev] --
1,285,061 UART: [fwproc] Wait for Commands...
1,285,751 UART: [fwproc] Recv command 0x46574c44
1,286,479 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,379 >>> mbox cmd response: success
3,314,407 UART: [afmc] ++
3,314,575 UART: [afmc] CDI.KEYID = 6
3,314,937 UART: [afmc] SUBJECT.KEYID = 7
3,315,362 UART: [afmc] AUTHORITY.KEYID = 5
3,351,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,159 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,868 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,760 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,471 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,348 UART: [afmc] --
3,394,236 UART: [cold-reset] --
3,395,092 UART: [state] Locking Datavault
3,396,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,847 UART: [state] Locking ICCM
3,397,361 UART: [exit] Launching FMC @ 0x40000130
3,402,690 UART:
3,402,706 UART: Running Caliptra FMC ...
3,403,114 UART:
3,403,257 UART: [state] CFI Enabled
3,413,889 UART: [fht] FMC Alias Private Key: 7
3,522,157 UART: [art] Extend RT PCRs Done
3,522,585 UART: [art] Lock RT PCRs Done
3,524,107 UART: [art] Populate DV Done
3,532,239 UART: [fht] FMC Alias Private Key: 7
3,533,397 UART: [art] Derive CDI
3,533,677 UART: [art] Store in in slot 0x4
3,619,560 UART: [art] Derive Key Pair
3,619,920 UART: [art] Store priv key in slot 0x5
3,632,936 UART: [art] Derive Key Pair - Done
3,647,749 UART: [art] Signing Cert with AUTHO
3,648,229 UART: RITY.KEYID = 7
3,663,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,620 UART: [art] PUB.X = 70E84C4DA892BD9CCCCF6B761348E9BC664001163E42AE1C200B2FB44F0AA16F83A49CC8C03949941845AC88A242218B
3,671,387 UART: [art] PUB.Y = C4D9020FDD6D53660672971ACD3B0183E9B4EE9C33E4A8E061417D17EE5F4DD808CEC65DF257E37F2B23C35DFE25B959
3,678,334 UART: [art] SIG.R = 2833114179F388A4AD8D9D9FECED5FA59BB4636E5A536F2A1373DBB47AF9C9EFA8AA4A21297ED3AC8A9CD0A4019ADAFE
3,685,127 UART: [art] SIG.S = 179217CB2F1F0D4C9D015A3394189FE6A160D0123C803438514B6B17FA29931FF08E1B548617EFB9513A2E6897C872AA
3,709,548 UART: Caliptra RT
3,709,893 UART: [state] CFI Enabled
3,818,140 UART: [rt] RT listening for mailbox commands...
3,818,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,720 UART: [rt]cmd =0x41544d4e, len=14344
3,950,499 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,014 ready_for_fw is high
1,061,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,584 >>> mbox cmd response: success
3,234,425 UART:
3,234,441 UART: Running Caliptra FMC ...
3,234,849 UART:
3,234,992 UART: [state] CFI Enabled
3,245,746 UART: [fht] FMC Alias Private Key: 7
3,353,140 UART: [art] Extend RT PCRs Done
3,353,568 UART: [art] Lock RT PCRs Done
3,355,220 UART: [art] Populate DV Done
3,363,370 UART: [fht] FMC Alias Private Key: 7
3,364,340 UART: [art] Derive CDI
3,364,620 UART: [art] Store in in slot 0x4
3,450,417 UART: [art] Derive Key Pair
3,450,777 UART: [art] Store priv key in slot 0x5
3,464,279 UART: [art] Derive Key Pair - Done
3,479,129 UART: [art] Signing Cert with AUTHO
3,479,609 UART: RITY.KEYID = 7
3,494,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,410 UART: [art] PUB.X = EAAF95199424379E7427E63F90B87B5DDF14C776F2F5C234CA1BF2C16B69E653A7B9F3314D6FB3C69701739437E04824
3,502,177 UART: [art] PUB.Y = C532121D64D2ECAD55605607C478AB8C3612A5C289A186C1528F7CDEE9EE0FA37B5C8A6443B524B588D69278062704F9
3,509,115 UART: [art] SIG.R = 729837D4D975C475415CB28D615458F3296E10C2D24EF683F822B0056E033B6819F95E99FDA1CE21B329738166CBA25C
3,515,873 UART: [art] SIG.S = 5617774A362B1E953B77DEE01B68FD7110C900013540B50563BC6918C7EDA2C61C0104538F8B234C343403C17FFB84D7
3,539,941 UART: Caliptra RT
3,540,286 UART: [state] CFI Enabled
3,647,131 UART: [rt] RT listening for mailbox commands...
3,647,801 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,759 UART: [rt]cmd =0x41544d4e, len=14344
3,779,172 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,097 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,174,109 ready_for_fw is high
1,174,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,687 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,314,257 >>> mbox cmd response: success
3,315,446 UART: [afmc] ++
3,315,614 UART: [afmc] CDI.KEYID = 6
3,315,977 UART: [afmc] SUBJECT.KEYID = 7
3,316,403 UART: [afmc] AUTHORITY.KEYID = 5
3,351,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,868 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,578 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,179 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,037 UART: [afmc] --
3,394,993 UART: [cold-reset] --
3,395,771 UART: [state] Locking Datavault
3,396,908 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,512 UART: [state] Locking ICCM
3,397,938 UART: [exit] Launching FMC @ 0x40000130
3,403,267 UART:
3,403,283 UART: Running Caliptra FMC ...
3,403,691 UART:
3,403,745 UART: [state] CFI Enabled
3,414,021 UART: [fht] FMC Alias Private Key: 7
3,522,505 UART: [art] Extend RT PCRs Done
3,522,933 UART: [art] Lock RT PCRs Done
3,524,773 UART: [art] Populate DV Done
3,532,987 UART: [fht] FMC Alias Private Key: 7
3,534,121 UART: [art] Derive CDI
3,534,401 UART: [art] Store in in slot 0x4
3,619,858 UART: [art] Derive Key Pair
3,620,218 UART: [art] Store priv key in slot 0x5
3,633,344 UART: [art] Derive Key Pair - Done
3,648,029 UART: [art] Signing Cert with AUTHO
3,648,509 UART: RITY.KEYID = 7
3,664,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,806 UART: [art] PUB.X = CB566A166586E3D0EF4F0495F29E37802675A146B3519F23ADEAA007213CDB2E03C6550C8F1D37486FCCA678981EA0F6
3,671,568 UART: [art] PUB.Y = 5DAA4A9BCA1F972A3EE626CF4113E47BAAD58D2A1533EAC519EDC2C7ACF96A01E1220D752E2DCAE5CBEC51B7CF859F62
3,678,542 UART: [art] SIG.R = 0FB917D318911B54F4FC3A4C09880CAB5CF76BC182186B8D55FE77FD5A6901E41D22FC7842E579B6A9230D891E5D0A95
3,685,300 UART: [art] SIG.S = 41F9187BDC61D1DC2F95BA66424520136B6E68141C148AC7622D8905062ED44C2D5CEEE98D19577BDDAAD5373C1FCDAA
3,709,289 UART: Caliptra RT
3,709,542 UART: [state] CFI Enabled
3,818,015 UART: [rt] RT listening for mailbox commands...
3,818,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,465 UART: [rt]cmd =0x41544d4e, len=14344
3,950,590 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,570 ready_for_fw is high
1,055,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,726 >>> mbox cmd response: success
3,231,831 UART:
3,231,847 UART: Running Caliptra FMC ...
3,232,255 UART:
3,232,309 UART: [state] CFI Enabled
3,242,843 UART: [fht] FMC Alias Private Key: 7
3,350,451 UART: [art] Extend RT PCRs Done
3,350,879 UART: [art] Lock RT PCRs Done
3,352,517 UART: [art] Populate DV Done
3,360,719 UART: [fht] FMC Alias Private Key: 7
3,361,699 UART: [art] Derive CDI
3,361,979 UART: [art] Store in in slot 0x4
3,447,840 UART: [art] Derive Key Pair
3,448,200 UART: [art] Store priv key in slot 0x5
3,461,226 UART: [art] Derive Key Pair - Done
3,475,731 UART: [art] Signing Cert with AUTHO
3,476,211 UART: RITY.KEYID = 7
3,491,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,334 UART: [art] PUB.X = A4E36F1F3D999D8B971192F7F0983D3A4A5BCEA98BB39F452061347DFB2E42AC4D96A75063B6C1FC37D4627229C4D65F
3,499,112 UART: [art] PUB.Y = 7F903554E5D81F17E2FF02A41FB6D2EA2C23805EDCA7D5B7B78802EF7D01839A49BED471F23DA9C52FA22B6236533C44
3,506,063 UART: [art] SIG.R = 259A17524A80DDCEE0E2AC2A44086D5822D94A7CD682D350240D4E3F529268D783D7C3F52E708B2D0DDC8C6ABFD032E7
3,512,834 UART: [art] SIG.S = 043379C2FF4E2867E054CDB33B8D4C796DD92B24F0155A5ECFA92BED1B4DFA23F3310AE6C42B6F1CA7F979D46FB73CF2
3,536,807 UART: Caliptra RT
3,537,060 UART: [state] CFI Enabled
3,644,321 UART: [rt] RT listening for mailbox commands...
3,644,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,075 UART: [rt]cmd =0x41544d4e, len=14344
3,776,328 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 ready_for_fw is high
1,174,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,541 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,441 >>> mbox cmd response: success
3,324,694 UART: [afmc] ++
3,324,862 UART: [afmc] CDI.KEYID = 6
3,325,225 UART: [afmc] SUBJECT.KEYID = 7
3,325,651 UART: [afmc] AUTHORITY.KEYID = 5
3,361,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,192 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,902 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,792 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,503 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,271 UART: [afmc] --
3,404,197 UART: [cold-reset] --
3,405,087 UART: [state] Locking Datavault
3,406,134 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,738 UART: [state] Locking ICCM
3,407,212 UART: [exit] Launching FMC @ 0x40000130
3,412,541 UART:
3,412,557 UART: Running Caliptra FMC ...
3,412,965 UART:
3,413,108 UART: [state] CFI Enabled
3,424,268 UART: [fht] FMC Alias Private Key: 7
3,532,658 UART: [art] Extend RT PCRs Done
3,533,086 UART: [art] Lock RT PCRs Done
3,534,408 UART: [art] Populate DV Done
3,542,700 UART: [fht] FMC Alias Private Key: 7
3,543,806 UART: [art] Derive CDI
3,544,086 UART: [art] Store in in slot 0x4
3,629,583 UART: [art] Derive Key Pair
3,629,943 UART: [art] Store priv key in slot 0x5
3,642,899 UART: [art] Derive Key Pair - Done
3,657,382 UART: [art] Signing Cert with AUTHO
3,657,862 UART: RITY.KEYID = 7
3,673,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,953 UART: [art] PUB.X = 31B8A503FB15D2B5F6DDA93EB2AA3C6D0079ABAEE599F135725F398F02ED508215F86C58B701B0F9671F4CC2B933A0BC
3,680,706 UART: [art] PUB.Y = 616CF0F7E618C2CE04D964A03806F11F1E34BA6EA3A057AA3EEB5165D825213F68ED7D0B901880CF30A38EE759D42E74
3,687,655 UART: [art] SIG.R = E22CCA2797E1EB9C8ED8CE472893D81415B4E542A94CA3A5ADC0E378F1C0D755681281686B4F9EA6920EAAA5E501F320
3,694,429 UART: [art] SIG.S = FC097243C0BA9F1A047C8B6C69D32DC68DF1C967B616109081B18BA731717D3D58C69EF31DEF75037607CA61E4A9E266
3,718,398 UART: Caliptra RT
3,718,743 UART: [state] CFI Enabled
3,826,492 UART: [rt] RT listening for mailbox commands...
3,827,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,106 UART: [rt]cmd =0x41544d4e, len=14344
3,958,521 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,809 ready_for_fw is high
1,055,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,156,677 >>> mbox cmd response: success
3,219,288 UART:
3,219,304 UART: Running Caliptra FMC ...
3,219,712 UART:
3,219,855 UART: [state] CFI Enabled
3,230,327 UART: [fht] FMC Alias Private Key: 7
3,338,201 UART: [art] Extend RT PCRs Done
3,338,629 UART: [art] Lock RT PCRs Done
3,340,435 UART: [art] Populate DV Done
3,348,711 UART: [fht] FMC Alias Private Key: 7
3,349,777 UART: [art] Derive CDI
3,350,057 UART: [art] Store in in slot 0x4
3,435,580 UART: [art] Derive Key Pair
3,435,940 UART: [art] Store priv key in slot 0x5
3,449,572 UART: [art] Derive Key Pair - Done
3,464,308 UART: [art] Signing Cert with AUTHO
3,464,788 UART: RITY.KEYID = 7
3,479,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,727 UART: [art] PUB.X = 053ACEA20E335E5DEC319B89F8EEEFA89F3E78FB8F2AB925C743D2619FF38106CAF18B7797E34025BD95D2F20210BAE5
3,487,501 UART: [art] PUB.Y = 0623E987E41A6BA6A2A4F5A88B56E30F6B90D0E4A185453A7C24F9DB57C1D8DC2B21A7F2F062319EFC33DA2841377320
3,494,451 UART: [art] SIG.R = E44F8AA36D3FFAD2D099964E75277A873F58B327AA81FA1FC4993C2C29F7601E7100C8D06F04C43AAE3A7DA990B70071
3,501,182 UART: [art] SIG.S = 460E0010AFD2799857B147235FDF1E476BC11C1D3746E45205AC16D7A72131DA09DCF8FF97B3B6D7C6139BBCACA147C7
3,524,926 UART: Caliptra RT
3,525,271 UART: [state] CFI Enabled
3,632,741 UART: [rt] RT listening for mailbox commands...
3,633,411 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,535 UART: [rt]cmd =0x41544d4e, len=14344
3,765,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,275 UART:
192,634 UART: Running Caliptra ROM ...
193,749 UART:
193,893 UART: [state] CFI Enabled
262,031 UART: [state] LifecycleState = Unprovisioned
264,013 UART: [state] DebugLocked = No
265,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,027 UART: [kat] SHA2-256
440,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,260 UART: [kat] ++
451,704 UART: [kat] sha1
463,076 UART: [kat] SHA2-256
465,745 UART: [kat] SHA2-384
471,735 UART: [kat] SHA2-512-ACC
474,108 UART: [kat] ECC-384
2,768,872 UART: [kat] HMAC-384Kdf
2,799,237 UART: [kat] LMS
3,989,505 UART: [kat] --
3,993,312 UART: [cold-reset] ++
3,994,474 UART: [fht] Storing FHT @ 0x50003400
4,005,835 UART: [idev] ++
4,006,447 UART: [idev] CDI.KEYID = 6
4,007,345 UART: [idev] SUBJECT.KEYID = 7
4,008,596 UART: [idev] UDS.KEYID = 0
4,009,672 ready_for_fw is high
4,009,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,249 UART: [idev] Erasing UDS.KEYID = 0
7,345,904 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,343 UART: [idev] --
7,370,928 UART: [ldev] ++
7,371,507 UART: [ldev] CDI.KEYID = 6
7,372,443 UART: [ldev] SUBJECT.KEYID = 5
7,373,712 UART: [ldev] AUTHORITY.KEYID = 7
7,374,939 UART: [ldev] FE.KEYID = 1
7,421,698 UART: [ldev] Erasing FE.KEYID = 1
10,755,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,287 UART: [ldev] --
13,135,669 UART: [fwproc] Waiting for Commands...
13,138,525 UART: [fwproc] Received command 0x46574c44
13,140,707 UART: [fwproc] Received Image of size 114124 bytes
17,194,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,120 >>> mbox cmd response: success
17,662,684 UART: [afmc] ++
17,663,276 UART: [afmc] CDI.KEYID = 6
17,664,298 UART: [afmc] SUBJECT.KEYID = 7
17,665,465 UART: [afmc] AUTHORITY.KEYID = 5
21,026,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,993 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,371 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,239 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,721 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,529 UART: [afmc] --
23,400,106 UART: [cold-reset] --
23,403,552 UART: [state] Locking Datavault
23,409,558 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,307 UART: [state] Locking ICCM
23,412,732 UART: [exit] Launching FMC @ 0x40000130
23,421,122 UART:
23,421,353 UART: Running Caliptra FMC ...
23,422,377 UART:
23,422,524 UART: [state] CFI Enabled
23,487,167 UART: [fht] FMC Alias Private Key: 7
25,826,844 UART: [art] Extend RT PCRs Done
25,828,067 UART: [art] Lock RT PCRs Done
25,829,550 UART: [art] Populate DV Done
25,835,071 UART: [fht] FMC Alias Private Key: 7
25,836,609 UART: [art] Derive CDI
25,837,424 UART: [art] Store in in slot 0x4
25,897,493 UART: [art] Derive Key Pair
25,898,544 UART: [art] Store priv key in slot 0x5
29,190,809 UART: [art] Derive Key Pair - Done
29,203,855 UART: [art] Signing Cert with AUTHO
29,205,198 UART: RITY.KEYID = 7
31,493,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,922 UART: [art] PUB.X = AC9BFB7A6A36BBB93DA5B437322C119B7F977855CFED7BFCE3564A59C50033601C50F3E5ADD1297FCC060A2ADC6549D9
31,502,187 UART: [art] PUB.Y = BF06BF4DFDB07740EB90C86628800076AE7702F121C21B33989FD08A4F3E6AF7ECB172E36F752F51E3CAB5053D29F906
31,509,431 UART: [art] SIG.R = 5A7EA2AEA767DB4A924488A82230DF99164D672F005DF84ED29125B27004A2F7057726B27C667667DFA974245993DAA5
31,516,783 UART: [art] SIG.S = 2C56A637B058B60676FD53C93C0EC4F992F8CD43FE8BB365E155E085A92052A2E6FD1624BC67316474F2E78DC7358DA6
32,822,425 UART: Caliptra RT
32,823,114 UART: [state] CFI Enabled
32,984,523 UART: [rt] RT listening for mailbox commands...
32,986,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,142,262 UART: [rt]cmd =0x41544d4e, len=14344
38,378,079 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,807,755 ready_for_fw is high
3,808,331 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,879,030 >>> mbox cmd response: success
23,569,268 UART:
23,569,653 UART: Running Caliptra FMC ...
23,570,754 UART:
23,570,920 UART: [state] CFI Enabled
23,621,121 UART: [fht] FMC Alias Private Key: 7
25,960,433 UART: [art] Extend RT PCRs Done
25,961,673 UART: [art] Lock RT PCRs Done
25,963,522 UART: [art] Populate DV Done
25,968,882 UART: [fht] FMC Alias Private Key: 7
25,970,478 UART: [art] Derive CDI
25,971,293 UART: [art] Store in in slot 0x4
26,030,073 UART: [art] Derive Key Pair
26,031,124 UART: [art] Store priv key in slot 0x5
29,324,147 UART: [art] Derive Key Pair - Done
29,337,255 UART: [art] Signing Cert with AUTHO
29,338,565 UART: RITY.KEYID = 7
31,625,272 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,777 UART: [art] PUB.X = A13C8AB36840DF7DD8A9F144707ECBD6E68E89EBCCF10C0FB58BDD35B3301568897F3A1243AACD08F2B8D9E0F019F233
31,634,101 UART: [art] PUB.Y = B8201FC2F8C6EC6EF76A3546052E860DDBB7A6260A5D94FEC7979A9E0B310ABF664D66A446C767BA636A13F3E2B4EE1B
31,641,316 UART: [art] SIG.R = 3FA8C25EFE7C11FF42BD356525CEB1D71F3B592A8992EF25BB696F4025E4EE4CC3CD3905C11C392DAD51A21A0FE49675
31,648,717 UART: [art] SIG.S = 070B16B9195FDF55A21657D5F75DED4A4984629A5822AC704AB6AA7FDFC9258A3A0CBB170CF0BFBB12F0E07179C7DF5C
32,953,798 UART: Caliptra RT
32,954,507 UART: [state] CFI Enabled
33,129,335 UART: [rt] RT listening for mailbox commands...
33,131,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,287,273 UART: [rt]cmd =0x41544d4e, len=14344
38,522,445 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,460 UART:
192,817 UART: Running Caliptra ROM ...
194,008 UART:
603,593 UART: [state] CFI Enabled
616,049 UART: [state] LifecycleState = Unprovisioned
617,996 UART: [state] DebugLocked = No
620,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,721 UART: [kat] SHA2-256
795,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,960 UART: [kat] ++
806,442 UART: [kat] sha1
817,807 UART: [kat] SHA2-256
820,527 UART: [kat] SHA2-384
825,944 UART: [kat] SHA2-512-ACC
828,304 UART: [kat] ECC-384
3,113,665 UART: [kat] HMAC-384Kdf
3,124,842 UART: [kat] LMS
4,314,977 UART: [kat] --
4,320,996 UART: [cold-reset] ++
4,323,103 UART: [fht] Storing FHT @ 0x50003400
4,333,664 UART: [idev] ++
4,334,225 UART: [idev] CDI.KEYID = 6
4,335,247 UART: [idev] SUBJECT.KEYID = 7
4,336,420 UART: [idev] UDS.KEYID = 0
4,337,429 ready_for_fw is high
4,337,635 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,950 UART: [idev] Erasing UDS.KEYID = 0
7,620,370 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,007 UART: [idev] --
7,646,685 UART: [ldev] ++
7,647,247 UART: [ldev] CDI.KEYID = 6
7,648,179 UART: [ldev] SUBJECT.KEYID = 5
7,649,435 UART: [ldev] AUTHORITY.KEYID = 7
7,650,632 UART: [ldev] FE.KEYID = 1
7,660,375 UART: [ldev] Erasing FE.KEYID = 1
10,947,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,796 UART: [ldev] --
13,309,130 UART: [fwproc] Waiting for Commands...
13,312,247 UART: [fwproc] Received command 0x46574c44
13,314,421 UART: [fwproc] Received Image of size 114124 bytes
17,374,894 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,058 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,119 >>> mbox cmd response: success
17,842,185 UART: [afmc] ++
17,842,774 UART: [afmc] CDI.KEYID = 6
17,843,709 UART: [afmc] SUBJECT.KEYID = 7
17,844,972 UART: [afmc] AUTHORITY.KEYID = 5
21,156,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,362 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,741 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,558 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,983 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,633 UART: [afmc] --
23,523,287 UART: [cold-reset] --
23,526,018 UART: [state] Locking Datavault
23,530,620 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,368 UART: [state] Locking ICCM
23,534,003 UART: [exit] Launching FMC @ 0x40000130
23,542,399 UART:
23,542,625 UART: Running Caliptra FMC ...
23,543,643 UART:
23,543,783 UART: [state] CFI Enabled
23,551,956 UART: [fht] FMC Alias Private Key: 7
25,883,144 UART: [art] Extend RT PCRs Done
25,884,374 UART: [art] Lock RT PCRs Done
25,886,348 UART: [art] Populate DV Done
25,891,856 UART: [fht] FMC Alias Private Key: 7
25,893,461 UART: [art] Derive CDI
25,894,195 UART: [art] Store in in slot 0x4
25,936,952 UART: [art] Derive Key Pair
25,937,990 UART: [art] Store priv key in slot 0x5
29,179,959 UART: [art] Derive Key Pair - Done
29,192,796 UART: [art] Signing Cert with AUTHO
29,194,104 UART: RITY.KEYID = 7
31,473,961 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,465 UART: [art] PUB.X = BC0B03F11E0A6F5786D8C650C68BB5AA00BAB35B17225F018040050E9DD21918F4A50C070158C2DB146F7F21FB6A9B81
31,482,750 UART: [art] PUB.Y = 69FE2D88918717335E08A3A45CAA5DB381689B933AE99C1FD2AF9BF67996F539A7CBF976988EBC937924D322375ABDC3
31,490,012 UART: [art] SIG.R = BADD0A2F88D20D8C0EA107A7A6AF03AA4A2D80F49FEE9496771E3146EA979C2CF5D038375CA3FB2EEB588A6DE1E3562D
31,497,392 UART: [art] SIG.S = E6ABCB061A9F6CB273935A230AA7B9957D58B18C0A00D36D545F255D15AF19E31C978B1ED3B95FF441EE46FD4FFCEC9B
32,802,766 UART: Caliptra RT
32,803,455 UART: [state] CFI Enabled
32,921,212 UART: [rt] RT listening for mailbox commands...
32,923,525 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,078,662 UART: [rt]cmd =0x41544d4e, len=14344
38,313,761 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,127,288 ready_for_fw is high
4,127,707 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,706 >>> mbox cmd response: success
23,711,538 UART:
23,711,930 UART: Running Caliptra FMC ...
23,713,128 UART:
23,713,315 UART: [state] CFI Enabled
23,721,251 UART: [fht] FMC Alias Private Key: 7
26,052,129 UART: [art] Extend RT PCRs Done
26,053,424 UART: [art] Lock RT PCRs Done
26,055,401 UART: [art] Populate DV Done
26,060,959 UART: [fht] FMC Alias Private Key: 7
26,062,506 UART: [art] Derive CDI
26,063,268 UART: [art] Store in in slot 0x4
26,106,074 UART: [art] Derive Key Pair
26,107,073 UART: [art] Store priv key in slot 0x5
29,349,484 UART: [art] Derive Key Pair - Done
29,362,376 UART: [art] Signing Cert with AUTHO
29,363,684 UART: RITY.KEYID = 7
31,643,276 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,920 UART: [art] PUB.X = 13695DBCF3A86D7834C17B2294DCC41F7297D06B30AC1646523CF16804384031092C6A5C9B6A5A5DE5E06E4D2D648ACC
31,652,041 UART: [art] PUB.Y = 8AC9BF88640DE416860EFB1CF07874BD6D61424E0B9F4BF3F1D41F5C1ABC13A8098B64F21A07CA56D95F326ADEB7A4BA
31,659,290 UART: [art] SIG.R = E2F0159C0BB911F973F64ABEE447E2133831D6883F142858BE1CA47A4CC85D8CE57B7A23265D01C47E6B6BEEE22D5FF4
31,666,669 UART: [art] SIG.S = 08CD797214A017D24B573D13ACCECB92E43D3E9D8BACB79621C89EBD8179F9802BCF4E206C19429AAFAAF479FB7DA530
32,971,808 UART: Caliptra RT
32,972,494 UART: [state] CFI Enabled
33,090,162 UART: [rt] RT listening for mailbox commands...
33,092,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,247,820 UART: [rt]cmd =0x41544d4e, len=14344
38,482,999 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,422 UART:
192,771 UART: Running Caliptra ROM ...
193,970 UART:
194,123 UART: [state] CFI Enabled
264,273 UART: [state] LifecycleState = Unprovisioned
266,189 UART: [state] DebugLocked = No
268,075 UART: [state] WD Timer not started. Device not locked for debugging
271,478 UART: [kat] SHA2-256
450,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,137 UART: [kat] ++
462,662 UART: [kat] sha1
473,473 UART: [kat] SHA2-256
476,568 UART: [kat] SHA2-384
483,595 UART: [kat] SHA2-512-ACC
486,586 UART: [kat] ECC-384
2,949,812 UART: [kat] HMAC-384Kdf
2,971,351 UART: [kat] LMS
3,500,779 UART: [kat] --
3,503,595 UART: [cold-reset] ++
3,504,679 UART: [fht] FHT @ 0x50003400
3,516,086 UART: [idev] ++
3,516,661 UART: [idev] CDI.KEYID = 6
3,517,590 UART: [idev] SUBJECT.KEYID = 7
3,519,286 UART: [idev] UDS.KEYID = 0
3,520,223 ready_for_fw is high
3,520,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,308 UART: [idev] Erasing UDS.KEYID = 0
6,025,076 UART: [idev] Sha1 KeyId Algorithm
6,049,196 UART: [idev] --
6,052,602 UART: [ldev] ++
6,053,172 UART: [ldev] CDI.KEYID = 6
6,054,057 UART: [ldev] SUBJECT.KEYID = 5
6,055,163 UART: [ldev] AUTHORITY.KEYID = 7
6,056,511 UART: [ldev] FE.KEYID = 1
6,098,572 UART: [ldev] Erasing FE.KEYID = 1
8,602,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,277 UART: [ldev] --
10,413,793 UART: [fwproc] Wait for Commands...
10,417,021 UART: [fwproc] Recv command 0x46574c44
10,419,113 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,366 >>> mbox cmd response: success
14,289,047 UART: [afmc] ++
14,289,645 UART: [afmc] CDI.KEYID = 6
14,290,562 UART: [afmc] SUBJECT.KEYID = 7
14,291,726 UART: [afmc] AUTHORITY.KEYID = 5
16,824,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,460 UART: [afmc] --
18,628,808 UART: [cold-reset] --
18,632,032 UART: [state] Locking Datavault
18,635,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,474 UART: [state] Locking ICCM
18,638,891 UART: [exit] Launching FMC @ 0x40000130
18,647,309 UART:
18,647,544 UART: Running Caliptra FMC ...
18,648,647 UART:
18,648,810 UART: [state] CFI Enabled
18,710,953 UART: [fht] FMC Alias Private Key: 7
20,475,205 UART: [art] Extend RT PCRs Done
20,476,414 UART: [art] Lock RT PCRs Done
20,478,335 UART: [art] Populate DV Done
20,483,949 UART: [fht] FMC Alias Private Key: 7
20,485,441 UART: [art] Derive CDI
20,486,205 UART: [art] Store in in slot 0x4
20,543,196 UART: [art] Derive Key Pair
20,544,215 UART: [art] Store priv key in slot 0x5
23,007,591 UART: [art] Derive Key Pair - Done
23,020,599 UART: [art] Signing Cert with AUTHO
23,021,914 UART: RITY.KEYID = 7
24,733,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,953 UART: [art] PUB.X = 8432F1FC12B1250A3C5A61B0C04AC0C5B07092815DBC79277EEEE14AACBDD7C4701469CD163D1A3906E9E3F63F18F041
24,742,209 UART: [art] PUB.Y = 516750706A56D03DE047DFA683D5E3A0A356B47F4FF66812A39F5B41A77E06142F40B741546568D75283EA345B9B9CEC
24,749,441 UART: [art] SIG.R = C729353BA84E0887EB1F5342FE9A55F903BC08C4024EC72206192E25C65E1E27A31DD717DF491DC0A1A90572656FAE68
24,756,830 UART: [art] SIG.S = 2DD9DB32E904DAB99CA10639B157C2C26EAA0BBE097D0B4676B52F8DA4C6B64C44DE27221E8C8995DCAE2E9643FDF8EA
25,735,750 UART: Caliptra RT
25,736,452 UART: [state] CFI Enabled
25,901,248 UART: [rt] RT listening for mailbox commands...
25,903,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,704 UART: [rt]cmd =0x41544d4e, len=14344
29,990,189 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,382,510 ready_for_fw is high
3,382,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,005 >>> mbox cmd response: success
18,367,794 UART:
18,368,178 UART: Running Caliptra FMC ...
18,369,275 UART:
18,369,426 UART: [state] CFI Enabled
18,436,407 UART: [fht] FMC Alias Private Key: 7
20,199,998 UART: [art] Extend RT PCRs Done
20,201,216 UART: [art] Lock RT PCRs Done
20,202,935 UART: [art] Populate DV Done
20,208,376 UART: [fht] FMC Alias Private Key: 7
20,210,022 UART: [art] Derive CDI
20,210,765 UART: [art] Store in in slot 0x4
20,269,872 UART: [art] Derive Key Pair
20,270,914 UART: [art] Store priv key in slot 0x5
22,733,665 UART: [art] Derive Key Pair - Done
22,746,768 UART: [art] Signing Cert with AUTHO
22,748,066 UART: RITY.KEYID = 7
24,459,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,986 UART: [art] PUB.X = 44B5BC54697061E72635F7543AC6F7779D2A2A3939820E336223C36849302426A44E7411950ECA8E9E69E0F71FBB5205
24,468,229 UART: [art] PUB.Y = 04E4F30A16A47731EAD70B830F81650F9C69F67A69EDA16EFEFCDDF7FA1F2EAC4CCF387C6E5BAFE7BF57A46243CB47E2
24,475,501 UART: [art] SIG.R = 27E5A7D683F400874A3724A05AB52E1C9BE682864212AF6577D014CEA952E48CE7792D36B2FE3022D7C1C496922C36D4
24,482,844 UART: [art] SIG.S = DFABAA75E0F4FDDD86DE20287D09F9D384401509D5B1EEA64B27508C41B7A77B4114BC4F5620241AC61D459487210EFF
25,461,807 UART: Caliptra RT
25,462,495 UART: [state] CFI Enabled
25,627,938 UART: [rt] RT listening for mailbox commands...
25,630,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,786,038 UART: [rt]cmd =0x41544d4e, len=14344
29,715,595 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,373 UART:
192,749 UART: Running Caliptra ROM ...
193,885 UART:
603,518 UART: [state] CFI Enabled
619,736 UART: [state] LifecycleState = Unprovisioned
621,608 UART: [state] DebugLocked = No
623,218 UART: [state] WD Timer not started. Device not locked for debugging
627,450 UART: [kat] SHA2-256
806,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,112 UART: [kat] ++
818,641 UART: [kat] sha1
829,674 UART: [kat] SHA2-256
832,722 UART: [kat] SHA2-384
839,700 UART: [kat] SHA2-512-ACC
842,625 UART: [kat] ECC-384
3,281,600 UART: [kat] HMAC-384Kdf
3,294,487 UART: [kat] LMS
3,823,974 UART: [kat] --
3,828,127 UART: [cold-reset] ++
3,830,768 UART: [fht] FHT @ 0x50003400
3,840,956 UART: [idev] ++
3,841,512 UART: [idev] CDI.KEYID = 6
3,842,532 UART: [idev] SUBJECT.KEYID = 7
3,843,623 UART: [idev] UDS.KEYID = 0
3,844,661 ready_for_fw is high
3,844,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,561 UART: [idev] Erasing UDS.KEYID = 0
6,319,417 UART: [idev] Sha1 KeyId Algorithm
6,342,102 UART: [idev] --
6,345,668 UART: [ldev] ++
6,346,306 UART: [ldev] CDI.KEYID = 6
6,347,220 UART: [ldev] SUBJECT.KEYID = 5
6,348,397 UART: [ldev] AUTHORITY.KEYID = 7
6,349,628 UART: [ldev] FE.KEYID = 1
6,360,214 UART: [ldev] Erasing FE.KEYID = 1
8,831,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,183 UART: [ldev] --
10,623,400 UART: [fwproc] Wait for Commands...
10,626,149 UART: [fwproc] Recv command 0x46574c44
10,628,238 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,643 >>> mbox cmd response: success
14,495,815 UART: [afmc] ++
14,496,408 UART: [afmc] CDI.KEYID = 6
14,497,315 UART: [afmc] SUBJECT.KEYID = 7
14,498,567 UART: [afmc] AUTHORITY.KEYID = 5
16,999,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,787 UART: [afmc] --
18,797,345 UART: [cold-reset] --
18,801,084 UART: [state] Locking Datavault
18,806,980 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,676 UART: [state] Locking ICCM
18,810,599 UART: [exit] Launching FMC @ 0x40000130
18,819,010 UART:
18,819,245 UART: Running Caliptra FMC ...
18,820,332 UART:
18,820,484 UART: [state] CFI Enabled
18,828,743 UART: [fht] FMC Alias Private Key: 7
20,585,135 UART: [art] Extend RT PCRs Done
20,586,328 UART: [art] Lock RT PCRs Done
20,588,212 UART: [art] Populate DV Done
20,593,828 UART: [fht] FMC Alias Private Key: 7
20,595,300 UART: [art] Derive CDI
20,596,052 UART: [art] Store in in slot 0x4
20,638,362 UART: [art] Derive Key Pair
20,639,355 UART: [art] Store priv key in slot 0x5
23,065,750 UART: [art] Derive Key Pair - Done
23,078,691 UART: [art] Signing Cert with AUTHO
23,079,998 UART: RITY.KEYID = 7
24,785,326 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,819 UART: [art] PUB.X = 4B862A1A4D440F41940DFF0DFC3B228B28E71694FC622F17D064DF8BF8FC9CE853B04B77A42E5F0361582C17215F8A9F
24,794,075 UART: [art] PUB.Y = A8AE50DDFE3B4E336D2493C9B65B6E66FF66C2F9FDADB73EC84C8691AB8739C105E9BBB92B248484E6896AA663F851BA
24,801,403 UART: [art] SIG.R = F8294354B2400A540E6118444FF0BDF2C880D6A4B9AD2942B9CD61AC3B8E0013D8251769A1B1CB34337CC9DBB4132461
24,808,722 UART: [art] SIG.S = 63201018715575E0BFE0EE638684CB8DB0B4F7933709588D41C7704BC719916C1BF470F462143E930C2322181A4B371D
25,787,999 UART: Caliptra RT
25,788,719 UART: [state] CFI Enabled
25,906,032 UART: [rt] RT listening for mailbox commands...
25,908,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,063,537 UART: [rt]cmd =0x41544d4e, len=14344
29,993,316 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,691,217 ready_for_fw is high
3,691,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,256,804 >>> mbox cmd response: success
18,506,523 UART:
18,507,019 UART: Running Caliptra FMC ...
18,508,138 UART:
18,508,282 UART: [state] CFI Enabled
18,516,453 UART: [fht] FMC Alias Private Key: 7
20,273,537 UART: [art] Extend RT PCRs Done
20,274,764 UART: [art] Lock RT PCRs Done
20,276,628 UART: [art] Populate DV Done
20,282,070 UART: [fht] FMC Alias Private Key: 7
20,283,669 UART: [art] Derive CDI
20,284,401 UART: [art] Store in in slot 0x4
20,327,256 UART: [art] Derive Key Pair
20,328,252 UART: [art] Store priv key in slot 0x5
22,755,007 UART: [art] Derive Key Pair - Done
22,768,058 UART: [art] Signing Cert with AUTHO
22,769,353 UART: RITY.KEYID = 7
24,474,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,412 UART: [art] PUB.X = BDFF7A953F682FE3D309CB5D7C26C7DE4D20D6C199C9F50C8D26B8F79BF25A9248689F62DBC6263F7DCD6DD46F28AAB1
24,483,714 UART: [art] PUB.Y = AC682C8FFCFFDA96CC2F7ABFEA5693F8F1632651F8A7F68BB40E9AD4A989FAC4BE907DE2533B9A7DC0E3B4BE7DF0CD1A
24,490,992 UART: [art] SIG.R = 4C673A06512465C2A84AF1FC1BF065F81A1BB222B34C4E18195DAD8F85BD7E53D07467AA0212998624E9D39BAB902ACC
24,498,407 UART: [art] SIG.S = 82A1CE3133664C2FDB481FC8C77C662E0D077E8DA575EF4BA023A252A25AB05AA8810BE314D5B90DFE7858BCDD9EC6AD
25,476,910 UART: Caliptra RT
25,477,620 UART: [state] CFI Enabled
25,594,351 UART: [rt] RT listening for mailbox commands...
25,596,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,752,072 UART: [rt]cmd =0x41544d4e, len=14344
29,682,755 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,128 UART:
192,488 UART: Running Caliptra ROM ...
193,601 UART:
193,744 UART: [state] CFI Enabled
265,573 UART: [state] LifecycleState = Unprovisioned
267,992 UART: [state] DebugLocked = No
269,250 UART: [state] WD Timer not started. Device not locked for debugging
273,002 UART: [kat] SHA2-256
462,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,434 UART: [kat] ++
473,879 UART: [kat] sha1
485,607 UART: [kat] SHA2-256
488,628 UART: [kat] SHA2-384
494,966 UART: [kat] SHA2-512-ACC
497,560 UART: [kat] ECC-384
2,948,434 UART: [kat] HMAC-384Kdf
2,971,078 UART: [kat] LMS
3,502,880 UART: [kat] --
3,506,305 UART: [cold-reset] ++
3,507,949 UART: [fht] FHT @ 0x50003400
3,519,274 UART: [idev] ++
3,519,913 UART: [idev] CDI.KEYID = 6
3,520,886 UART: [idev] SUBJECT.KEYID = 7
3,522,059 UART: [idev] UDS.KEYID = 0
3,522,964 ready_for_fw is high
3,523,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,680 UART: [idev] Erasing UDS.KEYID = 0
6,027,554 UART: [idev] Sha1 KeyId Algorithm
6,051,118 UART: [idev] --
6,056,249 UART: [ldev] ++
6,056,930 UART: [ldev] CDI.KEYID = 6
6,057,865 UART: [ldev] SUBJECT.KEYID = 5
6,059,024 UART: [ldev] AUTHORITY.KEYID = 7
6,060,261 UART: [ldev] FE.KEYID = 1
6,099,928 UART: [ldev] Erasing FE.KEYID = 1
8,604,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,688 UART: [ldev] --
10,415,854 UART: [fwproc] Wait for Commands...
10,418,817 UART: [fwproc] Recv command 0x46574c44
10,421,124 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,606,356 >>> mbox cmd response: success
14,610,147 UART: [afmc] ++
14,610,846 UART: [afmc] CDI.KEYID = 6
14,612,004 UART: [afmc] SUBJECT.KEYID = 7
14,613,556 UART: [afmc] AUTHORITY.KEYID = 5
17,148,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,205 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,324 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,823 UART: [afmc] --
18,948,847 UART: [cold-reset] --
18,951,250 UART: [state] Locking Datavault
18,957,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,242 UART: [state] Locking ICCM
18,962,041 UART: [exit] Launching FMC @ 0x40000130
18,970,673 UART:
18,970,950 UART: Running Caliptra FMC ...
18,972,058 UART:
18,972,218 UART: [state] CFI Enabled
19,030,528 UART: [fht] FMC Alias Private Key: 7
20,794,341 UART: [art] Extend RT PCRs Done
20,795,574 UART: [art] Lock RT PCRs Done
20,797,227 UART: [art] Populate DV Done
20,802,641 UART: [fht] FMC Alias Private Key: 7
20,804,132 UART: [art] Derive CDI
20,804,896 UART: [art] Store in in slot 0x4
20,863,296 UART: [art] Derive Key Pair
20,864,337 UART: [art] Store priv key in slot 0x5
23,327,394 UART: [art] Derive Key Pair - Done
23,340,062 UART: [art] Signing Cert with AUTHO
23,341,364 UART: RITY.KEYID = 7
25,053,628 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,133 UART: [art] PUB.X = 4BF847A886CCFCA44B7DA13EDDA4A811C33E62357A6344BF6A2BB7EF03AAAB3D0F6C3E7E54C174AE7EA4034F85BF984F
25,062,436 UART: [art] PUB.Y = 6511FA6978B65D10F5762AE1F75F249F3E02B78BCCC26E5C98100FD008ACF07C278BD6D164FEF1FE987DC5B805193B7E
25,069,716 UART: [art] SIG.R = 3A9E16CE2D31B9DDFD7E12C79BA73985670FFE570EDA673456DC2F4457E25CDC74E31E267910806B9B9A2E8AE95B25B8
25,077,099 UART: [art] SIG.S = AB29DCAE376B47DCC929F67849E3AF78401990FAA739BB514EE7FA57A11A16B55AB220EB34D5A3994D5E38FBB1E19C1B
26,055,978 UART: Caliptra RT
26,056,705 UART: [state] CFI Enabled
26,222,563 UART: [rt] RT listening for mailbox commands...
26,224,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,380,648 UART: [rt]cmd =0x41544d4e, len=14344
30,311,775 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,439,456 ready_for_fw is high
3,439,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,756,941 >>> mbox cmd response: success
19,049,681 UART:
19,050,142 UART: Running Caliptra FMC ...
19,051,250 UART:
19,051,417 UART: [state] CFI Enabled
19,114,573 UART: [fht] FMC Alias Private Key: 7
20,878,250 UART: [art] Extend RT PCRs Done
20,879,460 UART: [art] Lock RT PCRs Done
20,881,193 UART: [art] Populate DV Done
20,886,658 UART: [fht] FMC Alias Private Key: 7
20,888,313 UART: [art] Derive CDI
20,889,131 UART: [art] Store in in slot 0x4
20,947,484 UART: [art] Derive Key Pair
20,948,535 UART: [art] Store priv key in slot 0x5
23,411,975 UART: [art] Derive Key Pair - Done
23,425,130 UART: [art] Signing Cert with AUTHO
23,426,435 UART: RITY.KEYID = 7
25,137,885 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,357 UART: [art] PUB.X = 8963104EB52E4100F48E15A86B7A684F2EB044C59947F48EC294ED0E7ACBB6904DD85013904DDE643B29B903114266DE
25,146,649 UART: [art] PUB.Y = 150C5AA130BC4CF949D69D1B8579276CA7458741A8A8C34A64A91E297B1EDBCF16DF3A1C39C1F2713DC8E21314FBB0C5
25,153,920 UART: [art] SIG.R = 1722CB470D6851A035AEB49EF122F10E4CEC76E82383D9292F19EB0B95FB25C22CC4BBCB8C36B99CB2FA74044D94B2E4
25,161,346 UART: [art] SIG.S = 206A76C888BAF4BD91D3EFB1120A91F35B6102D843A6EDDFF0EA1504B25A07F725DCBB165F8F29FBB10218417E276E77
26,140,606 UART: Caliptra RT
26,141,324 UART: [state] CFI Enabled
26,306,879 UART: [rt] RT listening for mailbox commands...
26,309,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,043 UART: [rt]cmd =0x41544d4e, len=14344
30,395,751 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,296 UART:
192,671 UART: Running Caliptra ROM ...
193,774 UART:
603,359 UART: [state] CFI Enabled
616,808 UART: [state] LifecycleState = Unprovisioned
619,168 UART: [state] DebugLocked = No
620,853 UART: [state] WD Timer not started. Device not locked for debugging
625,371 UART: [kat] SHA2-256
815,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,991 UART: [kat] ++
826,588 UART: [kat] sha1
836,433 UART: [kat] SHA2-256
839,452 UART: [kat] SHA2-384
845,724 UART: [kat] SHA2-512-ACC
848,367 UART: [kat] ECC-384
3,291,109 UART: [kat] HMAC-384Kdf
3,305,213 UART: [kat] LMS
3,837,078 UART: [kat] --
3,840,826 UART: [cold-reset] ++
3,842,757 UART: [fht] FHT @ 0x50003400
3,853,582 UART: [idev] ++
3,854,280 UART: [idev] CDI.KEYID = 6
3,855,204 UART: [idev] SUBJECT.KEYID = 7
3,856,440 UART: [idev] UDS.KEYID = 0
3,857,358 ready_for_fw is high
3,857,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,370 UART: [idev] Erasing UDS.KEYID = 0
6,330,571 UART: [idev] Sha1 KeyId Algorithm
6,352,063 UART: [idev] --
6,356,518 UART: [ldev] ++
6,357,201 UART: [ldev] CDI.KEYID = 6
6,358,262 UART: [ldev] SUBJECT.KEYID = 5
6,359,362 UART: [ldev] AUTHORITY.KEYID = 7
6,360,534 UART: [ldev] FE.KEYID = 1
6,371,877 UART: [ldev] Erasing FE.KEYID = 1
8,846,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,760 UART: [ldev] --
10,635,376 UART: [fwproc] Wait for Commands...
10,638,381 UART: [fwproc] Recv command 0x46574c44
10,640,683 UART: [fwproc] Recv'd Img size: 114448 bytes
14,088,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,825,087 >>> mbox cmd response: success
14,830,041 UART: [afmc] ++
14,830,771 UART: [afmc] CDI.KEYID = 6
14,832,022 UART: [afmc] SUBJECT.KEYID = 7
14,833,463 UART: [afmc] AUTHORITY.KEYID = 5
17,342,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,240 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,252 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,612 UART: [afmc] --
19,140,931 UART: [cold-reset] --
19,145,065 UART: [state] Locking Datavault
19,149,633 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,820 UART: [state] Locking ICCM
19,154,500 UART: [exit] Launching FMC @ 0x40000130
19,163,134 UART:
19,163,364 UART: Running Caliptra FMC ...
19,164,459 UART:
19,164,606 UART: [state] CFI Enabled
19,172,647 UART: [fht] FMC Alias Private Key: 7
20,929,674 UART: [art] Extend RT PCRs Done
20,930,909 UART: [art] Lock RT PCRs Done
20,932,588 UART: [art] Populate DV Done
20,937,943 UART: [fht] FMC Alias Private Key: 7
20,939,584 UART: [art] Derive CDI
20,940,390 UART: [art] Store in in slot 0x4
20,983,245 UART: [art] Derive Key Pair
20,984,240 UART: [art] Store priv key in slot 0x5
23,411,365 UART: [art] Derive Key Pair - Done
23,424,140 UART: [art] Signing Cert with AUTHO
23,425,444 UART: RITY.KEYID = 7
25,131,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,700 UART: [art] PUB.X = A6299FB500EB9DB523FFEE29A7F1B7E8DF96418EF498A79E74F37773544843A81F5748E826E8A15144E8FED985D0ACB2
25,139,925 UART: [art] PUB.Y = 214FF053BD1E6AB7534A66790EBBED8F0236EDB250B41DAF7FC1E3CB2FFF058FA75847FFCAC7D43DC709BC6493D6229E
25,147,401 UART: [art] SIG.R = 4C40EB7A3161DC8134F51BDFFC3C804F58CB406E0061A5A798E9456BF9922287651BA320757F408C02B31DA3FD13FBD4
25,154,625 UART: [art] SIG.S = B68D8A7592E9A8B4997A05034F1ACA162C2D2BCC01CD84C8AC3343EA503863634F5A7B665345D418CB55697CC48F5357
26,134,144 UART: Caliptra RT
26,134,862 UART: [state] CFI Enabled
26,251,872 UART: [rt] RT listening for mailbox commands...
26,254,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,409,568 UART: [rt]cmd =0x41544d4e, len=14344
30,339,485 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,755,598 ready_for_fw is high
3,755,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,969,865 >>> mbox cmd response: success
19,227,706 UART:
19,228,084 UART: Running Caliptra FMC ...
19,229,200 UART:
19,229,350 UART: [state] CFI Enabled
19,237,351 UART: [fht] FMC Alias Private Key: 7
20,993,866 UART: [art] Extend RT PCRs Done
20,995,083 UART: [art] Lock RT PCRs Done
20,996,487 UART: [art] Populate DV Done
21,001,718 UART: [fht] FMC Alias Private Key: 7
21,003,280 UART: [art] Derive CDI
21,004,042 UART: [art] Store in in slot 0x4
21,046,160 UART: [art] Derive Key Pair
21,047,207 UART: [art] Store priv key in slot 0x5
23,474,071 UART: [art] Derive Key Pair - Done
23,487,178 UART: [art] Signing Cert with AUTHO
23,488,475 UART: RITY.KEYID = 7
25,194,068 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,573 UART: [art] PUB.X = B79134DA0F7FF4ECEA062FA3288308E33B0FCB3AD00ECCC7CD208C7C3D74F7EED374D9177D086C82593A9DDBD33B10A6
25,202,888 UART: [art] PUB.Y = 3EEBF5338D67DEC251193C0E66D648B93166401EE67C06B4D8B22B45293996B09DB58F23D707DF5519B612B1C7FB3853
25,210,148 UART: [art] SIG.R = 6BF3DE06CBD619F270CF7F14C2C69A42CE27CAD6B4059135E011AE1A379F3F08B3DA691442D2826775D8DB00817DD085
25,217,537 UART: [art] SIG.S = 2B2EFF0554A205A738608A2E2F1C691E294A9EBD91A5FC9BBE0D050B614257C49209EE11A5AABE1F6F73628C4B742C92
26,196,408 UART: Caliptra RT
26,197,112 UART: [state] CFI Enabled
26,314,039 UART: [rt] RT listening for mailbox commands...
26,316,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,471,610 UART: [rt]cmd =0x41544d4e, len=14344
30,401,799 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,785 UART: [kat] SHA2-256
892,723 UART: [kat] SHA2-384
895,668 UART: [kat] SHA2-512-ACC
897,569 UART: [kat] ECC-384
903,284 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,259 UART: [fht] Storing FHT @ 0x50003400
1,480,006 UART: [idev] ++
1,480,174 UART: [idev] CDI.KEYID = 6
1,480,534 UART: [idev] SUBJECT.KEYID = 7
1,480,958 UART: [idev] UDS.KEYID = 0
1,481,303 ready_for_fw is high
1,481,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,936 UART: [idev] Erasing UDS.KEYID = 0
1,505,748 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,590 UART: [idev] --
1,515,465 UART: [ldev] ++
1,515,633 UART: [ldev] CDI.KEYID = 6
1,515,996 UART: [ldev] SUBJECT.KEYID = 5
1,516,422 UART: [ldev] AUTHORITY.KEYID = 7
1,516,885 UART: [ldev] FE.KEYID = 1
1,521,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,816 UART: [ldev] --
1,586,117 UART: [fwproc] Waiting for Commands...
1,586,980 UART: [fwproc] Received command 0x46574c44
1,587,771 UART: [fwproc] Received Image of size 114448 bytes
2,887,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,507 >>> mbox cmd response: success
3,081,535 UART: [afmc] ++
3,081,703 UART: [afmc] CDI.KEYID = 6
3,082,065 UART: [afmc] SUBJECT.KEYID = 7
3,082,490 UART: [afmc] AUTHORITY.KEYID = 5
3,117,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,040 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,730 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,581 UART: [afmc] --
3,160,509 UART: [cold-reset] --
3,161,417 UART: [state] Locking Datavault
3,162,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,378 UART: [state] Locking ICCM
3,163,968 UART: [exit] Launching FMC @ 0x40000130
3,169,297 UART:
3,169,313 UART: Running Caliptra FMC ...
3,169,721 UART:
3,169,775 UART: [state] CFI Enabled
3,180,266 UART: [fht] FMC Alias Private Key: 7
3,287,555 UART: [art] Extend RT PCRs Done
3,287,983 UART: [art] Lock RT PCRs Done
3,289,381 UART: [art] Populate DV Done
3,297,268 UART: [fht] FMC Alias Private Key: 7
3,298,294 UART: [art] Derive CDI
3,298,574 UART: [art] Store in in slot 0x4
3,384,115 UART: [art] Derive Key Pair
3,384,475 UART: [art] Store priv key in slot 0x5
3,397,651 UART: [art] Derive Key Pair - Done
3,412,448 UART: [art] Signing Cert with AUTHO
3,412,928 UART: RITY.KEYID = 7
3,428,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,115 UART: [art] PUB.X = 6A578D2C4448D8B8B648EC752B7AAAD97C3535351C276D46DF451D565B9A9071FC81B695F5DEFDAA5DBB4BC463619D4F
3,435,899 UART: [art] PUB.Y = 8134773CB9AC56F96D0A3A1476224394251239DFD2086C00C7108B77352B9267ACD5DB01E9D3CCF37C691BB72142E15F
3,442,816 UART: [art] SIG.R = 7ABC90B1EBC266DF73001400A67A82B31FC7924760CE3B03B97372C4D041B852CE54FA5DACF52CD15A7878969BB4200B
3,449,544 UART: [art] SIG.S = 1FBD8937CB928F8C98F697DC3242758BBCF905F6372C78D2744ED8E1BED91A9E178AD54D46F3054B2FCD57B6D18C7B4C
3,473,455 UART: Caliptra RT
3,473,708 UART: [state] CFI Enabled
3,581,848 UART: [rt] RT listening for mailbox commands...
3,582,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,810 UART: [rt]cmd =0x41544d4e, len=14344
3,850,789 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,083 ready_for_fw is high
1,362,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,019 >>> mbox cmd response: success
2,989,779 UART:
2,989,795 UART: Running Caliptra FMC ...
2,990,203 UART:
2,990,257 UART: [state] CFI Enabled
3,000,842 UART: [fht] FMC Alias Private Key: 7
3,109,317 UART: [art] Extend RT PCRs Done
3,109,745 UART: [art] Lock RT PCRs Done
3,111,041 UART: [art] Populate DV Done
3,119,278 UART: [fht] FMC Alias Private Key: 7
3,120,362 UART: [art] Derive CDI
3,120,642 UART: [art] Store in in slot 0x4
3,206,337 UART: [art] Derive Key Pair
3,206,697 UART: [art] Store priv key in slot 0x5
3,219,691 UART: [art] Derive Key Pair - Done
3,234,806 UART: [art] Signing Cert with AUTHO
3,235,286 UART: RITY.KEYID = 7
3,250,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,453 UART: [art] PUB.X = 30220338944BC69ADF2ECD0081683F4F20724BA8B6F17D45ECD3C368DB37C9F601091306AB5B0DA9AD6701625501769F
3,258,180 UART: [art] PUB.Y = F19C69B95EE15A9FBA1094B463A7D0CC215F70A42E163EEEA05CC3536DF4B811A0CAA92548E5AD79452374449BDA3D60
3,265,142 UART: [art] SIG.R = 88519E7E8EB4A4EC138D71EEC011C26CCBBBF4C9EBC4FE79F8BB539680BC7EB07D37B011D15527E0267B777705F5E379
3,271,923 UART: [art] SIG.S = F47023CAF9E652E17591CA5D300F4D0D36B2400EF9ECECD5FC578BDA279C17B0BC7F919FD9FD972E571ECCD21535080D
3,296,313 UART: Caliptra RT
3,296,566 UART: [state] CFI Enabled
3,404,624 UART: [rt] RT listening for mailbox commands...
3,405,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,524 UART: [rt]cmd =0x41544d4e, len=14344
3,673,667 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 ready_for_fw is high
1,480,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,459 UART: [idev] Erasing UDS.KEYID = 0
1,505,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,225 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,521,728 UART: [ldev] Erasing FE.KEYID = 1
1,547,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,277 UART: [ldev] --
1,586,636 UART: [fwproc] Waiting for Commands...
1,587,467 UART: [fwproc] Received command 0x46574c44
1,588,258 UART: [fwproc] Received Image of size 114448 bytes
2,887,215 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,168 >>> mbox cmd response: success
3,081,330 UART: [afmc] ++
3,081,498 UART: [afmc] CDI.KEYID = 6
3,081,860 UART: [afmc] SUBJECT.KEYID = 7
3,082,285 UART: [afmc] AUTHORITY.KEYID = 5
3,117,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,111 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,801 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,506 UART: [afmc] --
3,160,420 UART: [cold-reset] --
3,161,266 UART: [state] Locking Datavault
3,162,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,879 UART: [state] Locking ICCM
3,163,517 UART: [exit] Launching FMC @ 0x40000130
3,168,846 UART:
3,168,862 UART: Running Caliptra FMC ...
3,169,270 UART:
3,169,413 UART: [state] CFI Enabled
3,179,730 UART: [fht] FMC Alias Private Key: 7
3,288,355 UART: [art] Extend RT PCRs Done
3,288,783 UART: [art] Lock RT PCRs Done
3,290,447 UART: [art] Populate DV Done
3,298,630 UART: [fht] FMC Alias Private Key: 7
3,299,802 UART: [art] Derive CDI
3,300,082 UART: [art] Store in in slot 0x4
3,385,967 UART: [art] Derive Key Pair
3,386,327 UART: [art] Store priv key in slot 0x5
3,399,945 UART: [art] Derive Key Pair - Done
3,414,675 UART: [art] Signing Cert with AUTHO
3,415,155 UART: RITY.KEYID = 7
3,430,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,230 UART: [art] PUB.X = 371CC932D5A7E7C10029CBA115A6C6A18FB1FDCF44CD682078742D3662E91923AB1EE25AD78D7EE3F2A2C9CF05BCA73C
3,437,993 UART: [art] PUB.Y = 762F0B4D3EDDBBED10D89B15C67ACF407B2A3634775D9F1C3A1C5F1BE80170550671D2285BB2A975EFECF9625DE33674
3,444,946 UART: [art] SIG.R = D56C8AB39E8C8DB3A9CF5C8EADA8F3CF38DB70A09FFC40B8BFCE8DFC1DC14E9A4FF1E694C4E12A9348F2B6041228BAE5
3,451,747 UART: [art] SIG.S = CFD27993FF9721D77A2FCCF3E725F71A1E1EAE7A865EA7BEA420347C5EDA98AE6E2C7B7D34C8CF0BBE20E9ACAC33AC5F
3,475,425 UART: Caliptra RT
3,475,770 UART: [state] CFI Enabled
3,584,338 UART: [rt] RT listening for mailbox commands...
3,585,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,832 UART: [rt]cmd =0x41544d4e, len=14344
3,852,425 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,532 ready_for_fw is high
1,362,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,434 >>> mbox cmd response: success
2,989,628 UART:
2,989,644 UART: Running Caliptra FMC ...
2,990,052 UART:
2,990,195 UART: [state] CFI Enabled
3,000,616 UART: [fht] FMC Alias Private Key: 7
3,109,039 UART: [art] Extend RT PCRs Done
3,109,467 UART: [art] Lock RT PCRs Done
3,111,027 UART: [art] Populate DV Done
3,119,210 UART: [fht] FMC Alias Private Key: 7
3,120,350 UART: [art] Derive CDI
3,120,630 UART: [art] Store in in slot 0x4
3,206,767 UART: [art] Derive Key Pair
3,207,127 UART: [art] Store priv key in slot 0x5
3,220,035 UART: [art] Derive Key Pair - Done
3,234,846 UART: [art] Signing Cert with AUTHO
3,235,326 UART: RITY.KEYID = 7
3,250,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,499 UART: [art] PUB.X = 555DC239B3C6D022F34FBB1BE19D462A1D1139F891CC76DD65B3A167428063C8E9F9EC63733B2958C62A5BFF45E84DB8
3,258,277 UART: [art] PUB.Y = 3CD70D8E60BD71C285B3B1B1C8EF17761E1FF1B55DEDA788E7E09FDBFFF930CFEB24733567ED5E34755EF9062DAA96BC
3,265,245 UART: [art] SIG.R = 56734A04E383D3FE76A30ABD567935F5B103107636C83BD7385F4A0C106658D3D39B988F3961AB8700D66C5614857469
3,271,969 UART: [art] SIG.S = 0F799DCFD77B41C80D6E645F9F645205C99FBD5A02002BC2A4AE23C7764D0851241A40F97A169EE71F6BFF5CBF41F0FA
3,295,945 UART: Caliptra RT
3,296,290 UART: [state] CFI Enabled
3,403,610 UART: [rt] RT listening for mailbox commands...
3,404,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,352 UART: [rt]cmd =0x41544d4e, len=14344
3,671,537 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,461 UART: [kat] SHA2-256
903,401 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
917,858 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,157 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 ready_for_fw is high
1,176,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,201,281 UART: [idev] Sha1 KeyId Algorithm
1,209,729 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,208 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,699 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,450 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,460 >>> mbox cmd response: success
2,777,636 UART: [afmc] ++
2,777,804 UART: [afmc] CDI.KEYID = 6
2,778,166 UART: [afmc] SUBJECT.KEYID = 7
2,778,591 UART: [afmc] AUTHORITY.KEYID = 5
2,814,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,461 UART: [afmc] --
2,857,465 UART: [cold-reset] --
2,858,107 UART: [state] Locking Datavault
2,859,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,788 UART: [state] Locking ICCM
2,860,404 UART: [exit] Launching FMC @ 0x40000130
2,865,733 UART:
2,865,749 UART: Running Caliptra FMC ...
2,866,157 UART:
2,866,211 UART: [state] CFI Enabled
2,876,340 UART: [fht] FMC Alias Private Key: 7
2,984,147 UART: [art] Extend RT PCRs Done
2,984,575 UART: [art] Lock RT PCRs Done
2,986,201 UART: [art] Populate DV Done
2,994,458 UART: [fht] FMC Alias Private Key: 7
2,995,538 UART: [art] Derive CDI
2,995,818 UART: [art] Store in in slot 0x4
3,081,181 UART: [art] Derive Key Pair
3,081,541 UART: [art] Store priv key in slot 0x5
3,095,095 UART: [art] Derive Key Pair - Done
3,109,612 UART: [art] Signing Cert with AUTHO
3,110,092 UART: RITY.KEYID = 7
3,125,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,073 UART: [art] PUB.X = 5905BAAF45E345F0E84AAD162806616276167D862E6A169955985BEA5B4F4CC7C554D40B24B711DC9C3FF89E2810CFC8
3,132,838 UART: [art] PUB.Y = 90018B452A30BB5D9417E4F1BC82CFCA09F7C874BA78C8EF7314E394712578ADBC8B82C415777672BBE6F699C39A1077
3,139,786 UART: [art] SIG.R = 277DCBBABDB23DC287986281DE342B2E7CD7A6EF1998DBD84389857D41DB107D6C1E18989F1802AD8B03DA84F0DBBA55
3,146,566 UART: [art] SIG.S = 91B529BF54F802043D0EF3D6045CE15227C589556523775AD4DDA693B639E94B3484CB270B392A690656F254F01D0564
3,170,160 UART: Caliptra RT
3,170,413 UART: [state] CFI Enabled
3,278,130 UART: [rt] RT listening for mailbox commands...
3,278,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,932 UART: [rt]cmd =0x41544d4e, len=14344
3,546,991 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,701 >>> mbox cmd response: success
2,691,855 UART:
2,691,871 UART: Running Caliptra FMC ...
2,692,279 UART:
2,692,333 UART: [state] CFI Enabled
2,703,146 UART: [fht] FMC Alias Private Key: 7
2,810,761 UART: [art] Extend RT PCRs Done
2,811,189 UART: [art] Lock RT PCRs Done
2,812,455 UART: [art] Populate DV Done
2,820,592 UART: [fht] FMC Alias Private Key: 7
2,821,596 UART: [art] Derive CDI
2,821,876 UART: [art] Store in in slot 0x4
2,907,305 UART: [art] Derive Key Pair
2,907,665 UART: [art] Store priv key in slot 0x5
2,920,509 UART: [art] Derive Key Pair - Done
2,935,618 UART: [art] Signing Cert with AUTHO
2,936,098 UART: RITY.KEYID = 7
2,951,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,185 UART: [art] PUB.X = EC2D5625EB13DE7A5A742E0BECF341CE1E623AEE580871BC3E5082A1905A2917ED7C13BF999AEA252FE9E09CA4270C32
2,958,962 UART: [art] PUB.Y = D549ADFD9E49C2091B9DAA575CC490A1DDFACB2A6C77C90A82C70911EA2E894C5B75D5BAD143B6316A3D06382155A141
2,965,914 UART: [art] SIG.R = 691A84CD9A02D00CB37E00FA196A4237A0C9AFD9DEA4E3F2B9ACB0B8E400AD78F23AD8D7E503F275506BC03EAC3ADF35
2,972,655 UART: [art] SIG.S = 6072147FDC841BB2B010B7369B066ADF85B51D54E5689B56B779BB290AAE8B6BCAC5542296FEE613791F4D73E152A58B
2,996,418 UART: Caliptra RT
2,996,671 UART: [state] CFI Enabled
3,104,348 UART: [rt] RT listening for mailbox commands...
3,105,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,282 UART: [rt]cmd =0x41544d4e, len=14344
3,373,109 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,384 UART: [cold-reset] ++
1,172,950 UART: [fht] FHT @ 0x50003400
1,175,703 UART: [idev] ++
1,175,871 UART: [idev] CDI.KEYID = 6
1,176,231 UART: [idev] SUBJECT.KEYID = 7
1,176,655 UART: [idev] UDS.KEYID = 0
1,177,000 ready_for_fw is high
1,177,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,201,950 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,246 UART: [ldev] ++
1,211,414 UART: [ldev] CDI.KEYID = 6
1,211,777 UART: [ldev] SUBJECT.KEYID = 5
1,212,203 UART: [ldev] AUTHORITY.KEYID = 7
1,212,666 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,418 UART: [ldev] --
1,282,747 UART: [fwproc] Wait for Commands...
1,283,389 UART: [fwproc] Recv command 0x46574c44
1,284,117 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,297 >>> mbox cmd response: success
2,776,455 UART: [afmc] ++
2,776,623 UART: [afmc] CDI.KEYID = 6
2,776,985 UART: [afmc] SUBJECT.KEYID = 7
2,777,410 UART: [afmc] AUTHORITY.KEYID = 5
2,814,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,684 UART: [afmc] --
2,857,784 UART: [cold-reset] --
2,858,442 UART: [state] Locking Datavault
2,859,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,149 UART: [state] Locking ICCM
2,860,799 UART: [exit] Launching FMC @ 0x40000130
2,866,128 UART:
2,866,144 UART: Running Caliptra FMC ...
2,866,552 UART:
2,866,695 UART: [state] CFI Enabled
2,876,996 UART: [fht] FMC Alias Private Key: 7
2,985,167 UART: [art] Extend RT PCRs Done
2,985,595 UART: [art] Lock RT PCRs Done
2,987,245 UART: [art] Populate DV Done
2,995,652 UART: [fht] FMC Alias Private Key: 7
2,996,598 UART: [art] Derive CDI
2,996,878 UART: [art] Store in in slot 0x4
3,082,633 UART: [art] Derive Key Pair
3,082,993 UART: [art] Store priv key in slot 0x5
3,096,133 UART: [art] Derive Key Pair - Done
3,110,699 UART: [art] Signing Cert with AUTHO
3,111,179 UART: RITY.KEYID = 7
3,126,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,374 UART: [art] PUB.X = DEA7A28F03B758948D5D11698E23BE8C92BEAF21ECCD392BD618D56D5744C5BC01F081275B3AAD47722E7547D384615E
3,134,146 UART: [art] PUB.Y = 277475AA69F220234FB23BA5E1FEDB2EC82B1ECD528F5EC5B10D96D7E731D16B79E5DFED2189798569CE7895303938BF
3,141,103 UART: [art] SIG.R = F19674EE75CAEBC056A9286E8AEA4CC9BADF0297EE6949FF20D6E8575B1BAA9A6FF8DFAE79FA0977A236F57BCF045301
3,147,885 UART: [art] SIG.S = FEBAC7B7698935C5DF69668392E8B03643EFB600F1190E29473595E44B348E73F406865CE58FE6179DA75B7ABBB00120
3,171,295 UART: Caliptra RT
3,171,640 UART: [state] CFI Enabled
3,279,734 UART: [rt] RT listening for mailbox commands...
3,280,404 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,758 UART: [rt]cmd =0x41544d4e, len=14344
3,549,315 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 ready_for_fw is high
1,060,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,414 >>> mbox cmd response: success
2,692,204 UART:
2,692,220 UART: Running Caliptra FMC ...
2,692,628 UART:
2,692,771 UART: [state] CFI Enabled
2,703,232 UART: [fht] FMC Alias Private Key: 7
2,811,751 UART: [art] Extend RT PCRs Done
2,812,179 UART: [art] Lock RT PCRs Done
2,814,025 UART: [art] Populate DV Done
2,822,352 UART: [fht] FMC Alias Private Key: 7
2,823,388 UART: [art] Derive CDI
2,823,668 UART: [art] Store in in slot 0x4
2,909,231 UART: [art] Derive Key Pair
2,909,591 UART: [art] Store priv key in slot 0x5
2,922,809 UART: [art] Derive Key Pair - Done
2,937,672 UART: [art] Signing Cert with AUTHO
2,938,152 UART: RITY.KEYID = 7
2,953,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,781 UART: [art] PUB.X = DDA0E9B7FBD2E3D36DF4BC5CED2912EB3BC56D1351E4066A43901732A56A28E5BD43B3EA8646BAADFB5A4752FD6C825F
2,960,572 UART: [art] PUB.Y = CE2EFE6A9DDD3BDD9D158251F77C2EA40A59AFC51AFF87A417D277F13AF038C6E29FA82AB180429D15083882A2CA0BAD
2,967,535 UART: [art] SIG.R = E73ABC968C16753E64A6CA84EC17CE9B1478A17AD601CFFA52136F89544672220CD8D44C18C9BB7724D810505882B5D9
2,974,301 UART: [art] SIG.S = EA489F4E8F2333B6EA009DE169D7FBFFA926E3F6AF8D92AA46BE41DDCE8481B99E75F7DF72BE1B4B256D0D9437697BD9
2,998,307 UART: Caliptra RT
2,998,652 UART: [state] CFI Enabled
3,106,940 UART: [rt] RT listening for mailbox commands...
3,107,610 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,776 UART: [rt]cmd =0x41544d4e, len=14344
3,375,999 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,312 UART: [kat] LMS
1,168,624 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,625 UART: [idev] ++
1,172,793 UART: [idev] CDI.KEYID = 6
1,173,154 UART: [idev] SUBJECT.KEYID = 7
1,173,579 UART: [idev] UDS.KEYID = 0
1,173,925 ready_for_fw is high
1,173,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,145 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,512 UART: [ldev] Erasing FE.KEYID = 1
1,241,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,457 UART: [fwproc] Recv command 0x46574c44
1,282,190 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,778 >>> mbox cmd response: success
2,774,945 UART: [afmc] ++
2,775,113 UART: [afmc] CDI.KEYID = 6
2,775,476 UART: [afmc] SUBJECT.KEYID = 7
2,775,902 UART: [afmc] AUTHORITY.KEYID = 5
2,811,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,590 UART: [afmc] --
2,854,506 UART: [cold-reset] --
2,855,138 UART: [state] Locking Datavault
2,856,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,847 UART: [state] Locking ICCM
2,857,495 UART: [exit] Launching FMC @ 0x40000130
2,862,824 UART:
2,862,840 UART: Running Caliptra FMC ...
2,863,248 UART:
2,863,302 UART: [state] CFI Enabled
2,873,943 UART: [fht] FMC Alias Private Key: 7
2,982,328 UART: [art] Extend RT PCRs Done
2,982,756 UART: [art] Lock RT PCRs Done
2,984,214 UART: [art] Populate DV Done
2,992,391 UART: [fht] FMC Alias Private Key: 7
2,993,411 UART: [art] Derive CDI
2,993,691 UART: [art] Store in in slot 0x4
3,079,530 UART: [art] Derive Key Pair
3,079,890 UART: [art] Store priv key in slot 0x5
3,093,308 UART: [art] Derive Key Pair - Done
3,108,173 UART: [art] Signing Cert with AUTHO
3,108,653 UART: RITY.KEYID = 7
3,123,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,692 UART: [art] PUB.X = 1880104C41ABB137B0BCB267C8985B571FE3BA3AB3E68E570F8B4215BBF75A4C05629A027BD8B95AF20D711F7C1C2D9D
3,131,462 UART: [art] PUB.Y = A7685BB9757BC7B7BBF2E1F4E2C7C8142B12CA8054260905B8351F1A7B65721662F813CB46482E5C77B0DDE29444444E
3,138,406 UART: [art] SIG.R = F18367FEB80A6EE94D4A4EEC447D4F61081905CD03A76EAAA8AD2AC08DD14C81A7498A6B982DEB507CE2E7396BA6AB44
3,145,184 UART: [art] SIG.S = D57EA122A8244C5237B1D3B551A40F37180D709D74B98A7A710D2030A4ECE2CFC78E967162952D0E82EABBC2DEDB2F93
3,168,991 UART: Caliptra RT
3,169,244 UART: [state] CFI Enabled
3,276,884 UART: [rt] RT listening for mailbox commands...
3,277,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,668 UART: [rt]cmd =0x41544d4e, len=14344
3,546,391 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,018 ready_for_fw is high
1,056,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,028 >>> mbox cmd response: success
2,686,114 UART:
2,686,130 UART: Running Caliptra FMC ...
2,686,538 UART:
2,686,592 UART: [state] CFI Enabled
2,696,977 UART: [fht] FMC Alias Private Key: 7
2,805,352 UART: [art] Extend RT PCRs Done
2,805,780 UART: [art] Lock RT PCRs Done
2,807,240 UART: [art] Populate DV Done
2,815,327 UART: [fht] FMC Alias Private Key: 7
2,816,409 UART: [art] Derive CDI
2,816,689 UART: [art] Store in in slot 0x4
2,902,652 UART: [art] Derive Key Pair
2,903,012 UART: [art] Store priv key in slot 0x5
2,915,712 UART: [art] Derive Key Pair - Done
2,930,482 UART: [art] Signing Cert with AUTHO
2,930,962 UART: RITY.KEYID = 7
2,945,582 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,347 UART: [art] PUB.X = 0E261A2DE4C9B9DA6ECFBC36E56FAD77D727DB031BDFD07735851DA29C2B4EB837C3705246087ABB1814FE951292412D
2,953,120 UART: [art] PUB.Y = CA55D6824B185FCDD496285B5089AEF4E85D5CC734055EFDE40E59067B95C98203EF673AC6CD9F827BB241342D880EDF
2,960,065 UART: [art] SIG.R = 41ADC5296B32C8DD3A21DF67D132579AC5806C3C1BDFC74C719FF940BA41FB978301D61C1E8FFCC49AF34EBAC6E8F246
2,966,852 UART: [art] SIG.S = 719BB6D2A399F03B2F6D154E70739F2F44F795B652456BDD325727CB07F6BE2A7BE6CA910641ABC6F9EC47525C7EA103
2,991,336 UART: Caliptra RT
2,991,589 UART: [state] CFI Enabled
3,099,314 UART: [rt] RT listening for mailbox commands...
3,099,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,006 UART: [rt]cmd =0x41544d4e, len=14344
3,367,725 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,128 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,109 UART: [kat] SHA2-512-ACC
907,010 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,332 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
1,174,876 ready_for_fw is high
1,174,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,846 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,271 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,441 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,955 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,406 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,689 >>> mbox cmd response: success
2,776,804 UART: [afmc] ++
2,776,972 UART: [afmc] CDI.KEYID = 6
2,777,335 UART: [afmc] SUBJECT.KEYID = 7
2,777,761 UART: [afmc] AUTHORITY.KEYID = 5
2,813,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,599 UART: [afmc] --
2,856,721 UART: [cold-reset] --
2,857,805 UART: [state] Locking Datavault
2,858,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,564 UART: [state] Locking ICCM
2,860,008 UART: [exit] Launching FMC @ 0x40000130
2,865,337 UART:
2,865,353 UART: Running Caliptra FMC ...
2,865,761 UART:
2,865,904 UART: [state] CFI Enabled
2,877,121 UART: [fht] FMC Alias Private Key: 7
2,984,444 UART: [art] Extend RT PCRs Done
2,984,872 UART: [art] Lock RT PCRs Done
2,986,740 UART: [art] Populate DV Done
2,995,011 UART: [fht] FMC Alias Private Key: 7
2,996,155 UART: [art] Derive CDI
2,996,435 UART: [art] Store in in slot 0x4
3,081,726 UART: [art] Derive Key Pair
3,082,086 UART: [art] Store priv key in slot 0x5
3,095,890 UART: [art] Derive Key Pair - Done
3,110,805 UART: [art] Signing Cert with AUTHO
3,111,285 UART: RITY.KEYID = 7
3,126,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,486 UART: [art] PUB.X = 6E85C7A767CA8C3215F5CCFC3C0AC0EA389BD59D1A72AEF5ABFD648DEF75495C8054F595A90453AC386F6859A17D65B4
3,134,266 UART: [art] PUB.Y = DD4F8AFD1DAB51F3E24A195B6D72D589A651089E75398ECC14D37F6E8E1DBE9BE1251190487A4D8A8A59595F76D372A0
3,141,223 UART: [art] SIG.R = 988BE1300ADBE0A9B7053ACD8D4643B8C578D7DEA6B052F0F9DF152C6192CFFAC7C6A9D49D70C4ECC9D07FA22EFC9848
3,148,011 UART: [art] SIG.S = B12694E3C389952E31EBB2501F4C648C52D5A4AFB870E0647BCC8630E4A15B2F0D6209EF51BA83D4F5A5AEAB82D5B805
3,171,807 UART: Caliptra RT
3,172,152 UART: [state] CFI Enabled
3,280,336 UART: [rt] RT listening for mailbox commands...
3,281,006 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,008 UART: [rt]cmd =0x41544d4e, len=14344
3,548,783 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,421 ready_for_fw is high
1,056,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,169 >>> mbox cmd response: success
2,686,669 UART:
2,686,685 UART: Running Caliptra FMC ...
2,687,093 UART:
2,687,236 UART: [state] CFI Enabled
2,697,841 UART: [fht] FMC Alias Private Key: 7
2,806,060 UART: [art] Extend RT PCRs Done
2,806,488 UART: [art] Lock RT PCRs Done
2,808,196 UART: [art] Populate DV Done
2,816,163 UART: [fht] FMC Alias Private Key: 7
2,817,309 UART: [art] Derive CDI
2,817,589 UART: [art] Store in in slot 0x4
2,903,284 UART: [art] Derive Key Pair
2,903,644 UART: [art] Store priv key in slot 0x5
2,916,512 UART: [art] Derive Key Pair - Done
2,931,384 UART: [art] Signing Cert with AUTHO
2,931,864 UART: RITY.KEYID = 7
2,947,168 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,933 UART: [art] PUB.X = C302148F7922394A68D354540006130B1D9A6ACA3BB5E0AA3D526A2D291466C80D0E07BB5E5F30F8EE9C88BFB386E183
2,954,667 UART: [art] PUB.Y = CCBE3EDC70AEEFBF70F3279227EB54F2634DA3360A7E50719291EFFD62BF68F73B651033ACA38630F7551816ED0EAF9F
2,961,627 UART: [art] SIG.R = F06774A5357F53C666A4D9DD1E79B5B78DE06FC5853FF2A548B4B5DA19B5D40AAE027B20FE7B016D37776E6D86FA4B3B
2,968,402 UART: [art] SIG.S = 9C9C239B2FF54AA6607BB192E3412778473C71987FBD2CD405CFDDB0EF03516994CB3CDAC054A297C01B6A32582D2BE9
2,992,723 UART: Caliptra RT
2,993,068 UART: [state] CFI Enabled
3,101,118 UART: [rt] RT listening for mailbox commands...
3,101,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,936 UART: [rt]cmd =0x41544d4e, len=14344
3,370,273 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
191,998 UART:
192,352 UART: Running Caliptra ROM ...
193,558 UART:
193,711 UART: [state] CFI Enabled
263,595 UART: [state] LifecycleState = Unprovisioned
265,544 UART: [state] DebugLocked = No
267,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,840 UART: [kat] SHA2-256
442,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,984 UART: [kat] ++
453,462 UART: [kat] sha1
463,630 UART: [kat] SHA2-256
466,353 UART: [kat] SHA2-384
471,917 UART: [kat] SHA2-512-ACC
474,283 UART: [kat] ECC-384
2,768,615 UART: [kat] HMAC-384Kdf
2,779,929 UART: [kat] LMS
3,970,259 UART: [kat] --
3,973,992 UART: [cold-reset] ++
3,976,349 UART: [fht] Storing FHT @ 0x50003400
3,987,196 UART: [idev] ++
3,987,761 UART: [idev] CDI.KEYID = 6
3,988,792 UART: [idev] SUBJECT.KEYID = 7
3,989,968 UART: [idev] UDS.KEYID = 0
3,991,055 ready_for_fw is high
3,991,270 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,841 UART: [idev] Erasing UDS.KEYID = 0
7,325,705 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,371 UART: [idev] --
7,351,985 UART: [ldev] ++
7,352,553 UART: [ldev] CDI.KEYID = 6
7,353,518 UART: [ldev] SUBJECT.KEYID = 5
7,354,743 UART: [ldev] AUTHORITY.KEYID = 7
7,355,977 UART: [ldev] FE.KEYID = 1
7,401,355 UART: [ldev] Erasing FE.KEYID = 1
10,738,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,077 UART: [ldev] --
13,115,428 UART: [fwproc] Waiting for Commands...
13,117,748 UART: [fwproc] Received command 0x46574c44
13,119,938 UART: [fwproc] Received Image of size 114124 bytes
22,310,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,390,419 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,459,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,777,249 >>> mbox cmd response: success
22,781,115 UART: [afmc] ++
22,781,708 UART: [afmc] CDI.KEYID = 6
22,782,650 UART: [afmc] SUBJECT.KEYID = 7
22,783,868 UART: [afmc] AUTHORITY.KEYID = 5
26,155,468 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,452,627 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,454,940 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,469,487 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,484,203 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,498,415 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,520,211 UART: [afmc] --
28,524,007 UART: [cold-reset] --
28,527,180 UART: [state] Locking Datavault
28,530,545 UART: [state] Locking PCR0, PCR1 and PCR31
28,532,298 UART: [state] Locking ICCM
28,534,260 UART: [exit] Launching FMC @ 0x40000130
28,542,662 UART:
28,542,894 UART: Running Caliptra FMC ...
28,543,921 UART:
28,544,068 UART: [state] CFI Enabled
28,612,709 UART: [fht] FMC Alias Private Key: 7
30,950,163 UART: [art] Extend RT PCRs Done
30,951,382 UART: [art] Lock RT PCRs Done
30,952,768 UART: [art] Populate DV Done
30,958,254 UART: [fht] FMC Alias Private Key: 7
30,959,953 UART: [art] Derive CDI
30,960,771 UART: [art] Store in in slot 0x4
31,021,096 UART: [art] Derive Key Pair
31,022,167 UART: [art] Store priv key in slot 0x5
34,314,994 UART: [art] Derive Key Pair - Done
34,327,884 UART: [art] Signing Cert with AUTHO
34,329,196 UART: RITY.KEYID = 7
36,617,203 UART: [art] Erasing AUTHORITY.KEYID = 7
36,618,711 UART: [art] PUB.X = F8EB91EDE4D889FAB152D03EC83DF59FF51E5A638BC9E8946039F124E899B1B4B5B635ACBD9CECBD7F0E776082C05365
36,625,975 UART: [art] PUB.Y = DA99FA5B9EA252A904DC40F37B4AF6CCC1CB633A792FC53F815A61D7BC4E54DC3394ACBFBA774080F63AFF5BA6626155
36,633,222 UART: [art] SIG.R = E678838AC7E589D34B2BB046F69CDA780501C2ADAEB322328CD6FBEECC10C35260A0E6BC8E079F432E4E61589E2DDE7C
36,640,628 UART: [art] SIG.S = BC38DACC5F2393E340EEC0A0E5039A0DE167B7018BA03C2FA09C684096CAD6A82490A402A3C8FC4CDD87FCBB13BE11B2
37,946,134 UART: Caliptra RT
37,946,849 UART: [state] CFI Enabled
38,107,740 UART: [rt] RT listening for mailbox commands...
38,110,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,265,725 UART: [rt]cmd =0x41544d4e, len=14344
42,435,037 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,785,540 ready_for_fw is high
3,785,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,385,711 >>> mbox cmd response: success
28,071,777 UART:
28,072,177 UART: Running Caliptra FMC ...
28,073,310 UART:
28,073,477 UART: [state] CFI Enabled
28,138,982 UART: [fht] FMC Alias Private Key: 7
30,476,332 UART: [art] Extend RT PCRs Done
30,477,551 UART: [art] Lock RT PCRs Done
30,479,396 UART: [art] Populate DV Done
30,484,832 UART: [fht] FMC Alias Private Key: 7
30,486,492 UART: [art] Derive CDI
30,487,306 UART: [art] Store in in slot 0x4
30,547,696 UART: [art] Derive Key Pair
30,548,692 UART: [art] Store priv key in slot 0x5
33,841,709 UART: [art] Derive Key Pair - Done
33,854,490 UART: [art] Signing Cert with AUTHO
33,855,785 UART: RITY.KEYID = 7
36,144,331 UART: [art] Erasing AUTHORITY.KEYID = 7
36,145,842 UART: [art] PUB.X = 056D79D912FC351EB7BAFE7F979C33A06E05E19CD043F19CAFC95E1500DC28ACC80E91FD384510F1808132F72E239D8F
36,153,036 UART: [art] PUB.Y = C116E3CDA0BECCF361AFFB54028C1A1B10268D57105E2227E63AD0F81AC5F8DCBE196F27861E653EFEA4F2C213BEADE6
36,160,331 UART: [art] SIG.R = 3913F500975F58F9573709EB3DB9A6E31AB3AA8746DEBCB0269D4F8853188E34B1B11F0D1ADAAC6C575C8A4FCD2C5C81
36,167,748 UART: [art] SIG.S = B6D6DD5D6BF9283F8805FACC32FA09DDB33159FA40BA98235DF6A1D14F2B33C9D9648D0D9DA4371B3E8D200FC8864D18
37,473,208 UART: Caliptra RT
37,473,920 UART: [state] CFI Enabled
37,634,593 UART: [rt] RT listening for mailbox commands...
37,636,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,792,251 UART: [rt]cmd =0x41544d4e, len=14344
42,169,369 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,404 UART:
192,793 UART: Running Caliptra ROM ...
193,994 UART:
603,558 UART: [state] CFI Enabled
618,872 UART: [state] LifecycleState = Unprovisioned
620,766 UART: [state] DebugLocked = No
622,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,086 UART: [kat] SHA2-256
797,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,418 UART: [kat] ++
808,902 UART: [kat] sha1
818,423 UART: [kat] SHA2-256
821,143 UART: [kat] SHA2-384
827,200 UART: [kat] SHA2-512-ACC
829,563 UART: [kat] ECC-384
3,114,543 UART: [kat] HMAC-384Kdf
3,126,242 UART: [kat] LMS
4,316,410 UART: [kat] --
4,320,996 UART: [cold-reset] ++
4,322,788 UART: [fht] Storing FHT @ 0x50003400
4,334,118 UART: [idev] ++
4,334,755 UART: [idev] CDI.KEYID = 6
4,335,638 UART: [idev] SUBJECT.KEYID = 7
4,336,878 UART: [idev] UDS.KEYID = 0
4,337,897 ready_for_fw is high
4,338,098 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,490 UART: [idev] Erasing UDS.KEYID = 0
7,618,805 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,752 UART: [idev] --
7,645,355 UART: [ldev] ++
7,645,928 UART: [ldev] CDI.KEYID = 6
7,646,889 UART: [ldev] SUBJECT.KEYID = 5
7,648,116 UART: [ldev] AUTHORITY.KEYID = 7
7,649,398 UART: [ldev] FE.KEYID = 1
7,661,062 UART: [ldev] Erasing FE.KEYID = 1
10,947,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,933 UART: [ldev] --
13,309,001 UART: [fwproc] Waiting for Commands...
13,312,288 UART: [fwproc] Received command 0x46574c44
13,314,462 UART: [fwproc] Received Image of size 114124 bytes
21,797,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,878,077 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,946,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,263,881 >>> mbox cmd response: success
22,267,530 UART: [afmc] ++
22,268,178 UART: [afmc] CDI.KEYID = 6
22,269,084 UART: [afmc] SUBJECT.KEYID = 7
22,270,295 UART: [afmc] AUTHORITY.KEYID = 5
25,584,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,881,486 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,883,745 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,898,312 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,913,043 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,927,286 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,948,797 UART: [afmc] --
27,952,610 UART: [cold-reset] --
27,955,280 UART: [state] Locking Datavault
27,961,496 UART: [state] Locking PCR0, PCR1 and PCR31
27,963,245 UART: [state] Locking ICCM
27,965,450 UART: [exit] Launching FMC @ 0x40000130
27,973,817 UART:
27,974,054 UART: Running Caliptra FMC ...
27,975,157 UART:
27,975,315 UART: [state] CFI Enabled
27,983,303 UART: [fht] FMC Alias Private Key: 7
30,314,167 UART: [art] Extend RT PCRs Done
30,315,375 UART: [art] Lock RT PCRs Done
30,317,266 UART: [art] Populate DV Done
30,322,618 UART: [fht] FMC Alias Private Key: 7
30,324,314 UART: [art] Derive CDI
30,325,124 UART: [art] Store in in slot 0x4
30,367,766 UART: [art] Derive Key Pair
30,368,753 UART: [art] Store priv key in slot 0x5
33,610,733 UART: [art] Derive Key Pair - Done
33,623,623 UART: [art] Signing Cert with AUTHO
33,624,917 UART: RITY.KEYID = 7
35,904,178 UART: [art] Erasing AUTHORITY.KEYID = 7
35,905,680 UART: [art] PUB.X = 02B1196185F530176D129CF61CB78503D87BA1A69608944F7F83FCFF1E261DA14B5689F27C6CA4BB1B863A7333191374
35,912,973 UART: [art] PUB.Y = EA45F8A87FA33C2BDC6B135C1D394A4DEF2D39F5F7E80E9648E821DEB80083F5E9CA9365FBD42F107BBB0E25B5B8CD58
35,920,161 UART: [art] SIG.R = E6D5BA2A94FA9134F5ACA1D0B2B3CE8BE04F74D198079E0F913E836C05FD5D2EF7179FA3ECF7DE0C91919C873D02D6FF
35,927,594 UART: [art] SIG.S = 4864EBD52DBAD2178B477DDF5B130261D81B8DEF5010191855BAD6CB60172220AE663EB50F68A07919AFF19F064EAAFC
37,232,529 UART: Caliptra RT
37,233,240 UART: [state] CFI Enabled
37,351,399 UART: [rt] RT listening for mailbox commands...
37,353,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,509,167 UART: [rt]cmd =0x41544d4e, len=14344
41,730,812 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
4,128,585 ready_for_fw is high
4,128,977 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,115,979 >>> mbox cmd response: success
27,762,226 UART:
27,762,623 UART: Running Caliptra FMC ...
27,763,730 UART:
27,763,877 UART: [state] CFI Enabled
27,772,133 UART: [fht] FMC Alias Private Key: 7
30,102,637 UART: [art] Extend RT PCRs Done
30,103,860 UART: [art] Lock RT PCRs Done
30,105,133 UART: [art] Populate DV Done
30,110,544 UART: [fht] FMC Alias Private Key: 7
30,112,087 UART: [art] Derive CDI
30,112,820 UART: [art] Store in in slot 0x4
30,155,307 UART: [art] Derive Key Pair
30,156,345 UART: [art] Store priv key in slot 0x5
33,398,695 UART: [art] Derive Key Pair - Done
33,411,753 UART: [art] Signing Cert with AUTHO
33,413,089 UART: RITY.KEYID = 7
35,692,882 UART: [art] Erasing AUTHORITY.KEYID = 7
35,694,385 UART: [art] PUB.X = A753E24C9B7756FE19E61A1A6108010169EA6B84153A805CE5BC9F78DF3C197D3114A36A161A73624254123970192F49
35,701,626 UART: [art] PUB.Y = 1A8BB8C99D32F662E9754DBE5E51864B8051A81AC1B78F0EFE4FF33BB727C87B4D93D7CDB43824C941E9C30DA1761B04
35,708,878 UART: [art] SIG.R = 501EA5620FD9B4CB6FA72F826905CD0222E9D79AA4FF6C43867461FD491F10752B510AC4ABB5CD9C01EC2F2EB839963D
35,716,270 UART: [art] SIG.S = 4C6F14D93D20A70C86A4EAAB55CD63410B5FCA14929EC6E906A918BC5875D5062928A5B4FA53590CA29C1A9BDC565DDC
37,021,025 UART: Caliptra RT
37,021,745 UART: [state] CFI Enabled
37,138,915 UART: [rt] RT listening for mailbox commands...
37,141,223 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,296,538 UART: [rt]cmd =0x41544d4e, len=14344
41,621,622 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,206 UART:
192,565 UART: Running Caliptra ROM ...
193,774 UART:
193,927 UART: [state] CFI Enabled
265,112 UART: [state] LifecycleState = Unprovisioned
266,959 UART: [state] DebugLocked = No
268,419 UART: [state] WD Timer not started. Device not locked for debugging
272,232 UART: [kat] SHA2-256
451,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,888 UART: [kat] ++
463,428 UART: [kat] sha1
474,122 UART: [kat] SHA2-256
477,133 UART: [kat] SHA2-384
482,409 UART: [kat] SHA2-512-ACC
485,411 UART: [kat] ECC-384
2,947,289 UART: [kat] HMAC-384Kdf
2,970,598 UART: [kat] LMS
3,500,004 UART: [kat] --
3,503,932 UART: [cold-reset] ++
3,505,078 UART: [fht] FHT @ 0x50003400
3,516,620 UART: [idev] ++
3,517,198 UART: [idev] CDI.KEYID = 6
3,518,085 UART: [idev] SUBJECT.KEYID = 7
3,519,328 UART: [idev] UDS.KEYID = 0
3,520,226 ready_for_fw is high
3,520,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,458 UART: [idev] Erasing UDS.KEYID = 0
6,023,581 UART: [idev] Sha1 KeyId Algorithm
6,046,618 UART: [idev] --
6,050,381 UART: [ldev] ++
6,050,962 UART: [ldev] CDI.KEYID = 6
6,051,877 UART: [ldev] SUBJECT.KEYID = 5
6,053,037 UART: [ldev] AUTHORITY.KEYID = 7
6,054,329 UART: [ldev] FE.KEYID = 1
6,099,330 UART: [ldev] Erasing FE.KEYID = 1
8,601,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,686 UART: [ldev] --
10,414,133 UART: [fwproc] Wait for Commands...
10,416,932 UART: [fwproc] Recv command 0x46574c44
10,418,970 UART: [fwproc] Recv'd Img size: 114448 bytes
14,979,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,066,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,135,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,454,569 >>> mbox cmd response: success
15,459,655 UART: [afmc] ++
15,460,242 UART: [afmc] CDI.KEYID = 6
15,461,157 UART: [afmc] SUBJECT.KEYID = 7
15,462,314 UART: [afmc] AUTHORITY.KEYID = 5
18,005,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,293 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,743,262 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,759,235 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,774,984 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,798,183 UART: [afmc] --
19,802,401 UART: [cold-reset] --
19,804,209 UART: [state] Locking Datavault
19,810,212 UART: [state] Locking PCR0, PCR1 and PCR31
19,811,862 UART: [state] Locking ICCM
19,813,074 UART: [exit] Launching FMC @ 0x40000130
19,821,521 UART:
19,821,750 UART: Running Caliptra FMC ...
19,822,776 UART:
19,822,921 UART: [state] CFI Enabled
19,884,347 UART: [fht] FMC Alias Private Key: 7
21,648,691 UART: [art] Extend RT PCRs Done
21,649,909 UART: [art] Lock RT PCRs Done
21,651,556 UART: [art] Populate DV Done
21,657,067 UART: [fht] FMC Alias Private Key: 7
21,658,654 UART: [art] Derive CDI
21,659,388 UART: [art] Store in in slot 0x4
21,717,061 UART: [art] Derive Key Pair
21,718,098 UART: [art] Store priv key in slot 0x5
24,181,189 UART: [art] Derive Key Pair - Done
24,194,448 UART: [art] Signing Cert with AUTHO
24,195,748 UART: RITY.KEYID = 7
25,907,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,700 UART: [art] PUB.X = A419D36F4B0920E44A64E51866E66429233E43FC5F20C03DE5675704CA9613BBEC60F9A1FB2215D5609EDC046D6D63BF
25,915,942 UART: [art] PUB.Y = 5DC9471472DDC0C6E1D4804BEFD028E33C15CF7AFF0963A0A87EA81A2F15429D4876644C1AC8B15530DFA67EF7BBE2F6
25,923,276 UART: [art] SIG.R = 56EBB099DFDE0F44DCEC594D6F2E4ECB5F39FC34749352F1451E4E9A4ABFCF2DAA716B93FC37F5C984FD8D3AA29F498D
25,930,657 UART: [art] SIG.S = 190F7D479F795812F80F26169E252C5B1C70C3DAB6530EA361246F47BA2E84A2BC3F3AC5D356B73701226E91A5F8078E
26,909,738 UART: Caliptra RT
26,910,454 UART: [state] CFI Enabled
27,076,829 UART: [rt] RT listening for mailbox commands...
27,079,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,914 UART: [rt]cmd =0x41544d4e, len=14344
29,627,314 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,379,931 ready_for_fw is high
3,380,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,021,651 >>> mbox cmd response: success
19,304,387 UART:
19,304,767 UART: Running Caliptra FMC ...
19,305,954 UART:
19,306,118 UART: [state] CFI Enabled
19,373,621 UART: [fht] FMC Alias Private Key: 7
21,138,032 UART: [art] Extend RT PCRs Done
21,139,253 UART: [art] Lock RT PCRs Done
21,141,040 UART: [art] Populate DV Done
21,146,381 UART: [fht] FMC Alias Private Key: 7
21,148,029 UART: [art] Derive CDI
21,148,845 UART: [art] Store in in slot 0x4
21,207,085 UART: [art] Derive Key Pair
21,208,122 UART: [art] Store priv key in slot 0x5
23,670,657 UART: [art] Derive Key Pair - Done
23,683,490 UART: [art] Signing Cert with AUTHO
23,684,814 UART: RITY.KEYID = 7
25,396,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,398,340 UART: [art] PUB.X = 53E9DB85EEC37206CA36D71DD003940BA7F103261EA64F290082D238630683B1A2C0FD989ABCB0D639A3F751A0CC971B
25,405,599 UART: [art] PUB.Y = C5DFF2603779D8F27FF14FB7B0561E8F1B362E759810402D9275D1AEC5718F5A5DE103EA148866C16D7B91AD2DCCE253
25,412,878 UART: [art] SIG.R = E39F476F24E03A86F8A95725A827573C889335D383B90B369D3A4762EEF3FA32212BA29C705F8C7805C36BBE2697FDF2
25,420,269 UART: [art] SIG.S = A6D28FB4B0259B6BD8FEB758D90893BC0B10E9AAB9209E7BA7A2827A1AC0C233F0B3FC18EFFFCC1C33341D6A692A08D5
26,398,760 UART: Caliptra RT
26,399,457 UART: [state] CFI Enabled
26,565,113 UART: [rt] RT listening for mailbox commands...
26,567,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,723,486 UART: [rt]cmd =0x41544d4e, len=14344
29,121,456 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,533 UART:
192,892 UART: Running Caliptra ROM ...
194,085 UART:
603,840 UART: [state] CFI Enabled
614,895 UART: [state] LifecycleState = Unprovisioned
616,769 UART: [state] DebugLocked = No
618,138 UART: [state] WD Timer not started. Device not locked for debugging
622,463 UART: [kat] SHA2-256
801,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,159 UART: [kat] ++
813,686 UART: [kat] sha1
825,905 UART: [kat] SHA2-256
828,904 UART: [kat] SHA2-384
835,236 UART: [kat] SHA2-512-ACC
838,230 UART: [kat] ECC-384
3,277,610 UART: [kat] HMAC-384Kdf
3,289,405 UART: [kat] LMS
3,818,918 UART: [kat] --
3,822,181 UART: [cold-reset] ++
3,823,168 UART: [fht] FHT @ 0x50003400
3,833,660 UART: [idev] ++
3,834,218 UART: [idev] CDI.KEYID = 6
3,835,093 UART: [idev] SUBJECT.KEYID = 7
3,836,272 UART: [idev] UDS.KEYID = 0
3,837,254 ready_for_fw is high
3,837,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,002 UART: [idev] Erasing UDS.KEYID = 0
6,307,503 UART: [idev] Sha1 KeyId Algorithm
6,330,242 UART: [idev] --
6,334,119 UART: [ldev] ++
6,334,680 UART: [ldev] CDI.KEYID = 6
6,335,553 UART: [ldev] SUBJECT.KEYID = 5
6,336,752 UART: [ldev] AUTHORITY.KEYID = 7
6,338,030 UART: [ldev] FE.KEYID = 1
6,347,969 UART: [ldev] Erasing FE.KEYID = 1
8,820,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,736 UART: [ldev] --
10,609,750 UART: [fwproc] Wait for Commands...
10,611,941 UART: [fwproc] Recv command 0x46574c44
10,614,020 UART: [fwproc] Recv'd Img size: 114448 bytes
15,199,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,272,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,341,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,659,823 >>> mbox cmd response: success
15,664,596 UART: [afmc] ++
15,665,213 UART: [afmc] CDI.KEYID = 6
15,666,125 UART: [afmc] SUBJECT.KEYID = 7
15,667,280 UART: [afmc] AUTHORITY.KEYID = 5
18,166,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,885,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,887,260 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,903,242 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,919,219 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,934,982 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,956,921 UART: [afmc] --
19,959,914 UART: [cold-reset] --
19,964,308 UART: [state] Locking Datavault
19,969,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,970,801 UART: [state] Locking ICCM
19,972,346 UART: [exit] Launching FMC @ 0x40000130
19,980,789 UART:
19,981,019 UART: Running Caliptra FMC ...
19,982,265 UART:
19,982,424 UART: [state] CFI Enabled
19,990,497 UART: [fht] FMC Alias Private Key: 7
21,747,300 UART: [art] Extend RT PCRs Done
21,748,519 UART: [art] Lock RT PCRs Done
21,749,961 UART: [art] Populate DV Done
21,755,420 UART: [fht] FMC Alias Private Key: 7
21,756,957 UART: [art] Derive CDI
21,757,714 UART: [art] Store in in slot 0x4
21,800,516 UART: [art] Derive Key Pair
21,801,514 UART: [art] Store priv key in slot 0x5
24,228,040 UART: [art] Derive Key Pair - Done
24,241,200 UART: [art] Signing Cert with AUTHO
24,242,497 UART: RITY.KEYID = 7
25,948,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,949,681 UART: [art] PUB.X = EA2087E2B95B80E73AB01E70AA67BB54DE6AAC1135B0836ADF65897D15B707FE241419D702991F55C73799D8CD6CC455
25,956,910 UART: [art] PUB.Y = 69ACF67B82339B80DD082DCDD6DFABC4BCAD850BDD9228B52E962EFF4A78EB741CB92196FBC99B16461B5853E35C28F0
25,964,230 UART: [art] SIG.R = 5BD375D8DAB1E9BC8EE108D0854C3FFD340642F256175AEA9A555D72A66EC2DACFABD944EEC69069A24948680D48E754
25,971,632 UART: [art] SIG.S = 8FC1D40C51020B0466867B39156F51821EE9F561819049FC38A4E87B6C4524D8E73C46BEA829D62C15C1E60356370C66
26,950,337 UART: Caliptra RT
26,951,050 UART: [state] CFI Enabled
27,068,379 UART: [rt] RT listening for mailbox commands...
27,070,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,000 UART: [rt]cmd =0x41544d4e, len=14344
29,634,194 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,695,973 ready_for_fw is high
3,696,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,252,903 >>> mbox cmd response: success
19,508,347 UART:
19,508,738 UART: Running Caliptra FMC ...
19,509,874 UART:
19,510,023 UART: [state] CFI Enabled
19,518,128 UART: [fht] FMC Alias Private Key: 7
21,274,723 UART: [art] Extend RT PCRs Done
21,275,970 UART: [art] Lock RT PCRs Done
21,277,889 UART: [art] Populate DV Done
21,283,279 UART: [fht] FMC Alias Private Key: 7
21,284,872 UART: [art] Derive CDI
21,285,682 UART: [art] Store in in slot 0x4
21,327,998 UART: [art] Derive Key Pair
21,328,992 UART: [art] Store priv key in slot 0x5
23,756,020 UART: [art] Derive Key Pair - Done
23,769,239 UART: [art] Signing Cert with AUTHO
23,770,541 UART: RITY.KEYID = 7
25,476,149 UART: [art] Erasing AUTHORITY.KEYID = 7
25,477,656 UART: [art] PUB.X = BB6EFB535E37D8A0E5287FBD9C7D1B046531219BD782E48A89563C7C9411F4B040C4E6FDD0C9608A562D12B87283EE32
25,484,896 UART: [art] PUB.Y = 2C14F5744D8F07876810A39E2BC82003B0D9C538B4044113282692BBD979EFE015CBD014A6C04784653A84FE45BF0D1A
25,492,171 UART: [art] SIG.R = 153F3EC8B721124186AADC70FDCCD58AA85973E4AD50B6933AA5FA401649799A525DF54AD35AC58BDD6186365699E5C3
25,499,545 UART: [art] SIG.S = F2732F74D1E1B787E4578712D9FC9FFACD94AFF16198E6DB348B5A3618607335A0EC89F4866753192382423EB183D2B8
26,477,733 UART: Caliptra RT
26,478,454 UART: [state] CFI Enabled
26,595,995 UART: [rt] RT listening for mailbox commands...
26,598,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,753,551 UART: [rt]cmd =0x41544d4e, len=14344
29,137,474 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,086 UART:
192,448 UART: Running Caliptra ROM ...
193,665 UART:
193,821 UART: [state] CFI Enabled
262,232 UART: [state] LifecycleState = Unprovisioned
264,645 UART: [state] DebugLocked = No
266,460 UART: [state] WD Timer not started. Device not locked for debugging
271,551 UART: [kat] SHA2-256
461,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,233 UART: [kat] ++
472,707 UART: [kat] sha1
482,800 UART: [kat] SHA2-256
485,819 UART: [kat] SHA2-384
491,028 UART: [kat] SHA2-512-ACC
493,609 UART: [kat] ECC-384
2,947,366 UART: [kat] HMAC-384Kdf
2,971,807 UART: [kat] LMS
3,503,538 UART: [kat] --
3,507,266 UART: [cold-reset] ++
3,509,689 UART: [fht] FHT @ 0x50003400
3,522,437 UART: [idev] ++
3,523,148 UART: [idev] CDI.KEYID = 6
3,524,028 UART: [idev] SUBJECT.KEYID = 7
3,525,273 UART: [idev] UDS.KEYID = 0
3,526,175 ready_for_fw is high
3,526,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,395 UART: [idev] Erasing UDS.KEYID = 0
6,029,377 UART: [idev] Sha1 KeyId Algorithm
6,050,668 UART: [idev] --
6,055,098 UART: [ldev] ++
6,055,784 UART: [ldev] CDI.KEYID = 6
6,056,753 UART: [ldev] SUBJECT.KEYID = 5
6,057,912 UART: [ldev] AUTHORITY.KEYID = 7
6,059,091 UART: [ldev] FE.KEYID = 1
6,098,979 UART: [ldev] Erasing FE.KEYID = 1
8,603,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,500 UART: [ldev] --
10,412,307 UART: [fwproc] Wait for Commands...
10,414,834 UART: [fwproc] Recv command 0x46574c44
10,417,090 UART: [fwproc] Recv'd Img size: 114448 bytes
15,046,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,125,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,241,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,784,179 >>> mbox cmd response: success
15,788,810 UART: [afmc] ++
15,789,512 UART: [afmc] CDI.KEYID = 6
15,790,722 UART: [afmc] SUBJECT.KEYID = 7
15,792,158 UART: [afmc] AUTHORITY.KEYID = 5
18,322,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,048,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,050,673 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,065,759 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,080,933 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,095,769 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,120,735 UART: [afmc] --
20,125,133 UART: [cold-reset] --
20,128,938 UART: [state] Locking Datavault
20,132,947 UART: [state] Locking PCR0, PCR1 and PCR31
20,135,081 UART: [state] Locking ICCM
20,137,101 UART: [exit] Launching FMC @ 0x40000130
20,145,815 UART:
20,146,057 UART: Running Caliptra FMC ...
20,147,105 UART:
20,147,251 UART: [state] CFI Enabled
20,205,936 UART: [fht] FMC Alias Private Key: 7
21,969,382 UART: [art] Extend RT PCRs Done
21,970,594 UART: [art] Lock RT PCRs Done
21,972,084 UART: [art] Populate DV Done
21,977,605 UART: [fht] FMC Alias Private Key: 7
21,979,094 UART: [art] Derive CDI
21,980,026 UART: [art] Store in in slot 0x4
22,038,834 UART: [art] Derive Key Pair
22,039,836 UART: [art] Store priv key in slot 0x5
24,502,901 UART: [art] Derive Key Pair - Done
24,515,885 UART: [art] Signing Cert with AUTHO
24,517,190 UART: RITY.KEYID = 7
26,228,526 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,027 UART: [art] PUB.X = D21EECE659FDB34ACE4D7BBF30CE511239013FE2E8965B89E814FC07185E943B2E127F9819E82A3B812EB1069D03FF7D
26,237,293 UART: [art] PUB.Y = 5E232BB5467922F6232E8EC982071DCB8DF46D8008D01E0B018ED27C2B15899D2425FF5D7CDA1D6927131F2BBC250B34
26,244,574 UART: [art] SIG.R = 40F10CEBCA7FAD9C86394B70D6626172D41B7C50D168CC71AA42C5730B687CA93062DB58F801F2AB1E88779F4ADCA27D
26,251,957 UART: [art] SIG.S = 1C9BF5B6C81402B841B28D02E2E3897B036029B940FEEC58B6529F0C7122826A51ABFF915C0542FDB3788AFDCD5491DB
27,231,523 UART: Caliptra RT
27,232,230 UART: [state] CFI Enabled
27,398,008 UART: [rt] RT listening for mailbox commands...
27,400,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,952 UART: [rt]cmd =0x41544d4e, len=14344
29,943,671 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,437,691 ready_for_fw is high
3,438,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,835,481 >>> mbox cmd response: success
20,131,234 UART:
20,131,614 UART: Running Caliptra FMC ...
20,132,743 UART:
20,132,900 UART: [state] CFI Enabled
20,200,454 UART: [fht] FMC Alias Private Key: 7
21,964,653 UART: [art] Extend RT PCRs Done
21,965,871 UART: [art] Lock RT PCRs Done
21,967,388 UART: [art] Populate DV Done
21,972,686 UART: [fht] FMC Alias Private Key: 7
21,974,387 UART: [art] Derive CDI
21,975,198 UART: [art] Store in in slot 0x4
22,032,725 UART: [art] Derive Key Pair
22,033,755 UART: [art] Store priv key in slot 0x5
24,496,321 UART: [art] Derive Key Pair - Done
24,509,223 UART: [art] Signing Cert with AUTHO
24,510,555 UART: RITY.KEYID = 7
26,223,286 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,787 UART: [art] PUB.X = 3613B201BF29BBE86B877065CA9BFFA73896B422A1C0CC47E7D359B7121EB892CFD15AEB692FEE67C19DE1EE23A69554
26,232,081 UART: [art] PUB.Y = C1D32BA208D3460A12C9A6AC70FF126F4C405B55AFA463F50A2A553E2641B596A1F238AEAAC6B4699C2B7DEDE9187ED2
26,239,405 UART: [art] SIG.R = 3EA44C6CCF3EE4F3A9859B429A45B1985FD84D9D8CFCA73DE741F057E8B3CA4AF5D780797265A98DD332152922B65291
26,246,744 UART: [art] SIG.S = AF6EB8925686134DC639119D2E0AD847EE0077201FF5DF35EF0AD9C6F04016905C5D5F04A4FEA62663930F1FC31CEF14
27,225,352 UART: Caliptra RT
27,226,043 UART: [state] CFI Enabled
27,390,344 UART: [rt] RT listening for mailbox commands...
27,392,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,826 UART: [rt]cmd =0x41544d4e, len=14344
29,954,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,485 UART:
192,856 UART: Running Caliptra ROM ...
193,949 UART:
603,678 UART: [state] CFI Enabled
618,840 UART: [state] LifecycleState = Unprovisioned
621,215 UART: [state] DebugLocked = No
622,809 UART: [state] WD Timer not started. Device not locked for debugging
627,040 UART: [kat] SHA2-256
816,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,773 UART: [kat] ++
828,269 UART: [kat] sha1
840,345 UART: [kat] SHA2-256
843,412 UART: [kat] SHA2-384
850,102 UART: [kat] SHA2-512-ACC
852,679 UART: [kat] ECC-384
3,292,741 UART: [kat] HMAC-384Kdf
3,306,170 UART: [kat] LMS
3,837,968 UART: [kat] --
3,843,266 UART: [cold-reset] ++
3,845,834 UART: [fht] FHT @ 0x50003400
3,857,298 UART: [idev] ++
3,857,994 UART: [idev] CDI.KEYID = 6
3,859,015 UART: [idev] SUBJECT.KEYID = 7
3,860,181 UART: [idev] UDS.KEYID = 0
3,861,108 ready_for_fw is high
3,861,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,023 UART: [idev] Erasing UDS.KEYID = 0
6,337,239 UART: [idev] Sha1 KeyId Algorithm
6,359,109 UART: [idev] --
6,365,203 UART: [ldev] ++
6,365,883 UART: [ldev] CDI.KEYID = 6
6,366,788 UART: [ldev] SUBJECT.KEYID = 5
6,367,941 UART: [ldev] AUTHORITY.KEYID = 7
6,369,164 UART: [ldev] FE.KEYID = 1
6,377,105 UART: [ldev] Erasing FE.KEYID = 1
8,856,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,936 UART: [ldev] --
10,650,025 UART: [fwproc] Wait for Commands...
10,651,918 UART: [fwproc] Recv command 0x46574c44
10,654,222 UART: [fwproc] Recv'd Img size: 114448 bytes
15,268,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,348,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,464,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,007,299 >>> mbox cmd response: success
16,011,039 UART: [afmc] ++
16,011,754 UART: [afmc] CDI.KEYID = 6
16,013,001 UART: [afmc] SUBJECT.KEYID = 7
16,014,441 UART: [afmc] AUTHORITY.KEYID = 5
18,517,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,239,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,241,064 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,256,165 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,271,346 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,286,163 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,310,640 UART: [afmc] --
20,313,629 UART: [cold-reset] --
20,316,586 UART: [state] Locking Datavault
20,320,919 UART: [state] Locking PCR0, PCR1 and PCR31
20,323,061 UART: [state] Locking ICCM
20,324,721 UART: [exit] Launching FMC @ 0x40000130
20,333,396 UART:
20,333,635 UART: Running Caliptra FMC ...
20,334,731 UART:
20,334,887 UART: [state] CFI Enabled
20,342,927 UART: [fht] FMC Alias Private Key: 7
22,099,345 UART: [art] Extend RT PCRs Done
22,100,557 UART: [art] Lock RT PCRs Done
22,102,222 UART: [art] Populate DV Done
22,107,683 UART: [fht] FMC Alias Private Key: 7
22,109,215 UART: [art] Derive CDI
22,109,990 UART: [art] Store in in slot 0x4
22,152,859 UART: [art] Derive Key Pair
22,153,894 UART: [art] Store priv key in slot 0x5
24,580,905 UART: [art] Derive Key Pair - Done
24,593,685 UART: [art] Signing Cert with AUTHO
24,594,991 UART: RITY.KEYID = 7
26,300,533 UART: [art] Erasing AUTHORITY.KEYID = 7
26,302,029 UART: [art] PUB.X = A297A1318D3A4046FB08D7730C5E649888066C35A593BC521B5B382668773739CDB5DB3BB6B806EB5CC0FE5677D1D995
26,309,350 UART: [art] PUB.Y = FB4DE60D9D2144AFB5FEECEAB47594BE481E0E32A886330D856639A45C7DEADD3D3E410E952DD2064CF52D117F6BB727
26,316,619 UART: [art] SIG.R = 05BC6E24369743B14C66D850BD4C7C8E5F0123E6B714C6DA12FE035191BE1BBB365321FBA1219A6F45165A35FF8C5CC1
26,323,994 UART: [art] SIG.S = E8BBC9CCE078FE80F9EE56DB2DE97238EC696BE48B63484DF32E26B14A99A5D4B1BDE15CAA7CA85F34237F60A5210CF2
27,303,073 UART: Caliptra RT
27,303,758 UART: [state] CFI Enabled
27,421,464 UART: [rt] RT listening for mailbox commands...
27,423,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,178 UART: [rt]cmd =0x41544d4e, len=14344
29,975,708 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,756,388 ready_for_fw is high
3,756,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,052,672 >>> mbox cmd response: success
20,307,937 UART:
20,308,327 UART: Running Caliptra FMC ...
20,309,508 UART:
20,309,668 UART: [state] CFI Enabled
20,317,383 UART: [fht] FMC Alias Private Key: 7
22,074,431 UART: [art] Extend RT PCRs Done
22,075,660 UART: [art] Lock RT PCRs Done
22,077,180 UART: [art] Populate DV Done
22,082,307 UART: [fht] FMC Alias Private Key: 7
22,083,804 UART: [art] Derive CDI
22,084,564 UART: [art] Store in in slot 0x4
22,127,594 UART: [art] Derive Key Pair
22,128,630 UART: [art] Store priv key in slot 0x5
24,555,642 UART: [art] Derive Key Pair - Done
24,568,646 UART: [art] Signing Cert with AUTHO
24,569,947 UART: RITY.KEYID = 7
26,275,422 UART: [art] Erasing AUTHORITY.KEYID = 7
26,276,913 UART: [art] PUB.X = 44454026991DDCE48CF44BF18790BBDD27E4E24C21E7139F26E62B0A2C6F83E65F6206F6412A937494C34A8D8CEB764D
26,284,167 UART: [art] PUB.Y = 90278E468A00822B14E5B8CB871A4D857355B87714B1B0F2C7B52C3216AEB47D0DF5AD39358A7E5F7289EBE83052CF48
26,291,406 UART: [art] SIG.R = 147A0EBBEBF70D6615B5BDB735A9CD42A61166640C416C80B428D06D03C6CA9A1ED2972F881DB983F8874B235870313F
26,298,848 UART: [art] SIG.S = 6060824781CBF6D0C953136AE127356DB3A1B13BD33A1ECF3B1BD5204BD0C65202C42CABCAAC3127DA4DAFF7A4F79AED
27,278,338 UART: Caliptra RT
27,279,059 UART: [state] CFI Enabled
27,395,275 UART: [rt] RT listening for mailbox commands...
27,397,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,552,858 UART: [rt]cmd =0x41544d4e, len=14344
29,943,992 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,647 UART: [kat] SHA2-256
892,585 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
903,224 UART: [kat] HMAC-384Kdf
907,922 UART: [kat] LMS
1,476,118 UART: [kat] --
1,476,883 UART: [cold-reset] ++
1,477,251 UART: [fht] Storing FHT @ 0x50003400
1,480,072 UART: [idev] ++
1,480,240 UART: [idev] CDI.KEYID = 6
1,480,600 UART: [idev] SUBJECT.KEYID = 7
1,481,024 UART: [idev] UDS.KEYID = 0
1,481,369 ready_for_fw is high
1,481,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,732 UART: [idev] Erasing UDS.KEYID = 0
1,505,054 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,742 UART: [idev] --
1,514,635 UART: [ldev] ++
1,514,803 UART: [ldev] CDI.KEYID = 6
1,515,166 UART: [ldev] SUBJECT.KEYID = 5
1,515,592 UART: [ldev] AUTHORITY.KEYID = 7
1,516,055 UART: [ldev] FE.KEYID = 1
1,521,127 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,664 UART: [ldev] --
1,585,965 UART: [fwproc] Waiting for Commands...
1,586,690 UART: [fwproc] Received command 0x46574c44
1,587,481 UART: [fwproc] Received Image of size 114448 bytes
5,272,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,056 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,466,519 >>> mbox cmd response: success
5,467,533 UART: [afmc] ++
5,467,701 UART: [afmc] CDI.KEYID = 6
5,468,063 UART: [afmc] SUBJECT.KEYID = 7
5,468,488 UART: [afmc] AUTHORITY.KEYID = 5
5,503,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,368 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,077 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,969 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,670 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,526 UART: [afmc] --
5,546,410 UART: [cold-reset] --
5,547,160 UART: [state] Locking Datavault
5,548,311 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,915 UART: [state] Locking ICCM
5,549,381 UART: [exit] Launching FMC @ 0x40000130
5,554,710 UART:
5,554,726 UART: Running Caliptra FMC ...
5,555,134 UART:
5,555,188 UART: [state] CFI Enabled
5,565,900 UART: [fht] FMC Alias Private Key: 7
5,673,262 UART: [art] Extend RT PCRs Done
5,673,690 UART: [art] Lock RT PCRs Done
5,675,374 UART: [art] Populate DV Done
5,683,416 UART: [fht] FMC Alias Private Key: 7
5,684,598 UART: [art] Derive CDI
5,684,878 UART: [art] Store in in slot 0x4
5,770,627 UART: [art] Derive Key Pair
5,770,987 UART: [art] Store priv key in slot 0x5
5,784,251 UART: [art] Derive Key Pair - Done
5,798,982 UART: [art] Signing Cert with AUTHO
5,799,462 UART: RITY.KEYID = 7
5,814,460 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,225 UART: [art] PUB.X = 6F04BCF82AD87ACAAC55EE5E58BBA7F07B65614F48FA5F5F7F4AA6098C2E1E3286E517DCFD37974BAF0F680A907DA36F
5,822,007 UART: [art] PUB.Y = 8CCD702C66FE0B5DC291EB45CC96F704DB2F18684A9E39B0D4386AC8A8576242D8D9853995FF4EEF79F8413A6D473D21
5,828,959 UART: [art] SIG.R = 8C57F19E337A7CBDA4E4B3162EE2A5F82A7EA1ABF7A9DB272004F7515530FF2C6FF8B2FBD4480855F39FE26CFA32DD6F
5,835,745 UART: [art] SIG.S = 0B3A38F33E177EA1D180C08A639D78BA41ECAD4D07F7DFF6B50742790E06A801EC7C97B456BAB9A63716C76B305D3CB0
5,859,686 UART: Caliptra RT
5,859,939 UART: [state] CFI Enabled
5,967,902 UART: [rt] RT listening for mailbox commands...
5,968,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,804 UART: [rt]cmd =0x41544d4e, len=14344
6,731,466 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,963 ready_for_fw is high
1,361,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,044 >>> mbox cmd response: success
5,378,993 UART:
5,379,009 UART: Running Caliptra FMC ...
5,379,417 UART:
5,379,471 UART: [state] CFI Enabled
5,390,107 UART: [fht] FMC Alias Private Key: 7
5,498,105 UART: [art] Extend RT PCRs Done
5,498,533 UART: [art] Lock RT PCRs Done
5,500,057 UART: [art] Populate DV Done
5,508,503 UART: [fht] FMC Alias Private Key: 7
5,509,509 UART: [art] Derive CDI
5,509,789 UART: [art] Store in in slot 0x4
5,594,984 UART: [art] Derive Key Pair
5,595,344 UART: [art] Store priv key in slot 0x5
5,607,948 UART: [art] Derive Key Pair - Done
5,622,803 UART: [art] Signing Cert with AUTHO
5,623,283 UART: RITY.KEYID = 7
5,638,637 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,402 UART: [art] PUB.X = 07D5EBC375891D0257A5FBBB0C32800410A4AB2F4A74DF204919BF0F05696DE9268930F124879DD24C9289B319EB2ABC
5,646,158 UART: [art] PUB.Y = 2801DDBA7ECF3B9C639873D1C9E849B0DBF233788CE91F5ED077302A0EAB247A169F75D11CF5E43CC223879184258A98
5,653,108 UART: [art] SIG.R = 75AA732C615CA5901261CF8AC5CDE262B9F6EFA908BD18D054236F02FBE5419665983C23B071A523E95A93BA586B5141
5,659,874 UART: [art] SIG.S = 0FD5CE3AD29ABFA5D1F837C2B7AF9880762459E896280E08F059478E6A140503878C74BA58C8A5FBF95619882970BF03
5,683,741 UART: Caliptra RT
5,683,994 UART: [state] CFI Enabled
5,791,678 UART: [rt] RT listening for mailbox commands...
5,792,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,580 UART: [rt]cmd =0x41544d4e, len=14344
6,567,929 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,676 UART: [kat] SHA2-256
892,614 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
902,881 UART: [kat] HMAC-384Kdf
907,585 UART: [kat] LMS
1,475,781 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 ready_for_fw is high
1,481,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,445 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,344 UART: [ldev] ++
1,515,512 UART: [ldev] CDI.KEYID = 6
1,515,875 UART: [ldev] SUBJECT.KEYID = 5
1,516,301 UART: [ldev] AUTHORITY.KEYID = 7
1,516,764 UART: [ldev] FE.KEYID = 1
1,522,138 UART: [ldev] Erasing FE.KEYID = 1
1,548,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,229 UART: [ldev] --
1,587,732 UART: [fwproc] Waiting for Commands...
1,588,351 UART: [fwproc] Received command 0x46574c44
1,589,142 UART: [fwproc] Received Image of size 114448 bytes
5,012,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,039,675 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,069,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,205,060 >>> mbox cmd response: success
5,206,138 UART: [afmc] ++
5,206,306 UART: [afmc] CDI.KEYID = 6
5,206,668 UART: [afmc] SUBJECT.KEYID = 7
5,207,093 UART: [afmc] AUTHORITY.KEYID = 5
5,242,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,258,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,259,487 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,265,196 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,271,088 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,276,789 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,284,675 UART: [afmc] --
5,285,727 UART: [cold-reset] --
5,286,299 UART: [state] Locking Datavault
5,287,606 UART: [state] Locking PCR0, PCR1 and PCR31
5,288,210 UART: [state] Locking ICCM
5,288,808 UART: [exit] Launching FMC @ 0x40000130
5,294,137 UART:
5,294,153 UART: Running Caliptra FMC ...
5,294,561 UART:
5,294,704 UART: [state] CFI Enabled
5,305,570 UART: [fht] FMC Alias Private Key: 7
5,413,268 UART: [art] Extend RT PCRs Done
5,413,696 UART: [art] Lock RT PCRs Done
5,415,216 UART: [art] Populate DV Done
5,423,250 UART: [fht] FMC Alias Private Key: 7
5,424,394 UART: [art] Derive CDI
5,424,674 UART: [art] Store in in slot 0x4
5,510,649 UART: [art] Derive Key Pair
5,511,009 UART: [art] Store priv key in slot 0x5
5,524,195 UART: [art] Derive Key Pair - Done
5,539,272 UART: [art] Signing Cert with AUTHO
5,539,752 UART: RITY.KEYID = 7
5,555,062 UART: [art] Erasing AUTHORITY.KEYID = 7
5,555,827 UART: [art] PUB.X = EEB7B1D4B5794B261CB8CACF189ECB559C510761A2A77973BEDE25F25E8E938F7D4914A5151F0694B7229BD8B87CE3E3
5,562,603 UART: [art] PUB.Y = CB7CA2C588A5B8E6EA33F957DA23EE0474178DB489453437A8C9B523A300EB19C73CBB30C393C424C36CB67A069A4246
5,569,531 UART: [art] SIG.R = 4350B7ED080F1CB60A80B2176DF3E0D883E2F65B3A0A56D81CA13B11336FBB24CC68555DF1A5F7519140C81BDF400AE5
5,576,296 UART: [art] SIG.S = D55324137A9E1168AAD877A2A6816B587A4D1EDB7C4A5D8D18A1D3E020E975E61C5DCA6C70ED3AEFF7BC9D3486E04A49
5,600,081 UART: Caliptra RT
5,600,426 UART: [state] CFI Enabled
5,708,411 UART: [rt] RT listening for mailbox commands...
5,709,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,832,019 UART: [rt]cmd =0x41544d4e, len=14344
6,474,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,562 ready_for_fw is high
1,363,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,204,332 >>> mbox cmd response: success
5,266,751 UART:
5,266,767 UART: Running Caliptra FMC ...
5,267,175 UART:
5,267,318 UART: [state] CFI Enabled
5,277,582 UART: [fht] FMC Alias Private Key: 7
5,385,344 UART: [art] Extend RT PCRs Done
5,385,772 UART: [art] Lock RT PCRs Done
5,387,398 UART: [art] Populate DV Done
5,395,852 UART: [fht] FMC Alias Private Key: 7
5,396,788 UART: [art] Derive CDI
5,397,068 UART: [art] Store in in slot 0x4
5,482,751 UART: [art] Derive Key Pair
5,483,111 UART: [art] Store priv key in slot 0x5
5,496,139 UART: [art] Derive Key Pair - Done
5,510,740 UART: [art] Signing Cert with AUTHO
5,511,220 UART: RITY.KEYID = 7
5,526,162 UART: [art] Erasing AUTHORITY.KEYID = 7
5,526,927 UART: [art] PUB.X = 350301D136E16E4BA98686D8D21C0C54B3CB996214DA8679B369EDCE99AB801E48FB6CAF3164F7E053A81B350B65C9AA
5,533,693 UART: [art] PUB.Y = 849F3B590F458B49BDEBF080040E7750A278223AA17357193959EBE4311B30C2E5A3D2C137080D65387D6436323C32A4
5,540,618 UART: [art] SIG.R = 56432521A70AF023B341C64B87E4528FAEA0D76B2B7A083B15C74B3600A3F80CCC071C36F17E9234553B41EA430D750B
5,547,348 UART: [art] SIG.S = C018DC556E4DA0A9338AF0CB9702EB942D70419239F17C9C8A006FCA7AB4A34948BC92E581F05ADDA98918F93458207D
5,571,456 UART: Caliptra RT
5,571,801 UART: [state] CFI Enabled
5,680,880 UART: [rt] RT listening for mailbox commands...
5,681,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,336 UART: [rt]cmd =0x41544d4e, len=14344
6,438,916 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
902,133 UART: [kat] SHA2-256
904,073 UART: [kat] SHA2-384
906,972 UART: [kat] SHA2-512-ACC
908,873 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
922,972 UART: [kat] LMS
1,171,300 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,747 UART: [fht] FHT @ 0x50003400
1,175,306 UART: [idev] ++
1,175,474 UART: [idev] CDI.KEYID = 6
1,175,834 UART: [idev] SUBJECT.KEYID = 7
1,176,258 UART: [idev] UDS.KEYID = 0
1,176,603 ready_for_fw is high
1,176,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,201,119 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,059 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,657 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,748 UART: [fwproc] Recv command 0x46574c44
1,284,476 UART: [fwproc] Recv'd Img size: 114448 bytes
3,112,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,305,136 >>> mbox cmd response: success
3,306,210 UART: [afmc] ++
3,306,378 UART: [afmc] CDI.KEYID = 6
3,306,740 UART: [afmc] SUBJECT.KEYID = 7
3,307,165 UART: [afmc] AUTHORITY.KEYID = 5
3,342,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,359,882 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,591 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,483 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,194 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,107 UART: [afmc] --
3,385,995 UART: [cold-reset] --
3,386,745 UART: [state] Locking Datavault
3,387,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,562 UART: [state] Locking ICCM
3,389,050 UART: [exit] Launching FMC @ 0x40000130
3,394,379 UART:
3,394,395 UART: Running Caliptra FMC ...
3,394,803 UART:
3,394,857 UART: [state] CFI Enabled
3,405,855 UART: [fht] FMC Alias Private Key: 7
3,512,991 UART: [art] Extend RT PCRs Done
3,513,419 UART: [art] Lock RT PCRs Done
3,514,877 UART: [art] Populate DV Done
3,522,901 UART: [fht] FMC Alias Private Key: 7
3,523,835 UART: [art] Derive CDI
3,524,115 UART: [art] Store in in slot 0x4
3,609,494 UART: [art] Derive Key Pair
3,609,854 UART: [art] Store priv key in slot 0x5
3,623,406 UART: [art] Derive Key Pair - Done
3,638,057 UART: [art] Signing Cert with AUTHO
3,638,537 UART: RITY.KEYID = 7
3,653,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,596 UART: [art] PUB.X = D41E188A3897B75483BFB9C7BA4A9C8D42E0A2D3A449CD3F95228A668F24A6C482E684AB638B27548A147D550786145F
3,661,363 UART: [art] PUB.Y = FC9977FF07E98C5026F1C33D7625B5682103C8E724971F4514B12F4B8C2E30E0A69EFD17E21642A72A2C4014E355F127
3,668,303 UART: [art] SIG.R = BC2DFE49ACE7FBAA3DB78017D23D1B4C0905DFF5375C2A8759C528CA831D8C5D6ADD80F4CE4EC8AB481B093A72D02AE8
3,675,090 UART: [art] SIG.S = 968C687D36B1E765BDE7EF6D328568CA520B63E72EB2AFAE7C7EDD4E0183421FB4C6D00FD07ED9419E4DB65BAFD876D9
3,698,576 UART: Caliptra RT
3,698,829 UART: [state] CFI Enabled
3,805,916 UART: [rt] RT listening for mailbox commands...
3,806,586 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,204 UART: [rt]cmd =0x41544d4e, len=14344
4,569,420 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,577 ready_for_fw is high
1,059,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,323 >>> mbox cmd response: success
3,223,134 UART:
3,223,150 UART: Running Caliptra FMC ...
3,223,558 UART:
3,223,612 UART: [state] CFI Enabled
3,234,312 UART: [fht] FMC Alias Private Key: 7
3,342,072 UART: [art] Extend RT PCRs Done
3,342,500 UART: [art] Lock RT PCRs Done
3,344,280 UART: [art] Populate DV Done
3,352,414 UART: [fht] FMC Alias Private Key: 7
3,353,424 UART: [art] Derive CDI
3,353,704 UART: [art] Store in in slot 0x4
3,439,079 UART: [art] Derive Key Pair
3,439,439 UART: [art] Store priv key in slot 0x5
3,452,503 UART: [art] Derive Key Pair - Done
3,467,333 UART: [art] Signing Cert with AUTHO
3,467,813 UART: RITY.KEYID = 7
3,483,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,886 UART: [art] PUB.X = CB2E86A7FF4666EAB0D66DC4825B668CF29E48705B0218F91F9FC6CC0360CB85CA2CF74F5299F00BA48D13AF76E0F09D
3,490,663 UART: [art] PUB.Y = 8F4F8536FE9CF0A8173BCC4EAE68D03E837E4F2A1CD6F296D1C928E92C91B34FC195FAC770A9B19605C87A2B2DBEEF44
3,497,630 UART: [art] SIG.R = 108A4516038324ED34C5EA3D1C273B1157BE00CA35F17716C3289EB99983612AC60326DBD67CE1D62F1B72E71CC097F9
3,504,372 UART: [art] SIG.S = 7DE143FF1B694D72CEF6A1208F4BA3E6C31BDA871D0772BF4E361F8E4A72AB0D28FD40497D20912EFB01DDC648EED07E
3,528,028 UART: Caliptra RT
3,528,281 UART: [state] CFI Enabled
3,635,460 UART: [rt] RT listening for mailbox commands...
3,636,130 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,084 UART: [rt]cmd =0x41544d4e, len=14344
4,394,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
902,034 UART: [kat] SHA2-256
903,974 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,171,914 UART: [cold-reset] ++
1,172,302 UART: [fht] FHT @ 0x50003400
1,174,823 UART: [idev] ++
1,174,991 UART: [idev] CDI.KEYID = 6
1,175,351 UART: [idev] SUBJECT.KEYID = 7
1,175,775 UART: [idev] UDS.KEYID = 0
1,176,120 ready_for_fw is high
1,176,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,835 UART: [idev] Erasing UDS.KEYID = 0
1,201,004 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,462 UART: [ldev] ++
1,210,630 UART: [ldev] CDI.KEYID = 6
1,210,993 UART: [ldev] SUBJECT.KEYID = 5
1,211,419 UART: [ldev] AUTHORITY.KEYID = 7
1,211,882 UART: [ldev] FE.KEYID = 1
1,217,158 UART: [ldev] Erasing FE.KEYID = 1
1,242,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,576 UART: [ldev] --
1,281,921 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 114448 bytes
3,115,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,309,171 >>> mbox cmd response: success
3,310,257 UART: [afmc] ++
3,310,425 UART: [afmc] CDI.KEYID = 6
3,310,787 UART: [afmc] SUBJECT.KEYID = 7
3,311,212 UART: [afmc] AUTHORITY.KEYID = 5
3,346,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,191 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,900 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,792 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,503 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,372 UART: [afmc] --
3,389,424 UART: [cold-reset] --
3,390,302 UART: [state] Locking Datavault
3,391,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,941 UART: [state] Locking ICCM
3,392,361 UART: [exit] Launching FMC @ 0x40000130
3,397,690 UART:
3,397,706 UART: Running Caliptra FMC ...
3,398,114 UART:
3,398,257 UART: [state] CFI Enabled
3,408,863 UART: [fht] FMC Alias Private Key: 7
3,516,597 UART: [art] Extend RT PCRs Done
3,517,025 UART: [art] Lock RT PCRs Done
3,518,539 UART: [art] Populate DV Done
3,526,679 UART: [fht] FMC Alias Private Key: 7
3,527,743 UART: [art] Derive CDI
3,528,023 UART: [art] Store in in slot 0x4
3,613,760 UART: [art] Derive Key Pair
3,614,120 UART: [art] Store priv key in slot 0x5
3,627,162 UART: [art] Derive Key Pair - Done
3,641,601 UART: [art] Signing Cert with AUTHO
3,642,081 UART: RITY.KEYID = 7
3,657,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,540 UART: [art] PUB.X = F86EEF2F0F7020BD7D6EC1B42E5FDA39CE587CC9C98F0B7414480BAB5AD2664F2A27ADFCE5E5AFAF6AD5DDAB38629B08
3,665,330 UART: [art] PUB.Y = CE43CA75E22A4866B4FD7661BB5692BE8652902DF52453D8707508BD93CFFECDD1D1544DC4D94E6750FF21EEB17D36F5
3,672,289 UART: [art] SIG.R = 3E4396D091337442977F3D95BDA808DF86A4A1DEB702CE3092D6E283AE61DA4355B68F4A023849A680A2EBC45C8081FB
3,679,054 UART: [art] SIG.S = 7C2BA11CE80173863FD15D327CBE9874EBD53FF7D08B25812F5559FA32185360721E0D2A97755831626FB6AB4F078E31
3,702,994 UART: Caliptra RT
3,703,339 UART: [state] CFI Enabled
3,811,384 UART: [rt] RT listening for mailbox commands...
3,812,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,234 UART: [rt]cmd =0x41544d4e, len=14344
4,590,108 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,732 ready_for_fw is high
1,060,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,176,655 >>> mbox cmd response: success
3,238,998 UART:
3,239,014 UART: Running Caliptra FMC ...
3,239,422 UART:
3,239,565 UART: [state] CFI Enabled
3,250,205 UART: [fht] FMC Alias Private Key: 7
3,357,693 UART: [art] Extend RT PCRs Done
3,358,121 UART: [art] Lock RT PCRs Done
3,359,531 UART: [art] Populate DV Done
3,367,825 UART: [fht] FMC Alias Private Key: 7
3,368,943 UART: [art] Derive CDI
3,369,223 UART: [art] Store in in slot 0x4
3,455,172 UART: [art] Derive Key Pair
3,455,532 UART: [art] Store priv key in slot 0x5
3,468,956 UART: [art] Derive Key Pair - Done
3,483,560 UART: [art] Signing Cert with AUTHO
3,484,040 UART: RITY.KEYID = 7
3,499,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,109 UART: [art] PUB.X = 38BF94B3BDF0BFB5DA821C0BF5751411C3857CBAF68E8DFCFC457462420595EC49055C14DAF63323BB97973B849DEF88
3,506,882 UART: [art] PUB.Y = 2F24C2EBE5F38E05FAC351B020CBE16C0EB39371300920A72C975EE95F8B25C713CB726BCC88F23BFECFD49FF7742F37
3,513,839 UART: [art] SIG.R = 7498D858BCDC0EF5135C50020A5347466254BF49EE772478ACE852C716A11955A90D0F192148756654AD4DC1811B7E32
3,520,586 UART: [art] SIG.S = 0BA28080D005D2B3A4392381ECEE03CEDAAF905026D9D85311170059CBBBAA07771B89B38D5A527A35167F395DAB8CDF
3,544,239 UART: Caliptra RT
3,544,584 UART: [state] CFI Enabled
3,651,763 UART: [rt] RT listening for mailbox commands...
3,652,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,209 UART: [rt]cmd =0x41544d4e, len=14344
4,420,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 ready_for_fw is high
1,174,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,405 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,241,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,410 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,874 >>> mbox cmd response: success
3,317,125 UART: [afmc] ++
3,317,293 UART: [afmc] CDI.KEYID = 6
3,317,656 UART: [afmc] SUBJECT.KEYID = 7
3,318,082 UART: [afmc] AUTHORITY.KEYID = 5
3,353,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,051 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,761 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,651 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,362 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,348 UART: [afmc] --
3,397,472 UART: [cold-reset] --
3,398,400 UART: [state] Locking Datavault
3,399,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,223 UART: [state] Locking ICCM
3,400,769 UART: [exit] Launching FMC @ 0x40000130
3,406,098 UART:
3,406,114 UART: Running Caliptra FMC ...
3,406,522 UART:
3,406,576 UART: [state] CFI Enabled
3,417,088 UART: [fht] FMC Alias Private Key: 7
3,524,836 UART: [art] Extend RT PCRs Done
3,525,264 UART: [art] Lock RT PCRs Done
3,526,952 UART: [art] Populate DV Done
3,535,112 UART: [fht] FMC Alias Private Key: 7
3,536,254 UART: [art] Derive CDI
3,536,534 UART: [art] Store in in slot 0x4
3,622,259 UART: [art] Derive Key Pair
3,622,619 UART: [art] Store priv key in slot 0x5
3,635,923 UART: [art] Derive Key Pair - Done
3,651,053 UART: [art] Signing Cert with AUTHO
3,651,533 UART: RITY.KEYID = 7
3,666,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,610 UART: [art] PUB.X = A88EF4CA21FE3A2CDE704637C31BE1F55815771880F01FDEA5A30E525F30804E6403E994700CB056CD4A9C6712C688BD
3,674,377 UART: [art] PUB.Y = 25EC9C21174088C8DC994895DC4C648A1D78DAECEF708845621FDECB887DC2A7FF7620E4FDA67F736FE7940AFC4876B7
3,681,338 UART: [art] SIG.R = 3B93E7252E294561E244D8D9A874F309574325A55F419A01759EF4BFDF80ED99F4C3E89383C84C549C980357D6D1F584
3,688,093 UART: [art] SIG.S = F557CD113B6CBA05AD8F9D189DB6199B1E84D1B0C34000D589754F4117B1F84E0BBDF7F2BF1AA03A8C98F501685968A4
3,711,781 UART: Caliptra RT
3,712,034 UART: [state] CFI Enabled
3,819,932 UART: [rt] RT listening for mailbox commands...
3,820,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,472 UART: [rt]cmd =0x41544d4e, len=14344
4,580,735 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,254 ready_for_fw is high
1,056,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,308 >>> mbox cmd response: success
3,236,087 UART:
3,236,103 UART: Running Caliptra FMC ...
3,236,511 UART:
3,236,565 UART: [state] CFI Enabled
3,246,899 UART: [fht] FMC Alias Private Key: 7
3,354,309 UART: [art] Extend RT PCRs Done
3,354,737 UART: [art] Lock RT PCRs Done
3,356,135 UART: [art] Populate DV Done
3,364,541 UART: [fht] FMC Alias Private Key: 7
3,365,717 UART: [art] Derive CDI
3,365,997 UART: [art] Store in in slot 0x4
3,451,530 UART: [art] Derive Key Pair
3,451,890 UART: [art] Store priv key in slot 0x5
3,465,288 UART: [art] Derive Key Pair - Done
3,480,223 UART: [art] Signing Cert with AUTHO
3,480,703 UART: RITY.KEYID = 7
3,495,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,336 UART: [art] PUB.X = 5CEB6119DF41F055871787149DAD978CE183507CE7BBC1FEE2344C5B75F8B0F732E5036A62EA5175A1DB5CFF0BEB9BAB
3,503,118 UART: [art] PUB.Y = 3484806E7A0DA99D8A3995AB84D9411805697000B25A5ED9685399E90C914B13AE3D34A3AC719135051227B8B639D345
3,510,022 UART: [art] SIG.R = 1FBFC21E6F1435EFC18B438B19154A19E169584D37ADA1BD19996EE990761B2D5C5B79D734A4CB7A30B633411F45AC8C
3,516,800 UART: [art] SIG.S = 6EFF8FDD505CB718AE609233209754CC6505D07BB270F2B9BD53C5F0A3C9EC4FC5EECE812785805E3A198BA99346C5A6
3,540,760 UART: Caliptra RT
3,541,013 UART: [state] CFI Enabled
3,648,392 UART: [rt] RT listening for mailbox commands...
3,649,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,818 UART: [rt]cmd =0x41544d4e, len=14344
4,416,928 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,873 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,174,922 ready_for_fw is high
1,174,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,580 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,314,378 >>> mbox cmd response: success
3,315,491 UART: [afmc] ++
3,315,659 UART: [afmc] CDI.KEYID = 6
3,316,022 UART: [afmc] SUBJECT.KEYID = 7
3,316,448 UART: [afmc] AUTHORITY.KEYID = 5
3,351,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,793 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,503 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,104 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,940 UART: [afmc] --
3,394,858 UART: [cold-reset] --
3,395,498 UART: [state] Locking Datavault
3,396,759 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,363 UART: [state] Locking ICCM
3,397,869 UART: [exit] Launching FMC @ 0x40000130
3,403,198 UART:
3,403,214 UART: Running Caliptra FMC ...
3,403,622 UART:
3,403,765 UART: [state] CFI Enabled
3,414,767 UART: [fht] FMC Alias Private Key: 7
3,522,323 UART: [art] Extend RT PCRs Done
3,522,751 UART: [art] Lock RT PCRs Done
3,524,491 UART: [art] Populate DV Done
3,532,617 UART: [fht] FMC Alias Private Key: 7
3,533,671 UART: [art] Derive CDI
3,533,951 UART: [art] Store in in slot 0x4
3,619,992 UART: [art] Derive Key Pair
3,620,352 UART: [art] Store priv key in slot 0x5
3,634,418 UART: [art] Derive Key Pair - Done
3,648,940 UART: [art] Signing Cert with AUTHO
3,649,420 UART: RITY.KEYID = 7
3,664,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,637 UART: [art] PUB.X = 5CA8AC0DAD62118BBC30D088989D98827A82976DD724889585F561106DEECED91E2000E1ED4EB98240AC34898D8237EC
3,672,386 UART: [art] PUB.Y = C982BCE5B2CF763202E18DD64448AD7AE0886D71B75868656A46881CC80E2BAB9B562DD504CE5AC98439170955CC6908
3,679,323 UART: [art] SIG.R = 95F16C10138620869EF74DFD5FB64EC0FEE048D240C4C9BFF28E65FAF7940DD070457823347FE0EB79A74E3C41D9BFA3
3,686,102 UART: [art] SIG.S = A9D2960E7C5E3FDF9D399B6065F2BFD801846CFFEA010D689D8762E3F7C2A9C25C28BA03CE603738BD4D8F901E996BB0
3,710,056 UART: Caliptra RT
3,710,401 UART: [state] CFI Enabled
3,818,268 UART: [rt] RT listening for mailbox commands...
3,818,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,824 UART: [rt]cmd =0x41544d4e, len=14344
4,586,884 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,297 ready_for_fw is high
1,056,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,409 >>> mbox cmd response: success
3,229,250 UART:
3,229,266 UART: Running Caliptra FMC ...
3,229,674 UART:
3,229,817 UART: [state] CFI Enabled
3,240,789 UART: [fht] FMC Alias Private Key: 7
3,348,647 UART: [art] Extend RT PCRs Done
3,349,075 UART: [art] Lock RT PCRs Done
3,350,673 UART: [art] Populate DV Done
3,359,065 UART: [fht] FMC Alias Private Key: 7
3,360,237 UART: [art] Derive CDI
3,360,517 UART: [art] Store in in slot 0x4
3,445,816 UART: [art] Derive Key Pair
3,446,176 UART: [art] Store priv key in slot 0x5
3,459,112 UART: [art] Derive Key Pair - Done
3,474,001 UART: [art] Signing Cert with AUTHO
3,474,481 UART: RITY.KEYID = 7
3,489,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,526 UART: [art] PUB.X = 970972F26EFA290C340D5EA6BBF82C892172ECDD69313620C773F5065DC7A7F83CF92E500349780E7707DFB45E9F7883
3,497,275 UART: [art] PUB.Y = 1601B917FCDAE9AC6F6B9BF8E078CEEF32FF9BB151CD13AC3A7C92E6B5895B577C726FC7F3C580BE09D7AE6312594DC0
3,504,241 UART: [art] SIG.R = F6470DA929DAB10FBC46059E30CCCD2519C40C439F5B4145EFB3974CF0EC93879ADD9C2C3C5753DF30C13A37C8191DA2
3,511,013 UART: [art] SIG.S = 60ED96F0268AD550FF55E0D17D147E480597F3510C4DE2CB3FFA6C9BA3E9C9251D10A8C160DC52DA2A90FAFAADCF9325
3,534,562 UART: Caliptra RT
3,534,907 UART: [state] CFI Enabled
3,642,597 UART: [rt] RT listening for mailbox commands...
3,643,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,311 UART: [rt]cmd =0x41544d4e, len=14344
4,410,623 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,179 UART:
192,520 UART: Running Caliptra ROM ...
193,701 UART:
193,862 UART: [state] CFI Enabled
263,016 UART: [state] LifecycleState = Unprovisioned
264,970 UART: [state] DebugLocked = No
267,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,730 UART: [kat] SHA2-256
441,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,930 UART: [kat] ++
452,417 UART: [kat] sha1
463,435 UART: [kat] SHA2-256
466,095 UART: [kat] SHA2-384
472,299 UART: [kat] SHA2-512-ACC
474,666 UART: [kat] ECC-384
2,765,834 UART: [kat] HMAC-384Kdf
2,778,848 UART: [kat] LMS
3,969,130 UART: [kat] --
3,974,129 UART: [cold-reset] ++
3,975,562 UART: [fht] Storing FHT @ 0x50003400
3,987,391 UART: [idev] ++
3,987,983 UART: [idev] CDI.KEYID = 6
3,988,895 UART: [idev] SUBJECT.KEYID = 7
3,990,138 UART: [idev] UDS.KEYID = 0
3,991,193 ready_for_fw is high
3,991,394 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,970 UART: [idev] Erasing UDS.KEYID = 0
7,321,380 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,748 UART: [idev] --
7,349,608 UART: [ldev] ++
7,350,229 UART: [ldev] CDI.KEYID = 6
7,351,144 UART: [ldev] SUBJECT.KEYID = 5
7,352,355 UART: [ldev] AUTHORITY.KEYID = 7
7,353,633 UART: [ldev] FE.KEYID = 1
7,380,111 UART: [ldev] Erasing FE.KEYID = 1
10,714,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,557 UART: [ldev] --
13,093,071 UART: [fwproc] Waiting for Commands...
13,095,087 UART: [fwproc] Received command 0x46574c44
13,097,276 UART: [fwproc] Received Image of size 114124 bytes
21,805,657 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,883,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,952,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,270,738 >>> mbox cmd response: success
22,275,494 UART: [afmc] ++
22,276,095 UART: [afmc] CDI.KEYID = 6
22,277,011 UART: [afmc] SUBJECT.KEYID = 7
22,278,281 UART: [afmc] AUTHORITY.KEYID = 5
25,634,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,935,823 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,938,074 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,952,623 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,967,382 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,981,586 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,002,963 UART: [afmc] --
28,006,395 UART: [cold-reset] --
28,009,133 UART: [state] Locking Datavault
28,015,089 UART: [state] Locking PCR0, PCR1 and PCR31
28,016,790 UART: [state] Locking ICCM
28,018,757 UART: [exit] Launching FMC @ 0x40000130
28,027,153 UART:
28,027,390 UART: Running Caliptra FMC ...
28,028,419 UART:
28,028,569 UART: [state] CFI Enabled
28,096,347 UART: [fht] FMC Alias Private Key: 7
30,434,180 UART: [art] Extend RT PCRs Done
30,435,430 UART: [art] Lock RT PCRs Done
30,437,451 UART: [art] Populate DV Done
30,442,982 UART: [fht] FMC Alias Private Key: 7
30,444,631 UART: [art] Derive CDI
30,445,448 UART: [art] Store in in slot 0x4
30,504,715 UART: [art] Derive Key Pair
30,505,760 UART: [art] Store priv key in slot 0x5
33,798,816 UART: [art] Derive Key Pair - Done
33,811,979 UART: [art] Signing Cert with AUTHO
33,813,287 UART: RITY.KEYID = 7
36,093,430 UART: [art] Erasing AUTHORITY.KEYID = 7
36,094,952 UART: [art] PUB.X = 83A920A7521E4F4D12A781A30F1DC9F5C865B56CF2450975545C2760D0CB36EEB16101F876B7ED8A8CE8B2992481983B
36,102,161 UART: [art] PUB.Y = B6C5C082C8CFCDF68527D7C8D953DE2D1A717567848D405113D3E2A2CD359D359A32B380644B13EDB926B46602A7BA19
36,109,397 UART: [art] SIG.R = 38D65C44D261BBB8E8E05CAF209FC19A24E55A91266CF0F760B5D7ACEE4D84FAE3011D32ED56AAE2493D2B97C34D340A
36,116,804 UART: [art] SIG.S = 5FFF1EB553C1B106FF0E2C522828F887329BEDF3C65B20ECAF94F0555C98173DB9B519D24B3C25B377CAF5E9277E73DC
37,421,711 UART: Caliptra RT
37,422,401 UART: [state] CFI Enabled
37,584,093 UART: [rt] RT listening for mailbox commands...
37,586,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,741,666 UART: [rt]cmd =0x41544d4e, len=14344
43,224,441 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,782,560 ready_for_fw is high
3,782,943 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,980,838 >>> mbox cmd response: success
27,684,237 UART:
27,684,609 UART: Running Caliptra FMC ...
27,685,714 UART:
27,685,876 UART: [state] CFI Enabled
27,753,107 UART: [fht] FMC Alias Private Key: 7
30,091,474 UART: [art] Extend RT PCRs Done
30,092,702 UART: [art] Lock RT PCRs Done
30,094,555 UART: [art] Populate DV Done
30,099,762 UART: [fht] FMC Alias Private Key: 7
30,101,472 UART: [art] Derive CDI
30,102,289 UART: [art] Store in in slot 0x4
30,161,764 UART: [art] Derive Key Pair
30,162,798 UART: [art] Store priv key in slot 0x5
33,455,756 UART: [art] Derive Key Pair - Done
33,468,810 UART: [art] Signing Cert with AUTHO
33,470,124 UART: RITY.KEYID = 7
35,757,316 UART: [art] Erasing AUTHORITY.KEYID = 7
35,758,825 UART: [art] PUB.X = 627EF405355C8CB3759BE3BE63D061C7185FB4E477AD85329646CFCEF08DD036C96107B89A6421CFD04A7A08641EEB60
35,766,130 UART: [art] PUB.Y = 3CC05503B1C8A423245DB76B0289695B5D3D4CDD613E79D6CA8FD646C965070092F30A694979EDB02A72DB2E88FC8363
35,773,294 UART: [art] SIG.R = E335569438C5E61F626D7D5BBB5F10BA7FAAF8DB21201E27F5989896CDF026512E2927D76E747AE8DABC41B990F45BE4
35,780,692 UART: [art] SIG.S = D458BCDEA046882A059EBFA1462BFF4E2FFCCFF34A2D2C2F52983D8664B9EDADB755296C98AFA062A575FBA108B2F4CD
37,085,664 UART: Caliptra RT
37,086,366 UART: [state] CFI Enabled
37,247,366 UART: [rt] RT listening for mailbox commands...
37,249,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,404,983 UART: [rt]cmd =0x41544d4e, len=14344
42,913,837 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,461 UART:
192,824 UART: Running Caliptra ROM ...
193,921 UART:
603,623 UART: [state] CFI Enabled
619,058 UART: [state] LifecycleState = Unprovisioned
620,943 UART: [state] DebugLocked = No
623,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,807 UART: [kat] SHA2-256
798,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,125 UART: [kat] ++
809,599 UART: [kat] sha1
820,748 UART: [kat] SHA2-256
823,461 UART: [kat] SHA2-384
829,322 UART: [kat] SHA2-512-ACC
831,641 UART: [kat] ECC-384
3,114,576 UART: [kat] HMAC-384Kdf
3,125,459 UART: [kat] LMS
4,315,528 UART: [kat] --
4,321,348 UART: [cold-reset] ++
4,323,714 UART: [fht] Storing FHT @ 0x50003400
4,333,911 UART: [idev] ++
4,334,473 UART: [idev] CDI.KEYID = 6
4,335,447 UART: [idev] SUBJECT.KEYID = 7
4,336,684 UART: [idev] UDS.KEYID = 0
4,337,708 ready_for_fw is high
4,337,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,329 UART: [idev] Erasing UDS.KEYID = 0
7,625,665 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,982 UART: [idev] --
7,652,232 UART: [ldev] ++
7,652,853 UART: [ldev] CDI.KEYID = 6
7,653,759 UART: [ldev] SUBJECT.KEYID = 5
7,655,019 UART: [ldev] AUTHORITY.KEYID = 7
7,656,194 UART: [ldev] FE.KEYID = 1
7,665,750 UART: [ldev] Erasing FE.KEYID = 1
10,950,383 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,962 UART: [ldev] --
13,315,964 UART: [fwproc] Waiting for Commands...
13,319,346 UART: [fwproc] Received command 0x46574c44
13,321,521 UART: [fwproc] Received Image of size 114124 bytes
22,430,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,514,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,583,249 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,900,532 >>> mbox cmd response: success
22,904,195 UART: [afmc] ++
22,904,983 UART: [afmc] CDI.KEYID = 6
22,905,900 UART: [afmc] SUBJECT.KEYID = 7
22,907,003 UART: [afmc] AUTHORITY.KEYID = 5
26,219,851 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,514,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,516,481 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,531,034 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,545,800 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,560,039 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,582,231 UART: [afmc] --
28,586,855 UART: [cold-reset] --
28,590,861 UART: [state] Locking Datavault
28,595,389 UART: [state] Locking PCR0, PCR1 and PCR31
28,597,096 UART: [state] Locking ICCM
28,599,659 UART: [exit] Launching FMC @ 0x40000130
28,608,047 UART:
28,608,278 UART: Running Caliptra FMC ...
28,609,300 UART:
28,609,439 UART: [state] CFI Enabled
28,617,827 UART: [fht] FMC Alias Private Key: 7
30,948,562 UART: [art] Extend RT PCRs Done
30,949,786 UART: [art] Lock RT PCRs Done
30,951,654 UART: [art] Populate DV Done
30,956,737 UART: [fht] FMC Alias Private Key: 7
30,958,322 UART: [art] Derive CDI
30,959,046 UART: [art] Store in in slot 0x4
31,001,704 UART: [art] Derive Key Pair
31,002,746 UART: [art] Store priv key in slot 0x5
34,244,675 UART: [art] Derive Key Pair - Done
34,257,647 UART: [art] Signing Cert with AUTHO
34,258,955 UART: RITY.KEYID = 7
36,538,295 UART: [art] Erasing AUTHORITY.KEYID = 7
36,539,812 UART: [art] PUB.X = B22F2BDAD11B947BFB8EDD0447B5EE9B6ED7F7AA7DAC8F4D61CBD5A215FCF3B6183257CD4269F8E57B8999DAE41D5C61
36,547,070 UART: [art] PUB.Y = 6D49B27676C00179EBAC2F57E3CDD607B7561B1F6E29258791BDC7E90BD13E669B310ADB2D9263E205E2D8214A597F14
36,554,288 UART: [art] SIG.R = 247A1B0092CD7C3C5101EAD9D10D5F7F342B373DC501285FAABF73B6912A1A376ED72B61E6D468587634174E438F2EB3
36,561,677 UART: [art] SIG.S = 64627E14140671DBBC12CFA6936470E91BF4B0298451313E59C92B3AACCD648B24956F5429B1149A185AA7DEEAE83E78
37,867,050 UART: Caliptra RT
37,867,743 UART: [state] CFI Enabled
37,984,699 UART: [rt] RT listening for mailbox commands...
37,987,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,142,527 UART: [rt]cmd =0x41544d4e, len=14344
43,626,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,125,771 ready_for_fw is high
4,126,442 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,596,353 >>> mbox cmd response: success
28,240,423 UART:
28,240,826 UART: Running Caliptra FMC ...
28,241,967 UART:
28,242,125 UART: [state] CFI Enabled
28,249,699 UART: [fht] FMC Alias Private Key: 7
30,579,828 UART: [art] Extend RT PCRs Done
30,581,047 UART: [art] Lock RT PCRs Done
30,582,790 UART: [art] Populate DV Done
30,588,522 UART: [fht] FMC Alias Private Key: 7
30,590,218 UART: [art] Derive CDI
30,591,027 UART: [art] Store in in slot 0x4
30,633,789 UART: [art] Derive Key Pair
30,634,828 UART: [art] Store priv key in slot 0x5
33,876,674 UART: [art] Derive Key Pair - Done
33,889,461 UART: [art] Signing Cert with AUTHO
33,890,794 UART: RITY.KEYID = 7
36,170,299 UART: [art] Erasing AUTHORITY.KEYID = 7
36,171,807 UART: [art] PUB.X = 1F7DA56B9D9AAE5740374B68431AFC46B4A9ADCCD4CCA761C69AC5151F907B0FFC51BCE45C908BF1D10BC94E2EB01D2B
36,179,070 UART: [art] PUB.Y = 05205602251D282F11E9BDE5EFBEC34C849244F898AA0ECD2B73D7ED57B707D80989DFB21E57B8AD19B6DBA1BC08FBD0
36,186,374 UART: [art] SIG.R = 8FC765F22BDC2B45FD0843B005D9FB4583F4261DA00C6DC77EB310EAF8B09254A9A536AC00C8F718B95670AEC7B1D7C2
36,193,729 UART: [art] SIG.S = 7CA25920A237B3C332FA4E57FF315C60F01F285CE574779E616E96E32328E8645C3EC4761FE3AF7A20AEA751D2FE2EBB
37,498,925 UART: Caliptra RT
37,499,643 UART: [state] CFI Enabled
37,617,304 UART: [rt] RT listening for mailbox commands...
37,619,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,774,717 UART: [rt]cmd =0x41544d4e, len=14344
43,128,457 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,230 UART:
192,594 UART: Running Caliptra ROM ...
193,825 UART:
193,979 UART: [state] CFI Enabled
262,586 UART: [state] LifecycleState = Unprovisioned
264,437 UART: [state] DebugLocked = No
265,636 UART: [state] WD Timer not started. Device not locked for debugging
269,468 UART: [kat] SHA2-256
448,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,149 UART: [kat] ++
460,680 UART: [kat] sha1
472,694 UART: [kat] SHA2-256
475,763 UART: [kat] SHA2-384
482,260 UART: [kat] SHA2-512-ACC
485,211 UART: [kat] ECC-384
2,946,717 UART: [kat] HMAC-384Kdf
2,971,252 UART: [kat] LMS
3,500,713 UART: [kat] --
3,503,877 UART: [cold-reset] ++
3,504,817 UART: [fht] FHT @ 0x50003400
3,516,010 UART: [idev] ++
3,516,791 UART: [idev] CDI.KEYID = 6
3,517,730 UART: [idev] SUBJECT.KEYID = 7
3,518,838 UART: [idev] UDS.KEYID = 0
3,519,745 ready_for_fw is high
3,519,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,744 UART: [idev] Erasing UDS.KEYID = 0
6,026,309 UART: [idev] Sha1 KeyId Algorithm
6,049,055 UART: [idev] --
6,052,466 UART: [ldev] ++
6,053,039 UART: [ldev] CDI.KEYID = 6
6,053,958 UART: [ldev] SUBJECT.KEYID = 5
6,055,122 UART: [ldev] AUTHORITY.KEYID = 7
6,056,414 UART: [ldev] FE.KEYID = 1
6,100,218 UART: [ldev] Erasing FE.KEYID = 1
8,600,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,568 UART: [ldev] --
10,392,288 UART: [fwproc] Wait for Commands...
10,395,243 UART: [fwproc] Recv command 0x46574c44
10,397,388 UART: [fwproc] Recv'd Img size: 114448 bytes
14,977,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,058,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,127,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,446,386 >>> mbox cmd response: success
15,451,034 UART: [afmc] ++
15,451,637 UART: [afmc] CDI.KEYID = 6
15,452,527 UART: [afmc] SUBJECT.KEYID = 7
15,453,747 UART: [afmc] AUTHORITY.KEYID = 5
17,982,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,719,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,721,814 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,737,758 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,753,734 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,769,528 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,793,379 UART: [afmc] --
19,797,895 UART: [cold-reset] --
19,800,404 UART: [state] Locking Datavault
19,806,031 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,731 UART: [state] Locking ICCM
19,809,882 UART: [exit] Launching FMC @ 0x40000130
19,818,273 UART:
19,818,506 UART: Running Caliptra FMC ...
19,819,605 UART:
19,819,771 UART: [state] CFI Enabled
19,878,353 UART: [fht] FMC Alias Private Key: 7
21,641,670 UART: [art] Extend RT PCRs Done
21,642,927 UART: [art] Lock RT PCRs Done
21,644,530 UART: [art] Populate DV Done
21,650,047 UART: [fht] FMC Alias Private Key: 7
21,651,530 UART: [art] Derive CDI
21,652,295 UART: [art] Store in in slot 0x4
21,711,556 UART: [art] Derive Key Pair
21,712,593 UART: [art] Store priv key in slot 0x5
24,175,188 UART: [art] Derive Key Pair - Done
24,188,180 UART: [art] Signing Cert with AUTHO
24,189,478 UART: RITY.KEYID = 7
25,901,481 UART: [art] Erasing AUTHORITY.KEYID = 7
25,902,982 UART: [art] PUB.X = 17BBC9EF40372018A5D6367EE974158B60EC07F812CD67FEA6336E7E308E46CF326606E0CE9E2E18854ACF704F7E12AC
25,910,222 UART: [art] PUB.Y = 36DCFC85E2836E53831A95397F54CDB34AADCA8981AC5D87ADD382ED9DF6B57F934EB1A106D025D227506C72F441401D
25,917,488 UART: [art] SIG.R = 559E69310D89B6DFDA20AA35AC15AE493B2055417220D1F75994C9F4F804B65BE7863E6BD02F2BB03862445BF1182D8E
25,924,888 UART: [art] SIG.S = E300E7093AEA5BD77CD1548744677D85A5B880B100C4B1E3E1EE8776CBABF2370E6F8E90535EEA3FF2A46F7254A9E13E
26,903,744 UART: Caliptra RT
26,904,471 UART: [state] CFI Enabled
27,069,546 UART: [rt] RT listening for mailbox commands...
27,071,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,227,715 UART: [rt]cmd =0x41544d4e, len=14344
30,590,451 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,383,664 ready_for_fw is high
3,384,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,077,984 >>> mbox cmd response: success
19,367,069 UART:
19,367,472 UART: Running Caliptra FMC ...
19,368,602 UART:
19,368,764 UART: [state] CFI Enabled
19,432,535 UART: [fht] FMC Alias Private Key: 7
21,196,147 UART: [art] Extend RT PCRs Done
21,197,376 UART: [art] Lock RT PCRs Done
21,199,000 UART: [art] Populate DV Done
21,204,655 UART: [fht] FMC Alias Private Key: 7
21,206,242 UART: [art] Derive CDI
21,207,067 UART: [art] Store in in slot 0x4
21,265,301 UART: [art] Derive Key Pair
21,266,298 UART: [art] Store priv key in slot 0x5
23,729,026 UART: [art] Derive Key Pair - Done
23,741,881 UART: [art] Signing Cert with AUTHO
23,743,190 UART: RITY.KEYID = 7
25,455,243 UART: [art] Erasing AUTHORITY.KEYID = 7
25,456,752 UART: [art] PUB.X = 65052FA330A7A51FAE22339CE253C542F7AC06A5418D3C468C540E9B7AFD84E102A17BE3F618AD52A83294948AE2B02F
25,464,018 UART: [art] PUB.Y = 6903817852C2687A8BE98FE71FCBE5FA4525B74DA823727183FA7EA161C716CC3267B3234673EC7AE87AA7B93E300004
25,471,291 UART: [art] SIG.R = 9D94EBEE13565CACDEBA4103B20D88DA49506DB45F7A2B8B8364096821697CE614EC9623DDF9FF75665D99125795CCFB
25,478,638 UART: [art] SIG.S = 1A4C9D5DFA7ECDFBA4A8FC997E198D03E27DA8DF07592F02F663F3DC4C45B03DC179BCF465FC480742BFA24F8D6EDC81
26,457,999 UART: Caliptra RT
26,458,701 UART: [state] CFI Enabled
26,621,715 UART: [rt] RT listening for mailbox commands...
26,624,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,779,928 UART: [rt]cmd =0x41544d4e, len=14344
30,129,589 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,216 UART:
192,573 UART: Running Caliptra ROM ...
193,777 UART:
603,216 UART: [state] CFI Enabled
616,243 UART: [state] LifecycleState = Unprovisioned
618,113 UART: [state] DebugLocked = No
620,196 UART: [state] WD Timer not started. Device not locked for debugging
624,288 UART: [kat] SHA2-256
803,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,942 UART: [kat] ++
815,467 UART: [kat] sha1
825,439 UART: [kat] SHA2-256
828,445 UART: [kat] SHA2-384
833,789 UART: [kat] SHA2-512-ACC
836,718 UART: [kat] ECC-384
3,281,883 UART: [kat] HMAC-384Kdf
3,293,320 UART: [kat] LMS
3,822,839 UART: [kat] --
3,827,345 UART: [cold-reset] ++
3,829,482 UART: [fht] FHT @ 0x50003400
3,840,467 UART: [idev] ++
3,841,072 UART: [idev] CDI.KEYID = 6
3,842,001 UART: [idev] SUBJECT.KEYID = 7
3,843,175 UART: [idev] UDS.KEYID = 0
3,844,096 ready_for_fw is high
3,844,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,927 UART: [idev] Erasing UDS.KEYID = 0
6,317,338 UART: [idev] Sha1 KeyId Algorithm
6,339,592 UART: [idev] --
6,343,639 UART: [ldev] ++
6,344,198 UART: [ldev] CDI.KEYID = 6
6,345,157 UART: [ldev] SUBJECT.KEYID = 5
6,346,311 UART: [ldev] AUTHORITY.KEYID = 7
6,347,587 UART: [ldev] FE.KEYID = 1
6,358,980 UART: [ldev] Erasing FE.KEYID = 1
8,836,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,740 UART: [ldev] --
10,627,589 UART: [fwproc] Wait for Commands...
10,629,888 UART: [fwproc] Recv command 0x46574c44
10,631,935 UART: [fwproc] Recv'd Img size: 114448 bytes
15,190,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,266,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,334,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,653,975 >>> mbox cmd response: success
15,657,416 UART: [afmc] ++
15,658,013 UART: [afmc] CDI.KEYID = 6
15,658,919 UART: [afmc] SUBJECT.KEYID = 7
15,660,070 UART: [afmc] AUTHORITY.KEYID = 5
18,161,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,885,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,887,063 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,903,037 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,918,995 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,934,784 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,957,590 UART: [afmc] --
19,961,467 UART: [cold-reset] --
19,966,242 UART: [state] Locking Datavault
19,971,323 UART: [state] Locking PCR0, PCR1 and PCR31
19,973,015 UART: [state] Locking ICCM
19,975,430 UART: [exit] Launching FMC @ 0x40000130
19,983,872 UART:
19,984,098 UART: Running Caliptra FMC ...
19,985,193 UART:
19,985,344 UART: [state] CFI Enabled
19,993,222 UART: [fht] FMC Alias Private Key: 7
21,750,015 UART: [art] Extend RT PCRs Done
21,751,241 UART: [art] Lock RT PCRs Done
21,752,855 UART: [art] Populate DV Done
21,758,592 UART: [fht] FMC Alias Private Key: 7
21,760,113 UART: [art] Derive CDI
21,760,877 UART: [art] Store in in slot 0x4
21,803,749 UART: [art] Derive Key Pair
21,804,748 UART: [art] Store priv key in slot 0x5
24,231,509 UART: [art] Derive Key Pair - Done
24,244,390 UART: [art] Signing Cert with AUTHO
24,245,715 UART: RITY.KEYID = 7
25,951,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,952,698 UART: [art] PUB.X = ABA7CE9983C49E3F9A7E0F9E9E8D7FE9F7C928284E6A10C3C4E46861D15BAD6D93336F708C7487DEAA1CFAA9C3B18BF6
25,959,976 UART: [art] PUB.Y = E54B4ACA7EB1D90825F9045F8C4823051EAB63F3B200543F224F8495A31929FFE7C4B1754B7377427B0BF6E80EE77C81
25,967,246 UART: [art] SIG.R = 565B0B1CE4D7A53FB019C00558CDC22B86447709F5DCB1FF00DEF5DE0A21168C802D3C14296D00064604DE053D40662D
25,974,560 UART: [art] SIG.S = FE0BD721A7B585A537D13CDA486B8F14EDB15C00B1DAA04F8BADBC14797F2DD14293F43C946D4F536C5D94BCBF058934
26,953,292 UART: Caliptra RT
26,953,981 UART: [state] CFI Enabled
27,071,868 UART: [rt] RT listening for mailbox commands...
27,074,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,419 UART: [rt]cmd =0x41544d4e, len=14344
30,593,291 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,702,654 ready_for_fw is high
3,703,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,273,242 >>> mbox cmd response: success
19,522,379 UART:
19,522,754 UART: Running Caliptra FMC ...
19,523,838 UART:
19,523,987 UART: [state] CFI Enabled
19,532,279 UART: [fht] FMC Alias Private Key: 7
21,289,022 UART: [art] Extend RT PCRs Done
21,290,230 UART: [art] Lock RT PCRs Done
21,291,746 UART: [art] Populate DV Done
21,297,005 UART: [fht] FMC Alias Private Key: 7
21,298,665 UART: [art] Derive CDI
21,299,398 UART: [art] Store in in slot 0x4
21,342,206 UART: [art] Derive Key Pair
21,343,201 UART: [art] Store priv key in slot 0x5
23,770,369 UART: [art] Derive Key Pair - Done
23,783,405 UART: [art] Signing Cert with AUTHO
23,784,712 UART: RITY.KEYID = 7
25,489,868 UART: [art] Erasing AUTHORITY.KEYID = 7
25,491,352 UART: [art] PUB.X = 4F4AA7CAEB36B62178EA1CDABC25A5BF9237715D41D9BC526FE634EE513BDB06A32E664E4876FE4F9C03CCEB2834B616
25,498,690 UART: [art] PUB.Y = 3D2590395859ED9487FFB9410DD9CF070DBEFD244016E3B0D5EC6329B352F7ED1B71CCACA6191848C2504787CF9AEE02
25,505,908 UART: [art] SIG.R = 60C9E5A414DA574DFB5CDD38D5DDE92419A450064EA78091230538BE810D287DCB9EA15307F010C3D58B4E736EFA350F
25,513,313 UART: [art] SIG.S = 6E0A05837EF73EEEC437B0574E2A36E0E14ADE0BE3E0829D58C5E431AD3B007CC8762CAD63179A5DCC0C5B1CEB7060D6
26,492,430 UART: Caliptra RT
26,493,145 UART: [state] CFI Enabled
26,609,181 UART: [rt] RT listening for mailbox commands...
26,611,512 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,766,777 UART: [rt]cmd =0x41544d4e, len=14344
30,127,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,125 UART:
192,497 UART: Running Caliptra ROM ...
193,688 UART:
193,847 UART: [state] CFI Enabled
266,831 UART: [state] LifecycleState = Unprovisioned
269,190 UART: [state] DebugLocked = No
271,500 UART: [state] WD Timer not started. Device not locked for debugging
276,005 UART: [kat] SHA2-256
465,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,593 UART: [kat] ++
477,043 UART: [kat] sha1
488,133 UART: [kat] SHA2-256
491,143 UART: [kat] SHA2-384
496,917 UART: [kat] SHA2-512-ACC
499,517 UART: [kat] ECC-384
2,950,522 UART: [kat] HMAC-384Kdf
2,972,133 UART: [kat] LMS
3,503,844 UART: [kat] --
3,510,551 UART: [cold-reset] ++
3,512,348 UART: [fht] FHT @ 0x50003400
3,524,462 UART: [idev] ++
3,525,168 UART: [idev] CDI.KEYID = 6
3,526,151 UART: [idev] SUBJECT.KEYID = 7
3,527,327 UART: [idev] UDS.KEYID = 0
3,528,252 ready_for_fw is high
3,528,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,408 UART: [idev] Erasing UDS.KEYID = 0
6,031,113 UART: [idev] Sha1 KeyId Algorithm
6,053,594 UART: [idev] --
6,057,645 UART: [ldev] ++
6,058,343 UART: [ldev] CDI.KEYID = 6
6,059,261 UART: [ldev] SUBJECT.KEYID = 5
6,060,419 UART: [ldev] AUTHORITY.KEYID = 7
6,061,653 UART: [ldev] FE.KEYID = 1
6,100,926 UART: [ldev] Erasing FE.KEYID = 1
8,605,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,257 UART: [ldev] --
10,418,013 UART: [fwproc] Wait for Commands...
10,420,811 UART: [fwproc] Recv command 0x46574c44
10,423,120 UART: [fwproc] Recv'd Img size: 114448 bytes
15,062,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,146,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,263,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,805,507 >>> mbox cmd response: success
15,809,983 UART: [afmc] ++
15,810,693 UART: [afmc] CDI.KEYID = 6
15,811,946 UART: [afmc] SUBJECT.KEYID = 7
15,813,396 UART: [afmc] AUTHORITY.KEYID = 5
18,353,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,095,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,096,962 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,112,053 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,127,242 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,142,076 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,165,274 UART: [afmc] --
20,168,927 UART: [cold-reset] --
20,172,628 UART: [state] Locking Datavault
20,180,418 UART: [state] Locking PCR0, PCR1 and PCR31
20,182,640 UART: [state] Locking ICCM
20,184,738 UART: [exit] Launching FMC @ 0x40000130
20,193,369 UART:
20,193,648 UART: Running Caliptra FMC ...
20,194,755 UART:
20,194,912 UART: [state] CFI Enabled
20,251,107 UART: [fht] FMC Alias Private Key: 7
22,015,080 UART: [art] Extend RT PCRs Done
22,016,297 UART: [art] Lock RT PCRs Done
22,018,302 UART: [art] Populate DV Done
22,023,662 UART: [fht] FMC Alias Private Key: 7
22,025,364 UART: [art] Derive CDI
22,026,183 UART: [art] Store in in slot 0x4
22,083,838 UART: [art] Derive Key Pair
22,084,889 UART: [art] Store priv key in slot 0x5
24,548,288 UART: [art] Derive Key Pair - Done
24,561,134 UART: [art] Signing Cert with AUTHO
24,562,436 UART: RITY.KEYID = 7
26,273,677 UART: [art] Erasing AUTHORITY.KEYID = 7
26,275,188 UART: [art] PUB.X = 00A3B5CF8A2FAC6B7FF331A28A030973C4F221EF5621462C20A4D43ABCBA3E6F53DD06A8D456E4908795F2F6F7646CF5
26,282,428 UART: [art] PUB.Y = EA9334F49885B603AF66D6F6B737C4F3D9D0CA0608ECFE68E2B84FDE094D46711460A61C5A1CEC8280F7721A6BCB43E0
26,289,704 UART: [art] SIG.R = BB3242F75B8D62191BB83E4408EB8216318AA64DCE598D9EF840AF6FCF18B33E56B130F097070C43AA67355B234AF1DA
26,297,087 UART: [art] SIG.S = 520A6F5317DE2FE0B51A01A7B845D808437067B361761924B201025857009F60FCFB15606CD890E3C4FA3D2918ADBF42
27,276,051 UART: Caliptra RT
27,276,761 UART: [state] CFI Enabled
27,441,244 UART: [rt] RT listening for mailbox commands...
27,443,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,599,621 UART: [rt]cmd =0x41544d4e, len=14344
30,951,125 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,416,955 ready_for_fw is high
3,417,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,806,059 >>> mbox cmd response: success
20,111,147 UART:
20,111,571 UART: Running Caliptra FMC ...
20,112,717 UART:
20,112,902 UART: [state] CFI Enabled
20,179,410 UART: [fht] FMC Alias Private Key: 7
21,944,197 UART: [art] Extend RT PCRs Done
21,945,418 UART: [art] Lock RT PCRs Done
21,947,096 UART: [art] Populate DV Done
21,952,515 UART: [fht] FMC Alias Private Key: 7
21,954,068 UART: [art] Derive CDI
21,954,892 UART: [art] Store in in slot 0x4
22,012,699 UART: [art] Derive Key Pair
22,013,743 UART: [art] Store priv key in slot 0x5
24,476,284 UART: [art] Derive Key Pair - Done
24,489,065 UART: [art] Signing Cert with AUTHO
24,490,374 UART: RITY.KEYID = 7
26,202,510 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,013 UART: [art] PUB.X = 89AF6629D8C4217B6DB98EF57F656306D1DA2FA4CA0A5C1AF09396A0082796EA9C9A887EA4E98B72B8F2B19B1ECA4366
26,211,326 UART: [art] PUB.Y = E94FBFCFCE2DF99AD8DC40205522AE8B0AD66CC642EDC27724B632B81F4366DB5E6A2195578B29D6C31E2A896EA245EA
26,218,565 UART: [art] SIG.R = 6595299514D8C7E232DB5E45F4913BA6E6700D9D0FE72E7B54E32DB6F44F5D2F686BB7CE0BBA217E1D2BFA4EDA92D51A
26,226,008 UART: [art] SIG.S = 35418B519567A9CA3BACAAAAF21DFA8DF366415CB9F6602C23D9F980BA6DEBEC64CDB005211C89BFB5A0C01C524797C4
27,205,387 UART: Caliptra RT
27,206,078 UART: [state] CFI Enabled
27,370,385 UART: [rt] RT listening for mailbox commands...
27,372,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,746 UART: [rt]cmd =0x41544d4e, len=14344
30,891,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,034 writing to cptra_bootfsm_go
193,191 UART:
193,548 UART: Running Caliptra ROM ...
194,741 UART:
604,185 UART: [state] CFI Enabled
617,210 UART: [state] LifecycleState = Unprovisioned
619,574 UART: [state] DebugLocked = No
622,007 UART: [state] WD Timer not started. Device not locked for debugging
625,810 UART: [kat] SHA2-256
815,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,524 UART: [kat] ++
826,968 UART: [kat] sha1
838,612 UART: [kat] SHA2-256
841,603 UART: [kat] SHA2-384
848,010 UART: [kat] SHA2-512-ACC
850,654 UART: [kat] ECC-384
3,292,503 UART: [kat] HMAC-384Kdf
3,304,893 UART: [kat] LMS
3,836,720 UART: [kat] --
3,840,092 UART: [cold-reset] ++
3,842,667 UART: [fht] FHT @ 0x50003400
3,854,403 UART: [idev] ++
3,855,119 UART: [idev] CDI.KEYID = 6
3,856,093 UART: [idev] SUBJECT.KEYID = 7
3,857,260 UART: [idev] UDS.KEYID = 0
3,858,176 ready_for_fw is high
3,858,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,933 UART: [idev] Erasing UDS.KEYID = 0
6,336,348 UART: [idev] Sha1 KeyId Algorithm
6,359,248 UART: [idev] --
6,365,071 UART: [ldev] ++
6,365,744 UART: [ldev] CDI.KEYID = 6
6,366,751 UART: [ldev] SUBJECT.KEYID = 5
6,367,868 UART: [ldev] AUTHORITY.KEYID = 7
6,369,095 UART: [ldev] FE.KEYID = 1
6,380,223 UART: [ldev] Erasing FE.KEYID = 1
8,859,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,265 UART: [ldev] --
10,652,617 UART: [fwproc] Wait for Commands...
10,655,251 UART: [fwproc] Recv command 0x46574c44
10,657,509 UART: [fwproc] Recv'd Img size: 114448 bytes
15,281,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,368,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,485,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,029,062 >>> mbox cmd response: success
16,033,515 UART: [afmc] ++
16,034,222 UART: [afmc] CDI.KEYID = 6
16,035,330 UART: [afmc] SUBJECT.KEYID = 7
16,036,873 UART: [afmc] AUTHORITY.KEYID = 5
18,545,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,266,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,268,626 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,283,704 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,298,896 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,313,708 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,338,491 UART: [afmc] --
20,342,685 UART: [cold-reset] --
20,346,119 UART: [state] Locking Datavault
20,353,700 UART: [state] Locking PCR0, PCR1 and PCR31
20,355,847 UART: [state] Locking ICCM
20,357,286 UART: [exit] Launching FMC @ 0x40000130
20,365,919 UART:
20,366,157 UART: Running Caliptra FMC ...
20,367,257 UART:
20,367,406 UART: [state] CFI Enabled
20,375,606 UART: [fht] FMC Alias Private Key: 7
22,132,872 UART: [art] Extend RT PCRs Done
22,134,071 UART: [art] Lock RT PCRs Done
22,135,719 UART: [art] Populate DV Done
22,141,174 UART: [fht] FMC Alias Private Key: 7
22,142,810 UART: [art] Derive CDI
22,143,539 UART: [art] Store in in slot 0x4
22,186,181 UART: [art] Derive Key Pair
22,187,213 UART: [art] Store priv key in slot 0x5
24,614,372 UART: [art] Derive Key Pair - Done
24,627,256 UART: [art] Signing Cert with AUTHO
24,628,559 UART: RITY.KEYID = 7
26,334,152 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,643 UART: [art] PUB.X = 71B4018FB248A6B04E76F6EF0BC9E119D8BF10ED72EEA83DB836B4ED0138368306189CBA364664D082DF580915F2C879
26,342,926 UART: [art] PUB.Y = 29935893F1BD9FAA3903B48C8FAA0898D7109521631BFD43BDDA7C7AF19DF19E015BE8CA9CA37F3C548288A45E38E82C
26,350,188 UART: [art] SIG.R = 9C78C7746AA6B82980F79CE1E040258829745A9252A5A85FFFAF6300725C50A28AA5FBB404BD9EDBEA19868F7D86D5F0
26,357,557 UART: [art] SIG.S = DEF5B9805AAEF5085795A13A42776191A38DFF1F321C314F6BE4445BC575EED6E40149218F69CFBBFC2D2B8CE0DB8DB0
27,336,401 UART: Caliptra RT
27,337,107 UART: [state] CFI Enabled
27,454,943 UART: [rt] RT listening for mailbox commands...
27,457,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,612,629 UART: [rt]cmd =0x41544d4e, len=14344
30,971,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,753,198 ready_for_fw is high
3,753,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,056,452 >>> mbox cmd response: success
20,309,871 UART:
20,310,321 UART: Running Caliptra FMC ...
20,311,438 UART:
20,311,583 UART: [state] CFI Enabled
20,319,561 UART: [fht] FMC Alias Private Key: 7
22,076,421 UART: [art] Extend RT PCRs Done
22,077,671 UART: [art] Lock RT PCRs Done
22,079,268 UART: [art] Populate DV Done
22,084,565 UART: [fht] FMC Alias Private Key: 7
22,086,107 UART: [art] Derive CDI
22,086,917 UART: [art] Store in in slot 0x4
22,129,337 UART: [art] Derive Key Pair
22,130,332 UART: [art] Store priv key in slot 0x5
24,557,500 UART: [art] Derive Key Pair - Done
24,570,659 UART: [art] Signing Cert with AUTHO
24,571,961 UART: RITY.KEYID = 7
26,277,686 UART: [art] Erasing AUTHORITY.KEYID = 7
26,279,190 UART: [art] PUB.X = C20F095EF48F660C668F109EDD207C2F4FA200F1C4015E2430E1BA465C3AD6AD898E10FAE81F0824574E3FEAB97F3346
26,286,420 UART: [art] PUB.Y = 1EF0612124C5CD9AD660B88DB25E9307138B0F34F94683A306156FDB5E90C33DC214D836CF6F5609735F9D376481762E
26,293,651 UART: [art] SIG.R = 5FA38180E82F322F655652F747D6A875395476C276AB97A55B98B4AE4B9C471DF98B69FBE5C75DD1979C669732794344
26,301,029 UART: [art] SIG.S = 024CC6CE4143021B11DE3AD287CDC04F8EAF533D4A52B08070659EF25395C9030B0ADFF5CEEC09DB0605155E629C6DA9
27,279,704 UART: Caliptra RT
27,280,410 UART: [state] CFI Enabled
27,397,210 UART: [rt] RT listening for mailbox commands...
27,399,528 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,729 UART: [rt]cmd =0x41544d4e, len=14344
30,917,079 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,717 UART: [kat] SHA2-256
892,655 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,453 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 ready_for_fw is high
1,480,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,504,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,076 UART: [idev] --
1,513,969 UART: [ldev] ++
1,514,137 UART: [ldev] CDI.KEYID = 6
1,514,500 UART: [ldev] SUBJECT.KEYID = 5
1,514,926 UART: [ldev] AUTHORITY.KEYID = 7
1,515,389 UART: [ldev] FE.KEYID = 1
1,520,539 UART: [ldev] Erasing FE.KEYID = 1
1,545,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,450 UART: [ldev] --
1,584,883 UART: [fwproc] Waiting for Commands...
1,585,506 UART: [fwproc] Received command 0x46574c44
1,586,297 UART: [fwproc] Received Image of size 114448 bytes
5,196,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,253,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,389,922 >>> mbox cmd response: success
5,391,046 UART: [afmc] ++
5,391,214 UART: [afmc] CDI.KEYID = 6
5,391,576 UART: [afmc] SUBJECT.KEYID = 7
5,392,001 UART: [afmc] AUTHORITY.KEYID = 5
5,426,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,442,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,443,739 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,449,448 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,455,340 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,041 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,468,889 UART: [afmc] --
5,469,893 UART: [cold-reset] --
5,470,651 UART: [state] Locking Datavault
5,471,956 UART: [state] Locking PCR0, PCR1 and PCR31
5,472,560 UART: [state] Locking ICCM
5,473,044 UART: [exit] Launching FMC @ 0x40000130
5,478,373 UART:
5,478,389 UART: Running Caliptra FMC ...
5,478,797 UART:
5,478,851 UART: [state] CFI Enabled
5,488,913 UART: [fht] FMC Alias Private Key: 7
5,596,543 UART: [art] Extend RT PCRs Done
5,596,971 UART: [art] Lock RT PCRs Done
5,598,895 UART: [art] Populate DV Done
5,606,891 UART: [fht] FMC Alias Private Key: 7
5,607,943 UART: [art] Derive CDI
5,608,223 UART: [art] Store in in slot 0x4
5,693,528 UART: [art] Derive Key Pair
5,693,888 UART: [art] Store priv key in slot 0x5
5,707,132 UART: [art] Derive Key Pair - Done
5,722,065 UART: [art] Signing Cert with AUTHO
5,722,545 UART: RITY.KEYID = 7
5,737,885 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,650 UART: [art] PUB.X = 81E8EF4DEB2FDE58380D7F0A14675E8638CB884AC0B5088182CD6801EC5CA7CCC5FB104777E9451ABDFA6B98F54D8857
5,745,422 UART: [art] PUB.Y = B673CFD2A7F892B2B7A1949883815D3E41E6600FD29DD56EA6C74B8491F420C9189222AD45CD26C2789A283FA4AFDB7B
5,752,377 UART: [art] SIG.R = 8E57A9779C734325E9BFB81AD13FBE8885911194339E0FD2A08546A2131F55EE11F35A3B4AD8533C906F43195F10A42F
5,759,142 UART: [art] SIG.S = 88C7B1E69076A958972ACCFBF1110BB71302F2DB720F3D63E8333BF59B2F4CFDA99475A71C83CBCE3D6BC3289552BC6C
5,783,036 UART: Caliptra RT
5,783,289 UART: [state] CFI Enabled
5,891,803 UART: [rt] RT listening for mailbox commands...
5,892,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,015,711 UART: [rt]cmd =0x41544d4e, len=14344
6,667,609 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,240,824 >>> mbox cmd response: success
5,301,863 UART:
5,301,879 UART: Running Caliptra FMC ...
5,302,287 UART:
5,302,341 UART: [state] CFI Enabled
5,312,843 UART: [fht] FMC Alias Private Key: 7
5,421,161 UART: [art] Extend RT PCRs Done
5,421,589 UART: [art] Lock RT PCRs Done
5,423,227 UART: [art] Populate DV Done
5,431,585 UART: [fht] FMC Alias Private Key: 7
5,432,691 UART: [art] Derive CDI
5,432,971 UART: [art] Store in in slot 0x4
5,518,802 UART: [art] Derive Key Pair
5,519,162 UART: [art] Store priv key in slot 0x5
5,532,782 UART: [art] Derive Key Pair - Done
5,547,608 UART: [art] Signing Cert with AUTHO
5,548,088 UART: RITY.KEYID = 7
5,563,534 UART: [art] Erasing AUTHORITY.KEYID = 7
5,564,299 UART: [art] PUB.X = ABD7C067E03FC815C5A79CA6ED7BF96ACF32457D4D202D7F9D9EA06B8D98763A861A858F577CE14E6ECD3E36B3134450
5,571,083 UART: [art] PUB.Y = 30BCC337CCA8DD60A226D9E7FE83F62A396872B01D570E3042125D7C42EDC74962BAECE86C52E2436057459A1A72E3C8
5,578,036 UART: [art] SIG.R = 999E1ECD2828FD95F1AF4D6C426B67107A4D5765FA1A103FB761963241D6B3A46F8FB21FB0CBD090C8A2CB832D5F2A8A
5,584,820 UART: [art] SIG.S = 525F62936392B176B12F04E0EADCCF57AC93D18316872F2AAF58FA43A2505F97F8A087E5F8E74A49D7A7C8D2C2909442
5,608,508 UART: Caliptra RT
5,608,761 UART: [state] CFI Enabled
5,715,742 UART: [rt] RT listening for mailbox commands...
5,716,412 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,448 UART: [rt]cmd =0x41544d4e, len=14344
6,493,947 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,112 UART: [kat] SHA2-256
893,050 UART: [kat] SHA2-384
895,829 UART: [kat] SHA2-512-ACC
897,730 UART: [kat] ECC-384
903,471 UART: [kat] HMAC-384Kdf
907,977 UART: [kat] LMS
1,476,173 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,708 UART: [fht] Storing FHT @ 0x50003400
1,480,699 UART: [idev] ++
1,480,867 UART: [idev] CDI.KEYID = 6
1,481,227 UART: [idev] SUBJECT.KEYID = 7
1,481,651 UART: [idev] UDS.KEYID = 0
1,481,996 ready_for_fw is high
1,481,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,945 UART: [idev] Erasing UDS.KEYID = 0
1,506,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,435 UART: [idev] --
1,516,358 UART: [ldev] ++
1,516,526 UART: [ldev] CDI.KEYID = 6
1,516,889 UART: [ldev] SUBJECT.KEYID = 5
1,517,315 UART: [ldev] AUTHORITY.KEYID = 7
1,517,778 UART: [ldev] FE.KEYID = 1
1,523,056 UART: [ldev] Erasing FE.KEYID = 1
1,548,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,507 UART: [ldev] --
1,587,810 UART: [fwproc] Waiting for Commands...
1,588,467 UART: [fwproc] Received command 0x46574c44
1,589,258 UART: [fwproc] Received Image of size 114448 bytes
5,123,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,152,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,181,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,317,577 >>> mbox cmd response: success
5,318,747 UART: [afmc] ++
5,318,915 UART: [afmc] CDI.KEYID = 6
5,319,277 UART: [afmc] SUBJECT.KEYID = 7
5,319,702 UART: [afmc] AUTHORITY.KEYID = 5
5,355,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,371,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,371,960 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,377,669 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,383,561 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,389,262 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,397,134 UART: [afmc] --
5,398,104 UART: [cold-reset] --
5,398,774 UART: [state] Locking Datavault
5,399,681 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,285 UART: [state] Locking ICCM
5,400,705 UART: [exit] Launching FMC @ 0x40000130
5,406,034 UART:
5,406,050 UART: Running Caliptra FMC ...
5,406,458 UART:
5,406,601 UART: [state] CFI Enabled
5,416,939 UART: [fht] FMC Alias Private Key: 7
5,525,147 UART: [art] Extend RT PCRs Done
5,525,575 UART: [art] Lock RT PCRs Done
5,527,073 UART: [art] Populate DV Done
5,535,467 UART: [fht] FMC Alias Private Key: 7
5,536,619 UART: [art] Derive CDI
5,536,899 UART: [art] Store in in slot 0x4
5,622,654 UART: [art] Derive Key Pair
5,623,014 UART: [art] Store priv key in slot 0x5
5,635,980 UART: [art] Derive Key Pair - Done
5,650,686 UART: [art] Signing Cert with AUTHO
5,651,166 UART: RITY.KEYID = 7
5,666,426 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,191 UART: [art] PUB.X = 6BA545692F0A4411C47FD8514F4B3F172C74F7B07D2EC2CECCC33F33F0F6C7EF0461E6C301213E919BBB177D6D966542
5,673,960 UART: [art] PUB.Y = 92E04E20CA20F12D8151587611F28A94D9731E47DA3BE8667C6034CB2D5681EF2D3E8E04AD0A8036C3646FC7ABAD0CA8
5,680,909 UART: [art] SIG.R = 335903112CB694B9CDA80302AEF07869AC4A7BDEFD33376191576908BE1BC988F40BE3BECD339367BDE3C6A25C9BBDCD
5,687,680 UART: [art] SIG.S = 6EEEB606BA30334F5E35AACCFBB494F2FFF61622C79506A3116CE4E0BC16AEBBAE5FE155454CE20AA28EDF3C061E6908
5,711,210 UART: Caliptra RT
5,711,555 UART: [state] CFI Enabled
5,818,879 UART: [rt] RT listening for mailbox commands...
5,819,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,942,225 UART: [rt]cmd =0x41544d4e, len=14344
6,591,422 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 ready_for_fw is high
1,363,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,241,289 >>> mbox cmd response: success
5,302,240 UART:
5,302,256 UART: Running Caliptra FMC ...
5,302,664 UART:
5,302,807 UART: [state] CFI Enabled
5,313,675 UART: [fht] FMC Alias Private Key: 7
5,421,755 UART: [art] Extend RT PCRs Done
5,422,183 UART: [art] Lock RT PCRs Done
5,423,665 UART: [art] Populate DV Done
5,431,817 UART: [fht] FMC Alias Private Key: 7
5,432,829 UART: [art] Derive CDI
5,433,109 UART: [art] Store in in slot 0x4
5,518,898 UART: [art] Derive Key Pair
5,519,258 UART: [art] Store priv key in slot 0x5
5,532,412 UART: [art] Derive Key Pair - Done
5,547,306 UART: [art] Signing Cert with AUTHO
5,547,786 UART: RITY.KEYID = 7
5,563,186 UART: [art] Erasing AUTHORITY.KEYID = 7
5,563,951 UART: [art] PUB.X = 6118E26AC26EBF6B4A978E14866FFC11FD9389C70C9E4E7E65E01DDE6A43F695CDCD9512466F853DB74FFABFCE6A3D49
5,570,738 UART: [art] PUB.Y = 72E4E4C0A6D68FB8A32D9E8A3C56260AE1FD2AD8736BDC57CC06CDC4B357FEC6D86AF85D1AD0B799DC7D64FFEBC55776
5,577,710 UART: [art] SIG.R = BF322B8AD1D73BA6F1873E96DFCD76D3930355B1AE2B012C131398034502AE9F0D3192105E2B469CD342EF5AB5F31FC7
5,584,473 UART: [art] SIG.S = C092029217429BE47A4B5BDF3AE130F823E3A65F4BE2823BDA58B3F370EDDA46088DCC86DF1A90E5DCBD4064686C9311
5,607,704 UART: Caliptra RT
5,608,049 UART: [state] CFI Enabled
5,715,355 UART: [rt] RT listening for mailbox commands...
5,716,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,109 UART: [rt]cmd =0x41544d4e, len=14344
6,481,195 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
893,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,207 UART: [kat] ++
897,359 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
917,676 UART: [kat] HMAC-384Kdf
922,278 UART: [kat] LMS
1,170,606 UART: [kat] --
1,171,549 UART: [cold-reset] ++
1,171,955 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 ready_for_fw is high
1,175,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,331 UART: [ldev] ++
1,210,499 UART: [ldev] CDI.KEYID = 6
1,210,862 UART: [ldev] SUBJECT.KEYID = 5
1,211,288 UART: [ldev] AUTHORITY.KEYID = 7
1,211,751 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,632 >>> mbox cmd response: success
3,325,724 UART: [afmc] ++
3,325,892 UART: [afmc] CDI.KEYID = 6
3,326,254 UART: [afmc] SUBJECT.KEYID = 7
3,326,679 UART: [afmc] AUTHORITY.KEYID = 5
3,361,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,474 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,183 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,075 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,786 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,565 UART: [afmc] --
3,404,675 UART: [cold-reset] --
3,405,561 UART: [state] Locking Datavault
3,406,690 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,294 UART: [state] Locking ICCM
3,407,768 UART: [exit] Launching FMC @ 0x40000130
3,413,097 UART:
3,413,113 UART: Running Caliptra FMC ...
3,413,521 UART:
3,413,575 UART: [state] CFI Enabled
3,423,953 UART: [fht] FMC Alias Private Key: 7
3,531,569 UART: [art] Extend RT PCRs Done
3,531,997 UART: [art] Lock RT PCRs Done
3,533,525 UART: [art] Populate DV Done
3,541,915 UART: [fht] FMC Alias Private Key: 7
3,543,095 UART: [art] Derive CDI
3,543,375 UART: [art] Store in in slot 0x4
3,629,234 UART: [art] Derive Key Pair
3,629,594 UART: [art] Store priv key in slot 0x5
3,642,360 UART: [art] Derive Key Pair - Done
3,657,286 UART: [art] Signing Cert with AUTHO
3,657,766 UART: RITY.KEYID = 7
3,672,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,439 UART: [art] PUB.X = 99454BA9CCFB8206A4E5DEFAAD845D11320223FC10CD6D44579E22C74010E27F7B2BAC1DAC357A9CEE19712E3BD52FA5
3,680,221 UART: [art] PUB.Y = B68BCB7B748EB3C552400FD1A8B0CB405F68B336513BEC1F3731D1EA6B16536B130922D1A0B3BD5A947F66F203E4D16A
3,687,172 UART: [art] SIG.R = F8D9CB7444E5D442A7161DF50341DB4DD5FEEE601567E80E0A50F6D5DCE4C0919302D8BACD7CB63B3CF514C781722DD5
3,693,946 UART: [art] SIG.S = 9082714AAF2030D999539927A6F5326A50D7F2CE26FE9570CC10A36B9B8FD630FA61B7A0396413B7660E68FCC2775439
3,717,348 UART: Caliptra RT
3,717,601 UART: [state] CFI Enabled
3,824,270 UART: [rt] RT listening for mailbox commands...
3,824,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,754 UART: [rt]cmd =0x41544d4e, len=14344
4,594,422 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 ready_for_fw is high
1,060,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,225 >>> mbox cmd response: success
3,223,692 UART:
3,223,708 UART: Running Caliptra FMC ...
3,224,116 UART:
3,224,170 UART: [state] CFI Enabled
3,234,638 UART: [fht] FMC Alias Private Key: 7
3,342,358 UART: [art] Extend RT PCRs Done
3,342,786 UART: [art] Lock RT PCRs Done
3,344,300 UART: [art] Populate DV Done
3,352,480 UART: [fht] FMC Alias Private Key: 7
3,353,490 UART: [art] Derive CDI
3,353,770 UART: [art] Store in in slot 0x4
3,439,367 UART: [art] Derive Key Pair
3,439,727 UART: [art] Store priv key in slot 0x5
3,453,457 UART: [art] Derive Key Pair - Done
3,467,973 UART: [art] Signing Cert with AUTHO
3,468,453 UART: RITY.KEYID = 7
3,483,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,244 UART: [art] PUB.X = 2262D7D1A10F73190ABB3B5E0545F0E89F84B70CC2C8734778CF69F9AA88856AFEE8AD291AC8B8574F1495A7217BADE9
3,491,012 UART: [art] PUB.Y = 7FA570530F1746ACC2DA76CAFFB8B285DDFFD9E0F94ED59AD07CE42F89C5AF0A4F12FD4018B6C032B4680A7E093AD2EB
3,497,976 UART: [art] SIG.R = AD350071F0B0B6FEBDFA569951AA6E2B59BA9594697602B7530481776FC40A71EF15215930DAA485DA7539CA6450A58E
3,504,717 UART: [art] SIG.S = 2FB56C6043ACB2C39CE965AF1538F9A9711887A60ADF2A7D06A21786A11887AA97D9D02142E98B46184946B69C4D3B6E
3,527,724 UART: Caliptra RT
3,527,977 UART: [state] CFI Enabled
3,635,259 UART: [rt] RT listening for mailbox commands...
3,635,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,897 UART: [rt]cmd =0x41544d4e, len=14344
4,400,985 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,709 UART: [kat] LMS
1,171,037 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,295 UART: [idev] ++
1,175,463 UART: [idev] CDI.KEYID = 6
1,175,823 UART: [idev] SUBJECT.KEYID = 7
1,176,247 UART: [idev] UDS.KEYID = 0
1,176,592 ready_for_fw is high
1,176,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,085 UART: [idev] Erasing UDS.KEYID = 0
1,200,854 UART: [idev] Sha1 KeyId Algorithm
1,209,290 UART: [idev] --
1,210,584 UART: [ldev] ++
1,210,752 UART: [ldev] CDI.KEYID = 6
1,211,115 UART: [ldev] SUBJECT.KEYID = 5
1,211,541 UART: [ldev] AUTHORITY.KEYID = 7
1,212,004 UART: [ldev] FE.KEYID = 1
1,217,328 UART: [ldev] Erasing FE.KEYID = 1
1,244,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,194 UART: [ldev] --
1,283,673 UART: [fwproc] Wait for Commands...
1,284,335 UART: [fwproc] Recv command 0x46574c44
1,285,063 UART: [fwproc] Recv'd Img size: 114448 bytes
3,117,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,310,697 >>> mbox cmd response: success
3,311,731 UART: [afmc] ++
3,311,899 UART: [afmc] CDI.KEYID = 6
3,312,261 UART: [afmc] SUBJECT.KEYID = 7
3,312,686 UART: [afmc] AUTHORITY.KEYID = 5
3,348,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,271 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,980 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,872 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,583 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,452 UART: [afmc] --
3,391,560 UART: [cold-reset] --
3,392,448 UART: [state] Locking Datavault
3,393,899 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,503 UART: [state] Locking ICCM
3,395,049 UART: [exit] Launching FMC @ 0x40000130
3,400,378 UART:
3,400,394 UART: Running Caliptra FMC ...
3,400,802 UART:
3,400,945 UART: [state] CFI Enabled
3,411,879 UART: [fht] FMC Alias Private Key: 7
3,519,739 UART: [art] Extend RT PCRs Done
3,520,167 UART: [art] Lock RT PCRs Done
3,521,935 UART: [art] Populate DV Done
3,530,207 UART: [fht] FMC Alias Private Key: 7
3,531,285 UART: [art] Derive CDI
3,531,565 UART: [art] Store in in slot 0x4
3,617,616 UART: [art] Derive Key Pair
3,617,976 UART: [art] Store priv key in slot 0x5
3,631,578 UART: [art] Derive Key Pair - Done
3,646,086 UART: [art] Signing Cert with AUTHO
3,646,566 UART: RITY.KEYID = 7
3,661,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,735 UART: [art] PUB.X = 08B4C526660F35392DF06C25FCB6427C19842DD783EBAABA031F8060AA0EDFECABF663B08E17B7DCD54B8A716F199F1B
3,669,511 UART: [art] PUB.Y = 2DCEBC42C6D4A73B3F5B9C63E4F5D5AAB714AC95821483A68B1E9A4B4EBE2A9243B9DD7A71E067B509463DE9FB342FE6
3,676,478 UART: [art] SIG.R = A37A1DD2EB9B037871F26C275B2369B0403AF9EFCA4281EF75EEA4DDA98DCE378CB9813F4CE5B2372B64187D5CF2FB74
3,683,263 UART: [art] SIG.S = 68B8ED437FD5A67C290B5FFD60F0FE1BD73FC8747A322FA26A38E68564589BBD29F0DB087AE784372113AE377ACE980F
3,707,075 UART: Caliptra RT
3,707,420 UART: [state] CFI Enabled
3,814,568 UART: [rt] RT listening for mailbox commands...
3,815,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,262 UART: [rt]cmd =0x41544d4e, len=14344
4,594,802 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,786 ready_for_fw is high
1,060,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,068 >>> mbox cmd response: success
3,231,361 UART:
3,231,377 UART: Running Caliptra FMC ...
3,231,785 UART:
3,231,928 UART: [state] CFI Enabled
3,242,528 UART: [fht] FMC Alias Private Key: 7
3,350,770 UART: [art] Extend RT PCRs Done
3,351,198 UART: [art] Lock RT PCRs Done
3,352,824 UART: [art] Populate DV Done
3,361,152 UART: [fht] FMC Alias Private Key: 7
3,362,150 UART: [art] Derive CDI
3,362,430 UART: [art] Store in in slot 0x4
3,448,439 UART: [art] Derive Key Pair
3,448,799 UART: [art] Store priv key in slot 0x5
3,462,087 UART: [art] Derive Key Pair - Done
3,476,872 UART: [art] Signing Cert with AUTHO
3,477,352 UART: RITY.KEYID = 7
3,492,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,971 UART: [art] PUB.X = 02E99A1A3CDD0F5630951F57B4EBE029D2F37F9ADEAE818D94127298BBEFB5DFF99EF9BCE2B9A30492F927B1E7FD7BD7
3,499,756 UART: [art] PUB.Y = 38B0444A8A362F12E97ACCFC148282CED6AC8F04CDBDA446B0AB27E25BF55AEEC15713E2F4745001BBEFC6B68A88C5CF
3,506,724 UART: [art] SIG.R = 7EBE71B1B154E2FD48A3D821078E001EDB9763EA4CDD0D4D9C5770886268E86BB0632FA91414CFCC7E5C8C0DB70DF4C8
3,513,476 UART: [art] SIG.S = CB86506AA366E259C4346F6765689C6F756249DA360C1836339CAB03ACD6FD584EFDD9ECB8D25695504682979F51A76A
3,537,297 UART: Caliptra RT
3,537,642 UART: [state] CFI Enabled
3,645,410 UART: [rt] RT listening for mailbox commands...
3,646,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,096 UART: [rt]cmd =0x41544d4e, len=14344
4,426,108 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 ready_for_fw is high
1,174,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,862 UART: [ldev] ++
1,209,030 UART: [ldev] CDI.KEYID = 6
1,209,394 UART: [ldev] SUBJECT.KEYID = 5
1,209,821 UART: [ldev] AUTHORITY.KEYID = 7
1,210,284 UART: [ldev] FE.KEYID = 1
1,215,922 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,666 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,719 UART: [fwproc] Recv command 0x46574c44
1,283,452 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,625 >>> mbox cmd response: success
3,325,844 UART: [afmc] ++
3,326,012 UART: [afmc] CDI.KEYID = 6
3,326,375 UART: [afmc] SUBJECT.KEYID = 7
3,326,801 UART: [afmc] AUTHORITY.KEYID = 5
3,361,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,032 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,742 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,632 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,343 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,263 UART: [afmc] --
3,405,393 UART: [cold-reset] --
3,406,091 UART: [state] Locking Datavault
3,406,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,562 UART: [state] Locking ICCM
3,408,224 UART: [exit] Launching FMC @ 0x40000130
3,413,553 UART:
3,413,569 UART: Running Caliptra FMC ...
3,413,977 UART:
3,414,031 UART: [state] CFI Enabled
3,424,445 UART: [fht] FMC Alias Private Key: 7
3,532,165 UART: [art] Extend RT PCRs Done
3,532,593 UART: [art] Lock RT PCRs Done
3,534,127 UART: [art] Populate DV Done
3,542,371 UART: [fht] FMC Alias Private Key: 7
3,543,397 UART: [art] Derive CDI
3,543,677 UART: [art] Store in in slot 0x4
3,629,244 UART: [art] Derive Key Pair
3,629,604 UART: [art] Store priv key in slot 0x5
3,642,394 UART: [art] Derive Key Pair - Done
3,656,978 UART: [art] Signing Cert with AUTHO
3,657,458 UART: RITY.KEYID = 7
3,672,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,713 UART: [art] PUB.X = 793E84F6A4CBEB9A7FBE5A5EA0FB808AF009D0127AAFFC59E27C0B7A194908298D79E177FA9E7BF8531F4F839CE577D2
3,680,492 UART: [art] PUB.Y = D66F9232B4EEAE9E3A08107C79E6C1B61C0E454E5B9E6CD80AA6D62BB14E10802DCE996816148032691036937F6AE843
3,687,435 UART: [art] SIG.R = 5278B49BAEDED53B9D229125B955C4EC52C68AFC706ED356B86AA13AC2BF1F015AF5FF78EFEA65960BB61827340B4DC4
3,694,214 UART: [art] SIG.S = 2F214076AFE76E4104E55BD796B065A897C241E7FF501C00303DEED6723994CAD04A52B144F09520A935E4DD90F291E5
3,717,142 UART: Caliptra RT
3,717,395 UART: [state] CFI Enabled
3,825,036 UART: [rt] RT listening for mailbox commands...
3,825,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,970 UART: [rt]cmd =0x41544d4e, len=14344
4,600,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,592 ready_for_fw is high
1,056,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,921 >>> mbox cmd response: success
3,228,428 UART:
3,228,444 UART: Running Caliptra FMC ...
3,228,852 UART:
3,228,906 UART: [state] CFI Enabled
3,239,342 UART: [fht] FMC Alias Private Key: 7
3,347,384 UART: [art] Extend RT PCRs Done
3,347,812 UART: [art] Lock RT PCRs Done
3,349,486 UART: [art] Populate DV Done
3,357,318 UART: [fht] FMC Alias Private Key: 7
3,358,394 UART: [art] Derive CDI
3,358,674 UART: [art] Store in in slot 0x4
3,444,475 UART: [art] Derive Key Pair
3,444,835 UART: [art] Store priv key in slot 0x5
3,457,923 UART: [art] Derive Key Pair - Done
3,473,031 UART: [art] Signing Cert with AUTHO
3,473,511 UART: RITY.KEYID = 7
3,488,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,378 UART: [art] PUB.X = E7F2865056CA3FDB068397C3C432FDBD24DB5CF4DA0743B623C79126401BC13A6B2784AD4EC24F4989408908CCC64255
3,496,143 UART: [art] PUB.Y = E9A5E7AB5E3D536E5266A94DCF77240E686F11E032190EDEB5763479FC55D942BE6C91623482415FFCDB06001452E066
3,503,062 UART: [art] SIG.R = 11DDAA426F0518F86D85AEB13A3C39ED0462ECF87B565D02F16B8372C4A43D7A61D35955E27002308D7E5B9CD0009C68
3,509,802 UART: [art] SIG.S = 7F0320E44E4E3900C68301FF8704A2E2E38AD485F53F2CF04954D8726CCCAB6B30E156A87B04B6ED26089F2A706CC3F3
3,533,118 UART: Caliptra RT
3,533,371 UART: [state] CFI Enabled
3,640,088 UART: [rt] RT listening for mailbox commands...
3,640,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,718 UART: [rt]cmd =0x41544d4e, len=14344
4,415,788 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,174,536 ready_for_fw is high
1,174,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,369 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,952 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,970 >>> mbox cmd response: success
3,325,095 UART: [afmc] ++
3,325,263 UART: [afmc] CDI.KEYID = 6
3,325,626 UART: [afmc] SUBJECT.KEYID = 7
3,326,052 UART: [afmc] AUTHORITY.KEYID = 5
3,361,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,003 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,713 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,603 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,314 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,082 UART: [afmc] --
3,405,050 UART: [cold-reset] --
3,405,852 UART: [state] Locking Datavault
3,407,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,631 UART: [state] Locking ICCM
3,408,081 UART: [exit] Launching FMC @ 0x40000130
3,413,410 UART:
3,413,426 UART: Running Caliptra FMC ...
3,413,834 UART:
3,413,977 UART: [state] CFI Enabled
3,424,889 UART: [fht] FMC Alias Private Key: 7
3,532,937 UART: [art] Extend RT PCRs Done
3,533,365 UART: [art] Lock RT PCRs Done
3,534,735 UART: [art] Populate DV Done
3,543,143 UART: [fht] FMC Alias Private Key: 7
3,544,253 UART: [art] Derive CDI
3,544,533 UART: [art] Store in in slot 0x4
3,629,912 UART: [art] Derive Key Pair
3,630,272 UART: [art] Store priv key in slot 0x5
3,643,814 UART: [art] Derive Key Pair - Done
3,658,259 UART: [art] Signing Cert with AUTHO
3,658,739 UART: RITY.KEYID = 7
3,673,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,750 UART: [art] PUB.X = 7E90B936A6F0BC530E1DE2325863FC570CAF0FC93A3C36287E40A54E2154F35C5097338949A4CE3804C00CFE851A3C9C
3,681,509 UART: [art] PUB.Y = 8544EB1295825F4EF4AC245C90151A03C667A30E815A1FC13480A8F39E327F4F1044F60ABC428D00C1BFC05AE48892EF
3,688,432 UART: [art] SIG.R = 45AF295F7AA56E47FB1E3D7222C058B45F5B9E3C1B1AC5E7A8CA142B91C731867705CA77A3749A7A574CD109196BE96A
3,695,204 UART: [art] SIG.S = 52995AE93C8556F83E666854035153025D055E1377969A9AEFDAE5F8E9BB57335B577BCB53FC5C29D937084DD2848FA7
3,719,091 UART: Caliptra RT
3,719,436 UART: [state] CFI Enabled
3,827,523 UART: [rt] RT listening for mailbox commands...
3,828,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,465 UART: [rt]cmd =0x41544d4e, len=14344
4,605,898 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,155 ready_for_fw is high
1,057,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,886 >>> mbox cmd response: success
3,228,447 UART:
3,228,463 UART: Running Caliptra FMC ...
3,228,871 UART:
3,229,014 UART: [state] CFI Enabled
3,239,826 UART: [fht] FMC Alias Private Key: 7
3,347,922 UART: [art] Extend RT PCRs Done
3,348,350 UART: [art] Lock RT PCRs Done
3,349,810 UART: [art] Populate DV Done
3,357,800 UART: [fht] FMC Alias Private Key: 7
3,358,752 UART: [art] Derive CDI
3,359,032 UART: [art] Store in in slot 0x4
3,444,769 UART: [art] Derive Key Pair
3,445,129 UART: [art] Store priv key in slot 0x5
3,458,665 UART: [art] Derive Key Pair - Done
3,473,312 UART: [art] Signing Cert with AUTHO
3,473,792 UART: RITY.KEYID = 7
3,489,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,155 UART: [art] PUB.X = 1786FEB29271233BBAFD40FACDA82F9939B29044FCDF94F510D94A566D10CCFF7DC72E37FB6F1A7FE5A9E1A5C536B6ED
3,496,949 UART: [art] PUB.Y = 85F90CF56A6A6F94EFB87BC12F681807BF6358F4E62DB89854B74D98437896976A4EECAC46510CAE8494C08AE83199E9
3,503,894 UART: [art] SIG.R = B40291DEAB05AD47B5461BE126FEECDF80560D6068ABF534D80A7A4DA604B08C563714BF24C33B18CDA59A7FEE56C1C0
3,510,667 UART: [art] SIG.S = 1B3AE4CCA0498C65EF1093566BE067C87F92F58547BF465E680694C364822E12E3B18DE34C44BC668E6AD9D72179BBE2
3,534,605 UART: Caliptra RT
3,534,950 UART: [state] CFI Enabled
3,643,102 UART: [rt] RT listening for mailbox commands...
3,643,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,658 UART: [rt]cmd =0x41544d4e, len=14344
4,416,515 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,138 UART:
192,491 UART: Running Caliptra ROM ...
193,673 UART:
193,831 UART: [state] CFI Enabled
264,064 UART: [state] LifecycleState = Unprovisioned
266,013 UART: [state] DebugLocked = No
267,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,410 UART: [kat] SHA2-256
443,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,650 UART: [kat] ++
454,098 UART: [kat] sha1
466,114 UART: [kat] SHA2-256
468,771 UART: [kat] SHA2-384
475,055 UART: [kat] SHA2-512-ACC
477,408 UART: [kat] ECC-384
2,768,315 UART: [kat] HMAC-384Kdf
2,800,952 UART: [kat] LMS
3,991,221 UART: [kat] --
3,993,696 UART: [cold-reset] ++
3,995,875 UART: [fht] Storing FHT @ 0x50003400
4,007,504 UART: [idev] ++
4,008,101 UART: [idev] CDI.KEYID = 6
4,009,021 UART: [idev] SUBJECT.KEYID = 7
4,010,202 UART: [idev] UDS.KEYID = 0
4,011,265 ready_for_fw is high
4,011,469 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,006 UART: [idev] Erasing UDS.KEYID = 0
7,347,347 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,262 UART: [idev] --
7,375,036 UART: [ldev] ++
7,375,613 UART: [ldev] CDI.KEYID = 6
7,376,559 UART: [ldev] SUBJECT.KEYID = 5
7,377,773 UART: [ldev] AUTHORITY.KEYID = 7
7,379,059 UART: [ldev] FE.KEYID = 1
7,422,525 UART: [ldev] Erasing FE.KEYID = 1
10,757,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,144 UART: [ldev] --
13,139,294 UART: [fwproc] Waiting for Commands...
13,142,624 UART: [fwproc] Received command 0x46574c44
13,144,803 UART: [fwproc] Received Image of size 114124 bytes
17,193,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,574 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,650,684 >>> mbox cmd response: success
17,654,959 UART: [afmc] ++
17,655,558 UART: [afmc] CDI.KEYID = 6
17,656,442 UART: [afmc] SUBJECT.KEYID = 7
17,657,711 UART: [afmc] AUTHORITY.KEYID = 5
21,028,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,517 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,910 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,758 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,196 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,485 UART: [afmc] --
23,399,293 UART: [cold-reset] --
23,402,833 UART: [state] Locking Datavault
23,408,621 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,370 UART: [state] Locking ICCM
23,412,552 UART: [exit] Launching FMC @ 0x40000130
23,420,944 UART:
23,421,176 UART: Running Caliptra FMC ...
23,422,211 UART:
23,422,362 UART: [state] CFI Enabled
23,488,222 UART: [fht] FMC Alias Private Key: 7
25,826,502 UART: [art] Extend RT PCRs Done
25,827,734 UART: [art] Lock RT PCRs Done
25,829,443 UART: [art] Populate DV Done
25,834,860 UART: [fht] FMC Alias Private Key: 7
25,836,604 UART: [art] Derive CDI
25,837,349 UART: [art] Store in in slot 0x4
25,897,362 UART: [art] Derive Key Pair
25,898,362 UART: [art] Store priv key in slot 0x5
29,191,176 UART: [art] Derive Key Pair - Done
29,204,070 UART: [art] Signing Cert with AUTHO
29,205,411 UART: RITY.KEYID = 7
31,493,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,253 UART: [art] PUB.X = 2ACB0530637D8CFD92DCEA8A1CCDDA085BAC77C2E15C56FF0AAAD24183285546E81710AC2396ABED0BE5F35C06BDD119
31,502,515 UART: [art] PUB.Y = 62CD679CEDE8E70C148341C176E48D2917E6225ED0EA8DB8FCD46A2124B2DBB56ADF7A6CC76FC3BEB4311666691427D8
31,509,754 UART: [art] SIG.R = A724485CA9D5FCE84500FC65C6BC6F3001827EEB037720D7B5CE2CDAA9137622F6D5C5C794276AD62584738E2D1CFF40
31,517,205 UART: [art] SIG.S = 4244AA054DB18A9596EB2F6A406483A510135EBACBEF0C526CE9F6B8C93C374E9E9411CA09A8F9B4C4E980E9AD63BA49
32,822,265 UART: Caliptra RT
32,822,974 UART: [state] CFI Enabled
32,984,556 UART: [rt] RT listening for mailbox commands...
32,986,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,141,829 UART: [rt]cmd =0x41544d4e, len=14344
38,376,944 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,808,168 ready_for_fw is high
3,808,549 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,894,055 >>> mbox cmd response: success
23,587,991 UART:
23,588,393 UART: Running Caliptra FMC ...
23,589,496 UART:
23,589,654 UART: [state] CFI Enabled
23,659,910 UART: [fht] FMC Alias Private Key: 7
25,997,724 UART: [art] Extend RT PCRs Done
25,998,942 UART: [art] Lock RT PCRs Done
26,000,758 UART: [art] Populate DV Done
26,006,328 UART: [fht] FMC Alias Private Key: 7
26,008,037 UART: [art] Derive CDI
26,008,781 UART: [art] Store in in slot 0x4
26,068,781 UART: [art] Derive Key Pair
26,069,817 UART: [art] Store priv key in slot 0x5
29,362,349 UART: [art] Derive Key Pair - Done
29,375,024 UART: [art] Signing Cert with AUTHO
29,376,340 UART: RITY.KEYID = 7
31,664,608 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,133 UART: [art] PUB.X = 89DD39793B9F1FDE10658D1B5E59461E2D2368406D35E66A34546C171CC0F5706F139F1D684A16B1B5F79249AF771FB3
31,673,335 UART: [art] PUB.Y = 3F6741F052B681CF74DAC50034646BC9106DAD043789257BB41F4EF1D3A68457717A052C804C5CCC6AB6FB2C30C35F47
31,680,569 UART: [art] SIG.R = 72B5456A69251EC4CE7B6B4C2D14869B45E72F1BCB13DC8A955CB871AB2022FD3D4BAD5E03443D613E851C8FAB7BD311
31,687,963 UART: [art] SIG.S = 981CBED00773FD2634E1CB3C64D55CDB472652B96F8169B421F70D33388264901DFFC22C2A17FE1D9ECC1D74B58A5695
32,992,649 UART: Caliptra RT
32,993,335 UART: [state] CFI Enabled
33,155,552 UART: [rt] RT listening for mailbox commands...
33,157,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,313,265 UART: [rt]cmd =0x41544d4e, len=14344
38,548,646 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,435 UART:
192,814 UART: Running Caliptra ROM ...
193,910 UART:
603,588 UART: [state] CFI Enabled
614,358 UART: [state] LifecycleState = Unprovisioned
616,297 UART: [state] DebugLocked = No
617,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,162 UART: [kat] SHA2-256
791,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,403 UART: [kat] ++
802,966 UART: [kat] sha1
813,746 UART: [kat] SHA2-256
816,438 UART: [kat] SHA2-384
822,786 UART: [kat] SHA2-512-ACC
825,144 UART: [kat] ECC-384
3,110,988 UART: [kat] HMAC-384Kdf
3,122,547 UART: [kat] LMS
4,312,643 UART: [kat] --
4,316,650 UART: [cold-reset] ++
4,318,163 UART: [fht] Storing FHT @ 0x50003400
4,329,450 UART: [idev] ++
4,330,056 UART: [idev] CDI.KEYID = 6
4,330,943 UART: [idev] SUBJECT.KEYID = 7
4,332,243 UART: [idev] UDS.KEYID = 0
4,333,265 ready_for_fw is high
4,333,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,119 UART: [idev] Erasing UDS.KEYID = 0
7,614,874 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,982 UART: [idev] --
7,640,080 UART: [ldev] ++
7,640,648 UART: [ldev] CDI.KEYID = 6
7,641,582 UART: [ldev] SUBJECT.KEYID = 5
7,642,840 UART: [ldev] AUTHORITY.KEYID = 7
7,644,064 UART: [ldev] FE.KEYID = 1
7,656,359 UART: [ldev] Erasing FE.KEYID = 1
10,944,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,908 UART: [ldev] --
13,304,910 UART: [fwproc] Waiting for Commands...
13,306,804 UART: [fwproc] Received command 0x46574c44
13,308,984 UART: [fwproc] Received Image of size 114124 bytes
17,356,209 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,429,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,498,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,814,676 >>> mbox cmd response: success
17,818,251 UART: [afmc] ++
17,818,894 UART: [afmc] CDI.KEYID = 6
17,819,776 UART: [afmc] SUBJECT.KEYID = 7
17,821,041 UART: [afmc] AUTHORITY.KEYID = 5
21,133,115 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,428,139 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,430,396 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,444,780 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,459,587 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,474,033 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,496,106 UART: [afmc] --
23,500,507 UART: [cold-reset] --
23,503,929 UART: [state] Locking Datavault
23,507,227 UART: [state] Locking PCR0, PCR1 and PCR31
23,508,983 UART: [state] Locking ICCM
23,510,698 UART: [exit] Launching FMC @ 0x40000130
23,519,089 UART:
23,519,322 UART: Running Caliptra FMC ...
23,520,418 UART:
23,520,575 UART: [state] CFI Enabled
23,528,735 UART: [fht] FMC Alias Private Key: 7
25,859,326 UART: [art] Extend RT PCRs Done
25,860,539 UART: [art] Lock RT PCRs Done
25,862,230 UART: [art] Populate DV Done
25,867,579 UART: [fht] FMC Alias Private Key: 7
25,869,106 UART: [art] Derive CDI
25,869,854 UART: [art] Store in in slot 0x4
25,912,386 UART: [art] Derive Key Pair
25,913,377 UART: [art] Store priv key in slot 0x5
29,155,726 UART: [art] Derive Key Pair - Done
29,168,664 UART: [art] Signing Cert with AUTHO
29,169,969 UART: RITY.KEYID = 7
31,449,643 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,142 UART: [art] PUB.X = AA919775E01CA0F872DF8B130573BE5A9C7E550D52C89A24EF401CB3D52F9B8B3851799C591C4261F55C5017CF558720
31,458,374 UART: [art] PUB.Y = 7DBEEDAA51D9DDAE3FC2D138930AE7FC417CE8C5D91351B82B51ECD81593C6F08C5D7B0F4D04444F7D0587FB4C3E2C3A
31,465,642 UART: [art] SIG.R = 9243433711C2B59CF4A16A181A4F5F77ADD95F1C540F7881896D14ABF61CD0FA28C0C391AB51AD2107E836F01407E7FF
31,473,023 UART: [art] SIG.S = 946140B411F17B254BE9F4878D94E9E44B0B8BB2DB9A185606C152759BEFC7EA818EE0B446D4EC7F8FA85FC65B44B834
32,778,326 UART: Caliptra RT
32,779,019 UART: [state] CFI Enabled
32,897,185 UART: [rt] RT listening for mailbox commands...
32,899,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,054,516 UART: [rt]cmd =0x41544d4e, len=14344
38,290,080 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,119,380 ready_for_fw is high
4,120,042 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,229 >>> mbox cmd response: success
23,701,907 UART:
23,702,304 UART: Running Caliptra FMC ...
23,703,433 UART:
23,703,593 UART: [state] CFI Enabled
23,711,207 UART: [fht] FMC Alias Private Key: 7
26,042,044 UART: [art] Extend RT PCRs Done
26,043,274 UART: [art] Lock RT PCRs Done
26,044,869 UART: [art] Populate DV Done
26,050,462 UART: [fht] FMC Alias Private Key: 7
26,051,993 UART: [art] Derive CDI
26,052,761 UART: [art] Store in in slot 0x4
26,095,572 UART: [art] Derive Key Pair
26,096,576 UART: [art] Store priv key in slot 0x5
29,338,830 UART: [art] Derive Key Pair - Done
29,351,455 UART: [art] Signing Cert with AUTHO
29,352,758 UART: RITY.KEYID = 7
31,632,212 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,719 UART: [art] PUB.X = 9FDE8518C0CBDBE066F2B08AF31483302A89F9C3B482BE5A9F4934DAA8ABD6E39F925E11EEA5898DE278553E70CEB6CD
31,640,990 UART: [art] PUB.Y = 316401EF99074F09BB2EB3FC20DFD753530D1019216D7CAFC2CFA9CE8D4B08C3C9ACD8F77B83D1D165738006E9A5A2C6
31,648,287 UART: [art] SIG.R = 31331AAEC67B9B2A1670FFF2981183C9A73209343FA63AB4D7127F4BE066A77E898E85644C0B41B028A758921C6D711C
31,655,626 UART: [art] SIG.S = E9A30377A3B3B185671107FF203F2C3724E6157E08A97FE2E2AB3C80F9D5BC44E1462E301C0851424D592B41F4597E4A
32,960,982 UART: Caliptra RT
32,961,669 UART: [state] CFI Enabled
33,080,133 UART: [rt] RT listening for mailbox commands...
33,082,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,238,160 UART: [rt]cmd =0x41544d4e, len=14344
38,474,018 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,010 UART:
192,371 UART: Running Caliptra ROM ...
193,485 UART:
193,627 UART: [state] CFI Enabled
265,605 UART: [state] LifecycleState = Unprovisioned
267,508 UART: [state] DebugLocked = No
268,816 UART: [state] WD Timer not started. Device not locked for debugging
271,725 UART: [kat] SHA2-256
450,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,382 UART: [kat] ++
462,840 UART: [kat] sha1
474,213 UART: [kat] SHA2-256
477,227 UART: [kat] SHA2-384
482,294 UART: [kat] SHA2-512-ACC
485,299 UART: [kat] ECC-384
2,947,659 UART: [kat] HMAC-384Kdf
2,970,706 UART: [kat] LMS
3,500,203 UART: [kat] --
3,504,499 UART: [cold-reset] ++
3,506,925 UART: [fht] FHT @ 0x50003400
3,517,976 UART: [idev] ++
3,518,548 UART: [idev] CDI.KEYID = 6
3,519,581 UART: [idev] SUBJECT.KEYID = 7
3,520,703 UART: [idev] UDS.KEYID = 0
3,521,650 ready_for_fw is high
3,521,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,877 UART: [idev] Erasing UDS.KEYID = 0
6,027,419 UART: [idev] Sha1 KeyId Algorithm
6,050,976 UART: [idev] --
6,054,299 UART: [ldev] ++
6,054,878 UART: [ldev] CDI.KEYID = 6
6,055,797 UART: [ldev] SUBJECT.KEYID = 5
6,057,014 UART: [ldev] AUTHORITY.KEYID = 7
6,058,250 UART: [ldev] FE.KEYID = 1
6,099,142 UART: [ldev] Erasing FE.KEYID = 1
8,600,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,895 UART: [ldev] --
10,391,996 UART: [fwproc] Wait for Commands...
10,394,850 UART: [fwproc] Recv command 0x46574c44
10,396,942 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,259,946 >>> mbox cmd response: success
14,263,608 UART: [afmc] ++
14,264,206 UART: [afmc] CDI.KEYID = 6
14,265,117 UART: [afmc] SUBJECT.KEYID = 7
14,266,334 UART: [afmc] AUTHORITY.KEYID = 5
16,806,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,597,960 UART: [afmc] --
18,601,286 UART: [cold-reset] --
18,605,588 UART: [state] Locking Datavault
18,611,419 UART: [state] Locking PCR0, PCR1 and PCR31
18,613,081 UART: [state] Locking ICCM
18,614,749 UART: [exit] Launching FMC @ 0x40000130
18,623,193 UART:
18,623,426 UART: Running Caliptra FMC ...
18,624,526 UART:
18,624,687 UART: [state] CFI Enabled
18,685,808 UART: [fht] FMC Alias Private Key: 7
20,450,320 UART: [art] Extend RT PCRs Done
20,451,536 UART: [art] Lock RT PCRs Done
20,452,804 UART: [art] Populate DV Done
20,458,276 UART: [fht] FMC Alias Private Key: 7
20,459,759 UART: [art] Derive CDI
20,460,523 UART: [art] Store in in slot 0x4
20,517,561 UART: [art] Derive Key Pair
20,518,557 UART: [art] Store priv key in slot 0x5
22,980,987 UART: [art] Derive Key Pair - Done
22,993,755 UART: [art] Signing Cert with AUTHO
22,995,045 UART: RITY.KEYID = 7
24,706,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,375 UART: [art] PUB.X = F6FEDFDFE81F6A008ACF4D3EBBC746CD66A71B632E2D47594B027C384CA7779D77697532F96E33369348AAB2144F9BFE
24,715,616 UART: [art] PUB.Y = 59D4D298141FD10D81639574B81102C17E872F3A4B79739F9A2D20DF63EA6E3E40D4CAF1855E7E1BE0BAA4A66E8F1E94
24,722,899 UART: [art] SIG.R = 770954E5113165D8FE64D0B123F4DD4E3A27400E76F4A3D396044828238C4EA23775A7CCF9CF273F1F8804670648078E
24,730,282 UART: [art] SIG.S = 1F277D583373738C745CA76CF52F3D94E891FF053B77E6B7015B0FECBD238D0B21807CF3794ED42F299AFCC98C7EB5F5
25,709,294 UART: Caliptra RT
25,709,982 UART: [state] CFI Enabled
25,874,068 UART: [rt] RT listening for mailbox commands...
25,876,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,032,435 UART: [rt]cmd =0x41544d4e, len=14344
29,962,852 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,398 writing to cptra_bootfsm_go
3,384,985 ready_for_fw is high
3,385,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,080,065 >>> mbox cmd response: success
18,371,622 UART:
18,372,010 UART: Running Caliptra FMC ...
18,373,156 UART:
18,373,312 UART: [state] CFI Enabled
18,436,657 UART: [fht] FMC Alias Private Key: 7
20,200,935 UART: [art] Extend RT PCRs Done
20,202,156 UART: [art] Lock RT PCRs Done
20,203,780 UART: [art] Populate DV Done
20,209,286 UART: [fht] FMC Alias Private Key: 7
20,210,825 UART: [art] Derive CDI
20,211,638 UART: [art] Store in in slot 0x4
20,270,095 UART: [art] Derive Key Pair
20,271,161 UART: [art] Store priv key in slot 0x5
22,734,098 UART: [art] Derive Key Pair - Done
22,747,264 UART: [art] Signing Cert with AUTHO
22,748,571 UART: RITY.KEYID = 7
24,460,190 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,699 UART: [art] PUB.X = 2D22A648664B791192B8D41B32D323DA07DE4FA0ED92570FF910A4ADEBB87D5F253DB8CBB25A260FDBD3EFF91A02E0CD
24,469,015 UART: [art] PUB.Y = 94D75095062083634C1A70359A56C2B42BA4DC7781AAD983A130518DA2E34BF046B34C13286615B30ABCE1CF454CC73F
24,476,283 UART: [art] SIG.R = 4C636AB9581C3FCC1A6CDE7A93DBA9DE1C8D5205C7E2FFCF3C7642EFA4EB103A33052D765B4F8A2500CE7464D13F0683
24,483,726 UART: [art] SIG.S = 7C6969848471F43EADBCC7C8397E59AFD8929BE625CE1DAF974C475318B3AAF6EB4C2226A29EFC64836691EE752FBFA4
25,462,619 UART: Caliptra RT
25,463,325 UART: [state] CFI Enabled
25,629,290 UART: [rt] RT listening for mailbox commands...
25,631,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,787,635 UART: [rt]cmd =0x41544d4e, len=14344
29,718,276 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,433 writing to cptra_bootfsm_go
193,549 UART:
193,919 UART: Running Caliptra ROM ...
195,108 UART:
604,861 UART: [state] CFI Enabled
617,254 UART: [state] LifecycleState = Unprovisioned
619,119 UART: [state] DebugLocked = No
621,990 UART: [state] WD Timer not started. Device not locked for debugging
626,512 UART: [kat] SHA2-256
805,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,253 UART: [kat] ++
817,782 UART: [kat] sha1
828,302 UART: [kat] SHA2-256
831,301 UART: [kat] SHA2-384
838,556 UART: [kat] SHA2-512-ACC
841,558 UART: [kat] ECC-384
3,282,928 UART: [kat] HMAC-384Kdf
3,295,582 UART: [kat] LMS
3,825,032 UART: [kat] --
3,828,754 UART: [cold-reset] ++
3,829,684 UART: [fht] FHT @ 0x50003400
3,841,284 UART: [idev] ++
3,842,014 UART: [idev] CDI.KEYID = 6
3,842,908 UART: [idev] SUBJECT.KEYID = 7
3,843,949 UART: [idev] UDS.KEYID = 0
3,845,014 ready_for_fw is high
3,845,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,781 UART: [idev] Erasing UDS.KEYID = 0
6,322,221 UART: [idev] Sha1 KeyId Algorithm
6,345,067 UART: [idev] --
6,349,321 UART: [ldev] ++
6,349,883 UART: [ldev] CDI.KEYID = 6
6,350,756 UART: [ldev] SUBJECT.KEYID = 5
6,351,958 UART: [ldev] AUTHORITY.KEYID = 7
6,353,238 UART: [ldev] FE.KEYID = 1
6,364,495 UART: [ldev] Erasing FE.KEYID = 1
8,835,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,842 UART: [ldev] --
10,628,986 UART: [fwproc] Wait for Commands...
10,630,588 UART: [fwproc] Recv command 0x46574c44
10,632,676 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,071 >>> mbox cmd response: success
14,498,166 UART: [afmc] ++
14,498,751 UART: [afmc] CDI.KEYID = 6
14,499,629 UART: [afmc] SUBJECT.KEYID = 7
14,500,837 UART: [afmc] AUTHORITY.KEYID = 5
17,001,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,042 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,800 UART: [afmc] --
18,798,494 UART: [cold-reset] --
18,801,646 UART: [state] Locking Datavault
18,806,690 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,363 UART: [state] Locking ICCM
18,810,455 UART: [exit] Launching FMC @ 0x40000130
18,818,843 UART:
18,819,072 UART: Running Caliptra FMC ...
18,820,166 UART:
18,820,316 UART: [state] CFI Enabled
18,828,302 UART: [fht] FMC Alias Private Key: 7
20,584,935 UART: [art] Extend RT PCRs Done
20,586,154 UART: [art] Lock RT PCRs Done
20,587,877 UART: [art] Populate DV Done
20,593,519 UART: [fht] FMC Alias Private Key: 7
20,595,055 UART: [art] Derive CDI
20,595,810 UART: [art] Store in in slot 0x4
20,638,451 UART: [art] Derive Key Pair
20,639,449 UART: [art] Store priv key in slot 0x5
23,066,073 UART: [art] Derive Key Pair - Done
23,079,017 UART: [art] Signing Cert with AUTHO
23,080,316 UART: RITY.KEYID = 7
24,785,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,230 UART: [art] PUB.X = B637D91D66BE9B44C477040CF8C4060D5C3DB8C2722746073DCEE2795302ADA139E58F0303559C95517292920544F00D
24,794,462 UART: [art] PUB.Y = 0AEA07342E2B70C1B4618DCFDC9ABD44CF0BD371080BC71E9E2DB939D7BEA7A121AA853EFC757FBB66E72F1F21B24C69
24,801,724 UART: [art] SIG.R = 2D7F6119EAD855A8A40CD4E84884934895F4C8A03F8B3BCE4776F5F62761978558C1E3A5D89E9A196A29E358DC3F8F8F
24,809,192 UART: [art] SIG.S = 8BF5AF585BC4765E3B90F7B81EA3A44623D65B2CADA4AF39AEBBBF126169335C5D03F8B8888D4D8E0B66AD811F53A1BC
25,788,140 UART: Caliptra RT
25,788,849 UART: [state] CFI Enabled
25,906,751 UART: [rt] RT listening for mailbox commands...
25,909,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,064,662 UART: [rt]cmd =0x41544d4e, len=14344
29,995,011 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,696,836 ready_for_fw is high
3,697,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,686 >>> mbox cmd response: success
18,518,646 UART:
18,519,055 UART: Running Caliptra FMC ...
18,520,186 UART:
18,520,339 UART: [state] CFI Enabled
18,528,206 UART: [fht] FMC Alias Private Key: 7
20,284,551 UART: [art] Extend RT PCRs Done
20,285,769 UART: [art] Lock RT PCRs Done
20,287,337 UART: [art] Populate DV Done
20,292,605 UART: [fht] FMC Alias Private Key: 7
20,294,084 UART: [art] Derive CDI
20,294,838 UART: [art] Store in in slot 0x4
20,337,159 UART: [art] Derive Key Pair
20,338,193 UART: [art] Store priv key in slot 0x5
22,764,077 UART: [art] Derive Key Pair - Done
22,776,960 UART: [art] Signing Cert with AUTHO
22,778,256 UART: RITY.KEYID = 7
24,484,221 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,743 UART: [art] PUB.X = 506C0934D23E1953D5EE6D0714FE24AEDC276D08FB2110EC0F63707E8CE5929C7C947DF34DF1A24358AEFCFBF481CC63
24,493,010 UART: [art] PUB.Y = A2781EDE0D24816176312B7B20519E45B37D41684A4C7F48905FCFA31B77B7F864C829D277329856A5A8F72AB3913F2A
24,500,258 UART: [art] SIG.R = D90112A36195931741A2B2552DF15A8D5F6278BF8D563B3C81A0418C01737DB74AF3D47E5AD348F4A1F51601D789F1F4
24,507,615 UART: [art] SIG.S = 893453822F4C9EA2F1A9026E58CEA0CEC169D56E6D46C28648EB3BE700B74BB87776A414B39D382B4196A9F2212CD737
25,486,434 UART: Caliptra RT
25,487,122 UART: [state] CFI Enabled
25,603,869 UART: [rt] RT listening for mailbox commands...
25,606,200 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,761,564 UART: [rt]cmd =0x41544d4e, len=14344
29,692,762 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,100 UART:
192,465 UART: Running Caliptra ROM ...
193,619 UART:
193,765 UART: [state] CFI Enabled
266,636 UART: [state] LifecycleState = Unprovisioned
269,050 UART: [state] DebugLocked = No
270,324 UART: [state] WD Timer not started. Device not locked for debugging
274,074 UART: [kat] SHA2-256
463,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,487 UART: [kat] ++
474,938 UART: [kat] sha1
487,849 UART: [kat] SHA2-256
490,922 UART: [kat] SHA2-384
496,492 UART: [kat] SHA2-512-ACC
499,068 UART: [kat] ECC-384
2,950,963 UART: [kat] HMAC-384Kdf
2,974,358 UART: [kat] LMS
3,506,123 UART: [kat] --
3,509,773 UART: [cold-reset] ++
3,510,634 UART: [fht] FHT @ 0x50003400
3,521,177 UART: [idev] ++
3,521,806 UART: [idev] CDI.KEYID = 6
3,522,780 UART: [idev] SUBJECT.KEYID = 7
3,524,030 UART: [idev] UDS.KEYID = 0
3,524,935 ready_for_fw is high
3,525,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,175 UART: [idev] Erasing UDS.KEYID = 0
6,034,528 UART: [idev] Sha1 KeyId Algorithm
6,055,392 UART: [idev] --
6,058,742 UART: [ldev] ++
6,059,424 UART: [ldev] CDI.KEYID = 6
6,060,309 UART: [ldev] SUBJECT.KEYID = 5
6,061,442 UART: [ldev] AUTHORITY.KEYID = 7
6,062,726 UART: [ldev] FE.KEYID = 1
6,104,134 UART: [ldev] Erasing FE.KEYID = 1
8,612,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,761 UART: [ldev] --
10,418,859 UART: [fwproc] Wait for Commands...
10,421,597 UART: [fwproc] Recv command 0x46574c44
10,423,886 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,180 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,599,565 >>> mbox cmd response: success
14,603,043 UART: [afmc] ++
14,603,762 UART: [afmc] CDI.KEYID = 6
14,604,948 UART: [afmc] SUBJECT.KEYID = 7
14,606,378 UART: [afmc] AUTHORITY.KEYID = 5
17,131,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,858,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,859,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,875,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,890,221 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,905,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,927,918 UART: [afmc] --
18,930,808 UART: [cold-reset] --
18,935,048 UART: [state] Locking Datavault
18,939,978 UART: [state] Locking PCR0, PCR1 and PCR31
18,942,168 UART: [state] Locking ICCM
18,945,023 UART: [exit] Launching FMC @ 0x40000130
18,953,697 UART:
18,953,928 UART: Running Caliptra FMC ...
18,955,028 UART:
18,955,186 UART: [state] CFI Enabled
19,014,623 UART: [fht] FMC Alias Private Key: 7
20,778,120 UART: [art] Extend RT PCRs Done
20,779,357 UART: [art] Lock RT PCRs Done
20,781,019 UART: [art] Populate DV Done
20,786,273 UART: [fht] FMC Alias Private Key: 7
20,787,861 UART: [art] Derive CDI
20,788,676 UART: [art] Store in in slot 0x4
20,847,403 UART: [art] Derive Key Pair
20,848,440 UART: [art] Store priv key in slot 0x5
23,311,079 UART: [art] Derive Key Pair - Done
23,323,765 UART: [art] Signing Cert with AUTHO
23,325,068 UART: RITY.KEYID = 7
25,036,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,038,046 UART: [art] PUB.X = B7B22CDFF9E0F1C03CF7A9B77D587B1316ED3E99B76EDA52BE1D5C629CA50DE7036285EE390E16581369FDF40395DB14
25,045,286 UART: [art] PUB.Y = B404E32AAA26BA90BABDC26A587AEE4F9C253222C6F52D695733B21B5655F8E6D977971A964BF55BF4F8821F6B6051B3
25,052,565 UART: [art] SIG.R = 91DC9FD526F312D719277F1876EF4FC21C13C8F96B75DAD40C08FCF84984AD302381900894C50BC6F14E9DFD887C9C32
25,059,962 UART: [art] SIG.S = F383E277AEF5D9E8DA86FE32FFEFC5EC227AA207B9F7DEF74F7FCD53D2B18396D75DEC5B4D4BA29054E1DA576F6FE9FD
26,039,356 UART: Caliptra RT
26,040,066 UART: [state] CFI Enabled
26,203,356 UART: [rt] RT listening for mailbox commands...
26,205,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,361,522 UART: [rt]cmd =0x41544d4e, len=14344
30,291,881 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,441,437 ready_for_fw is high
3,441,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,905 >>> mbox cmd response: success
19,029,234 UART:
19,029,652 UART: Running Caliptra FMC ...
19,030,816 UART:
19,030,987 UART: [state] CFI Enabled
19,093,773 UART: [fht] FMC Alias Private Key: 7
20,857,560 UART: [art] Extend RT PCRs Done
20,858,789 UART: [art] Lock RT PCRs Done
20,860,687 UART: [art] Populate DV Done
20,866,263 UART: [fht] FMC Alias Private Key: 7
20,867,908 UART: [art] Derive CDI
20,868,720 UART: [art] Store in in slot 0x4
20,926,138 UART: [art] Derive Key Pair
20,927,134 UART: [art] Store priv key in slot 0x5
23,389,070 UART: [art] Derive Key Pair - Done
23,402,227 UART: [art] Signing Cert with AUTHO
23,403,525 UART: RITY.KEYID = 7
25,115,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,658 UART: [art] PUB.X = 5ECF16E16DB31DDA1D1A25C1FA28C2F89AFCB6613EFB0DB06AE8F62D37C2257D3DF080F53C4490189952D42B0FE6F56A
25,123,923 UART: [art] PUB.Y = 1A63CC2584CC49D23EF0D44614454A5A7B0E98E0C1E448358B6A4CD29B4EB4BA007CD28B3D512EEFB51CF2834B18D00A
25,131,184 UART: [art] SIG.R = CE16310D59C0E72BAFF5E7A0E95B84EA88BF1AD8E873838D699F69F4701F3186ACA713911C075B44C0B384DBE6CF03B9
25,138,575 UART: [art] SIG.S = 970B8667083DEF4DA7E77DB471D40A2EC809503B961408FED72A8BF9130132641DA2E37FED1133E00D53128A5A88D7F9
26,118,180 UART: Caliptra RT
26,118,891 UART: [state] CFI Enabled
26,281,304 UART: [rt] RT listening for mailbox commands...
26,283,604 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,560 UART: [rt]cmd =0x41544d4e, len=14344
30,370,384 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,433 UART:
192,796 UART: Running Caliptra ROM ...
193,933 UART:
603,642 UART: [state] CFI Enabled
615,805 UART: [state] LifecycleState = Unprovisioned
618,186 UART: [state] DebugLocked = No
620,732 UART: [state] WD Timer not started. Device not locked for debugging
624,543 UART: [kat] SHA2-256
814,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,263 UART: [kat] ++
825,856 UART: [kat] sha1
837,512 UART: [kat] SHA2-256
840,580 UART: [kat] SHA2-384
848,049 UART: [kat] SHA2-512-ACC
850,632 UART: [kat] ECC-384
3,292,161 UART: [kat] HMAC-384Kdf
3,305,320 UART: [kat] LMS
3,837,148 UART: [kat] --
3,840,110 UART: [cold-reset] ++
3,842,008 UART: [fht] FHT @ 0x50003400
3,855,267 UART: [idev] ++
3,855,892 UART: [idev] CDI.KEYID = 6
3,856,854 UART: [idev] SUBJECT.KEYID = 7
3,858,087 UART: [idev] UDS.KEYID = 0
3,858,983 ready_for_fw is high
3,859,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,973 UART: [idev] Erasing UDS.KEYID = 0
6,335,500 UART: [idev] Sha1 KeyId Algorithm
6,356,347 UART: [idev] --
6,362,226 UART: [ldev] ++
6,362,893 UART: [ldev] CDI.KEYID = 6
6,363,902 UART: [ldev] SUBJECT.KEYID = 5
6,364,999 UART: [ldev] AUTHORITY.KEYID = 7
6,366,225 UART: [ldev] FE.KEYID = 1
6,377,134 UART: [ldev] Erasing FE.KEYID = 1
8,857,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,098 UART: [ldev] --
10,650,017 UART: [fwproc] Wait for Commands...
10,652,806 UART: [fwproc] Recv command 0x46574c44
10,655,108 UART: [fwproc] Recv'd Img size: 114448 bytes
14,102,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,848,246 >>> mbox cmd response: success
14,853,029 UART: [afmc] ++
14,853,741 UART: [afmc] CDI.KEYID = 6
14,854,927 UART: [afmc] SUBJECT.KEYID = 7
14,856,414 UART: [afmc] AUTHORITY.KEYID = 5
17,356,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,908 UART: [afmc] --
19,150,857 UART: [cold-reset] --
19,154,013 UART: [state] Locking Datavault
19,159,592 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,740 UART: [state] Locking ICCM
19,164,702 UART: [exit] Launching FMC @ 0x40000130
19,173,391 UART:
19,173,619 UART: Running Caliptra FMC ...
19,174,715 UART:
19,174,867 UART: [state] CFI Enabled
19,182,907 UART: [fht] FMC Alias Private Key: 7
20,939,704 UART: [art] Extend RT PCRs Done
20,940,938 UART: [art] Lock RT PCRs Done
20,942,776 UART: [art] Populate DV Done
20,948,075 UART: [fht] FMC Alias Private Key: 7
20,949,834 UART: [art] Derive CDI
20,950,641 UART: [art] Store in in slot 0x4
20,993,268 UART: [art] Derive Key Pair
20,994,321 UART: [art] Store priv key in slot 0x5
23,420,606 UART: [art] Derive Key Pair - Done
23,433,434 UART: [art] Signing Cert with AUTHO
23,434,734 UART: RITY.KEYID = 7
25,140,574 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,075 UART: [art] PUB.X = 3126829FD3FE988B623563797C61D1C983C3B7AEDF0264C251EF1DD4ACB2C5C8108F3D040063CF40447CD26CD6D47708
25,149,359 UART: [art] PUB.Y = 452A7B329A2FB574CEB5C35463BF3C5DB7E23F37FBEC3927FA2BC52A8DBFF37CD1FD92697FFDB47CA721927ACB5F769B
25,156,671 UART: [art] SIG.R = BB4B6B0674F50B850B96328D01F041AFC0D278B13432DB8F9C9C992872AF0B14AE528CB947340DAEB7FA953DEA92654A
25,164,044 UART: [art] SIG.S = 27CF3688FFBC0CF0782944D82E245F57A8D05D6F31D09D36143A58D8717AE105C8FC16218CE12A94B724F22832508CE4
26,142,714 UART: Caliptra RT
26,143,430 UART: [state] CFI Enabled
26,260,858 UART: [rt] RT listening for mailbox commands...
26,263,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,418,530 UART: [rt]cmd =0x41544d4e, len=14344
30,348,810 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,758,009 ready_for_fw is high
3,758,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,576 >>> mbox cmd response: success
19,212,951 UART:
19,213,343 UART: Running Caliptra FMC ...
19,214,526 UART:
19,214,697 UART: [state] CFI Enabled
19,222,793 UART: [fht] FMC Alias Private Key: 7
20,979,744 UART: [art] Extend RT PCRs Done
20,980,958 UART: [art] Lock RT PCRs Done
20,982,735 UART: [art] Populate DV Done
20,988,086 UART: [fht] FMC Alias Private Key: 7
20,989,697 UART: [art] Derive CDI
20,990,511 UART: [art] Store in in slot 0x4
21,033,101 UART: [art] Derive Key Pair
21,034,097 UART: [art] Store priv key in slot 0x5
23,460,855 UART: [art] Derive Key Pair - Done
23,473,805 UART: [art] Signing Cert with AUTHO
23,475,111 UART: RITY.KEYID = 7
25,180,311 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,793 UART: [art] PUB.X = 541EA076EA6D4F226C10C48B44BF575D45984DBA39281549F1E698FD1CE5B31F745CD8EB5C6757D41FCB592FBA8C593F
25,189,131 UART: [art] PUB.Y = D1D879CFF2C7B47EE80C54E29CECE47A5FC2745313795896E8192A07B044A48A0C4B07DC3E696204B67C26CB41CDC8F2
25,196,381 UART: [art] SIG.R = 9420E328E3406989623F453867B0C26E1C7006B383D92549DF0956A778541964B4230DE1D06FDB65C3006A5508BD6A0A
25,203,734 UART: [art] SIG.S = 68640322FAC04F7FE82246C63B95792D865587C6CD4DD24C8A475D5FEC2CD026E9BDA8B0845526430012CB69BF4755EF
26,182,736 UART: Caliptra RT
26,183,455 UART: [state] CFI Enabled
26,300,569 UART: [rt] RT listening for mailbox commands...
26,302,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,309 UART: [rt]cmd =0x41544d4e, len=14344
30,388,766 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,549 UART: [cold-reset] ++
1,476,987 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 ready_for_fw is high
1,481,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,988 UART: [idev] Erasing UDS.KEYID = 0
1,505,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,528 UART: [idev] --
1,515,583 UART: [ldev] ++
1,515,751 UART: [ldev] CDI.KEYID = 6
1,516,114 UART: [ldev] SUBJECT.KEYID = 5
1,516,540 UART: [ldev] AUTHORITY.KEYID = 7
1,517,003 UART: [ldev] FE.KEYID = 1
1,522,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,652 UART: [ldev] --
1,586,099 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 114448 bytes
2,886,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,959 >>> mbox cmd response: success
3,080,217 UART: [afmc] ++
3,080,385 UART: [afmc] CDI.KEYID = 6
3,080,747 UART: [afmc] SUBJECT.KEYID = 7
3,081,172 UART: [afmc] AUTHORITY.KEYID = 5
3,115,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,736 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,426 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,339 UART: [afmc] --
3,159,313 UART: [cold-reset] --
3,160,281 UART: [state] Locking Datavault
3,161,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,320 UART: [state] Locking ICCM
3,162,760 UART: [exit] Launching FMC @ 0x40000130
3,168,089 UART:
3,168,105 UART: Running Caliptra FMC ...
3,168,513 UART:
3,168,567 UART: [state] CFI Enabled
3,179,040 UART: [fht] FMC Alias Private Key: 7
3,286,823 UART: [art] Extend RT PCRs Done
3,287,251 UART: [art] Lock RT PCRs Done
3,288,591 UART: [art] Populate DV Done
3,296,644 UART: [fht] FMC Alias Private Key: 7
3,297,820 UART: [art] Derive CDI
3,298,100 UART: [art] Store in in slot 0x4
3,383,603 UART: [art] Derive Key Pair
3,383,963 UART: [art] Store priv key in slot 0x5
3,397,559 UART: [art] Derive Key Pair - Done
3,411,997 UART: [art] Signing Cert with AUTHO
3,412,477 UART: RITY.KEYID = 7
3,427,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,706 UART: [art] PUB.X = 4BA8234309789E47857343794E2849E7F02E05B7D9B4691B0BA6CC774B7AE6587112D1E87690868298AD22F9A6454644
3,435,453 UART: [art] PUB.Y = 5969083069E6B32FFE9FE1919E28F857E713527E37377D5B5FF8ECD043328A90EB903151D983E90C4FB2F8027ABA845C
3,442,394 UART: [art] SIG.R = 2E917AA3A12613218B8B1ECD3902472119F0710823E644D30D5B66D2A1B1A2AE37160374F16FC7190B924541C6F5BBC7
3,449,145 UART: [art] SIG.S = B5DB04948E1B1FD7826778AF34E07646DEFA705657C1F0EC363980C1A7858F66212C322A6FFA21A895FBEF3D17B770D5
3,472,949 UART: Caliptra RT
3,473,202 UART: [state] CFI Enabled
3,581,323 UART: [rt] RT listening for mailbox commands...
3,581,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,907 UART: [rt]cmd =0x41544d4e, len=14344
3,849,642 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 ready_for_fw is high
1,362,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,449 >>> mbox cmd response: success
2,991,499 UART:
2,991,515 UART: Running Caliptra FMC ...
2,991,923 UART:
2,991,977 UART: [state] CFI Enabled
3,002,894 UART: [fht] FMC Alias Private Key: 7
3,110,415 UART: [art] Extend RT PCRs Done
3,110,843 UART: [art] Lock RT PCRs Done
3,112,283 UART: [art] Populate DV Done
3,120,748 UART: [fht] FMC Alias Private Key: 7
3,121,830 UART: [art] Derive CDI
3,122,110 UART: [art] Store in in slot 0x4
3,207,717 UART: [art] Derive Key Pair
3,208,077 UART: [art] Store priv key in slot 0x5
3,221,567 UART: [art] Derive Key Pair - Done
3,236,281 UART: [art] Signing Cert with AUTHO
3,236,761 UART: RITY.KEYID = 7
3,251,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,694 UART: [art] PUB.X = DA1A4EBD9E27FB645BD0EB84B4CACA88F63CB9F2EB7178DAF45EA28EE138A3575CB53B7C8B6F1E1706F04EAF251E2393
3,259,487 UART: [art] PUB.Y = 9F6FAFE55DC6018DDEFF54B42F1B69AA5A2A7B81175149DDC55B1A64BAA7BD56E2B14AD13899AB8C7AA8D9F13D016B06
3,266,452 UART: [art] SIG.R = 503111B6FF50C8845F8E5E7854E367B4890A06AF195B741E51DAE293B33D96A0BCC1868AE19BABF24BA5AF2F1E6B085E
3,273,225 UART: [art] SIG.S = 52152AD0E424089D5EA0461407A7010BFD3386D275E4305184A6ECC1A3B356133BFED6E637A5913CC013DC7280EC4D96
3,297,088 UART: Caliptra RT
3,297,341 UART: [state] CFI Enabled
3,405,759 UART: [rt] RT listening for mailbox commands...
3,406,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,213 UART: [rt]cmd =0x41544d4e, len=14344
3,673,964 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,369 UART: [state] LifecycleState = Unprovisioned
87,024 UART: [state] DebugLocked = No
87,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,228 UART: [kat] SHA2-256
883,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,274 UART: [kat] ++
887,426 UART: [kat] sha1
891,610 UART: [kat] SHA2-256
893,548 UART: [kat] SHA2-384
896,435 UART: [kat] SHA2-512-ACC
898,336 UART: [kat] ECC-384
904,003 UART: [kat] HMAC-384Kdf
908,639 UART: [kat] LMS
1,476,835 UART: [kat] --
1,477,762 UART: [cold-reset] ++
1,478,220 UART: [fht] Storing FHT @ 0x50003400
1,481,141 UART: [idev] ++
1,481,309 UART: [idev] CDI.KEYID = 6
1,481,669 UART: [idev] SUBJECT.KEYID = 7
1,482,093 UART: [idev] UDS.KEYID = 0
1,482,438 ready_for_fw is high
1,482,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,241 UART: [idev] Erasing UDS.KEYID = 0
1,507,233 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,977 UART: [idev] --
1,517,198 UART: [ldev] ++
1,517,366 UART: [ldev] CDI.KEYID = 6
1,517,729 UART: [ldev] SUBJECT.KEYID = 5
1,518,155 UART: [ldev] AUTHORITY.KEYID = 7
1,518,618 UART: [ldev] FE.KEYID = 1
1,524,080 UART: [ldev] Erasing FE.KEYID = 1
1,549,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,551 UART: [ldev] --
1,588,824 UART: [fwproc] Waiting for Commands...
1,589,685 UART: [fwproc] Received command 0x46574c44
1,590,476 UART: [fwproc] Received Image of size 114448 bytes
2,890,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,705 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,976 >>> mbox cmd response: success
3,084,002 UART: [afmc] ++
3,084,170 UART: [afmc] CDI.KEYID = 6
3,084,532 UART: [afmc] SUBJECT.KEYID = 7
3,084,957 UART: [afmc] AUTHORITY.KEYID = 5
3,120,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,562 UART: [afmc] --
3,163,588 UART: [cold-reset] --
3,164,354 UART: [state] Locking Datavault
3,165,755 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,359 UART: [state] Locking ICCM
3,166,973 UART: [exit] Launching FMC @ 0x40000130
3,172,302 UART:
3,172,318 UART: Running Caliptra FMC ...
3,172,726 UART:
3,172,869 UART: [state] CFI Enabled
3,183,318 UART: [fht] FMC Alias Private Key: 7
3,290,995 UART: [art] Extend RT PCRs Done
3,291,423 UART: [art] Lock RT PCRs Done
3,292,761 UART: [art] Populate DV Done
3,300,880 UART: [fht] FMC Alias Private Key: 7
3,301,948 UART: [art] Derive CDI
3,302,228 UART: [art] Store in in slot 0x4
3,387,541 UART: [art] Derive Key Pair
3,387,901 UART: [art] Store priv key in slot 0x5
3,400,283 UART: [art] Derive Key Pair - Done
3,415,192 UART: [art] Signing Cert with AUTHO
3,415,672 UART: RITY.KEYID = 7
3,430,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,345 UART: [art] PUB.X = 8D9845791ABE5E6C973F17DC80CF96C19EB52D9E625939EE86E21AE383A661A41474B8E8F5C4DEDBD58351C3EBD9062D
3,438,124 UART: [art] PUB.Y = FD8E9440DA44EB457B7A3A19D14AF69856E04EA2347CCB88FBB3B265FBFB0A9FAE364A2E524224D5D51D303B389E0CC9
3,445,086 UART: [art] SIG.R = 517A5B4F9391D245C713C87EC595215FFB6C0CD3F475C2D75231D8C6093CAB0B3DDBC22F162F8BB19DC7F12130B6C390
3,451,857 UART: [art] SIG.S = BC67CD4215558E8F02E5770559C98443A0088B85CC921176B15302917C486D5B5879BFA74609EEEA6A27BB31A2D54E27
3,476,331 UART: Caliptra RT
3,476,676 UART: [state] CFI Enabled
3,584,981 UART: [rt] RT listening for mailbox commands...
3,585,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,755 UART: [rt]cmd =0x41544d4e, len=14344
3,853,320 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,426 ready_for_fw is high
1,363,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,916 >>> mbox cmd response: success
2,991,990 UART:
2,992,006 UART: Running Caliptra FMC ...
2,992,414 UART:
2,992,557 UART: [state] CFI Enabled
3,003,358 UART: [fht] FMC Alias Private Key: 7
3,111,109 UART: [art] Extend RT PCRs Done
3,111,537 UART: [art] Lock RT PCRs Done
3,113,013 UART: [art] Populate DV Done
3,121,090 UART: [fht] FMC Alias Private Key: 7
3,122,230 UART: [art] Derive CDI
3,122,510 UART: [art] Store in in slot 0x4
3,208,327 UART: [art] Derive Key Pair
3,208,687 UART: [art] Store priv key in slot 0x5
3,222,507 UART: [art] Derive Key Pair - Done
3,237,292 UART: [art] Signing Cert with AUTHO
3,237,772 UART: RITY.KEYID = 7
3,253,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,973 UART: [art] PUB.X = 387190F049CFBEFB7A8476C9084072179937DF9158A4F6A9CAF9ED8604D6A7347ADB06379156A81A8219457266264A22
3,260,726 UART: [art] PUB.Y = 4CABB9A823E08328E034158E7B4C3FB7ABFC6A1A8D7114E378F65FFCB8A89FFAF4B860CF856081462D0A353E5009FC4D
3,267,686 UART: [art] SIG.R = 930B38182AFB54BEB44E6B2550DA1ECD21CCDA50AEB84E8150EBA10208E231407B480DF2F017167DF823656333E66CF8
3,274,452 UART: [art] SIG.S = 4DD6FCB9B3A8185FDE3C806BBD154116F29D0929841C61BBED53DD1938DA2C0B35D237911A6068B1FA70398556B2FC3D
3,298,833 UART: Caliptra RT
3,299,178 UART: [state] CFI Enabled
3,407,991 UART: [rt] RT listening for mailbox commands...
3,408,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,055 UART: [rt]cmd =0x41544d4e, len=14344
3,676,678 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,409 UART: [cold-reset] ++
1,171,953 UART: [fht] FHT @ 0x50003400
1,174,526 UART: [idev] ++
1,174,694 UART: [idev] CDI.KEYID = 6
1,175,054 UART: [idev] SUBJECT.KEYID = 7
1,175,478 UART: [idev] UDS.KEYID = 0
1,175,823 ready_for_fw is high
1,175,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,275 UART: [idev] Sha1 KeyId Algorithm
1,208,681 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,330 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,281,922 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,168 >>> mbox cmd response: success
2,778,224 UART: [afmc] ++
2,778,392 UART: [afmc] CDI.KEYID = 6
2,778,754 UART: [afmc] SUBJECT.KEYID = 7
2,779,179 UART: [afmc] AUTHORITY.KEYID = 5
2,814,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,119 UART: [afmc] --
2,858,215 UART: [cold-reset] --
2,859,015 UART: [state] Locking Datavault
2,860,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,798 UART: [state] Locking ICCM
2,861,468 UART: [exit] Launching FMC @ 0x40000130
2,866,797 UART:
2,866,813 UART: Running Caliptra FMC ...
2,867,221 UART:
2,867,275 UART: [state] CFI Enabled
2,877,914 UART: [fht] FMC Alias Private Key: 7
2,986,223 UART: [art] Extend RT PCRs Done
2,986,651 UART: [art] Lock RT PCRs Done
2,988,111 UART: [art] Populate DV Done
2,996,362 UART: [fht] FMC Alias Private Key: 7
2,997,394 UART: [art] Derive CDI
2,997,674 UART: [art] Store in in slot 0x4
3,083,543 UART: [art] Derive Key Pair
3,083,903 UART: [art] Store priv key in slot 0x5
3,096,429 UART: [art] Derive Key Pair - Done
3,111,285 UART: [art] Signing Cert with AUTHO
3,111,765 UART: RITY.KEYID = 7
3,126,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,512 UART: [art] PUB.X = 8FDA91636032FB6D3FF7D32A7D20C0762E929531E801BA0618B23E7E87695AADFEA8A441740E589A998B7C2958460944
3,134,268 UART: [art] PUB.Y = B2A74AAD14A2C6B8CC48F9EA64D5173BB3B7E3C331D1694762FB67654081222D6D3CA05C93844CEBE5DD30B7E9EB9A12
3,141,232 UART: [art] SIG.R = ABFCAD44345C06E555FDE75135233E5A4A502403A5DCD9BA586ED1A91EEC0945F46CF91B7661A88C5D13366345936815
3,147,997 UART: [art] SIG.S = 76A3E79DEC49CE47EC5DCDBE929F3C90E7FE14D4D4EF51D7568176B3902A8288AD010AF12E1BDD63D7997A91952FC2A7
3,171,890 UART: Caliptra RT
3,172,143 UART: [state] CFI Enabled
3,280,216 UART: [rt] RT listening for mailbox commands...
3,280,886 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,746 UART: [rt]cmd =0x41544d4e, len=14344
3,548,915 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,367 ready_for_fw is high
1,060,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,767 >>> mbox cmd response: success
2,687,825 UART:
2,687,841 UART: Running Caliptra FMC ...
2,688,249 UART:
2,688,303 UART: [state] CFI Enabled
2,699,014 UART: [fht] FMC Alias Private Key: 7
2,806,331 UART: [art] Extend RT PCRs Done
2,806,759 UART: [art] Lock RT PCRs Done
2,808,537 UART: [art] Populate DV Done
2,816,732 UART: [fht] FMC Alias Private Key: 7
2,817,752 UART: [art] Derive CDI
2,818,032 UART: [art] Store in in slot 0x4
2,903,407 UART: [art] Derive Key Pair
2,903,767 UART: [art] Store priv key in slot 0x5
2,916,793 UART: [art] Derive Key Pair - Done
2,931,860 UART: [art] Signing Cert with AUTHO
2,932,340 UART: RITY.KEYID = 7
2,947,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,969 UART: [art] PUB.X = 868202A8F85F4953DB2E81EE5A7E235D0847771D085E9BC463A20049680E5557601B8038C996165AC4A371B3704FAA2D
2,954,697 UART: [art] PUB.Y = 9B955B7E2F69FF6D7EB2AD105A8D2BCEEF06C538A58E8A73D06F7B4BAFFC5E6F01DF1FF112AC16E8D0DA6E5241A60A5B
2,961,668 UART: [art] SIG.R = 2074272675CC04D81E4A67CFD265D57627960E6ADB7787CAFFF72767CF50729F99DDCFABC093C00ED4AECA08F29BA102
2,968,437 UART: [art] SIG.S = 44BBE3AEC2D23B2B730D011CEBFAC05EF3FDE6A03FC992CD198E623B6639AE51DCD05801A9B3B3C778A1CD39A344CD5D
2,992,605 UART: Caliptra RT
2,992,858 UART: [state] CFI Enabled
3,099,963 UART: [rt] RT listening for mailbox commands...
3,100,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,501 UART: [rt]cmd =0x41544d4e, len=14344
3,368,044 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,437 UART: [idev] ++
1,175,605 UART: [idev] CDI.KEYID = 6
1,175,965 UART: [idev] SUBJECT.KEYID = 7
1,176,389 UART: [idev] UDS.KEYID = 0
1,176,734 ready_for_fw is high
1,176,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,295 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,209,960 UART: [idev] --
1,211,000 UART: [ldev] ++
1,211,168 UART: [ldev] CDI.KEYID = 6
1,211,531 UART: [ldev] SUBJECT.KEYID = 5
1,211,957 UART: [ldev] AUTHORITY.KEYID = 7
1,212,420 UART: [ldev] FE.KEYID = 1
1,217,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,594 UART: [ldev] --
1,284,061 UART: [fwproc] Wait for Commands...
1,284,655 UART: [fwproc] Recv command 0x46574c44
1,285,383 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,083 >>> mbox cmd response: success
2,778,327 UART: [afmc] ++
2,778,495 UART: [afmc] CDI.KEYID = 6
2,778,857 UART: [afmc] SUBJECT.KEYID = 7
2,779,282 UART: [afmc] AUTHORITY.KEYID = 5
2,815,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,622 UART: [afmc] --
2,858,748 UART: [cold-reset] --
2,859,606 UART: [state] Locking Datavault
2,860,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,439 UART: [state] Locking ICCM
2,861,967 UART: [exit] Launching FMC @ 0x40000130
2,867,296 UART:
2,867,312 UART: Running Caliptra FMC ...
2,867,720 UART:
2,867,863 UART: [state] CFI Enabled
2,878,704 UART: [fht] FMC Alias Private Key: 7
2,986,161 UART: [art] Extend RT PCRs Done
2,986,589 UART: [art] Lock RT PCRs Done
2,987,851 UART: [art] Populate DV Done
2,996,112 UART: [fht] FMC Alias Private Key: 7
2,997,192 UART: [art] Derive CDI
2,997,472 UART: [art] Store in in slot 0x4
3,083,185 UART: [art] Derive Key Pair
3,083,545 UART: [art] Store priv key in slot 0x5
3,096,975 UART: [art] Derive Key Pair - Done
3,112,145 UART: [art] Signing Cert with AUTHO
3,112,625 UART: RITY.KEYID = 7
3,128,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,790 UART: [art] PUB.X = 04DA42E30C681B64FE38A04E73761333CB95AA311F0DD9A94604BB3D6DBA63110AF5FA297339A1AF3089C3918655E49F
3,135,549 UART: [art] PUB.Y = C6DD6891CA7E24052979962CA56FCB033E891C86B1678553B4A009D7C09C62978C7BDA6B490DE0DC254DEE1698A23E0C
3,142,490 UART: [art] SIG.R = 994DE619E24A9102E7E1FF8E645E07F48EB4CE29F3EE1F12131D1058A2D3AA85F493E035751C2ED0516BA287F087893C
3,149,258 UART: [art] SIG.S = 9300126CF86FD25BBDB7CA833C843E792F79EC5C4458187A0DEE8FD975F2A2FE2E4CCF692BCFDB278676C61603C08094
3,174,069 UART: Caliptra RT
3,174,414 UART: [state] CFI Enabled
3,282,260 UART: [rt] RT listening for mailbox commands...
3,282,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,778 UART: [rt]cmd =0x41544d4e, len=14344
3,550,629 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,470 ready_for_fw is high
1,060,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,888 >>> mbox cmd response: success
2,691,420 UART:
2,691,436 UART: Running Caliptra FMC ...
2,691,844 UART:
2,691,987 UART: [state] CFI Enabled
2,702,536 UART: [fht] FMC Alias Private Key: 7
2,810,575 UART: [art] Extend RT PCRs Done
2,811,003 UART: [art] Lock RT PCRs Done
2,812,551 UART: [art] Populate DV Done
2,820,768 UART: [fht] FMC Alias Private Key: 7
2,821,912 UART: [art] Derive CDI
2,822,192 UART: [art] Store in in slot 0x4
2,907,599 UART: [art] Derive Key Pair
2,907,959 UART: [art] Store priv key in slot 0x5
2,920,919 UART: [art] Derive Key Pair - Done
2,935,579 UART: [art] Signing Cert with AUTHO
2,936,059 UART: RITY.KEYID = 7
2,951,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,154 UART: [art] PUB.X = 3D0B84AA0D8BE8B99D544DF522088155A9442C6DE5868B3DFD82EAB1EE34A278E2399C3277E713EAC47ABA8DC86FF045
2,958,929 UART: [art] PUB.Y = 68E39D0925A18A46D1FE379D0BF933CE58628ED49D1426DB99FDC8F6209F4A07D6FD3A9CD6C51FD07C863A7A07F8F4CB
2,965,883 UART: [art] SIG.R = 45F5B50E9487A1EF705AFCCEDA6FF1FDB71C0302E25AD768C784D1CA2D37CBF90336B5140E1DEEF760B17201415EDF5E
2,972,655 UART: [art] SIG.S = 9DCB1BCE746D458B0E813B114058925B211F7F1FB2002676B37228C6DC532FEE058BBB726180C5BA40D6ABE399B2CFD8
2,996,602 UART: Caliptra RT
2,996,947 UART: [state] CFI Enabled
3,104,528 UART: [rt] RT listening for mailbox commands...
3,105,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,146 UART: [rt]cmd =0x41544d4e, len=14344
3,372,753 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,860 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,759 UART: [idev] ++
1,172,927 UART: [idev] CDI.KEYID = 6
1,173,288 UART: [idev] SUBJECT.KEYID = 7
1,173,713 UART: [idev] UDS.KEYID = 0
1,174,059 ready_for_fw is high
1,174,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,221 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,300 UART: [ldev] ++
1,209,468 UART: [ldev] CDI.KEYID = 6
1,209,832 UART: [ldev] SUBJECT.KEYID = 5
1,210,259 UART: [ldev] AUTHORITY.KEYID = 7
1,210,722 UART: [ldev] FE.KEYID = 1
1,215,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,140 >>> mbox cmd response: success
2,774,295 UART: [afmc] ++
2,774,463 UART: [afmc] CDI.KEYID = 6
2,774,826 UART: [afmc] SUBJECT.KEYID = 7
2,775,252 UART: [afmc] AUTHORITY.KEYID = 5
2,810,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,266 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,878 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,522 UART: [afmc] --
2,853,574 UART: [cold-reset] --
2,854,550 UART: [state] Locking Datavault
2,855,537 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,141 UART: [state] Locking ICCM
2,856,791 UART: [exit] Launching FMC @ 0x40000130
2,862,120 UART:
2,862,136 UART: Running Caliptra FMC ...
2,862,544 UART:
2,862,598 UART: [state] CFI Enabled
2,873,115 UART: [fht] FMC Alias Private Key: 7
2,980,514 UART: [art] Extend RT PCRs Done
2,980,942 UART: [art] Lock RT PCRs Done
2,982,152 UART: [art] Populate DV Done
2,990,353 UART: [fht] FMC Alias Private Key: 7
2,991,291 UART: [art] Derive CDI
2,991,571 UART: [art] Store in in slot 0x4
3,076,858 UART: [art] Derive Key Pair
3,077,218 UART: [art] Store priv key in slot 0x5
3,090,392 UART: [art] Derive Key Pair - Done
3,105,597 UART: [art] Signing Cert with AUTHO
3,106,077 UART: RITY.KEYID = 7
3,121,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,190 UART: [art] PUB.X = 0A0B75EAC9B8B853E397CE59390A5D67B8066E2B323E7594989F06ACE3B60CEBDD1DF359D737B6DBED9627185CB59732
3,128,952 UART: [art] PUB.Y = 37C3DCE28115859424CC0F1A3DBF060AB4C9735EC6721D9B25DBE9A2E5E7370599DDFEA37AD5CC2AF2C66BB38F1A5223
3,135,908 UART: [art] SIG.R = BD611A703C117D2CBDFA9817D44E7B253A911B9523A15F3E1287C4F79361B6521CF92DD1517E7B73693BE47ABF294E79
3,142,682 UART: [art] SIG.S = 83ED8CB9B9409140D02D9167E7C24AF69387A5FB270099473B0E3E4D94A4F47BC0996F7F55548DDF03FABD3DD64AD317
3,166,681 UART: Caliptra RT
3,166,934 UART: [state] CFI Enabled
3,275,322 UART: [rt] RT listening for mailbox commands...
3,275,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,672 UART: [rt]cmd =0x41544d4e, len=14344
3,543,065 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,872 ready_for_fw is high
1,055,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,772 >>> mbox cmd response: success
2,686,124 UART:
2,686,140 UART: Running Caliptra FMC ...
2,686,548 UART:
2,686,602 UART: [state] CFI Enabled
2,696,705 UART: [fht] FMC Alias Private Key: 7
2,804,268 UART: [art] Extend RT PCRs Done
2,804,696 UART: [art] Lock RT PCRs Done
2,806,320 UART: [art] Populate DV Done
2,814,525 UART: [fht] FMC Alias Private Key: 7
2,815,641 UART: [art] Derive CDI
2,815,921 UART: [art] Store in in slot 0x4
2,901,260 UART: [art] Derive Key Pair
2,901,620 UART: [art] Store priv key in slot 0x5
2,914,458 UART: [art] Derive Key Pair - Done
2,928,905 UART: [art] Signing Cert with AUTHO
2,929,385 UART: RITY.KEYID = 7
2,944,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,658 UART: [art] PUB.X = 211C42D3FA9CAF7B226AC45B27E5EACC33C8E255AAAF059594344DEA978C7F95331A63486B074F52C783417FB8C58640
2,952,428 UART: [art] PUB.Y = 5C02E8C0D1468E58E9CE5CC04A10BF775D856E99C44547BD434F4BB7F9FA774EAB27A896E971EC2F67451EF3BC6D6983
2,959,387 UART: [art] SIG.R = D2905B49BB5BE95BEC5F9170C8F35F66541AC2F4E2EA9DA3FD52A6B4E8045A1B0A5C785A6E79B43128525D659B9AE861
2,966,163 UART: [art] SIG.S = AC88AB2C681B0E8F5228311CEEE8BA8D9B5880CBF7C6EEC7F59A9A330B80F03AAE981E3C1F7FC1DE94D07DFDDB57EB45
2,989,894 UART: Caliptra RT
2,990,147 UART: [state] CFI Enabled
3,097,687 UART: [rt] RT listening for mailbox commands...
3,098,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,765 UART: [rt]cmd =0x41544d4e, len=14344
3,366,118 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,246 UART: [state] WD Timer not started. Device not locked for debugging
88,385 UART: [kat] SHA2-256
891,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,064 UART: [kat] ++
896,216 UART: [kat] sha1
900,630 UART: [kat] SHA2-256
902,570 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
916,783 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,640 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,175,070 ready_for_fw is high
1,175,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,956 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,927 UART: [ldev] --
1,283,369 UART: [fwproc] Wait for Commands...
1,284,132 UART: [fwproc] Recv command 0x46574c44
1,284,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,441 >>> mbox cmd response: success
2,777,518 UART: [afmc] ++
2,777,686 UART: [afmc] CDI.KEYID = 6
2,778,049 UART: [afmc] SUBJECT.KEYID = 7
2,778,475 UART: [afmc] AUTHORITY.KEYID = 5
2,813,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,329 UART: [afmc] --
2,857,377 UART: [cold-reset] --
2,858,125 UART: [state] Locking Datavault
2,859,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,100 UART: [state] Locking ICCM
2,860,676 UART: [exit] Launching FMC @ 0x40000130
2,866,005 UART:
2,866,021 UART: Running Caliptra FMC ...
2,866,429 UART:
2,866,572 UART: [state] CFI Enabled
2,876,929 UART: [fht] FMC Alias Private Key: 7
2,984,462 UART: [art] Extend RT PCRs Done
2,984,890 UART: [art] Lock RT PCRs Done
2,986,366 UART: [art] Populate DV Done
2,994,469 UART: [fht] FMC Alias Private Key: 7
2,995,495 UART: [art] Derive CDI
2,995,775 UART: [art] Store in in slot 0x4
3,081,276 UART: [art] Derive Key Pair
3,081,636 UART: [art] Store priv key in slot 0x5
3,095,728 UART: [art] Derive Key Pair - Done
3,110,483 UART: [art] Signing Cert with AUTHO
3,110,963 UART: RITY.KEYID = 7
3,126,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,848 UART: [art] PUB.X = 35B2ECB23B483E673586DF15846AAFC97AE618313251A42045B88ED600F635151BD946ACCCECA942395EF0534C79E557
3,133,598 UART: [art] PUB.Y = 60FB0C45F1B9FFE1D57ABF3202FF57AF900B6D4421DA1B38519F97347358020B9596469C36542412E3FCC68345ADB763
3,140,533 UART: [art] SIG.R = F4E055834A68DD434852CB8C8F9B1277B57D8DA083FC8B742BE45AE3CDBA8059F59C19F5717C9B368E0887470E768AB5
3,147,303 UART: [art] SIG.S = B43AD4934449148C3A22F2FA560B1FA3C38E3C0C2B873D12D111B6F504E9B79780AD6F093BD154C0BDAF3058BDD76786
3,170,904 UART: Caliptra RT
3,171,249 UART: [state] CFI Enabled
3,279,757 UART: [rt] RT listening for mailbox commands...
3,280,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,607 UART: [rt]cmd =0x41544d4e, len=14344
3,547,866 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,589 ready_for_fw is high
1,056,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,309 >>> mbox cmd response: success
2,687,801 UART:
2,687,817 UART: Running Caliptra FMC ...
2,688,225 UART:
2,688,368 UART: [state] CFI Enabled
2,699,153 UART: [fht] FMC Alias Private Key: 7
2,807,492 UART: [art] Extend RT PCRs Done
2,807,920 UART: [art] Lock RT PCRs Done
2,809,312 UART: [art] Populate DV Done
2,817,421 UART: [fht] FMC Alias Private Key: 7
2,818,501 UART: [art] Derive CDI
2,818,781 UART: [art] Store in in slot 0x4
2,904,560 UART: [art] Derive Key Pair
2,904,920 UART: [art] Store priv key in slot 0x5
2,918,170 UART: [art] Derive Key Pair - Done
2,933,005 UART: [art] Signing Cert with AUTHO
2,933,485 UART: RITY.KEYID = 7
2,948,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,508 UART: [art] PUB.X = D49A3DA94AD09830FD6FA70A298A7A501BB5210DB319CB4D57911FA8A9BECC1E27DD014F9CF3C563F297AB5C87F6C8FC
2,956,291 UART: [art] PUB.Y = 0A30A838D78CFEFD82D5FAD35C10C6BC4D980AEC6CF903663FC051E9B4A48192F9D978BB10B0D9C4D0E423EED5AA581D
2,963,254 UART: [art] SIG.R = E11DF5BDF5955645D74DDB8A3804F1B9A0A7BD6D559252A9BF56494F4E5803DF3FC7E65B3613BA3296753F67600BAF9C
2,970,025 UART: [art] SIG.S = 9E78941D91EB3CE9AD148BCCBF5223332892F5D72BFA205C1261994C99F2EBDDEBC3A4DF0C5CDEA1F8E2DB06CEE7F901
2,993,609 UART: Caliptra RT
2,993,954 UART: [state] CFI Enabled
3,101,434 UART: [rt] RT listening for mailbox commands...
3,102,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,060 UART: [rt]cmd =0x41544d4e, len=14344
3,370,229 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,097 UART:
192,456 UART: Running Caliptra ROM ...
193,647 UART:
193,800 UART: [state] CFI Enabled
263,934 UART: [state] LifecycleState = Unprovisioned
265,906 UART: [state] DebugLocked = No
267,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,815 UART: [kat] SHA2-256
442,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,007 UART: [kat] ++
453,509 UART: [kat] sha1
466,091 UART: [kat] SHA2-256
468,743 UART: [kat] SHA2-384
473,523 UART: [kat] SHA2-512-ACC
475,955 UART: [kat] ECC-384
2,769,137 UART: [kat] HMAC-384Kdf
2,799,222 UART: [kat] LMS
3,989,518 UART: [kat] --
3,993,024 UART: [cold-reset] ++
3,995,591 UART: [fht] Storing FHT @ 0x50003400
4,007,705 UART: [idev] ++
4,008,276 UART: [idev] CDI.KEYID = 6
4,009,238 UART: [idev] SUBJECT.KEYID = 7
4,010,502 UART: [idev] UDS.KEYID = 0
4,011,481 ready_for_fw is high
4,011,675 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,709 UART: [idev] Erasing UDS.KEYID = 0
7,348,311 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,591 UART: [idev] --
7,376,073 UART: [ldev] ++
7,376,645 UART: [ldev] CDI.KEYID = 6
7,377,633 UART: [ldev] SUBJECT.KEYID = 5
7,378,737 UART: [ldev] AUTHORITY.KEYID = 7
7,380,085 UART: [ldev] FE.KEYID = 1
7,422,268 UART: [ldev] Erasing FE.KEYID = 1
10,759,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,818 UART: [ldev] --
13,136,110 UART: [fwproc] Waiting for Commands...
13,138,420 UART: [fwproc] Received command 0x46574c44
13,140,596 UART: [fwproc] Received Image of size 114124 bytes
17,194,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,916 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,655,257 >>> mbox cmd response: success
17,658,707 UART: [afmc] ++
17,659,312 UART: [afmc] CDI.KEYID = 6
17,660,227 UART: [afmc] SUBJECT.KEYID = 7
17,661,446 UART: [afmc] AUTHORITY.KEYID = 5
21,028,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,999 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,248 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,717 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,516 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,952 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,326 UART: [afmc] --
23,400,816 UART: [cold-reset] --
23,403,600 UART: [state] Locking Datavault
23,409,820 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,577 UART: [state] Locking ICCM
23,412,594 UART: [exit] Launching FMC @ 0x40000130
23,420,988 UART:
23,421,223 UART: Running Caliptra FMC ...
23,422,321 UART:
23,422,481 UART: [state] CFI Enabled
23,489,806 UART: [fht] FMC Alias Private Key: 7
25,827,700 UART: [art] Extend RT PCRs Done
25,828,929 UART: [art] Lock RT PCRs Done
25,830,633 UART: [art] Populate DV Done
25,835,993 UART: [fht] FMC Alias Private Key: 7
25,837,637 UART: [art] Derive CDI
25,838,451 UART: [art] Store in in slot 0x4
25,897,548 UART: [art] Derive Key Pair
25,898,584 UART: [art] Store priv key in slot 0x5
29,191,344 UART: [art] Derive Key Pair - Done
29,204,232 UART: [art] Signing Cert with AUTHO
29,205,536 UART: RITY.KEYID = 7
31,494,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,593 UART: [art] PUB.X = BE0554CC31C5C8AF64F7C8C61FA48B3352C626733CBCDFE5CB14938FDFD315283BB6093601D1D72C9509D4C1CE46FD94
31,502,839 UART: [art] PUB.Y = A89A21DEB655A43577CA2F235D5FA4BFB2D170A4772B46015A8FA16FD720E99F10335D0CAB81BC20D9711EC61932841C
31,510,089 UART: [art] SIG.R = 57048E1A6691A7E2F807ABA40EEC2D456EDF44CD2852F60CC5D523CB2EE4836DF9A25B6DF15CA670A221F715F3085754
31,517,434 UART: [art] SIG.S = 832F85DDBCFE41C6C6E16E3737B35430696ABF87BB015574DA345DEC2F9A29BF3D7D9FC50A5F6849C08B887E04C1F1AA
32,822,900 UART: Caliptra RT
32,823,608 UART: [state] CFI Enabled
32,984,804 UART: [rt] RT listening for mailbox commands...
32,986,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,017,399 UART: [rt]cmd =0x44504543, len=96
38,781,513 >>> mbox cmd response data (6236 bytes)
38,811,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,841,927 UART: [rt]cmd =0x53574545, len=84
44,428,674 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,784,766 ready_for_fw is high
3,785,153 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,883,478 >>> mbox cmd response: success
23,569,992 UART:
23,570,383 UART: Running Caliptra FMC ...
23,571,515 UART:
23,571,672 UART: [state] CFI Enabled
23,639,175 UART: [fht] FMC Alias Private Key: 7
25,976,609 UART: [art] Extend RT PCRs Done
25,977,831 UART: [art] Lock RT PCRs Done
25,979,566 UART: [art] Populate DV Done
25,984,935 UART: [fht] FMC Alias Private Key: 7
25,986,594 UART: [art] Derive CDI
25,987,411 UART: [art] Store in in slot 0x4
26,047,010 UART: [art] Derive Key Pair
26,048,060 UART: [art] Store priv key in slot 0x5
29,340,490 UART: [art] Derive Key Pair - Done
29,353,429 UART: [art] Signing Cert with AUTHO
29,354,731 UART: RITY.KEYID = 7
31,641,949 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,449 UART: [art] PUB.X = 112C9C2F8BCB77798FEA47C32686B1F3CCF6E63739AFED8382CA5AD91143529552F61B3E34B0ACDDCE9019D6E3B469B2
31,650,716 UART: [art] PUB.Y = 272B1DCED16DF52B3009B063A467DC49A78F4895ADFE63128DF4CF2A85442C16E6AF1D472EA9FFF2C367698E366C65C7
31,657,946 UART: [art] SIG.R = 483D06634D5B9C523CF051C78647969A7D20494C9BA168F9D3DFF7AD31F42528CB534026C139E3CAE0601C2F4D650DF2
31,665,345 UART: [art] SIG.S = AE88B3B084D3A6F675F72CE452C1C6467961D8B8846158CC4146D596D833883C36F84C71B609DD1F4917765CFA533A28
32,970,182 UART: Caliptra RT
32,970,893 UART: [state] CFI Enabled
33,132,807 UART: [rt] RT listening for mailbox commands...
33,134,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,165,280 UART: [rt]cmd =0x44504543, len=96
38,910,708 >>> mbox cmd response data (6236 bytes)
38,941,056 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,971,627 UART: [rt]cmd =0x53574545, len=84
44,561,244 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,434 UART:
192,798 UART: Running Caliptra ROM ...
193,896 UART:
603,573 UART: [state] CFI Enabled
614,760 UART: [state] LifecycleState = Unprovisioned
616,913 UART: [state] DebugLocked = No
619,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,110 UART: [kat] SHA2-256
793,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,405 UART: [kat] ++
804,956 UART: [kat] sha1
815,185 UART: [kat] SHA2-256
817,919 UART: [kat] SHA2-384
824,759 UART: [kat] SHA2-512-ACC
827,119 UART: [kat] ECC-384
3,114,674 UART: [kat] HMAC-384Kdf
3,126,243 UART: [kat] LMS
4,316,309 UART: [kat] --
4,319,387 UART: [cold-reset] ++
4,320,253 UART: [fht] Storing FHT @ 0x50003400
4,331,020 UART: [idev] ++
4,331,585 UART: [idev] CDI.KEYID = 6
4,332,461 UART: [idev] SUBJECT.KEYID = 7
4,333,767 UART: [idev] UDS.KEYID = 0
4,334,824 ready_for_fw is high
4,335,050 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,443 UART: [idev] Erasing UDS.KEYID = 0
7,620,069 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,121 UART: [idev] --
7,646,372 UART: [ldev] ++
7,646,989 UART: [ldev] CDI.KEYID = 6
7,647,966 UART: [ldev] SUBJECT.KEYID = 5
7,649,118 UART: [ldev] AUTHORITY.KEYID = 7
7,650,395 UART: [ldev] FE.KEYID = 1
7,661,208 UART: [ldev] Erasing FE.KEYID = 1
10,947,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,576 UART: [ldev] --
13,310,105 UART: [fwproc] Waiting for Commands...
13,312,620 UART: [fwproc] Received command 0x46574c44
13,314,792 UART: [fwproc] Received Image of size 114124 bytes
17,371,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,885 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,493 >>> mbox cmd response: success
17,832,909 UART: [afmc] ++
17,833,542 UART: [afmc] CDI.KEYID = 6
17,834,426 UART: [afmc] SUBJECT.KEYID = 7
17,835,690 UART: [afmc] AUTHORITY.KEYID = 5
21,156,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,772 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,093 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,439 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,259 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,743 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,896 UART: [afmc] --
23,523,244 UART: [cold-reset] --
23,528,142 UART: [state] Locking Datavault
23,532,360 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,117 UART: [state] Locking ICCM
23,535,882 UART: [exit] Launching FMC @ 0x40000130
23,544,221 UART:
23,544,449 UART: Running Caliptra FMC ...
23,545,546 UART:
23,545,701 UART: [state] CFI Enabled
23,553,741 UART: [fht] FMC Alias Private Key: 7
25,884,966 UART: [art] Extend RT PCRs Done
25,886,196 UART: [art] Lock RT PCRs Done
25,888,276 UART: [art] Populate DV Done
25,893,632 UART: [fht] FMC Alias Private Key: 7
25,895,274 UART: [art] Derive CDI
25,896,079 UART: [art] Store in in slot 0x4
25,938,504 UART: [art] Derive Key Pair
25,939,534 UART: [art] Store priv key in slot 0x5
29,181,792 UART: [art] Derive Key Pair - Done
29,195,056 UART: [art] Signing Cert with AUTHO
29,196,364 UART: RITY.KEYID = 7
31,475,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,362 UART: [art] PUB.X = 6C2B3A05C1CA8FCF9FEB6C96C15CA36B365C0BA08F3E92AACB9A01E318E13A0A0F4FB414C244077C2DE87AF3AB010EF5
31,484,648 UART: [art] PUB.Y = 2BD7C36A2EADEA7F7F622ADB99D5C963890BDB9FE146807F9824C496C31202C039D6AAB71ED7725160021672DC1A55FA
31,491,916 UART: [art] SIG.R = 321D34EBE28BC69D3C9E9090AE745E1D31A991B10C106268556F8D1928F6F9366A940226C7D543CE753EE7722275F82B
31,499,273 UART: [art] SIG.S = 120C5F03E0F58890178401A09797E1842F124D8D7AC2087EF8EF61797E1F9BBB474A408E9F9286CBD7D27AC2D7296724
32,804,297 UART: Caliptra RT
32,805,006 UART: [state] CFI Enabled
32,923,643 UART: [rt] RT listening for mailbox commands...
32,925,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,956,014 UART: [rt]cmd =0x44504543, len=96
38,627,977 >>> mbox cmd response data (6236 bytes)
38,657,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,688,090 UART: [rt]cmd =0x53574545, len=84
44,213,420 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
4,126,935 ready_for_fw is high
4,127,525 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,551 >>> mbox cmd response: success
23,702,219 UART:
23,702,608 UART: Running Caliptra FMC ...
23,703,713 UART:
23,703,858 UART: [state] CFI Enabled
23,711,924 UART: [fht] FMC Alias Private Key: 7
26,042,685 UART: [art] Extend RT PCRs Done
26,043,915 UART: [art] Lock RT PCRs Done
26,045,406 UART: [art] Populate DV Done
26,050,766 UART: [fht] FMC Alias Private Key: 7
26,052,469 UART: [art] Derive CDI
26,053,202 UART: [art] Store in in slot 0x4
26,095,810 UART: [art] Derive Key Pair
26,096,886 UART: [art] Store priv key in slot 0x5
29,339,071 UART: [art] Derive Key Pair - Done
29,352,182 UART: [art] Signing Cert with AUTHO
29,353,481 UART: RITY.KEYID = 7
31,632,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,223 UART: [art] PUB.X = 7FEB2BAB6FC17BF75A99E72A9499478FEDD74E552F0B78D3ECFA10FF88DF9C195BEAD7887BFDC788B493C09E8B59639E
31,641,471 UART: [art] PUB.Y = CCE77CFD010A9127618168DE3A5E8F2D76A2AECAF26796A0F87079FD66A7A07940E699F7D5DB18CD79A5A01C037A3309
31,648,739 UART: [art] SIG.R = 0491D212BF62E525B4FEF36BAE1A708809618D355526B2E4446E3D28384C7C752589C843C3BBF98461C96E78752AA209
31,656,100 UART: [art] SIG.S = 219F7B96B4E9D968D6EF52A01323D0B6D9712FF77BB2D521CCAE032059EFA1F833F742064886A15C778BE6BE070AF09C
32,961,452 UART: Caliptra RT
32,962,149 UART: [state] CFI Enabled
33,080,097 UART: [rt] RT listening for mailbox commands...
33,082,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,112,722 UART: [rt]cmd =0x44504543, len=96
38,784,307 >>> mbox cmd response data (6236 bytes)
38,814,266 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,844,844 UART: [rt]cmd =0x53574545, len=84
44,369,130 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,110 UART:
192,472 UART: Running Caliptra ROM ...
193,656 UART:
193,814 UART: [state] CFI Enabled
263,356 UART: [state] LifecycleState = Unprovisioned
265,256 UART: [state] DebugLocked = No
267,719 UART: [state] WD Timer not started. Device not locked for debugging
271,827 UART: [kat] SHA2-256
450,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,473 UART: [kat] ++
463,013 UART: [kat] sha1
475,045 UART: [kat] SHA2-256
478,125 UART: [kat] SHA2-384
484,748 UART: [kat] SHA2-512-ACC
487,747 UART: [kat] ECC-384
2,949,069 UART: [kat] HMAC-384Kdf
2,970,624 UART: [kat] LMS
3,500,103 UART: [kat] --
3,503,886 UART: [cold-reset] ++
3,505,457 UART: [fht] FHT @ 0x50003400
3,516,146 UART: [idev] ++
3,516,707 UART: [idev] CDI.KEYID = 6
3,517,614 UART: [idev] SUBJECT.KEYID = 7
3,518,790 UART: [idev] UDS.KEYID = 0
3,519,839 ready_for_fw is high
3,520,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,965 UART: [idev] Erasing UDS.KEYID = 0
6,024,379 UART: [idev] Sha1 KeyId Algorithm
6,047,013 UART: [idev] --
6,051,604 UART: [ldev] ++
6,052,178 UART: [ldev] CDI.KEYID = 6
6,053,113 UART: [ldev] SUBJECT.KEYID = 5
6,054,275 UART: [ldev] AUTHORITY.KEYID = 7
6,055,508 UART: [ldev] FE.KEYID = 1
6,098,710 UART: [ldev] Erasing FE.KEYID = 1
8,599,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,039 UART: [ldev] --
10,413,464 UART: [fwproc] Wait for Commands...
10,415,660 UART: [fwproc] Recv command 0x46574c44
10,417,754 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,170 >>> mbox cmd response: success
14,279,121 UART: [afmc] ++
14,279,715 UART: [afmc] CDI.KEYID = 6
14,280,622 UART: [afmc] SUBJECT.KEYID = 7
14,281,781 UART: [afmc] AUTHORITY.KEYID = 5
16,802,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,317 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,675 UART: [afmc] --
18,605,486 UART: [cold-reset] --
18,609,017 UART: [state] Locking Datavault
18,614,748 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,455 UART: [state] Locking ICCM
18,618,525 UART: [exit] Launching FMC @ 0x40000130
18,626,936 UART:
18,627,174 UART: Running Caliptra FMC ...
18,628,275 UART:
18,628,446 UART: [state] CFI Enabled
18,687,616 UART: [fht] FMC Alias Private Key: 7
20,451,442 UART: [art] Extend RT PCRs Done
20,452,664 UART: [art] Lock RT PCRs Done
20,454,290 UART: [art] Populate DV Done
20,459,866 UART: [fht] FMC Alias Private Key: 7
20,461,487 UART: [art] Derive CDI
20,462,305 UART: [art] Store in in slot 0x4
20,520,153 UART: [art] Derive Key Pair
20,521,153 UART: [art] Store priv key in slot 0x5
22,984,317 UART: [art] Derive Key Pair - Done
22,997,142 UART: [art] Signing Cert with AUTHO
22,998,455 UART: RITY.KEYID = 7
24,709,282 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,776 UART: [art] PUB.X = F677E6C390DC65EAF69087A6DA2BA4D60B1B1767091DFDC13E9604E9A1657AB06AE98E29710B6B6FB1CB2C51A96A121B
24,718,074 UART: [art] PUB.Y = 3FF48F41D452CCC50AC8D3DAF6C359444C9E202FD609F43446480A1AB49F891C5524F7EBE86619D188B4A57DE53DE423
24,725,366 UART: [art] SIG.R = 1BDEBDA70D6D2C10AAFF97ACA91AF9752F97ED7D87ADD2ADEEEB774FE3E0317246C4892CAA06CE48B2581B56CAC2C0E5
24,732,808 UART: [art] SIG.S = E69539E7C25BE5CFE070B58C7405CB6A31596B387E4E05C8C56BF653F3ABE5AB6B5A4124A634E26DA28306D129B587B5
25,711,851 UART: Caliptra RT
25,712,558 UART: [state] CFI Enabled
25,876,976 UART: [rt] RT listening for mailbox commands...
25,878,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,909,850 UART: [rt]cmd =0x44504543, len=96
30,267,460 >>> mbox cmd response data (6236 bytes)
30,296,846 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,327,778 UART: [rt]cmd =0x53574545, len=84
34,505,183 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,371,476 ready_for_fw is high
3,371,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,059,639 >>> mbox cmd response: success
18,353,623 UART:
18,354,031 UART: Running Caliptra FMC ...
18,355,187 UART:
18,355,352 UART: [state] CFI Enabled
18,420,856 UART: [fht] FMC Alias Private Key: 7
20,185,184 UART: [art] Extend RT PCRs Done
20,186,400 UART: [art] Lock RT PCRs Done
20,188,241 UART: [art] Populate DV Done
20,193,606 UART: [fht] FMC Alias Private Key: 7
20,195,213 UART: [art] Derive CDI
20,196,029 UART: [art] Store in in slot 0x4
20,254,149 UART: [art] Derive Key Pair
20,255,153 UART: [art] Store priv key in slot 0x5
22,718,824 UART: [art] Derive Key Pair - Done
22,731,549 UART: [art] Signing Cert with AUTHO
22,732,881 UART: RITY.KEYID = 7
24,444,719 UART: [art] Erasing AUTHORITY.KEYID = 7
24,446,226 UART: [art] PUB.X = 7AC5066AE68A8988F5B469D727B795A456DD83EA1B2EAAB2C2EDC8B89EB85E22A63155EE1F49C7165C02A022D98771DF
24,453,550 UART: [art] PUB.Y = 730CF9204CC47762CBDD82C9FA1167C7DFEE7EC03D0329A1A5BE9D6146EF4AFA75FFE93590FB63E716A5CCB46A79F7A0
24,460,825 UART: [art] SIG.R = 577B23A4BA19637690F93718B8606AEF266D0F6980B36451A359806E36BFAF43A02A06660D9A0769208EE26E3B47C18A
24,468,170 UART: [art] SIG.S = 9129EA4F5E405779CF8F453048F0EE80A33F555721A64D5F96D2D3CF578DB7E99E545F96562D9B6BC8AAFDF2A95899C1
25,447,312 UART: Caliptra RT
25,448,024 UART: [state] CFI Enabled
25,612,287 UART: [rt] RT listening for mailbox commands...
25,614,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,645,510 UART: [rt]cmd =0x44504543, len=96
30,001,922 >>> mbox cmd response data (6236 bytes)
30,031,898 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,062,573 UART: [rt]cmd =0x53574545, len=84
34,240,920 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,404 UART:
192,776 UART: Running Caliptra ROM ...
193,973 UART:
603,466 UART: [state] CFI Enabled
619,851 UART: [state] LifecycleState = Unprovisioned
621,758 UART: [state] DebugLocked = No
623,074 UART: [state] WD Timer not started. Device not locked for debugging
627,059 UART: [kat] SHA2-256
806,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,804 UART: [kat] ++
818,341 UART: [kat] sha1
830,213 UART: [kat] SHA2-256
833,215 UART: [kat] SHA2-384
840,541 UART: [kat] SHA2-512-ACC
843,538 UART: [kat] ECC-384
3,284,524 UART: [kat] HMAC-384Kdf
3,297,752 UART: [kat] LMS
3,827,245 UART: [kat] --
3,832,964 UART: [cold-reset] ++
3,834,616 UART: [fht] FHT @ 0x50003400
3,844,377 UART: [idev] ++
3,844,943 UART: [idev] CDI.KEYID = 6
3,845,851 UART: [idev] SUBJECT.KEYID = 7
3,847,112 UART: [idev] UDS.KEYID = 0
3,848,042 ready_for_fw is high
3,848,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,078 UART: [idev] Erasing UDS.KEYID = 0
6,322,940 UART: [idev] Sha1 KeyId Algorithm
6,345,244 UART: [idev] --
6,348,584 UART: [ldev] ++
6,349,148 UART: [ldev] CDI.KEYID = 6
6,350,051 UART: [ldev] SUBJECT.KEYID = 5
6,351,259 UART: [ldev] AUTHORITY.KEYID = 7
6,352,480 UART: [ldev] FE.KEYID = 1
6,363,113 UART: [ldev] Erasing FE.KEYID = 1
8,836,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,323 UART: [ldev] --
10,628,587 UART: [fwproc] Wait for Commands...
10,631,533 UART: [fwproc] Recv command 0x46574c44
10,633,616 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,870 >>> mbox cmd response: success
14,500,934 UART: [afmc] ++
14,501,522 UART: [afmc] CDI.KEYID = 6
14,502,575 UART: [afmc] SUBJECT.KEYID = 7
14,503,673 UART: [afmc] AUTHORITY.KEYID = 5
17,003,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,055 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,198 UART: [afmc] --
18,803,401 UART: [cold-reset] --
18,808,229 UART: [state] Locking Datavault
18,812,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,241 UART: [state] Locking ICCM
18,816,818 UART: [exit] Launching FMC @ 0x40000130
18,825,260 UART:
18,825,488 UART: Running Caliptra FMC ...
18,826,643 UART:
18,826,800 UART: [state] CFI Enabled
18,834,540 UART: [fht] FMC Alias Private Key: 7
20,590,713 UART: [art] Extend RT PCRs Done
20,591,927 UART: [art] Lock RT PCRs Done
20,593,649 UART: [art] Populate DV Done
20,599,279 UART: [fht] FMC Alias Private Key: 7
20,600,873 UART: [art] Derive CDI
20,601,601 UART: [art] Store in in slot 0x4
20,643,971 UART: [art] Derive Key Pair
20,645,008 UART: [art] Store priv key in slot 0x5
23,071,609 UART: [art] Derive Key Pair - Done
23,084,343 UART: [art] Signing Cert with AUTHO
23,085,646 UART: RITY.KEYID = 7
24,791,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,686 UART: [art] PUB.X = ED41D6866785BC18CB9CFC162A9B1CCAFB518299EB41515ACA58E141A24542624F51AC8EB929341BFA60151EFF120887
24,799,947 UART: [art] PUB.Y = E742AE506427ECC8804BFDA32A5303C442B063543B04A3374AE0D84390C357768C5156F2A813387E82BD3570323317A8
24,807,163 UART: [art] SIG.R = A04ECD602642E45F214D548AFAEBE6C735DD2838D45ADB8B89727E47DE7BDDC3B7792717C38246C2800B20EED78DA609
24,814,545 UART: [art] SIG.S = 260D2DF4F48A198582B7F248DE947AF64BD3717579BF7C0FCBD83DB27DE6E716B045A9CE99A4E3B678B8138DFCEF95F7
25,794,020 UART: Caliptra RT
25,794,724 UART: [state] CFI Enabled
25,912,628 UART: [rt] RT listening for mailbox commands...
25,914,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,945,137 UART: [rt]cmd =0x44504543, len=96
30,228,277 >>> mbox cmd response data (6236 bytes)
30,257,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,288,612 UART: [rt]cmd =0x53574545, len=84
34,423,410 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,699,038 ready_for_fw is high
3,699,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,339 >>> mbox cmd response: success
18,517,975 UART:
18,518,403 UART: Running Caliptra FMC ...
18,519,513 UART:
18,519,682 UART: [state] CFI Enabled
18,527,401 UART: [fht] FMC Alias Private Key: 7
20,284,751 UART: [art] Extend RT PCRs Done
20,285,973 UART: [art] Lock RT PCRs Done
20,287,704 UART: [art] Populate DV Done
20,292,950 UART: [fht] FMC Alias Private Key: 7
20,294,436 UART: [art] Derive CDI
20,295,391 UART: [art] Store in in slot 0x4
20,338,322 UART: [art] Derive Key Pair
20,339,316 UART: [art] Store priv key in slot 0x5
22,766,338 UART: [art] Derive Key Pair - Done
22,779,015 UART: [art] Signing Cert with AUTHO
22,780,349 UART: RITY.KEYID = 7
24,485,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,400 UART: [art] PUB.X = 1AA9404708A453A36FB11881D27236BED1046AF2101F66704C6DEEC621581F3C65388C6781893D6ACC110390539C7B45
24,494,634 UART: [art] PUB.Y = 8712292F10D0F57DF42C8D2AA20B603A586320D7AE615BD5A12A30F2CAED64805B5D206191ABC9810B5534EDD644FD9D
24,501,893 UART: [art] SIG.R = 7DAB7AFEFCD5FCC6A191ADF2A3BA902F7B54E23A468141CE9D44D74DB4E21D44F3754090E811EEA1CFE77E27906B95E5
24,509,332 UART: [art] SIG.S = 385F87092B3FA311D34DC619CA0DFB679BEA93D1EE0F3FB9A5F4D4E18E65E3C5C86FB86F283BE596C8E65B8DD6017D0A
25,488,847 UART: Caliptra RT
25,489,561 UART: [state] CFI Enabled
25,607,290 UART: [rt] RT listening for mailbox commands...
25,609,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,639,922 UART: [rt]cmd =0x44504543, len=96
29,922,715 >>> mbox cmd response data (6236 bytes)
29,952,621 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,983,099 UART: [rt]cmd =0x53574545, len=84
34,118,546 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,065 UART:
192,426 UART: Running Caliptra ROM ...
193,529 UART:
193,669 UART: [state] CFI Enabled
263,843 UART: [state] LifecycleState = Unprovisioned
266,253 UART: [state] DebugLocked = No
269,089 UART: [state] WD Timer not started. Device not locked for debugging
274,473 UART: [kat] SHA2-256
464,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,144 UART: [kat] ++
475,598 UART: [kat] sha1
485,689 UART: [kat] SHA2-256
488,695 UART: [kat] SHA2-384
495,104 UART: [kat] SHA2-512-ACC
497,701 UART: [kat] ECC-384
2,949,511 UART: [kat] HMAC-384Kdf
2,972,199 UART: [kat] LMS
3,504,000 UART: [kat] --
3,508,719 UART: [cold-reset] ++
3,510,461 UART: [fht] FHT @ 0x50003400
3,520,955 UART: [idev] ++
3,521,662 UART: [idev] CDI.KEYID = 6
3,522,640 UART: [idev] SUBJECT.KEYID = 7
3,523,813 UART: [idev] UDS.KEYID = 0
3,524,737 ready_for_fw is high
3,524,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,836 UART: [idev] Erasing UDS.KEYID = 0
6,025,302 UART: [idev] Sha1 KeyId Algorithm
6,047,241 UART: [idev] --
6,050,905 UART: [ldev] ++
6,051,605 UART: [ldev] CDI.KEYID = 6
6,052,526 UART: [ldev] SUBJECT.KEYID = 5
6,053,685 UART: [ldev] AUTHORITY.KEYID = 7
6,054,917 UART: [ldev] FE.KEYID = 1
6,099,660 UART: [ldev] Erasing FE.KEYID = 1
8,606,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,540 UART: [ldev] --
10,413,584 UART: [fwproc] Wait for Commands...
10,415,735 UART: [fwproc] Recv command 0x46574c44
10,418,041 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,591 >>> mbox cmd response: success
14,605,621 UART: [afmc] ++
14,606,329 UART: [afmc] CDI.KEYID = 6
14,607,571 UART: [afmc] SUBJECT.KEYID = 7
14,609,008 UART: [afmc] AUTHORITY.KEYID = 5
17,147,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,321 UART: [afmc] --
18,944,208 UART: [cold-reset] --
18,947,860 UART: [state] Locking Datavault
18,954,666 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,885 UART: [state] Locking ICCM
18,958,933 UART: [exit] Launching FMC @ 0x40000130
18,967,605 UART:
18,967,843 UART: Running Caliptra FMC ...
18,968,941 UART:
18,969,101 UART: [state] CFI Enabled
19,028,212 UART: [fht] FMC Alias Private Key: 7
20,792,599 UART: [art] Extend RT PCRs Done
20,793,814 UART: [art] Lock RT PCRs Done
20,795,436 UART: [art] Populate DV Done
20,800,952 UART: [fht] FMC Alias Private Key: 7
20,802,486 UART: [art] Derive CDI
20,803,297 UART: [art] Store in in slot 0x4
20,861,518 UART: [art] Derive Key Pair
20,862,515 UART: [art] Store priv key in slot 0x5
23,325,281 UART: [art] Derive Key Pair - Done
23,338,131 UART: [art] Signing Cert with AUTHO
23,339,436 UART: RITY.KEYID = 7
25,051,743 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,249 UART: [art] PUB.X = A3D536DF98B50DB88049AC73ED46D8253AACEFAC2187484EE9AFFD6481E58AAD780517A5E9F578BDD00E4AB13A5698C7
25,060,550 UART: [art] PUB.Y = A311CD12247B415222B77CE8FF90240C97C57BC17C084393E26C098C15D8B10A3EE4327524B1120FE740220B91B4D192
25,067,780 UART: [art] SIG.R = 9BF9AABB74CAFEEB674419A14A7F1D1648AE846E7AE5091E2987C4076F10373EEF4C17418671BBBC5D51A4F7EDACA6FB
25,075,178 UART: [art] SIG.S = 9655AF12B39A63058D9C004F01C2F661F4955A5DC76151C184477D6F57A979EA0136298156BA5054E04D60A962A43DCA
26,053,662 UART: Caliptra RT
26,054,371 UART: [state] CFI Enabled
26,220,414 UART: [rt] RT listening for mailbox commands...
26,222,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,556 UART: [rt]cmd =0x44504543, len=96
30,611,213 >>> mbox cmd response data (6236 bytes)
30,641,017 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,671,545 UART: [rt]cmd =0x53574545, len=84
34,848,748 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,438,675 ready_for_fw is high
3,439,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,931 >>> mbox cmd response: success
19,019,417 UART:
19,019,796 UART: Running Caliptra FMC ...
19,020,941 UART:
19,021,106 UART: [state] CFI Enabled
19,087,648 UART: [fht] FMC Alias Private Key: 7
20,850,862 UART: [art] Extend RT PCRs Done
20,852,073 UART: [art] Lock RT PCRs Done
20,853,678 UART: [art] Populate DV Done
20,859,212 UART: [fht] FMC Alias Private Key: 7
20,860,806 UART: [art] Derive CDI
20,861,625 UART: [art] Store in in slot 0x4
20,920,461 UART: [art] Derive Key Pair
20,921,498 UART: [art] Store priv key in slot 0x5
23,384,807 UART: [art] Derive Key Pair - Done
23,397,536 UART: [art] Signing Cert with AUTHO
23,398,841 UART: RITY.KEYID = 7
25,110,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,094 UART: [art] PUB.X = A4F70277BA80AF57197998ED029D46A70CD1AEC93C9578B67192B720D0218D301651EA49CC2C7B54827AAFEA18892C6E
25,119,399 UART: [art] PUB.Y = 176664F2C0918152E6C0E34C526C66C5B9A4121AAEA2EED544FE7E62C6852AD4B452E987B9EA09FE202B14A95C1587B1
25,126,645 UART: [art] SIG.R = 4D4836A4D46B5A9B3B0CEC20739ED333F45D5F81469CD7CF15E5F7C5D796BDEDAFFFC283981B29490F64F5FE975A2BE1
25,134,089 UART: [art] SIG.S = A432AE7F3E22482ABA4C71BC9305FFC77B3444E60275C9BDCB49ECC6F15DEA1C8B5243BC37B9AA3A797B8F40782B5AC5
26,113,042 UART: Caliptra RT
26,113,740 UART: [state] CFI Enabled
26,279,799 UART: [rt] RT listening for mailbox commands...
26,281,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,312,981 UART: [rt]cmd =0x44504543, len=96
30,691,288 >>> mbox cmd response data (6236 bytes)
30,720,827 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,751,354 UART: [rt]cmd =0x53574545, len=84
34,930,929 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,451 UART:
192,806 UART: Running Caliptra ROM ...
193,982 UART:
603,449 UART: [state] CFI Enabled
614,907 UART: [state] LifecycleState = Unprovisioned
616,923 UART: [state] DebugLocked = No
618,298 UART: [state] WD Timer not started. Device not locked for debugging
622,250 UART: [kat] SHA2-256
812,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,920 UART: [kat] ++
823,360 UART: [kat] sha1
833,654 UART: [kat] SHA2-256
836,725 UART: [kat] SHA2-384
841,497 UART: [kat] SHA2-512-ACC
844,066 UART: [kat] ECC-384
3,286,687 UART: [kat] HMAC-384Kdf
3,299,584 UART: [kat] LMS
3,831,381 UART: [kat] --
3,835,233 UART: [cold-reset] ++
3,836,444 UART: [fht] FHT @ 0x50003400
3,847,909 UART: [idev] ++
3,848,605 UART: [idev] CDI.KEYID = 6
3,849,548 UART: [idev] SUBJECT.KEYID = 7
3,850,778 UART: [idev] UDS.KEYID = 0
3,851,669 ready_for_fw is high
3,851,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,995,567 UART: [idev] Erasing UDS.KEYID = 0
6,325,735 UART: [idev] Sha1 KeyId Algorithm
6,347,490 UART: [idev] --
6,352,712 UART: [ldev] ++
6,353,380 UART: [ldev] CDI.KEYID = 6
6,354,287 UART: [ldev] SUBJECT.KEYID = 5
6,355,510 UART: [ldev] AUTHORITY.KEYID = 7
6,356,680 UART: [ldev] FE.KEYID = 1
6,368,887 UART: [ldev] Erasing FE.KEYID = 1
8,844,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,052 UART: [ldev] --
10,633,083 UART: [fwproc] Wait for Commands...
10,635,397 UART: [fwproc] Recv command 0x46574c44
10,637,701 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,832,376 >>> mbox cmd response: success
14,836,780 UART: [afmc] ++
14,837,489 UART: [afmc] CDI.KEYID = 6
14,838,727 UART: [afmc] SUBJECT.KEYID = 7
14,840,167 UART: [afmc] AUTHORITY.KEYID = 5
17,344,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,919 UART: [afmc] --
19,141,999 UART: [cold-reset] --
19,145,277 UART: [state] Locking Datavault
19,150,910 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,054 UART: [state] Locking ICCM
19,154,885 UART: [exit] Launching FMC @ 0x40000130
19,163,584 UART:
19,163,823 UART: Running Caliptra FMC ...
19,164,854 UART:
19,164,995 UART: [state] CFI Enabled
19,172,927 UART: [fht] FMC Alias Private Key: 7
20,929,384 UART: [art] Extend RT PCRs Done
20,930,608 UART: [art] Lock RT PCRs Done
20,932,043 UART: [art] Populate DV Done
20,937,177 UART: [fht] FMC Alias Private Key: 7
20,938,817 UART: [art] Derive CDI
20,939,622 UART: [art] Store in in slot 0x4
20,981,997 UART: [art] Derive Key Pair
20,983,024 UART: [art] Store priv key in slot 0x5
23,409,739 UART: [art] Derive Key Pair - Done
23,422,577 UART: [art] Signing Cert with AUTHO
23,423,876 UART: RITY.KEYID = 7
25,129,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,804 UART: [art] PUB.X = FA3D285B11C9214D2DBE4F1AB9F7A182182604AA678FE053CC29179CDF4DAEF128276B7EF96992F22F65CC9712258473
25,138,031 UART: [art] PUB.Y = 912D85B3D5E11D2415AF7C81EB6C383334FAB09C36132FFD9FA58DA6377D0D3B5C3858882BB2BA8E2CA351F4D9D782CB
25,145,298 UART: [art] SIG.R = ECA311713E3A0DE3ED9DCAF93AD15EDEA2AB7A15288A5F58DF6AC97C094C6BA87314A1CC9A92E0F0013FC755B887916C
25,152,724 UART: [art] SIG.S = 39697CA78F9BB1EC77E07E51DA3CEE1577C415BE13E7AE57FEB2B9C03343E77FAAF334B3B720D5438666C422AF031F1B
26,132,320 UART: Caliptra RT
26,133,026 UART: [state] CFI Enabled
26,250,158 UART: [rt] RT listening for mailbox commands...
26,252,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,692 UART: [rt]cmd =0x44504543, len=96
30,565,519 >>> mbox cmd response data (6236 bytes)
30,595,340 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,625,845 UART: [rt]cmd =0x53574545, len=84
34,761,761 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,751,968 ready_for_fw is high
3,752,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,828 >>> mbox cmd response: success
19,203,000 UART:
19,203,411 UART: Running Caliptra FMC ...
19,204,513 UART:
19,204,668 UART: [state] CFI Enabled
19,212,283 UART: [fht] FMC Alias Private Key: 7
20,968,895 UART: [art] Extend RT PCRs Done
20,970,126 UART: [art] Lock RT PCRs Done
20,971,696 UART: [art] Populate DV Done
20,977,260 UART: [fht] FMC Alias Private Key: 7
20,978,794 UART: [art] Derive CDI
20,979,600 UART: [art] Store in in slot 0x4
21,022,299 UART: [art] Derive Key Pair
21,023,342 UART: [art] Store priv key in slot 0x5
23,450,521 UART: [art] Derive Key Pair - Done
23,463,565 UART: [art] Signing Cert with AUTHO
23,464,889 UART: RITY.KEYID = 7
25,170,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,986 UART: [art] PUB.X = 6D6E775B294624CD0B1E6E318493D8CD42360C73A9147A72D520F8CE6A323A6DFA9A5AC633D3BC4C36845B73E0988A1E
25,179,228 UART: [art] PUB.Y = A5157F69F58861E84D004D14F2671E682023694BAB39DC163666051775FB7FDFAA23A343C82E608E83AD2C01A4C8F20F
25,186,457 UART: [art] SIG.R = 726C334FF61DDC44E763B2E0AF04271B904137573D1701CE512CD98DFD8EE48235CBFBCBFBE4B970CC8FA5621B8B57C8
25,193,890 UART: [art] SIG.S = A1F9C5AB0C81CD7A2B4A82B999D193E74A923E512D36F26B09C68F2B09C0D26C483E02576B7A361B1CCDB0FA352198A2
26,173,055 UART: Caliptra RT
26,173,769 UART: [state] CFI Enabled
26,290,198 UART: [rt] RT listening for mailbox commands...
26,292,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,322,743 UART: [rt]cmd =0x44504543, len=96
30,604,971 >>> mbox cmd response data (6236 bytes)
30,634,667 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,665,229 UART: [rt]cmd =0x53574545, len=84
34,800,873 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,995 UART: [fht] Storing FHT @ 0x50003400
1,479,772 UART: [idev] ++
1,479,940 UART: [idev] CDI.KEYID = 6
1,480,300 UART: [idev] SUBJECT.KEYID = 7
1,480,724 UART: [idev] UDS.KEYID = 0
1,481,069 ready_for_fw is high
1,481,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,976 UART: [idev] Erasing UDS.KEYID = 0
1,506,630 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,208 UART: [idev] --
1,516,309 UART: [ldev] ++
1,516,477 UART: [ldev] CDI.KEYID = 6
1,516,840 UART: [ldev] SUBJECT.KEYID = 5
1,517,266 UART: [ldev] AUTHORITY.KEYID = 7
1,517,729 UART: [ldev] FE.KEYID = 1
1,522,627 UART: [ldev] Erasing FE.KEYID = 1
1,547,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,924 UART: [ldev] --
1,587,297 UART: [fwproc] Waiting for Commands...
1,587,990 UART: [fwproc] Received command 0x46574c44
1,588,781 UART: [fwproc] Received Image of size 114448 bytes
2,888,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,015 >>> mbox cmd response: success
3,082,183 UART: [afmc] ++
3,082,351 UART: [afmc] CDI.KEYID = 6
3,082,713 UART: [afmc] SUBJECT.KEYID = 7
3,083,138 UART: [afmc] AUTHORITY.KEYID = 5
3,117,459 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,713 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,106 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,796 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,669 UART: [afmc] --
3,160,661 UART: [cold-reset] --
3,161,617 UART: [state] Locking Datavault
3,162,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,366 UART: [state] Locking ICCM
3,163,900 UART: [exit] Launching FMC @ 0x40000130
3,169,229 UART:
3,169,245 UART: Running Caliptra FMC ...
3,169,653 UART:
3,169,707 UART: [state] CFI Enabled
3,180,094 UART: [fht] FMC Alias Private Key: 7
3,288,237 UART: [art] Extend RT PCRs Done
3,288,665 UART: [art] Lock RT PCRs Done
3,290,007 UART: [art] Populate DV Done
3,298,110 UART: [fht] FMC Alias Private Key: 7
3,299,100 UART: [art] Derive CDI
3,299,380 UART: [art] Store in in slot 0x4
3,385,045 UART: [art] Derive Key Pair
3,385,405 UART: [art] Store priv key in slot 0x5
3,398,203 UART: [art] Derive Key Pair - Done
3,412,837 UART: [art] Signing Cert with AUTHO
3,413,317 UART: RITY.KEYID = 7
3,428,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,126 UART: [art] PUB.X = F55D7DCDDEC6831390C431C8FC9EAEE46EA6308188615D9E3BBD8EDD7F6E0265357B60B70C8073B11BD55525F8815E60
3,435,900 UART: [art] PUB.Y = 3269C21F8C2C370CF3BA8DE27841E0B3C73DFA465D5547CD34D5103B649FC69782E443426B1311594D25732FCAA5CDC4
3,442,851 UART: [art] SIG.R = FE79DAC729F90C430E82EDA58BA1B5C37D8D8CC98906D0938840EC449F9A32C5EDED9BA2C6D35F9876118CF01097DB88
3,449,626 UART: [art] SIG.S = F1419B69587031FD23C9AB19F9E4EFF0197074BE930E781BB457F1945922CB7F7668897E0160A4A4512D527A538442D6
3,474,105 UART: Caliptra RT
3,474,358 UART: [state] CFI Enabled
3,581,926 UART: [rt] RT listening for mailbox commands...
3,582,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,060 UART: [rt]cmd =0x44504543, len=96
3,792,485 >>> mbox cmd response data (6236 bytes)
3,792,486 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,543 UART: [rt]cmd =0x53574545, len=84
3,848,215 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,183 ready_for_fw is high
1,362,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,817 >>> mbox cmd response: success
2,989,969 UART:
2,989,985 UART: Running Caliptra FMC ...
2,990,393 UART:
2,990,447 UART: [state] CFI Enabled
3,000,856 UART: [fht] FMC Alias Private Key: 7
3,108,793 UART: [art] Extend RT PCRs Done
3,109,221 UART: [art] Lock RT PCRs Done
3,110,627 UART: [art] Populate DV Done
3,118,850 UART: [fht] FMC Alias Private Key: 7
3,119,852 UART: [art] Derive CDI
3,120,132 UART: [art] Store in in slot 0x4
3,205,419 UART: [art] Derive Key Pair
3,205,779 UART: [art] Store priv key in slot 0x5
3,219,349 UART: [art] Derive Key Pair - Done
3,234,393 UART: [art] Signing Cert with AUTHO
3,234,873 UART: RITY.KEYID = 7
3,249,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,570 UART: [art] PUB.X = 29C1A1D38E4844E672B0F107C454EC9825585F09386B83C586DA4464850D250B24CB019596AC469827329BF96E8BECBE
3,257,321 UART: [art] PUB.Y = 5411394CED27C0DD1AA0A490B8702A6C3256AB05CD6BF01BDCB1C426D730B36D0C94D0B6FDCB58BEF917294E1B5BB3A4
3,264,285 UART: [art] SIG.R = 361264F26959E7C0AB281F5035CC9EF101E540A364B766B8EC3C4207AD405D6E46DC18E25CCA9628A10FB022874A6813
3,271,046 UART: [art] SIG.S = C405114992C0A52F2066FBF34A3DD12C2AF41544675B2AE1E30E56152D71EAEACD4732B4A2035882B75AFEE8EDC9482A
3,294,316 UART: Caliptra RT
3,294,569 UART: [state] CFI Enabled
3,402,766 UART: [rt] RT listening for mailbox commands...
3,403,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,004 UART: [rt]cmd =0x44504543, len=96
3,613,675 >>> mbox cmd response data (6236 bytes)
3,613,676 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,477 UART: [rt]cmd =0x53574545, len=84
3,669,463 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,111 UART: [kat] SHA2-512-ACC
897,012 UART: [kat] ECC-384
902,745 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,626 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,641 UART: [idev] Erasing UDS.KEYID = 0
1,505,545 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,400 UART: [ldev] ++
1,515,568 UART: [ldev] CDI.KEYID = 6
1,515,931 UART: [ldev] SUBJECT.KEYID = 5
1,516,357 UART: [ldev] AUTHORITY.KEYID = 7
1,516,820 UART: [ldev] FE.KEYID = 1
1,522,238 UART: [ldev] Erasing FE.KEYID = 1
1,548,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,027 UART: [ldev] --
1,587,436 UART: [fwproc] Waiting for Commands...
1,588,059 UART: [fwproc] Received command 0x46574c44
1,588,850 UART: [fwproc] Received Image of size 114448 bytes
2,888,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,671 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,052 >>> mbox cmd response: success
3,081,270 UART: [afmc] ++
3,081,438 UART: [afmc] CDI.KEYID = 6
3,081,800 UART: [afmc] SUBJECT.KEYID = 7
3,082,225 UART: [afmc] AUTHORITY.KEYID = 5
3,117,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,120 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,513 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,203 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,168 UART: [afmc] --
3,161,098 UART: [cold-reset] --
3,162,020 UART: [state] Locking Datavault
3,163,067 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,671 UART: [state] Locking ICCM
3,164,183 UART: [exit] Launching FMC @ 0x40000130
3,169,512 UART:
3,169,528 UART: Running Caliptra FMC ...
3,169,936 UART:
3,170,079 UART: [state] CFI Enabled
3,181,058 UART: [fht] FMC Alias Private Key: 7
3,289,307 UART: [art] Extend RT PCRs Done
3,289,735 UART: [art] Lock RT PCRs Done
3,291,477 UART: [art] Populate DV Done
3,299,724 UART: [fht] FMC Alias Private Key: 7
3,300,752 UART: [art] Derive CDI
3,301,032 UART: [art] Store in in slot 0x4
3,387,071 UART: [art] Derive Key Pair
3,387,431 UART: [art] Store priv key in slot 0x5
3,400,725 UART: [art] Derive Key Pair - Done
3,415,645 UART: [art] Signing Cert with AUTHO
3,416,125 UART: RITY.KEYID = 7
3,431,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,916 UART: [art] PUB.X = F381E8DFC3BC948CB297BB722293761758D1902BA44892113D9E53893D2CCFF4A0BA9B703F361B05ACEF54CCF5D2C599
3,438,693 UART: [art] PUB.Y = 16FCD7078097B2D914B3237215E219EA35991BD072B8F9FAC84A889F355DCE14DE2BAA65D6B9E2AA5B9D942E1B54EF8C
3,445,654 UART: [art] SIG.R = A705BF7520AA206B6B2727A829C0AAED400EA2C15073D7B04563040A6ED9E2FB15B1DD6F0B0989DC5BCE20379B621614
3,452,414 UART: [art] SIG.S = 94CAAB727907173820A01C49044889D917D7C30E503183A8765F946F090568A268F6478A78B452A4EE454B1F68E4BC44
3,475,754 UART: Caliptra RT
3,476,099 UART: [state] CFI Enabled
3,584,573 UART: [rt] RT listening for mailbox commands...
3,585,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,485 UART: [rt]cmd =0x44504543, len=96
3,796,194 >>> mbox cmd response data (6236 bytes)
3,796,195 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,974 UART: [rt]cmd =0x53574545, len=84
3,851,934 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,732 >>> mbox cmd response: success
2,991,872 UART:
2,991,888 UART: Running Caliptra FMC ...
2,992,296 UART:
2,992,439 UART: [state] CFI Enabled
3,003,320 UART: [fht] FMC Alias Private Key: 7
3,111,145 UART: [art] Extend RT PCRs Done
3,111,573 UART: [art] Lock RT PCRs Done
3,113,297 UART: [art] Populate DV Done
3,121,682 UART: [fht] FMC Alias Private Key: 7
3,122,758 UART: [art] Derive CDI
3,123,038 UART: [art] Store in in slot 0x4
3,209,141 UART: [art] Derive Key Pair
3,209,501 UART: [art] Store priv key in slot 0x5
3,222,517 UART: [art] Derive Key Pair - Done
3,237,453 UART: [art] Signing Cert with AUTHO
3,237,933 UART: RITY.KEYID = 7
3,253,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,164 UART: [art] PUB.X = 4BF2AFEFDD290F7F669DE60DCADABD3A8986831C74A50E79DEDFCA44C33E615B03D79DE90119C4433B2CBAF6CC944008
3,260,940 UART: [art] PUB.Y = B8D0C30619DFFA35B4F80AFE73F2098396A95EF3752432DEC30A254B76B567DE706E8CAE7E33AD5EA6FF5592130EDB29
3,267,889 UART: [art] SIG.R = E2A8D8F87A1691CD0771DBE362AB7E240C6F774C3E97ECFFA84A8805D44718A1F6647BB5396B37584121E110C92E5B9C
3,274,656 UART: [art] SIG.S = 925FAB0EBC776D9D52C3A589D99847E53B35F4709AE4246DBA5DE5984978DD30E74673ED639AD2FA69818D26CF916FC5
3,298,892 UART: Caliptra RT
3,299,237 UART: [state] CFI Enabled
3,406,563 UART: [rt] RT listening for mailbox commands...
3,407,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,693 UART: [rt]cmd =0x44504543, len=96
3,618,681 >>> mbox cmd response data (6236 bytes)
3,618,682 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,353 UART: [rt]cmd =0x53574545, len=84
3,675,177 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,394 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,121 UART: [cold-reset] ++
1,172,555 UART: [fht] FHT @ 0x50003400
1,175,354 UART: [idev] ++
1,175,522 UART: [idev] CDI.KEYID = 6
1,175,882 UART: [idev] SUBJECT.KEYID = 7
1,176,306 UART: [idev] UDS.KEYID = 0
1,176,651 ready_for_fw is high
1,176,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,340 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,127 UART: [idev] --
1,211,253 UART: [ldev] ++
1,211,421 UART: [ldev] CDI.KEYID = 6
1,211,784 UART: [ldev] SUBJECT.KEYID = 5
1,212,210 UART: [ldev] AUTHORITY.KEYID = 7
1,212,673 UART: [ldev] FE.KEYID = 1
1,217,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,240 UART: [fwproc] Wait for Commands...
1,283,866 UART: [fwproc] Recv command 0x46574c44
1,284,594 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,826 >>> mbox cmd response: success
2,779,050 UART: [afmc] ++
2,779,218 UART: [afmc] CDI.KEYID = 6
2,779,580 UART: [afmc] SUBJECT.KEYID = 7
2,780,005 UART: [afmc] AUTHORITY.KEYID = 5
2,814,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,157 UART: [afmc] --
2,858,201 UART: [cold-reset] --
2,859,161 UART: [state] Locking Datavault
2,860,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,922 UART: [state] Locking ICCM
2,861,406 UART: [exit] Launching FMC @ 0x40000130
2,866,735 UART:
2,866,751 UART: Running Caliptra FMC ...
2,867,159 UART:
2,867,213 UART: [state] CFI Enabled
2,877,464 UART: [fht] FMC Alias Private Key: 7
2,985,595 UART: [art] Extend RT PCRs Done
2,986,023 UART: [art] Lock RT PCRs Done
2,987,673 UART: [art] Populate DV Done
2,995,928 UART: [fht] FMC Alias Private Key: 7
2,997,090 UART: [art] Derive CDI
2,997,370 UART: [art] Store in in slot 0x4
3,082,789 UART: [art] Derive Key Pair
3,083,149 UART: [art] Store priv key in slot 0x5
3,095,995 UART: [art] Derive Key Pair - Done
3,110,605 UART: [art] Signing Cert with AUTHO
3,111,085 UART: RITY.KEYID = 7
3,126,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,504 UART: [art] PUB.X = D5503F0BE42715409B032C657586CF2C1B1A4C32E508D7E6C731A27EF9F51D750846CEE238D354CE496DBAE8F8168BF7
3,134,268 UART: [art] PUB.Y = EDAB5AB7FBBF9BAC6762AEBB84F84311961A109018239311C3CCEE0E5191FF730FE45227081E37FF505FD871437EDCAB
3,141,225 UART: [art] SIG.R = B808FA0126C64B1AB63083D6BACE0F653E7BEE0BA0F6F589535A74689C06086E3170015B80F8FF955CE163633E2639B7
3,147,976 UART: [art] SIG.S = A26404C3F2DFC4CF0430B26A91F0E5EAB1A07082CBB3FE9A9942664DC30BCE08787F3630A48D228FEC390D97006458D8
3,171,668 UART: Caliptra RT
3,171,921 UART: [state] CFI Enabled
3,280,555 UART: [rt] RT listening for mailbox commands...
3,281,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,521 UART: [rt]cmd =0x44504543, len=96
3,491,104 >>> mbox cmd response data (6236 bytes)
3,491,105 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,798 UART: [rt]cmd =0x53574545, len=84
3,546,048 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,635 ready_for_fw is high
1,060,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,991 >>> mbox cmd response: success
2,689,663 UART:
2,689,679 UART: Running Caliptra FMC ...
2,690,087 UART:
2,690,141 UART: [state] CFI Enabled
2,700,726 UART: [fht] FMC Alias Private Key: 7
2,808,735 UART: [art] Extend RT PCRs Done
2,809,163 UART: [art] Lock RT PCRs Done
2,810,497 UART: [art] Populate DV Done
2,818,366 UART: [fht] FMC Alias Private Key: 7
2,819,450 UART: [art] Derive CDI
2,819,730 UART: [art] Store in in slot 0x4
2,905,057 UART: [art] Derive Key Pair
2,905,417 UART: [art] Store priv key in slot 0x5
2,918,461 UART: [art] Derive Key Pair - Done
2,933,459 UART: [art] Signing Cert with AUTHO
2,933,939 UART: RITY.KEYID = 7
2,949,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,932 UART: [art] PUB.X = 20B08ABD1291E2FFC5301897E6F0B9E1CC8E08C41ADB0309D586CA9AFE814DD5A77BB16259BFF8FEFB1A0C47141418D8
2,956,708 UART: [art] PUB.Y = 66DBD7D764574CD34C83FAEF45CB8DCDEF4131B8405846E43D6C1E6F951B48FE0C9633414DDFDD98B51B654A448B5E1C
2,963,671 UART: [art] SIG.R = 58721A236D83438C9B609A105A8FEEA760BD008138ED73D0F0C48F5D4A311E31B8ADA776014D9B6C58BF522FC80EBB3B
2,970,423 UART: [art] SIG.S = E4A1919E17E30E85D73AA44707067815A7655FB62FEF9DA50BFE3F88FEECF3D883831C7DF09794BBD332B1DA40A5CB8E
2,994,516 UART: Caliptra RT
2,994,769 UART: [state] CFI Enabled
3,102,890 UART: [rt] RT listening for mailbox commands...
3,103,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,392 UART: [rt]cmd =0x44504543, len=96
3,314,059 >>> mbox cmd response data (6236 bytes)
3,314,060 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,885 UART: [rt]cmd =0x53574545, len=84
3,370,011 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
901,902 UART: [kat] SHA2-256
903,842 UART: [kat] SHA2-384
906,457 UART: [kat] SHA2-512-ACC
908,358 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,665 UART: [kat] LMS
1,170,993 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,174,941 UART: [idev] ++
1,175,109 UART: [idev] CDI.KEYID = 6
1,175,469 UART: [idev] SUBJECT.KEYID = 7
1,175,893 UART: [idev] UDS.KEYID = 0
1,176,238 ready_for_fw is high
1,176,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,160 UART: [idev] Sha1 KeyId Algorithm
1,209,716 UART: [idev] --
1,210,684 UART: [ldev] ++
1,210,852 UART: [ldev] CDI.KEYID = 6
1,211,215 UART: [ldev] SUBJECT.KEYID = 5
1,211,641 UART: [ldev] AUTHORITY.KEYID = 7
1,212,104 UART: [ldev] FE.KEYID = 1
1,217,338 UART: [ldev] Erasing FE.KEYID = 1
1,243,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,146 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,183 UART: [fwproc] Recv command 0x46574c44
1,283,911 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,567 >>> mbox cmd response: success
2,776,749 UART: [afmc] ++
2,776,917 UART: [afmc] CDI.KEYID = 6
2,777,279 UART: [afmc] SUBJECT.KEYID = 7
2,777,704 UART: [afmc] AUTHORITY.KEYID = 5
2,814,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,414 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,332 UART: [afmc] --
2,857,412 UART: [cold-reset] --
2,858,156 UART: [state] Locking Datavault
2,859,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,747 UART: [state] Locking ICCM
2,860,241 UART: [exit] Launching FMC @ 0x40000130
2,865,570 UART:
2,865,586 UART: Running Caliptra FMC ...
2,865,994 UART:
2,866,137 UART: [state] CFI Enabled
2,876,450 UART: [fht] FMC Alias Private Key: 7
2,984,561 UART: [art] Extend RT PCRs Done
2,984,989 UART: [art] Lock RT PCRs Done
2,986,485 UART: [art] Populate DV Done
2,994,660 UART: [fht] FMC Alias Private Key: 7
2,995,798 UART: [art] Derive CDI
2,996,078 UART: [art] Store in in slot 0x4
3,081,533 UART: [art] Derive Key Pair
3,081,893 UART: [art] Store priv key in slot 0x5
3,095,275 UART: [art] Derive Key Pair - Done
3,109,885 UART: [art] Signing Cert with AUTHO
3,110,365 UART: RITY.KEYID = 7
3,126,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,872 UART: [art] PUB.X = ED1C0D8A2BF6C8D4D60BA886E59CDC7753CAEAD80F786A618828E2AC8C73613E67EC906F98CEE265966FE997C6688C0A
3,133,646 UART: [art] PUB.Y = 8E4210605A4A6A30D824A73B2690527669D6F10C55901E821B87B872C998B16B244DDD4CA0F56976EE7001DC31CB27DF
3,140,588 UART: [art] SIG.R = 40A28598F36DB0110813362822798477DF067304999604FF086F5ABCCB80FC5A2FD1704757B0448C528051B9B186671E
3,147,329 UART: [art] SIG.S = 78B6F3F1A85A5936957F12757AAFB4B73C8D4B719FEC3EB1D235F81B31329F0CBD0F8283CC9721DD94D5C5CD6D322F9A
3,171,530 UART: Caliptra RT
3,171,875 UART: [state] CFI Enabled
3,280,102 UART: [rt] RT listening for mailbox commands...
3,280,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,156 UART: [rt]cmd =0x44504543, len=96
3,490,794 >>> mbox cmd response data (6236 bytes)
3,490,795 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,652 UART: [rt]cmd =0x53574545, len=84
3,545,940 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,740 ready_for_fw is high
1,060,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,476 >>> mbox cmd response: success
2,689,360 UART:
2,689,376 UART: Running Caliptra FMC ...
2,689,784 UART:
2,689,927 UART: [state] CFI Enabled
2,700,822 UART: [fht] FMC Alias Private Key: 7
2,809,373 UART: [art] Extend RT PCRs Done
2,809,801 UART: [art] Lock RT PCRs Done
2,811,435 UART: [art] Populate DV Done
2,819,546 UART: [fht] FMC Alias Private Key: 7
2,820,708 UART: [art] Derive CDI
2,820,988 UART: [art] Store in in slot 0x4
2,906,405 UART: [art] Derive Key Pair
2,906,765 UART: [art] Store priv key in slot 0x5
2,920,203 UART: [art] Derive Key Pair - Done
2,934,907 UART: [art] Signing Cert with AUTHO
2,935,387 UART: RITY.KEYID = 7
2,950,811 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,576 UART: [art] PUB.X = 1E274FF7F90EBA60C9EBC78F1829E5174F14EC75E9B2456FA1C76A7C464FDC9656188D0A6E28C4F46A3B5F82F4855417
2,958,348 UART: [art] PUB.Y = 4D145CD8B1A05512A9FDF56D1F2359B3F3470A430212217BF2463ACF5EEB6A5A6F3FF4F5AAD75D98ABCCDFD71E950464
2,965,307 UART: [art] SIG.R = DC194DE115828062E99FB8961283FCC502B55078764B34107B86A141BB0B18F2763AE52C79D41443B5D63FFC05CC7BA9
2,972,068 UART: [art] SIG.S = 7D66D379659FDE53DA64970B06ABDC145E1C0F1C69C94BC218A7546DA82316AA9F5370FC17E9CB6B46820C77F24D9131
2,996,011 UART: Caliptra RT
2,996,356 UART: [state] CFI Enabled
3,104,443 UART: [rt] RT listening for mailbox commands...
3,105,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,467 UART: [rt]cmd =0x44504543, len=96
3,316,298 >>> mbox cmd response data (6236 bytes)
3,316,299 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,966 UART: [rt]cmd =0x53574545, len=84
3,371,758 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,030 UART: [kat] SHA2-512-ACC
905,931 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,238 UART: [kat] LMS
1,168,550 UART: [kat] --
1,169,503 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,173,817 ready_for_fw is high
1,173,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,215,050 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,706 >>> mbox cmd response: success
2,774,815 UART: [afmc] ++
2,774,983 UART: [afmc] CDI.KEYID = 6
2,775,346 UART: [afmc] SUBJECT.KEYID = 7
2,775,772 UART: [afmc] AUTHORITY.KEYID = 5
2,811,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,498 UART: [afmc] --
2,854,516 UART: [cold-reset] --
2,855,444 UART: [state] Locking Datavault
2,856,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,057 UART: [state] Locking ICCM
2,857,683 UART: [exit] Launching FMC @ 0x40000130
2,863,012 UART:
2,863,028 UART: Running Caliptra FMC ...
2,863,436 UART:
2,863,490 UART: [state] CFI Enabled
2,874,203 UART: [fht] FMC Alias Private Key: 7
2,981,596 UART: [art] Extend RT PCRs Done
2,982,024 UART: [art] Lock RT PCRs Done
2,983,414 UART: [art] Populate DV Done
2,991,737 UART: [fht] FMC Alias Private Key: 7
2,992,875 UART: [art] Derive CDI
2,993,155 UART: [art] Store in in slot 0x4
3,078,794 UART: [art] Derive Key Pair
3,079,154 UART: [art] Store priv key in slot 0x5
3,091,900 UART: [art] Derive Key Pair - Done
3,106,735 UART: [art] Signing Cert with AUTHO
3,107,215 UART: RITY.KEYID = 7
3,122,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,410 UART: [art] PUB.X = 7014A1DD8C97B24F14992DB83D82B7F4C43A945D402557E5978E96ADA7D4EB267B589F61D718050E71C1D1FCC2FB2DE3
3,130,182 UART: [art] PUB.Y = F455D60364B2E7B04C0E472E8C5B950F3D7B32A0061283F07A1984EF8CF5E0BD14D7F8C8A5BB202644A99953284C7620
3,137,120 UART: [art] SIG.R = 1B23E699D281A82FC6A5C3106F4ECF5ED32B85A1FCD869A6A10A0A957D6B6321B75309A7301C7929CC238442A38DEF13
3,143,887 UART: [art] SIG.S = 5847C1E8C7EF03CCB58E3FB8A584C123D802651C196F01B49A2B02524C2FAF2400E71DD3FEC12E3FC1B9105E56344200
3,167,226 UART: Caliptra RT
3,167,479 UART: [state] CFI Enabled
3,276,586 UART: [rt] RT listening for mailbox commands...
3,277,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,716 UART: [rt]cmd =0x44504543, len=96
3,488,125 >>> mbox cmd response data (6236 bytes)
3,488,126 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,931 UART: [rt]cmd =0x53574545, len=84
3,543,089 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,006 ready_for_fw is high
1,056,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,746 >>> mbox cmd response: success
2,683,872 UART:
2,683,888 UART: Running Caliptra FMC ...
2,684,296 UART:
2,684,350 UART: [state] CFI Enabled
2,694,735 UART: [fht] FMC Alias Private Key: 7
2,802,338 UART: [art] Extend RT PCRs Done
2,802,766 UART: [art] Lock RT PCRs Done
2,804,052 UART: [art] Populate DV Done
2,812,529 UART: [fht] FMC Alias Private Key: 7
2,813,629 UART: [art] Derive CDI
2,813,909 UART: [art] Store in in slot 0x4
2,899,578 UART: [art] Derive Key Pair
2,899,938 UART: [art] Store priv key in slot 0x5
2,913,024 UART: [art] Derive Key Pair - Done
2,927,782 UART: [art] Signing Cert with AUTHO
2,928,262 UART: RITY.KEYID = 7
2,943,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,093 UART: [art] PUB.X = 0A70B091565FDA563DBA34BBB3F8F81BB99B9F724C624D3AD828BA215F3B12AAAF6098C3AD97DFF7768632D53896096B
2,950,869 UART: [art] PUB.Y = 960373499D86EABEC530608AB775F41F68BA73F0EF1191D9E1115AB68E009E401F0B5F6EF8DFC583C341ADAB8F4427E4
2,957,801 UART: [art] SIG.R = 3EC87ADB4277564F8ECDFF5BA0EF4E26CE472CAC9683FD42FDF56E417F70AEBCB796CD133C30A66BB8D5E0B9F9B2F9A9
2,964,601 UART: [art] SIG.S = 18CC798C650FFC118C099E69239D91AAEED53478E4B3BD19FEFA97EAFF2E5E1141A3BDEBCC519CD4A4B50C91D65C7E29
2,988,325 UART: Caliptra RT
2,988,578 UART: [state] CFI Enabled
3,096,057 UART: [rt] RT listening for mailbox commands...
3,096,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,367 UART: [rt]cmd =0x44504543, len=96
3,307,349 >>> mbox cmd response data (6236 bytes)
3,307,350 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,055 UART: [rt]cmd =0x53574545, len=84
3,362,119 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,593 UART: [kat] LMS
1,169,905 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,174,894 ready_for_fw is high
1,174,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,208,844 UART: [idev] --
1,209,995 UART: [ldev] ++
1,210,163 UART: [ldev] CDI.KEYID = 6
1,210,527 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,243 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,481 >>> mbox cmd response: success
2,775,672 UART: [afmc] ++
2,775,840 UART: [afmc] CDI.KEYID = 6
2,776,203 UART: [afmc] SUBJECT.KEYID = 7
2,776,629 UART: [afmc] AUTHORITY.KEYID = 5
2,811,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,281 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,773 UART: [afmc] --
2,854,885 UART: [cold-reset] --
2,855,769 UART: [state] Locking Datavault
2,857,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,874 UART: [state] Locking ICCM
2,858,538 UART: [exit] Launching FMC @ 0x40000130
2,863,867 UART:
2,863,883 UART: Running Caliptra FMC ...
2,864,291 UART:
2,864,434 UART: [state] CFI Enabled
2,874,695 UART: [fht] FMC Alias Private Key: 7
2,982,990 UART: [art] Extend RT PCRs Done
2,983,418 UART: [art] Lock RT PCRs Done
2,984,940 UART: [art] Populate DV Done
2,993,095 UART: [fht] FMC Alias Private Key: 7
2,994,237 UART: [art] Derive CDI
2,994,517 UART: [art] Store in in slot 0x4
3,079,982 UART: [art] Derive Key Pair
3,080,342 UART: [art] Store priv key in slot 0x5
3,094,228 UART: [art] Derive Key Pair - Done
3,109,066 UART: [art] Signing Cert with AUTHO
3,109,546 UART: RITY.KEYID = 7
3,124,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,115 UART: [art] PUB.X = 96541DD37FAB9A63913A00E9A5C31B54DD3E189BAFB84E8F96F321CCCEF9F656635DCF211D447F8EF1D6969FC7807AAC
3,131,881 UART: [art] PUB.Y = 649DB81C7F2F7ED73AE4C69AA65B899883D6FDCF5E6E84A00B5ED11DA40D887A1780F8630652929DFF540B3E5333DD06
3,138,826 UART: [art] SIG.R = C54471EFFCFAD8870C03AB02D18BBAC5235072D3DB5A01BFB19DE7205EFD679C9CA5918B86B8CE16B11F666FABABF088
3,145,608 UART: [art] SIG.S = 79C4E33CD164CC57726991258A58D5AD66D3785A043CA2976FDC34BBAD0688545FF28C6591A1BE6C6136DDD89854DAD0
3,169,723 UART: Caliptra RT
3,170,068 UART: [state] CFI Enabled
3,277,211 UART: [rt] RT listening for mailbox commands...
3,277,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,153 UART: [rt]cmd =0x44504543, len=96
3,488,564 >>> mbox cmd response data (6236 bytes)
3,488,565 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,334 UART: [rt]cmd =0x53574545, len=84
3,543,952 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,141 ready_for_fw is high
1,056,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,881 >>> mbox cmd response: success
2,686,603 UART:
2,686,619 UART: Running Caliptra FMC ...
2,687,027 UART:
2,687,170 UART: [state] CFI Enabled
2,697,927 UART: [fht] FMC Alias Private Key: 7
2,805,484 UART: [art] Extend RT PCRs Done
2,805,912 UART: [art] Lock RT PCRs Done
2,807,684 UART: [art] Populate DV Done
2,816,001 UART: [fht] FMC Alias Private Key: 7
2,817,139 UART: [art] Derive CDI
2,817,419 UART: [art] Store in in slot 0x4
2,902,828 UART: [art] Derive Key Pair
2,903,188 UART: [art] Store priv key in slot 0x5
2,916,552 UART: [art] Derive Key Pair - Done
2,931,471 UART: [art] Signing Cert with AUTHO
2,931,951 UART: RITY.KEYID = 7
2,947,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,844 UART: [art] PUB.X = 4CF54147031F8D6E9DB57FD900CE76322B049883924208A273C139D800628571887269960EF58A0FBD8AE3B4A94125E9
2,954,545 UART: [art] PUB.Y = A3D64652756DA1C1DED86C084BAAA7C4486014DC634CBAF1A8341F69320B739B4D304D210F9B6F56412D39738689120C
2,961,483 UART: [art] SIG.R = 372BD875E09CF163DB78126CAA6940422D97548747F17A533DC88107916FEDE011421E87217736B2B009FE9FFAAA4830
2,968,243 UART: [art] SIG.S = B610EE3A10C2017977FFEC59F1F4EBD685ECA23BC6E6AC4B324CC0D5A392047B73FD7F3856013CDCD7F244423C60EACA
2,991,767 UART: Caliptra RT
2,992,112 UART: [state] CFI Enabled
3,099,305 UART: [rt] RT listening for mailbox commands...
3,099,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,347 UART: [rt]cmd =0x44504543, len=96
3,311,586 >>> mbox cmd response data (6236 bytes)
3,311,587 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,480 UART: [rt]cmd =0x53574545, len=84
3,367,488 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,226 UART:
192,585 UART: Running Caliptra ROM ...
193,776 UART:
193,939 UART: [state] CFI Enabled
263,382 UART: [state] LifecycleState = Unprovisioned
265,368 UART: [state] DebugLocked = No
267,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,847 UART: [kat] SHA2-256
442,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,038 UART: [kat] ++
453,523 UART: [kat] sha1
465,869 UART: [kat] SHA2-256
468,571 UART: [kat] SHA2-384
475,065 UART: [kat] SHA2-512-ACC
477,365 UART: [kat] ECC-384
2,766,475 UART: [kat] HMAC-384Kdf
2,778,228 UART: [kat] LMS
3,968,590 UART: [kat] --
3,973,867 UART: [cold-reset] ++
3,975,515 UART: [fht] Storing FHT @ 0x50003400
3,985,949 UART: [idev] ++
3,986,534 UART: [idev] CDI.KEYID = 6
3,987,425 UART: [idev] SUBJECT.KEYID = 7
3,988,672 UART: [idev] UDS.KEYID = 0
3,989,663 ready_for_fw is high
3,989,857 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,258 UART: [idev] Erasing UDS.KEYID = 0
7,324,575 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,066 UART: [idev] --
7,350,330 UART: [ldev] ++
7,350,907 UART: [ldev] CDI.KEYID = 6
7,351,853 UART: [ldev] SUBJECT.KEYID = 5
7,353,069 UART: [ldev] AUTHORITY.KEYID = 7
7,354,358 UART: [ldev] FE.KEYID = 1
7,400,790 UART: [ldev] Erasing FE.KEYID = 1
10,736,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,387 UART: [ldev] --
13,114,425 UART: [fwproc] Waiting for Commands...
13,117,489 UART: [fwproc] Received command 0x46574c44
13,119,693 UART: [fwproc] Received Image of size 114124 bytes
17,176,637 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,841 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,640,848 >>> mbox cmd response: success
17,644,462 UART: [afmc] ++
17,645,060 UART: [afmc] CDI.KEYID = 6
17,645,949 UART: [afmc] SUBJECT.KEYID = 7
17,647,219 UART: [afmc] AUTHORITY.KEYID = 5
21,005,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,777 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,162 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,056 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,641 UART: [afmc] --
23,378,088 UART: [cold-reset] --
23,380,390 UART: [state] Locking Datavault
23,384,834 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,590 UART: [state] Locking ICCM
23,389,308 UART: [exit] Launching FMC @ 0x40000130
23,397,697 UART:
23,397,937 UART: Running Caliptra FMC ...
23,398,965 UART:
23,399,116 UART: [state] CFI Enabled
23,465,978 UART: [fht] FMC Alias Private Key: 7
25,804,205 UART: [art] Extend RT PCRs Done
25,805,430 UART: [art] Lock RT PCRs Done
25,806,918 UART: [art] Populate DV Done
25,812,324 UART: [fht] FMC Alias Private Key: 7
25,813,861 UART: [art] Derive CDI
25,814,597 UART: [art] Store in in slot 0x4
25,875,225 UART: [art] Derive Key Pair
25,876,270 UART: [art] Store priv key in slot 0x5
29,168,937 UART: [art] Derive Key Pair - Done
29,181,769 UART: [art] Signing Cert with AUTHO
29,183,109 UART: RITY.KEYID = 7
31,470,832 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,338 UART: [art] PUB.X = 1C2029D5D53C322FA437BFC8B3955BD6812B5087CAD6A3A07F941DF212165FBDB75785F89D3EB638874555823C8C51C9
31,479,544 UART: [art] PUB.Y = 2D545773089FD07E0D6F679968D91D03FCE2825698BE6620511D877521EF460E04D95211E5D6DC264B14F54A1836ED2E
31,486,780 UART: [art] SIG.R = 9A63FE9A32E8CF8F27B200D004374EE7D2B6C4C44637921D367165922DFEDB9BE2932C60F2AC7F537B67FE2499D48C52
31,494,179 UART: [art] SIG.S = CF33655B0387D259417551FCD31B19F9A618684BA23CABF4C8D2909C78B6AB435FA57363F0B4983A8FDF467727390E74
32,798,733 UART: Caliptra RT
32,799,431 UART: [state] CFI Enabled
32,961,077 UART: [rt] RT listening for mailbox commands...
32,963,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,994,186 UART: [rt]cmd =0x44504543, len=96
38,776,989 >>> mbox cmd response data (6236 bytes)
38,806,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,836,964 UART: [rt]cmd =0x44504543, len=96
38,868,211 >>> mbox cmd response data (56 bytes)
38,868,969 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,899,005 UART: [rt]cmd =0x52564348, len=36
38,901,656 >>> mbox cmd response data (8 bytes)
38,902,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,932,586 UART: [rt]cmd =0x44504543, len=96
44,706,329 >>> mbox cmd response data (6236 bytes)
44,735,125 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,765,714 UART: [rt]cmd =0x53574545, len=84
50,350,091 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,805,221 ready_for_fw is high
3,805,598 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,901,591 >>> mbox cmd response: success
23,587,335 UART:
23,587,759 UART: Running Caliptra FMC ...
23,588,874 UART:
23,589,032 UART: [state] CFI Enabled
23,654,389 UART: [fht] FMC Alias Private Key: 7
25,992,258 UART: [art] Extend RT PCRs Done
25,993,480 UART: [art] Lock RT PCRs Done
25,995,372 UART: [art] Populate DV Done
26,000,519 UART: [fht] FMC Alias Private Key: 7
26,002,232 UART: [art] Derive CDI
26,002,979 UART: [art] Store in in slot 0x4
26,062,851 UART: [art] Derive Key Pair
26,063,899 UART: [art] Store priv key in slot 0x5
29,356,627 UART: [art] Derive Key Pair - Done
29,369,681 UART: [art] Signing Cert with AUTHO
29,370,977 UART: RITY.KEYID = 7
31,657,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,342 UART: [art] PUB.X = 65C837B8A3E245C6C3FB97E28811152FCD30713839A764AFB81A1327DF26CD5078731EB610A40D954167DEA5786E40EB
31,666,543 UART: [art] PUB.Y = 30D3615A81C86A72891942D7937B8747656ACAA0FFB1CB7BB6EDB70D5AD943DB0C98AC3BDABFB2F5C5CF2DFE35FFFEBA
31,673,841 UART: [art] SIG.R = 3AED20F14960E64A55A32E2D6923E68D0F557A98AF16B591DA4FDE449BFE4F6D1643E2D5563F1A95EB5E5A9EC4C5F5E7
31,681,248 UART: [art] SIG.S = A6CE990402D4CD31BD88B73F5E79D07B00E73F061CB3A165F563CC0C3D1BC03252CC05314076A36387D7A41A096D26B4
32,985,871 UART: Caliptra RT
32,986,588 UART: [state] CFI Enabled
33,146,401 UART: [rt] RT listening for mailbox commands...
33,148,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,179,315 UART: [rt]cmd =0x44504543, len=96
38,963,252 >>> mbox cmd response data (6236 bytes)
38,992,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,023,019 UART: [rt]cmd =0x44504543, len=96
39,054,071 >>> mbox cmd response data (56 bytes)
39,054,803 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,084,894 UART: [rt]cmd =0x52564348, len=36
39,087,674 >>> mbox cmd response data (8 bytes)
39,088,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,118,742 UART: [rt]cmd =0x44504543, len=96
44,892,637 >>> mbox cmd response data (6236 bytes)
44,921,411 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,952,026 UART: [rt]cmd =0x53574545, len=84
50,537,363 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,227 UART:
192,596 UART: Running Caliptra ROM ...
193,790 UART:
603,594 UART: [state] CFI Enabled
618,013 UART: [state] LifecycleState = Unprovisioned
619,955 UART: [state] DebugLocked = No
622,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,324 UART: [kat] SHA2-256
797,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,630 UART: [kat] ++
808,070 UART: [kat] sha1
820,047 UART: [kat] SHA2-256
822,774 UART: [kat] SHA2-384
827,554 UART: [kat] SHA2-512-ACC
829,989 UART: [kat] ECC-384
3,115,105 UART: [kat] HMAC-384Kdf
3,126,840 UART: [kat] LMS
4,316,941 UART: [kat] --
4,320,689 UART: [cold-reset] ++
4,321,722 UART: [fht] Storing FHT @ 0x50003400
4,334,052 UART: [idev] ++
4,334,613 UART: [idev] CDI.KEYID = 6
4,335,593 UART: [idev] SUBJECT.KEYID = 7
4,336,830 UART: [idev] UDS.KEYID = 0
4,337,825 ready_for_fw is high
4,338,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,481 UART: [idev] Erasing UDS.KEYID = 0
7,628,102 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,472 UART: [idev] --
7,653,388 UART: [ldev] ++
7,653,962 UART: [ldev] CDI.KEYID = 6
7,654,923 UART: [ldev] SUBJECT.KEYID = 5
7,656,131 UART: [ldev] AUTHORITY.KEYID = 7
7,657,411 UART: [ldev] FE.KEYID = 1
7,667,636 UART: [ldev] Erasing FE.KEYID = 1
10,956,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,715 UART: [ldev] --
13,318,300 UART: [fwproc] Waiting for Commands...
13,321,253 UART: [fwproc] Received command 0x46574c44
13,323,481 UART: [fwproc] Received Image of size 114124 bytes
17,378,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,902 >>> mbox cmd response: success
17,846,191 UART: [afmc] ++
17,846,788 UART: [afmc] CDI.KEYID = 6
17,847,699 UART: [afmc] SUBJECT.KEYID = 7
17,848,930 UART: [afmc] AUTHORITY.KEYID = 5
21,165,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,411 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,807 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,621 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,061 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,539 UART: [afmc] --
23,529,624 UART: [cold-reset] --
23,533,966 UART: [state] Locking Datavault
23,537,591 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,290 UART: [state] Locking ICCM
23,541,380 UART: [exit] Launching FMC @ 0x40000130
23,549,770 UART:
23,550,009 UART: Running Caliptra FMC ...
23,551,112 UART:
23,551,294 UART: [state] CFI Enabled
23,559,665 UART: [fht] FMC Alias Private Key: 7
25,890,491 UART: [art] Extend RT PCRs Done
25,891,712 UART: [art] Lock RT PCRs Done
25,893,192 UART: [art] Populate DV Done
25,898,764 UART: [fht] FMC Alias Private Key: 7
25,900,407 UART: [art] Derive CDI
25,901,136 UART: [art] Store in in slot 0x4
25,944,044 UART: [art] Derive Key Pair
25,945,048 UART: [art] Store priv key in slot 0x5
29,187,063 UART: [art] Derive Key Pair - Done
29,199,741 UART: [art] Signing Cert with AUTHO
29,201,042 UART: RITY.KEYID = 7
31,480,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,184 UART: [art] PUB.X = E4BEC44264A695B32844E8FEEF916FAEE0EAF2D6CDDC2272F033F6CB50AD50F29EA83274A555AB79813C199960061F27
31,489,489 UART: [art] PUB.Y = 9FD405463F7947726740DA76A8216B74CA4E292E87213A7442CAD4D81F83F762CD797ED59A72ED87D048EEBBC258F510
31,496,663 UART: [art] SIG.R = 1AEED3C6D2054A622BE596054448140FFFA830DA76CC9A0F1B37340583EB91B089F21F85F737EE4583C01E3C0AD0A0F0
31,504,046 UART: [art] SIG.S = 409949B8E9416FACA4CBEBC34FCA88C04580EA5E964E4EBA8C9C3766DCEF93AA6773260D03E7EC72EEF30412147B35D5
32,809,121 UART: Caliptra RT
32,809,836 UART: [state] CFI Enabled
32,927,404 UART: [rt] RT listening for mailbox commands...
32,929,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,960,367 UART: [rt]cmd =0x44504543, len=96
38,633,950 >>> mbox cmd response data (6236 bytes)
38,663,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,693,846 UART: [rt]cmd =0x44504543, len=96
38,724,792 >>> mbox cmd response data (56 bytes)
38,725,525 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,755,555 UART: [rt]cmd =0x52564348, len=36
38,758,519 >>> mbox cmd response data (8 bytes)
38,759,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,789,731 UART: [rt]cmd =0x44504543, len=96
44,463,171 >>> mbox cmd response data (6236 bytes)
44,491,992 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,522,581 UART: [rt]cmd =0x53574545, len=84
50,046,776 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,126,582 ready_for_fw is high
4,127,108 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,839 >>> mbox cmd response: success
23,711,469 UART:
23,711,879 UART: Running Caliptra FMC ...
23,712,985 UART:
23,713,131 UART: [state] CFI Enabled
23,721,236 UART: [fht] FMC Alias Private Key: 7
26,052,735 UART: [art] Extend RT PCRs Done
26,053,961 UART: [art] Lock RT PCRs Done
26,055,452 UART: [art] Populate DV Done
26,060,870 UART: [fht] FMC Alias Private Key: 7
26,062,310 UART: [art] Derive CDI
26,063,045 UART: [art] Store in in slot 0x4
26,105,914 UART: [art] Derive Key Pair
26,106,973 UART: [art] Store priv key in slot 0x5
29,349,063 UART: [art] Derive Key Pair - Done
29,362,231 UART: [art] Signing Cert with AUTHO
29,363,570 UART: RITY.KEYID = 7
31,642,908 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,413 UART: [art] PUB.X = 615096D69A57CA41155DCA8A2453396A86EE7EBC34D56E3CB6BA476DE24E3A3618C3C71805C6C2A1A016CBD33FBD5437
31,651,675 UART: [art] PUB.Y = C8310F9B0944F01E05ABEC37DF260EE7E3E935BB9348EF33762F898871E619C843B2BB19DBC8E44DF1EFA226BAB6E467
31,658,939 UART: [art] SIG.R = D4401C0358CE8DDBE3128EDB161F1A2754FCF72C4725B66A1B761083B178E4220344152219DF1DB690E43FBDADE79A17
31,666,302 UART: [art] SIG.S = 872CE63FFA5E3EDBA0519FAFBB7C4015CF62FF2D8B3BA467D51413A798D02181AFB80FCC8099A16A1F8FF4E8F9251E3E
32,970,793 UART: Caliptra RT
32,971,502 UART: [state] CFI Enabled
33,089,162 UART: [rt] RT listening for mailbox commands...
33,091,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,122,209 UART: [rt]cmd =0x44504543, len=96
38,794,781 >>> mbox cmd response data (6236 bytes)
38,823,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,854,623 UART: [rt]cmd =0x44504543, len=96
38,886,081 >>> mbox cmd response data (56 bytes)
38,886,862 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,916,731 UART: [rt]cmd =0x52564348, len=36
38,919,433 >>> mbox cmd response data (8 bytes)
38,920,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,950,663 UART: [rt]cmd =0x44504543, len=96
44,623,280 >>> mbox cmd response data (6236 bytes)
44,652,228 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,682,889 UART: [rt]cmd =0x53574545, len=84
50,207,518 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
191,987 UART:
192,513 UART: Running Caliptra ROM ...
193,681 UART:
193,842 UART: [state] CFI Enabled
268,150 UART: [state] LifecycleState = Unprovisioned
269,993 UART: [state] DebugLocked = No
272,736 UART: [state] WD Timer not started. Device not locked for debugging
276,490 UART: [kat] SHA2-256
455,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,204 UART: [kat] ++
467,732 UART: [kat] sha1
478,488 UART: [kat] SHA2-256
481,499 UART: [kat] SHA2-384
488,337 UART: [kat] SHA2-512-ACC
491,271 UART: [kat] ECC-384
2,948,707 UART: [kat] HMAC-384Kdf
2,972,255 UART: [kat] LMS
3,501,672 UART: [kat] --
3,506,376 UART: [cold-reset] ++
3,508,733 UART: [fht] FHT @ 0x50003400
3,520,276 UART: [idev] ++
3,520,844 UART: [idev] CDI.KEYID = 6
3,521,771 UART: [idev] SUBJECT.KEYID = 7
3,522,943 UART: [idev] UDS.KEYID = 0
3,523,866 ready_for_fw is high
3,524,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,080 UART: [idev] Erasing UDS.KEYID = 0
6,027,634 UART: [idev] Sha1 KeyId Algorithm
6,050,971 UART: [idev] --
6,054,750 UART: [ldev] ++
6,055,318 UART: [ldev] CDI.KEYID = 6
6,056,234 UART: [ldev] SUBJECT.KEYID = 5
6,057,458 UART: [ldev] AUTHORITY.KEYID = 7
6,058,693 UART: [ldev] FE.KEYID = 1
6,101,749 UART: [ldev] Erasing FE.KEYID = 1
8,607,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,821 UART: [ldev] --
10,414,219 UART: [fwproc] Wait for Commands...
10,416,418 UART: [fwproc] Recv command 0x46574c44
10,418,529 UART: [fwproc] Recv'd Img size: 114448 bytes
13,829,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,295,778 >>> mbox cmd response: success
14,300,560 UART: [afmc] ++
14,301,162 UART: [afmc] CDI.KEYID = 6
14,302,075 UART: [afmc] SUBJECT.KEYID = 7
14,303,243 UART: [afmc] AUTHORITY.KEYID = 5
16,832,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,589,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,605,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,621,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,389 UART: [afmc] --
18,648,734 UART: [cold-reset] --
18,652,162 UART: [state] Locking Datavault
18,657,622 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,264 UART: [state] Locking ICCM
18,661,512 UART: [exit] Launching FMC @ 0x40000130
18,669,930 UART:
18,670,165 UART: Running Caliptra FMC ...
18,671,268 UART:
18,671,434 UART: [state] CFI Enabled
18,731,849 UART: [fht] FMC Alias Private Key: 7
20,495,891 UART: [art] Extend RT PCRs Done
20,497,106 UART: [art] Lock RT PCRs Done
20,498,836 UART: [art] Populate DV Done
20,504,406 UART: [fht] FMC Alias Private Key: 7
20,506,144 UART: [art] Derive CDI
20,506,964 UART: [art] Store in in slot 0x4
20,565,376 UART: [art] Derive Key Pair
20,566,374 UART: [art] Store priv key in slot 0x5
23,029,362 UART: [art] Derive Key Pair - Done
23,041,982 UART: [art] Signing Cert with AUTHO
23,043,288 UART: RITY.KEYID = 7
24,755,078 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,586 UART: [art] PUB.X = FC97B77A6A5BFC892F50B11612150E91BF84DF366860AAB348C76FBCAE06AD05962A662E279F7309C1C02E162F685C87
24,763,842 UART: [art] PUB.Y = 521C88E1AA7827F59DD3B953235529C2E447B517BBF516ACC13342AEABD0698B133ACA6C6F584ECE99003C541569BD6C
24,771,073 UART: [art] SIG.R = 2AA1E11497BAFF2FEF440BA5DC0C2A2A0EF7996FF9A5629B246987C5F8BEF369DA5D75287251A3A6AA7E7EE36E830D07
24,778,462 UART: [art] SIG.S = C1E7A1BF4A72A213B8C5817F83A624495B5D24C27679A69CCE6ADBAD92BFBD5E6646CDD8982BC7F50790681586B253F8
25,758,046 UART: Caliptra RT
25,758,758 UART: [state] CFI Enabled
25,923,548 UART: [rt] RT listening for mailbox commands...
25,925,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,957,081 UART: [rt]cmd =0x44504543, len=96
30,336,137 >>> mbox cmd response data (6236 bytes)
30,365,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,396,279 UART: [rt]cmd =0x44504543, len=96
30,427,915 >>> mbox cmd response data (56 bytes)
30,428,675 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,458,647 UART: [rt]cmd =0x52564348, len=36
30,461,027 >>> mbox cmd response data (8 bytes)
30,461,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,492,246 UART: [rt]cmd =0x44504543, len=96
34,859,101 >>> mbox cmd response data (6236 bytes)
34,887,907 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,918,669 UART: [rt]cmd =0x53574545, len=84
39,097,564 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,361,952 ready_for_fw is high
3,362,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,382 >>> mbox cmd response: success
18,346,488 UART:
18,346,904 UART: Running Caliptra FMC ...
18,348,015 UART:
18,348,172 UART: [state] CFI Enabled
18,412,725 UART: [fht] FMC Alias Private Key: 7
20,176,040 UART: [art] Extend RT PCRs Done
20,177,265 UART: [art] Lock RT PCRs Done
20,179,087 UART: [art] Populate DV Done
20,184,347 UART: [fht] FMC Alias Private Key: 7
20,185,834 UART: [art] Derive CDI
20,186,596 UART: [art] Store in in slot 0x4
20,245,312 UART: [art] Derive Key Pair
20,246,353 UART: [art] Store priv key in slot 0x5
22,709,604 UART: [art] Derive Key Pair - Done
22,722,705 UART: [art] Signing Cert with AUTHO
22,724,006 UART: RITY.KEYID = 7
24,435,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,557 UART: [art] PUB.X = 2CF03F69BEC92143CAEC5AA3988DC812468596F08D8EA4694009160F468F0E90AACA2728C3C09602085171F4DB41A3C3
24,443,817 UART: [art] PUB.Y = DF644D42E7F8D102B20EF6C95233EAB20E4C08ECA1AE799D3D31F371F4A8E2F5696027DEBE4105DF46F80870818C1572
24,451,083 UART: [art] SIG.R = AB34800A30B99C2FC4FEC64E5F136E1DF7C9CF12D6D0A783A01922BA10E6BCCF2EB67FD442719583F5B7C88F4269E814
24,458,488 UART: [art] SIG.S = 42B815CE80FB172EB472F94008F2CFE3823B26E43939D748FB52A3158A36F2FA10797EB109AE86A6484F623BDBFF7F56
25,436,895 UART: Caliptra RT
25,437,595 UART: [state] CFI Enabled
25,603,754 UART: [rt] RT listening for mailbox commands...
25,606,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,637,484 UART: [rt]cmd =0x44504543, len=96
30,016,068 >>> mbox cmd response data (6236 bytes)
30,045,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,076,387 UART: [rt]cmd =0x44504543, len=96
30,107,236 >>> mbox cmd response data (56 bytes)
30,107,945 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,137,934 UART: [rt]cmd =0x52564348, len=36
30,140,509 >>> mbox cmd response data (8 bytes)
30,141,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,171,678 UART: [rt]cmd =0x44504543, len=96
34,539,579 >>> mbox cmd response data (6236 bytes)
34,568,378 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,598,987 UART: [rt]cmd =0x53574545, len=84
38,777,777 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,376 UART:
192,755 UART: Running Caliptra ROM ...
194,069 UART:
603,356 UART: [state] CFI Enabled
618,645 UART: [state] LifecycleState = Unprovisioned
620,518 UART: [state] DebugLocked = No
623,174 UART: [state] WD Timer not started. Device not locked for debugging
626,764 UART: [kat] SHA2-256
805,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,495 UART: [kat] ++
818,016 UART: [kat] sha1
829,219 UART: [kat] SHA2-256
832,267 UART: [kat] SHA2-384
838,966 UART: [kat] SHA2-512-ACC
841,894 UART: [kat] ECC-384
3,285,038 UART: [kat] HMAC-384Kdf
3,297,203 UART: [kat] LMS
3,826,689 UART: [kat] --
3,830,409 UART: [cold-reset] ++
3,832,472 UART: [fht] FHT @ 0x50003400
3,843,294 UART: [idev] ++
3,843,851 UART: [idev] CDI.KEYID = 6
3,844,795 UART: [idev] SUBJECT.KEYID = 7
3,846,029 UART: [idev] UDS.KEYID = 0
3,846,956 ready_for_fw is high
3,847,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,872 UART: [idev] Erasing UDS.KEYID = 0
6,321,693 UART: [idev] Sha1 KeyId Algorithm
6,345,605 UART: [idev] --
6,348,545 UART: [ldev] ++
6,349,113 UART: [ldev] CDI.KEYID = 6
6,350,031 UART: [ldev] SUBJECT.KEYID = 5
6,351,178 UART: [ldev] AUTHORITY.KEYID = 7
6,352,453 UART: [ldev] FE.KEYID = 1
6,363,845 UART: [ldev] Erasing FE.KEYID = 1
8,838,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,709 UART: [ldev] --
10,626,881 UART: [fwproc] Wait for Commands...
10,628,423 UART: [fwproc] Recv command 0x46574c44
10,630,530 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,154 >>> mbox cmd response: success
14,493,063 UART: [afmc] ++
14,493,660 UART: [afmc] CDI.KEYID = 6
14,494,566 UART: [afmc] SUBJECT.KEYID = 7
14,495,722 UART: [afmc] AUTHORITY.KEYID = 5
16,996,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,066 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,217 UART: [afmc] --
18,789,117 UART: [cold-reset] --
18,793,675 UART: [state] Locking Datavault
18,800,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,073 UART: [state] Locking ICCM
18,803,513 UART: [exit] Launching FMC @ 0x40000130
18,811,958 UART:
18,812,187 UART: Running Caliptra FMC ...
18,813,279 UART:
18,813,432 UART: [state] CFI Enabled
18,821,801 UART: [fht] FMC Alias Private Key: 7
20,579,137 UART: [art] Extend RT PCRs Done
20,580,350 UART: [art] Lock RT PCRs Done
20,582,126 UART: [art] Populate DV Done
20,587,329 UART: [fht] FMC Alias Private Key: 7
20,588,858 UART: [art] Derive CDI
20,589,585 UART: [art] Store in in slot 0x4
20,632,667 UART: [art] Derive Key Pair
20,633,661 UART: [art] Store priv key in slot 0x5
23,059,790 UART: [art] Derive Key Pair - Done
23,072,596 UART: [art] Signing Cert with AUTHO
23,073,903 UART: RITY.KEYID = 7
24,779,212 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,716 UART: [art] PUB.X = B943351C1EB53D73CD2BC9D5C23C680CF8EA516EFFF541814AB23D0687574F709B92126410D188099A2FD84006F6C16F
24,787,943 UART: [art] PUB.Y = 94971E41F86BB90333753225528C4B2DF63BFD3CCF55B5FC10CB3F069BF18109F401780BAB861F20677179BA9D14524F
24,795,209 UART: [art] SIG.R = E6640B5F9618B420826DA55A57D69F24AF626BB8208801B563DA995093092C833C1CA80699D64FD7DAE41E29AD261839
24,802,579 UART: [art] SIG.S = 02E5A3F658C05BE0AF93114EEC27FF33A642EE656F201A0DF45064C489BAC563D8A611ED24F1BFEB3577DDC90C21B8D5
25,781,761 UART: Caliptra RT
25,782,454 UART: [state] CFI Enabled
25,899,781 UART: [rt] RT listening for mailbox commands...
25,902,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,898 UART: [rt]cmd =0x44504543, len=96
30,216,391 >>> mbox cmd response data (6236 bytes)
30,245,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,276,323 UART: [rt]cmd =0x44504543, len=96
30,307,469 >>> mbox cmd response data (56 bytes)
30,308,189 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,338,267 UART: [rt]cmd =0x52564348, len=36
30,340,978 >>> mbox cmd response data (8 bytes)
30,341,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,372,271 UART: [rt]cmd =0x44504543, len=96
34,656,157 >>> mbox cmd response data (6236 bytes)
34,685,137 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,715,678 UART: [rt]cmd =0x53574545, len=84
38,850,837 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,695,876 ready_for_fw is high
3,696,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,338 >>> mbox cmd response: success
18,519,474 UART:
18,519,868 UART: Running Caliptra FMC ...
18,520,997 UART:
18,521,142 UART: [state] CFI Enabled
18,529,130 UART: [fht] FMC Alias Private Key: 7
20,286,559 UART: [art] Extend RT PCRs Done
20,287,794 UART: [art] Lock RT PCRs Done
20,289,314 UART: [art] Populate DV Done
20,294,610 UART: [fht] FMC Alias Private Key: 7
20,296,148 UART: [art] Derive CDI
20,296,955 UART: [art] Store in in slot 0x4
20,339,554 UART: [art] Derive Key Pair
20,340,586 UART: [art] Store priv key in slot 0x5
22,767,351 UART: [art] Derive Key Pair - Done
22,780,299 UART: [art] Signing Cert with AUTHO
22,781,602 UART: RITY.KEYID = 7
24,486,912 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,416 UART: [art] PUB.X = 07819F97EEFE3EEE665F56A175236BBC9DC685ADE3607ABE02152A08B4B9A4CBCD2A4464A7A61ECA2D7A95FEA7951445
24,495,754 UART: [art] PUB.Y = BAC608FF4EF59D0416972673840E9739E74E722EE35E3E8B9E8FDAB4DA30408DB1BE17886ABDA4C43DA708E5E8A38810
24,502,972 UART: [art] SIG.R = F281ED4BD7BA14A97CA64B00733F7C6379CCA0F4722F3894E1808715128121A21B7B7C4C8988D3E02843464379927489
24,510,297 UART: [art] SIG.S = 573D25B63FF2343FBC3061D7942AABB6FB46253FE2776C7381244E31510EFE9281E9832104D8799A2B3C076A76A7D8B9
25,489,499 UART: Caliptra RT
25,490,198 UART: [state] CFI Enabled
25,607,310 UART: [rt] RT listening for mailbox commands...
25,609,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,640,165 UART: [rt]cmd =0x44504543, len=96
29,924,670 >>> mbox cmd response data (6236 bytes)
29,954,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
29,984,779 UART: [rt]cmd =0x44504543, len=96
30,016,506 >>> mbox cmd response data (56 bytes)
30,017,260 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,047,184 UART: [rt]cmd =0x52564348, len=36
30,050,018 >>> mbox cmd response data (8 bytes)
30,050,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,081,083 UART: [rt]cmd =0x44504543, len=96
34,364,584 >>> mbox cmd response data (6236 bytes)
34,393,365 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,423,914 UART: [rt]cmd =0x53574545, len=84
38,559,892 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,069 UART:
192,449 UART: Running Caliptra ROM ...
193,648 UART:
193,805 UART: [state] CFI Enabled
263,515 UART: [state] LifecycleState = Unprovisioned
265,851 UART: [state] DebugLocked = No
267,659 UART: [state] WD Timer not started. Device not locked for debugging
271,474 UART: [kat] SHA2-256
461,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,121 UART: [kat] ++
472,569 UART: [kat] sha1
484,740 UART: [kat] SHA2-256
487,748 UART: [kat] SHA2-384
492,881 UART: [kat] SHA2-512-ACC
495,456 UART: [kat] ECC-384
2,946,573 UART: [kat] HMAC-384Kdf
2,972,096 UART: [kat] LMS
3,503,907 UART: [kat] --
3,508,396 UART: [cold-reset] ++
3,510,249 UART: [fht] FHT @ 0x50003400
3,521,649 UART: [idev] ++
3,522,276 UART: [idev] CDI.KEYID = 6
3,523,307 UART: [idev] SUBJECT.KEYID = 7
3,524,477 UART: [idev] UDS.KEYID = 0
3,525,409 ready_for_fw is high
3,525,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,644 UART: [idev] Erasing UDS.KEYID = 0
6,029,873 UART: [idev] Sha1 KeyId Algorithm
6,051,627 UART: [idev] --
6,057,400 UART: [ldev] ++
6,058,091 UART: [ldev] CDI.KEYID = 6
6,059,014 UART: [ldev] SUBJECT.KEYID = 5
6,060,181 UART: [ldev] AUTHORITY.KEYID = 7
6,061,362 UART: [ldev] FE.KEYID = 1
6,099,881 UART: [ldev] Erasing FE.KEYID = 1
8,605,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,342 UART: [ldev] --
10,410,959 UART: [fwproc] Wait for Commands...
10,413,588 UART: [fwproc] Recv command 0x46574c44
10,415,913 UART: [fwproc] Recv'd Img size: 114448 bytes
13,864,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,807 >>> mbox cmd response: success
14,608,606 UART: [afmc] ++
14,609,342 UART: [afmc] CDI.KEYID = 6
14,610,536 UART: [afmc] SUBJECT.KEYID = 7
14,612,025 UART: [afmc] AUTHORITY.KEYID = 5
17,146,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,644 UART: [afmc] --
18,948,812 UART: [cold-reset] --
18,953,546 UART: [state] Locking Datavault
18,959,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,371 UART: [state] Locking ICCM
18,963,089 UART: [exit] Launching FMC @ 0x40000130
18,971,766 UART:
18,971,995 UART: Running Caliptra FMC ...
18,973,095 UART:
18,973,262 UART: [state] CFI Enabled
19,029,684 UART: [fht] FMC Alias Private Key: 7
20,794,033 UART: [art] Extend RT PCRs Done
20,795,247 UART: [art] Lock RT PCRs Done
20,797,020 UART: [art] Populate DV Done
20,802,647 UART: [fht] FMC Alias Private Key: 7
20,804,176 UART: [art] Derive CDI
20,804,908 UART: [art] Store in in slot 0x4
20,862,714 UART: [art] Derive Key Pair
20,863,753 UART: [art] Store priv key in slot 0x5
23,325,960 UART: [art] Derive Key Pair - Done
23,339,252 UART: [art] Signing Cert with AUTHO
23,340,557 UART: RITY.KEYID = 7
25,052,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,432 UART: [art] PUB.X = 9AF61C5C428B53FC6DDE58FA1EF706DE15B8BDE9CB869FA64D14BEE05AB951E978EE188841B1C4C1CDF3074245305855
25,061,730 UART: [art] PUB.Y = E015FA43F24C32BB30EC2D047C8DBC31E66CCAC9CB5474DE4894566717BC206AF999DFB22382B36B9DDAB7D2E9F8A32E
25,069,012 UART: [art] SIG.R = 6B2F0C6704C08D1B22A62FD3E62D3C750304F6994BEEBF0777FF818AD58FD15A5EA3E48F715CEA93FCA113B657EE8AC0
25,076,398 UART: [art] SIG.S = 05AF9F23A44EC415E3171A464CD660DC755493492047CCFE032804CF6084B785632FD7B6BFAC4F10E79C3C21F8DF6F9E
26,055,434 UART: Caliptra RT
26,056,157 UART: [state] CFI Enabled
26,220,755 UART: [rt] RT listening for mailbox commands...
26,223,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,284 UART: [rt]cmd =0x44504543, len=96
30,633,888 >>> mbox cmd response data (6236 bytes)
30,663,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,693,886 UART: [rt]cmd =0x44504543, len=96
30,725,461 >>> mbox cmd response data (56 bytes)
30,726,178 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,756,097 UART: [rt]cmd =0x52564348, len=36
30,758,424 >>> mbox cmd response data (8 bytes)
30,759,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,789,786 UART: [rt]cmd =0x44504543, len=96
35,156,511 >>> mbox cmd response data (6236 bytes)
35,185,486 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,216,206 UART: [rt]cmd =0x53574545, len=84
39,393,990 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,433,345 ready_for_fw is high
3,433,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,987 >>> mbox cmd response: success
19,018,757 UART:
19,019,140 UART: Running Caliptra FMC ...
19,020,337 UART:
19,020,509 UART: [state] CFI Enabled
19,088,651 UART: [fht] FMC Alias Private Key: 7
20,852,663 UART: [art] Extend RT PCRs Done
20,853,877 UART: [art] Lock RT PCRs Done
20,855,610 UART: [art] Populate DV Done
20,860,969 UART: [fht] FMC Alias Private Key: 7
20,862,569 UART: [art] Derive CDI
20,863,385 UART: [art] Store in in slot 0x4
20,921,467 UART: [art] Derive Key Pair
20,922,507 UART: [art] Store priv key in slot 0x5
23,385,068 UART: [art] Derive Key Pair - Done
23,398,285 UART: [art] Signing Cert with AUTHO
23,399,588 UART: RITY.KEYID = 7
25,111,044 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,538 UART: [art] PUB.X = 394836255D28DB7C1704D95DB5D5DEB47F5580C3DC2B87DF77594238A0260BC0E93FCD2AF53A9859B51399A9F5AC8E24
25,119,815 UART: [art] PUB.Y = 3084A6764885D38753F054169FE4A2806367D95045B6FE5EA63413E848F795D19649EC5C88C4C11C1A27E778CEBE18EA
25,127,068 UART: [art] SIG.R = E96464C3203367166CCC831E01A37C58E08C5845AED99AFAF6710DB0B193EC6ECCDDAC5B400C34D7147738FC835178C3
25,134,479 UART: [art] SIG.S = 2C62E546E80FA387A9963B1237E0AD30C66D46C560D1AF528329E0BB44625AFE2B28446380CEBC303500BF615CEE7151
26,113,521 UART: Caliptra RT
26,114,229 UART: [state] CFI Enabled
26,278,477 UART: [rt] RT listening for mailbox commands...
26,280,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,312,159 UART: [rt]cmd =0x44504543, len=96
30,692,157 >>> mbox cmd response data (6236 bytes)
30,722,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,752,942 UART: [rt]cmd =0x44504543, len=96
30,783,702 >>> mbox cmd response data (56 bytes)
30,784,445 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,814,447 UART: [rt]cmd =0x52564348, len=36
30,816,917 >>> mbox cmd response data (8 bytes)
30,817,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,848,039 UART: [rt]cmd =0x44504543, len=96
35,216,973 >>> mbox cmd response data (6236 bytes)
35,246,390 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,276,835 UART: [rt]cmd =0x53574545, len=84
39,453,879 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,430 UART:
192,820 UART: Running Caliptra ROM ...
194,009 UART:
603,459 UART: [state] CFI Enabled
614,635 UART: [state] LifecycleState = Unprovisioned
616,998 UART: [state] DebugLocked = No
620,011 UART: [state] WD Timer not started. Device not locked for debugging
623,886 UART: [kat] SHA2-256
813,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,570 UART: [kat] ++
825,086 UART: [kat] sha1
835,173 UART: [kat] SHA2-256
838,178 UART: [kat] SHA2-384
844,233 UART: [kat] SHA2-512-ACC
846,803 UART: [kat] ECC-384
3,288,407 UART: [kat] HMAC-384Kdf
3,302,408 UART: [kat] LMS
3,834,243 UART: [kat] --
3,839,458 UART: [cold-reset] ++
3,841,027 UART: [fht] FHT @ 0x50003400
3,853,708 UART: [idev] ++
3,854,335 UART: [idev] CDI.KEYID = 6
3,855,308 UART: [idev] SUBJECT.KEYID = 7
3,856,541 UART: [idev] UDS.KEYID = 0
3,857,457 ready_for_fw is high
3,857,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,365 UART: [idev] Erasing UDS.KEYID = 0
6,328,563 UART: [idev] Sha1 KeyId Algorithm
6,351,147 UART: [idev] --
6,355,726 UART: [ldev] ++
6,356,453 UART: [ldev] CDI.KEYID = 6
6,357,327 UART: [ldev] SUBJECT.KEYID = 5
6,358,528 UART: [ldev] AUTHORITY.KEYID = 7
6,359,766 UART: [ldev] FE.KEYID = 1
6,370,786 UART: [ldev] Erasing FE.KEYID = 1
8,849,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,736 UART: [ldev] --
10,639,269 UART: [fwproc] Wait for Commands...
10,641,463 UART: [fwproc] Recv command 0x46574c44
10,643,761 UART: [fwproc] Recv'd Img size: 114448 bytes
14,084,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,274,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,817,858 >>> mbox cmd response: success
14,821,627 UART: [afmc] ++
14,822,406 UART: [afmc] CDI.KEYID = 6
14,823,596 UART: [afmc] SUBJECT.KEYID = 7
14,825,025 UART: [afmc] AUTHORITY.KEYID = 5
17,329,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,051,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,053,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,068,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,084,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,099,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,253 UART: [afmc] --
19,127,087 UART: [cold-reset] --
19,131,277 UART: [state] Locking Datavault
19,137,565 UART: [state] Locking PCR0, PCR1 and PCR31
19,139,711 UART: [state] Locking ICCM
19,141,318 UART: [exit] Launching FMC @ 0x40000130
19,149,988 UART:
19,150,230 UART: Running Caliptra FMC ...
19,151,324 UART:
19,151,479 UART: [state] CFI Enabled
19,159,732 UART: [fht] FMC Alias Private Key: 7
20,916,626 UART: [art] Extend RT PCRs Done
20,917,841 UART: [art] Lock RT PCRs Done
20,919,514 UART: [art] Populate DV Done
20,924,896 UART: [fht] FMC Alias Private Key: 7
20,926,487 UART: [art] Derive CDI
20,927,296 UART: [art] Store in in slot 0x4
20,969,673 UART: [art] Derive Key Pair
20,970,716 UART: [art] Store priv key in slot 0x5
23,397,578 UART: [art] Derive Key Pair - Done
23,410,357 UART: [art] Signing Cert with AUTHO
23,411,662 UART: RITY.KEYID = 7
25,116,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,194 UART: [art] PUB.X = A49295D8BD05AD39B521350919D8276EBA088431C3B0BA75440BB5325FF335047DBFCC0214DB01A456E16EB50D3DA397
25,125,460 UART: [art] PUB.Y = BB840DA8BD476C277ED7D598E394022619987451C9B60C3B7025A24C6D0AACA324D64E98BCE580DEAFFC3EDDDC8D1DF6
25,132,718 UART: [art] SIG.R = 5B3B32130E37079FB9010D32BB6D3CC1321C2092B3C4CFF7A73AC74DA03C8EC54CDF4ACF175D4323C41B4E2E74B81CC3
25,140,085 UART: [art] SIG.S = 5D2CC908CFC8EB8AB01C34D8D00321E04E1F085298DE90750400A0D955DE77DBDC43188F6FFB805DCBD34FA1A53BAE62
26,119,029 UART: Caliptra RT
26,119,718 UART: [state] CFI Enabled
26,237,272 UART: [rt] RT listening for mailbox commands...
26,239,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,270,466 UART: [rt]cmd =0x44504543, len=96
30,554,666 >>> mbox cmd response data (6236 bytes)
30,583,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,614,470 UART: [rt]cmd =0x44504543, len=96
30,645,499 >>> mbox cmd response data (56 bytes)
30,646,259 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,231 UART: [rt]cmd =0x52564348, len=36
30,678,712 >>> mbox cmd response data (8 bytes)
30,679,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,710,023 UART: [rt]cmd =0x44504543, len=96
34,994,360 >>> mbox cmd response data (6236 bytes)
35,023,330 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,054,148 UART: [rt]cmd =0x53574545, len=84
39,189,306 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,752,241 ready_for_fw is high
3,752,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,589 >>> mbox cmd response: success
19,219,427 UART:
19,219,806 UART: Running Caliptra FMC ...
19,220,896 UART:
19,221,044 UART: [state] CFI Enabled
19,229,316 UART: [fht] FMC Alias Private Key: 7
20,986,007 UART: [art] Extend RT PCRs Done
20,987,219 UART: [art] Lock RT PCRs Done
20,988,867 UART: [art] Populate DV Done
20,993,946 UART: [fht] FMC Alias Private Key: 7
20,995,483 UART: [art] Derive CDI
20,996,295 UART: [art] Store in in slot 0x4
21,038,958 UART: [art] Derive Key Pair
21,040,028 UART: [art] Store priv key in slot 0x5
23,466,531 UART: [art] Derive Key Pair - Done
23,479,581 UART: [art] Signing Cert with AUTHO
23,480,906 UART: RITY.KEYID = 7
25,186,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,230 UART: [art] PUB.X = 9E46B89A12C16A69031979565857C4175394704687BAB2214DE73EB25F6147DA8B5E6B00D8D658379FFBAA8F65B77B1A
25,194,967 UART: [art] PUB.Y = 8397C208ACFE90953E2A2EB237972F76843DD38E98734D0F99B5FB0A480ADABD8B36442C5E1382631AAC3901DCCC8E85
25,202,290 UART: [art] SIG.R = EA00B1E3D36B9BEF4DE8749337EC0DD98F1CCBC1145C8908341778DE85492F22678EF7A9375C3425894C4E0C9D091C7A
25,209,607 UART: [art] SIG.S = AE575AE4B4927D251BA2E10350E19B77C3CF396E3382F3E32D713DC92F0419B57AE67AE2A2D8766AEF6BDB749E741905
26,189,415 UART: Caliptra RT
26,190,105 UART: [state] CFI Enabled
26,307,761 UART: [rt] RT listening for mailbox commands...
26,310,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,340,367 UART: [rt]cmd =0x44504543, len=96
30,624,844 >>> mbox cmd response data (6236 bytes)
30,654,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,684,962 UART: [rt]cmd =0x44504543, len=96
30,716,039 >>> mbox cmd response data (56 bytes)
30,716,786 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,746,893 UART: [rt]cmd =0x52564348, len=36
30,749,325 >>> mbox cmd response data (8 bytes)
30,749,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,780,547 UART: [rt]cmd =0x44504543, len=96
35,064,319 >>> mbox cmd response data (6236 bytes)
35,093,111 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,123,661 UART: [rt]cmd =0x53574545, len=84
39,259,744 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
86,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,513 UART: [kat] SHA2-256
881,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,559 UART: [kat] ++
885,711 UART: [kat] sha1
889,929 UART: [kat] SHA2-256
891,867 UART: [kat] SHA2-384
894,578 UART: [kat] SHA2-512-ACC
896,479 UART: [kat] ECC-384
902,060 UART: [kat] HMAC-384Kdf
906,796 UART: [kat] LMS
1,474,992 UART: [kat] --
1,475,809 UART: [cold-reset] ++
1,476,149 UART: [fht] Storing FHT @ 0x50003400
1,479,056 UART: [idev] ++
1,479,224 UART: [idev] CDI.KEYID = 6
1,479,584 UART: [idev] SUBJECT.KEYID = 7
1,480,008 UART: [idev] UDS.KEYID = 0
1,480,353 ready_for_fw is high
1,480,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,692 UART: [idev] Erasing UDS.KEYID = 0
1,504,480 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,010 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,533 UART: [ldev] Erasing FE.KEYID = 1
1,545,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,544 UART: [ldev] --
1,584,939 UART: [fwproc] Waiting for Commands...
1,585,634 UART: [fwproc] Received command 0x46574c44
1,586,425 UART: [fwproc] Received Image of size 114448 bytes
2,886,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,775 >>> mbox cmd response: success
3,080,863 UART: [afmc] ++
3,081,031 UART: [afmc] CDI.KEYID = 6
3,081,393 UART: [afmc] SUBJECT.KEYID = 7
3,081,818 UART: [afmc] AUTHORITY.KEYID = 5
3,116,781 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,293 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,686 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,376 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,277 UART: [afmc] --
3,160,369 UART: [cold-reset] --
3,161,187 UART: [state] Locking Datavault
3,162,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,930 UART: [state] Locking ICCM
3,163,546 UART: [exit] Launching FMC @ 0x40000130
3,168,875 UART:
3,168,891 UART: Running Caliptra FMC ...
3,169,299 UART:
3,169,353 UART: [state] CFI Enabled
3,179,870 UART: [fht] FMC Alias Private Key: 7
3,288,133 UART: [art] Extend RT PCRs Done
3,288,561 UART: [art] Lock RT PCRs Done
3,290,253 UART: [art] Populate DV Done
3,298,520 UART: [fht] FMC Alias Private Key: 7
3,299,584 UART: [art] Derive CDI
3,299,864 UART: [art] Store in in slot 0x4
3,385,371 UART: [art] Derive Key Pair
3,385,731 UART: [art] Store priv key in slot 0x5
3,398,499 UART: [art] Derive Key Pair - Done
3,413,462 UART: [art] Signing Cert with AUTHO
3,413,942 UART: RITY.KEYID = 7
3,429,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,315 UART: [art] PUB.X = 010F98E262FAE6AB6E9F1C76F7A3B96839DFC128D190E845ABDDC7B557E0FB0EE1DBEBB394CDB1678D457A31654359C3
3,437,094 UART: [art] PUB.Y = 83B170573978AD09459CDC283EF5697942975219E924E81BF01925561AAE3E3EDBA6B7A47C91218EF9C5669B1D3EA04B
3,444,041 UART: [art] SIG.R = 80C9607A1DF7C101F050363E8983EB02B2FE71FB7EA04DD091EB846735F4A3F4DA354F547A3C06C3EE6A843BD7DA37BF
3,450,816 UART: [art] SIG.S = F2F55D6513391AA4502B882A51C0D5EA14191840F950736FDD3EB0094BEE2DAE97967DEDAF41F57AF286B87AC5AD64E0
3,474,772 UART: Caliptra RT
3,475,025 UART: [state] CFI Enabled
3,583,233 UART: [rt] RT listening for mailbox commands...
3,583,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,271 UART: [rt]cmd =0x44504543, len=96
3,796,130 >>> mbox cmd response data (6236 bytes)
3,796,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,028 UART: [rt]cmd =0x44504543, len=96
3,857,726 >>> mbox cmd response data (56 bytes)
3,857,727 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,302 UART: [rt]cmd =0x52564348, len=36
3,889,512 >>> mbox cmd response data (8 bytes)
3,889,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,582 UART: [rt]cmd =0x44504543, len=96
4,099,847 >>> mbox cmd response data (6236 bytes)
4,099,848 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,129,875 UART: [rt]cmd =0x53574545, len=84
4,155,305 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,279 ready_for_fw is high
1,362,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,513 >>> mbox cmd response: success
2,990,955 UART:
2,990,971 UART: Running Caliptra FMC ...
2,991,379 UART:
2,991,433 UART: [state] CFI Enabled
3,001,932 UART: [fht] FMC Alias Private Key: 7
3,109,839 UART: [art] Extend RT PCRs Done
3,110,267 UART: [art] Lock RT PCRs Done
3,111,805 UART: [art] Populate DV Done
3,120,116 UART: [fht] FMC Alias Private Key: 7
3,121,168 UART: [art] Derive CDI
3,121,448 UART: [art] Store in in slot 0x4
3,207,219 UART: [art] Derive Key Pair
3,207,579 UART: [art] Store priv key in slot 0x5
3,221,313 UART: [art] Derive Key Pair - Done
3,236,145 UART: [art] Signing Cert with AUTHO
3,236,625 UART: RITY.KEYID = 7
3,251,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,402 UART: [art] PUB.X = 5984C0BBA887BCCC49A07E752B3760543906DD00DC81207CC91C89B55573D62AA309D7E9B9491DE4FF5FD074DA372BFE
3,259,154 UART: [art] PUB.Y = C03DED04C6C74E15063FB56A13C6963A1B209C00246172A249E2F7E57B059465E92AE53FFF8FD539453194E5CF5C8494
3,266,073 UART: [art] SIG.R = DFDDE3FCEF5A43F0D7AA0A5DD7212156AB38229B40F6F411FB826D9D4FE9F0E472301A9F345BB0EA5B12719D770F6DF4
3,272,857 UART: [art] SIG.S = D843902DCC5252B1CDE1A5BF2E14377D208BF191E58BDE578D43E32203C747EDDD945D33A80CBAC4AD6FDD7AD4652F32
3,296,446 UART: Caliptra RT
3,296,699 UART: [state] CFI Enabled
3,405,669 UART: [rt] RT listening for mailbox commands...
3,406,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,913 UART: [rt]cmd =0x44504543, len=96
3,618,531 >>> mbox cmd response data (6236 bytes)
3,618,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,469 UART: [rt]cmd =0x44504543, len=96
3,680,031 >>> mbox cmd response data (56 bytes)
3,680,032 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,751 UART: [rt]cmd =0x52564348, len=36
3,711,861 >>> mbox cmd response data (8 bytes)
3,711,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,053 UART: [rt]cmd =0x44504543, len=96
3,923,363 >>> mbox cmd response data (6236 bytes)
3,923,364 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,407 UART: [rt]cmd =0x53574545, len=84
3,978,675 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,587 UART: [kat] SHA2-512-ACC
897,488 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,788 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 ready_for_fw is high
1,481,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,543 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,633 UART: [idev] --
1,515,834 UART: [ldev] ++
1,516,002 UART: [ldev] CDI.KEYID = 6
1,516,365 UART: [ldev] SUBJECT.KEYID = 5
1,516,791 UART: [ldev] AUTHORITY.KEYID = 7
1,517,254 UART: [ldev] FE.KEYID = 1
1,522,456 UART: [ldev] Erasing FE.KEYID = 1
1,547,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,258 UART: [fwproc] Waiting for Commands...
1,588,019 UART: [fwproc] Received command 0x46574c44
1,588,810 UART: [fwproc] Received Image of size 114448 bytes
2,888,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,174 >>> mbox cmd response: success
3,081,270 UART: [afmc] ++
3,081,438 UART: [afmc] CDI.KEYID = 6
3,081,800 UART: [afmc] SUBJECT.KEYID = 7
3,082,225 UART: [afmc] AUTHORITY.KEYID = 5
3,118,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,228 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,621 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,311 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,242 UART: [afmc] --
3,161,176 UART: [cold-reset] --
3,162,084 UART: [state] Locking Datavault
3,163,429 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,033 UART: [state] Locking ICCM
3,164,507 UART: [exit] Launching FMC @ 0x40000130
3,169,836 UART:
3,169,852 UART: Running Caliptra FMC ...
3,170,260 UART:
3,170,403 UART: [state] CFI Enabled
3,181,154 UART: [fht] FMC Alias Private Key: 7
3,289,409 UART: [art] Extend RT PCRs Done
3,289,837 UART: [art] Lock RT PCRs Done
3,291,367 UART: [art] Populate DV Done
3,299,904 UART: [fht] FMC Alias Private Key: 7
3,300,850 UART: [art] Derive CDI
3,301,130 UART: [art] Store in in slot 0x4
3,386,947 UART: [art] Derive Key Pair
3,387,307 UART: [art] Store priv key in slot 0x5
3,400,743 UART: [art] Derive Key Pair - Done
3,416,009 UART: [art] Signing Cert with AUTHO
3,416,489 UART: RITY.KEYID = 7
3,432,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,908 UART: [art] PUB.X = B0D63E49067A9768534D0B13BC2A5549396333E5DD839FFB22817FB7772BCFA651884D9192CFB50EBA8CA5E42B7EEFC9
3,439,679 UART: [art] PUB.Y = 063D2A9B3EDBB54B3497A1C460C8093EF30C6111127147BCFF2F84C08F1CA512D229AFF74784CB98E2C6F06AC35D1173
3,446,628 UART: [art] SIG.R = 29945D5A752F77DD444E15B3788B2B7E452AD36053206902D738E383EA32F926B44FB69E2BCF240A1771B95BF2A36C8E
3,453,392 UART: [art] SIG.S = 500C980D1E590064828DBCC9C7D97617182C920B332209DB01C1402B8E85A0D9E4DF309EE0166734250A03A2ED6754F5
3,477,526 UART: Caliptra RT
3,477,871 UART: [state] CFI Enabled
3,584,789 UART: [rt] RT listening for mailbox commands...
3,585,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,881 UART: [rt]cmd =0x44504543, len=96
3,797,096 >>> mbox cmd response data (6236 bytes)
3,797,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,180 UART: [rt]cmd =0x44504543, len=96
3,859,580 >>> mbox cmd response data (56 bytes)
3,859,581 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,058 UART: [rt]cmd =0x52564348, len=36
3,891,298 >>> mbox cmd response data (8 bytes)
3,891,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,182 UART: [rt]cmd =0x44504543, len=96
4,102,177 >>> mbox cmd response data (6236 bytes)
4,102,178 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,199 UART: [rt]cmd =0x53574545, len=84
4,158,669 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,040 ready_for_fw is high
1,363,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,396 >>> mbox cmd response: success
2,990,268 UART:
2,990,284 UART: Running Caliptra FMC ...
2,990,692 UART:
2,990,835 UART: [state] CFI Enabled
3,001,202 UART: [fht] FMC Alias Private Key: 7
3,108,871 UART: [art] Extend RT PCRs Done
3,109,299 UART: [art] Lock RT PCRs Done
3,110,689 UART: [art] Populate DV Done
3,118,966 UART: [fht] FMC Alias Private Key: 7
3,120,094 UART: [art] Derive CDI
3,120,374 UART: [art] Store in in slot 0x4
3,206,003 UART: [art] Derive Key Pair
3,206,363 UART: [art] Store priv key in slot 0x5
3,219,635 UART: [art] Derive Key Pair - Done
3,234,883 UART: [art] Signing Cert with AUTHO
3,235,363 UART: RITY.KEYID = 7
3,251,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,900 UART: [art] PUB.X = 18F2132DED8519715AD63F1CEF6B9289CC4113654489727A4FBCD8FF07B2AC8F8327168959610F77202BE98441FFC962
3,258,662 UART: [art] PUB.Y = F97EC4DA824F549FFF3B21B05D7F2A04B158A3D3C1F6553AB1FF3CC7159E27CBF67E601B35BFA9607F48AACA5D6A1A3B
3,265,633 UART: [art] SIG.R = D6DDAD864AAEA85A734D61539B4C1D90303D865345BD0F6618EE21EE3C2AFE7BA1CEFFDF1F80197DD0D9F499D9A261CC
3,272,424 UART: [art] SIG.S = 1127291DC184E992046D39C4DE4F2E8B1DF775A811F5800B7E554FD961CBDB7E3BFA901E3F1B5D40E92EEEC93A66E070
3,296,039 UART: Caliptra RT
3,296,384 UART: [state] CFI Enabled
3,404,125 UART: [rt] RT listening for mailbox commands...
3,404,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,339 UART: [rt]cmd =0x44504543, len=96
3,616,144 >>> mbox cmd response data (6236 bytes)
3,616,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,336 UART: [rt]cmd =0x44504543, len=96
3,678,162 >>> mbox cmd response data (56 bytes)
3,678,163 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,908 UART: [rt]cmd =0x52564348, len=36
3,710,390 >>> mbox cmd response data (8 bytes)
3,710,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,244 UART: [rt]cmd =0x44504543, len=96
3,920,861 >>> mbox cmd response data (6236 bytes)
3,920,862 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,791 UART: [rt]cmd =0x53574545, len=84
3,976,165 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,663 UART: [kat] SHA2-256
903,603 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,636 UART: [idev] ++
1,174,804 UART: [idev] CDI.KEYID = 6
1,175,164 UART: [idev] SUBJECT.KEYID = 7
1,175,588 UART: [idev] UDS.KEYID = 0
1,175,933 ready_for_fw is high
1,175,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,201,385 UART: [idev] Sha1 KeyId Algorithm
1,209,969 UART: [idev] --
1,210,917 UART: [ldev] ++
1,211,085 UART: [ldev] CDI.KEYID = 6
1,211,448 UART: [ldev] SUBJECT.KEYID = 5
1,211,874 UART: [ldev] AUTHORITY.KEYID = 7
1,212,337 UART: [ldev] FE.KEYID = 1
1,217,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,101 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,356 >>> mbox cmd response: success
2,775,546 UART: [afmc] ++
2,775,714 UART: [afmc] CDI.KEYID = 6
2,776,076 UART: [afmc] SUBJECT.KEYID = 7
2,776,501 UART: [afmc] AUTHORITY.KEYID = 5
2,811,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,983 UART: [afmc] --
2,855,067 UART: [cold-reset] --
2,855,695 UART: [state] Locking Datavault
2,856,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,324 UART: [state] Locking ICCM
2,857,780 UART: [exit] Launching FMC @ 0x40000130
2,863,109 UART:
2,863,125 UART: Running Caliptra FMC ...
2,863,533 UART:
2,863,587 UART: [state] CFI Enabled
2,874,288 UART: [fht] FMC Alias Private Key: 7
2,981,765 UART: [art] Extend RT PCRs Done
2,982,193 UART: [art] Lock RT PCRs Done
2,983,883 UART: [art] Populate DV Done
2,992,062 UART: [fht] FMC Alias Private Key: 7
2,993,160 UART: [art] Derive CDI
2,993,440 UART: [art] Store in in slot 0x4
3,079,273 UART: [art] Derive Key Pair
3,079,633 UART: [art] Store priv key in slot 0x5
3,092,639 UART: [art] Derive Key Pair - Done
3,107,286 UART: [art] Signing Cert with AUTHO
3,107,766 UART: RITY.KEYID = 7
3,123,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,909 UART: [art] PUB.X = 7494261069A57F8EB6F2D1426A17B47ACB903BEE05539E168F8F19AB8C8E027F7E4ACD6A606688A18F59351E29F1AFEA
3,130,681 UART: [art] PUB.Y = BBDF67F074C59F44CF995CFBACC4710949608688FE01A44A6D09C477DB94E19F25D8AB3C2D3621D8533074A438096BEF
3,137,627 UART: [art] SIG.R = 4C670C1BAD5E714D640C16A573EE4CC27A613F86A72E9EC9AEE1DCA3E6A587C73259111C648677C259D44B1349AF65AE
3,144,401 UART: [art] SIG.S = ABCC1F8B26113F1F2985A9A8235EB6C3D2C5F1DF9D5722D41836467D88095A5DDD7B734A44BA66581878C22C0114B236
3,168,282 UART: Caliptra RT
3,168,535 UART: [state] CFI Enabled
3,276,568 UART: [rt] RT listening for mailbox commands...
3,277,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,634 UART: [rt]cmd =0x44504543, len=96
3,488,568 >>> mbox cmd response data (6236 bytes)
3,488,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,594 UART: [rt]cmd =0x44504543, len=96
3,550,388 >>> mbox cmd response data (56 bytes)
3,550,389 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,754 UART: [rt]cmd =0x52564348, len=36
3,581,916 >>> mbox cmd response data (8 bytes)
3,581,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,052 UART: [rt]cmd =0x44504543, len=96
3,793,921 >>> mbox cmd response data (6236 bytes)
3,793,922 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,857 UART: [rt]cmd =0x53574545, len=84
3,848,977 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 ready_for_fw is high
1,060,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,563 >>> mbox cmd response: success
2,691,141 UART:
2,691,157 UART: Running Caliptra FMC ...
2,691,565 UART:
2,691,619 UART: [state] CFI Enabled
2,701,730 UART: [fht] FMC Alias Private Key: 7
2,809,745 UART: [art] Extend RT PCRs Done
2,810,173 UART: [art] Lock RT PCRs Done
2,812,237 UART: [art] Populate DV Done
2,820,482 UART: [fht] FMC Alias Private Key: 7
2,821,474 UART: [art] Derive CDI
2,821,754 UART: [art] Store in in slot 0x4
2,906,877 UART: [art] Derive Key Pair
2,907,237 UART: [art] Store priv key in slot 0x5
2,920,973 UART: [art] Derive Key Pair - Done
2,935,555 UART: [art] Signing Cert with AUTHO
2,936,035 UART: RITY.KEYID = 7
2,950,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,678 UART: [art] PUB.X = FA4AE1473B59AB963C2A9E77964CF505A27B1A115D78FD156AB6E8F4D8D44AD395B6AC9CCD1C87694576FEC57181B4DC
2,958,461 UART: [art] PUB.Y = 4C7432F26E8FD7B485D0BBDCAFB484993EC131B45979A8B86B6F443B6B09DB71497B54C6B40D8A035CA23B6181A6DA59
2,965,412 UART: [art] SIG.R = 335336FB3074A160B9BBED3D59B242E59852BF034E42B668FAA9BA2CAA5695F8E9C6E0702662A7BF4F53CB8876257D67
2,972,185 UART: [art] SIG.S = 53A31ACB29B34E2289D274742E0482B0B5A9D4F9AB897C9F301A7D3CE5649D208662F58BF943C3955323D2C572888AAA
2,996,359 UART: Caliptra RT
2,996,612 UART: [state] CFI Enabled
3,103,405 UART: [rt] RT listening for mailbox commands...
3,104,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,225 UART: [rt]cmd =0x44504543, len=96
3,315,384 >>> mbox cmd response data (6236 bytes)
3,315,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,306 UART: [rt]cmd =0x44504543, len=96
3,377,172 >>> mbox cmd response data (56 bytes)
3,377,173 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,800 UART: [rt]cmd =0x52564348, len=36
3,408,926 >>> mbox cmd response data (8 bytes)
3,408,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,988 UART: [rt]cmd =0x44504543, len=96
3,619,854 >>> mbox cmd response data (6236 bytes)
3,619,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,664 UART: [rt]cmd =0x53574545, len=84
3,675,654 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,666 UART: [fht] FHT @ 0x50003400
1,175,179 UART: [idev] ++
1,175,347 UART: [idev] CDI.KEYID = 6
1,175,707 UART: [idev] SUBJECT.KEYID = 7
1,176,131 UART: [idev] UDS.KEYID = 0
1,176,476 ready_for_fw is high
1,176,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,355 UART: [idev] Erasing UDS.KEYID = 0
1,200,806 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,210,166 UART: [ldev] ++
1,210,334 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,123 UART: [ldev] AUTHORITY.KEYID = 7
1,211,586 UART: [ldev] FE.KEYID = 1
1,216,750 UART: [ldev] Erasing FE.KEYID = 1
1,243,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,996 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,747 >>> mbox cmd response: success
2,776,921 UART: [afmc] ++
2,777,089 UART: [afmc] CDI.KEYID = 6
2,777,451 UART: [afmc] SUBJECT.KEYID = 7
2,777,876 UART: [afmc] AUTHORITY.KEYID = 5
2,813,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,498 UART: [afmc] --
2,857,610 UART: [cold-reset] --
2,858,196 UART: [state] Locking Datavault
2,859,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,097 UART: [state] Locking ICCM
2,860,567 UART: [exit] Launching FMC @ 0x40000130
2,865,896 UART:
2,865,912 UART: Running Caliptra FMC ...
2,866,320 UART:
2,866,463 UART: [state] CFI Enabled
2,877,452 UART: [fht] FMC Alias Private Key: 7
2,986,153 UART: [art] Extend RT PCRs Done
2,986,581 UART: [art] Lock RT PCRs Done
2,987,801 UART: [art] Populate DV Done
2,996,270 UART: [fht] FMC Alias Private Key: 7
2,997,308 UART: [art] Derive CDI
2,997,588 UART: [art] Store in in slot 0x4
3,083,195 UART: [art] Derive Key Pair
3,083,555 UART: [art] Store priv key in slot 0x5
3,097,081 UART: [art] Derive Key Pair - Done
3,111,700 UART: [art] Signing Cert with AUTHO
3,112,180 UART: RITY.KEYID = 7
3,127,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,065 UART: [art] PUB.X = 878118D284943A9753A0F864A15588DFC9DE6BD9A6B9AD097FEF615BF5B557618AF23C3AE8B981A907588FCE35AA1B7B
3,134,839 UART: [art] PUB.Y = E3A97C43C7B75A0D952806CA427A26839E8C67CA82EB2E66E0B331C5DAA2D020FC9573DB43BF5F96DB106B4D69F23ED0
3,141,797 UART: [art] SIG.R = 4418ED7484A7D82F61667B0C9616240AC92210108FDF1A4DB32093B51C8619EA2F0563F43FA5E66427BACA6481728FA4
3,148,556 UART: [art] SIG.S = 9388CCCCEFC41EC8CA63A5F8017F2F8999FAC4D64C7FABAF8DF8CBEDE285841054254F732CFFD7F3BCA82C4C7A417513
3,172,152 UART: Caliptra RT
3,172,497 UART: [state] CFI Enabled
3,281,342 UART: [rt] RT listening for mailbox commands...
3,282,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,166 UART: [rt]cmd =0x44504543, len=96
3,493,791 >>> mbox cmd response data (6236 bytes)
3,493,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,619 UART: [rt]cmd =0x44504543, len=96
3,555,697 >>> mbox cmd response data (56 bytes)
3,555,698 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,225 UART: [rt]cmd =0x52564348, len=36
3,587,431 >>> mbox cmd response data (8 bytes)
3,587,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,381 UART: [rt]cmd =0x44504543, len=96
3,797,880 >>> mbox cmd response data (6236 bytes)
3,797,881 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,652 UART: [rt]cmd =0x53574545, len=84
3,853,386 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,700 >>> mbox cmd response: success
2,689,364 UART:
2,689,380 UART: Running Caliptra FMC ...
2,689,788 UART:
2,689,931 UART: [state] CFI Enabled
2,700,518 UART: [fht] FMC Alias Private Key: 7
2,808,353 UART: [art] Extend RT PCRs Done
2,808,781 UART: [art] Lock RT PCRs Done
2,810,287 UART: [art] Populate DV Done
2,818,662 UART: [fht] FMC Alias Private Key: 7
2,819,826 UART: [art] Derive CDI
2,820,106 UART: [art] Store in in slot 0x4
2,905,743 UART: [art] Derive Key Pair
2,906,103 UART: [art] Store priv key in slot 0x5
2,919,513 UART: [art] Derive Key Pair - Done
2,934,259 UART: [art] Signing Cert with AUTHO
2,934,739 UART: RITY.KEYID = 7
2,950,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,874 UART: [art] PUB.X = 777481F2727B94736B7F14C8E7BD0AD2CEFCFFBCBD4433781D794BC5AFC859B86557466D0E0548ACA548C5EAE21E21F4
2,957,649 UART: [art] PUB.Y = 4BB5C020522AF2841EA0735556F1C4CE1AB3DE30C80F8B599123F9D45CC8D8B4A765CCC49ECFCF3A215E16AB47C2F427
2,964,612 UART: [art] SIG.R = 49CEB7E497DDD7A3A01073DD2957B4ABA117DDDD0A42B88314D45ADE598FAD0FC28E54D2C03CBC3928D8B156455CDBFC
2,971,400 UART: [art] SIG.S = 7781B4909911D799325A3BD5B5C242648542DED5259B1AD4345E9043D2523E50415100CF4C1DFD8BC21C70BFC34F57D3
2,994,673 UART: Caliptra RT
2,995,018 UART: [state] CFI Enabled
3,102,801 UART: [rt] RT listening for mailbox commands...
3,103,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,005 UART: [rt]cmd =0x44504543, len=96
3,314,897 >>> mbox cmd response data (6236 bytes)
3,314,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,833 UART: [rt]cmd =0x44504543, len=96
3,376,651 >>> mbox cmd response data (56 bytes)
3,376,652 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,977 UART: [rt]cmd =0x52564348, len=36
3,407,795 >>> mbox cmd response data (8 bytes)
3,407,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,897 UART: [rt]cmd =0x44504543, len=96
3,619,357 >>> mbox cmd response data (6236 bytes)
3,619,358 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,327 UART: [rt]cmd =0x53574545, len=84
3,674,915 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,929 UART: [kat] ++
895,081 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
903,976 UART: [kat] SHA2-512-ACC
905,877 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,162 UART: [kat] LMS
1,168,474 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,417 UART: [idev] ++
1,172,585 UART: [idev] CDI.KEYID = 6
1,172,946 UART: [idev] SUBJECT.KEYID = 7
1,173,371 UART: [idev] UDS.KEYID = 0
1,173,717 ready_for_fw is high
1,173,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,197,713 UART: [idev] Sha1 KeyId Algorithm
1,206,655 UART: [idev] --
1,207,656 UART: [ldev] ++
1,207,824 UART: [ldev] CDI.KEYID = 6
1,208,188 UART: [ldev] SUBJECT.KEYID = 5
1,208,615 UART: [ldev] AUTHORITY.KEYID = 7
1,209,078 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,240,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,204 UART: [ldev] --
1,279,704 UART: [fwproc] Wait for Commands...
1,280,335 UART: [fwproc] Recv command 0x46574c44
1,281,068 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,404 >>> mbox cmd response: success
2,775,427 UART: [afmc] ++
2,775,595 UART: [afmc] CDI.KEYID = 6
2,775,958 UART: [afmc] SUBJECT.KEYID = 7
2,776,384 UART: [afmc] AUTHORITY.KEYID = 5
2,811,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,392 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,111 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,962 UART: [afmc] --
2,854,968 UART: [cold-reset] --
2,855,998 UART: [state] Locking Datavault
2,857,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,637 UART: [state] Locking ICCM
2,858,065 UART: [exit] Launching FMC @ 0x40000130
2,863,394 UART:
2,863,410 UART: Running Caliptra FMC ...
2,863,818 UART:
2,863,872 UART: [state] CFI Enabled
2,874,635 UART: [fht] FMC Alias Private Key: 7
2,982,104 UART: [art] Extend RT PCRs Done
2,982,532 UART: [art] Lock RT PCRs Done
2,984,358 UART: [art] Populate DV Done
2,992,471 UART: [fht] FMC Alias Private Key: 7
2,993,399 UART: [art] Derive CDI
2,993,679 UART: [art] Store in in slot 0x4
3,079,208 UART: [art] Derive Key Pair
3,079,568 UART: [art] Store priv key in slot 0x5
3,092,512 UART: [art] Derive Key Pair - Done
3,106,949 UART: [art] Signing Cert with AUTHO
3,107,429 UART: RITY.KEYID = 7
3,122,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,656 UART: [art] PUB.X = CEB8668A6CAE1477CE698056D1626B4535CF994B0E25D881615696454E8F016AC9D8BC0B94CD1709E1A2AB19B899EE06
3,130,415 UART: [art] PUB.Y = 0082A8E29184B3AE191377D131AEDC79D7473B1BCC011BEB9955DB9064CAAAC96F276BAFB41BF2D641FFC2E54945F30B
3,137,353 UART: [art] SIG.R = 4615433570E707B2C1F081104A2672237639DFABFC1D732A47C6F23B83324511830A2C3F1493CA5DBEEA3354D5C0A6E2
3,144,115 UART: [art] SIG.S = 891BCCEEE9A468EBFCAD76BDC83163F5A57CC178A4737F44DD2BA216A51ECE95571D5D8C3C6464C977DA13E1C86C854E
3,167,546 UART: Caliptra RT
3,167,799 UART: [state] CFI Enabled
3,275,178 UART: [rt] RT listening for mailbox commands...
3,275,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,050 UART: [rt]cmd =0x44504543, len=96
3,486,389 >>> mbox cmd response data (6236 bytes)
3,486,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,347 UART: [rt]cmd =0x44504543, len=96
3,547,869 >>> mbox cmd response data (56 bytes)
3,547,870 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,359 UART: [rt]cmd =0x52564348, len=36
3,579,431 >>> mbox cmd response data (8 bytes)
3,579,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,231 UART: [rt]cmd =0x44504543, len=96
3,790,128 >>> mbox cmd response data (6236 bytes)
3,790,129 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,056 UART: [rt]cmd =0x53574545, len=84
3,845,536 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,318 ready_for_fw is high
1,056,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,236 >>> mbox cmd response: success
2,686,476 UART:
2,686,492 UART: Running Caliptra FMC ...
2,686,900 UART:
2,686,954 UART: [state] CFI Enabled
2,697,253 UART: [fht] FMC Alias Private Key: 7
2,804,672 UART: [art] Extend RT PCRs Done
2,805,100 UART: [art] Lock RT PCRs Done
2,806,532 UART: [art] Populate DV Done
2,814,627 UART: [fht] FMC Alias Private Key: 7
2,815,727 UART: [art] Derive CDI
2,816,007 UART: [art] Store in in slot 0x4
2,901,442 UART: [art] Derive Key Pair
2,901,802 UART: [art] Store priv key in slot 0x5
2,915,634 UART: [art] Derive Key Pair - Done
2,930,363 UART: [art] Signing Cert with AUTHO
2,930,843 UART: RITY.KEYID = 7
2,946,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,832 UART: [art] PUB.X = 2B714F6FF844D38DF5A4BDCDA680B35CFD73554F907895D61068BFE50D0E1FFE4939B48F700C855CA8879799BC6190CF
2,953,603 UART: [art] PUB.Y = FFEB4F63F5548890FB1F2640A09B0F5E0F961AB0348B7CCEAB6F9500687D3A69D72515692CB484F33DBD1AED4674814C
2,960,535 UART: [art] SIG.R = FE1E48838B92D5C4A400139411F56DE13CE528EF18BB542CF0DC027FE43ABB6BE8CA3B47D189A7B27C839C610616BDA9
2,967,291 UART: [art] SIG.S = 3347DC66285064AA87FF16CC13FB7CDD241BAF46E4726C0EE9C454C7AC847EC00ECC42B03B0546144D1ECCE59A5DAAA7
2,991,379 UART: Caliptra RT
2,991,632 UART: [state] CFI Enabled
3,098,921 UART: [rt] RT listening for mailbox commands...
3,099,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,711 UART: [rt]cmd =0x44504543, len=96
3,310,509 >>> mbox cmd response data (6236 bytes)
3,310,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,525 UART: [rt]cmd =0x44504543, len=96
3,372,519 >>> mbox cmd response data (56 bytes)
3,372,520 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,327 UART: [rt]cmd =0x52564348, len=36
3,404,171 >>> mbox cmd response data (8 bytes)
3,404,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,983 UART: [rt]cmd =0x44504543, len=96
3,615,185 >>> mbox cmd response data (6236 bytes)
3,615,186 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,991 UART: [rt]cmd =0x53574545, len=84
3,671,003 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,174,644 ready_for_fw is high
1,174,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,617 UART: [ldev] SUBJECT.KEYID = 5
1,210,044 UART: [ldev] AUTHORITY.KEYID = 7
1,210,507 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,242,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,632 UART: [fwproc] Recv command 0x46574c44
1,282,365 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,967 >>> mbox cmd response: success
2,774,054 UART: [afmc] ++
2,774,222 UART: [afmc] CDI.KEYID = 6
2,774,585 UART: [afmc] SUBJECT.KEYID = 7
2,775,011 UART: [afmc] AUTHORITY.KEYID = 5
2,811,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,515 UART: [afmc] --
2,854,427 UART: [cold-reset] --
2,855,183 UART: [state] Locking Datavault
2,856,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,734 UART: [state] Locking ICCM
2,857,332 UART: [exit] Launching FMC @ 0x40000130
2,862,661 UART:
2,862,677 UART: Running Caliptra FMC ...
2,863,085 UART:
2,863,228 UART: [state] CFI Enabled
2,874,401 UART: [fht] FMC Alias Private Key: 7
2,981,916 UART: [art] Extend RT PCRs Done
2,982,344 UART: [art] Lock RT PCRs Done
2,984,040 UART: [art] Populate DV Done
2,992,421 UART: [fht] FMC Alias Private Key: 7
2,993,465 UART: [art] Derive CDI
2,993,745 UART: [art] Store in in slot 0x4
3,079,680 UART: [art] Derive Key Pair
3,080,040 UART: [art] Store priv key in slot 0x5
3,093,438 UART: [art] Derive Key Pair - Done
3,108,047 UART: [art] Signing Cert with AUTHO
3,108,527 UART: RITY.KEYID = 7
3,123,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,312 UART: [art] PUB.X = 14CD3F6E1365E08514CA64A5D30D8C4BF9B131B7201BB30B5B15B7019E896FBFC847368E8CDE70F465D5600BD75A447A
3,131,078 UART: [art] PUB.Y = 3CEAE315DB966DF6F236FAD53B9CD1CDE27FC7A8B05858857B5D6859E1BB185E577BEA5674D8F4CF52816EEAFBBF3A4C
3,138,054 UART: [art] SIG.R = C315A6D0CE25D3AFD98874A69A039FE412FB6233B1B7418630C0BEA6CD4FFFFCEB76889B81B1FD112EFD0A5877AA57BB
3,144,840 UART: [art] SIG.S = ECF55ACD539A6069A795CE7A3E0F52C87AC0F85A9EBFD4F763F886AE71D117A65C95134351334145B4ED7F5DF317BA15
3,167,614 UART: Caliptra RT
3,167,959 UART: [state] CFI Enabled
3,275,525 UART: [rt] RT listening for mailbox commands...
3,276,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,721 UART: [rt]cmd =0x44504543, len=96
3,488,283 >>> mbox cmd response data (6236 bytes)
3,488,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,309 UART: [rt]cmd =0x44504543, len=96
3,550,651 >>> mbox cmd response data (56 bytes)
3,550,652 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,441 UART: [rt]cmd =0x52564348, len=36
3,582,175 >>> mbox cmd response data (8 bytes)
3,582,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,155 UART: [rt]cmd =0x44504543, len=96
3,793,485 >>> mbox cmd response data (6236 bytes)
3,793,486 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,281 UART: [rt]cmd =0x53574545, len=84
3,848,353 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,143 ready_for_fw is high
1,056,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,807 >>> mbox cmd response: success
2,685,843 UART:
2,685,859 UART: Running Caliptra FMC ...
2,686,267 UART:
2,686,410 UART: [state] CFI Enabled
2,697,013 UART: [fht] FMC Alias Private Key: 7
2,805,072 UART: [art] Extend RT PCRs Done
2,805,500 UART: [art] Lock RT PCRs Done
2,806,972 UART: [art] Populate DV Done
2,815,183 UART: [fht] FMC Alias Private Key: 7
2,816,311 UART: [art] Derive CDI
2,816,591 UART: [art] Store in in slot 0x4
2,902,240 UART: [art] Derive Key Pair
2,902,600 UART: [art] Store priv key in slot 0x5
2,916,176 UART: [art] Derive Key Pair - Done
2,931,133 UART: [art] Signing Cert with AUTHO
2,931,613 UART: RITY.KEYID = 7
2,947,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,940 UART: [art] PUB.X = 717EEA3ADFE7436AB64A037614BD62BC4402D7A72BB2B19DC3E17122F6382DA6BB83769C3E14F9B469588D00743A6319
2,954,686 UART: [art] PUB.Y = 79225D346869DDD0F5E88A1140B6BE08D7A875A09F37A18DAE5B5134B00D756749BB4933892BE421246CE181F578873C
2,961,626 UART: [art] SIG.R = E29FEE4B469B1AA2610B7CFD5FA5470848C51185CD3B5BE05A24C6F9436BFB0A8554D7EE2F349B65C7BE11B1C2F53C50
2,968,403 UART: [art] SIG.S = 06DDE473FAF9C89348FDAB8C5690A7F4237531C8104786C39D5A6642CDECBDF37D85221E9113527B8FB49B4EBF8CD13E
2,991,985 UART: Caliptra RT
2,992,330 UART: [state] CFI Enabled
3,099,971 UART: [rt] RT listening for mailbox commands...
3,100,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,003 UART: [rt]cmd =0x44504543, len=96
3,312,149 >>> mbox cmd response data (6236 bytes)
3,312,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,147 UART: [rt]cmd =0x44504543, len=96
3,373,839 >>> mbox cmd response data (56 bytes)
3,373,840 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,437 UART: [rt]cmd =0x52564348, len=36
3,405,717 >>> mbox cmd response data (8 bytes)
3,405,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,589 UART: [rt]cmd =0x44504543, len=96
3,616,178 >>> mbox cmd response data (6236 bytes)
3,616,179 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,944 UART: [rt]cmd =0x53574545, len=84
3,672,368 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,027 UART:
192,400 UART: Running Caliptra ROM ...
193,604 UART:
193,770 UART: [state] CFI Enabled
267,074 UART: [state] LifecycleState = Unprovisioned
269,055 UART: [state] DebugLocked = No
271,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,815 UART: [kat] SHA2-256
446,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,997 UART: [kat] ++
457,476 UART: [kat] sha1
467,997 UART: [kat] SHA2-256
470,643 UART: [kat] SHA2-384
477,551 UART: [kat] SHA2-512-ACC
479,915 UART: [kat] ECC-384
2,767,082 UART: [kat] HMAC-384Kdf
2,780,102 UART: [kat] LMS
3,970,430 UART: [kat] --
3,973,540 UART: [cold-reset] ++
3,975,479 UART: [fht] Storing FHT @ 0x50003400
3,986,319 UART: [idev] ++
3,986,891 UART: [idev] CDI.KEYID = 6
3,987,778 UART: [idev] SUBJECT.KEYID = 7
3,989,087 UART: [idev] UDS.KEYID = 0
3,990,150 ready_for_fw is high
3,990,361 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,981 UART: [idev] Erasing UDS.KEYID = 0
7,325,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,445 UART: [idev] --
7,352,090 UART: [ldev] ++
7,352,668 UART: [ldev] CDI.KEYID = 6
7,353,608 UART: [ldev] SUBJECT.KEYID = 5
7,354,820 UART: [ldev] AUTHORITY.KEYID = 7
7,356,055 UART: [ldev] FE.KEYID = 1
7,400,929 UART: [ldev] Erasing FE.KEYID = 1
10,732,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,646 UART: [ldev] --
13,092,484 UART: [fwproc] Waiting for Commands...
13,094,684 UART: [fwproc] Received command 0x46574c44
13,096,866 UART: [fwproc] Received Image of size 114124 bytes
17,152,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,228,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,297,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,613,892 >>> mbox cmd response: success
17,617,455 UART: [afmc] ++
17,618,053 UART: [afmc] CDI.KEYID = 6
17,618,959 UART: [afmc] SUBJECT.KEYID = 7
17,620,181 UART: [afmc] AUTHORITY.KEYID = 5
20,982,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,958 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,379 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,314,190 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,627 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,058 UART: [afmc] --
23,354,624 UART: [cold-reset] --
23,359,240 UART: [state] Locking Datavault
23,365,398 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,147 UART: [state] Locking ICCM
23,369,758 UART: [exit] Launching FMC @ 0x40000130
23,378,135 UART:
23,378,379 UART: Running Caliptra FMC ...
23,379,424 UART:
23,379,578 UART: [state] CFI Enabled
23,440,293 UART: [fht] FMC Alias Private Key: 7
25,779,371 UART: [art] Extend RT PCRs Done
25,780,588 UART: [art] Lock RT PCRs Done
25,781,946 UART: [art] Populate DV Done
25,787,412 UART: [fht] FMC Alias Private Key: 7
25,788,896 UART: [art] Derive CDI
25,789,638 UART: [art] Store in in slot 0x4
25,849,212 UART: [art] Derive Key Pair
25,850,205 UART: [art] Store priv key in slot 0x5
29,142,472 UART: [art] Derive Key Pair - Done
29,155,462 UART: [art] Signing Cert with AUTHO
29,156,764 UART: RITY.KEYID = 7
31,444,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,445,758 UART: [art] PUB.X = 7167F97FDCC5505990ABC29EAF62277D7AC92842D3C2CBF5D01B26F5E7A6C1FD17FA361AB5758A15B98F96196C5ADE90
31,453,015 UART: [art] PUB.Y = E485C92E49A5292D0014329723AF9F4D20A4E1D70E0188040607220387F393822E7B6D87760A8510BEB55C3B2721D705
31,460,224 UART: [art] SIG.R = 92D82BF0708ADFB3D08A6C5771A9F85497922FD10D2F280727FEEAB8E79DE5CDAAD72287FE07ED37A6F41310F929C64B
31,467,621 UART: [art] SIG.S = AD8421019C43CAA7C40A976581C4D88D23BBAE865BC74862CBC3CE7250CFB7D5475A696D9D65AB40BBD21C8D053EEC2D
32,772,934 UART: Caliptra RT
32,773,643 UART: [state] CFI Enabled
32,934,091 UART: [rt] RT listening for mailbox commands...
32,936,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,966,849 UART: [rt]cmd =0x44504543, len=96
38,751,639 >>> mbox cmd response data (6236 bytes)
38,780,683 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,811,508 UART: [rt]cmd =0x53574545, len=84
44,398,602 >>> mbox cmd response data (200 bytes)
44,785,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,816,765 UART: [rt]cmd =0x44504543, len=96
44,847,294 >>> mbox cmd response data (56 bytes)
44,848,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,878,702 UART: [rt]cmd =0x44504543, len=96
44,930,302 >>> mbox cmd response data (24 bytes)
44,930,896 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,961,528 UART: [rt]cmd =0x53574545, len=84
50,542,767 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,785,491 ready_for_fw is high
3,785,876 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,434 >>> mbox cmd response: success
23,568,362 UART:
23,568,811 UART: Running Caliptra FMC ...
23,569,955 UART:
23,570,120 UART: [state] CFI Enabled
23,638,735 UART: [fht] FMC Alias Private Key: 7
25,975,566 UART: [art] Extend RT PCRs Done
25,976,789 UART: [art] Lock RT PCRs Done
25,978,931 UART: [art] Populate DV Done
25,984,348 UART: [fht] FMC Alias Private Key: 7
25,985,841 UART: [art] Derive CDI
25,986,605 UART: [art] Store in in slot 0x4
26,048,899 UART: [art] Derive Key Pair
26,049,906 UART: [art] Store priv key in slot 0x5
29,343,232 UART: [art] Derive Key Pair - Done
29,355,909 UART: [art] Signing Cert with AUTHO
29,357,215 UART: RITY.KEYID = 7
31,644,644 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,166 UART: [art] PUB.X = 6DB857367FC131EB9A56E6D2997669745623871EFC03A6A1DFEDDE91DF294F2B5D60C30DA5632BFBD4E407F5C6DA9869
31,653,438 UART: [art] PUB.Y = 84DCDA6939DA26B59330812B320AD376480344CEE9567F2CD02AF62698CA76BFD82E4E06B32738A850BA8FC70163C539
31,660,630 UART: [art] SIG.R = 35467A12B5B7211D2CD820FA3109DD8870DC03F65838B932515293689E47F9D26D16206DC95685F2FB2A86A779D8180C
31,667,964 UART: [art] SIG.S = 3F5DDA2F8100486BACFC9C4231AADC86302AA06625F87FBCB97EA59953BFF3B302CA1E6CB7EE5D63AA499ADC5546761C
32,972,573 UART: Caliptra RT
32,973,287 UART: [state] CFI Enabled
33,134,256 UART: [rt] RT listening for mailbox commands...
33,136,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,330 UART: [rt]cmd =0x44504543, len=96
38,953,006 >>> mbox cmd response data (6236 bytes)
38,982,094 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,012,695 UART: [rt]cmd =0x53574545, len=84
44,599,513 >>> mbox cmd response data (200 bytes)
44,984,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,015,221 UART: [rt]cmd =0x44504543, len=96
45,047,046 >>> mbox cmd response data (56 bytes)
45,047,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,078,469 UART: [rt]cmd =0x44504543, len=96
45,130,487 >>> mbox cmd response data (24 bytes)
45,131,090 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,161,682 UART: [rt]cmd =0x53574545, len=84
50,743,946 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,348 UART:
192,700 UART: Running Caliptra ROM ...
193,821 UART:
603,634 UART: [state] CFI Enabled
616,489 UART: [state] LifecycleState = Unprovisioned
618,451 UART: [state] DebugLocked = No
619,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,229 UART: [kat] SHA2-256
794,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,499 UART: [kat] ++
805,947 UART: [kat] sha1
815,748 UART: [kat] SHA2-256
818,463 UART: [kat] SHA2-384
825,299 UART: [kat] SHA2-512-ACC
827,670 UART: [kat] ECC-384
3,111,426 UART: [kat] HMAC-384Kdf
3,122,734 UART: [kat] LMS
4,312,859 UART: [kat] --
4,317,310 UART: [cold-reset] ++
4,318,814 UART: [fht] Storing FHT @ 0x50003400
4,330,500 UART: [idev] ++
4,331,066 UART: [idev] CDI.KEYID = 6
4,332,025 UART: [idev] SUBJECT.KEYID = 7
4,333,264 UART: [idev] UDS.KEYID = 0
4,334,218 ready_for_fw is high
4,334,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,813 UART: [idev] Erasing UDS.KEYID = 0
7,617,067 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,721 UART: [idev] --
7,642,661 UART: [ldev] ++
7,643,282 UART: [ldev] CDI.KEYID = 6
7,644,244 UART: [ldev] SUBJECT.KEYID = 5
7,645,447 UART: [ldev] AUTHORITY.KEYID = 7
7,646,668 UART: [ldev] FE.KEYID = 1
7,658,079 UART: [ldev] Erasing FE.KEYID = 1
10,955,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,336 UART: [ldev] --
13,313,301 UART: [fwproc] Waiting for Commands...
13,315,548 UART: [fwproc] Received command 0x46574c44
13,317,724 UART: [fwproc] Received Image of size 114124 bytes
17,371,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,941 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,400 >>> mbox cmd response: success
17,841,094 UART: [afmc] ++
17,841,686 UART: [afmc] CDI.KEYID = 6
17,842,670 UART: [afmc] SUBJECT.KEYID = 7
17,843,883 UART: [afmc] AUTHORITY.KEYID = 5
21,158,907 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,884 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,274 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,090 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,591 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,364 UART: [afmc] --
23,526,445 UART: [cold-reset] --
23,530,735 UART: [state] Locking Datavault
23,536,297 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,058 UART: [state] Locking ICCM
23,540,533 UART: [exit] Launching FMC @ 0x40000130
23,548,870 UART:
23,549,099 UART: Running Caliptra FMC ...
23,550,217 UART:
23,550,378 UART: [state] CFI Enabled
23,558,641 UART: [fht] FMC Alias Private Key: 7
25,889,895 UART: [art] Extend RT PCRs Done
25,891,109 UART: [art] Lock RT PCRs Done
25,893,046 UART: [art] Populate DV Done
25,898,294 UART: [fht] FMC Alias Private Key: 7
25,899,831 UART: [art] Derive CDI
25,900,641 UART: [art] Store in in slot 0x4
25,943,498 UART: [art] Derive Key Pair
25,944,494 UART: [art] Store priv key in slot 0x5
29,186,547 UART: [art] Derive Key Pair - Done
29,199,322 UART: [art] Signing Cert with AUTHO
29,200,626 UART: RITY.KEYID = 7
31,479,792 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,294 UART: [art] PUB.X = DEC1CD4629EDD955ED0C42F6FD4DB166F29245E0A205987E7EE1A20416699F18414EAE931DB8EF49BB5C7AA5E410E7DC
31,488,673 UART: [art] PUB.Y = BE3C1943BDBF99089AEACD18E933B85ED37C99DEB4CE635B41EF4E5D8E9FFB3979ECD582BD9B99CA895244D807DA6F36
31,495,789 UART: [art] SIG.R = 5EEA94BEE7037CFFBB0EAF0DFB847AD6FC4E0471CFEE3B7E21E3E06DF563740A25CE1D6DE596C6087AB3A61330CAC2F7
31,503,229 UART: [art] SIG.S = CF987AE3A28C8B77D54366FC59749E34D3F6A5276A17BF218BC4976EB7047E8C6BC13C26AB04D25433EB8AEBA457BF0A
32,808,364 UART: Caliptra RT
32,809,074 UART: [state] CFI Enabled
32,927,163 UART: [rt] RT listening for mailbox commands...
32,929,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,960,437 UART: [rt]cmd =0x44504543, len=96
38,633,019 >>> mbox cmd response data (6236 bytes)
38,662,088 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,692,605 UART: [rt]cmd =0x53574545, len=84
44,217,724 >>> mbox cmd response data (200 bytes)
44,608,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,639,376 UART: [rt]cmd =0x44504543, len=96
44,670,974 >>> mbox cmd response data (56 bytes)
44,671,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,702,246 UART: [rt]cmd =0x44504543, len=96
44,740,523 >>> mbox cmd response data (24 bytes)
44,741,077 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,771,615 UART: [rt]cmd =0x53574545, len=84
50,296,120 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,130,109 ready_for_fw is high
4,130,497 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,671 >>> mbox cmd response: success
23,715,173 UART:
23,715,558 UART: Running Caliptra FMC ...
23,716,694 UART:
23,716,853 UART: [state] CFI Enabled
23,724,965 UART: [fht] FMC Alias Private Key: 7
26,055,533 UART: [art] Extend RT PCRs Done
26,056,757 UART: [art] Lock RT PCRs Done
26,058,330 UART: [art] Populate DV Done
26,063,713 UART: [fht] FMC Alias Private Key: 7
26,065,312 UART: [art] Derive CDI
26,066,129 UART: [art] Store in in slot 0x4
26,108,959 UART: [art] Derive Key Pair
26,110,009 UART: [art] Store priv key in slot 0x5
29,351,758 UART: [art] Derive Key Pair - Done
29,364,784 UART: [art] Signing Cert with AUTHO
29,366,110 UART: RITY.KEYID = 7
31,645,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,112 UART: [art] PUB.X = 100DC8AE49025C1B9B640A2EE8BEAA4F08DF0ED75E024DDB33A3985E1400A83E68F7B63C0C6F571B40929D763DEA881A
31,654,347 UART: [art] PUB.Y = 3E21C2255F6146415D4E666BBC179E017790DEAF34F30230991DCEBF822F3E7B71114AACF278E525751005EEEB5BA820
31,661,646 UART: [art] SIG.R = 4B7F20769F6CD317ABBB06E741D648864085BD7319D7CBC58A2BDCC3A2DB9E34EAFDFE7298A4E151BF3A05E7F8404EFF
31,669,055 UART: [art] SIG.S = 8F822AC4DBE8C0D9018B53138AFCC57C2E7EB33E1DD4FB4CE8691F98DC779DFAB67C24D9A8CA8344FEECEC99084AB111
32,974,319 UART: Caliptra RT
32,975,032 UART: [state] CFI Enabled
33,091,938 UART: [rt] RT listening for mailbox commands...
33,094,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,885 UART: [rt]cmd =0x44504543, len=96
38,798,177 >>> mbox cmd response data (6236 bytes)
38,827,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,857,771 UART: [rt]cmd =0x53574545, len=84
44,382,166 >>> mbox cmd response data (200 bytes)
44,775,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,806,154 UART: [rt]cmd =0x44504543, len=96
44,837,389 >>> mbox cmd response data (56 bytes)
44,838,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,868,868 UART: [rt]cmd =0x44504543, len=96
44,907,667 >>> mbox cmd response data (24 bytes)
44,908,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,938,736 UART: [rt]cmd =0x53574545, len=84
50,462,659 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,057 UART:
192,447 UART: Running Caliptra ROM ...
193,596 UART:
193,743 UART: [state] CFI Enabled
264,549 UART: [state] LifecycleState = Unprovisioned
266,400 UART: [state] DebugLocked = No
269,219 UART: [state] WD Timer not started. Device not locked for debugging
272,330 UART: [kat] SHA2-256
451,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,028 UART: [kat] ++
463,573 UART: [kat] sha1
474,100 UART: [kat] SHA2-256
477,102 UART: [kat] SHA2-384
483,581 UART: [kat] SHA2-512-ACC
486,512 UART: [kat] ECC-384
2,948,683 UART: [kat] HMAC-384Kdf
2,972,574 UART: [kat] LMS
3,502,060 UART: [kat] --
3,505,271 UART: [cold-reset] ++
3,507,124 UART: [fht] FHT @ 0x50003400
3,519,372 UART: [idev] ++
3,519,943 UART: [idev] CDI.KEYID = 6
3,520,924 UART: [idev] SUBJECT.KEYID = 7
3,522,100 UART: [idev] UDS.KEYID = 0
3,523,028 ready_for_fw is high
3,523,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,504 UART: [idev] Erasing UDS.KEYID = 0
6,027,548 UART: [idev] Sha1 KeyId Algorithm
6,049,429 UART: [idev] --
6,054,933 UART: [ldev] ++
6,055,496 UART: [ldev] CDI.KEYID = 6
6,056,377 UART: [ldev] SUBJECT.KEYID = 5
6,057,538 UART: [ldev] AUTHORITY.KEYID = 7
6,058,849 UART: [ldev] FE.KEYID = 1
6,102,831 UART: [ldev] Erasing FE.KEYID = 1
8,603,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,482 UART: [ldev] --
10,395,913 UART: [fwproc] Wait for Commands...
10,398,274 UART: [fwproc] Recv command 0x46574c44
10,400,365 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,830 >>> mbox cmd response: success
14,267,575 UART: [afmc] ++
14,268,190 UART: [afmc] CDI.KEYID = 6
14,269,101 UART: [afmc] SUBJECT.KEYID = 7
14,270,263 UART: [afmc] AUTHORITY.KEYID = 5
16,814,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,462 UART: [afmc] --
18,611,808 UART: [cold-reset] --
18,615,446 UART: [state] Locking Datavault
18,622,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,823 UART: [state] Locking ICCM
18,626,114 UART: [exit] Launching FMC @ 0x40000130
18,634,565 UART:
18,634,817 UART: Running Caliptra FMC ...
18,635,846 UART:
18,635,992 UART: [state] CFI Enabled
18,693,047 UART: [fht] FMC Alias Private Key: 7
20,457,583 UART: [art] Extend RT PCRs Done
20,458,806 UART: [art] Lock RT PCRs Done
20,460,486 UART: [art] Populate DV Done
20,466,094 UART: [fht] FMC Alias Private Key: 7
20,467,704 UART: [art] Derive CDI
20,468,518 UART: [art] Store in in slot 0x4
20,525,992 UART: [art] Derive Key Pair
20,526,992 UART: [art] Store priv key in slot 0x5
22,990,283 UART: [art] Derive Key Pair - Done
23,003,334 UART: [art] Signing Cert with AUTHO
23,004,643 UART: RITY.KEYID = 7
24,715,988 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,504 UART: [art] PUB.X = 6B2C05B0B4E18BFA334050E0EF70BE94FB3476A0B651919991BA0DDE483B35B415B4A8418325407B6D1620D5D86E8503
24,724,754 UART: [art] PUB.Y = A39F91373734AE01B16A773AC57858C8623E7020ABEAEFFA1E62B2F9B8471AD29E50BB893B0FA75E586564530D92B189
24,731,978 UART: [art] SIG.R = 0E6247F07EC3B0D22407D02C665B1CB35D49480B7FBC3CBEB30D982BFE678CDD7A04602BB6E7C5E139BE35E4B55EBFD9
24,739,361 UART: [art] SIG.S = 0784DD21A290A77FA0AA7E260962E9C1C22C3C8EE951A848FF4DC630C54D23FD693A9ED589AB90A6863D4CB3149C1FC1
25,718,574 UART: Caliptra RT
25,719,272 UART: [state] CFI Enabled
25,884,451 UART: [rt] RT listening for mailbox commands...
25,886,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,917,767 UART: [rt]cmd =0x44504543, len=96
30,296,112 >>> mbox cmd response data (6236 bytes)
30,325,345 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,355,860 UART: [rt]cmd =0x53574545, len=84
34,534,096 >>> mbox cmd response data (200 bytes)
34,919,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,950,304 UART: [rt]cmd =0x44504543, len=96
34,981,738 >>> mbox cmd response data (56 bytes)
34,982,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,013,258 UART: [rt]cmd =0x44504543, len=96
35,062,162 >>> mbox cmd response data (24 bytes)
35,062,761 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,093,328 UART: [rt]cmd =0x53574545, len=84
39,268,277 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,871 writing to cptra_bootfsm_go
3,358,907 ready_for_fw is high
3,359,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,054,875 >>> mbox cmd response: success
18,331,421 UART:
18,331,814 UART: Running Caliptra FMC ...
18,332,916 UART:
18,333,084 UART: [state] CFI Enabled
18,383,449 UART: [fht] FMC Alias Private Key: 7
20,147,064 UART: [art] Extend RT PCRs Done
20,148,284 UART: [art] Lock RT PCRs Done
20,150,259 UART: [art] Populate DV Done
20,155,515 UART: [fht] FMC Alias Private Key: 7
20,157,056 UART: [art] Derive CDI
20,157,893 UART: [art] Store in in slot 0x4
20,216,191 UART: [art] Derive Key Pair
20,217,235 UART: [art] Store priv key in slot 0x5
22,680,355 UART: [art] Derive Key Pair - Done
22,693,024 UART: [art] Signing Cert with AUTHO
22,694,327 UART: RITY.KEYID = 7
24,405,668 UART: [art] Erasing AUTHORITY.KEYID = 7
24,407,173 UART: [art] PUB.X = EC5E4F4A614C3C577FAE7FED20A0BED45087D3B5D5468511FEAF7ED5A8FC23F2BFA7D6C091EB7B54F347FFAD98CA5773
24,414,434 UART: [art] PUB.Y = 8E9C9966F9D7CC94BD43862DC8C1FD712ED56747CAB0B292DFE09E51FB852736D52C018EA7BEC37873246E1C782B80BC
24,421,757 UART: [art] SIG.R = B57EA0AEBA7ADA82364B2A3DF49D83290BE3AD80BF4365D98F5CECFB8196423B0F9A9DAE6CBCE13B1E9B8B4B4E99BCEC
24,429,159 UART: [art] SIG.S = 8AD179610FBC8886864174E84E70DD146D003CCC3EB20C57EE2F83106AE70EB6F5BF72033A25A5C108BF5A6275F30702
25,407,829 UART: Caliptra RT
25,408,525 UART: [state] CFI Enabled
25,574,351 UART: [rt] RT listening for mailbox commands...
25,576,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,607,968 UART: [rt]cmd =0x44504543, len=96
29,985,360 >>> mbox cmd response data (6236 bytes)
30,014,845 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,045,364 UART: [rt]cmd =0x53574545, len=84
34,224,293 >>> mbox cmd response data (200 bytes)
34,608,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,640,054 UART: [rt]cmd =0x44504543, len=96
34,672,240 >>> mbox cmd response data (56 bytes)
34,673,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,703,629 UART: [rt]cmd =0x44504543, len=96
34,752,245 >>> mbox cmd response data (24 bytes)
34,752,850 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,783,392 UART: [rt]cmd =0x53574545, len=84
38,959,177 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,473 UART:
192,837 UART: Running Caliptra ROM ...
194,016 UART:
603,749 UART: [state] CFI Enabled
616,625 UART: [state] LifecycleState = Unprovisioned
618,494 UART: [state] DebugLocked = No
620,095 UART: [state] WD Timer not started. Device not locked for debugging
623,562 UART: [kat] SHA2-256
802,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,281 UART: [kat] ++
814,814 UART: [kat] sha1
824,554 UART: [kat] SHA2-256
827,549 UART: [kat] SHA2-384
834,947 UART: [kat] SHA2-512-ACC
837,900 UART: [kat] ECC-384
3,277,920 UART: [kat] HMAC-384Kdf
3,291,782 UART: [kat] LMS
3,821,296 UART: [kat] --
3,824,853 UART: [cold-reset] ++
3,826,680 UART: [fht] FHT @ 0x50003400
3,837,305 UART: [idev] ++
3,837,869 UART: [idev] CDI.KEYID = 6
3,838,895 UART: [idev] SUBJECT.KEYID = 7
3,839,985 UART: [idev] UDS.KEYID = 0
3,841,022 ready_for_fw is high
3,841,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,023 UART: [idev] Erasing UDS.KEYID = 0
6,314,656 UART: [idev] Sha1 KeyId Algorithm
6,337,445 UART: [idev] --
6,341,483 UART: [ldev] ++
6,342,065 UART: [ldev] CDI.KEYID = 6
6,342,982 UART: [ldev] SUBJECT.KEYID = 5
6,344,188 UART: [ldev] AUTHORITY.KEYID = 7
6,345,411 UART: [ldev] FE.KEYID = 1
6,357,935 UART: [ldev] Erasing FE.KEYID = 1
8,832,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,955 UART: [ldev] --
10,624,835 UART: [fwproc] Wait for Commands...
10,626,431 UART: [fwproc] Recv command 0x46574c44
10,628,531 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,924 >>> mbox cmd response: success
14,492,141 UART: [afmc] ++
14,492,735 UART: [afmc] CDI.KEYID = 6
14,493,648 UART: [afmc] SUBJECT.KEYID = 7
14,494,801 UART: [afmc] AUTHORITY.KEYID = 5
16,995,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,966 UART: [afmc] --
18,791,518 UART: [cold-reset] --
18,795,376 UART: [state] Locking Datavault
18,799,422 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,074 UART: [state] Locking ICCM
18,802,620 UART: [exit] Launching FMC @ 0x40000130
18,811,012 UART:
18,811,242 UART: Running Caliptra FMC ...
18,812,331 UART:
18,812,485 UART: [state] CFI Enabled
18,820,740 UART: [fht] FMC Alias Private Key: 7
20,578,027 UART: [art] Extend RT PCRs Done
20,579,249 UART: [art] Lock RT PCRs Done
20,580,684 UART: [art] Populate DV Done
20,586,037 UART: [fht] FMC Alias Private Key: 7
20,587,568 UART: [art] Derive CDI
20,588,371 UART: [art] Store in in slot 0x4
20,630,692 UART: [art] Derive Key Pair
20,631,731 UART: [art] Store priv key in slot 0x5
23,058,199 UART: [art] Derive Key Pair - Done
23,071,388 UART: [art] Signing Cert with AUTHO
23,072,703 UART: RITY.KEYID = 7
24,778,156 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,658 UART: [art] PUB.X = 4606FFF124DD709102B5AE988CEAFE18EDB8E55483A2390862490FC7A919DBAF43B81FB9AA25EA1AA39DAA980612D0B8
24,787,011 UART: [art] PUB.Y = 89FD6C19EB9289CBFFFD450ADC9BC1D7117D7D4EABDA206B71EF286A5CE5682B54A7C0CAD2150A4AD41317BE6F17BDCA
24,794,294 UART: [art] SIG.R = A29F501B1079B49FB0B45E807D5C6EB0E4B915C0698D41DB2267315B7AF529ABEB11EDB987CA8EA29B67BD40F6156072
24,801,665 UART: [art] SIG.S = 1BE2E3D1159093235351605107F9A4E4A1E7623E1E84616A9B06B917CE52AE4B4183A079D22D64DBE68D2D14250E13A5
25,780,729 UART: Caliptra RT
25,781,415 UART: [state] CFI Enabled
25,898,362 UART: [rt] RT listening for mailbox commands...
25,900,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,931,273 UART: [rt]cmd =0x44504543, len=96
30,214,606 >>> mbox cmd response data (6236 bytes)
30,243,834 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,274,289 UART: [rt]cmd =0x53574545, len=84
34,409,809 >>> mbox cmd response data (200 bytes)
34,798,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,829,984 UART: [rt]cmd =0x44504543, len=96
34,861,449 >>> mbox cmd response data (56 bytes)
34,862,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,892,686 UART: [rt]cmd =0x44504543, len=96
34,931,281 >>> mbox cmd response data (24 bytes)
34,931,833 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,962,320 UART: [rt]cmd =0x53574545, len=84
39,097,904 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,699,120 ready_for_fw is high
3,699,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,160 >>> mbox cmd response: success
18,527,788 UART:
18,528,204 UART: Running Caliptra FMC ...
18,529,299 UART:
18,529,458 UART: [state] CFI Enabled
18,537,236 UART: [fht] FMC Alias Private Key: 7
20,294,540 UART: [art] Extend RT PCRs Done
20,295,766 UART: [art] Lock RT PCRs Done
20,297,016 UART: [art] Populate DV Done
20,302,334 UART: [fht] FMC Alias Private Key: 7
20,304,030 UART: [art] Derive CDI
20,304,840 UART: [art] Store in in slot 0x4
20,347,588 UART: [art] Derive Key Pair
20,348,593 UART: [art] Store priv key in slot 0x5
22,775,358 UART: [art] Derive Key Pair - Done
22,788,293 UART: [art] Signing Cert with AUTHO
22,789,589 UART: RITY.KEYID = 7
24,495,228 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,729 UART: [art] PUB.X = A4619DB7A685C29745E368CF8F3CC373136FBC6A70AD1CAD4BA7A45D63B74D380BBE1E6F6E696BE977721FCBC1415AA3
24,503,961 UART: [art] PUB.Y = 6B243B87CD97A25DB8659E0C4E50091513BA546A91FB896B4CEDC61657905126CD64D11F0328B73C6841527DFECFBB5A
24,511,256 UART: [art] SIG.R = 8BCED657DB657A13A17DCDD654ED37F069E21E55FD6A5112211D45A58BDC44B58DAAF4823332C786F2910EEFA8039098
24,518,669 UART: [art] SIG.S = A5568FC84D24E7DE4877B91D006B567E4F72E8D446B6C02188D1348DE05E19E0023679C5DD36DAEFE46D194C185DFD75
25,497,748 UART: Caliptra RT
25,498,443 UART: [state] CFI Enabled
25,615,013 UART: [rt] RT listening for mailbox commands...
25,617,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,648,142 UART: [rt]cmd =0x44504543, len=96
29,932,219 >>> mbox cmd response data (6236 bytes)
29,961,679 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,992,259 UART: [rt]cmd =0x53574545, len=84
34,127,399 >>> mbox cmd response data (200 bytes)
34,516,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,547,719 UART: [rt]cmd =0x44504543, len=96
34,578,952 >>> mbox cmd response data (56 bytes)
34,579,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,610,099 UART: [rt]cmd =0x44504543, len=96
34,649,512 >>> mbox cmd response data (24 bytes)
34,650,073 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,680,621 UART: [rt]cmd =0x53574545, len=84
38,815,652 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,187 UART:
192,542 UART: Running Caliptra ROM ...
193,685 UART:
193,860 UART: [state] CFI Enabled
261,671 UART: [state] LifecycleState = Unprovisioned
264,097 UART: [state] DebugLocked = No
266,136 UART: [state] WD Timer not started. Device not locked for debugging
270,952 UART: [kat] SHA2-256
460,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,631 UART: [kat] ++
472,378 UART: [kat] sha1
482,411 UART: [kat] SHA2-256
485,429 UART: [kat] SHA2-384
490,996 UART: [kat] SHA2-512-ACC
493,576 UART: [kat] ECC-384
2,947,451 UART: [kat] HMAC-384Kdf
2,970,067 UART: [kat] LMS
3,501,832 UART: [kat] --
3,505,919 UART: [cold-reset] ++
3,507,374 UART: [fht] FHT @ 0x50003400
3,519,939 UART: [idev] ++
3,520,690 UART: [idev] CDI.KEYID = 6
3,521,605 UART: [idev] SUBJECT.KEYID = 7
3,522,780 UART: [idev] UDS.KEYID = 0
3,523,707 ready_for_fw is high
3,523,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,688 UART: [idev] Erasing UDS.KEYID = 0
6,027,972 UART: [idev] Sha1 KeyId Algorithm
6,050,558 UART: [idev] --
6,055,039 UART: [ldev] ++
6,055,722 UART: [ldev] CDI.KEYID = 6
6,056,631 UART: [ldev] SUBJECT.KEYID = 5
6,057,793 UART: [ldev] AUTHORITY.KEYID = 7
6,059,024 UART: [ldev] FE.KEYID = 1
6,098,935 UART: [ldev] Erasing FE.KEYID = 1
8,610,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,468 UART: [ldev] --
10,414,796 UART: [fwproc] Wait for Commands...
10,417,374 UART: [fwproc] Recv command 0x46574c44
10,419,629 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,392 >>> mbox cmd response: success
14,604,925 UART: [afmc] ++
14,605,640 UART: [afmc] CDI.KEYID = 6
14,606,879 UART: [afmc] SUBJECT.KEYID = 7
14,608,328 UART: [afmc] AUTHORITY.KEYID = 5
17,150,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,914 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,958 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,635 UART: [afmc] --
18,949,630 UART: [cold-reset] --
18,954,530 UART: [state] Locking Datavault
18,959,772 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,919 UART: [state] Locking ICCM
18,963,693 UART: [exit] Launching FMC @ 0x40000130
18,972,366 UART:
18,972,596 UART: Running Caliptra FMC ...
18,973,691 UART:
18,973,879 UART: [state] CFI Enabled
19,032,079 UART: [fht] FMC Alias Private Key: 7
20,796,086 UART: [art] Extend RT PCRs Done
20,797,296 UART: [art] Lock RT PCRs Done
20,798,758 UART: [art] Populate DV Done
20,804,008 UART: [fht] FMC Alias Private Key: 7
20,805,559 UART: [art] Derive CDI
20,806,370 UART: [art] Store in in slot 0x4
20,864,225 UART: [art] Derive Key Pair
20,865,221 UART: [art] Store priv key in slot 0x5
23,328,170 UART: [art] Derive Key Pair - Done
23,340,955 UART: [art] Signing Cert with AUTHO
23,342,254 UART: RITY.KEYID = 7
25,053,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,201 UART: [art] PUB.X = 74969CA50E06401C046679577DD9F80EFA942056225975BF086DC2509CFC949AFE4D9A340334EC0DAF9AAE739B2AF3C3
25,062,452 UART: [art] PUB.Y = 40F188064642251D542987E01046C2501D7462CBCE8BF0822314B2CE442CACF5BF86B12A3C1B4B3B56E95D582DCE4192
25,069,706 UART: [art] SIG.R = FE7A031FEBF4AA3F1D5DE00B79D00345601C10891F81A273FCE33885895595C128BD3513706BC051E140CC305672444A
25,077,041 UART: [art] SIG.S = B46B4B1A4CEBFCFC0BDF31FF6087494466929B49F372DE9155717590FDE771DF71720EF99BBE9431CA6662DFA1E9BFCA
26,055,248 UART: Caliptra RT
26,055,942 UART: [state] CFI Enabled
26,220,017 UART: [rt] RT listening for mailbox commands...
26,222,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,448 UART: [rt]cmd =0x44504543, len=96
30,631,893 >>> mbox cmd response data (6236 bytes)
30,661,117 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,691,672 UART: [rt]cmd =0x53574545, len=84
34,868,622 >>> mbox cmd response data (200 bytes)
35,253,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,284,563 UART: [rt]cmd =0x44504543, len=96
35,315,144 >>> mbox cmd response data (56 bytes)
35,315,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,346,407 UART: [rt]cmd =0x44504543, len=96
35,395,849 >>> mbox cmd response data (24 bytes)
35,396,452 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,427,188 UART: [rt]cmd =0x53574545, len=84
39,602,435 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,436,976 ready_for_fw is high
3,437,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,388 >>> mbox cmd response: success
19,029,744 UART:
19,030,140 UART: Running Caliptra FMC ...
19,031,241 UART:
19,031,396 UART: [state] CFI Enabled
19,097,288 UART: [fht] FMC Alias Private Key: 7
20,861,300 UART: [art] Extend RT PCRs Done
20,862,519 UART: [art] Lock RT PCRs Done
20,864,256 UART: [art] Populate DV Done
20,869,723 UART: [fht] FMC Alias Private Key: 7
20,871,263 UART: [art] Derive CDI
20,872,080 UART: [art] Store in in slot 0x4
20,929,870 UART: [art] Derive Key Pair
20,930,896 UART: [art] Store priv key in slot 0x5
23,394,132 UART: [art] Derive Key Pair - Done
23,407,401 UART: [art] Signing Cert with AUTHO
23,408,732 UART: RITY.KEYID = 7
25,120,431 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,954 UART: [art] PUB.X = 3D13A1FD8846B005525132F66CBF4D02EE9C98568B4006CBF3A2D4F5C77E301848B07DA90AF0C555FC9325F56CD5E70C
25,129,203 UART: [art] PUB.Y = 1604AFA4721CC3F36B3DA8FDF4368F88EE8DA0485C3DA845A2F9F017591C72DA6F3C4438FDA68EED6D5B40158C132CEA
25,136,509 UART: [art] SIG.R = 944FB7A624EBEAEA15F5A3AAF7173D404845C8BEE18CFFAC5A0991F8C281DD5002964A10C7FDA3C4F9E75E5989FB8F9B
25,143,895 UART: [art] SIG.S = 9CA2FC3E0E2171F8880E1D28D6D67DEA779BF3CAA0D46A19BCE2E23881E238B579D74AB3DEDFC81A7B51CF40A9306974
26,123,664 UART: Caliptra RT
26,124,523 UART: [state] CFI Enabled
26,287,414 UART: [rt] RT listening for mailbox commands...
26,289,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,805 UART: [rt]cmd =0x44504543, len=96
30,681,071 >>> mbox cmd response data (6236 bytes)
30,710,657 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,741,172 UART: [rt]cmd =0x53574545, len=84
34,919,997 >>> mbox cmd response data (200 bytes)
35,303,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,334,570 UART: [rt]cmd =0x44504543, len=96
35,366,117 >>> mbox cmd response data (56 bytes)
35,366,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,397,345 UART: [rt]cmd =0x44504543, len=96
35,448,774 >>> mbox cmd response data (24 bytes)
35,449,370 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,479,785 UART: [rt]cmd =0x53574545, len=84
39,655,634 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,374 UART:
192,734 UART: Running Caliptra ROM ...
193,838 UART:
603,694 UART: [state] CFI Enabled
618,985 UART: [state] LifecycleState = Unprovisioned
621,370 UART: [state] DebugLocked = No
622,951 UART: [state] WD Timer not started. Device not locked for debugging
627,971 UART: [kat] SHA2-256
817,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,665 UART: [kat] ++
829,277 UART: [kat] sha1
841,641 UART: [kat] SHA2-256
844,641 UART: [kat] SHA2-384
850,063 UART: [kat] SHA2-512-ACC
852,646 UART: [kat] ECC-384
3,294,627 UART: [kat] HMAC-384Kdf
3,308,376 UART: [kat] LMS
3,840,149 UART: [kat] --
3,841,943 UART: [cold-reset] ++
3,842,875 UART: [fht] FHT @ 0x50003400
3,854,125 UART: [idev] ++
3,854,769 UART: [idev] CDI.KEYID = 6
3,855,748 UART: [idev] SUBJECT.KEYID = 7
3,856,913 UART: [idev] UDS.KEYID = 0
3,857,827 ready_for_fw is high
3,858,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,756 UART: [idev] Erasing UDS.KEYID = 0
6,334,502 UART: [idev] Sha1 KeyId Algorithm
6,356,540 UART: [idev] --
6,361,204 UART: [ldev] ++
6,361,892 UART: [ldev] CDI.KEYID = 6
6,362,799 UART: [ldev] SUBJECT.KEYID = 5
6,363,953 UART: [ldev] AUTHORITY.KEYID = 7
6,365,176 UART: [ldev] FE.KEYID = 1
6,376,354 UART: [ldev] Erasing FE.KEYID = 1
8,854,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,244 UART: [ldev] --
10,643,510 UART: [fwproc] Wait for Commands...
10,645,915 UART: [fwproc] Recv command 0x46574c44
10,648,217 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,842,919 >>> mbox cmd response: success
14,846,112 UART: [afmc] ++
14,846,815 UART: [afmc] CDI.KEYID = 6
14,848,052 UART: [afmc] SUBJECT.KEYID = 7
14,849,489 UART: [afmc] AUTHORITY.KEYID = 5
17,354,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,992 UART: [afmc] --
19,148,371 UART: [cold-reset] --
19,151,407 UART: [state] Locking Datavault
19,156,294 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,434 UART: [state] Locking ICCM
19,159,972 UART: [exit] Launching FMC @ 0x40000130
19,168,641 UART:
19,168,863 UART: Running Caliptra FMC ...
19,169,879 UART:
19,170,017 UART: [state] CFI Enabled
19,178,582 UART: [fht] FMC Alias Private Key: 7
20,935,393 UART: [art] Extend RT PCRs Done
20,936,615 UART: [art] Lock RT PCRs Done
20,938,340 UART: [art] Populate DV Done
20,943,688 UART: [fht] FMC Alias Private Key: 7
20,945,431 UART: [art] Derive CDI
20,946,237 UART: [art] Store in in slot 0x4
20,989,054 UART: [art] Derive Key Pair
20,990,085 UART: [art] Store priv key in slot 0x5
23,416,282 UART: [art] Derive Key Pair - Done
23,429,329 UART: [art] Signing Cert with AUTHO
23,430,624 UART: RITY.KEYID = 7
25,136,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,542 UART: [art] PUB.X = E4FC1395F416E316ED331CA6ACE825AC4858B6F7348CCBB1B40BD736C1D6ABAFB6AEA67099F1D13AC3212D2691F6B064
25,144,818 UART: [art] PUB.Y = DB4FC15F5B496B26BC3A5E5E48AC4B83B6F2983036947BDAFE3879A37DBBB0C64080FC28E40AB56D22BE6F6ADB010478
25,152,073 UART: [art] SIG.R = C4BD7E71129493ED463D24B612D2C9175748CEBD946F78785474FC6C3F31927948369763774603A284DA32ACA882975E
25,159,455 UART: [art] SIG.S = 6095A6768BCF7D314736391E83952996E2551E55C44465EF4FFDCBFFF80BB3078762399C69526668C00A7D33506746FD
26,138,681 UART: Caliptra RT
26,139,386 UART: [state] CFI Enabled
26,256,605 UART: [rt] RT listening for mailbox commands...
26,259,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,289,735 UART: [rt]cmd =0x44504543, len=96
30,575,434 >>> mbox cmd response data (6236 bytes)
30,604,729 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,635,676 UART: [rt]cmd =0x53574545, len=84
34,769,969 >>> mbox cmd response data (200 bytes)
35,159,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,190,285 UART: [rt]cmd =0x44504543, len=96
35,221,398 >>> mbox cmd response data (56 bytes)
35,222,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,252,760 UART: [rt]cmd =0x44504543, len=96
35,290,386 >>> mbox cmd response data (24 bytes)
35,290,945 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,321,568 UART: [rt]cmd =0x53574545, len=84
39,457,176 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,755,528 ready_for_fw is high
3,755,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,073 >>> mbox cmd response: success
19,204,085 UART:
19,204,480 UART: Running Caliptra FMC ...
19,205,623 UART:
19,205,773 UART: [state] CFI Enabled
19,213,608 UART: [fht] FMC Alias Private Key: 7
20,970,458 UART: [art] Extend RT PCRs Done
20,971,679 UART: [art] Lock RT PCRs Done
20,973,246 UART: [art] Populate DV Done
20,978,569 UART: [fht] FMC Alias Private Key: 7
20,980,215 UART: [art] Derive CDI
20,981,027 UART: [art] Store in in slot 0x4
21,024,003 UART: [art] Derive Key Pair
21,025,008 UART: [art] Store priv key in slot 0x5
23,451,497 UART: [art] Derive Key Pair - Done
23,464,169 UART: [art] Signing Cert with AUTHO
23,465,472 UART: RITY.KEYID = 7
25,171,158 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,673 UART: [art] PUB.X = E9D90EF20AE81AA901AFE87849653DC162F7226D661F07DD250FEA2779715A534F732A9F228DB3C8EA4D98B04020E96A
25,179,903 UART: [art] PUB.Y = 905973A2371A93B119A6F521AC5E9AC809CF8578B8540A3CAB3E5558E85E9849C666DEDBE44C5C947ABAE2821DF5FB7B
25,187,196 UART: [art] SIG.R = 882EE06913589DD9A481B99AB0A129D25F34469F90A9DBAE3FF461239B1043572A9D7A1135F5F20D763FE10C7A6851BD
25,194,610 UART: [art] SIG.S = 7EB3B69C8BDB698DD12BFEE34E1D249996899428F05BBB867F18238E8718AA5714A55066AAD5FB96644CCF5991C43D76
26,173,098 UART: Caliptra RT
26,173,791 UART: [state] CFI Enabled
26,291,010 UART: [rt] RT listening for mailbox commands...
26,293,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,059 UART: [rt]cmd =0x44504543, len=96
30,607,572 >>> mbox cmd response data (6236 bytes)
30,636,822 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,667,549 UART: [rt]cmd =0x53574545, len=84
34,802,983 >>> mbox cmd response data (200 bytes)
35,194,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,225,368 UART: [rt]cmd =0x44504543, len=96
35,256,293 >>> mbox cmd response data (56 bytes)
35,257,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,287,431 UART: [rt]cmd =0x44504543, len=96
35,325,656 >>> mbox cmd response data (24 bytes)
35,326,222 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,356,706 UART: [rt]cmd =0x53574545, len=84
39,491,775 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,389 UART: [kat] SHA2-256
882,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,435 UART: [kat] ++
886,587 UART: [kat] sha1
890,879 UART: [kat] SHA2-256
892,817 UART: [kat] SHA2-384
895,428 UART: [kat] SHA2-512-ACC
897,329 UART: [kat] ECC-384
902,984 UART: [kat] HMAC-384Kdf
907,618 UART: [kat] LMS
1,475,814 UART: [kat] --
1,476,927 UART: [cold-reset] ++
1,477,441 UART: [fht] Storing FHT @ 0x50003400
1,480,134 UART: [idev] ++
1,480,302 UART: [idev] CDI.KEYID = 6
1,480,662 UART: [idev] SUBJECT.KEYID = 7
1,481,086 UART: [idev] UDS.KEYID = 0
1,481,431 ready_for_fw is high
1,481,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,292 UART: [idev] Erasing UDS.KEYID = 0
1,506,360 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,902 UART: [idev] --
1,515,773 UART: [ldev] ++
1,515,941 UART: [ldev] CDI.KEYID = 6
1,516,304 UART: [ldev] SUBJECT.KEYID = 5
1,516,730 UART: [ldev] AUTHORITY.KEYID = 7
1,517,193 UART: [ldev] FE.KEYID = 1
1,522,335 UART: [ldev] Erasing FE.KEYID = 1
1,546,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,333 UART: [fwproc] Waiting for Commands...
1,586,962 UART: [fwproc] Received command 0x46574c44
1,587,753 UART: [fwproc] Received Image of size 114448 bytes
2,887,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,027 >>> mbox cmd response: success
3,082,257 UART: [afmc] ++
3,082,425 UART: [afmc] CDI.KEYID = 6
3,082,787 UART: [afmc] SUBJECT.KEYID = 7
3,083,212 UART: [afmc] AUTHORITY.KEYID = 5
3,117,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,386 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,076 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,063 UART: [afmc] --
3,161,025 UART: [cold-reset] --
3,161,821 UART: [state] Locking Datavault
3,162,938 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,542 UART: [state] Locking ICCM
3,164,032 UART: [exit] Launching FMC @ 0x40000130
3,169,361 UART:
3,169,377 UART: Running Caliptra FMC ...
3,169,785 UART:
3,169,839 UART: [state] CFI Enabled
3,180,352 UART: [fht] FMC Alias Private Key: 7
3,288,693 UART: [art] Extend RT PCRs Done
3,289,121 UART: [art] Lock RT PCRs Done
3,290,865 UART: [art] Populate DV Done
3,298,778 UART: [fht] FMC Alias Private Key: 7
3,299,784 UART: [art] Derive CDI
3,300,064 UART: [art] Store in in slot 0x4
3,385,139 UART: [art] Derive Key Pair
3,385,499 UART: [art] Store priv key in slot 0x5
3,398,481 UART: [art] Derive Key Pair - Done
3,413,455 UART: [art] Signing Cert with AUTHO
3,413,935 UART: RITY.KEYID = 7
3,429,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,242 UART: [art] PUB.X = BFD8B13F367D056DEE4F4CA8D4D6DF5EC07C83C6711F6FE9F57F6A8AC3C06C6895113DB3D3F7886B11774734B0C314B6
3,437,023 UART: [art] PUB.Y = 24540120D60647AFFC74AE5BC0485D95D979C137EB53F578CFACA18E03391BF8B0AD01958D7A87C048AA50EF560F586A
3,443,966 UART: [art] SIG.R = 7DAF06CF4789E168988B955FF81F91B4167B0D376983201F68361FC9CE4C809BE3D80093009CFAB2D2FD57885F24AE58
3,450,688 UART: [art] SIG.S = 7A18660120A4EB11F93B5AF33C2F16F48E0A67296E0129B041D83B0E0DE6F26F7ED0070470E29457FC92FA40A5127019
3,474,384 UART: Caliptra RT
3,474,637 UART: [state] CFI Enabled
3,582,293 UART: [rt] RT listening for mailbox commands...
3,582,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,639 UART: [rt]cmd =0x44504543, len=96
3,795,101 >>> mbox cmd response data (6236 bytes)
3,795,102 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,897 UART: [rt]cmd =0x53574545, len=84
3,849,897 >>> mbox cmd response data (200 bytes)
3,849,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,801 UART: [rt]cmd =0x44504543, len=96
3,911,847 >>> mbox cmd response data (56 bytes)
3,911,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,691 UART: [rt]cmd =0x44504543, len=96
3,981,626 >>> mbox cmd response data (24 bytes)
3,981,627 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,011,534 UART: [rt]cmd =0x53574545, len=84
4,036,860 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,781 ready_for_fw is high
1,361,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,083 >>> mbox cmd response: success
2,990,483 UART:
2,990,499 UART: Running Caliptra FMC ...
2,990,907 UART:
2,990,961 UART: [state] CFI Enabled
3,001,138 UART: [fht] FMC Alias Private Key: 7
3,108,485 UART: [art] Extend RT PCRs Done
3,108,913 UART: [art] Lock RT PCRs Done
3,110,521 UART: [art] Populate DV Done
3,118,600 UART: [fht] FMC Alias Private Key: 7
3,119,776 UART: [art] Derive CDI
3,120,056 UART: [art] Store in in slot 0x4
3,205,277 UART: [art] Derive Key Pair
3,205,637 UART: [art] Store priv key in slot 0x5
3,218,931 UART: [art] Derive Key Pair - Done
3,233,496 UART: [art] Signing Cert with AUTHO
3,233,976 UART: RITY.KEYID = 7
3,248,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,751 UART: [art] PUB.X = 26746F2EFDE4A426EA289C0BDD3FA8B826CBD21DA6BB733185A8ADDA7CC7081DE3F4D8D7849E7B6D23B5DDAAA89C05E2
3,256,540 UART: [art] PUB.Y = 2240DA02C55F997EF6F9ECFDCD4163416D15F06FED52938354C93B292E2AC24FCB9BB9DF52AFF4AB909E78C914545222
3,263,499 UART: [art] SIG.R = DFAACB1D8CEE3B6C2B0083A9E8872849ED1650D3F0D5685F9B3D6594CD2068AFAABF01FAF20437D4E561EDA6C05F2C62
3,270,263 UART: [art] SIG.S = AEF68DF478EE23CC3EB3643B1796767202FCF123D71FFF5BE6CA59BEC4030211D4E772EBD67777F4D8B5AE4E4B23FE5B
3,294,147 UART: Caliptra RT
3,294,400 UART: [state] CFI Enabled
3,402,488 UART: [rt] RT listening for mailbox commands...
3,403,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,454 UART: [rt]cmd =0x44504543, len=96
3,614,865 >>> mbox cmd response data (6236 bytes)
3,614,866 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,649 UART: [rt]cmd =0x53574545, len=84
3,670,511 >>> mbox cmd response data (200 bytes)
3,670,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,321 UART: [rt]cmd =0x44504543, len=96
3,732,045 >>> mbox cmd response data (56 bytes)
3,732,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,059 UART: [rt]cmd =0x44504543, len=96
3,801,310 >>> mbox cmd response data (24 bytes)
3,801,311 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,212 UART: [rt]cmd =0x53574545, len=84
3,857,238 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,468 UART: [kat] SHA2-256
882,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,514 UART: [kat] ++
886,666 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,410 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,579 UART: [idev] ++
1,479,747 UART: [idev] CDI.KEYID = 6
1,480,107 UART: [idev] SUBJECT.KEYID = 7
1,480,531 UART: [idev] UDS.KEYID = 0
1,480,876 ready_for_fw is high
1,480,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,431 UART: [idev] Erasing UDS.KEYID = 0
1,505,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,522,070 UART: [ldev] Erasing FE.KEYID = 1
1,547,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,833 UART: [ldev] --
1,587,166 UART: [fwproc] Waiting for Commands...
1,588,031 UART: [fwproc] Received command 0x46574c44
1,588,822 UART: [fwproc] Received Image of size 114448 bytes
2,888,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,598 >>> mbox cmd response: success
3,082,634 UART: [afmc] ++
3,082,802 UART: [afmc] CDI.KEYID = 6
3,083,164 UART: [afmc] SUBJECT.KEYID = 7
3,083,589 UART: [afmc] AUTHORITY.KEYID = 5
3,118,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,377 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,067 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,024 UART: [afmc] --
3,162,080 UART: [cold-reset] --
3,163,054 UART: [state] Locking Datavault
3,164,295 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,899 UART: [state] Locking ICCM
3,165,517 UART: [exit] Launching FMC @ 0x40000130
3,170,846 UART:
3,170,862 UART: Running Caliptra FMC ...
3,171,270 UART:
3,171,413 UART: [state] CFI Enabled
3,181,798 UART: [fht] FMC Alias Private Key: 7
3,289,515 UART: [art] Extend RT PCRs Done
3,289,943 UART: [art] Lock RT PCRs Done
3,291,119 UART: [art] Populate DV Done
3,299,206 UART: [fht] FMC Alias Private Key: 7
3,300,268 UART: [art] Derive CDI
3,300,548 UART: [art] Store in in slot 0x4
3,386,253 UART: [art] Derive Key Pair
3,386,613 UART: [art] Store priv key in slot 0x5
3,399,977 UART: [art] Derive Key Pair - Done
3,414,380 UART: [art] Signing Cert with AUTHO
3,414,860 UART: RITY.KEYID = 7
3,430,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,775 UART: [art] PUB.X = F6F082EB982E8B2EDFB145B1E5408093DD191EC1F67BF50C09B8A6E21A907323F79128B8CA326604BE191AD4DA3A7B26
3,437,546 UART: [art] PUB.Y = 200D224B8D502C5D15ECF847D0EF56417CEC18CFA9806A4BF72D05F6A49C0EE6B1EA7C2A3CCC71C4D139547D73E3426E
3,444,503 UART: [art] SIG.R = 8519894AE5B0DC80DE865B9EA68D30EB55D3714A0530A774C4662309D1B3C0DDED67064A5CAAB65AC5E6143102C822D5
3,451,267 UART: [art] SIG.S = B19806445DE41DFE139290AF31ADC4BFA86AAF974D49A17495BCABBFE2345C0A887AFB21A113030647E6B4AE7CDAEE6C
3,475,426 UART: Caliptra RT
3,475,771 UART: [state] CFI Enabled
3,583,243 UART: [rt] RT listening for mailbox commands...
3,583,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,401 UART: [rt]cmd =0x44504543, len=96
3,795,181 >>> mbox cmd response data (6236 bytes)
3,795,182 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,021 UART: [rt]cmd =0x53574545, len=84
3,850,861 >>> mbox cmd response data (200 bytes)
3,850,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,729 UART: [rt]cmd =0x44504543, len=96
3,912,991 >>> mbox cmd response data (56 bytes)
3,912,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,103 UART: [rt]cmd =0x44504543, len=96
3,982,716 >>> mbox cmd response data (24 bytes)
3,982,717 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,012,598 UART: [rt]cmd =0x53574545, len=84
4,038,126 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 ready_for_fw is high
1,363,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,878 >>> mbox cmd response: success
2,991,558 UART:
2,991,574 UART: Running Caliptra FMC ...
2,991,982 UART:
2,992,125 UART: [state] CFI Enabled
3,002,652 UART: [fht] FMC Alias Private Key: 7
3,110,471 UART: [art] Extend RT PCRs Done
3,110,899 UART: [art] Lock RT PCRs Done
3,112,337 UART: [art] Populate DV Done
3,120,672 UART: [fht] FMC Alias Private Key: 7
3,121,838 UART: [art] Derive CDI
3,122,118 UART: [art] Store in in slot 0x4
3,208,031 UART: [art] Derive Key Pair
3,208,391 UART: [art] Store priv key in slot 0x5
3,221,695 UART: [art] Derive Key Pair - Done
3,236,402 UART: [art] Signing Cert with AUTHO
3,236,882 UART: RITY.KEYID = 7
3,252,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,137 UART: [art] PUB.X = 881AA5E6DEEC0DC01D5AA089F1FF08D77C546980E28F2F50DC190A90191F0C143C0DC9D4C7F1BF05388C2312A41F8708
3,259,896 UART: [art] PUB.Y = C8769996BBFAC063920741794103A9BB37E84FA44BE07E9601400141E7CF344C8D7F74EEDC917A352412FA28965C1814
3,266,830 UART: [art] SIG.R = 571D1A2EDA222086856BDD8673771F4336A2FE4C245BC4511E74FC357691252901AD33888FCEEE011447F3DEFB7DA637
3,273,596 UART: [art] SIG.S = BD113F385C9E2F16611A1233AABC35E72F03E7D46D3EDD744228FC1C5FB254AF10D1F7F8C3DDE94ADBE83255EF20AE99
3,297,798 UART: Caliptra RT
3,298,143 UART: [state] CFI Enabled
3,407,136 UART: [rt] RT listening for mailbox commands...
3,407,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,212 UART: [rt]cmd =0x44504543, len=96
3,618,841 >>> mbox cmd response data (6236 bytes)
3,618,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,985 UART: [rt]cmd =0x53574545, len=84
3,674,715 >>> mbox cmd response data (200 bytes)
3,674,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,725 UART: [rt]cmd =0x44504543, len=96
3,736,357 >>> mbox cmd response data (56 bytes)
3,736,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,445 UART: [rt]cmd =0x44504543, len=96
3,806,528 >>> mbox cmd response data (24 bytes)
3,806,529 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,438 UART: [rt]cmd =0x53574545, len=84
3,862,170 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,860 UART: [kat] SHA2-512-ACC
908,761 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
922,930 UART: [kat] LMS
1,171,258 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,515 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,623 UART: [idev] Sha1 KeyId Algorithm
1,209,065 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,165 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,426 >>> mbox cmd response: success
2,777,654 UART: [afmc] ++
2,777,822 UART: [afmc] CDI.KEYID = 6
2,778,184 UART: [afmc] SUBJECT.KEYID = 7
2,778,609 UART: [afmc] AUTHORITY.KEYID = 5
2,814,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,651 UART: [afmc] --
2,857,783 UART: [cold-reset] --
2,858,541 UART: [state] Locking Datavault
2,859,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,198 UART: [state] Locking ICCM
2,860,764 UART: [exit] Launching FMC @ 0x40000130
2,866,093 UART:
2,866,109 UART: Running Caliptra FMC ...
2,866,517 UART:
2,866,571 UART: [state] CFI Enabled
2,877,498 UART: [fht] FMC Alias Private Key: 7
2,985,143 UART: [art] Extend RT PCRs Done
2,985,571 UART: [art] Lock RT PCRs Done
2,987,065 UART: [art] Populate DV Done
2,995,460 UART: [fht] FMC Alias Private Key: 7
2,996,594 UART: [art] Derive CDI
2,996,874 UART: [art] Store in in slot 0x4
3,082,325 UART: [art] Derive Key Pair
3,082,685 UART: [art] Store priv key in slot 0x5
3,095,759 UART: [art] Derive Key Pair - Done
3,110,492 UART: [art] Signing Cert with AUTHO
3,110,972 UART: RITY.KEYID = 7
3,125,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,673 UART: [art] PUB.X = CE44C59D24846B9263D8D0E8CBC1A9F03F042A5867C7A1FFC669EEB26C3839332F8A2EE95ACF46B3A42D458B155E3FE6
3,133,454 UART: [art] PUB.Y = 9666824F7881BC23FF9D00D903CD755C6C2C2360C6AFA3656AF325431CDE39141C16640A9F9975DB3F114815525DF241
3,140,372 UART: [art] SIG.R = EA1EC8197B8171BE932BD143F957A81621AF4AFD00DBEBA0F55311A4CD0C14442F05F4B203F097E37A769F5F95D24C4B
3,147,123 UART: [art] SIG.S = B2802E8CC07653F82C1440A59165AF1950F0581333134D5D53B3B769E41B9A18E54DCC50764590AEA3DD2016CA3185A0
3,171,068 UART: Caliptra RT
3,171,321 UART: [state] CFI Enabled
3,278,453 UART: [rt] RT listening for mailbox commands...
3,279,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,693 UART: [rt]cmd =0x44504543, len=96
3,490,831 >>> mbox cmd response data (6236 bytes)
3,490,832 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,783 UART: [rt]cmd =0x53574545, len=84
3,546,315 >>> mbox cmd response data (200 bytes)
3,546,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,097 UART: [rt]cmd =0x44504543, len=96
3,608,747 >>> mbox cmd response data (56 bytes)
3,608,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,473 UART: [rt]cmd =0x44504543, len=96
3,678,680 >>> mbox cmd response data (24 bytes)
3,678,681 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,730 UART: [rt]cmd =0x53574545, len=84
3,734,468 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 ready_for_fw is high
1,060,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,873 >>> mbox cmd response: success
2,688,431 UART:
2,688,447 UART: Running Caliptra FMC ...
2,688,855 UART:
2,688,909 UART: [state] CFI Enabled
2,699,216 UART: [fht] FMC Alias Private Key: 7
2,807,277 UART: [art] Extend RT PCRs Done
2,807,705 UART: [art] Lock RT PCRs Done
2,809,363 UART: [art] Populate DV Done
2,817,606 UART: [fht] FMC Alias Private Key: 7
2,818,642 UART: [art] Derive CDI
2,818,922 UART: [art] Store in in slot 0x4
2,904,705 UART: [art] Derive Key Pair
2,905,065 UART: [art] Store priv key in slot 0x5
2,917,725 UART: [art] Derive Key Pair - Done
2,932,379 UART: [art] Signing Cert with AUTHO
2,932,859 UART: RITY.KEYID = 7
2,948,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,988 UART: [art] PUB.X = 7F273E3D1088AAAC02A7AB84226672A7A5973A47E89F8E3CA148A693D956C4B31CE7384EF932F53C94600D997191B8AD
2,955,754 UART: [art] PUB.Y = 7D946D85C36F919E3DE044579E5045D715DAB1DD153DEBEA6889A4FE91886D0781D9DC01E481420F38D5A8A127A10D84
2,962,696 UART: [art] SIG.R = 875E2C4E3B0D4B7E1D167B1BB5DB15A77592EDC647214AF0C7D0C1533FC1B011B76F32288F98AD2710345586B624F289
2,969,465 UART: [art] SIG.S = 0276E80EEB434422FED96F3342E8FBD9F326B8278A6C66FEC298677A824EE9E167215744824F2A41E9EB8CCE3E656916
2,992,612 UART: Caliptra RT
2,992,865 UART: [state] CFI Enabled
3,099,462 UART: [rt] RT listening for mailbox commands...
3,100,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,518 UART: [rt]cmd =0x44504543, len=96
3,311,200 >>> mbox cmd response data (6236 bytes)
3,311,201 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,066 UART: [rt]cmd =0x53574545, len=84
3,366,594 >>> mbox cmd response data (200 bytes)
3,366,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,700 UART: [rt]cmd =0x44504543, len=96
3,428,334 >>> mbox cmd response data (56 bytes)
3,428,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,454 UART: [rt]cmd =0x44504543, len=96
3,498,475 >>> mbox cmd response data (24 bytes)
3,498,476 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,289 UART: [rt]cmd =0x53574545, len=84
3,553,745 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,839 UART: [kat] LMS
1,171,167 UART: [kat] --
1,171,978 UART: [cold-reset] ++
1,172,486 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 ready_for_fw is high
1,176,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,436 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,770 UART: [ldev] ++
1,210,938 UART: [ldev] CDI.KEYID = 6
1,211,301 UART: [ldev] SUBJECT.KEYID = 5
1,211,727 UART: [ldev] AUTHORITY.KEYID = 7
1,212,190 UART: [ldev] FE.KEYID = 1
1,217,698 UART: [ldev] Erasing FE.KEYID = 1
1,243,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,442 UART: [ldev] --
1,283,839 UART: [fwproc] Wait for Commands...
1,284,543 UART: [fwproc] Recv command 0x46574c44
1,285,271 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,885 >>> mbox cmd response: success
2,777,073 UART: [afmc] ++
2,777,241 UART: [afmc] CDI.KEYID = 6
2,777,603 UART: [afmc] SUBJECT.KEYID = 7
2,778,028 UART: [afmc] AUTHORITY.KEYID = 5
2,813,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,782 UART: [afmc] --
2,856,678 UART: [cold-reset] --
2,857,412 UART: [state] Locking Datavault
2,858,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,181 UART: [state] Locking ICCM
2,859,609 UART: [exit] Launching FMC @ 0x40000130
2,864,938 UART:
2,864,954 UART: Running Caliptra FMC ...
2,865,362 UART:
2,865,505 UART: [state] CFI Enabled
2,876,028 UART: [fht] FMC Alias Private Key: 7
2,983,673 UART: [art] Extend RT PCRs Done
2,984,101 UART: [art] Lock RT PCRs Done
2,985,581 UART: [art] Populate DV Done
2,994,090 UART: [fht] FMC Alias Private Key: 7
2,995,134 UART: [art] Derive CDI
2,995,414 UART: [art] Store in in slot 0x4
3,080,931 UART: [art] Derive Key Pair
3,081,291 UART: [art] Store priv key in slot 0x5
3,095,085 UART: [art] Derive Key Pair - Done
3,109,672 UART: [art] Signing Cert with AUTHO
3,110,152 UART: RITY.KEYID = 7
3,125,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,333 UART: [art] PUB.X = E0D68BB94E5E21B58BF691B65918CBE4DE65532C4EEF85F200B32A26B402F6EFD9A21C7F90F778358D6E249A3B8CD7C1
3,133,092 UART: [art] PUB.Y = 87F2ACA4758980E31DC317B5D28C4E33F97683EF6AA09EAAE5D4C8DAE74480CA1DA2F0A85A9FCAB22A4FCD9CF9C420C8
3,140,068 UART: [art] SIG.R = E6871EE731DE7C4CAF2126E8414B48A9D4EA4B90AD380B65C8B5695EB24190305CEF934DFDBDB8840B8AA58D333C89A6
3,146,846 UART: [art] SIG.S = 11C5082C8778CC7EB650D3DC2B2E0147292658DB533ADD2FFA5773A9C96EFF3A86E0B99D3E811F5D7F606E64B75126BD
3,170,443 UART: Caliptra RT
3,170,788 UART: [state] CFI Enabled
3,277,547 UART: [rt] RT listening for mailbox commands...
3,278,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,799 UART: [rt]cmd =0x44504543, len=96
3,491,337 >>> mbox cmd response data (6236 bytes)
3,491,338 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,437 UART: [rt]cmd =0x53574545, len=84
3,546,895 >>> mbox cmd response data (200 bytes)
3,546,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,745 UART: [rt]cmd =0x44504543, len=96
3,609,119 >>> mbox cmd response data (56 bytes)
3,609,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,009 UART: [rt]cmd =0x44504543, len=96
3,678,500 >>> mbox cmd response data (24 bytes)
3,678,501 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,238 UART: [rt]cmd =0x53574545, len=84
3,734,498 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,432 ready_for_fw is high
1,061,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,254 >>> mbox cmd response: success
2,691,290 UART:
2,691,306 UART: Running Caliptra FMC ...
2,691,714 UART:
2,691,857 UART: [state] CFI Enabled
2,702,512 UART: [fht] FMC Alias Private Key: 7
2,809,853 UART: [art] Extend RT PCRs Done
2,810,281 UART: [art] Lock RT PCRs Done
2,811,677 UART: [art] Populate DV Done
2,819,828 UART: [fht] FMC Alias Private Key: 7
2,820,944 UART: [art] Derive CDI
2,821,224 UART: [art] Store in in slot 0x4
2,906,949 UART: [art] Derive Key Pair
2,907,309 UART: [art] Store priv key in slot 0x5
2,920,439 UART: [art] Derive Key Pair - Done
2,935,217 UART: [art] Signing Cert with AUTHO
2,935,697 UART: RITY.KEYID = 7
2,950,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,564 UART: [art] PUB.X = 3C843DE06C5B03EF8963C4E42BDFF7FD0298414C7B8FF77539D6D3AD050A765DC1C915120DEDAE86F81E0A611FEB0905
2,958,324 UART: [art] PUB.Y = 4130E84CED1045D1552457B63F6DB31D907865F036F2F6345E119D9EE13BE9CC53427D632C3CB6B4D93142442B44DFE4
2,965,274 UART: [art] SIG.R = E200ACD188E96B1D8CDE021ADC1C456BD04759D88F96697E6250D347971F597CA8E15F94152777B2EA16225F0D235AD4
2,972,018 UART: [art] SIG.S = C402F8200D6888D76FC6014CF11340EA6458E500D375EA461F4D83EDB7355B7790B25F792104582F868697F0413C90A2
2,995,673 UART: Caliptra RT
2,996,018 UART: [state] CFI Enabled
3,104,702 UART: [rt] RT listening for mailbox commands...
3,105,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,940 UART: [rt]cmd =0x44504543, len=96
3,317,003 >>> mbox cmd response data (6236 bytes)
3,317,004 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,897 UART: [rt]cmd =0x53574545, len=84
3,372,583 >>> mbox cmd response data (200 bytes)
3,372,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,293 UART: [rt]cmd =0x44504543, len=96
3,433,913 >>> mbox cmd response data (56 bytes)
3,433,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,751 UART: [rt]cmd =0x44504543, len=96
3,503,728 >>> mbox cmd response data (24 bytes)
3,503,729 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,746 UART: [rt]cmd =0x53574545, len=84
3,559,400 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,417 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,174,677 ready_for_fw is high
1,174,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,832 UART: [ldev] ++
1,209,000 UART: [ldev] CDI.KEYID = 6
1,209,364 UART: [ldev] SUBJECT.KEYID = 5
1,209,791 UART: [ldev] AUTHORITY.KEYID = 7
1,210,254 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,050 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,193 UART: [fwproc] Recv command 0x46574c44
1,282,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,775,003 UART: [afmc] ++
2,775,171 UART: [afmc] CDI.KEYID = 6
2,775,534 UART: [afmc] SUBJECT.KEYID = 7
2,775,960 UART: [afmc] AUTHORITY.KEYID = 5
2,811,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,432 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,006 UART: [afmc] --
2,855,112 UART: [cold-reset] --
2,855,940 UART: [state] Locking Datavault
2,856,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,515 UART: [state] Locking ICCM
2,857,959 UART: [exit] Launching FMC @ 0x40000130
2,863,288 UART:
2,863,304 UART: Running Caliptra FMC ...
2,863,712 UART:
2,863,766 UART: [state] CFI Enabled
2,874,189 UART: [fht] FMC Alias Private Key: 7
2,982,178 UART: [art] Extend RT PCRs Done
2,982,606 UART: [art] Lock RT PCRs Done
2,984,012 UART: [art] Populate DV Done
2,992,039 UART: [fht] FMC Alias Private Key: 7
2,993,143 UART: [art] Derive CDI
2,993,423 UART: [art] Store in in slot 0x4
3,079,216 UART: [art] Derive Key Pair
3,079,576 UART: [art] Store priv key in slot 0x5
3,092,608 UART: [art] Derive Key Pair - Done
3,107,477 UART: [art] Signing Cert with AUTHO
3,107,957 UART: RITY.KEYID = 7
3,123,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,078 UART: [art] PUB.X = BD9FD3679561446CE4C6194050D06FFC819AF600D2636CF1C0A018C674252EFFCAF123699300E2B7E3AF488852C75807
3,130,801 UART: [art] PUB.Y = 44CC5DFA869E14B1060FC1804B3CE198786087A2E48ED1EFA62EAA494CBB1BF0B0AD4B6512B2852CB859C22583B215C8
3,137,757 UART: [art] SIG.R = AA1484ABA58EB091AF4F784E87ED1BB377FB54798A1A03A24733C896ADA8522C842276B2ABC703BDB2E5DF5051CE6EFD
3,144,539 UART: [art] SIG.S = 763A4D93F80E04C436CA521E14D2AF14F5C498A3748F3EC0D9266C590E9386919839591F49A4C66C67A973EC2EFB42D9
3,168,639 UART: Caliptra RT
3,168,892 UART: [state] CFI Enabled
3,277,201 UART: [rt] RT listening for mailbox commands...
3,277,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,177 UART: [rt]cmd =0x44504543, len=96
3,488,915 >>> mbox cmd response data (6236 bytes)
3,488,916 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,861 UART: [rt]cmd =0x53574545, len=84
3,544,347 >>> mbox cmd response data (200 bytes)
3,544,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,425 UART: [rt]cmd =0x44504543, len=96
3,606,383 >>> mbox cmd response data (56 bytes)
3,606,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,363 UART: [rt]cmd =0x44504543, len=96
3,675,832 >>> mbox cmd response data (24 bytes)
3,675,833 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,488 UART: [rt]cmd =0x53574545, len=84
3,731,246 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 ready_for_fw is high
1,056,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,302 >>> mbox cmd response: success
2,684,678 UART:
2,684,694 UART: Running Caliptra FMC ...
2,685,102 UART:
2,685,156 UART: [state] CFI Enabled
2,695,465 UART: [fht] FMC Alias Private Key: 7
2,802,502 UART: [art] Extend RT PCRs Done
2,802,930 UART: [art] Lock RT PCRs Done
2,804,534 UART: [art] Populate DV Done
2,812,855 UART: [fht] FMC Alias Private Key: 7
2,813,817 UART: [art] Derive CDI
2,814,097 UART: [art] Store in in slot 0x4
2,899,228 UART: [art] Derive Key Pair
2,899,588 UART: [art] Store priv key in slot 0x5
2,912,580 UART: [art] Derive Key Pair - Done
2,927,329 UART: [art] Signing Cert with AUTHO
2,927,809 UART: RITY.KEYID = 7
2,942,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,638 UART: [art] PUB.X = D2587A9CE189801A5807D881F0CAD84E4DB148FB0319DED2BF5C3759B1A4F9C88DCE5D86C8FCDBDFDA4914A6E0B8A411
2,950,424 UART: [art] PUB.Y = 7222FBE232F5514BAD0C77277EA6E92BB18BA64AD04D79DDD7F50A583A2572F82AF68378CB7DBE571CA3D67048639F54
2,957,378 UART: [art] SIG.R = E9CE9DA04109DC572B7AFDA030CBFB277393A5479AB7EBFB2814CA43FD421FF43C0CD3A6BDBA39F2B8B8A5E4BB5F3E46
2,964,172 UART: [art] SIG.S = 7C8D141419ECD3BD380847077FA40ADB1BDEFA2C57418F46F5A46A5998DE881DEAD1ED20936A74B520F1A2B775D97F5D
2,987,182 UART: Caliptra RT
2,987,435 UART: [state] CFI Enabled
3,094,756 UART: [rt] RT listening for mailbox commands...
3,095,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,876 UART: [rt]cmd =0x44504543, len=96
3,306,630 >>> mbox cmd response data (6236 bytes)
3,306,631 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,330 UART: [rt]cmd =0x53574545, len=84
3,362,104 >>> mbox cmd response data (200 bytes)
3,362,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,014 UART: [rt]cmd =0x44504543, len=96
3,424,452 >>> mbox cmd response data (56 bytes)
3,424,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,288 UART: [rt]cmd =0x44504543, len=96
3,494,071 >>> mbox cmd response data (24 bytes)
3,494,072 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,899 UART: [rt]cmd =0x53574545, len=84
3,549,299 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,119 UART: [kat] LMS
1,169,431 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,101 UART: [ldev] ++
1,209,269 UART: [ldev] CDI.KEYID = 6
1,209,633 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,445 UART: [fwproc] Wait for Commands...
1,282,158 UART: [fwproc] Recv command 0x46574c44
1,282,891 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,895 >>> mbox cmd response: success
2,773,926 UART: [afmc] ++
2,774,094 UART: [afmc] CDI.KEYID = 6
2,774,457 UART: [afmc] SUBJECT.KEYID = 7
2,774,883 UART: [afmc] AUTHORITY.KEYID = 5
2,809,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,357 UART: [afmc] --
2,853,363 UART: [cold-reset] --
2,854,311 UART: [state] Locking Datavault
2,855,364 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,968 UART: [state] Locking ICCM
2,856,410 UART: [exit] Launching FMC @ 0x40000130
2,861,739 UART:
2,861,755 UART: Running Caliptra FMC ...
2,862,163 UART:
2,862,306 UART: [state] CFI Enabled
2,872,931 UART: [fht] FMC Alias Private Key: 7
2,981,082 UART: [art] Extend RT PCRs Done
2,981,510 UART: [art] Lock RT PCRs Done
2,983,474 UART: [art] Populate DV Done
2,991,665 UART: [fht] FMC Alias Private Key: 7
2,992,829 UART: [art] Derive CDI
2,993,109 UART: [art] Store in in slot 0x4
3,078,750 UART: [art] Derive Key Pair
3,079,110 UART: [art] Store priv key in slot 0x5
3,091,488 UART: [art] Derive Key Pair - Done
3,106,207 UART: [art] Signing Cert with AUTHO
3,106,687 UART: RITY.KEYID = 7
3,121,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,678 UART: [art] PUB.X = 9988E65CE2A2FC8951757E92030C9CDA263A3D46947D72DFFECB7B9895B16ECC414ED2B275C20BB3D8E3EEB2EA2C7E5A
3,129,459 UART: [art] PUB.Y = 03045B4FA84FE4C3A45CD801207F1F0F18FABF6B3326CC7EA095232BA01ED18CCD22F05EB976FAE9F27BD57E4CBF86DF
3,136,421 UART: [art] SIG.R = D4C113AF4DBE0CB922CDF2B0A00D321C47575A9A20E5A59CA03617BAD471531578F54AAF565CCD5ED2A484AC28CAD7B2
3,143,205 UART: [art] SIG.S = 32B7A1A43F0DD0FD272AE59975FD45274C22194BEF6339FDE4F79714D9D69E5DF615FBA058892C4609203CB3FD1E0CD9
3,166,975 UART: Caliptra RT
3,167,320 UART: [state] CFI Enabled
3,275,543 UART: [rt] RT listening for mailbox commands...
3,276,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,587 UART: [rt]cmd =0x44504543, len=96
3,487,832 >>> mbox cmd response data (6236 bytes)
3,487,833 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,634 UART: [rt]cmd =0x53574545, len=84
3,543,318 >>> mbox cmd response data (200 bytes)
3,543,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,204 UART: [rt]cmd =0x44504543, len=96
3,604,644 >>> mbox cmd response data (56 bytes)
3,604,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,578 UART: [rt]cmd =0x44504543, len=96
3,674,633 >>> mbox cmd response data (24 bytes)
3,674,634 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,589 UART: [rt]cmd =0x53574545, len=84
3,729,737 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,045 ready_for_fw is high
1,057,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,241 >>> mbox cmd response: success
2,687,419 UART:
2,687,435 UART: Running Caliptra FMC ...
2,687,843 UART:
2,687,986 UART: [state] CFI Enabled
2,698,603 UART: [fht] FMC Alias Private Key: 7
2,806,120 UART: [art] Extend RT PCRs Done
2,806,548 UART: [art] Lock RT PCRs Done
2,808,038 UART: [art] Populate DV Done
2,816,233 UART: [fht] FMC Alias Private Key: 7
2,817,357 UART: [art] Derive CDI
2,817,637 UART: [art] Store in in slot 0x4
2,903,354 UART: [art] Derive Key Pair
2,903,714 UART: [art] Store priv key in slot 0x5
2,917,590 UART: [art] Derive Key Pair - Done
2,932,412 UART: [art] Signing Cert with AUTHO
2,932,892 UART: RITY.KEYID = 7
2,948,112 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,877 UART: [art] PUB.X = CC66BF0177F29AD23DA854D07CDCB80559CC603FA25D301947D266C9418B4B7272F46C43AF63A53A44D1320194FDDCD5
2,955,646 UART: [art] PUB.Y = 78D96296271EA1BD5F351BA5AC1E6D906C50E7FE2E321A117697F7B63B2395C001A4BC98474D55F76D5A6BF7B73FFACE
2,962,605 UART: [art] SIG.R = B816782330BE2B965BF4EE40F94661B99547A6B3975DECB3BD42C568787B31BFD68C75D279FE32CD79260FDF1C4DA8EB
2,969,384 UART: [art] SIG.S = 1D844BB3CFF4254E37D9E9CA168885E3FF9912784769D31AAFC1C85901BD33B83A1C62D67B642622D49A097319D6A2B4
2,993,019 UART: Caliptra RT
2,993,364 UART: [state] CFI Enabled
3,101,113 UART: [rt] RT listening for mailbox commands...
3,101,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,379 UART: [rt]cmd =0x44504543, len=96
3,313,601 >>> mbox cmd response data (6236 bytes)
3,313,602 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,253 UART: [rt]cmd =0x53574545, len=84
3,368,527 >>> mbox cmd response data (200 bytes)
3,368,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,251 UART: [rt]cmd =0x44504543, len=96
3,430,863 >>> mbox cmd response data (56 bytes)
3,430,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,933 UART: [rt]cmd =0x44504543, len=96
3,500,754 >>> mbox cmd response data (24 bytes)
3,500,755 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,532 UART: [rt]cmd =0x53574545, len=84
3,556,306 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,078 UART:
192,444 UART: Running Caliptra ROM ...
193,641 UART:
193,799 UART: [state] CFI Enabled
264,073 UART: [state] LifecycleState = Unprovisioned
266,063 UART: [state] DebugLocked = No
267,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,473 UART: [kat] SHA2-256
442,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,743 UART: [kat] ++
453,272 UART: [kat] sha1
463,233 UART: [kat] SHA2-256
465,955 UART: [kat] SHA2-384
473,005 UART: [kat] SHA2-512-ACC
475,389 UART: [kat] ECC-384
2,766,242 UART: [kat] HMAC-384Kdf
2,799,457 UART: [kat] LMS
3,989,754 UART: [kat] --
3,994,198 UART: [cold-reset] ++
3,995,848 UART: [fht] Storing FHT @ 0x50003400
4,006,050 UART: [idev] ++
4,006,620 UART: [idev] CDI.KEYID = 6
4,007,580 UART: [idev] SUBJECT.KEYID = 7
4,008,829 UART: [idev] UDS.KEYID = 0
4,009,786 ready_for_fw is high
4,009,978 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,546 UART: [idev] Erasing UDS.KEYID = 0
7,346,254 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,816 UART: [idev] --
7,374,157 UART: [ldev] ++
7,374,730 UART: [ldev] CDI.KEYID = 6
7,375,699 UART: [ldev] SUBJECT.KEYID = 5
7,376,936 UART: [ldev] AUTHORITY.KEYID = 7
7,378,170 UART: [ldev] FE.KEYID = 1
7,421,112 UART: [ldev] Erasing FE.KEYID = 1
10,754,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,121 UART: [ldev] --
13,137,895 UART: [fwproc] Waiting for Commands...
13,140,095 UART: [fwproc] Received command 0x46574c44
13,142,330 UART: [fwproc] Received Image of size 114124 bytes
17,199,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,417 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,661,129 >>> mbox cmd response: success
17,665,694 UART: [afmc] ++
17,666,295 UART: [afmc] CDI.KEYID = 6
17,667,208 UART: [afmc] SUBJECT.KEYID = 7
17,668,421 UART: [afmc] AUTHORITY.KEYID = 5
21,025,022 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,198 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,459 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,853 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,714 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,131 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,099 UART: [afmc] --
23,395,328 UART: [cold-reset] --
23,399,197 UART: [state] Locking Datavault
23,403,632 UART: [state] Locking PCR0, PCR1 and PCR31
23,405,381 UART: [state] Locking ICCM
23,406,941 UART: [exit] Launching FMC @ 0x40000130
23,415,356 UART:
23,415,596 UART: Running Caliptra FMC ...
23,416,699 UART:
23,416,863 UART: [state] CFI Enabled
23,484,727 UART: [fht] FMC Alias Private Key: 7
25,822,710 UART: [art] Extend RT PCRs Done
25,823,932 UART: [art] Lock RT PCRs Done
25,825,751 UART: [art] Populate DV Done
25,831,217 UART: [fht] FMC Alias Private Key: 7
25,832,978 UART: [art] Derive CDI
25,833,793 UART: [art] Store in in slot 0x4
25,893,873 UART: [art] Derive Key Pair
25,894,913 UART: [art] Store priv key in slot 0x5
29,187,503 UART: [art] Derive Key Pair - Done
29,200,224 UART: [art] Signing Cert with AUTHO
29,201,521 UART: RITY.KEYID = 7
31,489,845 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,353 UART: [art] PUB.X = C251E75B98A462773DA6CAF8AD7AC8FB27044BB5FE7953452702DD5484B59C51CB1177AB637EF8CC748FDF33818BE561
31,498,605 UART: [art] PUB.Y = C617D17EE9024388B7F8B97862070FCD5F351669F9FA76267B57CBCB5AA1137DA249F97F29A77AFFBEE900F693DD457A
31,505,851 UART: [art] SIG.R = 162EB5AC51F087EC3327578252B1EBD342818EB5F3E81DE5964905849E3C8AF903F21B84F7EB3F7FD849C43CCB277D3B
31,513,255 UART: [art] SIG.S = FC101ED2CD1533D1E268C93C69BFEC0E62C5C8389F18D87CFA00DEBE637B5B5A94B22592DBD4431903E970D11C94E349
32,817,967 UART: Caliptra RT
32,818,686 UART: [state] CFI Enabled
32,980,768 UART: [rt] RT listening for mailbox commands...
32,982,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,013,313 UART: [rt]cmd =0x44504543, len=96
38,777,606 >>> mbox cmd response data (6236 bytes)
38,806,801 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,837,490 UART: [rt]cmd =0x53574545, len=84
38,841,022 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,783,713 ready_for_fw is high
3,784,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,832,314 >>> mbox cmd response: success
23,531,096 UART:
23,531,480 UART: Running Caliptra FMC ...
23,532,683 UART:
23,532,857 UART: [state] CFI Enabled
23,599,413 UART: [fht] FMC Alias Private Key: 7
25,937,702 UART: [art] Extend RT PCRs Done
25,938,925 UART: [art] Lock RT PCRs Done
25,940,557 UART: [art] Populate DV Done
25,945,988 UART: [fht] FMC Alias Private Key: 7
25,947,464 UART: [art] Derive CDI
25,948,239 UART: [art] Store in in slot 0x4
26,008,096 UART: [art] Derive Key Pair
26,009,102 UART: [art] Store priv key in slot 0x5
29,301,876 UART: [art] Derive Key Pair - Done
29,314,855 UART: [art] Signing Cert with AUTHO
29,316,196 UART: RITY.KEYID = 7
31,603,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,605,318 UART: [art] PUB.X = D2639940A5B92CCEE1D6E992970C3B2130AB094852D953165DF3704AF34DE508C4A257E6CA27993ADECA533B1B325F94
31,612,567 UART: [art] PUB.Y = 922FDC06D86905942B265E5EBCEC20A1B01CB06460775A59C1586966B1A860E68476E9B65E3A5BAB010E461CEFCBD44B
31,619,811 UART: [art] SIG.R = A5B7AA3F49E5BDD0D501504B25075AEF4B9AC74282548B1E4646662596F2AFC7E67A56AA62807B3E4387D0097BD5E0E7
31,627,184 UART: [art] SIG.S = 762BD7AB2331461B6089EE2667225C225B9572719BF5F84E281B66C438D185FCFABE08151702CF73BB4B1A9127195400
32,933,170 UART: Caliptra RT
32,933,881 UART: [state] CFI Enabled
33,096,011 UART: [rt] RT listening for mailbox commands...
33,097,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,389 UART: [rt]cmd =0x44504543, len=96
38,892,602 >>> mbox cmd response data (6236 bytes)
38,922,091 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,952,555 UART: [rt]cmd =0x53574545, len=84
38,956,119 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,422 UART:
192,788 UART: Running Caliptra ROM ...
193,921 UART:
603,504 UART: [state] CFI Enabled
616,278 UART: [state] LifecycleState = Unprovisioned
618,260 UART: [state] DebugLocked = No
621,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,704 UART: [kat] SHA2-256
796,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,022 UART: [kat] ++
807,471 UART: [kat] sha1
816,845 UART: [kat] SHA2-256
819,561 UART: [kat] SHA2-384
825,762 UART: [kat] SHA2-512-ACC
828,126 UART: [kat] ECC-384
3,112,255 UART: [kat] HMAC-384Kdf
3,124,270 UART: [kat] LMS
4,314,371 UART: [kat] --
4,319,404 UART: [cold-reset] ++
4,321,126 UART: [fht] Storing FHT @ 0x50003400
4,332,388 UART: [idev] ++
4,332,958 UART: [idev] CDI.KEYID = 6
4,333,935 UART: [idev] SUBJECT.KEYID = 7
4,335,176 UART: [idev] UDS.KEYID = 0
4,336,214 ready_for_fw is high
4,336,406 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,733 UART: [idev] Erasing UDS.KEYID = 0
7,617,129 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,760 UART: [idev] --
7,640,724 UART: [ldev] ++
7,641,285 UART: [ldev] CDI.KEYID = 6
7,642,238 UART: [ldev] SUBJECT.KEYID = 5
7,643,443 UART: [ldev] AUTHORITY.KEYID = 7
7,644,723 UART: [ldev] FE.KEYID = 1
7,654,335 UART: [ldev] Erasing FE.KEYID = 1
10,941,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,193 UART: [ldev] --
13,302,345 UART: [fwproc] Waiting for Commands...
13,304,430 UART: [fwproc] Received command 0x46574c44
13,306,611 UART: [fwproc] Received Image of size 114124 bytes
17,360,814 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,474 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,821,726 >>> mbox cmd response: success
17,826,742 UART: [afmc] ++
17,827,342 UART: [afmc] CDI.KEYID = 6
17,828,254 UART: [afmc] SUBJECT.KEYID = 7
17,829,519 UART: [afmc] AUTHORITY.KEYID = 5
21,143,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,906 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,293 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,108 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,395 UART: [afmc] --
23,511,867 UART: [cold-reset] --
23,516,451 UART: [state] Locking Datavault
23,523,646 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,402 UART: [state] Locking ICCM
23,527,240 UART: [exit] Launching FMC @ 0x40000130
23,535,585 UART:
23,535,818 UART: Running Caliptra FMC ...
23,536,918 UART:
23,537,075 UART: [state] CFI Enabled
23,544,805 UART: [fht] FMC Alias Private Key: 7
25,876,373 UART: [art] Extend RT PCRs Done
25,877,594 UART: [art] Lock RT PCRs Done
25,879,537 UART: [art] Populate DV Done
25,885,004 UART: [fht] FMC Alias Private Key: 7
25,886,512 UART: [art] Derive CDI
25,887,252 UART: [art] Store in in slot 0x4
25,929,355 UART: [art] Derive Key Pair
25,930,347 UART: [art] Store priv key in slot 0x5
29,172,077 UART: [art] Derive Key Pair - Done
29,184,609 UART: [art] Signing Cert with AUTHO
29,185,938 UART: RITY.KEYID = 7
31,465,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,595 UART: [art] PUB.X = D08C89320D83F7923E0EE2D1A469112FF5ED7A231169A593448AEFA15E59BA28D34C027E91BC767781F930F7D935A002
31,473,834 UART: [art] PUB.Y = 5C1B4095FB351236EF192CD46CCF87802FE3C18F821FD4469F4DF5DC34229BEFC7AB6DEBEA24901654F3273A00B7EE4F
31,481,100 UART: [art] SIG.R = 6E80292F8D4B20BB2EB0A07EA266A4754F547A47C477D1129722B35596BE160515D4CFB799189A9307EF1D8453F36483
31,488,513 UART: [art] SIG.S = DE8B0FD1C1C313F8B3AF3081906D69E557A55314767AFDD9C31EC65143B669498F56A685961531927A96829A8995905C
32,793,951 UART: Caliptra RT
32,794,691 UART: [state] CFI Enabled
32,912,043 UART: [rt] RT listening for mailbox commands...
32,913,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,944,370 UART: [rt]cmd =0x44504543, len=96
38,616,508 >>> mbox cmd response data (6236 bytes)
38,645,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,676,363 UART: [rt]cmd =0x53574545, len=84
38,679,913 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
4,133,483 ready_for_fw is high
4,133,851 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,496 >>> mbox cmd response: success
23,717,851 UART:
23,718,254 UART: Running Caliptra FMC ...
23,719,361 UART:
23,719,508 UART: [state] CFI Enabled
23,727,534 UART: [fht] FMC Alias Private Key: 7
26,058,853 UART: [art] Extend RT PCRs Done
26,060,074 UART: [art] Lock RT PCRs Done
26,061,574 UART: [art] Populate DV Done
26,067,044 UART: [fht] FMC Alias Private Key: 7
26,068,592 UART: [art] Derive CDI
26,069,323 UART: [art] Store in in slot 0x4
26,111,911 UART: [art] Derive Key Pair
26,112,899 UART: [art] Store priv key in slot 0x5
29,354,458 UART: [art] Derive Key Pair - Done
29,367,834 UART: [art] Signing Cert with AUTHO
29,369,142 UART: RITY.KEYID = 7
31,648,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,030 UART: [art] PUB.X = 65F44001F2F71530A4B0C525DB350FDEF4970A0963F32C4BA28509290A596C83C5D65CA1A7D3D0EF757F4A1ECE0733AE
31,657,329 UART: [art] PUB.Y = D2D38AD87327D317BB64D047F8F75612666AA9E33839DB793EFE0712A7CE555E8B66EC5FF7504BC302482B23441DEE06
31,664,559 UART: [art] SIG.R = 4E8FF21FC8A844F2990511659F4D8C85D4DF378929BE2E2BCACB01BD0CDFB8CB370CC1830E1185AE8A229D88811AD510
31,671,968 UART: [art] SIG.S = 557E4068E0A009537814DDCBB6A5E900931B9D219548BD4E24EA9C956D72FEB617DF4F67BF8BC35CD02239ED0035C222
32,976,242 UART: Caliptra RT
32,976,961 UART: [state] CFI Enabled
33,095,964 UART: [rt] RT listening for mailbox commands...
33,097,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,129,230 UART: [rt]cmd =0x44504543, len=96
38,801,100 >>> mbox cmd response data (6236 bytes)
38,830,442 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,861,017 UART: [rt]cmd =0x53574545, len=84
38,864,770 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,993 UART:
192,367 UART: Running Caliptra ROM ...
193,462 UART:
193,605 UART: [state] CFI Enabled
263,218 UART: [state] LifecycleState = Unprovisioned
265,119 UART: [state] DebugLocked = No
266,927 UART: [state] WD Timer not started. Device not locked for debugging
270,846 UART: [kat] SHA2-256
449,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,559 UART: [kat] ++
462,088 UART: [kat] sha1
471,840 UART: [kat] SHA2-256
474,838 UART: [kat] SHA2-384
480,605 UART: [kat] SHA2-512-ACC
483,605 UART: [kat] ECC-384
2,926,279 UART: [kat] HMAC-384Kdf
2,951,225 UART: [kat] LMS
3,480,641 UART: [kat] --
3,486,126 UART: [cold-reset] ++
3,488,549 UART: [fht] FHT @ 0x50003400
3,500,376 UART: [idev] ++
3,500,934 UART: [idev] CDI.KEYID = 6
3,501,883 UART: [idev] SUBJECT.KEYID = 7
3,503,072 UART: [idev] UDS.KEYID = 0
3,504,017 ready_for_fw is high
3,504,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,648,160 UART: [idev] Erasing UDS.KEYID = 0
6,029,036 UART: [idev] Sha1 KeyId Algorithm
6,053,430 UART: [idev] --
6,058,992 UART: [ldev] ++
6,059,564 UART: [ldev] CDI.KEYID = 6
6,060,480 UART: [ldev] SUBJECT.KEYID = 5
6,061,695 UART: [ldev] AUTHORITY.KEYID = 7
6,062,926 UART: [ldev] FE.KEYID = 1
6,101,186 UART: [ldev] Erasing FE.KEYID = 1
8,605,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,123 UART: [ldev] --
10,413,017 UART: [fwproc] Wait for Commands...
10,415,387 UART: [fwproc] Recv command 0x46574c44
10,417,481 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,220 >>> mbox cmd response: success
14,289,756 UART: [afmc] ++
14,290,347 UART: [afmc] CDI.KEYID = 6
14,291,253 UART: [afmc] SUBJECT.KEYID = 7
14,292,412 UART: [afmc] AUTHORITY.KEYID = 5
16,829,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,146 UART: [afmc] --
18,632,171 UART: [cold-reset] --
18,636,566 UART: [state] Locking Datavault
18,642,183 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,821 UART: [state] Locking ICCM
18,646,133 UART: [exit] Launching FMC @ 0x40000130
18,654,564 UART:
18,654,828 UART: Running Caliptra FMC ...
18,655,858 UART:
18,656,005 UART: [state] CFI Enabled
18,712,095 UART: [fht] FMC Alias Private Key: 7
20,475,768 UART: [art] Extend RT PCRs Done
20,476,988 UART: [art] Lock RT PCRs Done
20,478,548 UART: [art] Populate DV Done
20,483,794 UART: [fht] FMC Alias Private Key: 7
20,485,438 UART: [art] Derive CDI
20,486,176 UART: [art] Store in in slot 0x4
20,544,629 UART: [art] Derive Key Pair
20,545,664 UART: [art] Store priv key in slot 0x5
23,008,441 UART: [art] Derive Key Pair - Done
23,021,061 UART: [art] Signing Cert with AUTHO
23,022,361 UART: RITY.KEYID = 7
24,733,550 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,049 UART: [art] PUB.X = AE1C18AC4A35AADE55FEB9A94AC35FA334C7EC27DC919A7F66D9772A53F27F7C9B863593B5F921280722123F85730DEB
24,742,345 UART: [art] PUB.Y = 1B5AE7AF38EF55045CA536C466E86A7D4AA5C8DDD809AFDA6466177F68DD97CDAD16716BA8CC0DC8E186F38091E7A5C9
24,749,629 UART: [art] SIG.R = 41ED0AD5D6731132BDA3402535017216636D6F15D119E49C92939AA267B74BB0DD47F7FF34D462FF7CB504E981D83C7B
24,757,016 UART: [art] SIG.S = 0250BF000691566BE3E3FF3EBCB85DF24333758887FC3DC79D5B7C876BBCB27578DF12E628CFC007EBD1FA05C4355A2A
25,735,362 UART: Caliptra RT
25,736,064 UART: [state] CFI Enabled
25,900,680 UART: [rt] RT listening for mailbox commands...
25,902,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,807 UART: [rt]cmd =0x44504543, len=96
30,291,621 >>> mbox cmd response data (6236 bytes)
30,320,928 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,351,348 UART: [rt]cmd =0x53574545, len=84
30,354,565 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,360,588 ready_for_fw is high
3,360,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,753 >>> mbox cmd response: success
18,324,450 UART:
18,324,840 UART: Running Caliptra FMC ...
18,325,996 UART:
18,326,159 UART: [state] CFI Enabled
18,391,736 UART: [fht] FMC Alias Private Key: 7
20,155,592 UART: [art] Extend RT PCRs Done
20,156,798 UART: [art] Lock RT PCRs Done
20,158,531 UART: [art] Populate DV Done
20,164,104 UART: [fht] FMC Alias Private Key: 7
20,165,645 UART: [art] Derive CDI
20,166,459 UART: [art] Store in in slot 0x4
20,224,711 UART: [art] Derive Key Pair
20,225,780 UART: [art] Store priv key in slot 0x5
22,688,311 UART: [art] Derive Key Pair - Done
22,701,360 UART: [art] Signing Cert with AUTHO
22,702,663 UART: RITY.KEYID = 7
24,413,867 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,363 UART: [art] PUB.X = 6629B9546A2553267928D9D1753507E256B143DDB306AB4D2771236821ABB0EADDA6E1BD5C7F1B58EBE8256038DAE984
24,422,614 UART: [art] PUB.Y = 7A218F733A5D08C7221EE2A019862A20929B7D8786B349CFC02B173E61279BA256D6F7E33E48884EADA3D88B4306A8DC
24,429,872 UART: [art] SIG.R = 15F5C5146E50B48254FB4D249BBDAC63D3EDA6EAA9ED213817C5FD3439DD352733B16F2800CF129F8FDDCD6A140101B6
24,437,289 UART: [art] SIG.S = 97FD4F8C294132692906EBCF90D2DD9BDD79A5F4C0E13545A3B764D048D78DBE6332E3E0C58C3366B7A64B979015162E
25,415,592 UART: Caliptra RT
25,416,291 UART: [state] CFI Enabled
25,580,981 UART: [rt] RT listening for mailbox commands...
25,582,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,614,149 UART: [rt]cmd =0x44504543, len=96
29,971,686 >>> mbox cmd response data (6236 bytes)
30,000,884 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,031,515 UART: [rt]cmd =0x53574545, len=84
30,035,241 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,702 UART:
193,075 UART: Running Caliptra ROM ...
194,309 UART:
603,711 UART: [state] CFI Enabled
616,091 UART: [state] LifecycleState = Unprovisioned
617,906 UART: [state] DebugLocked = No
620,632 UART: [state] WD Timer not started. Device not locked for debugging
625,162 UART: [kat] SHA2-256
804,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,860 UART: [kat] ++
816,388 UART: [kat] sha1
828,128 UART: [kat] SHA2-256
831,182 UART: [kat] SHA2-384
837,604 UART: [kat] SHA2-512-ACC
840,606 UART: [kat] ECC-384
3,281,364 UART: [kat] HMAC-384Kdf
3,294,105 UART: [kat] LMS
3,823,545 UART: [kat] --
3,829,742 UART: [cold-reset] ++
3,830,744 UART: [fht] FHT @ 0x50003400
3,842,561 UART: [idev] ++
3,843,124 UART: [idev] CDI.KEYID = 6
3,844,001 UART: [idev] SUBJECT.KEYID = 7
3,845,235 UART: [idev] UDS.KEYID = 0
3,846,183 ready_for_fw is high
3,846,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,555 UART: [idev] Erasing UDS.KEYID = 0
6,316,350 UART: [idev] Sha1 KeyId Algorithm
6,340,010 UART: [idev] --
6,344,322 UART: [ldev] ++
6,344,923 UART: [ldev] CDI.KEYID = 6
6,345,835 UART: [ldev] SUBJECT.KEYID = 5
6,346,989 UART: [ldev] AUTHORITY.KEYID = 7
6,348,210 UART: [ldev] FE.KEYID = 1
6,358,523 UART: [ldev] Erasing FE.KEYID = 1
8,833,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,254 UART: [ldev] --
10,623,493 UART: [fwproc] Wait for Commands...
10,625,963 UART: [fwproc] Recv command 0x46574c44
10,628,043 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,383 >>> mbox cmd response: success
14,505,295 UART: [afmc] ++
14,505,914 UART: [afmc] CDI.KEYID = 6
14,506,794 UART: [afmc] SUBJECT.KEYID = 7
14,507,893 UART: [afmc] AUTHORITY.KEYID = 5
17,006,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,922 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,701 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,408 UART: [afmc] --
18,803,967 UART: [cold-reset] --
18,809,113 UART: [state] Locking Datavault
18,814,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,215 UART: [state] Locking ICCM
18,817,601 UART: [exit] Launching FMC @ 0x40000130
18,826,002 UART:
18,826,280 UART: Running Caliptra FMC ...
18,827,306 UART:
18,827,444 UART: [state] CFI Enabled
18,835,214 UART: [fht] FMC Alias Private Key: 7
20,592,088 UART: [art] Extend RT PCRs Done
20,593,315 UART: [art] Lock RT PCRs Done
20,594,852 UART: [art] Populate DV Done
20,600,445 UART: [fht] FMC Alias Private Key: 7
20,602,087 UART: [art] Derive CDI
20,602,818 UART: [art] Store in in slot 0x4
20,645,619 UART: [art] Derive Key Pair
20,646,615 UART: [art] Store priv key in slot 0x5
23,073,878 UART: [art] Derive Key Pair - Done
23,086,926 UART: [art] Signing Cert with AUTHO
23,088,224 UART: RITY.KEYID = 7
24,793,570 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,086 UART: [art] PUB.X = 93FD47E046140DF97AB4A05C9163884EEEF3FC7BB260E1E9307EF6F5039A3534BFF49B4C3537A421B9B3E5CEAF8F2651
24,802,369 UART: [art] PUB.Y = 611A6A6581D139336F07176FFD54CFE10089C6D8E2A568972FF02A09C717C50B0DEF33F1A85FFF17D52CB803369F0BC2
24,809,632 UART: [art] SIG.R = D4D01F577AE4BF0660347EB54D2FCF44D7B4F986C643220A1BB7CB24B279529CBB30FB2EFD16E29D2646BB7E47DB8DB6
24,817,061 UART: [art] SIG.S = 9CC568EB6AF1C2912CF6E5E8CF5ED3BBB2716E3B3381D471DA8472C47B64B04F0102AE95C8DEA6FF3660F776F5D3B0EC
25,796,726 UART: Caliptra RT
25,797,423 UART: [state] CFI Enabled
25,914,846 UART: [rt] RT listening for mailbox commands...
25,916,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,947,537 UART: [rt]cmd =0x44504543, len=96
30,230,277 >>> mbox cmd response data (6236 bytes)
30,259,685 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,290,353 UART: [rt]cmd =0x53574545, len=84
30,293,721 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,700,170 ready_for_fw is high
3,700,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,845 >>> mbox cmd response: success
18,525,205 UART:
18,525,675 UART: Running Caliptra FMC ...
18,526,790 UART:
18,526,947 UART: [state] CFI Enabled
18,534,883 UART: [fht] FMC Alias Private Key: 7
20,291,974 UART: [art] Extend RT PCRs Done
20,293,206 UART: [art] Lock RT PCRs Done
20,294,994 UART: [art] Populate DV Done
20,300,418 UART: [fht] FMC Alias Private Key: 7
20,301,906 UART: [art] Derive CDI
20,302,639 UART: [art] Store in in slot 0x4
20,345,273 UART: [art] Derive Key Pair
20,346,264 UART: [art] Store priv key in slot 0x5
22,772,734 UART: [art] Derive Key Pair - Done
22,785,353 UART: [art] Signing Cert with AUTHO
22,786,655 UART: RITY.KEYID = 7
24,491,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,251 UART: [art] PUB.X = C0D4828898CF45337045269A5E78BCFE3A07B1DA6606740F7179A0098740AB854527494721103FCF5BCFBA0745EEFEC9
24,500,484 UART: [art] PUB.Y = 0DB2943B6A72FD99801983C66F716558D12548205E24978C76798AD4E41614BF7EA855D1D88CFB7C0DD4149C03EA0179
24,507,774 UART: [art] SIG.R = 2059B4F3DF60F3287A55E7839C9AC42A361CCD49BE793227D35012537F30B796D5D1CA36769B9C6D38D3C09DF8281F0A
24,515,152 UART: [art] SIG.S = 49B3D53D6C128E133A2752DF8A3632714C0582D9A057B1B048B23EDC0D340800AE7B785F4B1D0964FFF12A158BEF748C
25,494,052 UART: Caliptra RT
25,494,755 UART: [state] CFI Enabled
25,611,916 UART: [rt] RT listening for mailbox commands...
25,613,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,644,662 UART: [rt]cmd =0x44504543, len=96
29,927,817 >>> mbox cmd response data (6236 bytes)
29,957,124 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,987,581 UART: [rt]cmd =0x53574545, len=84
29,990,952 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,175 UART:
192,532 UART: Running Caliptra ROM ...
193,724 UART:
193,883 UART: [state] CFI Enabled
262,645 UART: [state] LifecycleState = Unprovisioned
264,980 UART: [state] DebugLocked = No
267,504 UART: [state] WD Timer not started. Device not locked for debugging
272,461 UART: [kat] SHA2-256
462,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,110 UART: [kat] ++
473,609 UART: [kat] sha1
485,927 UART: [kat] SHA2-256
488,942 UART: [kat] SHA2-384
495,286 UART: [kat] SHA2-512-ACC
497,865 UART: [kat] ECC-384
2,945,397 UART: [kat] HMAC-384Kdf
2,969,706 UART: [kat] LMS
3,501,521 UART: [kat] --
3,506,932 UART: [cold-reset] ++
3,508,857 UART: [fht] FHT @ 0x50003400
3,519,972 UART: [idev] ++
3,520,609 UART: [idev] CDI.KEYID = 6
3,521,563 UART: [idev] SUBJECT.KEYID = 7
3,522,805 UART: [idev] UDS.KEYID = 0
3,523,707 ready_for_fw is high
3,523,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,841 UART: [idev] Erasing UDS.KEYID = 0
6,026,625 UART: [idev] Sha1 KeyId Algorithm
6,049,373 UART: [idev] --
6,054,136 UART: [ldev] ++
6,054,829 UART: [ldev] CDI.KEYID = 6
6,055,751 UART: [ldev] SUBJECT.KEYID = 5
6,056,912 UART: [ldev] AUTHORITY.KEYID = 7
6,058,087 UART: [ldev] FE.KEYID = 1
6,099,216 UART: [ldev] Erasing FE.KEYID = 1
8,604,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,632 UART: [ldev] --
10,412,898 UART: [fwproc] Wait for Commands...
10,415,910 UART: [fwproc] Recv command 0x46574c44
10,418,177 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,608,642 >>> mbox cmd response: success
14,612,575 UART: [afmc] ++
14,613,342 UART: [afmc] CDI.KEYID = 6
14,614,530 UART: [afmc] SUBJECT.KEYID = 7
14,615,962 UART: [afmc] AUTHORITY.KEYID = 5
17,149,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,207 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,587 UART: [afmc] --
18,948,557 UART: [cold-reset] --
18,952,537 UART: [state] Locking Datavault
18,957,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,612 UART: [state] Locking ICCM
18,962,230 UART: [exit] Launching FMC @ 0x40000130
18,970,895 UART:
18,971,129 UART: Running Caliptra FMC ...
18,972,166 UART:
18,972,314 UART: [state] CFI Enabled
19,029,705 UART: [fht] FMC Alias Private Key: 7
20,793,493 UART: [art] Extend RT PCRs Done
20,794,718 UART: [art] Lock RT PCRs Done
20,796,157 UART: [art] Populate DV Done
20,801,408 UART: [fht] FMC Alias Private Key: 7
20,803,167 UART: [art] Derive CDI
20,803,983 UART: [art] Store in in slot 0x4
20,861,653 UART: [art] Derive Key Pair
20,862,697 UART: [art] Store priv key in slot 0x5
23,325,517 UART: [art] Derive Key Pair - Done
23,338,340 UART: [art] Signing Cert with AUTHO
23,339,834 UART: RITY.KEYID = 7
25,050,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,079 UART: [art] PUB.X = 06B904281BC74FF40AA58E9CF1D0237A6779D9DEB944A16A639E11ED8F1E4988FBE0674AFC88346C1388F73F7AAE16A5
25,059,389 UART: [art] PUB.Y = A355939D35FA74FB683DC14A6D53DAE94860DBF56FA327FCD2CC16054489475BEB64363E9910C31C92CBA157114BBF6C
25,066,673 UART: [art] SIG.R = ED847085FE223FD16619B318789093E69416EBA1E2801EE783F7193781DFF05291AD4BA59E9E3303C76E653991A08237
25,074,010 UART: [art] SIG.S = 6383D239E4280617E04FFA577F10331F278CFD09D4D9D86585CCC378251F723FA9A964C58BCFFB1745B3CA6C32F76CA2
26,052,837 UART: Caliptra RT
26,053,524 UART: [state] CFI Enabled
26,217,338 UART: [rt] RT listening for mailbox commands...
26,219,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,250,561 UART: [rt]cmd =0x44504543, len=96
30,609,160 >>> mbox cmd response data (6236 bytes)
30,638,472 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,668,978 UART: [rt]cmd =0x53574545, len=84
30,672,799 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,438,159 ready_for_fw is high
3,438,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,769 >>> mbox cmd response: success
19,048,624 UART:
19,049,016 UART: Running Caliptra FMC ...
19,050,154 UART:
19,050,314 UART: [state] CFI Enabled
19,117,185 UART: [fht] FMC Alias Private Key: 7
20,881,593 UART: [art] Extend RT PCRs Done
20,882,812 UART: [art] Lock RT PCRs Done
20,884,571 UART: [art] Populate DV Done
20,889,764 UART: [fht] FMC Alias Private Key: 7
20,891,419 UART: [art] Derive CDI
20,892,165 UART: [art] Store in in slot 0x4
20,950,028 UART: [art] Derive Key Pair
20,951,069 UART: [art] Store priv key in slot 0x5
23,414,239 UART: [art] Derive Key Pair - Done
23,427,132 UART: [art] Signing Cert with AUTHO
23,428,468 UART: RITY.KEYID = 7
25,139,624 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,134 UART: [art] PUB.X = 75EA14976C11BFC117E8F5228C416581BC7439E46B65FA887303FD1FD4951EC9FEBCCA4217647C4DBA3296CDFC6569D1
25,148,456 UART: [art] PUB.Y = 985D73D263E14F842600A3ADD73B6C4B43701798EB94D6C51F52F79747F44AA550BE83DEA08EFFB620020360B3572AF5
25,155,651 UART: [art] SIG.R = 731CD14778A4844661AF9EF659B39C7AEDA8E5CCC04DEFAF27475F6C6CC80FC1C28EA1400BE0E32E4C77C3075C838B25
25,163,097 UART: [art] SIG.S = 97DEA839C4CA8271329460CCD202DAB0E332436D6EF6A44E38AC7A35DD4222BAA6880D8570018B7FB816E8E0414A135D
26,141,892 UART: Caliptra RT
26,142,584 UART: [state] CFI Enabled
26,306,137 UART: [rt] RT listening for mailbox commands...
26,308,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,318 UART: [rt]cmd =0x44504543, len=96
30,696,806 >>> mbox cmd response data (6236 bytes)
30,726,226 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,756,998 UART: [rt]cmd =0x53574545, len=84
30,760,718 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,473 UART:
192,845 UART: Running Caliptra ROM ...
193,940 UART:
603,809 UART: [state] CFI Enabled
615,975 UART: [state] LifecycleState = Unprovisioned
618,340 UART: [state] DebugLocked = No
620,559 UART: [state] WD Timer not started. Device not locked for debugging
625,717 UART: [kat] SHA2-256
815,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,381 UART: [kat] ++
826,908 UART: [kat] sha1
837,792 UART: [kat] SHA2-256
840,800 UART: [kat] SHA2-384
846,006 UART: [kat] SHA2-512-ACC
848,656 UART: [kat] ECC-384
3,293,326 UART: [kat] HMAC-384Kdf
3,305,497 UART: [kat] LMS
3,837,309 UART: [kat] --
3,841,664 UART: [cold-reset] ++
3,843,947 UART: [fht] FHT @ 0x50003400
3,855,909 UART: [idev] ++
3,856,614 UART: [idev] CDI.KEYID = 6
3,857,639 UART: [idev] SUBJECT.KEYID = 7
3,858,802 UART: [idev] UDS.KEYID = 0
3,859,722 ready_for_fw is high
3,859,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,611 UART: [idev] Erasing UDS.KEYID = 0
6,342,689 UART: [idev] Sha1 KeyId Algorithm
6,365,718 UART: [idev] --
6,370,407 UART: [ldev] ++
6,371,074 UART: [ldev] CDI.KEYID = 6
6,371,981 UART: [ldev] SUBJECT.KEYID = 5
6,373,179 UART: [ldev] AUTHORITY.KEYID = 7
6,374,346 UART: [ldev] FE.KEYID = 1
6,386,764 UART: [ldev] Erasing FE.KEYID = 1
8,864,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,428 UART: [ldev] --
10,656,708 UART: [fwproc] Wait for Commands...
10,658,310 UART: [fwproc] Recv command 0x46574c44
10,660,628 UART: [fwproc] Recv'd Img size: 114448 bytes
14,114,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,853,825 >>> mbox cmd response: success
14,857,986 UART: [afmc] ++
14,858,689 UART: [afmc] CDI.KEYID = 6
14,859,934 UART: [afmc] SUBJECT.KEYID = 7
14,861,321 UART: [afmc] AUTHORITY.KEYID = 5
17,363,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,156,600 UART: [afmc] --
19,159,400 UART: [cold-reset] --
19,163,105 UART: [state] Locking Datavault
19,169,542 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,692 UART: [state] Locking ICCM
19,174,381 UART: [exit] Launching FMC @ 0x40000130
19,183,054 UART:
19,183,294 UART: Running Caliptra FMC ...
19,184,389 UART:
19,184,541 UART: [state] CFI Enabled
19,192,723 UART: [fht] FMC Alias Private Key: 7
20,949,074 UART: [art] Extend RT PCRs Done
20,950,299 UART: [art] Lock RT PCRs Done
20,951,996 UART: [art] Populate DV Done
20,957,230 UART: [fht] FMC Alias Private Key: 7
20,958,919 UART: [art] Derive CDI
20,959,647 UART: [art] Store in in slot 0x4
21,001,714 UART: [art] Derive Key Pair
21,002,714 UART: [art] Store priv key in slot 0x5
23,429,113 UART: [art] Derive Key Pair - Done
23,442,102 UART: [art] Signing Cert with AUTHO
23,443,401 UART: RITY.KEYID = 7
25,148,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,225 UART: [art] PUB.X = 02F735446545F12AF1AE58F85FE1EB8E9598537C51C4ADC99D25966DAFD33448B5603ED70C5C742038E917CAA47180D5
25,157,514 UART: [art] PUB.Y = E86433C53175B79760D89458BAAE10D570760238F9E4EBB90AA4C66E953008A74F14141EFFC8E7E4B69CCC838FF5A443
25,164,718 UART: [art] SIG.R = DB121DC9A4E3963258A62D47A40AA83276C08A752FD792C61A032F27389FA29C6B83D67F48BAFE2FB9058210B1BA13A6
25,172,091 UART: [art] SIG.S = 31DD2EEFA6F91C937B6ADAF30D7B51B450E18B749CF5AD8DE66B1AA51C4B43A712A52B0BC1A7EE980AA7D4CE716303E1
26,151,005 UART: Caliptra RT
26,151,715 UART: [state] CFI Enabled
26,268,724 UART: [rt] RT listening for mailbox commands...
26,270,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,301,285 UART: [rt]cmd =0x44504543, len=96
30,583,566 >>> mbox cmd response data (6236 bytes)
30,612,861 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,643,149 UART: [rt]cmd =0x53574545, len=84
30,646,945 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,758,920 ready_for_fw is high
3,759,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,970,098 >>> mbox cmd response: success
19,219,409 UART:
19,219,806 UART: Running Caliptra FMC ...
19,220,928 UART:
19,221,079 UART: [state] CFI Enabled
19,228,815 UART: [fht] FMC Alias Private Key: 7
20,985,663 UART: [art] Extend RT PCRs Done
20,986,890 UART: [art] Lock RT PCRs Done
20,988,481 UART: [art] Populate DV Done
20,993,890 UART: [fht] FMC Alias Private Key: 7
20,995,593 UART: [art] Derive CDI
20,996,404 UART: [art] Store in in slot 0x4
21,038,839 UART: [art] Derive Key Pair
21,039,875 UART: [art] Store priv key in slot 0x5
23,466,283 UART: [art] Derive Key Pair - Done
23,479,338 UART: [art] Signing Cert with AUTHO
23,480,645 UART: RITY.KEYID = 7
25,185,874 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,380 UART: [art] PUB.X = 925BD157B0E3C60414F8A53EA746C5A8B23C2E98419418ED2BF8A44DA66B2AAD8D98CD675A138E822193C59B287A644D
25,194,613 UART: [art] PUB.Y = 7054D9C5C166E6DB5BF8D682A8557CFA5F4CE7C46C37039403E541CA45935A40FF136DB708F1FBE73C03CC37783500F8
25,201,881 UART: [art] SIG.R = 634AEC9D4081D30AA8D4F7BE18E7DE42E6CCB511496E1015DA6107D10E36E18B6BDA67151DD3F2971F0B74E6F65956D3
25,209,265 UART: [art] SIG.S = 828EB9D0C1CACE2DB1F6668161410B12F7C89D6BCDEACE8E9AA56BB58D5E31A6F12C41F6EBFF23D93DA8BAFAFC59929B
26,188,397 UART: Caliptra RT
26,189,101 UART: [state] CFI Enabled
26,306,665 UART: [rt] RT listening for mailbox commands...
26,308,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,970 UART: [rt]cmd =0x44504543, len=96
30,622,772 >>> mbox cmd response data (6236 bytes)
30,652,402 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,683,032 UART: [rt]cmd =0x53574545, len=84
30,686,700 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
85,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,649 UART: [kat] SHA2-256
881,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,695 UART: [kat] ++
885,847 UART: [kat] sha1
890,047 UART: [kat] SHA2-256
891,985 UART: [kat] SHA2-384
894,792 UART: [kat] SHA2-512-ACC
896,693 UART: [kat] ECC-384
902,616 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,185 UART: [cold-reset] ++
1,476,675 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 ready_for_fw is high
1,480,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,146 UART: [idev] Erasing UDS.KEYID = 0
1,505,036 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,155 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,604 UART: [ldev] --
1,586,049 UART: [fwproc] Waiting for Commands...
1,586,684 UART: [fwproc] Received command 0x46574c44
1,587,475 UART: [fwproc] Received Image of size 114448 bytes
2,887,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,625 >>> mbox cmd response: success
3,080,635 UART: [afmc] ++
3,080,803 UART: [afmc] CDI.KEYID = 6
3,081,165 UART: [afmc] SUBJECT.KEYID = 7
3,081,590 UART: [afmc] AUTHORITY.KEYID = 5
3,116,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,868 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,558 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,439 UART: [afmc] --
3,159,471 UART: [cold-reset] --
3,160,553 UART: [state] Locking Datavault
3,161,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,434 UART: [state] Locking ICCM
3,162,982 UART: [exit] Launching FMC @ 0x40000130
3,168,311 UART:
3,168,327 UART: Running Caliptra FMC ...
3,168,735 UART:
3,168,789 UART: [state] CFI Enabled
3,179,320 UART: [fht] FMC Alias Private Key: 7
3,286,797 UART: [art] Extend RT PCRs Done
3,287,225 UART: [art] Lock RT PCRs Done
3,288,717 UART: [art] Populate DV Done
3,296,812 UART: [fht] FMC Alias Private Key: 7
3,297,788 UART: [art] Derive CDI
3,298,068 UART: [art] Store in in slot 0x4
3,383,667 UART: [art] Derive Key Pair
3,384,027 UART: [art] Store priv key in slot 0x5
3,397,899 UART: [art] Derive Key Pair - Done
3,412,860 UART: [art] Signing Cert with AUTHO
3,413,340 UART: RITY.KEYID = 7
3,428,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,355 UART: [art] PUB.X = 59BC527A1C78CFFFBF9D1B4EC98DD14FB4F95DDAAFE09F87AE56139D20E10259E54397A2CA539FE4455EBDE50CB26377
3,436,141 UART: [art] PUB.Y = 7DC0DF0A41EC66935E2583352E2EB3732913B414B05C1E401727D64BB98881182732110D44BEC992AFFFF4DF51EAD0BF
3,443,091 UART: [art] SIG.R = A9DC578EFD6101829188F0779E0576320695E753B4B9F302545B7FBA4B2328DC289D9624ADD359A62501413882197448
3,449,832 UART: [art] SIG.S = E4F1A28CB671006B6310CC6A373B85D6D8765507A13FC4A5D0D97A2CE3FEAEC22792C3EE709289B0A430E16876303046
3,473,476 UART: Caliptra RT
3,473,729 UART: [state] CFI Enabled
3,582,221 UART: [rt] RT listening for mailbox commands...
3,582,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,983 UART: [rt]cmd =0x44504543, len=96
3,793,109 >>> mbox cmd response data (6236 bytes)
3,793,110 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,235 UART: [rt]cmd =0x53574545, len=84
3,826,963 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,407 ready_for_fw is high
1,362,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,789 >>> mbox cmd response: success
2,989,565 UART:
2,989,581 UART: Running Caliptra FMC ...
2,989,989 UART:
2,990,043 UART: [state] CFI Enabled
3,000,502 UART: [fht] FMC Alias Private Key: 7
3,107,681 UART: [art] Extend RT PCRs Done
3,108,109 UART: [art] Lock RT PCRs Done
3,109,627 UART: [art] Populate DV Done
3,117,764 UART: [fht] FMC Alias Private Key: 7
3,118,818 UART: [art] Derive CDI
3,119,098 UART: [art] Store in in slot 0x4
3,205,149 UART: [art] Derive Key Pair
3,205,509 UART: [art] Store priv key in slot 0x5
3,218,799 UART: [art] Derive Key Pair - Done
3,233,682 UART: [art] Signing Cert with AUTHO
3,234,162 UART: RITY.KEYID = 7
3,249,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,615 UART: [art] PUB.X = 4DD9C35BF76BB52512EF0ABE85CA40F5B3B3CCB1B3EF6642B9AA3F8D67C9B7256824FB2251F809A7DA9CCFC9CC601455
3,257,401 UART: [art] PUB.Y = 304224924EFD8F349D09D40F9F24ADCC0CFEEFC179C6075CFA3B62EF0CD1A7BE3FE49DB89A6B9E85C59005363437FEBF
3,264,355 UART: [art] SIG.R = 573ADCEC2809C7DB30C805B4A5BF88EC7EE370930C85E322E465CFCDCBE4A828D61EE05D393B399D52493EF3B2D0B08A
3,271,134 UART: [art] SIG.S = 1423421F686C0ED5D8617D69BE968C190A026E5FC2B77EC51261F8A08224CC745DC7A8E91E4FB76FF771B69129D5F44C
3,294,896 UART: Caliptra RT
3,295,149 UART: [state] CFI Enabled
3,402,311 UART: [rt] RT listening for mailbox commands...
3,402,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,565 UART: [rt]cmd =0x44504543, len=96
3,613,760 >>> mbox cmd response data (6236 bytes)
3,613,761 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,632 UART: [rt]cmd =0x53574545, len=84
3,647,122 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,815 UART: [idev] ++
1,479,983 UART: [idev] CDI.KEYID = 6
1,480,343 UART: [idev] SUBJECT.KEYID = 7
1,480,767 UART: [idev] UDS.KEYID = 0
1,481,112 ready_for_fw is high
1,481,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,831 UART: [idev] --
1,514,926 UART: [ldev] ++
1,515,094 UART: [ldev] CDI.KEYID = 6
1,515,457 UART: [ldev] SUBJECT.KEYID = 5
1,515,883 UART: [ldev] AUTHORITY.KEYID = 7
1,516,346 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,547,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,411 UART: [ldev] --
1,585,784 UART: [fwproc] Waiting for Commands...
1,586,533 UART: [fwproc] Received command 0x46574c44
1,587,324 UART: [fwproc] Received Image of size 114448 bytes
2,887,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,826 >>> mbox cmd response: success
3,080,972 UART: [afmc] ++
3,081,140 UART: [afmc] CDI.KEYID = 6
3,081,502 UART: [afmc] SUBJECT.KEYID = 7
3,081,927 UART: [afmc] AUTHORITY.KEYID = 5
3,116,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,123 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,813 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,604 UART: [afmc] --
3,159,674 UART: [cold-reset] --
3,160,582 UART: [state] Locking Datavault
3,161,413 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,017 UART: [state] Locking ICCM
3,162,589 UART: [exit] Launching FMC @ 0x40000130
3,167,918 UART:
3,167,934 UART: Running Caliptra FMC ...
3,168,342 UART:
3,168,485 UART: [state] CFI Enabled
3,178,976 UART: [fht] FMC Alias Private Key: 7
3,286,505 UART: [art] Extend RT PCRs Done
3,286,933 UART: [art] Lock RT PCRs Done
3,288,565 UART: [art] Populate DV Done
3,296,828 UART: [fht] FMC Alias Private Key: 7
3,297,988 UART: [art] Derive CDI
3,298,268 UART: [art] Store in in slot 0x4
3,384,173 UART: [art] Derive Key Pair
3,384,533 UART: [art] Store priv key in slot 0x5
3,397,793 UART: [art] Derive Key Pair - Done
3,412,550 UART: [art] Signing Cert with AUTHO
3,413,030 UART: RITY.KEYID = 7
3,428,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,885 UART: [art] PUB.X = C447BA677A84585157436EC90002357BC69FFF52C3DCFC6966647CB84F65E67F30B696429F5E3247AB845BAF5790D2F3
3,435,630 UART: [art] PUB.Y = FDE468C2D729FB0ECB36D505CD6DF2F4480FA3E4B45A97C26DE4E45A53E0FBCCBCD6DD01046B86BCD1DA1EF7EE202A2B
3,442,599 UART: [art] SIG.R = 17312F73FAEF1F809C3018B52340B4ED45BF6A2A09B45E7110D7A222B7A835DDBD0231BFD8FB453177070099CDFBF798
3,449,346 UART: [art] SIG.S = A48B5FA2D5144C00AE6F6C01F9DC0699B3DD281B58A82E85468E7F6841A4779B7358F544727240F10DC77927CECCD064
3,473,072 UART: Caliptra RT
3,473,417 UART: [state] CFI Enabled
3,581,910 UART: [rt] RT listening for mailbox commands...
3,582,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,054 UART: [rt]cmd =0x44504543, len=96
3,793,959 >>> mbox cmd response data (6236 bytes)
3,793,960 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,029 UART: [rt]cmd =0x53574545, len=84
3,827,233 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,388 ready_for_fw is high
1,363,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,618 >>> mbox cmd response: success
2,991,784 UART:
2,991,800 UART: Running Caliptra FMC ...
2,992,208 UART:
2,992,351 UART: [state] CFI Enabled
3,002,730 UART: [fht] FMC Alias Private Key: 7
3,110,947 UART: [art] Extend RT PCRs Done
3,111,375 UART: [art] Lock RT PCRs Done
3,112,709 UART: [art] Populate DV Done
3,120,960 UART: [fht] FMC Alias Private Key: 7
3,121,990 UART: [art] Derive CDI
3,122,270 UART: [art] Store in in slot 0x4
3,208,259 UART: [art] Derive Key Pair
3,208,619 UART: [art] Store priv key in slot 0x5
3,222,115 UART: [art] Derive Key Pair - Done
3,236,896 UART: [art] Signing Cert with AUTHO
3,237,376 UART: RITY.KEYID = 7
3,252,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,143 UART: [art] PUB.X = 3D89B6D3C7E3D2C6F2C60D4E652904F5538E0E4E882392C93D552E4F2E51001A22955108323993E2DC6D5A805B286257
3,259,871 UART: [art] PUB.Y = 9A493E426D4CAF046B118457FDE833ACF7BD462C9A879937B1DA1B809A3E3B8AD455341537C3A5AFA0493BE1A82C8EE8
3,266,830 UART: [art] SIG.R = D12A36306C63A4B33104569985CD1B8DA3D0EDB29E43D167F00DB5DE24950FFDE8A5C43BD3F79D30DD3B364AAFCC62B3
3,273,609 UART: [art] SIG.S = C25E328A91DA3BB6005B5DDFBFDA07A34FD381AF1C71640799F1CC3909027E1C473EECE0668A7C77EBAF5833C436F08C
3,297,302 UART: Caliptra RT
3,297,647 UART: [state] CFI Enabled
3,406,047 UART: [rt] RT listening for mailbox commands...
3,406,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,969 UART: [rt]cmd =0x44504543, len=96
3,617,284 >>> mbox cmd response data (6236 bytes)
3,617,285 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,322 UART: [rt]cmd =0x53574545, len=84
3,650,306 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
893,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,823 UART: [kat] ++
897,975 UART: [kat] sha1
902,189 UART: [kat] SHA2-256
904,129 UART: [kat] SHA2-384
906,860 UART: [kat] SHA2-512-ACC
908,761 UART: [kat] ECC-384
918,778 UART: [kat] HMAC-384Kdf
923,328 UART: [kat] LMS
1,171,656 UART: [kat] --
1,172,245 UART: [cold-reset] ++
1,172,699 UART: [fht] FHT @ 0x50003400
1,175,388 UART: [idev] ++
1,175,556 UART: [idev] CDI.KEYID = 6
1,175,916 UART: [idev] SUBJECT.KEYID = 7
1,176,340 UART: [idev] UDS.KEYID = 0
1,176,685 ready_for_fw is high
1,176,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,536 UART: [idev] Erasing UDS.KEYID = 0
1,201,937 UART: [idev] Sha1 KeyId Algorithm
1,210,295 UART: [idev] --
1,211,463 UART: [ldev] ++
1,211,631 UART: [ldev] CDI.KEYID = 6
1,211,994 UART: [ldev] SUBJECT.KEYID = 5
1,212,420 UART: [ldev] AUTHORITY.KEYID = 7
1,212,883 UART: [ldev] FE.KEYID = 1
1,218,157 UART: [ldev] Erasing FE.KEYID = 1
1,244,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,807 UART: [ldev] --
1,284,156 UART: [fwproc] Wait for Commands...
1,284,728 UART: [fwproc] Recv command 0x46574c44
1,285,456 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,778 >>> mbox cmd response: success
2,776,854 UART: [afmc] ++
2,777,022 UART: [afmc] CDI.KEYID = 6
2,777,384 UART: [afmc] SUBJECT.KEYID = 7
2,777,809 UART: [afmc] AUTHORITY.KEYID = 5
2,813,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,737 UART: [afmc] --
2,856,615 UART: [cold-reset] --
2,857,527 UART: [state] Locking Datavault
2,858,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,282 UART: [state] Locking ICCM
2,859,804 UART: [exit] Launching FMC @ 0x40000130
2,865,133 UART:
2,865,149 UART: Running Caliptra FMC ...
2,865,557 UART:
2,865,611 UART: [state] CFI Enabled
2,876,002 UART: [fht] FMC Alias Private Key: 7
2,983,723 UART: [art] Extend RT PCRs Done
2,984,151 UART: [art] Lock RT PCRs Done
2,985,743 UART: [art] Populate DV Done
2,993,934 UART: [fht] FMC Alias Private Key: 7
2,995,012 UART: [art] Derive CDI
2,995,292 UART: [art] Store in in slot 0x4
3,080,981 UART: [art] Derive Key Pair
3,081,341 UART: [art] Store priv key in slot 0x5
3,094,259 UART: [art] Derive Key Pair - Done
3,109,261 UART: [art] Signing Cert with AUTHO
3,109,741 UART: RITY.KEYID = 7
3,125,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,888 UART: [art] PUB.X = 35695BF255E6410FCBFCBAC8EE729088B944F620C8B53C9EC7D7B78F61D3E6CC07146CE4199DC9E5A7C61E58DD4B896F
3,132,668 UART: [art] PUB.Y = E07D494449C07DF21D4DCD50376C48DD45BAADD2C5D26271253B4FAF9BF60AAF85B66429F564790567D802B7A209B362
3,139,612 UART: [art] SIG.R = 61577BBBDC6695B7FD31B34FABD4325B38B282DBDD372BCDD831C44F67285B45F7A85F8B1E0A3F9D605585E2E6BC64D2
3,146,395 UART: [art] SIG.S = 2AB8AA98BCE5DE8D6DD9F19030E257E71E2D07A02E650190029FB7857921170C0F43D2AB2606B9DFCEE72D053AB0BB93
3,169,959 UART: Caliptra RT
3,170,212 UART: [state] CFI Enabled
3,277,651 UART: [rt] RT listening for mailbox commands...
3,278,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,653 UART: [rt]cmd =0x44504543, len=96
3,489,218 >>> mbox cmd response data (6236 bytes)
3,489,219 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,130 UART: [rt]cmd =0x53574545, len=84
3,522,220 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 ready_for_fw is high
1,059,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,947 >>> mbox cmd response: success
2,688,895 UART:
2,688,911 UART: Running Caliptra FMC ...
2,689,319 UART:
2,689,373 UART: [state] CFI Enabled
2,699,948 UART: [fht] FMC Alias Private Key: 7
2,808,169 UART: [art] Extend RT PCRs Done
2,808,597 UART: [art] Lock RT PCRs Done
2,810,295 UART: [art] Populate DV Done
2,818,518 UART: [fht] FMC Alias Private Key: 7
2,819,446 UART: [art] Derive CDI
2,819,726 UART: [art] Store in in slot 0x4
2,905,141 UART: [art] Derive Key Pair
2,905,501 UART: [art] Store priv key in slot 0x5
2,918,487 UART: [art] Derive Key Pair - Done
2,933,074 UART: [art] Signing Cert with AUTHO
2,933,554 UART: RITY.KEYID = 7
2,948,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,097 UART: [art] PUB.X = DB897BFCBD42487025B91D8DA99DA8F9A00A473EFA5746C3B91F8183E2E744079F8205E17ABD4955B50476DDAA760347
2,955,858 UART: [art] PUB.Y = CDC338D3A5D3C749B1F8BBCEB8B0461BF6533B95E4ECA899E2E03CA4CFD28E95D94AB3EEBA0C503AF9CFE17E9A9A517F
2,962,837 UART: [art] SIG.R = EFB4843E61BCFA1C84D877A55C6D7C679BD9280DB31D42F32C3DF07A5CFD0F827422959653ACDBA1B704FF773453CB9E
2,969,614 UART: [art] SIG.S = 34050872FDA263268D5B1D8E700658C1E1F8AD55C0276EBD757BF8224BFFB7533F986D8CBDBE9E70ED084C211292414F
2,993,263 UART: Caliptra RT
2,993,516 UART: [state] CFI Enabled
3,100,323 UART: [rt] RT listening for mailbox commands...
3,100,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,207 UART: [rt]cmd =0x44504543, len=96
3,311,830 >>> mbox cmd response data (6236 bytes)
3,311,831 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,736 UART: [rt]cmd =0x53574545, len=84
3,344,688 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
907,021 UART: [kat] SHA2-512-ACC
908,922 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,386 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,200,910 UART: [idev] Sha1 KeyId Algorithm
1,209,348 UART: [idev] --
1,210,540 UART: [ldev] ++
1,210,708 UART: [ldev] CDI.KEYID = 6
1,211,071 UART: [ldev] SUBJECT.KEYID = 5
1,211,497 UART: [ldev] AUTHORITY.KEYID = 7
1,211,960 UART: [ldev] FE.KEYID = 1
1,217,482 UART: [ldev] Erasing FE.KEYID = 1
1,244,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,345 UART: [fwproc] Wait for Commands...
1,284,115 UART: [fwproc] Recv command 0x46574c44
1,284,843 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,195 >>> mbox cmd response: success
2,778,251 UART: [afmc] ++
2,778,419 UART: [afmc] CDI.KEYID = 6
2,778,781 UART: [afmc] SUBJECT.KEYID = 7
2,779,206 UART: [afmc] AUTHORITY.KEYID = 5
2,815,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,454 UART: [afmc] --
2,858,432 UART: [cold-reset] --
2,859,250 UART: [state] Locking Datavault
2,860,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,915 UART: [state] Locking ICCM
2,861,493 UART: [exit] Launching FMC @ 0x40000130
2,866,822 UART:
2,866,838 UART: Running Caliptra FMC ...
2,867,246 UART:
2,867,389 UART: [state] CFI Enabled
2,878,088 UART: [fht] FMC Alias Private Key: 7
2,985,811 UART: [art] Extend RT PCRs Done
2,986,239 UART: [art] Lock RT PCRs Done
2,987,613 UART: [art] Populate DV Done
2,995,830 UART: [fht] FMC Alias Private Key: 7
2,996,840 UART: [art] Derive CDI
2,997,120 UART: [art] Store in in slot 0x4
3,083,399 UART: [art] Derive Key Pair
3,083,759 UART: [art] Store priv key in slot 0x5
3,097,125 UART: [art] Derive Key Pair - Done
3,112,127 UART: [art] Signing Cert with AUTHO
3,112,607 UART: RITY.KEYID = 7
3,127,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,434 UART: [art] PUB.X = 207009D56F19B9DDA60A6EDD366DD6EEEB32CABEF1E745E93FA3C3DD24CA3487215D31FF74EE7D3E3EE7A51843B92A3F
3,135,222 UART: [art] PUB.Y = E54DFEF9B37F89999D260C4B37DFB2FD5FFCA5ED41AC51530DC53E5556CE590FB3AA86B2CF802407268E006EA2EA7CE2
3,142,160 UART: [art] SIG.R = 5F8ADA8CE56109667DB4CF9A0D1CB7A90F86BCA2E87638300EF514B567EB60CC132A864D1BC3B9A8746C0F6387991281
3,148,923 UART: [art] SIG.S = 5B0347292965E60BA4494ED7E2F1CC37723B5459C01160D61EBA0CAD5C15A9A975EBA556EC894ADA956F9E54C6737DF3
3,172,991 UART: Caliptra RT
3,173,336 UART: [state] CFI Enabled
3,281,651 UART: [rt] RT listening for mailbox commands...
3,282,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,713 UART: [rt]cmd =0x44504543, len=96
3,492,642 >>> mbox cmd response data (6236 bytes)
3,492,643 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,590 UART: [rt]cmd =0x53574545, len=84
3,525,694 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 ready_for_fw is high
1,060,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,748 >>> mbox cmd response: success
2,691,706 UART:
2,691,722 UART: Running Caliptra FMC ...
2,692,130 UART:
2,692,273 UART: [state] CFI Enabled
2,702,652 UART: [fht] FMC Alias Private Key: 7
2,810,185 UART: [art] Extend RT PCRs Done
2,810,613 UART: [art] Lock RT PCRs Done
2,811,843 UART: [art] Populate DV Done
2,820,176 UART: [fht] FMC Alias Private Key: 7
2,821,324 UART: [art] Derive CDI
2,821,604 UART: [art] Store in in slot 0x4
2,907,679 UART: [art] Derive Key Pair
2,908,039 UART: [art] Store priv key in slot 0x5
2,921,363 UART: [art] Derive Key Pair - Done
2,936,145 UART: [art] Signing Cert with AUTHO
2,936,625 UART: RITY.KEYID = 7
2,951,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,154 UART: [art] PUB.X = B48ADF481C5058F68F93CA75936974B600578EBD4E1F88669436515635B7D22DA7D50374B78D7836CA3589841D6BD8A6
2,958,893 UART: [art] PUB.Y = 8B1E8BB9C4C5A4815B9B5E100851BBAEFF2EDC23CC64AC7F28672035DD771B2C51C0CDEB51407EA296C81DD9C5D420AB
2,965,862 UART: [art] SIG.R = F9DC49DC6D1155791604F30D26B3B6032F536127D1AC41593B456990783D95D8FE53BF6093F335F6BBF4DE1CA0CB46B3
2,972,627 UART: [art] SIG.S = 5727AED7E2B111966B4F3DBF11B5A64192B741FF16C3103238A8D9C740B6AAEDF4C3E012AFC8D1084516FB8E2557CB15
2,996,259 UART: Caliptra RT
2,996,604 UART: [state] CFI Enabled
3,103,873 UART: [rt] RT listening for mailbox commands...
3,104,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,819 UART: [rt]cmd =0x44504543, len=96
3,316,884 >>> mbox cmd response data (6236 bytes)
3,316,885 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,828 UART: [rt]cmd =0x53574545, len=84
3,350,064 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,233 UART: [idev] Sha1 KeyId Algorithm
1,206,941 UART: [idev] --
1,208,214 UART: [ldev] ++
1,208,382 UART: [ldev] CDI.KEYID = 6
1,208,746 UART: [ldev] SUBJECT.KEYID = 5
1,209,173 UART: [ldev] AUTHORITY.KEYID = 7
1,209,636 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,666 >>> mbox cmd response: success
2,775,713 UART: [afmc] ++
2,775,881 UART: [afmc] CDI.KEYID = 6
2,776,244 UART: [afmc] SUBJECT.KEYID = 7
2,776,670 UART: [afmc] AUTHORITY.KEYID = 5
2,811,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,900 UART: [afmc] --
2,855,018 UART: [cold-reset] --
2,855,842 UART: [state] Locking Datavault
2,856,865 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,469 UART: [state] Locking ICCM
2,857,975 UART: [exit] Launching FMC @ 0x40000130
2,863,304 UART:
2,863,320 UART: Running Caliptra FMC ...
2,863,728 UART:
2,863,782 UART: [state] CFI Enabled
2,874,207 UART: [fht] FMC Alias Private Key: 7
2,982,304 UART: [art] Extend RT PCRs Done
2,982,732 UART: [art] Lock RT PCRs Done
2,984,310 UART: [art] Populate DV Done
2,992,625 UART: [fht] FMC Alias Private Key: 7
2,993,675 UART: [art] Derive CDI
2,993,955 UART: [art] Store in in slot 0x4
3,079,370 UART: [art] Derive Key Pair
3,079,730 UART: [art] Store priv key in slot 0x5
3,091,854 UART: [art] Derive Key Pair - Done
3,106,454 UART: [art] Signing Cert with AUTHO
3,106,934 UART: RITY.KEYID = 7
3,121,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,715 UART: [art] PUB.X = 47B2EAC2C4D41E6C38FE7EB88A7C078CBA2A500E908B51EDF790F2679E69E874FDA5FFA731A019EDD09D4F8B6AFE3B90
3,129,503 UART: [art] PUB.Y = 1EF484534F345D25CCC1AB295D91937353551D7B786851A36EFC4FD8F3B509A702FC0E86A06A7EEE22041ADBC1CC4AEF
3,136,455 UART: [art] SIG.R = B33CD9EF7A9B1C03FCC1AC8C4EA9EFD047B7CC3B60D4830CBC5F7954548A24A599B151DA65B51899D8CED9C4F3C43DCF
3,143,245 UART: [art] SIG.S = 4181669F9FB093FD2ED05273F18F16AF25CC9EAA6658C94F79D5AD7EAB4D54DDC9AA01D992CCD6F5C78CA73CB7858AD2
3,167,315 UART: Caliptra RT
3,167,568 UART: [state] CFI Enabled
3,274,601 UART: [rt] RT listening for mailbox commands...
3,275,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,893 UART: [rt]cmd =0x44504543, len=96
3,485,563 >>> mbox cmd response data (6236 bytes)
3,485,564 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,525 UART: [rt]cmd =0x53574545, len=84
3,518,771 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,020 ready_for_fw is high
1,056,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,940 >>> mbox cmd response: success
2,684,828 UART:
2,684,844 UART: Running Caliptra FMC ...
2,685,252 UART:
2,685,306 UART: [state] CFI Enabled
2,695,459 UART: [fht] FMC Alias Private Key: 7
2,803,542 UART: [art] Extend RT PCRs Done
2,803,970 UART: [art] Lock RT PCRs Done
2,805,606 UART: [art] Populate DV Done
2,813,705 UART: [fht] FMC Alias Private Key: 7
2,814,861 UART: [art] Derive CDI
2,815,141 UART: [art] Store in in slot 0x4
2,900,336 UART: [art] Derive Key Pair
2,900,696 UART: [art] Store priv key in slot 0x5
2,914,282 UART: [art] Derive Key Pair - Done
2,929,049 UART: [art] Signing Cert with AUTHO
2,929,529 UART: RITY.KEYID = 7
2,944,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,744 UART: [art] PUB.X = B7D6046E735340147DC01034F6757224B19534AC056721E8FAEB318183076C9E48402BFAFF102156475A98E0CA128AB3
2,952,497 UART: [art] PUB.Y = 68627D5C9D132D97EB704B7C68DC181B0EA6406C4544F4A40BAC3601768D52DA1315EC2083FCD19810A9743DF628C0AF
2,959,442 UART: [art] SIG.R = 1FB145B4FC8B9432A09397F83A160D2F37EFF5496714AAE067C7F11054E6BCECF5DE001F631765ADD9D857DAA8A9E80C
2,966,198 UART: [art] SIG.S = 34D2BA4D26481C3ACD612AF19F7042774FAF6E7F597FB56CE3CB23BD6A779518251400F52461704BABD32CF9FE575886
2,989,659 UART: Caliptra RT
2,989,912 UART: [state] CFI Enabled
3,097,241 UART: [rt] RT listening for mailbox commands...
3,097,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,321 UART: [rt]cmd =0x44504543, len=96
3,308,533 >>> mbox cmd response data (6236 bytes)
3,308,534 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,515 UART: [rt]cmd =0x53574545, len=84
3,341,649 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,295 UART: [kat] LMS
1,168,607 UART: [kat] --
1,169,468 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 ready_for_fw is high
1,174,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,859 UART: [ldev] --
1,283,239 UART: [fwproc] Wait for Commands...
1,283,984 UART: [fwproc] Recv command 0x46574c44
1,284,717 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,057 >>> mbox cmd response: success
2,778,206 UART: [afmc] ++
2,778,374 UART: [afmc] CDI.KEYID = 6
2,778,737 UART: [afmc] SUBJECT.KEYID = 7
2,779,163 UART: [afmc] AUTHORITY.KEYID = 5
2,814,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,977 UART: [afmc] --
2,858,085 UART: [cold-reset] --
2,858,989 UART: [state] Locking Datavault
2,860,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,000 UART: [state] Locking ICCM
2,861,490 UART: [exit] Launching FMC @ 0x40000130
2,866,819 UART:
2,866,835 UART: Running Caliptra FMC ...
2,867,243 UART:
2,867,386 UART: [state] CFI Enabled
2,878,449 UART: [fht] FMC Alias Private Key: 7
2,987,050 UART: [art] Extend RT PCRs Done
2,987,478 UART: [art] Lock RT PCRs Done
2,988,988 UART: [art] Populate DV Done
2,997,223 UART: [fht] FMC Alias Private Key: 7
2,998,347 UART: [art] Derive CDI
2,998,627 UART: [art] Store in in slot 0x4
3,084,168 UART: [art] Derive Key Pair
3,084,528 UART: [art] Store priv key in slot 0x5
3,097,984 UART: [art] Derive Key Pair - Done
3,112,825 UART: [art] Signing Cert with AUTHO
3,113,305 UART: RITY.KEYID = 7
3,128,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,744 UART: [art] PUB.X = CEE66B9FB7FE73F50C08E351C1C5F80B6D71C0966BECF47F3FD240481D556566331DB03AD3B78F65DE75C6303103CD38
3,136,512 UART: [art] PUB.Y = 8F09D09427159CBF93330C18AB9466789538FD783DA1BECF386899E259E1051FBB8020AFE80B3CF48F35674B52632DD7
3,143,450 UART: [art] SIG.R = 3929657CEC4DBADFBC5850213CD86A40C7DC076BE9FA8CF096C7D4C186D91ADDAE06AF8F8C9A574C27812680966911E7
3,150,228 UART: [art] SIG.S = 81861DC5ED350F750C17E2434A500B262DF0FC9A8EE393F6D1059BC321AB49A9C373B357FCCDEB47E0435C0D76F0337A
3,173,912 UART: Caliptra RT
3,174,257 UART: [state] CFI Enabled
3,281,870 UART: [rt] RT listening for mailbox commands...
3,282,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,834 UART: [rt]cmd =0x44504543, len=96
3,492,946 >>> mbox cmd response data (6236 bytes)
3,492,947 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,946 UART: [rt]cmd =0x53574545, len=84
3,526,220 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 ready_for_fw is high
1,055,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,135 >>> mbox cmd response: success
2,687,525 UART:
2,687,541 UART: Running Caliptra FMC ...
2,687,949 UART:
2,688,092 UART: [state] CFI Enabled
2,698,617 UART: [fht] FMC Alias Private Key: 7
2,806,366 UART: [art] Extend RT PCRs Done
2,806,794 UART: [art] Lock RT PCRs Done
2,808,346 UART: [art] Populate DV Done
2,816,675 UART: [fht] FMC Alias Private Key: 7
2,817,827 UART: [art] Derive CDI
2,818,107 UART: [art] Store in in slot 0x4
2,903,438 UART: [art] Derive Key Pair
2,903,798 UART: [art] Store priv key in slot 0x5
2,917,504 UART: [art] Derive Key Pair - Done
2,932,125 UART: [art] Signing Cert with AUTHO
2,932,605 UART: RITY.KEYID = 7
2,948,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,928 UART: [art] PUB.X = 023130000982A5614381A87E596DDE7C79A8D133B31863F7E24B04F1F0737FDB6D1D9D514739C0A224944C51D285689F
2,955,657 UART: [art] PUB.Y = EB390F49C2D9E01237BB712976B798B2D6F0A5C402753C8E9F4B35815B2C7EEFA5CB7C38575201A2EE891BF5E9FCA3BB
2,962,612 UART: [art] SIG.R = DDF7121362D0B4DE07DA07EC8C8E727A2D7445108AE95B7250B8EB336F2BCE2180D70842E91BC33DCD73C6B57C27D3DC
2,969,387 UART: [art] SIG.S = B63FDB10E4210030B9208A12D464B374AE699D011FAB511556D7AED961DAAEB97725EDC02EF65C9450D3F1DA1B9EC68F
2,993,011 UART: Caliptra RT
2,993,356 UART: [state] CFI Enabled
3,101,326 UART: [rt] RT listening for mailbox commands...
3,101,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,256 UART: [rt]cmd =0x44504543, len=96
3,312,071 >>> mbox cmd response data (6236 bytes)
3,312,072 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,919 UART: [rt]cmd =0x53574545, len=84
3,344,753 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,888 writing to cptra_bootfsm_go
193,025 UART:
193,394 UART: Running Caliptra ROM ...
194,485 UART:
194,627 UART: [state] CFI Enabled
264,587 UART: [state] LifecycleState = Unprovisioned
266,499 UART: [state] DebugLocked = No
268,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,161 UART: [kat] SHA2-256
442,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,340 UART: [kat] ++
453,877 UART: [kat] sha1
465,175 UART: [kat] SHA2-256
467,897 UART: [kat] SHA2-384
474,596 UART: [kat] SHA2-512-ACC
476,962 UART: [kat] ECC-384
2,764,904 UART: [kat] HMAC-384Kdf
2,777,142 UART: [kat] LMS
3,967,453 UART: [kat] --
3,972,960 UART: [cold-reset] ++
3,974,402 UART: [fht] Storing FHT @ 0x50003400
3,987,089 UART: [idev] ++
3,987,667 UART: [idev] CDI.KEYID = 6
3,988,582 UART: [idev] SUBJECT.KEYID = 7
3,989,829 UART: [idev] UDS.KEYID = 0
3,990,805 ready_for_fw is high
3,990,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,531 UART: [idev] Erasing UDS.KEYID = 0
7,323,645 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,473 UART: [idev] --
7,349,737 UART: [ldev] ++
7,350,303 UART: [ldev] CDI.KEYID = 6
7,351,317 UART: [ldev] SUBJECT.KEYID = 5
7,352,472 UART: [ldev] AUTHORITY.KEYID = 7
7,353,755 UART: [ldev] FE.KEYID = 1
7,400,114 UART: [ldev] Erasing FE.KEYID = 1
10,730,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,971 UART: [ldev] --
13,093,021 UART: [fwproc] Waiting for Commands...
13,094,598 UART: [fwproc] Received command 0x46574c44
13,096,788 UART: [fwproc] Received Image of size 114124 bytes
17,154,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,478 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,993 >>> mbox cmd response: success
17,624,259 UART: [afmc] ++
17,624,862 UART: [afmc] CDI.KEYID = 6
17,625,775 UART: [afmc] SUBJECT.KEYID = 7
17,626,995 UART: [afmc] AUTHORITY.KEYID = 5
20,980,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,352 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,655 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,030 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,889 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,321 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,019 UART: [afmc] --
23,355,268 UART: [cold-reset] --
23,358,372 UART: [state] Locking Datavault
23,363,793 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,580 UART: [state] Locking ICCM
23,367,282 UART: [exit] Launching FMC @ 0x40000130
23,375,680 UART:
23,375,916 UART: Running Caliptra FMC ...
23,377,019 UART:
23,377,183 UART: [state] CFI Enabled
23,444,177 UART: [fht] FMC Alias Private Key: 7
25,782,060 UART: [art] Extend RT PCRs Done
25,783,286 UART: [art] Lock RT PCRs Done
25,785,102 UART: [art] Populate DV Done
25,790,620 UART: [fht] FMC Alias Private Key: 7
25,792,221 UART: [art] Derive CDI
25,793,056 UART: [art] Store in in slot 0x4
25,852,978 UART: [art] Derive Key Pair
25,854,014 UART: [art] Store priv key in slot 0x5
29,146,865 UART: [art] Derive Key Pair - Done
29,159,964 UART: [art] Signing Cert with AUTHO
29,161,265 UART: RITY.KEYID = 7
31,448,707 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,207 UART: [art] PUB.X = 1644FA77E012FA27D0AEE072049CC5AAF0697DE27089C27002A3AF981A878B6F3AB9FF6EDFB22A80924FB03C536A65EE
31,457,477 UART: [art] PUB.Y = 82366D6CDBF7739220BC568E7D9E5B3EC1B5E8B5F796F80243A97E2769D5845C6598E40EB7B9C5579FA2CFE8555A9EE6
31,464,716 UART: [art] SIG.R = 1A525D2274D692E64E3975109F70DA6DF4A811198AE4FD686B256568EB001C6D4E290FB5CA709FC73D067E53B2A9B45F
31,472,058 UART: [art] SIG.S = 3BB87F60325C71F538C369A3FF7B30771AC54F95C33312E6DE6015748AAD148F3934F36F321C9D8D4A4F12AD1EC8B82A
32,777,429 UART: Caliptra RT
32,778,147 UART: [state] CFI Enabled
32,937,602 UART: [rt] RT listening for mailbox commands...
32,939,489 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,970,023 UART: [rt]cmd =0x53574545, len=84
32,973,891 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,774,532 ready_for_fw is high
3,775,002 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,839,340 >>> mbox cmd response: success
23,531,522 UART:
23,532,044 UART: Running Caliptra FMC ...
23,533,166 UART:
23,533,335 UART: [state] CFI Enabled
23,602,453 UART: [fht] FMC Alias Private Key: 7
25,940,441 UART: [art] Extend RT PCRs Done
25,941,666 UART: [art] Lock RT PCRs Done
25,943,309 UART: [art] Populate DV Done
25,948,731 UART: [fht] FMC Alias Private Key: 7
25,950,222 UART: [art] Derive CDI
25,950,985 UART: [art] Store in in slot 0x4
26,010,797 UART: [art] Derive Key Pair
26,011,863 UART: [art] Store priv key in slot 0x5
29,304,335 UART: [art] Derive Key Pair - Done
29,317,170 UART: [art] Signing Cert with AUTHO
29,318,476 UART: RITY.KEYID = 7
31,605,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,607,475 UART: [art] PUB.X = 9C73B3FA58FC7C9B07D628027F865A1B00CCCF5D7813D608CD6B2C55786382E105870BDE3B74287CC6FBB74D1E2BE7B8
31,614,725 UART: [art] PUB.Y = BA23BB76DC98E8A93E251EDDA63E679552DC063DA7C637A4D73A296EE059BBD36EC2F9249A6EEEF72E26101430A5EE9C
31,622,022 UART: [art] SIG.R = 7FFE16062CB9FFFAB5D57569B890C5F18F9F4B99A0023D48D2FFF4166EAF9C09AD071A79EBB5924AF9F271E40C183358
31,629,422 UART: [art] SIG.S = 2D3DFF2C43D5E3B980FC7B4149C5A5A63B765C49816A726D266605B9D425F767878F7B26CE820E40F839099EABB4A8AA
32,934,739 UART: Caliptra RT
32,935,439 UART: [state] CFI Enabled
33,095,237 UART: [rt] RT listening for mailbox commands...
33,097,119 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,127,609 UART: [rt]cmd =0x53574545, len=84
33,131,045 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,467 UART:
192,838 UART: Running Caliptra ROM ...
194,025 UART:
603,660 UART: [state] CFI Enabled
619,026 UART: [state] LifecycleState = Unprovisioned
620,981 UART: [state] DebugLocked = No
623,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,727 UART: [kat] SHA2-256
798,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,980 UART: [kat] ++
809,455 UART: [kat] sha1
820,964 UART: [kat] SHA2-256
823,689 UART: [kat] SHA2-384
829,787 UART: [kat] SHA2-512-ACC
832,126 UART: [kat] ECC-384
3,117,052 UART: [kat] HMAC-384Kdf
3,130,425 UART: [kat] LMS
4,320,579 UART: [kat] --
4,325,587 UART: [cold-reset] ++
4,328,228 UART: [fht] Storing FHT @ 0x50003400
4,339,631 UART: [idev] ++
4,340,186 UART: [idev] CDI.KEYID = 6
4,341,158 UART: [idev] SUBJECT.KEYID = 7
4,342,401 UART: [idev] UDS.KEYID = 0
4,343,369 ready_for_fw is high
4,343,558 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,884 UART: [idev] Erasing UDS.KEYID = 0
7,624,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,934 UART: [idev] --
7,650,956 UART: [ldev] ++
7,651,529 UART: [ldev] CDI.KEYID = 6
7,652,493 UART: [ldev] SUBJECT.KEYID = 5
7,653,700 UART: [ldev] AUTHORITY.KEYID = 7
7,654,925 UART: [ldev] FE.KEYID = 1
7,665,451 UART: [ldev] Erasing FE.KEYID = 1
10,956,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,411 UART: [ldev] --
13,317,193 UART: [fwproc] Waiting for Commands...
13,320,037 UART: [fwproc] Received command 0x46574c44
13,322,211 UART: [fwproc] Received Image of size 114124 bytes
17,373,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,445 >>> mbox cmd response: success
17,836,118 UART: [afmc] ++
17,836,713 UART: [afmc] CDI.KEYID = 6
17,837,618 UART: [afmc] SUBJECT.KEYID = 7
17,838,888 UART: [afmc] AUTHORITY.KEYID = 5
21,151,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,309 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,693 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,501 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,936 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,484 UART: [afmc] --
23,517,832 UART: [cold-reset] --
23,522,230 UART: [state] Locking Datavault
23,526,035 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,792 UART: [state] Locking ICCM
23,530,046 UART: [exit] Launching FMC @ 0x40000130
23,538,444 UART:
23,538,672 UART: Running Caliptra FMC ...
23,539,765 UART:
23,539,922 UART: [state] CFI Enabled
23,548,079 UART: [fht] FMC Alias Private Key: 7
25,879,094 UART: [art] Extend RT PCRs Done
25,880,326 UART: [art] Lock RT PCRs Done
25,881,838 UART: [art] Populate DV Done
25,887,518 UART: [fht] FMC Alias Private Key: 7
25,889,211 UART: [art] Derive CDI
25,890,016 UART: [art] Store in in slot 0x4
25,932,441 UART: [art] Derive Key Pair
25,933,436 UART: [art] Store priv key in slot 0x5
29,176,097 UART: [art] Derive Key Pair - Done
29,188,984 UART: [art] Signing Cert with AUTHO
29,190,282 UART: RITY.KEYID = 7
31,469,546 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,055 UART: [art] PUB.X = FE055801B97BAD6D3B0A5CE065ED01A33D181164F429AEF6D3D4E56CB3E1F10A0124D232BEDB9FA6FED9AEEE30E8F11F
31,478,368 UART: [art] PUB.Y = 451ACBE8BFED6EB6988DDABC55916CC5FB27F1F495FAF0F89666340C4166B31DFAAC30286F2AE3429E1C6663D62ED81D
31,485,640 UART: [art] SIG.R = 2575302B5F97CCFD5786BFB106EAA496A8790F175B65D92448F48047AA39693AE785B7EED009E993E148C5540E94B2E8
31,492,959 UART: [art] SIG.S = AAA8E8A9D4EA979C08E7C4AE66F1919010337B4394105CF92721065D6D3E3BB9252D337BD10E26D6755DD7C4AC8F24BF
32,798,741 UART: Caliptra RT
32,799,445 UART: [state] CFI Enabled
32,917,828 UART: [rt] RT listening for mailbox commands...
32,919,709 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,950,239 UART: [rt]cmd =0x53574545, len=84
32,954,205 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,125,295 ready_for_fw is high
4,125,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,685 >>> mbox cmd response: success
23,721,927 UART:
23,722,310 UART: Running Caliptra FMC ...
23,723,448 UART:
23,723,606 UART: [state] CFI Enabled
23,731,447 UART: [fht] FMC Alias Private Key: 7
26,062,194 UART: [art] Extend RT PCRs Done
26,063,430 UART: [art] Lock RT PCRs Done
26,064,678 UART: [art] Populate DV Done
26,069,624 UART: [fht] FMC Alias Private Key: 7
26,071,327 UART: [art] Derive CDI
26,072,145 UART: [art] Store in in slot 0x4
26,115,053 UART: [art] Derive Key Pair
26,116,097 UART: [art] Store priv key in slot 0x5
29,357,413 UART: [art] Derive Key Pair - Done
29,370,513 UART: [art] Signing Cert with AUTHO
29,371,819 UART: RITY.KEYID = 7
31,651,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,086 UART: [art] PUB.X = F094833C4A302DA4C92F29CEA1FB2028B9C12109592E9040D15CAD774524BDB8001F5A282E49EB79068A1D46ADE74465
31,660,292 UART: [art] PUB.Y = F747C808A800CE2BC5A3848AA7DFA780CE67218750301741A28A9DDC4C2833DBFC4ED894E387AC67131C1E2A7E3E01C7
31,667,534 UART: [art] SIG.R = 2CCB820FD5018F50495D6C82A41C83B1B3EF1BB7DAF6E6723F22671927594E9C260BA4F331354D3FE0B3E5126B97FA36
31,674,951 UART: [art] SIG.S = 8B42A47C74127DFC7F23131129F436EB8A61A25B8C97A948FD2E9E7C0D1A21FBB51DB71A0DE946664FA5DE25AC360DF3
32,980,115 UART: Caliptra RT
32,980,829 UART: [state] CFI Enabled
33,098,920 UART: [rt] RT listening for mailbox commands...
33,100,799 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,131,162 UART: [rt]cmd =0x53574545, len=84
33,134,859 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,076 UART:
192,463 UART: Running Caliptra ROM ...
193,568 UART:
193,710 UART: [state] CFI Enabled
264,070 UART: [state] LifecycleState = Unprovisioned
265,932 UART: [state] DebugLocked = No
267,736 UART: [state] WD Timer not started. Device not locked for debugging
271,516 UART: [kat] SHA2-256
450,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,232 UART: [kat] ++
462,764 UART: [kat] sha1
474,142 UART: [kat] SHA2-256
477,226 UART: [kat] SHA2-384
482,006 UART: [kat] SHA2-512-ACC
484,948 UART: [kat] ECC-384
2,947,278 UART: [kat] HMAC-384Kdf
2,971,359 UART: [kat] LMS
3,500,818 UART: [kat] --
3,504,267 UART: [cold-reset] ++
3,506,128 UART: [fht] FHT @ 0x50003400
3,516,958 UART: [idev] ++
3,517,528 UART: [idev] CDI.KEYID = 6
3,518,523 UART: [idev] SUBJECT.KEYID = 7
3,519,691 UART: [idev] UDS.KEYID = 0
3,520,615 ready_for_fw is high
3,520,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,839 UART: [idev] Erasing UDS.KEYID = 0
6,027,733 UART: [idev] Sha1 KeyId Algorithm
6,051,143 UART: [idev] --
6,055,946 UART: [ldev] ++
6,056,537 UART: [ldev] CDI.KEYID = 6
6,057,476 UART: [ldev] SUBJECT.KEYID = 5
6,058,588 UART: [ldev] AUTHORITY.KEYID = 7
6,059,875 UART: [ldev] FE.KEYID = 1
6,100,718 UART: [ldev] Erasing FE.KEYID = 1
8,602,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,155 UART: [ldev] --
10,415,259 UART: [fwproc] Wait for Commands...
10,418,490 UART: [fwproc] Recv command 0x46574c44
10,420,524 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,622 >>> mbox cmd response: success
14,289,434 UART: [afmc] ++
14,290,026 UART: [afmc] CDI.KEYID = 6
14,290,944 UART: [afmc] SUBJECT.KEYID = 7
14,292,108 UART: [afmc] AUTHORITY.KEYID = 5
16,830,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,255 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,263 UART: [afmc] --
18,627,012 UART: [cold-reset] --
18,631,841 UART: [state] Locking Datavault
18,636,166 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,813 UART: [state] Locking ICCM
18,640,037 UART: [exit] Launching FMC @ 0x40000130
18,648,436 UART:
18,648,668 UART: Running Caliptra FMC ...
18,649,694 UART:
18,649,841 UART: [state] CFI Enabled
18,711,610 UART: [fht] FMC Alias Private Key: 7
20,475,721 UART: [art] Extend RT PCRs Done
20,476,932 UART: [art] Lock RT PCRs Done
20,478,665 UART: [art] Populate DV Done
20,484,292 UART: [fht] FMC Alias Private Key: 7
20,485,886 UART: [art] Derive CDI
20,486,701 UART: [art] Store in in slot 0x4
20,544,658 UART: [art] Derive Key Pair
20,545,693 UART: [art] Store priv key in slot 0x5
23,009,305 UART: [art] Derive Key Pair - Done
23,022,294 UART: [art] Signing Cert with AUTHO
23,023,617 UART: RITY.KEYID = 7
24,734,313 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,813 UART: [art] PUB.X = CAF952BDF01E9F60DB07D555831B4D466983B0455A6B76D8DF618F851703CD01F97983EA5A8F254B59A642457B23C11F
24,743,057 UART: [art] PUB.Y = DC80B3BE73F62B378F608273558A79636E52AC5F01D12BC61BF514684315DE348AA9ED21A8EC5B9977FF8E82A496317E
24,750,437 UART: [art] SIG.R = F29DED8D527D212D2D4C88DDFCA0F39B5692E3522A600239B8B44E93F39774029A2B4AF1AC8453D290D61AE24D7A4CFC
24,757,750 UART: [art] SIG.S = 7B6DB5067147FD17FCE21169A5ECDA6BF44FEA501768210952C97CA512D08B580BA690A1031E718A715D32E6667F36FE
25,735,924 UART: Caliptra RT
25,736,622 UART: [state] CFI Enabled
25,903,022 UART: [rt] RT listening for mailbox commands...
25,904,929 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,935,823 UART: [rt]cmd =0x53574545, len=84
25,939,458 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,361,727 ready_for_fw is high
3,362,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,126 >>> mbox cmd response: success
18,325,542 UART:
18,325,948 UART: Running Caliptra FMC ...
18,327,091 UART:
18,327,280 UART: [state] CFI Enabled
18,392,368 UART: [fht] FMC Alias Private Key: 7
20,156,020 UART: [art] Extend RT PCRs Done
20,157,246 UART: [art] Lock RT PCRs Done
20,159,118 UART: [art] Populate DV Done
20,164,858 UART: [fht] FMC Alias Private Key: 7
20,166,505 UART: [art] Derive CDI
20,167,243 UART: [art] Store in in slot 0x4
20,225,265 UART: [art] Derive Key Pair
20,226,309 UART: [art] Store priv key in slot 0x5
22,689,805 UART: [art] Derive Key Pair - Done
22,702,689 UART: [art] Signing Cert with AUTHO
22,704,031 UART: RITY.KEYID = 7
24,415,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,688 UART: [art] PUB.X = AF9813D5A67CF6CF0084940816C9C80A1D63F096B1106BDCD7B2DB28FB8A97E35129BDF6735F8008E087CC5058D67DA0
24,423,957 UART: [art] PUB.Y = 03E2701671B1D2AAB61D581E4A1AEB8CFFDA18AE08793BB88F2CC9A1EE10F7DD6D8D94F54246E1A62EC1A69C18D13BBA
24,431,243 UART: [art] SIG.R = F721850E0F93E4EAAF5E43F93065A986D16E457F95691FCC69115F8C4E0C5DAA38BDCB507D36FEDD40772733FC72EE23
24,438,643 UART: [art] SIG.S = 2EBADEC646741129C61550B1D72FF07757F2CA910831B09C03751D5F73F838CE0846F151255EE2A72563189F2C40C8F4
25,417,340 UART: Caliptra RT
25,418,040 UART: [state] CFI Enabled
25,584,484 UART: [rt] RT listening for mailbox commands...
25,586,356 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,617,583 UART: [rt]cmd =0x53574545, len=84
25,621,373 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,463 UART:
192,839 UART: Running Caliptra ROM ...
193,969 UART:
603,432 UART: [state] CFI Enabled
620,144 UART: [state] LifecycleState = Unprovisioned
622,020 UART: [state] DebugLocked = No
624,900 UART: [state] WD Timer not started. Device not locked for debugging
628,706 UART: [kat] SHA2-256
807,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,460 UART: [kat] ++
819,994 UART: [kat] sha1
831,863 UART: [kat] SHA2-256
834,861 UART: [kat] SHA2-384
840,058 UART: [kat] SHA2-512-ACC
843,011 UART: [kat] ECC-384
3,284,637 UART: [kat] HMAC-384Kdf
3,297,575 UART: [kat] LMS
3,827,084 UART: [kat] --
3,830,797 UART: [cold-reset] ++
3,832,596 UART: [fht] FHT @ 0x50003400
3,844,773 UART: [idev] ++
3,845,328 UART: [idev] CDI.KEYID = 6
3,846,229 UART: [idev] SUBJECT.KEYID = 7
3,847,465 UART: [idev] UDS.KEYID = 0
3,848,382 ready_for_fw is high
3,848,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,653 UART: [idev] Erasing UDS.KEYID = 0
6,320,525 UART: [idev] Sha1 KeyId Algorithm
6,342,561 UART: [idev] --
6,346,011 UART: [ldev] ++
6,346,577 UART: [ldev] CDI.KEYID = 6
6,347,478 UART: [ldev] SUBJECT.KEYID = 5
6,348,682 UART: [ldev] AUTHORITY.KEYID = 7
6,349,902 UART: [ldev] FE.KEYID = 1
6,361,404 UART: [ldev] Erasing FE.KEYID = 1
8,833,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,784 UART: [ldev] --
10,620,972 UART: [fwproc] Wait for Commands...
10,622,744 UART: [fwproc] Recv command 0x46574c44
10,624,833 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,501,792 >>> mbox cmd response: success
14,505,347 UART: [afmc] ++
14,505,937 UART: [afmc] CDI.KEYID = 6
14,506,852 UART: [afmc] SUBJECT.KEYID = 7
14,508,024 UART: [afmc] AUTHORITY.KEYID = 5
17,006,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,464 UART: [afmc] --
18,805,228 UART: [cold-reset] --
18,809,029 UART: [state] Locking Datavault
18,815,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,986 UART: [state] Locking ICCM
18,819,452 UART: [exit] Launching FMC @ 0x40000130
18,827,905 UART:
18,828,135 UART: Running Caliptra FMC ...
18,829,227 UART:
18,829,396 UART: [state] CFI Enabled
18,837,437 UART: [fht] FMC Alias Private Key: 7
20,594,353 UART: [art] Extend RT PCRs Done
20,595,554 UART: [art] Lock RT PCRs Done
20,597,192 UART: [art] Populate DV Done
20,602,723 UART: [fht] FMC Alias Private Key: 7
20,604,162 UART: [art] Derive CDI
20,604,905 UART: [art] Store in in slot 0x4
20,647,397 UART: [art] Derive Key Pair
20,648,395 UART: [art] Store priv key in slot 0x5
23,075,434 UART: [art] Derive Key Pair - Done
23,088,530 UART: [art] Signing Cert with AUTHO
23,089,858 UART: RITY.KEYID = 7
24,795,160 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,668 UART: [art] PUB.X = EFA6F6E11FEB2E65D627A69466F5C0F4CA6D975AF1599E7AEEB52F0F28E6035A59FFB37B884DFCD9A3303E4BAC3D7A2D
24,803,953 UART: [art] PUB.Y = 339BD6ABFEE9E395D14D6A8F6B83376F3B8BC41E44518ADCCBBDCA599B2FC2B30C8BD1B676151859831A3115189AD5E5
24,811,237 UART: [art] SIG.R = 0B73A84C0F1AB4E3CACF21460AE7ECA9341299D7220EAF61947008E71CA6A8DE6E91214EF9E3802D053B2E1862CD4B8C
24,818,618 UART: [art] SIG.S = C93097CEAA2370536CF2EF01FFC147E277BF6FD83ACBFB8378F5B4D12D600106A97CE673F9B508CB98381E88AF6B3298
25,797,043 UART: Caliptra RT
25,797,746 UART: [state] CFI Enabled
25,915,602 UART: [rt] RT listening for mailbox commands...
25,917,474 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,947,942 UART: [rt]cmd =0x53574545, len=84
25,952,072 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,690,614 ready_for_fw is high
3,691,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,416 >>> mbox cmd response: success
18,530,415 UART:
18,530,804 UART: Running Caliptra FMC ...
18,531,926 UART:
18,532,081 UART: [state] CFI Enabled
18,540,140 UART: [fht] FMC Alias Private Key: 7
20,296,830 UART: [art] Extend RT PCRs Done
20,298,060 UART: [art] Lock RT PCRs Done
20,299,545 UART: [art] Populate DV Done
20,305,012 UART: [fht] FMC Alias Private Key: 7
20,306,610 UART: [art] Derive CDI
20,307,421 UART: [art] Store in in slot 0x4
20,350,221 UART: [art] Derive Key Pair
20,351,219 UART: [art] Store priv key in slot 0x5
22,778,184 UART: [art] Derive Key Pair - Done
22,791,158 UART: [art] Signing Cert with AUTHO
22,792,466 UART: RITY.KEYID = 7
24,497,662 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,148 UART: [art] PUB.X = 899B52FC5DA54E83E8DB12F48E96A2EAE4422784B2C546AE2DB65BC336DF1E399D300BEEFBAE4B6D92A892E345A594CC
24,506,430 UART: [art] PUB.Y = 2CD812679BD4A99BCD16F81425051169534227AACEF94960B41C175F03F1A78DE2428EB7BB4DDD5F80882DB1F6B82BFF
24,513,729 UART: [art] SIG.R = D833F535CD9E5F4A7F32534AFFC3D976B9F62297FAA04AF609AB8AFED880665E8F3D514919648893F4861A1C1C919D05
24,521,108 UART: [art] SIG.S = 096C5E8DE9FCE22ED0447A8EBDF3AA04F3999E9A909A77A44A5D88FC27837F6EDD48734C97528C9E7989E5D471E3B7A6
25,500,427 UART: Caliptra RT
25,501,138 UART: [state] CFI Enabled
25,618,256 UART: [rt] RT listening for mailbox commands...
25,620,135 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,650,599 UART: [rt]cmd =0x53574545, len=84
25,654,118 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,038 UART:
192,402 UART: Running Caliptra ROM ...
193,608 UART:
193,766 UART: [state] CFI Enabled
266,757 UART: [state] LifecycleState = Unprovisioned
269,132 UART: [state] DebugLocked = No
270,457 UART: [state] WD Timer not started. Device not locked for debugging
275,912 UART: [kat] SHA2-256
465,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,524 UART: [kat] ++
477,003 UART: [kat] sha1
487,826 UART: [kat] SHA2-256
490,831 UART: [kat] SHA2-384
495,273 UART: [kat] SHA2-512-ACC
497,853 UART: [kat] ECC-384
2,948,211 UART: [kat] HMAC-384Kdf
2,972,444 UART: [kat] LMS
3,504,198 UART: [kat] --
3,509,118 UART: [cold-reset] ++
3,511,408 UART: [fht] FHT @ 0x50003400
3,522,028 UART: [idev] ++
3,522,732 UART: [idev] CDI.KEYID = 6
3,523,757 UART: [idev] SUBJECT.KEYID = 7
3,524,856 UART: [idev] UDS.KEYID = 0
3,525,795 ready_for_fw is high
3,526,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,046 UART: [idev] Erasing UDS.KEYID = 0
6,030,409 UART: [idev] Sha1 KeyId Algorithm
6,052,668 UART: [idev] --
6,058,173 UART: [ldev] ++
6,058,864 UART: [ldev] CDI.KEYID = 6
6,059,782 UART: [ldev] SUBJECT.KEYID = 5
6,060,943 UART: [ldev] AUTHORITY.KEYID = 7
6,062,171 UART: [ldev] FE.KEYID = 1
6,100,149 UART: [ldev] Erasing FE.KEYID = 1
8,606,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,421 UART: [ldev] --
10,411,491 UART: [fwproc] Wait for Commands...
10,414,288 UART: [fwproc] Recv command 0x46574c44
10,416,594 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,613,301 >>> mbox cmd response: success
14,617,753 UART: [afmc] ++
14,618,462 UART: [afmc] CDI.KEYID = 6
14,619,651 UART: [afmc] SUBJECT.KEYID = 7
14,621,086 UART: [afmc] AUTHORITY.KEYID = 5
17,147,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,198 UART: [afmc] --
18,946,478 UART: [cold-reset] --
18,951,535 UART: [state] Locking Datavault
18,957,350 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,547 UART: [state] Locking ICCM
18,960,774 UART: [exit] Launching FMC @ 0x40000130
18,969,113 UART:
18,969,350 UART: Running Caliptra FMC ...
18,970,448 UART:
18,970,604 UART: [state] CFI Enabled
19,028,546 UART: [fht] FMC Alias Private Key: 7
20,793,390 UART: [art] Extend RT PCRs Done
20,794,590 UART: [art] Lock RT PCRs Done
20,796,454 UART: [art] Populate DV Done
20,801,831 UART: [fht] FMC Alias Private Key: 7
20,803,525 UART: [art] Derive CDI
20,804,340 UART: [art] Store in in slot 0x4
20,861,434 UART: [art] Derive Key Pair
20,862,474 UART: [art] Store priv key in slot 0x5
23,325,098 UART: [art] Derive Key Pair - Done
23,338,147 UART: [art] Signing Cert with AUTHO
23,339,479 UART: RITY.KEYID = 7
25,050,941 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,434 UART: [art] PUB.X = 2E7F6CE70E36016919630C45E49B3562647BE8B161041DDC65E4F07F1F8ACFF14CA3B7D22F16F9D915F6F43B45CF4540
25,059,676 UART: [art] PUB.Y = A3E43CACC7C3FD8CE660424D567BA13BDFF21CF15452AB3ED0DBC214C8913666D9E92CB3BFA9D22565D82FE2FBCC91F1
25,067,008 UART: [art] SIG.R = 3D14E3D263A21E6BD0566F1599623959B1BEAE770EF041618E8A40389D4499A43B8D87D12953C330E603EC5B64CA0D7F
25,074,343 UART: [art] SIG.S = 7BE70BF4172AEBC9239F671CF601F7DF149101D1B97C7BD0BAED4E399E96D099F14BFB325DB4F61F06B841864C3F55B1
26,053,716 UART: Caliptra RT
26,054,423 UART: [state] CFI Enabled
26,218,202 UART: [rt] RT listening for mailbox commands...
26,220,078 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,251,186 UART: [rt]cmd =0x53574545, len=84
26,254,974 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,439,857 ready_for_fw is high
3,440,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,728,088 >>> mbox cmd response: success
19,007,165 UART:
19,007,554 UART: Running Caliptra FMC ...
19,008,705 UART:
19,008,874 UART: [state] CFI Enabled
19,073,738 UART: [fht] FMC Alias Private Key: 7
20,837,225 UART: [art] Extend RT PCRs Done
20,838,440 UART: [art] Lock RT PCRs Done
20,840,256 UART: [art] Populate DV Done
20,845,680 UART: [fht] FMC Alias Private Key: 7
20,847,315 UART: [art] Derive CDI
20,848,056 UART: [art] Store in in slot 0x4
20,906,180 UART: [art] Derive Key Pair
20,907,198 UART: [art] Store priv key in slot 0x5
23,370,220 UART: [art] Derive Key Pair - Done
23,383,593 UART: [art] Signing Cert with AUTHO
23,384,891 UART: RITY.KEYID = 7
25,096,512 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,020 UART: [art] PUB.X = B0147237B00832777E7EE0938DEF112106E59A839E1BF32FEEEBC4FFD62698EC315D00CB68843BFB1E919D003E8864FD
25,105,213 UART: [art] PUB.Y = 821ED6D2DCFA861084E3E704B5AD960C80502307B34CD0D5B590CEAAB5C629ED1B8D0A9CA456569C0495E7AAC8331B0E
25,112,517 UART: [art] SIG.R = 889AA976072B852D21B6964F37D386167C22CFE32C4CA5114096F9CF1277110E3B75524A7A871793AC44D90F58D398C4
25,119,850 UART: [art] SIG.S = AB0C715E0FA72AD3FE610DB6F71BE4ADD2BC55A08A4F2D88606989EAFE1AEC1AB76F2E2C557CC7CB454DB203A0AF41B4
26,099,203 UART: Caliptra RT
26,099,893 UART: [state] CFI Enabled
26,265,014 UART: [rt] RT listening for mailbox commands...
26,266,889 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,297,867 UART: [rt]cmd =0x53574545, len=84
26,301,296 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,459 UART:
192,823 UART: Running Caliptra ROM ...
194,004 UART:
603,562 UART: [state] CFI Enabled
619,424 UART: [state] LifecycleState = Unprovisioned
621,786 UART: [state] DebugLocked = No
623,612 UART: [state] WD Timer not started. Device not locked for debugging
628,274 UART: [kat] SHA2-256
818,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,936 UART: [kat] ++
829,493 UART: [kat] sha1
841,797 UART: [kat] SHA2-256
844,800 UART: [kat] SHA2-384
851,135 UART: [kat] SHA2-512-ACC
853,706 UART: [kat] ECC-384
3,296,353 UART: [kat] HMAC-384Kdf
3,310,038 UART: [kat] LMS
3,841,903 UART: [kat] --
3,846,817 UART: [cold-reset] ++
3,848,097 UART: [fht] FHT @ 0x50003400
3,859,492 UART: [idev] ++
3,860,196 UART: [idev] CDI.KEYID = 6
3,861,188 UART: [idev] SUBJECT.KEYID = 7
3,862,353 UART: [idev] UDS.KEYID = 0
3,863,271 ready_for_fw is high
3,863,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,261 UART: [idev] Erasing UDS.KEYID = 0
6,337,743 UART: [idev] Sha1 KeyId Algorithm
6,359,833 UART: [idev] --
6,365,610 UART: [ldev] ++
6,366,337 UART: [ldev] CDI.KEYID = 6
6,367,392 UART: [ldev] SUBJECT.KEYID = 5
6,368,488 UART: [ldev] AUTHORITY.KEYID = 7
6,369,656 UART: [ldev] FE.KEYID = 1
6,380,400 UART: [ldev] Erasing FE.KEYID = 1
8,854,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,484 UART: [ldev] --
10,643,485 UART: [fwproc] Wait for Commands...
10,645,096 UART: [fwproc] Recv command 0x46574c44
10,647,402 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,838,984 >>> mbox cmd response: success
14,842,470 UART: [afmc] ++
14,843,170 UART: [afmc] CDI.KEYID = 6
14,844,350 UART: [afmc] SUBJECT.KEYID = 7
14,845,838 UART: [afmc] AUTHORITY.KEYID = 5
17,352,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,747 UART: [afmc] --
19,145,796 UART: [cold-reset] --
19,149,881 UART: [state] Locking Datavault
19,155,023 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,164 UART: [state] Locking ICCM
19,159,418 UART: [exit] Launching FMC @ 0x40000130
19,168,094 UART:
19,168,332 UART: Running Caliptra FMC ...
19,169,423 UART:
19,169,576 UART: [state] CFI Enabled
19,177,775 UART: [fht] FMC Alias Private Key: 7
20,935,104 UART: [art] Extend RT PCRs Done
20,936,339 UART: [art] Lock RT PCRs Done
20,937,968 UART: [art] Populate DV Done
20,943,155 UART: [fht] FMC Alias Private Key: 7
20,944,684 UART: [art] Derive CDI
20,945,438 UART: [art] Store in in slot 0x4
20,988,293 UART: [art] Derive Key Pair
20,989,323 UART: [art] Store priv key in slot 0x5
23,416,105 UART: [art] Derive Key Pair - Done
23,428,927 UART: [art] Signing Cert with AUTHO
23,430,224 UART: RITY.KEYID = 7
25,135,774 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,283 UART: [art] PUB.X = BDF94F7CA478C8CFC2300B6E41117B977FE2CDB0525EC8EE5D2F8D29804155DA6A1AE16C45C4B83EB6FC6D57B29EDE4E
25,144,569 UART: [art] PUB.Y = DC1F75AF5899928FD4155F3FAA1A12340D65385F95125397BF4E1BC2D426478489F794F732F8E4645CF56BFE8F039108
25,151,833 UART: [art] SIG.R = 8D19C1B2A2741680F0A2A01702EA14587313D00246C0C63C2BE08B1D33CE10375F65B167D9ED2496AE590E07D77847DC
25,159,200 UART: [art] SIG.S = 28676FFCA35D9343DEA3FACAF58B1E5393F02AC99BDE5B3595F2ECB21636F15B4B69BA5BB1BEC54C04C75BEB78CF8417
26,138,066 UART: Caliptra RT
26,138,797 UART: [state] CFI Enabled
26,255,442 UART: [rt] RT listening for mailbox commands...
26,257,326 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,287,847 UART: [rt]cmd =0x53574545, len=84
26,291,327 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,753,536 ready_for_fw is high
3,754,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,906 >>> mbox cmd response: success
19,201,833 UART:
19,202,224 UART: Running Caliptra FMC ...
19,203,415 UART:
19,203,575 UART: [state] CFI Enabled
19,211,726 UART: [fht] FMC Alias Private Key: 7
20,969,062 UART: [art] Extend RT PCRs Done
20,970,314 UART: [art] Lock RT PCRs Done
20,972,179 UART: [art] Populate DV Done
20,977,738 UART: [fht] FMC Alias Private Key: 7
20,979,275 UART: [art] Derive CDI
20,980,003 UART: [art] Store in in slot 0x4
21,022,600 UART: [art] Derive Key Pair
21,023,642 UART: [art] Store priv key in slot 0x5
23,450,443 UART: [art] Derive Key Pair - Done
23,463,301 UART: [art] Signing Cert with AUTHO
23,464,604 UART: RITY.KEYID = 7
25,170,194 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,840 UART: [art] PUB.X = F6EB287B39E68EF02043E66A351ACB0D60AFB685F3D6CFC108D0DE6053C5FBC5B9BF0C172C88C3B31878CFFFA0E75543
25,179,025 UART: [art] PUB.Y = D8ED9701D93666A182CAF64887788BFAA14B3D8B810DB679EE5FD9A282553D4D7A22B34881A8CDE4AA7EE1F535DAA7E8
25,186,277 UART: [art] SIG.R = C59E24C00C9E8D894A3CFCAB0668035E4C6350941350ACB9B08B54F51EE09CD7D02563F82B9074CD49E9753076F974A1
25,193,647 UART: [art] SIG.S = AEC316EA959F11A616E5D8EF8E2E8114AAE8A61F5399AAAC76209038A9F07E6153953C56E782D27AB1FAA95AE66803F1
26,172,176 UART: Caliptra RT
26,172,905 UART: [state] CFI Enabled
26,290,910 UART: [rt] RT listening for mailbox commands...
26,292,927 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,323,637 UART: [rt]cmd =0x53574545, len=84
26,327,386 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
907,054 UART: [kat] LMS
1,475,250 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,659 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 ready_for_fw is high
1,480,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,544 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,080 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,533 UART: [ldev] Erasing FE.KEYID = 1
1,546,686 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,708 UART: [ldev] --
1,586,023 UART: [fwproc] Waiting for Commands...
1,586,802 UART: [fwproc] Received command 0x46574c44
1,587,593 UART: [fwproc] Received Image of size 114448 bytes
2,887,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,936 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,345 >>> mbox cmd response: success
3,081,401 UART: [afmc] ++
3,081,569 UART: [afmc] CDI.KEYID = 6
3,081,931 UART: [afmc] SUBJECT.KEYID = 7
3,082,356 UART: [afmc] AUTHORITY.KEYID = 5
3,117,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,334 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,024 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,875 UART: [afmc] --
3,160,945 UART: [cold-reset] --
3,162,077 UART: [state] Locking Datavault
3,163,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,016 UART: [state] Locking ICCM
3,164,622 UART: [exit] Launching FMC @ 0x40000130
3,169,951 UART:
3,169,967 UART: Running Caliptra FMC ...
3,170,375 UART:
3,170,429 UART: [state] CFI Enabled
3,180,916 UART: [fht] FMC Alias Private Key: 7
3,289,115 UART: [art] Extend RT PCRs Done
3,289,543 UART: [art] Lock RT PCRs Done
3,291,099 UART: [art] Populate DV Done
3,299,202 UART: [fht] FMC Alias Private Key: 7
3,300,170 UART: [art] Derive CDI
3,300,450 UART: [art] Store in in slot 0x4
3,386,807 UART: [art] Derive Key Pair
3,387,167 UART: [art] Store priv key in slot 0x5
3,400,691 UART: [art] Derive Key Pair - Done
3,415,713 UART: [art] Signing Cert with AUTHO
3,416,193 UART: RITY.KEYID = 7
3,431,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,092 UART: [art] PUB.X = 79A63E60D19BBCBA54B606EEBB0BEE2D8AF3E83C57895379475B8FEF667B80E62C209831BFB6DC2A20422C7EB54E07A4
3,438,869 UART: [art] PUB.Y = 1500B2F7661703360ED268D0861C50F23C63C47AB26554B69D2E667B799D2EE49D69D0B36DC0ACAF939C6265F60085AD
3,445,769 UART: [art] SIG.R = A72555B5A3B737B08953FABA8D681226613FD450FAE7404C6FC6BA7DE8CAF87615D7C5471A190A5E32DEA94DE36639C9
3,452,546 UART: [art] SIG.S = A14AEDC234B4DFE79A5719FFF916A97A89641ACB57454FC2B68F74810562773FD37EF82C041778D9A26D3ADE93DD6473
3,475,917 UART: Caliptra RT
3,476,170 UART: [state] CFI Enabled
3,584,572 UART: [rt] RT listening for mailbox commands...
3,585,242 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,620 UART: [rt]cmd =0x53574545, len=84
3,619,225 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 ready_for_fw is high
1,362,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,303 >>> mbox cmd response: success
2,988,287 UART:
2,988,303 UART: Running Caliptra FMC ...
2,988,711 UART:
2,988,765 UART: [state] CFI Enabled
2,999,472 UART: [fht] FMC Alias Private Key: 7
3,107,297 UART: [art] Extend RT PCRs Done
3,107,725 UART: [art] Lock RT PCRs Done
3,109,079 UART: [art] Populate DV Done
3,117,480 UART: [fht] FMC Alias Private Key: 7
3,118,470 UART: [art] Derive CDI
3,118,750 UART: [art] Store in in slot 0x4
3,204,447 UART: [art] Derive Key Pair
3,204,807 UART: [art] Store priv key in slot 0x5
3,218,315 UART: [art] Derive Key Pair - Done
3,233,142 UART: [art] Signing Cert with AUTHO
3,233,622 UART: RITY.KEYID = 7
3,248,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,677 UART: [art] PUB.X = 123A368868D5D5DFFCC926AADBDB69CFA6A30E86D44F0D5C86F2B5ECFDCD0B715A2C92072DCA7D64B2B0EE1D1FD7EC86
3,256,467 UART: [art] PUB.Y = 5F92B273C20018457E7060CE7A7F9B73AB0C71A8397CDD6CC0AF2AC7D1112DFCD21E99846B8B43E7D02CB11F519EF222
3,263,404 UART: [art] SIG.R = 97F6DAD0563BC9219AED5868300E1E0F38A3FBB91F52C629CFB987ECC6A0D468B97921E8CC6E45563A1A7F9BAAACCC94
3,270,188 UART: [art] SIG.S = 6765BD0569E733444F262EE43873BD40DA02D252A1C01D6309C0E17BEF3CF0A33E36CFDE6A0BF7E7A0AAF5C00504BF40
3,293,535 UART: Caliptra RT
3,293,788 UART: [state] CFI Enabled
3,401,383 UART: [rt] RT listening for mailbox commands...
3,402,053 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,203 UART: [rt]cmd =0x53574545, len=84
3,435,104 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,664 UART: [kat] SHA2-256
882,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,710 UART: [kat] ++
886,862 UART: [kat] sha1
891,040 UART: [kat] SHA2-256
892,978 UART: [kat] SHA2-384
895,687 UART: [kat] SHA2-512-ACC
897,588 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,794 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 ready_for_fw is high
1,481,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,245 UART: [idev] Erasing UDS.KEYID = 0
1,506,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,627 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,522,552 UART: [ldev] Erasing FE.KEYID = 1
1,548,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,959 UART: [ldev] --
1,587,376 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46574c44
1,588,848 UART: [fwproc] Received Image of size 114448 bytes
2,888,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,246 >>> mbox cmd response: success
3,082,492 UART: [afmc] ++
3,082,660 UART: [afmc] CDI.KEYID = 6
3,083,022 UART: [afmc] SUBJECT.KEYID = 7
3,083,447 UART: [afmc] AUTHORITY.KEYID = 5
3,118,896 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,783 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,473 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,322 UART: [afmc] --
3,162,432 UART: [cold-reset] --
3,163,470 UART: [state] Locking Datavault
3,164,397 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,001 UART: [state] Locking ICCM
3,165,601 UART: [exit] Launching FMC @ 0x40000130
3,170,930 UART:
3,170,946 UART: Running Caliptra FMC ...
3,171,354 UART:
3,171,497 UART: [state] CFI Enabled
3,182,284 UART: [fht] FMC Alias Private Key: 7
3,290,403 UART: [art] Extend RT PCRs Done
3,290,831 UART: [art] Lock RT PCRs Done
3,292,331 UART: [art] Populate DV Done
3,300,294 UART: [fht] FMC Alias Private Key: 7
3,301,226 UART: [art] Derive CDI
3,301,506 UART: [art] Store in in slot 0x4
3,387,075 UART: [art] Derive Key Pair
3,387,435 UART: [art] Store priv key in slot 0x5
3,400,545 UART: [art] Derive Key Pair - Done
3,415,087 UART: [art] Signing Cert with AUTHO
3,415,567 UART: RITY.KEYID = 7
3,430,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,518 UART: [art] PUB.X = C8C39FC8D4A8D734AA9C837C9C43DE2199C350DF59C15E85584C47493C87E633132FF9C9C3BC8085AC3C0BB4A74B546D
3,438,295 UART: [art] PUB.Y = 61CD4DDFA1E0CC15E590DE9DFF80287C1B7ED4AE67C7BE7F00FEE153908FEC39A4815945493CE5D259B03B8A6BEC0F50
3,445,242 UART: [art] SIG.R = 93D75DF196665EBD7443D11234A88A57503783C64395E7CA7F8D4852D394B327C17B6BC7455FEC99320E7228B246C791
3,452,001 UART: [art] SIG.S = 73BA676CEDD85713773036EADEEB3FE62725BCE9E2070EDABFE18FFD9FDE0A7DAB54711653D54BAB56F0440E06DCAE3F
3,476,271 UART: Caliptra RT
3,476,616 UART: [state] CFI Enabled
3,585,405 UART: [rt] RT listening for mailbox commands...
3,586,075 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,271 UART: [rt]cmd =0x53574545, len=84
3,619,562 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,260 ready_for_fw is high
1,363,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,442 >>> mbox cmd response: success
2,993,604 UART:
2,993,620 UART: Running Caliptra FMC ...
2,994,028 UART:
2,994,171 UART: [state] CFI Enabled
3,004,536 UART: [fht] FMC Alias Private Key: 7
3,112,347 UART: [art] Extend RT PCRs Done
3,112,775 UART: [art] Lock RT PCRs Done
3,114,051 UART: [art] Populate DV Done
3,122,298 UART: [fht] FMC Alias Private Key: 7
3,123,290 UART: [art] Derive CDI
3,123,570 UART: [art] Store in in slot 0x4
3,208,727 UART: [art] Derive Key Pair
3,209,087 UART: [art] Store priv key in slot 0x5
3,222,287 UART: [art] Derive Key Pair - Done
3,237,539 UART: [art] Signing Cert with AUTHO
3,238,019 UART: RITY.KEYID = 7
3,253,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,250 UART: [art] PUB.X = 3A34D66CD8D6FACBC1188FB8018EB13804848D5677A97126605F526441179C9319D9BF9564107A3CE9CE08FCE7EB9C6A
3,261,015 UART: [art] PUB.Y = FBC1D5A161A0DE2EA4AB40D88CC65556AA334B0E9FDAE2479E9BA7054599DE6C06D3A37DAA126B4690A302A1EA035D53
3,267,968 UART: [art] SIG.R = DD3C0A6380D0DC14E299E29E36C8AC1D3973AA6D0A7E20537C27DDFE41871359FC8B01D513B5C8491ED7AD2F0354BBB7
3,274,740 UART: [art] SIG.S = BA6C3D74A93F2582B043D853B50BEBBB88B48974DA0CCEEDEA2B8BC1520ACD675381F5E13C382E696C2C02FF75527682
3,298,975 UART: Caliptra RT
3,299,320 UART: [state] CFI Enabled
3,407,556 UART: [rt] RT listening for mailbox commands...
3,408,226 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,688 UART: [rt]cmd =0x53574545, len=84
3,441,677 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,638 UART: [kat] SHA2-512-ACC
908,539 UART: [kat] ECC-384
918,294 UART: [kat] HMAC-384Kdf
922,638 UART: [kat] LMS
1,170,966 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,171,903 UART: [fht] FHT @ 0x50003400
1,174,662 UART: [idev] ++
1,174,830 UART: [idev] CDI.KEYID = 6
1,175,190 UART: [idev] SUBJECT.KEYID = 7
1,175,614 UART: [idev] UDS.KEYID = 0
1,175,959 ready_for_fw is high
1,175,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,637 UART: [idev] Sha1 KeyId Algorithm
1,209,135 UART: [idev] --
1,210,309 UART: [ldev] ++
1,210,477 UART: [ldev] CDI.KEYID = 6
1,210,840 UART: [ldev] SUBJECT.KEYID = 5
1,211,266 UART: [ldev] AUTHORITY.KEYID = 7
1,211,729 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,571 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,478 >>> mbox cmd response: success
2,776,720 UART: [afmc] ++
2,776,888 UART: [afmc] CDI.KEYID = 6
2,777,250 UART: [afmc] SUBJECT.KEYID = 7
2,777,675 UART: [afmc] AUTHORITY.KEYID = 5
2,813,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,389 UART: [afmc] --
2,856,513 UART: [cold-reset] --
2,857,245 UART: [state] Locking Datavault
2,858,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,994 UART: [state] Locking ICCM
2,859,540 UART: [exit] Launching FMC @ 0x40000130
2,864,869 UART:
2,864,885 UART: Running Caliptra FMC ...
2,865,293 UART:
2,865,347 UART: [state] CFI Enabled
2,875,860 UART: [fht] FMC Alias Private Key: 7
2,984,119 UART: [art] Extend RT PCRs Done
2,984,547 UART: [art] Lock RT PCRs Done
2,986,367 UART: [art] Populate DV Done
2,994,760 UART: [fht] FMC Alias Private Key: 7
2,995,748 UART: [art] Derive CDI
2,996,028 UART: [art] Store in in slot 0x4
3,081,211 UART: [art] Derive Key Pair
3,081,571 UART: [art] Store priv key in slot 0x5
3,094,221 UART: [art] Derive Key Pair - Done
3,108,441 UART: [art] Signing Cert with AUTHO
3,108,921 UART: RITY.KEYID = 7
3,123,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,684 UART: [art] PUB.X = A4A01D910ED5152C00D18CB4123387FB9B58C9D5A0C4911D3ABA19969CC71FBFA4E4FCF02FBCAC26FA55ABDF3EF7D6BF
3,131,459 UART: [art] PUB.Y = F6FE5B9817B59E6C37CD9B0A9B3F0C8B699FA71B2AADC8C86A8B79811C9D4C4815BD39A4375A9BCA03A5A899DF145415
3,138,416 UART: [art] SIG.R = F96B9C4A6E76B92F6C70199A7C563F9054BEB6871BCFA937293AB623A7641911AABEE0D2C87B920433C6A9823EA352A5
3,145,189 UART: [art] SIG.S = 9FA8426DB5E0F8C224D7C4214A139407D44A8EA7454D4EE3B86C62157F2911BD011309708451CDDC1943E19BE2D1F70E
3,169,146 UART: Caliptra RT
3,169,399 UART: [state] CFI Enabled
3,277,009 UART: [rt] RT listening for mailbox commands...
3,277,679 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,841 UART: [rt]cmd =0x53574545, len=84
3,310,542 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 ready_for_fw is high
1,060,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,881 >>> mbox cmd response: success
2,689,437 UART:
2,689,453 UART: Running Caliptra FMC ...
2,689,861 UART:
2,689,915 UART: [state] CFI Enabled
2,700,438 UART: [fht] FMC Alias Private Key: 7
2,807,939 UART: [art] Extend RT PCRs Done
2,808,367 UART: [art] Lock RT PCRs Done
2,809,955 UART: [art] Populate DV Done
2,818,430 UART: [fht] FMC Alias Private Key: 7
2,819,370 UART: [art] Derive CDI
2,819,650 UART: [art] Store in in slot 0x4
2,905,435 UART: [art] Derive Key Pair
2,905,795 UART: [art] Store priv key in slot 0x5
2,918,799 UART: [art] Derive Key Pair - Done
2,933,512 UART: [art] Signing Cert with AUTHO
2,933,992 UART: RITY.KEYID = 7
2,948,716 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,481 UART: [art] PUB.X = D4325241051B8A172BF3C554C4E45AD07801B94D37A314273D226408E39C0008ED968769DFB9B82F524E4F422305277C
2,956,204 UART: [art] PUB.Y = 9EA02ECD3CE38775BCE02092D63F0CC87FE15844419461A2C43A079CA446C612DE355115EFBF145832168E7D8B32334C
2,963,150 UART: [art] SIG.R = B2210E598FF06D275F6605D0CD04CEB65DF3ACA4A6FF8EE8F8C75A84F3E18EC659EB0AA9AB8319A9E408EE9903137280
2,969,918 UART: [art] SIG.S = C966D485566ED482F139FC096949881DD2F56324D532781A85B2248EE1B3FE2F03DA9EDF5B1053A52081CDDAC2FC3AE4
2,993,175 UART: Caliptra RT
2,993,428 UART: [state] CFI Enabled
3,101,130 UART: [rt] RT listening for mailbox commands...
3,101,800 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,300 UART: [rt]cmd =0x53574545, len=84
3,135,675 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,357 UART: [kat] HMAC-384Kdf
923,113 UART: [kat] LMS
1,171,441 UART: [kat] --
1,172,316 UART: [cold-reset] ++
1,172,772 UART: [fht] FHT @ 0x50003400
1,175,579 UART: [idev] ++
1,175,747 UART: [idev] CDI.KEYID = 6
1,176,107 UART: [idev] SUBJECT.KEYID = 7
1,176,531 UART: [idev] UDS.KEYID = 0
1,176,876 ready_for_fw is high
1,176,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,775 UART: [idev] Erasing UDS.KEYID = 0
1,201,660 UART: [idev] Sha1 KeyId Algorithm
1,210,270 UART: [idev] --
1,211,344 UART: [ldev] ++
1,211,512 UART: [ldev] CDI.KEYID = 6
1,211,875 UART: [ldev] SUBJECT.KEYID = 5
1,212,301 UART: [ldev] AUTHORITY.KEYID = 7
1,212,764 UART: [ldev] FE.KEYID = 1
1,217,870 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,510 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,449 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,935 >>> mbox cmd response: success
2,778,029 UART: [afmc] ++
2,778,197 UART: [afmc] CDI.KEYID = 6
2,778,559 UART: [afmc] SUBJECT.KEYID = 7
2,778,984 UART: [afmc] AUTHORITY.KEYID = 5
2,815,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,602 UART: [afmc] --
2,858,656 UART: [cold-reset] --
2,859,732 UART: [state] Locking Datavault
2,860,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,195 UART: [state] Locking ICCM
2,861,661 UART: [exit] Launching FMC @ 0x40000130
2,866,990 UART:
2,867,006 UART: Running Caliptra FMC ...
2,867,414 UART:
2,867,557 UART: [state] CFI Enabled
2,878,354 UART: [fht] FMC Alias Private Key: 7
2,986,145 UART: [art] Extend RT PCRs Done
2,986,573 UART: [art] Lock RT PCRs Done
2,988,055 UART: [art] Populate DV Done
2,996,464 UART: [fht] FMC Alias Private Key: 7
2,997,504 UART: [art] Derive CDI
2,997,784 UART: [art] Store in in slot 0x4
3,083,539 UART: [art] Derive Key Pair
3,083,899 UART: [art] Store priv key in slot 0x5
3,097,115 UART: [art] Derive Key Pair - Done
3,111,938 UART: [art] Signing Cert with AUTHO
3,112,418 UART: RITY.KEYID = 7
3,128,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,025 UART: [art] PUB.X = EB651DEF0A3D4275C0482A9D1A8E11FEA2C78711A566B441803B5C2FCA8E20A820192C20B1C1590BF59164B2E0815462
3,135,791 UART: [art] PUB.Y = E894DFB019CD01D67295A0D5F314E0C1A0F8410BD806265D9CAB3A10261ABA525C4135831D5AC1E09D27F4120A632646
3,142,731 UART: [art] SIG.R = 67FCD1766ADB29702AC07E303BAACEA0ECF1A9172D50A742389F7103E23C08FF4959E0689C81FB0048BE94B783DE99AA
3,149,485 UART: [art] SIG.S = 45C155AEC5F66A55985DA505FF4186CEDA1ED4F8F3537181F3C3A3FC4694D4CF25EC062346B9DB4AA6032D245704A11B
3,173,452 UART: Caliptra RT
3,173,797 UART: [state] CFI Enabled
3,281,758 UART: [rt] RT listening for mailbox commands...
3,282,428 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,936 UART: [rt]cmd =0x53574545, len=84
3,316,123 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,684 ready_for_fw is high
1,060,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,428 >>> mbox cmd response: success
2,691,864 UART:
2,691,880 UART: Running Caliptra FMC ...
2,692,288 UART:
2,692,431 UART: [state] CFI Enabled
2,703,392 UART: [fht] FMC Alias Private Key: 7
2,811,785 UART: [art] Extend RT PCRs Done
2,812,213 UART: [art] Lock RT PCRs Done
2,813,835 UART: [art] Populate DV Done
2,821,794 UART: [fht] FMC Alias Private Key: 7
2,822,884 UART: [art] Derive CDI
2,823,164 UART: [art] Store in in slot 0x4
2,908,749 UART: [art] Derive Key Pair
2,909,109 UART: [art] Store priv key in slot 0x5
2,922,251 UART: [art] Derive Key Pair - Done
2,937,081 UART: [art] Signing Cert with AUTHO
2,937,561 UART: RITY.KEYID = 7
2,952,511 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,276 UART: [art] PUB.X = 0F491509AD6F13E5059AEBAB7BEFB4678924A4553A89A3B0E2C77F4406BB018E78AD650893C38A353421D577B2CE3EF1
2,960,034 UART: [art] PUB.Y = 6EFEBAACDE5B35287CF3DC31C574B5D724E5F9A79AE8D38CAB080F9A447708776A50BBB221E1E5055D3744252F947535
2,966,982 UART: [art] SIG.R = 6B8A98D73E059716B44DAD56BF530C168CBDFF9867A75EEFBC26016F2EE32123888B595D20A3471A331AB4CAB1B8CDD9
2,973,757 UART: [art] SIG.S = 92CF2B1DE0F34F91B605CF0C66C4A19ABA76F398456FD4908A019F4ABB02D26A7D6F2B349BD7D6F0734D1DC254BA9A9E
2,997,940 UART: Caliptra RT
2,998,285 UART: [state] CFI Enabled
3,105,970 UART: [rt] RT listening for mailbox commands...
3,106,640 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,976 UART: [rt]cmd =0x53574545, len=84
3,140,167 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
88,218 UART: [kat] SHA2-256
891,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,897 UART: [kat] ++
896,049 UART: [kat] sha1
900,453 UART: [kat] SHA2-256
902,393 UART: [kat] SHA2-384
905,098 UART: [kat] SHA2-512-ACC
906,999 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,569 UART: [cold-reset] ++
1,171,127 UART: [fht] FHT @ 0x50003400
1,173,847 UART: [idev] ++
1,174,015 UART: [idev] CDI.KEYID = 6
1,174,376 UART: [idev] SUBJECT.KEYID = 7
1,174,801 UART: [idev] UDS.KEYID = 0
1,175,147 ready_for_fw is high
1,175,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,709 UART: [idev] Erasing UDS.KEYID = 0
1,199,991 UART: [idev] Sha1 KeyId Algorithm
1,208,937 UART: [idev] --
1,210,036 UART: [ldev] ++
1,210,204 UART: [ldev] CDI.KEYID = 6
1,210,568 UART: [ldev] SUBJECT.KEYID = 5
1,210,995 UART: [ldev] AUTHORITY.KEYID = 7
1,211,458 UART: [ldev] FE.KEYID = 1
1,216,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,728 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,845 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,824 >>> mbox cmd response: success
2,775,921 UART: [afmc] ++
2,776,089 UART: [afmc] CDI.KEYID = 6
2,776,452 UART: [afmc] SUBJECT.KEYID = 7
2,776,878 UART: [afmc] AUTHORITY.KEYID = 5
2,812,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,606 UART: [afmc] --
2,855,536 UART: [cold-reset] --
2,856,426 UART: [state] Locking Datavault
2,857,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,401 UART: [state] Locking ICCM
2,858,831 UART: [exit] Launching FMC @ 0x40000130
2,864,160 UART:
2,864,176 UART: Running Caliptra FMC ...
2,864,584 UART:
2,864,638 UART: [state] CFI Enabled
2,875,355 UART: [fht] FMC Alias Private Key: 7
2,983,328 UART: [art] Extend RT PCRs Done
2,983,756 UART: [art] Lock RT PCRs Done
2,985,306 UART: [art] Populate DV Done
2,993,479 UART: [fht] FMC Alias Private Key: 7
2,994,507 UART: [art] Derive CDI
2,994,787 UART: [art] Store in in slot 0x4
3,080,704 UART: [art] Derive Key Pair
3,081,064 UART: [art] Store priv key in slot 0x5
3,094,558 UART: [art] Derive Key Pair - Done
3,109,531 UART: [art] Signing Cert with AUTHO
3,110,011 UART: RITY.KEYID = 7
3,125,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,028 UART: [art] PUB.X = 96855C911845125B5EB7DDC70C7842E4CF33ED27434B92044AEDAB33FF20E8E0F70730E5F71AD32755F561E7556DBA6B
3,132,795 UART: [art] PUB.Y = 3916922AEA62E4E4DC4966C5D7B6A73837B0867FDF88380630C00BCCE7AA1DA3AE0CEE30A5BAD62F6182A5D0EF3FD3EB
3,139,758 UART: [art] SIG.R = ACAD535E62A9E2D87101EA50DB48629F418962AC208360F7609A3A822FBDEBB161F71823134B9E126E918566E60D1880
3,146,520 UART: [art] SIG.S = D1A384A85693216E3C68B18CB1E55C72BC2F506F8D00DA0DDABE38CCF287C6BD5D3195445D4AE603739365125F967D85
3,169,797 UART: Caliptra RT
3,170,050 UART: [state] CFI Enabled
3,279,124 UART: [rt] RT listening for mailbox commands...
3,279,794 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,204 UART: [rt]cmd =0x53574545, len=84
3,313,485 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,268 ready_for_fw is high
1,056,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,834 >>> mbox cmd response: success
2,685,584 UART:
2,685,600 UART: Running Caliptra FMC ...
2,686,008 UART:
2,686,062 UART: [state] CFI Enabled
2,696,353 UART: [fht] FMC Alias Private Key: 7
2,804,788 UART: [art] Extend RT PCRs Done
2,805,216 UART: [art] Lock RT PCRs Done
2,806,740 UART: [art] Populate DV Done
2,814,863 UART: [fht] FMC Alias Private Key: 7
2,815,865 UART: [art] Derive CDI
2,816,145 UART: [art] Store in in slot 0x4
2,901,650 UART: [art] Derive Key Pair
2,902,010 UART: [art] Store priv key in slot 0x5
2,914,110 UART: [art] Derive Key Pair - Done
2,928,860 UART: [art] Signing Cert with AUTHO
2,929,340 UART: RITY.KEYID = 7
2,945,168 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,933 UART: [art] PUB.X = 5C7807AF06E8C04E58CC396AFF6E798D44BB3A96BE1C2187B892EDD310E3964A7429FFBB696531A4F00B3EF64C7A3882
2,952,704 UART: [art] PUB.Y = E6610C3AC7206BDF9B83F75F81F7F9317757E301AB81BC9B4A95071BD535486F4920C95F67228D12C67910D44E208E11
2,959,641 UART: [art] SIG.R = 648A42F8D0FBB80F34852402C85E6E948DF80A800AE722EEA2924E940855605D4659FB6FFD8B6B3D4754309C060048B5
2,966,369 UART: [art] SIG.S = F6C3D0A343F6D55A4B8CBCAA63FFCCFB581D1165EFA42BCD74676B364D4352BC2D8F67F3B42063D316B68C24EAB166FC
2,990,032 UART: Caliptra RT
2,990,285 UART: [state] CFI Enabled
3,097,196 UART: [rt] RT listening for mailbox commands...
3,097,866 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,336 UART: [rt]cmd =0x53574545, len=84
3,131,925 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
915,671 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,426 UART: [idev] ++
1,172,594 UART: [idev] CDI.KEYID = 6
1,172,955 UART: [idev] SUBJECT.KEYID = 7
1,173,380 UART: [idev] UDS.KEYID = 0
1,173,726 ready_for_fw is high
1,173,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,644 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,718 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,241,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,329 UART: [ldev] --
1,280,771 UART: [fwproc] Wait for Commands...
1,281,582 UART: [fwproc] Recv command 0x46574c44
1,282,315 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,939 >>> mbox cmd response: success
2,775,128 UART: [afmc] ++
2,775,296 UART: [afmc] CDI.KEYID = 6
2,775,659 UART: [afmc] SUBJECT.KEYID = 7
2,776,085 UART: [afmc] AUTHORITY.KEYID = 5
2,812,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,709 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,965 UART: [afmc] --
2,856,077 UART: [cold-reset] --
2,856,827 UART: [state] Locking Datavault
2,857,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,574 UART: [state] Locking ICCM
2,859,162 UART: [exit] Launching FMC @ 0x40000130
2,864,491 UART:
2,864,507 UART: Running Caliptra FMC ...
2,864,915 UART:
2,865,058 UART: [state] CFI Enabled
2,875,745 UART: [fht] FMC Alias Private Key: 7
2,983,784 UART: [art] Extend RT PCRs Done
2,984,212 UART: [art] Lock RT PCRs Done
2,985,386 UART: [art] Populate DV Done
2,993,395 UART: [fht] FMC Alias Private Key: 7
2,994,399 UART: [art] Derive CDI
2,994,679 UART: [art] Store in in slot 0x4
3,080,388 UART: [art] Derive Key Pair
3,080,748 UART: [art] Store priv key in slot 0x5
3,093,882 UART: [art] Derive Key Pair - Done
3,108,404 UART: [art] Signing Cert with AUTHO
3,108,884 UART: RITY.KEYID = 7
3,124,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,899 UART: [art] PUB.X = 74105D1F6C84B7A7BFB76378FF811C5C0A12DDBAC85D2C52058B14112A5AAA71A0EAA0B28F6B28748EFDC9F3C2947C04
3,131,676 UART: [art] PUB.Y = B8B31DAEDB971222A9C0BB2E811152FF4DB589DB665AFE4E2815A43624C0FD8A0418E28629C8CEFCB945A910F007CA1F
3,138,636 UART: [art] SIG.R = 29FF25A5B66B01F4FAAEB64D781799F92FDF82F93C5FADD50667BD06B1D7230F663B65049F32D7AD937A888F10417891
3,145,397 UART: [art] SIG.S = 6F13407593380171276F1DB5A4BF71AB195C182DAEBF64CF32158C0F1541A65487F34442797D4E278B60E6076C3BD3D8
3,169,151 UART: Caliptra RT
3,169,496 UART: [state] CFI Enabled
3,277,877 UART: [rt] RT listening for mailbox commands...
3,278,547 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,893 UART: [rt]cmd =0x53574545, len=84
3,311,760 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,173 >>> mbox cmd response: success
2,689,111 UART:
2,689,127 UART: Running Caliptra FMC ...
2,689,535 UART:
2,689,678 UART: [state] CFI Enabled
2,700,405 UART: [fht] FMC Alias Private Key: 7
2,808,344 UART: [art] Extend RT PCRs Done
2,808,772 UART: [art] Lock RT PCRs Done
2,810,316 UART: [art] Populate DV Done
2,818,325 UART: [fht] FMC Alias Private Key: 7
2,819,295 UART: [art] Derive CDI
2,819,575 UART: [art] Store in in slot 0x4
2,905,258 UART: [art] Derive Key Pair
2,905,618 UART: [art] Store priv key in slot 0x5
2,919,224 UART: [art] Derive Key Pair - Done
2,933,948 UART: [art] Signing Cert with AUTHO
2,934,428 UART: RITY.KEYID = 7
2,949,760 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,525 UART: [art] PUB.X = 9FD0491E4E1FA0C3D261C866A3FBF1887B20CC70F852D5A613C3EEB8E567B84F2300EBCFB70105B87DB2FAC3039D77DD
2,957,282 UART: [art] PUB.Y = 7F9463E5EB03949A0E9F8C9D130D3C51B4F5A0A6F2A6978BB4D7D0ED59F1C62C7027E1A2D1A37D71B49FB2D2414B96B9
2,964,235 UART: [art] SIG.R = 8BB78ADAEC3EF86E7FF68FCA9A26B63F01808EE812BC4336BBBA92FE65D5368FBA32C6B3A227A7B0EE9D09E4BD2B0061
2,971,003 UART: [art] SIG.S = 8ADC64E6903E968D1496BF9640FF44E599586B7DC8A23878BCFFC7A1FD61F5557EC1E514412E92F62550120FBC553458
2,994,175 UART: Caliptra RT
2,994,520 UART: [state] CFI Enabled
3,102,452 UART: [rt] RT listening for mailbox commands...
3,103,122 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,410 UART: [rt]cmd =0x53574545, len=84
3,136,387 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,005 UART:
192,379 UART: Running Caliptra ROM ...
193,485 UART:
193,632 UART: [state] CFI Enabled
265,635 UART: [state] LifecycleState = Unprovisioned
267,547 UART: [state] DebugLocked = No
269,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,372 UART: [kat] SHA2-256
443,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,542 UART: [kat] ++
454,072 UART: [kat] sha1
465,595 UART: [kat] SHA2-256
468,253 UART: [kat] SHA2-384
474,312 UART: [kat] SHA2-512-ACC
476,680 UART: [kat] ECC-384
2,764,972 UART: [kat] HMAC-384Kdf
2,777,562 UART: [kat] LMS
3,967,850 UART: [kat] --
3,972,595 UART: [cold-reset] ++
3,973,609 UART: [fht] Storing FHT @ 0x50003400
3,985,590 UART: [idev] ++
3,986,159 UART: [idev] CDI.KEYID = 6
3,987,157 UART: [idev] SUBJECT.KEYID = 7
3,988,332 UART: [idev] UDS.KEYID = 0
3,989,396 ready_for_fw is high
3,989,610 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,228 UART: [idev] Erasing UDS.KEYID = 0
7,323,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,721 UART: [idev] --
7,350,172 UART: [ldev] ++
7,350,792 UART: [ldev] CDI.KEYID = 6
7,351,758 UART: [ldev] SUBJECT.KEYID = 5
7,352,975 UART: [ldev] AUTHORITY.KEYID = 7
7,354,214 UART: [ldev] FE.KEYID = 1
7,398,375 UART: [ldev] Erasing FE.KEYID = 1
10,732,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,463 UART: [ldev] --
13,112,859 UART: [fwproc] Waiting for Commands...
13,114,626 UART: [fwproc] Received command 0x46574c44
13,116,812 UART: [fwproc] Received Image of size 114124 bytes
17,171,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,610 >>> mbox cmd response: success
17,642,203 UART: [afmc] ++
17,642,853 UART: [afmc] CDI.KEYID = 6
17,643,786 UART: [afmc] SUBJECT.KEYID = 7
17,645,007 UART: [afmc] AUTHORITY.KEYID = 5
21,009,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,669 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,927 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,313 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,175 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,602 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,884 UART: [afmc] --
23,377,079 UART: [cold-reset] --
23,379,718 UART: [state] Locking Datavault
23,384,858 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,555 UART: [state] Locking ICCM
23,387,732 UART: [exit] Launching FMC @ 0x40000130
23,396,127 UART:
23,396,361 UART: Running Caliptra FMC ...
23,397,479 UART:
23,397,639 UART: [state] CFI Enabled
23,465,121 UART: [fht] FMC Alias Private Key: 7
25,803,373 UART: [art] Extend RT PCRs Done
25,804,590 UART: [art] Lock RT PCRs Done
25,806,055 UART: [art] Populate DV Done
25,811,200 UART: [fht] FMC Alias Private Key: 7
25,812,851 UART: [art] Derive CDI
25,813,600 UART: [art] Store in in slot 0x4
25,873,680 UART: [art] Derive Key Pair
25,874,725 UART: [art] Store priv key in slot 0x5
29,167,538 UART: [art] Derive Key Pair - Done
29,180,530 UART: [art] Signing Cert with AUTHO
29,181,829 UART: RITY.KEYID = 7
31,468,822 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,321 UART: [art] PUB.X = 5B5A7E0C2CF952207005707ECE7D18AA2905F1B8967A49733F0EC3BC4E6F620A5C3E6C1BA7040B9CD38B533730BA5231
31,477,541 UART: [art] PUB.Y = 95198CEB5A58B56EF7B26E568DA643409D68C5748AE51B5872A786087CB46122D90F8F45023A710730DF4FF7BECDFEB6
31,484,775 UART: [art] SIG.R = D9EC12941BB2B96A75027A7B788DF6F5B24D35F450F318B2CC7DAC6D7C6507F6A421DE11096C15037DAC6CB7C8C5257C
31,492,177 UART: [art] SIG.S = 586AC3624319A1F051D8DEF6BF962602C90E54222B459A80D33F36D2EE86C94F63217F61440FF8D6EAA54D150826D7D5
32,796,773 UART: Caliptra RT
32,797,486 UART: [state] CFI Enabled
32,958,807 UART: [rt] RT listening for mailbox commands...
32,960,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,991,668 UART: [rt]cmd =0x44504543, len=96
38,734,085 >>> mbox cmd response data (6236 bytes)
38,763,291 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,793,922 UART: [rt]cmd =0x53574545, len=84
44,379,351 >>> mbox cmd response data (200 bytes)
44,763,598 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,793,920 UART: [rt]cmd =0x52564348, len=36
44,796,610 >>> mbox cmd response data (8 bytes)
44,797,041 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,827,231 UART: [rt]cmd =0x53574545, len=84
44,830,711 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,785,362 ready_for_fw is high
3,785,921 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,879,019 >>> mbox cmd response: success
23,568,889 UART:
23,569,260 UART: Running Caliptra FMC ...
23,570,464 UART:
23,570,652 UART: [state] CFI Enabled
23,635,565 UART: [fht] FMC Alias Private Key: 7
25,973,605 UART: [art] Extend RT PCRs Done
25,974,883 UART: [art] Lock RT PCRs Done
25,976,762 UART: [art] Populate DV Done
25,982,464 UART: [fht] FMC Alias Private Key: 7
25,984,117 UART: [art] Derive CDI
25,984,937 UART: [art] Store in in slot 0x4
26,044,056 UART: [art] Derive Key Pair
26,045,111 UART: [art] Store priv key in slot 0x5
29,336,643 UART: [art] Derive Key Pair - Done
29,349,376 UART: [art] Signing Cert with AUTHO
29,350,690 UART: RITY.KEYID = 7
31,639,451 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,972 UART: [art] PUB.X = C4B12715480FFFB7BD36013E296EB0E5CDEE0F0CE246B3E5128360CCE83A82839B4021E1FCD30CF1F6CD5179B3BAAD45
31,648,256 UART: [art] PUB.Y = 15E02836C9BC24F6D22970DC185E0CAE8862B8FB9F97C6167CB2BFCBBC140506BC039FDD311300C49712A203DEF95702
31,655,472 UART: [art] SIG.R = 2976838BD114379DE8145999441C84CB78040A921581B9E5CC1E6EE9D7A63D9111521B39D36E2E77747992AF322EECC9
31,662,817 UART: [art] SIG.S = 1655965FA7100ED249FA288226C404B78123A7EBD542693EAD8C2B8CD0D357F9D01E278CD3DF92C12768A14D345052CD
32,968,291 UART: Caliptra RT
32,969,009 UART: [state] CFI Enabled
33,130,931 UART: [rt] RT listening for mailbox commands...
33,133,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,164,061 UART: [rt]cmd =0x44504543, len=96
38,946,407 >>> mbox cmd response data (6236 bytes)
38,975,757 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,006,299 UART: [rt]cmd =0x53574545, len=84
44,591,050 >>> mbox cmd response data (200 bytes)
44,977,462 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,007,829 UART: [rt]cmd =0x52564348, len=36
45,010,602 >>> mbox cmd response data (8 bytes)
45,010,962 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,041,428 UART: [rt]cmd =0x53574545, len=84
45,044,854 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,518 UART:
192,872 UART: Running Caliptra ROM ...
194,059 UART:
603,580 UART: [state] CFI Enabled
616,270 UART: [state] LifecycleState = Unprovisioned
618,234 UART: [state] DebugLocked = No
619,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,501 UART: [kat] SHA2-256
794,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,820 UART: [kat] ++
805,294 UART: [kat] sha1
817,512 UART: [kat] SHA2-256
820,175 UART: [kat] SHA2-384
825,948 UART: [kat] SHA2-512-ACC
828,322 UART: [kat] ECC-384
3,114,973 UART: [kat] HMAC-384Kdf
3,126,085 UART: [kat] LMS
4,316,174 UART: [kat] --
4,317,922 UART: [cold-reset] ++
4,318,875 UART: [fht] Storing FHT @ 0x50003400
4,329,851 UART: [idev] ++
4,330,423 UART: [idev] CDI.KEYID = 6
4,331,376 UART: [idev] SUBJECT.KEYID = 7
4,332,610 UART: [idev] UDS.KEYID = 0
4,333,560 ready_for_fw is high
4,333,762 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,128 UART: [idev] Erasing UDS.KEYID = 0
7,616,782 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,215 UART: [idev] --
7,642,774 UART: [ldev] ++
7,643,393 UART: [ldev] CDI.KEYID = 6
7,644,352 UART: [ldev] SUBJECT.KEYID = 5
7,645,559 UART: [ldev] AUTHORITY.KEYID = 7
7,646,784 UART: [ldev] FE.KEYID = 1
7,656,506 UART: [ldev] Erasing FE.KEYID = 1
10,947,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,932 UART: [ldev] --
13,305,897 UART: [fwproc] Waiting for Commands...
13,307,772 UART: [fwproc] Received command 0x46574c44
13,309,998 UART: [fwproc] Received Image of size 114124 bytes
17,364,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,082 >>> mbox cmd response: success
17,826,988 UART: [afmc] ++
17,827,582 UART: [afmc] CDI.KEYID = 6
17,828,467 UART: [afmc] SUBJECT.KEYID = 7
17,829,677 UART: [afmc] AUTHORITY.KEYID = 5
21,148,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,577 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,983 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,802 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,245 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,994 UART: [afmc] --
23,513,733 UART: [cold-reset] --
23,517,239 UART: [state] Locking Datavault
23,523,518 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,270 UART: [state] Locking ICCM
23,526,422 UART: [exit] Launching FMC @ 0x40000130
23,534,808 UART:
23,535,033 UART: Running Caliptra FMC ...
23,536,056 UART:
23,536,199 UART: [state] CFI Enabled
23,544,479 UART: [fht] FMC Alias Private Key: 7
25,874,743 UART: [art] Extend RT PCRs Done
25,875,965 UART: [art] Lock RT PCRs Done
25,877,701 UART: [art] Populate DV Done
25,883,213 UART: [fht] FMC Alias Private Key: 7
25,884,962 UART: [art] Derive CDI
25,885,773 UART: [art] Store in in slot 0x4
25,928,047 UART: [art] Derive Key Pair
25,929,107 UART: [art] Store priv key in slot 0x5
29,171,135 UART: [art] Derive Key Pair - Done
29,184,076 UART: [art] Signing Cert with AUTHO
29,185,418 UART: RITY.KEYID = 7
31,465,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,587 UART: [art] PUB.X = 9E67C6976DFEFA829C7066A26926C8DAA186BAE9D5CDA9200C62AD4F5E24FFF9E25B8E00336023E50D5D751EBA439D61
31,473,858 UART: [art] PUB.Y = 0BAFFA275FFD29A8C70135BFED7906B5D0BC6200E325C75F3304DDE1282E8134955F62E080BF458714E8A723D474381D
31,481,077 UART: [art] SIG.R = 9CC65446DA7B85B5A9AB7FD73DE262DFF7A94ED70B0277175A77D39295DDF03072AA9C03C0309841E0D81141ECEB2AAA
31,488,463 UART: [art] SIG.S = 05058889E72E34805998D5041DBC21F6F40CA23DBA1C6118EF9C66B4592787A455F1B72E563104789FCD29228863CD32
32,793,483 UART: Caliptra RT
32,794,200 UART: [state] CFI Enabled
32,911,563 UART: [rt] RT listening for mailbox commands...
32,913,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,944,528 UART: [rt]cmd =0x44504543, len=96
38,616,706 >>> mbox cmd response data (6236 bytes)
38,646,062 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,676,661 UART: [rt]cmd =0x53574545, len=84
44,201,005 >>> mbox cmd response data (200 bytes)
44,592,238 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,622,494 UART: [rt]cmd =0x52564348, len=36
44,625,380 >>> mbox cmd response data (8 bytes)
44,625,740 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,656,345 UART: [rt]cmd =0x53574545, len=84
44,659,736 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,125,882 ready_for_fw is high
4,126,286 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,006 >>> mbox cmd response: success
23,716,281 UART:
23,717,231 UART: Running Caliptra FMC ...
23,718,375 UART:
23,718,527 UART: [state] CFI Enabled
23,726,108 UART: [fht] FMC Alias Private Key: 7
26,057,000 UART: [art] Extend RT PCRs Done
26,058,263 UART: [art] Lock RT PCRs Done
26,059,814 UART: [art] Populate DV Done
26,065,453 UART: [fht] FMC Alias Private Key: 7
26,067,068 UART: [art] Derive CDI
26,067,807 UART: [art] Store in in slot 0x4
26,110,399 UART: [art] Derive Key Pair
26,111,402 UART: [art] Store priv key in slot 0x5
29,353,230 UART: [art] Derive Key Pair - Done
29,366,426 UART: [art] Signing Cert with AUTHO
29,367,742 UART: RITY.KEYID = 7
31,647,271 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,785 UART: [art] PUB.X = E20489734684F9708F2C66FAA98AFF4AC9A0DBA862B2EBD967932BA7F2DED156EA238CB28E3ACFAC5ACE4F18EEE3015F
31,656,019 UART: [art] PUB.Y = B27604CB38B287E183FF68B4ADA5E001C28A6F4CE2E3F4431957EAB32FF75E1C0D9DFEF40141306C624BFE201F610594
31,663,307 UART: [art] SIG.R = 048CC03329F62400977FEB08876E96BDA5A74E16FA992D353D1A9ECC65F6FBB28488E6BC15821EB6886D0E94F5D60D1B
31,670,638 UART: [art] SIG.S = 5AA8E8399EE22D20942217C9DDB3BBCFA5BFE1F1CB130306194CD8580CE64866C019005F4260C0DA21A3A01FFD713556
32,975,829 UART: Caliptra RT
32,976,529 UART: [state] CFI Enabled
33,093,766 UART: [rt] RT listening for mailbox commands...
33,096,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,176 UART: [rt]cmd =0x44504543, len=96
38,799,481 >>> mbox cmd response data (6236 bytes)
38,828,712 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,859,564 UART: [rt]cmd =0x53574545, len=84
44,383,452 >>> mbox cmd response data (200 bytes)
44,770,097 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,800,664 UART: [rt]cmd =0x52564348, len=36
44,803,292 >>> mbox cmd response data (8 bytes)
44,803,639 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,834,040 UART: [rt]cmd =0x53574545, len=84
44,837,822 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,162 UART:
192,513 UART: Running Caliptra ROM ...
193,689 UART:
193,882 UART: [state] CFI Enabled
260,060 UART: [state] LifecycleState = Unprovisioned
261,977 UART: [state] DebugLocked = No
263,649 UART: [state] WD Timer not started. Device not locked for debugging
266,894 UART: [kat] SHA2-256
446,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,575 UART: [kat] ++
458,018 UART: [kat] sha1
468,960 UART: [kat] SHA2-256
471,986 UART: [kat] SHA2-384
478,732 UART: [kat] SHA2-512-ACC
481,668 UART: [kat] ECC-384
2,926,910 UART: [kat] HMAC-384Kdf
2,949,305 UART: [kat] LMS
3,478,763 UART: [kat] --
3,483,539 UART: [cold-reset] ++
3,485,916 UART: [fht] FHT @ 0x50003400
3,498,380 UART: [idev] ++
3,498,939 UART: [idev] CDI.KEYID = 6
3,499,997 UART: [idev] SUBJECT.KEYID = 7
3,501,106 UART: [idev] UDS.KEYID = 0
3,502,035 ready_for_fw is high
3,502,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,646,133 UART: [idev] Erasing UDS.KEYID = 0
6,005,504 UART: [idev] Sha1 KeyId Algorithm
6,027,476 UART: [idev] --
6,032,396 UART: [ldev] ++
6,032,965 UART: [ldev] CDI.KEYID = 6
6,033,888 UART: [ldev] SUBJECT.KEYID = 5
6,035,105 UART: [ldev] AUTHORITY.KEYID = 7
6,036,339 UART: [ldev] FE.KEYID = 1
6,078,542 UART: [ldev] Erasing FE.KEYID = 1
8,581,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,537 UART: [ldev] --
10,390,797 UART: [fwproc] Wait for Commands...
10,393,852 UART: [fwproc] Recv command 0x46574c44
10,395,955 UART: [fwproc] Recv'd Img size: 114448 bytes
13,802,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,388 >>> mbox cmd response: success
14,266,888 UART: [afmc] ++
14,267,481 UART: [afmc] CDI.KEYID = 6
14,268,394 UART: [afmc] SUBJECT.KEYID = 7
14,269,575 UART: [afmc] AUTHORITY.KEYID = 5
16,808,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,436 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,384 UART: [afmc] --
18,603,439 UART: [cold-reset] --
18,606,863 UART: [state] Locking Datavault
18,611,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,884 UART: [state] Locking ICCM
18,615,497 UART: [exit] Launching FMC @ 0x40000130
18,623,887 UART:
18,624,127 UART: Running Caliptra FMC ...
18,625,153 UART:
18,625,319 UART: [state] CFI Enabled
18,689,208 UART: [fht] FMC Alias Private Key: 7
20,452,847 UART: [art] Extend RT PCRs Done
20,454,050 UART: [art] Lock RT PCRs Done
20,455,812 UART: [art] Populate DV Done
20,461,216 UART: [fht] FMC Alias Private Key: 7
20,462,802 UART: [art] Derive CDI
20,463,536 UART: [art] Store in in slot 0x4
20,521,832 UART: [art] Derive Key Pair
20,522,891 UART: [art] Store priv key in slot 0x5
22,985,949 UART: [art] Derive Key Pair - Done
22,998,881 UART: [art] Signing Cert with AUTHO
23,000,173 UART: RITY.KEYID = 7
24,711,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,109 UART: [art] PUB.X = D58A7548E94C232DE05E52D62E9F05A6572B58294CEC360AC62BF3E598E6432023A32DED90F3525C5E05D6AFDF8AAED1
24,720,402 UART: [art] PUB.Y = A0B6805F68C56ED76B1C7D251C9067D6F227189474227C7D9C0B0206388234C9949F30342F3C4C5894B47CBB46EE63E8
24,727,652 UART: [art] SIG.R = 19D42B0B5DD8FE2E12F6791A03827F159F4133A0232E091DB21C59917824BC3630C0486B23200856E0B5342F1761CECB
24,734,989 UART: [art] SIG.S = 6120210CC8B8573FDC293EC32B00811322E14B01578DE4A5BAA02E9E4D1D96C17D06B88F05115725E102FB0FED0D5F7E
25,713,441 UART: Caliptra RT
25,714,136 UART: [state] CFI Enabled
25,881,847 UART: [rt] RT listening for mailbox commands...
25,884,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,215 UART: [rt]cmd =0x44504543, len=96
30,292,468 >>> mbox cmd response data (6236 bytes)
30,321,818 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,352,436 UART: [rt]cmd =0x53574545, len=84
34,530,161 >>> mbox cmd response data (200 bytes)
34,914,315 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,944,633 UART: [rt]cmd =0x52564348, len=36
34,947,095 >>> mbox cmd response data (8 bytes)
34,947,460 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,977,956 UART: [rt]cmd =0x53574545, len=84
34,981,005 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,362,321 ready_for_fw is high
3,362,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,380 >>> mbox cmd response: success
18,328,954 UART:
18,329,334 UART: Running Caliptra FMC ...
18,330,475 UART:
18,330,638 UART: [state] CFI Enabled
18,393,213 UART: [fht] FMC Alias Private Key: 7
20,156,995 UART: [art] Extend RT PCRs Done
20,158,237 UART: [art] Lock RT PCRs Done
20,159,891 UART: [art] Populate DV Done
20,165,421 UART: [fht] FMC Alias Private Key: 7
20,166,907 UART: [art] Derive CDI
20,167,670 UART: [art] Store in in slot 0x4
20,226,253 UART: [art] Derive Key Pair
20,227,298 UART: [art] Store priv key in slot 0x5
22,690,824 UART: [art] Derive Key Pair - Done
22,703,885 UART: [art] Signing Cert with AUTHO
22,705,184 UART: RITY.KEYID = 7
24,416,189 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,671 UART: [art] PUB.X = D8C4817559B9F4584AE764E1A9E2A61A2EBCDAAD745D0CACF37345E44873DC37ED2A46DC2A30CDF747E10AA0C80C151B
24,424,974 UART: [art] PUB.Y = C1655240ED707B7A1B6D4FB768D53A7261FD13CE7D1A700795C509AE031676C5AF0E9D5BF77BBDD4202ED8B3EDBD91FC
24,432,252 UART: [art] SIG.R = C54E8C12651FF93FC43D8253A1D03524052FB93D6CA68A7C461EE6EA25897FE30EF2382A917F50E4CD12535232747DB1
24,439,644 UART: [art] SIG.S = 397FD50F3650A7145FD3F6FE9CC943488748E3FCF32413D66CF0204283AC819968E0238292181A2285BE899EEE357B40
25,418,715 UART: Caliptra RT
25,419,430 UART: [state] CFI Enabled
25,583,912 UART: [rt] RT listening for mailbox commands...
25,586,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,617,308 UART: [rt]cmd =0x44504543, len=96
29,976,083 >>> mbox cmd response data (6236 bytes)
30,005,528 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,036,047 UART: [rt]cmd =0x53574545, len=84
34,214,721 >>> mbox cmd response data (200 bytes)
34,596,747 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,626,948 UART: [rt]cmd =0x52564348, len=36
34,629,474 >>> mbox cmd response data (8 bytes)
34,629,921 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,660,131 UART: [rt]cmd =0x53574545, len=84
34,663,851 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,425 UART:
192,803 UART: Running Caliptra ROM ...
193,983 UART:
603,593 UART: [state] CFI Enabled
619,009 UART: [state] LifecycleState = Unprovisioned
620,935 UART: [state] DebugLocked = No
622,254 UART: [state] WD Timer not started. Device not locked for debugging
626,357 UART: [kat] SHA2-256
805,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,113 UART: [kat] ++
817,647 UART: [kat] sha1
828,096 UART: [kat] SHA2-256
831,107 UART: [kat] SHA2-384
838,297 UART: [kat] SHA2-512-ACC
841,291 UART: [kat] ECC-384
3,283,276 UART: [kat] HMAC-384Kdf
3,295,077 UART: [kat] LMS
3,824,587 UART: [kat] --
3,828,649 UART: [cold-reset] ++
3,830,995 UART: [fht] FHT @ 0x50003400
3,841,181 UART: [idev] ++
3,841,733 UART: [idev] CDI.KEYID = 6
3,842,607 UART: [idev] SUBJECT.KEYID = 7
3,843,840 UART: [idev] UDS.KEYID = 0
3,844,733 ready_for_fw is high
3,844,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,652 UART: [idev] Erasing UDS.KEYID = 0
6,317,669 UART: [idev] Sha1 KeyId Algorithm
6,340,942 UART: [idev] --
6,345,401 UART: [ldev] ++
6,345,968 UART: [ldev] CDI.KEYID = 6
6,346,876 UART: [ldev] SUBJECT.KEYID = 5
6,348,023 UART: [ldev] AUTHORITY.KEYID = 7
6,349,304 UART: [ldev] FE.KEYID = 1
6,360,868 UART: [ldev] Erasing FE.KEYID = 1
8,834,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,273 UART: [ldev] --
10,625,697 UART: [fwproc] Wait for Commands...
10,627,697 UART: [fwproc] Recv command 0x46574c44
10,629,787 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,660 >>> mbox cmd response: success
14,492,442 UART: [afmc] ++
14,493,027 UART: [afmc] CDI.KEYID = 6
14,493,906 UART: [afmc] SUBJECT.KEYID = 7
14,495,114 UART: [afmc] AUTHORITY.KEYID = 5
16,996,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,729 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,664 UART: [afmc] --
18,796,243 UART: [cold-reset] --
18,799,774 UART: [state] Locking Datavault
18,804,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,492 UART: [state] Locking ICCM
18,808,360 UART: [exit] Launching FMC @ 0x40000130
18,816,748 UART:
18,816,974 UART: Running Caliptra FMC ...
18,818,064 UART:
18,818,216 UART: [state] CFI Enabled
18,826,684 UART: [fht] FMC Alias Private Key: 7
20,583,972 UART: [art] Extend RT PCRs Done
20,585,201 UART: [art] Lock RT PCRs Done
20,587,176 UART: [art] Populate DV Done
20,592,526 UART: [fht] FMC Alias Private Key: 7
20,593,965 UART: [art] Derive CDI
20,594,693 UART: [art] Store in in slot 0x4
20,637,117 UART: [art] Derive Key Pair
20,638,156 UART: [art] Store priv key in slot 0x5
23,065,350 UART: [art] Derive Key Pair - Done
23,078,242 UART: [art] Signing Cert with AUTHO
23,079,543 UART: RITY.KEYID = 7
24,785,337 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,837 UART: [art] PUB.X = 15CC46BAE7772FA91E78E727C8D7373C0812446768F3ECB6D163D3A75AB0DC1ACD025556A8061792EC12D110F7B2FB3B
24,794,104 UART: [art] PUB.Y = 715ADCBA429700EF8C678FA4A299AE1E7BC7FC8DEA51633F6BC2D5075B464AFF43EB39B67F6E829E798A1A82B4601494
24,801,378 UART: [art] SIG.R = 511CD50112C5FB316F68B6C579A3142B12808E7D54B3E82EFBAB430CF80C5C8FC3867BE9B7A9F7F1BF0F4C4EF316B5CC
24,808,806 UART: [art] SIG.S = 18D072E36024DC63A750FEAA7E70852B21B723E4F40AAF81B4CD1EF2F319ABCCDB6437D7B2A1ABFAE9313116AE3D1844
25,787,267 UART: Caliptra RT
25,787,977 UART: [state] CFI Enabled
25,905,815 UART: [rt] RT listening for mailbox commands...
25,908,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,938,694 UART: [rt]cmd =0x44504543, len=96
30,221,669 >>> mbox cmd response data (6236 bytes)
30,250,835 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,281,324 UART: [rt]cmd =0x53574545, len=84
34,416,992 >>> mbox cmd response data (200 bytes)
34,808,679 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,839,135 UART: [rt]cmd =0x52564348, len=36
34,841,972 >>> mbox cmd response data (8 bytes)
34,842,419 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,872,905 UART: [rt]cmd =0x53574545, len=84
34,876,230 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,698,188 ready_for_fw is high
3,698,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,292,416 >>> mbox cmd response: success
18,539,907 UART:
18,540,329 UART: Running Caliptra FMC ...
18,541,464 UART:
18,541,624 UART: [state] CFI Enabled
18,549,527 UART: [fht] FMC Alias Private Key: 7
20,306,189 UART: [art] Extend RT PCRs Done
20,307,438 UART: [art] Lock RT PCRs Done
20,309,218 UART: [art] Populate DV Done
20,314,690 UART: [fht] FMC Alias Private Key: 7
20,316,173 UART: [art] Derive CDI
20,316,934 UART: [art] Store in in slot 0x4
20,359,953 UART: [art] Derive Key Pair
20,360,950 UART: [art] Store priv key in slot 0x5
22,787,659 UART: [art] Derive Key Pair - Done
22,800,656 UART: [art] Signing Cert with AUTHO
22,801,963 UART: RITY.KEYID = 7
24,507,293 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,792 UART: [art] PUB.X = 74B53B0821BC5008D9FD514D657BF2BFE03734EAB719E7AD0E6B11094273712DDB2F77B6916CA48F6B52D11E81B5D548
24,516,078 UART: [art] PUB.Y = 22651CD4F9321DF79479D24B2A263394AC933F8CA18F22DBF94BC94E77009904B2DF4B7F12143D9215AAE4C36A4C9EB6
24,523,320 UART: [art] SIG.R = 32D340345F591D04752FB08AEAB366F50AF1DB92DCCFD65BCAEBEDBCEB6AF84144A96DD550C7B12936214EA0FE76BCEF
24,530,791 UART: [art] SIG.S = 45CDFE854B36004A90CEA946590453DF96626AC07E2C560BD92DBC1B738E0F8EF70833439BFB051824A61B5B89712EB5
25,510,112 UART: Caliptra RT
25,510,813 UART: [state] CFI Enabled
25,627,732 UART: [rt] RT listening for mailbox commands...
25,630,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,660,659 UART: [rt]cmd =0x44504543, len=96
29,943,438 >>> mbox cmd response data (6236 bytes)
29,972,997 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,003,726 UART: [rt]cmd =0x53574545, len=84
34,139,334 >>> mbox cmd response data (200 bytes)
34,530,283 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,560,492 UART: [rt]cmd =0x52564348, len=36
34,563,069 >>> mbox cmd response data (8 bytes)
34,563,526 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,593,900 UART: [rt]cmd =0x53574545, len=84
34,597,508 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
191,998 UART:
192,370 UART: Running Caliptra ROM ...
193,684 UART:
193,843 UART: [state] CFI Enabled
266,338 UART: [state] LifecycleState = Unprovisioned
268,740 UART: [state] DebugLocked = No
270,983 UART: [state] WD Timer not started. Device not locked for debugging
276,075 UART: [kat] SHA2-256
465,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,708 UART: [kat] ++
477,197 UART: [kat] sha1
488,496 UART: [kat] SHA2-256
491,504 UART: [kat] SHA2-384
498,841 UART: [kat] SHA2-512-ACC
501,420 UART: [kat] ECC-384
2,947,349 UART: [kat] HMAC-384Kdf
2,972,595 UART: [kat] LMS
3,504,306 UART: [kat] --
3,510,442 UART: [cold-reset] ++
3,512,152 UART: [fht] FHT @ 0x50003400
3,524,473 UART: [idev] ++
3,525,103 UART: [idev] CDI.KEYID = 6
3,526,086 UART: [idev] SUBJECT.KEYID = 7
3,527,263 UART: [idev] UDS.KEYID = 0
3,528,190 ready_for_fw is high
3,528,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,429 UART: [idev] Erasing UDS.KEYID = 0
6,052,790 UART: [idev] Sha1 KeyId Algorithm
6,074,635 UART: [idev] --
6,079,441 UART: [ldev] ++
6,080,124 UART: [ldev] CDI.KEYID = 6
6,081,056 UART: [ldev] SUBJECT.KEYID = 5
6,082,222 UART: [ldev] AUTHORITY.KEYID = 7
6,083,455 UART: [ldev] FE.KEYID = 1
6,121,920 UART: [ldev] Erasing FE.KEYID = 1
8,628,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,325 UART: [ldev] --
10,434,854 UART: [fwproc] Wait for Commands...
10,437,374 UART: [fwproc] Recv command 0x46574c44
10,439,679 UART: [fwproc] Recv'd Img size: 114448 bytes
13,891,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,975,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,091,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,635,146 >>> mbox cmd response: success
14,638,900 UART: [afmc] ++
14,639,604 UART: [afmc] CDI.KEYID = 6
14,640,795 UART: [afmc] SUBJECT.KEYID = 7
14,642,232 UART: [afmc] AUTHORITY.KEYID = 5
17,170,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,255 UART: [afmc] --
18,970,335 UART: [cold-reset] --
18,972,900 UART: [state] Locking Datavault
18,977,445 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,639 UART: [state] Locking ICCM
18,981,593 UART: [exit] Launching FMC @ 0x40000130
18,990,219 UART:
18,990,457 UART: Running Caliptra FMC ...
18,991,555 UART:
18,991,711 UART: [state] CFI Enabled
19,050,614 UART: [fht] FMC Alias Private Key: 7
20,814,671 UART: [art] Extend RT PCRs Done
20,815,885 UART: [art] Lock RT PCRs Done
20,817,801 UART: [art] Populate DV Done
20,823,426 UART: [fht] FMC Alias Private Key: 7
20,825,068 UART: [art] Derive CDI
20,825,883 UART: [art] Store in in slot 0x4
20,882,758 UART: [art] Derive Key Pair
20,883,791 UART: [art] Store priv key in slot 0x5
23,347,614 UART: [art] Derive Key Pair - Done
23,360,763 UART: [art] Signing Cert with AUTHO
23,362,076 UART: RITY.KEYID = 7
25,073,355 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,863 UART: [art] PUB.X = 955515316D2432485ECB684EF16D230B84943FC6D9DCD545159AF47EBEB3C63322E1DEA7F8BEDBD123F3FE3E6FF788C5
25,082,161 UART: [art] PUB.Y = 28DF80C3F8E8ACFFA7A29B39AB0F5CA90B4E8173F009E5CB30C24DF466EB905EC169CB5FBDAD2EA5E5A67A9B68713054
25,089,485 UART: [art] SIG.R = AF4D2A347157C69AFCFCE9297F0085D5F2140F47B5E05F5108BB707D106004B091EEB0EAFF39EB8694A8FB2432905E03
25,096,833 UART: [art] SIG.S = 33233B8C057CE015659B1128FB9849DBBC4EF12A5FD0921661D2418F1BDF2659CE74BC24F2F278C342C5C7EF70E9A495
26,076,226 UART: Caliptra RT
26,076,937 UART: [state] CFI Enabled
26,242,385 UART: [rt] RT listening for mailbox commands...
26,244,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,275,775 UART: [rt]cmd =0x44504543, len=96
30,654,948 >>> mbox cmd response data (6236 bytes)
30,684,152 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,714,674 UART: [rt]cmd =0x53574545, len=84
34,892,071 >>> mbox cmd response data (200 bytes)
35,277,775 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,308,075 UART: [rt]cmd =0x52564348, len=36
35,310,538 >>> mbox cmd response data (8 bytes)
35,310,976 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,341,321 UART: [rt]cmd =0x53574545, len=84
35,345,174 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,440,036 ready_for_fw is high
3,440,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,595 >>> mbox cmd response: success
19,026,451 UART:
19,026,848 UART: Running Caliptra FMC ...
19,027,991 UART:
19,028,160 UART: [state] CFI Enabled
19,093,138 UART: [fht] FMC Alias Private Key: 7
20,857,281 UART: [art] Extend RT PCRs Done
20,858,529 UART: [art] Lock RT PCRs Done
20,860,272 UART: [art] Populate DV Done
20,865,793 UART: [fht] FMC Alias Private Key: 7
20,867,493 UART: [art] Derive CDI
20,868,229 UART: [art] Store in in slot 0x4
20,926,303 UART: [art] Derive Key Pair
20,927,348 UART: [art] Store priv key in slot 0x5
23,390,094 UART: [art] Derive Key Pair - Done
23,402,885 UART: [art] Signing Cert with AUTHO
23,404,180 UART: RITY.KEYID = 7
25,116,356 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,418 UART: [art] PUB.X = DFD0CFC8877B97843D2E5B9BD9F4558EE1833DFF8F42640B4D460B859BD89F53EAC658B6420178AAA238CE356B9075AF
25,125,160 UART: [art] PUB.Y = D7211143CF2F8A7E36166E427A7A55DEB94DF3449D83CE7129442047B36D450C12C4188E0994A571D418DC4504311E46
25,132,372 UART: [art] SIG.R = B99C4B819F2FA0DD8FDD82D7DFB9A4155C66E9671E30BE7BB931826CEB6743C1C96662BAA2DBFC2F8F84D58D87BA6304
25,139,764 UART: [art] SIG.S = 89B986B1D377804B3610537487E09C6BAA61613858B6EFF0E130790B4EC8F837FE0EF3C32ADAF8ED998CE26DBA9D69E2
26,118,449 UART: Caliptra RT
26,119,162 UART: [state] CFI Enabled
26,284,447 UART: [rt] RT listening for mailbox commands...
26,286,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,317,944 UART: [rt]cmd =0x44504543, len=96
30,674,386 >>> mbox cmd response data (6236 bytes)
30,703,508 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,734,180 UART: [rt]cmd =0x53574545, len=84
34,910,936 >>> mbox cmd response data (200 bytes)
35,294,956 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,325,427 UART: [rt]cmd =0x52564348, len=36
35,328,321 >>> mbox cmd response data (8 bytes)
35,328,699 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,359,232 UART: [rt]cmd =0x53574545, len=84
35,362,684 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,476 UART:
192,860 UART: Running Caliptra ROM ...
194,049 UART:
603,664 UART: [state] CFI Enabled
614,277 UART: [state] LifecycleState = Unprovisioned
616,295 UART: [state] DebugLocked = No
618,954 UART: [state] WD Timer not started. Device not locked for debugging
623,971 UART: [kat] SHA2-256
813,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,661 UART: [kat] ++
825,260 UART: [kat] sha1
836,350 UART: [kat] SHA2-256
839,417 UART: [kat] SHA2-384
845,040 UART: [kat] SHA2-512-ACC
847,613 UART: [kat] ECC-384
3,295,185 UART: [kat] HMAC-384Kdf
3,308,218 UART: [kat] LMS
3,840,054 UART: [kat] --
3,843,125 UART: [cold-reset] ++
3,845,489 UART: [fht] FHT @ 0x50003400
3,857,535 UART: [idev] ++
3,858,232 UART: [idev] CDI.KEYID = 6
3,859,132 UART: [idev] SUBJECT.KEYID = 7
3,860,363 UART: [idev] UDS.KEYID = 0
3,861,280 ready_for_fw is high
3,861,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,300 UART: [idev] Erasing UDS.KEYID = 0
6,337,355 UART: [idev] Sha1 KeyId Algorithm
6,359,668 UART: [idev] --
6,364,408 UART: [ldev] ++
6,365,103 UART: [ldev] CDI.KEYID = 6
6,365,988 UART: [ldev] SUBJECT.KEYID = 5
6,367,190 UART: [ldev] AUTHORITY.KEYID = 7
6,368,411 UART: [ldev] FE.KEYID = 1
6,378,511 UART: [ldev] Erasing FE.KEYID = 1
8,854,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,296 UART: [ldev] --
10,643,114 UART: [fwproc] Wait for Commands...
10,645,744 UART: [fwproc] Recv command 0x46574c44
10,647,989 UART: [fwproc] Recv'd Img size: 114448 bytes
14,104,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,844,492 >>> mbox cmd response: success
14,847,799 UART: [afmc] ++
14,848,507 UART: [afmc] CDI.KEYID = 6
14,849,746 UART: [afmc] SUBJECT.KEYID = 7
14,851,207 UART: [afmc] AUTHORITY.KEYID = 5
17,352,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,705 UART: [afmc] --
19,150,338 UART: [cold-reset] --
19,153,665 UART: [state] Locking Datavault
19,158,879 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,023 UART: [state] Locking ICCM
19,163,767 UART: [exit] Launching FMC @ 0x40000130
19,172,388 UART:
19,172,616 UART: Running Caliptra FMC ...
19,173,707 UART:
19,173,880 UART: [state] CFI Enabled
19,181,923 UART: [fht] FMC Alias Private Key: 7
20,938,957 UART: [art] Extend RT PCRs Done
20,940,184 UART: [art] Lock RT PCRs Done
20,942,073 UART: [art] Populate DV Done
20,947,537 UART: [fht] FMC Alias Private Key: 7
20,949,065 UART: [art] Derive CDI
20,949,873 UART: [art] Store in in slot 0x4
20,992,526 UART: [art] Derive Key Pair
20,993,558 UART: [art] Store priv key in slot 0x5
23,420,060 UART: [art] Derive Key Pair - Done
23,433,170 UART: [art] Signing Cert with AUTHO
23,434,477 UART: RITY.KEYID = 7
25,140,182 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,682 UART: [art] PUB.X = 4C3AC666A56B52C483A2A22FBFBA15B853C42DAF8139307ABDA102A2586AE46380D9CB2CD2F9D64B9A489ECD08BE6415
25,148,984 UART: [art] PUB.Y = 9706E2FE0EFEF254604737D270557A6904E25BC1267FD7A652EEF690CC926907ACA987D18AB4EEEE17C315D139C26878
25,156,229 UART: [art] SIG.R = 39FE3AC7B656FF6CB517F617CE0B0065D1782BFF00DAC617675D06D055A5CF9C2BE23F832CE04A0835163C8F19A188EB
25,163,656 UART: [art] SIG.S = 5BFB5B644D6F936505C1328C0AF5D42A87112C35B95D6FEEBD1F098EAD34301B6EC54CD00B6F2E7FF650691007A78558
26,142,673 UART: Caliptra RT
26,143,357 UART: [state] CFI Enabled
26,260,790 UART: [rt] RT listening for mailbox commands...
26,263,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,887 UART: [rt]cmd =0x44504543, len=96
30,576,340 >>> mbox cmd response data (6236 bytes)
30,605,763 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,636,549 UART: [rt]cmd =0x53574545, len=84
34,771,611 >>> mbox cmd response data (200 bytes)
35,162,151 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,192,405 UART: [rt]cmd =0x52564348, len=36
35,194,812 >>> mbox cmd response data (8 bytes)
35,195,161 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,225,695 UART: [rt]cmd =0x53574545, len=84
35,229,388 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,753,423 ready_for_fw is high
3,754,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,790 >>> mbox cmd response: success
19,200,670 UART:
19,201,062 UART: Running Caliptra FMC ...
19,202,259 UART:
19,202,418 UART: [state] CFI Enabled
19,210,142 UART: [fht] FMC Alias Private Key: 7
20,966,969 UART: [art] Extend RT PCRs Done
20,968,197 UART: [art] Lock RT PCRs Done
20,970,197 UART: [art] Populate DV Done
20,975,498 UART: [fht] FMC Alias Private Key: 7
20,977,090 UART: [art] Derive CDI
20,977,907 UART: [art] Store in in slot 0x4
21,020,874 UART: [art] Derive Key Pair
21,021,869 UART: [art] Store priv key in slot 0x5
23,448,600 UART: [art] Derive Key Pair - Done
23,461,598 UART: [art] Signing Cert with AUTHO
23,462,901 UART: RITY.KEYID = 7
25,168,506 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,007 UART: [art] PUB.X = 0C9C1E4108BE76E54784AE1180CD8F0349EE3C7BB9415B6D599CBD95BF8750BC51DCCD48F30B15CC9DCBE18824DB6FE0
25,177,294 UART: [art] PUB.Y = 381149A9154A416B58785979839AC02B2813631F3253AC2968663FE1D247D44207E543ADF4567E912DAB7B97EB98B525
25,184,555 UART: [art] SIG.R = CAF3A7D6DDCFA8B10A0165289D47888274C7416F88EC5BB5F4ECA6B8637C799B1756E5D6E00C258017BB4410FEB5FA4B
25,191,923 UART: [art] SIG.S = 30BDFD7ADF5B9606C9BF1EAF4FEBB2941D586B8087633E683B6448FCBC6BAFBAC36BDFAAB66B08893E0998A15F46DD8C
26,170,813 UART: Caliptra RT
26,171,515 UART: [state] CFI Enabled
26,287,928 UART: [rt] RT listening for mailbox commands...
26,290,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,744 UART: [rt]cmd =0x44504543, len=96
30,603,913 >>> mbox cmd response data (6236 bytes)
30,633,050 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,663,729 UART: [rt]cmd =0x53574545, len=84
34,798,448 >>> mbox cmd response data (200 bytes)
35,187,653 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,218,107 UART: [rt]cmd =0x52564348, len=36
35,220,915 >>> mbox cmd response data (8 bytes)
35,221,370 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,251,887 UART: [rt]cmd =0x53574545, len=84
35,255,365 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,236 UART: [kat] HMAC-384Kdf
906,906 UART: [kat] LMS
1,475,102 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,282 UART: [idev] ++
1,479,450 UART: [idev] CDI.KEYID = 6
1,479,810 UART: [idev] SUBJECT.KEYID = 7
1,480,234 UART: [idev] UDS.KEYID = 0
1,480,579 ready_for_fw is high
1,480,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,342 UART: [idev] Erasing UDS.KEYID = 0
1,504,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,954 UART: [idev] --
1,513,883 UART: [ldev] ++
1,514,051 UART: [ldev] CDI.KEYID = 6
1,514,414 UART: [ldev] SUBJECT.KEYID = 5
1,514,840 UART: [ldev] AUTHORITY.KEYID = 7
1,515,303 UART: [ldev] FE.KEYID = 1
1,520,507 UART: [ldev] Erasing FE.KEYID = 1
1,545,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,512 UART: [ldev] --
1,584,921 UART: [fwproc] Waiting for Commands...
1,585,552 UART: [fwproc] Received command 0x46574c44
1,586,343 UART: [fwproc] Received Image of size 114448 bytes
2,885,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,318 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,711 >>> mbox cmd response: success
3,078,913 UART: [afmc] ++
3,079,081 UART: [afmc] CDI.KEYID = 6
3,079,443 UART: [afmc] SUBJECT.KEYID = 7
3,079,868 UART: [afmc] AUTHORITY.KEYID = 5
3,115,087 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,079 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,472 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,162 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,097 UART: [afmc] --
3,158,117 UART: [cold-reset] --
3,158,837 UART: [state] Locking Datavault
3,160,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,630 UART: [state] Locking ICCM
3,161,052 UART: [exit] Launching FMC @ 0x40000130
3,166,381 UART:
3,166,397 UART: Running Caliptra FMC ...
3,166,805 UART:
3,166,859 UART: [state] CFI Enabled
3,177,742 UART: [fht] FMC Alias Private Key: 7
3,285,485 UART: [art] Extend RT PCRs Done
3,285,913 UART: [art] Lock RT PCRs Done
3,287,459 UART: [art] Populate DV Done
3,295,842 UART: [fht] FMC Alias Private Key: 7
3,296,880 UART: [art] Derive CDI
3,297,160 UART: [art] Store in in slot 0x4
3,382,737 UART: [art] Derive Key Pair
3,383,097 UART: [art] Store priv key in slot 0x5
3,396,141 UART: [art] Derive Key Pair - Done
3,410,972 UART: [art] Signing Cert with AUTHO
3,411,452 UART: RITY.KEYID = 7
3,426,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,647 UART: [art] PUB.X = B2F799CCBB9A140147AEA4BF8D6E3A750ACCA04A73FAA2B0239167DD3E72AD1FAAD57C80CFFAC066CB631F2C386C7827
3,434,437 UART: [art] PUB.Y = FCFC97BF31195255BEF58ACBAB57CC6215DD987EEDD6E6DBF9829BA38295371BC68F763C024203E6272747B372163C5E
3,441,391 UART: [art] SIG.R = BC7BBCD8B0DDAC8A31D92D8F9A73FFEC058CD7B8AEE45335FAF58BC2A429A09669A79DFF3C604B95E1544A4EA1262E3C
3,448,186 UART: [art] SIG.S = 4A949D0909BFDDFEB42D2856FE01E8BF4847AE9BAA27899CADBBE0A9318995391BBF5271AA3E31BD268B08A36DC2786E
3,472,021 UART: Caliptra RT
3,472,274 UART: [state] CFI Enabled
3,580,487 UART: [rt] RT listening for mailbox commands...
3,581,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,771 UART: [rt]cmd =0x44504543, len=96
3,792,017 >>> mbox cmd response data (6236 bytes)
3,792,018 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,745 UART: [rt]cmd =0x53574545, len=84
3,846,765 >>> mbox cmd response data (200 bytes)
3,846,766 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,189 UART: [rt]cmd =0x52564348, len=36
3,878,707 >>> mbox cmd response data (8 bytes)
3,878,708 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,759 UART: [rt]cmd =0x53574545, len=84
3,912,422 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,441 ready_for_fw is high
1,362,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,037 >>> mbox cmd response: success
2,990,179 UART:
2,990,195 UART: Running Caliptra FMC ...
2,990,603 UART:
2,990,657 UART: [state] CFI Enabled
3,001,288 UART: [fht] FMC Alias Private Key: 7
3,109,787 UART: [art] Extend RT PCRs Done
3,110,215 UART: [art] Lock RT PCRs Done
3,111,581 UART: [art] Populate DV Done
3,119,826 UART: [fht] FMC Alias Private Key: 7
3,120,958 UART: [art] Derive CDI
3,121,238 UART: [art] Store in in slot 0x4
3,206,773 UART: [art] Derive Key Pair
3,207,133 UART: [art] Store priv key in slot 0x5
3,220,717 UART: [art] Derive Key Pair - Done
3,235,531 UART: [art] Signing Cert with AUTHO
3,236,011 UART: RITY.KEYID = 7
3,251,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,020 UART: [art] PUB.X = 1BF4B82B034507CDB1F6C16133D1BC1323F9034C8A63A29491A5718A25D8B08B274467499D164E4F71C582CBE3F5F858
3,258,779 UART: [art] PUB.Y = 343AFEA63783652547D4E5C45AB0BD77693352ED10B9DA631CC4D324B05C8272C6FA9B33735DDD3A7EEEEC8DAA72F9E5
3,265,745 UART: [art] SIG.R = 97FD01E697E0D7C390A35555CC77512AB563A169B13225CA4255D1565FB5CC8D653E8BFCB6F364F99AD202837A50244A
3,272,511 UART: [art] SIG.S = A6B4C741C50C975A7224483E1440C5E19EAA23B1CEBE50F90FE57124C1E53B8711AA7E6B1DEF5476D1E91A93295C12CF
3,295,928 UART: Caliptra RT
3,296,181 UART: [state] CFI Enabled
3,404,105 UART: [rt] RT listening for mailbox commands...
3,404,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,161 UART: [rt]cmd =0x44504543, len=96
3,614,494 >>> mbox cmd response data (6236 bytes)
3,614,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,308 UART: [rt]cmd =0x53574545, len=84
3,670,362 >>> mbox cmd response data (200 bytes)
3,670,363 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,024 UART: [rt]cmd =0x52564348, len=36
3,702,340 >>> mbox cmd response data (8 bytes)
3,702,341 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,166 UART: [rt]cmd =0x53574545, len=84
3,735,529 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,753 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,404 UART: [cold-reset] ++
1,476,864 UART: [fht] Storing FHT @ 0x50003400
1,479,793 UART: [idev] ++
1,479,961 UART: [idev] CDI.KEYID = 6
1,480,321 UART: [idev] SUBJECT.KEYID = 7
1,480,745 UART: [idev] UDS.KEYID = 0
1,481,090 ready_for_fw is high
1,481,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,506,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,459 UART: [idev] --
1,515,362 UART: [ldev] ++
1,515,530 UART: [ldev] CDI.KEYID = 6
1,515,893 UART: [ldev] SUBJECT.KEYID = 5
1,516,319 UART: [ldev] AUTHORITY.KEYID = 7
1,516,782 UART: [ldev] FE.KEYID = 1
1,522,226 UART: [ldev] Erasing FE.KEYID = 1
1,548,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,743 UART: [ldev] --
1,587,160 UART: [fwproc] Waiting for Commands...
1,587,967 UART: [fwproc] Received command 0x46574c44
1,588,758 UART: [fwproc] Received Image of size 114448 bytes
2,888,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,981 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,388 >>> mbox cmd response: success
3,082,402 UART: [afmc] ++
3,082,570 UART: [afmc] CDI.KEYID = 6
3,082,932 UART: [afmc] SUBJECT.KEYID = 7
3,083,357 UART: [afmc] AUTHORITY.KEYID = 5
3,118,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,185 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,875 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,884 UART: [afmc] --
3,161,834 UART: [cold-reset] --
3,162,764 UART: [state] Locking Datavault
3,163,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,435 UART: [state] Locking ICCM
3,164,963 UART: [exit] Launching FMC @ 0x40000130
3,170,292 UART:
3,170,308 UART: Running Caliptra FMC ...
3,170,716 UART:
3,170,859 UART: [state] CFI Enabled
3,181,540 UART: [fht] FMC Alias Private Key: 7
3,289,653 UART: [art] Extend RT PCRs Done
3,290,081 UART: [art] Lock RT PCRs Done
3,291,629 UART: [art] Populate DV Done
3,299,710 UART: [fht] FMC Alias Private Key: 7
3,300,858 UART: [art] Derive CDI
3,301,138 UART: [art] Store in in slot 0x4
3,386,925 UART: [art] Derive Key Pair
3,387,285 UART: [art] Store priv key in slot 0x5
3,400,847 UART: [art] Derive Key Pair - Done
3,415,733 UART: [art] Signing Cert with AUTHO
3,416,213 UART: RITY.KEYID = 7
3,431,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,094 UART: [art] PUB.X = B1E5D3B33D3B8F8B49784B778D9E2D0013CFE1133BAB7FA3754F4ACDFAF889664613590E227CA706485427136E43A73F
3,438,840 UART: [art] PUB.Y = C7D4FC9A53D30CBE7A5012EEF40AF838A74B101C844FA7E4EA5EA1041EFF5C850226B15CFD65C0E28742D2515151D531
3,445,790 UART: [art] SIG.R = 9FCF3AA69122072BD6254C832AA654A087300CCEA53BABFA97E611CACD16AEFAB3BB82098A0BD66DDB864C761E877208
3,452,563 UART: [art] SIG.S = 16C268DB70C5BBEE79241A86452551569CE7C74C38BF477B8D04D38AE3C0839FED670FDD07CB16E5ABBE1D8953742497
3,477,115 UART: Caliptra RT
3,477,460 UART: [state] CFI Enabled
3,585,313 UART: [rt] RT listening for mailbox commands...
3,585,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,677 UART: [rt]cmd =0x44504543, len=96
3,797,554 >>> mbox cmd response data (6236 bytes)
3,797,555 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,432 UART: [rt]cmd =0x53574545, len=84
3,853,352 >>> mbox cmd response data (200 bytes)
3,853,353 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,790 UART: [rt]cmd =0x52564348, len=36
3,884,648 >>> mbox cmd response data (8 bytes)
3,884,649 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,684 UART: [rt]cmd =0x53574545, len=84
3,917,957 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 ready_for_fw is high
1,363,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,102 >>> mbox cmd response: success
2,991,992 UART:
2,992,008 UART: Running Caliptra FMC ...
2,992,416 UART:
2,992,559 UART: [state] CFI Enabled
3,003,112 UART: [fht] FMC Alias Private Key: 7
3,110,645 UART: [art] Extend RT PCRs Done
3,111,073 UART: [art] Lock RT PCRs Done
3,112,743 UART: [art] Populate DV Done
3,121,006 UART: [fht] FMC Alias Private Key: 7
3,122,162 UART: [art] Derive CDI
3,122,442 UART: [art] Store in in slot 0x4
3,208,277 UART: [art] Derive Key Pair
3,208,637 UART: [art] Store priv key in slot 0x5
3,222,255 UART: [art] Derive Key Pair - Done
3,236,948 UART: [art] Signing Cert with AUTHO
3,237,428 UART: RITY.KEYID = 7
3,252,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,375 UART: [art] PUB.X = 9E07EFCBCFFEAEF59E05DBEA03E89B63FA386470F889BFF670D31E00DFA3E2540B44297624DFD466EB6714B7B04CB7AB
3,260,135 UART: [art] PUB.Y = D40BC668E6E1868545D985C8BA6B1369A0368649B2691B17540DE96D2FC3E187558DC390E8062A7C8DC7F0E39B929706
3,267,069 UART: [art] SIG.R = E8CDC9BF140F636794A3F64AB806F9ACBE15D877C962B3928DA2F43AF1FA34F5B07AF5105308531F9F27481FB62E99AF
3,273,842 UART: [art] SIG.S = CF36ABA47281416549F15CBDCD995393F520FBFBB2BAE80BCBF1059CF50390616CA20E023365C052A1DF4B57BA43BD74
3,298,210 UART: Caliptra RT
3,298,555 UART: [state] CFI Enabled
3,407,799 UART: [rt] RT listening for mailbox commands...
3,408,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,949 UART: [rt]cmd =0x44504543, len=96
3,618,806 >>> mbox cmd response data (6236 bytes)
3,618,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,636 UART: [rt]cmd =0x53574545, len=84
3,674,704 >>> mbox cmd response data (200 bytes)
3,674,705 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,362 UART: [rt]cmd =0x52564348, len=36
3,706,214 >>> mbox cmd response data (8 bytes)
3,706,215 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,076 UART: [rt]cmd =0x53574545, len=84
3,739,329 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
893,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,597 UART: [kat] ++
897,749 UART: [kat] sha1
901,963 UART: [kat] SHA2-256
903,903 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,232 UART: [kat] LMS
1,170,560 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,172,071 UART: [fht] FHT @ 0x50003400
1,174,612 UART: [idev] ++
1,174,780 UART: [idev] CDI.KEYID = 6
1,175,140 UART: [idev] SUBJECT.KEYID = 7
1,175,564 UART: [idev] UDS.KEYID = 0
1,175,909 ready_for_fw is high
1,175,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,256 UART: [idev] Erasing UDS.KEYID = 0
1,200,093 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,226 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,464 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,580 >>> mbox cmd response: success
2,776,752 UART: [afmc] ++
2,776,920 UART: [afmc] CDI.KEYID = 6
2,777,282 UART: [afmc] SUBJECT.KEYID = 7
2,777,707 UART: [afmc] AUTHORITY.KEYID = 5
2,813,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,660 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,379 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,311 UART: [afmc] --
2,856,333 UART: [cold-reset] --
2,857,165 UART: [state] Locking Datavault
2,858,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,786 UART: [state] Locking ICCM
2,859,374 UART: [exit] Launching FMC @ 0x40000130
2,864,703 UART:
2,864,719 UART: Running Caliptra FMC ...
2,865,127 UART:
2,865,181 UART: [state] CFI Enabled
2,876,070 UART: [fht] FMC Alias Private Key: 7
2,983,845 UART: [art] Extend RT PCRs Done
2,984,273 UART: [art] Lock RT PCRs Done
2,985,989 UART: [art] Populate DV Done
2,994,588 UART: [fht] FMC Alias Private Key: 7
2,995,716 UART: [art] Derive CDI
2,995,996 UART: [art] Store in in slot 0x4
3,081,955 UART: [art] Derive Key Pair
3,082,315 UART: [art] Store priv key in slot 0x5
3,095,245 UART: [art] Derive Key Pair - Done
3,110,046 UART: [art] Signing Cert with AUTHO
3,110,526 UART: RITY.KEYID = 7
3,125,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,975 UART: [art] PUB.X = EC3D32C8A02432A204019C1360F87FBCF279A27A2B68EF8F8E34973AF6EA7B2ED5C51CDF2682AF4A303435AF9AEA6021
3,132,753 UART: [art] PUB.Y = 15967B8C4CB1F4181A31B94932BC6483F6B110B0E801642A9FBE9484916E9FE6C5575603C72E5F3AD71896C9A57536EE
3,139,695 UART: [art] SIG.R = 313F29D6BB516C16E8782EE7B70755F0BE62EDE4BBD6FFF3930B9606A2D061FD1489FC1DCABE2DCD1BA92EB38DB6C50F
3,146,479 UART: [art] SIG.S = 11B6DDC019EF49E3CC8E93A4DBDF4CC31E9B953107D324721D99D63E8F3C306CFB4B9B09F103637A9B4611516F6639B4
3,170,413 UART: Caliptra RT
3,170,666 UART: [state] CFI Enabled
3,278,365 UART: [rt] RT listening for mailbox commands...
3,279,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,747 UART: [rt]cmd =0x44504543, len=96
3,490,014 >>> mbox cmd response data (6236 bytes)
3,490,015 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,880 UART: [rt]cmd =0x53574545, len=84
3,545,956 >>> mbox cmd response data (200 bytes)
3,545,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,522 UART: [rt]cmd =0x52564348, len=36
3,577,596 >>> mbox cmd response data (8 bytes)
3,577,597 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,406 UART: [rt]cmd =0x53574545, len=84
3,610,801 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,941 ready_for_fw is high
1,059,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,733 >>> mbox cmd response: success
2,686,981 UART:
2,686,997 UART: Running Caliptra FMC ...
2,687,405 UART:
2,687,459 UART: [state] CFI Enabled
2,698,022 UART: [fht] FMC Alias Private Key: 7
2,806,017 UART: [art] Extend RT PCRs Done
2,806,445 UART: [art] Lock RT PCRs Done
2,807,919 UART: [art] Populate DV Done
2,816,240 UART: [fht] FMC Alias Private Key: 7
2,817,232 UART: [art] Derive CDI
2,817,512 UART: [art] Store in in slot 0x4
2,903,735 UART: [art] Derive Key Pair
2,904,095 UART: [art] Store priv key in slot 0x5
2,917,517 UART: [art] Derive Key Pair - Done
2,932,229 UART: [art] Signing Cert with AUTHO
2,932,709 UART: RITY.KEYID = 7
2,948,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,814 UART: [art] PUB.X = 9D245E2754008B58DAE7B0A0EBC2A31B40DEC0D389CAE4050AEF27BD3C72E2544EE645BAEBA9E85CA612166D188E3DD6
2,955,576 UART: [art] PUB.Y = 3D433038CC466E16DFFADFF6B5F80E18E1FCD4AF82593DED1DE3984FF1DAFAFFDDFB3DEE8B49B06053C6339F4BEEC777
2,962,557 UART: [art] SIG.R = 38F03C99C22AAFBB20162535FF07BD29C3808B432EE48EF8C3E7C7CA34F64BA4F724AE72E40C7AC9B78911A12BDCA4FB
2,969,341 UART: [art] SIG.S = EC29D405257324B03B2A80D9A973F42902F3F5C5C51224314C79C097FB47E52442B124C2641F927E0DAD79C98A0D73B6
2,992,426 UART: Caliptra RT
2,992,679 UART: [state] CFI Enabled
3,100,682 UART: [rt] RT listening for mailbox commands...
3,101,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,542 UART: [rt]cmd =0x44504543, len=96
3,311,666 >>> mbox cmd response data (6236 bytes)
3,311,667 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,324 UART: [rt]cmd =0x53574545, len=84
3,366,488 >>> mbox cmd response data (200 bytes)
3,366,489 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,820 UART: [rt]cmd =0x52564348, len=36
3,398,110 >>> mbox cmd response data (8 bytes)
3,398,111 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,912 UART: [rt]cmd =0x53574545, len=84
3,430,997 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
893,253 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,378 UART: [kat] ++
897,530 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
917,921 UART: [kat] HMAC-384Kdf
922,701 UART: [kat] LMS
1,171,029 UART: [kat] --
1,171,758 UART: [cold-reset] ++
1,172,250 UART: [fht] FHT @ 0x50003400
1,174,761 UART: [idev] ++
1,174,929 UART: [idev] CDI.KEYID = 6
1,175,289 UART: [idev] SUBJECT.KEYID = 7
1,175,713 UART: [idev] UDS.KEYID = 0
1,176,058 ready_for_fw is high
1,176,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,651 UART: [idev] Erasing UDS.KEYID = 0
1,201,026 UART: [idev] Sha1 KeyId Algorithm
1,209,362 UART: [idev] --
1,210,314 UART: [ldev] ++
1,210,482 UART: [ldev] CDI.KEYID = 6
1,210,845 UART: [ldev] SUBJECT.KEYID = 5
1,211,271 UART: [ldev] AUTHORITY.KEYID = 7
1,211,734 UART: [ldev] FE.KEYID = 1
1,216,952 UART: [ldev] Erasing FE.KEYID = 1
1,243,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,186 UART: [ldev] --
1,282,501 UART: [fwproc] Wait for Commands...
1,283,123 UART: [fwproc] Recv command 0x46574c44
1,283,851 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,605 >>> mbox cmd response: success
2,775,739 UART: [afmc] ++
2,775,907 UART: [afmc] CDI.KEYID = 6
2,776,269 UART: [afmc] SUBJECT.KEYID = 7
2,776,694 UART: [afmc] AUTHORITY.KEYID = 5
2,813,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,711 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,430 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,052 UART: [afmc] --
2,855,986 UART: [cold-reset] --
2,856,898 UART: [state] Locking Datavault
2,858,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,739 UART: [state] Locking ICCM
2,859,203 UART: [exit] Launching FMC @ 0x40000130
2,864,532 UART:
2,864,548 UART: Running Caliptra FMC ...
2,864,956 UART:
2,865,099 UART: [state] CFI Enabled
2,875,774 UART: [fht] FMC Alias Private Key: 7
2,983,645 UART: [art] Extend RT PCRs Done
2,984,073 UART: [art] Lock RT PCRs Done
2,985,749 UART: [art] Populate DV Done
2,994,190 UART: [fht] FMC Alias Private Key: 7
2,995,152 UART: [art] Derive CDI
2,995,432 UART: [art] Store in in slot 0x4
3,081,155 UART: [art] Derive Key Pair
3,081,515 UART: [art] Store priv key in slot 0x5
3,095,037 UART: [art] Derive Key Pair - Done
3,109,761 UART: [art] Signing Cert with AUTHO
3,110,241 UART: RITY.KEYID = 7
3,125,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,432 UART: [art] PUB.X = DF9114E8D63B8DEA2E5DC73B3F09B7B5EE9547F42C03EC894DD427345725E109673538DE20818335690FC3B13E062924
3,133,185 UART: [art] PUB.Y = 700B70560342EB59C0EBAAB78EA5261AAA41078F952F4228FC579916049F9C9E67E5BAC903BD197B6872A7DC2D9ECABC
3,140,132 UART: [art] SIG.R = B4E2C5F08629F2879C1BFCA2C7CBA96F44F50506F1D6ED4EE44C02A3A44307D87C0AD8744FD737AA479A82D5736A42E3
3,146,899 UART: [art] SIG.S = 0BD3DCFB3929DAD01AC27F29128A49CC9093756A01167E81226717FE942A507E801CA4AFDD32BACD75187E8933CA86FC
3,171,070 UART: Caliptra RT
3,171,415 UART: [state] CFI Enabled
3,279,238 UART: [rt] RT listening for mailbox commands...
3,279,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,422 UART: [rt]cmd =0x44504543, len=96
3,490,141 >>> mbox cmd response data (6236 bytes)
3,490,142 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,065 UART: [rt]cmd =0x53574545, len=84
3,546,239 >>> mbox cmd response data (200 bytes)
3,546,240 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,833 UART: [rt]cmd =0x52564348, len=36
3,578,171 >>> mbox cmd response data (8 bytes)
3,578,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,163 UART: [rt]cmd =0x53574545, len=84
3,611,268 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,396 ready_for_fw is high
1,061,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,392 >>> mbox cmd response: success
2,692,192 UART:
2,692,208 UART: Running Caliptra FMC ...
2,692,616 UART:
2,692,759 UART: [state] CFI Enabled
2,703,280 UART: [fht] FMC Alias Private Key: 7
2,810,811 UART: [art] Extend RT PCRs Done
2,811,239 UART: [art] Lock RT PCRs Done
2,812,593 UART: [art] Populate DV Done
2,820,972 UART: [fht] FMC Alias Private Key: 7
2,822,014 UART: [art] Derive CDI
2,822,294 UART: [art] Store in in slot 0x4
2,907,669 UART: [art] Derive Key Pair
2,908,029 UART: [art] Store priv key in slot 0x5
2,921,241 UART: [art] Derive Key Pair - Done
2,935,999 UART: [art] Signing Cert with AUTHO
2,936,479 UART: RITY.KEYID = 7
2,952,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,856 UART: [art] PUB.X = 39830DE0501990C374FB137B183502385C7EFE9C341D5120C6C21B2A3475468E75D405B01FD89007764C2334F0D61A29
2,959,602 UART: [art] PUB.Y = 47E2D8A6404FE77B9ABC8ED19D12B0F4FEBF222E7CCE63AFCC352034514050836C0BF1050CAE55FBA29A1AA1B82C6F6C
2,966,565 UART: [art] SIG.R = B30E0E171E9BD06A618155A3AB5E4E6B6115D79A70E6457EF95A9D908D709EFCCB4018D7EE5ECEE02B3DA975AA24D74D
2,973,347 UART: [art] SIG.S = 67D92821903720F0E396413C0CA6CEB306799021789097AA7602467DAB9464FD4302F14B305748CB2FFC7FF49AAFD315
2,997,654 UART: Caliptra RT
2,997,999 UART: [state] CFI Enabled
3,106,370 UART: [rt] RT listening for mailbox commands...
3,107,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,642 UART: [rt]cmd =0x44504543, len=96
3,318,687 >>> mbox cmd response data (6236 bytes)
3,318,688 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,409 UART: [rt]cmd =0x53574545, len=84
3,374,533 >>> mbox cmd response data (200 bytes)
3,374,534 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,965 UART: [rt]cmd =0x52564348, len=36
3,406,155 >>> mbox cmd response data (8 bytes)
3,406,156 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,983 UART: [rt]cmd =0x53574545, len=84
3,438,864 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,097 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,174,113 ready_for_fw is high
1,174,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,207,139 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,650 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,884 UART: [ldev] --
1,280,238 UART: [fwproc] Wait for Commands...
1,280,987 UART: [fwproc] Recv command 0x46574c44
1,281,720 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,870 >>> mbox cmd response: success
2,775,045 UART: [afmc] ++
2,775,213 UART: [afmc] CDI.KEYID = 6
2,775,576 UART: [afmc] SUBJECT.KEYID = 7
2,776,002 UART: [afmc] AUTHORITY.KEYID = 5
2,811,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,938 UART: [afmc] --
2,854,898 UART: [cold-reset] --
2,855,740 UART: [state] Locking Datavault
2,856,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,567 UART: [state] Locking ICCM
2,858,201 UART: [exit] Launching FMC @ 0x40000130
2,863,530 UART:
2,863,546 UART: Running Caliptra FMC ...
2,863,954 UART:
2,864,008 UART: [state] CFI Enabled
2,874,287 UART: [fht] FMC Alias Private Key: 7
2,981,768 UART: [art] Extend RT PCRs Done
2,982,196 UART: [art] Lock RT PCRs Done
2,983,598 UART: [art] Populate DV Done
2,991,987 UART: [fht] FMC Alias Private Key: 7
2,993,139 UART: [art] Derive CDI
2,993,419 UART: [art] Store in in slot 0x4
3,078,900 UART: [art] Derive Key Pair
3,079,260 UART: [art] Store priv key in slot 0x5
3,092,374 UART: [art] Derive Key Pair - Done
3,106,977 UART: [art] Signing Cert with AUTHO
3,107,457 UART: RITY.KEYID = 7
3,122,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,318 UART: [art] PUB.X = 498476469B2D88B107D52A2F0A48194E0D4E1A215C7348029C301A80BBDAA46422F818F69831AFE80A169B761E17A04A
3,130,069 UART: [art] PUB.Y = 608B50A1B6268D7224045A0F34FE2721F32C90B51F74637EC49AA67055CA53AA8BFBC5C193B7CA743EA69159253A331D
3,137,015 UART: [art] SIG.R = A5FCE3759554A75BCBF84904364CF33B4AF1DD8E1330AD4DB3EB084DEE94E820966A846F0F2DA4D7465D103DC5D68341
3,143,788 UART: [art] SIG.S = 94DDEAE5AC3A8459DBCBBA44779392A7281090C05CE335A0FCC7A14938B4F1E9DAB6C0FE4027D1B5C334C52A28A4A985
3,167,963 UART: Caliptra RT
3,168,216 UART: [state] CFI Enabled
3,276,042 UART: [rt] RT listening for mailbox commands...
3,276,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,198 UART: [rt]cmd =0x44504543, len=96
3,488,020 >>> mbox cmd response data (6236 bytes)
3,488,021 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,894 UART: [rt]cmd =0x53574545, len=84
3,543,508 >>> mbox cmd response data (200 bytes)
3,543,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,138 UART: [rt]cmd =0x52564348, len=36
3,575,168 >>> mbox cmd response data (8 bytes)
3,575,169 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,214 UART: [rt]cmd =0x53574545, len=84
3,608,695 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,488 >>> mbox cmd response: success
2,685,720 UART:
2,685,736 UART: Running Caliptra FMC ...
2,686,144 UART:
2,686,198 UART: [state] CFI Enabled
2,696,891 UART: [fht] FMC Alias Private Key: 7
2,805,328 UART: [art] Extend RT PCRs Done
2,805,756 UART: [art] Lock RT PCRs Done
2,807,468 UART: [art] Populate DV Done
2,815,479 UART: [fht] FMC Alias Private Key: 7
2,816,419 UART: [art] Derive CDI
2,816,699 UART: [art] Store in in slot 0x4
2,902,066 UART: [art] Derive Key Pair
2,902,426 UART: [art] Store priv key in slot 0x5
2,915,166 UART: [art] Derive Key Pair - Done
2,930,277 UART: [art] Signing Cert with AUTHO
2,930,757 UART: RITY.KEYID = 7
2,945,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,436 UART: [art] PUB.X = 84ABC1DAC03AE211EE0C82E10285586FDDB4CDCE6C5386A520EBBAC1C96F5FD1E4E57E8EBDC06CE6D0BC4920FF19B5BE
2,953,234 UART: [art] PUB.Y = C8D14283D83D9C454B7F302778F740B549DEDFCCEB95619429109F3122AEF26FCE432DA087927B9058D06D0DDD3826AC
2,960,187 UART: [art] SIG.R = 5F139B064E58016085C9610F52F19134E8D0814521DA1CFF442F803A994B42E2FD71540C08AC68BB79A95A4A45CB6221
2,966,938 UART: [art] SIG.S = 6B15B04FB22F1B6CFA1968A3D99768912F2038B16409DDE998BF5196F9CAD60934C4F5CF4CCCF41944611DF651FAA479
2,990,289 UART: Caliptra RT
2,990,542 UART: [state] CFI Enabled
3,096,879 UART: [rt] RT listening for mailbox commands...
3,097,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,173 UART: [rt]cmd =0x44504543, len=96
3,307,936 >>> mbox cmd response data (6236 bytes)
3,307,937 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,654 UART: [rt]cmd =0x53574545, len=84
3,363,942 >>> mbox cmd response data (200 bytes)
3,363,943 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,354 UART: [rt]cmd =0x52564348, len=36
3,395,362 >>> mbox cmd response data (8 bytes)
3,395,363 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,425,312 UART: [rt]cmd =0x53574545, len=84
3,428,493 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,174,860 ready_for_fw is high
1,174,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,928 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,471 UART: [fwproc] Wait for Commands...
1,283,246 UART: [fwproc] Recv command 0x46574c44
1,283,979 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,903 >>> mbox cmd response: success
2,778,132 UART: [afmc] ++
2,778,300 UART: [afmc] CDI.KEYID = 6
2,778,663 UART: [afmc] SUBJECT.KEYID = 7
2,779,089 UART: [afmc] AUTHORITY.KEYID = 5
2,814,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,885 UART: [afmc] --
2,857,841 UART: [cold-reset] --
2,858,741 UART: [state] Locking Datavault
2,859,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,378 UART: [state] Locking ICCM
2,860,996 UART: [exit] Launching FMC @ 0x40000130
2,866,325 UART:
2,866,341 UART: Running Caliptra FMC ...
2,866,749 UART:
2,866,892 UART: [state] CFI Enabled
2,877,083 UART: [fht] FMC Alias Private Key: 7
2,984,798 UART: [art] Extend RT PCRs Done
2,985,226 UART: [art] Lock RT PCRs Done
2,986,732 UART: [art] Populate DV Done
2,995,015 UART: [fht] FMC Alias Private Key: 7
2,996,015 UART: [art] Derive CDI
2,996,295 UART: [art] Store in in slot 0x4
3,081,786 UART: [art] Derive Key Pair
3,082,146 UART: [art] Store priv key in slot 0x5
3,095,780 UART: [art] Derive Key Pair - Done
3,110,621 UART: [art] Signing Cert with AUTHO
3,111,101 UART: RITY.KEYID = 7
3,126,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,074 UART: [art] PUB.X = BFB185CE3227701ECA4D1438EC9AB1183A9B736D4327403319850F4CFDE4394068A5493951757BE288A14D446B5DDBE0
3,133,841 UART: [art] PUB.Y = A868BD739D818DC9B7FB514A4C4797D19962C1E744D037CD5C104C02B5AF4209244539B979CA3BE9B1A58AC6DA8FB3D8
3,140,795 UART: [art] SIG.R = 67E600DDF950D316F0144A713650B6E04DCF09D92392E77E8A1972E56662FA807DB32B29A59CCFFA5987C09755BACD54
3,147,544 UART: [art] SIG.S = 0126566D19AF56CD7F968218C3794FE4D9B2C3E00E32642C5CA4C887551F7C24B146068816798BD696BE1AA74DE0D475
3,171,716 UART: Caliptra RT
3,172,061 UART: [state] CFI Enabled
3,279,362 UART: [rt] RT listening for mailbox commands...
3,280,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,300 UART: [rt]cmd =0x44504543, len=96
3,490,573 >>> mbox cmd response data (6236 bytes)
3,490,574 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,585 UART: [rt]cmd =0x53574545, len=84
3,546,893 >>> mbox cmd response data (200 bytes)
3,546,894 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,599 UART: [rt]cmd =0x52564348, len=36
3,578,911 >>> mbox cmd response data (8 bytes)
3,578,912 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,753 UART: [rt]cmd =0x53574545, len=84
3,612,012 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,755 ready_for_fw is high
1,055,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,521 >>> mbox cmd response: success
2,686,525 UART:
2,686,541 UART: Running Caliptra FMC ...
2,686,949 UART:
2,687,092 UART: [state] CFI Enabled
2,697,829 UART: [fht] FMC Alias Private Key: 7
2,805,354 UART: [art] Extend RT PCRs Done
2,805,782 UART: [art] Lock RT PCRs Done
2,807,484 UART: [art] Populate DV Done
2,815,791 UART: [fht] FMC Alias Private Key: 7
2,816,791 UART: [art] Derive CDI
2,817,071 UART: [art] Store in in slot 0x4
2,903,066 UART: [art] Derive Key Pair
2,903,426 UART: [art] Store priv key in slot 0x5
2,916,466 UART: [art] Derive Key Pair - Done
2,931,401 UART: [art] Signing Cert with AUTHO
2,931,881 UART: RITY.KEYID = 7
2,947,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,036 UART: [art] PUB.X = CBCA904DC9788E8952D6E4B6AC1F3EBF76252DA80F24DFF567F75E643AEED30D02FD53EA27D3B8E9D0CF7168218743FB
2,954,817 UART: [art] PUB.Y = CB72DAD4D8B777E8A356CB3BA91DBE3FD566A7D274FEE590370E430701B1F4D125086F69B364AA7C66A8589BA1ECD666
2,961,769 UART: [art] SIG.R = C3CAAEC757CB94F7A0EC31B47483F4ABC1D56EF4A73D33C0F0D7216266EB379FAF94311BE0713C76E4637BBB0DE61E67
2,968,554 UART: [art] SIG.S = BC980DC01E70C3A8C7E8497A24C86CAA126DB79082A86B10B783B1F838D7F8EB0507640D41B21428EA7B22614D600F65
2,992,394 UART: Caliptra RT
2,992,739 UART: [state] CFI Enabled
3,099,983 UART: [rt] RT listening for mailbox commands...
3,100,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,997 UART: [rt]cmd =0x44504543, len=96
3,312,101 >>> mbox cmd response data (6236 bytes)
3,312,102 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,881 UART: [rt]cmd =0x53574545, len=84
3,368,109 >>> mbox cmd response data (200 bytes)
3,368,110 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,733 UART: [rt]cmd =0x52564348, len=36
3,399,995 >>> mbox cmd response data (8 bytes)
3,399,996 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,749 UART: [rt]cmd =0x53574545, len=84
3,432,908 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,122,411 UART: [fwproc] Received Image of size 78740 bytes
16,741,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,819,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,888,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,082,362 >>> mbox cmd response: success
17,082,915 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,087,170 UART: [afmc] ++
17,087,825 UART: [afmc] CDI.KEYID = 6
17,088,745 UART: [afmc] SUBJECT.KEYID = 7
17,089,967 UART: [afmc] AUTHORITY.KEYID = 5
20,456,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,755,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,757,743 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,772,179 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,787,019 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,801,426 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,822,050 UART: [afmc] --
22,826,031 UART: [cold-reset] --
22,829,031 UART: [state] Locking Datavault
22,835,468 UART: [state] Locking PCR0, PCR1 and PCR31
22,837,233 UART: [state] Locking ICCM
22,838,899 UART: [exit] Launching FMC @ 0x40000130
22,847,298 UART:
22,847,532 UART: Running Caliptra FMC ...
22,848,633 UART:
22,848,801 UART: [state] CFI Enabled
22,913,750 UART: [fht] FMC Alias Private Key: 7
25,252,255 UART: [art] Extend RT PCRs Done
25,253,478 UART: [art] Lock RT PCRs Done
25,254,888 UART: [art] Populate DV Done
25,259,984 UART: [fht] FMC Alias Private Key: 7
25,261,686 UART: [art] Derive CDI
25,262,500 UART: [art] Store in in slot 0x4
25,322,263 UART: [art] Derive Key Pair
25,323,307 UART: [art] Store priv key in slot 0x5
28,615,565 UART: [art] Derive Key Pair - Done
28,628,730 UART: [art] Signing Cert with AUTHO
28,630,040 UART: RITY.KEYID = 7
30,916,477 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,987 UART: [art] PUB.X = 4087F90800C7E415723481461469C53E0510616A07E37697E8FA3D66C5EF935C784FF2E646E1D8176A878DCEF9BECD0D
30,925,197 UART: [art] PUB.Y = 85A5DE3831F1110E42993AA1F428862065678BAA60FD0C2870B2855CF1486EFEB2C94BD3280244D156266FB489391282
30,932,452 UART: [art] SIG.R = C2942B330B4E75787277F485569AD4064CB4E8FA86A6BAF6A27C99FB5BD07770A048CDCD0720610BCA40D9416F322ACD
30,939,868 UART: [art] SIG.S = 1DC61C34FC79164FCE5630931A4894E7F25F687AED8DB07955098CD16DA5F87DD0AABCDCFAC62BB0EE8107663D9B2BEE
32,244,619 UART: mbox::rt_entry...
32,245,563 UART: ____ _ _ _ ____ _____
32,247,722 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,255,536 UART: |_|
32,256,347 UART:
32,369,451 UART: [rt] Runtime listening for mailbox commands...
32,371,644 >>> mbox cmd response data (48 bytes)
34,506,997 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,651,468 UART:
34,651,826 UART: Running Caliptra ROM ...
34,652,910 UART:
34,653,072 UART: [state] CFI Enabled
34,710,928 UART: [state] LifecycleState = Unprovisioned
34,712,875 UART: [state] DebugLocked = No
34,715,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,720,609 UART: [kat] SHA2-256
34,890,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,900,827 UART: [kat] ++
34,901,288 UART: [kat] sha1
34,912,377 UART: [kat] SHA2-256
34,915,082 UART: [kat] SHA2-384
34,920,908 UART: [kat] SHA2-512-ACC
34,923,277 UART: [kat] ECC-384
37,217,129 UART: [kat] HMAC-384Kdf
37,248,527 UART: [kat] LMS
38,438,851 UART: [kat] --
38,444,256 UART: [update-reset] ++
42,583,812 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,587,474 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,969,723 >>> mbox cmd response: success
42,970,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,970,558 UART: [update-reset] Copying MAN_2 To MAN_1
42,992,673 UART: [update-reset Success] --
42,997,016 UART: [state] Locking Datavault
43,000,949 UART: [state] Locking PCR0, PCR1 and PCR31
43,002,699 UART: [state] Locking ICCM
43,003,836 UART: [exit] Launching FMC @ 0x40000130
43,012,235 UART:
43,012,495 UART: Running Caliptra FMC ...
43,013,598 UART:
43,013,763 UART: [state] CFI Enabled
43,105,421 UART: [art] Extend RT PCRs Done
43,106,599 UART: [art] Lock RT PCRs Done
43,107,922 UART: [art] Populate DV Done
43,113,494 UART: [fht] FMC Alias Private Key: 7
43,115,028 UART: [art] Derive CDI
43,115,763 UART: [art] Store in in slot 0x4
43,174,455 UART: [art] Derive Key Pair
43,175,494 UART: [art] Store priv key in slot 0x5
46,468,377 UART: [art] Derive Key Pair - Done
46,481,591 UART: [art] Signing Cert with AUTHO
46,482,893 UART: RITY.KEYID = 7
48,771,505 UART: [art] Erasing AUTHORITY.KEYID = 7
48,773,028 UART: [art] PUB.X = C8133D73FD89C423CC1864589A924994C1F49EDE69796B9A3308D306DD2F9D039EFA928274AA0DD83A937FFF742CF5D8
48,780,349 UART: [art] PUB.Y = 01812D81F5C5C78885DE12C0C387490C7C6509D6668170E1B110E418FD92EE0A295A5704BCE66FC6C1B2D04A968ADF56
48,787,546 UART: [art] SIG.R = A8E738EC32A44F0D8B1516C7D9EE7E7AFD78ED21CBF9D7562C102D154263934627F242E89A06777EE8830F1D0E21D65F
48,794,897 UART: [art] SIG.S = A6FFFCDCF62CFF65A45AA98E04032C50A793C5F26DD1327C6B23CFE5D7F6BC606445A2820AE4EDC531FD9147B9624085
50,100,456 UART: Caliptra RT
50,101,174 UART: [state] CFI Enabled
50,432,628 UART: [rt] RT listening for mailbox commands...
50,464,807 UART: [rt]cmd =0x4d454153, len=108
50,483,472 >>> mbox cmd response data (12 bytes)
52,603,894 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,704,497 UART:
52,704,841 UART: Running Caliptra ROM ...
52,705,970 UART:
52,706,142 UART: [state] CFI Enabled
52,779,442 UART: [state] LifecycleState = Unprovisioned
52,781,389 UART: [state] DebugLocked = No
52,782,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,786,945 UART: [kat] SHA2-256
52,956,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,967,138 UART: [kat] ++
52,967,604 UART: [kat] sha1
52,979,035 UART: [kat] SHA2-256
52,981,724 UART: [kat] SHA2-384
52,986,141 UART: [kat] SHA2-512-ACC
52,988,539 UART: [kat] ECC-384
55,285,304 UART: [kat] HMAC-384Kdf
55,316,886 UART: [kat] LMS
56,507,204 UART: [kat] --
56,510,166 UART: [update-reset] ++
60,210,777 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,214,541 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,472,938 >>> mbox cmd response: success
62,590,894 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,690,402 UART: [update-reset] Copying MAN_2 To MAN_1
62,692,085 UART: [update-reset Success] --
62,693,254 UART: [state] Locking Datavault
62,694,400 UART: [state] Locking PCR0, PCR1 and PCR31
62,695,937 UART: [state] Locking ICCM
62,696,858 UART: [exit] Launching FMC @ 0x40000130
62,698,293 UART:
62,698,457 UART: Running Caliptra FMC ...
62,699,563 UART:
62,699,724 UART: [state] CFI Enabled
62,700,642 UART: [art] Extend RT PCRs Done
62,701,799 UART: [art] Lock RT PCRs Done
62,702,865 UART: [art] Populate DV Done
62,703,894 UART: [fht] FMC Alias Private Key: 7
62,705,205 UART: [art] Derive CDI
62,705,942 UART: [art] Store in in slot 0x4
62,707,109 UART: [art] Derive Key Pair
62,708,100 UART: [art] Store priv key in slot 0x5
63,984,649 UART: [art] Derive Key Pair - Done
63,997,760 UART: [art] Signing Cert with AUTHO
63,999,070 UART: RITY.KEYID = 7
66,285,913 UART: [art] Erasing AUTHORITY.KEYID = 7
66,287,427 UART: [art] PUB.X = FCE46CCDF8B2B95D2F05F3DEC817B4511AC1A3ACD4ED527FCDAD8BBCB7E080CA2BA56764E5B039775FEC23D78D2179F5
66,294,691 UART: [art] PUB.Y = FD3DA17FC424A0A765E891816379A49FC9DCF36FB6C5BA2D8EA3A4D5A3D97DAD2BC94F7D5B0D9CFB0576D82578F68754
66,301,935 UART: [art] SIG.R = 021CDF0282991CDFAFE49DD457F5116CB5A436698070922666447D2BCFCAC9B0B685C464857E4A09194A98ADF1E1E1D1
66,309,335 UART: [art] SIG.S = 258072B0E798C61CF5764D51114970C82635A7FE2E352D607AB593037B5059590CD58E0DD85D1F2B2075C6B17224B5F5
67,614,267 UART: mbox::rt_entry...
67,615,257 UART: ____ _ _ _ ____ _____
67,617,252 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,619,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,621,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,623,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,625,051 UART: |_|
67,626,027 UART:
67,910,793 UART: [rt] Runtime listening for mailbox commands...
67,912,829 UART:
67,912,998 UART: Running Caliptra ROM ...
67,914,104 UART:
67,914,279 UART: [state] CFI Enabled
67,970,138 UART: [state] LifecycleState = Unprovisioned
67,972,063 UART: [state] DebugLocked = No
67,974,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,979,097 UART: [kat] SHA2-256
68,148,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,159,293 UART: [kat] ++
68,159,777 UART: [kat] sha1
68,170,605 UART: [kat] SHA2-256
68,173,276 UART: [kat] SHA2-384
68,178,078 UART: [kat] SHA2-512-ACC
68,180,429 UART: [kat] ECC-384
70,476,311 UART: [kat] HMAC-384Kdf
70,505,428 UART: [kat] LMS
71,695,764 UART: [kat] --
71,701,480 UART: [update-reset] ++
75,411,137 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,415,512 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
75,673,926 >>> mbox cmd response: success
75,674,285 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,674,572 UART: [update-reset] Copying MAN_2 To MAN_1
75,696,650 UART: [update-reset Success] --
75,700,436 UART: [state] Locking Datavault
75,703,108 UART: [state] Locking PCR0, PCR1 and PCR31
75,704,865 UART: [state] Locking ICCM
75,706,747 UART: [exit] Launching FMC @ 0x40000130
75,715,198 UART:
75,715,436 UART: Running Caliptra FMC ...
75,716,537 UART:
75,716,695 UART: [state] CFI Enabled
75,807,204 UART: [art] Extend RT PCRs Done
75,808,388 UART: [art] Lock RT PCRs Done
75,809,736 UART: [art] Populate DV Done
75,815,033 UART: [fht] FMC Alias Private Key: 7
75,816,624 UART: [art] Derive CDI
75,817,437 UART: [art] Store in in slot 0x4
75,876,447 UART: [art] Derive Key Pair
75,877,501 UART: [art] Store priv key in slot 0x5
79,169,805 UART: [art] Derive Key Pair - Done
79,182,479 UART: [art] Signing Cert with AUTHO
79,183,786 UART: RITY.KEYID = 7
81,471,071 UART: [art] Erasing AUTHORITY.KEYID = 7
81,472,584 UART: [art] PUB.X = 8AB66A7535B38AE447F2308FF6741298DADCCBDF8C49005A50BC49943A1CBE289C80F138C7AC2CEBA14F9E101C60D3F8
81,479,841 UART: [art] PUB.Y = 38A149326B563D24464AB656D4FD0177357EAEC66FCD0C659AEC345867A826BA74A5C9103AAF460893E0AF19AC769209
81,487,102 UART: [art] SIG.R = 8278B6019D93DBE93B28B4FEC1D3F80E46C5FF39178800B10D867AD5BCC8A5A5B3DC390CD82D1E1238CEFB349902A2C6
81,494,456 UART: [art] SIG.S = DCCDBFC6A0C3572E7B25D631A889A5CAEF67F0A4F104D2DA61BBC4A69D1002ECFD5B036107F1CA35933B5795F59791F7
82,799,076 UART: mbox::rt_entry...
82,800,046 UART: ____ _ _ _ ____ _____
82,802,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,804,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,805,981 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,808,116 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,810,071 UART: |_|
82,811,092 UART:
83,095,173 UART: [rt] Runtime listening for mailbox commands...
83,097,344 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,807,388 ready_for_fw is high
3,807,757 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,196,011 >>> mbox cmd response: success
17,196,789 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,886,798 UART:
22,887,168 UART: Running Caliptra FMC ...
22,888,310 UART:
22,888,465 UART: [state] CFI Enabled
22,953,981 UART: [fht] FMC Alias Private Key: 7
25,291,812 UART: [art] Extend RT PCRs Done
25,293,024 UART: [art] Lock RT PCRs Done
25,294,713 UART: [art] Populate DV Done
25,300,186 UART: [fht] FMC Alias Private Key: 7
25,301,727 UART: [art] Derive CDI
25,302,546 UART: [art] Store in in slot 0x4
25,362,050 UART: [art] Derive Key Pair
25,363,085 UART: [art] Store priv key in slot 0x5
28,656,037 UART: [art] Derive Key Pair - Done
28,668,996 UART: [art] Signing Cert with AUTHO
28,670,313 UART: RITY.KEYID = 7
30,957,577 UART: [art] Erasing AUTHORITY.KEYID = 7
30,959,079 UART: [art] PUB.X = 1E0E6F36A4DA1F971F50B68F92E6B1A5E35DE7CFA299D04A12C1B525DEEBCBF4A486B7073B2BD559DA033720E2F1C713
30,966,397 UART: [art] PUB.Y = 5669DDDC11623B4C82307872D2714DB036B881A7DF8944F09F294C7A6F7E69C4F20ED7B2372B20F056894B326D859EFD
30,973,604 UART: [art] SIG.R = 9B6B86EF146C5DBA4A82538BE6BF95060D5DC45C35043A4C4F01DCCC149784C38908EFD1B17B46570D6B078EB7939964
30,981,001 UART: [art] SIG.S = 4C40EDD7BA6A8C48099746DA5953883C99840C3DEDC542342A4A17567EB66D7BD41E9D7B830790656427EF51A4AFC9F3
32,285,579 UART: mbox::rt_entry...
32,286,533 UART: ____ _ _ _ ____ _____
32,288,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,290,516 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,292,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,294,406 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,296,334 UART: |_|
32,297,174 UART:
32,411,134 UART: [rt] Runtime listening for mailbox commands...
32,413,272 >>> mbox cmd response data (48 bytes)
34,545,560 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,278,729 >>> mbox cmd response: success
43,279,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,316,075 UART:
43,316,363 UART: Running Caliptra FMC ...
43,317,397 UART:
43,317,547 UART: [state] CFI Enabled
43,422,986 UART: [art] Extend RT PCRs Done
43,424,177 UART: [art] Lock RT PCRs Done
43,425,669 UART: [art] Populate DV Done
43,431,260 UART: [fht] FMC Alias Private Key: 7
43,432,985 UART: [art] Derive CDI
43,433,737 UART: [art] Store in in slot 0x4
43,491,668 UART: [art] Derive Key Pair
43,492,672 UART: [art] Store priv key in slot 0x5
46,785,893 UART: [art] Derive Key Pair - Done
46,799,038 UART: [art] Signing Cert with AUTHO
46,800,367 UART: RITY.KEYID = 7
49,087,805 UART: [art] Erasing AUTHORITY.KEYID = 7
49,089,312 UART: [art] PUB.X = 41E644CD0B2712ADA40DF4E69555BA7B35389FC04B127D7C339AAD71AB03CC5A97D4927FC59C462CE45580A3A0BB238F
49,096,564 UART: [art] PUB.Y = C7A99B170F2DAA104364BB6B76DD46A93590211FFB23D785D7A15E83373412F38471275600287A2C1DFDECF1C9A49906
49,103,803 UART: [art] SIG.R = 2BFBA9C9AA732D929E9B34F05D4FB9416A01C0C3E316DE084F2ECA146B4D5FE74099822DAF206F24B3FD0DD4EE7DE54C
49,111,244 UART: [art] SIG.S = E36596153C894D0189FA05EE3CDA367F2B2411F558DFD3270549510E8EF2A42BF50950B9F288AB382BE97AABB19EFE9C
50,416,168 UART: Caliptra RT
50,416,878 UART: [state] CFI Enabled
50,746,982 UART: [rt] RT listening for mailbox commands...
50,779,335 UART: [rt]cmd =0x4d454153, len=108
50,797,860 >>> mbox cmd response data (12 bytes)
52,921,246 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,857,378 >>> mbox cmd response: success
62,977,061 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
63,076,564 UART:
63,076,926 UART: Running Caliptra FMC ...
63,078,065 UART:
63,078,242 UART: [state] CFI Enabled
63,079,170 UART: [art] Extend RT PCRs Done
63,080,313 UART: [art] Lock RT PCRs Done
63,081,406 UART: [art] Populate DV Done
63,082,440 UART: [fht] FMC Alias Private Key: 7
63,083,763 UART: [art] Derive CDI
63,084,505 UART: [art] Store in in slot 0x4
63,085,676 UART: [art] Derive Key Pair
63,086,673 UART: [art] Store priv key in slot 0x5
64,343,088 UART: [art] Derive Key Pair - Done
64,356,031 UART: [art] Signing Cert with AUTHO
64,357,337 UART: RITY.KEYID = 7
66,645,443 UART: [art] Erasing AUTHORITY.KEYID = 7
66,646,955 UART: [art] PUB.X = 86FF9327317B7CFC9A076C263B2C9EDEC062BDAC23E8C51D4601566701C036EF557A1D0E8DABF9EE41AFE92C02B4A98F
66,654,204 UART: [art] PUB.Y = 723C489AED5369DF9D53BAE509F2C0BDEBB0409EF36DE63A3DF4FFDB570B54AEE836271FF9EB44081A4D7A85C5BD572F
66,661,491 UART: [art] SIG.R = E0EEC86F4D5ED1447B7E63CC24A8E78A432EA9C273111A0560E171DE424F1CD238B0A49E49B74C6B692DD14C3EA7E8A1
66,668,833 UART: [art] SIG.S = 712CBC65E375F49C6A30D0580E0544FE00D9643908D084016BD9258A7EB7E519DEF4635F4743F830DB15508A832BCFDA
67,973,688 UART: mbox::rt_entry...
67,974,644 UART: ____ _ _ _ ____ _____
67,976,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,978,654 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,980,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,982,521 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,984,457 UART: |_|
67,985,267 UART:
68,270,670 UART: [rt] Runtime listening for mailbox commands...
76,119,029 >>> mbox cmd response: success
76,119,447 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,154,733 UART:
76,155,029 UART: Running Caliptra FMC ...
76,156,068 UART:
76,156,219 UART: [state] CFI Enabled
76,255,218 UART: [art] Extend RT PCRs Done
76,256,402 UART: [art] Lock RT PCRs Done
76,258,208 UART: [art] Populate DV Done
76,264,062 UART: [fht] FMC Alias Private Key: 7
76,265,818 UART: [art] Derive CDI
76,266,560 UART: [art] Store in in slot 0x4
76,324,006 UART: [art] Derive Key Pair
76,325,050 UART: [art] Store priv key in slot 0x5
79,618,054 UART: [art] Derive Key Pair - Done
79,631,063 UART: [art] Signing Cert with AUTHO
79,632,379 UART: RITY.KEYID = 7
81,920,022 UART: [art] Erasing AUTHORITY.KEYID = 7
81,921,530 UART: [art] PUB.X = 5C410ABF6B88206B920E70B52FD3DA9609CA462EEF46B313107801DDDFFC41C8D77AFFEA36C8D285EB6542F5E113AFE9
81,928,774 UART: [art] PUB.Y = 7158AFB739065C849CE96A7E498F8283EF6FF757884E1C15DF2145C123DE88F981E3D2E44AAC24DE19588CEFB1453261
81,936,009 UART: [art] SIG.R = 21E5FDCCA75D57248A4BB1B943481A23F58C3CA7A34375E3682F4BA544EC2AEB8AE3584F40992933685F2B556B184C12
81,943,403 UART: [art] SIG.S = 370BC80220992E70114E80E6AADC3A3F587BB83247118FDDDF55ABF62B6E9B7F8EA842B61C7D3F7C462F36ED834AA239
83,248,288 UART: mbox::rt_entry...
83,249,246 UART: ____ _ _ _ ____ _____
83,251,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,253,281 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,255,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,257,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,259,072 UART: |_|
83,259,909 UART:
83,543,571 UART: [rt] Runtime listening for mailbox commands...
83,545,746 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.30s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,324,281 UART: [fwproc] Received Image of size 78740 bytes
16,940,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,016,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,085,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,279,107 >>> mbox cmd response: success
17,279,599 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,282,814 UART: [afmc] ++
17,283,446 UART: [afmc] CDI.KEYID = 6
17,284,323 UART: [afmc] SUBJECT.KEYID = 7
17,285,586 UART: [afmc] AUTHORITY.KEYID = 5
20,603,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,899,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,902,174 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,916,553 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,931,392 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,945,840 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,967,392 UART: [afmc] --
22,970,883 UART: [cold-reset] --
22,974,921 UART: [state] Locking Datavault
22,979,742 UART: [state] Locking PCR0, PCR1 and PCR31
22,981,439 UART: [state] Locking ICCM
22,982,590 UART: [exit] Launching FMC @ 0x40000130
22,990,976 UART:
22,991,203 UART: Running Caliptra FMC ...
22,992,225 UART:
22,992,363 UART: [state] CFI Enabled
23,000,190 UART: [fht] FMC Alias Private Key: 7
25,331,256 UART: [art] Extend RT PCRs Done
25,332,526 UART: [art] Lock RT PCRs Done
25,334,126 UART: [art] Populate DV Done
25,339,328 UART: [fht] FMC Alias Private Key: 7
25,340,915 UART: [art] Derive CDI
25,341,664 UART: [art] Store in in slot 0x4
25,383,991 UART: [art] Derive Key Pair
25,385,025 UART: [art] Store priv key in slot 0x5
28,627,173 UART: [art] Derive Key Pair - Done
28,640,429 UART: [art] Signing Cert with AUTHO
28,641,758 UART: RITY.KEYID = 7
30,921,298 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,802 UART: [art] PUB.X = AA33037A577F428EE80CEE32CE498F67938C3412107F259CF55D073DC658F53EB01E1850FD41AB750314A1CF906F88EF
30,930,040 UART: [art] PUB.Y = 92B336DFEFFCC3149CE92D777A5983B4C59DAF651BE4283C020A93A54CB7A953FCE3740CEFB92E59B4E3F19B3667B864
30,937,317 UART: [art] SIG.R = D89CBED9D1ADC44BEE6406E2F2964D0B6AC99E21BC43E0A4FCB6CC8EA729FE99A16AB9FCCEAE74A43477473D03A9EEC7
30,944,704 UART: [art] SIG.S = D1DD2110C60731149D9A9C44046DC6DE4CAAC731BC492C5D50DD2B8D5B530C5DF5A1EEE932D3F55028F45D52029132EA
32,248,875 UART: mbox::rt_entry...
32,249,819 UART: ____ _ _ _ ____ _____
32,251,741 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,739 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,585 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,558 UART: |_|
32,260,364 UART:
32,374,290 UART: [rt] Runtime listening for mailbox commands...
32,376,451 >>> mbox cmd response data (48 bytes)
34,434,141 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,578,590 UART:
34,578,966 UART: Running Caliptra ROM ...
34,580,019 UART:
34,580,223 UART: [state] CFI Enabled
34,595,814 UART: [state] LifecycleState = Unprovisioned
34,597,708 UART: [state] DebugLocked = No
34,599,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,603,085 UART: [kat] SHA2-256
34,772,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,783,329 UART: [kat] ++
34,783,778 UART: [kat] sha1
34,794,006 UART: [kat] SHA2-256
34,796,697 UART: [kat] SHA2-384
34,802,016 UART: [kat] SHA2-512-ACC
34,804,380 UART: [kat] ECC-384
37,087,262 UART: [kat] HMAC-384Kdf
37,099,499 UART: [kat] LMS
38,289,561 UART: [kat] --
38,296,761 UART: [update-reset] ++
42,434,949 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,439,012 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,821,270 >>> mbox cmd response: success
42,821,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,822,072 UART: [update-reset] Copying MAN_2 To MAN_1
42,844,446 UART: [update-reset Success] --
42,849,702 UART: [state] Locking Datavault
42,854,140 UART: [state] Locking PCR0, PCR1 and PCR31
42,855,922 UART: [state] Locking ICCM
42,857,992 UART: [exit] Launching FMC @ 0x40000130
42,866,439 UART:
42,866,668 UART: Running Caliptra FMC ...
42,867,760 UART:
42,867,908 UART: [state] CFI Enabled
42,912,200 UART: [art] Extend RT PCRs Done
42,913,384 UART: [art] Lock RT PCRs Done
42,914,775 UART: [art] Populate DV Done
42,920,196 UART: [fht] FMC Alias Private Key: 7
42,921,735 UART: [art] Derive CDI
42,922,545 UART: [art] Store in in slot 0x4
42,965,141 UART: [art] Derive Key Pair
42,966,179 UART: [art] Store priv key in slot 0x5
46,208,314 UART: [art] Derive Key Pair - Done
46,220,947 UART: [art] Signing Cert with AUTHO
46,222,248 UART: RITY.KEYID = 7
48,501,664 UART: [art] Erasing AUTHORITY.KEYID = 7
48,503,171 UART: [art] PUB.X = E23957AAEB491D8B75E872665EEBB098C314E487917CD2837D16B0DB233ECAE394B44FA0947845E58F2C92E6190FFEC7
48,510,410 UART: [art] PUB.Y = 70C2D7227F5F64F57B7C8B6D17799C10BE832682D9B7A766C9A89E04842C14F136A80345BE32D7C6E954B449A1C2DE2A
48,517,692 UART: [art] SIG.R = 40CE43613C1ECF03FFDF7D611B7386DA6EE6CF216C61746799DA82829D80D462B660632D4092D4045A6F806EEFD097C3
48,525,071 UART: [art] SIG.S = 9683E9717CC7DACCE347E4B38242BE3534EF3B1DEE705EE0014E34ECAB69E5913A26B03ACFADDDA685A85E7A9FAF3483
49,830,206 UART: Caliptra RT
49,830,924 UART: [state] CFI Enabled
50,116,348 UART: [rt] RT listening for mailbox commands...
50,148,160 UART: [rt]cmd =0x4d454153, len=108
50,166,656 >>> mbox cmd response data (12 bytes)
52,210,611 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,311,245 UART:
52,311,609 UART: Running Caliptra ROM ...
52,312,659 UART:
52,312,912 UART: [state] CFI Enabled
52,328,611 UART: [state] LifecycleState = Unprovisioned
52,330,536 UART: [state] DebugLocked = No
52,333,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,338,129 UART: [kat] SHA2-256
52,507,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,518,402 UART: [kat] ++
52,518,940 UART: [kat] sha1
52,529,415 UART: [kat] SHA2-256
52,532,106 UART: [kat] SHA2-384
52,536,363 UART: [kat] SHA2-512-ACC
52,538,758 UART: [kat] ECC-384
54,823,516 UART: [kat] HMAC-384Kdf
54,835,428 UART: [kat] LMS
56,025,520 UART: [kat] --
56,030,666 UART: [update-reset] ++
59,743,975 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,748,447 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,006,880 >>> mbox cmd response: success
62,049,310 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,149,231 UART: [update-reset] Copying MAN_2 To MAN_1
62,150,966 UART: [update-reset Success] --
62,152,135 UART: [state] Locking Datavault
62,153,281 UART: [state] Locking PCR0, PCR1 and PCR31
62,154,813 UART: [state] Locking ICCM
62,155,875 UART: [exit] Launching FMC @ 0x40000130
62,157,644 UART:
62,157,813 UART: Running Caliptra FMC ...
62,158,910 UART:
62,159,060 UART: [state] CFI Enabled
62,159,977 UART: [art] Extend RT PCRs Done
62,161,106 UART: [art] Lock RT PCRs Done
62,162,166 UART: [art] Populate DV Done
62,163,114 UART: [fht] FMC Alias Private Key: 7
62,164,424 UART: [art] Derive CDI
62,165,154 UART: [art] Store in in slot 0x4
62,166,318 UART: [art] Derive Key Pair
62,167,273 UART: [art] Store priv key in slot 0x5
63,393,440 UART: [art] Derive Key Pair - Done
63,406,514 UART: [art] Signing Cert with AUTHO
63,407,821 UART: RITY.KEYID = 7
65,686,550 UART: [art] Erasing AUTHORITY.KEYID = 7
65,688,075 UART: [art] PUB.X = 2260FC19AF2F5C41DB30B7EF4240725CE805B938DDD0E7A0B1CDA4BE1E5A4B235513D83622E5FBB5119C0A010A45301A
65,695,330 UART: [art] PUB.Y = AC6CEB0BD0FE27C379542D80BB7CB4328345EE56F0D92B5BBAFDB569902992406B5008DD461A73F61858559461D53512
65,702,555 UART: [art] SIG.R = AAF5499FF5A4D7FDE8A716F201E9E4FFDAF48052C16A38B27E1D470C09FDED89711C83C7AAF71EC18FA395602C308984
65,709,941 UART: [art] SIG.S = 45261A37C692EA985386757284BA6C3BCA60C683BF48F7044F8DA4A850494F8E34C17BD15D632C80A33FDD166DE4600C
67,015,219 UART: mbox::rt_entry...
67,016,193 UART: ____ _ _ _ ____ _____
67,018,178 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,020,182 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,022,111 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,024,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,025,967 UART: |_|
67,026,795 UART:
67,310,231 UART: [rt] Runtime listening for mailbox commands...
67,312,305 UART:
67,312,464 UART: Running Caliptra ROM ...
67,313,474 UART:
67,313,940 UART: [state] CFI Enabled
67,325,628 UART: [state] LifecycleState = Unprovisioned
67,327,560 UART: [state] DebugLocked = No
67,329,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,334,013 UART: [kat] SHA2-256
67,503,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,514,241 UART: [kat] ++
67,514,691 UART: [kat] sha1
67,525,137 UART: [kat] SHA2-256
67,527,864 UART: [kat] SHA2-384
67,533,394 UART: [kat] SHA2-512-ACC
67,535,754 UART: [kat] ECC-384
69,819,132 UART: [kat] HMAC-384Kdf
69,830,496 UART: [kat] LMS
71,020,513 UART: [kat] --
71,023,552 UART: [update-reset] ++
74,730,001 UART: [update-reset] Image verified using Vendor ECC Key Index 0
74,733,128 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
74,991,606 >>> mbox cmd response: success
74,991,964 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
74,993,550 UART: [update-reset] Copying MAN_2 To MAN_1
75,015,982 UART: [update-reset Success] --
75,020,752 UART: [state] Locking Datavault
75,024,486 UART: [state] Locking PCR0, PCR1 and PCR31
75,026,241 UART: [state] Locking ICCM
75,027,930 UART: [exit] Launching FMC @ 0x40000130
75,036,378 UART:
75,036,810 UART: Running Caliptra FMC ...
75,037,851 UART:
75,038,001 UART: [state] CFI Enabled
75,082,578 UART: [art] Extend RT PCRs Done
75,083,729 UART: [art] Lock RT PCRs Done
75,085,230 UART: [art] Populate DV Done
75,090,369 UART: [fht] FMC Alias Private Key: 7
75,092,077 UART: [art] Derive CDI
75,092,897 UART: [art] Store in in slot 0x4
75,135,711 UART: [art] Derive Key Pair
75,136,746 UART: [art] Store priv key in slot 0x5
78,378,596 UART: [art] Derive Key Pair - Done
78,391,697 UART: [art] Signing Cert with AUTHO
78,392,991 UART: RITY.KEYID = 7
80,672,581 UART: [art] Erasing AUTHORITY.KEYID = 7
80,674,081 UART: [art] PUB.X = 59D3F117862405DCEE30F3A564088EC11BFE444B41E85815502E9292A3E3374DE3DE68CBDB91698515E477E285F85039
80,681,340 UART: [art] PUB.Y = 4AD7FA4019E9550A576A618A9777C03985B2492D712C6A9095450142D17778093BBE182A81E5D987187393B37DAE9846
80,688,526 UART: [art] SIG.R = B0E04A8F66DBE1186DC0DB4C30C7CAEE011BFA13391F6396C913EFA2F86D921C1E56B6C69D8F3730FB8E273A797E08A1
80,695,912 UART: [art] SIG.S = 9CBAB6983E64971D3AE1BAD4657A58A42EF2B96970E44918BBEBDC436F7D5F0A6FF8D7922659152613062BA41604E718
82,000,144 UART: mbox::rt_entry...
82,001,116 UART: ____ _ _ _ ____ _____
82,003,045 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,005,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,006,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,008,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,010,730 UART: |_|
82,011,554 UART:
82,294,815 UART: [rt] Runtime listening for mailbox commands...
82,296,987 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.23s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
4,131,107 ready_for_fw is high
4,131,705 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,353,939 >>> mbox cmd response: success
17,354,564 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,990,220 UART:
22,990,604 UART: Running Caliptra FMC ...
22,991,800 UART:
22,991,961 UART: [state] CFI Enabled
22,999,740 UART: [fht] FMC Alias Private Key: 7
25,330,369 UART: [art] Extend RT PCRs Done
25,331,589 UART: [art] Lock RT PCRs Done
25,333,051 UART: [art] Populate DV Done
25,338,365 UART: [fht] FMC Alias Private Key: 7
25,339,848 UART: [art] Derive CDI
25,340,609 UART: [art] Store in in slot 0x4
25,383,140 UART: [art] Derive Key Pair
25,384,142 UART: [art] Store priv key in slot 0x5
28,626,091 UART: [art] Derive Key Pair - Done
28,639,279 UART: [art] Signing Cert with AUTHO
28,640,587 UART: RITY.KEYID = 7
30,919,892 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,405 UART: [art] PUB.X = 6094C3F7C7AADEFD23B90CA96FC9CB6221D33582E10E5F0AB0AB331CB8034F6A99F04BA4511ABEF356159DD6997FE93B
30,928,657 UART: [art] PUB.Y = AA104CBF55A6E0D131119EB1AAADA36F44D8074DEAD594C0FB92D8A9D600B92C01C3CEBC34EAF156E56077027A719C12
30,935,883 UART: [art] SIG.R = 07CFCD60A333D2AE18775335276BC28D6FAF9C45BE781D9DF1DD663B4EFB28A885CE41B6604E4B8658D72D874F5C0470
30,943,274 UART: [art] SIG.S = 1680651DB6978E7FA59D319D8E9472C819B5E2A10940FE54311B2110D00B0225C1231554832666B2ED5ACD0FA28FA7F7
32,248,034 UART: mbox::rt_entry...
32,249,005 UART: ____ _ _ _ ____ _____
32,251,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,934 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,889 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,811 UART: |_|
32,259,613 UART:
32,374,050 UART: [rt] Runtime listening for mailbox commands...
32,376,205 >>> mbox cmd response data (48 bytes)
34,433,821 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,092,697 >>> mbox cmd response: success
43,093,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,126,080 UART:
43,126,370 UART: Running Caliptra FMC ...
43,127,401 UART:
43,127,542 UART: [state] CFI Enabled
43,172,000 UART: [art] Extend RT PCRs Done
43,173,198 UART: [art] Lock RT PCRs Done
43,174,835 UART: [art] Populate DV Done
43,180,510 UART: [fht] FMC Alias Private Key: 7
43,182,123 UART: [art] Derive CDI
43,182,861 UART: [art] Store in in slot 0x4
43,225,554 UART: [art] Derive Key Pair
43,226,551 UART: [art] Store priv key in slot 0x5
46,468,418 UART: [art] Derive Key Pair - Done
46,481,309 UART: [art] Signing Cert with AUTHO
46,482,606 UART: RITY.KEYID = 7
48,762,215 UART: [art] Erasing AUTHORITY.KEYID = 7
48,763,732 UART: [art] PUB.X = 1748114447AE21311927EB20E6A7C6A58688182B4F5C641E398CA711662CD4BFD538538962DCED0CAD496D73D6A949C8
48,770,980 UART: [art] PUB.Y = 6176572583F99A656D586A9A1574557F1BEA442E60988A1C2E57495BC083073A6605EA6FB1A73B4F9522FB788F1383AF
48,778,206 UART: [art] SIG.R = C57047607972368BBEB445E8FBC6D5E852E8C6C1AA7419EF529C6A51DA1C90AA8B9B0C478F43AE19446F6B6BC692614D
48,785,592 UART: [art] SIG.S = 911D564457F330C60BEF41757F2645EF39A5878D926FD8E51A4C7ECD60350D2F46F6DEEC0B6D60BCD1C625E85CB017A5
50,090,678 UART: Caliptra RT
50,091,400 UART: [state] CFI Enabled
50,383,138 UART: [rt] RT listening for mailbox commands...
50,415,434 UART: [rt]cmd =0x4d454153, len=108
50,434,115 >>> mbox cmd response data (12 bytes)
52,483,406 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,389,358 >>> mbox cmd response: success
62,432,033 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,531,599 UART:
62,531,973 UART: Running Caliptra FMC ...
62,533,109 UART:
62,533,273 UART: [state] CFI Enabled
62,534,193 UART: [art] Extend RT PCRs Done
62,535,333 UART: [art] Lock RT PCRs Done
62,536,412 UART: [art] Populate DV Done
62,537,445 UART: [fht] FMC Alias Private Key: 7
62,538,758 UART: [art] Derive CDI
62,539,489 UART: [art] Store in in slot 0x4
62,540,651 UART: [art] Derive Key Pair
62,541,603 UART: [art] Store priv key in slot 0x5
63,766,657 UART: [art] Derive Key Pair - Done
63,779,471 UART: [art] Signing Cert with AUTHO
63,780,761 UART: RITY.KEYID = 7
66,059,935 UART: [art] Erasing AUTHORITY.KEYID = 7
66,061,460 UART: [art] PUB.X = 0C498AFDE4561E2F733FD60756867348E0A83376491D9679B99B115712ED5A8C075E0362EBBDC5E4B9C4B1A5E32CF2ED
66,068,655 UART: [art] PUB.Y = 786CBAEE7A213448CBD9504EA447BE4B0E1C70B44C4154AAFE274F34B26CFF5BD4E62575578EE4757610E114C73BE4DA
66,075,947 UART: [art] SIG.R = B62B315AE872BFCA619132C2A5678CD5F1A86C5EA746E57BD67637FA52579DA5AE89AEA3DDCBFD62FD63BBFA608FE22B
66,083,337 UART: [art] SIG.S = 41607970F01C4656E1AB2101B3B70268F194FF5FDD09462EE5A64BA45C5066687253E42537B6E3DE26106F214FFA7F4A
67,388,469 UART: mbox::rt_entry...
67,389,609 UART: ____ _ _ _ ____ _____
67,391,623 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,393,576 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,395,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,397,357 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,399,278 UART: |_|
67,400,076 UART:
67,683,651 UART: [rt] Runtime listening for mailbox commands...
75,473,188 >>> mbox cmd response: success
75,473,593 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,509,303 UART:
75,509,563 UART: Running Caliptra FMC ...
75,510,670 UART:
75,510,824 UART: [state] CFI Enabled
75,554,846 UART: [art] Extend RT PCRs Done
75,556,032 UART: [art] Lock RT PCRs Done
75,557,379 UART: [art] Populate DV Done
75,562,970 UART: [fht] FMC Alias Private Key: 7
75,564,451 UART: [art] Derive CDI
75,565,206 UART: [art] Store in in slot 0x4
75,607,580 UART: [art] Derive Key Pair
75,608,575 UART: [art] Store priv key in slot 0x5
78,850,239 UART: [art] Derive Key Pair - Done
78,862,862 UART: [art] Signing Cert with AUTHO
78,864,161 UART: RITY.KEYID = 7
81,143,538 UART: [art] Erasing AUTHORITY.KEYID = 7
81,145,044 UART: [art] PUB.X = A74FD469FAB50D29CD27771CEB4EA3428C9F1B03F725EE047283D5414FFE8A0E8D76AD8F92F7CEE65A72BB1B4A2305E1
81,152,324 UART: [art] PUB.Y = 92BAA7FF30FDCFC1893FB299EAF46C34AFD6AB96CB005F5EE9E584105604535539F3514B59B40FD7ACBC7F851D20450E
81,159,567 UART: [art] SIG.R = 760A31CAFA75824849D4F3566CA560B1E02774D9F9B2B9DB24C9A831FCED3FCE6D4006267EB65FB673B04FF654B5FD4A
81,166,957 UART: [art] SIG.S = 3FE821A64DBD58E7F416D78ECDCC289366011A52B1E4D60E2DCC7CAF97563646FB52A4BCCA0F90D3A02835B75EC9B0F3
82,471,660 UART: mbox::rt_entry...
82,472,614 UART: ____ _ _ _ ____ _____
82,474,600 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,476,630 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,478,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,480,406 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,482,281 UART: |_|
82,483,101 UART:
82,765,231 UART: [rt] Runtime listening for mailbox commands...
82,767,402 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.25s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,410,206 UART: [ldev] --
10,414,548 UART: [fwproc] Wait for Commands...
10,417,608 UART: [fwproc] Recv command 0x46574c44
10,419,692 UART: [fwproc] Recv'd Img size: 78704 bytes
13,386,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,457,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,526,566 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,720,674 >>> mbox cmd response: success
13,721,182 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,724,549 UART: [afmc] ++
13,725,160 UART: [afmc] CDI.KEYID = 6
13,726,048 UART: [afmc] SUBJECT.KEYID = 7
13,727,266 UART: [afmc] AUTHORITY.KEYID = 5
16,253,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,973,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,975,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,990,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,006,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,022,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,044,477 UART: [afmc] --
18,048,511 UART: [cold-reset] --
18,052,909 UART: [state] Locking Datavault
18,058,854 UART: [state] Locking PCR0, PCR1 and PCR31
18,060,563 UART: [state] Locking ICCM
18,062,990 UART: [exit] Launching FMC @ 0x40000130
18,071,387 UART:
18,071,621 UART: Running Caliptra FMC ...
18,072,719 UART:
18,072,883 UART: [state] CFI Enabled
18,133,842 UART: [fht] FMC Alias Private Key: 7
19,897,117 UART: [art] Extend RT PCRs Done
19,898,346 UART: [art] Lock RT PCRs Done
19,899,988 UART: [art] Populate DV Done
19,905,620 UART: [fht] FMC Alias Private Key: 7
19,907,318 UART: [art] Derive CDI
19,908,128 UART: [art] Store in in slot 0x4
19,966,020 UART: [art] Derive Key Pair
19,967,060 UART: [art] Store priv key in slot 0x5
22,430,241 UART: [art] Derive Key Pair - Done
22,443,236 UART: [art] Signing Cert with AUTHO
22,444,542 UART: RITY.KEYID = 7
24,156,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,157,576 UART: [art] PUB.X = DDA42C304B95D038AA0EE30F2C549A1D13BD11ABC73520AC030B39499713F442C4596585F97C7DFEF1EED39A02387914
24,164,930 UART: [art] PUB.Y = 799AFB44A9FEBF36522EBB5C76C815C3DCAFC788CB3D7C4646622F6AB6CB65E030BC3C4DAF323FC247856C76498CE40C
24,172,115 UART: [art] SIG.R = 083999B025EB8CD266594346B51A3BF9BD5ED2EA1EAA7CC5EFB5FFB350D76F014D606993A5062DBD88C760C4C69AE1D7
24,179,497 UART: [art] SIG.S = 019970262E15471A498445550778B2DD88A3E46ADAD68617C7D3FE93F3708B2397765E5859BB2DF890D0407AA1F0EA4D
25,157,749 UART: mbox::rt_entry...
25,158,708 UART: ____ _ _ _ ____ _____
25,160,714 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,162,730 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,164,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,166,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,168,432 UART: |_|
25,169,232 UART:
25,282,534 UART: [rt] Runtime listening for mailbox commands...
25,284,696 >>> mbox cmd response data (48 bytes)
27,350,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,495,442 UART:
27,495,848 UART: Running Caliptra ROM ...
27,496,931 UART:
27,497,090 UART: [state] CFI Enabled
27,566,583 UART: [state] LifecycleState = Unprovisioned
27,568,468 UART: [state] DebugLocked = No
27,570,126 UART: [state] WD Timer not started. Device not locked for debugging
27,574,626 UART: [kat] SHA2-256
27,753,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,765,300 UART: [kat] ++
27,765,848 UART: [kat] sha1
27,776,634 UART: [kat] SHA2-256
27,779,705 UART: [kat] SHA2-384
27,784,443 UART: [kat] SHA2-512-ACC
27,787,385 UART: [kat] ECC-384
30,251,663 UART: [kat] HMAC-384Kdf
30,274,667 UART: [kat] LMS
30,804,136 UART: [kat] --
30,806,683 UART: [update-reset] ++
34,226,066 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,230,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,613,446 >>> mbox cmd response: success
34,613,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,614,296 UART: [update-reset] Copying MAN_2 To MAN_1
34,636,183 UART: [update-reset Success] --
34,640,529 UART: [state] Locking Datavault
34,643,673 UART: [state] Locking PCR0, PCR1 and PCR31
34,645,324 UART: [state] Locking ICCM
34,646,880 UART: [exit] Launching FMC @ 0x40000130
34,655,331 UART:
34,655,565 UART: Running Caliptra FMC ...
34,656,996 UART:
34,657,159 UART: [state] CFI Enabled
34,763,614 UART: [art] Extend RT PCRs Done
34,764,824 UART: [art] Lock RT PCRs Done
34,766,120 UART: [art] Populate DV Done
34,771,691 UART: [fht] FMC Alias Private Key: 7
34,773,450 UART: [art] Derive CDI
34,774,262 UART: [art] Store in in slot 0x4
34,832,632 UART: [art] Derive Key Pair
34,833,664 UART: [art] Store priv key in slot 0x5
37,296,609 UART: [art] Derive Key Pair - Done
37,309,871 UART: [art] Signing Cert with AUTHO
37,311,205 UART: RITY.KEYID = 7
39,021,838 UART: [art] Erasing AUTHORITY.KEYID = 7
39,023,355 UART: [art] PUB.X = 3A46DFB30368BAE1B3347DB0D28E5F14FDF85076D140D469D049871699A449481FA0291F0905B71DCDB698735AADCEBA
39,030,611 UART: [art] PUB.Y = 234C7F97BA44144B636EFFD1F4A0055907618BE2CC1F90084A36A110A66502B63775DEF03BEDB6B767639B41170E051F
39,037,845 UART: [art] SIG.R = 8DA133C531FE758AF00F1959AE832DDB2D42F8509E79666EE19A9DC1E1D35610AAA9E421E7954DB1DBA45CD97698BB13
39,045,238 UART: [art] SIG.S = 6E80954F1448EF74DA8ED1B368F026106800CB3061228BB0B876D257990D08262C0443A5210323735D1112F5C523D7BC
40,023,441 UART: Caliptra RT
40,024,147 UART: [state] CFI Enabled
40,359,784 UART: [rt] RT listening for mailbox commands...
40,391,957 UART: [rt]cmd =0x4d454153, len=108
40,410,724 >>> mbox cmd response data (12 bytes)
42,477,270 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,577,753 UART:
42,578,104 UART: Running Caliptra ROM ...
42,579,151 UART:
42,579,302 UART: [state] CFI Enabled
42,643,489 UART: [state] LifecycleState = Unprovisioned
42,645,376 UART: [state] DebugLocked = No
42,647,600 UART: [state] WD Timer not started. Device not locked for debugging
42,650,857 UART: [kat] SHA2-256
42,829,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,841,534 UART: [kat] ++
42,841,989 UART: [kat] sha1
42,853,197 UART: [kat] SHA2-256
42,856,214 UART: [kat] SHA2-384
42,862,040 UART: [kat] SHA2-512-ACC
42,864,983 UART: [kat] ECC-384
45,329,018 UART: [kat] HMAC-384Kdf
45,351,412 UART: [kat] LMS
45,880,863 UART: [kat] --
45,886,144 UART: [update-reset] ++
48,883,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,887,316 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,145,523 >>> mbox cmd response: success
51,209,156 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,309,028 UART: [update-reset] Copying MAN_2 To MAN_1
51,310,920 UART: [update-reset Success] --
51,312,093 UART: [state] Locking Datavault
51,313,242 UART: [state] Locking PCR0, PCR1 and PCR31
51,314,774 UART: [state] Locking ICCM
51,315,695 UART: [exit] Launching FMC @ 0x40000130
51,317,126 UART:
51,317,289 UART: Running Caliptra FMC ...
51,318,391 UART:
51,318,546 UART: [state] CFI Enabled
51,319,459 UART: [art] Extend RT PCRs Done
51,320,596 UART: [art] Lock RT PCRs Done
51,321,660 UART: [art] Populate DV Done
51,322,686 UART: [fht] FMC Alias Private Key: 7
51,323,999 UART: [art] Derive CDI
51,324,753 UART: [art] Store in in slot 0x4
51,325,922 UART: [art] Derive Key Pair
51,326,863 UART: [art] Store priv key in slot 0x5
51,821,958 UART: [art] Derive Key Pair - Done
51,834,831 UART: [art] Signing Cert with AUTHO
51,836,127 UART: RITY.KEYID = 7
53,548,574 UART: [art] Erasing AUTHORITY.KEYID = 7
53,550,213 UART: [art] PUB.X = 0D1DFC82BD454B394DA51E2600DF6FBAE5B5BF61A693833D59D989DC719C648F8B6D859E8AE3EDD5CCF4F773BF72DEA5
53,557,361 UART: [art] PUB.Y = C3FD38E82BADF9ACC8776480CFB057C74CD7A96260D6DF2605A9FB4A3112EE54BEFE475FD8C4AC0B7589BD2F4597511D
53,564,649 UART: [art] SIG.R = 21139F5A3841D92BFB1BEDD482B6C1C65E859ECE6CBF676398FC456EE265D98E00B573785C3F70C38DB48696E05E3E96
53,572,035 UART: [art] SIG.S = 7838A9D0F22041974DBB6F4394D378DE757E99457F43ACB71EA20263B969C67F766C107E7614D02E6412C428CE0E80A9
54,549,972 UART: mbox::rt_entry...
54,550,917 UART: ____ _ _ _ ____ _____
54,552,843 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,554,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,556,705 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,558,650 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,560,527 UART: |_|
54,561,329 UART:
54,845,000 UART: [rt] Runtime listening for mailbox commands...
54,847,072 UART:
54,847,239 UART: Running Caliptra ROM ...
54,848,260 UART:
54,848,451 UART: [state] CFI Enabled
54,912,474 UART: [state] LifecycleState = Unprovisioned
54,914,345 UART: [state] DebugLocked = No
54,916,136 UART: [state] WD Timer not started. Device not locked for debugging
54,919,491 UART: [kat] SHA2-256
55,098,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,110,195 UART: [kat] ++
55,110,649 UART: [kat] sha1
55,121,098 UART: [kat] SHA2-256
55,124,130 UART: [kat] SHA2-384
55,130,009 UART: [kat] SHA2-512-ACC
55,132,953 UART: [kat] ECC-384
57,594,746 UART: [kat] HMAC-384Kdf
57,616,625 UART: [kat] LMS
58,146,044 UART: [kat] --
58,151,657 UART: [update-reset] ++
61,150,855 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,154,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
61,412,685 >>> mbox cmd response: success
61,413,050 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,413,340 UART: [update-reset] Copying MAN_2 To MAN_1
61,435,305 UART: [update-reset Success] --
61,438,458 UART: [state] Locking Datavault
61,441,176 UART: [state] Locking PCR0, PCR1 and PCR31
61,442,875 UART: [state] Locking ICCM
61,444,124 UART: [exit] Launching FMC @ 0x40000130
61,452,585 UART:
61,452,820 UART: Running Caliptra FMC ...
61,453,922 UART:
61,454,076 UART: [state] CFI Enabled
61,552,402 UART: [art] Extend RT PCRs Done
61,553,590 UART: [art] Lock RT PCRs Done
61,555,100 UART: [art] Populate DV Done
61,560,568 UART: [fht] FMC Alias Private Key: 7
61,562,208 UART: [art] Derive CDI
61,563,017 UART: [art] Store in in slot 0x4
61,621,003 UART: [art] Derive Key Pair
61,622,003 UART: [art] Store priv key in slot 0x5
64,085,092 UART: [art] Derive Key Pair - Done
64,097,881 UART: [art] Signing Cert with AUTHO
64,099,190 UART: RITY.KEYID = 7
65,809,979 UART: [art] Erasing AUTHORITY.KEYID = 7
65,811,477 UART: [art] PUB.X = A6A2DF5487A990B6995979FC7CD97741467AC8DC7D0150E1B6F0E6E41191B1C45D8FCF5A8B1CFF2CC60961514922C283
65,818,775 UART: [art] PUB.Y = 89C5351B66855DAD20C5D6737270FAC404CBBCD5064CCDD1B73F2D9845D737A993A79FE5C73FF72483553F7E56356E6D
65,826,054 UART: [art] SIG.R = 1B117F19F41C724691332A094E30E96C3A115E49B5BEA42897A1B7AF97B6E3C36B74457C7F5E3B4094A9D91B55AA498D
65,833,453 UART: [art] SIG.S = 33C0D16CA37B88D67A89FB4BD497766514771AB0A5B124724493520716E5E645754D5CAE2FA05FA73ED716D2866C71EC
66,812,083 UART: mbox::rt_entry...
66,813,031 UART: ____ _ _ _ ____ _____
66,815,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,817,034 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,818,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,820,901 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,822,787 UART: |_|
66,823,614 UART:
67,106,842 UART: [rt] Runtime listening for mailbox commands...
67,109,024 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,381,638 ready_for_fw is high
3,382,046 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,541,940 >>> mbox cmd response: success
13,542,524 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,839,211 UART:
17,839,625 UART: Running Caliptra FMC ...
17,840,756 UART:
17,840,913 UART: [state] CFI Enabled
17,904,017 UART: [fht] FMC Alias Private Key: 7
19,668,025 UART: [art] Extend RT PCRs Done
19,669,247 UART: [art] Lock RT PCRs Done
19,670,929 UART: [art] Populate DV Done
19,676,234 UART: [fht] FMC Alias Private Key: 7
19,677,938 UART: [art] Derive CDI
19,678,681 UART: [art] Store in in slot 0x4
19,737,316 UART: [art] Derive Key Pair
19,738,315 UART: [art] Store priv key in slot 0x5
22,201,685 UART: [art] Derive Key Pair - Done
22,214,688 UART: [art] Signing Cert with AUTHO
22,215,987 UART: RITY.KEYID = 7
23,926,963 UART: [art] Erasing AUTHORITY.KEYID = 7
23,928,485 UART: [art] PUB.X = 918811EE239EB950D4DD14A290EF16F6A6A849E663E3747E821EB1AA17F2E50E64537019E1CD6D05DAC42F9AC280A3F4
23,935,696 UART: [art] PUB.Y = 49639A0DEA0F5F17B2DEB9D22C8B2015546307D9F3A2ACAA4E504FAD452662D2FD20EF6D97E9B881F1648858BA1E60BB
23,942,991 UART: [art] SIG.R = C87278F994760849EB20BA2ABA5C846CF115025681A1C7CF28FF6D7C3E8B4D56A0E7ABF1C5494B89C88CFA83E0D36B59
23,950,380 UART: [art] SIG.S = 973986D0C3D09840A904CF8C0CD4B9996B0C139E3C86F43271C95E71A78A3D6E69ADCC6D68B71F9AA03DD66BC85BCAE1
24,928,747 UART: mbox::rt_entry...
24,929,687 UART: ____ _ _ _ ____ _____
24,931,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,933,621 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,935,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,937,434 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,939,290 UART: |_|
24,940,115 UART:
25,053,632 UART: [rt] Runtime listening for mailbox commands...
25,055,815 >>> mbox cmd response data (48 bytes)
27,115,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,224,623 >>> mbox cmd response: success
34,225,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,258,838 UART:
34,259,123 UART: Running Caliptra FMC ...
34,260,159 UART:
34,260,310 UART: [state] CFI Enabled
34,367,240 UART: [art] Extend RT PCRs Done
34,368,430 UART: [art] Lock RT PCRs Done
34,370,021 UART: [art] Populate DV Done
34,375,375 UART: [fht] FMC Alias Private Key: 7
34,376,856 UART: [art] Derive CDI
34,377,590 UART: [art] Store in in slot 0x4
34,436,007 UART: [art] Derive Key Pair
34,437,076 UART: [art] Store priv key in slot 0x5
36,899,964 UART: [art] Derive Key Pair - Done
36,913,184 UART: [art] Signing Cert with AUTHO
36,914,483 UART: RITY.KEYID = 7
38,626,009 UART: [art] Erasing AUTHORITY.KEYID = 7
38,627,524 UART: [art] PUB.X = C1F7ADEAEED027B8BD3C8D9A8C8EEEB7BBC38E9333CDEC7B8A173964D97070D52515FF13D923540EBFD084EC51799FAD
38,634,781 UART: [art] PUB.Y = 9F502BF580ED57FC8A50852C374A5A846005E6A4DDF857687BCDE819411F109735D96B97C6086264ADE73642A0625E2B
38,642,025 UART: [art] SIG.R = FC99D8E4758316B2462751E89003D6367BA7CDFB323963EA9274E8C164D136536AD8A405044BAE79BE7DC03BBDC1836C
38,649,421 UART: [art] SIG.S = D29F91CA0BBFB377877C2C64DF054DDD3D1BF4FE909DE54E2621960DFFFDEE632656D67C5135BF1BE5125F92D1499366
39,628,624 UART: Caliptra RT
39,629,313 UART: [state] CFI Enabled
39,967,374 UART: [rt] RT listening for mailbox commands...
39,999,535 UART: [rt]cmd =0x4d454153, len=108
40,018,287 >>> mbox cmd response data (12 bytes)
42,064,886 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,575,762 >>> mbox cmd response: success
50,635,158 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,734,867 UART:
50,735,230 UART: Running Caliptra FMC ...
50,736,361 UART:
50,736,533 UART: [state] CFI Enabled
50,737,461 UART: [art] Extend RT PCRs Done
50,738,599 UART: [art] Lock RT PCRs Done
50,739,669 UART: [art] Populate DV Done
50,740,697 UART: [fht] FMC Alias Private Key: 7
50,742,035 UART: [art] Derive CDI
50,742,778 UART: [art] Store in in slot 0x4
50,743,945 UART: [art] Derive Key Pair
50,744,908 UART: [art] Store priv key in slot 0x5
51,237,442 UART: [art] Derive Key Pair - Done
51,250,198 UART: [art] Signing Cert with AUTHO
51,251,501 UART: RITY.KEYID = 7
52,962,616 UART: [art] Erasing AUTHORITY.KEYID = 7
52,964,127 UART: [art] PUB.X = 56C4AD833069EB1E0CF888404529EB98AB8057478A3860AEA6845BCF4823F427CA0273EE21D75A81AF54457026160FFD
52,971,331 UART: [art] PUB.Y = 90707FBC6D7A6CC68BE555ED99F97E910B355660F1F9638BE64B825FDE797960946A3461EF74E31C60BCCD2AEA7C618A
52,978,622 UART: [art] SIG.R = 1DCA1436C5B2087546D0E314055F2CBDDB79AEB35F6E8B001FB3785342671EB6C50B363564636A9D98E45F52F2A2EC4A
52,986,027 UART: [art] SIG.S = B818972EBA3724043957BFCA6E2A46252FC027FC6760A863C4C164043A985802A8A809287EB13DD233B7B1C1D9EBBA5F
53,964,289 UART: mbox::rt_entry...
53,965,257 UART: ____ _ _ _ ____ _____
53,967,187 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,969,194 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,971,069 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,973,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,974,890 UART: |_|
53,975,774 UART:
54,260,294 UART: [rt] Runtime listening for mailbox commands...
60,689,083 >>> mbox cmd response: success
60,689,483 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,724,173 UART:
60,724,464 UART: Running Caliptra FMC ...
60,725,501 UART:
60,725,654 UART: [state] CFI Enabled
60,818,719 UART: [art] Extend RT PCRs Done
60,819,901 UART: [art] Lock RT PCRs Done
60,821,224 UART: [art] Populate DV Done
60,826,635 UART: [fht] FMC Alias Private Key: 7
60,828,392 UART: [art] Derive CDI
60,829,150 UART: [art] Store in in slot 0x4
60,887,521 UART: [art] Derive Key Pair
60,888,558 UART: [art] Store priv key in slot 0x5
63,351,812 UART: [art] Derive Key Pair - Done
63,364,317 UART: [art] Signing Cert with AUTHO
63,365,618 UART: RITY.KEYID = 7
65,077,097 UART: [art] Erasing AUTHORITY.KEYID = 7
65,078,604 UART: [art] PUB.X = D8A538F9B6C29AC65372FBCFD048BF91172F6BFE0AFFA4D7A5D1CDC9BB6CE1261D7A90707DDE5AB3A29F7D5AA72E2A26
65,085,876 UART: [art] PUB.Y = 40058467649D18BECFE776FE0515306DF55BB1B41E31FA1C38328E072AA2F958207D5ECDDDE7B5A6B59CC3E2BFABCA0D
65,093,172 UART: [art] SIG.R = 4DD2D1A99F173A2CA55D424B419CF776D31DC2786BE78A123AFAFB23C83DED4691D8B1B91D3F85A41312AB7D1710EEA3
65,100,623 UART: [art] SIG.S = 28419ABC52F75227E13AF308551D8AC5104D4524AEBE26907C62543BDDF171C69EBBA590DC46BE9612C7953DBCE79F39
66,079,769 UART: mbox::rt_entry...
66,080,713 UART: ____ _ _ _ ____ _____
66,082,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,084,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,086,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,088,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,090,530 UART: |_|
66,091,362 UART:
66,373,385 UART: [rt] Runtime listening for mailbox commands...
66,375,558 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.44s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,613,585 UART: [ldev] --
10,618,629 UART: [fwproc] Wait for Commands...
10,621,646 UART: [fwproc] Recv command 0x46574c44
10,623,833 UART: [fwproc] Recv'd Img size: 78704 bytes
13,588,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,670,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,738,842 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,932,766 >>> mbox cmd response: success
13,933,269 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,936,908 UART: [afmc] ++
13,937,492 UART: [afmc] CDI.KEYID = 6
13,938,394 UART: [afmc] SUBJECT.KEYID = 7
13,939,612 UART: [afmc] AUTHORITY.KEYID = 5
16,440,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,161,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,163,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,179,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,195,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,211,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,234,615 UART: [afmc] --
18,237,742 UART: [cold-reset] --
18,242,631 UART: [state] Locking Datavault
18,248,088 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,788 UART: [state] Locking ICCM
18,251,502 UART: [exit] Launching FMC @ 0x40000130
18,259,947 UART:
18,260,186 UART: Running Caliptra FMC ...
18,261,281 UART:
18,261,435 UART: [state] CFI Enabled
18,269,502 UART: [fht] FMC Alias Private Key: 7
20,026,780 UART: [art] Extend RT PCRs Done
20,028,008 UART: [art] Lock RT PCRs Done
20,029,413 UART: [art] Populate DV Done
20,034,985 UART: [fht] FMC Alias Private Key: 7
20,036,631 UART: [art] Derive CDI
20,037,466 UART: [art] Store in in slot 0x4
20,079,907 UART: [art] Derive Key Pair
20,081,074 UART: [art] Store priv key in slot 0x5
22,507,742 UART: [art] Derive Key Pair - Done
22,520,739 UART: [art] Signing Cert with AUTHO
22,522,041 UART: RITY.KEYID = 7
24,227,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,229,270 UART: [art] PUB.X = C0DF095F0767C28078CC17D6A5AA2D52A8DE267633EF13BD2A21DEB9A11F88CB67471B4ADF83FDB1A1BFC87E29E6DF60
24,236,566 UART: [art] PUB.Y = 2002D00D5C66E38DBE8D1417D80A4288747A41089E15D49191A472E9431FB67534526BFF485F91F4336765485E71DE69
24,243,788 UART: [art] SIG.R = FFA4EFC8CA37677808545D7869F720DDF4EBEA1278AF3D494909D364C73EEDF7DDE2CD0954CEC58E282EDE0714E78B4E
24,251,219 UART: [art] SIG.S = 7574E11926C69CBF791E620BBCC2AEC88F4408B315B703EE1BAECC22F7EC4956684FF4C925DE02C7DE36C82ACE91C9FE
25,229,562 UART: mbox::rt_entry...
25,230,519 UART: ____ _ _ _ ____ _____
25,232,494 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,234,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,236,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,238,361 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,240,210 UART: |_|
25,241,000 UART:
25,354,900 UART: [rt] Runtime listening for mailbox commands...
25,357,067 >>> mbox cmd response data (48 bytes)
27,418,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,563,558 UART:
27,563,959 UART: Running Caliptra ROM ...
27,565,004 UART:
27,565,155 UART: [state] CFI Enabled
27,578,037 UART: [state] LifecycleState = Unprovisioned
27,579,937 UART: [state] DebugLocked = No
27,581,831 UART: [state] WD Timer not started. Device not locked for debugging
27,586,314 UART: [kat] SHA2-256
27,765,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,777,060 UART: [kat] ++
27,777,598 UART: [kat] sha1
27,788,649 UART: [kat] SHA2-256
27,791,650 UART: [kat] SHA2-384
27,797,571 UART: [kat] SHA2-512-ACC
27,800,511 UART: [kat] ECC-384
30,240,475 UART: [kat] HMAC-384Kdf
30,252,807 UART: [kat] LMS
30,782,301 UART: [kat] --
30,787,638 UART: [update-reset] ++
34,220,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,223,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,607,194 >>> mbox cmd response: success
34,607,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,608,007 UART: [update-reset] Copying MAN_2 To MAN_1
34,630,265 UART: [update-reset Success] --
34,633,229 UART: [state] Locking Datavault
34,635,780 UART: [state] Locking PCR0, PCR1 and PCR31
34,637,423 UART: [state] Locking ICCM
34,639,562 UART: [exit] Launching FMC @ 0x40000130
34,648,008 UART:
34,648,246 UART: Running Caliptra FMC ...
34,649,720 UART:
34,649,881 UART: [state] CFI Enabled
34,693,752 UART: [art] Extend RT PCRs Done
34,694,890 UART: [art] Lock RT PCRs Done
34,696,384 UART: [art] Populate DV Done
34,701,979 UART: [fht] FMC Alias Private Key: 7
34,703,606 UART: [art] Derive CDI
34,704,424 UART: [art] Store in in slot 0x4
34,746,907 UART: [art] Derive Key Pair
34,747,901 UART: [art] Store priv key in slot 0x5
37,175,030 UART: [art] Derive Key Pair - Done
37,188,080 UART: [art] Signing Cert with AUTHO
37,189,412 UART: RITY.KEYID = 7
38,895,131 UART: [art] Erasing AUTHORITY.KEYID = 7
38,896,635 UART: [art] PUB.X = AD4EAD7E23C232CA3C1689C762A159909C24B82A8402BDBA018325B1C817E8F5F7D8165F92584605A4EB9370F0F571CD
38,903,933 UART: [art] PUB.Y = 185879BFED2D97944D683A9748C2B6528BA6983EBE8E0670B67B48228F4D46A030D53495690C5E9EDFA5863578B0800C
38,911,161 UART: [art] SIG.R = C40F300EA779F0B30F100EA33D5D7C670D4C9CE9002955EE8B2E54FB7747B2402EF0718E4C248E961E3E82D6F691EE2C
38,918,553 UART: [art] SIG.S = CA13C0CF5C69375C793EA3D6CB461A597CD154D5EC2F1B353A9CF914B186A788BDA5FC920AB4D27F92E89FBC0EE8D3BF
39,897,204 UART: Caliptra RT
39,897,917 UART: [state] CFI Enabled
40,188,204 UART: [rt] RT listening for mailbox commands...
40,220,067 UART: [rt]cmd =0x4d454153, len=108
40,239,138 >>> mbox cmd response data (12 bytes)
42,284,372 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,385,235 UART:
42,385,606 UART: Running Caliptra ROM ...
42,386,733 UART:
42,386,900 UART: [state] CFI Enabled
42,400,511 UART: [state] LifecycleState = Unprovisioned
42,402,348 UART: [state] DebugLocked = No
42,404,268 UART: [state] WD Timer not started. Device not locked for debugging
42,407,361 UART: [kat] SHA2-256
42,586,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,598,119 UART: [kat] ++
42,598,659 UART: [kat] sha1
42,610,160 UART: [kat] SHA2-256
42,613,176 UART: [kat] SHA2-384
42,619,428 UART: [kat] SHA2-512-ACC
42,622,375 UART: [kat] ECC-384
45,064,387 UART: [kat] HMAC-384Kdf
45,075,540 UART: [kat] LMS
45,605,096 UART: [kat] --
45,608,866 UART: [update-reset] ++
48,609,185 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,611,862 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,870,080 >>> mbox cmd response: success
50,912,356 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,011,859 UART: [update-reset] Copying MAN_2 To MAN_1
51,013,554 UART: [update-reset Success] --
51,014,735 UART: [state] Locking Datavault
51,015,880 UART: [state] Locking PCR0, PCR1 and PCR31
51,017,413 UART: [state] Locking ICCM
51,018,337 UART: [exit] Launching FMC @ 0x40000130
51,019,811 UART:
51,019,976 UART: Running Caliptra FMC ...
51,020,991 UART:
51,021,132 UART: [state] CFI Enabled
51,022,206 UART: [art] Extend RT PCRs Done
51,023,271 UART: [art] Lock RT PCRs Done
51,024,245 UART: [art] Populate DV Done
51,025,205 UART: [fht] FMC Alias Private Key: 7
51,026,527 UART: [art] Derive CDI
51,027,260 UART: [art] Store in in slot 0x4
51,028,423 UART: [art] Derive Key Pair
51,029,358 UART: [art] Store priv key in slot 0x5
51,437,433 UART: [art] Derive Key Pair - Done
51,450,293 UART: [art] Signing Cert with AUTHO
51,451,582 UART: RITY.KEYID = 7
53,156,892 UART: [art] Erasing AUTHORITY.KEYID = 7
53,158,404 UART: [art] PUB.X = 35E70769C381CB0430D4402CC8A3D1AABD924B880180FAD0F6E2F396CB3BAC3330A295A9004C80B661C01E39FEA023BA
53,165,644 UART: [art] PUB.Y = 3A8C6A496D40FC35F4D99A17E1F20827DBDD2EEB105EE51D1DA4AB1824CF956958F17F4FA7CE79F404258E52E2A1E43A
53,172,916 UART: [art] SIG.R = 07ED9B7A88E92AE45E6CAA2BF176DBE12493AA4F9525449404E414BA86D5DB875A222A213E82F3388853529E90C9068B
53,180,294 UART: [art] SIG.S = 4A21D378614621D620F6A4949BA5EF5D2C100ED14308E3CC8762C5707F604BD4B817866262D76A922E3A8C9A10EDBBE2
54,158,504 UART: mbox::rt_entry...
54,159,446 UART: ____ _ _ _ ____ _____
54,161,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,163,362 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,165,285 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,167,202 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,169,123 UART: |_|
54,169,927 UART:
54,454,389 UART: [rt] Runtime listening for mailbox commands...
54,456,469 UART:
54,456,632 UART: Running Caliptra ROM ...
54,457,736 UART:
54,457,998 UART: [state] CFI Enabled
54,472,355 UART: [state] LifecycleState = Unprovisioned
54,474,282 UART: [state] DebugLocked = No
54,476,469 UART: [state] WD Timer not started. Device not locked for debugging
54,479,499 UART: [kat] SHA2-256
54,658,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
54,670,258 UART: [kat] ++
54,670,801 UART: [kat] sha1
54,681,739 UART: [kat] SHA2-256
54,684,741 UART: [kat] SHA2-384
54,690,349 UART: [kat] SHA2-512-ACC
54,693,286 UART: [kat] ECC-384
57,134,093 UART: [kat] HMAC-384Kdf
57,146,916 UART: [kat] LMS
57,676,466 UART: [kat] --
57,680,240 UART: [update-reset] ++
60,676,778 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
60,679,391 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
60,937,637 >>> mbox cmd response: success
60,938,532 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,938,875 UART: [update-reset] Copying MAN_2 To MAN_1
60,961,227 UART: [update-reset Success] --
60,966,309 UART: [state] Locking Datavault
60,969,726 UART: [state] Locking PCR0, PCR1 and PCR31
60,971,420 UART: [state] Locking ICCM
60,973,401 UART: [exit] Launching FMC @ 0x40000130
60,981,851 UART:
60,982,082 UART: Running Caliptra FMC ...
60,983,198 UART:
60,983,354 UART: [state] CFI Enabled
61,027,255 UART: [art] Extend RT PCRs Done
61,028,434 UART: [art] Lock RT PCRs Done
61,029,829 UART: [art] Populate DV Done
61,035,185 UART: [fht] FMC Alias Private Key: 7
61,036,875 UART: [art] Derive CDI
61,037,682 UART: [art] Store in in slot 0x4
61,080,541 UART: [art] Derive Key Pair
61,081,537 UART: [art] Store priv key in slot 0x5
63,508,620 UART: [art] Derive Key Pair - Done
63,521,994 UART: [art] Signing Cert with AUTHO
63,523,304 UART: RITY.KEYID = 7
65,228,778 UART: [art] Erasing AUTHORITY.KEYID = 7
65,230,281 UART: [art] PUB.X = 3DD96A107299A48F297302886EC54B71A94E331EBA766AFF11B4159539778B5E0F3B10CC1C755A22EDB21B5097BF4AB6
65,237,580 UART: [art] PUB.Y = 68B19CE842EFA9E8ADC944B595F5C2FC268EC20952F8649A51BA3143B4BA040BA34340FCA2712D555DCEDEFB0A9ABF5B
65,244,822 UART: [art] SIG.R = FD142CD4767292130E021E6EC443897F2503F7779A160DB2106DFAB153C90B7F25B31426E1215045F452211ED59BCE3E
65,252,169 UART: [art] SIG.S = D5F5B1407BA5CFED7298AB56CA95920CFCCFC9D2C79912469F61E3FE4EC57E9B51341651FE28F7B38D3245710F6924DF
66,230,917 UART: mbox::rt_entry...
66,231,858 UART: ____ _ _ _ ____ _____
66,233,830 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,235,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,237,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,239,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,241,595 UART: |_|
66,242,572 UART:
66,525,886 UART: [rt] Runtime listening for mailbox commands...
66,528,100 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,690,141 ready_for_fw is high
3,690,568 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,696,583 >>> mbox cmd response: success
13,697,387 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,952,326 UART:
17,952,735 UART: Running Caliptra FMC ...
17,953,870 UART:
17,954,018 UART: [state] CFI Enabled
17,962,178 UART: [fht] FMC Alias Private Key: 7
19,718,905 UART: [art] Extend RT PCRs Done
19,720,126 UART: [art] Lock RT PCRs Done
19,721,371 UART: [art] Populate DV Done
19,726,716 UART: [fht] FMC Alias Private Key: 7
19,728,255 UART: [art] Derive CDI
19,729,058 UART: [art] Store in in slot 0x4
19,771,439 UART: [art] Derive Key Pair
19,772,432 UART: [art] Store priv key in slot 0x5
22,199,144 UART: [art] Derive Key Pair - Done
22,212,470 UART: [art] Signing Cert with AUTHO
22,213,771 UART: RITY.KEYID = 7
23,919,243 UART: [art] Erasing AUTHORITY.KEYID = 7
23,920,751 UART: [art] PUB.X = 5D20CFF51B9A423948408324DF98101ADBEEC12CE754E88D8F92A74C9DBA2F8BF5C9C676644637A426521B1D27651F54
23,928,001 UART: [art] PUB.Y = 612500404458E425D2311A0481D608D12C38E04C9498ADD19A3BE29C2AA99AA839E885392A892C524E0ABF2C3C819356
23,935,236 UART: [art] SIG.R = 685124D4ACE71D26298F6888ECAE936BBCA1A3E5A7D7753CBC157BDDFF351297406EE170667C3304BBE2F8DB2C15ADE8
23,942,669 UART: [art] SIG.S = 0B09B829B6ED46C6DF12309922D58900CB4BD90D94ACAAADC37D76A90436DE46837EDBF1100BB8E4AADAB05AAFDCEA32
24,921,114 UART: mbox::rt_entry...
24,922,073 UART: ____ _ _ _ ____ _____
24,924,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,926,031 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,928,077 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,930,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,931,885 UART: |_|
24,932,702 UART:
25,046,776 UART: [rt] Runtime listening for mailbox commands...
25,048,951 >>> mbox cmd response data (48 bytes)
27,106,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,149,950 >>> mbox cmd response: success
34,150,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,184,986 UART:
34,185,314 UART: Running Caliptra FMC ...
34,186,367 UART:
34,186,511 UART: [state] CFI Enabled
34,230,694 UART: [art] Extend RT PCRs Done
34,231,839 UART: [art] Lock RT PCRs Done
34,233,251 UART: [art] Populate DV Done
34,238,968 UART: [fht] FMC Alias Private Key: 7
34,240,656 UART: [art] Derive CDI
34,241,382 UART: [art] Store in in slot 0x4
34,284,239 UART: [art] Derive Key Pair
34,285,272 UART: [art] Store priv key in slot 0x5
36,711,676 UART: [art] Derive Key Pair - Done
36,724,726 UART: [art] Signing Cert with AUTHO
36,726,027 UART: RITY.KEYID = 7
38,431,640 UART: [art] Erasing AUTHORITY.KEYID = 7
38,433,143 UART: [art] PUB.X = 8DFD63E29BC7685DA9BB12084C534723405A98835139AEEFF83ACFA395E5F4E534241A948F19774E85A4B70787A01C74
38,440,392 UART: [art] PUB.Y = E588632E7CB130F5B24E581DAB24F570FF67DEDC916AEEDE6D296F9120DC1689E4D390B15F6BE01CD2D546D179E4346F
38,447,631 UART: [art] SIG.R = CD5D635F186BD3544237E023468D365B917047D585A892DC01ACC2A003A29BC9925D5E2A793052AC0F457E749DC3151C
38,455,013 UART: [art] SIG.S = B6EA62AFEFC888E47896903F159AB6AEC28ADC1EBB88F19A3C5E2EB8066797CAD0FE9A925996A7ABA19834A5909CDB01
39,433,894 UART: Caliptra RT
39,434,596 UART: [state] CFI Enabled
39,721,789 UART: [rt] RT listening for mailbox commands...
39,753,914 UART: [rt]cmd =0x4d454153, len=108
39,772,243 >>> mbox cmd response data (12 bytes)
41,815,733 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,255,109 >>> mbox cmd response: success
50,298,844 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,398,426 UART:
50,398,778 UART: Running Caliptra FMC ...
50,399,906 UART:
50,400,071 UART: [state] CFI Enabled
50,400,992 UART: [art] Extend RT PCRs Done
50,402,127 UART: [art] Lock RT PCRs Done
50,403,182 UART: [art] Populate DV Done
50,404,200 UART: [fht] FMC Alias Private Key: 7
50,405,502 UART: [art] Derive CDI
50,406,228 UART: [art] Store in in slot 0x4
50,407,386 UART: [art] Derive Key Pair
50,408,370 UART: [art] Store priv key in slot 0x5
50,814,370 UART: [art] Derive Key Pair - Done
50,827,497 UART: [art] Signing Cert with AUTHO
50,828,819 UART: RITY.KEYID = 7
52,534,412 UART: [art] Erasing AUTHORITY.KEYID = 7
52,535,950 UART: [art] PUB.X = 67909AACBFA662A96FC272DB7A638C962BFC7CCFC727DB44BA9C75C1EC40BCC771D5A08245C6689B4E47689A755FCE03
52,543,247 UART: [art] PUB.Y = 51D65832C542A5EF1AD695F16BDAB50BA42C6E5CDBCA19EBD7FC4B6573B9A161BFB983D85652F1948F27ADA8ACA7C6A2
52,550,522 UART: [art] SIG.R = 5E8B8A5D5B5061DED548EA0AF5BF6949FDC13808AABC66BB3BE34FD55EB03521B692A3C6264EC3E4B450A69EE9A871DF
52,557,961 UART: [art] SIG.S = 5CBDA4DF9158931FC31748E93D8CF165EC492E7BAC780AEA6AC4640DF27BD6493362B3BDEBCE949B43E3862D1707F1CC
53,535,973 UART: mbox::rt_entry...
53,536,944 UART: ____ _ _ _ ____ _____
53,538,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,540,930 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,542,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,544,774 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,546,690 UART: |_|
53,547,493 UART:
53,833,669 UART: [rt] Runtime listening for mailbox commands...
60,173,049 >>> mbox cmd response: success
60,174,195 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,207,853 UART:
60,208,289 UART: Running Caliptra FMC ...
60,209,346 UART:
60,209,497 UART: [state] CFI Enabled
60,253,537 UART: [art] Extend RT PCRs Done
60,254,679 UART: [art] Lock RT PCRs Done
60,256,129 UART: [art] Populate DV Done
60,261,461 UART: [fht] FMC Alias Private Key: 7
60,263,105 UART: [art] Derive CDI
60,263,912 UART: [art] Store in in slot 0x4
60,306,493 UART: [art] Derive Key Pair
60,307,486 UART: [art] Store priv key in slot 0x5
62,734,549 UART: [art] Derive Key Pair - Done
62,747,480 UART: [art] Signing Cert with AUTHO
62,748,811 UART: RITY.KEYID = 7
64,454,278 UART: [art] Erasing AUTHORITY.KEYID = 7
64,455,781 UART: [art] PUB.X = A0C189ECF4FF91482A62A7011CE2926D4D42710F63AA77F289967F6702C8F113107484B840A13DD263D41ED10F885CDB
64,463,039 UART: [art] PUB.Y = 7F63EE1568DA8AE9B5F63045C8AF1CE30D533A0B6025177D6F67E570DC6769C174BCA6B6916760C4BAE607149179F70A
64,470,331 UART: [art] SIG.R = 6859E0F1B4CCEE96A510969DB24101682AE3FCD9F3C16CA3C5DDBF7C00D797C8D5AE81E4C2E6AEBEECBC161DB1471EA9
64,477,710 UART: [art] SIG.S = BA6DADF73C2A5E505ECA1C55D5F356780B3EC08587DBCC5193E2887DB49CBA48CC63F39842A4E65A3684E0E85E08675F
65,456,569 UART: mbox::rt_entry...
65,457,520 UART: ____ _ _ _ ____ _____
65,459,608 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
65,461,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
65,463,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
65,465,459 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
65,467,312 UART: |_|
65,468,099 UART:
65,752,154 UART: [rt] Runtime listening for mailbox commands...
65,754,321 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.40s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,426,886 UART: [ldev] --
10,431,500 UART: [fwproc] Wait for Commands...
10,434,295 UART: [fwproc] Recv command 0x46574c44
10,436,553 UART: [fwproc] Recv'd Img size: 78704 bytes
13,442,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,518,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,634,747 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,963,752 >>> mbox cmd response: success
13,964,272 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,968,622 UART: [afmc] ++
13,969,350 UART: [afmc] CDI.KEYID = 6
13,970,486 UART: [afmc] SUBJECT.KEYID = 7
13,971,980 UART: [afmc] AUTHORITY.KEYID = 5
16,506,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,232,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,234,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,249,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,264,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,279,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,303,028 UART: [afmc] --
18,305,860 UART: [cold-reset] --
18,309,451 UART: [state] Locking Datavault
18,315,725 UART: [state] Locking PCR0, PCR1 and PCR31
18,317,915 UART: [state] Locking ICCM
18,319,849 UART: [exit] Launching FMC @ 0x40000130
18,328,524 UART:
18,328,804 UART: Running Caliptra FMC ...
18,329,856 UART:
18,330,010 UART: [state] CFI Enabled
18,390,727 UART: [fht] FMC Alias Private Key: 7
20,154,634 UART: [art] Extend RT PCRs Done
20,155,853 UART: [art] Lock RT PCRs Done
20,157,286 UART: [art] Populate DV Done
20,162,698 UART: [fht] FMC Alias Private Key: 7
20,164,395 UART: [art] Derive CDI
20,165,159 UART: [art] Store in in slot 0x4
20,223,266 UART: [art] Derive Key Pair
20,224,266 UART: [art] Store priv key in slot 0x5
22,687,383 UART: [art] Derive Key Pair - Done
22,700,604 UART: [art] Signing Cert with AUTHO
22,701,910 UART: RITY.KEYID = 7
24,413,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,918 UART: [art] PUB.X = 0F9853A27DB208EF130712CD9E5CD07CA025A7713D8AEF0DFC8696197235E8C86DF4DEFCCF768C463900D64BC2B05E07
24,422,177 UART: [art] PUB.Y = 3D24A49B523A9A6FB4CC12246E2A2B9FB0C400E4E07D9CA431C8614083CD39FE98F14684764114FC0D3F5682D0EE15E8
24,429,407 UART: [art] SIG.R = C2C2EC7FA6E4D384241065D2F66CEB36137D92E55FC9C5C7B35AB18F4778CE14D60B89CDB4A31B794E2C3737318DBB67
24,436,795 UART: [art] SIG.S = 979F6068DE83977CAF2BE3F07C1D726C888A2D9C876C390B093D830EDD4EA9090305A6612BEA2E1700EF073FE2F44C0D
25,415,639 UART: mbox::rt_entry...
25,416,606 UART: ____ _ _ _ ____ _____
25,418,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,420,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,422,472 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,424,401 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,426,326 UART: |_|
25,427,155 UART:
25,540,907 UART: [rt] Runtime listening for mailbox commands...
25,543,076 >>> mbox cmd response data (48 bytes)
27,605,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,750,604 UART:
27,750,948 UART: Running Caliptra ROM ...
27,752,023 UART:
27,752,185 UART: [state] CFI Enabled
27,826,050 UART: [state] LifecycleState = Unprovisioned
27,828,153 UART: [state] DebugLocked = No
27,830,108 UART: [state] WD Timer not started. Device not locked for debugging
27,834,397 UART: [kat] SHA2-256
28,024,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,035,019 UART: [kat] ++
28,035,480 UART: [kat] sha1
28,046,261 UART: [kat] SHA2-256
28,049,245 UART: [kat] SHA2-384
28,054,050 UART: [kat] SHA2-512-ACC
28,056,619 UART: [kat] ECC-384
30,510,413 UART: [kat] HMAC-384Kdf
30,535,023 UART: [kat] LMS
31,066,567 UART: [kat] --
31,072,315 UART: [update-reset] ++
34,528,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,532,558 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,140,810 >>> mbox cmd response: success
35,141,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,142,198 UART: [update-reset] Copying MAN_2 To MAN_1
35,179,774 UART: [update-reset Success] --
35,184,170 UART: [state] Locking Datavault
35,187,802 UART: [state] Locking PCR0, PCR1 and PCR31
35,190,007 UART: [state] Locking ICCM
35,192,834 UART: [exit] Launching FMC @ 0x40000130
35,201,456 UART:
35,201,691 UART: Running Caliptra FMC ...
35,203,028 UART:
35,203,191 UART: [state] CFI Enabled
35,302,736 UART: [art] Extend RT PCRs Done
35,303,947 UART: [art] Lock RT PCRs Done
35,305,190 UART: [art] Populate DV Done
35,310,868 UART: [fht] FMC Alias Private Key: 7
35,312,615 UART: [art] Derive CDI
35,313,429 UART: [art] Store in in slot 0x4
35,371,439 UART: [art] Derive Key Pair
35,372,483 UART: [art] Store priv key in slot 0x5
37,835,501 UART: [art] Derive Key Pair - Done
37,848,779 UART: [art] Signing Cert with AUTHO
37,850,109 UART: RITY.KEYID = 7
39,561,190 UART: [art] Erasing AUTHORITY.KEYID = 7
39,562,692 UART: [art] PUB.X = 3B8DE4F9A69E37DE4D9F003631961A37A006B099BFB3DE772AC68B0BEBE3259A0C7791545E4DDDA22081FAC6CE97FA9F
39,569,928 UART: [art] PUB.Y = 5AA0A3C2EF2AF7E1B2E72BFA0B219FFB667429E9FE4DDD345F8AB3FDB0C53F6B6FB16484692A22A78B8F7698F621A5F9
39,577,272 UART: [art] SIG.R = 06C217168BE36770F02186AE4B610D10F76DC6AE0C8F04012263E3B712478A1558886056EBADC68643A68222E867771E
39,584,601 UART: [art] SIG.S = 8C2A62AD90A9F20EC2D167BF75BF3E8FDAD1582D45369B78E083F68A7B5FBC8CFDA0B8F592F2142AA830F882CAB3FFCD
40,563,382 UART: Caliptra RT
40,564,101 UART: [state] CFI Enabled
40,902,352 UART: [rt] RT listening for mailbox commands...
40,934,203 UART: [rt]cmd =0x4d454153, len=108
40,952,701 >>> mbox cmd response data (12 bytes)
42,999,978 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,100,513 UART:
43,100,857 UART: Running Caliptra ROM ...
43,101,994 UART:
43,102,186 UART: [state] CFI Enabled
43,164,820 UART: [state] LifecycleState = Unprovisioned
43,166,867 UART: [state] DebugLocked = No
43,168,150 UART: [state] WD Timer not started. Device not locked for debugging
43,172,879 UART: [kat] SHA2-256
43,362,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,373,491 UART: [kat] ++
43,374,030 UART: [kat] sha1
43,386,601 UART: [kat] SHA2-256
43,389,617 UART: [kat] SHA2-384
43,394,099 UART: [kat] SHA2-512-ACC
43,396,670 UART: [kat] ECC-384
45,846,896 UART: [kat] HMAC-384Kdf
45,870,802 UART: [kat] LMS
46,402,374 UART: [kat] --
46,406,687 UART: [update-reset] ++
49,428,152 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,431,632 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,825,429 >>> mbox cmd response: success
51,885,168 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,984,689 UART: [update-reset] Copying MAN_2 To MAN_1
51,986,373 UART: [update-reset Success] --
51,987,456 UART: [state] Locking Datavault
51,988,604 UART: [state] Locking PCR0, PCR1 and PCR31
51,990,145 UART: [state] Locking ICCM
51,991,021 UART: [exit] Launching FMC @ 0x40000130
51,992,368 UART:
51,992,513 UART: Running Caliptra FMC ...
51,993,611 UART:
51,993,787 UART: [state] CFI Enabled
51,994,622 UART: [art] Extend RT PCRs Done
51,995,669 UART: [art] Lock RT PCRs Done
51,996,728 UART: [art] Populate DV Done
51,997,723 UART: [fht] FMC Alias Private Key: 7
51,999,037 UART: [art] Derive CDI
51,999,782 UART: [art] Store in in slot 0x4
52,000,948 UART: [art] Derive Key Pair
52,001,946 UART: [art] Store priv key in slot 0x5
52,509,979 UART: [art] Derive Key Pair - Done
52,522,749 UART: [art] Signing Cert with AUTHO
52,524,056 UART: RITY.KEYID = 7
54,235,805 UART: [art] Erasing AUTHORITY.KEYID = 7
54,237,309 UART: [art] PUB.X = 8BBF26D1F21FED48ABF0E44B7862E03CEE13DF7FFCB476E6758D6B9CFEFDA6BB4BFCF752143FD000C9D71B79FC1984CF
54,244,798 UART: [art] PUB.Y = 2384C67762F6DAE42CBBD6839C1B3FAB6950FA7F2758D7A949E921CB643E6786B25DEDDB5D34CD5D81FE92D3837F2BDE
54,251,924 UART: [art] SIG.R = A90296398E76DAA08F7FFDEF359BF119CD6FE29D966C2C6ABABE155A3B2983F06950DE77DCA7215EFEB5EC542BB6ECC5
54,259,326 UART: [art] SIG.S = 4DA94A316E2AFB9F4665A298AAC948E08123237FDF41E231FC9A3AC5C33B5817D8102EDB2F7183215AB476E134CE113D
55,237,789 UART: mbox::rt_entry...
55,238,742 UART: ____ _ _ _ ____ _____
55,240,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,242,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,244,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,246,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,248,334 UART: |_|
55,249,161 UART:
55,535,714 UART: [rt] Runtime listening for mailbox commands...
55,537,820 UART:
55,537,982 UART: Running Caliptra ROM ...
55,538,999 UART:
55,539,149 UART: [state] CFI Enabled
55,596,043 UART: [state] LifecycleState = Unprovisioned
55,598,099 UART: [state] DebugLocked = No
55,599,505 UART: [state] WD Timer not started. Device not locked for debugging
55,603,430 UART: [kat] SHA2-256
55,793,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,804,030 UART: [kat] ++
55,804,488 UART: [kat] sha1
55,815,432 UART: [kat] SHA2-256
55,818,443 UART: [kat] SHA2-384
55,823,945 UART: [kat] SHA2-512-ACC
55,826,564 UART: [kat] ECC-384
58,281,019 UART: [kat] HMAC-384Kdf
58,305,021 UART: [kat] LMS
58,836,589 UART: [kat] --
58,841,926 UART: [update-reset] ++
61,864,900 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,867,904 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
62,261,707 >>> mbox cmd response: success
62,262,099 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,263,478 UART: [update-reset] Copying MAN_2 To MAN_1
62,301,053 UART: [update-reset Success] --
62,305,773 UART: [state] Locking Datavault
62,309,789 UART: [state] Locking PCR0, PCR1 and PCR31
62,311,983 UART: [state] Locking ICCM
62,313,812 UART: [exit] Launching FMC @ 0x40000130
62,322,432 UART:
62,322,663 UART: Running Caliptra FMC ...
62,323,763 UART:
62,323,923 UART: [state] CFI Enabled
62,410,562 UART: [art] Extend RT PCRs Done
62,411,746 UART: [art] Lock RT PCRs Done
62,413,037 UART: [art] Populate DV Done
62,418,500 UART: [fht] FMC Alias Private Key: 7
62,420,195 UART: [art] Derive CDI
62,421,023 UART: [art] Store in in slot 0x4
62,480,089 UART: [art] Derive Key Pair
62,481,091 UART: [art] Store priv key in slot 0x5
64,943,180 UART: [art] Derive Key Pair - Done
64,956,013 UART: [art] Signing Cert with AUTHO
64,957,324 UART: RITY.KEYID = 7
66,669,842 UART: [art] Erasing AUTHORITY.KEYID = 7
66,671,342 UART: [art] PUB.X = 2EC2149611490938228154F1F2A2C3639E9DD0D1EB1A5FA850A58DBDE690710F4E811B397B62574844E9A2C167F06190
66,678,583 UART: [art] PUB.Y = 12D0EEAFD104366BADFC5A588125152BE75BBB95442BA95AE926C6DE84835F63DFC49DA256782ADE526D7AE23CFA8953
66,685,861 UART: [art] SIG.R = 6184F21DF20284FAE3A5BABD3EDE5613F8D1E6C66A16567C008BB5CBF53F95CB3A781716CA013C672A03FA6B5E28D043
66,693,270 UART: [art] SIG.S = 1B29378B089670C7BE7B52991B788D24CA88D4BE6AD1E3D9B8056D66545D7730F0EA9A4CBF1E87B74C873380D062808E
67,671,360 UART: mbox::rt_entry...
67,672,307 UART: ____ _ _ _ ____ _____
67,674,284 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,676,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,678,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,680,165 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,682,018 UART: |_|
67,682,830 UART:
67,970,728 UART: [rt] Runtime listening for mailbox commands...
67,972,852 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,414,792 ready_for_fw is high
3,415,168 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,964,243 >>> mbox cmd response: success
13,965,049 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,253,704 UART:
18,254,132 UART: Running Caliptra FMC ...
18,255,269 UART:
18,255,433 UART: [state] CFI Enabled
18,319,681 UART: [fht] FMC Alias Private Key: 7
20,084,225 UART: [art] Extend RT PCRs Done
20,085,454 UART: [art] Lock RT PCRs Done
20,087,093 UART: [art] Populate DV Done
20,092,564 UART: [fht] FMC Alias Private Key: 7
20,094,210 UART: [art] Derive CDI
20,095,028 UART: [art] Store in in slot 0x4
20,153,176 UART: [art] Derive Key Pair
20,154,210 UART: [art] Store priv key in slot 0x5
22,617,615 UART: [art] Derive Key Pair - Done
22,630,559 UART: [art] Signing Cert with AUTHO
22,631,859 UART: RITY.KEYID = 7
24,343,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,345,013 UART: [art] PUB.X = 5988C2E5C9864CE41C8ABC780E4999637B88B56904CC3AEC54C66F6A335C89AAE77A28D3C11B200BF10215076A4231C0
24,352,066 UART: [art] PUB.Y = 435A20A00DAC7185060BECC4EB0E578A149EAF8E464A412D272C0E25370C779B20CA5353D547909CC090B0F4B3FE3485
24,359,317 UART: [art] SIG.R = 014A85CC98AC27989B9E5AADFE7C2F5E09D6B2FC53ED261200B1B2AD77A6C55E80C648AD7508FB32BB02F42CCEE58565
24,366,710 UART: [art] SIG.S = 00955292A4B3098FA83F408FE838255FA6451CAA23DB1161F5D1765BAE51FD1EEEDA7DCCE9BC3D703D51C6B91EC50994
25,345,099 UART: mbox::rt_entry...
25,346,057 UART: ____ _ _ _ ____ _____
25,348,043 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,350,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,351,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,353,939 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,355,877 UART: |_|
25,356,686 UART:
25,469,653 UART: [rt] Runtime listening for mailbox commands...
25,471,819 >>> mbox cmd response data (48 bytes)
27,530,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,344,822 >>> mbox cmd response: success
35,345,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,380,891 UART:
35,381,184 UART: Running Caliptra FMC ...
35,382,304 UART:
35,382,461 UART: [state] CFI Enabled
35,486,835 UART: [art] Extend RT PCRs Done
35,488,031 UART: [art] Lock RT PCRs Done
35,489,444 UART: [art] Populate DV Done
35,494,799 UART: [fht] FMC Alias Private Key: 7
35,496,454 UART: [art] Derive CDI
35,497,270 UART: [art] Store in in slot 0x4
35,556,402 UART: [art] Derive Key Pair
35,557,463 UART: [art] Store priv key in slot 0x5
38,020,437 UART: [art] Derive Key Pair - Done
38,033,215 UART: [art] Signing Cert with AUTHO
38,034,545 UART: RITY.KEYID = 7
39,746,526 UART: [art] Erasing AUTHORITY.KEYID = 7
39,748,029 UART: [art] PUB.X = 96F7675796313DE00A63D63FE5BA1B53B3D61EE655B7782A686633708FBFC2E40F69BCE2A8F2DE5196EFAAF0A1EA435C
39,755,337 UART: [art] PUB.Y = A6C7367A9BC30B24B2F535DE03F9D06D4A9069748962C9ADE9C1ACB10175354B3C7A4A3D30A03A744422C4F13A5AA711
39,762,562 UART: [art] SIG.R = AC876CF9BEDFB90705FC0966066AA3B6F7C826F616A2DB6B63C10BD7804538A9AC62F6B04DF2A98B0AE43C5646CDCA23
39,770,002 UART: [art] SIG.S = A6358B6797806AE334C75888EA1782A5949D600DE3E6FC1623C58F8F48FF7569F26B48EC5D303AB8E285509082C01683
40,748,564 UART: Caliptra RT
40,749,271 UART: [state] CFI Enabled
41,086,920 UART: [rt] RT listening for mailbox commands...
41,119,384 UART: [rt]cmd =0x4d454153, len=108
41,137,991 >>> mbox cmd response data (12 bytes)
43,187,269 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,180,012 >>> mbox cmd response: success
52,232,035 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
52,331,663 UART:
52,332,018 UART: Running Caliptra FMC ...
52,333,150 UART:
52,333,315 UART: [state] CFI Enabled
52,334,238 UART: [art] Extend RT PCRs Done
52,335,377 UART: [art] Lock RT PCRs Done
52,336,439 UART: [art] Populate DV Done
52,337,430 UART: [fht] FMC Alias Private Key: 7
52,338,743 UART: [art] Derive CDI
52,339,497 UART: [art] Store in in slot 0x4
52,340,682 UART: [art] Derive Key Pair
52,341,598 UART: [art] Store priv key in slot 0x5
52,846,732 UART: [art] Derive Key Pair - Done
52,859,811 UART: [art] Signing Cert with AUTHO
52,861,112 UART: RITY.KEYID = 7
54,573,399 UART: [art] Erasing AUTHORITY.KEYID = 7
54,574,901 UART: [art] PUB.X = D90924AA687DB5CCF52AE9147AB81BBE016A21F3A1E13DFAAFB161D461942CAB3F6E1A3681FE7705CFCAAD36E9B3D57C
54,582,210 UART: [art] PUB.Y = 94E01850A52C9D9246FF07F81CE3254B5F3899AD6C6697A66C292DE56A06D4441BFCFBA1686ED031C1DF009C4F9A5678
54,589,457 UART: [art] SIG.R = 57372B13E17696058AD2DBADDE5248D8595E3AF3F9CD092E27C9760187341C8A6F9FD91E4751F1A89014FF34870232F7
54,596,857 UART: [art] SIG.S = A1211AD939F431D57F6238EF6ADAEFB7C09A26A5A514E5F461B79D635F1740A2D2D4A7AFD82853F5B60B2139E04774EB
55,575,000 UART: mbox::rt_entry...
55,575,976 UART: ____ _ _ _ ____ _____
55,577,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,579,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,581,900 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,583,850 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,585,785 UART: |_|
55,586,772 UART:
55,869,134 UART: [rt] Runtime listening for mailbox commands...
62,780,149 >>> mbox cmd response: success
62,780,558 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,813,136 UART:
62,813,392 UART: Running Caliptra FMC ...
62,814,505 UART:
62,814,665 UART: [state] CFI Enabled
62,900,760 UART: [art] Extend RT PCRs Done
62,901,948 UART: [art] Lock RT PCRs Done
62,903,189 UART: [art] Populate DV Done
62,908,721 UART: [fht] FMC Alias Private Key: 7
62,910,347 UART: [art] Derive CDI
62,911,164 UART: [art] Store in in slot 0x4
62,969,765 UART: [art] Derive Key Pair
62,970,767 UART: [art] Store priv key in slot 0x5
65,433,980 UART: [art] Derive Key Pair - Done
65,446,936 UART: [art] Signing Cert with AUTHO
65,448,245 UART: RITY.KEYID = 7
67,159,494 UART: [art] Erasing AUTHORITY.KEYID = 7
67,161,007 UART: [art] PUB.X = B06F342CE6E9CA6A0E160DAA796AB7FD6DBC61F0A32A99C38EBC5EC2C023D245E6A3B6F33E48EA67E8ADF8DDA2CD9606
67,168,310 UART: [art] PUB.Y = EF7E1E453F7DFCA128B20462F85A62EC4C07664CBC184A42C5E2DBDC02A4086256A1FC39182547EDC02763E8587D4052
67,175,588 UART: [art] SIG.R = 04EDECF05781CD2F71379F8BB451C8AF9473CED77F84CE4C49883E182F59CB70456FE7617E06FDDBCA52755F2623165D
67,182,975 UART: [art] SIG.S = 1DF48FCC33ED0E808657C4E44C0B591140EEC944F8434E689EDF23436F772D49E4D1D946DDFE9A61A0AF8BA0AEF22C40
68,161,555 UART: mbox::rt_entry...
68,162,515 UART: ____ _ _ _ ____ _____
68,164,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,166,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,168,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,170,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,172,396 UART: |_|
68,173,208 UART:
68,457,889 UART: [rt] Runtime listening for mailbox commands...
68,460,061 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,649,067 UART: [ldev] --
10,655,189 UART: [fwproc] Wait for Commands...
10,657,386 UART: [fwproc] Recv command 0x46574c44
10,659,686 UART: [fwproc] Recv'd Img size: 78704 bytes
13,667,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,747,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,863,913 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,192,185 >>> mbox cmd response: success
14,192,682 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,196,710 UART: [afmc] ++
14,197,407 UART: [afmc] CDI.KEYID = 6
14,198,590 UART: [afmc] SUBJECT.KEYID = 7
14,200,075 UART: [afmc] AUTHORITY.KEYID = 5
16,704,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,426,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,428,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,443,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,458,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,473,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,497,974 UART: [afmc] --
18,501,458 UART: [cold-reset] --
18,504,779 UART: [state] Locking Datavault
18,509,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,665 UART: [state] Locking ICCM
18,514,424 UART: [exit] Launching FMC @ 0x40000130
18,523,097 UART:
18,523,337 UART: Running Caliptra FMC ...
18,524,430 UART:
18,524,586 UART: [state] CFI Enabled
18,532,575 UART: [fht] FMC Alias Private Key: 7
20,289,771 UART: [art] Extend RT PCRs Done
20,290,985 UART: [art] Lock RT PCRs Done
20,292,619 UART: [art] Populate DV Done
20,298,028 UART: [fht] FMC Alias Private Key: 7
20,299,563 UART: [art] Derive CDI
20,300,368 UART: [art] Store in in slot 0x4
20,342,630 UART: [art] Derive Key Pair
20,343,622 UART: [art] Store priv key in slot 0x5
22,770,728 UART: [art] Derive Key Pair - Done
22,783,768 UART: [art] Signing Cert with AUTHO
22,785,079 UART: RITY.KEYID = 7
24,490,511 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,004 UART: [art] PUB.X = F48C7812CB6AD64EE02809AA3310426E5E56E785CCAE66ED362259EC41989F3B90B52E61C691340E9D56F89751FAB340
24,499,300 UART: [art] PUB.Y = 0038B57F355CB2D413AA5B5A48B5752EF68881FF14E4BE8FEDCAA4A8F8222F5CA67A5A63BAE2AFEAAB2EBA8AF998CCEE
24,506,556 UART: [art] SIG.R = 158A3E8D29EC49446220F5EF86FF87FEBBC24A600C7EE64ED1DA53E5992EF3D8E6ADD3729CFB174DCF83B81D2FB886C5
24,514,005 UART: [art] SIG.S = 82C03CB5F2E871C65C812115DDEC981EFBD5F340BBB2EA46025B2D340C320DAB09618C77AB0C620CE8600D3E63A279EB
25,492,063 UART: mbox::rt_entry...
25,493,009 UART: ____ _ _ _ ____ _____
25,494,991 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,496,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,498,913 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,500,829 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,502,747 UART: |_|
25,503,546 UART:
25,617,953 UART: [rt] Runtime listening for mailbox commands...
25,620,102 >>> mbox cmd response data (48 bytes)
27,678,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,823,658 UART:
27,824,062 UART: Running Caliptra ROM ...
27,825,103 UART:
27,825,259 UART: [state] CFI Enabled
27,838,138 UART: [state] LifecycleState = Unprovisioned
27,839,980 UART: [state] DebugLocked = No
27,842,875 UART: [state] WD Timer not started. Device not locked for debugging
27,847,381 UART: [kat] SHA2-256
28,037,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,047,998 UART: [kat] ++
28,048,603 UART: [kat] sha1
28,061,389 UART: [kat] SHA2-256
28,064,410 UART: [kat] SHA2-384
28,070,015 UART: [kat] SHA2-512-ACC
28,072,636 UART: [kat] ECC-384
30,513,880 UART: [kat] HMAC-384Kdf
30,528,163 UART: [kat] LMS
31,059,757 UART: [kat] --
31,063,526 UART: [update-reset] ++
34,523,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,527,229 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,135,476 >>> mbox cmd response: success
35,135,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,136,413 UART: [update-reset] Copying MAN_2 To MAN_1
35,173,975 UART: [update-reset Success] --
35,178,322 UART: [state] Locking Datavault
35,181,472 UART: [state] Locking PCR0, PCR1 and PCR31
35,183,659 UART: [state] Locking ICCM
35,185,372 UART: [exit] Launching FMC @ 0x40000130
35,194,036 UART:
35,194,277 UART: Running Caliptra FMC ...
35,195,541 UART:
35,195,697 UART: [state] CFI Enabled
35,239,601 UART: [art] Extend RT PCRs Done
35,240,781 UART: [art] Lock RT PCRs Done
35,242,283 UART: [art] Populate DV Done
35,247,466 UART: [fht] FMC Alias Private Key: 7
35,249,101 UART: [art] Derive CDI
35,249,905 UART: [art] Store in in slot 0x4
35,292,055 UART: [art] Derive Key Pair
35,293,045 UART: [art] Store priv key in slot 0x5
37,720,053 UART: [art] Derive Key Pair - Done
37,732,834 UART: [art] Signing Cert with AUTHO
37,734,138 UART: RITY.KEYID = 7
39,439,304 UART: [art] Erasing AUTHORITY.KEYID = 7
39,440,806 UART: [art] PUB.X = 31D8D0F4AD0A646CF8552C9BEA382868E21E69A18C6B6752B80BCFF99AAB3004C744DA2B72DA0F9C6FF0538630B919C6
39,448,107 UART: [art] PUB.Y = 3DF6AA449ECECD11792C0554D855ED01F7C5B004700952505831281DAA7BFFBD95CB9B29A7D362C96EB4E7D3A2C73F81
39,455,327 UART: [art] SIG.R = BAF23041612FACF9305D97EC20339E436CB7D653E0544872C83178B628E8256B5A25DAD7A1BFF04FFBB78D4BD24DEA21
39,462,704 UART: [art] SIG.S = 75540AED11C53D7E4577EF5BD6A27EC4DDA45753F41980FB8A4921096B1D141046732395383AA17E29003CA354EA112A
40,441,594 UART: Caliptra RT
40,442,307 UART: [state] CFI Enabled
40,732,062 UART: [rt] RT listening for mailbox commands...
40,764,305 UART: [rt]cmd =0x4d454153, len=108
40,783,317 >>> mbox cmd response data (12 bytes)
42,830,426 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,931,039 UART:
42,931,384 UART: Running Caliptra ROM ...
42,932,512 UART:
42,932,671 UART: [state] CFI Enabled
42,949,363 UART: [state] LifecycleState = Unprovisioned
42,951,249 UART: [state] DebugLocked = No
42,953,002 UART: [state] WD Timer not started. Device not locked for debugging
42,958,213 UART: [kat] SHA2-256
43,148,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,158,847 UART: [kat] ++
43,159,355 UART: [kat] sha1
43,170,400 UART: [kat] SHA2-256
43,173,410 UART: [kat] SHA2-384
43,179,390 UART: [kat] SHA2-512-ACC
43,181,958 UART: [kat] ECC-384
45,622,474 UART: [kat] HMAC-384Kdf
45,635,830 UART: [kat] LMS
46,167,461 UART: [kat] --
46,172,857 UART: [update-reset] ++
49,194,339 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,197,180 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,590,968 >>> mbox cmd response: success
51,638,686 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,738,226 UART: [update-reset] Copying MAN_2 To MAN_1
51,739,914 UART: [update-reset Success] --
51,740,986 UART: [state] Locking Datavault
51,742,130 UART: [state] Locking PCR0, PCR1 and PCR31
51,743,667 UART: [state] Locking ICCM
51,744,537 UART: [exit] Launching FMC @ 0x40000130
51,745,891 UART:
51,746,032 UART: Running Caliptra FMC ...
51,747,129 UART:
51,747,275 UART: [state] CFI Enabled
51,748,098 UART: [art] Extend RT PCRs Done
51,749,139 UART: [art] Lock RT PCRs Done
51,750,193 UART: [art] Populate DV Done
51,751,134 UART: [fht] FMC Alias Private Key: 7
51,752,358 UART: [art] Derive CDI
51,753,075 UART: [art] Store in in slot 0x4
51,754,232 UART: [art] Derive Key Pair
51,755,183 UART: [art] Store priv key in slot 0x5
52,176,382 UART: [art] Derive Key Pair - Done
52,189,830 UART: [art] Signing Cert with AUTHO
52,191,153 UART: RITY.KEYID = 7
53,896,793 UART: [art] Erasing AUTHORITY.KEYID = 7
53,898,324 UART: [art] PUB.X = 22F94F97004448A834F12BACC104FCA2447ECE209F67850818F8ACD51F7F0AFD9906780F9AE886EEEEDBF41C08B21598
53,905,565 UART: [art] PUB.Y = E958DA8A3AC9FE8963BCC333580DEDC24AD3AF043588D04198A502998129F98E9DE99535BC5C8A4FEC492614FA17E82C
53,912,835 UART: [art] SIG.R = CEDB6D676565A62BB72642EB33F268022334927FF696C6DF54781DDFF70CC4B25A6E1E70E69FB17BC9ECE6FC2C255667
53,920,222 UART: [art] SIG.S = 9395061FD029F7FE590D4D9F7EA813BF684276FF08811D0DD7C6DC4F49842B83C1321F461A47CDB196DF6A7E7A3EA6D4
54,899,085 UART: mbox::rt_entry...
54,900,043 UART: ____ _ _ _ ____ _____
54,901,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,903,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,906,033 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,907,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,909,815 UART: |_|
54,910,798 UART:
55,189,654 UART: [rt] Runtime listening for mailbox commands...
55,191,733 UART:
55,191,891 UART: Running Caliptra ROM ...
55,192,899 UART:
55,193,383 UART: [state] CFI Enabled
55,203,863 UART: [state] LifecycleState = Unprovisioned
55,205,747 UART: [state] DebugLocked = No
55,208,390 UART: [state] WD Timer not started. Device not locked for debugging
55,213,854 UART: [kat] SHA2-256
55,403,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,414,463 UART: [kat] ++
55,414,964 UART: [kat] sha1
55,426,058 UART: [kat] SHA2-256
55,429,069 UART: [kat] SHA2-384
55,436,725 UART: [kat] SHA2-512-ACC
55,439,336 UART: [kat] ECC-384
57,878,491 UART: [kat] HMAC-384Kdf
57,892,710 UART: [kat] LMS
58,424,311 UART: [kat] --
58,427,689 UART: [update-reset] ++
61,453,691 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,456,312 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
61,850,107 >>> mbox cmd response: success
61,851,125 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,852,061 UART: [update-reset] Copying MAN_2 To MAN_1
61,889,602 UART: [update-reset Success] --
61,894,471 UART: [state] Locking Datavault
61,899,028 UART: [state] Locking PCR0, PCR1 and PCR31
61,901,161 UART: [state] Locking ICCM
61,903,954 UART: [exit] Launching FMC @ 0x40000130
61,912,618 UART:
61,912,853 UART: Running Caliptra FMC ...
61,913,946 UART:
61,914,093 UART: [state] CFI Enabled
61,957,991 UART: [art] Extend RT PCRs Done
61,959,169 UART: [art] Lock RT PCRs Done
61,960,690 UART: [art] Populate DV Done
61,966,145 UART: [fht] FMC Alias Private Key: 7
61,967,728 UART: [art] Derive CDI
61,968,531 UART: [art] Store in in slot 0x4
62,011,063 UART: [art] Derive Key Pair
62,012,064 UART: [art] Store priv key in slot 0x5
64,438,140 UART: [art] Derive Key Pair - Done
64,451,197 UART: [art] Signing Cert with AUTHO
64,452,504 UART: RITY.KEYID = 7
66,158,063 UART: [art] Erasing AUTHORITY.KEYID = 7
66,159,579 UART: [art] PUB.X = 32F98B40F033178D5F9C221040DF47E8001CC72E54B4554EA0C59B513F1580AD04876EF69F2F12D41E557FF1E47F198A
66,166,830 UART: [art] PUB.Y = DFBDDEF50BBE195A5BA9138C9740976E0232CE54151B6E6D8F1B230AD512222B7283719C724A1A708B6512CC8661CA32
66,174,055 UART: [art] SIG.R = C59A99CEE31B5D32FC1C01540E2D1467245CD2840FF7177CAF32417EEA750679AC81FF3CFE84DABF3EFBB14A764652C2
66,181,500 UART: [art] SIG.S = 3C290B1F8BC98D5B7A11FB26C677C0410C70E184C3E349CDF2A13594BCF042976A5E4E8A324FDD9B0A577B9F57E8E62F
67,159,826 UART: mbox::rt_entry...
67,160,775 UART: ____ _ _ _ ____ _____
67,162,770 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,164,775 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,166,703 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,168,625 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,170,472 UART: |_|
67,171,348 UART:
67,453,324 UART: [rt] Runtime listening for mailbox commands...
67,455,488 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,752,455 ready_for_fw is high
3,753,000 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,188,383 >>> mbox cmd response: success
14,188,988 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,450,512 UART:
18,450,891 UART: Running Caliptra FMC ...
18,452,078 UART:
18,452,242 UART: [state] CFI Enabled
18,459,867 UART: [fht] FMC Alias Private Key: 7
20,216,292 UART: [art] Extend RT PCRs Done
20,217,652 UART: [art] Lock RT PCRs Done
20,219,383 UART: [art] Populate DV Done
20,224,633 UART: [fht] FMC Alias Private Key: 7
20,226,124 UART: [art] Derive CDI
20,226,878 UART: [art] Store in in slot 0x4
20,269,570 UART: [art] Derive Key Pair
20,270,566 UART: [art] Store priv key in slot 0x5
22,697,076 UART: [art] Derive Key Pair - Done
22,709,622 UART: [art] Signing Cert with AUTHO
22,710,917 UART: RITY.KEYID = 7
24,416,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,418,112 UART: [art] PUB.X = 454223DF45897CE57CBE583CBAF6922D14949DA1BC88210B32EA89B039804B61816FBB12192812549871210620520781
24,425,293 UART: [art] PUB.Y = 582646C70F4625FD0E7E7B9918B5FA486805C832DFEE04EDF6B5CA085C9AD9EAFA119E173357EF19FB994F80BA457AA1
24,432,577 UART: [art] SIG.R = 71E65B3AC7B6719D0B9C6EF6E0BC3845A6F6EBEA9A36ED42592FBE7417C2450C2C4E7F747DB4E5B708BCFF86A8AAF93D
24,440,016 UART: [art] SIG.S = E31F7DF5E7645C9D27AC50A35111E2A0CE26EAF0B7E570259EEDE2732ACFEA4F8CAC4C22BD599606B82E9FE3A250C169
25,418,517 UART: mbox::rt_entry...
25,419,479 UART: ____ _ _ _ ____ _____
25,421,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,423,444 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,425,363 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,427,317 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,429,236 UART: |_|
25,430,063 UART:
25,542,887 UART: [rt] Runtime listening for mailbox commands...
25,545,049 >>> mbox cmd response data (48 bytes)
27,603,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,337,137 >>> mbox cmd response: success
35,337,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,370,798 UART:
35,371,087 UART: Running Caliptra FMC ...
35,372,115 UART:
35,372,255 UART: [state] CFI Enabled
35,416,102 UART: [art] Extend RT PCRs Done
35,417,244 UART: [art] Lock RT PCRs Done
35,418,592 UART: [art] Populate DV Done
35,423,907 UART: [fht] FMC Alias Private Key: 7
35,425,494 UART: [art] Derive CDI
35,426,221 UART: [art] Store in in slot 0x4
35,468,823 UART: [art] Derive Key Pair
35,469,818 UART: [art] Store priv key in slot 0x5
37,895,850 UART: [art] Derive Key Pair - Done
37,908,899 UART: [art] Signing Cert with AUTHO
37,910,236 UART: RITY.KEYID = 7
39,615,258 UART: [art] Erasing AUTHORITY.KEYID = 7
39,616,764 UART: [art] PUB.X = BF4CB50A7B7DEEF5A79AC411C6DC9276A7253D5C80535BE38495ADB90E12981B43819FEC58190035AFE65566A1AC9845
39,624,003 UART: [art] PUB.Y = 354B186D645152B66938E1AE72788C6722405A27A51A2D249A8BB6A47C5CD0E0C96F1C1145916C4DEA315F026E7CCC2C
39,631,228 UART: [art] SIG.R = 461C27771F3CE9A2198EA78E05B11BBA51985C8C0F43F551C22089BAEA5D2B3C11AF558AA8D45D913B29A2B796915846
39,638,662 UART: [art] SIG.S = 43B5CDC6D5696F50F28A329538492EFB2DC449B780119F0071308C51A5972DD326D4AC08D317C0CE61AD4A3E0CB74123
40,617,919 UART: Caliptra RT
40,618,632 UART: [state] CFI Enabled
40,904,864 UART: [rt] RT listening for mailbox commands...
40,936,944 UART: [rt]cmd =0x4d454153, len=108
40,955,575 >>> mbox cmd response data (12 bytes)
43,002,322 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,932,610 >>> mbox cmd response: success
51,976,446 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
52,076,150 UART:
52,076,520 UART: Running Caliptra FMC ...
52,077,562 UART:
52,077,707 UART: [state] CFI Enabled
52,078,584 UART: [art] Extend RT PCRs Done
52,079,656 UART: [art] Lock RT PCRs Done
52,080,726 UART: [art] Populate DV Done
52,081,699 UART: [fht] FMC Alias Private Key: 7
52,083,034 UART: [art] Derive CDI
52,083,767 UART: [art] Store in in slot 0x4
52,084,848 UART: [art] Derive Key Pair
52,085,772 UART: [art] Store priv key in slot 0x5
52,494,616 UART: [art] Derive Key Pair - Done
52,507,498 UART: [art] Signing Cert with AUTHO
52,508,795 UART: RITY.KEYID = 7
54,214,102 UART: [art] Erasing AUTHORITY.KEYID = 7
54,215,614 UART: [art] PUB.X = 7DD6FCC56151DC1D3D08D05AAFD5FC4E8660BC106BE30B16C30F07E0443FDAC8B9AC022BEAC52210155A0D6B980A5A8C
54,222,998 UART: [art] PUB.Y = BA774D743E4DDC0ABD0CA7379E44EE8167C82844DC6551F7166393731D737A3DADE22D52C1DDFF60E7C0084FA3B0579C
54,230,178 UART: [art] SIG.R = 9F8EF4424F21CCFC1B046B835556C15C0F4E67A211E100F9CE6F42C0FD376EF36C7C7E20379465A0E84D88E10376337B
54,237,559 UART: [art] SIG.S = ED33BEE4EAC25D6AE0AB6E5DAA3807DB22E71F58D799FA784743EA7E82BE9908AA13CB2C8694EEF3A3783634CB4C25D3
55,216,332 UART: mbox::rt_entry...
55,217,297 UART: ____ _ _ _ ____ _____
55,219,218 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,221,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,223,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,224,997 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,226,880 UART: |_|
55,227,700 UART:
55,512,618 UART: [rt] Runtime listening for mailbox commands...
62,329,339 >>> mbox cmd response: success
62,330,361 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,361,657 UART:
62,361,923 UART: Running Caliptra FMC ...
62,362,949 UART:
62,363,089 UART: [state] CFI Enabled
62,406,951 UART: [art] Extend RT PCRs Done
62,408,140 UART: [art] Lock RT PCRs Done
62,409,502 UART: [art] Populate DV Done
62,414,850 UART: [fht] FMC Alias Private Key: 7
62,416,323 UART: [art] Derive CDI
62,417,067 UART: [art] Store in in slot 0x4
62,459,387 UART: [art] Derive Key Pair
62,460,426 UART: [art] Store priv key in slot 0x5
64,886,891 UART: [art] Derive Key Pair - Done
64,899,787 UART: [art] Signing Cert with AUTHO
64,901,095 UART: RITY.KEYID = 7
66,606,486 UART: [art] Erasing AUTHORITY.KEYID = 7
66,607,986 UART: [art] PUB.X = A87E1EEA9FB48F35BC594D6AC7996773B118E81C258C8820175FDE0918A01C0E0C4543C206944ED9148AD4C0AAB148E6
66,615,277 UART: [art] PUB.Y = B4DC6B79A697FED7B209B6222A448D5DA810FC449F5A88BB49DE55F803961C50EE3D433FDE2A0172607A6019EF7C1591
66,622,519 UART: [art] SIG.R = 16D3EA91F08649C8FB369E4700E0054D1B3185DEE87F2031EAE7E23986ACA78CA81E699623F5CD8897262374B3A8F988
66,629,910 UART: [art] SIG.S = 6DFE0531AB5D45E0DEB72FE3BC61623DD88D26C86D55E9F84AC0AA7EC7EA69C7A5F9CCE6F4AC9C47FA9E304FCABA0C7C
67,608,888 UART: mbox::rt_entry...
67,609,838 UART: ____ _ _ _ ____ _____
67,611,839 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,613,838 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,615,709 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,617,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,619,501 UART: |_|
67,620,320 UART:
67,901,013 UART: [rt] Runtime listening for mailbox commands...
67,903,153 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,505,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,002 >>> mbox cmd response: success
2,617,002 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,618,078 UART: [afmc] ++
2,618,246 UART: [afmc] CDI.KEYID = 6
2,618,608 UART: [afmc] SUBJECT.KEYID = 7
2,619,033 UART: [afmc] AUTHORITY.KEYID = 5
2,654,142 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,769 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,459 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,308 UART: [afmc] --
2,697,390 UART: [cold-reset] --
2,698,292 UART: [state] Locking Datavault
2,699,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,977 UART: [state] Locking ICCM
2,700,533 UART: [exit] Launching FMC @ 0x40000130
2,705,862 UART:
2,705,878 UART: Running Caliptra FMC ...
2,706,286 UART:
2,706,340 UART: [state] CFI Enabled
2,716,821 UART: [fht] FMC Alias Private Key: 7
2,824,776 UART: [art] Extend RT PCRs Done
2,825,204 UART: [art] Lock RT PCRs Done
2,826,728 UART: [art] Populate DV Done
2,834,795 UART: [fht] FMC Alias Private Key: 7
2,835,919 UART: [art] Derive CDI
2,836,199 UART: [art] Store in in slot 0x4
2,921,854 UART: [art] Derive Key Pair
2,922,214 UART: [art] Store priv key in slot 0x5
2,935,614 UART: [art] Derive Key Pair - Done
2,950,401 UART: [art] Signing Cert with AUTHO
2,950,881 UART: RITY.KEYID = 7
2,965,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,386 UART: [art] PUB.X = D58F3696E430928616E25E41AFCD1C5F005189E98995081BC8C7B719B8A6D18F32F7D294D57BC364A47FC9655DA7270A
2,973,128 UART: [art] PUB.Y = 7B2442FB0C744FC55DD8FC421AE2591F8AA4B159FF5BD5F868A2C9BE1E9641556C0A2B0E26B219A4AA7F3BE542CCB88A
2,980,089 UART: [art] SIG.R = 014E5ADD1577810A4FFC61D3BB2151F793C442D78413DDBC2DC309227E15EB2F5C9B62A22B0E16F467AE78450AC0B46C
2,986,854 UART: [art] SIG.S = 4BC5AAA4F68A694CE2A1F7FE158087E12DF882D58333AC318653AF29F42C6531071D3B205A401FFE95CE56F051ECD04A
3,010,546 UART: mbox::rt_entry...
3,010,918 UART: ____ _ _ _ ____ _____
3,011,702 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,502 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,270 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,038 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,806 UART: |_|
3,015,118 UART:
3,121,681 UART: [rt] Runtime listening for mailbox commands...
3,122,868 >>> mbox cmd response data (48 bytes)
3,122,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,122,983 UART:
3,122,999 UART: Running Caliptra ROM ...
3,123,407 UART:
3,123,461 UART: [state] CFI Enabled
3,126,273 UART: [state] LifecycleState = Unprovisioned
3,126,928 UART: [state] DebugLocked = No
3,127,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,133 UART: [kat] SHA2-256
3,923,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,179 UART: [kat] ++
3,927,331 UART: [kat] sha1
3,931,613 UART: [kat] SHA2-256
3,933,551 UART: [kat] SHA2-384
3,936,358 UART: [kat] SHA2-512-ACC
3,938,258 UART: [kat] ECC-384
3,943,771 UART: [kat] HMAC-384Kdf
3,948,465 UART: [kat] LMS
4,516,661 UART: [kat] --
4,517,388 UART: [update-reset] ++
5,852,820 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,974 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,004,024 >>> mbox cmd response: success
6,004,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,004,233 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,247 UART: [update-reset Success] --
6,013,252 UART: [state] Locking Datavault
6,013,990 UART: [state] Locking PCR0, PCR1 and PCR31
6,014,594 UART: [state] Locking ICCM
6,015,268 UART: [exit] Launching FMC @ 0x40000130
6,020,597 UART:
6,020,613 UART: Running Caliptra FMC ...
6,021,021 UART:
6,021,075 UART: [state] CFI Enabled
6,110,178 UART: [art] Extend RT PCRs Done
6,110,606 UART: [art] Lock RT PCRs Done
6,111,795 UART: [art] Populate DV Done
6,120,206 UART: [fht] FMC Alias Private Key: 7
6,121,272 UART: [art] Derive CDI
6,121,552 UART: [art] Store in in slot 0x4
6,206,997 UART: [art] Derive Key Pair
6,207,357 UART: [art] Store priv key in slot 0x5
6,220,509 UART: [art] Derive Key Pair - Done
6,235,137 UART: [art] Signing Cert with AUTHO
6,235,617 UART: RITY.KEYID = 7
6,251,135 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,900 UART: [art] PUB.X = 50CD73444C40A4E7C123FBF734185E7B978ADBEB784D29934818472C168DC67238FBAE458F0E7A9AC6387062ED33A189
6,258,669 UART: [art] PUB.Y = 2DFC7B96BC125F6667D8F1431CCC5FF291E658A99E2417ED2875B05FFF150AA07D868EF0E412287C91F74DA3E34D71A4
6,265,626 UART: [art] SIG.R = 33C82C4506D5582EEFA371E5E07194BDA2FD7863D4554326C10CDB3FD7F41CC6CA0E7831452762D3B8EEF656DB04AC93
6,272,394 UART: [art] SIG.S = B7799C749B2A26FB95B113E6AFE90AC3DA66858E1C49EC89AED4B43E3BFC620A0A8552C47361A8D9494DF614393F1AAB
6,296,572 UART: Caliptra RT
6,296,825 UART: [state] CFI Enabled
6,574,504 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,605,730 UART: [rt]cmd =0x4d454153, len=108
6,626,294 >>> mbox cmd response data (12 bytes)
6,626,295 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,933 UART:
6,626,949 UART: Running Caliptra ROM ...
6,627,357 UART:
6,627,411 UART: [state] CFI Enabled
6,630,403 UART: [state] LifecycleState = Unprovisioned
6,631,058 UART: [state] DebugLocked = No
6,631,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,633,095 UART: [kat] SHA2-256
7,427,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,431,141 UART: [kat] ++
7,431,293 UART: [kat] sha1
7,435,315 UART: [kat] SHA2-256
7,437,253 UART: [kat] SHA2-384
7,439,874 UART: [kat] SHA2-512-ACC
7,441,774 UART: [kat] ECC-384
7,447,701 UART: [kat] HMAC-384Kdf
7,452,377 UART: [kat] LMS
8,020,573 UART: [kat] --
8,021,448 UART: [update-reset] ++
8,948,394 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,949,606 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,046,040 >>> mbox cmd response: success
9,046,040 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,046,285 UART: [update-reset] Copying MAN_2 To MAN_1
9,054,299 UART: [update-reset Success] --
9,055,512 UART: [state] Locking Datavault
9,056,264 UART: [state] Locking PCR0, PCR1 and PCR31
9,056,868 UART: [state] Locking ICCM
9,057,384 UART: [exit] Launching FMC @ 0x40000130
9,062,713 UART:
9,062,729 UART: Running Caliptra FMC ...
9,063,137 UART:
9,063,191 UART: [state] CFI Enabled
9,151,744 UART: [art] Extend RT PCRs Done
9,152,172 UART: [art] Lock RT PCRs Done
9,153,369 UART: [art] Populate DV Done
9,161,426 UART: [fht] FMC Alias Private Key: 7
9,162,458 UART: [art] Derive CDI
9,162,738 UART: [art] Store in in slot 0x4
9,248,379 UART: [art] Derive Key Pair
9,248,739 UART: [art] Store priv key in slot 0x5
9,262,065 UART: [art] Derive Key Pair - Done
9,276,819 UART: [art] Signing Cert with AUTHO
9,277,299 UART: RITY.KEYID = 7
9,292,487 UART: [art] Erasing AUTHORITY.KEYID = 7
9,293,252 UART: [art] PUB.X = 3F8EB57663A88EFBD949223367FDF3FE001A8C5CD8A8FE800403B43AB86F95E3C15839177C677C2B7C055FEFFD30DA6C
9,300,005 UART: [art] PUB.Y = 21A3E5A8BB69E42EDF57BF49905C111673D12D37C7E9DF3F0DFFDA2F455C96EED71DCCB2B23D2FA471A78A51A6FD4E0F
9,306,975 UART: [art] SIG.R = 745991E26D083715C29752D99D765A82894DF0FD559F15EEE0537F51BF5E042722A4333765819846B08E204AFD886257
9,313,725 UART: [art] SIG.S = BA01624A1E9218726CEAE1E22CAA8CA0F09649774055EE8B2629F407D54B5698C3292B7B02A448AE370C845F9CA7E6D8
9,337,636 UART: mbox::rt_entry...
9,338,008 UART: ____ _ _ _ ____ _____
9,338,792 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,339,592 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,340,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,341,128 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,341,896 UART: |_|
9,342,208 UART:
9,621,814 UART: [rt] Runtime listening for mailbox commands...
9,622,781 UART:
9,622,797 UART: Running Caliptra ROM ...
9,623,205 UART:
9,623,259 UART: [state] CFI Enabled
9,625,625 UART: [state] LifecycleState = Unprovisioned
9,626,280 UART: [state] DebugLocked = No
9,626,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,628,717 UART: [kat] SHA2-256
10,422,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,426,763 UART: [kat] ++
10,426,915 UART: [kat] sha1
10,430,957 UART: [kat] SHA2-256
10,432,895 UART: [kat] SHA2-384
10,435,420 UART: [kat] SHA2-512-ACC
10,437,320 UART: [kat] ECC-384
10,443,063 UART: [kat] HMAC-384Kdf
10,447,735 UART: [kat] LMS
11,015,931 UART: [kat] --
11,016,752 UART: [update-reset] ++
11,945,164 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,946,228 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,042,662 >>> mbox cmd response: success
12,042,662 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,042,843 UART: [update-reset] Copying MAN_2 To MAN_1
12,050,857 UART: [update-reset Success] --
12,052,002 UART: [state] Locking Datavault
12,052,556 UART: [state] Locking PCR0, PCR1 and PCR31
12,053,160 UART: [state] Locking ICCM
12,053,718 UART: [exit] Launching FMC @ 0x40000130
12,059,047 UART:
12,059,063 UART: Running Caliptra FMC ...
12,059,471 UART:
12,059,525 UART: [state] CFI Enabled
12,148,600 UART: [art] Extend RT PCRs Done
12,149,028 UART: [art] Lock RT PCRs Done
12,150,139 UART: [art] Populate DV Done
12,158,250 UART: [fht] FMC Alias Private Key: 7
12,159,344 UART: [art] Derive CDI
12,159,624 UART: [art] Store in in slot 0x4
12,245,271 UART: [art] Derive Key Pair
12,245,631 UART: [art] Store priv key in slot 0x5
12,258,529 UART: [art] Derive Key Pair - Done
12,273,080 UART: [art] Signing Cert with AUTHO
12,273,560 UART: RITY.KEYID = 7
12,288,834 UART: [art] Erasing AUTHORITY.KEYID = 7
12,289,599 UART: [art] PUB.X = 717924EC1767F2ECA07FB595ED8EA76CADA3F9F344D0FA5376F4B4C81F2CCA5BAA98043973F38E91A748B9FD130CB1A6
12,296,381 UART: [art] PUB.Y = 9B646A0F7C363AF3C0443C36F1816C0517061741564BF6D1DACC94AE0C4E00874B8856BECAC7709297BA9A5B68F2A7A9
12,303,303 UART: [art] SIG.R = 5B235E0DD44E881BA3D2D2D58C5949A3442A4E93708FE1178AEDE1DAC0170217E971E0E82A027BB855CA28059E719D08
12,310,062 UART: [art] SIG.S = 7097403DA6D27CEA16DC49CB69FE98CEE202202E6070252C6D3BA98302FD90A768FF610F91D956C8752A1CFA7857907A
12,333,892 UART: mbox::rt_entry...
12,334,264 UART: ____ _ _ _ ____ _____
12,335,048 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,335,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,336,616 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,337,384 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,338,152 UART: |_|
12,338,464 UART:
12,620,149 UART: [rt] Runtime listening for mailbox commands...
12,621,345 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,111 ready_for_fw is high
1,363,111 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,156 >>> mbox cmd response: success
2,466,156 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,527,648 UART:
2,527,664 UART: Running Caliptra FMC ...
2,528,072 UART:
2,528,126 UART: [state] CFI Enabled
2,538,685 UART: [fht] FMC Alias Private Key: 7
2,647,296 UART: [art] Extend RT PCRs Done
2,647,724 UART: [art] Lock RT PCRs Done
2,649,410 UART: [art] Populate DV Done
2,657,665 UART: [fht] FMC Alias Private Key: 7
2,658,719 UART: [art] Derive CDI
2,658,999 UART: [art] Store in in slot 0x4
2,744,736 UART: [art] Derive Key Pair
2,745,096 UART: [art] Store priv key in slot 0x5
2,758,188 UART: [art] Derive Key Pair - Done
2,773,081 UART: [art] Signing Cert with AUTHO
2,773,561 UART: RITY.KEYID = 7
2,788,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,466 UART: [art] PUB.X = 58790B4F995CDCCE2261AD805E2B2ED2518CCF3EB112080578715D328C30DAA79B8D4CBA201646AC85EB728D2C7C72AA
2,796,239 UART: [art] PUB.Y = C67A97851A9A8E9F889B09E1C4F2BA2B3ABD24579A676D90F9FADE5E32012D795D22CA60BD14488A4251639C9B6EB1FF
2,803,195 UART: [art] SIG.R = 3775AAF59193E4624E20E337CDE66198F4D4F69AF3015E397605C8393ECF8AABA0F03DCFF317981F088D85E26AB4D786
2,809,962 UART: [art] SIG.S = A846CC8EFA5DDAAABC0A6DEF9982382165049E5567A8455920DF4F1BB9ADF00A1928C1CAAE37E040F7862C217EB65A40
2,833,192 UART: mbox::rt_entry...
2,833,564 UART: ____ _ _ _ ____ _____
2,834,348 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,148 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,916 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,684 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,452 UART: |_|
2,837,764 UART:
2,943,748 UART: [rt] Runtime listening for mailbox commands...
2,944,935 >>> mbox cmd response data (48 bytes)
2,944,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,706,290 >>> mbox cmd response: success
5,706,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,719,735 UART:
5,719,751 UART: Running Caliptra FMC ...
5,720,159 UART:
5,720,213 UART: [state] CFI Enabled
5,808,602 UART: [art] Extend RT PCRs Done
5,809,030 UART: [art] Lock RT PCRs Done
5,810,335 UART: [art] Populate DV Done
5,818,432 UART: [fht] FMC Alias Private Key: 7
5,819,380 UART: [art] Derive CDI
5,819,660 UART: [art] Store in in slot 0x4
5,905,397 UART: [art] Derive Key Pair
5,905,757 UART: [art] Store priv key in slot 0x5
5,919,181 UART: [art] Derive Key Pair - Done
5,933,803 UART: [art] Signing Cert with AUTHO
5,934,283 UART: RITY.KEYID = 7
5,949,259 UART: [art] Erasing AUTHORITY.KEYID = 7
5,950,024 UART: [art] PUB.X = E56975BBC035DBD587D6D34F819B53B231D5A7AB1495FBFDDAD5350C85D88A9CE77D3418E4D0FBC84E4DF893F968BDD2
5,956,811 UART: [art] PUB.Y = 4733FEBE477BE4A5B6B5D7BA464B48F1106061A6D12ACEB555E6CE815B06A1AF4669DE50D61598C86E42B06DD9BB7BD0
5,963,774 UART: [art] SIG.R = 0F762AE39E6E23647A3CB1F46E9B56356345B9DBBAEC83342F899EC86881351AD10B8BDDC6822CB35E0A0B85B1FF4B5C
5,970,546 UART: [art] SIG.S = 5943A7A83191B4DA5D021263AE12DB02BBBA9C86885D06504379BF5F1B096E21BAD9C26673904DC0A2E2178E3AC1C85E
5,994,605 UART: Caliptra RT
5,994,858 UART: [state] CFI Enabled
6,278,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,308,882 UART: [rt]cmd =0x4d454153, len=108
6,330,034 >>> mbox cmd response data (12 bytes)
6,330,035 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,630,904 >>> mbox cmd response: success
8,630,904 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,644,163 UART:
8,644,179 UART: Running Caliptra FMC ...
8,644,587 UART:
8,644,641 UART: [state] CFI Enabled
8,734,184 UART: [art] Extend RT PCRs Done
8,734,612 UART: [art] Lock RT PCRs Done
8,735,785 UART: [art] Populate DV Done
8,743,688 UART: [fht] FMC Alias Private Key: 7
8,744,684 UART: [art] Derive CDI
8,744,964 UART: [art] Store in in slot 0x4
8,830,991 UART: [art] Derive Key Pair
8,831,351 UART: [art] Store priv key in slot 0x5
8,844,237 UART: [art] Derive Key Pair - Done
8,858,864 UART: [art] Signing Cert with AUTHO
8,859,344 UART: RITY.KEYID = 7
8,874,194 UART: [art] Erasing AUTHORITY.KEYID = 7
8,874,959 UART: [art] PUB.X = 1B81307CEEF66C408B9E367AF66324CDC238A1E6AE7118FD3C7426C7E97451B082886827DBE5FF83B22FF868A62E7CDD
8,881,739 UART: [art] PUB.Y = 8EE3904D537AEA9F05CD018265D12F37D63AFA098BCCBBB7D3A352450A436ADD694D111B9A75B969B505B12C30E0EFBE
8,888,690 UART: [art] SIG.R = 2DF0D67E66C6553F55DDB735D212AC1DE4EB7510DAA42C02DED6C6A77EAFCC9A25D9CF43AAFD414F6EE3C9EFB799A47E
8,895,489 UART: [art] SIG.S = 846CF57CECF04BFD39DFD8B3E183CCE045A9302533C6A517ABD88839F653807A671FDBB12CAAC1622877C7BC38727EA1
8,918,994 UART: mbox::rt_entry...
8,919,366 UART: ____ _ _ _ ____ _____
8,920,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,920,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,921,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,922,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,923,254 UART: |_|
8,923,566 UART:
9,204,586 UART: [rt] Runtime listening for mailbox commands...
11,505,096 >>> mbox cmd response: success
11,505,096 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,518,525 UART:
11,518,541 UART: Running Caliptra FMC ...
11,518,949 UART:
11,519,003 UART: [state] CFI Enabled
11,608,094 UART: [art] Extend RT PCRs Done
11,608,522 UART: [art] Lock RT PCRs Done
11,609,697 UART: [art] Populate DV Done
11,617,966 UART: [fht] FMC Alias Private Key: 7
11,618,970 UART: [art] Derive CDI
11,619,250 UART: [art] Store in in slot 0x4
11,704,817 UART: [art] Derive Key Pair
11,705,177 UART: [art] Store priv key in slot 0x5
11,718,249 UART: [art] Derive Key Pair - Done
11,733,053 UART: [art] Signing Cert with AUTHO
11,733,533 UART: RITY.KEYID = 7
11,748,561 UART: [art] Erasing AUTHORITY.KEYID = 7
11,749,326 UART: [art] PUB.X = 937421A0462142D0E6FBED446C0AAC593D3E03344D1718089C23752A70814500446488A6FBA079CDD942304F68B4EDC1
11,756,059 UART: [art] PUB.Y = 6062DA93401C1A6270836F01B91A0F3DB8B0031C49F30EDF52EEB6F84C19A118128B0F2D5DAA48FC56879965E3DC8BA3
11,763,002 UART: [art] SIG.R = 66A162F437DD58CD569B9D17AC6EA23F49BF5FD6A906564ADB6763392C0787E6EF1C0F1391DD89FB373B856B1CE49070
11,769,771 UART: [art] SIG.S = 846604D17905A3421331CE6077943899324BC2018D002CE2094D76ACE728281187FCFD0B25453C67E226C27F41A3F9A3
11,793,185 UART: mbox::rt_entry...
11,793,557 UART: ____ _ _ _ ____ _____
11,794,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,795,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,795,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,796,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,797,445 UART: |_|
11,797,757 UART:
12,077,575 UART: [rt] Runtime listening for mailbox commands...
12,078,771 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.50s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,503,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,801 >>> mbox cmd response: success
2,615,801 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,616,853 UART: [afmc] ++
2,617,021 UART: [afmc] CDI.KEYID = 6
2,617,383 UART: [afmc] SUBJECT.KEYID = 7
2,617,808 UART: [afmc] AUTHORITY.KEYID = 5
2,652,239 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,286 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,976 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,889 UART: [afmc] --
2,695,775 UART: [cold-reset] --
2,696,673 UART: [state] Locking Datavault
2,698,116 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,720 UART: [state] Locking ICCM
2,699,380 UART: [exit] Launching FMC @ 0x40000130
2,704,709 UART:
2,704,725 UART: Running Caliptra FMC ...
2,705,133 UART:
2,705,276 UART: [state] CFI Enabled
2,715,851 UART: [fht] FMC Alias Private Key: 7
2,823,912 UART: [art] Extend RT PCRs Done
2,824,340 UART: [art] Lock RT PCRs Done
2,825,710 UART: [art] Populate DV Done
2,833,673 UART: [fht] FMC Alias Private Key: 7
2,834,787 UART: [art] Derive CDI
2,835,067 UART: [art] Store in in slot 0x4
2,920,698 UART: [art] Derive Key Pair
2,921,058 UART: [art] Store priv key in slot 0x5
2,934,184 UART: [art] Derive Key Pair - Done
2,948,933 UART: [art] Signing Cert with AUTHO
2,949,413 UART: RITY.KEYID = 7
2,964,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,598 UART: [art] PUB.X = B1A64BB685D74A5B286D9B0F97E5C63717FDD4260C5CF491D48CC2E35268A28C3E8C0DFA85A7AFF8F9FFA0DFD598C128
2,972,379 UART: [art] PUB.Y = 4161A5BC561D211906B072DAA6F8EC425ADB7A8777CC6DB634F2707BFD000335649AEC0516105164FADA12EFE6E1068E
2,979,303 UART: [art] SIG.R = 86017E0CF9D75EEEDE31CE5A9CF5050198B21377F90BCAB47C855C25F38D1809CDB1BD4A60DC6DA0D85474FB9300AE25
2,986,049 UART: [art] SIG.S = 5E4AB08C18BD540AEECA0EA26E6152D4E440C9443B5C557C295C94C6004882FF2745B0B2933927C0B0955BD6089D373F
3,010,219 UART: mbox::rt_entry...
3,010,591 UART: ____ _ _ _ ____ _____
3,011,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,943 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,479 UART: |_|
3,014,791 UART:
3,121,933 UART: [rt] Runtime listening for mailbox commands...
3,123,120 >>> mbox cmd response data (48 bytes)
3,123,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,123,235 UART:
3,123,251 UART: Running Caliptra ROM ...
3,123,659 UART:
3,123,800 UART: [state] CFI Enabled
3,126,844 UART: [state] LifecycleState = Unprovisioned
3,127,499 UART: [state] DebugLocked = No
3,127,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,626 UART: [kat] SHA2-256
3,923,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,672 UART: [kat] ++
3,927,824 UART: [kat] sha1
3,931,916 UART: [kat] SHA2-256
3,933,854 UART: [kat] SHA2-384
3,936,783 UART: [kat] SHA2-512-ACC
3,938,683 UART: [kat] ECC-384
3,944,504 UART: [kat] HMAC-384Kdf
3,949,222 UART: [kat] LMS
4,517,418 UART: [kat] --
4,518,291 UART: [update-reset] ++
5,854,096 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,855,320 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,005,370 >>> mbox cmd response: success
6,005,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,005,627 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,641 UART: [update-reset Success] --
6,014,640 UART: [state] Locking Datavault
6,015,410 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,014 UART: [state] Locking ICCM
6,016,670 UART: [exit] Launching FMC @ 0x40000130
6,021,999 UART:
6,022,015 UART: Running Caliptra FMC ...
6,022,423 UART:
6,022,566 UART: [state] CFI Enabled
6,112,507 UART: [art] Extend RT PCRs Done
6,112,935 UART: [art] Lock RT PCRs Done
6,114,336 UART: [art] Populate DV Done
6,122,481 UART: [fht] FMC Alias Private Key: 7
6,123,651 UART: [art] Derive CDI
6,123,931 UART: [art] Store in in slot 0x4
6,209,914 UART: [art] Derive Key Pair
6,210,274 UART: [art] Store priv key in slot 0x5
6,223,660 UART: [art] Derive Key Pair - Done
6,238,342 UART: [art] Signing Cert with AUTHO
6,238,822 UART: RITY.KEYID = 7
6,253,944 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,709 UART: [art] PUB.X = B197F7B41990E6556DDCA0863968295854EAFA96425490BCAEE21DB026FF1D8651231801B60B07020CE4FA1B73E82106
6,261,459 UART: [art] PUB.Y = 9750F453557401C7FF85DD112FE6D00EF52BFE1E671554FFA1F39DEC9AB473A94585C65A09E7D5E63A0B05ACDD37F82B
6,268,408 UART: [art] SIG.R = 82D916E954D5A1804E6733D0EA0F7932E6589B93380E9A28B6D3BD4F765CC2CDF5BA27C96E5C5D2DD3E6DDF23232BE03
6,275,181 UART: [art] SIG.S = EABACC02C063FC7DD85547E81F005C3FD589C5127C65DCF76943FCCFBA30B88C7D01F3D4122CE65CE0EB81C947DA5DF0
6,299,334 UART: Caliptra RT
6,299,679 UART: [state] CFI Enabled
6,579,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,419 UART: [rt]cmd =0x4d454153, len=108
6,631,215 >>> mbox cmd response data (12 bytes)
6,631,216 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,632,014 UART:
6,632,030 UART: Running Caliptra ROM ...
6,632,438 UART:
6,632,579 UART: [state] CFI Enabled
6,635,023 UART: [state] LifecycleState = Unprovisioned
6,635,678 UART: [state] DebugLocked = No
6,636,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,637,819 UART: [kat] SHA2-256
7,431,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,435,865 UART: [kat] ++
7,436,017 UART: [kat] sha1
7,440,353 UART: [kat] SHA2-256
7,442,291 UART: [kat] SHA2-384
7,444,980 UART: [kat] SHA2-512-ACC
7,446,880 UART: [kat] ECC-384
7,452,719 UART: [kat] HMAC-384Kdf
7,457,487 UART: [kat] LMS
8,025,683 UART: [kat] --
8,026,462 UART: [update-reset] ++
8,953,840 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,954,910 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,051,344 >>> mbox cmd response: success
9,051,344 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,051,455 UART: [update-reset] Copying MAN_2 To MAN_1
9,059,469 UART: [update-reset Success] --
9,060,708 UART: [state] Locking Datavault
9,061,636 UART: [state] Locking PCR0, PCR1 and PCR31
9,062,240 UART: [state] Locking ICCM
9,062,862 UART: [exit] Launching FMC @ 0x40000130
9,068,191 UART:
9,068,207 UART: Running Caliptra FMC ...
9,068,615 UART:
9,068,758 UART: [state] CFI Enabled
9,158,031 UART: [art] Extend RT PCRs Done
9,158,459 UART: [art] Lock RT PCRs Done
9,159,906 UART: [art] Populate DV Done
9,168,339 UART: [fht] FMC Alias Private Key: 7
9,169,435 UART: [art] Derive CDI
9,169,715 UART: [art] Store in in slot 0x4
9,255,530 UART: [art] Derive Key Pair
9,255,890 UART: [art] Store priv key in slot 0x5
9,268,964 UART: [art] Derive Key Pair - Done
9,283,734 UART: [art] Signing Cert with AUTHO
9,284,214 UART: RITY.KEYID = 7
9,299,360 UART: [art] Erasing AUTHORITY.KEYID = 7
9,300,125 UART: [art] PUB.X = C5BCA3FE811E19A43111E6AD8FF5CECF497D41557A04D7454AA1BA0A6231F2FD97F78F15F772792B10E5CAA4A35E1A2E
9,306,907 UART: [art] PUB.Y = FBDA33C80E089FD0B63B0FB0ACC0675C30D0C1D1DB53E190D771B83825443A144F52919B23E01EFBF451DC81386DDCC8
9,313,862 UART: [art] SIG.R = B2D421BBAD75C6A2250CF25E59248F0A67C464D121451186589C09FC448AD56CEB7F07183EF1A39D37D19616B84EBA43
9,320,624 UART: [art] SIG.S = 204D1CA7B01D093EC99A4AB6E51E437154CE3A5374919566CA6B9565915F0281A8239B6DB9B59ACF247310472686EE25
9,345,047 UART: mbox::rt_entry...
9,345,419 UART: ____ _ _ _ ____ _____
9,346,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,347,003 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,347,771 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,348,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,349,307 UART: |_|
9,349,619 UART:
9,629,641 UART: [rt] Runtime listening for mailbox commands...
9,630,608 UART:
9,630,624 UART: Running Caliptra ROM ...
9,631,032 UART:
9,631,173 UART: [state] CFI Enabled
9,634,135 UART: [state] LifecycleState = Unprovisioned
9,634,790 UART: [state] DebugLocked = No
9,635,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,636,913 UART: [kat] SHA2-256
10,430,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,434,959 UART: [kat] ++
10,435,111 UART: [kat] sha1
10,439,237 UART: [kat] SHA2-256
10,441,175 UART: [kat] SHA2-384
10,443,988 UART: [kat] SHA2-512-ACC
10,445,888 UART: [kat] ECC-384
10,451,521 UART: [kat] HMAC-384Kdf
10,456,355 UART: [kat] LMS
11,024,551 UART: [kat] --
11,025,470 UART: [update-reset] ++
11,951,804 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,953,058 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,049,492 >>> mbox cmd response: success
12,049,492 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,049,601 UART: [update-reset] Copying MAN_2 To MAN_1
12,057,615 UART: [update-reset Success] --
12,058,742 UART: [state] Locking Datavault
12,059,444 UART: [state] Locking PCR0, PCR1 and PCR31
12,060,048 UART: [state] Locking ICCM
12,060,590 UART: [exit] Launching FMC @ 0x40000130
12,065,919 UART:
12,065,935 UART: Running Caliptra FMC ...
12,066,343 UART:
12,066,486 UART: [state] CFI Enabled
12,155,941 UART: [art] Extend RT PCRs Done
12,156,369 UART: [art] Lock RT PCRs Done
12,157,632 UART: [art] Populate DV Done
12,166,003 UART: [fht] FMC Alias Private Key: 7
12,166,985 UART: [art] Derive CDI
12,167,265 UART: [art] Store in in slot 0x4
12,252,572 UART: [art] Derive Key Pair
12,252,932 UART: [art] Store priv key in slot 0x5
12,266,058 UART: [art] Derive Key Pair - Done
12,281,220 UART: [art] Signing Cert with AUTHO
12,281,700 UART: RITY.KEYID = 7
12,297,100 UART: [art] Erasing AUTHORITY.KEYID = 7
12,297,865 UART: [art] PUB.X = 83A3DC47726CDBBB4964EAEB98D53B57CC781B3947A7FD84CA311CAC9D28D92746F7DE0DB124B05E815A0C5C18720A25
12,304,640 UART: [art] PUB.Y = 7E21EDF9DE5F8291A8E22FA9D38055C349D21E5B862452EF15294EBBB85A645BA1BD6D576EDC3C3C258EBB09DFBE55E1
12,311,607 UART: [art] SIG.R = DDCDE1285E21AD79AFC0AADE0860988ABC5231A0F419898CC338854B11DC5421CB5DA87B4254B2D2719B66F8C23DDE6D
12,318,390 UART: [art] SIG.S = 135302D8D6DA43E2C682814F55FF5F62C76A7BD7C170ACC551093ED749A84D73EDCF26B551DB880E0061EE49556D909B
12,342,344 UART: mbox::rt_entry...
12,342,716 UART: ____ _ _ _ ____ _____
12,343,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,344,300 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,345,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,345,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,346,604 UART: |_|
12,346,916 UART:
12,629,742 UART: [rt] Runtime listening for mailbox commands...
12,630,938 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,482 ready_for_fw is high
1,362,482 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,619 >>> mbox cmd response: success
2,468,619 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,531,289 UART:
2,531,305 UART: Running Caliptra FMC ...
2,531,713 UART:
2,531,856 UART: [state] CFI Enabled
2,542,275 UART: [fht] FMC Alias Private Key: 7
2,650,794 UART: [art] Extend RT PCRs Done
2,651,222 UART: [art] Lock RT PCRs Done
2,652,840 UART: [art] Populate DV Done
2,661,259 UART: [fht] FMC Alias Private Key: 7
2,662,337 UART: [art] Derive CDI
2,662,617 UART: [art] Store in in slot 0x4
2,748,388 UART: [art] Derive Key Pair
2,748,748 UART: [art] Store priv key in slot 0x5
2,762,380 UART: [art] Derive Key Pair - Done
2,777,202 UART: [art] Signing Cert with AUTHO
2,777,682 UART: RITY.KEYID = 7
2,792,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,793,641 UART: [art] PUB.X = 7383FFFE29B9ADF7E56F297EE419667C7581999E662E7C8556F5739D2A20EADEFA00F592425016BA7B4EE2FDE1C1402C
2,800,399 UART: [art] PUB.Y = 93487CEFD83923C6FBD411464597B597EC085A3B596D76B796923AD599C9D0403D75ACDB5C076F6A8DCE9326782B7948
2,807,343 UART: [art] SIG.R = 24395DAB87725518C138CF23B63CABB5D3E588FA0581ABF3F2F5F987CFCD9E7D61636140AB6BE0667EF8C93AAADD52D2
2,814,128 UART: [art] SIG.S = FFA06B2B803E3D816D47B8D2D14EFFF032F6F5B705CC9FADAFE4B64772F07303918C20C90CC8CFA8B65DB7CC99C8A63B
2,838,174 UART: mbox::rt_entry...
2,838,546 UART: ____ _ _ _ ____ _____
2,839,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,840,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,840,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,841,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,842,434 UART: |_|
2,842,746 UART:
2,949,898 UART: [rt] Runtime listening for mailbox commands...
2,951,085 >>> mbox cmd response data (48 bytes)
2,951,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,697 >>> mbox cmd response: success
5,715,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,729,046 UART:
5,729,062 UART: Running Caliptra FMC ...
5,729,470 UART:
5,729,613 UART: [state] CFI Enabled
5,818,888 UART: [art] Extend RT PCRs Done
5,819,316 UART: [art] Lock RT PCRs Done
5,820,425 UART: [art] Populate DV Done
5,828,554 UART: [fht] FMC Alias Private Key: 7
5,829,708 UART: [art] Derive CDI
5,829,988 UART: [art] Store in in slot 0x4
5,915,579 UART: [art] Derive Key Pair
5,915,939 UART: [art] Store priv key in slot 0x5
5,929,045 UART: [art] Derive Key Pair - Done
5,943,886 UART: [art] Signing Cert with AUTHO
5,944,366 UART: RITY.KEYID = 7
5,959,484 UART: [art] Erasing AUTHORITY.KEYID = 7
5,960,249 UART: [art] PUB.X = 2C9C308E680B5B4AA9A0E7AC4DEF987A6E8266902D04499B95C3BEB76C22B9A81690B5E5A466351CC8CA7FC45D1509CE
5,967,022 UART: [art] PUB.Y = B710711D82960994F7D6B69DF9CEDFD8A3EEB1361C2277D3E0ECEB04F1473D4B9FAB59DEC50DC360EC2C5B09B2ECDC9D
5,973,986 UART: [art] SIG.R = D09A5A1D7D322820ED6878A85B38A6F03611BB23BF548D59855D24DCD7678B06FFA30F68FBB50AC2C329925759730AEF
5,980,750 UART: [art] SIG.S = 12590C583E85DBF54502AADD007E942B33FEE3232DA67C26DE7AED1082CB3B08B52B862578D1CE8BC2BB15EBEEC32D17
6,004,904 UART: Caliptra RT
6,005,249 UART: [state] CFI Enabled
6,288,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,010 UART: [rt]cmd =0x4d454153, len=108
6,341,518 >>> mbox cmd response data (12 bytes)
6,341,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,643,720 >>> mbox cmd response: success
8,643,720 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,656,689 UART:
8,656,705 UART: Running Caliptra FMC ...
8,657,113 UART:
8,657,256 UART: [state] CFI Enabled
8,746,521 UART: [art] Extend RT PCRs Done
8,746,949 UART: [art] Lock RT PCRs Done
8,748,176 UART: [art] Populate DV Done
8,756,449 UART: [fht] FMC Alias Private Key: 7
8,757,589 UART: [art] Derive CDI
8,757,869 UART: [art] Store in in slot 0x4
8,843,652 UART: [art] Derive Key Pair
8,844,012 UART: [art] Store priv key in slot 0x5
8,857,252 UART: [art] Derive Key Pair - Done
8,872,244 UART: [art] Signing Cert with AUTHO
8,872,724 UART: RITY.KEYID = 7
8,888,396 UART: [art] Erasing AUTHORITY.KEYID = 7
8,889,161 UART: [art] PUB.X = A2B9F01A736D08889FCE5EA809EC304B706C495877470849BBA4D1EDF8EE2B89B4B4446142D8A01FFDB994F9F94F70BC
8,895,934 UART: [art] PUB.Y = 67EFC9AB08E6FB3B0A55C5E179E2D697AD9E56530F8471349533565AC927DA3BBDAB575C07A22465421FE35B31524721
8,902,874 UART: [art] SIG.R = 85774B6C789F57691472D994ECD309E3A147E07963EAFFB58C525337C9A8449623390BD6EF7939DDF696088958D66176
8,909,625 UART: [art] SIG.S = D5BD84C42F41194484BEE97BFACBD7508299D4295A36727A33F15D4771AC79CCD0EE972A740FC7EA53F4563D3D411DC5
8,933,635 UART: mbox::rt_entry...
8,934,007 UART: ____ _ _ _ ____ _____
8,934,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,935,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,936,359 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,937,127 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,937,895 UART: |_|
8,938,207 UART:
9,220,050 UART: [rt] Runtime listening for mailbox commands...
11,521,851 >>> mbox cmd response: success
11,521,851 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,535,854 UART:
11,535,870 UART: Running Caliptra FMC ...
11,536,278 UART:
11,536,421 UART: [state] CFI Enabled
11,625,814 UART: [art] Extend RT PCRs Done
11,626,242 UART: [art] Lock RT PCRs Done
11,627,299 UART: [art] Populate DV Done
11,635,406 UART: [fht] FMC Alias Private Key: 7
11,636,494 UART: [art] Derive CDI
11,636,774 UART: [art] Store in in slot 0x4
11,722,511 UART: [art] Derive Key Pair
11,722,871 UART: [art] Store priv key in slot 0x5
11,735,561 UART: [art] Derive Key Pair - Done
11,749,959 UART: [art] Signing Cert with AUTHO
11,750,439 UART: RITY.KEYID = 7
11,765,609 UART: [art] Erasing AUTHORITY.KEYID = 7
11,766,374 UART: [art] PUB.X = D93BAB2EC84E3FA844959C246E00CF9106B46973118A5450DD5B045B98F87EAB9F9EEAEDF34BDAAF7298AB312FF79BE2
11,773,136 UART: [art] PUB.Y = E31674D1E6C0C76F9A569C1C1A9AC7293BB1193F46586851F59961D0D4B4A5BB2D3E609207C88D348D37CD6A321163BC
11,780,085 UART: [art] SIG.R = D53AD368BE016E9AAF37A78B265A66D446E7A20A47CFC015E09F6CD5844D8A8B446B52265E71E7B3C97615D4A8F4931B
11,786,857 UART: [art] SIG.S = 0B74E05813E7AF38DF6A61C43ABCAC41C56FFC1FBD0610A367D8183894DE2177685860770CF7835A437F685D6F68F581
11,810,381 UART: mbox::rt_entry...
11,810,753 UART: ____ _ _ _ ____ _____
11,811,537 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,812,337 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,813,105 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,813,873 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,814,641 UART: |_|
11,814,953 UART:
12,095,955 UART: [rt] Runtime listening for mailbox commands...
12,097,151 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.58s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,288 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,370 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,703 >>> mbox cmd response: success
2,313,703 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,314,953 UART: [afmc] ++
2,315,121 UART: [afmc] CDI.KEYID = 6
2,315,483 UART: [afmc] SUBJECT.KEYID = 7
2,315,908 UART: [afmc] AUTHORITY.KEYID = 5
2,351,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,188 UART: [afmc] --
2,395,292 UART: [cold-reset] --
2,396,074 UART: [state] Locking Datavault
2,397,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,837 UART: [state] Locking ICCM
2,398,451 UART: [exit] Launching FMC @ 0x40000130
2,403,780 UART:
2,403,796 UART: Running Caliptra FMC ...
2,404,204 UART:
2,404,258 UART: [state] CFI Enabled
2,414,539 UART: [fht] FMC Alias Private Key: 7
2,522,764 UART: [art] Extend RT PCRs Done
2,523,192 UART: [art] Lock RT PCRs Done
2,524,580 UART: [art] Populate DV Done
2,532,917 UART: [fht] FMC Alias Private Key: 7
2,533,993 UART: [art] Derive CDI
2,534,273 UART: [art] Store in in slot 0x4
2,619,444 UART: [art] Derive Key Pair
2,619,804 UART: [art] Store priv key in slot 0x5
2,632,732 UART: [art] Derive Key Pair - Done
2,647,790 UART: [art] Signing Cert with AUTHO
2,648,270 UART: RITY.KEYID = 7
2,663,646 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,411 UART: [art] PUB.X = C76E4784811C1AFF38838862CA744DBB3303B408F6387D15F86EB22D72B6C2870ADF73F1448E2184D45704BEA3D94383
2,671,167 UART: [art] PUB.Y = B5E9A292131B71CEEE33231485141B669D2A0BC414F9BCFF1D1D44A337074EE9D9CB8AD183ED8B0E67CDD218A1CDA368
2,678,124 UART: [art] SIG.R = 9692F199E3DB6F3C4B68C25B5073B40B529F73328947DD250ECC2D88D437F34E25AAC0FF58BDA124401AEBCEEAA18F2C
2,684,904 UART: [art] SIG.S = 5FBD417560A263BC5FF761AFEF815DCBA844000E84F6F842D8B95468551643B8F30384CBF76505887AD9C78DF17973EA
2,709,028 UART: mbox::rt_entry...
2,709,400 UART: ____ _ _ _ ____ _____
2,710,184 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,984 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,752 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,288 UART: |_|
2,713,600 UART:
2,820,430 UART: [rt] Runtime listening for mailbox commands...
2,821,617 >>> mbox cmd response data (48 bytes)
2,821,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,821,729 UART:
2,821,745 UART: Running Caliptra ROM ...
2,822,153 UART:
2,822,208 UART: [state] CFI Enabled
2,824,716 UART: [state] LifecycleState = Unprovisioned
2,825,371 UART: [state] DebugLocked = No
2,825,895 UART: [state] WD Timer not started. Device not locked for debugging
2,827,147 UART: [kat] SHA2-256
3,632,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,922 UART: [kat] ++
3,637,074 UART: [kat] sha1
3,641,348 UART: [kat] SHA2-256
3,643,288 UART: [kat] SHA2-384
3,646,211 UART: [kat] SHA2-512-ACC
3,648,111 UART: [kat] ECC-384
3,657,706 UART: [kat] HMAC-384Kdf
3,662,156 UART: [kat] LMS
3,910,484 UART: [kat] --
3,911,528 UART: [update-reset] ++
5,225,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,226,892 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,890 >>> mbox cmd response: success
5,376,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,377,199 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,213 UART: [update-reset Success] --
5,386,304 UART: [state] Locking Datavault
5,387,082 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,686 UART: [state] Locking ICCM
5,388,198 UART: [exit] Launching FMC @ 0x40000130
5,393,527 UART:
5,393,543 UART: Running Caliptra FMC ...
5,393,951 UART:
5,394,005 UART: [state] CFI Enabled
5,482,654 UART: [art] Extend RT PCRs Done
5,483,082 UART: [art] Lock RT PCRs Done
5,484,109 UART: [art] Populate DV Done
5,492,204 UART: [fht] FMC Alias Private Key: 7
5,493,356 UART: [art] Derive CDI
5,493,636 UART: [art] Store in in slot 0x4
5,579,347 UART: [art] Derive Key Pair
5,579,707 UART: [art] Store priv key in slot 0x5
5,592,667 UART: [art] Derive Key Pair - Done
5,607,487 UART: [art] Signing Cert with AUTHO
5,607,967 UART: RITY.KEYID = 7
5,623,021 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,786 UART: [art] PUB.X = 1FEC3C073BA4879463171ED92A394658D98E66B6DCF22CE3904ED8693EBB2698898A8C9D1558568D617B69416D529B3D
5,630,551 UART: [art] PUB.Y = 0F70BFEBE9AE22DF1204CBBF9A8262B3F9C227B8370729F0F399BDF5AA6058AF8C977D8ABE04E6D1EF9F42C994A9ECF2
5,637,513 UART: [art] SIG.R = D4EDC87A2339A3C5066F03FBF96A7995BE365CDD42401FBC229B1EB6A6A2469E06C11E2B2FDC0679245CCD27447BFF76
5,644,285 UART: [art] SIG.S = 91433FB5952AD6F1AF39F78597CC02AFDCE8C928E17AF10A8EA46E82D5D8E682D0C42D57B975F831F82D49722C358714
5,667,842 UART: Caliptra RT
5,668,095 UART: [state] CFI Enabled
5,945,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,585 UART: [rt]cmd =0x4d454153, len=108
5,997,127 >>> mbox cmd response data (12 bytes)
5,997,128 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,821 UART:
5,997,837 UART: Running Caliptra ROM ...
5,998,245 UART:
5,998,300 UART: [state] CFI Enabled
6,000,796 UART: [state] LifecycleState = Unprovisioned
6,001,451 UART: [state] DebugLocked = No
6,002,131 UART: [state] WD Timer not started. Device not locked for debugging
6,003,467 UART: [kat] SHA2-256
6,809,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,813,242 UART: [kat] ++
6,813,394 UART: [kat] sha1
6,817,702 UART: [kat] SHA2-256
6,819,642 UART: [kat] SHA2-384
6,822,377 UART: [kat] SHA2-512-ACC
6,824,277 UART: [kat] ECC-384
6,834,102 UART: [kat] HMAC-384Kdf
6,838,668 UART: [kat] LMS
7,086,996 UART: [kat] --
7,087,802 UART: [update-reset] ++
7,992,744 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,993,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,090,229 >>> mbox cmd response: success
8,090,229 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,090,468 UART: [update-reset] Copying MAN_2 To MAN_1
8,098,482 UART: [update-reset Success] --
8,099,629 UART: [state] Locking Datavault
8,100,353 UART: [state] Locking PCR0, PCR1 and PCR31
8,100,957 UART: [state] Locking ICCM
8,101,459 UART: [exit] Launching FMC @ 0x40000130
8,106,788 UART:
8,106,804 UART: Running Caliptra FMC ...
8,107,212 UART:
8,107,266 UART: [state] CFI Enabled
8,196,645 UART: [art] Extend RT PCRs Done
8,197,073 UART: [art] Lock RT PCRs Done
8,198,432 UART: [art] Populate DV Done
8,206,801 UART: [fht] FMC Alias Private Key: 7
8,207,889 UART: [art] Derive CDI
8,208,169 UART: [art] Store in in slot 0x4
8,294,034 UART: [art] Derive Key Pair
8,294,394 UART: [art] Store priv key in slot 0x5
8,307,436 UART: [art] Derive Key Pair - Done
8,322,443 UART: [art] Signing Cert with AUTHO
8,322,923 UART: RITY.KEYID = 7
8,338,373 UART: [art] Erasing AUTHORITY.KEYID = 7
8,339,138 UART: [art] PUB.X = B003DE1A78AF1271B673F4FCDE30EE1A3A161B3316C4F48CF7C6426ABF232B98CF4D36DC6C0409DE932EFBB4917AFC7C
8,345,921 UART: [art] PUB.Y = 16A2560F067C16CE404DD46728E8A050E3EE6782971253FA834CFDED04F512C4C01C7DAF61BE474FEE00ED0A6B7B554D
8,352,849 UART: [art] SIG.R = C40159DD98B2C02AB4F46A02DABC5715C73678FF769FAA6F5352E616219FDAD7E5BA073152EB0C73A51DB9542B3D9A84
8,359,619 UART: [art] SIG.S = F782464526690374EDFD8F203BBF41298F67785C6414B0ABB049A610C15CC27E1A49F2A58CB747DDAA86094584035BAE
8,383,097 UART: mbox::rt_entry...
8,383,469 UART: ____ _ _ _ ____ _____
8,384,253 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,385,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,385,821 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,386,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,387,357 UART: |_|
8,387,669 UART:
8,665,516 UART: [rt] Runtime listening for mailbox commands...
8,666,480 UART:
8,666,496 UART: Running Caliptra ROM ...
8,666,904 UART:
8,666,959 UART: [state] CFI Enabled
8,669,257 UART: [state] LifecycleState = Unprovisioned
8,669,912 UART: [state] DebugLocked = No
8,670,476 UART: [state] WD Timer not started. Device not locked for debugging
8,671,744 UART: [kat] SHA2-256
9,477,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,481,519 UART: [kat] ++
9,481,671 UART: [kat] sha1
9,485,893 UART: [kat] SHA2-256
9,487,833 UART: [kat] SHA2-384
9,490,604 UART: [kat] SHA2-512-ACC
9,492,504 UART: [kat] ECC-384
9,501,929 UART: [kat] HMAC-384Kdf
9,506,429 UART: [kat] LMS
9,754,757 UART: [kat] --
9,755,669 UART: [update-reset] ++
10,661,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,662,576 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,758,958 >>> mbox cmd response: success
10,758,958 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,759,301 UART: [update-reset] Copying MAN_2 To MAN_1
10,767,315 UART: [update-reset Success] --
10,768,504 UART: [state] Locking Datavault
10,769,486 UART: [state] Locking PCR0, PCR1 and PCR31
10,770,090 UART: [state] Locking ICCM
10,770,636 UART: [exit] Launching FMC @ 0x40000130
10,775,965 UART:
10,775,981 UART: Running Caliptra FMC ...
10,776,389 UART:
10,776,443 UART: [state] CFI Enabled
10,865,208 UART: [art] Extend RT PCRs Done
10,865,636 UART: [art] Lock RT PCRs Done
10,866,871 UART: [art] Populate DV Done
10,875,304 UART: [fht] FMC Alias Private Key: 7
10,876,442 UART: [art] Derive CDI
10,876,722 UART: [art] Store in in slot 0x4
10,962,697 UART: [art] Derive Key Pair
10,963,057 UART: [art] Store priv key in slot 0x5
10,976,079 UART: [art] Derive Key Pair - Done
10,991,026 UART: [art] Signing Cert with AUTHO
10,991,506 UART: RITY.KEYID = 7
11,006,820 UART: [art] Erasing AUTHORITY.KEYID = 7
11,007,585 UART: [art] PUB.X = 0FABF1814E497A13F0F06FAF1A619CD5E286261DF8BBC97FE7C9F939C6F25EA10DD925299ED4E7B2BCE748EB2A0EE272
11,014,368 UART: [art] PUB.Y = C8EA3D2B53CC6735E42408986396381861519045FC527AF02CA0EDB51224270D1AFC0732B1D13E4E37965959EC027F37
11,021,300 UART: [art] SIG.R = 1E112E1F0A2425C81B92DFC986B481BE0AE2C02D88870B3A241DBF445B3FA758404225A3B59093BCA375F87DB4D98FB3
11,028,069 UART: [art] SIG.S = BBDAB53D4DB4ECDFE687F272DA42227CD296C6218AA0F904535FBD763268EB5E0A6D37F4B30C2EE1EDC12691C499AA93
11,051,811 UART: mbox::rt_entry...
11,052,183 UART: ____ _ _ _ ____ _____
11,052,967 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,053,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,054,535 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,055,303 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,056,071 UART: |_|
11,056,383 UART:
11,333,885 UART: [rt] Runtime listening for mailbox commands...
11,335,081 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,685 ready_for_fw is high
1,059,685 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,728 >>> mbox cmd response: success
2,163,728 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,225,588 UART:
2,225,604 UART: Running Caliptra FMC ...
2,226,012 UART:
2,226,066 UART: [state] CFI Enabled
2,236,605 UART: [fht] FMC Alias Private Key: 7
2,344,302 UART: [art] Extend RT PCRs Done
2,344,730 UART: [art] Lock RT PCRs Done
2,346,602 UART: [art] Populate DV Done
2,354,921 UART: [fht] FMC Alias Private Key: 7
2,356,085 UART: [art] Derive CDI
2,356,365 UART: [art] Store in in slot 0x4
2,442,048 UART: [art] Derive Key Pair
2,442,408 UART: [art] Store priv key in slot 0x5
2,454,920 UART: [art] Derive Key Pair - Done
2,469,812 UART: [art] Signing Cert with AUTHO
2,470,292 UART: RITY.KEYID = 7
2,485,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,183 UART: [art] PUB.X = 272B2C5F0775EC5E1F8D673006AE50AF2968B3B330091169044F55CAD55789D3D96E6E5866A2A26952604EC1E7C4FC20
2,492,939 UART: [art] PUB.Y = F4A8B294A40491803BEA27005D74658CCF8E3221D8AEFD85A26C2CB9C82217D247270826C75719DE9D72B6ED91989B23
2,499,861 UART: [art] SIG.R = A1BC050A8F8BA6259103380A38C9ED21E5AC52C625581AC5AB704B9DD29AE47973AA962A06452A1A47F3F0CD5B6F3FEC
2,506,630 UART: [art] SIG.S = 8F2E5C7FAEB8D9BCA07D178EB7D9A1D32A5FD306B89BA16E62B27DBDC328D7A40D83C978E5F79496BC314A82E7E1A19E
2,530,141 UART: mbox::rt_entry...
2,530,513 UART: ____ _ _ _ ____ _____
2,531,297 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,097 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,633 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,401 UART: |_|
2,534,713 UART:
2,640,600 UART: [rt] Runtime listening for mailbox commands...
2,641,787 >>> mbox cmd response data (48 bytes)
2,641,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,080,495 >>> mbox cmd response: success
5,080,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,093,899 UART:
5,093,915 UART: Running Caliptra FMC ...
5,094,323 UART:
5,094,377 UART: [state] CFI Enabled
5,183,970 UART: [art] Extend RT PCRs Done
5,184,398 UART: [art] Lock RT PCRs Done
5,185,919 UART: [art] Populate DV Done
5,194,132 UART: [fht] FMC Alias Private Key: 7
5,195,282 UART: [art] Derive CDI
5,195,562 UART: [art] Store in in slot 0x4
5,281,213 UART: [art] Derive Key Pair
5,281,573 UART: [art] Store priv key in slot 0x5
5,294,649 UART: [art] Derive Key Pair - Done
5,309,498 UART: [art] Signing Cert with AUTHO
5,309,978 UART: RITY.KEYID = 7
5,324,980 UART: [art] Erasing AUTHORITY.KEYID = 7
5,325,745 UART: [art] PUB.X = C6A732D73B56CDA9ACB9E4FEBCA1D2C469674054855C21B6DA66286FA3554F03EDF52FF5D130BECFC561AAECAA26B240
5,332,536 UART: [art] PUB.Y = AA4AE505AD3B61FBD50D99146D14B1561E0A22595BC9A4C52CCD40D899A00082BAB21459B1A5D922D886001DA12F2948
5,339,439 UART: [art] SIG.R = 463EC5ECB38A7DEB2D5050BB30E49480F93A921A21A6E1983E39092633259668D1CF9626E79194B70D0A754807766450
5,346,187 UART: [art] SIG.S = 06135B22818F43AC391B9AD15FF43BB15BBBCB3532D8F093AFC4A55DD6627399796A47372775C51D7BDD4A9AC5DFAF44
5,370,173 UART: Caliptra RT
5,370,426 UART: [state] CFI Enabled
5,654,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,684,937 UART: [rt]cmd =0x4d454153, len=108
5,705,481 >>> mbox cmd response data (12 bytes)
5,705,482 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,680,522 >>> mbox cmd response: success
7,680,522 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,693,982 UART:
7,693,998 UART: Running Caliptra FMC ...
7,694,406 UART:
7,694,460 UART: [state] CFI Enabled
7,783,363 UART: [art] Extend RT PCRs Done
7,783,791 UART: [art] Lock RT PCRs Done
7,785,074 UART: [art] Populate DV Done
7,793,359 UART: [fht] FMC Alias Private Key: 7
7,794,455 UART: [art] Derive CDI
7,794,735 UART: [art] Store in in slot 0x4
7,880,292 UART: [art] Derive Key Pair
7,880,652 UART: [art] Store priv key in slot 0x5
7,894,180 UART: [art] Derive Key Pair - Done
7,908,952 UART: [art] Signing Cert with AUTHO
7,909,432 UART: RITY.KEYID = 7
7,925,078 UART: [art] Erasing AUTHORITY.KEYID = 7
7,925,843 UART: [art] PUB.X = 47EDEE8B7702122E09B7B265FDF5866DAD2BD2F656B163F87289462F200B53D1349BFA0A17E1F89BFB8FFECEBA1DB010
7,932,619 UART: [art] PUB.Y = 30D6DBCC456916485A5CBBFE4D8DFF0DE5C78A6D9B410BD6A2975A94104F0ED7EE0E169182CE66B2B1E91CC77BFEBF4C
7,939,583 UART: [art] SIG.R = F819E3BE83F9176630CD270A8E3901C7BE906B17B83C214FBD8CCBC873B689B174D96C93F3C356AEC9BC4D0127583C07
7,946,349 UART: [art] SIG.S = 0F4F7E420638F883E985EF7405C0715DA89B7989B71CF5F9D094636AD5B452688181C5B6A65F273856199E2EB3D72CB3
7,969,809 UART: mbox::rt_entry...
7,970,181 UART: ____ _ _ _ ____ _____
7,970,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,971,765 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,972,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,973,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,974,069 UART: |_|
7,974,381 UART:
8,259,905 UART: [rt] Runtime listening for mailbox commands...
10,236,234 >>> mbox cmd response: success
10,236,234 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,249,558 UART:
10,249,574 UART: Running Caliptra FMC ...
10,249,982 UART:
10,250,036 UART: [state] CFI Enabled
10,339,595 UART: [art] Extend RT PCRs Done
10,340,023 UART: [art] Lock RT PCRs Done
10,341,658 UART: [art] Populate DV Done
10,349,919 UART: [fht] FMC Alias Private Key: 7
10,350,931 UART: [art] Derive CDI
10,351,211 UART: [art] Store in in slot 0x4
10,436,652 UART: [art] Derive Key Pair
10,437,012 UART: [art] Store priv key in slot 0x5
10,449,704 UART: [art] Derive Key Pair - Done
10,464,390 UART: [art] Signing Cert with AUTHO
10,464,870 UART: RITY.KEYID = 7
10,479,934 UART: [art] Erasing AUTHORITY.KEYID = 7
10,480,699 UART: [art] PUB.X = EF50F19DC9BA50F00AD47191BD7194FBA77B9AEC838E17806DEAB3FA813673018DF005EF898CF76CB42ABB5DE3B75EC4
10,487,482 UART: [art] PUB.Y = 84CE9995413BCAD4ECBED2DF41CA7D9DB033177F19419E828AF6FC90F12580492FD4CEAC8743B0C67CB225E5E815BDFC
10,494,452 UART: [art] SIG.R = CF06ED3FA033B841DBC136B17B690B563C2CF48EB0FC40956852DEDB883AC3437619CBEEC6935191C7B3E31E12A0E72A
10,501,230 UART: [art] SIG.S = F821047449D03E8B9E34E89DEF2C695A2D216AC03E25C3FF8EB2B8946FF6D995D1B4927A356A5A977C640699663C58BF
10,524,933 UART: mbox::rt_entry...
10,525,305 UART: ____ _ _ _ ____ _____
10,526,089 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,526,889 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,527,657 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,528,425 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,529,193 UART: |_|
10,529,505 UART:
10,809,568 UART: [rt] Runtime listening for mailbox commands...
10,810,764 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.33s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,285,797 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,095 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,406 >>> mbox cmd response: success
2,315,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,316,652 UART: [afmc] ++
2,316,820 UART: [afmc] CDI.KEYID = 6
2,317,182 UART: [afmc] SUBJECT.KEYID = 7
2,317,607 UART: [afmc] AUTHORITY.KEYID = 5
2,353,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,785 UART: [afmc] --
2,396,901 UART: [cold-reset] --
2,397,619 UART: [state] Locking Datavault
2,398,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,522 UART: [state] Locking ICCM
2,400,146 UART: [exit] Launching FMC @ 0x40000130
2,405,475 UART:
2,405,491 UART: Running Caliptra FMC ...
2,405,899 UART:
2,406,042 UART: [state] CFI Enabled
2,416,979 UART: [fht] FMC Alias Private Key: 7
2,524,710 UART: [art] Extend RT PCRs Done
2,525,138 UART: [art] Lock RT PCRs Done
2,527,024 UART: [art] Populate DV Done
2,535,115 UART: [fht] FMC Alias Private Key: 7
2,536,207 UART: [art] Derive CDI
2,536,487 UART: [art] Store in in slot 0x4
2,622,246 UART: [art] Derive Key Pair
2,622,606 UART: [art] Store priv key in slot 0x5
2,635,614 UART: [art] Derive Key Pair - Done
2,650,252 UART: [art] Signing Cert with AUTHO
2,650,732 UART: RITY.KEYID = 7
2,665,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,527 UART: [art] PUB.X = 0AD14073BB2E3C4C8265E81FDC0FBBB3629C3EEA476619BBD5D1DC19A8063BC7043BE54C053D29B5E4E829F4D2BFE906
2,673,297 UART: [art] PUB.Y = D488D4CAF65D60F6E9165FFC64C5348DC2F6543133FB4E0B21A8C1CBF59C72A049F1A01017C74F9A752C48A5A82A1C02
2,680,251 UART: [art] SIG.R = 5593DB5732182D6CEF765026AD85403A5529FEA1AC7C13BAA911947A56ECB8DF91DD7375E5D42E1052912258E3C18E21
2,687,023 UART: [art] SIG.S = 09751213DB16EE3E4CCF547A7EAA3F5DC91FEC13A56AEDC30D25431CF4CD0C99B10295C7BC0330891CEB9D872E3E1CA2
2,710,483 UART: mbox::rt_entry...
2,710,855 UART: ____ _ _ _ ____ _____
2,711,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,439 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,743 UART: |_|
2,715,055 UART:
2,821,337 UART: [rt] Runtime listening for mailbox commands...
2,822,524 >>> mbox cmd response data (48 bytes)
2,822,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,822,636 UART:
2,822,652 UART: Running Caliptra ROM ...
2,823,060 UART:
2,823,202 UART: [state] CFI Enabled
2,826,372 UART: [state] LifecycleState = Unprovisioned
2,827,027 UART: [state] DebugLocked = No
2,827,745 UART: [state] WD Timer not started. Device not locked for debugging
2,828,885 UART: [kat] SHA2-256
3,634,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,638,660 UART: [kat] ++
3,638,812 UART: [kat] sha1
3,643,024 UART: [kat] SHA2-256
3,644,964 UART: [kat] SHA2-384
3,647,791 UART: [kat] SHA2-512-ACC
3,649,691 UART: [kat] ECC-384
3,659,400 UART: [kat] HMAC-384Kdf
3,664,070 UART: [kat] LMS
3,912,398 UART: [kat] --
3,913,206 UART: [update-reset] ++
5,226,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,227,334 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,377,332 >>> mbox cmd response: success
5,377,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,377,677 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,691 UART: [update-reset Success] --
5,386,486 UART: [state] Locking Datavault
5,387,252 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,856 UART: [state] Locking ICCM
5,388,496 UART: [exit] Launching FMC @ 0x40000130
5,393,825 UART:
5,393,841 UART: Running Caliptra FMC ...
5,394,249 UART:
5,394,392 UART: [state] CFI Enabled
5,483,495 UART: [art] Extend RT PCRs Done
5,483,923 UART: [art] Lock RT PCRs Done
5,485,194 UART: [art] Populate DV Done
5,493,595 UART: [fht] FMC Alias Private Key: 7
5,494,613 UART: [art] Derive CDI
5,494,893 UART: [art] Store in in slot 0x4
5,580,926 UART: [art] Derive Key Pair
5,581,286 UART: [art] Store priv key in slot 0x5
5,594,358 UART: [art] Derive Key Pair - Done
5,609,175 UART: [art] Signing Cert with AUTHO
5,609,655 UART: RITY.KEYID = 7
5,625,115 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,880 UART: [art] PUB.X = 3ADD750C5BDDA1DC929756327D3118BA802BE0C5AEBC34DB5589961F6C54E0206C76B3B71D44FED9A6911A4237E90549
5,632,652 UART: [art] PUB.Y = 21A2EB02C4206D68EB0FCA14799053CB0E6899E283B0B018C63A0DFC39D6FC58BF761969BD3D51EB22AF9EA5EF88B60B
5,639,603 UART: [art] SIG.R = 7406A274497DD6A235D1BA206F9F43813884D6E3587F07E83D356F912826DCE75B293CFC6E34F42F4842C81D031DFCEC
5,646,366 UART: [art] SIG.S = AB68AF284859EEFEF1D8A499EFB7D98F4ED03A6DB11E32DC05CC61E7063C35E6C45592652A63226A000699E0F91AE86C
5,669,954 UART: Caliptra RT
5,670,299 UART: [state] CFI Enabled
5,950,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,676 UART: [rt]cmd =0x4d454153, len=108
6,002,872 >>> mbox cmd response data (12 bytes)
6,002,873 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,694 UART:
6,003,710 UART: Running Caliptra ROM ...
6,004,118 UART:
6,004,260 UART: [state] CFI Enabled
6,006,906 UART: [state] LifecycleState = Unprovisioned
6,007,561 UART: [state] DebugLocked = No
6,008,121 UART: [state] WD Timer not started. Device not locked for debugging
6,009,415 UART: [kat] SHA2-256
6,815,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,819,190 UART: [kat] ++
6,819,342 UART: [kat] sha1
6,823,550 UART: [kat] SHA2-256
6,825,490 UART: [kat] SHA2-384
6,828,259 UART: [kat] SHA2-512-ACC
6,830,159 UART: [kat] ECC-384
6,840,000 UART: [kat] HMAC-384Kdf
6,844,768 UART: [kat] LMS
7,093,096 UART: [kat] --
7,094,082 UART: [update-reset] ++
7,999,880 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,000,911 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,097,293 >>> mbox cmd response: success
8,097,293 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,097,650 UART: [update-reset] Copying MAN_2 To MAN_1
8,105,664 UART: [update-reset Success] --
8,106,503 UART: [state] Locking Datavault
8,107,335 UART: [state] Locking PCR0, PCR1 and PCR31
8,107,939 UART: [state] Locking ICCM
8,108,409 UART: [exit] Launching FMC @ 0x40000130
8,113,738 UART:
8,113,754 UART: Running Caliptra FMC ...
8,114,162 UART:
8,114,305 UART: [state] CFI Enabled
8,203,688 UART: [art] Extend RT PCRs Done
8,204,116 UART: [art] Lock RT PCRs Done
8,205,669 UART: [art] Populate DV Done
8,213,992 UART: [fht] FMC Alias Private Key: 7
8,215,134 UART: [art] Derive CDI
8,215,414 UART: [art] Store in in slot 0x4
8,301,277 UART: [art] Derive Key Pair
8,301,637 UART: [art] Store priv key in slot 0x5
8,315,137 UART: [art] Derive Key Pair - Done
8,329,780 UART: [art] Signing Cert with AUTHO
8,330,260 UART: RITY.KEYID = 7
8,345,370 UART: [art] Erasing AUTHORITY.KEYID = 7
8,346,135 UART: [art] PUB.X = 4D9359D72473C8A24AC53675FD95171DA21167C56DEC9E89477B1C7B2AE9BE895B51F796493E1BF585786026DD564149
8,352,901 UART: [art] PUB.Y = 2DF653D7D10B2EA2368AEA6B98D8CE93BE89C7388952D9053578E099914ACD1CFC45D8CE26F16F79D2A3C262A256B9DE
8,359,857 UART: [art] SIG.R = 46C77D7DD9013AD325174E72744DB1FE277A37C1D4B230930BCEE1C8A5F2266CC654C0F630F132B41A25847FE65135C3
8,366,623 UART: [art] SIG.S = BBC2F68DA2D9284D3FCFB189F22803C36E001A4D888FDD5AE28EBF02F2FB6ED5C9B0AE80ED968B06390B9A1934255DAF
8,391,512 UART: mbox::rt_entry...
8,391,884 UART: ____ _ _ _ ____ _____
8,392,668 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,393,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,394,236 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,395,004 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,395,772 UART: |_|
8,396,084 UART:
8,675,268 UART: [rt] Runtime listening for mailbox commands...
8,676,232 UART:
8,676,248 UART: Running Caliptra ROM ...
8,676,656 UART:
8,676,798 UART: [state] CFI Enabled
8,679,104 UART: [state] LifecycleState = Unprovisioned
8,679,759 UART: [state] DebugLocked = No
8,680,397 UART: [state] WD Timer not started. Device not locked for debugging
8,681,597 UART: [kat] SHA2-256
9,487,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,491,372 UART: [kat] ++
9,491,524 UART: [kat] sha1
9,495,756 UART: [kat] SHA2-256
9,497,696 UART: [kat] SHA2-384
9,500,449 UART: [kat] SHA2-512-ACC
9,502,349 UART: [kat] ECC-384
9,512,236 UART: [kat] HMAC-384Kdf
9,516,808 UART: [kat] LMS
9,765,136 UART: [kat] --
9,766,022 UART: [update-reset] ++
10,671,246 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,672,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,768,739 >>> mbox cmd response: success
10,768,739 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,768,900 UART: [update-reset] Copying MAN_2 To MAN_1
10,776,914 UART: [update-reset Success] --
10,777,835 UART: [state] Locking Datavault
10,778,811 UART: [state] Locking PCR0, PCR1 and PCR31
10,779,415 UART: [state] Locking ICCM
10,779,979 UART: [exit] Launching FMC @ 0x40000130
10,785,308 UART:
10,785,324 UART: Running Caliptra FMC ...
10,785,732 UART:
10,785,875 UART: [state] CFI Enabled
10,875,162 UART: [art] Extend RT PCRs Done
10,875,590 UART: [art] Lock RT PCRs Done
10,876,815 UART: [art] Populate DV Done
10,884,928 UART: [fht] FMC Alias Private Key: 7
10,885,862 UART: [art] Derive CDI
10,886,142 UART: [art] Store in in slot 0x4
10,972,007 UART: [art] Derive Key Pair
10,972,367 UART: [art] Store priv key in slot 0x5
10,985,005 UART: [art] Derive Key Pair - Done
11,000,064 UART: [art] Signing Cert with AUTHO
11,000,544 UART: RITY.KEYID = 7
11,016,140 UART: [art] Erasing AUTHORITY.KEYID = 7
11,016,905 UART: [art] PUB.X = CE767C88AAAE8CF8855D96FF42DE59D36CE65EEF2F2613B0880165DDC3C227DA09684FC20DBCDAAACA29574FCB5D986C
11,023,692 UART: [art] PUB.Y = 7FB9F9D0BB599398E6295D6B9E5A387E60CA9F96DDCD5F19B3F253905B7A41F947C9C9C284C8C73F9E11AEB3F102BC19
11,030,653 UART: [art] SIG.R = 284327D9D7050691AF6C9ADB7F014AD53E7BEA0787F55681E9901A2BEB8C6DB2248666F57CDF47E585A8A2431EA7F8BD
11,037,421 UART: [art] SIG.S = 97009FFE4A72B67E57250587AB00234BC0C3EEE6DAA6CF1E8021DCECF66FAD158DFEB260A4DF08BD7231680AA1C2AB6D
11,061,239 UART: mbox::rt_entry...
11,061,611 UART: ____ _ _ _ ____ _____
11,062,395 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,063,195 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,063,963 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,064,731 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,065,499 UART: |_|
11,065,811 UART:
11,345,723 UART: [rt] Runtime listening for mailbox commands...
11,346,919 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,326 ready_for_fw is high
1,060,326 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,491 >>> mbox cmd response: success
2,165,491 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,227,953 UART:
2,227,969 UART: Running Caliptra FMC ...
2,228,377 UART:
2,228,520 UART: [state] CFI Enabled
2,239,299 UART: [fht] FMC Alias Private Key: 7
2,347,420 UART: [art] Extend RT PCRs Done
2,347,848 UART: [art] Lock RT PCRs Done
2,349,346 UART: [art] Populate DV Done
2,357,619 UART: [fht] FMC Alias Private Key: 7
2,358,647 UART: [art] Derive CDI
2,358,927 UART: [art] Store in in slot 0x4
2,444,740 UART: [art] Derive Key Pair
2,445,100 UART: [art] Store priv key in slot 0x5
2,458,094 UART: [art] Derive Key Pair - Done
2,472,584 UART: [art] Signing Cert with AUTHO
2,473,064 UART: RITY.KEYID = 7
2,488,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,097 UART: [art] PUB.X = 01C8902A6D22B1AA52221372DAC73084B81AEF1E028E4424BD94E47754CB1C6C91B1132A5D0FC892FDB74528F9ADCD0B
2,495,865 UART: [art] PUB.Y = 61736EFF9ABC8D64FA20B1C6ECF85409B39F74ADFF2E8DFB987CE2BAAACC789E04EAA7A7845316DECBCF02AD0870CE41
2,502,835 UART: [art] SIG.R = FD39A8626542D0D8BE00D0A49C87B8576DE13F05E415D337A80BFDFF8E8DC065C4EECBF5019FB4881A31990427DBDAFF
2,509,589 UART: [art] SIG.S = A810452A3D1FD2EEE99E267740B225566527219411FFA195901CF062E0456B165B533FD2C6ED045732C4E69717B02C6A
2,533,209 UART: mbox::rt_entry...
2,533,581 UART: ____ _ _ _ ____ _____
2,534,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,469 UART: |_|
2,537,781 UART:
2,644,852 UART: [rt] Runtime listening for mailbox commands...
2,646,039 >>> mbox cmd response data (48 bytes)
2,646,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,084,781 >>> mbox cmd response: success
5,084,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,098,155 UART:
5,098,171 UART: Running Caliptra FMC ...
5,098,579 UART:
5,098,722 UART: [state] CFI Enabled
5,187,461 UART: [art] Extend RT PCRs Done
5,187,889 UART: [art] Lock RT PCRs Done
5,189,094 UART: [art] Populate DV Done
5,197,229 UART: [fht] FMC Alias Private Key: 7
5,198,187 UART: [art] Derive CDI
5,198,467 UART: [art] Store in in slot 0x4
5,284,070 UART: [art] Derive Key Pair
5,284,430 UART: [art] Store priv key in slot 0x5
5,297,796 UART: [art] Derive Key Pair - Done
5,312,144 UART: [art] Signing Cert with AUTHO
5,312,624 UART: RITY.KEYID = 7
5,327,708 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,473 UART: [art] PUB.X = BF537C344A1F797E4AD8DFBB6FF9EFB16B173D7539DA4C0E4BC4F38215325FF6C54BF3CA1D4AF6D83D66AD0B431F3C32
5,335,261 UART: [art] PUB.Y = 1040F6B5AE06804BEE32AE042822855F2745DFE312F3EB1D2B71948596C9C31260853C5A8D7D83FAD0582516069A198A
5,342,198 UART: [art] SIG.R = E3C76A3B94F16B81C6D84047DC0BEF2E6356E9DAE6CBD2A442511AD8BCAEC9397F1FAF5993E66526A6B3F45F285E46AC
5,348,985 UART: [art] SIG.S = 2B4795A4A6E7856605694163082953E0A9A3171B509D96EE551E0FAF172B9FB641D621BC200CEB7EE9C58F36385C719F
5,372,912 UART: Caliptra RT
5,373,257 UART: [state] CFI Enabled
5,659,608 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,690,948 UART: [rt]cmd =0x4d454153, len=108
5,711,758 >>> mbox cmd response data (12 bytes)
5,711,759 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,689,148 >>> mbox cmd response: success
7,689,148 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,702,580 UART:
7,702,596 UART: Running Caliptra FMC ...
7,703,004 UART:
7,703,147 UART: [state] CFI Enabled
7,792,820 UART: [art] Extend RT PCRs Done
7,793,248 UART: [art] Lock RT PCRs Done
7,794,507 UART: [art] Populate DV Done
7,802,800 UART: [fht] FMC Alias Private Key: 7
7,803,740 UART: [art] Derive CDI
7,804,020 UART: [art] Store in in slot 0x4
7,889,783 UART: [art] Derive Key Pair
7,890,143 UART: [art] Store priv key in slot 0x5
7,902,987 UART: [art] Derive Key Pair - Done
7,917,560 UART: [art] Signing Cert with AUTHO
7,918,040 UART: RITY.KEYID = 7
7,933,240 UART: [art] Erasing AUTHORITY.KEYID = 7
7,934,005 UART: [art] PUB.X = CDC6E258FD5A1F6DCDD9B8488B4499AE9B64E825D5182279A3C395A0B632C80E3F96F413874BDCB0DE8B2997E5A2E6B0
7,940,786 UART: [art] PUB.Y = C60522E9278A57483635850C6D60C92E8B62305D2AE28F3929914CCD2C55FB688143B787935E6FADDDE6CCBCE58F6EB4
7,947,736 UART: [art] SIG.R = 9C5FCA7F5C9970715FAC8E1FAB18343583ED25C1E98941C530EB01214DF8DD99225FD673045B3F4E89D44B6FF3DD7697
7,954,508 UART: [art] SIG.S = B497B0EE8E2173262D21B25F43560DF74DAD08B81B59492545124704D1C1C6EDB9EEBFF455E1FEB119D62F4AB41D1705
7,978,593 UART: mbox::rt_entry...
7,978,965 UART: ____ _ _ _ ____ _____
7,979,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,980,549 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,981,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,982,085 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,982,853 UART: |_|
7,983,165 UART:
8,265,696 UART: [rt] Runtime listening for mailbox commands...
10,243,238 >>> mbox cmd response: success
10,243,238 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,256,374 UART:
10,256,390 UART: Running Caliptra FMC ...
10,256,798 UART:
10,256,941 UART: [state] CFI Enabled
10,345,806 UART: [art] Extend RT PCRs Done
10,346,234 UART: [art] Lock RT PCRs Done
10,347,271 UART: [art] Populate DV Done
10,355,254 UART: [fht] FMC Alias Private Key: 7
10,356,370 UART: [art] Derive CDI
10,356,650 UART: [art] Store in in slot 0x4
10,442,459 UART: [art] Derive Key Pair
10,442,819 UART: [art] Store priv key in slot 0x5
10,456,227 UART: [art] Derive Key Pair - Done
10,470,965 UART: [art] Signing Cert with AUTHO
10,471,445 UART: RITY.KEYID = 7
10,486,433 UART: [art] Erasing AUTHORITY.KEYID = 7
10,487,198 UART: [art] PUB.X = 9E02709AB56083728E361BEDD517679BF53782216C74679567B9AF1E89BF0FE0724A04D6F14896BD53FB591D915B5F2E
10,493,957 UART: [art] PUB.Y = 2D381572E547B67BC3929A96470C9984D5253CA38BA182A14385461B9F4714872AC5C39A80C0ED1BFDF14CF6763003D6
10,500,897 UART: [art] SIG.R = 1BF95A99924CE7A9885724D1D3D2C6C36C272900AF44231AE6882208CD2C572A247857427660AD79EB2970A1047E5793
10,507,629 UART: [art] SIG.S = 21698D4A16DFD1863D73B5188F6FF1E362014E90F5E35311E0579CEFD71EC2A7E69B9E6D513165ED15A1BC3DC3B047F4
10,531,807 UART: mbox::rt_entry...
10,532,179 UART: ____ _ _ _ ____ _____
10,532,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,533,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,534,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,535,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,536,067 UART: |_|
10,536,379 UART:
10,815,729 UART: [rt] Runtime listening for mailbox commands...
10,816,925 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.37s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,280,718 UART: [fwproc] Recv'd Img size: 78704 bytes
2,170,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,755 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,309,049 >>> mbox cmd response: success
2,309,049 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,310,208 UART: [afmc] ++
2,310,376 UART: [afmc] CDI.KEYID = 6
2,310,739 UART: [afmc] SUBJECT.KEYID = 7
2,311,165 UART: [afmc] AUTHORITY.KEYID = 5
2,346,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,529 UART: [afmc] --
2,389,457 UART: [cold-reset] --
2,390,417 UART: [state] Locking Datavault
2,391,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,230 UART: [state] Locking ICCM
2,392,782 UART: [exit] Launching FMC @ 0x40000130
2,398,111 UART:
2,398,127 UART: Running Caliptra FMC ...
2,398,535 UART:
2,398,589 UART: [state] CFI Enabled
2,409,514 UART: [fht] FMC Alias Private Key: 7
2,517,721 UART: [art] Extend RT PCRs Done
2,518,149 UART: [art] Lock RT PCRs Done
2,519,803 UART: [art] Populate DV Done
2,527,812 UART: [fht] FMC Alias Private Key: 7
2,528,748 UART: [art] Derive CDI
2,529,028 UART: [art] Store in in slot 0x4
2,614,679 UART: [art] Derive Key Pair
2,615,039 UART: [art] Store priv key in slot 0x5
2,628,487 UART: [art] Derive Key Pair - Done
2,643,343 UART: [art] Signing Cert with AUTHO
2,643,823 UART: RITY.KEYID = 7
2,659,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,260 UART: [art] PUB.X = C8005474E55201DA202A5F528A4586E3F90CAB688C8C99DDFC3E836B513D53A0F0646B6AFF802357B7EE54FA902245EF
2,667,008 UART: [art] PUB.Y = 6B37D725D159DEEBDE37F8593098F62EFFBE8687AFFF81BEFE3A5803ECFAE40C2A7B9B55EEE12156054EF181AEBB4520
2,673,973 UART: [art] SIG.R = 2B1E9D3DD895C11702A4773206B5B909405F3756ACA6B397D65B06CE4E3E1BA545731107C7EB6F56CE064CD8B58600D1
2,680,705 UART: [art] SIG.S = ED0FA44F3A29F8A9DF8983E463D5AD168A8D8FCF9C976DE493DD76F2B2D1BDF08B20FFDABDCD88096569E2C9A5E0EB1E
2,704,732 UART: mbox::rt_entry...
2,705,104 UART: ____ _ _ _ ____ _____
2,705,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,688 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,992 UART: |_|
2,709,304 UART:
2,815,072 UART: [rt] Runtime listening for mailbox commands...
2,816,259 >>> mbox cmd response data (48 bytes)
2,816,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,816,371 UART:
2,816,387 UART: Running Caliptra ROM ...
2,816,795 UART:
2,816,850 UART: [state] CFI Enabled
2,819,584 UART: [state] LifecycleState = Unprovisioned
2,820,239 UART: [state] DebugLocked = No
2,820,809 UART: [state] WD Timer not started. Device not locked for debugging
2,822,085 UART: [kat] SHA2-256
3,625,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,764 UART: [kat] ++
3,629,916 UART: [kat] sha1
3,634,278 UART: [kat] SHA2-256
3,636,218 UART: [kat] SHA2-384
3,638,921 UART: [kat] SHA2-512-ACC
3,640,821 UART: [kat] ECC-384
3,651,014 UART: [kat] HMAC-384Kdf
3,655,640 UART: [kat] LMS
3,903,952 UART: [kat] --
3,904,772 UART: [update-reset] ++
5,218,100 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,139 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,369,137 >>> mbox cmd response: success
5,369,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,369,364 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,378 UART: [update-reset Success] --
5,378,441 UART: [state] Locking Datavault
5,379,011 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,615 UART: [state] Locking ICCM
5,380,131 UART: [exit] Launching FMC @ 0x40000130
5,385,460 UART:
5,385,476 UART: Running Caliptra FMC ...
5,385,884 UART:
5,385,938 UART: [state] CFI Enabled
5,474,523 UART: [art] Extend RT PCRs Done
5,474,951 UART: [art] Lock RT PCRs Done
5,476,244 UART: [art] Populate DV Done
5,484,263 UART: [fht] FMC Alias Private Key: 7
5,485,275 UART: [art] Derive CDI
5,485,555 UART: [art] Store in in slot 0x4
5,571,166 UART: [art] Derive Key Pair
5,571,526 UART: [art] Store priv key in slot 0x5
5,584,984 UART: [art] Derive Key Pair - Done
5,599,450 UART: [art] Signing Cert with AUTHO
5,599,930 UART: RITY.KEYID = 7
5,614,870 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,635 UART: [art] PUB.X = 9DC167AEAA7FC58B02B2F00406F1D94048357811E1D600C953CA7CA85275EE1D665CF9F8DBF648E85E113A227B2F242E
5,622,382 UART: [art] PUB.Y = 3D136893F144F2EB6B30DC1CB8A14772EBA5FEB7E267F5EDB7029817445C3DD484A50EE6D98CEE69693F71E78E163E28
5,629,336 UART: [art] SIG.R = 5D4F87CB74F2E3432B6A079756F416C06A939D6EAD21798737C71B9828EA03888EA17C7A60A865D9C104C391F4D077C6
5,636,095 UART: [art] SIG.S = E9103B07627397DFD51C1240A840ADCF8F790A75D4079CA459D572A5A4D1106BD3BAF23407C4E5B03A0A09E58FA5422A
5,659,584 UART: Caliptra RT
5,659,837 UART: [state] CFI Enabled
5,941,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,972,780 UART: [rt]cmd =0x4d454153, len=108
5,993,246 >>> mbox cmd response data (12 bytes)
5,993,247 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,876 UART:
5,993,892 UART: Running Caliptra ROM ...
5,994,300 UART:
5,994,355 UART: [state] CFI Enabled
5,996,487 UART: [state] LifecycleState = Unprovisioned
5,997,142 UART: [state] DebugLocked = No
5,997,660 UART: [state] WD Timer not started. Device not locked for debugging
5,998,836 UART: [kat] SHA2-256
6,802,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,806,515 UART: [kat] ++
6,806,667 UART: [kat] sha1
6,810,713 UART: [kat] SHA2-256
6,812,653 UART: [kat] SHA2-384
6,815,496 UART: [kat] SHA2-512-ACC
6,817,396 UART: [kat] ECC-384
6,826,991 UART: [kat] HMAC-384Kdf
6,831,415 UART: [kat] LMS
7,079,727 UART: [kat] --
7,080,583 UART: [update-reset] ++
7,985,388 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,986,507 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,082,889 >>> mbox cmd response: success
8,082,889 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,083,198 UART: [update-reset] Copying MAN_2 To MAN_1
8,091,212 UART: [update-reset Success] --
8,092,365 UART: [state] Locking Datavault
8,093,107 UART: [state] Locking PCR0, PCR1 and PCR31
8,093,711 UART: [state] Locking ICCM
8,094,217 UART: [exit] Launching FMC @ 0x40000130
8,099,546 UART:
8,099,562 UART: Running Caliptra FMC ...
8,099,970 UART:
8,100,024 UART: [state] CFI Enabled
8,188,861 UART: [art] Extend RT PCRs Done
8,189,289 UART: [art] Lock RT PCRs Done
8,190,402 UART: [art] Populate DV Done
8,198,677 UART: [fht] FMC Alias Private Key: 7
8,199,849 UART: [art] Derive CDI
8,200,129 UART: [art] Store in in slot 0x4
8,285,492 UART: [art] Derive Key Pair
8,285,852 UART: [art] Store priv key in slot 0x5
8,299,580 UART: [art] Derive Key Pair - Done
8,314,118 UART: [art] Signing Cert with AUTHO
8,314,598 UART: RITY.KEYID = 7
8,330,072 UART: [art] Erasing AUTHORITY.KEYID = 7
8,330,837 UART: [art] PUB.X = 80EAB3CE355014332A7604F95DA4632BE0B05049AD318C5B174166082ECC9C2AE110026AE3D6C1531464D51189F5B84C
8,337,596 UART: [art] PUB.Y = 9C48373BE649DDCF5752C935F825C09156944827663E12C14ADC0CF31279E1F7484875B58E03DF9B005A5B29916C2E06
8,344,509 UART: [art] SIG.R = 4F226FB5FE2E4A393ABAF48366B199606B3C3419D964E28A705BB238BE402A59F15E1E0833EA2D643D6ADC0A6E55988B
8,351,281 UART: [art] SIG.S = C6E79787787162F0786F0A63D6C958F1D5506156291101ABC9402F16D67539D08E5BEF2E5D909BB23BAFFE7B90A9FB59
8,374,668 UART: mbox::rt_entry...
8,375,040 UART: ____ _ _ _ ____ _____
8,375,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,376,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,377,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,378,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,378,928 UART: |_|
8,379,240 UART:
8,658,082 UART: [rt] Runtime listening for mailbox commands...
8,659,046 UART:
8,659,062 UART: Running Caliptra ROM ...
8,659,470 UART:
8,659,525 UART: [state] CFI Enabled
8,662,079 UART: [state] LifecycleState = Unprovisioned
8,662,734 UART: [state] DebugLocked = No
8,663,460 UART: [state] WD Timer not started. Device not locked for debugging
8,664,732 UART: [kat] SHA2-256
9,468,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,472,411 UART: [kat] ++
9,472,563 UART: [kat] sha1
9,476,803 UART: [kat] SHA2-256
9,478,743 UART: [kat] SHA2-384
9,481,724 UART: [kat] SHA2-512-ACC
9,483,624 UART: [kat] ECC-384
9,492,967 UART: [kat] HMAC-384Kdf
9,497,425 UART: [kat] LMS
9,745,737 UART: [kat] --
9,746,531 UART: [update-reset] ++
10,651,534 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,652,541 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,748,923 >>> mbox cmd response: success
10,748,923 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,749,066 UART: [update-reset] Copying MAN_2 To MAN_1
10,757,080 UART: [update-reset Success] --
10,758,041 UART: [state] Locking Datavault
10,758,793 UART: [state] Locking PCR0, PCR1 and PCR31
10,759,397 UART: [state] Locking ICCM
10,759,993 UART: [exit] Launching FMC @ 0x40000130
10,765,322 UART:
10,765,338 UART: Running Caliptra FMC ...
10,765,746 UART:
10,765,800 UART: [state] CFI Enabled
10,855,009 UART: [art] Extend RT PCRs Done
10,855,437 UART: [art] Lock RT PCRs Done
10,856,618 UART: [art] Populate DV Done
10,864,941 UART: [fht] FMC Alias Private Key: 7
10,866,101 UART: [art] Derive CDI
10,866,381 UART: [art] Store in in slot 0x4
10,951,846 UART: [art] Derive Key Pair
10,952,206 UART: [art] Store priv key in slot 0x5
10,965,450 UART: [art] Derive Key Pair - Done
10,980,060 UART: [art] Signing Cert with AUTHO
10,980,540 UART: RITY.KEYID = 7
10,995,184 UART: [art] Erasing AUTHORITY.KEYID = 7
10,995,949 UART: [art] PUB.X = B40E1C2F6849AC1CA1AF86CC0D46CC0B2FE4CAF4CA1A5D14795884E2B15E4C655F1CA95F76AF442EEC5DC1272784E90D
11,002,729 UART: [art] PUB.Y = A1209D96AEE92AD1D919D3DA993CC92012D1F6F9CAB0A9964B55C4E990F7B7C1EDAD99C7586B0C491DF9CD7BF1EAE608
11,009,695 UART: [art] SIG.R = 25A8CA6A470AAD99AC384379A59038A2D434C4678F7DD86A5682B6361768DBE3486C434A57948BAA1ED0D2B8F5D847BE
11,016,468 UART: [art] SIG.S = BDA3BD6C81EE844A01E6BC910E467F632F904CBC1C4E4D492300C5DCC3B7CE1F9D9026B95608DBF63804CCFF56B67C3E
11,040,187 UART: mbox::rt_entry...
11,040,559 UART: ____ _ _ _ ____ _____
11,041,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,042,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,042,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,043,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,044,447 UART: |_|
11,044,759 UART:
11,323,599 UART: [rt] Runtime listening for mailbox commands...
11,324,795 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 ready_for_fw is high
1,055,940 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,209 >>> mbox cmd response: success
2,160,209 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,222,263 UART:
2,222,279 UART: Running Caliptra FMC ...
2,222,687 UART:
2,222,741 UART: [state] CFI Enabled
2,233,050 UART: [fht] FMC Alias Private Key: 7
2,341,133 UART: [art] Extend RT PCRs Done
2,341,561 UART: [art] Lock RT PCRs Done
2,343,365 UART: [art] Populate DV Done
2,351,580 UART: [fht] FMC Alias Private Key: 7
2,352,594 UART: [art] Derive CDI
2,352,874 UART: [art] Store in in slot 0x4
2,438,507 UART: [art] Derive Key Pair
2,438,867 UART: [art] Store priv key in slot 0x5
2,452,695 UART: [art] Derive Key Pair - Done
2,467,800 UART: [art] Signing Cert with AUTHO
2,468,280 UART: RITY.KEYID = 7
2,483,354 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,119 UART: [art] PUB.X = D369A8BA5A51CDF010174586F4DD8F015363A20BD8C43E52728BFACE5A1AC1BFA9BAC829CEBED22CA927CB3F4472696D
2,490,905 UART: [art] PUB.Y = 1E71E66488F529B8489EB9884482175E0B3545FF0668E32CD1A288691F6848DEDCBE5A658EED394D34CBCFC937993B27
2,497,851 UART: [art] SIG.R = 17C1EAD92CE7265D704F8C410CE4860E935A83BF5664C77043A74877C04AEFFF7E55CDEE58503E69CE9C4BD698008DA3
2,504,603 UART: [art] SIG.S = 6B0B77F09A376A0C1D7D86E1D1FB5FCEDD07C8E804541E4FE9A69F58B195B985A00710BB6C71E0A1E9B49CF7CD1A10F4
2,528,099 UART: mbox::rt_entry...
2,528,471 UART: ____ _ _ _ ____ _____
2,529,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,359 UART: |_|
2,532,671 UART:
2,639,387 UART: [rt] Runtime listening for mailbox commands...
2,640,574 >>> mbox cmd response data (48 bytes)
2,640,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,075,921 >>> mbox cmd response: success
5,075,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,089,143 UART:
5,089,159 UART: Running Caliptra FMC ...
5,089,567 UART:
5,089,621 UART: [state] CFI Enabled
5,179,078 UART: [art] Extend RT PCRs Done
5,179,506 UART: [art] Lock RT PCRs Done
5,180,663 UART: [art] Populate DV Done
5,188,956 UART: [fht] FMC Alias Private Key: 7
5,190,002 UART: [art] Derive CDI
5,190,282 UART: [art] Store in in slot 0x4
5,276,147 UART: [art] Derive Key Pair
5,276,507 UART: [art] Store priv key in slot 0x5
5,289,815 UART: [art] Derive Key Pair - Done
5,304,508 UART: [art] Signing Cert with AUTHO
5,304,988 UART: RITY.KEYID = 7
5,320,402 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,167 UART: [art] PUB.X = 2A9905C41BC84F9EF49601E4CB18C79AB49BD44759FC4A62E3129E9572248FB7B79BEDF20806025526E569941F6B9A73
5,327,922 UART: [art] PUB.Y = 5CD1E38FDD7A5F8D4117ADC5C86D0625AB85D33A46C5136E9F78031A4C7514C4983E62D52242490736197E3BB55EB0DF
5,334,867 UART: [art] SIG.R = D27EB8AF3319C7ABADAF2F192C4E291B777E55A491123F2D7DF78D0D2DBC02D4B4C1A1581576BC8EA49B0DFBD97E3522
5,341,648 UART: [art] SIG.S = 163AB59C340DA89271A238AA471E43917542912751BD93012A7A388DE75871764D88BB52DA831C7EDF191F948FF1D8C0
5,365,603 UART: Caliptra RT
5,365,856 UART: [state] CFI Enabled
5,649,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,680,577 UART: [rt]cmd =0x4d454153, len=108
5,701,435 >>> mbox cmd response data (12 bytes)
5,701,436 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,674,249 >>> mbox cmd response: success
7,674,249 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,687,519 UART:
7,687,535 UART: Running Caliptra FMC ...
7,687,943 UART:
7,687,997 UART: [state] CFI Enabled
7,776,826 UART: [art] Extend RT PCRs Done
7,777,254 UART: [art] Lock RT PCRs Done
7,778,405 UART: [art] Populate DV Done
7,786,570 UART: [fht] FMC Alias Private Key: 7
7,787,614 UART: [art] Derive CDI
7,787,894 UART: [art] Store in in slot 0x4
7,873,923 UART: [art] Derive Key Pair
7,874,283 UART: [art] Store priv key in slot 0x5
7,886,861 UART: [art] Derive Key Pair - Done
7,902,162 UART: [art] Signing Cert with AUTHO
7,902,642 UART: RITY.KEYID = 7
7,918,036 UART: [art] Erasing AUTHORITY.KEYID = 7
7,918,801 UART: [art] PUB.X = 4AE0E4D40F3AADC97F264DD7B774B1610E69EFE0035C10FB2ACD4A26F3C17F03DBA451EC30AFE5F635404114DC2F4086
7,925,577 UART: [art] PUB.Y = B9655C1115498188AB849240151A17CB33F2376D6D4FBE6F864BA1428622BADA5698DC57ED647CBA40A65A7B64083407
7,932,519 UART: [art] SIG.R = ACAEB8ECCBF8EC0F35850F3C3F3BCBCE323ECCEEFF53B532A1CD6FC80A6B4570BF2972BA97B5D0071A4515DFE7FA9A66
7,939,313 UART: [art] SIG.S = 9199561614F0AC918394AD63D09FA06703066E1AC0CD654210EE0BDB07EBC3B682A02E541F1304CE6162883AEDB7F547
7,963,469 UART: mbox::rt_entry...
7,963,841 UART: ____ _ _ _ ____ _____
7,964,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,965,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,966,193 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,966,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,967,729 UART: |_|
7,968,041 UART:
8,249,202 UART: [rt] Runtime listening for mailbox commands...
10,221,490 >>> mbox cmd response: success
10,221,490 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,234,898 UART:
10,234,914 UART: Running Caliptra FMC ...
10,235,322 UART:
10,235,376 UART: [state] CFI Enabled
10,323,975 UART: [art] Extend RT PCRs Done
10,324,403 UART: [art] Lock RT PCRs Done
10,325,398 UART: [art] Populate DV Done
10,333,461 UART: [fht] FMC Alias Private Key: 7
10,334,529 UART: [art] Derive CDI
10,334,809 UART: [art] Store in in slot 0x4
10,420,574 UART: [art] Derive Key Pair
10,420,934 UART: [art] Store priv key in slot 0x5
10,433,874 UART: [art] Derive Key Pair - Done
10,448,626 UART: [art] Signing Cert with AUTHO
10,449,106 UART: RITY.KEYID = 7
10,463,986 UART: [art] Erasing AUTHORITY.KEYID = 7
10,464,751 UART: [art] PUB.X = 6121E64377B78AFE8045E860A7F9E70771CAD502449A86E446CDDACAC6901F55721F7BEF969E04EEBADA038D43932484
10,471,515 UART: [art] PUB.Y = 73E110F39A0125F1022605C86E0F37C4B706AF63C9C6B2AAFB4A35635CFCA47EDA1ACD312676DF18ACE1EB778AC226C0
10,478,466 UART: [art] SIG.R = 4113BFBA18AD099BA7B36D162DC36A0FDDC45D0C8432AE5E4F9E9546B709CA4DF91C7BAECD3FF8251E6A3B330749C34E
10,485,243 UART: [art] SIG.S = 27711CA8FD1C1204AF07011CB640BE1FC225FE611B4BA14EDC2D9F5BFBFFAD1575367D980A5C7BF541573DA00D0B5346
10,508,978 UART: mbox::rt_entry...
10,509,350 UART: ____ _ _ _ ____ _____
10,510,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,510,934 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,511,702 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,512,470 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,513,238 UART: |_|
10,513,550 UART:
10,790,860 UART: [rt] Runtime listening for mailbox commands...
10,792,056 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.31s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,569 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,894 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,276 >>> mbox cmd response: success
2,312,276 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,313,353 UART: [afmc] ++
2,313,521 UART: [afmc] CDI.KEYID = 6
2,313,884 UART: [afmc] SUBJECT.KEYID = 7
2,314,310 UART: [afmc] AUTHORITY.KEYID = 5
2,349,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,718 UART: [afmc] --
2,392,668 UART: [cold-reset] --
2,393,678 UART: [state] Locking Datavault
2,394,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,339 UART: [state] Locking ICCM
2,395,801 UART: [exit] Launching FMC @ 0x40000130
2,401,130 UART:
2,401,146 UART: Running Caliptra FMC ...
2,401,554 UART:
2,401,697 UART: [state] CFI Enabled
2,412,114 UART: [fht] FMC Alias Private Key: 7
2,520,041 UART: [art] Extend RT PCRs Done
2,520,469 UART: [art] Lock RT PCRs Done
2,521,893 UART: [art] Populate DV Done
2,530,134 UART: [fht] FMC Alias Private Key: 7
2,531,074 UART: [art] Derive CDI
2,531,354 UART: [art] Store in in slot 0x4
2,617,459 UART: [art] Derive Key Pair
2,617,819 UART: [art] Store priv key in slot 0x5
2,630,733 UART: [art] Derive Key Pair - Done
2,645,562 UART: [art] Signing Cert with AUTHO
2,646,042 UART: RITY.KEYID = 7
2,660,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,421 UART: [art] PUB.X = CF5B31FF65DF39C5A7857C771E00F2501B43FF801FA2136524ED68EE3B7F8350312E6A477EBEA87AEC9F255D1B0BBF2B
2,668,182 UART: [art] PUB.Y = 00C3E2DC45B9CCF767C81D029AF97772A4AC831FB18E69DFA6DF4D0532B1E2094B88EB41EE6CF9F58F70183DEA192E17
2,675,117 UART: [art] SIG.R = 29874E116D4D415C390909DCF6F8792E9CBD7B302945D94E212BD327E3467D4E7D7A9DDA702837EED8ECF8E58C3EBF41
2,681,891 UART: [art] SIG.S = 5BEFB20521DB4F15E64446D1F9D2390B7E63600C1C96B5DA4BBCA1DAED2AD4DB592CA4E72B1621A345970F8E0B57C4D2
2,705,787 UART: mbox::rt_entry...
2,706,159 UART: ____ _ _ _ ____ _____
2,706,943 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,743 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,279 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,047 UART: |_|
2,710,359 UART:
2,816,947 UART: [rt] Runtime listening for mailbox commands...
2,818,134 >>> mbox cmd response data (48 bytes)
2,818,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,246 UART:
2,818,262 UART: Running Caliptra ROM ...
2,818,670 UART:
2,818,812 UART: [state] CFI Enabled
2,821,856 UART: [state] LifecycleState = Unprovisioned
2,822,511 UART: [state] DebugLocked = No
2,823,015 UART: [state] WD Timer not started. Device not locked for debugging
2,824,125 UART: [kat] SHA2-256
3,627,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,804 UART: [kat] ++
3,631,956 UART: [kat] sha1
3,636,362 UART: [kat] SHA2-256
3,638,302 UART: [kat] SHA2-384
3,641,115 UART: [kat] SHA2-512-ACC
3,643,015 UART: [kat] ECC-384
3,652,538 UART: [kat] HMAC-384Kdf
3,657,264 UART: [kat] LMS
3,905,576 UART: [kat] --
3,906,136 UART: [update-reset] ++
5,219,292 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,443 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,370,441 >>> mbox cmd response: success
5,370,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,370,780 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,794 UART: [update-reset Success] --
5,379,847 UART: [state] Locking Datavault
5,380,635 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,239 UART: [state] Locking ICCM
5,381,873 UART: [exit] Launching FMC @ 0x40000130
5,387,202 UART:
5,387,218 UART: Running Caliptra FMC ...
5,387,626 UART:
5,387,769 UART: [state] CFI Enabled
5,477,302 UART: [art] Extend RT PCRs Done
5,477,730 UART: [art] Lock RT PCRs Done
5,478,903 UART: [art] Populate DV Done
5,487,212 UART: [fht] FMC Alias Private Key: 7
5,488,304 UART: [art] Derive CDI
5,488,584 UART: [art] Store in in slot 0x4
5,574,333 UART: [art] Derive Key Pair
5,574,693 UART: [art] Store priv key in slot 0x5
5,588,359 UART: [art] Derive Key Pair - Done
5,603,015 UART: [art] Signing Cert with AUTHO
5,603,495 UART: RITY.KEYID = 7
5,619,115 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,880 UART: [art] PUB.X = 42940FD7922F1C4492A95761A8D2668207B384964477894A27A84D414F8FE70E8676F8E9FE0C99E1655F34CFD22BDBB2
5,626,634 UART: [art] PUB.Y = CE33530C92F4C4A62BCC0A242E011B91CEC63223F1A2A9C61A37841F0FB1EAEA77C5B6359E0863B6297A60E3BCFB4582
5,633,581 UART: [art] SIG.R = B2495876ADA3A5E034C87454C99F757E9332994102F67EB4CA036459E7299CA987E876BCFC787AC803A9395FDBD20E20
5,640,339 UART: [art] SIG.S = F766F2D97ED0077813EFA644D40EB779D0A761D1AA7C1C5EF1D9D1C11291B04A474681BB86B4F4D8ADFC2D7F07A131D6
5,664,583 UART: Caliptra RT
5,664,928 UART: [state] CFI Enabled
5,947,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,378 UART: [rt]cmd =0x4d454153, len=108
5,998,512 >>> mbox cmd response data (12 bytes)
5,998,513 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,168 UART:
5,999,184 UART: Running Caliptra ROM ...
5,999,592 UART:
5,999,734 UART: [state] CFI Enabled
6,002,532 UART: [state] LifecycleState = Unprovisioned
6,003,187 UART: [state] DebugLocked = No
6,003,683 UART: [state] WD Timer not started. Device not locked for debugging
6,004,849 UART: [kat] SHA2-256
6,808,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,812,528 UART: [kat] ++
6,812,680 UART: [kat] sha1
6,816,974 UART: [kat] SHA2-256
6,818,914 UART: [kat] SHA2-384
6,821,825 UART: [kat] SHA2-512-ACC
6,823,725 UART: [kat] ECC-384
6,833,804 UART: [kat] HMAC-384Kdf
6,838,380 UART: [kat] LMS
7,086,692 UART: [kat] --
7,087,754 UART: [update-reset] ++
7,992,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,993,378 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,089,760 >>> mbox cmd response: success
8,089,760 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,090,097 UART: [update-reset] Copying MAN_2 To MAN_1
8,098,111 UART: [update-reset Success] --
8,099,104 UART: [state] Locking Datavault
8,100,066 UART: [state] Locking PCR0, PCR1 and PCR31
8,100,670 UART: [state] Locking ICCM
8,101,132 UART: [exit] Launching FMC @ 0x40000130
8,106,461 UART:
8,106,477 UART: Running Caliptra FMC ...
8,106,885 UART:
8,107,028 UART: [state] CFI Enabled
8,196,173 UART: [art] Extend RT PCRs Done
8,196,601 UART: [art] Lock RT PCRs Done
8,197,690 UART: [art] Populate DV Done
8,205,699 UART: [fht] FMC Alias Private Key: 7
8,206,721 UART: [art] Derive CDI
8,207,001 UART: [art] Store in in slot 0x4
8,292,666 UART: [art] Derive Key Pair
8,293,026 UART: [art] Store priv key in slot 0x5
8,306,406 UART: [art] Derive Key Pair - Done
8,321,143 UART: [art] Signing Cert with AUTHO
8,321,623 UART: RITY.KEYID = 7
8,337,421 UART: [art] Erasing AUTHORITY.KEYID = 7
8,338,186 UART: [art] PUB.X = C255EF66CCB6585CC16321878F0B258445B76F68A6AF98F79998635B447A60B6BA673887AC1753487D05A11EFA471A8F
8,344,948 UART: [art] PUB.Y = E9271EC5278449F0293A1A548853BA2FED4F0717B9C3CA900C4D5BCCD643AA7BB0B61F3E47B1EF0E667151B8051EFB0D
8,351,897 UART: [art] SIG.R = C5443F48D1EAC23E6F4894C10D1BD802E687C92E7D5AC9EA16C0E4FDBB0308DD9823C1FC165017ED928146C0A50C0BB9
8,358,663 UART: [art] SIG.S = CF5398B88004F0FFC0AA49032FFA59B510BCF84B3A6A8DB4954F8DC02C168CCDF8E08F5ADBAC94721500D3A875536672
8,382,754 UART: mbox::rt_entry...
8,383,126 UART: ____ _ _ _ ____ _____
8,383,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,384,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,385,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,386,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,387,014 UART: |_|
8,387,326 UART:
8,666,843 UART: [rt] Runtime listening for mailbox commands...
8,667,807 UART:
8,667,823 UART: Running Caliptra ROM ...
8,668,231 UART:
8,668,373 UART: [state] CFI Enabled
8,670,893 UART: [state] LifecycleState = Unprovisioned
8,671,548 UART: [state] DebugLocked = No
8,672,082 UART: [state] WD Timer not started. Device not locked for debugging
8,673,354 UART: [kat] SHA2-256
9,476,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,481,033 UART: [kat] ++
9,481,185 UART: [kat] sha1
9,485,485 UART: [kat] SHA2-256
9,487,425 UART: [kat] SHA2-384
9,490,230 UART: [kat] SHA2-512-ACC
9,492,130 UART: [kat] ECC-384
9,501,685 UART: [kat] HMAC-384Kdf
9,506,189 UART: [kat] LMS
9,754,501 UART: [kat] --
9,755,099 UART: [update-reset] ++
10,657,912 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,659,089 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,755,471 >>> mbox cmd response: success
10,755,471 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,755,656 UART: [update-reset] Copying MAN_2 To MAN_1
10,763,670 UART: [update-reset Success] --
10,764,603 UART: [state] Locking Datavault
10,765,527 UART: [state] Locking PCR0, PCR1 and PCR31
10,766,131 UART: [state] Locking ICCM
10,766,591 UART: [exit] Launching FMC @ 0x40000130
10,771,920 UART:
10,771,936 UART: Running Caliptra FMC ...
10,772,344 UART:
10,772,487 UART: [state] CFI Enabled
10,861,796 UART: [art] Extend RT PCRs Done
10,862,224 UART: [art] Lock RT PCRs Done
10,863,439 UART: [art] Populate DV Done
10,871,592 UART: [fht] FMC Alias Private Key: 7
10,872,754 UART: [art] Derive CDI
10,873,034 UART: [art] Store in in slot 0x4
10,958,713 UART: [art] Derive Key Pair
10,959,073 UART: [art] Store priv key in slot 0x5
10,972,195 UART: [art] Derive Key Pair - Done
10,987,183 UART: [art] Signing Cert with AUTHO
10,987,663 UART: RITY.KEYID = 7
11,002,919 UART: [art] Erasing AUTHORITY.KEYID = 7
11,003,684 UART: [art] PUB.X = 00F1794CAA99B2D69B97B8C7C3B608F96E5B67CD31A42B4AD3D66E77F513E486B988F2A4C1023EFC7E86904BA7A2B4BB
11,010,440 UART: [art] PUB.Y = 56CEBD2727754DD05B07E20EB12DC343533BE178E9344D3F2E074CE3FB7C6085447ADC44DF968C8BC7DD621D83D8FB6D
11,017,395 UART: [art] SIG.R = EDCF974BC4F3EE76DAF4107C9AF9AF193177F70F622948C4F70468660DE6A9668A970352AF7CE75962AC91D419D19E4F
11,024,161 UART: [art] SIG.S = 984E7EA127D145A0989E080891B6C1F853C5F3052B84D00829402CB3479C1D99D61C8FB85A2319140E837560AB2C7424
11,048,025 UART: mbox::rt_entry...
11,048,397 UART: ____ _ _ _ ____ _____
11,049,181 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,049,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,050,749 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,051,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,052,285 UART: |_|
11,052,597 UART:
11,335,772 UART: [rt] Runtime listening for mailbox commands...
11,336,968 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,643 ready_for_fw is high
1,056,643 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,788 >>> mbox cmd response: success
2,159,788 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,222,434 UART:
2,222,450 UART: Running Caliptra FMC ...
2,222,858 UART:
2,223,001 UART: [state] CFI Enabled
2,233,732 UART: [fht] FMC Alias Private Key: 7
2,341,611 UART: [art] Extend RT PCRs Done
2,342,039 UART: [art] Lock RT PCRs Done
2,343,235 UART: [art] Populate DV Done
2,351,610 UART: [fht] FMC Alias Private Key: 7
2,352,630 UART: [art] Derive CDI
2,352,910 UART: [art] Store in in slot 0x4
2,438,409 UART: [art] Derive Key Pair
2,438,769 UART: [art] Store priv key in slot 0x5
2,452,301 UART: [art] Derive Key Pair - Done
2,467,049 UART: [art] Signing Cert with AUTHO
2,467,529 UART: RITY.KEYID = 7
2,482,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,642 UART: [art] PUB.X = FF8131E89EB938C3876A4C21584F49381A741D6221D10861B4F4CBEEA1A2A78B4487A6218E7851397BD4F7A06C0807BB
2,490,403 UART: [art] PUB.Y = 86CB36F3BE246207A0F7A39BAFF003A3C00B5F394CA74A0AF400277DC8D8D2B1BB28E5143E9B6545536F50E6B9CC9136
2,497,329 UART: [art] SIG.R = 73157E42A2D3040330EB546CB7FA581AE5CD4BBC8509D4025829D161BED43A04123E43787B16C301140F3EA5AAE930C1
2,504,080 UART: [art] SIG.S = E91B67994ADF98183A3DDFEA730B23539CA4A4007A51D0BE59686A3C6B51D8E15ECDD8B8A48D4B259BECFB40811504A3
2,528,109 UART: mbox::rt_entry...
2,528,481 UART: ____ _ _ _ ____ _____
2,529,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,369 UART: |_|
2,532,681 UART:
2,639,701 UART: [rt] Runtime listening for mailbox commands...
2,640,888 >>> mbox cmd response data (48 bytes)
2,640,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,074,668 >>> mbox cmd response: success
5,074,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,087,626 UART:
5,087,642 UART: Running Caliptra FMC ...
5,088,050 UART:
5,088,193 UART: [state] CFI Enabled
5,177,112 UART: [art] Extend RT PCRs Done
5,177,540 UART: [art] Lock RT PCRs Done
5,178,633 UART: [art] Populate DV Done
5,187,106 UART: [fht] FMC Alias Private Key: 7
5,188,066 UART: [art] Derive CDI
5,188,346 UART: [art] Store in in slot 0x4
5,274,433 UART: [art] Derive Key Pair
5,274,793 UART: [art] Store priv key in slot 0x5
5,288,661 UART: [art] Derive Key Pair - Done
5,303,800 UART: [art] Signing Cert with AUTHO
5,304,280 UART: RITY.KEYID = 7
5,319,490 UART: [art] Erasing AUTHORITY.KEYID = 7
5,320,255 UART: [art] PUB.X = 0817A83BE797B33D556EDDA1B0FAAEA5C5F525E76E64CDF25B76CECCDA36A6D83539E7C41640565B44889851C25E684D
5,327,034 UART: [art] PUB.Y = 3DCE3164D31FD6BF3EA30C6DEA590619C941DEF4DB2F0FC949A11B1B6C45F2ABC05F86B2AE8858C4EE186A85E0BD6E4C
5,334,001 UART: [art] SIG.R = 831C7E813A9C9BED38268FD800C51B3C223F1278A3119C97C311F9D38CBC04D453ADB2E7A010875201DE4C8E98B62B86
5,340,747 UART: [art] SIG.S = 8C65472AED437C14E0EFFCB3588A48E971AF9C79E55AFEE12A69356E6168216332D0E307173BC14E93CDE04341497F46
5,364,777 UART: Caliptra RT
5,365,122 UART: [state] CFI Enabled
5,643,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,674,788 UART: [rt]cmd =0x4d454153, len=108
5,695,486 >>> mbox cmd response data (12 bytes)
5,695,487 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,667,489 >>> mbox cmd response: success
7,667,489 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,680,849 UART:
7,680,865 UART: Running Caliptra FMC ...
7,681,273 UART:
7,681,416 UART: [state] CFI Enabled
7,770,829 UART: [art] Extend RT PCRs Done
7,771,257 UART: [art] Lock RT PCRs Done
7,772,348 UART: [art] Populate DV Done
7,780,829 UART: [fht] FMC Alias Private Key: 7
7,781,787 UART: [art] Derive CDI
7,782,067 UART: [art] Store in in slot 0x4
7,867,812 UART: [art] Derive Key Pair
7,868,172 UART: [art] Store priv key in slot 0x5
7,881,360 UART: [art] Derive Key Pair - Done
7,896,344 UART: [art] Signing Cert with AUTHO
7,896,824 UART: RITY.KEYID = 7
7,912,240 UART: [art] Erasing AUTHORITY.KEYID = 7
7,913,005 UART: [art] PUB.X = 672D9FD5CB17AD5EF2A4C45257380081DDBE6555055F4FD65A0EC393B8426EC7EA8F99BAE67E4FB3014A0C905ED0340D
7,919,752 UART: [art] PUB.Y = B22B6D29EBAB48D0930146AEA405EDA077EB07C927B22A725CB27858D7FB693361FCF1B3673E771AB064704A072DF46F
7,926,698 UART: [art] SIG.R = 982F8723ED38BE14E620611C62F29016B13347771AD860E4CCD7BB761588ADCA46CDCEC6D871F6DCEBC00CB7175B9CDA
7,933,481 UART: [art] SIG.S = B923E0AD346384A6DF63788E1528084C3BCB1325677787A08B294AB903A0A8263ACF2109DF4BA64F9C07372C7CC3BE31
7,957,002 UART: mbox::rt_entry...
7,957,374 UART: ____ _ _ _ ____ _____
7,958,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,958,958 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,959,726 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,961,262 UART: |_|
7,961,574 UART:
8,239,825 UART: [rt] Runtime listening for mailbox commands...
10,211,766 >>> mbox cmd response: success
10,211,766 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,225,238 UART:
10,225,254 UART: Running Caliptra FMC ...
10,225,662 UART:
10,225,805 UART: [state] CFI Enabled
10,315,246 UART: [art] Extend RT PCRs Done
10,315,674 UART: [art] Lock RT PCRs Done
10,316,749 UART: [art] Populate DV Done
10,324,808 UART: [fht] FMC Alias Private Key: 7
10,325,984 UART: [art] Derive CDI
10,326,264 UART: [art] Store in in slot 0x4
10,411,785 UART: [art] Derive Key Pair
10,412,145 UART: [art] Store priv key in slot 0x5
10,425,675 UART: [art] Derive Key Pair - Done
10,440,640 UART: [art] Signing Cert with AUTHO
10,441,120 UART: RITY.KEYID = 7
10,456,186 UART: [art] Erasing AUTHORITY.KEYID = 7
10,456,951 UART: [art] PUB.X = A714CCB168A74EEA1CB19F4703BECEF6642492D83E0EBF4F81619FB0E58F33D4A63E3CBE6EAD1D25CBCBB0C926E4B8F1
10,463,743 UART: [art] PUB.Y = CE77596D25E952574FE8D7189471BE959DF9E5F87608770CC4866992D6BBA9EEBECD90613203C6BB5B778C4965F74E25
10,470,686 UART: [art] SIG.R = 02DBED1FD382F8342F6A3075400C3FACA30ACEDD45586B28DF47E24E1F651875A4F50A579A602594307734939DAC27D8
10,477,448 UART: [art] SIG.S = B213034B4922B603DBE58A68EDC6928BC3A5CD8936D47AA8510140C626535209922D89B5396D09129C997A3DE829F2C2
10,501,260 UART: mbox::rt_entry...
10,501,632 UART: ____ _ _ _ ____ _____
10,502,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,503,216 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,503,984 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,504,752 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,505,520 UART: |_|
10,505,832 UART:
10,783,098 UART: [rt] Runtime listening for mailbox commands...
10,784,294 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,110 UART:
192,461 UART: Running Caliptra ROM ...
193,647 UART:
193,805 UART: [state] CFI Enabled
263,986 UART: [state] LifecycleState = Unprovisioned
265,957 UART: [state] DebugLocked = No
268,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,237 UART: [kat] SHA2-256
441,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,440 UART: [kat] ++
453,045 UART: [kat] sha1
463,432 UART: [kat] SHA2-256
466,088 UART: [kat] SHA2-384
473,073 UART: [kat] SHA2-512-ACC
475,443 UART: [kat] ECC-384
2,768,685 UART: [kat] HMAC-384Kdf
2,781,128 UART: [kat] LMS
3,971,432 UART: [kat] --
3,975,425 UART: [cold-reset] ++
3,976,571 UART: [fht] Storing FHT @ 0x50003400
3,988,330 UART: [idev] ++
3,988,901 UART: [idev] CDI.KEYID = 6
3,989,836 UART: [idev] SUBJECT.KEYID = 7
3,991,109 UART: [idev] UDS.KEYID = 0
3,992,167 ready_for_fw is high
3,992,377 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,979 UART: [idev] Erasing UDS.KEYID = 0
7,327,182 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,072 UART: [idev] --
7,353,095 UART: [ldev] ++
7,353,720 UART: [ldev] CDI.KEYID = 6
7,354,633 UART: [ldev] SUBJECT.KEYID = 5
7,355,842 UART: [ldev] AUTHORITY.KEYID = 7
7,357,124 UART: [ldev] FE.KEYID = 1
7,404,557 UART: [ldev] Erasing FE.KEYID = 1
10,736,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,400 UART: [ldev] --
13,095,388 UART: [fwproc] Waiting for Commands...
13,098,028 UART: [fwproc] Received command 0x46574c44
13,100,211 UART: [fwproc] Received Image of size 114124 bytes
17,155,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,609,163 >>> mbox cmd response: success
17,613,519 UART: [afmc] ++
17,614,113 UART: [afmc] CDI.KEYID = 6
17,614,997 UART: [afmc] SUBJECT.KEYID = 7
17,616,265 UART: [afmc] AUTHORITY.KEYID = 5
20,990,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,466 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,886 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,667 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,109 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,300 UART: [afmc] --
23,358,783 UART: [cold-reset] --
23,362,698 UART: [state] Locking Datavault
23,367,894 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,641 UART: [state] Locking ICCM
23,372,334 UART: [exit] Launching FMC @ 0x40000130
23,380,729 UART:
23,380,964 UART: Running Caliptra FMC ...
23,382,066 UART:
23,382,230 UART: [state] CFI Enabled
23,447,787 UART: [fht] FMC Alias Private Key: 7
25,786,292 UART: [art] Extend RT PCRs Done
25,787,506 UART: [art] Lock RT PCRs Done
25,788,960 UART: [art] Populate DV Done
25,794,427 UART: [fht] FMC Alias Private Key: 7
25,796,136 UART: [art] Derive CDI
25,796,877 UART: [art] Store in in slot 0x4
25,855,975 UART: [art] Derive Key Pair
25,856,987 UART: [art] Store priv key in slot 0x5
29,150,528 UART: [art] Derive Key Pair - Done
29,163,339 UART: [art] Signing Cert with AUTHO
29,164,662 UART: RITY.KEYID = 7
31,452,225 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,726 UART: [art] PUB.X = 16E63192ED1E49663A8B7F40084D7B573504169D20E9292621C26F8946E82A289F68591CF3727C163A9CE8160A38B22C
31,460,942 UART: [art] PUB.Y = C052353EF5F0CD004BAFDE663092C4B48F2BA39E545BEE01E70F996DE24517B373AC66392479282DB3B4D32753FA66E4
31,468,184 UART: [art] SIG.R = 3E31EAF8C959FB1D7C2ED056DA60942A75ED28C581150AD4978516F594738379531487858E392675CF752B8DB13EBFF2
31,475,530 UART: [art] SIG.S = 88C92BE69FCA31F6192545F241ACC0589F55E041C6F5676D9DCA47E92B16D6EAF4B2C753C6F68A97EF53E299EBAFB739
32,780,273 UART: Caliptra RT
32,780,987 UART: [state] CFI Enabled
32,943,135 UART: [rt] RT listening for mailbox commands...
32,945,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,976,289 UART: [rt]cmd =0x4d454153, len=108
32,995,077 >>> mbox cmd response data (12 bytes)
35,120,540 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,221,207 UART:
35,221,566 UART: Running Caliptra ROM ...
35,222,665 UART:
35,222,823 UART: [state] CFI Enabled
35,293,108 UART: [state] LifecycleState = Unprovisioned
35,295,046 UART: [state] DebugLocked = No
35,296,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,300,773 UART: [kat] SHA2-256
35,470,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,480,980 UART: [kat] ++
35,481,519 UART: [kat] sha1
35,492,575 UART: [kat] SHA2-256
35,495,267 UART: [kat] SHA2-384
35,501,140 UART: [kat] SHA2-512-ACC
35,503,483 UART: [kat] ECC-384
37,798,294 UART: [kat] HMAC-384Kdf
37,827,829 UART: [kat] LMS
39,018,146 UART: [kat] --
39,024,702 UART: [update-reset] ++
42,734,711 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,738,646 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,997,108 >>> mbox cmd response: success
42,997,610 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,998,149 UART: [update-reset] Copying MAN_2 To MAN_1
43,020,592 UART: [update-reset Success] --
43,023,262 UART: [state] Locking Datavault
43,026,676 UART: [state] Locking PCR0, PCR1 and PCR31
43,028,431 UART: [state] Locking ICCM
43,031,021 UART: [exit] Launching FMC @ 0x40000130
43,039,427 UART:
43,039,666 UART: Running Caliptra FMC ...
43,040,768 UART:
43,040,926 UART: [state] CFI Enabled
43,131,294 UART: [art] Extend RT PCRs Done
43,132,477 UART: [art] Lock RT PCRs Done
43,133,929 UART: [art] Populate DV Done
43,139,443 UART: [fht] FMC Alias Private Key: 7
43,141,173 UART: [art] Derive CDI
43,141,987 UART: [art] Store in in slot 0x4
43,200,099 UART: [art] Derive Key Pair
43,201,140 UART: [art] Store priv key in slot 0x5
46,494,949 UART: [art] Derive Key Pair - Done
46,507,781 UART: [art] Signing Cert with AUTHO
46,509,077 UART: RITY.KEYID = 7
48,796,233 UART: [art] Erasing AUTHORITY.KEYID = 7
48,797,732 UART: [art] PUB.X = 6DDAAB76D70BCD51CA20E2A980BAAFA07C050CF0E61804C199402EC098DA3158571C3200EE272283FEDE70BFE235E141
48,805,001 UART: [art] PUB.Y = 1CB2755E4DE13356FE50516AE7653B2892A91412E43296B564A4A05A466FD7B5829B1BF29A9754FD39039B586735ACF7
48,812,188 UART: [art] SIG.R = 374E7C96C67C658B373AA9CB20B46A24BCA97B8C07AFA6ED72CA6CF887BD6D80343D4F83672053B11EC036085555B3DF
48,819,584 UART: [art] SIG.S = A6709EFA3646C19F3FC4BFA4B9A880951987A44013274BA708DF0179F733B176C77DF073D262BC390563A6C628939DBE
50,124,574 UART: mbox::rt_entry...
50,125,526 UART: ____ _ _ _ ____ _____
50,127,506 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,129,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,131,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,133,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,135,315 UART: |_|
50,136,150 UART:
50,416,598 UART: [rt] Runtime listening for mailbox commands...
50,418,715 >>> mbox cmd response data (48 bytes)
50,419,293 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,421,643 >>> mbox cmd response data (48 bytes)
50,422,533 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,436,402 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,805,613 ready_for_fw is high
3,806,006 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,452 >>> mbox cmd response: success
23,565,877 UART:
23,566,261 UART: Running Caliptra FMC ...
23,567,364 UART:
23,567,522 UART: [state] CFI Enabled
23,637,148 UART: [fht] FMC Alias Private Key: 7
25,974,923 UART: [art] Extend RT PCRs Done
25,976,152 UART: [art] Lock RT PCRs Done
25,977,729 UART: [art] Populate DV Done
25,983,037 UART: [fht] FMC Alias Private Key: 7
25,984,696 UART: [art] Derive CDI
25,985,516 UART: [art] Store in in slot 0x4
26,045,634 UART: [art] Derive Key Pair
26,046,652 UART: [art] Store priv key in slot 0x5
29,339,649 UART: [art] Derive Key Pair - Done
29,352,507 UART: [art] Signing Cert with AUTHO
29,353,852 UART: RITY.KEYID = 7
31,641,464 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,968 UART: [art] PUB.X = 72B73905C8A45B5B15FC160169884C1DCD6125BEB7F8E15AAA0D1C3B01838EC760BCBB48B47D32DE4E01A693972A329C
31,650,217 UART: [art] PUB.Y = 41E2B92AE972F28770F87D58085A120279B18BD30B2577213C541327C0E33D54AC9F9227095A86D421DEAE6706E51885
31,657,455 UART: [art] SIG.R = DFA78734C830ED2EA5FA05CFFAF775B4CF891069814CDEF4DB07DB398FE1BB08F0AAD29B7CC0F792A4DC5DC17568EC35
31,664,846 UART: [art] SIG.S = FEE67E1921F2B2FB0FBD32BB23164DF5D8A6B016B61B861F7356099EF9ED7582F162295B975EF223E0B55C597EDC66F0
32,969,811 UART: Caliptra RT
32,970,521 UART: [state] CFI Enabled
33,132,295 UART: [rt] RT listening for mailbox commands...
33,134,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,165,172 UART: [rt]cmd =0x4d454153, len=108
33,183,367 >>> mbox cmd response data (12 bytes)
35,310,300 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,292,257 >>> mbox cmd response: success
43,292,730 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,326,086 UART:
43,326,374 UART: Running Caliptra FMC ...
43,327,488 UART:
43,327,654 UART: [state] CFI Enabled
43,426,684 UART: [art] Extend RT PCRs Done
43,427,889 UART: [art] Lock RT PCRs Done
43,429,390 UART: [art] Populate DV Done
43,435,074 UART: [fht] FMC Alias Private Key: 7
43,436,663 UART: [art] Derive CDI
43,437,477 UART: [art] Store in in slot 0x4
43,495,792 UART: [art] Derive Key Pair
43,496,788 UART: [art] Store priv key in slot 0x5
46,789,131 UART: [art] Derive Key Pair - Done
46,802,134 UART: [art] Signing Cert with AUTHO
46,803,448 UART: RITY.KEYID = 7
49,091,961 UART: [art] Erasing AUTHORITY.KEYID = 7
49,093,478 UART: [art] PUB.X = C6D4CE8E0B000106385F1CA7574763A54C37C24DD119E3B49732B33E818ADDF959F99B2AA495F3D3A1FC78F5BE3E7CF7
49,100,732 UART: [art] PUB.Y = D9530C90233DD7789B1B6225B37093591A81F037D76EA6ED51915E4B76C74F848010B99CF63F7697C6010D04714E7198
49,107,955 UART: [art] SIG.R = 24B085A24DF7A49B2BE5AFB5CC45784D43255D1D3326AE7F8FE1831342960536B29E59BB294517210CDBF31AD779A25C
49,115,356 UART: [art] SIG.S = 4A75A519F1523EAF4BBD72837B4D63D0BB175E0875AFBC4EC32D9CCB21C140E44771070B1355BFC4240BBA9C3FDC22F1
50,420,200 UART: mbox::rt_entry...
50,421,166 UART: ____ _ _ _ ____ _____
50,423,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,425,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,427,101 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,429,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,430,895 UART: |_|
50,431,784 UART:
50,711,843 UART: [rt] Runtime listening for mailbox commands...
50,713,984 >>> mbox cmd response data (48 bytes)
50,714,546 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,716,866 >>> mbox cmd response data (48 bytes)
50,717,767 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,731,609 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,495 UART:
192,916 UART: Running Caliptra ROM ...
194,025 UART:
603,580 UART: [state] CFI Enabled
617,122 UART: [state] LifecycleState = Unprovisioned
619,071 UART: [state] DebugLocked = No
621,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,922 UART: [kat] SHA2-256
795,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,240 UART: [kat] ++
806,709 UART: [kat] sha1
816,794 UART: [kat] SHA2-256
819,507 UART: [kat] SHA2-384
825,204 UART: [kat] SHA2-512-ACC
827,634 UART: [kat] ECC-384
3,111,885 UART: [kat] HMAC-384Kdf
3,124,187 UART: [kat] LMS
4,314,245 UART: [kat] --
4,317,802 UART: [cold-reset] ++
4,319,587 UART: [fht] Storing FHT @ 0x50003400
4,330,990 UART: [idev] ++
4,331,627 UART: [idev] CDI.KEYID = 6
4,332,551 UART: [idev] SUBJECT.KEYID = 7
4,333,791 UART: [idev] UDS.KEYID = 0
4,334,772 ready_for_fw is high
4,334,971 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,733 UART: [idev] Erasing UDS.KEYID = 0
7,618,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,346 UART: [idev] --
7,643,352 UART: [ldev] ++
7,643,977 UART: [ldev] CDI.KEYID = 6
7,644,888 UART: [ldev] SUBJECT.KEYID = 5
7,646,099 UART: [ldev] AUTHORITY.KEYID = 7
7,647,386 UART: [ldev] FE.KEYID = 1
7,658,458 UART: [ldev] Erasing FE.KEYID = 1
10,946,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,826 UART: [ldev] --
13,309,190 UART: [fwproc] Waiting for Commands...
13,311,545 UART: [fwproc] Received command 0x46574c44
13,313,719 UART: [fwproc] Received Image of size 114124 bytes
17,361,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,723 >>> mbox cmd response: success
17,828,116 UART: [afmc] ++
17,828,708 UART: [afmc] CDI.KEYID = 6
17,829,631 UART: [afmc] SUBJECT.KEYID = 7
17,830,895 UART: [afmc] AUTHORITY.KEYID = 5
21,144,836 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,139 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,810 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,627 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,092 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,413 UART: [afmc] --
23,511,030 UART: [cold-reset] --
23,514,025 UART: [state] Locking Datavault
23,521,051 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,812 UART: [state] Locking ICCM
23,525,610 UART: [exit] Launching FMC @ 0x40000130
23,533,987 UART:
23,534,227 UART: Running Caliptra FMC ...
23,535,269 UART:
23,535,416 UART: [state] CFI Enabled
23,543,914 UART: [fht] FMC Alias Private Key: 7
25,874,959 UART: [art] Extend RT PCRs Done
25,876,195 UART: [art] Lock RT PCRs Done
25,877,923 UART: [art] Populate DV Done
25,883,525 UART: [fht] FMC Alias Private Key: 7
25,885,092 UART: [art] Derive CDI
25,885,911 UART: [art] Store in in slot 0x4
25,928,241 UART: [art] Derive Key Pair
25,929,235 UART: [art] Store priv key in slot 0x5
29,171,115 UART: [art] Derive Key Pair - Done
29,184,117 UART: [art] Signing Cert with AUTHO
29,185,419 UART: RITY.KEYID = 7
31,464,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,075 UART: [art] PUB.X = 5C142D4FAA250CAA915BF8105BD409A2E2095646481D974B480660E3A00C9178D36128E3E9188BF91AC7D019AE46F341
31,473,304 UART: [art] PUB.Y = F5304B26C51777E2852E020876D3919238463D6CF17D58423E4CDE0C06924F58670EAA1B37CB2286C295539899ABDDB5
31,480,513 UART: [art] SIG.R = ECC18F9EBC09572EA9C399EAAA1B59E24EA8B9E8362E9C5B5BF6C42653A05644650B36D3B4BBD6982703800737714101
31,487,943 UART: [art] SIG.S = 29C2F3210CE0CCED5766E2E0105FE5566D151C1E644CF62E874250122A69CDF99E39EE592B871C4061C6B6ED22989916
32,793,176 UART: Caliptra RT
32,793,886 UART: [state] CFI Enabled
32,912,589 UART: [rt] RT listening for mailbox commands...
32,915,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,945,654 UART: [rt]cmd =0x4d454153, len=108
32,964,789 >>> mbox cmd response data (12 bytes)
35,015,895 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,116,840 UART:
35,117,199 UART: Running Caliptra ROM ...
35,118,337 UART:
35,118,499 UART: [state] CFI Enabled
35,131,145 UART: [state] LifecycleState = Unprovisioned
35,133,025 UART: [state] DebugLocked = No
35,135,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,139,487 UART: [kat] SHA2-256
35,309,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,319,700 UART: [kat] ++
35,320,236 UART: [kat] sha1
35,330,819 UART: [kat] SHA2-256
35,333,499 UART: [kat] SHA2-384
35,339,429 UART: [kat] SHA2-512-ACC
35,341,774 UART: [kat] ECC-384
37,625,995 UART: [kat] HMAC-384Kdf
37,638,980 UART: [kat] LMS
38,828,998 UART: [kat] --
38,833,618 UART: [update-reset] ++
42,545,627 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,549,949 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,808,374 >>> mbox cmd response: success
42,808,748 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,809,030 UART: [update-reset] Copying MAN_2 To MAN_1
42,831,240 UART: [update-reset Success] --
42,837,352 UART: [state] Locking Datavault
42,841,024 UART: [state] Locking PCR0, PCR1 and PCR31
42,842,866 UART: [state] Locking ICCM
42,845,403 UART: [exit] Launching FMC @ 0x40000130
42,853,855 UART:
42,854,098 UART: Running Caliptra FMC ...
42,855,201 UART:
42,855,353 UART: [state] CFI Enabled
42,900,003 UART: [art] Extend RT PCRs Done
42,901,192 UART: [art] Lock RT PCRs Done
42,902,811 UART: [art] Populate DV Done
42,908,156 UART: [fht] FMC Alias Private Key: 7
42,909,635 UART: [art] Derive CDI
42,910,412 UART: [art] Store in in slot 0x4
42,953,271 UART: [art] Derive Key Pair
42,954,314 UART: [art] Store priv key in slot 0x5
46,196,579 UART: [art] Derive Key Pair - Done
46,209,250 UART: [art] Signing Cert with AUTHO
46,210,585 UART: RITY.KEYID = 7
48,490,063 UART: [art] Erasing AUTHORITY.KEYID = 7
48,491,575 UART: [art] PUB.X = 235339BCCFB9D6531F5B9EFDA6B47848FD92D1160B811377D3D3FD81F21D035EC4C5F0241256AF6AE9961E0FFC1B6EFC
48,498,879 UART: [art] PUB.Y = 91A5C4ADB1C7D95E0C3B0CD13B2B25BBB450C8D18015C2828692CC257A9749476537C58932424A77A278F3AF45F6F691
48,506,104 UART: [art] SIG.R = C12BDEB688DF5B7704A954D28E0FBE89608824171DB4BCD8819E66B6BE85F4188EA195FEB71C9C819D3A8E2BD6B760EC
48,513,488 UART: [art] SIG.S = AE700C6381185DD495424AA0936178B0682818573A3CE6A552596B021F5621FCD106A3F1CB746BD68B6BE2609A9CA0EB
49,817,650 UART: mbox::rt_entry...
49,818,596 UART: ____ _ _ _ ____ _____
49,820,569 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,822,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,824,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,826,424 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,828,347 UART: |_|
49,829,147 UART:
50,116,887 UART: [rt] Runtime listening for mailbox commands...
50,119,056 >>> mbox cmd response data (48 bytes)
50,119,622 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,122,502 >>> mbox cmd response data (48 bytes)
50,123,439 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,137,285 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
4,128,597 ready_for_fw is high
4,129,515 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,360 >>> mbox cmd response: success
23,711,835 UART:
23,712,234 UART: Running Caliptra FMC ...
23,713,430 UART:
23,713,605 UART: [state] CFI Enabled
23,721,496 UART: [fht] FMC Alias Private Key: 7
26,052,225 UART: [art] Extend RT PCRs Done
26,053,444 UART: [art] Lock RT PCRs Done
26,055,217 UART: [art] Populate DV Done
26,060,581 UART: [fht] FMC Alias Private Key: 7
26,062,285 UART: [art] Derive CDI
26,063,018 UART: [art] Store in in slot 0x4
26,105,632 UART: [art] Derive Key Pair
26,106,671 UART: [art] Store priv key in slot 0x5
29,349,027 UART: [art] Derive Key Pair - Done
29,361,891 UART: [art] Signing Cert with AUTHO
29,363,230 UART: RITY.KEYID = 7
31,642,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,351 UART: [art] PUB.X = 4C746A11AFC44FBE19CFE1E5BA3DD2931B82766849783606C1E27A8126154AEDF71B58DD02BFDFC77B35140D9FBBC472
31,651,585 UART: [art] PUB.Y = F8B99D71267D1075CD295F2DCF75F5C3A2EF0BE59A6D27EBBA01DD409F4599A4F4ABF61304F46F709DC60C126693B9A2
31,658,846 UART: [art] SIG.R = 3D8A885D43E997D51D8817AF2641F0B805EE50084DC872B9F3A8CD151CBBA06FF097CA4C8606F7EA5317502020605E3B
31,666,275 UART: [art] SIG.S = F13E308C683B76F3A9ACD856B3D87BBB13B32B5B6888B53DCDAB52C84E19C0B889A8BF7C594358BFC1F7328F17A956D5
32,971,252 UART: Caliptra RT
32,971,948 UART: [state] CFI Enabled
33,090,300 UART: [rt] RT listening for mailbox commands...
33,092,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,123,382 UART: [rt]cmd =0x4d454153, len=108
33,141,872 >>> mbox cmd response data (12 bytes)
35,192,487 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,089,430 >>> mbox cmd response: success
43,089,994 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,125,988 UART:
43,126,303 UART: Running Caliptra FMC ...
43,127,429 UART:
43,127,586 UART: [state] CFI Enabled
43,172,190 UART: [art] Extend RT PCRs Done
43,173,338 UART: [art] Lock RT PCRs Done
43,174,731 UART: [art] Populate DV Done
43,180,033 UART: [fht] FMC Alias Private Key: 7
43,181,621 UART: [art] Derive CDI
43,182,381 UART: [art] Store in in slot 0x4
43,224,656 UART: [art] Derive Key Pair
43,225,694 UART: [art] Store priv key in slot 0x5
46,467,938 UART: [art] Derive Key Pair - Done
46,481,097 UART: [art] Signing Cert with AUTHO
46,482,433 UART: RITY.KEYID = 7
48,761,705 UART: [art] Erasing AUTHORITY.KEYID = 7
48,763,206 UART: [art] PUB.X = E257F367BDBDEA3353481FD7CD3DCA49629AB37904FDFC98DA5DDB3E8E0B3C21AE0E8B8585D208D78104B8990B203C08
48,770,450 UART: [art] PUB.Y = 842ABC579F12018651DBED10DAA2D0AA17A264322A344E170237005311A9B9C36482D48A51139D3ABE5359B674C2F7DB
48,777,681 UART: [art] SIG.R = 0BB98C8A82937D2315639561A780F2A07B29CE1C8CE6A5A91417A3D37DD5796548E32FE4767E443671E6E94D4C94395E
48,785,069 UART: [art] SIG.S = D5F619B6CC831DA087821359CF6AE59C5162C5162EE7A44817D5FD22DD9CF216DD9D5320F1DF22E4E1EAB54704F579D7
50,090,037 UART: mbox::rt_entry...
50,091,011 UART: ____ _ _ _ ____ _____
50,092,943 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,094,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,096,800 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,098,718 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,100,567 UART: |_|
50,101,440 UART:
50,382,834 UART: [rt] Runtime listening for mailbox commands...
50,384,968 >>> mbox cmd response data (48 bytes)
50,385,554 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,387,873 >>> mbox cmd response data (48 bytes)
50,388,783 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,402,650 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,054 UART:
192,410 UART: Running Caliptra ROM ...
193,592 UART:
193,745 UART: [state] CFI Enabled
264,727 UART: [state] LifecycleState = Unprovisioned
266,590 UART: [state] DebugLocked = No
268,197 UART: [state] WD Timer not started. Device not locked for debugging
271,748 UART: [kat] SHA2-256
450,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,435 UART: [kat] ++
462,988 UART: [kat] sha1
473,376 UART: [kat] SHA2-256
476,391 UART: [kat] SHA2-384
483,020 UART: [kat] SHA2-512-ACC
485,957 UART: [kat] ECC-384
2,947,958 UART: [kat] HMAC-384Kdf
2,971,407 UART: [kat] LMS
3,500,868 UART: [kat] --
3,505,778 UART: [cold-reset] ++
3,508,126 UART: [fht] FHT @ 0x50003400
3,517,680 UART: [idev] ++
3,518,237 UART: [idev] CDI.KEYID = 6
3,519,120 UART: [idev] SUBJECT.KEYID = 7
3,520,364 UART: [idev] UDS.KEYID = 0
3,521,438 ready_for_fw is high
3,521,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,589 UART: [idev] Erasing UDS.KEYID = 0
6,024,748 UART: [idev] Sha1 KeyId Algorithm
6,047,644 UART: [idev] --
6,050,739 UART: [ldev] ++
6,051,319 UART: [ldev] CDI.KEYID = 6
6,052,204 UART: [ldev] SUBJECT.KEYID = 5
6,053,310 UART: [ldev] AUTHORITY.KEYID = 7
6,054,646 UART: [ldev] FE.KEYID = 1
6,099,426 UART: [ldev] Erasing FE.KEYID = 1
8,601,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,710 UART: [ldev] --
10,393,538 UART: [fwproc] Wait for Commands...
10,396,402 UART: [fwproc] Recv command 0x46574c44
10,398,495 UART: [fwproc] Recv'd Img size: 114448 bytes
13,807,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,601 >>> mbox cmd response: success
14,271,856 UART: [afmc] ++
14,272,448 UART: [afmc] CDI.KEYID = 6
14,273,334 UART: [afmc] SUBJECT.KEYID = 7
14,274,547 UART: [afmc] AUTHORITY.KEYID = 5
16,805,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,399 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,812 UART: [afmc] --
18,606,306 UART: [cold-reset] --
18,609,683 UART: [state] Locking Datavault
18,614,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,101 UART: [state] Locking ICCM
18,617,442 UART: [exit] Launching FMC @ 0x40000130
18,625,892 UART:
18,626,126 UART: Running Caliptra FMC ...
18,627,224 UART:
18,627,381 UART: [state] CFI Enabled
18,689,579 UART: [fht] FMC Alias Private Key: 7
20,453,727 UART: [art] Extend RT PCRs Done
20,454,939 UART: [art] Lock RT PCRs Done
20,456,668 UART: [art] Populate DV Done
20,462,133 UART: [fht] FMC Alias Private Key: 7
20,463,828 UART: [art] Derive CDI
20,464,659 UART: [art] Store in in slot 0x4
20,522,350 UART: [art] Derive Key Pair
20,523,389 UART: [art] Store priv key in slot 0x5
22,986,118 UART: [art] Derive Key Pair - Done
22,999,224 UART: [art] Signing Cert with AUTHO
23,000,561 UART: RITY.KEYID = 7
24,711,876 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,368 UART: [art] PUB.X = 493490CC5B5E94978D2B42A064783FCDE9C2686B32111D9882E40842B15142E86B75D4EB3D2B722F21378E337CC7F0D0
24,720,609 UART: [art] PUB.Y = A505AC7CFA3933403A9797E0A84856A35F83587747E4D76C321E22A295736D44EF9AC900BDDD6C665A8ACCE93096DB58
24,727,833 UART: [art] SIG.R = ED3C5A057E4C441DBDDB55EFFADDD952483BAB95C1BB333E3F176EA4DE37FFE5749443BD93E5060BCF4B3A52108574D2
24,735,284 UART: [art] SIG.S = 8DB8BC9069302EC8013C0A3534C5B8535D141B30B4F9EA99C4EACEAFD41F07642D2D9DBC040BCA40B781ABA3C7FA6CEF
25,715,214 UART: Caliptra RT
25,715,919 UART: [state] CFI Enabled
25,879,631 UART: [rt] RT listening for mailbox commands...
25,882,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,913,530 UART: [rt]cmd =0x4d454153, len=108
25,931,603 >>> mbox cmd response data (12 bytes)
27,987,406 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,087,970 UART:
28,088,337 UART: Running Caliptra ROM ...
28,089,385 UART:
28,089,546 UART: [state] CFI Enabled
28,167,944 UART: [state] LifecycleState = Unprovisioned
28,169,825 UART: [state] DebugLocked = No
28,172,320 UART: [state] WD Timer not started. Device not locked for debugging
28,175,797 UART: [kat] SHA2-256
28,354,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,366,478 UART: [kat] ++
28,366,955 UART: [kat] sha1
28,378,326 UART: [kat] SHA2-256
28,381,339 UART: [kat] SHA2-384
28,388,240 UART: [kat] SHA2-512-ACC
28,391,190 UART: [kat] ECC-384
30,849,522 UART: [kat] HMAC-384Kdf
30,873,152 UART: [kat] LMS
31,402,608 UART: [kat] --
31,408,210 UART: [update-reset] ++
34,405,004 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,408,011 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,666,185 >>> mbox cmd response: success
34,666,557 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,667,756 UART: [update-reset] Copying MAN_2 To MAN_1
34,690,115 UART: [update-reset Success] --
34,695,601 UART: [state] Locking Datavault
34,698,552 UART: [state] Locking PCR0, PCR1 and PCR31
34,700,253 UART: [state] Locking ICCM
34,702,817 UART: [exit] Launching FMC @ 0x40000130
34,711,267 UART:
34,711,501 UART: Running Caliptra FMC ...
34,712,602 UART:
34,712,760 UART: [state] CFI Enabled
34,809,055 UART: [art] Extend RT PCRs Done
34,810,239 UART: [art] Lock RT PCRs Done
34,811,746 UART: [art] Populate DV Done
34,817,149 UART: [fht] FMC Alias Private Key: 7
34,818,681 UART: [art] Derive CDI
34,819,490 UART: [art] Store in in slot 0x4
34,878,448 UART: [art] Derive Key Pair
34,879,486 UART: [art] Store priv key in slot 0x5
37,342,291 UART: [art] Derive Key Pair - Done
37,355,638 UART: [art] Signing Cert with AUTHO
37,356,942 UART: RITY.KEYID = 7
39,068,121 UART: [art] Erasing AUTHORITY.KEYID = 7
39,069,628 UART: [art] PUB.X = EB85709CF25E3102FC496D6DCC3CF129B807D70EF5EA9DCCB8F25D392751C85B1BA064908082CA71CA7C209F4A60F85F
39,076,765 UART: [art] PUB.Y = 336222743C3F73DDC661664ABDB2BAD54FD2C852459BF57A6DB22877EAA5285E7D113A2BD48508936990EA68A2AEE51E
39,084,056 UART: [art] SIG.R = A2CEB4DD7E87A59E5CDFEE5DF834E5844EBCD9FE40997738C897CBE2EA5D766A7066A7C5C6E4AEFCFF43E03F69CF0929
39,091,498 UART: [art] SIG.S = 923C346E7E66CFA8EFAD270AFAD94A30EBBE066B9C3ABDF7BE0AE825CB236C78D51404D6B19229C6983DE98B0F668D51
40,070,342 UART: mbox::rt_entry...
40,071,307 UART: ____ _ _ _ ____ _____
40,073,298 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,075,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,077,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,079,179 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,081,034 UART: |_|
40,081,841 UART:
40,364,123 UART: [rt] Runtime listening for mailbox commands...
40,366,283 >>> mbox cmd response data (48 bytes)
40,366,868 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,369,189 >>> mbox cmd response data (48 bytes)
40,370,113 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,383,958 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,380,685 ready_for_fw is high
3,381,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,076,200 >>> mbox cmd response: success
18,364,003 UART:
18,364,389 UART: Running Caliptra FMC ...
18,365,583 UART:
18,365,747 UART: [state] CFI Enabled
18,435,219 UART: [fht] FMC Alias Private Key: 7
20,199,230 UART: [art] Extend RT PCRs Done
20,200,444 UART: [art] Lock RT PCRs Done
20,202,502 UART: [art] Populate DV Done
20,207,855 UART: [fht] FMC Alias Private Key: 7
20,209,337 UART: [art] Derive CDI
20,210,100 UART: [art] Store in in slot 0x4
20,267,989 UART: [art] Derive Key Pair
20,269,018 UART: [art] Store priv key in slot 0x5
22,732,070 UART: [art] Derive Key Pair - Done
22,745,077 UART: [art] Signing Cert with AUTHO
22,746,380 UART: RITY.KEYID = 7
24,458,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,544 UART: [art] PUB.X = 76709AB779BC9449FB965A2721FE19031840705946A6EEBCB93C36DE347224FD61D8810AFDE50C100D1C7BD1FDA2835D
24,466,859 UART: [art] PUB.Y = EE79209ED07CF8CF2C7E89FED99B15485FF7877F1E0BA78178FA894D222FF45791DB6503DA6BA34500A747F0AD5BFD9E
24,474,125 UART: [art] SIG.R = 790A38AAA28A8A36CE3A16944E6F05B3EA56AF41E064E305232BF8A9C6DE4DED834131748487EBC8ED458A54F5B4D72C
24,481,579 UART: [art] SIG.S = 7FD7B8C58615CB458C6373CE88518FF7E960B636AD37CECADF5B05636D84CCA7ACA383D73B3364BA6317404023570BD3
25,460,289 UART: Caliptra RT
25,461,007 UART: [state] CFI Enabled
25,626,541 UART: [rt] RT listening for mailbox commands...
25,628,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,660,011 UART: [rt]cmd =0x4d454153, len=108
25,677,498 >>> mbox cmd response data (12 bytes)
27,743,753 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,247,650 >>> mbox cmd response: success
34,248,247 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,282,997 UART:
34,283,295 UART: Running Caliptra FMC ...
34,284,358 UART:
34,284,532 UART: [state] CFI Enabled
34,386,363 UART: [art] Extend RT PCRs Done
34,387,550 UART: [art] Lock RT PCRs Done
34,389,123 UART: [art] Populate DV Done
34,394,592 UART: [fht] FMC Alias Private Key: 7
34,396,287 UART: [art] Derive CDI
34,397,062 UART: [art] Store in in slot 0x4
34,455,213 UART: [art] Derive Key Pair
34,456,211 UART: [art] Store priv key in slot 0x5
36,919,246 UART: [art] Derive Key Pair - Done
36,931,969 UART: [art] Signing Cert with AUTHO
36,933,276 UART: RITY.KEYID = 7
38,645,169 UART: [art] Erasing AUTHORITY.KEYID = 7
38,646,668 UART: [art] PUB.X = 92090A1A017435B6CE4BBD6CE7FFE61FFF1D1FCFCF787DDEF279205818FF0F53D92BE6D1D00D3141B9F7F1413A0E5EBD
38,653,974 UART: [art] PUB.Y = 8AB56730279E2680E53A6CE1F77DE0344B21AE537825ECD13C4C01E443313C92F83132B8503E0E271D1BAC2C16D85AC5
38,661,209 UART: [art] SIG.R = FA26AE035CBF5296C3055DBA74A75A23ED0597DDFE4B290D4238F0C5159BE12A8024A6515D13C303F060DDE4D9B50649
38,668,620 UART: [art] SIG.S = E0A5594FFFD69401F1753CF4868743597D1AFE4F87980296A787C2E6257EB988D21133302DCBF07A535FFBEF16909EBB
39,647,224 UART: mbox::rt_entry...
39,648,180 UART: ____ _ _ _ ____ _____
39,650,160 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,652,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,654,140 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,656,077 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,658,013 UART: |_|
39,658,827 UART:
39,944,807 UART: [rt] Runtime listening for mailbox commands...
39,946,974 >>> mbox cmd response data (48 bytes)
39,947,572 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,949,896 >>> mbox cmd response data (48 bytes)
39,950,801 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,964,707 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,459 UART:
192,814 UART: Running Caliptra ROM ...
194,010 UART:
603,560 UART: [state] CFI Enabled
617,294 UART: [state] LifecycleState = Unprovisioned
619,099 UART: [state] DebugLocked = No
621,197 UART: [state] WD Timer not started. Device not locked for debugging
625,722 UART: [kat] SHA2-256
804,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,420 UART: [kat] ++
817,018 UART: [kat] sha1
828,674 UART: [kat] SHA2-256
831,683 UART: [kat] SHA2-384
836,602 UART: [kat] SHA2-512-ACC
839,600 UART: [kat] ECC-384
3,280,367 UART: [kat] HMAC-384Kdf
3,291,936 UART: [kat] LMS
3,821,429 UART: [kat] --
3,825,284 UART: [cold-reset] ++
3,827,875 UART: [fht] FHT @ 0x50003400
3,839,604 UART: [idev] ++
3,840,178 UART: [idev] CDI.KEYID = 6
3,841,051 UART: [idev] SUBJECT.KEYID = 7
3,842,290 UART: [idev] UDS.KEYID = 0
3,843,220 ready_for_fw is high
3,843,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,054 UART: [idev] Erasing UDS.KEYID = 0
6,308,640 UART: [idev] Sha1 KeyId Algorithm
6,331,544 UART: [idev] --
6,334,182 UART: [ldev] ++
6,334,743 UART: [ldev] CDI.KEYID = 6
6,335,639 UART: [ldev] SUBJECT.KEYID = 5
6,336,763 UART: [ldev] AUTHORITY.KEYID = 7
6,338,092 UART: [ldev] FE.KEYID = 1
6,350,005 UART: [ldev] Erasing FE.KEYID = 1
8,824,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,219 UART: [ldev] --
10,614,076 UART: [fwproc] Wait for Commands...
10,617,035 UART: [fwproc] Recv command 0x46574c44
10,619,066 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,474,156 >>> mbox cmd response: success
14,478,827 UART: [afmc] ++
14,479,418 UART: [afmc] CDI.KEYID = 6
14,480,294 UART: [afmc] SUBJECT.KEYID = 7
14,481,504 UART: [afmc] AUTHORITY.KEYID = 5
16,977,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,699,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,768,884 UART: [afmc] --
18,771,981 UART: [cold-reset] --
18,775,560 UART: [state] Locking Datavault
18,779,609 UART: [state] Locking PCR0, PCR1 and PCR31
18,781,298 UART: [state] Locking ICCM
18,783,539 UART: [exit] Launching FMC @ 0x40000130
18,791,958 UART:
18,792,230 UART: Running Caliptra FMC ...
18,793,252 UART:
18,793,393 UART: [state] CFI Enabled
18,801,327 UART: [fht] FMC Alias Private Key: 7
20,558,572 UART: [art] Extend RT PCRs Done
20,559,769 UART: [art] Lock RT PCRs Done
20,561,731 UART: [art] Populate DV Done
20,567,077 UART: [fht] FMC Alias Private Key: 7
20,568,772 UART: [art] Derive CDI
20,569,502 UART: [art] Store in in slot 0x4
20,611,654 UART: [art] Derive Key Pair
20,612,643 UART: [art] Store priv key in slot 0x5
23,039,941 UART: [art] Derive Key Pair - Done
23,052,992 UART: [art] Signing Cert with AUTHO
23,054,313 UART: RITY.KEYID = 7
24,759,697 UART: [art] Erasing AUTHORITY.KEYID = 7
24,761,184 UART: [art] PUB.X = 9E26FC40CD2A65F8DD30BC8ADC29AD093B88E66E42B3534E00D0EDC01C5B7B7981EB84D939C88118F993B98477A318E6
24,768,408 UART: [art] PUB.Y = 5BFF7C63CD9CB0E0539109F4AD7892C848202CB5200B6C73AD4EED2BA63C8DB9C8ED12CD51BB4882FA95610A293AF455
24,775,704 UART: [art] SIG.R = 0C6739B1F307DE27F26E41538DA1A19AD0EFE2FA6A09681298D22D2852355149370E11904C59D38940A438367FFF6AAD
24,783,054 UART: [art] SIG.S = D71D24FDEC3BCE2561C850672BCC198674507DF96FF21CD047AFB2841A345F169AAEF0BA66A68924C6BD45B74F9DA926
25,761,603 UART: Caliptra RT
25,762,309 UART: [state] CFI Enabled
25,880,013 UART: [rt] RT listening for mailbox commands...
25,882,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,912,966 UART: [rt]cmd =0x4d454153, len=108
25,930,846 >>> mbox cmd response data (12 bytes)
27,981,445 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,082,302 UART:
28,082,673 UART: Running Caliptra ROM ...
28,083,720 UART:
28,083,867 UART: [state] CFI Enabled
28,099,276 UART: [state] LifecycleState = Unprovisioned
28,101,106 UART: [state] DebugLocked = No
28,104,020 UART: [state] WD Timer not started. Device not locked for debugging
28,107,869 UART: [kat] SHA2-256
28,287,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,298,598 UART: [kat] ++
28,299,046 UART: [kat] sha1
28,311,602 UART: [kat] SHA2-256
28,314,653 UART: [kat] SHA2-384
28,319,891 UART: [kat] SHA2-512-ACC
28,322,825 UART: [kat] ECC-384
30,767,681 UART: [kat] HMAC-384Kdf
30,780,072 UART: [kat] LMS
31,309,559 UART: [kat] --
31,312,864 UART: [update-reset] ++
34,301,554 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,305,745 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,563,904 >>> mbox cmd response: success
34,564,314 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,565,573 UART: [update-reset] Copying MAN_2 To MAN_1
34,587,958 UART: [update-reset Success] --
34,591,805 UART: [state] Locking Datavault
34,595,048 UART: [state] Locking PCR0, PCR1 and PCR31
34,596,744 UART: [state] Locking ICCM
34,598,351 UART: [exit] Launching FMC @ 0x40000130
34,606,792 UART:
34,607,025 UART: Running Caliptra FMC ...
34,608,140 UART:
34,608,291 UART: [state] CFI Enabled
34,652,099 UART: [art] Extend RT PCRs Done
34,653,277 UART: [art] Lock RT PCRs Done
34,654,833 UART: [art] Populate DV Done
34,660,068 UART: [fht] FMC Alias Private Key: 7
34,661,810 UART: [art] Derive CDI
34,662,615 UART: [art] Store in in slot 0x4
34,705,248 UART: [art] Derive Key Pair
34,706,237 UART: [art] Store priv key in slot 0x5
37,133,330 UART: [art] Derive Key Pair - Done
37,146,442 UART: [art] Signing Cert with AUTHO
37,147,747 UART: RITY.KEYID = 7
38,853,457 UART: [art] Erasing AUTHORITY.KEYID = 7
38,854,964 UART: [art] PUB.X = A4B2B81F39434B3FE5E97760A6783B6A658D6544E444608649375B1935296FD87031C97AC92B115FAC96D381D4F6514A
38,862,215 UART: [art] PUB.Y = FA35CC0502425AD810F87B2D815C5EED0DF043103A2CC3D644E3B4705A9CD16D1A437AAE5F722CFAC5B202B9EEDDA244
38,869,547 UART: [art] SIG.R = A5480034A3BDE08747F9F88D38EF1366CDE4A4272E56C05A7EB78AFDDFB9DB9AAB6078D774911EFD251A09D5CAFFCDF6
38,876,939 UART: [art] SIG.S = 2E4BAA521122F8936FAB62416B4532096F09FFCEB0A72F36CEE9C51AB26A67E39BB50BB6BC95A2702778DC2248B79B6C
39,854,777 UART: mbox::rt_entry...
39,855,740 UART: ____ _ _ _ ____ _____
39,857,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,859,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,861,636 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,863,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,865,480 UART: |_|
39,866,286 UART:
40,153,324 UART: [rt] Runtime listening for mailbox commands...
40,155,489 >>> mbox cmd response data (48 bytes)
40,156,124 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,158,469 >>> mbox cmd response data (48 bytes)
40,159,457 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,173,359 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,692,955 ready_for_fw is high
3,693,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,458 >>> mbox cmd response: success
18,514,505 UART:
18,514,884 UART: Running Caliptra FMC ...
18,516,066 UART:
18,516,227 UART: [state] CFI Enabled
18,524,264 UART: [fht] FMC Alias Private Key: 7
20,280,747 UART: [art] Extend RT PCRs Done
20,281,948 UART: [art] Lock RT PCRs Done
20,283,350 UART: [art] Populate DV Done
20,288,853 UART: [fht] FMC Alias Private Key: 7
20,290,475 UART: [art] Derive CDI
20,291,287 UART: [art] Store in in slot 0x4
20,333,441 UART: [art] Derive Key Pair
20,334,433 UART: [art] Store priv key in slot 0x5
22,761,279 UART: [art] Derive Key Pair - Done
22,774,167 UART: [art] Signing Cert with AUTHO
22,775,466 UART: RITY.KEYID = 7
24,480,904 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,383 UART: [art] PUB.X = EA8D757281DD361294C1DBDC8DE321A99B80E0609006926025A03E1BC15609BCF50764465CFBD4AD390A6F7280B5FC89
24,489,637 UART: [art] PUB.Y = 1539F0CB4C9EB10120F1F65078867A28ABC7D941CE249CB02B0F8E98BD269030A6773D6412C3C26869512BAC9BE2BFB6
24,496,925 UART: [art] SIG.R = B9E2C1CDB3759D4B448C669ADD65F59C7C022DD617CD3F114FF5C608B2B25E22CEDE552A6D6582F5F675D1551FC5862E
24,504,401 UART: [art] SIG.S = 1E5122488698DF552B528593D11AA5DE51CE5FFBB45F2B9061C1FAE19B2668EDF571E14424E792DF4064961C7906421B
25,483,307 UART: Caliptra RT
25,484,010 UART: [state] CFI Enabled
25,601,940 UART: [rt] RT listening for mailbox commands...
25,604,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,635,010 UART: [rt]cmd =0x4d454153, len=108
25,652,530 >>> mbox cmd response data (12 bytes)
27,703,883 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,123,597 >>> mbox cmd response: success
34,124,211 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,157,562 UART:
34,157,844 UART: Running Caliptra FMC ...
34,158,958 UART:
34,159,113 UART: [state] CFI Enabled
34,203,034 UART: [art] Extend RT PCRs Done
34,204,217 UART: [art] Lock RT PCRs Done
34,205,748 UART: [art] Populate DV Done
34,211,334 UART: [fht] FMC Alias Private Key: 7
34,212,822 UART: [art] Derive CDI
34,213,555 UART: [art] Store in in slot 0x4
34,255,977 UART: [art] Derive Key Pair
34,256,969 UART: [art] Store priv key in slot 0x5
36,682,731 UART: [art] Derive Key Pair - Done
36,695,682 UART: [art] Signing Cert with AUTHO
36,696,981 UART: RITY.KEYID = 7
38,402,628 UART: [art] Erasing AUTHORITY.KEYID = 7
38,404,134 UART: [art] PUB.X = B69E1E120921C61E9A58793A4ED9130F92A05CCFA9516750831E74EE811477D92587E9854521E79DF7552F826C102126
38,411,382 UART: [art] PUB.Y = CB7B9699597935319104ECBCE00F8348FE5FB9510648A49320F36BF93353C500C56C9EDED5537F8FA081870FB9CD5587
38,418,635 UART: [art] SIG.R = 13330E95C94E5441E42F43E7B0AC6D3CF5EBCAACE7A28F69CA274ABCCEFD753ED053638BC663177EAFE6F2DA49FAC794
38,426,030 UART: [art] SIG.S = 4D364C477A78C34302B44D00799B9BA2099137A4450EA35C28C8FDBB07E0F6FCA42ACDA1B8BC986305AADFA2843F245A
39,404,235 UART: mbox::rt_entry...
39,405,198 UART: ____ _ _ _ ____ _____
39,407,123 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,409,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,410,989 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,412,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,414,750 UART: |_|
39,415,623 UART:
39,700,397 UART: [rt] Runtime listening for mailbox commands...
39,702,555 >>> mbox cmd response data (48 bytes)
39,703,140 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,705,456 >>> mbox cmd response data (48 bytes)
39,706,339 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,720,231 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,074 UART:
192,443 UART: Running Caliptra ROM ...
193,643 UART:
193,794 UART: [state] CFI Enabled
264,946 UART: [state] LifecycleState = Unprovisioned
267,294 UART: [state] DebugLocked = No
268,617 UART: [state] WD Timer not started. Device not locked for debugging
272,929 UART: [kat] SHA2-256
462,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,623 UART: [kat] ++
474,111 UART: [kat] sha1
485,059 UART: [kat] SHA2-256
488,074 UART: [kat] SHA2-384
494,522 UART: [kat] SHA2-512-ACC
497,107 UART: [kat] ECC-384
2,944,347 UART: [kat] HMAC-384Kdf
2,971,863 UART: [kat] LMS
3,503,698 UART: [kat] --
3,509,045 UART: [cold-reset] ++
3,509,919 UART: [fht] FHT @ 0x50003400
3,522,318 UART: [idev] ++
3,523,020 UART: [idev] CDI.KEYID = 6
3,524,051 UART: [idev] SUBJECT.KEYID = 7
3,525,154 UART: [idev] UDS.KEYID = 0
3,526,084 ready_for_fw is high
3,526,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,228 UART: [idev] Erasing UDS.KEYID = 0
6,031,319 UART: [idev] Sha1 KeyId Algorithm
6,054,025 UART: [idev] --
6,058,506 UART: [ldev] ++
6,059,196 UART: [ldev] CDI.KEYID = 6
6,060,093 UART: [ldev] SUBJECT.KEYID = 5
6,061,211 UART: [ldev] AUTHORITY.KEYID = 7
6,062,502 UART: [ldev] FE.KEYID = 1
6,100,557 UART: [ldev] Erasing FE.KEYID = 1
8,605,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,331 UART: [ldev] --
10,415,330 UART: [fwproc] Wait for Commands...
10,417,963 UART: [fwproc] Recv command 0x46574c44
10,420,267 UART: [fwproc] Recv'd Img size: 114448 bytes
13,865,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,764 >>> mbox cmd response: success
14,602,577 UART: [afmc] ++
14,603,313 UART: [afmc] CDI.KEYID = 6
14,604,505 UART: [afmc] SUBJECT.KEYID = 7
14,605,938 UART: [afmc] AUTHORITY.KEYID = 5
17,144,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,425 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,122 UART: [afmc] --
18,945,775 UART: [cold-reset] --
18,950,455 UART: [state] Locking Datavault
18,955,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,323 UART: [state] Locking ICCM
18,959,038 UART: [exit] Launching FMC @ 0x40000130
18,967,658 UART:
18,967,895 UART: Running Caliptra FMC ...
18,968,994 UART:
18,969,150 UART: [state] CFI Enabled
19,029,626 UART: [fht] FMC Alias Private Key: 7
20,793,081 UART: [art] Extend RT PCRs Done
20,794,305 UART: [art] Lock RT PCRs Done
20,796,310 UART: [art] Populate DV Done
20,801,769 UART: [fht] FMC Alias Private Key: 7
20,803,247 UART: [art] Derive CDI
20,804,059 UART: [art] Store in in slot 0x4
20,862,350 UART: [art] Derive Key Pair
20,863,392 UART: [art] Store priv key in slot 0x5
23,325,970 UART: [art] Derive Key Pair - Done
23,339,020 UART: [art] Signing Cert with AUTHO
23,340,319 UART: RITY.KEYID = 7
25,051,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,052 UART: [art] PUB.X = BA18E3477AECE9CC2C7241909F1BA2509C0E7E17327E449E8B1325B21EB7EDC3FBB8A34EF79DA7CE728F97955C7D1ABB
25,060,348 UART: [art] PUB.Y = 9123A71E14ED69FB76AD13773550E02F97E4EBD7A07838919DA4ED6DCC739F1DA1671F9808539E438BAD05BB01C5C41C
25,067,632 UART: [art] SIG.R = 3416F4F10A18C2F2E51311D693BF6EDAB6B165BC6188C63E5764F0EFD5457E0EE89C2436249FC1C45DF5B1AB7126EB55
25,075,018 UART: [art] SIG.S = AB32D5D9AB7F7C91512C21FA4234D658676ADB7AD3B7EC0F974738FAC0DA6A4FC9347C0E501745FF365B54B960D157C3
26,053,908 UART: Caliptra RT
26,054,618 UART: [state] CFI Enabled
26,218,656 UART: [rt] RT listening for mailbox commands...
26,220,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,252,066 UART: [rt]cmd =0x4d454153, len=108
26,271,147 >>> mbox cmd response data (12 bytes)
28,323,039 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,423,404 UART:
28,423,760 UART: Running Caliptra ROM ...
28,424,894 UART:
28,425,063 UART: [state] CFI Enabled
28,483,420 UART: [state] LifecycleState = Unprovisioned
28,485,468 UART: [state] DebugLocked = No
28,488,261 UART: [state] WD Timer not started. Device not locked for debugging
28,493,258 UART: [kat] SHA2-256
28,683,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,693,908 UART: [kat] ++
28,694,411 UART: [kat] sha1
28,706,976 UART: [kat] SHA2-256
28,709,992 UART: [kat] SHA2-384
28,716,322 UART: [kat] SHA2-512-ACC
28,718,899 UART: [kat] ECC-384
31,168,623 UART: [kat] HMAC-384Kdf
31,191,607 UART: [kat] LMS
31,723,141 UART: [kat] --
31,725,291 UART: [update-reset] ++
34,746,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,750,688 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,144,472 >>> mbox cmd response: success
35,144,843 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,146,223 UART: [update-reset] Copying MAN_2 To MAN_1
35,183,787 UART: [update-reset Success] --
35,188,755 UART: [state] Locking Datavault
35,191,478 UART: [state] Locking PCR0, PCR1 and PCR31
35,193,616 UART: [state] Locking ICCM
35,195,710 UART: [exit] Launching FMC @ 0x40000130
35,204,409 UART:
35,204,647 UART: Running Caliptra FMC ...
35,205,746 UART:
35,205,901 UART: [state] CFI Enabled
35,296,323 UART: [art] Extend RT PCRs Done
35,297,507 UART: [art] Lock RT PCRs Done
35,299,066 UART: [art] Populate DV Done
35,304,471 UART: [fht] FMC Alias Private Key: 7
35,306,012 UART: [art] Derive CDI
35,306,829 UART: [art] Store in in slot 0x4
35,365,304 UART: [art] Derive Key Pair
35,366,341 UART: [art] Store priv key in slot 0x5
37,829,520 UART: [art] Derive Key Pair - Done
37,842,633 UART: [art] Signing Cert with AUTHO
37,843,937 UART: RITY.KEYID = 7
39,554,720 UART: [art] Erasing AUTHORITY.KEYID = 7
39,556,243 UART: [art] PUB.X = 4BB6A45FDD1D7D80B625C0BA0B9A14BE70835E65BEEBA363BCF0A0FF4E9F44B71BD23A49BCA079541795A342C64AD26D
39,563,568 UART: [art] PUB.Y = C4CE61D89D89E704690E8F6AF105B23DCEACF46405BBC166B25926A27E300B52ACAF7DF81613445FC428EDA2D2B5C879
39,570,805 UART: [art] SIG.R = 95BB4EB21326071CB4EBFCC1015AF886D6E314EF156B0C991D647DF3CE7F883C120FB960D2682C05DEFF2FB3DF3A96B4
39,578,242 UART: [art] SIG.S = 82730334BABB2C5525C0D95162231F537644E4BBB1BF0A8803220A1F2D554FA1A3ACD89B2AAEE81DF2D5C3F1A1E0678A
40,556,336 UART: mbox::rt_entry...
40,557,305 UART: ____ _ _ _ ____ _____
40,559,291 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,561,298 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,563,237 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,565,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,567,024 UART: |_|
40,567,831 UART:
40,849,921 UART: [rt] Runtime listening for mailbox commands...
40,852,088 >>> mbox cmd response data (48 bytes)
40,852,687 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,855,017 >>> mbox cmd response data (48 bytes)
40,855,938 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,869,836 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,417,673 ready_for_fw is high
3,418,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,711,912 >>> mbox cmd response: success
19,006,437 UART:
19,006,821 UART: Running Caliptra FMC ...
19,007,970 UART:
19,008,137 UART: [state] CFI Enabled
19,075,061 UART: [fht] FMC Alias Private Key: 7
20,838,881 UART: [art] Extend RT PCRs Done
20,840,081 UART: [art] Lock RT PCRs Done
20,841,923 UART: [art] Populate DV Done
20,847,304 UART: [fht] FMC Alias Private Key: 7
20,849,012 UART: [art] Derive CDI
20,849,830 UART: [art] Store in in slot 0x4
20,907,197 UART: [art] Derive Key Pair
20,908,235 UART: [art] Store priv key in slot 0x5
23,371,035 UART: [art] Derive Key Pair - Done
23,384,085 UART: [art] Signing Cert with AUTHO
23,385,395 UART: RITY.KEYID = 7
25,097,700 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,675 UART: [art] PUB.X = B76C1F2C90970AAAC8476CC97511108DDC69994140B939A5B68A319356914CA17EE88D753AA849FABC88486C620924CA
25,106,487 UART: [art] PUB.Y = 1F8FBE0D73E9E2D97FADA797A150FB983C55E16550379BBB9216ACF558D05D743CBBF4338BCAC42A222809980731D371
25,113,740 UART: [art] SIG.R = 8032D82FD761E5035926B9DC0A051A6B508D830F37E05D7DD4CD009BEEF4A8F5EBE400795A316A8C365F4D568DDE9F1F
25,121,135 UART: [art] SIG.S = F34C2FDF0FF86B97B1DD0078DA8709E25110BF1CADBE520BBF03E5F156C144AB43E9ACEF29C908B463C533102719D5AE
26,100,515 UART: Caliptra RT
26,101,204 UART: [state] CFI Enabled
26,266,158 UART: [rt] RT listening for mailbox commands...
26,268,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,299,808 UART: [rt]cmd =0x4d454153, len=108
26,318,749 >>> mbox cmd response data (12 bytes)
28,377,462 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,369,434 >>> mbox cmd response: success
35,369,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,406,744 UART:
35,407,039 UART: Running Caliptra FMC ...
35,408,163 UART:
35,408,327 UART: [state] CFI Enabled
35,494,698 UART: [art] Extend RT PCRs Done
35,495,892 UART: [art] Lock RT PCRs Done
35,497,536 UART: [art] Populate DV Done
35,503,070 UART: [fht] FMC Alias Private Key: 7
35,504,686 UART: [art] Derive CDI
35,505,458 UART: [art] Store in in slot 0x4
35,563,708 UART: [art] Derive Key Pair
35,564,708 UART: [art] Store priv key in slot 0x5
38,028,098 UART: [art] Derive Key Pair - Done
38,041,153 UART: [art] Signing Cert with AUTHO
38,042,462 UART: RITY.KEYID = 7
39,753,721 UART: [art] Erasing AUTHORITY.KEYID = 7
39,755,216 UART: [art] PUB.X = AE5436FEF7FDB2CA33E936AB4FA6B357C5E5AAD8F8F27B1FF96C55562AF31C2A6BA358D60DFBAA0E76E6987EE397D2B3
39,762,523 UART: [art] PUB.Y = 34E18D3C75E8EDF6F259CF2F6D35926315512A075B30053BDB08ADE5A8EFCE934C0D51B2D7F01454A843EA618DA67099
39,769,802 UART: [art] SIG.R = EE4F26FD14EE051497195B2FA18ADF356150CCE1695CC145BDD92393DA5BC60ACA9413F44868762CF0312878AF48325F
39,777,189 UART: [art] SIG.S = 4C5CC5EC95EB6E4E9492028DD478A00BF5E187DF1DA0F926E805A8DE099BE467E49FBD8D83E4ADB969CC0101F88EE754
40,755,638 UART: mbox::rt_entry...
40,756,587 UART: ____ _ _ _ ____ _____
40,758,588 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,760,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,762,530 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,764,466 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,766,316 UART: |_|
40,767,116 UART:
41,052,495 UART: [rt] Runtime listening for mailbox commands...
41,054,649 >>> mbox cmd response data (48 bytes)
41,055,240 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,057,564 >>> mbox cmd response data (48 bytes)
41,058,480 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,072,578 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,454 UART:
192,823 UART: Running Caliptra ROM ...
193,916 UART:
603,841 UART: [state] CFI Enabled
616,862 UART: [state] LifecycleState = Unprovisioned
619,226 UART: [state] DebugLocked = No
621,030 UART: [state] WD Timer not started. Device not locked for debugging
625,516 UART: [kat] SHA2-256
815,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,183 UART: [kat] ++
826,780 UART: [kat] sha1
839,641 UART: [kat] SHA2-256
842,709 UART: [kat] SHA2-384
848,830 UART: [kat] SHA2-512-ACC
851,398 UART: [kat] ECC-384
3,291,443 UART: [kat] HMAC-384Kdf
3,305,794 UART: [kat] LMS
3,837,606 UART: [kat] --
3,840,697 UART: [cold-reset] ++
3,843,260 UART: [fht] FHT @ 0x50003400
3,854,816 UART: [idev] ++
3,855,565 UART: [idev] CDI.KEYID = 6
3,856,476 UART: [idev] SUBJECT.KEYID = 7
3,857,669 UART: [idev] UDS.KEYID = 0
3,858,743 ready_for_fw is high
3,858,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,514 UART: [idev] Erasing UDS.KEYID = 0
6,334,587 UART: [idev] Sha1 KeyId Algorithm
6,355,966 UART: [idev] --
6,361,031 UART: [ldev] ++
6,361,704 UART: [ldev] CDI.KEYID = 6
6,362,672 UART: [ldev] SUBJECT.KEYID = 5
6,363,763 UART: [ldev] AUTHORITY.KEYID = 7
6,365,033 UART: [ldev] FE.KEYID = 1
6,374,848 UART: [ldev] Erasing FE.KEYID = 1
8,853,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,955 UART: [ldev] --
10,644,671 UART: [fwproc] Wait for Commands...
10,647,672 UART: [fwproc] Recv command 0x46574c44
10,649,975 UART: [fwproc] Recv'd Img size: 114448 bytes
14,099,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,841,360 >>> mbox cmd response: success
14,845,542 UART: [afmc] ++
14,846,244 UART: [afmc] CDI.KEYID = 6
14,847,484 UART: [afmc] SUBJECT.KEYID = 7
14,848,913 UART: [afmc] AUTHORITY.KEYID = 5
17,349,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,940 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,420 UART: [afmc] --
19,145,434 UART: [cold-reset] --
19,149,402 UART: [state] Locking Datavault
19,154,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,360 UART: [state] Locking ICCM
19,158,507 UART: [exit] Launching FMC @ 0x40000130
19,167,183 UART:
19,167,420 UART: Running Caliptra FMC ...
19,168,512 UART:
19,168,664 UART: [state] CFI Enabled
19,176,541 UART: [fht] FMC Alias Private Key: 7
20,933,534 UART: [art] Extend RT PCRs Done
20,934,747 UART: [art] Lock RT PCRs Done
20,936,166 UART: [art] Populate DV Done
20,941,684 UART: [fht] FMC Alias Private Key: 7
20,943,375 UART: [art] Derive CDI
20,944,187 UART: [art] Store in in slot 0x4
20,986,736 UART: [art] Derive Key Pair
20,987,770 UART: [art] Store priv key in slot 0x5
23,413,897 UART: [art] Derive Key Pair - Done
23,427,047 UART: [art] Signing Cert with AUTHO
23,428,345 UART: RITY.KEYID = 7
25,134,484 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,985 UART: [art] PUB.X = 1F51FE89263BA0D82E536F105C69A6D016C9CC59D85AE3115260DE87F276B965949AB82B60C4C58B21B14804AE72658E
25,143,215 UART: [art] PUB.Y = 8ECEB6A1577408F82247C18B3A27B10D0ED7C2DCECEB675CA3E239DC9D0A33472B6BB7233CEBD2C37C554D58C787326B
25,150,531 UART: [art] SIG.R = 51DEEE469E9AAB92C23BCB164B7951BC72AAE815271987F4C38430177DBF31CFC9D2F79E8498D12D1006D62EC3B9CBEA
25,157,957 UART: [art] SIG.S = 55419D088D9C609BEB34126CE77D61677DC82E17AF931C61A92F0F4A8AC1CDA22ACC71F5282614F58F9974B4BE9845DB
26,136,476 UART: Caliptra RT
26,137,163 UART: [state] CFI Enabled
26,254,034 UART: [rt] RT listening for mailbox commands...
26,256,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,287,190 UART: [rt]cmd =0x4d454153, len=108
26,305,541 >>> mbox cmd response data (12 bytes)
28,356,922 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,457,884 UART:
28,458,243 UART: Running Caliptra ROM ...
28,459,376 UART:
28,459,547 UART: [state] CFI Enabled
28,471,912 UART: [state] LifecycleState = Unprovisioned
28,473,803 UART: [state] DebugLocked = No
28,475,397 UART: [state] WD Timer not started. Device not locked for debugging
28,479,388 UART: [kat] SHA2-256
28,669,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,680,010 UART: [kat] ++
28,680,562 UART: [kat] sha1
28,690,851 UART: [kat] SHA2-256
28,693,870 UART: [kat] SHA2-384
28,699,530 UART: [kat] SHA2-512-ACC
28,702,089 UART: [kat] ECC-384
31,141,807 UART: [kat] HMAC-384Kdf
31,154,094 UART: [kat] LMS
31,685,699 UART: [kat] --
31,689,414 UART: [update-reset] ++
34,705,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,709,505 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,103,283 >>> mbox cmd response: success
35,103,665 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,103,974 UART: [update-reset] Copying MAN_2 To MAN_1
35,141,096 UART: [update-reset Success] --
35,145,642 UART: [state] Locking Datavault
35,150,682 UART: [state] Locking PCR0, PCR1 and PCR31
35,152,871 UART: [state] Locking ICCM
35,154,963 UART: [exit] Launching FMC @ 0x40000130
35,163,630 UART:
35,163,865 UART: Running Caliptra FMC ...
35,164,961 UART:
35,165,108 UART: [state] CFI Enabled
35,209,594 UART: [art] Extend RT PCRs Done
35,210,729 UART: [art] Lock RT PCRs Done
35,212,708 UART: [art] Populate DV Done
35,217,883 UART: [fht] FMC Alias Private Key: 7
35,219,524 UART: [art] Derive CDI
35,220,331 UART: [art] Store in in slot 0x4
35,262,552 UART: [art] Derive Key Pair
35,263,545 UART: [art] Store priv key in slot 0x5
37,690,113 UART: [art] Derive Key Pair - Done
37,703,155 UART: [art] Signing Cert with AUTHO
37,704,489 UART: RITY.KEYID = 7
39,409,874 UART: [art] Erasing AUTHORITY.KEYID = 7
39,411,371 UART: [art] PUB.X = 697B3674069459CE321FD74E5CFEE36A8A49CFA0B564F61F8FA7D286E9EFF397283C31DC9428335694240E0BF18A8D24
39,418,601 UART: [art] PUB.Y = 1BE5F1E953970C0F13E639604F5E0C9470498144631648DDC430C7D0E88132192EDFB47021AE3640A19A824450429FED
39,425,879 UART: [art] SIG.R = E3ADD26F6391C157E64C89598DACFC6C2D5410123F75676E28778A5C13063CE291567CE1459773420206D06ED0FDB9C5
39,433,201 UART: [art] SIG.S = F5462F5BF862A875FC419A83703F3618D75E8A0E156F5994C25246E7B99D0DDF194842D49033B1503F22EA0BB9F93DF6
40,411,510 UART: mbox::rt_entry...
40,412,455 UART: ____ _ _ _ ____ _____
40,414,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,416,626 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,418,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,420,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,422,407 UART: |_|
40,423,236 UART:
40,707,596 UART: [rt] Runtime listening for mailbox commands...
40,709,766 >>> mbox cmd response data (48 bytes)
40,710,344 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,712,666 >>> mbox cmd response data (48 bytes)
40,713,547 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,727,636 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,762,018 ready_for_fw is high
3,762,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,969,883 >>> mbox cmd response: success
19,226,273 UART:
19,226,669 UART: Running Caliptra FMC ...
19,227,765 UART:
19,227,911 UART: [state] CFI Enabled
19,236,224 UART: [fht] FMC Alias Private Key: 7
20,993,107 UART: [art] Extend RT PCRs Done
20,994,353 UART: [art] Lock RT PCRs Done
20,995,733 UART: [art] Populate DV Done
21,001,039 UART: [fht] FMC Alias Private Key: 7
21,002,744 UART: [art] Derive CDI
21,003,483 UART: [art] Store in in slot 0x4
21,046,027 UART: [art] Derive Key Pair
21,047,027 UART: [art] Store priv key in slot 0x5
23,473,636 UART: [art] Derive Key Pair - Done
23,486,955 UART: [art] Signing Cert with AUTHO
23,488,258 UART: RITY.KEYID = 7
25,193,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,091 UART: [art] PUB.X = 5C2A1EC3BFC597FB5D35CBCFAC37B35DED98FC79336655A2B83179CC38F35D242AFA6320DE9BD1ADD4401025933E9B53
25,202,322 UART: [art] PUB.Y = 9E32B3D5F4638EAF79F3BB647DDDD27FB2340707F394E3D2D61F81345EB024182E76B19094D0259702EFD2B99EBA056A
25,209,632 UART: [art] SIG.R = 33DC6CC3B4BF607E5FCCC5DF198149EC1F62A50E82E03C1EB27562897CC87EBB2C72AA38652CB1E0BD0DB218C65C265D
25,217,078 UART: [art] SIG.S = E0DA5B2B2187941E50017B3D445D62252D37BD3A2EB11269B8AAF5C5CF03535986615E9E26878ACA448929E6226FEA5F
26,195,341 UART: Caliptra RT
26,196,067 UART: [state] CFI Enabled
26,313,139 UART: [rt] RT listening for mailbox commands...
26,315,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,346,151 UART: [rt]cmd =0x4d454153, len=108
26,365,723 >>> mbox cmd response data (12 bytes)
28,416,070 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,330,020 >>> mbox cmd response: success
35,330,513 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,362,613 UART:
35,362,899 UART: Running Caliptra FMC ...
35,363,926 UART:
35,364,067 UART: [state] CFI Enabled
35,408,484 UART: [art] Extend RT PCRs Done
35,409,670 UART: [art] Lock RT PCRs Done
35,411,090 UART: [art] Populate DV Done
35,416,564 UART: [fht] FMC Alias Private Key: 7
35,418,099 UART: [art] Derive CDI
35,418,831 UART: [art] Store in in slot 0x4
35,461,477 UART: [art] Derive Key Pair
35,462,512 UART: [art] Store priv key in slot 0x5
37,889,240 UART: [art] Derive Key Pair - Done
37,902,130 UART: [art] Signing Cert with AUTHO
37,903,433 UART: RITY.KEYID = 7
39,608,982 UART: [art] Erasing AUTHORITY.KEYID = 7
39,610,481 UART: [art] PUB.X = CB1ED9876B4F6FCFCE098EAD76AD069EA2B4A04277A0F83BD8E17A6C2F4EEC7E5752E260DF6C4CB38921B984AEBEB082
39,617,773 UART: [art] PUB.Y = D872DEE8C3C78B829CE774D05CBC10B97F6E4A68B819155CA9D52090D29319699F7BB0F5E3CF3EEB55F0A7EB95C60BD3
39,625,083 UART: [art] SIG.R = 1BDEFE87DD27EAE9AB4C330D0D2B543CF9516EABB57661034D611C0E17FEC72B80DE5857D5E92C2AD62FFD3A3E23BFDE
39,632,476 UART: [art] SIG.S = DC346626D0356F9EEFAF235DA78BDDCBE4E95C461B9DB5FB5B530854C1779AF6A7A299BDFD140D94BA69201D58322866
40,610,560 UART: mbox::rt_entry...
40,611,521 UART: ____ _ _ _ ____ _____
40,613,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,615,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,617,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,619,345 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,621,264 UART: |_|
40,622,065 UART:
40,908,158 UART: [rt] Runtime listening for mailbox commands...
40,910,300 >>> mbox cmd response data (48 bytes)
40,910,885 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,913,201 >>> mbox cmd response data (48 bytes)
40,914,087 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,928,024 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,367 UART: [kat] SHA2-256
882,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,413 UART: [kat] ++
886,565 UART: [kat] sha1
890,785 UART: [kat] SHA2-256
892,723 UART: [kat] SHA2-384
895,456 UART: [kat] SHA2-512-ACC
897,357 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,508 UART: [kat] LMS
1,475,704 UART: [kat] --
1,476,587 UART: [cold-reset] ++
1,477,051 UART: [fht] Storing FHT @ 0x50003400
1,479,800 UART: [idev] ++
1,479,968 UART: [idev] CDI.KEYID = 6
1,480,328 UART: [idev] SUBJECT.KEYID = 7
1,480,752 UART: [idev] UDS.KEYID = 0
1,481,097 ready_for_fw is high
1,481,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,694 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,162 UART: [idev] --
1,514,215 UART: [ldev] ++
1,514,383 UART: [ldev] CDI.KEYID = 6
1,514,746 UART: [ldev] SUBJECT.KEYID = 5
1,515,172 UART: [ldev] AUTHORITY.KEYID = 7
1,515,635 UART: [ldev] FE.KEYID = 1
1,520,807 UART: [ldev] Erasing FE.KEYID = 1
1,545,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,768 UART: [ldev] --
1,585,133 UART: [fwproc] Waiting for Commands...
1,585,990 UART: [fwproc] Received command 0x46574c44
1,586,781 UART: [fwproc] Received Image of size 114448 bytes
2,885,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,639 >>> mbox cmd response: success
3,078,859 UART: [afmc] ++
3,079,027 UART: [afmc] CDI.KEYID = 6
3,079,389 UART: [afmc] SUBJECT.KEYID = 7
3,079,814 UART: [afmc] AUTHORITY.KEYID = 5
3,114,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,079 UART: [afmc] --
3,158,125 UART: [cold-reset] --
3,158,837 UART: [state] Locking Datavault
3,160,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,752 UART: [state] Locking ICCM
3,161,190 UART: [exit] Launching FMC @ 0x40000130
3,166,519 UART:
3,166,535 UART: Running Caliptra FMC ...
3,166,943 UART:
3,166,997 UART: [state] CFI Enabled
3,177,292 UART: [fht] FMC Alias Private Key: 7
3,285,813 UART: [art] Extend RT PCRs Done
3,286,241 UART: [art] Lock RT PCRs Done
3,288,041 UART: [art] Populate DV Done
3,296,196 UART: [fht] FMC Alias Private Key: 7
3,297,188 UART: [art] Derive CDI
3,297,468 UART: [art] Store in in slot 0x4
3,382,803 UART: [art] Derive Key Pair
3,383,163 UART: [art] Store priv key in slot 0x5
3,396,507 UART: [art] Derive Key Pair - Done
3,411,336 UART: [art] Signing Cert with AUTHO
3,411,816 UART: RITY.KEYID = 7
3,426,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,697 UART: [art] PUB.X = EA476FF8B1AC2090CD1F8EA797A696CE245726B8786B6C19B73C9E507F1FA15756C6B58EEF49FE95BB6F6B2F9A27D421
3,434,481 UART: [art] PUB.Y = 1157DBD31D8C522C21D0A17999FBF1855665B44DAE91C44752FE625FB64F2EB601517C72D92E3F16B3F59757A4F063BF
3,441,432 UART: [art] SIG.R = F18CFC25B497ECAD92F1090CFF2276C8D838922C0526D904DBBF19516D634DF4C8454689F96CF16A4A678BAF3DED77F3
3,448,202 UART: [art] SIG.S = 45A24844DAAF55989CA27BA7AD4B943529826AFBE1F434DFA54B0A01372C7372C4A0CEABB5CB24FEFA110CC21B01A3A1
3,472,693 UART: Caliptra RT
3,472,946 UART: [state] CFI Enabled
3,579,861 UART: [rt] RT listening for mailbox commands...
3,580,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,821 UART: [rt]cmd =0x4d454153, len=108
3,631,787 >>> mbox cmd response data (12 bytes)
3,631,788 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,786 UART:
3,632,802 UART: Running Caliptra ROM ...
3,633,210 UART:
3,633,264 UART: [state] CFI Enabled
3,635,620 UART: [state] LifecycleState = Unprovisioned
3,636,275 UART: [state] DebugLocked = No
3,636,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,638,510 UART: [kat] SHA2-256
4,432,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,436,556 UART: [kat] ++
4,436,708 UART: [kat] sha1
4,441,112 UART: [kat] SHA2-256
4,443,050 UART: [kat] SHA2-384
4,445,885 UART: [kat] SHA2-512-ACC
4,447,785 UART: [kat] ECC-384
4,453,198 UART: [kat] HMAC-384Kdf
4,457,874 UART: [kat] LMS
5,026,070 UART: [kat] --
5,026,947 UART: [update-reset] ++
5,954,097 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,955,143 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,051,577 >>> mbox cmd response: success
6,051,577 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,051,918 UART: [update-reset] Copying MAN_2 To MAN_1
6,059,932 UART: [update-reset Success] --
6,061,075 UART: [state] Locking Datavault
6,062,089 UART: [state] Locking PCR0, PCR1 and PCR31
6,062,693 UART: [state] Locking ICCM
6,063,243 UART: [exit] Launching FMC @ 0x40000130
6,068,572 UART:
6,068,588 UART: Running Caliptra FMC ...
6,068,996 UART:
6,069,050 UART: [state] CFI Enabled
6,157,743 UART: [art] Extend RT PCRs Done
6,158,171 UART: [art] Lock RT PCRs Done
6,159,478 UART: [art] Populate DV Done
6,167,459 UART: [fht] FMC Alias Private Key: 7
6,168,635 UART: [art] Derive CDI
6,168,915 UART: [art] Store in in slot 0x4
6,254,488 UART: [art] Derive Key Pair
6,254,848 UART: [art] Store priv key in slot 0x5
6,267,370 UART: [art] Derive Key Pair - Done
6,282,043 UART: [art] Signing Cert with AUTHO
6,282,523 UART: RITY.KEYID = 7
6,297,681 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,446 UART: [art] PUB.X = EA513AE9E76F91EADEDDB48F911FDE4B2D61BA6FDB8E104A278316BEC50770DEE9B40D7B69B9AFCFABC040D4D7DED325
6,305,244 UART: [art] PUB.Y = E8D552D380A714E8F44AF290F2F623C4C3F031FF6440229623807A7A08115CAD424EF69FA4FDFD49A3642340D087DEA3
6,312,195 UART: [art] SIG.R = 3EC33F0D0439BDF56B40343DF1166CE02033FE6F5BAEA7170C83CE2F8CB6FB44E482B02A02B17BD98F758CACD13D6338
6,318,969 UART: [art] SIG.S = 8B56F79316A35380695553977E2EA3887CD744FD39F2D57F1815F2A0A726117FFAF48DC10B4DA2D8D118CD68C91996BC
6,342,339 UART: mbox::rt_entry...
6,342,711 UART: ____ _ _ _ ____ _____
6,343,495 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,344,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,345,063 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,345,831 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,346,599 UART: |_|
6,346,911 UART:
6,627,735 UART: [rt] Runtime listening for mailbox commands...
6,628,925 >>> mbox cmd response data (48 bytes)
6,628,926 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,631,709 >>> mbox cmd response data (48 bytes)
6,631,710 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,646,847 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 ready_for_fw is high
1,362,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,501 >>> mbox cmd response: success
2,993,663 UART:
2,993,679 UART: Running Caliptra FMC ...
2,994,087 UART:
2,994,141 UART: [state] CFI Enabled
3,004,708 UART: [fht] FMC Alias Private Key: 7
3,112,259 UART: [art] Extend RT PCRs Done
3,112,687 UART: [art] Lock RT PCRs Done
3,114,059 UART: [art] Populate DV Done
3,122,194 UART: [fht] FMC Alias Private Key: 7
3,123,320 UART: [art] Derive CDI
3,123,600 UART: [art] Store in in slot 0x4
3,209,247 UART: [art] Derive Key Pair
3,209,607 UART: [art] Store priv key in slot 0x5
3,222,627 UART: [art] Derive Key Pair - Done
3,237,475 UART: [art] Signing Cert with AUTHO
3,237,955 UART: RITY.KEYID = 7
3,252,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,714 UART: [art] PUB.X = 70C5119E948B59F634F1AC935F762141E5E1A80C4006F5E6DE9AA30393D1578BEC4A243E8F4724A568221237A0E29D0A
3,260,470 UART: [art] PUB.Y = E1F95539C43C034762DC28AEA65A469C50886397B181738D2A64AE75099890EE9A8F47591F608B7F9DF65C98562FE95D
3,267,410 UART: [art] SIG.R = 5C81B3F0192002D8A5F03EC1D7593F9E17B62A86B5BC395D6320A83156D415737DA3FA81843715CA10B75826E1C53BDE
3,274,177 UART: [art] SIG.S = 8807625DBE654D8E9E981E8015E7820ADF19253BFB84DD2C5C4FFD7D3E0799FC8080A0700B2BA8C64EA38A129A1E61FD
3,298,408 UART: Caliptra RT
3,298,661 UART: [state] CFI Enabled
3,405,906 UART: [rt] RT listening for mailbox commands...
3,406,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,132 UART: [rt]cmd =0x4d454153, len=108
3,457,766 >>> mbox cmd response data (12 bytes)
3,457,767 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,698 >>> mbox cmd response: success
5,758,698 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,772,239 UART:
5,772,255 UART: Running Caliptra FMC ...
5,772,663 UART:
5,772,717 UART: [state] CFI Enabled
5,862,214 UART: [art] Extend RT PCRs Done
5,862,642 UART: [art] Lock RT PCRs Done
5,863,469 UART: [art] Populate DV Done
5,871,744 UART: [fht] FMC Alias Private Key: 7
5,872,866 UART: [art] Derive CDI
5,873,146 UART: [art] Store in in slot 0x4
5,958,927 UART: [art] Derive Key Pair
5,959,287 UART: [art] Store priv key in slot 0x5
5,972,657 UART: [art] Derive Key Pair - Done
5,987,305 UART: [art] Signing Cert with AUTHO
5,987,785 UART: RITY.KEYID = 7
6,003,391 UART: [art] Erasing AUTHORITY.KEYID = 7
6,004,156 UART: [art] PUB.X = C1B220514E165A5E894ECC2A6F7D0E0FBC71FAAF99A57100A2FAE6347EF9C6C8C3F9F450742E971E21C8E45FA52243C1
6,010,912 UART: [art] PUB.Y = 1245B76D97083E15C3A5AC8F3ADCBEA0A1B0EE5D5D033945668940078BB12FA1EF21253F09D66D39489A7A87FED9B198
6,017,858 UART: [art] SIG.R = 543298F6F110B605FDF4D867337997F7CA4EDB29741DFE44A0F3231BD05B6D4C23AC052149790EBE5EACDB2B7A2006D9
6,024,626 UART: [art] SIG.S = E0F384D79BADF32F4C55924DF67357A53430FA112196970D4A3908A575578E4511785131BCA45ED3E8A92418622B6991
6,048,069 UART: mbox::rt_entry...
6,048,441 UART: ____ _ _ _ ____ _____
6,049,225 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,050,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,050,793 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,051,561 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,052,329 UART: |_|
6,052,641 UART:
6,329,267 UART: [rt] Runtime listening for mailbox commands...
6,330,457 >>> mbox cmd response data (48 bytes)
6,330,458 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,333,241 >>> mbox cmd response data (48 bytes)
6,333,242 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,348,379 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,884 UART: [kat] SHA2-256
882,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,930 UART: [kat] ++
887,082 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,819 UART: [kat] SHA2-512-ACC
897,720 UART: [kat] ECC-384
903,389 UART: [kat] HMAC-384Kdf
907,987 UART: [kat] LMS
1,476,183 UART: [kat] --
1,476,992 UART: [cold-reset] ++
1,477,428 UART: [fht] Storing FHT @ 0x50003400
1,480,003 UART: [idev] ++
1,480,171 UART: [idev] CDI.KEYID = 6
1,480,531 UART: [idev] SUBJECT.KEYID = 7
1,480,955 UART: [idev] UDS.KEYID = 0
1,481,300 ready_for_fw is high
1,481,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,279 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,521,944 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,587,016 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 114448 bytes
2,888,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,672 >>> mbox cmd response: success
3,082,812 UART: [afmc] ++
3,082,980 UART: [afmc] CDI.KEYID = 6
3,083,342 UART: [afmc] SUBJECT.KEYID = 7
3,083,767 UART: [afmc] AUTHORITY.KEYID = 5
3,119,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,316 UART: [afmc] --
3,162,310 UART: [cold-reset] --
3,163,192 UART: [state] Locking Datavault
3,164,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,941 UART: [state] Locking ICCM
3,165,485 UART: [exit] Launching FMC @ 0x40000130
3,170,814 UART:
3,170,830 UART: Running Caliptra FMC ...
3,171,238 UART:
3,171,381 UART: [state] CFI Enabled
3,181,982 UART: [fht] FMC Alias Private Key: 7
3,290,083 UART: [art] Extend RT PCRs Done
3,290,511 UART: [art] Lock RT PCRs Done
3,291,971 UART: [art] Populate DV Done
3,300,048 UART: [fht] FMC Alias Private Key: 7
3,301,010 UART: [art] Derive CDI
3,301,290 UART: [art] Store in in slot 0x4
3,387,055 UART: [art] Derive Key Pair
3,387,415 UART: [art] Store priv key in slot 0x5
3,400,479 UART: [art] Derive Key Pair - Done
3,415,287 UART: [art] Signing Cert with AUTHO
3,415,767 UART: RITY.KEYID = 7
3,430,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,632 UART: [art] PUB.X = ECCEA7EDD7BC64441B4512F8D005C09433D6F1F2639788DE082C284DE3F7D9FC7EB61D61F4C4E55AEA58EBB3D757E4B7
3,438,416 UART: [art] PUB.Y = 01BF30145C1952CE39B95532464232B3FFFD4F9E985E8C9D2726E6C5D8AAC89850B26386929CC00BAEF0DBE3059B737E
3,445,363 UART: [art] SIG.R = 6DC57B462659DE0368CD12203E2A4B321CFD0B8B2DC09FF0CDF49F64550187B9C9A6FCC4B61F0B328AB62946DE0F9656
3,452,130 UART: [art] SIG.S = F09D00A471CD52736A2F8AF53B3F9CF4E084C01EFEDEFA0C3899BECE1B8D9B0FF258F3CAD6EFC5C7E53CE9492B4ED514
3,476,141 UART: Caliptra RT
3,476,486 UART: [state] CFI Enabled
3,585,661 UART: [rt] RT listening for mailbox commands...
3,586,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,629 UART: [rt]cmd =0x4d454153, len=108
3,637,149 >>> mbox cmd response data (12 bytes)
3,637,150 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,934 UART:
3,637,950 UART: Running Caliptra ROM ...
3,638,358 UART:
3,638,499 UART: [state] CFI Enabled
3,641,299 UART: [state] LifecycleState = Unprovisioned
3,641,954 UART: [state] DebugLocked = No
3,642,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,644,077 UART: [kat] SHA2-256
4,438,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,442,123 UART: [kat] ++
4,442,275 UART: [kat] sha1
4,446,687 UART: [kat] SHA2-256
4,448,625 UART: [kat] SHA2-384
4,451,478 UART: [kat] SHA2-512-ACC
4,453,378 UART: [kat] ECC-384
4,458,911 UART: [kat] HMAC-384Kdf
4,463,529 UART: [kat] LMS
5,031,725 UART: [kat] --
5,032,708 UART: [update-reset] ++
5,959,458 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,960,682 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,057,116 >>> mbox cmd response: success
6,057,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,057,249 UART: [update-reset] Copying MAN_2 To MAN_1
6,065,263 UART: [update-reset Success] --
6,066,094 UART: [state] Locking Datavault
6,067,016 UART: [state] Locking PCR0, PCR1 and PCR31
6,067,620 UART: [state] Locking ICCM
6,068,072 UART: [exit] Launching FMC @ 0x40000130
6,073,401 UART:
6,073,417 UART: Running Caliptra FMC ...
6,073,825 UART:
6,073,968 UART: [state] CFI Enabled
6,163,115 UART: [art] Extend RT PCRs Done
6,163,543 UART: [art] Lock RT PCRs Done
6,164,956 UART: [art] Populate DV Done
6,173,391 UART: [fht] FMC Alias Private Key: 7
6,174,511 UART: [art] Derive CDI
6,174,791 UART: [art] Store in in slot 0x4
6,260,264 UART: [art] Derive Key Pair
6,260,624 UART: [art] Store priv key in slot 0x5
6,274,330 UART: [art] Derive Key Pair - Done
6,289,073 UART: [art] Signing Cert with AUTHO
6,289,553 UART: RITY.KEYID = 7
6,304,571 UART: [art] Erasing AUTHORITY.KEYID = 7
6,305,336 UART: [art] PUB.X = A3DCDD18BB9694F7C83BDFD5AFDB32E4538E615C38BC8F4CB86541888A1F651D78698BFE7C59924D31701E6FB56E2FB8
6,312,122 UART: [art] PUB.Y = 41734F8EEB8D665A51673F98F0E8472B104871FC6A0548DDCF574AE4B5D6569875E3DDA16067A2D2F63864FA60EA4902
6,319,068 UART: [art] SIG.R = A1A37311B324A0EC36EB7CD064209B7F2037F722BFEEA26AC5409305E769C6B0E7A42D5E6C4B922E11A9985CA0B8FF6F
6,325,847 UART: [art] SIG.S = AFA607C83C7EBD9D94D0ECF274CEB7A56BC381F6CB619BBCAAC4A9C22E671DFB8402F1EAB542CC813C5875F9C76907D7
6,349,787 UART: mbox::rt_entry...
6,350,159 UART: ____ _ _ _ ____ _____
6,350,943 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,351,743 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,352,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,353,279 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,354,047 UART: |_|
6,354,359 UART:
6,632,962 UART: [rt] Runtime listening for mailbox commands...
6,634,152 >>> mbox cmd response data (48 bytes)
6,634,153 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,636,936 >>> mbox cmd response data (48 bytes)
6,636,937 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,652,074 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,008 ready_for_fw is high
1,363,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,970 >>> mbox cmd response: success
2,993,098 UART:
2,993,114 UART: Running Caliptra FMC ...
2,993,522 UART:
2,993,665 UART: [state] CFI Enabled
3,004,052 UART: [fht] FMC Alias Private Key: 7
3,111,473 UART: [art] Extend RT PCRs Done
3,111,901 UART: [art] Lock RT PCRs Done
3,113,281 UART: [art] Populate DV Done
3,121,424 UART: [fht] FMC Alias Private Key: 7
3,122,508 UART: [art] Derive CDI
3,122,788 UART: [art] Store in in slot 0x4
3,208,331 UART: [art] Derive Key Pair
3,208,691 UART: [art] Store priv key in slot 0x5
3,221,603 UART: [art] Derive Key Pair - Done
3,236,192 UART: [art] Signing Cert with AUTHO
3,236,672 UART: RITY.KEYID = 7
3,251,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,449 UART: [art] PUB.X = 8822EFD28D3B372C3BAB278C09CE6F7358762A022555185C4C44E42AC1EB8013CFB6CBAE22988FDB8BC76EB6963FC381
3,259,225 UART: [art] PUB.Y = F8D70473F653293A4B33834A0A9EB9F4AFF63C7E136B277FDC8BB7641D63E87B5C89FA87308546512D207C1D51C69C7F
3,266,173 UART: [art] SIG.R = 855872F08DC36C1C5F3708234B603D88DD62DE4A494232B2C4CF5DBE3097655E87622FBEE343DE722CBFADC41570BBA5
3,272,950 UART: [art] SIG.S = E78A52E7C69DE209E459D96E7A344FFABEA75E048F1E2B6CD39B7439F1F6974D1A7CA69761FE746CA0011C6927F6718A
3,296,840 UART: Caliptra RT
3,297,185 UART: [state] CFI Enabled
3,405,845 UART: [rt] RT listening for mailbox commands...
3,406,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,689 UART: [rt]cmd =0x4d454153, len=108
3,457,057 >>> mbox cmd response data (12 bytes)
3,457,058 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,729 >>> mbox cmd response: success
5,758,729 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,772,446 UART:
5,772,462 UART: Running Caliptra FMC ...
5,772,870 UART:
5,773,013 UART: [state] CFI Enabled
5,861,992 UART: [art] Extend RT PCRs Done
5,862,420 UART: [art] Lock RT PCRs Done
5,863,457 UART: [art] Populate DV Done
5,871,940 UART: [fht] FMC Alias Private Key: 7
5,873,004 UART: [art] Derive CDI
5,873,284 UART: [art] Store in in slot 0x4
5,958,873 UART: [art] Derive Key Pair
5,959,233 UART: [art] Store priv key in slot 0x5
5,972,199 UART: [art] Derive Key Pair - Done
5,987,079 UART: [art] Signing Cert with AUTHO
5,987,559 UART: RITY.KEYID = 7
6,003,119 UART: [art] Erasing AUTHORITY.KEYID = 7
6,003,884 UART: [art] PUB.X = E9FCD5D0623161D9B20AD94C435A8F5542BB8A3D7294B6FE5A41F86B99D0499E48348849A58110AF482A7EF5B128C7EE
6,010,657 UART: [art] PUB.Y = 45B45DCACBEF49131AE253714448A1CCE4CC25077124EAB7E6D287C25A39FED2C4D0C447A8DA3C5CA6A5009026C4F217
6,017,596 UART: [art] SIG.R = 78CE3C206A457676E6F54E5BB710D994DAD232304CC0276789A464569B4D125F3DAFE7B801F94F66D9A7CA6AD4ED2A7C
6,024,373 UART: [art] SIG.S = 1E5079B1BFEEE9CAD8CC933CE6EB1E523E48BBAFA9E09BB3FCE963596CB4F899F7D7C80BA94EEFCF023475F136FD510C
6,048,307 UART: mbox::rt_entry...
6,048,679 UART: ____ _ _ _ ____ _____
6,049,463 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,050,263 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,051,031 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,051,799 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,052,567 UART: |_|
6,052,879 UART:
6,337,452 UART: [rt] Runtime listening for mailbox commands...
6,338,642 >>> mbox cmd response data (48 bytes)
6,338,643 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,341,426 >>> mbox cmd response data (48 bytes)
6,341,427 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,356,564 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
901,985 UART: [kat] SHA2-256
903,925 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,801 UART: [cold-reset] ++
1,172,133 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 ready_for_fw is high
1,176,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,079 UART: [idev] Sha1 KeyId Algorithm
1,208,633 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,955 UART: [ldev] --
1,281,256 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,598 >>> mbox cmd response: success
2,775,840 UART: [afmc] ++
2,776,008 UART: [afmc] CDI.KEYID = 6
2,776,370 UART: [afmc] SUBJECT.KEYID = 7
2,776,795 UART: [afmc] AUTHORITY.KEYID = 5
2,812,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,939 UART: [afmc] --
2,855,955 UART: [cold-reset] --
2,856,755 UART: [state] Locking Datavault
2,857,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,434 UART: [state] Locking ICCM
2,859,074 UART: [exit] Launching FMC @ 0x40000130
2,864,403 UART:
2,864,419 UART: Running Caliptra FMC ...
2,864,827 UART:
2,864,881 UART: [state] CFI Enabled
2,875,376 UART: [fht] FMC Alias Private Key: 7
2,983,675 UART: [art] Extend RT PCRs Done
2,984,103 UART: [art] Lock RT PCRs Done
2,985,713 UART: [art] Populate DV Done
2,993,894 UART: [fht] FMC Alias Private Key: 7
2,994,916 UART: [art] Derive CDI
2,995,196 UART: [art] Store in in slot 0x4
3,080,787 UART: [art] Derive Key Pair
3,081,147 UART: [art] Store priv key in slot 0x5
3,093,947 UART: [art] Derive Key Pair - Done
3,108,284 UART: [art] Signing Cert with AUTHO
3,108,764 UART: RITY.KEYID = 7
3,123,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,717 UART: [art] PUB.X = 9BDF6428209A62EC8A1A03C382DF01B86F1D392ADFD011074C697BF080DB7708708A5755597ED2FBE941DF840C616485
3,131,474 UART: [art] PUB.Y = E2753459B6A1B5A88E2BED2FC93CD4C68ED87ABF7FC5EBE351598CF87C69EE33D7969088F8AB15A674BF930D60F1D0A8
3,138,439 UART: [art] SIG.R = 49FF1351D84255F6693FE4E96780DACC0B66D549A9570D31F89D8DEAE5FD9EC83E90F71B836EE23601383DAD81B282C5
3,145,208 UART: [art] SIG.S = AD124028C99D0018D2FEDFD42CB9D4F95286F44DA100391BA61AB6E5ECED1C8EFB8B4800659C5B9A9670C40E10359908
3,168,883 UART: Caliptra RT
3,169,136 UART: [state] CFI Enabled
3,276,677 UART: [rt] RT listening for mailbox commands...
3,277,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,783 UART: [rt]cmd =0x4d454153, len=108
3,327,715 >>> mbox cmd response data (12 bytes)
3,327,716 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,369 UART:
3,328,385 UART: Running Caliptra ROM ...
3,328,793 UART:
3,328,848 UART: [state] CFI Enabled
3,331,476 UART: [state] LifecycleState = Unprovisioned
3,332,131 UART: [state] DebugLocked = No
3,332,851 UART: [state] WD Timer not started. Device not locked for debugging
3,334,061 UART: [kat] SHA2-256
4,139,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,143,836 UART: [kat] ++
4,143,988 UART: [kat] sha1
4,148,024 UART: [kat] SHA2-256
4,149,964 UART: [kat] SHA2-384
4,152,673 UART: [kat] SHA2-512-ACC
4,154,573 UART: [kat] ECC-384
4,164,338 UART: [kat] HMAC-384Kdf
4,168,696 UART: [kat] LMS
4,417,024 UART: [kat] --
4,417,618 UART: [update-reset] ++
5,323,136 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,324,263 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,420,645 >>> mbox cmd response: success
5,420,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,420,890 UART: [update-reset] Copying MAN_2 To MAN_1
5,428,904 UART: [update-reset Success] --
5,429,821 UART: [state] Locking Datavault
5,430,829 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,433 UART: [state] Locking ICCM
5,431,903 UART: [exit] Launching FMC @ 0x40000130
5,437,232 UART:
5,437,248 UART: Running Caliptra FMC ...
5,437,656 UART:
5,437,710 UART: [state] CFI Enabled
5,527,121 UART: [art] Extend RT PCRs Done
5,527,549 UART: [art] Lock RT PCRs Done
5,529,012 UART: [art] Populate DV Done
5,537,187 UART: [fht] FMC Alias Private Key: 7
5,538,257 UART: [art] Derive CDI
5,538,537 UART: [art] Store in in slot 0x4
5,624,122 UART: [art] Derive Key Pair
5,624,482 UART: [art] Store priv key in slot 0x5
5,637,952 UART: [art] Derive Key Pair - Done
5,652,514 UART: [art] Signing Cert with AUTHO
5,652,994 UART: RITY.KEYID = 7
5,667,818 UART: [art] Erasing AUTHORITY.KEYID = 7
5,668,583 UART: [art] PUB.X = BCC81283B6BC760C41907893287A964FE2B106545FCD5BA5BE23E5CDB1BA94046C0CCC30DEDF677E7B4D6CD8F35B25A2
5,675,359 UART: [art] PUB.Y = C8E5EF82A20F5AA40181598F29CDB81F38D37AD73B8C70E58CBDE49DF62B8321476975258931FAA6880D7A6BDDB088F2
5,682,310 UART: [art] SIG.R = 386E2F36D6940E7B5925DEC3EB48043B2D7DB83C6B91152A442A9E4155F0B7FAB875106A41395F54B014513209E175B8
5,689,067 UART: [art] SIG.S = 244049CF7F2F9720D4D539569E640E868940219D9A2978465AF2877DD01B6D7D21766EE6F0367683523DCDA50E1CB795
5,712,672 UART: mbox::rt_entry...
5,713,044 UART: ____ _ _ _ ____ _____
5,713,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,714,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,715,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,716,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,716,932 UART: |_|
5,717,244 UART:
5,996,860 UART: [rt] Runtime listening for mailbox commands...
5,998,050 >>> mbox cmd response data (48 bytes)
5,998,051 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,000,834 >>> mbox cmd response data (48 bytes)
6,000,835 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,015,972 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,827 ready_for_fw is high
1,060,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,691 >>> mbox cmd response: success
2,691,579 UART:
2,691,595 UART: Running Caliptra FMC ...
2,692,003 UART:
2,692,057 UART: [state] CFI Enabled
2,702,646 UART: [fht] FMC Alias Private Key: 7
2,810,443 UART: [art] Extend RT PCRs Done
2,810,871 UART: [art] Lock RT PCRs Done
2,812,535 UART: [art] Populate DV Done
2,820,290 UART: [fht] FMC Alias Private Key: 7
2,821,232 UART: [art] Derive CDI
2,821,512 UART: [art] Store in in slot 0x4
2,907,437 UART: [art] Derive Key Pair
2,907,797 UART: [art] Store priv key in slot 0x5
2,921,157 UART: [art] Derive Key Pair - Done
2,935,837 UART: [art] Signing Cert with AUTHO
2,936,317 UART: RITY.KEYID = 7
2,951,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,314 UART: [art] PUB.X = 11034E819B57F9B32C817DE9E566514283786409C0D9DFFB85FBF27A3D292E7620589D5A6E8206684DDF4EABA2568EB7
2,959,077 UART: [art] PUB.Y = 3739DEAFAF7ABC24E33D526EC498378234072EE592816AF8BC402703E631B035A45EE213C694805B693C35040063D69C
2,965,992 UART: [art] SIG.R = 079DA5DC18408C840BE9E5645A0357B2FD872834E3D7794B44417355D110E68289DA4974712AC5AB4ADD315B13E94545
2,972,747 UART: [art] SIG.S = 72946F20A7FD292AF1F032F65CDC3FCB88F60DF562545ADDA73357627DD04C7C540D378F8C43061E2D0921D2A2DE3BFA
2,997,218 UART: Caliptra RT
2,997,471 UART: [state] CFI Enabled
3,105,338 UART: [rt] RT listening for mailbox commands...
3,106,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,448 UART: [rt]cmd =0x4d454153, len=108
3,156,252 >>> mbox cmd response data (12 bytes)
3,156,253 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,132,913 >>> mbox cmd response: success
5,132,913 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,146,641 UART:
5,146,657 UART: Running Caliptra FMC ...
5,147,065 UART:
5,147,119 UART: [state] CFI Enabled
5,236,244 UART: [art] Extend RT PCRs Done
5,236,672 UART: [art] Lock RT PCRs Done
5,237,943 UART: [art] Populate DV Done
5,246,338 UART: [fht] FMC Alias Private Key: 7
5,247,340 UART: [art] Derive CDI
5,247,620 UART: [art] Store in in slot 0x4
5,333,587 UART: [art] Derive Key Pair
5,333,947 UART: [art] Store priv key in slot 0x5
5,347,397 UART: [art] Derive Key Pair - Done
5,362,180 UART: [art] Signing Cert with AUTHO
5,362,660 UART: RITY.KEYID = 7
5,377,792 UART: [art] Erasing AUTHORITY.KEYID = 7
5,378,557 UART: [art] PUB.X = 1721FE7BAFDF96A4DC8AF2DF28AA65458838E8232CF89937A643B47EC0EAC3E4FDCEBD981E38FBB242EB96FE4C4823D7
5,385,351 UART: [art] PUB.Y = C1CDE05AC575E9E8FD46AA81328DD4381609E6460306D4549C8955065073557752365E30CD2B32BBF0B5B002F5EE8708
5,392,279 UART: [art] SIG.R = 0C6B6F23AE8AA816CEEA3B3FCC54FD6639D079B15A5CE16A9BD9948564A87A0C23E124F3016CA345CA7A9C9A34F2DF2A
5,399,060 UART: [art] SIG.S = 9835D2B4B6EE3F29720B8563C587D4B9D1D891919FAE5E69DFA9444F60F860339EF87F4E9E577F62E872FEB2378D31E0
5,422,882 UART: mbox::rt_entry...
5,423,254 UART: ____ _ _ _ ____ _____
5,424,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,424,838 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,425,606 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,426,374 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,427,142 UART: |_|
5,427,454 UART:
5,705,618 UART: [rt] Runtime listening for mailbox commands...
5,706,808 >>> mbox cmd response data (48 bytes)
5,706,809 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,709,592 >>> mbox cmd response data (48 bytes)
5,709,593 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,724,730 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
893,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,282 UART: [kat] ++
897,434 UART: [kat] sha1
901,714 UART: [kat] SHA2-256
903,654 UART: [kat] SHA2-384
906,321 UART: [kat] SHA2-512-ACC
908,222 UART: [kat] ECC-384
917,863 UART: [kat] HMAC-384Kdf
922,447 UART: [kat] LMS
1,170,775 UART: [kat] --
1,171,560 UART: [cold-reset] ++
1,172,134 UART: [fht] FHT @ 0x50003400
1,174,969 UART: [idev] ++
1,175,137 UART: [idev] CDI.KEYID = 6
1,175,497 UART: [idev] SUBJECT.KEYID = 7
1,175,921 UART: [idev] UDS.KEYID = 0
1,176,266 ready_for_fw is high
1,176,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,957 UART: [idev] Erasing UDS.KEYID = 0
1,200,934 UART: [idev] Sha1 KeyId Algorithm
1,209,478 UART: [idev] --
1,210,466 UART: [ldev] ++
1,210,634 UART: [ldev] CDI.KEYID = 6
1,210,997 UART: [ldev] SUBJECT.KEYID = 5
1,211,423 UART: [ldev] AUTHORITY.KEYID = 7
1,211,886 UART: [ldev] FE.KEYID = 1
1,216,948 UART: [ldev] Erasing FE.KEYID = 1
1,243,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,296 UART: [ldev] --
1,282,629 UART: [fwproc] Wait for Commands...
1,283,305 UART: [fwproc] Recv command 0x46574c44
1,284,033 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,743 >>> mbox cmd response: success
2,776,901 UART: [afmc] ++
2,777,069 UART: [afmc] CDI.KEYID = 6
2,777,431 UART: [afmc] SUBJECT.KEYID = 7
2,777,856 UART: [afmc] AUTHORITY.KEYID = 5
2,813,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,494 UART: [afmc] --
2,857,524 UART: [cold-reset] --
2,858,472 UART: [state] Locking Datavault
2,859,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,193 UART: [state] Locking ICCM
2,860,665 UART: [exit] Launching FMC @ 0x40000130
2,865,994 UART:
2,866,010 UART: Running Caliptra FMC ...
2,866,418 UART:
2,866,561 UART: [state] CFI Enabled
2,877,026 UART: [fht] FMC Alias Private Key: 7
2,984,965 UART: [art] Extend RT PCRs Done
2,985,393 UART: [art] Lock RT PCRs Done
2,987,261 UART: [art] Populate DV Done
2,995,682 UART: [fht] FMC Alias Private Key: 7
2,996,628 UART: [art] Derive CDI
2,996,908 UART: [art] Store in in slot 0x4
3,082,697 UART: [art] Derive Key Pair
3,083,057 UART: [art] Store priv key in slot 0x5
3,096,223 UART: [art] Derive Key Pair - Done
3,110,823 UART: [art] Signing Cert with AUTHO
3,111,303 UART: RITY.KEYID = 7
3,126,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,096 UART: [art] PUB.X = A174355D3A540299CFF5AC14DA6BEB8DD65B602C947568B03EEB60A34346A242111A695B7D8CFEA6D3F350D40BCF316C
3,133,872 UART: [art] PUB.Y = 9BB2F3154D895A91008E709BAFB1920335D3F20AAF5D16BD15242CD881166665BEBAA0D44384F9B53C5389E9F9DC4A03
3,140,797 UART: [art] SIG.R = 481E054E41F18F4906E7AEFE3BF0E4F588317EDDBF654379D6BF340558E72C86549615867F5988FC2B41A5C51BE37E0C
3,147,559 UART: [art] SIG.S = 8713F5855338B4612D9A60DB79565FD255F5FCB3CC46ADA9B6023B10983C80CFB7AC79D4A941CF59B20CD720AD0FE92A
3,171,597 UART: Caliptra RT
3,171,942 UART: [state] CFI Enabled
3,278,787 UART: [rt] RT listening for mailbox commands...
3,279,457 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,975 UART: [rt]cmd =0x4d454153, len=108
3,329,863 >>> mbox cmd response data (12 bytes)
3,329,864 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,699 UART:
3,330,715 UART: Running Caliptra ROM ...
3,331,123 UART:
3,331,265 UART: [state] CFI Enabled
3,334,487 UART: [state] LifecycleState = Unprovisioned
3,335,142 UART: [state] DebugLocked = No
3,335,632 UART: [state] WD Timer not started. Device not locked for debugging
3,336,780 UART: [kat] SHA2-256
4,142,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,146,555 UART: [kat] ++
4,146,707 UART: [kat] sha1
4,151,013 UART: [kat] SHA2-256
4,152,953 UART: [kat] SHA2-384
4,155,886 UART: [kat] SHA2-512-ACC
4,157,786 UART: [kat] ECC-384
4,167,441 UART: [kat] HMAC-384Kdf
4,171,965 UART: [kat] LMS
4,420,293 UART: [kat] --
4,421,037 UART: [update-reset] ++
5,325,889 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,327,058 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,423,440 >>> mbox cmd response: success
5,423,440 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,423,707 UART: [update-reset] Copying MAN_2 To MAN_1
5,431,721 UART: [update-reset Success] --
5,432,750 UART: [state] Locking Datavault
5,433,470 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,074 UART: [state] Locking ICCM
5,434,564 UART: [exit] Launching FMC @ 0x40000130
5,439,893 UART:
5,439,909 UART: Running Caliptra FMC ...
5,440,317 UART:
5,440,460 UART: [state] CFI Enabled
5,529,745 UART: [art] Extend RT PCRs Done
5,530,173 UART: [art] Lock RT PCRs Done
5,531,610 UART: [art] Populate DV Done
5,539,917 UART: [fht] FMC Alias Private Key: 7
5,541,037 UART: [art] Derive CDI
5,541,317 UART: [art] Store in in slot 0x4
5,626,530 UART: [art] Derive Key Pair
5,626,890 UART: [art] Store priv key in slot 0x5
5,639,800 UART: [art] Derive Key Pair - Done
5,654,292 UART: [art] Signing Cert with AUTHO
5,654,772 UART: RITY.KEYID = 7
5,670,354 UART: [art] Erasing AUTHORITY.KEYID = 7
5,671,119 UART: [art] PUB.X = 7F92CE15207B4F047630BF8AE994B1958CF645FCC0F614E35CEAE5C49598CF42E76CD1C5D8375F1BDF11F0E16749B0DB
5,677,900 UART: [art] PUB.Y = A9AA2143F5D43E9B79543A6D3B04822CAD547DB8C2CCAC202F40F87B951DCBF9F06A48085EA4FF52E1995C3EF6ED3673
5,684,860 UART: [art] SIG.R = E7A9636FC7CB7179E122C99065A86E3615B897C95251FD08F83EF06149CB970B025E522D0A773C9F21A317D41C406805
5,691,609 UART: [art] SIG.S = 2F7AAEDFAE987D82652525FAB9489FB4F62EB797F807ECD0B016E7E411F16754FE82BC6B543D0706E66ED2AF70C60320
5,715,430 UART: mbox::rt_entry...
5,715,802 UART: ____ _ _ _ ____ _____
5,716,586 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,717,386 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,718,154 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,718,922 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,719,690 UART: |_|
5,720,002 UART:
5,999,156 UART: [rt] Runtime listening for mailbox commands...
6,000,346 >>> mbox cmd response data (48 bytes)
6,000,347 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,003,130 >>> mbox cmd response data (48 bytes)
6,003,131 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,018,268 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 ready_for_fw is high
1,060,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,916 >>> mbox cmd response: success
2,691,264 UART:
2,691,280 UART: Running Caliptra FMC ...
2,691,688 UART:
2,691,831 UART: [state] CFI Enabled
2,702,696 UART: [fht] FMC Alias Private Key: 7
2,811,681 UART: [art] Extend RT PCRs Done
2,812,109 UART: [art] Lock RT PCRs Done
2,813,631 UART: [art] Populate DV Done
2,821,836 UART: [fht] FMC Alias Private Key: 7
2,822,912 UART: [art] Derive CDI
2,823,192 UART: [art] Store in in slot 0x4
2,908,679 UART: [art] Derive Key Pair
2,909,039 UART: [art] Store priv key in slot 0x5
2,922,729 UART: [art] Derive Key Pair - Done
2,937,745 UART: [art] Signing Cert with AUTHO
2,938,225 UART: RITY.KEYID = 7
2,953,519 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,284 UART: [art] PUB.X = 402A924DF313646E979CEF49A671AC709E2BBE4636F10D331150DBFCAD1A6BDFB44C45EE96D83CB1502279F4939D68D4
2,961,061 UART: [art] PUB.Y = EE4FF27F129C026CDA5605D054B95664D247138BC5C7EC5A7C562FE8B1D6582C7401FD1AEDD0E5C935BEFF87FE509B8C
2,968,020 UART: [art] SIG.R = 6F24A1F2EC9BB50F6C3EC0F37DFC27425BA23052AE2CED6BC6A8D2982DBC4C381CF548383D65CC5387F43B520D53239D
2,974,800 UART: [art] SIG.S = 9634FC37DB57B01F02764960D025AB865F3AE31A82C259204214E04F898B6B07A3F9E8F16DD76767774D7F419D34D683
2,998,477 UART: Caliptra RT
2,998,822 UART: [state] CFI Enabled
3,106,415 UART: [rt] RT listening for mailbox commands...
3,107,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,625 UART: [rt]cmd =0x4d454153, len=108
3,157,767 >>> mbox cmd response data (12 bytes)
3,157,768 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,134,637 >>> mbox cmd response: success
5,134,637 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,147,697 UART:
5,147,713 UART: Running Caliptra FMC ...
5,148,121 UART:
5,148,264 UART: [state] CFI Enabled
5,237,693 UART: [art] Extend RT PCRs Done
5,238,121 UART: [art] Lock RT PCRs Done
5,239,058 UART: [art] Populate DV Done
5,247,321 UART: [fht] FMC Alias Private Key: 7
5,248,461 UART: [art] Derive CDI
5,248,741 UART: [art] Store in in slot 0x4
5,334,090 UART: [art] Derive Key Pair
5,334,450 UART: [art] Store priv key in slot 0x5
5,347,664 UART: [art] Derive Key Pair - Done
5,362,561 UART: [art] Signing Cert with AUTHO
5,363,041 UART: RITY.KEYID = 7
5,378,159 UART: [art] Erasing AUTHORITY.KEYID = 7
5,378,924 UART: [art] PUB.X = ED05B3D1A19D7B12CB7784FD09C8ACE8089A8E37AA2DA1309122BF3F7392B35314EE3C7114BE35E7E8FA8C1CB011800A
5,385,696 UART: [art] PUB.Y = 73514FC6373E5F56BE836796844962E7C6FFAE9C20535DF584452E02678022D990EEA010E4F13F954230F50115FE0901
5,392,624 UART: [art] SIG.R = E9048733BD877336346F14AC5F58A6759D8F165B667E5A2B6CB84BC935ED6B115FD8EF93C965C703B33688E5201EC501
5,399,385 UART: [art] SIG.S = 8716A977362C59F27C6719E6019F7CFE590768CE90C7C4A1A32BCD7A4EF85BC920C195A5641BF12CF5813376FED03842
5,423,328 UART: mbox::rt_entry...
5,423,700 UART: ____ _ _ _ ____ _____
5,424,484 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,425,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,426,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,426,820 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,427,588 UART: |_|
5,427,900 UART:
5,709,993 UART: [rt] Runtime listening for mailbox commands...
5,711,183 >>> mbox cmd response data (48 bytes)
5,711,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,713,967 >>> mbox cmd response data (48 bytes)
5,713,968 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,729,105 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,174,187 ready_for_fw is high
1,174,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,010 UART: [ldev] --
1,280,274 UART: [fwproc] Wait for Commands...
1,280,981 UART: [fwproc] Recv command 0x46574c44
1,281,714 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,510 >>> mbox cmd response: success
2,774,643 UART: [afmc] ++
2,774,811 UART: [afmc] CDI.KEYID = 6
2,775,174 UART: [afmc] SUBJECT.KEYID = 7
2,775,600 UART: [afmc] AUTHORITY.KEYID = 5
2,811,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,968 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,462 UART: [afmc] --
2,854,530 UART: [cold-reset] --
2,855,322 UART: [state] Locking Datavault
2,856,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,987 UART: [state] Locking ICCM
2,857,491 UART: [exit] Launching FMC @ 0x40000130
2,862,820 UART:
2,862,836 UART: Running Caliptra FMC ...
2,863,244 UART:
2,863,298 UART: [state] CFI Enabled
2,873,733 UART: [fht] FMC Alias Private Key: 7
2,981,630 UART: [art] Extend RT PCRs Done
2,982,058 UART: [art] Lock RT PCRs Done
2,983,758 UART: [art] Populate DV Done
2,992,049 UART: [fht] FMC Alias Private Key: 7
2,993,007 UART: [art] Derive CDI
2,993,287 UART: [art] Store in in slot 0x4
3,078,998 UART: [art] Derive Key Pair
3,079,358 UART: [art] Store priv key in slot 0x5
3,093,196 UART: [art] Derive Key Pair - Done
3,107,922 UART: [art] Signing Cert with AUTHO
3,108,402 UART: RITY.KEYID = 7
3,123,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,255 UART: [art] PUB.X = 1A22BCC2C8F1EA6650A3A26E1683364C2FEA0B612816E306A7D040E86046FC8C4EDF7FD4D40B6FFF7B332C279AC3D530
3,131,030 UART: [art] PUB.Y = 45EF6D360D5757C38CFB98EFC45BC686EC7F7AF9DC366A851249F9EEE3319F574509EFFA19819F05251BD8ED792188C2
3,137,981 UART: [art] SIG.R = 0B855BED0E35E46FA0B861731FF248BC2034A4559212DA071A87529DC11064E86A6D0DA4550BC86A08AB29E0822073AF
3,144,735 UART: [art] SIG.S = 87A4C80B385A60722DF1791341EAB81A94AAA76A146F57744F724B3E17F30C1648106A04E206030C4102E96071AA59AE
3,168,375 UART: Caliptra RT
3,168,628 UART: [state] CFI Enabled
3,275,685 UART: [rt] RT listening for mailbox commands...
3,276,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,693 UART: [rt]cmd =0x4d454153, len=108
3,327,657 >>> mbox cmd response data (12 bytes)
3,327,658 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,509 UART:
3,328,525 UART: Running Caliptra ROM ...
3,328,933 UART:
3,328,988 UART: [state] CFI Enabled
3,332,004 UART: [state] LifecycleState = Unprovisioned
3,332,659 UART: [state] DebugLocked = No
3,333,265 UART: [state] WD Timer not started. Device not locked for debugging
3,334,501 UART: [kat] SHA2-256
4,138,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,142,180 UART: [kat] ++
4,142,332 UART: [kat] sha1
4,146,578 UART: [kat] SHA2-256
4,148,518 UART: [kat] SHA2-384
4,151,049 UART: [kat] SHA2-512-ACC
4,152,949 UART: [kat] ECC-384
4,162,718 UART: [kat] HMAC-384Kdf
4,167,294 UART: [kat] LMS
4,415,606 UART: [kat] --
4,416,404 UART: [update-reset] ++
5,321,017 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,322,184 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,418,566 >>> mbox cmd response: success
5,418,566 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,418,735 UART: [update-reset] Copying MAN_2 To MAN_1
5,426,749 UART: [update-reset Success] --
5,427,588 UART: [state] Locking Datavault
5,428,336 UART: [state] Locking PCR0, PCR1 and PCR31
5,428,940 UART: [state] Locking ICCM
5,429,466 UART: [exit] Launching FMC @ 0x40000130
5,434,795 UART:
5,434,811 UART: Running Caliptra FMC ...
5,435,219 UART:
5,435,273 UART: [state] CFI Enabled
5,524,296 UART: [art] Extend RT PCRs Done
5,524,724 UART: [art] Lock RT PCRs Done
5,526,091 UART: [art] Populate DV Done
5,534,228 UART: [fht] FMC Alias Private Key: 7
5,535,170 UART: [art] Derive CDI
5,535,450 UART: [art] Store in in slot 0x4
5,621,207 UART: [art] Derive Key Pair
5,621,567 UART: [art] Store priv key in slot 0x5
5,634,555 UART: [art] Derive Key Pair - Done
5,648,912 UART: [art] Signing Cert with AUTHO
5,649,392 UART: RITY.KEYID = 7
5,664,410 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,175 UART: [art] PUB.X = 8CADBDB9DE29957ABEB50FC79B53C1B773684AC2900D72A10BCEDE6F20D38E69ED6EBCDC980A832A939E75B8A89358E3
5,671,955 UART: [art] PUB.Y = D20B0DFF671AE51AB478A134A18A88EA44DB6F3BC02757BB03BE2AAA815E70D5DB582B01F3D02125E2637D6DAAD866FA
5,678,913 UART: [art] SIG.R = 040DF99A85D4145E47C5465180A2D988BBDD45AFD7D20368A87A674764FD4E44DCE0554F669F48C4F3AAA38E26694CF7
5,685,680 UART: [art] SIG.S = D06602BC0BDBDC5CE5D250D8B480A7269388911BD8ABB1703F9E5D6A45999FD9CF9193C4C57C45C136B23B9C6E212F91
5,709,671 UART: mbox::rt_entry...
5,710,043 UART: ____ _ _ _ ____ _____
5,710,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,711,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,712,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,713,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,713,931 UART: |_|
5,714,243 UART:
5,993,207 UART: [rt] Runtime listening for mailbox commands...
5,994,397 >>> mbox cmd response data (48 bytes)
5,994,398 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,997,181 >>> mbox cmd response data (48 bytes)
5,997,182 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,012,319 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 ready_for_fw is high
1,055,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,942 >>> mbox cmd response: success
2,684,440 UART:
2,684,456 UART: Running Caliptra FMC ...
2,684,864 UART:
2,684,918 UART: [state] CFI Enabled
2,695,213 UART: [fht] FMC Alias Private Key: 7
2,803,294 UART: [art] Extend RT PCRs Done
2,803,722 UART: [art] Lock RT PCRs Done
2,805,566 UART: [art] Populate DV Done
2,813,909 UART: [fht] FMC Alias Private Key: 7
2,814,925 UART: [art] Derive CDI
2,815,205 UART: [art] Store in in slot 0x4
2,900,930 UART: [art] Derive Key Pair
2,901,290 UART: [art] Store priv key in slot 0x5
2,914,476 UART: [art] Derive Key Pair - Done
2,929,347 UART: [art] Signing Cert with AUTHO
2,929,827 UART: RITY.KEYID = 7
2,944,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,614 UART: [art] PUB.X = 9B469F58103EB9648E51711731DE421054BA8FCA0D45EF287BACCC402FB624BC0737D9382EA05F423498FC2C78E5CDAD
2,952,388 UART: [art] PUB.Y = 74E06E04467C258CE6184151A70A399F395075363B66D063F3BAFCE8964346897B6118B26463F951433ACEF33B63A3D1
2,959,322 UART: [art] SIG.R = 71929F1A7395664C31B9757A2F53D48AC09E6BA26C95348E9D52ED74E736A0E995A1DAB93AEF705E584674EF9D007F0F
2,966,071 UART: [art] SIG.S = AA71046C6D4EAD40DD08CB0EC8C788E5EE3D8458AED122418EC8A9FD629AB35F09BF4DD753FA571D95CB39C7629EE940
2,990,126 UART: Caliptra RT
2,990,379 UART: [state] CFI Enabled
3,097,454 UART: [rt] RT listening for mailbox commands...
3,098,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,840 UART: [rt]cmd =0x4d454153, len=108
3,150,054 >>> mbox cmd response data (12 bytes)
3,150,055 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,121,988 >>> mbox cmd response: success
5,121,988 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,134,978 UART:
5,134,994 UART: Running Caliptra FMC ...
5,135,402 UART:
5,135,456 UART: [state] CFI Enabled
5,224,743 UART: [art] Extend RT PCRs Done
5,225,171 UART: [art] Lock RT PCRs Done
5,226,460 UART: [art] Populate DV Done
5,234,535 UART: [fht] FMC Alias Private Key: 7
5,235,543 UART: [art] Derive CDI
5,235,823 UART: [art] Store in in slot 0x4
5,321,376 UART: [art] Derive Key Pair
5,321,736 UART: [art] Store priv key in slot 0x5
5,335,424 UART: [art] Derive Key Pair - Done
5,350,293 UART: [art] Signing Cert with AUTHO
5,350,773 UART: RITY.KEYID = 7
5,365,321 UART: [art] Erasing AUTHORITY.KEYID = 7
5,366,086 UART: [art] PUB.X = 5D6B36D69F6FCD181F52F51F0CCCD76A6C5DF363459F6E9A70A7D3781181BDFE82D9C23A298DECE0FDB95BE19A22234B
5,372,873 UART: [art] PUB.Y = 04D986A98B64CBE42A0940262F6BBA189301D39E25B5E2E707EB7D4B5985FE2B4414D8FB67B4FBE5BC6C6C6DCD873CE2
5,379,827 UART: [art] SIG.R = FDFB33B391FB0E6FE9314565ABCC95118AE58D38C0FC5BCA7125F1989697714D5F6D5B31EF731D8719DA9C1250FF7FE8
5,386,608 UART: [art] SIG.S = 2A5B06327E8695C0FC16A6953045C5C875E586C1DF91BC895418EF2F765E88AB9A0AF0030C9FB48752E7CA08C9E7A79C
5,409,994 UART: mbox::rt_entry...
5,410,366 UART: ____ _ _ _ ____ _____
5,411,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,411,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,412,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,413,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,414,254 UART: |_|
5,414,566 UART:
5,695,492 UART: [rt] Runtime listening for mailbox commands...
5,696,682 >>> mbox cmd response data (48 bytes)
5,696,683 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,699,466 >>> mbox cmd response data (48 bytes)
5,699,467 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,714,604 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 ready_for_fw is high
1,174,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,198,872 UART: [idev] Sha1 KeyId Algorithm
1,207,730 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,357 UART: [ldev] SUBJECT.KEYID = 5
1,209,784 UART: [ldev] AUTHORITY.KEYID = 7
1,210,247 UART: [ldev] FE.KEYID = 1
1,215,561 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,969 >>> mbox cmd response: success
2,774,234 UART: [afmc] ++
2,774,402 UART: [afmc] CDI.KEYID = 6
2,774,765 UART: [afmc] SUBJECT.KEYID = 7
2,775,191 UART: [afmc] AUTHORITY.KEYID = 5
2,810,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,521 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,165 UART: [afmc] --
2,854,201 UART: [cold-reset] --
2,855,007 UART: [state] Locking Datavault
2,856,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,996 UART: [state] Locking ICCM
2,857,564 UART: [exit] Launching FMC @ 0x40000130
2,862,893 UART:
2,862,909 UART: Running Caliptra FMC ...
2,863,317 UART:
2,863,460 UART: [state] CFI Enabled
2,873,933 UART: [fht] FMC Alias Private Key: 7
2,982,426 UART: [art] Extend RT PCRs Done
2,982,854 UART: [art] Lock RT PCRs Done
2,984,244 UART: [art] Populate DV Done
2,992,565 UART: [fht] FMC Alias Private Key: 7
2,993,649 UART: [art] Derive CDI
2,993,929 UART: [art] Store in in slot 0x4
3,079,852 UART: [art] Derive Key Pair
3,080,212 UART: [art] Store priv key in slot 0x5
3,093,832 UART: [art] Derive Key Pair - Done
3,108,627 UART: [art] Signing Cert with AUTHO
3,109,107 UART: RITY.KEYID = 7
3,124,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,948 UART: [art] PUB.X = 14A49E23CC68B917EC2FB8A01B9A7E03A7D1C8E7F4B21BE67228BB941CF9B3DDA18A8255FF6D52EA6A5E38F5C7E58522
3,131,733 UART: [art] PUB.Y = BC59A3C3E65672E14B42CDC3D2262C030A99C543DBED47CDC2CC18B9F452297B77540C850735DDAD82C2C6243FAD362C
3,138,683 UART: [art] SIG.R = BD72CDCF0B2C32AA494C42DBC144E2016F350EF4C92AD0D23162116021B0141034A54575E4B4D1AA90AB80733B804E0B
3,145,447 UART: [art] SIG.S = 16F921B6074A71FEB77553EE0A1179F81425D9859AE80E0BF8241B8F08195B07403225D7986BBE19F6CB5679A15411EE
3,169,276 UART: Caliptra RT
3,169,621 UART: [state] CFI Enabled
3,277,634 UART: [rt] RT listening for mailbox commands...
3,278,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,736 UART: [rt]cmd =0x4d454153, len=108
3,329,160 >>> mbox cmd response data (12 bytes)
3,329,161 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,234 UART:
3,330,250 UART: Running Caliptra ROM ...
3,330,658 UART:
3,330,800 UART: [state] CFI Enabled
3,333,536 UART: [state] LifecycleState = Unprovisioned
3,334,191 UART: [state] DebugLocked = No
3,334,763 UART: [state] WD Timer not started. Device not locked for debugging
3,335,981 UART: [kat] SHA2-256
4,139,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,143,660 UART: [kat] ++
4,143,812 UART: [kat] sha1
4,147,978 UART: [kat] SHA2-256
4,149,918 UART: [kat] SHA2-384
4,152,475 UART: [kat] SHA2-512-ACC
4,154,375 UART: [kat] ECC-384
4,164,204 UART: [kat] HMAC-384Kdf
4,168,746 UART: [kat] LMS
4,417,058 UART: [kat] --
4,417,960 UART: [update-reset] ++
5,322,109 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,323,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,419,558 >>> mbox cmd response: success
5,419,558 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,419,813 UART: [update-reset] Copying MAN_2 To MAN_1
5,427,827 UART: [update-reset Success] --
5,428,832 UART: [state] Locking Datavault
5,429,750 UART: [state] Locking PCR0, PCR1 and PCR31
5,430,354 UART: [state] Locking ICCM
5,430,996 UART: [exit] Launching FMC @ 0x40000130
5,436,325 UART:
5,436,341 UART: Running Caliptra FMC ...
5,436,749 UART:
5,436,892 UART: [state] CFI Enabled
5,525,619 UART: [art] Extend RT PCRs Done
5,526,047 UART: [art] Lock RT PCRs Done
5,527,268 UART: [art] Populate DV Done
5,535,395 UART: [fht] FMC Alias Private Key: 7
5,536,551 UART: [art] Derive CDI
5,536,831 UART: [art] Store in in slot 0x4
5,622,334 UART: [art] Derive Key Pair
5,622,694 UART: [art] Store priv key in slot 0x5
5,636,148 UART: [art] Derive Key Pair - Done
5,650,909 UART: [art] Signing Cert with AUTHO
5,651,389 UART: RITY.KEYID = 7
5,666,829 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,594 UART: [art] PUB.X = EE084575E8EEAD52A7A800947B735BD743AE02CCC5DB372853E0BDD507C67943A85BE283E80E744479A7D97F845CE977
5,674,336 UART: [art] PUB.Y = CAE1A2226AE15CB60697F95ACCACBDFEC61DDEC0B1A45C61FE588EF357420CBCDE63080342F0C9D86CE797D8D1D85FA6
5,681,302 UART: [art] SIG.R = 66B0C6AEE27D770D514FF326E5C8425A12DDD9476900BA118EEFA26D55B016D017EE6FA69E1C6B68EBF500B83C0A3CA6
5,688,038 UART: [art] SIG.S = 35FBDAE16A2E856E025F18ACADB59BA7EAECD421A59D4A1DF3926320DABFDF502DD9B6D327A32F0FBC0D871725BAE9FC
5,711,494 UART: mbox::rt_entry...
5,711,866 UART: ____ _ _ _ ____ _____
5,712,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,713,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,714,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,714,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,715,754 UART: |_|
5,716,066 UART:
5,994,042 UART: [rt] Runtime listening for mailbox commands...
5,995,232 >>> mbox cmd response data (48 bytes)
5,995,233 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,998,016 >>> mbox cmd response data (48 bytes)
5,998,017 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,013,154 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,927 ready_for_fw is high
1,055,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,327 >>> mbox cmd response: success
2,686,661 UART:
2,686,677 UART: Running Caliptra FMC ...
2,687,085 UART:
2,687,228 UART: [state] CFI Enabled
2,697,921 UART: [fht] FMC Alias Private Key: 7
2,805,824 UART: [art] Extend RT PCRs Done
2,806,252 UART: [art] Lock RT PCRs Done
2,807,800 UART: [art] Populate DV Done
2,816,059 UART: [fht] FMC Alias Private Key: 7
2,817,027 UART: [art] Derive CDI
2,817,307 UART: [art] Store in in slot 0x4
2,902,786 UART: [art] Derive Key Pair
2,903,146 UART: [art] Store priv key in slot 0x5
2,916,420 UART: [art] Derive Key Pair - Done
2,931,041 UART: [art] Signing Cert with AUTHO
2,931,521 UART: RITY.KEYID = 7
2,947,083 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,848 UART: [art] PUB.X = 5A0561F28AD3E6F3FF5B75C4FF62B05D786E6BAD522F2834FCA9A7C36CAD49714201E00D03201A70F80A3F4C04F33B61
2,954,610 UART: [art] PUB.Y = D7D370E2A8FEBD75CF2FDB67D534A790230ECDAF42279672E5AE9FC603153ED2D69A7E7BE8D37CAC9045416C61A453EE
2,961,572 UART: [art] SIG.R = 737E3119382F03DE07D913730FF99564ECDA67CC1526263332037BDE4E5A176DC96D4031057D61BB5B6719E5916B3BB2
2,968,323 UART: [art] SIG.S = 43EEE48038E3629D4A83FB6778E27440BAEECC346EBDFCCD1C5235C43AE79CB19FC2628A8BDBAC60BFB892004F923C8D
2,991,996 UART: Caliptra RT
2,992,341 UART: [state] CFI Enabled
3,101,008 UART: [rt] RT listening for mailbox commands...
3,101,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,254 UART: [rt]cmd =0x4d454153, len=108
3,152,562 >>> mbox cmd response data (12 bytes)
3,152,563 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,125,035 >>> mbox cmd response: success
5,125,035 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,138,553 UART:
5,138,569 UART: Running Caliptra FMC ...
5,138,977 UART:
5,139,120 UART: [state] CFI Enabled
5,227,789 UART: [art] Extend RT PCRs Done
5,228,217 UART: [art] Lock RT PCRs Done
5,229,620 UART: [art] Populate DV Done
5,237,825 UART: [fht] FMC Alias Private Key: 7
5,238,957 UART: [art] Derive CDI
5,239,237 UART: [art] Store in in slot 0x4
5,325,042 UART: [art] Derive Key Pair
5,325,402 UART: [art] Store priv key in slot 0x5
5,338,330 UART: [art] Derive Key Pair - Done
5,353,007 UART: [art] Signing Cert with AUTHO
5,353,487 UART: RITY.KEYID = 7
5,368,623 UART: [art] Erasing AUTHORITY.KEYID = 7
5,369,388 UART: [art] PUB.X = 76AE509D6F5BE8BEFCC2EFBBA3866EE5D31286412693A9CB52DB1C692D2C59DF1E1CEF7F4CD9F8E3CB2B12D680630454
5,376,177 UART: [art] PUB.Y = 47F0EDBFCCC9D92CC945081D81D427528FA0C16D33CD7EB4E2A184C64BD542332EAF42482D40421CD89F9EE2759D283B
5,383,136 UART: [art] SIG.R = 8FD3AE34BB06AF39A66A5524716E38BD66A0DA83D4D6FC4D92557B81526FB0FF7D66992709ADEE6BE35C12C3BA93A8E4
5,389,916 UART: [art] SIG.S = 8A252E5777821264801043BC6A98E409F6F9D6D6625C161D091FC1D9038668D39BA522770AABB2FE1BA1F15F36AFC820
5,413,047 UART: mbox::rt_entry...
5,413,419 UART: ____ _ _ _ ____ _____
5,414,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,415,003 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,415,771 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,416,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,417,307 UART: |_|
5,417,619 UART:
5,700,862 UART: [rt] Runtime listening for mailbox commands...
5,702,052 >>> mbox cmd response data (48 bytes)
5,702,053 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,704,836 >>> mbox cmd response data (48 bytes)
5,704,837 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,719,974 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,034 UART:
192,418 UART: Running Caliptra ROM ...
193,615 UART:
193,770 UART: [state] CFI Enabled
264,984 UART: [state] LifecycleState = Unprovisioned
267,096 UART: [state] DebugLocked = No
268,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,343 UART: [kat] SHA2-256
444,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,533 UART: [kat] ++
454,978 UART: [kat] sha1
466,136 UART: [kat] SHA2-256
468,783 UART: [kat] SHA2-384
474,130 UART: [kat] SHA2-512-ACC
476,501 UART: [kat] ECC-384
2,767,931 UART: [kat] HMAC-384Kdf
2,799,843 UART: [kat] LMS
3,990,150 UART: [kat] --
3,996,983 UART: [cold-reset] ++
3,998,134 UART: [fht] Storing FHT @ 0x50003400
4,010,393 UART: [idev] ++
4,010,962 UART: [idev] CDI.KEYID = 6
4,011,881 UART: [idev] SUBJECT.KEYID = 7
4,013,135 UART: [idev] UDS.KEYID = 0
4,014,171 ready_for_fw is high
4,014,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,296 UART: [idev] Erasing UDS.KEYID = 0
7,346,796 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,068 UART: [idev] --
7,372,997 UART: [ldev] ++
7,373,562 UART: [ldev] CDI.KEYID = 6
7,374,539 UART: [ldev] SUBJECT.KEYID = 5
7,375,749 UART: [ldev] AUTHORITY.KEYID = 7
7,377,048 UART: [ldev] FE.KEYID = 1
7,413,149 UART: [ldev] Erasing FE.KEYID = 1
10,744,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,147 UART: [ldev] --
13,106,816 UART: [fwproc] Waiting for Commands...
13,108,961 UART: [fwproc] Received command 0x46574c44
13,111,197 UART: [fwproc] Received Image of size 114124 bytes
17,163,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,941 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,627,241 >>> mbox cmd response: success
17,627,809 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,631,021 UART: [afmc] ++
17,631,610 UART: [afmc] CDI.KEYID = 6
17,632,527 UART: [afmc] SUBJECT.KEYID = 7
17,633,747 UART: [afmc] AUTHORITY.KEYID = 5
20,998,039 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,298,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,160 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,315,573 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,330,400 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,344,802 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,366,607 UART: [afmc] --
23,369,657 UART: [cold-reset] --
23,375,082 UART: [state] Locking Datavault
23,378,767 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,467 UART: [state] Locking ICCM
23,382,511 UART: [exit] Launching FMC @ 0x40000130
23,390,881 UART:
23,391,158 UART: Running Caliptra FMC ...
23,392,268 UART:
23,392,433 UART: [state] CFI Enabled
23,458,485 UART: [fht] FMC Alias Private Key: 7
25,797,114 UART: [art] Extend RT PCRs Done
25,798,329 UART: [art] Lock RT PCRs Done
25,800,004 UART: [art] Populate DV Done
25,805,476 UART: [fht] FMC Alias Private Key: 7
25,807,080 UART: [art] Derive CDI
25,807,898 UART: [art] Store in in slot 0x4
25,867,395 UART: [art] Derive Key Pair
25,868,433 UART: [art] Store priv key in slot 0x5
29,160,988 UART: [art] Derive Key Pair - Done
29,173,989 UART: [art] Signing Cert with AUTHO
29,175,292 UART: RITY.KEYID = 7
31,462,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,092 UART: [art] PUB.X = 8FF7B64CD85978E4466A146BBF3EFA9F124D9C4F23173DC9A8BE37570FA560F215AA98893080AE3DD20391C2696B1BA7
31,471,374 UART: [art] PUB.Y = 50C3D62660D6A3329FAEA54A23D0E0367D3D7780960E153A2F9C06F2E9A70AC6F4EEACC55D6A5239E8D2A00BBE0C0A2F
31,478,633 UART: [art] SIG.R = CE8B5EE7021AED633C3A7038685CB63DCDB96889EAAC79C2FBCA98976CFEB880BE12B20A9DDD9604F070D3283A6FE8A0
31,486,036 UART: [art] SIG.S = AFB6E6D8F6B37D855AD8F407F59956CCB4DAA58AE63F947A2526E0A1E759EFAD95BB18B26CE792D0248BB1225F2335CD
32,791,026 UART: Caliptra RT
32,791,726 UART: [state] CFI Enabled
32,953,198 UART: [rt] RT listening for mailbox commands...
32,984,777 UART: [rt]cmd =0x54514754, len=24
32,987,273 >>> mbox cmd response data (8 bytes)
32,987,786 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,017,676 UART: [rt]cmd =0x54514754, len=24
33,019,494 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,922 writing to cptra_bootfsm_go
3,781,984 ready_for_fw is high
3,782,369 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,844,876 >>> mbox cmd response: success
17,845,696 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,532,990 UART:
23,533,381 UART: Running Caliptra FMC ...
23,534,492 UART:
23,534,645 UART: [state] CFI Enabled
23,597,207 UART: [fht] FMC Alias Private Key: 7
25,935,589 UART: [art] Extend RT PCRs Done
25,936,809 UART: [art] Lock RT PCRs Done
25,938,736 UART: [art] Populate DV Done
25,944,171 UART: [fht] FMC Alias Private Key: 7
25,945,771 UART: [art] Derive CDI
25,946,513 UART: [art] Store in in slot 0x4
26,005,210 UART: [art] Derive Key Pair
26,006,258 UART: [art] Store priv key in slot 0x5
29,298,935 UART: [art] Derive Key Pair - Done
29,311,929 UART: [art] Signing Cert with AUTHO
29,313,231 UART: RITY.KEYID = 7
31,599,997 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,631 UART: [art] PUB.X = 6977E72610A3E77A3E92EE70EFE720F72DA700DB0593F0E5FEA4B9FB112F3B15F95A6AA77AF5F8537E0525992196CF24
31,608,767 UART: [art] PUB.Y = BB9AEE0C0D18D5540DDDB2E38B92E8881ABC0496C8D7A579C0D5878EE50E14F04AA6BC9CA87FBB57E36373111DDF4553
31,616,054 UART: [art] SIG.R = 7268285CC825C0FD207CBD477822C6A1327C64F484978B80FB1B6AE31697BDFA9BB5E3C02EB6035B0A2354075833B2E3
31,623,402 UART: [art] SIG.S = B25785421A02C4984C15FAD8079F04EB030F550EB6F850532B9EA3D21958188FA4FB4C31D448E83E9BE3466971CE1AF1
32,928,495 UART: Caliptra RT
32,929,200 UART: [state] CFI Enabled
33,088,532 UART: [rt] RT listening for mailbox commands...
33,119,845 UART: [rt]cmd =0x54514754, len=24
33,122,462 >>> mbox cmd response data (8 bytes)
33,122,975 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,152,920 UART: [rt]cmd =0x54514754, len=24
33,154,521 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,478 UART:
192,840 UART: Running Caliptra ROM ...
193,960 UART:
603,748 UART: [state] CFI Enabled
617,789 UART: [state] LifecycleState = Unprovisioned
619,736 UART: [state] DebugLocked = No
621,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,880 UART: [kat] SHA2-256
796,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,204 UART: [kat] ++
807,641 UART: [kat] sha1
819,520 UART: [kat] SHA2-256
822,211 UART: [kat] SHA2-384
829,482 UART: [kat] SHA2-512-ACC
831,915 UART: [kat] ECC-384
3,119,395 UART: [kat] HMAC-384Kdf
3,131,068 UART: [kat] LMS
4,321,174 UART: [kat] --
4,324,265 UART: [cold-reset] ++
4,325,702 UART: [fht] Storing FHT @ 0x50003400
4,336,503 UART: [idev] ++
4,337,107 UART: [idev] CDI.KEYID = 6
4,337,993 UART: [idev] SUBJECT.KEYID = 7
4,339,232 UART: [idev] UDS.KEYID = 0
4,340,381 ready_for_fw is high
4,340,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,755 UART: [idev] Erasing UDS.KEYID = 0
7,629,765 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,842 UART: [idev] --
7,656,083 UART: [ldev] ++
7,656,703 UART: [ldev] CDI.KEYID = 6
7,657,673 UART: [ldev] SUBJECT.KEYID = 5
7,658,877 UART: [ldev] AUTHORITY.KEYID = 7
7,660,100 UART: [ldev] FE.KEYID = 1
7,670,035 UART: [ldev] Erasing FE.KEYID = 1
10,960,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,580 UART: [ldev] --
13,320,899 UART: [fwproc] Waiting for Commands...
13,324,071 UART: [fwproc] Received command 0x46574c44
13,326,300 UART: [fwproc] Received Image of size 114124 bytes
17,382,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,461,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,530,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,848,660 >>> mbox cmd response: success
17,849,211 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,853,637 UART: [afmc] ++
17,854,273 UART: [afmc] CDI.KEYID = 6
17,855,182 UART: [afmc] SUBJECT.KEYID = 7
17,856,409 UART: [afmc] AUTHORITY.KEYID = 5
21,170,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,218 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,471 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,846 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,696 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,151 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,533,206 UART: [afmc] --
23,537,599 UART: [cold-reset] --
23,542,489 UART: [state] Locking Datavault
23,548,975 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,730 UART: [state] Locking ICCM
23,551,792 UART: [exit] Launching FMC @ 0x40000130
23,560,184 UART:
23,560,414 UART: Running Caliptra FMC ...
23,561,457 UART:
23,561,625 UART: [state] CFI Enabled
23,569,832 UART: [fht] FMC Alias Private Key: 7
25,900,181 UART: [art] Extend RT PCRs Done
25,901,408 UART: [art] Lock RT PCRs Done
25,903,080 UART: [art] Populate DV Done
25,908,383 UART: [fht] FMC Alias Private Key: 7
25,910,023 UART: [art] Derive CDI
25,910,753 UART: [art] Store in in slot 0x4
25,953,237 UART: [art] Derive Key Pair
25,954,276 UART: [art] Store priv key in slot 0x5
29,196,382 UART: [art] Derive Key Pair - Done
29,209,217 UART: [art] Signing Cert with AUTHO
29,210,542 UART: RITY.KEYID = 7
31,490,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,590 UART: [art] PUB.X = DF4D08F4BB78157FB2723C2CE35F3010215544696390BC4F8AD156CD9BC5EEED69D0594E41A43E3E472222686CB64957
31,498,782 UART: [art] PUB.Y = E4806944172AF6CED48631C4A6659CF5947DF5B13F8CA05F809145A91089BA394F636071271CEB0BF96AFF574D82AA82
31,506,025 UART: [art] SIG.R = E32EBC65AC21301247D888CD6DC001BF81E271F20D38AC6B407E1A0EEA8E4CA68CABF40E6888F49DBD950D2C0D65CD69
31,513,412 UART: [art] SIG.S = C870DFADDDDAEC64899228A0EE86DFA523A8532E0648612ABEFBE6F9D3C6F07A13A031879902463FDA694ED9B90070F0
32,818,107 UART: Caliptra RT
32,818,804 UART: [state] CFI Enabled
32,936,511 UART: [rt] RT listening for mailbox commands...
32,967,865 UART: [rt]cmd =0x54514754, len=24
32,970,527 >>> mbox cmd response data (8 bytes)
32,970,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,001,037 UART: [rt]cmd =0x54514754, len=24
33,002,808 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,130,859 ready_for_fw is high
4,131,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,702 >>> mbox cmd response: success
18,066,366 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,707,201 UART:
23,707,595 UART: Running Caliptra FMC ...
23,708,728 UART:
23,708,881 UART: [state] CFI Enabled
23,716,829 UART: [fht] FMC Alias Private Key: 7
26,047,909 UART: [art] Extend RT PCRs Done
26,049,143 UART: [art] Lock RT PCRs Done
26,050,672 UART: [art] Populate DV Done
26,056,109 UART: [fht] FMC Alias Private Key: 7
26,057,769 UART: [art] Derive CDI
26,058,587 UART: [art] Store in in slot 0x4
26,101,087 UART: [art] Derive Key Pair
26,102,131 UART: [art] Store priv key in slot 0x5
29,344,164 UART: [art] Derive Key Pair - Done
29,357,113 UART: [art] Signing Cert with AUTHO
29,358,416 UART: RITY.KEYID = 7
31,638,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,633 UART: [art] PUB.X = 67AB326DD718D8E2DB565A07754338300871EDF16C75F54F45C16E134F2655FB383477E1B944A4F7B8682E29890D0C09
31,646,882 UART: [art] PUB.Y = EF82AEBA2295650199A0BF0CBED444B67F0725D7F14F27E107E33D58D34E7EEEC267110B470EED6BAD1C9B3F8B1A7B94
31,654,177 UART: [art] SIG.R = 7F4680A03D9E03A87E4EFACE3BCF8C73E655A9B30EA4C4B914161F70D29C7E046464847E09930EC7DEAD3D934B9F2D82
31,661,512 UART: [art] SIG.S = 8DC8230039416B07593BC9DC60475F528F41475B4636DC169E6FF73369FC29FDD84F2DAEA08F737C96B8F1376AC7300A
32,967,075 UART: Caliptra RT
32,967,798 UART: [state] CFI Enabled
33,085,764 UART: [rt] RT listening for mailbox commands...
33,117,319 UART: [rt]cmd =0x54514754, len=24
33,119,963 >>> mbox cmd response data (8 bytes)
33,120,444 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,150,416 UART: [rt]cmd =0x54514754, len=24
33,152,425 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
191,976 UART:
192,336 UART: Running Caliptra ROM ...
193,484 UART:
193,632 UART: [state] CFI Enabled
266,219 UART: [state] LifecycleState = Unprovisioned
268,142 UART: [state] DebugLocked = No
270,810 UART: [state] WD Timer not started. Device not locked for debugging
273,777 UART: [kat] SHA2-256
452,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,480 UART: [kat] ++
464,932 UART: [kat] sha1
475,377 UART: [kat] SHA2-256
478,381 UART: [kat] SHA2-384
485,149 UART: [kat] SHA2-512-ACC
488,149 UART: [kat] ECC-384
2,950,770 UART: [kat] HMAC-384Kdf
2,972,880 UART: [kat] LMS
3,502,270 UART: [kat] --
3,507,510 UART: [cold-reset] ++
3,509,736 UART: [fht] FHT @ 0x50003400
3,520,713 UART: [idev] ++
3,521,282 UART: [idev] CDI.KEYID = 6
3,522,280 UART: [idev] SUBJECT.KEYID = 7
3,523,398 UART: [idev] UDS.KEYID = 0
3,524,385 ready_for_fw is high
3,524,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,625 UART: [idev] Erasing UDS.KEYID = 0
6,027,847 UART: [idev] Sha1 KeyId Algorithm
6,051,318 UART: [idev] --
6,054,341 UART: [ldev] ++
6,054,918 UART: [ldev] CDI.KEYID = 6
6,055,833 UART: [ldev] SUBJECT.KEYID = 5
6,056,991 UART: [ldev] AUTHORITY.KEYID = 7
6,058,280 UART: [ldev] FE.KEYID = 1
6,100,072 UART: [ldev] Erasing FE.KEYID = 1
8,605,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,699 UART: [ldev] --
10,415,075 UART: [fwproc] Wait for Commands...
10,417,055 UART: [fwproc] Recv command 0x46574c44
10,419,159 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,835 >>> mbox cmd response: success
14,278,371 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,282,401 UART: [afmc] ++
14,283,027 UART: [afmc] CDI.KEYID = 6
14,283,945 UART: [afmc] SUBJECT.KEYID = 7
14,285,112 UART: [afmc] AUTHORITY.KEYID = 5
16,823,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,095 UART: [afmc] --
18,629,148 UART: [cold-reset] --
18,633,329 UART: [state] Locking Datavault
18,640,090 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,790 UART: [state] Locking ICCM
18,644,537 UART: [exit] Launching FMC @ 0x40000130
18,652,931 UART:
18,653,183 UART: Running Caliptra FMC ...
18,654,284 UART:
18,654,446 UART: [state] CFI Enabled
18,710,428 UART: [fht] FMC Alias Private Key: 7
20,474,535 UART: [art] Extend RT PCRs Done
20,475,760 UART: [art] Lock RT PCRs Done
20,477,548 UART: [art] Populate DV Done
20,482,857 UART: [fht] FMC Alias Private Key: 7
20,484,554 UART: [art] Derive CDI
20,485,365 UART: [art] Store in in slot 0x4
20,543,310 UART: [art] Derive Key Pair
20,544,351 UART: [art] Store priv key in slot 0x5
23,007,029 UART: [art] Derive Key Pair - Done
23,020,030 UART: [art] Signing Cert with AUTHO
23,021,338 UART: RITY.KEYID = 7
24,733,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,937 UART: [art] PUB.X = E427B46B0922EB4F9814D77F8274CF9619A0FCCFB6F9B767410EB1E836E098506ECA3F9535FD8C6B186554C8498B0CCF
24,742,041 UART: [art] PUB.Y = 6E998DAF5EF53F199CC2743B885DB277CD925B4A742A40F8F9B4877BACFD0CF4157BACA199757E60D4378227A9B64491
24,749,332 UART: [art] SIG.R = D73E0F3C0E910D070A350B8BF5A9095DFC760450A9CC4FFBBF1404E799ADFAF7A67B73FB90ABF30830A7FF732C8690B9
24,756,724 UART: [art] SIG.S = F763EE92159C80BE440E9873D37B454050A8992FD9DFE816CF3268F19BC095C9A932CECE66AF521337D0F9473E960671
25,735,282 UART: Caliptra RT
25,735,977 UART: [state] CFI Enabled
25,901,278 UART: [rt] RT listening for mailbox commands...
25,933,090 UART: [rt]cmd =0x54514754, len=24
25,935,690 >>> mbox cmd response data (8 bytes)
25,936,304 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,966,268 UART: [rt]cmd =0x54514754, len=24
25,968,023 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,363,998 ready_for_fw is high
3,364,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,051,681 >>> mbox cmd response: success
14,052,493 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,350,740 UART:
18,351,136 UART: Running Caliptra FMC ...
18,352,246 UART:
18,352,401 UART: [state] CFI Enabled
18,415,275 UART: [fht] FMC Alias Private Key: 7
20,179,001 UART: [art] Extend RT PCRs Done
20,180,239 UART: [art] Lock RT PCRs Done
20,181,945 UART: [art] Populate DV Done
20,187,469 UART: [fht] FMC Alias Private Key: 7
20,189,177 UART: [art] Derive CDI
20,189,995 UART: [art] Store in in slot 0x4
20,247,606 UART: [art] Derive Key Pair
20,248,606 UART: [art] Store priv key in slot 0x5
22,711,494 UART: [art] Derive Key Pair - Done
22,724,021 UART: [art] Signing Cert with AUTHO
22,725,323 UART: RITY.KEYID = 7
24,437,119 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,605 UART: [art] PUB.X = 7C1CEDAD289AC6FC4F6D8B16B02F1DB464FDE949D3DCA7686D3C04F473E13A8559EAE52A00C6A7A996F89AA3C86E152D
24,445,859 UART: [art] PUB.Y = 638C8469CF7BB39EB5222F80A9779198B46FEB571F85DA3A0184BE89AA7D56E5B71A6CC1003DD1654F4CE7032E3FE7B8
24,453,175 UART: [art] SIG.R = C270A272FC67676305DE00691589CA8E0C9693882969EDE0A61FA4B6DC07B6B03FAAD26A9FB03149D51C6F993B25D1D3
24,460,516 UART: [art] SIG.S = 67CD4B7B06D1A527794A673C6F9E6C7226A111F9390BC4617AB581C255814BAE65924C9435181DB305481A78E55261B7
25,439,210 UART: Caliptra RT
25,439,927 UART: [state] CFI Enabled
25,604,525 UART: [rt] RT listening for mailbox commands...
25,635,992 UART: [rt]cmd =0x54514754, len=24
25,638,287 >>> mbox cmd response data (8 bytes)
25,638,712 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,668,662 UART: [rt]cmd =0x54514754, len=24
25,670,148 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,448 UART:
192,843 UART: Running Caliptra ROM ...
194,024 UART:
603,627 UART: [state] CFI Enabled
616,807 UART: [state] LifecycleState = Unprovisioned
618,682 UART: [state] DebugLocked = No
619,912 UART: [state] WD Timer not started. Device not locked for debugging
623,221 UART: [kat] SHA2-256
802,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,900 UART: [kat] ++
814,341 UART: [kat] sha1
825,484 UART: [kat] SHA2-256
828,483 UART: [kat] SHA2-384
833,363 UART: [kat] SHA2-512-ACC
836,295 UART: [kat] ECC-384
3,277,552 UART: [kat] HMAC-384Kdf
3,288,568 UART: [kat] LMS
3,818,054 UART: [kat] --
3,820,562 UART: [cold-reset] ++
3,822,130 UART: [fht] FHT @ 0x50003400
3,832,895 UART: [idev] ++
3,833,450 UART: [idev] CDI.KEYID = 6
3,834,471 UART: [idev] SUBJECT.KEYID = 7
3,835,565 UART: [idev] UDS.KEYID = 0
3,836,605 ready_for_fw is high
3,836,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,980,529 UART: [idev] Erasing UDS.KEYID = 0
6,307,329 UART: [idev] Sha1 KeyId Algorithm
6,330,663 UART: [idev] --
6,334,750 UART: [ldev] ++
6,335,308 UART: [ldev] CDI.KEYID = 6
6,336,263 UART: [ldev] SUBJECT.KEYID = 5
6,337,461 UART: [ldev] AUTHORITY.KEYID = 7
6,338,700 UART: [ldev] FE.KEYID = 1
6,349,831 UART: [ldev] Erasing FE.KEYID = 1
8,823,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,266 UART: [ldev] --
10,613,367 UART: [fwproc] Wait for Commands...
10,615,290 UART: [fwproc] Recv command 0x46574c44
10,617,374 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,083 >>> mbox cmd response: success
14,485,600 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,488,640 UART: [afmc] ++
14,489,226 UART: [afmc] CDI.KEYID = 6
14,490,129 UART: [afmc] SUBJECT.KEYID = 7
14,491,285 UART: [afmc] AUTHORITY.KEYID = 5
16,992,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,675 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,918 UART: [afmc] --
18,788,395 UART: [cold-reset] --
18,791,549 UART: [state] Locking Datavault
18,798,028 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,729 UART: [state] Locking ICCM
18,801,388 UART: [exit] Launching FMC @ 0x40000130
18,809,794 UART:
18,810,027 UART: Running Caliptra FMC ...
18,811,122 UART:
18,811,272 UART: [state] CFI Enabled
18,819,799 UART: [fht] FMC Alias Private Key: 7
20,576,811 UART: [art] Extend RT PCRs Done
20,578,034 UART: [art] Lock RT PCRs Done
20,579,897 UART: [art] Populate DV Done
20,585,032 UART: [fht] FMC Alias Private Key: 7
20,586,731 UART: [art] Derive CDI
20,587,538 UART: [art] Store in in slot 0x4
20,630,225 UART: [art] Derive Key Pair
20,631,234 UART: [art] Store priv key in slot 0x5
23,058,174 UART: [art] Derive Key Pair - Done
23,071,063 UART: [art] Signing Cert with AUTHO
23,072,393 UART: RITY.KEYID = 7
24,777,991 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,494 UART: [art] PUB.X = 7FEA07B83EA18DEE1C18762CA95DACE3DAC7BDE9C0A3922563FF2C433EA5FE6FD4E18A76D00FEC52B9B46FD04742C755
24,786,783 UART: [art] PUB.Y = C84598357CA17B9098D43116A6090A1CB5B01FD92C2D99981EAC8B5AA9C2F36E826666898AD035918A927FD8365987F2
24,794,058 UART: [art] SIG.R = 9891597F589A60974CCD7F324C2DEEB50BB01DE2474EDB2C01462E4C7C600017474275154E1237083EF6FB2C52B9F717
24,801,382 UART: [art] SIG.S = 479294294A5B58362A43F4319262B10155B3ED429172E254D4A40B643B8B3659444653031559627B639D065500477011
25,780,027 UART: Caliptra RT
25,780,742 UART: [state] CFI Enabled
25,896,955 UART: [rt] RT listening for mailbox commands...
25,928,584 UART: [rt]cmd =0x54514754, len=24
25,931,110 >>> mbox cmd response data (8 bytes)
25,931,618 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,961,415 UART: [rt]cmd =0x54514754, len=24
25,963,259 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,696,820 ready_for_fw is high
3,697,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,428 >>> mbox cmd response: success
14,272,298 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,524,303 UART:
18,524,709 UART: Running Caliptra FMC ...
18,525,903 UART:
18,526,063 UART: [state] CFI Enabled
18,533,965 UART: [fht] FMC Alias Private Key: 7
20,291,019 UART: [art] Extend RT PCRs Done
20,292,249 UART: [art] Lock RT PCRs Done
20,293,496 UART: [art] Populate DV Done
20,298,800 UART: [fht] FMC Alias Private Key: 7
20,300,498 UART: [art] Derive CDI
20,301,312 UART: [art] Store in in slot 0x4
20,343,968 UART: [art] Derive Key Pair
20,344,961 UART: [art] Store priv key in slot 0x5
22,771,776 UART: [art] Derive Key Pair - Done
22,784,773 UART: [art] Signing Cert with AUTHO
22,786,079 UART: RITY.KEYID = 7
24,491,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,066 UART: [art] PUB.X = F9B7B7910E7C5A11F8E3C9A08E1DBEC79F0A3218B949EFAAAE4964962B45071236EA9C3239E61AB6A6B73BC5B111F791
24,500,315 UART: [art] PUB.Y = C957DB3835DF81079986290CE2EADED8C4F468D121BCB795ADAB22E5BD6B2AB0B648D68255A955DA6FDA11C4FE96D934
24,507,570 UART: [art] SIG.R = C88D2544CDB0EE32735771ED4DA9797A29FF5BFDF3D551C1F99EC24B73A7708C1476A3ABF075B06869D6271B105A2950
24,514,952 UART: [art] SIG.S = 3622A75F71D6EFBF4627594F6F3D18E13067A4A0596D40FCC765118B3C41B8BCABE39E0225772D7B3EE434F56049CB33
25,493,681 UART: Caliptra RT
25,494,378 UART: [state] CFI Enabled
25,611,492 UART: [rt] RT listening for mailbox commands...
25,643,125 UART: [rt]cmd =0x54514754, len=24
25,645,587 >>> mbox cmd response data (8 bytes)
25,645,997 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,675,836 UART: [rt]cmd =0x54514754, len=24
25,677,572 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
191,999 UART:
192,383 UART: Running Caliptra ROM ...
193,578 UART:
193,734 UART: [state] CFI Enabled
265,398 UART: [state] LifecycleState = Unprovisioned
267,748 UART: [state] DebugLocked = No
269,345 UART: [state] WD Timer not started. Device not locked for debugging
273,596 UART: [kat] SHA2-256
463,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,194 UART: [kat] ++
474,650 UART: [kat] sha1
485,610 UART: [kat] SHA2-256
488,624 UART: [kat] SHA2-384
493,259 UART: [kat] SHA2-512-ACC
495,846 UART: [kat] ECC-384
2,947,554 UART: [kat] HMAC-384Kdf
2,972,801 UART: [kat] LMS
3,504,605 UART: [kat] --
3,507,772 UART: [cold-reset] ++
3,509,654 UART: [fht] FHT @ 0x50003400
3,521,276 UART: [idev] ++
3,521,908 UART: [idev] CDI.KEYID = 6
3,522,863 UART: [idev] SUBJECT.KEYID = 7
3,524,105 UART: [idev] UDS.KEYID = 0
3,525,004 ready_for_fw is high
3,525,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,204 UART: [idev] Erasing UDS.KEYID = 0
6,033,459 UART: [idev] Sha1 KeyId Algorithm
6,054,632 UART: [idev] --
6,059,648 UART: [ldev] ++
6,060,326 UART: [ldev] CDI.KEYID = 6
6,061,213 UART: [ldev] SUBJECT.KEYID = 5
6,062,389 UART: [ldev] AUTHORITY.KEYID = 7
6,063,642 UART: [ldev] FE.KEYID = 1
6,099,548 UART: [ldev] Erasing FE.KEYID = 1
8,602,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,233 UART: [ldev] --
10,411,859 UART: [fwproc] Wait for Commands...
10,415,083 UART: [fwproc] Recv command 0x46574c44
10,417,394 UART: [fwproc] Recv'd Img size: 114448 bytes
13,862,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,597,839 >>> mbox cmd response: success
14,598,353 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,602,423 UART: [afmc] ++
14,603,154 UART: [afmc] CDI.KEYID = 6
14,604,351 UART: [afmc] SUBJECT.KEYID = 7
14,605,789 UART: [afmc] AUTHORITY.KEYID = 5
17,152,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,237 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,986 UART: [afmc] --
18,969,648 UART: [cold-reset] --
18,973,896 UART: [state] Locking Datavault
18,979,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,822 UART: [state] Locking ICCM
18,984,462 UART: [exit] Launching FMC @ 0x40000130
18,993,151 UART:
18,993,385 UART: Running Caliptra FMC ...
18,994,485 UART:
18,994,642 UART: [state] CFI Enabled
19,051,063 UART: [fht] FMC Alias Private Key: 7
20,814,899 UART: [art] Extend RT PCRs Done
20,816,113 UART: [art] Lock RT PCRs Done
20,817,790 UART: [art] Populate DV Done
20,823,249 UART: [fht] FMC Alias Private Key: 7
20,824,837 UART: [art] Derive CDI
20,825,648 UART: [art] Store in in slot 0x4
20,883,907 UART: [art] Derive Key Pair
20,884,942 UART: [art] Store priv key in slot 0x5
23,347,493 UART: [art] Derive Key Pair - Done
23,360,437 UART: [art] Signing Cert with AUTHO
23,361,729 UART: RITY.KEYID = 7
25,074,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,072 UART: [art] PUB.X = 9611F8492D075DB007CDD96D1BDE2FBAA9C06FCD605D783572E9569788B3BC7476DE0192BDFF3B53D8037F9B6EA4CB85
25,083,318 UART: [art] PUB.Y = 7382BCF576F77BF807D9E86632F285D402458D42F1A0F5E01932D7D5FD70CA5D27342A23740C1C63682B4A1C72F3E0AA
25,090,605 UART: [art] SIG.R = 353B3166972302173CE759628EBE82391CD81C1790960FFB65D780A392502683E7E442C5AFD0F1EF6352ABFDA8E12AC8
25,097,942 UART: [art] SIG.S = 367A6150A8F1538915FD57B6EA46B93BEC4828946F7AA015072C3E4B7E709E1209D69A25E969706132A74C04F1F4D935
26,076,772 UART: Caliptra RT
26,077,496 UART: [state] CFI Enabled
26,242,453 UART: [rt] RT listening for mailbox commands...
26,273,929 UART: [rt]cmd =0x54514754, len=24
26,276,570 >>> mbox cmd response data (8 bytes)
26,277,078 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,307,168 UART: [rt]cmd =0x54514754, len=24
26,309,129 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,441,303 ready_for_fw is high
3,441,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,721 >>> mbox cmd response: success
14,736,370 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,028,308 UART:
19,028,690 UART: Running Caliptra FMC ...
19,029,891 UART:
19,030,061 UART: [state] CFI Enabled
19,094,630 UART: [fht] FMC Alias Private Key: 7
20,858,477 UART: [art] Extend RT PCRs Done
20,859,701 UART: [art] Lock RT PCRs Done
20,861,433 UART: [art] Populate DV Done
20,866,895 UART: [fht] FMC Alias Private Key: 7
20,868,443 UART: [art] Derive CDI
20,869,261 UART: [art] Store in in slot 0x4
20,926,687 UART: [art] Derive Key Pair
20,927,718 UART: [art] Store priv key in slot 0x5
23,391,481 UART: [art] Derive Key Pair - Done
23,404,637 UART: [art] Signing Cert with AUTHO
23,405,973 UART: RITY.KEYID = 7
25,117,159 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,646 UART: [art] PUB.X = 8A38A091F113835D65C560DCE61B0C9E54306F3A67E5271534D2A63462CC50252B21D05DD8829CC45BD773AAE54F2914
25,125,892 UART: [art] PUB.Y = 7C772B35C95DAE272869E91171012C8C201F00C6CDD77907671CB862A0AEE7C7614B0C37E7B4D007325BDF0100658896
25,133,133 UART: [art] SIG.R = 7BAAD30D01CB8953D1CCC274FBD092E0DBCECC301F28E180DA725CF56D9E7E5394B17D250A332CBC9D8F777E3D918C36
25,140,520 UART: [art] SIG.S = 99B69AD0259B3EFC6698DA60100CEBF2E573A43949B42C2BA011A5E963E8D369CC09730B91A79DEBFAB49C7EE18C79F8
26,119,601 UART: Caliptra RT
26,120,333 UART: [state] CFI Enabled
26,283,749 UART: [rt] RT listening for mailbox commands...
26,315,108 UART: [rt]cmd =0x54514754, len=24
26,317,913 >>> mbox cmd response data (8 bytes)
26,318,320 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,348,268 UART: [rt]cmd =0x54514754, len=24
26,350,131 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,423 UART:
192,791 UART: Running Caliptra ROM ...
193,887 UART:
603,670 UART: [state] CFI Enabled
620,160 UART: [state] LifecycleState = Unprovisioned
622,529 UART: [state] DebugLocked = No
624,551 UART: [state] WD Timer not started. Device not locked for debugging
628,318 UART: [kat] SHA2-256
818,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,962 UART: [kat] ++
829,561 UART: [kat] sha1
841,145 UART: [kat] SHA2-256
844,214 UART: [kat] SHA2-384
851,828 UART: [kat] SHA2-512-ACC
854,399 UART: [kat] ECC-384
3,294,085 UART: [kat] HMAC-384Kdf
3,306,973 UART: [kat] LMS
3,838,810 UART: [kat] --
3,842,806 UART: [cold-reset] ++
3,844,726 UART: [fht] FHT @ 0x50003400
3,855,142 UART: [idev] ++
3,855,809 UART: [idev] CDI.KEYID = 6
3,856,763 UART: [idev] SUBJECT.KEYID = 7
3,857,955 UART: [idev] UDS.KEYID = 0
3,859,217 ready_for_fw is high
3,859,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,459 UART: [idev] Erasing UDS.KEYID = 0
6,338,300 UART: [idev] Sha1 KeyId Algorithm
6,359,214 UART: [idev] --
6,364,279 UART: [ldev] ++
6,364,946 UART: [ldev] CDI.KEYID = 6
6,365,824 UART: [ldev] SUBJECT.KEYID = 5
6,367,022 UART: [ldev] AUTHORITY.KEYID = 7
6,368,246 UART: [ldev] FE.KEYID = 1
6,381,977 UART: [ldev] Erasing FE.KEYID = 1
8,859,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,535 UART: [ldev] --
10,648,464 UART: [fwproc] Wait for Commands...
10,651,210 UART: [fwproc] Recv command 0x46574c44
10,653,528 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,847 >>> mbox cmd response: success
14,836,385 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,839,308 UART: [afmc] ++
14,840,000 UART: [afmc] CDI.KEYID = 6
14,841,243 UART: [afmc] SUBJECT.KEYID = 7
14,842,677 UART: [afmc] AUTHORITY.KEYID = 5
17,346,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,678 UART: [afmc] --
19,146,220 UART: [cold-reset] --
19,149,048 UART: [state] Locking Datavault
19,155,745 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,928 UART: [state] Locking ICCM
19,159,371 UART: [exit] Launching FMC @ 0x40000130
19,168,035 UART:
19,168,265 UART: Running Caliptra FMC ...
19,169,359 UART:
19,169,508 UART: [state] CFI Enabled
19,177,411 UART: [fht] FMC Alias Private Key: 7
20,934,098 UART: [art] Extend RT PCRs Done
20,935,385 UART: [art] Lock RT PCRs Done
20,937,145 UART: [art] Populate DV Done
20,942,658 UART: [fht] FMC Alias Private Key: 7
20,944,188 UART: [art] Derive CDI
20,944,946 UART: [art] Store in in slot 0x4
20,987,476 UART: [art] Derive Key Pair
20,988,508 UART: [art] Store priv key in slot 0x5
23,415,265 UART: [art] Derive Key Pair - Done
23,428,314 UART: [art] Signing Cert with AUTHO
23,429,611 UART: RITY.KEYID = 7
25,135,241 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,741 UART: [art] PUB.X = B89C76DD1815D4CFFD27BEFE509A9D12C7CB72196C8F25BC2F34A434A417E5A20D241D366CE58A8B978108485AF064DB
25,144,031 UART: [art] PUB.Y = 88E8DDEAF145E482E3DE4ADA7349C9250CF128F5EB6134D623E2BFA8804FE4B1A5DA5CF6F192D249DAA0ACCBF49F5B0A
25,151,303 UART: [art] SIG.R = CAF67F33B056306C01FA67A1BD6B9D0E36E4A16B32EBAA30A54D88E28B228304669E48998F6B2D99DF260942FAE6B81B
25,158,682 UART: [art] SIG.S = 9A164F0FE46C2588BDBC85BFECEA862C08864C822DECE71CEE6F83BFCA2E418E6605AD47BE350DD8DDDEB8A487940B07
26,136,954 UART: Caliptra RT
26,137,684 UART: [state] CFI Enabled
26,254,518 UART: [rt] RT listening for mailbox commands...
26,285,936 UART: [rt]cmd =0x54514754, len=24
26,288,508 >>> mbox cmd response data (8 bytes)
26,288,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,318,535 UART: [rt]cmd =0x54514754, len=24
26,320,501 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,752,264 ready_for_fw is high
3,752,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,948,113 >>> mbox cmd response: success
14,948,852 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,203,709 UART:
19,204,101 UART: Running Caliptra FMC ...
19,205,197 UART:
19,205,347 UART: [state] CFI Enabled
19,213,351 UART: [fht] FMC Alias Private Key: 7
20,970,696 UART: [art] Extend RT PCRs Done
20,971,918 UART: [art] Lock RT PCRs Done
20,973,405 UART: [art] Populate DV Done
20,978,644 UART: [fht] FMC Alias Private Key: 7
20,980,337 UART: [art] Derive CDI
20,981,067 UART: [art] Store in in slot 0x4
21,023,776 UART: [art] Derive Key Pair
21,024,818 UART: [art] Store priv key in slot 0x5
23,451,390 UART: [art] Derive Key Pair - Done
23,464,281 UART: [art] Signing Cert with AUTHO
23,465,579 UART: RITY.KEYID = 7
25,171,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,605 UART: [art] PUB.X = EA490EE92F040316D1C341CD3F0EA166985A69E8E9EDFD3996863A65A86B3FE45D8AA02750E9D681615A552793E2ED82
25,179,841 UART: [art] PUB.Y = 53FDCA7B7741CE2F3E3FD755E6B6EC4253646117B79235CE487CAB584F41FC80421FDECD63601E5C03C4E12B782474C6
25,187,142 UART: [art] SIG.R = C196DFF6B1C825F2747961541DB926DE03D60C804D898C22E4B072F586B1397FF0628F61119495E8333E4BE42CA27921
25,194,468 UART: [art] SIG.S = 28F95685DB0D6B106F890DF6EF5A37F1CB46B0281FB8E139010181E681856F3D794DEB490BC50E03F5EE0DCFEE306B84
26,173,870 UART: Caliptra RT
26,174,579 UART: [state] CFI Enabled
26,292,249 UART: [rt] RT listening for mailbox commands...
26,323,935 UART: [rt]cmd =0x54514754, len=24
26,326,577 >>> mbox cmd response data (8 bytes)
26,327,065 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,356,977 UART: [rt]cmd =0x54514754, len=24
26,358,838 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,476 UART: [kat] SHA2-512-ACC
897,377 UART: [kat] ECC-384
903,068 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,927 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 ready_for_fw is high
1,480,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,128 UART: [idev] Erasing UDS.KEYID = 0
1,506,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,606 UART: [idev] --
1,515,549 UART: [ldev] ++
1,515,717 UART: [ldev] CDI.KEYID = 6
1,516,080 UART: [ldev] SUBJECT.KEYID = 5
1,516,506 UART: [ldev] AUTHORITY.KEYID = 7
1,516,969 UART: [ldev] FE.KEYID = 1
1,522,351 UART: [ldev] Erasing FE.KEYID = 1
1,548,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,904 UART: [ldev] --
1,587,347 UART: [fwproc] Waiting for Commands...
1,588,202 UART: [fwproc] Received command 0x46574c44
1,588,993 UART: [fwproc] Received Image of size 114448 bytes
2,887,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,125 >>> mbox cmd response: success
3,080,125 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,167 UART: [afmc] ++
3,081,335 UART: [afmc] CDI.KEYID = 6
3,081,697 UART: [afmc] SUBJECT.KEYID = 7
3,082,122 UART: [afmc] AUTHORITY.KEYID = 5
3,116,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,384 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,074 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,779 UART: [afmc] --
3,159,839 UART: [cold-reset] --
3,160,687 UART: [state] Locking Datavault
3,161,952 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,556 UART: [state] Locking ICCM
3,163,132 UART: [exit] Launching FMC @ 0x40000130
3,168,461 UART:
3,168,477 UART: Running Caliptra FMC ...
3,168,885 UART:
3,168,939 UART: [state] CFI Enabled
3,179,412 UART: [fht] FMC Alias Private Key: 7
3,287,017 UART: [art] Extend RT PCRs Done
3,287,445 UART: [art] Lock RT PCRs Done
3,289,043 UART: [art] Populate DV Done
3,297,194 UART: [fht] FMC Alias Private Key: 7
3,298,208 UART: [art] Derive CDI
3,298,488 UART: [art] Store in in slot 0x4
3,384,201 UART: [art] Derive Key Pair
3,384,561 UART: [art] Store priv key in slot 0x5
3,398,105 UART: [art] Derive Key Pair - Done
3,412,813 UART: [art] Signing Cert with AUTHO
3,413,293 UART: RITY.KEYID = 7
3,428,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,386 UART: [art] PUB.X = 9D21D6B5D1FE293BB48B435F643DD12457A857316AB9F30DEE9C97023102C3FAF55F477A8BBA11D4E4740DC5DA045CEC
3,436,155 UART: [art] PUB.Y = 5D0CABE4F4298693F4F6B1B9B4C5FE710FCF0876030571D2FCD0CDFC0BDBCF87F051620252C9866D6EA56475C9A77590
3,443,096 UART: [art] SIG.R = F08FC16EABD6689F13449051140D92DFEAB5A188F752491CC93220487E2B3C6397A94BCBFDE3314CAE4F5254F435A3AD
3,449,873 UART: [art] SIG.S = 87AA5286944164E89CAB353BE06302601E75061020C39017F316EBBAF3B54838FB2E52DFAB3735783C1C1934C101C30D
3,473,962 UART: Caliptra RT
3,474,215 UART: [state] CFI Enabled
3,582,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,197 UART: [rt]cmd =0x54514754, len=24
3,615,413 >>> mbox cmd response data (8 bytes)
3,615,414 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,891 UART: [rt]cmd =0x54514754, len=24
3,646,456 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,033 ready_for_fw is high
1,362,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,365 >>> mbox cmd response: success
2,927,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,715 UART:
2,988,731 UART: Running Caliptra FMC ...
2,989,139 UART:
2,989,193 UART: [state] CFI Enabled
2,999,432 UART: [fht] FMC Alias Private Key: 7
3,107,339 UART: [art] Extend RT PCRs Done
3,107,767 UART: [art] Lock RT PCRs Done
3,109,177 UART: [art] Populate DV Done
3,117,642 UART: [fht] FMC Alias Private Key: 7
3,118,734 UART: [art] Derive CDI
3,119,014 UART: [art] Store in in slot 0x4
3,204,819 UART: [art] Derive Key Pair
3,205,179 UART: [art] Store priv key in slot 0x5
3,218,079 UART: [art] Derive Key Pair - Done
3,232,433 UART: [art] Signing Cert with AUTHO
3,232,913 UART: RITY.KEYID = 7
3,248,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,126 UART: [art] PUB.X = 53A1683CF8EEF94FEE56F6D81AA76CA77D13CEC53A1D392C673DA55CABCD18132E9646DBA873EB0D6EB193C7B28CA3F3
3,255,917 UART: [art] PUB.Y = B8D9BF2329837FEEF8E7AB07A3E9F916C47323AB8A3DD3114D37F136BE3A79C8513369540C837FBF5C095EA1F9081B08
3,262,860 UART: [art] SIG.R = 264EF90E95A9D8C748CF38272B05C19F48A7FBEDCB0330F3EA042777DDDA9A71EDFD5C375D9834908EEEA2856A506824
3,269,630 UART: [art] SIG.S = 05A82837FA9255C84491C172C694D98E75737B22A1D3F035074B1BF867D0BE4514A42EAA386886CA06A6D61E853707B1
3,293,293 UART: Caliptra RT
3,293,546 UART: [state] CFI Enabled
3,402,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,470 UART: [rt]cmd =0x54514754, len=24
3,435,760 >>> mbox cmd response data (8 bytes)
3,435,761 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,186 UART: [rt]cmd =0x54514754, len=24
3,466,271 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,571 UART: [kat] LMS
1,475,767 UART: [kat] --
1,476,684 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,480,127 UART: [idev] ++
1,480,295 UART: [idev] CDI.KEYID = 6
1,480,655 UART: [idev] SUBJECT.KEYID = 7
1,481,079 UART: [idev] UDS.KEYID = 0
1,481,424 ready_for_fw is high
1,481,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,365 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,967 UART: [idev] --
1,515,056 UART: [ldev] ++
1,515,224 UART: [ldev] CDI.KEYID = 6
1,515,587 UART: [ldev] SUBJECT.KEYID = 5
1,516,013 UART: [ldev] AUTHORITY.KEYID = 7
1,516,476 UART: [ldev] FE.KEYID = 1
1,521,636 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,337 UART: [ldev] --
1,586,600 UART: [fwproc] Waiting for Commands...
1,587,413 UART: [fwproc] Received command 0x46574c44
1,588,204 UART: [fwproc] Received Image of size 114448 bytes
2,887,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,324 >>> mbox cmd response: success
3,080,324 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,578 UART: [afmc] ++
3,081,746 UART: [afmc] CDI.KEYID = 6
3,082,108 UART: [afmc] SUBJECT.KEYID = 7
3,082,533 UART: [afmc] AUTHORITY.KEYID = 5
3,118,196 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,059 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,749 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,626 UART: [afmc] --
3,161,534 UART: [cold-reset] --
3,162,488 UART: [state] Locking Datavault
3,163,697 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,301 UART: [state] Locking ICCM
3,164,861 UART: [exit] Launching FMC @ 0x40000130
3,170,190 UART:
3,170,206 UART: Running Caliptra FMC ...
3,170,614 UART:
3,170,757 UART: [state] CFI Enabled
3,181,248 UART: [fht] FMC Alias Private Key: 7
3,289,385 UART: [art] Extend RT PCRs Done
3,289,813 UART: [art] Lock RT PCRs Done
3,291,537 UART: [art] Populate DV Done
3,299,738 UART: [fht] FMC Alias Private Key: 7
3,300,758 UART: [art] Derive CDI
3,301,038 UART: [art] Store in in slot 0x4
3,386,977 UART: [art] Derive Key Pair
3,387,337 UART: [art] Store priv key in slot 0x5
3,400,529 UART: [art] Derive Key Pair - Done
3,414,978 UART: [art] Signing Cert with AUTHO
3,415,458 UART: RITY.KEYID = 7
3,430,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,623 UART: [art] PUB.X = 64C31F3C0CABD744B9F774707B4796717C4FDDF9DA8180AEA49876C0AFCE9EF3A599F967C31CA5FA28FE0A798719BCDE
3,438,407 UART: [art] PUB.Y = 7FCDF60BAFE1C2C82AB86B59776512413DFB4EC77F248C71D058D10B5F245CF5058910E9A4B22B714BFDD960F24B0E94
3,445,357 UART: [art] SIG.R = 76E7EB9983B91654F7E4CBA6FA60BD83973C7F95FB3C2CEAAED71262D0BE3A44D38C998AA4422423F62FCDDBFDA52C8D
3,452,151 UART: [art] SIG.S = 5C48977FCFB656A0BB2C82ABC20CEB36677E74AE4B7828170A1B6596AB0B89C7E757BE68567E758687ABB29807A9CFB8
3,475,948 UART: Caliptra RT
3,476,293 UART: [state] CFI Enabled
3,583,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,197 UART: [rt]cmd =0x54514754, len=24
3,616,493 >>> mbox cmd response data (8 bytes)
3,616,494 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,133 UART: [rt]cmd =0x54514754, len=24
3,647,546 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,786 ready_for_fw is high
1,363,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,104 >>> mbox cmd response: success
2,930,104 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,978 UART:
2,991,994 UART: Running Caliptra FMC ...
2,992,402 UART:
2,992,545 UART: [state] CFI Enabled
3,003,206 UART: [fht] FMC Alias Private Key: 7
3,111,525 UART: [art] Extend RT PCRs Done
3,111,953 UART: [art] Lock RT PCRs Done
3,113,565 UART: [art] Populate DV Done
3,121,748 UART: [fht] FMC Alias Private Key: 7
3,122,904 UART: [art] Derive CDI
3,123,184 UART: [art] Store in in slot 0x4
3,208,935 UART: [art] Derive Key Pair
3,209,295 UART: [art] Store priv key in slot 0x5
3,222,605 UART: [art] Derive Key Pair - Done
3,237,111 UART: [art] Signing Cert with AUTHO
3,237,591 UART: RITY.KEYID = 7
3,252,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,580 UART: [art] PUB.X = C9A7FB7AC3AF729FF6460DA985E9142216F537152BA1A02ABA20A83C51D69A7A68A59B84F419604BB3C6CACC08951D0B
3,260,353 UART: [art] PUB.Y = 7476AC28B2DAC04681F63E4173402A408E496BCED043E5B2981CF5B5332E915A3389A7D5B9DE549E418433F9A79D00A5
3,267,281 UART: [art] SIG.R = F6AA462202DD7AAE037C9902839BFB5CF1E33D9DD8F53565E46CF90A73DCFB86A0B7EF2DC036029C7C51458C4DD3416A
3,274,052 UART: [art] SIG.S = D71D9FCFBBCA5172DE818D7C4FCFABBB78BA413870F11B9613F1944750B0AD1D8C96CEB5990E2C8950766A257982B9FF
3,297,640 UART: Caliptra RT
3,297,985 UART: [state] CFI Enabled
3,407,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,939 UART: [rt]cmd =0x54514754, len=24
3,439,897 >>> mbox cmd response data (8 bytes)
3,439,898 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,507 UART: [rt]cmd =0x54514754, len=24
3,470,916 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
893,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,639 UART: [kat] ++
897,791 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,178 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,171,977 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,175,116 UART: [idev] ++
1,175,284 UART: [idev] CDI.KEYID = 6
1,175,644 UART: [idev] SUBJECT.KEYID = 7
1,176,068 UART: [idev] UDS.KEYID = 0
1,176,413 ready_for_fw is high
1,176,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,759 UART: [idev] Sha1 KeyId Algorithm
1,209,441 UART: [idev] --
1,210,651 UART: [ldev] ++
1,210,819 UART: [ldev] CDI.KEYID = 6
1,211,182 UART: [ldev] SUBJECT.KEYID = 5
1,211,608 UART: [ldev] AUTHORITY.KEYID = 7
1,212,071 UART: [ldev] FE.KEYID = 1
1,217,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,675 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,704 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,556 >>> mbox cmd response: success
2,776,556 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,810 UART: [afmc] ++
2,777,978 UART: [afmc] CDI.KEYID = 6
2,778,340 UART: [afmc] SUBJECT.KEYID = 7
2,778,765 UART: [afmc] AUTHORITY.KEYID = 5
2,813,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,117 UART: [afmc] --
2,857,231 UART: [cold-reset] --
2,858,189 UART: [state] Locking Datavault
2,859,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,006 UART: [state] Locking ICCM
2,860,472 UART: [exit] Launching FMC @ 0x40000130
2,865,801 UART:
2,865,817 UART: Running Caliptra FMC ...
2,866,225 UART:
2,866,279 UART: [state] CFI Enabled
2,876,464 UART: [fht] FMC Alias Private Key: 7
2,983,783 UART: [art] Extend RT PCRs Done
2,984,211 UART: [art] Lock RT PCRs Done
2,985,755 UART: [art] Populate DV Done
2,993,978 UART: [fht] FMC Alias Private Key: 7
2,995,158 UART: [art] Derive CDI
2,995,438 UART: [art] Store in in slot 0x4
3,081,193 UART: [art] Derive Key Pair
3,081,553 UART: [art] Store priv key in slot 0x5
3,094,623 UART: [art] Derive Key Pair - Done
3,109,638 UART: [art] Signing Cert with AUTHO
3,110,118 UART: RITY.KEYID = 7
3,125,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,281 UART: [art] PUB.X = 16711691C32F2036ADAE5D55BEC76F88F49BB0993F4EFBAE064FDF635346831248E8B21089264AFBC59614BA649BB593
3,133,052 UART: [art] PUB.Y = C332C7862E056A91E20D06EECB885D791BDF346257D17B807DB5566C13D0E17E675AB3365071290934685FF6C82DBAFE
3,139,992 UART: [art] SIG.R = 44377DE7392BCCEE1D14650EAE26869107A719A86330B05FED03FFC16980F06EBBEF81603993E14CA280006C0AE26CD1
3,146,734 UART: [art] SIG.S = 8F9032C0689953E9974C50C27421E9A7C55CBDB59D26D6E521F857418FE0C84BF12B7ED502725C63426305C78FAF2D19
3,170,379 UART: Caliptra RT
3,170,632 UART: [state] CFI Enabled
3,278,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,951 UART: [rt]cmd =0x54514754, len=24
3,310,875 >>> mbox cmd response data (8 bytes)
3,310,876 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,473 UART: [rt]cmd =0x54514754, len=24
3,342,068 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 ready_for_fw is high
1,059,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,779 >>> mbox cmd response: success
2,627,779 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,541 UART:
2,689,557 UART: Running Caliptra FMC ...
2,689,965 UART:
2,690,019 UART: [state] CFI Enabled
2,700,220 UART: [fht] FMC Alias Private Key: 7
2,808,123 UART: [art] Extend RT PCRs Done
2,808,551 UART: [art] Lock RT PCRs Done
2,810,143 UART: [art] Populate DV Done
2,818,348 UART: [fht] FMC Alias Private Key: 7
2,819,520 UART: [art] Derive CDI
2,819,800 UART: [art] Store in in slot 0x4
2,905,611 UART: [art] Derive Key Pair
2,905,971 UART: [art] Store priv key in slot 0x5
2,919,065 UART: [art] Derive Key Pair - Done
2,933,682 UART: [art] Signing Cert with AUTHO
2,934,162 UART: RITY.KEYID = 7
2,948,972 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,737 UART: [art] PUB.X = 97470FC55A8123641776ED16C420A43832D514B92B7E6E4F48836E6C72FD469293BFB12E6858A00548D15A23423FBB62
2,956,493 UART: [art] PUB.Y = 0F4E199D7643134394230321B50CF9BBCD926AE94107FCA3CDF1566BF82FDD0645FE9241F0519A38CC6E4FF313C8CD6F
2,963,438 UART: [art] SIG.R = D5E1E501882D8EEB200A8C8C5DB75172A6E6F8B7CC523959933392DEA9C52EACC6B056C32AEED8E7C06BF6002253E071
2,970,192 UART: [art] SIG.S = A3F1C603BD616597388A2EA2C270546B80163257921EF2458E92C888CF67B249DA70B98A2173922E323B253F8C163DE8
2,994,072 UART: Caliptra RT
2,994,325 UART: [state] CFI Enabled
3,102,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,985 UART: [rt]cmd =0x54514754, len=24
3,134,935 >>> mbox cmd response data (8 bytes)
3,134,936 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,431 UART: [rt]cmd =0x54514754, len=24
3,165,912 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,265 UART: [kat] LMS
1,171,593 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,194 UART: [fht] FHT @ 0x50003400
1,175,859 UART: [idev] ++
1,176,027 UART: [idev] CDI.KEYID = 6
1,176,387 UART: [idev] SUBJECT.KEYID = 7
1,176,811 UART: [idev] UDS.KEYID = 0
1,177,156 ready_for_fw is high
1,177,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,847 UART: [idev] Erasing UDS.KEYID = 0
1,201,992 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,556 UART: [ldev] ++
1,211,724 UART: [ldev] CDI.KEYID = 6
1,212,087 UART: [ldev] SUBJECT.KEYID = 5
1,212,513 UART: [ldev] AUTHORITY.KEYID = 7
1,212,976 UART: [ldev] FE.KEYID = 1
1,218,078 UART: [ldev] Erasing FE.KEYID = 1
1,244,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,666 UART: [ldev] --
1,284,133 UART: [fwproc] Wait for Commands...
1,284,891 UART: [fwproc] Recv command 0x46574c44
1,285,619 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,831 >>> mbox cmd response: success
2,776,831 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,881 UART: [afmc] ++
2,778,049 UART: [afmc] CDI.KEYID = 6
2,778,411 UART: [afmc] SUBJECT.KEYID = 7
2,778,836 UART: [afmc] AUTHORITY.KEYID = 5
2,814,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,358 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,664 UART: [afmc] --
2,857,690 UART: [cold-reset] --
2,858,498 UART: [state] Locking Datavault
2,859,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,309 UART: [state] Locking ICCM
2,860,747 UART: [exit] Launching FMC @ 0x40000130
2,866,076 UART:
2,866,092 UART: Running Caliptra FMC ...
2,866,500 UART:
2,866,643 UART: [state] CFI Enabled
2,877,248 UART: [fht] FMC Alias Private Key: 7
2,984,567 UART: [art] Extend RT PCRs Done
2,984,995 UART: [art] Lock RT PCRs Done
2,986,405 UART: [art] Populate DV Done
2,994,656 UART: [fht] FMC Alias Private Key: 7
2,995,782 UART: [art] Derive CDI
2,996,062 UART: [art] Store in in slot 0x4
3,081,779 UART: [art] Derive Key Pair
3,082,139 UART: [art] Store priv key in slot 0x5
3,095,361 UART: [art] Derive Key Pair - Done
3,110,316 UART: [art] Signing Cert with AUTHO
3,110,796 UART: RITY.KEYID = 7
3,126,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,953 UART: [art] PUB.X = D8AC7DA0DDA32D83E7A72D3A0AB1512CC011CD19DD1CBDF1A9BBA9252ED36220E9158896AA9BBEC959C51B74B22BF912
3,133,744 UART: [art] PUB.Y = 1BB9F96D7DC78A31AA0450529FE435D66746B7D64AB870103D0F6ED998396B259BB3790EC3939683D38613A935C39692
3,140,679 UART: [art] SIG.R = D0ED62CEB929A4ED08CE7CD9FA9F48C16B30F12AE0BFAF554D44475E68220486B15443ADA149552389A3CA1BC8688BA1
3,147,457 UART: [art] SIG.S = 5D58C6B73DEEFF15B65D68D94189051070BA719A133071C58433A2BFF424503F9D99CC12C6E0C6D066C0940DD46FED13
3,171,516 UART: Caliptra RT
3,171,861 UART: [state] CFI Enabled
3,279,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,280 UART: [rt]cmd =0x54514754, len=24
3,312,132 >>> mbox cmd response data (8 bytes)
3,312,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,616 UART: [rt]cmd =0x54514754, len=24
3,343,121 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 ready_for_fw is high
1,060,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,652 >>> mbox cmd response: success
2,627,652 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,428 UART:
2,690,444 UART: Running Caliptra FMC ...
2,690,852 UART:
2,690,995 UART: [state] CFI Enabled
2,701,770 UART: [fht] FMC Alias Private Key: 7
2,808,957 UART: [art] Extend RT PCRs Done
2,809,385 UART: [art] Lock RT PCRs Done
2,810,665 UART: [art] Populate DV Done
2,818,800 UART: [fht] FMC Alias Private Key: 7
2,819,944 UART: [art] Derive CDI
2,820,224 UART: [art] Store in in slot 0x4
2,906,403 UART: [art] Derive Key Pair
2,906,763 UART: [art] Store priv key in slot 0x5
2,920,335 UART: [art] Derive Key Pair - Done
2,934,831 UART: [art] Signing Cert with AUTHO
2,935,311 UART: RITY.KEYID = 7
2,951,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,082 UART: [art] PUB.X = 05800DC5DFF7BB5950198B75CFE204E7C6922828BAF4764079297B479FED7ADCC4BAA29B19C33DFB93920754A8295684
2,958,844 UART: [art] PUB.Y = BDB94184F5A55DD317371032707FB221032A46C11BC9E1B2E8E7E5E38B5FC712DA4CCBD3E144818CE0BFBF2F571FA8B1
2,965,807 UART: [art] SIG.R = 77EEA9A78B804B13418E4B93A26EA2EE8DEC03A0F5D48571DE1671CDFFE60C5FB294A318E4E1FDA434B08D6D29907974
2,972,585 UART: [art] SIG.S = 43D11B7DCA6729B01DFC4BCCECC1E1BC2814DCC0391B31A8482B134C2E3F41DC1AD9212F662EA8FDC665C1503BAC9AA0
2,995,776 UART: Caliptra RT
2,996,121 UART: [state] CFI Enabled
3,104,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,432 UART: [rt]cmd =0x54514754, len=24
3,137,390 >>> mbox cmd response data (8 bytes)
3,137,391 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,910 UART: [rt]cmd =0x54514754, len=24
3,168,311 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 ready_for_fw is high
1,174,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,207,935 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,420 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,066 UART: [ldev] --
1,281,516 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,970 >>> mbox cmd response: success
2,774,970 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,095 UART: [afmc] ++
2,776,263 UART: [afmc] CDI.KEYID = 6
2,776,626 UART: [afmc] SUBJECT.KEYID = 7
2,777,052 UART: [afmc] AUTHORITY.KEYID = 5
2,812,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,216 UART: [afmc] --
2,856,342 UART: [cold-reset] --
2,857,210 UART: [state] Locking Datavault
2,858,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,165 UART: [state] Locking ICCM
2,859,661 UART: [exit] Launching FMC @ 0x40000130
2,864,990 UART:
2,865,006 UART: Running Caliptra FMC ...
2,865,414 UART:
2,865,468 UART: [state] CFI Enabled
2,875,871 UART: [fht] FMC Alias Private Key: 7
2,984,092 UART: [art] Extend RT PCRs Done
2,984,520 UART: [art] Lock RT PCRs Done
2,986,166 UART: [art] Populate DV Done
2,994,451 UART: [fht] FMC Alias Private Key: 7
2,995,445 UART: [art] Derive CDI
2,995,725 UART: [art] Store in in slot 0x4
3,081,308 UART: [art] Derive Key Pair
3,081,668 UART: [art] Store priv key in slot 0x5
3,095,526 UART: [art] Derive Key Pair - Done
3,110,503 UART: [art] Signing Cert with AUTHO
3,110,983 UART: RITY.KEYID = 7
3,125,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,598 UART: [art] PUB.X = 20896C5DF6281487947C7760FF64A32F3A56831619C5B62100FA9D1EF053184BBE8D38AF882748654BAE5DC056F99217
3,133,340 UART: [art] PUB.Y = 9DC023C5B9F76AB310EEBD082FD7723FB5F1E17DB466BB54E1ED7F4EA6770F03468950D8807EF43313D60D234B003244
3,140,262 UART: [art] SIG.R = F9A96520D67136C197D8CD5D57AF59F917281DCDD80E554DE821B15968A0F04C843EBBCA067C0E36F7C6187C6D70DBBF
3,147,035 UART: [art] SIG.S = 814401028A1282C0AFCD45420A3BBA1E7D5574460FED297C026F2B2DD6028303CDCA0FCE0954F888493D86DD12D6947E
3,171,161 UART: Caliptra RT
3,171,414 UART: [state] CFI Enabled
3,278,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,782 UART: [rt]cmd =0x54514754, len=24
3,311,040 >>> mbox cmd response data (8 bytes)
3,311,041 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,646 UART: [rt]cmd =0x54514754, len=24
3,342,219 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,424 >>> mbox cmd response: success
2,624,424 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,700 UART:
2,686,716 UART: Running Caliptra FMC ...
2,687,124 UART:
2,687,178 UART: [state] CFI Enabled
2,697,893 UART: [fht] FMC Alias Private Key: 7
2,805,570 UART: [art] Extend RT PCRs Done
2,805,998 UART: [art] Lock RT PCRs Done
2,807,404 UART: [art] Populate DV Done
2,815,827 UART: [fht] FMC Alias Private Key: 7
2,816,819 UART: [art] Derive CDI
2,817,099 UART: [art] Store in in slot 0x4
2,902,556 UART: [art] Derive Key Pair
2,902,916 UART: [art] Store priv key in slot 0x5
2,915,362 UART: [art] Derive Key Pair - Done
2,930,161 UART: [art] Signing Cert with AUTHO
2,930,641 UART: RITY.KEYID = 7
2,945,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,398 UART: [art] PUB.X = 6B121BF05CCE96286B9C5128B4F8CDAFECF8A8E9EBE0891978526DCB08E37BD051F93601841DE7E92ADBDAB116802E49
2,953,178 UART: [art] PUB.Y = CD63B2E39C21DBA0C77761DDF246DC4F9CC3E24024D5CB1B9B76674CDD08E2F902AEB6F664A35ED7005D27CCB99E72E9
2,960,120 UART: [art] SIG.R = 39CF5579527BB78C933B56911D3A4A9B58838169B85129140F56C06D5ED82CB11D683FDC5A0C3A6AC0F1897F362CB493
2,966,884 UART: [art] SIG.S = EF9818F976252CB4AC45C41596262EBB0A057CD54FBEC70E9E06696A694B41E15E5CC10048241367878B5E6E3FDA3CFD
2,990,465 UART: Caliptra RT
2,990,718 UART: [state] CFI Enabled
3,098,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,593 UART: [rt]cmd =0x54514754, len=24
3,130,711 >>> mbox cmd response data (8 bytes)
3,130,712 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,101 UART: [rt]cmd =0x54514754, len=24
3,161,506 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 ready_for_fw is high
1,174,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,300 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,219 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,485 >>> mbox cmd response: success
2,773,485 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,720 UART: [afmc] ++
2,774,888 UART: [afmc] CDI.KEYID = 6
2,775,251 UART: [afmc] SUBJECT.KEYID = 7
2,775,677 UART: [afmc] AUTHORITY.KEYID = 5
2,811,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,274 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,663 UART: [afmc] --
2,854,617 UART: [cold-reset] --
2,855,507 UART: [state] Locking Datavault
2,856,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,858 UART: [state] Locking ICCM
2,857,352 UART: [exit] Launching FMC @ 0x40000130
2,862,681 UART:
2,862,697 UART: Running Caliptra FMC ...
2,863,105 UART:
2,863,248 UART: [state] CFI Enabled
2,873,977 UART: [fht] FMC Alias Private Key: 7
2,981,870 UART: [art] Extend RT PCRs Done
2,982,298 UART: [art] Lock RT PCRs Done
2,983,898 UART: [art] Populate DV Done
2,992,277 UART: [fht] FMC Alias Private Key: 7
2,993,355 UART: [art] Derive CDI
2,993,635 UART: [art] Store in in slot 0x4
3,079,106 UART: [art] Derive Key Pair
3,079,466 UART: [art] Store priv key in slot 0x5
3,092,490 UART: [art] Derive Key Pair - Done
3,107,403 UART: [art] Signing Cert with AUTHO
3,107,883 UART: RITY.KEYID = 7
3,122,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,412 UART: [art] PUB.X = 540925952FD93C092D8A4DC3B2888C18847188496C8BE958E63E546ABAD4614589EFF7986D1E0B23886C2E3541006069
3,130,141 UART: [art] PUB.Y = 0061CE0F149610824D429CC58BFC81EEAF8046F807E2E41561A0AFCAE9FE4F2F1746DFCF6ACA0CC429CE50375758B280
3,137,074 UART: [art] SIG.R = 1043882C82B4F35DBD4DA06C895A56DEAC54C8561AD7DE005E669D5AB451DE1F6531C22811DECCAB7123AE7EDFCDABA4
3,143,846 UART: [art] SIG.S = 97780396716B43889F14ED2E5F3422510B58D83C85B4B5482A25EED8F5D0D183A1E79875CE7108112B090B9CC1849349
3,167,438 UART: Caliptra RT
3,167,783 UART: [state] CFI Enabled
3,275,272 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,980 UART: [rt]cmd =0x54514754, len=24
3,308,218 >>> mbox cmd response data (8 bytes)
3,308,219 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,630 UART: [rt]cmd =0x54514754, len=24
3,339,129 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,971 ready_for_fw is high
1,055,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,051 >>> mbox cmd response: success
2,624,051 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,263 UART:
2,686,279 UART: Running Caliptra FMC ...
2,686,687 UART:
2,686,830 UART: [state] CFI Enabled
2,697,695 UART: [fht] FMC Alias Private Key: 7
2,805,642 UART: [art] Extend RT PCRs Done
2,806,070 UART: [art] Lock RT PCRs Done
2,807,906 UART: [art] Populate DV Done
2,816,347 UART: [fht] FMC Alias Private Key: 7
2,817,331 UART: [art] Derive CDI
2,817,611 UART: [art] Store in in slot 0x4
2,903,322 UART: [art] Derive Key Pair
2,903,682 UART: [art] Store priv key in slot 0x5
2,916,504 UART: [art] Derive Key Pair - Done
2,930,836 UART: [art] Signing Cert with AUTHO
2,931,316 UART: RITY.KEYID = 7
2,946,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,947 UART: [art] PUB.X = 786AC87BF422C58209F2307FAC3651359B6C17CF3090BFD248F7CB50D7D2346EEF1E375E498D1975CBB8401145003357
2,953,690 UART: [art] PUB.Y = E7B29C22CB8CE88574D043F2F89DC4253A330CCBABC7D947F6B6635EC5D6ECD1782831C2DFD9F45A7945F03C8A0A7F92
2,960,650 UART: [art] SIG.R = 7F345286656AF8E0BC3B16417886EE611A61E8E113226B1D15C0B9C5948D45DC9944B02430C5E136602F55714A6AF40C
2,967,411 UART: [art] SIG.S = A19162E265C1F138900116D08694A11D960A75A7EB203B13A16FC24289B62D1C3FF2C3F2253118AE250EFDE5CFD32428
2,990,597 UART: Caliptra RT
2,990,942 UART: [state] CFI Enabled
3,099,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,073 UART: [rt]cmd =0x54514754, len=24
3,131,981 >>> mbox cmd response data (8 bytes)
3,131,982 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,625 UART: [rt]cmd =0x54514754, len=24
3,163,042 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,169 UART:
192,598 UART: Running Caliptra ROM ...
193,745 UART:
193,903 UART: [state] CFI Enabled
266,344 UART: [state] LifecycleState = Unprovisioned
268,349 UART: [state] DebugLocked = No
270,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,180 UART: [kat] SHA2-256
444,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,407 UART: [kat] ++
455,892 UART: [kat] sha1
467,194 UART: [kat] SHA2-256
469,912 UART: [kat] SHA2-384
475,975 UART: [kat] SHA2-512-ACC
478,375 UART: [kat] ECC-384
2,767,252 UART: [kat] HMAC-384Kdf
2,778,142 UART: [kat] LMS
3,968,406 UART: [kat] --
3,974,500 UART: [cold-reset] ++
3,976,721 UART: [fht] Storing FHT @ 0x50003400
3,986,703 UART: [idev] ++
3,987,265 UART: [idev] CDI.KEYID = 6
3,988,218 UART: [idev] SUBJECT.KEYID = 7
3,989,460 UART: [idev] UDS.KEYID = 0
3,990,424 ready_for_fw is high
3,990,610 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,232 UART: [idev] Erasing UDS.KEYID = 0
7,328,375 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,205 UART: [idev] --
7,355,964 UART: [ldev] ++
7,356,576 UART: [ldev] CDI.KEYID = 6
7,357,495 UART: [ldev] SUBJECT.KEYID = 5
7,358,708 UART: [ldev] AUTHORITY.KEYID = 7
7,359,938 UART: [ldev] FE.KEYID = 1
7,400,089 UART: [ldev] Erasing FE.KEYID = 1
10,732,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,072 UART: [ldev] --
13,095,068 UART: [fwproc] Waiting for Commands...
13,096,791 UART: [fwproc] Received command 0x46574c44
13,098,975 UART: [fwproc] Received Image of size 114124 bytes
17,150,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,612,097 >>> mbox cmd response: success
17,612,626 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,617,100 UART: [afmc] ++
17,617,715 UART: [afmc] CDI.KEYID = 6
17,618,601 UART: [afmc] SUBJECT.KEYID = 7
17,619,875 UART: [afmc] AUTHORITY.KEYID = 5
20,985,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,155 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,542 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,401 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,822 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,871 UART: [afmc] --
23,357,439 UART: [cold-reset] --
23,360,964 UART: [state] Locking Datavault
23,365,679 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,434 UART: [state] Locking ICCM
23,368,611 UART: [exit] Launching FMC @ 0x40000130
23,377,008 UART:
23,377,277 UART: Running Caliptra FMC ...
23,378,376 UART:
23,378,534 UART: [state] CFI Enabled
23,445,079 UART: [fht] FMC Alias Private Key: 7
25,782,964 UART: [art] Extend RT PCRs Done
25,784,186 UART: [art] Lock RT PCRs Done
25,785,730 UART: [art] Populate DV Done
25,791,144 UART: [fht] FMC Alias Private Key: 7
25,792,737 UART: [art] Derive CDI
25,793,550 UART: [art] Store in in slot 0x4
25,853,461 UART: [art] Derive Key Pair
25,854,489 UART: [art] Store priv key in slot 0x5
29,147,078 UART: [art] Derive Key Pair - Done
29,160,345 UART: [art] Signing Cert with AUTHO
29,161,650 UART: RITY.KEYID = 7
31,448,850 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,376 UART: [art] PUB.X = 7C4C9339EB03998C08CBFCF5F845227845C0F45CDA970CB17F02367B5FEBC2B09282DEE3C309068C32F2C846B180E581
31,457,630 UART: [art] PUB.Y = 62D9D1727CA59F8E5E88F8E1F45D313101D68B9E875B780892E022223A4481781D8B5D3E68D5C616F20AC8B60B48D21D
31,464,865 UART: [art] SIG.R = E96F1982C2BD5A3EBB70408E3F1781099ADBB3F0DB434F395D9FC2482097E72B09A45D18FE2CA4D8DE37D92DAA92E7BF
31,472,215 UART: [art] SIG.S = A6F819D8A0E134F29C0B3EDB92566C59B9C832E4187C24A02A6556BC531B87978C5E8E3BE53D685764273DF9F2E4F646
32,776,714 UART: Caliptra RT
32,777,431 UART: [state] CFI Enabled
32,940,167 UART: [rt] RT listening for mailbox commands...
32,971,684 UART: [rt]cmd =0x47544744, len=8
32,973,706 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,848 writing to cptra_bootfsm_go
3,782,441 ready_for_fw is high
3,783,022 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,822,436 >>> mbox cmd response: success
17,823,114 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,499,066 UART:
23,499,455 UART: Running Caliptra FMC ...
23,500,570 UART:
23,500,734 UART: [state] CFI Enabled
23,552,736 UART: [fht] FMC Alias Private Key: 7
25,891,204 UART: [art] Extend RT PCRs Done
25,892,424 UART: [art] Lock RT PCRs Done
25,894,237 UART: [art] Populate DV Done
25,899,817 UART: [fht] FMC Alias Private Key: 7
25,901,366 UART: [art] Derive CDI
25,902,107 UART: [art] Store in in slot 0x4
25,960,965 UART: [art] Derive Key Pair
25,962,006 UART: [art] Store priv key in slot 0x5
29,254,405 UART: [art] Derive Key Pair - Done
29,267,241 UART: [art] Signing Cert with AUTHO
29,268,541 UART: RITY.KEYID = 7
31,556,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,574 UART: [art] PUB.X = B7A383BAAD472868C31E19BDF85A49973B5A0F152C227A4EF9C5011035594CF2FC93FA858C1AB4D76885714EAEE972B1
31,564,781 UART: [art] PUB.Y = B17C903B8D6183D5B94992ED953EF236F6610A09713F47726E80E7392F30F9BA7764CC60B1710FADC781C0AB121B0553
31,572,018 UART: [art] SIG.R = D3D6E41ADF7C127FE641D08FD1CE00FAC6C7AF92B3DDCE4B8DFAD48D46E0E54E97D60624D5329E9D69F3D805B57217B5
31,579,420 UART: [art] SIG.S = 89FD02937859C86F0DE0A0C4336BFF04CEE1FC54B98A8C26F19D232B44E87A426BC1A72EB08CE24FE7E6C70FEFC055A9
32,885,185 UART: Caliptra RT
32,885,893 UART: [state] CFI Enabled
33,045,226 UART: [rt] RT listening for mailbox commands...
33,076,325 UART: [rt]cmd =0x47544744, len=8
33,078,161 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,582 UART:
192,944 UART: Running Caliptra ROM ...
194,160 UART:
603,811 UART: [state] CFI Enabled
618,679 UART: [state] LifecycleState = Unprovisioned
620,729 UART: [state] DebugLocked = No
622,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,132 UART: [kat] SHA2-256
797,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,449 UART: [kat] ++
808,891 UART: [kat] sha1
820,466 UART: [kat] SHA2-256
823,187 UART: [kat] SHA2-384
828,885 UART: [kat] SHA2-512-ACC
831,249 UART: [kat] ECC-384
3,115,900 UART: [kat] HMAC-384Kdf
3,128,273 UART: [kat] LMS
4,318,375 UART: [kat] --
4,322,131 UART: [cold-reset] ++
4,324,426 UART: [fht] Storing FHT @ 0x50003400
4,336,682 UART: [idev] ++
4,337,242 UART: [idev] CDI.KEYID = 6
4,338,191 UART: [idev] SUBJECT.KEYID = 7
4,339,432 UART: [idev] UDS.KEYID = 0
4,340,402 ready_for_fw is high
4,340,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,902 UART: [idev] Erasing UDS.KEYID = 0
7,625,017 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,666 UART: [idev] --
7,651,200 UART: [ldev] ++
7,651,764 UART: [ldev] CDI.KEYID = 6
7,652,720 UART: [ldev] SUBJECT.KEYID = 5
7,653,925 UART: [ldev] AUTHORITY.KEYID = 7
7,655,204 UART: [ldev] FE.KEYID = 1
7,666,255 UART: [ldev] Erasing FE.KEYID = 1
10,955,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,979 UART: [ldev] --
13,315,070 UART: [fwproc] Waiting for Commands...
13,317,752 UART: [fwproc] Received command 0x46574c44
13,319,936 UART: [fwproc] Received Image of size 114124 bytes
17,374,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,636 >>> mbox cmd response: success
17,841,152 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,844,327 UART: [afmc] ++
17,844,983 UART: [afmc] CDI.KEYID = 6
17,845,891 UART: [afmc] SUBJECT.KEYID = 7
17,847,102 UART: [afmc] AUTHORITY.KEYID = 5
21,162,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,040 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,459 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,283 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,777 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,133 UART: [afmc] --
23,528,589 UART: [cold-reset] --
23,531,093 UART: [state] Locking Datavault
23,536,073 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,826 UART: [state] Locking ICCM
23,538,944 UART: [exit] Launching FMC @ 0x40000130
23,547,332 UART:
23,547,580 UART: Running Caliptra FMC ...
23,548,676 UART:
23,548,829 UART: [state] CFI Enabled
23,556,653 UART: [fht] FMC Alias Private Key: 7
25,888,491 UART: [art] Extend RT PCRs Done
25,889,711 UART: [art] Lock RT PCRs Done
25,891,492 UART: [art] Populate DV Done
25,897,115 UART: [fht] FMC Alias Private Key: 7
25,898,705 UART: [art] Derive CDI
25,899,511 UART: [art] Store in in slot 0x4
25,942,316 UART: [art] Derive Key Pair
25,943,370 UART: [art] Store priv key in slot 0x5
29,184,918 UART: [art] Derive Key Pair - Done
29,197,804 UART: [art] Signing Cert with AUTHO
29,199,113 UART: RITY.KEYID = 7
31,478,010 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,540 UART: [art] PUB.X = F98E30F79C5186E087CC76EAECF2D68E3F7C399145B3A40D93684A6FBF3A6FAB4DE84A552ED41DB9EBFCEBE486FD0638
31,486,786 UART: [art] PUB.Y = 5B2E06E6C7759C110934DD01B97022656A89F22C9D43E3607E6C5EBDF56C1A074416AA931CD68A054E4DE9F59EC0996B
31,494,007 UART: [art] SIG.R = 7C8962CF17C2E0690FFD706078D4417D6DB3BB9BAB42F4D895CFFBA040FD81A5457FF6D683EF629D77EB39C29B08E1D6
31,501,445 UART: [art] SIG.S = 6AA266BBC3A598BAE7DA91C2BA65CF12844A0622CBFDB7C4DBADD229485E9AE17C71F485AEF48925AEA7BDBC8FA75E5B
32,806,946 UART: Caliptra RT
32,807,651 UART: [state] CFI Enabled
32,926,123 UART: [rt] RT listening for mailbox commands...
32,957,680 UART: [rt]cmd =0x47544744, len=8
32,959,480 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,125,137 ready_for_fw is high
4,125,555 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,091 >>> mbox cmd response: success
18,071,038 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,708,834 UART:
23,709,226 UART: Running Caliptra FMC ...
23,710,426 UART:
23,710,586 UART: [state] CFI Enabled
23,718,474 UART: [fht] FMC Alias Private Key: 7
26,049,251 UART: [art] Extend RT PCRs Done
26,050,483 UART: [art] Lock RT PCRs Done
26,052,121 UART: [art] Populate DV Done
26,057,530 UART: [fht] FMC Alias Private Key: 7
26,059,086 UART: [art] Derive CDI
26,059,823 UART: [art] Store in in slot 0x4
26,102,421 UART: [art] Derive Key Pair
26,103,463 UART: [art] Store priv key in slot 0x5
29,345,848 UART: [art] Derive Key Pair - Done
29,358,904 UART: [art] Signing Cert with AUTHO
29,360,197 UART: RITY.KEYID = 7
31,639,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,878 UART: [art] PUB.X = A716855532BAA104BFE46BA1C0715DC6116BA79C32484B1AF69B53B0314FBC099DF37F837C0725E82B33DCA6FA050021
31,648,125 UART: [art] PUB.Y = AFF2A19AD1445DC5DEA01E512902AF49C8DE5726895FE44248FFA515B992697A50E5FCD81065483C0CAE54E258D60158
31,655,358 UART: [art] SIG.R = A462A5BA9F6C7910AAC85AC410308CB846525726D3B6E7331F7B20335AEFDE6D568102CEF9233A99AF70B396E0DC9E31
31,662,805 UART: [art] SIG.S = BB270D0D9A55E74959F5A2A6B0B1336C695380E30E156D33E41C66302A70683D2B304541E6551EB0B9D452FA495749C0
32,968,032 UART: Caliptra RT
32,968,752 UART: [state] CFI Enabled
33,087,238 UART: [rt] RT listening for mailbox commands...
33,118,444 UART: [rt]cmd =0x47544744, len=8
33,120,290 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,957 UART:
192,324 UART: Running Caliptra ROM ...
193,463 UART:
193,611 UART: [state] CFI Enabled
264,215 UART: [state] LifecycleState = Unprovisioned
266,139 UART: [state] DebugLocked = No
267,475 UART: [state] WD Timer not started. Device not locked for debugging
270,945 UART: [kat] SHA2-256
450,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,609 UART: [kat] ++
462,057 UART: [kat] sha1
474,352 UART: [kat] SHA2-256
477,359 UART: [kat] SHA2-384
484,270 UART: [kat] SHA2-512-ACC
487,207 UART: [kat] ECC-384
2,947,880 UART: [kat] HMAC-384Kdf
2,966,579 UART: [kat] LMS
3,496,092 UART: [kat] --
3,500,184 UART: [cold-reset] ++
3,501,408 UART: [fht] FHT @ 0x50003400
3,512,596 UART: [idev] ++
3,513,168 UART: [idev] CDI.KEYID = 6
3,514,079 UART: [idev] SUBJECT.KEYID = 7
3,515,256 UART: [idev] UDS.KEYID = 0
3,516,198 ready_for_fw is high
3,516,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,660,319 UART: [idev] Erasing UDS.KEYID = 0
6,022,030 UART: [idev] Sha1 KeyId Algorithm
6,045,561 UART: [idev] --
6,048,157 UART: [ldev] ++
6,048,735 UART: [ldev] CDI.KEYID = 6
6,049,644 UART: [ldev] SUBJECT.KEYID = 5
6,050,808 UART: [ldev] AUTHORITY.KEYID = 7
6,052,045 UART: [ldev] FE.KEYID = 1
6,094,711 UART: [ldev] Erasing FE.KEYID = 1
8,601,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,993 UART: [ldev] --
10,407,795 UART: [fwproc] Wait for Commands...
10,409,668 UART: [fwproc] Recv command 0x46574c44
10,411,758 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,842 >>> mbox cmd response: success
14,278,391 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,282,308 UART: [afmc] ++
14,282,926 UART: [afmc] CDI.KEYID = 6
14,283,813 UART: [afmc] SUBJECT.KEYID = 7
14,284,984 UART: [afmc] AUTHORITY.KEYID = 5
16,824,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,452 UART: [afmc] --
18,625,529 UART: [cold-reset] --
18,630,684 UART: [state] Locking Datavault
18,633,551 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,247 UART: [state] Locking ICCM
18,637,483 UART: [exit] Launching FMC @ 0x40000130
18,645,872 UART:
18,646,104 UART: Running Caliptra FMC ...
18,647,128 UART:
18,647,275 UART: [state] CFI Enabled
18,707,246 UART: [fht] FMC Alias Private Key: 7
20,471,371 UART: [art] Extend RT PCRs Done
20,472,592 UART: [art] Lock RT PCRs Done
20,474,167 UART: [art] Populate DV Done
20,479,635 UART: [fht] FMC Alias Private Key: 7
20,481,337 UART: [art] Derive CDI
20,482,149 UART: [art] Store in in slot 0x4
20,540,080 UART: [art] Derive Key Pair
20,541,117 UART: [art] Store priv key in slot 0x5
23,003,954 UART: [art] Derive Key Pair - Done
23,016,859 UART: [art] Signing Cert with AUTHO
23,018,169 UART: RITY.KEYID = 7
24,730,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,566 UART: [art] PUB.X = D30046678D83FB2858F720FCCF9EFBCC4B87038075F053F4733DBD6EEA71029C60A27FFB71192498146F3D221CE2BE9A
24,738,805 UART: [art] PUB.Y = AA10C7DAD57E3FB0CFB28092E80540EA7430CDC3123B344EB37C6A74788883F9355103AFF6F43FC772A233EBFC74E36C
24,746,109 UART: [art] SIG.R = 7D9ED7097FE76552273008DCD6D56A1019BDB38F7AFBBD46EFF34DB99CA64FA0173596A4EAD2B52926A47E403D6D8767
24,753,462 UART: [art] SIG.S = DA8360BD258882A2C8FE8F42E7D65BEEFB458074DEFA3ED8D73F02B47236B13A632266CE240C30480329E2C5F2BA79E4
25,732,139 UART: Caliptra RT
25,732,830 UART: [state] CFI Enabled
25,899,138 UART: [rt] RT listening for mailbox commands...
25,930,659 UART: [rt]cmd =0x47544744, len=8
25,932,484 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,384,417 ready_for_fw is high
3,384,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,864 >>> mbox cmd response: success
14,059,530 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,346,487 UART:
18,346,871 UART: Running Caliptra FMC ...
18,348,060 UART:
18,348,230 UART: [state] CFI Enabled
18,410,880 UART: [fht] FMC Alias Private Key: 7
20,175,521 UART: [art] Extend RT PCRs Done
20,176,733 UART: [art] Lock RT PCRs Done
20,178,177 UART: [art] Populate DV Done
20,183,481 UART: [fht] FMC Alias Private Key: 7
20,185,108 UART: [art] Derive CDI
20,185,929 UART: [art] Store in in slot 0x4
20,243,806 UART: [art] Derive Key Pair
20,244,808 UART: [art] Store priv key in slot 0x5
22,707,824 UART: [art] Derive Key Pair - Done
22,720,835 UART: [art] Signing Cert with AUTHO
22,722,137 UART: RITY.KEYID = 7
24,433,673 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,151 UART: [art] PUB.X = E01EE689A800C1F446495930008229760E6F47EA375007F2D2E8ADE25196851DD6FE312701C2D06C3C044104D2539265
24,442,407 UART: [art] PUB.Y = B2C4F41536B73CF4C1D925A6A2FD0D35F2A06A22816E6AD2A095146FBB68E92EB1212F625CC07C1E329D920CF0012236
24,449,669 UART: [art] SIG.R = 153397F8485D5E659572D7690398986FDBFCA7FB8A81C7C344D61B7557A07071E67EE6EA5910672CC3CD0933CCA23C0C
24,457,064 UART: [art] SIG.S = DC378488F431DF4DDD6345747DA859C213CFC9C860AD6CC9C0324ABA4CCEA5657C1157F1D9A1989721A8B50B23B7D415
25,435,713 UART: Caliptra RT
25,436,423 UART: [state] CFI Enabled
25,602,461 UART: [rt] RT listening for mailbox commands...
25,633,767 UART: [rt]cmd =0x47544744, len=8
25,635,894 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,476 UART:
192,848 UART: Running Caliptra ROM ...
194,041 UART:
603,452 UART: [state] CFI Enabled
614,847 UART: [state] LifecycleState = Unprovisioned
616,790 UART: [state] DebugLocked = No
618,828 UART: [state] WD Timer not started. Device not locked for debugging
623,215 UART: [kat] SHA2-256
802,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,892 UART: [kat] ++
814,334 UART: [kat] sha1
825,619 UART: [kat] SHA2-256
828,684 UART: [kat] SHA2-384
833,807 UART: [kat] SHA2-512-ACC
836,729 UART: [kat] ECC-384
3,279,622 UART: [kat] HMAC-384Kdf
3,291,653 UART: [kat] LMS
3,821,143 UART: [kat] --
3,826,648 UART: [cold-reset] ++
3,828,151 UART: [fht] FHT @ 0x50003400
3,838,764 UART: [idev] ++
3,839,330 UART: [idev] CDI.KEYID = 6
3,840,373 UART: [idev] SUBJECT.KEYID = 7
3,841,471 UART: [idev] UDS.KEYID = 0
3,842,511 ready_for_fw is high
3,842,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,485 UART: [idev] Erasing UDS.KEYID = 0
6,315,854 UART: [idev] Sha1 KeyId Algorithm
6,338,535 UART: [idev] --
6,342,571 UART: [ldev] ++
6,343,131 UART: [ldev] CDI.KEYID = 6
6,344,037 UART: [ldev] SUBJECT.KEYID = 5
6,345,241 UART: [ldev] AUTHORITY.KEYID = 7
6,346,462 UART: [ldev] FE.KEYID = 1
6,355,534 UART: [ldev] Erasing FE.KEYID = 1
8,829,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,468 UART: [ldev] --
10,618,430 UART: [fwproc] Wait for Commands...
10,620,447 UART: [fwproc] Recv command 0x46574c44
10,622,537 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,747 >>> mbox cmd response: success
14,487,265 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,491,336 UART: [afmc] ++
14,491,924 UART: [afmc] CDI.KEYID = 6
14,492,800 UART: [afmc] SUBJECT.KEYID = 7
14,494,008 UART: [afmc] AUTHORITY.KEYID = 5
16,996,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,203 UART: [afmc] --
18,796,564 UART: [cold-reset] --
18,800,041 UART: [state] Locking Datavault
18,804,201 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,834 UART: [state] Locking ICCM
18,807,758 UART: [exit] Launching FMC @ 0x40000130
18,816,202 UART:
18,816,430 UART: Running Caliptra FMC ...
18,817,520 UART:
18,817,669 UART: [state] CFI Enabled
18,825,381 UART: [fht] FMC Alias Private Key: 7
20,582,492 UART: [art] Extend RT PCRs Done
20,583,707 UART: [art] Lock RT PCRs Done
20,585,238 UART: [art] Populate DV Done
20,590,689 UART: [fht] FMC Alias Private Key: 7
20,592,269 UART: [art] Derive CDI
20,593,010 UART: [art] Store in in slot 0x4
20,635,916 UART: [art] Derive Key Pair
20,636,951 UART: [art] Store priv key in slot 0x5
23,063,161 UART: [art] Derive Key Pair - Done
23,076,109 UART: [art] Signing Cert with AUTHO
23,077,417 UART: RITY.KEYID = 7
24,782,973 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,470 UART: [art] PUB.X = 8B654D2EFD0C9D1296B3A7F28F012B5022F1AD0FF204C6FC3CF7B938AFB99A8F0EDD49CB87AAD7E83E4A887F0D44E2EC
24,791,771 UART: [art] PUB.Y = 083B8B77217168D76DDB0DC2C724536049E25553856E50C970B780C3572F8C4D52643C185D02DF6B5AB53A570A000F55
24,798,996 UART: [art] SIG.R = 57D31AC4716F35F95DC0D84709DC4238F5149E70E2FD652CD32159D7C5AAA3240F0C6FB7F28DE5CB63C9E7FB0504993F
24,806,376 UART: [art] SIG.S = 4E8D293754A4050EF09FFD4FB037AAEF0C2CE34F201197A26228EDE5454285307EDA47371E382867F6768A04003041C3
25,785,307 UART: Caliptra RT
25,786,023 UART: [state] CFI Enabled
25,902,341 UART: [rt] RT listening for mailbox commands...
25,933,641 UART: [rt]cmd =0x47544744, len=8
25,935,408 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,700,635 ready_for_fw is high
3,701,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,209 >>> mbox cmd response: success
14,274,821 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,530,712 UART:
18,531,102 UART: Running Caliptra FMC ...
18,532,284 UART:
18,532,442 UART: [state] CFI Enabled
18,540,215 UART: [fht] FMC Alias Private Key: 7
20,296,995 UART: [art] Extend RT PCRs Done
20,298,260 UART: [art] Lock RT PCRs Done
20,299,858 UART: [art] Populate DV Done
20,305,282 UART: [fht] FMC Alias Private Key: 7
20,306,877 UART: [art] Derive CDI
20,307,713 UART: [art] Store in in slot 0x4
20,350,044 UART: [art] Derive Key Pair
20,351,045 UART: [art] Store priv key in slot 0x5
22,778,293 UART: [art] Derive Key Pair - Done
22,790,909 UART: [art] Signing Cert with AUTHO
22,792,209 UART: RITY.KEYID = 7
24,497,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,047 UART: [art] PUB.X = 5799D49D4EFC68D92059CD7BA1CB44EE6EBD051239ACDB156756A65B067D6ED522C4E4B59568E22168C757868F4C4C8B
24,506,288 UART: [art] PUB.Y = 389858B6B52D71AC8E48F9147744B6B94A228B6F0E1AA9A8CCF7E89CB900F376549F39813461729294605713E50732E9
24,513,554 UART: [art] SIG.R = 98B0EB43547D767963332F81C342C699A0B43B6E207172ED30DD841ED8D5B543BA50A836CAB9D98A12CF27780454C8E8
24,520,885 UART: [art] SIG.S = 68C95D2EBB50FDDEC7C4568CCAE06DDAF624F6CCD27DD2EB5FE5A9BB6CF4F96E910F2C20BB8B95E2A19C50497CE887E0
25,499,889 UART: Caliptra RT
25,500,575 UART: [state] CFI Enabled
25,616,766 UART: [rt] RT listening for mailbox commands...
25,648,223 UART: [rt]cmd =0x47544744, len=8
25,650,508 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,011 UART:
192,383 UART: Running Caliptra ROM ...
193,486 UART:
193,628 UART: [state] CFI Enabled
266,521 UART: [state] LifecycleState = Unprovisioned
268,936 UART: [state] DebugLocked = No
271,820 UART: [state] WD Timer not started. Device not locked for debugging
277,210 UART: [kat] SHA2-256
467,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,865 UART: [kat] ++
478,396 UART: [kat] sha1
488,780 UART: [kat] SHA2-256
491,783 UART: [kat] SHA2-384
496,560 UART: [kat] SHA2-512-ACC
499,137 UART: [kat] ECC-384
2,948,608 UART: [kat] HMAC-384Kdf
2,972,446 UART: [kat] LMS
3,504,193 UART: [kat] --
3,509,610 UART: [cold-reset] ++
3,511,111 UART: [fht] FHT @ 0x50003400
3,522,821 UART: [idev] ++
3,523,464 UART: [idev] CDI.KEYID = 6
3,524,417 UART: [idev] SUBJECT.KEYID = 7
3,525,659 UART: [idev] UDS.KEYID = 0
3,526,564 ready_for_fw is high
3,526,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,796 UART: [idev] Erasing UDS.KEYID = 0
6,049,643 UART: [idev] Sha1 KeyId Algorithm
6,070,988 UART: [idev] --
6,077,300 UART: [ldev] ++
6,077,980 UART: [ldev] CDI.KEYID = 6
6,078,920 UART: [ldev] SUBJECT.KEYID = 5
6,080,042 UART: [ldev] AUTHORITY.KEYID = 7
6,081,335 UART: [ldev] FE.KEYID = 1
6,122,103 UART: [ldev] Erasing FE.KEYID = 1
8,628,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,217 UART: [ldev] --
10,435,845 UART: [fwproc] Wait for Commands...
10,438,797 UART: [fwproc] Recv command 0x46574c44
10,441,103 UART: [fwproc] Recv'd Img size: 114448 bytes
13,890,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,968,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,084,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,627,430 >>> mbox cmd response: success
14,627,967 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,630,883 UART: [afmc] ++
14,631,603 UART: [afmc] CDI.KEYID = 6
14,632,858 UART: [afmc] SUBJECT.KEYID = 7
14,634,315 UART: [afmc] AUTHORITY.KEYID = 5
17,172,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,915,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,917,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,932,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,947,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,962,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,987,144 UART: [afmc] --
18,991,472 UART: [cold-reset] --
18,997,613 UART: [state] Locking Datavault
19,003,944 UART: [state] Locking PCR0, PCR1 and PCR31
19,006,142 UART: [state] Locking ICCM
19,007,429 UART: [exit] Launching FMC @ 0x40000130
19,016,103 UART:
19,016,336 UART: Running Caliptra FMC ...
19,017,441 UART:
19,017,617 UART: [state] CFI Enabled
19,072,935 UART: [fht] FMC Alias Private Key: 7
20,836,902 UART: [art] Extend RT PCRs Done
20,838,120 UART: [art] Lock RT PCRs Done
20,839,926 UART: [art] Populate DV Done
20,845,282 UART: [fht] FMC Alias Private Key: 7
20,846,876 UART: [art] Derive CDI
20,847,614 UART: [art] Store in in slot 0x4
20,905,103 UART: [art] Derive Key Pair
20,906,133 UART: [art] Store priv key in slot 0x5
23,368,980 UART: [art] Derive Key Pair - Done
23,381,706 UART: [art] Signing Cert with AUTHO
23,383,038 UART: RITY.KEYID = 7
25,095,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,916 UART: [art] PUB.X = F6E674FC0AB13FF1092E2FEECB93BE8C7C1F59D3B7A5C64810E303093E14E0A6FE0D92F7DBBFC025129FA500DABE11AE
25,104,173 UART: [art] PUB.Y = FD9D1AC497AFB8E722E745ADD0D2D21FDB5C883A23555D4B30F8823328843B1F461BDD3E8C2CFF6B8309AB8C91601B84
25,111,476 UART: [art] SIG.R = CE268025BBDDECE7ECAEF445B1283FFB760A757657C0C69EB9A05032A6092EC5428A4AD2E3260849AB682D6F7F17AA80
25,118,862 UART: [art] SIG.S = B100E6A104CC8751E742D8ADE01F48FA54430B30711DF867BDAEA53CB39C2E3CDBBA6608243D28E3D0AA0BA2543E57B6
26,097,722 UART: Caliptra RT
26,098,432 UART: [state] CFI Enabled
26,264,018 UART: [rt] RT listening for mailbox commands...
26,295,597 UART: [rt]cmd =0x47544744, len=8
26,297,696 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,436,597 ready_for_fw is high
3,437,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,751,829 >>> mbox cmd response: success
14,752,494 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,065,297 UART:
19,065,713 UART: Running Caliptra FMC ...
19,066,816 UART:
19,066,969 UART: [state] CFI Enabled
19,133,895 UART: [fht] FMC Alias Private Key: 7
20,897,484 UART: [art] Extend RT PCRs Done
20,898,707 UART: [art] Lock RT PCRs Done
20,900,472 UART: [art] Populate DV Done
20,905,893 UART: [fht] FMC Alias Private Key: 7
20,907,363 UART: [art] Derive CDI
20,908,133 UART: [art] Store in in slot 0x4
20,965,859 UART: [art] Derive Key Pair
20,966,864 UART: [art] Store priv key in slot 0x5
23,429,959 UART: [art] Derive Key Pair - Done
23,443,119 UART: [art] Signing Cert with AUTHO
23,444,420 UART: RITY.KEYID = 7
25,156,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,553 UART: [art] PUB.X = AF3E07E7CFC797ACCE61437E5CEA8CAB44DDF237B4D9026ECC334AD540BA44519D16E2CDDB2451BF9B237856C8BB8C90
25,164,851 UART: [art] PUB.Y = 13BE0FF3D69A2D972AC15632F00C76281F5088506ED7831F938444D470758A7884434201BD7D986D15D98EAD300547F2
25,172,106 UART: [art] SIG.R = 202D4EBF61CC0CE0140248B6C6ED2D0CC8D86183F024C32C66A35337A462CBDC749134775A79596CA2B5E665181FB50E
25,179,490 UART: [art] SIG.S = D7EE41F8724ED3753280EB4F42CBB1704FEFEC8E3FCCE8062A56C9602DB93D5AD32EAAA55096C1D335B706B9B330211D
26,158,686 UART: Caliptra RT
26,159,377 UART: [state] CFI Enabled
26,325,479 UART: [rt] RT listening for mailbox commands...
26,356,961 UART: [rt]cmd =0x47544744, len=8
26,358,983 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,422 UART:
192,796 UART: Running Caliptra ROM ...
193,987 UART:
603,807 UART: [state] CFI Enabled
616,844 UART: [state] LifecycleState = Unprovisioned
619,207 UART: [state] DebugLocked = No
622,025 UART: [state] WD Timer not started. Device not locked for debugging
627,190 UART: [kat] SHA2-256
817,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,850 UART: [kat] ++
828,402 UART: [kat] sha1
839,791 UART: [kat] SHA2-256
842,842 UART: [kat] SHA2-384
849,257 UART: [kat] SHA2-512-ACC
851,909 UART: [kat] ECC-384
3,294,249 UART: [kat] HMAC-384Kdf
3,307,018 UART: [kat] LMS
3,838,887 UART: [kat] --
3,842,043 UART: [cold-reset] ++
3,843,267 UART: [fht] FHT @ 0x50003400
3,854,234 UART: [idev] ++
3,854,942 UART: [idev] CDI.KEYID = 6
3,855,874 UART: [idev] SUBJECT.KEYID = 7
3,857,039 UART: [idev] UDS.KEYID = 0
3,857,961 ready_for_fw is high
3,858,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,991 UART: [idev] Erasing UDS.KEYID = 0
6,331,057 UART: [idev] Sha1 KeyId Algorithm
6,354,708 UART: [idev] --
6,360,153 UART: [ldev] ++
6,360,864 UART: [ldev] CDI.KEYID = 6
6,361,777 UART: [ldev] SUBJECT.KEYID = 5
6,362,928 UART: [ldev] AUTHORITY.KEYID = 7
6,364,153 UART: [ldev] FE.KEYID = 1
6,375,002 UART: [ldev] Erasing FE.KEYID = 1
8,848,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,317 UART: [ldev] --
10,639,169 UART: [fwproc] Wait for Commands...
10,642,224 UART: [fwproc] Recv command 0x46574c44
10,644,527 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,829,562 >>> mbox cmd response: success
14,830,068 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,832,850 UART: [afmc] ++
14,833,538 UART: [afmc] CDI.KEYID = 6
14,834,693 UART: [afmc] SUBJECT.KEYID = 7
14,836,235 UART: [afmc] AUTHORITY.KEYID = 5
17,337,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,392 UART: [afmc] --
19,133,925 UART: [cold-reset] --
19,137,734 UART: [state] Locking Datavault
19,142,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,720 UART: [state] Locking ICCM
19,146,248 UART: [exit] Launching FMC @ 0x40000130
19,154,904 UART:
19,155,129 UART: Running Caliptra FMC ...
19,156,142 UART:
19,156,280 UART: [state] CFI Enabled
19,164,461 UART: [fht] FMC Alias Private Key: 7
20,921,758 UART: [art] Extend RT PCRs Done
20,922,974 UART: [art] Lock RT PCRs Done
20,924,783 UART: [art] Populate DV Done
20,930,127 UART: [fht] FMC Alias Private Key: 7
20,931,709 UART: [art] Derive CDI
20,932,514 UART: [art] Store in in slot 0x4
20,975,043 UART: [art] Derive Key Pair
20,976,039 UART: [art] Store priv key in slot 0x5
23,402,268 UART: [art] Derive Key Pair - Done
23,415,096 UART: [art] Signing Cert with AUTHO
23,416,398 UART: RITY.KEYID = 7
25,122,170 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,673 UART: [art] PUB.X = D35D8FFD2AFDB6AA06B434187A40AF993B944F2996AC14C4D696B8A44C983DBF539D1300AD3A6B511BB8366CE4A05651
25,130,959 UART: [art] PUB.Y = 5252E884C16ED3D85ACA83C4B2725807528D0ED8131BFEEB1D4A463586804B47B151A34AFD26EEE0550A65115165DDF6
25,138,228 UART: [art] SIG.R = 769292A076386B70A5094F4C3EC0FF58B36A9782D09B212AF135AEAD92CD818472166C838D2CA49E4E862888CBAA0883
25,145,601 UART: [art] SIG.S = 7EDE8776A8D3E94C89DB374BE300CD8D5F62057CDB0458D819FEA7E60CE1D8E8BBC0055029CB16136FAB29934C6DA6A4
26,125,179 UART: Caliptra RT
26,125,866 UART: [state] CFI Enabled
26,242,537 UART: [rt] RT listening for mailbox commands...
26,273,884 UART: [rt]cmd =0x47544744, len=8
26,275,808 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,758,249 ready_for_fw is high
3,758,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,768 >>> mbox cmd response: success
14,968,399 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,220,625 UART:
19,221,015 UART: Running Caliptra FMC ...
19,222,110 UART:
19,222,254 UART: [state] CFI Enabled
19,230,416 UART: [fht] FMC Alias Private Key: 7
20,987,222 UART: [art] Extend RT PCRs Done
20,988,449 UART: [art] Lock RT PCRs Done
20,990,144 UART: [art] Populate DV Done
20,995,668 UART: [fht] FMC Alias Private Key: 7
20,997,029 UART: [art] Derive CDI
20,997,765 UART: [art] Store in in slot 0x4
21,040,161 UART: [art] Derive Key Pair
21,041,154 UART: [art] Store priv key in slot 0x5
23,467,854 UART: [art] Derive Key Pair - Done
23,480,847 UART: [art] Signing Cert with AUTHO
23,482,183 UART: RITY.KEYID = 7
25,187,822 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,325 UART: [art] PUB.X = E23197B20E951D8F3F49FC0A6816252C935E7D43A8825C9D6F2ED90C031D6D9161B698311552D6A1927D62C37E332108
25,196,562 UART: [art] PUB.Y = A2BEE9E69D9F778F3C3874C8D37236E67CD698BC0601B6EDEAF305DE54136DE89E580388C4B395A5FAF29DC912151305
25,203,859 UART: [art] SIG.R = A9B7499CF1A30D8C058DA8354FFC0FC6CC2058426B648C7AB388361D49B51673AFA832708129934057FCD6DE02140290
25,211,181 UART: [art] SIG.S = 73192222FD5F964D1F3E7240A89134287F7FBA887B81DD54F9704CD235AE825CD4F20AD8DCB045BA0B29803D0B48DE65
26,190,930 UART: Caliptra RT
26,191,633 UART: [state] CFI Enabled
26,308,019 UART: [rt] RT listening for mailbox commands...
26,339,380 UART: [rt]cmd =0x47544744, len=8
26,341,421 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,364 UART: [kat] SHA2-512-ACC
897,265 UART: [kat] ECC-384
902,982 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,875 UART: [cold-reset] ++
1,477,219 UART: [fht] Storing FHT @ 0x50003400
1,479,928 UART: [idev] ++
1,480,096 UART: [idev] CDI.KEYID = 6
1,480,456 UART: [idev] SUBJECT.KEYID = 7
1,480,880 UART: [idev] UDS.KEYID = 0
1,481,225 ready_for_fw is high
1,481,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,804 UART: [idev] Erasing UDS.KEYID = 0
1,505,106 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,676 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,520,993 UART: [ldev] Erasing FE.KEYID = 1
1,546,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,182 UART: [ldev] --
1,585,587 UART: [fwproc] Waiting for Commands...
1,586,204 UART: [fwproc] Received command 0x46574c44
1,586,995 UART: [fwproc] Received Image of size 114448 bytes
2,887,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,311 >>> mbox cmd response: success
3,081,311 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,082,413 UART: [afmc] ++
3,082,581 UART: [afmc] CDI.KEYID = 6
3,082,943 UART: [afmc] SUBJECT.KEYID = 7
3,083,368 UART: [afmc] AUTHORITY.KEYID = 5
3,118,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,052 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,742 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,643 UART: [afmc] --
3,161,581 UART: [cold-reset] --
3,162,633 UART: [state] Locking Datavault
3,163,878 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,482 UART: [state] Locking ICCM
3,165,150 UART: [exit] Launching FMC @ 0x40000130
3,170,479 UART:
3,170,495 UART: Running Caliptra FMC ...
3,170,903 UART:
3,170,957 UART: [state] CFI Enabled
3,181,518 UART: [fht] FMC Alias Private Key: 7
3,289,397 UART: [art] Extend RT PCRs Done
3,289,825 UART: [art] Lock RT PCRs Done
3,291,555 UART: [art] Populate DV Done
3,299,952 UART: [fht] FMC Alias Private Key: 7
3,301,042 UART: [art] Derive CDI
3,301,322 UART: [art] Store in in slot 0x4
3,386,843 UART: [art] Derive Key Pair
3,387,203 UART: [art] Store priv key in slot 0x5
3,400,737 UART: [art] Derive Key Pair - Done
3,415,422 UART: [art] Signing Cert with AUTHO
3,415,902 UART: RITY.KEYID = 7
3,431,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,865 UART: [art] PUB.X = 8B01E8947FDCF57AE27FFF05D47A5999DC36D850B7AE6652D10E7468A610C8F72AE6E7FC5B9E151C0098A87726915724
3,438,608 UART: [art] PUB.Y = FE4B1D635AF8A03B6E59F92AD30F3AE291583224A253B962B17974A18E8C6C7FD0D531229A9BE57DC6A6B006339CF347
3,445,558 UART: [art] SIG.R = 0F992B11AF8AA7933B9571310EBE880524E726AEFB136E3CF197167A41E457846F2B9E5D0DA1BFB595C9E438123DEC87
3,452,322 UART: [art] SIG.S = D5D394EF4891D0233B6C23BC7F24AA596763EACCF7EE7EAFABCDC64E3CBAAFA2B8A004EB45259669CA7FD7BA359A5FEF
3,475,678 UART: Caliptra RT
3,475,931 UART: [state] CFI Enabled
3,584,054 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,690 UART: [rt]cmd =0x47544744, len=8
3,616,088 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 ready_for_fw is high
1,363,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,939 >>> mbox cmd response: success
2,928,939 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,990,495 UART:
2,990,511 UART: Running Caliptra FMC ...
2,990,919 UART:
2,990,973 UART: [state] CFI Enabled
3,001,540 UART: [fht] FMC Alias Private Key: 7
3,109,455 UART: [art] Extend RT PCRs Done
3,109,883 UART: [art] Lock RT PCRs Done
3,111,745 UART: [art] Populate DV Done
3,119,836 UART: [fht] FMC Alias Private Key: 7
3,120,814 UART: [art] Derive CDI
3,121,094 UART: [art] Store in in slot 0x4
3,206,691 UART: [art] Derive Key Pair
3,207,051 UART: [art] Store priv key in slot 0x5
3,219,923 UART: [art] Derive Key Pair - Done
3,234,971 UART: [art] Signing Cert with AUTHO
3,235,451 UART: RITY.KEYID = 7
3,250,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,394 UART: [art] PUB.X = E3FCFB09737F70E9EA129FCA2984D60ADC609F2A38A4DAF0F771CCBCB76456E6B0C142A55D1D875EAD0D9E88FED7A4FB
3,258,183 UART: [art] PUB.Y = 6155D0ED0D72C34619E905A1FE7C0DB12AB106D942AAE78FB289CB4D1E24E333D80B1896A57E4BD51A4AFC11D22A815C
3,265,132 UART: [art] SIG.R = 31307847EBE1D09A644B9B16D5362EBE1E3E870FE28FFAF19DED7C9E8F0181181C703487E3395C5F2324ED4B86CF772D
3,271,904 UART: [art] SIG.S = E9A3B7C90895117A756A10746A3DA8F93055BF9ACD07302BFBD3E92A6DFE41A6A3C06DE13642F072FBE14BE9177CEEDB
3,295,261 UART: Caliptra RT
3,295,514 UART: [state] CFI Enabled
3,403,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,983 UART: [rt]cmd =0x47544744, len=8
3,435,339 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,618 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,959 UART: [idev] ++
1,480,127 UART: [idev] CDI.KEYID = 6
1,480,487 UART: [idev] SUBJECT.KEYID = 7
1,480,911 UART: [idev] UDS.KEYID = 0
1,481,256 ready_for_fw is high
1,481,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,988 UART: [ldev] ++
1,515,156 UART: [ldev] CDI.KEYID = 6
1,515,519 UART: [ldev] SUBJECT.KEYID = 5
1,515,945 UART: [ldev] AUTHORITY.KEYID = 7
1,516,408 UART: [ldev] FE.KEYID = 1
1,521,586 UART: [ldev] Erasing FE.KEYID = 1
1,546,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,511 UART: [ldev] --
1,585,852 UART: [fwproc] Waiting for Commands...
1,586,489 UART: [fwproc] Received command 0x46574c44
1,587,280 UART: [fwproc] Received Image of size 114448 bytes
2,887,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,725 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,062 >>> mbox cmd response: success
3,080,062 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,081,122 UART: [afmc] ++
3,081,290 UART: [afmc] CDI.KEYID = 6
3,081,652 UART: [afmc] SUBJECT.KEYID = 7
3,082,077 UART: [afmc] AUTHORITY.KEYID = 5
3,117,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,421 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,111 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,130 UART: [afmc] --
3,160,130 UART: [cold-reset] --
3,160,992 UART: [state] Locking Datavault
3,161,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,401 UART: [state] Locking ICCM
3,162,877 UART: [exit] Launching FMC @ 0x40000130
3,168,206 UART:
3,168,222 UART: Running Caliptra FMC ...
3,168,630 UART:
3,168,773 UART: [state] CFI Enabled
3,179,008 UART: [fht] FMC Alias Private Key: 7
3,286,431 UART: [art] Extend RT PCRs Done
3,286,859 UART: [art] Lock RT PCRs Done
3,288,427 UART: [art] Populate DV Done
3,296,900 UART: [fht] FMC Alias Private Key: 7
3,297,840 UART: [art] Derive CDI
3,298,120 UART: [art] Store in in slot 0x4
3,383,639 UART: [art] Derive Key Pair
3,383,999 UART: [art] Store priv key in slot 0x5
3,397,153 UART: [art] Derive Key Pair - Done
3,412,169 UART: [art] Signing Cert with AUTHO
3,412,649 UART: RITY.KEYID = 7
3,427,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,638 UART: [art] PUB.X = 686EC940DBC66CA25E4F8494CAB5EB2AAC371A26DF1BABFEA1E9CA017B956E2D23F30E9CFBC72883759F75C3A520E89D
3,435,426 UART: [art] PUB.Y = 1D9118B7CE341FF9EB74414B95E9295D0BBDDBAA82951FFA8DE4B3B5386BBDDF403DFD3A4316ECADC512EA872BC4000E
3,442,374 UART: [art] SIG.R = FE218B44FB5BD64C4FDD2C810BAD7450C3F23C490C1920F967DE7B177FC2EE497FE9B198FEC0205DF954205DFF81AE8F
3,449,158 UART: [art] SIG.S = 0765BCFFC46A97B552E52FE493B5C0E179BAC5CD8F2BE8C3DEBA13241EFBDDD422D06F49762C8E2B4288ACE9C097B407
3,472,483 UART: Caliptra RT
3,472,828 UART: [state] CFI Enabled
3,581,161 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,965 UART: [rt]cmd =0x47544744, len=8
3,613,555 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,840 ready_for_fw is high
1,362,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,058 >>> mbox cmd response: success
2,931,058 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,992,602 UART:
2,992,618 UART: Running Caliptra FMC ...
2,993,026 UART:
2,993,169 UART: [state] CFI Enabled
3,003,488 UART: [fht] FMC Alias Private Key: 7
3,111,317 UART: [art] Extend RT PCRs Done
3,111,745 UART: [art] Lock RT PCRs Done
3,113,345 UART: [art] Populate DV Done
3,121,576 UART: [fht] FMC Alias Private Key: 7
3,122,700 UART: [art] Derive CDI
3,122,980 UART: [art] Store in in slot 0x4
3,208,689 UART: [art] Derive Key Pair
3,209,049 UART: [art] Store priv key in slot 0x5
3,222,125 UART: [art] Derive Key Pair - Done
3,236,965 UART: [art] Signing Cert with AUTHO
3,237,445 UART: RITY.KEYID = 7
3,252,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,506 UART: [art] PUB.X = 31994315E11748FCCD34FCCCD876D57C9020CF2C660E6D15B290916D142A44ACC21AC3F87C5CD0EA4F29D4C227606BDE
3,260,285 UART: [art] PUB.Y = 6087FE6CC92421ABD58C80CA30CD064D345CC6CE88ABD100AB46838807268F01016D0EBF6C4E60A42FC1E9A017C32D7B
3,267,210 UART: [art] SIG.R = F3CA096DBB3FD33771B3539034EB6EDA59CD922B274A1F2FC98D44D75C4E376F7808F6793B807481E40964F970613DB8
3,273,973 UART: [art] SIG.S = 97DE812E0F1B3F3FC86C0E8213F8EABCFB2728202B474E986C16A46420AA2EED4643CD4560C236D00416D97C05806849
3,297,412 UART: Caliptra RT
3,297,757 UART: [state] CFI Enabled
3,405,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,671 UART: [rt]cmd =0x47544744, len=8
3,437,055 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
893,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,279 UART: [kat] ++
897,431 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,994 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,130 UART: [idev] Erasing UDS.KEYID = 0
1,200,793 UART: [idev] Sha1 KeyId Algorithm
1,209,085 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,217,021 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,343 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,614 UART: [fwproc] Recv command 0x46574c44
1,284,342 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,418 >>> mbox cmd response: success
2,777,418 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,778,452 UART: [afmc] ++
2,778,620 UART: [afmc] CDI.KEYID = 6
2,778,982 UART: [afmc] SUBJECT.KEYID = 7
2,779,407 UART: [afmc] AUTHORITY.KEYID = 5
2,814,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,487 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,889 UART: [afmc] --
2,857,847 UART: [cold-reset] --
2,858,683 UART: [state] Locking Datavault
2,859,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,360 UART: [state] Locking ICCM
2,860,932 UART: [exit] Launching FMC @ 0x40000130
2,866,261 UART:
2,866,277 UART: Running Caliptra FMC ...
2,866,685 UART:
2,866,739 UART: [state] CFI Enabled
2,877,082 UART: [fht] FMC Alias Private Key: 7
2,985,761 UART: [art] Extend RT PCRs Done
2,986,189 UART: [art] Lock RT PCRs Done
2,987,853 UART: [art] Populate DV Done
2,995,996 UART: [fht] FMC Alias Private Key: 7
2,996,986 UART: [art] Derive CDI
2,997,266 UART: [art] Store in in slot 0x4
3,083,225 UART: [art] Derive Key Pair
3,083,585 UART: [art] Store priv key in slot 0x5
3,096,843 UART: [art] Derive Key Pair - Done
3,111,816 UART: [art] Signing Cert with AUTHO
3,112,296 UART: RITY.KEYID = 7
3,127,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,645 UART: [art] PUB.X = 4E33215A96D47BFD21C1F0E4DB9BADC644A72FDB94B11A9B269FA919D0FDB5714134CB36FAC25560F6AC6A9B7517F8E2
3,135,433 UART: [art] PUB.Y = 50C93665EDCDA5218A2030312E22046FF1237C672D775CBAC026B476A2CDDC3B00AF19577F7EFC6FB5FC18F77BE5ACD7
3,142,374 UART: [art] SIG.R = 189150A2EC682CDC7D8D0C7ACE8E71D4A6A5EB0E4A67C9052E3B1C3AF998155FCE3D107142FE7A7CDA963BC1129777C5
3,149,151 UART: [art] SIG.S = 1B96993CC18712AA73B23F1995432BB147ACEFB01A813E4B44FED5BB7E6FE06AEA0D847CA69561B841EF4B683192C5A6
3,172,491 UART: Caliptra RT
3,172,744 UART: [state] CFI Enabled
3,280,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,961 UART: [rt]cmd =0x47544744, len=8
3,312,483 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,937 >>> mbox cmd response: success
2,627,937 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,690,119 UART:
2,690,135 UART: Running Caliptra FMC ...
2,690,543 UART:
2,690,597 UART: [state] CFI Enabled
2,701,170 UART: [fht] FMC Alias Private Key: 7
2,809,117 UART: [art] Extend RT PCRs Done
2,809,545 UART: [art] Lock RT PCRs Done
2,811,311 UART: [art] Populate DV Done
2,819,578 UART: [fht] FMC Alias Private Key: 7
2,820,728 UART: [art] Derive CDI
2,821,008 UART: [art] Store in in slot 0x4
2,906,983 UART: [art] Derive Key Pair
2,907,343 UART: [art] Store priv key in slot 0x5
2,920,355 UART: [art] Derive Key Pair - Done
2,935,061 UART: [art] Signing Cert with AUTHO
2,935,541 UART: RITY.KEYID = 7
2,950,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,458 UART: [art] PUB.X = E4F757D2355116406AA068868C693F326407EC58970F2557451F34FD4D23F24A34468BBA55D8881DAF31F3686BA2E28B
2,958,216 UART: [art] PUB.Y = FA58BDB68B1224C702D7B9F27A73F5FE8CBED4ABF5C9B3B60BB91A035C6A083EBA55B857136B2DCE790EFBF1767417AC
2,965,175 UART: [art] SIG.R = E6F7F083F6D4CA3FA01EACAC0B6CEC26834178839BC77AE9DFF2AAF253A10D58C1DED6A6C30E8A0860EA0AC84363C7F0
2,971,956 UART: [art] SIG.S = A935329AC97D4E57DFB8EE34AE12E642198A466FF5BB0132A43BE362D7D07B94AE0A993DE06C75BDBC1E9A0C257FA490
2,996,040 UART: Caliptra RT
2,996,293 UART: [state] CFI Enabled
3,104,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,453 UART: [rt]cmd =0x47544744, len=8
3,135,909 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
893,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,782 UART: [kat] ++
897,934 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
917,897 UART: [kat] HMAC-384Kdf
922,467 UART: [kat] LMS
1,170,795 UART: [kat] --
1,171,470 UART: [cold-reset] ++
1,171,832 UART: [fht] FHT @ 0x50003400
1,174,643 UART: [idev] ++
1,174,811 UART: [idev] CDI.KEYID = 6
1,175,171 UART: [idev] SUBJECT.KEYID = 7
1,175,595 UART: [idev] UDS.KEYID = 0
1,175,940 ready_for_fw is high
1,175,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,697 UART: [idev] Erasing UDS.KEYID = 0
1,200,182 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,403 UART: [ldev] AUTHORITY.KEYID = 7
1,210,866 UART: [ldev] FE.KEYID = 1
1,216,132 UART: [ldev] Erasing FE.KEYID = 1
1,242,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,696 UART: [ldev] --
1,282,061 UART: [fwproc] Wait for Commands...
1,282,655 UART: [fwproc] Recv command 0x46574c44
1,283,383 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,647 >>> mbox cmd response: success
2,774,647 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,775,689 UART: [afmc] ++
2,775,857 UART: [afmc] CDI.KEYID = 6
2,776,219 UART: [afmc] SUBJECT.KEYID = 7
2,776,644 UART: [afmc] AUTHORITY.KEYID = 5
2,811,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,294 UART: [afmc] --
2,855,226 UART: [cold-reset] --
2,856,128 UART: [state] Locking Datavault
2,857,081 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,685 UART: [state] Locking ICCM
2,858,279 UART: [exit] Launching FMC @ 0x40000130
2,863,608 UART:
2,863,624 UART: Running Caliptra FMC ...
2,864,032 UART:
2,864,175 UART: [state] CFI Enabled
2,874,476 UART: [fht] FMC Alias Private Key: 7
2,981,925 UART: [art] Extend RT PCRs Done
2,982,353 UART: [art] Lock RT PCRs Done
2,984,193 UART: [art] Populate DV Done
2,992,640 UART: [fht] FMC Alias Private Key: 7
2,993,626 UART: [art] Derive CDI
2,993,906 UART: [art] Store in in slot 0x4
3,079,579 UART: [art] Derive Key Pair
3,079,939 UART: [art] Store priv key in slot 0x5
3,093,661 UART: [art] Derive Key Pair - Done
3,108,431 UART: [art] Signing Cert with AUTHO
3,108,911 UART: RITY.KEYID = 7
3,124,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,142 UART: [art] PUB.X = 27F4FFCCEEEF80ABE2574A833B9866942A6F6370E411586387D77AB48B2767FD7D14A458890EBC8FBB2CFBF689E140A9
3,131,921 UART: [art] PUB.Y = D3D0C5FE0E0ED57305D14B163A725ACE69DBBDC757178F3DF38AAF03317B5C63C8BFB8452A7C8B5400003A8AD2A617DE
3,138,833 UART: [art] SIG.R = 966B6B38FAFC8E5689A94794DC297F717CFEC789C31E60D60D20C9AD54DE3A29FF060C780FDD5E5E658EAE02DB6B26CC
3,145,608 UART: [art] SIG.S = E4496CBAFB75D720CA3360B8116740EECFCE3589AD873F86012F8F737D26D7C9BA227965FED27C7A6DF96A031020BA65
3,169,003 UART: Caliptra RT
3,169,348 UART: [state] CFI Enabled
3,276,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,534 UART: [rt]cmd =0x47544744, len=8
3,308,110 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,130 ready_for_fw is high
1,061,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,672 >>> mbox cmd response: success
2,627,672 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,690,412 UART:
2,690,428 UART: Running Caliptra FMC ...
2,690,836 UART:
2,690,979 UART: [state] CFI Enabled
2,701,616 UART: [fht] FMC Alias Private Key: 7
2,809,503 UART: [art] Extend RT PCRs Done
2,809,931 UART: [art] Lock RT PCRs Done
2,811,895 UART: [art] Populate DV Done
2,820,232 UART: [fht] FMC Alias Private Key: 7
2,821,226 UART: [art] Derive CDI
2,821,506 UART: [art] Store in in slot 0x4
2,907,559 UART: [art] Derive Key Pair
2,907,919 UART: [art] Store priv key in slot 0x5
2,921,377 UART: [art] Derive Key Pair - Done
2,936,061 UART: [art] Signing Cert with AUTHO
2,936,541 UART: RITY.KEYID = 7
2,951,767 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,532 UART: [art] PUB.X = E2DAEBC767380B58986DDCE2EAEE4E29F641A93FBEBB91CD1EA63A10AB197AEE43A8C09BCFC7FE8B8387C3270651AA52
2,959,324 UART: [art] PUB.Y = 0EDE34738B911ECD74D82F6EC872874ECC4F16228414E7736AC8FF4C69DD0B0E79EA78416BD0DC6D2D8ECF651730E25B
2,966,279 UART: [art] SIG.R = 2372E73F204090E5982CFF93205C674E766E175FAD6F58C69EDC0D8336D249B8A9941952466B900557C6A109DED11BDB
2,973,038 UART: [art] SIG.S = 6226ADB53EA65E23D4CA46FE41927D68DD7E668ABD8B3E931DD8808D660C42EB48368E1B56A56C79F3531DA49444DBD1
2,996,162 UART: Caliptra RT
2,996,507 UART: [state] CFI Enabled
3,103,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,128 UART: [rt]cmd =0x47544744, len=8
3,135,676 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,174,503 ready_for_fw is high
1,174,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,829 UART: [idev] --
1,209,734 UART: [ldev] ++
1,209,902 UART: [ldev] CDI.KEYID = 6
1,210,266 UART: [ldev] SUBJECT.KEYID = 5
1,210,693 UART: [ldev] AUTHORITY.KEYID = 7
1,211,156 UART: [ldev] FE.KEYID = 1
1,216,308 UART: [ldev] Erasing FE.KEYID = 1
1,243,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,042 UART: [ldev] --
1,282,310 UART: [fwproc] Wait for Commands...
1,283,049 UART: [fwproc] Recv command 0x46574c44
1,283,782 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,226 >>> mbox cmd response: success
2,776,226 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,777,291 UART: [afmc] ++
2,777,459 UART: [afmc] CDI.KEYID = 6
2,777,822 UART: [afmc] SUBJECT.KEYID = 7
2,778,248 UART: [afmc] AUTHORITY.KEYID = 5
2,813,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,942 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,661 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,440 UART: [afmc] --
2,857,458 UART: [cold-reset] --
2,858,410 UART: [state] Locking Datavault
2,859,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,119 UART: [state] Locking ICCM
2,860,781 UART: [exit] Launching FMC @ 0x40000130
2,866,110 UART:
2,866,126 UART: Running Caliptra FMC ...
2,866,534 UART:
2,866,588 UART: [state] CFI Enabled
2,876,975 UART: [fht] FMC Alias Private Key: 7
2,985,494 UART: [art] Extend RT PCRs Done
2,985,922 UART: [art] Lock RT PCRs Done
2,987,408 UART: [art] Populate DV Done
2,995,803 UART: [fht] FMC Alias Private Key: 7
2,996,865 UART: [art] Derive CDI
2,997,145 UART: [art] Store in in slot 0x4
3,082,734 UART: [art] Derive Key Pair
3,083,094 UART: [art] Store priv key in slot 0x5
3,095,860 UART: [art] Derive Key Pair - Done
3,110,681 UART: [art] Signing Cert with AUTHO
3,111,161 UART: RITY.KEYID = 7
3,126,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,482 UART: [art] PUB.X = 9240A3FB449DAFCC31EB6166988B6E0357C1C92AC9E77A4CD3B75CA233B702BF79F0A9E90329D318F99B8F2941DA6A28
3,134,253 UART: [art] PUB.Y = 0E0AFBCAE6769C40AE750168F989BCF793D07048F4BF505A13F351261A202C560A57D48086E41145DC1E785AA8EFE7BA
3,141,199 UART: [art] SIG.R = E7C935D0FC0017AD5C027BCB78574FE7F05375D6EB18DEB14D677CB0E858E061A8B20A0502E5063D2D381E1D6F2B8DB3
3,147,944 UART: [art] SIG.S = 633C049D1C61210860EB2A8C7C7A286AFD661FC22D6F6AB1E8C34A55CA83D51A95B5FEF45DED4FDBA71C6701BF375DCC
3,171,940 UART: Caliptra RT
3,172,193 UART: [state] CFI Enabled
3,280,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,198 UART: [rt]cmd =0x47544744, len=8
3,313,022 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,684 ready_for_fw is high
1,055,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,050 >>> mbox cmd response: success
2,625,050 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,687,370 UART:
2,687,386 UART: Running Caliptra FMC ...
2,687,794 UART:
2,687,848 UART: [state] CFI Enabled
2,698,275 UART: [fht] FMC Alias Private Key: 7
2,805,760 UART: [art] Extend RT PCRs Done
2,806,188 UART: [art] Lock RT PCRs Done
2,807,746 UART: [art] Populate DV Done
2,816,189 UART: [fht] FMC Alias Private Key: 7
2,817,205 UART: [art] Derive CDI
2,817,485 UART: [art] Store in in slot 0x4
2,903,306 UART: [art] Derive Key Pair
2,903,666 UART: [art] Store priv key in slot 0x5
2,917,092 UART: [art] Derive Key Pair - Done
2,932,042 UART: [art] Signing Cert with AUTHO
2,932,522 UART: RITY.KEYID = 7
2,947,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,471 UART: [art] PUB.X = 02615E2786E5DFDCB36609CEBCEBF96C2066244D743D87959DFAA7BDF2C1EA5A7C697015A1A6A056F16DE22D612DDEC0
2,955,253 UART: [art] PUB.Y = 78D626BF97661618F3D941033C5C541B3D53375C1900C8D353FBE4B81D8FADAE3C1D65C96D35668FF75CA1E16FFDB5FD
2,962,190 UART: [art] SIG.R = 2A1AA9389FA1438161C2DE133A28971E90F358645BE56C3ADD127D9DB423C0A82A8C7429D5E7225E79E57E0C4490C8A9
2,968,959 UART: [art] SIG.S = ED4BEEA0A933AC0D0F4EAA997DBE68D5A9EC9674B53CB79F50BA8FBA190863A57A002FCB376858215C7626DD9F535BC3
2,992,637 UART: Caliptra RT
2,992,890 UART: [state] CFI Enabled
3,100,461 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,003 UART: [rt]cmd =0x47544744, len=8
3,132,673 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,863 UART: [state] LifecycleState = Unprovisioned
85,518 UART: [state] DebugLocked = No
86,036 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
890,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,422 UART: [kat] SHA2-256
901,362 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,709 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,564 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,174,080 ready_for_fw is high
1,174,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,198,886 UART: [idev] Sha1 KeyId Algorithm
1,207,606 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,349 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,223 UART: [fwproc] Wait for Commands...
1,282,010 UART: [fwproc] Recv command 0x46574c44
1,282,743 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,639 >>> mbox cmd response: success
2,773,639 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,808 UART: [afmc] ++
2,774,976 UART: [afmc] CDI.KEYID = 6
2,775,339 UART: [afmc] SUBJECT.KEYID = 7
2,775,765 UART: [afmc] AUTHORITY.KEYID = 5
2,810,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,057 UART: [afmc] --
2,854,153 UART: [cold-reset] --
2,854,979 UART: [state] Locking Datavault
2,856,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,812 UART: [state] Locking ICCM
2,857,332 UART: [exit] Launching FMC @ 0x40000130
2,862,661 UART:
2,862,677 UART: Running Caliptra FMC ...
2,863,085 UART:
2,863,228 UART: [state] CFI Enabled
2,873,897 UART: [fht] FMC Alias Private Key: 7
2,981,376 UART: [art] Extend RT PCRs Done
2,981,804 UART: [art] Lock RT PCRs Done
2,983,022 UART: [art] Populate DV Done
2,991,149 UART: [fht] FMC Alias Private Key: 7
2,992,239 UART: [art] Derive CDI
2,992,519 UART: [art] Store in in slot 0x4
3,077,990 UART: [art] Derive Key Pair
3,078,350 UART: [art] Store priv key in slot 0x5
3,091,736 UART: [art] Derive Key Pair - Done
3,106,299 UART: [art] Signing Cert with AUTHO
3,106,779 UART: RITY.KEYID = 7
3,121,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,744 UART: [art] PUB.X = A3794D047651E3C4D3B12B66EE23F2C722914A7056D0256011423D07A7264F00DCBA15CD7F164E407B1098C884B4B4A1
3,129,482 UART: [art] PUB.Y = B5C79BD9EE733A0B37CAF29A940518B71BF6318ADC0CA6C3BEC8B36232FB7239C65C0CFC2EAFF441C711FEEFA2A7E353
3,136,446 UART: [art] SIG.R = 98812A9FBD49E8B7B3E220C2130B6E459421CDCFAEB2D10EA801C197882F8513B644E036520ECFFAA0C2537E208290DB
3,143,212 UART: [art] SIG.S = 6C5D6661182925804C30A1BEBC091AE48CFA6E73E038B3D79F9611A9CF6D41130B4ABAB450BDEB87A46BE1A8E6C9C739
3,167,399 UART: Caliptra RT
3,167,744 UART: [state] CFI Enabled
3,275,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,949 UART: [rt]cmd =0x47544744, len=8
3,307,381 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 ready_for_fw is high
1,056,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,875 >>> mbox cmd response: success
2,624,875 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,687,553 UART:
2,687,569 UART: Running Caliptra FMC ...
2,687,977 UART:
2,688,120 UART: [state] CFI Enabled
2,698,995 UART: [fht] FMC Alias Private Key: 7
2,806,710 UART: [art] Extend RT PCRs Done
2,807,138 UART: [art] Lock RT PCRs Done
2,808,652 UART: [art] Populate DV Done
2,816,629 UART: [fht] FMC Alias Private Key: 7
2,817,617 UART: [art] Derive CDI
2,817,897 UART: [art] Store in in slot 0x4
2,903,826 UART: [art] Derive Key Pair
2,904,186 UART: [art] Store priv key in slot 0x5
2,917,128 UART: [art] Derive Key Pair - Done
2,931,556 UART: [art] Signing Cert with AUTHO
2,932,036 UART: RITY.KEYID = 7
2,947,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,111 UART: [art] PUB.X = 2D33AD85B5A5D711EFA88FDB82AEB4E55F8A12093F261EB8FC3A7AB919140D1759A2B25C2A4B2580CF7F59826F014A23
2,954,884 UART: [art] PUB.Y = F90DBA2284E622D56A223716D2C852893607853EE25C759467D661FF3FB05B891E66DD75EE27F78C4B81BE9A8886AAF2
2,961,830 UART: [art] SIG.R = 9353FA7B69FC93CF550635D37642427D2AF0BCC607C84478B9216C5863546B906DFF65C66C5DD052CC160BC6BE627ACA
2,968,597 UART: [art] SIG.S = BFD2B667AF389328EF9423FC43BAF7FC786EC7ED9DF258551FE2C8168A4856CF394148F9FB093496D0B59C7E22B93852
2,992,417 UART: Caliptra RT
2,992,762 UART: [state] CFI Enabled
3,100,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,946 UART: [rt]cmd =0x47544744, len=8
3,132,546 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,119 UART:
192,479 UART: Running Caliptra ROM ...
193,603 UART:
193,753 UART: [state] CFI Enabled
264,994 UART: [state] LifecycleState = Unprovisioned
266,917 UART: [state] DebugLocked = No
269,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,313 UART: [kat] SHA2-256
444,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,541 UART: [kat] ++
455,065 UART: [kat] sha1
464,980 UART: [kat] SHA2-256
467,715 UART: [kat] SHA2-384
474,090 UART: [kat] SHA2-512-ACC
476,430 UART: [kat] ECC-384
2,768,788 UART: [kat] HMAC-384Kdf
2,801,078 UART: [kat] LMS
3,991,368 UART: [kat] --
3,996,433 UART: [cold-reset] ++
3,997,395 UART: [fht] Storing FHT @ 0x50003400
4,009,102 UART: [idev] ++
4,009,680 UART: [idev] CDI.KEYID = 6
4,010,718 UART: [idev] SUBJECT.KEYID = 7
4,011,899 UART: [idev] UDS.KEYID = 0
4,012,941 ready_for_fw is high
4,013,151 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,676 UART: [idev] Erasing UDS.KEYID = 0
7,346,667 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,883 UART: [idev] --
7,373,563 UART: [ldev] ++
7,374,145 UART: [ldev] CDI.KEYID = 6
7,375,089 UART: [ldev] SUBJECT.KEYID = 5
7,376,300 UART: [ldev] AUTHORITY.KEYID = 7
7,377,588 UART: [ldev] FE.KEYID = 1
7,422,934 UART: [ldev] Erasing FE.KEYID = 1
10,757,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,661 UART: [ldev] --
13,136,749 UART: [fwproc] Waiting for Commands...
13,139,708 UART: [fwproc] Received command 0x46574c44
13,141,913 UART: [fwproc] Received Image of size 114124 bytes
17,196,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,172 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,829 >>> mbox cmd response: success
17,660,387 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,664,506 UART: [afmc] ++
17,665,102 UART: [afmc] CDI.KEYID = 6
17,666,078 UART: [afmc] SUBJECT.KEYID = 7
17,667,295 UART: [afmc] AUTHORITY.KEYID = 5
21,028,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,172 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,606 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,422 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,831 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,736 UART: [afmc] --
23,400,846 UART: [cold-reset] --
23,404,227 UART: [state] Locking Datavault
23,407,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,499 UART: [state] Locking ICCM
23,410,574 UART: [exit] Launching FMC @ 0x40000130
23,418,970 UART:
23,419,200 UART: Running Caliptra FMC ...
23,420,298 UART:
23,420,458 UART: [state] CFI Enabled
23,489,513 UART: [fht] FMC Alias Private Key: 7
25,827,173 UART: [art] Extend RT PCRs Done
25,828,392 UART: [art] Lock RT PCRs Done
25,829,910 UART: [art] Populate DV Done
25,835,114 UART: [fht] FMC Alias Private Key: 7
25,836,854 UART: [art] Derive CDI
25,837,697 UART: [art] Store in in slot 0x4
25,898,709 UART: [art] Derive Key Pair
25,899,714 UART: [art] Store priv key in slot 0x5
29,192,199 UART: [art] Derive Key Pair - Done
29,205,572 UART: [art] Signing Cert with AUTHO
29,206,903 UART: RITY.KEYID = 7
31,494,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,874 UART: [art] PUB.X = 08403D9896810C0B524461E6C45802B0BC9F491D6FC441FAA4A374C1B3DAC0A731435BD3E981DF69C15E4ED702F965C9
31,503,136 UART: [art] PUB.Y = 43607C149411B21198A8DAC7880542D079CC39A292844F598D68909441A6DC0ECE3D479B1787FF13F01D09A3C55C4FEB
31,510,386 UART: [art] SIG.R = 410E79DCC1901CC77B345D00692DCB5F678671BC96FA71B86341614637C994529F5F9130783B23048E8C9DFC534E5064
31,517,721 UART: [art] SIG.S = 87DC7670007B5FA78CD7A0169C6DDC510706CF785EA1EE5E39D815C9074870C694069CEB71070056F93BB089F61618AE
32,823,198 UART: Caliptra RT
32,823,911 UART: [state] CFI Enabled
32,985,635 UART: [rt] RT listening for mailbox commands...
33,017,106 UART: [rt]cmd =0x54514754, len=24
33,019,642 >>> mbox cmd response data (8 bytes)
33,020,185 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,050,404 UART: [rt]cmd =0x54514754, len=24
33,052,905 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,803,789 ready_for_fw is high
3,804,156 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,520 >>> mbox cmd response: success
17,869,422 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,559,572 UART:
23,559,940 UART: Running Caliptra FMC ...
23,561,051 UART:
23,561,231 UART: [state] CFI Enabled
23,629,161 UART: [fht] FMC Alias Private Key: 7
25,967,623 UART: [art] Extend RT PCRs Done
25,968,844 UART: [art] Lock RT PCRs Done
25,970,497 UART: [art] Populate DV Done
25,976,077 UART: [fht] FMC Alias Private Key: 7
25,977,792 UART: [art] Derive CDI
25,978,533 UART: [art] Store in in slot 0x4
26,038,191 UART: [art] Derive Key Pair
26,039,207 UART: [art] Store priv key in slot 0x5
29,331,763 UART: [art] Derive Key Pair - Done
29,344,754 UART: [art] Signing Cert with AUTHO
29,346,084 UART: RITY.KEYID = 7
31,633,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,496 UART: [art] PUB.X = 1F24F01C9134E817EF592A3E1EA75050D64792B3EE8CEBFDBF395E90DAACAA8C76B343F8FA2F37E384CCDB28871F42EE
31,642,743 UART: [art] PUB.Y = 33359BF5E9672056077900B2E57C8B88EAEF419B88B7750B29D9A98907CE834EA1A43C28A75718A4A3B2968228AB5473
31,649,986 UART: [art] SIG.R = 9EA2E21D631F7167BE35FA2E3A455EF5C21900371161C559DECDC4DB5BAF86CDBC6B02147C022EB1E2C1C87A5DE9B4AA
31,657,385 UART: [art] SIG.S = 2D9B4304D2247C47B3C65857ADE5BD5B76C6E68C0700F8B60EEC5DFE2E39A1E923326438D46FB7FE05ED2AB0D6B77300
32,962,888 UART: Caliptra RT
32,963,606 UART: [state] CFI Enabled
33,123,522 UART: [rt] RT listening for mailbox commands...
33,155,158 UART: [rt]cmd =0x54514754, len=24
33,157,582 >>> mbox cmd response data (8 bytes)
33,158,095 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,188,002 UART: [rt]cmd =0x54514754, len=24
33,190,080 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,390 UART:
192,774 UART: Running Caliptra ROM ...
193,900 UART:
603,747 UART: [state] CFI Enabled
617,911 UART: [state] LifecycleState = Unprovisioned
619,858 UART: [state] DebugLocked = No
621,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,966 UART: [kat] SHA2-256
796,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,233 UART: [kat] ++
807,836 UART: [kat] sha1
818,849 UART: [kat] SHA2-256
821,566 UART: [kat] SHA2-384
826,836 UART: [kat] SHA2-512-ACC
829,195 UART: [kat] ECC-384
3,112,254 UART: [kat] HMAC-384Kdf
3,123,220 UART: [kat] LMS
4,313,323 UART: [kat] --
4,316,439 UART: [cold-reset] ++
4,318,015 UART: [fht] Storing FHT @ 0x50003400
4,328,880 UART: [idev] ++
4,329,487 UART: [idev] CDI.KEYID = 6
4,330,395 UART: [idev] SUBJECT.KEYID = 7
4,331,637 UART: [idev] UDS.KEYID = 0
4,332,653 ready_for_fw is high
4,332,873 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,105 UART: [idev] Erasing UDS.KEYID = 0
7,618,249 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,202 UART: [idev] --
7,642,762 UART: [ldev] ++
7,643,326 UART: [ldev] CDI.KEYID = 6
7,644,280 UART: [ldev] SUBJECT.KEYID = 5
7,645,484 UART: [ldev] AUTHORITY.KEYID = 7
7,646,761 UART: [ldev] FE.KEYID = 1
7,658,424 UART: [ldev] Erasing FE.KEYID = 1
10,948,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,121 UART: [ldev] --
13,309,358 UART: [fwproc] Waiting for Commands...
13,311,508 UART: [fwproc] Received command 0x46574c44
13,313,683 UART: [fwproc] Received Image of size 114124 bytes
17,369,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,493 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,672 >>> mbox cmd response: success
17,833,234 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,836,854 UART: [afmc] ++
17,837,439 UART: [afmc] CDI.KEYID = 6
17,838,318 UART: [afmc] SUBJECT.KEYID = 7
17,839,583 UART: [afmc] AUTHORITY.KEYID = 5
21,157,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,518 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,774 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,216 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,037 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,423 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,438 UART: [afmc] --
23,522,402 UART: [cold-reset] --
23,527,508 UART: [state] Locking Datavault
23,532,687 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,390 UART: [state] Locking ICCM
23,536,428 UART: [exit] Launching FMC @ 0x40000130
23,544,816 UART:
23,545,056 UART: Running Caliptra FMC ...
23,546,158 UART:
23,546,314 UART: [state] CFI Enabled
23,554,517 UART: [fht] FMC Alias Private Key: 7
25,884,896 UART: [art] Extend RT PCRs Done
25,886,119 UART: [art] Lock RT PCRs Done
25,888,216 UART: [art] Populate DV Done
25,893,680 UART: [fht] FMC Alias Private Key: 7
25,895,276 UART: [art] Derive CDI
25,896,090 UART: [art] Store in in slot 0x4
25,938,632 UART: [art] Derive Key Pair
25,939,672 UART: [art] Store priv key in slot 0x5
29,182,540 UART: [art] Derive Key Pair - Done
29,195,856 UART: [art] Signing Cert with AUTHO
29,197,161 UART: RITY.KEYID = 7
31,476,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,044 UART: [art] PUB.X = B5A5553D3008959B32EDDD3E33E6B00D9081469FC91BE152A263E0D27B2B889061F7AD9DB19E7C97819AB1A1A8B6F836
31,485,283 UART: [art] PUB.Y = 3CBA04378C2BF401F88CB4A3C4EBC3E0F9479BDDC58E2215ECD9B707CE9257A643DD10D3FB584400E93BD9FBDD720FEF
31,492,555 UART: [art] SIG.R = 0036B415A7476F7E64C64BD1DC408EE47DEC6C249DBFF41E25E15BF4C497CAD414403F1B3926F947F74B47F2BA106BE1
31,499,931 UART: [art] SIG.S = 0952E206488A418AD7A8B66CD0C9626CB29020E46A05EDC0275333F96A07698E8390F1F086C045ECA48CE8E4A30444EB
32,804,842 UART: Caliptra RT
32,805,696 UART: [state] CFI Enabled
32,923,198 UART: [rt] RT listening for mailbox commands...
32,954,657 UART: [rt]cmd =0x54514754, len=24
32,957,295 >>> mbox cmd response data (8 bytes)
32,957,819 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,987,863 UART: [rt]cmd =0x54514754, len=24
32,989,991 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,127,971 ready_for_fw is high
4,128,647 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,702 >>> mbox cmd response: success
18,079,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,719,138 UART:
23,719,545 UART: Running Caliptra FMC ...
23,720,690 UART:
23,720,850 UART: [state] CFI Enabled
23,728,848 UART: [fht] FMC Alias Private Key: 7
26,059,621 UART: [art] Extend RT PCRs Done
26,060,844 UART: [art] Lock RT PCRs Done
26,062,470 UART: [art] Populate DV Done
26,067,996 UART: [fht] FMC Alias Private Key: 7
26,069,552 UART: [art] Derive CDI
26,070,370 UART: [art] Store in in slot 0x4
26,112,853 UART: [art] Derive Key Pair
26,113,852 UART: [art] Store priv key in slot 0x5
29,356,106 UART: [art] Derive Key Pair - Done
29,369,123 UART: [art] Signing Cert with AUTHO
29,370,435 UART: RITY.KEYID = 7
31,650,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,648 UART: [art] PUB.X = F1E64578F38DA5CFB6A130F6DDE13165515368DEE35527C1DCBBE214193AC7E18A31B3E996D580D641322D8FDC8357F3
31,658,898 UART: [art] PUB.Y = 2753D972310BF2A1DE960B630F93EFE219745E6543A708B794D3D0C96B91868F7941BD6120A60331C2DD12E8AB38F73B
31,666,122 UART: [art] SIG.R = A234EC3D9500F7D756FD6D71F104D3961BC7871BDD2CBFEDEF1A443BCCD6C74AA9D3A4F3A4206AAEBCF2D6BF0EA3DBA4
31,673,524 UART: [art] SIG.S = 2456D8AE834E184164AA015D445DDCC3565FF3B8B95E3C8C3682A40101F112725206B09FF5153E0A9A1E57069B1B0A9E
32,978,936 UART: Caliptra RT
32,979,637 UART: [state] CFI Enabled
33,096,986 UART: [rt] RT listening for mailbox commands...
33,128,411 UART: [rt]cmd =0x54514754, len=24
33,131,003 >>> mbox cmd response data (8 bytes)
33,131,516 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,161,331 UART: [rt]cmd =0x54514754, len=24
33,163,936 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,181 UART:
192,528 UART: Running Caliptra ROM ...
193,713 UART:
193,887 UART: [state] CFI Enabled
267,613 UART: [state] LifecycleState = Unprovisioned
269,468 UART: [state] DebugLocked = No
271,505 UART: [state] WD Timer not started. Device not locked for debugging
275,187 UART: [kat] SHA2-256
454,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,861 UART: [kat] ++
466,395 UART: [kat] sha1
476,990 UART: [kat] SHA2-256
480,070 UART: [kat] SHA2-384
485,778 UART: [kat] SHA2-512-ACC
488,709 UART: [kat] ECC-384
2,946,759 UART: [kat] HMAC-384Kdf
2,969,370 UART: [kat] LMS
3,498,854 UART: [kat] --
3,501,854 UART: [cold-reset] ++
3,503,372 UART: [fht] FHT @ 0x50003400
3,514,128 UART: [idev] ++
3,514,708 UART: [idev] CDI.KEYID = 6
3,515,688 UART: [idev] SUBJECT.KEYID = 7
3,516,862 UART: [idev] UDS.KEYID = 0
3,517,786 ready_for_fw is high
3,517,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,749 UART: [idev] Erasing UDS.KEYID = 0
6,026,288 UART: [idev] Sha1 KeyId Algorithm
6,048,437 UART: [idev] --
6,051,343 UART: [ldev] ++
6,051,910 UART: [ldev] CDI.KEYID = 6
6,052,821 UART: [ldev] SUBJECT.KEYID = 5
6,053,985 UART: [ldev] AUTHORITY.KEYID = 7
6,055,269 UART: [ldev] FE.KEYID = 1
6,097,944 UART: [ldev] Erasing FE.KEYID = 1
8,600,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,267 UART: [ldev] --
10,393,810 UART: [fwproc] Wait for Commands...
10,396,570 UART: [fwproc] Recv command 0x46574c44
10,398,666 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,843 >>> mbox cmd response: success
14,264,421 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,268,141 UART: [afmc] ++
14,268,756 UART: [afmc] CDI.KEYID = 6
14,269,697 UART: [afmc] SUBJECT.KEYID = 7
14,270,803 UART: [afmc] AUTHORITY.KEYID = 5
16,797,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,520,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,522,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,538,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,554,666 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,570,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,593,675 UART: [afmc] --
18,597,327 UART: [cold-reset] --
18,601,450 UART: [state] Locking Datavault
18,607,447 UART: [state] Locking PCR0, PCR1 and PCR31
18,609,090 UART: [state] Locking ICCM
18,610,156 UART: [exit] Launching FMC @ 0x40000130
18,618,560 UART:
18,618,796 UART: Running Caliptra FMC ...
18,619,915 UART:
18,620,075 UART: [state] CFI Enabled
18,677,050 UART: [fht] FMC Alias Private Key: 7
20,441,682 UART: [art] Extend RT PCRs Done
20,442,899 UART: [art] Lock RT PCRs Done
20,444,330 UART: [art] Populate DV Done
20,449,793 UART: [fht] FMC Alias Private Key: 7
20,451,277 UART: [art] Derive CDI
20,452,038 UART: [art] Store in in slot 0x4
20,510,140 UART: [art] Derive Key Pair
20,511,179 UART: [art] Store priv key in slot 0x5
22,973,346 UART: [art] Derive Key Pair - Done
22,986,178 UART: [art] Signing Cert with AUTHO
22,987,477 UART: RITY.KEYID = 7
24,698,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,700,342 UART: [art] PUB.X = 1CE1C1B756F970D7D0E48CE11186EA1323A41707E4D6BDAA500B3F8479F741410D03D965B5EDE1438F733E215B87925D
24,707,677 UART: [art] PUB.Y = F2D666395A96E9E5044937A3915A71321BDC852314BA6D08EBBCAB4E662C8DC2A26327A62CA3925F3FD8424E78C8E887
24,714,918 UART: [art] SIG.R = F957FB1238419173D7AFBDB82D44900734EF08A326EA5A6880C8D3E322BE2D4C90653CAA3A11201DE0BA18D18EFD83DD
24,722,304 UART: [art] SIG.S = BEFCBE8177C79FE946FFB1EE0525D7EF672A2B8F14021DEC67B77E30099466CF70854C71E69656E9CC1F0690851A4346
25,701,390 UART: Caliptra RT
25,702,097 UART: [state] CFI Enabled
25,865,302 UART: [rt] RT listening for mailbox commands...
25,896,336 UART: [rt]cmd =0x54514754, len=24
25,899,184 >>> mbox cmd response data (8 bytes)
25,899,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,929,693 UART: [rt]cmd =0x54514754, len=24
25,932,133 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,383,588 ready_for_fw is high
3,384,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,093,286 >>> mbox cmd response: success
14,093,932 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,388,156 UART:
18,388,576 UART: Running Caliptra FMC ...
18,389,689 UART:
18,389,846 UART: [state] CFI Enabled
18,453,003 UART: [fht] FMC Alias Private Key: 7
20,216,795 UART: [art] Extend RT PCRs Done
20,218,017 UART: [art] Lock RT PCRs Done
20,219,591 UART: [art] Populate DV Done
20,224,976 UART: [fht] FMC Alias Private Key: 7
20,226,504 UART: [art] Derive CDI
20,227,266 UART: [art] Store in in slot 0x4
20,285,254 UART: [art] Derive Key Pair
20,286,277 UART: [art] Store priv key in slot 0x5
22,749,026 UART: [art] Derive Key Pair - Done
22,761,776 UART: [art] Signing Cert with AUTHO
22,763,083 UART: RITY.KEYID = 7
24,474,699 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,203 UART: [art] PUB.X = 1B7E257A1BC8EABF00B6EE3E4B7B16A63779BD5F8E9827F1EA88FD64BE197270FA54CC3E46A2EB463330C8633D2977FE
24,483,470 UART: [art] PUB.Y = A96B8EA682E38F4B064B265605F6407ED9DEEEECDFE447393BC560279E71D41BBE8E983A58EEC5B2AC3ED74D5242025E
24,490,787 UART: [art] SIG.R = 9491E93246E66D1BE4CF6628B6BE6D6F3C5C748BC15CF349E1CE6BB00386F8B6E1F0A8C236436F710BF93E6C5C0152BD
24,498,188 UART: [art] SIG.S = 89056AB3E185920045E98627AFD2F5F99FC7DACDCEF1F9A6561FEF9A15E72A5BC770099414AD60069A6E9B7090104DEC
25,476,402 UART: Caliptra RT
25,477,101 UART: [state] CFI Enabled
25,643,108 UART: [rt] RT listening for mailbox commands...
25,674,515 UART: [rt]cmd =0x54514754, len=24
25,677,130 >>> mbox cmd response data (8 bytes)
25,677,597 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,707,447 UART: [rt]cmd =0x54514754, len=24
25,709,663 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,391 UART:
192,751 UART: Running Caliptra ROM ...
193,906 UART:
603,595 UART: [state] CFI Enabled
618,885 UART: [state] LifecycleState = Unprovisioned
620,691 UART: [state] DebugLocked = No
623,353 UART: [state] WD Timer not started. Device not locked for debugging
627,384 UART: [kat] SHA2-256
806,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,079 UART: [kat] ++
818,553 UART: [kat] sha1
829,776 UART: [kat] SHA2-256
832,786 UART: [kat] SHA2-384
838,056 UART: [kat] SHA2-512-ACC
840,984 UART: [kat] ECC-384
3,281,190 UART: [kat] HMAC-384Kdf
3,294,204 UART: [kat] LMS
3,823,731 UART: [kat] --
3,827,977 UART: [cold-reset] ++
3,829,623 UART: [fht] FHT @ 0x50003400
3,841,092 UART: [idev] ++
3,841,651 UART: [idev] CDI.KEYID = 6
3,842,551 UART: [idev] SUBJECT.KEYID = 7
3,843,789 UART: [idev] UDS.KEYID = 0
3,844,703 ready_for_fw is high
3,844,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,743 UART: [idev] Erasing UDS.KEYID = 0
6,319,195 UART: [idev] Sha1 KeyId Algorithm
6,342,303 UART: [idev] --
6,346,107 UART: [ldev] ++
6,346,671 UART: [ldev] CDI.KEYID = 6
6,347,598 UART: [ldev] SUBJECT.KEYID = 5
6,348,801 UART: [ldev] AUTHORITY.KEYID = 7
6,349,970 UART: [ldev] FE.KEYID = 1
6,357,358 UART: [ldev] Erasing FE.KEYID = 1
8,833,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,879 UART: [ldev] --
10,622,733 UART: [fwproc] Wait for Commands...
10,624,927 UART: [fwproc] Recv command 0x46574c44
10,626,958 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,044 >>> mbox cmd response: success
14,491,584 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,495,199 UART: [afmc] ++
14,495,794 UART: [afmc] CDI.KEYID = 6
14,496,670 UART: [afmc] SUBJECT.KEYID = 7
14,497,977 UART: [afmc] AUTHORITY.KEYID = 5
16,998,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,065 UART: [afmc] --
18,794,817 UART: [cold-reset] --
18,797,755 UART: [state] Locking Datavault
18,803,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,441 UART: [state] Locking ICCM
18,807,417 UART: [exit] Launching FMC @ 0x40000130
18,815,803 UART:
18,816,048 UART: Running Caliptra FMC ...
18,817,145 UART:
18,817,298 UART: [state] CFI Enabled
18,825,351 UART: [fht] FMC Alias Private Key: 7
20,582,270 UART: [art] Extend RT PCRs Done
20,583,487 UART: [art] Lock RT PCRs Done
20,585,234 UART: [art] Populate DV Done
20,590,524 UART: [fht] FMC Alias Private Key: 7
20,592,055 UART: [art] Derive CDI
20,592,791 UART: [art] Store in in slot 0x4
20,635,533 UART: [art] Derive Key Pair
20,636,528 UART: [art] Store priv key in slot 0x5
23,063,439 UART: [art] Derive Key Pair - Done
23,076,271 UART: [art] Signing Cert with AUTHO
23,077,572 UART: RITY.KEYID = 7
24,782,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,090 UART: [art] PUB.X = 1650A59D35BF606135421973026138CA5A50679EE3706A6ED82CA595041AE474E9FB3ED8D330EE8CF871662CE0B77583
24,791,325 UART: [art] PUB.Y = F0F3AFD8A9B011F985B894BDD535640A8E6F208300A098FA811CD6066F87A297422B660FED0AAEE1201EC9D5F4E42D96
24,798,554 UART: [art] SIG.R = 10D94EF441E8A9E83EB2A06E440C8700C1F74A6756F0638EEC2D4089606196559B427541B0BB7EA7488EF4ADF100A503
24,805,874 UART: [art] SIG.S = 3221951055CF98B68397971912B1540C2E8D46A1C5E02758EED0064E9C7C4E0466E607E6577E9A4B7C829B99D547D542
25,784,204 UART: Caliptra RT
25,784,893 UART: [state] CFI Enabled
25,901,778 UART: [rt] RT listening for mailbox commands...
25,933,333 UART: [rt]cmd =0x54514754, len=24
25,935,960 >>> mbox cmd response data (8 bytes)
25,936,497 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,966,292 UART: [rt]cmd =0x54514754, len=24
25,968,626 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,695,802 ready_for_fw is high
3,696,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,520 >>> mbox cmd response: success
14,280,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,527,969 UART:
18,528,352 UART: Running Caliptra FMC ...
18,529,484 UART:
18,529,635 UART: [state] CFI Enabled
18,537,609 UART: [fht] FMC Alias Private Key: 7
20,294,345 UART: [art] Extend RT PCRs Done
20,295,571 UART: [art] Lock RT PCRs Done
20,297,085 UART: [art] Populate DV Done
20,302,280 UART: [fht] FMC Alias Private Key: 7
20,303,965 UART: [art] Derive CDI
20,304,785 UART: [art] Store in in slot 0x4
20,347,483 UART: [art] Derive Key Pair
20,348,483 UART: [art] Store priv key in slot 0x5
22,775,158 UART: [art] Derive Key Pair - Done
22,788,040 UART: [art] Signing Cert with AUTHO
22,789,373 UART: RITY.KEYID = 7
24,495,077 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,580 UART: [art] PUB.X = 60462E516776696768C5000DCA327A361B6E99F410260E7550746BF1B78F7BF1DAD742D59A077F85F172FDB55BB1F478
24,503,820 UART: [art] PUB.Y = 1BBF4CCBAE167004B9F570B9AC0E3EE8CD348322F32CB1DBFDBC34C4A3948FA010BAEC6B6341D8E6350177DFE308BD84
24,511,122 UART: [art] SIG.R = A392B126FE7D9252CEF73FA22B28911738200869B5A7E57BBC96D4A27927B10065217B84F6C1318C72C912681333CF4D
24,518,470 UART: [art] SIG.S = 3E36365CB622EB27C7028C8316EA1D6F5DDA4F312BAA6E88EF6CABB39EE8623A08FFD9F4DEC8BC11CE809A6EB65731A7
25,497,230 UART: Caliptra RT
25,497,930 UART: [state] CFI Enabled
25,614,985 UART: [rt] RT listening for mailbox commands...
25,646,775 UART: [rt]cmd =0x54514754, len=24
25,649,254 >>> mbox cmd response data (8 bytes)
25,649,736 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,679,499 UART: [rt]cmd =0x54514754, len=24
25,682,000 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,057 UART:
192,435 UART: Running Caliptra ROM ...
193,575 UART:
193,722 UART: [state] CFI Enabled
266,064 UART: [state] LifecycleState = Unprovisioned
268,481 UART: [state] DebugLocked = No
270,438 UART: [state] WD Timer not started. Device not locked for debugging
274,466 UART: [kat] SHA2-256
464,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,086 UART: [kat] ++
475,728 UART: [kat] sha1
487,677 UART: [kat] SHA2-256
490,684 UART: [kat] SHA2-384
496,320 UART: [kat] SHA2-512-ACC
498,900 UART: [kat] ECC-384
2,948,207 UART: [kat] HMAC-384Kdf
2,976,766 UART: [kat] LMS
3,508,500 UART: [kat] --
3,514,001 UART: [cold-reset] ++
3,515,521 UART: [fht] FHT @ 0x50003400
3,526,924 UART: [idev] ++
3,527,627 UART: [idev] CDI.KEYID = 6
3,528,621 UART: [idev] SUBJECT.KEYID = 7
3,529,738 UART: [idev] UDS.KEYID = 0
3,530,734 ready_for_fw is high
3,530,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,674,958 UART: [idev] Erasing UDS.KEYID = 0
6,034,356 UART: [idev] Sha1 KeyId Algorithm
6,056,932 UART: [idev] --
6,062,580 UART: [ldev] ++
6,063,265 UART: [ldev] CDI.KEYID = 6
6,064,155 UART: [ldev] SUBJECT.KEYID = 5
6,065,391 UART: [ldev] AUTHORITY.KEYID = 7
6,066,573 UART: [ldev] FE.KEYID = 1
6,106,058 UART: [ldev] Erasing FE.KEYID = 1
8,608,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,364,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,379,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,813 UART: [ldev] --
10,421,393 UART: [fwproc] Wait for Commands...
10,424,182 UART: [fwproc] Recv command 0x46574c44
10,426,486 UART: [fwproc] Recv'd Img size: 114448 bytes
13,873,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,610,878 >>> mbox cmd response: success
14,611,441 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,615,370 UART: [afmc] ++
14,616,107 UART: [afmc] CDI.KEYID = 6
14,617,300 UART: [afmc] SUBJECT.KEYID = 7
14,618,736 UART: [afmc] AUTHORITY.KEYID = 5
17,169,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,097 UART: [afmc] --
18,967,854 UART: [cold-reset] --
18,972,525 UART: [state] Locking Datavault
18,977,834 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,023 UART: [state] Locking ICCM
18,981,745 UART: [exit] Launching FMC @ 0x40000130
18,990,419 UART:
18,990,662 UART: Running Caliptra FMC ...
18,991,762 UART:
18,991,920 UART: [state] CFI Enabled
19,049,777 UART: [fht] FMC Alias Private Key: 7
20,813,827 UART: [art] Extend RT PCRs Done
20,815,046 UART: [art] Lock RT PCRs Done
20,816,485 UART: [art] Populate DV Done
20,822,013 UART: [fht] FMC Alias Private Key: 7
20,823,655 UART: [art] Derive CDI
20,824,392 UART: [art] Store in in slot 0x4
20,882,278 UART: [art] Derive Key Pair
20,883,321 UART: [art] Store priv key in slot 0x5
23,345,836 UART: [art] Derive Key Pair - Done
23,358,722 UART: [art] Signing Cert with AUTHO
23,360,041 UART: RITY.KEYID = 7
25,071,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,157 UART: [art] PUB.X = 2B9EF589D05E777274E96A798D4E0BD9BF05F64524EE4E6667B45D6264C14928630A9ABDC2CEBC45C5590913FFDFE5EA
25,080,450 UART: [art] PUB.Y = CBB4E67C90538CA330FB9F9550B8D0F37AA2592963A7BCAA193481F1DD0858362A01032DA88F2A3F2A018F972D141400
25,087,796 UART: [art] SIG.R = 0750495DF6AC2EAF663665A21DCCB04CF8680E68B55F4E77047887783CE19593F25032D7ECCD9565012D494C9305BDD8
25,095,105 UART: [art] SIG.S = 2252900421E3EBB87F486C8A3B0BC8C795A55EB56345D2CC95D0911968C5908CE8ABC0DD86FBFEAFD370CAE5A0545AE0
26,073,714 UART: Caliptra RT
26,074,407 UART: [state] CFI Enabled
26,239,153 UART: [rt] RT listening for mailbox commands...
26,270,805 UART: [rt]cmd =0x54514754, len=24
26,273,498 >>> mbox cmd response data (8 bytes)
26,273,938 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,303,859 UART: [rt]cmd =0x54514754, len=24
26,306,143 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,436,428 ready_for_fw is high
3,436,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,743,992 >>> mbox cmd response: success
14,744,809 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,050,104 UART:
19,050,489 UART: Running Caliptra FMC ...
19,051,624 UART:
19,051,780 UART: [state] CFI Enabled
19,116,881 UART: [fht] FMC Alias Private Key: 7
20,880,761 UART: [art] Extend RT PCRs Done
20,881,980 UART: [art] Lock RT PCRs Done
20,883,389 UART: [art] Populate DV Done
20,888,912 UART: [fht] FMC Alias Private Key: 7
20,890,560 UART: [art] Derive CDI
20,891,375 UART: [art] Store in in slot 0x4
20,949,577 UART: [art] Derive Key Pair
20,950,622 UART: [art] Store priv key in slot 0x5
23,413,824 UART: [art] Derive Key Pair - Done
23,426,818 UART: [art] Signing Cert with AUTHO
23,428,149 UART: RITY.KEYID = 7
25,139,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,492 UART: [art] PUB.X = 0869609D612720E1FEA7E2C8383C7DAE104742598F88912C120A2A5BCB4E9D8E71F9D1BCD105B6611C156149509F2488
25,148,732 UART: [art] PUB.Y = 7A822CBD4F9299AFA80B13AE18CFC14DF4BC1321F1D1ADE82FD68488A3650FFD11FD09E3181E82D5DDA8C3D13DAE01A1
25,156,049 UART: [art] SIG.R = 6FB48A90A1FA9FDB75242C533480338D6C33D7C05EAC9E3507938431ED88B753BE40CE10771F1298B71C3BEF81EF2E92
25,163,463 UART: [art] SIG.S = 13EFC194E6AA94B6F3E3EBFF414764E86D3CDA248A025E76163D92DA375708531BA44E30416A8ABEDE475E2783B246A4
26,142,851 UART: Caliptra RT
26,143,557 UART: [state] CFI Enabled
26,308,479 UART: [rt] RT listening for mailbox commands...
26,340,057 UART: [rt]cmd =0x54514754, len=24
26,342,586 >>> mbox cmd response data (8 bytes)
26,343,000 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,372,909 UART: [rt]cmd =0x54514754, len=24
26,375,094 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,398 UART:
192,760 UART: Running Caliptra ROM ...
193,886 UART:
603,569 UART: [state] CFI Enabled
617,125 UART: [state] LifecycleState = Unprovisioned
619,495 UART: [state] DebugLocked = No
621,219 UART: [state] WD Timer not started. Device not locked for debugging
625,825 UART: [kat] SHA2-256
815,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,534 UART: [kat] ++
827,003 UART: [kat] sha1
837,880 UART: [kat] SHA2-256
840,905 UART: [kat] SHA2-384
848,097 UART: [kat] SHA2-512-ACC
850,675 UART: [kat] ECC-384
3,291,331 UART: [kat] HMAC-384Kdf
3,305,618 UART: [kat] LMS
3,837,479 UART: [kat] --
3,841,139 UART: [cold-reset] ++
3,843,486 UART: [fht] FHT @ 0x50003400
3,854,264 UART: [idev] ++
3,854,973 UART: [idev] CDI.KEYID = 6
3,855,951 UART: [idev] SUBJECT.KEYID = 7
3,857,114 UART: [idev] UDS.KEYID = 0
3,858,362 ready_for_fw is high
3,858,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,396 UART: [idev] Erasing UDS.KEYID = 0
6,336,969 UART: [idev] Sha1 KeyId Algorithm
6,359,600 UART: [idev] --
6,363,624 UART: [ldev] ++
6,364,310 UART: [ldev] CDI.KEYID = 6
6,365,215 UART: [ldev] SUBJECT.KEYID = 5
6,366,366 UART: [ldev] AUTHORITY.KEYID = 7
6,367,588 UART: [ldev] FE.KEYID = 1
6,377,945 UART: [ldev] Erasing FE.KEYID = 1
8,856,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,606 UART: [ldev] --
10,646,536 UART: [fwproc] Wait for Commands...
10,648,240 UART: [fwproc] Recv command 0x46574c44
10,650,541 UART: [fwproc] Recv'd Img size: 114448 bytes
14,095,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,835,801 >>> mbox cmd response: success
14,836,319 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,840,208 UART: [afmc] ++
14,840,904 UART: [afmc] CDI.KEYID = 6
14,842,092 UART: [afmc] SUBJECT.KEYID = 7
14,843,595 UART: [afmc] AUTHORITY.KEYID = 5
17,348,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,746 UART: [afmc] --
19,145,089 UART: [cold-reset] --
19,148,751 UART: [state] Locking Datavault
19,154,278 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,426 UART: [state] Locking ICCM
19,158,037 UART: [exit] Launching FMC @ 0x40000130
19,166,708 UART:
19,166,944 UART: Running Caliptra FMC ...
19,167,962 UART:
19,168,121 UART: [state] CFI Enabled
19,176,159 UART: [fht] FMC Alias Private Key: 7
20,933,691 UART: [art] Extend RT PCRs Done
20,934,894 UART: [art] Lock RT PCRs Done
20,935,999 UART: [art] Populate DV Done
20,941,291 UART: [fht] FMC Alias Private Key: 7
20,942,871 UART: [art] Derive CDI
20,943,676 UART: [art] Store in in slot 0x4
20,986,421 UART: [art] Derive Key Pair
20,987,410 UART: [art] Store priv key in slot 0x5
23,414,520 UART: [art] Derive Key Pair - Done
23,427,186 UART: [art] Signing Cert with AUTHO
23,428,492 UART: RITY.KEYID = 7
25,134,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,542 UART: [art] PUB.X = 8FE0C888ADD27AC6795CC8D1C3B7F30F6D5C1517207B58730000D2519BAB22EBC48C8605FF07476AEE2F3EF927D69C8A
25,142,823 UART: [art] PUB.Y = 501735835621DA9EE0C8C65C2676D746910AB6E7CEFFD7F141ED6536E54525A9D154707BB8A6CE1C4E34D7C6818B8A08
25,150,097 UART: [art] SIG.R = 579895C92511F75470DE00E660CCB796D7690360DBFE21BB9B278BA739CB8028D4D6050D6C9FB25D08B3AB0CAF962676
25,157,434 UART: [art] SIG.S = 6391D20FAF98821CA5DA8DDF45D743F52D0D0708DD4FDAD23FE82DAC132E54759565DAEEA8AEF504E21EEEC55D3C4066
26,136,459 UART: Caliptra RT
26,137,166 UART: [state] CFI Enabled
26,254,373 UART: [rt] RT listening for mailbox commands...
26,285,776 UART: [rt]cmd =0x54514754, len=24
26,288,442 >>> mbox cmd response data (8 bytes)
26,288,969 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,318,810 UART: [rt]cmd =0x54514754, len=24
26,320,941 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,753,724 ready_for_fw is high
3,754,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,026 >>> mbox cmd response: success
14,947,671 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,200,694 UART:
19,201,097 UART: Running Caliptra FMC ...
19,202,228 UART:
19,202,377 UART: [state] CFI Enabled
19,210,196 UART: [fht] FMC Alias Private Key: 7
20,967,462 UART: [art] Extend RT PCRs Done
20,968,686 UART: [art] Lock RT PCRs Done
20,970,303 UART: [art] Populate DV Done
20,975,818 UART: [fht] FMC Alias Private Key: 7
20,977,519 UART: [art] Derive CDI
20,978,328 UART: [art] Store in in slot 0x4
21,020,862 UART: [art] Derive Key Pair
21,021,925 UART: [art] Store priv key in slot 0x5
23,448,269 UART: [art] Derive Key Pair - Done
23,461,372 UART: [art] Signing Cert with AUTHO
23,462,679 UART: RITY.KEYID = 7
25,168,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,938 UART: [art] PUB.X = 389D4F85D491DD164979396AA8001D0F1B2414000AB25FCD47E69D3A890D3BF8A03E8404A5F843C5541D9C4A4F6A38F6
25,177,121 UART: [art] PUB.Y = 8513041A810B3ACC345A017B6B28C5150D037DCEE388FDD450B3EE04FFF1AC8E34D242EA7FFB140F1F9301CE44294A26
25,184,368 UART: [art] SIG.R = 165CACA93F9847811DEB2C9A34E51AED98A8DD548A3A24D6045D769DD8B1C71CBA8890B43C1D234E421B9A1FBA4A8776
25,191,804 UART: [art] SIG.S = E32FF6C99B95CDBFC2F362F27D3496AE8C97C19D0C52C528A83CC0A6F3547E233AF9BCF33F64818996343C1BA4DB0B1B
26,170,473 UART: Caliptra RT
26,171,159 UART: [state] CFI Enabled
26,288,923 UART: [rt] RT listening for mailbox commands...
26,320,737 UART: [rt]cmd =0x54514754, len=24
26,323,270 >>> mbox cmd response data (8 bytes)
26,323,761 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,353,654 UART: [rt]cmd =0x54514754, len=24
26,355,751 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,049 UART: [kat] SHA2-256
881,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,095 UART: [kat] ++
886,247 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,831 UART: [fht] Storing FHT @ 0x50003400
1,479,510 UART: [idev] ++
1,479,678 UART: [idev] CDI.KEYID = 6
1,480,038 UART: [idev] SUBJECT.KEYID = 7
1,480,462 UART: [idev] UDS.KEYID = 0
1,480,807 ready_for_fw is high
1,480,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,752 UART: [idev] --
1,514,749 UART: [ldev] ++
1,514,917 UART: [ldev] CDI.KEYID = 6
1,515,280 UART: [ldev] SUBJECT.KEYID = 5
1,515,706 UART: [ldev] AUTHORITY.KEYID = 7
1,516,169 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,896 UART: [ldev] --
1,586,387 UART: [fwproc] Waiting for Commands...
1,587,064 UART: [fwproc] Received command 0x46574c44
1,587,855 UART: [fwproc] Received Image of size 114448 bytes
2,887,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,686 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,038 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,107 >>> mbox cmd response: success
3,080,107 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,213 UART: [afmc] ++
3,081,381 UART: [afmc] CDI.KEYID = 6
3,081,743 UART: [afmc] SUBJECT.KEYID = 7
3,082,168 UART: [afmc] AUTHORITY.KEYID = 5
3,117,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,282 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,972 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,835 UART: [afmc] --
3,160,839 UART: [cold-reset] --
3,161,603 UART: [state] Locking Datavault
3,163,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,620 UART: [state] Locking ICCM
3,164,264 UART: [exit] Launching FMC @ 0x40000130
3,169,593 UART:
3,169,609 UART: Running Caliptra FMC ...
3,170,017 UART:
3,170,071 UART: [state] CFI Enabled
3,180,588 UART: [fht] FMC Alias Private Key: 7
3,288,769 UART: [art] Extend RT PCRs Done
3,289,197 UART: [art] Lock RT PCRs Done
3,290,611 UART: [art] Populate DV Done
3,298,992 UART: [fht] FMC Alias Private Key: 7
3,300,110 UART: [art] Derive CDI
3,300,390 UART: [art] Store in in slot 0x4
3,385,929 UART: [art] Derive Key Pair
3,386,289 UART: [art] Store priv key in slot 0x5
3,399,361 UART: [art] Derive Key Pair - Done
3,414,318 UART: [art] Signing Cert with AUTHO
3,414,798 UART: RITY.KEYID = 7
3,430,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,915 UART: [art] PUB.X = 2F1327926C1ACC57D3258349B61EEE378AA4F8651454362FE9427082B452E71EA8C84AB9B00AD0745E5C6D200CABBC53
3,437,683 UART: [art] PUB.Y = 6F50DAE91DE58746C1817FD44AC23DFC80639954B976BC775279EB09A032BBEA54D9B791BD14F852971921736CF6CD2E
3,444,636 UART: [art] SIG.R = C03744D06DE77DC1A71A8A9FCB18536E4B94AA51372C273A5B316EDCCB21511087DC07976F30BD452BE06E340D185B69
3,451,406 UART: [art] SIG.S = FF00C6154ED3E231D41D7D65DA15F42DBF7CE06F3E6DA07544731ED9A8077EECFADFB57A20B6E00639BA986ECB1691DF
3,475,113 UART: Caliptra RT
3,475,366 UART: [state] CFI Enabled
3,583,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,464 UART: [rt]cmd =0x54514754, len=24
3,616,306 >>> mbox cmd response data (8 bytes)
3,616,307 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,860 UART: [rt]cmd =0x54514754, len=24
3,647,732 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 ready_for_fw is high
1,362,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,077 >>> mbox cmd response: success
2,929,077 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,979 UART:
2,990,995 UART: Running Caliptra FMC ...
2,991,403 UART:
2,991,457 UART: [state] CFI Enabled
3,002,032 UART: [fht] FMC Alias Private Key: 7
3,110,119 UART: [art] Extend RT PCRs Done
3,110,547 UART: [art] Lock RT PCRs Done
3,112,343 UART: [art] Populate DV Done
3,120,456 UART: [fht] FMC Alias Private Key: 7
3,121,416 UART: [art] Derive CDI
3,121,696 UART: [art] Store in in slot 0x4
3,207,805 UART: [art] Derive Key Pair
3,208,165 UART: [art] Store priv key in slot 0x5
3,221,223 UART: [art] Derive Key Pair - Done
3,236,105 UART: [art] Signing Cert with AUTHO
3,236,585 UART: RITY.KEYID = 7
3,251,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,034 UART: [art] PUB.X = 59127C4622BCCEA8C336DEA5C7FA9B1B0A0106D4438286593409210B3BEC4FFB491E0E0B157B34A6D6AFBE9EA7995AB3
3,258,797 UART: [art] PUB.Y = 5A1AC86031775682B1D12CC362C2567CE4ED1006F1754325786983FCED4E42E9280C6DCABFFD01ACA978A42A87497DDB
3,265,746 UART: [art] SIG.R = DE6C5AE8031A4DE22451E6610F01DF3C07295B4774FBF52FBA9DF58D14C4BFAE5E03EA1B0BD8B411EDFACC48CBD55F17
3,272,526 UART: [art] SIG.S = D315265B222AD7A7C2E3D183BB8B8B54C0CCAA3CD3AFD5DFEA4E95D559EA770168C54312ECB41D619C34C944AA752478
3,296,500 UART: Caliptra RT
3,296,753 UART: [state] CFI Enabled
3,404,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,131 UART: [rt]cmd =0x54514754, len=24
3,437,407 >>> mbox cmd response data (8 bytes)
3,437,408 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,031 UART: [rt]cmd =0x54514754, len=24
3,469,065 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,995 UART: [state] LifecycleState = Unprovisioned
86,650 UART: [state] DebugLocked = No
87,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 UART: [kat] SHA2-256
882,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,894 UART: [kat] ++
887,046 UART: [kat] sha1
891,366 UART: [kat] SHA2-256
893,304 UART: [kat] SHA2-384
896,125 UART: [kat] SHA2-512-ACC
898,026 UART: [kat] ECC-384
903,597 UART: [kat] HMAC-384Kdf
908,201 UART: [kat] LMS
1,476,397 UART: [kat] --
1,477,332 UART: [cold-reset] ++
1,477,790 UART: [fht] Storing FHT @ 0x50003400
1,480,585 UART: [idev] ++
1,480,753 UART: [idev] CDI.KEYID = 6
1,481,113 UART: [idev] SUBJECT.KEYID = 7
1,481,537 UART: [idev] UDS.KEYID = 0
1,481,882 ready_for_fw is high
1,481,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,417 UART: [idev] Erasing UDS.KEYID = 0
1,506,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,911 UART: [idev] --
1,515,922 UART: [ldev] ++
1,516,090 UART: [ldev] CDI.KEYID = 6
1,516,453 UART: [ldev] SUBJECT.KEYID = 5
1,516,879 UART: [ldev] AUTHORITY.KEYID = 7
1,517,342 UART: [ldev] FE.KEYID = 1
1,522,432 UART: [ldev] Erasing FE.KEYID = 1
1,548,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,453 UART: [ldev] --
1,587,920 UART: [fwproc] Waiting for Commands...
1,588,705 UART: [fwproc] Received command 0x46574c44
1,589,496 UART: [fwproc] Received Image of size 114448 bytes
2,888,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,150 >>> mbox cmd response: success
3,081,150 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,228 UART: [afmc] ++
3,082,396 UART: [afmc] CDI.KEYID = 6
3,082,758 UART: [afmc] SUBJECT.KEYID = 7
3,083,183 UART: [afmc] AUTHORITY.KEYID = 5
3,118,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,807 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,497 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,528 UART: [afmc] --
3,161,456 UART: [cold-reset] --
3,162,456 UART: [state] Locking Datavault
3,163,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,397 UART: [state] Locking ICCM
3,165,071 UART: [exit] Launching FMC @ 0x40000130
3,170,400 UART:
3,170,416 UART: Running Caliptra FMC ...
3,170,824 UART:
3,170,967 UART: [state] CFI Enabled
3,181,466 UART: [fht] FMC Alias Private Key: 7
3,289,283 UART: [art] Extend RT PCRs Done
3,289,711 UART: [art] Lock RT PCRs Done
3,291,519 UART: [art] Populate DV Done
3,299,848 UART: [fht] FMC Alias Private Key: 7
3,301,030 UART: [art] Derive CDI
3,301,310 UART: [art] Store in in slot 0x4
3,387,211 UART: [art] Derive Key Pair
3,387,571 UART: [art] Store priv key in slot 0x5
3,400,401 UART: [art] Derive Key Pair - Done
3,415,241 UART: [art] Signing Cert with AUTHO
3,415,721 UART: RITY.KEYID = 7
3,430,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,596 UART: [art] PUB.X = B63174B23253114D12EDECE15458F2088F18333ADF14BF4CAB13788F7ED10265A313B29B95F8A524DB31DFBEC520659C
3,438,366 UART: [art] PUB.Y = 051018491C005C2C5562887224FD8D01F0E6775E3B24FF6D2CB2280960629563A3E6AE3DE1A43A03FFEFC46CD09E41C7
3,445,284 UART: [art] SIG.R = 4C07A22E9A2CF0BC9569CA8158321AF18B30A7D0D93B6E7D5F015187360F9AEB9356553662F57A36CCFE2A65233CD8AF
3,452,053 UART: [art] SIG.S = CDC4F964D19816522326B0D467EFFB6D06DF2A73D2DCCFE4CAF4168A2A746412BFBDB0A5233B6A19044004753B21FEEF
3,475,525 UART: Caliptra RT
3,475,870 UART: [state] CFI Enabled
3,583,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,779 UART: [rt]cmd =0x54514754, len=24
3,616,923 >>> mbox cmd response data (8 bytes)
3,616,924 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,449 UART: [rt]cmd =0x54514754, len=24
3,648,439 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 ready_for_fw is high
1,362,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,858 >>> mbox cmd response: success
2,929,858 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,698 UART:
2,991,714 UART: Running Caliptra FMC ...
2,992,122 UART:
2,992,265 UART: [state] CFI Enabled
3,002,890 UART: [fht] FMC Alias Private Key: 7
3,110,899 UART: [art] Extend RT PCRs Done
3,111,327 UART: [art] Lock RT PCRs Done
3,112,891 UART: [art] Populate DV Done
3,120,932 UART: [fht] FMC Alias Private Key: 7
3,121,976 UART: [art] Derive CDI
3,122,256 UART: [art] Store in in slot 0x4
3,207,935 UART: [art] Derive Key Pair
3,208,295 UART: [art] Store priv key in slot 0x5
3,221,441 UART: [art] Derive Key Pair - Done
3,236,367 UART: [art] Signing Cert with AUTHO
3,236,847 UART: RITY.KEYID = 7
3,252,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,080 UART: [art] PUB.X = 3BDF9F0998E54D5CFD5FB46174976B9CC57EBF102A26BCAB2B6283FDBC1414F904DFEF87A61CA0EC2DA748F3547D0BB6
3,259,865 UART: [art] PUB.Y = B4F124911660605911F83CA42651F013D24C3BCED972A1DB9E9F51A9CCA764305956318504A23ABF3BCDEF2F47DDF8A7
3,266,820 UART: [art] SIG.R = A93D707646CA4E22AE0F5DBBB0E98070F6FA3B3264C250FE646E69ED6827328143C6E1C454C6A207941CAD9D2A3E491C
3,273,592 UART: [art] SIG.S = A512B3C50EE7D4604A2C12A61349E1919129BB202CF799A189DFF8E1051C07AD27D34708B2DB5348EFE19A9785FA3126
3,297,027 UART: Caliptra RT
3,297,372 UART: [state] CFI Enabled
3,405,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,224 UART: [rt]cmd =0x54514754, len=24
3,438,394 >>> mbox cmd response data (8 bytes)
3,438,395 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,826 UART: [rt]cmd =0x54514754, len=24
3,469,770 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,705 UART: [kat] SHA2-256
903,645 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,878 UART: [kat] LMS
1,171,206 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,945 UART: [fht] FHT @ 0x50003400
1,175,612 UART: [idev] ++
1,175,780 UART: [idev] CDI.KEYID = 6
1,176,140 UART: [idev] SUBJECT.KEYID = 7
1,176,564 UART: [idev] UDS.KEYID = 0
1,176,909 ready_for_fw is high
1,176,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,581 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,061 UART: [ldev] ++
1,211,229 UART: [ldev] CDI.KEYID = 6
1,211,592 UART: [ldev] SUBJECT.KEYID = 5
1,212,018 UART: [ldev] AUTHORITY.KEYID = 7
1,212,481 UART: [ldev] FE.KEYID = 1
1,217,561 UART: [ldev] Erasing FE.KEYID = 1
1,243,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,451 UART: [ldev] --
1,282,902 UART: [fwproc] Wait for Commands...
1,283,588 UART: [fwproc] Recv command 0x46574c44
1,284,316 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,366 >>> mbox cmd response: success
2,776,366 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,428 UART: [afmc] ++
2,777,596 UART: [afmc] CDI.KEYID = 6
2,777,958 UART: [afmc] SUBJECT.KEYID = 7
2,778,383 UART: [afmc] AUTHORITY.KEYID = 5
2,813,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,827 UART: [afmc] --
2,856,747 UART: [cold-reset] --
2,857,445 UART: [state] Locking Datavault
2,858,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,098 UART: [state] Locking ICCM
2,859,558 UART: [exit] Launching FMC @ 0x40000130
2,864,887 UART:
2,864,903 UART: Running Caliptra FMC ...
2,865,311 UART:
2,865,365 UART: [state] CFI Enabled
2,875,712 UART: [fht] FMC Alias Private Key: 7
2,983,977 UART: [art] Extend RT PCRs Done
2,984,405 UART: [art] Lock RT PCRs Done
2,985,865 UART: [art] Populate DV Done
2,994,070 UART: [fht] FMC Alias Private Key: 7
2,995,196 UART: [art] Derive CDI
2,995,476 UART: [art] Store in in slot 0x4
3,080,927 UART: [art] Derive Key Pair
3,081,287 UART: [art] Store priv key in slot 0x5
3,094,187 UART: [art] Derive Key Pair - Done
3,108,910 UART: [art] Signing Cert with AUTHO
3,109,390 UART: RITY.KEYID = 7
3,124,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,471 UART: [art] PUB.X = A7D2BE3C226A24FD8AB478F9442E9C67EC37A93597BA4C0F082CDF6639E06D3B03E66CC02E4AF79F359733E9A831BCFD
3,132,248 UART: [art] PUB.Y = 9CCECF48C962E575AA3FD06D8B0D030C29005F1E7A597E84A68E38CACCF35181656EA6AB419CE8B638BA295FF815F97A
3,139,183 UART: [art] SIG.R = BC8A84C3F84F15235A6B3DEA02BB3DE28E89121569E4D7DD6B5D717B33722CF320D90F6FB39F13257F33E23339D33E93
3,145,953 UART: [art] SIG.S = 8E709C9AE8AF040DEE21EAC232602471FD5F8C4CE99B90028DA777C4D652A3BCCC29FCFD658617DE426429038534E1A2
3,170,320 UART: Caliptra RT
3,170,573 UART: [state] CFI Enabled
3,277,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,087 UART: [rt]cmd =0x54514754, len=24
3,310,409 >>> mbox cmd response data (8 bytes)
3,310,410 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,911 UART: [rt]cmd =0x54514754, len=24
3,341,791 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,661 ready_for_fw is high
1,059,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,653 >>> mbox cmd response: success
2,625,653 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,665 UART:
2,687,681 UART: Running Caliptra FMC ...
2,688,089 UART:
2,688,143 UART: [state] CFI Enabled
2,698,598 UART: [fht] FMC Alias Private Key: 7
2,806,653 UART: [art] Extend RT PCRs Done
2,807,081 UART: [art] Lock RT PCRs Done
2,808,561 UART: [art] Populate DV Done
2,816,822 UART: [fht] FMC Alias Private Key: 7
2,817,940 UART: [art] Derive CDI
2,818,220 UART: [art] Store in in slot 0x4
2,903,879 UART: [art] Derive Key Pair
2,904,239 UART: [art] Store priv key in slot 0x5
2,917,359 UART: [art] Derive Key Pair - Done
2,932,068 UART: [art] Signing Cert with AUTHO
2,932,548 UART: RITY.KEYID = 7
2,947,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,171 UART: [art] PUB.X = 821C8711835F87060935BF9A610598D0486295A813BFAF0A4A0C7E5ABE183A0C09FDD6109CC6CF805D0890D5FBFFF8E0
2,954,925 UART: [art] PUB.Y = B35E06C61328040BFBA83DAA9F2DA3A9EFAC5151125997A60992D72AF519441CAFA3488E590C6CFCD82F3E44417D4FFE
2,961,874 UART: [art] SIG.R = 492ACEDCC1EB020ECDDD58D0A73DC5684A5886A9820B4329FC6F35464D5142F64397F954AA9BE4B1BB9E6852268A4AF6
2,968,647 UART: [art] SIG.S = 702ECB799AA29FA42CFDFC6C5C696877942DF0AE6836CC715B77ACD79CEF009632DE31ECDEA11E33905AD39AB3B6D2AC
2,992,462 UART: Caliptra RT
2,992,715 UART: [state] CFI Enabled
3,101,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,702 UART: [rt]cmd =0x54514754, len=24
3,133,712 >>> mbox cmd response data (8 bytes)
3,133,713 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,456 UART: [rt]cmd =0x54514754, len=24
3,165,792 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
907,141 UART: [kat] SHA2-512-ACC
909,042 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,660 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,201,522 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,210,992 UART: [ldev] ++
1,211,160 UART: [ldev] CDI.KEYID = 6
1,211,523 UART: [ldev] SUBJECT.KEYID = 5
1,211,949 UART: [ldev] AUTHORITY.KEYID = 7
1,212,412 UART: [ldev] FE.KEYID = 1
1,217,308 UART: [ldev] Erasing FE.KEYID = 1
1,244,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,226 UART: [ldev] --
1,283,647 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,863 >>> mbox cmd response: success
2,776,863 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,778,097 UART: [afmc] ++
2,778,265 UART: [afmc] CDI.KEYID = 6
2,778,627 UART: [afmc] SUBJECT.KEYID = 7
2,779,052 UART: [afmc] AUTHORITY.KEYID = 5
2,814,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,064 UART: [afmc] --
2,858,080 UART: [cold-reset] --
2,859,010 UART: [state] Locking Datavault
2,860,175 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,779 UART: [state] Locking ICCM
2,861,443 UART: [exit] Launching FMC @ 0x40000130
2,866,772 UART:
2,866,788 UART: Running Caliptra FMC ...
2,867,196 UART:
2,867,339 UART: [state] CFI Enabled
2,877,886 UART: [fht] FMC Alias Private Key: 7
2,985,497 UART: [art] Extend RT PCRs Done
2,985,925 UART: [art] Lock RT PCRs Done
2,987,597 UART: [art] Populate DV Done
2,995,960 UART: [fht] FMC Alias Private Key: 7
2,996,948 UART: [art] Derive CDI
2,997,228 UART: [art] Store in in slot 0x4
3,082,853 UART: [art] Derive Key Pair
3,083,213 UART: [art] Store priv key in slot 0x5
3,096,207 UART: [art] Derive Key Pair - Done
3,111,037 UART: [art] Signing Cert with AUTHO
3,111,517 UART: RITY.KEYID = 7
3,126,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,146 UART: [art] PUB.X = 660B7E4952A7B99FD857CDAF246415DAC31B6E36CDC4E29CDAA92E87DF2DA4270F84AEB038FD73D1EAFB7E9EC3E018EE
3,133,938 UART: [art] PUB.Y = BB93E99040DC7A56C5860C979BCA29C927DC3C3E4B1952D82A3F91EF428AA626524E53658BAB22B312775A5DAD9CF070
3,140,893 UART: [art] SIG.R = 317F47B74D9381584A89C0BF88F840D32903BA8143C1B3C172913BD84E0A902BE33E363A6A1C7BC99596FB6A53C5281C
3,147,657 UART: [art] SIG.S = C611A1C5CD20D96DF3F5D0AC5C5728B3FA38BBE76883E75DDC9BD5DE293294907E370EF98D551D7E0BB0EBC1F9AF9884
3,171,540 UART: Caliptra RT
3,171,885 UART: [state] CFI Enabled
3,279,108 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,980 UART: [rt]cmd =0x54514754, len=24
3,312,284 >>> mbox cmd response data (8 bytes)
3,312,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,698 UART: [rt]cmd =0x54514754, len=24
3,343,912 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 ready_for_fw is high
1,060,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,534 >>> mbox cmd response: success
2,629,534 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,592 UART:
2,691,608 UART: Running Caliptra FMC ...
2,692,016 UART:
2,692,159 UART: [state] CFI Enabled
2,702,400 UART: [fht] FMC Alias Private Key: 7
2,810,931 UART: [art] Extend RT PCRs Done
2,811,359 UART: [art] Lock RT PCRs Done
2,812,847 UART: [art] Populate DV Done
2,820,794 UART: [fht] FMC Alias Private Key: 7
2,821,796 UART: [art] Derive CDI
2,822,076 UART: [art] Store in in slot 0x4
2,907,897 UART: [art] Derive Key Pair
2,908,257 UART: [art] Store priv key in slot 0x5
2,921,649 UART: [art] Derive Key Pair - Done
2,936,243 UART: [art] Signing Cert with AUTHO
2,936,723 UART: RITY.KEYID = 7
2,952,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,866 UART: [art] PUB.X = E71291B5A3DA21F8A1A99E706A5F60B4BC2F7F187AA7377AEBD2C2A989143BE42AC8B1DB6075504FCB91D7C63DF87490
2,959,650 UART: [art] PUB.Y = AB1FE09F8639D66463141842EC776AC7D9432748DF3AC95E0B0B6464FAE272C7A583C125C45F6F5A4DA0EC7AC2F9CA56
2,966,606 UART: [art] SIG.R = EA1F6C4E8FD5993E7B4F07C84C1A637C154E3F375570FA3397F4B1F6A457772722F156EE43198E64DF80685A7356D165
2,973,371 UART: [art] SIG.S = 3A54CC504EDED5A804CB061D115E3EF53D169CCF63C4383A34DF97532F3CE33F9F253504429824E97064C09069E37AB9
2,997,159 UART: Caliptra RT
2,997,504 UART: [state] CFI Enabled
3,104,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,545 UART: [rt]cmd =0x54514754, len=24
3,137,645 >>> mbox cmd response data (8 bytes)
3,137,646 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,079 UART: [rt]cmd =0x54514754, len=24
3,168,955 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,602 UART: [state] LifecycleState = Unprovisioned
85,257 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,915 UART: [kat] ++
895,067 UART: [kat] sha1
899,191 UART: [kat] SHA2-256
901,131 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,242 UART: [kat] HMAC-384Kdf
919,926 UART: [kat] LMS
1,168,238 UART: [kat] --
1,169,051 UART: [cold-reset] ++
1,169,437 UART: [fht] FHT @ 0x50003400
1,172,197 UART: [idev] ++
1,172,365 UART: [idev] CDI.KEYID = 6
1,172,726 UART: [idev] SUBJECT.KEYID = 7
1,173,151 UART: [idev] UDS.KEYID = 0
1,173,497 ready_for_fw is high
1,173,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,272 UART: [ldev] ++
1,208,440 UART: [ldev] CDI.KEYID = 6
1,208,804 UART: [ldev] SUBJECT.KEYID = 5
1,209,231 UART: [ldev] AUTHORITY.KEYID = 7
1,209,694 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,078 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,526 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,554 >>> mbox cmd response: success
2,773,554 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,623 UART: [afmc] ++
2,774,791 UART: [afmc] CDI.KEYID = 6
2,775,154 UART: [afmc] SUBJECT.KEYID = 7
2,775,580 UART: [afmc] AUTHORITY.KEYID = 5
2,811,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,530 UART: [afmc] --
2,854,644 UART: [cold-reset] --
2,855,558 UART: [state] Locking Datavault
2,856,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,387 UART: [state] Locking ICCM
2,857,981 UART: [exit] Launching FMC @ 0x40000130
2,863,310 UART:
2,863,326 UART: Running Caliptra FMC ...
2,863,734 UART:
2,863,788 UART: [state] CFI Enabled
2,874,165 UART: [fht] FMC Alias Private Key: 7
2,981,948 UART: [art] Extend RT PCRs Done
2,982,376 UART: [art] Lock RT PCRs Done
2,984,112 UART: [art] Populate DV Done
2,992,251 UART: [fht] FMC Alias Private Key: 7
2,993,317 UART: [art] Derive CDI
2,993,597 UART: [art] Store in in slot 0x4
3,079,332 UART: [art] Derive Key Pair
3,079,692 UART: [art] Store priv key in slot 0x5
3,093,236 UART: [art] Derive Key Pair - Done
3,107,922 UART: [art] Signing Cert with AUTHO
3,108,402 UART: RITY.KEYID = 7
3,123,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,753 UART: [art] PUB.X = 31431455D4788F00DA1B641051EF8182CEDE191F3F775E3BE25189D43890133B946D46EC7B5432CF99D98AF182A1A46D
3,131,499 UART: [art] PUB.Y = 2670189CC7E5F269610644535E992D7FBCABC9216D8FB95CAF92C7D1F56537B62AEC9023593BF1DD2B8E0D7542160EAB
3,138,448 UART: [art] SIG.R = C8393FA218173D121D2240D79DF07D708AA49425EDD5B28D5DA2B931BC38FDC885DDAF140E14CEC42E5C6DE46044E3EB
3,145,231 UART: [art] SIG.S = F29513D012E7E19BA792DDCCE6F71F0438D35327A787BBB2EDBAA9DA80AD0E14EAF268A1E68714AE7B5D9EBD92F42DF1
3,168,886 UART: Caliptra RT
3,169,139 UART: [state] CFI Enabled
3,277,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,079 UART: [rt]cmd =0x54514754, len=24
3,310,019 >>> mbox cmd response data (8 bytes)
3,310,020 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,541 UART: [rt]cmd =0x54514754, len=24
3,341,397 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,284 ready_for_fw is high
1,055,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,901 >>> mbox cmd response: success
2,622,901 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,113 UART:
2,685,129 UART: Running Caliptra FMC ...
2,685,537 UART:
2,685,591 UART: [state] CFI Enabled
2,695,790 UART: [fht] FMC Alias Private Key: 7
2,804,275 UART: [art] Extend RT PCRs Done
2,804,703 UART: [art] Lock RT PCRs Done
2,806,385 UART: [art] Populate DV Done
2,814,368 UART: [fht] FMC Alias Private Key: 7
2,815,548 UART: [art] Derive CDI
2,815,828 UART: [art] Store in in slot 0x4
2,901,941 UART: [art] Derive Key Pair
2,902,301 UART: [art] Store priv key in slot 0x5
2,915,823 UART: [art] Derive Key Pair - Done
2,930,499 UART: [art] Signing Cert with AUTHO
2,930,979 UART: RITY.KEYID = 7
2,946,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,882 UART: [art] PUB.X = 043A16B190566B412128F80A6817C5EC5C9ADA98E5992A084DAC2C2AB3595C688C6D65C22F65D42729119487DC329CD2
2,953,641 UART: [art] PUB.Y = FB945FAD7C425368D4CCAC7F67E7A2D047B1F3CB1C49516F24F5DFCA5C7377CA823BE8D771674655B4EFC06752999B12
2,960,603 UART: [art] SIG.R = 0303565D755DC9E5A55E73043D6099A803A2BFE00A72A1B19C46C7CABD9FFF5B2DE412BAFFDED5DB80C6DE7AD232343B
2,967,380 UART: [art] SIG.S = 33A97F4E5580FE12ACFF78266A2BCE2AF1D5B1E2CADE0C6F455BF5DA698AE47BF8E5789D38A8456CDEA83FEB367EB3A5
2,991,468 UART: Caliptra RT
2,991,721 UART: [state] CFI Enabled
3,099,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,952 UART: [rt]cmd =0x54514754, len=24
3,133,342 >>> mbox cmd response data (8 bytes)
3,133,343 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,808 UART: [rt]cmd =0x54514754, len=24
3,164,898 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,463 UART: [kat] LMS
1,169,775 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,270 UART: [fht] FHT @ 0x50003400
1,173,940 UART: [idev] ++
1,174,108 UART: [idev] CDI.KEYID = 6
1,174,469 UART: [idev] SUBJECT.KEYID = 7
1,174,894 UART: [idev] UDS.KEYID = 0
1,175,240 ready_for_fw is high
1,175,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,840 UART: [idev] Sha1 KeyId Algorithm
1,209,728 UART: [idev] --
1,210,775 UART: [ldev] ++
1,210,943 UART: [ldev] CDI.KEYID = 6
1,211,307 UART: [ldev] SUBJECT.KEYID = 5
1,211,734 UART: [ldev] AUTHORITY.KEYID = 7
1,212,197 UART: [ldev] FE.KEYID = 1
1,217,679 UART: [ldev] Erasing FE.KEYID = 1
1,244,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,179 UART: [ldev] --
1,283,559 UART: [fwproc] Wait for Commands...
1,284,318 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,669 >>> mbox cmd response: success
2,775,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,714 UART: [afmc] ++
2,776,882 UART: [afmc] CDI.KEYID = 6
2,777,245 UART: [afmc] SUBJECT.KEYID = 7
2,777,671 UART: [afmc] AUTHORITY.KEYID = 5
2,814,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,249 UART: [afmc] --
2,857,217 UART: [cold-reset] --
2,857,995 UART: [state] Locking Datavault
2,859,128 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,732 UART: [state] Locking ICCM
2,860,156 UART: [exit] Launching FMC @ 0x40000130
2,865,485 UART:
2,865,501 UART: Running Caliptra FMC ...
2,865,909 UART:
2,866,052 UART: [state] CFI Enabled
2,876,881 UART: [fht] FMC Alias Private Key: 7
2,985,100 UART: [art] Extend RT PCRs Done
2,985,528 UART: [art] Lock RT PCRs Done
2,986,956 UART: [art] Populate DV Done
2,995,241 UART: [fht] FMC Alias Private Key: 7
2,996,187 UART: [art] Derive CDI
2,996,467 UART: [art] Store in in slot 0x4
3,082,438 UART: [art] Derive Key Pair
3,082,798 UART: [art] Store priv key in slot 0x5
3,096,274 UART: [art] Derive Key Pair - Done
3,111,043 UART: [art] Signing Cert with AUTHO
3,111,523 UART: RITY.KEYID = 7
3,126,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,526 UART: [art] PUB.X = C02CDA8C555BCC1BB14F88D1605BC616FAD26F1DADBF3F0598532333E5477BD23A6F3ABFEADB5498A5480A38A78F6F78
3,134,310 UART: [art] PUB.Y = B9687DADECF456535BD8C510A7CEEA0AD5F6C864E9FA992E261915264A45E353D5A69810718FBB8402536AF8EA468D8C
3,141,264 UART: [art] SIG.R = DF1CA5DF92551883E2D5641658ED999F021AF7B325F9DB0404BC73C73F866FF45E67D1B00DB8CDB166265876640B07CE
3,148,022 UART: [art] SIG.S = 0F34C77F67979AB82A32FCF5303DB17F35BF5DDE388EB53709354FC183784203FB01E57802C5FEAAEA00DAA93FB531D0
3,172,348 UART: Caliptra RT
3,172,693 UART: [state] CFI Enabled
3,281,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,104 UART: [rt]cmd =0x54514754, len=24
3,314,228 >>> mbox cmd response data (8 bytes)
3,314,229 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,714 UART: [rt]cmd =0x54514754, len=24
3,345,884 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,239 ready_for_fw is high
1,056,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,899 >>> mbox cmd response: success
2,622,899 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,043 UART:
2,685,059 UART: Running Caliptra FMC ...
2,685,467 UART:
2,685,610 UART: [state] CFI Enabled
2,696,349 UART: [fht] FMC Alias Private Key: 7
2,803,676 UART: [art] Extend RT PCRs Done
2,804,104 UART: [art] Lock RT PCRs Done
2,805,904 UART: [art] Populate DV Done
2,814,199 UART: [fht] FMC Alias Private Key: 7
2,815,305 UART: [art] Derive CDI
2,815,585 UART: [art] Store in in slot 0x4
2,900,974 UART: [art] Derive Key Pair
2,901,334 UART: [art] Store priv key in slot 0x5
2,914,388 UART: [art] Derive Key Pair - Done
2,928,940 UART: [art] Signing Cert with AUTHO
2,929,420 UART: RITY.KEYID = 7
2,944,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,265 UART: [art] PUB.X = 6078C252E15A008F1D79FF1A76BFF55DF2C6517C3E8F48FBE326B72B3BF832B8706EB35C5563D1092F9A4616FE15B8F5
2,952,018 UART: [art] PUB.Y = 9E1290C4F0203F33142D4C4DBDB0F573E915922F2C0F7F59B51F31599D5397CEEB2A89BDB9F3707462DCA132618DF40F
2,958,968 UART: [art] SIG.R = BF6004B2758C2B5CD163E7317F8FBCB164A820506EEB24FDE5383775D90516DA06320ADC127E5E000F1330A6B6A9CE11
2,965,707 UART: [art] SIG.S = 8D6877FDE328C9F5F68E1C26BAAC6BBF7FAF107FC2EDB880786572C9720BCB0D2D8A57E845DF5EF1E693FD11A2B51696
2,990,262 UART: Caliptra RT
2,990,607 UART: [state] CFI Enabled
3,097,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,971 UART: [rt]cmd =0x54514754, len=24
3,130,091 >>> mbox cmd response data (8 bytes)
3,130,092 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,883 UART: [rt]cmd =0x54514754, len=24
3,161,639 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,208 UART:
192,571 UART: Running Caliptra ROM ...
193,769 UART:
193,936 UART: [state] CFI Enabled
266,033 UART: [state] LifecycleState = Unprovisioned
267,957 UART: [state] DebugLocked = No
269,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,152 UART: [kat] SHA2-256
443,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,389 UART: [kat] ++
454,928 UART: [kat] sha1
465,315 UART: [kat] SHA2-256
467,969 UART: [kat] SHA2-384
474,379 UART: [kat] SHA2-512-ACC
476,742 UART: [kat] ECC-384
2,767,985 UART: [kat] HMAC-384Kdf
2,801,261 UART: [kat] LMS
3,991,577 UART: [kat] --
3,995,857 UART: [cold-reset] ++
3,997,922 UART: [fht] Storing FHT @ 0x50003400
4,010,760 UART: [idev] ++
4,011,363 UART: [idev] CDI.KEYID = 6
4,012,254 UART: [idev] SUBJECT.KEYID = 7
4,013,496 UART: [idev] UDS.KEYID = 0
4,014,485 ready_for_fw is high
4,014,694 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,121 UART: [idev] Erasing UDS.KEYID = 0
7,345,908 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,535 UART: [idev] --
7,372,092 UART: [ldev] ++
7,372,704 UART: [ldev] CDI.KEYID = 6
7,373,631 UART: [ldev] SUBJECT.KEYID = 5
7,374,845 UART: [ldev] AUTHORITY.KEYID = 7
7,376,071 UART: [ldev] FE.KEYID = 1
7,423,071 UART: [ldev] Erasing FE.KEYID = 1
10,759,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,549 UART: [ldev] --
13,138,747 UART: [fwproc] Waiting for Commands...
13,141,010 UART: [fwproc] Received command 0x46574c44
13,143,198 UART: [fwproc] Received Image of size 114124 bytes
17,193,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,651,210 >>> mbox cmd response: success
17,651,747 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,655,548 UART: [afmc] ++
17,656,135 UART: [afmc] CDI.KEYID = 6
17,657,019 UART: [afmc] SUBJECT.KEYID = 7
17,658,295 UART: [afmc] AUTHORITY.KEYID = 5
21,032,100 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,474 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,868 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,701 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,145 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,302 UART: [afmc] --
23,397,355 UART: [cold-reset] --
23,400,456 UART: [state] Locking Datavault
23,405,323 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,072 UART: [state] Locking ICCM
23,408,501 UART: [exit] Launching FMC @ 0x40000130
23,416,889 UART:
23,417,122 UART: Running Caliptra FMC ...
23,418,147 UART:
23,418,297 UART: [state] CFI Enabled
23,488,664 UART: [fht] FMC Alias Private Key: 7
25,826,194 UART: [art] Extend RT PCRs Done
25,827,412 UART: [art] Lock RT PCRs Done
25,828,867 UART: [art] Populate DV Done
25,834,061 UART: [fht] FMC Alias Private Key: 7
25,835,721 UART: [art] Derive CDI
25,836,544 UART: [art] Store in in slot 0x4
25,897,662 UART: [art] Derive Key Pair
25,898,705 UART: [art] Store priv key in slot 0x5
29,191,663 UART: [art] Derive Key Pair - Done
29,204,339 UART: [art] Signing Cert with AUTHO
29,205,641 UART: RITY.KEYID = 7
31,498,497 UART: [art] Erasing AUTHORITY.KEYID = 7
31,500,002 UART: [art] PUB.X = A6832D21A582DCEE29FB31129B5C8FFA7A144A9ED82D15A9897D3C3D747E664F29D7C5B3D3DA359F40FFFB6E59966D12
31,507,213 UART: [art] PUB.Y = CB6B4B517D04EFF4F625BEDA0E74BE10BB9AFD8376AEE6683F1668BB63D37A68F13E38AC93F04FB0DFD79FF13AA92D38
31,514,503 UART: [art] SIG.R = 05E19CAA14AC6A16E57FEC8A320EC56A02027B091F2213DBF1C3E2596EEDC0EC1A9E6193677E235EA754F650C1C3EC64
31,521,894 UART: [art] SIG.S = 2733B6738D8B03F4748B2D03E3A7D323608C0B42B47E7A180627F14F5702E8C0D64ED51BBF85A253D05DAFA244E7B4E2
32,826,600 UART: Caliptra RT
32,827,303 UART: [state] CFI Enabled
32,988,041 UART: [rt] RT listening for mailbox commands...
33,019,508 UART: [rt]cmd =0x54514754, len=24
33,022,151 >>> mbox cmd response data (8 bytes)
33,022,667 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,052,387 UART: [rt]cmd =0x47544744, len=8
33,055,413 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,803,752 ready_for_fw is high
3,804,155 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,875,207 >>> mbox cmd response: success
17,876,298 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,567,022 UART:
23,567,760 UART: Running Caliptra FMC ...
23,568,920 UART:
23,569,084 UART: [state] CFI Enabled
23,637,186 UART: [fht] FMC Alias Private Key: 7
25,975,383 UART: [art] Extend RT PCRs Done
25,976,612 UART: [art] Lock RT PCRs Done
25,978,004 UART: [art] Populate DV Done
25,983,488 UART: [fht] FMC Alias Private Key: 7
25,984,978 UART: [art] Derive CDI
25,985,715 UART: [art] Store in in slot 0x4
26,047,053 UART: [art] Derive Key Pair
26,048,102 UART: [art] Store priv key in slot 0x5
29,340,384 UART: [art] Derive Key Pair - Done
29,353,703 UART: [art] Signing Cert with AUTHO
29,355,012 UART: RITY.KEYID = 7
31,642,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,066 UART: [art] PUB.X = C22965E15FE769387807990C0C02461CD9FF7D5D3668150230F46B14A2974372ED24FA7DC10D91AD0DEA2DC4D7CA8D46
31,651,344 UART: [art] PUB.Y = 3F4309CB8610FFAC966ADC4AD3EAD04E6E32491DA702117BA6CF8911EE053B75C93A3CB6EFD0B0E52C96F504359E7C94
31,658,533 UART: [art] SIG.R = C7FBC503829ACEAC8A3329B1745457182B5E10DB9A4FF5C6B3737A38CB83851E39CFBA15F21C9D3F11B286C9312DCE95
31,665,927 UART: [art] SIG.S = 548DEEC29B7305D129BDF53942D662E54AEAB732DCFCF183DB206FCC5FB16AEDE4D2EC585D392CFA2A55D7BC8BAD558F
32,971,334 UART: Caliptra RT
32,972,039 UART: [state] CFI Enabled
33,133,840 UART: [rt] RT listening for mailbox commands...
33,165,386 UART: [rt]cmd =0x54514754, len=24
33,168,028 >>> mbox cmd response data (8 bytes)
33,168,595 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,198,234 UART: [rt]cmd =0x47544744, len=8
33,201,109 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,375 UART:
192,752 UART: Running Caliptra ROM ...
193,946 UART:
603,467 UART: [state] CFI Enabled
618,125 UART: [state] LifecycleState = Unprovisioned
620,065 UART: [state] DebugLocked = No
621,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,368 UART: [kat] SHA2-256
797,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,709 UART: [kat] ++
808,159 UART: [kat] sha1
818,034 UART: [kat] SHA2-256
820,715 UART: [kat] SHA2-384
825,643 UART: [kat] SHA2-512-ACC
828,006 UART: [kat] ECC-384
3,110,307 UART: [kat] HMAC-384Kdf
3,122,053 UART: [kat] LMS
4,312,173 UART: [kat] --
4,316,382 UART: [cold-reset] ++
4,318,266 UART: [fht] Storing FHT @ 0x50003400
4,328,712 UART: [idev] ++
4,329,350 UART: [idev] CDI.KEYID = 6
4,330,411 UART: [idev] SUBJECT.KEYID = 7
4,331,513 UART: [idev] UDS.KEYID = 0
4,332,492 ready_for_fw is high
4,332,679 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,857 UART: [idev] Erasing UDS.KEYID = 0
7,620,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,102 UART: [idev] --
7,648,225 UART: [ldev] ++
7,648,789 UART: [ldev] CDI.KEYID = 6
7,649,744 UART: [ldev] SUBJECT.KEYID = 5
7,650,948 UART: [ldev] AUTHORITY.KEYID = 7
7,652,226 UART: [ldev] FE.KEYID = 1
7,663,131 UART: [ldev] Erasing FE.KEYID = 1
10,952,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,830 UART: [ldev] --
13,312,065 UART: [fwproc] Waiting for Commands...
13,313,677 UART: [fwproc] Received command 0x46574c44
13,315,906 UART: [fwproc] Received Image of size 114124 bytes
17,367,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,021 >>> mbox cmd response: success
17,827,629 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,831,867 UART: [afmc] ++
17,832,450 UART: [afmc] CDI.KEYID = 6
17,833,413 UART: [afmc] SUBJECT.KEYID = 7
17,834,622 UART: [afmc] AUTHORITY.KEYID = 5
21,149,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,767 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,182 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,011 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,463 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,683 UART: [afmc] --
23,514,314 UART: [cold-reset] --
23,517,941 UART: [state] Locking Datavault
23,521,331 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,035 UART: [state] Locking ICCM
23,525,722 UART: [exit] Launching FMC @ 0x40000130
23,534,125 UART:
23,534,356 UART: Running Caliptra FMC ...
23,535,455 UART:
23,535,613 UART: [state] CFI Enabled
23,543,977 UART: [fht] FMC Alias Private Key: 7
25,875,047 UART: [art] Extend RT PCRs Done
25,876,275 UART: [art] Lock RT PCRs Done
25,877,926 UART: [art] Populate DV Done
25,883,385 UART: [fht] FMC Alias Private Key: 7
25,885,080 UART: [art] Derive CDI
25,885,891 UART: [art] Store in in slot 0x4
25,928,505 UART: [art] Derive Key Pair
25,929,548 UART: [art] Store priv key in slot 0x5
29,171,704 UART: [art] Derive Key Pair - Done
29,184,747 UART: [art] Signing Cert with AUTHO
29,186,048 UART: RITY.KEYID = 7
31,465,359 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,862 UART: [art] PUB.X = 60CF0010D8FB796EB7F2CF90284B8BADB4A534B940541B156B6E8A29EB67F730D0C3E49C88B4FE76CDD61C09A15458BE
31,474,111 UART: [art] PUB.Y = 0BB4FB2DD08C42259CE8A76371A43862D3B238147DCD8AEFAC0F9B187A82FFF3DF16A69B6FE0B030C5D6D8320BABFC72
31,481,389 UART: [art] SIG.R = 95072E1263455E497B03D14DDD6E1235D973045B4B581D7653205BF0532A0C48CCE065EB27F536D11AF246EC0C2E4EB4
31,488,767 UART: [art] SIG.S = 5E13A2E2FB3A069CDBC9A144E360FB05D209FAD1BAC867672E223A5816EE6066C95D457232211E0FDD26533EA1C77034
32,794,066 UART: Caliptra RT
32,794,782 UART: [state] CFI Enabled
32,912,777 UART: [rt] RT listening for mailbox commands...
32,944,409 UART: [rt]cmd =0x54514754, len=24
32,947,050 >>> mbox cmd response data (8 bytes)
32,947,594 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
32,977,349 UART: [rt]cmd =0x47544744, len=8
32,980,481 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,126,286 ready_for_fw is high
4,126,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,003 >>> mbox cmd response: success
18,061,989 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,699,497 UART:
23,699,882 UART: Running Caliptra FMC ...
23,701,019 UART:
23,701,176 UART: [state] CFI Enabled
23,709,016 UART: [fht] FMC Alias Private Key: 7
26,040,013 UART: [art] Extend RT PCRs Done
26,041,241 UART: [art] Lock RT PCRs Done
26,042,732 UART: [art] Populate DV Done
26,047,983 UART: [fht] FMC Alias Private Key: 7
26,049,648 UART: [art] Derive CDI
26,050,466 UART: [art] Store in in slot 0x4
26,093,277 UART: [art] Derive Key Pair
26,094,267 UART: [art] Store priv key in slot 0x5
29,336,626 UART: [art] Derive Key Pair - Done
29,349,591 UART: [art] Signing Cert with AUTHO
29,350,897 UART: RITY.KEYID = 7
31,630,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,757 UART: [art] PUB.X = 4B7262CF560DEA1D4CB798A874B8100AC94D658D643F2CAB7888E817F13CACA8DB9B2288C49949C656A5EC981B61AE19
31,638,999 UART: [art] PUB.Y = 7243A1EF14F6554DF561E6798E4C4A98781DBDB84EB688A6D55291D0622B6163FA0E32F000F730E70B8D804C0A40751A
31,646,246 UART: [art] SIG.R = 5B301D889BB14FA544355CAABEBAE4309B69B00A43F6FA131BD950FBC2768C7190F04CE98BC0A2B2F74A01352C99AC91
31,653,637 UART: [art] SIG.S = 88DC09993A678ABBFC36662E82D80AAC6BE3FED266D484F61812EDB1B37E1F374855ECCF4E3C3D66C8CBC83DDF9EB5D0
32,958,873 UART: Caliptra RT
32,959,571 UART: [state] CFI Enabled
33,077,996 UART: [rt] RT listening for mailbox commands...
33,109,087 UART: [rt]cmd =0x54514754, len=24
33,111,729 >>> mbox cmd response data (8 bytes)
33,112,142 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,142,030 UART: [rt]cmd =0x47544744, len=8
33,145,210 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,157 UART:
192,520 UART: Running Caliptra ROM ...
193,859 UART:
194,035 UART: [state] CFI Enabled
261,433 UART: [state] LifecycleState = Unprovisioned
263,306 UART: [state] DebugLocked = No
266,180 UART: [state] WD Timer not started. Device not locked for debugging
269,499 UART: [kat] SHA2-256
448,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,218 UART: [kat] ++
460,756 UART: [kat] sha1
470,431 UART: [kat] SHA2-256
473,513 UART: [kat] SHA2-384
479,073 UART: [kat] SHA2-512-ACC
482,013 UART: [kat] ECC-384
2,946,232 UART: [kat] HMAC-384Kdf
2,969,914 UART: [kat] LMS
3,499,386 UART: [kat] --
3,503,023 UART: [cold-reset] ++
3,504,690 UART: [fht] FHT @ 0x50003400
3,516,385 UART: [idev] ++
3,516,947 UART: [idev] CDI.KEYID = 6
3,517,979 UART: [idev] SUBJECT.KEYID = 7
3,519,080 UART: [idev] UDS.KEYID = 0
3,520,008 ready_for_fw is high
3,520,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,123 UART: [idev] Erasing UDS.KEYID = 0
6,025,434 UART: [idev] Sha1 KeyId Algorithm
6,049,197 UART: [idev] --
6,052,842 UART: [ldev] ++
6,053,420 UART: [ldev] CDI.KEYID = 6
6,054,337 UART: [ldev] SUBJECT.KEYID = 5
6,055,499 UART: [ldev] AUTHORITY.KEYID = 7
6,056,788 UART: [ldev] FE.KEYID = 1
6,101,142 UART: [ldev] Erasing FE.KEYID = 1
8,604,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,907 UART: [ldev] --
10,416,408 UART: [fwproc] Wait for Commands...
10,418,436 UART: [fwproc] Recv command 0x46574c44
10,420,528 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,497 >>> mbox cmd response: success
14,277,995 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,282,425 UART: [afmc] ++
14,283,033 UART: [afmc] CDI.KEYID = 6
14,283,943 UART: [afmc] SUBJECT.KEYID = 7
14,285,106 UART: [afmc] AUTHORITY.KEYID = 5
16,807,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,675 UART: [afmc] --
18,609,962 UART: [cold-reset] --
18,613,819 UART: [state] Locking Datavault
18,620,415 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,111 UART: [state] Locking ICCM
18,624,679 UART: [exit] Launching FMC @ 0x40000130
18,633,084 UART:
18,633,322 UART: Running Caliptra FMC ...
18,634,441 UART:
18,634,598 UART: [state] CFI Enabled
18,693,077 UART: [fht] FMC Alias Private Key: 7
20,456,701 UART: [art] Extend RT PCRs Done
20,457,929 UART: [art] Lock RT PCRs Done
20,459,772 UART: [art] Populate DV Done
20,465,240 UART: [fht] FMC Alias Private Key: 7
20,466,828 UART: [art] Derive CDI
20,467,644 UART: [art] Store in in slot 0x4
20,525,846 UART: [art] Derive Key Pair
20,526,888 UART: [art] Store priv key in slot 0x5
22,989,419 UART: [art] Derive Key Pair - Done
23,002,624 UART: [art] Signing Cert with AUTHO
23,003,959 UART: RITY.KEYID = 7
24,715,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,393 UART: [art] PUB.X = 7911AB7BA49F527F23CC60A0B0C6285BE37CC21CD1BD7453BB53F8E599C96BC3597688CDA50266C8ED7EF0F3575E0229
24,724,708 UART: [art] PUB.Y = DC95CFACDC6288124B76F507A8EA85506CAABA9C0C78297DFF3A8FE3277731C098741378639C996DEC3505DEB03D1308
24,731,937 UART: [art] SIG.R = B520184AE5D46FAC896136C3E0799C8A669F484280FA7F4120E84848B3649ABDB489365E2FFBDB65149E6669DD4C685A
24,739,324 UART: [art] SIG.S = AA2A4EBF0B275B7A1D03FFCA2AEE9221D58DDCA8D23B7CC5240F9D18B6764B754CEEB7DEAE60328D300CF8FAA6E98E19
25,718,307 UART: Caliptra RT
25,719,018 UART: [state] CFI Enabled
25,883,255 UART: [rt] RT listening for mailbox commands...
25,914,722 UART: [rt]cmd =0x54514754, len=24
25,917,407 >>> mbox cmd response data (8 bytes)
25,917,920 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,947,648 UART: [rt]cmd =0x47544744, len=8
25,950,795 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,364,983 ready_for_fw is high
3,365,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,036,313 >>> mbox cmd response: success
14,037,021 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,327,600 UART:
18,327,996 UART: Running Caliptra FMC ...
18,329,119 UART:
18,329,272 UART: [state] CFI Enabled
18,391,028 UART: [fht] FMC Alias Private Key: 7
20,155,414 UART: [art] Extend RT PCRs Done
20,156,641 UART: [art] Lock RT PCRs Done
20,158,185 UART: [art] Populate DV Done
20,163,594 UART: [fht] FMC Alias Private Key: 7
20,165,242 UART: [art] Derive CDI
20,165,976 UART: [art] Store in in slot 0x4
20,224,240 UART: [art] Derive Key Pair
20,225,327 UART: [art] Store priv key in slot 0x5
22,687,774 UART: [art] Derive Key Pair - Done
22,700,444 UART: [art] Signing Cert with AUTHO
22,701,750 UART: RITY.KEYID = 7
24,414,298 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,789 UART: [art] PUB.X = 5042A8880D55E7DDBB6B488348D7B636BA891F552318F8EEB2E35F05714F337F48F9FA89C46DF785F1F6E666391F6410
24,423,089 UART: [art] PUB.Y = F35D98A4EBB3C5AD8069F92F4A7A7D3862703A24F8C3D866D28E40003FB3DF57BC67A51154A4C296613D9F6BF19FE0E5
24,430,307 UART: [art] SIG.R = 9D4ED32F4C9D765CF0D830D5C1CA52707795A5EC1825AC13938BAE7A92DCB3AB206BE9846E5FDC500E7BBD05AD95F0AC
24,437,757 UART: [art] SIG.S = DFFEE76F730F7F200738A789BAAD27E4D583AD56261875C653FC94F0CE6042B2D831B7E8522E233C8E5AB83CDF3CBF52
25,416,783 UART: Caliptra RT
25,417,487 UART: [state] CFI Enabled
25,583,234 UART: [rt] RT listening for mailbox commands...
25,614,866 UART: [rt]cmd =0x54514754, len=24
25,617,794 >>> mbox cmd response data (8 bytes)
25,618,300 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,647,855 UART: [rt]cmd =0x47544744, len=8
25,650,856 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,498 UART:
192,865 UART: Running Caliptra ROM ...
194,216 UART:
603,626 UART: [state] CFI Enabled
617,785 UART: [state] LifecycleState = Unprovisioned
619,655 UART: [state] DebugLocked = No
621,736 UART: [state] WD Timer not started. Device not locked for debugging
625,326 UART: [kat] SHA2-256
804,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,016 UART: [kat] ++
816,465 UART: [kat] sha1
827,897 UART: [kat] SHA2-256
830,897 UART: [kat] SHA2-384
837,399 UART: [kat] SHA2-512-ACC
840,374 UART: [kat] ECC-384
3,282,187 UART: [kat] HMAC-384Kdf
3,294,440 UART: [kat] LMS
3,823,993 UART: [kat] --
3,828,988 UART: [cold-reset] ++
3,830,349 UART: [fht] FHT @ 0x50003400
3,840,177 UART: [idev] ++
3,840,732 UART: [idev] CDI.KEYID = 6
3,841,631 UART: [idev] SUBJECT.KEYID = 7
3,842,863 UART: [idev] UDS.KEYID = 0
3,843,801 ready_for_fw is high
3,844,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,247 UART: [idev] Erasing UDS.KEYID = 0
6,315,379 UART: [idev] Sha1 KeyId Algorithm
6,337,573 UART: [idev] --
6,342,479 UART: [ldev] ++
6,343,047 UART: [ldev] CDI.KEYID = 6
6,344,112 UART: [ldev] SUBJECT.KEYID = 5
6,345,212 UART: [ldev] AUTHORITY.KEYID = 7
6,346,379 UART: [ldev] FE.KEYID = 1
6,357,347 UART: [ldev] Erasing FE.KEYID = 1
8,829,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,124 UART: [ldev] --
10,620,572 UART: [fwproc] Wait for Commands...
10,623,530 UART: [fwproc] Recv command 0x46574c44
10,625,613 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,542 >>> mbox cmd response: success
14,489,101 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,493,478 UART: [afmc] ++
14,494,064 UART: [afmc] CDI.KEYID = 6
14,494,969 UART: [afmc] SUBJECT.KEYID = 7
14,496,183 UART: [afmc] AUTHORITY.KEYID = 5
16,992,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,738 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,587 UART: [afmc] --
18,791,019 UART: [cold-reset] --
18,795,038 UART: [state] Locking Datavault
18,798,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,879 UART: [state] Locking ICCM
18,802,618 UART: [exit] Launching FMC @ 0x40000130
18,811,013 UART:
18,811,246 UART: Running Caliptra FMC ...
18,812,343 UART:
18,812,498 UART: [state] CFI Enabled
18,820,997 UART: [fht] FMC Alias Private Key: 7
20,578,031 UART: [art] Extend RT PCRs Done
20,579,257 UART: [art] Lock RT PCRs Done
20,581,115 UART: [art] Populate DV Done
20,586,522 UART: [fht] FMC Alias Private Key: 7
20,588,163 UART: [art] Derive CDI
20,588,965 UART: [art] Store in in slot 0x4
20,631,617 UART: [art] Derive Key Pair
20,632,658 UART: [art] Store priv key in slot 0x5
23,059,468 UART: [art] Derive Key Pair - Done
23,072,359 UART: [art] Signing Cert with AUTHO
23,073,651 UART: RITY.KEYID = 7
24,778,993 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,508 UART: [art] PUB.X = A4D9ADC7FE00BF2324DFEB2A0CF469AE4853D30CDEF042F26716BA837B97E18E727D6F62849CC72A7F1311C812C259EB
24,787,799 UART: [art] PUB.Y = 7C6AAB5FCA3D714433F2F391823518FED182697279A344D1BFE3D4844297BA3BD44BBC1210E0C4AE68198703822AAB11
24,795,024 UART: [art] SIG.R = B33943D0D88B8910E3B19FA6E680A2BA436309BF1931DC154813FA4AD6725BF01A68D5C7B82B69964D8F8D89A052BBE4
24,802,413 UART: [art] SIG.S = B48B5D3FE3AE61466C338C77EED8D6E78AD2E9A7B43AFA571A18BCB363A974296F2C1FE9774DD2B24C08806A18B84274
25,781,233 UART: Caliptra RT
25,781,929 UART: [state] CFI Enabled
25,899,183 UART: [rt] RT listening for mailbox commands...
25,930,976 UART: [rt]cmd =0x54514754, len=24
25,933,447 >>> mbox cmd response data (8 bytes)
25,933,896 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,963,668 UART: [rt]cmd =0x47544744, len=8
25,966,684 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,699,554 ready_for_fw is high
3,700,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,640 >>> mbox cmd response: success
14,275,254 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,525,583 UART:
18,525,975 UART: Running Caliptra FMC ...
18,527,102 UART:
18,527,250 UART: [state] CFI Enabled
18,535,294 UART: [fht] FMC Alias Private Key: 7
20,292,263 UART: [art] Extend RT PCRs Done
20,293,490 UART: [art] Lock RT PCRs Done
20,295,012 UART: [art] Populate DV Done
20,300,413 UART: [fht] FMC Alias Private Key: 7
20,302,015 UART: [art] Derive CDI
20,302,833 UART: [art] Store in in slot 0x4
20,345,533 UART: [art] Derive Key Pair
20,346,529 UART: [art] Store priv key in slot 0x5
22,773,552 UART: [art] Derive Key Pair - Done
22,786,619 UART: [art] Signing Cert with AUTHO
22,787,956 UART: RITY.KEYID = 7
24,493,988 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,493 UART: [art] PUB.X = F269E2EE309011526D62C1C6F0F07154AE22DE5DD3FD5AE14298709CE27FA88808E1E1D47AE633B4E56800B82FF40FBC
24,502,740 UART: [art] PUB.Y = 22BE8D8FB068C262198B1975228A2EF4088D71D787ADE99A27AAF86004940738CDE044FB05B4CD3933A896B11A21CAD3
24,509,997 UART: [art] SIG.R = 4C971AC11C6D1CD7BC3134B67F349B61C0A73EA0924E2636DC237E093DEE1F7BC4128364301196B1AC59BA825B58111B
24,517,384 UART: [art] SIG.S = F4447D207439024D790DEE9F30A81BE459CEFCC236442C7185181C49F23189FD950579FC0DDB13242CAE304BBC3E79C2
25,496,315 UART: Caliptra RT
25,497,027 UART: [state] CFI Enabled
25,613,818 UART: [rt] RT listening for mailbox commands...
25,645,442 UART: [rt]cmd =0x54514754, len=24
25,648,401 >>> mbox cmd response data (8 bytes)
25,648,805 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,678,522 UART: [rt]cmd =0x47544744, len=8
25,681,487 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,899 writing to cptra_bootfsm_go
193,014 UART:
193,383 UART: Running Caliptra ROM ...
194,583 UART:
194,741 UART: [state] CFI Enabled
262,118 UART: [state] LifecycleState = Unprovisioned
264,533 UART: [state] DebugLocked = No
267,059 UART: [state] WD Timer not started. Device not locked for debugging
272,091 UART: [kat] SHA2-256
462,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,744 UART: [kat] ++
473,224 UART: [kat] sha1
483,699 UART: [kat] SHA2-256
486,750 UART: [kat] SHA2-384
493,882 UART: [kat] SHA2-512-ACC
496,462 UART: [kat] ECC-384
2,949,874 UART: [kat] HMAC-384Kdf
2,972,998 UART: [kat] LMS
3,504,787 UART: [kat] --
3,510,250 UART: [cold-reset] ++
3,512,608 UART: [fht] FHT @ 0x50003400
3,523,836 UART: [idev] ++
3,524,584 UART: [idev] CDI.KEYID = 6
3,525,513 UART: [idev] SUBJECT.KEYID = 7
3,526,686 UART: [idev] UDS.KEYID = 0
3,527,611 ready_for_fw is high
3,527,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,092 UART: [idev] Erasing UDS.KEYID = 0
6,030,917 UART: [idev] Sha1 KeyId Algorithm
6,052,469 UART: [idev] --
6,055,704 UART: [ldev] ++
6,056,394 UART: [ldev] CDI.KEYID = 6
6,057,278 UART: [ldev] SUBJECT.KEYID = 5
6,058,490 UART: [ldev] AUTHORITY.KEYID = 7
6,059,728 UART: [ldev] FE.KEYID = 1
6,100,434 UART: [ldev] Erasing FE.KEYID = 1
8,610,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,118 UART: [ldev] --
10,415,336 UART: [fwproc] Wait for Commands...
10,417,645 UART: [fwproc] Recv command 0x46574c44
10,419,951 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,601,735 >>> mbox cmd response: success
14,602,259 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,605,815 UART: [afmc] ++
14,606,533 UART: [afmc] CDI.KEYID = 6
14,607,647 UART: [afmc] SUBJECT.KEYID = 7
14,609,204 UART: [afmc] AUTHORITY.KEYID = 5
17,152,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,784 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,088 UART: [afmc] --
18,950,799 UART: [cold-reset] --
18,955,474 UART: [state] Locking Datavault
18,960,993 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,227 UART: [state] Locking ICCM
18,964,530 UART: [exit] Launching FMC @ 0x40000130
18,973,201 UART:
18,973,435 UART: Running Caliptra FMC ...
18,974,534 UART:
18,974,711 UART: [state] CFI Enabled
19,033,856 UART: [fht] FMC Alias Private Key: 7
20,797,603 UART: [art] Extend RT PCRs Done
20,798,830 UART: [art] Lock RT PCRs Done
20,800,567 UART: [art] Populate DV Done
20,805,980 UART: [fht] FMC Alias Private Key: 7
20,807,615 UART: [art] Derive CDI
20,808,435 UART: [art] Store in in slot 0x4
20,866,692 UART: [art] Derive Key Pair
20,867,683 UART: [art] Store priv key in slot 0x5
23,330,781 UART: [art] Derive Key Pair - Done
23,343,718 UART: [art] Signing Cert with AUTHO
23,345,024 UART: RITY.KEYID = 7
25,056,402 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,901 UART: [art] PUB.X = 77A8E7ED26AD644F96A87909EC0042B8518466BD9E4A2C0FE4F7C9497ADBA864AD5F2A1E5A5174D59CEE5C7A47260989
25,065,147 UART: [art] PUB.Y = 70B087A54761B97D47AF9E8759D465D1199BDBE6FABAED8212E9ABB1E3A824F4753930D8602EC47AE6796CA54DA3B251
25,072,446 UART: [art] SIG.R = 4DCA8AB61CA0B31D2B0661684C45B802EC3E5B200958B5ED968408309EA17F2F9970B983D4A177F96D9D3CE91115E3BC
25,079,837 UART: [art] SIG.S = BE08DF2CF7FD34728AB08D9C1277F4D3E658D2488CB931DD3C9E10110E8F6445C2D73901427153FB711BBA1E9D45BF4E
26,058,318 UART: Caliptra RT
26,059,007 UART: [state] CFI Enabled
26,225,091 UART: [rt] RT listening for mailbox commands...
26,256,509 UART: [rt]cmd =0x54514754, len=24
26,259,391 >>> mbox cmd response data (8 bytes)
26,259,906 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,289,742 UART: [rt]cmd =0x47544744, len=8
26,292,559 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,945 writing to cptra_bootfsm_go
3,437,276 ready_for_fw is high
3,437,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,533 >>> mbox cmd response: success
14,735,324 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,023,898 UART:
19,024,273 UART: Running Caliptra FMC ...
19,025,398 UART:
19,025,555 UART: [state] CFI Enabled
19,092,553 UART: [fht] FMC Alias Private Key: 7
20,856,768 UART: [art] Extend RT PCRs Done
20,857,985 UART: [art] Lock RT PCRs Done
20,859,855 UART: [art] Populate DV Done
20,865,048 UART: [fht] FMC Alias Private Key: 7
20,866,750 UART: [art] Derive CDI
20,867,486 UART: [art] Store in in slot 0x4
20,924,778 UART: [art] Derive Key Pair
20,925,819 UART: [art] Store priv key in slot 0x5
23,389,268 UART: [art] Derive Key Pair - Done
23,402,046 UART: [art] Signing Cert with AUTHO
23,403,357 UART: RITY.KEYID = 7
25,114,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,536 UART: [art] PUB.X = B910DD51FD441BF2F401E3DFED41F6A03A2AF3EC27DEAD853590DFB34C05650249EB744B6E78F2DE679B16D1854FD84B
25,122,899 UART: [art] PUB.Y = B06CE126B03CD0C7EB773F08F14E098C9EDE0292B98AD7E77E806167DA84FC145606D27B25FBC8811143580C95B0A005
25,130,046 UART: [art] SIG.R = 42E67948A8FF1D0F8B3D29E57E82EDAD391B1DDF32D3F439C451F32F5A06D70D5EC920DC3D1512459ADFEA77AA4D03B0
25,137,504 UART: [art] SIG.S = 246C0E026BFBC69A13164B85D04B56356FE16A669AD04A17CE789BD49AFB15FC60581F300C063636242ACBFF3785236A
26,116,159 UART: Caliptra RT
26,116,858 UART: [state] CFI Enabled
26,281,197 UART: [rt] RT listening for mailbox commands...
26,312,503 UART: [rt]cmd =0x54514754, len=24
26,315,200 >>> mbox cmd response data (8 bytes)
26,315,642 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,345,481 UART: [rt]cmd =0x47544744, len=8
26,348,336 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,406 UART:
192,816 UART: Running Caliptra ROM ...
193,949 UART:
603,447 UART: [state] CFI Enabled
615,258 UART: [state] LifecycleState = Unprovisioned
617,632 UART: [state] DebugLocked = No
619,721 UART: [state] WD Timer not started. Device not locked for debugging
624,816 UART: [kat] SHA2-256
814,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,498 UART: [kat] ++
826,012 UART: [kat] sha1
836,386 UART: [kat] SHA2-256
839,457 UART: [kat] SHA2-384
845,455 UART: [kat] SHA2-512-ACC
848,070 UART: [kat] ECC-384
3,292,011 UART: [kat] HMAC-384Kdf
3,304,737 UART: [kat] LMS
3,836,617 UART: [kat] --
3,841,744 UART: [cold-reset] ++
3,843,524 UART: [fht] FHT @ 0x50003400
3,855,626 UART: [idev] ++
3,856,331 UART: [idev] CDI.KEYID = 6
3,857,353 UART: [idev] SUBJECT.KEYID = 7
3,858,447 UART: [idev] UDS.KEYID = 0
3,859,484 ready_for_fw is high
3,859,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,750 UART: [idev] Erasing UDS.KEYID = 0
6,336,201 UART: [idev] Sha1 KeyId Algorithm
6,358,658 UART: [idev] --
6,363,014 UART: [ldev] ++
6,363,687 UART: [ldev] CDI.KEYID = 6
6,364,762 UART: [ldev] SUBJECT.KEYID = 5
6,365,820 UART: [ldev] AUTHORITY.KEYID = 7
6,367,072 UART: [ldev] FE.KEYID = 1
6,377,047 UART: [ldev] Erasing FE.KEYID = 1
8,851,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,921 UART: [ldev] --
10,641,287 UART: [fwproc] Wait for Commands...
10,644,235 UART: [fwproc] Recv command 0x46574c44
10,646,487 UART: [fwproc] Recv'd Img size: 114448 bytes
14,088,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,834,289 >>> mbox cmd response: success
14,834,829 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,838,428 UART: [afmc] ++
14,839,125 UART: [afmc] CDI.KEYID = 6
14,840,361 UART: [afmc] SUBJECT.KEYID = 7
14,841,788 UART: [afmc] AUTHORITY.KEYID = 5
17,344,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,697 UART: [afmc] --
19,142,556 UART: [cold-reset] --
19,147,981 UART: [state] Locking Datavault
19,154,461 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,648 UART: [state] Locking ICCM
19,158,036 UART: [exit] Launching FMC @ 0x40000130
19,166,689 UART:
19,166,960 UART: Running Caliptra FMC ...
19,167,980 UART:
19,168,118 UART: [state] CFI Enabled
19,176,425 UART: [fht] FMC Alias Private Key: 7
20,933,650 UART: [art] Extend RT PCRs Done
20,934,859 UART: [art] Lock RT PCRs Done
20,936,696 UART: [art] Populate DV Done
20,941,936 UART: [fht] FMC Alias Private Key: 7
20,943,579 UART: [art] Derive CDI
20,944,383 UART: [art] Store in in slot 0x4
20,986,911 UART: [art] Derive Key Pair
20,987,902 UART: [art] Store priv key in slot 0x5
23,414,665 UART: [art] Derive Key Pair - Done
23,427,823 UART: [art] Signing Cert with AUTHO
23,429,112 UART: RITY.KEYID = 7
25,134,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,174 UART: [art] PUB.X = B1566E9EBF8E188B48A5E7E5D0277F6485B7FF98FE04094E13F27BD4123D7640802AA19F29F023917B49275F0A789929
25,143,466 UART: [art] PUB.Y = 88BBD9772E15E340B7D6A163F9FAA5494E8C1FA3F9CF29AD7A928664DF2ABD04AFC562753BCC8E378D14ABC08CDD5336
25,150,740 UART: [art] SIG.R = BF4763123CEB9A5913B1FA5CFF42E86418B36F4D16612F8E6264377A0251ADFB6BD319B9650B0706688CBC2C19828865
25,158,121 UART: [art] SIG.S = D83D50D2769205A167EBCA0AE572A1FB7D188193A0925E72AB1AF7994E278610276B163D0A53073AF23DB79A1F3EC00E
26,136,954 UART: Caliptra RT
26,137,635 UART: [state] CFI Enabled
26,254,630 UART: [rt] RT listening for mailbox commands...
26,286,015 UART: [rt]cmd =0x54514754, len=24
26,288,730 >>> mbox cmd response data (8 bytes)
26,289,261 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,318,976 UART: [rt]cmd =0x47544744, len=8
26,321,740 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,754,609 ready_for_fw is high
3,755,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,629 >>> mbox cmd response: success
14,961,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,212,755 UART:
19,213,143 UART: Running Caliptra FMC ...
19,214,273 UART:
19,214,421 UART: [state] CFI Enabled
19,222,309 UART: [fht] FMC Alias Private Key: 7
20,979,542 UART: [art] Extend RT PCRs Done
20,980,773 UART: [art] Lock RT PCRs Done
20,982,671 UART: [art] Populate DV Done
20,987,879 UART: [fht] FMC Alias Private Key: 7
20,989,407 UART: [art] Derive CDI
20,990,146 UART: [art] Store in in slot 0x4
21,032,732 UART: [art] Derive Key Pair
21,033,750 UART: [art] Store priv key in slot 0x5
23,460,374 UART: [art] Derive Key Pair - Done
23,473,798 UART: [art] Signing Cert with AUTHO
23,475,132 UART: RITY.KEYID = 7
25,179,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,490 UART: [art] PUB.X = C5B2617FB59BF9C4F758B491DB8BA2C15D1A0221193DAAFE70DCAAEB241A135098B3B872BF5030F9D8234EAD83174A91
25,188,789 UART: [art] PUB.Y = 2A4D89EE9E8068A5C570FCAA5948A4CBFA16F7C614B60127670F3532B2CE999BC807373110424EB715C402F484E981C5
25,196,031 UART: [art] SIG.R = 2D896709B26FBAAF88BD893574358994DDA303771D70660BE4AFC01D3C49B26EAD263C2EB7512867B2D93B75AB5CC216
25,203,418 UART: [art] SIG.S = 474E35BC4E4762A8EC663166CAE52A75576A96CE20BFF114D31FA7237137C3730D4F3809ED05F6300D4B1EAC76986282
26,182,118 UART: Caliptra RT
26,182,819 UART: [state] CFI Enabled
26,300,380 UART: [rt] RT listening for mailbox commands...
26,331,628 UART: [rt]cmd =0x54514754, len=24
26,334,478 >>> mbox cmd response data (8 bytes)
26,334,969 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,364,637 UART: [rt]cmd =0x47544744, len=8
26,367,616 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,852 UART: [kat] HMAC-384Kdf
907,576 UART: [kat] LMS
1,475,772 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 ready_for_fw is high
1,480,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,344 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,874 UART: [idev] --
1,514,947 UART: [ldev] ++
1,515,115 UART: [ldev] CDI.KEYID = 6
1,515,478 UART: [ldev] SUBJECT.KEYID = 5
1,515,904 UART: [ldev] AUTHORITY.KEYID = 7
1,516,367 UART: [ldev] FE.KEYID = 1
1,521,761 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,018 UART: [ldev] --
1,586,401 UART: [fwproc] Waiting for Commands...
1,587,210 UART: [fwproc] Received command 0x46574c44
1,588,001 UART: [fwproc] Received Image of size 114448 bytes
2,888,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,076 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,428 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,541 >>> mbox cmd response: success
3,082,541 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,083,789 UART: [afmc] ++
3,083,957 UART: [afmc] CDI.KEYID = 6
3,084,319 UART: [afmc] SUBJECT.KEYID = 7
3,084,744 UART: [afmc] AUTHORITY.KEYID = 5
3,119,969 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,105 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,498 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,188 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,187 UART: [afmc] --
3,163,143 UART: [cold-reset] --
3,164,111 UART: [state] Locking Datavault
3,165,404 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,008 UART: [state] Locking ICCM
3,166,534 UART: [exit] Launching FMC @ 0x40000130
3,171,863 UART:
3,171,879 UART: Running Caliptra FMC ...
3,172,287 UART:
3,172,341 UART: [state] CFI Enabled
3,182,464 UART: [fht] FMC Alias Private Key: 7
3,290,741 UART: [art] Extend RT PCRs Done
3,291,169 UART: [art] Lock RT PCRs Done
3,292,799 UART: [art] Populate DV Done
3,300,982 UART: [fht] FMC Alias Private Key: 7
3,302,104 UART: [art] Derive CDI
3,302,384 UART: [art] Store in in slot 0x4
3,388,249 UART: [art] Derive Key Pair
3,388,609 UART: [art] Store priv key in slot 0x5
3,401,299 UART: [art] Derive Key Pair - Done
3,416,310 UART: [art] Signing Cert with AUTHO
3,416,790 UART: RITY.KEYID = 7
3,431,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,695 UART: [art] PUB.X = 7BBDDCB08892E4F2515FBC20DAD5299027B88D01F4BF7D7970097A9988E0D9A14C8B5E663D97A3ED42B996BC952E0FCD
3,439,470 UART: [art] PUB.Y = EF2D183049ABF07039CC1AC04BD7DB3D063EFE39D1A544AE536BCC8518C8B697179A4C69C508E8E4569EE2191DE722F5
3,446,426 UART: [art] SIG.R = 4E8BA465A908B44FC45B1791A5BEE9B300FA16F920A76DFDD30AB3F4E5EACA4FE97C406458A6A2DE204C98475B722D2E
3,453,186 UART: [art] SIG.S = 262CED0261C18097AAAB7B8A6A3FF414026B63C0168F2875D009EE78AC08481D5AD22DE579A820D66032CA6F6F3ED563
3,476,949 UART: Caliptra RT
3,477,202 UART: [state] CFI Enabled
3,585,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,794 UART: [rt]cmd =0x54514754, len=24
3,617,970 >>> mbox cmd response data (8 bytes)
3,617,971 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,244 UART: [rt]cmd =0x47544744, len=8
3,649,757 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 ready_for_fw is high
1,362,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,623 >>> mbox cmd response: success
2,930,623 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,141 UART:
2,992,157 UART: Running Caliptra FMC ...
2,992,565 UART:
2,992,619 UART: [state] CFI Enabled
3,003,410 UART: [fht] FMC Alias Private Key: 7
3,111,845 UART: [art] Extend RT PCRs Done
3,112,273 UART: [art] Lock RT PCRs Done
3,113,749 UART: [art] Populate DV Done
3,122,028 UART: [fht] FMC Alias Private Key: 7
3,122,962 UART: [art] Derive CDI
3,123,242 UART: [art] Store in in slot 0x4
3,208,817 UART: [art] Derive Key Pair
3,209,177 UART: [art] Store priv key in slot 0x5
3,222,527 UART: [art] Derive Key Pair - Done
3,237,183 UART: [art] Signing Cert with AUTHO
3,237,663 UART: RITY.KEYID = 7
3,252,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,340 UART: [art] PUB.X = 15161F592CF0DE646914A0DE294A8A9248105B4D482E203DED01B9FDFB23770D8A8E63902905079DF76D47C45C51F364
3,260,096 UART: [art] PUB.Y = 4BF198A43708FFA298CCC758F38A0E3880D29808FCF2073B4FB1F0162737EC9DFA575321AD6C542DFE3886C80469A414
3,267,035 UART: [art] SIG.R = D8168E6B33B75CAB1C648B22CCA1EAD8F8810F462F72FE8113C9FBD980306C9768847788A297017A942134B47EC4C77D
3,273,801 UART: [art] SIG.S = A1E205216BBC68EF8A84CFE5F0D669AC22135AE6C86A9E920D6FFF085EBD2B1BA475CA26189620CD8E2CA01A5A85FFAD
3,297,389 UART: Caliptra RT
3,297,642 UART: [state] CFI Enabled
3,406,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,678 UART: [rt]cmd =0x54514754, len=24
3,438,954 >>> mbox cmd response data (8 bytes)
3,438,955 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,706 UART: [rt]cmd =0x47544744, len=8
3,471,245 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,632 UART: [kat] SHA2-256
882,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,678 UART: [kat] ++
886,830 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,889 UART: [kat] SHA2-512-ACC
897,790 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
908,117 UART: [kat] LMS
1,476,313 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,648 UART: [fht] Storing FHT @ 0x50003400
1,480,563 UART: [idev] ++
1,480,731 UART: [idev] CDI.KEYID = 6
1,481,091 UART: [idev] SUBJECT.KEYID = 7
1,481,515 UART: [idev] UDS.KEYID = 0
1,481,860 ready_for_fw is high
1,481,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,769 UART: [idev] Erasing UDS.KEYID = 0
1,506,543 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,079 UART: [idev] --
1,516,044 UART: [ldev] ++
1,516,212 UART: [ldev] CDI.KEYID = 6
1,516,575 UART: [ldev] SUBJECT.KEYID = 5
1,517,001 UART: [ldev] AUTHORITY.KEYID = 7
1,517,464 UART: [ldev] FE.KEYID = 1
1,522,630 UART: [ldev] Erasing FE.KEYID = 1
1,547,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,497 UART: [ldev] --
1,586,884 UART: [fwproc] Waiting for Commands...
1,587,591 UART: [fwproc] Received command 0x46574c44
1,588,382 UART: [fwproc] Received Image of size 114448 bytes
2,887,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,978 >>> mbox cmd response: success
3,080,978 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,170 UART: [afmc] ++
3,082,338 UART: [afmc] CDI.KEYID = 6
3,082,700 UART: [afmc] SUBJECT.KEYID = 7
3,083,125 UART: [afmc] AUTHORITY.KEYID = 5
3,117,918 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,569 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,259 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,370 UART: [afmc] --
3,161,350 UART: [cold-reset] --
3,161,988 UART: [state] Locking Datavault
3,163,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,831 UART: [state] Locking ICCM
3,164,403 UART: [exit] Launching FMC @ 0x40000130
3,169,732 UART:
3,169,748 UART: Running Caliptra FMC ...
3,170,156 UART:
3,170,299 UART: [state] CFI Enabled
3,180,876 UART: [fht] FMC Alias Private Key: 7
3,289,393 UART: [art] Extend RT PCRs Done
3,289,821 UART: [art] Lock RT PCRs Done
3,291,369 UART: [art] Populate DV Done
3,299,566 UART: [fht] FMC Alias Private Key: 7
3,300,734 UART: [art] Derive CDI
3,301,014 UART: [art] Store in in slot 0x4
3,386,451 UART: [art] Derive Key Pair
3,386,811 UART: [art] Store priv key in slot 0x5
3,399,715 UART: [art] Derive Key Pair - Done
3,414,710 UART: [art] Signing Cert with AUTHO
3,415,190 UART: RITY.KEYID = 7
3,430,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,293 UART: [art] PUB.X = 83343279EFE8E110682ACDD77BAFA72E0120C4FD52550BDDB19CB795E4F496556D890C9E02E557B36C31B455BDAF2F50
3,438,061 UART: [art] PUB.Y = C8705B09263929708B8521B2AE9EB09EE427C974F285D40772D6550B772DCEA74BCBB065209EA2DE8DBCD0F020F1F3A4
3,445,010 UART: [art] SIG.R = 1C8E8CCBFB0DEE28B816E96EEC9FBFD051D972F99C3B4237A1D4506F473A396458BDD6ECD50A52EEA54FA351417758A8
3,451,792 UART: [art] SIG.S = 5F006DF0F6FFC8DEFF8D767E7BF405F7FDAC67C3C8E24AA1781DDE9094466E8C49507041A2548EE99030820D30BBB0DC
3,475,215 UART: Caliptra RT
3,475,560 UART: [state] CFI Enabled
3,583,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,614 UART: [rt]cmd =0x54514754, len=24
3,616,460 >>> mbox cmd response data (8 bytes)
3,616,461 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,080 UART: [rt]cmd =0x47544744, len=8
3,648,905 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,184 ready_for_fw is high
1,363,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,130 >>> mbox cmd response: success
2,929,130 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,622 UART:
2,991,638 UART: Running Caliptra FMC ...
2,992,046 UART:
2,992,189 UART: [state] CFI Enabled
3,002,420 UART: [fht] FMC Alias Private Key: 7
3,110,341 UART: [art] Extend RT PCRs Done
3,110,769 UART: [art] Lock RT PCRs Done
3,112,241 UART: [art] Populate DV Done
3,120,392 UART: [fht] FMC Alias Private Key: 7
3,121,564 UART: [art] Derive CDI
3,121,844 UART: [art] Store in in slot 0x4
3,207,239 UART: [art] Derive Key Pair
3,207,599 UART: [art] Store priv key in slot 0x5
3,221,111 UART: [art] Derive Key Pair - Done
3,236,112 UART: [art] Signing Cert with AUTHO
3,236,592 UART: RITY.KEYID = 7
3,252,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,823 UART: [art] PUB.X = 18D04C41CABECE01C9126FAE1DA0FDDFE5B782BC7F65EF49C8421A7C03D8550E1A117EF01C54A352014DE8BA7AEC13B0
3,259,605 UART: [art] PUB.Y = 7FA01F9CB72A266733D846E79DB280D3B2BA78E0B41D9D75A833B3CDD2EEC2903B92B9390377F849030F4E2452D70BD1
3,266,549 UART: [art] SIG.R = 66027C6B4ADE6714C26520579E6E1E63BB321FE1D4B491D6FA54DE1DA7756252DB6299CC9942DE2002E22AA091FA1F3F
3,273,321 UART: [art] SIG.S = 75AAA943A467724631F45E35CC526BA3C44AC3E5169FE28F689F0F2384AD7013657D75A40CB3D2C2B82D500E8D741970
3,296,925 UART: Caliptra RT
3,297,270 UART: [state] CFI Enabled
3,405,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,302 UART: [rt]cmd =0x54514754, len=24
3,438,820 >>> mbox cmd response data (8 bytes)
3,438,821 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,272 UART: [rt]cmd =0x47544744, len=8
3,470,841 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,182 UART: [kat] SHA2-256
892,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,957 UART: [kat] ++
897,109 UART: [kat] sha1
901,163 UART: [kat] SHA2-256
903,103 UART: [kat] SHA2-384
905,856 UART: [kat] SHA2-512-ACC
907,757 UART: [kat] ECC-384
916,996 UART: [kat] HMAC-384Kdf
921,676 UART: [kat] LMS
1,170,004 UART: [kat] --
1,171,211 UART: [cold-reset] ++
1,171,547 UART: [fht] FHT @ 0x50003400
1,174,318 UART: [idev] ++
1,174,486 UART: [idev] CDI.KEYID = 6
1,174,846 UART: [idev] SUBJECT.KEYID = 7
1,175,270 UART: [idev] UDS.KEYID = 0
1,175,615 ready_for_fw is high
1,175,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,250 UART: [idev] Erasing UDS.KEYID = 0
1,200,497 UART: [idev] Sha1 KeyId Algorithm
1,208,895 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,202 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46574c44
1,283,584 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,096 >>> mbox cmd response: success
2,775,096 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,302 UART: [afmc] ++
2,776,470 UART: [afmc] CDI.KEYID = 6
2,776,832 UART: [afmc] SUBJECT.KEYID = 7
2,777,257 UART: [afmc] AUTHORITY.KEYID = 5
2,812,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,665 UART: [afmc] --
2,855,647 UART: [cold-reset] --
2,856,593 UART: [state] Locking Datavault
2,857,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,414 UART: [state] Locking ICCM
2,858,912 UART: [exit] Launching FMC @ 0x40000130
2,864,241 UART:
2,864,257 UART: Running Caliptra FMC ...
2,864,665 UART:
2,864,719 UART: [state] CFI Enabled
2,875,132 UART: [fht] FMC Alias Private Key: 7
2,982,869 UART: [art] Extend RT PCRs Done
2,983,297 UART: [art] Lock RT PCRs Done
2,984,697 UART: [art] Populate DV Done
2,993,042 UART: [fht] FMC Alias Private Key: 7
2,994,128 UART: [art] Derive CDI
2,994,408 UART: [art] Store in in slot 0x4
3,080,085 UART: [art] Derive Key Pair
3,080,445 UART: [art] Store priv key in slot 0x5
3,093,469 UART: [art] Derive Key Pair - Done
3,107,972 UART: [art] Signing Cert with AUTHO
3,108,452 UART: RITY.KEYID = 7
3,123,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,431 UART: [art] PUB.X = B0907D185255D76051861CB7BAE526A3A1D7BEB350A5C908F77CFB41A9E9767C6B333A491B777A213FE2C3DCE75AE427
3,131,206 UART: [art] PUB.Y = A166A3663CF93F99786788031BD63A71E465021D0E0289E32E11230541A0A0A70860AD4E076E6C1D1855F06ABA6549AE
3,138,129 UART: [art] SIG.R = 7BA61DF2B9068E11D21FC5E5CE9441B343C0F24BC6BA9E519CB541DA608A100D08D35DAEB7962442A4731D1AE5236EE3
3,144,902 UART: [art] SIG.S = B6E92997B83210F479935B4E9A2FD39D9DC493327B00BF1881DE316884325576A6FCF1591EF16E7BFD27D652F702D318
3,167,978 UART: Caliptra RT
3,168,231 UART: [state] CFI Enabled
3,275,452 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,164 UART: [rt]cmd =0x54514754, len=24
3,308,422 >>> mbox cmd response data (8 bytes)
3,308,423 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,850 UART: [rt]cmd =0x47544744, len=8
3,340,233 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,363 >>> mbox cmd response: success
2,626,363 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,079 UART:
2,689,095 UART: Running Caliptra FMC ...
2,689,503 UART:
2,689,557 UART: [state] CFI Enabled
2,700,180 UART: [fht] FMC Alias Private Key: 7
2,808,027 UART: [art] Extend RT PCRs Done
2,808,455 UART: [art] Lock RT PCRs Done
2,809,795 UART: [art] Populate DV Done
2,818,148 UART: [fht] FMC Alias Private Key: 7
2,819,146 UART: [art] Derive CDI
2,819,426 UART: [art] Store in in slot 0x4
2,905,257 UART: [art] Derive Key Pair
2,905,617 UART: [art] Store priv key in slot 0x5
2,919,345 UART: [art] Derive Key Pair - Done
2,933,948 UART: [art] Signing Cert with AUTHO
2,934,428 UART: RITY.KEYID = 7
2,949,652 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,417 UART: [art] PUB.X = 8CFFE65DE19E6DAC0DC3A331433FD6325653B18DDFB822749AEA3C2E69CC08FC3120BA4A76836004E86E6F91B86FBAFA
2,957,198 UART: [art] PUB.Y = EC3AB643FB6F2731F6A6F391F21E41BE67F606457FEE2DB5A190A31C7B73A435469DF46721CB2B531530B49475207888
2,964,145 UART: [art] SIG.R = CC9C2FB2CCB251C2087F8EBABE0569B62CE0EF7C8922C0CE02C94D09EFF81FCDE8833F64E360590DD40517641DB8CD76
2,970,917 UART: [art] SIG.S = 0750F058D3963FD33099A43A221CB4138FA9945C9909170C8936FBC8472DDB9686CCF30697A606B73A32256BD77BA8F2
2,995,367 UART: Caliptra RT
2,995,620 UART: [state] CFI Enabled
3,103,431 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,775 UART: [rt]cmd =0x54514754, len=24
3,135,723 >>> mbox cmd response data (8 bytes)
3,135,724 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,823 UART: [rt]cmd =0x47544744, len=8
3,167,546 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,747 UART: [kat] LMS
1,171,075 UART: [kat] --
1,171,598 UART: [cold-reset] ++
1,172,090 UART: [fht] FHT @ 0x50003400
1,174,661 UART: [idev] ++
1,174,829 UART: [idev] CDI.KEYID = 6
1,175,189 UART: [idev] SUBJECT.KEYID = 7
1,175,613 UART: [idev] UDS.KEYID = 0
1,175,958 ready_for_fw is high
1,175,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,669 UART: [idev] Erasing UDS.KEYID = 0
1,200,776 UART: [idev] Sha1 KeyId Algorithm
1,209,132 UART: [idev] --
1,210,292 UART: [ldev] ++
1,210,460 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,249 UART: [ldev] AUTHORITY.KEYID = 7
1,211,712 UART: [ldev] FE.KEYID = 1
1,216,928 UART: [ldev] Erasing FE.KEYID = 1
1,243,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,434 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,547 UART: [fwproc] Recv command 0x46574c44
1,284,275 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,847 >>> mbox cmd response: success
2,776,847 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,939 UART: [afmc] ++
2,778,107 UART: [afmc] CDI.KEYID = 6
2,778,469 UART: [afmc] SUBJECT.KEYID = 7
2,778,894 UART: [afmc] AUTHORITY.KEYID = 5
2,814,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,110 UART: [afmc] --
2,858,082 UART: [cold-reset] --
2,858,856 UART: [state] Locking Datavault
2,860,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,751 UART: [state] Locking ICCM
2,861,417 UART: [exit] Launching FMC @ 0x40000130
2,866,746 UART:
2,866,762 UART: Running Caliptra FMC ...
2,867,170 UART:
2,867,313 UART: [state] CFI Enabled
2,878,016 UART: [fht] FMC Alias Private Key: 7
2,985,931 UART: [art] Extend RT PCRs Done
2,986,359 UART: [art] Lock RT PCRs Done
2,987,565 UART: [art] Populate DV Done
2,996,140 UART: [fht] FMC Alias Private Key: 7
2,997,104 UART: [art] Derive CDI
2,997,384 UART: [art] Store in in slot 0x4
3,083,463 UART: [art] Derive Key Pair
3,083,823 UART: [art] Store priv key in slot 0x5
3,097,113 UART: [art] Derive Key Pair - Done
3,111,985 UART: [art] Signing Cert with AUTHO
3,112,465 UART: RITY.KEYID = 7
3,127,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,118 UART: [art] PUB.X = 1DAEDB33E6E4CC7470A8C1EB9DBD5995B2724D6B03CA87C6CBA5A1AECEFA749DA4EE4CFC07B8B4DCEECAF2ED0A9F384A
3,134,923 UART: [art] PUB.Y = 7FCF1C938CFB9F73A6DDCA6DCDE31815447B44DF60DCD89BFF54924A507A9EB5AB959FED1301665D67B2F959131BFBB1
3,141,892 UART: [art] SIG.R = 563EB5236DC4DBDCB81D6F4ED46A81032CA16A04B20B491D85EB134B5F6F9A8CDFCCF0418AF77B84FF1EFADA85647E96
3,148,677 UART: [art] SIG.S = 083AAC4A6AA15DE8D8CEB15C2B2CD6F7C01301CB67B65B3FDB59A28490F88D067AC7322ACE9C99629D2D2705BD528CB8
3,172,470 UART: Caliptra RT
3,172,815 UART: [state] CFI Enabled
3,281,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,302 UART: [rt]cmd =0x54514754, len=24
3,314,484 >>> mbox cmd response data (8 bytes)
3,314,485 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,756 UART: [rt]cmd =0x47544744, len=8
3,346,689 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,686 ready_for_fw is high
1,059,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,800 >>> mbox cmd response: success
2,627,800 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,456 UART:
2,690,472 UART: Running Caliptra FMC ...
2,690,880 UART:
2,691,023 UART: [state] CFI Enabled
2,701,712 UART: [fht] FMC Alias Private Key: 7
2,810,273 UART: [art] Extend RT PCRs Done
2,810,701 UART: [art] Lock RT PCRs Done
2,812,489 UART: [art] Populate DV Done
2,820,680 UART: [fht] FMC Alias Private Key: 7
2,821,826 UART: [art] Derive CDI
2,822,106 UART: [art] Store in in slot 0x4
2,907,905 UART: [art] Derive Key Pair
2,908,265 UART: [art] Store priv key in slot 0x5
2,921,885 UART: [art] Derive Key Pair - Done
2,936,455 UART: [art] Signing Cert with AUTHO
2,936,935 UART: RITY.KEYID = 7
2,952,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,068 UART: [art] PUB.X = 0F75FD49304567D685F9B5FD3E72F731B0B153FE0B28F58E73DAF27691DCCF2C5CA2B7A0C859AC7B93245C94D6333016
2,959,840 UART: [art] PUB.Y = D163C81E9AD2A9CC492FC9D981BD84716E06FC137D5E1E45738FEB8D35B107767EFFD16CF58ED1C7F714188B9C90FB78
2,966,798 UART: [art] SIG.R = CC866E2C0D737FCB678833C174A13FCEF96BB0DD9CA492007EBD93FCBEF0533FE090F17924DF1182AED434F0B4741500
2,973,535 UART: [art] SIG.S = D0F6FF55F8DA44967DFACE139D1FCD57FD3649BBB880F55AD9B3A253F91C4561942DAADC31FA7398FE8808F09E8DCA5D
2,997,305 UART: Caliptra RT
2,997,650 UART: [state] CFI Enabled
3,105,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,912 UART: [rt]cmd =0x54514754, len=24
3,138,294 >>> mbox cmd response data (8 bytes)
3,138,295 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,594 UART: [rt]cmd =0x47544744, len=8
3,170,019 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,945 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
890,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,835 UART: [kat] ++
894,987 UART: [kat] sha1
899,191 UART: [kat] SHA2-256
901,131 UART: [kat] SHA2-384
903,934 UART: [kat] SHA2-512-ACC
905,835 UART: [kat] ECC-384
914,908 UART: [kat] HMAC-384Kdf
919,556 UART: [kat] LMS
1,167,868 UART: [kat] --
1,168,729 UART: [cold-reset] ++
1,169,113 UART: [fht] FHT @ 0x50003400
1,171,823 UART: [idev] ++
1,171,991 UART: [idev] CDI.KEYID = 6
1,172,352 UART: [idev] SUBJECT.KEYID = 7
1,172,777 UART: [idev] UDS.KEYID = 0
1,173,123 ready_for_fw is high
1,173,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,537 UART: [idev] Erasing UDS.KEYID = 0
1,197,235 UART: [idev] Sha1 KeyId Algorithm
1,206,063 UART: [idev] --
1,207,054 UART: [ldev] ++
1,207,222 UART: [ldev] CDI.KEYID = 6
1,207,586 UART: [ldev] SUBJECT.KEYID = 5
1,208,013 UART: [ldev] AUTHORITY.KEYID = 7
1,208,476 UART: [ldev] FE.KEYID = 1
1,213,586 UART: [ldev] Erasing FE.KEYID = 1
1,240,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,034 UART: [ldev] --
1,279,356 UART: [fwproc] Wait for Commands...
1,280,057 UART: [fwproc] Recv command 0x46574c44
1,280,790 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,770 >>> mbox cmd response: success
2,772,770 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,031 UART: [afmc] ++
2,774,199 UART: [afmc] CDI.KEYID = 6
2,774,562 UART: [afmc] SUBJECT.KEYID = 7
2,774,988 UART: [afmc] AUTHORITY.KEYID = 5
2,810,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,092 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,811 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,576 UART: [afmc] --
2,854,484 UART: [cold-reset] --
2,855,496 UART: [state] Locking Datavault
2,856,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,381 UART: [state] Locking ICCM
2,857,863 UART: [exit] Launching FMC @ 0x40000130
2,863,192 UART:
2,863,208 UART: Running Caliptra FMC ...
2,863,616 UART:
2,863,670 UART: [state] CFI Enabled
2,874,037 UART: [fht] FMC Alias Private Key: 7
2,982,734 UART: [art] Extend RT PCRs Done
2,983,162 UART: [art] Lock RT PCRs Done
2,984,832 UART: [art] Populate DV Done
2,993,077 UART: [fht] FMC Alias Private Key: 7
2,994,137 UART: [art] Derive CDI
2,994,417 UART: [art] Store in in slot 0x4
3,080,086 UART: [art] Derive Key Pair
3,080,446 UART: [art] Store priv key in slot 0x5
3,093,770 UART: [art] Derive Key Pair - Done
3,108,835 UART: [art] Signing Cert with AUTHO
3,109,315 UART: RITY.KEYID = 7
3,124,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,192 UART: [art] PUB.X = 0B3638FCBA00F078EFC56146AE385290F3AF82CFB73A48E20244772F39073929CC95961FA8C7F769E6FDB8CF687A2316
3,131,935 UART: [art] PUB.Y = C2CA47C1FF1522D15C87D3B5B6F4680E23B55E059511250468E76A4C80C1155133F4723A28E6F6EBE9264C34B1AD4D98
3,138,876 UART: [art] SIG.R = CA4CC4B00A3D8A17287622D9015F9AB95F01AF2132559D41372B7116CA4CE3070A7D79809433D73DC6C8E01FAF416370
3,145,631 UART: [art] SIG.S = 39E3B311F4B9980C95CDC5ED1526CDA81ED2930EC10EE0B1A1EB4846F9463B2CF792357F56FC090A43748F83EB9C4C6F
3,169,361 UART: Caliptra RT
3,169,614 UART: [state] CFI Enabled
3,277,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,045 UART: [rt]cmd =0x54514754, len=24
3,310,049 >>> mbox cmd response data (8 bytes)
3,310,050 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,531 UART: [rt]cmd =0x47544744, len=8
3,342,242 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,868 ready_for_fw is high
1,054,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,384 >>> mbox cmd response: success
2,622,384 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,798 UART:
2,684,814 UART: Running Caliptra FMC ...
2,685,222 UART:
2,685,276 UART: [state] CFI Enabled
2,695,923 UART: [fht] FMC Alias Private Key: 7
2,804,636 UART: [art] Extend RT PCRs Done
2,805,064 UART: [art] Lock RT PCRs Done
2,806,546 UART: [art] Populate DV Done
2,814,709 UART: [fht] FMC Alias Private Key: 7
2,815,749 UART: [art] Derive CDI
2,816,029 UART: [art] Store in in slot 0x4
2,901,788 UART: [art] Derive Key Pair
2,902,148 UART: [art] Store priv key in slot 0x5
2,915,274 UART: [art] Derive Key Pair - Done
2,929,762 UART: [art] Signing Cert with AUTHO
2,930,242 UART: RITY.KEYID = 7
2,945,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,037 UART: [art] PUB.X = CE250A1730845CA575928E36C0AD3B32A9E07173592157772E5E312312A02ED099E50D44A953BF171B7A8524DDD14170
2,952,793 UART: [art] PUB.Y = ED64DD396E52214C46137A58A170D6D41158D5CEC4FDB92460158CE7AECC9BC497A155CCC3B525E9BEE08B6665770773
2,959,748 UART: [art] SIG.R = 588F5DBC83B57925D7B436E82879561C9EE46EA50F240F30BA1058582C118B689133A52DC9BE578CD0326F511471AE96
2,966,508 UART: [art] SIG.S = FD0AD36156BD3BC3A64823DD0A761B91646BCAE5E77383B02D0916BDFD28D0C664609E52EF0C1E91DD178A5A4BAC194F
2,990,041 UART: Caliptra RT
2,990,294 UART: [state] CFI Enabled
3,098,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,429 UART: [rt]cmd =0x54514754, len=24
3,131,445 >>> mbox cmd response data (8 bytes)
3,131,446 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,979 UART: [rt]cmd =0x47544744, len=8
3,163,698 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,174,588 ready_for_fw is high
1,174,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,506 UART: [idev] --
1,208,361 UART: [ldev] ++
1,208,529 UART: [ldev] CDI.KEYID = 6
1,208,893 UART: [ldev] SUBJECT.KEYID = 5
1,209,320 UART: [ldev] AUTHORITY.KEYID = 7
1,209,783 UART: [ldev] FE.KEYID = 1
1,215,263 UART: [ldev] Erasing FE.KEYID = 1
1,241,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,653 >>> mbox cmd response: success
2,774,653 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,776 UART: [afmc] ++
2,775,944 UART: [afmc] CDI.KEYID = 6
2,776,307 UART: [afmc] SUBJECT.KEYID = 7
2,776,733 UART: [afmc] AUTHORITY.KEYID = 5
2,812,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,957 UART: [afmc] --
2,855,877 UART: [cold-reset] --
2,856,959 UART: [state] Locking Datavault
2,858,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,022 UART: [state] Locking ICCM
2,859,696 UART: [exit] Launching FMC @ 0x40000130
2,865,025 UART:
2,865,041 UART: Running Caliptra FMC ...
2,865,449 UART:
2,865,592 UART: [state] CFI Enabled
2,876,483 UART: [fht] FMC Alias Private Key: 7
2,984,330 UART: [art] Extend RT PCRs Done
2,984,758 UART: [art] Lock RT PCRs Done
2,986,378 UART: [art] Populate DV Done
2,994,643 UART: [fht] FMC Alias Private Key: 7
2,995,655 UART: [art] Derive CDI
2,995,935 UART: [art] Store in in slot 0x4
3,081,134 UART: [art] Derive Key Pair
3,081,494 UART: [art] Store priv key in slot 0x5
3,094,764 UART: [art] Derive Key Pair - Done
3,109,301 UART: [art] Signing Cert with AUTHO
3,109,781 UART: RITY.KEYID = 7
3,124,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,620 UART: [art] PUB.X = 5EB1CFB677359D464BD41D00B6BF3864C9565159BFB0D6B1156568F4785051C60DDCF6DBC011E61B0B379A081EAAF7EC
3,132,371 UART: [art] PUB.Y = 772B75C15B65536CE09A856C79B9D3E88B65CC723C6915C21A3555961CC89A0E65AB1870F700D71EA1A07AB6E2E065C2
3,139,298 UART: [art] SIG.R = 97E6050AB1EB355D4983D07E9F9C41FFBAC334D6167992D868691DE05461CA127BE1CC838B6B073E28D23BE485DA306E
3,146,065 UART: [art] SIG.S = 32A5C4A2F06B195EF7040BA69BFCC16DF382A3C57CE3A825AE4BDD1569926FBEDFD2B19293E3308650B4EEFB196DDD4A
3,169,616 UART: Caliptra RT
3,169,961 UART: [state] CFI Enabled
3,277,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,154 UART: [rt]cmd =0x54514754, len=24
3,310,174 >>> mbox cmd response data (8 bytes)
3,310,175 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,530 UART: [rt]cmd =0x47544744, len=8
3,342,205 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,797 ready_for_fw is high
1,055,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,787 >>> mbox cmd response: success
2,622,787 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,787 UART:
2,684,803 UART: Running Caliptra FMC ...
2,685,211 UART:
2,685,354 UART: [state] CFI Enabled
2,695,801 UART: [fht] FMC Alias Private Key: 7
2,804,152 UART: [art] Extend RT PCRs Done
2,804,580 UART: [art] Lock RT PCRs Done
2,806,064 UART: [art] Populate DV Done
2,814,547 UART: [fht] FMC Alias Private Key: 7
2,815,577 UART: [art] Derive CDI
2,815,857 UART: [art] Store in in slot 0x4
2,901,562 UART: [art] Derive Key Pair
2,901,922 UART: [art] Store priv key in slot 0x5
2,915,116 UART: [art] Derive Key Pair - Done
2,930,154 UART: [art] Signing Cert with AUTHO
2,930,634 UART: RITY.KEYID = 7
2,946,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,063 UART: [art] PUB.X = 46580EBE16725EE60B3EDB86132BA225EEB30689D9F8792B2B0662081D8F1CD8D544B9A64B99CB560525BB72AE950E04
2,953,813 UART: [art] PUB.Y = EF6B822178626632C9EF368485644A1B9137BB54B2FBF123A96A4B506B04A25969EFC90447C0FB03D7D6C01EFBCD78F2
2,960,760 UART: [art] SIG.R = F4C20A1CD057DB3279AC6781BC280591005D57FFB45700BEA992DB697A019BB935A7E28DECAB4B04C1F6F60301D19801
2,967,473 UART: [art] SIG.S = DCF8B579ECE4237E8B51737534C738DDFB5C819457A7A343FFEFDADECBD3BD970A25D55973CA912039577F3698FFCA00
2,991,643 UART: Caliptra RT
2,991,988 UART: [state] CFI Enabled
3,099,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,912 UART: [rt]cmd =0x54514754, len=24
3,132,208 >>> mbox cmd response data (8 bytes)
3,132,209 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,602 UART: [rt]cmd =0x47544744, len=8
3,164,117 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,190 UART:
192,576 UART: Running Caliptra ROM ...
193,707 UART:
193,874 UART: [state] CFI Enabled
266,720 UART: [state] LifecycleState = Unprovisioned
268,667 UART: [state] DebugLocked = No
270,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,237 UART: [kat] SHA2-256
443,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,447 UART: [kat] ++
454,894 UART: [kat] sha1
466,764 UART: [kat] SHA2-256
469,484 UART: [kat] SHA2-384
476,044 UART: [kat] SHA2-512-ACC
478,423 UART: [kat] ECC-384
2,768,178 UART: [kat] HMAC-384Kdf
2,799,667 UART: [kat] LMS
3,989,934 UART: [kat] --
3,994,106 UART: [cold-reset] ++
3,996,056 UART: [fht] Storing FHT @ 0x50003400
4,008,542 UART: [idev] ++
4,009,116 UART: [idev] CDI.KEYID = 6
4,010,045 UART: [idev] SUBJECT.KEYID = 7
4,011,296 UART: [idev] UDS.KEYID = 0
4,012,357 ready_for_fw is high
4,012,567 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,187 UART: [idev] Erasing UDS.KEYID = 0
7,347,202 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,217 UART: [idev] --
7,373,986 UART: [ldev] ++
7,374,564 UART: [ldev] CDI.KEYID = 6
7,375,543 UART: [ldev] SUBJECT.KEYID = 5
7,376,755 UART: [ldev] AUTHORITY.KEYID = 7
7,377,989 UART: [ldev] FE.KEYID = 1
7,421,697 UART: [ldev] Erasing FE.KEYID = 1
10,757,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,056 UART: [ldev] --
13,136,722 UART: [fwproc] Waiting for Commands...
13,138,382 UART: [fwproc] Received command 0x46574c44
13,140,566 UART: [fwproc] Received Image of size 114124 bytes
17,202,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,346,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,663,059 >>> mbox cmd response: success
17,663,613 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,667,120 UART: [afmc] ++
17,667,710 UART: [afmc] CDI.KEYID = 6
17,668,702 UART: [afmc] SUBJECT.KEYID = 7
17,669,919 UART: [afmc] AUTHORITY.KEYID = 5
21,028,057 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,521 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,945 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,732 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,182 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,214 UART: [afmc] --
23,398,474 UART: [cold-reset] --
23,401,585 UART: [state] Locking Datavault
23,407,430 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,181 UART: [state] Locking ICCM
23,410,338 UART: [exit] Launching FMC @ 0x40000130
23,418,726 UART:
23,418,970 UART: Running Caliptra FMC ...
23,420,095 UART:
23,420,265 UART: [state] CFI Enabled
23,486,054 UART: [fht] FMC Alias Private Key: 7
25,824,086 UART: [art] Extend RT PCRs Done
25,825,309 UART: [art] Lock RT PCRs Done
25,827,048 UART: [art] Populate DV Done
25,832,466 UART: [fht] FMC Alias Private Key: 7
25,834,111 UART: [art] Derive CDI
25,834,926 UART: [art] Store in in slot 0x4
25,894,375 UART: [art] Derive Key Pair
25,895,415 UART: [art] Store priv key in slot 0x5
29,188,737 UART: [art] Derive Key Pair - Done
29,201,523 UART: [art] Signing Cert with AUTHO
29,202,825 UART: RITY.KEYID = 7
31,489,922 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,432 UART: [art] PUB.X = C7F2EC83FD5AB7D1901535F032A4FE1010882A6A453EAC146B020EAF07077ED7CEA7D3E129574B0F6789B79C3A8ABCE0
31,498,708 UART: [art] PUB.Y = 1CD803FDCC9619963279A7119219999001409E95E424C1808FDC88B3D151834C9FA7F023F4F86F559375A0CCE1403107
31,505,898 UART: [art] SIG.R = 56A50F390961A0323B1AD3DDDEB546CEC48A88BAE7D47B311C8417BFDB6DEDBC5B04C4426A2A2F820D998DC2FBBF1CEC
31,513,302 UART: [art] SIG.S = 5817D8190BA1C59AF29E371610B5E51E4B46C61727FAE217353697FBA0A3EB0018EE2FA90433FA53F67EF451319E200A
32,818,412 UART: Caliptra RT
32,819,117 UART: [state] CFI Enabled
32,999,670 UART: [rt] RT listening for mailbox commands...
33,031,254 UART: [rt]cmd =0x54514754, len=24
33,034,004 >>> mbox cmd response data (8 bytes)
33,035,053 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,065,048 UART: [rt]cmd =0x44504543, len=36
33,101,753 >>> mbox cmd response data (24 bytes)
33,102,413 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,132,251 UART: [rt]cmd =0x47544744, len=8
33,134,309 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,806,068 ready_for_fw is high
3,806,653 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,914,481 >>> mbox cmd response: success
17,915,144 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,610,107 UART:
23,610,531 UART: Running Caliptra FMC ...
23,611,648 UART:
23,611,812 UART: [state] CFI Enabled
23,678,876 UART: [fht] FMC Alias Private Key: 7
26,016,805 UART: [art] Extend RT PCRs Done
26,018,037 UART: [art] Lock RT PCRs Done
26,019,863 UART: [art] Populate DV Done
26,025,352 UART: [fht] FMC Alias Private Key: 7
26,026,951 UART: [art] Derive CDI
26,027,773 UART: [art] Store in in slot 0x4
26,087,377 UART: [art] Derive Key Pair
26,088,418 UART: [art] Store priv key in slot 0x5
29,381,812 UART: [art] Derive Key Pair - Done
29,395,084 UART: [art] Signing Cert with AUTHO
29,396,394 UART: RITY.KEYID = 7
31,683,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,685,497 UART: [art] PUB.X = CAC6CAFFD554FA2EB984DC650FA1B96E4FC3FB73C7D773B684CA0D0D2BD3F1D7BF3673DF90909F1BEAED6518548659D8
31,692,762 UART: [art] PUB.Y = 2F0C6B3ACAD6DC334258BBB688B75F478AC066633616AC5325DEC491D150D90692F4E3FD665E73B331CD8288A55F79F2
31,699,996 UART: [art] SIG.R = 49F6FD11E053B0C19080F53134DCE529E673FE10FC7C813B4B88D176C4317E9B2DD1EE67058F9C2E46D545D4A6F687A1
31,707,335 UART: [art] SIG.S = B41B3E502497BA856EE58440E94EFDC8F7CF0C027F471DA3D6A1F8EABDCB08E4F38A275F23532EA3C4EBB750A49667E8
33,012,678 UART: Caliptra RT
33,013,387 UART: [state] CFI Enabled
33,175,471 UART: [rt] RT listening for mailbox commands...
33,206,830 UART: [rt]cmd =0x54514754, len=24
33,209,470 >>> mbox cmd response data (8 bytes)
33,210,448 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,240,428 UART: [rt]cmd =0x44504543, len=36
33,277,221 >>> mbox cmd response data (24 bytes)
33,277,867 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,307,652 UART: [rt]cmd =0x47544744, len=8
33,309,545 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,240 UART:
192,605 UART: Running Caliptra ROM ...
193,723 UART:
603,327 UART: [state] CFI Enabled
617,772 UART: [state] LifecycleState = Unprovisioned
619,710 UART: [state] DebugLocked = No
620,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,891 UART: [kat] SHA2-256
795,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,172 UART: [kat] ++
806,612 UART: [kat] sha1
817,264 UART: [kat] SHA2-256
819,910 UART: [kat] SHA2-384
825,397 UART: [kat] SHA2-512-ACC
827,757 UART: [kat] ECC-384
3,112,434 UART: [kat] HMAC-384Kdf
3,124,208 UART: [kat] LMS
4,314,364 UART: [kat] --
4,318,116 UART: [cold-reset] ++
4,320,056 UART: [fht] Storing FHT @ 0x50003400
4,332,031 UART: [idev] ++
4,332,595 UART: [idev] CDI.KEYID = 6
4,333,622 UART: [idev] SUBJECT.KEYID = 7
4,334,787 UART: [idev] UDS.KEYID = 0
4,335,844 ready_for_fw is high
4,336,054 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,412 UART: [idev] Erasing UDS.KEYID = 0
7,622,994 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,773 UART: [idev] --
7,648,410 UART: [ldev] ++
7,648,970 UART: [ldev] CDI.KEYID = 6
7,649,905 UART: [ldev] SUBJECT.KEYID = 5
7,651,163 UART: [ldev] AUTHORITY.KEYID = 7
7,652,362 UART: [ldev] FE.KEYID = 1
7,665,526 UART: [ldev] Erasing FE.KEYID = 1
10,955,988 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,456 UART: [ldev] --
13,315,362 UART: [fwproc] Waiting for Commands...
13,318,697 UART: [fwproc] Received command 0x46574c44
13,320,874 UART: [fwproc] Received Image of size 114124 bytes
17,368,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,269 >>> mbox cmd response: success
17,832,814 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,835,618 UART: [afmc] ++
17,836,225 UART: [afmc] CDI.KEYID = 6
17,837,302 UART: [afmc] SUBJECT.KEYID = 7
17,838,402 UART: [afmc] AUTHORITY.KEYID = 5
21,152,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,120 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,505 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,362 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,777 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,121 UART: [afmc] --
23,515,806 UART: [cold-reset] --
23,520,533 UART: [state] Locking Datavault
23,525,672 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,418 UART: [state] Locking ICCM
23,529,401 UART: [exit] Launching FMC @ 0x40000130
23,537,792 UART:
23,538,046 UART: Running Caliptra FMC ...
23,539,151 UART:
23,539,309 UART: [state] CFI Enabled
23,547,298 UART: [fht] FMC Alias Private Key: 7
25,876,939 UART: [art] Extend RT PCRs Done
25,878,162 UART: [art] Lock RT PCRs Done
25,879,932 UART: [art] Populate DV Done
25,885,343 UART: [fht] FMC Alias Private Key: 7
25,886,985 UART: [art] Derive CDI
25,887,790 UART: [art] Store in in slot 0x4
25,930,415 UART: [art] Derive Key Pair
25,931,477 UART: [art] Store priv key in slot 0x5
29,173,741 UART: [art] Derive Key Pair - Done
29,186,691 UART: [art] Signing Cert with AUTHO
29,187,989 UART: RITY.KEYID = 7
31,467,039 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,567 UART: [art] PUB.X = B677009D2B8FBE3DD67410C071E30F80EB6B261EC0CB03359C697CA03DF76BB376EA22F48EF08025E405C118159F48D2
31,475,747 UART: [art] PUB.Y = AD9791D8AF859C69C445CF241F0CA2080ECEE0E6E1BC9AF8FC6CBB5B99F88ADEDDA8E291A8EF3DAF70CD66AE78D2BB78
31,483,075 UART: [art] SIG.R = 10B8C2B96CE0B1A3ADD6D167E88B069EC5F12DADCE979B9DA1D5889E946B30F799AB2028B575169EE386C0A004B9FB78
31,490,458 UART: [art] SIG.S = 39EE0FB3CB4EB0C0D6543353053AFEB5E884C769041E333CCF06A47099BB26ADA3B9C7A90585A3FE75689C4605981167
32,795,789 UART: Caliptra RT
32,796,502 UART: [state] CFI Enabled
32,913,621 UART: [rt] RT listening for mailbox commands...
32,945,187 UART: [rt]cmd =0x54514754, len=24
32,947,981 >>> mbox cmd response data (8 bytes)
32,948,712 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
32,978,728 UART: [rt]cmd =0x44504543, len=36
33,015,212 >>> mbox cmd response data (24 bytes)
33,015,849 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,045,690 UART: [rt]cmd =0x47544744, len=8
33,047,770 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
4,131,298 ready_for_fw is high
4,131,707 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,301 >>> mbox cmd response: success
18,073,940 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,718,770 UART:
23,719,161 UART: Running Caliptra FMC ...
23,720,306 UART:
23,720,455 UART: [state] CFI Enabled
23,728,408 UART: [fht] FMC Alias Private Key: 7
26,058,041 UART: [art] Extend RT PCRs Done
26,059,276 UART: [art] Lock RT PCRs Done
26,060,857 UART: [art] Populate DV Done
26,066,272 UART: [fht] FMC Alias Private Key: 7
26,067,929 UART: [art] Derive CDI
26,068,690 UART: [art] Store in in slot 0x4
26,111,509 UART: [art] Derive Key Pair
26,112,555 UART: [art] Store priv key in slot 0x5
29,354,623 UART: [art] Derive Key Pair - Done
29,367,403 UART: [art] Signing Cert with AUTHO
29,368,712 UART: RITY.KEYID = 7
31,647,847 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,369 UART: [art] PUB.X = 3CB41377AF89D60BB50B8317451DC7C047B82298D9F96D80E47D3A698B7E178B412DB5DF51FC01924DF88184195D9B4A
31,656,568 UART: [art] PUB.Y = CC8F3F7FC6640EDC857DD482E6C334A229EF352F62E06C503119E93CC887894777B2AB3B29AD9932954815658A955AF9
31,663,800 UART: [art] SIG.R = 900117788ABE35D0CDBEDDB4E81ECDCA5417719CAB29A1695F825567C2042EABE360B789E976769299C3CE4B790D9717
31,671,220 UART: [art] SIG.S = 68341187BDF48E1462B406ED882D810EE935BB8956D9C3AD6BBC3292353EB95A5DBCD9C90597EF13D5C6314BA501892D
32,976,542 UART: Caliptra RT
32,977,256 UART: [state] CFI Enabled
33,094,824 UART: [rt] RT listening for mailbox commands...
33,126,518 UART: [rt]cmd =0x54514754, len=24
33,129,315 >>> mbox cmd response data (8 bytes)
33,130,255 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,160,406 UART: [rt]cmd =0x44504543, len=36
33,198,295 >>> mbox cmd response data (24 bytes)
33,198,904 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,228,692 UART: [rt]cmd =0x47544744, len=8
33,230,669 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,169 UART:
192,531 UART: Running Caliptra ROM ...
193,746 UART:
193,907 UART: [state] CFI Enabled
263,369 UART: [state] LifecycleState = Unprovisioned
265,226 UART: [state] DebugLocked = No
267,330 UART: [state] WD Timer not started. Device not locked for debugging
270,514 UART: [kat] SHA2-256
449,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,195 UART: [kat] ++
461,725 UART: [kat] sha1
473,981 UART: [kat] SHA2-256
476,960 UART: [kat] SHA2-384
483,307 UART: [kat] SHA2-512-ACC
486,250 UART: [kat] ECC-384
2,945,357 UART: [kat] HMAC-384Kdf
2,969,772 UART: [kat] LMS
3,499,263 UART: [kat] --
3,502,921 UART: [cold-reset] ++
3,504,715 UART: [fht] FHT @ 0x50003400
3,515,356 UART: [idev] ++
3,515,960 UART: [idev] CDI.KEYID = 6
3,516,873 UART: [idev] SUBJECT.KEYID = 7
3,518,048 UART: [idev] UDS.KEYID = 0
3,518,977 ready_for_fw is high
3,519,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,954 UART: [idev] Erasing UDS.KEYID = 0
6,026,205 UART: [idev] Sha1 KeyId Algorithm
6,049,704 UART: [idev] --
6,053,700 UART: [ldev] ++
6,054,271 UART: [ldev] CDI.KEYID = 6
6,055,184 UART: [ldev] SUBJECT.KEYID = 5
6,056,367 UART: [ldev] AUTHORITY.KEYID = 7
6,057,605 UART: [ldev] FE.KEYID = 1
6,098,341 UART: [ldev] Erasing FE.KEYID = 1
8,600,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,313 UART: [ldev] --
10,411,062 UART: [fwproc] Wait for Commands...
10,414,017 UART: [fwproc] Recv command 0x46574c44
10,416,108 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,379 >>> mbox cmd response: success
14,281,920 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,284,769 UART: [afmc] ++
14,285,381 UART: [afmc] CDI.KEYID = 6
14,286,269 UART: [afmc] SUBJECT.KEYID = 7
14,287,371 UART: [afmc] AUTHORITY.KEYID = 5
16,822,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,822 UART: [afmc] --
18,623,846 UART: [cold-reset] --
18,628,745 UART: [state] Locking Datavault
18,634,411 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,120 UART: [state] Locking ICCM
18,637,891 UART: [exit] Launching FMC @ 0x40000130
18,646,289 UART:
18,646,529 UART: Running Caliptra FMC ...
18,647,630 UART:
18,647,790 UART: [state] CFI Enabled
18,707,312 UART: [fht] FMC Alias Private Key: 7
20,471,335 UART: [art] Extend RT PCRs Done
20,472,560 UART: [art] Lock RT PCRs Done
20,474,214 UART: [art] Populate DV Done
20,479,411 UART: [fht] FMC Alias Private Key: 7
20,480,891 UART: [art] Derive CDI
20,481,628 UART: [art] Store in in slot 0x4
20,539,879 UART: [art] Derive Key Pair
20,540,873 UART: [art] Store priv key in slot 0x5
23,003,618 UART: [art] Derive Key Pair - Done
23,016,562 UART: [art] Signing Cert with AUTHO
23,017,876 UART: RITY.KEYID = 7
24,729,810 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,306 UART: [art] PUB.X = 0D033EB2C36E3EA6929C90B3EDAB04C6EDDE1D11F06822A875ACEC937074A9A2B8B58A94DE082951C999F60401F27797
24,738,599 UART: [art] PUB.Y = CFC1370316E4C69D6D54D4210F06D14919768872B67924D3D03BB49F862E02DCBE256BBB47CF644804FDBEA7D497CD00
24,745,877 UART: [art] SIG.R = 6FC4F37CAFCB58F471D2B5AC274781716383F568D3C11F5DB1FC0A416E7D036A8259305C8580BE6D21C92314D66A4F19
24,753,205 UART: [art] SIG.S = 8417F7220C9B984CB82039686BA4D8F788B936D8EA8A0972AAD4BA1C80B5DF92C6A71B017768552D488A0ED6FB4C7185
25,732,551 UART: Caliptra RT
25,733,249 UART: [state] CFI Enabled
25,897,864 UART: [rt] RT listening for mailbox commands...
25,928,888 UART: [rt]cmd =0x54514754, len=24
25,931,509 >>> mbox cmd response data (8 bytes)
25,932,444 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,962,591 UART: [rt]cmd =0x44504543, len=36
25,999,811 >>> mbox cmd response data (24 bytes)
26,000,437 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,030,328 UART: [rt]cmd =0x47544744, len=8
26,032,293 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,359,957 ready_for_fw is high
3,360,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,179 >>> mbox cmd response: success
14,053,010 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,340,459 UART:
18,340,852 UART: Running Caliptra FMC ...
18,342,052 UART:
18,342,220 UART: [state] CFI Enabled
18,408,684 UART: [fht] FMC Alias Private Key: 7
20,172,734 UART: [art] Extend RT PCRs Done
20,173,950 UART: [art] Lock RT PCRs Done
20,175,472 UART: [art] Populate DV Done
20,180,996 UART: [fht] FMC Alias Private Key: 7
20,182,647 UART: [art] Derive CDI
20,183,460 UART: [art] Store in in slot 0x4
20,241,730 UART: [art] Derive Key Pair
20,242,769 UART: [art] Store priv key in slot 0x5
22,705,476 UART: [art] Derive Key Pair - Done
22,718,415 UART: [art] Signing Cert with AUTHO
22,719,715 UART: RITY.KEYID = 7
24,431,653 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,158 UART: [art] PUB.X = 865E65CDA2B4F18012A441F70CCCD15DBB9C35793FCFE8548AF65ED5B1E6660C25239D32BD961466C7CE839DA871B4E7
24,440,492 UART: [art] PUB.Y = A88143DEA687D21A78271ED244EA260781F9DC41474DBB1FD2231C8118B4ECFE2ECCD06B7B6D1BF1B9FAEC464F592EAC
24,447,721 UART: [art] SIG.R = 4B4CF1B4A0958F7969CAD12C10F7D0008378D78148D2825C3422504D79C57C5E02BC7F06A46DF8DF14485FBEDF264E60
24,455,125 UART: [art] SIG.S = 1B1916FE331B191434D19CD1BC808DC56AEAF544D6596ADA6A5E2CF61A47BD93615E8BEE7B137BB96AAD5942D9DFA43E
25,434,090 UART: Caliptra RT
25,434,812 UART: [state] CFI Enabled
25,599,437 UART: [rt] RT listening for mailbox commands...
25,630,963 UART: [rt]cmd =0x54514754, len=24
25,633,657 >>> mbox cmd response data (8 bytes)
25,634,507 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,664,659 UART: [rt]cmd =0x44504543, len=36
25,701,862 >>> mbox cmd response data (24 bytes)
25,702,468 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,732,005 UART: [rt]cmd =0x47544744, len=8
25,734,038 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,301 UART:
192,675 UART: Running Caliptra ROM ...
193,801 UART:
603,589 UART: [state] CFI Enabled
614,360 UART: [state] LifecycleState = Unprovisioned
616,235 UART: [state] DebugLocked = No
617,467 UART: [state] WD Timer not started. Device not locked for debugging
620,568 UART: [kat] SHA2-256
799,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,237 UART: [kat] ++
811,679 UART: [kat] sha1
823,893 UART: [kat] SHA2-256
826,897 UART: [kat] SHA2-384
832,525 UART: [kat] SHA2-512-ACC
835,450 UART: [kat] ECC-384
3,277,163 UART: [kat] HMAC-384Kdf
3,289,910 UART: [kat] LMS
3,819,351 UART: [kat] --
3,824,399 UART: [cold-reset] ++
3,826,672 UART: [fht] FHT @ 0x50003400
3,837,282 UART: [idev] ++
3,837,843 UART: [idev] CDI.KEYID = 6
3,838,869 UART: [idev] SUBJECT.KEYID = 7
3,840,031 UART: [idev] UDS.KEYID = 0
3,840,934 ready_for_fw is high
3,841,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,852 UART: [idev] Erasing UDS.KEYID = 0
6,313,023 UART: [idev] Sha1 KeyId Algorithm
6,336,360 UART: [idev] --
6,340,834 UART: [ldev] ++
6,341,392 UART: [ldev] CDI.KEYID = 6
6,342,323 UART: [ldev] SUBJECT.KEYID = 5
6,343,544 UART: [ldev] AUTHORITY.KEYID = 7
6,344,694 UART: [ldev] FE.KEYID = 1
6,354,261 UART: [ldev] Erasing FE.KEYID = 1
8,826,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,996 UART: [ldev] --
10,617,104 UART: [fwproc] Wait for Commands...
10,619,674 UART: [fwproc] Recv command 0x46574c44
10,621,757 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,841 >>> mbox cmd response: success
14,481,389 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,484,406 UART: [afmc] ++
14,484,979 UART: [afmc] CDI.KEYID = 6
14,485,911 UART: [afmc] SUBJECT.KEYID = 7
14,487,115 UART: [afmc] AUTHORITY.KEYID = 5
16,986,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,831 UART: [afmc] --
18,783,348 UART: [cold-reset] --
18,788,554 UART: [state] Locking Datavault
18,793,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,380 UART: [state] Locking ICCM
18,796,789 UART: [exit] Launching FMC @ 0x40000130
18,805,181 UART:
18,805,411 UART: Running Caliptra FMC ...
18,806,500 UART:
18,806,649 UART: [state] CFI Enabled
18,814,847 UART: [fht] FMC Alias Private Key: 7
20,571,496 UART: [art] Extend RT PCRs Done
20,572,720 UART: [art] Lock RT PCRs Done
20,574,579 UART: [art] Populate DV Done
20,580,035 UART: [fht] FMC Alias Private Key: 7
20,581,515 UART: [art] Derive CDI
20,582,241 UART: [art] Store in in slot 0x4
20,625,090 UART: [art] Derive Key Pair
20,626,129 UART: [art] Store priv key in slot 0x5
23,052,706 UART: [art] Derive Key Pair - Done
23,065,648 UART: [art] Signing Cert with AUTHO
23,066,969 UART: RITY.KEYID = 7
24,772,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,058 UART: [art] PUB.X = 9860355C2BC17BAF171A5F1690DB0386C56BABBB406375B23119D63D96409687E9AF4420B03F23B2740E0DB669B969CD
24,781,348 UART: [art] PUB.Y = 3733DA5C9A840A8C3CE645EAF236A9374ECA129AF42BAF01696E89D4C7D4028C252578546056CD3EAD36FAB602A1720B
24,788,577 UART: [art] SIG.R = 6ACC95EBCA832F401D1F9DDB562094D074298424C3B35E241F03021F830B8BCF743D13C6CD80A7BD59D373E0B5AD87E0
24,796,009 UART: [art] SIG.S = 8FA739E88B0570A7E537A187FD201C2A72F29C98D7E8FBBE82E852FE0DB3265BFE508095A3C1E9034BD0376237B99AF7
25,774,932 UART: Caliptra RT
25,775,642 UART: [state] CFI Enabled
25,892,883 UART: [rt] RT listening for mailbox commands...
25,924,570 UART: [rt]cmd =0x54514754, len=24
25,927,253 >>> mbox cmd response data (8 bytes)
25,928,213 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,958,577 UART: [rt]cmd =0x44504543, len=36
25,996,077 >>> mbox cmd response data (24 bytes)
25,996,690 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,026,243 UART: [rt]cmd =0x47544744, len=8
26,028,141 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,693,155 ready_for_fw is high
3,693,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,315 >>> mbox cmd response: success
14,276,026 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,524,973 UART:
18,525,357 UART: Running Caliptra FMC ...
18,526,698 UART:
18,526,857 UART: [state] CFI Enabled
18,534,696 UART: [fht] FMC Alias Private Key: 7
20,291,686 UART: [art] Extend RT PCRs Done
20,292,903 UART: [art] Lock RT PCRs Done
20,294,392 UART: [art] Populate DV Done
20,299,962 UART: [fht] FMC Alias Private Key: 7
20,301,604 UART: [art] Derive CDI
20,302,333 UART: [art] Store in in slot 0x4
20,345,132 UART: [art] Derive Key Pair
20,346,129 UART: [art] Store priv key in slot 0x5
22,773,147 UART: [art] Derive Key Pair - Done
22,785,983 UART: [art] Signing Cert with AUTHO
22,787,307 UART: RITY.KEYID = 7
24,492,497 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,996 UART: [art] PUB.X = 938927830FF702B078C418A43D5BF40258B2B47B75E0F7FDD663ED2178EC347F880A9CAC83AA5832267868CDC99B8617
24,501,245 UART: [art] PUB.Y = A0A3C5934E94225CCA16AEEC9DDE06B9EAF6E9B1CFF8ECD8A0756AE94DE986718B1E7ED3823E3CD7F30610F16256A6D8
24,508,551 UART: [art] SIG.R = 93EFC042CC17747B7623FB25E46840C8E3672A76CEFEBEED9B2CAB8338E8BF3FD7966EAAB71848C1702EBA1E75F0269D
24,515,935 UART: [art] SIG.S = 83E2E3122850E39F32268787C41216D85BCDEB4BB89F965442E0E8A7BD31846187189E59FE01918B740339BD1293A767
25,494,987 UART: Caliptra RT
25,495,705 UART: [state] CFI Enabled
25,612,391 UART: [rt] RT listening for mailbox commands...
25,643,928 UART: [rt]cmd =0x54514754, len=24
25,646,575 >>> mbox cmd response data (8 bytes)
25,647,463 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,677,608 UART: [rt]cmd =0x44504543, len=36
25,715,419 >>> mbox cmd response data (24 bytes)
25,716,035 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,745,884 UART: [rt]cmd =0x47544744, len=8
25,747,875 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,242 UART:
192,606 UART: Running Caliptra ROM ...
193,712 UART:
193,878 UART: [state] CFI Enabled
261,036 UART: [state] LifecycleState = Unprovisioned
263,448 UART: [state] DebugLocked = No
265,253 UART: [state] WD Timer not started. Device not locked for debugging
269,995 UART: [kat] SHA2-256
459,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,708 UART: [kat] ++
471,152 UART: [kat] sha1
483,513 UART: [kat] SHA2-256
486,513 UART: [kat] SHA2-384
491,791 UART: [kat] SHA2-512-ACC
494,366 UART: [kat] ECC-384
2,948,593 UART: [kat] HMAC-384Kdf
2,973,127 UART: [kat] LMS
3,504,895 UART: [kat] --
3,510,184 UART: [cold-reset] ++
3,511,924 UART: [fht] FHT @ 0x50003400
3,521,976 UART: [idev] ++
3,522,678 UART: [idev] CDI.KEYID = 6
3,523,603 UART: [idev] SUBJECT.KEYID = 7
3,524,778 UART: [idev] UDS.KEYID = 0
3,525,700 ready_for_fw is high
3,525,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,797 UART: [idev] Erasing UDS.KEYID = 0
6,028,384 UART: [idev] Sha1 KeyId Algorithm
6,052,543 UART: [idev] --
6,056,619 UART: [ldev] ++
6,057,308 UART: [ldev] CDI.KEYID = 6
6,058,234 UART: [ldev] SUBJECT.KEYID = 5
6,059,392 UART: [ldev] AUTHORITY.KEYID = 7
6,060,622 UART: [ldev] FE.KEYID = 1
6,100,211 UART: [ldev] Erasing FE.KEYID = 1
8,607,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,703 UART: [ldev] --
10,412,077 UART: [fwproc] Wait for Commands...
10,414,385 UART: [fwproc] Recv command 0x46574c44
10,416,689 UART: [fwproc] Recv'd Img size: 114448 bytes
13,858,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,597,110 >>> mbox cmd response: success
14,597,665 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,601,285 UART: [afmc] ++
14,602,012 UART: [afmc] CDI.KEYID = 6
14,603,278 UART: [afmc] SUBJECT.KEYID = 7
14,604,684 UART: [afmc] AUTHORITY.KEYID = 5
17,130,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,228 UART: [afmc] --
18,947,051 UART: [cold-reset] --
18,950,760 UART: [state] Locking Datavault
18,956,928 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,117 UART: [state] Locking ICCM
18,960,978 UART: [exit] Launching FMC @ 0x40000130
18,969,641 UART:
18,969,871 UART: Running Caliptra FMC ...
18,970,916 UART:
18,971,070 UART: [state] CFI Enabled
19,031,678 UART: [fht] FMC Alias Private Key: 7
20,795,281 UART: [art] Extend RT PCRs Done
20,796,501 UART: [art] Lock RT PCRs Done
20,798,421 UART: [art] Populate DV Done
20,803,772 UART: [fht] FMC Alias Private Key: 7
20,805,412 UART: [art] Derive CDI
20,806,144 UART: [art] Store in in slot 0x4
20,864,610 UART: [art] Derive Key Pair
20,865,644 UART: [art] Store priv key in slot 0x5
23,328,843 UART: [art] Derive Key Pair - Done
23,341,939 UART: [art] Signing Cert with AUTHO
23,343,233 UART: RITY.KEYID = 7
25,054,496 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,002 UART: [art] PUB.X = B91EF8BC9EE33077F0F2B09DBB1AAC6182C8A52B929D180028D60E15DB7100EE397A3C3CB968E723FC5F15053F88A61B
25,063,258 UART: [art] PUB.Y = CFA5C253E2976821FA0BEB70EC197F5975BADB608D0EA457C3E166679DB920BB16B7607D0ADEA38CAEBD835461CC9D15
25,070,538 UART: [art] SIG.R = ACBEDDE56DE9A73A1F7D9DD04898A56F343A54887AB601E89D4C894979B2851AC8D3F858039AD753B3EAF81D808EAE5B
25,077,922 UART: [art] SIG.S = DF48B4C2C93A24672D81D843B25FF98FA92482B8962C5E54CA09EECE51322AA65D2E95448B391EAC47B564D3D7780084
26,057,737 UART: Caliptra RT
26,058,422 UART: [state] CFI Enabled
26,222,977 UART: [rt] RT listening for mailbox commands...
26,254,468 UART: [rt]cmd =0x54514754, len=24
26,257,162 >>> mbox cmd response data (8 bytes)
26,258,140 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,288,136 UART: [rt]cmd =0x44504543, len=36
26,325,865 >>> mbox cmd response data (24 bytes)
26,326,463 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,356,023 UART: [rt]cmd =0x47544744, len=8
26,357,914 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,989 writing to cptra_bootfsm_go
3,438,720 ready_for_fw is high
3,439,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,746,671 >>> mbox cmd response: success
14,747,595 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,029,333 UART:
19,029,724 UART: Running Caliptra FMC ...
19,030,833 UART:
19,030,988 UART: [state] CFI Enabled
19,097,166 UART: [fht] FMC Alias Private Key: 7
20,861,746 UART: [art] Extend RT PCRs Done
20,862,969 UART: [art] Lock RT PCRs Done
20,864,526 UART: [art] Populate DV Done
20,869,669 UART: [fht] FMC Alias Private Key: 7
20,871,208 UART: [art] Derive CDI
20,871,945 UART: [art] Store in in slot 0x4
20,930,747 UART: [art] Derive Key Pair
20,931,780 UART: [art] Store priv key in slot 0x5
23,394,383 UART: [art] Derive Key Pair - Done
23,407,699 UART: [art] Signing Cert with AUTHO
23,409,021 UART: RITY.KEYID = 7
25,120,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,415 UART: [art] PUB.X = B8A5B37332B285F0CBF977DAB6E5186D8F45FC0FA50294AD15242B1CDF1E73CC8612BE8E3CE86DA4E169A16B916D365E
25,129,565 UART: [art] PUB.Y = 8C68B23AB89CA2EF061D7BC40B4DE06084C5AFA65B49559654DA9C03394C7615AF3C9A99F8BFA8B5F86738BE7D30A82C
25,136,807 UART: [art] SIG.R = 5034BBD7A123DB1D6C34F10414D723E93AE0D10CDF5116CFC4270C17E30E83518FAE00E11B4967C88EDF4C4CA0B3D270
25,144,195 UART: [art] SIG.S = 0494BF2EEF2D29EADD4D1D625C30F58C709C6A359D12D30B8904EF5BD338246BB06CA488750D58673D868E472FEB45E6
26,123,472 UART: Caliptra RT
26,124,176 UART: [state] CFI Enabled
26,289,026 UART: [rt] RT listening for mailbox commands...
26,320,606 UART: [rt]cmd =0x54514754, len=24
26,323,302 >>> mbox cmd response data (8 bytes)
26,324,243 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,354,110 UART: [rt]cmd =0x44504543, len=36
26,391,644 >>> mbox cmd response data (24 bytes)
26,392,263 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,421,948 UART: [rt]cmd =0x47544744, len=8
26,424,159 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,394 UART:
192,767 UART: Running Caliptra ROM ...
193,875 UART:
603,780 UART: [state] CFI Enabled
617,383 UART: [state] LifecycleState = Unprovisioned
619,784 UART: [state] DebugLocked = No
622,507 UART: [state] WD Timer not started. Device not locked for debugging
627,402 UART: [kat] SHA2-256
817,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,018 UART: [kat] ++
828,539 UART: [kat] sha1
840,394 UART: [kat] SHA2-256
843,387 UART: [kat] SHA2-384
849,790 UART: [kat] SHA2-512-ACC
852,367 UART: [kat] ECC-384
3,295,051 UART: [kat] HMAC-384Kdf
3,307,412 UART: [kat] LMS
3,839,213 UART: [kat] --
3,843,912 UART: [cold-reset] ++
3,845,973 UART: [fht] FHT @ 0x50003400
3,857,580 UART: [idev] ++
3,858,296 UART: [idev] CDI.KEYID = 6
3,859,320 UART: [idev] SUBJECT.KEYID = 7
3,860,415 UART: [idev] UDS.KEYID = 0
3,861,338 ready_for_fw is high
3,861,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,227 UART: [idev] Erasing UDS.KEYID = 0
6,336,984 UART: [idev] Sha1 KeyId Algorithm
6,358,925 UART: [idev] --
6,363,496 UART: [ldev] ++
6,364,167 UART: [ldev] CDI.KEYID = 6
6,365,122 UART: [ldev] SUBJECT.KEYID = 5
6,366,272 UART: [ldev] AUTHORITY.KEYID = 7
6,367,493 UART: [ldev] FE.KEYID = 1
6,378,670 UART: [ldev] Erasing FE.KEYID = 1
8,855,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,084 UART: [ldev] --
10,646,966 UART: [fwproc] Wait for Commands...
10,649,801 UART: [fwproc] Recv command 0x46574c44
10,652,096 UART: [fwproc] Recv'd Img size: 114448 bytes
14,103,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,836,255 >>> mbox cmd response: success
14,836,792 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,840,790 UART: [afmc] ++
14,841,480 UART: [afmc] CDI.KEYID = 6
14,842,639 UART: [afmc] SUBJECT.KEYID = 7
14,844,113 UART: [afmc] AUTHORITY.KEYID = 5
17,340,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,173 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,596 UART: [afmc] --
19,137,754 UART: [cold-reset] --
19,141,291 UART: [state] Locking Datavault
19,149,127 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,257 UART: [state] Locking ICCM
19,153,574 UART: [exit] Launching FMC @ 0x40000130
19,162,241 UART:
19,162,475 UART: Running Caliptra FMC ...
19,163,566 UART:
19,163,717 UART: [state] CFI Enabled
19,171,990 UART: [fht] FMC Alias Private Key: 7
20,929,118 UART: [art] Extend RT PCRs Done
20,930,334 UART: [art] Lock RT PCRs Done
20,931,791 UART: [art] Populate DV Done
20,937,410 UART: [fht] FMC Alias Private Key: 7
20,938,886 UART: [art] Derive CDI
20,939,640 UART: [art] Store in in slot 0x4
20,982,128 UART: [art] Derive Key Pair
20,983,165 UART: [art] Store priv key in slot 0x5
23,409,978 UART: [art] Derive Key Pair - Done
23,422,910 UART: [art] Signing Cert with AUTHO
23,424,253 UART: RITY.KEYID = 7
25,129,608 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,102 UART: [art] PUB.X = 1B6BFC01ED710AC5370F8A8E028282AEA5162BEE7D661D195E312D9EB8489FA26C5CC1626C5B1783DDC79BE759622961
25,138,336 UART: [art] PUB.Y = AF71B30A4D5A5097CEABC797A7CE7EE2FDA4D52E3FF77EEC1BF17D3B28EFA245A943E1A3DBC8FAF51FF027C925B6EEDE
25,145,659 UART: [art] SIG.R = A77B21DFE8341F27E4030F2EC99CD05AF81C56AE1BC87DA6A98DD77745234C07ACE7FC51DBC80196F5A45F8CEE32F3B6
25,153,103 UART: [art] SIG.S = C3CF3EE7289AC5C6F5D9C6364F341D0B3D5D6E9817CFB1010E31A9898BCCA6F2BAAB68CB69B3AAD3F678272E081E8886
26,131,966 UART: Caliptra RT
26,132,668 UART: [state] CFI Enabled
26,250,832 UART: [rt] RT listening for mailbox commands...
26,282,410 UART: [rt]cmd =0x54514754, len=24
26,284,939 >>> mbox cmd response data (8 bytes)
26,285,988 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,316,091 UART: [rt]cmd =0x44504543, len=36
26,353,704 >>> mbox cmd response data (24 bytes)
26,354,305 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,383,881 UART: [rt]cmd =0x47544744, len=8
26,385,910 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,751,442 ready_for_fw is high
3,752,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,478 >>> mbox cmd response: success
14,954,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,210,499 UART:
19,210,883 UART: Running Caliptra FMC ...
19,212,066 UART:
19,212,229 UART: [state] CFI Enabled
19,219,851 UART: [fht] FMC Alias Private Key: 7
20,977,201 UART: [art] Extend RT PCRs Done
20,978,419 UART: [art] Lock RT PCRs Done
20,980,097 UART: [art] Populate DV Done
20,985,399 UART: [fht] FMC Alias Private Key: 7
20,986,936 UART: [art] Derive CDI
20,987,713 UART: [art] Store in in slot 0x4
21,029,653 UART: [art] Derive Key Pair
21,030,644 UART: [art] Store priv key in slot 0x5
23,457,607 UART: [art] Derive Key Pair - Done
23,470,336 UART: [art] Signing Cert with AUTHO
23,471,631 UART: RITY.KEYID = 7
25,177,217 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,721 UART: [art] PUB.X = 65B9108DF949C0228E2DDA415B450B9296E5CFD93CE8F84C03F797BE33D18917D5F8053E5DE3AFA1AED4EEDB944BCF70
25,186,017 UART: [art] PUB.Y = 4E976BEA7F63984B5D8AC319CD5D9CA281529D06DED9C8DCE0187FD788911EF5BA5DDEDF6BF994E8AA26A8A37183594E
25,193,319 UART: [art] SIG.R = 8F9EC38E9C9DB230B1FB353278E41FDC90D6F7458049E0A94DB5C0B73937209ADCE63CE029A2301DDA596B7A2557AA16
25,200,704 UART: [art] SIG.S = 24F26823FBA57ED7B763146F85239C51FF28975C0CFE7A204360781A1D17D55715B4AAEEB06EF277990B561BE09251D7
26,179,511 UART: Caliptra RT
26,180,202 UART: [state] CFI Enabled
26,297,527 UART: [rt] RT listening for mailbox commands...
26,329,201 UART: [rt]cmd =0x54514754, len=24
26,332,074 >>> mbox cmd response data (8 bytes)
26,333,060 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,363,301 UART: [rt]cmd =0x44504543, len=36
26,400,191 >>> mbox cmd response data (24 bytes)
26,400,802 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,430,763 UART: [rt]cmd =0x47544744, len=8
26,432,692 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,671 UART: [kat] SHA2-256
881,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,717 UART: [kat] ++
885,869 UART: [kat] sha1
890,109 UART: [kat] SHA2-256
892,047 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,432 UART: [kat] LMS
1,475,628 UART: [kat] --
1,476,499 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,218 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,362 UART: [idev] --
1,514,339 UART: [ldev] ++
1,514,507 UART: [ldev] CDI.KEYID = 6
1,514,870 UART: [ldev] SUBJECT.KEYID = 5
1,515,296 UART: [ldev] AUTHORITY.KEYID = 7
1,515,759 UART: [ldev] FE.KEYID = 1
1,521,037 UART: [ldev] Erasing FE.KEYID = 1
1,546,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,090 UART: [ldev] --
1,585,371 UART: [fwproc] Waiting for Commands...
1,586,092 UART: [fwproc] Received command 0x46574c44
1,586,883 UART: [fwproc] Received Image of size 114448 bytes
2,886,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,145 >>> mbox cmd response: success
3,078,145 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,381 UART: [afmc] ++
3,079,549 UART: [afmc] CDI.KEYID = 6
3,079,911 UART: [afmc] SUBJECT.KEYID = 7
3,080,336 UART: [afmc] AUTHORITY.KEYID = 5
3,115,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,812 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,502 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,355 UART: [afmc] --
3,158,339 UART: [cold-reset] --
3,159,167 UART: [state] Locking Datavault
3,160,522 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,126 UART: [state] Locking ICCM
3,161,728 UART: [exit] Launching FMC @ 0x40000130
3,167,057 UART:
3,167,073 UART: Running Caliptra FMC ...
3,167,481 UART:
3,167,535 UART: [state] CFI Enabled
3,177,680 UART: [fht] FMC Alias Private Key: 7
3,285,091 UART: [art] Extend RT PCRs Done
3,285,519 UART: [art] Lock RT PCRs Done
3,286,869 UART: [art] Populate DV Done
3,294,954 UART: [fht] FMC Alias Private Key: 7
3,296,046 UART: [art] Derive CDI
3,296,326 UART: [art] Store in in slot 0x4
3,381,901 UART: [art] Derive Key Pair
3,382,261 UART: [art] Store priv key in slot 0x5
3,395,563 UART: [art] Derive Key Pair - Done
3,410,221 UART: [art] Signing Cert with AUTHO
3,410,701 UART: RITY.KEYID = 7
3,425,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,686 UART: [art] PUB.X = 0EDBE6D4C5A525FFF4B7D31FFEAA85759B169CFF752235CCEC61FFC3041625463939F04F726D07B1A5F808D41BCFED49
3,433,462 UART: [art] PUB.Y = 112630423A28D936C9D9B976A74BEFFCEF47909D9B842D7A3C6BA64A372A713ADC7C8FD328AEFCC16C4EAFD4B212EC41
3,440,432 UART: [art] SIG.R = 43E4B05C72236E9EE29958AAA4125DE91E9ED62B08E8AFB698EBC716D89B28D1109729F768F8A84EDC2047620AA8B337
3,447,202 UART: [art] SIG.S = 2201703728122EC342823D39CE26B5B241C2BD0E9F718273F44F915100BDC362E12953D124C8BBC22ED6071BA7B70308
3,471,238 UART: Caliptra RT
3,471,491 UART: [state] CFI Enabled
3,579,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,725 UART: [rt]cmd =0x54514754, len=24
3,611,641 >>> mbox cmd response data (8 bytes)
3,611,642 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,155 UART: [rt]cmd =0x44504543, len=36
3,678,731 >>> mbox cmd response data (24 bytes)
3,678,732 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,031 UART: [rt]cmd =0x47544744, len=8
3,709,611 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 ready_for_fw is high
1,362,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,989 >>> mbox cmd response: success
2,929,989 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,683 UART:
2,990,699 UART: Running Caliptra FMC ...
2,991,107 UART:
2,991,161 UART: [state] CFI Enabled
3,001,608 UART: [fht] FMC Alias Private Key: 7
3,108,999 UART: [art] Extend RT PCRs Done
3,109,427 UART: [art] Lock RT PCRs Done
3,111,015 UART: [art] Populate DV Done
3,119,216 UART: [fht] FMC Alias Private Key: 7
3,120,202 UART: [art] Derive CDI
3,120,482 UART: [art] Store in in slot 0x4
3,206,095 UART: [art] Derive Key Pair
3,206,455 UART: [art] Store priv key in slot 0x5
3,219,695 UART: [art] Derive Key Pair - Done
3,234,820 UART: [art] Signing Cert with AUTHO
3,235,300 UART: RITY.KEYID = 7
3,250,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,857 UART: [art] PUB.X = 7E5753EC47CF18B776C6867FCE8B88CE04977A91FCE8DA3E349459EF85B1F6678A04EC280B889EA76339EB860365D581
3,257,619 UART: [art] PUB.Y = B9FB46596CF2CCAE27E97F42ADB65EFB9844EA87ACC6FAF6F75440D12EE0F279F45364B631C452219E3360D0B92235B3
3,264,581 UART: [art] SIG.R = 9E0CCCE76F430D14FAF2874256B2259DED9C94B7FC06750DC06782F870DC18255A97C972B5A1A3CFA438636CF0D75E6F
3,271,349 UART: [art] SIG.S = 6363700A7AAC42C9109C3FF018305962C65245BBD4D6FECC6175716E5536B2C60E5C66ADB9E7E377A437BD34B3542985
3,295,390 UART: Caliptra RT
3,295,643 UART: [state] CFI Enabled
3,403,374 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,972 UART: [rt]cmd =0x54514754, len=24
3,436,226 >>> mbox cmd response data (8 bytes)
3,436,227 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,542 UART: [rt]cmd =0x44504543, len=36
3,504,038 >>> mbox cmd response data (24 bytes)
3,504,039 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,436 UART: [rt]cmd =0x47544744, len=8
3,535,126 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,327 UART: [kat] SHA2-512-ACC
897,228 UART: [kat] ECC-384
902,607 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,190 UART: [cold-reset] ++
1,476,538 UART: [fht] Storing FHT @ 0x50003400
1,479,349 UART: [idev] ++
1,479,517 UART: [idev] CDI.KEYID = 6
1,479,877 UART: [idev] SUBJECT.KEYID = 7
1,480,301 UART: [idev] UDS.KEYID = 0
1,480,646 ready_for_fw is high
1,480,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,381 UART: [idev] Erasing UDS.KEYID = 0
1,505,185 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,851 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,493 UART: [ldev] --
1,586,878 UART: [fwproc] Waiting for Commands...
1,587,623 UART: [fwproc] Received command 0x46574c44
1,588,414 UART: [fwproc] Received Image of size 114448 bytes
2,886,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,949 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,350 >>> mbox cmd response: success
3,079,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,396 UART: [afmc] ++
3,080,564 UART: [afmc] CDI.KEYID = 6
3,080,926 UART: [afmc] SUBJECT.KEYID = 7
3,081,351 UART: [afmc] AUTHORITY.KEYID = 5
3,116,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,644 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,037 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,727 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,606 UART: [afmc] --
3,159,664 UART: [cold-reset] --
3,160,694 UART: [state] Locking Datavault
3,161,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,423 UART: [state] Locking ICCM
3,162,907 UART: [exit] Launching FMC @ 0x40000130
3,168,236 UART:
3,168,252 UART: Running Caliptra FMC ...
3,168,660 UART:
3,168,803 UART: [state] CFI Enabled
3,178,990 UART: [fht] FMC Alias Private Key: 7
3,286,599 UART: [art] Extend RT PCRs Done
3,287,027 UART: [art] Lock RT PCRs Done
3,288,431 UART: [art] Populate DV Done
3,296,468 UART: [fht] FMC Alias Private Key: 7
3,297,600 UART: [art] Derive CDI
3,297,880 UART: [art] Store in in slot 0x4
3,383,815 UART: [art] Derive Key Pair
3,384,175 UART: [art] Store priv key in slot 0x5
3,397,457 UART: [art] Derive Key Pair - Done
3,412,285 UART: [art] Signing Cert with AUTHO
3,412,765 UART: RITY.KEYID = 7
3,427,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,568 UART: [art] PUB.X = CEB8483CBF0D5780ED4130E42B7A16B1757698D7B967F4A4A9AB3966E57380017D877BCB3ED7F0270B2761CCA479E04E
3,435,335 UART: [art] PUB.Y = CDFBFC189B048E240392CFF561BB2CFC814C31BDF72AA1A890B9DE4ABC2753027B62B9902F1337463C7EBD7AD8F1FD27
3,442,296 UART: [art] SIG.R = 33E4C052A1ABCCC1A5EB1705908D580016427A18CEB4CCD27E4517E9BB9265B2F20017140E884B9A66551928495A21E5
3,449,014 UART: [art] SIG.S = 84A73791EDC20EE684A89D8E7132BAC6B748D5BEA7446BEE64F81FB1AB918B32B5DDD16752FBD1919C5A92A0D5328FF7
3,472,238 UART: Caliptra RT
3,472,583 UART: [state] CFI Enabled
3,580,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,626 UART: [rt]cmd =0x54514754, len=24
3,613,898 >>> mbox cmd response data (8 bytes)
3,613,899 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,342 UART: [rt]cmd =0x44504543, len=36
3,681,132 >>> mbox cmd response data (24 bytes)
3,681,133 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,558 UART: [rt]cmd =0x47544744, len=8
3,712,088 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,630 >>> mbox cmd response: success
2,930,630 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,220 UART:
2,992,236 UART: Running Caliptra FMC ...
2,992,644 UART:
2,992,787 UART: [state] CFI Enabled
3,003,552 UART: [fht] FMC Alias Private Key: 7
3,111,803 UART: [art] Extend RT PCRs Done
3,112,231 UART: [art] Lock RT PCRs Done
3,113,819 UART: [art] Populate DV Done
3,121,878 UART: [fht] FMC Alias Private Key: 7
3,122,926 UART: [art] Derive CDI
3,123,206 UART: [art] Store in in slot 0x4
3,208,985 UART: [art] Derive Key Pair
3,209,345 UART: [art] Store priv key in slot 0x5
3,222,571 UART: [art] Derive Key Pair - Done
3,237,464 UART: [art] Signing Cert with AUTHO
3,237,944 UART: RITY.KEYID = 7
3,252,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,677 UART: [art] PUB.X = 229A685A8B3F5063B08022C66922B6B789F93B806A63C16BAFF05803933589BE63A106486C6CB52A382F39405774104E
3,260,429 UART: [art] PUB.Y = 5D18A358A1771A06789A1DED4713BDB92241EBE44C78A886C82F099EDB7B67FBCCD5B7E7BDEE81ED810B4C0CE420D6C7
3,267,387 UART: [art] SIG.R = 2D3902B869085589281A4B8EFA469973EB299FDA60ED8488EA87CCD151EAC06BF025C63E2F37905666559B37B4DE585B
3,274,153 UART: [art] SIG.S = C875DADAA7F5030A3A236E6BB671185C1B15C89EEBABE07CC34CC7597D40E4ECA6E0AF9AC85F7B3B05B34168EA86D0FA
3,298,179 UART: Caliptra RT
3,298,524 UART: [state] CFI Enabled
3,406,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,775 UART: [rt]cmd =0x54514754, len=24
3,438,929 >>> mbox cmd response data (8 bytes)
3,438,930 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,243 UART: [rt]cmd =0x44504543, len=36
3,506,803 >>> mbox cmd response data (24 bytes)
3,506,804 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,271 UART: [rt]cmd =0x47544744, len=8
3,537,711 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,616 UART: [kat] SHA2-512-ACC
908,517 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
922,806 UART: [kat] LMS
1,171,134 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,376 UART: [idev] ++
1,175,544 UART: [idev] CDI.KEYID = 6
1,175,904 UART: [idev] SUBJECT.KEYID = 7
1,176,328 UART: [idev] UDS.KEYID = 0
1,176,673 ready_for_fw is high
1,176,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,668 UART: [idev] Erasing UDS.KEYID = 0
1,201,563 UART: [idev] Sha1 KeyId Algorithm
1,209,953 UART: [idev] --
1,211,067 UART: [ldev] ++
1,211,235 UART: [ldev] CDI.KEYID = 6
1,211,598 UART: [ldev] SUBJECT.KEYID = 5
1,212,024 UART: [ldev] AUTHORITY.KEYID = 7
1,212,487 UART: [ldev] FE.KEYID = 1
1,217,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,911 UART: [ldev] --
1,283,328 UART: [fwproc] Wait for Commands...
1,284,078 UART: [fwproc] Recv command 0x46574c44
1,284,806 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,886 >>> mbox cmd response: success
2,775,886 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,056 UART: [afmc] ++
2,777,224 UART: [afmc] CDI.KEYID = 6
2,777,586 UART: [afmc] SUBJECT.KEYID = 7
2,778,011 UART: [afmc] AUTHORITY.KEYID = 5
2,813,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,597 UART: [afmc] --
2,857,695 UART: [cold-reset] --
2,858,659 UART: [state] Locking Datavault
2,859,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,452 UART: [state] Locking ICCM
2,860,890 UART: [exit] Launching FMC @ 0x40000130
2,866,219 UART:
2,866,235 UART: Running Caliptra FMC ...
2,866,643 UART:
2,866,697 UART: [state] CFI Enabled
2,877,104 UART: [fht] FMC Alias Private Key: 7
2,985,379 UART: [art] Extend RT PCRs Done
2,985,807 UART: [art] Lock RT PCRs Done
2,987,593 UART: [art] Populate DV Done
2,995,808 UART: [fht] FMC Alias Private Key: 7
2,996,830 UART: [art] Derive CDI
2,997,110 UART: [art] Store in in slot 0x4
3,082,733 UART: [art] Derive Key Pair
3,083,093 UART: [art] Store priv key in slot 0x5
3,096,089 UART: [art] Derive Key Pair - Done
3,110,938 UART: [art] Signing Cert with AUTHO
3,111,418 UART: RITY.KEYID = 7
3,126,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,363 UART: [art] PUB.X = 1E43BDF8F52AAE372D93D8576936EC60FF7669FBC8E2148F0F6C808EA3A414B0CC4CEC97EB4A4C68DBA6B8765CE00E4C
3,134,149 UART: [art] PUB.Y = 6EC32D0A9FA1B914AB07AF6850FF19EA974167BEE5C92D8EB79AD26BAF91F0F0705FDF5AC2B32E1E2129DFA774887175
3,141,111 UART: [art] SIG.R = 69DBF29CD272A8C81D1F08EDD9C978EA04A05D462B88E1D0FEEBB98A9223E732047F118B1EFFFABFE8F0F768107B4F5D
3,147,894 UART: [art] SIG.S = 976CB34893BCA68665C6F5634AE32E75830ADF1354320105BAD8BC206EA001CE22135B47A7C37A89A6D57E764D8BFACC
3,172,221 UART: Caliptra RT
3,172,474 UART: [state] CFI Enabled
3,280,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,135 UART: [rt]cmd =0x54514754, len=24
3,313,503 >>> mbox cmd response data (8 bytes)
3,313,504 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,027 UART: [rt]cmd =0x44504543, len=36
3,380,257 >>> mbox cmd response data (24 bytes)
3,380,258 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,759 UART: [rt]cmd =0x47544744, len=8
3,410,971 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,825 ready_for_fw is high
1,060,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,331 >>> mbox cmd response: success
2,628,331 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,913 UART:
2,690,929 UART: Running Caliptra FMC ...
2,691,337 UART:
2,691,391 UART: [state] CFI Enabled
2,701,802 UART: [fht] FMC Alias Private Key: 7
2,809,455 UART: [art] Extend RT PCRs Done
2,809,883 UART: [art] Lock RT PCRs Done
2,811,361 UART: [art] Populate DV Done
2,819,602 UART: [fht] FMC Alias Private Key: 7
2,820,766 UART: [art] Derive CDI
2,821,046 UART: [art] Store in in slot 0x4
2,906,757 UART: [art] Derive Key Pair
2,907,117 UART: [art] Store priv key in slot 0x5
2,920,383 UART: [art] Derive Key Pair - Done
2,935,499 UART: [art] Signing Cert with AUTHO
2,935,979 UART: RITY.KEYID = 7
2,951,379 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,144 UART: [art] PUB.X = 38BDC4ECDC4E7939C1ED05410CADDF564A9683AC65F376FD78F1D6CDD0B59D166935D4029A7E6F14D5541E3B4A6742B2
2,958,919 UART: [art] PUB.Y = 6550ECBF4F86F07210FA7A56BBD98F9B012C89CB632ABAA8A0EA71014A9558FA644104ED08033CCC45EE25D272096248
2,965,859 UART: [art] SIG.R = 4CDA1A622F67249F5ECB36DB442BED1E31E8C7D38906E0A7ACFD1AAB0B031BB2F04451B645E04D0597E86C22D98186F8
2,972,631 UART: [art] SIG.S = DE6EEEA5DBCF6AF77B038E0D272AFA66C6B3B3736D2A001749546FC8E4F76D2D43F6E297E47A436F7E69B8A1646BC7AD
2,996,804 UART: Caliptra RT
2,997,057 UART: [state] CFI Enabled
3,104,800 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,556 UART: [rt]cmd =0x54514754, len=24
3,137,900 >>> mbox cmd response data (8 bytes)
3,137,901 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,556 UART: [rt]cmd =0x44504543, len=36
3,204,738 >>> mbox cmd response data (24 bytes)
3,204,739 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,118 UART: [rt]cmd =0x47544744, len=8
3,235,670 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
907,053 UART: [kat] SHA2-512-ACC
908,954 UART: [kat] ECC-384
918,953 UART: [kat] HMAC-384Kdf
923,539 UART: [kat] LMS
1,171,867 UART: [kat] --
1,173,184 UART: [cold-reset] ++
1,173,538 UART: [fht] FHT @ 0x50003400
1,176,381 UART: [idev] ++
1,176,549 UART: [idev] CDI.KEYID = 6
1,176,909 UART: [idev] SUBJECT.KEYID = 7
1,177,333 UART: [idev] UDS.KEYID = 0
1,177,678 ready_for_fw is high
1,177,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,659 UART: [idev] Erasing UDS.KEYID = 0
1,202,704 UART: [idev] Sha1 KeyId Algorithm
1,211,204 UART: [idev] --
1,212,376 UART: [ldev] ++
1,212,544 UART: [ldev] CDI.KEYID = 6
1,212,907 UART: [ldev] SUBJECT.KEYID = 5
1,213,333 UART: [ldev] AUTHORITY.KEYID = 7
1,213,796 UART: [ldev] FE.KEYID = 1
1,219,008 UART: [ldev] Erasing FE.KEYID = 1
1,245,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,458 UART: [ldev] --
1,284,751 UART: [fwproc] Wait for Commands...
1,285,551 UART: [fwproc] Recv command 0x46574c44
1,286,279 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,829 >>> mbox cmd response: success
2,777,829 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,778,919 UART: [afmc] ++
2,779,087 UART: [afmc] CDI.KEYID = 6
2,779,449 UART: [afmc] SUBJECT.KEYID = 7
2,779,874 UART: [afmc] AUTHORITY.KEYID = 5
2,815,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,496 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,224 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,109 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,828 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,586 UART: [afmc] --
2,859,566 UART: [cold-reset] --
2,860,462 UART: [state] Locking Datavault
2,861,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,471 UART: [state] Locking ICCM
2,862,937 UART: [exit] Launching FMC @ 0x40000130
2,868,266 UART:
2,868,282 UART: Running Caliptra FMC ...
2,868,690 UART:
2,868,833 UART: [state] CFI Enabled
2,879,330 UART: [fht] FMC Alias Private Key: 7
2,987,249 UART: [art] Extend RT PCRs Done
2,987,677 UART: [art] Lock RT PCRs Done
2,989,133 UART: [art] Populate DV Done
2,997,260 UART: [fht] FMC Alias Private Key: 7
2,998,366 UART: [art] Derive CDI
2,998,646 UART: [art] Store in in slot 0x4
3,084,307 UART: [art] Derive Key Pair
3,084,667 UART: [art] Store priv key in slot 0x5
3,097,459 UART: [art] Derive Key Pair - Done
3,112,154 UART: [art] Signing Cert with AUTHO
3,112,634 UART: RITY.KEYID = 7
3,127,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,507 UART: [art] PUB.X = 576D4EF4FF845E599DCF81BB775A95220F749D231B251131C280F6AFFF763164421FDAF2337047B636AD2FBF6AB7B881
3,135,280 UART: [art] PUB.Y = C1DD6F211BF56129AB335DB6DF48E53FC491E02CDCF84E46EDCE3942960519368AEE1BE1F4E25AA40D482C0681A81F98
3,142,235 UART: [art] SIG.R = C75F5B7259077A4269E0AD9554992EDD446DBB4B5E9CBB3209B76920076B4689EEA1E4DD11D3D415B8FD3299504A2D4B
3,149,002 UART: [art] SIG.S = D3E1C47C68BA6EB3EFA67C356CEE2461696862189972626901BBD41D2823785D370B7F86042C857430EAD3476FC8A355
3,172,636 UART: Caliptra RT
3,172,981 UART: [state] CFI Enabled
3,280,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,041 UART: [rt]cmd =0x54514754, len=24
3,313,295 >>> mbox cmd response data (8 bytes)
3,313,296 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,923 UART: [rt]cmd =0x44504543, len=36
3,380,285 >>> mbox cmd response data (24 bytes)
3,380,286 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,769 UART: [rt]cmd =0x47544744, len=8
3,411,461 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,356 ready_for_fw is high
1,060,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,764 >>> mbox cmd response: success
2,628,764 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,606 UART:
2,691,622 UART: Running Caliptra FMC ...
2,692,030 UART:
2,692,173 UART: [state] CFI Enabled
2,702,586 UART: [fht] FMC Alias Private Key: 7
2,810,383 UART: [art] Extend RT PCRs Done
2,810,811 UART: [art] Lock RT PCRs Done
2,812,499 UART: [art] Populate DV Done
2,820,814 UART: [fht] FMC Alias Private Key: 7
2,821,890 UART: [art] Derive CDI
2,822,170 UART: [art] Store in in slot 0x4
2,907,563 UART: [art] Derive Key Pair
2,907,923 UART: [art] Store priv key in slot 0x5
2,921,293 UART: [art] Derive Key Pair - Done
2,935,888 UART: [art] Signing Cert with AUTHO
2,936,368 UART: RITY.KEYID = 7
2,951,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,097 UART: [art] PUB.X = 8BAE6BCB4EA9790310F8D593098E92EDEC5A044E985693317AD28FE253E2FB0C6FDBB793CB34EC7F0188FE01F52EC2C2
2,958,867 UART: [art] PUB.Y = 4F18029A9E28873725DC311BDD3D08BD4100FC630A1B09842EE0ED3A3B28E6DF3D87710BF85C5CFD5174914BAD759105
2,965,783 UART: [art] SIG.R = EC30FE4607865D20E74DA38ADCE4AF8D6F6E6FA27EBF742C625D249ECC1D2480C6E09470E1C15EC0625E49D8C742BE41
2,972,566 UART: [art] SIG.S = 83F5E9D25633A2B0281C85C61902AC77CE2712F08FD97F515B4B2FFAB53BCC9842B9FD0934EE4D40CBAC7E8DF748F981
2,996,603 UART: Caliptra RT
2,996,948 UART: [state] CFI Enabled
3,105,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,344 UART: [rt]cmd =0x54514754, len=24
3,138,568 >>> mbox cmd response data (8 bytes)
3,138,569 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,288 UART: [rt]cmd =0x44504543, len=36
3,205,634 >>> mbox cmd response data (24 bytes)
3,205,635 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,090 UART: [rt]cmd =0x47544744, len=8
3,236,710 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,174,047 ready_for_fw is high
1,174,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,006 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x46574c44
1,281,862 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,234 >>> mbox cmd response: success
2,772,234 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,297 UART: [afmc] ++
2,773,465 UART: [afmc] CDI.KEYID = 6
2,773,828 UART: [afmc] SUBJECT.KEYID = 7
2,774,254 UART: [afmc] AUTHORITY.KEYID = 5
2,809,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,434 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,153 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,104 UART: [afmc] --
2,853,002 UART: [cold-reset] --
2,853,740 UART: [state] Locking Datavault
2,854,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,583 UART: [state] Locking ICCM
2,856,173 UART: [exit] Launching FMC @ 0x40000130
2,861,502 UART:
2,861,518 UART: Running Caliptra FMC ...
2,861,926 UART:
2,861,980 UART: [state] CFI Enabled
2,872,607 UART: [fht] FMC Alias Private Key: 7
2,980,638 UART: [art] Extend RT PCRs Done
2,981,066 UART: [art] Lock RT PCRs Done
2,982,414 UART: [art] Populate DV Done
2,990,569 UART: [fht] FMC Alias Private Key: 7
2,991,669 UART: [art] Derive CDI
2,991,949 UART: [art] Store in in slot 0x4
3,077,660 UART: [art] Derive Key Pair
3,078,020 UART: [art] Store priv key in slot 0x5
3,091,312 UART: [art] Derive Key Pair - Done
3,106,061 UART: [art] Signing Cert with AUTHO
3,106,541 UART: RITY.KEYID = 7
3,121,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,512 UART: [art] PUB.X = 63B8F1DE016D2A149185844F3B82CB9D4C1EFA875CD97E836C1C2E1C44DD76DD5EE020CF3524FB07C7B2180D785595F3
3,129,283 UART: [art] PUB.Y = C877A8FDA76F2E7AEC695C77A026D815D706CD1F35F76A60B3CA932260B1389AA860757FC310EB77DF23DE231FA1826C
3,136,240 UART: [art] SIG.R = EB5F8DB65CEA7E10AFE133D5078818283FAC2BB30BA33F90200829845E3D9A906B52BB54A5F77AB0C2EEA25FDF6BE7E5
3,143,021 UART: [art] SIG.S = 2EB88802FAA6F89F7BFD2059D8037AD63024AADB7D94342392261178806BDAA32F4C15EE22C01C07780B6676A575EEE7
3,166,554 UART: Caliptra RT
3,166,807 UART: [state] CFI Enabled
3,273,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,310 UART: [rt]cmd =0x54514754, len=24
3,306,484 >>> mbox cmd response data (8 bytes)
3,306,485 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,894 UART: [rt]cmd =0x44504543, len=36
3,373,482 >>> mbox cmd response data (24 bytes)
3,373,483 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,036 UART: [rt]cmd =0x47544744, len=8
3,404,486 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,164 ready_for_fw is high
1,056,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,536 >>> mbox cmd response: success
2,623,536 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,214 UART:
2,685,230 UART: Running Caliptra FMC ...
2,685,638 UART:
2,685,692 UART: [state] CFI Enabled
2,695,717 UART: [fht] FMC Alias Private Key: 7
2,803,328 UART: [art] Extend RT PCRs Done
2,803,756 UART: [art] Lock RT PCRs Done
2,805,066 UART: [art] Populate DV Done
2,813,227 UART: [fht] FMC Alias Private Key: 7
2,814,225 UART: [art] Derive CDI
2,814,505 UART: [art] Store in in slot 0x4
2,900,166 UART: [art] Derive Key Pair
2,900,526 UART: [art] Store priv key in slot 0x5
2,913,868 UART: [art] Derive Key Pair - Done
2,928,608 UART: [art] Signing Cert with AUTHO
2,929,088 UART: RITY.KEYID = 7
2,944,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,795 UART: [art] PUB.X = 4C8503D8BC40A28D828FBAD6ECE44993A26D860A245A3F5CA91C92315C37C835BDA5023D58477A434DA08E4AA0D5FBDA
2,951,570 UART: [art] PUB.Y = E37BA56231E4C304B2CC318C3263E69A81F348C0680903AC452ECEC1D54ADE82305950C43D09C74B4FF2CDE9BC34AB02
2,958,515 UART: [art] SIG.R = 9D76F7675D5C673A728DC745EA736B3BC294C9B7FE0C1ECFF5DD856A2BE0D8DD5C3F7944DA298FF2CBF6C265D6402733
2,965,300 UART: [art] SIG.S = C53AE1DF0D6FC70647C259A2B1C18786A30E05ED842A0DC8AEB4D5D580EFDA5DF5AB2D0DE154BA24F137B3E42E31DA54
2,988,829 UART: Caliptra RT
2,989,082 UART: [state] CFI Enabled
3,096,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,124 UART: [rt]cmd =0x54514754, len=24
3,129,276 >>> mbox cmd response data (8 bytes)
3,129,277 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,906 UART: [rt]cmd =0x44504543, len=36
3,196,512 >>> mbox cmd response data (24 bytes)
3,196,513 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,858 UART: [rt]cmd =0x47544744, len=8
3,227,434 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,319 UART: [ldev] --
1,280,619 UART: [fwproc] Wait for Commands...
1,281,300 UART: [fwproc] Recv command 0x46574c44
1,282,033 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,917 >>> mbox cmd response: success
2,773,917 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,036 UART: [afmc] ++
2,775,204 UART: [afmc] CDI.KEYID = 6
2,775,567 UART: [afmc] SUBJECT.KEYID = 7
2,775,993 UART: [afmc] AUTHORITY.KEYID = 5
2,811,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,055 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,623 UART: [afmc] --
2,855,521 UART: [cold-reset] --
2,856,381 UART: [state] Locking Datavault
2,857,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,844 UART: [state] Locking ICCM
2,858,294 UART: [exit] Launching FMC @ 0x40000130
2,863,623 UART:
2,863,639 UART: Running Caliptra FMC ...
2,864,047 UART:
2,864,190 UART: [state] CFI Enabled
2,874,655 UART: [fht] FMC Alias Private Key: 7
2,982,540 UART: [art] Extend RT PCRs Done
2,982,968 UART: [art] Lock RT PCRs Done
2,984,606 UART: [art] Populate DV Done
2,992,761 UART: [fht] FMC Alias Private Key: 7
2,993,755 UART: [art] Derive CDI
2,994,035 UART: [art] Store in in slot 0x4
3,079,842 UART: [art] Derive Key Pair
3,080,202 UART: [art] Store priv key in slot 0x5
3,093,746 UART: [art] Derive Key Pair - Done
3,108,604 UART: [art] Signing Cert with AUTHO
3,109,084 UART: RITY.KEYID = 7
3,124,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,069 UART: [art] PUB.X = 2238188C530BB63E2AC2D4B4E8D8B2EF37B8309E17C9948F52CA1E914766D2E33296DCD14760D34AB1809CD5229D3F99
3,131,838 UART: [art] PUB.Y = 5A6E808845B350480015568A1ABEA08DECE2BE81A578A392CB1BFB4607493E797E9CB89F711C72541FA344F1F550671C
3,138,765 UART: [art] SIG.R = 20B5BA5C90AED080CD83E8251797B54665D1691D4B44D37F11B0CE44A4BD3F3CABE166C81DB4A095710E1FDEBC3BCCC0
3,145,552 UART: [art] SIG.S = F411413A004E30102979DAD7BBEA25E309FB50810A2DF9A4F6DD46D8C442A2A33BB5E96FC878692F0BA941E1B3D49A28
3,169,718 UART: Caliptra RT
3,170,063 UART: [state] CFI Enabled
3,277,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,416 UART: [rt]cmd =0x54514754, len=24
3,310,576 >>> mbox cmd response data (8 bytes)
3,310,577 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,194 UART: [rt]cmd =0x44504543, len=36
3,378,046 >>> mbox cmd response data (24 bytes)
3,378,047 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,586 UART: [rt]cmd =0x47544744, len=8
3,409,232 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,769 ready_for_fw is high
1,056,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,459 >>> mbox cmd response: success
2,625,459 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,189 UART:
2,687,205 UART: Running Caliptra FMC ...
2,687,613 UART:
2,687,756 UART: [state] CFI Enabled
2,698,411 UART: [fht] FMC Alias Private Key: 7
2,806,724 UART: [art] Extend RT PCRs Done
2,807,152 UART: [art] Lock RT PCRs Done
2,808,948 UART: [art] Populate DV Done
2,817,229 UART: [fht] FMC Alias Private Key: 7
2,818,267 UART: [art] Derive CDI
2,818,547 UART: [art] Store in in slot 0x4
2,904,666 UART: [art] Derive Key Pair
2,905,026 UART: [art] Store priv key in slot 0x5
2,918,352 UART: [art] Derive Key Pair - Done
2,933,203 UART: [art] Signing Cert with AUTHO
2,933,683 UART: RITY.KEYID = 7
2,948,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,694 UART: [art] PUB.X = 6F69626CDEB17CC29A3A14AA6E7317481350DB43C41EFCE3877FDE5E6F23390B8DD4C40ACA592E97BCCA913FAAD03A69
2,956,478 UART: [art] PUB.Y = 49BFC1E2AAD5DCEBB807A6266336C009CD0C5D1EE58150D2A3F780E33FD6A4DD5E29E918F9B7AE5E82416742ABE405D2
2,963,434 UART: [art] SIG.R = 9E783550BC139BEB6CAA76781D3C7E203A42A8248030838DA2B1CAC0430DCFFFEF55D0B53CED7432561345D29B1F2155
2,970,209 UART: [art] SIG.S = 4BEBFFCBB404905101DE118D83856436A69790306A7DB2C9F49CF94A36E10ED5910872363DA5D60198A0F1466C8305BA
2,994,414 UART: Caliptra RT
2,994,759 UART: [state] CFI Enabled
3,102,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,582 UART: [rt]cmd =0x54514754, len=24
3,135,920 >>> mbox cmd response data (8 bytes)
3,135,921 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,592 UART: [rt]cmd =0x44504543, len=36
3,203,188 >>> mbox cmd response data (24 bytes)
3,203,189 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,876 UART: [rt]cmd =0x47544744, len=8
3,234,748 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,137 UART:
192,501 UART: Running Caliptra ROM ...
193,653 UART:
193,805 UART: [state] CFI Enabled
263,990 UART: [state] LifecycleState = Unprovisioned
265,910 UART: [state] DebugLocked = No
268,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,240 UART: [kat] SHA2-256
442,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,424 UART: [kat] ++
453,880 UART: [kat] sha1
464,638 UART: [kat] SHA2-256
467,365 UART: [kat] SHA2-384
472,574 UART: [kat] SHA2-512-ACC
474,940 UART: [kat] ECC-384
2,769,502 UART: [kat] HMAC-384Kdf
2,801,283 UART: [kat] LMS
3,991,649 UART: [kat] --
3,996,951 UART: [cold-reset] ++
3,998,601 UART: [fht] Storing FHT @ 0x50003400
4,010,652 UART: [idev] ++
4,011,224 UART: [idev] CDI.KEYID = 6
4,012,370 UART: [idev] SUBJECT.KEYID = 7
4,013,478 UART: [idev] UDS.KEYID = 0
4,014,465 ready_for_fw is high
4,014,669 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,222 UART: [idev] Erasing UDS.KEYID = 0
7,346,885 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,027 UART: [idev] --
7,371,763 UART: [ldev] ++
7,372,337 UART: [ldev] CDI.KEYID = 6
7,373,354 UART: [ldev] SUBJECT.KEYID = 5
7,374,522 UART: [ldev] AUTHORITY.KEYID = 7
7,375,807 UART: [ldev] FE.KEYID = 1
7,423,496 UART: [ldev] Erasing FE.KEYID = 1
10,756,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,355 UART: [ldev] --
13,136,133 UART: [fwproc] Waiting for Commands...
13,137,795 UART: [fwproc] Received command 0x46574c44
13,139,972 UART: [fwproc] Received Image of size 114124 bytes
17,194,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,030 >>> mbox cmd response: success
17,659,587 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,662,796 UART: [afmc] ++
17,663,458 UART: [afmc] CDI.KEYID = 6
17,664,373 UART: [afmc] SUBJECT.KEYID = 7
17,665,589 UART: [afmc] AUTHORITY.KEYID = 5
21,021,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,318,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,320,367 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,334,779 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,349,590 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,364,023 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,386,007 UART: [afmc] --
23,389,011 UART: [cold-reset] --
23,392,010 UART: [state] Locking Datavault
23,397,425 UART: [state] Locking PCR0, PCR1 and PCR31
23,399,187 UART: [state] Locking ICCM
23,400,906 UART: [exit] Launching FMC @ 0x40000130
23,409,299 UART:
23,409,555 UART: Running Caliptra FMC ...
23,410,658 UART:
23,410,822 UART: [state] CFI Enabled
23,479,805 UART: [fht] FMC Alias Private Key: 7
25,818,112 UART: [art] Extend RT PCRs Done
25,819,338 UART: [art] Lock RT PCRs Done
25,821,023 UART: [art] Populate DV Done
25,826,386 UART: [fht] FMC Alias Private Key: 7
25,828,033 UART: [art] Derive CDI
25,828,849 UART: [art] Store in in slot 0x4
25,888,673 UART: [art] Derive Key Pair
25,889,668 UART: [art] Store priv key in slot 0x5
29,173,679 UART: [art] Derive Key Pair - Done
29,186,567 UART: [art] Signing Cert with AUTHO
29,187,877 UART: RITY.KEYID = 7
31,474,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,303 UART: [art] PUB.X = 498E5CD525EC2CE49C0FC9BC941C59EE2BC03D606624CC841A84FF4D975D9AF988875890FEE1F4A47564301727F6F205
31,483,513 UART: [art] PUB.Y = 6E7275307F346B4208E7C19D2A95E3496E38843664D51A261B5C95CFA2F0129085FDD2057C537A314D5217C7669F7EB3
31,490,762 UART: [art] SIG.R = EC01961ED580C2A195905F81FD0431A7F9EA95E288A3A32E97BF285AF12E7B1D6AEB05E1865FB1D151ED53A66AF41368
31,498,169 UART: [art] SIG.S = CA7B895A2DE6EF1DB599E2086450B00BC939D116805F24D8459878540F5C283C9867F1F67FCFCD7760222F4EF87DD678
32,803,726 UART: Caliptra RT
32,804,448 UART: [state] CFI Enabled
32,985,671 UART: [rt] RT listening for mailbox commands...
33,017,242 UART: [rt]cmd =0x54514754, len=24
33,019,521 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,788,340 ready_for_fw is high
3,788,725 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,000 >>> mbox cmd response: success
17,867,806 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,569,573 UART:
23,569,975 UART: Running Caliptra FMC ...
23,571,490 UART:
23,571,666 UART: [state] CFI Enabled
23,637,724 UART: [fht] FMC Alias Private Key: 7
25,974,902 UART: [art] Extend RT PCRs Done
25,976,129 UART: [art] Lock RT PCRs Done
25,977,758 UART: [art] Populate DV Done
25,983,334 UART: [fht] FMC Alias Private Key: 7
25,984,882 UART: [art] Derive CDI
25,985,697 UART: [art] Store in in slot 0x4
26,045,305 UART: [art] Derive Key Pair
26,046,308 UART: [art] Store priv key in slot 0x5
29,339,708 UART: [art] Derive Key Pair - Done
29,352,761 UART: [art] Signing Cert with AUTHO
29,354,060 UART: RITY.KEYID = 7
31,641,268 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,790 UART: [art] PUB.X = A1E8EF5AF0DF2A0F1E490588A8081C96C355956D43A9306B18F1F448712EB591EF84C602AF4B77868638E57F828D5E8D
31,649,985 UART: [art] PUB.Y = A6DD48D5237CA916D92C2CCE495375A24B46B45A82F4D8A1A1D37FFA3B2155FC852BEA855A10F3E971C1B6FC8FDA324C
31,657,254 UART: [art] SIG.R = ED65F34E3CB22AA52DF94518E30834B3AB6C37DC38BE925C529DFFF0FB5482F87638752B5CD78CA7D917442EB79C90C8
31,664,662 UART: [art] SIG.S = D9D175E8DDB816605C1E8A601815928FF4FC184CF34543733F521DAEF2B789B7B3C0738A757679BEC71601E9F27B2958
32,970,202 UART: Caliptra RT
32,970,905 UART: [state] CFI Enabled
33,131,715 UART: [rt] RT listening for mailbox commands...
33,163,307 UART: [rt]cmd =0x54514754, len=24
33,165,715 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,289 UART:
192,652 UART: Running Caliptra ROM ...
193,828 UART:
603,578 UART: [state] CFI Enabled
617,547 UART: [state] LifecycleState = Unprovisioned
619,420 UART: [state] DebugLocked = No
621,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,665 UART: [kat] SHA2-256
796,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,983 UART: [kat] ++
807,516 UART: [kat] sha1
818,183 UART: [kat] SHA2-256
820,833 UART: [kat] SHA2-384
826,883 UART: [kat] SHA2-512-ACC
829,245 UART: [kat] ECC-384
3,112,510 UART: [kat] HMAC-384Kdf
3,124,339 UART: [kat] LMS
4,314,485 UART: [kat] --
4,318,843 UART: [cold-reset] ++
4,321,084 UART: [fht] Storing FHT @ 0x50003400
4,333,136 UART: [idev] ++
4,333,701 UART: [idev] CDI.KEYID = 6
4,334,724 UART: [idev] SUBJECT.KEYID = 7
4,335,888 UART: [idev] UDS.KEYID = 0
4,336,916 ready_for_fw is high
4,337,114 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,792 UART: [idev] Erasing UDS.KEYID = 0
7,625,118 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,677 UART: [idev] --
7,650,691 UART: [ldev] ++
7,651,250 UART: [ldev] CDI.KEYID = 6
7,652,186 UART: [ldev] SUBJECT.KEYID = 5
7,653,462 UART: [ldev] AUTHORITY.KEYID = 7
7,654,691 UART: [ldev] FE.KEYID = 1
7,664,928 UART: [ldev] Erasing FE.KEYID = 1
10,951,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,897 UART: [ldev] --
13,313,266 UART: [fwproc] Waiting for Commands...
13,316,117 UART: [fwproc] Received command 0x46574c44
13,318,292 UART: [fwproc] Received Image of size 114124 bytes
17,372,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,181 >>> mbox cmd response: success
17,837,743 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,842,229 UART: [afmc] ++
17,842,821 UART: [afmc] CDI.KEYID = 6
17,843,788 UART: [afmc] SUBJECT.KEYID = 7
17,844,996 UART: [afmc] AUTHORITY.KEYID = 5
21,158,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,653 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,963 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,334 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,180 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,586 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,025 UART: [afmc] --
23,524,359 UART: [cold-reset] --
23,528,010 UART: [state] Locking Datavault
23,535,429 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,216 UART: [state] Locking ICCM
23,538,606 UART: [exit] Launching FMC @ 0x40000130
23,546,996 UART:
23,547,228 UART: Running Caliptra FMC ...
23,548,332 UART:
23,548,487 UART: [state] CFI Enabled
23,556,528 UART: [fht] FMC Alias Private Key: 7
25,887,620 UART: [art] Extend RT PCRs Done
25,888,842 UART: [art] Lock RT PCRs Done
25,890,569 UART: [art] Populate DV Done
25,896,084 UART: [fht] FMC Alias Private Key: 7
25,897,681 UART: [art] Derive CDI
25,898,493 UART: [art] Store in in slot 0x4
25,941,079 UART: [art] Derive Key Pair
25,942,118 UART: [art] Store priv key in slot 0x5
29,184,330 UART: [art] Derive Key Pair - Done
29,197,322 UART: [art] Signing Cert with AUTHO
29,198,830 UART: RITY.KEYID = 7
31,477,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,303 UART: [art] PUB.X = 272A116C07737F566BC0473B5F691830EB09F953538414ED4914807B1122ABD28F645DD02083503283A7D6EF47C37055
31,486,541 UART: [art] PUB.Y = 82642572B0BCC9EE48DED6739922D92FD28EB06226C4C13BF6932A31A0F96DA59208F1E2566B42B942A059AEFA4A69C1
31,493,758 UART: [art] SIG.R = A164529587A79A3B85A77BEE66BE605D9370B0CC0F4FF8920CF788811E826A7B64545CEA15FEC071792C852939D63F92
31,501,150 UART: [art] SIG.S = 9B4DED5D85ED674844FB619D90CF563F0C07A663EF989A63EBD2936DE7167C33CFB7F2CD528641C0F61EBAAECBD27DD7
32,806,495 UART: Caliptra RT
32,807,207 UART: [state] CFI Enabled
32,925,218 UART: [rt] RT listening for mailbox commands...
32,956,632 UART: [rt]cmd =0x54514754, len=24
32,958,762 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,127,708 ready_for_fw is high
4,128,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,414 >>> mbox cmd response: success
18,074,267 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,706,054 UART:
23,706,444 UART: Running Caliptra FMC ...
23,707,602 UART:
23,707,756 UART: [state] CFI Enabled
23,715,661 UART: [fht] FMC Alias Private Key: 7
26,046,760 UART: [art] Extend RT PCRs Done
26,047,988 UART: [art] Lock RT PCRs Done
26,049,736 UART: [art] Populate DV Done
26,055,099 UART: [fht] FMC Alias Private Key: 7
26,056,601 UART: [art] Derive CDI
26,057,362 UART: [art] Store in in slot 0x4
26,099,960 UART: [art] Derive Key Pair
26,100,962 UART: [art] Store priv key in slot 0x5
29,343,119 UART: [art] Derive Key Pair - Done
29,355,798 UART: [art] Signing Cert with AUTHO
29,357,104 UART: RITY.KEYID = 7
31,636,301 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,812 UART: [art] PUB.X = C9AA888A647DFCB7A6BF1982FD24FF123BA379A3982E8CDF9FBF6A2ABE0ABB02264F5B6654D49F2430CAF01FBAB24FEF
31,645,140 UART: [art] PUB.Y = B4DAD17ED87C25A0CB7E073727CC62A4D07943E41E6849B3E0192F22D4816E765E6CDC71C32E08089E3C114463F694FE
31,652,369 UART: [art] SIG.R = DD5EA210CA2736EB46EC77F649AE8A648989F804F5501CD897E49B93A182FA36918B664430BC123234CDC9C47DFB945E
31,659,718 UART: [art] SIG.S = EF13B98C16F2FB4877F901EDA535AEBA652D2819D4E918B0E263BE00B779F4364976C06B3FB7832C908F18038EDB0A47
32,964,987 UART: Caliptra RT
32,965,689 UART: [state] CFI Enabled
33,083,302 UART: [rt] RT listening for mailbox commands...
33,114,828 UART: [rt]cmd =0x54514754, len=24
33,116,950 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,004 UART:
192,371 UART: Running Caliptra ROM ...
193,471 UART:
193,617 UART: [state] CFI Enabled
267,324 UART: [state] LifecycleState = Unprovisioned
269,243 UART: [state] DebugLocked = No
271,759 UART: [state] WD Timer not started. Device not locked for debugging
275,174 UART: [kat] SHA2-256
454,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,874 UART: [kat] ++
466,326 UART: [kat] sha1
476,631 UART: [kat] SHA2-256
479,712 UART: [kat] SHA2-384
485,347 UART: [kat] SHA2-512-ACC
488,283 UART: [kat] ECC-384
2,947,217 UART: [kat] HMAC-384Kdf
2,972,603 UART: [kat] LMS
3,502,055 UART: [kat] --
3,505,572 UART: [cold-reset] ++
3,508,072 UART: [fht] FHT @ 0x50003400
3,518,553 UART: [idev] ++
3,519,115 UART: [idev] CDI.KEYID = 6
3,520,117 UART: [idev] SUBJECT.KEYID = 7
3,521,341 UART: [idev] UDS.KEYID = 0
3,522,266 ready_for_fw is high
3,522,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,898 UART: [idev] Erasing UDS.KEYID = 0
6,028,109 UART: [idev] Sha1 KeyId Algorithm
6,050,148 UART: [idev] --
6,053,439 UART: [ldev] ++
6,054,012 UART: [ldev] CDI.KEYID = 6
6,054,930 UART: [ldev] SUBJECT.KEYID = 5
6,056,011 UART: [ldev] AUTHORITY.KEYID = 7
6,057,351 UART: [ldev] FE.KEYID = 1
6,102,215 UART: [ldev] Erasing FE.KEYID = 1
8,606,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,033 UART: [ldev] --
10,415,007 UART: [fwproc] Wait for Commands...
10,418,019 UART: [fwproc] Recv command 0x46574c44
10,420,054 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,474 >>> mbox cmd response: success
14,284,001 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,288,221 UART: [afmc] ++
14,288,837 UART: [afmc] CDI.KEYID = 6
14,289,723 UART: [afmc] SUBJECT.KEYID = 7
14,290,828 UART: [afmc] AUTHORITY.KEYID = 5
16,833,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,592 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,191 UART: [afmc] --
18,629,481 UART: [cold-reset] --
18,632,420 UART: [state] Locking Datavault
18,637,499 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,139 UART: [state] Locking ICCM
18,641,476 UART: [exit] Launching FMC @ 0x40000130
18,649,863 UART:
18,650,094 UART: Running Caliptra FMC ...
18,651,196 UART:
18,651,352 UART: [state] CFI Enabled
18,712,643 UART: [fht] FMC Alias Private Key: 7
20,476,605 UART: [art] Extend RT PCRs Done
20,477,839 UART: [art] Lock RT PCRs Done
20,479,408 UART: [art] Populate DV Done
20,484,656 UART: [fht] FMC Alias Private Key: 7
20,486,354 UART: [art] Derive CDI
20,487,162 UART: [art] Store in in slot 0x4
20,545,694 UART: [art] Derive Key Pair
20,546,736 UART: [art] Store priv key in slot 0x5
23,009,305 UART: [art] Derive Key Pair - Done
23,022,511 UART: [art] Signing Cert with AUTHO
23,023,814 UART: RITY.KEYID = 7
24,735,598 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,110 UART: [art] PUB.X = 7DC1026026545CB96FE4D9BF0FCBE78F3483C0B89ADE34FA21257C642F139B7739DE9EB63DF3E0F5F614438B2C29D919
24,744,353 UART: [art] PUB.Y = 55D1A5172335D7EA9C0FE2937A0B09D1481675B8F21E0CDDE77E928577F0A300A79C7291B91A702FF14C5D9987DA52C1
24,751,613 UART: [art] SIG.R = 529D44A03712682A9C781193BC75C4850D94C4F111F547AD61DAB1C26BE53211548440D81D6CC6E73F52C9DB27EB29E5
24,759,020 UART: [art] SIG.S = 5B3693C1DD97E68D7613A0B7992D8EF2780DE56012590FC9FAE5DC4C4EDC937E106B2E3DDE519C576B99E4A85FE0A943
25,738,383 UART: Caliptra RT
25,739,098 UART: [state] CFI Enabled
25,903,109 UART: [rt] RT listening for mailbox commands...
25,934,625 UART: [rt]cmd =0x54514754, len=24
25,936,920 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,380,871 ready_for_fw is high
3,381,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,942 >>> mbox cmd response: success
14,074,670 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,365,200 UART:
18,365,594 UART: Running Caliptra FMC ...
18,366,728 UART:
18,366,883 UART: [state] CFI Enabled
18,427,989 UART: [fht] FMC Alias Private Key: 7
20,192,310 UART: [art] Extend RT PCRs Done
20,193,535 UART: [art] Lock RT PCRs Done
20,195,652 UART: [art] Populate DV Done
20,201,058 UART: [fht] FMC Alias Private Key: 7
20,202,544 UART: [art] Derive CDI
20,203,309 UART: [art] Store in in slot 0x4
20,261,036 UART: [art] Derive Key Pair
20,262,080 UART: [art] Store priv key in slot 0x5
22,724,711 UART: [art] Derive Key Pair - Done
22,737,881 UART: [art] Signing Cert with AUTHO
22,739,187 UART: RITY.KEYID = 7
24,451,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,638 UART: [art] PUB.X = 84B27BC617A2E326F8565AEB6228485A471A833589A034CD883E44BFD9B157023197CD6A714910D0C58C22C30D63743A
24,459,946 UART: [art] PUB.Y = EBB420F299388150F0890413872947024F2E86D7C303F424284CC51E8481B1FE8CD286BDBF2EB4B7FE876A1DCD2FE18C
24,467,186 UART: [art] SIG.R = BF066FDDE36975C126595A6DD5DA2576B14C326A39CBF7B5ECBB91F986C4A3BCE68F0CFCA23715F69F5ECA7FE4FEB073
24,474,579 UART: [art] SIG.S = 0348FA6FBC65EB0A5BE47B126495D2C0183396B654718A08C81E02C30245B164A7FC8EC7845AD907808D546031DBB687
25,453,643 UART: Caliptra RT
25,454,355 UART: [state] CFI Enabled
25,619,482 UART: [rt] RT listening for mailbox commands...
25,650,962 UART: [rt]cmd =0x54514754, len=24
25,653,418 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,410 UART:
192,792 UART: Running Caliptra ROM ...
193,986 UART:
603,614 UART: [state] CFI Enabled
617,062 UART: [state] LifecycleState = Unprovisioned
618,937 UART: [state] DebugLocked = No
621,737 UART: [state] WD Timer not started. Device not locked for debugging
626,040 UART: [kat] SHA2-256
805,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,720 UART: [kat] ++
817,253 UART: [kat] sha1
827,911 UART: [kat] SHA2-256
830,968 UART: [kat] SHA2-384
837,159 UART: [kat] SHA2-512-ACC
840,093 UART: [kat] ECC-384
3,280,748 UART: [kat] HMAC-384Kdf
3,295,038 UART: [kat] LMS
3,824,548 UART: [kat] --
3,828,331 UART: [cold-reset] ++
3,830,831 UART: [fht] FHT @ 0x50003400
3,841,838 UART: [idev] ++
3,842,406 UART: [idev] CDI.KEYID = 6
3,843,286 UART: [idev] SUBJECT.KEYID = 7
3,844,521 UART: [idev] UDS.KEYID = 0
3,845,415 ready_for_fw is high
3,845,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,166 UART: [idev] Erasing UDS.KEYID = 0
6,316,577 UART: [idev] Sha1 KeyId Algorithm
6,340,578 UART: [idev] --
6,345,274 UART: [ldev] ++
6,345,840 UART: [ldev] CDI.KEYID = 6
6,346,717 UART: [ldev] SUBJECT.KEYID = 5
6,347,925 UART: [ldev] AUTHORITY.KEYID = 7
6,349,224 UART: [ldev] FE.KEYID = 1
6,358,813 UART: [ldev] Erasing FE.KEYID = 1
8,830,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,065 UART: [ldev] --
10,622,728 UART: [fwproc] Wait for Commands...
10,624,810 UART: [fwproc] Recv command 0x46574c44
10,626,887 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,705 >>> mbox cmd response: success
14,497,249 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,501,803 UART: [afmc] ++
14,502,388 UART: [afmc] CDI.KEYID = 6
14,503,261 UART: [afmc] SUBJECT.KEYID = 7
14,504,468 UART: [afmc] AUTHORITY.KEYID = 5
17,002,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,913 UART: [afmc] --
18,800,469 UART: [cold-reset] --
18,804,862 UART: [state] Locking Datavault
18,812,580 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,227 UART: [state] Locking ICCM
18,815,775 UART: [exit] Launching FMC @ 0x40000130
18,824,237 UART:
18,824,468 UART: Running Caliptra FMC ...
18,825,561 UART:
18,825,712 UART: [state] CFI Enabled
18,834,129 UART: [fht] FMC Alias Private Key: 7
20,591,708 UART: [art] Extend RT PCRs Done
20,592,927 UART: [art] Lock RT PCRs Done
20,594,513 UART: [art] Populate DV Done
20,600,024 UART: [fht] FMC Alias Private Key: 7
20,601,664 UART: [art] Derive CDI
20,602,393 UART: [art] Store in in slot 0x4
20,645,252 UART: [art] Derive Key Pair
20,646,288 UART: [art] Store priv key in slot 0x5
23,072,889 UART: [art] Derive Key Pair - Done
23,085,779 UART: [art] Signing Cert with AUTHO
23,087,072 UART: RITY.KEYID = 7
24,792,683 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,188 UART: [art] PUB.X = 55B41972DFE380A4824D610148F91A2DDE3E5D83A407BC31B63836CF2A49ACBB1D2CD8E17282785AB61532C6217EEAB3
24,801,420 UART: [art] PUB.Y = F4862AF8C8B19027304977593D9671826355307283AB19881FD8A69BC45E4DF2201B382626A01ED81935B01E91CFF111
24,808,646 UART: [art] SIG.R = 85262A5FD4B30CA49F8DBE45B66242D1A9C6AD11A9E22D0CA38EAA8B8776E4BA4A0A2CE8ACC65E09D335CED5C8695B44
24,816,085 UART: [art] SIG.S = FD358F4FEDE96739A02F04DFB1E840EAC6C7B27D77571DE1A6C2364340E762F0F32F2DE4AA0A74F38FA68529E5A357CE
25,795,446 UART: Caliptra RT
25,796,154 UART: [state] CFI Enabled
25,914,622 UART: [rt] RT listening for mailbox commands...
25,946,058 UART: [rt]cmd =0x54514754, len=24
25,948,525 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,696,828 ready_for_fw is high
3,697,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,480 >>> mbox cmd response: success
14,282,337 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,533,712 UART:
18,534,090 UART: Running Caliptra FMC ...
18,535,216 UART:
18,535,367 UART: [state] CFI Enabled
18,543,197 UART: [fht] FMC Alias Private Key: 7
20,300,248 UART: [art] Extend RT PCRs Done
20,301,472 UART: [art] Lock RT PCRs Done
20,302,904 UART: [art] Populate DV Done
20,308,208 UART: [fht] FMC Alias Private Key: 7
20,309,800 UART: [art] Derive CDI
20,310,612 UART: [art] Store in in slot 0x4
20,353,307 UART: [art] Derive Key Pair
20,354,301 UART: [art] Store priv key in slot 0x5
22,780,873 UART: [art] Derive Key Pair - Done
22,793,555 UART: [art] Signing Cert with AUTHO
22,794,875 UART: RITY.KEYID = 7
24,500,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,757 UART: [art] PUB.X = EAC8FE8EA787F6791FCAE6CD6CE520DC56E59A35BB76802C61C345638CC33A4271638B8388724B81191085F8F38C76E1
24,508,997 UART: [art] PUB.Y = AA8F88F6580017BAED33D09964949DF8B952ED39A8307959B5AD8BB7838348286DBE4D8AF2804733BE501D828E4EC4A0
24,516,299 UART: [art] SIG.R = D66A8352CF1F18E112BBCBAE3C3F1EDF33819BE862A7FE5AB7237316ADDF8E275F8DC2FB0D5C14BD707BCFCB7BF28B12
24,523,690 UART: [art] SIG.S = 5A7091B10A0EC83BC2FD9D292D22EB08C3242F781B68262E2E230FC3E2A9820C69E31898C78A0048D4253AB6780CAD7B
25,503,092 UART: Caliptra RT
25,503,795 UART: [state] CFI Enabled
25,620,577 UART: [rt] RT listening for mailbox commands...
25,652,201 UART: [rt]cmd =0x54514754, len=24
25,654,229 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,097 UART:
192,468 UART: Running Caliptra ROM ...
193,664 UART:
193,821 UART: [state] CFI Enabled
266,305 UART: [state] LifecycleState = Unprovisioned
268,719 UART: [state] DebugLocked = No
271,111 UART: [state] WD Timer not started. Device not locked for debugging
275,654 UART: [kat] SHA2-256
465,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,343 UART: [kat] ++
476,826 UART: [kat] sha1
487,699 UART: [kat] SHA2-256
490,703 UART: [kat] SHA2-384
496,195 UART: [kat] SHA2-512-ACC
498,845 UART: [kat] ECC-384
2,949,854 UART: [kat] HMAC-384Kdf
2,974,376 UART: [kat] LMS
3,506,128 UART: [kat] --
3,509,937 UART: [cold-reset] ++
3,511,797 UART: [fht] FHT @ 0x50003400
3,523,480 UART: [idev] ++
3,524,123 UART: [idev] CDI.KEYID = 6
3,525,110 UART: [idev] SUBJECT.KEYID = 7
3,526,285 UART: [idev] UDS.KEYID = 0
3,527,212 ready_for_fw is high
3,527,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,353 UART: [idev] Erasing UDS.KEYID = 0
6,034,888 UART: [idev] Sha1 KeyId Algorithm
6,058,275 UART: [idev] --
6,063,354 UART: [ldev] ++
6,064,061 UART: [ldev] CDI.KEYID = 6
6,064,980 UART: [ldev] SUBJECT.KEYID = 5
6,066,143 UART: [ldev] AUTHORITY.KEYID = 7
6,067,377 UART: [ldev] FE.KEYID = 1
6,104,288 UART: [ldev] Erasing FE.KEYID = 1
8,608,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,551 UART: [ldev] --
10,416,865 UART: [fwproc] Wait for Commands...
10,418,840 UART: [fwproc] Recv command 0x46574c44
10,421,157 UART: [fwproc] Recv'd Img size: 114448 bytes
13,870,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,609,374 >>> mbox cmd response: success
14,609,916 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,613,864 UART: [afmc] ++
14,614,537 UART: [afmc] CDI.KEYID = 6
14,615,784 UART: [afmc] SUBJECT.KEYID = 7
14,617,229 UART: [afmc] AUTHORITY.KEYID = 5
17,154,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,402 UART: [afmc] --
18,970,610 UART: [cold-reset] --
18,975,982 UART: [state] Locking Datavault
18,982,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,482 UART: [state] Locking ICCM
18,985,826 UART: [exit] Launching FMC @ 0x40000130
18,994,499 UART:
18,994,732 UART: Running Caliptra FMC ...
18,995,829 UART:
18,996,002 UART: [state] CFI Enabled
19,053,860 UART: [fht] FMC Alias Private Key: 7
20,818,223 UART: [art] Extend RT PCRs Done
20,819,443 UART: [art] Lock RT PCRs Done
20,821,114 UART: [art] Populate DV Done
20,826,252 UART: [fht] FMC Alias Private Key: 7
20,827,744 UART: [art] Derive CDI
20,828,505 UART: [art] Store in in slot 0x4
20,886,971 UART: [art] Derive Key Pair
20,887,971 UART: [art] Store priv key in slot 0x5
23,350,799 UART: [art] Derive Key Pair - Done
23,363,534 UART: [art] Signing Cert with AUTHO
23,364,843 UART: RITY.KEYID = 7
25,077,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,267 UART: [art] PUB.X = 848D8D73C9C25CAED845B383B752D973259BCD7FABB7B64FB9AB60381C9088F5E346F48B1F176A7F29A844C20F16D334
25,086,567 UART: [art] PUB.Y = 10BACB43BD1068EE5CE74B99A945CA4C37ED5FF39CE1023124E3A75590EAA685B5C42798AE5BDA8588CDDB586AA34D09
25,093,849 UART: [art] SIG.R = 2E8811E4EFC9270AEB5B5A57383959ACF806211E8ADE5B702B55A28317EBEC5598B8C08ADA349CD2DF71724C0DFA6FCE
25,101,287 UART: [art] SIG.S = 5DB22FAF1C230A82C82629EF9D5FDD822C85E4983D23F104C9E5AA10F53F23217816F2E79A6375965567DCC8A3A6BA84
26,080,379 UART: Caliptra RT
26,081,069 UART: [state] CFI Enabled
26,245,568 UART: [rt] RT listening for mailbox commands...
26,277,240 UART: [rt]cmd =0x54514754, len=24
26,279,484 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,872 writing to cptra_bootfsm_go
3,417,838 ready_for_fw is high
3,418,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,719,870 >>> mbox cmd response: success
14,720,826 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,007,032 UART:
19,007,425 UART: Running Caliptra FMC ...
19,008,750 UART:
19,008,923 UART: [state] CFI Enabled
19,074,080 UART: [fht] FMC Alias Private Key: 7
20,838,078 UART: [art] Extend RT PCRs Done
20,839,299 UART: [art] Lock RT PCRs Done
20,840,656 UART: [art] Populate DV Done
20,846,291 UART: [fht] FMC Alias Private Key: 7
20,847,898 UART: [art] Derive CDI
20,848,715 UART: [art] Store in in slot 0x4
20,906,581 UART: [art] Derive Key Pair
20,907,623 UART: [art] Store priv key in slot 0x5
23,370,435 UART: [art] Derive Key Pair - Done
23,383,703 UART: [art] Signing Cert with AUTHO
23,385,005 UART: RITY.KEYID = 7
25,095,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,196 UART: [art] PUB.X = 9B27F6AC8CE785CCBB9861B9230BBA5ECF449578CBA00DC4BF0745860E426D5287386CEE66216DBA3FD14300E1A7642C
25,104,494 UART: [art] PUB.Y = 37090F77ECA59BE35EA1D608325DA58EE5D4A722F6D8785427933E54004261DE73C6B44708F037B6EF1700F0DED5274F
25,111,690 UART: [art] SIG.R = A02BF2482970DA6365D5CD91DCF5E27868BD0732C6E81E242E09E4B1F737758D654C80B405B019D8474F988542349B09
25,119,024 UART: [art] SIG.S = 3F61B95AD2D1C24A5A9E1F889086BEF0D620A04551813835E98AAC5268D7E308EF5831836CD9FE2D74ECBE40E83588C2
26,098,487 UART: Caliptra RT
26,099,179 UART: [state] CFI Enabled
26,263,383 UART: [rt] RT listening for mailbox commands...
26,295,104 UART: [rt]cmd =0x54514754, len=24
26,297,459 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,429 UART:
192,802 UART: Running Caliptra ROM ...
194,004 UART:
603,683 UART: [state] CFI Enabled
616,698 UART: [state] LifecycleState = Unprovisioned
619,069 UART: [state] DebugLocked = No
620,809 UART: [state] WD Timer not started. Device not locked for debugging
625,494 UART: [kat] SHA2-256
815,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,117 UART: [kat] ++
826,669 UART: [kat] sha1
838,742 UART: [kat] SHA2-256
841,809 UART: [kat] SHA2-384
847,218 UART: [kat] SHA2-512-ACC
849,800 UART: [kat] ECC-384
3,290,950 UART: [kat] HMAC-384Kdf
3,303,911 UART: [kat] LMS
3,835,779 UART: [kat] --
3,838,917 UART: [cold-reset] ++
3,840,982 UART: [fht] FHT @ 0x50003400
3,851,311 UART: [idev] ++
3,852,015 UART: [idev] CDI.KEYID = 6
3,852,894 UART: [idev] SUBJECT.KEYID = 7
3,854,145 UART: [idev] UDS.KEYID = 0
3,855,066 ready_for_fw is high
3,855,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,950 UART: [idev] Erasing UDS.KEYID = 0
6,332,490 UART: [idev] Sha1 KeyId Algorithm
6,355,931 UART: [idev] --
6,360,483 UART: [ldev] ++
6,361,162 UART: [ldev] CDI.KEYID = 6
6,362,169 UART: [ldev] SUBJECT.KEYID = 5
6,363,272 UART: [ldev] AUTHORITY.KEYID = 7
6,364,494 UART: [ldev] FE.KEYID = 1
6,373,887 UART: [ldev] Erasing FE.KEYID = 1
8,853,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,971 UART: [ldev] --
10,644,685 UART: [fwproc] Wait for Commands...
10,646,932 UART: [fwproc] Recv command 0x46574c44
10,649,230 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,824,672 >>> mbox cmd response: success
14,825,199 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,828,230 UART: [afmc] ++
14,828,920 UART: [afmc] CDI.KEYID = 6
14,830,158 UART: [afmc] SUBJECT.KEYID = 7
14,831,589 UART: [afmc] AUTHORITY.KEYID = 5
17,337,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,925 UART: [afmc] --
19,135,996 UART: [cold-reset] --
19,139,405 UART: [state] Locking Datavault
19,145,687 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,868 UART: [state] Locking ICCM
19,150,120 UART: [exit] Launching FMC @ 0x40000130
19,158,788 UART:
19,159,023 UART: Running Caliptra FMC ...
19,160,118 UART:
19,160,269 UART: [state] CFI Enabled
19,168,309 UART: [fht] FMC Alias Private Key: 7
20,925,521 UART: [art] Extend RT PCRs Done
20,926,758 UART: [art] Lock RT PCRs Done
20,928,620 UART: [art] Populate DV Done
20,934,190 UART: [fht] FMC Alias Private Key: 7
20,935,930 UART: [art] Derive CDI
20,936,659 UART: [art] Store in in slot 0x4
20,979,517 UART: [art] Derive Key Pair
20,980,546 UART: [art] Store priv key in slot 0x5
23,407,436 UART: [art] Derive Key Pair - Done
23,420,493 UART: [art] Signing Cert with AUTHO
23,421,795 UART: RITY.KEYID = 7
25,127,204 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,707 UART: [art] PUB.X = C223F4AB452F70C5BCA9AE4A06513B45E16720974B681DAE39C5EC3FBA79E45A36057E55B13C673E23406862276561B0
25,135,952 UART: [art] PUB.Y = 9A2D6A37618D55F92F148B653B1AD9FA609E239A3489C683FD19E3E4A7B166A34223A3C1BA1BAB3586D0A68DB2EACBE9
25,143,259 UART: [art] SIG.R = D7D1292D65A5310918203210B7C457FA023C6D99F5C91D15903BDF08C4EC2192224BCBE5E27D98D20E824A067E50D0E1
25,150,657 UART: [art] SIG.S = C1221D745F0D2E91BA4E2F0DC4144DEF5F5EBDF1023E26A37B8185D6F99859B91F79C8D852C7BD17C7A40C18E3655B27
26,129,187 UART: Caliptra RT
26,129,918 UART: [state] CFI Enabled
26,247,309 UART: [rt] RT listening for mailbox commands...
26,278,928 UART: [rt]cmd =0x54514754, len=24
26,280,979 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,755,682 ready_for_fw is high
3,756,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,298 >>> mbox cmd response: success
14,957,167 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,215,005 UART:
19,215,400 UART: Running Caliptra FMC ...
19,216,499 UART:
19,216,645 UART: [state] CFI Enabled
19,224,814 UART: [fht] FMC Alias Private Key: 7
20,982,265 UART: [art] Extend RT PCRs Done
20,983,486 UART: [art] Lock RT PCRs Done
20,985,135 UART: [art] Populate DV Done
20,990,431 UART: [fht] FMC Alias Private Key: 7
20,992,018 UART: [art] Derive CDI
20,992,745 UART: [art] Store in in slot 0x4
21,035,495 UART: [art] Derive Key Pair
21,036,534 UART: [art] Store priv key in slot 0x5
23,462,906 UART: [art] Derive Key Pair - Done
23,476,072 UART: [art] Signing Cert with AUTHO
23,477,376 UART: RITY.KEYID = 7
25,182,433 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,946 UART: [art] PUB.X = FAD42D3902D9F5AC345CD28BB59EA78B5F795EA783F53E394E071CF5F2794994E460B75042508CCF84301287A0B44DDB
25,191,215 UART: [art] PUB.Y = 2D11AD69FE54BC90E7890EF12A5A30A2DDCEC353C37E06D4D8777D8AB52FBC9E1208B1FC792785C1A68E815E58C339A1
25,198,483 UART: [art] SIG.R = FC07DB0CDD4AF0585BABBF5F320094BCD2C6ABDF494D682728B817BC0D935CFCD07D36C51FAB4607F36347B2359AC246
25,205,863 UART: [art] SIG.S = EE442C84B988AB828199E5B9007DE44F984BC385361B1611A07747C7E7484B12B71B962D74130F6568CE72EFE464CF54
26,185,028 UART: Caliptra RT
26,185,717 UART: [state] CFI Enabled
26,303,257 UART: [rt] RT listening for mailbox commands...
26,334,847 UART: [rt]cmd =0x54514754, len=24
26,337,348 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,394 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,771 UART: [cold-reset] ++
1,476,169 UART: [fht] Storing FHT @ 0x50003400
1,479,038 UART: [idev] ++
1,479,206 UART: [idev] CDI.KEYID = 6
1,479,566 UART: [idev] SUBJECT.KEYID = 7
1,479,990 UART: [idev] UDS.KEYID = 0
1,480,335 ready_for_fw is high
1,480,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,900 UART: [idev] Erasing UDS.KEYID = 0
1,504,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,114 UART: [idev] --
1,514,151 UART: [ldev] ++
1,514,319 UART: [ldev] CDI.KEYID = 6
1,514,682 UART: [ldev] SUBJECT.KEYID = 5
1,515,108 UART: [ldev] AUTHORITY.KEYID = 7
1,515,571 UART: [ldev] FE.KEYID = 1
1,520,845 UART: [ldev] Erasing FE.KEYID = 1
1,546,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,724 UART: [ldev] --
1,585,167 UART: [fwproc] Waiting for Commands...
1,585,956 UART: [fwproc] Received command 0x46574c44
1,586,747 UART: [fwproc] Received Image of size 114448 bytes
2,886,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,877 >>> mbox cmd response: success
3,079,877 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,061 UART: [afmc] ++
3,081,229 UART: [afmc] CDI.KEYID = 6
3,081,591 UART: [afmc] SUBJECT.KEYID = 7
3,082,016 UART: [afmc] AUTHORITY.KEYID = 5
3,116,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,799 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,192 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,882 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,561 UART: [afmc] --
3,159,521 UART: [cold-reset] --
3,160,247 UART: [state] Locking Datavault
3,161,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,772 UART: [state] Locking ICCM
3,162,362 UART: [exit] Launching FMC @ 0x40000130
3,167,691 UART:
3,167,707 UART: Running Caliptra FMC ...
3,168,115 UART:
3,168,169 UART: [state] CFI Enabled
3,178,560 UART: [fht] FMC Alias Private Key: 7
3,285,775 UART: [art] Extend RT PCRs Done
3,286,203 UART: [art] Lock RT PCRs Done
3,287,945 UART: [art] Populate DV Done
3,296,208 UART: [fht] FMC Alias Private Key: 7
3,297,196 UART: [art] Derive CDI
3,297,476 UART: [art] Store in in slot 0x4
3,383,171 UART: [art] Derive Key Pair
3,383,531 UART: [art] Store priv key in slot 0x5
3,397,049 UART: [art] Derive Key Pair - Done
3,411,845 UART: [art] Signing Cert with AUTHO
3,412,325 UART: RITY.KEYID = 7
3,428,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,864 UART: [art] PUB.X = 7BB32178DBA04836B860B869C9AFCE495E93CF8106264784CAF11DA051A65750CDC18791A3F4B20E611484D5B9D7CFEC
3,435,636 UART: [art] PUB.Y = 198BE806A4EF71D95376A9BB57A06999D8BC93C829B52FAF6713666B6BBB7AE893BA68C4C630A635D57BCC038FA08917
3,442,588 UART: [art] SIG.R = C737754DD2620385F0B3294B4FEF56E0E53886F2A90D89DE82DF44DFA4C94FF0694444D75E773E387455CFDA859EAD36
3,449,358 UART: [art] SIG.S = 684DF7BE08BEEE6C035199D17BED08BFDFE4F309507C17F35177E41309870AB38FD532219EE94029DC53ABACEB0D9AB6
3,473,712 UART: Caliptra RT
3,473,965 UART: [state] CFI Enabled
3,582,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,258 UART: [rt]cmd =0x54514754, len=24
3,615,165 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,207 ready_for_fw is high
1,363,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,123 >>> mbox cmd response: success
2,929,123 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,237 UART:
2,990,253 UART: Running Caliptra FMC ...
2,990,661 UART:
2,990,715 UART: [state] CFI Enabled
3,001,428 UART: [fht] FMC Alias Private Key: 7
3,109,217 UART: [art] Extend RT PCRs Done
3,109,645 UART: [art] Lock RT PCRs Done
3,111,267 UART: [art] Populate DV Done
3,119,470 UART: [fht] FMC Alias Private Key: 7
3,120,426 UART: [art] Derive CDI
3,120,706 UART: [art] Store in in slot 0x4
3,206,033 UART: [art] Derive Key Pair
3,206,393 UART: [art] Store priv key in slot 0x5
3,219,703 UART: [art] Derive Key Pair - Done
3,234,451 UART: [art] Signing Cert with AUTHO
3,234,931 UART: RITY.KEYID = 7
3,249,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,540 UART: [art] PUB.X = 071A6F7C9E848E1A008D8538A3E8E0458022E7D9AFAA7CA8FB822DF112C8126A0876D262DA0FC26DB82EA346D813D226
3,257,287 UART: [art] PUB.Y = F04FD5CA43C3F8F0C80DF2C791D743A356F392A09CB349079E82CB81694FE3AC4BF8E4F458A3F601A583E5F2D295D892
3,264,238 UART: [art] SIG.R = 80874CC0F665207B5E0C81621E88EE841161111B0D9DC009B180680681C25DE17401364140E8A94835DABFF994F759CE
3,270,985 UART: [art] SIG.S = 54572777E4438FDE93BD244244302F74D4C7A7AEA749CE586B63B60D5FAB9179DF6A842AC0238AE44C44DA45B8F28ACB
3,294,575 UART: Caliptra RT
3,294,828 UART: [state] CFI Enabled
3,404,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,977 UART: [rt]cmd =0x54514754, len=24
3,437,022 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
902,917 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 ready_for_fw is high
1,481,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,368 UART: [ldev] ++
1,515,536 UART: [ldev] CDI.KEYID = 6
1,515,899 UART: [ldev] SUBJECT.KEYID = 5
1,516,325 UART: [ldev] AUTHORITY.KEYID = 7
1,516,788 UART: [ldev] FE.KEYID = 1
1,522,306 UART: [ldev] Erasing FE.KEYID = 1
1,547,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,813 UART: [ldev] --
1,587,096 UART: [fwproc] Waiting for Commands...
1,587,931 UART: [fwproc] Received command 0x46574c44
1,588,722 UART: [fwproc] Received Image of size 114448 bytes
2,888,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,862 >>> mbox cmd response: success
3,080,862 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,966 UART: [afmc] ++
3,082,134 UART: [afmc] CDI.KEYID = 6
3,082,496 UART: [afmc] SUBJECT.KEYID = 7
3,082,921 UART: [afmc] AUTHORITY.KEYID = 5
3,118,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,850 UART: [afmc] --
3,161,912 UART: [cold-reset] --
3,162,526 UART: [state] Locking Datavault
3,163,743 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,347 UART: [state] Locking ICCM
3,164,931 UART: [exit] Launching FMC @ 0x40000130
3,170,260 UART:
3,170,276 UART: Running Caliptra FMC ...
3,170,684 UART:
3,170,827 UART: [state] CFI Enabled
3,181,400 UART: [fht] FMC Alias Private Key: 7
3,289,263 UART: [art] Extend RT PCRs Done
3,289,691 UART: [art] Lock RT PCRs Done
3,291,453 UART: [art] Populate DV Done
3,299,692 UART: [fht] FMC Alias Private Key: 7
3,300,796 UART: [art] Derive CDI
3,301,076 UART: [art] Store in in slot 0x4
3,386,927 UART: [art] Derive Key Pair
3,387,287 UART: [art] Store priv key in slot 0x5
3,400,691 UART: [art] Derive Key Pair - Done
3,415,517 UART: [art] Signing Cert with AUTHO
3,415,997 UART: RITY.KEYID = 7
3,431,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,976 UART: [art] PUB.X = FA19C387047B80EB979CA44F8456447FF9413D07A588F81CD64D78FA5E6D83DFC891C5347221E9667C69549D3BE468A7
3,438,740 UART: [art] PUB.Y = 8079B0C83AEC357A9EF23E5C0F6537964405A346F8E4405D1DE94B9E5B46057694FB9616F38D629882E0080446DCA3E9
3,445,671 UART: [art] SIG.R = B81E603AEBE2F38E4A7E2337A81D6233E57BAE08422F6406713F2EE094E279787273B602C0CF6A897393620C77A87B78
3,452,425 UART: [art] SIG.S = E1DE80AEDA0AD2BD91E9FEFFFAF6749DD0F7248F85300E20533C1C1D2DE73C4D4336A2BC3EEA161B7C8F7218807D32C6
3,476,172 UART: Caliptra RT
3,476,517 UART: [state] CFI Enabled
3,584,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,793 UART: [rt]cmd =0x54514754, len=24
3,616,674 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 ready_for_fw is high
1,362,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,072 >>> mbox cmd response: success
2,929,072 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,394 UART:
2,990,410 UART: Running Caliptra FMC ...
2,990,818 UART:
2,990,961 UART: [state] CFI Enabled
3,001,860 UART: [fht] FMC Alias Private Key: 7
3,110,259 UART: [art] Extend RT PCRs Done
3,110,687 UART: [art] Lock RT PCRs Done
3,112,199 UART: [art] Populate DV Done
3,120,458 UART: [fht] FMC Alias Private Key: 7
3,121,426 UART: [art] Derive CDI
3,121,706 UART: [art] Store in in slot 0x4
3,207,553 UART: [art] Derive Key Pair
3,207,913 UART: [art] Store priv key in slot 0x5
3,220,955 UART: [art] Derive Key Pair - Done
3,235,853 UART: [art] Signing Cert with AUTHO
3,236,333 UART: RITY.KEYID = 7
3,251,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,424 UART: [art] PUB.X = 76DA299985AD75C4F01F6DEAF9188066936AF725F71C7179DCA629873D1BE8AAA12A15BC2C9914FC9B2800E0722F1075
3,259,176 UART: [art] PUB.Y = A99D5F217F0DA85471456B6EE36D57B6C83FB25E3513CB0BC9193749C475C4578D8D047C9443464A8DCDE69CCEE42566
3,266,121 UART: [art] SIG.R = 68EE942DE1B9EAE12318B85CD6858679BCB5AB7E36F471A7EEEEB2A5B1D861C1DBF5FB3D8B42A11248790102A8C09061
3,272,899 UART: [art] SIG.S = 64DC9D4EB0D83429E6120F419E457C189DC76AAA78988F297D35E07BC37089363E2226F70892D56E6383AB1973CFAB5E
3,296,932 UART: Caliptra RT
3,297,277 UART: [state] CFI Enabled
3,404,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,107 UART: [rt]cmd =0x54514754, len=24
3,436,880 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
893,742 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,867 UART: [kat] ++
898,019 UART: [kat] sha1
902,199 UART: [kat] SHA2-256
904,139 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,674 UART: [kat] HMAC-384Kdf
923,464 UART: [kat] LMS
1,171,792 UART: [kat] --
1,172,559 UART: [cold-reset] ++
1,172,967 UART: [fht] FHT @ 0x50003400
1,175,676 UART: [idev] ++
1,175,844 UART: [idev] CDI.KEYID = 6
1,176,204 UART: [idev] SUBJECT.KEYID = 7
1,176,628 UART: [idev] UDS.KEYID = 0
1,176,973 ready_for_fw is high
1,176,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,732 UART: [idev] Erasing UDS.KEYID = 0
1,201,885 UART: [idev] Sha1 KeyId Algorithm
1,210,359 UART: [idev] --
1,211,481 UART: [ldev] ++
1,211,649 UART: [ldev] CDI.KEYID = 6
1,212,012 UART: [ldev] SUBJECT.KEYID = 5
1,212,438 UART: [ldev] AUTHORITY.KEYID = 7
1,212,901 UART: [ldev] FE.KEYID = 1
1,218,143 UART: [ldev] Erasing FE.KEYID = 1
1,244,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,477 UART: [ldev] --
1,283,892 UART: [fwproc] Wait for Commands...
1,284,684 UART: [fwproc] Recv command 0x46574c44
1,285,412 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,982 >>> mbox cmd response: success
2,776,982 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,778,072 UART: [afmc] ++
2,778,240 UART: [afmc] CDI.KEYID = 6
2,778,602 UART: [afmc] SUBJECT.KEYID = 7
2,779,027 UART: [afmc] AUTHORITY.KEYID = 5
2,814,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,993 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,813 UART: [afmc] --
2,857,713 UART: [cold-reset] --
2,858,633 UART: [state] Locking Datavault
2,860,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,638 UART: [state] Locking ICCM
2,861,154 UART: [exit] Launching FMC @ 0x40000130
2,866,483 UART:
2,866,499 UART: Running Caliptra FMC ...
2,866,907 UART:
2,866,961 UART: [state] CFI Enabled
2,877,560 UART: [fht] FMC Alias Private Key: 7
2,985,585 UART: [art] Extend RT PCRs Done
2,986,013 UART: [art] Lock RT PCRs Done
2,987,777 UART: [art] Populate DV Done
2,995,830 UART: [fht] FMC Alias Private Key: 7
2,997,010 UART: [art] Derive CDI
2,997,290 UART: [art] Store in in slot 0x4
3,082,971 UART: [art] Derive Key Pair
3,083,331 UART: [art] Store priv key in slot 0x5
3,096,433 UART: [art] Derive Key Pair - Done
3,110,907 UART: [art] Signing Cert with AUTHO
3,111,387 UART: RITY.KEYID = 7
3,126,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,216 UART: [art] PUB.X = 3E4EAA324F85FD23D823F41A2BACF86B882E02636BBF10A6C39D5CEFC9ED8419D19C1E19C66706E477EBD565275E1EAA
3,133,998 UART: [art] PUB.Y = C4F3B58D5384A38F0AAA73EFE7E6E7C9485FF25E344AED23E336EB4D40CA0D5A011D3A12ACBCF41995B32313D0B70120
3,140,952 UART: [art] SIG.R = 9D746357CE4159F4EDEEC17B6CA61DD7A058250B4C8775A5929DE34A4CDBC06C83E69ED5BDEF9B0DD3D24762C2A38904
3,147,729 UART: [art] SIG.S = 723618D0A78BFE796A5F7A6F1F67812DB58CCBEE7A87B71F030D5724790C9BC6572621E3456302DC4492596524DC502A
3,171,566 UART: Caliptra RT
3,171,819 UART: [state] CFI Enabled
3,279,180 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,674 UART: [rt]cmd =0x54514754, len=24
3,311,513 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,751 ready_for_fw is high
1,060,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,937 >>> mbox cmd response: success
2,629,937 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,089 UART:
2,691,105 UART: Running Caliptra FMC ...
2,691,513 UART:
2,691,567 UART: [state] CFI Enabled
2,701,732 UART: [fht] FMC Alias Private Key: 7
2,809,429 UART: [art] Extend RT PCRs Done
2,809,857 UART: [art] Lock RT PCRs Done
2,811,413 UART: [art] Populate DV Done
2,819,560 UART: [fht] FMC Alias Private Key: 7
2,820,564 UART: [art] Derive CDI
2,820,844 UART: [art] Store in in slot 0x4
2,906,863 UART: [art] Derive Key Pair
2,907,223 UART: [art] Store priv key in slot 0x5
2,920,367 UART: [art] Derive Key Pair - Done
2,934,845 UART: [art] Signing Cert with AUTHO
2,935,325 UART: RITY.KEYID = 7
2,950,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,084 UART: [art] PUB.X = 5A193D79111FCCE67CA4E3E5636DBF714CDC1EC5B2A5307EE95779EDA1830A3E219AD067A64FFBAA81887D13FA7CC588
2,957,869 UART: [art] PUB.Y = 5609138577A39782C7D647F26251BA2CB036C864CE60C62098299D5C17151F88B3A15CC49577522E8D42D2643BF7B1A6
2,964,806 UART: [art] SIG.R = 6C5C8634EE4E8ACBFFFEEDDF92A400702C279E90C79DD726C69C8B3B6BFA0D50E9FEECC325CC76A33F888460E6CFFE9E
2,971,581 UART: [art] SIG.S = 21AC374111F1569205410700A51C3B9D506D56F5C5AEAF68D8B7FFBA799C7AF306E549DD99FFB38FE12B5E4D50C39F43
2,995,463 UART: Caliptra RT
2,995,716 UART: [state] CFI Enabled
3,102,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,551 UART: [rt]cmd =0x54514754, len=24
3,135,732 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
918,059 UART: [kat] HMAC-384Kdf
922,725 UART: [kat] LMS
1,171,053 UART: [kat] --
1,171,734 UART: [cold-reset] ++
1,172,086 UART: [fht] FHT @ 0x50003400
1,174,751 UART: [idev] ++
1,174,919 UART: [idev] CDI.KEYID = 6
1,175,279 UART: [idev] SUBJECT.KEYID = 7
1,175,703 UART: [idev] UDS.KEYID = 0
1,176,048 ready_for_fw is high
1,176,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,729 UART: [idev] Erasing UDS.KEYID = 0
1,200,832 UART: [idev] Sha1 KeyId Algorithm
1,209,404 UART: [idev] --
1,210,270 UART: [ldev] ++
1,210,438 UART: [ldev] CDI.KEYID = 6
1,210,801 UART: [ldev] SUBJECT.KEYID = 5
1,211,227 UART: [ldev] AUTHORITY.KEYID = 7
1,211,690 UART: [ldev] FE.KEYID = 1
1,217,192 UART: [ldev] Erasing FE.KEYID = 1
1,244,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,072 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,121 >>> mbox cmd response: success
2,776,121 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,209 UART: [afmc] ++
2,777,377 UART: [afmc] CDI.KEYID = 6
2,777,739 UART: [afmc] SUBJECT.KEYID = 7
2,778,164 UART: [afmc] AUTHORITY.KEYID = 5
2,814,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,316 UART: [afmc] --
2,857,394 UART: [cold-reset] --
2,857,970 UART: [state] Locking Datavault
2,859,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,689 UART: [state] Locking ICCM
2,860,283 UART: [exit] Launching FMC @ 0x40000130
2,865,612 UART:
2,865,628 UART: Running Caliptra FMC ...
2,866,036 UART:
2,866,179 UART: [state] CFI Enabled
2,876,876 UART: [fht] FMC Alias Private Key: 7
2,985,135 UART: [art] Extend RT PCRs Done
2,985,563 UART: [art] Lock RT PCRs Done
2,987,103 UART: [art] Populate DV Done
2,995,284 UART: [fht] FMC Alias Private Key: 7
2,996,464 UART: [art] Derive CDI
2,996,744 UART: [art] Store in in slot 0x4
3,082,379 UART: [art] Derive Key Pair
3,082,739 UART: [art] Store priv key in slot 0x5
3,095,639 UART: [art] Derive Key Pair - Done
3,110,092 UART: [art] Signing Cert with AUTHO
3,110,572 UART: RITY.KEYID = 7
3,125,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,355 UART: [art] PUB.X = 78F446A904EFD15EF9BABDE0179C41427FF0944E636EAAFDE569087816061D9A26608B76C9D2EECD0933D1D65131C474
3,133,119 UART: [art] PUB.Y = D08C6152BFBADEE505D697FA1825EE9786C51BA7B5859EFC740EB24BEFE5E749DAE33BF54ED9A0BBC70638FE2D002AE1
3,140,064 UART: [art] SIG.R = 1A195582F1FFBDA92AE7FF61B1580D0213D180FEEABBB3841E80E94B280258313339F11FA6AEA61F01B78F00B3F10257
3,146,805 UART: [art] SIG.S = BBE93A58FD9ACA2368F61D612A05F17586FE264F4C89EEA73B61325D23FC29EDA5BD8E965E71A2EB17DBF10C345F7EA4
3,170,426 UART: Caliptra RT
3,170,771 UART: [state] CFI Enabled
3,279,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,506 UART: [rt]cmd =0x54514754, len=24
3,312,377 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,578 ready_for_fw is high
1,060,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,964 >>> mbox cmd response: success
2,627,964 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,804 UART:
2,689,820 UART: Running Caliptra FMC ...
2,690,228 UART:
2,690,371 UART: [state] CFI Enabled
2,701,066 UART: [fht] FMC Alias Private Key: 7
2,809,029 UART: [art] Extend RT PCRs Done
2,809,457 UART: [art] Lock RT PCRs Done
2,811,197 UART: [art] Populate DV Done
2,819,556 UART: [fht] FMC Alias Private Key: 7
2,820,684 UART: [art] Derive CDI
2,820,964 UART: [art] Store in in slot 0x4
2,906,515 UART: [art] Derive Key Pair
2,906,875 UART: [art] Store priv key in slot 0x5
2,920,167 UART: [art] Derive Key Pair - Done
2,935,001 UART: [art] Signing Cert with AUTHO
2,935,481 UART: RITY.KEYID = 7
2,950,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,432 UART: [art] PUB.X = EE5A253BD94D703DC5DD2A63A4695058207543061CB6AC0257336C5009ECFC6335AD7411866EEE5722A9C2E13ACC5137
2,958,195 UART: [art] PUB.Y = DA1A93134FDC8345E269F6EEAAF9B3A33169C32D50B8DEFE1AF4645FAD54E6C01D1EC15E8B2D317E0FC5CC222DC27337
2,965,164 UART: [art] SIG.R = B15FF1E759582B6580807DA58B655CF6958063001E409793B0FDA3FF4546AE299B0E9C87ADC3F890683F67931AEB711C
2,971,909 UART: [art] SIG.S = 7969867EA5905DCBD3F92D5F6C5FDA2B1F1468D62A4D831841AC767753423F3F600B25C18D2DB9A4C002C7F6F10E5C7E
2,996,313 UART: Caliptra RT
2,996,658 UART: [state] CFI Enabled
3,104,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,981 UART: [rt]cmd =0x54514754, len=24
3,136,764 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,100 UART: [kat] SHA2-256
890,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,779 UART: [kat] ++
894,931 UART: [kat] sha1
899,207 UART: [kat] SHA2-256
901,147 UART: [kat] SHA2-384
903,934 UART: [kat] SHA2-512-ACC
905,835 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,118 UART: [kat] LMS
1,168,430 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,527 UART: [idev] ++
1,172,695 UART: [idev] CDI.KEYID = 6
1,173,056 UART: [idev] SUBJECT.KEYID = 7
1,173,481 UART: [idev] UDS.KEYID = 0
1,173,827 ready_for_fw is high
1,173,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,168 >>> mbox cmd response: success
2,774,168 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,185 UART: [afmc] ++
2,775,353 UART: [afmc] CDI.KEYID = 6
2,775,716 UART: [afmc] SUBJECT.KEYID = 7
2,776,142 UART: [afmc] AUTHORITY.KEYID = 5
2,812,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,202 UART: [afmc] --
2,856,186 UART: [cold-reset] --
2,856,882 UART: [state] Locking Datavault
2,857,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,477 UART: [state] Locking ICCM
2,859,117 UART: [exit] Launching FMC @ 0x40000130
2,864,446 UART:
2,864,462 UART: Running Caliptra FMC ...
2,864,870 UART:
2,864,924 UART: [state] CFI Enabled
2,875,191 UART: [fht] FMC Alias Private Key: 7
2,982,702 UART: [art] Extend RT PCRs Done
2,983,130 UART: [art] Lock RT PCRs Done
2,984,578 UART: [art] Populate DV Done
2,992,949 UART: [fht] FMC Alias Private Key: 7
2,994,127 UART: [art] Derive CDI
2,994,407 UART: [art] Store in in slot 0x4
3,079,724 UART: [art] Derive Key Pair
3,080,084 UART: [art] Store priv key in slot 0x5
3,093,434 UART: [art] Derive Key Pair - Done
3,108,167 UART: [art] Signing Cert with AUTHO
3,108,647 UART: RITY.KEYID = 7
3,123,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,640 UART: [art] PUB.X = E3C87BE660A9773B97107DC3B429C43DC7B146056250C54695905A5080CA8D3A38C693D0CF67CE4833DBB88DBEF76F15
3,131,411 UART: [art] PUB.Y = C03E0F1537E2A6FEC109F56ED0B1CA2F76B5E12B4878A75D1B86143E8CAD6D734388CD4A4AF8CFD420B880F9C8088044
3,138,364 UART: [art] SIG.R = 18D835C1E7F67A3A0FA7323D18718AA672D98AD0FE25A7D78180D5B955FE80F19F8CCD3766255B795E9FB164BB5611FD
3,145,139 UART: [art] SIG.S = BAA1EF0862853DAF0DD890D4C3E9E77A3BF255E7EA02E95E3294198FE955769F15E4D734AC4D3AF2E805B6AEDA2B671A
3,169,152 UART: Caliptra RT
3,169,405 UART: [state] CFI Enabled
3,276,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,014 UART: [rt]cmd =0x54514754, len=24
3,309,045 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,984 ready_for_fw is high
1,055,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,356 >>> mbox cmd response: success
2,623,356 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,040 UART:
2,685,056 UART: Running Caliptra FMC ...
2,685,464 UART:
2,685,518 UART: [state] CFI Enabled
2,696,503 UART: [fht] FMC Alias Private Key: 7
2,804,486 UART: [art] Extend RT PCRs Done
2,804,914 UART: [art] Lock RT PCRs Done
2,806,658 UART: [art] Populate DV Done
2,814,817 UART: [fht] FMC Alias Private Key: 7
2,815,857 UART: [art] Derive CDI
2,816,137 UART: [art] Store in in slot 0x4
2,901,794 UART: [art] Derive Key Pair
2,902,154 UART: [art] Store priv key in slot 0x5
2,915,394 UART: [art] Derive Key Pair - Done
2,930,177 UART: [art] Signing Cert with AUTHO
2,930,657 UART: RITY.KEYID = 7
2,945,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,724 UART: [art] PUB.X = 12407F42978E36CBF3A71200FEB47814F1694005239C3F443CF7C8382DA92E260A3B28318750D8CD7F651162F181AA14
2,953,458 UART: [art] PUB.Y = 2ABA490C888B01E1F71C1D89D3503BCE35DD7D871F5F1A6E81B963EB09E1D07BD2602F178BB4F043EBEDEE13022E4046
2,960,410 UART: [art] SIG.R = 216B601ABE79A5B9A1EF7DBB067244E5296A20A3EA737801A37C219DE3C0B333973540EE0A31D51891AFB8B5AFC8641C
2,967,179 UART: [art] SIG.S = 10419B4CE82A21C94845E5B2B76B7B71F4EB5D8B99B469AD800A9E0BB127C1176BD24B2FAAA84796EC5AA2D2209445B0
2,990,592 UART: Caliptra RT
2,990,845 UART: [state] CFI Enabled
3,098,404 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,112 UART: [rt]cmd =0x54514754, len=24
3,131,041 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,174,792 ready_for_fw is high
1,174,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,400 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,765 UART: [fwproc] Wait for Commands...
1,282,494 UART: [fwproc] Recv command 0x46574c44
1,283,227 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,691 >>> mbox cmd response: success
2,773,691 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,886 UART: [afmc] ++
2,775,054 UART: [afmc] CDI.KEYID = 6
2,775,417 UART: [afmc] SUBJECT.KEYID = 7
2,775,843 UART: [afmc] AUTHORITY.KEYID = 5
2,811,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,921 UART: [afmc] --
2,854,929 UART: [cold-reset] --
2,855,885 UART: [state] Locking Datavault
2,857,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,924 UART: [state] Locking ICCM
2,858,344 UART: [exit] Launching FMC @ 0x40000130
2,863,673 UART:
2,863,689 UART: Running Caliptra FMC ...
2,864,097 UART:
2,864,240 UART: [state] CFI Enabled
2,874,837 UART: [fht] FMC Alias Private Key: 7
2,982,120 UART: [art] Extend RT PCRs Done
2,982,548 UART: [art] Lock RT PCRs Done
2,984,262 UART: [art] Populate DV Done
2,992,587 UART: [fht] FMC Alias Private Key: 7
2,993,525 UART: [art] Derive CDI
2,993,805 UART: [art] Store in in slot 0x4
3,079,510 UART: [art] Derive Key Pair
3,079,870 UART: [art] Store priv key in slot 0x5
3,092,924 UART: [art] Derive Key Pair - Done
3,107,683 UART: [art] Signing Cert with AUTHO
3,108,163 UART: RITY.KEYID = 7
3,123,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,026 UART: [art] PUB.X = 220BA71A971D1E63E6C0015DAA6BD975529C68E114554934269952DE5FBD4D50EB093C7CAB098926226DCFCB8C1331EB
3,130,790 UART: [art] PUB.Y = 245FAA58B19A8AAAC0E6FE5163BD2AC5903B993B7B98ACF8A468F061F648F4B0C65170449CD9C765296215AC4C9A8CE7
3,137,752 UART: [art] SIG.R = 168CC6B99D8FEAA0A3172F6F5E0C07BBA39D9872C2C0BF7E55AE312E1644D4C85607CE84DD3A09724B3F45D666C9F510
3,144,522 UART: [art] SIG.S = 0EE02F8277C0BBAADD0A6A28206A4C014B96A21C7FCF85AB6BCD19F8FCEB2FA5CE5E2D42FDBE0BF23C98B4B7F57C7E76
3,168,045 UART: Caliptra RT
3,168,390 UART: [state] CFI Enabled
3,276,267 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,077 UART: [rt]cmd =0x54514754, len=24
3,308,936 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,467 ready_for_fw is high
1,056,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,295 >>> mbox cmd response: success
2,625,295 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,453 UART:
2,687,469 UART: Running Caliptra FMC ...
2,687,877 UART:
2,688,020 UART: [state] CFI Enabled
2,699,075 UART: [fht] FMC Alias Private Key: 7
2,807,138 UART: [art] Extend RT PCRs Done
2,807,566 UART: [art] Lock RT PCRs Done
2,808,806 UART: [art] Populate DV Done
2,817,067 UART: [fht] FMC Alias Private Key: 7
2,818,017 UART: [art] Derive CDI
2,818,297 UART: [art] Store in in slot 0x4
2,903,726 UART: [art] Derive Key Pair
2,904,086 UART: [art] Store priv key in slot 0x5
2,917,068 UART: [art] Derive Key Pair - Done
2,931,985 UART: [art] Signing Cert with AUTHO
2,932,465 UART: RITY.KEYID = 7
2,947,673 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,438 UART: [art] PUB.X = 52349DEAAE2B26A73FECDF906A71B704A1DC27B9B020D99777AA0A1C7A04CD04F55B6398A2DCFCF240A3A028B23BEA6E
2,955,218 UART: [art] PUB.Y = 37AF45FD694CF1F07EA7F46E27B2AD43781E74D45B7721556767C84C73ED8AE1874385E746D4E2B2F4E47AA79CB91B51
2,962,174 UART: [art] SIG.R = 1DEDBEEE13BB75981765D63C67EBA0369BF2DCA494EFB974DB982485A5A92C990D89C49114AFC0DF8E93999A5D8054D2
2,968,955 UART: [art] SIG.S = 2305EA2B3C92A047B69160BBE60B3D730741877F67294BA148C03FCB11655B459E3E3EDACFBBF13ABDD7A8627E559ED4
2,992,973 UART: Caliptra RT
2,993,318 UART: [state] CFI Enabled
3,101,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,521 UART: [rt]cmd =0x54514754, len=24
3,134,626 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,214 UART:
192,589 UART: Running Caliptra ROM ...
193,784 UART:
193,950 UART: [state] CFI Enabled
263,372 UART: [state] LifecycleState = Unprovisioned
265,282 UART: [state] DebugLocked = No
267,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,082 UART: [kat] SHA2-256
442,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,313 UART: [kat] ++
453,846 UART: [kat] sha1
464,236 UART: [kat] SHA2-256
466,958 UART: [kat] SHA2-384
472,806 UART: [kat] SHA2-512-ACC
475,170 UART: [kat] ECC-384
2,767,589 UART: [kat] HMAC-384Kdf
2,780,754 UART: [kat] LMS
3,971,072 UART: [kat] --
3,976,237 UART: [cold-reset] ++
3,978,812 UART: [fht] Storing FHT @ 0x50003400
3,989,868 UART: [idev] ++
3,990,440 UART: [idev] CDI.KEYID = 6
3,991,443 UART: [idev] SUBJECT.KEYID = 7
3,992,617 UART: [idev] UDS.KEYID = 0
3,993,670 ready_for_fw is high
3,993,888 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,524 UART: [idev] Erasing UDS.KEYID = 0
7,327,580 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,428 UART: [idev] --
7,353,689 UART: [ldev] ++
7,354,258 UART: [ldev] CDI.KEYID = 6
7,355,198 UART: [ldev] SUBJECT.KEYID = 5
7,356,410 UART: [ldev] AUTHORITY.KEYID = 7
7,357,692 UART: [ldev] FE.KEYID = 1
7,402,936 UART: [ldev] Erasing FE.KEYID = 1
10,733,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,322 UART: [ldev] --
13,098,369 UART: [fwproc] Waiting for Commands...
13,101,165 UART: [fwproc] Received command 0x46574c44
13,103,343 UART: [fwproc] Received Image of size 114124 bytes
17,161,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,491 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,624,499 >>> mbox cmd response: success
17,625,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,628,189 UART: [afmc] ++
17,628,826 UART: [afmc] CDI.KEYID = 6
17,629,710 UART: [afmc] SUBJECT.KEYID = 7
17,630,980 UART: [afmc] AUTHORITY.KEYID = 5
20,990,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,053 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,342 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,761 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,568 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,026 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,351 UART: [afmc] --
23,357,002 UART: [cold-reset] --
23,361,517 UART: [state] Locking Datavault
23,367,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,320 UART: [state] Locking ICCM
23,371,943 UART: [exit] Launching FMC @ 0x40000130
23,380,340 UART:
23,380,576 UART: Running Caliptra FMC ...
23,381,676 UART:
23,381,834 UART: [state] CFI Enabled
23,446,868 UART: [fht] FMC Alias Private Key: 7
25,784,453 UART: [art] Extend RT PCRs Done
25,785,678 UART: [art] Lock RT PCRs Done
25,787,166 UART: [art] Populate DV Done
25,792,575 UART: [fht] FMC Alias Private Key: 7
25,794,113 UART: [art] Derive CDI
25,794,931 UART: [art] Store in in slot 0x4
25,854,920 UART: [art] Derive Key Pair
25,855,951 UART: [art] Store priv key in slot 0x5
29,148,890 UART: [art] Derive Key Pair - Done
29,162,156 UART: [art] Signing Cert with AUTHO
29,163,472 UART: RITY.KEYID = 7
31,450,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,306 UART: [art] PUB.X = 1E9176E2148C250578AF38CB44FBA9ADD49BAD7E81CA76BAC16B9156703E064FF6DBAE6421D1A9775D3BAEA133474039
31,459,513 UART: [art] PUB.Y = 548A49FA19B2AC2FDC9C805EEC681DE26AC5F8CF70B6A0B7F915601B84099907F42BB24B306D9C3FBB48DC4980622C35
31,466,806 UART: [art] SIG.R = F418CCAAFD4E1B3AF06924B0944964200DD7C2339695EB2D16EB15065BE36BF1B913D9F30AA1032E9170AFAE761E759E
31,474,161 UART: [art] SIG.S = 9ADCF58C4B1554001898B85CCBF670DB8FF73926C24BF716D6111ED5DD9A23D75919877938848057259FD522A9465231
32,779,915 UART: Caliptra RT
32,780,625 UART: [state] CFI Enabled
32,941,449 UART: [rt] RT listening for mailbox commands...
32,973,243 UART: [rt]cmd =0x44504543, len=96
33,021,446 >>> mbox cmd response data (56 bytes)
33,022,617 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,052,560 UART: [rt]cmd =0x54514754, len=24
33,054,958 >>> mbox cmd response: failed
33,055,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,085,180 UART: [rt]cmd =0x54514754, len=24
33,087,890 >>> mbox cmd response data (8 bytes)
33,088,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,118,950 UART: [rt]cmd =0x44504543, len=96
33,170,601 >>> mbox cmd response data (56 bytes)
33,171,331 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,200,998 UART: [rt]cmd =0x47544744, len=8
33,203,947 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,783,995 ready_for_fw is high
3,784,651 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,880 >>> mbox cmd response: success
17,872,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,572,179 UART:
23,572,598 UART: Running Caliptra FMC ...
23,573,710 UART:
23,573,871 UART: [state] CFI Enabled
23,641,293 UART: [fht] FMC Alias Private Key: 7
25,978,986 UART: [art] Extend RT PCRs Done
25,980,209 UART: [art] Lock RT PCRs Done
25,981,815 UART: [art] Populate DV Done
25,987,340 UART: [fht] FMC Alias Private Key: 7
25,988,885 UART: [art] Derive CDI
25,989,621 UART: [art] Store in in slot 0x4
26,049,994 UART: [art] Derive Key Pair
26,051,059 UART: [art] Store priv key in slot 0x5
29,343,621 UART: [art] Derive Key Pair - Done
29,356,681 UART: [art] Signing Cert with AUTHO
29,357,991 UART: RITY.KEYID = 7
31,644,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,294 UART: [art] PUB.X = BCDA22AE658EB4D2139E2712DEC783B5C662B8105CE487DFD364443D3F47B0372C8423852351C7DBA018AC2CEEADAE9B
31,653,543 UART: [art] PUB.Y = DA6E1B1135875C53B4E9003E9BD838AC55BDF6E110E1E6EA4446D57D67D685F3F3D0369BEB2E0F32EA70F5564CCE15FE
31,660,792 UART: [art] SIG.R = 488DA9B003580035DCEA2E1A226E054B23A3405DE1303A1D22A70B3CE9EDCC87FC522B81BE7C5AC3D833364B0E0CFFEA
31,668,187 UART: [art] SIG.S = EAE709B4A09964EC59060027FD32D4F5301754DC77838BBE7275C432AC79C1C7A39ED1A4EA2AAADF90875BE6DFB57325
32,973,139 UART: Caliptra RT
32,973,841 UART: [state] CFI Enabled
33,133,320 UART: [rt] RT listening for mailbox commands...
33,165,510 UART: [rt]cmd =0x44504543, len=96
33,213,951 >>> mbox cmd response data (56 bytes)
33,215,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,245,189 UART: [rt]cmd =0x54514754, len=24
33,247,767 >>> mbox cmd response: failed
33,248,189 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,277,997 UART: [rt]cmd =0x54514754, len=24
33,280,872 >>> mbox cmd response data (8 bytes)
33,281,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,311,785 UART: [rt]cmd =0x44504543, len=96
33,363,098 >>> mbox cmd response data (56 bytes)
33,363,812 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,393,727 UART: [rt]cmd =0x47544744, len=8
33,396,752 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,350 UART:
192,727 UART: Running Caliptra ROM ...
193,815 UART:
603,624 UART: [state] CFI Enabled
615,302 UART: [state] LifecycleState = Unprovisioned
617,256 UART: [state] DebugLocked = No
620,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,937 UART: [kat] SHA2-256
794,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,202 UART: [kat] ++
805,801 UART: [kat] sha1
817,314 UART: [kat] SHA2-256
819,994 UART: [kat] SHA2-384
826,561 UART: [kat] SHA2-512-ACC
828,924 UART: [kat] ECC-384
3,110,970 UART: [kat] HMAC-384Kdf
3,122,866 UART: [kat] LMS
4,312,941 UART: [kat] --
4,317,097 UART: [cold-reset] ++
4,318,178 UART: [fht] Storing FHT @ 0x50003400
4,328,955 UART: [idev] ++
4,329,588 UART: [idev] CDI.KEYID = 6
4,330,475 UART: [idev] SUBJECT.KEYID = 7
4,331,714 UART: [idev] UDS.KEYID = 0
4,332,791 ready_for_fw is high
4,333,012 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,415 UART: [idev] Erasing UDS.KEYID = 0
7,622,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,924 UART: [idev] --
7,646,753 UART: [ldev] ++
7,647,319 UART: [ldev] CDI.KEYID = 6
7,648,254 UART: [ldev] SUBJECT.KEYID = 5
7,649,456 UART: [ldev] AUTHORITY.KEYID = 7
7,650,739 UART: [ldev] FE.KEYID = 1
7,663,352 UART: [ldev] Erasing FE.KEYID = 1
10,957,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,575 UART: [ldev] --
13,317,826 UART: [fwproc] Waiting for Commands...
13,320,941 UART: [fwproc] Received command 0x46574c44
13,323,174 UART: [fwproc] Received Image of size 114124 bytes
17,372,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,646 >>> mbox cmd response: success
17,829,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,831,925 UART: [afmc] ++
17,832,506 UART: [afmc] CDI.KEYID = 6
17,833,436 UART: [afmc] SUBJECT.KEYID = 7
17,834,699 UART: [afmc] AUTHORITY.KEYID = 5
21,149,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,002 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,442 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,249 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,662 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,714 UART: [afmc] --
23,517,273 UART: [cold-reset] --
23,520,045 UART: [state] Locking Datavault
23,526,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,846 UART: [state] Locking ICCM
23,529,347 UART: [exit] Launching FMC @ 0x40000130
23,537,743 UART:
23,538,021 UART: Running Caliptra FMC ...
23,539,134 UART:
23,539,292 UART: [state] CFI Enabled
23,547,121 UART: [fht] FMC Alias Private Key: 7
25,878,259 UART: [art] Extend RT PCRs Done
25,879,468 UART: [art] Lock RT PCRs Done
25,881,243 UART: [art] Populate DV Done
25,886,708 UART: [fht] FMC Alias Private Key: 7
25,888,293 UART: [art] Derive CDI
25,889,018 UART: [art] Store in in slot 0x4
25,931,436 UART: [art] Derive Key Pair
25,932,430 UART: [art] Store priv key in slot 0x5
29,174,296 UART: [art] Derive Key Pair - Done
29,187,448 UART: [art] Signing Cert with AUTHO
29,188,741 UART: RITY.KEYID = 7
31,467,790 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,297 UART: [art] PUB.X = 2497C2A1AC13FD7481CDB48877CE7A5990D524959A093AFB4A9C1DF16416C8F1351AF9A489E2DBD4D84772344BF3D4ED
31,476,536 UART: [art] PUB.Y = 30C16598FDAB524AA9B13F8DA03E782A2BB0F0FF7D4BFA401B0AA1B27F013FB70B50E57E5510095325247D197490A3B1
31,483,816 UART: [art] SIG.R = 19D6E22CB1361165E198A78D3F72BE39CB2D614BC6124093CB119CB9A0396721E9BDA635A294273926101EF4B4B6F379
31,491,144 UART: [art] SIG.S = 0AD9DA7CC72BB45B3674295F451806CF796D0FE8A73C09B5E99C2E495F6C1C6A408927D893E6D73008F6FC2832F60D37
32,796,766 UART: Caliptra RT
32,797,468 UART: [state] CFI Enabled
32,915,532 UART: [rt] RT listening for mailbox commands...
32,947,214 UART: [rt]cmd =0x44504543, len=96
32,984,133 >>> mbox cmd response data (56 bytes)
32,985,272 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,015,139 UART: [rt]cmd =0x54514754, len=24
33,017,671 >>> mbox cmd response: failed
33,018,123 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,047,971 UART: [rt]cmd =0x54514754, len=24
33,050,454 >>> mbox cmd response data (8 bytes)
33,050,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,081,499 UART: [rt]cmd =0x44504543, len=96
33,117,773 >>> mbox cmd response data (56 bytes)
33,118,470 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,148,150 UART: [rt]cmd =0x47544744, len=8
33,150,842 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,123,093 ready_for_fw is high
4,123,486 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,056,051 >>> mbox cmd response: success
18,056,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,692,190 UART:
23,692,573 UART: Running Caliptra FMC ...
23,693,706 UART:
23,693,859 UART: [state] CFI Enabled
23,701,866 UART: [fht] FMC Alias Private Key: 7
26,032,876 UART: [art] Extend RT PCRs Done
26,034,095 UART: [art] Lock RT PCRs Done
26,036,101 UART: [art] Populate DV Done
26,041,401 UART: [fht] FMC Alias Private Key: 7
26,043,101 UART: [art] Derive CDI
26,044,126 UART: [art] Store in in slot 0x4
26,086,550 UART: [art] Derive Key Pair
26,087,552 UART: [art] Store priv key in slot 0x5
29,329,852 UART: [art] Derive Key Pair - Done
29,342,701 UART: [art] Signing Cert with AUTHO
29,344,006 UART: RITY.KEYID = 7
31,623,187 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,693 UART: [art] PUB.X = 9EF88EB71431BE27E7CABF96D9A0565F67E93CBCCF3A5232F7C506BE28DC629DF1DC27DC7A4E94D006903F4799BFBCD1
31,631,938 UART: [art] PUB.Y = 8925A0BC99DCBAA9DC4501F1C9C9849B096613817BDD1E4B7BC57A155C2404EEF1118CD5FA9597DA51603C5CDA3C8FE9
31,639,200 UART: [art] SIG.R = A6273D1D88718E83953DA194863A808AB3CCB74A3B175D84E13B3CEE5BC5B866E73CFEBA0FCFC106F4B13B1DB6B7F21E
31,646,641 UART: [art] SIG.S = 9FD4212A24876D60422A8AC3377398A22B3224EC7867C0698F6BA5CDA1BFAB63931BAF4E7F2FCF92495334A4980C2795
32,951,868 UART: Caliptra RT
32,952,578 UART: [state] CFI Enabled
33,069,638 UART: [rt] RT listening for mailbox commands...
33,101,730 UART: [rt]cmd =0x44504543, len=96
33,137,230 >>> mbox cmd response data (56 bytes)
33,138,544 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,168,480 UART: [rt]cmd =0x54514754, len=24
33,170,824 >>> mbox cmd response: failed
33,171,248 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,200,874 UART: [rt]cmd =0x54514754, len=24
33,203,305 >>> mbox cmd response data (8 bytes)
33,203,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,244 UART: [rt]cmd =0x44504543, len=96
33,269,624 >>> mbox cmd response data (56 bytes)
33,270,355 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,299,806 UART: [rt]cmd =0x47544744, len=8
33,303,111 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,982 UART:
192,390 UART: Running Caliptra ROM ...
193,537 UART:
193,686 UART: [state] CFI Enabled
254,686 UART: [state] LifecycleState = Unprovisioned
256,536 UART: [state] DebugLocked = No
258,732 UART: [state] WD Timer not started. Device not locked for debugging
262,139 UART: [kat] SHA2-256
441,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,828 UART: [kat] ++
453,284 UART: [kat] sha1
464,369 UART: [kat] SHA2-256
467,448 UART: [kat] SHA2-384
473,656 UART: [kat] SHA2-512-ACC
476,590 UART: [kat] ECC-384
2,932,461 UART: [kat] HMAC-384Kdf
2,957,830 UART: [kat] LMS
3,487,268 UART: [kat] --
3,492,771 UART: [cold-reset] ++
3,495,293 UART: [fht] FHT @ 0x50003400
3,506,197 UART: [idev] ++
3,506,768 UART: [idev] CDI.KEYID = 6
3,507,700 UART: [idev] SUBJECT.KEYID = 7
3,508,877 UART: [idev] UDS.KEYID = 0
3,509,922 ready_for_fw is high
3,510,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,654,147 UART: [idev] Erasing UDS.KEYID = 0
6,012,826 UART: [idev] Sha1 KeyId Algorithm
6,035,302 UART: [idev] --
6,038,652 UART: [ldev] ++
6,039,230 UART: [ldev] CDI.KEYID = 6
6,040,143 UART: [ldev] SUBJECT.KEYID = 5
6,041,306 UART: [ldev] AUTHORITY.KEYID = 7
6,042,535 UART: [ldev] FE.KEYID = 1
6,085,862 UART: [ldev] Erasing FE.KEYID = 1
8,592,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,682 UART: [ldev] --
10,399,241 UART: [fwproc] Wait for Commands...
10,401,880 UART: [fwproc] Recv command 0x46574c44
10,403,918 UART: [fwproc] Recv'd Img size: 114448 bytes
13,803,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,259,888 >>> mbox cmd response: success
14,260,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,263,463 UART: [afmc] ++
14,264,079 UART: [afmc] CDI.KEYID = 6
14,265,002 UART: [afmc] SUBJECT.KEYID = 7
14,266,172 UART: [afmc] AUTHORITY.KEYID = 5
16,796,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,517,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,519,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,535,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,551,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,567,219 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,590,631 UART: [afmc] --
18,594,707 UART: [cold-reset] --
18,597,916 UART: [state] Locking Datavault
18,603,431 UART: [state] Locking PCR0, PCR1 and PCR31
18,605,070 UART: [state] Locking ICCM
18,607,494 UART: [exit] Launching FMC @ 0x40000130
18,615,948 UART:
18,616,219 UART: Running Caliptra FMC ...
18,617,327 UART:
18,617,484 UART: [state] CFI Enabled
18,676,887 UART: [fht] FMC Alias Private Key: 7
20,440,922 UART: [art] Extend RT PCRs Done
20,442,137 UART: [art] Lock RT PCRs Done
20,443,541 UART: [art] Populate DV Done
20,449,326 UART: [fht] FMC Alias Private Key: 7
20,451,007 UART: [art] Derive CDI
20,451,788 UART: [art] Store in in slot 0x4
20,509,232 UART: [art] Derive Key Pair
20,510,231 UART: [art] Store priv key in slot 0x5
22,973,866 UART: [art] Derive Key Pair - Done
22,986,849 UART: [art] Signing Cert with AUTHO
22,988,150 UART: RITY.KEYID = 7
24,699,679 UART: [art] Erasing AUTHORITY.KEYID = 7
24,701,170 UART: [art] PUB.X = 2F67B492D368C06842702AF389A4EFBA6F97D965BE6704C486923FF9CD08372820A5BD31772961B6691C99113D9E0150
24,708,412 UART: [art] PUB.Y = 520E4130C3A662A9A85A48BE7CCB97C26EEB19403C2E3DE63FEB6C6DF3B28CD72160597B44E07D30044D249A37C3A7FB
24,715,696 UART: [art] SIG.R = F0F67A4D1E5A2D5A6DFA645A4920C5EE1F267DD472F066E7E2EAC41EFCACFE321A543D6F9E7AC3F99486E6F31FCC44AA
24,723,135 UART: [art] SIG.S = BB6245F4F3BCABEEB4D48DC32A497433DA07CA3280A9E0FE6979C037476F9F36D9FA0AAFE0CB6ACF8D1F1A6CDEF1FB71
25,702,175 UART: Caliptra RT
25,702,882 UART: [state] CFI Enabled
25,868,414 UART: [rt] RT listening for mailbox commands...
25,900,572 UART: [rt]cmd =0x44504543, len=96
25,948,436 >>> mbox cmd response data (56 bytes)
25,949,701 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,979,537 UART: [rt]cmd =0x54514754, len=24
25,981,874 >>> mbox cmd response: failed
25,982,305 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,012,150 UART: [rt]cmd =0x54514754, len=24
26,014,915 >>> mbox cmd response data (8 bytes)
26,015,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,045,932 UART: [rt]cmd =0x44504543, len=96
26,098,176 >>> mbox cmd response data (56 bytes)
26,098,912 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,128,638 UART: [rt]cmd =0x47544744, len=8
26,131,500 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,383,517 ready_for_fw is high
3,383,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,190 >>> mbox cmd response: success
14,064,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,344,655 UART:
18,345,042 UART: Running Caliptra FMC ...
18,346,246 UART:
18,346,416 UART: [state] CFI Enabled
18,413,319 UART: [fht] FMC Alias Private Key: 7
20,177,585 UART: [art] Extend RT PCRs Done
20,178,808 UART: [art] Lock RT PCRs Done
20,180,217 UART: [art] Populate DV Done
20,185,355 UART: [fht] FMC Alias Private Key: 7
20,187,005 UART: [art] Derive CDI
20,187,827 UART: [art] Store in in slot 0x4
20,246,156 UART: [art] Derive Key Pair
20,247,192 UART: [art] Store priv key in slot 0x5
22,710,096 UART: [art] Derive Key Pair - Done
22,722,937 UART: [art] Signing Cert with AUTHO
22,724,236 UART: RITY.KEYID = 7
24,436,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,948 UART: [art] PUB.X = 01101CE41923F040A98E942E2AB5D6E45FA82691AAB369E30C33F145DBD24721342EF90B08D0B1F1FEAFC25D64B7C638
24,445,258 UART: [art] PUB.Y = 9ADDD4D70E7B96267BE0D48326BFD9DF2619E1A763F3AFAF57984B9924B7EC9629798221B5779F51CAC3E77215F09545
24,452,542 UART: [art] SIG.R = AAF05D703C1C36E12B748763EDD564B35CE7DFF27CA57520726BAB9F68ED56C49C8A95EB13894404674CDC13A56F681B
24,459,885 UART: [art] SIG.S = 1A5806D5BB7B5573E15298E9E710231A26B0A9DA1B1FBE9D03DA61B033BA4848E242ED9243521CB63B3BCC8AD6332577
25,439,039 UART: Caliptra RT
25,439,773 UART: [state] CFI Enabled
25,605,484 UART: [rt] RT listening for mailbox commands...
25,637,471 UART: [rt]cmd =0x44504543, len=96
25,685,373 >>> mbox cmd response data (56 bytes)
25,686,901 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,716,905 UART: [rt]cmd =0x54514754, len=24
25,719,118 >>> mbox cmd response: failed
25,719,767 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,749,783 UART: [rt]cmd =0x54514754, len=24
25,752,216 >>> mbox cmd response data (8 bytes)
25,752,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,783,128 UART: [rt]cmd =0x44504543, len=96
25,834,454 >>> mbox cmd response data (56 bytes)
25,835,172 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,864,746 UART: [rt]cmd =0x47544744, len=8
25,867,929 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,292 UART:
192,676 UART: Running Caliptra ROM ...
193,786 UART:
603,209 UART: [state] CFI Enabled
614,094 UART: [state] LifecycleState = Unprovisioned
615,982 UART: [state] DebugLocked = No
617,428 UART: [state] WD Timer not started. Device not locked for debugging
621,383 UART: [kat] SHA2-256
800,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,100 UART: [kat] ++
812,545 UART: [kat] sha1
824,682 UART: [kat] SHA2-256
827,755 UART: [kat] SHA2-384
834,381 UART: [kat] SHA2-512-ACC
837,378 UART: [kat] ECC-384
3,279,013 UART: [kat] HMAC-384Kdf
3,291,471 UART: [kat] LMS
3,820,960 UART: [kat] --
3,827,150 UART: [cold-reset] ++
3,827,935 UART: [fht] FHT @ 0x50003400
3,839,747 UART: [idev] ++
3,840,314 UART: [idev] CDI.KEYID = 6
3,841,259 UART: [idev] SUBJECT.KEYID = 7
3,842,423 UART: [idev] UDS.KEYID = 0
3,843,437 ready_for_fw is high
3,843,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,410 UART: [idev] Erasing UDS.KEYID = 0
6,314,932 UART: [idev] Sha1 KeyId Algorithm
6,336,650 UART: [idev] --
6,339,813 UART: [ldev] ++
6,340,387 UART: [ldev] CDI.KEYID = 6
6,341,292 UART: [ldev] SUBJECT.KEYID = 5
6,342,444 UART: [ldev] AUTHORITY.KEYID = 7
6,343,722 UART: [ldev] FE.KEYID = 1
6,355,600 UART: [ldev] Erasing FE.KEYID = 1
8,826,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,448 UART: [ldev] --
10,617,122 UART: [fwproc] Wait for Commands...
10,619,803 UART: [fwproc] Recv command 0x46574c44
10,621,886 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,247 >>> mbox cmd response: success
14,492,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,496,295 UART: [afmc] ++
14,496,876 UART: [afmc] CDI.KEYID = 6
14,497,782 UART: [afmc] SUBJECT.KEYID = 7
14,498,986 UART: [afmc] AUTHORITY.KEYID = 5
16,998,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,114 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,880 UART: [afmc] --
18,795,228 UART: [cold-reset] --
18,798,551 UART: [state] Locking Datavault
18,802,547 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,394 UART: [state] Locking ICCM
18,805,796 UART: [exit] Launching FMC @ 0x40000130
18,814,185 UART:
18,814,422 UART: Running Caliptra FMC ...
18,815,513 UART:
18,815,667 UART: [state] CFI Enabled
18,823,923 UART: [fht] FMC Alias Private Key: 7
20,580,315 UART: [art] Extend RT PCRs Done
20,581,880 UART: [art] Lock RT PCRs Done
20,583,186 UART: [art] Populate DV Done
20,588,395 UART: [fht] FMC Alias Private Key: 7
20,590,037 UART: [art] Derive CDI
20,590,767 UART: [art] Store in in slot 0x4
20,633,788 UART: [art] Derive Key Pair
20,634,780 UART: [art] Store priv key in slot 0x5
23,061,506 UART: [art] Derive Key Pair - Done
23,074,380 UART: [art] Signing Cert with AUTHO
23,075,692 UART: RITY.KEYID = 7
24,781,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,405 UART: [art] PUB.X = 46C0F8CB1EE49DC215C1496BC09FAFD8BC26D409B5775C3478A74F331309E9E06728F1020BAED1E8C6AF3CF4BAB91C03
24,790,326 UART: [art] PUB.Y = 7E4894059DD3A7D53A3B1F87104D550E10B74953C6F755782793CBA95A478013BA80BDEAAE4AC41CA861A857DB5841E0
24,797,608 UART: [art] SIG.R = 17AD2C8DE4C1A77F751D375DEA2ED8C035059BFD96A98174CFB504B06E0B28C1C7428629ACB039580DE48418F7B4D4C9
24,805,039 UART: [art] SIG.S = 46A40D0B48D915945CD35F0237F0F92D987A48B06C9A8A37D59AD9BC8186A8F809C723BB94CF4C6828BEF5D0A205EC67
25,784,129 UART: Caliptra RT
25,784,857 UART: [state] CFI Enabled
25,902,298 UART: [rt] RT listening for mailbox commands...
25,934,197 UART: [rt]cmd =0x44504543, len=96
25,970,289 >>> mbox cmd response data (56 bytes)
25,971,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,001,942 UART: [rt]cmd =0x54514754, len=24
26,004,212 >>> mbox cmd response: failed
26,004,781 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,034,694 UART: [rt]cmd =0x54514754, len=24
26,037,287 >>> mbox cmd response data (8 bytes)
26,037,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,068,578 UART: [rt]cmd =0x44504543, len=96
26,104,670 >>> mbox cmd response data (56 bytes)
26,105,411 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,135,026 UART: [rt]cmd =0x47544744, len=8
26,137,948 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,697,272 ready_for_fw is high
3,697,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,407 >>> mbox cmd response: success
14,275,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,522,131 UART:
18,522,527 UART: Running Caliptra FMC ...
18,523,620 UART:
18,523,762 UART: [state] CFI Enabled
18,531,718 UART: [fht] FMC Alias Private Key: 7
20,288,855 UART: [art] Extend RT PCRs Done
20,290,080 UART: [art] Lock RT PCRs Done
20,291,948 UART: [art] Populate DV Done
20,297,306 UART: [fht] FMC Alias Private Key: 7
20,298,838 UART: [art] Derive CDI
20,299,578 UART: [art] Store in in slot 0x4
20,341,976 UART: [art] Derive Key Pair
20,343,017 UART: [art] Store priv key in slot 0x5
22,770,012 UART: [art] Derive Key Pair - Done
22,783,161 UART: [art] Signing Cert with AUTHO
22,784,494 UART: RITY.KEYID = 7
24,490,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,609 UART: [art] PUB.X = 910932CF877F48B1492CE3CF1C7E2E49D5A667E9F27254D0F0B401511F0BBF2EDB3019F1D422B32EE9B578A38A557303
24,498,848 UART: [art] PUB.Y = A1742B6FB8231D4CBED7CFF3D1F0A6ADD301D9D3B7820EDB21EF1BDD40EF08A69F1ADC722B6F33DE71A41871B7632A3C
24,506,161 UART: [art] SIG.R = 9A186506644D0507DD9608E8A29EED75241FDB8B6A2B8724CE529501F7CE5B9D365A1A6792903C3021D588F9E4D26662
24,513,510 UART: [art] SIG.S = 01868F9DBED74258FE261EAF8DA74DEFDC61975CA8A1BCCD9B201B08F84B3AFAF4DF12786DFE49AA064372D8C77765B3
25,492,295 UART: Caliptra RT
25,493,010 UART: [state] CFI Enabled
25,610,915 UART: [rt] RT listening for mailbox commands...
25,643,354 UART: [rt]cmd =0x44504543, len=96
25,679,846 >>> mbox cmd response data (56 bytes)
25,681,245 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,711,536 UART: [rt]cmd =0x54514754, len=24
25,713,890 >>> mbox cmd response: failed
25,714,634 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,744,564 UART: [rt]cmd =0x54514754, len=24
25,746,980 >>> mbox cmd response data (8 bytes)
25,747,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,778,276 UART: [rt]cmd =0x44504543, len=96
25,815,188 >>> mbox cmd response data (56 bytes)
25,815,878 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,845,582 UART: [rt]cmd =0x47544744, len=8
25,848,661 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,210 UART:
192,568 UART: Running Caliptra ROM ...
193,786 UART:
193,941 UART: [state] CFI Enabled
263,725 UART: [state] LifecycleState = Unprovisioned
266,063 UART: [state] DebugLocked = No
268,026 UART: [state] WD Timer not started. Device not locked for debugging
272,062 UART: [kat] SHA2-256
461,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,703 UART: [kat] ++
473,192 UART: [kat] sha1
483,307 UART: [kat] SHA2-256
486,302 UART: [kat] SHA2-384
491,305 UART: [kat] SHA2-512-ACC
493,884 UART: [kat] ECC-384
2,946,726 UART: [kat] HMAC-384Kdf
2,970,622 UART: [kat] LMS
3,502,427 UART: [kat] --
3,508,052 UART: [cold-reset] ++
3,509,628 UART: [fht] FHT @ 0x50003400
3,520,057 UART: [idev] ++
3,520,738 UART: [idev] CDI.KEYID = 6
3,521,626 UART: [idev] SUBJECT.KEYID = 7
3,522,870 UART: [idev] UDS.KEYID = 0
3,523,796 ready_for_fw is high
3,524,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,843 UART: [idev] Erasing UDS.KEYID = 0
6,026,590 UART: [idev] Sha1 KeyId Algorithm
6,048,196 UART: [idev] --
6,053,705 UART: [ldev] ++
6,054,383 UART: [ldev] CDI.KEYID = 6
6,055,295 UART: [ldev] SUBJECT.KEYID = 5
6,056,517 UART: [ldev] AUTHORITY.KEYID = 7
6,057,696 UART: [ldev] FE.KEYID = 1
6,099,515 UART: [ldev] Erasing FE.KEYID = 1
8,602,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,278 UART: [ldev] --
10,415,546 UART: [fwproc] Wait for Commands...
10,417,533 UART: [fwproc] Recv command 0x46574c44
10,419,846 UART: [fwproc] Recv'd Img size: 114448 bytes
13,867,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,621 >>> mbox cmd response: success
14,605,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,608,798 UART: [afmc] ++
14,609,524 UART: [afmc] CDI.KEYID = 6
14,610,732 UART: [afmc] SUBJECT.KEYID = 7
14,612,166 UART: [afmc] AUTHORITY.KEYID = 5
17,151,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,712 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,185 UART: [afmc] --
18,946,860 UART: [cold-reset] --
18,950,671 UART: [state] Locking Datavault
18,957,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,801 UART: [state] Locking ICCM
18,961,584 UART: [exit] Launching FMC @ 0x40000130
18,970,258 UART:
18,970,493 UART: Running Caliptra FMC ...
18,971,594 UART:
18,971,751 UART: [state] CFI Enabled
19,031,959 UART: [fht] FMC Alias Private Key: 7
20,796,813 UART: [art] Extend RT PCRs Done
20,798,019 UART: [art] Lock RT PCRs Done
20,799,270 UART: [art] Populate DV Done
20,804,807 UART: [fht] FMC Alias Private Key: 7
20,806,396 UART: [art] Derive CDI
20,807,207 UART: [art] Store in in slot 0x4
20,865,196 UART: [art] Derive Key Pair
20,866,193 UART: [art] Store priv key in slot 0x5
23,329,053 UART: [art] Derive Key Pair - Done
23,342,103 UART: [art] Signing Cert with AUTHO
23,343,409 UART: RITY.KEYID = 7
25,055,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,537 UART: [art] PUB.X = 7D2BBD4861F8DB626B9E7F134355C55D90C8A9353186E69027638BCE40C9FBDE48CA86C0D8719E4B26043E6526F4073D
25,063,843 UART: [art] PUB.Y = 3B45C80441279724BB4AC429421627F1D3C786714CC974CA88787FA504233D73A530E4B3F9F518D0F1182E30B26B556C
25,071,067 UART: [art] SIG.R = AFE30C8FE384C0FA07A937D92ED17929BF79F9A13533AE84AAFABA668BEE41CF2CF4466631029CFBAC8A727552C7192A
25,078,472 UART: [art] SIG.S = 8791A6FA1D28CAB03F43659D3AD614027729201F4ED56B99865DF262358ADA3D96C81E74A645CDDD8586AEA2E3423FDA
26,057,590 UART: Caliptra RT
26,058,278 UART: [state] CFI Enabled
26,222,786 UART: [rt] RT listening for mailbox commands...
26,254,849 UART: [rt]cmd =0x44504543, len=96
26,303,961 >>> mbox cmd response data (56 bytes)
26,305,225 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,335,324 UART: [rt]cmd =0x54514754, len=24
26,337,660 >>> mbox cmd response: failed
26,338,171 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,367,859 UART: [rt]cmd =0x54514754, len=24
26,370,502 >>> mbox cmd response data (8 bytes)
26,371,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,401,720 UART: [rt]cmd =0x44504543, len=96
26,453,391 >>> mbox cmd response data (56 bytes)
26,454,085 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,484,037 UART: [rt]cmd =0x47544744, len=8
26,487,058 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,416,684 ready_for_fw is high
3,417,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,696,747 >>> mbox cmd response: success
14,697,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,986,049 UART:
18,986,449 UART: Running Caliptra FMC ...
18,987,645 UART:
18,987,814 UART: [state] CFI Enabled
19,044,378 UART: [fht] FMC Alias Private Key: 7
20,808,204 UART: [art] Extend RT PCRs Done
20,809,418 UART: [art] Lock RT PCRs Done
20,811,043 UART: [art] Populate DV Done
20,816,459 UART: [fht] FMC Alias Private Key: 7
20,818,171 UART: [art] Derive CDI
20,818,990 UART: [art] Store in in slot 0x4
20,876,733 UART: [art] Derive Key Pair
20,877,778 UART: [art] Store priv key in slot 0x5
23,340,734 UART: [art] Derive Key Pair - Done
23,353,245 UART: [art] Signing Cert with AUTHO
23,354,544 UART: RITY.KEYID = 7
25,065,935 UART: [art] Erasing AUTHORITY.KEYID = 7
25,067,468 UART: [art] PUB.X = D9D5B7A463D750B39004E2EF617266DC2BCE91E1171C9EB5B54B3C925DA9300249D93ABEA745D16D345F5A514ABE7C20
25,074,721 UART: [art] PUB.Y = 119625B6FEA2B82AEF78C5F8BA9D77CC076CD7DD503DEC6C64972127CC1ABDD294D26485CD79B7C65DF1B5A4B55ED0E3
25,082,011 UART: [art] SIG.R = FE9E40920FE9C6DCA94C5DFE7B073262918CCE58A6AD0B281C12B9E669BEF800F4222B58215DA8450757111ED22DD268
25,089,420 UART: [art] SIG.S = 7AF76E22DFB4F60AF7DC6B730EC825D3B83FAEE5E83CAEC5F1DB3C8A011C9D9902867AE24A58C0E547F49C3DC1B1C7D5
26,068,264 UART: Caliptra RT
26,068,952 UART: [state] CFI Enabled
26,233,735 UART: [rt] RT listening for mailbox commands...
26,265,709 UART: [rt]cmd =0x44504543, len=96
26,313,291 >>> mbox cmd response data (56 bytes)
26,314,498 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,344,527 UART: [rt]cmd =0x54514754, len=24
26,346,788 >>> mbox cmd response: failed
26,347,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,377,085 UART: [rt]cmd =0x54514754, len=24
26,379,493 >>> mbox cmd response data (8 bytes)
26,379,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,409 UART: [rt]cmd =0x44504543, len=96
26,463,074 >>> mbox cmd response data (56 bytes)
26,463,807 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,493,530 UART: [rt]cmd =0x47544744, len=8
26,496,789 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,371 UART:
192,738 UART: Running Caliptra ROM ...
193,861 UART:
603,444 UART: [state] CFI Enabled
617,109 UART: [state] LifecycleState = Unprovisioned
619,478 UART: [state] DebugLocked = No
622,421 UART: [state] WD Timer not started. Device not locked for debugging
627,797 UART: [kat] SHA2-256
817,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,464 UART: [kat] ++
829,062 UART: [kat] sha1
841,219 UART: [kat] SHA2-256
844,241 UART: [kat] SHA2-384
850,438 UART: [kat] SHA2-512-ACC
853,007 UART: [kat] ECC-384
3,294,137 UART: [kat] HMAC-384Kdf
3,306,869 UART: [kat] LMS
3,838,717 UART: [kat] --
3,844,201 UART: [cold-reset] ++
3,846,053 UART: [fht] FHT @ 0x50003400
3,858,374 UART: [idev] ++
3,859,069 UART: [idev] CDI.KEYID = 6
3,860,016 UART: [idev] SUBJECT.KEYID = 7
3,861,249 UART: [idev] UDS.KEYID = 0
3,862,259 ready_for_fw is high
3,862,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,140 UART: [idev] Erasing UDS.KEYID = 0
6,336,693 UART: [idev] Sha1 KeyId Algorithm
6,358,592 UART: [idev] --
6,363,555 UART: [ldev] ++
6,364,228 UART: [ldev] CDI.KEYID = 6
6,365,132 UART: [ldev] SUBJECT.KEYID = 5
6,366,284 UART: [ldev] AUTHORITY.KEYID = 7
6,367,504 UART: [ldev] FE.KEYID = 1
6,379,594 UART: [ldev] Erasing FE.KEYID = 1
8,857,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,059 UART: [ldev] --
10,648,760 UART: [fwproc] Wait for Commands...
10,650,685 UART: [fwproc] Recv command 0x46574c44
10,652,982 UART: [fwproc] Recv'd Img size: 114448 bytes
14,100,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,843,391 >>> mbox cmd response: success
14,844,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,846,695 UART: [afmc] ++
14,847,396 UART: [afmc] CDI.KEYID = 6
14,848,639 UART: [afmc] SUBJECT.KEYID = 7
14,850,067 UART: [afmc] AUTHORITY.KEYID = 5
17,353,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,416 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,402 UART: [afmc] --
19,149,715 UART: [cold-reset] --
19,153,579 UART: [state] Locking Datavault
19,159,851 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,038 UART: [state] Locking ICCM
19,163,806 UART: [exit] Launching FMC @ 0x40000130
19,172,474 UART:
19,172,709 UART: Running Caliptra FMC ...
19,173,804 UART:
19,173,962 UART: [state] CFI Enabled
19,181,950 UART: [fht] FMC Alias Private Key: 7
20,938,835 UART: [art] Extend RT PCRs Done
20,940,055 UART: [art] Lock RT PCRs Done
20,941,648 UART: [art] Populate DV Done
20,946,889 UART: [fht] FMC Alias Private Key: 7
20,948,473 UART: [art] Derive CDI
20,949,202 UART: [art] Store in in slot 0x4
20,991,650 UART: [art] Derive Key Pair
20,992,663 UART: [art] Store priv key in slot 0x5
23,419,390 UART: [art] Derive Key Pair - Done
23,432,102 UART: [art] Signing Cert with AUTHO
23,433,430 UART: RITY.KEYID = 7
25,139,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,632 UART: [art] PUB.X = 327C98A20F7534763B998D71C994B9E45FE42A9112F598A0754242604AB53F2B479D8B0108D64EF34A96741C4A59AA0E
25,147,874 UART: [art] PUB.Y = 7F6F6E30DE0795BF13501969984489F6C05E7FEE242FEC6F8786E6506CC4ACFF7440B0827E224AA8FE58C21426DADF11
25,155,143 UART: [art] SIG.R = 520B61E588088367183FA49E60B6B18122FA22573853374D63AC5E72CD31DD40F0D500FB5EA3989192E1B382452FC5A5
25,162,459 UART: [art] SIG.S = 564FAB60B0B0DF9A9E561408F4C6FD9D19E420A46A6F33EE7D0A0B182662744836EF4BB22B51721FD0EA41CAB633C604
26,141,344 UART: Caliptra RT
26,142,030 UART: [state] CFI Enabled
26,259,476 UART: [rt] RT listening for mailbox commands...
26,291,536 UART: [rt]cmd =0x44504543, len=96
26,326,767 >>> mbox cmd response data (56 bytes)
26,328,362 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,358,368 UART: [rt]cmd =0x54514754, len=24
26,360,898 >>> mbox cmd response: failed
26,361,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,391,219 UART: [rt]cmd =0x54514754, len=24
26,393,629 >>> mbox cmd response data (8 bytes)
26,394,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,424,441 UART: [rt]cmd =0x44504543, len=96
26,460,240 >>> mbox cmd response data (56 bytes)
26,460,928 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,490,559 UART: [rt]cmd =0x47544744, len=8
26,493,680 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,198 writing to cptra_bootfsm_go
3,750,579 ready_for_fw is high
3,750,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,283 >>> mbox cmd response: success
14,951,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,207,297 UART:
19,207,692 UART: Running Caliptra FMC ...
19,208,819 UART:
19,208,989 UART: [state] CFI Enabled
19,217,212 UART: [fht] FMC Alias Private Key: 7
20,973,767 UART: [art] Extend RT PCRs Done
20,974,983 UART: [art] Lock RT PCRs Done
20,976,444 UART: [art] Populate DV Done
20,981,734 UART: [fht] FMC Alias Private Key: 7
20,983,210 UART: [art] Derive CDI
20,983,966 UART: [art] Store in in slot 0x4
21,026,498 UART: [art] Derive Key Pair
21,027,495 UART: [art] Store priv key in slot 0x5
23,454,497 UART: [art] Derive Key Pair - Done
23,467,602 UART: [art] Signing Cert with AUTHO
23,468,896 UART: RITY.KEYID = 7
25,174,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,530 UART: [art] PUB.X = 775255EAEDF95F04890B60BCC843C649A18E169EC6C47BF2CBC85A0FA3D1E90A511C61B973E18D5AED6EDA6B28B3FEC5
25,182,767 UART: [art] PUB.Y = 29E21A852BFE225446DE36AB2BA3D9B5710CA21B4B57087F2DC41A18524E8B6FB7DFB32A12189BCF62CD56EA314F2F83
25,190,082 UART: [art] SIG.R = 5C30DE58AEE6913E69AF7A0951BA7F6463215B8F848DE168E7D8B1062777C7B32740B59FB4B11CC6F0AC216A4AE46BB1
25,197,473 UART: [art] SIG.S = B20CB3A3366E99D0DE3E98A9BEDE409DE6C3F42838B4A15ED888C668DB22EA87FFB9755C8EE426EF7E7A82B92CD5B4F5
26,176,220 UART: Caliptra RT
26,176,906 UART: [state] CFI Enabled
26,293,846 UART: [rt] RT listening for mailbox commands...
26,325,884 UART: [rt]cmd =0x44504543, len=96
26,361,862 >>> mbox cmd response data (56 bytes)
26,363,205 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,393,224 UART: [rt]cmd =0x54514754, len=24
26,395,632 >>> mbox cmd response: failed
26,396,125 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,425,881 UART: [rt]cmd =0x54514754, len=24
26,428,512 >>> mbox cmd response data (8 bytes)
26,429,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,459,759 UART: [rt]cmd =0x44504543, len=96
26,495,609 >>> mbox cmd response data (56 bytes)
26,496,362 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,526,084 UART: [rt]cmd =0x47544744, len=8
26,529,291 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,428 UART: [idev] ++
1,479,596 UART: [idev] CDI.KEYID = 6
1,479,956 UART: [idev] SUBJECT.KEYID = 7
1,480,380 UART: [idev] UDS.KEYID = 0
1,480,725 ready_for_fw is high
1,480,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,106 UART: [idev] Erasing UDS.KEYID = 0
1,504,414 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,188 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,925 UART: [ldev] Erasing FE.KEYID = 1
1,546,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,386 UART: [ldev] --
1,585,647 UART: [fwproc] Waiting for Commands...
1,586,332 UART: [fwproc] Received command 0x46574c44
1,587,123 UART: [fwproc] Received Image of size 114448 bytes
2,887,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,166 >>> mbox cmd response: success
3,080,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,081,392 UART: [afmc] ++
3,081,560 UART: [afmc] CDI.KEYID = 6
3,081,922 UART: [afmc] SUBJECT.KEYID = 7
3,082,347 UART: [afmc] AUTHORITY.KEYID = 5
3,116,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,565 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,255 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,244 UART: [afmc] --
3,160,180 UART: [cold-reset] --
3,161,204 UART: [state] Locking Datavault
3,162,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,193 UART: [state] Locking ICCM
3,163,741 UART: [exit] Launching FMC @ 0x40000130
3,169,070 UART:
3,169,086 UART: Running Caliptra FMC ...
3,169,494 UART:
3,169,548 UART: [state] CFI Enabled
3,179,861 UART: [fht] FMC Alias Private Key: 7
3,287,818 UART: [art] Extend RT PCRs Done
3,288,246 UART: [art] Lock RT PCRs Done
3,289,646 UART: [art] Populate DV Done
3,297,917 UART: [fht] FMC Alias Private Key: 7
3,299,057 UART: [art] Derive CDI
3,299,337 UART: [art] Store in in slot 0x4
3,385,364 UART: [art] Derive Key Pair
3,385,724 UART: [art] Store priv key in slot 0x5
3,398,872 UART: [art] Derive Key Pair - Done
3,413,878 UART: [art] Signing Cert with AUTHO
3,414,358 UART: RITY.KEYID = 7
3,428,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,735 UART: [art] PUB.X = D82A2F5707239CB1327F1929BB197FDE038F3AB26B713C0AFEB578856A461D7D70BE3F361B66DFE2A84708AE561D4DFF
3,436,505 UART: [art] PUB.Y = A733939003A88CBF81CEDCA27B17E86820CCDA3A37755D6043F6E12B8109563F68747468C34E94699208FE134D64131E
3,443,440 UART: [art] SIG.R = 1A4D313EE03A5BE8BF40304481997052439FE364E667152EBC3791CF4EA90E8FF7A0D6288F6A1CF0896980961C473D08
3,450,202 UART: [art] SIG.S = 3A2DA34CBB42A5E6C8228A4A69230F2DC18C305E7FA85B548D49DA975A1E00DD712A3D25AADC43AA1C347BA36AAA98BF
3,474,240 UART: Caliptra RT
3,474,493 UART: [state] CFI Enabled
3,582,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,543 UART: [rt]cmd =0x44504543, len=96
3,649,284 >>> mbox cmd response data (56 bytes)
3,649,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,762 UART: [rt]cmd =0x54514754, len=24
3,680,651 >>> mbox cmd response: failed
3,680,651 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,279 UART: [rt]cmd =0x54514754, len=24
3,712,310 >>> mbox cmd response data (8 bytes)
3,712,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,584 UART: [rt]cmd =0x44504543, len=96
3,779,776 >>> mbox cmd response data (56 bytes)
3,779,777 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,148 UART: [rt]cmd =0x47544744, len=8
3,811,507 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,831 ready_for_fw is high
1,361,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,607 >>> mbox cmd response: success
2,928,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,339 UART:
2,990,355 UART: Running Caliptra FMC ...
2,990,763 UART:
2,990,817 UART: [state] CFI Enabled
3,001,068 UART: [fht] FMC Alias Private Key: 7
3,108,605 UART: [art] Extend RT PCRs Done
3,109,033 UART: [art] Lock RT PCRs Done
3,110,641 UART: [art] Populate DV Done
3,118,914 UART: [fht] FMC Alias Private Key: 7
3,120,062 UART: [art] Derive CDI
3,120,342 UART: [art] Store in in slot 0x4
3,206,159 UART: [art] Derive Key Pair
3,206,519 UART: [art] Store priv key in slot 0x5
3,219,447 UART: [art] Derive Key Pair - Done
3,234,080 UART: [art] Signing Cert with AUTHO
3,234,560 UART: RITY.KEYID = 7
3,249,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,231 UART: [art] PUB.X = 0B5D835D2D159186B7DCC63A38282F85B11DCF70B0E4305628CB91272D7991A99DD9F5B8CD7E001D9F3958F9B383FFD4
3,256,982 UART: [art] PUB.Y = 70C418058B8686B1E68A30DBA2156E2010B70DD554AFFFFB712BC12B9E719069E927B176C53BCEB675910A7383577657
3,263,921 UART: [art] SIG.R = 233315C1C1177E43A6167D6B36019A5F5C34868B8A3ED5C39F0D69A8973834565B7E4BB17DC9AC76F229F5ABD6B6DB23
3,270,689 UART: [art] SIG.S = 3E1A3DE6AA60267AFFC0DFE83DC1D2BA53265DE7451EB48691C53D84D73254668EBCB6AD88685BDC5399E6E60CB6FAD0
3,294,991 UART: Caliptra RT
3,295,244 UART: [state] CFI Enabled
3,404,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,160 UART: [rt]cmd =0x44504543, len=96
3,471,461 >>> mbox cmd response data (56 bytes)
3,471,462 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,135 UART: [rt]cmd =0x54514754, len=24
3,502,956 >>> mbox cmd response: failed
3,502,956 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,476 UART: [rt]cmd =0x54514754, len=24
3,534,831 >>> mbox cmd response data (8 bytes)
3,534,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,737 UART: [rt]cmd =0x44504543, len=96
3,601,873 >>> mbox cmd response data (56 bytes)
3,601,874 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,387 UART: [rt]cmd =0x47544744, len=8
3,633,906 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,484 UART: [kat] SHA2-256
882,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,530 UART: [kat] ++
886,682 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,841 UART: [kat] SHA2-512-ACC
897,742 UART: [kat] ECC-384
903,339 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,477,292 UART: [cold-reset] ++
1,477,740 UART: [fht] Storing FHT @ 0x50003400
1,480,663 UART: [idev] ++
1,480,831 UART: [idev] CDI.KEYID = 6
1,481,191 UART: [idev] SUBJECT.KEYID = 7
1,481,615 UART: [idev] UDS.KEYID = 0
1,481,960 ready_for_fw is high
1,481,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,345 UART: [idev] Erasing UDS.KEYID = 0
1,506,339 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,159 UART: [idev] --
1,516,354 UART: [ldev] ++
1,516,522 UART: [ldev] CDI.KEYID = 6
1,516,885 UART: [ldev] SUBJECT.KEYID = 5
1,517,311 UART: [ldev] AUTHORITY.KEYID = 7
1,517,774 UART: [ldev] FE.KEYID = 1
1,523,090 UART: [ldev] Erasing FE.KEYID = 1
1,548,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,493 UART: [ldev] --
1,587,812 UART: [fwproc] Waiting for Commands...
1,588,495 UART: [fwproc] Received command 0x46574c44
1,589,286 UART: [fwproc] Received Image of size 114448 bytes
2,888,403 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,284 >>> mbox cmd response: success
3,081,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,082,360 UART: [afmc] ++
3,082,528 UART: [afmc] CDI.KEYID = 6
3,082,890 UART: [afmc] SUBJECT.KEYID = 7
3,083,315 UART: [afmc] AUTHORITY.KEYID = 5
3,118,182 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,781 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,471 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,300 UART: [afmc] --
3,161,312 UART: [cold-reset] --
3,162,130 UART: [state] Locking Datavault
3,163,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,841 UART: [state] Locking ICCM
3,164,495 UART: [exit] Launching FMC @ 0x40000130
3,169,824 UART:
3,169,840 UART: Running Caliptra FMC ...
3,170,248 UART:
3,170,391 UART: [state] CFI Enabled
3,180,900 UART: [fht] FMC Alias Private Key: 7
3,289,501 UART: [art] Extend RT PCRs Done
3,289,929 UART: [art] Lock RT PCRs Done
3,291,319 UART: [art] Populate DV Done
3,299,610 UART: [fht] FMC Alias Private Key: 7
3,300,574 UART: [art] Derive CDI
3,300,854 UART: [art] Store in in slot 0x4
3,386,537 UART: [art] Derive Key Pair
3,386,897 UART: [art] Store priv key in slot 0x5
3,400,301 UART: [art] Derive Key Pair - Done
3,414,795 UART: [art] Signing Cert with AUTHO
3,415,275 UART: RITY.KEYID = 7
3,430,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,248 UART: [art] PUB.X = 99C0BFFCB265E67B5BCC5A8A4F47BFA604CD2FDC7362203800028C303EDB183682651E77F5036D3618653569231D80C3
3,437,987 UART: [art] PUB.Y = C4F80DF646C5AD5A83C244A7F420CFFAC2E5F8CB2A754AE72B06B839CBB474913A21126EC80FEFAE4C063C4244C87AFA
3,444,947 UART: [art] SIG.R = 939DC9300105A448BA4ADB754E5FA30A1BCABCA86B793AD7BD1866369177EFAE15A77DBFAFB939E041D220EC215704D7
3,451,721 UART: [art] SIG.S = FD2AEF54A28ED9AD3EBBC1713F59F64267F0C957328FD01E1EFF80D705A7AC6609106511040A21D2151464F96C89DB2D
3,475,552 UART: Caliptra RT
3,475,897 UART: [state] CFI Enabled
3,584,575 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,383 UART: [rt]cmd =0x44504543, len=96
3,652,512 >>> mbox cmd response data (56 bytes)
3,652,513 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,028 UART: [rt]cmd =0x54514754, len=24
3,684,123 >>> mbox cmd response: failed
3,684,123 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,615 UART: [rt]cmd =0x54514754, len=24
3,715,744 >>> mbox cmd response data (8 bytes)
3,715,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,858 UART: [rt]cmd =0x44504543, len=96
3,782,178 >>> mbox cmd response data (56 bytes)
3,782,179 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,438 UART: [rt]cmd =0x47544744, len=8
3,814,173 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 ready_for_fw is high
1,362,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,672 >>> mbox cmd response: success
2,928,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,536 UART:
2,990,552 UART: Running Caliptra FMC ...
2,990,960 UART:
2,991,103 UART: [state] CFI Enabled
3,001,840 UART: [fht] FMC Alias Private Key: 7
3,109,629 UART: [art] Extend RT PCRs Done
3,110,057 UART: [art] Lock RT PCRs Done
3,111,417 UART: [art] Populate DV Done
3,119,640 UART: [fht] FMC Alias Private Key: 7
3,120,696 UART: [art] Derive CDI
3,120,976 UART: [art] Store in in slot 0x4
3,206,719 UART: [art] Derive Key Pair
3,207,079 UART: [art] Store priv key in slot 0x5
3,219,665 UART: [art] Derive Key Pair - Done
3,234,174 UART: [art] Signing Cert with AUTHO
3,234,654 UART: RITY.KEYID = 7
3,249,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,309 UART: [art] PUB.X = E41B6843F4516316142F073E993DC2CDA22303BD749C107C2B2360C04B7CE627638A4A417EABF87E4D8563FC427534F2
3,257,071 UART: [art] PUB.Y = 049E4B04A760766CFBB3FC449AB531557C365FA84BD81736464F65ACA47E730C8E0F9EBA681204F500FACFB5AF8BEDF1
3,264,000 UART: [art] SIG.R = 00B5087EDA1D7027E2DE3567C45BB19945456900F6EE97134D0DFFF8569567A4F636FB98294C2915A9CED84AE81E7050
3,270,720 UART: [art] SIG.S = DDAE8D7CB7CCCA4B8150B8665AF98D2C6A70098C59AA1C28228A6B0B240CE00E399C57B0461619B4BA509C6109E2E1DA
3,294,172 UART: Caliptra RT
3,294,517 UART: [state] CFI Enabled
3,403,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,977 UART: [rt]cmd =0x44504543, len=96
3,471,542 >>> mbox cmd response data (56 bytes)
3,471,543 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,300 UART: [rt]cmd =0x54514754, len=24
3,503,143 >>> mbox cmd response: failed
3,503,143 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,707 UART: [rt]cmd =0x54514754, len=24
3,534,956 >>> mbox cmd response data (8 bytes)
3,534,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,032 UART: [rt]cmd =0x44504543, len=96
3,601,492 >>> mbox cmd response data (56 bytes)
3,601,493 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,840 UART: [rt]cmd =0x47544744, len=8
3,633,331 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
893,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,747 UART: [kat] ++
897,899 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,920 UART: [kat] SHA2-512-ACC
908,821 UART: [kat] ECC-384
918,590 UART: [kat] HMAC-384Kdf
923,172 UART: [kat] LMS
1,171,500 UART: [kat] --
1,172,369 UART: [cold-reset] ++
1,172,857 UART: [fht] FHT @ 0x50003400
1,175,536 UART: [idev] ++
1,175,704 UART: [idev] CDI.KEYID = 6
1,176,064 UART: [idev] SUBJECT.KEYID = 7
1,176,488 UART: [idev] UDS.KEYID = 0
1,176,833 ready_for_fw is high
1,176,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,414 UART: [idev] Erasing UDS.KEYID = 0
1,201,649 UART: [idev] Sha1 KeyId Algorithm
1,210,277 UART: [idev] --
1,211,217 UART: [ldev] ++
1,211,385 UART: [ldev] CDI.KEYID = 6
1,211,748 UART: [ldev] SUBJECT.KEYID = 5
1,212,174 UART: [ldev] AUTHORITY.KEYID = 7
1,212,637 UART: [ldev] FE.KEYID = 1
1,217,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,857 UART: [ldev] --
1,283,266 UART: [fwproc] Wait for Commands...
1,283,878 UART: [fwproc] Recv command 0x46574c44
1,284,606 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,030 >>> mbox cmd response: success
2,776,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,777,166 UART: [afmc] ++
2,777,334 UART: [afmc] CDI.KEYID = 6
2,777,696 UART: [afmc] SUBJECT.KEYID = 7
2,778,121 UART: [afmc] AUTHORITY.KEYID = 5
2,813,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,563 UART: [afmc] --
2,856,597 UART: [cold-reset] --
2,857,429 UART: [state] Locking Datavault
2,858,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,214 UART: [state] Locking ICCM
2,859,656 UART: [exit] Launching FMC @ 0x40000130
2,864,985 UART:
2,865,001 UART: Running Caliptra FMC ...
2,865,409 UART:
2,865,463 UART: [state] CFI Enabled
2,875,948 UART: [fht] FMC Alias Private Key: 7
2,984,087 UART: [art] Extend RT PCRs Done
2,984,515 UART: [art] Lock RT PCRs Done
2,986,221 UART: [art] Populate DV Done
2,994,540 UART: [fht] FMC Alias Private Key: 7
2,995,490 UART: [art] Derive CDI
2,995,770 UART: [art] Store in in slot 0x4
3,081,441 UART: [art] Derive Key Pair
3,081,801 UART: [art] Store priv key in slot 0x5
3,095,013 UART: [art] Derive Key Pair - Done
3,109,675 UART: [art] Signing Cert with AUTHO
3,110,155 UART: RITY.KEYID = 7
3,125,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,156 UART: [art] PUB.X = 64F399AA4C59517BF049650E83782463DC74D455602C6DFC92662187D2E02AEAEE620F85C656545FDBA825DF64465387
3,132,916 UART: [art] PUB.Y = CA8AE093A6D7F9F83A38411906D81014C20D3FD6D197124382D2F658A3230D4E4FFF6379F8DD2DE127B48BCBA62F05AF
3,139,864 UART: [art] SIG.R = 9F92E48484B5C3230C1C964AADE60FDE3475F71C28D5015EB75486423850443FD2DB88391761FD070CDAA6FD68B9B01D
3,146,623 UART: [art] SIG.S = 6276CFED900312BB40219138BA40A765F10FE3CE22155EC6AB1E05F6945532D85CE5AE6E10BF70F66210B3A853892CD4
3,170,453 UART: Caliptra RT
3,170,706 UART: [state] CFI Enabled
3,277,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,679 UART: [rt]cmd =0x44504543, len=96
3,345,244 >>> mbox cmd response data (56 bytes)
3,345,245 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,742 UART: [rt]cmd =0x54514754, len=24
3,376,677 >>> mbox cmd response: failed
3,376,677 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,273 UART: [rt]cmd =0x54514754, len=24
3,408,614 >>> mbox cmd response data (8 bytes)
3,408,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,688 UART: [rt]cmd =0x44504543, len=96
3,474,770 >>> mbox cmd response data (56 bytes)
3,474,771 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,960 UART: [rt]cmd =0x47544744, len=8
3,506,317 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,159 >>> mbox cmd response: success
2,628,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,689,569 UART:
2,689,585 UART: Running Caliptra FMC ...
2,689,993 UART:
2,690,047 UART: [state] CFI Enabled
2,700,712 UART: [fht] FMC Alias Private Key: 7
2,808,503 UART: [art] Extend RT PCRs Done
2,808,931 UART: [art] Lock RT PCRs Done
2,810,705 UART: [art] Populate DV Done
2,818,960 UART: [fht] FMC Alias Private Key: 7
2,819,936 UART: [art] Derive CDI
2,820,216 UART: [art] Store in in slot 0x4
2,905,811 UART: [art] Derive Key Pair
2,906,171 UART: [art] Store priv key in slot 0x5
2,919,625 UART: [art] Derive Key Pair - Done
2,933,876 UART: [art] Signing Cert with AUTHO
2,934,356 UART: RITY.KEYID = 7
2,949,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,375 UART: [art] PUB.X = AB26F834A363A876F67AE2E002EFAEB2B5B291359C257F514CC72A8ED2A945547B4799B879E912A5A7A736C9789627EE
2,957,146 UART: [art] PUB.Y = 4C8E73B54A2AD2CACE260D0BBE98A66136C56917BC1DDC161146F91BE3D0D699C069D39CDEF7BD38A2E046D5B29D20F9
2,964,108 UART: [art] SIG.R = E0D59DE286682362A136F5875BA1C5B1DEF34D145A45491CDD83801328465891BA7B923059B65D906E8C538BF9F3D4F2
2,970,876 UART: [art] SIG.S = 6026F51839F7DC562990F9F577027C52ABC4BEEFB81979D7F98A6CD408BC06B449575E7F6BDE58F448435A10C4F19E97
2,994,604 UART: Caliptra RT
2,994,857 UART: [state] CFI Enabled
3,102,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,012 UART: [rt]cmd =0x44504543, len=96
3,168,857 >>> mbox cmd response data (56 bytes)
3,168,858 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,217 UART: [rt]cmd =0x54514754, len=24
3,200,062 >>> mbox cmd response: failed
3,200,062 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,622 UART: [rt]cmd =0x54514754, len=24
3,231,793 >>> mbox cmd response data (8 bytes)
3,231,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,261,543 UART: [rt]cmd =0x44504543, len=96
3,297,811 >>> mbox cmd response data (56 bytes)
3,297,812 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,409 UART: [rt]cmd =0x47544744, len=8
3,330,032 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
893,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,034 UART: [kat] ++
898,186 UART: [kat] sha1
902,634 UART: [kat] SHA2-256
904,574 UART: [kat] SHA2-384
907,303 UART: [kat] SHA2-512-ACC
909,204 UART: [kat] ECC-384
919,005 UART: [kat] HMAC-384Kdf
923,557 UART: [kat] LMS
1,171,885 UART: [kat] --
1,173,110 UART: [cold-reset] ++
1,173,486 UART: [fht] FHT @ 0x50003400
1,176,199 UART: [idev] ++
1,176,367 UART: [idev] CDI.KEYID = 6
1,176,727 UART: [idev] SUBJECT.KEYID = 7
1,177,151 UART: [idev] UDS.KEYID = 0
1,177,496 ready_for_fw is high
1,177,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,017 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,243,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,234 UART: [ldev] --
1,283,503 UART: [fwproc] Wait for Commands...
1,284,117 UART: [fwproc] Recv command 0x46574c44
1,284,845 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,767 >>> mbox cmd response: success
2,775,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,777,001 UART: [afmc] ++
2,777,169 UART: [afmc] CDI.KEYID = 6
2,777,531 UART: [afmc] SUBJECT.KEYID = 7
2,777,956 UART: [afmc] AUTHORITY.KEYID = 5
2,813,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,302 UART: [afmc] --
2,857,282 UART: [cold-reset] --
2,857,964 UART: [state] Locking Datavault
2,859,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,793 UART: [state] Locking ICCM
2,860,367 UART: [exit] Launching FMC @ 0x40000130
2,865,696 UART:
2,865,712 UART: Running Caliptra FMC ...
2,866,120 UART:
2,866,263 UART: [state] CFI Enabled
2,876,908 UART: [fht] FMC Alias Private Key: 7
2,984,691 UART: [art] Extend RT PCRs Done
2,985,119 UART: [art] Lock RT PCRs Done
2,986,451 UART: [art] Populate DV Done
2,994,610 UART: [fht] FMC Alias Private Key: 7
2,995,698 UART: [art] Derive CDI
2,995,978 UART: [art] Store in in slot 0x4
3,081,597 UART: [art] Derive Key Pair
3,081,957 UART: [art] Store priv key in slot 0x5
3,095,335 UART: [art] Derive Key Pair - Done
3,110,120 UART: [art] Signing Cert with AUTHO
3,110,600 UART: RITY.KEYID = 7
3,125,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,047 UART: [art] PUB.X = FB86A14C5C0248C3194E7810D0681870C67F516BCE185B9939511220DA97583D4B1CCA4558DB55F498854A50DFAC4B47
3,132,812 UART: [art] PUB.Y = 01EFD04E4DF5F3F1E3F1F40C2CF47BBBC97AABB338E2A85872A286578CA61F5B9157F478EBC21AFDD759E7669A0B2593
3,139,771 UART: [art] SIG.R = 3C435CB04D5CEFFEB20A76B281181BC82490ECDCC7EDCD43F268789085DB670192FF6BCBAF10934EF2A36DC26334197E
3,146,551 UART: [art] SIG.S = 31C5FCE99218B2C8CEC54E7B809F6FD088304F74F43F455396599C1C631E70A7735AEA93FBD8583B8607DCC96FD793F7
3,171,077 UART: Caliptra RT
3,171,422 UART: [state] CFI Enabled
3,280,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,291 UART: [rt]cmd =0x44504543, len=96
3,347,592 >>> mbox cmd response data (56 bytes)
3,347,593 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,884 UART: [rt]cmd =0x54514754, len=24
3,378,793 >>> mbox cmd response: failed
3,378,793 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,241 UART: [rt]cmd =0x54514754, len=24
3,410,344 >>> mbox cmd response data (8 bytes)
3,410,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,262 UART: [rt]cmd =0x44504543, len=96
3,477,372 >>> mbox cmd response data (56 bytes)
3,477,373 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,720 UART: [rt]cmd =0x47544744, len=8
3,509,249 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 ready_for_fw is high
1,060,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,242 >>> mbox cmd response: success
2,628,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,690,564 UART:
2,690,580 UART: Running Caliptra FMC ...
2,690,988 UART:
2,691,131 UART: [state] CFI Enabled
2,701,616 UART: [fht] FMC Alias Private Key: 7
2,809,247 UART: [art] Extend RT PCRs Done
2,809,675 UART: [art] Lock RT PCRs Done
2,810,987 UART: [art] Populate DV Done
2,819,424 UART: [fht] FMC Alias Private Key: 7
2,820,432 UART: [art] Derive CDI
2,820,712 UART: [art] Store in in slot 0x4
2,906,563 UART: [art] Derive Key Pair
2,906,923 UART: [art] Store priv key in slot 0x5
2,920,395 UART: [art] Derive Key Pair - Done
2,935,071 UART: [art] Signing Cert with AUTHO
2,935,551 UART: RITY.KEYID = 7
2,951,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,936 UART: [art] PUB.X = 2324CFF726EE9403DCE0E1710A93F2F6323E4A83E525971B0664EC6C1CAE1E175FB622FAB8753257DE3CC8A30E134234
2,958,700 UART: [art] PUB.Y = 37A7FE28F562A73005A817AD48C8961620470F2215DBF5912530166D780A4CD9F77A180AFB3FBB31CC6976300E0F374E
2,965,630 UART: [art] SIG.R = E9C207D8F82B2C26841184B042E8424F55CCCFD8991FC227C83181C657AF9A35F7F258298ABAB469D5A5B60EFE9E907E
2,972,402 UART: [art] SIG.S = 9549A66A394F130F03C139FF1055E37260628FA2AC89A06101F1ED1E55326B1978E09F4F07C8BF3D44960791DB1701EB
2,996,405 UART: Caliptra RT
2,996,750 UART: [state] CFI Enabled
3,103,270 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,542 UART: [rt]cmd =0x44504543, len=96
3,171,823 >>> mbox cmd response data (56 bytes)
3,171,824 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,201,551 UART: [rt]cmd =0x54514754, len=24
3,203,708 >>> mbox cmd response: failed
3,203,708 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,038 UART: [rt]cmd =0x54514754, len=24
3,234,911 >>> mbox cmd response data (8 bytes)
3,234,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,813 UART: [rt]cmd =0x44504543, len=96
3,301,901 >>> mbox cmd response data (56 bytes)
3,301,902 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,327 UART: [rt]cmd =0x47544744, len=8
3,333,938 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,174,003 ready_for_fw is high
1,174,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,620 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,739 UART: [fwproc] Recv command 0x46574c44
1,282,472 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,178 >>> mbox cmd response: success
2,774,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,223 UART: [afmc] ++
2,775,391 UART: [afmc] CDI.KEYID = 6
2,775,754 UART: [afmc] SUBJECT.KEYID = 7
2,776,180 UART: [afmc] AUTHORITY.KEYID = 5
2,811,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,338 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,026 UART: [afmc] --
2,855,010 UART: [cold-reset] --
2,855,752 UART: [state] Locking Datavault
2,856,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,501 UART: [state] Locking ICCM
2,857,965 UART: [exit] Launching FMC @ 0x40000130
2,863,294 UART:
2,863,310 UART: Running Caliptra FMC ...
2,863,718 UART:
2,863,772 UART: [state] CFI Enabled
2,874,585 UART: [fht] FMC Alias Private Key: 7
2,982,958 UART: [art] Extend RT PCRs Done
2,983,386 UART: [art] Lock RT PCRs Done
2,985,066 UART: [art] Populate DV Done
2,993,163 UART: [fht] FMC Alias Private Key: 7
2,994,203 UART: [art] Derive CDI
2,994,483 UART: [art] Store in in slot 0x4
3,079,730 UART: [art] Derive Key Pair
3,080,090 UART: [art] Store priv key in slot 0x5
3,093,588 UART: [art] Derive Key Pair - Done
3,108,389 UART: [art] Signing Cert with AUTHO
3,108,869 UART: RITY.KEYID = 7
3,123,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,698 UART: [art] PUB.X = 9245F8B7D3348358DFDEC21D54B3FDFCE1B76992F3AAEA56730E98F18835A4341345F5310EEC21302DD0244D09D49E2A
3,131,465 UART: [art] PUB.Y = 83F1F85DF6C85C0EF0E9717A7164AEC5186688F3D82F59CF02BC6CBF0F5047BD4D5F6729F9F9EBFEC386BB25FF754F67
3,138,424 UART: [art] SIG.R = 1507FDD90E55B72964440CD58EFC3C386AE6851C91EC67281CAD3E14F72A8142C6F7AE2B23428FB7BD46E322154ADACF
3,145,197 UART: [art] SIG.S = 845746F7A9C92167208E758CE66C9D5463FDCAE7E9C00FD5B96E942FAABDA08ADB7038B6C86744B25ECF620E303884FC
3,168,838 UART: Caliptra RT
3,169,091 UART: [state] CFI Enabled
3,276,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,806 UART: [rt]cmd =0x44504543, len=96
3,344,385 >>> mbox cmd response data (56 bytes)
3,344,386 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,897 UART: [rt]cmd =0x54514754, len=24
3,375,754 >>> mbox cmd response: failed
3,375,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,300 UART: [rt]cmd =0x54514754, len=24
3,407,405 >>> mbox cmd response data (8 bytes)
3,407,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,331 UART: [rt]cmd =0x44504543, len=96
3,473,235 >>> mbox cmd response data (56 bytes)
3,473,236 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,479 UART: [rt]cmd =0x47544744, len=8
3,505,208 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,410 ready_for_fw is high
1,056,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,136 >>> mbox cmd response: success
2,624,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,128 UART:
2,685,144 UART: Running Caliptra FMC ...
2,685,552 UART:
2,685,606 UART: [state] CFI Enabled
2,696,147 UART: [fht] FMC Alias Private Key: 7
2,803,906 UART: [art] Extend RT PCRs Done
2,804,334 UART: [art] Lock RT PCRs Done
2,805,902 UART: [art] Populate DV Done
2,814,181 UART: [fht] FMC Alias Private Key: 7
2,815,227 UART: [art] Derive CDI
2,815,507 UART: [art] Store in in slot 0x4
2,901,076 UART: [art] Derive Key Pair
2,901,436 UART: [art] Store priv key in slot 0x5
2,914,244 UART: [art] Derive Key Pair - Done
2,928,904 UART: [art] Signing Cert with AUTHO
2,929,384 UART: RITY.KEYID = 7
2,944,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,167 UART: [art] PUB.X = 0C179C024656874D2B9366B63947C84EF0FF0D0D30FF9B760EF3EC77FEA07C44F313EAC0214FB8C0FC9644A9D363BD48
2,951,932 UART: [art] PUB.Y = 3441826E0ADEA11C4F197F84E5E54D15427592D7910B31596321789D1F1B8A7C67ABC5ADD7FBA1D856A6C79120CA4A82
2,958,880 UART: [art] SIG.R = 6F8C5DCC0F4F2F8654D9E2B6CDAC1EE9BA78C7EDF97F04874A5C042A2086C0961DE7FE6DF0DD5F6D17B7216AD71E6B80
2,965,665 UART: [art] SIG.S = 3FB848BF29BD4BA625C9E5841BE32D5359794E3D6276CD81F67E5410E5A1FC56295947BE1FDA2D2830CC435684A9CE31
2,989,860 UART: Caliptra RT
2,990,113 UART: [state] CFI Enabled
3,098,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,956 UART: [rt]cmd =0x44504543, len=96
3,166,827 >>> mbox cmd response data (56 bytes)
3,166,828 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,425 UART: [rt]cmd =0x54514754, len=24
3,198,364 >>> mbox cmd response: failed
3,198,364 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,626 UART: [rt]cmd =0x54514754, len=24
3,229,991 >>> mbox cmd response data (8 bytes)
3,229,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,869 UART: [rt]cmd =0x44504543, len=96
3,296,049 >>> mbox cmd response data (56 bytes)
3,296,050 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,525 UART: [rt]cmd =0x47544744, len=8
3,328,082 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,631 UART: [kat] HMAC-384Kdf
920,139 UART: [kat] LMS
1,168,451 UART: [kat] --
1,169,350 UART: [cold-reset] ++
1,169,676 UART: [fht] FHT @ 0x50003400
1,172,330 UART: [idev] ++
1,172,498 UART: [idev] CDI.KEYID = 6
1,172,859 UART: [idev] SUBJECT.KEYID = 7
1,173,284 UART: [idev] UDS.KEYID = 0
1,173,630 ready_for_fw is high
1,173,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,561 >>> mbox cmd response: success
2,774,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,704 UART: [afmc] ++
2,775,872 UART: [afmc] CDI.KEYID = 6
2,776,235 UART: [afmc] SUBJECT.KEYID = 7
2,776,661 UART: [afmc] AUTHORITY.KEYID = 5
2,812,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,895 UART: [afmc] --
2,855,987 UART: [cold-reset] --
2,856,747 UART: [state] Locking Datavault
2,857,904 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,508 UART: [state] Locking ICCM
2,859,104 UART: [exit] Launching FMC @ 0x40000130
2,864,433 UART:
2,864,449 UART: Running Caliptra FMC ...
2,864,857 UART:
2,865,000 UART: [state] CFI Enabled
2,875,831 UART: [fht] FMC Alias Private Key: 7
2,984,206 UART: [art] Extend RT PCRs Done
2,984,634 UART: [art] Lock RT PCRs Done
2,986,408 UART: [art] Populate DV Done
2,994,765 UART: [fht] FMC Alias Private Key: 7
2,995,941 UART: [art] Derive CDI
2,996,221 UART: [art] Store in in slot 0x4
3,082,426 UART: [art] Derive Key Pair
3,082,786 UART: [art] Store priv key in slot 0x5
3,096,812 UART: [art] Derive Key Pair - Done
3,111,462 UART: [art] Signing Cert with AUTHO
3,111,942 UART: RITY.KEYID = 7
3,126,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,513 UART: [art] PUB.X = D786BBF1FCD411263861A0F1BBA704473B6657B7397712B7EA7E6D41965F1CB4BC7E5E216BBC51B50828AFDD070BED6A
3,134,285 UART: [art] PUB.Y = 67E6D513BCE163E81BF8DB6203147EA9B8A6A741584F7CB4B01BF88ACC1060317D8563B928971466E0000AFF47851D58
3,141,207 UART: [art] SIG.R = FE5EABC39B5A4BBF39ECC817350AC6100DE3BCE1ECFF1168761D9B313BC5BE41D850BE7621C042654F34261DA088522F
3,147,987 UART: [art] SIG.S = 0A46E140EABDF8AEAEA17F684C74120248E97914F04743B9882120CA354C6956E96EEC41D369763F0CCF6D5CAC5C9578
3,171,619 UART: Caliptra RT
3,171,964 UART: [state] CFI Enabled
3,280,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,541 UART: [rt]cmd =0x44504543, len=96
3,348,778 >>> mbox cmd response data (56 bytes)
3,348,779 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,548 UART: [rt]cmd =0x54514754, len=24
3,380,629 >>> mbox cmd response: failed
3,380,629 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,249 UART: [rt]cmd =0x54514754, len=24
3,412,326 >>> mbox cmd response data (8 bytes)
3,412,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,330 UART: [rt]cmd =0x44504543, len=96
3,478,734 >>> mbox cmd response data (56 bytes)
3,478,735 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,916 UART: [rt]cmd =0x47544744, len=8
3,510,427 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,615 ready_for_fw is high
1,056,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,171 >>> mbox cmd response: success
2,624,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,183 UART:
2,687,199 UART: Running Caliptra FMC ...
2,687,607 UART:
2,687,750 UART: [state] CFI Enabled
2,698,677 UART: [fht] FMC Alias Private Key: 7
2,807,022 UART: [art] Extend RT PCRs Done
2,807,450 UART: [art] Lock RT PCRs Done
2,808,956 UART: [art] Populate DV Done
2,817,201 UART: [fht] FMC Alias Private Key: 7
2,818,261 UART: [art] Derive CDI
2,818,541 UART: [art] Store in in slot 0x4
2,904,574 UART: [art] Derive Key Pair
2,904,934 UART: [art] Store priv key in slot 0x5
2,918,262 UART: [art] Derive Key Pair - Done
2,933,035 UART: [art] Signing Cert with AUTHO
2,933,515 UART: RITY.KEYID = 7
2,949,089 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,854 UART: [art] PUB.X = B647DC42C1BA5361DEA962F15107276A6C57804D0D9EB6A9004F8301F3C005E822A3BEF4A658017FA417F66C708518B0
2,956,587 UART: [art] PUB.Y = E71D4D9064E027D2C71B1B721F0A1CA7E3D2C4ED57B168028702A776F1F122BD38A52E2E27E4EA1BED4C7276702FD7C1
2,963,538 UART: [art] SIG.R = A940559A102AC0E42C5C81DBCDAC3AEC1ED49CBB028C58E1A7647361701A3230C1501043EE2AAB35743F297D9BC75006
2,970,310 UART: [art] SIG.S = C6A27CFA73F6C647D171276BD8069C5909588AD444997176098778A898BBE66B689A582981F5B2C6C924202D58930FC6
2,994,749 UART: Caliptra RT
2,995,094 UART: [state] CFI Enabled
3,103,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,504 UART: [rt]cmd =0x44504543, len=96
3,170,991 >>> mbox cmd response data (56 bytes)
3,170,992 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,549 UART: [rt]cmd =0x54514754, len=24
3,202,754 >>> mbox cmd response: failed
3,202,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,174 UART: [rt]cmd =0x54514754, len=24
3,234,111 >>> mbox cmd response data (8 bytes)
3,234,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,043 UART: [rt]cmd =0x44504543, len=96
3,300,589 >>> mbox cmd response data (56 bytes)
3,300,590 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,907 UART: [rt]cmd =0x47544744, len=8
3,332,532 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,068 UART:
192,440 UART: Running Caliptra ROM ...
193,530 UART:
193,672 UART: [state] CFI Enabled
265,319 UART: [state] LifecycleState = Unprovisioned
267,299 UART: [state] DebugLocked = No
268,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,896 UART: [kat] SHA2-256
443,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,065 UART: [kat] ++
454,558 UART: [kat] sha1
467,069 UART: [kat] SHA2-256
469,802 UART: [kat] SHA2-384
475,598 UART: [kat] SHA2-512-ACC
477,970 UART: [kat] ECC-384
2,767,464 UART: [kat] HMAC-384Kdf
2,800,379 UART: [kat] LMS
3,990,629 UART: [kat] --
3,994,856 UART: [cold-reset] ++
3,997,074 UART: [fht] Storing FHT @ 0x50003400
4,008,627 UART: [idev] ++
4,009,198 UART: [idev] CDI.KEYID = 6
4,010,086 UART: [idev] SUBJECT.KEYID = 7
4,011,403 UART: [idev] UDS.KEYID = 0
4,012,374 ready_for_fw is high
4,012,568 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,111,720 UART: [idev] Erasing UDS.KEYID = 0
7,345,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,881 UART: [idev] --
7,372,013 UART: [ldev] ++
7,372,589 UART: [ldev] CDI.KEYID = 6
7,373,530 UART: [ldev] SUBJECT.KEYID = 5
7,374,740 UART: [ldev] AUTHORITY.KEYID = 7
7,376,025 UART: [ldev] FE.KEYID = 1
7,422,464 UART: [ldev] Erasing FE.KEYID = 1
10,754,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,123 UART: [ldev] --
13,113,146 UART: [fwproc] Waiting for Commands...
13,116,376 UART: [fwproc] Received command 0x46574c44
13,118,559 UART: [fwproc] Received Image of size 78740 bytes
16,734,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,811,595 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,880,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,073,676 >>> mbox cmd response: success
17,074,156 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,077,889 UART: [afmc] ++
17,078,534 UART: [afmc] CDI.KEYID = 6
17,079,449 UART: [afmc] SUBJECT.KEYID = 7
17,080,669 UART: [afmc] AUTHORITY.KEYID = 5
20,455,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,186 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,755,499 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,769,895 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,784,695 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,112 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,819,556 UART: [afmc] --
22,823,203 UART: [cold-reset] --
22,825,459 UART: [state] Locking Datavault
22,831,034 UART: [state] Locking PCR0, PCR1 and PCR31
22,832,739 UART: [state] Locking ICCM
22,835,429 UART: [exit] Launching FMC @ 0x40000130
22,843,828 UART:
22,844,074 UART: Running Caliptra FMC ...
22,845,182 UART:
22,845,341 UART: [state] CFI Enabled
22,913,389 UART: [fht] FMC Alias Private Key: 7
25,251,775 UART: [art] Extend RT PCRs Done
25,253,000 UART: [art] Lock RT PCRs Done
25,254,473 UART: [art] Populate DV Done
25,259,942 UART: [fht] FMC Alias Private Key: 7
25,261,533 UART: [art] Derive CDI
25,262,348 UART: [art] Store in in slot 0x4
25,321,689 UART: [art] Derive Key Pair
25,322,711 UART: [art] Store priv key in slot 0x5
28,615,816 UART: [art] Derive Key Pair - Done
28,628,931 UART: [art] Signing Cert with AUTHO
28,630,240 UART: RITY.KEYID = 7
30,917,890 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,398 UART: [art] PUB.X = 20E762ECE2E4EF8550BFF4AD64E84DB93596290B6733D767DB1A5D2122A44FAD07656DD65315F7489085A7FC285D0DA5
30,926,653 UART: [art] PUB.Y = 0DB0FF02CC46EED9626332EF6A2F40EF066C57495E3EB7BAE0E6ED2BFBDEFC8BD116506134F8FE021179369D01DEF06E
30,933,916 UART: [art] SIG.R = 3E7AA86C02761B08E2740B9636D623D6FCE2D84EC13A798092CCDCB6C34E33F203D4EF202993B0358437FBBC77F35A2E
30,941,282 UART: [art] SIG.S = AA0184FC55E1EC5C93AA493C8C08748A74D5BEC550B1A3032612A756340DAA44337B71DD177172901FD8C30A9CE57913
32,246,315 UART: mbox::rt_entry...
32,247,279 UART: ____ _ _ _ ____ _____
32,249,210 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,217 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,150 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,080 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,010 UART: |_|
32,257,843 UART:
32,371,684 UART: [rt] Runtime listening for mailbox commands...
32,373,697 >>> mbox cmd response data (0 bytes)
34,504,601 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,648,935 UART:
34,649,283 UART: Running Caliptra ROM ...
34,650,328 UART:
34,650,479 UART: [state] CFI Enabled
34,716,875 UART: [state] LifecycleState = Unprovisioned
34,718,810 UART: [state] DebugLocked = No
34,720,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,724,714 UART: [kat] SHA2-256
34,894,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,904,876 UART: [kat] ++
34,905,339 UART: [kat] sha1
34,917,252 UART: [kat] SHA2-256
34,919,936 UART: [kat] SHA2-384
34,926,418 UART: [kat] SHA2-512-ACC
34,928,757 UART: [kat] ECC-384
37,218,783 UART: [kat] HMAC-384Kdf
37,249,632 UART: [kat] LMS
38,439,962 UART: [kat] --
38,444,672 UART: [update-reset] ++
42,584,333 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,588,334 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,970,555 >>> mbox cmd response: success
42,975,223 UART: [update-reset] Copying MAN_2 To MAN_1
42,995,052 UART: [update-reset Success] --
43,000,392 UART: [state] Locking Datavault
43,004,954 UART: [state] Locking PCR0, PCR1 and PCR31
43,006,712 UART: [state] Locking ICCM
43,008,527 UART: [exit] Launching FMC @ 0x40000130
43,016,953 UART:
43,017,205 UART: Running Caliptra FMC ...
43,018,235 UART:
43,018,389 UART: [state] CFI Enabled
43,105,374 UART: [art] Extend RT PCRs Done
43,106,566 UART: [art] Lock RT PCRs Done
43,107,968 UART: [art] Populate DV Done
43,113,223 UART: [fht] FMC Alias Private Key: 7
43,114,922 UART: [art] Derive CDI
43,115,659 UART: [art] Store in in slot 0x4
43,175,279 UART: [art] Derive Key Pair
43,176,326 UART: [art] Store priv key in slot 0x5
46,468,712 UART: [art] Derive Key Pair - Done
46,481,494 UART: [art] Signing Cert with AUTHO
46,482,798 UART: RITY.KEYID = 7
48,769,712 UART: [art] Erasing AUTHORITY.KEYID = 7
48,771,226 UART: [art] PUB.X = 3EE14FF723097E6AED7D2C0F2D894BC90974513265D0565FD786997970F381375CB04549109FFD6AC8C8FE9390BA6232
48,778,465 UART: [art] PUB.Y = DBACA87C8B0C017AE222595B9F68744BD77C41C7B2CFCC5D64E93701995158C641F5FED43F87D840CF69ABF04D551830
48,785,694 UART: [art] SIG.R = D75ECE6945D5F7202433C81C69D7E500C7646DC782C1BA7733AFB36F14B25E67209E5EA3E996EE24E4DC5B323A830E53
48,793,075 UART: [art] SIG.S = 8DF4B70D7CCD71798DD0A9FFC3023C1D56515F6349262B032BA4C232EC85C1E4627905F29A9EDAC46403414C2447FA94
50,098,435 UART: Caliptra RT
50,099,143 UART: [state] CFI Enabled
50,428,762 UART: [rt] RT failed reset flow
50,429,952 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,804,079 ready_for_fw is high
3,804,467 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,157,449 >>> mbox cmd response: success
17,158,244 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,842,895 UART:
22,843,270 UART: Running Caliptra FMC ...
22,844,471 UART:
22,844,638 UART: [state] CFI Enabled
22,911,416 UART: [fht] FMC Alias Private Key: 7
25,248,948 UART: [art] Extend RT PCRs Done
25,250,175 UART: [art] Lock RT PCRs Done
25,252,153 UART: [art] Populate DV Done
25,257,737 UART: [fht] FMC Alias Private Key: 7
25,259,290 UART: [art] Derive CDI
25,260,060 UART: [art] Store in in slot 0x4
25,320,445 UART: [art] Derive Key Pair
25,321,493 UART: [art] Store priv key in slot 0x5
28,614,074 UART: [art] Derive Key Pair - Done
28,627,082 UART: [art] Signing Cert with AUTHO
28,628,409 UART: RITY.KEYID = 7
30,916,470 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,976 UART: [art] PUB.X = CD733FE84A01D59102E26EE2E96CF343AE526F84E973F40D30455574605D5FF25E65FF3650842B94D8651FF8BEE2E6F5
30,925,231 UART: [art] PUB.Y = 36FCA37C917BDCEC96F997A8629EA5071CD1E961860898AECAF12EBEFB8CD65C4E9745329CF759E096211A262F7D377C
30,932,464 UART: [art] SIG.R = 469368619860ADCECADDB9D76F462D4D0DAA2D73DE8B48AEA15FE1057E0EE11208B9C9EB6C9C74BD4A8D0E9443A687AA
30,939,858 UART: [art] SIG.S = C418872F76BBED0D23E744E677D783E0A871E68BB87F238B672A721D8A6C3FF567FAA084EFF98AF0BFAD70F028401B19
32,244,502 UART: mbox::rt_entry...
32,245,473 UART: ____ _ _ _ ____ _____
32,247,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,414 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,255,278 UART: |_|
32,256,090 UART:
32,369,405 UART: [rt] Runtime listening for mailbox commands...
32,371,412 >>> mbox cmd response data (0 bytes)
34,504,149 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,239,654 >>> mbox cmd response: success
43,273,735 UART:
43,274,048 UART: Running Caliptra FMC ...
43,275,170 UART:
43,275,340 UART: [state] CFI Enabled
43,379,807 UART: [art] Extend RT PCRs Done
43,381,003 UART: [art] Lock RT PCRs Done
43,382,259 UART: [art] Populate DV Done
43,387,946 UART: [fht] FMC Alias Private Key: 7
43,389,487 UART: [art] Derive CDI
43,390,453 UART: [art] Store in in slot 0x4
43,449,047 UART: [art] Derive Key Pair
43,450,064 UART: [art] Store priv key in slot 0x5
46,742,145 UART: [art] Derive Key Pair - Done
46,755,132 UART: [art] Signing Cert with AUTHO
46,756,473 UART: RITY.KEYID = 7
49,044,097 UART: [art] Erasing AUTHORITY.KEYID = 7
49,045,615 UART: [art] PUB.X = 2E7017DD8AFDA628375EBBFFEF231DFCBE11039001917E28B91F452ED67AB8CEBDC77F6A0B353E9451FFAD53C9EEBA91
49,052,866 UART: [art] PUB.Y = BA7BACD56D68D8E60D8FC59764E1864AC3B5DC038A0FB1E963B7D6D2CC14D9C045E4955E5EF9DA793AE8F85CAC0AD73A
49,060,139 UART: [art] SIG.R = A7F97C1DFB913206417B589103562C33C9FBA2E1CAD28B5E53140D565582C59060BDEEC282D57D236E400FD1D9BBA3B2
49,067,507 UART: [art] SIG.S = D08081C38642CCC99B4577080123DF7C77289556ED8590FAB1528BF092502EF58138532918A95081E5FFF6FBEDE6D905
50,372,086 UART: Caliptra RT
50,372,791 UART: [state] CFI Enabled
50,704,649 UART: [rt] RT failed reset flow
50,705,863 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,438 UART:
192,819 UART: Running Caliptra ROM ...
194,003 UART:
603,721 UART: [state] CFI Enabled
618,443 UART: [state] LifecycleState = Unprovisioned
620,381 UART: [state] DebugLocked = No
622,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,319 UART: [kat] SHA2-256
796,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,562 UART: [kat] ++
807,078 UART: [kat] sha1
818,745 UART: [kat] SHA2-256
821,463 UART: [kat] SHA2-384
826,807 UART: [kat] SHA2-512-ACC
829,170 UART: [kat] ECC-384
3,111,831 UART: [kat] HMAC-384Kdf
3,123,296 UART: [kat] LMS
4,313,432 UART: [kat] --
4,316,805 UART: [cold-reset] ++
4,318,236 UART: [fht] Storing FHT @ 0x50003400
4,330,023 UART: [idev] ++
4,330,630 UART: [idev] CDI.KEYID = 6
4,331,541 UART: [idev] SUBJECT.KEYID = 7
4,332,780 UART: [idev] UDS.KEYID = 0
4,333,823 ready_for_fw is high
4,334,029 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,432,961 UART: [idev] Erasing UDS.KEYID = 0
7,617,920 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,661 UART: [idev] --
7,645,838 UART: [ldev] ++
7,646,405 UART: [ldev] CDI.KEYID = 6
7,647,342 UART: [ldev] SUBJECT.KEYID = 5
7,648,600 UART: [ldev] AUTHORITY.KEYID = 7
7,649,782 UART: [ldev] FE.KEYID = 1
7,661,814 UART: [ldev] Erasing FE.KEYID = 1
10,949,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,343 UART: [ldev] --
13,310,791 UART: [fwproc] Waiting for Commands...
13,312,770 UART: [fwproc] Received command 0x46574c44
13,314,967 UART: [fwproc] Received Image of size 78740 bytes
16,940,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,018,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,087,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,281,270 >>> mbox cmd response: success
17,281,780 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,285,243 UART: [afmc] ++
17,286,014 UART: [afmc] CDI.KEYID = 6
17,286,900 UART: [afmc] SUBJECT.KEYID = 7
17,287,939 UART: [afmc] AUTHORITY.KEYID = 5
20,601,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,895,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,897,394 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,911,754 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,926,595 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,941,041 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,960,916 UART: [afmc] --
22,965,214 UART: [cold-reset] --
22,968,262 UART: [state] Locking Datavault
22,974,556 UART: [state] Locking PCR0, PCR1 and PCR31
22,976,318 UART: [state] Locking ICCM
22,978,085 UART: [exit] Launching FMC @ 0x40000130
22,986,428 UART:
22,986,655 UART: Running Caliptra FMC ...
22,987,750 UART:
22,987,909 UART: [state] CFI Enabled
22,996,058 UART: [fht] FMC Alias Private Key: 7
25,326,917 UART: [art] Extend RT PCRs Done
25,328,132 UART: [art] Lock RT PCRs Done
25,329,888 UART: [art] Populate DV Done
25,335,403 UART: [fht] FMC Alias Private Key: 7
25,336,934 UART: [art] Derive CDI
25,337,764 UART: [art] Store in in slot 0x4
25,380,254 UART: [art] Derive Key Pair
25,381,292 UART: [art] Store priv key in slot 0x5
28,623,067 UART: [art] Derive Key Pair - Done
28,635,847 UART: [art] Signing Cert with AUTHO
28,637,151 UART: RITY.KEYID = 7
30,916,374 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,877 UART: [art] PUB.X = 80DD4E9F154081BBAB96A2D4A6F1C1C36704987BA7E1146DA4C640C39DA56C904816A3A1D754FF9F0A38988089CA7C5E
30,925,117 UART: [art] PUB.Y = D1FB27B8E205F98AB28C40E2DE4FC870A27892779811AFCD324BE31D62664DFACD80296BCB2A7AB1B6ED16F82CF9B629
30,932,391 UART: [art] SIG.R = AD3A6B4C6D0A7F63C52AF409F007CF657BEC97CA237E5D24853A09D487775EF34CD10B98AA5271C7886292972ECDFD92
30,939,715 UART: [art] SIG.S = 586CFDDE0A7813CCF63B2736AFAEF38E670D0F2613E77BD8E812A4695DDFBFA78CE98867D4D0D2D2C901C2C013DB927A
32,245,204 UART: mbox::rt_entry...
32,246,394 UART: ____ _ _ _ ____ _____
32,248,327 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,178 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,115 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,159 UART: |_|
32,256,964 UART:
32,370,141 UART: [rt] Runtime listening for mailbox commands...
32,372,139 >>> mbox cmd response data (0 bytes)
34,426,753 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,571,139 UART:
34,571,521 UART: Running Caliptra ROM ...
34,572,568 UART:
34,572,766 UART: [state] CFI Enabled
34,587,554 UART: [state] LifecycleState = Unprovisioned
34,589,490 UART: [state] DebugLocked = No
34,591,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,595,843 UART: [kat] SHA2-256
34,765,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,776,121 UART: [kat] ++
34,776,572 UART: [kat] sha1
34,788,479 UART: [kat] SHA2-256
34,791,167 UART: [kat] SHA2-384
34,797,857 UART: [kat] SHA2-512-ACC
34,800,197 UART: [kat] ECC-384
37,083,413 UART: [kat] HMAC-384Kdf
37,094,812 UART: [kat] LMS
38,284,857 UART: [kat] --
38,288,382 UART: [update-reset] ++
42,437,444 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,441,194 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,823,462 >>> mbox cmd response: success
42,828,100 UART: [update-reset] Copying MAN_2 To MAN_1
42,846,896 UART: [update-reset Success] --
42,852,939 UART: [state] Locking Datavault
42,855,165 UART: [state] Locking PCR0, PCR1 and PCR31
42,856,867 UART: [state] Locking ICCM
42,859,102 UART: [exit] Launching FMC @ 0x40000130
42,867,550 UART:
42,867,788 UART: Running Caliptra FMC ...
42,868,833 UART:
42,868,981 UART: [state] CFI Enabled
42,912,557 UART: [art] Extend RT PCRs Done
42,913,753 UART: [art] Lock RT PCRs Done
42,915,320 UART: [art] Populate DV Done
42,920,561 UART: [fht] FMC Alias Private Key: 7
42,922,313 UART: [art] Derive CDI
42,923,122 UART: [art] Store in in slot 0x4
42,965,906 UART: [art] Derive Key Pair
42,966,956 UART: [art] Store priv key in slot 0x5
46,209,069 UART: [art] Derive Key Pair - Done
46,222,245 UART: [art] Signing Cert with AUTHO
46,223,543 UART: RITY.KEYID = 7
48,503,189 UART: [art] Erasing AUTHORITY.KEYID = 7
48,504,685 UART: [art] PUB.X = F6A92701E931CF5D2F44920595DED18272EC3F9763F5F0A491D135AEEAA219200CE7539666B244D3393A15FCFEAC0DCA
48,511,907 UART: [art] PUB.Y = 8633FE94471A9D6192EE1B1D90EE5DAF151434BC3AD13D64A4B032C502215F90CB11DC933254BE2F5C7D6204043F5805
48,519,177 UART: [art] SIG.R = 1B5C5399FBBAAE4679EBD74192A0824B7AE3099B4BC9C37C71F75A13B8B2B7933CF7D79F1D7A673315571C04F1FA459F
48,526,536 UART: [art] SIG.S = 2A846C45C94EE23518E9C507B36D7D5BD6FA5099E796E2C91FC600E5C1BE5BA47C2A84872725801B8106FAB2797C2A6C
49,831,948 UART: Caliptra RT
49,832,645 UART: [state] CFI Enabled
50,122,712 UART: [rt] RT failed reset flow
50,123,929 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,527 ready_for_fw is high
4,129,130 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,349,463 >>> mbox cmd response: success
17,350,056 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,990,064 UART:
22,990,465 UART: Running Caliptra FMC ...
22,991,563 UART:
22,991,706 UART: [state] CFI Enabled
22,999,872 UART: [fht] FMC Alias Private Key: 7
25,331,285 UART: [art] Extend RT PCRs Done
25,332,507 UART: [art] Lock RT PCRs Done
25,334,321 UART: [art] Populate DV Done
25,339,895 UART: [fht] FMC Alias Private Key: 7
25,341,608 UART: [art] Derive CDI
25,342,421 UART: [art] Store in in slot 0x4
25,385,498 UART: [art] Derive Key Pair
25,386,501 UART: [art] Store priv key in slot 0x5
28,628,681 UART: [art] Derive Key Pair - Done
28,641,676 UART: [art] Signing Cert with AUTHO
28,642,977 UART: RITY.KEYID = 7
30,921,928 UART: [art] Erasing AUTHORITY.KEYID = 7
30,923,452 UART: [art] PUB.X = A7ABD8ECF216EED7217A6A59EDC51412C5A9F3AE09417370F04E8398DCFC747367EFC228AFF0E509A81B80CAC1B749BA
30,930,718 UART: [art] PUB.Y = 250FD732F7E69880D2ECC50F82C14B5D13445DFA8E7C7CBBE9DBCC2C32E7C999668DF36FF72F2D104D8AFA89004530BA
30,937,958 UART: [art] SIG.R = 3A57897A200DCE6B3A9B38AD1153146845B2093BF89EE2DA2FE2BA20CC23C4EF9C1A721EB17B74E6EC092767AD3D2086
30,945,343 UART: [art] SIG.S = 22DDDA10CE5EAC8DB0DA78DEDCFA64CB49C0374A6CE85BE639BA7ABAC0492764C8FD73375423AAFBE2B7D14C5C67DAFC
32,250,615 UART: mbox::rt_entry...
32,251,553 UART: ____ _ _ _ ____ _____
32,253,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,255,643 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,257,493 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,259,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,261,291 UART: |_|
32,262,170 UART:
32,375,906 UART: [rt] Runtime listening for mailbox commands...
32,377,911 >>> mbox cmd response data (0 bytes)
34,431,575 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,088,514 >>> mbox cmd response: success
43,123,826 UART:
43,124,135 UART: Running Caliptra FMC ...
43,125,185 UART:
43,125,331 UART: [state] CFI Enabled
43,169,420 UART: [art] Extend RT PCRs Done
43,170,606 UART: [art] Lock RT PCRs Done
43,171,868 UART: [art] Populate DV Done
43,177,274 UART: [fht] FMC Alias Private Key: 7
43,178,914 UART: [art] Derive CDI
43,179,642 UART: [art] Store in in slot 0x4
43,222,549 UART: [art] Derive Key Pair
43,223,541 UART: [art] Store priv key in slot 0x5
46,465,135 UART: [art] Derive Key Pair - Done
46,477,965 UART: [art] Signing Cert with AUTHO
46,479,260 UART: RITY.KEYID = 7
48,758,723 UART: [art] Erasing AUTHORITY.KEYID = 7
48,760,225 UART: [art] PUB.X = 2F82CB195379D9AF5E2F60EDCD3D6777E6514C84AB327DFD6545CAD58F6F368A1AAAC09776AEEF6E5B1C77C92D591728
48,767,470 UART: [art] PUB.Y = EFDC291464FC5B9D4EF7BFE8C3F0FD025E5DA50CC937A06ECDA9415B4E352DDC1AD4A0ABBC296509E656F1A66397B564
48,774,771 UART: [art] SIG.R = B3DE9E13218A6F668178F7D442EC1E7700391AAA0B188A913AB6018B9A14CA0814021067BCB3EA05CB442D48CB35767C
48,782,165 UART: [art] SIG.S = FFDEA142CFC1BA104377530360DE0FA30BC20D4ACF61EF6DA773CA1BED5C1C84117F13E607B25591A0893D02C616C76C
50,087,384 UART: Caliptra RT
50,088,102 UART: [state] CFI Enabled
50,376,266 UART: [rt] RT failed reset flow
50,377,459 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,235 UART:
192,579 UART: Running Caliptra ROM ...
193,748 UART:
193,902 UART: [state] CFI Enabled
262,566 UART: [state] LifecycleState = Unprovisioned
264,494 UART: [state] DebugLocked = No
265,888 UART: [state] WD Timer not started. Device not locked for debugging
269,070 UART: [kat] SHA2-256
448,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,774 UART: [kat] ++
460,305 UART: [kat] sha1
472,349 UART: [kat] SHA2-256
475,330 UART: [kat] SHA2-384
481,824 UART: [kat] SHA2-512-ACC
484,756 UART: [kat] ECC-384
2,946,621 UART: [kat] HMAC-384Kdf
2,968,473 UART: [kat] LMS
3,497,903 UART: [kat] --
3,503,009 UART: [cold-reset] ++
3,505,515 UART: [fht] FHT @ 0x50003400
3,516,376 UART: [idev] ++
3,516,989 UART: [idev] CDI.KEYID = 6
3,517,886 UART: [idev] SUBJECT.KEYID = 7
3,519,065 UART: [idev] UDS.KEYID = 0
3,519,996 ready_for_fw is high
3,520,210 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,379 UART: [idev] Erasing UDS.KEYID = 0
6,023,181 UART: [idev] Sha1 KeyId Algorithm
6,047,615 UART: [idev] --
6,050,799 UART: [ldev] ++
6,051,366 UART: [ldev] CDI.KEYID = 6
6,052,269 UART: [ldev] SUBJECT.KEYID = 5
6,053,489 UART: [ldev] AUTHORITY.KEYID = 7
6,054,719 UART: [ldev] FE.KEYID = 1
6,097,871 UART: [ldev] Erasing FE.KEYID = 1
8,600,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,290 UART: [ldev] --
10,411,538 UART: [fwproc] Wait for Commands...
10,414,230 UART: [fwproc] Recv command 0x46574c44
10,416,320 UART: [fwproc] Recv'd Img size: 78704 bytes
13,390,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,458,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,527,244 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,719,689 >>> mbox cmd response: success
13,720,198 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,723,969 UART: [afmc] ++
13,724,575 UART: [afmc] CDI.KEYID = 6
13,725,456 UART: [afmc] SUBJECT.KEYID = 7
13,726,532 UART: [afmc] AUTHORITY.KEYID = 5
16,271,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,994,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,996,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,012,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,028,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,044,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,067,191 UART: [afmc] --
18,070,696 UART: [cold-reset] --
18,074,007 UART: [state] Locking Datavault
18,078,349 UART: [state] Locking PCR0, PCR1 and PCR31
18,080,013 UART: [state] Locking ICCM
18,082,797 UART: [exit] Launching FMC @ 0x40000130
18,091,188 UART:
18,091,432 UART: Running Caliptra FMC ...
18,092,465 UART:
18,092,615 UART: [state] CFI Enabled
18,152,743 UART: [fht] FMC Alias Private Key: 7
19,917,300 UART: [art] Extend RT PCRs Done
19,918,514 UART: [art] Lock RT PCRs Done
19,920,268 UART: [art] Populate DV Done
19,925,616 UART: [fht] FMC Alias Private Key: 7
19,927,255 UART: [art] Derive CDI
19,928,067 UART: [art] Store in in slot 0x4
19,985,032 UART: [art] Derive Key Pair
19,986,031 UART: [art] Store priv key in slot 0x5
22,449,188 UART: [art] Derive Key Pair - Done
22,462,149 UART: [art] Signing Cert with AUTHO
22,463,451 UART: RITY.KEYID = 7
24,175,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,177,041 UART: [art] PUB.X = DF4C4AE9F3724D30981FBBBB09BA9336DABF7B957983A42F2582EDBA9DC1EC12A10EE205A98D0D55399BF7FCB34D626F
24,184,338 UART: [art] PUB.Y = C977D669EB7F5F4B25436218226E5BC0A58B39D37826327CEF4CC11EE26464EBDA0ACC4D26196B6AD984E72A5B0D4998
24,191,626 UART: [art] SIG.R = 4A978F917F464B42EA76448E9BD5999250826F8F62E0DB64F44BA421ED0F7D709A1780605D3D7141543182B6D4E73774
24,198,957 UART: [art] SIG.S = 065975EADD1730032FAD116FC7F635D11355DA40301C95DCEFB4C5D8E28226D324F8F19990B1C4F98BF83A95F12D1BE7
25,177,353 UART: mbox::rt_entry...
25,178,297 UART: ____ _ _ _ ____ _____
25,180,224 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,182,228 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,184,157 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,186,087 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,188,014 UART: |_|
25,189,453 UART:
25,301,361 UART: [rt] Runtime listening for mailbox commands...
25,303,384 >>> mbox cmd response data (0 bytes)
27,373,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,517,999 UART:
27,518,369 UART: Running Caliptra ROM ...
27,519,417 UART:
27,519,569 UART: [state] CFI Enabled
27,584,575 UART: [state] LifecycleState = Unprovisioned
27,586,413 UART: [state] DebugLocked = No
27,588,309 UART: [state] WD Timer not started. Device not locked for debugging
27,592,649 UART: [kat] SHA2-256
27,771,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,783,362 UART: [kat] ++
27,783,815 UART: [kat] sha1
27,794,481 UART: [kat] SHA2-256
27,797,487 UART: [kat] SHA2-384
27,803,524 UART: [kat] SHA2-512-ACC
27,806,465 UART: [kat] ECC-384
30,270,236 UART: [kat] HMAC-384Kdf
30,292,346 UART: [kat] LMS
30,821,778 UART: [kat] --
30,824,566 UART: [update-reset] ++
34,251,837 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,254,728 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,638,059 >>> mbox cmd response: success
34,642,665 UART: [update-reset] Copying MAN_2 To MAN_1
34,662,158 UART: [update-reset Success] --
34,667,544 UART: [state] Locking Datavault
34,670,855 UART: [state] Locking PCR0, PCR1 and PCR31
34,672,554 UART: [state] Locking ICCM
34,675,140 UART: [exit] Launching FMC @ 0x40000130
34,683,547 UART:
34,683,780 UART: Running Caliptra FMC ...
34,685,191 UART:
34,685,358 UART: [state] CFI Enabled
34,782,193 UART: [art] Extend RT PCRs Done
34,783,391 UART: [art] Lock RT PCRs Done
34,784,929 UART: [art] Populate DV Done
34,790,631 UART: [fht] FMC Alias Private Key: 7
34,792,296 UART: [art] Derive CDI
34,793,041 UART: [art] Store in in slot 0x4
34,851,284 UART: [art] Derive Key Pair
34,852,284 UART: [art] Store priv key in slot 0x5
37,315,313 UART: [art] Derive Key Pair - Done
37,328,583 UART: [art] Signing Cert with AUTHO
37,329,887 UART: RITY.KEYID = 7
39,040,315 UART: [art] Erasing AUTHORITY.KEYID = 7
39,041,823 UART: [art] PUB.X = F6541C151E0C59C07EF7FBB8A687CF878DB381129B94CA6ACA8ED1A43836D015D6A9F25514359B2B7B39D25B1109F7D6
39,049,129 UART: [art] PUB.Y = 9E0A3557966E11CA6F5FB056776842D76D2CDCCD5CB8096E4537A401EDCC139F2990094FFA9BEE6335F7B1FE9607C983
39,056,359 UART: [art] SIG.R = 972E33F20CF7D0DC9322110B03902C1085D2802B589EC8973DC40029BE7EB3C2B97DFAC804DD594AC0621D7E51A81DF8
39,063,754 UART: [art] SIG.S = F06C32C6D4CF750E0A72634C09A389C22A13CE42453A6B2AF21184D60F160BCDC56987A29BAE5B77EB0F36BCA3670781
40,042,727 UART: Caliptra RT
40,043,435 UART: [state] CFI Enabled
40,376,151 UART: [rt] RT failed reset flow
40,377,339 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,382,390 ready_for_fw is high
3,382,819 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,510,146 >>> mbox cmd response: success
13,510,701 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,789,324 UART:
17,789,727 UART: Running Caliptra FMC ...
17,790,821 UART:
17,790,975 UART: [state] CFI Enabled
17,859,071 UART: [fht] FMC Alias Private Key: 7
19,623,125 UART: [art] Extend RT PCRs Done
19,624,322 UART: [art] Lock RT PCRs Done
19,626,083 UART: [art] Populate DV Done
19,631,275 UART: [fht] FMC Alias Private Key: 7
19,632,868 UART: [art] Derive CDI
19,633,602 UART: [art] Store in in slot 0x4
19,691,860 UART: [art] Derive Key Pair
19,692,898 UART: [art] Store priv key in slot 0x5
22,155,663 UART: [art] Derive Key Pair - Done
22,168,176 UART: [art] Signing Cert with AUTHO
22,169,477 UART: RITY.KEYID = 7
23,881,815 UART: [art] Erasing AUTHORITY.KEYID = 7
23,883,312 UART: [art] PUB.X = 05D79DEC6C15E420480D00D6B4FE325FA014901F8A00F22EAFF0ECC1A3A6AA5B459EB5C4A8A7151651EA089460A109B8
23,890,570 UART: [art] PUB.Y = 897D9177CEEC9A0CB32D3517BBA0502228497296092B80D85B6ACAC3762ACFBAF81E0AE10E7C3A66C813EE3F016DFFE6
23,897,883 UART: [art] SIG.R = F69DD00B0AB9265CB6D585D2407E40201A470C0FD6EB295A4DBAE907F5CACEF91C1F9947B4EBE7EA22D5B568C7F3815D
23,905,800 UART: [art] SIG.S = E6D1DF33E4E390FF53747F0A7FC68C26A73C3E2ECA289919EB8681BFC9F64F59274B5D05147ECB03877965176782D4A9
24,883,677 UART: mbox::rt_entry...
24,884,624 UART: ____ _ _ _ ____ _____
24,886,603 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,888,607 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,890,534 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,892,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,894,420 UART: |_|
24,895,259 UART:
25,007,723 UART: [rt] Runtime listening for mailbox commands...
25,009,741 >>> mbox cmd response data (0 bytes)
27,063,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,191,733 >>> mbox cmd response: success
34,227,308 UART:
34,227,638 UART: Running Caliptra FMC ...
34,228,682 UART:
34,228,836 UART: [state] CFI Enabled
34,318,225 UART: [art] Extend RT PCRs Done
34,319,436 UART: [art] Lock RT PCRs Done
34,320,817 UART: [art] Populate DV Done
34,326,288 UART: [fht] FMC Alias Private Key: 7
34,327,824 UART: [art] Derive CDI
34,328,558 UART: [art] Store in in slot 0x4
34,387,280 UART: [art] Derive Key Pair
34,388,319 UART: [art] Store priv key in slot 0x5
36,851,192 UART: [art] Derive Key Pair - Done
36,864,076 UART: [art] Signing Cert with AUTHO
36,865,566 UART: RITY.KEYID = 7
38,577,029 UART: [art] Erasing AUTHORITY.KEYID = 7
38,578,534 UART: [art] PUB.X = 875A27409B57D5ABC00D882DD18FA9BD181FD409944CEB2BBA93757B2A98A3B826C91EBA299027AA478E7A0911130873
38,585,798 UART: [art] PUB.Y = 465F26E46A357983BA5B3C3C909FE7277D4F95EAC7B2FF5AF3B866F22BC734C197F2C2C93200B0CB692583AB07A44E61
38,593,044 UART: [art] SIG.R = 2647E0ABEF1A7BFBFD5348ADB4FDB6B4B2CCFBB58D45CC07B669DE209F26BB2ACFA925070C84C14531A37FDE87EC8FE8
38,600,511 UART: [art] SIG.S = 283CCC9B3722B420BCE996BCE0628E771232712DE8D8E7CD100A5FC264994000F9000FE86B833F8C08F5B87ED2CCD878
39,579,836 UART: Caliptra RT
39,580,525 UART: [state] CFI Enabled
39,914,831 UART: [rt] RT failed reset flow
39,916,056 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,241 UART:
192,607 UART: Running Caliptra ROM ...
193,694 UART:
603,392 UART: [state] CFI Enabled
619,180 UART: [state] LifecycleState = Unprovisioned
621,046 UART: [state] DebugLocked = No
622,561 UART: [state] WD Timer not started. Device not locked for debugging
625,878 UART: [kat] SHA2-256
805,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,545 UART: [kat] ++
816,988 UART: [kat] sha1
826,977 UART: [kat] SHA2-256
829,999 UART: [kat] SHA2-384
835,702 UART: [kat] SHA2-512-ACC
838,704 UART: [kat] ECC-384
3,280,587 UART: [kat] HMAC-384Kdf
3,293,583 UART: [kat] LMS
3,823,030 UART: [kat] --
3,826,629 UART: [cold-reset] ++
3,828,931 UART: [fht] FHT @ 0x50003400
3,841,111 UART: [idev] ++
3,841,669 UART: [idev] CDI.KEYID = 6
3,842,618 UART: [idev] SUBJECT.KEYID = 7
3,843,775 UART: [idev] UDS.KEYID = 0
3,844,739 ready_for_fw is high
3,844,913 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,943,934 UART: [idev] Erasing UDS.KEYID = 0
6,315,210 UART: [idev] Sha1 KeyId Algorithm
6,338,658 UART: [idev] --
6,342,726 UART: [ldev] ++
6,343,296 UART: [ldev] CDI.KEYID = 6
6,344,202 UART: [ldev] SUBJECT.KEYID = 5
6,345,407 UART: [ldev] AUTHORITY.KEYID = 7
6,346,632 UART: [ldev] FE.KEYID = 1
6,357,051 UART: [ldev] Erasing FE.KEYID = 1
8,832,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,152 UART: [ldev] --
10,623,757 UART: [fwproc] Wait for Commands...
10,626,760 UART: [fwproc] Recv command 0x46574c44
10,628,844 UART: [fwproc] Recv'd Img size: 78704 bytes
13,600,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,674,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,743,110 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,936,834 >>> mbox cmd response: success
13,937,322 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,940,853 UART: [afmc] ++
13,941,441 UART: [afmc] CDI.KEYID = 6
13,942,367 UART: [afmc] SUBJECT.KEYID = 7
13,943,571 UART: [afmc] AUTHORITY.KEYID = 5
16,439,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,159,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,161,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,177,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,193,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,209,030 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,232,277 UART: [afmc] --
18,236,196 UART: [cold-reset] --
18,241,561 UART: [state] Locking Datavault
18,247,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,243 UART: [state] Locking ICCM
18,251,034 UART: [exit] Launching FMC @ 0x40000130
18,259,479 UART:
18,259,746 UART: Running Caliptra FMC ...
18,260,785 UART:
18,260,926 UART: [state] CFI Enabled
18,269,073 UART: [fht] FMC Alias Private Key: 7
20,025,224 UART: [art] Extend RT PCRs Done
20,026,437 UART: [art] Lock RT PCRs Done
20,028,237 UART: [art] Populate DV Done
20,033,914 UART: [fht] FMC Alias Private Key: 7
20,035,563 UART: [art] Derive CDI
20,036,297 UART: [art] Store in in slot 0x4
20,078,958 UART: [art] Derive Key Pair
20,080,039 UART: [art] Store priv key in slot 0x5
22,506,308 UART: [art] Derive Key Pair - Done
22,519,354 UART: [art] Signing Cert with AUTHO
22,520,643 UART: RITY.KEYID = 7
24,226,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,227,543 UART: [art] PUB.X = F673F96A37F87D4FD38F1B18AB7375A502DB69126132A32BD00FEED901D5C9DB7CF3E50D0E81E19F72237733E3ED992D
24,234,855 UART: [art] PUB.Y = 46986FDFBF6EB3DCA2C1E973CC13A67E612E585160906E243A399CA85FFAF5382088B448057BE506ACA33C4AB2411B94
24,242,078 UART: [art] SIG.R = BC33DAB47DA6E045149AFC107E86676FDE26E31224B57E948BD568AB838D66532B671768575758959A54B615C3448802
24,249,415 UART: [art] SIG.S = 52B5BBD2CC137FBF42C5F8FCB404EC5C6BE25FC3E5AD023B03991F28A487417FB787BFD724CBDB43C33952EC2CE3CC93
25,227,922 UART: mbox::rt_entry...
25,228,886 UART: ____ _ _ _ ____ _____
25,230,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,232,809 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,234,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,236,569 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,238,441 UART: |_|
25,239,318 UART:
25,353,306 UART: [rt] Runtime listening for mailbox commands...
25,355,298 >>> mbox cmd response data (0 bytes)
27,422,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,567,570 UART:
27,567,954 UART: Running Caliptra ROM ...
27,568,999 UART:
27,569,149 UART: [state] CFI Enabled
27,582,994 UART: [state] LifecycleState = Unprovisioned
27,584,879 UART: [state] DebugLocked = No
27,587,742 UART: [state] WD Timer not started. Device not locked for debugging
27,591,045 UART: [kat] SHA2-256
27,770,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,781,821 UART: [kat] ++
27,782,357 UART: [kat] sha1
27,793,512 UART: [kat] SHA2-256
27,796,554 UART: [kat] SHA2-384
27,803,563 UART: [kat] SHA2-512-ACC
27,806,496 UART: [kat] ECC-384
30,247,438 UART: [kat] HMAC-384Kdf
30,258,753 UART: [kat] LMS
30,788,254 UART: [kat] --
30,792,989 UART: [update-reset] ++
34,223,654 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,227,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,610,718 >>> mbox cmd response: success
34,615,274 UART: [update-reset] Copying MAN_2 To MAN_1
34,634,217 UART: [update-reset Success] --
34,638,543 UART: [state] Locking Datavault
34,641,905 UART: [state] Locking PCR0, PCR1 and PCR31
34,643,546 UART: [state] Locking ICCM
34,645,318 UART: [exit] Launching FMC @ 0x40000130
34,653,764 UART:
34,654,001 UART: Running Caliptra FMC ...
34,655,300 UART:
34,655,452 UART: [state] CFI Enabled
34,699,370 UART: [art] Extend RT PCRs Done
34,700,560 UART: [art] Lock RT PCRs Done
34,702,038 UART: [art] Populate DV Done
34,707,497 UART: [fht] FMC Alias Private Key: 7
34,709,082 UART: [art] Derive CDI
34,709,891 UART: [art] Store in in slot 0x4
34,752,296 UART: [art] Derive Key Pair
34,753,331 UART: [art] Store priv key in slot 0x5
37,179,420 UART: [art] Derive Key Pair - Done
37,192,364 UART: [art] Signing Cert with AUTHO
37,193,669 UART: RITY.KEYID = 7
38,899,206 UART: [art] Erasing AUTHORITY.KEYID = 7
38,900,710 UART: [art] PUB.X = D0E0D4A860A76EF9ADCE5BEF5581D10CD02894C7C7A30FCD80F7776A780E2CF3A111EBB4D0C52C7AE054D416FA355D15
38,908,065 UART: [art] PUB.Y = 595C131B41294F33EFF83440EF151E07B4334524EF0FB4AD73E69578F1A3CE06406AE00060B8B2C27A472DBDD3D5B1E4
38,915,217 UART: [art] SIG.R = F81684C608174792669816CBA1AD99AF4DE34A1221E4B9CA3D35A02488AFAEEDFEA2A0C5038C8DB3AD528B5EE2CEB203
38,922,627 UART: [art] SIG.S = 0F4B35AA2F122253AD8E5D2DFF72C63703DCD793032F4D19849EE5055878DFC6D9CA2D77191C4BB1A2A3A52F5289F1D2
39,901,224 UART: Caliptra RT
39,901,930 UART: [state] CFI Enabled
40,188,954 UART: [rt] RT failed reset flow
40,190,147 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,700,621 ready_for_fw is high
3,700,994 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,717,746 >>> mbox cmd response: success
13,718,424 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,972,459 UART:
17,972,846 UART: Running Caliptra FMC ...
17,973,975 UART:
17,974,123 UART: [state] CFI Enabled
17,982,328 UART: [fht] FMC Alias Private Key: 7
19,738,943 UART: [art] Extend RT PCRs Done
19,740,160 UART: [art] Lock RT PCRs Done
19,741,859 UART: [art] Populate DV Done
19,747,391 UART: [fht] FMC Alias Private Key: 7
19,748,987 UART: [art] Derive CDI
19,749,796 UART: [art] Store in in slot 0x4
19,792,277 UART: [art] Derive Key Pair
19,793,268 UART: [art] Store priv key in slot 0x5
22,220,064 UART: [art] Derive Key Pair - Done
22,233,137 UART: [art] Signing Cert with AUTHO
22,234,456 UART: RITY.KEYID = 7
23,939,790 UART: [art] Erasing AUTHORITY.KEYID = 7
23,941,304 UART: [art] PUB.X = F94A8AE0325275CBA2B2ECD3BD58ADF8B0B4E161A795C206F2FFF9BA478DD13ECB0E8CD3E12F35A27AE9632979102C93
23,948,548 UART: [art] PUB.Y = 503B11C5756FD1ED15D7FE692A9DB7A4E4D3A4F0AADE860ACF4A776C7612060D077C754355F41C46E909457676C2AFA6
23,955,827 UART: [art] SIG.R = FA5A8B7EDE13FA968A302F424F3318E312A8D32AE013DA567471C83CD06CA15ADFD6BCE3B9FFA50B39705DB41E7E60A5
23,963,214 UART: [art] SIG.S = CDC15CF7721F89DE3439DC90F06DFC7B3AFAB0DDD77FCCA7DEADABC0E92B03C28425FA00ED3F539AF35FE7ADF9101BED
24,941,527 UART: mbox::rt_entry...
24,942,498 UART: ____ _ _ _ ____ _____
24,944,477 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,946,473 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,948,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,950,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,952,264 UART: |_|
24,953,066 UART:
25,066,465 UART: [rt] Runtime listening for mailbox commands...
25,068,464 >>> mbox cmd response data (0 bytes)
27,122,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,173,884 >>> mbox cmd response: success
34,210,369 UART:
34,210,672 UART: Running Caliptra FMC ...
34,211,706 UART:
34,211,847 UART: [state] CFI Enabled
34,255,708 UART: [art] Extend RT PCRs Done
34,256,900 UART: [art] Lock RT PCRs Done
34,258,436 UART: [art] Populate DV Done
34,263,836 UART: [fht] FMC Alias Private Key: 7
34,265,531 UART: [art] Derive CDI
34,266,261 UART: [art] Store in in slot 0x4
34,308,712 UART: [art] Derive Key Pair
34,309,741 UART: [art] Store priv key in slot 0x5
36,736,529 UART: [art] Derive Key Pair - Done
36,749,630 UART: [art] Signing Cert with AUTHO
36,750,933 UART: RITY.KEYID = 7
38,456,250 UART: [art] Erasing AUTHORITY.KEYID = 7
38,457,749 UART: [art] PUB.X = EBA57E4FCD535560DF60CF87505D423B6CE5D362C990788404BEB2C3E90EB90F29B705E12332112BFCF115BDE1DCFD7C
38,465,038 UART: [art] PUB.Y = 54194A80F64DBFC258527856EFC42DC6D9BE127D978A615716E613671DD83D77E5713CDDA92AF40186C738CECC145DCE
38,472,304 UART: [art] SIG.R = ECE47E75E841B352D858D4A6D2D1DFB8BB7F4FDB1A1ECF7A62BD6D73374EF0C44DAC7F1BB101D97D7C41823B2994D731
38,479,674 UART: [art] SIG.S = 63EC23AF9CC1D7BA01C9A8F03086E549CA35085C8AE29C226D2F6CBACC0E223F2F7106389BB4CF304D0DB916B13C29E6
39,458,668 UART: Caliptra RT
39,459,376 UART: [state] CFI Enabled
39,753,432 UART: [rt] RT failed reset flow
39,754,614 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,007 UART:
192,384 UART: Running Caliptra ROM ...
193,480 UART:
193,625 UART: [state] CFI Enabled
264,675 UART: [state] LifecycleState = Unprovisioned
267,070 UART: [state] DebugLocked = No
268,310 UART: [state] WD Timer not started. Device not locked for debugging
272,202 UART: [kat] SHA2-256
462,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,849 UART: [kat] ++
473,298 UART: [kat] sha1
485,162 UART: [kat] SHA2-256
488,173 UART: [kat] SHA2-384
494,334 UART: [kat] SHA2-512-ACC
496,954 UART: [kat] ECC-384
2,945,933 UART: [kat] HMAC-384Kdf
2,970,817 UART: [kat] LMS
3,502,574 UART: [kat] --
3,506,645 UART: [cold-reset] ++
3,508,228 UART: [fht] FHT @ 0x50003400
3,519,842 UART: [idev] ++
3,520,545 UART: [idev] CDI.KEYID = 6
3,521,540 UART: [idev] SUBJECT.KEYID = 7
3,522,656 UART: [idev] UDS.KEYID = 0
3,523,641 ready_for_fw is high
3,523,836 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,623,107 UART: [idev] Erasing UDS.KEYID = 0
6,027,346 UART: [idev] Sha1 KeyId Algorithm
6,049,122 UART: [idev] --
6,054,248 UART: [ldev] ++
6,054,923 UART: [ldev] CDI.KEYID = 6
6,055,885 UART: [ldev] SUBJECT.KEYID = 5
6,057,047 UART: [ldev] AUTHORITY.KEYID = 7
6,058,283 UART: [ldev] FE.KEYID = 1
6,102,131 UART: [ldev] Erasing FE.KEYID = 1
8,607,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,656 UART: [ldev] --
10,415,298 UART: [fwproc] Wait for Commands...
10,417,214 UART: [fwproc] Recv command 0x46574c44
10,419,529 UART: [fwproc] Recv'd Img size: 78704 bytes
13,438,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,520,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,636,905 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,966,156 >>> mbox cmd response: success
13,966,621 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,971,052 UART: [afmc] ++
13,971,785 UART: [afmc] CDI.KEYID = 6
13,972,980 UART: [afmc] SUBJECT.KEYID = 7
13,974,422 UART: [afmc] AUTHORITY.KEYID = 5
16,504,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,234,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,236,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,251,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,266,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,281,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,305,344 UART: [afmc] --
18,308,608 UART: [cold-reset] --
18,313,545 UART: [state] Locking Datavault
18,318,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,320,201 UART: [state] Locking ICCM
18,321,956 UART: [exit] Launching FMC @ 0x40000130
18,330,627 UART:
18,330,858 UART: Running Caliptra FMC ...
18,331,883 UART:
18,332,031 UART: [state] CFI Enabled
18,389,753 UART: [fht] FMC Alias Private Key: 7
20,153,814 UART: [art] Extend RT PCRs Done
20,155,030 UART: [art] Lock RT PCRs Done
20,156,633 UART: [art] Populate DV Done
20,161,943 UART: [fht] FMC Alias Private Key: 7
20,163,534 UART: [art] Derive CDI
20,164,347 UART: [art] Store in in slot 0x4
20,222,658 UART: [art] Derive Key Pair
20,223,695 UART: [art] Store priv key in slot 0x5
22,686,369 UART: [art] Derive Key Pair - Done
22,699,595 UART: [art] Signing Cert with AUTHO
22,700,898 UART: RITY.KEYID = 7
24,412,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,589 UART: [art] PUB.X = 358E3BC795B0B77DDA33A1912DD66F93F005E7DF8EBE0FE5F23F4BF3338916BE312FC3C3CD51CA903B7DA4AE91BC2999
24,421,734 UART: [art] PUB.Y = CE4C73774FBAB160B74E0A7A890710C95A408AACE03E0ED09CA56DA21A61E98268E02A388228A28DFAE176B7EC066FF4
24,429,016 UART: [art] SIG.R = D80FF12CE6872522796B9885E35F209823584F4C45F4DE051B5040D88AD4D9DDF9E435F38A70358B0C8086774987E53E
24,436,413 UART: [art] SIG.S = D9AC8E6A1C46CD61B42EEDDB8E56B78B25E5BEFC967912EEC0D2E93484A278759B68A2AED6FF42107DFC12E8C02137FF
25,415,068 UART: mbox::rt_entry...
25,416,034 UART: ____ _ _ _ ____ _____
25,417,962 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,419,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,421,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,423,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,425,598 UART: |_|
25,426,474 UART:
25,539,518 UART: [rt] Runtime listening for mailbox commands...
25,541,540 >>> mbox cmd response data (0 bytes)
27,601,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,746,558 UART:
27,746,928 UART: Running Caliptra ROM ...
27,748,059 UART:
27,748,252 UART: [state] CFI Enabled
27,822,799 UART: [state] LifecycleState = Unprovisioned
27,824,908 UART: [state] DebugLocked = No
27,827,213 UART: [state] WD Timer not started. Device not locked for debugging
27,831,885 UART: [kat] SHA2-256
28,021,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,032,499 UART: [kat] ++
28,033,004 UART: [kat] sha1
28,045,576 UART: [kat] SHA2-256
28,048,600 UART: [kat] SHA2-384
28,055,672 UART: [kat] SHA2-512-ACC
28,058,238 UART: [kat] ECC-384
30,507,509 UART: [kat] HMAC-384Kdf
30,531,085 UART: [kat] LMS
31,062,661 UART: [kat] --
31,067,889 UART: [update-reset] ++
34,524,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,528,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,136,390 >>> mbox cmd response: success
35,140,881 UART: [update-reset] Copying MAN_2 To MAN_1
35,175,016 UART: [update-reset Success] --
35,179,004 UART: [state] Locking Datavault
35,182,969 UART: [state] Locking PCR0, PCR1 and PCR31
35,185,167 UART: [state] Locking ICCM
35,186,706 UART: [exit] Launching FMC @ 0x40000130
35,195,375 UART:
35,195,614 UART: Running Caliptra FMC ...
35,196,772 UART:
35,196,920 UART: [state] CFI Enabled
35,299,140 UART: [art] Extend RT PCRs Done
35,300,346 UART: [art] Lock RT PCRs Done
35,301,774 UART: [art] Populate DV Done
35,307,504 UART: [fht] FMC Alias Private Key: 7
35,309,221 UART: [art] Derive CDI
35,310,037 UART: [art] Store in in slot 0x4
35,367,829 UART: [art] Derive Key Pair
35,368,828 UART: [art] Store priv key in slot 0x5
37,831,489 UART: [art] Derive Key Pair - Done
37,844,659 UART: [art] Signing Cert with AUTHO
37,845,967 UART: RITY.KEYID = 7
39,557,398 UART: [art] Erasing AUTHORITY.KEYID = 7
39,558,875 UART: [art] PUB.X = D2A14CC620463DD615A8A52591B7D93D1FB8F728D87A97989C72BCE7A5CF66E172160BF4B841D327C4261C7851329759
39,566,111 UART: [art] PUB.Y = 2AC6065499918B60434AB5A9643CA377BB8698DA365724F27B187ACD89C3F971A4D12707ED8E87AFBA9B0AB9B97E5A22
39,573,390 UART: [art] SIG.R = 56FE59B45D43F50F0E819BBCF9CBA547E4995853FD91D0D33FDAFBB5CCD6988C37F72C7BA5392716F84F6C8E3E1EA868
39,580,839 UART: [art] SIG.S = 4AC5F79B8EF626BEC7F39C15E56B7508F10E6354649A07C8C5A86341CB8B62DEA8FBB8AE5CBFCBBF5FB58A2BF40F9870
40,560,178 UART: Caliptra RT
40,560,892 UART: [state] CFI Enabled
40,893,604 UART: [rt] RT failed reset flow
40,894,926 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,414,499 ready_for_fw is high
3,414,885 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,935,553 >>> mbox cmd response: success
13,936,118 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,230,292 UART:
18,230,672 UART: Running Caliptra FMC ...
18,231,804 UART:
18,231,967 UART: [state] CFI Enabled
18,297,419 UART: [fht] FMC Alias Private Key: 7
20,061,145 UART: [art] Extend RT PCRs Done
20,062,374 UART: [art] Lock RT PCRs Done
20,063,897 UART: [art] Populate DV Done
20,069,432 UART: [fht] FMC Alias Private Key: 7
20,070,975 UART: [art] Derive CDI
20,071,793 UART: [art] Store in in slot 0x4
20,130,931 UART: [art] Derive Key Pair
20,131,929 UART: [art] Store priv key in slot 0x5
22,594,732 UART: [art] Derive Key Pair - Done
22,607,682 UART: [art] Signing Cert with AUTHO
22,609,004 UART: RITY.KEYID = 7
24,320,192 UART: [art] Erasing AUTHORITY.KEYID = 7
24,321,674 UART: [art] PUB.X = 96FA0E0F996CAA1127253693FC5BEFFE8EEF564E6877DF77D5F6302EE1537401321FDB3E2FC9E115E747F406DAF010EE
24,328,968 UART: [art] PUB.Y = 7074376BAD8FB30891EBFB9CC2275C39568BDE0786A1C94C0FE3D08CBF43BC4F75F8F3ECEF7E3193C978EA2F5749503A
24,336,295 UART: [art] SIG.R = 7333D73F59AC1333E69D8B3A42741214000C596CEF40A9331CBF22644C53F9D533565A1118A70DDF115837E9E43348BA
24,343,629 UART: [art] SIG.S = BC96B771BA7CFE71BFE2E5734A5B41F258B24A87F6FB2277572CD22C8C7E56FBDA88B6A4074D17FA0D9EECFD246913AA
25,321,801 UART: mbox::rt_entry...
25,322,764 UART: ____ _ _ _ ____ _____
25,324,694 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,326,698 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,328,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,330,510 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,332,562 UART: |_|
25,333,369 UART:
25,446,575 UART: [rt] Runtime listening for mailbox commands...
25,448,580 >>> mbox cmd response data (0 bytes)
27,507,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,320,793 >>> mbox cmd response: success
35,355,516 UART:
35,355,857 UART: Running Caliptra FMC ...
35,356,985 UART:
35,357,151 UART: [state] CFI Enabled
35,462,780 UART: [art] Extend RT PCRs Done
35,463,965 UART: [art] Lock RT PCRs Done
35,465,284 UART: [art] Populate DV Done
35,470,754 UART: [fht] FMC Alias Private Key: 7
35,472,398 UART: [art] Derive CDI
35,473,137 UART: [art] Store in in slot 0x4
35,531,504 UART: [art] Derive Key Pair
35,532,544 UART: [art] Store priv key in slot 0x5
37,995,818 UART: [art] Derive Key Pair - Done
38,008,649 UART: [art] Signing Cert with AUTHO
38,009,963 UART: RITY.KEYID = 7
39,722,094 UART: [art] Erasing AUTHORITY.KEYID = 7
39,723,600 UART: [art] PUB.X = 064D16FB2A4C9BC69FD98D6A431D1E7A5D0062F8012B776467F60F5C35371B5038C890776673AF0466EAC7FEFC9F987E
39,730,789 UART: [art] PUB.Y = E2692F0A99B5C7848C33D35CABEC526B3396073928A9CE876CBC55A217691F60D197C7846677292E6A323820B85B47CE
39,738,067 UART: [art] SIG.R = 244CB01E794CB99F505771C6F2E09F42A79B077DEF0B7359DD7D864F8CEFBE0AAC2B3ACE0BD76CB328FBE7DBD5E01D13
39,745,505 UART: [art] SIG.S = 1534007062D8496009698AEF09F0CD5A1FDF4D0AAB52C95B79D056A016CC9163D27D54F30A3428E002BF56FB157619DC
40,724,208 UART: Caliptra RT
40,724,906 UART: [state] CFI Enabled
41,058,587 UART: [rt] RT failed reset flow
41,059,783 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,390 UART:
192,750 UART: Running Caliptra ROM ...
193,931 UART:
603,458 UART: [state] CFI Enabled
617,565 UART: [state] LifecycleState = Unprovisioned
619,935 UART: [state] DebugLocked = No
621,743 UART: [state] WD Timer not started. Device not locked for debugging
625,934 UART: [kat] SHA2-256
815,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,613 UART: [kat] ++
827,212 UART: [kat] sha1
839,081 UART: [kat] SHA2-256
842,162 UART: [kat] SHA2-384
847,434 UART: [kat] SHA2-512-ACC
850,005 UART: [kat] ECC-384
3,293,470 UART: [kat] HMAC-384Kdf
3,307,280 UART: [kat] LMS
3,839,105 UART: [kat] --
3,844,803 UART: [cold-reset] ++
3,847,152 UART: [fht] FHT @ 0x50003400
3,859,180 UART: [idev] ++
3,859,887 UART: [idev] CDI.KEYID = 6
3,860,913 UART: [idev] SUBJECT.KEYID = 7
3,862,102 UART: [idev] UDS.KEYID = 0
3,863,039 ready_for_fw is high
3,863,223 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,962,118 UART: [idev] Erasing UDS.KEYID = 0
6,334,534 UART: [idev] Sha1 KeyId Algorithm
6,357,374 UART: [idev] --
6,362,063 UART: [ldev] ++
6,362,739 UART: [ldev] CDI.KEYID = 6
6,363,641 UART: [ldev] SUBJECT.KEYID = 5
6,364,843 UART: [ldev] AUTHORITY.KEYID = 7
6,366,008 UART: [ldev] FE.KEYID = 1
6,378,989 UART: [ldev] Erasing FE.KEYID = 1
8,856,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,000 UART: [ldev] --
10,648,135 UART: [fwproc] Wait for Commands...
10,650,010 UART: [fwproc] Recv command 0x46574c44
10,652,259 UART: [fwproc] Recv'd Img size: 78704 bytes
13,660,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,734,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,850,344 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,179,681 >>> mbox cmd response: success
14,180,137 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
14,183,803 UART: [afmc] ++
14,184,494 UART: [afmc] CDI.KEYID = 6
14,185,741 UART: [afmc] SUBJECT.KEYID = 7
14,187,176 UART: [afmc] AUTHORITY.KEYID = 5
16,690,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,412,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,414,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,122 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,483,436 UART: [afmc] --
18,486,822 UART: [cold-reset] --
18,491,495 UART: [state] Locking Datavault
18,495,455 UART: [state] Locking PCR0, PCR1 and PCR31
18,497,593 UART: [state] Locking ICCM
18,499,418 UART: [exit] Launching FMC @ 0x40000130
18,508,083 UART:
18,508,312 UART: Running Caliptra FMC ...
18,509,406 UART:
18,509,555 UART: [state] CFI Enabled
18,517,358 UART: [fht] FMC Alias Private Key: 7
20,274,060 UART: [art] Extend RT PCRs Done
20,275,304 UART: [art] Lock RT PCRs Done
20,276,930 UART: [art] Populate DV Done
20,281,956 UART: [fht] FMC Alias Private Key: 7
20,283,543 UART: [art] Derive CDI
20,284,354 UART: [art] Store in in slot 0x4
20,327,049 UART: [art] Derive Key Pair
20,328,094 UART: [art] Store priv key in slot 0x5
22,755,075 UART: [art] Derive Key Pair - Done
22,767,913 UART: [art] Signing Cert with AUTHO
22,769,218 UART: RITY.KEYID = 7
24,474,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,124 UART: [art] PUB.X = 4723F1C7E56551E33BDFAA9873EE55AE2319EF7A8E9AB96E75341AEA3CAC319CF76C53D2492B219D3544623B6130BF81
24,483,418 UART: [art] PUB.Y = 2BFB35A867BB6C7F7C34A5FA055B7F1DBC2298006C51E235E0E1AE320F6572CF82FD39C98C4B46223D1188BF73DE228C
24,490,642 UART: [art] SIG.R = 7BBDFB97C0B045E68DB513FABD2C52F67BEDA17D3D64DA94E3E932803F0B7B60CD6C7521790DB4AEC8D5CBF345ACCC7A
24,498,079 UART: [art] SIG.S = DC6B418594035CCA61727B9335C12CF3B172C1B9A20E9222FD5CD8BA6963C15DBB7669783CB65D7D89B8FC228497190A
25,477,112 UART: mbox::rt_entry...
25,478,079 UART: ____ _ _ _ ____ _____
25,480,059 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,482,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,483,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,485,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,487,763 UART: |_|
25,488,588 UART:
25,603,250 UART: [rt] Runtime listening for mailbox commands...
25,605,258 >>> mbox cmd response data (0 bytes)
27,674,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,819,509 UART:
27,819,884 UART: Running Caliptra ROM ...
27,821,011 UART:
27,821,192 UART: [state] CFI Enabled
27,835,114 UART: [state] LifecycleState = Unprovisioned
27,837,044 UART: [state] DebugLocked = No
27,838,490 UART: [state] WD Timer not started. Device not locked for debugging
27,842,658 UART: [kat] SHA2-256
28,032,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,043,247 UART: [kat] ++
28,043,763 UART: [kat] sha1
28,055,838 UART: [kat] SHA2-256
28,058,804 UART: [kat] SHA2-384
28,065,168 UART: [kat] SHA2-512-ACC
28,067,732 UART: [kat] ECC-384
30,510,977 UART: [kat] HMAC-384Kdf
30,522,959 UART: [kat] LMS
31,054,565 UART: [kat] --
31,058,986 UART: [update-reset] ++
34,526,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,529,583 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,137,812 >>> mbox cmd response: success
35,142,439 UART: [update-reset] Copying MAN_2 To MAN_1
35,175,812 UART: [update-reset Success] --
35,179,853 UART: [state] Locking Datavault
35,182,790 UART: [state] Locking PCR0, PCR1 and PCR31
35,184,999 UART: [state] Locking ICCM
35,187,689 UART: [exit] Launching FMC @ 0x40000130
35,196,352 UART:
35,196,634 UART: Running Caliptra FMC ...
35,197,924 UART:
35,198,085 UART: [state] CFI Enabled
35,242,211 UART: [art] Extend RT PCRs Done
35,243,354 UART: [art] Lock RT PCRs Done
35,245,010 UART: [art] Populate DV Done
35,250,261 UART: [fht] FMC Alias Private Key: 7
35,251,790 UART: [art] Derive CDI
35,252,598 UART: [art] Store in in slot 0x4
35,295,183 UART: [art] Derive Key Pair
35,296,231 UART: [art] Store priv key in slot 0x5
37,722,395 UART: [art] Derive Key Pair - Done
37,735,409 UART: [art] Signing Cert with AUTHO
37,736,706 UART: RITY.KEYID = 7
39,442,169 UART: [art] Erasing AUTHORITY.KEYID = 7
39,443,697 UART: [art] PUB.X = B80DD2A13E830D0DA3445EDAD4DF40758D38F5072E17217C7A55854502738335151F914DCF2C9C8C07AE5C3894C84881
39,450,916 UART: [art] PUB.Y = 675633E4FE7C2AA89FDE05F3D30D1379C54AF33294DC74AF646A07867A44149486CDA8B2FF7E23FF37EAB0D70768F64B
39,458,169 UART: [art] SIG.R = 1911B87F3355D4DF6FF72DF02616351A77CD001B612CE8D06326B3F8971FE8C572E37D7B7E1DFF66930D196EC085710B
39,465,591 UART: [art] SIG.S = 7CA1D98C04D076F0811A30A1E64272CF15953341AADCE04F21BD467823A41BB81CF98BE3FDA4FD34B568E91585BF645E
40,444,397 UART: Caliptra RT
40,445,110 UART: [state] CFI Enabled
40,730,465 UART: [rt] RT failed reset flow
40,731,660 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,762,575 ready_for_fw is high
3,762,946 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,201,863 >>> mbox cmd response: success
14,202,724 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,457,151 UART:
18,457,573 UART: Running Caliptra FMC ...
18,458,719 UART:
18,458,871 UART: [state] CFI Enabled
18,466,606 UART: [fht] FMC Alias Private Key: 7
20,223,284 UART: [art] Extend RT PCRs Done
20,224,509 UART: [art] Lock RT PCRs Done
20,226,229 UART: [art] Populate DV Done
20,231,711 UART: [fht] FMC Alias Private Key: 7
20,233,415 UART: [art] Derive CDI
20,234,225 UART: [art] Store in in slot 0x4
20,277,133 UART: [art] Derive Key Pair
20,278,128 UART: [art] Store priv key in slot 0x5
22,704,644 UART: [art] Derive Key Pair - Done
22,717,657 UART: [art] Signing Cert with AUTHO
22,718,964 UART: RITY.KEYID = 7
24,424,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,425,829 UART: [art] PUB.X = DAF9CB0DE04F4343375D7F62F28BEB8A848EE78CC7346EC956B1982A3DA6206B5CB164FA8BA3882E050235FFE2D45BAF
24,433,138 UART: [art] PUB.Y = 0F6725C90CD858D69BB44EF8FAFCED588C1FEC78D5436DEE34D8D731A8DAE5C2D0547DD74B82DEB79D6C979C9A2672C9
24,440,428 UART: [art] SIG.R = 0C8645E41B1660253F18DA941DEE75824101AC032BF639D7627E16A2296ECB45DF4FD3E7F0137BC283BA97F09D77751F
24,447,753 UART: [art] SIG.S = 5AAA3371BAA70C1851EEE35C489C77421D5831FCAFB9378BAF4F68AABF5F7F1CFA5B316C28EEEBD16324C0B1CF8AC79E
25,426,088 UART: mbox::rt_entry...
25,427,058 UART: ____ _ _ _ ____ _____
25,429,037 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,431,034 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,432,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,434,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,436,839 UART: |_|
25,437,638 UART:
25,550,434 UART: [rt] Runtime listening for mailbox commands...
25,552,429 >>> mbox cmd response data (0 bytes)
27,607,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,340,068 >>> mbox cmd response: success
35,373,935 UART:
35,374,273 UART: Running Caliptra FMC ...
35,375,391 UART:
35,375,554 UART: [state] CFI Enabled
35,418,921 UART: [art] Extend RT PCRs Done
35,420,066 UART: [art] Lock RT PCRs Done
35,421,403 UART: [art] Populate DV Done
35,426,590 UART: [fht] FMC Alias Private Key: 7
35,428,319 UART: [art] Derive CDI
35,429,136 UART: [art] Store in in slot 0x4
35,471,884 UART: [art] Derive Key Pair
35,472,880 UART: [art] Store priv key in slot 0x5
37,899,746 UART: [art] Derive Key Pair - Done
37,912,690 UART: [art] Signing Cert with AUTHO
37,914,013 UART: RITY.KEYID = 7
39,619,589 UART: [art] Erasing AUTHORITY.KEYID = 7
39,621,091 UART: [art] PUB.X = 06DFFD6600E29FC7A679E967D7CECCC8426CA07582981F982E228BCA2EFDA9915E9BDCC76EBB65B7483CE7ACFA150F3F
39,628,373 UART: [art] PUB.Y = 1528E7E2D308552F241B7BCAE124291C872F86E7958F2E18DC09B679E9E2478F2C556B719E9E9E9C7787F98FBFE3E2A9
39,635,625 UART: [art] SIG.R = BC2006D2ECCD8CD8785296B4AC7D4928DEE065427353116D6BA5C32079216641341F951A7EC4E6AEAAA834B4C4492A5B
39,643,030 UART: [art] SIG.S = 38864CFC77D23B7621A4E821D6B64BA9A96172C735ABF1D3ABA589106E8EC832EB06BAD11651AA24109A6DD727801514
40,621,776 UART: Caliptra RT
40,622,508 UART: [state] CFI Enabled
40,911,759 UART: [rt] RT failed reset flow
40,912,965 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,831 UART: [kat] SHA2-256
881,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,877 UART: [kat] ++
886,029 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,048 UART: [kat] SHA2-512-ACC
896,949 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,577 UART: [cold-reset] ++
1,476,929 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 ready_for_fw is high
1,480,923 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,154 UART: [idev] Erasing UDS.KEYID = 0
1,504,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,242 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,891 UART: [ldev] Erasing FE.KEYID = 1
1,545,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,680 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,950 UART: [fwproc] Received command 0x46574c44
1,586,741 UART: [fwproc] Received Image of size 78704 bytes
2,477,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,291 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,176 >>> mbox cmd response: success
2,616,176 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,617,348 UART: [afmc] ++
2,617,516 UART: [afmc] CDI.KEYID = 6
2,617,878 UART: [afmc] SUBJECT.KEYID = 7
2,618,303 UART: [afmc] AUTHORITY.KEYID = 5
2,652,910 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,186 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,966 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,579 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,269 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,086 UART: [afmc] --
2,696,210 UART: [cold-reset] --
2,696,864 UART: [state] Locking Datavault
2,697,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,379 UART: [state] Locking ICCM
2,698,983 UART: [exit] Launching FMC @ 0x40000130
2,704,312 UART:
2,704,328 UART: Running Caliptra FMC ...
2,704,736 UART:
2,704,790 UART: [state] CFI Enabled
2,715,399 UART: [fht] FMC Alias Private Key: 7
2,823,700 UART: [art] Extend RT PCRs Done
2,824,128 UART: [art] Lock RT PCRs Done
2,825,874 UART: [art] Populate DV Done
2,834,119 UART: [fht] FMC Alias Private Key: 7
2,835,117 UART: [art] Derive CDI
2,835,397 UART: [art] Store in in slot 0x4
2,920,720 UART: [art] Derive Key Pair
2,921,080 UART: [art] Store priv key in slot 0x5
2,934,302 UART: [art] Derive Key Pair - Done
2,948,941 UART: [art] Signing Cert with AUTHO
2,949,421 UART: RITY.KEYID = 7
2,964,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,424 UART: [art] PUB.X = AF9A3562FF77262EDB257B3780BA624EE2D96F2B352E8551758959285AEEE448A3194DC9C141FD010FD6EFE3AFC1EA35
2,972,200 UART: [art] PUB.Y = 0DDA0AE308811F45885D118688F8A3424084C3DDCEBC19A428F7B7104D4B733BEF920C40C49668B2B7AB69B4C9C5BF49
2,979,146 UART: [art] SIG.R = 422AB02C2FD53AA83FF1B9F3EEA3537A48CAC1E2FB43C01E90AAC1E2644518329151218D1E760CB61C2F6C5F4DE0C0D8
2,985,929 UART: [art] SIG.S = B2E06181A66D52456FF2ABA745A8F4400E4BCF91CF0BEF90AE9BDA1EBBA64192BCB6457E57AAFBBA64EF02620A1A5DE1
3,009,604 UART: mbox::rt_entry...
3,009,976 UART: ____ _ _ _ ____ _____
3,010,760 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,560 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,328 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,864 UART: |_|
3,014,176 UART:
3,120,796 UART: [rt] Runtime listening for mailbox commands...
3,121,730 >>> mbox cmd response data (0 bytes)
3,121,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,121,845 UART:
3,121,861 UART: Running Caliptra ROM ...
3,122,269 UART:
3,122,323 UART: [state] CFI Enabled
3,124,773 UART: [state] LifecycleState = Unprovisioned
3,125,428 UART: [state] DebugLocked = No
3,126,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,127,679 UART: [kat] SHA2-256
3,921,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,925,725 UART: [kat] ++
3,925,877 UART: [kat] sha1
3,930,143 UART: [kat] SHA2-256
3,932,081 UART: [kat] SHA2-384
3,934,812 UART: [kat] SHA2-512-ACC
3,936,712 UART: [kat] ECC-384
3,942,351 UART: [kat] HMAC-384Kdf
3,946,929 UART: [kat] LMS
4,515,125 UART: [kat] --
4,515,910 UART: [update-reset] ++
5,851,489 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,852,735 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,002,785 >>> mbox cmd response: success
6,003,008 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,022 UART: [update-reset Success] --
6,012,127 UART: [state] Locking Datavault
6,012,895 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,499 UART: [state] Locking ICCM
6,013,975 UART: [exit] Launching FMC @ 0x40000130
6,019,304 UART:
6,019,320 UART: Running Caliptra FMC ...
6,019,728 UART:
6,019,782 UART: [state] CFI Enabled
6,108,531 UART: [art] Extend RT PCRs Done
6,108,959 UART: [art] Lock RT PCRs Done
6,109,864 UART: [art] Populate DV Done
6,118,051 UART: [fht] FMC Alias Private Key: 7
6,119,105 UART: [art] Derive CDI
6,119,385 UART: [art] Store in in slot 0x4
6,205,032 UART: [art] Derive Key Pair
6,205,392 UART: [art] Store priv key in slot 0x5
6,218,648 UART: [art] Derive Key Pair - Done
6,233,624 UART: [art] Signing Cert with AUTHO
6,234,104 UART: RITY.KEYID = 7
6,249,484 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,249 UART: [art] PUB.X = F71A0C39C921E4D22D42AB45B7125B7666C9784B6B4CE4885F242BD5586998C1695A5192B48DCEFD14DED403072EDC6F
6,257,016 UART: [art] PUB.Y = D28653694CAF81D0EC46C874E20A2415DDD3D02B1FD64F2C3A4CBA3B41368D3E4B2720AD4CCC9119E862524259455DB6
6,263,971 UART: [art] SIG.R = 49D21D2D90FAD0D268D348959C7761A97BAF37D4A2EFC57A4036AD7F59214C3812EF56EBE0F1811C57CC50530D86378C
6,270,744 UART: [art] SIG.S = CAFC0CA8CFF2CD3F9D83AC5F8475356D558DDE79276A688A413A3E409212F4B24AE24869CE01C6914CE3C365DC3F4E36
6,294,569 UART: Caliptra RT
6,294,822 UART: [state] CFI Enabled
6,578,862 UART: [rt] RT failed reset flow
6,579,293 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,129 ready_for_fw is high
1,362,129 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,376 >>> mbox cmd response: success
2,467,376 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,529,000 UART:
2,529,016 UART: Running Caliptra FMC ...
2,529,424 UART:
2,529,478 UART: [state] CFI Enabled
2,539,737 UART: [fht] FMC Alias Private Key: 7
2,648,336 UART: [art] Extend RT PCRs Done
2,648,764 UART: [art] Lock RT PCRs Done
2,650,392 UART: [art] Populate DV Done
2,658,661 UART: [fht] FMC Alias Private Key: 7
2,659,763 UART: [art] Derive CDI
2,660,043 UART: [art] Store in in slot 0x4
2,745,492 UART: [art] Derive Key Pair
2,745,852 UART: [art] Store priv key in slot 0x5
2,758,540 UART: [art] Derive Key Pair - Done
2,773,455 UART: [art] Signing Cert with AUTHO
2,773,935 UART: RITY.KEYID = 7
2,789,467 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,232 UART: [art] PUB.X = 94C29552BBDB245F4F9B48A9FC4743E9DB0222A36795011FBB9F067D81D4C38872D4F37ED4C3D23F8F6E6866729765FE
2,796,997 UART: [art] PUB.Y = 229CF347777B67B2C8083B696DBF10B1731B5F8A4EABA0FDE9BED99DFB14D21DF523160B60D7159EDFE2A8DCA7EB4A5B
2,803,965 UART: [art] SIG.R = EE117DBA1E34287FA69B12848EA760877DA4F47B2314E8A6639CE76264A903620618006014BEB198A0E0ED02AF70ACBD
2,810,708 UART: [art] SIG.S = AA665F968AE705355B41FF9F6B996C12739508B890807DE260E3E507486F0BBFD99ABF9B6F27397A799A3BC51176A7D6
2,835,081 UART: mbox::rt_entry...
2,835,453 UART: ____ _ _ _ ____ _____
2,836,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,037 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,341 UART: |_|
2,839,653 UART:
2,946,114 UART: [rt] Runtime listening for mailbox commands...
2,947,048 >>> mbox cmd response data (0 bytes)
2,947,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,787 >>> mbox cmd response: success
5,722,978 UART:
5,722,994 UART: Running Caliptra FMC ...
5,723,402 UART:
5,723,456 UART: [state] CFI Enabled
5,812,853 UART: [art] Extend RT PCRs Done
5,813,281 UART: [art] Lock RT PCRs Done
5,814,532 UART: [art] Populate DV Done
5,822,749 UART: [fht] FMC Alias Private Key: 7
5,823,841 UART: [art] Derive CDI
5,824,121 UART: [art] Store in in slot 0x4
5,910,084 UART: [art] Derive Key Pair
5,910,444 UART: [art] Store priv key in slot 0x5
5,923,526 UART: [art] Derive Key Pair - Done
5,938,136 UART: [art] Signing Cert with AUTHO
5,938,616 UART: RITY.KEYID = 7
5,953,778 UART: [art] Erasing AUTHORITY.KEYID = 7
5,954,543 UART: [art] PUB.X = A3E8D0C1D46D7AD745C50DFA8CC94DAE5390631420A59B526AF816E5D8B5B38D427C5FDFA3A38B292E2CBEB7C6C189B9
5,961,330 UART: [art] PUB.Y = 8C8C47F2FA8755F19748A1CA3DC25D4878E881CEFF36A16FAC647BF2C8C552633722AC9D68EBBFA09319E04FB7FE3433
5,968,294 UART: [art] SIG.R = 74DFDB2CBB1E2925520CCD68168E87545D15EF32E495AED14788282A9480270FF42780117A44BFF97D429A2D1E5208C2
5,975,055 UART: [art] SIG.S = EFE24FA91E5C1BEF72734B663B0CB42A30AD265F22A0D3C0F26DD9A856D5D9DA6649B19B893BAE559AA6317EF2EDB8A6
5,998,673 UART: Caliptra RT
5,998,926 UART: [state] CFI Enabled
6,283,204 UART: [rt] RT failed reset flow
6,283,635 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,768 UART: [kat] SHA2-256
881,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,814 UART: [kat] ++
885,966 UART: [kat] sha1
890,074 UART: [kat] SHA2-256
892,012 UART: [kat] SHA2-384
894,687 UART: [kat] SHA2-512-ACC
896,588 UART: [kat] ECC-384
902,221 UART: [kat] HMAC-384Kdf
906,855 UART: [kat] LMS
1,475,051 UART: [kat] --
1,476,110 UART: [cold-reset] ++
1,476,574 UART: [fht] Storing FHT @ 0x50003400
1,479,213 UART: [idev] ++
1,479,381 UART: [idev] CDI.KEYID = 6
1,479,741 UART: [idev] SUBJECT.KEYID = 7
1,480,165 UART: [idev] UDS.KEYID = 0
1,480,510 ready_for_fw is high
1,480,510 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,367 UART: [idev] Erasing UDS.KEYID = 0
1,505,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,743 UART: [idev] --
1,514,860 UART: [ldev] ++
1,515,028 UART: [ldev] CDI.KEYID = 6
1,515,391 UART: [ldev] SUBJECT.KEYID = 5
1,515,817 UART: [ldev] AUTHORITY.KEYID = 7
1,516,280 UART: [ldev] FE.KEYID = 1
1,521,538 UART: [ldev] Erasing FE.KEYID = 1
1,547,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,405 UART: [ldev] --
1,586,876 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 78704 bytes
2,477,672 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,988 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,873 >>> mbox cmd response: success
2,616,873 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,618,057 UART: [afmc] ++
2,618,225 UART: [afmc] CDI.KEYID = 6
2,618,587 UART: [afmc] SUBJECT.KEYID = 7
2,619,012 UART: [afmc] AUTHORITY.KEYID = 5
2,654,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,178 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,868 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,719 UART: [afmc] --
2,697,805 UART: [cold-reset] --
2,698,727 UART: [state] Locking Datavault
2,700,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,770 UART: [state] Locking ICCM
2,701,362 UART: [exit] Launching FMC @ 0x40000130
2,706,691 UART:
2,706,707 UART: Running Caliptra FMC ...
2,707,115 UART:
2,707,258 UART: [state] CFI Enabled
2,717,895 UART: [fht] FMC Alias Private Key: 7
2,825,306 UART: [art] Extend RT PCRs Done
2,825,734 UART: [art] Lock RT PCRs Done
2,827,186 UART: [art] Populate DV Done
2,835,577 UART: [fht] FMC Alias Private Key: 7
2,836,729 UART: [art] Derive CDI
2,837,009 UART: [art] Store in in slot 0x4
2,922,880 UART: [art] Derive Key Pair
2,923,240 UART: [art] Store priv key in slot 0x5
2,935,928 UART: [art] Derive Key Pair - Done
2,950,815 UART: [art] Signing Cert with AUTHO
2,951,295 UART: RITY.KEYID = 7
2,966,455 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,220 UART: [art] PUB.X = EBBDA367CEF9D5743B24DFC29D63D01F61C43E4F98CD0E1DDCBEA53A3BBB99F11AF70442B6D27F1352ACAF9A210F8A39
2,974,009 UART: [art] PUB.Y = 27D89ADF592C23090688C21CE89E3390092D22BCBA364EA9219305102CE55EF4711A0B949D37F7C825A90DACD2AAE79A
2,980,947 UART: [art] SIG.R = 1AF9F5B9796C01121C1909C7958CE578BA95BECC4DD18FDFCADDAA4BD1779A353021E3D377E0D51FEB6353689BE08B4D
2,987,729 UART: [art] SIG.S = 73360B79D6B3FDDE40ABE181B2DDC16FDDB318E32668042DE4B1DF07359BDC2686BCBFDD645D7461F156324D0A3946F0
3,011,174 UART: mbox::rt_entry...
3,011,546 UART: ____ _ _ _ ____ _____
3,012,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,434 UART: |_|
3,015,746 UART:
3,123,549 UART: [rt] Runtime listening for mailbox commands...
3,124,483 >>> mbox cmd response data (0 bytes)
3,124,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,124,598 UART:
3,124,614 UART: Running Caliptra ROM ...
3,125,022 UART:
3,125,163 UART: [state] CFI Enabled
3,127,849 UART: [state] LifecycleState = Unprovisioned
3,128,504 UART: [state] DebugLocked = No
3,129,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,705 UART: [kat] SHA2-256
3,924,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,751 UART: [kat] ++
3,928,903 UART: [kat] sha1
3,933,203 UART: [kat] SHA2-256
3,935,141 UART: [kat] SHA2-384
3,937,752 UART: [kat] SHA2-512-ACC
3,939,652 UART: [kat] ECC-384
3,945,221 UART: [kat] HMAC-384Kdf
3,949,711 UART: [kat] LMS
4,517,907 UART: [kat] --
4,518,752 UART: [update-reset] ++
5,855,125 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,856,279 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,006,329 >>> mbox cmd response: success
6,006,582 UART: [update-reset] Copying MAN_2 To MAN_1
6,014,596 UART: [update-reset Success] --
6,015,409 UART: [state] Locking Datavault
6,016,169 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,773 UART: [state] Locking ICCM
6,017,373 UART: [exit] Launching FMC @ 0x40000130
6,022,702 UART:
6,022,718 UART: Running Caliptra FMC ...
6,023,126 UART:
6,023,269 UART: [state] CFI Enabled
6,112,572 UART: [art] Extend RT PCRs Done
6,113,000 UART: [art] Lock RT PCRs Done
6,114,125 UART: [art] Populate DV Done
6,122,190 UART: [fht] FMC Alias Private Key: 7
6,123,154 UART: [art] Derive CDI
6,123,434 UART: [art] Store in in slot 0x4
6,208,781 UART: [art] Derive Key Pair
6,209,141 UART: [art] Store priv key in slot 0x5
6,222,535 UART: [art] Derive Key Pair - Done
6,236,821 UART: [art] Signing Cert with AUTHO
6,237,301 UART: RITY.KEYID = 7
6,252,613 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,378 UART: [art] PUB.X = 2E4FFC8417CA70D2B4F8B81893A8AA65A42F8AD035CB78B878531E100956B2A30007F5BB0F189486B89FF0EC091880AB
6,260,120 UART: [art] PUB.Y = CDAF696FFF6CA2480248BBA774EAC87A937B8860D8D12E9B56F98024467B74AE86DC627DE8DECA7E09EBEFC7D37209AE
6,267,083 UART: [art] SIG.R = 3563C4770EF38C2A7B0248CD77ABBBBAD5FFC32586D2B70592F350206A53223FB3D569519364D2278F04B1E0F9E38800
6,273,819 UART: [art] SIG.S = 5DFE9B53AF8817F38243D032F78D7FDB9D0D088EC1CB0ABEF9C6BDC8B70920B373C2D9F36D86B3996FACAED9615F4F3F
6,297,554 UART: Caliptra RT
6,297,899 UART: [state] CFI Enabled
6,577,866 UART: [rt] RT failed reset flow
6,578,297 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 ready_for_fw is high
1,362,960 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,919 >>> mbox cmd response: success
2,466,919 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,528,639 UART:
2,528,655 UART: Running Caliptra FMC ...
2,529,063 UART:
2,529,206 UART: [state] CFI Enabled
2,540,259 UART: [fht] FMC Alias Private Key: 7
2,648,060 UART: [art] Extend RT PCRs Done
2,648,488 UART: [art] Lock RT PCRs Done
2,649,644 UART: [art] Populate DV Done
2,657,771 UART: [fht] FMC Alias Private Key: 7
2,658,769 UART: [art] Derive CDI
2,659,049 UART: [art] Store in in slot 0x4
2,744,728 UART: [art] Derive Key Pair
2,745,088 UART: [art] Store priv key in slot 0x5
2,758,316 UART: [art] Derive Key Pair - Done
2,773,236 UART: [art] Signing Cert with AUTHO
2,773,716 UART: RITY.KEYID = 7
2,788,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,711 UART: [art] PUB.X = ACFDA6B968D353B5A1089AD57E6CC829C306766F44C30449F7BC5B6152B5CC11022A06B0C2B750532D061803048CA778
2,796,457 UART: [art] PUB.Y = FC356465777A662B40D506DB273AA3E6EF671C0AB72CBF34702DED7DBF0FA399F7A38D00DDE73BD5F6735D284B2395EA
2,803,392 UART: [art] SIG.R = E64C8D53B07B1DBD91865E09549EB0695DF32C3B95DFDF7B9A14A4CD41FBD9F353544B727063CA14D019D610FE21FF8B
2,810,173 UART: [art] SIG.S = 8B4018A5AD59CFCDB355F13F065179F0C0D02F0A6055854A4F0DC9A733AB81C2CBA53D964C625463A490B8B830AD6C59
2,833,419 UART: mbox::rt_entry...
2,833,791 UART: ____ _ _ _ ____ _____
2,834,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,143 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,679 UART: |_|
2,837,991 UART:
2,944,248 UART: [rt] Runtime listening for mailbox commands...
2,945,182 >>> mbox cmd response data (0 bytes)
2,945,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,604 >>> mbox cmd response: success
5,720,977 UART:
5,720,993 UART: Running Caliptra FMC ...
5,721,401 UART:
5,721,544 UART: [state] CFI Enabled
5,810,701 UART: [art] Extend RT PCRs Done
5,811,129 UART: [art] Lock RT PCRs Done
5,812,438 UART: [art] Populate DV Done
5,820,745 UART: [fht] FMC Alias Private Key: 7
5,821,709 UART: [art] Derive CDI
5,821,989 UART: [art] Store in in slot 0x4
5,907,380 UART: [art] Derive Key Pair
5,907,740 UART: [art] Store priv key in slot 0x5
5,921,038 UART: [art] Derive Key Pair - Done
5,935,576 UART: [art] Signing Cert with AUTHO
5,936,056 UART: RITY.KEYID = 7
5,951,414 UART: [art] Erasing AUTHORITY.KEYID = 7
5,952,179 UART: [art] PUB.X = 34B514BF38B5534D35D52D56B5EF777FC55334E9B83F996118BD95F93E8068D85998FB69D3B9EF89EAED4009B1FC2DFE
5,958,956 UART: [art] PUB.Y = 41FCD8086FD43A796BA9B3A5B22B8617BB7615186A89EB9826EED87068C6ED926D76BC30BE8F7E8DFD9F589CDFBF516E
5,965,921 UART: [art] SIG.R = 78EFBE35D33C443679AFEF9DAC5ECB19558E32CE45CC9A83EB6DBB457299C3549056846E423479C2B634F018D8E8075D
5,972,696 UART: [art] SIG.S = 41605CCD6D79C811AC32696978E9A7C2E3160893EA6A7A30B887048796476A23DBFF018C406691474E1FB8F3DAB3F94B
5,996,436 UART: Caliptra RT
5,996,781 UART: [state] CFI Enabled
6,274,494 UART: [rt] RT failed reset flow
6,274,925 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
917,926 UART: [kat] HMAC-384Kdf
922,480 UART: [kat] LMS
1,170,808 UART: [kat] --
1,171,823 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,174,984 UART: [idev] ++
1,175,152 UART: [idev] CDI.KEYID = 6
1,175,512 UART: [idev] SUBJECT.KEYID = 7
1,175,936 UART: [idev] UDS.KEYID = 0
1,176,281 ready_for_fw is high
1,176,281 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,422 UART: [idev] Erasing UDS.KEYID = 0
1,201,561 UART: [idev] Sha1 KeyId Algorithm
1,210,011 UART: [idev] --
1,210,959 UART: [ldev] ++
1,211,127 UART: [ldev] CDI.KEYID = 6
1,211,490 UART: [ldev] SUBJECT.KEYID = 5
1,211,916 UART: [ldev] AUTHORITY.KEYID = 7
1,212,379 UART: [ldev] FE.KEYID = 1
1,217,515 UART: [ldev] Erasing FE.KEYID = 1
1,243,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,573 UART: [ldev] --
1,282,966 UART: [fwproc] Wait for Commands...
1,283,644 UART: [fwproc] Recv command 0x46574c44
1,284,372 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,106 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,579 >>> mbox cmd response: success
2,313,579 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,775 UART: [afmc] ++
2,314,943 UART: [afmc] CDI.KEYID = 6
2,315,305 UART: [afmc] SUBJECT.KEYID = 7
2,315,730 UART: [afmc] AUTHORITY.KEYID = 5
2,350,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,604 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,442 UART: [afmc] --
2,394,396 UART: [cold-reset] --
2,395,238 UART: [state] Locking Datavault
2,396,199 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,803 UART: [state] Locking ICCM
2,397,331 UART: [exit] Launching FMC @ 0x40000130
2,402,660 UART:
2,402,676 UART: Running Caliptra FMC ...
2,403,084 UART:
2,403,138 UART: [state] CFI Enabled
2,413,531 UART: [fht] FMC Alias Private Key: 7
2,522,126 UART: [art] Extend RT PCRs Done
2,522,554 UART: [art] Lock RT PCRs Done
2,524,328 UART: [art] Populate DV Done
2,532,713 UART: [fht] FMC Alias Private Key: 7
2,533,841 UART: [art] Derive CDI
2,534,121 UART: [art] Store in in slot 0x4
2,619,686 UART: [art] Derive Key Pair
2,620,046 UART: [art] Store priv key in slot 0x5
2,633,408 UART: [art] Derive Key Pair - Done
2,648,062 UART: [art] Signing Cert with AUTHO
2,648,542 UART: RITY.KEYID = 7
2,663,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,245 UART: [art] PUB.X = F18533CD9B8BD840647D2B4F62B0FC9FE67DCEFD95DB0206EC7CADAFDB9EEB71275EFB79678D6307F81FC8DC3F1D9A90
2,671,034 UART: [art] PUB.Y = CC965B013B43F91DD429CBCFFDCF21F8820D67F5DF1AB0B97132B418DAA6D784A149343F591D3AE5687EC13040D0DF70
2,677,992 UART: [art] SIG.R = E4D29FDE8F18028B98B293FAA88125280013EDF1933E0884C9BC0BD3F5231B70EA72DF69EE92DC8983AEB539449AAA0A
2,684,740 UART: [art] SIG.S = 89C232396DCAB18A0C139C9A3A61757F51D2DCD668B379A28F70EB8F027E0A2580D96F496CE92BFFD8D1593C2A6DF7F8
2,708,338 UART: mbox::rt_entry...
2,708,710 UART: ____ _ _ _ ____ _____
2,709,494 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,294 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,062 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,830 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,598 UART: |_|
2,712,910 UART:
2,819,469 UART: [rt] Runtime listening for mailbox commands...
2,820,403 >>> mbox cmd response data (0 bytes)
2,820,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,515 UART:
2,820,531 UART: Running Caliptra ROM ...
2,820,939 UART:
2,820,994 UART: [state] CFI Enabled
2,824,134 UART: [state] LifecycleState = Unprovisioned
2,824,789 UART: [state] DebugLocked = No
2,825,329 UART: [state] WD Timer not started. Device not locked for debugging
2,826,591 UART: [kat] SHA2-256
3,632,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,366 UART: [kat] ++
3,636,518 UART: [kat] sha1
3,640,708 UART: [kat] SHA2-256
3,642,648 UART: [kat] SHA2-384
3,645,447 UART: [kat] SHA2-512-ACC
3,647,347 UART: [kat] ECC-384
3,656,874 UART: [kat] HMAC-384Kdf
3,661,564 UART: [kat] LMS
3,909,892 UART: [kat] --
3,910,746 UART: [update-reset] ++
5,225,325 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,226,462 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,460 >>> mbox cmd response: success
5,376,813 UART: [update-reset] Copying MAN_2 To MAN_1
5,384,827 UART: [update-reset Success] --
5,385,524 UART: [state] Locking Datavault
5,386,276 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,880 UART: [state] Locking ICCM
5,387,500 UART: [exit] Launching FMC @ 0x40000130
5,392,829 UART:
5,392,845 UART: Running Caliptra FMC ...
5,393,253 UART:
5,393,307 UART: [state] CFI Enabled
5,482,210 UART: [art] Extend RT PCRs Done
5,482,638 UART: [art] Lock RT PCRs Done
5,484,117 UART: [art] Populate DV Done
5,492,374 UART: [fht] FMC Alias Private Key: 7
5,493,518 UART: [art] Derive CDI
5,493,798 UART: [art] Store in in slot 0x4
5,579,177 UART: [art] Derive Key Pair
5,579,537 UART: [art] Store priv key in slot 0x5
5,592,371 UART: [art] Derive Key Pair - Done
5,606,962 UART: [art] Signing Cert with AUTHO
5,607,442 UART: RITY.KEYID = 7
5,622,886 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,651 UART: [art] PUB.X = BD6A4DABC53058BB859C1D7D05A8B9D2E924CA58F18E80EA0529A5AE59F27EE75408EBD7270FE3A8DB09D28AC50E1CEF
5,630,427 UART: [art] PUB.Y = A3ADB21CCD1C4DB01FDFE8E4379350CF99EE11E0E5223DC20DD00BDFE36317FF2B9E4DA8B08D8944AB7A7EB580804BED
5,637,399 UART: [art] SIG.R = 6E2DEFED005A7793682D81FE371F690EB5F6A386A2646F778D9F632A2487183FCABB7AA8A38B9648FF2754375E86CCA7
5,644,152 UART: [art] SIG.S = 9D9372D39787A97489F2D26C6F4589529B2F1839AD243F3DA231265C8CF90690FA07FB66D52DCF3444C6D91B5E45E430
5,667,389 UART: Caliptra RT
5,667,642 UART: [state] CFI Enabled
5,945,684 UART: [rt] RT failed reset flow
5,946,115 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 ready_for_fw is high
1,060,401 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,296 >>> mbox cmd response: success
2,165,296 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,227,246 UART:
2,227,262 UART: Running Caliptra FMC ...
2,227,670 UART:
2,227,724 UART: [state] CFI Enabled
2,238,173 UART: [fht] FMC Alias Private Key: 7
2,346,472 UART: [art] Extend RT PCRs Done
2,346,900 UART: [art] Lock RT PCRs Done
2,348,226 UART: [art] Populate DV Done
2,356,437 UART: [fht] FMC Alias Private Key: 7
2,357,607 UART: [art] Derive CDI
2,357,887 UART: [art] Store in in slot 0x4
2,443,604 UART: [art] Derive Key Pair
2,443,964 UART: [art] Store priv key in slot 0x5
2,456,852 UART: [art] Derive Key Pair - Done
2,471,718 UART: [art] Signing Cert with AUTHO
2,472,198 UART: RITY.KEYID = 7
2,487,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,435 UART: [art] PUB.X = D8FBE2D2DF9DE8C940BBC7C434CCEF80022587E5069D28CA447A6C25B0D1E78EC4C477C2CE876011F6CF25A5A0C59945
2,495,215 UART: [art] PUB.Y = 81D98951B3CDEE57855A6F06AE857A524CEBC68D3537B18331A0664BA75B1E3E147F0D457E76FC85D9421494FA991857
2,502,159 UART: [art] SIG.R = 5C1229399FF946E3F182C041354F44EFDB33C46E7D05411DC36306C3EFBFFA639A6372D073588340429CE5C373E24BB3
2,508,923 UART: [art] SIG.S = 5C4220B011AECCB0AA094BB192A70CE50731CFEF1C9F2AC9872C361C8F76B25F5DE13B3CD7DB685F457E704E8F5F87DF
2,532,319 UART: mbox::rt_entry...
2,532,691 UART: ____ _ _ _ ____ _____
2,533,475 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,275 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,043 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,811 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,579 UART: |_|
2,536,891 UART:
2,642,847 UART: [rt] Runtime listening for mailbox commands...
2,643,781 >>> mbox cmd response data (0 bytes)
2,643,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,081,239 >>> mbox cmd response: success
5,094,599 UART:
5,094,615 UART: Running Caliptra FMC ...
5,095,023 UART:
5,095,077 UART: [state] CFI Enabled
5,183,630 UART: [art] Extend RT PCRs Done
5,184,058 UART: [art] Lock RT PCRs Done
5,185,431 UART: [art] Populate DV Done
5,193,976 UART: [fht] FMC Alias Private Key: 7
5,195,010 UART: [art] Derive CDI
5,195,290 UART: [art] Store in in slot 0x4
5,280,909 UART: [art] Derive Key Pair
5,281,269 UART: [art] Store priv key in slot 0x5
5,294,243 UART: [art] Derive Key Pair - Done
5,309,380 UART: [art] Signing Cert with AUTHO
5,309,860 UART: RITY.KEYID = 7
5,325,350 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,115 UART: [art] PUB.X = D390192081E13D2C83C717CFA117C5DDAF234E5ADD6437538B784C4E38A1F9DD03E62B414EACAF8005FEB7E0606D5726
5,332,889 UART: [art] PUB.Y = 7A2C52BAA7F18845380030A32D73A12C34A3DF3525D382BB2D79B0F3BB7278E11BBF2052711DFB09BA32BCD14DFF6283
5,339,824 UART: [art] SIG.R = 16400D77005584B25F80AAAB79FA6465C73057940D6442B2AAB844BA0D6B9D984FF7F1759CEEDD48785BAB724DE9961F
5,346,569 UART: [art] SIG.S = FCF6F56B5ADBC2318A6F114F7C3B02DB51381A731ECBC610C65952D5789685F5F9A69F9B309EAE682B2690276E8A8711
5,369,893 UART: Caliptra RT
5,370,146 UART: [state] CFI Enabled
5,650,706 UART: [rt] RT failed reset flow
5,651,137 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
894,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,164 UART: [kat] ++
898,316 UART: [kat] sha1
902,416 UART: [kat] SHA2-256
904,356 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
922,843 UART: [kat] LMS
1,171,171 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,378 UART: [fht] FHT @ 0x50003400
1,174,835 UART: [idev] ++
1,175,003 UART: [idev] CDI.KEYID = 6
1,175,363 UART: [idev] SUBJECT.KEYID = 7
1,175,787 UART: [idev] UDS.KEYID = 0
1,176,132 ready_for_fw is high
1,176,132 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,200,526 UART: [idev] Sha1 KeyId Algorithm
1,208,980 UART: [idev] --
1,209,980 UART: [ldev] ++
1,210,148 UART: [ldev] CDI.KEYID = 6
1,210,511 UART: [ldev] SUBJECT.KEYID = 5
1,210,937 UART: [ldev] AUTHORITY.KEYID = 7
1,211,400 UART: [ldev] FE.KEYID = 1
1,216,532 UART: [ldev] Erasing FE.KEYID = 1
1,243,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,442 UART: [ldev] --
1,282,831 UART: [fwproc] Wait for Commands...
1,283,445 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,039 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,376 >>> mbox cmd response: success
2,313,376 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,412 UART: [afmc] ++
2,314,580 UART: [afmc] CDI.KEYID = 6
2,314,942 UART: [afmc] SUBJECT.KEYID = 7
2,315,367 UART: [afmc] AUTHORITY.KEYID = 5
2,350,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,465 UART: [afmc] --
2,393,387 UART: [cold-reset] --
2,394,273 UART: [state] Locking Datavault
2,395,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,024 UART: [state] Locking ICCM
2,396,492 UART: [exit] Launching FMC @ 0x40000130
2,401,821 UART:
2,401,837 UART: Running Caliptra FMC ...
2,402,245 UART:
2,402,388 UART: [state] CFI Enabled
2,413,227 UART: [fht] FMC Alias Private Key: 7
2,521,688 UART: [art] Extend RT PCRs Done
2,522,116 UART: [art] Lock RT PCRs Done
2,523,776 UART: [art] Populate DV Done
2,531,879 UART: [fht] FMC Alias Private Key: 7
2,532,921 UART: [art] Derive CDI
2,533,201 UART: [art] Store in in slot 0x4
2,619,186 UART: [art] Derive Key Pair
2,619,546 UART: [art] Store priv key in slot 0x5
2,632,814 UART: [art] Derive Key Pair - Done
2,647,529 UART: [art] Signing Cert with AUTHO
2,648,009 UART: RITY.KEYID = 7
2,663,197 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,962 UART: [art] PUB.X = E2E6483B782C5F61F07D75440383D0000E9F19972231D758B914587C27C5C70A49B42CC958C0F7E708AC011BEC076DC1
2,670,688 UART: [art] PUB.Y = 2A27B3AA530C1F82779D2FEB4F6C95C29F32A5D74AE52D92101F172FDDCA93E61D9FAAB667B17C01AE7FECFA1D968094
2,677,652 UART: [art] SIG.R = 72AAEC5D203D91C47930F2EE13FBA2582D2409D4B6187CFFE1A7AD13956F627F62EC941E8092CE578C82CC85769B80D6
2,684,427 UART: [art] SIG.S = CBF56BB8EB206621F3940D1D8C3588BE04CD8DA321EB81B492EF863AF73FB8F16116D1F57EBE122E91DB7422F9058807
2,708,426 UART: mbox::rt_entry...
2,708,798 UART: ____ _ _ _ ____ _____
2,709,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,150 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,686 UART: |_|
2,712,998 UART:
2,819,520 UART: [rt] Runtime listening for mailbox commands...
2,820,454 >>> mbox cmd response data (0 bytes)
2,820,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,566 UART:
2,820,582 UART: Running Caliptra ROM ...
2,820,990 UART:
2,821,132 UART: [state] CFI Enabled
2,823,710 UART: [state] LifecycleState = Unprovisioned
2,824,365 UART: [state] DebugLocked = No
2,825,085 UART: [state] WD Timer not started. Device not locked for debugging
2,826,225 UART: [kat] SHA2-256
3,631,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,000 UART: [kat] ++
3,636,152 UART: [kat] sha1
3,640,294 UART: [kat] SHA2-256
3,642,234 UART: [kat] SHA2-384
3,645,105 UART: [kat] SHA2-512-ACC
3,647,005 UART: [kat] ECC-384
3,656,690 UART: [kat] HMAC-384Kdf
3,661,096 UART: [kat] LMS
3,909,424 UART: [kat] --
3,910,466 UART: [update-reset] ++
5,225,433 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,226,608 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,606 >>> mbox cmd response: success
5,376,879 UART: [update-reset] Copying MAN_2 To MAN_1
5,384,893 UART: [update-reset Success] --
5,386,124 UART: [state] Locking Datavault
5,386,898 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,502 UART: [state] Locking ICCM
5,388,118 UART: [exit] Launching FMC @ 0x40000130
5,393,447 UART:
5,393,463 UART: Running Caliptra FMC ...
5,393,871 UART:
5,394,014 UART: [state] CFI Enabled
5,483,057 UART: [art] Extend RT PCRs Done
5,483,485 UART: [art] Lock RT PCRs Done
5,484,810 UART: [art] Populate DV Done
5,493,107 UART: [fht] FMC Alias Private Key: 7
5,494,253 UART: [art] Derive CDI
5,494,533 UART: [art] Store in in slot 0x4
5,580,428 UART: [art] Derive Key Pair
5,580,788 UART: [art] Store priv key in slot 0x5
5,594,618 UART: [art] Derive Key Pair - Done
5,609,448 UART: [art] Signing Cert with AUTHO
5,609,928 UART: RITY.KEYID = 7
5,625,282 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,047 UART: [art] PUB.X = 64E542A924EE26D75A0C92425E4335049F87DAB90C3D1CF2ABE1BBE6BF78ED266BFCDA5FEE27A841CD5DDB21E52B1D5C
5,632,834 UART: [art] PUB.Y = 13CB5A212C7EFAC701D811E67180BD607C9F16F5BDE0E3711EFB8D560829F31BD9B21CDD8A46D2AFDBE29E75580911F4
5,639,791 UART: [art] SIG.R = C47DF71912DAAC374A42B4C1CCCC68F0E6ABA344378C4435851FD6EC45A8AF68FB3222961630D411999CED08FE88364F
5,646,568 UART: [art] SIG.S = B4F6EE8ED71A81D6E2C2668EC1817D7FA7379D06B71C9730AEBF5C564ABCBD385B8540ED3A40BE37AD72A7C52EE60FA7
5,669,815 UART: Caliptra RT
5,670,160 UART: [state] CFI Enabled
5,951,257 UART: [rt] RT failed reset flow
5,951,688 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 ready_for_fw is high
1,060,758 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,889 >>> mbox cmd response: success
2,164,889 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,226,365 UART:
2,226,381 UART: Running Caliptra FMC ...
2,226,789 UART:
2,226,932 UART: [state] CFI Enabled
2,237,845 UART: [fht] FMC Alias Private Key: 7
2,345,180 UART: [art] Extend RT PCRs Done
2,345,608 UART: [art] Lock RT PCRs Done
2,347,120 UART: [art] Populate DV Done
2,355,221 UART: [fht] FMC Alias Private Key: 7
2,356,325 UART: [art] Derive CDI
2,356,605 UART: [art] Store in in slot 0x4
2,442,404 UART: [art] Derive Key Pair
2,442,764 UART: [art] Store priv key in slot 0x5
2,456,414 UART: [art] Derive Key Pair - Done
2,471,201 UART: [art] Signing Cert with AUTHO
2,471,681 UART: RITY.KEYID = 7
2,486,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,740 UART: [art] PUB.X = 8059D7B08DA22D2FE8EDF1012272CF0A9E58A5E4BCC6E31A1E661C71E391C311756A526CEBF88F91BAF049EE7B550FC1
2,494,517 UART: [art] PUB.Y = 3E88FA471327772A60C7F03C7B530CB3CE43B754F012770AC5F9366F38FD5A6D42D5D6ACD43D154E9553BE300D4C5629
2,501,462 UART: [art] SIG.R = CE0436D381288938B7575A9808B027F628852504702AA1DC359907CE4ABD904F078C505884016B5BBE0BF527DD35C847
2,508,203 UART: [art] SIG.S = B57ECE89517DA2DD7A52B33776983825B6E7AF63C8941C3788D388EBFCB769FA15262953DF489F4D36536B8B1D6A58E1
2,531,754 UART: mbox::rt_entry...
2,532,126 UART: ____ _ _ _ ____ _____
2,532,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,014 UART: |_|
2,536,326 UART:
2,643,709 UART: [rt] Runtime listening for mailbox commands...
2,644,643 >>> mbox cmd response data (0 bytes)
2,644,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,082,900 >>> mbox cmd response: success
5,096,170 UART:
5,096,186 UART: Running Caliptra FMC ...
5,096,594 UART:
5,096,737 UART: [state] CFI Enabled
5,185,890 UART: [art] Extend RT PCRs Done
5,186,318 UART: [art] Lock RT PCRs Done
5,187,663 UART: [art] Populate DV Done
5,195,992 UART: [fht] FMC Alias Private Key: 7
5,197,136 UART: [art] Derive CDI
5,197,416 UART: [art] Store in in slot 0x4
5,283,385 UART: [art] Derive Key Pair
5,283,745 UART: [art] Store priv key in slot 0x5
5,296,981 UART: [art] Derive Key Pair - Done
5,311,789 UART: [art] Signing Cert with AUTHO
5,312,269 UART: RITY.KEYID = 7
5,327,463 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,228 UART: [art] PUB.X = 4C29E3CCFDB3C32EB040FA53CA56C586A107BC31A033471C7EE9AE870946A58D204D2982D37CC9520CC9118D278DF56C
5,334,999 UART: [art] PUB.Y = 04F494E4DF02BC6443973BEF022AE19852B3A7428CF3EB3D497468A8ACF090D3DA559F6B215FABF05E56A492382B7975
5,341,946 UART: [art] SIG.R = DE1581B4B0538A733F766E8B48490E1451B27B67616E9369219F9F7155EE2668CC70836F2FACCCE2BC2C257A9DD16191
5,348,713 UART: [art] SIG.S = A1C25B3276F5F45AF735FC0042A0DB36F2D3F3C82714EB71D7908A6C57F8F325288C81F4830B49CA53E22BF37BFD96BE
5,372,349 UART: Caliptra RT
5,372,694 UART: [state] CFI Enabled
5,653,661 UART: [rt] RT failed reset flow
5,654,092 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,786 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,173,735 ready_for_fw is high
1,173,735 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,197,931 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,922 UART: [ldev] ++
1,208,090 UART: [ldev] CDI.KEYID = 6
1,208,454 UART: [ldev] SUBJECT.KEYID = 5
1,208,881 UART: [ldev] AUTHORITY.KEYID = 7
1,209,344 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,032 UART: [ldev] --
1,280,440 UART: [fwproc] Wait for Commands...
1,281,111 UART: [fwproc] Recv command 0x46574c44
1,281,844 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,939 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,443 >>> mbox cmd response: success
2,311,443 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,312,712 UART: [afmc] ++
2,312,880 UART: [afmc] CDI.KEYID = 6
2,313,243 UART: [afmc] SUBJECT.KEYID = 7
2,313,669 UART: [afmc] AUTHORITY.KEYID = 5
2,349,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,217 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,805 UART: [afmc] --
2,392,687 UART: [cold-reset] --
2,393,425 UART: [state] Locking Datavault
2,394,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,160 UART: [state] Locking ICCM
2,395,644 UART: [exit] Launching FMC @ 0x40000130
2,400,973 UART:
2,400,989 UART: Running Caliptra FMC ...
2,401,397 UART:
2,401,451 UART: [state] CFI Enabled
2,411,526 UART: [fht] FMC Alias Private Key: 7
2,519,361 UART: [art] Extend RT PCRs Done
2,519,789 UART: [art] Lock RT PCRs Done
2,521,509 UART: [art] Populate DV Done
2,529,618 UART: [fht] FMC Alias Private Key: 7
2,530,766 UART: [art] Derive CDI
2,531,046 UART: [art] Store in in slot 0x4
2,616,731 UART: [art] Derive Key Pair
2,617,091 UART: [art] Store priv key in slot 0x5
2,630,611 UART: [art] Derive Key Pair - Done
2,645,244 UART: [art] Signing Cert with AUTHO
2,645,724 UART: RITY.KEYID = 7
2,660,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,591 UART: [art] PUB.X = 41B97EDEA39C5CC8A900BF0B3E6A5F3C48B34B802019671A46F04F7BC40B50BA401CB1DEE983AE56AB66C7762125A3A5
2,668,347 UART: [art] PUB.Y = AAEE2BDAE9B2C4B48C1CBF76593BF22D29599F623D79ED1735EC98D0DEC3C0A227D298910DCFD8EFFBD18CA2AD0B3956
2,675,319 UART: [art] SIG.R = 4B0EB2824E6B2E35C4746167286B6B48CBFB5DBDE09F5794D64BA194B65DE29DB75A6C44AA36F53ABEF742DFB28F0E5F
2,682,103 UART: [art] SIG.S = 48255049E1DD4824B2869111FA0D35B92D11E52DE95B7E69E7A2C593588605E18760004F153A95D7CA501431BDABF6B7
2,705,940 UART: mbox::rt_entry...
2,706,312 UART: ____ _ _ _ ____ _____
2,707,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,664 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,200 UART: |_|
2,710,512 UART:
2,817,896 UART: [rt] Runtime listening for mailbox commands...
2,818,830 >>> mbox cmd response data (0 bytes)
2,818,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,942 UART:
2,818,958 UART: Running Caliptra ROM ...
2,819,366 UART:
2,819,421 UART: [state] CFI Enabled
2,822,213 UART: [state] LifecycleState = Unprovisioned
2,822,868 UART: [state] DebugLocked = No
2,823,604 UART: [state] WD Timer not started. Device not locked for debugging
2,824,838 UART: [kat] SHA2-256
3,628,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,632,517 UART: [kat] ++
3,632,669 UART: [kat] sha1
3,636,853 UART: [kat] SHA2-256
3,638,793 UART: [kat] SHA2-384
3,641,582 UART: [kat] SHA2-512-ACC
3,643,482 UART: [kat] ECC-384
3,652,733 UART: [kat] HMAC-384Kdf
3,657,261 UART: [kat] LMS
3,905,573 UART: [kat] --
3,906,329 UART: [update-reset] ++
5,221,585 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,760 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,372,758 >>> mbox cmd response: success
5,373,057 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,071 UART: [update-reset Success] --
5,382,140 UART: [state] Locking Datavault
5,382,992 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,596 UART: [state] Locking ICCM
5,384,262 UART: [exit] Launching FMC @ 0x40000130
5,389,591 UART:
5,389,607 UART: Running Caliptra FMC ...
5,390,015 UART:
5,390,069 UART: [state] CFI Enabled
5,479,140 UART: [art] Extend RT PCRs Done
5,479,568 UART: [art] Lock RT PCRs Done
5,481,077 UART: [art] Populate DV Done
5,489,130 UART: [fht] FMC Alias Private Key: 7
5,490,210 UART: [art] Derive CDI
5,490,490 UART: [art] Store in in slot 0x4
5,575,747 UART: [art] Derive Key Pair
5,576,107 UART: [art] Store priv key in slot 0x5
5,588,985 UART: [art] Derive Key Pair - Done
5,603,657 UART: [art] Signing Cert with AUTHO
5,604,137 UART: RITY.KEYID = 7
5,619,247 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,012 UART: [art] PUB.X = A76484BD985437B7EB072D4BD7635065401176F2BEA34A9C29F5CAE83FBB3155DE409E461DFF2A2AA6CAA246FE412D85
5,626,791 UART: [art] PUB.Y = 7CD96DE17E7E2B356BF6D312324394280AB9903B50517F2947666A280C8139484B0518E337F8B4C5D8895CEAA2968B22
5,633,724 UART: [art] SIG.R = B19469FE7E000435580B9273DDAD7A99E0CFF98BC8F317502141A6FE843A905777CB75870A232945FF5D3FCABFC2106E
5,640,469 UART: [art] SIG.S = 221798DF841795654C56B28B2FD6312452F1716C40E70EBC5BA22DA58240F1575BCE467EF1724AD243EB701C22423192
5,664,179 UART: Caliptra RT
5,664,432 UART: [state] CFI Enabled
5,944,908 UART: [rt] RT failed reset flow
5,945,339 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,034 ready_for_fw is high
1,056,034 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,543 >>> mbox cmd response: success
2,159,543 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,221,485 UART:
2,221,501 UART: Running Caliptra FMC ...
2,221,909 UART:
2,221,963 UART: [state] CFI Enabled
2,232,580 UART: [fht] FMC Alias Private Key: 7
2,340,417 UART: [art] Extend RT PCRs Done
2,340,845 UART: [art] Lock RT PCRs Done
2,342,087 UART: [art] Populate DV Done
2,350,278 UART: [fht] FMC Alias Private Key: 7
2,351,378 UART: [art] Derive CDI
2,351,658 UART: [art] Store in in slot 0x4
2,437,455 UART: [art] Derive Key Pair
2,437,815 UART: [art] Store priv key in slot 0x5
2,451,411 UART: [art] Derive Key Pair - Done
2,466,013 UART: [art] Signing Cert with AUTHO
2,466,493 UART: RITY.KEYID = 7
2,481,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,672 UART: [art] PUB.X = F2BBDFB66EA6A9E35514B1F807E3BD4C84208BDF007CDA592A897041BFED363A7E7B20B2068FBCE051E2C9D1AA3371A9
2,489,434 UART: [art] PUB.Y = 29E1A4BACE8A5C179BCE945C46DDD02D58F2ACD98BCEBFABDB1FBBCE8D3D1335CA71F639997263F86B9154E28FE6AA93
2,496,414 UART: [art] SIG.R = A291377E4B9C2E976729F785AD73D5124DBC7845150E454EDF467A3FB17B79BD882A9ACE89BED3936683D975846AD1DE
2,503,187 UART: [art] SIG.S = C20E64AEDADD513E82E3DD98372E3A6D1C8873F80D993C3ABE6D21EFF1BB6D1A1BA273A71C2EA07484432C456810BB01
2,527,185 UART: mbox::rt_entry...
2,527,557 UART: ____ _ _ _ ____ _____
2,528,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,445 UART: |_|
2,531,757 UART:
2,639,280 UART: [rt] Runtime listening for mailbox commands...
2,640,214 >>> mbox cmd response data (0 bytes)
2,640,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,075,505 >>> mbox cmd response: success
5,088,869 UART:
5,088,885 UART: Running Caliptra FMC ...
5,089,293 UART:
5,089,347 UART: [state] CFI Enabled
5,178,592 UART: [art] Extend RT PCRs Done
5,179,020 UART: [art] Lock RT PCRs Done
5,180,259 UART: [art] Populate DV Done
5,188,684 UART: [fht] FMC Alias Private Key: 7
5,189,626 UART: [art] Derive CDI
5,189,906 UART: [art] Store in in slot 0x4
5,275,461 UART: [art] Derive Key Pair
5,275,821 UART: [art] Store priv key in slot 0x5
5,288,621 UART: [art] Derive Key Pair - Done
5,303,554 UART: [art] Signing Cert with AUTHO
5,304,034 UART: RITY.KEYID = 7
5,318,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,627 UART: [art] PUB.X = A1D19A80B7E84A76F8CF88F1A5B681D5F5A1045BE9EA44D6395C2CF92297B8A9F9052B9636002C7CC862D47E8D58C495
5,326,375 UART: [art] PUB.Y = 2C01D71D94EAF0B35210C1378CF11887F79B19CF353AB2750F28D149BA9F1F38C49528325BD78D7D2F6106F096539E53
5,333,314 UART: [art] SIG.R = A984B5E7CB975E831E61DA4899F748D4EB909DAE237B9FC3AE37244D273362EBC1122CF39B73AFC448CCC778EA58146C
5,340,096 UART: [art] SIG.S = 911A2B9412E98F410B273AA793F540B865623DA5E71977A9E659CA02237539936E523ECD6495587627C7A11FC564A7B3
5,363,859 UART: Caliptra RT
5,364,112 UART: [state] CFI Enabled
5,646,109 UART: [rt] RT failed reset flow
5,646,540 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,598 UART: [cold-reset] ++
1,171,164 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,175,114 ready_for_fw is high
1,175,114 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,102 UART: [idev] Erasing UDS.KEYID = 0
1,200,496 UART: [idev] Sha1 KeyId Algorithm
1,209,422 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,244,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,475 UART: [ldev] --
1,283,763 UART: [fwproc] Wait for Commands...
1,284,482 UART: [fwproc] Recv command 0x46574c44
1,285,215 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,056 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,418 >>> mbox cmd response: success
2,313,418 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,441 UART: [afmc] ++
2,314,609 UART: [afmc] CDI.KEYID = 6
2,314,972 UART: [afmc] SUBJECT.KEYID = 7
2,315,398 UART: [afmc] AUTHORITY.KEYID = 5
2,350,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,082 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,694 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,468 UART: [afmc] --
2,394,406 UART: [cold-reset] --
2,395,268 UART: [state] Locking Datavault
2,396,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,745 UART: [state] Locking ICCM
2,397,409 UART: [exit] Launching FMC @ 0x40000130
2,402,738 UART:
2,402,754 UART: Running Caliptra FMC ...
2,403,162 UART:
2,403,305 UART: [state] CFI Enabled
2,413,950 UART: [fht] FMC Alias Private Key: 7
2,521,733 UART: [art] Extend RT PCRs Done
2,522,161 UART: [art] Lock RT PCRs Done
2,523,691 UART: [art] Populate DV Done
2,531,948 UART: [fht] FMC Alias Private Key: 7
2,533,010 UART: [art] Derive CDI
2,533,290 UART: [art] Store in in slot 0x4
2,618,791 UART: [art] Derive Key Pair
2,619,151 UART: [art] Store priv key in slot 0x5
2,632,921 UART: [art] Derive Key Pair - Done
2,647,598 UART: [art] Signing Cert with AUTHO
2,648,078 UART: RITY.KEYID = 7
2,663,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,259 UART: [art] PUB.X = E03552567D75C36FCF7992DE614F4A4379B96692076AC1A55FAFF3623DD9817E55C4526C947471A76F0BAB6ABE3C25C6
2,671,027 UART: [art] PUB.Y = 052C8A4760BA269CB4EE6FD352BB43814DF1846CB5BF34E6506BE6C412ED5B09EC561C46B2FBD640A3560947C447886C
2,677,976 UART: [art] SIG.R = 1D376EF0CF5EE14B8F2C09DE4677C20D2241CF5C4BBD96D12852BB6007E41EE4095C8870DB31EC1E5E88DBA27B125B25
2,684,748 UART: [art] SIG.S = DD64056B4EA599B7A0916BE1B7B750D2EDCDA0E8163B11721F6B303B4C98D2894005614A0ED3D59B1D370969283ADD3C
2,708,977 UART: mbox::rt_entry...
2,709,349 UART: ____ _ _ _ ____ _____
2,710,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,933 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,701 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,237 UART: |_|
2,713,549 UART:
2,820,497 UART: [rt] Runtime listening for mailbox commands...
2,821,431 >>> mbox cmd response data (0 bytes)
2,821,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,821,543 UART:
2,821,559 UART: Running Caliptra ROM ...
2,821,967 UART:
2,822,109 UART: [state] CFI Enabled
2,824,617 UART: [state] LifecycleState = Unprovisioned
2,825,272 UART: [state] DebugLocked = No
2,825,956 UART: [state] WD Timer not started. Device not locked for debugging
2,827,094 UART: [kat] SHA2-256
3,630,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,773 UART: [kat] ++
3,634,925 UART: [kat] sha1
3,639,293 UART: [kat] SHA2-256
3,641,233 UART: [kat] SHA2-384
3,644,096 UART: [kat] SHA2-512-ACC
3,645,996 UART: [kat] ECC-384
3,655,563 UART: [kat] HMAC-384Kdf
3,660,299 UART: [kat] LMS
3,908,611 UART: [kat] --
3,909,231 UART: [update-reset] ++
5,223,228 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,429 >>> mbox cmd response: success
5,374,670 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,684 UART: [update-reset Success] --
5,383,845 UART: [state] Locking Datavault
5,384,707 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,311 UART: [state] Locking ICCM
5,385,923 UART: [exit] Launching FMC @ 0x40000130
5,391,252 UART:
5,391,268 UART: Running Caliptra FMC ...
5,391,676 UART:
5,391,819 UART: [state] CFI Enabled
5,481,018 UART: [art] Extend RT PCRs Done
5,481,446 UART: [art] Lock RT PCRs Done
5,482,671 UART: [art] Populate DV Done
5,490,920 UART: [fht] FMC Alias Private Key: 7
5,491,930 UART: [art] Derive CDI
5,492,210 UART: [art] Store in in slot 0x4
5,577,827 UART: [art] Derive Key Pair
5,578,187 UART: [art] Store priv key in slot 0x5
5,591,425 UART: [art] Derive Key Pair - Done
5,606,350 UART: [art] Signing Cert with AUTHO
5,606,830 UART: RITY.KEYID = 7
5,622,288 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,053 UART: [art] PUB.X = 4581006D71E355946E980A0E78466ED2E02C893F3CF69BFA1756F1BCAF2813570902C0871CC1D707F499D1C9F99190B1
5,629,782 UART: [art] PUB.Y = 90AC7CE2AD307512E879B0F8530A25B45ACE8F8CF4AD19BCDD414757CE03B5245A328B081CACA38B43A626375A2930D7
5,636,733 UART: [art] SIG.R = 321BABD51EBA14A3C80307C7F5C8FC9DF7AC539D4CDA2558FE9F4408922EA08F30BE82C4459FB1D46D2E4576FF0640CF
5,643,509 UART: [art] SIG.S = 19A68F54955F7D4E2700BA98A0E3CAD029F683F9BB51D66B2517149124C255A465F68EEE869C6110C91675046F1843BB
5,667,551 UART: Caliptra RT
5,667,896 UART: [state] CFI Enabled
5,950,240 UART: [rt] RT failed reset flow
5,950,671 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,087 ready_for_fw is high
1,056,087 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,666 >>> mbox cmd response: success
2,162,666 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,224,588 UART:
2,224,604 UART: Running Caliptra FMC ...
2,225,012 UART:
2,225,155 UART: [state] CFI Enabled
2,235,764 UART: [fht] FMC Alias Private Key: 7
2,343,791 UART: [art] Extend RT PCRs Done
2,344,219 UART: [art] Lock RT PCRs Done
2,345,675 UART: [art] Populate DV Done
2,353,930 UART: [fht] FMC Alias Private Key: 7
2,355,098 UART: [art] Derive CDI
2,355,378 UART: [art] Store in in slot 0x4
2,440,397 UART: [art] Derive Key Pair
2,440,757 UART: [art] Store priv key in slot 0x5
2,453,991 UART: [art] Derive Key Pair - Done
2,468,838 UART: [art] Signing Cert with AUTHO
2,469,318 UART: RITY.KEYID = 7
2,484,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,037 UART: [art] PUB.X = 02D44F0AB2EF03A9CF2C041C5D1DEFE4EE6F854165C8836F41BF86719801273A2D1E09043E58CC5120EC91402AD54932
2,491,790 UART: [art] PUB.Y = D79D5155F9A2EBD2052D2FB03E2423118A3EB84FD26D755C0A49ECAE211EBF532CFFD3A4834ACA2548FE3C39C5F3DCCC
2,498,758 UART: [art] SIG.R = F4E9D741D67EA8C1CC4E66C41505104392A4A476EF2B815CBD0B97B8624FDDFF29C0A7C9BE66D48A09B01EE324345F83
2,505,531 UART: [art] SIG.S = C48539A5E6070BD7B0040E6D7CBCFD56DB34F56ABA85EB7296479088527613374C4A4761D98A30E9809544DDCD83A571
2,528,978 UART: mbox::rt_entry...
2,529,350 UART: ____ _ _ _ ____ _____
2,530,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,934 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,702 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,470 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,238 UART: |_|
2,533,550 UART:
2,639,961 UART: [rt] Runtime listening for mailbox commands...
2,640,895 >>> mbox cmd response data (0 bytes)
2,640,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,074,761 >>> mbox cmd response: success
5,088,051 UART:
5,088,067 UART: Running Caliptra FMC ...
5,088,475 UART:
5,088,618 UART: [state] CFI Enabled
5,177,119 UART: [art] Extend RT PCRs Done
5,177,547 UART: [art] Lock RT PCRs Done
5,178,780 UART: [art] Populate DV Done
5,187,019 UART: [fht] FMC Alias Private Key: 7
5,188,017 UART: [art] Derive CDI
5,188,297 UART: [art] Store in in slot 0x4
5,273,836 UART: [art] Derive Key Pair
5,274,196 UART: [art] Store priv key in slot 0x5
5,287,602 UART: [art] Derive Key Pair - Done
5,302,455 UART: [art] Signing Cert with AUTHO
5,302,935 UART: RITY.KEYID = 7
5,318,115 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,880 UART: [art] PUB.X = 81BDBA006053DF5E655FC793F4429C60BEE4D04BFE1C318358257EDED95C33D5A12AE1C4753FE0A9A443F32225354C6C
5,325,638 UART: [art] PUB.Y = 293AA179C66B483AF063369BD762064E319375B5FDA9E4C9C01385765063E228E8142929CB1C1F15798D17D78F232818
5,332,573 UART: [art] SIG.R = 0398DF01DC81952CEAFF3274AC5162C32306E58802043CF9BBDD9421FF4CC36A32A912AF1AFDAF846BC98AD70C83FC51
5,339,341 UART: [art] SIG.S = 0B91381804C0DE9CD82C3B98FA8A77909185A770EC0BE1C5DE54FF0BF7C48A7159C931E65C548603F1D4A546493437C8
5,363,159 UART: Caliptra RT
5,363,504 UART: [state] CFI Enabled
5,641,566 UART: [rt] RT failed reset flow
5,641,997 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,019 UART:
192,388 UART: Running Caliptra ROM ...
193,515 UART:
193,665 UART: [state] CFI Enabled
266,686 UART: [state] LifecycleState = Unprovisioned
268,655 UART: [state] DebugLocked = No
270,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,837 UART: [kat] SHA2-256
445,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,058 UART: [kat] ++
456,539 UART: [kat] sha1
467,289 UART: [kat] SHA2-256
470,012 UART: [kat] SHA2-384
474,447 UART: [kat] SHA2-512-ACC
476,816 UART: [kat] ECC-384
2,764,679 UART: [kat] HMAC-384Kdf
2,777,885 UART: [kat] LMS
3,968,211 UART: [kat] --
3,973,304 UART: [cold-reset] ++
3,974,995 UART: [fht] Storing FHT @ 0x50003400
3,985,847 UART: [idev] ++
3,986,416 UART: [idev] CDI.KEYID = 6
3,987,341 UART: [idev] SUBJECT.KEYID = 7
3,988,587 UART: [idev] UDS.KEYID = 0
3,989,654 ready_for_fw is high
3,989,868 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,090,767 UART: [idev] Erasing UDS.KEYID = 0
7,327,289 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,507 UART: [idev] --
7,352,751 UART: [ldev] ++
7,353,331 UART: [ldev] CDI.KEYID = 6
7,354,296 UART: [ldev] SUBJECT.KEYID = 5
7,355,508 UART: [ldev] AUTHORITY.KEYID = 7
7,356,691 UART: [ldev] FE.KEYID = 1
7,400,929 UART: [ldev] Erasing FE.KEYID = 1
10,734,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,518 UART: [ldev] --
13,116,245 UART: [fwproc] Waiting for Commands...
13,118,720 UART: [fwproc] Received command 0x46574c44
13,120,916 UART: [fwproc] Received Image of size 78740 bytes
16,745,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,825,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,894,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,087,294 >>> mbox cmd response: success
17,087,764 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,090,894 UART: [afmc] ++
17,091,515 UART: [afmc] CDI.KEYID = 6
17,092,437 UART: [afmc] SUBJECT.KEYID = 7
17,093,546 UART: [afmc] AUTHORITY.KEYID = 5
20,451,165 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,755,360 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,769,778 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,784,626 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,059 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,819,178 UART: [afmc] --
22,822,241 UART: [cold-reset] --
22,826,426 UART: [state] Locking Datavault
22,833,085 UART: [state] Locking PCR0, PCR1 and PCR31
22,834,786 UART: [state] Locking ICCM
22,835,911 UART: [exit] Launching FMC @ 0x40000130
22,844,304 UART:
22,844,541 UART: Running Caliptra FMC ...
22,845,641 UART:
22,845,800 UART: [state] CFI Enabled
22,913,906 UART: [fht] FMC Alias Private Key: 7
25,251,928 UART: [art] Extend RT PCRs Done
25,253,142 UART: [art] Lock RT PCRs Done
25,254,768 UART: [art] Populate DV Done
25,260,341 UART: [fht] FMC Alias Private Key: 7
25,261,830 UART: [art] Derive CDI
25,262,614 UART: [art] Store in in slot 0x4
25,322,433 UART: [art] Derive Key Pair
25,323,435 UART: [art] Store priv key in slot 0x5
28,616,180 UART: [art] Derive Key Pair - Done
28,628,798 UART: [art] Signing Cert with AUTHO
28,630,098 UART: RITY.KEYID = 7
30,917,603 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,102 UART: [art] PUB.X = 577EB6CDC62D840073BA203D77445A077BB657385AAB087C6E688F9BED9E7E816C7D5DEDA9078E2B843889BD3BAD13AE
30,926,358 UART: [art] PUB.Y = 7908115114F696A687398E36084D0AC30EE031DD0B8BA57FD969AF76AD831225FB47AFDDD4A5C2A7275E82F0695DB02A
30,933,651 UART: [art] SIG.R = 40AE3C0B060F71053E29E9279160D97B09151A9C1F64C5319719D30F60C3709F195659AACD03C4AADC700586AFE8B867
30,941,002 UART: [art] SIG.S = FBC5D0EC27613E6174A0C889FDB062ACE81A42B9057006B6C907E1E4270C93E0B2F0569C190CA165D2C381D3AE9C21D8
32,245,781 UART: mbox::rt_entry...
32,246,726 UART: ____ _ _ _ ____ _____
32,248,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,645 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,587 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,512 UART: |_|
32,257,362 UART:
32,372,367 UART: [rt] Runtime listening for mailbox commands...
32,374,547 >>> mbox cmd response data (0 bytes)
34,509,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,654,215 UART:
34,654,581 UART: Running Caliptra ROM ...
34,655,663 UART:
34,655,826 UART: [state] CFI Enabled
34,713,367 UART: [state] LifecycleState = Unprovisioned
34,715,319 UART: [state] DebugLocked = No
34,718,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,722,601 UART: [kat] SHA2-256
34,892,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,902,838 UART: [kat] ++
34,903,382 UART: [kat] sha1
34,915,575 UART: [kat] SHA2-256
34,918,262 UART: [kat] SHA2-384
34,924,406 UART: [kat] SHA2-512-ACC
34,926,811 UART: [kat] ECC-384
37,217,509 UART: [kat] HMAC-384Kdf
37,229,573 UART: [kat] LMS
38,419,893 UART: [kat] --
38,423,464 UART: [update-reset] ++
42,564,908 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,568,451 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,950,721 >>> mbox cmd response: success
42,955,239 UART: [update-reset] Copying MAN_2 To MAN_1
42,973,820 UART: [update-reset Success] --
42,977,149 UART: [state] Locking Datavault
42,979,870 UART: [state] Locking PCR0, PCR1 and PCR31
42,981,642 UART: [state] Locking ICCM
42,983,581 UART: [exit] Launching FMC @ 0x40000130
42,991,988 UART:
42,992,230 UART: Running Caliptra FMC ...
42,993,334 UART:
42,993,498 UART: [state] CFI Enabled
43,086,499 UART: [art] Extend RT PCRs Done
43,087,699 UART: [art] Lock RT PCRs Done
43,089,052 UART: [art] Populate DV Done
43,094,345 UART: [fht] FMC Alias Private Key: 7
43,096,033 UART: [art] Derive CDI
43,096,862 UART: [art] Store in in slot 0x4
43,155,800 UART: [art] Derive Key Pair
43,156,808 UART: [art] Store priv key in slot 0x5
46,449,195 UART: [art] Derive Key Pair - Done
46,461,991 UART: [art] Signing Cert with AUTHO
46,463,337 UART: RITY.KEYID = 7
48,750,745 UART: [art] Erasing AUTHORITY.KEYID = 7
48,752,248 UART: [art] PUB.X = 0BA7275FE8BBA1151C763D090725FC37836CF0ACD23A1C79A4E31722AFF003D0A0592E7D744C773E09023688931BE400
48,759,486 UART: [art] PUB.Y = C8BE4C9F732B9249899373235560C8E299F3EEC933E1A06546C32BC3780F5A1313F773FCE4D800FD2469065DE888E5BA
48,766,743 UART: [art] SIG.R = 5FA8200DE20F5EC1763A1DB3339C45EAD2403979ABB785EDF06D3EA7264D9279859A06F200DC84B9A2F05E1B2AF65599
48,774,138 UART: [art] SIG.S = 5182A87488DA985FFBB2E258A543CE350C7B84FA8ACD2719FF2C30F80BFB4B6CFB0715CAC025F807D6336CB8D9AAD7EA
50,080,029 UART: Caliptra RT
50,080,748 UART: [state] CFI Enabled
50,411,420 UART: [rt] RT failed reset flow
50,412,612 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,829 writing to cptra_bootfsm_go
3,784,797 ready_for_fw is high
3,785,374 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,105,507 >>> mbox cmd response: success
17,106,110 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,818,592 UART:
22,818,969 UART: Running Caliptra FMC ...
22,820,102 UART:
22,820,266 UART: [state] CFI Enabled
22,889,824 UART: [fht] FMC Alias Private Key: 7
25,227,600 UART: [art] Extend RT PCRs Done
25,228,861 UART: [art] Lock RT PCRs Done
25,230,628 UART: [art] Populate DV Done
25,236,106 UART: [fht] FMC Alias Private Key: 7
25,237,667 UART: [art] Derive CDI
25,238,405 UART: [art] Store in in slot 0x4
25,298,015 UART: [art] Derive Key Pair
25,299,062 UART: [art] Store priv key in slot 0x5
28,592,318 UART: [art] Derive Key Pair - Done
28,605,432 UART: [art] Signing Cert with AUTHO
28,606,742 UART: RITY.KEYID = 7
30,893,315 UART: [art] Erasing AUTHORITY.KEYID = 7
30,894,819 UART: [art] PUB.X = D5F246B0F7F5DD23DF6C26317D2151BF7EE6373735531F5F4CFC7155B5A7FB392C957CE75F4C9A39E1291C527466B835
30,902,072 UART: [art] PUB.Y = E088801992B4782C129FE3357CE6FE4B6CA3CB87A5CC7D9B4DE7D266CADACBBA35ED6A724C3D68F7C770D14E21F3CBCF
30,909,368 UART: [art] SIG.R = 878C5B9E26E8909604BA3873513FD200F1D0967528178D3E4F11C7BD31D95696D3E03166FBED177B44B3FE8D9BCB0845
30,916,703 UART: [art] SIG.S = A2ACFBDFE69F8F97B89BFB42FC2816210D3F731F4B208F376747C9721801657FBFEFE4DB75DC1BEBAAF2980E2DF10B2B
32,221,814 UART: mbox::rt_entry...
32,222,774 UART: ____ _ _ _ ____ _____
32,224,767 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,780 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,228,657 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,230,568 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,232,508 UART: |_|
32,233,349 UART:
32,346,169 UART: [rt] Runtime listening for mailbox commands...
32,348,402 >>> mbox cmd response data (0 bytes)
34,478,126 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,200,024 >>> mbox cmd response: success
43,234,068 UART:
43,234,400 UART: Running Caliptra FMC ...
43,235,528 UART:
43,235,716 UART: [state] CFI Enabled
43,339,327 UART: [art] Extend RT PCRs Done
43,340,515 UART: [art] Lock RT PCRs Done
43,342,086 UART: [art] Populate DV Done
43,347,556 UART: [fht] FMC Alias Private Key: 7
43,349,094 UART: [art] Derive CDI
43,349,913 UART: [art] Store in in slot 0x4
43,408,687 UART: [art] Derive Key Pair
43,409,716 UART: [art] Store priv key in slot 0x5
46,702,096 UART: [art] Derive Key Pair - Done
46,714,935 UART: [art] Signing Cert with AUTHO
46,716,245 UART: RITY.KEYID = 7
49,003,547 UART: [art] Erasing AUTHORITY.KEYID = 7
49,005,058 UART: [art] PUB.X = 6EC61514730788188A63A6880A73943D4D45C00FA2CFC0AF4D8BFD3B7323B52834AF9A5CE817DE499C007B3D22B2E324
49,012,290 UART: [art] PUB.Y = 6DCB05F83E6CBA1B5FAA97EC15CDB536010348D8820A976BCBEA2F0A5965FA080DB8ADA8911435F8AFEE48598E7EFA40
49,019,604 UART: [art] SIG.R = 7A766CC5DE3C81778FB187877E26EF1D6D2AF2EDA49133537B553E26E803E6693F3450FF64FAA0558DE6CBF2281EC5AD
49,027,000 UART: [art] SIG.S = 6E78EC20CF1844D29DBAF71936A3FFF7DE4A401D5965AC7ADEC2EA6C8E0EB1D28E1CAF4CA98F32C4BC1D45D2A78F857D
50,332,473 UART: Caliptra RT
50,333,172 UART: [state] CFI Enabled
50,662,184 UART: [rt] RT failed reset flow
50,663,403 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,519 UART:
192,874 UART: Running Caliptra ROM ...
194,053 UART:
603,650 UART: [state] CFI Enabled
616,602 UART: [state] LifecycleState = Unprovisioned
618,532 UART: [state] DebugLocked = No
620,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,983 UART: [kat] SHA2-256
795,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,288 UART: [kat] ++
806,777 UART: [kat] sha1
818,801 UART: [kat] SHA2-256
821,457 UART: [kat] SHA2-384
825,809 UART: [kat] SHA2-512-ACC
828,168 UART: [kat] ECC-384
3,111,615 UART: [kat] HMAC-384Kdf
3,122,490 UART: [kat] LMS
4,312,609 UART: [kat] --
4,316,668 UART: [cold-reset] ++
4,319,325 UART: [fht] Storing FHT @ 0x50003400
4,331,229 UART: [idev] ++
4,331,859 UART: [idev] CDI.KEYID = 6
4,332,766 UART: [idev] SUBJECT.KEYID = 7
4,334,008 UART: [idev] UDS.KEYID = 0
4,335,097 ready_for_fw is high
4,335,321 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,434,303 UART: [idev] Erasing UDS.KEYID = 0
7,617,615 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,313 UART: [idev] --
7,644,685 UART: [ldev] ++
7,645,252 UART: [ldev] CDI.KEYID = 6
7,646,187 UART: [ldev] SUBJECT.KEYID = 5
7,647,393 UART: [ldev] AUTHORITY.KEYID = 7
7,648,673 UART: [ldev] FE.KEYID = 1
7,661,880 UART: [ldev] Erasing FE.KEYID = 1
10,953,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,678 UART: [ldev] --
13,314,986 UART: [fwproc] Waiting for Commands...
13,318,270 UART: [fwproc] Received command 0x46574c44
13,320,463 UART: [fwproc] Received Image of size 78740 bytes
16,940,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,009,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,078,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,272,868 >>> mbox cmd response: success
17,273,345 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,276,249 UART: [afmc] ++
17,276,834 UART: [afmc] CDI.KEYID = 6
17,277,740 UART: [afmc] SUBJECT.KEYID = 7
17,279,005 UART: [afmc] AUTHORITY.KEYID = 5
20,593,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,888,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,890,553 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,904,894 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,919,727 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,934,169 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,954,323 UART: [afmc] --
22,958,062 UART: [cold-reset] --
22,961,441 UART: [state] Locking Datavault
22,966,965 UART: [state] Locking PCR0, PCR1 and PCR31
22,968,659 UART: [state] Locking ICCM
22,971,178 UART: [exit] Launching FMC @ 0x40000130
22,979,566 UART:
22,979,799 UART: Running Caliptra FMC ...
22,980,900 UART:
22,981,052 UART: [state] CFI Enabled
22,988,982 UART: [fht] FMC Alias Private Key: 7
25,320,129 UART: [art] Extend RT PCRs Done
25,321,368 UART: [art] Lock RT PCRs Done
25,322,696 UART: [art] Populate DV Done
25,327,893 UART: [fht] FMC Alias Private Key: 7
25,329,532 UART: [art] Derive CDI
25,330,358 UART: [art] Store in in slot 0x4
25,372,955 UART: [art] Derive Key Pair
25,373,995 UART: [art] Store priv key in slot 0x5
28,615,682 UART: [art] Derive Key Pair - Done
28,628,746 UART: [art] Signing Cert with AUTHO
28,630,251 UART: RITY.KEYID = 7
30,909,612 UART: [art] Erasing AUTHORITY.KEYID = 7
30,911,119 UART: [art] PUB.X = FDB4281C4824BC92535DF09F5BD11438F9117341ED183D89C6DD4AEC3AD684730B9029CFA8C53A5522E1491E40A4AD79
30,918,359 UART: [art] PUB.Y = CA4CD10C4B66F31CB0D94327C553333A666EFEA0C20D6DF62757A00CCAD1D75728BD479BFCB086DA013F6BCA25580587
30,925,633 UART: [art] SIG.R = BABCE67C52526A30AEB6E2E95AD18EB88765852D75815C71DF0C7497271EBA682A1D8FB3910E6D94848EE166D5209C43
30,932,968 UART: [art] SIG.S = 1EF04FDA71C76A96A27B06736424B9B0188CB297FBB0D9056F91B1A757F35D1A7FF32B534EC55664E2F88C53B325E1E8
32,237,960 UART: mbox::rt_entry...
32,238,897 UART: ____ _ _ _ ____ _____
32,240,870 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,242,872 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,244,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,246,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,248,667 UART: |_|
32,249,469 UART:
32,363,137 UART: [rt] Runtime listening for mailbox commands...
32,365,350 >>> mbox cmd response data (0 bytes)
34,416,933 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,561,327 UART:
34,561,702 UART: Running Caliptra ROM ...
34,562,839 UART:
34,563,008 UART: [state] CFI Enabled
34,578,179 UART: [state] LifecycleState = Unprovisioned
34,580,078 UART: [state] DebugLocked = No
34,582,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,587,673 UART: [kat] SHA2-256
34,757,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,767,961 UART: [kat] ++
34,768,416 UART: [kat] sha1
34,778,377 UART: [kat] SHA2-256
34,781,060 UART: [kat] SHA2-384
34,785,962 UART: [kat] SHA2-512-ACC
34,788,304 UART: [kat] ECC-384
37,070,919 UART: [kat] HMAC-384Kdf
37,082,237 UART: [kat] LMS
38,272,321 UART: [kat] --
38,277,416 UART: [update-reset] ++
42,416,684 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,421,081 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,803,353 >>> mbox cmd response: success
42,807,628 UART: [update-reset] Copying MAN_2 To MAN_1
42,826,366 UART: [update-reset Success] --
42,829,758 UART: [state] Locking Datavault
42,832,795 UART: [state] Locking PCR0, PCR1 and PCR31
42,834,518 UART: [state] Locking ICCM
42,836,644 UART: [exit] Launching FMC @ 0x40000130
42,845,100 UART:
42,845,339 UART: Running Caliptra FMC ...
42,846,374 UART:
42,846,514 UART: [state] CFI Enabled
42,890,858 UART: [art] Extend RT PCRs Done
42,892,056 UART: [art] Lock RT PCRs Done
42,893,377 UART: [art] Populate DV Done
42,898,887 UART: [fht] FMC Alias Private Key: 7
42,900,422 UART: [art] Derive CDI
42,901,233 UART: [art] Store in in slot 0x4
42,943,444 UART: [art] Derive Key Pair
42,944,440 UART: [art] Store priv key in slot 0x5
46,186,656 UART: [art] Derive Key Pair - Done
46,199,350 UART: [art] Signing Cert with AUTHO
46,200,662 UART: RITY.KEYID = 7
48,479,881 UART: [art] Erasing AUTHORITY.KEYID = 7
48,481,392 UART: [art] PUB.X = 3971976FF353BE554FC8C7ECA3D45EAF24712B3D6F21328969664FB9D8E5C0EC5C669A71B98DAFFD1AA9C9533AF2BADF
48,488,679 UART: [art] PUB.Y = 20DF3DC2C7515B85E44A5A1CEC409E0DD60F94DBF5DCEEFCE07F2AA7B92D0638B8DB0D3773F563D9C4B8FF18C1F81E02
48,495,949 UART: [art] SIG.R = 12F89BA12EC71BA3813B6E658C9170C0D24FA020854CAA9BE98765C860B73DDF75D4B5BB08ED1CBDC19781C7266E7C76
48,503,332 UART: [art] SIG.S = DF81245686EC009962228C4D4249221180F61991A17A00D8D98B366CE1622DFD505CBDFE1E0C1592F550DCE6E4C6FC0C
49,808,048 UART: Caliptra RT
49,808,765 UART: [state] CFI Enabled
50,096,291 UART: [rt] RT failed reset flow
50,097,486 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,131,673 ready_for_fw is high
4,132,488 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,349,641 >>> mbox cmd response: success
17,350,609 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,990,930 UART:
22,991,348 UART: Running Caliptra FMC ...
22,992,456 UART:
22,992,602 UART: [state] CFI Enabled
23,000,592 UART: [fht] FMC Alias Private Key: 7
25,330,924 UART: [art] Extend RT PCRs Done
25,332,153 UART: [art] Lock RT PCRs Done
25,333,698 UART: [art] Populate DV Done
25,338,996 UART: [fht] FMC Alias Private Key: 7
25,340,644 UART: [art] Derive CDI
25,341,377 UART: [art] Store in in slot 0x4
25,384,572 UART: [art] Derive Key Pair
25,385,610 UART: [art] Store priv key in slot 0x5
28,627,460 UART: [art] Derive Key Pair - Done
28,640,699 UART: [art] Signing Cert with AUTHO
28,642,013 UART: RITY.KEYID = 7
30,921,362 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,884 UART: [art] PUB.X = A3AE76744C6092A951DA8D779ECB5E4BA1A79E894D61BB796EC4D91AE61436E1BCB96A073798984BCC549DBA03C1FCEC
30,930,134 UART: [art] PUB.Y = 18AD716EEE8DF6B8824DA8005336CCF494BD7827EA3E54B942C952838647D25381B14686054A0581C28B7F7F51B0BD75
30,937,382 UART: [art] SIG.R = B3721A7FF7C47B636E3934DC4FC0CF48D3FF3CA2950DD53BDA6FA39EE825444CD6B02164BF48D080922689226BF57F98
30,944,780 UART: [art] SIG.S = D435B9D477EA49C05C8B23B4E69BEA22D150B34DB2AF72DF12E39F3D6B664082354F78EF41AC957D0CEDA9FC0664C083
32,249,425 UART: mbox::rt_entry...
32,250,369 UART: ____ _ _ _ ____ _____
32,252,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,254,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,256,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,258,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,260,316 UART: |_|
32,261,314 UART:
32,374,314 UART: [rt] Runtime listening for mailbox commands...
32,376,494 >>> mbox cmd response data (0 bytes)
34,429,032 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,093,837 >>> mbox cmd response: success
43,127,373 UART:
43,127,687 UART: Running Caliptra FMC ...
43,128,814 UART:
43,128,974 UART: [state] CFI Enabled
43,173,018 UART: [art] Extend RT PCRs Done
43,174,235 UART: [art] Lock RT PCRs Done
43,175,532 UART: [art] Populate DV Done
43,181,155 UART: [fht] FMC Alias Private Key: 7
43,182,684 UART: [art] Derive CDI
43,183,463 UART: [art] Store in in slot 0x4
43,225,746 UART: [art] Derive Key Pair
43,226,789 UART: [art] Store priv key in slot 0x5
46,469,087 UART: [art] Derive Key Pair - Done
46,482,315 UART: [art] Signing Cert with AUTHO
46,483,624 UART: RITY.KEYID = 7
48,763,336 UART: [art] Erasing AUTHORITY.KEYID = 7
48,764,898 UART: [art] PUB.X = 171C99A9CE2A142C29341E32BDFCB62FFF1890BC9792CADD14BD46968009B26D4B50CB0ECBDDFD3159FAEDF576DA59CA
48,772,062 UART: [art] PUB.Y = E965F170FA64299E0D67F94B62EBB19672F613F477E4AABBDC31A86E2EFE5818C206534EB56F783FC8DDAB41EF7B6AAC
48,779,339 UART: [art] SIG.R = A0D9C7FC9825A75BADE12BE4FFF6EC8FF0F02DC9A2E08D8444BBF28F268420B2A3BB0C870FBF468D29D257CF9CD912D8
48,786,756 UART: [art] SIG.S = 5DC1A36F8C7E251FACDA6C00314E3B4D15331D6B37F6EEC8CB468D914AA75BE3B96EF834F994F97E53FC6C02BCCED231
50,092,172 UART: Caliptra RT
50,092,894 UART: [state] CFI Enabled
50,378,044 UART: [rt] RT failed reset flow
50,379,241 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,146 UART:
192,516 UART: Running Caliptra ROM ...
193,706 UART:
193,860 UART: [state] CFI Enabled
261,104 UART: [state] LifecycleState = Unprovisioned
262,947 UART: [state] DebugLocked = No
264,824 UART: [state] WD Timer not started. Device not locked for debugging
268,080 UART: [kat] SHA2-256
447,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,820 UART: [kat] ++
459,270 UART: [kat] sha1
471,308 UART: [kat] SHA2-256
474,282 UART: [kat] SHA2-384
481,983 UART: [kat] SHA2-512-ACC
484,985 UART: [kat] ECC-384
2,944,555 UART: [kat] HMAC-384Kdf
2,969,312 UART: [kat] LMS
3,498,818 UART: [kat] --
3,502,626 UART: [cold-reset] ++
3,505,209 UART: [fht] FHT @ 0x50003400
3,516,902 UART: [idev] ++
3,517,482 UART: [idev] CDI.KEYID = 6
3,518,393 UART: [idev] SUBJECT.KEYID = 7
3,519,562 UART: [idev] UDS.KEYID = 0
3,520,556 ready_for_fw is high
3,520,744 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,855 UART: [idev] Erasing UDS.KEYID = 0
6,026,035 UART: [idev] Sha1 KeyId Algorithm
6,050,407 UART: [idev] --
6,054,351 UART: [ldev] ++
6,054,925 UART: [ldev] CDI.KEYID = 6
6,055,837 UART: [ldev] SUBJECT.KEYID = 5
6,056,999 UART: [ldev] AUTHORITY.KEYID = 7
6,058,232 UART: [ldev] FE.KEYID = 1
6,098,001 UART: [ldev] Erasing FE.KEYID = 1
8,601,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,276 UART: [ldev] --
10,413,726 UART: [fwproc] Wait for Commands...
10,416,847 UART: [fwproc] Recv command 0x46574c44
10,418,936 UART: [fwproc] Recv'd Img size: 78704 bytes
13,385,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,460,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,528,981 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,721,772 >>> mbox cmd response: success
13,722,245 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,726,886 UART: [afmc] ++
13,727,491 UART: [afmc] CDI.KEYID = 6
13,728,403 UART: [afmc] SUBJECT.KEYID = 7
13,729,586 UART: [afmc] AUTHORITY.KEYID = 5
16,274,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,017,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,018,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,034,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,050,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,066,738 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,089,534 UART: [afmc] --
18,093,892 UART: [cold-reset] --
18,096,888 UART: [state] Locking Datavault
18,103,329 UART: [state] Locking PCR0, PCR1 and PCR31
18,104,983 UART: [state] Locking ICCM
18,106,971 UART: [exit] Launching FMC @ 0x40000130
18,115,366 UART:
18,115,600 UART: Running Caliptra FMC ...
18,116,700 UART:
18,116,881 UART: [state] CFI Enabled
18,175,690 UART: [fht] FMC Alias Private Key: 7
19,939,708 UART: [art] Extend RT PCRs Done
19,940,902 UART: [art] Lock RT PCRs Done
19,942,844 UART: [art] Populate DV Done
19,948,300 UART: [fht] FMC Alias Private Key: 7
19,949,897 UART: [art] Derive CDI
19,950,644 UART: [art] Store in in slot 0x4
20,008,729 UART: [art] Derive Key Pair
20,009,809 UART: [art] Store priv key in slot 0x5
22,472,283 UART: [art] Derive Key Pair - Done
22,485,176 UART: [art] Signing Cert with AUTHO
22,486,482 UART: RITY.KEYID = 7
24,198,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,200,126 UART: [art] PUB.X = 590CAE3175FFFC75527863ADF75C0AE527CD036B362806AC4E8F53612C342992B95D20E634642D3D944F8ECCD0B36BA4
24,207,375 UART: [art] PUB.Y = 2DDFFF306A9D1115CF88EE6BF910967B8F839523A3FC4E0BB2CE8213B597C12A2EB70C57EF1D1795673EA0222ECD58D2
24,214,680 UART: [art] SIG.R = FEAD127C7EA0D36470B05ED9468675FAB7DAA966A9DB5D616B4DDCF50D10CB65A23163C106EA88771DCB9220D4A30288
24,222,066 UART: [art] SIG.S = A22436D37DD9412FE6D89E93AD8CB5EBDAA94E3371BDABF92A362E0D91B9283C4E20AC8730F0C815603AD92CABC94B1C
25,200,769 UART: mbox::rt_entry...
25,201,722 UART: ____ _ _ _ ____ _____
25,203,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,205,653 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,207,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,209,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,211,291 UART: |_|
25,212,117 UART:
25,325,569 UART: [rt] Runtime listening for mailbox commands...
25,327,785 >>> mbox cmd response data (0 bytes)
27,381,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,526,036 UART:
27,526,428 UART: Running Caliptra ROM ...
27,527,484 UART:
27,527,636 UART: [state] CFI Enabled
27,590,804 UART: [state] LifecycleState = Unprovisioned
27,592,695 UART: [state] DebugLocked = No
27,594,194 UART: [state] WD Timer not started. Device not locked for debugging
27,598,059 UART: [kat] SHA2-256
27,777,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,788,759 UART: [kat] ++
27,789,291 UART: [kat] sha1
27,799,373 UART: [kat] SHA2-256
27,802,386 UART: [kat] SHA2-384
27,808,989 UART: [kat] SHA2-512-ACC
27,811,942 UART: [kat] ECC-384
30,270,885 UART: [kat] HMAC-384Kdf
30,295,697 UART: [kat] LMS
30,825,141 UART: [kat] --
30,829,261 UART: [update-reset] ++
34,257,750 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,260,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,644,259 >>> mbox cmd response: success
34,648,875 UART: [update-reset] Copying MAN_2 To MAN_1
34,668,213 UART: [update-reset Success] --
34,673,710 UART: [state] Locking Datavault
34,676,450 UART: [state] Locking PCR0, PCR1 and PCR31
34,678,101 UART: [state] Locking ICCM
34,680,558 UART: [exit] Launching FMC @ 0x40000130
34,689,012 UART:
34,689,261 UART: Running Caliptra FMC ...
34,690,691 UART:
34,690,861 UART: [state] CFI Enabled
34,786,557 UART: [art] Extend RT PCRs Done
34,787,951 UART: [art] Lock RT PCRs Done
34,789,281 UART: [art] Populate DV Done
34,794,581 UART: [fht] FMC Alias Private Key: 7
34,796,070 UART: [art] Derive CDI
34,796,840 UART: [art] Store in in slot 0x4
34,855,390 UART: [art] Derive Key Pair
34,856,388 UART: [art] Store priv key in slot 0x5
37,320,898 UART: [art] Derive Key Pair - Done
37,334,079 UART: [art] Signing Cert with AUTHO
37,335,395 UART: RITY.KEYID = 7
39,046,720 UART: [art] Erasing AUTHORITY.KEYID = 7
39,048,222 UART: [art] PUB.X = D4081270EA4C3B3FA64278076EF17EB96698637D8894D83CE5C87492CCBEBC712A7D5845EB04E99BA1D8FCADB02F8D5C
39,055,490 UART: [art] PUB.Y = 275CF151F3123CC18028218BCE220DE5CC0F6726877B724A39EF4293482FA6B67183D47289ACC353D4E16EA7A902BC89
39,062,745 UART: [art] SIG.R = 9D54833EC29489187746D57A09BE6998772B85B6309A9E334C4E1BA40C2A84870D312569E48B1DC45E6BBB293C68DC59
39,070,090 UART: [art] SIG.S = 7386C146AE23956B85E863E9B3EBB5DF2FB782798A8D32577A175B1B5154409E83E556F7900729AC147A0CC409688C9C
40,049,370 UART: Caliptra RT
40,050,077 UART: [state] CFI Enabled
40,385,973 UART: [rt] RT failed reset flow
40,387,278 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,378,908 ready_for_fw is high
3,379,310 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,518,828 >>> mbox cmd response: success
13,519,603 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,811,541 UART:
17,812,116 UART: Running Caliptra FMC ...
17,813,236 UART:
17,813,390 UART: [state] CFI Enabled
17,878,390 UART: [fht] FMC Alias Private Key: 7
19,642,417 UART: [art] Extend RT PCRs Done
19,643,659 UART: [art] Lock RT PCRs Done
19,645,421 UART: [art] Populate DV Done
19,650,893 UART: [fht] FMC Alias Private Key: 7
19,652,641 UART: [art] Derive CDI
19,653,386 UART: [art] Store in in slot 0x4
19,710,993 UART: [art] Derive Key Pair
19,711,994 UART: [art] Store priv key in slot 0x5
22,174,735 UART: [art] Derive Key Pair - Done
22,187,686 UART: [art] Signing Cert with AUTHO
22,188,987 UART: RITY.KEYID = 7
23,901,641 UART: [art] Erasing AUTHORITY.KEYID = 7
23,903,152 UART: [art] PUB.X = 06125DD6853082F5D6932DE0DFBCC3F78D170BB5D01274C4DA0060F29D18799A5D382780BEC298152B6D20EE2B4DECA7
23,910,415 UART: [art] PUB.Y = 733BBA07485E8210415DB05BEA48300D5149781A74EA5B59C28C9B51295146A3F9F1172C189A21DC8929156D187DB2EB
23,917,621 UART: [art] SIG.R = 32FF6DB1C971AE2A12B1BBE9C8226540197EAF2A126B9726B7ABDED78D3F07C2B2513D08E3CAE35BB327BA0F77259710
23,925,071 UART: [art] SIG.S = 6DA2D284788D22D68828F099BE64C436CCD949C1D9A953D48B5872A7837F176AA321CF90E810A3DD6B3366243162B177
24,903,736 UART: mbox::rt_entry...
24,904,712 UART: ____ _ _ _ ____ _____
24,906,694 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,908,699 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,910,627 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,912,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,914,519 UART: |_|
24,915,327 UART:
25,028,574 UART: [rt] Runtime listening for mailbox commands...
25,030,746 >>> mbox cmd response data (0 bytes)
27,082,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,191,712 >>> mbox cmd response: success
34,227,401 UART:
34,227,764 UART: Running Caliptra FMC ...
34,228,899 UART:
34,229,074 UART: [state] CFI Enabled
34,318,282 UART: [art] Extend RT PCRs Done
34,319,472 UART: [art] Lock RT PCRs Done
34,320,929 UART: [art] Populate DV Done
34,326,277 UART: [fht] FMC Alias Private Key: 7
34,327,813 UART: [art] Derive CDI
34,328,625 UART: [art] Store in in slot 0x4
34,387,343 UART: [art] Derive Key Pair
34,388,379 UART: [art] Store priv key in slot 0x5
36,851,257 UART: [art] Derive Key Pair - Done
36,864,280 UART: [art] Signing Cert with AUTHO
36,865,595 UART: RITY.KEYID = 7
38,577,628 UART: [art] Erasing AUTHORITY.KEYID = 7
38,579,143 UART: [art] PUB.X = 0B5798BB6B15F22E2D806720E0C8DB826A7D4A1DA23E48CE7E495A58D0DD8C07AF7BA8683A710DE8D0FFD2077BCE679B
38,586,484 UART: [art] PUB.Y = B049498493CD58407077061B172AE34DCCF9433E54079965453534B4F4895310D23D326E0AD16EFFF224AFFB782E0504
38,593,677 UART: [art] SIG.R = AE812C5DD32EEBB08A6D9AD1FEFE256ECDD281235238F35C8EDC29FBDAFE370A3807565ECDBAC72F6A77C63A73EB4B7C
38,601,081 UART: [art] SIG.S = ECFFF758888DE9825A51DCB378B31E67DAF8166B30C152D426BB060D734A7B36BE4E0678E3DBB70981FA897FE3802A8C
39,580,520 UART: Caliptra RT
39,581,213 UART: [state] CFI Enabled
39,918,599 UART: [rt] RT failed reset flow
39,919,810 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,412 UART:
192,780 UART: Running Caliptra ROM ...
193,968 UART:
603,594 UART: [state] CFI Enabled
619,598 UART: [state] LifecycleState = Unprovisioned
621,487 UART: [state] DebugLocked = No
623,581 UART: [state] WD Timer not started. Device not locked for debugging
628,033 UART: [kat] SHA2-256
807,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,748 UART: [kat] ++
819,192 UART: [kat] sha1
830,338 UART: [kat] SHA2-256
833,401 UART: [kat] SHA2-384
840,089 UART: [kat] SHA2-512-ACC
843,026 UART: [kat] ECC-384
3,283,253 UART: [kat] HMAC-384Kdf
3,295,359 UART: [kat] LMS
3,824,867 UART: [kat] --
3,829,144 UART: [cold-reset] ++
3,831,500 UART: [fht] FHT @ 0x50003400
3,843,209 UART: [idev] ++
3,843,801 UART: [idev] CDI.KEYID = 6
3,844,714 UART: [idev] SUBJECT.KEYID = 7
3,845,879 UART: [idev] UDS.KEYID = 0
3,846,795 ready_for_fw is high
3,846,975 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,946,224 UART: [idev] Erasing UDS.KEYID = 0
6,320,380 UART: [idev] Sha1 KeyId Algorithm
6,342,447 UART: [idev] --
6,347,089 UART: [ldev] ++
6,347,653 UART: [ldev] CDI.KEYID = 6
6,348,556 UART: [ldev] SUBJECT.KEYID = 5
6,349,758 UART: [ldev] AUTHORITY.KEYID = 7
6,350,981 UART: [ldev] FE.KEYID = 1
6,360,861 UART: [ldev] Erasing FE.KEYID = 1
8,831,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,165 UART: [ldev] --
10,624,471 UART: [fwproc] Wait for Commands...
10,626,829 UART: [fwproc] Recv command 0x46574c44
10,628,911 UART: [fwproc] Recv'd Img size: 78704 bytes
13,594,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,670,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,738,996 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,932,765 >>> mbox cmd response: success
13,933,263 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,936,698 UART: [afmc] ++
13,937,271 UART: [afmc] CDI.KEYID = 6
13,938,176 UART: [afmc] SUBJECT.KEYID = 7
13,939,385 UART: [afmc] AUTHORITY.KEYID = 5
16,444,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,164,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,166,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,182,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,198,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,214,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,236,828 UART: [afmc] --
18,239,811 UART: [cold-reset] --
18,245,297 UART: [state] Locking Datavault
18,251,143 UART: [state] Locking PCR0, PCR1 and PCR31
18,252,781 UART: [state] Locking ICCM
18,255,034 UART: [exit] Launching FMC @ 0x40000130
18,263,431 UART:
18,263,657 UART: Running Caliptra FMC ...
18,264,747 UART:
18,264,900 UART: [state] CFI Enabled
18,272,956 UART: [fht] FMC Alias Private Key: 7
20,029,536 UART: [art] Extend RT PCRs Done
20,030,757 UART: [art] Lock RT PCRs Done
20,032,597 UART: [art] Populate DV Done
20,037,839 UART: [fht] FMC Alias Private Key: 7
20,039,422 UART: [art] Derive CDI
20,040,154 UART: [art] Store in in slot 0x4
20,082,702 UART: [art] Derive Key Pair
20,083,873 UART: [art] Store priv key in slot 0x5
22,511,010 UART: [art] Derive Key Pair - Done
22,524,385 UART: [art] Signing Cert with AUTHO
22,525,688 UART: RITY.KEYID = 7
24,231,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,232,653 UART: [art] PUB.X = D8D7038D8FCFFC246052EBAFCD55CF6789D8563D1B99415B4130A97011B910FBC07BC93C38994BAABE1B77C61FEE7477
24,239,941 UART: [art] PUB.Y = FC39558A0ED917702963AC95EB052CFAFFCFBA83653765D086B2EFBC5CA57A38B3E8A99A57B94D9BF3F6CB6AC6D552FD
24,247,220 UART: [art] SIG.R = FACB1F7DFB9865F1312EBFF5EE00C851C60705830EC67210CD0B1AAB637486F461E76EBADBC0D196CD48A58283B206D5
24,254,619 UART: [art] SIG.S = 8DFFCEE558A5B92E16E332346F44009D48B85F7E5C4081C22346A92A24ABBE08FEF27BDE34CDCC1767BCDC269A0CC9F1
25,232,740 UART: mbox::rt_entry...
25,233,708 UART: ____ _ _ _ ____ _____
25,235,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,237,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,239,540 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,241,461 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,243,378 UART: |_|
25,244,199 UART:
25,357,938 UART: [rt] Runtime listening for mailbox commands...
25,360,161 >>> mbox cmd response data (0 bytes)
27,419,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,564,346 UART:
27,564,750 UART: Running Caliptra ROM ...
27,565,997 UART:
27,566,163 UART: [state] CFI Enabled
27,576,536 UART: [state] LifecycleState = Unprovisioned
27,578,423 UART: [state] DebugLocked = No
27,580,549 UART: [state] WD Timer not started. Device not locked for debugging
27,584,455 UART: [kat] SHA2-256
27,763,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,775,219 UART: [kat] ++
27,775,768 UART: [kat] sha1
27,786,443 UART: [kat] SHA2-256
27,789,502 UART: [kat] SHA2-384
27,796,078 UART: [kat] SHA2-512-ACC
27,799,040 UART: [kat] ECC-384
30,242,043 UART: [kat] HMAC-384Kdf
30,254,388 UART: [kat] LMS
30,783,893 UART: [kat] --
30,788,964 UART: [update-reset] ++
34,225,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,228,990 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,612,298 >>> mbox cmd response: success
34,616,855 UART: [update-reset] Copying MAN_2 To MAN_1
34,636,054 UART: [update-reset Success] --
34,640,824 UART: [state] Locking Datavault
34,645,108 UART: [state] Locking PCR0, PCR1 and PCR31
34,646,781 UART: [state] Locking ICCM
34,647,904 UART: [exit] Launching FMC @ 0x40000130
34,656,355 UART:
34,656,584 UART: Running Caliptra FMC ...
34,657,978 UART:
34,658,138 UART: [state] CFI Enabled
34,701,988 UART: [art] Extend RT PCRs Done
34,703,129 UART: [art] Lock RT PCRs Done
34,704,784 UART: [art] Populate DV Done
34,710,502 UART: [fht] FMC Alias Private Key: 7
34,712,145 UART: [art] Derive CDI
34,712,968 UART: [art] Store in in slot 0x4
34,755,451 UART: [art] Derive Key Pair
34,756,447 UART: [art] Store priv key in slot 0x5
37,182,967 UART: [art] Derive Key Pair - Done
37,196,121 UART: [art] Signing Cert with AUTHO
37,197,484 UART: RITY.KEYID = 7
38,903,314 UART: [art] Erasing AUTHORITY.KEYID = 7
38,904,807 UART: [art] PUB.X = 9CD6BDA527313AF78C81CB2AE77F1FF8A3C1E58ACD05CD43A0264606F47A3000AE36593416F63840ABB60C5C4954D53D
38,912,091 UART: [art] PUB.Y = 324D26F5C23A92FED5B991DF6568BE732B25D7AD9AE2A6B0B81B2B3DF2B4CC4C42AD5AB35CECEF61A55437EFB0A8D0EA
38,919,361 UART: [art] SIG.R = A9BCDB35F2C56761FAD655446A8698C22CC388CDEC7AB228B66B4EE3BEB5C6FD6B8C5F1528352BD70CA842B7B5AFD684
38,926,802 UART: [art] SIG.S = A1B4C043A5AA9A4FC22274587080F356D0EEC8E999F8A05D090B3BA35E2461A4F6E30E76C84D6AA33FC7591CA63372CB
39,905,190 UART: Caliptra RT
39,905,901 UART: [state] CFI Enabled
40,198,471 UART: [rt] RT failed reset flow
40,199,657 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,692,296 ready_for_fw is high
3,692,685 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,702,885 >>> mbox cmd response: success
13,703,665 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,956,558 UART:
17,956,936 UART: Running Caliptra FMC ...
17,958,036 UART:
17,958,182 UART: [state] CFI Enabled
17,966,344 UART: [fht] FMC Alias Private Key: 7
19,722,583 UART: [art] Extend RT PCRs Done
19,723,807 UART: [art] Lock RT PCRs Done
19,725,731 UART: [art] Populate DV Done
19,730,814 UART: [fht] FMC Alias Private Key: 7
19,732,517 UART: [art] Derive CDI
19,733,327 UART: [art] Store in in slot 0x4
19,776,285 UART: [art] Derive Key Pair
19,777,291 UART: [art] Store priv key in slot 0x5
22,203,608 UART: [art] Derive Key Pair - Done
22,216,502 UART: [art] Signing Cert with AUTHO
22,217,836 UART: RITY.KEYID = 7
23,922,996 UART: [art] Erasing AUTHORITY.KEYID = 7
23,924,514 UART: [art] PUB.X = 8518A8DE8B791E00A633AEA85872919E63137112C76E89BE96FD17A36F12791F9CFCC567215BA092B129077646E6F99A
23,931,697 UART: [art] PUB.Y = 29DC7E5AA678D13A5DC3663B5391D958D2F699CFCE06D8EA5FF6674F3F4448A6E1C2578FFA49E01BD3FAC93C8E8A820D
23,938,975 UART: [art] SIG.R = C184C434898D95EBB6294FBA6DDBD4ABC5E9077E318929D80EBC91D991921D7303E3D66041C80F6967452906F0EC4B46
23,946,365 UART: [art] SIG.S = 32AD47E53345D203FA9786E04ED3CE834998D5E301507A788165D885CF1AC2E7F2791C73BC2364FC4824153E478BB258
24,924,876 UART: mbox::rt_entry...
24,925,847 UART: ____ _ _ _ ____ _____
24,927,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,929,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,931,747 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,933,710 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,935,955 UART: |_|
24,936,812 UART:
25,050,009 UART: [rt] Runtime listening for mailbox commands...
25,052,255 >>> mbox cmd response data (0 bytes)
27,104,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,158,429 >>> mbox cmd response: success
34,195,450 UART:
34,195,762 UART: Running Caliptra FMC ...
34,196,876 UART:
34,197,036 UART: [state] CFI Enabled
34,241,660 UART: [art] Extend RT PCRs Done
34,242,846 UART: [art] Lock RT PCRs Done
34,244,211 UART: [art] Populate DV Done
34,249,671 UART: [fht] FMC Alias Private Key: 7
34,251,157 UART: [art] Derive CDI
34,251,934 UART: [art] Store in in slot 0x4
34,294,531 UART: [art] Derive Key Pair
34,295,567 UART: [art] Store priv key in slot 0x5
36,722,612 UART: [art] Derive Key Pair - Done
36,735,345 UART: [art] Signing Cert with AUTHO
36,736,648 UART: RITY.KEYID = 7
38,442,064 UART: [art] Erasing AUTHORITY.KEYID = 7
38,443,575 UART: [art] PUB.X = AD3D638E137B8044A119252039D010255BE44FCB625DE3FE013CDB31A91284ECD5D2C8E61D6F472B07241FE83CA29547
38,450,865 UART: [art] PUB.Y = DEB62DF32C2EBB86D7BD58CCA674E9B6DBEC543D3758F9388383CD0273FE86A4FA1ED4D2B2A67D572600738EE76F8F98
38,458,108 UART: [art] SIG.R = 92C1E70B9E7F6A622E9EAC8712B199A59C2518986CDA93AA8186AD70813A48E7BE3E7A92B1F594CA9558272BE9DB6B16
38,465,503 UART: [art] SIG.S = E2FA94EFD2AD0939EC3085FB4C8610CABA95FB2AE150071592003C3383A0B884132CF4B8A054937E4696B66F6ED0AAA8
39,444,190 UART: Caliptra RT
39,444,897 UART: [state] CFI Enabled
39,734,246 UART: [rt] RT failed reset flow
39,735,614 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,056 UART:
192,426 UART: Running Caliptra ROM ...
193,571 UART:
193,719 UART: [state] CFI Enabled
261,626 UART: [state] LifecycleState = Unprovisioned
264,024 UART: [state] DebugLocked = No
265,847 UART: [state] WD Timer not started. Device not locked for debugging
271,302 UART: [kat] SHA2-256
461,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,932 UART: [kat] ++
472,575 UART: [kat] sha1
484,687 UART: [kat] SHA2-256
487,698 UART: [kat] SHA2-384
493,899 UART: [kat] SHA2-512-ACC
496,476 UART: [kat] ECC-384
2,952,932 UART: [kat] HMAC-384Kdf
2,972,550 UART: [kat] LMS
3,504,331 UART: [kat] --
3,509,179 UART: [cold-reset] ++
3,510,679 UART: [fht] FHT @ 0x50003400
3,522,380 UART: [idev] ++
3,523,018 UART: [idev] CDI.KEYID = 6
3,524,051 UART: [idev] SUBJECT.KEYID = 7
3,525,227 UART: [idev] UDS.KEYID = 0
3,526,153 ready_for_fw is high
3,526,348 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,625,584 UART: [idev] Erasing UDS.KEYID = 0
6,030,298 UART: [idev] Sha1 KeyId Algorithm
6,053,306 UART: [idev] --
6,059,570 UART: [ldev] ++
6,060,251 UART: [ldev] CDI.KEYID = 6
6,061,171 UART: [ldev] SUBJECT.KEYID = 5
6,062,335 UART: [ldev] AUTHORITY.KEYID = 7
6,063,569 UART: [ldev] FE.KEYID = 1
6,101,930 UART: [ldev] Erasing FE.KEYID = 1
8,610,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,472 UART: [ldev] --
10,413,335 UART: [fwproc] Wait for Commands...
10,415,806 UART: [fwproc] Recv command 0x46574c44
10,418,057 UART: [fwproc] Recv'd Img size: 78704 bytes
13,423,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,499,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,615,471 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,944,024 >>> mbox cmd response: success
13,944,532 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,947,548 UART: [afmc] ++
13,948,271 UART: [afmc] CDI.KEYID = 6
13,949,512 UART: [afmc] SUBJECT.KEYID = 7
13,950,920 UART: [afmc] AUTHORITY.KEYID = 5
16,491,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,215,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,217,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,232,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,247,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,262,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,286,656 UART: [afmc] --
18,290,521 UART: [cold-reset] --
18,294,447 UART: [state] Locking Datavault
18,300,558 UART: [state] Locking PCR0, PCR1 and PCR31
18,302,748 UART: [state] Locking ICCM
18,305,062 UART: [exit] Launching FMC @ 0x40000130
18,313,741 UART:
18,313,984 UART: Running Caliptra FMC ...
18,315,086 UART:
18,315,262 UART: [state] CFI Enabled
18,371,465 UART: [fht] FMC Alias Private Key: 7
20,135,207 UART: [art] Extend RT PCRs Done
20,136,436 UART: [art] Lock RT PCRs Done
20,138,140 UART: [art] Populate DV Done
20,143,441 UART: [fht] FMC Alias Private Key: 7
20,145,136 UART: [art] Derive CDI
20,145,947 UART: [art] Store in in slot 0x4
20,204,487 UART: [art] Derive Key Pair
20,205,522 UART: [art] Store priv key in slot 0x5
22,668,911 UART: [art] Derive Key Pair - Done
22,682,126 UART: [art] Signing Cert with AUTHO
22,683,429 UART: RITY.KEYID = 7
24,393,945 UART: [art] Erasing AUTHORITY.KEYID = 7
24,395,450 UART: [art] PUB.X = 4CAC10B96C44CCF95686E90108998E2C2C517F47BDFE035E6CC567105AD15DB64C366804FFA2DD96771B52729D965E96
24,402,746 UART: [art] PUB.Y = B489E5F770AFB48076625AF7B3BE0BDE5FEA4A1D47D4378C6C7975BC976C91B27BDFBF5CA1F2C98FBEBCCD03F9007CDA
24,409,988 UART: [art] SIG.R = 05F804DBEC59CC5D835CD12F5292B8A02CC778774F0D99131565A3A228E7DE69310C5A31EDD4D70FB3425961E89749FF
24,417,386 UART: [art] SIG.S = 22BF6DF3E2198BB9A93A9086D41CC9B98EA0FCE6FC6A9456452BE9F9A921A79F3482EE01E144BF0FAC641223A6973F47
25,395,789 UART: mbox::rt_entry...
25,396,752 UART: ____ _ _ _ ____ _____
25,398,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,400,747 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,402,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,404,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,406,542 UART: |_|
25,407,350 UART:
25,519,735 UART: [rt] Runtime listening for mailbox commands...
25,521,950 >>> mbox cmd response data (0 bytes)
27,578,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,722,844 UART:
27,723,211 UART: Running Caliptra ROM ...
27,724,248 UART:
27,724,402 UART: [state] CFI Enabled
27,782,119 UART: [state] LifecycleState = Unprovisioned
27,784,179 UART: [state] DebugLocked = No
27,785,432 UART: [state] WD Timer not started. Device not locked for debugging
27,789,774 UART: [kat] SHA2-256
27,979,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,990,418 UART: [kat] ++
27,990,875 UART: [kat] sha1
28,002,362 UART: [kat] SHA2-256
28,005,342 UART: [kat] SHA2-384
28,011,147 UART: [kat] SHA2-512-ACC
28,013,727 UART: [kat] ECC-384
30,463,958 UART: [kat] HMAC-384Kdf
30,489,638 UART: [kat] LMS
31,021,228 UART: [kat] --
31,025,702 UART: [update-reset] ++
34,486,394 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,489,340 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,097,576 >>> mbox cmd response: success
35,102,092 UART: [update-reset] Copying MAN_2 To MAN_1
35,136,867 UART: [update-reset Success] --
35,141,164 UART: [state] Locking Datavault
35,145,135 UART: [state] Locking PCR0, PCR1 and PCR31
35,147,280 UART: [state] Locking ICCM
35,148,732 UART: [exit] Launching FMC @ 0x40000130
35,157,402 UART:
35,157,637 UART: Running Caliptra FMC ...
35,158,881 UART:
35,159,046 UART: [state] CFI Enabled
35,256,941 UART: [art] Extend RT PCRs Done
35,258,135 UART: [art] Lock RT PCRs Done
35,259,481 UART: [art] Populate DV Done
35,264,993 UART: [fht] FMC Alias Private Key: 7
35,266,638 UART: [art] Derive CDI
35,267,448 UART: [art] Store in in slot 0x4
35,325,714 UART: [art] Derive Key Pair
35,326,757 UART: [art] Store priv key in slot 0x5
37,789,512 UART: [art] Derive Key Pair - Done
37,802,694 UART: [art] Signing Cert with AUTHO
37,804,000 UART: RITY.KEYID = 7
39,515,449 UART: [art] Erasing AUTHORITY.KEYID = 7
39,516,970 UART: [art] PUB.X = AB9AE937701E721D59A89C668B615E64E18FC3B3D3D3103599246C4DE1CEED97DFB94AFC6DF08DAEF36A72432D7A2E88
39,524,231 UART: [art] PUB.Y = 159F950D9176B56CD8F599F8AF67BE15B82B6BF4FD32C845765D2BFABE112270B697B64CA21E5E41B8A33E8C24EE24E4
39,531,524 UART: [art] SIG.R = CDB7EA561F95CF2825B51B6BC610FB7701CED4526778D4D436BC5509C33240F28CDBCDA6C02B26D09B13EB29DD19B6C7
39,539,084 UART: [art] SIG.S = 896BB96896F1B0DE2E3850173B08562AD6023C43DFDB7AB1CA88D857F1ADD88ED3E71DAF879E17C30E831902FC4185D8
40,517,237 UART: Caliptra RT
40,517,949 UART: [state] CFI Enabled
40,859,456 UART: [rt] RT failed reset flow
40,860,646 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,415,979 ready_for_fw is high
3,416,402 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,943,108 >>> mbox cmd response: success
13,943,792 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,236,510 UART:
18,236,900 UART: Running Caliptra FMC ...
18,238,064 UART:
18,238,231 UART: [state] CFI Enabled
18,303,344 UART: [fht] FMC Alias Private Key: 7
20,066,910 UART: [art] Extend RT PCRs Done
20,068,136 UART: [art] Lock RT PCRs Done
20,069,663 UART: [art] Populate DV Done
20,075,354 UART: [fht] FMC Alias Private Key: 7
20,076,948 UART: [art] Derive CDI
20,077,764 UART: [art] Store in in slot 0x4
20,135,705 UART: [art] Derive Key Pair
20,136,748 UART: [art] Store priv key in slot 0x5
22,599,849 UART: [art] Derive Key Pair - Done
22,613,020 UART: [art] Signing Cert with AUTHO
22,614,821 UART: RITY.KEYID = 7
24,325,701 UART: [art] Erasing AUTHORITY.KEYID = 7
24,327,187 UART: [art] PUB.X = 4249DEF676EED0ED441DD3E4BE018B94424D119CF2E7F0F5A98D42DCAB6A8704A0C608CC00D0966158260F34359BEADB
24,334,504 UART: [art] PUB.Y = 586AB2C21393B06F8305D6ABE7215926730E7AB674E7AB6B893151F784064810AAF55B5CB1F07F232B4CDF3FCDD0CA7F
24,341,743 UART: [art] SIG.R = 2AF48B03E7228B9BBE1283E45536D065700759FBEC0FBAF3CE221B59D98498477B7B57FAC2824862C5D1892A903738AA
24,349,078 UART: [art] SIG.S = 61DF83F7288999F89DE08C75BC01A04CA649602F22A39D2ABB2DB89A3F5745E9EBAD500D85330062E7390BE6E217C81A
25,327,266 UART: mbox::rt_entry...
25,328,234 UART: ____ _ _ _ ____ _____
25,330,220 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,332,227 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,334,154 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,336,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,338,260 UART: |_|
25,339,095 UART:
25,451,578 UART: [rt] Runtime listening for mailbox commands...
25,453,797 >>> mbox cmd response data (0 bytes)
27,521,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,347,407 >>> mbox cmd response: success
35,382,005 UART:
35,382,338 UART: Running Caliptra FMC ...
35,383,383 UART:
35,383,544 UART: [state] CFI Enabled
35,490,112 UART: [art] Extend RT PCRs Done
35,491,307 UART: [art] Lock RT PCRs Done
35,492,896 UART: [art] Populate DV Done
35,498,552 UART: [fht] FMC Alias Private Key: 7
35,500,182 UART: [art] Derive CDI
35,501,003 UART: [art] Store in in slot 0x4
35,559,025 UART: [art] Derive Key Pair
35,560,027 UART: [art] Store priv key in slot 0x5
38,023,118 UART: [art] Derive Key Pair - Done
38,036,306 UART: [art] Signing Cert with AUTHO
38,037,611 UART: RITY.KEYID = 7
39,748,938 UART: [art] Erasing AUTHORITY.KEYID = 7
39,750,445 UART: [art] PUB.X = DE936C8EF7863B83EE3F37CAB302E6E05421DAA78FF8060AC035671E775E331BD038C1CCFC5FD28C81E28E70F0B494D9
39,757,709 UART: [art] PUB.Y = 1AD88446526B1301D2A611A8C53D6B478CB1D733F38FC9226C8B884C838D1182FCE2D465252AD8BE7C40983B0875A1B8
39,764,960 UART: [art] SIG.R = 5746AB14F387CFB0854BF3DFAEEF126E485CCD51EF552573B99E89346515B7007A45BB93CDE6B4842E09C668A3A26BF8
39,772,372 UART: [art] SIG.S = E5127B75D3FD10DCF4E2E055157975301C7C76E468B3A9BF44EA04AADCF6B94937D73713A27ED03F9F578419ED983C87
40,750,849 UART: Caliptra RT
40,751,565 UART: [state] CFI Enabled
41,088,925 UART: [rt] RT failed reset flow
41,090,121 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,325 UART:
192,687 UART: Running Caliptra ROM ...
193,829 UART:
603,625 UART: [state] CFI Enabled
617,498 UART: [state] LifecycleState = Unprovisioned
619,870 UART: [state] DebugLocked = No
621,311 UART: [state] WD Timer not started. Device not locked for debugging
626,042 UART: [kat] SHA2-256
815,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,693 UART: [kat] ++
827,212 UART: [kat] sha1
838,430 UART: [kat] SHA2-256
841,504 UART: [kat] SHA2-384
847,839 UART: [kat] SHA2-512-ACC
850,409 UART: [kat] ECC-384
3,291,235 UART: [kat] HMAC-384Kdf
3,304,149 UART: [kat] LMS
3,835,970 UART: [kat] --
3,839,557 UART: [cold-reset] ++
3,842,052 UART: [fht] FHT @ 0x50003400
3,853,822 UART: [idev] ++
3,854,560 UART: [idev] CDI.KEYID = 6
3,855,439 UART: [idev] SUBJECT.KEYID = 7
3,856,616 UART: [idev] UDS.KEYID = 0
3,857,606 ready_for_fw is high
3,857,792 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,956,672 UART: [idev] Erasing UDS.KEYID = 0
6,335,049 UART: [idev] Sha1 KeyId Algorithm
6,357,960 UART: [idev] --
6,361,784 UART: [ldev] ++
6,362,452 UART: [ldev] CDI.KEYID = 6
6,363,382 UART: [ldev] SUBJECT.KEYID = 5
6,364,580 UART: [ldev] AUTHORITY.KEYID = 7
6,365,800 UART: [ldev] FE.KEYID = 1
6,377,618 UART: [ldev] Erasing FE.KEYID = 1
8,857,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,003 UART: [ldev] --
10,650,017 UART: [fwproc] Wait for Commands...
10,652,694 UART: [fwproc] Recv command 0x46574c44
10,654,984 UART: [fwproc] Recv'd Img size: 78704 bytes
13,660,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,738,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,854,945 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,183,893 >>> mbox cmd response: success
14,184,390 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
14,187,231 UART: [afmc] ++
14,187,940 UART: [afmc] CDI.KEYID = 6
14,189,043 UART: [afmc] SUBJECT.KEYID = 7
14,190,582 UART: [afmc] AUTHORITY.KEYID = 5
16,692,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,412,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,414,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,484,293 UART: [afmc] --
18,487,335 UART: [cold-reset] --
18,490,485 UART: [state] Locking Datavault
18,497,138 UART: [state] Locking PCR0, PCR1 and PCR31
18,499,376 UART: [state] Locking ICCM
18,502,149 UART: [exit] Launching FMC @ 0x40000130
18,510,812 UART:
18,511,056 UART: Running Caliptra FMC ...
18,512,076 UART:
18,512,217 UART: [state] CFI Enabled
18,520,203 UART: [fht] FMC Alias Private Key: 7
20,277,443 UART: [art] Extend RT PCRs Done
20,278,667 UART: [art] Lock RT PCRs Done
20,280,479 UART: [art] Populate DV Done
20,285,826 UART: [fht] FMC Alias Private Key: 7
20,287,461 UART: [art] Derive CDI
20,288,191 UART: [art] Store in in slot 0x4
20,330,935 UART: [art] Derive Key Pair
20,331,928 UART: [art] Store priv key in slot 0x5
22,758,600 UART: [art] Derive Key Pair - Done
22,771,265 UART: [art] Signing Cert with AUTHO
22,772,558 UART: RITY.KEYID = 7
24,478,063 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,595 UART: [art] PUB.X = 8BC5BAA3C048E93F27F05CAD25ECC6DC53EB88FDB5258C82BA862FF22443C68ADFAEE2246191E56A6A836F72FAA3C04E
24,486,891 UART: [art] PUB.Y = 04984DE0E855D9D8DE37294DEEBAD59701C0EF5337FA4CB17D2AA9A9E29E50D28C4291B52173A880FCB8422F46B0E3EC
24,494,159 UART: [art] SIG.R = DFEF5342177BBF6D35181098E4C020FA5A0423BF54BBD2080C81A77A9C5B7ADE5B0452CCC159EDD14134B2BC8A46312D
24,501,547 UART: [art] SIG.S = 0F35208C703967047CBFC0B6C73FB6470EBA01DBA39AF8E993D3B491113061534D17A49510A16A49179C620E8054877A
25,480,114 UART: mbox::rt_entry...
25,481,064 UART: ____ _ _ _ ____ _____
25,482,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,484,986 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,486,829 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,488,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,490,665 UART: |_|
25,491,460 UART:
25,605,547 UART: [rt] Runtime listening for mailbox commands...
25,607,707 >>> mbox cmd response data (0 bytes)
27,660,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,805,312 UART:
27,805,664 UART: Running Caliptra ROM ...
27,806,745 UART:
27,806,956 UART: [state] CFI Enabled
27,819,935 UART: [state] LifecycleState = Unprovisioned
27,821,826 UART: [state] DebugLocked = No
27,824,009 UART: [state] WD Timer not started. Device not locked for debugging
27,828,506 UART: [kat] SHA2-256
28,018,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,029,170 UART: [kat] ++
28,029,775 UART: [kat] sha1
28,040,684 UART: [kat] SHA2-256
28,043,711 UART: [kat] SHA2-384
28,049,915 UART: [kat] SHA2-512-ACC
28,052,486 UART: [kat] ECC-384
30,493,908 UART: [kat] HMAC-384Kdf
30,505,715 UART: [kat] LMS
31,037,319 UART: [kat] --
31,040,984 UART: [update-reset] ++
34,506,127 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,510,364 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,118,653 >>> mbox cmd response: success
35,123,247 UART: [update-reset] Copying MAN_2 To MAN_1
35,156,856 UART: [update-reset Success] --
35,160,452 UART: [state] Locking Datavault
35,163,828 UART: [state] Locking PCR0, PCR1 and PCR31
35,166,030 UART: [state] Locking ICCM
35,168,130 UART: [exit] Launching FMC @ 0x40000130
35,176,754 UART:
35,176,980 UART: Running Caliptra FMC ...
35,178,240 UART:
35,178,395 UART: [state] CFI Enabled
35,221,742 UART: [art] Extend RT PCRs Done
35,222,933 UART: [art] Lock RT PCRs Done
35,224,175 UART: [art] Populate DV Done
35,229,578 UART: [fht] FMC Alias Private Key: 7
35,231,222 UART: [art] Derive CDI
35,232,028 UART: [art] Store in in slot 0x4
35,274,885 UART: [art] Derive Key Pair
35,275,898 UART: [art] Store priv key in slot 0x5
37,702,514 UART: [art] Derive Key Pair - Done
37,715,567 UART: [art] Signing Cert with AUTHO
37,716,861 UART: RITY.KEYID = 7
39,422,206 UART: [art] Erasing AUTHORITY.KEYID = 7
39,423,724 UART: [art] PUB.X = ECF5C0A935DA8D0EC5DA68EDF259EA39F507B876C2CAA313B20A1FB3036FF398B3AD846B00317660910830B69750BF5A
39,430,951 UART: [art] PUB.Y = 9B3BFAB1F435BCDB5EF194DACEDF7228629BD614987628890256D2F88FC0643A7FBB76EB08A4D89621407C2652F94E4A
39,438,210 UART: [art] SIG.R = A380EC0495F97C4DB5588066E0A13CE2507B17C6EBC22F49D0FA6109DA11C0E341DB93A6A367C32090AA0D5ED1823480
39,445,638 UART: [art] SIG.S = 2DD0C1EBE725505DC76DE722E809CDCF2B02242403CB6DEA144CC1EAA5004EF126A28F10342ADD60FFBC48E1059EB2A0
40,424,280 UART: Caliptra RT
40,425,002 UART: [state] CFI Enabled
40,711,396 UART: [rt] RT failed reset flow
40,712,585 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,750,613 ready_for_fw is high
3,751,227 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,183,791 >>> mbox cmd response: success
14,184,396 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,437,849 UART:
18,438,232 UART: Running Caliptra FMC ...
18,439,364 UART:
18,439,533 UART: [state] CFI Enabled
18,447,484 UART: [fht] FMC Alias Private Key: 7
20,204,342 UART: [art] Extend RT PCRs Done
20,205,571 UART: [art] Lock RT PCRs Done
20,207,302 UART: [art] Populate DV Done
20,212,716 UART: [fht] FMC Alias Private Key: 7
20,214,359 UART: [art] Derive CDI
20,215,171 UART: [art] Store in in slot 0x4
20,258,038 UART: [art] Derive Key Pair
20,259,086 UART: [art] Store priv key in slot 0x5
22,684,905 UART: [art] Derive Key Pair - Done
22,697,421 UART: [art] Signing Cert with AUTHO
22,698,725 UART: RITY.KEYID = 7
24,403,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,676 UART: [art] PUB.X = FDD198A39EBD4D393E2F78766FFE89ED533D39D67AB4AD4037622FDAF4F3AA78484A4F2E8D73770D4A352595F0B77B80
24,412,643 UART: [art] PUB.Y = 7BD3E2FE05550998ED0E8A72270BABB79A0892C8A217F9793BE7453A9C7A1E9C48EE3CB2980985DFFCCC839D3D1FAEA7
24,419,909 UART: [art] SIG.R = 8AF9EC78DDA7CA12595F614C788ED26B869DCF24D57CC06185A14120A2172E517C40BF34711D6E77D8FECEE4E7294346
24,427,354 UART: [art] SIG.S = 23812B2AF986C5F776937074CB8A3EBB4F91692DC0D18E2C3E271E295565F39F91F9FED5C08B19E9524F59F24BAFA08F
25,405,783 UART: mbox::rt_entry...
25,406,733 UART: ____ _ _ _ ____ _____
25,408,713 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,410,716 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,412,640 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,414,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,416,627 UART: |_|
25,417,434 UART:
25,530,222 UART: [rt] Runtime listening for mailbox commands...
25,532,477 >>> mbox cmd response data (0 bytes)
27,588,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,320,990 >>> mbox cmd response: success
35,356,427 UART:
35,356,759 UART: Running Caliptra FMC ...
35,357,882 UART:
35,358,043 UART: [state] CFI Enabled
35,402,598 UART: [art] Extend RT PCRs Done
35,403,737 UART: [art] Lock RT PCRs Done
35,405,346 UART: [art] Populate DV Done
35,410,803 UART: [fht] FMC Alias Private Key: 7
35,412,336 UART: [art] Derive CDI
35,413,067 UART: [art] Store in in slot 0x4
35,456,043 UART: [art] Derive Key Pair
35,457,085 UART: [art] Store priv key in slot 0x5
37,883,487 UART: [art] Derive Key Pair - Done
37,896,543 UART: [art] Signing Cert with AUTHO
37,897,867 UART: RITY.KEYID = 7
39,602,970 UART: [art] Erasing AUTHORITY.KEYID = 7
39,604,478 UART: [art] PUB.X = D1706FDD3FEFAE11A1F59A8D11EFB7D3F8E960BAF3933F2908966C0D5B31296E5C719EBC1368DB04E1413D6C2F85174D
39,611,766 UART: [art] PUB.Y = 85241B01B3D7464B63B695671AFF5EA3C24330FAD10D8BED44DD67FF696F702984EDB1F43093C2FA17D57A355F4F2B27
39,619,027 UART: [art] SIG.R = 44C71184A8F18FA64DE92AD78215DC295359B692BB5AF768DC3EF728242F061DAD789EC6E55E092DF2A88E41EC3B3990
39,626,398 UART: [art] SIG.S = 99A4406C21D11E7752D1DCB7E3FED86B8398163B0704746DDBE3C87FDAA219B69D91ABBE4ECB7F92619FE9726B7B60D4
40,605,549 UART: Caliptra RT
40,606,262 UART: [state] CFI Enabled
40,893,667 UART: [rt] RT failed reset flow
40,894,857 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,723 UART: [kat] SHA2-256
881,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,769 UART: [kat] ++
885,921 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,426 UART: [kat] HMAC-384Kdf
907,158 UART: [kat] LMS
1,475,354 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,477,075 UART: [fht] Storing FHT @ 0x50003400
1,480,016 UART: [idev] ++
1,480,184 UART: [idev] CDI.KEYID = 6
1,480,544 UART: [idev] SUBJECT.KEYID = 7
1,480,968 UART: [idev] UDS.KEYID = 0
1,481,313 ready_for_fw is high
1,481,313 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,168 UART: [idev] Erasing UDS.KEYID = 0
1,505,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,472 UART: [idev] --
1,515,461 UART: [ldev] ++
1,515,629 UART: [ldev] CDI.KEYID = 6
1,515,992 UART: [ldev] SUBJECT.KEYID = 5
1,516,418 UART: [ldev] AUTHORITY.KEYID = 7
1,516,881 UART: [ldev] FE.KEYID = 1
1,522,183 UART: [ldev] Erasing FE.KEYID = 1
1,547,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,730 UART: [ldev] --
1,586,991 UART: [fwproc] Waiting for Commands...
1,587,842 UART: [fwproc] Received command 0x46574c44
1,588,633 UART: [fwproc] Received Image of size 78704 bytes
2,479,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,364 >>> mbox cmd response: success
2,618,364 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,619,534 UART: [afmc] ++
2,619,702 UART: [afmc] CDI.KEYID = 6
2,620,064 UART: [afmc] SUBJECT.KEYID = 7
2,620,489 UART: [afmc] AUTHORITY.KEYID = 5
2,656,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,424 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,673,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,817 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,507 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,284 UART: [afmc] --
2,699,208 UART: [cold-reset] --
2,700,096 UART: [state] Locking Datavault
2,701,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,009 UART: [state] Locking ICCM
2,702,433 UART: [exit] Launching FMC @ 0x40000130
2,707,762 UART:
2,707,778 UART: Running Caliptra FMC ...
2,708,186 UART:
2,708,240 UART: [state] CFI Enabled
2,718,423 UART: [fht] FMC Alias Private Key: 7
2,826,728 UART: [art] Extend RT PCRs Done
2,827,156 UART: [art] Lock RT PCRs Done
2,828,830 UART: [art] Populate DV Done
2,837,203 UART: [fht] FMC Alias Private Key: 7
2,838,319 UART: [art] Derive CDI
2,838,599 UART: [art] Store in in slot 0x4
2,924,170 UART: [art] Derive Key Pair
2,924,530 UART: [art] Store priv key in slot 0x5
2,937,564 UART: [art] Derive Key Pair - Done
2,952,397 UART: [art] Signing Cert with AUTHO
2,952,877 UART: RITY.KEYID = 7
2,967,813 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,578 UART: [art] PUB.X = 2447BCC379251C3283DF0F5E33FBA52CC5132BDB1145B7293CC8F93DAA3321183C122512E5ACAEF96F87CE73219AD63A
2,975,355 UART: [art] PUB.Y = 2AB02F66297614A4817160470F017D34021F66E4319C039C8D1F9C2BD48F1D616B167E14BAFB50E7E653B0A5DBDBCC1A
2,982,299 UART: [art] SIG.R = F83BB6EE1FBEECC71D82509A03C6D383CC6C02DE3ACCFD6AC42221229B24C91DAEACBE203FA29C1806A09E9044D9B602
2,989,081 UART: [art] SIG.S = C4E4FA367FAF9243077A4A3C8CE0D69075DDC143A44FC1DA7AE21484759B9B9F1E6C9D0B75D16790B74889D7012A098E
3,013,436 UART: mbox::rt_entry...
3,013,808 UART: ____ _ _ _ ____ _____
3,014,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,160 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,696 UART: |_|
3,018,008 UART:
3,123,749 UART: [rt] Runtime listening for mailbox commands...
3,124,900 >>> mbox cmd response data (0 bytes)
3,124,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,125,016 UART:
3,125,032 UART: Running Caliptra ROM ...
3,125,440 UART:
3,125,494 UART: [state] CFI Enabled
3,128,132 UART: [state] LifecycleState = Unprovisioned
3,128,787 UART: [state] DebugLocked = No
3,129,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,131,240 UART: [kat] SHA2-256
3,925,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,929,286 UART: [kat] ++
3,929,438 UART: [kat] sha1
3,933,594 UART: [kat] SHA2-256
3,935,532 UART: [kat] SHA2-384
3,938,483 UART: [kat] SHA2-512-ACC
3,940,383 UART: [kat] ECC-384
3,945,910 UART: [kat] HMAC-384Kdf
3,950,440 UART: [kat] LMS
4,518,636 UART: [kat] --
4,519,353 UART: [update-reset] ++
5,855,904 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,857,122 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,007,172 >>> mbox cmd response: success
6,007,479 UART: [update-reset] Copying MAN_2 To MAN_1
6,015,493 UART: [update-reset Success] --
6,016,398 UART: [state] Locking Datavault
6,017,262 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,866 UART: [state] Locking ICCM
6,018,348 UART: [exit] Launching FMC @ 0x40000130
6,023,677 UART:
6,023,693 UART: Running Caliptra FMC ...
6,024,101 UART:
6,024,155 UART: [state] CFI Enabled
6,113,518 UART: [art] Extend RT PCRs Done
6,113,946 UART: [art] Lock RT PCRs Done
6,115,323 UART: [art] Populate DV Done
6,123,624 UART: [fht] FMC Alias Private Key: 7
6,124,676 UART: [art] Derive CDI
6,124,956 UART: [art] Store in in slot 0x4
6,210,753 UART: [art] Derive Key Pair
6,211,113 UART: [art] Store priv key in slot 0x5
6,224,619 UART: [art] Derive Key Pair - Done
6,239,580 UART: [art] Signing Cert with AUTHO
6,240,060 UART: RITY.KEYID = 7
6,255,312 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,077 UART: [art] PUB.X = C5B51E722FA002CDAC8766DAA4CEC2A79B77A7E6CA6F65B9AE662648AAD81CC3865BD7D13173DB819753DF924CC93F35
6,262,862 UART: [art] PUB.Y = 4722C0C78B98C627A26B5735AD83B66BF7D48D005F600FC3EEA9AEEFAF7B8CBF17A401700490885B14DE13C82FF3007E
6,269,771 UART: [art] SIG.R = F38D12816C9E6C3B7099DFA803BF1D191E81D7E5BCC10F735833639DACCD805FE3FAF1686EB5B4D590227C7CDA1FBB24
6,276,553 UART: [art] SIG.S = 3F33E959D98DA2A109F63AA824C458E817F749E55DB96D8266F923C0B887301B26979EBBFC567E49FD4F8F363C8F0C22
6,299,812 UART: Caliptra RT
6,300,065 UART: [state] CFI Enabled
6,582,939 UART: [rt] RT failed reset flow
6,583,370 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,643 ready_for_fw is high
1,362,643 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,346 >>> mbox cmd response: success
2,468,346 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,529,584 UART:
2,529,600 UART: Running Caliptra FMC ...
2,530,008 UART:
2,530,062 UART: [state] CFI Enabled
2,540,511 UART: [fht] FMC Alias Private Key: 7
2,648,560 UART: [art] Extend RT PCRs Done
2,648,988 UART: [art] Lock RT PCRs Done
2,650,684 UART: [art] Populate DV Done
2,658,637 UART: [fht] FMC Alias Private Key: 7
2,659,787 UART: [art] Derive CDI
2,660,067 UART: [art] Store in in slot 0x4
2,745,430 UART: [art] Derive Key Pair
2,745,790 UART: [art] Store priv key in slot 0x5
2,759,090 UART: [art] Derive Key Pair - Done
2,774,212 UART: [art] Signing Cert with AUTHO
2,774,692 UART: RITY.KEYID = 7
2,789,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,253 UART: [art] PUB.X = 877A5E8B04DA2F5583A96DBAB20E33D959D0380A07BBF6F730294CE51F8AB4D3383455EB54E5483B0A96F92006834BE6
2,797,009 UART: [art] PUB.Y = A8C6B368DB708EF82573D770CB02A1D2B27A40E75F41C4430B0BE580DF6E6E74619141203BEC864E6521FDF555885C6C
2,803,954 UART: [art] SIG.R = 9122652F60C9E384A1A325357B3846E959B170963E6F0C3CBCBB280AA8CD4DB4BC49810F7803674353652D5EEBD55EDF
2,810,716 UART: [art] SIG.S = A40B869F1164DF24EC642455B5F6F8AC891BD709EA1969626EEBDF9E432565F7725B942142D123C092F7C1B02B92E7FD
2,834,361 UART: mbox::rt_entry...
2,834,733 UART: ____ _ _ _ ____ _____
2,835,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,085 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,621 UART: |_|
2,838,933 UART:
2,945,958 UART: [rt] Runtime listening for mailbox commands...
2,947,109 >>> mbox cmd response data (0 bytes)
2,947,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,432 >>> mbox cmd response: success
5,723,875 UART:
5,723,891 UART: Running Caliptra FMC ...
5,724,299 UART:
5,724,353 UART: [state] CFI Enabled
5,813,512 UART: [art] Extend RT PCRs Done
5,813,940 UART: [art] Lock RT PCRs Done
5,815,119 UART: [art] Populate DV Done
5,823,512 UART: [fht] FMC Alias Private Key: 7
5,824,606 UART: [art] Derive CDI
5,824,886 UART: [art] Store in in slot 0x4
5,910,881 UART: [art] Derive Key Pair
5,911,241 UART: [art] Store priv key in slot 0x5
5,924,417 UART: [art] Derive Key Pair - Done
5,939,109 UART: [art] Signing Cert with AUTHO
5,939,589 UART: RITY.KEYID = 7
5,954,737 UART: [art] Erasing AUTHORITY.KEYID = 7
5,955,502 UART: [art] PUB.X = 3CE3BCE56435819AB48DEC8EBADF6290838876F3FABAF7DF3FE0E3ADC51DF24E5945A2FAA843901189921B7F2B2C4B32
5,962,292 UART: [art] PUB.Y = B9C9286B9F76104448F5E479652A2B11B334F3E2A83C69539606FCF725F30FA18346A87C5255097B6BCE6F5D5D7C79FF
5,969,233 UART: [art] SIG.R = E5C129ECB498B234A4F13ED103195C696D497858B11E3C696D24C3190A22AA1C58FC6F91535508D79DF5EF805BD80725
5,975,991 UART: [art] SIG.S = EFDA5A7A5FD740C4C82256720820D7DFF13A7638E2A60AD6D7E0CC5E02D1A594ACD30F2A18E4896B8716D59631158E25
5,999,674 UART: Caliptra RT
5,999,927 UART: [state] CFI Enabled
6,283,476 UART: [rt] RT failed reset flow
6,283,907 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,756 UART: [kat] SHA2-256
881,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,802 UART: [kat] ++
885,954 UART: [kat] sha1
890,264 UART: [kat] SHA2-256
892,202 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,387 UART: [kat] HMAC-384Kdf
906,983 UART: [kat] LMS
1,475,179 UART: [kat] --
1,476,076 UART: [cold-reset] ++
1,476,480 UART: [fht] Storing FHT @ 0x50003400
1,479,195 UART: [idev] ++
1,479,363 UART: [idev] CDI.KEYID = 6
1,479,723 UART: [idev] SUBJECT.KEYID = 7
1,480,147 UART: [idev] UDS.KEYID = 0
1,480,492 ready_for_fw is high
1,480,492 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,299 UART: [idev] Erasing UDS.KEYID = 0
1,505,273 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,875 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,446 UART: [ldev] Erasing FE.KEYID = 1
1,547,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,534 UART: [fwproc] Waiting for Commands...
1,587,337 UART: [fwproc] Received command 0x46574c44
1,588,128 UART: [fwproc] Received Image of size 78704 bytes
2,478,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,615 >>> mbox cmd response: success
2,618,615 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,619,835 UART: [afmc] ++
2,620,003 UART: [afmc] CDI.KEYID = 6
2,620,365 UART: [afmc] SUBJECT.KEYID = 7
2,620,790 UART: [afmc] AUTHORITY.KEYID = 5
2,656,021 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,981 UART: [afmc] --
2,699,025 UART: [cold-reset] --
2,699,877 UART: [state] Locking Datavault
2,701,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,680 UART: [state] Locking ICCM
2,702,306 UART: [exit] Launching FMC @ 0x40000130
2,707,635 UART:
2,707,651 UART: Running Caliptra FMC ...
2,708,059 UART:
2,708,202 UART: [state] CFI Enabled
2,718,859 UART: [fht] FMC Alias Private Key: 7
2,827,166 UART: [art] Extend RT PCRs Done
2,827,594 UART: [art] Lock RT PCRs Done
2,829,024 UART: [art] Populate DV Done
2,837,203 UART: [fht] FMC Alias Private Key: 7
2,838,287 UART: [art] Derive CDI
2,838,567 UART: [art] Store in in slot 0x4
2,924,396 UART: [art] Derive Key Pair
2,924,756 UART: [art] Store priv key in slot 0x5
2,938,324 UART: [art] Derive Key Pair - Done
2,952,818 UART: [art] Signing Cert with AUTHO
2,953,298 UART: RITY.KEYID = 7
2,968,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,229 UART: [art] PUB.X = 2965B8A589B5CFD9462B277E514CED1A3A32C1C7B94EBD6C0293FC68554C01206CC96EB69D55F71826D54D98ECFFF553
2,976,003 UART: [art] PUB.Y = 5D2FBF8A0DF1D05C00BC960671D6631B77D824B96B18A982301BE4923494E4D850C553997DDA7D5D0EEA7198FFAB390C
2,982,927 UART: [art] SIG.R = 718554E0A26E2229CE483392372587C2B65FE39B07A0A1EBFB99280EA78FEDE562D0899F408042A4C740098AFEB12BCF
2,989,692 UART: [art] SIG.S = B75035E3E576DBF5C26060610BB8AD5C74EC063C56EEF4DBCA1C534133339F8AFD3472418DFF25D1A83C01F4EC2880DD
3,013,542 UART: mbox::rt_entry...
3,013,914 UART: ____ _ _ _ ____ _____
3,014,698 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,498 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,266 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,802 UART: |_|
3,018,114 UART:
3,125,136 UART: [rt] Runtime listening for mailbox commands...
3,126,287 >>> mbox cmd response data (0 bytes)
3,126,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,126,403 UART:
3,126,419 UART: Running Caliptra ROM ...
3,126,827 UART:
3,126,968 UART: [state] CFI Enabled
3,129,614 UART: [state] LifecycleState = Unprovisioned
3,130,269 UART: [state] DebugLocked = No
3,130,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,132,546 UART: [kat] SHA2-256
3,926,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,930,592 UART: [kat] ++
3,930,744 UART: [kat] sha1
3,935,010 UART: [kat] SHA2-256
3,936,948 UART: [kat] SHA2-384
3,939,923 UART: [kat] SHA2-512-ACC
3,941,823 UART: [kat] ECC-384
3,947,492 UART: [kat] HMAC-384Kdf
3,951,938 UART: [kat] LMS
4,520,134 UART: [kat] --
4,521,045 UART: [update-reset] ++
5,857,704 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,858,808 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,008,858 >>> mbox cmd response: success
6,009,021 UART: [update-reset] Copying MAN_2 To MAN_1
6,017,035 UART: [update-reset Success] --
6,018,030 UART: [state] Locking Datavault
6,018,702 UART: [state] Locking PCR0, PCR1 and PCR31
6,019,306 UART: [state] Locking ICCM
6,019,882 UART: [exit] Launching FMC @ 0x40000130
6,025,211 UART:
6,025,227 UART: Running Caliptra FMC ...
6,025,635 UART:
6,025,778 UART: [state] CFI Enabled
6,115,133 UART: [art] Extend RT PCRs Done
6,115,561 UART: [art] Lock RT PCRs Done
6,116,894 UART: [art] Populate DV Done
6,125,267 UART: [fht] FMC Alias Private Key: 7
6,126,333 UART: [art] Derive CDI
6,126,613 UART: [art] Store in in slot 0x4
6,212,084 UART: [art] Derive Key Pair
6,212,444 UART: [art] Store priv key in slot 0x5
6,226,130 UART: [art] Derive Key Pair - Done
6,240,907 UART: [art] Signing Cert with AUTHO
6,241,387 UART: RITY.KEYID = 7
6,256,497 UART: [art] Erasing AUTHORITY.KEYID = 7
6,257,262 UART: [art] PUB.X = 1D718FEF697D3B3571E717E20EC39E8142589FE6FAAA91B6D6FCE64438C33396D0B132D5ED31EE5A059718B16466DA8A
6,264,034 UART: [art] PUB.Y = 21B67C27CBA19C4F332488802B0E7F530CC2A1AE91573B00DFA6F4F38D09895375EB5DD635E368311588024C6306F3CE
6,270,947 UART: [art] SIG.R = 98167BDC93F8C06724AB50073E862FF9894D6FF48015DA44027D2ADF63C8980483DDDCE714116B96B47D1BAC3304E88C
6,277,709 UART: [art] SIG.S = A17AAC4F8E46383A56E58318933FFFBE85750E788C652AFA7772AC8F62B5C6795E20BF67577AB0EFC2B2EFBDC5AC9C18
6,301,173 UART: Caliptra RT
6,301,518 UART: [state] CFI Enabled
6,585,265 UART: [rt] RT failed reset flow
6,585,696 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,966 ready_for_fw is high
1,362,966 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,443 >>> mbox cmd response: success
2,466,443 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,528,169 UART:
2,528,185 UART: Running Caliptra FMC ...
2,528,593 UART:
2,528,736 UART: [state] CFI Enabled
2,539,359 UART: [fht] FMC Alias Private Key: 7
2,646,936 UART: [art] Extend RT PCRs Done
2,647,364 UART: [art] Lock RT PCRs Done
2,648,784 UART: [art] Populate DV Done
2,657,279 UART: [fht] FMC Alias Private Key: 7
2,658,343 UART: [art] Derive CDI
2,658,623 UART: [art] Store in in slot 0x4
2,743,916 UART: [art] Derive Key Pair
2,744,276 UART: [art] Store priv key in slot 0x5
2,757,726 UART: [art] Derive Key Pair - Done
2,772,565 UART: [art] Signing Cert with AUTHO
2,773,045 UART: RITY.KEYID = 7
2,788,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,888 UART: [art] PUB.X = DC21F7DC425EFD0D8D57EAC2D0AF4B2F458EB946E8596E504351A84FDB9F121DBDB3FC6B37500C52DB1B888CF0E067A2
2,795,674 UART: [art] PUB.Y = 0FC7FD8583CEEE511637959D660D2D2C60337CA8D119347A4503F36E889D26413B0A722C11FFC46B74648CFB2D75533D
2,802,612 UART: [art] SIG.R = EF6EEABEC17AD8B0C0857A7626AF29C3F853C2C085D8415AC82501D840741DF63055346B663837AB36FAB2AC1FA6B00E
2,809,388 UART: [art] SIG.S = A282E4B72C822B1EF6F7B25E05635385ECC4156976EEA8E4F0C4DF7247B53DBB56A151BA6272637894267442409CC801
2,833,175 UART: mbox::rt_entry...
2,833,547 UART: ____ _ _ _ ____ _____
2,834,331 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,131 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,899 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,667 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,435 UART: |_|
2,837,747 UART:
2,944,280 UART: [rt] Runtime listening for mailbox commands...
2,945,431 >>> mbox cmd response data (0 bytes)
2,945,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,708,118 >>> mbox cmd response: success
5,721,509 UART:
5,721,525 UART: Running Caliptra FMC ...
5,721,933 UART:
5,722,076 UART: [state] CFI Enabled
5,811,167 UART: [art] Extend RT PCRs Done
5,811,595 UART: [art] Lock RT PCRs Done
5,812,924 UART: [art] Populate DV Done
5,821,301 UART: [fht] FMC Alias Private Key: 7
5,822,397 UART: [art] Derive CDI
5,822,677 UART: [art] Store in in slot 0x4
5,908,088 UART: [art] Derive Key Pair
5,908,448 UART: [art] Store priv key in slot 0x5
5,921,872 UART: [art] Derive Key Pair - Done
5,936,460 UART: [art] Signing Cert with AUTHO
5,936,940 UART: RITY.KEYID = 7
5,952,408 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,173 UART: [art] PUB.X = 3BB063BBAC70DBD37E47DBB0C857D0DA2F52E75CEC845A6B821B895101CF43D7C70D9BD9B0DD39675DC4683F4E7F950C
5,959,954 UART: [art] PUB.Y = 8AA80596B255ECF860F1910B4DDDB96BFEF2B0AE556BDD0F4AE75D6DC8EE2173D70E288CBA767380E3792BA53FC6156A
5,966,912 UART: [art] SIG.R = F6D351B31DA88D379849B2B0E000BBA0B8335D8C7B638AB1FDF19E884E7E66D9F9FFF411600BC186ED5FC366EE55F41F
5,973,673 UART: [art] SIG.S = C4CE81CFB34310C352E32A1F46BCC2D0584EF224591C9865A9C4F15E14DD06262FABE00F679EB2588C6D86D3EEF826EC
5,997,014 UART: Caliptra RT
5,997,359 UART: [state] CFI Enabled
6,277,294 UART: [rt] RT failed reset flow
6,277,725 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,462 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 ready_for_fw is high
1,176,457 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,201,095 UART: [idev] Sha1 KeyId Algorithm
1,209,679 UART: [idev] --
1,210,801 UART: [ldev] ++
1,210,969 UART: [ldev] CDI.KEYID = 6
1,211,332 UART: [ldev] SUBJECT.KEYID = 5
1,211,758 UART: [ldev] AUTHORITY.KEYID = 7
1,212,221 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,244,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,321 UART: [ldev] --
1,283,682 UART: [fwproc] Wait for Commands...
1,284,348 UART: [fwproc] Recv command 0x46574c44
1,285,076 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,802 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,069 >>> mbox cmd response: success
2,315,069 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,316,091 UART: [afmc] ++
2,316,259 UART: [afmc] CDI.KEYID = 6
2,316,621 UART: [afmc] SUBJECT.KEYID = 7
2,317,046 UART: [afmc] AUTHORITY.KEYID = 5
2,352,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,726 UART: [afmc] --
2,395,692 UART: [cold-reset] --
2,396,426 UART: [state] Locking Datavault
2,397,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,367 UART: [state] Locking ICCM
2,398,989 UART: [exit] Launching FMC @ 0x40000130
2,404,318 UART:
2,404,334 UART: Running Caliptra FMC ...
2,404,742 UART:
2,404,796 UART: [state] CFI Enabled
2,415,425 UART: [fht] FMC Alias Private Key: 7
2,523,798 UART: [art] Extend RT PCRs Done
2,524,226 UART: [art] Lock RT PCRs Done
2,525,540 UART: [art] Populate DV Done
2,533,717 UART: [fht] FMC Alias Private Key: 7
2,534,783 UART: [art] Derive CDI
2,535,063 UART: [art] Store in in slot 0x4
2,620,514 UART: [art] Derive Key Pair
2,620,874 UART: [art] Store priv key in slot 0x5
2,633,928 UART: [art] Derive Key Pair - Done
2,648,903 UART: [art] Signing Cert with AUTHO
2,649,383 UART: RITY.KEYID = 7
2,664,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,230 UART: [art] PUB.X = 228189EF119705628843588F5C26B667C27C2871D119B81BAE90BE294D3382BC8061211A67942479436448E8A6CD7F54
2,671,981 UART: [art] PUB.Y = 40CA620647282ED95956227662E5E11C946FA5A775DA6D1AA3E33B8D70D5D632D89EDD47A5F5073569B2B245AAB6BCE8
2,678,931 UART: [art] SIG.R = 182E4216CA75AF4B785F49345A35BE730DB852C94A60639A43D1DB0FB538E0451CAB06AA49F875D551E125A1E8C26E1B
2,685,698 UART: [art] SIG.S = 412D29F25F9FAB5ED31414ECD619A5FB85B0A3DD5A8548A5AC70015E72A9B476B6A52C351BD6CBD5179FDC99454F66CF
2,709,592 UART: mbox::rt_entry...
2,709,964 UART: ____ _ _ _ ____ _____
2,710,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,852 UART: |_|
2,714,164 UART:
2,821,570 UART: [rt] Runtime listening for mailbox commands...
2,822,721 >>> mbox cmd response data (0 bytes)
2,822,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,822,834 UART:
2,822,850 UART: Running Caliptra ROM ...
2,823,258 UART:
2,823,313 UART: [state] CFI Enabled
2,825,643 UART: [state] LifecycleState = Unprovisioned
2,826,298 UART: [state] DebugLocked = No
2,826,842 UART: [state] WD Timer not started. Device not locked for debugging
2,828,064 UART: [kat] SHA2-256
3,633,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,637,839 UART: [kat] ++
3,637,991 UART: [kat] sha1
3,642,117 UART: [kat] SHA2-256
3,644,057 UART: [kat] SHA2-384
3,647,056 UART: [kat] SHA2-512-ACC
3,648,956 UART: [kat] ECC-384
3,658,487 UART: [kat] HMAC-384Kdf
3,663,221 UART: [kat] LMS
3,911,549 UART: [kat] --
3,912,383 UART: [update-reset] ++
5,225,778 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,226,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,815 >>> mbox cmd response: success
5,377,070 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,084 UART: [update-reset Success] --
5,386,085 UART: [state] Locking Datavault
5,386,731 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,335 UART: [state] Locking ICCM
5,387,889 UART: [exit] Launching FMC @ 0x40000130
5,393,218 UART:
5,393,234 UART: Running Caliptra FMC ...
5,393,642 UART:
5,393,696 UART: [state] CFI Enabled
5,482,805 UART: [art] Extend RT PCRs Done
5,483,233 UART: [art] Lock RT PCRs Done
5,484,458 UART: [art] Populate DV Done
5,492,893 UART: [fht] FMC Alias Private Key: 7
5,493,827 UART: [art] Derive CDI
5,494,107 UART: [art] Store in in slot 0x4
5,579,964 UART: [art] Derive Key Pair
5,580,324 UART: [art] Store priv key in slot 0x5
5,593,346 UART: [art] Derive Key Pair - Done
5,608,089 UART: [art] Signing Cert with AUTHO
5,608,569 UART: RITY.KEYID = 7
5,624,637 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,402 UART: [art] PUB.X = 84852B929923C646D0BF7E9850C385FF14DE00E0E2200C49C2CBA446D7F2E1BD7A0914FF2E8D697C01DA62D37E024843
5,632,142 UART: [art] PUB.Y = 3B53BA600EF3D3891221E866DD2EE28723E6DE82DAD3FAADD43C9A38E2291BD6E185F412BD0CF25B815C340F93B54EE0
5,639,099 UART: [art] SIG.R = 15486900BDE8CEC8E3A5E49073D2EE7A00B8DB704539D9E04D3787EED85D0492BBC83C33B84235EF84FFE5B1437C3B2E
5,645,834 UART: [art] SIG.S = 875A9A7CEB8432CDA34968361DA18F42AA769BE94161FA4DC6E40A551C0E3781391E81A2D29E3A44C76E744C2F71057A
5,670,252 UART: Caliptra RT
5,670,505 UART: [state] CFI Enabled
5,953,235 UART: [rt] RT failed reset flow
5,953,666 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 ready_for_fw is high
1,060,559 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,920 >>> mbox cmd response: success
2,164,920 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,227,098 UART:
2,227,114 UART: Running Caliptra FMC ...
2,227,522 UART:
2,227,576 UART: [state] CFI Enabled
2,238,147 UART: [fht] FMC Alias Private Key: 7
2,346,586 UART: [art] Extend RT PCRs Done
2,347,014 UART: [art] Lock RT PCRs Done
2,348,476 UART: [art] Populate DV Done
2,356,655 UART: [fht] FMC Alias Private Key: 7
2,357,701 UART: [art] Derive CDI
2,357,981 UART: [art] Store in in slot 0x4
2,443,832 UART: [art] Derive Key Pair
2,444,192 UART: [art] Store priv key in slot 0x5
2,457,614 UART: [art] Derive Key Pair - Done
2,472,618 UART: [art] Signing Cert with AUTHO
2,473,098 UART: RITY.KEYID = 7
2,487,988 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,753 UART: [art] PUB.X = 9B9E825D4C8193274FF8E1B8F9DF9690A54F9081B70737C6F67A6FA3E8B93909C5F118B5BBA1F80B6B7530760397E18B
2,495,513 UART: [art] PUB.Y = 0B0D06A79E270D9CD31D14AC6F084C82406F55CE55893066104AF194A582C1A0B655A264654C0FF64FB5D335245EA055
2,502,443 UART: [art] SIG.R = 698380DFFA99008A01B3E6062C4C0EDD256E3B5E8A754FF96F1748D1F0799E333495CDA8FFDFE99AE99BE3C8F98AE5E6
2,509,198 UART: [art] SIG.S = F66CE2CCF97D26B62274DCB02A7668801EC4B70858DA2E12E8F262D83BEF7E53C302B479F03F58C87576B0FA670EC3D7
2,533,154 UART: mbox::rt_entry...
2,533,526 UART: ____ _ _ _ ____ _____
2,534,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,878 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,646 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,414 UART: |_|
2,537,726 UART:
2,644,500 UART: [rt] Runtime listening for mailbox commands...
2,645,651 >>> mbox cmd response data (0 bytes)
2,645,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,084,796 >>> mbox cmd response: success
5,098,226 UART:
5,098,242 UART: Running Caliptra FMC ...
5,098,650 UART:
5,098,704 UART: [state] CFI Enabled
5,187,715 UART: [art] Extend RT PCRs Done
5,188,143 UART: [art] Lock RT PCRs Done
5,189,734 UART: [art] Populate DV Done
5,198,121 UART: [fht] FMC Alias Private Key: 7
5,199,147 UART: [art] Derive CDI
5,199,427 UART: [art] Store in in slot 0x4
5,285,012 UART: [art] Derive Key Pair
5,285,372 UART: [art] Store priv key in slot 0x5
5,298,740 UART: [art] Derive Key Pair - Done
5,313,543 UART: [art] Signing Cert with AUTHO
5,314,023 UART: RITY.KEYID = 7
5,329,643 UART: [art] Erasing AUTHORITY.KEYID = 7
5,330,408 UART: [art] PUB.X = 3AF3494E48F73FEE1CF2C66196E352890CF4593115030DEB81F8C113774392FDE758625375BD818A0A9F8FDFB74F60B4
5,337,168 UART: [art] PUB.Y = F43BD99D4CD3A5EA53A991D31C4CF29BF33E4463F7F6483DF0838058F692D9DCBDAD49772E7F70207BFF7F2F0829B978
5,344,127 UART: [art] SIG.R = 8742AB9D33447EEB812485369354552928880E378FC980B9258FFE3A8D00F1B50406D00623CCF673E7CDCC56005B6514
5,350,833 UART: [art] SIG.S = FA807C37E4BC5A793C3C41812356D6A767CC52F1EDF4287B025E8CC6C75C1CDE2D7B44F2B03281C17FA44D09FE6D8B78
5,374,104 UART: Caliptra RT
5,374,357 UART: [state] CFI Enabled
5,656,376 UART: [rt] RT failed reset flow
5,656,807 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
919,023 UART: [kat] HMAC-384Kdf
923,787 UART: [kat] LMS
1,172,115 UART: [kat] --
1,172,930 UART: [cold-reset] ++
1,173,476 UART: [fht] FHT @ 0x50003400
1,176,193 UART: [idev] ++
1,176,361 UART: [idev] CDI.KEYID = 6
1,176,721 UART: [idev] SUBJECT.KEYID = 7
1,177,145 UART: [idev] UDS.KEYID = 0
1,177,490 ready_for_fw is high
1,177,490 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,185,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,850 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,268 UART: [ldev] ++
1,211,436 UART: [ldev] CDI.KEYID = 6
1,211,799 UART: [ldev] SUBJECT.KEYID = 5
1,212,225 UART: [ldev] AUTHORITY.KEYID = 7
1,212,688 UART: [ldev] FE.KEYID = 1
1,217,922 UART: [ldev] Erasing FE.KEYID = 1
1,243,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,446 UART: [ldev] --
1,282,939 UART: [fwproc] Wait for Commands...
1,283,617 UART: [fwproc] Recv command 0x46574c44
1,284,345 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,971 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,264 >>> mbox cmd response: success
2,315,264 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,316,408 UART: [afmc] ++
2,316,576 UART: [afmc] CDI.KEYID = 6
2,316,938 UART: [afmc] SUBJECT.KEYID = 7
2,317,363 UART: [afmc] AUTHORITY.KEYID = 5
2,352,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,649 UART: [afmc] --
2,395,603 UART: [cold-reset] --
2,396,479 UART: [state] Locking Datavault
2,397,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,544 UART: [state] Locking ICCM
2,399,186 UART: [exit] Launching FMC @ 0x40000130
2,404,515 UART:
2,404,531 UART: Running Caliptra FMC ...
2,404,939 UART:
2,405,082 UART: [state] CFI Enabled
2,415,649 UART: [fht] FMC Alias Private Key: 7
2,523,640 UART: [art] Extend RT PCRs Done
2,524,068 UART: [art] Lock RT PCRs Done
2,525,436 UART: [art] Populate DV Done
2,533,755 UART: [fht] FMC Alias Private Key: 7
2,534,927 UART: [art] Derive CDI
2,535,207 UART: [art] Store in in slot 0x4
2,620,686 UART: [art] Derive Key Pair
2,621,046 UART: [art] Store priv key in slot 0x5
2,634,096 UART: [art] Derive Key Pair - Done
2,648,789 UART: [art] Signing Cert with AUTHO
2,649,269 UART: RITY.KEYID = 7
2,664,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,040 UART: [art] PUB.X = 5D24980A1A4E983AF024B976C192F7DD11F7A60CC092ED42666B4179157319AAE4633A94D01FCDC370F32A23EEC012FA
2,671,810 UART: [art] PUB.Y = F861F14AE86F66FBD21D1E5C5F1E2C035547EA6198B5A85B6220555D21347D11259055EA333C20B0F7DE0BFB79EF800B
2,678,757 UART: [art] SIG.R = F0D6EED1EF37A4D4AE9B139656CD46B7C1674DBAA877C5250D360A3841D66CCAD91626C0EF281070E90B8D7318DBE36A
2,685,532 UART: [art] SIG.S = 9B55235E8CF21E3591C86F423AF33FCC66C49C5073E681AD77D778B93897AECA151168658C18C6470892E844962E71CE
2,709,178 UART: mbox::rt_entry...
2,709,550 UART: ____ _ _ _ ____ _____
2,710,334 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,134 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,902 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,670 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,438 UART: |_|
2,713,750 UART:
2,820,911 UART: [rt] Runtime listening for mailbox commands...
2,822,062 >>> mbox cmd response data (0 bytes)
2,822,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,822,175 UART:
2,822,191 UART: Running Caliptra ROM ...
2,822,599 UART:
2,822,741 UART: [state] CFI Enabled
2,825,697 UART: [state] LifecycleState = Unprovisioned
2,826,352 UART: [state] DebugLocked = No
2,826,896 UART: [state] WD Timer not started. Device not locked for debugging
2,828,116 UART: [kat] SHA2-256
3,633,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,637,891 UART: [kat] ++
3,638,043 UART: [kat] sha1
3,642,291 UART: [kat] SHA2-256
3,644,231 UART: [kat] SHA2-384
3,646,862 UART: [kat] SHA2-512-ACC
3,648,762 UART: [kat] ECC-384
3,658,931 UART: [kat] HMAC-384Kdf
3,663,533 UART: [kat] LMS
3,911,861 UART: [kat] --
3,913,037 UART: [update-reset] ++
5,228,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,229,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,379,179 >>> mbox cmd response: success
5,379,424 UART: [update-reset] Copying MAN_2 To MAN_1
5,387,438 UART: [update-reset Success] --
5,388,457 UART: [state] Locking Datavault
5,389,107 UART: [state] Locking PCR0, PCR1 and PCR31
5,389,711 UART: [state] Locking ICCM
5,390,265 UART: [exit] Launching FMC @ 0x40000130
5,395,594 UART:
5,395,610 UART: Running Caliptra FMC ...
5,396,018 UART:
5,396,161 UART: [state] CFI Enabled
5,485,524 UART: [art] Extend RT PCRs Done
5,485,952 UART: [art] Lock RT PCRs Done
5,487,443 UART: [art] Populate DV Done
5,495,552 UART: [fht] FMC Alias Private Key: 7
5,496,632 UART: [art] Derive CDI
5,496,912 UART: [art] Store in in slot 0x4
5,582,769 UART: [art] Derive Key Pair
5,583,129 UART: [art] Store priv key in slot 0x5
5,596,115 UART: [art] Derive Key Pair - Done
5,611,155 UART: [art] Signing Cert with AUTHO
5,611,635 UART: RITY.KEYID = 7
5,626,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,764 UART: [art] PUB.X = 0D9C10C9DE9C5E9A0282C026BAA87759E0C1B114B3CFCBD3863A00A880498D3F367FD01EB3D935BC83C4D1D0E14B91DA
5,634,522 UART: [art] PUB.Y = 8E862DF7D6370AE071C70C43304B299A2F211B82F8ED55658043107772DFA4B8AA9427577ACF5284A33951B8FF72604E
5,641,462 UART: [art] SIG.R = A2A97D262F400C851DC2E7843695805FF21668BF5E47E504C3281915136C38448AA27DDD3E975D50878309B65C4A9BCB
5,648,219 UART: [art] SIG.S = 2109F55CD0C0B69B9F1105EB53A2A37C05EB2C429C1BBD6AE0CCE2D4DBB11FB919773B9B70B0E4D68D375AA19A4B8416
5,671,589 UART: Caliptra RT
5,671,934 UART: [state] CFI Enabled
5,958,204 UART: [rt] RT failed reset flow
5,958,635 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,456 ready_for_fw is high
1,061,456 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,401 >>> mbox cmd response: success
2,165,401 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,227,343 UART:
2,227,359 UART: Running Caliptra FMC ...
2,227,767 UART:
2,227,910 UART: [state] CFI Enabled
2,238,563 UART: [fht] FMC Alias Private Key: 7
2,346,980 UART: [art] Extend RT PCRs Done
2,347,408 UART: [art] Lock RT PCRs Done
2,349,006 UART: [art] Populate DV Done
2,357,507 UART: [fht] FMC Alias Private Key: 7
2,358,531 UART: [art] Derive CDI
2,358,811 UART: [art] Store in in slot 0x4
2,444,390 UART: [art] Derive Key Pair
2,444,750 UART: [art] Store priv key in slot 0x5
2,458,412 UART: [art] Derive Key Pair - Done
2,473,166 UART: [art] Signing Cert with AUTHO
2,473,646 UART: RITY.KEYID = 7
2,488,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,475 UART: [art] PUB.X = 0AF67E942A0E29F54CC1A4B1E6AFBEA4823D4CE8E083ED4A017944DF8747C7AFDF161E4DCBC921FEA62F477AC06ACCCE
2,496,266 UART: [art] PUB.Y = A8700F1D1F51680E15F4978BBE5C76A7333925708876E073C1B65DCDD7E0627B68E5F74CDAF9D12444E8806C193905F4
2,503,205 UART: [art] SIG.R = 73E70C20C8C79CB6C89B95CCB4B9D259A23D83E5BBA972C8C680DF03F27CDCACC54BEF681626183CABFC070080F0726E
2,509,962 UART: [art] SIG.S = A8B6A13535CB07B49BBACD799EEDFCE195EA1D22FA8C7757D83CEFED24053244858AF23E8C5253C06CE2D5F8B9C62294
2,534,153 UART: mbox::rt_entry...
2,534,525 UART: ____ _ _ _ ____ _____
2,535,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,877 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,645 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,413 UART: |_|
2,538,725 UART:
2,645,895 UART: [rt] Runtime listening for mailbox commands...
2,647,046 >>> mbox cmd response data (0 bytes)
2,647,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,086,410 >>> mbox cmd response: success
5,099,682 UART:
5,099,698 UART: Running Caliptra FMC ...
5,100,106 UART:
5,100,249 UART: [state] CFI Enabled
5,189,704 UART: [art] Extend RT PCRs Done
5,190,132 UART: [art] Lock RT PCRs Done
5,191,571 UART: [art] Populate DV Done
5,199,742 UART: [fht] FMC Alias Private Key: 7
5,200,700 UART: [art] Derive CDI
5,200,980 UART: [art] Store in in slot 0x4
5,286,655 UART: [art] Derive Key Pair
5,287,015 UART: [art] Store priv key in slot 0x5
5,300,621 UART: [art] Derive Key Pair - Done
5,315,679 UART: [art] Signing Cert with AUTHO
5,316,159 UART: RITY.KEYID = 7
5,331,727 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,492 UART: [art] PUB.X = CB874AF204659B668C9EDF61306BA0ED78FF54C75E293DC72D80A3EA8B9B271ED407634E4C0849A36B2A7A4DCE0B5784
5,339,262 UART: [art] PUB.Y = AB3EDE83E2298F092B547C8D6675C54AC576401EE8B5EA12D9468B70A5D4DD4807E5A6A60E0FDE9B621E8EF88BCC2EE7
5,346,218 UART: [art] SIG.R = 41FDA1B8D2D78AA56C84E7EDBDB4DD9CB2788EE29FD5AE473EE10918C5C8ADDCC59C08E2F8C143524E8C7690D6D9FF31
5,353,008 UART: [art] SIG.S = 7C5ED74A2974FE09A7C870637C4C99B541D5088E08CAA36EC8BA52AB887BBDCF7833ADFBB883BC62AB0303DCD0A88262
5,376,598 UART: Caliptra RT
5,376,943 UART: [state] CFI Enabled
5,659,485 UART: [rt] RT failed reset flow
5,659,916 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,173,989 ready_for_fw is high
1,173,989 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,214,734 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,816 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,280,945 UART: [fwproc] Recv command 0x46574c44
1,281,678 UART: [fwproc] Recv'd Img size: 78704 bytes
2,170,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,409 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,309,687 >>> mbox cmd response: success
2,309,687 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,310,810 UART: [afmc] ++
2,310,978 UART: [afmc] CDI.KEYID = 6
2,311,341 UART: [afmc] SUBJECT.KEYID = 7
2,311,767 UART: [afmc] AUTHORITY.KEYID = 5
2,347,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,173 UART: [afmc] --
2,390,151 UART: [cold-reset] --
2,391,003 UART: [state] Locking Datavault
2,392,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,820 UART: [state] Locking ICCM
2,393,422 UART: [exit] Launching FMC @ 0x40000130
2,398,751 UART:
2,398,767 UART: Running Caliptra FMC ...
2,399,175 UART:
2,399,229 UART: [state] CFI Enabled
2,409,678 UART: [fht] FMC Alias Private Key: 7
2,518,341 UART: [art] Extend RT PCRs Done
2,518,769 UART: [art] Lock RT PCRs Done
2,520,721 UART: [art] Populate DV Done
2,528,926 UART: [fht] FMC Alias Private Key: 7
2,530,068 UART: [art] Derive CDI
2,530,348 UART: [art] Store in in slot 0x4
2,616,003 UART: [art] Derive Key Pair
2,616,363 UART: [art] Store priv key in slot 0x5
2,629,825 UART: [art] Derive Key Pair - Done
2,644,680 UART: [art] Signing Cert with AUTHO
2,645,160 UART: RITY.KEYID = 7
2,660,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,263 UART: [art] PUB.X = 94C0B7ECC9748ADBA7E08874374C9AD16204261748E25ECA67A38D2041C47C982069F2DA6D72F5A4A5D4DAFC0CF70C93
2,668,034 UART: [art] PUB.Y = F1A60A1A158C2A850D17BB244F89CBB77575362E1C5F6A6D5B97FFF84D33B40DB5FE896C6A99F78237DAAA0C953F07E1
2,674,983 UART: [art] SIG.R = 24190FE5115C87C22A94A40479BE5E67A897880757C7CBEF29666C20BAA85A78E65D6C26D2F5D9B2F8F28B2F2ACE3A3C
2,681,754 UART: [art] SIG.S = D7896D6DBD8AA0FD2AE5761D584E9AB67B9C62395DDDDD94ECB72B1ED43BD3DCCE74FBBB67E9DBC3906B73456EBC4AA6
2,705,749 UART: mbox::rt_entry...
2,706,121 UART: ____ _ _ _ ____ _____
2,706,905 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,473 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,241 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,009 UART: |_|
2,710,321 UART:
2,817,371 UART: [rt] Runtime listening for mailbox commands...
2,818,522 >>> mbox cmd response data (0 bytes)
2,818,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,635 UART:
2,818,651 UART: Running Caliptra ROM ...
2,819,059 UART:
2,819,114 UART: [state] CFI Enabled
2,822,010 UART: [state] LifecycleState = Unprovisioned
2,822,665 UART: [state] DebugLocked = No
2,823,325 UART: [state] WD Timer not started. Device not locked for debugging
2,824,555 UART: [kat] SHA2-256
3,628,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,632,234 UART: [kat] ++
3,632,386 UART: [kat] sha1
3,636,496 UART: [kat] SHA2-256
3,638,436 UART: [kat] SHA2-384
3,641,297 UART: [kat] SHA2-512-ACC
3,643,197 UART: [kat] ECC-384
3,652,814 UART: [kat] HMAC-384Kdf
3,657,254 UART: [kat] LMS
3,905,566 UART: [kat] --
3,906,392 UART: [update-reset] ++
5,219,584 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,763 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,370,761 >>> mbox cmd response: success
5,370,864 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,878 UART: [update-reset Success] --
5,380,001 UART: [state] Locking Datavault
5,380,929 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,533 UART: [state] Locking ICCM
5,382,169 UART: [exit] Launching FMC @ 0x40000130
5,387,498 UART:
5,387,514 UART: Running Caliptra FMC ...
5,387,922 UART:
5,387,976 UART: [state] CFI Enabled
5,476,359 UART: [art] Extend RT PCRs Done
5,476,787 UART: [art] Lock RT PCRs Done
5,477,756 UART: [art] Populate DV Done
5,485,661 UART: [fht] FMC Alias Private Key: 7
5,486,747 UART: [art] Derive CDI
5,487,027 UART: [art] Store in in slot 0x4
5,572,412 UART: [art] Derive Key Pair
5,572,772 UART: [art] Store priv key in slot 0x5
5,585,954 UART: [art] Derive Key Pair - Done
5,600,446 UART: [art] Signing Cert with AUTHO
5,600,926 UART: RITY.KEYID = 7
5,616,158 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,923 UART: [art] PUB.X = 37FD090AFA5B1C3174308099EE93087A09154BC64F95821E89B417FE307262A3DC4DCD6BE013302E5F5C478D4844E82B
5,623,681 UART: [art] PUB.Y = F638B5CA1DC64AB4D35E5ED60C9BC9AEB1076207CFBE9B28730DAB59C6B72A6C85DC170D515BD3F147C8E35E4A8FB755
5,630,638 UART: [art] SIG.R = 13722DB175F65B9C21AFE5329B272AD5842A0220FBDFAAF20114496AB5E9DA75C30F3C9633DE964DFC3995297D7CFB0B
5,637,408 UART: [art] SIG.S = 8E60372BB53169C6C0572AFFF100F1A9E3E6DC8101A684E39F36A91C19BA4E2D39DF47BDBD2BD85BFB0BF078C631262D
5,660,789 UART: Caliptra RT
5,661,042 UART: [state] CFI Enabled
5,944,892 UART: [rt] RT failed reset flow
5,945,323 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,132 ready_for_fw is high
1,056,132 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,633 >>> mbox cmd response: success
2,161,633 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,224,291 UART:
2,224,307 UART: Running Caliptra FMC ...
2,224,715 UART:
2,224,769 UART: [state] CFI Enabled
2,235,188 UART: [fht] FMC Alias Private Key: 7
2,343,319 UART: [art] Extend RT PCRs Done
2,343,747 UART: [art] Lock RT PCRs Done
2,345,309 UART: [art] Populate DV Done
2,353,544 UART: [fht] FMC Alias Private Key: 7
2,354,494 UART: [art] Derive CDI
2,354,774 UART: [art] Store in in slot 0x4
2,440,407 UART: [art] Derive Key Pair
2,440,767 UART: [art] Store priv key in slot 0x5
2,453,429 UART: [art] Derive Key Pair - Done
2,468,288 UART: [art] Signing Cert with AUTHO
2,468,768 UART: RITY.KEYID = 7
2,483,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,749 UART: [art] PUB.X = DB0EAB6C59BB83AF4639F5EEBA27A0F5420EE1ABF822507E99AD19F278A99FB9CEC3F08B1546B51EED297A661DC44B4C
2,491,537 UART: [art] PUB.Y = E23AFF379F374815EA85B181EF4DE60964883F746EBFCE2A6A0A8B98896251AAC80E30B8B8A1F650BE9EBC883D2024BA
2,498,492 UART: [art] SIG.R = 2B40099F4DE51919A0E62376FC513EB278CFEE8DCAFFF4C405196B23FBCD1E6A23188A72EC809C03C9B4BB84EC9B384A
2,505,271 UART: [art] SIG.S = 58E3835C54B3AEAA20547D0145098A1437BADB42CED348F164AC1655E4F1B44FBDA5DCE6DCC61C89F3A6FAE08B9F8953
2,528,672 UART: mbox::rt_entry...
2,529,044 UART: ____ _ _ _ ____ _____
2,529,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,932 UART: |_|
2,533,244 UART:
2,639,084 UART: [rt] Runtime listening for mailbox commands...
2,640,235 >>> mbox cmd response data (0 bytes)
2,640,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,073,347 >>> mbox cmd response: success
5,086,673 UART:
5,086,689 UART: Running Caliptra FMC ...
5,087,097 UART:
5,087,151 UART: [state] CFI Enabled
5,176,672 UART: [art] Extend RT PCRs Done
5,177,100 UART: [art] Lock RT PCRs Done
5,178,179 UART: [art] Populate DV Done
5,186,364 UART: [fht] FMC Alias Private Key: 7
5,187,430 UART: [art] Derive CDI
5,187,710 UART: [art] Store in in slot 0x4
5,272,935 UART: [art] Derive Key Pair
5,273,295 UART: [art] Store priv key in slot 0x5
5,286,793 UART: [art] Derive Key Pair - Done
5,301,827 UART: [art] Signing Cert with AUTHO
5,302,307 UART: RITY.KEYID = 7
5,317,633 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,398 UART: [art] PUB.X = 8C49CF60B2BD73182A1ADC14DBA72AC7B7336AE5A88B5C13367F3AB9DAA19AF47CCAC75ECA3E90B7C7F1FB0415FF7449
5,325,191 UART: [art] PUB.Y = 163E4FEF4ED83322BC9251719A40AF3BCCAC62DD2A44D63B2BFAAE61CE49EE20D3113CE812697FE2DBDCC1FFF7FC1961
5,332,169 UART: [art] SIG.R = 66ACF9A866ABB5E3BD4A4EA8FC187E33A3F29A5CF7FE2282E474BD90B4302FDDDE6BCCB94721BF53E91488D479598775
5,338,957 UART: [art] SIG.S = EC38928A5ADE061BCD90EF2EC3CDBAF581162FCC50830C49C5A829ACFCCB4C5407BF47A525C76AA4DFED4C7F4ECF5092
5,363,055 UART: Caliptra RT
5,363,308 UART: [state] CFI Enabled
5,641,616 UART: [rt] RT failed reset flow
5,642,047 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,706 UART: [cold-reset] ++
1,171,054 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,174,868 ready_for_fw is high
1,174,868 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,241,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,763 UART: [ldev] --
1,281,099 UART: [fwproc] Wait for Commands...
1,281,788 UART: [fwproc] Recv command 0x46574c44
1,282,521 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,034 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,308 >>> mbox cmd response: success
2,311,308 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,312,429 UART: [afmc] ++
2,312,597 UART: [afmc] CDI.KEYID = 6
2,312,960 UART: [afmc] SUBJECT.KEYID = 7
2,313,386 UART: [afmc] AUTHORITY.KEYID = 5
2,349,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,856 UART: [afmc] --
2,392,880 UART: [cold-reset] --
2,393,714 UART: [state] Locking Datavault
2,394,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,179 UART: [state] Locking ICCM
2,395,609 UART: [exit] Launching FMC @ 0x40000130
2,400,938 UART:
2,400,954 UART: Running Caliptra FMC ...
2,401,362 UART:
2,401,505 UART: [state] CFI Enabled
2,412,116 UART: [fht] FMC Alias Private Key: 7
2,519,695 UART: [art] Extend RT PCRs Done
2,520,123 UART: [art] Lock RT PCRs Done
2,521,695 UART: [art] Populate DV Done
2,529,986 UART: [fht] FMC Alias Private Key: 7
2,531,034 UART: [art] Derive CDI
2,531,314 UART: [art] Store in in slot 0x4
2,617,341 UART: [art] Derive Key Pair
2,617,701 UART: [art] Store priv key in slot 0x5
2,631,103 UART: [art] Derive Key Pair - Done
2,646,285 UART: [art] Signing Cert with AUTHO
2,646,765 UART: RITY.KEYID = 7
2,662,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,774 UART: [art] PUB.X = A59DE5E1DFAF734DA2D0735ED1422F0E374F80764BA3B3812C725D52B54FC68EAE696404766D91A22F69B93DB08BFE4F
2,669,550 UART: [art] PUB.Y = AA56E57970F36BF890375184AB5AF4EAA6B548186C1A59ED085B747788E6E34CC5302EC2090C88F81CE9A40C17967FF9
2,676,492 UART: [art] SIG.R = 46D1273F79F1F815852337F73C32AEB0B2ED40C3DBFC3CE5160BDE51366EC9E4CBECD7577D862EC04730F8DB13585E10
2,683,271 UART: [art] SIG.S = BD265A716601736546DE100073F799F6E0E2CB2E7732B5F509EDE2054A5A20D108FF49A68F0CA05A748746BDB4863A21
2,706,975 UART: mbox::rt_entry...
2,707,347 UART: ____ _ _ _ ____ _____
2,708,131 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,931 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,235 UART: |_|
2,711,547 UART:
2,817,121 UART: [rt] Runtime listening for mailbox commands...
2,818,272 >>> mbox cmd response data (0 bytes)
2,818,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,385 UART:
2,818,401 UART: Running Caliptra ROM ...
2,818,809 UART:
2,818,951 UART: [state] CFI Enabled
2,821,765 UART: [state] LifecycleState = Unprovisioned
2,822,420 UART: [state] DebugLocked = No
2,822,968 UART: [state] WD Timer not started. Device not locked for debugging
2,824,148 UART: [kat] SHA2-256
3,627,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,827 UART: [kat] ++
3,631,979 UART: [kat] sha1
3,636,209 UART: [kat] SHA2-256
3,638,149 UART: [kat] SHA2-384
3,640,830 UART: [kat] SHA2-512-ACC
3,642,730 UART: [kat] ECC-384
3,652,237 UART: [kat] HMAC-384Kdf
3,657,011 UART: [kat] LMS
3,905,323 UART: [kat] --
3,906,275 UART: [update-reset] ++
5,219,377 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,446 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,370,444 >>> mbox cmd response: success
5,370,757 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,771 UART: [update-reset Success] --
5,379,788 UART: [state] Locking Datavault
5,380,598 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,202 UART: [state] Locking ICCM
5,381,818 UART: [exit] Launching FMC @ 0x40000130
5,387,147 UART:
5,387,163 UART: Running Caliptra FMC ...
5,387,571 UART:
5,387,714 UART: [state] CFI Enabled
5,477,049 UART: [art] Extend RT PCRs Done
5,477,477 UART: [art] Lock RT PCRs Done
5,478,846 UART: [art] Populate DV Done
5,486,947 UART: [fht] FMC Alias Private Key: 7
5,487,963 UART: [art] Derive CDI
5,488,243 UART: [art] Store in in slot 0x4
5,573,728 UART: [art] Derive Key Pair
5,574,088 UART: [art] Store priv key in slot 0x5
5,587,700 UART: [art] Derive Key Pair - Done
5,602,286 UART: [art] Signing Cert with AUTHO
5,602,766 UART: RITY.KEYID = 7
5,617,982 UART: [art] Erasing AUTHORITY.KEYID = 7
5,618,747 UART: [art] PUB.X = 9D183D2A5288091B17DD934B90105698E4474ADC29A19AE4AF7632BE6A40B1DD16F5ACA83AE94C579FD85EFD9F66D2E4
5,625,526 UART: [art] PUB.Y = 13FE9D30C6B15A9758EDB5CDB05BFC10BE9C9E5E928511906676F0B9A488B4A5D980258D45C6E62BCA927FB21E41A3FF
5,632,490 UART: [art] SIG.R = 91B1AB028273768FF2ABB78A90D521EE8E2817DCE2360EE4ED910DEA21696E78A1D78290A6258618333BE8DB1D1CD2C2
5,639,259 UART: [art] SIG.S = 6A7824D392DDA3AB53504E42903CFA470E035DD33E02F882E8A26B9B0266ED42A1F22445CD97C8DFF69260CAD9D27577
5,662,754 UART: Caliptra RT
5,663,099 UART: [state] CFI Enabled
5,948,555 UART: [rt] RT failed reset flow
5,948,986 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,335 ready_for_fw is high
1,056,335 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,574 >>> mbox cmd response: success
2,163,574 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,226,022 UART:
2,226,038 UART: Running Caliptra FMC ...
2,226,446 UART:
2,226,589 UART: [state] CFI Enabled
2,237,328 UART: [fht] FMC Alias Private Key: 7
2,345,395 UART: [art] Extend RT PCRs Done
2,345,823 UART: [art] Lock RT PCRs Done
2,347,191 UART: [art] Populate DV Done
2,355,440 UART: [fht] FMC Alias Private Key: 7
2,356,606 UART: [art] Derive CDI
2,356,886 UART: [art] Store in in slot 0x4
2,442,561 UART: [art] Derive Key Pair
2,442,921 UART: [art] Store priv key in slot 0x5
2,456,275 UART: [art] Derive Key Pair - Done
2,471,114 UART: [art] Signing Cert with AUTHO
2,471,594 UART: RITY.KEYID = 7
2,486,542 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,307 UART: [art] PUB.X = C09106FE82510A4B9386CF21C06831E74254D5AF649B28D9C71E04B37D24B9BFC7CCADCBE1655CE5EE0A1AF1F8726632
2,494,077 UART: [art] PUB.Y = CB276B6C1C00EC6BE91E3BFFA2F7011E69874255B01AB4324B5BD953AA3F2AE3E2EC13D96702E920FF9FD82B569CB841
2,501,015 UART: [art] SIG.R = 56ABC1FF115B3309FBFFBAFBEDF01FE1B71A6DED16FD4094353FE729215459404F1CDF8624061748F26B84A50A35DBB1
2,507,792 UART: [art] SIG.S = 9C479A2969C27D4234F24706CEF075F2D1CF1097DA8ECCA78AEB9ED2693A98CD429C930DD00B5AFF8E98678C8C46E6DE
2,532,032 UART: mbox::rt_entry...
2,532,404 UART: ____ _ _ _ ____ _____
2,533,188 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,292 UART: |_|
2,536,604 UART:
2,643,354 UART: [rt] Runtime listening for mailbox commands...
2,644,505 >>> mbox cmd response data (0 bytes)
2,644,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,079,144 >>> mbox cmd response: success
5,092,572 UART:
5,092,588 UART: Running Caliptra FMC ...
5,092,996 UART:
5,093,139 UART: [state] CFI Enabled
5,182,230 UART: [art] Extend RT PCRs Done
5,182,658 UART: [art] Lock RT PCRs Done
5,184,041 UART: [art] Populate DV Done
5,192,288 UART: [fht] FMC Alias Private Key: 7
5,193,310 UART: [art] Derive CDI
5,193,590 UART: [art] Store in in slot 0x4
5,279,457 UART: [art] Derive Key Pair
5,279,817 UART: [art] Store priv key in slot 0x5
5,292,631 UART: [art] Derive Key Pair - Done
5,307,607 UART: [art] Signing Cert with AUTHO
5,308,087 UART: RITY.KEYID = 7
5,323,239 UART: [art] Erasing AUTHORITY.KEYID = 7
5,324,004 UART: [art] PUB.X = 4550BC880A17D58D6758B4F3FD3B19E3E846CE2DD62770848C7FA01BAFB2236BE576AD653169080D998152681C459B4B
5,330,765 UART: [art] PUB.Y = 83885E88822817C27707AC85E46CDF82FFC13F46174B4B0420BB8558EB70C2ACFF4FBCD662C7E1C19C516F9CB1B675EF
5,337,721 UART: [art] SIG.R = 40526692FDEADF1BBFF95CC48EC3FDA0090FF0D15893C6EAB473AD2DBFB6204B5DBDD2951B023E510E4836A93C93090C
5,344,493 UART: [art] SIG.S = 9D750F4C6498F58661F5B9541A9ACCAF9A265285F56D6149F5ACB10C4C10F3EB1322C43215F178CA06908B61E7DEE6F9
5,368,289 UART: Caliptra RT
5,368,634 UART: [state] CFI Enabled
5,647,598 UART: [rt] RT failed reset flow
5,648,029 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,280 UART:
192,636 UART: Running Caliptra ROM ...
193,812 UART:
193,966 UART: [state] CFI Enabled
268,385 UART: [state] LifecycleState = Unprovisioned
270,366 UART: [state] DebugLocked = No
272,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,041 UART: [kat] SHA2-256
447,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,280 UART: [kat] ++
458,790 UART: [kat] sha1
470,380 UART: [kat] SHA2-256
473,033 UART: [kat] SHA2-384
478,010 UART: [kat] SHA2-512-ACC
480,361 UART: [kat] ECC-384
2,769,376 UART: [kat] HMAC-384Kdf
2,780,765 UART: [kat] LMS
3,971,107 UART: [kat] --
3,976,045 UART: [cold-reset] ++
3,978,061 UART: [fht] Storing FHT @ 0x50003400
3,989,972 UART: [idev] ++
3,990,609 UART: [idev] CDI.KEYID = 6
3,991,499 UART: [idev] SUBJECT.KEYID = 7
3,992,742 UART: [idev] UDS.KEYID = 0
3,993,713 ready_for_fw is high
3,993,910 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,093,288 UART: [idev] Erasing UDS.KEYID = 0
7,327,031 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,918 UART: [idev] --
7,350,510 UART: [ldev] ++
7,351,078 UART: [ldev] CDI.KEYID = 6
7,352,097 UART: [ldev] SUBJECT.KEYID = 5
7,353,261 UART: [ldev] AUTHORITY.KEYID = 7
7,354,760 UART: [ldev] FE.KEYID = 1
7,382,227 UART: [ldev] Erasing FE.KEYID = 1
10,714,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,006,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,021,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,036,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,050,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,069,314 UART: [ldev] --
13,073,178 UART: [fwproc] Waiting for Commands...
13,075,455 UART: [fwproc] Received command 0x46574c44
13,077,649 UART: [fwproc] Received Image of size 78740 bytes
16,700,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,779,556 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,848,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,041,607 >>> mbox cmd response: success
17,042,083 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,045,572 UART: [afmc] ++
17,046,155 UART: [afmc] CDI.KEYID = 6
17,047,075 UART: [afmc] SUBJECT.KEYID = 7
17,048,299 UART: [afmc] AUTHORITY.KEYID = 5
20,408,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,708,917 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,711,190 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,725,616 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,740,431 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,754,890 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,774,912 UART: [afmc] --
22,777,970 UART: [cold-reset] --
22,781,885 UART: [state] Locking Datavault
22,787,078 UART: [state] Locking PCR0, PCR1 and PCR31
22,788,786 UART: [state] Locking ICCM
22,790,972 UART: [exit] Launching FMC @ 0x40000130
22,799,329 UART:
22,799,608 UART: Running Caliptra FMC ...
22,800,726 UART:
22,800,892 UART: [state] CFI Enabled
22,868,289 UART: [fht] FMC Alias Private Key: 7
25,206,451 UART: [art] Extend RT PCRs Done
25,207,982 UART: [art] Lock RT PCRs Done
25,209,154 UART: [art] Populate DV Done
25,214,323 UART: [fht] FMC Alias Private Key: 7
25,215,880 UART: [art] Derive CDI
25,216,698 UART: [art] Store in in slot 0x4
25,277,014 UART: [art] Derive Key Pair
25,278,050 UART: [art] Store priv key in slot 0x5
28,570,294 UART: [art] Derive Key Pair - Done
28,583,369 UART: [art] Signing Cert with AUTHO
28,584,677 UART: RITY.KEYID = 7
30,871,463 UART: [art] Erasing AUTHORITY.KEYID = 7
30,872,971 UART: [art] PUB.X = D6356CF86250527CBD758C115615189101A684C16A51709480E534E03A7A3F21A76453AA15D9C3673119D7892A32A8ED
30,880,261 UART: [art] PUB.Y = AAE7B091E15B270C4AE0AB1D3D03F9DB29F2C8D8441EA1823F51085161502D725F4AA872DB890E391ABD4A511F831095
30,887,422 UART: [art] SIG.R = 605B9C9A63AC36E1072A6435BBBA4C848E4E818E93B69C86FAB9A29A422C0321DDB0891796CBB9F509198534F60030BF
30,894,771 UART: [art] SIG.S = 9E52C61B58BD6EC3C25DD45C7495C39C183566E09E18B99532DDB785FECFA9B22ADDD3235C7F5DFF88C59C789328E02C
32,199,712 UART: mbox::rt_entry...
32,200,671 UART: ____ _ _ _ ____ _____
32,202,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,204,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,206,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,208,561 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,210,491 UART: |_|
32,211,300 UART:
32,324,894 UART: [rt] Runtime listening for mailbox commands...
32,330,757 >>> mbox cmd response data (3272 bytes)
32,346,703 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,380,110 >>> mbox cmd response data (0 bytes)
34,515,315 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,659,695 UART:
34,660,092 UART: Running Caliptra ROM ...
34,661,235 UART:
34,661,410 UART: [state] CFI Enabled
34,732,281 UART: [state] LifecycleState = Unprovisioned
34,734,211 UART: [state] DebugLocked = No
34,736,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,740,992 UART: [kat] SHA2-256
34,910,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,921,169 UART: [kat] ++
34,921,629 UART: [kat] sha1
34,931,327 UART: [kat] SHA2-256
34,934,024 UART: [kat] SHA2-384
34,939,534 UART: [kat] SHA2-512-ACC
34,941,888 UART: [kat] ECC-384
37,235,634 UART: [kat] HMAC-384Kdf
37,267,517 UART: [kat] LMS
38,457,897 UART: [kat] --
38,462,773 UART: [update-reset] ++
42,600,975 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,604,526 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,986,792 >>> mbox cmd response: success
42,991,414 UART: [update-reset] Copying MAN_2 To MAN_1
43,010,626 UART: [update-reset Success] --
43,016,554 UART: [state] Locking Datavault
43,019,432 UART: [state] Locking PCR0, PCR1 and PCR31
43,021,193 UART: [state] Locking ICCM
43,023,247 UART: [exit] Launching FMC @ 0x40000130
43,031,658 UART:
43,031,917 UART: Running Caliptra FMC ...
43,033,022 UART:
43,033,186 UART: [state] CFI Enabled
43,124,480 UART: [art] Extend RT PCRs Done
43,125,680 UART: [art] Lock RT PCRs Done
43,127,213 UART: [art] Populate DV Done
43,132,834 UART: [fht] FMC Alias Private Key: 7
43,134,424 UART: [art] Derive CDI
43,135,166 UART: [art] Store in in slot 0x4
43,193,612 UART: [art] Derive Key Pair
43,194,784 UART: [art] Store priv key in slot 0x5
46,487,386 UART: [art] Derive Key Pair - Done
46,500,174 UART: [art] Signing Cert with AUTHO
46,501,475 UART: RITY.KEYID = 7
48,788,723 UART: [art] Erasing AUTHORITY.KEYID = 7
48,790,230 UART: [art] PUB.X = 2AB693D20E454B902BA07B882C724227A319E0DE07CA26D3DFD4268FE77D97E6A755160A5790AAC1101DB767589A0F4E
48,797,537 UART: [art] PUB.Y = 238A4014A48039F71696F06168FDC23D02B68730828DA6456AEA456BF4364146CCC499879FB2913C076CA8EC886F17ED
48,804,712 UART: [art] SIG.R = 616E4054D85F75CA4FD392AE70DA9EEAA632F583E0FEA9BF4B0A9C6283D4DC212913E1FE930B2AA081D64167CE11901C
48,812,102 UART: [art] SIG.S = B85DBC0CC3A6A245F7FE874FAF4E744837B14280ECFC925CE4BA6D311CF6A3C1BECFBD34970C0275F2EA908ABC0B5961
50,116,892 UART: Caliptra RT
50,117,591 UART: [state] CFI Enabled
53,737,119 UART: Disabled attest: DPE valid fail
53,738,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,739,703 UART: [rt] RT listening for mailbox commands...
53,770,785 UART: [rt]cmd =0x494e464f, len=4
53,774,831 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,785,563 ready_for_fw is high
3,785,975 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,133,214 >>> mbox cmd response: success
17,133,745 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,818,828 UART:
22,819,576 UART: Running Caliptra FMC ...
22,820,692 UART:
22,820,851 UART: [state] CFI Enabled
22,888,373 UART: [fht] FMC Alias Private Key: 7
25,226,856 UART: [art] Extend RT PCRs Done
25,228,083 UART: [art] Lock RT PCRs Done
25,229,794 UART: [art] Populate DV Done
25,235,208 UART: [fht] FMC Alias Private Key: 7
25,236,912 UART: [art] Derive CDI
25,237,654 UART: [art] Store in in slot 0x4
25,297,166 UART: [art] Derive Key Pair
25,298,208 UART: [art] Store priv key in slot 0x5
28,591,012 UART: [art] Derive Key Pair - Done
28,603,962 UART: [art] Signing Cert with AUTHO
28,605,264 UART: RITY.KEYID = 7
30,893,315 UART: [art] Erasing AUTHORITY.KEYID = 7
30,894,829 UART: [art] PUB.X = 9D6565252088246B9ADEB3761F2E045C1BFEBDD3E399C8DDC0BFEA32E68175512501D16FA9EB9F03BB263409F21BE407
30,902,030 UART: [art] PUB.Y = 5CBBD342EDF54052B4186A986331A97F1775DB6BF1A16332227163B306DBECB85120CC345A34458BA04BA43C157D377B
30,909,284 UART: [art] SIG.R = 01DD51C5764F495F22129DABF90C2C9260800DCDCD5D52BC385936BD6E4B7B92671879C09ACB9B76C9D74BAD113FB8C6
30,916,694 UART: [art] SIG.S = 1DE90F300F98524B53130EFA4B302F6706AB8B09692248BF1D822A9E21913D548F8419533C543D1B2EBC341DC5B1D9DB
32,221,214 UART: mbox::rt_entry...
32,222,175 UART: ____ _ _ _ ____ _____
32,224,118 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,122 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,227,979 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,229,944 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,231,798 UART: |_|
32,232,677 UART:
32,345,931 UART: [rt] Runtime listening for mailbox commands...
32,351,799 >>> mbox cmd response data (3272 bytes)
32,367,635 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,401,057 >>> mbox cmd response data (0 bytes)
34,533,128 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,279,037 >>> mbox cmd response: success
43,316,056 UART:
43,316,393 UART: Running Caliptra FMC ...
43,317,444 UART:
43,317,597 UART: [state] CFI Enabled
43,418,000 UART: [art] Extend RT PCRs Done
43,419,200 UART: [art] Lock RT PCRs Done
43,420,701 UART: [art] Populate DV Done
43,426,164 UART: [fht] FMC Alias Private Key: 7
43,427,759 UART: [art] Derive CDI
43,428,576 UART: [art] Store in in slot 0x4
43,487,027 UART: [art] Derive Key Pair
43,488,069 UART: [art] Store priv key in slot 0x5
46,781,092 UART: [art] Derive Key Pair - Done
46,794,178 UART: [art] Signing Cert with AUTHO
46,795,483 UART: RITY.KEYID = 7
49,081,969 UART: [art] Erasing AUTHORITY.KEYID = 7
49,083,478 UART: [art] PUB.X = 0B99761106A87C29C64B5541BDEB6A58C26CA04BE1EFC0D80F3CE2D2292B9E7C8E1113878E9B709B3E7E701318593620
49,090,699 UART: [art] PUB.Y = 6046C47761BC2AFD947F5864B83206A258D278CB9B121BBFC0FED308225B3958DF96B7096FB1D34E6105DB1AE1D26CDE
49,097,959 UART: [art] SIG.R = 402622F1D0057B16D422B8BB5C1F37E06F81621DCEED4BD4C24D87A03E6CC101CD42F31083F73116F88A440A638AA8F4
49,105,336 UART: [art] SIG.S = 605582E5AEAB522500C53C694271390781A210FA9EDEBD1BACF32BEF491517EB3C6DEAAB3A9666BA7B540C37B02591E5
50,409,527 UART: Caliptra RT
50,410,223 UART: [state] CFI Enabled
54,009,865 UART: Disabled attest: DPE valid fail
54,011,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,012,632 UART: [rt] RT listening for mailbox commands...
54,044,127 UART: [rt]cmd =0x494e464f, len=4
54,047,820 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,413 UART:
192,782 UART: Running Caliptra ROM ...
193,977 UART:
603,616 UART: [state] CFI Enabled
618,534 UART: [state] LifecycleState = Unprovisioned
620,424 UART: [state] DebugLocked = No
622,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,057 UART: [kat] SHA2-256
796,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,400 UART: [kat] ++
807,844 UART: [kat] sha1
818,069 UART: [kat] SHA2-256
820,808 UART: [kat] SHA2-384
827,118 UART: [kat] SHA2-512-ACC
829,495 UART: [kat] ECC-384
3,114,581 UART: [kat] HMAC-384Kdf
3,126,543 UART: [kat] LMS
4,316,621 UART: [kat] --
4,321,560 UART: [cold-reset] ++
4,322,493 UART: [fht] Storing FHT @ 0x50003400
4,333,608 UART: [idev] ++
4,334,174 UART: [idev] CDI.KEYID = 6
4,335,173 UART: [idev] SUBJECT.KEYID = 7
4,336,283 UART: [idev] UDS.KEYID = 0
4,337,393 ready_for_fw is high
4,337,609 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,436,823 UART: [idev] Erasing UDS.KEYID = 0
7,620,774 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,094 UART: [idev] --
7,645,596 UART: [ldev] ++
7,646,156 UART: [ldev] CDI.KEYID = 6
7,647,110 UART: [ldev] SUBJECT.KEYID = 5
7,648,372 UART: [ldev] AUTHORITY.KEYID = 7
7,649,595 UART: [ldev] FE.KEYID = 1
7,662,175 UART: [ldev] Erasing FE.KEYID = 1
10,950,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,601 UART: [ldev] --
13,308,522 UART: [fwproc] Waiting for Commands...
13,310,336 UART: [fwproc] Received command 0x46574c44
13,312,509 UART: [fwproc] Received Image of size 78740 bytes
16,927,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,000,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,069,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,262,887 >>> mbox cmd response: success
17,263,356 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,267,438 UART: [afmc] ++
17,268,022 UART: [afmc] CDI.KEYID = 6
17,268,902 UART: [afmc] SUBJECT.KEYID = 7
17,270,167 UART: [afmc] AUTHORITY.KEYID = 5
20,585,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,878,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,880,658 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,895,042 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,909,889 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,924,303 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,944,882 UART: [afmc] --
22,949,067 UART: [cold-reset] --
22,952,113 UART: [state] Locking Datavault
22,957,138 UART: [state] Locking PCR0, PCR1 and PCR31
22,958,880 UART: [state] Locking ICCM
22,961,670 UART: [exit] Launching FMC @ 0x40000130
22,970,058 UART:
22,970,288 UART: Running Caliptra FMC ...
22,971,393 UART:
22,971,553 UART: [state] CFI Enabled
22,979,708 UART: [fht] FMC Alias Private Key: 7
25,310,874 UART: [art] Extend RT PCRs Done
25,312,086 UART: [art] Lock RT PCRs Done
25,313,732 UART: [art] Populate DV Done
25,319,138 UART: [fht] FMC Alias Private Key: 7
25,320,679 UART: [art] Derive CDI
25,321,408 UART: [art] Store in in slot 0x4
25,363,772 UART: [art] Derive Key Pair
25,364,762 UART: [art] Store priv key in slot 0x5
28,606,781 UART: [art] Derive Key Pair - Done
28,619,882 UART: [art] Signing Cert with AUTHO
28,621,184 UART: RITY.KEYID = 7
30,900,808 UART: [art] Erasing AUTHORITY.KEYID = 7
30,902,320 UART: [art] PUB.X = FD37EC76449BB7A318135EE97C2E1F2F0B75FF4FB14248781F0A625712FB029FA7533E211B98598AA4A52F11353138DC
30,909,562 UART: [art] PUB.Y = C82FA7152057954D2DFCB1F3F50DFFE8CB0967261178FC6D16A573917AD2F218E70DED9B8A9868D4F74C3813DEFF38E0
30,916,835 UART: [art] SIG.R = A9769855422786E34355DAE12088B182BFB287506B6A6AAAE7A35D74FC0FF8BF8373E566C6169642A8FD52C671818BCF
30,924,168 UART: [art] SIG.S = BA54AF51A7E154957B8C92C3A40219C2B9DE4AB83E68E1FA6C3D1C0AE6B94DADB9C7FB86BFF8D1702A8709CC6AE54881
32,229,019 UART: mbox::rt_entry...
32,229,964 UART: ____ _ _ _ ____ _____
32,231,944 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,233,941 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,235,869 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,237,794 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,239,717 UART: |_|
32,240,513 UART:
32,353,871 UART: [rt] Runtime listening for mailbox commands...
32,359,745 >>> mbox cmd response data (3272 bytes)
32,375,513 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,408,901 >>> mbox cmd response data (0 bytes)
34,466,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,611,247 UART:
34,611,636 UART: Running Caliptra ROM ...
34,612,693 UART:
34,612,900 UART: [state] CFI Enabled
34,628,367 UART: [state] LifecycleState = Unprovisioned
34,630,247 UART: [state] DebugLocked = No
34,632,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,637,610 UART: [kat] SHA2-256
34,807,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,817,864 UART: [kat] ++
34,818,328 UART: [kat] sha1
34,829,702 UART: [kat] SHA2-256
34,832,379 UART: [kat] SHA2-384
34,837,692 UART: [kat] SHA2-512-ACC
34,840,041 UART: [kat] ECC-384
37,123,806 UART: [kat] HMAC-384Kdf
37,136,256 UART: [kat] LMS
38,326,282 UART: [kat] --
38,331,627 UART: [update-reset] ++
42,478,957 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,482,358 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,864,612 >>> mbox cmd response: success
42,869,041 UART: [update-reset] Copying MAN_2 To MAN_1
42,889,074 UART: [update-reset Success] --
42,892,839 UART: [state] Locking Datavault
42,896,545 UART: [state] Locking PCR0, PCR1 and PCR31
42,898,305 UART: [state] Locking ICCM
42,900,200 UART: [exit] Launching FMC @ 0x40000130
42,908,652 UART:
42,908,892 UART: Running Caliptra FMC ...
42,909,994 UART:
42,910,153 UART: [state] CFI Enabled
42,954,426 UART: [art] Extend RT PCRs Done
42,955,565 UART: [art] Lock RT PCRs Done
42,957,275 UART: [art] Populate DV Done
42,962,888 UART: [fht] FMC Alias Private Key: 7
42,964,578 UART: [art] Derive CDI
42,965,383 UART: [art] Store in in slot 0x4
43,007,655 UART: [art] Derive Key Pair
43,008,702 UART: [art] Store priv key in slot 0x5
46,250,940 UART: [art] Derive Key Pair - Done
46,263,789 UART: [art] Signing Cert with AUTHO
46,265,124 UART: RITY.KEYID = 7
48,544,445 UART: [art] Erasing AUTHORITY.KEYID = 7
48,545,953 UART: [art] PUB.X = 450026441416AABBE24CA981457E05E7082A0E5330D7C493AFCABE6DD24DCC1F967C5E741566B3E9CCCB27D8DC55C996
48,553,229 UART: [art] PUB.Y = 054F7F92E8155B8A8E3308FCAA84888D2FC2DE4CF4C43D30A8EADFC4827F1453C02CE577C41B3CC0F846FC70F5E512E8
48,560,542 UART: [art] SIG.R = 7E71CCA67CBA126F57A5ACAEF1484E88897712E9D38EBC0C93D557A1120B3D14BA1A77FB8991F38B64D123F5E7CD07DC
48,567,951 UART: [art] SIG.S = 6E8EE5622BCFF604BA1B5060ABB8F941994BB975937B8D22F15E1322D0A8BEE537DA1D319E513CD1E47BBDFC1F0E5F85
49,873,008 UART: Caliptra RT
49,873,727 UART: [state] CFI Enabled
53,395,728 UART: Disabled attest: DPE valid fail
53,397,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,398,334 UART: [rt] RT listening for mailbox commands...
53,429,874 UART: [rt]cmd =0x494e464f, len=4
53,433,763 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,128,732 ready_for_fw is high
4,129,101 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,364,405 >>> mbox cmd response: success
17,365,212 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,998,945 UART:
22,999,328 UART: Running Caliptra FMC ...
23,000,522 UART:
23,000,715 UART: [state] CFI Enabled
23,008,617 UART: [fht] FMC Alias Private Key: 7
25,339,302 UART: [art] Extend RT PCRs Done
25,340,520 UART: [art] Lock RT PCRs Done
25,341,870 UART: [art] Populate DV Done
25,347,194 UART: [fht] FMC Alias Private Key: 7
25,348,840 UART: [art] Derive CDI
25,349,785 UART: [art] Store in in slot 0x4
25,391,903 UART: [art] Derive Key Pair
25,392,899 UART: [art] Store priv key in slot 0x5
28,634,929 UART: [art] Derive Key Pair - Done
28,648,198 UART: [art] Signing Cert with AUTHO
28,649,498 UART: RITY.KEYID = 7
30,928,944 UART: [art] Erasing AUTHORITY.KEYID = 7
30,930,450 UART: [art] PUB.X = 3585AED0564F64A4C784CD8D6D8170A88C9177E99ABB5D913644C832F770187E5814137DCA6535347398C12CD02F408B
30,937,699 UART: [art] PUB.Y = C26F9F1D806AFD4331417989BF7A4331BEC4B6616FD92F32754F7D2668DDB29AD22056AC17A63BE1CB95B4115B8C89D9
30,945,143 UART: [art] SIG.R = D1354FBF9A4F7739DAB24AA4B20805C59A1589FA98B41AAB1AF0F27BD9B33A52689A1CF8C06116D2E7312D153C29420C
30,952,339 UART: [art] SIG.S = 49EC00614153114BBDBED0E9A22037AD1FC785B67FC4E10CBE90427A2E40A42075E3FD2E992027E283AC5E43108C29A4
32,257,532 UART: mbox::rt_entry...
32,258,504 UART: ____ _ _ _ ____ _____
32,260,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,262,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,264,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,266,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,268,306 UART: |_|
32,269,292 UART:
32,382,540 UART: [rt] Runtime listening for mailbox commands...
32,388,427 >>> mbox cmd response data (3272 bytes)
32,404,218 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,437,606 >>> mbox cmd response data (0 bytes)
34,495,582 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,156,377 >>> mbox cmd response: success
43,189,396 UART:
43,189,734 UART: Running Caliptra FMC ...
43,190,780 UART:
43,190,925 UART: [state] CFI Enabled
43,235,169 UART: [art] Extend RT PCRs Done
43,236,314 UART: [art] Lock RT PCRs Done
43,237,726 UART: [art] Populate DV Done
43,243,233 UART: [fht] FMC Alias Private Key: 7
43,244,712 UART: [art] Derive CDI
43,245,441 UART: [art] Store in in slot 0x4
43,288,142 UART: [art] Derive Key Pair
43,289,181 UART: [art] Store priv key in slot 0x5
46,531,190 UART: [art] Derive Key Pair - Done
46,544,037 UART: [art] Signing Cert with AUTHO
46,545,538 UART: RITY.KEYID = 7
48,824,534 UART: [art] Erasing AUTHORITY.KEYID = 7
48,826,032 UART: [art] PUB.X = EF1D0F38E0C4EBAC8D94D157F49B59FC10618CD855666453592E953A49ECDB83B7B3343EDF19C9F24FBACA4149F755CD
48,833,265 UART: [art] PUB.Y = 5CC487007DAF067D7022AE1541B12141E94831B3F055DE14062716EFF5A58A83C65D4F58E2EB00E9EDC70855D33D9808
48,840,477 UART: [art] SIG.R = 6BE6D981A150A283F72B9D0928EF325F5DEA8A2428EF6A81303D6FEC6F635D828810C836FF6910DBD19E8E20CD7C6502
48,847,911 UART: [art] SIG.S = 636805F4BB3A6BA028BDBE47B13E5F893551A93D6E51D521DFACCED488A456F7E25A92045FD03E77C1AE7E88A11C2C97
50,153,222 UART: Caliptra RT
50,153,917 UART: [state] CFI Enabled
53,669,792 UART: Disabled attest: DPE valid fail
53,671,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,672,098 UART: [rt] RT listening for mailbox commands...
53,703,593 UART: [rt]cmd =0x494e464f, len=4
53,707,651 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,187 UART:
192,544 UART: Running Caliptra ROM ...
193,752 UART:
193,917 UART: [state] CFI Enabled
263,489 UART: [state] LifecycleState = Unprovisioned
265,408 UART: [state] DebugLocked = No
266,654 UART: [state] WD Timer not started. Device not locked for debugging
270,122 UART: [kat] SHA2-256
449,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,787 UART: [kat] ++
461,322 UART: [kat] sha1
473,155 UART: [kat] SHA2-256
476,138 UART: [kat] SHA2-384
483,624 UART: [kat] SHA2-512-ACC
486,560 UART: [kat] ECC-384
2,947,676 UART: [kat] HMAC-384Kdf
2,970,584 UART: [kat] LMS
3,500,043 UART: [kat] --
3,504,149 UART: [cold-reset] ++
3,505,092 UART: [fht] FHT @ 0x50003400
3,517,594 UART: [idev] ++
3,518,199 UART: [idev] CDI.KEYID = 6
3,519,116 UART: [idev] SUBJECT.KEYID = 7
3,520,291 UART: [idev] UDS.KEYID = 0
3,521,220 ready_for_fw is high
3,521,413 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,620,543 UART: [idev] Erasing UDS.KEYID = 0
6,025,847 UART: [idev] Sha1 KeyId Algorithm
6,048,488 UART: [idev] --
6,053,508 UART: [ldev] ++
6,054,080 UART: [ldev] CDI.KEYID = 6
6,054,971 UART: [ldev] SUBJECT.KEYID = 5
6,056,183 UART: [ldev] AUTHORITY.KEYID = 7
6,057,411 UART: [ldev] FE.KEYID = 1
6,097,826 UART: [ldev] Erasing FE.KEYID = 1
8,598,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,833 UART: [ldev] --
10,388,799 UART: [fwproc] Wait for Commands...
10,390,281 UART: [fwproc] Recv command 0x46574c44
10,392,388 UART: [fwproc] Recv'd Img size: 78704 bytes
13,361,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,435,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,504,256 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,697,628 >>> mbox cmd response: success
13,698,123 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,701,960 UART: [afmc] ++
13,702,593 UART: [afmc] CDI.KEYID = 6
13,703,571 UART: [afmc] SUBJECT.KEYID = 7
13,704,674 UART: [afmc] AUTHORITY.KEYID = 5
16,227,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,951,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,953,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,969,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,985,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,000,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,023,701 UART: [afmc] --
18,028,106 UART: [cold-reset] --
18,031,104 UART: [state] Locking Datavault
18,033,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,035,630 UART: [state] Locking ICCM
18,037,563 UART: [exit] Launching FMC @ 0x40000130
18,045,959 UART:
18,046,211 UART: Running Caliptra FMC ...
18,047,314 UART:
18,047,473 UART: [state] CFI Enabled
18,108,447 UART: [fht] FMC Alias Private Key: 7
19,872,240 UART: [art] Extend RT PCRs Done
19,873,464 UART: [art] Lock RT PCRs Done
19,875,500 UART: [art] Populate DV Done
19,880,859 UART: [fht] FMC Alias Private Key: 7
19,882,505 UART: [art] Derive CDI
19,883,323 UART: [art] Store in in slot 0x4
19,941,155 UART: [art] Derive Key Pair
19,942,198 UART: [art] Store priv key in slot 0x5
22,405,949 UART: [art] Derive Key Pair - Done
22,418,735 UART: [art] Signing Cert with AUTHO
22,420,043 UART: RITY.KEYID = 7
24,131,780 UART: [art] Erasing AUTHORITY.KEYID = 7
24,133,307 UART: [art] PUB.X = CFC5E6B9BDFACBD1616D3469F65CB6E9BB610AACF085584D530706F906B67C95AF0FE7F93A6F2CF473D77EB68C0D6839
24,140,613 UART: [art] PUB.Y = FC6BFF5A02C06A3C2E87279F1FD7E8F17BFB5B99E55B534F6F47D1FA5A37AABD1F0887C3AC438972D4D6DE0470144451
24,147,899 UART: [art] SIG.R = 2731288D39094D7F56F42BB3FA9F786CF8C7C6E572303EDD3B35AFF998E4CC27AA38441CCDACA2BEE6E6E611AC6D2470
24,155,326 UART: [art] SIG.S = 1261A5194864FAB5456757A13D5B4B03FD4B2B57FC433692D268CCF1B157F02B21446F132370002CFAE362050169D750
25,133,573 UART: mbox::rt_entry...
25,134,541 UART: ____ _ _ _ ____ _____
25,136,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,138,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,140,342 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,142,274 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,144,320 UART: |_|
25,145,131 UART:
25,257,670 UART: [rt] Runtime listening for mailbox commands...
25,263,516 >>> mbox cmd response data (3272 bytes)
25,279,420 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,312,832 >>> mbox cmd response data (0 bytes)
27,373,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,518,604 UART:
27,518,965 UART: Running Caliptra ROM ...
27,520,013 UART:
27,520,175 UART: [state] CFI Enabled
27,581,659 UART: [state] LifecycleState = Unprovisioned
27,583,498 UART: [state] DebugLocked = No
27,585,370 UART: [state] WD Timer not started. Device not locked for debugging
27,588,676 UART: [kat] SHA2-256
27,767,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,779,368 UART: [kat] ++
27,779,912 UART: [kat] sha1
27,791,940 UART: [kat] SHA2-256
27,794,946 UART: [kat] SHA2-384
27,801,199 UART: [kat] SHA2-512-ACC
27,804,135 UART: [kat] ECC-384
30,270,640 UART: [kat] HMAC-384Kdf
30,291,895 UART: [kat] LMS
30,821,304 UART: [kat] --
30,827,557 UART: [update-reset] ++
34,261,104 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,265,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,648,595 >>> mbox cmd response: success
34,653,163 UART: [update-reset] Copying MAN_2 To MAN_1
34,672,437 UART: [update-reset Success] --
34,677,928 UART: [state] Locking Datavault
34,682,320 UART: [state] Locking PCR0, PCR1 and PCR31
34,683,974 UART: [state] Locking ICCM
34,685,289 UART: [exit] Launching FMC @ 0x40000130
34,693,736 UART:
34,693,964 UART: Running Caliptra FMC ...
34,695,239 UART:
34,695,398 UART: [state] CFI Enabled
34,781,247 UART: [art] Extend RT PCRs Done
34,782,443 UART: [art] Lock RT PCRs Done
34,783,758 UART: [art] Populate DV Done
34,789,477 UART: [fht] FMC Alias Private Key: 7
34,791,069 UART: [art] Derive CDI
34,791,911 UART: [art] Store in in slot 0x4
34,851,008 UART: [art] Derive Key Pair
34,852,012 UART: [art] Store priv key in slot 0x5
37,314,537 UART: [art] Derive Key Pair - Done
37,327,757 UART: [art] Signing Cert with AUTHO
37,329,064 UART: RITY.KEYID = 7
39,040,121 UART: [art] Erasing AUTHORITY.KEYID = 7
39,041,636 UART: [art] PUB.X = F3F0DF8A31968999A5D28E8373E3ED928A7BF04F887C43DECA79A4F40FB8AB530C5E32D386BF0D72CBBD637251A5372E
39,048,952 UART: [art] PUB.Y = E975A2C6A41220059421873FA8A7BF7B90CF5967B3365517785AA938CB6FD8A33116FC97CA7F512F98E893B22A4993E6
39,056,187 UART: [art] SIG.R = F62F7F1D3D99FA105D563612C824C9706D49450EA448DDB29071C9C816A43585990F7EA58C0CD4DF922F5596E6CB78D5
39,063,585 UART: [art] SIG.S = 791FA34BA6794E83D0A83D5164F224E5058CCF81FCD4C091BF111D57FC732650FC5146C18EF6CD7B4D17C1266F9EB30D
40,042,790 UART: Caliptra RT
40,043,509 UART: [state] CFI Enabled
42,838,091 UART: Disabled attest: DPE valid fail
42,839,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,840,525 UART: [rt] RT listening for mailbox commands...
42,871,836 UART: [rt]cmd =0x494e464f, len=4
42,875,892 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,357,890 ready_for_fw is high
3,358,287 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,499,692 >>> mbox cmd response: success
13,500,372 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,786,839 UART:
17,787,234 UART: Running Caliptra FMC ...
17,788,397 UART:
17,788,554 UART: [state] CFI Enabled
17,855,136 UART: [fht] FMC Alias Private Key: 7
19,619,267 UART: [art] Extend RT PCRs Done
19,620,483 UART: [art] Lock RT PCRs Done
19,622,135 UART: [art] Populate DV Done
19,627,769 UART: [fht] FMC Alias Private Key: 7
19,629,416 UART: [art] Derive CDI
19,630,150 UART: [art] Store in in slot 0x4
19,688,518 UART: [art] Derive Key Pair
19,689,578 UART: [art] Store priv key in slot 0x5
22,152,521 UART: [art] Derive Key Pair - Done
22,165,569 UART: [art] Signing Cert with AUTHO
22,166,871 UART: RITY.KEYID = 7
23,877,964 UART: [art] Erasing AUTHORITY.KEYID = 7
23,879,465 UART: [art] PUB.X = 347C340EA2F5C96443B4A0270C7418AF0AA83516A7482240B83C97333DDCA6C170565AF2BD60A99CF3FCFE5794F258AA
23,886,749 UART: [art] PUB.Y = 6F2CA716D36E8A417242CE20B9FF2AE26FFE39C7298AF66BBFCCEB23A54D3C9E1CB136D9E0F02CFDDB7D0D043047DB39
23,893,996 UART: [art] SIG.R = E7B1A83A16F2661E6B275C2C78BC8D8F015D2058B0E75124CDB5374C32592152B29A6C7DA01549E25BC9CA8DB0DA7F04
23,901,401 UART: [art] SIG.S = B18D7B9CA67382B9BE10D2FEE2A4ABC470A3BD71EED0297088A14A0B4374995BC4C1DDEBC7E30DC42D1D3A01DBA1B602
24,879,864 UART: mbox::rt_entry...
24,880,827 UART: ____ _ _ _ ____ _____
24,882,751 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,884,758 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,886,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,888,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,890,455 UART: |_|
24,891,353 UART:
25,004,068 UART: [rt] Runtime listening for mailbox commands...
25,009,915 >>> mbox cmd response data (3272 bytes)
25,025,554 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,058,932 >>> mbox cmd response data (0 bytes)
27,116,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,257,361 >>> mbox cmd response: success
34,290,316 UART:
34,290,659 UART: Running Caliptra FMC ...
34,291,790 UART:
34,291,967 UART: [state] CFI Enabled
34,382,680 UART: [art] Extend RT PCRs Done
34,383,886 UART: [art] Lock RT PCRs Done
34,385,452 UART: [art] Populate DV Done
34,391,030 UART: [fht] FMC Alias Private Key: 7
34,392,570 UART: [art] Derive CDI
34,393,381 UART: [art] Store in in slot 0x4
34,451,940 UART: [art] Derive Key Pair
34,452,972 UART: [art] Store priv key in slot 0x5
36,916,122 UART: [art] Derive Key Pair - Done
36,928,759 UART: [art] Signing Cert with AUTHO
36,930,096 UART: RITY.KEYID = 7
38,642,238 UART: [art] Erasing AUTHORITY.KEYID = 7
38,643,734 UART: [art] PUB.X = 42AA9E4F269047851924340E726F2A62034DEECAC8F517FA14B2D52D61168014EDE53A7B9F9AC3EF67313B1A91D44517
38,650,993 UART: [art] PUB.Y = 828DD914433DD6E44C540A04B01C3BB28ACCE17C5E8595679A55FA0592D590E96CB6624DBC9E8C6DEE184DF5D9A43678
38,658,281 UART: [art] SIG.R = 5D5C23BA402B26F08EB22D3F608D23AA69D8676B054B18616A4748098CE4AC66C71DB71C5B67AC05062C1F6B877E98F2
38,665,629 UART: [art] SIG.S = 0B2C3D840589D895694DC8B262692340877AE9D9A47CDFAAE8CC4AD0251789C96D2C0444D53236FC7CE3AAACAEB02CC4
39,644,142 UART: Caliptra RT
39,645,097 UART: [state] CFI Enabled
42,419,083 UART: Disabled attest: DPE valid fail
42,420,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,421,623 UART: [rt] RT listening for mailbox commands...
42,453,034 UART: [rt]cmd =0x494e464f, len=4
42,456,912 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,390 UART:
192,760 UART: Running Caliptra ROM ...
193,840 UART:
603,486 UART: [state] CFI Enabled
614,607 UART: [state] LifecycleState = Unprovisioned
616,474 UART: [state] DebugLocked = No
618,128 UART: [state] WD Timer not started. Device not locked for debugging
621,234 UART: [kat] SHA2-256
800,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,931 UART: [kat] ++
812,373 UART: [kat] sha1
822,951 UART: [kat] SHA2-256
825,983 UART: [kat] SHA2-384
831,791 UART: [kat] SHA2-512-ACC
834,725 UART: [kat] ECC-384
3,275,140 UART: [kat] HMAC-384Kdf
3,288,020 UART: [kat] LMS
3,817,491 UART: [kat] --
3,820,597 UART: [cold-reset] ++
3,822,946 UART: [fht] FHT @ 0x50003400
3,833,982 UART: [idev] ++
3,834,532 UART: [idev] CDI.KEYID = 6
3,835,406 UART: [idev] SUBJECT.KEYID = 7
3,836,636 UART: [idev] UDS.KEYID = 0
3,837,706 ready_for_fw is high
3,837,915 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,936,880 UART: [idev] Erasing UDS.KEYID = 0
6,313,372 UART: [idev] Sha1 KeyId Algorithm
6,335,861 UART: [idev] --
6,339,142 UART: [ldev] ++
6,339,701 UART: [ldev] CDI.KEYID = 6
6,340,602 UART: [ldev] SUBJECT.KEYID = 5
6,341,826 UART: [ldev] AUTHORITY.KEYID = 7
6,343,052 UART: [ldev] FE.KEYID = 1
6,354,029 UART: [ldev] Erasing FE.KEYID = 1
8,830,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,131 UART: [ldev] --
10,618,396 UART: [fwproc] Wait for Commands...
10,621,136 UART: [fwproc] Recv command 0x46574c44
10,623,218 UART: [fwproc] Recv'd Img size: 78704 bytes
13,590,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,660,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,729,459 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,922,489 >>> mbox cmd response: success
13,922,994 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,927,062 UART: [afmc] ++
13,927,650 UART: [afmc] CDI.KEYID = 6
13,928,556 UART: [afmc] SUBJECT.KEYID = 7
13,929,708 UART: [afmc] AUTHORITY.KEYID = 5
16,428,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,146,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,148,489 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,164,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,180,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,196,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,218,398 UART: [afmc] --
18,221,770 UART: [cold-reset] --
18,225,792 UART: [state] Locking Datavault
18,231,838 UART: [state] Locking PCR0, PCR1 and PCR31
18,233,471 UART: [state] Locking ICCM
18,235,285 UART: [exit] Launching FMC @ 0x40000130
18,243,676 UART:
18,243,905 UART: Running Caliptra FMC ...
18,244,999 UART:
18,245,145 UART: [state] CFI Enabled
18,253,210 UART: [fht] FMC Alias Private Key: 7
20,010,004 UART: [art] Extend RT PCRs Done
20,011,239 UART: [art] Lock RT PCRs Done
20,012,836 UART: [art] Populate DV Done
20,018,619 UART: [fht] FMC Alias Private Key: 7
20,020,258 UART: [art] Derive CDI
20,020,986 UART: [art] Store in in slot 0x4
20,063,790 UART: [art] Derive Key Pair
20,064,929 UART: [art] Store priv key in slot 0x5
22,491,553 UART: [art] Derive Key Pair - Done
22,504,440 UART: [art] Signing Cert with AUTHO
22,505,952 UART: RITY.KEYID = 7
24,211,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,212,608 UART: [art] PUB.X = 72EE3EFF532C67FD70FC6CBA993BA19D58DD5741BB1C3E5D9F6E81DAA39512DDF45E616D645A9262727892142410F0BA
24,219,908 UART: [art] PUB.Y = C81C31B20792AF0C31DD201EFC87B8811BD3E6438005A4C0F0E95F2B4B712ED234F40CF9210C065F027FBC2675D9E3C7
24,227,137 UART: [art] SIG.R = 322C4966595234DFDBD3226B8C849091E9434BD1AEDF2E4048D95D17AA6B44B6A7527D41F3817CF3CCA976A95443CFD8
24,234,516 UART: [art] SIG.S = 8D19C7D79B551D63233DCCD96F31D1006A5791C8E1FD3F336F5D8C3FD0E4FE70B8B5AFF41533F40BDAD6E17FED700B64
25,212,921 UART: mbox::rt_entry...
25,213,877 UART: ____ _ _ _ ____ _____
25,215,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,217,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,219,631 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,221,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,223,420 UART: |_|
25,224,297 UART:
25,337,395 UART: [rt] Runtime listening for mailbox commands...
25,343,240 >>> mbox cmd response data (3272 bytes)
25,359,020 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,392,440 >>> mbox cmd response data (0 bytes)
27,453,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,598,148 UART:
27,598,641 UART: Running Caliptra ROM ...
27,599,692 UART:
27,599,831 UART: [state] CFI Enabled
27,614,936 UART: [state] LifecycleState = Unprovisioned
27,616,823 UART: [state] DebugLocked = No
27,619,360 UART: [state] WD Timer not started. Device not locked for debugging
27,622,483 UART: [kat] SHA2-256
27,801,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,813,248 UART: [kat] ++
27,813,701 UART: [kat] sha1
27,825,655 UART: [kat] SHA2-256
27,828,664 UART: [kat] SHA2-384
27,834,541 UART: [kat] SHA2-512-ACC
27,837,478 UART: [kat] ECC-384
30,276,487 UART: [kat] HMAC-384Kdf
30,289,576 UART: [kat] LMS
30,819,086 UART: [kat] --
30,824,753 UART: [update-reset] ++
34,247,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,249,804 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,633,100 >>> mbox cmd response: success
34,637,717 UART: [update-reset] Copying MAN_2 To MAN_1
34,655,752 UART: [update-reset Success] --
34,659,360 UART: [state] Locking Datavault
34,662,772 UART: [state] Locking PCR0, PCR1 and PCR31
34,664,414 UART: [state] Locking ICCM
34,665,838 UART: [exit] Launching FMC @ 0x40000130
34,673,911 UART:
34,674,150 UART: Running Caliptra FMC ...
34,675,646 UART:
34,675,806 UART: [state] CFI Enabled
34,719,871 UART: [art] Extend RT PCRs Done
34,721,016 UART: [art] Lock RT PCRs Done
34,722,463 UART: [art] Populate DV Done
34,728,098 UART: [fht] FMC Alias Private Key: 7
34,729,793 UART: [art] Derive CDI
34,730,598 UART: [art] Store in in slot 0x4
34,773,123 UART: [art] Derive Key Pair
34,774,169 UART: [art] Store priv key in slot 0x5
37,200,314 UART: [art] Derive Key Pair - Done
37,213,365 UART: [art] Signing Cert with AUTHO
37,214,670 UART: RITY.KEYID = 7
38,920,265 UART: [art] Erasing AUTHORITY.KEYID = 7
38,921,773 UART: [art] PUB.X = 25134C3FEB9D331F2E9DFE55A401B109BA2D46CC843C2A9EBF955ED8A3AB8569B650F6394201DE09C56D16E390BEB26B
38,929,068 UART: [art] PUB.Y = B1F8D66BA6336DE3B721E5501AB84C9A7E2AA351339C43A6449D16243939034826E45C08496FD20E1BF9D0747544B7DE
38,936,262 UART: [art] SIG.R = 816A9A8603BA6E8B90324733EEE71ABF275851A6ADFAE59AFB248137495A302DCAA78252EF22877C345F145DF4DAF932
38,943,693 UART: [art] SIG.S = E977B0A15396F21DFEA6E05423778FA01132A3DB3119172A2F33910688EF39A536B538138584E90D32343A4322B23173
39,922,723 UART: Caliptra RT
39,923,441 UART: [state] CFI Enabled
42,623,266 UART: Disabled attest: DPE valid fail
42,624,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,626,109 UART: [rt] RT listening for mailbox commands...
42,657,377 UART: [rt]cmd =0x494e464f, len=4
42,661,537 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,697,948 ready_for_fw is high
3,698,562 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,715,181 >>> mbox cmd response: success
13,715,827 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,970,375 UART:
17,970,758 UART: Running Caliptra FMC ...
17,971,942 UART:
17,972,096 UART: [state] CFI Enabled
17,980,196 UART: [fht] FMC Alias Private Key: 7
19,736,545 UART: [art] Extend RT PCRs Done
19,737,775 UART: [art] Lock RT PCRs Done
19,739,400 UART: [art] Populate DV Done
19,744,764 UART: [fht] FMC Alias Private Key: 7
19,746,321 UART: [art] Derive CDI
19,747,136 UART: [art] Store in in slot 0x4
19,789,383 UART: [art] Derive Key Pair
19,790,388 UART: [art] Store priv key in slot 0x5
22,217,149 UART: [art] Derive Key Pair - Done
22,230,190 UART: [art] Signing Cert with AUTHO
22,231,527 UART: RITY.KEYID = 7
23,937,005 UART: [art] Erasing AUTHORITY.KEYID = 7
23,938,515 UART: [art] PUB.X = 981A618579BAFC625952435934E7E9DB7A923424F1A5EEA9351DBEB803F2C94C14C0B7839414BFCE4309C9A621077D60
23,945,756 UART: [art] PUB.Y = C59C1ECCE5ABC62C314EBE5DFB4CF078C549261E7F02D542C0E427D18EE6E8CDEDEA293F97FA32D10928A063DF950B42
23,953,056 UART: [art] SIG.R = A4A3202B8FF1031754A8EC0064574C4C1C043EE2CA98005F9C209651BD37DE09E1B5B39C435FB6B0107C247CF2C91D7F
23,960,395 UART: [art] SIG.S = C2246D4AFF1F2FA0CFEA2E75553271F4D8400314A5D178A4A72D8BF205B19EDCFEC7ED2A89871A1599E2AB0FEBBE7F47
24,938,750 UART: mbox::rt_entry...
24,939,690 UART: ____ _ _ _ ____ _____
24,941,776 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,943,773 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,945,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,947,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,949,832 UART: |_|
24,950,641 UART:
25,064,192 UART: [rt] Runtime listening for mailbox commands...
25,070,071 >>> mbox cmd response data (3272 bytes)
25,085,830 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,119,253 >>> mbox cmd response data (0 bytes)
27,187,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,241,091 >>> mbox cmd response: success
34,275,575 UART:
34,275,878 UART: Running Caliptra FMC ...
34,276,939 UART:
34,277,082 UART: [state] CFI Enabled
34,321,447 UART: [art] Extend RT PCRs Done
34,322,632 UART: [art] Lock RT PCRs Done
34,323,950 UART: [art] Populate DV Done
34,329,678 UART: [fht] FMC Alias Private Key: 7
34,331,327 UART: [art] Derive CDI
34,332,056 UART: [art] Store in in slot 0x4
34,374,967 UART: [art] Derive Key Pair
34,375,961 UART: [art] Store priv key in slot 0x5
36,802,707 UART: [art] Derive Key Pair - Done
36,815,667 UART: [art] Signing Cert with AUTHO
36,816,966 UART: RITY.KEYID = 7
38,522,341 UART: [art] Erasing AUTHORITY.KEYID = 7
38,523,850 UART: [art] PUB.X = D1F605AEAFE1C4DECB784EA1FDD1F7B990873A55997B024B65D11756B1A95F9EE58EF16003E8475A0D669D73793A1455
38,531,142 UART: [art] PUB.Y = 0617B38AA2C960D9549969080DB76EF557AFCBF97E9A7A972A643A8AED52031B5C41B0729663D681CC5A81906189D7DD
38,538,377 UART: [art] SIG.R = E6C6D5AFE3233F2522EB26A8B7847E2DB834A58B736E16BD2D4F89B029116C77DDDD7A89EC6235314A6D5D03D44A35C3
38,545,791 UART: [art] SIG.S = C09C2EF35309D9178959EE0B71A574211E12D7A0D1BD13FDD4E8145BC826F750B3BE5F9E2A73724E57DB1A8FEBF4E8A8
39,525,196 UART: Caliptra RT
39,525,880 UART: [state] CFI Enabled
42,229,437 UART: Disabled attest: DPE valid fail
42,231,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,232,128 UART: [rt] RT listening for mailbox commands...
42,263,176 UART: [rt]cmd =0x494e464f, len=4
42,267,171 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,101 UART:
192,458 UART: Running Caliptra ROM ...
193,643 UART:
193,799 UART: [state] CFI Enabled
265,107 UART: [state] LifecycleState = Unprovisioned
267,539 UART: [state] DebugLocked = No
269,009 UART: [state] WD Timer not started. Device not locked for debugging
274,188 UART: [kat] SHA2-256
464,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,833 UART: [kat] ++
475,328 UART: [kat] sha1
486,414 UART: [kat] SHA2-256
489,418 UART: [kat] SHA2-384
495,264 UART: [kat] SHA2-512-ACC
497,850 UART: [kat] ECC-384
2,951,374 UART: [kat] HMAC-384Kdf
2,975,745 UART: [kat] LMS
3,507,558 UART: [kat] --
3,510,202 UART: [cold-reset] ++
3,511,776 UART: [fht] FHT @ 0x50003400
3,522,164 UART: [idev] ++
3,522,836 UART: [idev] CDI.KEYID = 6
3,523,802 UART: [idev] SUBJECT.KEYID = 7
3,524,982 UART: [idev] UDS.KEYID = 0
3,525,912 ready_for_fw is high
3,526,127 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,625,322 UART: [idev] Erasing UDS.KEYID = 0
6,031,453 UART: [idev] Sha1 KeyId Algorithm
6,053,281 UART: [idev] --
6,058,467 UART: [ldev] ++
6,059,205 UART: [ldev] CDI.KEYID = 6
6,060,120 UART: [ldev] SUBJECT.KEYID = 5
6,061,281 UART: [ldev] AUTHORITY.KEYID = 7
6,062,456 UART: [ldev] FE.KEYID = 1
6,103,948 UART: [ldev] Erasing FE.KEYID = 1
8,609,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,544 UART: [ldev] --
10,415,655 UART: [fwproc] Wait for Commands...
10,417,271 UART: [fwproc] Recv command 0x46574c44
10,419,581 UART: [fwproc] Recv'd Img size: 78704 bytes
13,423,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,497,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,613,486 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,942,455 >>> mbox cmd response: success
13,942,934 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,946,099 UART: [afmc] ++
13,946,819 UART: [afmc] CDI.KEYID = 6
13,948,011 UART: [afmc] SUBJECT.KEYID = 7
13,949,446 UART: [afmc] AUTHORITY.KEYID = 5
16,489,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,214,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,216,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,232,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,247,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,262,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,286,303 UART: [afmc] --
18,289,956 UART: [cold-reset] --
18,292,361 UART: [state] Locking Datavault
18,297,611 UART: [state] Locking PCR0, PCR1 and PCR31
18,299,811 UART: [state] Locking ICCM
18,302,069 UART: [exit] Launching FMC @ 0x40000130
18,310,742 UART:
18,310,974 UART: Running Caliptra FMC ...
18,312,069 UART:
18,312,226 UART: [state] CFI Enabled
18,369,935 UART: [fht] FMC Alias Private Key: 7
20,134,603 UART: [art] Extend RT PCRs Done
20,135,827 UART: [art] Lock RT PCRs Done
20,137,463 UART: [art] Populate DV Done
20,142,925 UART: [fht] FMC Alias Private Key: 7
20,144,568 UART: [art] Derive CDI
20,145,379 UART: [art] Store in in slot 0x4
20,202,669 UART: [art] Derive Key Pair
20,203,716 UART: [art] Store priv key in slot 0x5
22,666,933 UART: [art] Derive Key Pair - Done
22,679,877 UART: [art] Signing Cert with AUTHO
22,681,175 UART: RITY.KEYID = 7
24,392,736 UART: [art] Erasing AUTHORITY.KEYID = 7
24,394,370 UART: [art] PUB.X = 23C4CF4FC6284E9529A4977D9779BB43261CADEF647F5B8766170208514A90E1D2BA09933F9A4085391BA867372D6FA1
24,401,508 UART: [art] PUB.Y = 27AAFC23F7BD15430B5182B1FCCBE4B4234E0A92FC959DD8B7E816FF69B2F8ADDADDAE8EEB074272740BC9A242CE2665
24,408,787 UART: [art] SIG.R = 3361025D4D852DCC64172D60280ECD99B13DDDEEAFB0B32752536C9928BD37490066C07200A7AD1F0EFBE29503E7C3E3
24,416,190 UART: [art] SIG.S = D3EBC5AB65FB4F5E4728E36BC19575D0BABED2D16A3EF09E58501DF37F0139D05D0E1FB05ECB73A2267BC25A0ADDD97A
25,394,861 UART: mbox::rt_entry...
25,395,826 UART: ____ _ _ _ ____ _____
25,397,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,399,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,401,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,403,723 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,405,653 UART: |_|
25,406,461 UART:
25,519,926 UART: [rt] Runtime listening for mailbox commands...
25,525,736 >>> mbox cmd response data (3272 bytes)
25,541,458 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,574,853 >>> mbox cmd response data (0 bytes)
27,646,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,790,822 UART:
27,791,199 UART: Running Caliptra ROM ...
27,792,337 UART:
27,792,509 UART: [state] CFI Enabled
27,866,795 UART: [state] LifecycleState = Unprovisioned
27,868,901 UART: [state] DebugLocked = No
27,871,638 UART: [state] WD Timer not started. Device not locked for debugging
27,876,962 UART: [kat] SHA2-256
28,066,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,077,587 UART: [kat] ++
28,078,096 UART: [kat] sha1
28,089,098 UART: [kat] SHA2-256
28,092,097 UART: [kat] SHA2-384
28,097,399 UART: [kat] SHA2-512-ACC
28,099,972 UART: [kat] ECC-384
30,551,960 UART: [kat] HMAC-384Kdf
30,574,562 UART: [kat] LMS
31,106,103 UART: [kat] --
31,111,919 UART: [update-reset] ++
34,563,174 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,566,004 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,174,210 >>> mbox cmd response: success
35,178,747 UART: [update-reset] Copying MAN_2 To MAN_1
35,213,099 UART: [update-reset Success] --
35,216,655 UART: [state] Locking Datavault
35,220,145 UART: [state] Locking PCR0, PCR1 and PCR31
35,222,290 UART: [state] Locking ICCM
35,224,070 UART: [exit] Launching FMC @ 0x40000130
35,232,695 UART:
35,232,928 UART: Running Caliptra FMC ...
35,234,083 UART:
35,234,243 UART: [state] CFI Enabled
35,323,634 UART: [art] Extend RT PCRs Done
35,324,825 UART: [art] Lock RT PCRs Done
35,326,443 UART: [art] Populate DV Done
35,332,169 UART: [fht] FMC Alias Private Key: 7
35,333,703 UART: [art] Derive CDI
35,334,514 UART: [art] Store in in slot 0x4
35,392,792 UART: [art] Derive Key Pair
35,393,838 UART: [art] Store priv key in slot 0x5
37,856,166 UART: [art] Derive Key Pair - Done
37,869,231 UART: [art] Signing Cert with AUTHO
37,870,540 UART: RITY.KEYID = 7
39,582,107 UART: [art] Erasing AUTHORITY.KEYID = 7
39,583,611 UART: [art] PUB.X = 6C05294A21190DF023C14409EEF71682A4C72764740B8DF7CA884BD969D80E5F75C60A989C043E190CCB5F1A2DC99E9F
39,590,871 UART: [art] PUB.Y = CA5122D6CDE63AB7B50503377C4A0354FB89539C2F9C856DB814E5CCF8152EDB7CEBF2F3C3330B66405AC4C825D65563
39,598,131 UART: [art] SIG.R = A1C1D8DF1DE2DF0ED15C0C12FED00F15D7342C8D6DEDAC9EA12F77128119A12DAE4634B2194EDA96DE0F514C925FCDAF
39,605,530 UART: [art] SIG.S = 244D2CB62E4D574FB28276AA086BDF37ACEA77CF6E5D0DAD3CABF933D334408F95ACD06467D8E55582B703813E187D82
40,583,832 UART: Caliptra RT
40,584,543 UART: [state] CFI Enabled
43,379,603 UART: Disabled attest: DPE valid fail
43,381,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,382,210 UART: [rt] RT listening for mailbox commands...
43,413,590 UART: [rt]cmd =0x494e464f, len=4
43,417,493 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,436,601 ready_for_fw is high
3,437,441 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,971,057 >>> mbox cmd response: success
13,971,945 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,259,989 UART:
18,260,396 UART: Running Caliptra FMC ...
18,261,504 UART:
18,261,656 UART: [state] CFI Enabled
18,329,068 UART: [fht] FMC Alias Private Key: 7
20,092,859 UART: [art] Extend RT PCRs Done
20,094,089 UART: [art] Lock RT PCRs Done
20,095,964 UART: [art] Populate DV Done
20,101,460 UART: [fht] FMC Alias Private Key: 7
20,102,952 UART: [art] Derive CDI
20,103,687 UART: [art] Store in in slot 0x4
20,161,732 UART: [art] Derive Key Pair
20,162,772 UART: [art] Store priv key in slot 0x5
22,625,861 UART: [art] Derive Key Pair - Done
22,638,802 UART: [art] Signing Cert with AUTHO
22,640,104 UART: RITY.KEYID = 7
24,352,208 UART: [art] Erasing AUTHORITY.KEYID = 7
24,353,710 UART: [art] PUB.X = B4A508638EB95790ED6968D098656421C3AB73028AD6A257E810B1B0BAC1CE30A7AF8AB37895243E895C08309CA1A530
24,360,987 UART: [art] PUB.Y = ED97EF2F0D5ED14C75FDD9A20E1957632656E23A60FC848BC9374B209F0FB89A1F673963D1B58F7B46743C679CAFC801
24,368,226 UART: [art] SIG.R = 7280D45C4926C1CE6C128345074B6B90EC09E835A41AB8F424AD5429224847AE6AEBA2F259566C6909BD51ADDA0F17AA
24,375,617 UART: [art] SIG.S = 4EFB40F5BC3F4621523C282DB49586C50E38D0AF1948AF8FC474534CBF1EFF8D6EBF92BA421C44633171AC2751FE8E8D
25,353,889 UART: mbox::rt_entry...
25,354,838 UART: ____ _ _ _ ____ _____
25,356,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,358,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,360,764 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,362,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,364,658 UART: |_|
25,365,470 UART:
25,478,869 UART: [rt] Runtime listening for mailbox commands...
25,484,698 >>> mbox cmd response data (3272 bytes)
25,500,391 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,533,784 >>> mbox cmd response data (0 bytes)
27,595,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,407,532 >>> mbox cmd response: success
35,441,592 UART:
35,441,923 UART: Running Caliptra FMC ...
35,443,048 UART:
35,443,222 UART: [state] CFI Enabled
35,540,492 UART: [art] Extend RT PCRs Done
35,541,682 UART: [art] Lock RT PCRs Done
35,543,153 UART: [art] Populate DV Done
35,548,556 UART: [fht] FMC Alias Private Key: 7
35,550,099 UART: [art] Derive CDI
35,550,912 UART: [art] Store in in slot 0x4
35,609,514 UART: [art] Derive Key Pair
35,610,557 UART: [art] Store priv key in slot 0x5
38,073,664 UART: [art] Derive Key Pair - Done
38,086,936 UART: [art] Signing Cert with AUTHO
38,088,247 UART: RITY.KEYID = 7
39,799,391 UART: [art] Erasing AUTHORITY.KEYID = 7
39,800,895 UART: [art] PUB.X = CD81BAF8B8D32CF21AD08059E4833E0190500CB35D964E8516D0F60DE73122CCE0D47BB7168A6284D206334E29AF8D51
39,808,159 UART: [art] PUB.Y = E336ECEA7A5B8E856471AEA6FA27CFD2233DB9CE6F6663A96E3B642E7C0E6250A300E6A6E40CCA4C1B0ABA0821E60C39
39,815,391 UART: [art] SIG.R = FB6F78BEA06A20166160058CA1967239D1310B0BCAC35DC1990756B8EC5BD6E741E22E51EF5B20519FB0CE4D408A67E8
39,822,780 UART: [art] SIG.S = 69F0D6B68B517E4396E16C5A5067CCA4A61682FFB8302BA47B976DCDA21CF1C7414E909FE1306DC82370FFA8BF55CE28
40,801,442 UART: Caliptra RT
40,802,146 UART: [state] CFI Enabled
43,597,026 UART: Disabled attest: DPE valid fail
43,598,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,599,584 UART: [rt] RT listening for mailbox commands...
43,630,746 UART: [rt]cmd =0x494e464f, len=4
43,634,642 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,454 UART:
192,811 UART: Running Caliptra ROM ...
193,980 UART:
603,649 UART: [state] CFI Enabled
620,244 UART: [state] LifecycleState = Unprovisioned
622,644 UART: [state] DebugLocked = No
624,015 UART: [state] WD Timer not started. Device not locked for debugging
628,356 UART: [kat] SHA2-256
818,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,029 UART: [kat] ++
829,549 UART: [kat] sha1
840,554 UART: [kat] SHA2-256
843,554 UART: [kat] SHA2-384
848,680 UART: [kat] SHA2-512-ACC
851,305 UART: [kat] ECC-384
3,294,181 UART: [kat] HMAC-384Kdf
3,308,275 UART: [kat] LMS
3,840,057 UART: [kat] --
3,844,402 UART: [cold-reset] ++
3,846,605 UART: [fht] FHT @ 0x50003400
3,858,134 UART: [idev] ++
3,858,829 UART: [idev] CDI.KEYID = 6
3,859,850 UART: [idev] SUBJECT.KEYID = 7
3,860,961 UART: [idev] UDS.KEYID = 0
3,861,897 ready_for_fw is high
3,862,102 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,961,068 UART: [idev] Erasing UDS.KEYID = 0
6,336,384 UART: [idev] Sha1 KeyId Algorithm
6,359,228 UART: [idev] --
6,364,290 UART: [ldev] ++
6,364,956 UART: [ldev] CDI.KEYID = 6
6,365,883 UART: [ldev] SUBJECT.KEYID = 5
6,367,083 UART: [ldev] AUTHORITY.KEYID = 7
6,368,306 UART: [ldev] FE.KEYID = 1
6,377,304 UART: [ldev] Erasing FE.KEYID = 1
8,858,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,091 UART: [ldev] --
10,649,779 UART: [fwproc] Wait for Commands...
10,651,972 UART: [fwproc] Recv command 0x46574c44
10,654,266 UART: [fwproc] Recv'd Img size: 78704 bytes
13,665,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,744,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,860,481 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,188,347 >>> mbox cmd response: success
14,188,801 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,192,935 UART: [afmc] ++
14,193,631 UART: [afmc] CDI.KEYID = 6
14,194,816 UART: [afmc] SUBJECT.KEYID = 7
14,196,297 UART: [afmc] AUTHORITY.KEYID = 5
16,698,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,420,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,422,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,437,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,453,019 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,468,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,490,445 UART: [afmc] --
18,493,765 UART: [cold-reset] --
18,497,243 UART: [state] Locking Datavault
18,504,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,506,881 UART: [state] Locking ICCM
18,509,728 UART: [exit] Launching FMC @ 0x40000130
18,518,391 UART:
18,518,617 UART: Running Caliptra FMC ...
18,519,707 UART:
18,519,856 UART: [state] CFI Enabled
18,527,649 UART: [fht] FMC Alias Private Key: 7
20,284,477 UART: [art] Extend RT PCRs Done
20,285,718 UART: [art] Lock RT PCRs Done
20,287,796 UART: [art] Populate DV Done
20,293,094 UART: [fht] FMC Alias Private Key: 7
20,294,774 UART: [art] Derive CDI
20,295,591 UART: [art] Store in in slot 0x4
20,338,390 UART: [art] Derive Key Pair
20,339,383 UART: [art] Store priv key in slot 0x5
22,765,743 UART: [art] Derive Key Pair - Done
22,778,651 UART: [art] Signing Cert with AUTHO
22,780,006 UART: RITY.KEYID = 7
24,485,381 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,877 UART: [art] PUB.X = 0B2086A5CEB7C83E4C3CAF0AB9B08698E60A1C861DBD99EA0A58FF9155091C604B2D0992154597B74C90A4B9C4EE34FA
24,494,164 UART: [art] PUB.Y = 0E274F1A9436C8931A6F009913D7CA52AA399D5938B0C8EBFE2ADC81551168B047023E69351EA7F6CC036012A0F8E69F
24,501,388 UART: [art] SIG.R = 84A72188D41B6933C108E6A27EDF368301FB69A90C4E52AB72312840C6F4C7E6C58DAB60341A32B16EFFF86CDD5FF876
24,508,820 UART: [art] SIG.S = 0225ACDBAE984DE7BA1BC32502C8E267557B319F9BD545BD591554F83DD9E4DE8A6971213043FF1D8090DEE95C2D919E
25,487,081 UART: mbox::rt_entry...
25,488,051 UART: ____ _ _ _ ____ _____
25,490,233 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,492,243 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,494,172 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,496,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,498,023 UART: |_|
25,498,823 UART:
25,611,936 UART: [rt] Runtime listening for mailbox commands...
25,617,777 >>> mbox cmd response data (3272 bytes)
25,633,336 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,666,744 >>> mbox cmd response data (0 bytes)
27,723,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,868,666 UART:
27,869,042 UART: Running Caliptra ROM ...
27,870,087 UART:
27,870,299 UART: [state] CFI Enabled
27,883,754 UART: [state] LifecycleState = Unprovisioned
27,885,640 UART: [state] DebugLocked = No
27,888,364 UART: [state] WD Timer not started. Device not locked for debugging
27,893,674 UART: [kat] SHA2-256
28,083,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,094,296 UART: [kat] ++
28,094,849 UART: [kat] sha1
28,106,920 UART: [kat] SHA2-256
28,109,936 UART: [kat] SHA2-384
28,116,134 UART: [kat] SHA2-512-ACC
28,118,770 UART: [kat] ECC-384
30,557,614 UART: [kat] HMAC-384Kdf
30,570,383 UART: [kat] LMS
31,101,982 UART: [kat] --
31,106,722 UART: [update-reset] ++
34,565,011 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,569,247 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,177,467 >>> mbox cmd response: success
35,181,996 UART: [update-reset] Copying MAN_2 To MAN_1
35,216,821 UART: [update-reset Success] --
35,219,521 UART: [state] Locking Datavault
35,222,680 UART: [state] Locking PCR0, PCR1 and PCR31
35,224,845 UART: [state] Locking ICCM
35,227,376 UART: [exit] Launching FMC @ 0x40000130
35,236,054 UART:
35,236,291 UART: Running Caliptra FMC ...
35,237,446 UART:
35,237,603 UART: [state] CFI Enabled
35,281,257 UART: [art] Extend RT PCRs Done
35,282,446 UART: [art] Lock RT PCRs Done
35,283,844 UART: [art] Populate DV Done
35,289,244 UART: [fht] FMC Alias Private Key: 7
35,290,829 UART: [art] Derive CDI
35,291,634 UART: [art] Store in in slot 0x4
35,334,311 UART: [art] Derive Key Pair
35,335,355 UART: [art] Store priv key in slot 0x5
37,762,186 UART: [art] Derive Key Pair - Done
37,774,984 UART: [art] Signing Cert with AUTHO
37,776,314 UART: RITY.KEYID = 7
39,481,612 UART: [art] Erasing AUTHORITY.KEYID = 7
39,483,115 UART: [art] PUB.X = F688A85C3696BEB85A24E220EBEFFFACDE78B38245CEC1D7BDC37DCA92725FA6572E2F09EA35242018D1E2E5F6F6A912
39,490,525 UART: [art] PUB.Y = D906BB9D554EA73ADADDE01492782B8457F40A660FA7051464EF114D79902F426A633CEDDED2C2F43F928E81333134FF
39,497,636 UART: [art] SIG.R = B7EA74B61543859BBF771CE2C11AB148BC422EDDA92272B3D97BAA7A60885B2EC0F259C11E86198BB49C601C9D642295
39,505,060 UART: [art] SIG.S = 77AF680DDF55A4DED436D8306CC60E3F4A0E49271D1A8699375EB8DE55E189B38F3B182FBCDD7005C692B29DBDDC12BB
40,484,254 UART: Caliptra RT
40,484,960 UART: [state] CFI Enabled
43,184,525 UART: Disabled attest: DPE valid fail
43,186,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,187,054 UART: [rt] RT listening for mailbox commands...
43,218,649 UART: [rt]cmd =0x494e464f, len=4
43,222,705 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,754,533 ready_for_fw is high
3,754,903 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,186,160 >>> mbox cmd response: success
14,186,721 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,441,505 UART:
18,441,899 UART: Running Caliptra FMC ...
18,443,016 UART:
18,443,166 UART: [state] CFI Enabled
18,451,110 UART: [fht] FMC Alias Private Key: 7
20,207,706 UART: [art] Extend RT PCRs Done
20,208,929 UART: [art] Lock RT PCRs Done
20,210,845 UART: [art] Populate DV Done
20,216,096 UART: [fht] FMC Alias Private Key: 7
20,217,577 UART: [art] Derive CDI
20,218,309 UART: [art] Store in in slot 0x4
20,261,173 UART: [art] Derive Key Pair
20,262,212 UART: [art] Store priv key in slot 0x5
22,689,497 UART: [art] Derive Key Pair - Done
22,702,342 UART: [art] Signing Cert with AUTHO
22,703,664 UART: RITY.KEYID = 7
24,408,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,410,376 UART: [art] PUB.X = 96D79621A12A726E09E2A18F16E527DE3F27F897862C36D6E32AFCBAE341B411F88229CD49C30625C54E8035EA0E0CFD
24,417,614 UART: [art] PUB.Y = 8D99347BC3AB0F28ECFD4A5A67ACA44F6993AB0293CC10D96177779D906B7B7EEB65A63B27A728794DAF78B3412189AC
24,424,882 UART: [art] SIG.R = 3C9E391F1A2CFC3A259DECFFA52A18BD836EA0FF15E355B6DEF3ACCDC4D8D0493470EA1598D40A76851C09A19B82B8F6
24,432,331 UART: [art] SIG.S = EC00B410333C04C06DAC1AAB90711CAF14353C183E2178247782D70312E6C144F91319A9335F4456B47A87F2D8E343AB
25,411,098 UART: mbox::rt_entry...
25,412,065 UART: ____ _ _ _ ____ _____
25,413,989 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,415,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,417,916 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,419,874 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,421,798 UART: |_|
25,422,599 UART:
25,536,770 UART: [rt] Runtime listening for mailbox commands...
25,542,618 >>> mbox cmd response data (3272 bytes)
25,558,306 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,591,692 >>> mbox cmd response data (0 bytes)
27,650,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,379,647 >>> mbox cmd response: success
35,412,269 UART:
35,412,580 UART: Running Caliptra FMC ...
35,413,618 UART:
35,413,760 UART: [state] CFI Enabled
35,457,571 UART: [art] Extend RT PCRs Done
35,458,757 UART: [art] Lock RT PCRs Done
35,460,181 UART: [art] Populate DV Done
35,465,690 UART: [fht] FMC Alias Private Key: 7
35,467,241 UART: [art] Derive CDI
35,467,971 UART: [art] Store in in slot 0x4
35,510,773 UART: [art] Derive Key Pair
35,511,808 UART: [art] Store priv key in slot 0x5
37,938,449 UART: [art] Derive Key Pair - Done
37,951,667 UART: [art] Signing Cert with AUTHO
37,952,970 UART: RITY.KEYID = 7
39,658,475 UART: [art] Erasing AUTHORITY.KEYID = 7
39,659,956 UART: [art] PUB.X = 9741FD5984DAD00FD5C6E199E0A1CB7AAEA1B779B93EB0D3B2F44DB241F464C42368FFFC9FD94D6013D62C41A82EB5DE
39,667,286 UART: [art] PUB.Y = 09AD3BE3A8E5E1ABDB652B9FABE915B22D2C8D3B8C12FAE67FB3FC9615CE9D357D0972CACA1D6939547AF888AA892CC7
39,674,572 UART: [art] SIG.R = FA1ABD1627E8A2C9DF91C6693B4D3975DD8B9002604E820D7653832D062BB9D6BF85EA35DE237578775343132A864DD6
39,681,956 UART: [art] SIG.S = B53F5778532F91E703B723C8546FD37E6BA72D493CF023C643EA2619D77F23A7B6E349513E2D5ECCAFDF2FDBB38B717E
40,661,040 UART: Caliptra RT
40,661,764 UART: [state] CFI Enabled
43,365,756 UART: Disabled attest: DPE valid fail
43,367,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,368,187 UART: [rt] RT listening for mailbox commands...
43,399,743 UART: [rt]cmd =0x494e464f, len=4
43,403,645 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,735 UART: [kat] SHA2-256
881,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,781 UART: [kat] ++
885,933 UART: [kat] sha1
890,007 UART: [kat] SHA2-256
891,945 UART: [kat] SHA2-384
894,790 UART: [kat] SHA2-512-ACC
896,691 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,475,973 UART: [cold-reset] ++
1,476,505 UART: [fht] Storing FHT @ 0x50003400
1,479,416 UART: [idev] ++
1,479,584 UART: [idev] CDI.KEYID = 6
1,479,944 UART: [idev] SUBJECT.KEYID = 7
1,480,368 UART: [idev] UDS.KEYID = 0
1,480,713 ready_for_fw is high
1,480,713 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,654 UART: [idev] --
1,514,587 UART: [ldev] ++
1,514,755 UART: [ldev] CDI.KEYID = 6
1,515,118 UART: [ldev] SUBJECT.KEYID = 5
1,515,544 UART: [ldev] AUTHORITY.KEYID = 7
1,516,007 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,420 UART: [ldev] --
1,585,861 UART: [fwproc] Waiting for Commands...
1,586,510 UART: [fwproc] Received command 0x46574c44
1,587,301 UART: [fwproc] Received Image of size 78704 bytes
2,477,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,994 >>> mbox cmd response: success
2,615,994 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,044 UART: [afmc] ++
2,617,212 UART: [afmc] CDI.KEYID = 6
2,617,574 UART: [afmc] SUBJECT.KEYID = 7
2,617,999 UART: [afmc] AUTHORITY.KEYID = 5
2,653,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,760 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,645 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,335 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,428 UART: [afmc] --
2,696,452 UART: [cold-reset] --
2,697,440 UART: [state] Locking Datavault
2,698,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,247 UART: [state] Locking ICCM
2,699,731 UART: [exit] Launching FMC @ 0x40000130
2,705,060 UART:
2,705,076 UART: Running Caliptra FMC ...
2,705,484 UART:
2,705,538 UART: [state] CFI Enabled
2,716,187 UART: [fht] FMC Alias Private Key: 7
2,823,762 UART: [art] Extend RT PCRs Done
2,824,190 UART: [art] Lock RT PCRs Done
2,825,678 UART: [art] Populate DV Done
2,833,905 UART: [fht] FMC Alias Private Key: 7
2,834,903 UART: [art] Derive CDI
2,835,183 UART: [art] Store in in slot 0x4
2,920,818 UART: [art] Derive Key Pair
2,921,178 UART: [art] Store priv key in slot 0x5
2,934,720 UART: [art] Derive Key Pair - Done
2,949,747 UART: [art] Signing Cert with AUTHO
2,950,227 UART: RITY.KEYID = 7
2,965,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,424 UART: [art] PUB.X = 9055FBE4D33B1431EBD128B8A0F41EAB70C47A270019C667541AF7FF677AE9C2A1674F454FF240732CE3A4D0F9E0FB98
2,973,182 UART: [art] PUB.Y = 062FEF5D4685BF571B37C561E8F6CCB1C46596E11ACC96AB2F6647F62B373E23BE1C1F1F383B5AD1A9646B6FFF9823BA
2,980,145 UART: [art] SIG.R = 9CD7C4E9064FE1988C33B2DB8018DEB91FF0CE31CB2AEB3A8F1ADECCF04BAE51E99AF294754141B0EC757656F5327392
2,986,930 UART: [art] SIG.S = 371595A20328383419A4C55193515FB41A79AD4420B1F66DFF98E643398441C9A6556C628D526B06A9FA3D5DD1B4C258
3,010,931 UART: mbox::rt_entry...
3,011,303 UART: ____ _ _ _ ____ _____
3,012,087 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,655 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,423 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,191 UART: |_|
3,015,503 UART:
3,122,291 UART: [rt] Runtime listening for mailbox commands...
3,127,259 >>> mbox cmd response data (3272 bytes)
3,127,260 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,346 >>> mbox cmd response data (0 bytes)
3,150,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,467 UART:
3,150,483 UART: Running Caliptra ROM ...
3,150,891 UART:
3,150,945 UART: [state] CFI Enabled
3,153,659 UART: [state] LifecycleState = Unprovisioned
3,154,314 UART: [state] DebugLocked = No
3,154,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,399 UART: [kat] SHA2-256
3,950,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,445 UART: [kat] ++
3,954,597 UART: [kat] sha1
3,958,923 UART: [kat] SHA2-256
3,960,861 UART: [kat] SHA2-384
3,963,606 UART: [kat] SHA2-512-ACC
3,965,506 UART: [kat] ECC-384
3,971,397 UART: [kat] HMAC-384Kdf
3,975,887 UART: [kat] LMS
4,544,083 UART: [kat] --
4,545,040 UART: [update-reset] ++
5,881,555 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,649 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,032,699 >>> mbox cmd response: success
6,032,906 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,920 UART: [update-reset Success] --
6,042,021 UART: [state] Locking Datavault
6,042,825 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,429 UART: [state] Locking ICCM
6,044,083 UART: [exit] Launching FMC @ 0x40000130
6,049,412 UART:
6,049,428 UART: Running Caliptra FMC ...
6,049,836 UART:
6,049,890 UART: [state] CFI Enabled
6,138,561 UART: [art] Extend RT PCRs Done
6,138,989 UART: [art] Lock RT PCRs Done
6,140,384 UART: [art] Populate DV Done
6,148,577 UART: [fht] FMC Alias Private Key: 7
6,149,611 UART: [art] Derive CDI
6,149,891 UART: [art] Store in in slot 0x4
6,235,586 UART: [art] Derive Key Pair
6,235,946 UART: [art] Store priv key in slot 0x5
6,248,846 UART: [art] Derive Key Pair - Done
6,263,645 UART: [art] Signing Cert with AUTHO
6,264,125 UART: RITY.KEYID = 7
6,279,037 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,802 UART: [art] PUB.X = 0BB540F32F4AFE952025C7B97021FB6A25CF839AABC2D3EC4D1A6936DE6DD60FB837CEE466F3CC351BE64B90CE199397
6,286,584 UART: [art] PUB.Y = 29771D92018C978EEF9A20C7C974BD4CC60A080F76B7CEE322A87121A99F676AF56FC19431795BEF76B1B85B1258CEAA
6,293,530 UART: [art] SIG.R = 07CC97F5D248FE104D290DF212BCF40909A4A620FB496241045DB5AFFE7D8B0B3203B19F1A9C42564FCB1327C0834385
6,300,283 UART: [art] SIG.S = 67913D481E83359F5DCEBC75F917996CDB41239FEDEFFD66BC1CEF8BBB67939E2ED1B30BBBC94D7D320CB7A07E93BABD
6,324,272 UART: Caliptra RT
6,324,525 UART: [state] CFI Enabled
6,610,733 UART: Disabled attest: DPE valid fail
6,611,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,612,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,643,025 UART: [rt]cmd =0x494e464f, len=4
6,646,604 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,759 ready_for_fw is high
1,362,759 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,862 >>> mbox cmd response: success
2,468,862 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,530,200 UART:
2,530,216 UART: Running Caliptra FMC ...
2,530,624 UART:
2,530,678 UART: [state] CFI Enabled
2,541,103 UART: [fht] FMC Alias Private Key: 7
2,648,690 UART: [art] Extend RT PCRs Done
2,649,118 UART: [art] Lock RT PCRs Done
2,650,528 UART: [art] Populate DV Done
2,658,801 UART: [fht] FMC Alias Private Key: 7
2,659,769 UART: [art] Derive CDI
2,660,049 UART: [art] Store in in slot 0x4
2,746,000 UART: [art] Derive Key Pair
2,746,360 UART: [art] Store priv key in slot 0x5
2,759,126 UART: [art] Derive Key Pair - Done
2,774,029 UART: [art] Signing Cert with AUTHO
2,774,509 UART: RITY.KEYID = 7
2,789,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,408 UART: [art] PUB.X = F94297B3E944F62B3FABDC7AD8490159ED59A72ACDDAF34BBDB57C70C804D99668075D83AE5EB53B3EC788D2AE419AC3
2,797,189 UART: [art] PUB.Y = CD48ADDF3E3450A6DEDC21ADA50210C22B9E43A4E19ED80CE1AA1170806E323CCA8C0662BC4F82589ABB99817591603A
2,804,144 UART: [art] SIG.R = F708CDA02ABC7ADE91C513AAC1AC4603DBFFB21BD2FF58E799784C2B8183C9A08842CF817F648B7DB3788CA31F853029
2,810,924 UART: [art] SIG.S = 917F5F128461602D90A1C732B3D24CD1E8C5536DFFB0A3EBBB14332C6C8BDB235C1D849F652EB56CAB0D8BB8CF499F6D
2,834,834 UART: mbox::rt_entry...
2,835,206 UART: ____ _ _ _ ____ _____
2,835,990 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,790 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,558 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,326 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,094 UART: |_|
2,839,406 UART:
2,946,487 UART: [rt] Runtime listening for mailbox commands...
2,951,455 >>> mbox cmd response data (3272 bytes)
2,951,456 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,974,542 >>> mbox cmd response data (0 bytes)
2,974,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,737,671 >>> mbox cmd response: success
5,750,804 UART:
5,750,820 UART: Running Caliptra FMC ...
5,751,228 UART:
5,751,282 UART: [state] CFI Enabled
5,839,989 UART: [art] Extend RT PCRs Done
5,840,417 UART: [art] Lock RT PCRs Done
5,841,946 UART: [art] Populate DV Done
5,850,025 UART: [fht] FMC Alias Private Key: 7
5,851,147 UART: [art] Derive CDI
5,851,427 UART: [art] Store in in slot 0x4
5,937,330 UART: [art] Derive Key Pair
5,937,690 UART: [art] Store priv key in slot 0x5
5,950,578 UART: [art] Derive Key Pair - Done
5,965,368 UART: [art] Signing Cert with AUTHO
5,965,848 UART: RITY.KEYID = 7
5,981,082 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,847 UART: [art] PUB.X = E7D902DA3A6DB43D0485839E032C4F45596F8CDFB8480C5CCAA55694C44EC4E71A30AEFFF0200B1F622896DC4020AA12
5,988,614 UART: [art] PUB.Y = C37B1595AA9FC46ED25561FF48FB4BA04F08801AD966720008FDDB8C18BE3CF06667C7ED52C34FCC0E76BBB1C752A078
5,995,549 UART: [art] SIG.R = BE298AC1758A59C2C1184A07A6C5B9B796865AFBB6816F0092FCA9260AAD72F2B679D132A8ECF12E1CCD5F71D2237371
6,002,301 UART: [art] SIG.S = C3BEF887DA6AEC946F4BE06BEEBA0BD26ED2FD165D0F62048CBE8D4B03F6488D57DAD7403F6D8A74FF463494BC6EACE0
6,026,292 UART: Caliptra RT
6,026,545 UART: [state] CFI Enabled
6,309,461 UART: Disabled attest: DPE valid fail
6,309,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,311,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,075 UART: [rt]cmd =0x494e464f, len=4
6,345,284 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,923 UART: [kat] HMAC-384Kdf
907,351 UART: [kat] LMS
1,475,547 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,477,088 UART: [fht] Storing FHT @ 0x50003400
1,479,945 UART: [idev] ++
1,480,113 UART: [idev] CDI.KEYID = 6
1,480,473 UART: [idev] SUBJECT.KEYID = 7
1,480,897 UART: [idev] UDS.KEYID = 0
1,481,242 ready_for_fw is high
1,481,242 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,048 UART: [ldev] ++
1,515,216 UART: [ldev] CDI.KEYID = 6
1,515,579 UART: [ldev] SUBJECT.KEYID = 5
1,516,005 UART: [ldev] AUTHORITY.KEYID = 7
1,516,468 UART: [ldev] FE.KEYID = 1
1,521,700 UART: [ldev] Erasing FE.KEYID = 1
1,547,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,665 UART: [ldev] --
1,587,064 UART: [fwproc] Waiting for Commands...
1,587,869 UART: [fwproc] Received command 0x46574c44
1,588,660 UART: [fwproc] Received Image of size 78704 bytes
2,478,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,615,923 >>> mbox cmd response: success
2,615,923 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,995 UART: [afmc] ++
2,617,163 UART: [afmc] CDI.KEYID = 6
2,617,525 UART: [afmc] SUBJECT.KEYID = 7
2,617,950 UART: [afmc] AUTHORITY.KEYID = 5
2,652,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,320 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,010 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,905 UART: [afmc] --
2,695,835 UART: [cold-reset] --
2,696,617 UART: [state] Locking Datavault
2,697,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,236 UART: [state] Locking ICCM
2,698,728 UART: [exit] Launching FMC @ 0x40000130
2,704,057 UART:
2,704,073 UART: Running Caliptra FMC ...
2,704,481 UART:
2,704,624 UART: [state] CFI Enabled
2,715,101 UART: [fht] FMC Alias Private Key: 7
2,823,704 UART: [art] Extend RT PCRs Done
2,824,132 UART: [art] Lock RT PCRs Done
2,825,782 UART: [art] Populate DV Done
2,834,195 UART: [fht] FMC Alias Private Key: 7
2,835,207 UART: [art] Derive CDI
2,835,487 UART: [art] Store in in slot 0x4
2,921,368 UART: [art] Derive Key Pair
2,921,728 UART: [art] Store priv key in slot 0x5
2,935,168 UART: [art] Derive Key Pair - Done
2,950,047 UART: [art] Signing Cert with AUTHO
2,950,527 UART: RITY.KEYID = 7
2,965,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,174 UART: [art] PUB.X = 5C2506FC6AC491DB8162DD61467671D93153EE3D204965DF52B07CDDD95DD9C970DDB35A6CDB6780E9F1A92170E65744
2,972,947 UART: [art] PUB.Y = 70712F243855C87EE4F0E5DC64FBD4351468860E51CC7C855AFC70157D039401B90395AB847FE96DD5D5AF8DDB19A070
2,979,889 UART: [art] SIG.R = 7F2C395E6D89C2A1BD8209594754BAA5FCCEDF0A7A74809B00EAB5B9C065E4343F42874D87C76572AFD2D670C273F900
2,986,617 UART: [art] SIG.S = 863304C297927BC23CC4AF2D8A91B51DCCBAEAC9032CACA18822C1529E6359B00ACC660DE702A52D35E49F8A91859840
3,010,491 UART: mbox::rt_entry...
3,010,863 UART: ____ _ _ _ ____ _____
3,011,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,751 UART: |_|
3,015,063 UART:
3,122,803 UART: [rt] Runtime listening for mailbox commands...
3,127,771 >>> mbox cmd response data (3272 bytes)
3,127,772 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,858 >>> mbox cmd response data (0 bytes)
3,150,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,979 UART:
3,150,995 UART: Running Caliptra ROM ...
3,151,403 UART:
3,151,544 UART: [state] CFI Enabled
3,154,308 UART: [state] LifecycleState = Unprovisioned
3,154,963 UART: [state] DebugLocked = No
3,155,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,157,174 UART: [kat] SHA2-256
3,951,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,955,220 UART: [kat] ++
3,955,372 UART: [kat] sha1
3,959,564 UART: [kat] SHA2-256
3,961,502 UART: [kat] SHA2-384
3,964,351 UART: [kat] SHA2-512-ACC
3,966,251 UART: [kat] ECC-384
3,971,912 UART: [kat] HMAC-384Kdf
3,976,678 UART: [kat] LMS
4,544,874 UART: [kat] --
4,545,773 UART: [update-reset] ++
5,882,002 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,883,170 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,033,220 >>> mbox cmd response: success
6,033,563 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,577 UART: [update-reset Success] --
6,042,580 UART: [state] Locking Datavault
6,043,452 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,056 UART: [state] Locking ICCM
6,044,588 UART: [exit] Launching FMC @ 0x40000130
6,049,917 UART:
6,049,933 UART: Running Caliptra FMC ...
6,050,341 UART:
6,050,484 UART: [state] CFI Enabled
6,139,647 UART: [art] Extend RT PCRs Done
6,140,075 UART: [art] Lock RT PCRs Done
6,141,344 UART: [art] Populate DV Done
6,149,533 UART: [fht] FMC Alias Private Key: 7
6,150,617 UART: [art] Derive CDI
6,150,897 UART: [art] Store in in slot 0x4
6,236,628 UART: [art] Derive Key Pair
6,236,988 UART: [art] Store priv key in slot 0x5
6,250,072 UART: [art] Derive Key Pair - Done
6,265,007 UART: [art] Signing Cert with AUTHO
6,265,487 UART: RITY.KEYID = 7
6,280,621 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,386 UART: [art] PUB.X = C4A89F4D9A996A5FA117A1D2F61117B2807A9392A86D0550FDFE71B15B0D1429CCD54832C13A2086A78D0B1149BB9DFD
6,288,155 UART: [art] PUB.Y = E6C1205DAD3F019196C73659F091E068570B489E570887CD0E6CBBF82900885CC3322F2AB675EF22A28BAC9F10F36D39
6,295,073 UART: [art] SIG.R = DA2D139043DD982BB16AC78C7C566C45C2A4FEB2C056C054CCE1100385881B61E29EF5E38144853C391725836B80864D
6,301,838 UART: [art] SIG.S = 4A313F57C7C70A4DFC0009336DB9FA226E739889BFE2BB7CBF92BC00BF4940067C335CBE84F53CA7F6E920F65712EE39
6,325,412 UART: Caliptra RT
6,325,757 UART: [state] CFI Enabled
6,612,096 UART: Disabled attest: DPE valid fail
6,612,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,614,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,708 UART: [rt]cmd =0x494e464f, len=4
6,647,947 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 ready_for_fw is high
1,362,858 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,383 >>> mbox cmd response: success
2,468,383 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,530,723 UART:
2,530,739 UART: Running Caliptra FMC ...
2,531,147 UART:
2,531,290 UART: [state] CFI Enabled
2,541,733 UART: [fht] FMC Alias Private Key: 7
2,650,504 UART: [art] Extend RT PCRs Done
2,650,932 UART: [art] Lock RT PCRs Done
2,652,450 UART: [art] Populate DV Done
2,660,873 UART: [fht] FMC Alias Private Key: 7
2,661,919 UART: [art] Derive CDI
2,662,199 UART: [art] Store in in slot 0x4
2,747,990 UART: [art] Derive Key Pair
2,748,350 UART: [art] Store priv key in slot 0x5
2,761,848 UART: [art] Derive Key Pair - Done
2,776,959 UART: [art] Signing Cert with AUTHO
2,777,439 UART: RITY.KEYID = 7
2,792,841 UART: [art] Erasing AUTHORITY.KEYID = 7
2,793,606 UART: [art] PUB.X = CB596026FA8C2D99BBBAA37B8A71C8D4E1339CB855FD99F40437FD227757DE9108EA671EFCF8D833327F76A4B7BF5FD6
2,800,386 UART: [art] PUB.Y = 55915ACDC055C23A07316AE16A2B26ACD7CF25E9D1C6EB7B3AF3290AAF899534C4A2470CC9E845726B5876CEE716A5F6
2,807,339 UART: [art] SIG.R = 017B67D3F78D6E2AD02490782F1B3A02C4B684B1B96D5DC587D424FED43651766BE3A86F9769D19B16C620DDD502E7F0
2,814,104 UART: [art] SIG.S = 1BF75AA7CBBE803EA86024D86C028F7A92346B86D1ADF2B2AD1DDBCC228DFDB9A7C1FDCA8B8D3BF0043A032656275B88
2,838,118 UART: mbox::rt_entry...
2,838,490 UART: ____ _ _ _ ____ _____
2,839,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,840,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,840,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,841,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,842,378 UART: |_|
2,842,690 UART:
2,949,821 UART: [rt] Runtime listening for mailbox commands...
2,954,789 >>> mbox cmd response data (3272 bytes)
2,954,790 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,977,876 >>> mbox cmd response data (0 bytes)
2,977,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,741,232 >>> mbox cmd response: success
5,754,671 UART:
5,754,687 UART: Running Caliptra FMC ...
5,755,095 UART:
5,755,238 UART: [state] CFI Enabled
5,844,289 UART: [art] Extend RT PCRs Done
5,844,717 UART: [art] Lock RT PCRs Done
5,846,038 UART: [art] Populate DV Done
5,854,269 UART: [fht] FMC Alias Private Key: 7
5,855,337 UART: [art] Derive CDI
5,855,617 UART: [art] Store in in slot 0x4
5,941,146 UART: [art] Derive Key Pair
5,941,506 UART: [art] Store priv key in slot 0x5
5,955,006 UART: [art] Derive Key Pair - Done
5,969,889 UART: [art] Signing Cert with AUTHO
5,970,369 UART: RITY.KEYID = 7
5,985,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,986,202 UART: [art] PUB.X = 2DFDE8467FF4EC8F663CB31BBD3320332E0A681DF9B03153330223772E845F6EF87CA1DC358CF079184FDABF96E0373F
5,992,976 UART: [art] PUB.Y = 1AF3365C5B83416226B9B09785D051746989FF0BC08FDD20DE1422A48BAB331FB5E7509B69AA0B67CBBE839F7F46CB8A
5,999,930 UART: [art] SIG.R = 7B9C103C7B48EAD320FDB3529B84C084DCA019E023F5E77B269560A938473A52B00D7EF2E83AA6BBD90EC612B72F015A
6,006,701 UART: [art] SIG.S = 610869F29999E6487B54A7129EA3ED50EC0513FA98D3BA270572E2A3B9D63E307614AF9614447592DB6C468DDB64BE76
6,030,171 UART: Caliptra RT
6,030,516 UART: [state] CFI Enabled
6,314,290 UART: Disabled attest: DPE valid fail
6,314,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,316,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,346,902 UART: [rt]cmd =0x494e464f, len=4
6,350,135 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
892,880 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,005 UART: [kat] ++
897,157 UART: [kat] sha1
901,225 UART: [kat] SHA2-256
903,165 UART: [kat] SHA2-384
905,876 UART: [kat] SHA2-512-ACC
907,777 UART: [kat] ECC-384
917,112 UART: [kat] HMAC-384Kdf
921,738 UART: [kat] LMS
1,170,066 UART: [kat] --
1,170,713 UART: [cold-reset] ++
1,171,079 UART: [fht] FHT @ 0x50003400
1,173,908 UART: [idev] ++
1,174,076 UART: [idev] CDI.KEYID = 6
1,174,436 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,175,205 ready_for_fw is high
1,175,205 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,893 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,724 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,846 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,327 >>> mbox cmd response: success
2,313,327 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,565 UART: [afmc] ++
2,314,733 UART: [afmc] CDI.KEYID = 6
2,315,095 UART: [afmc] SUBJECT.KEYID = 7
2,315,520 UART: [afmc] AUTHORITY.KEYID = 5
2,350,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,718 UART: [afmc] --
2,393,756 UART: [cold-reset] --
2,394,464 UART: [state] Locking Datavault
2,395,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,415 UART: [state] Locking ICCM
2,396,953 UART: [exit] Launching FMC @ 0x40000130
2,402,282 UART:
2,402,298 UART: Running Caliptra FMC ...
2,402,706 UART:
2,402,760 UART: [state] CFI Enabled
2,413,135 UART: [fht] FMC Alias Private Key: 7
2,521,116 UART: [art] Extend RT PCRs Done
2,521,544 UART: [art] Lock RT PCRs Done
2,523,080 UART: [art] Populate DV Done
2,531,307 UART: [fht] FMC Alias Private Key: 7
2,532,447 UART: [art] Derive CDI
2,532,727 UART: [art] Store in in slot 0x4
2,618,062 UART: [art] Derive Key Pair
2,618,422 UART: [art] Store priv key in slot 0x5
2,631,398 UART: [art] Derive Key Pair - Done
2,646,278 UART: [art] Signing Cert with AUTHO
2,646,758 UART: RITY.KEYID = 7
2,661,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,493 UART: [art] PUB.X = D1CA69B8DC6A4DD306B375DBC304239A8A518936A342F01EC533286AE5859E672F2673D64F6EB42719F363B3B3DEE499
2,669,261 UART: [art] PUB.Y = 19D2959A5F89AD7E549F060E890174003B0314F181F12DB1AF6A6491276226C1D8A03F3C8C341F60D40F2739FBB444A3
2,676,170 UART: [art] SIG.R = DE3A86EF07F37ECBEAC1625FE97B136B6AF75AE1657AAFF29F53BC65C111A47836036EC028069F233A5084D5E1C41B4C
2,682,945 UART: [art] SIG.S = FFE79D1B6D8569125DE1F106EE27E4BB42F28B9C1B7A1849560FA41FD8C187465CDDEAB5BA4991AA1D59185A9E8A0EAE
2,706,989 UART: mbox::rt_entry...
2,707,361 UART: ____ _ _ _ ____ _____
2,708,145 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,945 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,249 UART: |_|
2,711,561 UART:
2,818,378 UART: [rt] Runtime listening for mailbox commands...
2,823,346 >>> mbox cmd response data (3272 bytes)
2,823,347 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,433 >>> mbox cmd response data (0 bytes)
2,846,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,551 UART:
2,846,567 UART: Running Caliptra ROM ...
2,846,975 UART:
2,847,030 UART: [state] CFI Enabled
2,849,802 UART: [state] LifecycleState = Unprovisioned
2,850,457 UART: [state] DebugLocked = No
2,851,125 UART: [state] WD Timer not started. Device not locked for debugging
2,852,457 UART: [kat] SHA2-256
3,658,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,662,232 UART: [kat] ++
3,662,384 UART: [kat] sha1
3,666,596 UART: [kat] SHA2-256
3,668,536 UART: [kat] SHA2-384
3,671,349 UART: [kat] SHA2-512-ACC
3,673,249 UART: [kat] ECC-384
3,682,788 UART: [kat] HMAC-384Kdf
3,687,348 UART: [kat] LMS
3,935,676 UART: [kat] --
3,936,634 UART: [update-reset] ++
5,251,059 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,214 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,402,212 >>> mbox cmd response: success
5,402,429 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,443 UART: [update-reset Success] --
5,411,500 UART: [state] Locking Datavault
5,412,300 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,904 UART: [state] Locking ICCM
5,413,368 UART: [exit] Launching FMC @ 0x40000130
5,418,697 UART:
5,418,713 UART: Running Caliptra FMC ...
5,419,121 UART:
5,419,175 UART: [state] CFI Enabled
5,507,782 UART: [art] Extend RT PCRs Done
5,508,210 UART: [art] Lock RT PCRs Done
5,509,661 UART: [art] Populate DV Done
5,518,010 UART: [fht] FMC Alias Private Key: 7
5,519,110 UART: [art] Derive CDI
5,519,390 UART: [art] Store in in slot 0x4
5,605,059 UART: [art] Derive Key Pair
5,605,419 UART: [art] Store priv key in slot 0x5
5,618,517 UART: [art] Derive Key Pair - Done
5,633,274 UART: [art] Signing Cert with AUTHO
5,633,754 UART: RITY.KEYID = 7
5,648,968 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,733 UART: [art] PUB.X = B72E65A3A8A6C3B5C7EBAFB930C9750A18DB93F2CEE02640B37DF0FF599D91C7B243DAF414D074CA25BC73702EB9A1E2
5,656,520 UART: [art] PUB.Y = 14B7BBF67FD89223A1765FC493225ACE3C9696D48F1C94DF7F8F3ECF08F24A2D5787F9B5E2D8E4056440451BB01D3908
5,663,467 UART: [art] SIG.R = F95030E1D2DD936B692F002B2D302DB87965633ED654DE85A4D6C78B6CAF13BCDE3DFB5FBBDB8AF7AC2F5A847701E3ED
5,670,236 UART: [art] SIG.S = BED17BFCD6103FD2733EFDCF247BF401E3FC0AC084EA181C0B26FCD4F028F334336CB303C3E0840FCE70ED06CA0214BC
5,694,638 UART: Caliptra RT
5,694,891 UART: [state] CFI Enabled
5,979,643 UART: Disabled attest: DPE valid fail
5,980,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,981,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,061 UART: [rt]cmd =0x494e464f, len=4
6,015,568 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,803 ready_for_fw is high
1,059,803 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,440 >>> mbox cmd response: success
2,164,440 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,268 UART:
2,226,284 UART: Running Caliptra FMC ...
2,226,692 UART:
2,226,746 UART: [state] CFI Enabled
2,237,489 UART: [fht] FMC Alias Private Key: 7
2,345,112 UART: [art] Extend RT PCRs Done
2,345,540 UART: [art] Lock RT PCRs Done
2,347,306 UART: [art] Populate DV Done
2,355,459 UART: [fht] FMC Alias Private Key: 7
2,356,479 UART: [art] Derive CDI
2,356,759 UART: [art] Store in in slot 0x4
2,442,388 UART: [art] Derive Key Pair
2,442,748 UART: [art] Store priv key in slot 0x5
2,456,434 UART: [art] Derive Key Pair - Done
2,471,565 UART: [art] Signing Cert with AUTHO
2,472,045 UART: RITY.KEYID = 7
2,487,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,076 UART: [art] PUB.X = 8D813DE6E0549B462326B36AB0DCB078BBD2A4DB02E806A76FF4E5AA6D7665266EAF9276BB87FE7B6F8EF6DA75FD12AF
2,494,862 UART: [art] PUB.Y = BA92C8A4687885EA46D86B83F147F9BEA7FE51B9AB20BF4767E76C0544A7EDC3488EC65DD58C8F9FC11876E141E690F8
2,501,821 UART: [art] SIG.R = 57F08FC51387FD97F7B48C40E94EAE58BE2FA07B25A38CA745AA9CC22F3C86E9F2EEDB530FA322135689C7CF9FD2FE6B
2,508,610 UART: [art] SIG.S = 2DEA59D27EBB6C7AC2506C77E4B07B0D21AE9C70DD9DB4C21553CDD440AEA43C1BCC966D68CFED375755FA7BAC37FF68
2,532,422 UART: mbox::rt_entry...
2,532,794 UART: ____ _ _ _ ____ _____
2,533,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,682 UART: |_|
2,536,994 UART:
2,643,720 UART: [rt] Runtime listening for mailbox commands...
2,648,688 >>> mbox cmd response data (3272 bytes)
2,648,689 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,775 >>> mbox cmd response data (0 bytes)
2,671,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,111,273 >>> mbox cmd response: success
5,124,607 UART:
5,124,623 UART: Running Caliptra FMC ...
5,125,031 UART:
5,125,085 UART: [state] CFI Enabled
5,213,444 UART: [art] Extend RT PCRs Done
5,213,872 UART: [art] Lock RT PCRs Done
5,214,759 UART: [art] Populate DV Done
5,223,132 UART: [fht] FMC Alias Private Key: 7
5,224,236 UART: [art] Derive CDI
5,224,516 UART: [art] Store in in slot 0x4
5,309,995 UART: [art] Derive Key Pair
5,310,355 UART: [art] Store priv key in slot 0x5
5,323,747 UART: [art] Derive Key Pair - Done
5,338,630 UART: [art] Signing Cert with AUTHO
5,339,110 UART: RITY.KEYID = 7
5,354,406 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,171 UART: [art] PUB.X = 823688365D1C31F0DADD34E351ABEEF0D7332557BF747221F12EDD69F2973D9ACCE2AB7AB8DE5C3EBD29EE1126A5EA21
5,361,961 UART: [art] PUB.Y = 84A9E8E5CA734EFBE2AB3151B27B656C373DD52AAE4E08FDF22B7AF1F4A1292FF25856F688E4BAA25B4A8945545A13F8
5,368,924 UART: [art] SIG.R = 7A58FF88B93528EAAD571DB92473ED801F4F9787263C0F7573770B37944721DC1980495E3ABDE6D2655866B43F18D9AB
5,375,686 UART: [art] SIG.S = FFB34778E93520B8CA49E66C3C59AEEF4CF229D37A5FF2EE8A18F3421403C2B80174D42689C4A3D9C65E6D204E41DE4A
5,399,529 UART: Caliptra RT
5,399,782 UART: [state] CFI Enabled
5,682,523 UART: Disabled attest: DPE valid fail
5,683,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,684,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,715,075 UART: [rt]cmd =0x494e464f, len=4
5,718,576 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,668 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,687 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,566 UART: [idev] --
1,211,602 UART: [ldev] ++
1,211,770 UART: [ldev] CDI.KEYID = 6
1,212,133 UART: [ldev] SUBJECT.KEYID = 5
1,212,559 UART: [ldev] AUTHORITY.KEYID = 7
1,213,022 UART: [ldev] FE.KEYID = 1
1,218,384 UART: [ldev] Erasing FE.KEYID = 1
1,244,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,265 UART: [fwproc] Wait for Commands...
1,285,081 UART: [fwproc] Recv command 0x46574c44
1,285,809 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,143 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,402 >>> mbox cmd response: success
2,312,402 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,426 UART: [afmc] ++
2,313,594 UART: [afmc] CDI.KEYID = 6
2,313,956 UART: [afmc] SUBJECT.KEYID = 7
2,314,381 UART: [afmc] AUTHORITY.KEYID = 5
2,349,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,981 UART: [afmc] --
2,393,025 UART: [cold-reset] --
2,394,101 UART: [state] Locking Datavault
2,395,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,088 UART: [state] Locking ICCM
2,396,530 UART: [exit] Launching FMC @ 0x40000130
2,401,859 UART:
2,401,875 UART: Running Caliptra FMC ...
2,402,283 UART:
2,402,426 UART: [state] CFI Enabled
2,412,839 UART: [fht] FMC Alias Private Key: 7
2,521,202 UART: [art] Extend RT PCRs Done
2,521,630 UART: [art] Lock RT PCRs Done
2,522,794 UART: [art] Populate DV Done
2,530,955 UART: [fht] FMC Alias Private Key: 7
2,531,977 UART: [art] Derive CDI
2,532,257 UART: [art] Store in in slot 0x4
2,617,884 UART: [art] Derive Key Pair
2,618,244 UART: [art] Store priv key in slot 0x5
2,631,472 UART: [art] Derive Key Pair - Done
2,646,235 UART: [art] Signing Cert with AUTHO
2,646,715 UART: RITY.KEYID = 7
2,662,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,866 UART: [art] PUB.X = 95250B214F73DCA93EA3219A677AB193C5027130165923B160ACB836F45C961BF32405A1E38D29D4119688522E1F4598
2,669,615 UART: [art] PUB.Y = 3B81C6D32EE929C34C0EAA4463151D819BD16E3FA3C1E1EEC7B403FBA30452E7C60E04E55C5B38953F4FCA2D038EF725
2,676,561 UART: [art] SIG.R = 386D5FF33C2C6784B271CD0CD5CD5D674DA08538D907CC49269D3999563E6C80CD4A6D79C35B0DA409B2830A7990AEA8
2,683,322 UART: [art] SIG.S = DF1AA5775E8304974DB44A111DD731463EC21BA2C2C8E8964D17CF304A2784B53CDC9BBD0AF3B08A0CC07F91F8A8E2FE
2,707,072 UART: mbox::rt_entry...
2,707,444 UART: ____ _ _ _ ____ _____
2,708,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,028 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,796 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,332 UART: |_|
2,711,644 UART:
2,817,732 UART: [rt] Runtime listening for mailbox commands...
2,822,700 >>> mbox cmd response data (3272 bytes)
2,822,701 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,787 >>> mbox cmd response data (0 bytes)
2,845,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,905 UART:
2,845,921 UART: Running Caliptra ROM ...
2,846,329 UART:
2,846,471 UART: [state] CFI Enabled
2,848,787 UART: [state] LifecycleState = Unprovisioned
2,849,442 UART: [state] DebugLocked = No
2,850,106 UART: [state] WD Timer not started. Device not locked for debugging
2,851,290 UART: [kat] SHA2-256
3,656,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,065 UART: [kat] ++
3,661,217 UART: [kat] sha1
3,665,465 UART: [kat] SHA2-256
3,667,405 UART: [kat] SHA2-384
3,670,198 UART: [kat] SHA2-512-ACC
3,672,098 UART: [kat] ECC-384
3,681,729 UART: [kat] HMAC-384Kdf
3,686,335 UART: [kat] LMS
3,934,663 UART: [kat] --
3,935,589 UART: [update-reset] ++
5,249,876 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,895 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,400,893 >>> mbox cmd response: success
5,401,002 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,016 UART: [update-reset Success] --
5,410,031 UART: [state] Locking Datavault
5,410,799 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,403 UART: [state] Locking ICCM
5,411,847 UART: [exit] Launching FMC @ 0x40000130
5,417,176 UART:
5,417,192 UART: Running Caliptra FMC ...
5,417,600 UART:
5,417,743 UART: [state] CFI Enabled
5,507,164 UART: [art] Extend RT PCRs Done
5,507,592 UART: [art] Lock RT PCRs Done
5,508,939 UART: [art] Populate DV Done
5,517,254 UART: [fht] FMC Alias Private Key: 7
5,518,216 UART: [art] Derive CDI
5,518,496 UART: [art] Store in in slot 0x4
5,604,489 UART: [art] Derive Key Pair
5,604,849 UART: [art] Store priv key in slot 0x5
5,618,273 UART: [art] Derive Key Pair - Done
5,633,173 UART: [art] Signing Cert with AUTHO
5,633,653 UART: RITY.KEYID = 7
5,648,443 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,208 UART: [art] PUB.X = 29579EA70F28D100A813F9F61B2F7A2330490F2BAA2E15961D2063ED3B29C03A81262FCAEEB8831F4CAC76FF9B568175
5,655,956 UART: [art] PUB.Y = 2E7EBFF6443A43BB0405DFE25E992D77160CF5B52C35CFCA4F57DF5976B19C1E6009C8FE813E99B1A3038BD6AF06E335
5,662,902 UART: [art] SIG.R = B0FD7792AD9B254045B9E937EEBE96D123600B37CCD15B157EDB8839D9ED10F34DBD40231A347A96482AC8F42A130B30
5,669,674 UART: [art] SIG.S = 9AD61142648B11B4571AF5C4F2863079FB690CA3629195481C0E2EFE12589134D2E626FC30AA0CC6303067166AF19AB4
5,693,966 UART: Caliptra RT
5,694,311 UART: [state] CFI Enabled
5,978,201 UART: Disabled attest: DPE valid fail
5,978,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,980,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,711 UART: [rt]cmd =0x494e464f, len=4
6,014,128 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,826 ready_for_fw is high
1,060,826 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,235 >>> mbox cmd response: success
2,164,235 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,197 UART:
2,226,213 UART: Running Caliptra FMC ...
2,226,621 UART:
2,226,764 UART: [state] CFI Enabled
2,237,449 UART: [fht] FMC Alias Private Key: 7
2,345,862 UART: [art] Extend RT PCRs Done
2,346,290 UART: [art] Lock RT PCRs Done
2,347,532 UART: [art] Populate DV Done
2,355,585 UART: [fht] FMC Alias Private Key: 7
2,356,703 UART: [art] Derive CDI
2,356,983 UART: [art] Store in in slot 0x4
2,443,038 UART: [art] Derive Key Pair
2,443,398 UART: [art] Store priv key in slot 0x5
2,456,394 UART: [art] Derive Key Pair - Done
2,470,868 UART: [art] Signing Cert with AUTHO
2,471,348 UART: RITY.KEYID = 7
2,486,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,579 UART: [art] PUB.X = 3E4361D044BB50D09BCCE77303BB96E585926C86C428769FA6C0D75A083F4AA6A150E35F64595CC7A95195B5DFD0150A
2,494,344 UART: [art] PUB.Y = 77BD2C4055FAD9FFD611FFCFC2BD41C2AA44F185DE556777BEAE60EFFA03EF9C5861A6E414A8F43CA9D77E00D516299B
2,501,293 UART: [art] SIG.R = 86D0C76343A55F4A37194ABCED8C187C13A3A80040830D69A9F1CC3DBE0B22988E043BD18662B7E7EB1F906B412CEB6E
2,508,042 UART: [art] SIG.S = 125D242D7A61FB33646AAB1F592A48E37EA8C49D6346E0AD9081DE13C0CFBEB3712D6572834A5900302C14A8E707AC23
2,532,112 UART: mbox::rt_entry...
2,532,484 UART: ____ _ _ _ ____ _____
2,533,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,372 UART: |_|
2,536,684 UART:
2,643,622 UART: [rt] Runtime listening for mailbox commands...
2,648,590 >>> mbox cmd response data (3272 bytes)
2,648,591 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,677 >>> mbox cmd response data (0 bytes)
2,671,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,111,864 >>> mbox cmd response: success
5,125,466 UART:
5,125,482 UART: Running Caliptra FMC ...
5,125,890 UART:
5,126,033 UART: [state] CFI Enabled
5,215,066 UART: [art] Extend RT PCRs Done
5,215,494 UART: [art] Lock RT PCRs Done
5,216,529 UART: [art] Populate DV Done
5,224,864 UART: [fht] FMC Alias Private Key: 7
5,225,894 UART: [art] Derive CDI
5,226,174 UART: [art] Store in in slot 0x4
5,312,413 UART: [art] Derive Key Pair
5,312,773 UART: [art] Store priv key in slot 0x5
5,325,377 UART: [art] Derive Key Pair - Done
5,340,078 UART: [art] Signing Cert with AUTHO
5,340,558 UART: RITY.KEYID = 7
5,355,678 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,443 UART: [art] PUB.X = 7F6010B43666E9FE29D68A2651B3179AF34FB8FBB1667198B672DAF1899187F5750E3D45F071FA248A76DEB179AACF43
5,363,214 UART: [art] PUB.Y = 9F7C005E7718A0898D4881C927F66DBEBF6DFDDE3809BF1FA0E4F134B31F86F745BD9436D032AFD07E4B565A9FBD7639
5,370,153 UART: [art] SIG.R = D62D41A04CFC00FD50D75D3D6C3415B352BDBBEE08754544F9406205DD8846AEC19CDA85A93C26323F35787383679479
5,376,895 UART: [art] SIG.S = 89732C47376EDEE1517274D0239FBC4094CA183CC2B668B3382681CB14EF09CE8BF97D3A156282255C85448BB53B7B0F
5,400,782 UART: Caliptra RT
5,401,127 UART: [state] CFI Enabled
5,686,351 UART: Disabled attest: DPE valid fail
5,686,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,688,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,718,933 UART: [rt]cmd =0x494e464f, len=4
5,722,374 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,174,309 ready_for_fw is high
1,174,309 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,701 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,644 UART: [ldev] ++
1,209,812 UART: [ldev] CDI.KEYID = 6
1,210,176 UART: [ldev] SUBJECT.KEYID = 5
1,210,603 UART: [ldev] AUTHORITY.KEYID = 7
1,211,066 UART: [ldev] FE.KEYID = 1
1,216,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,828 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,015 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,405 >>> mbox cmd response: success
2,311,405 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,546 UART: [afmc] ++
2,312,714 UART: [afmc] CDI.KEYID = 6
2,313,077 UART: [afmc] SUBJECT.KEYID = 7
2,313,503 UART: [afmc] AUTHORITY.KEYID = 5
2,349,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,633 UART: [afmc] --
2,392,723 UART: [cold-reset] --
2,393,507 UART: [state] Locking Datavault
2,394,958 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,562 UART: [state] Locking ICCM
2,396,104 UART: [exit] Launching FMC @ 0x40000130
2,401,433 UART:
2,401,449 UART: Running Caliptra FMC ...
2,401,857 UART:
2,401,911 UART: [state] CFI Enabled
2,412,550 UART: [fht] FMC Alias Private Key: 7
2,520,537 UART: [art] Extend RT PCRs Done
2,520,965 UART: [art] Lock RT PCRs Done
2,522,701 UART: [art] Populate DV Done
2,530,808 UART: [fht] FMC Alias Private Key: 7
2,531,872 UART: [art] Derive CDI
2,532,152 UART: [art] Store in in slot 0x4
2,618,051 UART: [art] Derive Key Pair
2,618,411 UART: [art] Store priv key in slot 0x5
2,631,353 UART: [art] Derive Key Pair - Done
2,646,079 UART: [art] Signing Cert with AUTHO
2,646,559 UART: RITY.KEYID = 7
2,661,863 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,628 UART: [art] PUB.X = 128BAB2614B5AF9D6B1AB3B25D351017F1E71FFC890BFFD3A26501B6043A56606991333C6B3C77F6985AD4669B43C29E
2,669,393 UART: [art] PUB.Y = D2294E63465ECEA047022465EE5B96E494CD207A46F1DE119DACC8B061F21F198217323E9E289272D5ABB7BAA8FBA359
2,676,348 UART: [art] SIG.R = CC83A93CF94D3FDE5528566A6469C56B9619E4901B13C87253A45B271385796598333A8B3A448C8D84AE46EA9F0203A8
2,683,106 UART: [art] SIG.S = 11C4C6541F30AD90A06C3AB7BCB186E2B72D4A0A6E8EACD37921D94650CBF10B7ECA3DC91C78634A78F2DCBB2478B646
2,706,311 UART: mbox::rt_entry...
2,706,683 UART: ____ _ _ _ ____ _____
2,707,467 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,267 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,035 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,571 UART: |_|
2,710,883 UART:
2,817,605 UART: [rt] Runtime listening for mailbox commands...
2,822,573 >>> mbox cmd response data (3272 bytes)
2,822,574 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,660 >>> mbox cmd response data (0 bytes)
2,845,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,778 UART:
2,845,794 UART: Running Caliptra ROM ...
2,846,202 UART:
2,846,257 UART: [state] CFI Enabled
2,848,391 UART: [state] LifecycleState = Unprovisioned
2,849,046 UART: [state] DebugLocked = No
2,849,750 UART: [state] WD Timer not started. Device not locked for debugging
2,850,974 UART: [kat] SHA2-256
3,654,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,653 UART: [kat] ++
3,658,805 UART: [kat] sha1
3,663,069 UART: [kat] SHA2-256
3,665,009 UART: [kat] SHA2-384
3,667,900 UART: [kat] SHA2-512-ACC
3,669,800 UART: [kat] ECC-384
3,679,421 UART: [kat] HMAC-384Kdf
3,684,011 UART: [kat] LMS
3,932,323 UART: [kat] --
3,933,065 UART: [update-reset] ++
5,246,569 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,598 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,397,596 >>> mbox cmd response: success
5,397,933 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,947 UART: [update-reset Success] --
5,406,784 UART: [state] Locking Datavault
5,407,610 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,214 UART: [state] Locking ICCM
5,408,754 UART: [exit] Launching FMC @ 0x40000130
5,414,083 UART:
5,414,099 UART: Running Caliptra FMC ...
5,414,507 UART:
5,414,561 UART: [state] CFI Enabled
5,503,722 UART: [art] Extend RT PCRs Done
5,504,150 UART: [art] Lock RT PCRs Done
5,505,605 UART: [art] Populate DV Done
5,514,056 UART: [fht] FMC Alias Private Key: 7
5,515,146 UART: [art] Derive CDI
5,515,426 UART: [art] Store in in slot 0x4
5,601,153 UART: [art] Derive Key Pair
5,601,513 UART: [art] Store priv key in slot 0x5
5,614,817 UART: [art] Derive Key Pair - Done
5,629,268 UART: [art] Signing Cert with AUTHO
5,629,748 UART: RITY.KEYID = 7
5,644,722 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,487 UART: [art] PUB.X = 394C605418206E4E4A4809555C0D13590B1BEBE9414B65F8DEAB88C581319010323135543EAB2DDF3EC61FE3B11DD932
5,652,248 UART: [art] PUB.Y = DA1B197C438B5C117E747B4A6FA2D80C4B26DBF27F400DC4384E55378A0B0C4B95381C43B0A4A14E5644E69F0AE1BBB8
5,659,195 UART: [art] SIG.R = 9DFEAE8E7BD45B87DA5E54B95017903311B1EF6903E862CFAF5053CA514DE01F6381596CF167D034A84F7AA9369BA372
5,665,970 UART: [art] SIG.S = 34F926219AE2CF575CEDFF225BA6E4DBFE6A192E43A06B13BF95945156336FD79532482FA1C249ECED593CED2339A944
5,689,733 UART: Caliptra RT
5,689,986 UART: [state] CFI Enabled
5,972,413 UART: Disabled attest: DPE valid fail
5,972,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,974,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,759 UART: [rt]cmd =0x494e464f, len=4
6,008,072 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,436 ready_for_fw is high
1,056,436 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,151 >>> mbox cmd response: success
2,162,151 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,415 UART:
2,224,431 UART: Running Caliptra FMC ...
2,224,839 UART:
2,224,893 UART: [state] CFI Enabled
2,235,186 UART: [fht] FMC Alias Private Key: 7
2,342,531 UART: [art] Extend RT PCRs Done
2,342,959 UART: [art] Lock RT PCRs Done
2,344,593 UART: [art] Populate DV Done
2,352,892 UART: [fht] FMC Alias Private Key: 7
2,354,050 UART: [art] Derive CDI
2,354,330 UART: [art] Store in in slot 0x4
2,440,031 UART: [art] Derive Key Pair
2,440,391 UART: [art] Store priv key in slot 0x5
2,453,305 UART: [art] Derive Key Pair - Done
2,468,008 UART: [art] Signing Cert with AUTHO
2,468,488 UART: RITY.KEYID = 7
2,483,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,599 UART: [art] PUB.X = 2A5B8257FD022DAA2D448E6960862CA28426E61F7F83D6781406EC25A7FF85722F18B879363D71F4BC86F0170BBBF7A9
2,491,362 UART: [art] PUB.Y = 4783E1482AEDA85352EAFDFB8A64F66813C88ADF864156062ADC407D471BB881D3C7B43FC33451287A82ABB46D1020D5
2,498,315 UART: [art] SIG.R = 87233591C281F4CF45A146AC338C28B5B54BE5D30CFB56E30D21E6B8CFE1D591EDCC7AE4171C69ADD976D928C9EB70D3
2,505,095 UART: [art] SIG.S = 646649649F809846DF6F092BB4264AC1BA63C0676006DEDAD780B1246AB091F3F30B8D21218FBB51AA1F5030894CFABD
2,529,267 UART: mbox::rt_entry...
2,529,639 UART: ____ _ _ _ ____ _____
2,530,423 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,223 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,991 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,759 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,527 UART: |_|
2,533,839 UART:
2,641,069 UART: [rt] Runtime listening for mailbox commands...
2,646,037 >>> mbox cmd response data (3272 bytes)
2,646,038 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,124 >>> mbox cmd response data (0 bytes)
2,669,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,103,021 >>> mbox cmd response: success
5,116,541 UART:
5,116,557 UART: Running Caliptra FMC ...
5,116,965 UART:
5,117,019 UART: [state] CFI Enabled
5,206,082 UART: [art] Extend RT PCRs Done
5,206,510 UART: [art] Lock RT PCRs Done
5,207,783 UART: [art] Populate DV Done
5,216,232 UART: [fht] FMC Alias Private Key: 7
5,217,356 UART: [art] Derive CDI
5,217,636 UART: [art] Store in in slot 0x4
5,303,657 UART: [art] Derive Key Pair
5,304,017 UART: [art] Store priv key in slot 0x5
5,317,215 UART: [art] Derive Key Pair - Done
5,332,413 UART: [art] Signing Cert with AUTHO
5,332,893 UART: RITY.KEYID = 7
5,347,725 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,490 UART: [art] PUB.X = A99D5B0E61D3149C58B500E2F86B0C8E0AC93C7204794A9E52EDB52AAC7727A7ADA0E5300FB47C463F64C3A35C8BB016
5,355,235 UART: [art] PUB.Y = FF575B057BC2E2D765BCC08B7B1A077584FE189C384B108803936CEBF5C3F9946009D46E061E9C0EFEC875106D7F2434
5,362,171 UART: [art] SIG.R = E285F784D666AEBF69DF878980A4E19DB64820A5A20623C2FEB8F8FF0353D2377FA280F53962B644F2A33BA688871B00
5,368,915 UART: [art] SIG.S = 3FCDB4E4601EFD8A66F834340A261D4FE2836BD8EA07633F0B19999A55840A8D2BDBC5731A9BE826F802C6866BC8CFEC
5,392,561 UART: Caliptra RT
5,392,814 UART: [state] CFI Enabled
5,680,019 UART: Disabled attest: DPE valid fail
5,680,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,681,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,712,487 UART: [rt]cmd =0x494e464f, len=4
5,715,972 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,196 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,434 UART: [kat] SHA2-256
901,374 UART: [kat] SHA2-384
903,983 UART: [kat] SHA2-512-ACC
905,884 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 ready_for_fw is high
1,174,032 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,724 UART: [idev] Erasing UDS.KEYID = 0
1,198,654 UART: [idev] Sha1 KeyId Algorithm
1,207,498 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,137 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,341 UART: [ldev] --
1,280,643 UART: [fwproc] Wait for Commands...
1,281,440 UART: [fwproc] Recv command 0x46574c44
1,282,173 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,524 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,309,986 >>> mbox cmd response: success
2,309,986 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,135 UART: [afmc] ++
2,311,303 UART: [afmc] CDI.KEYID = 6
2,311,666 UART: [afmc] SUBJECT.KEYID = 7
2,312,092 UART: [afmc] AUTHORITY.KEYID = 5
2,348,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,843 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,726 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,278 UART: [afmc] --
2,392,310 UART: [cold-reset] --
2,393,272 UART: [state] Locking Datavault
2,394,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,059 UART: [state] Locking ICCM
2,395,509 UART: [exit] Launching FMC @ 0x40000130
2,400,838 UART:
2,400,854 UART: Running Caliptra FMC ...
2,401,262 UART:
2,401,405 UART: [state] CFI Enabled
2,412,090 UART: [fht] FMC Alias Private Key: 7
2,520,341 UART: [art] Extend RT PCRs Done
2,520,769 UART: [art] Lock RT PCRs Done
2,522,155 UART: [art] Populate DV Done
2,530,526 UART: [fht] FMC Alias Private Key: 7
2,531,618 UART: [art] Derive CDI
2,531,898 UART: [art] Store in in slot 0x4
2,617,487 UART: [art] Derive Key Pair
2,617,847 UART: [art] Store priv key in slot 0x5
2,631,151 UART: [art] Derive Key Pair - Done
2,645,791 UART: [art] Signing Cert with AUTHO
2,646,271 UART: RITY.KEYID = 7
2,661,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,566 UART: [art] PUB.X = 12E81F754A256BBC306698A8F7BD2596DD27EC7E39A80D00001394A67EC51B01431D370FE745F1F0F408C0929CBF80D1
2,669,282 UART: [art] PUB.Y = EF0F3383317801AD22E727038E9C2A5CCF4BEE988ABEC5204B9B8E884A4DD608370A8B47F7C4A2EFCC6589E4027A0F47
2,676,223 UART: [art] SIG.R = D67456D0F129AD5AD4BC73D7896ED0B32279349143E8D7E7AFD2F1A172E8C3A99AC01ED7323B86631FC30D4E54075681
2,682,991 UART: [art] SIG.S = 587146D0CACC43A57AEB400D56B12712C2D52EE48BC4C1868DB3B3A2C57238FCFCB04E5CE693E53BE0FDF3C233DEF218
2,706,627 UART: mbox::rt_entry...
2,706,999 UART: ____ _ _ _ ____ _____
2,707,783 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,119 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,887 UART: |_|
2,711,199 UART:
2,817,683 UART: [rt] Runtime listening for mailbox commands...
2,822,651 >>> mbox cmd response data (3272 bytes)
2,822,652 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,738 >>> mbox cmd response data (0 bytes)
2,845,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,856 UART:
2,845,872 UART: Running Caliptra ROM ...
2,846,280 UART:
2,846,422 UART: [state] CFI Enabled
2,849,230 UART: [state] LifecycleState = Unprovisioned
2,849,885 UART: [state] DebugLocked = No
2,850,531 UART: [state] WD Timer not started. Device not locked for debugging
2,851,837 UART: [kat] SHA2-256
3,655,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,516 UART: [kat] ++
3,659,668 UART: [kat] sha1
3,663,806 UART: [kat] SHA2-256
3,665,746 UART: [kat] SHA2-384
3,668,561 UART: [kat] SHA2-512-ACC
3,670,461 UART: [kat] ECC-384
3,680,172 UART: [kat] HMAC-384Kdf
3,684,918 UART: [kat] LMS
3,933,230 UART: [kat] --
3,934,134 UART: [update-reset] ++
5,247,534 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,509 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,507 >>> mbox cmd response: success
5,398,694 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,708 UART: [update-reset Success] --
5,407,803 UART: [state] Locking Datavault
5,408,703 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,307 UART: [state] Locking ICCM
5,409,929 UART: [exit] Launching FMC @ 0x40000130
5,415,258 UART:
5,415,274 UART: Running Caliptra FMC ...
5,415,682 UART:
5,415,825 UART: [state] CFI Enabled
5,504,916 UART: [art] Extend RT PCRs Done
5,505,344 UART: [art] Lock RT PCRs Done
5,506,669 UART: [art] Populate DV Done
5,514,764 UART: [fht] FMC Alias Private Key: 7
5,515,922 UART: [art] Derive CDI
5,516,202 UART: [art] Store in in slot 0x4
5,601,813 UART: [art] Derive Key Pair
5,602,173 UART: [art] Store priv key in slot 0x5
5,615,317 UART: [art] Derive Key Pair - Done
5,629,966 UART: [art] Signing Cert with AUTHO
5,630,446 UART: RITY.KEYID = 7
5,645,666 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,431 UART: [art] PUB.X = 28A99126050A8898128D4E6B1266643B734B3E3DD8A0D1E995A8038B41113EE4B70BC2B58C2EE6D58FB81C166608CDD4
5,653,186 UART: [art] PUB.Y = FB6E6A217D05B177D49DF8BE4EB34FC6CA14CDF7F7331C803CE6366AC1804B2F5BB85BD2406BF8D50F00DB04C2B0CB51
5,660,127 UART: [art] SIG.R = 79505E7CB166FDBDA8CCF2E3E40D5C5C835FF174AE1DEA1E0845055BE1B6E3984153A239093A65F194CBA68796210C17
5,666,890 UART: [art] SIG.S = 78E79B01F44289057A1458EFDDE9E6F788CE63A8586F046C5D86262DBDA3DD0B3C97F788D1DCADB9E8F33F4E13DA3521
5,690,793 UART: Caliptra RT
5,691,138 UART: [state] CFI Enabled
5,974,741 UART: Disabled attest: DPE valid fail
5,975,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,976,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,303 UART: [rt]cmd =0x494e464f, len=4
6,010,508 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,993 ready_for_fw is high
1,055,993 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,856 >>> mbox cmd response: success
2,160,856 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,802 UART:
2,223,818 UART: Running Caliptra FMC ...
2,224,226 UART:
2,224,369 UART: [state] CFI Enabled
2,235,342 UART: [fht] FMC Alias Private Key: 7
2,343,681 UART: [art] Extend RT PCRs Done
2,344,109 UART: [art] Lock RT PCRs Done
2,345,723 UART: [art] Populate DV Done
2,353,860 UART: [fht] FMC Alias Private Key: 7
2,355,004 UART: [art] Derive CDI
2,355,284 UART: [art] Store in in slot 0x4
2,440,931 UART: [art] Derive Key Pair
2,441,291 UART: [art] Store priv key in slot 0x5
2,455,337 UART: [art] Derive Key Pair - Done
2,470,112 UART: [art] Signing Cert with AUTHO
2,470,592 UART: RITY.KEYID = 7
2,485,842 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,607 UART: [art] PUB.X = CEA62674C6816E3B967D9A801E5EFF7D20E78A2E1D39A8464128257415B8DBD7177A720BB8F0708D527079CA712D478F
2,493,374 UART: [art] PUB.Y = 0F803698AE02C5C8B9CC59B6BBF83A23FBE6C01C1BDE7DC40B64264DECF28BC501FFE7E40279CB7C362BC89F71F2C5B7
2,500,333 UART: [art] SIG.R = 16F95923CDE4452983F0F9B4C7852C6E527CEFF9AE16E8E659B17BF38587C15891BFF78BED66509E671FDDEFE5342129
2,507,111 UART: [art] SIG.S = 05672EE303F3D0276E0CDAD371F3FDBD991F2136BFC8FDD656347C9BD14AF9AB1A976CF87780A9E16974AC27AE4326CE
2,530,795 UART: mbox::rt_entry...
2,531,167 UART: ____ _ _ _ ____ _____
2,531,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,751 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,055 UART: |_|
2,535,367 UART:
2,641,769 UART: [rt] Runtime listening for mailbox commands...
2,646,737 >>> mbox cmd response data (3272 bytes)
2,646,738 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,824 >>> mbox cmd response data (0 bytes)
2,669,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,105,212 >>> mbox cmd response: success
5,118,884 UART:
5,118,900 UART: Running Caliptra FMC ...
5,119,308 UART:
5,119,451 UART: [state] CFI Enabled
5,208,804 UART: [art] Extend RT PCRs Done
5,209,232 UART: [art] Lock RT PCRs Done
5,210,307 UART: [art] Populate DV Done
5,218,430 UART: [fht] FMC Alias Private Key: 7
5,219,596 UART: [art] Derive CDI
5,219,876 UART: [art] Store in in slot 0x4
5,305,563 UART: [art] Derive Key Pair
5,305,923 UART: [art] Store priv key in slot 0x5
5,319,251 UART: [art] Derive Key Pair - Done
5,334,141 UART: [art] Signing Cert with AUTHO
5,334,621 UART: RITY.KEYID = 7
5,349,673 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,438 UART: [art] PUB.X = D1AA0300D1E16C5F984E82DED49CFCD647150FBB8F25A9232E58173F9DF8C6E05227C13194368F67248EC41609B37F29
5,357,179 UART: [art] PUB.Y = 3F0C8257D802B508FF89279C907429E030086D6AA8EEFC92BFF5CDC543B1E3B538CCD41142FE0A5BC61EDA04A8A438D1
5,364,125 UART: [art] SIG.R = A6B7E61BF77205070714CF5471B78E0C607AE0EAAB8F4AAD767319AE3B56D839D4CCDF83740EFB9DA8B4F65F4E2FF87C
5,370,900 UART: [art] SIG.S = 322C035F23ECEC3058B7CE8A7D848D0333556CDC6B98AD4FD35CA7E161609CD31FA6AB84EF04DA5392418F8ED06E776E
5,395,202 UART: Caliptra RT
5,395,547 UART: [state] CFI Enabled
5,678,666 UART: Disabled attest: DPE valid fail
5,679,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,680,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,711,204 UART: [rt]cmd =0x494e464f, len=4
5,714,661 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
191,996 UART:
192,362 UART: Running Caliptra ROM ...
193,460 UART:
193,604 UART: [state] CFI Enabled
263,919 UART: [state] LifecycleState = Unprovisioned
265,906 UART: [state] DebugLocked = No
268,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,859 UART: [kat] SHA2-256
443,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,085 UART: [kat] ++
454,538 UART: [kat] sha1
465,480 UART: [kat] SHA2-256
468,124 UART: [kat] SHA2-384
475,179 UART: [kat] SHA2-512-ACC
477,576 UART: [kat] ECC-384
2,766,990 UART: [kat] HMAC-384Kdf
2,797,913 UART: [kat] LMS
3,988,167 UART: [kat] --
3,991,163 UART: [cold-reset] ++
3,992,885 UART: [fht] Storing FHT @ 0x50003400
4,003,873 UART: [idev] ++
4,004,448 UART: [idev] CDI.KEYID = 6
4,005,382 UART: [idev] SUBJECT.KEYID = 7
4,006,632 UART: [idev] UDS.KEYID = 0
4,007,701 ready_for_fw is high
4,007,919 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,107,319 UART: [idev] Erasing UDS.KEYID = 0
7,345,434 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,686 UART: [idev] --
7,370,438 UART: [ldev] ++
7,371,035 UART: [ldev] CDI.KEYID = 6
7,372,055 UART: [ldev] SUBJECT.KEYID = 5
7,373,221 UART: [ldev] AUTHORITY.KEYID = 7
7,374,453 UART: [ldev] FE.KEYID = 1
7,420,756 UART: [ldev] Erasing FE.KEYID = 1
10,752,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,950 UART: [ldev] --
13,111,859 UART: [fwproc] Waiting for Commands...
13,113,628 UART: [fwproc] Received command 0x46574c44
13,115,811 UART: [fwproc] Received Image of size 78740 bytes
16,740,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,814,761 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,883,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,076,620 >>> mbox cmd response: success
17,077,129 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,081,177 UART: [afmc] ++
17,081,780 UART: [afmc] CDI.KEYID = 6
17,082,673 UART: [afmc] SUBJECT.KEYID = 7
17,083,948 UART: [afmc] AUTHORITY.KEYID = 5
20,451,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,748,040 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,750,301 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,764,693 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,779,545 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,793,978 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,815,583 UART: [afmc] --
22,818,754 UART: [cold-reset] --
22,822,488 UART: [state] Locking Datavault
22,826,470 UART: [state] Locking PCR0, PCR1 and PCR31
22,828,184 UART: [state] Locking ICCM
22,829,852 UART: [exit] Launching FMC @ 0x40000130
22,838,192 UART:
22,838,425 UART: Running Caliptra FMC ...
22,839,525 UART:
22,839,687 UART: [state] CFI Enabled
22,907,739 UART: [fht] FMC Alias Private Key: 7
25,245,615 UART: [art] Extend RT PCRs Done
25,246,847 UART: [art] Lock RT PCRs Done
25,248,259 UART: [art] Populate DV Done
25,253,674 UART: [fht] FMC Alias Private Key: 7
25,255,318 UART: [art] Derive CDI
25,256,134 UART: [art] Store in in slot 0x4
25,315,964 UART: [art] Derive Key Pair
25,317,001 UART: [art] Store priv key in slot 0x5
28,609,207 UART: [art] Derive Key Pair - Done
28,622,090 UART: [art] Signing Cert with AUTHO
28,623,402 UART: RITY.KEYID = 7
30,910,564 UART: [art] Erasing AUTHORITY.KEYID = 7
30,912,069 UART: [art] PUB.X = 4CFD27BF186116D2E3B34CEF7D9E886878D02973D3AE8046635004E9C5AAA139C5190AE75351F5BC8C9081E95260A9D0
30,919,337 UART: [art] PUB.Y = FA23994663598946642EFEA7C9AE3A85E2B58F11416B3F51938D2E7D7F1B8AEA2AC6D6C3EA8829C97AB09E05C1B9D3C5
30,926,576 UART: [art] SIG.R = 88A76FD810352340F26A2D10B84EAD4038F1AB98DD663D837084F7AC1B0BDFA0D28DC6D8B00CE04FD77432B3D040CFF0
30,933,972 UART: [art] SIG.S = 9640BF340189C9A3B667BE4DDF2CA92833C420006EC03CAA7A6C47E189ADD70D8F131BB32B21D358D216BD68DDE290EB
32,238,864 UART: mbox::rt_entry...
32,239,833 UART: ____ _ _ _ ____ _____
32,241,764 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,243,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,245,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,247,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,249,555 UART: |_|
32,250,362 UART:
32,363,979 UART: [rt] Runtime listening for mailbox commands...
32,369,847 >>> mbox cmd response data (3272 bytes)
32,385,635 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,419,038 >>> mbox cmd response data (0 bytes)
34,552,258 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,696,683 UART:
34,697,048 UART: Running Caliptra ROM ...
34,698,100 UART:
34,698,253 UART: [state] CFI Enabled
34,770,718 UART: [state] LifecycleState = Unprovisioned
34,772,686 UART: [state] DebugLocked = No
34,774,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,779,054 UART: [kat] SHA2-256
34,948,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,959,227 UART: [kat] ++
34,959,682 UART: [kat] sha1
34,970,894 UART: [kat] SHA2-256
34,973,588 UART: [kat] SHA2-384
34,979,254 UART: [kat] SHA2-512-ACC
34,981,644 UART: [kat] ECC-384
37,273,318 UART: [kat] HMAC-384Kdf
37,305,094 UART: [kat] LMS
38,495,425 UART: [kat] --
38,499,095 UART: [update-reset] ++
42,642,724 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,647,310 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,029,590 >>> mbox cmd response: success
43,034,307 UART: [update-reset] Copying MAN_2 To MAN_1
43,052,652 UART: [update-reset Success] --
43,056,958 UART: [state] Locking Datavault
43,060,079 UART: [state] Locking PCR0, PCR1 and PCR31
43,061,801 UART: [state] Locking ICCM
43,063,257 UART: [exit] Launching FMC @ 0x40000130
43,071,672 UART:
43,071,914 UART: Running Caliptra FMC ...
43,073,014 UART:
43,073,178 UART: [state] CFI Enabled
43,159,480 UART: [art] Extend RT PCRs Done
43,160,696 UART: [art] Lock RT PCRs Done
43,162,101 UART: [art] Populate DV Done
43,167,402 UART: [fht] FMC Alias Private Key: 7
43,168,894 UART: [art] Derive CDI
43,169,712 UART: [art] Store in in slot 0x4
43,228,306 UART: [art] Derive Key Pair
43,229,345 UART: [art] Store priv key in slot 0x5
46,522,445 UART: [art] Derive Key Pair - Done
46,535,602 UART: [art] Signing Cert with AUTHO
46,536,917 UART: RITY.KEYID = 7
48,824,284 UART: [art] Erasing AUTHORITY.KEYID = 7
48,825,794 UART: [art] PUB.X = 29FA544099D361B6AFB14DE9E095E7069E9E45C1833E16E5CC61B4EEF5CC74976579322C46155AEEBF87EF3020AC3672
48,833,058 UART: [art] PUB.Y = 0314100CEA4182A1ACBE07FC8590D7C5585AAFD4FB26157C14E9CE00301A535D1C1A1B32901216947A39E08434B35C14
48,840,235 UART: [art] SIG.R = 772D298491A303C53E3C20348DA202922379053467CEB36180D20DF91D0A1B1507AC9EA6EFC78A70E181665360C26931
48,847,596 UART: [art] SIG.S = F45C3360BC1573C873CD799CFB8138B6AA7826DA4A2053EF7EFEF9230672D6E4F94C06BF42457524261485B64CFB26C0
50,152,288 UART: Caliptra RT
50,153,007 UART: [state] CFI Enabled
53,539,895 UART: Disabled attest: DPE valid fail
53,541,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,542,378 UART: [rt] RT listening for mailbox commands...
53,573,981 UART: [rt]cmd =0x494e464f, len=4
53,577,933 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,804,921 ready_for_fw is high
3,805,465 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,178,338 >>> mbox cmd response: success
17,178,915 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,862,252 UART:
22,862,623 UART: Running Caliptra FMC ...
22,863,754 UART:
22,863,914 UART: [state] CFI Enabled
22,932,238 UART: [fht] FMC Alias Private Key: 7
25,270,672 UART: [art] Extend RT PCRs Done
25,271,952 UART: [art] Lock RT PCRs Done
25,273,236 UART: [art] Populate DV Done
25,278,501 UART: [fht] FMC Alias Private Key: 7
25,280,156 UART: [art] Derive CDI
25,280,978 UART: [art] Store in in slot 0x4
25,341,297 UART: [art] Derive Key Pair
25,342,338 UART: [art] Store priv key in slot 0x5
28,634,920 UART: [art] Derive Key Pair - Done
28,647,802 UART: [art] Signing Cert with AUTHO
28,649,114 UART: RITY.KEYID = 7
30,937,400 UART: [art] Erasing AUTHORITY.KEYID = 7
30,938,903 UART: [art] PUB.X = ED503E169AB2CEB8DA241EBBB232B2450A9A9FF8BF343EB414053DF0DAC96152DC7EC9232FFB9C8D359BAFB86811CC31
30,946,229 UART: [art] PUB.Y = B5B2B6E9E3F2153D44BB07AF9C1FAB5707AA50A19AE40B50AC36FD7AB853C9F32E835B524E6E26C86DB7023AD2BB3F83
30,953,469 UART: [art] SIG.R = 63EDC0185426C4725F36EABB87CA4DC57B90CBCCD89F8EC3F77D1030A9F49EE8EDD24895DCB79F368C7BA113FA0C16C7
30,960,865 UART: [art] SIG.S = 82C1AEA4E88165A7C1222733B1CF315F89C6510F6ABFF82AD152F2486A85794746A59A34F5712F5F513496BBC7CDF0C8
32,265,941 UART: mbox::rt_entry...
32,266,919 UART: ____ _ _ _ ____ _____
32,268,908 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,270,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,272,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,274,816 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,276,748 UART: |_|
32,277,557 UART:
32,391,138 UART: [rt] Runtime listening for mailbox commands...
32,397,003 >>> mbox cmd response data (3272 bytes)
32,412,749 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,446,152 >>> mbox cmd response data (0 bytes)
34,579,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,304,783 >>> mbox cmd response: success
43,340,182 UART:
43,340,488 UART: Running Caliptra FMC ...
43,341,733 UART:
43,341,898 UART: [state] CFI Enabled
43,448,907 UART: [art] Extend RT PCRs Done
43,450,101 UART: [art] Lock RT PCRs Done
43,451,299 UART: [art] Populate DV Done
43,456,769 UART: [fht] FMC Alias Private Key: 7
43,458,360 UART: [art] Derive CDI
43,459,175 UART: [art] Store in in slot 0x4
43,517,893 UART: [art] Derive Key Pair
43,518,925 UART: [art] Store priv key in slot 0x5
46,812,133 UART: [art] Derive Key Pair - Done
46,825,138 UART: [art] Signing Cert with AUTHO
46,826,450 UART: RITY.KEYID = 7
49,113,084 UART: [art] Erasing AUTHORITY.KEYID = 7
49,114,597 UART: [art] PUB.X = 14D4570E4E1CF3933E8E640B1C208F95A7FDA34165A7B96FED184495587DF32272EA1E45E38BD35006FA421F9A0CC6BA
49,121,832 UART: [art] PUB.Y = D42DF8F3C885D3C466AA96C57544704C5A653A169ED8E42BB597E39E7D5665F7E4F54C8CD933A131DC80F17BD29D2A82
49,129,051 UART: [art] SIG.R = F7DE12178804BC1FFCC501860A3A969EE7B2133B02EDD787942EBFBE200E8C2B110E09349080D366F61B4FBB939FCBC0
49,136,468 UART: [art] SIG.S = E69ADDF4930C604E319C61BBCD9C0CA945B7344163DE326ED33745BA656E4C06F8167B0D1A7861B19C934AD74784F587
50,441,595 UART: Caliptra RT
50,442,293 UART: [state] CFI Enabled
53,828,230 UART: Disabled attest: DPE valid fail
53,830,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,830,662 UART: [rt] RT listening for mailbox commands...
53,861,941 UART: [rt]cmd =0x494e464f, len=4
53,865,898 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,289 UART:
192,656 UART: Running Caliptra ROM ...
193,848 UART:
603,544 UART: [state] CFI Enabled
615,670 UART: [state] LifecycleState = Unprovisioned
617,619 UART: [state] DebugLocked = No
618,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,362 UART: [kat] SHA2-256
793,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,674 UART: [kat] ++
804,120 UART: [kat] sha1
815,163 UART: [kat] SHA2-256
817,813 UART: [kat] SHA2-384
822,592 UART: [kat] SHA2-512-ACC
824,965 UART: [kat] ECC-384
3,112,055 UART: [kat] HMAC-384Kdf
3,123,728 UART: [kat] LMS
4,313,864 UART: [kat] --
4,319,485 UART: [cold-reset] ++
4,321,623 UART: [fht] Storing FHT @ 0x50003400
4,332,700 UART: [idev] ++
4,333,263 UART: [idev] CDI.KEYID = 6
4,334,239 UART: [idev] SUBJECT.KEYID = 7
4,335,482 UART: [idev] UDS.KEYID = 0
4,336,526 ready_for_fw is high
4,336,722 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,435,672 UART: [idev] Erasing UDS.KEYID = 0
7,619,668 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,395 UART: [idev] --
7,646,307 UART: [ldev] ++
7,646,872 UART: [ldev] CDI.KEYID = 6
7,647,812 UART: [ldev] SUBJECT.KEYID = 5
7,649,070 UART: [ldev] AUTHORITY.KEYID = 7
7,650,304 UART: [ldev] FE.KEYID = 1
7,659,199 UART: [ldev] Erasing FE.KEYID = 1
10,948,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,153 UART: [ldev] --
13,310,142 UART: [fwproc] Waiting for Commands...
13,313,467 UART: [fwproc] Received command 0x46574c44
13,315,644 UART: [fwproc] Received Image of size 78740 bytes
16,935,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,009,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,078,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,271,470 >>> mbox cmd response: success
17,271,968 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,275,231 UART: [afmc] ++
17,275,811 UART: [afmc] CDI.KEYID = 6
17,276,933 UART: [afmc] SUBJECT.KEYID = 7
17,278,052 UART: [afmc] AUTHORITY.KEYID = 5
20,587,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,883,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,885,464 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,899,867 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,914,696 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,929,143 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,948,970 UART: [afmc] --
22,952,413 UART: [cold-reset] --
22,956,757 UART: [state] Locking Datavault
22,961,296 UART: [state] Locking PCR0, PCR1 and PCR31
22,962,986 UART: [state] Locking ICCM
22,964,860 UART: [exit] Launching FMC @ 0x40000130
22,973,260 UART:
22,973,490 UART: Running Caliptra FMC ...
22,974,584 UART:
22,974,760 UART: [state] CFI Enabled
22,982,751 UART: [fht] FMC Alias Private Key: 7
25,313,576 UART: [art] Extend RT PCRs Done
25,314,797 UART: [art] Lock RT PCRs Done
25,316,815 UART: [art] Populate DV Done
25,322,329 UART: [fht] FMC Alias Private Key: 7
25,323,806 UART: [art] Derive CDI
25,324,533 UART: [art] Store in in slot 0x4
25,367,547 UART: [art] Derive Key Pair
25,368,581 UART: [art] Store priv key in slot 0x5
28,610,109 UART: [art] Derive Key Pair - Done
28,623,262 UART: [art] Signing Cert with AUTHO
28,624,589 UART: RITY.KEYID = 7
30,903,957 UART: [art] Erasing AUTHORITY.KEYID = 7
30,905,462 UART: [art] PUB.X = 1F47061053B6D44DC0C66806649501BF7C53680E90B99BAA7E8CF1709E34EECE2C7312607AE18DF4E2DDDEF99CCA56A7
30,912,752 UART: [art] PUB.Y = DADCC80EAA6947326B4B1E5625011E5B7E362581E37392CAC13DDC4C51F19BB492F26F6055711D67505ADD5B156499D1
30,919,994 UART: [art] SIG.R = 71C34E799998BB7F3DE61BFED2132F3ECC53DA729B6C5D33C0F133348B29CAD181CEE159A5EFC9F0DEA5B119699CD9BE
30,927,381 UART: [art] SIG.S = 75E8A011CE456CC117F7F38CB3B6ADE265FEAB62E1B3136DD50C4F42E75FFF6AF7B5153F7134BA0BFB0DF03BD71910A1
32,232,424 UART: mbox::rt_entry...
32,233,378 UART: ____ _ _ _ ____ _____
32,235,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,237,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,239,278 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,241,201 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,243,126 UART: |_|
32,243,928 UART:
32,358,342 UART: [rt] Runtime listening for mailbox commands...
32,364,186 >>> mbox cmd response data (3272 bytes)
32,380,243 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,413,685 >>> mbox cmd response data (0 bytes)
34,478,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,622,939 UART:
34,623,313 UART: Running Caliptra ROM ...
34,624,364 UART:
34,624,564 UART: [state] CFI Enabled
34,636,247 UART: [state] LifecycleState = Unprovisioned
34,638,187 UART: [state] DebugLocked = No
34,641,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,645,829 UART: [kat] SHA2-256
34,815,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,826,103 UART: [kat] ++
34,826,746 UART: [kat] sha1
34,837,932 UART: [kat] SHA2-256
34,840,675 UART: [kat] SHA2-384
34,846,276 UART: [kat] SHA2-512-ACC
34,848,673 UART: [kat] ECC-384
37,133,267 UART: [kat] HMAC-384Kdf
37,146,513 UART: [kat] LMS
38,336,549 UART: [kat] --
38,338,766 UART: [update-reset] ++
42,487,096 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,491,239 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,873,526 >>> mbox cmd response: success
42,878,573 UART: [update-reset] Copying MAN_2 To MAN_1
42,897,900 UART: [update-reset Success] --
42,901,619 UART: [state] Locking Datavault
42,905,471 UART: [state] Locking PCR0, PCR1 and PCR31
42,907,207 UART: [state] Locking ICCM
42,909,868 UART: [exit] Launching FMC @ 0x40000130
42,918,323 UART:
42,918,554 UART: Running Caliptra FMC ...
42,919,574 UART:
42,919,715 UART: [state] CFI Enabled
42,964,108 UART: [art] Extend RT PCRs Done
42,965,296 UART: [art] Lock RT PCRs Done
42,966,990 UART: [art] Populate DV Done
42,972,445 UART: [fht] FMC Alias Private Key: 7
42,974,089 UART: [art] Derive CDI
42,974,819 UART: [art] Store in in slot 0x4
43,017,940 UART: [art] Derive Key Pair
43,019,204 UART: [art] Store priv key in slot 0x5
46,261,372 UART: [art] Derive Key Pair - Done
46,274,649 UART: [art] Signing Cert with AUTHO
46,275,952 UART: RITY.KEYID = 7
48,555,101 UART: [art] Erasing AUTHORITY.KEYID = 7
48,556,607 UART: [art] PUB.X = C69214D7190F5A8DFAB94158D6BBFFAD7EB5D5072ACA5A6F6BB3382F485D696BFD32ACB4554559027AF803BFA182B495
48,563,880 UART: [art] PUB.Y = 934080FC51AED888E8D102351928D257DF1599BF8D935665C72A35F2E3D2CA3C5244A6CABE22EF97BAF9078ACADD7A0E
48,571,127 UART: [art] SIG.R = C1B1E4E7EDC11C3DA77B8E4C296A63DB0F3FA91EDCB5BFE15F065C71F13B12BCE211576F8365005119256DB8492D8858
48,578,492 UART: [art] SIG.S = 72091BA8BEA0161B5303EFADAC3CB4EF12A2B06C8C5DB4A0474F2DCBFC649CFB554C50E6CA6C56A99F6BB029EB0941A4
49,883,837 UART: Caliptra RT
49,884,549 UART: [state] CFI Enabled
53,177,984 UART: Disabled attest: DPE valid fail
53,179,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,180,598 UART: [rt] RT listening for mailbox commands...
53,211,755 UART: [rt]cmd =0x494e464f, len=4
53,215,430 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,125,989 ready_for_fw is high
4,126,536 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,350,726 >>> mbox cmd response: success
17,351,526 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,993,081 UART:
22,993,469 UART: Running Caliptra FMC ...
22,994,602 UART:
22,994,757 UART: [state] CFI Enabled
23,002,575 UART: [fht] FMC Alias Private Key: 7
25,333,021 UART: [art] Extend RT PCRs Done
25,334,252 UART: [art] Lock RT PCRs Done
25,335,618 UART: [art] Populate DV Done
25,341,142 UART: [fht] FMC Alias Private Key: 7
25,342,676 UART: [art] Derive CDI
25,343,505 UART: [art] Store in in slot 0x4
25,385,771 UART: [art] Derive Key Pair
25,386,811 UART: [art] Store priv key in slot 0x5
28,628,487 UART: [art] Derive Key Pair - Done
28,641,320 UART: [art] Signing Cert with AUTHO
28,642,612 UART: RITY.KEYID = 7
30,922,254 UART: [art] Erasing AUTHORITY.KEYID = 7
30,923,801 UART: [art] PUB.X = 67EC47153F9E3CCA9C2E6B7D6887C79699A1CD7940A43265090860ADBC34E429BD5D256104A33DA599D1D1B26E2FD170
30,930,996 UART: [art] PUB.Y = 19468B63272F5997AF552238D659488D927EFBF92562524923F438B184EBFD45ADAA59DFED9327276A551FFBDA072A23
30,938,209 UART: [art] SIG.R = 9E20CAD3DAB094F78856D61F2BF7D986619C11E4C01FE82E11D2D0964E7F10A07E369839AF13BE0A61F61BF90614993E
30,946,068 UART: [art] SIG.S = AE58DBC7F4E430D7649A0D3B3344AB0A29E040A970207A83AA76D547A8B542929F1CC9F4570AF00E1BF4B13815A26D29
32,250,378 UART: mbox::rt_entry...
32,251,321 UART: ____ _ _ _ ____ _____
32,253,298 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,255,307 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,257,234 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,259,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,261,142 UART: |_|
32,261,944 UART:
32,375,178 UART: [rt] Runtime listening for mailbox commands...
32,381,022 >>> mbox cmd response data (3272 bytes)
32,397,128 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,430,595 >>> mbox cmd response data (0 bytes)
34,486,894 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,131,983 >>> mbox cmd response: success
43,166,161 UART:
43,166,473 UART: Running Caliptra FMC ...
43,167,597 UART:
43,167,781 UART: [state] CFI Enabled
43,211,805 UART: [art] Extend RT PCRs Done
43,212,994 UART: [art] Lock RT PCRs Done
43,214,660 UART: [art] Populate DV Done
43,219,954 UART: [fht] FMC Alias Private Key: 7
43,221,482 UART: [art] Derive CDI
43,222,241 UART: [art] Store in in slot 0x4
43,265,038 UART: [art] Derive Key Pair
43,266,243 UART: [art] Store priv key in slot 0x5
46,508,410 UART: [art] Derive Key Pair - Done
46,521,088 UART: [art] Signing Cert with AUTHO
46,522,403 UART: RITY.KEYID = 7
48,801,681 UART: [art] Erasing AUTHORITY.KEYID = 7
48,803,186 UART: [art] PUB.X = 144E9D8495C38D40DAE99CE82B5886D47D2C65F32DFEFC45D193464064E18B1CE12C6A5B63F188AF227790A76A8BD257
48,810,451 UART: [art] PUB.Y = 24104EE5643D336FFD50232AE97171F54DA1A67AEA643D25FFB1388E0306153172FFE6EADF86D60DEBDCD09EF7425B65
48,817,664 UART: [art] SIG.R = 58CCE469970DDFDFF0A8FA7C723361BBF8883C670EC220F29063621ECECFF6528B6300889356B8205FDFDD89197149BD
48,825,070 UART: [art] SIG.S = 95DCCA9BCDE378775371F9839C367876E27929CB254222FBFCCE16F1C00F1D94503234182365B05286E7C4DE5BE64422
50,130,473 UART: Caliptra RT
50,131,200 UART: [state] CFI Enabled
53,424,794 UART: Disabled attest: DPE valid fail
53,426,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,427,326 UART: [rt] RT listening for mailbox commands...
53,458,658 UART: [rt]cmd =0x494e464f, len=4
53,462,554 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,158 UART:
192,521 UART: Running Caliptra ROM ...
193,703 UART:
193,851 UART: [state] CFI Enabled
261,157 UART: [state] LifecycleState = Unprovisioned
263,069 UART: [state] DebugLocked = No
264,468 UART: [state] WD Timer not started. Device not locked for debugging
268,291 UART: [kat] SHA2-256
447,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,968 UART: [kat] ++
459,496 UART: [kat] sha1
469,774 UART: [kat] SHA2-256
472,821 UART: [kat] SHA2-384
480,308 UART: [kat] SHA2-512-ACC
483,315 UART: [kat] ECC-384
2,946,979 UART: [kat] HMAC-384Kdf
2,970,244 UART: [kat] LMS
3,499,707 UART: [kat] --
3,505,263 UART: [cold-reset] ++
3,507,288 UART: [fht] FHT @ 0x50003400
3,518,592 UART: [idev] ++
3,519,160 UART: [idev] CDI.KEYID = 6
3,520,077 UART: [idev] SUBJECT.KEYID = 7
3,521,253 UART: [idev] UDS.KEYID = 0
3,522,303 ready_for_fw is high
3,522,521 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,728 UART: [idev] Erasing UDS.KEYID = 0
6,025,107 UART: [idev] Sha1 KeyId Algorithm
6,046,830 UART: [idev] --
6,050,612 UART: [ldev] ++
6,051,182 UART: [ldev] CDI.KEYID = 6
6,052,097 UART: [ldev] SUBJECT.KEYID = 5
6,053,256 UART: [ldev] AUTHORITY.KEYID = 7
6,054,546 UART: [ldev] FE.KEYID = 1
6,097,611 UART: [ldev] Erasing FE.KEYID = 1
8,600,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,836 UART: [ldev] --
10,410,230 UART: [fwproc] Wait for Commands...
10,412,329 UART: [fwproc] Recv command 0x46574c44
10,414,440 UART: [fwproc] Recv'd Img size: 78704 bytes
13,387,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,455,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,524,642 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,717,573 >>> mbox cmd response: success
13,718,057 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,722,148 UART: [afmc] ++
13,722,761 UART: [afmc] CDI.KEYID = 6
13,723,677 UART: [afmc] SUBJECT.KEYID = 7
13,724,840 UART: [afmc] AUTHORITY.KEYID = 5
16,244,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,975,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,977,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,993,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,009,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,024,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,047,322 UART: [afmc] --
18,051,946 UART: [cold-reset] --
18,055,051 UART: [state] Locking Datavault
18,058,959 UART: [state] Locking PCR0, PCR1 and PCR31
18,060,667 UART: [state] Locking ICCM
18,062,066 UART: [exit] Launching FMC @ 0x40000130
18,070,481 UART:
18,070,760 UART: Running Caliptra FMC ...
18,071,873 UART:
18,072,040 UART: [state] CFI Enabled
18,132,976 UART: [fht] FMC Alias Private Key: 7
19,896,821 UART: [art] Extend RT PCRs Done
19,898,040 UART: [art] Lock RT PCRs Done
19,899,856 UART: [art] Populate DV Done
19,905,372 UART: [fht] FMC Alias Private Key: 7
19,906,862 UART: [art] Derive CDI
19,907,923 UART: [art] Store in in slot 0x4
19,966,038 UART: [art] Derive Key Pair
19,967,045 UART: [art] Store priv key in slot 0x5
22,430,106 UART: [art] Derive Key Pair - Done
22,443,314 UART: [art] Signing Cert with AUTHO
22,444,621 UART: RITY.KEYID = 7
24,156,066 UART: [art] Erasing AUTHORITY.KEYID = 7
24,157,566 UART: [art] PUB.X = 94444630E2BFED8EA85BC78AEA8B16CE6A457C846C18F8C9906C7A03722C70A72914C148F6124A7186F69E7BD97A207D
24,164,872 UART: [art] PUB.Y = 2056A8CF42E0656EBC70CB18D20506E34AFF16EE00262FCA4C6AF960EB1E95CCF28BDFC7D8F673E575673C9A7CC47E99
24,172,151 UART: [art] SIG.R = A6A9B145EDC459FBCCCBF2F04EB0D62A55D97EDDD41475D0C1359A8F8DCB50142F7B34A08AE49B9DE9A87E5BE26C03DA
24,179,534 UART: [art] SIG.S = B129B702BE03C67A0B4150DE438D16F399F57063D76C94A206CEC86ABCC2F0B9CF38A049D06E40EBF93A9A72848108CD
25,157,689 UART: mbox::rt_entry...
25,158,649 UART: ____ _ _ _ ____ _____
25,160,574 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,162,580 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,164,435 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,166,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,168,419 UART: |_|
25,169,228 UART:
25,283,018 UART: [rt] Runtime listening for mailbox commands...
25,288,873 >>> mbox cmd response data (3272 bytes)
25,304,424 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,337,816 >>> mbox cmd response data (0 bytes)
27,412,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,557,386 UART:
27,557,759 UART: Running Caliptra ROM ...
27,558,834 UART:
27,558,988 UART: [state] CFI Enabled
27,631,228 UART: [state] LifecycleState = Unprovisioned
27,633,110 UART: [state] DebugLocked = No
27,634,363 UART: [state] WD Timer not started. Device not locked for debugging
27,639,019 UART: [kat] SHA2-256
27,818,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,829,693 UART: [kat] ++
27,830,147 UART: [kat] sha1
27,840,433 UART: [kat] SHA2-256
27,843,500 UART: [kat] SHA2-384
27,848,516 UART: [kat] SHA2-512-ACC
27,851,455 UART: [kat] ECC-384
30,314,892 UART: [kat] HMAC-384Kdf
30,336,294 UART: [kat] LMS
30,865,756 UART: [kat] --
30,869,945 UART: [update-reset] ++
34,300,586 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,304,125 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,687,422 >>> mbox cmd response: success
34,692,001 UART: [update-reset] Copying MAN_2 To MAN_1
34,711,238 UART: [update-reset Success] --
34,715,355 UART: [state] Locking Datavault
34,719,097 UART: [state] Locking PCR0, PCR1 and PCR31
34,720,803 UART: [state] Locking ICCM
34,723,169 UART: [exit] Launching FMC @ 0x40000130
34,731,620 UART:
34,731,864 UART: Running Caliptra FMC ...
34,733,282 UART:
34,733,452 UART: [state] CFI Enabled
34,825,977 UART: [art] Extend RT PCRs Done
34,827,180 UART: [art] Lock RT PCRs Done
34,828,636 UART: [art] Populate DV Done
34,834,416 UART: [fht] FMC Alias Private Key: 7
34,836,161 UART: [art] Derive CDI
34,836,973 UART: [art] Store in in slot 0x4
34,895,402 UART: [art] Derive Key Pair
34,896,444 UART: [art] Store priv key in slot 0x5
37,359,037 UART: [art] Derive Key Pair - Done
37,372,146 UART: [art] Signing Cert with AUTHO
37,373,443 UART: RITY.KEYID = 7
39,084,366 UART: [art] Erasing AUTHORITY.KEYID = 7
39,085,873 UART: [art] PUB.X = AE53A99C30152F60CEF0D7A1B6AF9808926BFADA77B2106A16FCDA5C52BDCDBFB8C91147ED07CA955FD041BB0576A0E7
39,093,176 UART: [art] PUB.Y = 33C4CC55469AB10F01562A0F61ACD4F98B0BBFD86D0DC031549E4F2C2A0BC464196A2ABF82396653BEF8D47FDF82A43B
39,100,479 UART: [art] SIG.R = 33AF5D088EAA474218EDAA32D1A0FE58AA1AB87A219287C782F019F414BC8BA235205534299F93AAF508A00A660331EA
39,107,903 UART: [art] SIG.S = DC9FB51F314BE5737BF38DC72E6350FC267DC8B54111D944D09F37D915C46CB3B9E75CE9CCC535EE2AA2D808F98673BC
40,086,391 UART: Caliptra RT
40,087,110 UART: [state] CFI Enabled
42,646,701 UART: Disabled attest: DPE valid fail
42,648,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,649,491 UART: [rt] RT listening for mailbox commands...
42,681,029 UART: [rt]cmd =0x494e464f, len=4
42,684,867 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,382,453 ready_for_fw is high
3,382,855 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,475,229 >>> mbox cmd response: success
13,475,779 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,767,653 UART:
17,768,044 UART: Running Caliptra FMC ...
17,769,160 UART:
17,769,318 UART: [state] CFI Enabled
17,835,024 UART: [fht] FMC Alias Private Key: 7
19,598,648 UART: [art] Extend RT PCRs Done
19,599,880 UART: [art] Lock RT PCRs Done
19,601,427 UART: [art] Populate DV Done
19,606,619 UART: [fht] FMC Alias Private Key: 7
19,608,156 UART: [art] Derive CDI
19,608,894 UART: [art] Store in in slot 0x4
19,668,292 UART: [art] Derive Key Pair
19,669,327 UART: [art] Store priv key in slot 0x5
22,132,120 UART: [art] Derive Key Pair - Done
22,145,397 UART: [art] Signing Cert with AUTHO
22,146,742 UART: RITY.KEYID = 7
23,858,206 UART: [art] Erasing AUTHORITY.KEYID = 7
23,859,700 UART: [art] PUB.X = 3F87A3FD2CFD15BD341179D3D1672ED131C48E593058DC9EADE7A1E45311B90B1834F4183A2EE7EF30562624FF959439
23,867,034 UART: [art] PUB.Y = 2F491072B9FFD1412873F0D88AD3FF5D92FA5FBF4337D63BCC88B562EA9DC1D44B2854521B5D64A9D5A759E67DFEF2D1
23,874,288 UART: [art] SIG.R = FC6C3E9A89801445EC2130BA94175552F75E71FA9416E1706F945A1E4C3D7BFD385BDCA6602A9D1F2CD35BF7D7E992B2
23,881,692 UART: [art] SIG.S = 6B2BD291B9C6A944C1375C5A730AD4DF5B80944510D5868D824539E29C0400A418CAF4FDE1A7CBA83B6089E520337E20
24,859,770 UART: mbox::rt_entry...
24,860,730 UART: ____ _ _ _ ____ _____
24,862,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,864,849 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,866,786 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,868,748 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,870,682 UART: |_|
24,871,492 UART:
24,984,019 UART: [rt] Runtime listening for mailbox commands...
24,989,880 >>> mbox cmd response data (3272 bytes)
25,005,519 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,038,981 >>> mbox cmd response data (0 bytes)
27,097,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,244,696 >>> mbox cmd response: success
34,277,855 UART:
34,278,164 UART: Running Caliptra FMC ...
34,279,284 UART:
34,279,457 UART: [state] CFI Enabled
34,381,863 UART: [art] Extend RT PCRs Done
34,383,211 UART: [art] Lock RT PCRs Done
34,384,568 UART: [art] Populate DV Done
34,389,984 UART: [fht] FMC Alias Private Key: 7
34,391,573 UART: [art] Derive CDI
34,392,385 UART: [art] Store in in slot 0x4
34,451,977 UART: [art] Derive Key Pair
34,453,001 UART: [art] Store priv key in slot 0x5
36,915,787 UART: [art] Derive Key Pair - Done
36,928,679 UART: [art] Signing Cert with AUTHO
36,929,985 UART: RITY.KEYID = 7
38,642,614 UART: [art] Erasing AUTHORITY.KEYID = 7
38,644,113 UART: [art] PUB.X = 66AE2B252F9A6EA744795FC80C8181A099BAE960F96E5FB71CBD5BB70CF87B7DF95AC38B73D3320052D03CDCCDE58573
38,651,334 UART: [art] PUB.Y = 0A0C06E4D3BCD268ABFEA4E26A55C31F1267CF09AC63E5DB21813C6BBE8F767D02EE8E0E64E4CB3EFE62DD513963E177
38,658,639 UART: [art] SIG.R = E31D158A59EAC15A0DAFB8A9F08E8B5A5CD57592D098FE252AE9F84F9E2A8DF00625AA9638FA644ACF6E53F3682779F2
38,666,045 UART: [art] SIG.S = 4233913A6F7A5C4032A944D5BB709FA3ABEBDC206E7E2BBEF0D241D97000A086F7AC81025B727CE45F31C710D79B89A1
39,644,993 UART: Caliptra RT
39,645,703 UART: [state] CFI Enabled
42,207,465 UART: Disabled attest: DPE valid fail
42,209,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,210,042 UART: [rt] RT listening for mailbox commands...
42,241,172 UART: [rt]cmd =0x494e464f, len=4
42,244,897 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,445 UART:
192,803 UART: Running Caliptra ROM ...
193,936 UART:
603,623 UART: [state] CFI Enabled
617,143 UART: [state] LifecycleState = Unprovisioned
619,005 UART: [state] DebugLocked = No
621,406 UART: [state] WD Timer not started. Device not locked for debugging
624,329 UART: [kat] SHA2-256
803,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,967 UART: [kat] ++
815,488 UART: [kat] sha1
826,926 UART: [kat] SHA2-256
829,917 UART: [kat] SHA2-384
835,470 UART: [kat] SHA2-512-ACC
838,406 UART: [kat] ECC-384
3,279,714 UART: [kat] HMAC-384Kdf
3,292,585 UART: [kat] LMS
3,822,101 UART: [kat] --
3,826,376 UART: [cold-reset] ++
3,827,449 UART: [fht] FHT @ 0x50003400
3,839,771 UART: [idev] ++
3,840,338 UART: [idev] CDI.KEYID = 6
3,841,260 UART: [idev] SUBJECT.KEYID = 7
3,842,428 UART: [idev] UDS.KEYID = 0
3,843,343 ready_for_fw is high
3,843,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,942,418 UART: [idev] Erasing UDS.KEYID = 0
6,312,868 UART: [idev] Sha1 KeyId Algorithm
6,336,409 UART: [idev] --
6,340,826 UART: [ldev] ++
6,341,391 UART: [ldev] CDI.KEYID = 6
6,342,296 UART: [ldev] SUBJECT.KEYID = 5
6,343,498 UART: [ldev] AUTHORITY.KEYID = 7
6,344,775 UART: [ldev] FE.KEYID = 1
6,355,629 UART: [ldev] Erasing FE.KEYID = 1
8,826,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,286 UART: [ldev] --
10,619,375 UART: [fwproc] Wait for Commands...
10,621,884 UART: [fwproc] Recv command 0x46574c44
10,623,984 UART: [fwproc] Recv'd Img size: 78704 bytes
13,596,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,675,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,744,127 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,937,625 >>> mbox cmd response: success
13,938,119 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,941,114 UART: [afmc] ++
13,941,690 UART: [afmc] CDI.KEYID = 6
13,942,559 UART: [afmc] SUBJECT.KEYID = 7
13,943,709 UART: [afmc] AUTHORITY.KEYID = 5
16,442,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,162,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,164,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,180,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,196,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,212,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,235,797 UART: [afmc] --
18,239,663 UART: [cold-reset] --
18,243,418 UART: [state] Locking Datavault
18,248,122 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,811 UART: [state] Locking ICCM
18,251,467 UART: [exit] Launching FMC @ 0x40000130
18,259,858 UART:
18,260,085 UART: Running Caliptra FMC ...
18,261,180 UART:
18,261,331 UART: [state] CFI Enabled
18,269,206 UART: [fht] FMC Alias Private Key: 7
20,026,180 UART: [art] Extend RT PCRs Done
20,027,404 UART: [art] Lock RT PCRs Done
20,029,050 UART: [art] Populate DV Done
20,034,243 UART: [fht] FMC Alias Private Key: 7
20,035,829 UART: [art] Derive CDI
20,036,568 UART: [art] Store in in slot 0x4
20,078,776 UART: [art] Derive Key Pair
20,079,938 UART: [art] Store priv key in slot 0x5
22,506,628 UART: [art] Derive Key Pair - Done
22,519,618 UART: [art] Signing Cert with AUTHO
22,520,921 UART: RITY.KEYID = 7
24,226,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,227,980 UART: [art] PUB.X = BACEE95975480DE65EEF7BA3F907B2BAC8FF2F2EE1BFE8A7E0E3AF2C839D7EC08F1E464C7CDF33F13089AB215C8E1FFE
24,235,272 UART: [art] PUB.Y = B3922B2B101A99E6EA6E519D930A5B01F706573F0B3D199C0C85B81907908094F498B59EDD47172032251D26367D9C24
24,242,502 UART: [art] SIG.R = CA80A265CDEAAEE4F6A90C33F38CCB5EC51E6DEBBA1F0DBB69E67C6CC776D01B76C138A365FA7083D0C7CBF25FB612DE
24,249,939 UART: [art] SIG.S = EB25DBB20BA65D88AA87605659A50CCE537F554EEE9361303E5ACE06CBE4BD909126FA058B6BBE596E5A122AB760FCB8
25,228,454 UART: mbox::rt_entry...
25,229,416 UART: ____ _ _ _ ____ _____
25,231,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,233,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,235,358 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,237,271 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,239,114 UART: |_|
25,239,985 UART:
25,352,368 UART: [rt] Runtime listening for mailbox commands...
25,358,216 >>> mbox cmd response data (3272 bytes)
25,374,030 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,407,427 >>> mbox cmd response data (0 bytes)
27,466,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,611,012 UART:
27,611,403 UART: Running Caliptra ROM ...
27,612,448 UART:
27,612,590 UART: [state] CFI Enabled
27,625,944 UART: [state] LifecycleState = Unprovisioned
27,627,773 UART: [state] DebugLocked = No
27,629,449 UART: [state] WD Timer not started. Device not locked for debugging
27,633,614 UART: [kat] SHA2-256
27,812,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,824,400 UART: [kat] ++
27,824,855 UART: [kat] sha1
27,835,516 UART: [kat] SHA2-256
27,838,522 UART: [kat] SHA2-384
27,844,465 UART: [kat] SHA2-512-ACC
27,847,411 UART: [kat] ECC-384
30,288,414 UART: [kat] HMAC-384Kdf
30,301,063 UART: [kat] LMS
30,830,578 UART: [kat] --
30,836,292 UART: [update-reset] ++
34,269,204 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,273,009 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,656,319 >>> mbox cmd response: success
34,660,861 UART: [update-reset] Copying MAN_2 To MAN_1
34,679,227 UART: [update-reset Success] --
34,683,736 UART: [state] Locking Datavault
34,685,656 UART: [state] Locking PCR0, PCR1 and PCR31
34,687,359 UART: [state] Locking ICCM
34,688,694 UART: [exit] Launching FMC @ 0x40000130
34,697,140 UART:
34,697,367 UART: Running Caliptra FMC ...
34,698,751 UART:
34,698,912 UART: [state] CFI Enabled
34,742,963 UART: [art] Extend RT PCRs Done
34,744,156 UART: [art] Lock RT PCRs Done
34,745,775 UART: [art] Populate DV Done
34,751,175 UART: [fht] FMC Alias Private Key: 7
34,752,702 UART: [art] Derive CDI
34,753,454 UART: [art] Store in in slot 0x4
34,796,159 UART: [art] Derive Key Pair
34,797,205 UART: [art] Store priv key in slot 0x5
37,224,316 UART: [art] Derive Key Pair - Done
37,237,173 UART: [art] Signing Cert with AUTHO
37,238,471 UART: RITY.KEYID = 7
38,943,625 UART: [art] Erasing AUTHORITY.KEYID = 7
38,945,136 UART: [art] PUB.X = 85191B6E0632532FB2CA706F3981F62A572CB9776DD3E9511D90A786990E70FA3548A80D2CD3BB11F89990501178DE50
38,952,367 UART: [art] PUB.Y = 6907495CA071D619DDA1131BB773F4FEB8C234A678D02E9997B48329BEC1E7394A6795745D35E87137EF65C0EB106C1B
38,959,589 UART: [art] SIG.R = 825FFB0712C80000730090FCB694DB581ADE2326C83A5A018794F4BF316D4322CDE7DE20532F4D80F1F4CBA42F62CF78
38,966,910 UART: [art] SIG.S = 8B9E5624523F8ED12713B781792861727BDD894FC015E845CAF2FFC88CFC19A4FB62F41B7AE12940233B244E2862A628
39,945,362 UART: Caliptra RT
39,946,077 UART: [state] CFI Enabled
42,423,342 UART: Disabled attest: DPE valid fail
42,425,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,426,107 UART: [rt] RT listening for mailbox commands...
42,457,538 UART: [rt]cmd =0x494e464f, len=4
42,461,553 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,702,850 ready_for_fw is high
3,703,269 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,713,407 >>> mbox cmd response: success
13,713,962 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,965,851 UART:
17,966,297 UART: Running Caliptra FMC ...
17,967,392 UART:
17,967,535 UART: [state] CFI Enabled
17,975,325 UART: [fht] FMC Alias Private Key: 7
19,731,800 UART: [art] Extend RT PCRs Done
19,733,017 UART: [art] Lock RT PCRs Done
19,734,962 UART: [art] Populate DV Done
19,740,431 UART: [fht] FMC Alias Private Key: 7
19,741,920 UART: [art] Derive CDI
19,742,649 UART: [art] Store in in slot 0x4
19,785,075 UART: [art] Derive Key Pair
19,786,070 UART: [art] Store priv key in slot 0x5
22,212,645 UART: [art] Derive Key Pair - Done
22,225,633 UART: [art] Signing Cert with AUTHO
22,226,927 UART: RITY.KEYID = 7
23,932,656 UART: [art] Erasing AUTHORITY.KEYID = 7
23,934,158 UART: [art] PUB.X = 97A45A58509C0DEF21BE070E9D2EBDFBD72C4E4E68D51B8D0D5EA69B6AFADEC9DD45425AB234A9C99E3EC4E0F150B97E
23,941,456 UART: [art] PUB.Y = 39DFBF403DB21E5F20E1E83F12415DA8CF98A8F4991DB2BD5454F665D1DD1440B64A8E421119461CFF14B3EC5E65344B
23,948,729 UART: [art] SIG.R = 272E7FFDDD17C4228366D9A88C16DEAED03D438563E2A66FC274A23673BB619178A694CDC816FFD68F78860688D22257
23,956,154 UART: [art] SIG.S = FDF39096DD07135268DD41BD53C2F91454FF1D537AAA58A58B6A8227B60D7E1012FD99B98B3112832719A83641202B86
24,934,451 UART: mbox::rt_entry...
24,935,402 UART: ____ _ _ _ ____ _____
24,937,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,939,347 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,941,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,943,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,945,163 UART: |_|
24,946,146 UART:
25,059,453 UART: [rt] Runtime listening for mailbox commands...
25,065,275 >>> mbox cmd response data (3272 bytes)
25,081,170 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,114,589 >>> mbox cmd response data (0 bytes)
27,172,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,214,293 >>> mbox cmd response: success
34,249,125 UART:
34,249,445 UART: Running Caliptra FMC ...
34,250,515 UART:
34,250,666 UART: [state] CFI Enabled
34,294,411 UART: [art] Extend RT PCRs Done
34,295,601 UART: [art] Lock RT PCRs Done
34,297,407 UART: [art] Populate DV Done
34,302,869 UART: [fht] FMC Alias Private Key: 7
34,304,403 UART: [art] Derive CDI
34,305,131 UART: [art] Store in in slot 0x4
34,348,089 UART: [art] Derive Key Pair
34,349,084 UART: [art] Store priv key in slot 0x5
36,775,798 UART: [art] Derive Key Pair - Done
36,789,131 UART: [art] Signing Cert with AUTHO
36,790,429 UART: RITY.KEYID = 7
38,495,916 UART: [art] Erasing AUTHORITY.KEYID = 7
38,497,444 UART: [art] PUB.X = 519B45D20E3DF5C92F93CFA6B5F8F1AA538B604292E913CE8F1BDD998E813999A29B6531C0D0DF0977F6DA8E53CA8AB2
38,504,676 UART: [art] PUB.Y = 22372EC9F5904345E3FFC01B6753C047FB6D3C683D52392A7977420613510D30D9B93EBA0936207B129A01181F4A4871
38,511,895 UART: [art] SIG.R = 452533BDA1A0F9743EE6800D81EEDF063EA67DB6A2E062B6C5FB10E15E4017946292BEA6CB6614C161CDA188FB4862B0
38,519,362 UART: [art] SIG.S = 40175F80A8069F5F0DC4EE8CF9E7D5015048F5DE3C77DA6D33AC511AD5D4FE75D57200479FB3F2C5292C155192F53532
39,498,511 UART: Caliptra RT
39,499,224 UART: [state] CFI Enabled
41,977,959 UART: Disabled attest: DPE valid fail
41,979,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,980,441 UART: [rt] RT listening for mailbox commands...
42,011,925 UART: [rt]cmd =0x494e464f, len=4
42,015,979 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,119 UART:
192,488 UART: Running Caliptra ROM ...
193,623 UART:
193,772 UART: [state] CFI Enabled
260,516 UART: [state] LifecycleState = Unprovisioned
262,920 UART: [state] DebugLocked = No
264,583 UART: [state] WD Timer not started. Device not locked for debugging
269,616 UART: [kat] SHA2-256
459,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,292 UART: [kat] ++
470,746 UART: [kat] sha1
481,552 UART: [kat] SHA2-256
484,569 UART: [kat] SHA2-384
490,563 UART: [kat] SHA2-512-ACC
493,144 UART: [kat] ECC-384
2,945,857 UART: [kat] HMAC-384Kdf
2,970,877 UART: [kat] LMS
3,502,636 UART: [kat] --
3,505,848 UART: [cold-reset] ++
3,507,135 UART: [fht] FHT @ 0x50003400
3,518,107 UART: [idev] ++
3,518,809 UART: [idev] CDI.KEYID = 6
3,519,689 UART: [idev] SUBJECT.KEYID = 7
3,520,926 UART: [idev] UDS.KEYID = 0
3,521,853 ready_for_fw is high
3,522,069 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,226 UART: [idev] Erasing UDS.KEYID = 0
6,026,051 UART: [idev] Sha1 KeyId Algorithm
6,048,306 UART: [idev] --
6,053,245 UART: [ldev] ++
6,053,930 UART: [ldev] CDI.KEYID = 6
6,054,820 UART: [ldev] SUBJECT.KEYID = 5
6,056,034 UART: [ldev] AUTHORITY.KEYID = 7
6,057,166 UART: [ldev] FE.KEYID = 1
6,097,946 UART: [ldev] Erasing FE.KEYID = 1
8,603,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,604 UART: [ldev] --
10,411,050 UART: [fwproc] Wait for Commands...
10,412,983 UART: [fwproc] Recv command 0x46574c44
10,415,292 UART: [fwproc] Recv'd Img size: 78704 bytes
13,419,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,495,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,611,376 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,940,724 >>> mbox cmd response: success
13,941,240 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,945,642 UART: [afmc] ++
13,946,375 UART: [afmc] CDI.KEYID = 6
13,947,571 UART: [afmc] SUBJECT.KEYID = 7
13,949,010 UART: [afmc] AUTHORITY.KEYID = 5
16,480,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,203,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,220,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,235,267 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,250,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,274,105 UART: [afmc] --
18,277,265 UART: [cold-reset] --
18,282,640 UART: [state] Locking Datavault
18,287,357 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,590 UART: [state] Locking ICCM
18,292,018 UART: [exit] Launching FMC @ 0x40000130
18,300,697 UART:
18,300,926 UART: Running Caliptra FMC ...
18,302,026 UART:
18,302,187 UART: [state] CFI Enabled
18,370,819 UART: [fht] FMC Alias Private Key: 7
20,134,836 UART: [art] Extend RT PCRs Done
20,136,050 UART: [art] Lock RT PCRs Done
20,137,541 UART: [art] Populate DV Done
20,142,915 UART: [fht] FMC Alias Private Key: 7
20,144,556 UART: [art] Derive CDI
20,145,292 UART: [art] Store in in slot 0x4
20,203,495 UART: [art] Derive Key Pair
20,204,490 UART: [art] Store priv key in slot 0x5
22,667,304 UART: [art] Derive Key Pair - Done
22,680,077 UART: [art] Signing Cert with AUTHO
22,681,376 UART: RITY.KEYID = 7
24,392,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,394,472 UART: [art] PUB.X = D5AF499F0BC81FC1E952E392C807E343C19EF657BC888397D127D6E00ABF9D2B9D56C72010D75CE78CB6D1C48BAB58F2
24,401,763 UART: [art] PUB.Y = A9CC1ED90A8BE413EFFC36A5F03D11EC100421773B9CAFD9DBBA5348CCFD944BE021CD605195A27160902ABBB60D0870
24,409,048 UART: [art] SIG.R = C2DBC628BC1D45C581FBC277121080D2153F58C9D973C50F278CE52BBC3BAE82B48B2C4032327274749C75A87E416C06
24,416,437 UART: [art] SIG.S = CE8F24CEB2B90DEFE6953FA05F7C5E024911A6682CC7353A7907745865C746A85918096FB297F2A67D4119ABE0316BEE
25,395,255 UART: mbox::rt_entry...
25,396,219 UART: ____ _ _ _ ____ _____
25,398,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,400,220 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,402,151 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,404,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,405,935 UART: |_|
25,407,051 UART:
25,519,259 UART: [rt] Runtime listening for mailbox commands...
25,525,101 >>> mbox cmd response data (3272 bytes)
25,540,831 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,574,246 >>> mbox cmd response data (0 bytes)
27,635,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,780,366 UART:
27,780,737 UART: Running Caliptra ROM ...
27,781,786 UART:
27,781,938 UART: [state] CFI Enabled
27,844,628 UART: [state] LifecycleState = Unprovisioned
27,846,732 UART: [state] DebugLocked = No
27,848,738 UART: [state] WD Timer not started. Device not locked for debugging
27,852,919 UART: [kat] SHA2-256
28,042,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,053,543 UART: [kat] ++
28,054,006 UART: [kat] sha1
28,065,391 UART: [kat] SHA2-256
28,068,415 UART: [kat] SHA2-384
28,074,192 UART: [kat] SHA2-512-ACC
28,076,757 UART: [kat] ECC-384
30,530,377 UART: [kat] HMAC-384Kdf
30,554,252 UART: [kat] LMS
31,085,834 UART: [kat] --
31,090,141 UART: [update-reset] ++
34,552,527 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,556,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,164,845 >>> mbox cmd response: success
35,169,725 UART: [update-reset] Copying MAN_2 To MAN_1
35,203,423 UART: [update-reset Success] --
35,205,942 UART: [state] Locking Datavault
35,208,838 UART: [state] Locking PCR0, PCR1 and PCR31
35,211,033 UART: [state] Locking ICCM
35,213,676 UART: [exit] Launching FMC @ 0x40000130
35,222,374 UART:
35,222,611 UART: Running Caliptra FMC ...
35,223,774 UART:
35,223,939 UART: [state] CFI Enabled
35,321,433 UART: [art] Extend RT PCRs Done
35,322,617 UART: [art] Lock RT PCRs Done
35,324,179 UART: [art] Populate DV Done
35,329,782 UART: [fht] FMC Alias Private Key: 7
35,331,418 UART: [art] Derive CDI
35,332,237 UART: [art] Store in in slot 0x4
35,390,150 UART: [art] Derive Key Pair
35,391,143 UART: [art] Store priv key in slot 0x5
37,853,736 UART: [art] Derive Key Pair - Done
37,866,898 UART: [art] Signing Cert with AUTHO
37,868,200 UART: RITY.KEYID = 7
39,578,972 UART: [art] Erasing AUTHORITY.KEYID = 7
39,580,475 UART: [art] PUB.X = 5808203819DE3F699DF15417C62484AF32CC5BE92F505E85C91E42FA1B3AFF0F06B12FC4E10A7553A2D464FF9182AC45
39,587,724 UART: [art] PUB.Y = 9E709CB708749778A7065682CF93CDCE4D7076FC3C466D18D05108A835B62B60126CB78A8CD5871B57AF95959155AE0F
39,594,954 UART: [art] SIG.R = 835434E2F72EC4F1EEC97AD04038D06AAC7C490B85F9BDBBF23B047145B140E25DF710612BF594031E5C5B7E740F045E
39,602,348 UART: [art] SIG.S = 4A90B756808EAB67C20A1708AD167CA4E0DE45B68E6F92AF94F652CF024C25C373AD005A361D2C578E8CF6922D3CFFC1
40,580,722 UART: Caliptra RT
40,581,433 UART: [state] CFI Enabled
43,142,844 UART: Disabled attest: DPE valid fail
43,144,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,145,534 UART: [rt] RT listening for mailbox commands...
43,176,927 UART: [rt]cmd =0x494e464f, len=4
43,180,861 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,414,364 ready_for_fw is high
3,414,762 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,947,244 >>> mbox cmd response: success
13,947,971 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,239,544 UART:
18,239,943 UART: Running Caliptra FMC ...
18,241,051 UART:
18,241,234 UART: [state] CFI Enabled
18,302,285 UART: [fht] FMC Alias Private Key: 7
20,065,854 UART: [art] Extend RT PCRs Done
20,067,072 UART: [art] Lock RT PCRs Done
20,068,873 UART: [art] Populate DV Done
20,074,288 UART: [fht] FMC Alias Private Key: 7
20,075,938 UART: [art] Derive CDI
20,076,751 UART: [art] Store in in slot 0x4
20,133,683 UART: [art] Derive Key Pair
20,134,719 UART: [art] Store priv key in slot 0x5
22,598,089 UART: [art] Derive Key Pair - Done
22,611,023 UART: [art] Signing Cert with AUTHO
22,612,331 UART: RITY.KEYID = 7
24,323,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,324,671 UART: [art] PUB.X = BF20EA974CED408161847D83DA0F924D39CF3C74A0662EF9A09D727948EC8A2DC8412D1C0BA259FD3526D00E9DDAB74C
24,331,967 UART: [art] PUB.Y = 00FD4A788AB4AECA0C86DC5B2E496A4311FAEAD5268CD25A8FB4E9CFBABFFE7E9D614A957F69F7D1FAEEAAD455E51719
24,339,277 UART: [art] SIG.R = 90BBBE50DB9357341657323C7E0C04E5A0E598190A6268F55CF4EE91EAEB8F54E7641FC0C50E6EB92B6A63057AC314B9
24,346,669 UART: [art] SIG.S = BB51C0339FA3C2F2008AA0C7AB5DB3996069D40AFB811F2E43FAD88B2460F4DAA23D1AB4A3454AC2E384E1EE3E3F57DE
25,325,422 UART: mbox::rt_entry...
25,326,389 UART: ____ _ _ _ ____ _____
25,328,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,330,381 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,332,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,334,270 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,336,199 UART: |_|
25,337,035 UART:
25,450,003 UART: [rt] Runtime listening for mailbox commands...
25,455,855 >>> mbox cmd response data (3272 bytes)
25,471,534 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,504,950 >>> mbox cmd response data (0 bytes)
27,567,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,384,736 >>> mbox cmd response: success
35,419,880 UART:
35,420,217 UART: Running Caliptra FMC ...
35,421,264 UART:
35,421,416 UART: [state] CFI Enabled
35,529,059 UART: [art] Extend RT PCRs Done
35,530,249 UART: [art] Lock RT PCRs Done
35,531,730 UART: [art] Populate DV Done
35,537,250 UART: [fht] FMC Alias Private Key: 7
35,538,847 UART: [art] Derive CDI
35,539,662 UART: [art] Store in in slot 0x4
35,596,965 UART: [art] Derive Key Pair
35,598,012 UART: [art] Store priv key in slot 0x5
38,060,589 UART: [art] Derive Key Pair - Done
38,073,585 UART: [art] Signing Cert with AUTHO
38,074,893 UART: RITY.KEYID = 7
39,786,880 UART: [art] Erasing AUTHORITY.KEYID = 7
39,788,379 UART: [art] PUB.X = 3C3048B8A2678C23CCB60F2B8F7A3B686BCFEE71761161AC6F661064388587B7F2BFEFDAAA76DE72D6EBBC203D86DE65
39,795,624 UART: [art] PUB.Y = 75CB924FEE18678F03782BDB70F291E7460B96D8716EDA8761E33D8CCDC6EB0A626824282109EB8E36A8D18D788AD087
39,802,942 UART: [art] SIG.R = BB5360965DF023D0B201E063C21206FD6BCEECA50D7B9759791F7479B882587CB7F232F97179896EC357339CA51A833E
39,810,292 UART: [art] SIG.S = 42A1FE80AC6BEE7F4022E63290F0DB9343A39DB527DDF7CE37F4BD9DB467696DE40E3304E87E213211C350130097EB25
40,789,631 UART: Caliptra RT
40,790,328 UART: [state] CFI Enabled
43,350,535 UART: Disabled attest: DPE valid fail
43,352,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,353,116 UART: [rt] RT listening for mailbox commands...
43,384,278 UART: [rt]cmd =0x494e464f, len=4
43,388,175 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,372 UART:
192,737 UART: Running Caliptra ROM ...
193,826 UART:
603,728 UART: [state] CFI Enabled
617,411 UART: [state] LifecycleState = Unprovisioned
619,829 UART: [state] DebugLocked = No
622,500 UART: [state] WD Timer not started. Device not locked for debugging
626,886 UART: [kat] SHA2-256
816,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,529 UART: [kat] ++
828,131 UART: [kat] sha1
840,070 UART: [kat] SHA2-256
843,139 UART: [kat] SHA2-384
850,324 UART: [kat] SHA2-512-ACC
852,956 UART: [kat] ECC-384
3,294,736 UART: [kat] HMAC-384Kdf
3,307,254 UART: [kat] LMS
3,839,123 UART: [kat] --
3,844,114 UART: [cold-reset] ++
3,846,465 UART: [fht] FHT @ 0x50003400
3,858,992 UART: [idev] ++
3,859,710 UART: [idev] CDI.KEYID = 6
3,860,585 UART: [idev] SUBJECT.KEYID = 7
3,861,818 UART: [idev] UDS.KEYID = 0
3,862,713 ready_for_fw is high
3,862,891 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,962,176 UART: [idev] Erasing UDS.KEYID = 0
6,337,773 UART: [idev] Sha1 KeyId Algorithm
6,359,584 UART: [idev] --
6,364,429 UART: [ldev] ++
6,365,161 UART: [ldev] CDI.KEYID = 6
6,366,070 UART: [ldev] SUBJECT.KEYID = 5
6,367,222 UART: [ldev] AUTHORITY.KEYID = 7
6,368,446 UART: [ldev] FE.KEYID = 1
6,380,278 UART: [ldev] Erasing FE.KEYID = 1
8,861,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,081 UART: [ldev] --
10,651,991 UART: [fwproc] Wait for Commands...
10,655,161 UART: [fwproc] Recv command 0x46574c44
10,657,462 UART: [fwproc] Recv'd Img size: 78704 bytes
13,665,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,742,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,858,464 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,187,372 >>> mbox cmd response: success
14,187,862 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,191,083 UART: [afmc] ++
14,191,775 UART: [afmc] CDI.KEYID = 6
14,193,014 UART: [afmc] SUBJECT.KEYID = 7
14,194,448 UART: [afmc] AUTHORITY.KEYID = 5
16,696,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,417,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,419,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,434,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,449,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,464,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,488,985 UART: [afmc] --
18,492,588 UART: [cold-reset] --
18,496,503 UART: [state] Locking Datavault
18,501,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,503,996 UART: [state] Locking ICCM
18,505,442 UART: [exit] Launching FMC @ 0x40000130
18,514,108 UART:
18,514,338 UART: Running Caliptra FMC ...
18,515,434 UART:
18,515,585 UART: [state] CFI Enabled
18,523,723 UART: [fht] FMC Alias Private Key: 7
20,280,812 UART: [art] Extend RT PCRs Done
20,282,022 UART: [art] Lock RT PCRs Done
20,283,541 UART: [art] Populate DV Done
20,288,999 UART: [fht] FMC Alias Private Key: 7
20,290,593 UART: [art] Derive CDI
20,291,552 UART: [art] Store in in slot 0x4
20,333,998 UART: [art] Derive Key Pair
20,335,000 UART: [art] Store priv key in slot 0x5
22,761,713 UART: [art] Derive Key Pair - Done
22,774,872 UART: [art] Signing Cert with AUTHO
22,776,203 UART: RITY.KEYID = 7
24,481,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,002 UART: [art] PUB.X = DCA841CC246E4066268F009F1560F160347C5A1E42ED23AAFB024100392D79BD72B4416C66632F64B7FAA537409FC6C7
24,490,240 UART: [art] PUB.Y = 82FAABC59858A2641962F17E3FB037C29893263C80E8868D80F86D13E17AEDA92D1EBE24688941F9D5AF175E9B93814E
24,497,518 UART: [art] SIG.R = FE8C694BA6E0E100E7B6AF819B6848E1ED30087E6E410CC63C24EAFCE61DC2186C914724632006C49FE24E36CACBCC5C
24,504,921 UART: [art] SIG.S = 92284F9E66FE62FC996F7EEB305147536049C38ABF00209FACEF1E409BFE4DD4431E9891304125130F5C0481034E65E6
25,483,172 UART: mbox::rt_entry...
25,484,141 UART: ____ _ _ _ ____ _____
25,486,065 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,488,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,490,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,492,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,494,072 UART: |_|
25,495,049 UART:
25,607,642 UART: [rt] Runtime listening for mailbox commands...
25,613,482 >>> mbox cmd response data (3272 bytes)
25,629,023 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,662,435 >>> mbox cmd response data (0 bytes)
27,720,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,865,254 UART:
27,865,629 UART: Running Caliptra ROM ...
27,866,669 UART:
27,866,868 UART: [state] CFI Enabled
27,881,136 UART: [state] LifecycleState = Unprovisioned
27,883,027 UART: [state] DebugLocked = No
27,884,297 UART: [state] WD Timer not started. Device not locked for debugging
27,889,777 UART: [kat] SHA2-256
28,079,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,090,374 UART: [kat] ++
28,090,920 UART: [kat] sha1
28,102,996 UART: [kat] SHA2-256
28,105,969 UART: [kat] SHA2-384
28,112,277 UART: [kat] SHA2-512-ACC
28,114,848 UART: [kat] ECC-384
30,555,877 UART: [kat] HMAC-384Kdf
30,570,381 UART: [kat] LMS
31,102,002 UART: [kat] --
31,106,776 UART: [update-reset] ++
34,573,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,577,097 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,185,334 >>> mbox cmd response: success
35,189,967 UART: [update-reset] Copying MAN_2 To MAN_1
35,224,843 UART: [update-reset Success] --
35,229,611 UART: [state] Locking Datavault
35,233,521 UART: [state] Locking PCR0, PCR1 and PCR31
35,235,721 UART: [state] Locking ICCM
35,237,205 UART: [exit] Launching FMC @ 0x40000130
35,245,884 UART:
35,246,115 UART: Running Caliptra FMC ...
35,247,270 UART:
35,247,426 UART: [state] CFI Enabled
35,291,205 UART: [art] Extend RT PCRs Done
35,292,396 UART: [art] Lock RT PCRs Done
35,293,981 UART: [art] Populate DV Done
35,299,384 UART: [fht] FMC Alias Private Key: 7
35,301,079 UART: [art] Derive CDI
35,301,899 UART: [art] Store in in slot 0x4
35,344,470 UART: [art] Derive Key Pair
35,345,514 UART: [art] Store priv key in slot 0x5
37,771,955 UART: [art] Derive Key Pair - Done
37,785,064 UART: [art] Signing Cert with AUTHO
37,786,370 UART: RITY.KEYID = 7
39,491,578 UART: [art] Erasing AUTHORITY.KEYID = 7
39,493,082 UART: [art] PUB.X = 13EAEDF10FE17E9A692F9A71B0F1ED6C2AD9A7629AD4F798356B6CB1FF5A0394F12917A55CD7666789C093FC0D1023E7
39,500,377 UART: [art] PUB.Y = 21E0727A8C5DD57153199818707F7FA4696383110019AB59709D16FF3B2644AF047AFB893FE8B8C13B51A808ADFCF5A4
39,507,639 UART: [art] SIG.R = 6A9CA96279B7B712F32B360DB1307E3F6B134DBF2D73320D83697D43D52E58E6BBE9ADAE308CF2D29DF13B40FB3B8A64
39,515,013 UART: [art] SIG.S = 996912BC0C120E7922E193980E65F004D321A0DC288E0026CD5AC954BC3FEA4282818C9E921CFFCA25DAE68614352678
40,493,611 UART: Caliptra RT
40,494,312 UART: [state] CFI Enabled
42,972,907 UART: Disabled attest: DPE valid fail
42,974,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,975,477 UART: [rt] RT listening for mailbox commands...
43,006,795 UART: [rt]cmd =0x494e464f, len=4
43,010,896 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,753,912 ready_for_fw is high
3,754,450 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,188,633 >>> mbox cmd response: success
14,189,224 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,437,535 UART:
18,437,917 UART: Running Caliptra FMC ...
18,439,107 UART:
18,439,286 UART: [state] CFI Enabled
18,447,464 UART: [fht] FMC Alias Private Key: 7
20,203,993 UART: [art] Extend RT PCRs Done
20,205,224 UART: [art] Lock RT PCRs Done
20,206,873 UART: [art] Populate DV Done
20,212,332 UART: [fht] FMC Alias Private Key: 7
20,214,073 UART: [art] Derive CDI
20,214,816 UART: [art] Store in in slot 0x4
20,257,132 UART: [art] Derive Key Pair
20,258,129 UART: [art] Store priv key in slot 0x5
22,684,279 UART: [art] Derive Key Pair - Done
22,697,070 UART: [art] Signing Cert with AUTHO
22,698,408 UART: RITY.KEYID = 7
24,403,969 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,463 UART: [art] PUB.X = 25DEB2CDC938B2A41E04D8F1CDC0C5C2786E85834C55358F998AC6D50FC30FD869C14783782BD6986F1703F0139BC4EC
24,412,759 UART: [art] PUB.Y = E86C1058CCFFE1F637E2A97715EB2CDAB585261C142EDC41B4C81565B7ED5A78B93E3C26A394508A9EEBF1F5D6AB4C22
24,420,058 UART: [art] SIG.R = 751921D0D22EFA6D370FF31F5A61C0C2ED7C3F30399F11ED83F55612A8BF7561F8D1BC2705FAA8F5F42B3A68499F9937
24,427,446 UART: [art] SIG.S = 75FA064E3C5D75B8680770047A7CABB93D8FF0EADF6B148F033B06AABA63900240EAA39FBEB851E33045B6927913F2C7
25,405,476 UART: mbox::rt_entry...
25,406,437 UART: ____ _ _ _ ____ _____
25,408,419 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,410,422 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,412,340 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,414,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,416,458 UART: |_|
25,417,264 UART:
25,529,895 UART: [rt] Runtime listening for mailbox commands...
25,535,733 >>> mbox cmd response data (3272 bytes)
25,551,423 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,584,825 >>> mbox cmd response data (0 bytes)
27,644,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,382,686 >>> mbox cmd response: success
35,417,758 UART:
35,418,100 UART: Running Caliptra FMC ...
35,419,138 UART:
35,419,279 UART: [state] CFI Enabled
35,462,910 UART: [art] Extend RT PCRs Done
35,464,054 UART: [art] Lock RT PCRs Done
35,465,343 UART: [art] Populate DV Done
35,470,854 UART: [fht] FMC Alias Private Key: 7
35,472,489 UART: [art] Derive CDI
35,473,297 UART: [art] Store in in slot 0x4
35,516,238 UART: [art] Derive Key Pair
35,517,280 UART: [art] Store priv key in slot 0x5
37,944,312 UART: [art] Derive Key Pair - Done
37,957,579 UART: [art] Signing Cert with AUTHO
37,958,884 UART: RITY.KEYID = 7
39,664,441 UART: [art] Erasing AUTHORITY.KEYID = 7
39,665,946 UART: [art] PUB.X = AFF9EF068A408D4601036E5BD68C090707BFD528D51D9483810624714013D2614E9FC9EB8B5F2291727E84961758D507
39,673,231 UART: [art] PUB.Y = F26812652E080278948B85E19AB64768160548E90FE0B37BBAC27625682D8F0065025DB0C971227D3573C0AEBE367D54
39,680,436 UART: [art] SIG.R = 7C8594A3AEB28E30A63A173AA3F8F16FC5B56E1758B08E36E26DC8D3432757DB910661D5966462B81EFE4890D5806BF4
39,687,805 UART: [art] SIG.S = 2B0CAE8A6EDC69A269F540D608A223154752390906AF2C36FBDC487EEBC3EB7C4801A6FFB54FEB1029BADC6C613D69C9
40,666,392 UART: Caliptra RT
40,667,095 UART: [state] CFI Enabled
43,144,873 UART: Disabled attest: DPE valid fail
43,146,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,147,733 UART: [rt] RT listening for mailbox commands...
43,178,973 UART: [rt]cmd =0x494e464f, len=4
43,182,794 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,812 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,735 UART: [cold-reset] ++
1,477,061 UART: [fht] Storing FHT @ 0x50003400
1,479,936 UART: [idev] ++
1,480,104 UART: [idev] CDI.KEYID = 6
1,480,464 UART: [idev] SUBJECT.KEYID = 7
1,480,888 UART: [idev] UDS.KEYID = 0
1,481,233 ready_for_fw is high
1,481,233 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,138 UART: [idev] Erasing UDS.KEYID = 0
1,505,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,354 UART: [idev] --
1,515,191 UART: [ldev] ++
1,515,359 UART: [ldev] CDI.KEYID = 6
1,515,722 UART: [ldev] SUBJECT.KEYID = 5
1,516,148 UART: [ldev] AUTHORITY.KEYID = 7
1,516,611 UART: [ldev] FE.KEYID = 1
1,521,623 UART: [ldev] Erasing FE.KEYID = 1
1,546,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,244 UART: [ldev] --
1,585,521 UART: [fwproc] Waiting for Commands...
1,586,340 UART: [fwproc] Received command 0x46574c44
1,587,131 UART: [fwproc] Received Image of size 78704 bytes
2,477,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,063 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,898 >>> mbox cmd response: success
2,616,898 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,004 UART: [afmc] ++
2,618,172 UART: [afmc] CDI.KEYID = 6
2,618,534 UART: [afmc] SUBJECT.KEYID = 7
2,618,959 UART: [afmc] AUTHORITY.KEYID = 5
2,654,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,620 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,013 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,703 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,484 UART: [afmc] --
2,697,492 UART: [cold-reset] --
2,698,330 UART: [state] Locking Datavault
2,699,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,063 UART: [state] Locking ICCM
2,700,547 UART: [exit] Launching FMC @ 0x40000130
2,705,876 UART:
2,705,892 UART: Running Caliptra FMC ...
2,706,300 UART:
2,706,354 UART: [state] CFI Enabled
2,716,843 UART: [fht] FMC Alias Private Key: 7
2,824,802 UART: [art] Extend RT PCRs Done
2,825,230 UART: [art] Lock RT PCRs Done
2,826,894 UART: [art] Populate DV Done
2,835,181 UART: [fht] FMC Alias Private Key: 7
2,836,291 UART: [art] Derive CDI
2,836,571 UART: [art] Store in in slot 0x4
2,921,986 UART: [art] Derive Key Pair
2,922,346 UART: [art] Store priv key in slot 0x5
2,935,354 UART: [art] Derive Key Pair - Done
2,950,087 UART: [art] Signing Cert with AUTHO
2,950,567 UART: RITY.KEYID = 7
2,965,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,724 UART: [art] PUB.X = 301C6E0928F01453C0D0F01405322B4D4A8FF46F58C692CD1C260352E50FA1BC04E0DDEB8D0790294A259053649C216C
2,973,474 UART: [art] PUB.Y = 33AE72CE9DC3A749C13CE80A0085AB658D522BD4A65FEA9E82FE3386DB4600070703928DEFCDF967EC951BD4F02C0A31
2,980,379 UART: [art] SIG.R = B55CE3C29888C8ACFCBB5FCBF2251CCEEB9D94B6DFE52F770A8A2C4187490FE59EE01F49FBA2FEE3B29AAE92A59EA963
2,987,175 UART: [art] SIG.S = 78B09BBB0891E2A2D19FB7FE9319A0BEB1D1E481D6E783A35BDD6446124EB08A281CD74CF6E4D0DFD90883855EBAE197
3,010,672 UART: mbox::rt_entry...
3,011,044 UART: ____ _ _ _ ____ _____
3,011,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,932 UART: |_|
3,015,244 UART:
3,122,506 UART: [rt] Runtime listening for mailbox commands...
3,127,474 >>> mbox cmd response data (3272 bytes)
3,127,475 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,561 >>> mbox cmd response data (0 bytes)
3,150,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,682 UART:
3,150,698 UART: Running Caliptra ROM ...
3,151,106 UART:
3,151,160 UART: [state] CFI Enabled
3,153,192 UART: [state] LifecycleState = Unprovisioned
3,153,847 UART: [state] DebugLocked = No
3,154,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,950 UART: [kat] SHA2-256
3,949,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,996 UART: [kat] ++
3,954,148 UART: [kat] sha1
3,958,300 UART: [kat] SHA2-256
3,960,238 UART: [kat] SHA2-384
3,962,871 UART: [kat] SHA2-512-ACC
3,964,771 UART: [kat] ECC-384
3,970,544 UART: [kat] HMAC-384Kdf
3,975,248 UART: [kat] LMS
4,543,444 UART: [kat] --
4,544,421 UART: [update-reset] ++
5,880,348 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,526 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,031,576 >>> mbox cmd response: success
6,031,751 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,765 UART: [update-reset Success] --
6,040,636 UART: [state] Locking Datavault
6,041,326 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,930 UART: [state] Locking ICCM
6,042,408 UART: [exit] Launching FMC @ 0x40000130
6,047,737 UART:
6,047,753 UART: Running Caliptra FMC ...
6,048,161 UART:
6,048,215 UART: [state] CFI Enabled
6,136,540 UART: [art] Extend RT PCRs Done
6,136,968 UART: [art] Lock RT PCRs Done
6,138,359 UART: [art] Populate DV Done
6,146,714 UART: [fht] FMC Alias Private Key: 7
6,147,860 UART: [art] Derive CDI
6,148,140 UART: [art] Store in in slot 0x4
6,234,017 UART: [art] Derive Key Pair
6,234,377 UART: [art] Store priv key in slot 0x5
6,247,345 UART: [art] Derive Key Pair - Done
6,261,660 UART: [art] Signing Cert with AUTHO
6,262,140 UART: RITY.KEYID = 7
6,277,136 UART: [art] Erasing AUTHORITY.KEYID = 7
6,277,901 UART: [art] PUB.X = 53CCB84639855FC08582BC4114B32114197B4D583CF3301708A84DD2FAAD2BF97F16DBB8350AA0BB6B0FB6F3CD306846
6,284,670 UART: [art] PUB.Y = A70F4075395B2C552BA4ABDEFFF8A1A7182944FB899D02AD037642A01427FEB6EE0C17F9314F9928D41F538C8344C0E2
6,291,614 UART: [art] SIG.R = C1D2F75CA6D1967E8D7884E59F10970F530D72B75D64515C057D14BF2A77025E9E3790709C5631C937A56D52C4665862
6,298,362 UART: [art] SIG.S = 28A0D6A2A25CAB1384CE3C13948C9F70055154D81084A13D619A3EC227895C9C99142EE113D466FAA1BE48782AA4D481
6,322,688 UART: Caliptra RT
6,322,941 UART: [state] CFI Enabled
6,386,654 UART: Disabled attest: DPE valid fail
6,387,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,388,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,418,870 UART: [rt]cmd =0x494e464f, len=4
6,422,383 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,323 ready_for_fw is high
1,362,323 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,042 >>> mbox cmd response: success
2,465,042 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,700 UART:
2,526,716 UART: Running Caliptra FMC ...
2,527,124 UART:
2,527,178 UART: [state] CFI Enabled
2,537,635 UART: [fht] FMC Alias Private Key: 7
2,645,512 UART: [art] Extend RT PCRs Done
2,645,940 UART: [art] Lock RT PCRs Done
2,647,624 UART: [art] Populate DV Done
2,656,027 UART: [fht] FMC Alias Private Key: 7
2,657,139 UART: [art] Derive CDI
2,657,419 UART: [art] Store in in slot 0x4
2,743,198 UART: [art] Derive Key Pair
2,743,558 UART: [art] Store priv key in slot 0x5
2,757,508 UART: [art] Derive Key Pair - Done
2,772,278 UART: [art] Signing Cert with AUTHO
2,772,758 UART: RITY.KEYID = 7
2,787,918 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,683 UART: [art] PUB.X = 70271F84FBAC86F36CE6469F1BBEC27C0FEC07858B1FA021AA3C1A00C5CFAE3EBCF0146F5EAB05C7D55846DC81864E36
2,795,444 UART: [art] PUB.Y = BF109ADAD6000805111669D3797ADF76BB9CD172A17272711A1E5E43246C7E69C974DD07CF37807C4273E54419C2C19C
2,802,361 UART: [art] SIG.R = 45438FE1A7A8D9E340A845D97159D71C7AC64211287A398319FEC497E91DDD9B24386CC75B210ED996A6215BC83C08CE
2,809,127 UART: [art] SIG.S = 3FEB5374B514D666C23726E5640CA5E655AC91613DC05C0085BB1C68C0DF4E92C88DE5057A0A4C3C16B9313088D1B672
2,833,119 UART: mbox::rt_entry...
2,833,491 UART: ____ _ _ _ ____ _____
2,834,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,379 UART: |_|
2,837,691 UART:
2,944,848 UART: [rt] Runtime listening for mailbox commands...
2,949,816 >>> mbox cmd response data (3272 bytes)
2,949,817 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,903 >>> mbox cmd response data (0 bytes)
2,972,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,737,318 >>> mbox cmd response: success
5,750,829 UART:
5,750,845 UART: Running Caliptra FMC ...
5,751,253 UART:
5,751,307 UART: [state] CFI Enabled
5,840,168 UART: [art] Extend RT PCRs Done
5,840,596 UART: [art] Lock RT PCRs Done
5,842,035 UART: [art] Populate DV Done
5,850,312 UART: [fht] FMC Alias Private Key: 7
5,851,336 UART: [art] Derive CDI
5,851,616 UART: [art] Store in in slot 0x4
5,937,303 UART: [art] Derive Key Pair
5,937,663 UART: [art] Store priv key in slot 0x5
5,950,617 UART: [art] Derive Key Pair - Done
5,965,383 UART: [art] Signing Cert with AUTHO
5,965,863 UART: RITY.KEYID = 7
5,981,247 UART: [art] Erasing AUTHORITY.KEYID = 7
5,982,012 UART: [art] PUB.X = 9859A7719DF47E4E0E7C63217CCE00BF1381FE60F10DEA5A4CF859B4566177A6B6F752757E4F5624E5BDE76D1DF4BC57
5,988,764 UART: [art] PUB.Y = 8099F2FCF6A0A263594565B4A1ED356AED66F243EB7E572A4FDA2160E0565FF35635E10AD225643F146686528E52D2E5
5,995,711 UART: [art] SIG.R = 94E6561EC610F1FF0667B2CA7E14636F91B5592BF51F7F737D8D3B7CC2BFAB9927EA3B58AB2209B507A3977BF6AAA7F7
6,002,486 UART: [art] SIG.S = 0DCE2C694B6745DA83D43CC527FD320BE5178FBC56990395391EFFCD86324A4BEB2B35D85E09868A11D6EA91997C5DA4
6,026,281 UART: Caliptra RT
6,026,534 UART: [state] CFI Enabled
6,089,633 UART: Disabled attest: DPE valid fail
6,090,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,091,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,122,357 UART: [rt]cmd =0x494e464f, len=4
6,125,590 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,596 UART: [kat] SHA2-256
882,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,642 UART: [kat] ++
886,794 UART: [kat] sha1
891,040 UART: [kat] SHA2-256
892,978 UART: [kat] SHA2-384
895,811 UART: [kat] SHA2-512-ACC
897,712 UART: [kat] ECC-384
903,599 UART: [kat] HMAC-384Kdf
908,119 UART: [kat] LMS
1,476,315 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,738 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,883 UART: [idev] Erasing UDS.KEYID = 0
1,506,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,281 UART: [idev] --
1,516,350 UART: [ldev] ++
1,516,518 UART: [ldev] CDI.KEYID = 6
1,516,881 UART: [ldev] SUBJECT.KEYID = 5
1,517,307 UART: [ldev] AUTHORITY.KEYID = 7
1,517,770 UART: [ldev] FE.KEYID = 1
1,522,914 UART: [ldev] Erasing FE.KEYID = 1
1,548,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,741 UART: [ldev] --
1,587,030 UART: [fwproc] Waiting for Commands...
1,587,703 UART: [fwproc] Received command 0x46574c44
1,588,494 UART: [fwproc] Received Image of size 78704 bytes
2,478,648 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,121 >>> mbox cmd response: success
2,617,121 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,237 UART: [afmc] ++
2,618,405 UART: [afmc] CDI.KEYID = 6
2,618,767 UART: [afmc] SUBJECT.KEYID = 7
2,619,192 UART: [afmc] AUTHORITY.KEYID = 5
2,653,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,696 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,386 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,131 UART: [afmc] --
2,697,189 UART: [cold-reset] --
2,697,945 UART: [state] Locking Datavault
2,698,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,532 UART: [state] Locking ICCM
2,700,074 UART: [exit] Launching FMC @ 0x40000130
2,705,403 UART:
2,705,419 UART: Running Caliptra FMC ...
2,705,827 UART:
2,705,970 UART: [state] CFI Enabled
2,716,643 UART: [fht] FMC Alias Private Key: 7
2,824,506 UART: [art] Extend RT PCRs Done
2,824,934 UART: [art] Lock RT PCRs Done
2,826,294 UART: [art] Populate DV Done
2,834,671 UART: [fht] FMC Alias Private Key: 7
2,835,831 UART: [art] Derive CDI
2,836,111 UART: [art] Store in in slot 0x4
2,921,778 UART: [art] Derive Key Pair
2,922,138 UART: [art] Store priv key in slot 0x5
2,935,696 UART: [art] Derive Key Pair - Done
2,950,093 UART: [art] Signing Cert with AUTHO
2,950,573 UART: RITY.KEYID = 7
2,965,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,256 UART: [art] PUB.X = A0E2470A8D4C12F36CED1D219C8D500B0294AD415218C6305D882B92D9EDC493F70A6D01FEFBB4323EA1B51BED19B204
2,973,020 UART: [art] PUB.Y = 0D03BA5CCF6D37D9282944144CA81A115BA2598985CE2233AC688E70C9F1D69E7C2D4422D90EDE3DC96C433DAE942408
2,979,964 UART: [art] SIG.R = BB2B6E909CDBD3EC3D6035C3D1953587AF401937C56A60C86854899F772B1C94FA4E2C84880411D3220BA3234C6FB489
2,986,728 UART: [art] SIG.S = 49BECBD6C3BEC1292101467826B2C3006790E806322C9B82BD40CF8DEB030DF5E5DFA45940BAE85D46D775D314078B4B
3,010,596 UART: mbox::rt_entry...
3,010,968 UART: ____ _ _ _ ____ _____
3,011,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,856 UART: |_|
3,015,168 UART:
3,122,120 UART: [rt] Runtime listening for mailbox commands...
3,127,088 >>> mbox cmd response data (3272 bytes)
3,127,089 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,175 >>> mbox cmd response data (0 bytes)
3,150,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,296 UART:
3,150,312 UART: Running Caliptra ROM ...
3,150,720 UART:
3,150,861 UART: [state] CFI Enabled
3,153,635 UART: [state] LifecycleState = Unprovisioned
3,154,290 UART: [state] DebugLocked = No
3,154,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,679 UART: [kat] SHA2-256
3,950,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,725 UART: [kat] ++
3,954,877 UART: [kat] sha1
3,958,929 UART: [kat] SHA2-256
3,960,867 UART: [kat] SHA2-384
3,963,690 UART: [kat] SHA2-512-ACC
3,965,590 UART: [kat] ECC-384
3,970,719 UART: [kat] HMAC-384Kdf
3,975,189 UART: [kat] LMS
4,543,385 UART: [kat] --
4,544,074 UART: [update-reset] ++
5,880,231 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,307 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,031,357 >>> mbox cmd response: success
6,031,652 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,666 UART: [update-reset Success] --
6,040,641 UART: [state] Locking Datavault
6,041,483 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,087 UART: [state] Locking ICCM
6,042,681 UART: [exit] Launching FMC @ 0x40000130
6,048,010 UART:
6,048,026 UART: Running Caliptra FMC ...
6,048,434 UART:
6,048,577 UART: [state] CFI Enabled
6,137,524 UART: [art] Extend RT PCRs Done
6,137,952 UART: [art] Lock RT PCRs Done
6,139,181 UART: [art] Populate DV Done
6,147,298 UART: [fht] FMC Alias Private Key: 7
6,148,266 UART: [art] Derive CDI
6,148,546 UART: [art] Store in in slot 0x4
6,233,813 UART: [art] Derive Key Pair
6,234,173 UART: [art] Store priv key in slot 0x5
6,247,249 UART: [art] Derive Key Pair - Done
6,262,189 UART: [art] Signing Cert with AUTHO
6,262,669 UART: RITY.KEYID = 7
6,277,901 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,666 UART: [art] PUB.X = 5CB12D9FE6466CE171255C42CA67C03531A3B94E6B258E59C5CE0DE3F696D210EA76D80AB73BF748CDF7BDF8CD251328
6,285,444 UART: [art] PUB.Y = 75809F56CC0DBD4122C74BDACE09322E0726CE7D217402C37A641F2CE6095F5DD7E7ADF0F9CC89C97C2BED7DAF78B40F
6,292,396 UART: [art] SIG.R = 45A368912C0A9FC6857BA1B2341844809C33876460E2EC2642AF88076BBBB049412C391CE61AD9A242E05E41FA6CD9C3
6,299,160 UART: [art] SIG.S = 332A4BD1C1A21373808784B1E4F55FFACD39A37F977EC458DCC8B9009F0EA7816C55EAD04A466277E1E27BE985464E2A
6,323,784 UART: Caliptra RT
6,324,129 UART: [state] CFI Enabled
6,387,183 UART: Disabled attest: DPE valid fail
6,387,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,389,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,419,709 UART: [rt]cmd =0x494e464f, len=4
6,423,086 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,370 ready_for_fw is high
1,362,370 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,115 >>> mbox cmd response: success
2,465,115 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,299 UART:
2,527,315 UART: Running Caliptra FMC ...
2,527,723 UART:
2,527,866 UART: [state] CFI Enabled
2,538,439 UART: [fht] FMC Alias Private Key: 7
2,646,614 UART: [art] Extend RT PCRs Done
2,647,042 UART: [art] Lock RT PCRs Done
2,648,744 UART: [art] Populate DV Done
2,656,933 UART: [fht] FMC Alias Private Key: 7
2,658,041 UART: [art] Derive CDI
2,658,321 UART: [art] Store in in slot 0x4
2,744,126 UART: [art] Derive Key Pair
2,744,486 UART: [art] Store priv key in slot 0x5
2,757,950 UART: [art] Derive Key Pair - Done
2,772,584 UART: [art] Signing Cert with AUTHO
2,773,064 UART: RITY.KEYID = 7
2,788,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,891 UART: [art] PUB.X = ADA53A7368E84A4CCD85063ECC674A5E2C5ECCB2BCF7AAF13C48D64AD927C904460C473491D356381E9B009BC5D8715C
2,795,644 UART: [art] PUB.Y = 30F7BF395F7AD4A382E0FB94370842FBF44E3F32950943ABE2E4BEDC27F4B4D7A0C490CE89E4068E1B1F5D5A5BB86BD3
2,802,603 UART: [art] SIG.R = 575282DE0B629DD2F368B86B8F27D62714DD2C0ECE3A22C555CF749C20127F56DC6B10581B4EBAB4B5E1C60B370FB133
2,809,371 UART: [art] SIG.S = 7C4C64E701676A07C81762882BEB0CEA5429FE6A28283B196BD674839BCD14A97AC685E3887BC2C8DB926DB1513D3267
2,833,159 UART: mbox::rt_entry...
2,833,531 UART: ____ _ _ _ ____ _____
2,834,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,883 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,419 UART: |_|
2,837,731 UART:
2,944,252 UART: [rt] Runtime listening for mailbox commands...
2,949,220 >>> mbox cmd response data (3272 bytes)
2,949,221 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,307 >>> mbox cmd response data (0 bytes)
2,972,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,736,091 >>> mbox cmd response: success
5,749,672 UART:
5,749,688 UART: Running Caliptra FMC ...
5,750,096 UART:
5,750,239 UART: [state] CFI Enabled
5,839,676 UART: [art] Extend RT PCRs Done
5,840,104 UART: [art] Lock RT PCRs Done
5,841,357 UART: [art] Populate DV Done
5,849,346 UART: [fht] FMC Alias Private Key: 7
5,850,296 UART: [art] Derive CDI
5,850,576 UART: [art] Store in in slot 0x4
5,936,109 UART: [art] Derive Key Pair
5,936,469 UART: [art] Store priv key in slot 0x5
5,950,155 UART: [art] Derive Key Pair - Done
5,964,641 UART: [art] Signing Cert with AUTHO
5,965,121 UART: RITY.KEYID = 7
5,979,949 UART: [art] Erasing AUTHORITY.KEYID = 7
5,980,714 UART: [art] PUB.X = E5EE09DBC81D77C1CA64D90208CD6A4C1433925D0FE72C4BAED7E19A4049CB5A3251C10336FB3F776A55EF975DC11D43
5,987,483 UART: [art] PUB.Y = 83C0F7B875D4B952BE5CD8532CDEE2E4008E2F9AD9556174A33727E88724B585CDD610949346E68B5B3A1E0BD21A1A51
5,994,412 UART: [art] SIG.R = F3944A4EAA175AFBF30924074F1B9EA3726DAD5FDF50F1359CACC9A6D10CB9FC60A49802D4459CC60F5594BD77DC77B1
6,001,185 UART: [art] SIG.S = 4B6DF60620028D9B1C72D56925D40B90CE75A081CB24BFB95186DF6D11D88C3FED17E96A66F0F5F9FB63D7804DC8C2FC
6,025,573 UART: Caliptra RT
6,025,918 UART: [state] CFI Enabled
6,089,921 UART: Disabled attest: DPE valid fail
6,090,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,091,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,122,343 UART: [rt]cmd =0x494e464f, len=4
6,125,748 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,298 UART: [kat] SHA2-512-ACC
908,199 UART: [kat] ECC-384
917,560 UART: [kat] HMAC-384Kdf
922,258 UART: [kat] LMS
1,170,586 UART: [kat] --
1,171,431 UART: [cold-reset] ++
1,171,765 UART: [fht] FHT @ 0x50003400
1,174,410 UART: [idev] ++
1,174,578 UART: [idev] CDI.KEYID = 6
1,174,938 UART: [idev] SUBJECT.KEYID = 7
1,175,362 UART: [idev] UDS.KEYID = 0
1,175,707 ready_for_fw is high
1,175,707 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,534 UART: [idev] Erasing UDS.KEYID = 0
1,201,223 UART: [idev] Sha1 KeyId Algorithm
1,209,799 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,080 UART: [fwproc] Wait for Commands...
1,283,654 UART: [fwproc] Recv command 0x46574c44
1,284,382 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,366 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,675 >>> mbox cmd response: success
2,314,675 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,751 UART: [afmc] ++
2,315,919 UART: [afmc] CDI.KEYID = 6
2,316,281 UART: [afmc] SUBJECT.KEYID = 7
2,316,706 UART: [afmc] AUTHORITY.KEYID = 5
2,352,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,362 UART: [afmc] --
2,395,352 UART: [cold-reset] --
2,396,164 UART: [state] Locking Datavault
2,397,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,719 UART: [state] Locking ICCM
2,398,341 UART: [exit] Launching FMC @ 0x40000130
2,403,670 UART:
2,403,686 UART: Running Caliptra FMC ...
2,404,094 UART:
2,404,148 UART: [state] CFI Enabled
2,414,283 UART: [fht] FMC Alias Private Key: 7
2,522,196 UART: [art] Extend RT PCRs Done
2,522,624 UART: [art] Lock RT PCRs Done
2,524,060 UART: [art] Populate DV Done
2,532,477 UART: [fht] FMC Alias Private Key: 7
2,533,483 UART: [art] Derive CDI
2,533,763 UART: [art] Store in in slot 0x4
2,619,256 UART: [art] Derive Key Pair
2,619,616 UART: [art] Store priv key in slot 0x5
2,632,166 UART: [art] Derive Key Pair - Done
2,646,891 UART: [art] Signing Cert with AUTHO
2,647,371 UART: RITY.KEYID = 7
2,662,513 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,278 UART: [art] PUB.X = DD2A8E32AB5DDD403B6F97AD14F98D1070BACAF4C8687E4A565A62F2B0E88761AFCC23AD6F55BE78BC91EF60333D4BB0
2,670,072 UART: [art] PUB.Y = 7180C95B2F38A5A061B1E5B41DA771470BEAEE341A2CA1980818524A8112C8055DEF32FA020F3B0289B10AFBE2F9D2A6
2,677,009 UART: [art] SIG.R = DCFA099D9E950998C200BC1A535D25DC92F157CEB491D37FED98F487A5F9E85B7A540892C9B466923FC573A6D7DA2AFA
2,683,762 UART: [art] SIG.S = 0B403235D7BEB1D248F25656617A94525F836CF7EC04E53E90A4DB471561AB37302FF47CC7BA99BF006689AE1EBA443D
2,707,043 UART: mbox::rt_entry...
2,707,415 UART: ____ _ _ _ ____ _____
2,708,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,303 UART: |_|
2,711,615 UART:
2,818,369 UART: [rt] Runtime listening for mailbox commands...
2,823,337 >>> mbox cmd response data (3272 bytes)
2,823,338 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,424 >>> mbox cmd response data (0 bytes)
2,846,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,542 UART:
2,846,558 UART: Running Caliptra ROM ...
2,846,966 UART:
2,847,021 UART: [state] CFI Enabled
2,849,375 UART: [state] LifecycleState = Unprovisioned
2,850,030 UART: [state] DebugLocked = No
2,850,686 UART: [state] WD Timer not started. Device not locked for debugging
2,851,796 UART: [kat] SHA2-256
3,657,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,571 UART: [kat] ++
3,661,723 UART: [kat] sha1
3,665,879 UART: [kat] SHA2-256
3,667,819 UART: [kat] SHA2-384
3,670,588 UART: [kat] SHA2-512-ACC
3,672,488 UART: [kat] ECC-384
3,682,055 UART: [kat] HMAC-384Kdf
3,686,481 UART: [kat] LMS
3,934,809 UART: [kat] --
3,935,707 UART: [update-reset] ++
5,249,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,400,873 >>> mbox cmd response: success
5,401,142 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,156 UART: [update-reset Success] --
5,410,091 UART: [state] Locking Datavault
5,411,005 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,609 UART: [state] Locking ICCM
5,412,061 UART: [exit] Launching FMC @ 0x40000130
5,417,390 UART:
5,417,406 UART: Running Caliptra FMC ...
5,417,814 UART:
5,417,868 UART: [state] CFI Enabled
5,506,757 UART: [art] Extend RT PCRs Done
5,507,185 UART: [art] Lock RT PCRs Done
5,508,686 UART: [art] Populate DV Done
5,517,125 UART: [fht] FMC Alias Private Key: 7
5,518,141 UART: [art] Derive CDI
5,518,421 UART: [art] Store in in slot 0x4
5,604,042 UART: [art] Derive Key Pair
5,604,402 UART: [art] Store priv key in slot 0x5
5,616,948 UART: [art] Derive Key Pair - Done
5,631,861 UART: [art] Signing Cert with AUTHO
5,632,341 UART: RITY.KEYID = 7
5,647,953 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,718 UART: [art] PUB.X = 868B48AA7CCFD421F21166092D2CF84138BAA0D771D263C01FB6FDCB0016AD82AB366D2653A87FC5BCA166B823D221FC
5,655,477 UART: [art] PUB.Y = D121BA62FF0EF2E38E5F844CA6206CCB9A7FF131BB59C4C4D5AAF8B5589313D9A73E6A5BBF68C4C59C5782035BBA3353
5,662,439 UART: [art] SIG.R = D2801166962B6EA6EFBB19BD3028AA744F6AE8293BBCC053EE7D6284841AD7E8A2DBE7D380D19E503394CCEB437241AA
5,669,223 UART: [art] SIG.S = 40AA0F70A1234D5062D0241799A1D947F82A6616F17A5D34A4D0EFF42E75E9D7210F6109BFF592C10A29BB2F261CA6F1
5,692,900 UART: Caliptra RT
5,693,153 UART: [state] CFI Enabled
5,755,996 UART: Disabled attest: DPE valid fail
5,756,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,757,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,788,150 UART: [rt]cmd =0x494e464f, len=4
5,791,595 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 ready_for_fw is high
1,060,467 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,856 >>> mbox cmd response: success
2,166,856 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,229,740 UART:
2,229,756 UART: Running Caliptra FMC ...
2,230,164 UART:
2,230,218 UART: [state] CFI Enabled
2,240,703 UART: [fht] FMC Alias Private Key: 7
2,348,546 UART: [art] Extend RT PCRs Done
2,348,974 UART: [art] Lock RT PCRs Done
2,350,836 UART: [art] Populate DV Done
2,358,977 UART: [fht] FMC Alias Private Key: 7
2,360,147 UART: [art] Derive CDI
2,360,427 UART: [art] Store in in slot 0x4
2,445,944 UART: [art] Derive Key Pair
2,446,304 UART: [art] Store priv key in slot 0x5
2,459,062 UART: [art] Derive Key Pair - Done
2,473,682 UART: [art] Signing Cert with AUTHO
2,474,162 UART: RITY.KEYID = 7
2,489,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,879 UART: [art] PUB.X = AA3354455A513EFAFCF7FA2A0901F0BE68C4C0FFD6120C0282BE6E3E441ADE40FDD8EB25937695CB9462A2637F637584
2,496,649 UART: [art] PUB.Y = 0E64B2F8B3D764FE70561FDE18DDCAC5482AC47815CC1A5B7E540C5380233DA3E9FAA72FF67E7EEFCEB5186336C69EDA
2,503,615 UART: [art] SIG.R = B78BD3E1C3FFE158E1CD3986B27EED247BB1A1026801385BDF3CEB252B725ED5E38D93880DE13368F3BA95ADE36BDBF3
2,510,396 UART: [art] SIG.S = 67F09AA6111FF3E55DCE41A6118CF2CD1B71200E2C133FF80527F3B10669D88A7ABC76841F64B41A926FA8EDD6392C9F
2,534,152 UART: mbox::rt_entry...
2,534,524 UART: ____ _ _ _ ____ _____
2,535,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,412 UART: |_|
2,538,724 UART:
2,644,806 UART: [rt] Runtime listening for mailbox commands...
2,649,774 >>> mbox cmd response data (3272 bytes)
2,649,775 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,861 >>> mbox cmd response data (0 bytes)
2,672,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,110,671 >>> mbox cmd response: success
5,124,015 UART:
5,124,031 UART: Running Caliptra FMC ...
5,124,439 UART:
5,124,493 UART: [state] CFI Enabled
5,213,260 UART: [art] Extend RT PCRs Done
5,213,688 UART: [art] Lock RT PCRs Done
5,215,205 UART: [art] Populate DV Done
5,223,572 UART: [fht] FMC Alias Private Key: 7
5,224,692 UART: [art] Derive CDI
5,224,972 UART: [art] Store in in slot 0x4
5,310,707 UART: [art] Derive Key Pair
5,311,067 UART: [art] Store priv key in slot 0x5
5,324,125 UART: [art] Derive Key Pair - Done
5,338,873 UART: [art] Signing Cert with AUTHO
5,339,353 UART: RITY.KEYID = 7
5,354,489 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,254 UART: [art] PUB.X = 636A816A35CAF41412D0E9E69AF316CDF53F9AB70D9FAAEFD6A2E5E8A709D0AD2A30AE0424A513FD590F2F1DAD9328E3
5,362,034 UART: [art] PUB.Y = AD4CFCB27401FF49CE48FF3AF9DDC427929CF032F5C6D73796C5986829691DC48F3406F6E4F2D044140DAB21B51D95B8
5,368,985 UART: [art] SIG.R = 0269FA53C6A4DE9F10860C85D47B62648C013AA1E228FB2415A0FA37174D7823BBFA37D17BDE1D43C0824C78A1B725E4
5,375,752 UART: [art] SIG.S = D4EB7AC014216E3DE11512D3F14C2C624C1EB71D2E6D37A87377293CDB514DE71EDE089A640AA42C686BE18637ED2A20
5,399,239 UART: Caliptra RT
5,399,492 UART: [state] CFI Enabled
5,463,441 UART: Disabled attest: DPE valid fail
5,463,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,465,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,495,483 UART: [rt]cmd =0x494e464f, len=4
5,498,916 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,314 UART: [kat] SHA2-256
904,254 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,755 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,357 UART: [idev] ++
1,175,525 UART: [idev] CDI.KEYID = 6
1,175,885 UART: [idev] SUBJECT.KEYID = 7
1,176,309 UART: [idev] UDS.KEYID = 0
1,176,654 ready_for_fw is high
1,176,654 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,405 UART: [idev] Erasing UDS.KEYID = 0
1,201,588 UART: [idev] Sha1 KeyId Algorithm
1,210,040 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,712 UART: [ldev] Erasing FE.KEYID = 1
1,243,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,576 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,739 UART: [fwproc] Recv command 0x46574c44
1,284,467 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,677 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,994 >>> mbox cmd response: success
2,312,994 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,174 UART: [afmc] ++
2,314,342 UART: [afmc] CDI.KEYID = 6
2,314,704 UART: [afmc] SUBJECT.KEYID = 7
2,315,129 UART: [afmc] AUTHORITY.KEYID = 5
2,349,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,239 UART: [afmc] --
2,393,351 UART: [cold-reset] --
2,394,079 UART: [state] Locking Datavault
2,395,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,706 UART: [state] Locking ICCM
2,396,154 UART: [exit] Launching FMC @ 0x40000130
2,401,483 UART:
2,401,499 UART: Running Caliptra FMC ...
2,401,907 UART:
2,402,050 UART: [state] CFI Enabled
2,412,537 UART: [fht] FMC Alias Private Key: 7
2,520,888 UART: [art] Extend RT PCRs Done
2,521,316 UART: [art] Lock RT PCRs Done
2,522,922 UART: [art] Populate DV Done
2,531,205 UART: [fht] FMC Alias Private Key: 7
2,532,355 UART: [art] Derive CDI
2,532,635 UART: [art] Store in in slot 0x4
2,617,784 UART: [art] Derive Key Pair
2,618,144 UART: [art] Store priv key in slot 0x5
2,631,026 UART: [art] Derive Key Pair - Done
2,645,595 UART: [art] Signing Cert with AUTHO
2,646,075 UART: RITY.KEYID = 7
2,661,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,354 UART: [art] PUB.X = 772CC3533B919B9A552C32E66B42F2F22BEC969C611FFEE9C6439B5F6AC4A670F01F495C2FD3F91E3D56B97D79A4CCA5
2,669,138 UART: [art] PUB.Y = 153D890B9330B5AD08708A56D861B0BED7D7587DE855D67CF3DF829D2E1A6A66550D6AFC54D70C7CB9E734B228A9D4F4
2,676,086 UART: [art] SIG.R = B8DF07F251CF9EFE615BED0FC9D45687FAEA690461E9C29CAF2EC379B2DC9F43825129E09C24AB51522514DB253E86C7
2,682,861 UART: [art] SIG.S = EADDC24A02E1FE2727A2404C2CA73AEB52857C7E27D4E99802ACFB2749D3B138DD85E3A3A6195A7DD9F71EDDA8E27F79
2,706,560 UART: mbox::rt_entry...
2,706,932 UART: ____ _ _ _ ____ _____
2,707,716 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,516 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,284 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,820 UART: |_|
2,711,132 UART:
2,817,403 UART: [rt] Runtime listening for mailbox commands...
2,822,371 >>> mbox cmd response data (3272 bytes)
2,822,372 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,458 >>> mbox cmd response data (0 bytes)
2,845,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,576 UART:
2,845,592 UART: Running Caliptra ROM ...
2,846,000 UART:
2,846,142 UART: [state] CFI Enabled
2,849,506 UART: [state] LifecycleState = Unprovisioned
2,850,161 UART: [state] DebugLocked = No
2,850,745 UART: [state] WD Timer not started. Device not locked for debugging
2,852,025 UART: [kat] SHA2-256
3,657,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,800 UART: [kat] ++
3,661,952 UART: [kat] sha1
3,666,168 UART: [kat] SHA2-256
3,668,108 UART: [kat] SHA2-384
3,670,731 UART: [kat] SHA2-512-ACC
3,672,631 UART: [kat] ECC-384
3,682,050 UART: [kat] HMAC-384Kdf
3,686,724 UART: [kat] LMS
3,935,052 UART: [kat] --
3,935,672 UART: [update-reset] ++
5,249,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,518 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,400,516 >>> mbox cmd response: success
5,400,817 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,831 UART: [update-reset Success] --
5,409,828 UART: [state] Locking Datavault
5,410,528 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,132 UART: [state] Locking ICCM
5,411,806 UART: [exit] Launching FMC @ 0x40000130
5,417,135 UART:
5,417,151 UART: Running Caliptra FMC ...
5,417,559 UART:
5,417,702 UART: [state] CFI Enabled
5,507,019 UART: [art] Extend RT PCRs Done
5,507,447 UART: [art] Lock RT PCRs Done
5,508,874 UART: [art] Populate DV Done
5,517,131 UART: [fht] FMC Alias Private Key: 7
5,518,307 UART: [art] Derive CDI
5,518,587 UART: [art] Store in in slot 0x4
5,604,240 UART: [art] Derive Key Pair
5,604,600 UART: [art] Store priv key in slot 0x5
5,618,080 UART: [art] Derive Key Pair - Done
5,633,164 UART: [art] Signing Cert with AUTHO
5,633,644 UART: RITY.KEYID = 7
5,648,784 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,549 UART: [art] PUB.X = 4627815DF8E109507B9F84AD2ACE747464846FFDAF3AB90B2A95891F606BD4B6CBB1983D9A339A3C2D9CB76E1D96C29B
5,656,325 UART: [art] PUB.Y = B5EFB984682EFAED7F70EE736B368B0E39D720746D06BC2C978BD399B1368C3BBFF91981B93267E303D6692484E59A4C
5,663,272 UART: [art] SIG.R = 00D58A4B2ED449BCE261450EDDA82622E628BE5C3F0789B9D3EB238FC0C3F8991893CDE1649B38A46F860D2FB6692E28
5,670,019 UART: [art] SIG.S = 3CF4A05ACF5482BBE4B1A5555ACB6F08F949B0F54585BBB9AB3A07A0AD9866940E59FE8EE1ADD29B780C897D3E204E5C
5,693,510 UART: Caliptra RT
5,693,855 UART: [state] CFI Enabled
5,757,895 UART: Disabled attest: DPE valid fail
5,758,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,759,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,790,099 UART: [rt]cmd =0x494e464f, len=4
5,793,446 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,378 ready_for_fw is high
1,060,378 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,645 >>> mbox cmd response: success
2,165,645 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,077 UART:
2,228,093 UART: Running Caliptra FMC ...
2,228,501 UART:
2,228,644 UART: [state] CFI Enabled
2,239,437 UART: [fht] FMC Alias Private Key: 7
2,347,936 UART: [art] Extend RT PCRs Done
2,348,364 UART: [art] Lock RT PCRs Done
2,350,154 UART: [art] Populate DV Done
2,358,351 UART: [fht] FMC Alias Private Key: 7
2,359,475 UART: [art] Derive CDI
2,359,755 UART: [art] Store in in slot 0x4
2,445,694 UART: [art] Derive Key Pair
2,446,054 UART: [art] Store priv key in slot 0x5
2,459,322 UART: [art] Derive Key Pair - Done
2,474,191 UART: [art] Signing Cert with AUTHO
2,474,671 UART: RITY.KEYID = 7
2,490,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,804 UART: [art] PUB.X = 0C8E0847C5551B8F563D3F6B69C621630DE7D007A242DE52631A3899B8B85B729350809964CFAD053A9E757B0099E747
2,497,529 UART: [art] PUB.Y = F56BFD3A14AE59D6726B60171F3659A4E34D7F0DC1F4203D58E44889A281545F3F4EAF0E7A60239C710D0B99B6260D85
2,504,466 UART: [art] SIG.R = CA89C44C5077A9908CCEE4ACE1DD99CDE792271C4675AAA4DC1F29637EE0F24F0B2148629A1899885C6488646BB3D153
2,511,239 UART: [art] SIG.S = DD949030CEFCBB3422D7A45F0D4A4D408496392645D77FBCB049DA2A15A610A7BEE07E6EC10B9EAF79FEF5C78DA70BE0
2,534,713 UART: mbox::rt_entry...
2,535,085 UART: ____ _ _ _ ____ _____
2,535,869 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,973 UART: |_|
2,539,285 UART:
2,645,986 UART: [rt] Runtime listening for mailbox commands...
2,650,954 >>> mbox cmd response data (3272 bytes)
2,650,955 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,674,041 >>> mbox cmd response data (0 bytes)
2,674,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,112,480 >>> mbox cmd response: success
5,125,910 UART:
5,125,926 UART: Running Caliptra FMC ...
5,126,334 UART:
5,126,477 UART: [state] CFI Enabled
5,216,026 UART: [art] Extend RT PCRs Done
5,216,454 UART: [art] Lock RT PCRs Done
5,217,857 UART: [art] Populate DV Done
5,226,204 UART: [fht] FMC Alias Private Key: 7
5,227,332 UART: [art] Derive CDI
5,227,612 UART: [art] Store in in slot 0x4
5,313,905 UART: [art] Derive Key Pair
5,314,265 UART: [art] Store priv key in slot 0x5
5,327,049 UART: [art] Derive Key Pair - Done
5,341,954 UART: [art] Signing Cert with AUTHO
5,342,434 UART: RITY.KEYID = 7
5,357,912 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,677 UART: [art] PUB.X = 56F32451DD3B2BA5BF924FFFE4B36EFCFD4958B37F8E443D4B336F16AFDF800E2229AE88CC48987A3030A9BE8E475F8B
5,365,462 UART: [art] PUB.Y = 7CB538CF1189DA59136F971C255BC81E6847622A3A20500065418BE78B20618CC42FDEDAC3B5C4E796FDC8164E0E88BD
5,372,393 UART: [art] SIG.R = 3DEE7B177265CB3D1DBAD1D8B7365A16E8CB21EBEF3AD705A1ABC76B378B620ED334FD5245EC0BD382C462A796255C7E
5,379,174 UART: [art] SIG.S = 3AEC5C356FDDCEA15CFDA7A7A837E0B4B6E401D7D5C6DE8946659571D75D688BAF69655EDBEF51F8B5BF138C61EF86DA
5,402,572 UART: Caliptra RT
5,402,917 UART: [state] CFI Enabled
5,465,860 UART: Disabled attest: DPE valid fail
5,466,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,467,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,444 UART: [rt]cmd =0x494e464f, len=4
5,501,875 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,173,823 ready_for_fw is high
1,173,823 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,223 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,206,913 UART: [idev] --
1,207,952 UART: [ldev] ++
1,208,120 UART: [ldev] CDI.KEYID = 6
1,208,484 UART: [ldev] SUBJECT.KEYID = 5
1,208,911 UART: [ldev] AUTHORITY.KEYID = 7
1,209,374 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,240,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,278 UART: [ldev] --
1,279,726 UART: [fwproc] Wait for Commands...
1,280,351 UART: [fwproc] Recv command 0x46574c44
1,281,084 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,055 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,369 >>> mbox cmd response: success
2,311,369 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,418 UART: [afmc] ++
2,312,586 UART: [afmc] CDI.KEYID = 6
2,312,949 UART: [afmc] SUBJECT.KEYID = 7
2,313,375 UART: [afmc] AUTHORITY.KEYID = 5
2,348,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,487 UART: [afmc] --
2,391,603 UART: [cold-reset] --
2,392,553 UART: [state] Locking Datavault
2,393,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,448 UART: [state] Locking ICCM
2,394,922 UART: [exit] Launching FMC @ 0x40000130
2,400,251 UART:
2,400,267 UART: Running Caliptra FMC ...
2,400,675 UART:
2,400,729 UART: [state] CFI Enabled
2,411,534 UART: [fht] FMC Alias Private Key: 7
2,519,451 UART: [art] Extend RT PCRs Done
2,519,879 UART: [art] Lock RT PCRs Done
2,521,301 UART: [art] Populate DV Done
2,529,344 UART: [fht] FMC Alias Private Key: 7
2,530,290 UART: [art] Derive CDI
2,530,570 UART: [art] Store in in slot 0x4
2,616,369 UART: [art] Derive Key Pair
2,616,729 UART: [art] Store priv key in slot 0x5
2,630,119 UART: [art] Derive Key Pair - Done
2,644,816 UART: [art] Signing Cert with AUTHO
2,645,296 UART: RITY.KEYID = 7
2,660,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,919 UART: [art] PUB.X = 142492162A7330622633DD99B23C6B7397AED7C8B10008FCDA50B77A1EF05B7D4295EF584CE174861A0E5FDE72DBD8CF
2,667,669 UART: [art] PUB.Y = 02FB5C4EEB5F198F5BCB19D80C601AB8181ECE8263003E6C4396F2B19A467D7B9F94356BEC02E0495B10C4DC7C9CB6F1
2,674,602 UART: [art] SIG.R = D6E06F31093CC94AB17A5EF9F0A611C0FA695B90A3AD41FE9DC0FF540F81C2A600497E861C9B9807DDB78A4EBFE48025
2,681,357 UART: [art] SIG.S = 0BE1E5AF6D2FAFC88481D302C87A50141379F8E0EFBF895C96AAAE7E79523A732BBC446DD6EE47373293F75C5027A010
2,704,588 UART: mbox::rt_entry...
2,704,960 UART: ____ _ _ _ ____ _____
2,705,744 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,544 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,080 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,848 UART: |_|
2,709,160 UART:
2,815,586 UART: [rt] Runtime listening for mailbox commands...
2,820,554 >>> mbox cmd response data (3272 bytes)
2,820,555 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,641 >>> mbox cmd response data (0 bytes)
2,843,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,843,759 UART:
2,843,775 UART: Running Caliptra ROM ...
2,844,183 UART:
2,844,238 UART: [state] CFI Enabled
2,846,570 UART: [state] LifecycleState = Unprovisioned
2,847,225 UART: [state] DebugLocked = No
2,847,901 UART: [state] WD Timer not started. Device not locked for debugging
2,849,235 UART: [kat] SHA2-256
3,652,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,914 UART: [kat] ++
3,657,066 UART: [kat] sha1
3,661,356 UART: [kat] SHA2-256
3,663,296 UART: [kat] SHA2-384
3,665,959 UART: [kat] SHA2-512-ACC
3,667,859 UART: [kat] ECC-384
3,677,538 UART: [kat] HMAC-384Kdf
3,681,952 UART: [kat] LMS
3,930,264 UART: [kat] --
3,931,296 UART: [update-reset] ++
5,244,194 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,245,173 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,395,171 >>> mbox cmd response: success
5,395,512 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,526 UART: [update-reset Success] --
5,404,537 UART: [state] Locking Datavault
5,405,233 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,837 UART: [state] Locking ICCM
5,406,277 UART: [exit] Launching FMC @ 0x40000130
5,411,606 UART:
5,411,622 UART: Running Caliptra FMC ...
5,412,030 UART:
5,412,084 UART: [state] CFI Enabled
5,501,277 UART: [art] Extend RT PCRs Done
5,501,705 UART: [art] Lock RT PCRs Done
5,502,696 UART: [art] Populate DV Done
5,510,999 UART: [fht] FMC Alias Private Key: 7
5,512,021 UART: [art] Derive CDI
5,512,301 UART: [art] Store in in slot 0x4
5,598,012 UART: [art] Derive Key Pair
5,598,372 UART: [art] Store priv key in slot 0x5
5,611,280 UART: [art] Derive Key Pair - Done
5,626,365 UART: [art] Signing Cert with AUTHO
5,626,845 UART: RITY.KEYID = 7
5,642,157 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,922 UART: [art] PUB.X = 7667D58A9261A3309C9E6747C260A61191E05334B0265FBE86390BA0FEB839B2F3337C7897047E6B04DF1B4E9171C15B
5,649,677 UART: [art] PUB.Y = 093938389D6F24F95F965A9040BC354AB692016DF21BFF20944B8EABB38F12EE9989E4D0B337D5463BAF649C4E686EA7
5,656,625 UART: [art] SIG.R = A24669281525D8F43135AED6E653D0009A3338975078FDCE9B0460D7D00FEEF38B08AD2BA19E8EBC319EBE64603F3FEB
5,663,374 UART: [art] SIG.S = 30F944D49A0302ED5D51316BDD9EF3811FD1484E7580120B1CC58BF18621FDAB82BF0E6EE3F7E545DA89C227C4B19688
5,686,975 UART: Caliptra RT
5,687,228 UART: [state] CFI Enabled
5,750,385 UART: Disabled attest: DPE valid fail
5,750,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,752,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,782,431 UART: [rt]cmd =0x494e464f, len=4
5,785,702 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 ready_for_fw is high
1,055,904 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,009 >>> mbox cmd response: success
2,161,009 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,759 UART:
2,223,775 UART: Running Caliptra FMC ...
2,224,183 UART:
2,224,237 UART: [state] CFI Enabled
2,234,840 UART: [fht] FMC Alias Private Key: 7
2,342,719 UART: [art] Extend RT PCRs Done
2,343,147 UART: [art] Lock RT PCRs Done
2,344,995 UART: [art] Populate DV Done
2,352,908 UART: [fht] FMC Alias Private Key: 7
2,353,900 UART: [art] Derive CDI
2,354,180 UART: [art] Store in in slot 0x4
2,440,043 UART: [art] Derive Key Pair
2,440,403 UART: [art] Store priv key in slot 0x5
2,454,123 UART: [art] Derive Key Pair - Done
2,469,074 UART: [art] Signing Cert with AUTHO
2,469,554 UART: RITY.KEYID = 7
2,484,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,475 UART: [art] PUB.X = 89F34C9D3680AB0507BDD10E492060970A429D67C42ED92ACFC5453643FC08AE4E694C1E1A75C352CD570D32F72DE171
2,492,231 UART: [art] PUB.Y = DC6920264BD805389E9077302ACF6BC4274A637D25333E98724ED35BF68809377E7EC8ACCA1831CA4B84B78A6DE4135E
2,499,177 UART: [art] SIG.R = 1B24E6045BB09813FE516CE2A55EBEAF7552F0A178FD686C81380C1C5F469EB099A15D9A5214C50683C2A86619EEE84B
2,505,944 UART: [art] SIG.S = E2D7D46A58F95102057A327E12AE4412D03B4FB0DB630F4E82832460949F02FEFC47388CB2A76A7A8BA3E208B931DA6E
2,529,810 UART: mbox::rt_entry...
2,530,182 UART: ____ _ _ _ ____ _____
2,530,966 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,534 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,302 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,070 UART: |_|
2,534,382 UART:
2,640,900 UART: [rt] Runtime listening for mailbox commands...
2,645,868 >>> mbox cmd response data (3272 bytes)
2,645,869 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,955 >>> mbox cmd response data (0 bytes)
2,668,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,102,956 >>> mbox cmd response: success
5,115,892 UART:
5,115,908 UART: Running Caliptra FMC ...
5,116,316 UART:
5,116,370 UART: [state] CFI Enabled
5,205,033 UART: [art] Extend RT PCRs Done
5,205,461 UART: [art] Lock RT PCRs Done
5,206,784 UART: [art] Populate DV Done
5,214,741 UART: [fht] FMC Alias Private Key: 7
5,215,711 UART: [art] Derive CDI
5,215,991 UART: [art] Store in in slot 0x4
5,301,738 UART: [art] Derive Key Pair
5,302,098 UART: [art] Store priv key in slot 0x5
5,315,670 UART: [art] Derive Key Pair - Done
5,330,696 UART: [art] Signing Cert with AUTHO
5,331,176 UART: RITY.KEYID = 7
5,346,650 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,415 UART: [art] PUB.X = 4A928AB70C00263C84431CA25478519F2519F00E1206537661175D7226420A34D9469CC454B5F6A621F9A4DD261DC878
5,354,137 UART: [art] PUB.Y = 7FD0F2BADFA4BAA83A24DA44C3454C7C618AE4B3BA595F61ECCB042D48F2A0B15B653B879F7571D4682BC017EEFDDD99
5,361,108 UART: [art] SIG.R = C4165BD24FB5AFB29AD6E857ED15D0F4B85FE45E30C6FDF29BE200C1A8574C42EBD5F02064511DC963413446134CE19D
5,367,868 UART: [art] SIG.S = 5A457E5EBF65CE8CDB9EDAC2595980025B0FB331B6A2D29A883FB430E22E165E9AAB91BE2E88FB6BC7BEB8D936ED3FA9
5,391,901 UART: Caliptra RT
5,392,154 UART: [state] CFI Enabled
5,453,845 UART: Disabled attest: DPE valid fail
5,454,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,455,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,486,057 UART: [rt]cmd =0x494e464f, len=4
5,489,386 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,198,510 UART: [idev] Sha1 KeyId Algorithm
1,207,270 UART: [idev] --
1,208,405 UART: [ldev] ++
1,208,573 UART: [ldev] CDI.KEYID = 6
1,208,937 UART: [ldev] SUBJECT.KEYID = 5
1,209,364 UART: [ldev] AUTHORITY.KEYID = 7
1,209,827 UART: [ldev] FE.KEYID = 1
1,215,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,867 UART: [ldev] --
1,281,139 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,164 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,494 >>> mbox cmd response: success
2,311,494 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,745 UART: [afmc] ++
2,312,913 UART: [afmc] CDI.KEYID = 6
2,313,276 UART: [afmc] SUBJECT.KEYID = 7
2,313,702 UART: [afmc] AUTHORITY.KEYID = 5
2,348,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,868 UART: [afmc] --
2,391,842 UART: [cold-reset] --
2,392,776 UART: [state] Locking Datavault
2,393,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,603 UART: [state] Locking ICCM
2,395,079 UART: [exit] Launching FMC @ 0x40000130
2,400,408 UART:
2,400,424 UART: Running Caliptra FMC ...
2,400,832 UART:
2,400,975 UART: [state] CFI Enabled
2,411,442 UART: [fht] FMC Alias Private Key: 7
2,518,901 UART: [art] Extend RT PCRs Done
2,519,329 UART: [art] Lock RT PCRs Done
2,521,023 UART: [art] Populate DV Done
2,528,988 UART: [fht] FMC Alias Private Key: 7
2,530,060 UART: [art] Derive CDI
2,530,340 UART: [art] Store in in slot 0x4
2,615,811 UART: [art] Derive Key Pair
2,616,171 UART: [art] Store priv key in slot 0x5
2,629,705 UART: [art] Derive Key Pair - Done
2,644,333 UART: [art] Signing Cert with AUTHO
2,644,813 UART: RITY.KEYID = 7
2,660,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,082 UART: [art] PUB.X = 97038476F8CB4857D74C79DB721271057287B4238290081FB8CB40DBD066F60F764FDBD02CECFFF5801E1BF83482E8AE
2,667,844 UART: [art] PUB.Y = 85BFDB09E19382E300327D040A47C60C216E57C597A2FF70C04538105272B7F89F0890E7182EC853221D043488C2A2C5
2,674,744 UART: [art] SIG.R = 96DE7E7DC85B73905EC7E19BF65428EE3A809D436F44103112487B8FD3A9446B4E75CD2A375E55111717DD187184F5C7
2,681,512 UART: [art] SIG.S = 03634F48AA3CB57C1468A00131AF5D6A98D1AACEBB0C89E8C29FCFF6056223EB9613E39768A6E6AF990B9D196CECEC77
2,704,726 UART: mbox::rt_entry...
2,705,098 UART: ____ _ _ _ ____ _____
2,705,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,682 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,218 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,986 UART: |_|
2,709,298 UART:
2,817,030 UART: [rt] Runtime listening for mailbox commands...
2,821,998 >>> mbox cmd response data (3272 bytes)
2,821,999 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,085 >>> mbox cmd response data (0 bytes)
2,845,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,203 UART:
2,845,219 UART: Running Caliptra ROM ...
2,845,627 UART:
2,845,769 UART: [state] CFI Enabled
2,848,375 UART: [state] LifecycleState = Unprovisioned
2,849,030 UART: [state] DebugLocked = No
2,849,648 UART: [state] WD Timer not started. Device not locked for debugging
2,850,864 UART: [kat] SHA2-256
3,654,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,543 UART: [kat] ++
3,658,695 UART: [kat] sha1
3,662,967 UART: [kat] SHA2-256
3,664,907 UART: [kat] SHA2-384
3,667,726 UART: [kat] SHA2-512-ACC
3,669,626 UART: [kat] ECC-384
3,679,721 UART: [kat] HMAC-384Kdf
3,684,427 UART: [kat] LMS
3,932,739 UART: [kat] --
3,933,473 UART: [update-reset] ++
5,247,413 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,516 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,514 >>> mbox cmd response: success
5,398,809 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,823 UART: [update-reset Success] --
5,407,930 UART: [state] Locking Datavault
5,408,836 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,440 UART: [state] Locking ICCM
5,410,048 UART: [exit] Launching FMC @ 0x40000130
5,415,377 UART:
5,415,393 UART: Running Caliptra FMC ...
5,415,801 UART:
5,415,944 UART: [state] CFI Enabled
5,505,329 UART: [art] Extend RT PCRs Done
5,505,757 UART: [art] Lock RT PCRs Done
5,506,992 UART: [art] Populate DV Done
5,515,117 UART: [fht] FMC Alias Private Key: 7
5,516,255 UART: [art] Derive CDI
5,516,535 UART: [art] Store in in slot 0x4
5,602,218 UART: [art] Derive Key Pair
5,602,578 UART: [art] Store priv key in slot 0x5
5,616,060 UART: [art] Derive Key Pair - Done
5,630,813 UART: [art] Signing Cert with AUTHO
5,631,293 UART: RITY.KEYID = 7
5,646,649 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,414 UART: [art] PUB.X = AE074E059F27EBC0746C897785AE02DAE0A873D479D6EEAAB3D68F8F57C9837EDEDBC80DF7EE97A5DE17AC135E1E715B
5,654,196 UART: [art] PUB.Y = 9A4BF2763C1DF3C2D9FAA1743964FC42584EE549844128171DD4D1C32C623858D8E83F20F7C8C753294FEE0CE4AC2418
5,661,147 UART: [art] SIG.R = 81341DB00A91A42BF612F791B5F245A0D947542444F96D7A328AF4921CA78612A1BD40494AFE39863EB0874B729422E3
5,667,908 UART: [art] SIG.S = 4CCAB54B43DC952EC5BB88514EF5881B7EFF7124EC2F3BC2065169CB7D6401C9C4DF94B9673D284A4A3ECDE38399935A
5,692,087 UART: Caliptra RT
5,692,432 UART: [state] CFI Enabled
5,754,887 UART: Disabled attest: DPE valid fail
5,755,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,756,911 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,787,231 UART: [rt]cmd =0x494e464f, len=4
5,790,638 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,103 ready_for_fw is high
1,057,103 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,296 >>> mbox cmd response: success
2,162,296 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,080 UART:
2,224,096 UART: Running Caliptra FMC ...
2,224,504 UART:
2,224,647 UART: [state] CFI Enabled
2,235,374 UART: [fht] FMC Alias Private Key: 7
2,343,035 UART: [art] Extend RT PCRs Done
2,343,463 UART: [art] Lock RT PCRs Done
2,344,979 UART: [art] Populate DV Done
2,353,224 UART: [fht] FMC Alias Private Key: 7
2,354,288 UART: [art] Derive CDI
2,354,568 UART: [art] Store in in slot 0x4
2,440,347 UART: [art] Derive Key Pair
2,440,707 UART: [art] Store priv key in slot 0x5
2,454,693 UART: [art] Derive Key Pair - Done
2,469,670 UART: [art] Signing Cert with AUTHO
2,470,150 UART: RITY.KEYID = 7
2,485,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,875 UART: [art] PUB.X = DD16913A9AE05A16AD06A00B3DBA468494B81CCE5312A8A25698EAECFF7A530497CF17E5E587CB69C69B618DAA2E241B
2,492,652 UART: [art] PUB.Y = DE529670EB886DBD5BBF43F3179D107A45974657297F8F23EE16C53D7972C46F0F473448F6A943EF3CCF2285D0AE7A64
2,499,603 UART: [art] SIG.R = 27D3EDF90C89710816F941AB7FA5ABFF10C5A46512A3FB6B9A4894B2071D9DEC71F017B28A4D854F6D4B952E284154F0
2,506,372 UART: [art] SIG.S = 60C567A4714CE710971BE4D07B23268B62C0F7CC89E2396F08260FF4B322E5AEC284E6A467E93C48971782A7BA6A31DE
2,530,405 UART: mbox::rt_entry...
2,530,777 UART: ____ _ _ _ ____ _____
2,531,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,129 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,897 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,665 UART: |_|
2,534,977 UART:
2,642,041 UART: [rt] Runtime listening for mailbox commands...
2,647,009 >>> mbox cmd response data (3272 bytes)
2,647,010 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,670,096 >>> mbox cmd response data (0 bytes)
2,670,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,104,600 >>> mbox cmd response: success
5,117,774 UART:
5,117,790 UART: Running Caliptra FMC ...
5,118,198 UART:
5,118,341 UART: [state] CFI Enabled
5,207,474 UART: [art] Extend RT PCRs Done
5,207,902 UART: [art] Lock RT PCRs Done
5,209,145 UART: [art] Populate DV Done
5,217,450 UART: [fht] FMC Alias Private Key: 7
5,218,576 UART: [art] Derive CDI
5,218,856 UART: [art] Store in in slot 0x4
5,304,627 UART: [art] Derive Key Pair
5,304,987 UART: [art] Store priv key in slot 0x5
5,318,165 UART: [art] Derive Key Pair - Done
5,332,668 UART: [art] Signing Cert with AUTHO
5,333,148 UART: RITY.KEYID = 7
5,348,408 UART: [art] Erasing AUTHORITY.KEYID = 7
5,349,173 UART: [art] PUB.X = 2E01D4BA972E3F08F6FF5A07A59E4A1822A0C9544AF7943BE821A16DA0CAB66F7C843284B1B0C42AD7E3403DCABF5DE1
5,355,952 UART: [art] PUB.Y = 6946B39AEF20D9EC5F18BA156D68F55E1921B55AEDC11EF25330E830756B8E2780454356FD3F50990943104DEFF04C5C
5,362,901 UART: [art] SIG.R = C79C249AD09E10FF49EB54C98A5577BACF03C9B3947A16807DB98B1AFB64DF96FC339314D0DD3FC5FA85D79200F6CF56
5,369,662 UART: [art] SIG.S = E8FDD6163333C2F902FE51D71A4590A4ED96C9F1FF6C17C3C0A250957E070FA16BF25792D058157D135BD214456DDAF5
5,393,684 UART: Caliptra RT
5,394,029 UART: [state] CFI Enabled
5,457,475 UART: Disabled attest: DPE valid fail
5,457,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,459,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,490,017 UART: [rt]cmd =0x494e464f, len=4
5,493,124 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,307 UART:
192,670 UART: Running Caliptra ROM ...
193,868 UART:
194,024 UART: [state] CFI Enabled
266,330 UART: [state] LifecycleState = Unprovisioned
268,314 UART: [state] DebugLocked = No
270,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,633 UART: [kat] SHA2-256
445,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,778 UART: [kat] ++
456,382 UART: [kat] sha1
467,337 UART: [kat] SHA2-256
469,978 UART: [kat] SHA2-384
474,644 UART: [kat] SHA2-512-ACC
476,982 UART: [kat] ECC-384
2,765,641 UART: [kat] HMAC-384Kdf
2,778,449 UART: [kat] LMS
3,968,757 UART: [kat] --
3,973,913 UART: [cold-reset] ++
3,976,134 UART: [fht] Storing FHT @ 0x50003400
3,986,408 UART: [idev] ++
3,986,970 UART: [idev] CDI.KEYID = 6
3,987,996 UART: [idev] SUBJECT.KEYID = 7
3,989,175 UART: [idev] UDS.KEYID = 0
3,990,166 ready_for_fw is high
3,990,363 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,089,691 UART: [idev] Erasing UDS.KEYID = 0
7,326,793 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,617 UART: [idev] --
7,353,309 UART: [ldev] ++
7,354,193 UART: [ldev] CDI.KEYID = 6
7,355,090 UART: [ldev] SUBJECT.KEYID = 5
7,356,206 UART: [ldev] AUTHORITY.KEYID = 7
7,357,387 UART: [ldev] FE.KEYID = 1
7,401,571 UART: [ldev] Erasing FE.KEYID = 1
10,732,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,877 UART: [ldev] --
13,093,956 UART: [fwproc] Waiting for Commands...
13,097,132 UART: [fwproc] Received command 0x46574c44
13,099,323 UART: [fwproc] Received Image of size 78740 bytes
16,716,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,790,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,859,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,052,397 >>> mbox cmd response: success
17,052,882 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,056,913 UART: [afmc] ++
17,057,516 UART: [afmc] CDI.KEYID = 6
17,058,440 UART: [afmc] SUBJECT.KEYID = 7
17,059,662 UART: [afmc] AUTHORITY.KEYID = 5
20,433,754 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,734,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,737,236 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,751,669 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,766,464 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,780,920 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,802,911 UART: [afmc] --
22,806,676 UART: [cold-reset] --
22,810,864 UART: [state] Locking Datavault
22,816,055 UART: [state] Locking PCR0, PCR1 and PCR31
22,817,753 UART: [state] Locking ICCM
22,820,015 UART: [exit] Launching FMC @ 0x40000130
22,828,426 UART:
22,828,683 UART: Running Caliptra FMC ...
22,829,787 UART:
22,829,946 UART: [state] CFI Enabled
22,891,733 UART: [fht] FMC Alias Private Key: 7
25,229,368 UART: [art] Extend RT PCRs Done
25,230,593 UART: [art] Lock RT PCRs Done
25,232,166 UART: [art] Populate DV Done
25,237,356 UART: [fht] FMC Alias Private Key: 7
25,238,943 UART: [art] Derive CDI
25,239,758 UART: [art] Store in in slot 0x4
25,300,936 UART: [art] Derive Key Pair
25,301,969 UART: [art] Store priv key in slot 0x5
28,594,787 UART: [art] Derive Key Pair - Done
28,608,165 UART: [art] Signing Cert with AUTHO
28,609,466 UART: RITY.KEYID = 7
30,897,034 UART: [art] Erasing AUTHORITY.KEYID = 7
30,898,561 UART: [art] PUB.X = D22298C0D70F3001FD7AAC4E43E2214949CA31366140D3A26BFE618F3143CEAD05B6B6BF7143FE1BFED16911F773340D
30,905,771 UART: [art] PUB.Y = E2EBF8DB1B884BB3C3789B069CC6C8C3979F26641D2AF4C1435A8037FC0AD24CBF06CBD46129932F70DA88F9919915EF
30,913,010 UART: [art] SIG.R = 4518337FDFA585819AD05E4374098EFFACE6F9737E5070560FB02C5178C0715DEFDAC7DE167743622F9707AD82011CC1
30,920,415 UART: [art] SIG.S = FA896CF1AAD3EC352EC57833805E76556B8A989F4669C79C95E2445B75D53534FA112001A7C66115CE4EC6635CDABD8B
32,224,860 UART: mbox::rt_entry...
32,225,834 UART: ____ _ _ _ ____ _____
32,227,764 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,229,768 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,231,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,233,577 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,235,721 UART: |_|
32,236,538 UART:
32,349,715 UART: [rt] Runtime listening for mailbox commands...
32,355,561 >>> mbox cmd response data (3272 bytes)
32,371,246 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,404,670 >>> mbox cmd response data (0 bytes)
34,537,142 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,681,612 UART:
34,681,991 UART: Running Caliptra ROM ...
34,683,044 UART:
34,683,199 UART: [state] CFI Enabled
34,759,282 UART: [state] LifecycleState = Unprovisioned
34,761,220 UART: [state] DebugLocked = No
34,762,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,768,069 UART: [kat] SHA2-256
34,937,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,948,231 UART: [kat] ++
34,948,690 UART: [kat] sha1
34,960,225 UART: [kat] SHA2-256
34,962,908 UART: [kat] SHA2-384
34,969,874 UART: [kat] SHA2-512-ACC
34,972,276 UART: [kat] ECC-384
37,262,022 UART: [kat] HMAC-384Kdf
37,295,180 UART: [kat] LMS
38,485,532 UART: [kat] --
38,490,183 UART: [update-reset] ++
42,629,857 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,634,222 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,016,500 >>> mbox cmd response: success
43,021,205 UART: [update-reset] Copying MAN_2 To MAN_1
43,040,675 UART: [update-reset Success] --
43,044,649 UART: [state] Locking Datavault
43,048,358 UART: [state] Locking PCR0, PCR1 and PCR31
43,050,092 UART: [state] Locking ICCM
43,051,525 UART: [exit] Launching FMC @ 0x40000130
43,059,926 UART:
43,060,163 UART: Running Caliptra FMC ...
43,061,191 UART:
43,061,344 UART: [state] CFI Enabled
43,153,229 UART: [art] Extend RT PCRs Done
43,154,421 UART: [art] Lock RT PCRs Done
43,155,688 UART: [art] Populate DV Done
43,161,103 UART: [fht] FMC Alias Private Key: 7
43,162,695 UART: [art] Derive CDI
43,163,530 UART: [art] Store in in slot 0x4
43,222,126 UART: [art] Derive Key Pair
43,223,172 UART: [art] Store priv key in slot 0x5
46,516,428 UART: [art] Derive Key Pair - Done
46,529,328 UART: [art] Signing Cert with AUTHO
46,530,640 UART: RITY.KEYID = 7
48,817,721 UART: [art] Erasing AUTHORITY.KEYID = 7
48,819,234 UART: [art] PUB.X = E7030BB381BE040977BFB74BAEC9AF998F2A2969A56C745C57CD5557308E4B2902B549C7150318C120D972514D898F2D
48,826,513 UART: [art] PUB.Y = 34081F6511BECDF374CBC3CEEF1110DEFFB142A05FADA830C1D87AECF4256D362D78B7739A2C73625F27F04CB5118308
48,833,738 UART: [art] SIG.R = 38D3BFAD909866C908160313ACD967504BCA27D14926B4C98589D323EA9BAE37EBD8892F3D10AD8A7463D597F85F450B
48,841,097 UART: [art] SIG.S = B1481D87911A6377DD1DA1D95ECEF4A35C71C869BE49FA63E7A8FF20DAE948DB3BC873474A85A093983DE5C5632F1C05
50,146,131 UART: Caliptra RT
50,146,839 UART: [state] CFI Enabled
53,832,494 UART: Disable attest DPE used context limit breach
53,834,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,835,309 UART: [rt] RT listening for mailbox commands...
53,866,926 UART: [rt]cmd =0x494e464f, len=4
53,870,985 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,804,027 ready_for_fw is high
3,804,410 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,174,088 >>> mbox cmd response: success
17,174,821 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,861,127 UART:
22,861,495 UART: Running Caliptra FMC ...
22,862,719 UART:
22,862,893 UART: [state] CFI Enabled
22,931,130 UART: [fht] FMC Alias Private Key: 7
25,269,087 UART: [art] Extend RT PCRs Done
25,270,307 UART: [art] Lock RT PCRs Done
25,271,858 UART: [art] Populate DV Done
25,277,244 UART: [fht] FMC Alias Private Key: 7
25,278,843 UART: [art] Derive CDI
25,279,668 UART: [art] Store in in slot 0x4
25,339,497 UART: [art] Derive Key Pair
25,340,498 UART: [art] Store priv key in slot 0x5
28,632,894 UART: [art] Derive Key Pair - Done
28,646,111 UART: [art] Signing Cert with AUTHO
28,647,416 UART: RITY.KEYID = 7
30,934,360 UART: [art] Erasing AUTHORITY.KEYID = 7
30,935,869 UART: [art] PUB.X = FA9CA902EE88E64D0A488335AD3E273FF070BD5054AF3A357A9119131BCED21596163EB67EF767A803D7F32D446C10DA
30,943,131 UART: [art] PUB.Y = 2EF190BD4E9583887EFEEA31EA59C7B1B705E75CE809A9BCFD28C53B6893E506958BFDF36808DC89E4F4FB4354747AAF
30,950,360 UART: [art] SIG.R = 44064CF8CE860D531C7058BF0E72BD1B17E0D915F41819301A9543377E0F3F2E933A7BD93CF78E25F5167FC2671C804A
30,957,803 UART: [art] SIG.S = 9857271E47B1593D1BA4F18B76AC290C5C0BE38E24A85DE7AED2D79E14860E2E78D89EA47E8C55937B87A9F4E661DFE3
32,262,527 UART: mbox::rt_entry...
32,263,489 UART: ____ _ _ _ ____ _____
32,265,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,267,406 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,269,336 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,271,255 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,273,187 UART: |_|
32,273,993 UART:
32,387,048 UART: [rt] Runtime listening for mailbox commands...
32,392,911 >>> mbox cmd response data (3272 bytes)
32,408,756 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,442,156 >>> mbox cmd response data (0 bytes)
34,573,580 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,324,524 >>> mbox cmd response: success
43,358,620 UART:
43,358,954 UART: Running Caliptra FMC ...
43,359,999 UART:
43,360,151 UART: [state] CFI Enabled
43,463,688 UART: [art] Extend RT PCRs Done
43,464,878 UART: [art] Lock RT PCRs Done
43,466,422 UART: [art] Populate DV Done
43,471,888 UART: [fht] FMC Alias Private Key: 7
43,473,588 UART: [art] Derive CDI
43,474,327 UART: [art] Store in in slot 0x4
43,532,769 UART: [art] Derive Key Pair
43,533,823 UART: [art] Store priv key in slot 0x5
46,826,100 UART: [art] Derive Key Pair - Done
46,838,497 UART: [art] Signing Cert with AUTHO
46,839,811 UART: RITY.KEYID = 7
49,127,579 UART: [art] Erasing AUTHORITY.KEYID = 7
49,129,089 UART: [art] PUB.X = 7082F3B6763F8528A46221E3D6FBAF76587D285F940943C0997056C2BCD1B9BA35F90DA4903A09DE89D042D84CDB6652
49,136,318 UART: [art] PUB.Y = 953CC024CB464005D2EF8F975AEBD9CD4364C9CDB141DD28760BF56D804DC9A67EC6D335B2A53B43A1D92C5DE12639E3
49,143,572 UART: [art] SIG.R = 4EEBBF72824561C33FEDA50C53B906D8822928957D6AB3F5926D19A232D3601DCA98F4A46664E4D80D5EFA4FCA8611CB
49,150,993 UART: [art] SIG.S = 8055F34483B86348F3BB1FA1E01CEF80FFB7A5CA021CE9836E1E1A9761E975C2291A4949BC42F2F579F6074065EE9ED5
50,455,568 UART: Caliptra RT
50,456,281 UART: [state] CFI Enabled
54,140,717 UART: Disable attest DPE used context limit breach
54,142,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,143,447 UART: [rt] RT listening for mailbox commands...
54,174,978 UART: [rt]cmd =0x494e464f, len=4
54,178,915 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,426 UART:
192,813 UART: Running Caliptra ROM ...
193,964 UART:
603,777 UART: [state] CFI Enabled
618,515 UART: [state] LifecycleState = Unprovisioned
620,455 UART: [state] DebugLocked = No
622,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,668 UART: [kat] SHA2-256
797,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,930 UART: [kat] ++
808,376 UART: [kat] sha1
819,527 UART: [kat] SHA2-256
822,252 UART: [kat] SHA2-384
828,738 UART: [kat] SHA2-512-ACC
831,103 UART: [kat] ECC-384
3,116,390 UART: [kat] HMAC-384Kdf
3,127,841 UART: [kat] LMS
4,317,945 UART: [kat] --
4,321,887 UART: [cold-reset] ++
4,323,749 UART: [fht] Storing FHT @ 0x50003400
4,334,300 UART: [idev] ++
4,334,857 UART: [idev] CDI.KEYID = 6
4,335,887 UART: [idev] SUBJECT.KEYID = 7
4,337,056 UART: [idev] UDS.KEYID = 0
4,338,113 ready_for_fw is high
4,338,309 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,437,253 UART: [idev] Erasing UDS.KEYID = 0
7,623,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,240 UART: [idev] --
7,648,880 UART: [ldev] ++
7,649,502 UART: [ldev] CDI.KEYID = 6
7,650,460 UART: [ldev] SUBJECT.KEYID = 5
7,651,666 UART: [ldev] AUTHORITY.KEYID = 7
7,652,890 UART: [ldev] FE.KEYID = 1
7,664,282 UART: [ldev] Erasing FE.KEYID = 1
10,953,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,248 UART: [ldev] --
13,316,540 UART: [fwproc] Waiting for Commands...
13,318,741 UART: [fwproc] Received command 0x46574c44
13,320,970 UART: [fwproc] Received Image of size 78740 bytes
16,938,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,013,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,082,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,275,240 >>> mbox cmd response: success
17,275,709 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,278,960 UART: [afmc] ++
17,279,603 UART: [afmc] CDI.KEYID = 6
17,280,506 UART: [afmc] SUBJECT.KEYID = 7
17,281,776 UART: [afmc] AUTHORITY.KEYID = 5
20,595,851 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,888,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,890,783 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,905,203 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,919,997 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,934,453 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,956,644 UART: [afmc] --
22,960,872 UART: [cold-reset] --
22,964,578 UART: [state] Locking Datavault
22,970,200 UART: [state] Locking PCR0, PCR1 and PCR31
22,971,891 UART: [state] Locking ICCM
22,973,064 UART: [exit] Launching FMC @ 0x40000130
22,981,460 UART:
22,981,689 UART: Running Caliptra FMC ...
22,982,785 UART:
22,982,945 UART: [state] CFI Enabled
22,991,204 UART: [fht] FMC Alias Private Key: 7
25,322,285 UART: [art] Extend RT PCRs Done
25,323,510 UART: [art] Lock RT PCRs Done
25,324,995 UART: [art] Populate DV Done
25,330,567 UART: [fht] FMC Alias Private Key: 7
25,332,096 UART: [art] Derive CDI
25,332,852 UART: [art] Store in in slot 0x4
25,375,650 UART: [art] Derive Key Pair
25,376,687 UART: [art] Store priv key in slot 0x5
28,618,431 UART: [art] Derive Key Pair - Done
28,631,593 UART: [art] Signing Cert with AUTHO
28,632,931 UART: RITY.KEYID = 7
30,912,018 UART: [art] Erasing AUTHORITY.KEYID = 7
30,913,532 UART: [art] PUB.X = B0CA629B80C1BC7F93037AB78964EA662DEB42FFEF315831B395B89F83A99A8835A74B8B9A83F6C075A4C889F71CB1B9
30,920,780 UART: [art] PUB.Y = ED019A6837424C3BA7BFD8BC2788798EA3FD834BEF887FFFA415527089AC4C03DED214D471D19CE07A6BD7C7BE06FF6B
30,928,053 UART: [art] SIG.R = A2EB34BF55698E452B0146878F7D5CEA9AE0AF93DCA24EEE0030B9B77A0E407FE7B2BD605E5EAB5A15B23D398F9F81E9
30,935,446 UART: [art] SIG.S = 17C88EE8B0D532A2EF42A3F784FF42878EFF82B4BD0151A5338BACD1B9AE62892958149C8DBD282103817AB558F73421
32,239,811 UART: mbox::rt_entry...
32,240,757 UART: ____ _ _ _ ____ _____
32,242,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,244,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,246,683 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,248,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,528 UART: |_|
32,251,511 UART:
32,364,631 UART: [rt] Runtime listening for mailbox commands...
32,370,492 >>> mbox cmd response data (3272 bytes)
32,386,133 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,419,740 >>> mbox cmd response data (0 bytes)
34,476,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,621,105 UART:
34,621,464 UART: Running Caliptra ROM ...
34,622,607 UART:
34,622,774 UART: [state] CFI Enabled
34,636,204 UART: [state] LifecycleState = Unprovisioned
34,638,132 UART: [state] DebugLocked = No
34,639,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,644,981 UART: [kat] SHA2-256
34,814,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,825,260 UART: [kat] ++
34,825,722 UART: [kat] sha1
34,836,653 UART: [kat] SHA2-256
34,839,402 UART: [kat] SHA2-384
34,844,841 UART: [kat] SHA2-512-ACC
34,847,235 UART: [kat] ECC-384
37,130,447 UART: [kat] HMAC-384Kdf
37,142,181 UART: [kat] LMS
38,332,214 UART: [kat] --
38,336,157 UART: [update-reset] ++
42,472,788 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,475,993 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,858,257 >>> mbox cmd response: success
42,862,863 UART: [update-reset] Copying MAN_2 To MAN_1
42,882,219 UART: [update-reset Success] --
42,886,014 UART: [state] Locking Datavault
42,889,606 UART: [state] Locking PCR0, PCR1 and PCR31
42,891,306 UART: [state] Locking ICCM
42,893,316 UART: [exit] Launching FMC @ 0x40000130
42,901,771 UART:
42,902,000 UART: Running Caliptra FMC ...
42,903,103 UART:
42,903,257 UART: [state] CFI Enabled
42,947,315 UART: [art] Extend RT PCRs Done
42,948,452 UART: [art] Lock RT PCRs Done
42,950,142 UART: [art] Populate DV Done
42,955,403 UART: [fht] FMC Alias Private Key: 7
42,956,994 UART: [art] Derive CDI
42,957,801 UART: [art] Store in in slot 0x4
43,000,605 UART: [art] Derive Key Pair
43,001,606 UART: [art] Store priv key in slot 0x5
46,243,503 UART: [art] Derive Key Pair - Done
46,256,609 UART: [art] Signing Cert with AUTHO
46,257,908 UART: RITY.KEYID = 7
48,537,416 UART: [art] Erasing AUTHORITY.KEYID = 7
48,538,923 UART: [art] PUB.X = C14E90CB4517AECA40F2FDFAEC90026395710CBCD4154F1D72E28353648192EB21114798140B5FCAEF2E75C427EF02EF
48,546,144 UART: [art] PUB.Y = 1F4F3FB58DCA9643AFE1662612E6275A11CA14B69FF0B079432F84DA4FC998359939C87C61320D13B5FD74C777D05B66
48,553,378 UART: [art] SIG.R = 56FDF91C99838DAD64C65385DFCFBACC1D825E8A77E16A5BA1C9196A5BA15652CFB6F9D7D4B117C4E6A461C03E99F7CE
48,560,806 UART: [art] SIG.S = B2C750F727B03FD39E1F20ABCDAC3B840E53496775DB372E66C5ADB0B2A3C18FFE294E91ABDC6747A0D0C3B9DAD59867
49,865,984 UART: Caliptra RT
49,866,694 UART: [state] CFI Enabled
53,450,210 UART: Disable attest DPE used context limit breach
53,452,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,453,303 UART: [rt] RT listening for mailbox commands...
53,484,582 UART: [rt]cmd =0x494e464f, len=4
53,488,415 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,123,163 ready_for_fw is high
4,123,748 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,338,905 >>> mbox cmd response: success
17,339,578 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,978,905 UART:
22,979,281 UART: Running Caliptra FMC ...
22,980,471 UART:
22,980,633 UART: [state] CFI Enabled
22,988,462 UART: [fht] FMC Alias Private Key: 7
25,319,543 UART: [art] Extend RT PCRs Done
25,320,765 UART: [art] Lock RT PCRs Done
25,322,469 UART: [art] Populate DV Done
25,327,665 UART: [fht] FMC Alias Private Key: 7
25,329,256 UART: [art] Derive CDI
25,330,067 UART: [art] Store in in slot 0x4
25,372,784 UART: [art] Derive Key Pair
25,373,822 UART: [art] Store priv key in slot 0x5
28,615,551 UART: [art] Derive Key Pair - Done
28,628,175 UART: [art] Signing Cert with AUTHO
28,629,509 UART: RITY.KEYID = 7
30,908,811 UART: [art] Erasing AUTHORITY.KEYID = 7
30,910,319 UART: [art] PUB.X = 8216414F042BA879B2DF19A80451AB1A735FDA36CC7C8E26862F18AEA28AEE36FEB5BD26409200DD7B0FBDC829D3AC76
30,917,562 UART: [art] PUB.Y = 7AFD98904035A3D4D4B1C08F48AC420D127887F180FF13E462E5D675B73D7264CD81DAB676BE5FD2089409B1807DEE80
30,924,807 UART: [art] SIG.R = E5873D3B0141FFDE04BCC308E0DC220B61375CF4CD6CE1B034ED77538E31F237EB6394C5A9E3453E579062319890371A
30,932,201 UART: [art] SIG.S = E97F26A4B77A3FADA8A25D30226B0EB02F55653581FBCEE45472117F7496EF60C8D15FDDA2F2C326B49848A7AB255328
32,236,950 UART: mbox::rt_entry...
32,237,892 UART: ____ _ _ _ ____ _____
32,239,836 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,241,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,243,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,245,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,247,513 UART: |_|
32,248,391 UART:
32,362,543 UART: [rt] Runtime listening for mailbox commands...
32,368,389 >>> mbox cmd response data (3272 bytes)
32,384,228 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,417,918 >>> mbox cmd response data (0 bytes)
34,475,907 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,128,689 >>> mbox cmd response: success
43,163,022 UART:
43,163,338 UART: Running Caliptra FMC ...
43,164,469 UART:
43,164,630 UART: [state] CFI Enabled
43,208,712 UART: [art] Extend RT PCRs Done
43,209,899 UART: [art] Lock RT PCRs Done
43,211,254 UART: [art] Populate DV Done
43,216,611 UART: [fht] FMC Alias Private Key: 7
43,218,142 UART: [art] Derive CDI
43,218,866 UART: [art] Store in in slot 0x4
43,261,882 UART: [art] Derive Key Pair
43,262,867 UART: [art] Store priv key in slot 0x5
46,504,351 UART: [art] Derive Key Pair - Done
46,517,188 UART: [art] Signing Cert with AUTHO
46,518,493 UART: RITY.KEYID = 7
48,797,712 UART: [art] Erasing AUTHORITY.KEYID = 7
48,799,235 UART: [art] PUB.X = 3C36EE90466DD4BE4A9F39599F346108C04C618A19A4EC9D8B2DADB0638E34429036DD945A677E823FA713824BBA09DB
48,806,408 UART: [art] PUB.Y = 769D8EF4A728A177DA607087DF220F638DB7052FA11F173555544A4538A13C2CD27ECD989F70F85573B2DCB108AFC699
48,813,669 UART: [art] SIG.R = BBAC43C17F5BE42C606B0A13889C9DABBA105F6555F08287E26C1BA523DB54AC1A369AA36CAC2CAB8F8EDE5CD01E18F6
48,821,066 UART: [art] SIG.S = F7E1E89D3DDD8B41CFB72CD10CCC9CEAB41BF28D55643E2DD84B9ABBBF17BFA88B5AF01FE80A81DD63B0D2B1DDBCF87B
50,126,099 UART: Caliptra RT
50,126,816 UART: [state] CFI Enabled
53,713,032 UART: Disable attest DPE used context limit breach
53,715,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,716,082 UART: [rt] RT listening for mailbox commands...
53,747,926 UART: [rt]cmd =0x494e464f, len=4
53,751,761 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,057 UART:
192,426 UART: Running Caliptra ROM ...
193,507 UART:
193,653 UART: [state] CFI Enabled
262,929 UART: [state] LifecycleState = Unprovisioned
264,841 UART: [state] DebugLocked = No
266,015 UART: [state] WD Timer not started. Device not locked for debugging
270,407 UART: [kat] SHA2-256
449,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,054 UART: [kat] ++
461,590 UART: [kat] sha1
473,464 UART: [kat] SHA2-256
476,470 UART: [kat] SHA2-384
482,961 UART: [kat] SHA2-512-ACC
485,895 UART: [kat] ECC-384
2,949,165 UART: [kat] HMAC-384Kdf
2,971,698 UART: [kat] LMS
3,501,162 UART: [kat] --
3,504,868 UART: [cold-reset] ++
3,506,652 UART: [fht] FHT @ 0x50003400
3,517,199 UART: [idev] ++
3,517,764 UART: [idev] CDI.KEYID = 6
3,518,688 UART: [idev] SUBJECT.KEYID = 7
3,519,860 UART: [idev] UDS.KEYID = 0
3,520,757 ready_for_fw is high
3,520,973 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,620,213 UART: [idev] Erasing UDS.KEYID = 0
6,026,017 UART: [idev] Sha1 KeyId Algorithm
6,049,947 UART: [idev] --
6,053,936 UART: [ldev] ++
6,054,504 UART: [ldev] CDI.KEYID = 6
6,055,387 UART: [ldev] SUBJECT.KEYID = 5
6,056,547 UART: [ldev] AUTHORITY.KEYID = 7
6,057,837 UART: [ldev] FE.KEYID = 1
6,101,422 UART: [ldev] Erasing FE.KEYID = 1
8,603,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,661 UART: [ldev] --
10,416,129 UART: [fwproc] Wait for Commands...
10,417,683 UART: [fwproc] Recv command 0x46574c44
10,419,762 UART: [fwproc] Recv'd Img size: 78704 bytes
13,391,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,460,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,529,586 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,723,077 >>> mbox cmd response: success
13,723,595 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,726,797 UART: [afmc] ++
13,727,405 UART: [afmc] CDI.KEYID = 6
13,728,291 UART: [afmc] SUBJECT.KEYID = 7
13,729,508 UART: [afmc] AUTHORITY.KEYID = 5
16,257,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,979,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,981,266 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,997,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,013,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,028,983 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,052,081 UART: [afmc] --
18,055,255 UART: [cold-reset] --
18,057,716 UART: [state] Locking Datavault
18,062,969 UART: [state] Locking PCR0, PCR1 and PCR31
18,064,667 UART: [state] Locking ICCM
18,067,145 UART: [exit] Launching FMC @ 0x40000130
18,075,544 UART:
18,075,785 UART: Running Caliptra FMC ...
18,076,888 UART:
18,077,055 UART: [state] CFI Enabled
18,139,132 UART: [fht] FMC Alias Private Key: 7
19,902,495 UART: [art] Extend RT PCRs Done
19,903,707 UART: [art] Lock RT PCRs Done
19,905,189 UART: [art] Populate DV Done
19,910,624 UART: [fht] FMC Alias Private Key: 7
19,912,267 UART: [art] Derive CDI
19,913,083 UART: [art] Store in in slot 0x4
19,971,067 UART: [art] Derive Key Pair
19,972,126 UART: [art] Store priv key in slot 0x5
22,435,586 UART: [art] Derive Key Pair - Done
22,448,418 UART: [art] Signing Cert with AUTHO
22,449,717 UART: RITY.KEYID = 7
24,161,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,163,061 UART: [art] PUB.X = 810F0FBF8AFA9DEC0B37679D8B3A66F464FBC9FC1802FBE9FE21318877D4BA11219B06ED304EDAD7F93C80B7F1062D10
24,170,356 UART: [art] PUB.Y = 8CB4A4E4085BF2C76C3DAAE3D28860F947F5ABC20153ABE251BA6450CCFB388AF31C8BAB919E8FF42A0BD0009FC42E29
24,177,589 UART: [art] SIG.R = 74A70B2EB80AA9CC9440C912BFEC5C5A852E016DFCFF4B9FA01ECA769ABD429178CF9CAB5D6DA3F314948A4D6B66E4D2
24,185,065 UART: [art] SIG.S = C908A2CDB129F543270397B611641D7CB0AC950A43F0F2A83C0009E6C12CACF0BCDB8FBE037964CC3EB08229A5BBB765
25,163,576 UART: mbox::rt_entry...
25,164,525 UART: ____ _ _ _ ____ _____
25,166,454 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,168,482 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,170,414 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,172,342 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,174,271 UART: |_|
25,175,104 UART:
25,287,529 UART: [rt] Runtime listening for mailbox commands...
25,293,375 >>> mbox cmd response data (3272 bytes)
25,309,163 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,342,586 >>> mbox cmd response data (0 bytes)
27,414,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,559,797 UART:
27,560,173 UART: Running Caliptra ROM ...
27,561,308 UART:
27,561,474 UART: [state] CFI Enabled
27,634,845 UART: [state] LifecycleState = Unprovisioned
27,636,754 UART: [state] DebugLocked = No
27,638,796 UART: [state] WD Timer not started. Device not locked for debugging
27,642,652 UART: [kat] SHA2-256
27,821,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,833,334 UART: [kat] ++
27,833,868 UART: [kat] sha1
27,845,567 UART: [kat] SHA2-256
27,848,582 UART: [kat] SHA2-384
27,854,995 UART: [kat] SHA2-512-ACC
27,857,931 UART: [kat] ECC-384
30,322,376 UART: [kat] HMAC-384Kdf
30,345,048 UART: [kat] LMS
30,874,531 UART: [kat] --
30,879,219 UART: [update-reset] ++
34,311,030 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,314,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,697,543 >>> mbox cmd response: success
34,702,103 UART: [update-reset] Copying MAN_2 To MAN_1
34,720,247 UART: [update-reset Success] --
34,725,731 UART: [state] Locking Datavault
34,728,005 UART: [state] Locking PCR0, PCR1 and PCR31
34,729,711 UART: [state] Locking ICCM
34,730,917 UART: [exit] Launching FMC @ 0x40000130
34,739,693 UART:
34,739,997 UART: Running Caliptra FMC ...
34,741,411 UART:
34,741,582 UART: [state] CFI Enabled
34,836,556 UART: [art] Extend RT PCRs Done
34,837,765 UART: [art] Lock RT PCRs Done
34,838,984 UART: [art] Populate DV Done
34,844,509 UART: [fht] FMC Alias Private Key: 7
34,845,990 UART: [art] Derive CDI
34,846,751 UART: [art] Store in in slot 0x4
34,905,360 UART: [art] Derive Key Pair
34,906,396 UART: [art] Store priv key in slot 0x5
37,369,416 UART: [art] Derive Key Pair - Done
37,382,473 UART: [art] Signing Cert with AUTHO
37,383,802 UART: RITY.KEYID = 7
39,095,261 UART: [art] Erasing AUTHORITY.KEYID = 7
39,096,799 UART: [art] PUB.X = D0A7DF2AEF791CECE668F2EF6C37BD8EA84A5D9CCF5315CED3A008C0C823B2AA65F28F403B053671E1CEFB35A7CE89FB
39,104,043 UART: [art] PUB.Y = 03E4038B7F2CEBC1934403B028D9D3B3A41103907AFC96061E5CF00536A7760778754AFCA3F3DE56984010B9267CDE95
39,111,271 UART: [art] SIG.R = 5D27FAA7D04B67E36E5E6E5FE3175D77BAEFAB01B47E9631825D77E3275C06D9E81CE8BB91316F875D7B8673F93D69B8
39,118,652 UART: [art] SIG.S = F72A06CB0D1C51503F4E9B4055181A5534D35F523844D7C16301484A93CD8F403563654E06A2A796829B3480C4816B8F
40,097,640 UART: Caliptra RT
40,098,338 UART: [state] CFI Enabled
42,958,472 UART: Disable attest DPE used context limit breach
42,960,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,961,473 UART: [rt] RT listening for mailbox commands...
42,992,644 UART: [rt]cmd =0x494e464f, len=4
42,996,628 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,357,374 ready_for_fw is high
3,357,757 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,484,526 >>> mbox cmd response: success
13,485,272 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,771,722 UART:
17,772,118 UART: Running Caliptra FMC ...
17,773,245 UART:
17,773,399 UART: [state] CFI Enabled
17,837,591 UART: [fht] FMC Alias Private Key: 7
19,601,438 UART: [art] Extend RT PCRs Done
19,602,630 UART: [art] Lock RT PCRs Done
19,604,195 UART: [art] Populate DV Done
19,609,831 UART: [fht] FMC Alias Private Key: 7
19,611,435 UART: [art] Derive CDI
19,612,252 UART: [art] Store in in slot 0x4
19,670,552 UART: [art] Derive Key Pair
19,671,587 UART: [art] Store priv key in slot 0x5
22,133,987 UART: [art] Derive Key Pair - Done
22,146,556 UART: [art] Signing Cert with AUTHO
22,147,864 UART: RITY.KEYID = 7
23,860,135 UART: [art] Erasing AUTHORITY.KEYID = 7
23,861,623 UART: [art] PUB.X = 865C532AF9B7D644E61E7CE0E55933C434C98EEBEF477BA1EBCD3551DE35C325FE9F53C2992D84F3245A042C3E069E3C
23,868,882 UART: [art] PUB.Y = E89B5FDA6DA09D3D96275FD9D135FEB532E9896E61FEEDEFF5EB08DDF74FC2AD1F055F6E8D02B9F5F128CA98A64A592A
23,876,184 UART: [art] SIG.R = 55C272BB493902AF6E481534A986864FFF006CF225F6B6ADE2244149B52650AE64410AD34F41A182E17CC96617CE80D7
23,884,117 UART: [art] SIG.S = 6380AAD26CE19166F121B591E04EEF4EDB26AD7BA463F0D323929713088505C66090257FBB44267EF1578B7CFB10E44A
24,861,806 UART: mbox::rt_entry...
24,862,775 UART: ____ _ _ _ ____ _____
24,864,757 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,866,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,868,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,870,664 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,872,515 UART: |_|
24,873,317 UART:
24,986,865 UART: [rt] Runtime listening for mailbox commands...
24,992,724 >>> mbox cmd response data (3272 bytes)
25,008,633 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,042,058 >>> mbox cmd response data (0 bytes)
27,099,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,212,371 >>> mbox cmd response: success
34,247,933 UART:
34,248,247 UART: Running Caliptra FMC ...
34,249,370 UART:
34,249,557 UART: [state] CFI Enabled
34,340,170 UART: [art] Extend RT PCRs Done
34,341,385 UART: [art] Lock RT PCRs Done
34,342,634 UART: [art] Populate DV Done
34,348,040 UART: [fht] FMC Alias Private Key: 7
34,349,578 UART: [art] Derive CDI
34,350,393 UART: [art] Store in in slot 0x4
34,409,026 UART: [art] Derive Key Pair
34,410,070 UART: [art] Store priv key in slot 0x5
36,872,942 UART: [art] Derive Key Pair - Done
36,886,207 UART: [art] Signing Cert with AUTHO
36,887,526 UART: RITY.KEYID = 7
38,599,004 UART: [art] Erasing AUTHORITY.KEYID = 7
38,600,518 UART: [art] PUB.X = 9D06109D29EB590BAFC5C7D6A98B601C446C545FED76A61129D2FD574F8822955E715616A97453D3B531222EB9521360
38,607,807 UART: [art] PUB.Y = 54A8DA3CA64449A82033C72A32967134F835C67A40D1A815779A3081159077A06C8A510EA0CA4303BD17A97265845712
38,615,003 UART: [art] SIG.R = AE546B736B8586B73A6BFD0E64367BA19B6775D65CD341CE4F0727CDD491E637635A81543333B9FDB08C6393AC276591
38,622,363 UART: [art] SIG.S = 28212B97923FE5CE252F586CC9ACE31EDD6603A164A2296D27B1A09E0CEB4724988A64CD23C127CD3DCAE71F9F13B8E1
39,601,253 UART: Caliptra RT
39,601,939 UART: [state] CFI Enabled
42,461,740 UART: Disable attest DPE used context limit breach
42,463,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,464,664 UART: [rt] RT listening for mailbox commands...
42,495,826 UART: [rt]cmd =0x494e464f, len=4
42,499,833 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,248 UART:
192,621 UART: Running Caliptra ROM ...
193,803 UART:
603,307 UART: [state] CFI Enabled
619,386 UART: [state] LifecycleState = Unprovisioned
621,262 UART: [state] DebugLocked = No
622,646 UART: [state] WD Timer not started. Device not locked for debugging
626,961 UART: [kat] SHA2-256
806,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,680 UART: [kat] ++
818,212 UART: [kat] sha1
828,661 UART: [kat] SHA2-256
831,725 UART: [kat] SHA2-384
839,118 UART: [kat] SHA2-512-ACC
842,054 UART: [kat] ECC-384
3,281,628 UART: [kat] HMAC-384Kdf
3,293,481 UART: [kat] LMS
3,822,954 UART: [kat] --
3,827,300 UART: [cold-reset] ++
3,829,524 UART: [fht] FHT @ 0x50003400
3,840,794 UART: [idev] ++
3,841,432 UART: [idev] CDI.KEYID = 6
3,842,354 UART: [idev] SUBJECT.KEYID = 7
3,843,449 UART: [idev] UDS.KEYID = 0
3,844,436 ready_for_fw is high
3,844,640 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,943,581 UART: [idev] Erasing UDS.KEYID = 0
6,317,570 UART: [idev] Sha1 KeyId Algorithm
6,340,685 UART: [idev] --
6,345,210 UART: [ldev] ++
6,345,773 UART: [ldev] CDI.KEYID = 6
6,346,674 UART: [ldev] SUBJECT.KEYID = 5
6,347,878 UART: [ldev] AUTHORITY.KEYID = 7
6,349,098 UART: [ldev] FE.KEYID = 1
6,359,472 UART: [ldev] Erasing FE.KEYID = 1
8,838,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,565 UART: [ldev] --
10,625,980 UART: [fwproc] Wait for Commands...
10,628,770 UART: [fwproc] Recv command 0x46574c44
10,630,858 UART: [fwproc] Recv'd Img size: 78704 bytes
13,596,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,670,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,738,844 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,932,159 >>> mbox cmd response: success
13,932,675 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,935,948 UART: [afmc] ++
13,936,524 UART: [afmc] CDI.KEYID = 6
13,937,444 UART: [afmc] SUBJECT.KEYID = 7
13,938,661 UART: [afmc] AUTHORITY.KEYID = 5
16,436,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,157,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,159,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,175,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,191,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,207,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,229,893 UART: [afmc] --
18,233,100 UART: [cold-reset] --
18,236,791 UART: [state] Locking Datavault
18,241,536 UART: [state] Locking PCR0, PCR1 and PCR31
18,243,237 UART: [state] Locking ICCM
18,244,521 UART: [exit] Launching FMC @ 0x40000130
18,252,912 UART:
18,253,141 UART: Running Caliptra FMC ...
18,254,252 UART:
18,254,405 UART: [state] CFI Enabled
18,262,525 UART: [fht] FMC Alias Private Key: 7
20,019,752 UART: [art] Extend RT PCRs Done
20,020,976 UART: [art] Lock RT PCRs Done
20,023,029 UART: [art] Populate DV Done
20,028,333 UART: [fht] FMC Alias Private Key: 7
20,029,878 UART: [art] Derive CDI
20,030,692 UART: [art] Store in in slot 0x4
20,073,482 UART: [art] Derive Key Pair
20,074,673 UART: [art] Store priv key in slot 0x5
22,501,451 UART: [art] Derive Key Pair - Done
22,514,674 UART: [art] Signing Cert with AUTHO
22,515,969 UART: RITY.KEYID = 7
24,221,864 UART: [art] Erasing AUTHORITY.KEYID = 7
24,223,363 UART: [art] PUB.X = 5EFD3EE958833BB361B3E0FC2528678AA12A5647C96AFDCDC35343CB4D62AFF794F65ECD1C401E5B325EE64BDF1D588C
24,230,669 UART: [art] PUB.Y = 1B71B5B8062C5C8FE22D5B7DEDCC7E6FE9CECF82FF8398E29028C36857ECE8675AE3330BC7F26C2D66FB57192495F6F0
24,237,928 UART: [art] SIG.R = 3AACD84C9E858B3DA65375BF89A850A90DF982AC2DED023C35658007E61F2EEBE0028F74C607813A5788AF70CB406D11
24,245,330 UART: [art] SIG.S = A9C8B2F6BA0A75EA5D453BEC0E171C2B2FFF11A7292D38F17735802F8D50ED4EDDFDB0841FCF95798E9FB02E6AA5647B
25,224,020 UART: mbox::rt_entry...
25,224,975 UART: ____ _ _ _ ____ _____
25,226,955 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,228,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,230,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,232,812 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,234,657 UART: |_|
25,235,529 UART:
25,349,033 UART: [rt] Runtime listening for mailbox commands...
25,354,875 >>> mbox cmd response data (3272 bytes)
25,370,895 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,404,307 >>> mbox cmd response data (0 bytes)
27,466,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,610,918 UART:
27,611,292 UART: Running Caliptra ROM ...
27,612,366 UART:
27,612,522 UART: [state] CFI Enabled
27,624,776 UART: [state] LifecycleState = Unprovisioned
27,626,615 UART: [state] DebugLocked = No
27,629,076 UART: [state] WD Timer not started. Device not locked for debugging
27,633,686 UART: [kat] SHA2-256
27,812,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,824,433 UART: [kat] ++
27,824,997 UART: [kat] sha1
27,837,150 UART: [kat] SHA2-256
27,840,157 UART: [kat] SHA2-384
27,846,306 UART: [kat] SHA2-512-ACC
27,849,240 UART: [kat] ECC-384
30,286,718 UART: [kat] HMAC-384Kdf
30,298,514 UART: [kat] LMS
30,828,000 UART: [kat] --
30,832,694 UART: [update-reset] ++
34,258,915 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,261,704 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,645,015 >>> mbox cmd response: success
34,649,688 UART: [update-reset] Copying MAN_2 To MAN_1
34,668,045 UART: [update-reset Success] --
34,672,629 UART: [state] Locking Datavault
34,676,041 UART: [state] Locking PCR0, PCR1 and PCR31
34,677,684 UART: [state] Locking ICCM
34,680,099 UART: [exit] Launching FMC @ 0x40000130
34,688,490 UART:
34,688,728 UART: Running Caliptra FMC ...
34,690,138 UART:
34,690,301 UART: [state] CFI Enabled
34,734,340 UART: [art] Extend RT PCRs Done
34,735,534 UART: [art] Lock RT PCRs Done
34,736,771 UART: [art] Populate DV Done
34,742,064 UART: [fht] FMC Alias Private Key: 7
34,743,540 UART: [art] Derive CDI
34,744,346 UART: [art] Store in in slot 0x4
34,786,950 UART: [art] Derive Key Pair
34,787,948 UART: [art] Store priv key in slot 0x5
37,215,028 UART: [art] Derive Key Pair - Done
37,228,030 UART: [art] Signing Cert with AUTHO
37,229,334 UART: RITY.KEYID = 7
38,934,901 UART: [art] Erasing AUTHORITY.KEYID = 7
38,936,411 UART: [art] PUB.X = FBEE6D31C1B80C8840F76261AF1439A3624CFEAD2161BF91DD091175C38C4849543719BAF27387FCAB68F2AE787F7A29
38,943,683 UART: [art] PUB.Y = 6ACAD6AD5DF83837F3DA648AB8131B479CD1DBAB3E34C6F51EC44E9A6830B6084FC9828DEB4464C934C329F3C61B9E37
38,950,936 UART: [art] SIG.R = 7158B0EDAD8731240116C44876FDE5311DA34BF8C3F5641DD7840D7E3842DC022C00900976C49A1709702148CF270A10
38,958,330 UART: [art] SIG.S = E870F52CFE49154997A0C676439E583C8C4BCF8A958CEB232C099E7FBCA1C8DFE602B53758A80BFB3C0C45EC29D52E69
39,937,269 UART: Caliptra RT
39,937,967 UART: [state] CFI Enabled
42,710,081 UART: Disable attest DPE used context limit breach
42,712,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,713,244 UART: [rt] RT listening for mailbox commands...
42,744,737 UART: [rt]cmd =0x494e464f, len=4
42,748,742 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,694,247 ready_for_fw is high
3,694,813 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,715,276 >>> mbox cmd response: success
13,715,915 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,964,677 UART:
17,965,050 UART: Running Caliptra FMC ...
17,966,176 UART:
17,966,326 UART: [state] CFI Enabled
17,974,838 UART: [fht] FMC Alias Private Key: 7
19,731,803 UART: [art] Extend RT PCRs Done
19,733,044 UART: [art] Lock RT PCRs Done
19,734,561 UART: [art] Populate DV Done
19,739,979 UART: [fht] FMC Alias Private Key: 7
19,741,625 UART: [art] Derive CDI
19,742,436 UART: [art] Store in in slot 0x4
19,785,190 UART: [art] Derive Key Pair
19,786,230 UART: [art] Store priv key in slot 0x5
22,213,187 UART: [art] Derive Key Pair - Done
22,226,125 UART: [art] Signing Cert with AUTHO
22,227,427 UART: RITY.KEYID = 7
23,933,215 UART: [art] Erasing AUTHORITY.KEYID = 7
23,934,854 UART: [art] PUB.X = 24884BFE2892D1A7FC524EF9B30CEED205D2EBA417C854AD1E4E128E19753CB1B175E0330F831AEFA5F2B6F4AB127B8D
23,941,990 UART: [art] PUB.Y = 7F96D6A9917524EECD77960F046288A69ACD2298345E7140DE8E67DF86DFC6AC2BBED4BCE51F0E9BAD57A07B7B8D3F77
23,949,270 UART: [art] SIG.R = 51A05922539996AE15EAED357837F16232CD1E490CA432388302490C57D67E2271D331252E983FB9BE97CA2673746412
23,956,604 UART: [art] SIG.S = 9F406C7FAF973128B93F1924710857636C6EF5466F86757F90E0481D44FE08B8F19D7F941EFE6122EED242445BDC114F
24,935,468 UART: mbox::rt_entry...
24,936,439 UART: ____ _ _ _ ____ _____
24,938,419 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,940,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,942,336 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,944,290 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,946,211 UART: |_|
24,947,009 UART:
25,060,317 UART: [rt] Runtime listening for mailbox commands...
25,066,175 >>> mbox cmd response data (3272 bytes)
25,081,967 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,115,353 >>> mbox cmd response data (0 bytes)
27,172,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,212,086 >>> mbox cmd response: success
34,247,692 UART:
34,248,014 UART: Running Caliptra FMC ...
34,249,133 UART:
34,249,286 UART: [state] CFI Enabled
34,292,779 UART: [art] Extend RT PCRs Done
34,293,964 UART: [art] Lock RT PCRs Done
34,295,310 UART: [art] Populate DV Done
34,300,710 UART: [fht] FMC Alias Private Key: 7
34,302,402 UART: [art] Derive CDI
34,303,207 UART: [art] Store in in slot 0x4
34,345,616 UART: [art] Derive Key Pair
34,346,650 UART: [art] Store priv key in slot 0x5
36,773,739 UART: [art] Derive Key Pair - Done
36,786,564 UART: [art] Signing Cert with AUTHO
36,787,858 UART: RITY.KEYID = 7
38,492,981 UART: [art] Erasing AUTHORITY.KEYID = 7
38,494,610 UART: [art] PUB.X = 9C2BF23799B07089C539701C89FA8A3B9E33D37E08C3F8848CDBB7F9BE780641F16EAE80164945681B7FC3EEBC91B12E
38,501,780 UART: [art] PUB.Y = 61809663BA03C3AB4D00E600257716344D164812A9D8E1CB9644255CA9F02B15620B96BEC698F801BDD55E3A76D16A5C
38,508,987 UART: [art] SIG.R = EDD80EE8BB0E11391236ADD08ABADCEA09D7F9DC5B1073A6B504267FB59B160BF5E46067B553E9F20918E8AFB8C5EB57
38,516,406 UART: [art] SIG.S = F96D3146A04CAD0709515617DE5DA74F0D5D1F203DDC1E1164BF8855EC79D53414DC518BF90A1D58EC16A3ADEC081E99
39,495,563 UART: Caliptra RT
39,496,250 UART: [state] CFI Enabled
42,268,674 UART: Disable attest DPE used context limit breach
42,270,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,271,682 UART: [rt] RT listening for mailbox commands...
42,302,948 UART: [rt]cmd =0x494e464f, len=4
42,306,949 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,955 UART:
192,321 UART: Running Caliptra ROM ...
193,464 UART:
193,614 UART: [state] CFI Enabled
266,393 UART: [state] LifecycleState = Unprovisioned
268,805 UART: [state] DebugLocked = No
270,413 UART: [state] WD Timer not started. Device not locked for debugging
274,875 UART: [kat] SHA2-256
464,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,578 UART: [kat] ++
476,057 UART: [kat] sha1
486,939 UART: [kat] SHA2-256
490,018 UART: [kat] SHA2-384
495,368 UART: [kat] SHA2-512-ACC
497,952 UART: [kat] ECC-384
2,949,295 UART: [kat] HMAC-384Kdf
2,972,395 UART: [kat] LMS
3,504,131 UART: [kat] --
3,510,535 UART: [cold-reset] ++
3,512,460 UART: [fht] FHT @ 0x50003400
3,523,790 UART: [idev] ++
3,524,518 UART: [idev] CDI.KEYID = 6
3,525,429 UART: [idev] SUBJECT.KEYID = 7
3,526,602 UART: [idev] UDS.KEYID = 0
3,527,523 ready_for_fw is high
3,527,708 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,626,989 UART: [idev] Erasing UDS.KEYID = 0
6,030,077 UART: [idev] Sha1 KeyId Algorithm
6,053,202 UART: [idev] --
6,058,264 UART: [ldev] ++
6,058,945 UART: [ldev] CDI.KEYID = 6
6,059,858 UART: [ldev] SUBJECT.KEYID = 5
6,061,021 UART: [ldev] AUTHORITY.KEYID = 7
6,062,252 UART: [ldev] FE.KEYID = 1
6,100,226 UART: [ldev] Erasing FE.KEYID = 1
8,604,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,231 UART: [ldev] --
10,414,299 UART: [fwproc] Wait for Commands...
10,417,360 UART: [fwproc] Recv command 0x46574c44
10,419,607 UART: [fwproc] Recv'd Img size: 78704 bytes
13,425,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,508,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,624,276 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,953,559 >>> mbox cmd response: success
13,954,002 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,957,484 UART: [afmc] ++
13,958,208 UART: [afmc] CDI.KEYID = 6
13,959,401 UART: [afmc] SUBJECT.KEYID = 7
13,960,887 UART: [afmc] AUTHORITY.KEYID = 5
16,488,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,235,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,236,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,252,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,267,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,282,245 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,306,346 UART: [afmc] --
18,310,104 UART: [cold-reset] --
18,314,020 UART: [state] Locking Datavault
18,320,733 UART: [state] Locking PCR0, PCR1 and PCR31
18,322,927 UART: [state] Locking ICCM
18,325,292 UART: [exit] Launching FMC @ 0x40000130
18,333,962 UART:
18,334,194 UART: Running Caliptra FMC ...
18,335,290 UART:
18,335,448 UART: [state] CFI Enabled
18,391,006 UART: [fht] FMC Alias Private Key: 7
20,154,737 UART: [art] Extend RT PCRs Done
20,155,955 UART: [art] Lock RT PCRs Done
20,157,554 UART: [art] Populate DV Done
20,162,912 UART: [fht] FMC Alias Private Key: 7
20,164,611 UART: [art] Derive CDI
20,165,424 UART: [art] Store in in slot 0x4
20,223,636 UART: [art] Derive Key Pair
20,224,674 UART: [art] Store priv key in slot 0x5
22,686,998 UART: [art] Derive Key Pair - Done
22,699,725 UART: [art] Signing Cert with AUTHO
22,701,028 UART: RITY.KEYID = 7
24,413,450 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,951 UART: [art] PUB.X = F8DB9CCCC85D0E510F6FFCF4F6A23A860114EDB97B92CC1EA24B139C56C967D47AA24CA86B7121A146A9F459F2B2D60B
24,422,249 UART: [art] PUB.Y = 4931F9AFD8EE46633096117CCAE8E1E1F03E3074CC405C7835EB4C13825D2DB715B77362D8D2B787AC1D8599E2FC9025
24,429,510 UART: [art] SIG.R = 32D2DF10E1247E7E81D50CA771A5B53EDA0530D3D1AEDFD6A7F31321B6722BA095ED67C9EA79EA5147266D4FF9F91A16
24,436,926 UART: [art] SIG.S = 401179970D83E007658668E9E3848373652A49A14F93BD2B9CD548219CB361B3A16E1D7749890810743C5707BA7EA435
25,415,001 UART: mbox::rt_entry...
25,415,980 UART: ____ _ _ _ ____ _____
25,417,968 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,419,976 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,421,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,423,841 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,425,692 UART: |_|
25,426,495 UART:
25,539,734 UART: [rt] Runtime listening for mailbox commands...
25,545,574 >>> mbox cmd response data (3272 bytes)
25,561,273 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,594,666 >>> mbox cmd response data (0 bytes)
27,669,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,814,052 UART:
27,814,428 UART: Running Caliptra ROM ...
27,815,477 UART:
27,815,629 UART: [state] CFI Enabled
27,884,902 UART: [state] LifecycleState = Unprovisioned
27,887,002 UART: [state] DebugLocked = No
27,888,207 UART: [state] WD Timer not started. Device not locked for debugging
27,891,841 UART: [kat] SHA2-256
28,081,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,092,463 UART: [kat] ++
28,092,922 UART: [kat] sha1
28,103,704 UART: [kat] SHA2-256
28,106,723 UART: [kat] SHA2-384
28,111,859 UART: [kat] SHA2-512-ACC
28,114,486 UART: [kat] ECC-384
30,570,575 UART: [kat] HMAC-384Kdf
30,593,675 UART: [kat] LMS
31,125,274 UART: [kat] --
31,129,583 UART: [update-reset] ++
34,586,483 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,590,561 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,198,861 >>> mbox cmd response: success
35,203,656 UART: [update-reset] Copying MAN_2 To MAN_1
35,237,422 UART: [update-reset Success] --
35,241,621 UART: [state] Locking Datavault
35,245,106 UART: [state] Locking PCR0, PCR1 and PCR31
35,247,308 UART: [state] Locking ICCM
35,249,715 UART: [exit] Launching FMC @ 0x40000130
35,258,381 UART:
35,258,612 UART: Running Caliptra FMC ...
35,259,700 UART:
35,259,848 UART: [state] CFI Enabled
35,363,038 UART: [art] Extend RT PCRs Done
35,364,230 UART: [art] Lock RT PCRs Done
35,365,783 UART: [art] Populate DV Done
35,371,353 UART: [fht] FMC Alias Private Key: 7
35,373,003 UART: [art] Derive CDI
35,373,745 UART: [art] Store in in slot 0x4
35,431,310 UART: [art] Derive Key Pair
35,432,352 UART: [art] Store priv key in slot 0x5
37,896,034 UART: [art] Derive Key Pair - Done
37,909,083 UART: [art] Signing Cert with AUTHO
37,910,391 UART: RITY.KEYID = 7
39,621,343 UART: [art] Erasing AUTHORITY.KEYID = 7
39,622,822 UART: [art] PUB.X = 83258FC732A7D9964CEBB92539437C7A42F51CE9B2EE7CB5323A95B1D1CC697E6DA3B30C9B5A3E8787EA22C89324E5D5
39,630,140 UART: [art] PUB.Y = A7FDEB32821FB48BBDC8B914A2D9B001CA637873F86B55111275F047B9E2589C82D2543998DE2A0DBF202BBB50C69DEB
39,637,388 UART: [art] SIG.R = 0E260550E00F1845918201F48C6D99D1FC0396AAF509FF505DE9176C0C4DC2AA0D18AD48312DA77063075BFDB1C0C386
39,644,791 UART: [art] SIG.S = 66C68DF1E9663E29EC8D0F3F33E0F55E769DC8C8C327781F58FCCFD9C6ABD135F9DAF4A886DB247B6AC9B4ECFB89E9F5
40,624,363 UART: Caliptra RT
40,625,074 UART: [state] CFI Enabled
43,484,575 UART: Disable attest DPE used context limit breach
43,486,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,487,618 UART: [rt] RT listening for mailbox commands...
43,518,464 UART: [rt]cmd =0x494e464f, len=4
43,522,305 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,439,653 ready_for_fw is high
3,440,054 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,968,747 >>> mbox cmd response: success
13,969,294 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,257,388 UART:
18,257,757 UART: Running Caliptra FMC ...
18,258,857 UART:
18,259,007 UART: [state] CFI Enabled
18,323,833 UART: [fht] FMC Alias Private Key: 7
20,087,481 UART: [art] Extend RT PCRs Done
20,088,712 UART: [art] Lock RT PCRs Done
20,090,474 UART: [art] Populate DV Done
20,095,833 UART: [fht] FMC Alias Private Key: 7
20,097,347 UART: [art] Derive CDI
20,098,119 UART: [art] Store in in slot 0x4
20,155,955 UART: [art] Derive Key Pair
20,156,992 UART: [art] Store priv key in slot 0x5
22,619,738 UART: [art] Derive Key Pair - Done
22,632,728 UART: [art] Signing Cert with AUTHO
22,634,022 UART: RITY.KEYID = 7
24,344,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,346,301 UART: [art] PUB.X = 78DE3F3996DABECCB5389C7DBE798A12CFE7B578216428D9BC93A3AD5567F60DE698B6C89B21CF60917EF4C2660D4E1C
24,353,629 UART: [art] PUB.Y = 31D67FBBC2FD509A6442597974244B51CBAEE52AC7D059B362F95E59B02AD7537073E6E5DCDD6763B110B9464D127779
24,360,864 UART: [art] SIG.R = 388DC5C13F27967B22B39EF5C7596071432B751BE25E48A969D7F302E570DEA4898918CACBC819CB3FACC4105660219D
24,368,208 UART: [art] SIG.S = 75984ED42F31B3F7E71E60994018853741916E3F9D9A593EADAE27E4C49FF992ABC4B14539B92D3A80F1BA1CF2702DD1
25,346,826 UART: mbox::rt_entry...
25,347,797 UART: ____ _ _ _ ____ _____
25,349,777 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,351,730 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,353,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,355,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,357,492 UART: |_|
25,358,293 UART:
25,470,538 UART: [rt] Runtime listening for mailbox commands...
25,476,370 >>> mbox cmd response data (3272 bytes)
25,492,029 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,525,418 >>> mbox cmd response data (0 bytes)
27,583,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,382,351 >>> mbox cmd response: success
35,416,086 UART:
35,416,437 UART: Running Caliptra FMC ...
35,417,503 UART:
35,417,657 UART: [state] CFI Enabled
35,504,229 UART: [art] Extend RT PCRs Done
35,505,416 UART: [art] Lock RT PCRs Done
35,506,734 UART: [art] Populate DV Done
35,512,092 UART: [fht] FMC Alias Private Key: 7
35,513,734 UART: [art] Derive CDI
35,514,470 UART: [art] Store in in slot 0x4
35,573,513 UART: [art] Derive Key Pair
35,574,547 UART: [art] Store priv key in slot 0x5
38,037,623 UART: [art] Derive Key Pair - Done
38,050,409 UART: [art] Signing Cert with AUTHO
38,051,713 UART: RITY.KEYID = 7
39,763,488 UART: [art] Erasing AUTHORITY.KEYID = 7
39,764,977 UART: [art] PUB.X = F0BCEC2731AB82E5683CF3DC10100752148CCDA60CC75C4C6741F136C05FBA0B7E060570A9FA4676608DB3CC41D2D632
39,772,275 UART: [art] PUB.Y = 3B3A6A4CF494C09C32DED22A0929634E4F58962E5091CE2CC45EA939C309DA70C90E1F31432C22E461FE62D3EB94F175
39,779,527 UART: [art] SIG.R = 96326A83539FA52B5944C5EFC2D910FF73A76C79E5050BFCEEB94F75DFE7CC1D14D259FC62CC37E70130F3541417315F
39,786,920 UART: [art] SIG.S = 0ABECA4FC5AD55CF7FD9BFC42DF4E4AA833B5317EDA96897773E14BA7AC08E4F17B50DADAAC96D28D140258CF4D8EE90
40,766,146 UART: Caliptra RT
40,766,855 UART: [state] CFI Enabled
43,625,743 UART: Disable attest DPE used context limit breach
43,627,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,628,541 UART: [rt] RT listening for mailbox commands...
43,660,003 UART: [rt]cmd =0x494e464f, len=4
43,663,953 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,349 UART:
192,736 UART: Running Caliptra ROM ...
193,863 UART:
603,425 UART: [state] CFI Enabled
620,646 UART: [state] LifecycleState = Unprovisioned
623,047 UART: [state] DebugLocked = No
625,500 UART: [state] WD Timer not started. Device not locked for debugging
629,463 UART: [kat] SHA2-256
819,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,109 UART: [kat] ++
830,628 UART: [kat] sha1
842,153 UART: [kat] SHA2-256
845,192 UART: [kat] SHA2-384
851,471 UART: [kat] SHA2-512-ACC
854,046 UART: [kat] ECC-384
3,295,963 UART: [kat] HMAC-384Kdf
3,308,271 UART: [kat] LMS
3,840,063 UART: [kat] --
3,844,840 UART: [cold-reset] ++
3,846,621 UART: [fht] FHT @ 0x50003400
3,857,586 UART: [idev] ++
3,858,302 UART: [idev] CDI.KEYID = 6
3,859,204 UART: [idev] SUBJECT.KEYID = 7
3,860,442 UART: [idev] UDS.KEYID = 0
3,861,356 ready_for_fw is high
3,861,553 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,960,669 UART: [idev] Erasing UDS.KEYID = 0
6,336,204 UART: [idev] Sha1 KeyId Algorithm
6,359,921 UART: [idev] --
6,365,189 UART: [ldev] ++
6,365,871 UART: [ldev] CDI.KEYID = 6
6,366,774 UART: [ldev] SUBJECT.KEYID = 5
6,367,978 UART: [ldev] AUTHORITY.KEYID = 7
6,369,149 UART: [ldev] FE.KEYID = 1
6,378,543 UART: [ldev] Erasing FE.KEYID = 1
8,858,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,964 UART: [ldev] --
10,649,731 UART: [fwproc] Wait for Commands...
10,651,977 UART: [fwproc] Recv command 0x46574c44
10,654,226 UART: [fwproc] Recv'd Img size: 78704 bytes
13,658,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,734,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,850,343 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,178,647 >>> mbox cmd response: success
14,179,118 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,183,028 UART: [afmc] ++
14,183,724 UART: [afmc] CDI.KEYID = 6
14,184,960 UART: [afmc] SUBJECT.KEYID = 7
14,186,384 UART: [afmc] AUTHORITY.KEYID = 5
16,691,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,413,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,415,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,484,525 UART: [afmc] --
18,487,786 UART: [cold-reset] --
18,492,286 UART: [state] Locking Datavault
18,498,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,500,639 UART: [state] Locking ICCM
18,503,000 UART: [exit] Launching FMC @ 0x40000130
18,511,781 UART:
18,512,054 UART: Running Caliptra FMC ...
18,513,163 UART:
18,513,318 UART: [state] CFI Enabled
18,521,185 UART: [fht] FMC Alias Private Key: 7
20,277,759 UART: [art] Extend RT PCRs Done
20,278,973 UART: [art] Lock RT PCRs Done
20,280,348 UART: [art] Populate DV Done
20,285,806 UART: [fht] FMC Alias Private Key: 7
20,287,446 UART: [art] Derive CDI
20,288,254 UART: [art] Store in in slot 0x4
20,331,110 UART: [art] Derive Key Pair
20,332,104 UART: [art] Store priv key in slot 0x5
22,759,416 UART: [art] Derive Key Pair - Done
22,772,572 UART: [art] Signing Cert with AUTHO
22,773,868 UART: RITY.KEYID = 7
24,479,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,854 UART: [art] PUB.X = DCEF0D362B4F64EB719BDB433C640499BD0636F830512BD9DD1A2CAC9E00466440694CF347E9DD113B26268589812694
24,488,132 UART: [art] PUB.Y = 262ECD45A2CA31A357879B71EF7D38D0A5DF279901975DD0058914FE4DF1275D0184B0522F03609759D79410394A5BE5
24,495,357 UART: [art] SIG.R = 76EFD425E3BC3756B5C705EE576820C0A00C6EB66406261E987E05C013F06643CDCC892E881512599B86485E539380EA
24,502,755 UART: [art] SIG.S = 22AF9605D8A7013883068DF9C43B00A582390899CD16D10F832797E9A87557E083E882F7F57C005B33544AC0AA8D5ECD
25,481,086 UART: mbox::rt_entry...
25,482,061 UART: ____ _ _ _ ____ _____
25,484,054 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,486,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,487,907 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,489,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,491,664 UART: |_|
25,492,664 UART:
25,606,238 UART: [rt] Runtime listening for mailbox commands...
25,612,084 >>> mbox cmd response data (3272 bytes)
25,627,775 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,661,415 >>> mbox cmd response data (0 bytes)
27,720,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,865,127 UART:
27,865,492 UART: Running Caliptra ROM ...
27,866,630 UART:
27,866,796 UART: [state] CFI Enabled
27,880,807 UART: [state] LifecycleState = Unprovisioned
27,882,676 UART: [state] DebugLocked = No
27,884,173 UART: [state] WD Timer not started. Device not locked for debugging
27,889,277 UART: [kat] SHA2-256
28,079,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,089,907 UART: [kat] ++
28,090,421 UART: [kat] sha1
28,102,546 UART: [kat] SHA2-256
28,105,585 UART: [kat] SHA2-384
28,113,250 UART: [kat] SHA2-512-ACC
28,115,855 UART: [kat] ECC-384
30,559,108 UART: [kat] HMAC-384Kdf
30,572,311 UART: [kat] LMS
31,103,908 UART: [kat] --
31,109,482 UART: [update-reset] ++
34,565,666 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,569,412 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,177,659 >>> mbox cmd response: success
35,182,279 UART: [update-reset] Copying MAN_2 To MAN_1
35,216,884 UART: [update-reset Success] --
35,221,439 UART: [state] Locking Datavault
35,224,432 UART: [state] Locking PCR0, PCR1 and PCR31
35,226,580 UART: [state] Locking ICCM
35,228,785 UART: [exit] Launching FMC @ 0x40000130
35,237,419 UART:
35,237,722 UART: Running Caliptra FMC ...
35,238,806 UART:
35,238,951 UART: [state] CFI Enabled
35,283,178 UART: [art] Extend RT PCRs Done
35,284,320 UART: [art] Lock RT PCRs Done
35,285,953 UART: [art] Populate DV Done
35,291,291 UART: [fht] FMC Alias Private Key: 7
35,292,818 UART: [art] Derive CDI
35,293,541 UART: [art] Store in in slot 0x4
35,336,491 UART: [art] Derive Key Pair
35,337,536 UART: [art] Store priv key in slot 0x5
37,763,923 UART: [art] Derive Key Pair - Done
37,776,978 UART: [art] Signing Cert with AUTHO
37,778,285 UART: RITY.KEYID = 7
39,483,670 UART: [art] Erasing AUTHORITY.KEYID = 7
39,485,176 UART: [art] PUB.X = 3BE0D94339620BA08B5B960C941FD364414969359BC015B4BA1B129F7AD7E45D2DF717DAD1C285CB6BC6F6B45372485F
39,492,450 UART: [art] PUB.Y = 68B089101BF7202F8BF6B27753483272AF08458078D0CFDC68B7F82E4979A61263DAEE0B64553752FC8034F9304BFB5E
39,499,672 UART: [art] SIG.R = 75135C4013351F102D3B7F67F2989BCB121CA995F4929274F4F99FA41A7AC29B86C3F834B1091269AD36C14FF8EE1931
39,507,028 UART: [art] SIG.S = 1EBECF6F8476FA07C13B94E8901F8C8122FD54B84F7C0B888EA3C2CD8C888651C2B166A0B038E8D1F796820861FF0AE6
40,485,701 UART: Caliptra RT
40,486,397 UART: [state] CFI Enabled
43,258,454 UART: Disable attest DPE used context limit breach
43,260,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,261,459 UART: [rt] RT listening for mailbox commands...
43,292,456 UART: [rt]cmd =0x494e464f, len=4
43,296,562 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,752,851 ready_for_fw is high
3,753,260 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,190,810 >>> mbox cmd response: success
14,191,387 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,447,831 UART:
18,448,218 UART: Running Caliptra FMC ...
18,449,399 UART:
18,449,555 UART: [state] CFI Enabled
18,457,221 UART: [fht] FMC Alias Private Key: 7
20,214,271 UART: [art] Extend RT PCRs Done
20,215,499 UART: [art] Lock RT PCRs Done
20,217,128 UART: [art] Populate DV Done
20,222,373 UART: [fht] FMC Alias Private Key: 7
20,223,959 UART: [art] Derive CDI
20,224,790 UART: [art] Store in in slot 0x4
20,267,326 UART: [art] Derive Key Pair
20,268,321 UART: [art] Store priv key in slot 0x5
22,694,891 UART: [art] Derive Key Pair - Done
22,707,672 UART: [art] Signing Cert with AUTHO
22,708,980 UART: RITY.KEYID = 7
24,414,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,330 UART: [art] PUB.X = DCFE05598143C276FB6F5B284278AB703358D84DABC9AD51FA1380A3E8799A11A728052592B2707EE26B7520040F327E
24,423,625 UART: [art] PUB.Y = 59D534D1623382133A8A24D5E8D21A18BF5B8D638288873BD9315827A7ABBDEC6E04D71980233372B559F052F0F1CF45
24,430,840 UART: [art] SIG.R = CDA8248197FAC29A3A797FCAE4DE652642A47355D7F80E07F845778A812DFB3E98A8342CBA8615BF0AF7C167E7645719
24,438,258 UART: [art] SIG.S = 4B89EE7420AAC0A2D7302093ED41EAAA5BC936FBA5BE3820FA5A8884AEB0AF9ECA139FB8926625BD80D4C059D600194A
25,416,892 UART: mbox::rt_entry...
25,417,856 UART: ____ _ _ _ ____ _____
25,419,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,421,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,423,796 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,425,764 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,427,637 UART: |_|
25,428,430 UART:
25,542,089 UART: [rt] Runtime listening for mailbox commands...
25,547,945 >>> mbox cmd response data (3272 bytes)
25,563,840 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,597,245 >>> mbox cmd response data (0 bytes)
27,656,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,388,567 >>> mbox cmd response: success
35,424,095 UART:
35,424,443 UART: Running Caliptra FMC ...
35,425,568 UART:
35,425,754 UART: [state] CFI Enabled
35,469,714 UART: [art] Extend RT PCRs Done
35,470,863 UART: [art] Lock RT PCRs Done
35,472,197 UART: [art] Populate DV Done
35,477,660 UART: [fht] FMC Alias Private Key: 7
35,479,238 UART: [art] Derive CDI
35,480,052 UART: [art] Store in in slot 0x4
35,523,128 UART: [art] Derive Key Pair
35,524,121 UART: [art] Store priv key in slot 0x5
37,950,767 UART: [art] Derive Key Pair - Done
37,963,598 UART: [art] Signing Cert with AUTHO
37,964,928 UART: RITY.KEYID = 7
39,670,775 UART: [art] Erasing AUTHORITY.KEYID = 7
39,672,251 UART: [art] PUB.X = B97ED066D1D9A66C7BA66900C93F877FCA5B197112237202F9A11F2C92712923F46F818B0BCFE3A0D685FD5E994C1CA0
39,679,513 UART: [art] PUB.Y = F2098B8B7D6A37FAF867480782EA8BE8C73F0ED145816DFDF2FAE999B797A6553C5C2034F7063B64B8705E15F05A5F2B
39,686,763 UART: [art] SIG.R = 6B36B4CD502936ED6DA9E96FE87427B379DC64B23249485E514CB9BE5A5D143E7E6BB0C2047DFDBF8C764ADC8B706118
39,694,198 UART: [art] SIG.S = 754E640A939A7120FEDA8F263A933C30FA7D5741BA4622BFE226FAE0E79775EC04445FE522657722C2D49C9A38F60F2B
40,673,577 UART: Caliptra RT
40,674,424 UART: [state] CFI Enabled
43,444,445 UART: Disable attest DPE used context limit breach
43,446,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,447,199 UART: [rt] RT listening for mailbox commands...
43,478,580 UART: [rt]cmd =0x494e464f, len=4
43,482,728 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,702 UART: [kat] HMAC-384Kdf
907,404 UART: [kat] LMS
1,475,600 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,362 UART: [idev] ++
1,479,530 UART: [idev] CDI.KEYID = 6
1,479,890 UART: [idev] SUBJECT.KEYID = 7
1,480,314 UART: [idev] UDS.KEYID = 0
1,480,659 ready_for_fw is high
1,480,659 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,442 UART: [idev] Erasing UDS.KEYID = 0
1,505,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,521,647 UART: [ldev] Erasing FE.KEYID = 1
1,547,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,240 UART: [ldev] --
1,586,539 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 78704 bytes
2,477,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,127 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,948 >>> mbox cmd response: success
2,616,948 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,980 UART: [afmc] ++
2,618,148 UART: [afmc] CDI.KEYID = 6
2,618,510 UART: [afmc] SUBJECT.KEYID = 7
2,618,935 UART: [afmc] AUTHORITY.KEYID = 5
2,653,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,569 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,259 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,206 UART: [afmc] --
2,697,300 UART: [cold-reset] --
2,698,038 UART: [state] Locking Datavault
2,699,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,683 UART: [state] Locking ICCM
2,700,163 UART: [exit] Launching FMC @ 0x40000130
2,705,492 UART:
2,705,508 UART: Running Caliptra FMC ...
2,705,916 UART:
2,705,970 UART: [state] CFI Enabled
2,716,355 UART: [fht] FMC Alias Private Key: 7
2,823,702 UART: [art] Extend RT PCRs Done
2,824,130 UART: [art] Lock RT PCRs Done
2,825,726 UART: [art] Populate DV Done
2,833,755 UART: [fht] FMC Alias Private Key: 7
2,834,709 UART: [art] Derive CDI
2,834,989 UART: [art] Store in in slot 0x4
2,920,638 UART: [art] Derive Key Pair
2,920,998 UART: [art] Store priv key in slot 0x5
2,934,932 UART: [art] Derive Key Pair - Done
2,949,583 UART: [art] Signing Cert with AUTHO
2,950,063 UART: RITY.KEYID = 7
2,965,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,274 UART: [art] PUB.X = 5D922611F7CA3890361ECF608BD41D9E9B53AA2F1561D1D11129D7499B2B1B6B5F7468A5E377F0629CC6DF10BE037A23
2,973,045 UART: [art] PUB.Y = 5127D6614355BCD93248F06DC77EA13A6806FC36ED4EB88E0DA5BF93F055FB665F40DA7858A0C9B5CFD318533061E006
2,979,992 UART: [art] SIG.R = A12754788329371A804A1C68E3A06B19C117B66ED1B826559D0A11023F7A2EA5FE5DD3789590DE7BD686C3A722B843B6
2,986,754 UART: [art] SIG.S = 6CD11AEA9C18EF885820AE4A176F801CABCAA0E9ED0FA06E8296B48FA7145FF32F4D6CCE8890FD0743C53A211FBCF78D
3,010,859 UART: mbox::rt_entry...
3,011,231 UART: ____ _ _ _ ____ _____
3,012,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,119 UART: |_|
3,015,431 UART:
3,122,273 UART: [rt] Runtime listening for mailbox commands...
3,127,241 >>> mbox cmd response data (3272 bytes)
3,127,242 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,328 >>> mbox cmd response data (0 bytes)
3,150,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,449 UART:
3,150,465 UART: Running Caliptra ROM ...
3,150,873 UART:
3,150,927 UART: [state] CFI Enabled
3,153,887 UART: [state] LifecycleState = Unprovisioned
3,154,542 UART: [state] DebugLocked = No
3,155,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,681 UART: [kat] SHA2-256
3,950,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,727 UART: [kat] ++
3,954,879 UART: [kat] sha1
3,959,215 UART: [kat] SHA2-256
3,961,153 UART: [kat] SHA2-384
3,964,022 UART: [kat] SHA2-512-ACC
3,965,922 UART: [kat] ECC-384
3,971,517 UART: [kat] HMAC-384Kdf
3,976,279 UART: [kat] LMS
4,544,475 UART: [kat] --
4,545,236 UART: [update-reset] ++
5,881,543 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,723 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,032,773 >>> mbox cmd response: success
6,032,980 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,994 UART: [update-reset Success] --
6,041,735 UART: [state] Locking Datavault
6,042,685 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,289 UART: [state] Locking ICCM
6,043,861 UART: [exit] Launching FMC @ 0x40000130
6,049,190 UART:
6,049,206 UART: Running Caliptra FMC ...
6,049,614 UART:
6,049,668 UART: [state] CFI Enabled
6,138,919 UART: [art] Extend RT PCRs Done
6,139,347 UART: [art] Lock RT PCRs Done
6,140,474 UART: [art] Populate DV Done
6,148,619 UART: [fht] FMC Alias Private Key: 7
6,149,685 UART: [art] Derive CDI
6,149,965 UART: [art] Store in in slot 0x4
6,235,352 UART: [art] Derive Key Pair
6,235,712 UART: [art] Store priv key in slot 0x5
6,248,410 UART: [art] Derive Key Pair - Done
6,263,011 UART: [art] Signing Cert with AUTHO
6,263,491 UART: RITY.KEYID = 7
6,278,917 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,682 UART: [art] PUB.X = 7CB2BC5F36357A9D56D838FAB49BD20459E9E83195EDA464C8E4745758AF7114854B17CA11363E5FE0DA8D99E3BEB5AF
6,286,461 UART: [art] PUB.Y = FD8A3D5FFD3191B2D1C57614382365DBF7C2D61E57F8B100882B4FDD8D9A7407110F6FD307166F93926EF50754104297
6,293,375 UART: [art] SIG.R = 1EC0FD104C8259EC79979791B2C637E4A66938AB4F6A51185C1C5CBB22709F4B1A10619E135776D6A9FC4AD92CA0088E
6,300,146 UART: [art] SIG.S = EB7762847884B26ECA9415D41F9B447652ED8F4423A8F49224538F30D363813F95CF6FA679AC232EE6D5774B6B76A09B
6,324,087 UART: Caliptra RT
6,324,340 UART: [state] CFI Enabled
6,619,727 UART: Disable attest DPE used context limit breach
6,620,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,621,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,866 UART: [rt]cmd =0x494e464f, len=4
6,655,051 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 ready_for_fw is high
1,362,377 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,256 >>> mbox cmd response: success
2,465,256 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,624 UART:
2,526,640 UART: Running Caliptra FMC ...
2,527,048 UART:
2,527,102 UART: [state] CFI Enabled
2,537,617 UART: [fht] FMC Alias Private Key: 7
2,645,258 UART: [art] Extend RT PCRs Done
2,645,686 UART: [art] Lock RT PCRs Done
2,647,200 UART: [art] Populate DV Done
2,655,455 UART: [fht] FMC Alias Private Key: 7
2,656,429 UART: [art] Derive CDI
2,656,709 UART: [art] Store in in slot 0x4
2,742,548 UART: [art] Derive Key Pair
2,742,908 UART: [art] Store priv key in slot 0x5
2,756,032 UART: [art] Derive Key Pair - Done
2,770,882 UART: [art] Signing Cert with AUTHO
2,771,362 UART: RITY.KEYID = 7
2,786,590 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,355 UART: [art] PUB.X = F8B44F6409E76D6E8D358B1174ED48D32C33A337F92FC4062EB626B3EB8E92EEB93DB4A58FCA1FB62F4EEDE65E5F4061
2,794,137 UART: [art] PUB.Y = B9B5CCAECD0274A57C0DCADB7014E441A0A681A100BDA41769895E8718A98F3A644E97D90BB9F5EA133C096963BEFB28
2,801,067 UART: [art] SIG.R = CCA7AFD06C9E68F04EC434E03998A0FC5AE7486FC12B74BEC33D158B258958C7A55E992950633D639BD825075F3F3CD7
2,807,842 UART: [art] SIG.S = A65E7499C34198D577A3B27B058ACBBC02A604D6593A2A23908609EEA567537EC47A37282456F75A03C09BFA47368305
2,831,745 UART: mbox::rt_entry...
2,832,117 UART: ____ _ _ _ ____ _____
2,832,901 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,701 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,469 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,237 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,005 UART: |_|
2,836,317 UART:
2,943,260 UART: [rt] Runtime listening for mailbox commands...
2,948,228 >>> mbox cmd response data (3272 bytes)
2,948,229 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,315 >>> mbox cmd response data (0 bytes)
2,971,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,733,616 >>> mbox cmd response: success
5,747,221 UART:
5,747,237 UART: Running Caliptra FMC ...
5,747,645 UART:
5,747,699 UART: [state] CFI Enabled
5,836,752 UART: [art] Extend RT PCRs Done
5,837,180 UART: [art] Lock RT PCRs Done
5,838,341 UART: [art] Populate DV Done
5,846,614 UART: [fht] FMC Alias Private Key: 7
5,847,710 UART: [art] Derive CDI
5,847,990 UART: [art] Store in in slot 0x4
5,933,255 UART: [art] Derive Key Pair
5,933,615 UART: [art] Store priv key in slot 0x5
5,946,643 UART: [art] Derive Key Pair - Done
5,961,360 UART: [art] Signing Cert with AUTHO
5,961,840 UART: RITY.KEYID = 7
5,976,890 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,655 UART: [art] PUB.X = F4F80C06A2873959FECABE5518B83ED1107D1F2B49723A7C73CF044872FCA8B2BF36E0A335F480FD4EA86F64A9EF832E
5,984,430 UART: [art] PUB.Y = 80436CD62BB3BF2AF9B225E3E39C326C5CE11EB5BD0D70B044B7FC113F72A2985A3AC09A093B3EF988C43BEA8E9D5623
5,991,390 UART: [art] SIG.R = CA2C6B9270C7992A862595810483C8764752520AECCC8C22253542F3BF9645EAC30E5DACCD08F7460C3DD6C73182C67B
5,998,147 UART: [art] SIG.S = FC806B5FDF5380F1643F4082E5BE1493AF0DA823EB0A8B4D609410320DF24725AA552760D7749DE45F1FA8D6154A5A30
6,021,971 UART: Caliptra RT
6,022,224 UART: [state] CFI Enabled
6,314,104 UART: Disable attest DPE used context limit breach
6,314,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,316,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,346,861 UART: [rt]cmd =0x494e464f, len=4
6,350,200 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,342 UART: [kat] SHA2-256
892,280 UART: [kat] SHA2-384
894,985 UART: [kat] SHA2-512-ACC
896,886 UART: [kat] ECC-384
902,489 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,298 UART: [cold-reset] ++
1,476,684 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,521,966 UART: [ldev] Erasing FE.KEYID = 1
1,547,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,307 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,667 UART: [fwproc] Received command 0x46574c44
1,588,458 UART: [fwproc] Received Image of size 78704 bytes
2,479,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,507,282 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,619,061 >>> mbox cmd response: success
2,619,061 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,620,237 UART: [afmc] ++
2,620,405 UART: [afmc] CDI.KEYID = 6
2,620,767 UART: [afmc] SUBJECT.KEYID = 7
2,621,192 UART: [afmc] AUTHORITY.KEYID = 5
2,656,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,673,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,679,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,685,100 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,790 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,621 UART: [afmc] --
2,699,565 UART: [cold-reset] --
2,700,581 UART: [state] Locking Datavault
2,701,746 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,350 UART: [state] Locking ICCM
2,702,954 UART: [exit] Launching FMC @ 0x40000130
2,708,283 UART:
2,708,299 UART: Running Caliptra FMC ...
2,708,707 UART:
2,708,850 UART: [state] CFI Enabled
2,719,523 UART: [fht] FMC Alias Private Key: 7
2,827,396 UART: [art] Extend RT PCRs Done
2,827,824 UART: [art] Lock RT PCRs Done
2,829,450 UART: [art] Populate DV Done
2,837,791 UART: [fht] FMC Alias Private Key: 7
2,838,927 UART: [art] Derive CDI
2,839,207 UART: [art] Store in in slot 0x4
2,925,176 UART: [art] Derive Key Pair
2,925,536 UART: [art] Store priv key in slot 0x5
2,938,822 UART: [art] Derive Key Pair - Done
2,953,342 UART: [art] Signing Cert with AUTHO
2,953,822 UART: RITY.KEYID = 7
2,968,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,731 UART: [art] PUB.X = B3CEE9C6B9C4E6321363D85C12AD274DA4D9463CA5D185DC943CD13DB8AD2D83FBBA65003D3C8D0B6BBD6EF97E2AD2AA
2,976,504 UART: [art] PUB.Y = 2A12450D5F9941C6266AB81A44768E4D8F9D66FEE8B548C1627C271FF5BFC79687342387D3D26BF594B6473DAD05376E
2,983,448 UART: [art] SIG.R = 28AE6989E2CA90DE0467F87B1FE6E9BE6ECC0DA688B624B3FEBDEA4D26D30798029DF18D1B2B721D50BF03738352FBFE
2,990,223 UART: [art] SIG.S = 41C43CF008C1BB4F1BAC6B0A115339F131145184C120BA2FEBA42F90D4B101E6C8C383DF992935E399CA977A0909E2AB
3,013,661 UART: mbox::rt_entry...
3,014,033 UART: ____ _ _ _ ____ _____
3,014,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,617 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,385 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,921 UART: |_|
3,018,233 UART:
3,125,844 UART: [rt] Runtime listening for mailbox commands...
3,130,812 >>> mbox cmd response data (3272 bytes)
3,130,813 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,153,899 >>> mbox cmd response data (0 bytes)
3,153,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,154,020 UART:
3,154,036 UART: Running Caliptra ROM ...
3,154,444 UART:
3,154,585 UART: [state] CFI Enabled
3,157,671 UART: [state] LifecycleState = Unprovisioned
3,158,326 UART: [state] DebugLocked = No
3,158,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,160,469 UART: [kat] SHA2-256
3,954,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,958,515 UART: [kat] ++
3,958,667 UART: [kat] sha1
3,962,947 UART: [kat] SHA2-256
3,964,885 UART: [kat] SHA2-384
3,967,778 UART: [kat] SHA2-512-ACC
3,969,678 UART: [kat] ECC-384
3,975,295 UART: [kat] HMAC-384Kdf
3,980,121 UART: [kat] LMS
4,548,317 UART: [kat] --
4,549,158 UART: [update-reset] ++
5,886,221 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,887,463 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,037,513 >>> mbox cmd response: success
6,037,834 UART: [update-reset] Copying MAN_2 To MAN_1
6,045,848 UART: [update-reset Success] --
6,047,029 UART: [state] Locking Datavault
6,047,599 UART: [state] Locking PCR0, PCR1 and PCR31
6,048,203 UART: [state] Locking ICCM
6,048,833 UART: [exit] Launching FMC @ 0x40000130
6,054,162 UART:
6,054,178 UART: Running Caliptra FMC ...
6,054,586 UART:
6,054,729 UART: [state] CFI Enabled
6,143,720 UART: [art] Extend RT PCRs Done
6,144,148 UART: [art] Lock RT PCRs Done
6,145,745 UART: [art] Populate DV Done
6,154,210 UART: [fht] FMC Alias Private Key: 7
6,155,370 UART: [art] Derive CDI
6,155,650 UART: [art] Store in in slot 0x4
6,241,729 UART: [art] Derive Key Pair
6,242,089 UART: [art] Store priv key in slot 0x5
6,255,147 UART: [art] Derive Key Pair - Done
6,270,198 UART: [art] Signing Cert with AUTHO
6,270,678 UART: RITY.KEYID = 7
6,285,732 UART: [art] Erasing AUTHORITY.KEYID = 7
6,286,497 UART: [art] PUB.X = 0AE375056E553FC8B455B1141B0FCADFAFB2EC4639C8F95AF58F5060D108F3721A608AC6F6F808E4D28589A5D7E7DAD9
6,293,266 UART: [art] PUB.Y = D6E7F3D0F4DA0751B9AC23175C9EF956677FA1FA27758949EC89620AD93D6C3526982EB0F86EB25DF7B619C6DACECBE6
6,300,226 UART: [art] SIG.R = 7377C898BCCE9123A1361D9202BF5D95C3B033F9733725FF200671AD79FD7304065F1FEE620BD134D706EB68F6DE2B37
6,306,980 UART: [art] SIG.S = 48B9D47078EEBA407194BB4149BA7E283F355006690960440866511A9E0BC1D2652F313673F3EC0402E1329E53DE5C90
6,330,853 UART: Caliptra RT
6,331,198 UART: [state] CFI Enabled
6,624,962 UART: Disable attest DPE used context limit breach
6,625,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,626,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,657,491 UART: [rt]cmd =0x494e464f, len=4
6,660,798 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,940 ready_for_fw is high
1,363,940 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,691 >>> mbox cmd response: success
2,468,691 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,969 UART:
2,529,985 UART: Running Caliptra FMC ...
2,530,393 UART:
2,530,536 UART: [state] CFI Enabled
2,541,427 UART: [fht] FMC Alias Private Key: 7
2,649,828 UART: [art] Extend RT PCRs Done
2,650,256 UART: [art] Lock RT PCRs Done
2,651,612 UART: [art] Populate DV Done
2,659,555 UART: [fht] FMC Alias Private Key: 7
2,660,659 UART: [art] Derive CDI
2,660,939 UART: [art] Store in in slot 0x4
2,746,294 UART: [art] Derive Key Pair
2,746,654 UART: [art] Store priv key in slot 0x5
2,759,710 UART: [art] Derive Key Pair - Done
2,774,279 UART: [art] Signing Cert with AUTHO
2,774,759 UART: RITY.KEYID = 7
2,790,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,862 UART: [art] PUB.X = 09BB51B019869A3D6990C63CE1533CD12C248132160A47F0E588559E31A02425D7813762AFA8A55FA18455F09F8C8EF1
2,797,620 UART: [art] PUB.Y = 2581898F194D392F96F6ACE98C39EA624CEA483E2923052008DC82C31CACCD06CC2600B5A08139D066C1512F8CDFF1FB
2,804,547 UART: [art] SIG.R = 70CAA6CBD1B339B68C507ADE737ABC8B92EBFC6595E5CF3AA022B5B93F03A4921104BA74DC220C82801BA5929205119F
2,811,317 UART: [art] SIG.S = 525397A54A6AEAB6463BB51D03C2554B51D829C054D813BD3300406804C99207A223204CDD7F89A8E32293C39DC57921
2,834,905 UART: mbox::rt_entry...
2,835,277 UART: ____ _ _ _ ____ _____
2,836,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,165 UART: |_|
2,839,477 UART:
2,946,426 UART: [rt] Runtime listening for mailbox commands...
2,951,394 >>> mbox cmd response data (3272 bytes)
2,951,395 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,974,481 >>> mbox cmd response data (0 bytes)
2,974,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,739,103 >>> mbox cmd response: success
5,752,636 UART:
5,752,652 UART: Running Caliptra FMC ...
5,753,060 UART:
5,753,203 UART: [state] CFI Enabled
5,842,344 UART: [art] Extend RT PCRs Done
5,842,772 UART: [art] Lock RT PCRs Done
5,844,259 UART: [art] Populate DV Done
5,852,328 UART: [fht] FMC Alias Private Key: 7
5,853,436 UART: [art] Derive CDI
5,853,716 UART: [art] Store in in slot 0x4
5,939,529 UART: [art] Derive Key Pair
5,939,889 UART: [art] Store priv key in slot 0x5
5,953,869 UART: [art] Derive Key Pair - Done
5,968,874 UART: [art] Signing Cert with AUTHO
5,969,354 UART: RITY.KEYID = 7
5,984,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,985,305 UART: [art] PUB.X = E39DFBEEE2BD20E809BBB22E428814BE1A57DCEF14A1FF7FCDAFDA4037A131DCA25FF75EFFBFBACF896E7D03F8BAC23E
5,992,113 UART: [art] PUB.Y = 2C654A933EC8F4706393CCD5B2221CCEFA5322FB8C1B0954E8E269C08B06FDFDAAA942A4C16CD86F03246F4EDBB558CF
5,999,074 UART: [art] SIG.R = 4EC64C73FAE3960A512C0B6A494BCEB9D2656CFCEC7CD44F462943CE8F82A93D1B3761C1167F26D225B2B4F0701EC844
6,005,850 UART: [art] SIG.S = 6BC33FE1F92B102F6820FA15F5404CFDA61F66F6F0307958229BF7AC2D16B962256D13CA3A37675F27B9C8EA284F5251
6,029,289 UART: Caliptra RT
6,029,634 UART: [state] CFI Enabled
6,318,138 UART: Disable attest DPE used context limit breach
6,318,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,320,247 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,350,657 UART: [rt]cmd =0x494e464f, len=4
6,353,994 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,588 UART: [kat] HMAC-384Kdf
923,188 UART: [kat] LMS
1,171,516 UART: [kat] --
1,172,647 UART: [cold-reset] ++
1,173,067 UART: [fht] FHT @ 0x50003400
1,175,544 UART: [idev] ++
1,175,712 UART: [idev] CDI.KEYID = 6
1,176,072 UART: [idev] SUBJECT.KEYID = 7
1,176,496 UART: [idev] UDS.KEYID = 0
1,176,841 ready_for_fw is high
1,176,841 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,418 UART: [idev] Erasing UDS.KEYID = 0
1,201,167 UART: [idev] Sha1 KeyId Algorithm
1,209,815 UART: [idev] --
1,210,765 UART: [ldev] ++
1,210,933 UART: [ldev] CDI.KEYID = 6
1,211,296 UART: [ldev] SUBJECT.KEYID = 5
1,211,722 UART: [ldev] AUTHORITY.KEYID = 7
1,212,185 UART: [ldev] FE.KEYID = 1
1,217,385 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,986 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,410 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,689 >>> mbox cmd response: success
2,312,689 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,791 UART: [afmc] ++
2,313,959 UART: [afmc] CDI.KEYID = 6
2,314,321 UART: [afmc] SUBJECT.KEYID = 7
2,314,746 UART: [afmc] AUTHORITY.KEYID = 5
2,349,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,046 UART: [afmc] --
2,392,938 UART: [cold-reset] --
2,393,582 UART: [state] Locking Datavault
2,394,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,113 UART: [state] Locking ICCM
2,395,671 UART: [exit] Launching FMC @ 0x40000130
2,401,000 UART:
2,401,016 UART: Running Caliptra FMC ...
2,401,424 UART:
2,401,478 UART: [state] CFI Enabled
2,411,943 UART: [fht] FMC Alias Private Key: 7
2,519,932 UART: [art] Extend RT PCRs Done
2,520,360 UART: [art] Lock RT PCRs Done
2,521,882 UART: [art] Populate DV Done
2,529,975 UART: [fht] FMC Alias Private Key: 7
2,530,971 UART: [art] Derive CDI
2,531,251 UART: [art] Store in in slot 0x4
2,617,194 UART: [art] Derive Key Pair
2,617,554 UART: [art] Store priv key in slot 0x5
2,630,592 UART: [art] Derive Key Pair - Done
2,645,340 UART: [art] Signing Cert with AUTHO
2,645,820 UART: RITY.KEYID = 7
2,660,842 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,607 UART: [art] PUB.X = 18A86F139BE3614DEB84CDECB0B019B7A38FAAB6704D1F83BC1F27A5038962BACAAEF9E82B62F44E14E5A753C500F6E8
2,668,372 UART: [art] PUB.Y = 0B91F3D2A8961CB7DE2AF1469C6DDBCB4485DFF9B688BB0905A2EFD921129F780E0D1049B74F7009C8934DB268D0D055
2,675,314 UART: [art] SIG.R = B1B513798E3347B333152BE69293ED2B0E860BFE5D4C4CCF42EF3C3B7B2D9A68676E1DE19A50AB21675B115D5ED2ECA1
2,682,092 UART: [art] SIG.S = 1ADB7C2AF881E29B506C0974005FD01A63DAB493396619F504FDBFBB0F2A2CF37C2A36775D0CEA1409E5564F39422F51
2,705,570 UART: mbox::rt_entry...
2,705,942 UART: ____ _ _ _ ____ _____
2,706,726 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,062 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,830 UART: |_|
2,710,142 UART:
2,816,356 UART: [rt] Runtime listening for mailbox commands...
2,821,324 >>> mbox cmd response data (3272 bytes)
2,821,325 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,411 >>> mbox cmd response data (0 bytes)
2,844,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,844,529 UART:
2,844,545 UART: Running Caliptra ROM ...
2,844,953 UART:
2,845,008 UART: [state] CFI Enabled
2,848,092 UART: [state] LifecycleState = Unprovisioned
2,848,747 UART: [state] DebugLocked = No
2,849,235 UART: [state] WD Timer not started. Device not locked for debugging
2,850,515 UART: [kat] SHA2-256
3,656,165 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,660,290 UART: [kat] ++
3,660,442 UART: [kat] sha1
3,664,620 UART: [kat] SHA2-256
3,666,560 UART: [kat] SHA2-384
3,669,171 UART: [kat] SHA2-512-ACC
3,671,071 UART: [kat] ECC-384
3,680,644 UART: [kat] HMAC-384Kdf
3,685,298 UART: [kat] LMS
3,933,626 UART: [kat] --
3,934,542 UART: [update-reset] ++
5,247,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,249,002 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,399,000 >>> mbox cmd response: success
5,399,103 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,117 UART: [update-reset Success] --
5,408,202 UART: [state] Locking Datavault
5,409,028 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,632 UART: [state] Locking ICCM
5,410,212 UART: [exit] Launching FMC @ 0x40000130
5,415,541 UART:
5,415,557 UART: Running Caliptra FMC ...
5,415,965 UART:
5,416,019 UART: [state] CFI Enabled
5,505,052 UART: [art] Extend RT PCRs Done
5,505,480 UART: [art] Lock RT PCRs Done
5,506,685 UART: [art] Populate DV Done
5,515,052 UART: [fht] FMC Alias Private Key: 7
5,516,044 UART: [art] Derive CDI
5,516,324 UART: [art] Store in in slot 0x4
5,602,263 UART: [art] Derive Key Pair
5,602,623 UART: [art] Store priv key in slot 0x5
5,615,771 UART: [art] Derive Key Pair - Done
5,630,721 UART: [art] Signing Cert with AUTHO
5,631,201 UART: RITY.KEYID = 7
5,646,451 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,216 UART: [art] PUB.X = 433260D775C876B3A47394E45ADCCC653BBFDD5839E8737514C055BBDB075C9AA5FA211C37DDDD6F6C325F5D755CD2F4
5,653,997 UART: [art] PUB.Y = 2A3F293AB796ECB288F3287515A99D8C26C33A9589994C0A87A77C34DBAFFDAD7C403ED0B61D52AA300B12C0E8E03B08
5,660,950 UART: [art] SIG.R = 15F8D90B65DC9DE8C1873E23648A017E390986F8EE7CBC23D6F976C6554030961CA5459E373BE1A48490C43CBA8B6CC9
5,667,715 UART: [art] SIG.S = 0EEBE49150299564DC8A99E2A0BE5990DAACA33A59DCCBD5227BA7AB0172108ABD4D324C80135D076274E241EC64FF30
5,692,325 UART: Caliptra RT
5,692,578 UART: [state] CFI Enabled
5,986,051 UART: Disable attest DPE used context limit breach
5,986,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,988,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,018,338 UART: [rt]cmd =0x494e464f, len=4
6,021,793 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,654 >>> mbox cmd response: success
2,165,654 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,227,394 UART:
2,227,410 UART: Running Caliptra FMC ...
2,227,818 UART:
2,227,872 UART: [state] CFI Enabled
2,238,487 UART: [fht] FMC Alias Private Key: 7
2,346,000 UART: [art] Extend RT PCRs Done
2,346,428 UART: [art] Lock RT PCRs Done
2,348,028 UART: [art] Populate DV Done
2,356,371 UART: [fht] FMC Alias Private Key: 7
2,357,329 UART: [art] Derive CDI
2,357,609 UART: [art] Store in in slot 0x4
2,443,654 UART: [art] Derive Key Pair
2,444,014 UART: [art] Store priv key in slot 0x5
2,456,922 UART: [art] Derive Key Pair - Done
2,471,731 UART: [art] Signing Cert with AUTHO
2,472,211 UART: RITY.KEYID = 7
2,487,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,090 UART: [art] PUB.X = 513E5C6F694A820F5DE7A9AD7B32022B171469929F9E168B98D3B305A1965DEE76FFD54962F31285C15B5B47232AD367
2,494,849 UART: [art] PUB.Y = 46EC65FA516F3E7E1CB4B65A8E978D2B050B805C69FA283A89E4428E9C792FC1FDC57F46F617B7AF13A20805C3EC0782
2,501,794 UART: [art] SIG.R = 60812AFAF492BDFF84E27556CA3FF7A5FD32CC70A8573C7808757447ABC4C9514823DA424539603426A4C568B588371A
2,508,559 UART: [art] SIG.S = C53453ECBD96F0D0ACF0C9DBEC0869F0A54472D5F872FAB862554D69F03D9D0B3BDFE60FD34E52B51C403A0961AEA2DC
2,531,936 UART: mbox::rt_entry...
2,532,308 UART: ____ _ _ _ ____ _____
2,533,092 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,892 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,660 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,428 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,196 UART: |_|
2,536,508 UART:
2,643,418 UART: [rt] Runtime listening for mailbox commands...
2,648,386 >>> mbox cmd response data (3272 bytes)
2,648,387 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,473 >>> mbox cmd response data (0 bytes)
2,671,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,111,245 >>> mbox cmd response: success
5,124,705 UART:
5,124,721 UART: Running Caliptra FMC ...
5,125,129 UART:
5,125,183 UART: [state] CFI Enabled
5,213,960 UART: [art] Extend RT PCRs Done
5,214,388 UART: [art] Lock RT PCRs Done
5,215,455 UART: [art] Populate DV Done
5,223,716 UART: [fht] FMC Alias Private Key: 7
5,224,772 UART: [art] Derive CDI
5,225,052 UART: [art] Store in in slot 0x4
5,310,923 UART: [art] Derive Key Pair
5,311,283 UART: [art] Store priv key in slot 0x5
5,324,413 UART: [art] Derive Key Pair - Done
5,339,149 UART: [art] Signing Cert with AUTHO
5,339,629 UART: RITY.KEYID = 7
5,354,561 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,326 UART: [art] PUB.X = 4CE3FAB5E4506B16B90757AC8CCBA7F81DB01D854ADB857B18C14FC4D330384ABFB6B32D0B07B99809702A17D68B8A01
5,362,095 UART: [art] PUB.Y = 321108D9A0B0CB79988D84D43815E563EC1C3D25021D2C571D36CE0EEF6760617ABF89CB56E85EF9FBE3C11A5D1FD051
5,369,046 UART: [art] SIG.R = D9A07E2C9B817B066E1602DA1157F4106236B41035C1ABA71B7047D9A7986AD559950939FB7FB80C8B5DDD00EF13CBC6
5,375,788 UART: [art] SIG.S = 54250EFDFD9634EE1921C6510BF774DBD463E263FCA9DA2832CF40A280DAFDF9C200A405A2A49E64EB9D6A2FCAFAF7A6
5,400,208 UART: Caliptra RT
5,400,461 UART: [state] CFI Enabled
5,692,048 UART: Disable attest DPE used context limit breach
5,692,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,694,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,751 UART: [rt]cmd =0x494e464f, len=4
5,728,108 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,402 UART: [cold-reset] ++
1,172,980 UART: [fht] FHT @ 0x50003400
1,175,557 UART: [idev] ++
1,175,725 UART: [idev] CDI.KEYID = 6
1,176,085 UART: [idev] SUBJECT.KEYID = 7
1,176,509 UART: [idev] UDS.KEYID = 0
1,176,854 ready_for_fw is high
1,176,854 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,201,712 UART: [idev] Sha1 KeyId Algorithm
1,210,192 UART: [idev] --
1,211,320 UART: [ldev] ++
1,211,488 UART: [ldev] CDI.KEYID = 6
1,211,851 UART: [ldev] SUBJECT.KEYID = 5
1,212,277 UART: [ldev] AUTHORITY.KEYID = 7
1,212,740 UART: [ldev] FE.KEYID = 1
1,217,852 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,248 UART: [ldev] --
1,283,547 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,859 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,136 >>> mbox cmd response: success
2,314,136 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,202 UART: [afmc] ++
2,315,370 UART: [afmc] CDI.KEYID = 6
2,315,732 UART: [afmc] SUBJECT.KEYID = 7
2,316,157 UART: [afmc] AUTHORITY.KEYID = 5
2,351,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,485 UART: [afmc] --
2,394,443 UART: [cold-reset] --
2,395,367 UART: [state] Locking Datavault
2,396,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,228 UART: [state] Locking ICCM
2,397,900 UART: [exit] Launching FMC @ 0x40000130
2,403,229 UART:
2,403,245 UART: Running Caliptra FMC ...
2,403,653 UART:
2,403,796 UART: [state] CFI Enabled
2,414,351 UART: [fht] FMC Alias Private Key: 7
2,522,554 UART: [art] Extend RT PCRs Done
2,522,982 UART: [art] Lock RT PCRs Done
2,524,374 UART: [art] Populate DV Done
2,532,667 UART: [fht] FMC Alias Private Key: 7
2,533,745 UART: [art] Derive CDI
2,534,025 UART: [art] Store in in slot 0x4
2,619,816 UART: [art] Derive Key Pair
2,620,176 UART: [art] Store priv key in slot 0x5
2,633,504 UART: [art] Derive Key Pair - Done
2,648,080 UART: [art] Signing Cert with AUTHO
2,648,560 UART: RITY.KEYID = 7
2,663,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,725 UART: [art] PUB.X = F2BB3B6ADD30A36EDFB84FEB99AB496F3455AAD4FF5B382591683D3BD856A9B55B6502568226EB40725D561C67206991
2,671,498 UART: [art] PUB.Y = 1D4654B4ECE129FB88BEFD33CB231279F8F7E87EDE6C0A9933882EFB3A60E5EDD2F3CFFA2C5DB63D5AE898227F8120A0
2,678,467 UART: [art] SIG.R = 81AD3195F6A502FD6DDEF83244E7F42DFB6D2D232E120E641FC4E3C3BA5FB7DA3808CA9504119CE0B5D26CBB6160D43A
2,685,243 UART: [art] SIG.S = 227B3F850940E65F7BAA09CB816AD250B99CD300962208D8CA82EBBD8662DAB67CBF4F855564D0D31280EF895ED22FB7
2,709,059 UART: mbox::rt_entry...
2,709,431 UART: ____ _ _ _ ____ _____
2,710,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,319 UART: |_|
2,713,631 UART:
2,820,643 UART: [rt] Runtime listening for mailbox commands...
2,825,611 >>> mbox cmd response data (3272 bytes)
2,825,612 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,698 >>> mbox cmd response data (0 bytes)
2,848,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,816 UART:
2,848,832 UART: Running Caliptra ROM ...
2,849,240 UART:
2,849,382 UART: [state] CFI Enabled
2,852,178 UART: [state] LifecycleState = Unprovisioned
2,852,833 UART: [state] DebugLocked = No
2,853,495 UART: [state] WD Timer not started. Device not locked for debugging
2,854,765 UART: [kat] SHA2-256
3,660,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,540 UART: [kat] ++
3,664,692 UART: [kat] sha1
3,668,868 UART: [kat] SHA2-256
3,670,808 UART: [kat] SHA2-384
3,673,499 UART: [kat] SHA2-512-ACC
3,675,399 UART: [kat] ECC-384
3,685,060 UART: [kat] HMAC-384Kdf
3,689,690 UART: [kat] LMS
3,938,018 UART: [kat] --
3,938,910 UART: [update-reset] ++
5,252,729 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,253,796 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,403,794 >>> mbox cmd response: success
5,404,007 UART: [update-reset] Copying MAN_2 To MAN_1
5,412,021 UART: [update-reset Success] --
5,412,966 UART: [state] Locking Datavault
5,413,754 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,358 UART: [state] Locking ICCM
5,414,980 UART: [exit] Launching FMC @ 0x40000130
5,420,309 UART:
5,420,325 UART: Running Caliptra FMC ...
5,420,733 UART:
5,420,876 UART: [state] CFI Enabled
5,510,007 UART: [art] Extend RT PCRs Done
5,510,435 UART: [art] Lock RT PCRs Done
5,511,562 UART: [art] Populate DV Done
5,519,757 UART: [fht] FMC Alias Private Key: 7
5,520,743 UART: [art] Derive CDI
5,521,023 UART: [art] Store in in slot 0x4
5,606,606 UART: [art] Derive Key Pair
5,606,966 UART: [art] Store priv key in slot 0x5
5,620,376 UART: [art] Derive Key Pair - Done
5,635,014 UART: [art] Signing Cert with AUTHO
5,635,494 UART: RITY.KEYID = 7
5,650,630 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,395 UART: [art] PUB.X = 41798C1BA045FF402B082A9B85EF3F9BEB0EE14F857E85C27E3726589746936862BA5FE9AD7B1D3AFF038F13BFCE8978
5,658,166 UART: [art] PUB.Y = 9786BAD79F60FB47C9452D549C21D5063A5809C733495DFF4576C3D5B7F5772373C9E8021ABE34B83CFB7E8D1362ECB1
5,665,111 UART: [art] SIG.R = F249BBC4EC2DC7C95FE50B3210A317DDB527AC435080C741F335822DEE2FD06469BBDE9321A221ED8926C2DB61CF53EE
5,671,894 UART: [art] SIG.S = 7DD7117EF26932721DAC8041DD657E7BE08F33E6F944BD5DE33C94DB0018023AA9B7B39626E8A54E87B0EBBA10D94763
5,696,004 UART: Caliptra RT
5,696,349 UART: [state] CFI Enabled
5,987,900 UART: Disable attest DPE used context limit breach
5,988,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,989,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,020,347 UART: [rt]cmd =0x494e464f, len=4
6,023,742 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,996 ready_for_fw is high
1,060,996 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,465 >>> mbox cmd response: success
2,164,465 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,867 UART:
2,226,883 UART: Running Caliptra FMC ...
2,227,291 UART:
2,227,434 UART: [state] CFI Enabled
2,238,123 UART: [fht] FMC Alias Private Key: 7
2,346,050 UART: [art] Extend RT PCRs Done
2,346,478 UART: [art] Lock RT PCRs Done
2,348,058 UART: [art] Populate DV Done
2,356,223 UART: [fht] FMC Alias Private Key: 7
2,357,307 UART: [art] Derive CDI
2,357,587 UART: [art] Store in in slot 0x4
2,443,048 UART: [art] Derive Key Pair
2,443,408 UART: [art] Store priv key in slot 0x5
2,456,702 UART: [art] Derive Key Pair - Done
2,471,177 UART: [art] Signing Cert with AUTHO
2,471,657 UART: RITY.KEYID = 7
2,487,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,908 UART: [art] PUB.X = 6B8F86DF2CF6EE58EA72C257B5BCF1D6ACD91FDB2D69B82AFE4FB7DAFA5C80D655F168FCCAE8038E272A133E1CCCA9D3
2,494,711 UART: [art] PUB.Y = EF77CA53CC8013335BE61630129E3C932345D2147635C1FE0912B419F99585663DAE1221220894E72EB89B28798A36B6
2,501,643 UART: [art] SIG.R = 92DA09F11DFC17E66BD3EAEB4C99C24CBD4C4FF3B3FDDEE0E655937AE6A9DFCC569445F71C5CBA1386EF0E0874BE2384
2,508,432 UART: [art] SIG.S = 87CAA51CF677257826469CFB9B18FFA1BE99574CDA5A766F361AE59FDC67828C26DA4F5F099F846ACE2502540C72A1E1
2,531,976 UART: mbox::rt_entry...
2,532,348 UART: ____ _ _ _ ____ _____
2,533,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,236 UART: |_|
2,536,548 UART:
2,643,275 UART: [rt] Runtime listening for mailbox commands...
2,648,243 >>> mbox cmd response data (3272 bytes)
2,648,244 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,330 >>> mbox cmd response data (0 bytes)
2,671,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,109,255 >>> mbox cmd response: success
5,122,937 UART:
5,122,953 UART: Running Caliptra FMC ...
5,123,361 UART:
5,123,504 UART: [state] CFI Enabled
5,212,757 UART: [art] Extend RT PCRs Done
5,213,185 UART: [art] Lock RT PCRs Done
5,214,524 UART: [art] Populate DV Done
5,222,611 UART: [fht] FMC Alias Private Key: 7
5,223,693 UART: [art] Derive CDI
5,223,973 UART: [art] Store in in slot 0x4
5,309,634 UART: [art] Derive Key Pair
5,309,994 UART: [art] Store priv key in slot 0x5
5,323,402 UART: [art] Derive Key Pair - Done
5,337,934 UART: [art] Signing Cert with AUTHO
5,338,414 UART: RITY.KEYID = 7
5,353,554 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,319 UART: [art] PUB.X = 26DEEDF9FAA9E26AAA13DB9AEDA353872E30239E020C49B7AFEC63D22BBFBC6559B580A3FB13791BFC26CBF8CD4A3EC5
5,361,115 UART: [art] PUB.Y = 7016F3FAF6ADEDC51B33C7E6F9D8C5D805C0798F54CEDEA8119CD06723347437475A6ED85013E7EA575D010E37FCBF5D
5,368,070 UART: [art] SIG.R = ED898999AA2D1B1BBAA5AD539C2886C640BA754CF50CE93BE52DAFCCB02A6A42C4B7A2817AD8E5CE2E9070593AEC837F
5,374,861 UART: [art] SIG.S = A5DBC6C3205593908DF669D8B03646305A229D94641CC1DE0DDF85436B26A5FF4C407546A8622BBF2EBF64990C81F9AD
5,398,422 UART: Caliptra RT
5,398,767 UART: [state] CFI Enabled
5,690,595 UART: Disable attest DPE used context limit breach
5,691,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,692,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,450 UART: [rt]cmd =0x494e464f, len=4
5,726,769 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,355 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,271 UART: [idev] ++
1,173,439 UART: [idev] CDI.KEYID = 6
1,173,800 UART: [idev] SUBJECT.KEYID = 7
1,174,225 UART: [idev] UDS.KEYID = 0
1,174,571 ready_for_fw is high
1,174,571 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,661 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,618 UART: [fwproc] Wait for Commands...
1,281,337 UART: [fwproc] Recv command 0x46574c44
1,282,070 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,343 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,679 >>> mbox cmd response: success
2,311,679 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,740 UART: [afmc] ++
2,312,908 UART: [afmc] CDI.KEYID = 6
2,313,271 UART: [afmc] SUBJECT.KEYID = 7
2,313,697 UART: [afmc] AUTHORITY.KEYID = 5
2,349,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,833 UART: [afmc] --
2,392,739 UART: [cold-reset] --
2,393,421 UART: [state] Locking Datavault
2,394,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,206 UART: [state] Locking ICCM
2,395,730 UART: [exit] Launching FMC @ 0x40000130
2,401,059 UART:
2,401,075 UART: Running Caliptra FMC ...
2,401,483 UART:
2,401,537 UART: [state] CFI Enabled
2,411,976 UART: [fht] FMC Alias Private Key: 7
2,520,139 UART: [art] Extend RT PCRs Done
2,520,567 UART: [art] Lock RT PCRs Done
2,522,103 UART: [art] Populate DV Done
2,530,678 UART: [fht] FMC Alias Private Key: 7
2,531,704 UART: [art] Derive CDI
2,531,984 UART: [art] Store in in slot 0x4
2,617,461 UART: [art] Derive Key Pair
2,617,821 UART: [art] Store priv key in slot 0x5
2,631,139 UART: [art] Derive Key Pair - Done
2,646,001 UART: [art] Signing Cert with AUTHO
2,646,481 UART: RITY.KEYID = 7
2,661,863 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,628 UART: [art] PUB.X = 696263A91DC238804E5DE3518A3F6F16FFF5F54822032D073A8D28C503A77BC041901A6FCEA01E500D9CB72EE0F9D750
2,669,390 UART: [art] PUB.Y = 7782E40EF6308E9AC1507F77CE389D348E2E533033F6384E5DD8A098E14AAB977086C281F1ED406DBEEF591AD13B917D
2,676,343 UART: [art] SIG.R = 85020F6AA1A2F0ED0ECA0F236B7EA0B977F31863DADABC982CD0E6329B55DBF9E04C3DFF3895BBEF3056CC75B73A8BA2
2,683,127 UART: [art] SIG.S = 9FBCEF07CFEA430D975358394A03FCB8D4CBDB6BFD087706A6D273CD4B346FBB62EB1D25162A0AB5607A7F027ED98868
2,706,223 UART: mbox::rt_entry...
2,706,595 UART: ____ _ _ _ ____ _____
2,707,379 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,179 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,947 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,483 UART: |_|
2,710,795 UART:
2,816,938 UART: [rt] Runtime listening for mailbox commands...
2,821,906 >>> mbox cmd response data (3272 bytes)
2,821,907 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,993 >>> mbox cmd response data (0 bytes)
2,844,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,111 UART:
2,845,127 UART: Running Caliptra ROM ...
2,845,535 UART:
2,845,590 UART: [state] CFI Enabled
2,848,100 UART: [state] LifecycleState = Unprovisioned
2,848,755 UART: [state] DebugLocked = No
2,849,267 UART: [state] WD Timer not started. Device not locked for debugging
2,850,479 UART: [kat] SHA2-256
3,654,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,158 UART: [kat] ++
3,658,310 UART: [kat] sha1
3,662,396 UART: [kat] SHA2-256
3,664,336 UART: [kat] SHA2-384
3,666,941 UART: [kat] SHA2-512-ACC
3,668,841 UART: [kat] ECC-384
3,678,552 UART: [kat] HMAC-384Kdf
3,683,272 UART: [kat] LMS
3,931,584 UART: [kat] --
3,932,534 UART: [update-reset] ++
5,247,342 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,533 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,531 >>> mbox cmd response: success
5,398,888 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,902 UART: [update-reset Success] --
5,407,889 UART: [state] Locking Datavault
5,408,635 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,239 UART: [state] Locking ICCM
5,409,893 UART: [exit] Launching FMC @ 0x40000130
5,415,222 UART:
5,415,238 UART: Running Caliptra FMC ...
5,415,646 UART:
5,415,700 UART: [state] CFI Enabled
5,504,837 UART: [art] Extend RT PCRs Done
5,505,265 UART: [art] Lock RT PCRs Done
5,506,402 UART: [art] Populate DV Done
5,514,431 UART: [fht] FMC Alias Private Key: 7
5,515,471 UART: [art] Derive CDI
5,515,751 UART: [art] Store in in slot 0x4
5,601,228 UART: [art] Derive Key Pair
5,601,588 UART: [art] Store priv key in slot 0x5
5,614,900 UART: [art] Derive Key Pair - Done
5,629,593 UART: [art] Signing Cert with AUTHO
5,630,073 UART: RITY.KEYID = 7
5,645,231 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,996 UART: [art] PUB.X = 9949BB183D499A23A7503F8110FDE7AAB434864A0F88EC605E54EAB98B5121418B0C32B4BAE54A07916D163B650CB916
5,652,756 UART: [art] PUB.Y = 7A8539E6981AAB7172B9BEDA037D2837AF6CA6C276B473390BB3F47F7092A9AF7CD1EB92277C2CCB6D98C49BE9883FDA
5,659,716 UART: [art] SIG.R = AC80EA027DEF24963E0AE43C8CC211F3CD8F08BAD83FBCAF6A1A46BF14F075ACB2C207A203A7F130FD3024E964B74E52
5,666,493 UART: [art] SIG.S = B647B2794D2EDA13270F1C0E0B135E6FCCBF30FB389D658CB7007A5A9F29E4A8C1DB5F77CE4C9CB5D416F294CA6FB1B6
5,689,977 UART: Caliptra RT
5,690,230 UART: [state] CFI Enabled
5,988,750 UART: Disable attest DPE used context limit breach
5,989,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,990,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,099 UART: [rt]cmd =0x494e464f, len=4
6,024,412 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,490 ready_for_fw is high
1,055,490 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,893 >>> mbox cmd response: success
2,160,893 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,181 UART:
2,223,197 UART: Running Caliptra FMC ...
2,223,605 UART:
2,223,659 UART: [state] CFI Enabled
2,234,208 UART: [fht] FMC Alias Private Key: 7
2,342,189 UART: [art] Extend RT PCRs Done
2,342,617 UART: [art] Lock RT PCRs Done
2,343,919 UART: [art] Populate DV Done
2,352,218 UART: [fht] FMC Alias Private Key: 7
2,353,192 UART: [art] Derive CDI
2,353,472 UART: [art] Store in in slot 0x4
2,439,049 UART: [art] Derive Key Pair
2,439,409 UART: [art] Store priv key in slot 0x5
2,453,003 UART: [art] Derive Key Pair - Done
2,467,536 UART: [art] Signing Cert with AUTHO
2,468,016 UART: RITY.KEYID = 7
2,483,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,909 UART: [art] PUB.X = 675D528FBB84A4645180D2F3F5D6FF69E598F138DB64C5DBFF6D99022510A51957607BEA3F99083DD67253D5545D13DF
2,490,675 UART: [art] PUB.Y = 4140066FC3012A0AD37003095ABC3E53B49D92F1B2EBCFEF462E2DAA9DD8DD56BCBC38A6E91943AC04167FDF7E567E0F
2,497,624 UART: [art] SIG.R = FF3FE718500F206F10AC09A165C8B8E20EA8E05C9D10404B89B2BC85AD4548655BB829B15520C99A75077A276DA5061F
2,504,381 UART: [art] SIG.S = D01EA9ED88C010544CFF1AF439C3671EC6558EA6A7D80029AC9A8E8BE7D56F28525E14FCE8C4AA140E10C403331F7D56
2,527,980 UART: mbox::rt_entry...
2,528,352 UART: ____ _ _ _ ____ _____
2,529,136 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,936 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,704 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,472 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,240 UART: |_|
2,532,552 UART:
2,639,435 UART: [rt] Runtime listening for mailbox commands...
2,644,403 >>> mbox cmd response data (3272 bytes)
2,644,404 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,490 >>> mbox cmd response data (0 bytes)
2,667,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,102,453 >>> mbox cmd response: success
5,115,887 UART:
5,115,903 UART: Running Caliptra FMC ...
5,116,311 UART:
5,116,365 UART: [state] CFI Enabled
5,205,026 UART: [art] Extend RT PCRs Done
5,205,454 UART: [art] Lock RT PCRs Done
5,206,587 UART: [art] Populate DV Done
5,214,754 UART: [fht] FMC Alias Private Key: 7
5,215,708 UART: [art] Derive CDI
5,215,988 UART: [art] Store in in slot 0x4
5,301,859 UART: [art] Derive Key Pair
5,302,219 UART: [art] Store priv key in slot 0x5
5,315,451 UART: [art] Derive Key Pair - Done
5,330,022 UART: [art] Signing Cert with AUTHO
5,330,502 UART: RITY.KEYID = 7
5,345,576 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,341 UART: [art] PUB.X = 570C4BF232EEDF25C73F031B96BEC933591A17D5D279515E6005322CBE911BEEBBF8B3016EA1EA3E014C257E3EF6E280
5,353,108 UART: [art] PUB.Y = 38D39793ABC1584F01B8DA7A9ADA935E8C51A104AAAD1081D095C095B5B2173D23042FCC18E571EB995133548CE53E75
5,360,053 UART: [art] SIG.R = 028C78520DBCC31BBB2187C6FE6E329F3132C6C2D70FA20E0C4162102468F1294F0A0D523C36E3085B5901A78140A1D5
5,366,794 UART: [art] SIG.S = EBEB2E1346936B19BD8195315DA89FF21BB450A00BED1E44DD762F98E7B0573A1FC6BD782EC597421042C779286676DE
5,391,112 UART: Caliptra RT
5,391,365 UART: [state] CFI Enabled
5,679,808 UART: Disable attest DPE used context limit breach
5,680,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,681,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,712,423 UART: [rt]cmd =0x494e464f, len=4
5,715,572 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,356 UART: [kat] SHA2-256
902,296 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,174,838 ready_for_fw is high
1,174,838 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,521 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,696 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,978 >>> mbox cmd response: success
2,311,978 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,133 UART: [afmc] ++
2,313,301 UART: [afmc] CDI.KEYID = 6
2,313,664 UART: [afmc] SUBJECT.KEYID = 7
2,314,090 UART: [afmc] AUTHORITY.KEYID = 5
2,350,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,294 UART: [afmc] --
2,393,280 UART: [cold-reset] --
2,394,232 UART: [state] Locking Datavault
2,395,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,093 UART: [state] Locking ICCM
2,396,755 UART: [exit] Launching FMC @ 0x40000130
2,402,084 UART:
2,402,100 UART: Running Caliptra FMC ...
2,402,508 UART:
2,402,651 UART: [state] CFI Enabled
2,413,306 UART: [fht] FMC Alias Private Key: 7
2,521,121 UART: [art] Extend RT PCRs Done
2,521,549 UART: [art] Lock RT PCRs Done
2,523,113 UART: [art] Populate DV Done
2,531,390 UART: [fht] FMC Alias Private Key: 7
2,532,552 UART: [art] Derive CDI
2,532,832 UART: [art] Store in in slot 0x4
2,618,507 UART: [art] Derive Key Pair
2,618,867 UART: [art] Store priv key in slot 0x5
2,632,345 UART: [art] Derive Key Pair - Done
2,647,303 UART: [art] Signing Cert with AUTHO
2,647,783 UART: RITY.KEYID = 7
2,663,113 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,878 UART: [art] PUB.X = B8FEF7721A6C4321065CDE46C5791B3F54CCBF975BB268CED00CD3E264FC9C0A008E086FB2F07919A11C17D12D8FE6EB
2,670,632 UART: [art] PUB.Y = D6EF2C0BBC90F0BED396B57C209E0C700328A6858784BAD7934A49A20DED34AC005F8C41014A6F21CF9E21502BF04905
2,677,550 UART: [art] SIG.R = C8EB599A672E668CA1BF79F1163B0B6723F835A8812AE5FD2EA1D54ACFB7E66C0C82C88345E8BD293CA47CC04934907C
2,684,326 UART: [art] SIG.S = C253D48ADF91805C808BE0484388DDBBEAFC14A13E41E012431D4F2A9261BC83237A34169968956F3D6620C13F0D9505
2,708,179 UART: mbox::rt_entry...
2,708,551 UART: ____ _ _ _ ____ _____
2,709,335 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,135 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,903 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,671 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,439 UART: |_|
2,712,751 UART:
2,818,880 UART: [rt] Runtime listening for mailbox commands...
2,823,848 >>> mbox cmd response data (3272 bytes)
2,823,849 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,935 >>> mbox cmd response data (0 bytes)
2,846,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,053 UART:
2,847,069 UART: Running Caliptra ROM ...
2,847,477 UART:
2,847,619 UART: [state] CFI Enabled
2,850,487 UART: [state] LifecycleState = Unprovisioned
2,851,142 UART: [state] DebugLocked = No
2,851,748 UART: [state] WD Timer not started. Device not locked for debugging
2,853,100 UART: [kat] SHA2-256
3,656,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,779 UART: [kat] ++
3,660,931 UART: [kat] sha1
3,665,095 UART: [kat] SHA2-256
3,667,035 UART: [kat] SHA2-384
3,669,590 UART: [kat] SHA2-512-ACC
3,671,490 UART: [kat] ECC-384
3,681,415 UART: [kat] HMAC-384Kdf
3,686,085 UART: [kat] LMS
3,934,397 UART: [kat] --
3,935,399 UART: [update-reset] ++
5,248,585 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,249,606 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,399,604 >>> mbox cmd response: success
5,399,855 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,869 UART: [update-reset Success] --
5,408,668 UART: [state] Locking Datavault
5,409,440 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,044 UART: [state] Locking ICCM
5,410,528 UART: [exit] Launching FMC @ 0x40000130
5,415,857 UART:
5,415,873 UART: Running Caliptra FMC ...
5,416,281 UART:
5,416,424 UART: [state] CFI Enabled
5,505,561 UART: [art] Extend RT PCRs Done
5,505,989 UART: [art] Lock RT PCRs Done
5,507,456 UART: [art] Populate DV Done
5,515,621 UART: [fht] FMC Alias Private Key: 7
5,516,663 UART: [art] Derive CDI
5,516,943 UART: [art] Store in in slot 0x4
5,602,644 UART: [art] Derive Key Pair
5,603,004 UART: [art] Store priv key in slot 0x5
5,616,266 UART: [art] Derive Key Pair - Done
5,631,133 UART: [art] Signing Cert with AUTHO
5,631,613 UART: RITY.KEYID = 7
5,647,625 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,390 UART: [art] PUB.X = 1DD7DD43B954B628A88D06BA737408E5597378DCC272F69DBC4DE7F5FF6A5CA450C5505C17F4C3CD90A78F390D9F40E0
5,655,163 UART: [art] PUB.Y = 344A00F38E21F462EEC62515867E1D3E5101C2060292CEB857D15FE0C770FA1227BCC8F432D4374AC8D883486CCE9DD5
5,662,086 UART: [art] SIG.R = 03F691BFBA67D11F297A3F2C86BC203E79AE071EBADBD1557F52166ECEEDBD5C38C1301455C8ABF6E6378039CC537FAA
5,668,870 UART: [art] SIG.S = 95CCC74C6D21EBAC59048859995A25A02804C8D9FC43714A176311EDCFFF0EFE0807983A21615D61530B8E17F8D9B442
5,693,007 UART: Caliptra RT
5,693,352 UART: [state] CFI Enabled
5,986,243 UART: Disable attest DPE used context limit breach
5,986,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,988,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,028 UART: [rt]cmd =0x494e464f, len=4
6,022,469 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,905 ready_for_fw is high
1,055,905 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,962 >>> mbox cmd response: success
2,161,962 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,732 UART:
2,224,748 UART: Running Caliptra FMC ...
2,225,156 UART:
2,225,299 UART: [state] CFI Enabled
2,235,696 UART: [fht] FMC Alias Private Key: 7
2,343,509 UART: [art] Extend RT PCRs Done
2,343,937 UART: [art] Lock RT PCRs Done
2,345,629 UART: [art] Populate DV Done
2,353,942 UART: [fht] FMC Alias Private Key: 7
2,354,958 UART: [art] Derive CDI
2,355,238 UART: [art] Store in in slot 0x4
2,440,835 UART: [art] Derive Key Pair
2,441,195 UART: [art] Store priv key in slot 0x5
2,454,527 UART: [art] Derive Key Pair - Done
2,469,554 UART: [art] Signing Cert with AUTHO
2,470,034 UART: RITY.KEYID = 7
2,485,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,191 UART: [art] PUB.X = 09DA53A8537F1C9FAA0EA42DDE62A090135E974D966496563519739AFCC9DE8D863F36BB2AE60B6AAD6FAEA2CA549AC8
2,492,970 UART: [art] PUB.Y = 9FBBAF3E79920868E6242BE5C13A5C0D124E70842F4202679DAA21B05B2FEA67E05CA0250E84839E4AC3BD4E7547A2B5
2,499,916 UART: [art] SIG.R = B08F8220A35251BFC636A60AA732ADE37F1A95BDB7BD88357AF78303E28D3B8C572A095F9C1CA5E367E2576D00FD8E53
2,506,665 UART: [art] SIG.S = F283E7CFAD74A075211EF6917DC76143A6C9CBE44EDAB9A62393F1787ABE8415E9D281FCD1BE508D6ED48C50EC9EF105
2,529,771 UART: mbox::rt_entry...
2,530,143 UART: ____ _ _ _ ____ _____
2,530,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,727 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,495 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,263 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,031 UART: |_|
2,534,343 UART:
2,640,578 UART: [rt] Runtime listening for mailbox commands...
2,645,546 >>> mbox cmd response data (3272 bytes)
2,645,547 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,633 >>> mbox cmd response data (0 bytes)
2,668,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,102,217 >>> mbox cmd response: success
5,115,513 UART:
5,115,529 UART: Running Caliptra FMC ...
5,115,937 UART:
5,116,080 UART: [state] CFI Enabled
5,204,997 UART: [art] Extend RT PCRs Done
5,205,425 UART: [art] Lock RT PCRs Done
5,206,792 UART: [art] Populate DV Done
5,214,755 UART: [fht] FMC Alias Private Key: 7
5,215,855 UART: [art] Derive CDI
5,216,135 UART: [art] Store in in slot 0x4
5,302,022 UART: [art] Derive Key Pair
5,302,382 UART: [art] Store priv key in slot 0x5
5,315,574 UART: [art] Derive Key Pair - Done
5,330,069 UART: [art] Signing Cert with AUTHO
5,330,549 UART: RITY.KEYID = 7
5,345,825 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,590 UART: [art] PUB.X = 1AC987A023040E564C72B0F0DDF7FB592DFC0D2501315589E7C8ACCA820CE2ABB40DF91E99CDC9A96A4D38FA8EEEDD94
5,353,366 UART: [art] PUB.Y = 69AD75EEA0D88A07965BC0D93AB713F299F287635B66EA08338019C6A3B7A1B0CD10DD0E6FE78929E6521875DAD3D134
5,360,313 UART: [art] SIG.R = 262367D8FA458F60B3EAE4D4A9F9F13F80E4A1A57CC3760AE170593043838A954BB8AF5794C940FCCB635503733D1D92
5,367,079 UART: [art] SIG.S = 4B30757208DAA28C8A90E1D0288C589D61B6BDA4C6B569C16786199AB65057B0D535463CEBEF2115442A9A9172884708
5,390,782 UART: Caliptra RT
5,391,127 UART: [state] CFI Enabled
5,685,148 UART: Disable attest DPE used context limit breach
5,685,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,019 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,487 UART: [rt]cmd =0x494e464f, len=4
5,720,856 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,146 UART:
192,601 UART: Running Caliptra ROM ...
193,726 UART:
193,873 UART: [state] CFI Enabled
261,770 UART: [state] LifecycleState = Unprovisioned
263,755 UART: [state] DebugLocked = No
265,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,799 UART: [kat] SHA2-256
440,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,000 UART: [kat] ++
451,543 UART: [kat] sha1
461,644 UART: [kat] SHA2-256
464,364 UART: [kat] SHA2-384
469,222 UART: [kat] SHA2-512-ACC
471,562 UART: [kat] ECC-384
2,766,695 UART: [kat] HMAC-384Kdf
2,778,396 UART: [kat] LMS
3,968,706 UART: [kat] --
3,974,231 UART: [cold-reset] ++
3,976,110 UART: [fht] Storing FHT @ 0x50003400
3,988,570 UART: [idev] ++
3,989,187 UART: [idev] CDI.KEYID = 6
3,990,115 UART: [idev] SUBJECT.KEYID = 7
3,991,363 UART: [idev] UDS.KEYID = 0
3,992,483 ready_for_fw is high
3,992,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,222 UART: [idev] Erasing UDS.KEYID = 0
7,329,374 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,287 UART: [idev] --
7,354,722 UART: [ldev] ++
7,355,302 UART: [ldev] CDI.KEYID = 6
7,356,241 UART: [ldev] SUBJECT.KEYID = 5
7,357,453 UART: [ldev] AUTHORITY.KEYID = 7
7,358,758 UART: [ldev] FE.KEYID = 1
7,401,355 UART: [ldev] Erasing FE.KEYID = 1
10,737,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,218 UART: [ldev] --
13,116,689 UART: [fwproc] Waiting for Commands...
13,119,923 UART: [fwproc] Received command 0x46574c44
13,122,107 UART: [fwproc] Received Image of size 114124 bytes
17,172,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,025 >>> mbox cmd response: success
17,641,139 UART: [afmc] ++
17,641,762 UART: [afmc] CDI.KEYID = 6
17,642,650 UART: [afmc] SUBJECT.KEYID = 7
17,643,867 UART: [afmc] AUTHORITY.KEYID = 5
21,003,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,719 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,113 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,969 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,449 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,634 UART: [afmc] --
23,377,904 UART: [cold-reset] --
23,379,820 UART: [state] Locking Datavault
23,385,985 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,780 UART: [state] Locking ICCM
23,389,048 UART: [exit] Launching FMC @ 0x40000130
23,397,448 UART:
23,397,708 UART: Running Caliptra FMC ...
23,398,813 UART:
23,398,982 UART: [state] CFI Enabled
23,467,593 UART: [fht] FMC Alias Private Key: 7
25,805,079 UART: [art] Extend RT PCRs Done
25,806,313 UART: [art] Lock RT PCRs Done
25,808,347 UART: [art] Populate DV Done
25,813,603 UART: [fht] FMC Alias Private Key: 7
25,815,248 UART: [art] Derive CDI
25,816,068 UART: [art] Store in in slot 0x4
25,876,963 UART: [art] Derive Key Pair
25,878,028 UART: [art] Store priv key in slot 0x5
29,170,742 UART: [art] Derive Key Pair - Done
29,183,577 UART: [art] Signing Cert with AUTHO
29,184,891 UART: RITY.KEYID = 7
31,472,242 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,767 UART: [art] PUB.X = 9BE0DAFAC1AAB5BB94E4DDBC475242B0C8BA181F77DACEB20BC85B2915E04F6CE94892EF0265320D160BFF48187087D7
31,480,977 UART: [art] PUB.Y = 0AA3187CC80F1969211BD525DC05348479EAF5A4B42581180091A7272A8437027E42A4512839C5738A3B12583DABBCA9
31,488,228 UART: [art] SIG.R = B5DB2CEF0ABDFEB4DE61B269D3C71D2F35F68AF353EE240F870623A6B291AE1C0D9C9BCBA8783F809684CE26EA6DD1D4
31,495,623 UART: [art] SIG.S = 241C725D6AB716FBDFEDEB905A2ECF11167806430650C1351009A2CA95593BA113495A45247D6A7412870F05806DD4FE
32,800,917 UART: Caliptra RT
32,801,632 UART: [state] CFI Enabled
32,963,238 UART: [rt] RT listening for mailbox commands...
32,965,560 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,995,368 UART: [rt]cmd =0x50435252, len=8
32,997,079 >>> mbox cmd response data (8 bytes)
35,122,839 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,223,568 UART:
35,223,945 UART: Running Caliptra ROM ...
35,225,002 UART:
35,225,160 UART: [state] CFI Enabled
35,292,860 UART: [state] LifecycleState = Unprovisioned
35,294,793 UART: [state] DebugLocked = No
35,296,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,302,441 UART: [kat] SHA2-256
35,472,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,482,625 UART: [kat] ++
35,483,164 UART: [kat] sha1
35,493,954 UART: [kat] SHA2-256
35,496,643 UART: [kat] SHA2-384
35,502,192 UART: [kat] SHA2-512-ACC
35,504,594 UART: [kat] ECC-384
37,794,300 UART: [kat] HMAC-384Kdf
37,824,520 UART: [kat] LMS
39,014,880 UART: [kat] --
39,020,352 UART: [update-reset] ++
42,736,910 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,740,791 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,999,232 >>> mbox cmd response: success
42,999,622 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,000,130 UART: [update-reset] Copying MAN_2 To MAN_1
43,022,578 UART: [update-reset Success] --
43,028,813 UART: [state] Locking Datavault
43,032,707 UART: [state] Locking PCR0, PCR1 and PCR31
43,034,417 UART: [state] Locking ICCM
43,036,632 UART: [exit] Launching FMC @ 0x40000130
43,045,040 UART:
43,045,286 UART: Running Caliptra FMC ...
43,046,398 UART:
43,046,564 UART: [state] CFI Enabled
43,148,399 UART: [art] Extend RT PCRs Done
43,149,581 UART: [art] Lock RT PCRs Done
43,150,764 UART: [art] Populate DV Done
43,156,273 UART: [fht] FMC Alias Private Key: 7
43,158,017 UART: [art] Derive CDI
43,158,837 UART: [art] Store in in slot 0x4
43,217,963 UART: [art] Derive Key Pair
43,218,992 UART: [art] Store priv key in slot 0x5
46,512,131 UART: [art] Derive Key Pair - Done
46,524,969 UART: [art] Signing Cert with AUTHO
46,526,273 UART: RITY.KEYID = 7
48,813,930 UART: [art] Erasing AUTHORITY.KEYID = 7
48,815,439 UART: [art] PUB.X = 05F7AD644F77BBD34F8C1672CA6584EE4486AF6E633179272259FA1CFF680577D37123F404B6383F4D9FA03064547A5D
48,822,699 UART: [art] PUB.Y = FE28EA26FAEE7F8436F4E14C254621D743593A66B1F25D6A83FC6E75E1BC3E419DDE9F89FDD92973FD47EE75903FB822
48,829,947 UART: [art] SIG.R = E6DEF78DD9C9D3C07449149FD9E95D44324FF95DAB6BD139CD2105456C7911A98AF4EB0D6A2E3E3846A5ED5997AB0A73
48,837,287 UART: [art] SIG.S = 3B9658D6637AD875698924D3D239017142FC6DBD18805EF21C88F8B488E8F42E80DA6AB6964ABD54273F702D5A8D51D5
50,142,026 UART: mbox::rt_entry...
50,142,990 UART: ____ _ _ _ ____ _____
50,144,974 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,147,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,149,118 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,151,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,152,980 UART: |_|
50,153,786 UART:
50,439,250 UART: [rt] Runtime listening for mailbox commands...
50,441,260 >>> mbox cmd response data (128 bytes)
52,570,242 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,670,189 UART:
52,670,565 UART: Running Caliptra ROM ...
52,671,618 UART:
52,671,773 UART: [state] CFI Enabled
52,736,918 UART: [state] LifecycleState = Unprovisioned
52,738,862 UART: [state] DebugLocked = No
52,740,875 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,745,944 UART: [kat] SHA2-256
52,915,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,926,098 UART: [kat] ++
52,926,596 UART: [kat] sha1
52,936,622 UART: [kat] SHA2-256
52,939,330 UART: [kat] SHA2-384
52,945,610 UART: [kat] SHA2-512-ACC
52,947,996 UART: [kat] ECC-384
55,243,714 UART: [kat] HMAC-384Kdf
55,274,732 UART: [kat] LMS
56,465,057 UART: [kat] --
56,468,477 UART: [update-reset] ++
60,170,679 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,174,345 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,432,731 >>> mbox cmd response: success
60,433,170 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,433,475 UART: [update-reset] Copying MAN_2 To MAN_1
60,455,641 UART: [update-reset Success] --
60,459,500 UART: [state] Locking Datavault
60,461,885 UART: [state] Locking PCR0, PCR1 and PCR31
60,463,586 UART: [state] Locking ICCM
60,464,667 UART: [exit] Launching FMC @ 0x40000130
60,473,125 UART:
60,473,376 UART: Running Caliptra FMC ...
60,474,481 UART:
60,474,641 UART: [state] CFI Enabled
60,575,982 UART: [art] Extend RT PCRs Done
60,577,171 UART: [art] Lock RT PCRs Done
60,578,518 UART: [art] Populate DV Done
60,583,709 UART: [fht] FMC Alias Private Key: 7
60,585,462 UART: [art] Derive CDI
60,586,274 UART: [art] Store in in slot 0x4
60,644,473 UART: [art] Derive Key Pair
60,645,506 UART: [art] Store priv key in slot 0x5
63,938,296 UART: [art] Derive Key Pair - Done
63,951,251 UART: [art] Signing Cert with AUTHO
63,952,562 UART: RITY.KEYID = 7
66,239,983 UART: [art] Erasing AUTHORITY.KEYID = 7
66,241,497 UART: [art] PUB.X = 8D11B9A04F247D424DAA5CFC9628076E7A86B92E33D44D6FA3932C6D9C44C127CE71826B7F2907B96F18156C87852D18
66,248,724 UART: [art] PUB.Y = 77FB602C92D2CE6687E781147A55812A5AC93F723C3A6DC351B35673BEBD63B1C12E73EFAFF9B420C1F1B5BBADCA6A70
66,255,999 UART: [art] SIG.R = C783A75E3B094670EA2A93E8AADB9E2460B59B90A8057BB286E3949C057B60DAD1FC0587F1B91EB235FDD2AECDB7F8E0
66,263,362 UART: [art] SIG.S = 5BC500DAC31E74CE0CE691EE4121B32B538323639C5CCC0783F8991AF3F4DC06ABEEDAA75ADA0245B3CA3A6973D49E38
67,567,867 UART: mbox::rt_entry...
67,568,842 UART: ____ _ _ _ ____ _____
67,570,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,572,762 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,574,684 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,576,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,578,467 UART: |_|
67,579,271 UART:
67,863,835 UART: [rt] Runtime listening for mailbox commands...
67,865,842 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,806,987 ready_for_fw is high
3,807,358 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,853,925 >>> mbox cmd response: success
23,545,774 UART:
23,546,169 UART: Running Caliptra FMC ...
23,547,274 UART:
23,547,428 UART: [state] CFI Enabled
23,598,318 UART: [fht] FMC Alias Private Key: 7
25,936,106 UART: [art] Extend RT PCRs Done
25,937,328 UART: [art] Lock RT PCRs Done
25,938,834 UART: [art] Populate DV Done
25,944,091 UART: [fht] FMC Alias Private Key: 7
25,945,801 UART: [art] Derive CDI
25,946,558 UART: [art] Store in in slot 0x4
26,006,854 UART: [art] Derive Key Pair
26,007,899 UART: [art] Store priv key in slot 0x5
29,300,830 UART: [art] Derive Key Pair - Done
29,314,208 UART: [art] Signing Cert with AUTHO
29,315,513 UART: RITY.KEYID = 7
31,603,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,604,667 UART: [art] PUB.X = 48380878431CE3882D683E37FBD80890A45057B26763B90B5665857703E8693DD9C70D9DF9B3E719E31E06D6ACF5691C
31,611,866 UART: [art] PUB.Y = B27DEBE8EF6E753A5D153B38CD01E5A7BC974A86B0B6C20744AA16CC12E391F1DD8E38CEAF5AD70FA4F37C8FF992BCB6
31,619,160 UART: [art] SIG.R = 8DEB2C720746CC0BAC42B72184CE786C007C38E229DBBC5EFBD573D4B416080168936115DFEE040ACCEC7D3F3AB24A0E
31,626,562 UART: [art] SIG.S = 810635C014A2312AC5DFD8D57B91E1F3FE9402D57C3AF3C3526C50B27BAB3E881D1A3C541163B262307702BAEF00AA49
32,931,617 UART: Caliptra RT
32,932,313 UART: [state] CFI Enabled
33,094,721 UART: [rt] RT listening for mailbox commands...
33,097,034 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,126,806 UART: [rt]cmd =0x50435252, len=8
33,128,565 >>> mbox cmd response data (8 bytes)
35,255,864 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,232,771 >>> mbox cmd response: success
43,233,239 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,268,542 UART:
43,268,832 UART: Running Caliptra FMC ...
43,269,952 UART:
43,270,113 UART: [state] CFI Enabled
43,366,279 UART: [art] Extend RT PCRs Done
43,367,476 UART: [art] Lock RT PCRs Done
43,368,801 UART: [art] Populate DV Done
43,374,428 UART: [fht] FMC Alias Private Key: 7
43,376,038 UART: [art] Derive CDI
43,376,862 UART: [art] Store in in slot 0x4
43,434,964 UART: [art] Derive Key Pair
43,435,965 UART: [art] Store priv key in slot 0x5
46,728,725 UART: [art] Derive Key Pair - Done
46,741,773 UART: [art] Signing Cert with AUTHO
46,743,074 UART: RITY.KEYID = 7
49,029,680 UART: [art] Erasing AUTHORITY.KEYID = 7
49,031,181 UART: [art] PUB.X = 6E25ED4ACE5087CEDF7895F8A362B3495AA2D5048078EDAB5BFB8DA393ADD0E5D3BE96410833A4FFC681EF8ACCA6A6B2
49,038,452 UART: [art] PUB.Y = 4F9F77BA7C9541F46FE83F9E822B0C44AF679B6A3EA901AE32CC0EA59AEA4BEB87EE2C3D6EC14B25C0084AC7F25033E4
49,045,697 UART: [art] SIG.R = 282A1EE1A4EE1B6265F116118E04D8E46768B6A6418D1FA2DBED86416B2BE5049462ABD4CA3232B88D65A2A92ED5EEF9
49,053,099 UART: [art] SIG.S = 8B3E17BA5651448B9442244F227C42B2FAE96369D9686F69E6B8AB23DB5A5756CCE15FB4F0ECE398123A8C239BF65B53
50,358,106 UART: mbox::rt_entry...
50,359,079 UART: ____ _ _ _ ____ _____
50,361,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,363,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,365,037 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,366,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,368,897 UART: |_|
50,369,734 UART:
50,655,058 UART: [rt] Runtime listening for mailbox commands...
50,657,136 >>> mbox cmd response data (128 bytes)
52,779,739 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,763,785 >>> mbox cmd response: success
60,764,294 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,800,509 UART:
60,800,825 UART: Running Caliptra FMC ...
60,801,952 UART:
60,802,145 UART: [state] CFI Enabled
60,898,390 UART: [art] Extend RT PCRs Done
60,899,573 UART: [art] Lock RT PCRs Done
60,900,643 UART: [art] Populate DV Done
60,905,886 UART: [fht] FMC Alias Private Key: 7
60,907,583 UART: [art] Derive CDI
60,908,395 UART: [art] Store in in slot 0x4
60,967,732 UART: [art] Derive Key Pair
60,968,771 UART: [art] Store priv key in slot 0x5
64,261,647 UART: [art] Derive Key Pair - Done
64,274,589 UART: [art] Signing Cert with AUTHO
64,275,894 UART: RITY.KEYID = 7
66,563,413 UART: [art] Erasing AUTHORITY.KEYID = 7
66,564,913 UART: [art] PUB.X = 1043ED1479665B7D0651C6E22BD70A4A594ECEE27D11199ED5159C19D3A77A1BF0121DE402D73971AA8FA4DD905AEA98
66,572,159 UART: [art] PUB.Y = 267989A412A73EA8FDE82BB532D035D2BEFF38F221C1D75A06E2E9F1242F88B97C549D79B3BCD3E3E388483BCF49C3C3
66,579,438 UART: [art] SIG.R = 4BDF53A7F3A4A0D382B61B63C3249AEC6A663787F98721CD95CCEE7D34402194E7713CC05B30BA653D1D9DE8E0A84350
66,586,795 UART: [art] SIG.S = AC28B0222B99EE89D51710BDF6D5BA89DFDEDBEC11349410D2EC0EC01F5E747447BBB1D55DF8620713F6D9EA4B84F2ED
67,891,303 UART: mbox::rt_entry...
67,892,259 UART: ____ _ _ _ ____ _____
67,894,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,896,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,898,180 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,900,112 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,901,968 UART: |_|
67,902,776 UART:
68,188,626 UART: [rt] Runtime listening for mailbox commands...
68,190,637 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,518 UART:
192,888 UART: Running Caliptra ROM ...
194,025 UART:
603,823 UART: [state] CFI Enabled
619,478 UART: [state] LifecycleState = Unprovisioned
621,421 UART: [state] DebugLocked = No
624,075 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,790 UART: [kat] SHA2-256
799,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,068 UART: [kat] ++
810,607 UART: [kat] sha1
822,835 UART: [kat] SHA2-256
825,546 UART: [kat] SHA2-384
831,464 UART: [kat] SHA2-512-ACC
833,897 UART: [kat] ECC-384
3,118,889 UART: [kat] HMAC-384Kdf
3,130,473 UART: [kat] LMS
4,320,621 UART: [kat] --
4,324,991 UART: [cold-reset] ++
4,326,005 UART: [fht] Storing FHT @ 0x50003400
4,336,291 UART: [idev] ++
4,336,854 UART: [idev] CDI.KEYID = 6
4,337,919 UART: [idev] SUBJECT.KEYID = 7
4,339,022 UART: [idev] UDS.KEYID = 0
4,340,107 ready_for_fw is high
4,340,344 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,738 UART: [idev] Erasing UDS.KEYID = 0
7,627,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,362 UART: [idev] --
7,653,100 UART: [ldev] ++
7,653,676 UART: [ldev] CDI.KEYID = 6
7,654,637 UART: [ldev] SUBJECT.KEYID = 5
7,655,840 UART: [ldev] AUTHORITY.KEYID = 7
7,657,121 UART: [ldev] FE.KEYID = 1
7,665,979 UART: [ldev] Erasing FE.KEYID = 1
10,955,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,801 UART: [ldev] --
13,316,952 UART: [fwproc] Waiting for Commands...
13,318,820 UART: [fwproc] Received command 0x46574c44
13,321,004 UART: [fwproc] Received Image of size 114124 bytes
17,371,677 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,384 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,293 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,952 >>> mbox cmd response: success
17,837,591 UART: [afmc] ++
17,838,190 UART: [afmc] CDI.KEYID = 6
17,839,099 UART: [afmc] SUBJECT.KEYID = 7
17,840,318 UART: [afmc] AUTHORITY.KEYID = 5
21,153,392 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,658 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,923 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,282 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,130 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,605 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,559 UART: [afmc] --
23,517,149 UART: [cold-reset] --
23,519,492 UART: [state] Locking Datavault
23,525,497 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,245 UART: [state] Locking ICCM
23,528,903 UART: [exit] Launching FMC @ 0x40000130
23,537,293 UART:
23,537,531 UART: Running Caliptra FMC ...
23,538,627 UART:
23,538,782 UART: [state] CFI Enabled
23,546,716 UART: [fht] FMC Alias Private Key: 7
25,877,448 UART: [art] Extend RT PCRs Done
25,878,802 UART: [art] Lock RT PCRs Done
25,880,563 UART: [art] Populate DV Done
25,885,723 UART: [fht] FMC Alias Private Key: 7
25,887,268 UART: [art] Derive CDI
25,888,022 UART: [art] Store in in slot 0x4
25,930,614 UART: [art] Derive Key Pair
25,931,606 UART: [art] Store priv key in slot 0x5
29,173,837 UART: [art] Derive Key Pair - Done
29,186,666 UART: [art] Signing Cert with AUTHO
29,187,969 UART: RITY.KEYID = 7
31,467,481 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,981 UART: [art] PUB.X = E5B7E95C50F70A00C82FE553807CBEA516B8384964A5D545CEA58975D0E62542FFD0C42AD80D4F267E86E61BD1B4EFD1
31,476,209 UART: [art] PUB.Y = 09AF0B8307334B68AD30496542585A53EEFBABFEAE9A46EDD052020B641810601CF32192A0F921F3132E2A7CA7BDA975
31,483,503 UART: [art] SIG.R = B9A7C71457CC302327AF2996F6E2E255A0905D67A28483ED8239EBCA987F6067DC6942527BEC9BAB6D13FA09D036987E
31,490,900 UART: [art] SIG.S = 5763BF7B80B3B80BC4F73C903ED9862DB60141F6487FC1FBC497E7DC7EEE0E6B83D0C1D1D97B4CFD95117821336DB4BD
32,796,185 UART: Caliptra RT
32,796,889 UART: [state] CFI Enabled
32,914,194 UART: [rt] RT listening for mailbox commands...
32,916,508 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,946,434 UART: [rt]cmd =0x50435252, len=8
32,948,590 >>> mbox cmd response data (8 bytes)
34,998,901 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,099,655 UART:
35,100,019 UART: Running Caliptra ROM ...
35,101,156 UART:
35,101,320 UART: [state] CFI Enabled
35,118,504 UART: [state] LifecycleState = Unprovisioned
35,120,440 UART: [state] DebugLocked = No
35,123,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,127,044 UART: [kat] SHA2-256
35,296,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,307,290 UART: [kat] ++
35,307,798 UART: [kat] sha1
35,318,032 UART: [kat] SHA2-256
35,320,715 UART: [kat] SHA2-384
35,327,634 UART: [kat] SHA2-512-ACC
35,329,991 UART: [kat] ECC-384
37,614,931 UART: [kat] HMAC-384Kdf
37,625,594 UART: [kat] LMS
38,815,690 UART: [kat] --
38,821,812 UART: [update-reset] ++
42,529,878 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,532,774 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,791,181 >>> mbox cmd response: success
42,791,586 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,792,318 UART: [update-reset] Copying MAN_2 To MAN_1
42,814,723 UART: [update-reset Success] --
42,820,145 UART: [state] Locking Datavault
42,822,530 UART: [state] Locking PCR0, PCR1 and PCR31
42,824,279 UART: [state] Locking ICCM
42,826,637 UART: [exit] Launching FMC @ 0x40000130
42,835,087 UART:
42,835,328 UART: Running Caliptra FMC ...
42,836,426 UART:
42,836,579 UART: [state] CFI Enabled
42,880,656 UART: [art] Extend RT PCRs Done
42,881,839 UART: [art] Lock RT PCRs Done
42,883,124 UART: [art] Populate DV Done
42,888,633 UART: [fht] FMC Alias Private Key: 7
42,890,378 UART: [art] Derive CDI
42,891,183 UART: [art] Store in in slot 0x4
42,933,882 UART: [art] Derive Key Pair
42,934,930 UART: [art] Store priv key in slot 0x5
46,176,851 UART: [art] Derive Key Pair - Done
46,189,960 UART: [art] Signing Cert with AUTHO
46,191,264 UART: RITY.KEYID = 7
48,470,291 UART: [art] Erasing AUTHORITY.KEYID = 7
48,471,796 UART: [art] PUB.X = E393CE88A4E3E21596F2240482F040E68B851A6A0EB14A65DE55811CAD07EABCD96FEF0DBA5E312930E807CEE9D745EC
48,479,097 UART: [art] PUB.Y = 5D8359597E4B2FC08DB3DB4D08C1CA9832832073B4AFE316D057134855392E5FC72C34E8FFA4E79E5F5D4007CD30AEDF
48,486,326 UART: [art] SIG.R = 750864266167A128897E79E643E5D98A9C0EA23F04371A32B53ACBD615A84BDCCB76231B2CFB43103AF30A243ED447D0
48,493,717 UART: [art] SIG.S = 7270036CDAF6E65171E0C6783690E4D6F304A0BF9569AC55EF1CB936DC504FAC7DFA6384D0EF064ADE4F0E1DBCA53A6C
49,798,426 UART: mbox::rt_entry...
49,799,393 UART: ____ _ _ _ ____ _____
49,801,372 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,803,374 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,805,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,807,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,809,160 UART: |_|
49,809,983 UART:
50,096,151 UART: [rt] Runtime listening for mailbox commands...
50,098,165 >>> mbox cmd response data (128 bytes)
52,145,258 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,245,189 UART:
52,245,564 UART: Running Caliptra ROM ...
52,246,614 UART:
52,246,820 UART: [state] CFI Enabled
52,258,940 UART: [state] LifecycleState = Unprovisioned
52,260,822 UART: [state] DebugLocked = No
52,262,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,268,084 UART: [kat] SHA2-256
52,437,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,448,331 UART: [kat] ++
52,448,784 UART: [kat] sha1
52,458,478 UART: [kat] SHA2-256
52,461,172 UART: [kat] SHA2-384
52,467,428 UART: [kat] SHA2-512-ACC
52,469,828 UART: [kat] ECC-384
54,753,510 UART: [kat] HMAC-384Kdf
54,764,530 UART: [kat] LMS
55,954,612 UART: [kat] --
55,959,207 UART: [update-reset] ++
59,664,585 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,668,411 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
59,926,823 >>> mbox cmd response: success
59,927,221 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
59,927,784 UART: [update-reset] Copying MAN_2 To MAN_1
59,950,188 UART: [update-reset Success] --
59,955,501 UART: [state] Locking Datavault
59,958,765 UART: [state] Locking PCR0, PCR1 and PCR31
59,960,562 UART: [state] Locking ICCM
59,962,663 UART: [exit] Launching FMC @ 0x40000130
59,971,064 UART:
59,971,301 UART: Running Caliptra FMC ...
59,972,402 UART:
59,972,568 UART: [state] CFI Enabled
60,017,171 UART: [art] Extend RT PCRs Done
60,018,309 UART: [art] Lock RT PCRs Done
60,019,949 UART: [art] Populate DV Done
60,025,347 UART: [fht] FMC Alias Private Key: 7
60,027,094 UART: [art] Derive CDI
60,027,908 UART: [art] Store in in slot 0x4
60,070,238 UART: [art] Derive Key Pair
60,071,299 UART: [art] Store priv key in slot 0x5
63,312,511 UART: [art] Derive Key Pair - Done
63,325,357 UART: [art] Signing Cert with AUTHO
63,326,703 UART: RITY.KEYID = 7
65,605,801 UART: [art] Erasing AUTHORITY.KEYID = 7
65,607,310 UART: [art] PUB.X = CDA7A0597A01057ACAD2BB08D021B8D67DCA3C36804A4AC9480FD380DD503E0E98865D46F51CE4D0D475402F05CA191F
65,614,551 UART: [art] PUB.Y = F8B5C78ADCB29B82F2621F56F564A96BC87B828F1F18295287A15E05BC3FF8B7359BA09C5A9D31BA59A77BF2D1CDD55B
65,621,827 UART: [art] SIG.R = B03F1FE5E4C7B31362B0C118019FCAC90C914C4E440ADFE330C667C55CBFA53A726BF539EAA4CFD6A511D037074F7C09
65,629,217 UART: [art] SIG.S = FF4CC1A21963ED36C8792BFBA611D83A9C116032F729ABE37BB29A8E16C521CC5F47FC66B44C1CF2DE127A4108A18FDA
66,934,234 UART: mbox::rt_entry...
66,935,179 UART: ____ _ _ _ ____ _____
66,937,155 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,939,107 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,941,031 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,942,880 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,944,795 UART: |_|
66,945,616 UART:
67,231,974 UART: [rt] Runtime listening for mailbox commands...
67,233,993 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
4,126,168 ready_for_fw is high
4,126,578 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,669 >>> mbox cmd response: success
23,714,657 UART:
23,715,034 UART: Running Caliptra FMC ...
23,716,226 UART:
23,716,385 UART: [state] CFI Enabled
23,724,658 UART: [fht] FMC Alias Private Key: 7
26,055,146 UART: [art] Extend RT PCRs Done
26,056,395 UART: [art] Lock RT PCRs Done
26,057,922 UART: [art] Populate DV Done
26,063,388 UART: [fht] FMC Alias Private Key: 7
26,064,875 UART: [art] Derive CDI
26,065,606 UART: [art] Store in in slot 0x4
26,108,417 UART: [art] Derive Key Pair
26,109,449 UART: [art] Store priv key in slot 0x5
29,351,890 UART: [art] Derive Key Pair - Done
29,364,886 UART: [art] Signing Cert with AUTHO
29,366,187 UART: RITY.KEYID = 7
31,645,463 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,960 UART: [art] PUB.X = 7E55BAAE1EECF82136D45803336B662C96C0E2D28102DEB692B2BC6CDC8C9FE4A5F5CF2902351DC4FD26F61C5EB6EDCE
31,654,207 UART: [art] PUB.Y = ECB767F2A195C4FD000A1EA5E279B36E9BD25CD0B2C873829D24949FABAD3DFEE70D338A1E70ECBCF80CB4C021AB4894
31,661,484 UART: [art] SIG.R = EC3912BE9DFE972410334A34A845C1CA7BCDA86F7660530B0689F002527E25B8622FBD9EAD55F1C1D542D8C7C6076B6D
31,668,849 UART: [art] SIG.S = 94262B94301B824F79C574875AA3BCF6D834FA1E0103B4F438E60FEF26B6B42976EA989D074409C359A35F5E4E95F6EB
32,974,037 UART: Caliptra RT
32,974,753 UART: [state] CFI Enabled
33,091,777 UART: [rt] RT listening for mailbox commands...
33,094,036 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,124,116 UART: [rt]cmd =0x50435252, len=8
33,125,873 >>> mbox cmd response data (8 bytes)
35,175,781 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,072,852 >>> mbox cmd response: success
43,073,438 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,109,766 UART:
43,110,064 UART: Running Caliptra FMC ...
43,111,184 UART:
43,111,339 UART: [state] CFI Enabled
43,155,483 UART: [art] Extend RT PCRs Done
43,156,669 UART: [art] Lock RT PCRs Done
43,158,103 UART: [art] Populate DV Done
43,163,468 UART: [fht] FMC Alias Private Key: 7
43,165,071 UART: [art] Derive CDI
43,165,807 UART: [art] Store in in slot 0x4
43,208,614 UART: [art] Derive Key Pair
43,209,608 UART: [art] Store priv key in slot 0x5
46,451,764 UART: [art] Derive Key Pair - Done
46,464,392 UART: [art] Signing Cert with AUTHO
46,465,690 UART: RITY.KEYID = 7
48,745,123 UART: [art] Erasing AUTHORITY.KEYID = 7
48,746,640 UART: [art] PUB.X = 488FFDDC964DB3694C5721365801453D61BC617F9CA91737D0CB111548544535BA5C06051C8EFE8C5684FB933BBBCB27
48,753,894 UART: [art] PUB.Y = 0BE58C0DA3528CAAF0167548B0D46D3855D05FFF4315BECAE7C1E4BA0B22FA6DF7FA7FA7F89C71E093DAB237A65F19C2
48,761,128 UART: [art] SIG.R = DD294EB435F9DEC942221418F39D9825EC01E14FD377232E299650D65E3DF3003781D8A7C3F9270203FF7A1202091158
48,768,519 UART: [art] SIG.S = 598AF60F247DC6F27794EA59CB5016AF4C8F61550E956D3A77D95373DBFE33CECCE5C54D056F5708E7CC66686517F193
50,073,349 UART: mbox::rt_entry...
50,074,327 UART: ____ _ _ _ ____ _____
50,076,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,078,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,080,290 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,082,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,084,079 UART: |_|
50,084,907 UART:
50,370,696 UART: [rt] Runtime listening for mailbox commands...
50,372,770 >>> mbox cmd response data (128 bytes)
52,419,561 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,313,442 >>> mbox cmd response: success
60,314,030 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,347,878 UART:
60,348,185 UART: Running Caliptra FMC ...
60,349,218 UART:
60,349,362 UART: [state] CFI Enabled
60,393,384 UART: [art] Extend RT PCRs Done
60,394,532 UART: [art] Lock RT PCRs Done
60,395,950 UART: [art] Populate DV Done
60,401,467 UART: [fht] FMC Alias Private Key: 7
60,402,949 UART: [art] Derive CDI
60,403,677 UART: [art] Store in in slot 0x4
60,446,375 UART: [art] Derive Key Pair
60,447,415 UART: [art] Store priv key in slot 0x5
63,689,754 UART: [art] Derive Key Pair - Done
63,702,817 UART: [art] Signing Cert with AUTHO
63,704,157 UART: RITY.KEYID = 7
65,983,716 UART: [art] Erasing AUTHORITY.KEYID = 7
65,985,224 UART: [art] PUB.X = 95D8D01C86573CB6B7E19B68998B8BAF0ADC8175523552086165A3F96517954D6D4AE4C8239A2F32DBA2939838E7B139
65,992,470 UART: [art] PUB.Y = DE64D63986012D60FDD4FFCDB7599665CC9C939A193E9D1D71FDEE77014391DA78799206226188DC467E889FF77082B2
65,999,708 UART: [art] SIG.R = 2DD3EE5EB8017BF8F4AF1B91AB8A6246A5EB11A397AB56C661E1F083DDC2A3987536BE487159D0AB853EFCBB69E31CDD
66,007,098 UART: [art] SIG.S = 9A02BB9A2BC34C3A49557A0B966C69255078865F2842D21AD6A2214AE1E235C8723272B17E2CE5923E8CE3EB4B6D668F
67,311,816 UART: mbox::rt_entry...
67,312,784 UART: ____ _ _ _ ____ _____
67,314,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,316,773 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,318,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,320,634 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,322,560 UART: |_|
67,323,404 UART:
67,603,433 UART: [rt] Runtime listening for mailbox commands...
67,605,440 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,059 UART:
192,434 UART: Running Caliptra ROM ...
193,556 UART:
193,704 UART: [state] CFI Enabled
263,698 UART: [state] LifecycleState = Unprovisioned
265,553 UART: [state] DebugLocked = No
268,353 UART: [state] WD Timer not started. Device not locked for debugging
272,796 UART: [kat] SHA2-256
451,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,468 UART: [kat] ++
463,919 UART: [kat] sha1
475,571 UART: [kat] SHA2-256
478,573 UART: [kat] SHA2-384
484,155 UART: [kat] SHA2-512-ACC
487,095 UART: [kat] ECC-384
2,950,421 UART: [kat] HMAC-384Kdf
2,971,336 UART: [kat] LMS
3,500,751 UART: [kat] --
3,506,025 UART: [cold-reset] ++
3,508,033 UART: [fht] FHT @ 0x50003400
3,517,877 UART: [idev] ++
3,518,438 UART: [idev] CDI.KEYID = 6
3,519,353 UART: [idev] SUBJECT.KEYID = 7
3,520,526 UART: [idev] UDS.KEYID = 0
3,521,573 ready_for_fw is high
3,521,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,708 UART: [idev] Erasing UDS.KEYID = 0
6,026,441 UART: [idev] Sha1 KeyId Algorithm
6,049,714 UART: [idev] --
6,053,222 UART: [ldev] ++
6,053,807 UART: [ldev] CDI.KEYID = 6
6,054,699 UART: [ldev] SUBJECT.KEYID = 5
6,055,862 UART: [ldev] AUTHORITY.KEYID = 7
6,057,019 UART: [ldev] FE.KEYID = 1
6,100,147 UART: [ldev] Erasing FE.KEYID = 1
8,604,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,918 UART: [ldev] --
10,412,644 UART: [fwproc] Wait for Commands...
10,415,386 UART: [fwproc] Recv command 0x46574c44
10,417,475 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,451 >>> mbox cmd response: success
14,281,734 UART: [afmc] ++
14,282,325 UART: [afmc] CDI.KEYID = 6
14,283,239 UART: [afmc] SUBJECT.KEYID = 7
14,284,454 UART: [afmc] AUTHORITY.KEYID = 5
16,808,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,661 UART: [afmc] --
18,604,378 UART: [cold-reset] --
18,606,728 UART: [state] Locking Datavault
18,611,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,613,097 UART: [state] Locking ICCM
18,614,766 UART: [exit] Launching FMC @ 0x40000130
18,623,219 UART:
18,623,452 UART: Running Caliptra FMC ...
18,624,552 UART:
18,624,709 UART: [state] CFI Enabled
18,689,726 UART: [fht] FMC Alias Private Key: 7
20,453,550 UART: [art] Extend RT PCRs Done
20,454,765 UART: [art] Lock RT PCRs Done
20,455,954 UART: [art] Populate DV Done
20,461,305 UART: [fht] FMC Alias Private Key: 7
20,462,888 UART: [art] Derive CDI
20,463,699 UART: [art] Store in in slot 0x4
20,522,954 UART: [art] Derive Key Pair
20,523,985 UART: [art] Store priv key in slot 0x5
22,986,483 UART: [art] Derive Key Pair - Done
22,999,519 UART: [art] Signing Cert with AUTHO
23,000,847 UART: RITY.KEYID = 7
24,713,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,765 UART: [art] PUB.X = 054DC80D2C99988CD921212B69F98FC7D04FD01B67D1693A0A68AF2ACD212179092B7C8E3DE570A134217089946733B6
24,722,012 UART: [art] PUB.Y = DF06DFAB33016E10681D448FFCA62663BE982D03A76EF43E3C044BBC1C020D0D6663E5E03F43F9F6FA8A2EF43EE2CCCF
24,729,298 UART: [art] SIG.R = DCDB4DB637405EBF4C07C209493E8004A04197FD06C9D3575909DF41AD33FCE54225745FAE3310A9F740249678B8CD8C
24,736,682 UART: [art] SIG.S = 480CDFFD13A50C6773048D1F4ABEAB35DB3E60923CB43FD90D36E0F837F03785C96FAD57B48F19BA8A86D187D67EE47D
25,715,465 UART: Caliptra RT
25,716,170 UART: [state] CFI Enabled
25,879,725 UART: [rt] RT listening for mailbox commands...
25,882,020 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,912,330 UART: [rt]cmd =0x50435252, len=8
25,914,434 >>> mbox cmd response data (8 bytes)
27,970,050 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,070,890 UART:
28,071,241 UART: Running Caliptra ROM ...
28,072,295 UART:
28,072,449 UART: [state] CFI Enabled
28,147,542 UART: [state] LifecycleState = Unprovisioned
28,149,426 UART: [state] DebugLocked = No
28,150,740 UART: [state] WD Timer not started. Device not locked for debugging
28,153,774 UART: [kat] SHA2-256
28,332,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,344,498 UART: [kat] ++
28,344,955 UART: [kat] sha1
28,357,351 UART: [kat] SHA2-256
28,360,357 UART: [kat] SHA2-384
28,367,293 UART: [kat] SHA2-512-ACC
28,370,239 UART: [kat] ECC-384
30,822,994 UART: [kat] HMAC-384Kdf
30,844,176 UART: [kat] LMS
31,373,608 UART: [kat] --
31,377,486 UART: [update-reset] ++
34,372,848 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,376,594 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,634,817 >>> mbox cmd response: success
34,635,183 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,636,122 UART: [update-reset] Copying MAN_2 To MAN_1
34,658,402 UART: [update-reset Success] --
34,663,980 UART: [state] Locking Datavault
34,667,332 UART: [state] Locking PCR0, PCR1 and PCR31
34,668,987 UART: [state] Locking ICCM
34,671,525 UART: [exit] Launching FMC @ 0x40000130
34,679,936 UART:
34,680,183 UART: Running Caliptra FMC ...
34,681,287 UART:
34,681,447 UART: [state] CFI Enabled
34,780,227 UART: [art] Extend RT PCRs Done
34,781,404 UART: [art] Lock RT PCRs Done
34,782,693 UART: [art] Populate DV Done
34,788,214 UART: [fht] FMC Alias Private Key: 7
34,789,907 UART: [art] Derive CDI
34,790,717 UART: [art] Store in in slot 0x4
34,849,501 UART: [art] Derive Key Pair
34,850,543 UART: [art] Store priv key in slot 0x5
37,313,458 UART: [art] Derive Key Pair - Done
37,326,891 UART: [art] Signing Cert with AUTHO
37,328,188 UART: RITY.KEYID = 7
39,038,980 UART: [art] Erasing AUTHORITY.KEYID = 7
39,040,516 UART: [art] PUB.X = BAF7A8121C5A28A602A7327135F540341F8224342FAB49B68955720181E0D3E334B38206982C9209643CA645D3A95D9B
39,047,717 UART: [art] PUB.Y = 7945A02AB5B734FEB6125A30353AAE1BBA8D45B291504651A2513B9A1447768866CB89ED7771696B6010B3DD5C6D49F3
39,054,957 UART: [art] SIG.R = 0D52069AA34D062A38EC1FF8E72664E999A398FF6ADF1DBDA6247956042985158A2934CD5291858581BA0A0663811E52
39,062,291 UART: [art] SIG.S = 3FD8107875C2B4C6D50D5F5DF31D821AC6BD1FC24ED1D1E97464FE8293620A6F9FBDBFDCDFFCFD06D5D405BB6463F7E3
40,040,451 UART: mbox::rt_entry...
40,041,404 UART: ____ _ _ _ ____ _____
40,043,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,045,343 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,047,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,049,209 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,051,139 UART: |_|
40,051,949 UART:
40,341,536 UART: [rt] Runtime listening for mailbox commands...
40,343,565 >>> mbox cmd response data (128 bytes)
42,397,101 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,497,018 UART:
42,497,362 UART: Running Caliptra ROM ...
42,498,411 UART:
42,498,564 UART: [state] CFI Enabled
42,555,249 UART: [state] LifecycleState = Unprovisioned
42,557,136 UART: [state] DebugLocked = No
42,559,520 UART: [state] WD Timer not started. Device not locked for debugging
42,562,612 UART: [kat] SHA2-256
42,741,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,753,262 UART: [kat] ++
42,753,718 UART: [kat] sha1
42,765,412 UART: [kat] SHA2-256
42,768,478 UART: [kat] SHA2-384
42,774,641 UART: [kat] SHA2-512-ACC
42,777,637 UART: [kat] ECC-384
45,240,564 UART: [kat] HMAC-384Kdf
45,262,954 UART: [kat] LMS
45,792,396 UART: [kat] --
45,796,656 UART: [update-reset] ++
48,786,792 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,790,984 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,049,154 >>> mbox cmd response: success
49,049,566 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,049,864 UART: [update-reset] Copying MAN_2 To MAN_1
49,072,082 UART: [update-reset Success] --
49,074,734 UART: [state] Locking Datavault
49,077,139 UART: [state] Locking PCR0, PCR1 and PCR31
49,078,790 UART: [state] Locking ICCM
49,080,973 UART: [exit] Launching FMC @ 0x40000130
49,089,386 UART:
49,089,623 UART: Running Caliptra FMC ...
49,090,653 UART:
49,090,802 UART: [state] CFI Enabled
49,179,589 UART: [art] Extend RT PCRs Done
49,180,774 UART: [art] Lock RT PCRs Done
49,182,098 UART: [art] Populate DV Done
49,187,347 UART: [fht] FMC Alias Private Key: 7
49,188,830 UART: [art] Derive CDI
49,189,560 UART: [art] Store in in slot 0x4
49,248,630 UART: [art] Derive Key Pair
49,249,667 UART: [art] Store priv key in slot 0x5
51,712,799 UART: [art] Derive Key Pair - Done
51,725,683 UART: [art] Signing Cert with AUTHO
51,726,987 UART: RITY.KEYID = 7
53,438,610 UART: [art] Erasing AUTHORITY.KEYID = 7
53,440,134 UART: [art] PUB.X = C6FAAD6511A6BA993B0C7CE6A93B87B55F1C4C57B9F972C670EC25784B3BB2E2215B1F4F8D764F03AEFE1FC261B4104F
53,447,437 UART: [art] PUB.Y = 63BF2A002EE1364D1438E34DBDE15E6C11EC3104C8D6D343401C1BA6BDCF4CC19597A3253600CC44A5AB27CC0F7A7A9D
53,454,660 UART: [art] SIG.R = 49E423EDFAE782996F11FAE35CDEC48A09B099B536E150E17A14E14DEED12A12950A88FE34585B0280C8A1815FB13CB9
53,462,052 UART: [art] SIG.S = D36088FE4B77E947112A818748DCB6798256660F76672D17090167E625DBE74C4736703202F141DDA98DE646517833A5
54,440,299 UART: mbox::rt_entry...
54,441,241 UART: ____ _ _ _ ____ _____
54,443,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,445,171 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,447,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,449,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,450,963 UART: |_|
54,451,793 UART:
54,739,954 UART: [rt] Runtime listening for mailbox commands...
54,741,968 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,380,017 ready_for_fw is high
3,380,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,717 >>> mbox cmd response: success
18,341,394 UART:
18,341,771 UART: Running Caliptra FMC ...
18,342,971 UART:
18,343,151 UART: [state] CFI Enabled
18,410,671 UART: [fht] FMC Alias Private Key: 7
20,174,759 UART: [art] Extend RT PCRs Done
20,175,991 UART: [art] Lock RT PCRs Done
20,177,463 UART: [art] Populate DV Done
20,183,035 UART: [fht] FMC Alias Private Key: 7
20,184,683 UART: [art] Derive CDI
20,185,493 UART: [art] Store in in slot 0x4
20,243,609 UART: [art] Derive Key Pair
20,244,595 UART: [art] Store priv key in slot 0x5
22,707,606 UART: [art] Derive Key Pair - Done
22,720,333 UART: [art] Signing Cert with AUTHO
22,721,631 UART: RITY.KEYID = 7
24,434,076 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,577 UART: [art] PUB.X = F4163460752D30D1B47CCCCC3FFFD0285BD323B2BF16DBFE8125248D31E6FD2A3FD10BD31DB5260B87BC4D702B4206D2
24,442,883 UART: [art] PUB.Y = 0F896EDB3DD32210C97B1501F8B8DF7B1256A2537CEFCB48F7BFADD02554362AB573CC47DA4EBCB7F287F357044C79C4
24,450,151 UART: [art] SIG.R = 49BD6C6FDE16064E01CB760A4330417FA0A02FC42C5A690908C9E5D67E84E55F0356CF005C13AB6FA8305176F8801C46
24,457,493 UART: [art] SIG.S = C2512CCAFC6F9B4DA564531C7D5943426613D52E936B901E1769129DACB7798DA3B865F4AD2876A41A3B00A72D3385D3
25,436,438 UART: Caliptra RT
25,437,136 UART: [state] CFI Enabled
25,603,421 UART: [rt] RT listening for mailbox commands...
25,605,600 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,636,099 UART: [rt]cmd =0x50435252, len=8
25,638,237 >>> mbox cmd response data (8 bytes)
27,700,939 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,226,754 >>> mbox cmd response: success
34,227,200 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,262,613 UART:
34,262,942 UART: Running Caliptra FMC ...
34,263,982 UART:
34,264,134 UART: [state] CFI Enabled
34,362,053 UART: [art] Extend RT PCRs Done
34,363,244 UART: [art] Lock RT PCRs Done
34,364,716 UART: [art] Populate DV Done
34,370,289 UART: [fht] FMC Alias Private Key: 7
34,371,834 UART: [art] Derive CDI
34,372,647 UART: [art] Store in in slot 0x4
34,431,022 UART: [art] Derive Key Pair
34,432,086 UART: [art] Store priv key in slot 0x5
36,894,691 UART: [art] Derive Key Pair - Done
36,907,626 UART: [art] Signing Cert with AUTHO
36,908,929 UART: RITY.KEYID = 7
38,621,083 UART: [art] Erasing AUTHORITY.KEYID = 7
38,622,585 UART: [art] PUB.X = 08156BF5B772AD0902BE5EC8CEEBD4B97E184EEB5644C35DC421052FC0BE7A8F9ADE32086DE2A4C6DD387DDCAA68588C
38,629,904 UART: [art] PUB.Y = 0B7B03D3B2C5C1D5809EF8A619D5B802C39FAE68E33555FD48A10B5125AC76D93A889080E668AF4CA3C6425BA51EF657
38,637,148 UART: [art] SIG.R = 6251096D94AA27C46F27BCEB958E28353DD53157B089FA72D8A3E5468E4D7340670765E6B25C56CB6D3B2DA6EE9567CD
38,644,542 UART: [art] SIG.S = BDC5096F9FBBF1E3ABBFE79175151581940DA502AAA04812E320D313061945D154858784142A1F0AC9062F6967EED459
39,622,831 UART: mbox::rt_entry...
39,623,803 UART: ____ _ _ _ ____ _____
39,625,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,627,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,629,721 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,631,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,633,586 UART: |_|
39,634,445 UART:
39,916,872 UART: [rt] Runtime listening for mailbox commands...
39,918,931 >>> mbox cmd response data (128 bytes)
41,969,542 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,493,815 >>> mbox cmd response: success
48,494,335 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,526,066 UART:
48,526,373 UART: Running Caliptra FMC ...
48,527,499 UART:
48,527,659 UART: [state] CFI Enabled
48,634,342 UART: [art] Extend RT PCRs Done
48,635,536 UART: [art] Lock RT PCRs Done
48,637,175 UART: [art] Populate DV Done
48,642,958 UART: [fht] FMC Alias Private Key: 7
48,644,490 UART: [art] Derive CDI
48,645,298 UART: [art] Store in in slot 0x4
48,702,963 UART: [art] Derive Key Pair
48,704,008 UART: [art] Store priv key in slot 0x5
51,166,952 UART: [art] Derive Key Pair - Done
51,179,957 UART: [art] Signing Cert with AUTHO
51,181,257 UART: RITY.KEYID = 7
52,893,265 UART: [art] Erasing AUTHORITY.KEYID = 7
52,894,778 UART: [art] PUB.X = 0F999F2A117AE61AD3433771D8B80D3727EA5398E5F991A023AE87D25D175981358CA32BE2EF6C70BDB3697AA36D4FCB
52,902,034 UART: [art] PUB.Y = 730B70265DABEADB1D0733DE920A470883A519C8FE37657A969C1DFBF95E835CBC8F5D526C1011FCAF179BAE8980AC56
52,909,335 UART: [art] SIG.R = 936CFDAD8812ABE38179CA6D365260EF143B7CCD33FB4427FD7E4DCF873A8528D239F9839828009258FCA2F6FC005FFA
52,916,671 UART: [art] SIG.S = E37553C8A74F28665BEB519CEA2B557A5F00E7A0D445069DE3C717B400FCB552B5B172F8B1C7C7655F3812BDA09330EC
53,895,251 UART: mbox::rt_entry...
53,896,192 UART: ____ _ _ _ ____ _____
53,898,185 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,900,189 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,902,118 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,904,044 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,905,972 UART: |_|
53,906,781 UART:
54,192,312 UART: [rt] Runtime listening for mailbox commands...
54,194,319 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,374 UART:
192,754 UART: Running Caliptra ROM ...
193,881 UART:
603,596 UART: [state] CFI Enabled
613,625 UART: [state] LifecycleState = Unprovisioned
615,498 UART: [state] DebugLocked = No
617,234 UART: [state] WD Timer not started. Device not locked for debugging
621,702 UART: [kat] SHA2-256
800,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,396 UART: [kat] ++
812,917 UART: [kat] sha1
825,511 UART: [kat] SHA2-256
828,553 UART: [kat] SHA2-384
833,904 UART: [kat] SHA2-512-ACC
836,906 UART: [kat] ECC-384
3,276,372 UART: [kat] HMAC-384Kdf
3,289,885 UART: [kat] LMS
3,819,335 UART: [kat] --
3,822,973 UART: [cold-reset] ++
3,824,334 UART: [fht] FHT @ 0x50003400
3,836,153 UART: [idev] ++
3,836,707 UART: [idev] CDI.KEYID = 6
3,837,605 UART: [idev] SUBJECT.KEYID = 7
3,838,857 UART: [idev] UDS.KEYID = 0
3,839,774 ready_for_fw is high
3,839,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,674 UART: [idev] Erasing UDS.KEYID = 0
6,311,515 UART: [idev] Sha1 KeyId Algorithm
6,335,224 UART: [idev] --
6,339,214 UART: [ldev] ++
6,339,821 UART: [ldev] CDI.KEYID = 6
6,340,727 UART: [ldev] SUBJECT.KEYID = 5
6,341,879 UART: [ldev] AUTHORITY.KEYID = 7
6,343,102 UART: [ldev] FE.KEYID = 1
6,356,114 UART: [ldev] Erasing FE.KEYID = 1
8,832,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,996 UART: [ldev] --
10,626,251 UART: [fwproc] Wait for Commands...
10,628,281 UART: [fwproc] Recv command 0x46574c44
10,630,305 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,504,248 >>> mbox cmd response: success
14,507,894 UART: [afmc] ++
14,508,481 UART: [afmc] CDI.KEYID = 6
14,509,357 UART: [afmc] SUBJECT.KEYID = 7
14,510,563 UART: [afmc] AUTHORITY.KEYID = 5
17,007,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,828 UART: [afmc] --
18,803,365 UART: [cold-reset] --
18,807,431 UART: [state] Locking Datavault
18,812,180 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,868 UART: [state] Locking ICCM
18,815,635 UART: [exit] Launching FMC @ 0x40000130
18,824,038 UART:
18,824,308 UART: Running Caliptra FMC ...
18,825,413 UART:
18,825,575 UART: [state] CFI Enabled
18,833,777 UART: [fht] FMC Alias Private Key: 7
20,590,558 UART: [art] Extend RT PCRs Done
20,591,792 UART: [art] Lock RT PCRs Done
20,593,646 UART: [art] Populate DV Done
20,599,102 UART: [fht] FMC Alias Private Key: 7
20,600,585 UART: [art] Derive CDI
20,601,339 UART: [art] Store in in slot 0x4
20,644,081 UART: [art] Derive Key Pair
20,645,072 UART: [art] Store priv key in slot 0x5
23,071,894 UART: [art] Derive Key Pair - Done
23,084,889 UART: [art] Signing Cert with AUTHO
23,086,181 UART: RITY.KEYID = 7
24,791,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,996 UART: [art] PUB.X = 7E5E44CFE0CBB8DD833C55B5A2737743FFEBE061124C35AB5595DD0E72BFF16DD76F1BD17BD5F77E542A23096C9D6D88
24,800,276 UART: [art] PUB.Y = 920F1A33E2975B5B60CFB3001DBD651E1919A3406080E0DA1D5AC2F9E98CF44AFF30389F02FCA674DA59DEC7B5872AB1
24,807,540 UART: [art] SIG.R = 47925FB4F38DEEC776BB163959EF73052F0D15901373904B2662F7EDD274045E9CB2612E995D672FBD1473154C9915CC
24,814,907 UART: [art] SIG.S = 495109D78A414D5686D5D4A088337E51D3F0F8853D2C7BA6F51EC9135FE78D88CA79DA2F53DE576EF8A4DA56134A739A
25,794,145 UART: Caliptra RT
25,794,843 UART: [state] CFI Enabled
25,912,406 UART: [rt] RT listening for mailbox commands...
25,914,785 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,944,730 UART: [rt]cmd =0x50435252, len=8
25,946,962 >>> mbox cmd response data (8 bytes)
27,999,071 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,100,652 UART:
28,101,017 UART: Running Caliptra ROM ...
28,102,150 UART:
28,102,312 UART: [state] CFI Enabled
28,116,191 UART: [state] LifecycleState = Unprovisioned
28,118,027 UART: [state] DebugLocked = No
28,120,862 UART: [state] WD Timer not started. Device not locked for debugging
28,124,615 UART: [kat] SHA2-256
28,303,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,315,355 UART: [kat] ++
28,315,896 UART: [kat] sha1
28,326,137 UART: [kat] SHA2-256
28,329,137 UART: [kat] SHA2-384
28,335,704 UART: [kat] SHA2-512-ACC
28,338,653 UART: [kat] ECC-384
30,781,465 UART: [kat] HMAC-384Kdf
30,795,207 UART: [kat] LMS
31,324,708 UART: [kat] --
31,329,935 UART: [update-reset] ++
34,327,760 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,331,351 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,589,575 >>> mbox cmd response: success
34,589,966 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,590,382 UART: [update-reset] Copying MAN_2 To MAN_1
34,612,716 UART: [update-reset Success] --
34,617,431 UART: [state] Locking Datavault
34,621,109 UART: [state] Locking PCR0, PCR1 and PCR31
34,622,743 UART: [state] Locking ICCM
34,624,902 UART: [exit] Launching FMC @ 0x40000130
34,633,346 UART:
34,633,579 UART: Running Caliptra FMC ...
34,634,674 UART:
34,634,817 UART: [state] CFI Enabled
34,678,989 UART: [art] Extend RT PCRs Done
34,680,170 UART: [art] Lock RT PCRs Done
34,681,781 UART: [art] Populate DV Done
34,687,233 UART: [fht] FMC Alias Private Key: 7
34,688,975 UART: [art] Derive CDI
34,689,784 UART: [art] Store in in slot 0x4
34,732,098 UART: [art] Derive Key Pair
34,733,097 UART: [art] Store priv key in slot 0x5
37,159,994 UART: [art] Derive Key Pair - Done
37,172,940 UART: [art] Signing Cert with AUTHO
37,174,240 UART: RITY.KEYID = 7
38,879,519 UART: [art] Erasing AUTHORITY.KEYID = 7
38,881,021 UART: [art] PUB.X = DA80CF5E6D2D5755A56B3141661722E1AD988A585D5F920E5F0C58842EF32352A750595D2CB92CD970263EDE7C0C541B
38,888,329 UART: [art] PUB.Y = E34288ACEB86D1C03775CC0C721E97AFC8979A5C73F6017FC7B2A7294C02C33B448219B6ACDC0AB0EED310B65BD571CB
38,895,558 UART: [art] SIG.R = 10D04CC00A00198DCD7B5A1F254E0F2897719BFB36DC27509C8360DACD11E0353A1E0C1AFCB2A7B23BB88B2025DF163E
38,902,972 UART: [art] SIG.S = 5E63F1AE3EA4E5E18C13B701595A742922D063DBA03BE351EA3EF635C2206C6CC63998818EE3CF0604441FDCA5995C98
39,880,985 UART: mbox::rt_entry...
39,881,933 UART: ____ _ _ _ ____ _____
39,883,904 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,885,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,887,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,889,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,891,672 UART: |_|
39,892,498 UART:
40,179,048 UART: [rt] Runtime listening for mailbox commands...
40,181,058 >>> mbox cmd response data (128 bytes)
42,228,837 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,328,800 UART:
42,329,159 UART: Running Caliptra ROM ...
42,330,288 UART:
42,330,449 UART: [state] CFI Enabled
42,345,857 UART: [state] LifecycleState = Unprovisioned
42,347,790 UART: [state] DebugLocked = No
42,350,570 UART: [state] WD Timer not started. Device not locked for debugging
42,353,735 UART: [kat] SHA2-256
42,532,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,544,517 UART: [kat] ++
42,545,047 UART: [kat] sha1
42,555,554 UART: [kat] SHA2-256
42,558,548 UART: [kat] SHA2-384
42,565,763 UART: [kat] SHA2-512-ACC
42,568,689 UART: [kat] ECC-384
45,010,683 UART: [kat] HMAC-384Kdf
45,024,811 UART: [kat] LMS
45,554,321 UART: [kat] --
45,558,959 UART: [update-reset] ++
48,551,310 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,555,128 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,813,293 >>> mbox cmd response: success
48,813,679 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,814,684 UART: [update-reset] Copying MAN_2 To MAN_1
48,837,005 UART: [update-reset Success] --
48,839,987 UART: [state] Locking Datavault
48,843,632 UART: [state] Locking PCR0, PCR1 and PCR31
48,845,271 UART: [state] Locking ICCM
48,847,307 UART: [exit] Launching FMC @ 0x40000130
48,855,704 UART:
48,855,933 UART: Running Caliptra FMC ...
48,857,026 UART:
48,857,192 UART: [state] CFI Enabled
48,901,105 UART: [art] Extend RT PCRs Done
48,902,291 UART: [art] Lock RT PCRs Done
48,903,848 UART: [art] Populate DV Done
48,909,303 UART: [fht] FMC Alias Private Key: 7
48,910,989 UART: [art] Derive CDI
48,911,794 UART: [art] Store in in slot 0x4
48,954,287 UART: [art] Derive Key Pair
48,955,283 UART: [art] Store priv key in slot 0x5
51,382,612 UART: [art] Derive Key Pair - Done
51,395,555 UART: [art] Signing Cert with AUTHO
51,396,863 UART: RITY.KEYID = 7
53,102,578 UART: [art] Erasing AUTHORITY.KEYID = 7
53,104,077 UART: [art] PUB.X = 5A9EEC046E0FDBE9762BB20A7A1B7A2AA62649001EC6BEB9213026084B58AF4516E246864141DA3233025473A8236679
53,111,271 UART: [art] PUB.Y = CB78C56AD62C124F3FF41DA39D701F1CA79B434D28CFB7D6483BCC504F2BC7A3660C4E732B06FA401B17C6E0B673B76C
53,118,601 UART: [art] SIG.R = 80242A9283A563FF7BBB24038668B9287B58096052E249683BA390FF198F5C91BC43F2F40FE9AF59C0F436410B0FCCC1
53,125,922 UART: [art] SIG.S = 90009ECDB832E8780D56486AFCBD540C588AE87CE986152D33CCE86524B5F19C0B0B9AB813FBEC61CA643D115F9BB0D6
54,104,710 UART: mbox::rt_entry...
54,105,644 UART: ____ _ _ _ ____ _____
54,107,615 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,109,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,111,536 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,113,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,115,403 UART: |_|
54,116,208 UART:
54,402,628 UART: [rt] Runtime listening for mailbox commands...
54,404,630 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,698,696 ready_for_fw is high
3,699,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,586 >>> mbox cmd response: success
18,519,822 UART:
18,520,208 UART: Running Caliptra FMC ...
18,521,396 UART:
18,521,552 UART: [state] CFI Enabled
18,529,489 UART: [fht] FMC Alias Private Key: 7
20,286,708 UART: [art] Extend RT PCRs Done
20,287,939 UART: [art] Lock RT PCRs Done
20,289,886 UART: [art] Populate DV Done
20,294,908 UART: [fht] FMC Alias Private Key: 7
20,296,671 UART: [art] Derive CDI
20,297,484 UART: [art] Store in in slot 0x4
20,339,922 UART: [art] Derive Key Pair
20,340,982 UART: [art] Store priv key in slot 0x5
22,767,532 UART: [art] Derive Key Pair - Done
22,780,361 UART: [art] Signing Cert with AUTHO
22,781,652 UART: RITY.KEYID = 7
24,486,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,444 UART: [art] PUB.X = 49A682E59E92D187F65B5005169D27BEEFA644DC00A726359AD32EE39141A83E8BBDA5E12A32210DCE4B98733F37327D
24,495,751 UART: [art] PUB.Y = 860CF4ADBE9FEF448884DAF2DE58FC08F323E9A24CD7DAF5EC11793CC8C7F590BE558D2C47DACE2581354851B2C64C66
24,502,979 UART: [art] SIG.R = 268A4168B7E835DC0BF939BCED9630B313B080A1CCC56601A82577234221664932BB3E8D91C1A94891D861CA2CE5AE9E
24,510,368 UART: [art] SIG.S = BCE1095733B6827D0E64C7FB980E6417F15C5851CE9905250C0B0DB92C09D6D5AAE02581026F16CBD9B21FA1992D05DF
25,489,773 UART: Caliptra RT
25,490,488 UART: [state] CFI Enabled
25,608,098 UART: [rt] RT listening for mailbox commands...
25,610,504 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,640,304 UART: [rt]cmd =0x50435252, len=8
25,642,058 >>> mbox cmd response data (8 bytes)
27,707,214 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,142,948 >>> mbox cmd response: success
34,143,439 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,178,677 UART:
34,179,004 UART: Running Caliptra FMC ...
34,180,136 UART:
34,180,290 UART: [state] CFI Enabled
34,223,983 UART: [art] Extend RT PCRs Done
34,225,125 UART: [art] Lock RT PCRs Done
34,226,509 UART: [art] Populate DV Done
34,232,074 UART: [fht] FMC Alias Private Key: 7
34,233,768 UART: [art] Derive CDI
34,234,573 UART: [art] Store in in slot 0x4
34,277,463 UART: [art] Derive Key Pair
34,278,499 UART: [art] Store priv key in slot 0x5
36,704,772 UART: [art] Derive Key Pair - Done
36,717,606 UART: [art] Signing Cert with AUTHO
36,718,907 UART: RITY.KEYID = 7
38,424,142 UART: [art] Erasing AUTHORITY.KEYID = 7
38,425,643 UART: [art] PUB.X = 9CABD821E1B2D02F7CF07E1A35326A3201D4822F12CC3A26F290DF453F5B01B1197EBE46F55FF1094235A29A6421713C
38,432,948 UART: [art] PUB.Y = 64A801C0F65F70F6F373E2564A79705AA488158AF7EB68722300085A5F0AD9F86F8D9D21C96201171EEB3F2017CACC91
38,440,165 UART: [art] SIG.R = 5FB9B9947E84EE6F6571DDF937B4B8E1051C7A60A4AA185EBDE381D94BC1657D343F1A1C14A2355341D24E359FD00127
38,447,545 UART: [art] SIG.S = 41334076195C40A9E2306DA2575D02A549AE36397F37AAB06DE707526D6C87A775D9D7CEAD6DDE7C029547F2381FAF9D
39,426,730 UART: mbox::rt_entry...
39,427,669 UART: ____ _ _ _ ____ _____
39,429,646 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,431,645 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,433,576 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,435,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,437,362 UART: |_|
39,438,156 UART:
39,719,949 UART: [rt] Runtime listening for mailbox commands...
39,721,987 >>> mbox cmd response data (128 bytes)
41,772,342 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,212,123 >>> mbox cmd response: success
48,212,681 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,245,920 UART:
48,246,209 UART: Running Caliptra FMC ...
48,247,267 UART:
48,247,414 UART: [state] CFI Enabled
48,291,817 UART: [art] Extend RT PCRs Done
48,293,024 UART: [art] Lock RT PCRs Done
48,294,591 UART: [art] Populate DV Done
48,300,107 UART: [fht] FMC Alias Private Key: 7
48,301,796 UART: [art] Derive CDI
48,302,604 UART: [art] Store in in slot 0x4
48,345,313 UART: [art] Derive Key Pair
48,346,348 UART: [art] Store priv key in slot 0x5
50,772,966 UART: [art] Derive Key Pair - Done
50,785,768 UART: [art] Signing Cert with AUTHO
50,787,074 UART: RITY.KEYID = 7
52,492,977 UART: [art] Erasing AUTHORITY.KEYID = 7
52,494,466 UART: [art] PUB.X = DF1216562EA00A93401157116F89520E5C72BE837D24CEDB7A275ECB7DF478E0C80B4205E21DDF8D59446054207BC432
52,501,706 UART: [art] PUB.Y = E4CD692ACD36F08E513E9A1E9B5D2EA3D24E3FA960C4430C6149FF83C3DBA0401DAC6F1FF35FD10D5310797F4A07EF4C
52,508,987 UART: [art] SIG.R = B6D362229E2B9678B51C008A4738EB330D043970379DD3B811E0F7B5023EF69214536E2B6B2A393CCE9D9AA5B0AC85F6
52,516,369 UART: [art] SIG.S = 2BACAE0D7E4C097F611A45A3005024A93E2792BCD53F99C36B46D957E27EF2434B3B08B567544CEB828F77426C4ADF4E
53,494,674 UART: mbox::rt_entry...
53,495,658 UART: ____ _ _ _ ____ _____
53,497,583 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,499,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,501,512 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,503,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,505,356 UART: |_|
53,506,179 UART:
53,794,029 UART: [rt] Runtime listening for mailbox commands...
53,796,033 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,112 UART:
192,483 UART: Running Caliptra ROM ...
193,681 UART:
193,833 UART: [state] CFI Enabled
264,478 UART: [state] LifecycleState = Unprovisioned
266,530 UART: [state] DebugLocked = No
268,420 UART: [state] WD Timer not started. Device not locked for debugging
272,517 UART: [kat] SHA2-256
462,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,169 UART: [kat] ++
473,618 UART: [kat] sha1
485,481 UART: [kat] SHA2-256
488,566 UART: [kat] SHA2-384
494,276 UART: [kat] SHA2-512-ACC
496,853 UART: [kat] ECC-384
2,950,768 UART: [kat] HMAC-384Kdf
2,972,966 UART: [kat] LMS
3,504,779 UART: [kat] --
3,507,844 UART: [cold-reset] ++
3,510,196 UART: [fht] FHT @ 0x50003400
3,521,974 UART: [idev] ++
3,522,678 UART: [idev] CDI.KEYID = 6
3,523,668 UART: [idev] SUBJECT.KEYID = 7
3,524,840 UART: [idev] UDS.KEYID = 0
3,525,767 ready_for_fw is high
3,525,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,997 UART: [idev] Erasing UDS.KEYID = 0
6,028,700 UART: [idev] Sha1 KeyId Algorithm
6,051,065 UART: [idev] --
6,055,311 UART: [ldev] ++
6,056,058 UART: [ldev] CDI.KEYID = 6
6,056,978 UART: [ldev] SUBJECT.KEYID = 5
6,058,136 UART: [ldev] AUTHORITY.KEYID = 7
6,059,313 UART: [ldev] FE.KEYID = 1
6,101,398 UART: [ldev] Erasing FE.KEYID = 1
8,606,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,534 UART: [ldev] --
10,414,509 UART: [fwproc] Wait for Commands...
10,416,115 UART: [fwproc] Recv command 0x46574c44
10,418,425 UART: [fwproc] Recv'd Img size: 114448 bytes
13,868,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,604,498 >>> mbox cmd response: success
14,608,198 UART: [afmc] ++
14,608,912 UART: [afmc] CDI.KEYID = 6
14,610,094 UART: [afmc] SUBJECT.KEYID = 7
14,611,582 UART: [afmc] AUTHORITY.KEYID = 5
17,151,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,605 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,971 UART: [afmc] --
18,952,568 UART: [cold-reset] --
18,956,267 UART: [state] Locking Datavault
18,961,790 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,925 UART: [state] Locking ICCM
18,965,331 UART: [exit] Launching FMC @ 0x40000130
18,974,005 UART:
18,974,244 UART: Running Caliptra FMC ...
18,975,343 UART:
18,975,500 UART: [state] CFI Enabled
19,032,800 UART: [fht] FMC Alias Private Key: 7
20,797,835 UART: [art] Extend RT PCRs Done
20,799,043 UART: [art] Lock RT PCRs Done
20,800,772 UART: [art] Populate DV Done
20,806,075 UART: [fht] FMC Alias Private Key: 7
20,807,775 UART: [art] Derive CDI
20,808,586 UART: [art] Store in in slot 0x4
20,865,883 UART: [art] Derive Key Pair
20,866,912 UART: [art] Store priv key in slot 0x5
23,329,888 UART: [art] Derive Key Pair - Done
23,342,772 UART: [art] Signing Cert with AUTHO
23,344,068 UART: RITY.KEYID = 7
25,055,333 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,856 UART: [art] PUB.X = BB4ED2340AB01FC33CF2C8A384A406B89F760DEA95D5538F40586CEC008E62350E23AAE6203E8E39C77E02A9797ADA3D
25,064,045 UART: [art] PUB.Y = DB1E8198DF4A10FAC7000C9489A4D6323274C56DBDDDCFD54B9117A4059A8E453C0D6F37F9F75155D99A66A495988A92
25,071,282 UART: [art] SIG.R = C865E1B3A32B8ACF7341BEB0299E58DA456F29BCB49BB74B8DAF71F7D87B3E99ADB9390507DCEE172CCCE95BBE5FF003
25,078,912 UART: [art] SIG.S = E80644D816E30F22ACFD1BAA91FC3047DD16E14CD9C44000048ACCD4775EA0FF37739135266DD50DE2DF5ED81E99750A
26,057,229 UART: Caliptra RT
26,057,921 UART: [state] CFI Enabled
26,222,990 UART: [rt] RT listening for mailbox commands...
26,225,172 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,255,336 UART: [rt]cmd =0x50435252, len=8
26,257,388 >>> mbox cmd response data (8 bytes)
28,318,117 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,418,864 UART:
28,419,241 UART: Running Caliptra ROM ...
28,420,336 UART:
28,420,496 UART: [state] CFI Enabled
28,486,702 UART: [state] LifecycleState = Unprovisioned
28,488,813 UART: [state] DebugLocked = No
28,490,120 UART: [state] WD Timer not started. Device not locked for debugging
28,494,845 UART: [kat] SHA2-256
28,684,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,695,499 UART: [kat] ++
28,695,956 UART: [kat] sha1
28,707,705 UART: [kat] SHA2-256
28,710,719 UART: [kat] SHA2-384
28,716,758 UART: [kat] SHA2-512-ACC
28,719,333 UART: [kat] ECC-384
31,169,508 UART: [kat] HMAC-384Kdf
31,191,841 UART: [kat] LMS
31,723,428 UART: [kat] --
31,729,679 UART: [update-reset] ++
34,747,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,750,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,144,372 >>> mbox cmd response: success
35,144,745 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,145,195 UART: [update-reset] Copying MAN_2 To MAN_1
35,182,770 UART: [update-reset Success] --
35,187,742 UART: [state] Locking Datavault
35,191,757 UART: [state] Locking PCR0, PCR1 and PCR31
35,193,903 UART: [state] Locking ICCM
35,196,915 UART: [exit] Launching FMC @ 0x40000130
35,205,594 UART:
35,205,826 UART: Running Caliptra FMC ...
35,206,921 UART:
35,207,078 UART: [state] CFI Enabled
35,297,929 UART: [art] Extend RT PCRs Done
35,299,113 UART: [art] Lock RT PCRs Done
35,300,619 UART: [art] Populate DV Done
35,305,933 UART: [fht] FMC Alias Private Key: 7
35,307,577 UART: [art] Derive CDI
35,308,387 UART: [art] Store in in slot 0x4
35,367,124 UART: [art] Derive Key Pair
35,368,184 UART: [art] Store priv key in slot 0x5
37,831,448 UART: [art] Derive Key Pair - Done
37,844,434 UART: [art] Signing Cert with AUTHO
37,845,740 UART: RITY.KEYID = 7
39,557,128 UART: [art] Erasing AUTHORITY.KEYID = 7
39,558,640 UART: [art] PUB.X = 1401B8EE1BA7A0213499FB44B8170C36E091F5A493C9FE3BE700425C8DFB261BA5188BFFD1D497CD1CCFC000DF083B39
39,565,922 UART: [art] PUB.Y = 6EA918B9F534B4F96E71BD8B2F528D7BDF3B2A29609C2F9E10E0D03A64B1DEF1C7551B7A0FB59607F0174A0BD6FC56F2
39,573,162 UART: [art] SIG.R = 3CF65D3319B40AAE628203684BB5E97B7D357DB78EBB887D457D95B668B63D86B631D7A66D522988F5A759565C291DB5
39,580,556 UART: [art] SIG.S = 667C017DCA4320ED5399D1869B4628AEF4E62278E613612FD912767CCAFDC5AFDAE4146051D02D89DF7233ACFECA6102
40,559,168 UART: mbox::rt_entry...
40,560,124 UART: ____ _ _ _ ____ _____
40,562,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,564,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,565,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,567,871 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,569,724 UART: |_|
40,570,604 UART:
40,855,114 UART: [rt] Runtime listening for mailbox commands...
40,857,121 >>> mbox cmd response data (128 bytes)
42,935,045 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,034,981 UART:
43,035,341 UART: Running Caliptra ROM ...
43,036,394 UART:
43,036,550 UART: [state] CFI Enabled
43,096,184 UART: [state] LifecycleState = Unprovisioned
43,098,238 UART: [state] DebugLocked = No
43,099,766 UART: [state] WD Timer not started. Device not locked for debugging
43,103,580 UART: [kat] SHA2-256
43,293,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,304,232 UART: [kat] ++
43,304,716 UART: [kat] sha1
43,316,251 UART: [kat] SHA2-256
43,319,217 UART: [kat] SHA2-384
43,325,409 UART: [kat] SHA2-512-ACC
43,328,039 UART: [kat] ECC-384
45,781,671 UART: [kat] HMAC-384Kdf
45,804,825 UART: [kat] LMS
46,336,429 UART: [kat] --
46,340,415 UART: [update-reset] ++
49,354,480 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,357,550 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,751,331 >>> mbox cmd response: success
49,751,728 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,752,394 UART: [update-reset] Copying MAN_2 To MAN_1
49,790,012 UART: [update-reset Success] --
49,794,894 UART: [state] Locking Datavault
49,798,697 UART: [state] Locking PCR0, PCR1 and PCR31
49,800,880 UART: [state] Locking ICCM
49,803,206 UART: [exit] Launching FMC @ 0x40000130
49,811,880 UART:
49,812,111 UART: Running Caliptra FMC ...
49,813,208 UART:
49,813,362 UART: [state] CFI Enabled
49,910,263 UART: [art] Extend RT PCRs Done
49,911,476 UART: [art] Lock RT PCRs Done
49,912,614 UART: [art] Populate DV Done
49,918,363 UART: [fht] FMC Alias Private Key: 7
49,919,906 UART: [art] Derive CDI
49,920,670 UART: [art] Store in in slot 0x4
49,979,579 UART: [art] Derive Key Pair
49,980,621 UART: [art] Store priv key in slot 0x5
52,443,605 UART: [art] Derive Key Pair - Done
52,456,488 UART: [art] Signing Cert with AUTHO
52,457,788 UART: RITY.KEYID = 7
54,168,841 UART: [art] Erasing AUTHORITY.KEYID = 7
54,170,338 UART: [art] PUB.X = E55558E831985CCD3FF70301884ABAC3078612E6259B5CC47EF38F44DB00B5A1E66C4DEEC18AF704B93ED5449BB72915
54,177,592 UART: [art] PUB.Y = 091C4AE65C7BD22466A54B016060FF3AD9DACAEDA91D085F62E0130A93D5E498E21CFE6C7905394EA1FC3E81C5FE1A69
54,184,875 UART: [art] SIG.R = 15A624383D75ADC936869AE7FB1AC368C8DA4D56B46C0B65D3329D23275DA25EA0F0C28C60F1F1FFA6B836110C3D5E5C
54,192,257 UART: [art] SIG.S = EB0AECB9605525565BCBF55CD57DF8A265E263E8EFF8EFB7CD7AEC966609CB53A3E7731489F8080AB6722627BDD7C6F9
55,170,458 UART: mbox::rt_entry...
55,171,406 UART: ____ _ _ _ ____ _____
55,173,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,175,403 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,177,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,179,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,181,187 UART: |_|
55,182,021 UART:
55,462,987 UART: [rt] Runtime listening for mailbox commands...
55,465,014 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,440,709 ready_for_fw is high
3,441,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,252 >>> mbox cmd response: success
19,026,684 UART:
19,027,093 UART: Running Caliptra FMC ...
19,028,215 UART:
19,028,372 UART: [state] CFI Enabled
19,093,442 UART: [fht] FMC Alias Private Key: 7
20,856,363 UART: [art] Extend RT PCRs Done
20,857,600 UART: [art] Lock RT PCRs Done
20,859,309 UART: [art] Populate DV Done
20,864,487 UART: [fht] FMC Alias Private Key: 7
20,866,176 UART: [art] Derive CDI
20,866,923 UART: [art] Store in in slot 0x4
20,925,270 UART: [art] Derive Key Pair
20,926,271 UART: [art] Store priv key in slot 0x5
23,389,484 UART: [art] Derive Key Pair - Done
23,402,801 UART: [art] Signing Cert with AUTHO
23,404,107 UART: RITY.KEYID = 7
25,114,557 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,063 UART: [art] PUB.X = 6F96ABCA6B008062AA2ED24F1BCA0C7EC1544BD4A6A663E5710971AF95C8AAADF834873BA37AC9CDC379B5CEA742439D
25,123,373 UART: [art] PUB.Y = D2691D28E0727F40A8DF78DFA4E784691692E394EC45D91BC769A0F757FEF1D42156277D4ED3ABE77FA9EB73C76FA228
25,130,618 UART: [art] SIG.R = 672AF1D4EDDB57ED02341994146A68B72C12448ED1E1125E1D0D3D116BC5198A1E207853AE691BF2C6B66BFAA68CED48
25,138,014 UART: [art] SIG.S = 79DDEC3EBC991C5D7D27331B9D54B4EAAB7CAD522B7FF0CA7E6F32115597803854D291D0EB00A341530495B7ED7B45B8
26,117,071 UART: Caliptra RT
26,117,781 UART: [state] CFI Enabled
26,281,891 UART: [rt] RT listening for mailbox commands...
26,284,299 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,314,577 UART: [rt]cmd =0x50435252, len=8
26,316,480 >>> mbox cmd response data (8 bytes)
28,391,074 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,413,124 >>> mbox cmd response: success
35,413,667 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,449,506 UART:
35,449,832 UART: Running Caliptra FMC ...
35,450,874 UART:
35,451,026 UART: [state] CFI Enabled
35,551,607 UART: [art] Extend RT PCRs Done
35,552,794 UART: [art] Lock RT PCRs Done
35,554,172 UART: [art] Populate DV Done
35,559,653 UART: [fht] FMC Alias Private Key: 7
35,561,196 UART: [art] Derive CDI
35,562,011 UART: [art] Store in in slot 0x4
35,620,934 UART: [art] Derive Key Pair
35,621,975 UART: [art] Store priv key in slot 0x5
38,084,396 UART: [art] Derive Key Pair - Done
38,097,298 UART: [art] Signing Cert with AUTHO
38,098,609 UART: RITY.KEYID = 7
39,810,661 UART: [art] Erasing AUTHORITY.KEYID = 7
39,812,171 UART: [art] PUB.X = 9FCC4EA2D011CD18A3F10D4B275EF8394751A140F8E0C0DA07557089970C09E7ED8C5919F662F4BDD6B19E0D3442B711
39,819,473 UART: [art] PUB.Y = D23372F4108DC4FBDB4AA0F454A41E4D1B76C9ED03C13BBB3FC3B337D50E6C47D15F971DC14763E169F5382CA02F5093
39,826,737 UART: [art] SIG.R = 5253BA3612E5F762C91D9A212E528189FBA756D2F6E886C9691BA20F8E9AB9E2178B3FB4D0DDF399FC3567150310DE42
39,834,089 UART: [art] SIG.S = 4ECDF471A79CD3DFD9599F05C94D8F2B6EB5351151208B405F466B856536D69A5507A61ED61321EF5B4D5541C92E2751
40,812,568 UART: mbox::rt_entry...
40,813,533 UART: ____ _ _ _ ____ _____
40,815,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,817,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,819,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,821,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,823,221 UART: |_|
40,824,028 UART:
41,111,012 UART: [rt] Runtime listening for mailbox commands...
41,113,058 >>> mbox cmd response data (128 bytes)
43,182,491 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,186,109 >>> mbox cmd response: success
50,186,594 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,221,233 UART:
50,221,544 UART: Running Caliptra FMC ...
50,222,584 UART:
50,222,737 UART: [state] CFI Enabled
50,312,136 UART: [art] Extend RT PCRs Done
50,313,326 UART: [art] Lock RT PCRs Done
50,314,432 UART: [art] Populate DV Done
50,320,165 UART: [fht] FMC Alias Private Key: 7
50,321,656 UART: [art] Derive CDI
50,322,390 UART: [art] Store in in slot 0x4
50,380,380 UART: [art] Derive Key Pair
50,381,377 UART: [art] Store priv key in slot 0x5
52,844,033 UART: [art] Derive Key Pair - Done
52,856,655 UART: [art] Signing Cert with AUTHO
52,857,965 UART: RITY.KEYID = 7
54,569,004 UART: [art] Erasing AUTHORITY.KEYID = 7
54,570,494 UART: [art] PUB.X = 12DB3C079B968F824BFA8519760A7212C7333CFBA5626210EA704F3030A73023639E23ACADA107AA93444263E5EE4864
54,577,757 UART: [art] PUB.Y = C74A832A9BB96E79AAAB5D9554E87E9D76D1AFD84FB1CFC97B0696DC25BFB78EB971250C028D6D6DDA265301F1EAB87C
54,585,040 UART: [art] SIG.R = C8BA4CF4A39209788C373F177571DC145BBF73FF830EB3D2D5EEA461FB8C34D477380488AB48040BE49E654BB1118164
54,592,424 UART: [art] SIG.S = 6FCED3FE4310D711F0A0A2D21F5F6A7B7BA11B4FFB9C49F0A2248AF1C8E6AE5B63024A6C021A69EFE5016F7D68ED0FCF
55,571,041 UART: mbox::rt_entry...
55,572,008 UART: ____ _ _ _ ____ _____
55,573,949 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,575,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,577,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,579,738 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,581,622 UART: |_|
55,582,507 UART:
55,867,572 UART: [rt] Runtime listening for mailbox commands...
55,869,580 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,446 UART:
192,810 UART: Running Caliptra ROM ...
193,938 UART:
603,692 UART: [state] CFI Enabled
617,703 UART: [state] LifecycleState = Unprovisioned
620,074 UART: [state] DebugLocked = No
622,383 UART: [state] WD Timer not started. Device not locked for debugging
626,116 UART: [kat] SHA2-256
815,810 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,612 UART: [kat] ++
827,230 UART: [kat] sha1
839,117 UART: [kat] SHA2-256
842,124 UART: [kat] SHA2-384
848,265 UART: [kat] SHA2-512-ACC
850,840 UART: [kat] ECC-384
3,289,129 UART: [kat] HMAC-384Kdf
3,303,427 UART: [kat] LMS
3,835,310 UART: [kat] --
3,838,308 UART: [cold-reset] ++
3,839,658 UART: [fht] FHT @ 0x50003400
3,852,326 UART: [idev] ++
3,853,034 UART: [idev] CDI.KEYID = 6
3,853,935 UART: [idev] SUBJECT.KEYID = 7
3,855,168 UART: [idev] UDS.KEYID = 0
3,856,082 ready_for_fw is high
3,856,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,441 UART: [idev] Erasing UDS.KEYID = 0
6,336,452 UART: [idev] Sha1 KeyId Algorithm
6,357,729 UART: [idev] --
6,361,643 UART: [ldev] ++
6,362,329 UART: [ldev] CDI.KEYID = 6
6,363,241 UART: [ldev] SUBJECT.KEYID = 5
6,364,391 UART: [ldev] AUTHORITY.KEYID = 7
6,365,615 UART: [ldev] FE.KEYID = 1
6,376,196 UART: [ldev] Erasing FE.KEYID = 1
8,853,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,683 UART: [ldev] --
10,644,534 UART: [fwproc] Wait for Commands...
10,647,565 UART: [fwproc] Recv command 0x46574c44
10,649,868 UART: [fwproc] Recv'd Img size: 114448 bytes
14,106,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,845,972 >>> mbox cmd response: success
14,849,819 UART: [afmc] ++
14,850,569 UART: [afmc] CDI.KEYID = 6
14,851,679 UART: [afmc] SUBJECT.KEYID = 7
14,853,218 UART: [afmc] AUTHORITY.KEYID = 5
17,356,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,837 UART: [afmc] --
19,151,268 UART: [cold-reset] --
19,155,670 UART: [state] Locking Datavault
19,160,284 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,492 UART: [state] Locking ICCM
19,164,301 UART: [exit] Launching FMC @ 0x40000130
19,172,977 UART:
19,173,203 UART: Running Caliptra FMC ...
19,174,297 UART:
19,174,444 UART: [state] CFI Enabled
19,182,589 UART: [fht] FMC Alias Private Key: 7
20,938,868 UART: [art] Extend RT PCRs Done
20,940,085 UART: [art] Lock RT PCRs Done
20,941,852 UART: [art] Populate DV Done
20,947,480 UART: [fht] FMC Alias Private Key: 7
20,949,227 UART: [art] Derive CDI
20,950,051 UART: [art] Store in in slot 0x4
20,992,585 UART: [art] Derive Key Pair
20,993,573 UART: [art] Store priv key in slot 0x5
23,420,197 UART: [art] Derive Key Pair - Done
23,433,292 UART: [art] Signing Cert with AUTHO
23,434,581 UART: RITY.KEYID = 7
25,140,400 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,903 UART: [art] PUB.X = F40DB89DC8D9D820E34A6BEC3C7A5F288F075810343FAAB8A7DBE48229070A4C5E0B120B8BF79178D6CF06B5E90FDA5C
25,149,181 UART: [art] PUB.Y = D3508840002C2408D36DF759A51A5ABB9C87F1644418A130FCCFE9767FF3AB95621EA1AEF681BBCDC7D907D5BC05CF18
25,156,440 UART: [art] SIG.R = E4F3D7D08EEAD6E6A448887FE33D33056BCF6EF072D9E40873D0181A41FDD331EC1AB77B98CB41485FBDFA555E24B7FA
25,163,910 UART: [art] SIG.S = 45AC272AB7BE6D3E88941633ECD0B0B9A2358A04FBA6E5BDBF8CA292AF91AFEBFC0543B127A36516B84806490129A414
26,142,791 UART: Caliptra RT
26,143,479 UART: [state] CFI Enabled
26,260,592 UART: [rt] RT listening for mailbox commands...
26,262,710 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,292,568 UART: [rt]cmd =0x50435252, len=8
26,294,632 >>> mbox cmd response data (8 bytes)
28,345,037 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,445,688 UART:
28,446,045 UART: Running Caliptra ROM ...
28,447,182 UART:
28,447,356 UART: [state] CFI Enabled
28,461,023 UART: [state] LifecycleState = Unprovisioned
28,462,856 UART: [state] DebugLocked = No
28,464,235 UART: [state] WD Timer not started. Device not locked for debugging
28,469,440 UART: [kat] SHA2-256
28,659,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,670,098 UART: [kat] ++
28,670,630 UART: [kat] sha1
28,682,598 UART: [kat] SHA2-256
28,685,603 UART: [kat] SHA2-384
28,691,541 UART: [kat] SHA2-512-ACC
28,694,098 UART: [kat] ECC-384
31,136,320 UART: [kat] HMAC-384Kdf
31,149,474 UART: [kat] LMS
31,681,087 UART: [kat] --
31,687,399 UART: [update-reset] ++
34,708,306 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,711,880 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,105,633 >>> mbox cmd response: success
35,106,035 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,107,679 UART: [update-reset] Copying MAN_2 To MAN_1
35,145,239 UART: [update-reset Success] --
35,149,903 UART: [state] Locking Datavault
35,153,717 UART: [state] Locking PCR0, PCR1 and PCR31
35,155,909 UART: [state] Locking ICCM
35,158,082 UART: [exit] Launching FMC @ 0x40000130
35,166,756 UART:
35,166,994 UART: Running Caliptra FMC ...
35,168,087 UART:
35,168,239 UART: [state] CFI Enabled
35,212,345 UART: [art] Extend RT PCRs Done
35,213,481 UART: [art] Lock RT PCRs Done
35,214,731 UART: [art] Populate DV Done
35,220,121 UART: [fht] FMC Alias Private Key: 7
35,221,809 UART: [art] Derive CDI
35,222,613 UART: [art] Store in in slot 0x4
35,265,263 UART: [art] Derive Key Pair
35,266,303 UART: [art] Store priv key in slot 0x5
37,693,294 UART: [art] Derive Key Pair - Done
37,705,827 UART: [art] Signing Cert with AUTHO
37,707,134 UART: RITY.KEYID = 7
39,412,429 UART: [art] Erasing AUTHORITY.KEYID = 7
39,413,941 UART: [art] PUB.X = A594335A6B22B22B821355748B391B4F8C6D28265AE562AD4B5B1E24E8BE754521CA3470524188F27B8C5F6A4556845D
39,421,133 UART: [art] PUB.Y = 0C05E70D9D980CDA3E9BAA651AD5CFA3DF0ED8F82B4F9D20C76228584CDFD0D3179DE1A2A0AA7B09D70B63F91943492E
39,428,409 UART: [art] SIG.R = 1A6EF768924E2719694908953F6A56C039777B40EF727DBD1FA3CDA2CEAFE4D99315B7561CF5ECF799E0A5F1A0DFB8C4
39,435,783 UART: [art] SIG.S = BFE7D3CB705FE5081C5D0DA8AB7F493ED754D7F678497BA0CF0E0B8534D2FA22894C47FCCFFC09D9830C26515FC29C39
40,414,383 UART: mbox::rt_entry...
40,415,336 UART: ____ _ _ _ ____ _____
40,417,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,419,312 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,421,233 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,423,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,425,077 UART: |_|
40,425,882 UART:
40,707,506 UART: [rt] Runtime listening for mailbox commands...
40,709,531 >>> mbox cmd response data (128 bytes)
42,758,371 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,858,253 UART:
42,858,606 UART: Running Caliptra ROM ...
42,859,685 UART:
42,859,893 UART: [state] CFI Enabled
42,871,786 UART: [state] LifecycleState = Unprovisioned
42,873,610 UART: [state] DebugLocked = No
42,876,175 UART: [state] WD Timer not started. Device not locked for debugging
42,881,447 UART: [kat] SHA2-256
43,071,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,082,105 UART: [kat] ++
43,082,725 UART: [kat] sha1
43,093,836 UART: [kat] SHA2-256
43,096,852 UART: [kat] SHA2-384
43,101,919 UART: [kat] SHA2-512-ACC
43,104,485 UART: [kat] ECC-384
45,546,182 UART: [kat] HMAC-384Kdf
45,559,234 UART: [kat] LMS
46,090,813 UART: [kat] --
46,096,366 UART: [update-reset] ++
49,118,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,121,569 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,515,378 >>> mbox cmd response: success
49,515,751 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,517,110 UART: [update-reset] Copying MAN_2 To MAN_1
49,554,667 UART: [update-reset Success] --
49,559,030 UART: [state] Locking Datavault
49,563,807 UART: [state] Locking PCR0, PCR1 and PCR31
49,566,007 UART: [state] Locking ICCM
49,568,947 UART: [exit] Launching FMC @ 0x40000130
49,577,614 UART:
49,577,845 UART: Running Caliptra FMC ...
49,578,860 UART:
49,578,999 UART: [state] CFI Enabled
49,623,160 UART: [art] Extend RT PCRs Done
49,624,293 UART: [art] Lock RT PCRs Done
49,625,919 UART: [art] Populate DV Done
49,631,582 UART: [fht] FMC Alias Private Key: 7
49,633,227 UART: [art] Derive CDI
49,634,033 UART: [art] Store in in slot 0x4
49,676,178 UART: [art] Derive Key Pair
49,677,239 UART: [art] Store priv key in slot 0x5
52,103,700 UART: [art] Derive Key Pair - Done
52,116,286 UART: [art] Signing Cert with AUTHO
52,117,590 UART: RITY.KEYID = 7
53,822,767 UART: [art] Erasing AUTHORITY.KEYID = 7
53,824,270 UART: [art] PUB.X = DE47D7BB84F3F99ABC7120083334887CEAA9C06189FA2DF6A207A66D685EAE18CABDB547450EA95E567384C5A7FAB3CA
53,831,568 UART: [art] PUB.Y = 49841EB562354A24B2CA58F13440DB670FE930D80A69377B659DEAABA3B2CF364CAE95FDDD8965C4EA5CC2CDA163C845
53,838,841 UART: [art] SIG.R = DF2AD6640B31207F231756BB8576FD3F2ED7CC126785B94BA4816B8E7BB5F807BB21481FC24EFA80DCB57403CE438857
53,846,270 UART: [art] SIG.S = BCDC70C85A5736BEA4275EC80784483D6A0D2ADBE1A9DBA8EB474A0B65ED361539D321615F193C2618389E99736C8CA3
54,825,136 UART: mbox::rt_entry...
54,826,089 UART: ____ _ _ _ ____ _____
54,828,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,830,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,831,996 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,833,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,835,839 UART: |_|
54,836,638 UART:
55,123,607 UART: [rt] Runtime listening for mailbox commands...
55,125,628 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,757,749 ready_for_fw is high
3,758,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,964,300 >>> mbox cmd response: success
19,214,075 UART:
19,214,465 UART: Running Caliptra FMC ...
19,215,659 UART:
19,215,815 UART: [state] CFI Enabled
19,223,262 UART: [fht] FMC Alias Private Key: 7
20,980,132 UART: [art] Extend RT PCRs Done
20,981,352 UART: [art] Lock RT PCRs Done
20,983,029 UART: [art] Populate DV Done
20,988,556 UART: [fht] FMC Alias Private Key: 7
20,990,188 UART: [art] Derive CDI
20,991,026 UART: [art] Store in in slot 0x4
21,033,563 UART: [art] Derive Key Pair
21,034,560 UART: [art] Store priv key in slot 0x5
23,461,513 UART: [art] Derive Key Pair - Done
23,474,708 UART: [art] Signing Cert with AUTHO
23,476,033 UART: RITY.KEYID = 7
25,181,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,197 UART: [art] PUB.X = 3FAE6D83C42EAC61952821ECC03CD529000BCE3105C495226E4F48EA1CDADADCF2C66760DFBABC3B67CAFA539EAC7067
25,190,495 UART: [art] PUB.Y = 6D1C2D116DE85D4CBBF97E3527F4361B60A3BA440B9048844BA0ECFA57042816E81D0648D5F3F3BAE1EE7CA3D3F92773
25,197,760 UART: [art] SIG.R = 38704738E2B7301D14A32E40AD62560FEC380A2B662993AE55B9E9FE2D2E3A7FA1918D8F7D7ABA5FBC8D8DBC1A04AD67
25,205,132 UART: [art] SIG.S = B417DF46517BD6330AFF42AADD9F6A37973AB9C1DEA2B1164A5888B8403741C9075A0DF16A60648CEAE812E6643B47A7
26,184,758 UART: Caliptra RT
26,185,442 UART: [state] CFI Enabled
26,302,721 UART: [rt] RT listening for mailbox commands...
26,305,050 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,334,796 UART: [rt]cmd =0x50435252, len=8
26,336,797 >>> mbox cmd response data (8 bytes)
28,388,438 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,307,289 >>> mbox cmd response: success
35,307,801 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,339,583 UART:
35,339,868 UART: Running Caliptra FMC ...
35,340,944 UART:
35,341,087 UART: [state] CFI Enabled
35,384,795 UART: [art] Extend RT PCRs Done
35,385,934 UART: [art] Lock RT PCRs Done
35,387,675 UART: [art] Populate DV Done
35,392,726 UART: [fht] FMC Alias Private Key: 7
35,394,336 UART: [art] Derive CDI
35,395,146 UART: [art] Store in in slot 0x4
35,437,790 UART: [art] Derive Key Pair
35,438,786 UART: [art] Store priv key in slot 0x5
37,865,816 UART: [art] Derive Key Pair - Done
37,878,891 UART: [art] Signing Cert with AUTHO
37,880,200 UART: RITY.KEYID = 7
39,586,265 UART: [art] Erasing AUTHORITY.KEYID = 7
39,587,773 UART: [art] PUB.X = 8B876F4888AFEA7FCD04D7AE0E1CEECD48B75E1121E5F6C1D219D54E1BD7B0A3D0E68AD9DE03F95A23E17E3F1FDA887B
39,595,067 UART: [art] PUB.Y = 2666F3AAD4BDB8B9B75685FDAD8E296DC8BAA975B8D0FD7CC5DB35018250CCC7F6D7BD851BCF4E277795D6DB21AF2F8E
39,602,403 UART: [art] SIG.R = EEAE964D17E5B7B28A39BF2C7F74EFEA77FE701A86CDEA48F5AC8D90965CDCBC50BA3608DB74935F279799DCFECA417A
39,609,778 UART: [art] SIG.S = FD3E6FA8A3F110E6DCC92FED1F528D6B3AEC7E3984A78AD1E8D112C611CF19B0A1610BD6369DF1998CB5BEC6C028E85E
40,587,927 UART: mbox::rt_entry...
40,588,879 UART: ____ _ _ _ ____ _____
40,590,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,592,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,594,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,596,723 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,598,657 UART: |_|
40,599,457 UART:
40,880,762 UART: [rt] Runtime listening for mailbox commands...
40,882,797 >>> mbox cmd response data (128 bytes)
42,932,077 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,848,557 >>> mbox cmd response: success
49,849,077 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,885,346 UART:
49,885,674 UART: Running Caliptra FMC ...
49,886,801 UART:
49,886,974 UART: [state] CFI Enabled
49,930,257 UART: [art] Extend RT PCRs Done
49,931,393 UART: [art] Lock RT PCRs Done
49,932,968 UART: [art] Populate DV Done
49,938,521 UART: [fht] FMC Alias Private Key: 7
49,940,208 UART: [art] Derive CDI
49,940,935 UART: [art] Store in in slot 0x4
49,983,485 UART: [art] Derive Key Pair
49,984,548 UART: [art] Store priv key in slot 0x5
52,411,471 UART: [art] Derive Key Pair - Done
52,424,256 UART: [art] Signing Cert with AUTHO
52,425,548 UART: RITY.KEYID = 7
54,131,181 UART: [art] Erasing AUTHORITY.KEYID = 7
54,132,674 UART: [art] PUB.X = 400907AED7D93C2594F926EDBFC71E99DCB49CCA8FB3133FB6EFE98D472AD934D8879EECBFE68E73EDB4FEEDBBDFC83D
54,140,012 UART: [art] PUB.Y = 1B004B846AD97895C2D0667D1235BA655A40857B195F2901C231F7D6B04271D3921AD1B25A845AE8011232DA9B995346
54,147,235 UART: [art] SIG.R = 877C986AA4ECB8BB777E11F1377DF3EA5045B15034B3958DD5C087F1100A1AEFAF699B943439971659B771297EA404D6
54,154,626 UART: [art] SIG.S = BE5F1900FB1496E9C81D8AB07B7D0B112DDA6D7132059C41DE6EC9612BE6073A099659E02EB036050EB746D99E5AF648
55,132,809 UART: mbox::rt_entry...
55,133,759 UART: ____ _ _ _ ____ _____
55,135,860 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,137,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,139,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,141,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,143,615 UART: |_|
55,144,444 UART:
55,429,916 UART: [rt] Runtime listening for mailbox commands...
55,431,917 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,841 UART: [kat] SHA2-256
881,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,887 UART: [kat] ++
886,039 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,475,979 UART: [cold-reset] ++
1,476,513 UART: [fht] Storing FHT @ 0x50003400
1,479,342 UART: [idev] ++
1,479,510 UART: [idev] CDI.KEYID = 6
1,479,870 UART: [idev] SUBJECT.KEYID = 7
1,480,294 UART: [idev] UDS.KEYID = 0
1,480,639 ready_for_fw is high
1,480,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,250 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,444 UART: [idev] --
1,514,623 UART: [ldev] ++
1,514,791 UART: [ldev] CDI.KEYID = 6
1,515,154 UART: [ldev] SUBJECT.KEYID = 5
1,515,580 UART: [ldev] AUTHORITY.KEYID = 7
1,516,043 UART: [ldev] FE.KEYID = 1
1,521,039 UART: [ldev] Erasing FE.KEYID = 1
1,546,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,063 UART: [fwproc] Waiting for Commands...
1,586,932 UART: [fwproc] Received command 0x46574c44
1,587,723 UART: [fwproc] Received Image of size 114448 bytes
2,887,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,400 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,689 >>> mbox cmd response: success
3,080,885 UART: [afmc] ++
3,081,053 UART: [afmc] CDI.KEYID = 6
3,081,415 UART: [afmc] SUBJECT.KEYID = 7
3,081,840 UART: [afmc] AUTHORITY.KEYID = 5
3,116,693 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,251 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,644 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,334 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,081 UART: [afmc] --
3,160,025 UART: [cold-reset] --
3,160,871 UART: [state] Locking Datavault
3,161,974 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,578 UART: [state] Locking ICCM
3,163,222 UART: [exit] Launching FMC @ 0x40000130
3,168,551 UART:
3,168,567 UART: Running Caliptra FMC ...
3,168,975 UART:
3,169,029 UART: [state] CFI Enabled
3,179,710 UART: [fht] FMC Alias Private Key: 7
3,287,973 UART: [art] Extend RT PCRs Done
3,288,401 UART: [art] Lock RT PCRs Done
3,290,149 UART: [art] Populate DV Done
3,298,242 UART: [fht] FMC Alias Private Key: 7
3,299,400 UART: [art] Derive CDI
3,299,680 UART: [art] Store in in slot 0x4
3,385,395 UART: [art] Derive Key Pair
3,385,755 UART: [art] Store priv key in slot 0x5
3,399,175 UART: [art] Derive Key Pair - Done
3,413,596 UART: [art] Signing Cert with AUTHO
3,414,076 UART: RITY.KEYID = 7
3,428,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,699 UART: [art] PUB.X = 6BA634B0A621E2810639592F97B4BCC8F2A3EBA96E5AEF30AEA0E634BC935603F7B0C88FC06163F3115EB8C91F35EC1D
3,436,477 UART: [art] PUB.Y = 624E065E61B08D5F17AFB419F0BD7313794A3021EA08B4D92F0735825666C91D9675C93787D7C7DFAA10A4911574274B
3,443,412 UART: [art] SIG.R = 4A4F75B568AF5F6607F1F055C2A2B85A09CAC69535BAACFF9CB0BC563A9BED1A50D2B1A9EB7EFA942BF6E3952FDE6967
3,450,202 UART: [art] SIG.S = 8639D7772C838B6267B01C15BDC1772D30DA91F1071396866296317EFFB189CEE74D4951D08B5DADB6FDD1FC13C433E5
3,474,492 UART: Caliptra RT
3,474,745 UART: [state] CFI Enabled
3,582,376 UART: [rt] RT listening for mailbox commands...
3,583,046 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,872 UART: [rt]cmd =0x50435252, len=8
3,614,457 >>> mbox cmd response data (8 bytes)
3,614,458 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,240 UART:
3,615,256 UART: Running Caliptra ROM ...
3,615,664 UART:
3,615,718 UART: [state] CFI Enabled
3,618,146 UART: [state] LifecycleState = Unprovisioned
3,618,801 UART: [state] DebugLocked = No
3,619,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,082 UART: [kat] SHA2-256
4,415,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,128 UART: [kat] ++
4,419,280 UART: [kat] sha1
4,423,480 UART: [kat] SHA2-256
4,425,418 UART: [kat] SHA2-384
4,428,059 UART: [kat] SHA2-512-ACC
4,429,959 UART: [kat] ECC-384
4,435,256 UART: [kat] HMAC-384Kdf
4,439,722 UART: [kat] LMS
5,007,918 UART: [kat] --
5,008,777 UART: [update-reset] ++
5,935,439 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,936,617 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,033,051 >>> mbox cmd response: success
6,033,051 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,033,190 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,204 UART: [update-reset Success] --
6,042,463 UART: [state] Locking Datavault
6,043,303 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,907 UART: [state] Locking ICCM
6,044,409 UART: [exit] Launching FMC @ 0x40000130
6,049,738 UART:
6,049,754 UART: Running Caliptra FMC ...
6,050,162 UART:
6,050,216 UART: [state] CFI Enabled
6,139,739 UART: [art] Extend RT PCRs Done
6,140,167 UART: [art] Lock RT PCRs Done
6,141,770 UART: [art] Populate DV Done
6,150,071 UART: [fht] FMC Alias Private Key: 7
6,151,051 UART: [art] Derive CDI
6,151,331 UART: [art] Store in in slot 0x4
6,236,812 UART: [art] Derive Key Pair
6,237,172 UART: [art] Store priv key in slot 0x5
6,250,438 UART: [art] Derive Key Pair - Done
6,265,299 UART: [art] Signing Cert with AUTHO
6,265,779 UART: RITY.KEYID = 7
6,280,935 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,700 UART: [art] PUB.X = 67EFA0CED4AB69F9003078937E84324B0A6FCE63C8AA9AD2061DB49C6CFC35EED19533C08B477D41DFE4C90630447094
6,288,449 UART: [art] PUB.Y = 8276D218F772395AC45FA5B2FAD5015B7048C0D0CFEE96630E9AC9F51A30DE3FAA08F3266681CD7CA51EE4F9608CBA42
6,295,404 UART: [art] SIG.R = 52D2499BB2FDCC0BD709428AC9E50B3FA00FD383D8573C7082F9DB3EE8E696DA98E2604007B8D72949B79C05639C78DE
6,302,164 UART: [art] SIG.S = A5CBB0D79C253F8803D749C8A82C0D2DCC1E83B2E185D883C12F9A682960859AA2AE5C228C2BD3B45F78ACA9B8B84F5E
6,326,225 UART: mbox::rt_entry...
6,326,597 UART: ____ _ _ _ ____ _____
6,327,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,328,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,717 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,485 UART: |_|
6,330,797 UART:
6,617,725 UART: [rt] Runtime listening for mailbox commands...
6,618,772 >>> mbox cmd response data (128 bytes)
6,618,773 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,618,887 UART:
6,618,903 UART: Running Caliptra ROM ...
6,619,311 UART:
6,619,365 UART: [state] CFI Enabled
6,621,815 UART: [state] LifecycleState = Unprovisioned
6,622,470 UART: [state] DebugLocked = No
6,623,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,624,679 UART: [kat] SHA2-256
7,418,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,422,725 UART: [kat] ++
7,422,877 UART: [kat] sha1
7,427,131 UART: [kat] SHA2-256
7,429,069 UART: [kat] SHA2-384
7,431,598 UART: [kat] SHA2-512-ACC
7,433,498 UART: [kat] ECC-384
7,439,067 UART: [kat] HMAC-384Kdf
7,443,571 UART: [kat] LMS
8,011,767 UART: [kat] --
8,012,548 UART: [update-reset] ++
8,938,964 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,940,140 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,036,574 >>> mbox cmd response: success
9,036,574 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,036,791 UART: [update-reset] Copying MAN_2 To MAN_1
9,044,805 UART: [update-reset Success] --
9,045,918 UART: [state] Locking Datavault
9,046,820 UART: [state] Locking PCR0, PCR1 and PCR31
9,047,424 UART: [state] Locking ICCM
9,048,030 UART: [exit] Launching FMC @ 0x40000130
9,053,359 UART:
9,053,375 UART: Running Caliptra FMC ...
9,053,783 UART:
9,053,837 UART: [state] CFI Enabled
9,143,244 UART: [art] Extend RT PCRs Done
9,143,672 UART: [art] Lock RT PCRs Done
9,144,851 UART: [art] Populate DV Done
9,153,080 UART: [fht] FMC Alias Private Key: 7
9,154,122 UART: [art] Derive CDI
9,154,402 UART: [art] Store in in slot 0x4
9,240,569 UART: [art] Derive Key Pair
9,240,929 UART: [art] Store priv key in slot 0x5
9,254,483 UART: [art] Derive Key Pair - Done
9,269,243 UART: [art] Signing Cert with AUTHO
9,269,723 UART: RITY.KEYID = 7
9,284,657 UART: [art] Erasing AUTHORITY.KEYID = 7
9,285,422 UART: [art] PUB.X = 18F1EF1A23C5479D587855D95218C260BAAC326A491322081ED20E2FD84969993A7A8E31343400D61FC18DC88B8FCBB7
9,292,164 UART: [art] PUB.Y = 106CABB7A48331528E4A45119DBF12A56D1E833019E8B02E9FC6ABDEC5BE7765D4193889E013405E3ADF7228E2B86E37
9,299,120 UART: [art] SIG.R = 2F41100C488322FEF48E6AF6135D46805E471F4635633B1F8BA8C076FDA15D5528B9AA2CF02A867B3ED7C062CAD2603F
9,305,893 UART: [art] SIG.S = 7914CFE43ED9F7AD9BC11340F61D3D7517714F9488AEEC0EF9F348F8E5333EC0FC4BE129548FCD6BD7D409D3BD51D049
9,329,936 UART: mbox::rt_entry...
9,330,308 UART: ____ _ _ _ ____ _____
9,331,092 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,331,892 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,332,660 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,333,428 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,334,196 UART: |_|
9,334,508 UART:
9,619,519 UART: [rt] Runtime listening for mailbox commands...
9,620,566 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,195 ready_for_fw is high
1,363,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,649 >>> mbox cmd response: success
2,993,169 UART:
2,993,185 UART: Running Caliptra FMC ...
2,993,593 UART:
2,993,647 UART: [state] CFI Enabled
3,004,448 UART: [fht] FMC Alias Private Key: 7
3,112,223 UART: [art] Extend RT PCRs Done
3,112,651 UART: [art] Lock RT PCRs Done
3,114,113 UART: [art] Populate DV Done
3,122,406 UART: [fht] FMC Alias Private Key: 7
3,123,530 UART: [art] Derive CDI
3,123,810 UART: [art] Store in in slot 0x4
3,209,471 UART: [art] Derive Key Pair
3,209,831 UART: [art] Store priv key in slot 0x5
3,222,575 UART: [art] Derive Key Pair - Done
3,237,246 UART: [art] Signing Cert with AUTHO
3,237,726 UART: RITY.KEYID = 7
3,252,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,477 UART: [art] PUB.X = F5E13B223CFE8DBDD340756A72E2FEDC08452E88DB9289EB5E60DB0EFF4376F630D64663A51A284065936A1167102242
3,260,243 UART: [art] PUB.Y = 197DC71F9218C1CFBF00982D9CA3948282EA66AB5C52A7340C9D877DE42106F23BBFB8144B614500CC0488E77B4660B8
3,267,142 UART: [art] SIG.R = DBFF3D1A4D3E55C10EF949780385325B696F666B8E94727A59942A4345C3460BCF116CDC83F4BB084B040B5785C4F3A1
3,273,896 UART: [art] SIG.S = ACA2348271D1D30A7069925F9270118961A3AF2400C033D8AC9C5ED1E5505242DD62A558D47FA0559971DAF57E3848DF
3,297,794 UART: Caliptra RT
3,298,047 UART: [state] CFI Enabled
3,405,993 UART: [rt] RT listening for mailbox commands...
3,406,663 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,635 UART: [rt]cmd =0x50435252, len=8
3,438,212 >>> mbox cmd response data (8 bytes)
3,438,213 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,738,808 >>> mbox cmd response: success
5,738,808 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,752,347 UART:
5,752,363 UART: Running Caliptra FMC ...
5,752,771 UART:
5,752,825 UART: [state] CFI Enabled
5,841,572 UART: [art] Extend RT PCRs Done
5,842,000 UART: [art] Lock RT PCRs Done
5,843,185 UART: [art] Populate DV Done
5,851,512 UART: [fht] FMC Alias Private Key: 7
5,852,464 UART: [art] Derive CDI
5,852,744 UART: [art] Store in in slot 0x4
5,938,279 UART: [art] Derive Key Pair
5,938,639 UART: [art] Store priv key in slot 0x5
5,951,215 UART: [art] Derive Key Pair - Done
5,966,047 UART: [art] Signing Cert with AUTHO
5,966,527 UART: RITY.KEYID = 7
5,981,895 UART: [art] Erasing AUTHORITY.KEYID = 7
5,982,660 UART: [art] PUB.X = 8553229FDBD971077329ABE81DF41B2FB9D377865A7669E4DDBA6DF6CD1B5C4445410D441B6C8B1624AC13D2B0988136
5,989,428 UART: [art] PUB.Y = 2AF9873B2F29345B831E20B323896662576C19B39600D1BA7C91713E49492B4F467E1D4067B7D593C3592BE7B754CEA5
5,996,348 UART: [art] SIG.R = 7EFC90BF3698E089385E9A113E0C07408B9F5D8AC38EDFD10C433C558F0D117CD513B2D76D69CC6F5D1424A3A2B5ED8B
6,003,120 UART: [art] SIG.S = 14EBEF24CEE1AC9744A606CA56A4C0203397FF3BECAEF4A2EE85C22A723EC039575BE6CEBF3169F4E40F3159B5467332
6,026,819 UART: mbox::rt_entry...
6,027,191 UART: ____ _ _ _ ____ _____
6,027,975 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,028,775 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,029,543 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,030,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,031,079 UART: |_|
6,031,391 UART:
6,315,308 UART: [rt] Runtime listening for mailbox commands...
6,316,355 >>> mbox cmd response data (128 bytes)
6,316,356 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,616,513 >>> mbox cmd response: success
8,616,513 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,629,876 UART:
8,629,892 UART: Running Caliptra FMC ...
8,630,300 UART:
8,630,354 UART: [state] CFI Enabled
8,719,629 UART: [art] Extend RT PCRs Done
8,720,057 UART: [art] Lock RT PCRs Done
8,721,072 UART: [art] Populate DV Done
8,729,093 UART: [fht] FMC Alias Private Key: 7
8,730,041 UART: [art] Derive CDI
8,730,321 UART: [art] Store in in slot 0x4
8,815,870 UART: [art] Derive Key Pair
8,816,230 UART: [art] Store priv key in slot 0x5
8,829,014 UART: [art] Derive Key Pair - Done
8,843,826 UART: [art] Signing Cert with AUTHO
8,844,306 UART: RITY.KEYID = 7
8,859,346 UART: [art] Erasing AUTHORITY.KEYID = 7
8,860,111 UART: [art] PUB.X = 852E0193D90BEE34259F5FFCBB21AEE0A161D7ACC843E4F918A217A3C6B567F73F09704F375A281F3EE783386CCBD302
8,866,879 UART: [art] PUB.Y = 89494C3C6177395B034808A64C18998CEBD19C5C4E8CCC6E3E8C7353D9DC3F2142AA05FF21A569CF23F30F5BD923251A
8,873,823 UART: [art] SIG.R = DA38C1A085C84040F9F2A1835B7F65F6824A42CF5B0345CE1A6DA68CECD7BED5DDAF4C9C9EDF9CCDDB2E9A78CA6D38F5
8,880,622 UART: [art] SIG.S = D9A743F8AB53C398F8A8AAEF9F3A67A1180B780E3F163AD8B2DAABDC583BD62E32BF57E85D59F4DE76D777CA0F82ED17
8,904,442 UART: mbox::rt_entry...
8,904,814 UART: ____ _ _ _ ____ _____
8,905,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,906,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,907,166 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,907,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,908,702 UART: |_|
8,909,014 UART:
9,191,337 UART: [rt] Runtime listening for mailbox commands...
9,192,384 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,493 UART: [kat] SHA2-512-ACC
897,394 UART: [kat] ECC-384
902,947 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,568 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 ready_for_fw is high
1,481,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,943 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,577 UART: [idev] --
1,515,632 UART: [ldev] ++
1,515,800 UART: [ldev] CDI.KEYID = 6
1,516,163 UART: [ldev] SUBJECT.KEYID = 5
1,516,589 UART: [ldev] AUTHORITY.KEYID = 7
1,517,052 UART: [ldev] FE.KEYID = 1
1,522,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,731 UART: [ldev] --
1,587,156 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 114448 bytes
2,888,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,527 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,858 >>> mbox cmd response: success
3,081,936 UART: [afmc] ++
3,082,104 UART: [afmc] CDI.KEYID = 6
3,082,466 UART: [afmc] SUBJECT.KEYID = 7
3,082,891 UART: [afmc] AUTHORITY.KEYID = 5
3,118,392 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,811 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,501 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,362 UART: [afmc] --
3,161,490 UART: [cold-reset] --
3,162,130 UART: [state] Locking Datavault
3,163,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,869 UART: [state] Locking ICCM
3,164,405 UART: [exit] Launching FMC @ 0x40000130
3,169,734 UART:
3,169,750 UART: Running Caliptra FMC ...
3,170,158 UART:
3,170,301 UART: [state] CFI Enabled
3,180,504 UART: [fht] FMC Alias Private Key: 7
3,288,327 UART: [art] Extend RT PCRs Done
3,288,755 UART: [art] Lock RT PCRs Done
3,290,211 UART: [art] Populate DV Done
3,298,096 UART: [fht] FMC Alias Private Key: 7
3,299,050 UART: [art] Derive CDI
3,299,330 UART: [art] Store in in slot 0x4
3,384,575 UART: [art] Derive Key Pair
3,384,935 UART: [art] Store priv key in slot 0x5
3,398,295 UART: [art] Derive Key Pair - Done
3,413,210 UART: [art] Signing Cert with AUTHO
3,413,690 UART: RITY.KEYID = 7
3,429,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,779 UART: [art] PUB.X = 4CCE12A116E6A4BBADDA372BA75535A59A5DF9383D122BD060DEAD134ACACDB777187BFB2C42AB8C9BE22679D16FB9BD
3,436,577 UART: [art] PUB.Y = 3520D0A85EE2763B7DC2C244E2072A936F323847D74BDD367DC0F22553A3C6AAAD08C00F5563C7CDAB0CD212D8B6284B
3,443,525 UART: [art] SIG.R = FA4A113A4EF7527795DFB392D66CA14715F1C034410DC998D094A2FA3CDAA8F8C122E5CB6670962C843BD1CE3E12F0D2
3,450,304 UART: [art] SIG.S = 6A961ADB3FA394574EB1225EBEEB6FBEBE5AF9F6772A8DE5A7686783137E00A5E73E5FDB27EC63C04AF4D0252B05892D
3,474,718 UART: Caliptra RT
3,475,063 UART: [state] CFI Enabled
3,582,904 UART: [rt] RT listening for mailbox commands...
3,583,574 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,676 UART: [rt]cmd =0x50435252, len=8
3,615,219 >>> mbox cmd response data (8 bytes)
3,615,220 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,976 UART:
3,615,992 UART: Running Caliptra ROM ...
3,616,400 UART:
3,616,541 UART: [state] CFI Enabled
3,619,725 UART: [state] LifecycleState = Unprovisioned
3,620,380 UART: [state] DebugLocked = No
3,620,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,601 UART: [kat] SHA2-256
4,416,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,647 UART: [kat] ++
4,420,799 UART: [kat] sha1
4,425,009 UART: [kat] SHA2-256
4,426,947 UART: [kat] SHA2-384
4,429,858 UART: [kat] SHA2-512-ACC
4,431,758 UART: [kat] ECC-384
4,437,405 UART: [kat] HMAC-384Kdf
4,441,867 UART: [kat] LMS
5,010,063 UART: [kat] --
5,010,966 UART: [update-reset] ++
5,937,668 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,772 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,035,206 >>> mbox cmd response: success
6,035,206 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,035,383 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,397 UART: [update-reset Success] --
6,044,400 UART: [state] Locking Datavault
6,045,014 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,618 UART: [state] Locking ICCM
6,046,066 UART: [exit] Launching FMC @ 0x40000130
6,051,395 UART:
6,051,411 UART: Running Caliptra FMC ...
6,051,819 UART:
6,051,962 UART: [state] CFI Enabled
6,141,015 UART: [art] Extend RT PCRs Done
6,141,443 UART: [art] Lock RT PCRs Done
6,143,040 UART: [art] Populate DV Done
6,151,161 UART: [fht] FMC Alias Private Key: 7
6,152,227 UART: [art] Derive CDI
6,152,507 UART: [art] Store in in slot 0x4
6,237,998 UART: [art] Derive Key Pair
6,238,358 UART: [art] Store priv key in slot 0x5
6,251,214 UART: [art] Derive Key Pair - Done
6,266,073 UART: [art] Signing Cert with AUTHO
6,266,553 UART: RITY.KEYID = 7
6,281,191 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,956 UART: [art] PUB.X = 3D93A58820B05397B49CD4461F4CD7C4DA2F4211D228BE12BFBB324AF1179EE4D82763E614FCED72FFC909722A1DEAB2
6,288,737 UART: [art] PUB.Y = BF2BCEF02B4281293EBCFC4F1EF2916820DA0243FD962C6AB31AD8AA9C79042B46DFB7479447444B51A5443617C0E082
6,295,689 UART: [art] SIG.R = B910E983E80F38CA26200125CD6525D2F5DB5EE5DE2B3279DA6108804EE5B3F9D2EAF0E9EC2AB6295EF41DFDC42B5759
6,302,466 UART: [art] SIG.S = AFBF431E477DE267CBC7628FAE24F85EEFA6DC7590AF8C04618C213779294A713159E642348EF9A8C954F465A103FC89
6,325,993 UART: mbox::rt_entry...
6,326,365 UART: ____ _ _ _ ____ _____
6,327,149 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,327,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,328,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,485 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,253 UART: |_|
6,330,565 UART:
6,611,780 UART: [rt] Runtime listening for mailbox commands...
6,612,827 >>> mbox cmd response data (128 bytes)
6,612,828 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,612,942 UART:
6,612,958 UART: Running Caliptra ROM ...
6,613,366 UART:
6,613,507 UART: [state] CFI Enabled
6,616,361 UART: [state] LifecycleState = Unprovisioned
6,617,016 UART: [state] DebugLocked = No
6,617,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,619,207 UART: [kat] SHA2-256
7,413,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,417,253 UART: [kat] ++
7,417,405 UART: [kat] sha1
7,421,669 UART: [kat] SHA2-256
7,423,607 UART: [kat] SHA2-384
7,426,276 UART: [kat] SHA2-512-ACC
7,428,176 UART: [kat] ECC-384
7,433,915 UART: [kat] HMAC-384Kdf
7,438,607 UART: [kat] LMS
8,006,803 UART: [kat] --
8,007,748 UART: [update-reset] ++
8,934,642 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,935,746 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,032,180 >>> mbox cmd response: success
9,032,180 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,032,529 UART: [update-reset] Copying MAN_2 To MAN_1
9,040,543 UART: [update-reset Success] --
9,041,476 UART: [state] Locking Datavault
9,042,342 UART: [state] Locking PCR0, PCR1 and PCR31
9,042,946 UART: [state] Locking ICCM
9,043,414 UART: [exit] Launching FMC @ 0x40000130
9,048,743 UART:
9,048,759 UART: Running Caliptra FMC ...
9,049,167 UART:
9,049,310 UART: [state] CFI Enabled
9,138,287 UART: [art] Extend RT PCRs Done
9,138,715 UART: [art] Lock RT PCRs Done
9,140,184 UART: [art] Populate DV Done
9,148,253 UART: [fht] FMC Alias Private Key: 7
9,149,431 UART: [art] Derive CDI
9,149,711 UART: [art] Store in in slot 0x4
9,235,208 UART: [art] Derive Key Pair
9,235,568 UART: [art] Store priv key in slot 0x5
9,248,262 UART: [art] Derive Key Pair - Done
9,263,159 UART: [art] Signing Cert with AUTHO
9,263,639 UART: RITY.KEYID = 7
9,278,907 UART: [art] Erasing AUTHORITY.KEYID = 7
9,279,672 UART: [art] PUB.X = EA88757007D28717BC1538C2729985B892E9FB37E5AA9BBB3B8F601454DF5AD0376FFDA894BE9AEEBF058389DD5553CC
9,286,448 UART: [art] PUB.Y = CF4B85FFF1C5BFF6CAC74B316A49891A82B9B824CC352DEC7FF701030FED47A60E3D0300638C30452342546C04B7A38D
9,293,368 UART: [art] SIG.R = 937C715F00820A952D6BEF10E346B42F6AE9EFD7E9D34538577D032959558FFE94706D02207E9ECFF982A9441F434C17
9,300,105 UART: [art] SIG.S = C4C86AE65E575D2E9551B4AC6671D19002D4D03EFA4A5551746FA350E09FC08432BC5DF693B54F8247E84A4915A5E878
9,324,335 UART: mbox::rt_entry...
9,324,707 UART: ____ _ _ _ ____ _____
9,325,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,326,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,327,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,327,827 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,328,595 UART: |_|
9,328,907 UART:
9,607,882 UART: [rt] Runtime listening for mailbox commands...
9,608,929 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 ready_for_fw is high
1,363,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,284 >>> mbox cmd response: success
2,993,180 UART:
2,993,196 UART: Running Caliptra FMC ...
2,993,604 UART:
2,993,747 UART: [state] CFI Enabled
3,004,120 UART: [fht] FMC Alias Private Key: 7
3,112,085 UART: [art] Extend RT PCRs Done
3,112,513 UART: [art] Lock RT PCRs Done
3,114,205 UART: [art] Populate DV Done
3,122,552 UART: [fht] FMC Alias Private Key: 7
3,123,722 UART: [art] Derive CDI
3,124,002 UART: [art] Store in in slot 0x4
3,209,555 UART: [art] Derive Key Pair
3,209,915 UART: [art] Store priv key in slot 0x5
3,223,439 UART: [art] Derive Key Pair - Done
3,238,050 UART: [art] Signing Cert with AUTHO
3,238,530 UART: RITY.KEYID = 7
3,253,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,719 UART: [art] PUB.X = 22FE438FDD9887D670FCDF83DB6933AA56C63FED70FB4D733AC788ADC187B94C793C4C338DDF184A4CB338F58C281A56
3,261,505 UART: [art] PUB.Y = 6EA061CC99DA7CA1F5CAC80D0F1B56B86E01216077FE028A26109803301F3E0B4F88CD9FCBCED5D7F06C78415CA26817
3,268,449 UART: [art] SIG.R = 13B061BA461DE08FD3C5C0FB6FEE6AD807DCAD13E45ED7705E9FC84F2D9FF51C63129E935CEDB01EAB5C38271DE0DBCC
3,275,246 UART: [art] SIG.S = 76C3FA950821AF385EA4CF18DF1D2AA4E6DDB536CC2416887FA0F1B235B7D8D61126358CE3C2C05A999521863EDF5A6B
3,299,800 UART: Caliptra RT
3,300,145 UART: [state] CFI Enabled
3,408,801 UART: [rt] RT listening for mailbox commands...
3,409,471 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,095 UART: [rt]cmd =0x50435252, len=8
3,440,766 >>> mbox cmd response data (8 bytes)
3,440,767 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,744,017 >>> mbox cmd response: success
5,744,017 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,757,478 UART:
5,757,494 UART: Running Caliptra FMC ...
5,757,902 UART:
5,758,045 UART: [state] CFI Enabled
5,847,654 UART: [art] Extend RT PCRs Done
5,848,082 UART: [art] Lock RT PCRs Done
5,849,197 UART: [art] Populate DV Done
5,857,274 UART: [fht] FMC Alias Private Key: 7
5,858,328 UART: [art] Derive CDI
5,858,608 UART: [art] Store in in slot 0x4
5,944,293 UART: [art] Derive Key Pair
5,944,653 UART: [art] Store priv key in slot 0x5
5,958,379 UART: [art] Derive Key Pair - Done
5,972,941 UART: [art] Signing Cert with AUTHO
5,973,421 UART: RITY.KEYID = 7
5,988,751 UART: [art] Erasing AUTHORITY.KEYID = 7
5,989,516 UART: [art] PUB.X = EB989E40F98C99F13D323007EF3ABC31E3012D76EF08311EC9A090FB566525E8DC4CD3EFF2617CF3DA44C35B1A9FECB1
5,996,295 UART: [art] PUB.Y = 9268FB63405069B10215836E76AFE54A8360B270C60D40B4A30AB1FC4FFDD95BAC29D55B56643D6C7C1222FCB2E5DC05
6,003,241 UART: [art] SIG.R = 11B916BCB0778503EBF5D2B1DEC9290F4AF0D2CB7E0164448827046674A674E2644AFA122E579463D5F4C4936727145C
6,009,995 UART: [art] SIG.S = F85A1E8F67A5D9048693EBE34095AB9EB5CFE48B4BC91767BA962823CCDF5CC663F0E8BAD9D65EDB2CA5C8A928225D0B
6,034,032 UART: mbox::rt_entry...
6,034,404 UART: ____ _ _ _ ____ _____
6,035,188 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,035,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,036,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,037,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,038,292 UART: |_|
6,038,604 UART:
6,323,348 UART: [rt] Runtime listening for mailbox commands...
6,324,395 >>> mbox cmd response data (128 bytes)
6,324,396 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,624,320 >>> mbox cmd response: success
8,624,320 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,637,701 UART:
8,637,717 UART: Running Caliptra FMC ...
8,638,125 UART:
8,638,268 UART: [state] CFI Enabled
8,727,321 UART: [art] Extend RT PCRs Done
8,727,749 UART: [art] Lock RT PCRs Done
8,729,030 UART: [art] Populate DV Done
8,737,213 UART: [fht] FMC Alias Private Key: 7
8,738,371 UART: [art] Derive CDI
8,738,651 UART: [art] Store in in slot 0x4
8,824,774 UART: [art] Derive Key Pair
8,825,134 UART: [art] Store priv key in slot 0x5
8,838,026 UART: [art] Derive Key Pair - Done
8,852,768 UART: [art] Signing Cert with AUTHO
8,853,248 UART: RITY.KEYID = 7
8,868,804 UART: [art] Erasing AUTHORITY.KEYID = 7
8,869,569 UART: [art] PUB.X = 4648AA885C2C07AA333CD1A8F802B26328C5AD293E6BDC5B2D7F44F690C5B427C4EDD2492134BA4F2734F0AC1774D0A0
8,876,343 UART: [art] PUB.Y = C9C2BD89E7634ABE0E83BBBE6B153CAC7F9B5ACD6C9512AD42F2F258382F9BD81BB950AF4E7E5954119717796698D6FF
8,883,306 UART: [art] SIG.R = FCF8A8E03DEC0A086758CA4D6EAA13EE7C7E5270DB96AD9DF5F82D00E04B841535B4F0B42C9BB8A6995F02C4EBC96A5E
8,890,069 UART: [art] SIG.S = C5B98387733A67C8AD61635BC4662EC0A4E9C067A79984CD838B816BD7ED3A6CD36424AA226C4C65897304F91F59C8C0
8,913,847 UART: mbox::rt_entry...
8,914,219 UART: ____ _ _ _ ____ _____
8,915,003 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,915,803 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,916,571 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,917,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,918,107 UART: |_|
8,918,419 UART:
9,201,792 UART: [rt] Runtime listening for mailbox commands...
9,202,839 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,591 UART: [kat] SHA2-256
903,531 UART: [kat] SHA2-384
906,412 UART: [kat] SHA2-512-ACC
908,313 UART: [kat] ECC-384
917,862 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 ready_for_fw is high
1,175,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,428 UART: [idev] Erasing UDS.KEYID = 0
1,200,503 UART: [idev] Sha1 KeyId Algorithm
1,208,967 UART: [idev] --
1,210,129 UART: [ldev] ++
1,210,297 UART: [ldev] CDI.KEYID = 6
1,210,660 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,022 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,576 >>> mbox cmd response: success
2,776,594 UART: [afmc] ++
2,776,762 UART: [afmc] CDI.KEYID = 6
2,777,124 UART: [afmc] SUBJECT.KEYID = 7
2,777,549 UART: [afmc] AUTHORITY.KEYID = 5
2,813,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,021 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,803 UART: [afmc] --
2,856,775 UART: [cold-reset] --
2,857,633 UART: [state] Locking Datavault
2,858,862 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,466 UART: [state] Locking ICCM
2,859,948 UART: [exit] Launching FMC @ 0x40000130
2,865,277 UART:
2,865,293 UART: Running Caliptra FMC ...
2,865,701 UART:
2,865,755 UART: [state] CFI Enabled
2,876,132 UART: [fht] FMC Alias Private Key: 7
2,983,875 UART: [art] Extend RT PCRs Done
2,984,303 UART: [art] Lock RT PCRs Done
2,985,893 UART: [art] Populate DV Done
2,994,336 UART: [fht] FMC Alias Private Key: 7
2,995,492 UART: [art] Derive CDI
2,995,772 UART: [art] Store in in slot 0x4
3,081,531 UART: [art] Derive Key Pair
3,081,891 UART: [art] Store priv key in slot 0x5
3,095,409 UART: [art] Derive Key Pair - Done
3,109,969 UART: [art] Signing Cert with AUTHO
3,110,449 UART: RITY.KEYID = 7
3,125,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,222 UART: [art] PUB.X = 83D6075CAF2C9E3619EBF963591712178766776EA82E738B068CE5E90D4E45FFA4C36AA6A14E9D631D71308D738CD8B3
3,132,985 UART: [art] PUB.Y = FA0C03FC712DB495D638404F13909132179EC40DF73F2289BEB7C11EFEFB1B65EE499B22098250DF38AD604230487D5F
3,139,927 UART: [art] SIG.R = 3A8B8828D6723055210B81EE31B8BD31130F18658AAF18AE05EF5196445067EEB9E5F31565146FD4F8DCC7F3C26BB91B
3,146,692 UART: [art] SIG.S = B2E30D6FEA8885BDE30BFA929186EFD197FD17CCB1A9884A41E7F15B1B208768F6AA52CCC9A65F823AC82B261F42E003
3,169,976 UART: Caliptra RT
3,170,229 UART: [state] CFI Enabled
3,278,780 UART: [rt] RT listening for mailbox commands...
3,279,450 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,198 UART: [rt]cmd =0x50435252, len=8
3,310,675 >>> mbox cmd response data (8 bytes)
3,310,676 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,671 UART:
3,311,687 UART: Running Caliptra ROM ...
3,312,095 UART:
3,312,150 UART: [state] CFI Enabled
3,314,954 UART: [state] LifecycleState = Unprovisioned
3,315,609 UART: [state] DebugLocked = No
3,316,159 UART: [state] WD Timer not started. Device not locked for debugging
3,317,361 UART: [kat] SHA2-256
4,123,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,136 UART: [kat] ++
4,127,288 UART: [kat] sha1
4,131,490 UART: [kat] SHA2-256
4,133,430 UART: [kat] SHA2-384
4,136,021 UART: [kat] SHA2-512-ACC
4,137,921 UART: [kat] ECC-384
4,147,422 UART: [kat] HMAC-384Kdf
4,152,072 UART: [kat] LMS
4,400,400 UART: [kat] --
4,401,326 UART: [update-reset] ++
5,305,650 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,823 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,403,205 >>> mbox cmd response: success
5,403,205 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,403,372 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,386 UART: [update-reset Success] --
5,412,195 UART: [state] Locking Datavault
5,412,765 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,369 UART: [state] Locking ICCM
5,413,843 UART: [exit] Launching FMC @ 0x40000130
5,419,172 UART:
5,419,188 UART: Running Caliptra FMC ...
5,419,596 UART:
5,419,650 UART: [state] CFI Enabled
5,507,975 UART: [art] Extend RT PCRs Done
5,508,403 UART: [art] Lock RT PCRs Done
5,509,888 UART: [art] Populate DV Done
5,518,049 UART: [fht] FMC Alias Private Key: 7
5,519,081 UART: [art] Derive CDI
5,519,361 UART: [art] Store in in slot 0x4
5,605,086 UART: [art] Derive Key Pair
5,605,446 UART: [art] Store priv key in slot 0x5
5,618,928 UART: [art] Derive Key Pair - Done
5,634,077 UART: [art] Signing Cert with AUTHO
5,634,557 UART: RITY.KEYID = 7
5,650,291 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,056 UART: [art] PUB.X = BF78445F1D9C718DBFBCC5F97B04757D388D8EFE635ADA4A37F4AEA3C33260BF1BC344FC945548074368027A299984C4
5,657,825 UART: [art] PUB.Y = 4ECD39A17AB5A9CEA3AAF654BE6F90C27B3707B296201C1A32D316089367C7F39B151FBBCEA675F7BA4A86EBDDE8B288
5,664,789 UART: [art] SIG.R = 8EF45C01B7EE49180280907A0917BC07C6A60421D4A03B88EE84C1999658C6092E4FEB11E72AC9D7A2DF34359C749547
5,671,539 UART: [art] SIG.S = EE7F1125912E05241856F9F687C530DD01E43A563718B28D068E4FFFCA18C11E56139A0C2CD24AEE9C2B82B9A91973FF
5,695,162 UART: mbox::rt_entry...
5,695,534 UART: ____ _ _ _ ____ _____
5,696,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,422 UART: |_|
5,699,734 UART:
5,981,435 UART: [rt] Runtime listening for mailbox commands...
5,982,482 >>> mbox cmd response data (128 bytes)
5,982,483 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,982,594 UART:
5,982,610 UART: Running Caliptra ROM ...
5,983,018 UART:
5,983,073 UART: [state] CFI Enabled
5,986,087 UART: [state] LifecycleState = Unprovisioned
5,986,742 UART: [state] DebugLocked = No
5,987,446 UART: [state] WD Timer not started. Device not locked for debugging
5,988,634 UART: [kat] SHA2-256
6,794,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,798,409 UART: [kat] ++
6,798,561 UART: [kat] sha1
6,802,695 UART: [kat] SHA2-256
6,804,635 UART: [kat] SHA2-384
6,807,282 UART: [kat] SHA2-512-ACC
6,809,182 UART: [kat] ECC-384
6,818,627 UART: [kat] HMAC-384Kdf
6,823,079 UART: [kat] LMS
7,071,407 UART: [kat] --
7,072,147 UART: [update-reset] ++
7,977,421 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,978,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,004 >>> mbox cmd response: success
8,075,004 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,075,207 UART: [update-reset] Copying MAN_2 To MAN_1
8,083,221 UART: [update-reset Success] --
8,084,116 UART: [state] Locking Datavault
8,084,754 UART: [state] Locking PCR0, PCR1 and PCR31
8,085,358 UART: [state] Locking ICCM
8,085,840 UART: [exit] Launching FMC @ 0x40000130
8,091,169 UART:
8,091,185 UART: Running Caliptra FMC ...
8,091,593 UART:
8,091,647 UART: [state] CFI Enabled
8,180,562 UART: [art] Extend RT PCRs Done
8,180,990 UART: [art] Lock RT PCRs Done
8,182,193 UART: [art] Populate DV Done
8,190,280 UART: [fht] FMC Alias Private Key: 7
8,191,382 UART: [art] Derive CDI
8,191,662 UART: [art] Store in in slot 0x4
8,277,239 UART: [art] Derive Key Pair
8,277,599 UART: [art] Store priv key in slot 0x5
8,291,213 UART: [art] Derive Key Pair - Done
8,306,223 UART: [art] Signing Cert with AUTHO
8,306,703 UART: RITY.KEYID = 7
8,321,915 UART: [art] Erasing AUTHORITY.KEYID = 7
8,322,680 UART: [art] PUB.X = A83E50BC1ECFD3381CA16861FBAD5BBCC72B182F3B03D298F49B098663E889B785D7B06F8A12AE93ADD95CBAA9C0C119
8,329,464 UART: [art] PUB.Y = C9AF5C36E7C1746CC7AC656F3BB83B1976E719B990B71AF3B22F407E773906ED75532245F96D7DFA6EC45C099E2CFFC1
8,336,420 UART: [art] SIG.R = 868C43D62BF5AF9792D6EABC7C72C0196D26D5BF37BB14128557A49FD501CBA579D95480B11E3D1F88614560BC8C86EB
8,343,195 UART: [art] SIG.S = ECBD211EC6621B9915FB879585BFDD2ACA72F8B8E57E17F5F88EB63B9722EA7907184B9483315CA4A4494683F988F7EB
8,367,057 UART: mbox::rt_entry...
8,367,429 UART: ____ _ _ _ ____ _____
8,368,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,369,013 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,549 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,317 UART: |_|
8,371,629 UART:
8,650,976 UART: [rt] Runtime listening for mailbox commands...
8,652,023 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,363 ready_for_fw is high
1,060,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,771 >>> mbox cmd response: success
2,690,545 UART:
2,690,561 UART: Running Caliptra FMC ...
2,690,969 UART:
2,691,023 UART: [state] CFI Enabled
2,701,558 UART: [fht] FMC Alias Private Key: 7
2,809,939 UART: [art] Extend RT PCRs Done
2,810,367 UART: [art] Lock RT PCRs Done
2,811,777 UART: [art] Populate DV Done
2,820,070 UART: [fht] FMC Alias Private Key: 7
2,821,192 UART: [art] Derive CDI
2,821,472 UART: [art] Store in in slot 0x4
2,907,229 UART: [art] Derive Key Pair
2,907,589 UART: [art] Store priv key in slot 0x5
2,920,667 UART: [art] Derive Key Pair - Done
2,935,301 UART: [art] Signing Cert with AUTHO
2,935,781 UART: RITY.KEYID = 7
2,950,607 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,372 UART: [art] PUB.X = 6BD77EA08332734E0F7016F5470220D1B7E0F75367E396CA10359CEF55CA1971A7A9670A2BF8D924F92C902ABFA36ACC
2,958,139 UART: [art] PUB.Y = 05C0FD5F3FCEDFB1ADB226D87824E1B381052EB77FFB1AA6F4925FC2EEAA8602F4C9F06E439B0176760E46F8ADB7323F
2,965,094 UART: [art] SIG.R = 2C7DA14100F18D42D6ED026A3A4C2AC5A3F912447CB27C159AD61D6C1EF20BB345FE643A5812219512957AC4EE776657
2,971,840 UART: [art] SIG.S = B9904464E4FCC89442D8D6EFA394B8C715421DB52155C7BEF6FB2936B56D2757882B881F4D6E8EAF609136D806401C29
2,995,592 UART: Caliptra RT
2,995,845 UART: [state] CFI Enabled
3,103,620 UART: [rt] RT listening for mailbox commands...
3,104,290 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,346 UART: [rt]cmd =0x50435252, len=8
3,135,789 >>> mbox cmd response data (8 bytes)
3,135,790 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,228 >>> mbox cmd response: success
5,111,228 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,124,268 UART:
5,124,284 UART: Running Caliptra FMC ...
5,124,692 UART:
5,124,746 UART: [state] CFI Enabled
5,213,511 UART: [art] Extend RT PCRs Done
5,213,939 UART: [art] Lock RT PCRs Done
5,215,272 UART: [art] Populate DV Done
5,223,445 UART: [fht] FMC Alias Private Key: 7
5,224,625 UART: [art] Derive CDI
5,224,905 UART: [art] Store in in slot 0x4
5,310,560 UART: [art] Derive Key Pair
5,310,920 UART: [art] Store priv key in slot 0x5
5,323,380 UART: [art] Derive Key Pair - Done
5,338,413 UART: [art] Signing Cert with AUTHO
5,338,893 UART: RITY.KEYID = 7
5,353,517 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,282 UART: [art] PUB.X = 264036E3B44D9F0590E68CCBB99B2E2804A564D1CAF34186D6722FF2A86B123B2D9B68E8262E11DAB97353C971F11CEE
5,361,052 UART: [art] PUB.Y = FBB3C7474C6CBD8B327B5D05C24A3943DBEA395F65FFE1A386F3FEA2A6C102D7B77C6E74AB4B84750A5C72FE0DDAD617
5,368,014 UART: [art] SIG.R = 26EDD1C21697201C85E4944AEA0FB70E4BB6A031C4B96DB0F960267F98660DD17FB44941EB2502F10D10152613491697
5,374,765 UART: [art] SIG.S = 0E45920D1C07F3A94EEB81E42176EB18225C2FC1593F410425376B1AA051F0469B27233279DA1237FADE58B3095635C7
5,398,603 UART: mbox::rt_entry...
5,398,975 UART: ____ _ _ _ ____ _____
5,399,759 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,559 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,863 UART: |_|
5,403,175 UART:
5,683,257 UART: [rt] Runtime listening for mailbox commands...
5,684,304 >>> mbox cmd response data (128 bytes)
5,684,305 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,659,727 >>> mbox cmd response: success
7,659,727 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,672,797 UART:
7,672,813 UART: Running Caliptra FMC ...
7,673,221 UART:
7,673,275 UART: [state] CFI Enabled
7,761,974 UART: [art] Extend RT PCRs Done
7,762,402 UART: [art] Lock RT PCRs Done
7,763,641 UART: [art] Populate DV Done
7,771,764 UART: [fht] FMC Alias Private Key: 7
7,772,710 UART: [art] Derive CDI
7,772,990 UART: [art] Store in in slot 0x4
7,858,735 UART: [art] Derive Key Pair
7,859,095 UART: [art] Store priv key in slot 0x5
7,872,989 UART: [art] Derive Key Pair - Done
7,887,761 UART: [art] Signing Cert with AUTHO
7,888,241 UART: RITY.KEYID = 7
7,903,473 UART: [art] Erasing AUTHORITY.KEYID = 7
7,904,238 UART: [art] PUB.X = 12D10E4179B2B327F98BDAA11F4EC5BD9DD9E76D39C706C86624BBE29D2B5013FD3F93393A961D2868466D604DD548C2
7,911,008 UART: [art] PUB.Y = 5AA621F912E1CA00EE70D9CF374C7797CD712E064883AD9BBF74CD8143E9DF57EC773CC69FB339096F9C7E56E3BD02AD
7,917,943 UART: [art] SIG.R = D69FDD49B43CED65708DBCC73CC0E30E5D3F5EE910865CE8DB0D451A42A3B991435ABAF40CB43D4F989E21115E5BA712
7,924,722 UART: [art] SIG.S = BB49C63889818B8179D4E4CDF2484E4FE48A5671B7A38B27A2DED9DAB3F60D6004BBEEAE6A096D53B12A2140F2859386
7,948,882 UART: mbox::rt_entry...
7,949,254 UART: ____ _ _ _ ____ _____
7,950,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,950,838 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,951,606 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,952,374 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,953,142 UART: |_|
7,953,454 UART:
8,231,501 UART: [rt] Runtime listening for mailbox commands...
8,232,548 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
893,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,966 UART: [kat] ++
898,118 UART: [kat] sha1
902,144 UART: [kat] SHA2-256
904,084 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,889 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,124 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 ready_for_fw is high
1,177,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,037 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,466 UART: [idev] --
1,211,402 UART: [ldev] ++
1,211,570 UART: [ldev] CDI.KEYID = 6
1,211,933 UART: [ldev] SUBJECT.KEYID = 5
1,212,359 UART: [ldev] AUTHORITY.KEYID = 7
1,212,822 UART: [ldev] FE.KEYID = 1
1,218,064 UART: [ldev] Erasing FE.KEYID = 1
1,245,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,072 UART: [ldev] --
1,284,369 UART: [fwproc] Wait for Commands...
1,284,953 UART: [fwproc] Recv command 0x46574c44
1,285,681 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,417 >>> mbox cmd response: success
2,777,673 UART: [afmc] ++
2,777,841 UART: [afmc] CDI.KEYID = 6
2,778,203 UART: [afmc] SUBJECT.KEYID = 7
2,778,628 UART: [afmc] AUTHORITY.KEYID = 5
2,814,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,432 UART: [afmc] --
2,857,480 UART: [cold-reset] --
2,858,162 UART: [state] Locking Datavault
2,859,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,651 UART: [state] Locking ICCM
2,860,163 UART: [exit] Launching FMC @ 0x40000130
2,865,492 UART:
2,865,508 UART: Running Caliptra FMC ...
2,865,916 UART:
2,866,059 UART: [state] CFI Enabled
2,876,586 UART: [fht] FMC Alias Private Key: 7
2,985,291 UART: [art] Extend RT PCRs Done
2,985,719 UART: [art] Lock RT PCRs Done
2,987,427 UART: [art] Populate DV Done
2,995,848 UART: [fht] FMC Alias Private Key: 7
2,996,992 UART: [art] Derive CDI
2,997,272 UART: [art] Store in in slot 0x4
3,083,297 UART: [art] Derive Key Pair
3,083,657 UART: [art] Store priv key in slot 0x5
3,097,511 UART: [art] Derive Key Pair - Done
3,112,135 UART: [art] Signing Cert with AUTHO
3,112,615 UART: RITY.KEYID = 7
3,127,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,518 UART: [art] PUB.X = 1B505280FE00CEAF6B3CA1EBC1B83AFD1AC8166CF86EDE364520D152C76768840043358B9973889E170955704EB761E7
3,135,241 UART: [art] PUB.Y = 432265B75EA8465416331E73452AC1A5741E0E04000B580CBBB660344B378E157E707F4BD838930AE8D1F6D65E05DFDE
3,142,149 UART: [art] SIG.R = A1A62A28B79816813E19E74FBBE5D305DFF53D111F23333840B4E26BD2B8C66D17CDCEEFF9B398F8302058CBBD0B373E
3,148,927 UART: [art] SIG.S = C29B14135C4516498D91BC73D81A52178377F75F2B9527EACDDFDCB653B22F0CF146A646D7E1C914411D562532911613
3,171,825 UART: Caliptra RT
3,172,170 UART: [state] CFI Enabled
3,280,354 UART: [rt] RT listening for mailbox commands...
3,281,024 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,018 UART: [rt]cmd =0x50435252, len=8
3,312,667 >>> mbox cmd response data (8 bytes)
3,312,668 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,623 UART:
3,313,639 UART: Running Caliptra ROM ...
3,314,047 UART:
3,314,189 UART: [state] CFI Enabled
3,317,491 UART: [state] LifecycleState = Unprovisioned
3,318,146 UART: [state] DebugLocked = No
3,318,752 UART: [state] WD Timer not started. Device not locked for debugging
3,319,952 UART: [kat] SHA2-256
4,125,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,129,727 UART: [kat] ++
4,129,879 UART: [kat] sha1
4,134,343 UART: [kat] SHA2-256
4,136,283 UART: [kat] SHA2-384
4,139,014 UART: [kat] SHA2-512-ACC
4,140,914 UART: [kat] ECC-384
4,150,715 UART: [kat] HMAC-384Kdf
4,155,187 UART: [kat] LMS
4,403,515 UART: [kat] --
4,404,665 UART: [update-reset] ++
5,308,411 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,309,386 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,405,768 >>> mbox cmd response: success
5,405,768 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,406,023 UART: [update-reset] Copying MAN_2 To MAN_1
5,414,037 UART: [update-reset Success] --
5,415,240 UART: [state] Locking Datavault
5,415,982 UART: [state] Locking PCR0, PCR1 and PCR31
5,416,586 UART: [state] Locking ICCM
5,417,098 UART: [exit] Launching FMC @ 0x40000130
5,422,427 UART:
5,422,443 UART: Running Caliptra FMC ...
5,422,851 UART:
5,422,994 UART: [state] CFI Enabled
5,511,583 UART: [art] Extend RT PCRs Done
5,512,011 UART: [art] Lock RT PCRs Done
5,513,292 UART: [art] Populate DV Done
5,521,315 UART: [fht] FMC Alias Private Key: 7
5,522,385 UART: [art] Derive CDI
5,522,665 UART: [art] Store in in slot 0x4
5,608,562 UART: [art] Derive Key Pair
5,608,922 UART: [art] Store priv key in slot 0x5
5,622,224 UART: [art] Derive Key Pair - Done
5,636,958 UART: [art] Signing Cert with AUTHO
5,637,438 UART: RITY.KEYID = 7
5,652,698 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,463 UART: [art] PUB.X = 95C5E507B8F19DC60E898FBF2BFF17112839EF979046F747E77A35DCC0AFB4CF873BBE5255BD6F0F52FEAAF0B73180D0
5,660,242 UART: [art] PUB.Y = BA164E661CD39CB304797CCBF191FD6587DEA82137C05CB8953E0ADDADB75AECCBB2279F78E5B44AA0233574AB52A484
5,667,204 UART: [art] SIG.R = 4C4EB3FB09A151B404D03C36B7917478D24E1D67613B008C35B03CF70947047B8CE323F73C38AAADD0A3BDB947CE4641
5,673,946 UART: [art] SIG.S = 5A9044BC590BFBE3E2C7D6362D8B0854459DAD2E06DE37EC591C70536B4193C1DF7210A2F0BC36B5C99FEBA835BFB06F
5,697,884 UART: mbox::rt_entry...
5,698,256 UART: ____ _ _ _ ____ _____
5,699,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,699,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,700,608 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,701,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,702,144 UART: |_|
5,702,456 UART:
5,982,744 UART: [rt] Runtime listening for mailbox commands...
5,983,791 >>> mbox cmd response data (128 bytes)
5,983,792 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,983,903 UART:
5,983,919 UART: Running Caliptra ROM ...
5,984,327 UART:
5,984,469 UART: [state] CFI Enabled
5,987,067 UART: [state] LifecycleState = Unprovisioned
5,987,722 UART: [state] DebugLocked = No
5,988,226 UART: [state] WD Timer not started. Device not locked for debugging
5,989,582 UART: [kat] SHA2-256
6,795,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,799,357 UART: [kat] ++
6,799,509 UART: [kat] sha1
6,803,753 UART: [kat] SHA2-256
6,805,693 UART: [kat] SHA2-384
6,808,286 UART: [kat] SHA2-512-ACC
6,810,186 UART: [kat] ECC-384
6,820,361 UART: [kat] HMAC-384Kdf
6,824,801 UART: [kat] LMS
7,073,129 UART: [kat] --
7,074,119 UART: [update-reset] ++
7,979,465 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,980,582 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,076,964 >>> mbox cmd response: success
8,076,964 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,077,189 UART: [update-reset] Copying MAN_2 To MAN_1
8,085,203 UART: [update-reset Success] --
8,086,168 UART: [state] Locking Datavault
8,086,928 UART: [state] Locking PCR0, PCR1 and PCR31
8,087,532 UART: [state] Locking ICCM
8,088,092 UART: [exit] Launching FMC @ 0x40000130
8,093,421 UART:
8,093,437 UART: Running Caliptra FMC ...
8,093,845 UART:
8,093,988 UART: [state] CFI Enabled
8,183,451 UART: [art] Extend RT PCRs Done
8,183,879 UART: [art] Lock RT PCRs Done
8,185,292 UART: [art] Populate DV Done
8,193,677 UART: [fht] FMC Alias Private Key: 7
8,194,769 UART: [art] Derive CDI
8,195,049 UART: [art] Store in in slot 0x4
8,280,658 UART: [art] Derive Key Pair
8,281,018 UART: [art] Store priv key in slot 0x5
8,294,188 UART: [art] Derive Key Pair - Done
8,308,795 UART: [art] Signing Cert with AUTHO
8,309,275 UART: RITY.KEYID = 7
8,325,019 UART: [art] Erasing AUTHORITY.KEYID = 7
8,325,784 UART: [art] PUB.X = 79CA3473ABA9A202C4E88476C1C91B4CC39381523614589AEB85678B222A2CB63E573D5665F7D0A86CF911404B3402E9
8,332,544 UART: [art] PUB.Y = 6635A6F916AC646F9F6958C2E99BC51E4AFC77BB2DAEDD689C560A4F5582DEEC7F7E4CF84141CF7D75D137953EC6F29E
8,339,509 UART: [art] SIG.R = 08DF51139BFD5DFB8C8AFDB7AB287ED7AE52888C0F4C57DD8A777ED5BF5F519883E6BBEB0325B242E69599116B0EB2ED
8,346,289 UART: [art] SIG.S = 1D231F4D9039CF62244A61A621B81EFC7C82CCFBA3291DE56001F57CFB837F053AE5DE4E727A62FF01DBFB0444119A59
8,369,700 UART: mbox::rt_entry...
8,370,072 UART: ____ _ _ _ ____ _____
8,370,856 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,371,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,372,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,373,192 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,373,960 UART: |_|
8,374,272 UART:
8,656,896 UART: [rt] Runtime listening for mailbox commands...
8,657,943 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,808 ready_for_fw is high
1,060,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,028 >>> mbox cmd response: success
2,689,800 UART:
2,689,816 UART: Running Caliptra FMC ...
2,690,224 UART:
2,690,367 UART: [state] CFI Enabled
2,700,898 UART: [fht] FMC Alias Private Key: 7
2,808,497 UART: [art] Extend RT PCRs Done
2,808,925 UART: [art] Lock RT PCRs Done
2,810,483 UART: [art] Populate DV Done
2,818,714 UART: [fht] FMC Alias Private Key: 7
2,819,822 UART: [art] Derive CDI
2,820,102 UART: [art] Store in in slot 0x4
2,905,919 UART: [art] Derive Key Pair
2,906,279 UART: [art] Store priv key in slot 0x5
2,919,239 UART: [art] Derive Key Pair - Done
2,934,172 UART: [art] Signing Cert with AUTHO
2,934,652 UART: RITY.KEYID = 7
2,950,264 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,029 UART: [art] PUB.X = 3A7CEC09F3869E70E85756F9F88838FC5A99EEF62FC1A5B3D2B6CE653A347C46C2655AD6624B68A5AF12B25228747C1B
2,957,804 UART: [art] PUB.Y = FDF4D3846CABFBA6FFC6E703E7B0B8B9736532A5624187733255D2AAAFC76D57E52DA66FF5805A52E581A5F319B9C022
2,964,763 UART: [art] SIG.R = D66720A655CC1583E18633F3152B6905AAEF468269D135CB0E4DC2CB5232184D5DDD72587ADB4167F7D7474A5B8FA825
2,971,529 UART: [art] SIG.S = F6862AC552FB9F43CDC030C9CF7A911568CD30063A8A45DE829028301ED5A2C08D719FE0F686D54C8E63BF467B8744F1
2,995,245 UART: Caliptra RT
2,995,590 UART: [state] CFI Enabled
3,103,074 UART: [rt] RT listening for mailbox commands...
3,103,744 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,586 UART: [rt]cmd =0x50435252, len=8
3,135,023 >>> mbox cmd response data (8 bytes)
3,135,024 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,755 >>> mbox cmd response: success
5,111,755 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,125,391 UART:
5,125,407 UART: Running Caliptra FMC ...
5,125,815 UART:
5,125,958 UART: [state] CFI Enabled
5,214,783 UART: [art] Extend RT PCRs Done
5,215,211 UART: [art] Lock RT PCRs Done
5,216,654 UART: [art] Populate DV Done
5,224,765 UART: [fht] FMC Alias Private Key: 7
5,225,771 UART: [art] Derive CDI
5,226,051 UART: [art] Store in in slot 0x4
5,311,716 UART: [art] Derive Key Pair
5,312,076 UART: [art] Store priv key in slot 0x5
5,325,400 UART: [art] Derive Key Pair - Done
5,340,062 UART: [art] Signing Cert with AUTHO
5,340,542 UART: RITY.KEYID = 7
5,355,860 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,625 UART: [art] PUB.X = 8DC3FEB080E13F512EE950129A42F1DEDD31321D93F2F77FC7CC8213175811E27E55A6D80D953B6C6B248454E365E795
5,363,394 UART: [art] PUB.Y = F4D6F5FA27D7B4E683F9E08D76F0F5EE7572E6A6FD80D412BE26042E3F08F70124C109EE897B0A37085EE32AFC8A17CC
5,370,340 UART: [art] SIG.R = E78611200596973FFD119F7E9312704870B612B0A5F0F05AA9F25C7876CADFC77CBE84CB71B0BD0745D4DF63109A83F5
5,377,108 UART: [art] SIG.S = C92589BC5E85B047D5A5396501EB8C72A832BBF7D28364D7DD9E1F786E0E7AC14BDC6DEC1F08821FACA6449F390151AF
5,400,683 UART: mbox::rt_entry...
5,401,055 UART: ____ _ _ _ ____ _____
5,401,839 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,175 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,404,943 UART: |_|
5,405,255 UART:
5,687,466 UART: [rt] Runtime listening for mailbox commands...
5,688,513 >>> mbox cmd response data (128 bytes)
5,688,514 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,665,285 >>> mbox cmd response: success
7,665,285 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,678,791 UART:
7,678,807 UART: Running Caliptra FMC ...
7,679,215 UART:
7,679,358 UART: [state] CFI Enabled
7,768,523 UART: [art] Extend RT PCRs Done
7,768,951 UART: [art] Lock RT PCRs Done
7,770,080 UART: [art] Populate DV Done
7,778,043 UART: [fht] FMC Alias Private Key: 7
7,779,055 UART: [art] Derive CDI
7,779,335 UART: [art] Store in in slot 0x4
7,865,734 UART: [art] Derive Key Pair
7,866,094 UART: [art] Store priv key in slot 0x5
7,879,052 UART: [art] Derive Key Pair - Done
7,893,822 UART: [art] Signing Cert with AUTHO
7,894,302 UART: RITY.KEYID = 7
7,909,764 UART: [art] Erasing AUTHORITY.KEYID = 7
7,910,529 UART: [art] PUB.X = EDBB5AF2CA85F5EC31E077C91E5CAE1D9BBE8BCAD5D407BF45C46C592407530CA5168A4CB87C66D8667005E619F997D8
7,917,305 UART: [art] PUB.Y = B4EC001924ECC338E866D922455EE9D1270599CBF1BFA7A5DFAAFA532D0BF18C7AA8BECF2A2464A71037AFB7A85106D6
7,924,244 UART: [art] SIG.R = 9EAAF419BF317DE7EE5374DA113C9DB43823DF5D27488622A9A6B789D85C53DA3E21C8BA09ECE5D58B74BB856CB1730C
7,931,024 UART: [art] SIG.S = 79A76272B638B821A32509719B0C07D5C337C3F9782DEFBAD079A8C04578243A2EDB88F9B3079880D08EA524627454F5
7,955,293 UART: mbox::rt_entry...
7,955,665 UART: ____ _ _ _ ____ _____
7,956,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,957,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,958,017 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,958,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,959,553 UART: |_|
7,959,865 UART:
8,240,459 UART: [rt] Runtime listening for mailbox commands...
8,241,506 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,639 UART: [fht] FHT @ 0x50003400
1,172,107 UART: [idev] ++
1,172,275 UART: [idev] CDI.KEYID = 6
1,172,636 UART: [idev] SUBJECT.KEYID = 7
1,173,061 UART: [idev] UDS.KEYID = 0
1,173,407 ready_for_fw is high
1,173,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,207 UART: [idev] Erasing UDS.KEYID = 0
1,197,901 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,826 UART: [ldev] ++
1,207,994 UART: [ldev] CDI.KEYID = 6
1,208,358 UART: [ldev] SUBJECT.KEYID = 5
1,208,785 UART: [ldev] AUTHORITY.KEYID = 7
1,209,248 UART: [ldev] FE.KEYID = 1
1,214,432 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,694 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,648 >>> mbox cmd response: success
2,772,813 UART: [afmc] ++
2,772,981 UART: [afmc] CDI.KEYID = 6
2,773,344 UART: [afmc] SUBJECT.KEYID = 7
2,773,770 UART: [afmc] AUTHORITY.KEYID = 5
2,809,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,696 UART: [afmc] --
2,852,638 UART: [cold-reset] --
2,853,498 UART: [state] Locking Datavault
2,854,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,127 UART: [state] Locking ICCM
2,855,651 UART: [exit] Launching FMC @ 0x40000130
2,860,980 UART:
2,860,996 UART: Running Caliptra FMC ...
2,861,404 UART:
2,861,458 UART: [state] CFI Enabled
2,872,003 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,692 UART: [art] Populate DV Done
2,990,093 UART: [fht] FMC Alias Private Key: 7
2,991,031 UART: [art] Derive CDI
2,991,311 UART: [art] Store in in slot 0x4
3,076,758 UART: [art] Derive Key Pair
3,077,118 UART: [art] Store priv key in slot 0x5
3,089,666 UART: [art] Derive Key Pair - Done
3,104,254 UART: [art] Signing Cert with AUTHO
3,104,734 UART: RITY.KEYID = 7
3,120,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,031 UART: [art] PUB.X = 713D88D091031C6C5301424EC026E47DEDC588C6A226E0EE56D4FA5ADC4CBF169D4F2BB27DBE964E69D3D374E774FD95
3,127,809 UART: [art] PUB.Y = 414DF2ABB8BBBE6575DDE7EFC13A9DF528C61F7F5D1E7B77BC0759DCEC49FF878DF1ACBD29F6BF987D4DECC161E34021
3,134,788 UART: [art] SIG.R = 616D0691676FE8839139E387731AC2E765BE179788B4192DE5E1C7A1A9BA35B119B5873E3E547EC1784D6A8C192122B9
3,141,549 UART: [art] SIG.S = 09A3BD2388A0975B110CB9077D5D315306AF1D004557A50838B1210A2645FB64E250B2ACCF71130FF876A649F70B70B7
3,165,058 UART: Caliptra RT
3,165,311 UART: [state] CFI Enabled
3,272,792 UART: [rt] RT listening for mailbox commands...
3,273,462 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,416 UART: [rt]cmd =0x50435252, len=8
3,304,733 >>> mbox cmd response data (8 bytes)
3,304,734 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,469 UART:
3,305,485 UART: Running Caliptra ROM ...
3,305,893 UART:
3,305,948 UART: [state] CFI Enabled
3,307,990 UART: [state] LifecycleState = Unprovisioned
3,308,645 UART: [state] DebugLocked = No
3,309,351 UART: [state] WD Timer not started. Device not locked for debugging
3,310,705 UART: [kat] SHA2-256
4,114,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,384 UART: [kat] ++
4,118,536 UART: [kat] sha1
4,122,714 UART: [kat] SHA2-256
4,124,654 UART: [kat] SHA2-384
4,127,425 UART: [kat] SHA2-512-ACC
4,129,325 UART: [kat] ECC-384
4,139,004 UART: [kat] HMAC-384Kdf
4,143,624 UART: [kat] LMS
4,391,936 UART: [kat] --
4,392,728 UART: [update-reset] ++
5,297,981 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,299,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,395,430 >>> mbox cmd response: success
5,395,430 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,395,745 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,759 UART: [update-reset Success] --
5,404,594 UART: [state] Locking Datavault
5,405,174 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,778 UART: [state] Locking ICCM
5,406,422 UART: [exit] Launching FMC @ 0x40000130
5,411,751 UART:
5,411,767 UART: Running Caliptra FMC ...
5,412,175 UART:
5,412,229 UART: [state] CFI Enabled
5,501,148 UART: [art] Extend RT PCRs Done
5,501,576 UART: [art] Lock RT PCRs Done
5,502,779 UART: [art] Populate DV Done
5,510,740 UART: [fht] FMC Alias Private Key: 7
5,511,680 UART: [art] Derive CDI
5,511,960 UART: [art] Store in in slot 0x4
5,597,271 UART: [art] Derive Key Pair
5,597,631 UART: [art] Store priv key in slot 0x5
5,611,027 UART: [art] Derive Key Pair - Done
5,625,867 UART: [art] Signing Cert with AUTHO
5,626,347 UART: RITY.KEYID = 7
5,641,239 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,004 UART: [art] PUB.X = EC9E40358CB51C399AD918F494366E745B0396C12995D2BC10C0495D5E753CF48FC53ED9FA359F1E8657665F309DBFCB
5,648,777 UART: [art] PUB.Y = B24E504D4364701219A0292B396797CC2E5B3889BB0666F15309BB96ADB58C6EC920352E78A132415A7253C50F06EA7C
5,655,709 UART: [art] SIG.R = D03A3D2B531E57EFF2EEDB91F81FEE7233EA1887FE0ABB1D1C7B25830451B5858983E35904F8FB4587BF29612B0FD918
5,662,477 UART: [art] SIG.S = E0F111E14E31B077BBFD9186BF23898AE08087F49F2298CE9038C411545E772FC0F67461273E2C6C02F1BEB73A4E17A6
5,686,477 UART: mbox::rt_entry...
5,686,849 UART: ____ _ _ _ ____ _____
5,687,633 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,433 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,689,969 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,690,737 UART: |_|
5,691,049 UART:
5,973,676 UART: [rt] Runtime listening for mailbox commands...
5,974,723 >>> mbox cmd response data (128 bytes)
5,974,724 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,974,835 UART:
5,974,851 UART: Running Caliptra ROM ...
5,975,259 UART:
5,975,314 UART: [state] CFI Enabled
5,978,016 UART: [state] LifecycleState = Unprovisioned
5,978,671 UART: [state] DebugLocked = No
5,979,335 UART: [state] WD Timer not started. Device not locked for debugging
5,980,491 UART: [kat] SHA2-256
6,784,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,788,170 UART: [kat] ++
6,788,322 UART: [kat] sha1
6,792,790 UART: [kat] SHA2-256
6,794,730 UART: [kat] SHA2-384
6,797,667 UART: [kat] SHA2-512-ACC
6,799,567 UART: [kat] ECC-384
6,809,662 UART: [kat] HMAC-384Kdf
6,814,336 UART: [kat] LMS
7,062,648 UART: [kat] --
7,063,526 UART: [update-reset] ++
7,967,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,968,794 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,065,176 >>> mbox cmd response: success
8,065,176 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,065,409 UART: [update-reset] Copying MAN_2 To MAN_1
8,073,423 UART: [update-reset Success] --
8,074,400 UART: [state] Locking Datavault
8,075,270 UART: [state] Locking PCR0, PCR1 and PCR31
8,075,874 UART: [state] Locking ICCM
8,076,406 UART: [exit] Launching FMC @ 0x40000130
8,081,735 UART:
8,081,751 UART: Running Caliptra FMC ...
8,082,159 UART:
8,082,213 UART: [state] CFI Enabled
8,171,358 UART: [art] Extend RT PCRs Done
8,171,786 UART: [art] Lock RT PCRs Done
8,173,363 UART: [art] Populate DV Done
8,181,642 UART: [fht] FMC Alias Private Key: 7
8,182,684 UART: [art] Derive CDI
8,182,964 UART: [art] Store in in slot 0x4
8,268,639 UART: [art] Derive Key Pair
8,268,999 UART: [art] Store priv key in slot 0x5
8,282,291 UART: [art] Derive Key Pair - Done
8,297,260 UART: [art] Signing Cert with AUTHO
8,297,740 UART: RITY.KEYID = 7
8,313,358 UART: [art] Erasing AUTHORITY.KEYID = 7
8,314,123 UART: [art] PUB.X = 97862FC6697A5DC65CE3BDC38C347366FF4B39C8AD83515FD301A0CB03788FA1EE416DC23C54B52B0B2C79EBE5D3BCE7
8,320,902 UART: [art] PUB.Y = 4594E3BE4DA10CBA002403E3CD845AA5F03AB039EB839AF00FF71DAE0CC6113CB7F83E02C4624699E6202BB566AE0BE2
8,327,828 UART: [art] SIG.R = 325AF9657C179F9FC97BFEA05A60ECCCFFE59EE93986C030F2160138A585F0988D4128C6E3F0D4B71B9CCA8C5D9FAA3A
8,334,613 UART: [art] SIG.S = 3DE7EAE59F72B0D70E99EEDA7FE10166F5C0C73A440FACAA83B2DBFA3E04A5260C4C025272B1704D17635CDF232EDA7E
8,358,668 UART: mbox::rt_entry...
8,359,040 UART: ____ _ _ _ ____ _____
8,359,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,360,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,361,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,362,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,362,928 UART: |_|
8,363,240 UART:
8,646,142 UART: [rt] Runtime listening for mailbox commands...
8,647,189 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,992 ready_for_fw is high
1,055,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,010 >>> mbox cmd response: success
2,687,590 UART:
2,687,606 UART: Running Caliptra FMC ...
2,688,014 UART:
2,688,068 UART: [state] CFI Enabled
2,698,281 UART: [fht] FMC Alias Private Key: 7
2,806,546 UART: [art] Extend RT PCRs Done
2,806,974 UART: [art] Lock RT PCRs Done
2,808,572 UART: [art] Populate DV Done
2,816,975 UART: [fht] FMC Alias Private Key: 7
2,818,013 UART: [art] Derive CDI
2,818,293 UART: [art] Store in in slot 0x4
2,903,876 UART: [art] Derive Key Pair
2,904,236 UART: [art] Store priv key in slot 0x5
2,917,226 UART: [art] Derive Key Pair - Done
2,932,012 UART: [art] Signing Cert with AUTHO
2,932,492 UART: RITY.KEYID = 7
2,947,516 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,281 UART: [art] PUB.X = 89E5E39F12BD5B9380741F28471BBB774AC426B23BC11747D39435DA8BA2D73B2B3B2D0198050422BE2216BBE60CF91B
2,955,043 UART: [art] PUB.Y = 691AA2822436ADB638ED142A409EE9787001992E1CD363E5E981DC178D8D719430E80CF900872C1C350EF45AD24EBEFB
2,961,966 UART: [art] SIG.R = 63FC14A6E947F989431C69BE5FBC28252FCE3B73DA9785D6823643224E082EE2F3605D07570DDFD1C9A584519367113F
2,968,725 UART: [art] SIG.S = B77E64D4B9E3F9FD872DA5FAD2A2D5799C7F3FDEA41AF23771A06F341F58D5367BB2381DA6233A9FDF8F1689076C1660
2,992,337 UART: Caliptra RT
2,992,590 UART: [state] CFI Enabled
3,101,543 UART: [rt] RT listening for mailbox commands...
3,102,213 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,001 UART: [rt]cmd =0x50435252, len=8
3,133,618 >>> mbox cmd response data (8 bytes)
3,133,619 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,105,166 >>> mbox cmd response: success
5,105,166 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,118,710 UART:
5,118,726 UART: Running Caliptra FMC ...
5,119,134 UART:
5,119,188 UART: [state] CFI Enabled
5,208,309 UART: [art] Extend RT PCRs Done
5,208,737 UART: [art] Lock RT PCRs Done
5,210,106 UART: [art] Populate DV Done
5,217,979 UART: [fht] FMC Alias Private Key: 7
5,219,009 UART: [art] Derive CDI
5,219,289 UART: [art] Store in in slot 0x4
5,304,906 UART: [art] Derive Key Pair
5,305,266 UART: [art] Store priv key in slot 0x5
5,319,282 UART: [art] Derive Key Pair - Done
5,333,875 UART: [art] Signing Cert with AUTHO
5,334,355 UART: RITY.KEYID = 7
5,349,353 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,118 UART: [art] PUB.X = 7A9E27CF28C73B78D4E5CC549E554A82DB14D337C7DE8B5A6D23B58871AA40629CEF4A161EAE857B4ADE7DB412D7EA6D
5,356,908 UART: [art] PUB.Y = A96F37B3E2F631C1A5A6E805052E186238FD0B2A736131DC41B6AAEFA18A2397A19AF4B60231E048164988BACF40E450
5,363,850 UART: [art] SIG.R = F9B1EDCF5D316689329EA953A3384A474A7F4296AD0FB6A0CDF5AD5B6B032AAFCE7C4735FDAA365C33F89B8BC141D5BE
5,370,638 UART: [art] SIG.S = 7FB44ACA1C730CDA429518A4461D04CD537B4B0BA3E55C070A01AF6BCBA1F1EE4F1DEB5F74CE46849522A44966B63C5B
5,394,197 UART: mbox::rt_entry...
5,394,569 UART: ____ _ _ _ ____ _____
5,395,353 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,396,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,396,921 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,397,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,398,457 UART: |_|
5,398,769 UART:
5,681,065 UART: [rt] Runtime listening for mailbox commands...
5,682,112 >>> mbox cmd response data (128 bytes)
5,682,113 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,652,084 >>> mbox cmd response: success
7,652,084 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,665,418 UART:
7,665,434 UART: Running Caliptra FMC ...
7,665,842 UART:
7,665,896 UART: [state] CFI Enabled
7,754,951 UART: [art] Extend RT PCRs Done
7,755,379 UART: [art] Lock RT PCRs Done
7,756,816 UART: [art] Populate DV Done
7,765,081 UART: [fht] FMC Alias Private Key: 7
7,766,149 UART: [art] Derive CDI
7,766,429 UART: [art] Store in in slot 0x4
7,852,200 UART: [art] Derive Key Pair
7,852,560 UART: [art] Store priv key in slot 0x5
7,865,468 UART: [art] Derive Key Pair - Done
7,880,200 UART: [art] Signing Cert with AUTHO
7,880,680 UART: RITY.KEYID = 7
7,895,980 UART: [art] Erasing AUTHORITY.KEYID = 7
7,896,745 UART: [art] PUB.X = 8612F86974605BAF06896E5DD209303A206327E7526E971B2DE75622DFB3A4E58F666E5A363D286EC8AD8C27EE0EBFD1
7,903,510 UART: [art] PUB.Y = 7C09C1CF32397DA1C2818402E3CB0E075AE0EA036903163BD822BD3C6468AD64F4402F0BAACA88B9139A4EA7EECD78A6
7,910,453 UART: [art] SIG.R = 0B82CA1261EF68C47C744FBA9FD3529F06BAE227FB96C6CE1F7CCEFAC9748E4718CC547092273B1A21D20CCA728F4A78
7,917,230 UART: [art] SIG.S = 9E20803647640D4FAA56CDD5ADE75F0B74C34053678D69077EF3C06AADFCD4A1D531E8ACD08982F60DD82986DEA4F7CE
7,941,091 UART: mbox::rt_entry...
7,941,463 UART: ____ _ _ _ ____ _____
7,942,247 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,943,047 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,943,815 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,944,583 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,945,351 UART: |_|
7,945,663 UART:
8,225,249 UART: [rt] Runtime listening for mailbox commands...
8,226,296 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,473 UART: [kat] LMS
1,169,785 UART: [kat] --
1,170,544 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,752 UART: [idev] ++
1,173,920 UART: [idev] CDI.KEYID = 6
1,174,281 UART: [idev] SUBJECT.KEYID = 7
1,174,706 UART: [idev] UDS.KEYID = 0
1,175,052 ready_for_fw is high
1,175,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,200,166 UART: [idev] Sha1 KeyId Algorithm
1,208,910 UART: [idev] --
1,209,845 UART: [ldev] ++
1,210,013 UART: [ldev] CDI.KEYID = 6
1,210,377 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,241,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,280,965 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,863 >>> mbox cmd response: success
2,774,036 UART: [afmc] ++
2,774,204 UART: [afmc] CDI.KEYID = 6
2,774,567 UART: [afmc] SUBJECT.KEYID = 7
2,774,993 UART: [afmc] AUTHORITY.KEYID = 5
2,810,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,281 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,743 UART: [afmc] --
2,853,783 UART: [cold-reset] --
2,854,823 UART: [state] Locking Datavault
2,856,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,758 UART: [state] Locking ICCM
2,857,328 UART: [exit] Launching FMC @ 0x40000130
2,862,657 UART:
2,862,673 UART: Running Caliptra FMC ...
2,863,081 UART:
2,863,224 UART: [state] CFI Enabled
2,873,869 UART: [fht] FMC Alias Private Key: 7
2,982,146 UART: [art] Extend RT PCRs Done
2,982,574 UART: [art] Lock RT PCRs Done
2,984,290 UART: [art] Populate DV Done
2,992,557 UART: [fht] FMC Alias Private Key: 7
2,993,529 UART: [art] Derive CDI
2,993,809 UART: [art] Store in in slot 0x4
3,079,506 UART: [art] Derive Key Pair
3,079,866 UART: [art] Store priv key in slot 0x5
3,092,772 UART: [art] Derive Key Pair - Done
3,107,425 UART: [art] Signing Cert with AUTHO
3,107,905 UART: RITY.KEYID = 7
3,123,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,016 UART: [art] PUB.X = 758EB37931930A462068DA9E9E6AF563C3FA1693B7825782677515D9B73B0DE22720E87EBEDF10205A718BBB65563574
3,130,774 UART: [art] PUB.Y = 5344ACABBE97D613745DB84D2141365771174955B252277834A676493C4764B0B01AA076DD5B7C2C12D2F28A4A8D76BF
3,137,720 UART: [art] SIG.R = 7D45A906B58F58A2D57E9C55C02C3DBBA0887B5B13541974C3F297024D05A51F6E0EE842EC53784BB4399C064739AC78
3,144,475 UART: [art] SIG.S = B8D1C42EE730E24E97D123EB535B7D03154A87A7AA18BA05BD35B54B69844E56A171F85750233C8922D6987C0ABE6882
3,167,921 UART: Caliptra RT
3,168,266 UART: [state] CFI Enabled
3,276,135 UART: [rt] RT listening for mailbox commands...
3,276,805 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,753 UART: [rt]cmd =0x50435252, len=8
3,308,492 >>> mbox cmd response data (8 bytes)
3,308,493 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,308 UART:
3,309,324 UART: Running Caliptra ROM ...
3,309,732 UART:
3,309,874 UART: [state] CFI Enabled
3,312,348 UART: [state] LifecycleState = Unprovisioned
3,313,003 UART: [state] DebugLocked = No
3,313,673 UART: [state] WD Timer not started. Device not locked for debugging
3,314,961 UART: [kat] SHA2-256
4,118,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,640 UART: [kat] ++
4,122,792 UART: [kat] sha1
4,127,040 UART: [kat] SHA2-256
4,128,980 UART: [kat] SHA2-384
4,131,819 UART: [kat] SHA2-512-ACC
4,133,719 UART: [kat] ECC-384
4,143,436 UART: [kat] HMAC-384Kdf
4,147,962 UART: [kat] LMS
4,396,274 UART: [kat] --
4,397,138 UART: [update-reset] ++
5,301,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,370 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,398,752 >>> mbox cmd response: success
5,398,752 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,398,971 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,985 UART: [update-reset Success] --
5,407,820 UART: [state] Locking Datavault
5,408,764 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,368 UART: [state] Locking ICCM
5,409,832 UART: [exit] Launching FMC @ 0x40000130
5,415,161 UART:
5,415,177 UART: Running Caliptra FMC ...
5,415,585 UART:
5,415,728 UART: [state] CFI Enabled
5,504,833 UART: [art] Extend RT PCRs Done
5,505,261 UART: [art] Lock RT PCRs Done
5,506,430 UART: [art] Populate DV Done
5,514,593 UART: [fht] FMC Alias Private Key: 7
5,515,533 UART: [art] Derive CDI
5,515,813 UART: [art] Store in in slot 0x4
5,601,692 UART: [art] Derive Key Pair
5,602,052 UART: [art] Store priv key in slot 0x5
5,615,276 UART: [art] Derive Key Pair - Done
5,629,980 UART: [art] Signing Cert with AUTHO
5,630,460 UART: RITY.KEYID = 7
5,645,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,387 UART: [art] PUB.X = 852D1AACE1ACE28440B4FB225CF3444180EDF461019712C1BBC2D50A3A2FB5CB14DFBF44910CA72F24C4862CBFFB8161
5,653,166 UART: [art] PUB.Y = 3E936B51D272950A6D97A80E6F8CD6836CECB291B4B508D53EE855322449C1F6F96742F1771E3BDB5A9BF0ED43816681
5,660,109 UART: [art] SIG.R = FA0534302EA0C27E3FF7F638E421C9DE76873418CBEAA9BC2C3EFD37601409753D185C0154C7384534BDFC0EB9B1A667
5,666,875 UART: [art] SIG.S = 1D9FA36D24818D2FFAD43ED93631C8641E67D9080089442085B5A0AC6AFD7C5AE61DF076C533B4F6EB8DD66B6C518312
5,690,765 UART: mbox::rt_entry...
5,691,137 UART: ____ _ _ _ ____ _____
5,691,921 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,721 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,489 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,025 UART: |_|
5,695,337 UART:
5,979,661 UART: [rt] Runtime listening for mailbox commands...
5,980,708 >>> mbox cmd response data (128 bytes)
5,980,709 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,980,820 UART:
5,980,836 UART: Running Caliptra ROM ...
5,981,244 UART:
5,981,386 UART: [state] CFI Enabled
5,984,104 UART: [state] LifecycleState = Unprovisioned
5,984,759 UART: [state] DebugLocked = No
5,985,465 UART: [state] WD Timer not started. Device not locked for debugging
5,986,721 UART: [kat] SHA2-256
6,790,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,400 UART: [kat] ++
6,794,552 UART: [kat] sha1
6,798,788 UART: [kat] SHA2-256
6,800,728 UART: [kat] SHA2-384
6,803,559 UART: [kat] SHA2-512-ACC
6,805,459 UART: [kat] ECC-384
6,815,300 UART: [kat] HMAC-384Kdf
6,819,978 UART: [kat] LMS
7,068,290 UART: [kat] --
7,069,184 UART: [update-reset] ++
7,973,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,071,430 >>> mbox cmd response: success
8,071,430 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,071,757 UART: [update-reset] Copying MAN_2 To MAN_1
8,079,771 UART: [update-reset Success] --
8,080,770 UART: [state] Locking Datavault
8,081,536 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,140 UART: [state] Locking ICCM
8,082,718 UART: [exit] Launching FMC @ 0x40000130
8,088,047 UART:
8,088,063 UART: Running Caliptra FMC ...
8,088,471 UART:
8,088,614 UART: [state] CFI Enabled
8,177,929 UART: [art] Extend RT PCRs Done
8,178,357 UART: [art] Lock RT PCRs Done
8,179,704 UART: [art] Populate DV Done
8,187,965 UART: [fht] FMC Alias Private Key: 7
8,188,993 UART: [art] Derive CDI
8,189,273 UART: [art] Store in in slot 0x4
8,275,368 UART: [art] Derive Key Pair
8,275,728 UART: [art] Store priv key in slot 0x5
8,289,158 UART: [art] Derive Key Pair - Done
8,303,530 UART: [art] Signing Cert with AUTHO
8,304,010 UART: RITY.KEYID = 7
8,319,052 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,817 UART: [art] PUB.X = 180AB81BBE09F63388E6E09577CA62C0D12B29D1F3ABA5BE7B75E56530A9EAD246A7EFF6497BA07D948D05ACA8EFF8D6
8,326,598 UART: [art] PUB.Y = 7369BAD3AC93F9260FBAE9E161E68B9757A85198228EFCE768CE6169EFCBDD8EC3B6A214BA6B1958E793B7B728E6ABD9
8,333,563 UART: [art] SIG.R = D547BAA8A56934121FB526B5FC8D3D05D736CBD3C1A57D52436CB4C4717E47BDB48236B795372FF91092CB40AE66F94F
8,340,338 UART: [art] SIG.S = 6E67BED35BC61F6AFE8D19D4725D12E31A812F203D93E4766FBD714F3003BE30FC0E2B0819DC94F353869F9B995FA7CA
8,363,946 UART: mbox::rt_entry...
8,364,318 UART: ____ _ _ _ ____ _____
8,365,102 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,368,206 UART: |_|
8,368,518 UART:
8,647,840 UART: [rt] Runtime listening for mailbox commands...
8,648,887 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,041 ready_for_fw is high
1,056,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,071 >>> mbox cmd response: success
2,687,853 UART:
2,687,869 UART: Running Caliptra FMC ...
2,688,277 UART:
2,688,420 UART: [state] CFI Enabled
2,699,009 UART: [fht] FMC Alias Private Key: 7
2,806,612 UART: [art] Extend RT PCRs Done
2,807,040 UART: [art] Lock RT PCRs Done
2,808,234 UART: [art] Populate DV Done
2,816,681 UART: [fht] FMC Alias Private Key: 7
2,817,675 UART: [art] Derive CDI
2,817,955 UART: [art] Store in in slot 0x4
2,903,624 UART: [art] Derive Key Pair
2,903,984 UART: [art] Store priv key in slot 0x5
2,917,368 UART: [art] Derive Key Pair - Done
2,932,201 UART: [art] Signing Cert with AUTHO
2,932,681 UART: RITY.KEYID = 7
2,948,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,816 UART: [art] PUB.X = EC089489EB8B75779F89E71609A0ED1BCBE357AF9AE459FBCC54E28F6391C287294A91B97068C4BA76C60BE87C29823B
2,955,585 UART: [art] PUB.Y = A4942672B6C54EF50B4FA6F74B40E1BED457F1088F53F084D007349681684AB732791BEE708CB7231499A9600251BC1C
2,962,519 UART: [art] SIG.R = 961C4ADFFBAE3D871690A074311D4B812F4395C95D8591CB0B03EC613634B458360B44341496D1BB9C03E930B1A54B91
2,969,275 UART: [art] SIG.S = 54883052AFB5DDF1102983C690E4D9653BB4A91E252443359352CA4FBFB7CE6B9D2AE74D4245DE7DE32D33021222CC0E
2,993,660 UART: Caliptra RT
2,994,005 UART: [state] CFI Enabled
3,101,594 UART: [rt] RT listening for mailbox commands...
3,102,264 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,104 UART: [rt]cmd =0x50435252, len=8
3,133,579 >>> mbox cmd response data (8 bytes)
3,133,580 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,106,412 >>> mbox cmd response: success
5,106,412 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,119,650 UART:
5,119,666 UART: Running Caliptra FMC ...
5,120,074 UART:
5,120,217 UART: [state] CFI Enabled
5,209,390 UART: [art] Extend RT PCRs Done
5,209,818 UART: [art] Lock RT PCRs Done
5,211,119 UART: [art] Populate DV Done
5,219,438 UART: [fht] FMC Alias Private Key: 7
5,220,448 UART: [art] Derive CDI
5,220,728 UART: [art] Store in in slot 0x4
5,306,761 UART: [art] Derive Key Pair
5,307,121 UART: [art] Store priv key in slot 0x5
5,320,259 UART: [art] Derive Key Pair - Done
5,334,810 UART: [art] Signing Cert with AUTHO
5,335,290 UART: RITY.KEYID = 7
5,350,174 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,939 UART: [art] PUB.X = 222E3E65FFA0C5952C2F8DEC87679547D8F6DB0F368751C256D42132AB1F6EB3F504283161BAE3FC8692734F624CE932
5,357,705 UART: [art] PUB.Y = 92F769FC37F2A02B1619BDB7219402B8BDD188F83387518FE9613D03C22F17824176B846F595C1BD5FDD06609BA3FC25
5,364,646 UART: [art] SIG.R = CBE0BD7A88401CAD0B4E2C32A9E4B08C4778D66ECE59781563411E4120515308EE5108868EF84A937954A472DB75C593
5,371,405 UART: [art] SIG.S = E1A66526C08C04D0A013596313340EBC16F55B4D2B4C8B45F56B195049DF2B3BA5DEAD5D8CD8919EEE2CF8218DA8893E
5,394,824 UART: mbox::rt_entry...
5,395,196 UART: ____ _ _ _ ____ _____
5,395,980 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,396,780 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,397,548 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,398,316 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,399,084 UART: |_|
5,399,396 UART:
5,678,721 UART: [rt] Runtime listening for mailbox commands...
5,679,768 >>> mbox cmd response data (128 bytes)
5,679,769 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,651,077 >>> mbox cmd response: success
7,651,077 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,664,481 UART:
7,664,497 UART: Running Caliptra FMC ...
7,664,905 UART:
7,665,048 UART: [state] CFI Enabled
7,754,555 UART: [art] Extend RT PCRs Done
7,754,983 UART: [art] Lock RT PCRs Done
7,756,336 UART: [art] Populate DV Done
7,764,777 UART: [fht] FMC Alias Private Key: 7
7,765,831 UART: [art] Derive CDI
7,766,111 UART: [art] Store in in slot 0x4
7,851,304 UART: [art] Derive Key Pair
7,851,664 UART: [art] Store priv key in slot 0x5
7,865,642 UART: [art] Derive Key Pair - Done
7,880,563 UART: [art] Signing Cert with AUTHO
7,881,043 UART: RITY.KEYID = 7
7,896,513 UART: [art] Erasing AUTHORITY.KEYID = 7
7,897,278 UART: [art] PUB.X = D5EE8A72ED62AC37D013C93E072978E29E7B8DC51A9F76B93D9C18490FD6DA99838339C01C20B63ED7BBB8905825521C
7,904,048 UART: [art] PUB.Y = BCB9FAC463A4A9406D1B48402B8DE8602B38012B82DBE9904838E7A7E6155CF79E645C2CD6BFDBA449BC93B8E25507DB
7,911,006 UART: [art] SIG.R = 3E28E94710DBF3E1C7782AA2AA02D886905440E5ED422B900AFD0B555B6B81A4F7ABB89F7D9D09AE2E11296BC9606FBB
7,917,778 UART: [art] SIG.S = AD13BCA081B8E1782B8E665C513DCF2AA7410493586D09E93CA80CA05114F1C6204B536B71C7A8AEC6A4434B129CE1D5
7,941,326 UART: mbox::rt_entry...
7,941,698 UART: ____ _ _ _ ____ _____
7,942,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,943,282 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,944,050 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,944,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,945,586 UART: |_|
7,945,898 UART:
8,229,258 UART: [rt] Runtime listening for mailbox commands...
8,230,305 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,046 UART:
192,418 UART: Running Caliptra ROM ...
193,516 UART:
193,664 UART: [state] CFI Enabled
263,661 UART: [state] LifecycleState = Unprovisioned
265,660 UART: [state] DebugLocked = No
268,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,273 UART: [kat] SHA2-256
442,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,451 UART: [kat] ++
453,936 UART: [kat] sha1
465,599 UART: [kat] SHA2-256
468,329 UART: [kat] SHA2-384
472,998 UART: [kat] SHA2-512-ACC
475,331 UART: [kat] ECC-384
2,768,615 UART: [kat] HMAC-384Kdf
2,798,482 UART: [kat] LMS
3,988,770 UART: [kat] --
3,994,541 UART: [cold-reset] ++
3,996,690 UART: [fht] Storing FHT @ 0x50003400
4,009,374 UART: [idev] ++
4,009,954 UART: [idev] CDI.KEYID = 6
4,010,874 UART: [idev] SUBJECT.KEYID = 7
4,012,126 UART: [idev] UDS.KEYID = 0
4,013,180 ready_for_fw is high
4,013,388 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,938 UART: [idev] Erasing UDS.KEYID = 0
7,348,437 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,318 UART: [idev] --
7,374,742 UART: [ldev] ++
7,375,309 UART: [ldev] CDI.KEYID = 6
7,376,267 UART: [ldev] SUBJECT.KEYID = 5
7,377,485 UART: [ldev] AUTHORITY.KEYID = 7
7,378,715 UART: [ldev] FE.KEYID = 1
7,422,181 UART: [ldev] Erasing FE.KEYID = 1
10,750,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,820 UART: [ldev] --
13,116,286 UART: [fwproc] Waiting for Commands...
13,119,310 UART: [fwproc] Received command 0x46574c44
13,121,499 UART: [fwproc] Received Image of size 114124 bytes
17,175,910 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,641,767 >>> mbox cmd response: success
17,646,109 UART: [afmc] ++
17,646,711 UART: [afmc] CDI.KEYID = 6
17,647,651 UART: [afmc] SUBJECT.KEYID = 7
17,648,919 UART: [afmc] AUTHORITY.KEYID = 5
21,005,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,349 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,748 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,603 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,065 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,739 UART: [afmc] --
23,379,172 UART: [cold-reset] --
23,381,351 UART: [state] Locking Datavault
23,386,055 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,755 UART: [state] Locking ICCM
23,389,571 UART: [exit] Launching FMC @ 0x40000130
23,397,960 UART:
23,398,191 UART: Running Caliptra FMC ...
23,399,226 UART:
23,399,374 UART: [state] CFI Enabled
23,469,078 UART: [fht] FMC Alias Private Key: 7
25,807,532 UART: [art] Extend RT PCRs Done
25,808,753 UART: [art] Lock RT PCRs Done
25,810,434 UART: [art] Populate DV Done
25,815,585 UART: [fht] FMC Alias Private Key: 7
25,817,233 UART: [art] Derive CDI
25,818,050 UART: [art] Store in in slot 0x4
25,877,612 UART: [art] Derive Key Pair
25,878,647 UART: [art] Store priv key in slot 0x5
29,171,439 UART: [art] Derive Key Pair - Done
29,184,370 UART: [art] Signing Cert with AUTHO
29,185,688 UART: RITY.KEYID = 7
31,473,869 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,374 UART: [art] PUB.X = FFD6065941B689EC1557067C040B18491FC47B69811DBDF827FC3F502BFBE4266D77D84E50BD315CE8472C0F16D03114
31,482,633 UART: [art] PUB.Y = C4E857EC4C403CA5953BF64BB34956700F8BD428B6E555AEF7851A50908B5D4B85D2F2AF0112B30B2096A09F326ABF78
31,489,871 UART: [art] SIG.R = BE3EF384EAFE008DB5EFC87A21233291E92CD7932DF8BC0FF6F1893F3012AF2606C391270F5AB40678B46B2656CCD0CA
31,497,216 UART: [art] SIG.S = 2A8ED9492391F7DED666D4AF07AE46819209E80B2124E42FC3F489BFD68AFEC738B8CA5175825FED74BCFEB052A60037
32,802,188 UART: Caliptra RT
32,802,900 UART: [state] CFI Enabled
32,964,580 UART: [rt] RT listening for mailbox commands...
35,094,484 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,195,682 UART:
35,196,040 UART: Running Caliptra ROM ...
35,197,119 UART:
35,197,275 UART: [state] CFI Enabled
35,271,785 UART: [state] LifecycleState = Unprovisioned
35,273,721 UART: [state] DebugLocked = No
35,276,436 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,281,441 UART: [kat] SHA2-256
35,451,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,461,630 UART: [kat] ++
35,462,090 UART: [kat] sha1
35,474,278 UART: [kat] SHA2-256
35,476,983 UART: [kat] SHA2-384
35,481,562 UART: [kat] SHA2-512-ACC
35,483,969 UART: [kat] ECC-384
37,774,706 UART: [kat] HMAC-384Kdf
37,806,423 UART: [kat] LMS
38,996,778 UART: [kat] --
39,002,914 UART: [update-reset] ++
42,707,542 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,711,340 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,969,727 >>> mbox cmd response: success
42,970,111 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,970,827 UART: [update-reset] Copying MAN_2 To MAN_1
42,993,269 UART: [update-reset Success] --
42,998,636 UART: [state] Locking Datavault
43,001,453 UART: [state] Locking PCR0, PCR1 and PCR31
43,003,157 UART: [state] Locking ICCM
43,005,478 UART: [exit] Launching FMC @ 0x40000130
43,013,885 UART:
43,014,124 UART: Running Caliptra FMC ...
43,015,232 UART:
43,015,401 UART: [state] CFI Enabled
43,107,431 UART: [art] Extend RT PCRs Done
43,108,630 UART: [art] Lock RT PCRs Done
43,110,133 UART: [art] Populate DV Done
43,115,660 UART: [fht] FMC Alias Private Key: 7
43,117,370 UART: [art] Derive CDI
43,118,111 UART: [art] Store in in slot 0x4
43,176,681 UART: [art] Derive Key Pair
43,177,683 UART: [art] Store priv key in slot 0x5
46,470,465 UART: [art] Derive Key Pair - Done
46,483,566 UART: [art] Signing Cert with AUTHO
46,484,867 UART: RITY.KEYID = 7
48,771,182 UART: [art] Erasing AUTHORITY.KEYID = 7
48,772,682 UART: [art] PUB.X = 94AB9BCDD3A2B02060B623493331A3A41F2D97D0D558007114A275A32D557DD01CE2B452915919216DCBF9B38FA6A6E4
48,779,944 UART: [art] PUB.Y = 7FFE0685874F67DCE60A8124DEFAD7F828AA54EA3465459095E9440E92A6E4E6BDF84BCFECD0C8B958D47CD7E31FB6CA
48,787,183 UART: [art] SIG.R = 9958774C8ED35038E87DBBA04B948C175D5AB968A01A95118D874C081778B7598C6E20F89763D52C9F0864618FBC1A8A
48,794,567 UART: [art] SIG.S = 7BDD96211F9787A77180D30C84FEAEACDE66C9CA05AFD43DABCA2DE2F77496606AE0580C2F50791F5BDF04C11E5A410F
50,099,417 UART: mbox::rt_entry...
50,100,392 UART: ____ _ _ _ ____ _____
50,102,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,104,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,106,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,108,244 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,110,178 UART: |_|
50,110,990 UART:
50,395,907 UART: [rt] Runtime listening for mailbox commands...
50,398,072 >>> mbox cmd response data (48 bytes)
50,398,646 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,399,076 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,787,465 ready_for_fw is high
3,787,848 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,061 >>> mbox cmd response: success
23,561,048 UART:
23,561,441 UART: Running Caliptra FMC ...
23,562,644 UART:
23,562,819 UART: [state] CFI Enabled
23,613,029 UART: [fht] FMC Alias Private Key: 7
25,951,038 UART: [art] Extend RT PCRs Done
25,952,806 UART: [art] Lock RT PCRs Done
25,954,159 UART: [art] Populate DV Done
25,959,505 UART: [fht] FMC Alias Private Key: 7
25,961,011 UART: [art] Derive CDI
25,961,759 UART: [art] Store in in slot 0x4
26,025,684 UART: [art] Derive Key Pair
26,026,740 UART: [art] Store priv key in slot 0x5
29,319,247 UART: [art] Derive Key Pair - Done
29,332,161 UART: [art] Signing Cert with AUTHO
29,333,462 UART: RITY.KEYID = 7
31,626,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,030 UART: [art] PUB.X = 72014D79F4F396C2BE4F5768F244BDD9A94F725754ABF11B15FA7080C0603F8743BB6C9F477D7F6A651FB4146BB74E2D
31,635,684 UART: [art] PUB.Y = B374FE4334334774FD8B608B49D7429BA430DA461DCD78DA89194F06C68CF39DDB0813BFD8EB79E8BBC5286F3B0B9439
31,642,936 UART: [art] SIG.R = FCF6E42C5C67AE13CCEB009A1F944D9E92D8FF5FF9B047FBA1F7812AF0607D945CF205C13EE6A74CB23D559910E1F591
31,650,341 UART: [art] SIG.S = 0034BF5B38203968B88147760CCEADE0602FD4B59550E54AA6E0047A911B6FA2F4CEAA0A31CA1E9907576B149AE0F408
32,955,652 UART: Caliptra RT
32,956,807 UART: [state] CFI Enabled
33,124,965 UART: [rt] RT listening for mailbox commands...
35,256,148 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,240,686 >>> mbox cmd response: success
43,241,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,275,935 UART:
43,276,253 UART: Running Caliptra FMC ...
43,277,380 UART:
43,277,543 UART: [state] CFI Enabled
43,373,716 UART: [art] Extend RT PCRs Done
43,374,913 UART: [art] Lock RT PCRs Done
43,376,275 UART: [art] Populate DV Done
43,381,845 UART: [fht] FMC Alias Private Key: 7
43,383,391 UART: [art] Derive CDI
43,384,232 UART: [art] Store in in slot 0x4
43,442,938 UART: [art] Derive Key Pair
43,443,985 UART: [art] Store priv key in slot 0x5
46,736,815 UART: [art] Derive Key Pair - Done
46,749,973 UART: [art] Signing Cert with AUTHO
46,751,286 UART: RITY.KEYID = 7
49,038,176 UART: [art] Erasing AUTHORITY.KEYID = 7
49,039,690 UART: [art] PUB.X = 97B4341ACAD0DE41C7517A41A3047885405EB00E332C41402B16C55ED0A60C550EBCFC27A0831029DC9DC86F9B6AA689
49,046,941 UART: [art] PUB.Y = FA7ACCB547BB8C696DB977040EDE84443EB9545E3D3DC9CEE6887F228C5B28C4EE92049E230C8406B8BB14D07C21DC31
49,054,169 UART: [art] SIG.R = 873EF7D55E2A353A7FD43BFBDFF72B6DDEC3EC7847F9011E4ACDE239C976A44E90F09792AB59D0F30F52C06F3E2E1522
49,061,566 UART: [art] SIG.S = DCB775F0E54F8918CA9C89AE6DB1E68CA5D6A51A9A9F06B96DBB5339507887AFC2D48BE60D0FA09AC2F5A98151AF4437
50,366,472 UART: mbox::rt_entry...
50,367,428 UART: ____ _ _ _ ____ _____
50,369,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,371,418 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,373,348 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,375,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,377,234 UART: |_|
50,378,075 UART:
50,661,250 UART: [rt] Runtime listening for mailbox commands...
50,663,396 >>> mbox cmd response data (48 bytes)
50,663,975 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,664,411 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,338 UART:
192,697 UART: Running Caliptra ROM ...
193,798 UART:
603,566 UART: [state] CFI Enabled
616,446 UART: [state] LifecycleState = Unprovisioned
618,381 UART: [state] DebugLocked = No
619,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,538 UART: [kat] SHA2-256
794,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,874 UART: [kat] ++
805,317 UART: [kat] sha1
815,971 UART: [kat] SHA2-256
818,616 UART: [kat] SHA2-384
823,931 UART: [kat] SHA2-512-ACC
826,277 UART: [kat] ECC-384
3,110,480 UART: [kat] HMAC-384Kdf
3,122,397 UART: [kat] LMS
4,312,463 UART: [kat] --
4,319,380 UART: [cold-reset] ++
4,321,381 UART: [fht] Storing FHT @ 0x50003400
4,333,633 UART: [idev] ++
4,334,260 UART: [idev] CDI.KEYID = 6
4,335,139 UART: [idev] SUBJECT.KEYID = 7
4,336,446 UART: [idev] UDS.KEYID = 0
4,337,463 ready_for_fw is high
4,337,668 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,041 UART: [idev] Erasing UDS.KEYID = 0
7,621,687 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,654 UART: [idev] --
7,647,646 UART: [ldev] ++
7,648,207 UART: [ldev] CDI.KEYID = 6
7,649,138 UART: [ldev] SUBJECT.KEYID = 5
7,650,410 UART: [ldev] AUTHORITY.KEYID = 7
7,651,637 UART: [ldev] FE.KEYID = 1
7,662,306 UART: [ldev] Erasing FE.KEYID = 1
10,950,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,730 UART: [ldev] --
13,311,942 UART: [fwproc] Waiting for Commands...
13,314,835 UART: [fwproc] Received command 0x46574c44
13,317,003 UART: [fwproc] Received Image of size 114124 bytes
17,367,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,155 >>> mbox cmd response: success
17,834,578 UART: [afmc] ++
17,835,175 UART: [afmc] CDI.KEYID = 6
17,836,082 UART: [afmc] SUBJECT.KEYID = 7
17,837,351 UART: [afmc] AUTHORITY.KEYID = 5
21,148,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,010 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,430 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,236 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,719 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,855 UART: [afmc] --
23,510,229 UART: [cold-reset] --
23,514,517 UART: [state] Locking Datavault
23,520,090 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,843 UART: [state] Locking ICCM
23,524,204 UART: [exit] Launching FMC @ 0x40000130
23,532,562 UART:
23,532,795 UART: Running Caliptra FMC ...
23,533,897 UART:
23,534,057 UART: [state] CFI Enabled
23,541,998 UART: [fht] FMC Alias Private Key: 7
25,873,285 UART: [art] Extend RT PCRs Done
25,874,497 UART: [art] Lock RT PCRs Done
25,876,003 UART: [art] Populate DV Done
25,881,521 UART: [fht] FMC Alias Private Key: 7
25,883,051 UART: [art] Derive CDI
25,883,809 UART: [art] Store in in slot 0x4
25,926,392 UART: [art] Derive Key Pair
25,927,389 UART: [art] Store priv key in slot 0x5
29,169,260 UART: [art] Derive Key Pair - Done
29,181,927 UART: [art] Signing Cert with AUTHO
29,183,232 UART: RITY.KEYID = 7
31,462,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,104 UART: [art] PUB.X = DD654916243949CF9A7C4EF6E55BD2803EAFA45E3A4122EE5F763CDD36079284E3D2F64E4A613B9D8368DBA700D63052
31,471,365 UART: [art] PUB.Y = F679231968F1AF929E604AC013DEB62949048BF91AF372F1F7923A03A2C63E2B21DC7ED0E8E5ECB89E218D239AAB6857
31,478,635 UART: [art] SIG.R = 5AFE19CE8C9DDF16FAD63AA33FE601C8D44CB10A05F48051DD404F995F3C0A255AB7DCF398760A071FF27251A8A56646
31,486,016 UART: [art] SIG.S = 5FC52E1A0D1C3E0A153F4278AEBAB0EE2E6F97E384AF30734FD5C5C2C167EF953845D8A08110A5E4905C5E4CA8F0685E
32,791,212 UART: Caliptra RT
32,791,931 UART: [state] CFI Enabled
32,909,232 UART: [rt] RT listening for mailbox commands...
34,961,306 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,062,146 UART:
35,062,528 UART: Running Caliptra ROM ...
35,063,582 UART:
35,063,753 UART: [state] CFI Enabled
35,079,335 UART: [state] LifecycleState = Unprovisioned
35,081,224 UART: [state] DebugLocked = No
35,083,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,088,714 UART: [kat] SHA2-256
35,258,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,268,964 UART: [kat] ++
35,269,461 UART: [kat] sha1
35,281,363 UART: [kat] SHA2-256
35,284,054 UART: [kat] SHA2-384
35,289,718 UART: [kat] SHA2-512-ACC
35,292,064 UART: [kat] ECC-384
37,577,929 UART: [kat] HMAC-384Kdf
37,590,806 UART: [kat] LMS
38,780,871 UART: [kat] --
38,784,013 UART: [update-reset] ++
42,484,759 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,489,344 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,747,780 >>> mbox cmd response: success
42,748,157 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,749,690 UART: [update-reset] Copying MAN_2 To MAN_1
42,772,127 UART: [update-reset Success] --
42,777,869 UART: [state] Locking Datavault
42,781,817 UART: [state] Locking PCR0, PCR1 and PCR31
42,783,567 UART: [state] Locking ICCM
42,784,960 UART: [exit] Launching FMC @ 0x40000130
42,793,360 UART:
42,793,590 UART: Running Caliptra FMC ...
42,794,682 UART:
42,794,833 UART: [state] CFI Enabled
42,838,906 UART: [art] Extend RT PCRs Done
42,840,088 UART: [art] Lock RT PCRs Done
42,841,402 UART: [art] Populate DV Done
42,846,700 UART: [fht] FMC Alias Private Key: 7
42,848,287 UART: [art] Derive CDI
42,849,095 UART: [art] Store in in slot 0x4
42,891,844 UART: [art] Derive Key Pair
42,892,842 UART: [art] Store priv key in slot 0x5
46,134,963 UART: [art] Derive Key Pair - Done
46,147,989 UART: [art] Signing Cert with AUTHO
46,149,297 UART: RITY.KEYID = 7
48,428,553 UART: [art] Erasing AUTHORITY.KEYID = 7
48,430,057 UART: [art] PUB.X = D2F1DF6FA091A742D7AE7D08BBCEC072D5340619C099C0FF9532D9DECF3D04E2D0767299D08FD8F72A3AE1BACFEC9A7A
48,437,302 UART: [art] PUB.Y = FA364BC1BCE355AAA18947497E92A7863A3B479260F7C175268F8B69A0A919A4EC7BB8E4E1B8A8DEFAE5F1097B3E83FA
48,444,578 UART: [art] SIG.R = 18CDE45F0F5F06BD657212ADD8B885E03C78F8CB4FE61DE90A9E8B89351136D566080BAA4B364A3232B05A4E58F39632
48,451,968 UART: [art] SIG.S = 9CD3C94E0197DFDCA3ABB5A32788F5ED9351595EFC15D02B05FB01B298B54454CEAADC11E0E80E43992B7AE8EA0FDF12
49,756,478 UART: mbox::rt_entry...
49,757,445 UART: ____ _ _ _ ____ _____
49,759,452 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,761,459 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,763,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,765,307 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,767,230 UART: |_|
49,768,209 UART:
50,052,517 UART: [rt] Runtime listening for mailbox commands...
50,054,685 >>> mbox cmd response data (48 bytes)
50,055,247 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,055,676 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,127,240 ready_for_fw is high
4,127,634 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,683 >>> mbox cmd response: success
23,714,696 UART:
23,715,076 UART: Running Caliptra FMC ...
23,716,213 UART:
23,716,367 UART: [state] CFI Enabled
23,724,504 UART: [fht] FMC Alias Private Key: 7
26,055,520 UART: [art] Extend RT PCRs Done
26,056,737 UART: [art] Lock RT PCRs Done
26,058,688 UART: [art] Populate DV Done
26,064,002 UART: [fht] FMC Alias Private Key: 7
26,065,443 UART: [art] Derive CDI
26,066,205 UART: [art] Store in in slot 0x4
26,108,742 UART: [art] Derive Key Pair
26,109,740 UART: [art] Store priv key in slot 0x5
29,351,715 UART: [art] Derive Key Pair - Done
29,364,816 UART: [art] Signing Cert with AUTHO
29,366,117 UART: RITY.KEYID = 7
31,645,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,880 UART: [art] PUB.X = EE7D4716284339E704C0C9D1343714A6F24D1B7B80E287E67BC26555CBD39AB803393E0D96812299D1D88285E33D95AB
31,654,093 UART: [art] PUB.Y = 9107A70D3DC068271488EDB750C89DD764517B6E1B35E923CC4845249402B34796324A1948B40358D645947267A445DD
31,661,296 UART: [art] SIG.R = EEEA4E20083C43674605543C399DE0571B4D80DD9E5008A7BACC4E718DCA60E12C19C906EF8E76529936161CA1ED070A
31,668,679 UART: [art] SIG.S = FB73F375FB10DD9B0651E9EFC20708997FB573F192F5CA41A311245C6E67B095B80BC1CF8BC32CC4A1B6F57E83F2E870
32,973,356 UART: Caliptra RT
32,974,064 UART: [state] CFI Enabled
33,091,826 UART: [rt] RT listening for mailbox commands...
35,141,654 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,036,812 >>> mbox cmd response: success
43,037,336 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,073,006 UART:
43,073,302 UART: Running Caliptra FMC ...
43,074,420 UART:
43,074,575 UART: [state] CFI Enabled
43,118,874 UART: [art] Extend RT PCRs Done
43,120,063 UART: [art] Lock RT PCRs Done
43,121,595 UART: [art] Populate DV Done
43,127,285 UART: [fht] FMC Alias Private Key: 7
43,128,824 UART: [art] Derive CDI
43,129,636 UART: [art] Store in in slot 0x4
43,172,127 UART: [art] Derive Key Pair
43,173,169 UART: [art] Store priv key in slot 0x5
46,415,583 UART: [art] Derive Key Pair - Done
46,428,636 UART: [art] Signing Cert with AUTHO
46,429,946 UART: RITY.KEYID = 7
48,709,328 UART: [art] Erasing AUTHORITY.KEYID = 7
48,710,865 UART: [art] PUB.X = 880D66E11C6B5EEF846066ABC40F1E94035E753F1766E30D475656C8DDBFACDFCBE8427E1BB0DF67D6BF7AC625800857
48,718,110 UART: [art] PUB.Y = 99E7935D982939252F696BDAB10C185DB04676144B952748BE605797736EFE69C4B6E69DCF9CF273C5B657FC3A14B21E
48,725,337 UART: [art] SIG.R = 977EC64831F7DFA053077580AA88C7E94BFC067B33F3E3E4AEE3079820B31A43151FDB77A2729F9872A5CABBBADA753D
48,732,731 UART: [art] SIG.S = 6275749308CE640F4481C4350619B8C23A5C6B892AA7F6E93EAFA7C24DA5877C1142B92AD1626AB8C165B676C0F8AE04
50,038,279 UART: mbox::rt_entry...
50,039,250 UART: ____ _ _ _ ____ _____
50,041,258 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,043,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,045,204 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,047,135 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,048,991 UART: |_|
50,049,868 UART:
50,338,527 UART: [rt] Runtime listening for mailbox commands...
50,340,687 >>> mbox cmd response data (48 bytes)
50,341,279 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,341,706 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,207 UART:
192,560 UART: Running Caliptra ROM ...
193,754 UART:
193,931 UART: [state] CFI Enabled
263,724 UART: [state] LifecycleState = Unprovisioned
265,567 UART: [state] DebugLocked = No
267,380 UART: [state] WD Timer not started. Device not locked for debugging
270,917 UART: [kat] SHA2-256
450,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,570 UART: [kat] ++
462,093 UART: [kat] sha1
474,300 UART: [kat] SHA2-256
477,345 UART: [kat] SHA2-384
483,516 UART: [kat] SHA2-512-ACC
486,458 UART: [kat] ECC-384
2,949,699 UART: [kat] HMAC-384Kdf
2,972,678 UART: [kat] LMS
3,502,141 UART: [kat] --
3,504,313 UART: [cold-reset] ++
3,506,470 UART: [fht] FHT @ 0x50003400
3,517,751 UART: [idev] ++
3,518,350 UART: [idev] CDI.KEYID = 6
3,519,274 UART: [idev] SUBJECT.KEYID = 7
3,520,449 UART: [idev] UDS.KEYID = 0
3,521,372 ready_for_fw is high
3,521,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,863 UART: [idev] Erasing UDS.KEYID = 0
6,026,687 UART: [idev] Sha1 KeyId Algorithm
6,048,571 UART: [idev] --
6,052,463 UART: [ldev] ++
6,053,034 UART: [ldev] CDI.KEYID = 6
6,053,950 UART: [ldev] SUBJECT.KEYID = 5
6,055,116 UART: [ldev] AUTHORITY.KEYID = 7
6,056,403 UART: [ldev] FE.KEYID = 1
6,100,272 UART: [ldev] Erasing FE.KEYID = 1
8,604,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,322 UART: [ldev] --
10,413,243 UART: [fwproc] Wait for Commands...
10,415,442 UART: [fwproc] Recv command 0x46574c44
10,417,534 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,503 >>> mbox cmd response: success
14,287,295 UART: [afmc] ++
14,287,900 UART: [afmc] CDI.KEYID = 6
14,288,791 UART: [afmc] SUBJECT.KEYID = 7
14,289,976 UART: [afmc] AUTHORITY.KEYID = 5
16,829,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,279 UART: [afmc] --
18,631,467 UART: [cold-reset] --
18,634,241 UART: [state] Locking Datavault
18,637,921 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,602 UART: [state] Locking ICCM
18,642,032 UART: [exit] Launching FMC @ 0x40000130
18,650,431 UART:
18,650,671 UART: Running Caliptra FMC ...
18,651,773 UART:
18,651,960 UART: [state] CFI Enabled
18,713,235 UART: [fht] FMC Alias Private Key: 7
20,477,100 UART: [art] Extend RT PCRs Done
20,478,655 UART: [art] Lock RT PCRs Done
20,480,043 UART: [art] Populate DV Done
20,485,692 UART: [fht] FMC Alias Private Key: 7
20,487,283 UART: [art] Derive CDI
20,488,096 UART: [art] Store in in slot 0x4
20,545,521 UART: [art] Derive Key Pair
20,546,522 UART: [art] Store priv key in slot 0x5
23,010,008 UART: [art] Derive Key Pair - Done
23,022,601 UART: [art] Signing Cert with AUTHO
23,023,902 UART: RITY.KEYID = 7
24,735,726 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,231 UART: [art] PUB.X = 584F937D5CFAC75B0AB07CB7B282BCB22D2B3F73FAAE9BA0F62FD6E6987DCF80F5548F591D70D4F0A673C48BCF30BB9A
24,744,526 UART: [art] PUB.Y = E358427B85279694AE6A94140D469CBB880FC61BDC992EED5F3E03535660F779580C64FDD4DC8111FBFE62CB0D32E2E9
24,751,781 UART: [art] SIG.R = 91F3BC91E125B41F95A7AB5FF78D342551294F70F11CAB08BBB6435929677500B679215B88F81F7A855BA358D2BD168C
24,759,169 UART: [art] SIG.S = 21B1DD96367D7E65E1E14461027D449B65A6007018406093F5317753E7A4A85AEE23152A5A8ECF7C174C0BF05EFA7A51
25,737,719 UART: Caliptra RT
25,738,437 UART: [state] CFI Enabled
25,904,490 UART: [rt] RT listening for mailbox commands...
27,956,080 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,057,280 UART:
28,057,670 UART: Running Caliptra ROM ...
28,058,808 UART:
28,058,990 UART: [state] CFI Enabled
28,125,666 UART: [state] LifecycleState = Unprovisioned
28,127,547 UART: [state] DebugLocked = No
28,130,476 UART: [state] WD Timer not started. Device not locked for debugging
28,134,544 UART: [kat] SHA2-256
28,313,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,325,214 UART: [kat] ++
28,325,759 UART: [kat] sha1
28,336,765 UART: [kat] SHA2-256
28,339,786 UART: [kat] SHA2-384
28,346,255 UART: [kat] SHA2-512-ACC
28,349,196 UART: [kat] ECC-384
30,809,203 UART: [kat] HMAC-384Kdf
30,833,159 UART: [kat] LMS
31,362,621 UART: [kat] --
31,368,113 UART: [update-reset] ++
34,355,016 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,359,203 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,617,417 >>> mbox cmd response: success
34,617,804 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,618,961 UART: [update-reset] Copying MAN_2 To MAN_1
34,641,248 UART: [update-reset Success] --
34,647,019 UART: [state] Locking Datavault
34,650,498 UART: [state] Locking PCR0, PCR1 and PCR31
34,652,147 UART: [state] Locking ICCM
34,653,439 UART: [exit] Launching FMC @ 0x40000130
34,661,835 UART:
34,662,071 UART: Running Caliptra FMC ...
34,663,176 UART:
34,663,330 UART: [state] CFI Enabled
34,769,301 UART: [art] Extend RT PCRs Done
34,770,485 UART: [art] Lock RT PCRs Done
34,772,151 UART: [art] Populate DV Done
34,777,768 UART: [fht] FMC Alias Private Key: 7
34,779,363 UART: [art] Derive CDI
34,780,194 UART: [art] Store in in slot 0x4
34,838,652 UART: [art] Derive Key Pair
34,839,713 UART: [art] Store priv key in slot 0x5
37,302,283 UART: [art] Derive Key Pair - Done
37,315,157 UART: [art] Signing Cert with AUTHO
37,316,462 UART: RITY.KEYID = 7
39,027,949 UART: [art] Erasing AUTHORITY.KEYID = 7
39,029,459 UART: [art] PUB.X = 0B147171A05948059C2C95DB31D7FA1EF97598274B48BE3E15C813D8946940F0C8CE5F2272406827544A9996B14C59C6
39,036,825 UART: [art] PUB.Y = 3922CFF4036EF6D2E314ED937ECACA5C617CE963671D1D355706F60BD0724D250ECE144689283492F1CCA4B95186EA5E
39,043,961 UART: [art] SIG.R = CC7CEEB30AFF286DD1D2414960AE120F5303DE3899F2A52E25CECEE8FBFB2F5CC9270B91413A0EC4645768E8661E5149
39,051,353 UART: [art] SIG.S = 88E172C4017EF5095F41508D9E7A930CBDA8C339960A915C50E98B59EDB7DEA3F7AD5404184CBF9A8E87095F5979407B
40,030,215 UART: mbox::rt_entry...
40,031,167 UART: ____ _ _ _ ____ _____
40,033,147 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,035,151 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,037,081 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,039,038 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,040,970 UART: |_|
40,041,808 UART:
40,327,075 UART: [rt] Runtime listening for mailbox commands...
40,329,245 >>> mbox cmd response data (48 bytes)
40,329,852 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,330,289 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,360,399 ready_for_fw is high
3,360,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,195 >>> mbox cmd response: success
18,324,808 UART:
18,325,226 UART: Running Caliptra FMC ...
18,326,377 UART:
18,326,544 UART: [state] CFI Enabled
18,391,197 UART: [fht] FMC Alias Private Key: 7
20,154,830 UART: [art] Extend RT PCRs Done
20,156,044 UART: [art] Lock RT PCRs Done
20,157,967 UART: [art] Populate DV Done
20,163,379 UART: [fht] FMC Alias Private Key: 7
20,164,938 UART: [art] Derive CDI
20,165,675 UART: [art] Store in in slot 0x4
20,222,726 UART: [art] Derive Key Pair
20,223,765 UART: [art] Store priv key in slot 0x5
22,686,762 UART: [art] Derive Key Pair - Done
22,699,767 UART: [art] Signing Cert with AUTHO
22,701,074 UART: RITY.KEYID = 7
24,412,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,402 UART: [art] PUB.X = 7D0D5ABEA64FE7903B5E56CF21AFEAFDA135E5A6C4676FDB684BEFE25B0A999D1EF465DA8FD0CA336A2FC8FC76310680
24,421,760 UART: [art] PUB.Y = 904C2D3B6C8F6BD449C5D2F4076DF3B5719BF94639C5892FC176BD0689587F57571BDC055DD3769F6EB8B7EB2FA356E8
24,429,026 UART: [art] SIG.R = 00CEE5F591C26E4D11C9F6104AA035BF8031F59173DE9B6CD5A7B734106880E45C01D476E3D87861322903A2BCEDC896
24,436,387 UART: [art] SIG.S = 159C91A60E4609AFFCEF30DCA67674C8B7E977763E15CDF016A0AB81538ED37969F5AFC311B612647AA84C54C9CDB650
25,415,781 UART: Caliptra RT
25,416,491 UART: [state] CFI Enabled
25,581,190 UART: [rt] RT listening for mailbox commands...
27,658,771 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,180,787 >>> mbox cmd response: success
34,181,258 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,217,156 UART:
34,217,488 UART: Running Caliptra FMC ...
34,218,610 UART:
34,218,776 UART: [state] CFI Enabled
34,316,537 UART: [art] Extend RT PCRs Done
34,317,715 UART: [art] Lock RT PCRs Done
34,319,110 UART: [art] Populate DV Done
34,324,622 UART: [fht] FMC Alias Private Key: 7
34,326,272 UART: [art] Derive CDI
34,327,084 UART: [art] Store in in slot 0x4
34,385,587 UART: [art] Derive Key Pair
34,386,619 UART: [art] Store priv key in slot 0x5
36,848,781 UART: [art] Derive Key Pair - Done
36,861,715 UART: [art] Signing Cert with AUTHO
36,863,011 UART: RITY.KEYID = 7
38,575,146 UART: [art] Erasing AUTHORITY.KEYID = 7
38,576,683 UART: [art] PUB.X = FC7FA3B2273E9A4FE218E58C5E167D505FB426CEF56AF8584E0434FFDD5559E1806DB344DCDE7AB544CC07504A021F54
38,583,948 UART: [art] PUB.Y = 05901DAF2331E9BE2E06E8050F5735774425B930792EA4B4801444BAA6E3D2F98C3D900E5F10D9C1BC4D8D7AAA25C577
38,591,171 UART: [art] SIG.R = B28BD523BA5E94A728A4DC7EE73F0A3160D0BA64C8D759D9C59E6FB71D5984C2D48004FB8433123F4B0A9A77BEFE5C0E
38,598,587 UART: [art] SIG.S = 86BCB1642FCAC975AB5F60F6BE622D2D5CBAEDB57B77352998C08765BD358D278219B41EC7D18BB11967CFF59688B10E
39,577,484 UART: mbox::rt_entry...
39,578,446 UART: ____ _ _ _ ____ _____
39,580,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,582,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,584,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,586,181 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,588,036 UART: |_|
39,588,919 UART:
39,873,925 UART: [rt] Runtime listening for mailbox commands...
39,876,091 >>> mbox cmd response data (48 bytes)
39,876,678 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,877,049 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,334 UART:
192,718 UART: Running Caliptra ROM ...
193,891 UART:
603,370 UART: [state] CFI Enabled
617,549 UART: [state] LifecycleState = Unprovisioned
619,414 UART: [state] DebugLocked = No
620,866 UART: [state] WD Timer not started. Device not locked for debugging
623,752 UART: [kat] SHA2-256
802,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,422 UART: [kat] ++
814,954 UART: [kat] sha1
825,825 UART: [kat] SHA2-256
828,839 UART: [kat] SHA2-384
835,035 UART: [kat] SHA2-512-ACC
837,976 UART: [kat] ECC-384
3,277,539 UART: [kat] HMAC-384Kdf
3,289,199 UART: [kat] LMS
3,818,682 UART: [kat] --
3,823,395 UART: [cold-reset] ++
3,824,635 UART: [fht] FHT @ 0x50003400
3,834,542 UART: [idev] ++
3,835,110 UART: [idev] CDI.KEYID = 6
3,836,131 UART: [idev] SUBJECT.KEYID = 7
3,837,226 UART: [idev] UDS.KEYID = 0
3,838,265 ready_for_fw is high
3,838,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,035 UART: [idev] Erasing UDS.KEYID = 0
6,308,839 UART: [idev] Sha1 KeyId Algorithm
6,332,191 UART: [idev] --
6,335,154 UART: [ldev] ++
6,335,715 UART: [ldev] CDI.KEYID = 6
6,336,613 UART: [ldev] SUBJECT.KEYID = 5
6,337,817 UART: [ldev] AUTHORITY.KEYID = 7
6,339,038 UART: [ldev] FE.KEYID = 1
6,348,846 UART: [ldev] Erasing FE.KEYID = 1
8,823,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,223 UART: [ldev] --
10,618,586 UART: [fwproc] Wait for Commands...
10,620,235 UART: [fwproc] Recv command 0x46574c44
10,622,864 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,507 >>> mbox cmd response: success
14,485,063 UART: [afmc] ++
14,485,661 UART: [afmc] CDI.KEYID = 6
14,486,566 UART: [afmc] SUBJECT.KEYID = 7
14,487,716 UART: [afmc] AUTHORITY.KEYID = 5
16,985,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,302 UART: [afmc] --
18,779,672 UART: [cold-reset] --
18,783,545 UART: [state] Locking Datavault
18,788,023 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,673 UART: [state] Locking ICCM
18,791,760 UART: [exit] Launching FMC @ 0x40000130
18,800,150 UART:
18,800,375 UART: Running Caliptra FMC ...
18,801,465 UART:
18,801,614 UART: [state] CFI Enabled
18,809,542 UART: [fht] FMC Alias Private Key: 7
20,566,029 UART: [art] Extend RT PCRs Done
20,567,250 UART: [art] Lock RT PCRs Done
20,569,003 UART: [art] Populate DV Done
20,574,514 UART: [fht] FMC Alias Private Key: 7
20,576,098 UART: [art] Derive CDI
20,576,903 UART: [art] Store in in slot 0x4
20,619,269 UART: [art] Derive Key Pair
20,620,280 UART: [art] Store priv key in slot 0x5
23,046,545 UART: [art] Derive Key Pair - Done
23,059,433 UART: [art] Signing Cert with AUTHO
23,060,726 UART: RITY.KEYID = 7
24,765,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,367 UART: [art] PUB.X = D56AF4F32EC1B04E9297CDF9DF667CCE58719A4ED53D62FEEB33D9FED1D39683FBC5511C2B5AFAF45D4013AF43D9257C
24,774,646 UART: [art] PUB.Y = 2B2AD1EC779B15B5E8300FFED11C80BE19A37F21C75FC9F907B17B9C8148C0357C40264F3BED7607C7F9F21A5B775BEE
24,781,918 UART: [art] SIG.R = 23616AC6B9DCCA55D6A551D03146015D1972C62D04DFCC24705C464692DE02206E6FD0A9943EA7686EA3B62D57E2FA71
24,789,380 UART: [art] SIG.S = 158B2700507EEBF6FEFEAC07CB016D58F5E03F6403229FB0693AAB8F53F58FD1FED97E46849E9DC36C0B1EE4F81B1AC8
25,767,665 UART: Caliptra RT
25,768,368 UART: [state] CFI Enabled
25,885,318 UART: [rt] RT listening for mailbox commands...
27,937,146 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,037,897 UART:
28,038,258 UART: Running Caliptra ROM ...
28,039,383 UART:
28,039,545 UART: [state] CFI Enabled
28,053,489 UART: [state] LifecycleState = Unprovisioned
28,055,323 UART: [state] DebugLocked = No
28,056,809 UART: [state] WD Timer not started. Device not locked for debugging
28,059,898 UART: [kat] SHA2-256
28,239,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,250,618 UART: [kat] ++
28,251,154 UART: [kat] sha1
28,261,877 UART: [kat] SHA2-256
28,264,885 UART: [kat] SHA2-384
28,270,699 UART: [kat] SHA2-512-ACC
28,273,687 UART: [kat] ECC-384
30,715,387 UART: [kat] HMAC-384Kdf
30,727,792 UART: [kat] LMS
31,257,338 UART: [kat] --
31,261,056 UART: [update-reset] ++
34,262,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,265,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,523,492 >>> mbox cmd response: success
34,523,882 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,524,439 UART: [update-reset] Copying MAN_2 To MAN_1
34,546,771 UART: [update-reset Success] --
34,551,799 UART: [state] Locking Datavault
34,554,937 UART: [state] Locking PCR0, PCR1 and PCR31
34,556,582 UART: [state] Locking ICCM
34,558,021 UART: [exit] Launching FMC @ 0x40000130
34,566,469 UART:
34,566,694 UART: Running Caliptra FMC ...
34,567,804 UART:
34,567,956 UART: [state] CFI Enabled
34,612,014 UART: [art] Extend RT PCRs Done
34,613,155 UART: [art] Lock RT PCRs Done
34,614,567 UART: [art] Populate DV Done
34,619,906 UART: [fht] FMC Alias Private Key: 7
34,621,386 UART: [art] Derive CDI
34,622,143 UART: [art] Store in in slot 0x4
34,664,889 UART: [art] Derive Key Pair
34,665,902 UART: [art] Store priv key in slot 0x5
37,092,214 UART: [art] Derive Key Pair - Done
37,105,440 UART: [art] Signing Cert with AUTHO
37,106,767 UART: RITY.KEYID = 7
38,812,237 UART: [art] Erasing AUTHORITY.KEYID = 7
38,813,753 UART: [art] PUB.X = F7B188026D5F76ADF5CD1712DB9D51E321E69A8550A2CC2FF8FF479AB984943DB75D54295B8A1610D779A8C733054F06
38,820,997 UART: [art] PUB.Y = 866B452DF84C671FE9B0A5AC8F3492FFD171E7BEA3DB973B611E9E612E9BC2B5A8B491F33144679BEDD0799EE7E1BBCB
38,828,286 UART: [art] SIG.R = CBCDA246207D42999D4FE918402277CAD884EDB99E37A1254F1F5387CC92BD109D76DD88E43A04F77F63E92D26021EA6
38,835,676 UART: [art] SIG.S = BD448DF74EBE769D98B115B1FF02DC7E5ADF64D9932CF5AF68B98D0DBB8C05127B300832F527A3E1BB577201E44C88BD
39,814,771 UART: mbox::rt_entry...
39,816,215 UART: ____ _ _ _ ____ _____
39,818,113 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,820,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,822,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,824,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,826,431 UART: |_|
39,827,437 UART:
40,116,478 UART: [rt] Runtime listening for mailbox commands...
40,118,971 >>> mbox cmd response data (48 bytes)
40,119,703 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,120,140 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,691,396 ready_for_fw is high
3,691,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,020 >>> mbox cmd response: success
18,507,284 UART:
18,507,669 UART: Running Caliptra FMC ...
18,508,865 UART:
18,509,018 UART: [state] CFI Enabled
18,516,701 UART: [fht] FMC Alias Private Key: 7
20,273,314 UART: [art] Extend RT PCRs Done
20,274,537 UART: [art] Lock RT PCRs Done
20,276,059 UART: [art] Populate DV Done
20,281,478 UART: [fht] FMC Alias Private Key: 7
20,283,057 UART: [art] Derive CDI
20,283,876 UART: [art] Store in in slot 0x4
20,326,037 UART: [art] Derive Key Pair
20,327,033 UART: [art] Store priv key in slot 0x5
22,753,597 UART: [art] Derive Key Pair - Done
22,766,415 UART: [art] Signing Cert with AUTHO
22,767,741 UART: RITY.KEYID = 7
24,473,200 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,699 UART: [art] PUB.X = 6A982615EE0528545458B9624DC61DAF8C92EE1CC2D8F6E249A8A9E48BC42F030B0E491E1F7DFF65767020A7FEF487F2
24,481,921 UART: [art] PUB.Y = B46F6CB969E41639534E612FBBB4869154A90E20B1EB4D8E86532BE561BBE6D131A47D630DE7E277484CFE0058829ECA
24,489,211 UART: [art] SIG.R = CDE770F09303131720EA4393243A4DE08F2D66139A2E4B247C1A11D99839788D987B91013545FD67AD7E2ADB87AE6791
24,496,563 UART: [art] SIG.S = CFAC03B075F19BD7AA316F6BD93BE309C198260F4CC78BA6BAFD004D3317AE2169E8A7777177A70F5DDBCB3B4140986E
25,476,108 UART: Caliptra RT
25,476,810 UART: [state] CFI Enabled
25,593,571 UART: [rt] RT listening for mailbox commands...
27,645,109 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,078,994 >>> mbox cmd response: success
34,079,559 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,116,845 UART:
34,117,133 UART: Running Caliptra FMC ...
34,118,244 UART:
34,118,394 UART: [state] CFI Enabled
34,163,013 UART: [art] Extend RT PCRs Done
34,164,224 UART: [art] Lock RT PCRs Done
34,165,489 UART: [art] Populate DV Done
34,170,895 UART: [fht] FMC Alias Private Key: 7
34,172,535 UART: [art] Derive CDI
34,173,340 UART: [art] Store in in slot 0x4
34,215,938 UART: [art] Derive Key Pair
34,216,981 UART: [art] Store priv key in slot 0x5
36,643,552 UART: [art] Derive Key Pair - Done
36,656,396 UART: [art] Signing Cert with AUTHO
36,657,698 UART: RITY.KEYID = 7
38,362,734 UART: [art] Erasing AUTHORITY.KEYID = 7
38,364,244 UART: [art] PUB.X = 8DF79661389BFFBCB62B43A90AE3E715E360FEC33841476438FB5CD0908D7BC3AB824EC7EC6EB3AA476F0EAC2868760B
38,371,489 UART: [art] PUB.Y = E6166B6432B6184777474371046A7373E15C10138287DD40CD38BCA61F90A0A8BF6D78C2663F3C0C24219AF5D5CEBA32
38,378,776 UART: [art] SIG.R = 6A8CDE3A9223EB9349453DA8EFFD443CBBB034E21E2F9962B9A7272D7EA7D222454D43A49F677A44B22800B6E4E41314
38,386,156 UART: [art] SIG.S = 94A14E557A6EFC95978E36E8A0450203F4B1F5E2DDC41B60076ECE87C5423ADF66F8EAB5BE65414733AEE55B96404E15
39,364,684 UART: mbox::rt_entry...
39,365,647 UART: ____ _ _ _ ____ _____
39,367,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,369,626 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,371,550 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,373,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,375,390 UART: |_|
39,376,192 UART:
39,661,289 UART: [rt] Runtime listening for mailbox commands...
39,663,439 >>> mbox cmd response data (48 bytes)
39,664,014 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,664,476 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,270 UART:
192,652 UART: Running Caliptra ROM ...
193,799 UART:
193,950 UART: [state] CFI Enabled
263,929 UART: [state] LifecycleState = Unprovisioned
266,346 UART: [state] DebugLocked = No
267,671 UART: [state] WD Timer not started. Device not locked for debugging
272,512 UART: [kat] SHA2-256
462,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,166 UART: [kat] ++
473,697 UART: [kat] sha1
486,497 UART: [kat] SHA2-256
489,506 UART: [kat] SHA2-384
496,841 UART: [kat] SHA2-512-ACC
499,436 UART: [kat] ECC-384
2,951,070 UART: [kat] HMAC-384Kdf
2,972,898 UART: [kat] LMS
3,504,708 UART: [kat] --
3,507,917 UART: [cold-reset] ++
3,508,989 UART: [fht] FHT @ 0x50003400
3,520,835 UART: [idev] ++
3,521,544 UART: [idev] CDI.KEYID = 6
3,522,426 UART: [idev] SUBJECT.KEYID = 7
3,523,687 UART: [idev] UDS.KEYID = 0
3,524,611 ready_for_fw is high
3,524,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,744 UART: [idev] Erasing UDS.KEYID = 0
6,028,019 UART: [idev] Sha1 KeyId Algorithm
6,048,728 UART: [idev] --
6,053,531 UART: [ldev] ++
6,054,209 UART: [ldev] CDI.KEYID = 6
6,055,226 UART: [ldev] SUBJECT.KEYID = 5
6,056,330 UART: [ldev] AUTHORITY.KEYID = 7
6,057,562 UART: [ldev] FE.KEYID = 1
6,103,493 UART: [ldev] Erasing FE.KEYID = 1
8,609,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,196 UART: [ldev] --
10,418,324 UART: [fwproc] Wait for Commands...
10,421,045 UART: [fwproc] Recv command 0x46574c44
10,423,311 UART: [fwproc] Recv'd Img size: 114448 bytes
13,874,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,615,469 >>> mbox cmd response: success
14,620,313 UART: [afmc] ++
14,621,015 UART: [afmc] CDI.KEYID = 6
14,622,206 UART: [afmc] SUBJECT.KEYID = 7
14,623,642 UART: [afmc] AUTHORITY.KEYID = 5
17,152,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,879,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,881,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,897,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,912,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,927,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,950,625 UART: [afmc] --
18,954,376 UART: [cold-reset] --
18,956,679 UART: [state] Locking Datavault
18,962,689 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,881 UART: [state] Locking ICCM
18,966,924 UART: [exit] Launching FMC @ 0x40000130
18,975,596 UART:
18,975,826 UART: Running Caliptra FMC ...
18,976,924 UART:
18,977,085 UART: [state] CFI Enabled
19,035,357 UART: [fht] FMC Alias Private Key: 7
20,799,453 UART: [art] Extend RT PCRs Done
20,800,675 UART: [art] Lock RT PCRs Done
20,802,197 UART: [art] Populate DV Done
20,807,723 UART: [fht] FMC Alias Private Key: 7
20,809,420 UART: [art] Derive CDI
20,810,156 UART: [art] Store in in slot 0x4
20,868,499 UART: [art] Derive Key Pair
20,869,535 UART: [art] Store priv key in slot 0x5
23,332,623 UART: [art] Derive Key Pair - Done
23,345,780 UART: [art] Signing Cert with AUTHO
23,347,086 UART: RITY.KEYID = 7
25,058,602 UART: [art] Erasing AUTHORITY.KEYID = 7
25,060,104 UART: [art] PUB.X = ECCDA0F3BB236A0D39D92DEAE59BD9E1EB37F97D0FC1E21A70A173C386082CAA8C420BDB5A0E40A57FA8D5BE495CF506
25,067,341 UART: [art] PUB.Y = CF340F43FAA7FE9C326F0BAE5A956F024C36E9BE17B97671212B941F1D34E77C0559CC4714C6B925361B52C355EA4175
25,074,622 UART: [art] SIG.R = 488EAA58E5250A5F5AC1AFCE5826BC42973A953C9331AE2BBDA06477C501A4DC2C5C773AD368CAE3C1BDB9DAC6997E52
25,082,018 UART: [art] SIG.S = DEA8C6FF4E05C712C4A53B8F5B37159008202268A05CB673C54C921F1FC481218CB24E9169CBFA6075DD53730E8D5828
26,060,895 UART: Caliptra RT
26,061,585 UART: [state] CFI Enabled
26,226,399 UART: [rt] RT listening for mailbox commands...
28,277,494 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,378,625 UART:
28,378,985 UART: Running Caliptra ROM ...
28,380,115 UART:
28,380,284 UART: [state] CFI Enabled
28,449,529 UART: [state] LifecycleState = Unprovisioned
28,451,635 UART: [state] DebugLocked = No
28,453,724 UART: [state] WD Timer not started. Device not locked for debugging
28,457,867 UART: [kat] SHA2-256
28,647,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,658,515 UART: [kat] ++
28,659,030 UART: [kat] sha1
28,671,355 UART: [kat] SHA2-256
28,674,399 UART: [kat] SHA2-384
28,681,854 UART: [kat] SHA2-512-ACC
28,684,419 UART: [kat] ECC-384
31,130,499 UART: [kat] HMAC-384Kdf
31,155,096 UART: [kat] LMS
31,686,653 UART: [kat] --
31,690,821 UART: [update-reset] ++
34,716,259 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,719,951 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,113,727 >>> mbox cmd response: success
35,114,133 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,114,431 UART: [update-reset] Copying MAN_2 To MAN_1
35,151,955 UART: [update-reset Success] --
35,156,930 UART: [state] Locking Datavault
35,160,969 UART: [state] Locking PCR0, PCR1 and PCR31
35,163,165 UART: [state] Locking ICCM
35,165,318 UART: [exit] Launching FMC @ 0x40000130
35,173,944 UART:
35,174,178 UART: Running Caliptra FMC ...
35,175,276 UART:
35,175,434 UART: [state] CFI Enabled
35,262,228 UART: [art] Extend RT PCRs Done
35,263,411 UART: [art] Lock RT PCRs Done
35,264,917 UART: [art] Populate DV Done
35,270,328 UART: [fht] FMC Alias Private Key: 7
35,271,981 UART: [art] Derive CDI
35,272,794 UART: [art] Store in in slot 0x4
35,330,953 UART: [art] Derive Key Pair
35,331,991 UART: [art] Store priv key in slot 0x5
37,794,782 UART: [art] Derive Key Pair - Done
37,808,108 UART: [art] Signing Cert with AUTHO
37,809,416 UART: RITY.KEYID = 7
39,520,943 UART: [art] Erasing AUTHORITY.KEYID = 7
39,522,429 UART: [art] PUB.X = 8F7C82F901D94F64AF7A4A966B4DA60CE1F4832C6E50724808DBE56ED8B27F0CE363AC834A53CF07391FC9C4C9F00932
39,529,727 UART: [art] PUB.Y = A8E5A05047CDA0ACE8F1690477CD1652CB90F5C939F1CD174958A48EDA14B1C3E584B4B8069FBC43F9CAB9B60FF4B847
39,537,005 UART: [art] SIG.R = F42EC97CC2C2146DD72F81AB5048B1C43D49375D334DA10AB47739C423FB252986CBAA67F5ECC43D22D71235BB5D09DF
39,544,444 UART: [art] SIG.S = 44744B1B17F16BAAF88BC6F378948A84278835799512DE08553C80CFDE59AAAE80816F5BE9D4C33FE5A2769AE180656A
40,523,014 UART: mbox::rt_entry...
40,523,995 UART: ____ _ _ _ ____ _____
40,525,932 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,527,936 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,529,786 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,531,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,533,592 UART: |_|
40,534,472 UART:
40,817,945 UART: [rt] Runtime listening for mailbox commands...
40,820,106 >>> mbox cmd response data (48 bytes)
40,820,685 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,821,118 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,437,069 ready_for_fw is high
3,437,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,751,738 >>> mbox cmd response: success
19,047,148 UART:
19,047,532 UART: Running Caliptra FMC ...
19,048,645 UART:
19,048,805 UART: [state] CFI Enabled
19,116,119 UART: [fht] FMC Alias Private Key: 7
20,880,618 UART: [art] Extend RT PCRs Done
20,881,841 UART: [art] Lock RT PCRs Done
20,883,547 UART: [art] Populate DV Done
20,888,957 UART: [fht] FMC Alias Private Key: 7
20,890,659 UART: [art] Derive CDI
20,891,398 UART: [art] Store in in slot 0x4
20,948,829 UART: [art] Derive Key Pair
20,949,896 UART: [art] Store priv key in slot 0x5
23,412,454 UART: [art] Derive Key Pair - Done
23,425,260 UART: [art] Signing Cert with AUTHO
23,426,568 UART: RITY.KEYID = 7
25,138,215 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,722 UART: [art] PUB.X = FAF2E4E457A3E965FB717DBE8A201FDE62ECFD4597C3B346C515C2D3E290BE82833D66B33C6C718ED4F9F1428F171238
25,146,964 UART: [art] PUB.Y = 0E453F92E675B35FF83FADE9CAE564AC362597DC65AD7D1C31B7732CF7BEB39A191DB18FE5FFEE2B93E6207584AAECCB
25,154,278 UART: [art] SIG.R = A54D81AE6D15CE2C7725951DD7F53915A2F459766DD9125336D29B7E090EDC07812315AFC981C3E189C73D288650C122
25,161,669 UART: [art] SIG.S = 8CBB368E4C78607520B15F7A391517B0D80B1A7021E78F30FE1EBC65754AA63CED70993B2AC914531EEC8051E3796D38
26,140,994 UART: Caliptra RT
26,141,706 UART: [state] CFI Enabled
26,305,366 UART: [rt] RT listening for mailbox commands...
28,354,711 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,359,525 >>> mbox cmd response: success
35,360,077 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,394,457 UART:
35,394,752 UART: Running Caliptra FMC ...
35,395,794 UART:
35,395,947 UART: [state] CFI Enabled
35,489,026 UART: [art] Extend RT PCRs Done
35,490,221 UART: [art] Lock RT PCRs Done
35,491,707 UART: [art] Populate DV Done
35,497,017 UART: [fht] FMC Alias Private Key: 7
35,498,597 UART: [art] Derive CDI
35,499,334 UART: [art] Store in in slot 0x4
35,557,803 UART: [art] Derive Key Pair
35,558,804 UART: [art] Store priv key in slot 0x5
38,021,728 UART: [art] Derive Key Pair - Done
38,034,695 UART: [art] Signing Cert with AUTHO
38,036,010 UART: RITY.KEYID = 7
39,747,555 UART: [art] Erasing AUTHORITY.KEYID = 7
39,749,065 UART: [art] PUB.X = 2CEDC0A7833C1739890466EADF70CEFACA35DB672BB6029A720015EE9CA38AC602E783046E06A659B8A54D4A3281ECB2
39,756,316 UART: [art] PUB.Y = 80996AEF235743901B820ACE4FBB652480DB8F0C6DDEDE4B00AEB75E9F25512BC0766FE1AEE30510390A48316A379A50
39,763,540 UART: [art] SIG.R = 33578469B62ED6ED5CEBA958788EA149963C5CAD1BE0A1008FA695D625A6E26DC549AEDB5471BD232D5B55B7C35F8EB5
39,770,930 UART: [art] SIG.S = 02E299E852FAC9D5ECA1EF3147633AE69C31F31E20C7FDB3513706F12665BB1B55599399625EF46979055559D07749A3
40,749,179 UART: mbox::rt_entry...
40,750,139 UART: ____ _ _ _ ____ _____
40,752,070 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,754,078 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,755,937 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,757,864 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,759,720 UART: |_|
40,760,603 UART:
41,044,521 UART: [rt] Runtime listening for mailbox commands...
41,046,696 >>> mbox cmd response data (48 bytes)
41,047,262 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,047,692 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,394 UART:
192,765 UART: Running Caliptra ROM ...
193,904 UART:
603,612 UART: [state] CFI Enabled
619,025 UART: [state] LifecycleState = Unprovisioned
621,374 UART: [state] DebugLocked = No
623,192 UART: [state] WD Timer not started. Device not locked for debugging
627,998 UART: [kat] SHA2-256
817,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,617 UART: [kat] ++
829,232 UART: [kat] sha1
841,246 UART: [kat] SHA2-256
844,245 UART: [kat] SHA2-384
851,006 UART: [kat] SHA2-512-ACC
853,588 UART: [kat] ECC-384
3,293,635 UART: [kat] HMAC-384Kdf
3,306,939 UART: [kat] LMS
3,838,768 UART: [kat] --
3,842,711 UART: [cold-reset] ++
3,844,287 UART: [fht] FHT @ 0x50003400
3,856,046 UART: [idev] ++
3,856,745 UART: [idev] CDI.KEYID = 6
3,857,766 UART: [idev] SUBJECT.KEYID = 7
3,858,928 UART: [idev] UDS.KEYID = 0
3,859,849 ready_for_fw is high
3,860,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,782 UART: [idev] Erasing UDS.KEYID = 0
6,335,983 UART: [idev] Sha1 KeyId Algorithm
6,358,015 UART: [idev] --
6,363,088 UART: [ldev] ++
6,363,764 UART: [ldev] CDI.KEYID = 6
6,364,695 UART: [ldev] SUBJECT.KEYID = 5
6,365,898 UART: [ldev] AUTHORITY.KEYID = 7
6,367,017 UART: [ldev] FE.KEYID = 1
6,380,387 UART: [ldev] Erasing FE.KEYID = 1
8,854,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,974 UART: [ldev] --
10,642,690 UART: [fwproc] Wait for Commands...
10,645,551 UART: [fwproc] Recv command 0x46574c44
10,647,851 UART: [fwproc] Recv'd Img size: 114448 bytes
14,091,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,834,002 >>> mbox cmd response: success
14,838,884 UART: [afmc] ++
14,839,579 UART: [afmc] CDI.KEYID = 6
14,840,822 UART: [afmc] SUBJECT.KEYID = 7
14,842,261 UART: [afmc] AUTHORITY.KEYID = 5
17,346,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,840 UART: [afmc] --
19,142,732 UART: [cold-reset] --
19,146,542 UART: [state] Locking Datavault
19,152,166 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,316 UART: [state] Locking ICCM
19,156,885 UART: [exit] Launching FMC @ 0x40000130
19,165,552 UART:
19,165,779 UART: Running Caliptra FMC ...
19,166,795 UART:
19,166,934 UART: [state] CFI Enabled
19,175,246 UART: [fht] FMC Alias Private Key: 7
20,932,400 UART: [art] Extend RT PCRs Done
20,933,620 UART: [art] Lock RT PCRs Done
20,935,536 UART: [art] Populate DV Done
20,940,947 UART: [fht] FMC Alias Private Key: 7
20,942,492 UART: [art] Derive CDI
20,943,281 UART: [art] Store in in slot 0x4
20,985,874 UART: [art] Derive Key Pair
20,986,874 UART: [art] Store priv key in slot 0x5
23,413,238 UART: [art] Derive Key Pair - Done
23,426,334 UART: [art] Signing Cert with AUTHO
23,427,655 UART: RITY.KEYID = 7
25,132,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,854 UART: [art] PUB.X = CAE2378F45E306D65C71F31B1B93A3ECA054B6544CF1A5EAEA1F189946F2AE0FAB76476A9A14972ECB2440AC5F8384F6
25,141,107 UART: [art] PUB.Y = ABE5DB1543F55C48187799F5A45B671462AE932B5EFAC6205BBC672EBAE77F9BB74FD3352DC0ED0FFEC0842C367D8960
25,148,423 UART: [art] SIG.R = F91A25623F463D1E9D6F7BC499245ED3A6AB4F66DEE051C33FC137D15ADB116CB3C59E24E49ECFA29DBF2A4537005197
25,155,801 UART: [art] SIG.S = A4336AF78375826A60027BBDF7D47F34D1FECB5388518D006E141FA38FC5E82F5A46B7BF2B594047974D290E88C640D1
26,134,491 UART: Caliptra RT
26,135,178 UART: [state] CFI Enabled
26,252,245 UART: [rt] RT listening for mailbox commands...
28,304,712 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,405,624 UART:
28,405,990 UART: Running Caliptra ROM ...
28,407,118 UART:
28,407,279 UART: [state] CFI Enabled
28,418,957 UART: [state] LifecycleState = Unprovisioned
28,420,837 UART: [state] DebugLocked = No
28,422,153 UART: [state] WD Timer not started. Device not locked for debugging
28,426,559 UART: [kat] SHA2-256
28,616,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,627,181 UART: [kat] ++
28,627,726 UART: [kat] sha1
28,638,450 UART: [kat] SHA2-256
28,641,473 UART: [kat] SHA2-384
28,646,568 UART: [kat] SHA2-512-ACC
28,649,134 UART: [kat] ECC-384
31,089,491 UART: [kat] HMAC-384Kdf
31,101,723 UART: [kat] LMS
31,633,337 UART: [kat] --
31,635,481 UART: [update-reset] ++
34,655,934 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,659,188 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,052,966 >>> mbox cmd response: success
35,053,373 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,053,667 UART: [update-reset] Copying MAN_2 To MAN_1
35,090,799 UART: [update-reset Success] --
35,096,336 UART: [state] Locking Datavault
35,100,608 UART: [state] Locking PCR0, PCR1 and PCR31
35,102,823 UART: [state] Locking ICCM
35,105,144 UART: [exit] Launching FMC @ 0x40000130
35,113,832 UART:
35,114,070 UART: Running Caliptra FMC ...
35,115,172 UART:
35,115,323 UART: [state] CFI Enabled
35,159,381 UART: [art] Extend RT PCRs Done
35,160,518 UART: [art] Lock RT PCRs Done
35,162,063 UART: [art] Populate DV Done
35,167,568 UART: [fht] FMC Alias Private Key: 7
35,169,148 UART: [art] Derive CDI
35,169,951 UART: [art] Store in in slot 0x4
35,212,488 UART: [art] Derive Key Pair
35,213,529 UART: [art] Store priv key in slot 0x5
37,640,053 UART: [art] Derive Key Pair - Done
37,653,040 UART: [art] Signing Cert with AUTHO
37,654,353 UART: RITY.KEYID = 7
39,359,950 UART: [art] Erasing AUTHORITY.KEYID = 7
39,361,468 UART: [art] PUB.X = EDD36B9F1559D31A18C8DB552ABCAA56F90249C3CFAA2EBDA86258162A3900CD7B3E89801C1230E1E9338AF5AE37FDBD
39,368,704 UART: [art] PUB.Y = 981BEB4D7AF414BA0F05DBEC7BF3AACF27D65BEBFC198450757044016CC821EDC40C8294DF4A072E0FB91D908A49DB73
39,376,037 UART: [art] SIG.R = 3487264FF3B4A67D1066823C5EFFE3BCE83644C30571010C06DE778DE5A3A402EBC862208C71C64A5BD74C2178FB46A2
39,383,421 UART: [art] SIG.S = 1023F7493F8AF2D8EF938B7656BE840E68EC28B9E3BF25509161071F8D16E22EC6C6298C785635D30A76765437A73611
40,361,931 UART: mbox::rt_entry...
40,362,875 UART: ____ _ _ _ ____ _____
40,364,847 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,366,842 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,368,766 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,370,690 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,372,537 UART: |_|
40,373,329 UART:
40,657,115 UART: [rt] Runtime listening for mailbox commands...
40,659,272 >>> mbox cmd response data (48 bytes)
40,659,827 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,660,286 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,753,249 ready_for_fw is high
3,753,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,715 >>> mbox cmd response: success
19,222,389 UART:
19,222,773 UART: Running Caliptra FMC ...
19,223,963 UART:
19,224,119 UART: [state] CFI Enabled
19,232,219 UART: [fht] FMC Alias Private Key: 7
20,988,785 UART: [art] Extend RT PCRs Done
20,990,017 UART: [art] Lock RT PCRs Done
20,991,758 UART: [art] Populate DV Done
20,996,972 UART: [fht] FMC Alias Private Key: 7
20,998,670 UART: [art] Derive CDI
20,999,480 UART: [art] Store in in slot 0x4
21,042,080 UART: [art] Derive Key Pair
21,043,127 UART: [art] Store priv key in slot 0x5
23,469,620 UART: [art] Derive Key Pair - Done
23,483,094 UART: [art] Signing Cert with AUTHO
23,484,405 UART: RITY.KEYID = 7
25,189,736 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,229 UART: [art] PUB.X = 6CA1AF5569918D5A2CC423135F343410FBAE0668F27A142CC1D7BBC3251B84DBD789F589F670916E34643FD778F9A00B
25,198,508 UART: [art] PUB.Y = 9437535F0BDF29C586511E0410876872A90AF0E525CDDC0024EC88CCC6EBBB4E7B41634363F227A36893B0F0C01894E6
25,205,706 UART: [art] SIG.R = 5EF962A9F1FC94CB01C542FB04626BEBDD284C461F2F401FB1EBCB2C1F65AF3FD8E436477674901DF431D2F3918AB0FE
25,213,130 UART: [art] SIG.S = D9F7F445B72FD4A23CCF9433D7AB7A65CB1A389B64C377BC0DAC1A8D458DA66B6E8ECD4F98FDB9D7862B9889752D211B
26,192,246 UART: Caliptra RT
26,192,954 UART: [state] CFI Enabled
26,310,135 UART: [rt] RT listening for mailbox commands...
28,360,724 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,281,222 >>> mbox cmd response: success
35,281,723 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,315,727 UART:
35,316,019 UART: Running Caliptra FMC ...
35,317,136 UART:
35,317,282 UART: [state] CFI Enabled
35,361,360 UART: [art] Extend RT PCRs Done
35,362,546 UART: [art] Lock RT PCRs Done
35,363,996 UART: [art] Populate DV Done
35,369,663 UART: [fht] FMC Alias Private Key: 7
35,371,370 UART: [art] Derive CDI
35,372,203 UART: [art] Store in in slot 0x4
35,415,014 UART: [art] Derive Key Pair
35,416,054 UART: [art] Store priv key in slot 0x5
37,843,452 UART: [art] Derive Key Pair - Done
37,856,228 UART: [art] Signing Cert with AUTHO
37,857,524 UART: RITY.KEYID = 7
39,562,839 UART: [art] Erasing AUTHORITY.KEYID = 7
39,564,342 UART: [art] PUB.X = 12A1D5EB61AB922DC8A972CA2132406317CD0CD0E9D9B72259E2E01F42250E449840387A39157B0C21D00FA4F6E62D04
39,571,665 UART: [art] PUB.Y = AC6405593FCB2563C4F09319E33A1F1F4FFA99F3925FC884702E88E83C7C6F53E9E18164E3A9AA0FD081F4F6498E1B98
39,578,897 UART: [art] SIG.R = D3267499CA687962762269D63F8E6D5A51305DD063315423D9FE9A348ED3EBB4691EBC5541A8A4DED3BF6D7CE9548BA7
39,586,285 UART: [art] SIG.S = 23885C140C28C9A9A4F7D81ADE801AC3AAB6A1A8FDDB5B70914413040640E43FCDE9DEE4F3D0F1FBDC6E855EBEB161A0
40,564,828 UART: mbox::rt_entry...
40,565,794 UART: ____ _ _ _ ____ _____
40,567,776 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,569,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,571,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,573,660 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,575,560 UART: |_|
40,576,424 UART:
40,861,081 UART: [rt] Runtime listening for mailbox commands...
40,863,232 >>> mbox cmd response data (48 bytes)
40,863,788 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,864,208 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,707 UART: [kat] SHA2-256
881,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,753 UART: [kat] ++
885,905 UART: [kat] sha1
890,243 UART: [kat] SHA2-256
892,181 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,568 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,721 UART: [fht] Storing FHT @ 0x50003400
1,479,462 UART: [idev] ++
1,479,630 UART: [idev] CDI.KEYID = 6
1,479,990 UART: [idev] SUBJECT.KEYID = 7
1,480,414 UART: [idev] UDS.KEYID = 0
1,480,759 ready_for_fw is high
1,480,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,500 UART: [idev] Erasing UDS.KEYID = 0
1,504,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,126 UART: [idev] --
1,514,075 UART: [ldev] ++
1,514,243 UART: [ldev] CDI.KEYID = 6
1,514,606 UART: [ldev] SUBJECT.KEYID = 5
1,515,032 UART: [ldev] AUTHORITY.KEYID = 7
1,515,495 UART: [ldev] FE.KEYID = 1
1,520,983 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,097 UART: [fwproc] Waiting for Commands...
1,586,926 UART: [fwproc] Received command 0x46574c44
1,587,717 UART: [fwproc] Received Image of size 114448 bytes
2,886,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,937 >>> mbox cmd response: success
3,080,107 UART: [afmc] ++
3,080,275 UART: [afmc] CDI.KEYID = 6
3,080,637 UART: [afmc] SUBJECT.KEYID = 7
3,081,062 UART: [afmc] AUTHORITY.KEYID = 5
3,115,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,454 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,144 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,933 UART: [afmc] --
3,158,969 UART: [cold-reset] --
3,159,881 UART: [state] Locking Datavault
3,161,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,674 UART: [state] Locking ICCM
3,162,176 UART: [exit] Launching FMC @ 0x40000130
3,167,505 UART:
3,167,521 UART: Running Caliptra FMC ...
3,167,929 UART:
3,167,983 UART: [state] CFI Enabled
3,178,618 UART: [fht] FMC Alias Private Key: 7
3,286,269 UART: [art] Extend RT PCRs Done
3,286,697 UART: [art] Lock RT PCRs Done
3,287,843 UART: [art] Populate DV Done
3,296,252 UART: [fht] FMC Alias Private Key: 7
3,297,426 UART: [art] Derive CDI
3,297,706 UART: [art] Store in in slot 0x4
3,383,137 UART: [art] Derive Key Pair
3,383,497 UART: [art] Store priv key in slot 0x5
3,396,589 UART: [art] Derive Key Pair - Done
3,411,226 UART: [art] Signing Cert with AUTHO
3,411,706 UART: RITY.KEYID = 7
3,426,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,461 UART: [art] PUB.X = E69D12FAC03E6F0E6918720FA18EFF16BECBCCBF385FCDC359A3AA43A3810530676412BDB6857F868E461A1A844B5133
3,434,234 UART: [art] PUB.Y = B97DA69BE05948B1159990252160B3DBF949D3869CFF6306DC9332C622AE4FF468CA21C9C834CFCE251AF9A7E86A7759
3,441,187 UART: [art] SIG.R = E1F1C26F2BF04CC890AA5BB988EB603974829395131DF15FD59738E8272A3013D1E9410F63B5881D2D95AD7BA19E7301
3,447,951 UART: [art] SIG.S = D55C88FE33FCB3491D1FDE9CAE8571D27824D18AD700BA936DE8F05501F7BB52130D805DCEABD6C03E46DA2914529DD5
3,471,408 UART: Caliptra RT
3,471,661 UART: [state] CFI Enabled
3,578,915 UART: [rt] RT listening for mailbox commands...
3,579,585 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,010 UART:
3,581,026 UART: Running Caliptra ROM ...
3,581,434 UART:
3,581,488 UART: [state] CFI Enabled
3,584,256 UART: [state] LifecycleState = Unprovisioned
3,584,911 UART: [state] DebugLocked = No
3,585,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,076 UART: [kat] SHA2-256
4,381,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,122 UART: [kat] ++
4,385,274 UART: [kat] sha1
4,389,658 UART: [kat] SHA2-256
4,391,596 UART: [kat] SHA2-384
4,394,537 UART: [kat] SHA2-512-ACC
4,396,437 UART: [kat] ECC-384
4,402,164 UART: [kat] HMAC-384Kdf
4,406,658 UART: [kat] LMS
4,974,854 UART: [kat] --
4,975,927 UART: [update-reset] ++
5,902,693 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,903,969 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,000,403 >>> mbox cmd response: success
6,000,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,000,686 UART: [update-reset] Copying MAN_2 To MAN_1
6,008,700 UART: [update-reset Success] --
6,009,719 UART: [state] Locking Datavault
6,010,531 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,135 UART: [state] Locking ICCM
6,011,791 UART: [exit] Launching FMC @ 0x40000130
6,017,120 UART:
6,017,136 UART: Running Caliptra FMC ...
6,017,544 UART:
6,017,598 UART: [state] CFI Enabled
6,106,897 UART: [art] Extend RT PCRs Done
6,107,325 UART: [art] Lock RT PCRs Done
6,108,290 UART: [art] Populate DV Done
6,116,583 UART: [fht] FMC Alias Private Key: 7
6,117,743 UART: [art] Derive CDI
6,118,023 UART: [art] Store in in slot 0x4
6,203,290 UART: [art] Derive Key Pair
6,203,650 UART: [art] Store priv key in slot 0x5
6,216,722 UART: [art] Derive Key Pair - Done
6,231,278 UART: [art] Signing Cert with AUTHO
6,231,758 UART: RITY.KEYID = 7
6,246,500 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,265 UART: [art] PUB.X = 0238FA6480417A1CC34F11FFD68DC4A41D0905EFF774D5B748273FFBEDB3CB645C42269DE4CDE3BB3885C5239CC5BBD7
6,254,044 UART: [art] PUB.Y = 18FC7DDDC52582B6CA1120CB609369FA8D2B7367677ED3A3AB3485C3EF2A181F6F8607A7A4F3BC0F40063D66CE32207D
6,260,995 UART: [art] SIG.R = ECD7931A30F40191CF4DE697A27C637BF095FAC59202DB6D5D80DC35C20A4BDD062D93F3A13924E2930E8E274A72B275
6,267,758 UART: [art] SIG.S = A15FD2B69E3A237FBF67C1EEB2BA51220A61FFBE3457868B33FE7C33EBAA2D7EE626C030F3286C39035C8745356EB4B5
6,290,947 UART: mbox::rt_entry...
6,291,319 UART: ____ _ _ _ ____ _____
6,292,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,292,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,293,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,294,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,295,207 UART: |_|
6,295,519 UART:
6,574,722 UART: [rt] Runtime listening for mailbox commands...
6,575,912 >>> mbox cmd response data (48 bytes)
6,575,913 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,576,021 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,291 ready_for_fw is high
1,362,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,207 >>> mbox cmd response: success
2,991,511 UART:
2,991,527 UART: Running Caliptra FMC ...
2,991,935 UART:
2,991,989 UART: [state] CFI Enabled
3,002,388 UART: [fht] FMC Alias Private Key: 7
3,110,829 UART: [art] Extend RT PCRs Done
3,111,257 UART: [art] Lock RT PCRs Done
3,112,939 UART: [art] Populate DV Done
3,120,912 UART: [fht] FMC Alias Private Key: 7
3,121,910 UART: [art] Derive CDI
3,122,190 UART: [art] Store in in slot 0x4
3,207,271 UART: [art] Derive Key Pair
3,207,631 UART: [art] Store priv key in slot 0x5
3,220,415 UART: [art] Derive Key Pair - Done
3,235,087 UART: [art] Signing Cert with AUTHO
3,235,567 UART: RITY.KEYID = 7
3,251,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,836 UART: [art] PUB.X = 78B4FCBB6E2C7BA9E70EE374FF00AE73A02E6E23009F3A8AC1D921E761F240D74BA8923FD6CA95F684C37D71AA5EF479
3,258,577 UART: [art] PUB.Y = 5B1257E8FBFC1B9FAE40ABADDC5F54FB5A956423F0440EBFAC0F18EF0A5F68862895A75F9A15A18624815250D74B5814
3,265,530 UART: [art] SIG.R = C65F4101B1CD7B11290FF43CE338ED2E64BCED6EE559D66FBA48682E37285DC89D32EE7E55349B78F41E8F2CBC756FD9
3,272,310 UART: [art] SIG.S = B66B62EED011B056165C2072AA8DB5CBF3EEF4B6BE85AC591C82FDCAA66FDA0E4B3640BF6B0005698E05464285978EDB
3,296,306 UART: Caliptra RT
3,296,559 UART: [state] CFI Enabled
3,404,701 UART: [rt] RT listening for mailbox commands...
3,405,371 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,706,973 >>> mbox cmd response: success
5,706,973 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,720,608 UART:
5,720,624 UART: Running Caliptra FMC ...
5,721,032 UART:
5,721,086 UART: [state] CFI Enabled
5,810,345 UART: [art] Extend RT PCRs Done
5,810,773 UART: [art] Lock RT PCRs Done
5,812,004 UART: [art] Populate DV Done
5,820,371 UART: [fht] FMC Alias Private Key: 7
5,821,341 UART: [art] Derive CDI
5,821,621 UART: [art] Store in in slot 0x4
5,907,422 UART: [art] Derive Key Pair
5,907,782 UART: [art] Store priv key in slot 0x5
5,920,590 UART: [art] Derive Key Pair - Done
5,935,175 UART: [art] Signing Cert with AUTHO
5,935,655 UART: RITY.KEYID = 7
5,951,113 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,878 UART: [art] PUB.X = CB346C792B0DC6F8F9113630B5C80223C242798BF4C3E28539C8449053E877B1029E11A92B68EC15376BDA992BD53205
5,958,630 UART: [art] PUB.Y = 7E45E6B694EF3EBADBB6D19F71C432BE188E9D8AD2BA0C7027D5471664053B02C0F23246B088E35557848248F1224ECA
5,965,575 UART: [art] SIG.R = 221B8E2E357E2720DFBC3E33292FEC7703FC8DA3530CEEFA8F05CDF302212F1AAF4E822028607A0B64EA9D813B0409A7
5,972,336 UART: [art] SIG.S = C73B6CC5530A4E709913477B6FF06F2DBDFA73C7EF546FF68D315EC1A0CFE7F8ADF8EE2413A1E661FB2B656A8C6DE403
5,995,633 UART: mbox::rt_entry...
5,996,005 UART: ____ _ _ _ ____ _____
5,996,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,997,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,998,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,999,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,999,893 UART: |_|
6,000,205 UART:
6,279,543 UART: [rt] Runtime listening for mailbox commands...
6,280,733 >>> mbox cmd response data (48 bytes)
6,280,734 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,280,842 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,892 UART: [kat] SHA2-256
881,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,938 UART: [kat] ++
886,090 UART: [kat] sha1
890,148 UART: [kat] SHA2-256
892,086 UART: [kat] SHA2-384
894,883 UART: [kat] SHA2-512-ACC
896,784 UART: [kat] ECC-384
902,475 UART: [kat] HMAC-384Kdf
906,913 UART: [kat] LMS
1,475,109 UART: [kat] --
1,476,006 UART: [cold-reset] ++
1,476,520 UART: [fht] Storing FHT @ 0x50003400
1,479,435 UART: [idev] ++
1,479,603 UART: [idev] CDI.KEYID = 6
1,479,963 UART: [idev] SUBJECT.KEYID = 7
1,480,387 UART: [idev] UDS.KEYID = 0
1,480,732 ready_for_fw is high
1,480,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,505,241 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,514,780 UART: [ldev] ++
1,514,948 UART: [ldev] CDI.KEYID = 6
1,515,311 UART: [ldev] SUBJECT.KEYID = 5
1,515,737 UART: [ldev] AUTHORITY.KEYID = 7
1,516,200 UART: [ldev] FE.KEYID = 1
1,521,632 UART: [ldev] Erasing FE.KEYID = 1
1,546,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,605 UART: [ldev] --
1,586,008 UART: [fwproc] Waiting for Commands...
1,586,787 UART: [fwproc] Received command 0x46574c44
1,587,578 UART: [fwproc] Received Image of size 114448 bytes
2,887,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,420 >>> mbox cmd response: success
3,080,512 UART: [afmc] ++
3,080,680 UART: [afmc] CDI.KEYID = 6
3,081,042 UART: [afmc] SUBJECT.KEYID = 7
3,081,467 UART: [afmc] AUTHORITY.KEYID = 5
3,117,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,554 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,947 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,637 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,520 UART: [afmc] --
3,160,634 UART: [cold-reset] --
3,161,744 UART: [state] Locking Datavault
3,162,835 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,439 UART: [state] Locking ICCM
3,164,083 UART: [exit] Launching FMC @ 0x40000130
3,169,412 UART:
3,169,428 UART: Running Caliptra FMC ...
3,169,836 UART:
3,169,979 UART: [state] CFI Enabled
3,180,540 UART: [fht] FMC Alias Private Key: 7
3,288,809 UART: [art] Extend RT PCRs Done
3,289,237 UART: [art] Lock RT PCRs Done
3,290,915 UART: [art] Populate DV Done
3,299,352 UART: [fht] FMC Alias Private Key: 7
3,300,518 UART: [art] Derive CDI
3,300,798 UART: [art] Store in in slot 0x4
3,386,615 UART: [art] Derive Key Pair
3,386,975 UART: [art] Store priv key in slot 0x5
3,399,595 UART: [art] Derive Key Pair - Done
3,414,563 UART: [art] Signing Cert with AUTHO
3,415,043 UART: RITY.KEYID = 7
3,430,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,804 UART: [art] PUB.X = A6645349D13B696B47074EFB66C88F0C3413A15BFAD693EA02D7513D8CC259F5A1631C5A19D6939F336AB1634245DAC9
3,437,567 UART: [art] PUB.Y = 3F4BC04E7CCD125AF713DDDA8B8635142982704F3BA49655D8A31CA390E901CDD4DCE5443DC661D06FDEF5CE6DB96F99
3,444,532 UART: [art] SIG.R = BEDEECCCA2B1F3E382BA14EDD220FFC614E2BF2E3079CAB418F4AD6AAF93F35010FD308DB7212E10705BCA0A74DAEBC1
3,451,333 UART: [art] SIG.S = D57602AD6D2B34A85C6E0265174EB2EFDC2105F3EE0AF03837E764637250D3EF0E1B1FAC7F562AE3E125DCF80803841D
3,474,997 UART: Caliptra RT
3,475,342 UART: [state] CFI Enabled
3,584,572 UART: [rt] RT listening for mailbox commands...
3,585,242 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,245 UART:
3,586,261 UART: Running Caliptra ROM ...
3,586,669 UART:
3,586,810 UART: [state] CFI Enabled
3,589,658 UART: [state] LifecycleState = Unprovisioned
3,590,313 UART: [state] DebugLocked = No
3,590,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,592,380 UART: [kat] SHA2-256
4,386,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,426 UART: [kat] ++
4,390,578 UART: [kat] sha1
4,394,872 UART: [kat] SHA2-256
4,396,810 UART: [kat] SHA2-384
4,399,695 UART: [kat] SHA2-512-ACC
4,401,595 UART: [kat] ECC-384
4,407,414 UART: [kat] HMAC-384Kdf
4,411,920 UART: [kat] LMS
4,980,116 UART: [kat] --
4,980,757 UART: [update-reset] ++
5,908,869 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,909,993 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,006,427 >>> mbox cmd response: success
6,006,427 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,006,572 UART: [update-reset] Copying MAN_2 To MAN_1
6,014,586 UART: [update-reset Success] --
6,015,579 UART: [state] Locking Datavault
6,016,459 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,063 UART: [state] Locking ICCM
6,017,521 UART: [exit] Launching FMC @ 0x40000130
6,022,850 UART:
6,022,866 UART: Running Caliptra FMC ...
6,023,274 UART:
6,023,417 UART: [state] CFI Enabled
6,112,530 UART: [art] Extend RT PCRs Done
6,112,958 UART: [art] Lock RT PCRs Done
6,114,079 UART: [art] Populate DV Done
6,122,322 UART: [fht] FMC Alias Private Key: 7
6,123,358 UART: [art] Derive CDI
6,123,638 UART: [art] Store in in slot 0x4
6,209,545 UART: [art] Derive Key Pair
6,209,905 UART: [art] Store priv key in slot 0x5
6,223,875 UART: [art] Derive Key Pair - Done
6,238,693 UART: [art] Signing Cert with AUTHO
6,239,173 UART: RITY.KEYID = 7
6,254,725 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,490 UART: [art] PUB.X = 4840DCCF909A14B3FCE0DA7B3AEFC3BC17B79298BA9D1C7612A601747671FF205C86D6A99062E34262A786148E47BCFD
6,262,267 UART: [art] PUB.Y = BB3ADE4F8293D9C2E0911C6F0BE26A10B7BA2D83303B6CC6F02FEDF5ABD807F08382D0DC662575E9D1C8871C72B9AD38
6,269,229 UART: [art] SIG.R = 8A42D7272D058B8E4F5138E1EE42F1C9FACCDB93FDB499D1C80C05C9FF307CD47ED89A30D80FAA09A35B532078D0E76A
6,276,002 UART: [art] SIG.S = B2C44E674BFC2CC82FB652FD069CA9D0179821FA3F35C5D9065C5EBB7A2BB7128D0DA09E58FB0FF5ED1521DE67FF3C65
6,299,567 UART: mbox::rt_entry...
6,299,939 UART: ____ _ _ _ ____ _____
6,300,723 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,301,523 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,302,291 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,303,059 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,303,827 UART: |_|
6,304,139 UART:
6,585,472 UART: [rt] Runtime listening for mailbox commands...
6,586,662 >>> mbox cmd response data (48 bytes)
6,586,663 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,586,771 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,156 ready_for_fw is high
1,363,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,396 >>> mbox cmd response: success
2,992,956 UART:
2,992,972 UART: Running Caliptra FMC ...
2,993,380 UART:
2,993,523 UART: [state] CFI Enabled
3,004,406 UART: [fht] FMC Alias Private Key: 7
3,112,295 UART: [art] Extend RT PCRs Done
3,112,723 UART: [art] Lock RT PCRs Done
3,113,901 UART: [art] Populate DV Done
3,122,174 UART: [fht] FMC Alias Private Key: 7
3,123,340 UART: [art] Derive CDI
3,123,620 UART: [art] Store in in slot 0x4
3,208,991 UART: [art] Derive Key Pair
3,209,351 UART: [art] Store priv key in slot 0x5
3,222,333 UART: [art] Derive Key Pair - Done
3,237,284 UART: [art] Signing Cert with AUTHO
3,237,764 UART: RITY.KEYID = 7
3,252,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,627 UART: [art] PUB.X = 6C3F19B3FF4A8D9DD6047544EEF71A16B115C8658CFE12BC60A437DC3A79912F64DA50ABE91BB94366C2DC4079A9A72F
3,260,408 UART: [art] PUB.Y = 2BFD1DFED345E96A67C6704A71FEAE7AFD630D225B15D9059B0F882776EB04516647C08345C422C47A62054F58DBD0CF
3,267,351 UART: [art] SIG.R = 3B080E73715E99EC4EE4635D706CEDE7C92A1E7F2608BFA1871ABA5DD1B23A4527734D50A7072F316CE4C93BFAA3E976
3,274,121 UART: [art] SIG.S = 8BF87C86EE38D784356FA26F757982B037AB1753D35376B4C71663764D194AA6DD822CDA5A1707EB10C44842C82B939B
3,297,971 UART: Caliptra RT
3,298,316 UART: [state] CFI Enabled
3,407,209 UART: [rt] RT listening for mailbox commands...
3,407,879 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,708,292 >>> mbox cmd response: success
5,708,292 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,721,463 UART:
5,721,479 UART: Running Caliptra FMC ...
5,721,887 UART:
5,722,030 UART: [state] CFI Enabled
5,811,381 UART: [art] Extend RT PCRs Done
5,811,809 UART: [art] Lock RT PCRs Done
5,813,366 UART: [art] Populate DV Done
5,821,887 UART: [fht] FMC Alias Private Key: 7
5,822,853 UART: [art] Derive CDI
5,823,133 UART: [art] Store in in slot 0x4
5,908,476 UART: [art] Derive Key Pair
5,908,836 UART: [art] Store priv key in slot 0x5
5,922,564 UART: [art] Derive Key Pair - Done
5,937,171 UART: [art] Signing Cert with AUTHO
5,937,651 UART: RITY.KEYID = 7
5,952,959 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,724 UART: [art] PUB.X = 00B69DB586013062FF970EF891D8FE952BC8C769A32B65AB7DF2E3EEDE2A3A9DE4D1DB4710AC7AABE3EB58D698F0F905
5,960,485 UART: [art] PUB.Y = 805D8B1A8257E41E6D82AE533250BC4F56879F07095694EE6F991E566029894746681EE8FF078E76C2CE5D26995A85DF
5,967,420 UART: [art] SIG.R = E0F2FC7B777C98437A6732187F087091834F6E7E913768551D03D547F999FB8865265122EB656BAB5BCE8F158318EB4D
5,974,178 UART: [art] SIG.S = 728450E4A254827A32D9D2AC778688E07885142B4EBD803A50A2198DD80801033633A684EB2A005E9B38F8FCEDCAC465
5,997,286 UART: mbox::rt_entry...
5,997,658 UART: ____ _ _ _ ____ _____
5,998,442 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,999,242 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,000,010 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,000,778 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,001,546 UART: |_|
6,001,858 UART:
6,284,188 UART: [rt] Runtime listening for mailbox commands...
6,285,378 >>> mbox cmd response data (48 bytes)
6,285,379 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,285,487 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
893,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,835 UART: [kat] ++
897,987 UART: [kat] sha1
902,095 UART: [kat] SHA2-256
904,035 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,636 UART: [kat] HMAC-384Kdf
923,342 UART: [kat] LMS
1,171,670 UART: [kat] --
1,172,665 UART: [cold-reset] ++
1,173,187 UART: [fht] FHT @ 0x50003400
1,175,926 UART: [idev] ++
1,176,094 UART: [idev] CDI.KEYID = 6
1,176,454 UART: [idev] SUBJECT.KEYID = 7
1,176,878 UART: [idev] UDS.KEYID = 0
1,177,223 ready_for_fw is high
1,177,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,832 UART: [idev] Erasing UDS.KEYID = 0
1,201,439 UART: [idev] Sha1 KeyId Algorithm
1,209,873 UART: [idev] --
1,210,991 UART: [ldev] ++
1,211,159 UART: [ldev] CDI.KEYID = 6
1,211,522 UART: [ldev] SUBJECT.KEYID = 5
1,211,948 UART: [ldev] AUTHORITY.KEYID = 7
1,212,411 UART: [ldev] FE.KEYID = 1
1,217,851 UART: [ldev] Erasing FE.KEYID = 1
1,244,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,165 UART: [ldev] --
1,283,474 UART: [fwproc] Wait for Commands...
1,284,104 UART: [fwproc] Recv command 0x46574c44
1,284,832 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,466 >>> mbox cmd response: success
2,777,572 UART: [afmc] ++
2,777,740 UART: [afmc] CDI.KEYID = 6
2,778,102 UART: [afmc] SUBJECT.KEYID = 7
2,778,527 UART: [afmc] AUTHORITY.KEYID = 5
2,813,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,275 UART: [afmc] --
2,857,181 UART: [cold-reset] --
2,858,033 UART: [state] Locking Datavault
2,859,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,722 UART: [state] Locking ICCM
2,860,240 UART: [exit] Launching FMC @ 0x40000130
2,865,569 UART:
2,865,585 UART: Running Caliptra FMC ...
2,865,993 UART:
2,866,047 UART: [state] CFI Enabled
2,876,554 UART: [fht] FMC Alias Private Key: 7
2,985,405 UART: [art] Extend RT PCRs Done
2,985,833 UART: [art] Lock RT PCRs Done
2,987,315 UART: [art] Populate DV Done
2,995,620 UART: [fht] FMC Alias Private Key: 7
2,996,774 UART: [art] Derive CDI
2,997,054 UART: [art] Store in in slot 0x4
3,082,887 UART: [art] Derive Key Pair
3,083,247 UART: [art] Store priv key in slot 0x5
3,095,899 UART: [art] Derive Key Pair - Done
3,110,703 UART: [art] Signing Cert with AUTHO
3,111,183 UART: RITY.KEYID = 7
3,126,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,008 UART: [art] PUB.X = 678BDB83302DFB0726BCE9AE6DC35FD624EF6108E34B493CCE9238D483E008C60B70030346BC23694D1A9AAAD9C8387B
3,133,770 UART: [art] PUB.Y = DEE89FD609BCC087D75C098A12EF6B8C5722BC59D820682692BAA4B79B7841962E2B8B15D2DD8D46440926B72D2874A5
3,140,715 UART: [art] SIG.R = 69EBBFFEA74DA90EA810D22D26165A15ABE4A2F501319F5046930C56BD416ACE27FD6C9FF6325098EB8267264C1D2D2C
3,147,488 UART: [art] SIG.S = 91A2CDD76585DA367399838A604CDDA6CBB6F8051A80EC01B4DE175A001A983BFACB72194B3D7364230E87D1C005B126
3,171,391 UART: Caliptra RT
3,171,644 UART: [state] CFI Enabled
3,278,831 UART: [rt] RT listening for mailbox commands...
3,279,501 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,343 UART:
3,280,359 UART: Running Caliptra ROM ...
3,280,767 UART:
3,280,822 UART: [state] CFI Enabled
3,283,704 UART: [state] LifecycleState = Unprovisioned
3,284,359 UART: [state] DebugLocked = No
3,284,849 UART: [state] WD Timer not started. Device not locked for debugging
3,286,187 UART: [kat] SHA2-256
4,091,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,962 UART: [kat] ++
4,096,114 UART: [kat] sha1
4,100,492 UART: [kat] SHA2-256
4,102,432 UART: [kat] SHA2-384
4,105,059 UART: [kat] SHA2-512-ACC
4,106,959 UART: [kat] ECC-384
4,116,582 UART: [kat] HMAC-384Kdf
4,121,148 UART: [kat] LMS
4,369,476 UART: [kat] --
4,370,214 UART: [update-reset] ++
5,275,691 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,754 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,373,136 >>> mbox cmd response: success
5,373,136 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,373,357 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,371 UART: [update-reset Success] --
5,382,266 UART: [state] Locking Datavault
5,382,966 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,570 UART: [state] Locking ICCM
5,384,236 UART: [exit] Launching FMC @ 0x40000130
5,389,565 UART:
5,389,581 UART: Running Caliptra FMC ...
5,389,989 UART:
5,390,043 UART: [state] CFI Enabled
5,479,614 UART: [art] Extend RT PCRs Done
5,480,042 UART: [art] Lock RT PCRs Done
5,481,187 UART: [art] Populate DV Done
5,489,344 UART: [fht] FMC Alias Private Key: 7
5,490,462 UART: [art] Derive CDI
5,490,742 UART: [art] Store in in slot 0x4
5,576,267 UART: [art] Derive Key Pair
5,576,627 UART: [art] Store priv key in slot 0x5
5,589,189 UART: [art] Derive Key Pair - Done
5,604,016 UART: [art] Signing Cert with AUTHO
5,604,496 UART: RITY.KEYID = 7
5,619,970 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,735 UART: [art] PUB.X = BA6FE2D1B0E2CB4F6A76B18A1DDCA11117C93B3BC9D4DC0F0A93A21FE1E86E6FC320511F1A2C60039B3661CF4FAC4297
5,627,518 UART: [art] PUB.Y = 8DCECDBEE8FE76D5E33DAA13A6354BA9C25EDE2E7D766543A86CFAC764F7AAD7CEC5FDD565EE3520CDD78DF49C919B75
5,634,502 UART: [art] SIG.R = 14DAA77B51E229FDA39B6C0914E7DFC2F063B44C91D769B811FC6767389ABA4F45DD06A5CE98301501A141C50D31FE65
5,641,268 UART: [art] SIG.S = 4C3C9BEB8A03FF297B4020A5C34C02C434E29453185426BA44E1295106AFF224388DF0917D509A9925B7FB86CF7D4C99
5,664,472 UART: mbox::rt_entry...
5,664,844 UART: ____ _ _ _ ____ _____
5,665,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,666,428 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,667,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,667,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,668,732 UART: |_|
5,669,044 UART:
5,948,620 UART: [rt] Runtime listening for mailbox commands...
5,949,810 >>> mbox cmd response data (48 bytes)
5,949,811 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,949,919 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 ready_for_fw is high
1,059,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,419 >>> mbox cmd response: success
2,689,253 UART:
2,689,269 UART: Running Caliptra FMC ...
2,689,677 UART:
2,689,731 UART: [state] CFI Enabled
2,700,318 UART: [fht] FMC Alias Private Key: 7
2,809,581 UART: [art] Extend RT PCRs Done
2,810,009 UART: [art] Lock RT PCRs Done
2,811,569 UART: [art] Populate DV Done
2,819,956 UART: [fht] FMC Alias Private Key: 7
2,820,890 UART: [art] Derive CDI
2,821,170 UART: [art] Store in in slot 0x4
2,906,645 UART: [art] Derive Key Pair
2,907,005 UART: [art] Store priv key in slot 0x5
2,920,511 UART: [art] Derive Key Pair - Done
2,935,180 UART: [art] Signing Cert with AUTHO
2,935,660 UART: RITY.KEYID = 7
2,950,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,751 UART: [art] PUB.X = A6DDC3F9D499A5A6F8E75B4661123AD39040EB502A05451586EA59E9A8D2ED0F67EC5A8F82F117E3148DBE9D7C72F65A
2,958,527 UART: [art] PUB.Y = 47F0C1B5D58535316C5E61177D8D10D036A0BEA8D0355E3A8B003C9C229CCF57E03BFC014C13F0587818A02CE6B9AD88
2,965,458 UART: [art] SIG.R = 79791E00413A077C61AD3735380301D5594764B74697AEB5D0E863A06872F1E7565B31EA7A42272B1A61B5657CA57E4B
2,972,187 UART: [art] SIG.S = AC79BB0AB98C355BC26727B3708D51D945363F480CFC2594A5156785F68E6C573527A40AF6AF221A77D2538D0F234890
2,996,334 UART: Caliptra RT
2,996,587 UART: [state] CFI Enabled
3,103,960 UART: [rt] RT listening for mailbox commands...
3,104,630 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,082,181 >>> mbox cmd response: success
5,082,181 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,095,461 UART:
5,095,477 UART: Running Caliptra FMC ...
5,095,885 UART:
5,095,939 UART: [state] CFI Enabled
5,185,114 UART: [art] Extend RT PCRs Done
5,185,542 UART: [art] Lock RT PCRs Done
5,186,913 UART: [art] Populate DV Done
5,195,268 UART: [fht] FMC Alias Private Key: 7
5,196,382 UART: [art] Derive CDI
5,196,662 UART: [art] Store in in slot 0x4
5,282,601 UART: [art] Derive Key Pair
5,282,961 UART: [art] Store priv key in slot 0x5
5,296,745 UART: [art] Derive Key Pair - Done
5,311,747 UART: [art] Signing Cert with AUTHO
5,312,227 UART: RITY.KEYID = 7
5,327,709 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,474 UART: [art] PUB.X = 54F17FFB25C820305EEFA7E087C10E57745C45539809BC8C41B10A68D3C732E4C58891B78180BF93F94FE2CB8AA979F3
5,335,239 UART: [art] PUB.Y = D978AE8FA8318FB8EA883B882F01CE6ABF7B6D825B06ABCAF5A1302629198193984714BE2FEAE770A7B53B6DE8957436
5,342,193 UART: [art] SIG.R = 11EA9CE1B337BD13EC0D994DDA84E647FA0B09B8668BA3760839293E83EFB77EE88AAC6003588DDB39C6713D97701CA8
5,348,958 UART: [art] SIG.S = 37D078713F2F3D68CD59D3B105F0FF1F9E80BB05F9F6150F8D011A46CCE27846E4EEB8B3C8121D0286B4CF9176E9CF8C
5,372,848 UART: mbox::rt_entry...
5,373,220 UART: ____ _ _ _ ____ _____
5,374,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,374,804 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,375,572 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,376,340 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,377,108 UART: |_|
5,377,420 UART:
5,662,312 UART: [rt] Runtime listening for mailbox commands...
5,663,502 >>> mbox cmd response data (48 bytes)
5,663,503 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,663,611 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,350 UART: [kat] SHA2-256
904,290 UART: [kat] SHA2-384
907,105 UART: [kat] SHA2-512-ACC
909,006 UART: [kat] ECC-384
919,061 UART: [kat] HMAC-384Kdf
923,673 UART: [kat] LMS
1,172,001 UART: [kat] --
1,172,756 UART: [cold-reset] ++
1,173,240 UART: [fht] FHT @ 0x50003400
1,176,023 UART: [idev] ++
1,176,191 UART: [idev] CDI.KEYID = 6
1,176,551 UART: [idev] SUBJECT.KEYID = 7
1,176,975 UART: [idev] UDS.KEYID = 0
1,177,320 ready_for_fw is high
1,177,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,045 UART: [idev] Erasing UDS.KEYID = 0
1,202,426 UART: [idev] Sha1 KeyId Algorithm
1,211,078 UART: [idev] --
1,212,356 UART: [ldev] ++
1,212,524 UART: [ldev] CDI.KEYID = 6
1,212,887 UART: [ldev] SUBJECT.KEYID = 5
1,213,313 UART: [ldev] AUTHORITY.KEYID = 7
1,213,776 UART: [ldev] FE.KEYID = 1
1,219,184 UART: [ldev] Erasing FE.KEYID = 1
1,246,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,390 UART: [ldev] --
1,285,883 UART: [fwproc] Wait for Commands...
1,286,579 UART: [fwproc] Recv command 0x46574c44
1,287,307 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,835 >>> mbox cmd response: success
2,779,029 UART: [afmc] ++
2,779,197 UART: [afmc] CDI.KEYID = 6
2,779,559 UART: [afmc] SUBJECT.KEYID = 7
2,779,984 UART: [afmc] AUTHORITY.KEYID = 5
2,815,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,478 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,091 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,812 UART: [afmc] --
2,858,852 UART: [cold-reset] --
2,859,616 UART: [state] Locking Datavault
2,860,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,533 UART: [state] Locking ICCM
2,862,095 UART: [exit] Launching FMC @ 0x40000130
2,867,424 UART:
2,867,440 UART: Running Caliptra FMC ...
2,867,848 UART:
2,867,991 UART: [state] CFI Enabled
2,878,538 UART: [fht] FMC Alias Private Key: 7
2,985,561 UART: [art] Extend RT PCRs Done
2,985,989 UART: [art] Lock RT PCRs Done
2,987,639 UART: [art] Populate DV Done
2,995,992 UART: [fht] FMC Alias Private Key: 7
2,996,958 UART: [art] Derive CDI
2,997,238 UART: [art] Store in in slot 0x4
3,082,973 UART: [art] Derive Key Pair
3,083,333 UART: [art] Store priv key in slot 0x5
3,097,035 UART: [art] Derive Key Pair - Done
3,111,549 UART: [art] Signing Cert with AUTHO
3,112,029 UART: RITY.KEYID = 7
3,127,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,148 UART: [art] PUB.X = B58123E3B4DC1F037F22BEC2238ADA6E23A261016687129797E5FE53F09085B156DB8CC114AD384745A90E8E64C13E2A
3,134,911 UART: [art] PUB.Y = EFB5409A68B4DBF3C1A0FCB941B4ABDEC0850C1C6D6A6AAA718D4528BA1B3733DAB37E8BBD3495CC7DECF21DDA6252DB
3,141,892 UART: [art] SIG.R = 2C3572A03AA2A20D033657314113E52EE906F4949310588931A6FEF4B4443610FB434CE7A299817A35F32643908CE206
3,148,636 UART: [art] SIG.S = 0023C13425B303D1A49CC0254552F92202641B31E572AFA352A3B211EECED2238BD4B2025F9B1625C4D0A26266C1CA2D
3,172,282 UART: Caliptra RT
3,172,627 UART: [state] CFI Enabled
3,280,487 UART: [rt] RT listening for mailbox commands...
3,281,157 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,549 UART:
3,282,565 UART: Running Caliptra ROM ...
3,282,973 UART:
3,283,115 UART: [state] CFI Enabled
3,285,725 UART: [state] LifecycleState = Unprovisioned
3,286,380 UART: [state] DebugLocked = No
3,286,894 UART: [state] WD Timer not started. Device not locked for debugging
3,288,008 UART: [kat] SHA2-256
4,093,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,783 UART: [kat] ++
4,097,935 UART: [kat] sha1
4,102,057 UART: [kat] SHA2-256
4,103,997 UART: [kat] SHA2-384
4,106,846 UART: [kat] SHA2-512-ACC
4,108,746 UART: [kat] ECC-384
4,118,925 UART: [kat] HMAC-384Kdf
4,123,597 UART: [kat] LMS
4,371,925 UART: [kat] --
4,372,713 UART: [update-reset] ++
5,277,031 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,146 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,374,528 >>> mbox cmd response: success
5,374,528 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,374,847 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,861 UART: [update-reset Success] --
5,383,944 UART: [state] Locking Datavault
5,384,762 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,366 UART: [state] Locking ICCM
5,385,940 UART: [exit] Launching FMC @ 0x40000130
5,391,269 UART:
5,391,285 UART: Running Caliptra FMC ...
5,391,693 UART:
5,391,836 UART: [state] CFI Enabled
5,480,795 UART: [art] Extend RT PCRs Done
5,481,223 UART: [art] Lock RT PCRs Done
5,482,598 UART: [art] Populate DV Done
5,490,869 UART: [fht] FMC Alias Private Key: 7
5,491,975 UART: [art] Derive CDI
5,492,255 UART: [art] Store in in slot 0x4
5,578,022 UART: [art] Derive Key Pair
5,578,382 UART: [art] Store priv key in slot 0x5
5,591,746 UART: [art] Derive Key Pair - Done
5,606,433 UART: [art] Signing Cert with AUTHO
5,606,913 UART: RITY.KEYID = 7
5,622,297 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,062 UART: [art] PUB.X = 632EB37302625BA4BBD6B272AD0A75A0531600827CF8511692FEDF0074D89A69B66248F36F70E1AAEE78720609E93009
5,629,769 UART: [art] PUB.Y = 37FF00816FA9500355C7F2C10614630C1AC8BDF7C0E81F0BC4A41C5A806B99D16EB38DAEEECCE28F525D816778952994
5,636,693 UART: [art] SIG.R = 0FFC4E5D37A34773BDB81D576D5E64D9058D5ABF3C49A40CDDD1093289E2371E4C6EF1A90B100263C307393EA82E96F1
5,643,450 UART: [art] SIG.S = FF10C6CA7869853CF06173B63E7690D091F04E317F4433EE1361A920A535D1974B774F6D204A3299C87C652B99E6244B
5,667,371 UART: mbox::rt_entry...
5,667,743 UART: ____ _ _ _ ____ _____
5,668,527 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,669,327 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,670,095 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,670,863 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,671,631 UART: |_|
5,671,943 UART:
5,955,791 UART: [rt] Runtime listening for mailbox commands...
5,956,981 >>> mbox cmd response data (48 bytes)
5,956,982 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,957,090 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 ready_for_fw is high
1,060,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,326 >>> mbox cmd response: success
2,691,302 UART:
2,691,318 UART: Running Caliptra FMC ...
2,691,726 UART:
2,691,869 UART: [state] CFI Enabled
2,702,090 UART: [fht] FMC Alias Private Key: 7
2,809,821 UART: [art] Extend RT PCRs Done
2,810,249 UART: [art] Lock RT PCRs Done
2,811,927 UART: [art] Populate DV Done
2,820,304 UART: [fht] FMC Alias Private Key: 7
2,821,340 UART: [art] Derive CDI
2,821,620 UART: [art] Store in in slot 0x4
2,907,521 UART: [art] Derive Key Pair
2,907,881 UART: [art] Store priv key in slot 0x5
2,921,281 UART: [art] Derive Key Pair - Done
2,936,219 UART: [art] Signing Cert with AUTHO
2,936,699 UART: RITY.KEYID = 7
2,951,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,658 UART: [art] PUB.X = 3002EB34BBED7A9FDEE99C419F18C0B7D21BCF4D000C782665AE5FABC11F6E005A4F868768A7E9CAE1BB8A4DD12720CF
2,959,402 UART: [art] PUB.Y = C66DF1353580D234171B5B1AD8DEC65DC65F9118004FBD1DFBB2A1FA38DA7EC3CA4A82312D0F89185134A5EC74EF6E5B
2,966,345 UART: [art] SIG.R = AD8F6890C5A4B1882E96E50457A8CC3FE0C628DFFD677B7830B64276CAC1E14E822722C2876AB896B22943A37E875EBE
2,973,118 UART: [art] SIG.S = E22471BF9778FD7EDD7EC3E692E68CA3CD48C9C4202CFC9A1854626672729A16AD8258BACEA1BE81568BA50544B57567
2,997,070 UART: Caliptra RT
2,997,415 UART: [state] CFI Enabled
3,104,985 UART: [rt] RT listening for mailbox commands...
3,105,655 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,084,447 >>> mbox cmd response: success
5,084,447 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,097,893 UART:
5,097,909 UART: Running Caliptra FMC ...
5,098,317 UART:
5,098,460 UART: [state] CFI Enabled
5,187,677 UART: [art] Extend RT PCRs Done
5,188,105 UART: [art] Lock RT PCRs Done
5,189,138 UART: [art] Populate DV Done
5,197,003 UART: [fht] FMC Alias Private Key: 7
5,197,935 UART: [art] Derive CDI
5,198,215 UART: [art] Store in in slot 0x4
5,283,990 UART: [art] Derive Key Pair
5,284,350 UART: [art] Store priv key in slot 0x5
5,297,468 UART: [art] Derive Key Pair - Done
5,312,460 UART: [art] Signing Cert with AUTHO
5,312,940 UART: RITY.KEYID = 7
5,327,830 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,595 UART: [art] PUB.X = 179BDF190440271BD161CC95038B83FFE7551A13DD8A3A9ED6A4761E459C4FC0E7C30DAF0F13F09916F9F8B5E30F3E86
5,335,360 UART: [art] PUB.Y = B3A1F1C4B9A857D473E83B1761AAF9B6D30E244977BAD21B5B3638AB4D2E8B508374897EFBDA48295D8AB43F4A690A3E
5,342,316 UART: [art] SIG.R = 47102B623A6D6EF8371F2AE528CE5F385F22BF9B7186310CD507562B1936DFD57679EEFF16896BAB03E67FA6C9042B33
5,349,078 UART: [art] SIG.S = CCEEAE8E344C82B54426677873320F0CCD10D62F891B3425509C8AA6807EB017569A5E09FF5C7F979B39FDF89772997D
5,372,702 UART: mbox::rt_entry...
5,373,074 UART: ____ _ _ _ ____ _____
5,373,858 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,374,658 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,375,426 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,376,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,376,962 UART: |_|
5,377,274 UART:
5,661,162 UART: [rt] Runtime listening for mailbox commands...
5,662,352 >>> mbox cmd response data (48 bytes)
5,662,353 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,662,461 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,413 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,174,959 ready_for_fw is high
1,174,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,869 UART: [idev] Sha1 KeyId Algorithm
1,208,647 UART: [idev] --
1,209,750 UART: [ldev] ++
1,209,918 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,709 UART: [ldev] AUTHORITY.KEYID = 7
1,211,172 UART: [ldev] FE.KEYID = 1
1,216,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,281,833 UART: [fwproc] Recv command 0x46574c44
1,282,566 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,928 >>> mbox cmd response: success
2,774,955 UART: [afmc] ++
2,775,123 UART: [afmc] CDI.KEYID = 6
2,775,486 UART: [afmc] SUBJECT.KEYID = 7
2,775,912 UART: [afmc] AUTHORITY.KEYID = 5
2,811,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,596 UART: [afmc] --
2,854,536 UART: [cold-reset] --
2,855,458 UART: [state] Locking Datavault
2,856,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,279 UART: [state] Locking ICCM
2,857,871 UART: [exit] Launching FMC @ 0x40000130
2,863,200 UART:
2,863,216 UART: Running Caliptra FMC ...
2,863,624 UART:
2,863,678 UART: [state] CFI Enabled
2,874,549 UART: [fht] FMC Alias Private Key: 7
2,982,418 UART: [art] Extend RT PCRs Done
2,982,846 UART: [art] Lock RT PCRs Done
2,984,236 UART: [art] Populate DV Done
2,992,431 UART: [fht] FMC Alias Private Key: 7
2,993,555 UART: [art] Derive CDI
2,993,835 UART: [art] Store in in slot 0x4
3,079,248 UART: [art] Derive Key Pair
3,079,608 UART: [art] Store priv key in slot 0x5
3,092,462 UART: [art] Derive Key Pair - Done
3,106,985 UART: [art] Signing Cert with AUTHO
3,107,465 UART: RITY.KEYID = 7
3,122,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,194 UART: [art] PUB.X = A9ECA2F0A9A2A5ED82BCA390957101FEC0937563C0FD164B7E5644E4DE37E7F414F8EAF2DAB36321C2B95D5E3CE34780
3,129,977 UART: [art] PUB.Y = 464E15418AF2A96E1AF2CD8600EB5ADFFBDCBDA0F50865EA82549AE40E30E96B98B2B22B363CB5FCCFF158FFC77AA36E
3,136,927 UART: [art] SIG.R = 9DB4B6FFBF22695BCA36D42E6E1291DE3EA3174B1402B84603DC3106B4407D2B8718FB3F145C1BB53F8A066852A89C93
3,143,691 UART: [art] SIG.S = CD76E9ACCC9A504019E43D66F23FA6487C2F281EEB1E72360F3B345EF97C705C8E09D0B9DC8FE83D08711AB2A9949E7E
3,167,193 UART: Caliptra RT
3,167,446 UART: [state] CFI Enabled
3,275,082 UART: [rt] RT listening for mailbox commands...
3,275,752 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,896 UART:
3,276,912 UART: Running Caliptra ROM ...
3,277,320 UART:
3,277,375 UART: [state] CFI Enabled
3,279,851 UART: [state] LifecycleState = Unprovisioned
3,280,506 UART: [state] DebugLocked = No
3,281,186 UART: [state] WD Timer not started. Device not locked for debugging
3,282,308 UART: [kat] SHA2-256
4,085,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,987 UART: [kat] ++
4,090,139 UART: [kat] sha1
4,094,357 UART: [kat] SHA2-256
4,096,297 UART: [kat] SHA2-384
4,099,112 UART: [kat] SHA2-512-ACC
4,101,012 UART: [kat] ECC-384
4,111,019 UART: [kat] HMAC-384Kdf
4,115,703 UART: [kat] LMS
4,364,015 UART: [kat] --
4,364,857 UART: [update-reset] ++
5,269,046 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,251 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,366,633 >>> mbox cmd response: success
5,366,633 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,366,864 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,878 UART: [update-reset Success] --
5,375,947 UART: [state] Locking Datavault
5,376,775 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,379 UART: [state] Locking ICCM
5,378,007 UART: [exit] Launching FMC @ 0x40000130
5,383,336 UART:
5,383,352 UART: Running Caliptra FMC ...
5,383,760 UART:
5,383,814 UART: [state] CFI Enabled
5,472,537 UART: [art] Extend RT PCRs Done
5,472,965 UART: [art] Lock RT PCRs Done
5,474,260 UART: [art] Populate DV Done
5,482,367 UART: [fht] FMC Alias Private Key: 7
5,483,379 UART: [art] Derive CDI
5,483,659 UART: [art] Store in in slot 0x4
5,569,144 UART: [art] Derive Key Pair
5,569,504 UART: [art] Store priv key in slot 0x5
5,582,508 UART: [art] Derive Key Pair - Done
5,597,384 UART: [art] Signing Cert with AUTHO
5,597,864 UART: RITY.KEYID = 7
5,612,682 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,447 UART: [art] PUB.X = E9C80FEFF599AFDE8844BD3E055723B09C1560C366A31BAB469CED187A683FAC90032F66E92776F5D9BE607048BF049B
5,620,215 UART: [art] PUB.Y = 72D4247FE39ABB8262B09C2E5A6A99C7BB6B03782A0EB47BF97A4A5FB0CD47030FAFE1FACD907C479893652B2970F4A6
5,627,167 UART: [art] SIG.R = 91297C63CEC130E655C088636B11DB0C1835E50B03DADE0253D55EAF3A4A761FAE40BE746E18DF486C9D0C0DAB3420DC
5,633,933 UART: [art] SIG.S = C54CABB5C4E5CDFC981204D21A2708D50780DC7F872D8B6F6A8B004BD4EABA5787209A686BAEAC1DF9BAB41B0A4859FC
5,657,676 UART: mbox::rt_entry...
5,658,048 UART: ____ _ _ _ ____ _____
5,658,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,659,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,660,400 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,661,168 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,661,936 UART: |_|
5,662,248 UART:
5,942,539 UART: [rt] Runtime listening for mailbox commands...
5,943,729 >>> mbox cmd response data (48 bytes)
5,943,730 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,943,838 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,006 ready_for_fw is high
1,056,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,236 >>> mbox cmd response: success
2,684,938 UART:
2,684,954 UART: Running Caliptra FMC ...
2,685,362 UART:
2,685,416 UART: [state] CFI Enabled
2,696,079 UART: [fht] FMC Alias Private Key: 7
2,804,544 UART: [art] Extend RT PCRs Done
2,804,972 UART: [art] Lock RT PCRs Done
2,806,518 UART: [art] Populate DV Done
2,814,637 UART: [fht] FMC Alias Private Key: 7
2,815,751 UART: [art] Derive CDI
2,816,031 UART: [art] Store in in slot 0x4
2,901,882 UART: [art] Derive Key Pair
2,902,242 UART: [art] Store priv key in slot 0x5
2,914,980 UART: [art] Derive Key Pair - Done
2,929,514 UART: [art] Signing Cert with AUTHO
2,929,994 UART: RITY.KEYID = 7
2,945,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,259 UART: [art] PUB.X = F4C13A9F3DA01076F5BBC0D706EE52DCB39D71A65F21B2DE156774FA804BBEA592A1DBA495DD8042B95161221DDADFBA
2,953,048 UART: [art] PUB.Y = 2F41DB25E54785223E5F44D3209BB3F3E035989D54FBF74A63C77949E2E9228A7E1A49124AA504621408C0EAA8324EF6
2,959,990 UART: [art] SIG.R = EE874F2524E2100496FE5E11EB8EF48D02415E03D9C5822400A19BE189E347C29F17A42219C540B28AB6A303500FBF98
2,966,721 UART: [art] SIG.S = A008D2C3DD9F0DAE43CD5C97758959FCDFBCBEC3E76394235700D26FA3E67D5AC4FB6D4278BD8DFBA5587C6BCA8775DE
2,990,302 UART: Caliptra RT
2,990,555 UART: [state] CFI Enabled
3,098,717 UART: [rt] RT listening for mailbox commands...
3,099,387 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,071,933 >>> mbox cmd response: success
5,071,933 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,839 UART:
5,085,855 UART: Running Caliptra FMC ...
5,086,263 UART:
5,086,317 UART: [state] CFI Enabled
5,175,418 UART: [art] Extend RT PCRs Done
5,175,846 UART: [art] Lock RT PCRs Done
5,177,205 UART: [art] Populate DV Done
5,185,434 UART: [fht] FMC Alias Private Key: 7
5,186,394 UART: [art] Derive CDI
5,186,674 UART: [art] Store in in slot 0x4
5,272,373 UART: [art] Derive Key Pair
5,272,733 UART: [art] Store priv key in slot 0x5
5,285,807 UART: [art] Derive Key Pair - Done
5,300,766 UART: [art] Signing Cert with AUTHO
5,301,246 UART: RITY.KEYID = 7
5,316,504 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,269 UART: [art] PUB.X = 629B8F3A177CF65444EEC935F2384EE3322FBC1AA193A3DAA42271C110487B080C671D8E92B8CAB585458D31D78CC64B
5,324,039 UART: [art] PUB.Y = FA04988AA05BAF23798B41AC3575AB338C5D0FDE7C1BC71C2B136E4C6758233F0D858F71694A6302E41A76CA38E58FD9
5,330,985 UART: [art] SIG.R = A83C95479C6D31B9295E11C4D473922CD0553ABCAA0FED3E494830EAD5F8B2DA8ECABD995A0469692FB2D814A968D96E
5,337,763 UART: [art] SIG.S = 014F7AA51B14994DB30A38D7082C1BE08885D1EC163BE0EC1B88491CB1CA9E655497EAF6F39227B2128B1BFD2D0E43FF
5,361,866 UART: mbox::rt_entry...
5,362,238 UART: ____ _ _ _ ____ _____
5,363,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,364,590 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,365,358 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,366,126 UART: |_|
5,366,438 UART:
5,649,934 UART: [rt] Runtime listening for mailbox commands...
5,651,124 >>> mbox cmd response data (48 bytes)
5,651,125 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,651,233 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,518 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 ready_for_fw is high
1,174,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,208,873 UART: [ldev] ++
1,209,041 UART: [ldev] CDI.KEYID = 6
1,209,405 UART: [ldev] SUBJECT.KEYID = 5
1,209,832 UART: [ldev] AUTHORITY.KEYID = 7
1,210,295 UART: [ldev] FE.KEYID = 1
1,215,347 UART: [ldev] Erasing FE.KEYID = 1
1,241,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,987 UART: [ldev] --
1,281,267 UART: [fwproc] Wait for Commands...
1,282,056 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,537 >>> mbox cmd response: success
2,774,618 UART: [afmc] ++
2,774,786 UART: [afmc] CDI.KEYID = 6
2,775,149 UART: [afmc] SUBJECT.KEYID = 7
2,775,575 UART: [afmc] AUTHORITY.KEYID = 5
2,811,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,394 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,277 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,996 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,803 UART: [afmc] --
2,854,759 UART: [cold-reset] --
2,855,427 UART: [state] Locking Datavault
2,856,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,066 UART: [state] Locking ICCM
2,857,538 UART: [exit] Launching FMC @ 0x40000130
2,862,867 UART:
2,862,883 UART: Running Caliptra FMC ...
2,863,291 UART:
2,863,434 UART: [state] CFI Enabled
2,873,827 UART: [fht] FMC Alias Private Key: 7
2,981,562 UART: [art] Extend RT PCRs Done
2,981,990 UART: [art] Lock RT PCRs Done
2,983,688 UART: [art] Populate DV Done
2,991,927 UART: [fht] FMC Alias Private Key: 7
2,992,987 UART: [art] Derive CDI
2,993,267 UART: [art] Store in in slot 0x4
3,079,208 UART: [art] Derive Key Pair
3,079,568 UART: [art] Store priv key in slot 0x5
3,092,878 UART: [art] Derive Key Pair - Done
3,107,656 UART: [art] Signing Cert with AUTHO
3,108,136 UART: RITY.KEYID = 7
3,123,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,359 UART: [art] PUB.X = 518638F6B2BAA262E672824B078E9F53D356F754ACB24DF7F73A49CBC48DAFFCCC2DD59B508BAC4A495C070B15C09B9E
3,131,138 UART: [art] PUB.Y = AB830444F37E6305E977D9D46E6EBE2222E765DE226ADD5A6E22586FC5BE7C642F3D9BBC325BD5897B3E4560E068CCAB
3,138,096 UART: [art] SIG.R = A0E112FB9920FF6FCF0338AF93DBA2F813B3E25DBD537339DF0BBFAC7EC2F85F93BBE2F1009FA1DDEBB386D6037E3D43
3,144,863 UART: [art] SIG.S = 122C7D218252260E0E58316EA5BF11FAEB6F96391066032A7C4EF3AEC5CF31B3224517C169D2B4B4DB4D73301830F815
3,169,227 UART: Caliptra RT
3,169,572 UART: [state] CFI Enabled
3,276,281 UART: [rt] RT listening for mailbox commands...
3,276,951 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,269 UART:
3,278,285 UART: Running Caliptra ROM ...
3,278,693 UART:
3,278,835 UART: [state] CFI Enabled
3,281,369 UART: [state] LifecycleState = Unprovisioned
3,282,024 UART: [state] DebugLocked = No
3,282,738 UART: [state] WD Timer not started. Device not locked for debugging
3,284,016 UART: [kat] SHA2-256
4,087,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,695 UART: [kat] ++
4,091,847 UART: [kat] sha1
4,096,267 UART: [kat] SHA2-256
4,098,207 UART: [kat] SHA2-384
4,100,976 UART: [kat] SHA2-512-ACC
4,102,876 UART: [kat] ECC-384
4,112,363 UART: [kat] HMAC-384Kdf
4,116,977 UART: [kat] LMS
4,365,289 UART: [kat] --
4,365,883 UART: [update-reset] ++
5,271,100 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,272,179 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,368,561 >>> mbox cmd response: success
5,368,561 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,368,908 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,922 UART: [update-reset Success] --
5,377,827 UART: [state] Locking Datavault
5,378,493 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,097 UART: [state] Locking ICCM
5,379,731 UART: [exit] Launching FMC @ 0x40000130
5,385,060 UART:
5,385,076 UART: Running Caliptra FMC ...
5,385,484 UART:
5,385,627 UART: [state] CFI Enabled
5,474,382 UART: [art] Extend RT PCRs Done
5,474,810 UART: [art] Lock RT PCRs Done
5,475,921 UART: [art] Populate DV Done
5,484,068 UART: [fht] FMC Alias Private Key: 7
5,485,196 UART: [art] Derive CDI
5,485,476 UART: [art] Store in in slot 0x4
5,571,165 UART: [art] Derive Key Pair
5,571,525 UART: [art] Store priv key in slot 0x5
5,584,397 UART: [art] Derive Key Pair - Done
5,599,341 UART: [art] Signing Cert with AUTHO
5,599,821 UART: RITY.KEYID = 7
5,614,571 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,336 UART: [art] PUB.X = C0D76ADF87BBEF19A1530F72AA3664EAEEB6563B3C38953655FFF1059C54C2CE411EFF82389CBF52EB4C02359F1FD3EE
5,622,117 UART: [art] PUB.Y = 25D88293256B262CCBBE1AE3D2FF5CD69D6984158FFD54D5E06402FC6D87BBC16B7F6C55A5798FFE406704D6ED1672F4
5,629,073 UART: [art] SIG.R = 7A8B36928FD7093CB07A5B01DB64339D3F0D3F013ED8E806FE6B309646AB7E8668CA02F892590DE65C902465892B4DBB
5,635,826 UART: [art] SIG.S = 1DBC1EEA4896535DF41CF945CA19D6E512A87E825F60072B81ED1AA14B6B7041C6BD884D6219735A3A8A59DB4CED2971
5,659,396 UART: mbox::rt_entry...
5,659,768 UART: ____ _ _ _ ____ _____
5,660,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,661,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,662,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,662,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,663,656 UART: |_|
5,663,968 UART:
5,950,312 UART: [rt] Runtime listening for mailbox commands...
5,951,502 >>> mbox cmd response data (48 bytes)
5,951,503 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,951,611 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,595 ready_for_fw is high
1,056,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,265 >>> mbox cmd response: success
2,686,719 UART:
2,686,735 UART: Running Caliptra FMC ...
2,687,143 UART:
2,687,286 UART: [state] CFI Enabled
2,697,777 UART: [fht] FMC Alias Private Key: 7
2,805,226 UART: [art] Extend RT PCRs Done
2,805,654 UART: [art] Lock RT PCRs Done
2,807,366 UART: [art] Populate DV Done
2,815,497 UART: [fht] FMC Alias Private Key: 7
2,816,483 UART: [art] Derive CDI
2,816,763 UART: [art] Store in in slot 0x4
2,902,598 UART: [art] Derive Key Pair
2,902,958 UART: [art] Store priv key in slot 0x5
2,916,020 UART: [art] Derive Key Pair - Done
2,930,650 UART: [art] Signing Cert with AUTHO
2,931,130 UART: RITY.KEYID = 7
2,946,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,863 UART: [art] PUB.X = 49FE089CBBD75580742D681A23C78C4FE395E54286553D910B11E43F261F0FF318C06449CED62AE35BE24A3A4C2E3BCD
2,953,632 UART: [art] PUB.Y = A5061D2239AB24036B1C32E14B27210C0ABD3865714DADC6357EBB674D8E1C765F136BF919E3D45EC611D0EAB7023F36
2,960,573 UART: [art] SIG.R = 7B6C78267297B67EEA9C4C87EC848DB21390986F8219078F3941D585B9A1228857E74E223B28F9FE4891C8D874988C4F
2,967,332 UART: [art] SIG.S = 1161F9339382119772FAA1310D4B43EB8F0CB69C6ECE967B899880F9E84223D7AF478DD3A29C9F3ECE66242387131B8C
2,991,351 UART: Caliptra RT
2,991,696 UART: [state] CFI Enabled
3,099,133 UART: [rt] RT listening for mailbox commands...
3,099,803 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,071,584 >>> mbox cmd response: success
5,071,584 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,022 UART:
5,085,038 UART: Running Caliptra FMC ...
5,085,446 UART:
5,085,589 UART: [state] CFI Enabled
5,174,228 UART: [art] Extend RT PCRs Done
5,174,656 UART: [art] Lock RT PCRs Done
5,175,909 UART: [art] Populate DV Done
5,184,164 UART: [fht] FMC Alias Private Key: 7
5,185,202 UART: [art] Derive CDI
5,185,482 UART: [art] Store in in slot 0x4
5,271,171 UART: [art] Derive Key Pair
5,271,531 UART: [art] Store priv key in slot 0x5
5,285,309 UART: [art] Derive Key Pair - Done
5,300,076 UART: [art] Signing Cert with AUTHO
5,300,556 UART: RITY.KEYID = 7
5,315,900 UART: [art] Erasing AUTHORITY.KEYID = 7
5,316,665 UART: [art] PUB.X = B0AF2529122E2719B1798250739C67B7C80DF62BCBBD3918F2985093B2B2175B13E6A2F52A1C9CA22D0ECA1DB3E03EA1
5,323,437 UART: [art] PUB.Y = B58A2B8EB1C5A9291C975516B5D0C5A7B7918A69EA891A1EF47CAC7DB97F4A2AAA99DF4DA5DBC17AC1017FAF2F239A38
5,330,408 UART: [art] SIG.R = C13A8D1A7A688D3218F2B9A8F3455628645CDFDFEE5D8DF52CD24A2BE9509DD4AE59F2B7B9E1F0813D570D2C8F0D873E
5,337,190 UART: [art] SIG.S = F3B14535E4DC2D248FE5C5E47EB2B0AF648AC603ABB2BC7BD32849CC35882FF06BBB7748C485463949FA204596DC9059
5,361,120 UART: mbox::rt_entry...
5,361,492 UART: ____ _ _ _ ____ _____
5,362,276 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,363,844 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,364,612 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,365,380 UART: |_|
5,365,692 UART:
5,648,637 UART: [rt] Runtime listening for mailbox commands...
5,649,827 >>> mbox cmd response data (48 bytes)
5,649,828 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,649,936 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
191,989 UART:
192,400 UART: Running Caliptra ROM ...
193,555 UART:
193,705 UART: [state] CFI Enabled
265,123 UART: [state] LifecycleState = Unprovisioned
267,060 UART: [state] DebugLocked = No
268,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,898 UART: [kat] SHA2-256
443,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,076 UART: [kat] ++
454,727 UART: [kat] sha1
465,323 UART: [kat] SHA2-256
468,040 UART: [kat] SHA2-384
474,386 UART: [kat] SHA2-512-ACC
476,762 UART: [kat] ECC-384
2,767,409 UART: [kat] HMAC-384Kdf
2,799,818 UART: [kat] LMS
3,990,135 UART: [kat] --
3,995,575 UART: [cold-reset] ++
3,998,149 UART: [fht] Storing FHT @ 0x50003400
4,009,833 UART: [idev] ++
4,010,405 UART: [idev] CDI.KEYID = 6
4,011,319 UART: [idev] SUBJECT.KEYID = 7
4,012,564 UART: [idev] UDS.KEYID = 0
4,013,553 ready_for_fw is high
4,013,752 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,315 UART: [idev] Erasing UDS.KEYID = 0
7,344,918 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,988 UART: [idev] --
7,371,335 UART: [ldev] ++
7,371,906 UART: [ldev] CDI.KEYID = 6
7,372,925 UART: [ldev] SUBJECT.KEYID = 5
7,374,087 UART: [ldev] AUTHORITY.KEYID = 7
7,375,341 UART: [ldev] FE.KEYID = 1
7,423,376 UART: [ldev] Erasing FE.KEYID = 1
10,753,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,710 UART: [ldev] --
13,116,619 UART: [fwproc] Waiting for Commands...
13,119,465 UART: [fwproc] Received command 0x46574c44
13,121,645 UART: [fwproc] Received Image of size 114124 bytes
17,172,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,628,817 >>> mbox cmd response: success
17,632,911 UART: [afmc] ++
17,633,529 UART: [afmc] CDI.KEYID = 6
17,634,446 UART: [afmc] SUBJECT.KEYID = 7
17,635,716 UART: [afmc] AUTHORITY.KEYID = 5
21,009,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,001 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,260 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,653 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,512 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,923 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,332 UART: [afmc] --
23,382,794 UART: [cold-reset] --
23,385,789 UART: [state] Locking Datavault
23,391,697 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,491 UART: [state] Locking ICCM
23,396,136 UART: [exit] Launching FMC @ 0x40000130
23,404,491 UART:
23,404,748 UART: Running Caliptra FMC ...
23,405,855 UART:
23,406,015 UART: [state] CFI Enabled
23,469,086 UART: [fht] FMC Alias Private Key: 7
25,806,883 UART: [art] Extend RT PCRs Done
25,808,116 UART: [art] Lock RT PCRs Done
25,809,791 UART: [art] Populate DV Done
25,815,204 UART: [fht] FMC Alias Private Key: 7
25,816,740 UART: [art] Derive CDI
25,817,474 UART: [art] Store in in slot 0x4
25,877,380 UART: [art] Derive Key Pair
25,878,413 UART: [art] Store priv key in slot 0x5
29,171,161 UART: [art] Derive Key Pair - Done
29,184,534 UART: [art] Signing Cert with AUTHO
29,185,836 UART: RITY.KEYID = 7
31,471,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,246 UART: [art] PUB.X = A6F19B8E5D9B08F63F47D9700772C716538CE18693494C080CD62FC46991F7BEB48C02124675202E12B0CC89DF552F51
31,480,453 UART: [art] PUB.Y = 14B97F0F63BE6FF215BB08E9F45CC1C4F3FB2EB22756B658BCA977F90FBA422C52C18F13878C815F4512E444851405B6
31,487,695 UART: [art] SIG.R = FB33667AA3F105BEF4641DDF21A58DB53D639D8F49971D6D934F332BBDA682B876B04B3396AE01FA500ED893026B9159
31,495,103 UART: [art] SIG.S = A64324C471D8E46888E4A16B3A709E39D53CCD5598D046CD3D7D36B1AFA09A5E2E93E83E5838603FE56FE98000C1225C
32,800,402 UART: Caliptra RT
32,801,098 UART: [state] CFI Enabled
32,960,846 UART: [rt] RT listening for mailbox commands...
32,963,255 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,993,187 UART: [rt]cmd =0x54514754, len=24
32,995,875 >>> mbox cmd response data (8 bytes)
35,123,985 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,225,024 UART:
35,225,396 UART: Running Caliptra ROM ...
35,226,446 UART:
35,226,596 UART: [state] CFI Enabled
35,286,423 UART: [state] LifecycleState = Unprovisioned
35,288,356 UART: [state] DebugLocked = No
35,290,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,295,528 UART: [kat] SHA2-256
35,465,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,475,705 UART: [kat] ++
35,476,177 UART: [kat] sha1
35,487,438 UART: [kat] SHA2-256
35,490,127 UART: [kat] SHA2-384
35,494,599 UART: [kat] SHA2-512-ACC
35,496,944 UART: [kat] ECC-384
37,790,705 UART: [kat] HMAC-384Kdf
37,825,076 UART: [kat] LMS
39,015,429 UART: [kat] --
39,020,231 UART: [update-reset] ++
42,731,059 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,734,682 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,993,119 >>> mbox cmd response: success
42,993,507 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,994,880 UART: [update-reset] Copying MAN_2 To MAN_1
43,017,322 UART: [update-reset Success] --
43,021,016 UART: [state] Locking Datavault
43,024,757 UART: [state] Locking PCR0, PCR1 and PCR31
43,026,517 UART: [state] Locking ICCM
43,028,562 UART: [exit] Launching FMC @ 0x40000130
43,036,963 UART:
43,037,199 UART: Running Caliptra FMC ...
43,038,301 UART:
43,038,482 UART: [state] CFI Enabled
43,125,688 UART: [art] Extend RT PCRs Done
43,126,879 UART: [art] Lock RT PCRs Done
43,128,445 UART: [art] Populate DV Done
43,134,231 UART: [fht] FMC Alias Private Key: 7
43,135,864 UART: [art] Derive CDI
43,136,681 UART: [art] Store in in slot 0x4
43,195,059 UART: [art] Derive Key Pair
43,196,103 UART: [art] Store priv key in slot 0x5
46,488,195 UART: [art] Derive Key Pair - Done
46,501,151 UART: [art] Signing Cert with AUTHO
46,502,458 UART: RITY.KEYID = 7
48,789,237 UART: [art] Erasing AUTHORITY.KEYID = 7
48,790,750 UART: [art] PUB.X = F82A855FE742D57BC94FE08F5F4F9BEB331B39060C831DF64DD0B9AB93CC6AB97066228072D75DA0512632EEC87A9BC4
48,797,962 UART: [art] PUB.Y = 3A3D6A5BA431788FD332689D87EEC91447CED504E4E7D9AE089704C69875BE41EC28CC99DF52001005BCACEE3308B06F
48,805,192 UART: [art] SIG.R = 026A2AF428D88C50FCF583B723B4F4CB5326C023F91BFC1FDD3231D2EE10B28DE1CE4E952692C1EE02FE43BEBFBD368B
48,812,643 UART: [art] SIG.S = 570D8C7C95968BEC88989F560E4CDB3EC57F09FE3DCDF9691EE300B4767C8E06A934039157D0D04C88DBC8FA617A8500
50,117,096 UART: mbox::rt_entry...
50,118,066 UART: ____ _ _ _ ____ _____
50,120,053 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,122,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,124,003 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,125,942 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,127,797 UART: |_|
50,128,605 UART:
50,411,049 UART: [rt] Runtime listening for mailbox commands...
50,413,171 >>> mbox cmd response data (120 bytes)
52,534,313 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,634,226 UART:
52,634,587 UART: Running Caliptra ROM ...
52,635,725 UART:
52,635,902 UART: [state] CFI Enabled
52,709,529 UART: [state] LifecycleState = Unprovisioned
52,711,464 UART: [state] DebugLocked = No
52,714,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,720,151 UART: [kat] SHA2-256
52,889,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,900,355 UART: [kat] ++
52,900,819 UART: [kat] sha1
52,912,083 UART: [kat] SHA2-256
52,914,765 UART: [kat] SHA2-384
52,920,162 UART: [kat] SHA2-512-ACC
52,922,563 UART: [kat] ECC-384
55,215,015 UART: [kat] HMAC-384Kdf
55,246,316 UART: [kat] LMS
56,436,664 UART: [kat] --
56,441,162 UART: [update-reset] ++
60,148,453 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,152,940 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,411,320 >>> mbox cmd response: success
60,411,719 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,412,018 UART: [update-reset] Copying MAN_2 To MAN_1
60,434,194 UART: [update-reset Success] --
60,436,925 UART: [state] Locking Datavault
60,439,217 UART: [state] Locking PCR0, PCR1 and PCR31
60,440,981 UART: [state] Locking ICCM
60,442,443 UART: [exit] Launching FMC @ 0x40000130
60,450,844 UART:
60,451,080 UART: Running Caliptra FMC ...
60,452,184 UART:
60,452,342 UART: [state] CFI Enabled
60,546,514 UART: [art] Extend RT PCRs Done
60,547,702 UART: [art] Lock RT PCRs Done
60,549,263 UART: [art] Populate DV Done
60,554,890 UART: [fht] FMC Alias Private Key: 7
60,556,530 UART: [art] Derive CDI
60,557,345 UART: [art] Store in in slot 0x4
60,615,395 UART: [art] Derive Key Pair
60,616,435 UART: [art] Store priv key in slot 0x5
63,909,091 UART: [art] Derive Key Pair - Done
63,922,155 UART: [art] Signing Cert with AUTHO
63,923,467 UART: RITY.KEYID = 7
66,211,205 UART: [art] Erasing AUTHORITY.KEYID = 7
66,212,712 UART: [art] PUB.X = C7FB2BDD5A69D9912D4E7A6B00A66B3ADC374805EAFEA49AAC208BD1CF156ADEDAB42535A03D6835A5E84B85AEA87487
66,219,984 UART: [art] PUB.Y = 62DFB94BBF0FEC18F62482D1E7E11EE8B99CCDE142C996AB64D7C531F4C73BDA258DEF80F31E0AAEFA3F2FB29C56DE10
66,227,282 UART: [art] SIG.R = 8890BB09EFAF0D9CD703670BD9C99B2506475C7115E0AB7B9734B03F741380586BA8BCBDC2AC9409161E5BFE64D7B1E9
66,234,629 UART: [art] SIG.S = 4FF9613788AF28D674B9297EC7232BF642A632168F332AC315E3E3FBE5BDBD72113BF3B4B58214DC12B3232712084025
67,539,474 UART: mbox::rt_entry...
67,540,441 UART: ____ _ _ _ ____ _____
67,542,430 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,544,443 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,546,375 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,548,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,550,451 UART: |_|
67,551,437 UART:
67,836,213 UART: [rt] Runtime listening for mailbox commands...
67,838,335 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,785,375 ready_for_fw is high
3,785,781 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,834,879 >>> mbox cmd response: success
23,525,583 UART:
23,525,964 UART: Running Caliptra FMC ...
23,527,166 UART:
23,527,340 UART: [state] CFI Enabled
23,595,123 UART: [fht] FMC Alias Private Key: 7
25,932,691 UART: [art] Extend RT PCRs Done
25,933,937 UART: [art] Lock RT PCRs Done
25,935,455 UART: [art] Populate DV Done
25,940,840 UART: [fht] FMC Alias Private Key: 7
25,942,493 UART: [art] Derive CDI
25,943,317 UART: [art] Store in in slot 0x4
26,006,275 UART: [art] Derive Key Pair
26,007,319 UART: [art] Store priv key in slot 0x5
29,300,279 UART: [art] Derive Key Pair - Done
29,313,006 UART: [art] Signing Cert with AUTHO
29,314,312 UART: RITY.KEYID = 7
31,601,287 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,792 UART: [art] PUB.X = 2F2B137E28872DEE94AFFE5456AF903C80321AE29D17FBE38163AC8EA53F0DACD1AB4E665C216C4DDA768214D33C939B
31,610,127 UART: [art] PUB.Y = 1C5381CEEC9555E1CBE4AF445680CC70EBAFE07ADEB9EADE016F2676B15F7B14C1FE2AF165D1FE6BB48C34D20DD5FADC
31,617,372 UART: [art] SIG.R = 3E97B0204B85AD1BF9C45E404B1C4FFBD684F8D470164728D6A3D47C2031D950BFC3A8121D842B5C3B622D9AE511CEAC
31,624,764 UART: [art] SIG.S = C9976A346DA309E7AF4F8F7A926323DD1A9E3623765A2B038444EEDA2FFFBDEE43C23C96E093A31433728FDF310DB2B9
32,930,040 UART: Caliptra RT
32,930,745 UART: [state] CFI Enabled
33,091,094 UART: [rt] RT listening for mailbox commands...
33,093,517 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,123,791 UART: [rt]cmd =0x54514754, len=24
33,126,580 >>> mbox cmd response data (8 bytes)
35,251,096 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,205,921 >>> mbox cmd response: success
43,206,390 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,241,140 UART:
43,241,437 UART: Running Caliptra FMC ...
43,242,553 UART:
43,242,713 UART: [state] CFI Enabled
43,343,619 UART: [art] Extend RT PCRs Done
43,344,834 UART: [art] Lock RT PCRs Done
43,346,318 UART: [art] Populate DV Done
43,352,160 UART: [fht] FMC Alias Private Key: 7
43,353,864 UART: [art] Derive CDI
43,354,681 UART: [art] Store in in slot 0x4
43,412,189 UART: [art] Derive Key Pair
43,413,231 UART: [art] Store priv key in slot 0x5
46,706,688 UART: [art] Derive Key Pair - Done
46,719,959 UART: [art] Signing Cert with AUTHO
46,721,263 UART: RITY.KEYID = 7
49,008,240 UART: [art] Erasing AUTHORITY.KEYID = 7
49,009,750 UART: [art] PUB.X = 08CA4EF31948257C088BF9EE639AC1ED1DCAE580D611C9A40E297C080A07224282CFF7F7D9D5A90E51E415988D80A86C
49,017,011 UART: [art] PUB.Y = D9905D0CD44DEB51E96EB39D427224E2C657CD8545C6FECB78C197A57ED3BC88DE4415BD01EE96F0F380CBEEA5A20AC0
49,024,248 UART: [art] SIG.R = F9CF931B6A99319D214639E47A374F38EC0AFE29D23D0E77ED110267A26EF66F1BC34099E2E1610A22C0A9CF43A02C30
49,031,636 UART: [art] SIG.S = A96EAC8218E5A75DBDB48825DA499BDF0EDB21C74FED0D97AE7076DF3E8B6B4D3660A2A90D661F7CBC2D4BFDF1673B44
50,336,235 UART: mbox::rt_entry...
50,337,218 UART: ____ _ _ _ ____ _____
50,339,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,341,211 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,343,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,345,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,347,006 UART: |_|
50,347,818 UART:
50,632,158 UART: [rt] Runtime listening for mailbox commands...
50,634,285 >>> mbox cmd response data (120 bytes)
52,755,091 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,718,841 >>> mbox cmd response: success
60,719,478 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,754,817 UART:
60,755,137 UART: Running Caliptra FMC ...
60,756,178 UART:
60,756,326 UART: [state] CFI Enabled
60,857,011 UART: [art] Extend RT PCRs Done
60,858,210 UART: [art] Lock RT PCRs Done
60,859,696 UART: [art] Populate DV Done
60,865,218 UART: [fht] FMC Alias Private Key: 7
60,866,863 UART: [art] Derive CDI
60,867,603 UART: [art] Store in in slot 0x4
60,926,775 UART: [art] Derive Key Pair
60,927,820 UART: [art] Store priv key in slot 0x5
64,220,987 UART: [art] Derive Key Pair - Done
64,234,042 UART: [art] Signing Cert with AUTHO
64,235,345 UART: RITY.KEYID = 7
66,522,426 UART: [art] Erasing AUTHORITY.KEYID = 7
66,523,959 UART: [art] PUB.X = CA158E57096AC8373E393A11335BD4822315B09DB901F9C7219D3950B73ECC9B1EE2FE665DF11C55B5EBCCBDA1F550C9
66,531,216 UART: [art] PUB.Y = 65BECA3CB18010D74AA9A505CC90664785CCA4A4B257810B664CBA359859EC1DB46362BD0E7904E9FA8C8EA77BEE4509
66,538,443 UART: [art] SIG.R = 665F8AC65A7DD1DC11211D8C5372B23EE880CFE88740AD8AC6B4D842BFE1BF827387B0801088C96523DEBA039B67B521
66,545,839 UART: [art] SIG.S = D2CD4AB900E486029B6317C125B810722365DF6F7B9B0C60D5BCE24D027CC5778B0C491510ABB515A0F35988ADF5B928
67,849,771 UART: mbox::rt_entry...
67,850,727 UART: ____ _ _ _ ____ _____
67,852,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,854,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,856,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,858,454 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,860,507 UART: |_|
67,861,320 UART:
68,148,153 UART: [rt] Runtime listening for mailbox commands...
68,150,321 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,599 UART:
193,134 UART: Running Caliptra ROM ...
194,307 UART:
603,669 UART: [state] CFI Enabled
616,767 UART: [state] LifecycleState = Unprovisioned
618,715 UART: [state] DebugLocked = No
620,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,826 UART: [kat] SHA2-256
795,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,129 UART: [kat] ++
806,615 UART: [kat] sha1
817,127 UART: [kat] SHA2-256
819,866 UART: [kat] SHA2-384
826,424 UART: [kat] SHA2-512-ACC
828,788 UART: [kat] ECC-384
3,111,870 UART: [kat] HMAC-384Kdf
3,123,258 UART: [kat] LMS
4,313,329 UART: [kat] --
4,318,558 UART: [cold-reset] ++
4,319,994 UART: [fht] Storing FHT @ 0x50003400
4,330,901 UART: [idev] ++
4,331,461 UART: [idev] CDI.KEYID = 6
4,332,433 UART: [idev] SUBJECT.KEYID = 7
4,333,674 UART: [idev] UDS.KEYID = 0
4,334,651 ready_for_fw is high
4,334,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,248 UART: [idev] Erasing UDS.KEYID = 0
7,621,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,034 UART: [idev] --
7,644,729 UART: [ldev] ++
7,645,348 UART: [ldev] CDI.KEYID = 6
7,646,306 UART: [ldev] SUBJECT.KEYID = 5
7,647,505 UART: [ldev] AUTHORITY.KEYID = 7
7,648,727 UART: [ldev] FE.KEYID = 1
7,659,526 UART: [ldev] Erasing FE.KEYID = 1
10,947,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,901 UART: [ldev] --
13,309,887 UART: [fwproc] Waiting for Commands...
13,312,348 UART: [fwproc] Received command 0x46574c44
13,314,523 UART: [fwproc] Received Image of size 114124 bytes
17,372,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,705 >>> mbox cmd response: success
17,840,833 UART: [afmc] ++
17,841,427 UART: [afmc] CDI.KEYID = 6
17,842,310 UART: [afmc] SUBJECT.KEYID = 7
17,843,569 UART: [afmc] AUTHORITY.KEYID = 5
21,160,155 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,912 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,256 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,120 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,729 UART: [afmc] --
23,527,812 UART: [cold-reset] --
23,532,983 UART: [state] Locking Datavault
23,537,420 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,174 UART: [state] Locking ICCM
23,541,590 UART: [exit] Launching FMC @ 0x40000130
23,549,983 UART:
23,550,222 UART: Running Caliptra FMC ...
23,551,320 UART:
23,551,475 UART: [state] CFI Enabled
23,559,460 UART: [fht] FMC Alias Private Key: 7
25,890,539 UART: [art] Extend RT PCRs Done
25,891,765 UART: [art] Lock RT PCRs Done
25,893,152 UART: [art] Populate DV Done
25,898,403 UART: [fht] FMC Alias Private Key: 7
25,899,942 UART: [art] Derive CDI
25,900,670 UART: [art] Store in in slot 0x4
25,943,314 UART: [art] Derive Key Pair
25,944,365 UART: [art] Store priv key in slot 0x5
29,186,468 UART: [art] Derive Key Pair - Done
29,199,458 UART: [art] Signing Cert with AUTHO
29,200,793 UART: RITY.KEYID = 7
31,479,956 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,456 UART: [art] PUB.X = B84A52F0C10E337F8F69B3805F213B56864813D3AC906667F3CD86A8C3FA96637FFD38E5FE2484ADABCA4C64E1C79DCC
31,488,710 UART: [art] PUB.Y = 85A09D6C399C3897A6DF1746B6C6FD68A58B638002820F593B939FBE40BF45797CD5AE02D084460CFCA8C2E75453FF7E
31,495,986 UART: [art] SIG.R = D68D66DEC04E14D96AE1533B7498DA23F137598F922721DAB8CBFDA33EC76400D145C754A29E984CA0FAAF359E9179D7
31,503,358 UART: [art] SIG.S = B101D60E41336C26CDA7CFCC95191DA52CCB494C33458F2A6FFA3E1E53C1D55FBA353FE8105C180FEA63B74BC3A6F8E8
32,808,375 UART: Caliptra RT
32,809,085 UART: [state] CFI Enabled
32,926,099 UART: [rt] RT listening for mailbox commands...
32,928,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,958,431 UART: [rt]cmd =0x54514754, len=24
32,960,897 >>> mbox cmd response data (8 bytes)
35,009,984 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,110,514 UART:
35,111,030 UART: Running Caliptra ROM ...
35,112,076 UART:
35,112,221 UART: [state] CFI Enabled
35,127,372 UART: [state] LifecycleState = Unprovisioned
35,129,264 UART: [state] DebugLocked = No
35,132,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,137,227 UART: [kat] SHA2-256
35,306,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,317,461 UART: [kat] ++
35,318,100 UART: [kat] sha1
35,329,266 UART: [kat] SHA2-256
35,331,969 UART: [kat] SHA2-384
35,336,931 UART: [kat] SHA2-512-ACC
35,339,328 UART: [kat] ECC-384
37,624,969 UART: [kat] HMAC-384Kdf
37,637,320 UART: [kat] LMS
38,827,344 UART: [kat] --
38,832,108 UART: [update-reset] ++
42,549,797 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,552,743 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,811,123 >>> mbox cmd response: success
42,811,562 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,811,864 UART: [update-reset] Copying MAN_2 To MAN_1
42,834,020 UART: [update-reset Success] --
42,839,121 UART: [state] Locking Datavault
42,841,729 UART: [state] Locking PCR0, PCR1 and PCR31
42,843,478 UART: [state] Locking ICCM
42,844,853 UART: [exit] Launching FMC @ 0x40000130
42,853,242 UART:
42,853,471 UART: Running Caliptra FMC ...
42,854,494 UART:
42,854,634 UART: [state] CFI Enabled
42,898,873 UART: [art] Extend RT PCRs Done
42,900,083 UART: [art] Lock RT PCRs Done
42,901,353 UART: [art] Populate DV Done
42,906,597 UART: [fht] FMC Alias Private Key: 7
42,908,130 UART: [art] Derive CDI
42,908,887 UART: [art] Store in in slot 0x4
42,951,270 UART: [art] Derive Key Pair
42,952,301 UART: [art] Store priv key in slot 0x5
46,194,011 UART: [art] Derive Key Pair - Done
46,206,955 UART: [art] Signing Cert with AUTHO
46,208,253 UART: RITY.KEYID = 7
48,487,789 UART: [art] Erasing AUTHORITY.KEYID = 7
48,489,290 UART: [art] PUB.X = B8ED493A8D106A6F534FCFFED05D75EC954E47B5BB8FA974F9D87FFEC5BF17763B1C9C3CC92DA4829FE0110B565F7AFD
48,496,589 UART: [art] PUB.Y = 7F8623108A022DFC9248477F2B2E42882F2E60DF8D5BC8DC961D8FBD8F2A075664C2B79C48E1FE265218CFE5D79ACAE0
48,503,820 UART: [art] SIG.R = 2D1A8460759BB05823A46A02A474E5890E4A44D03F7ACE723E75970DEB0545DF4D1266886AC44AF3F7BBEE1B1A46C22F
48,511,201 UART: [art] SIG.S = 3E5A6425A5646C8C8B7E1B012D62E0E5EC81D40191C924620C4161F99F75B435D73C95383ABF366EF492681786FC02D5
49,816,581 UART: mbox::rt_entry...
49,817,540 UART: ____ _ _ _ ____ _____
49,819,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,821,521 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,823,451 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,825,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,827,295 UART: |_|
49,828,096 UART:
50,116,002 UART: [rt] Runtime listening for mailbox commands...
50,118,123 >>> mbox cmd response data (120 bytes)
52,163,906 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,263,989 UART:
52,264,354 UART: Running Caliptra ROM ...
52,265,492 UART:
52,265,676 UART: [state] CFI Enabled
52,280,209 UART: [state] LifecycleState = Unprovisioned
52,282,091 UART: [state] DebugLocked = No
52,284,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,288,953 UART: [kat] SHA2-256
52,458,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,469,239 UART: [kat] ++
52,469,779 UART: [kat] sha1
52,481,385 UART: [kat] SHA2-256
52,484,079 UART: [kat] SHA2-384
52,488,620 UART: [kat] SHA2-512-ACC
52,490,979 UART: [kat] ECC-384
54,775,277 UART: [kat] HMAC-384Kdf
54,785,931 UART: [kat] LMS
55,975,968 UART: [kat] --
55,979,487 UART: [update-reset] ++
59,687,931 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,691,715 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
59,950,162 >>> mbox cmd response: success
59,950,556 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
59,950,898 UART: [update-reset] Copying MAN_2 To MAN_1
59,973,348 UART: [update-reset Success] --
59,978,282 UART: [state] Locking Datavault
59,980,991 UART: [state] Locking PCR0, PCR1 and PCR31
59,982,740 UART: [state] Locking ICCM
59,984,459 UART: [exit] Launching FMC @ 0x40000130
59,992,868 UART:
59,993,145 UART: Running Caliptra FMC ...
59,994,259 UART:
59,994,411 UART: [state] CFI Enabled
60,038,421 UART: [art] Extend RT PCRs Done
60,039,556 UART: [art] Lock RT PCRs Done
60,040,863 UART: [art] Populate DV Done
60,046,530 UART: [fht] FMC Alias Private Key: 7
60,048,274 UART: [art] Derive CDI
60,049,005 UART: [art] Store in in slot 0x4
60,091,384 UART: [art] Derive Key Pair
60,092,432 UART: [art] Store priv key in slot 0x5
63,334,158 UART: [art] Derive Key Pair - Done
63,347,475 UART: [art] Signing Cert with AUTHO
63,348,773 UART: RITY.KEYID = 7
65,628,479 UART: [art] Erasing AUTHORITY.KEYID = 7
65,629,986 UART: [art] PUB.X = 4646FE6C995ED3D9669F3CCCCA298010866E30432337A7A56E6A5550C67B73976F3F74D7308C7CEBB57D488CB4D3B29B
65,637,235 UART: [art] PUB.Y = AD665DB9DC10BC4445EB48056A4EFC16A1944940F961B2581B4511CB2DEFDE570A9E92B88052E15EEDF3706BE0FFD279
65,644,517 UART: [art] SIG.R = 7D62DEACFB5BA35659DC064F08B073F63916C915CA1B639D26E2305CA6DBA8A69D24442D4C63DB184C66C9AC8F4412A0
65,651,896 UART: [art] SIG.S = D4772758149D50A7A8B088EA003B5D161764587A5F0B354CFC8EBB01715A38048455962D235950291E38891E58E17265
66,956,672 UART: mbox::rt_entry...
66,957,634 UART: ____ _ _ _ ____ _____
66,959,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,961,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,963,535 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,965,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,967,378 UART: |_|
66,968,177 UART:
67,249,485 UART: [rt] Runtime listening for mailbox commands...
67,251,616 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,126,746 ready_for_fw is high
4,127,161 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,948 >>> mbox cmd response: success
23,724,733 UART:
23,725,124 UART: Running Caliptra FMC ...
23,726,316 UART:
23,726,480 UART: [state] CFI Enabled
23,734,647 UART: [fht] FMC Alias Private Key: 7
26,065,727 UART: [art] Extend RT PCRs Done
26,066,949 UART: [art] Lock RT PCRs Done
26,068,842 UART: [art] Populate DV Done
26,074,296 UART: [fht] FMC Alias Private Key: 7
26,075,797 UART: [art] Derive CDI
26,076,556 UART: [art] Store in in slot 0x4
26,119,101 UART: [art] Derive Key Pair
26,120,139 UART: [art] Store priv key in slot 0x5
29,361,753 UART: [art] Derive Key Pair - Done
29,374,698 UART: [art] Signing Cert with AUTHO
29,375,998 UART: RITY.KEYID = 7
31,655,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,614 UART: [art] PUB.X = FF9907A338F3E3D15D3CF26268A62478B00DFC613D2D3FC0A50D1D88564C85DE19FD42E63254C9AEAACD1087D5DB77E9
31,663,848 UART: [art] PUB.Y = 8E16526F56019423BA3F036A5985D160A5C56B111B9170C48548F5594ACB3C7F074919E068F5626FFEFD5F8E124A8B47
31,671,068 UART: [art] SIG.R = 5D9B6AFD2982D13E86A1D246EFD8100FB84EBA4AB6698A37B4B705A24E288C1E242E9A7A0879035F5830814F9CEF4D23
31,678,450 UART: [art] SIG.S = 785FF8BBBB4DDAF4B614FB2C4E8711FA13A35FCD4CAD7ADFADDEF74D44AAC541D6BAF9F780571CC14E393EBC399FE89A
32,983,706 UART: Caliptra RT
32,984,418 UART: [state] CFI Enabled
33,102,687 UART: [rt] RT listening for mailbox commands...
33,105,079 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,135,173 UART: [rt]cmd =0x54514754, len=24
33,137,724 >>> mbox cmd response data (8 bytes)
35,185,653 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,083,216 >>> mbox cmd response: success
43,083,746 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,116,604 UART:
43,116,889 UART: Running Caliptra FMC ...
43,117,920 UART:
43,118,058 UART: [state] CFI Enabled
43,162,469 UART: [art] Extend RT PCRs Done
43,163,662 UART: [art] Lock RT PCRs Done
43,165,210 UART: [art] Populate DV Done
43,170,466 UART: [fht] FMC Alias Private Key: 7
43,172,117 UART: [art] Derive CDI
43,172,849 UART: [art] Store in in slot 0x4
43,215,762 UART: [art] Derive Key Pair
43,216,757 UART: [art] Store priv key in slot 0x5
46,459,005 UART: [art] Derive Key Pair - Done
46,472,031 UART: [art] Signing Cert with AUTHO
46,473,335 UART: RITY.KEYID = 7
48,752,788 UART: [art] Erasing AUTHORITY.KEYID = 7
48,754,434 UART: [art] PUB.X = E4B1737169CBED180B9A362ABA008DB610C3376DF77CBEB0FEBD4641180471C2DDA7FBF937598FC761C21283C162E56B
48,761,526 UART: [art] PUB.Y = C48A6F4B81D569FD15923A887D34C0018F559540B0915DC90AD5A494391FFDDF4D6E9C7F5B33F9CEA5883849CD1C204E
48,768,811 UART: [art] SIG.R = C4C9304CECD6435D3E5F8151E82C49EFFC03B70E4C9DD888B1C09C91BAFD1D1D5D28B17027C37A9A28748673AE60FE3F
48,776,200 UART: [art] SIG.S = 6B04C52A446A9DB45D48C71940CADDD804959913BA250029E90558F647DC4418D2549CC17427B5D330957186CB2A79B7
50,081,941 UART: mbox::rt_entry...
50,082,913 UART: ____ _ _ _ ____ _____
50,084,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,086,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,088,721 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,090,642 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,092,518 UART: |_|
50,093,400 UART:
50,377,373 UART: [rt] Runtime listening for mailbox commands...
50,379,508 >>> mbox cmd response data (120 bytes)
52,425,080 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,315,877 >>> mbox cmd response: success
60,316,392 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,348,338 UART:
60,348,645 UART: Running Caliptra FMC ...
60,349,771 UART:
60,349,926 UART: [state] CFI Enabled
60,393,848 UART: [art] Extend RT PCRs Done
60,395,036 UART: [art] Lock RT PCRs Done
60,396,608 UART: [art] Populate DV Done
60,402,071 UART: [fht] FMC Alias Private Key: 7
60,403,779 UART: [art] Derive CDI
60,404,591 UART: [art] Store in in slot 0x4
60,447,384 UART: [art] Derive Key Pair
60,448,418 UART: [art] Store priv key in slot 0x5
63,690,585 UART: [art] Derive Key Pair - Done
63,703,811 UART: [art] Signing Cert with AUTHO
63,705,110 UART: RITY.KEYID = 7
65,984,311 UART: [art] Erasing AUTHORITY.KEYID = 7
65,985,820 UART: [art] PUB.X = 138395FC9AE89F0311B68FF575FD42AB19170260EFE34DC9B6D74F8629052DF43496DA1D1715794934E59E6C64704B12
65,993,085 UART: [art] PUB.Y = 60B5930E8C0EC4A0422C242E0EBC03CD8731E02BEFA1BF21DE242D97B998944D270361B934E4B77491DD6FA45B080FA2
66,000,272 UART: [art] SIG.R = B389E9928D2A84BE2E688AD9910B7FD35A41353C704BE808DFDB59BA2AFC48BEC263045690A6FAEDD39BB2E484AA8ABE
66,007,669 UART: [art] SIG.S = 4E10DCCAC96CB1DD58D727775883AE90682B2058FCE9C41045D8B42AD00777C153295039E2E4FB663360E69F1522CAEF
67,312,881 UART: mbox::rt_entry...
67,313,971 UART: ____ _ _ _ ____ _____
67,315,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,317,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,319,901 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,321,832 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,323,684 UART: |_|
67,324,562 UART:
67,607,917 UART: [rt] Runtime listening for mailbox commands...
67,610,029 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,322 UART:
192,700 UART: Running Caliptra ROM ...
193,926 UART:
194,084 UART: [state] CFI Enabled
262,114 UART: [state] LifecycleState = Unprovisioned
263,964 UART: [state] DebugLocked = No
265,780 UART: [state] WD Timer not started. Device not locked for debugging
269,538 UART: [kat] SHA2-256
448,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,287 UART: [kat] ++
460,830 UART: [kat] sha1
471,924 UART: [kat] SHA2-256
474,932 UART: [kat] SHA2-384
480,916 UART: [kat] SHA2-512-ACC
483,846 UART: [kat] ECC-384
2,948,403 UART: [kat] HMAC-384Kdf
2,973,569 UART: [kat] LMS
3,502,976 UART: [kat] --
3,508,741 UART: [cold-reset] ++
3,510,024 UART: [fht] FHT @ 0x50003400
3,521,635 UART: [idev] ++
3,522,196 UART: [idev] CDI.KEYID = 6
3,523,106 UART: [idev] SUBJECT.KEYID = 7
3,524,281 UART: [idev] UDS.KEYID = 0
3,525,344 ready_for_fw is high
3,525,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,538 UART: [idev] Erasing UDS.KEYID = 0
6,031,644 UART: [idev] Sha1 KeyId Algorithm
6,053,889 UART: [idev] --
6,058,235 UART: [ldev] ++
6,058,814 UART: [ldev] CDI.KEYID = 6
6,059,729 UART: [ldev] SUBJECT.KEYID = 5
6,060,891 UART: [ldev] AUTHORITY.KEYID = 7
6,062,125 UART: [ldev] FE.KEYID = 1
6,102,674 UART: [ldev] Erasing FE.KEYID = 1
8,604,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,286 UART: [ldev] --
10,415,278 UART: [fwproc] Wait for Commands...
10,417,746 UART: [fwproc] Recv command 0x46574c44
10,419,783 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,689 >>> mbox cmd response: success
14,283,367 UART: [afmc] ++
14,283,957 UART: [afmc] CDI.KEYID = 6
14,284,842 UART: [afmc] SUBJECT.KEYID = 7
14,286,056 UART: [afmc] AUTHORITY.KEYID = 5
16,809,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,360 UART: [afmc] --
18,610,852 UART: [cold-reset] --
18,614,651 UART: [state] Locking Datavault
18,620,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,031 UART: [state] Locking ICCM
18,623,379 UART: [exit] Launching FMC @ 0x40000130
18,631,772 UART:
18,632,007 UART: Running Caliptra FMC ...
18,633,112 UART:
18,633,269 UART: [state] CFI Enabled
18,692,879 UART: [fht] FMC Alias Private Key: 7
20,457,285 UART: [art] Extend RT PCRs Done
20,458,499 UART: [art] Lock RT PCRs Done
20,460,069 UART: [art] Populate DV Done
20,465,401 UART: [fht] FMC Alias Private Key: 7
20,467,050 UART: [art] Derive CDI
20,467,866 UART: [art] Store in in slot 0x4
20,526,262 UART: [art] Derive Key Pair
20,527,259 UART: [art] Store priv key in slot 0x5
22,990,479 UART: [art] Derive Key Pair - Done
23,003,642 UART: [art] Signing Cert with AUTHO
23,004,954 UART: RITY.KEYID = 7
24,716,289 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,790 UART: [art] PUB.X = 3248533EAD59A167ECD4FDDD5504EECCFEF0F7EC0601C03F894E7F9EA0467C646B30488216D6D49816345EA9C2300EF1
24,725,085 UART: [art] PUB.Y = 9D42F80E75D2C45966C3C5AA75B54FCFF5EBF1CFB425468C75FB2DD9F01AEBCA5B9B10AD99FAA88D544B93F3B915D8F8
24,732,369 UART: [art] SIG.R = 96A7DC5AA9E4A079F9BEEB53C27B96168F1CB6DF889A650047EFFA152BD4991DF785637427B84024A65142F5DE4CE977
24,739,760 UART: [art] SIG.S = E54D22934844F7807B5C9C924AF687A908E745F008EFC664C3ADC7FF21E3679F1C5B8A0D0E1E82BBE7C9AC6CC67E0524
25,718,857 UART: Caliptra RT
25,719,566 UART: [state] CFI Enabled
25,883,873 UART: [rt] RT listening for mailbox commands...
25,886,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,916,835 UART: [rt]cmd =0x54514754, len=24
25,919,744 >>> mbox cmd response data (8 bytes)
27,968,192 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,069,280 UART:
28,069,641 UART: Running Caliptra ROM ...
28,070,780 UART:
28,070,949 UART: [state] CFI Enabled
28,128,858 UART: [state] LifecycleState = Unprovisioned
28,130,892 UART: [state] DebugLocked = No
28,131,938 UART: [state] WD Timer not started. Device not locked for debugging
28,135,192 UART: [kat] SHA2-256
28,314,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,325,865 UART: [kat] ++
28,326,323 UART: [kat] sha1
28,337,314 UART: [kat] SHA2-256
28,340,319 UART: [kat] SHA2-384
28,345,921 UART: [kat] SHA2-512-ACC
28,348,857 UART: [kat] ECC-384
30,813,517 UART: [kat] HMAC-384Kdf
30,835,310 UART: [kat] LMS
31,364,734 UART: [kat] --
31,367,498 UART: [update-reset] ++
34,359,060 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,363,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,621,514 >>> mbox cmd response: success
34,621,968 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,623,284 UART: [update-reset] Copying MAN_2 To MAN_1
34,645,586 UART: [update-reset Success] --
34,649,989 UART: [state] Locking Datavault
34,652,811 UART: [state] Locking PCR0, PCR1 and PCR31
34,654,455 UART: [state] Locking ICCM
34,657,065 UART: [exit] Launching FMC @ 0x40000130
34,665,459 UART:
34,665,690 UART: Running Caliptra FMC ...
34,666,715 UART:
34,666,861 UART: [state] CFI Enabled
34,772,236 UART: [art] Extend RT PCRs Done
34,773,439 UART: [art] Lock RT PCRs Done
34,774,871 UART: [art] Populate DV Done
34,780,117 UART: [fht] FMC Alias Private Key: 7
34,781,773 UART: [art] Derive CDI
34,782,585 UART: [art] Store in in slot 0x4
34,840,894 UART: [art] Derive Key Pair
34,841,911 UART: [art] Store priv key in slot 0x5
37,304,689 UART: [art] Derive Key Pair - Done
37,317,952 UART: [art] Signing Cert with AUTHO
37,319,255 UART: RITY.KEYID = 7
39,030,639 UART: [art] Erasing AUTHORITY.KEYID = 7
39,032,146 UART: [art] PUB.X = 4F72116CD2D2C847B1527E3AAEDC1A5562390C3A50DDBA7DB9EB0AE6B0B8CFA1C57E1BC7B6FED982D4BC2C8FAC81F4E7
39,039,452 UART: [art] PUB.Y = 591B3F2E211E806D6CE1C32E564224A620ABA51E4BA2BBDF5D78C3A9F73DF506E4F7E35BF5D5B0ACE8A13B59FA7C1358
39,046,736 UART: [art] SIG.R = B8CD2B5A055B5711DA4DEADA6E619B6ED2CC55D257E43398709B0AFFB4D3FBD2A48755F47EEBF00BB6B9B3DACAE108EA
39,054,119 UART: [art] SIG.S = 7FEDBBFC6446487905E43C404A259500114441C3B4613930979554EBF8A50933749E0EDFDB86653B36747F02EA3E059B
40,032,743 UART: mbox::rt_entry...
40,033,712 UART: ____ _ _ _ ____ _____
40,035,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,037,660 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,039,521 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,041,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,043,497 UART: |_|
40,044,327 UART:
40,336,673 UART: [rt] Runtime listening for mailbox commands...
40,338,801 >>> mbox cmd response data (120 bytes)
42,387,096 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,486,935 UART:
42,487,288 UART: Running Caliptra ROM ...
42,488,418 UART:
42,488,585 UART: [state] CFI Enabled
42,550,137 UART: [state] LifecycleState = Unprovisioned
42,552,026 UART: [state] DebugLocked = No
42,553,580 UART: [state] WD Timer not started. Device not locked for debugging
42,557,267 UART: [kat] SHA2-256
42,736,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,747,978 UART: [kat] ++
42,748,519 UART: [kat] sha1
42,759,140 UART: [kat] SHA2-256
42,762,158 UART: [kat] SHA2-384
42,768,520 UART: [kat] SHA2-512-ACC
42,771,465 UART: [kat] ECC-384
45,232,082 UART: [kat] HMAC-384Kdf
45,255,992 UART: [kat] LMS
45,785,417 UART: [kat] --
45,789,298 UART: [update-reset] ++
48,790,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,793,567 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,051,736 >>> mbox cmd response: success
49,052,128 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,052,421 UART: [update-reset] Copying MAN_2 To MAN_1
49,074,455 UART: [update-reset Success] --
49,079,184 UART: [state] Locking Datavault
49,081,734 UART: [state] Locking PCR0, PCR1 and PCR31
49,083,443 UART: [state] Locking ICCM
49,085,571 UART: [exit] Launching FMC @ 0x40000130
49,093,973 UART:
49,094,251 UART: Running Caliptra FMC ...
49,095,282 UART:
49,095,431 UART: [state] CFI Enabled
49,192,922 UART: [art] Extend RT PCRs Done
49,194,104 UART: [art] Lock RT PCRs Done
49,195,374 UART: [art] Populate DV Done
49,200,668 UART: [fht] FMC Alias Private Key: 7
49,202,313 UART: [art] Derive CDI
49,203,122 UART: [art] Store in in slot 0x4
49,261,862 UART: [art] Derive Key Pair
49,262,912 UART: [art] Store priv key in slot 0x5
51,726,037 UART: [art] Derive Key Pair - Done
51,739,442 UART: [art] Signing Cert with AUTHO
51,740,767 UART: RITY.KEYID = 7
53,452,216 UART: [art] Erasing AUTHORITY.KEYID = 7
53,453,717 UART: [art] PUB.X = A3E356EC404D28F18F0624EC16177A3776FC521CCE22000F63BA16124E0C129EEB92B455596CB8DD8E4BCA8FBF741465
53,460,952 UART: [art] PUB.Y = EC1B048910CC7CDD6484944296AECB0C4D877218894AAED1431177D5B2C8BAD98F8C8712CCCD738790024881ECA00766
53,468,184 UART: [art] SIG.R = 92D6BF4E25777D190E79455B2C8230CFACA64A03BD87AA5753CEA8E5E95FD33DE5FDBC3E07596C32F897C97CD7234B06
53,475,625 UART: [art] SIG.S = 202D418F1442FD66ED95F880BB52C6A9EC800423FEAF12D7688AD58624A9FEAC4A0275EA9A4CC527F48E6F4996BE1C9C
54,454,020 UART: mbox::rt_entry...
54,454,981 UART: ____ _ _ _ ____ _____
54,456,962 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,458,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,460,902 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,462,831 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,464,759 UART: |_|
54,465,591 UART:
54,748,539 UART: [rt] Runtime listening for mailbox commands...
54,750,722 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,380,563 ready_for_fw is high
3,380,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,098,777 >>> mbox cmd response: success
18,385,392 UART:
18,385,792 UART: Running Caliptra FMC ...
18,386,997 UART:
18,387,166 UART: [state] CFI Enabled
18,455,042 UART: [fht] FMC Alias Private Key: 7
20,218,792 UART: [art] Extend RT PCRs Done
20,220,012 UART: [art] Lock RT PCRs Done
20,221,808 UART: [art] Populate DV Done
20,227,439 UART: [fht] FMC Alias Private Key: 7
20,229,100 UART: [art] Derive CDI
20,229,837 UART: [art] Store in in slot 0x4
20,279,513 UART: [art] Derive Key Pair
20,280,515 UART: [art] Store priv key in slot 0x5
22,743,716 UART: [art] Derive Key Pair - Done
22,756,608 UART: [art] Signing Cert with AUTHO
22,757,928 UART: RITY.KEYID = 7
24,469,472 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,971 UART: [art] PUB.X = FEB6E5FEF5693A0567B2A350D0FC6ACA7994944E8209A63A2FAFF138F2BEA854D83CC9A4610542966CAED77E42EE7044
24,478,228 UART: [art] PUB.Y = D384C8E45E7BBDC075D9798B59E84A97B352F7DAD0D179030BA22765C4FD7362E27C35EEE3DE2945F858A76B8145F5B2
24,485,501 UART: [art] SIG.R = 65ACC82244725D48F2C13C31441C16A9D7067DD572F0A25CF116138B20C4DE7AEBF9C91E7900CC99070F77FFA2DD4256
24,492,902 UART: [art] SIG.S = 8ECA522D1C7D0DFB16DA14C0C6DCA63511F758296A1F8BC2901B7969E4E04B62151E46F89E6130B7A2DB8D309FFA202B
25,471,266 UART: Caliptra RT
25,471,979 UART: [state] CFI Enabled
25,636,680 UART: [rt] RT listening for mailbox commands...
25,639,078 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,669,516 UART: [rt]cmd =0x54514754, len=24
25,672,275 >>> mbox cmd response data (8 bytes)
27,721,730 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,247,012 >>> mbox cmd response: success
34,247,570 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,283,891 UART:
34,284,188 UART: Running Caliptra FMC ...
34,285,311 UART:
34,285,473 UART: [state] CFI Enabled
34,387,413 UART: [art] Extend RT PCRs Done
34,388,613 UART: [art] Lock RT PCRs Done
34,389,914 UART: [art] Populate DV Done
34,395,269 UART: [fht] FMC Alias Private Key: 7
34,397,016 UART: [art] Derive CDI
34,397,827 UART: [art] Store in in slot 0x4
34,456,243 UART: [art] Derive Key Pair
34,457,241 UART: [art] Store priv key in slot 0x5
36,920,411 UART: [art] Derive Key Pair - Done
36,933,373 UART: [art] Signing Cert with AUTHO
36,934,671 UART: RITY.KEYID = 7
38,646,242 UART: [art] Erasing AUTHORITY.KEYID = 7
38,647,751 UART: [art] PUB.X = 656F328935C030B836F39AC34E4804FF31CA3C9A42424C4EF073C51F7D6585C5FB5AA11BD4630182778EDBFC7862BCAE
38,655,007 UART: [art] PUB.Y = E8D669CC900E673B8ACA1C8B16F60CBFF7FFABCE843507B4C6FC66DB7C8A90614FFE912A8387F7106E60295FE66795F1
38,662,319 UART: [art] SIG.R = B6FEC6A6BA0A68D097E79D9F099691867A93D21BED2ABC32174F1F703DC32B61B61C68B67643C87C46DFE449E3A5612C
38,669,722 UART: [art] SIG.S = E615437EB4AF6A087E56437779738A3357EB78498A5E3A2AB1D9F667A983B0BDF3AA3BDEF903608830E1128389375C5F
39,648,408 UART: mbox::rt_entry...
39,649,370 UART: ____ _ _ _ ____ _____
39,651,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,653,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,655,299 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,657,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,659,271 UART: |_|
39,660,083 UART:
39,944,310 UART: [rt] Runtime listening for mailbox commands...
39,946,492 >>> mbox cmd response data (120 bytes)
42,006,167 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,500,970 >>> mbox cmd response: success
48,501,517 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,535,020 UART:
48,535,315 UART: Running Caliptra FMC ...
48,536,433 UART:
48,536,591 UART: [state] CFI Enabled
48,634,459 UART: [art] Extend RT PCRs Done
48,635,654 UART: [art] Lock RT PCRs Done
48,637,056 UART: [art] Populate DV Done
48,642,575 UART: [fht] FMC Alias Private Key: 7
48,644,301 UART: [art] Derive CDI
48,645,119 UART: [art] Store in in slot 0x4
48,703,594 UART: [art] Derive Key Pair
48,704,625 UART: [art] Store priv key in slot 0x5
51,167,700 UART: [art] Derive Key Pair - Done
51,180,430 UART: [art] Signing Cert with AUTHO
51,181,766 UART: RITY.KEYID = 7
52,892,511 UART: [art] Erasing AUTHORITY.KEYID = 7
52,894,015 UART: [art] PUB.X = 8510A986511DA9ED05A21972C0AF94C47F7302C98921A2B99B460988C95B4559075EF209816D98DA93B52B578EBE62BB
52,901,280 UART: [art] PUB.Y = E8744DEE950501329FFBA0E90F62E1696647FFBAD8029683FF8BE73D94DAB8D6F654FF2B295979DDB20AF2234A9D836A
52,908,573 UART: [art] SIG.R = 024F3C7F30920DC2842FF0DF28D4AC225AD5F268CDED6DD62D61C33C4B7D719712BC64DA248EA5234313517E25DD0EA3
52,915,965 UART: [art] SIG.S = 514E3A94AF0A67CC92BD314834E010A21650863DB210832C87D6DD74E514EE484ED5984D48A81BF961D280BB56CD4A37
53,894,919 UART: mbox::rt_entry...
53,895,858 UART: ____ _ _ _ ____ _____
53,897,835 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,900,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,902,027 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,903,967 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,905,902 UART: |_|
53,906,794 UART:
54,193,820 UART: [rt] Runtime listening for mailbox commands...
54,195,959 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,405 UART:
192,778 UART: Running Caliptra ROM ...
193,919 UART:
603,499 UART: [state] CFI Enabled
614,976 UART: [state] LifecycleState = Unprovisioned
616,809 UART: [state] DebugLocked = No
619,119 UART: [state] WD Timer not started. Device not locked for debugging
622,151 UART: [kat] SHA2-256
801,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,814 UART: [kat] ++
813,342 UART: [kat] sha1
825,352 UART: [kat] SHA2-256
828,352 UART: [kat] SHA2-384
834,687 UART: [kat] SHA2-512-ACC
837,682 UART: [kat] ECC-384
3,278,707 UART: [kat] HMAC-384Kdf
3,291,747 UART: [kat] LMS
3,821,266 UART: [kat] --
3,827,036 UART: [cold-reset] ++
3,829,536 UART: [fht] FHT @ 0x50003400
3,839,507 UART: [idev] ++
3,840,058 UART: [idev] CDI.KEYID = 6
3,841,007 UART: [idev] SUBJECT.KEYID = 7
3,842,174 UART: [idev] UDS.KEYID = 0
3,843,137 ready_for_fw is high
3,843,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,035 UART: [idev] Erasing UDS.KEYID = 0
6,309,466 UART: [idev] Sha1 KeyId Algorithm
6,331,388 UART: [idev] --
6,335,265 UART: [ldev] ++
6,335,829 UART: [ldev] CDI.KEYID = 6
6,336,737 UART: [ldev] SUBJECT.KEYID = 5
6,337,958 UART: [ldev] AUTHORITY.KEYID = 7
6,339,190 UART: [ldev] FE.KEYID = 1
6,349,185 UART: [ldev] Erasing FE.KEYID = 1
8,821,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,312 UART: [ldev] --
10,611,267 UART: [fwproc] Wait for Commands...
10,613,347 UART: [fwproc] Recv command 0x46574c44
10,615,450 UART: [fwproc] Recv'd Img size: 114448 bytes
14,011,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,086,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,154,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,472,668 >>> mbox cmd response: success
14,476,358 UART: [afmc] ++
14,476,961 UART: [afmc] CDI.KEYID = 6
14,477,865 UART: [afmc] SUBJECT.KEYID = 7
14,479,071 UART: [afmc] AUTHORITY.KEYID = 5
16,981,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,525 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,009 UART: [afmc] --
18,780,381 UART: [cold-reset] --
18,783,218 UART: [state] Locking Datavault
18,789,215 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,907 UART: [state] Locking ICCM
18,792,134 UART: [exit] Launching FMC @ 0x40000130
18,800,546 UART:
18,800,785 UART: Running Caliptra FMC ...
18,801,877 UART:
18,802,029 UART: [state] CFI Enabled
18,810,285 UART: [fht] FMC Alias Private Key: 7
20,567,579 UART: [art] Extend RT PCRs Done
20,568,801 UART: [art] Lock RT PCRs Done
20,570,473 UART: [art] Populate DV Done
20,575,766 UART: [fht] FMC Alias Private Key: 7
20,577,350 UART: [art] Derive CDI
20,578,152 UART: [art] Store in in slot 0x4
20,621,168 UART: [art] Derive Key Pair
20,622,201 UART: [art] Store priv key in slot 0x5
23,049,284 UART: [art] Derive Key Pair - Done
23,062,496 UART: [art] Signing Cert with AUTHO
23,063,798 UART: RITY.KEYID = 7
24,769,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,122 UART: [art] PUB.X = 9CA42F8D69476BEB0A125D1C31C0848DB08700FCEB148440F107BCB5F97FB900B681B8DA0CA838EAAAD77828B256A87C
24,778,363 UART: [art] PUB.Y = 292F83BF3333FB2D5FA6B084947697DBB23D69899296366C2042F2E335AC59D90DBC4E6E09E6D82F9AB4F04442D79859
24,785,639 UART: [art] SIG.R = 1A30521CB35C6C696EE22410A218E65B24BC7AC4EE178AE1E470A24C050047AF40ADB13319C7130AD701323BEB3CB364
24,792,954 UART: [art] SIG.S = 45E63753A0FE5729766DAE292F2DB4CFBD491FEDC8E6DEE7C78CD83FA1DEE8B63406D7989D3CC5D462468E3D131E2F76
25,772,224 UART: Caliptra RT
25,772,921 UART: [state] CFI Enabled
25,889,107 UART: [rt] RT listening for mailbox commands...
25,891,528 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,921,295 UART: [rt]cmd =0x54514754, len=24
25,923,987 >>> mbox cmd response data (8 bytes)
27,975,383 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,076,215 UART:
28,076,573 UART: Running Caliptra ROM ...
28,077,615 UART:
28,077,770 UART: [state] CFI Enabled
28,092,201 UART: [state] LifecycleState = Unprovisioned
28,094,093 UART: [state] DebugLocked = No
28,095,416 UART: [state] WD Timer not started. Device not locked for debugging
28,099,043 UART: [kat] SHA2-256
28,278,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,289,785 UART: [kat] ++
28,290,231 UART: [kat] sha1
28,300,699 UART: [kat] SHA2-256
28,303,732 UART: [kat] SHA2-384
28,309,940 UART: [kat] SHA2-512-ACC
28,312,871 UART: [kat] ECC-384
30,753,440 UART: [kat] HMAC-384Kdf
30,766,547 UART: [kat] LMS
31,296,057 UART: [kat] --
31,301,228 UART: [update-reset] ++
34,300,971 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,305,044 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,563,195 >>> mbox cmd response: success
34,563,573 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,563,854 UART: [update-reset] Copying MAN_2 To MAN_1
34,585,901 UART: [update-reset Success] --
34,589,804 UART: [state] Locking Datavault
34,592,777 UART: [state] Locking PCR0, PCR1 and PCR31
34,594,465 UART: [state] Locking ICCM
34,596,608 UART: [exit] Launching FMC @ 0x40000130
34,605,046 UART:
34,605,275 UART: Running Caliptra FMC ...
34,606,366 UART:
34,606,532 UART: [state] CFI Enabled
34,650,866 UART: [art] Extend RT PCRs Done
34,652,050 UART: [art] Lock RT PCRs Done
34,653,444 UART: [art] Populate DV Done
34,659,167 UART: [fht] FMC Alias Private Key: 7
34,660,748 UART: [art] Derive CDI
34,661,552 UART: [art] Store in in slot 0x4
34,704,191 UART: [art] Derive Key Pair
34,705,218 UART: [art] Store priv key in slot 0x5
37,132,026 UART: [art] Derive Key Pair - Done
37,144,970 UART: [art] Signing Cert with AUTHO
37,146,264 UART: RITY.KEYID = 7
38,851,826 UART: [art] Erasing AUTHORITY.KEYID = 7
38,853,452 UART: [art] PUB.X = 81EB877F10EA625FF52A3797E0CC9904B286B62D1934904A730D74823822FF3050FFE2C04067B710BCBE7F477D6DE80F
38,860,585 UART: [art] PUB.Y = 6672B227BDFD1E359C7938DE2BBDBF16B9C641EBDD55C37008C4A8E9EEFDA85B0DDC527BEA999D3DB6265AE0954B4F2D
38,867,867 UART: [art] SIG.R = E76C0F6D9ED75AFED6F2285A927E2D7C38CCF220B45C272384296C76D4727B0C5EE8213E1D5EA5F74C52D1B8A599522E
38,875,266 UART: [art] SIG.S = 378BF9CE5201D837EA66F84413CA92D2F0E981B9D992FFDA8FFAD1DE31F9BD3AB4BE3DF62F7139E44DD98B005D78DFBB
39,854,040 UART: mbox::rt_entry...
39,855,110 UART: ____ _ _ _ ____ _____
39,857,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,859,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,861,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,862,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,864,856 UART: |_|
39,865,655 UART:
40,149,954 UART: [rt] Runtime listening for mailbox commands...
40,152,144 >>> mbox cmd response data (120 bytes)
42,200,262 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,300,446 UART:
42,300,810 UART: Running Caliptra ROM ...
42,301,854 UART:
42,302,000 UART: [state] CFI Enabled
42,318,550 UART: [state] LifecycleState = Unprovisioned
42,320,379 UART: [state] DebugLocked = No
42,323,078 UART: [state] WD Timer not started. Device not locked for debugging
42,326,267 UART: [kat] SHA2-256
42,505,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,517,022 UART: [kat] ++
42,517,558 UART: [kat] sha1
42,528,995 UART: [kat] SHA2-256
42,532,639 UART: [kat] SHA2-384
42,538,366 UART: [kat] SHA2-512-ACC
42,541,322 UART: [kat] ECC-384
44,985,669 UART: [kat] HMAC-384Kdf
44,998,949 UART: [kat] LMS
45,528,461 UART: [kat] --
45,531,961 UART: [update-reset] ++
48,522,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,524,990 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,783,184 >>> mbox cmd response: success
48,783,602 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,784,368 UART: [update-reset] Copying MAN_2 To MAN_1
48,806,702 UART: [update-reset Success] --
48,810,877 UART: [state] Locking Datavault
48,814,661 UART: [state] Locking PCR0, PCR1 and PCR31
48,816,296 UART: [state] Locking ICCM
48,817,589 UART: [exit] Launching FMC @ 0x40000130
48,825,977 UART:
48,826,202 UART: Running Caliptra FMC ...
48,827,296 UART:
48,827,462 UART: [state] CFI Enabled
48,871,699 UART: [art] Extend RT PCRs Done
48,872,881 UART: [art] Lock RT PCRs Done
48,874,275 UART: [art] Populate DV Done
48,879,621 UART: [fht] FMC Alias Private Key: 7
48,881,198 UART: [art] Derive CDI
48,881,999 UART: [art] Store in in slot 0x4
48,924,903 UART: [art] Derive Key Pair
48,925,894 UART: [art] Store priv key in slot 0x5
51,353,078 UART: [art] Derive Key Pair - Done
51,366,350 UART: [art] Signing Cert with AUTHO
51,367,657 UART: RITY.KEYID = 7
53,073,543 UART: [art] Erasing AUTHORITY.KEYID = 7
53,075,051 UART: [art] PUB.X = 6A9433238D9BA08B1906D69B9DE54CFDD372E3FF8E31AD123A4DE5B926632AA70702CC9046209E70C993370AB88D2A0D
53,082,297 UART: [art] PUB.Y = 62EF38DAC6BA3FDEA6FCC6C953D5AA234DDB86BAF53D09BCB9DDE9E7A6722ABED4AF0BC14D3ECA144F0775DCED7F00B9
53,089,638 UART: [art] SIG.R = A2F202CF066BD5D0382D837F4D71BCC69FFD56CEBA398ECE7FEF3ED7DC5FCBD198D3093F21D4763B09D8E9107BB22305
53,097,071 UART: [art] SIG.S = F7C12B3DFF86DFBE26DB84F1003D6D15D65DB1700A02E0989EA6A54F7149B7DCE9DA357F527453F4E37CD497C5A05D15
54,075,399 UART: mbox::rt_entry...
54,076,335 UART: ____ _ _ _ ____ _____
54,078,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,080,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,082,232 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,084,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,086,068 UART: |_|
54,087,046 UART:
54,371,491 UART: [rt] Runtime listening for mailbox commands...
54,373,602 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,699,906 ready_for_fw is high
3,700,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,150 >>> mbox cmd response: success
18,517,121 UART:
18,517,644 UART: Running Caliptra FMC ...
18,518,848 UART:
18,519,009 UART: [state] CFI Enabled
18,527,059 UART: [fht] FMC Alias Private Key: 7
20,284,159 UART: [art] Extend RT PCRs Done
20,285,386 UART: [art] Lock RT PCRs Done
20,286,685 UART: [art] Populate DV Done
20,292,325 UART: [fht] FMC Alias Private Key: 7
20,293,975 UART: [art] Derive CDI
20,294,782 UART: [art] Store in in slot 0x4
20,337,204 UART: [art] Derive Key Pair
20,338,198 UART: [art] Store priv key in slot 0x5
22,764,520 UART: [art] Derive Key Pair - Done
22,777,622 UART: [art] Signing Cert with AUTHO
22,778,926 UART: RITY.KEYID = 7
24,484,384 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,894 UART: [art] PUB.X = 2AF498E9176E4BE80AA6DA57E26E35FE59EB1E93E517A651FC447CE3731AEFA10103D897CED3AABEED7E4BA197A516E7
24,493,187 UART: [art] PUB.Y = A3751A7CB053CEFF35B453A5168007F32E7BBC6F6C24FAC0D0C276D4DAC18AF5F73E3FF906F2DAF84F9E1D1C81E353DF
24,500,476 UART: [art] SIG.R = 37C9711FD3F80F4EFF7516A7BBFB055A237F3BCD0354911298735E725FD97D41438069572FED9CDB52B40FE4C514CBA1
24,507,853 UART: [art] SIG.S = 088B008F9B11AB7F4EB923DF595BEA07DFE6233975136E670D131E0AD7C0AD1C4D796DC77879F3144CF15D282A6F7571
25,486,940 UART: Caliptra RT
25,487,637 UART: [state] CFI Enabled
25,604,097 UART: [rt] RT listening for mailbox commands...
25,606,385 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,636,197 UART: [rt]cmd =0x54514754, len=24
25,638,677 >>> mbox cmd response data (8 bytes)
27,694,561 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,131,965 >>> mbox cmd response: success
34,132,472 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,168,669 UART:
34,168,965 UART: Running Caliptra FMC ...
34,169,987 UART:
34,170,125 UART: [state] CFI Enabled
34,214,820 UART: [art] Extend RT PCRs Done
34,216,008 UART: [art] Lock RT PCRs Done
34,217,671 UART: [art] Populate DV Done
34,222,923 UART: [fht] FMC Alias Private Key: 7
34,224,511 UART: [art] Derive CDI
34,225,243 UART: [art] Store in in slot 0x4
34,267,609 UART: [art] Derive Key Pair
34,268,603 UART: [art] Store priv key in slot 0x5
36,695,832 UART: [art] Derive Key Pair - Done
36,708,779 UART: [art] Signing Cert with AUTHO
36,710,077 UART: RITY.KEYID = 7
38,415,687 UART: [art] Erasing AUTHORITY.KEYID = 7
38,417,182 UART: [art] PUB.X = DBAC01AA4B8AE7B526E83731908668FD2C37372F4A38723F81D054E5E5222E4199305CA08EC47A28E50FEAEE9D350759
38,424,417 UART: [art] PUB.Y = 8B40759CD67FE5C33615FD2464C21D9676965716621C9000CDBDEFD4A077A66DD8819638EC79F227A14C97D53BEC4330
38,431,692 UART: [art] SIG.R = 41F186C921F9791FBFE08605ADD48295C3661D71AA3A86D016418E1380332769EA58DFA2DDFBFBD118C8AE8278D518E2
38,439,142 UART: [art] SIG.S = DD426EB829EB40695833C645AF020766198FF87F5D4BAA8BA7804BF4E4870A18085557E8AF0327393167E5DC1E5AAD39
39,417,801 UART: mbox::rt_entry...
39,418,745 UART: ____ _ _ _ ____ _____
39,420,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,422,689 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,424,540 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,426,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,428,337 UART: |_|
39,429,157 UART:
39,717,257 UART: [rt] Runtime listening for mailbox commands...
39,719,427 >>> mbox cmd response data (120 bytes)
41,765,050 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,204,420 >>> mbox cmd response: success
48,204,961 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,239,551 UART:
48,239,864 UART: Running Caliptra FMC ...
48,240,895 UART:
48,241,040 UART: [state] CFI Enabled
48,284,963 UART: [art] Extend RT PCRs Done
48,286,153 UART: [art] Lock RT PCRs Done
48,287,626 UART: [art] Populate DV Done
48,293,188 UART: [fht] FMC Alias Private Key: 7
48,294,778 UART: [art] Derive CDI
48,295,522 UART: [art] Store in in slot 0x4
48,338,102 UART: [art] Derive Key Pair
48,339,093 UART: [art] Store priv key in slot 0x5
50,765,851 UART: [art] Derive Key Pair - Done
50,778,742 UART: [art] Signing Cert with AUTHO
50,780,039 UART: RITY.KEYID = 7
52,485,772 UART: [art] Erasing AUTHORITY.KEYID = 7
52,487,278 UART: [art] PUB.X = A78C11DFA660379CF650305143F05F503516D49874D78310E38C5FD49DA3D86AE52D334DDEA825B37C95A647499B69AA
52,494,538 UART: [art] PUB.Y = 622A9A74B428320612A357972AC770C87C372C7240009F8618B5C02D6CEEFD61EA1FE969C4D4AA04B1B4CF7E943B5D7F
52,501,759 UART: [art] SIG.R = 390A0DF8512A00F40654820D35E8CA933408B1578584F44DDD2C008B1055D7886AB2AE68D362236D053894699AF05C5E
52,509,094 UART: [art] SIG.S = 95A962D3B0159DE46C277A262FEC8B79E309BDF1D77FD22ECA869E9695BEFAA79F0285CDA52B604B6040B549577C05C1
53,487,031 UART: mbox::rt_entry...
53,487,991 UART: ____ _ _ _ ____ _____
53,489,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,491,924 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,493,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,495,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,497,700 UART: |_|
53,498,679 UART:
53,784,410 UART: [rt] Runtime listening for mailbox commands...
53,786,520 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,978 UART:
192,359 UART: Running Caliptra ROM ...
193,467 UART:
193,608 UART: [state] CFI Enabled
264,857 UART: [state] LifecycleState = Unprovisioned
267,263 UART: [state] DebugLocked = No
270,146 UART: [state] WD Timer not started. Device not locked for debugging
274,898 UART: [kat] SHA2-256
464,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,549 UART: [kat] ++
476,081 UART: [kat] sha1
487,821 UART: [kat] SHA2-256
490,795 UART: [kat] SHA2-384
496,753 UART: [kat] SHA2-512-ACC
499,337 UART: [kat] ECC-384
2,950,007 UART: [kat] HMAC-384Kdf
2,970,948 UART: [kat] LMS
3,502,755 UART: [kat] --
3,506,748 UART: [cold-reset] ++
3,508,747 UART: [fht] FHT @ 0x50003400
3,520,856 UART: [idev] ++
3,521,558 UART: [idev] CDI.KEYID = 6
3,522,435 UART: [idev] SUBJECT.KEYID = 7
3,523,674 UART: [idev] UDS.KEYID = 0
3,524,572 ready_for_fw is high
3,524,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,810 UART: [idev] Erasing UDS.KEYID = 0
6,027,659 UART: [idev] Sha1 KeyId Algorithm
6,049,235 UART: [idev] --
6,053,993 UART: [ldev] ++
6,054,677 UART: [ldev] CDI.KEYID = 6
6,055,565 UART: [ldev] SUBJECT.KEYID = 5
6,056,776 UART: [ldev] AUTHORITY.KEYID = 7
6,058,003 UART: [ldev] FE.KEYID = 1
6,099,219 UART: [ldev] Erasing FE.KEYID = 1
8,609,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,976 UART: [ldev] --
10,414,272 UART: [fwproc] Wait for Commands...
10,415,865 UART: [fwproc] Recv command 0x46574c44
10,418,130 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,605,062 >>> mbox cmd response: success
14,608,503 UART: [afmc] ++
14,609,219 UART: [afmc] CDI.KEYID = 6
14,610,409 UART: [afmc] SUBJECT.KEYID = 7
14,611,843 UART: [afmc] AUTHORITY.KEYID = 5
17,149,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,780 UART: [afmc] --
18,947,186 UART: [cold-reset] --
18,952,689 UART: [state] Locking Datavault
18,959,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,495 UART: [state] Locking ICCM
18,964,242 UART: [exit] Launching FMC @ 0x40000130
18,972,916 UART:
18,973,191 UART: Running Caliptra FMC ...
18,974,297 UART:
18,974,452 UART: [state] CFI Enabled
19,030,101 UART: [fht] FMC Alias Private Key: 7
20,793,699 UART: [art] Extend RT PCRs Done
20,794,924 UART: [art] Lock RT PCRs Done
20,796,338 UART: [art] Populate DV Done
20,801,751 UART: [fht] FMC Alias Private Key: 7
20,803,231 UART: [art] Derive CDI
20,803,994 UART: [art] Store in in slot 0x4
20,863,432 UART: [art] Derive Key Pair
20,864,486 UART: [art] Store priv key in slot 0x5
23,327,182 UART: [art] Derive Key Pair - Done
23,340,056 UART: [art] Signing Cert with AUTHO
23,341,352 UART: RITY.KEYID = 7
25,052,977 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,479 UART: [art] PUB.X = BA36188B8FF289F785808F4E97D51F06CB37E1E4B93AFE7CAA928A843FC810F3F7DCA6DB6A247E4DF113146951E1873A
25,061,723 UART: [art] PUB.Y = 2920A5767B61DC63B43950BBD9879E69CCC9630820957B7E37E27AFA60BFDE196C9128532E2ACA0C79F76F57D138DDD6
25,069,006 UART: [art] SIG.R = 92210FA30332E48553D081BB5B305C22CAF78CD3BC5B4798B398369F8B145542AA86D8F006A66451F8AA753EA92BFBAE
25,076,394 UART: [art] SIG.S = C07DA1BB6A52EE298D369AFC0630BD8817521E88E6CB0515964DCDE6809611421C9C26686FFB6A6AC498AD4E6234A4C1
26,055,084 UART: Caliptra RT
26,055,778 UART: [state] CFI Enabled
26,221,273 UART: [rt] RT listening for mailbox commands...
26,223,508 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,253,867 UART: [rt]cmd =0x54514754, len=24
26,256,573 >>> mbox cmd response data (8 bytes)
28,305,534 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,406,329 UART:
28,406,679 UART: Running Caliptra ROM ...
28,407,816 UART:
28,407,990 UART: [state] CFI Enabled
28,463,371 UART: [state] LifecycleState = Unprovisioned
28,465,477 UART: [state] DebugLocked = No
28,467,141 UART: [state] WD Timer not started. Device not locked for debugging
28,472,306 UART: [kat] SHA2-256
28,662,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,672,888 UART: [kat] ++
28,673,345 UART: [kat] sha1
28,685,207 UART: [kat] SHA2-256
28,688,240 UART: [kat] SHA2-384
28,692,990 UART: [kat] SHA2-512-ACC
28,695,612 UART: [kat] ECC-384
31,148,387 UART: [kat] HMAC-384Kdf
31,172,824 UART: [kat] LMS
31,704,398 UART: [kat] --
31,706,985 UART: [update-reset] ++
34,732,068 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,735,545 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,129,396 >>> mbox cmd response: success
35,129,777 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,130,233 UART: [update-reset] Copying MAN_2 To MAN_1
35,167,798 UART: [update-reset Success] --
35,173,593 UART: [state] Locking Datavault
35,177,394 UART: [state] Locking PCR0, PCR1 and PCR31
35,179,587 UART: [state] Locking ICCM
35,182,348 UART: [exit] Launching FMC @ 0x40000130
35,191,023 UART:
35,191,267 UART: Running Caliptra FMC ...
35,192,369 UART:
35,192,525 UART: [state] CFI Enabled
35,280,025 UART: [art] Extend RT PCRs Done
35,281,235 UART: [art] Lock RT PCRs Done
35,282,587 UART: [art] Populate DV Done
35,288,099 UART: [fht] FMC Alias Private Key: 7
35,289,682 UART: [art] Derive CDI
35,290,457 UART: [art] Store in in slot 0x4
35,349,472 UART: [art] Derive Key Pair
35,350,471 UART: [art] Store priv key in slot 0x5
37,813,259 UART: [art] Derive Key Pair - Done
37,826,159 UART: [art] Signing Cert with AUTHO
37,827,462 UART: RITY.KEYID = 7
39,538,926 UART: [art] Erasing AUTHORITY.KEYID = 7
39,540,424 UART: [art] PUB.X = 3AFAE31FAC98299011D9FBA13B8448016BBEE644CD6DD1C47949908E0297B43745AB9932C0AC56DA3AD90A4EDFE57111
39,547,715 UART: [art] PUB.Y = 40F957B6715DCCA46E7C6CC03F15952E9F189F741D44F8F880B02F52FCC4E670F0E63F1AE5FF955B267755815B90F890
39,555,005 UART: [art] SIG.R = 9081565C4FD75461D9BBEE0D8A4B761DD1BE0292A3931ADE912BA561A72215B3D4C6D8EB793AA819E20D395F540A084E
39,562,395 UART: [art] SIG.S = 85F12E9281383900324C94C9BBD0667A2B3B0AE1639A01A317AFE1DF46ACEFB214E70555219086A567B48C257D2EBCD7
40,540,986 UART: mbox::rt_entry...
40,541,937 UART: ____ _ _ _ ____ _____
40,543,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,545,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,547,715 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,549,638 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,551,491 UART: |_|
40,552,372 UART:
40,835,152 UART: [rt] Runtime listening for mailbox commands...
40,837,317 >>> mbox cmd response data (120 bytes)
42,884,415 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,984,532 UART:
42,984,903 UART: Running Caliptra ROM ...
42,985,959 UART:
42,986,112 UART: [state] CFI Enabled
43,057,254 UART: [state] LifecycleState = Unprovisioned
43,059,359 UART: [state] DebugLocked = No
43,062,182 UART: [state] WD Timer not started. Device not locked for debugging
43,066,483 UART: [kat] SHA2-256
43,256,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,267,105 UART: [kat] ++
43,267,565 UART: [kat] sha1
43,279,322 UART: [kat] SHA2-256
43,282,305 UART: [kat] SHA2-384
43,287,975 UART: [kat] SHA2-512-ACC
43,290,564 UART: [kat] ECC-384
45,737,280 UART: [kat] HMAC-384Kdf
45,761,085 UART: [kat] LMS
46,292,655 UART: [kat] --
46,297,295 UART: [update-reset] ++
49,317,641 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,320,311 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,714,123 >>> mbox cmd response: success
49,714,540 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,715,538 UART: [update-reset] Copying MAN_2 To MAN_1
49,753,103 UART: [update-reset Success] --
49,757,717 UART: [state] Locking Datavault
49,762,598 UART: [state] Locking PCR0, PCR1 and PCR31
49,764,735 UART: [state] Locking ICCM
49,767,181 UART: [exit] Launching FMC @ 0x40000130
49,775,840 UART:
49,776,094 UART: Running Caliptra FMC ...
49,777,203 UART:
49,777,365 UART: [state] CFI Enabled
49,867,356 UART: [art] Extend RT PCRs Done
49,868,541 UART: [art] Lock RT PCRs Done
49,870,215 UART: [art] Populate DV Done
49,875,686 UART: [fht] FMC Alias Private Key: 7
49,877,329 UART: [art] Derive CDI
49,878,138 UART: [art] Store in in slot 0x4
49,936,397 UART: [art] Derive Key Pair
49,937,429 UART: [art] Store priv key in slot 0x5
52,400,565 UART: [art] Derive Key Pair - Done
52,413,718 UART: [art] Signing Cert with AUTHO
52,415,040 UART: RITY.KEYID = 7
54,126,319 UART: [art] Erasing AUTHORITY.KEYID = 7
54,127,819 UART: [art] PUB.X = D9F6A529CDDACD10EF2BC7B51CB3D78618E3B4F62412AF03EE8CECC9140187FE16A613550F1DEFDF0767AAB26DC44BB5
54,135,118 UART: [art] PUB.Y = EA8E5C54072F0EDFF323586E14FCB150EA1B555DCA3301D90088D50AE79AA611F401B39E249474139F65EF95D254D8DE
54,142,401 UART: [art] SIG.R = 1322807176513C5D8EC261B81A1ABA1122D0C9D5FA3F6EBF925BA6AA05F609E60DCE0DDE2720344926541FE1140A55C9
54,149,792 UART: [art] SIG.S = 5B3A6DA5EB0F42CCC960BA088B156A25E86EEA2228ECA1E76083E65EC9DE8FF3C7009848B18F6F85B7F8D17DDA1150C7
55,128,868 UART: mbox::rt_entry...
55,129,942 UART: ____ _ _ _ ____ _____
55,131,877 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,133,877 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,135,736 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,137,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,139,537 UART: |_|
55,140,420 UART:
55,426,214 UART: [rt] Runtime listening for mailbox commands...
55,428,325 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,418,026 ready_for_fw is high
3,418,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,133 >>> mbox cmd response: success
19,007,431 UART:
19,007,839 UART: Running Caliptra FMC ...
19,009,035 UART:
19,009,211 UART: [state] CFI Enabled
19,073,098 UART: [fht] FMC Alias Private Key: 7
20,836,837 UART: [art] Extend RT PCRs Done
20,838,062 UART: [art] Lock RT PCRs Done
20,839,803 UART: [art] Populate DV Done
20,845,108 UART: [fht] FMC Alias Private Key: 7
20,846,755 UART: [art] Derive CDI
20,847,570 UART: [art] Store in in slot 0x4
20,905,590 UART: [art] Derive Key Pair
20,906,632 UART: [art] Store priv key in slot 0x5
23,369,724 UART: [art] Derive Key Pair - Done
23,382,935 UART: [art] Signing Cert with AUTHO
23,384,234 UART: RITY.KEYID = 7
25,096,284 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,773 UART: [art] PUB.X = 8BBC636681A5BC22CD7E09100F67041D068B5CC439A28CE49B78F2D3524B340044A0BE73F6C4DC941142AC1BE0484463
25,105,018 UART: [art] PUB.Y = F24EBF9E19B9A755121E60909F1AFDC038A90B89E76CD0890D6B6F35AA2FFFA4247B34EDD0165FD7F546ED2AFE32F852
25,112,303 UART: [art] SIG.R = C1ACFE651CD67BF780E651C3699F270A701CE9AC6E5C4ACEDA393CE877C132B8797B02246CDFA4765089864136A7D938
25,119,706 UART: [art] SIG.S = 038E64F491D367C033F87FE6BE344EBA2F1247950ED9C9CD0598556545474CC1C287561C3306E6BEDB485729EA09F81F
26,098,644 UART: Caliptra RT
26,099,357 UART: [state] CFI Enabled
26,263,663 UART: [rt] RT listening for mailbox commands...
26,265,996 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,296,466 UART: [rt]cmd =0x54514754, len=24
26,298,933 >>> mbox cmd response data (8 bytes)
28,369,982 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,367,270 >>> mbox cmd response: success
35,367,848 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,405,139 UART:
35,405,435 UART: Running Caliptra FMC ...
35,406,470 UART:
35,406,617 UART: [state] CFI Enabled
35,492,926 UART: [art] Extend RT PCRs Done
35,494,111 UART: [art] Lock RT PCRs Done
35,495,530 UART: [art] Populate DV Done
35,500,892 UART: [fht] FMC Alias Private Key: 7
35,502,374 UART: [art] Derive CDI
35,503,108 UART: [art] Store in in slot 0x4
35,562,294 UART: [art] Derive Key Pair
35,563,355 UART: [art] Store priv key in slot 0x5
38,026,636 UART: [art] Derive Key Pair - Done
38,039,278 UART: [art] Signing Cert with AUTHO
38,040,590 UART: RITY.KEYID = 7
39,751,867 UART: [art] Erasing AUTHORITY.KEYID = 7
39,753,355 UART: [art] PUB.X = DC9E90616759377B4E123528837650BCE991C9EE002E693793CD17D7C7A61973103830565C9F563F2166CE81F6E1127B
39,760,594 UART: [art] PUB.Y = 71FCAC13F0DB66E930868DB97A4805E2DB2B1F2D2E3EB7A40FB7A1C20090C4C0C5013D2F7025ED7FF0AF9145BEDCD819
39,767,824 UART: [art] SIG.R = B9DBB567DFF993587BEF1E550D29A4E8C26424E1781A335409D26AA3E95F7A4AA4B31B17665D7D6F93D3567D85D3176A
39,775,211 UART: [art] SIG.S = A9850DAAEF634A77F4130ABB0481D29D77D0EF93FF6FBD89EBDDF147E6E27FF83BA064E16987563AB5181058D9B803F6
40,753,776 UART: mbox::rt_entry...
40,754,746 UART: ____ _ _ _ ____ _____
40,756,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,758,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,760,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,762,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,764,527 UART: |_|
40,765,381 UART:
41,052,054 UART: [rt] Runtime listening for mailbox commands...
41,054,217 >>> mbox cmd response data (120 bytes)
43,099,864 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,114,845 >>> mbox cmd response: success
50,115,339 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,148,096 UART:
50,148,395 UART: Running Caliptra FMC ...
50,149,668 UART:
50,149,831 UART: [state] CFI Enabled
50,252,845 UART: [art] Extend RT PCRs Done
50,254,147 UART: [art] Lock RT PCRs Done
50,255,392 UART: [art] Populate DV Done
50,260,859 UART: [fht] FMC Alias Private Key: 7
50,262,562 UART: [art] Derive CDI
50,263,371 UART: [art] Store in in slot 0x4
50,322,284 UART: [art] Derive Key Pair
50,323,318 UART: [art] Store priv key in slot 0x5
52,786,345 UART: [art] Derive Key Pair - Done
52,799,332 UART: [art] Signing Cert with AUTHO
52,800,667 UART: RITY.KEYID = 7
54,511,728 UART: [art] Erasing AUTHORITY.KEYID = 7
54,513,208 UART: [art] PUB.X = F690DDC1B6C47F91B6C46C6E587511C1EEC6ECE7BDEE076E46065FE6E7FC1EFEC4CE1B5BEAB98162F472947D6A9E0C2D
54,520,500 UART: [art] PUB.Y = CF3C6262D742B81A7785AA7A6E42B803AEAA6FCBDF3BE6342921949ED181998C6EB03F3788DFE21D4EE914BDFA425162
54,527,834 UART: [art] SIG.R = 32F3DB80DCBE05EAEE5220C2C28E36EB8D8B8D9DD1D8270FA22363B323EDF33567BC5B9B9A1714B13EEBBE48A4660BAE
54,535,224 UART: [art] SIG.S = 40D5B08C8F17ED0218AA13C56E5F460EC4D02B6922E818DF10772494A3231DFDE8620B8F005F2915C41FD86023DB9318
55,513,489 UART: mbox::rt_entry...
55,514,456 UART: ____ _ _ _ ____ _____
55,516,459 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,518,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,520,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,522,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,524,232 UART: |_|
55,525,115 UART:
55,808,063 UART: [rt] Runtime listening for mailbox commands...
55,810,181 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,420 UART:
192,800 UART: Running Caliptra ROM ...
193,990 UART:
603,536 UART: [state] CFI Enabled
620,753 UART: [state] LifecycleState = Unprovisioned
623,187 UART: [state] DebugLocked = No
625,290 UART: [state] WD Timer not started. Device not locked for debugging
630,670 UART: [kat] SHA2-256
820,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,375 UART: [kat] ++
831,974 UART: [kat] sha1
843,230 UART: [kat] SHA2-256
846,233 UART: [kat] SHA2-384
852,360 UART: [kat] SHA2-512-ACC
854,943 UART: [kat] ECC-384
3,299,409 UART: [kat] HMAC-384Kdf
3,312,310 UART: [kat] LMS
3,844,115 UART: [kat] --
3,848,482 UART: [cold-reset] ++
3,849,412 UART: [fht] FHT @ 0x50003400
3,860,664 UART: [idev] ++
3,861,297 UART: [idev] CDI.KEYID = 6
3,862,319 UART: [idev] SUBJECT.KEYID = 7
3,863,436 UART: [idev] UDS.KEYID = 0
3,864,475 ready_for_fw is high
3,864,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,514 UART: [idev] Erasing UDS.KEYID = 0
6,344,545 UART: [idev] Sha1 KeyId Algorithm
6,366,160 UART: [idev] --
6,371,041 UART: [ldev] ++
6,371,725 UART: [ldev] CDI.KEYID = 6
6,372,630 UART: [ldev] SUBJECT.KEYID = 5
6,373,856 UART: [ldev] AUTHORITY.KEYID = 7
6,375,027 UART: [ldev] FE.KEYID = 1
6,386,692 UART: [ldev] Erasing FE.KEYID = 1
8,865,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,379 UART: [ldev] --
10,654,845 UART: [fwproc] Wait for Commands...
10,657,688 UART: [fwproc] Recv command 0x46574c44
10,659,988 UART: [fwproc] Recv'd Img size: 114448 bytes
14,109,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,849,656 >>> mbox cmd response: success
14,854,596 UART: [afmc] ++
14,855,296 UART: [afmc] CDI.KEYID = 6
14,856,541 UART: [afmc] SUBJECT.KEYID = 7
14,857,978 UART: [afmc] AUTHORITY.KEYID = 5
17,359,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,029 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,958 UART: [afmc] --
19,157,365 UART: [cold-reset] --
19,161,333 UART: [state] Locking Datavault
19,166,476 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,669 UART: [state] Locking ICCM
19,170,235 UART: [exit] Launching FMC @ 0x40000130
19,178,876 UART:
19,179,110 UART: Running Caliptra FMC ...
19,180,201 UART:
19,180,350 UART: [state] CFI Enabled
19,188,385 UART: [fht] FMC Alias Private Key: 7
20,945,002 UART: [art] Extend RT PCRs Done
20,946,221 UART: [art] Lock RT PCRs Done
20,947,999 UART: [art] Populate DV Done
20,953,240 UART: [fht] FMC Alias Private Key: 7
20,954,887 UART: [art] Derive CDI
20,955,696 UART: [art] Store in in slot 0x4
20,998,063 UART: [art] Derive Key Pair
20,999,057 UART: [art] Store priv key in slot 0x5
23,426,178 UART: [art] Derive Key Pair - Done
23,439,388 UART: [art] Signing Cert with AUTHO
23,440,684 UART: RITY.KEYID = 7
25,146,441 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,950 UART: [art] PUB.X = F5AF1CBC563F15937D45A4290C982963E1C80F19EE456507A18DEAA5566078BB441B49AC4EF856C6A23F94E7608C93F3
25,155,177 UART: [art] PUB.Y = 9E2106DC55A752C37D8055B3EDDFE3C9B9B517A4D530A650A8F5BA5D13CB6ACEB75749767A6C28D5A5CB65B3541786D9
25,162,495 UART: [art] SIG.R = C1DDF494E958AC544B8C4F6DE264AC64513E6476B4DE016B76132442C297F5F5C670129AE5BE16BC670E4FE3C70EC0B3
25,169,901 UART: [art] SIG.S = F7FAFFDB74364B28ABBD33A43EA238A9A946B4FD8475DD030D9AD9959B4A2927FEDE8CE0E8297EA1AC5F01AA4FAC3459
26,149,539 UART: Caliptra RT
26,150,247 UART: [state] CFI Enabled
26,266,331 UART: [rt] RT listening for mailbox commands...
26,268,463 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,298,234 UART: [rt]cmd =0x54514754, len=24
26,300,648 >>> mbox cmd response data (8 bytes)
28,350,064 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,450,854 UART:
28,451,216 UART: Running Caliptra ROM ...
28,452,339 UART:
28,452,499 UART: [state] CFI Enabled
28,466,815 UART: [state] LifecycleState = Unprovisioned
28,468,635 UART: [state] DebugLocked = No
28,470,818 UART: [state] WD Timer not started. Device not locked for debugging
28,474,834 UART: [kat] SHA2-256
28,664,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,675,465 UART: [kat] ++
28,675,964 UART: [kat] sha1
28,687,664 UART: [kat] SHA2-256
28,690,663 UART: [kat] SHA2-384
28,695,784 UART: [kat] SHA2-512-ACC
28,698,398 UART: [kat] ECC-384
31,140,443 UART: [kat] HMAC-384Kdf
31,152,859 UART: [kat] LMS
31,684,496 UART: [kat] --
31,688,264 UART: [update-reset] ++
34,706,230 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,709,062 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
35,102,838 >>> mbox cmd response: success
35,103,220 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,104,854 UART: [update-reset] Copying MAN_2 To MAN_1
35,142,421 UART: [update-reset Success] --
35,146,919 UART: [state] Locking Datavault
35,150,545 UART: [state] Locking PCR0, PCR1 and PCR31
35,152,678 UART: [state] Locking ICCM
35,155,580 UART: [exit] Launching FMC @ 0x40000130
35,164,247 UART:
35,164,471 UART: Running Caliptra FMC ...
35,165,487 UART:
35,165,649 UART: [state] CFI Enabled
35,209,271 UART: [art] Extend RT PCRs Done
35,210,451 UART: [art] Lock RT PCRs Done
35,211,734 UART: [art] Populate DV Done
35,217,079 UART: [fht] FMC Alias Private Key: 7
35,218,663 UART: [art] Derive CDI
35,219,468 UART: [art] Store in in slot 0x4
35,261,889 UART: [art] Derive Key Pair
35,262,923 UART: [art] Store priv key in slot 0x5
37,689,491 UART: [art] Derive Key Pair - Done
37,702,435 UART: [art] Signing Cert with AUTHO
37,703,726 UART: RITY.KEYID = 7
39,409,155 UART: [art] Erasing AUTHORITY.KEYID = 7
39,410,669 UART: [art] PUB.X = B8E25188D9DA658872ABDC14FFE240F105CDC3496463663E321007FE8F199CEC1798BC9D101B30DFC526F30A57A3FBBF
39,417,963 UART: [art] PUB.Y = 2895A81356F07927C6459BB008B87EADDD39F28B2531C6C54F1D71EFA0B02EBD4DD1ACDDC06DCBB3523A5A7D8E85433D
39,425,232 UART: [art] SIG.R = 5BCFF6FB5C72AE9D9F617BC8A278AB5765278C004F585D025D8562B3B442CBA05E3D0992FABEE5E90DA9BE1DBB76B981
39,432,643 UART: [art] SIG.S = 87259C408CA5EE7E6C77B4B5B81CED9EB81FB2222E180F32D8FFF4542D5A64EA9A17D7F12C1BF74E297FEEA67468E97E
40,411,619 UART: mbox::rt_entry...
40,412,579 UART: ____ _ _ _ ____ _____
40,414,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,416,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,418,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,420,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,422,251 UART: |_|
40,423,040 UART:
40,708,828 UART: [rt] Runtime listening for mailbox commands...
40,710,941 >>> mbox cmd response data (120 bytes)
42,757,066 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,857,102 UART:
42,857,469 UART: Running Caliptra ROM ...
42,858,592 UART:
42,858,757 UART: [state] CFI Enabled
42,873,082 UART: [state] LifecycleState = Unprovisioned
42,874,968 UART: [state] DebugLocked = No
42,877,421 UART: [state] WD Timer not started. Device not locked for debugging
42,882,574 UART: [kat] SHA2-256
43,072,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,083,208 UART: [kat] ++
43,083,800 UART: [kat] sha1
43,095,335 UART: [kat] SHA2-256
43,098,389 UART: [kat] SHA2-384
43,104,866 UART: [kat] SHA2-512-ACC
43,107,460 UART: [kat] ECC-384
45,552,143 UART: [kat] HMAC-384Kdf
45,566,621 UART: [kat] LMS
46,098,252 UART: [kat] --
46,102,563 UART: [update-reset] ++
49,120,834 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,125,073 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,518,893 >>> mbox cmd response: success
49,519,272 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,520,579 UART: [update-reset] Copying MAN_2 To MAN_1
49,558,141 UART: [update-reset Success] --
49,564,483 UART: [state] Locking Datavault
49,567,580 UART: [state] Locking PCR0, PCR1 and PCR31
49,569,752 UART: [state] Locking ICCM
49,571,098 UART: [exit] Launching FMC @ 0x40000130
49,579,714 UART:
49,579,950 UART: Running Caliptra FMC ...
49,581,042 UART:
49,581,215 UART: [state] CFI Enabled
49,625,653 UART: [art] Extend RT PCRs Done
49,626,795 UART: [art] Lock RT PCRs Done
49,628,287 UART: [art] Populate DV Done
49,633,849 UART: [fht] FMC Alias Private Key: 7
49,635,587 UART: [art] Derive CDI
49,636,387 UART: [art] Store in in slot 0x4
49,679,351 UART: [art] Derive Key Pair
49,680,387 UART: [art] Store priv key in slot 0x5
52,107,559 UART: [art] Derive Key Pair - Done
52,120,496 UART: [art] Signing Cert with AUTHO
52,121,800 UART: RITY.KEYID = 7
53,827,140 UART: [art] Erasing AUTHORITY.KEYID = 7
53,828,646 UART: [art] PUB.X = C7A52C829DA15249DEF6BB7A5BEF261DB633F5A4ED11764E1F5030E15E59410D4DDE6CACF205F6C121101B1F2A8B4F32
53,835,941 UART: [art] PUB.Y = 5CBC83CE72CC20EFC4C7655162151CF3748F0C99A2B5A3574E960233D51F9020F763EF508E78BD0A9A8A7BAC286448ED
53,843,156 UART: [art] SIG.R = 9B1E4828843FFAEF86EDF765CFC60617525B072F00D08C5B0D48280AFA9E96AC7C8038E4E77C7FDE5BFFA2F8B8CDA720
53,850,557 UART: [art] SIG.S = 9F0D1B64DA7058B0E2D1546A5F36ACC40CFB4E8350004CD480A447DE89593D209AE5927C5C6C6B2D3970AE63E891DFC2
54,829,084 UART: mbox::rt_entry...
54,830,056 UART: ____ _ _ _ ____ _____
54,832,043 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,834,047 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,835,969 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,837,889 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,839,810 UART: |_|
54,840,609 UART:
55,124,892 UART: [rt] Runtime listening for mailbox commands...
55,127,008 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,576 writing to cptra_bootfsm_go
3,755,679 ready_for_fw is high
3,756,103 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,753 >>> mbox cmd response: success
19,213,351 UART:
19,213,737 UART: Running Caliptra FMC ...
19,214,932 UART:
19,215,083 UART: [state] CFI Enabled
19,223,074 UART: [fht] FMC Alias Private Key: 7
20,979,531 UART: [art] Extend RT PCRs Done
20,980,759 UART: [art] Lock RT PCRs Done
20,982,299 UART: [art] Populate DV Done
20,987,763 UART: [fht] FMC Alias Private Key: 7
20,989,465 UART: [art] Derive CDI
20,990,293 UART: [art] Store in in slot 0x4
21,033,046 UART: [art] Derive Key Pair
21,034,045 UART: [art] Store priv key in slot 0x5
23,461,139 UART: [art] Derive Key Pair - Done
23,473,981 UART: [art] Signing Cert with AUTHO
23,475,284 UART: RITY.KEYID = 7
25,180,684 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,175 UART: [art] PUB.X = CC9F4C7D0AAA24168951A69C31A1F4AACD9D03515D9BB51419843606D88748350F8791EEF03AB21E54F6D7CF0DD917A2
25,189,452 UART: [art] PUB.Y = FD6CC0858CEF5480FD7720FE8A5EC0CD408F85D8759E788227B579BA474172BC0031551186B1F05BAD5E55656FBECCCD
25,196,737 UART: [art] SIG.R = 037CC51F49B538B9153BB5C7515D315B18E0BE066B5BC6004E05E8918FD60EDB5332253A749BEFDFCE108382674256F2
25,204,100 UART: [art] SIG.S = 3EB2731E3ECCB6031D76510E103D3E40E9C429733DBAE30063CE08911D230D1313F7DAEDB8FB92DD590C73EFB5915406
26,183,327 UART: Caliptra RT
26,184,037 UART: [state] CFI Enabled
26,301,911 UART: [rt] RT listening for mailbox commands...
26,304,138 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,334,178 UART: [rt]cmd =0x54514754, len=24
26,336,827 >>> mbox cmd response data (8 bytes)
28,398,830 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,321,685 >>> mbox cmd response: success
35,322,170 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,355,840 UART:
35,356,130 UART: Running Caliptra FMC ...
35,357,150 UART:
35,357,288 UART: [state] CFI Enabled
35,401,967 UART: [art] Extend RT PCRs Done
35,403,152 UART: [art] Lock RT PCRs Done
35,404,449 UART: [art] Populate DV Done
35,409,966 UART: [fht] FMC Alias Private Key: 7
35,411,577 UART: [art] Derive CDI
35,412,387 UART: [art] Store in in slot 0x4
35,455,149 UART: [art] Derive Key Pair
35,456,179 UART: [art] Store priv key in slot 0x5
37,883,229 UART: [art] Derive Key Pair - Done
37,896,219 UART: [art] Signing Cert with AUTHO
37,897,515 UART: RITY.KEYID = 7
39,602,826 UART: [art] Erasing AUTHORITY.KEYID = 7
39,604,345 UART: [art] PUB.X = 2786378B4724D9A6C5112A6E3151299E04715C488C6F6E402595EAFA60EB3D7DF20BB8746BC69F28E30F12B86B7DC544
39,611,623 UART: [art] PUB.Y = F312BE5886FC10E08A91F74850744E00DD26E659553E69F280A27EF4BEE9CF587CA5C4B4BFA11BBDCC9294D5CB655D61
39,618,862 UART: [art] SIG.R = 1B72EEE1E655AFBFC16FBB70C2B0918BC9A21A69D6C64419BAEC536347572202C8D5275B1D86614861123EFCA77E3D57
39,626,244 UART: [art] SIG.S = 4A8A0FE9A2984D2D3AC3AF80B16CDF447B2DA8DE7F582713CB9476B360EA1F0C48198B283C4626EC43FCCE8C55DB53A9
40,604,450 UART: mbox::rt_entry...
40,605,416 UART: ____ _ _ _ ____ _____
40,607,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,609,400 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,611,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,613,273 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,615,118 UART: |_|
40,615,990 UART:
40,903,637 UART: [rt] Runtime listening for mailbox commands...
40,905,734 >>> mbox cmd response data (120 bytes)
42,952,970 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,873,647 >>> mbox cmd response: success
49,874,089 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,908,128 UART:
49,908,467 UART: Running Caliptra FMC ...
49,909,539 UART:
49,909,704 UART: [state] CFI Enabled
49,953,403 UART: [art] Extend RT PCRs Done
49,954,596 UART: [art] Lock RT PCRs Done
49,956,103 UART: [art] Populate DV Done
49,961,180 UART: [fht] FMC Alias Private Key: 7
49,962,707 UART: [art] Derive CDI
49,963,472 UART: [art] Store in in slot 0x4
50,005,884 UART: [art] Derive Key Pair
50,006,893 UART: [art] Store priv key in slot 0x5
52,434,311 UART: [art] Derive Key Pair - Done
52,447,249 UART: [art] Signing Cert with AUTHO
52,448,546 UART: RITY.KEYID = 7
54,154,087 UART: [art] Erasing AUTHORITY.KEYID = 7
54,155,573 UART: [art] PUB.X = D25A0120978E0CCB3E5E3D7F583D7DCD5A6A115756D08DFFE80ABF8BBA025D16CCA999E14C5F7B6C5F612ACE5CFB00B0
54,162,860 UART: [art] PUB.Y = 76DEC5D471A64E54026B5D390E87C71BD0826E7425942F177F6A370C16F8300A0C795639A70013CDC395A405EC8D8B1B
54,170,113 UART: [art] SIG.R = E18B809179E2EBDA864A5731884139A961E18CB80E608B2FC16701E2282F4AE6A7504945227CEA0D76973CE5995FF057
54,177,480 UART: [art] SIG.S = 447000169FA80A0B7248861D7D39B09B5D7D62E17CA904A242C546E04B01EA5946212F4C10A724B090546D02AE4FCDEB
55,156,443 UART: mbox::rt_entry...
55,157,415 UART: ____ _ _ _ ____ _____
55,159,399 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,161,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,163,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,165,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,167,151 UART: |_|
55,167,952 UART:
55,454,548 UART: [rt] Runtime listening for mailbox commands...
55,456,663 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,581 UART: [kat] SHA2-256
881,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,627 UART: [kat] ++
885,779 UART: [kat] sha1
889,853 UART: [kat] SHA2-256
891,791 UART: [kat] SHA2-384
894,452 UART: [kat] SHA2-512-ACC
896,353 UART: [kat] ECC-384
901,758 UART: [kat] HMAC-384Kdf
906,466 UART: [kat] LMS
1,474,662 UART: [kat] --
1,475,511 UART: [cold-reset] ++
1,476,041 UART: [fht] Storing FHT @ 0x50003400
1,478,772 UART: [idev] ++
1,478,940 UART: [idev] CDI.KEYID = 6
1,479,300 UART: [idev] SUBJECT.KEYID = 7
1,479,724 UART: [idev] UDS.KEYID = 0
1,480,069 ready_for_fw is high
1,480,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,744 UART: [idev] Erasing UDS.KEYID = 0
1,504,094 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,668 UART: [idev] --
1,513,801 UART: [ldev] ++
1,513,969 UART: [ldev] CDI.KEYID = 6
1,514,332 UART: [ldev] SUBJECT.KEYID = 5
1,514,758 UART: [ldev] AUTHORITY.KEYID = 7
1,515,221 UART: [ldev] FE.KEYID = 1
1,519,995 UART: [ldev] Erasing FE.KEYID = 1
1,545,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,576 UART: [ldev] --
1,585,001 UART: [fwproc] Waiting for Commands...
1,585,684 UART: [fwproc] Received command 0x46574c44
1,586,475 UART: [fwproc] Received Image of size 114448 bytes
2,884,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,810 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,162 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,231 >>> mbox cmd response: success
3,078,367 UART: [afmc] ++
3,078,535 UART: [afmc] CDI.KEYID = 6
3,078,897 UART: [afmc] SUBJECT.KEYID = 7
3,079,322 UART: [afmc] AUTHORITY.KEYID = 5
3,114,597 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,252 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,942 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,811 UART: [afmc] --
3,157,849 UART: [cold-reset] --
3,158,785 UART: [state] Locking Datavault
3,159,936 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,540 UART: [state] Locking ICCM
3,161,070 UART: [exit] Launching FMC @ 0x40000130
3,166,399 UART:
3,166,415 UART: Running Caliptra FMC ...
3,166,823 UART:
3,166,877 UART: [state] CFI Enabled
3,177,518 UART: [fht] FMC Alias Private Key: 7
3,285,193 UART: [art] Extend RT PCRs Done
3,285,621 UART: [art] Lock RT PCRs Done
3,287,147 UART: [art] Populate DV Done
3,295,610 UART: [fht] FMC Alias Private Key: 7
3,296,718 UART: [art] Derive CDI
3,296,998 UART: [art] Store in in slot 0x4
3,382,863 UART: [art] Derive Key Pair
3,383,223 UART: [art] Store priv key in slot 0x5
3,397,239 UART: [art] Derive Key Pair - Done
3,411,802 UART: [art] Signing Cert with AUTHO
3,412,282 UART: RITY.KEYID = 7
3,427,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,281 UART: [art] PUB.X = 4028DE9D4FCF3CCC1FC4642931BC14CA540E0C985FD223F99BBCAD5B22F56383F88CA1BDAB8DDE3E94CB30EA443BF244
3,435,071 UART: [art] PUB.Y = 94026A1AA63C28B197DC2555BC70EA7F11C99B834710203BB5C283457996EF25CB859EAFD6FAA226F0E61A3910FD9AC7
3,442,026 UART: [art] SIG.R = FCA0D052779C04CF5CF2E0AFB056F30BB711A79E09EEBE08EE8C16F1BA306D0385BAC1E042C724F96A70056132C9C06C
3,448,794 UART: [art] SIG.S = D8379EE84DAC126158377E6D8AAABA366A9E5043B26EEB14141C839BA1ED7D7778B432B613407F62F251DDA7E9875C80
3,472,619 UART: Caliptra RT
3,472,872 UART: [state] CFI Enabled
3,580,804 UART: [rt] RT listening for mailbox commands...
3,581,474 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,674 UART: [rt]cmd =0x54514754, len=24
3,613,802 >>> mbox cmd response data (8 bytes)
3,613,803 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,569 UART:
3,614,585 UART: Running Caliptra ROM ...
3,614,993 UART:
3,615,047 UART: [state] CFI Enabled
3,617,305 UART: [state] LifecycleState = Unprovisioned
3,617,960 UART: [state] DebugLocked = No
3,618,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,219 UART: [kat] SHA2-256
4,414,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,265 UART: [kat] ++
4,418,417 UART: [kat] sha1
4,422,583 UART: [kat] SHA2-256
4,424,521 UART: [kat] SHA2-384
4,427,354 UART: [kat] SHA2-512-ACC
4,429,254 UART: [kat] ECC-384
4,434,965 UART: [kat] HMAC-384Kdf
4,439,325 UART: [kat] LMS
5,007,521 UART: [kat] --
5,008,510 UART: [update-reset] ++
5,936,058 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,937,100 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,033,534 >>> mbox cmd response: success
6,033,534 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,033,865 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,879 UART: [update-reset Success] --
6,042,820 UART: [state] Locking Datavault
6,043,604 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,208 UART: [state] Locking ICCM
6,044,674 UART: [exit] Launching FMC @ 0x40000130
6,050,003 UART:
6,050,019 UART: Running Caliptra FMC ...
6,050,427 UART:
6,050,481 UART: [state] CFI Enabled
6,139,632 UART: [art] Extend RT PCRs Done
6,140,060 UART: [art] Lock RT PCRs Done
6,141,231 UART: [art] Populate DV Done
6,149,456 UART: [fht] FMC Alias Private Key: 7
6,150,480 UART: [art] Derive CDI
6,150,760 UART: [art] Store in in slot 0x4
6,236,461 UART: [art] Derive Key Pair
6,236,821 UART: [art] Store priv key in slot 0x5
6,250,731 UART: [art] Derive Key Pair - Done
6,265,511 UART: [art] Signing Cert with AUTHO
6,265,991 UART: RITY.KEYID = 7
6,280,933 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,698 UART: [art] PUB.X = B84AE23363A5772AF4D64890513367B5951209042707255F4A4A636BE487C5B3EAC79131BB519E806104839AE749CF5F
6,288,446 UART: [art] PUB.Y = 0BCD4C4B4789DCB35453E22305557EDBE32DD6D551DB952D74344DECCAD34046E5EDD27C42499E1B10D88D9EF10DBA1C
6,295,405 UART: [art] SIG.R = 8C42526E1794A9A2628688BB57803B0529E4C9F33372D029997F73E594B7CE307013BE4326F5DCE88ACEB797AA1DD109
6,302,167 UART: [art] SIG.S = 4CD1F045E6808319D59570B495CA59166551AE13CFB848CD615432AFA1327BC6905E9024D8DEFE7746AB67434E6F1FA6
6,326,404 UART: mbox::rt_entry...
6,326,776 UART: ____ _ _ _ ____ _____
6,327,560 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,360 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,664 UART: |_|
6,330,976 UART:
6,609,788 UART: [rt] Runtime listening for mailbox commands...
6,611,025 >>> mbox cmd response data (120 bytes)
6,611,026 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,611,140 UART:
6,611,156 UART: Running Caliptra ROM ...
6,611,564 UART:
6,611,618 UART: [state] CFI Enabled
6,614,244 UART: [state] LifecycleState = Unprovisioned
6,614,899 UART: [state] DebugLocked = No
6,615,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,617,004 UART: [kat] SHA2-256
7,410,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,415,050 UART: [kat] ++
7,415,202 UART: [kat] sha1
7,419,556 UART: [kat] SHA2-256
7,421,494 UART: [kat] SHA2-384
7,424,179 UART: [kat] SHA2-512-ACC
7,426,079 UART: [kat] ECC-384
7,431,724 UART: [kat] HMAC-384Kdf
7,436,230 UART: [kat] LMS
8,004,426 UART: [kat] --
8,005,211 UART: [update-reset] ++
8,933,665 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,934,749 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,031,183 >>> mbox cmd response: success
9,031,183 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,031,494 UART: [update-reset] Copying MAN_2 To MAN_1
9,039,508 UART: [update-reset Success] --
9,040,513 UART: [state] Locking Datavault
9,041,311 UART: [state] Locking PCR0, PCR1 and PCR31
9,041,915 UART: [state] Locking ICCM
9,042,477 UART: [exit] Launching FMC @ 0x40000130
9,047,806 UART:
9,047,822 UART: Running Caliptra FMC ...
9,048,230 UART:
9,048,284 UART: [state] CFI Enabled
9,137,443 UART: [art] Extend RT PCRs Done
9,137,871 UART: [art] Lock RT PCRs Done
9,139,236 UART: [art] Populate DV Done
9,147,513 UART: [fht] FMC Alias Private Key: 7
9,148,517 UART: [art] Derive CDI
9,148,797 UART: [art] Store in in slot 0x4
9,234,740 UART: [art] Derive Key Pair
9,235,100 UART: [art] Store priv key in slot 0x5
9,248,406 UART: [art] Derive Key Pair - Done
9,263,236 UART: [art] Signing Cert with AUTHO
9,263,716 UART: RITY.KEYID = 7
9,279,400 UART: [art] Erasing AUTHORITY.KEYID = 7
9,280,165 UART: [art] PUB.X = 0BFC2CCA6E962678BCEF6111ED9DE9E73C2A04C51A1AB88E78CB5B2F39E8A48CCC1BFEC0D6A264E7CFAFC2749DB5C24C
9,286,963 UART: [art] PUB.Y = A691A410FF763D9853EE7043493CED5402FD5516575107D0AF38150C22C828BBE4C00B5F2C70E5113891587CFE2B49F5
9,293,899 UART: [art] SIG.R = F40464A2107DB67EC148A081DA9061A4955366685D9B869BED81E126312D919EBA5043C940FE64FDDE59F1534CE557A3
9,300,666 UART: [art] SIG.S = 6EBF46A0311D1F00EB321F86E06108697CC389756B10609789D4EA8878AC9E65833D9C068FCF602E8374667F1B482649
9,324,401 UART: mbox::rt_entry...
9,324,773 UART: ____ _ _ _ ____ _____
9,325,557 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,326,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,327,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,327,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,328,661 UART: |_|
9,328,973 UART:
9,606,461 UART: [rt] Runtime listening for mailbox commands...
9,607,698 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,943 ready_for_fw is high
1,361,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,553 >>> mbox cmd response: success
2,990,287 UART:
2,990,303 UART: Running Caliptra FMC ...
2,990,711 UART:
2,990,765 UART: [state] CFI Enabled
3,001,384 UART: [fht] FMC Alias Private Key: 7
3,109,229 UART: [art] Extend RT PCRs Done
3,109,657 UART: [art] Lock RT PCRs Done
3,111,275 UART: [art] Populate DV Done
3,119,432 UART: [fht] FMC Alias Private Key: 7
3,120,530 UART: [art] Derive CDI
3,120,810 UART: [art] Store in in slot 0x4
3,206,571 UART: [art] Derive Key Pair
3,206,931 UART: [art] Store priv key in slot 0x5
3,220,341 UART: [art] Derive Key Pair - Done
3,235,287 UART: [art] Signing Cert with AUTHO
3,235,767 UART: RITY.KEYID = 7
3,250,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,456 UART: [art] PUB.X = 2DC576304A2CCEC4EC105D34352D1787240781EE1EC63C2953AF976A8DF70EEB0D148C60002DF75A852D1E0A4428867C
3,258,196 UART: [art] PUB.Y = 81A001830A414F1868A028B3E9A2CA5BEA1700D35E4997C216131BAA69621540FEAC7C93117477587F86F18D3E8CAD14
3,265,116 UART: [art] SIG.R = 8870AD50D4E270A7D9E03F9CF9E69B5743BB0349E52020723AB671349E363F2AA5DF52882565B9869DA000E4262BFEA2
3,271,861 UART: [art] SIG.S = 42C246D2B3CCB69EEB9A63E5313C8B90F87604E42D4E308CF5FAB64D25EE636653AA01993AE58AFBB386FC78478465B1
3,295,318 UART: Caliptra RT
3,295,571 UART: [state] CFI Enabled
3,402,970 UART: [rt] RT listening for mailbox commands...
3,403,640 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,358 UART: [rt]cmd =0x54514754, len=24
3,435,620 >>> mbox cmd response data (8 bytes)
3,435,621 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,737,044 >>> mbox cmd response: success
5,737,044 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,750,303 UART:
5,750,319 UART: Running Caliptra FMC ...
5,750,727 UART:
5,750,781 UART: [state] CFI Enabled
5,839,930 UART: [art] Extend RT PCRs Done
5,840,358 UART: [art] Lock RT PCRs Done
5,841,615 UART: [art] Populate DV Done
5,850,030 UART: [fht] FMC Alias Private Key: 7
5,850,964 UART: [art] Derive CDI
5,851,244 UART: [art] Store in in slot 0x4
5,936,689 UART: [art] Derive Key Pair
5,937,049 UART: [art] Store priv key in slot 0x5
5,950,617 UART: [art] Derive Key Pair - Done
5,965,464 UART: [art] Signing Cert with AUTHO
5,965,944 UART: RITY.KEYID = 7
5,981,144 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,909 UART: [art] PUB.X = A7861999B2B45FBC6D5457245A06552C40B8A5688ADEB488FEDA04C0FB905901C9D392BE5345024517B75C24DF2616B6
5,988,667 UART: [art] PUB.Y = 8A3674649819907BA856666D603EE84DCA748403B30AAC4F6390353E2C41FD99A609584D7A114C95ABD08D0AEB867528
5,995,601 UART: [art] SIG.R = 9A2274AA70732FEAD24DC0B5B801B333DE46A8EB61439E80F471AA394BCE26B0A3C3DD5CD088F487DB335A3967FD1389
6,002,380 UART: [art] SIG.S = 939AF8A0E43468F39C6ECA0DF41DCA5B1F1E1D56BD6E38D0F49A054F68FB2D3CA1DE9761FF05D4EA00F4CCAFDA032371
6,025,633 UART: mbox::rt_entry...
6,026,005 UART: ____ _ _ _ ____ _____
6,026,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,027,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,028,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,029,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,029,893 UART: |_|
6,030,205 UART:
6,311,110 UART: [rt] Runtime listening for mailbox commands...
6,312,347 >>> mbox cmd response data (120 bytes)
6,312,348 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,612,207 >>> mbox cmd response: success
8,612,207 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,625,282 UART:
8,625,298 UART: Running Caliptra FMC ...
8,625,706 UART:
8,625,760 UART: [state] CFI Enabled
8,715,059 UART: [art] Extend RT PCRs Done
8,715,487 UART: [art] Lock RT PCRs Done
8,716,718 UART: [art] Populate DV Done
8,724,879 UART: [fht] FMC Alias Private Key: 7
8,725,977 UART: [art] Derive CDI
8,726,257 UART: [art] Store in in slot 0x4
8,812,066 UART: [art] Derive Key Pair
8,812,426 UART: [art] Store priv key in slot 0x5
8,825,930 UART: [art] Derive Key Pair - Done
8,840,532 UART: [art] Signing Cert with AUTHO
8,841,012 UART: RITY.KEYID = 7
8,855,846 UART: [art] Erasing AUTHORITY.KEYID = 7
8,856,611 UART: [art] PUB.X = D3E03582CABA06B1501D4F87266FE4FFE954CFBC7BA918372A55FB747FA69C0756C0E78A75A63CF6DD78F8282CCF16F3
8,863,391 UART: [art] PUB.Y = 0C1E83FFA11D891C739A2A1541AFCBA304352BEA517F49F185AEEDE53A8B4AA0CBAA2A0C7999391748EC5518E6F704AF
8,870,347 UART: [art] SIG.R = 71513655EC250D566CA2210AF488957870C6BF41F62D80463A572553048FBD4A8D11FF79C1C89924491DEB02ACB6D3C2
8,877,103 UART: [art] SIG.S = 18560293072A3C8E1279E60C8214151DE48D67B6B69E2A774A2A7AD29D87C8B105FCCBFA4A9E898D6D69373556016CF8
8,901,385 UART: mbox::rt_entry...
8,901,757 UART: ____ _ _ _ ____ _____
8,902,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,903,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,904,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,904,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,905,645 UART: |_|
8,905,957 UART:
9,184,718 UART: [rt] Runtime listening for mailbox commands...
9,185,955 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,622 UART: [kat] SHA2-256
881,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,668 UART: [kat] ++
885,820 UART: [kat] sha1
889,930 UART: [kat] SHA2-256
891,868 UART: [kat] SHA2-384
894,583 UART: [kat] SHA2-512-ACC
896,484 UART: [kat] ECC-384
901,989 UART: [kat] HMAC-384Kdf
906,721 UART: [kat] LMS
1,474,917 UART: [kat] --
1,475,958 UART: [cold-reset] ++
1,476,374 UART: [fht] Storing FHT @ 0x50003400
1,479,115 UART: [idev] ++
1,479,283 UART: [idev] CDI.KEYID = 6
1,479,643 UART: [idev] SUBJECT.KEYID = 7
1,480,067 UART: [idev] UDS.KEYID = 0
1,480,412 ready_for_fw is high
1,480,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,147 UART: [idev] Erasing UDS.KEYID = 0
1,504,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,414 UART: [ldev] ++
1,514,582 UART: [ldev] CDI.KEYID = 6
1,514,945 UART: [ldev] SUBJECT.KEYID = 5
1,515,371 UART: [ldev] AUTHORITY.KEYID = 7
1,515,834 UART: [ldev] FE.KEYID = 1
1,521,224 UART: [ldev] Erasing FE.KEYID = 1
1,546,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,643 UART: [ldev] --
1,586,106 UART: [fwproc] Waiting for Commands...
1,586,749 UART: [fwproc] Received command 0x46574c44
1,587,540 UART: [fwproc] Received Image of size 114448 bytes
2,887,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,998 >>> mbox cmd response: success
3,081,256 UART: [afmc] ++
3,081,424 UART: [afmc] CDI.KEYID = 6
3,081,786 UART: [afmc] SUBJECT.KEYID = 7
3,082,211 UART: [afmc] AUTHORITY.KEYID = 5
3,117,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,259 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,949 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,790 UART: [afmc] --
3,160,750 UART: [cold-reset] --
3,161,406 UART: [state] Locking Datavault
3,162,363 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,967 UART: [state] Locking ICCM
3,163,595 UART: [exit] Launching FMC @ 0x40000130
3,168,924 UART:
3,168,940 UART: Running Caliptra FMC ...
3,169,348 UART:
3,169,491 UART: [state] CFI Enabled
3,180,536 UART: [fht] FMC Alias Private Key: 7
3,288,979 UART: [art] Extend RT PCRs Done
3,289,407 UART: [art] Lock RT PCRs Done
3,291,345 UART: [art] Populate DV Done
3,299,586 UART: [fht] FMC Alias Private Key: 7
3,300,734 UART: [art] Derive CDI
3,301,014 UART: [art] Store in in slot 0x4
3,387,145 UART: [art] Derive Key Pair
3,387,505 UART: [art] Store priv key in slot 0x5
3,400,827 UART: [art] Derive Key Pair - Done
3,415,407 UART: [art] Signing Cert with AUTHO
3,415,887 UART: RITY.KEYID = 7
3,430,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,672 UART: [art] PUB.X = 98C4302DE0CE95D1A4587CF00A93F88D4B0F35C754D4BF8ED53D0BB6B41B5447793ABDFA1A19686590F3225F32C27164
3,438,439 UART: [art] PUB.Y = F0A6F403A64710E64D5C6AE1FC8C4D2188DBB7744C282D5D6AA37C280C649D80FB8236E13B17A82C138A60DB96DF1822
3,445,391 UART: [art] SIG.R = 8AAF24874AFC188CB203F3C9C0D20AE59C2DA05A1F140C2BFC17A12CEBC46B7108A33F4C322A081A2704D93893A4CDE2
3,452,159 UART: [art] SIG.S = 0929F16DA4E78077C7C288233B1AB4B4CF0840D86330EECA01DE1DC64B4740BB1EF18BE1FF6FFFF1A8D418E3300D56A0
3,475,610 UART: Caliptra RT
3,475,955 UART: [state] CFI Enabled
3,584,396 UART: [rt] RT listening for mailbox commands...
3,585,066 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,392 UART: [rt]cmd =0x54514754, len=24
3,617,530 >>> mbox cmd response data (8 bytes)
3,617,531 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,183 UART:
3,618,199 UART: Running Caliptra ROM ...
3,618,607 UART:
3,618,748 UART: [state] CFI Enabled
3,621,886 UART: [state] LifecycleState = Unprovisioned
3,622,541 UART: [state] DebugLocked = No
3,623,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,624,896 UART: [kat] SHA2-256
4,418,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,422,942 UART: [kat] ++
4,423,094 UART: [kat] sha1
4,427,406 UART: [kat] SHA2-256
4,429,344 UART: [kat] SHA2-384
4,432,057 UART: [kat] SHA2-512-ACC
4,433,957 UART: [kat] ECC-384
4,439,776 UART: [kat] HMAC-384Kdf
4,444,504 UART: [kat] LMS
5,012,700 UART: [kat] --
5,013,413 UART: [update-reset] ++
5,940,185 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,941,399 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,037,833 >>> mbox cmd response: success
6,037,833 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,038,146 UART: [update-reset] Copying MAN_2 To MAN_1
6,046,160 UART: [update-reset Success] --
6,047,245 UART: [state] Locking Datavault
6,047,891 UART: [state] Locking PCR0, PCR1 and PCR31
6,048,495 UART: [state] Locking ICCM
6,049,009 UART: [exit] Launching FMC @ 0x40000130
6,054,338 UART:
6,054,354 UART: Running Caliptra FMC ...
6,054,762 UART:
6,054,905 UART: [state] CFI Enabled
6,144,052 UART: [art] Extend RT PCRs Done
6,144,480 UART: [art] Lock RT PCRs Done
6,145,971 UART: [art] Populate DV Done
6,154,392 UART: [fht] FMC Alias Private Key: 7
6,155,444 UART: [art] Derive CDI
6,155,724 UART: [art] Store in in slot 0x4
6,241,281 UART: [art] Derive Key Pair
6,241,641 UART: [art] Store priv key in slot 0x5
6,255,043 UART: [art] Derive Key Pair - Done
6,270,080 UART: [art] Signing Cert with AUTHO
6,270,560 UART: RITY.KEYID = 7
6,286,266 UART: [art] Erasing AUTHORITY.KEYID = 7
6,287,031 UART: [art] PUB.X = CF7FCF5853D364CD28B08B9442BA0194202C1D682C14AB14C04BFDD1FE0D14E882A26769FBE6EAB628703D5E2A70141E
6,293,807 UART: [art] PUB.Y = 311F67D2CF1A3E1585E0FE66CA4207ADE01340D7B04DEA3F02DC7E33D07A1365419B1CC8C7A4E17715F6AF7BAC0833C4
6,300,762 UART: [art] SIG.R = AB000031A23B2053F3EC75E726251C1C89390F0A22F4CC26236289A55575A6076FB00D68387DD598F2ED071097F1314A
6,307,465 UART: [art] SIG.S = 639FF9833E0BE50FB0AF59C0B4D41660B6C06932527A3AC6A0847CCBAB54D98D6A9FCB386422C4A648AB793E1CA18B22
6,331,442 UART: mbox::rt_entry...
6,331,814 UART: ____ _ _ _ ____ _____
6,332,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,333,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,334,166 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,334,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,335,702 UART: |_|
6,336,014 UART:
6,617,726 UART: [rt] Runtime listening for mailbox commands...
6,618,963 >>> mbox cmd response data (120 bytes)
6,618,964 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,619,078 UART:
6,619,094 UART: Running Caliptra ROM ...
6,619,502 UART:
6,619,643 UART: [state] CFI Enabled
6,622,435 UART: [state] LifecycleState = Unprovisioned
6,623,090 UART: [state] DebugLocked = No
6,623,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,625,385 UART: [kat] SHA2-256
7,419,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,423,431 UART: [kat] ++
7,423,583 UART: [kat] sha1
7,427,717 UART: [kat] SHA2-256
7,429,655 UART: [kat] SHA2-384
7,432,326 UART: [kat] SHA2-512-ACC
7,434,226 UART: [kat] ECC-384
7,439,645 UART: [kat] HMAC-384Kdf
7,444,343 UART: [kat] LMS
8,012,539 UART: [kat] --
8,013,414 UART: [update-reset] ++
8,940,564 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,941,788 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,038,222 >>> mbox cmd response: success
9,038,222 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,038,491 UART: [update-reset] Copying MAN_2 To MAN_1
9,046,505 UART: [update-reset Success] --
9,047,386 UART: [state] Locking Datavault
9,048,146 UART: [state] Locking PCR0, PCR1 and PCR31
9,048,750 UART: [state] Locking ICCM
9,049,348 UART: [exit] Launching FMC @ 0x40000130
9,054,677 UART:
9,054,693 UART: Running Caliptra FMC ...
9,055,101 UART:
9,055,244 UART: [state] CFI Enabled
9,144,593 UART: [art] Extend RT PCRs Done
9,145,021 UART: [art] Lock RT PCRs Done
9,146,694 UART: [art] Populate DV Done
9,154,863 UART: [fht] FMC Alias Private Key: 7
9,156,023 UART: [art] Derive CDI
9,156,303 UART: [art] Store in in slot 0x4
9,241,976 UART: [art] Derive Key Pair
9,242,336 UART: [art] Store priv key in slot 0x5
9,255,738 UART: [art] Derive Key Pair - Done
9,270,307 UART: [art] Signing Cert with AUTHO
9,270,787 UART: RITY.KEYID = 7
9,286,343 UART: [art] Erasing AUTHORITY.KEYID = 7
9,287,108 UART: [art] PUB.X = 6A156FCB82087677B6B010C390A1C9930EDF49BA2D661CCD8E38F665448BE313CD80CA191C7DFEEE312120108804F258
9,293,873 UART: [art] PUB.Y = 8F01696D156C40A175ADAB76F274CE0F498F4090AD96B0806389EA081B843ADEFEE3439C0FEB79D1317D877B6F90830E
9,300,814 UART: [art] SIG.R = 687D11D182FE6DDE8C30CC121B79F6E27D254914B4776491070B7D447F1958995BFF454ACCE81ED3C4FC91601AC08853
9,307,580 UART: [art] SIG.S = D57FF6D8AE08D396B0A97FE1EFA134C621C94EC00516104D39F8FA86EF5243461D4F4D5350A67B3E51DAB5198246A62C
9,331,901 UART: mbox::rt_entry...
9,332,273 UART: ____ _ _ _ ____ _____
9,333,057 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,333,857 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,334,625 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,335,393 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,336,161 UART: |_|
9,336,473 UART:
9,616,367 UART: [rt] Runtime listening for mailbox commands...
9,617,604 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,442 ready_for_fw is high
1,363,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,320 >>> mbox cmd response: success
2,994,158 UART:
2,994,174 UART: Running Caliptra FMC ...
2,994,582 UART:
2,994,725 UART: [state] CFI Enabled
3,005,406 UART: [fht] FMC Alias Private Key: 7
3,113,607 UART: [art] Extend RT PCRs Done
3,114,035 UART: [art] Lock RT PCRs Done
3,115,185 UART: [art] Populate DV Done
3,123,466 UART: [fht] FMC Alias Private Key: 7
3,124,620 UART: [art] Derive CDI
3,124,900 UART: [art] Store in in slot 0x4
3,210,463 UART: [art] Derive Key Pair
3,210,823 UART: [art] Store priv key in slot 0x5
3,224,767 UART: [art] Derive Key Pair - Done
3,239,427 UART: [art] Signing Cert with AUTHO
3,239,907 UART: RITY.KEYID = 7
3,255,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,960 UART: [art] PUB.X = 2A7529C6FE0E61CD96B354EEBFD59DE8F96314D3CDD391DD5F80BB55541F206B88C2C03F0B50D93933EE3486DB14018A
3,262,733 UART: [art] PUB.Y = 61740BC243364548A5F659B6C65A3852EFEBF60D7144FFE576F0A27C6C011721A928EF02AE78D90CBA38F1A690DC3F2C
3,269,676 UART: [art] SIG.R = F2EE35743E3471F1190C14D51ED67F6A4271337909BAEC06514B9D2ADEE975349A4C85DAD2F00882F7936A3B14A6A45C
3,276,438 UART: [art] SIG.S = C19B3264EA416B03F3125D6CFDF985A3D753153309EE342004A8A5BA4184F79E77B34732EE0A7D2E7282CD6D93F4BA64
3,300,023 UART: Caliptra RT
3,300,368 UART: [state] CFI Enabled
3,408,668 UART: [rt] RT listening for mailbox commands...
3,409,338 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,198 UART: [rt]cmd =0x54514754, len=24
3,441,080 >>> mbox cmd response data (8 bytes)
3,441,081 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,741,625 >>> mbox cmd response: success
5,741,625 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,755,228 UART:
5,755,244 UART: Running Caliptra FMC ...
5,755,652 UART:
5,755,795 UART: [state] CFI Enabled
5,845,612 UART: [art] Extend RT PCRs Done
5,846,040 UART: [art] Lock RT PCRs Done
5,847,263 UART: [art] Populate DV Done
5,855,576 UART: [fht] FMC Alias Private Key: 7
5,856,666 UART: [art] Derive CDI
5,856,946 UART: [art] Store in in slot 0x4
5,943,129 UART: [art] Derive Key Pair
5,943,489 UART: [art] Store priv key in slot 0x5
5,957,207 UART: [art] Derive Key Pair - Done
5,971,669 UART: [art] Signing Cert with AUTHO
5,972,149 UART: RITY.KEYID = 7
5,987,601 UART: [art] Erasing AUTHORITY.KEYID = 7
5,988,366 UART: [art] PUB.X = 8D5DAA24E58CFC6CB158346DE21F011A6D90E5FA468ACC686EB9ABD8D61EA9B02A9B5F1A8F5F5ACCFA9BD7ECCFFEFA5D
5,995,175 UART: [art] PUB.Y = 3362A1492D1EDCA8E136A75147C8215A61FF56FF130C4589EF4382E03DAC371221598F690CB6DD93275EA722DB6BA846
6,002,121 UART: [art] SIG.R = 38D52322F29DA05C775E32815B299AC46619DC72EA3FB70D0EB1E66F238B0B838BFF36767EE376C3D5FD58DFA444B089
6,008,890 UART: [art] SIG.S = 34A74BEFD4300F4EFD4B154C8510E48D7A9F0B492EF506BC188287F078E75F5ADB173E826AEA6156B169984AE3E6641C
6,032,172 UART: mbox::rt_entry...
6,032,544 UART: ____ _ _ _ ____ _____
6,033,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,034,128 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,034,896 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,035,664 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,036,432 UART: |_|
6,036,744 UART:
6,320,405 UART: [rt] Runtime listening for mailbox commands...
6,321,642 >>> mbox cmd response data (120 bytes)
6,321,643 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,621,535 >>> mbox cmd response: success
8,621,535 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,634,958 UART:
8,634,974 UART: Running Caliptra FMC ...
8,635,382 UART:
8,635,525 UART: [state] CFI Enabled
8,724,772 UART: [art] Extend RT PCRs Done
8,725,200 UART: [art] Lock RT PCRs Done
8,726,495 UART: [art] Populate DV Done
8,734,596 UART: [fht] FMC Alias Private Key: 7
8,735,736 UART: [art] Derive CDI
8,736,016 UART: [art] Store in in slot 0x4
8,821,703 UART: [art] Derive Key Pair
8,822,063 UART: [art] Store priv key in slot 0x5
8,834,365 UART: [art] Derive Key Pair - Done
8,849,007 UART: [art] Signing Cert with AUTHO
8,849,487 UART: RITY.KEYID = 7
8,864,397 UART: [art] Erasing AUTHORITY.KEYID = 7
8,865,162 UART: [art] PUB.X = 204A3A756AE38F101B3BB0EE5F52F535896B13E28120E0834432C974AB25170B5E9E09DD100BAE7FE8C8EC29D33A1FAB
8,871,933 UART: [art] PUB.Y = 677B5BA8B2B5CE5CDFE9B20BC704FA23E2F475ABA15B6EE78894A7364E9673011143C871ECA7063416AA75DBE4BB9695
8,878,883 UART: [art] SIG.R = 6298DFF30B3985613BC65E71273BA6BC9F326FFF697C0805EA99CB61E597743FC0DC1AA409984A6CBDB8F1CDCBE8A73C
8,885,659 UART: [art] SIG.S = 179D80B24C2B50446DDBD8AF98650BC5B4950B56BCB0A20E91874484B7BFFD08A64B71B832067B681AB154328FB730AF
8,909,581 UART: mbox::rt_entry...
8,909,953 UART: ____ _ _ _ ____ _____
8,910,737 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,911,537 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,912,305 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,913,073 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,913,841 UART: |_|
8,914,153 UART:
9,197,744 UART: [rt] Runtime listening for mailbox commands...
9,198,981 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,172,229 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,324 UART: [idev] ++
1,175,492 UART: [idev] CDI.KEYID = 6
1,175,852 UART: [idev] SUBJECT.KEYID = 7
1,176,276 UART: [idev] UDS.KEYID = 0
1,176,621 ready_for_fw is high
1,176,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,795 UART: [idev] Sha1 KeyId Algorithm
1,209,251 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,674 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,312 >>> mbox cmd response: success
2,776,530 UART: [afmc] ++
2,776,698 UART: [afmc] CDI.KEYID = 6
2,777,060 UART: [afmc] SUBJECT.KEYID = 7
2,777,485 UART: [afmc] AUTHORITY.KEYID = 5
2,812,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,001 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,973 UART: [afmc] --
2,856,079 UART: [cold-reset] --
2,856,963 UART: [state] Locking Datavault
2,858,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,088 UART: [state] Locking ICCM
2,859,544 UART: [exit] Launching FMC @ 0x40000130
2,864,873 UART:
2,864,889 UART: Running Caliptra FMC ...
2,865,297 UART:
2,865,351 UART: [state] CFI Enabled
2,875,302 UART: [fht] FMC Alias Private Key: 7
2,983,087 UART: [art] Extend RT PCRs Done
2,983,515 UART: [art] Lock RT PCRs Done
2,984,961 UART: [art] Populate DV Done
2,993,462 UART: [fht] FMC Alias Private Key: 7
2,994,552 UART: [art] Derive CDI
2,994,832 UART: [art] Store in in slot 0x4
3,080,255 UART: [art] Derive Key Pair
3,080,615 UART: [art] Store priv key in slot 0x5
3,093,447 UART: [art] Derive Key Pair - Done
3,108,192 UART: [art] Signing Cert with AUTHO
3,108,672 UART: RITY.KEYID = 7
3,123,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,665 UART: [art] PUB.X = E5C92872C8E448F6FC2F7ACB766A4C8EF3617A5AD6C316F246A01C07288802D67FA7CF87E6132A3ED3ADA7A3EA1441E0
3,131,443 UART: [art] PUB.Y = 5FC3E1017DF7444CA7D64E4F85FB78D38C77BBEAD32D1C1C937E5D57F174977B33651A4CC80E6A3FE288AFB408E09C0B
3,138,397 UART: [art] SIG.R = C2B2B64099F5F4B7177B154606E03B0CCF50F5D946634FCE635CB3139F4398BA6AD1F2EEF8B5330F7152FA1AC008E154
3,145,163 UART: [art] SIG.S = AB46320243E69D72B0BC7EFA69751F0722464DDEFE3C7335114664DB35657756AA1FC76EAA904AA235D6FAEC0D821757
3,168,563 UART: Caliptra RT
3,168,816 UART: [state] CFI Enabled
3,276,358 UART: [rt] RT listening for mailbox commands...
3,277,028 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,720 UART: [rt]cmd =0x54514754, len=24
3,308,900 >>> mbox cmd response data (8 bytes)
3,308,901 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,742 UART:
3,309,758 UART: Running Caliptra ROM ...
3,310,166 UART:
3,310,221 UART: [state] CFI Enabled
3,312,683 UART: [state] LifecycleState = Unprovisioned
3,313,338 UART: [state] DebugLocked = No
3,313,984 UART: [state] WD Timer not started. Device not locked for debugging
3,315,288 UART: [kat] SHA2-256
4,120,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,063 UART: [kat] ++
4,125,215 UART: [kat] sha1
4,129,327 UART: [kat] SHA2-256
4,131,267 UART: [kat] SHA2-384
4,133,976 UART: [kat] SHA2-512-ACC
4,135,876 UART: [kat] ECC-384
4,145,591 UART: [kat] HMAC-384Kdf
4,150,277 UART: [kat] LMS
4,398,605 UART: [kat] --
4,399,517 UART: [update-reset] ++
5,304,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,918 >>> mbox cmd response: success
5,401,918 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,197 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,211 UART: [update-reset Success] --
5,411,230 UART: [state] Locking Datavault
5,411,988 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,592 UART: [state] Locking ICCM
5,413,066 UART: [exit] Launching FMC @ 0x40000130
5,418,395 UART:
5,418,411 UART: Running Caliptra FMC ...
5,418,819 UART:
5,418,873 UART: [state] CFI Enabled
5,508,144 UART: [art] Extend RT PCRs Done
5,508,572 UART: [art] Lock RT PCRs Done
5,509,821 UART: [art] Populate DV Done
5,518,324 UART: [fht] FMC Alias Private Key: 7
5,519,376 UART: [art] Derive CDI
5,519,656 UART: [art] Store in in slot 0x4
5,605,281 UART: [art] Derive Key Pair
5,605,641 UART: [art] Store priv key in slot 0x5
5,618,883 UART: [art] Derive Key Pair - Done
5,633,727 UART: [art] Signing Cert with AUTHO
5,634,207 UART: RITY.KEYID = 7
5,649,225 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,990 UART: [art] PUB.X = FE2CC0BCC5A777940506F542821A573ACA5B8749339DCCE994C8B53822EA140BBD9DCF837F3F80C9C47A01848632031C
5,656,751 UART: [art] PUB.Y = 4AEAF736AE519B31E706F2AB86949E3B884DEC06812A30F6C456FEA544F53C283E17DEB495BA852008CD6FE27EDD6508
5,663,701 UART: [art] SIG.R = DA29459A931D507DC2193837BEAC0C6778259B0AF2E7DF96F3899626A8143E4A3E4AA24E614E16CFD39080456740C92E
5,670,465 UART: [art] SIG.S = 5690A721516B6F19AC8F9BA28CB936D3D096A6A073BA5901CF0F215DF9331F14FDDFD024DE846A14BFB45603C7ADE506
5,694,572 UART: mbox::rt_entry...
5,694,944 UART: ____ _ _ _ ____ _____
5,695,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,696,528 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,296 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,698,832 UART: |_|
5,699,144 UART:
5,979,726 UART: [rt] Runtime listening for mailbox commands...
5,980,963 >>> mbox cmd response data (120 bytes)
5,980,964 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,075 UART:
5,981,091 UART: Running Caliptra ROM ...
5,981,499 UART:
5,981,554 UART: [state] CFI Enabled
5,984,118 UART: [state] LifecycleState = Unprovisioned
5,984,773 UART: [state] DebugLocked = No
5,985,441 UART: [state] WD Timer not started. Device not locked for debugging
5,986,763 UART: [kat] SHA2-256
6,792,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,796,538 UART: [kat] ++
6,796,690 UART: [kat] sha1
6,800,952 UART: [kat] SHA2-256
6,802,892 UART: [kat] SHA2-384
6,805,803 UART: [kat] SHA2-512-ACC
6,807,703 UART: [kat] ECC-384
6,817,600 UART: [kat] HMAC-384Kdf
6,822,146 UART: [kat] LMS
7,070,474 UART: [kat] --
7,071,386 UART: [update-reset] ++
7,975,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,976,755 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,073,137 >>> mbox cmd response: success
8,073,137 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,073,284 UART: [update-reset] Copying MAN_2 To MAN_1
8,081,298 UART: [update-reset Success] --
8,082,309 UART: [state] Locking Datavault
8,083,209 UART: [state] Locking PCR0, PCR1 and PCR31
8,083,813 UART: [state] Locking ICCM
8,084,415 UART: [exit] Launching FMC @ 0x40000130
8,089,744 UART:
8,089,760 UART: Running Caliptra FMC ...
8,090,168 UART:
8,090,222 UART: [state] CFI Enabled
8,179,103 UART: [art] Extend RT PCRs Done
8,179,531 UART: [art] Lock RT PCRs Done
8,180,778 UART: [art] Populate DV Done
8,189,111 UART: [fht] FMC Alias Private Key: 7
8,190,185 UART: [art] Derive CDI
8,190,465 UART: [art] Store in in slot 0x4
8,276,438 UART: [art] Derive Key Pair
8,276,798 UART: [art] Store priv key in slot 0x5
8,290,488 UART: [art] Derive Key Pair - Done
8,305,462 UART: [art] Signing Cert with AUTHO
8,305,942 UART: RITY.KEYID = 7
8,321,432 UART: [art] Erasing AUTHORITY.KEYID = 7
8,322,197 UART: [art] PUB.X = 9D4F82F1586E3A13F4962E1E72E8FE5CF0FBFA215D3E99B0A50BC3EE87B13FCB7EB9503C3CAF81619A10CF0DE9CC6DEA
8,328,989 UART: [art] PUB.Y = CFF649A47359859AD69A9C86BDE7FB4D705F3E0C438BA7FF2E556DC3C5992124A3D764F86C3A4F6329760EEA72CB707A
8,335,945 UART: [art] SIG.R = 14624C162D278B351B1DE8A766839CEE2E9F0C3D8C12CBEA60253378C09990BE5D6F8AEE6F592B76ADE37FA42A36672A
8,342,722 UART: [art] SIG.S = 8B20E32E834E3DC4C9A656854899695F46B5D9C62BA0F71663B5FFC08F9A0ADE4D86EFF5BD09F16D12B41D8383F42A9F
8,367,051 UART: mbox::rt_entry...
8,367,423 UART: ____ _ _ _ ____ _____
8,368,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,369,007 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,311 UART: |_|
8,371,623 UART:
8,653,493 UART: [rt] Runtime listening for mailbox commands...
8,654,730 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,647 ready_for_fw is high
1,059,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,875 >>> mbox cmd response: success
2,689,235 UART:
2,689,251 UART: Running Caliptra FMC ...
2,689,659 UART:
2,689,713 UART: [state] CFI Enabled
2,700,674 UART: [fht] FMC Alias Private Key: 7
2,809,125 UART: [art] Extend RT PCRs Done
2,809,553 UART: [art] Lock RT PCRs Done
2,810,693 UART: [art] Populate DV Done
2,818,880 UART: [fht] FMC Alias Private Key: 7
2,819,842 UART: [art] Derive CDI
2,820,122 UART: [art] Store in in slot 0x4
2,906,037 UART: [art] Derive Key Pair
2,906,397 UART: [art] Store priv key in slot 0x5
2,920,031 UART: [art] Derive Key Pair - Done
2,934,755 UART: [art] Signing Cert with AUTHO
2,935,235 UART: RITY.KEYID = 7
2,950,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,814 UART: [art] PUB.X = 1C940F4FEAEF0793E6A83FAF073444862B80E14A03CB05641815E3B568DBA5C6E948E7D1E18F4B427F01FFE6C5B663AE
2,957,578 UART: [art] PUB.Y = DFF0F7EFCA2D4FA5D573ED1B785983961DD21620C580487E524114993A5BEE43AF4A2D573AF50775BC517E066B863D06
2,964,525 UART: [art] SIG.R = 78133C60DD386C5F8FCB144A802A24977459072CFD614DCC404901F66A70AED7A49DE819AD913A7FA0FAF5B08C52DAE6
2,971,301 UART: [art] SIG.S = 3E9B64079E32883C551482DEE2A71426FAEB3CEE8CE322B21B6CB8BA0DCAE2C02C4E9577F0814F61717E7AA8C2A5E6BB
2,995,244 UART: Caliptra RT
2,995,497 UART: [state] CFI Enabled
3,101,996 UART: [rt] RT listening for mailbox commands...
3,102,666 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,886 UART: [rt]cmd =0x54514754, len=24
3,134,936 >>> mbox cmd response data (8 bytes)
3,134,937 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,112,195 >>> mbox cmd response: success
5,112,195 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,125,415 UART:
5,125,431 UART: Running Caliptra FMC ...
5,125,839 UART:
5,125,893 UART: [state] CFI Enabled
5,214,474 UART: [art] Extend RT PCRs Done
5,214,902 UART: [art] Lock RT PCRs Done
5,216,267 UART: [art] Populate DV Done
5,224,450 UART: [fht] FMC Alias Private Key: 7
5,225,544 UART: [art] Derive CDI
5,225,824 UART: [art] Store in in slot 0x4
5,311,473 UART: [art] Derive Key Pair
5,311,833 UART: [art] Store priv key in slot 0x5
5,324,743 UART: [art] Derive Key Pair - Done
5,339,510 UART: [art] Signing Cert with AUTHO
5,339,990 UART: RITY.KEYID = 7
5,355,184 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,949 UART: [art] PUB.X = 20A1F4F401E9AE9D98636B1FBCA7BE1C65DF845BCBBA8F7BC57CFBE5DB56C279645BB9E294A2D810483E7F04427B1B3C
5,362,735 UART: [art] PUB.Y = 0335D24B785E8B7DDF477A037C6CE2A6B7E27B81A30A6699A7D4F87B4384584129A9DBB9623BD3D89969C4E6D9E6DAF9
5,369,684 UART: [art] SIG.R = 349DE1F1F746258A2F2E2215ECF117EB265E7A4252F1497EF5268CC82FA69B364078ADFB9121397FA7EB478BEAF40F1A
5,376,461 UART: [art] SIG.S = E40905FDACADB921436D2F989286D9467F235B33EF8555A2C0AB2981AADDBA76DA2D73885EE1B0655DCB8A8401525666
5,400,643 UART: mbox::rt_entry...
5,401,015 UART: ____ _ _ _ ____ _____
5,401,799 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,599 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,367 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,135 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,404,903 UART: |_|
5,405,215 UART:
5,685,701 UART: [rt] Runtime listening for mailbox commands...
5,686,938 >>> mbox cmd response data (120 bytes)
5,686,939 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,662,707 >>> mbox cmd response: success
7,662,707 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,676,377 UART:
7,676,393 UART: Running Caliptra FMC ...
7,676,801 UART:
7,676,855 UART: [state] CFI Enabled
7,766,492 UART: [art] Extend RT PCRs Done
7,766,920 UART: [art] Lock RT PCRs Done
7,768,065 UART: [art] Populate DV Done
7,776,554 UART: [fht] FMC Alias Private Key: 7
7,777,734 UART: [art] Derive CDI
7,778,014 UART: [art] Store in in slot 0x4
7,863,669 UART: [art] Derive Key Pair
7,864,029 UART: [art] Store priv key in slot 0x5
7,877,463 UART: [art] Derive Key Pair - Done
7,892,328 UART: [art] Signing Cert with AUTHO
7,892,808 UART: RITY.KEYID = 7
7,908,408 UART: [art] Erasing AUTHORITY.KEYID = 7
7,909,173 UART: [art] PUB.X = 2559C537F224E73220864C23D8441FBD6D776D182281FBE16D63A498D406A7782FF0C0977487A164362C2BE2639533F6
7,915,928 UART: [art] PUB.Y = D242E54C7CD0FAC9BD21C6CAD1E831A1908FD6F20E55E6DA7A91AD68319993BDE3E17D25EFE914C039EA132E2758E22D
7,922,893 UART: [art] SIG.R = B6694F76CF1FB7B3AD8DA7FBFB1266F702D3FA83CA2E3014887292D0FCDA8F136BFC17AE000FB1076DBE66472BB7877A
7,929,652 UART: [art] SIG.S = F691C26E16B146FD2515E899719641ED670F2706A7CCBBD57B290F86B0987B88C258E548E4F2F6D12883719EB394499D
7,953,426 UART: mbox::rt_entry...
7,953,798 UART: ____ _ _ _ ____ _____
7,954,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,955,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,956,150 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,956,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,957,686 UART: |_|
7,957,998 UART:
8,241,295 UART: [rt] Runtime listening for mailbox commands...
8,242,532 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,049 UART: [kat] HMAC-384Kdf
922,785 UART: [kat] LMS
1,171,113 UART: [kat] --
1,172,158 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 ready_for_fw is high
1,176,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,200,770 UART: [idev] Sha1 KeyId Algorithm
1,209,260 UART: [idev] --
1,210,434 UART: [ldev] ++
1,210,602 UART: [ldev] CDI.KEYID = 6
1,210,965 UART: [ldev] SUBJECT.KEYID = 5
1,211,391 UART: [ldev] AUTHORITY.KEYID = 7
1,211,854 UART: [ldev] FE.KEYID = 1
1,217,178 UART: [ldev] Erasing FE.KEYID = 1
1,243,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,526 UART: [ldev] --
1,282,851 UART: [fwproc] Wait for Commands...
1,283,455 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,239 >>> mbox cmd response: success
2,777,335 UART: [afmc] ++
2,777,503 UART: [afmc] CDI.KEYID = 6
2,777,865 UART: [afmc] SUBJECT.KEYID = 7
2,778,290 UART: [afmc] AUTHORITY.KEYID = 5
2,814,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,506 UART: [afmc] --
2,858,490 UART: [cold-reset] --
2,859,312 UART: [state] Locking Datavault
2,860,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,019 UART: [state] Locking ICCM
2,861,581 UART: [exit] Launching FMC @ 0x40000130
2,866,910 UART:
2,866,926 UART: Running Caliptra FMC ...
2,867,334 UART:
2,867,477 UART: [state] CFI Enabled
2,878,354 UART: [fht] FMC Alias Private Key: 7
2,985,727 UART: [art] Extend RT PCRs Done
2,986,155 UART: [art] Lock RT PCRs Done
2,987,371 UART: [art] Populate DV Done
2,995,578 UART: [fht] FMC Alias Private Key: 7
2,996,728 UART: [art] Derive CDI
2,997,008 UART: [art] Store in in slot 0x4
3,082,725 UART: [art] Derive Key Pair
3,083,085 UART: [art] Store priv key in slot 0x5
3,096,369 UART: [art] Derive Key Pair - Done
3,110,979 UART: [art] Signing Cert with AUTHO
3,111,459 UART: RITY.KEYID = 7
3,126,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,042 UART: [art] PUB.X = 94E5122BDCD7AE3B42DFCC6E408D0D778F5BA2BAE65C8053202BF54EDE623F9092AA9C4B515C6105206EEB9DC8608AE8
3,133,824 UART: [art] PUB.Y = 6FF96CCA53366A95A1DB01B071FA2FAC5173CDB3D9B47BE025C3290BFE72043BC26DEEFBB5112060FAD959D65A13504D
3,140,783 UART: [art] SIG.R = DAE1C4BFE89290BE0C813342C83F460736F4DB41FE92591B179928CA9CD1187DEA477FE64DDF83F1C83DEA3406194307
3,147,549 UART: [art] SIG.S = 6EDFB37E54F9E3E24C1937380C1FD3F6D693473375B0E155D6F239AB8D3A63686406271D78B26246DA0F4B61B5E9F7CD
3,171,627 UART: Caliptra RT
3,171,972 UART: [state] CFI Enabled
3,279,445 UART: [rt] RT listening for mailbox commands...
3,280,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,075 UART: [rt]cmd =0x54514754, len=24
3,312,057 >>> mbox cmd response data (8 bytes)
3,312,058 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,851 UART:
3,312,867 UART: Running Caliptra ROM ...
3,313,275 UART:
3,313,417 UART: [state] CFI Enabled
3,316,739 UART: [state] LifecycleState = Unprovisioned
3,317,394 UART: [state] DebugLocked = No
3,317,878 UART: [state] WD Timer not started. Device not locked for debugging
3,319,148 UART: [kat] SHA2-256
4,124,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,128,923 UART: [kat] ++
4,129,075 UART: [kat] sha1
4,133,185 UART: [kat] SHA2-256
4,135,125 UART: [kat] SHA2-384
4,137,802 UART: [kat] SHA2-512-ACC
4,139,702 UART: [kat] ECC-384
4,149,243 UART: [kat] HMAC-384Kdf
4,153,833 UART: [kat] LMS
4,402,161 UART: [kat] --
4,403,243 UART: [update-reset] ++
5,308,347 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,309,542 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,405,924 >>> mbox cmd response: success
5,405,924 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,406,055 UART: [update-reset] Copying MAN_2 To MAN_1
5,414,069 UART: [update-reset Success] --
5,415,024 UART: [state] Locking Datavault
5,415,776 UART: [state] Locking PCR0, PCR1 and PCR31
5,416,380 UART: [state] Locking ICCM
5,416,856 UART: [exit] Launching FMC @ 0x40000130
5,422,185 UART:
5,422,201 UART: Running Caliptra FMC ...
5,422,609 UART:
5,422,752 UART: [state] CFI Enabled
5,511,527 UART: [art] Extend RT PCRs Done
5,511,955 UART: [art] Lock RT PCRs Done
5,513,374 UART: [art] Populate DV Done
5,521,725 UART: [fht] FMC Alias Private Key: 7
5,522,877 UART: [art] Derive CDI
5,523,157 UART: [art] Store in in slot 0x4
5,608,876 UART: [art] Derive Key Pair
5,609,236 UART: [art] Store priv key in slot 0x5
5,622,624 UART: [art] Derive Key Pair - Done
5,637,234 UART: [art] Signing Cert with AUTHO
5,637,714 UART: RITY.KEYID = 7
5,653,020 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,785 UART: [art] PUB.X = 9A80061A74945262FF1085D42375CEDD0C7269A1E6A8A9D7B3AA546387A421E03B59B41B7F1D4C7A16BA30FF69D6C9CF
5,660,557 UART: [art] PUB.Y = D15C38FD1A6D7FAA963F0F5C2E0CBB7A0D873AEE330081E98DB2620DB75B90BC62D08A0238C07A9D8D639E34C11FBB0F
5,667,487 UART: [art] SIG.R = 0D82B8C52EF42B266D1361BB6F1FF20634539031F0E819F3F12B69878D2E38A0D300AE74510704D074EBE6CBAD9F6A30
5,674,227 UART: [art] SIG.S = 47F00E8BF1AE01AEB7BE199ADF0F09C08FC8F120ABE031D44122E3C940167200415CB8CE944495A7BA678B8718F467BB
5,698,070 UART: mbox::rt_entry...
5,698,442 UART: ____ _ _ _ ____ _____
5,699,226 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,700,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,700,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,701,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,702,330 UART: |_|
5,702,642 UART:
5,982,412 UART: [rt] Runtime listening for mailbox commands...
5,983,649 >>> mbox cmd response data (120 bytes)
5,983,650 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,983,761 UART:
5,983,777 UART: Running Caliptra ROM ...
5,984,185 UART:
5,984,327 UART: [state] CFI Enabled
5,986,463 UART: [state] LifecycleState = Unprovisioned
5,987,118 UART: [state] DebugLocked = No
5,987,640 UART: [state] WD Timer not started. Device not locked for debugging
5,988,784 UART: [kat] SHA2-256
6,794,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,798,559 UART: [kat] ++
6,798,711 UART: [kat] sha1
6,802,889 UART: [kat] SHA2-256
6,804,829 UART: [kat] SHA2-384
6,807,638 UART: [kat] SHA2-512-ACC
6,809,538 UART: [kat] ECC-384
6,819,049 UART: [kat] HMAC-384Kdf
6,823,863 UART: [kat] LMS
7,072,191 UART: [kat] --
7,073,043 UART: [update-reset] ++
7,977,537 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,978,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,075,040 >>> mbox cmd response: success
8,075,040 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,075,185 UART: [update-reset] Copying MAN_2 To MAN_1
8,083,199 UART: [update-reset Success] --
8,084,020 UART: [state] Locking Datavault
8,084,836 UART: [state] Locking PCR0, PCR1 and PCR31
8,085,440 UART: [state] Locking ICCM
8,085,948 UART: [exit] Launching FMC @ 0x40000130
8,091,277 UART:
8,091,293 UART: Running Caliptra FMC ...
8,091,701 UART:
8,091,844 UART: [state] CFI Enabled
8,181,077 UART: [art] Extend RT PCRs Done
8,181,505 UART: [art] Lock RT PCRs Done
8,182,638 UART: [art] Populate DV Done
8,190,875 UART: [fht] FMC Alias Private Key: 7
8,192,041 UART: [art] Derive CDI
8,192,321 UART: [art] Store in in slot 0x4
8,277,956 UART: [art] Derive Key Pair
8,278,316 UART: [art] Store priv key in slot 0x5
8,291,902 UART: [art] Derive Key Pair - Done
8,306,750 UART: [art] Signing Cert with AUTHO
8,307,230 UART: RITY.KEYID = 7
8,322,674 UART: [art] Erasing AUTHORITY.KEYID = 7
8,323,439 UART: [art] PUB.X = 31DADAA6CD1E96528D09268C22C9434704AF6E7ED0371FE3F8946F262486DBB9019775A1246D9D3011CD025495F56370
8,330,193 UART: [art] PUB.Y = 2843F71BBB1F14B76A1ABC42755297EAE5337563FC54EAF0396473864CF0B6C8F52CC8BDFAD9A737BDFFFA229A402126
8,337,157 UART: [art] SIG.R = 2E7A7F8BB60B25384F9065EFD70776C6F6E05D459A8F5FFECA8AD0E66B2605DF19B6B706AFE7AA86898FC06AB852BFB0
8,343,935 UART: [art] SIG.S = 5E07D5B74EB5F9496366FD441AD5AA9C3AA202A6D16E68447E65D417F6518D2FAC9BD905CFCBCE7B061A0B3F24E9B6C9
8,368,427 UART: mbox::rt_entry...
8,368,799 UART: ____ _ _ _ ____ _____
8,369,583 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,370,383 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,371,151 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,371,919 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,372,687 UART: |_|
8,372,999 UART:
8,654,601 UART: [rt] Runtime listening for mailbox commands...
8,655,838 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 ready_for_fw is high
1,060,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,918 >>> mbox cmd response: success
2,690,566 UART:
2,690,582 UART: Running Caliptra FMC ...
2,690,990 UART:
2,691,133 UART: [state] CFI Enabled
2,701,884 UART: [fht] FMC Alias Private Key: 7
2,809,805 UART: [art] Extend RT PCRs Done
2,810,233 UART: [art] Lock RT PCRs Done
2,811,539 UART: [art] Populate DV Done
2,819,558 UART: [fht] FMC Alias Private Key: 7
2,820,634 UART: [art] Derive CDI
2,820,914 UART: [art] Store in in slot 0x4
2,906,523 UART: [art] Derive Key Pair
2,906,883 UART: [art] Store priv key in slot 0x5
2,919,917 UART: [art] Derive Key Pair - Done
2,934,782 UART: [art] Signing Cert with AUTHO
2,935,262 UART: RITY.KEYID = 7
2,950,284 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,049 UART: [art] PUB.X = F95C682833770AF6F0025748EB2AD9A637F5D56AE353A4B769615466A726103F36CE994A6F733C38C9035D7572B4840E
2,957,799 UART: [art] PUB.Y = 1706FE356363BCF61BE45F5F899A8345B7DF16646D49034FC3193F6F61DA937368230C0E15E95F7F5EBDA56BF1AE279B
2,964,743 UART: [art] SIG.R = BDF275BE36FAA8D3A70234001FE54B14A128E972552753A8AE2223BE6F9FB2BC4A756331DA5AF4FAC42562562C9CCA98
2,971,500 UART: [art] SIG.S = C07FEBC3E3390314C284B577BB4999B7C43EAC826DCDDE4A4C523A30D1773344175DBF4EF2FC5ABEB9B03DB113634EAA
2,995,418 UART: Caliptra RT
2,995,763 UART: [state] CFI Enabled
3,102,953 UART: [rt] RT listening for mailbox commands...
3,103,623 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,681 UART: [rt]cmd =0x54514754, len=24
3,136,029 >>> mbox cmd response data (8 bytes)
3,136,030 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,113,611 >>> mbox cmd response: success
5,113,611 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,126,921 UART:
5,126,937 UART: Running Caliptra FMC ...
5,127,345 UART:
5,127,488 UART: [state] CFI Enabled
5,216,831 UART: [art] Extend RT PCRs Done
5,217,259 UART: [art] Lock RT PCRs Done
5,218,412 UART: [art] Populate DV Done
5,226,795 UART: [fht] FMC Alias Private Key: 7
5,227,911 UART: [art] Derive CDI
5,228,191 UART: [art] Store in in slot 0x4
5,314,250 UART: [art] Derive Key Pair
5,314,610 UART: [art] Store priv key in slot 0x5
5,327,804 UART: [art] Derive Key Pair - Done
5,342,354 UART: [art] Signing Cert with AUTHO
5,342,834 UART: RITY.KEYID = 7
5,358,002 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,767 UART: [art] PUB.X = 1D9BA5B276F915124C4482F65D05C9B013424A78F1EF2F8B5BE5DBB0DF681FB7C939132B85ABFEB9517E34A180F81E72
5,365,544 UART: [art] PUB.Y = BE9B0127F4347C7C17E55D0C70F51E86BFA10D7A24ED9EC5CC38C5B576596D09193329688354B5CAFE56732E50C01B17
5,372,486 UART: [art] SIG.R = F3A628531D661857A0A3C95CD8DEBA0D672DDDB5DFA966563B2D6E8F2CA8C0FC51ADFB65E47131606F4BBE747F1857B6
5,379,271 UART: [art] SIG.S = 3B797FC0F530293726EA13478D039B407A0C3E669B19C0F03816D47AC5BFF0227D6D47FDA4D7323713033EA7302FA1EE
5,402,869 UART: mbox::rt_entry...
5,403,241 UART: ____ _ _ _ ____ _____
5,404,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,404,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,405,593 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,406,361 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,407,129 UART: |_|
5,407,441 UART:
5,689,863 UART: [rt] Runtime listening for mailbox commands...
5,691,100 >>> mbox cmd response data (120 bytes)
5,691,101 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,667,398 >>> mbox cmd response: success
7,667,398 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,680,760 UART:
7,680,776 UART: Running Caliptra FMC ...
7,681,184 UART:
7,681,327 UART: [state] CFI Enabled
7,770,578 UART: [art] Extend RT PCRs Done
7,771,006 UART: [art] Lock RT PCRs Done
7,772,293 UART: [art] Populate DV Done
7,780,660 UART: [fht] FMC Alias Private Key: 7
7,781,734 UART: [art] Derive CDI
7,782,014 UART: [art] Store in in slot 0x4
7,867,811 UART: [art] Derive Key Pair
7,868,171 UART: [art] Store priv key in slot 0x5
7,881,121 UART: [art] Derive Key Pair - Done
7,895,670 UART: [art] Signing Cert with AUTHO
7,896,150 UART: RITY.KEYID = 7
7,911,290 UART: [art] Erasing AUTHORITY.KEYID = 7
7,912,055 UART: [art] PUB.X = 1434887B85B31203124A7326B3F2CC38526444D2B2FA36B53BE03C4012FDB1B5FED8C5C916CF52BA331B0693F2C1A536
7,918,821 UART: [art] PUB.Y = 6A316841547DDFB2DFB65341BF2BBA0E9D984A396109139CA513CEAEF2B2D9BA4721F4565B70EB0B3ADAE944780302E9
7,925,768 UART: [art] SIG.R = 694FF7D60F79AFB6991E9C81F9728643031636967CCD55EDB8D727B5EE2E1072ED69ADC4C071170793B682D2825F1311
7,932,527 UART: [art] SIG.S = DA1E41BBB3B1C1A31F7062E83C9594E34B2B338B932D4FFFFCB030AB7315273B110987C8E7AFDB91E764B953C03C394E
7,956,721 UART: mbox::rt_entry...
7,957,093 UART: ____ _ _ _ ____ _____
7,957,877 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,958,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,959,445 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,213 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,960,981 UART: |_|
7,961,293 UART:
8,243,153 UART: [rt] Runtime listening for mailbox commands...
8,244,390 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 ready_for_fw is high
1,174,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,402 UART: [ldev] Erasing FE.KEYID = 1
1,242,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,936 >>> mbox cmd response: success
2,775,177 UART: [afmc] ++
2,775,345 UART: [afmc] CDI.KEYID = 6
2,775,708 UART: [afmc] SUBJECT.KEYID = 7
2,776,134 UART: [afmc] AUTHORITY.KEYID = 5
2,811,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,924 UART: [afmc] --
2,855,006 UART: [cold-reset] --
2,855,998 UART: [state] Locking Datavault
2,857,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,785 UART: [state] Locking ICCM
2,858,445 UART: [exit] Launching FMC @ 0x40000130
2,863,774 UART:
2,863,790 UART: Running Caliptra FMC ...
2,864,198 UART:
2,864,252 UART: [state] CFI Enabled
2,874,595 UART: [fht] FMC Alias Private Key: 7
2,982,514 UART: [art] Extend RT PCRs Done
2,982,942 UART: [art] Lock RT PCRs Done
2,984,626 UART: [art] Populate DV Done
2,992,663 UART: [fht] FMC Alias Private Key: 7
2,993,661 UART: [art] Derive CDI
2,993,941 UART: [art] Store in in slot 0x4
3,079,654 UART: [art] Derive Key Pair
3,080,014 UART: [art] Store priv key in slot 0x5
3,093,290 UART: [art] Derive Key Pair - Done
3,108,429 UART: [art] Signing Cert with AUTHO
3,108,909 UART: RITY.KEYID = 7
3,124,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,826 UART: [art] PUB.X = A22ADB88578FBCB36DF028936FEAB60FB27C15866B4BD86AF78ADD986733EF39EB921FD68149A9A6A0F6AC1AE3F77F91
3,131,613 UART: [art] PUB.Y = 4C3EE226FE80D3E9BD95AA149FB65A6640EF98E776CE5D1CF48C3932E462B1504C973725D666955FF3934B7C4B088ADC
3,138,568 UART: [art] SIG.R = 9CCB6B8A316B97A9618C8E891D962A334465199B702AC4274063C9826482567509C37EB35925385DCD3C473AAD7715E4
3,145,325 UART: [art] SIG.S = F3E21174CE195DD991389206F5149172199F75F9D4EDD6995D219EA4F7D49D1CED0C19EB483786588CBAA4D432D025C1
3,169,478 UART: Caliptra RT
3,169,731 UART: [state] CFI Enabled
3,277,535 UART: [rt] RT listening for mailbox commands...
3,278,205 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,149 UART: [rt]cmd =0x54514754, len=24
3,309,981 >>> mbox cmd response data (8 bytes)
3,309,982 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,731 UART:
3,310,747 UART: Running Caliptra ROM ...
3,311,155 UART:
3,311,210 UART: [state] CFI Enabled
3,314,122 UART: [state] LifecycleState = Unprovisioned
3,314,777 UART: [state] DebugLocked = No
3,315,265 UART: [state] WD Timer not started. Device not locked for debugging
3,316,517 UART: [kat] SHA2-256
4,120,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,196 UART: [kat] ++
4,124,348 UART: [kat] sha1
4,128,646 UART: [kat] SHA2-256
4,130,586 UART: [kat] SHA2-384
4,133,377 UART: [kat] SHA2-512-ACC
4,135,277 UART: [kat] ECC-384
4,145,268 UART: [kat] HMAC-384Kdf
4,149,920 UART: [kat] LMS
4,398,232 UART: [kat] --
4,399,028 UART: [update-reset] ++
5,302,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,728 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,400,110 >>> mbox cmd response: success
5,400,110 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,400,359 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,373 UART: [update-reset Success] --
5,409,424 UART: [state] Locking Datavault
5,410,320 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,924 UART: [state] Locking ICCM
5,411,442 UART: [exit] Launching FMC @ 0x40000130
5,416,771 UART:
5,416,787 UART: Running Caliptra FMC ...
5,417,195 UART:
5,417,249 UART: [state] CFI Enabled
5,505,708 UART: [art] Extend RT PCRs Done
5,506,136 UART: [art] Lock RT PCRs Done
5,507,331 UART: [art] Populate DV Done
5,515,280 UART: [fht] FMC Alias Private Key: 7
5,516,422 UART: [art] Derive CDI
5,516,702 UART: [art] Store in in slot 0x4
5,602,521 UART: [art] Derive Key Pair
5,602,881 UART: [art] Store priv key in slot 0x5
5,615,993 UART: [art] Derive Key Pair - Done
5,630,627 UART: [art] Signing Cert with AUTHO
5,631,107 UART: RITY.KEYID = 7
5,646,365 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,130 UART: [art] PUB.X = E5DE1398A8E56815E552AF7D363512CE37F5120370FAED1A1692C3A88127C281B5FA91CA0B9FF6C08357EDB15618932A
5,653,898 UART: [art] PUB.Y = 82B722CE9F279C7069036A6C6F432ED89D4115D8FAA0D0D86E114BF3DC33191577EEC5732C3A89A47B22D6A74AAE4AF8
5,660,855 UART: [art] SIG.R = 2F864FB12B3B5C90CB51FE8AD588BB8FA645CC532558B26ECBEA0DC1E381958C635A9955FBB4C2D64C3BE171139743CC
5,667,638 UART: [art] SIG.S = C673504D105C58FADBDC73640AE13FB8C2E2148E15439601D76C6D002209C5849E13667C73F669BE88717B6715831716
5,691,452 UART: mbox::rt_entry...
5,691,824 UART: ____ _ _ _ ____ _____
5,692,608 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,408 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,176 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,944 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,712 UART: |_|
5,696,024 UART:
5,980,428 UART: [rt] Runtime listening for mailbox commands...
5,981,665 >>> mbox cmd response data (120 bytes)
5,981,666 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,777 UART:
5,981,793 UART: Running Caliptra ROM ...
5,982,201 UART:
5,982,256 UART: [state] CFI Enabled
5,984,598 UART: [state] LifecycleState = Unprovisioned
5,985,253 UART: [state] DebugLocked = No
5,985,961 UART: [state] WD Timer not started. Device not locked for debugging
5,987,109 UART: [kat] SHA2-256
6,790,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,788 UART: [kat] ++
6,794,940 UART: [kat] sha1
6,799,086 UART: [kat] SHA2-256
6,801,026 UART: [kat] SHA2-384
6,803,631 UART: [kat] SHA2-512-ACC
6,805,531 UART: [kat] ECC-384
6,815,468 UART: [kat] HMAC-384Kdf
6,820,210 UART: [kat] LMS
7,068,522 UART: [kat] --
7,069,448 UART: [update-reset] ++
7,973,237 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,974,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,070,690 >>> mbox cmd response: success
8,070,690 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,070,971 UART: [update-reset] Copying MAN_2 To MAN_1
8,078,985 UART: [update-reset Success] --
8,080,126 UART: [state] Locking Datavault
8,080,862 UART: [state] Locking PCR0, PCR1 and PCR31
8,081,466 UART: [state] Locking ICCM
8,082,092 UART: [exit] Launching FMC @ 0x40000130
8,087,421 UART:
8,087,437 UART: Running Caliptra FMC ...
8,087,845 UART:
8,087,899 UART: [state] CFI Enabled
8,176,474 UART: [art] Extend RT PCRs Done
8,176,902 UART: [art] Lock RT PCRs Done
8,178,223 UART: [art] Populate DV Done
8,186,428 UART: [fht] FMC Alias Private Key: 7
8,187,470 UART: [art] Derive CDI
8,187,750 UART: [art] Store in in slot 0x4
8,273,089 UART: [art] Derive Key Pair
8,273,449 UART: [art] Store priv key in slot 0x5
8,286,569 UART: [art] Derive Key Pair - Done
8,301,329 UART: [art] Signing Cert with AUTHO
8,301,809 UART: RITY.KEYID = 7
8,316,595 UART: [art] Erasing AUTHORITY.KEYID = 7
8,317,360 UART: [art] PUB.X = D21A6C95389EED77D4D2B07AADB5A2009B4E307127D27499DA4CDB1EE7887087BCAE47FB97C1806FF1F7F41B10C5BB46
8,324,124 UART: [art] PUB.Y = 9C688F164ED057BBDCC955D37ED449C640AB14C3FBFABBE52BDC1A4E2CA8C2933DD8BF553556DC93AAF02411ECA3FEC0
8,331,104 UART: [art] SIG.R = A207CD53BE2950332D871B38947289997F7ED7746F178E8722C8BF5BE483DF6C2087BB1AE3C98D7E8A7D2EA576338A0F
8,337,872 UART: [art] SIG.S = 6DC6CD17239E73C67D01D86D6B2E5B4BE5ED901A3A11823E85C2A3DCA61EAE0C1F8CEE16FA5437D3C800285A88658C6E
8,361,587 UART: mbox::rt_entry...
8,361,959 UART: ____ _ _ _ ____ _____
8,362,743 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,363,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,364,311 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,365,079 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,365,847 UART: |_|
8,366,159 UART:
8,643,969 UART: [rt] Runtime listening for mailbox commands...
8,645,206 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,302 ready_for_fw is high
1,056,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,478 >>> mbox cmd response: success
2,686,024 UART:
2,686,040 UART: Running Caliptra FMC ...
2,686,448 UART:
2,686,502 UART: [state] CFI Enabled
2,696,751 UART: [fht] FMC Alias Private Key: 7
2,804,490 UART: [art] Extend RT PCRs Done
2,804,918 UART: [art] Lock RT PCRs Done
2,806,498 UART: [art] Populate DV Done
2,814,709 UART: [fht] FMC Alias Private Key: 7
2,815,839 UART: [art] Derive CDI
2,816,119 UART: [art] Store in in slot 0x4
2,901,492 UART: [art] Derive Key Pair
2,901,852 UART: [art] Store priv key in slot 0x5
2,915,258 UART: [art] Derive Key Pair - Done
2,929,695 UART: [art] Signing Cert with AUTHO
2,930,175 UART: RITY.KEYID = 7
2,945,441 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,206 UART: [art] PUB.X = E83F29FA1B4A5C4F3343F5EF82624094158979963512E6F38E0ABEFA77B4C811D9425011C1682EE69922EDD95E72D8EB
2,952,975 UART: [art] PUB.Y = 1907FF6B12E0C4D5DACCFFDDBED33BD2BFA784B7B28891ABAB5F2A9510B9CDB3D7798345F9794619F48E1345CB728D3A
2,959,944 UART: [art] SIG.R = 7372DF58E03AB82CCC44115A56B32A6B29BC3247580D00DDF4BD8584E15E12CE5B8B4C5F3D6B347D245FF6041799E416
2,966,692 UART: [art] SIG.S = C941ED5641BA0ACB9A3745279C1E0EF829B0E1DA01833D1B3AABB3C92A381D3EF329634039CAC9BA9230498F12702171
2,990,978 UART: Caliptra RT
2,991,231 UART: [state] CFI Enabled
3,100,250 UART: [rt] RT listening for mailbox commands...
3,100,920 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,116 UART: [rt]cmd =0x54514754, len=24
3,133,542 >>> mbox cmd response data (8 bytes)
3,133,543 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,104,772 >>> mbox cmd response: success
5,104,772 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,118,558 UART:
5,118,574 UART: Running Caliptra FMC ...
5,118,982 UART:
5,119,036 UART: [state] CFI Enabled
5,208,073 UART: [art] Extend RT PCRs Done
5,208,501 UART: [art] Lock RT PCRs Done
5,209,690 UART: [art] Populate DV Done
5,217,915 UART: [fht] FMC Alias Private Key: 7
5,219,071 UART: [art] Derive CDI
5,219,351 UART: [art] Store in in slot 0x4
5,304,964 UART: [art] Derive Key Pair
5,305,324 UART: [art] Store priv key in slot 0x5
5,318,226 UART: [art] Derive Key Pair - Done
5,332,728 UART: [art] Signing Cert with AUTHO
5,333,208 UART: RITY.KEYID = 7
5,348,256 UART: [art] Erasing AUTHORITY.KEYID = 7
5,349,021 UART: [art] PUB.X = F95F930F3344578BC653B0F39CEBEB0BCF0EEFB4663780FC30CF78E5B64C83BD514A36266D19FDFFA84BA9252466EF02
5,355,795 UART: [art] PUB.Y = AC641A8915489ECDF206A8176AA023A87EB0EEC3CAE6AB787C621FDAA3930AFECB070C56C524B0746A68FBBE12D1F776
5,362,753 UART: [art] SIG.R = 4FEA0FEA15D5C3E5FE7171D764EBFDD04F1399CAB7F887F4BF32647D32D5D029ACE90A3EF88FFCF16B7C0B518166B80D
5,369,535 UART: [art] SIG.S = 634038B34865871CC6A69386672F67F5F6739F435F64FD1CC9BC7F3E74DBC203BED9C3C68FE140697E86A4950A6FE858
5,393,410 UART: mbox::rt_entry...
5,393,782 UART: ____ _ _ _ ____ _____
5,394,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,395,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,396,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,396,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,397,670 UART: |_|
5,397,982 UART:
5,679,540 UART: [rt] Runtime listening for mailbox commands...
5,680,777 >>> mbox cmd response data (120 bytes)
5,680,778 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,652,621 >>> mbox cmd response: success
7,652,621 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,666,243 UART:
7,666,259 UART: Running Caliptra FMC ...
7,666,667 UART:
7,666,721 UART: [state] CFI Enabled
7,755,738 UART: [art] Extend RT PCRs Done
7,756,166 UART: [art] Lock RT PCRs Done
7,757,465 UART: [art] Populate DV Done
7,765,992 UART: [fht] FMC Alias Private Key: 7
7,767,068 UART: [art] Derive CDI
7,767,348 UART: [art] Store in in slot 0x4
7,853,409 UART: [art] Derive Key Pair
7,853,769 UART: [art] Store priv key in slot 0x5
7,866,853 UART: [art] Derive Key Pair - Done
7,881,653 UART: [art] Signing Cert with AUTHO
7,882,133 UART: RITY.KEYID = 7
7,897,439 UART: [art] Erasing AUTHORITY.KEYID = 7
7,898,204 UART: [art] PUB.X = 0DA8DB172C198C43A69D88298ED1EB68182B7B780C24B032833D64FCC3F15001971F25ED16EF0040615C88369AEE70BD
7,904,945 UART: [art] PUB.Y = A612361F2AEBEDED5922B6A905F8DC621B8358BCED01AB4880DCE793C8ED732096AE1D0970637D9B9E8E869C8C5F33AA
7,911,902 UART: [art] SIG.R = CF61FC43AC171D30E66C7B04494F7F00A915B59BFF6EECE4644E6CF45E4B9A90FB878546EF4E8FF6BB7A03A4B6C65FB6
7,918,666 UART: [art] SIG.S = 1DB4C16AA16FD880C0B64E3BDDBEAAB4F3B729CD488CE5C448D830E67847DE83546CA1B91254233CFD92B2512220BA45
7,942,449 UART: mbox::rt_entry...
7,942,821 UART: ____ _ _ _ ____ _____
7,943,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,944,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,945,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,945,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,946,709 UART: |_|
7,947,021 UART:
8,228,109 UART: [rt] Runtime listening for mailbox commands...
8,229,346 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,976 UART: [kat] ++
896,128 UART: [kat] sha1
900,404 UART: [kat] SHA2-256
902,344 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,850 UART: [cold-reset] ++
1,171,196 UART: [fht] FHT @ 0x50003400
1,174,008 UART: [idev] ++
1,174,176 UART: [idev] CDI.KEYID = 6
1,174,537 UART: [idev] SUBJECT.KEYID = 7
1,174,962 UART: [idev] UDS.KEYID = 0
1,175,308 ready_for_fw is high
1,175,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,232 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,208,980 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,767 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,077 >>> mbox cmd response: success
2,776,250 UART: [afmc] ++
2,776,418 UART: [afmc] CDI.KEYID = 6
2,776,781 UART: [afmc] SUBJECT.KEYID = 7
2,777,207 UART: [afmc] AUTHORITY.KEYID = 5
2,812,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,085 UART: [afmc] --
2,856,003 UART: [cold-reset] --
2,857,023 UART: [state] Locking Datavault
2,858,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,704 UART: [state] Locking ICCM
2,859,322 UART: [exit] Launching FMC @ 0x40000130
2,864,651 UART:
2,864,667 UART: Running Caliptra FMC ...
2,865,075 UART:
2,865,218 UART: [state] CFI Enabled
2,876,361 UART: [fht] FMC Alias Private Key: 7
2,984,024 UART: [art] Extend RT PCRs Done
2,984,452 UART: [art] Lock RT PCRs Done
2,985,864 UART: [art] Populate DV Done
2,994,017 UART: [fht] FMC Alias Private Key: 7
2,995,039 UART: [art] Derive CDI
2,995,319 UART: [art] Store in in slot 0x4
3,081,062 UART: [art] Derive Key Pair
3,081,422 UART: [art] Store priv key in slot 0x5
3,094,830 UART: [art] Derive Key Pair - Done
3,109,738 UART: [art] Signing Cert with AUTHO
3,110,218 UART: RITY.KEYID = 7
3,125,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,031 UART: [art] PUB.X = 0681ED427223D188B2B3B69F4603BF8F7FE96BF057D35819F4550C162FDFA41643274AA6B2AB4F0BE6CFE7C5B81D33D8
3,132,799 UART: [art] PUB.Y = FEC79125F24FF1146A7D4B2A26D14A535E2A76E3AD10A0A293E4E1157615D672EEF4368B1010F8D5E6C814F5C555DB4A
3,139,757 UART: [art] SIG.R = C439A3C0D6D2EB8F9A25927C19492C52B0BAAFBC32C2614FE5B0E82EB234F539FFAC60607A7DCD5BFD21EFDED0C982F2
3,146,553 UART: [art] SIG.S = A90EDC0E0949FFE0F9D9B439C4180720639A20BF69737F9859AA5D32EFE658C42E0E966A99EE18860F5EC6B0E3DA5AFA
3,170,282 UART: Caliptra RT
3,170,627 UART: [state] CFI Enabled
3,278,347 UART: [rt] RT listening for mailbox commands...
3,279,017 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,693 UART: [rt]cmd =0x54514754, len=24
3,310,685 >>> mbox cmd response data (8 bytes)
3,310,686 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,483 UART:
3,311,499 UART: Running Caliptra ROM ...
3,311,907 UART:
3,312,049 UART: [state] CFI Enabled
3,314,873 UART: [state] LifecycleState = Unprovisioned
3,315,528 UART: [state] DebugLocked = No
3,316,234 UART: [state] WD Timer not started. Device not locked for debugging
3,317,438 UART: [kat] SHA2-256
4,120,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,117 UART: [kat] ++
4,125,269 UART: [kat] sha1
4,129,483 UART: [kat] SHA2-256
4,131,423 UART: [kat] SHA2-384
4,134,146 UART: [kat] SHA2-512-ACC
4,136,046 UART: [kat] ECC-384
4,146,067 UART: [kat] HMAC-384Kdf
4,150,923 UART: [kat] LMS
4,399,235 UART: [kat] --
4,400,233 UART: [update-reset] ++
5,304,956 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,123 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,505 >>> mbox cmd response: success
5,402,505 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,830 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,844 UART: [update-reset Success] --
5,411,849 UART: [state] Locking Datavault
5,412,737 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,341 UART: [state] Locking ICCM
5,413,911 UART: [exit] Launching FMC @ 0x40000130
5,419,240 UART:
5,419,256 UART: Running Caliptra FMC ...
5,419,664 UART:
5,419,807 UART: [state] CFI Enabled
5,509,118 UART: [art] Extend RT PCRs Done
5,509,546 UART: [art] Lock RT PCRs Done
5,511,083 UART: [art] Populate DV Done
5,519,668 UART: [fht] FMC Alias Private Key: 7
5,520,850 UART: [art] Derive CDI
5,521,130 UART: [art] Store in in slot 0x4
5,607,203 UART: [art] Derive Key Pair
5,607,563 UART: [art] Store priv key in slot 0x5
5,620,281 UART: [art] Derive Key Pair - Done
5,634,907 UART: [art] Signing Cert with AUTHO
5,635,387 UART: RITY.KEYID = 7
5,650,977 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,742 UART: [art] PUB.X = 1083645A7EB0E61A726A6302FCF3420C34E8E76281D84CFFFCABC513C5FD77778683626F728FB642D995903DB7E21783
5,658,506 UART: [art] PUB.Y = 38BF237DF8813E05C0806D1A60CE6917B3129177AB40BCB43864114934AB1BF8FB1A2D2028BA76471ED66C2B062A094C
5,665,449 UART: [art] SIG.R = 19BA458FD8E1E7AEA34719BCB0B5B55BA8D9879CFABC14A41CBBAA65F6B8F2F1B567A6A450672C9C2BB3BAAD4250BAF1
5,672,249 UART: [art] SIG.S = FD6CC3C2C4854D6391440B55D28E329A882AFEDCAE2B391EB3B107362B0A46CC7D771BE109A078D5218C2A402A6E51B2
5,695,622 UART: mbox::rt_entry...
5,695,994 UART: ____ _ _ _ ____ _____
5,696,778 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,578 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,346 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,114 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,882 UART: |_|
5,700,194 UART:
5,978,222 UART: [rt] Runtime listening for mailbox commands...
5,979,459 >>> mbox cmd response data (120 bytes)
5,979,460 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,979,571 UART:
5,979,587 UART: Running Caliptra ROM ...
5,979,995 UART:
5,980,137 UART: [state] CFI Enabled
5,982,961 UART: [state] LifecycleState = Unprovisioned
5,983,616 UART: [state] DebugLocked = No
5,984,194 UART: [state] WD Timer not started. Device not locked for debugging
5,985,378 UART: [kat] SHA2-256
6,788,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,793,057 UART: [kat] ++
6,793,209 UART: [kat] sha1
6,797,423 UART: [kat] SHA2-256
6,799,363 UART: [kat] SHA2-384
6,802,004 UART: [kat] SHA2-512-ACC
6,803,904 UART: [kat] ECC-384
6,813,593 UART: [kat] HMAC-384Kdf
6,818,439 UART: [kat] LMS
7,066,751 UART: [kat] --
7,067,719 UART: [update-reset] ++
7,971,722 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,683 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,069,065 >>> mbox cmd response: success
8,069,065 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,069,336 UART: [update-reset] Copying MAN_2 To MAN_1
8,077,350 UART: [update-reset Success] --
8,078,441 UART: [state] Locking Datavault
8,079,279 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,883 UART: [state] Locking ICCM
8,080,449 UART: [exit] Launching FMC @ 0x40000130
8,085,778 UART:
8,085,794 UART: Running Caliptra FMC ...
8,086,202 UART:
8,086,345 UART: [state] CFI Enabled
8,175,108 UART: [art] Extend RT PCRs Done
8,175,536 UART: [art] Lock RT PCRs Done
8,176,607 UART: [art] Populate DV Done
8,184,758 UART: [fht] FMC Alias Private Key: 7
8,185,830 UART: [art] Derive CDI
8,186,110 UART: [art] Store in in slot 0x4
8,272,111 UART: [art] Derive Key Pair
8,272,471 UART: [art] Store priv key in slot 0x5
8,285,785 UART: [art] Derive Key Pair - Done
8,300,287 UART: [art] Signing Cert with AUTHO
8,300,767 UART: RITY.KEYID = 7
8,316,023 UART: [art] Erasing AUTHORITY.KEYID = 7
8,316,788 UART: [art] PUB.X = A9EED2DC9FFF1236D139BBDC977237DF757B8CED25908D5CF8DC0A2C1228BB0F36BF57057A5F79F051502A0E69BEA137
8,323,564 UART: [art] PUB.Y = 589B41F1B578CE5EE967FA4E182F864FC953A8A8E5F5C51388D08DEBEB4F9654982728A70C3882CCA6C06F67ECD94990
8,330,519 UART: [art] SIG.R = 493C34508F7C24DC752B8EC0C2B5127A0C26B774F243EA1340452E4BE207F2E04BCD58EB04ED2139A396AA3F34BBF1E5
8,337,290 UART: [art] SIG.S = 2F16540FFAE94BA1275B4EC9D80CC9F35BAF31E51B898191B24242792AE24E88FB93D19C026F7FEFB32955276114CCC9
8,360,386 UART: mbox::rt_entry...
8,360,758 UART: ____ _ _ _ ____ _____
8,361,542 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,342 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,363,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,878 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,646 UART: |_|
8,364,958 UART:
8,647,464 UART: [rt] Runtime listening for mailbox commands...
8,648,701 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,037 ready_for_fw is high
1,056,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,011 >>> mbox cmd response: success
2,689,125 UART:
2,689,141 UART: Running Caliptra FMC ...
2,689,549 UART:
2,689,692 UART: [state] CFI Enabled
2,700,385 UART: [fht] FMC Alias Private Key: 7
2,808,446 UART: [art] Extend RT PCRs Done
2,808,874 UART: [art] Lock RT PCRs Done
2,810,602 UART: [art] Populate DV Done
2,818,857 UART: [fht] FMC Alias Private Key: 7
2,819,877 UART: [art] Derive CDI
2,820,157 UART: [art] Store in in slot 0x4
2,906,180 UART: [art] Derive Key Pair
2,906,540 UART: [art] Store priv key in slot 0x5
2,920,218 UART: [art] Derive Key Pair - Done
2,935,170 UART: [art] Signing Cert with AUTHO
2,935,650 UART: RITY.KEYID = 7
2,951,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,827 UART: [art] PUB.X = 3A101B8FA9CFDCA0B66B2061B8523908DA687098646656F14DC1698E5FED9B0D74C899E7B9CB1737ABAD219250EAA940
2,958,599 UART: [art] PUB.Y = A9E7C72A339BE6E120EC03A614A6C6805108EED8C8FA322FC0759396FB88515337AE01570413F1C2A2BAFE7186682A90
2,965,539 UART: [art] SIG.R = 29A176A38610F4C038DCD9242882AE3770952856259CA761107A5C17951E6FC5D288DC553BC675BA7E4BD929B2D26058
2,972,303 UART: [art] SIG.S = 850F169A42FCDFD5E67DF39504873E97FA86F68EA9DF518AD8AA8E9A02B989FD934194E7EBF166B14F2509369DFF5FCF
2,996,154 UART: Caliptra RT
2,996,499 UART: [state] CFI Enabled
3,104,114 UART: [rt] RT listening for mailbox commands...
3,104,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,036 UART: [rt]cmd =0x54514754, len=24
3,136,928 >>> mbox cmd response data (8 bytes)
3,136,929 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,421 >>> mbox cmd response: success
5,110,421 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,123,891 UART:
5,123,907 UART: Running Caliptra FMC ...
5,124,315 UART:
5,124,458 UART: [state] CFI Enabled
5,213,385 UART: [art] Extend RT PCRs Done
5,213,813 UART: [art] Lock RT PCRs Done
5,215,020 UART: [art] Populate DV Done
5,223,429 UART: [fht] FMC Alias Private Key: 7
5,224,563 UART: [art] Derive CDI
5,224,843 UART: [art] Store in in slot 0x4
5,310,456 UART: [art] Derive Key Pair
5,310,816 UART: [art] Store priv key in slot 0x5
5,324,402 UART: [art] Derive Key Pair - Done
5,339,200 UART: [art] Signing Cert with AUTHO
5,339,680 UART: RITY.KEYID = 7
5,355,118 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,883 UART: [art] PUB.X = 05BCD0617232502A2BA38B3696C2BD0FE932D21C6B234FCDF8F85C1D1F6E7D502BCC2039AAF0D5C3A01F44F887D1E05F
5,362,663 UART: [art] PUB.Y = 75660BDDD459FF2773879144B5AD850CC6F0BFFC06018E4AC96B17BDB47B2E072F86640F96A9A12749DD26523183C6F3
5,369,599 UART: [art] SIG.R = E61C764C30AB78BBCDBE39242678D1FD75511A2DE858F8F3B795898222B4C71E3E7C5BD9CDA659E5BBF2B99E6893129D
5,376,381 UART: [art] SIG.S = 0A95708E9630F9B44755A932F6FB691581CA05068A83121DEC532177E74BD0050633EEB99132F5C33B58C32A741CCE2F
5,400,417 UART: mbox::rt_entry...
5,400,789 UART: ____ _ _ _ ____ _____
5,401,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,373 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,141 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,403,909 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,404,677 UART: |_|
5,404,989 UART:
5,687,701 UART: [rt] Runtime listening for mailbox commands...
5,688,938 >>> mbox cmd response data (120 bytes)
5,688,939 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,661,031 >>> mbox cmd response: success
7,661,031 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,674,161 UART:
7,674,177 UART: Running Caliptra FMC ...
7,674,585 UART:
7,674,728 UART: [state] CFI Enabled
7,763,727 UART: [art] Extend RT PCRs Done
7,764,155 UART: [art] Lock RT PCRs Done
7,765,500 UART: [art] Populate DV Done
7,773,759 UART: [fht] FMC Alias Private Key: 7
7,774,933 UART: [art] Derive CDI
7,775,213 UART: [art] Store in in slot 0x4
7,860,912 UART: [art] Derive Key Pair
7,861,272 UART: [art] Store priv key in slot 0x5
7,874,858 UART: [art] Derive Key Pair - Done
7,889,462 UART: [art] Signing Cert with AUTHO
7,889,942 UART: RITY.KEYID = 7
7,905,040 UART: [art] Erasing AUTHORITY.KEYID = 7
7,905,805 UART: [art] PUB.X = A0878EE7001D7AEDC559483D5698C6300ED40F3D039F9241585F14E4384F9EDABDD8E67D9309517299A50A12E3256638
7,912,534 UART: [art] PUB.Y = 5BCEBB02E537E33BF2AB57B005541E21EFD16C4C790A3299E08F38889380A7BDC088B49B65FA6A2C58512C9CB3D34A40
7,919,485 UART: [art] SIG.R = 85AD3B22276492470B7D80167BF53E43FF7481D7C09CA39156697CD5B0B39033D618EB6C33D3CEEDBDF703BECC63B433
7,926,257 UART: [art] SIG.S = 3B3EA1FFE607F2244B4BC803B4E5115F9A34D6B5BFFB35FC0D64DCE38EE2EBF150ABF9ED30BDB2E2418B79BA1A68BBAF
7,949,977 UART: mbox::rt_entry...
7,950,349 UART: ____ _ _ _ ____ _____
7,951,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,951,933 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,952,701 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,953,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,954,237 UART: |_|
7,954,549 UART:
8,234,543 UART: [rt] Runtime listening for mailbox commands...
8,235,780 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,526 UART:
191,907 UART: Running Caliptra ROM ...
193,085 UART:
193,246 UART: [state] CFI Enabled
264,515 UART: [state] LifecycleState = Production
266,744 UART: [state] DebugLocked = Yes
269,162 UART: [state] Starting the WD Timer 40000000 cycles
274,181 UART: [kat] SHA2-256
456,197 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,667 UART: [kat] ++
468,261 UART: [kat] sha1
478,534 UART: [kat] SHA2-256
481,542 UART: [kat] SHA2-384
486,815 UART: [kat] SHA2-512-ACC
489,394 UART: [kat] ECC-384
3,777,266 UART: [kat] HMAC-384Kdf
3,795,282 UART: [kat] LMS
4,868,457 UART: [kat] --
4,872,395 UART: [cold-reset] ++
4,873,911 UART: [fht] FHT @ 0x50003400
4,886,383 UART: [idev] ++
4,887,085 UART: [idev] CDI.KEYID = 6
4,888,338 UART: [idev] SUBJECT.KEYID = 7
4,889,449 UART: [idev] UDS.KEYID = 0
4,890,352 ready_for_fw is high
4,890,548 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,989,823 UART: [idev] Erasing UDS.KEYID = 0
8,237,904 UART: [idev] Sha1 KeyId Algorithm
8,259,442 UART: [idev] --
8,261,820 UART: [ldev] ++
8,262,389 UART: [ldev] CDI.KEYID = 6
8,263,624 UART: [ldev] SUBJECT.KEYID = 5
8,264,729 UART: [ldev] AUTHORITY.KEYID = 7
8,265,976 UART: [ldev] FE.KEYID = 1
8,310,404 UART: [ldev] Erasing FE.KEYID = 1
11,648,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,956,522 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,972,838 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,988,870 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,004,955 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,026,704 UART: [ldev] --
14,031,270 UART: [fwproc] Wait for Commands...
14,032,876 UART: [fwproc] Recv command 0x46574c44
14,035,685 UART: [fwproc] Recv'd Img size: 78740 bytes
17,704,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,780,555 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,849,297 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,041,897 >>> mbox cmd response: success
18,046,607 UART: [afmc] ++
18,047,247 UART: [afmc] CDI.KEYID = 6
18,048,316 UART: [afmc] SUBJECT.KEYID = 7
18,049,543 UART: [afmc] AUTHORITY.KEYID = 5
21,403,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,703,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,705,323 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,721,337 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,737,438 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,753,481 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,775,791 UART: [afmc] --
23,779,802 UART: [cold-reset] --
23,784,420 UART: [state] Locking Datavault
23,791,020 UART: [state] Locking PCR0, PCR1 and PCR31
23,792,674 UART: [state] Locking ICCM
23,794,501 UART: [exit] Launching FMC @ 0x40000130
23,803,162 UART:
23,803,432 UART: Running Caliptra FMC ...
23,804,542 UART:
23,804,703 UART: [state] CFI Enabled
23,862,089 UART: [fht] FMC Alias Private Key: 7
26,200,722 UART: [art] Extend RT PCRs Done
26,201,944 UART: [art] Lock RT PCRs Done
26,203,624 UART: [art] Populate DV Done
26,209,196 UART: [fht] FMC Alias Private Key: 7
26,210,677 UART: [art] Derive CDI
26,211,415 UART: [art] Store in in slot 0x4
26,270,771 UART: [art] Derive Key Pair
26,271,772 UART: [art] Store priv key in slot 0x5
29,564,370 UART: [art] Derive Key Pair - Done
29,577,689 UART: [art] Signing Cert with AUTHO
29,578,995 UART: RITY.KEYID = 7
31,866,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,868,005 UART: [art] PUB.X = C677AED535684CA030CE22424ED263D09120CCE61607E9C79BB4AE44FF6DF3B28944FFF9CD3B22D9FD6390219D1B45F7
31,875,211 UART: [art] PUB.Y = 9A346F0594745FD1F0D543824932FC95B27786C9C8B16B3AEA34F63E4212086FA97A01E3A27BAA189BC04E0DA261B5B8
31,882,447 UART: [art] SIG.R = 7CE6E2467418F2F9E995E9A493BE4011C99676E2A1A660C788AB35A2FBE4BD54951670FE56F51FB1FA177438AB2A56D8
31,889,860 UART: [art] SIG.S = 25455DAF967DD4B22DB58052FF436BABBA8F3D3CD3805D31BA769D5A87B86B588DAB9404807B44E8B9A1CF182ED626E1
33,194,683 UART: mbox::rt_entry...
33,195,661 UART: ____ _ _ _ ____ _____
33,197,652 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,199,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,201,586 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,203,513 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,205,446 UART: |_|
33,206,280 UART:
33,318,319 UART: [rt] Runtime listening for mailbox commands...
33,320,336 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,320,850 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,017 UART:
1,286 UART: Running Caliptra ROM ...
2,395 UART:
2,548 UART: [state] CFI Enabled
58,726 UART: [state] LifecycleState = Production
60,444 UART: [state] DebugLocked = Yes
63,203 UART: [state] Starting the WD Timer 40000000 cycles
67,871 UART: [kat] SHA2-256
249,859 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
261,381 UART: [kat] ++
261,889 UART: [kat] sha1
272,711 UART: [kat] SHA2-256
275,709 UART: [kat] SHA2-384
281,686 UART: [kat] SHA2-512-ACC
284,295 UART: [kat] ECC-384
3,571,521 UART: [kat] HMAC-384Kdf
3,597,966 UART: [kat] LMS
4,671,137 UART: [kat] --
4,674,871 UART: [warm-reset] ++
4,680,374 UART: [warm-reset] --
4,685,271 UART: [state] Locking Datavault
4,687,982 UART: [state] Locking PCR0, PCR1 and PCR31
4,690,173 UART: [state] Locking ICCM
4,692,700 UART: [exit] Launching FMC @ 0x40000130
4,701,370 UART:
4,701,604 UART: Running Caliptra FMC ...
4,702,635 UART:
4,702,785 UART: [state] CFI Enabled
4,763,434 UART: [aliasrt :skip pcr extension
4,764,729 UART: [art] Extend RT PCRs Done
4,765,802 UART: [art] Lock RT PCRs Done
4,766,872 UART: [art] Populate DV Done
4,772,466 UART: [fht] FMC Alias Private Key: 7
4,774,117 UART: [art] Derive CDI
4,774,858 UART: [art] Store in in slot 0x4
4,831,869 UART: [art] Derive Key Pair
4,832,922 UART: [art] Store priv key in slot 0x5
8,125,772 UART: [art] Derive Key Pair - Done
8,139,040 UART: [art] Signing Cert with AUTHO
8,140,345 UART: RITY.KEYID = 7
10,427,861 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,361 UART: [art] PUB.X = C677AED535684CA030CE22424ED263D09120CCE61607E9C79BB4AE44FF6DF3B28944FFF9CD3B22D9FD6390219D1B45F7
10,436,622 UART: [art] PUB.Y = 9A346F0594745FD1F0D543824932FC95B27786C9C8B16B3AEA34F63E4212086FA97A01E3A27BAA189BC04E0DA261B5B8
10,443,869 UART: [art] SIG.R = 7CE6E2467418F2F9E995E9A493BE4011C99676E2A1A660C788AB35A2FBE4BD54951670FE56F51FB1FA177438AB2A56D8
10,451,212 UART: [art] SIG.S = 25455DAF967DD4B22DB58052FF436BABBA8F3D3CD3805D31BA769D5A87B86B588DAB9404807B44E8B9A1CF182ED626E1
11,755,598 UART: mbox::rt_entry...
11,756,545 UART: ____ _ _ _ ____ _____
11,758,519 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,760,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,764,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,766,176 UART: |_|
11,766,980 UART:
12,049,534 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,016 writing to cptra_bootfsm_go
192,633 UART:
192,982 UART: Running Caliptra ROM ...
194,151 UART:
194,305 UART: [state] CFI Enabled
263,194 UART: [state] LifecycleState = Production
265,407 UART: [state] DebugLocked = Yes
266,764 UART: [state] Starting the WD Timer 40000000 cycles
271,211 UART: [kat] SHA2-256
453,152 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,692 UART: [kat] ++
465,291 UART: [kat] sha1
476,276 UART: [kat] SHA2-256
479,276 UART: [kat] SHA2-384
485,549 UART: [kat] SHA2-512-ACC
488,129 UART: [kat] ECC-384
3,780,249 UART: [kat] HMAC-384Kdf
3,803,170 UART: [kat] LMS
4,876,348 UART: [kat] --
4,880,563 UART: [cold-reset] ++
4,882,158 UART: [fht] FHT @ 0x50003400
4,894,245 UART: [idev] ++
4,894,963 UART: [idev] CDI.KEYID = 6
4,896,140 UART: [idev] SUBJECT.KEYID = 7
4,897,311 UART: [idev] UDS.KEYID = 0
4,898,210 ready_for_fw is high
4,898,416 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,997,627 UART: [idev] Erasing UDS.KEYID = 0
8,245,298 UART: [idev] Sha1 KeyId Algorithm
8,267,247 UART: [idev] --
8,270,916 UART: [ldev] ++
8,271,505 UART: [ldev] CDI.KEYID = 6
8,272,686 UART: [ldev] SUBJECT.KEYID = 5
8,273,842 UART: [ldev] AUTHORITY.KEYID = 7
8,275,020 UART: [ldev] FE.KEYID = 1
8,320,344 UART: [ldev] Erasing FE.KEYID = 1
11,653,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,096 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,983,415 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,999,397 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,015,571 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,035,711 UART: [ldev] --
14,041,092 UART: [fwproc] Wait for Commands...
14,044,002 UART: [fwproc] Recv command 0x46574c44
14,046,316 UART: [fwproc] Recv'd Img size: 78740 bytes
17,706,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,784,782 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,853,493 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,045,981 >>> mbox cmd response: success
18,049,375 UART: [afmc] ++
18,049,999 UART: [afmc] CDI.KEYID = 6
18,051,145 UART: [afmc] SUBJECT.KEYID = 7
18,052,307 UART: [afmc] AUTHORITY.KEYID = 5
21,414,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,710,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,712,940 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,728,949 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,745,046 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,761,095 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,783,023 UART: [afmc] --
23,786,406 UART: [cold-reset] --
23,790,060 UART: [state] Locking Datavault
23,796,547 UART: [state] Locking PCR0, PCR1 and PCR31
23,798,263 UART: [state] Locking ICCM
23,800,189 UART: [exit] Launching FMC @ 0x40000130
23,808,910 UART:
23,809,152 UART: Running Caliptra FMC ...
23,810,182 UART:
23,810,333 UART: [state] CFI Enabled
23,871,896 UART: [fht] FMC Alias Private Key: 7
26,209,932 UART: [art] Extend RT PCRs Done
26,211,150 UART: [art] Lock RT PCRs Done
26,212,942 UART: [art] Populate DV Done
26,218,519 UART: [fht] FMC Alias Private Key: 7
26,220,225 UART: [art] Derive CDI
26,221,044 UART: [art] Store in in slot 0x4
26,280,050 UART: [art] Derive Key Pair
26,281,094 UART: [art] Store priv key in slot 0x5
29,573,899 UART: [art] Derive Key Pair - Done
29,586,964 UART: [art] Signing Cert with AUTHO
29,588,265 UART: RITY.KEYID = 7
31,875,433 UART: [art] Erasing AUTHORITY.KEYID = 7
31,876,945 UART: [art] PUB.X = 7AEE7C8C1DDCC706A0CC2E99DB9CD71C2936CA00981858E7B2C7517D1CE6323AC8BA0315E7A2E8951EA08F82F70EE892
31,884,169 UART: [art] PUB.Y = F1A364F3DE672C8E5CF2F2CD0E0AD7A481783B7760EC226627324DF1B9F7197074B6F86B0E4814D970186FE26B2D61C5
31,891,465 UART: [art] SIG.R = 32017DDF696CB96BC566ADE8136838B2E61D8ED83591626A73791AD1EA2C9B7AB63ED0B56479BADD9BEB47EED47C69A3
31,898,871 UART: [art] SIG.S = C81881F5C3080C97F4119098DC1B02A85DFC053FAF109AEC23CE8F591E7C4434610D58E2231170E62A636DB8F103C75E
33,203,622 UART: mbox::rt_entry...
33,204,582 UART: ____ _ _ _ ____ _____
33,206,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,208,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,210,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,212,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,214,355 UART: |_|
33,215,194 UART:
33,328,377 UART: [rt] Runtime listening for mailbox commands...
33,330,409 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,330,922 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,011 UART:
1,269 UART: Running Caliptra ROM ...
2,322 UART:
2,471 UART: [state] CFI Enabled
62,240 UART: [state] LifecycleState = Production
64,005 UART: [state] DebugLocked = Yes
66,351 UART: [state] Starting the WD Timer 40000000 cycles
71,898 UART: [kat] SHA2-256
253,847 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
265,358 UART: [kat] ++
265,943 UART: [kat] sha1
277,970 UART: [kat] SHA2-256
280,976 UART: [kat] SHA2-384
286,387 UART: [kat] SHA2-512-ACC
289,002 UART: [kat] ECC-384
3,569,486 UART: [kat] HMAC-384Kdf
3,597,552 UART: [kat] LMS
4,670,723 UART: [kat] --
4,672,829 UART: [warm-reset] ++
4,676,463 UART: [warm-reset] --
4,680,225 UART: [state] Locking Datavault
4,683,703 UART: [state] Locking PCR0, PCR1 and PCR31
4,685,900 UART: [state] Locking ICCM
4,688,765 UART: [exit] Launching FMC @ 0x40000130
4,697,439 UART:
4,697,684 UART: Running Caliptra FMC ...
4,698,790 UART:
4,698,954 UART: [state] CFI Enabled
4,763,080 UART: [aliasrt :skip pcr extension
4,764,397 UART: [art] Extend RT PCRs Done
4,765,546 UART: [art] Lock RT PCRs Done
4,766,724 UART: [art] Populate DV Done
4,772,397 UART: [fht] FMC Alias Private Key: 7
4,774,041 UART: [art] Derive CDI
4,774,857 UART: [art] Store in in slot 0x4
4,830,568 UART: [art] Derive Key Pair
4,831,796 UART: [art] Store priv key in slot 0x5
8,124,824 UART: [art] Derive Key Pair - Done
8,138,103 UART: [art] Signing Cert with AUTHO
8,139,423 UART: RITY.KEYID = 7
10,439,193 UART: [art] Erasing AUTHORITY.KEYID = 7
10,440,711 UART: [art] PUB.X = 7AEE7C8C1DDCC706A0CC2E99DB9CD71C2936CA00981858E7B2C7517D1CE6323AC8BA0315E7A2E8951EA08F82F70EE892
10,447,902 UART: [art] PUB.Y = F1A364F3DE672C8E5CF2F2CD0E0AD7A481783B7760EC226627324DF1B9F7197074B6F86B0E4814D970186FE26B2D61C5
10,455,188 UART: [art] SIG.R = 32017DDF696CB96BC566ADE8136838B2E61D8ED83591626A73791AD1EA2C9B7AB63ED0B56479BADD9BEB47EED47C69A3
10,462,588 UART: [art] SIG.S = C81881F5C3080C97F4119098DC1B02A85DFC053FAF109AEC23CE8F591E7C4434610D58E2231170E62A636DB8F103C75E
11,767,460 UART: mbox::rt_entry...
11,768,419 UART: ____ _ _ _ ____ _____
11,770,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,772,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,774,211 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,776,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,777,991 UART: |_|
11,778,867 UART:
12,063,046 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
191,707 UART:
192,253 UART: Running Caliptra ROM ...
193,358 UART:
602,970 UART: [state] CFI Enabled
613,235 UART: [state] LifecycleState = Production
615,370 UART: [state] DebugLocked = Yes
618,215 UART: [state] Starting the WD Timer 40000000 cycles
623,324 UART: [kat] SHA2-256
805,305 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,841 UART: [kat] ++
817,356 UART: [kat] sha1
828,627 UART: [kat] SHA2-256
831,674 UART: [kat] SHA2-384
837,595 UART: [kat] SHA2-512-ACC
840,243 UART: [kat] ECC-384
4,098,491 UART: [kat] HMAC-384Kdf
4,109,909 UART: [kat] LMS
5,183,118 UART: [kat] --
5,185,847 UART: [cold-reset] ++
5,188,000 UART: [fht] FHT @ 0x50003400
5,199,474 UART: [idev] ++
5,200,175 UART: [idev] CDI.KEYID = 6
5,201,414 UART: [idev] SUBJECT.KEYID = 7
5,202,862 UART: [idev] UDS.KEYID = 0
5,204,043 ready_for_fw is high
5,204,257 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,303,611 UART: [idev] Erasing UDS.KEYID = 0
8,496,473 UART: [idev] Sha1 KeyId Algorithm
8,518,522 UART: [idev] --
8,522,431 UART: [ldev] ++
8,523,015 UART: [ldev] CDI.KEYID = 6
8,524,194 UART: [ldev] SUBJECT.KEYID = 5
8,525,348 UART: [ldev] AUTHORITY.KEYID = 7
8,526,593 UART: [ldev] FE.KEYID = 1
8,538,534 UART: [ldev] Erasing FE.KEYID = 1
11,833,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,070 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,142,393 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,158,421 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,174,495 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,194,611 UART: [ldev] --
14,198,370 UART: [fwproc] Wait for Commands...
14,200,675 UART: [fwproc] Recv command 0x46574c44
14,202,978 UART: [fwproc] Recv'd Img size: 78740 bytes
17,868,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,941,605 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,010,391 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,203,253 >>> mbox cmd response: success
18,206,940 UART: [afmc] ++
18,207,574 UART: [afmc] CDI.KEYID = 6
18,208,627 UART: [afmc] SUBJECT.KEYID = 7
18,209,848 UART: [afmc] AUTHORITY.KEYID = 5
21,526,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,822,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,824,681 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,840,693 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,856,808 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,872,878 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,896,383 UART: [afmc] --
23,899,321 UART: [cold-reset] --
23,903,510 UART: [state] Locking Datavault
23,909,296 UART: [state] Locking PCR0, PCR1 and PCR31
23,910,936 UART: [state] Locking ICCM
23,912,575 UART: [exit] Launching FMC @ 0x40000130
23,921,242 UART:
23,921,488 UART: Running Caliptra FMC ...
23,922,514 UART:
23,922,653 UART: [state] CFI Enabled
23,930,587 UART: [fht] FMC Alias Private Key: 7
26,260,791 UART: [art] Extend RT PCRs Done
26,262,012 UART: [art] Lock RT PCRs Done
26,263,767 UART: [art] Populate DV Done
26,269,213 UART: [fht] FMC Alias Private Key: 7
26,270,763 UART: [art] Derive CDI
26,271,578 UART: [art] Store in in slot 0x4
26,314,114 UART: [art] Derive Key Pair
26,315,102 UART: [art] Store priv key in slot 0x5
29,556,537 UART: [art] Derive Key Pair - Done
29,569,372 UART: [art] Signing Cert with AUTHO
29,570,669 UART: RITY.KEYID = 7
31,850,027 UART: [art] Erasing AUTHORITY.KEYID = 7
31,851,555 UART: [art] PUB.X = 8B7B5F9656DFC4431E500D27BA14211B200201D21F296B2309D0BF8387D111FFB0FAB1B0FB585793C707A410A058CDA1
31,858,761 UART: [art] PUB.Y = 05188E49EB6558999F64A0C38D4BD1E6F204E4E54428DC808015C51AD3551548836D1878330A01AAD4DA2936AF350596
31,865,989 UART: [art] SIG.R = 602828C4B7EB73EEEF4D4A80084883988E71068797FB207B47F94F5ECE0B965D1E4F7A5F9E912E2C2122ADC5724F798F
31,873,354 UART: [art] SIG.S = 2CDF05426E62E7112BCDE5A81FC4F6E77F00BA6950C30C2A3D1AB01C820BC07B3201CB99107A583DEF9DAD58710AF231
33,178,568 UART: mbox::rt_entry...
33,179,536 UART: ____ _ _ _ ____ _____
33,181,462 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,183,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,185,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,187,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,189,246 UART: |_|
33,190,047 UART:
33,302,796 UART: [rt] Runtime listening for mailbox commands...
33,304,945 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,305,456 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,016 UART:
1,183 UART: Running Caliptra ROM ...
2,296 UART:
7,225,134 UART: [state] CFI Enabled
7,240,356 UART: [state] LifecycleState = Production
7,242,105 UART: [state] DebugLocked = Yes
7,243,828 UART: [state] Starting the WD Timer 40000000 cycles
7,249,858 UART: [kat] SHA2-256
7,431,841 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,443,391 UART: [kat] ++
7,443,912 UART: [kat] sha1
7,455,118 UART: [kat] SHA2-256
7,458,186 UART: [kat] SHA2-384
7,463,411 UART: [kat] SHA2-512-ACC
7,466,026 UART: [kat] ECC-384
10,722,215 UART: [kat] HMAC-384Kdf
10,734,727 UART: [kat] LMS
11,807,857 UART: [kat] --
11,812,184 UART: [warm-reset] ++
11,816,977 UART: [warm-reset] --
11,821,698 UART: [state] Locking Datavault
11,825,488 UART: [state] Locking PCR0, PCR1 and PCR31
11,827,670 UART: [state] Locking ICCM
11,829,310 UART: [exit] Launching FMC @ 0x40000130
11,837,978 UART:
11,838,206 UART: Running Caliptra FMC ...
11,839,426 UART:
11,839,589 UART: [state] CFI Enabled
11,841,231 UART: [aliasrt :skip pcr extension
11,842,470 UART: [art] Extend RT PCRs Done
11,843,529 UART: [art] Lock RT PCRs Done
11,844,805 UART: [art] Populate DV Done
11,850,221 UART: [fht] FMC Alias Private Key: 7
11,851,812 UART: [art] Derive CDI
11,852,619 UART: [art] Store in in slot 0x4
11,895,349 UART: [art] Derive Key Pair
11,896,362 UART: [art] Store priv key in slot 0x5
15,138,485 UART: [art] Derive Key Pair - Done
15,151,642 UART: [art] Signing Cert with AUTHO
15,152,944 UART: RITY.KEYID = 7
17,432,636 UART: [art] Erasing AUTHORITY.KEYID = 7
17,434,152 UART: [art] PUB.X = 8B7B5F9656DFC4431E500D27BA14211B200201D21F296B2309D0BF8387D111FFB0FAB1B0FB585793C707A410A058CDA1
17,441,367 UART: [art] PUB.Y = 05188E49EB6558999F64A0C38D4BD1E6F204E4E54428DC808015C51AD3551548836D1878330A01AAD4DA2936AF350596
17,448,552 UART: [art] SIG.R = 602828C4B7EB73EEEF4D4A80084883988E71068797FB207B47F94F5ECE0B965D1E4F7A5F9E912E2C2122ADC5724F798F
17,455,941 UART: [art] SIG.S = 2CDF05426E62E7112BCDE5A81FC4F6E77F00BA6950C30C2A3D1AB01C820BC07B3201CB99107A583DEF9DAD58710AF231
18,760,433 UART: mbox::rt_entry...
18,761,396 UART: ____ _ _ _ ____ _____
18,763,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,765,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,767,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,769,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,771,155 UART: |_|
18,771,959 UART:
19,058,411 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
191,835 UART:
192,205 UART: Running Caliptra ROM ...
193,342 UART:
602,959 UART: [state] CFI Enabled
617,487 UART: [state] LifecycleState = Production
619,686 UART: [state] DebugLocked = Yes
621,747 UART: [state] Starting the WD Timer 40000000 cycles
626,628 UART: [kat] SHA2-256
808,586 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,133 UART: [kat] ++
820,677 UART: [kat] sha1
830,888 UART: [kat] SHA2-256
833,872 UART: [kat] SHA2-384
840,078 UART: [kat] SHA2-512-ACC
842,658 UART: [kat] ECC-384
4,099,793 UART: [kat] HMAC-384Kdf
4,113,400 UART: [kat] LMS
5,186,533 UART: [kat] --
5,192,406 UART: [cold-reset] ++
5,195,125 UART: [fht] FHT @ 0x50003400
5,207,164 UART: [idev] ++
5,207,862 UART: [idev] CDI.KEYID = 6
5,209,101 UART: [idev] SUBJECT.KEYID = 7
5,210,553 UART: [idev] UDS.KEYID = 0
5,211,739 ready_for_fw is high
5,211,964 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,311,170 UART: [idev] Erasing UDS.KEYID = 0
8,501,953 UART: [idev] Sha1 KeyId Algorithm
8,523,151 UART: [idev] --
8,528,521 UART: [ldev] ++
8,529,095 UART: [ldev] CDI.KEYID = 6
8,530,249 UART: [ldev] SUBJECT.KEYID = 5
8,531,456 UART: [ldev] AUTHORITY.KEYID = 7
8,532,598 UART: [ldev] FE.KEYID = 1
8,543,168 UART: [ldev] Erasing FE.KEYID = 1
11,831,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,628 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,139,940 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,155,979 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,172,053 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,191,891 UART: [ldev] --
14,196,081 UART: [fwproc] Wait for Commands...
14,198,119 UART: [fwproc] Recv command 0x46574c44
14,200,426 UART: [fwproc] Recv'd Img size: 78740 bytes
17,872,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,946,431 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,015,180 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,208,407 >>> mbox cmd response: success
18,213,172 UART: [afmc] ++
18,213,784 UART: [afmc] CDI.KEYID = 6
18,214,915 UART: [afmc] SUBJECT.KEYID = 7
18,216,134 UART: [afmc] AUTHORITY.KEYID = 5
21,535,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,828,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,831,146 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,847,129 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,863,255 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,879,374 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,902,426 UART: [afmc] --
23,906,808 UART: [cold-reset] --
23,910,519 UART: [state] Locking Datavault
23,916,796 UART: [state] Locking PCR0, PCR1 and PCR31
23,918,494 UART: [state] Locking ICCM
23,921,134 UART: [exit] Launching FMC @ 0x40000130
23,929,802 UART:
23,930,029 UART: Running Caliptra FMC ...
23,931,144 UART:
23,931,313 UART: [state] CFI Enabled
23,939,303 UART: [fht] FMC Alias Private Key: 7
26,270,142 UART: [art] Extend RT PCRs Done
26,271,356 UART: [art] Lock RT PCRs Done
26,272,974 UART: [art] Populate DV Done
26,278,542 UART: [fht] FMC Alias Private Key: 7
26,280,181 UART: [art] Derive CDI
26,280,989 UART: [art] Store in in slot 0x4
26,323,578 UART: [art] Derive Key Pair
26,324,567 UART: [art] Store priv key in slot 0x5
29,566,749 UART: [art] Derive Key Pair - Done
29,579,627 UART: [art] Signing Cert with AUTHO
29,580,920 UART: RITY.KEYID = 7
31,860,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,861,714 UART: [art] PUB.X = BA603F4E9B0BA715886D9E36E1C5924ED82A2D261C770B1F44551958F6505BC384E90467AD8ECB9AC2F99A52A11D6ABF
31,869,009 UART: [art] PUB.Y = 07B8913C8482D85705B39CC6C697303B179D545239DE80C1C9175AF7B942EEAE580BC78C7DB0B97272A19013D86B2A89
31,876,201 UART: [art] SIG.R = DE6FF5949148A70294904EC7B698F2C7844AA6C68822B19BA7B2F4A6C80E3C23DC931C416A0019D14F02E08BF8609587
31,883,533 UART: [art] SIG.S = 02E029394242DC4ADF6E1D6783841209A4575348951CC71EA4718C586732D2D02D1AEFC0DAEB6753B3E9EB8A17A78827
33,188,879 UART: mbox::rt_entry...
33,189,829 UART: ____ _ _ _ ____ _____
33,191,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,193,808 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,195,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,197,652 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,199,570 UART: |_|
33,200,371 UART:
33,313,998 UART: [rt] Runtime listening for mailbox commands...
33,316,021 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,316,531 >>> mbox cmd response data (0 bytes)
Initializing fuses
993 UART:
1,165 UART: Running Caliptra ROM ...
2,273 UART:
7,224,398 UART: [state] CFI Enabled
7,240,973 UART: [state] LifecycleState = Production
7,242,723 UART: [state] DebugLocked = Yes
7,244,413 UART: [state] Starting the WD Timer 40000000 cycles
7,249,106 UART: [kat] SHA2-256
7,431,111 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,442,614 UART: [kat] ++
7,443,206 UART: [kat] sha1
7,453,396 UART: [kat] SHA2-256
7,456,460 UART: [kat] SHA2-384
7,463,568 UART: [kat] SHA2-512-ACC
7,466,140 UART: [kat] ECC-384
10,720,851 UART: [kat] HMAC-384Kdf
10,732,927 UART: [kat] LMS
11,806,139 UART: [kat] --
11,810,204 UART: [warm-reset] ++
11,814,682 UART: [warm-reset] --
11,818,111 UART: [state] Locking Datavault
11,821,362 UART: [state] Locking PCR0, PCR1 and PCR31
11,823,496 UART: [state] Locking ICCM
11,826,280 UART: [exit] Launching FMC @ 0x40000130
11,834,989 UART:
11,835,230 UART: Running Caliptra FMC ...
11,836,249 UART:
11,836,388 UART: [state] CFI Enabled
11,838,704 UART: [aliasrt :skip pcr extension
11,839,937 UART: [art] Extend RT PCRs Done
11,840,989 UART: [art] Lock RT PCRs Done
11,842,264 UART: [art] Populate DV Done
11,847,992 UART: [fht] FMC Alias Private Key: 7
11,849,538 UART: [art] Derive CDI
11,850,266 UART: [art] Store in in slot 0x4
11,893,161 UART: [art] Derive Key Pair
11,894,175 UART: [art] Store priv key in slot 0x5
15,136,136 UART: [art] Derive Key Pair - Done
15,149,131 UART: [art] Signing Cert with AUTHO
15,150,429 UART: RITY.KEYID = 7
17,429,897 UART: [art] Erasing AUTHORITY.KEYID = 7
17,431,416 UART: [art] PUB.X = BA603F4E9B0BA715886D9E36E1C5924ED82A2D261C770B1F44551958F6505BC384E90467AD8ECB9AC2F99A52A11D6ABF
17,438,663 UART: [art] PUB.Y = 07B8913C8482D85705B39CC6C697303B179D545239DE80C1C9175AF7B942EEAE580BC78C7DB0B97272A19013D86B2A89
17,445,906 UART: [art] SIG.R = DE6FF5949148A70294904EC7B698F2C7844AA6C68822B19BA7B2F4A6C80E3C23DC931C416A0019D14F02E08BF8609587
17,453,238 UART: [art] SIG.S = 02E029394242DC4ADF6E1D6783841209A4575348951CC71EA4718C586732D2D02D1AEFC0DAEB6753B3E9EB8A17A78827
18,757,877 UART: mbox::rt_entry...
18,758,821 UART: ____ _ _ _ ____ _____
18,760,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,762,803 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,764,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,766,678 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,768,602 UART: |_|
18,769,407 UART:
19,051,903 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,589 UART:
191,966 UART: Running Caliptra ROM ...
193,138 UART:
193,293 UART: [state] CFI Enabled
263,017 UART: [state] LifecycleState = Production
264,833 UART: [state] DebugLocked = Yes
267,829 UART: [state] Starting the WD Timer 40000000 cycles
273,152 UART: [kat] SHA2-256
452,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,878 UART: [kat] ++
464,404 UART: [kat] sha1
474,954 UART: [kat] SHA2-256
478,024 UART: [kat] SHA2-384
483,086 UART: [kat] SHA2-512-ACC
486,049 UART: [kat] ECC-384
2,951,338 UART: [kat] HMAC-384Kdf
2,971,379 UART: [kat] LMS
3,500,825 UART: [kat] --
3,506,180 UART: [cold-reset] ++
3,507,694 UART: [fht] FHT @ 0x50003400
3,517,534 UART: [idev] ++
3,518,094 UART: [idev] CDI.KEYID = 6
3,519,082 UART: [idev] SUBJECT.KEYID = 7
3,520,217 UART: [idev] UDS.KEYID = 0
3,521,203 ready_for_fw is high
3,521,420 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,620,752 UART: [idev] Erasing UDS.KEYID = 0
6,029,774 UART: [idev] Sha1 KeyId Algorithm
6,052,105 UART: [idev] --
6,056,642 UART: [ldev] ++
6,057,208 UART: [ldev] CDI.KEYID = 6
6,058,121 UART: [ldev] SUBJECT.KEYID = 5
6,059,332 UART: [ldev] AUTHORITY.KEYID = 7
6,060,562 UART: [ldev] FE.KEYID = 1
6,100,536 UART: [ldev] Erasing FE.KEYID = 1
8,600,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,682 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,334,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,518 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,487 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,385,744 UART: [ldev] --
10,389,813 UART: [fwproc] Wait for Commands...
10,391,959 UART: [fwproc] Recv command 0x46574c44
10,393,991 UART: [fwproc] Recv'd Img size: 78704 bytes
13,393,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,459,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,528,531 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,721,462 >>> mbox cmd response: success
13,725,107 UART: [afmc] ++
13,725,722 UART: [afmc] CDI.KEYID = 6
13,726,635 UART: [afmc] SUBJECT.KEYID = 7
13,727,795 UART: [afmc] AUTHORITY.KEYID = 5
16,253,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,976,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,978,206 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
17,994,195 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,010,041 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,025,807 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,048,741 UART: [afmc] --
18,051,613 UART: [cold-reset] --
18,054,132 UART: [state] Locking Datavault
18,060,025 UART: [state] Locking PCR0, PCR1 and PCR31
18,061,681 UART: [state] Locking ICCM
18,063,670 UART: [exit] Launching FMC @ 0x40000130
18,072,124 UART:
18,072,359 UART: Running Caliptra FMC ...
18,073,458 UART:
18,073,622 UART: [state] CFI Enabled
18,136,039 UART: [fht] FMC Alias Private Key: 7
19,900,190 UART: [art] Extend RT PCRs Done
19,901,400 UART: [art] Lock RT PCRs Done
19,903,147 UART: [art] Populate DV Done
19,908,777 UART: [fht] FMC Alias Private Key: 7
19,910,415 UART: [art] Derive CDI
19,911,228 UART: [art] Store in in slot 0x4
19,969,185 UART: [art] Derive Key Pair
19,970,220 UART: [art] Store priv key in slot 0x5
22,432,808 UART: [art] Derive Key Pair - Done
22,446,282 UART: [art] Signing Cert with AUTHO
22,447,584 UART: RITY.KEYID = 7
24,159,163 UART: [art] Erasing AUTHORITY.KEYID = 7
24,160,666 UART: [art] PUB.X = D33936CAC0C587786BCEBC2C382DB2AEF3C00AB5C0210CD55E9DB42996C2612CC2B64594FB3E79DE9AF7CBCE8A30EA95
24,168,030 UART: [art] PUB.Y = 18751EE38E0841E39E50E159962CDEFFBFD7B5955A5E09AAE2007613DADFE3B711187174145CF46AC4B7644058F9A2FE
24,175,273 UART: [art] SIG.R = D288A467B16D81E03FF3C293E0E29BC0AB078BB618A620773D2927E3F9271BD688AC2E07E10BEC939AF7779D521384BA
24,182,671 UART: [art] SIG.S = 7CB7D889914CE7A3E93585F5427AEFA28D7C5AABEFDD0D1FF8BAAAF557614884C03F2A0F86B10F6007CD32A69866991A
25,161,364 UART: mbox::rt_entry...
25,162,331 UART: ____ _ _ _ ____ _____
25,164,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,166,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,168,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,170,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,172,068 UART: |_|
25,172,881 UART:
25,286,497 UART: [rt] Runtime listening for mailbox commands...
25,288,508 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,289,000 >>> mbox cmd response data (0 bytes)
Initializing fuses
987 UART:
1,165 UART: Running Caliptra ROM ...
2,208 UART:
2,350 UART: [state] CFI Enabled
62,256 UART: [state] LifecycleState = Production
63,980 UART: [state] DebugLocked = Yes
66,163 UART: [state] Starting the WD Timer 40000000 cycles
71,542 UART: [kat] SHA2-256
250,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,268 UART: [kat] ++
262,714 UART: [kat] sha1
273,694 UART: [kat] SHA2-256
276,691 UART: [kat] SHA2-384
283,101 UART: [kat] SHA2-512-ACC
286,082 UART: [kat] ECC-384
2,747,302 UART: [kat] HMAC-384Kdf
2,769,624 UART: [kat] LMS
3,299,082 UART: [kat] --
3,303,183 UART: [warm-reset] ++
3,306,895 UART: [warm-reset] --
3,311,186 UART: [state] Locking Datavault
3,314,433 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,097 UART: [state] Locking ICCM
3,318,039 UART: [exit] Launching FMC @ 0x40000130
3,326,444 UART:
3,326,677 UART: Running Caliptra FMC ...
3,327,784 UART:
3,327,945 UART: [state] CFI Enabled
3,378,853 UART: [aliasrt :skip pcr extension
3,380,138 UART: [art] Extend RT PCRs Done
3,381,288 UART: [art] Lock RT PCRs Done
3,382,465 UART: [art] Populate DV Done
3,388,087 UART: [fht] FMC Alias Private Key: 7
3,389,570 UART: [art] Derive CDI
3,390,334 UART: [art] Store in in slot 0x4
3,447,496 UART: [art] Derive Key Pair
3,448,545 UART: [art] Store priv key in slot 0x5
5,911,413 UART: [art] Derive Key Pair - Done
5,924,649 UART: [art] Signing Cert with AUTHO
5,925,983 UART: RITY.KEYID = 7
7,636,971 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,478 UART: [art] PUB.X = D33936CAC0C587786BCEBC2C382DB2AEF3C00AB5C0210CD55E9DB42996C2612CC2B64594FB3E79DE9AF7CBCE8A30EA95
7,645,793 UART: [art] PUB.Y = 18751EE38E0841E39E50E159962CDEFFBFD7B5955A5E09AAE2007613DADFE3B711187174145CF46AC4B7644058F9A2FE
7,653,030 UART: [art] SIG.R = D288A467B16D81E03FF3C293E0E29BC0AB078BB618A620773D2927E3F9271BD688AC2E07E10BEC939AF7779D521384BA
7,660,444 UART: [art] SIG.S = 7CB7D889914CE7A3E93585F5427AEFA28D7C5AABEFDD0D1FF8BAAAF557614884C03F2A0F86B10F6007CD32A69866991A
8,639,500 UART: mbox::rt_entry...
8,640,440 UART: ____ _ _ _ ____ _____
8,642,369 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,235 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,164 UART: |_|
8,651,002 UART:
8,935,079 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,511 UART:
191,890 UART: Running Caliptra ROM ...
193,086 UART:
193,249 UART: [state] CFI Enabled
264,053 UART: [state] LifecycleState = Production
265,857 UART: [state] DebugLocked = Yes
268,139 UART: [state] Starting the WD Timer 40000000 cycles
272,176 UART: [kat] SHA2-256
451,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,960 UART: [kat] ++
463,488 UART: [kat] sha1
474,253 UART: [kat] SHA2-256
477,253 UART: [kat] SHA2-384
483,097 UART: [kat] SHA2-512-ACC
486,043 UART: [kat] ECC-384
2,949,262 UART: [kat] HMAC-384Kdf
2,971,837 UART: [kat] LMS
3,501,325 UART: [kat] --
3,503,507 UART: [cold-reset] ++
3,505,372 UART: [fht] FHT @ 0x50003400
3,515,778 UART: [idev] ++
3,516,338 UART: [idev] CDI.KEYID = 6
3,517,291 UART: [idev] SUBJECT.KEYID = 7
3,518,481 UART: [idev] UDS.KEYID = 0
3,519,383 ready_for_fw is high
3,519,590 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,380 UART: [idev] Erasing UDS.KEYID = 0
6,029,783 UART: [idev] Sha1 KeyId Algorithm
6,051,964 UART: [idev] --
6,054,724 UART: [ldev] ++
6,055,302 UART: [ldev] CDI.KEYID = 6
6,056,227 UART: [ldev] SUBJECT.KEYID = 5
6,057,448 UART: [ldev] AUTHORITY.KEYID = 7
6,058,686 UART: [ldev] FE.KEYID = 1
6,100,511 UART: [ldev] Erasing FE.KEYID = 1
8,606,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,653 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,347,608 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,363,478 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,379,397 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,400,769 UART: [ldev] --
10,404,521 UART: [fwproc] Wait for Commands...
10,407,701 UART: [fwproc] Recv command 0x46574c44
10,409,793 UART: [fwproc] Recv'd Img size: 78704 bytes
13,401,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,475,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,544,188 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,737,599 >>> mbox cmd response: success
13,741,795 UART: [afmc] ++
13,742,407 UART: [afmc] CDI.KEYID = 6
13,743,324 UART: [afmc] SUBJECT.KEYID = 7
13,744,486 UART: [afmc] AUTHORITY.KEYID = 5
16,283,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,012,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,014,353 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,030,412 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,046,204 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,061,938 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,083,815 UART: [afmc] --
18,086,916 UART: [cold-reset] --
18,089,431 UART: [state] Locking Datavault
18,095,164 UART: [state] Locking PCR0, PCR1 and PCR31
18,096,810 UART: [state] Locking ICCM
18,099,393 UART: [exit] Launching FMC @ 0x40000130
18,107,815 UART:
18,108,064 UART: Running Caliptra FMC ...
18,109,174 UART:
18,109,351 UART: [state] CFI Enabled
18,169,766 UART: [fht] FMC Alias Private Key: 7
19,933,614 UART: [art] Extend RT PCRs Done
19,934,811 UART: [art] Lock RT PCRs Done
19,936,182 UART: [art] Populate DV Done
19,942,008 UART: [fht] FMC Alias Private Key: 7
19,943,545 UART: [art] Derive CDI
19,944,314 UART: [art] Store in in slot 0x4
20,003,040 UART: [art] Derive Key Pair
20,004,045 UART: [art] Store priv key in slot 0x5
22,466,738 UART: [art] Derive Key Pair - Done
22,479,951 UART: [art] Signing Cert with AUTHO
22,481,255 UART: RITY.KEYID = 7
24,192,701 UART: [art] Erasing AUTHORITY.KEYID = 7
24,194,200 UART: [art] PUB.X = 4F26A6AB326F284062F9E1539A3E8E2C564661B5F9F1A00DB4EE97B3178CBA6C3386B1FC2D047F2A9645130D8680C5E4
24,201,510 UART: [art] PUB.Y = 969D1356E3374772C29F4E7E27BFA18A5F569CAD73C1CD927E075F73FC8273B7FEBFA54C29A52FA3BC50D548611F2D32
24,208,750 UART: [art] SIG.R = 7B35C5169DEF20B944AAACFC5A20074B560DF16B6BEADA1ABD9EBA4FA2A2F2F339996384A0C7EFC1AEA8D814F0708706
24,216,154 UART: [art] SIG.S = D4D9705A76FD618094E8CCDC8CA1EAD27FE47182859958CA2336119FEF7388B5EA03DAA3A075CA7843CA7B0A9F39D5A6
25,195,117 UART: mbox::rt_entry...
25,196,081 UART: ____ _ _ _ ____ _____
25,198,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,200,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,202,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,203,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,205,874 UART: |_|
25,206,679 UART:
25,320,473 UART: [rt] Runtime listening for mailbox commands...
25,322,486 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,322,990 >>> mbox cmd response data (0 bytes)
Initializing fuses
997 UART:
1,145 UART: Running Caliptra ROM ...
2,162 UART:
2,307 UART: [state] CFI Enabled
62,592 UART: [state] LifecycleState = Production
64,354 UART: [state] DebugLocked = Yes
66,972 UART: [state] Starting the WD Timer 40000000 cycles
71,533 UART: [kat] SHA2-256
250,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,241 UART: [kat] ++
262,769 UART: [kat] sha1
272,253 UART: [kat] SHA2-256
275,309 UART: [kat] SHA2-384
280,956 UART: [kat] SHA2-512-ACC
283,936 UART: [kat] ECC-384
2,749,300 UART: [kat] HMAC-384Kdf
2,770,160 UART: [kat] LMS
3,299,642 UART: [kat] --
3,304,511 UART: [warm-reset] ++
3,309,146 UART: [warm-reset] --
3,311,875 UART: [state] Locking Datavault
3,316,200 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,865 UART: [state] Locking ICCM
3,319,534 UART: [exit] Launching FMC @ 0x40000130
3,327,993 UART:
3,328,236 UART: Running Caliptra FMC ...
3,329,341 UART:
3,329,502 UART: [state] CFI Enabled
3,379,382 UART: [aliasrt :skip pcr extension
3,380,676 UART: [art] Extend RT PCRs Done
3,381,826 UART: [art] Lock RT PCRs Done
3,382,897 UART: [art] Populate DV Done
3,388,412 UART: [fht] FMC Alias Private Key: 7
3,390,116 UART: [art] Derive CDI
3,390,932 UART: [art] Store in in slot 0x4
3,447,994 UART: [art] Derive Key Pair
3,449,047 UART: [art] Store priv key in slot 0x5
5,912,286 UART: [art] Derive Key Pair - Done
5,925,188 UART: [art] Signing Cert with AUTHO
5,926,493 UART: RITY.KEYID = 7
7,638,462 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,967 UART: [art] PUB.X = 4F26A6AB326F284062F9E1539A3E8E2C564661B5F9F1A00DB4EE97B3178CBA6C3386B1FC2D047F2A9645130D8680C5E4
7,647,222 UART: [art] PUB.Y = 969D1356E3374772C29F4E7E27BFA18A5F569CAD73C1CD927E075F73FC8273B7FEBFA54C29A52FA3BC50D548611F2D32
7,654,519 UART: [art] SIG.R = 7B35C5169DEF20B944AAACFC5A20074B560DF16B6BEADA1ABD9EBA4FA2A2F2F339996384A0C7EFC1AEA8D814F0708706
7,661,957 UART: [art] SIG.S = D4D9705A76FD618094E8CCDC8CA1EAD27FE47182859958CA2336119FEF7388B5EA03DAA3A075CA7843CA7B0A9F39D5A6
8,640,754 UART: mbox::rt_entry...
8,641,690 UART: ____ _ _ _ ____ _____
8,643,621 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,412 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,344 UART: |_|
8,652,156 UART:
8,938,561 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
191,849 UART:
192,326 UART: Running Caliptra ROM ...
193,456 UART:
602,897 UART: [state] CFI Enabled
616,365 UART: [state] LifecycleState = Production
618,068 UART: [state] DebugLocked = Yes
619,915 UART: [state] Starting the WD Timer 40000000 cycles
624,584 UART: [kat] SHA2-256
803,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,335 UART: [kat] ++
815,861 UART: [kat] sha1
827,473 UART: [kat] SHA2-256
830,472 UART: [kat] SHA2-384
836,817 UART: [kat] SHA2-512-ACC
839,747 UART: [kat] ECC-384
3,281,049 UART: [kat] HMAC-384Kdf
3,293,696 UART: [kat] LMS
3,823,176 UART: [kat] --
3,828,034 UART: [cold-reset] ++
3,828,905 UART: [fht] FHT @ 0x50003400
3,839,748 UART: [idev] ++
3,840,348 UART: [idev] CDI.KEYID = 6
3,841,262 UART: [idev] SUBJECT.KEYID = 7
3,842,429 UART: [idev] UDS.KEYID = 0
3,843,473 ready_for_fw is high
3,843,682 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,942,637 UART: [idev] Erasing UDS.KEYID = 0
6,317,265 UART: [idev] Sha1 KeyId Algorithm
6,339,483 UART: [idev] --
6,343,030 UART: [ldev] ++
6,343,593 UART: [ldev] CDI.KEYID = 6
6,344,492 UART: [ldev] SUBJECT.KEYID = 5
6,345,701 UART: [ldev] AUTHORITY.KEYID = 7
6,346,926 UART: [ldev] FE.KEYID = 1
6,357,260 UART: [ldev] Erasing FE.KEYID = 1
8,829,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,904 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,934 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,747 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,650 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,153 UART: [ldev] --
10,621,815 UART: [fwproc] Wait for Commands...
10,623,737 UART: [fwproc] Recv command 0x46574c44
10,625,817 UART: [fwproc] Recv'd Img size: 78704 bytes
13,625,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,698,241 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,767,037 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,959,731 >>> mbox cmd response: success
13,963,409 UART: [afmc] ++
13,964,021 UART: [afmc] CDI.KEYID = 6
13,964,948 UART: [afmc] SUBJECT.KEYID = 7
13,966,110 UART: [afmc] AUTHORITY.KEYID = 5
16,468,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,188,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,190,617 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,206,592 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,222,448 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,238,227 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,261,702 UART: [afmc] --
18,265,328 UART: [cold-reset] --
18,269,508 UART: [state] Locking Datavault
18,274,962 UART: [state] Locking PCR0, PCR1 and PCR31
18,276,599 UART: [state] Locking ICCM
18,277,633 UART: [exit] Launching FMC @ 0x40000130
18,286,079 UART:
18,286,308 UART: Running Caliptra FMC ...
18,287,350 UART:
18,287,492 UART: [state] CFI Enabled
18,295,912 UART: [fht] FMC Alias Private Key: 7
20,052,320 UART: [art] Extend RT PCRs Done
20,053,531 UART: [art] Lock RT PCRs Done
20,055,284 UART: [art] Populate DV Done
20,060,635 UART: [fht] FMC Alias Private Key: 7
20,062,123 UART: [art] Derive CDI
20,062,879 UART: [art] Store in in slot 0x4
20,105,699 UART: [art] Derive Key Pair
20,106,863 UART: [art] Store priv key in slot 0x5
22,533,983 UART: [art] Derive Key Pair - Done
22,546,704 UART: [art] Signing Cert with AUTHO
22,547,993 UART: RITY.KEYID = 7
24,253,485 UART: [art] Erasing AUTHORITY.KEYID = 7
24,254,986 UART: [art] PUB.X = 62AAB08E3E43800FA1B12534CA9DE6802552297D888B442B4B4497269A36BDEA6C0F5E0730E51AC36ADF30DC8C7388C2
24,262,300 UART: [art] PUB.Y = 90ECCFA6EDAE5E2B6E3E6758D639284D8E31287BE12CF4E2D6EE54CE1CE5AE1B4383BEA2B4EE538BE934EBD14C472BDE
24,269,582 UART: [art] SIG.R = E378665C8D12034B9FDBF1191B602721590434123653A8F701998D00FA5AD4A144CE762C8B44D2C9C9549C5915B4B4F5
24,276,912 UART: [art] SIG.S = 16D2D440188AA3E24CF3F201753DA00C04D8A8EF0DA685575EAA93436C9E67771193ACE11B2F0C5BB36D925970B4661F
25,254,798 UART: mbox::rt_entry...
25,255,759 UART: ____ _ _ _ ____ _____
25,257,686 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,259,680 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,261,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,263,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,265,345 UART: |_|
25,266,224 UART:
25,379,200 UART: [rt] Runtime listening for mailbox commands...
25,381,207 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,381,696 >>> mbox cmd response data (0 bytes)
Initializing fuses
978 UART:
1,175 UART: Running Caliptra ROM ...
2,285 UART:
15,152,424 UART: [state] CFI Enabled
15,165,390 UART: [state] LifecycleState = Production
15,167,133 UART: [state] DebugLocked = Yes
15,168,604 UART: [state] Starting the WD Timer 40000000 cycles
15,173,275 UART: [kat] SHA2-256
15,352,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,364,003 UART: [kat] ++
15,364,553 UART: [kat] sha1
15,375,763 UART: [kat] SHA2-256
15,378,768 UART: [kat] SHA2-384
15,383,347 UART: [kat] SHA2-512-ACC
15,386,284 UART: [kat] ECC-384
17,829,331 UART: [kat] HMAC-384Kdf
17,842,954 UART: [kat] LMS
18,372,473 UART: [kat] --
18,376,701 UART: [warm-reset] ++
18,381,495 UART: [warm-reset] --
18,386,977 UART: [state] Locking Datavault
18,389,086 UART: [state] Locking PCR0, PCR1 and PCR31
18,390,728 UART: [state] Locking ICCM
18,393,244 UART: [exit] Launching FMC @ 0x40000130
18,401,686 UART:
18,401,922 UART: Running Caliptra FMC ...
18,403,014 UART:
18,403,161 UART: [state] CFI Enabled
18,405,094 UART: [aliasrt :skip pcr extension
18,406,328 UART: [art] Extend RT PCRs Done
18,407,454 UART: [art] Lock RT PCRs Done
18,408,729 UART: [art] Populate DV Done
18,414,285 UART: [fht] FMC Alias Private Key: 7
18,415,879 UART: [art] Derive CDI
18,416,689 UART: [art] Store in in slot 0x4
18,459,234 UART: [art] Derive Key Pair
18,460,280 UART: [art] Store priv key in slot 0x5
20,886,655 UART: [art] Derive Key Pair - Done
20,899,599 UART: [art] Signing Cert with AUTHO
20,900,904 UART: RITY.KEYID = 7
22,606,066 UART: [art] Erasing AUTHORITY.KEYID = 7
22,607,571 UART: [art] PUB.X = 62AAB08E3E43800FA1B12534CA9DE6802552297D888B442B4B4497269A36BDEA6C0F5E0730E51AC36ADF30DC8C7388C2
22,614,817 UART: [art] PUB.Y = 90ECCFA6EDAE5E2B6E3E6758D639284D8E31287BE12CF4E2D6EE54CE1CE5AE1B4383BEA2B4EE538BE934EBD14C472BDE
22,622,149 UART: [art] SIG.R = E378665C8D12034B9FDBF1191B602721590434123653A8F701998D00FA5AD4A144CE762C8B44D2C9C9549C5915B4B4F5
22,629,501 UART: [art] SIG.S = 16D2D440188AA3E24CF3F201753DA00C04D8A8EF0DA685575EAA93436C9E67771193ACE11B2F0C5BB36D925970B4661F
23,607,991 UART: mbox::rt_entry...
23,608,934 UART: ____ _ _ _ ____ _____
23,610,908 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,612,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,614,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,616,767 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,618,688 UART: |_|
23,619,513 UART:
23,909,744 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
191,770 UART:
192,172 UART: Running Caliptra ROM ...
193,338 UART:
602,875 UART: [state] CFI Enabled
614,970 UART: [state] LifecycleState = Production
616,729 UART: [state] DebugLocked = Yes
618,349 UART: [state] Starting the WD Timer 40000000 cycles
623,354 UART: [kat] SHA2-256
802,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,094 UART: [kat] ++
814,542 UART: [kat] sha1
824,669 UART: [kat] SHA2-256
827,703 UART: [kat] SHA2-384
833,476 UART: [kat] SHA2-512-ACC
836,476 UART: [kat] ECC-384
3,280,911 UART: [kat] HMAC-384Kdf
3,292,073 UART: [kat] LMS
3,821,571 UART: [kat] --
3,825,826 UART: [cold-reset] ++
3,826,775 UART: [fht] FHT @ 0x50003400
3,837,532 UART: [idev] ++
3,838,084 UART: [idev] CDI.KEYID = 6
3,838,998 UART: [idev] SUBJECT.KEYID = 7
3,840,231 UART: [idev] UDS.KEYID = 0
3,841,122 ready_for_fw is high
3,841,319 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,940,419 UART: [idev] Erasing UDS.KEYID = 0
6,312,057 UART: [idev] Sha1 KeyId Algorithm
6,333,943 UART: [idev] --
6,338,533 UART: [ldev] ++
6,339,165 UART: [ldev] CDI.KEYID = 6
6,340,083 UART: [ldev] SUBJECT.KEYID = 5
6,341,242 UART: [ldev] AUTHORITY.KEYID = 7
6,342,485 UART: [ldev] FE.KEYID = 1
6,350,424 UART: [ldev] Erasing FE.KEYID = 1
8,820,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,003 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,554,986 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,570,850 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,586,791 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,606,653 UART: [ldev] --
10,610,831 UART: [fwproc] Wait for Commands...
10,613,346 UART: [fwproc] Recv command 0x46574c44
10,615,429 UART: [fwproc] Recv'd Img size: 78704 bytes
13,620,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,695,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,764,264 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,957,292 >>> mbox cmd response: success
13,960,797 UART: [afmc] ++
13,961,428 UART: [afmc] CDI.KEYID = 6
13,962,346 UART: [afmc] SUBJECT.KEYID = 7
13,963,497 UART: [afmc] AUTHORITY.KEYID = 5
16,464,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,182,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,184,907 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,200,889 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,216,695 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,232,432 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,253,793 UART: [afmc] --
18,258,067 UART: [cold-reset] --
18,261,588 UART: [state] Locking Datavault
18,266,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,268,205 UART: [state] Locking ICCM
18,270,938 UART: [exit] Launching FMC @ 0x40000130
18,279,386 UART:
18,279,632 UART: Running Caliptra FMC ...
18,280,726 UART:
18,280,881 UART: [state] CFI Enabled
18,289,025 UART: [fht] FMC Alias Private Key: 7
20,045,708 UART: [art] Extend RT PCRs Done
20,046,925 UART: [art] Lock RT PCRs Done
20,048,620 UART: [art] Populate DV Done
20,054,209 UART: [fht] FMC Alias Private Key: 7
20,055,783 UART: [art] Derive CDI
20,056,545 UART: [art] Store in in slot 0x4
20,099,149 UART: [art] Derive Key Pair
20,100,180 UART: [art] Store priv key in slot 0x5
22,527,238 UART: [art] Derive Key Pair - Done
22,540,392 UART: [art] Signing Cert with AUTHO
22,541,686 UART: RITY.KEYID = 7
24,247,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,249,255 UART: [art] PUB.X = F6CEBF04244311FD9C627F28D54BC9A3678E277066D47F8620EF529E57AC29870699A29A711A1D3BCCEF55EAA17518A4
24,256,515 UART: [art] PUB.Y = C3C2C373521FCAB447B89DD04263F4E6130056D9605DB5D135633B54A0A19CAF7ACBFB99CB8BFA1347F932EF2DD75132
24,263,750 UART: [art] SIG.R = 12EFF7C01BC5D5B61ED3DFAF7D071D98CA907035424857B6DA7E68371AC54E45E0929D66F66F832CB20F35024499A9C4
24,271,141 UART: [art] SIG.S = B077D575040E30FA784E36A55FE33235D1F4D9E190A8B7C8B84BDE2B5D7D84A84C1435A7AC87609BC4F8367EB9361610
25,249,244 UART: mbox::rt_entry...
25,250,195 UART: ____ _ _ _ ____ _____
25,252,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,254,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,256,082 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,258,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,259,927 UART: |_|
25,260,723 UART:
25,374,526 UART: [rt] Runtime listening for mailbox commands...
25,376,673 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,377,177 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,009 UART:
1,268 UART: Running Caliptra ROM ...
2,363 UART:
15,142,118 UART: [state] CFI Enabled
15,153,019 UART: [state] LifecycleState = Production
15,154,768 UART: [state] DebugLocked = Yes
15,157,158 UART: [state] Starting the WD Timer 40000000 cycles
15,162,859 UART: [kat] SHA2-256
15,341,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,353,578 UART: [kat] ++
15,354,119 UART: [kat] sha1
15,365,874 UART: [kat] SHA2-256
15,368,881 UART: [kat] SHA2-384
15,374,759 UART: [kat] SHA2-512-ACC
15,377,747 UART: [kat] ECC-384
17,822,121 UART: [kat] HMAC-384Kdf
17,835,112 UART: [kat] LMS
18,364,657 UART: [kat] --
18,369,887 UART: [warm-reset] ++
18,374,512 UART: [warm-reset] --
18,378,261 UART: [state] Locking Datavault
18,381,991 UART: [state] Locking PCR0, PCR1 and PCR31
18,383,631 UART: [state] Locking ICCM
18,385,504 UART: [exit] Launching FMC @ 0x40000130
18,393,897 UART:
18,394,123 UART: Running Caliptra FMC ...
18,395,213 UART:
18,395,366 UART: [state] CFI Enabled
18,397,360 UART: [aliasrt :skip pcr extension
18,398,771 UART: [art] Extend RT PCRs Done
18,399,913 UART: [art] Lock RT PCRs Done
18,400,979 UART: [art] Populate DV Done
18,406,450 UART: [fht] FMC Alias Private Key: 7
18,408,031 UART: [art] Derive CDI
18,408,842 UART: [art] Store in in slot 0x4
18,451,330 UART: [art] Derive Key Pair
18,452,336 UART: [art] Store priv key in slot 0x5
20,878,940 UART: [art] Derive Key Pair - Done
20,891,883 UART: [art] Signing Cert with AUTHO
20,893,193 UART: RITY.KEYID = 7
22,598,582 UART: [art] Erasing AUTHORITY.KEYID = 7
22,600,088 UART: [art] PUB.X = F6CEBF04244311FD9C627F28D54BC9A3678E277066D47F8620EF529E57AC29870699A29A711A1D3BCCEF55EAA17518A4
22,607,306 UART: [art] PUB.Y = C3C2C373521FCAB447B89DD04263F4E6130056D9605DB5D135633B54A0A19CAF7ACBFB99CB8BFA1347F932EF2DD75132
22,614,604 UART: [art] SIG.R = 12EFF7C01BC5D5B61ED3DFAF7D071D98CA907035424857B6DA7E68371AC54E45E0929D66F66F832CB20F35024499A9C4
22,621,950 UART: [art] SIG.S = B077D575040E30FA784E36A55FE33235D1F4D9E190A8B7C8B84BDE2B5D7D84A84C1435A7AC87609BC4F8367EB9361610
23,600,432 UART: mbox::rt_entry...
23,601,390 UART: ____ _ _ _ ____ _____
23,603,366 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,605,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,607,302 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,609,216 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,611,132 UART: |_|
23,611,960 UART:
23,898,487 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,524 UART:
191,915 UART: Running Caliptra ROM ...
193,083 UART:
193,249 UART: [state] CFI Enabled
262,879 UART: [state] LifecycleState = Production
264,608 UART: [state] DebugLocked = Yes
266,959 UART: [state] Starting the WD Timer 40000000 cycles
272,197 UART: [kat] SHA2-256
451,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,866 UART: [kat] ++
463,393 UART: [kat] sha1
474,592 UART: [kat] SHA2-256
477,664 UART: [kat] SHA2-384
484,083 UART: [kat] SHA2-512-ACC
487,094 UART: [kat] ECC-384
2,950,838 UART: [kat] HMAC-384Kdf
2,972,466 UART: [kat] LMS
3,501,978 UART: [kat] --
3,505,844 UART: [cold-reset] ++
3,508,201 UART: [fht] FHT @ 0x50003400
3,518,037 UART: [idev] ++
3,518,609 UART: [idev] CDI.KEYID = 6
3,519,562 UART: [idev] SUBJECT.KEYID = 7
3,520,735 UART: [idev] UDS.KEYID = 0
3,521,744 ready_for_fw is high
3,521,962 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,348 UART: [idev] Erasing UDS.KEYID = 0
6,027,944 UART: [idev] Sha1 KeyId Algorithm
6,050,698 UART: [idev] --
6,054,800 UART: [ldev] ++
6,055,377 UART: [ldev] CDI.KEYID = 6
6,056,267 UART: [ldev] SUBJECT.KEYID = 5
6,057,502 UART: [ldev] AUTHORITY.KEYID = 7
6,058,742 UART: [ldev] FE.KEYID = 1
6,102,295 UART: [ldev] Erasing FE.KEYID = 1
8,604,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,688 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,685 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,501 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,416 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,490 UART: [ldev] --
10,414,791 UART: [fwproc] Wait for Commands...
10,416,439 UART: [fwproc] Recv command 0x46574c44
10,418,548 UART: [fwproc] Recv'd Img size: 78704 bytes
13,422,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,571,079 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,763,948 >>> mbox cmd response: success
13,767,654 UART: [afmc] ++
13,768,274 UART: [afmc] CDI.KEYID = 6
13,769,190 UART: [afmc] SUBJECT.KEYID = 7
13,770,352 UART: [afmc] AUTHORITY.KEYID = 5
16,293,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,018,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,020,301 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,036,285 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,152 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,067,902 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,089,061 UART: [afmc] --
18,092,260 UART: [cold-reset] --
18,094,952 UART: [state] Locking Datavault
18,100,674 UART: [state] Locking PCR0, PCR1 and PCR31
18,102,380 UART: [state] Locking ICCM
18,103,427 UART: [exit] Launching FMC @ 0x40000130
18,111,839 UART:
18,112,072 UART: Running Caliptra FMC ...
18,113,170 UART:
18,113,324 UART: [state] CFI Enabled
18,177,475 UART: [fht] FMC Alias Private Key: 7
19,940,959 UART: [art] Extend RT PCRs Done
19,942,175 UART: [art] Lock RT PCRs Done
19,943,686 UART: [art] Populate DV Done
19,949,367 UART: [fht] FMC Alias Private Key: 7
19,951,063 UART: [art] Derive CDI
19,951,876 UART: [art] Store in in slot 0x4
20,009,617 UART: [art] Derive Key Pair
20,010,624 UART: [art] Store priv key in slot 0x5
22,473,184 UART: [art] Derive Key Pair - Done
22,486,012 UART: [art] Signing Cert with AUTHO
22,487,318 UART: RITY.KEYID = 7
24,198,896 UART: [art] Erasing AUTHORITY.KEYID = 7
24,200,399 UART: [art] PUB.X = 70AA1FD7BA79A941761AB81A785CE3EAF723BC2E672EB311E8D06FE44A9E99390BE3DD17B059F31A871633A5A72A8EA5
24,207,697 UART: [art] PUB.Y = F782B6DE876164DC4E2E54351172C70291C0007FF29B048169469FF2E16753A66AC175301DCB5D82B1F9AAD822AEC9CE
24,214,923 UART: [art] SIG.R = AAD27A704C37023D60EC9A2D0456F505719250A8788004626F50E0413AFA325AF5368684EFFCF8BA73A5BBE8F97D9670
24,222,320 UART: [art] SIG.S = A0BFEB828DECAE960F536B87096764FDE3E9BE21DD69F193A1F9E4C9115585BB6D595651CE094E90526413AAF7ADFD26
25,201,048 UART: mbox::rt_entry...
25,201,998 UART: ____ _ _ _ ____ _____
25,203,980 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,205,982 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,207,910 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,209,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,211,759 UART: |_|
25,212,592 UART:
25,326,794 UART: [rt] Runtime listening for mailbox commands...
25,328,864 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,329,375 >>> mbox cmd response data (0 bytes)
Initializing fuses
989 UART:
1,167 UART: Running Caliptra ROM ...
2,187 UART:
2,331 UART: [state] CFI Enabled
60,120 UART: [state] LifecycleState = Production
61,883 UART: [state] DebugLocked = Yes
63,380 UART: [state] Starting the WD Timer 40000000 cycles
68,481 UART: [kat] SHA2-256
247,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
259,198 UART: [kat] ++
259,645 UART: [kat] sha1
271,279 UART: [kat] SHA2-256
274,343 UART: [kat] SHA2-384
279,453 UART: [kat] SHA2-512-ACC
282,434 UART: [kat] ECC-384
2,745,036 UART: [kat] HMAC-384Kdf
2,768,499 UART: [kat] LMS
3,297,973 UART: [kat] --
3,302,881 UART: [warm-reset] ++
3,307,237 UART: [warm-reset] --
3,310,182 UART: [state] Locking Datavault
3,313,057 UART: [state] Locking PCR0, PCR1 and PCR31
3,314,706 UART: [state] Locking ICCM
3,317,453 UART: [exit] Launching FMC @ 0x40000130
3,325,853 UART:
3,326,128 UART: Running Caliptra FMC ...
3,327,240 UART:
3,327,400 UART: [state] CFI Enabled
3,378,301 UART: [aliasrt :skip pcr extension
3,379,552 UART: [art] Extend RT PCRs Done
3,380,690 UART: [art] Lock RT PCRs Done
3,381,770 UART: [art] Populate DV Done
3,387,448 UART: [fht] FMC Alias Private Key: 7
3,388,929 UART: [art] Derive CDI
3,389,692 UART: [art] Store in in slot 0x4
3,446,865 UART: [art] Derive Key Pair
3,447,917 UART: [art] Store priv key in slot 0x5
5,910,662 UART: [art] Derive Key Pair - Done
5,923,761 UART: [art] Signing Cert with AUTHO
5,925,061 UART: RITY.KEYID = 7
7,636,285 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,793 UART: [art] PUB.X = 70AA1FD7BA79A941761AB81A785CE3EAF723BC2E672EB311E8D06FE44A9E99390BE3DD17B059F31A871633A5A72A8EA5
7,645,086 UART: [art] PUB.Y = F782B6DE876164DC4E2E54351172C70291C0007FF29B048169469FF2E16753A66AC175301DCB5D82B1F9AAD822AEC9CE
7,652,293 UART: [art] SIG.R = AAD27A704C37023D60EC9A2D0456F505719250A8788004626F50E0413AFA325AF5368684EFFCF8BA73A5BBE8F97D9670
7,659,692 UART: [art] SIG.S = A0BFEB828DECAE960F536B87096764FDE3E9BE21DD69F193A1F9E4C9115585BB6D595651CE094E90526413AAF7ADFD26
8,638,796 UART: mbox::rt_entry...
8,639,732 UART: ____ _ _ _ ____ _____
8,641,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,354 UART: |_|
8,650,233 UART:
8,934,531 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
191,589 UART:
191,943 UART: Running Caliptra ROM ...
193,110 UART:
193,260 UART: [state] CFI Enabled
263,559 UART: [state] LifecycleState = Production
265,331 UART: [state] DebugLocked = Yes
267,551 UART: [state] Starting the WD Timer 40000000 cycles
272,580 UART: [kat] SHA2-256
451,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,297 UART: [kat] ++
463,821 UART: [kat] sha1
474,585 UART: [kat] SHA2-256
477,605 UART: [kat] SHA2-384
483,073 UART: [kat] SHA2-512-ACC
486,016 UART: [kat] ECC-384
2,946,370 UART: [kat] HMAC-384Kdf
2,972,400 UART: [kat] LMS
3,501,851 UART: [kat] --
3,507,691 UART: [cold-reset] ++
3,510,265 UART: [fht] FHT @ 0x50003400
3,522,326 UART: [idev] ++
3,522,943 UART: [idev] CDI.KEYID = 6
3,523,883 UART: [idev] SUBJECT.KEYID = 7
3,525,064 UART: [idev] UDS.KEYID = 0
3,525,994 ready_for_fw is high
3,526,219 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,625,412 UART: [idev] Erasing UDS.KEYID = 0
6,048,357 UART: [idev] Sha1 KeyId Algorithm
6,071,172 UART: [idev] --
6,074,361 UART: [ldev] ++
6,074,938 UART: [ldev] CDI.KEYID = 6
6,075,851 UART: [ldev] SUBJECT.KEYID = 5
6,077,116 UART: [ldev] AUTHORITY.KEYID = 7
6,078,311 UART: [ldev] FE.KEYID = 1
6,123,089 UART: [ldev] Erasing FE.KEYID = 1
8,626,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,226 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,380,219 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,396,034 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,411,977 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,431,728 UART: [ldev] --
10,435,530 UART: [fwproc] Wait for Commands...
10,438,160 UART: [fwproc] Recv command 0x46574c44
10,440,249 UART: [fwproc] Recv'd Img size: 78704 bytes
13,438,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,507,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,575,951 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,770,077 >>> mbox cmd response: success
13,775,065 UART: [afmc] ++
13,775,687 UART: [afmc] CDI.KEYID = 6
13,776,596 UART: [afmc] SUBJECT.KEYID = 7
13,777,763 UART: [afmc] AUTHORITY.KEYID = 5
16,316,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,042,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,044,366 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,060,358 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,076,228 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,091,974 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,115,576 UART: [afmc] --
18,118,719 UART: [cold-reset] --
18,121,823 UART: [state] Locking Datavault
18,127,075 UART: [state] Locking PCR0, PCR1 and PCR31
18,128,725 UART: [state] Locking ICCM
18,130,771 UART: [exit] Launching FMC @ 0x40000130
18,139,165 UART:
18,139,402 UART: Running Caliptra FMC ...
18,140,501 UART:
18,140,663 UART: [state] CFI Enabled
18,201,892 UART: [fht] FMC Alias Private Key: 7
19,966,064 UART: [art] Extend RT PCRs Done
19,967,291 UART: [art] Lock RT PCRs Done
19,968,752 UART: [art] Populate DV Done
19,974,168 UART: [fht] FMC Alias Private Key: 7
19,975,865 UART: [art] Derive CDI
19,976,675 UART: [art] Store in in slot 0x4
20,034,474 UART: [art] Derive Key Pair
20,035,536 UART: [art] Store priv key in slot 0x5
22,498,295 UART: [art] Derive Key Pair - Done
22,511,297 UART: [art] Signing Cert with AUTHO
22,512,603 UART: RITY.KEYID = 7
24,224,433 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,939 UART: [art] PUB.X = A14DD78A028A5075C3141FF593D5E73B5FAF94BDF6EAABCA0B4D2321FE45239F60CA6F3A1D4B426F9501108E0CDD7F43
24,233,240 UART: [art] PUB.Y = 9878DE04EE3F05FE43B1C96E2AB0456C6CB9C64797C174229A211BC3A316D1BAE977108DB3B50724AF7FC97060656D7C
24,240,531 UART: [art] SIG.R = 16C0C535828F2BBFC2138F8175230DA6ED98739110F7089BA2D70DDCC65278BFFD856EF51018AA52F79D7A92C9B78045
24,247,892 UART: [art] SIG.S = 62CFE5C4062D8AEA04E5B065BD3A7C519BA2A5DE63A72347552121CBB5A9040391DB37BD6FB103F673F17F5A64B92F17
25,226,519 UART: mbox::rt_entry...
25,227,479 UART: ____ _ _ _ ____ _____
25,229,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,231,419 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,233,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,235,279 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,237,207 UART: |_|
25,238,042 UART:
25,351,885 UART: [rt] Runtime listening for mailbox commands...
25,353,891 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,354,398 >>> mbox cmd response data (0 bytes)
Initializing fuses
975 UART:
1,221 UART: Running Caliptra ROM ...
2,541 UART:
2,704 UART: [state] CFI Enabled
63,915 UART: [state] LifecycleState = Production
65,641 UART: [state] DebugLocked = Yes
68,674 UART: [state] Starting the WD Timer 40000000 cycles
73,944 UART: [kat] SHA2-256
253,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,677 UART: [kat] ++
265,121 UART: [kat] sha1
275,998 UART: [kat] SHA2-256
279,055 UART: [kat] SHA2-384
285,899 UART: [kat] SHA2-512-ACC
288,878 UART: [kat] ECC-384
2,745,792 UART: [kat] HMAC-384Kdf
2,769,357 UART: [kat] LMS
3,298,807 UART: [kat] --
3,302,634 UART: [warm-reset] ++
3,307,971 UART: [warm-reset] --
3,311,205 UART: [state] Locking Datavault
3,313,536 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,186 UART: [state] Locking ICCM
3,316,744 UART: [exit] Launching FMC @ 0x40000130
3,325,197 UART:
3,325,431 UART: Running Caliptra FMC ...
3,326,532 UART:
3,326,691 UART: [state] CFI Enabled
3,377,867 UART: [aliasrt :skip pcr extension
3,379,162 UART: [art] Extend RT PCRs Done
3,380,309 UART: [art] Lock RT PCRs Done
3,381,701 UART: [art] Populate DV Done
3,387,266 UART: [fht] FMC Alias Private Key: 7
3,388,959 UART: [art] Derive CDI
3,389,771 UART: [art] Store in in slot 0x4
3,446,298 UART: [art] Derive Key Pair
3,447,362 UART: [art] Store priv key in slot 0x5
5,910,025 UART: [art] Derive Key Pair - Done
5,922,911 UART: [art] Signing Cert with AUTHO
5,924,241 UART: RITY.KEYID = 7
7,635,574 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,085 UART: [art] PUB.X = A14DD78A028A5075C3141FF593D5E73B5FAF94BDF6EAABCA0B4D2321FE45239F60CA6F3A1D4B426F9501108E0CDD7F43
7,644,364 UART: [art] PUB.Y = 9878DE04EE3F05FE43B1C96E2AB0456C6CB9C64797C174229A211BC3A316D1BAE977108DB3B50724AF7FC97060656D7C
7,651,617 UART: [art] SIG.R = 16C0C535828F2BBFC2138F8175230DA6ED98739110F7089BA2D70DDCC65278BFFD856EF51018AA52F79D7A92C9B78045
7,659,028 UART: [art] SIG.S = 62CFE5C4062D8AEA04E5B065BD3A7C519BA2A5DE63A72347552121CBB5A9040391DB37BD6FB103F673F17F5A64B92F17
8,637,370 UART: mbox::rt_entry...
8,638,333 UART: ____ _ _ _ ____ _____
8,640,319 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,642,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,457 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,254 UART: |_|
8,649,193 UART:
8,936,124 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
191,727 UART:
192,102 UART: Running Caliptra ROM ...
193,379 UART:
603,017 UART: [state] CFI Enabled
617,861 UART: [state] LifecycleState = Production
619,625 UART: [state] DebugLocked = Yes
621,184 UART: [state] Starting the WD Timer 40000000 cycles
625,918 UART: [kat] SHA2-256
805,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,639 UART: [kat] ++
817,166 UART: [kat] sha1
828,490 UART: [kat] SHA2-256
831,510 UART: [kat] SHA2-384
838,313 UART: [kat] SHA2-512-ACC
841,260 UART: [kat] ECC-384
3,283,672 UART: [kat] HMAC-384Kdf
3,295,778 UART: [kat] LMS
3,825,336 UART: [kat] --
3,829,283 UART: [cold-reset] ++
3,830,283 UART: [fht] FHT @ 0x50003400
3,840,419 UART: [idev] ++
3,840,987 UART: [idev] CDI.KEYID = 6
3,841,891 UART: [idev] SUBJECT.KEYID = 7
3,843,050 UART: [idev] UDS.KEYID = 0
3,844,092 ready_for_fw is high
3,844,337 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,943,428 UART: [idev] Erasing UDS.KEYID = 0
6,314,119 UART: [idev] Sha1 KeyId Algorithm
6,336,469 UART: [idev] --
6,340,633 UART: [ldev] ++
6,341,203 UART: [ldev] CDI.KEYID = 6
6,342,113 UART: [ldev] SUBJECT.KEYID = 5
6,343,319 UART: [ldev] AUTHORITY.KEYID = 7
6,344,544 UART: [ldev] FE.KEYID = 1
6,354,547 UART: [ldev] Erasing FE.KEYID = 1
8,823,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,107 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,559,134 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,574,944 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,590,940 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,611,171 UART: [ldev] --
10,615,357 UART: [fwproc] Wait for Commands...
10,616,906 UART: [fwproc] Recv command 0x46574c44
10,618,988 UART: [fwproc] Recv'd Img size: 78704 bytes
13,615,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,690,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,759,350 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,952,342 >>> mbox cmd response: success
13,956,772 UART: [afmc] ++
13,957,382 UART: [afmc] CDI.KEYID = 6
13,958,266 UART: [afmc] SUBJECT.KEYID = 7
13,959,478 UART: [afmc] AUTHORITY.KEYID = 5
16,460,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,180,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,182,075 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,198,084 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,213,907 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,229,605 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,251,773 UART: [afmc] --
18,255,829 UART: [cold-reset] --
18,259,577 UART: [state] Locking Datavault
18,263,033 UART: [state] Locking PCR0, PCR1 and PCR31
18,264,671 UART: [state] Locking ICCM
18,266,379 UART: [exit] Launching FMC @ 0x40000130
18,274,831 UART:
18,275,100 UART: Running Caliptra FMC ...
18,276,203 UART:
18,276,355 UART: [state] CFI Enabled
18,284,200 UART: [fht] FMC Alias Private Key: 7
20,040,916 UART: [art] Extend RT PCRs Done
20,042,149 UART: [art] Lock RT PCRs Done
20,043,830 UART: [art] Populate DV Done
20,049,397 UART: [fht] FMC Alias Private Key: 7
20,051,042 UART: [art] Derive CDI
20,051,859 UART: [art] Store in in slot 0x4
20,094,433 UART: [art] Derive Key Pair
20,095,540 UART: [art] Store priv key in slot 0x5
22,521,835 UART: [art] Derive Key Pair - Done
22,534,881 UART: [art] Signing Cert with AUTHO
22,536,174 UART: RITY.KEYID = 7
24,241,872 UART: [art] Erasing AUTHORITY.KEYID = 7
24,243,368 UART: [art] PUB.X = 6EB68DAFD38EA8A9CF3D0C44337D6DD818164E013E06DE99D4660CD426B7BD5A0C14E1E23796ADBA4696FD63634A9ADF
24,250,654 UART: [art] PUB.Y = 25F41D606D06D740C410F45740FB1FA91705CD26C5CD24D719ABFBFB1936E828058FB61B686F88765E832A675B0BA2D1
24,257,926 UART: [art] SIG.R = 6944FB59E404CD25CE3684D28762890D6EEF864D9EBEBF035E7DAD599F5AD222581B2668F6D386EDB2490976E15060D7
24,265,328 UART: [art] SIG.S = AC734DFC534633455ADC97D2737946795FE27988A76050110B54E6A5CFD2607AC01CF68E309BEEBEF34C215486DC24EB
25,244,053 UART: mbox::rt_entry...
25,245,005 UART: ____ _ _ _ ____ _____
25,246,987 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,248,982 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,250,901 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,252,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,254,736 UART: |_|
25,255,563 UART:
25,369,603 UART: [rt] Runtime listening for mailbox commands...
25,371,608 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,372,104 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,011 UART:
1,261 UART: Running Caliptra ROM ...
2,360 UART:
15,155,690 UART: [state] CFI Enabled
15,169,725 UART: [state] LifecycleState = Production
15,171,473 UART: [state] DebugLocked = Yes
15,173,565 UART: [state] Starting the WD Timer 40000000 cycles
15,177,747 UART: [kat] SHA2-256
15,356,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,368,495 UART: [kat] ++
15,368,944 UART: [kat] sha1
15,380,897 UART: [kat] SHA2-256
15,383,948 UART: [kat] SHA2-384
15,390,042 UART: [kat] SHA2-512-ACC
15,392,979 UART: [kat] ECC-384
17,835,780 UART: [kat] HMAC-384Kdf
17,847,781 UART: [kat] LMS
18,377,330 UART: [kat] --
18,382,126 UART: [warm-reset] ++
18,384,931 UART: [warm-reset] --
18,388,894 UART: [state] Locking Datavault
18,392,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,394,418 UART: [state] Locking ICCM
18,396,342 UART: [exit] Launching FMC @ 0x40000130
18,404,785 UART:
18,405,011 UART: Running Caliptra FMC ...
18,406,105 UART:
18,406,255 UART: [state] CFI Enabled
18,408,189 UART: [aliasrt :skip pcr extension
18,409,428 UART: [art] Extend RT PCRs Done
18,410,555 UART: [art] Lock RT PCRs Done
18,411,828 UART: [art] Populate DV Done
18,417,064 UART: [fht] FMC Alias Private Key: 7
18,418,586 UART: [art] Derive CDI
18,419,329 UART: [art] Store in in slot 0x4
18,462,594 UART: [art] Derive Key Pair
18,463,607 UART: [art] Store priv key in slot 0x5
20,890,596 UART: [art] Derive Key Pair - Done
20,903,694 UART: [art] Signing Cert with AUTHO
20,905,020 UART: RITY.KEYID = 7
22,610,521 UART: [art] Erasing AUTHORITY.KEYID = 7
22,612,012 UART: [art] PUB.X = 6EB68DAFD38EA8A9CF3D0C44337D6DD818164E013E06DE99D4660CD426B7BD5A0C14E1E23796ADBA4696FD63634A9ADF
22,619,310 UART: [art] PUB.Y = 25F41D606D06D740C410F45740FB1FA91705CD26C5CD24D719ABFBFB1936E828058FB61B686F88765E832A675B0BA2D1
22,626,539 UART: [art] SIG.R = 6944FB59E404CD25CE3684D28762890D6EEF864D9EBEBF035E7DAD599F5AD222581B2668F6D386EDB2490976E15060D7
22,633,941 UART: [art] SIG.S = AC734DFC534633455ADC97D2737946795FE27988A76050110B54E6A5CFD2607AC01CF68E309BEEBEF34C215486DC24EB
23,612,793 UART: mbox::rt_entry...
23,613,752 UART: ____ _ _ _ ____ _____
23,615,676 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,617,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,619,744 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,621,678 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,623,548 UART: |_|
23,624,370 UART:
23,912,895 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
191,986 UART:
192,351 UART: Running Caliptra ROM ...
193,428 UART:
602,928 UART: [state] CFI Enabled
616,391 UART: [state] LifecycleState = Production
618,084 UART: [state] DebugLocked = Yes
620,287 UART: [state] Starting the WD Timer 40000000 cycles
625,450 UART: [kat] SHA2-256
804,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,191 UART: [kat] ++
816,712 UART: [kat] sha1
826,978 UART: [kat] SHA2-256
830,050 UART: [kat] SHA2-384
836,247 UART: [kat] SHA2-512-ACC
839,173 UART: [kat] ECC-384
3,281,294 UART: [kat] HMAC-384Kdf
3,294,055 UART: [kat] LMS
3,823,523 UART: [kat] --
3,828,581 UART: [cold-reset] ++
3,829,578 UART: [fht] FHT @ 0x50003400
3,840,471 UART: [idev] ++
3,841,022 UART: [idev] CDI.KEYID = 6
3,842,001 UART: [idev] SUBJECT.KEYID = 7
3,843,165 UART: [idev] UDS.KEYID = 0
3,844,103 ready_for_fw is high
3,844,300 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,943,281 UART: [idev] Erasing UDS.KEYID = 0
6,317,064 UART: [idev] Sha1 KeyId Algorithm
6,339,998 UART: [idev] --
6,344,415 UART: [ldev] ++
6,344,973 UART: [ldev] CDI.KEYID = 6
6,345,872 UART: [ldev] SUBJECT.KEYID = 5
6,347,074 UART: [ldev] AUTHORITY.KEYID = 7
6,348,353 UART: [ldev] FE.KEYID = 1
6,360,610 UART: [ldev] Erasing FE.KEYID = 1
8,836,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,739 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,571,726 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,540 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,603,489 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,624,823 UART: [ldev] --
10,629,530 UART: [fwproc] Wait for Commands...
10,631,193 UART: [fwproc] Recv command 0x46574c44
10,633,278 UART: [fwproc] Recv'd Img size: 78704 bytes
13,637,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,708,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,777,522 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,970,800 >>> mbox cmd response: success
13,975,287 UART: [afmc] ++
13,975,905 UART: [afmc] CDI.KEYID = 6
13,976,809 UART: [afmc] SUBJECT.KEYID = 7
13,977,963 UART: [afmc] AUTHORITY.KEYID = 5
16,473,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,194,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,196,549 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,212,509 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,228,391 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,244,119 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,266,594 UART: [afmc] --
18,270,433 UART: [cold-reset] --
18,273,640 UART: [state] Locking Datavault
18,280,886 UART: [state] Locking PCR0, PCR1 and PCR31
18,282,524 UART: [state] Locking ICCM
18,285,311 UART: [exit] Launching FMC @ 0x40000130
18,293,750 UART:
18,293,980 UART: Running Caliptra FMC ...
18,295,072 UART:
18,295,228 UART: [state] CFI Enabled
18,303,387 UART: [fht] FMC Alias Private Key: 7
20,060,150 UART: [art] Extend RT PCRs Done
20,061,696 UART: [art] Lock RT PCRs Done
20,063,196 UART: [art] Populate DV Done
20,068,644 UART: [fht] FMC Alias Private Key: 7
20,070,308 UART: [art] Derive CDI
20,071,072 UART: [art] Store in in slot 0x4
20,113,798 UART: [art] Derive Key Pair
20,114,797 UART: [art] Store priv key in slot 0x5
22,541,530 UART: [art] Derive Key Pair - Done
22,554,542 UART: [art] Signing Cert with AUTHO
22,555,845 UART: RITY.KEYID = 7
24,261,703 UART: [art] Erasing AUTHORITY.KEYID = 7
24,263,207 UART: [art] PUB.X = 2054FFB16C6577D2837AF6595D4A8F0CD5E5FE12E9EC835CE33FEDEF21A3D61544F55169CB4F244A1F7679DE625FBA24
24,270,495 UART: [art] PUB.Y = EDE1EE05C366A74B009C37FBCCA2D871EAD87024C799EDF99CF4E17558FA5371F75E3A0AB2B4E9AFE3D182B6B24C8B60
24,277,821 UART: [art] SIG.R = 33241C7570BF6B062E57C01EFB5A7B19A63E253D09B853CEC61CA092C26D544B434A9EB92C68EB2509E99051C7ADF7E9
24,285,196 UART: [art] SIG.S = 9014AD4AB983C8B098008E0AABDDABE52D91AD189D791315E0AAD8F414ABE7294D970ADC90EC5196DC2785EBF19DD084
25,263,811 UART: mbox::rt_entry...
25,265,066 UART: ____ _ _ _ ____ _____
25,266,982 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,269,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,270,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,272,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,274,711 UART: |_|
25,275,511 UART:
25,388,376 UART: [rt] Runtime listening for mailbox commands...
25,390,386 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,390,898 >>> mbox cmd response data (0 bytes)
Initializing fuses
990 UART:
1,233 UART: Running Caliptra ROM ...
2,331 UART:
15,137,267 UART: [state] CFI Enabled
15,152,635 UART: [state] LifecycleState = Production
15,154,362 UART: [state] DebugLocked = Yes
15,156,546 UART: [state] Starting the WD Timer 40000000 cycles
15,160,751 UART: [kat] SHA2-256
15,339,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,351,470 UART: [kat] ++
15,352,008 UART: [kat] sha1
15,363,549 UART: [kat] SHA2-256
15,366,561 UART: [kat] SHA2-384
15,372,269 UART: [kat] SHA2-512-ACC
15,375,252 UART: [kat] ECC-384
17,818,512 UART: [kat] HMAC-384Kdf
17,830,254 UART: [kat] LMS
18,359,782 UART: [kat] --
18,364,968 UART: [warm-reset] ++
18,370,087 UART: [warm-reset] --
18,372,601 UART: [state] Locking Datavault
18,375,573 UART: [state] Locking PCR0, PCR1 and PCR31
18,377,214 UART: [state] Locking ICCM
18,378,590 UART: [exit] Launching FMC @ 0x40000130
18,387,032 UART:
18,387,270 UART: Running Caliptra FMC ...
18,388,289 UART:
18,388,430 UART: [state] CFI Enabled
18,390,690 UART: [aliasrt :skip pcr extension
18,391,925 UART: [art] Extend RT PCRs Done
18,393,057 UART: [art] Lock RT PCRs Done
18,394,227 UART: [art] Populate DV Done
18,399,788 UART: [fht] FMC Alias Private Key: 7
18,401,315 UART: [art] Derive CDI
18,402,119 UART: [art] Store in in slot 0x4
18,444,759 UART: [art] Derive Key Pair
18,445,800 UART: [art] Store priv key in slot 0x5
20,872,278 UART: [art] Derive Key Pair - Done
20,885,271 UART: [art] Signing Cert with AUTHO
20,886,590 UART: RITY.KEYID = 7
22,592,023 UART: [art] Erasing AUTHORITY.KEYID = 7
22,593,529 UART: [art] PUB.X = 2054FFB16C6577D2837AF6595D4A8F0CD5E5FE12E9EC835CE33FEDEF21A3D61544F55169CB4F244A1F7679DE625FBA24
22,600,840 UART: [art] PUB.Y = EDE1EE05C366A74B009C37FBCCA2D871EAD87024C799EDF99CF4E17558FA5371F75E3A0AB2B4E9AFE3D182B6B24C8B60
22,608,127 UART: [art] SIG.R = 33241C7570BF6B062E57C01EFB5A7B19A63E253D09B853CEC61CA092C26D544B434A9EB92C68EB2509E99051C7ADF7E9
22,615,514 UART: [art] SIG.S = 9014AD4AB983C8B098008E0AABDDABE52D91AD189D791315E0AAD8F414ABE7294D970ADC90EC5196DC2785EBF19DD084
23,593,707 UART: mbox::rt_entry...
23,594,665 UART: ____ _ _ _ ____ _____
23,596,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,598,587 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,600,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,602,347 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,604,217 UART: |_|
23,605,014 UART:
23,890,869 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Production
85,691 UART: [state] DebugLocked = Yes
86,385 UART: [state] Starting the WD Timer 40000000 cycles
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,418 UART: [idev] ++
1,173,586 UART: [idev] CDI.KEYID = 6
1,173,947 UART: [idev] SUBJECT.KEYID = 7
1,174,372 UART: [idev] UDS.KEYID = 0
1,174,718 ready_for_fw is high
1,174,718 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,435 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,494 UART: [ldev] ++
1,209,662 UART: [ldev] CDI.KEYID = 6
1,210,026 UART: [ldev] SUBJECT.KEYID = 5
1,210,453 UART: [ldev] AUTHORITY.KEYID = 7
1,210,916 UART: [ldev] FE.KEYID = 1
1,216,156 UART: [ldev] Erasing FE.KEYID = 1
1,242,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,823 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,517 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,387 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,093 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,223 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,277 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,670 >>> mbox cmd response: success
2,337,754 UART: [afmc] ++
2,337,922 UART: [afmc] CDI.KEYID = 6
2,338,285 UART: [afmc] SUBJECT.KEYID = 7
2,338,711 UART: [afmc] AUTHORITY.KEYID = 5
2,373,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,137 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,856 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,749 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,456 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,337 UART: [afmc] --
2,417,398 UART: [cold-reset] --
2,418,382 UART: [state] Locking Datavault
2,419,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,301 UART: [state] Locking ICCM
2,420,767 UART: [exit] Launching FMC @ 0x40000130
2,426,096 UART:
2,426,112 UART: Running Caliptra FMC ...
2,426,520 UART:
2,426,574 UART: [state] CFI Enabled
2,437,141 UART: [fht] FMC Alias Private Key: 7
2,545,414 UART: [art] Extend RT PCRs Done
2,545,842 UART: [art] Lock RT PCRs Done
2,547,718 UART: [art] Populate DV Done
2,556,116 UART: [fht] FMC Alias Private Key: 7
2,557,076 UART: [art] Derive CDI
2,557,356 UART: [art] Store in in slot 0x4
2,643,055 UART: [art] Derive Key Pair
2,643,415 UART: [art] Store priv key in slot 0x5
2,656,543 UART: [art] Derive Key Pair - Done
2,671,149 UART: [art] Signing Cert with AUTHO
2,671,629 UART: RITY.KEYID = 7
2,686,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,648 UART: [art] PUB.X = 7FCE109D1A051787391D466659489DA740C0AEA6825A2379C7D28243D2AFE5FFA540AADA46DB37CFF4C6CBEA68D05E4F
2,694,431 UART: [art] PUB.Y = 95C3B86374CC6473FAF7910E73F8B755417DFD363F73A3E267893211E0F1851C938A2BC6BA59FCFBDA435F2CF6F75F55
2,701,386 UART: [art] SIG.R = 6E9A9DEDADC42933D1C838EBFBBDAFB5A5857CEA333CC0A82FD71B166065087E470FCD9698ED679C1918E33A2F4E28F2
2,708,170 UART: [art] SIG.S = B61D12218F379564B04C8E65EBC48BC8128DC97C304C81E5D905DDE63E917575FA5147D3CC4BE58CBBE0F2AA3D9D0969
2,731,259 UART: mbox::rt_entry...
2,731,631 UART: ____ _ _ _ ____ _____
2,732,415 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,983 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,519 UART: |_|
2,735,831 UART:
2,842,673 UART: [rt] Runtime listening for mailbox commands...
2,843,435 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,550 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,644 UART:
2,843,660 UART: Running Caliptra ROM ...
2,844,068 UART:
2,844,123 UART: [state] CFI Enabled
2,847,036 UART: [state] LifecycleState = Production
2,847,644 UART: [state] DebugLocked = Yes
2,848,406 UART: [state] Starting the WD Timer 40000000 cycles
2,850,059 UART: [kat] SHA2-256
3,653,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,738 UART: [kat] ++
3,657,890 UART: [kat] sha1
3,662,202 UART: [kat] SHA2-256
3,664,142 UART: [kat] SHA2-384
3,666,947 UART: [kat] SHA2-512-ACC
3,668,848 UART: [kat] ECC-384
3,678,617 UART: [kat] HMAC-384Kdf
3,683,071 UART: [kat] LMS
3,931,383 UART: [kat] --
3,932,049 UART: [warm-reset] ++
3,933,216 UART: [warm-reset] --
3,934,175 UART: [state] Locking Datavault
3,935,119 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,723 UART: [state] Locking ICCM
3,936,235 UART: [exit] Launching FMC @ 0x40000130
3,941,564 UART:
3,941,580 UART: Running Caliptra FMC ...
3,941,988 UART:
3,942,042 UART: [state] CFI Enabled
3,943,155 UART: [aliasrt :skip pcr extension
3,943,628 UART: [art] Extend RT PCRs Done
3,944,056 UART: [art] Lock RT PCRs Done
3,945,213 UART: [art] Populate DV Done
3,953,531 UART: [fht] FMC Alias Private Key: 7
3,954,467 UART: [art] Derive CDI
3,954,747 UART: [art] Store in in slot 0x4
4,040,150 UART: [art] Derive Key Pair
4,040,510 UART: [art] Store priv key in slot 0x5
4,053,750 UART: [art] Derive Key Pair - Done
4,068,528 UART: [art] Signing Cert with AUTHO
4,069,008 UART: RITY.KEYID = 7
4,083,738 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,503 UART: [art] PUB.X = 7FCE109D1A051787391D466659489DA740C0AEA6825A2379C7D28243D2AFE5FFA540AADA46DB37CFF4C6CBEA68D05E4F
4,091,286 UART: [art] PUB.Y = 95C3B86374CC6473FAF7910E73F8B755417DFD363F73A3E267893211E0F1851C938A2BC6BA59FCFBDA435F2CF6F75F55
4,098,241 UART: [art] SIG.R = 6E9A9DEDADC42933D1C838EBFBBDAFB5A5857CEA333CC0A82FD71B166065087E470FCD9698ED679C1918E33A2F4E28F2
4,105,025 UART: [art] SIG.S = B61D12218F379564B04C8E65EBC48BC8128DC97C304C81E5D905DDE63E917575FA5147D3CC4BE58CBBE0F2AA3D9D0969
4,128,348 UART: mbox::rt_entry...
4,128,720 UART: ____ _ _ _ ____ _____
4,129,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,840 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,608 UART: |_|
4,132,920 UART:
4,418,014 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Production
85,629 UART: [state] DebugLocked = Yes
86,351 UART: [state] Starting the WD Timer 40000000 cycles
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 ready_for_fw is high
1,174,302 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,198,670 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,724 UART: [ldev] ++
1,208,892 UART: [ldev] CDI.KEYID = 6
1,209,256 UART: [ldev] SUBJECT.KEYID = 5
1,209,683 UART: [ldev] AUTHORITY.KEYID = 7
1,210,146 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,549 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,243 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,113 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,819 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,897 UART: [ldev] --
1,280,363 UART: [fwproc] Wait for Commands...
1,281,092 UART: [fwproc] Recv command 0x46574c44
1,281,825 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,629 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,892 >>> mbox cmd response: success
2,337,094 UART: [afmc] ++
2,337,262 UART: [afmc] CDI.KEYID = 6
2,337,625 UART: [afmc] SUBJECT.KEYID = 7
2,338,051 UART: [afmc] AUTHORITY.KEYID = 5
2,373,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,843 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,562 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,455 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,162 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,027 UART: [afmc] --
2,417,038 UART: [cold-reset] --
2,418,104 UART: [state] Locking Datavault
2,419,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,905 UART: [state] Locking ICCM
2,420,361 UART: [exit] Launching FMC @ 0x40000130
2,425,690 UART:
2,425,706 UART: Running Caliptra FMC ...
2,426,114 UART:
2,426,168 UART: [state] CFI Enabled
2,436,341 UART: [fht] FMC Alias Private Key: 7
2,544,786 UART: [art] Extend RT PCRs Done
2,545,214 UART: [art] Lock RT PCRs Done
2,546,576 UART: [art] Populate DV Done
2,554,748 UART: [fht] FMC Alias Private Key: 7
2,555,816 UART: [art] Derive CDI
2,556,096 UART: [art] Store in in slot 0x4
2,641,753 UART: [art] Derive Key Pair
2,642,113 UART: [art] Store priv key in slot 0x5
2,654,273 UART: [art] Derive Key Pair - Done
2,668,781 UART: [art] Signing Cert with AUTHO
2,669,261 UART: RITY.KEYID = 7
2,684,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,430 UART: [art] PUB.X = 6706A5E46F3BFCC79C1ECABE0F4670A58F62A7F967F9DC6728DEA2AF3AB381C05042086AE1D2933B9BD234EA117C203A
2,692,207 UART: [art] PUB.Y = C8A035CD9B32017B821DF6D280610AB239CBF8126CBDBACE8CE4B82819C699E9E8FF5F5E3DABFA724C9797AA06E45C3E
2,699,170 UART: [art] SIG.R = A68D6625EF5484EE6F01342BF5D497ABB9BA0D0111D3BF6180406A26F646F820E3B6A55487384346AAC65D9CC7FE31BC
2,705,939 UART: [art] SIG.S = A5A0352B140D6ACE469E31C85F192ABFAF2D6281C9446041F0B040EFB0B2D99422AA5CC2901589C3427AF507A1683114
2,729,378 UART: mbox::rt_entry...
2,729,750 UART: ____ _ _ _ ____ _____
2,730,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,638 UART: |_|
2,733,950 UART:
2,840,012 UART: [rt] Runtime listening for mailbox commands...
2,840,774 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,889 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,983 UART:
2,840,999 UART: Running Caliptra ROM ...
2,841,407 UART:
2,841,462 UART: [state] CFI Enabled
2,844,233 UART: [state] LifecycleState = Production
2,844,841 UART: [state] DebugLocked = Yes
2,845,539 UART: [state] Starting the WD Timer 40000000 cycles
2,847,194 UART: [kat] SHA2-256
3,650,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,873 UART: [kat] ++
3,655,025 UART: [kat] sha1
3,659,389 UART: [kat] SHA2-256
3,661,329 UART: [kat] SHA2-384
3,664,026 UART: [kat] SHA2-512-ACC
3,665,927 UART: [kat] ECC-384
3,675,972 UART: [kat] HMAC-384Kdf
3,680,544 UART: [kat] LMS
3,928,856 UART: [kat] --
3,929,798 UART: [warm-reset] ++
3,930,441 UART: [warm-reset] --
3,931,326 UART: [state] Locking Datavault
3,932,052 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,656 UART: [state] Locking ICCM
3,933,212 UART: [exit] Launching FMC @ 0x40000130
3,938,541 UART:
3,938,557 UART: Running Caliptra FMC ...
3,938,965 UART:
3,939,019 UART: [state] CFI Enabled
3,940,324 UART: [aliasrt :skip pcr extension
3,940,797 UART: [art] Extend RT PCRs Done
3,941,225 UART: [art] Lock RT PCRs Done
3,942,244 UART: [art] Populate DV Done
3,950,080 UART: [fht] FMC Alias Private Key: 7
3,951,096 UART: [art] Derive CDI
3,951,376 UART: [art] Store in in slot 0x4
4,036,961 UART: [art] Derive Key Pair
4,037,321 UART: [art] Store priv key in slot 0x5
4,050,541 UART: [art] Derive Key Pair - Done
4,065,543 UART: [art] Signing Cert with AUTHO
4,066,023 UART: RITY.KEYID = 7
4,081,293 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,058 UART: [art] PUB.X = 6706A5E46F3BFCC79C1ECABE0F4670A58F62A7F967F9DC6728DEA2AF3AB381C05042086AE1D2933B9BD234EA117C203A
4,088,835 UART: [art] PUB.Y = C8A035CD9B32017B821DF6D280610AB239CBF8126CBDBACE8CE4B82819C699E9E8FF5F5E3DABFA724C9797AA06E45C3E
4,095,798 UART: [art] SIG.R = A68D6625EF5484EE6F01342BF5D497ABB9BA0D0111D3BF6180406A26F646F820E3B6A55487384346AAC65D9CC7FE31BC
4,102,567 UART: [art] SIG.S = A5A0352B140D6ACE469E31C85F192ABFAF2D6281C9446041F0B040EFB0B2D99422AA5CC2901589C3427AF507A1683114
4,126,644 UART: mbox::rt_entry...
4,127,016 UART: ____ _ _ _ ____ _____
4,127,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,600 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,904 UART: |_|
4,131,216 UART:
4,412,560 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Production
85,658 UART: [state] DebugLocked = Yes
86,382 UART: [state] Starting the WD Timer 40000000 cycles
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,763 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 ready_for_fw is high
1,174,821 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,653 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,241,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,152 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,846 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,716 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,422 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,504 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,870 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,175 >>> mbox cmd response: success
2,337,203 UART: [afmc] ++
2,337,371 UART: [afmc] CDI.KEYID = 6
2,337,734 UART: [afmc] SUBJECT.KEYID = 7
2,338,160 UART: [afmc] AUTHORITY.KEYID = 5
2,373,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,604 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,323 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,216 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,923 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,846 UART: [afmc] --
2,416,815 UART: [cold-reset] --
2,417,493 UART: [state] Locking Datavault
2,418,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,370 UART: [state] Locking ICCM
2,419,988 UART: [exit] Launching FMC @ 0x40000130
2,425,317 UART:
2,425,333 UART: Running Caliptra FMC ...
2,425,741 UART:
2,425,884 UART: [state] CFI Enabled
2,436,505 UART: [fht] FMC Alias Private Key: 7
2,544,406 UART: [art] Extend RT PCRs Done
2,544,834 UART: [art] Lock RT PCRs Done
2,546,104 UART: [art] Populate DV Done
2,554,388 UART: [fht] FMC Alias Private Key: 7
2,555,320 UART: [art] Derive CDI
2,555,600 UART: [art] Store in in slot 0x4
2,640,739 UART: [art] Derive Key Pair
2,641,099 UART: [art] Store priv key in slot 0x5
2,654,391 UART: [art] Derive Key Pair - Done
2,669,344 UART: [art] Signing Cert with AUTHO
2,669,824 UART: RITY.KEYID = 7
2,684,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,561 UART: [art] PUB.X = 0E2A2E7992070B7221ED143EBB66FFF4CC2DC57A45B9DD48C0F99F6C67A2FCABA60862BDFBD37CAE86E5BD09BFB838D6
2,692,344 UART: [art] PUB.Y = 2B3303A904C6AFEFAC6D53988A6B656B382DC728CAAE03E09C604BEBF43E36BC6AFAC4DEAAB55A77F8C91544D21567A4
2,699,307 UART: [art] SIG.R = 43AEADC48DD4B2CDA98BD3BFB1AC409655A19E5CFF1F7F1DCA429067D4BED7B7E319A2F0C7593ECE7C00E9B9DE590EDE
2,706,086 UART: [art] SIG.S = 9001AD3649B1283B685B2BA3489A62A2D46C855C4EBD330F518A1E727BE454811A18380C369277674AAE822A9AFBC07A
2,729,954 UART: mbox::rt_entry...
2,730,326 UART: ____ _ _ _ ____ _____
2,731,110 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,910 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,678 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,214 UART: |_|
2,734,526 UART:
2,840,612 UART: [rt] Runtime listening for mailbox commands...
2,841,374 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,489 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,583 UART:
2,841,599 UART: Running Caliptra ROM ...
2,842,007 UART:
2,842,149 UART: [state] CFI Enabled
2,845,502 UART: [state] LifecycleState = Production
2,846,110 UART: [state] DebugLocked = Yes
2,846,870 UART: [state] Starting the WD Timer 40000000 cycles
2,848,577 UART: [kat] SHA2-256
3,652,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,256 UART: [kat] ++
3,656,408 UART: [kat] sha1
3,660,770 UART: [kat] SHA2-256
3,662,710 UART: [kat] SHA2-384
3,665,353 UART: [kat] SHA2-512-ACC
3,667,254 UART: [kat] ECC-384
3,676,853 UART: [kat] HMAC-384Kdf
3,681,607 UART: [kat] LMS
3,929,919 UART: [kat] --
3,930,763 UART: [warm-reset] ++
3,931,490 UART: [warm-reset] --
3,932,565 UART: [state] Locking Datavault
3,933,385 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,989 UART: [state] Locking ICCM
3,934,605 UART: [exit] Launching FMC @ 0x40000130
3,939,934 UART:
3,939,950 UART: Running Caliptra FMC ...
3,940,358 UART:
3,940,501 UART: [state] CFI Enabled
3,941,738 UART: [aliasrt :skip pcr extension
3,942,211 UART: [art] Extend RT PCRs Done
3,942,639 UART: [art] Lock RT PCRs Done
3,943,846 UART: [art] Populate DV Done
3,951,844 UART: [fht] FMC Alias Private Key: 7
3,952,804 UART: [art] Derive CDI
3,953,084 UART: [art] Store in in slot 0x4
4,038,579 UART: [art] Derive Key Pair
4,038,939 UART: [art] Store priv key in slot 0x5
4,051,887 UART: [art] Derive Key Pair - Done
4,066,730 UART: [art] Signing Cert with AUTHO
4,067,210 UART: RITY.KEYID = 7
4,082,502 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,267 UART: [art] PUB.X = 0E2A2E7992070B7221ED143EBB66FFF4CC2DC57A45B9DD48C0F99F6C67A2FCABA60862BDFBD37CAE86E5BD09BFB838D6
4,090,050 UART: [art] PUB.Y = 2B3303A904C6AFEFAC6D53988A6B656B382DC728CAAE03E09C604BEBF43E36BC6AFAC4DEAAB55A77F8C91544D21567A4
4,097,013 UART: [art] SIG.R = 43AEADC48DD4B2CDA98BD3BFB1AC409655A19E5CFF1F7F1DCA429067D4BED7B7E319A2F0C7593ECE7C00E9B9DE590EDE
4,103,792 UART: [art] SIG.S = 9001AD3649B1283B685B2BA3489A62A2D46C855C4EBD330F518A1E727BE454811A18380C369277674AAE822A9AFBC07A
4,127,168 UART: mbox::rt_entry...
4,127,540 UART: ____ _ _ _ ____ _____
4,128,324 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,124 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,660 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,428 UART: |_|
4,131,740 UART:
4,413,328 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Production
85,920 UART: [state] DebugLocked = Yes
86,578 UART: [state] Starting the WD Timer 40000000 cycles
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,388 UART: [kat] SHA2-256
902,328 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,174,951 ready_for_fw is high
1,174,951 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,221 UART: [idev] Sha1 KeyId Algorithm
1,209,226 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,217,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,656 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,350 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,220 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,926 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,166 UART: [ldev] --
1,282,616 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,446 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,819 >>> mbox cmd response: success
2,338,017 UART: [afmc] ++
2,338,185 UART: [afmc] CDI.KEYID = 6
2,338,548 UART: [afmc] SUBJECT.KEYID = 7
2,338,974 UART: [afmc] AUTHORITY.KEYID = 5
2,374,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,974 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,693 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,586 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,293 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,166 UART: [afmc] --
2,418,081 UART: [cold-reset] --
2,419,115 UART: [state] Locking Datavault
2,420,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,938 UART: [state] Locking ICCM
2,421,436 UART: [exit] Launching FMC @ 0x40000130
2,426,765 UART:
2,426,781 UART: Running Caliptra FMC ...
2,427,189 UART:
2,427,332 UART: [state] CFI Enabled
2,437,591 UART: [fht] FMC Alias Private Key: 7
2,545,146 UART: [art] Extend RT PCRs Done
2,545,574 UART: [art] Lock RT PCRs Done
2,546,896 UART: [art] Populate DV Done
2,554,928 UART: [fht] FMC Alias Private Key: 7
2,555,996 UART: [art] Derive CDI
2,556,276 UART: [art] Store in in slot 0x4
2,641,947 UART: [art] Derive Key Pair
2,642,307 UART: [art] Store priv key in slot 0x5
2,655,981 UART: [art] Derive Key Pair - Done
2,670,800 UART: [art] Signing Cert with AUTHO
2,671,280 UART: RITY.KEYID = 7
2,686,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,077 UART: [art] PUB.X = 338DF7701BD57519CFF0E03A24EB84BCCB7146B8901957E86753DD861138AAEFBAA31347B276797923C3D2A32EEAD397
2,693,853 UART: [art] PUB.Y = 4825F3ED1E75C98C26395909C6FC5EB415D810F2A1E2670DC331C95EB2341B858A32A4FA53FE01F307A5F0E0CCC67528
2,700,797 UART: [art] SIG.R = B1F32FFB8B8673B81838E924781CD88641C1DB3628CDFAF5DF1837B4FA81A4CA17499D03C6E23A650EDD5837307FD498
2,707,569 UART: [art] SIG.S = 953734734FF4D5AAC90A9A7FBEB9D647B9C6F9EC98443FFC27121D738A56F21ADA22D859B35EC8D6BDB24BC03DE456CA
2,731,487 UART: mbox::rt_entry...
2,731,859 UART: ____ _ _ _ ____ _____
2,732,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,443 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,211 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,979 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,747 UART: |_|
2,736,059 UART:
2,842,313 UART: [rt] Runtime listening for mailbox commands...
2,843,075 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,190 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,284 UART:
2,843,300 UART: Running Caliptra ROM ...
2,843,708 UART:
2,843,850 UART: [state] CFI Enabled
2,846,825 UART: [state] LifecycleState = Production
2,847,433 UART: [state] DebugLocked = Yes
2,847,967 UART: [state] Starting the WD Timer 40000000 cycles
2,849,648 UART: [kat] SHA2-256
3,653,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,327 UART: [kat] ++
3,657,479 UART: [kat] sha1
3,661,853 UART: [kat] SHA2-256
3,663,793 UART: [kat] SHA2-384
3,666,446 UART: [kat] SHA2-512-ACC
3,668,347 UART: [kat] ECC-384
3,677,772 UART: [kat] HMAC-384Kdf
3,682,384 UART: [kat] LMS
3,930,696 UART: [kat] --
3,931,614 UART: [warm-reset] ++
3,932,673 UART: [warm-reset] --
3,933,310 UART: [state] Locking Datavault
3,934,276 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,880 UART: [state] Locking ICCM
3,935,466 UART: [exit] Launching FMC @ 0x40000130
3,940,795 UART:
3,940,811 UART: Running Caliptra FMC ...
3,941,219 UART:
3,941,362 UART: [state] CFI Enabled
3,942,469 UART: [aliasrt :skip pcr extension
3,942,942 UART: [art] Extend RT PCRs Done
3,943,370 UART: [art] Lock RT PCRs Done
3,944,801 UART: [art] Populate DV Done
3,953,221 UART: [fht] FMC Alias Private Key: 7
3,954,367 UART: [art] Derive CDI
3,954,647 UART: [art] Store in in slot 0x4
4,040,656 UART: [art] Derive Key Pair
4,041,016 UART: [art] Store priv key in slot 0x5
4,054,908 UART: [art] Derive Key Pair - Done
4,069,567 UART: [art] Signing Cert with AUTHO
4,070,047 UART: RITY.KEYID = 7
4,085,563 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,328 UART: [art] PUB.X = 338DF7701BD57519CFF0E03A24EB84BCCB7146B8901957E86753DD861138AAEFBAA31347B276797923C3D2A32EEAD397
4,093,104 UART: [art] PUB.Y = 4825F3ED1E75C98C26395909C6FC5EB415D810F2A1E2670DC331C95EB2341B858A32A4FA53FE01F307A5F0E0CCC67528
4,100,048 UART: [art] SIG.R = B1F32FFB8B8673B81838E924781CD88641C1DB3628CDFAF5DF1837B4FA81A4CA17499D03C6E23A650EDD5837307FD498
4,106,820 UART: [art] SIG.S = 953734734FF4D5AAC90A9A7FBEB9D647B9C6F9EC98443FFC27121D738A56F21ADA22D859B35EC8D6BDB24BC03DE456CA
4,130,924 UART: mbox::rt_entry...
4,131,296 UART: ____ _ _ _ ____ _____
4,132,080 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,880 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,416 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,184 UART: |_|
4,135,496 UART:
4,416,910 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,775 UART: [state] LifecycleState = Production
85,383 UART: [state] DebugLocked = Yes
85,945 UART: [state] Starting the WD Timer 40000000 cycles
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
919,856 UART: [kat] LMS
1,168,168 UART: [kat] --
1,168,971 UART: [cold-reset] ++
1,169,382 UART: [fht] FHT @ 0x50003400
1,171,972 UART: [idev] ++
1,172,140 UART: [idev] CDI.KEYID = 6
1,172,501 UART: [idev] SUBJECT.KEYID = 7
1,172,926 UART: [idev] UDS.KEYID = 0
1,173,272 ready_for_fw is high
1,173,272 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,180,761 UART: [idev] Erasing UDS.KEYID = 0
1,197,738 UART: [idev] Sha1 KeyId Algorithm
1,206,661 UART: [idev] --
1,207,652 UART: [ldev] ++
1,207,820 UART: [ldev] CDI.KEYID = 6
1,208,184 UART: [ldev] SUBJECT.KEYID = 5
1,208,611 UART: [ldev] AUTHORITY.KEYID = 7
1,209,074 UART: [ldev] FE.KEYID = 1
1,214,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,649 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,519 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,225 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,117 UART: [ldev] --
1,280,543 UART: [fwproc] Wait for Commands...
1,281,328 UART: [fwproc] Recv command 0x46574c44
1,282,061 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,575 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,828 >>> mbox cmd response: success
2,336,926 UART: [afmc] ++
2,337,094 UART: [afmc] CDI.KEYID = 6
2,337,457 UART: [afmc] SUBJECT.KEYID = 7
2,337,883 UART: [afmc] AUTHORITY.KEYID = 5
2,373,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,231 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,950 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,843 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,550 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,397 UART: [afmc] --
2,417,442 UART: [cold-reset] --
2,418,302 UART: [state] Locking Datavault
2,419,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,891 UART: [state] Locking ICCM
2,420,539 UART: [exit] Launching FMC @ 0x40000130
2,425,868 UART:
2,425,884 UART: Running Caliptra FMC ...
2,426,292 UART:
2,426,346 UART: [state] CFI Enabled
2,436,715 UART: [fht] FMC Alias Private Key: 7
2,544,256 UART: [art] Extend RT PCRs Done
2,544,684 UART: [art] Lock RT PCRs Done
2,546,434 UART: [art] Populate DV Done
2,554,888 UART: [fht] FMC Alias Private Key: 7
2,555,854 UART: [art] Derive CDI
2,556,134 UART: [art] Store in in slot 0x4
2,642,025 UART: [art] Derive Key Pair
2,642,385 UART: [art] Store priv key in slot 0x5
2,655,421 UART: [art] Derive Key Pair - Done
2,670,263 UART: [art] Signing Cert with AUTHO
2,670,743 UART: RITY.KEYID = 7
2,686,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,820 UART: [art] PUB.X = 8B45175F7628E75A9460B17DC5764B37332292E547E40015113E286C3D01401658F1E0A28DEB7E43814924AE346998E7
2,693,549 UART: [art] PUB.Y = DB5EAAEEE33B02E979CD627D145F307CC52D115AF2FE551A973EA8AE770B59488E7CF998CEAD2649CE84886D73867B72
2,700,507 UART: [art] SIG.R = 4007A2662F19C9457C032B3005AE8AC33AFEB1EDDDBE569A680904430573D522456C17FE70F69D08A6F0FE9A29D803E9
2,707,257 UART: [art] SIG.S = 8EED997BA901854577F77EC6F7D0D1E6930CB775FE7FB911B2ED5BECD44A51557BBAC7BB1897DD559BC8577A66BDFBC1
2,730,550 UART: mbox::rt_entry...
2,730,922 UART: ____ _ _ _ ____ _____
2,731,706 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,506 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,042 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,810 UART: |_|
2,735,122 UART:
2,841,308 UART: [rt] Runtime listening for mailbox commands...
2,842,070 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,185 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,279 UART:
2,842,295 UART: Running Caliptra ROM ...
2,842,703 UART:
2,842,758 UART: [state] CFI Enabled
2,845,279 UART: [state] LifecycleState = Production
2,845,887 UART: [state] DebugLocked = Yes
2,846,557 UART: [state] Starting the WD Timer 40000000 cycles
2,848,086 UART: [kat] SHA2-256
3,651,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,765 UART: [kat] ++
3,655,917 UART: [kat] sha1
3,660,133 UART: [kat] SHA2-256
3,662,073 UART: [kat] SHA2-384
3,665,038 UART: [kat] SHA2-512-ACC
3,666,939 UART: [kat] ECC-384
3,676,606 UART: [kat] HMAC-384Kdf
3,681,330 UART: [kat] LMS
3,929,642 UART: [kat] --
3,930,502 UART: [warm-reset] ++
3,931,401 UART: [warm-reset] --
3,932,146 UART: [state] Locking Datavault
3,933,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,646 UART: [state] Locking ICCM
3,934,314 UART: [exit] Launching FMC @ 0x40000130
3,939,643 UART:
3,939,659 UART: Running Caliptra FMC ...
3,940,067 UART:
3,940,121 UART: [state] CFI Enabled
3,941,132 UART: [aliasrt :skip pcr extension
3,941,605 UART: [art] Extend RT PCRs Done
3,942,033 UART: [art] Lock RT PCRs Done
3,943,186 UART: [art] Populate DV Done
3,951,380 UART: [fht] FMC Alias Private Key: 7
3,952,546 UART: [art] Derive CDI
3,952,826 UART: [art] Store in in slot 0x4
4,038,277 UART: [art] Derive Key Pair
4,038,637 UART: [art] Store priv key in slot 0x5
4,052,109 UART: [art] Derive Key Pair - Done
4,066,797 UART: [art] Signing Cert with AUTHO
4,067,277 UART: RITY.KEYID = 7
4,082,677 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,442 UART: [art] PUB.X = 8B45175F7628E75A9460B17DC5764B37332292E547E40015113E286C3D01401658F1E0A28DEB7E43814924AE346998E7
4,090,171 UART: [art] PUB.Y = DB5EAAEEE33B02E979CD627D145F307CC52D115AF2FE551A973EA8AE770B59488E7CF998CEAD2649CE84886D73867B72
4,097,129 UART: [art] SIG.R = 4007A2662F19C9457C032B3005AE8AC33AFEB1EDDDBE569A680904430573D522456C17FE70F69D08A6F0FE9A29D803E9
4,103,879 UART: [art] SIG.S = 8EED997BA901854577F77EC6F7D0D1E6930CB775FE7FB911B2ED5BECD44A51557BBAC7BB1897DD559BC8577A66BDFBC1
4,127,856 UART: mbox::rt_entry...
4,128,228 UART: ____ _ _ _ ____ _____
4,129,012 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,812 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,580 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,348 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,116 UART: |_|
4,132,428 UART:
4,416,466 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Production
86,211 UART: [state] DebugLocked = Yes
86,915 UART: [state] Starting the WD Timer 40000000 cycles
88,474 UART: [kat] SHA2-256
892,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,153 UART: [kat] ++
896,305 UART: [kat] sha1
900,391 UART: [kat] SHA2-256
902,331 UART: [kat] SHA2-384
905,110 UART: [kat] SHA2-512-ACC
907,011 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,228 UART: [kat] LMS
1,169,540 UART: [kat] --
1,170,413 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 ready_for_fw is high
1,174,898 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,992 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,733 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,603 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,309 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,315 UART: [ldev] --
1,280,665 UART: [fwproc] Wait for Commands...
1,281,244 UART: [fwproc] Recv command 0x46574c44
1,281,977 UART: [fwproc] Recv'd Img size: 78704 bytes
2,195,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,245 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,568 >>> mbox cmd response: success
2,335,802 UART: [afmc] ++
2,335,970 UART: [afmc] CDI.KEYID = 6
2,336,333 UART: [afmc] SUBJECT.KEYID = 7
2,336,759 UART: [afmc] AUTHORITY.KEYID = 5
2,372,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,251 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,970 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,863 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,570 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,365 UART: [afmc] --
2,415,468 UART: [cold-reset] --
2,416,496 UART: [state] Locking Datavault
2,417,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,213 UART: [state] Locking ICCM
2,418,693 UART: [exit] Launching FMC @ 0x40000130
2,424,022 UART:
2,424,038 UART: Running Caliptra FMC ...
2,424,446 UART:
2,424,500 UART: [state] CFI Enabled
2,435,091 UART: [fht] FMC Alias Private Key: 7
2,542,502 UART: [art] Extend RT PCRs Done
2,542,930 UART: [art] Lock RT PCRs Done
2,544,660 UART: [art] Populate DV Done
2,552,760 UART: [fht] FMC Alias Private Key: 7
2,553,896 UART: [art] Derive CDI
2,554,176 UART: [art] Store in in slot 0x4
2,639,575 UART: [art] Derive Key Pair
2,639,935 UART: [art] Store priv key in slot 0x5
2,653,277 UART: [art] Derive Key Pair - Done
2,667,911 UART: [art] Signing Cert with AUTHO
2,668,391 UART: RITY.KEYID = 7
2,683,847 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,612 UART: [art] PUB.X = 2676D8C272FC37DD139B2EB49460FB1DC8FAF3B994E79048BD49DE53C8ADC4846F0BCBCC4630F3E09534D2C33E019850
2,691,388 UART: [art] PUB.Y = E7E91B6AC8925AEC108257951AB7E02712C604D04337D3EF0DA80834EBC5C5BB650AA12BAD1BCA6A168C357DEA3A57B7
2,698,342 UART: [art] SIG.R = F95D29B6B194F3F5D722DEB2C3013ABA39A5E382A303F9C80EAD52B67F9F60FE3753E1DACD9D856B435FDA99410349EC
2,705,116 UART: [art] SIG.S = D00FB3F943828FBF62FD97D639C9846B859BB32C6446E015D39112DAAEDF2805BAF4679D7A743C00C821D3A94D902839
2,728,913 UART: mbox::rt_entry...
2,729,285 UART: ____ _ _ _ ____ _____
2,730,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,637 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,173 UART: |_|
2,733,485 UART:
2,839,981 UART: [rt] Runtime listening for mailbox commands...
2,840,743 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,858 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,952 UART:
2,840,968 UART: Running Caliptra ROM ...
2,841,376 UART:
2,841,431 UART: [state] CFI Enabled
2,844,462 UART: [state] LifecycleState = Production
2,845,070 UART: [state] DebugLocked = Yes
2,845,808 UART: [state] Starting the WD Timer 40000000 cycles
2,847,509 UART: [kat] SHA2-256
3,651,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,188 UART: [kat] ++
3,655,340 UART: [kat] sha1
3,659,784 UART: [kat] SHA2-256
3,661,724 UART: [kat] SHA2-384
3,664,493 UART: [kat] SHA2-512-ACC
3,666,394 UART: [kat] ECC-384
3,675,847 UART: [kat] HMAC-384Kdf
3,680,433 UART: [kat] LMS
3,928,745 UART: [kat] --
3,929,735 UART: [warm-reset] ++
3,930,662 UART: [warm-reset] --
3,931,501 UART: [state] Locking Datavault
3,932,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,787 UART: [state] Locking ICCM
3,933,393 UART: [exit] Launching FMC @ 0x40000130
3,938,722 UART:
3,938,738 UART: Running Caliptra FMC ...
3,939,146 UART:
3,939,200 UART: [state] CFI Enabled
3,940,373 UART: [aliasrt :skip pcr extension
3,940,846 UART: [art] Extend RT PCRs Done
3,941,274 UART: [art] Lock RT PCRs Done
3,942,715 UART: [art] Populate DV Done
3,951,047 UART: [fht] FMC Alias Private Key: 7
3,951,985 UART: [art] Derive CDI
3,952,265 UART: [art] Store in in slot 0x4
4,037,750 UART: [art] Derive Key Pair
4,038,110 UART: [art] Store priv key in slot 0x5
4,050,978 UART: [art] Derive Key Pair - Done
4,065,812 UART: [art] Signing Cert with AUTHO
4,066,292 UART: RITY.KEYID = 7
4,081,732 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,497 UART: [art] PUB.X = 2676D8C272FC37DD139B2EB49460FB1DC8FAF3B994E79048BD49DE53C8ADC4846F0BCBCC4630F3E09534D2C33E019850
4,089,273 UART: [art] PUB.Y = E7E91B6AC8925AEC108257951AB7E02712C604D04337D3EF0DA80834EBC5C5BB650AA12BAD1BCA6A168C357DEA3A57B7
4,096,227 UART: [art] SIG.R = F95D29B6B194F3F5D722DEB2C3013ABA39A5E382A303F9C80EAD52B67F9F60FE3753E1DACD9D856B435FDA99410349EC
4,103,001 UART: [art] SIG.S = D00FB3F943828FBF62FD97D639C9846B859BB32C6446E015D39112DAAEDF2805BAF4679D7A743C00C821D3A94D902839
4,126,756 UART: mbox::rt_entry...
4,127,128 UART: ____ _ _ _ ____ _____
4,127,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,712 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,016 UART: |_|
4,131,328 UART:
4,412,590 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: [state] DebugLocked = Yes
86,548 UART: [state] Starting the WD Timer 40000000 cycles
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,874 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,744 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,450 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,670 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,256,178 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,621 >>> mbox cmd response: success
2,339,839 UART: [afmc] ++
2,340,007 UART: [afmc] CDI.KEYID = 6
2,340,370 UART: [afmc] SUBJECT.KEYID = 7
2,340,796 UART: [afmc] AUTHORITY.KEYID = 5
2,376,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,974 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,693 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,586 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,293 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,242 UART: [afmc] --
2,420,313 UART: [cold-reset] --
2,420,979 UART: [state] Locking Datavault
2,422,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,896 UART: [state] Locking ICCM
2,423,424 UART: [exit] Launching FMC @ 0x40000130
2,428,753 UART:
2,428,769 UART: Running Caliptra FMC ...
2,429,177 UART:
2,429,320 UART: [state] CFI Enabled
2,439,715 UART: [fht] FMC Alias Private Key: 7
2,547,674 UART: [art] Extend RT PCRs Done
2,548,102 UART: [art] Lock RT PCRs Done
2,549,652 UART: [art] Populate DV Done
2,557,774 UART: [fht] FMC Alias Private Key: 7
2,558,774 UART: [art] Derive CDI
2,559,054 UART: [art] Store in in slot 0x4
2,644,707 UART: [art] Derive Key Pair
2,645,067 UART: [art] Store priv key in slot 0x5
2,658,751 UART: [art] Derive Key Pair - Done
2,673,206 UART: [art] Signing Cert with AUTHO
2,673,686 UART: RITY.KEYID = 7
2,689,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,863 UART: [art] PUB.X = 667AC9DAF6E5CEDEB10F783C67C4B86E77F65491998EA90EA1B3EC70CD174AA6D425963E96419E9422C638E8C66F59B4
2,696,637 UART: [art] PUB.Y = 1B6109DA5E8F5AA91ED439EF87D66A425447BD5DF16670B2D821B70AF0387CF307896B7D55BF328ABB4BE3E6FAC58DF4
2,703,594 UART: [art] SIG.R = 170511AE6FD044DB9F17D2C8F24375FE0393FD429D3B81C70A1F57563E0E9304ABC881C6963877C5027828A776BE660D
2,710,341 UART: [art] SIG.S = 7DD8131B043444C4E6FA136E7634F95C23BD67BC9017EB3E4E42CA4BCD4ABB94F69D58F7B61BAEB8D7004F7059A3E6FE
2,734,215 UART: mbox::rt_entry...
2,734,587 UART: ____ _ _ _ ____ _____
2,735,371 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,171 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,939 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,737,707 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,475 UART: |_|
2,738,787 UART:
2,845,254 UART: [rt] Runtime listening for mailbox commands...
2,846,016 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,846,131 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,846,225 UART:
2,846,241 UART: Running Caliptra ROM ...
2,846,649 UART:
2,846,791 UART: [state] CFI Enabled
2,849,600 UART: [state] LifecycleState = Production
2,850,208 UART: [state] DebugLocked = Yes
2,850,812 UART: [state] Starting the WD Timer 40000000 cycles
2,852,457 UART: [kat] SHA2-256
3,656,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,136 UART: [kat] ++
3,660,288 UART: [kat] sha1
3,664,446 UART: [kat] SHA2-256
3,666,386 UART: [kat] SHA2-384
3,668,965 UART: [kat] SHA2-512-ACC
3,670,866 UART: [kat] ECC-384
3,680,571 UART: [kat] HMAC-384Kdf
3,685,077 UART: [kat] LMS
3,933,389 UART: [kat] --
3,934,429 UART: [warm-reset] ++
3,935,260 UART: [warm-reset] --
3,936,271 UART: [state] Locking Datavault
3,937,087 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,691 UART: [state] Locking ICCM
3,938,323 UART: [exit] Launching FMC @ 0x40000130
3,943,652 UART:
3,943,668 UART: Running Caliptra FMC ...
3,944,076 UART:
3,944,219 UART: [state] CFI Enabled
3,945,596 UART: [aliasrt :skip pcr extension
3,946,069 UART: [art] Extend RT PCRs Done
3,946,497 UART: [art] Lock RT PCRs Done
3,947,784 UART: [art] Populate DV Done
3,955,834 UART: [fht] FMC Alias Private Key: 7
3,956,766 UART: [art] Derive CDI
3,957,046 UART: [art] Store in in slot 0x4
4,042,605 UART: [art] Derive Key Pair
4,042,965 UART: [art] Store priv key in slot 0x5
4,056,001 UART: [art] Derive Key Pair - Done
4,070,488 UART: [art] Signing Cert with AUTHO
4,070,968 UART: RITY.KEYID = 7
4,086,384 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,149 UART: [art] PUB.X = 667AC9DAF6E5CEDEB10F783C67C4B86E77F65491998EA90EA1B3EC70CD174AA6D425963E96419E9422C638E8C66F59B4
4,093,923 UART: [art] PUB.Y = 1B6109DA5E8F5AA91ED439EF87D66A425447BD5DF16670B2D821B70AF0387CF307896B7D55BF328ABB4BE3E6FAC58DF4
4,100,880 UART: [art] SIG.R = 170511AE6FD044DB9F17D2C8F24375FE0393FD429D3B81C70A1F57563E0E9304ABC881C6963877C5027828A776BE660D
4,107,627 UART: [art] SIG.S = 7DD8131B043444C4E6FA136E7634F95C23BD67BC9017EB3E4E42CA4BCD4ABB94F69D58F7B61BAEB8D7004F7059A3E6FE
4,131,335 UART: mbox::rt_entry...
4,131,707 UART: ____ _ _ _ ____ _____
4,132,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,827 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,595 UART: |_|
4,135,907 UART:
4,416,502 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Production
86,204 UART: [state] DebugLocked = Yes
86,772 UART: [state] Starting the WD Timer 40000000 cycles
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,224 UART: [kat] SHA2-256
902,164 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,694 UART: [cold-reset] ++
1,171,021 UART: [fht] FHT @ 0x50003400
1,173,743 UART: [idev] ++
1,173,911 UART: [idev] CDI.KEYID = 6
1,174,272 UART: [idev] SUBJECT.KEYID = 7
1,174,697 UART: [idev] UDS.KEYID = 0
1,175,043 ready_for_fw is high
1,175,043 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,450 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,144 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,014 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,720 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,760 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,979 UART: [fwproc] Recv command 0x46574c44
1,282,712 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,206 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,645 >>> mbox cmd response: success
2,336,711 UART: [afmc] ++
2,336,879 UART: [afmc] CDI.KEYID = 6
2,337,242 UART: [afmc] SUBJECT.KEYID = 7
2,337,668 UART: [afmc] AUTHORITY.KEYID = 5
2,373,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,612 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,331 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,224 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,931 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,770 UART: [afmc] --
2,417,857 UART: [cold-reset] --
2,418,825 UART: [state] Locking Datavault
2,419,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,408 UART: [state] Locking ICCM
2,421,028 UART: [exit] Launching FMC @ 0x40000130
2,426,357 UART:
2,426,373 UART: Running Caliptra FMC ...
2,426,781 UART:
2,426,924 UART: [state] CFI Enabled
2,437,779 UART: [fht] FMC Alias Private Key: 7
2,545,316 UART: [art] Extend RT PCRs Done
2,545,744 UART: [art] Lock RT PCRs Done
2,547,340 UART: [art] Populate DV Done
2,555,792 UART: [fht] FMC Alias Private Key: 7
2,556,956 UART: [art] Derive CDI
2,557,236 UART: [art] Store in in slot 0x4
2,643,003 UART: [art] Derive Key Pair
2,643,363 UART: [art] Store priv key in slot 0x5
2,657,117 UART: [art] Derive Key Pair - Done
2,672,011 UART: [art] Signing Cert with AUTHO
2,672,491 UART: RITY.KEYID = 7
2,687,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,462 UART: [art] PUB.X = D01EADD29AFABB7D1C260A2330ADB9B30B8A765B4D671C5ECAB610DC9BCB699AE814E8B13B60C1E6EB58F478395EF689
2,695,250 UART: [art] PUB.Y = 80BFB89F3730AB16107DF1F491F5F39E5BEB8CB3648F6F881883959F803E039DED3222C3B8E183C02BD3CB0105496F06
2,702,192 UART: [art] SIG.R = C79714B62383F2F7845493CAFEFE6AA3A149E32C36C649BE559526CC1321DF27AF671E36BA37313DF3A7D5CE39CFAF03
2,708,971 UART: [art] SIG.S = 9E993DBF4C4C5578629C55E5033B96D793D855148428734F7C2C538DC38241A01E9B7B346FD55843D1FE3F8F50495C40
2,732,459 UART: mbox::rt_entry...
2,732,831 UART: ____ _ _ _ ____ _____
2,733,615 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,415 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,183 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,951 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,719 UART: |_|
2,737,031 UART:
2,844,385 UART: [rt] Runtime listening for mailbox commands...
2,845,147 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,262 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,356 UART:
2,845,372 UART: Running Caliptra ROM ...
2,845,780 UART:
2,845,922 UART: [state] CFI Enabled
2,848,449 UART: [state] LifecycleState = Production
2,849,057 UART: [state] DebugLocked = Yes
2,849,643 UART: [state] Starting the WD Timer 40000000 cycles
2,851,254 UART: [kat] SHA2-256
3,654,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,933 UART: [kat] ++
3,659,085 UART: [kat] sha1
3,663,333 UART: [kat] SHA2-256
3,665,273 UART: [kat] SHA2-384
3,667,952 UART: [kat] SHA2-512-ACC
3,669,853 UART: [kat] ECC-384
3,679,470 UART: [kat] HMAC-384Kdf
3,684,070 UART: [kat] LMS
3,932,382 UART: [kat] --
3,933,356 UART: [warm-reset] ++
3,933,877 UART: [warm-reset] --
3,934,678 UART: [state] Locking Datavault
3,935,564 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,168 UART: [state] Locking ICCM
3,936,686 UART: [exit] Launching FMC @ 0x40000130
3,942,015 UART:
3,942,031 UART: Running Caliptra FMC ...
3,942,439 UART:
3,942,582 UART: [state] CFI Enabled
3,944,103 UART: [aliasrt :skip pcr extension
3,944,576 UART: [art] Extend RT PCRs Done
3,945,004 UART: [art] Lock RT PCRs Done
3,946,227 UART: [art] Populate DV Done
3,954,247 UART: [fht] FMC Alias Private Key: 7
3,955,271 UART: [art] Derive CDI
3,955,551 UART: [art] Store in in slot 0x4
4,041,302 UART: [art] Derive Key Pair
4,041,662 UART: [art] Store priv key in slot 0x5
4,055,252 UART: [art] Derive Key Pair - Done
4,070,044 UART: [art] Signing Cert with AUTHO
4,070,524 UART: RITY.KEYID = 7
4,085,072 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,837 UART: [art] PUB.X = D01EADD29AFABB7D1C260A2330ADB9B30B8A765B4D671C5ECAB610DC9BCB699AE814E8B13B60C1E6EB58F478395EF689
4,092,625 UART: [art] PUB.Y = 80BFB89F3730AB16107DF1F491F5F39E5BEB8CB3648F6F881883959F803E039DED3222C3B8E183C02BD3CB0105496F06
4,099,567 UART: [art] SIG.R = C79714B62383F2F7845493CAFEFE6AA3A149E32C36C649BE559526CC1321DF27AF671E36BA37313DF3A7D5CE39CFAF03
4,106,346 UART: [art] SIG.S = 9E993DBF4C4C5578629C55E5033B96D793D855148428734F7C2C538DC38241A01E9B7B346FD55843D1FE3F8F50495C40
4,129,790 UART: mbox::rt_entry...
4,130,162 UART: ____ _ _ _ ____ _____
4,130,946 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,746 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,282 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,050 UART: |_|
4,134,362 UART:
4,415,166 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Production
85,829 UART: [state] DebugLocked = Yes
86,537 UART: [state] Starting the WD Timer 40000000 cycles
88,230 UART: [kat] SHA2-256
891,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,909 UART: [kat] ++
896,061 UART: [kat] sha1
900,275 UART: [kat] SHA2-256
902,215 UART: [kat] SHA2-384
905,128 UART: [kat] SHA2-512-ACC
907,029 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,178 UART: [kat] LMS
1,169,490 UART: [kat] --
1,170,467 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,599 UART: [idev] Erasing UDS.KEYID = 0
1,199,764 UART: [idev] Sha1 KeyId Algorithm
1,208,469 UART: [idev] --
1,209,452 UART: [ldev] ++
1,209,620 UART: [ldev] CDI.KEYID = 6
1,209,984 UART: [ldev] SUBJECT.KEYID = 5
1,210,411 UART: [ldev] AUTHORITY.KEYID = 7
1,210,874 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,475 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,345 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,051 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,113 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,543 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,990 >>> mbox cmd response: success
2,339,188 UART: [afmc] ++
2,339,356 UART: [afmc] CDI.KEYID = 6
2,339,719 UART: [afmc] SUBJECT.KEYID = 7
2,340,145 UART: [afmc] AUTHORITY.KEYID = 5
2,375,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,291 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,010 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,903 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,610 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,497 UART: [afmc] --
2,418,506 UART: [cold-reset] --
2,419,282 UART: [state] Locking Datavault
2,420,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,045 UART: [state] Locking ICCM
2,421,631 UART: [exit] Launching FMC @ 0x40000130
2,426,960 UART:
2,426,976 UART: Running Caliptra FMC ...
2,427,384 UART:
2,427,438 UART: [state] CFI Enabled
2,437,861 UART: [fht] FMC Alias Private Key: 7
2,545,668 UART: [art] Extend RT PCRs Done
2,546,096 UART: [art] Lock RT PCRs Done
2,547,966 UART: [art] Populate DV Done
2,556,020 UART: [fht] FMC Alias Private Key: 7
2,556,984 UART: [art] Derive CDI
2,557,264 UART: [art] Store in in slot 0x4
2,642,947 UART: [art] Derive Key Pair
2,643,307 UART: [art] Store priv key in slot 0x5
2,656,935 UART: [art] Derive Key Pair - Done
2,671,743 UART: [art] Signing Cert with AUTHO
2,672,223 UART: RITY.KEYID = 7
2,687,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,390 UART: [art] PUB.X = F1C95E7DDCFCBF9FC80591881394E15B067BB1903F6AEF970D3436BE7CB5683E6C927A51122B5BFE1D5F28110DED8897
2,695,160 UART: [art] PUB.Y = 4CCAED02167EA8EC66FF9103FFDCB797F937B81AA35F0CCC818B83B2C9DD96C9E1297269B86F380BF33E5C04DFE5040B
2,702,109 UART: [art] SIG.R = 95C7E64260219985E4BE8F57A82145CE5C0716DED206FCE8C8707FAB8ED96C392424B13C66B4A034148A254F5FC1669F
2,708,875 UART: [art] SIG.S = BB415A36F860748EA1A9288A81D8D04047EEA6FC78480790BBDCFAD88724FAEC90EEE034CD806C8C16A126D5CF0DCDCC
2,733,086 UART: mbox::rt_entry...
2,733,458 UART: ____ _ _ _ ____ _____
2,734,242 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,578 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,346 UART: |_|
2,737,658 UART:
2,844,174 UART: [rt] Runtime listening for mailbox commands...
2,844,936 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,051 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,145 UART:
2,845,161 UART: Running Caliptra ROM ...
2,845,569 UART:
2,845,624 UART: [state] CFI Enabled
2,848,119 UART: [state] LifecycleState = Production
2,848,727 UART: [state] DebugLocked = Yes
2,849,239 UART: [state] Starting the WD Timer 40000000 cycles
2,850,940 UART: [kat] SHA2-256
3,654,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,619 UART: [kat] ++
3,658,771 UART: [kat] sha1
3,662,987 UART: [kat] SHA2-256
3,664,927 UART: [kat] SHA2-384
3,667,668 UART: [kat] SHA2-512-ACC
3,669,569 UART: [kat] ECC-384
3,679,512 UART: [kat] HMAC-384Kdf
3,684,036 UART: [kat] LMS
3,932,348 UART: [kat] --
3,933,290 UART: [warm-reset] ++
3,934,219 UART: [warm-reset] --
3,935,106 UART: [state] Locking Datavault
3,935,758 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,362 UART: [state] Locking ICCM
3,936,904 UART: [exit] Launching FMC @ 0x40000130
3,942,233 UART:
3,942,249 UART: Running Caliptra FMC ...
3,942,657 UART:
3,942,711 UART: [state] CFI Enabled
3,943,966 UART: [aliasrt :skip pcr extension
3,944,439 UART: [art] Extend RT PCRs Done
3,944,867 UART: [art] Lock RT PCRs Done
3,946,280 UART: [art] Populate DV Done
3,954,320 UART: [fht] FMC Alias Private Key: 7
3,955,440 UART: [art] Derive CDI
3,955,720 UART: [art] Store in in slot 0x4
4,041,013 UART: [art] Derive Key Pair
4,041,373 UART: [art] Store priv key in slot 0x5
4,054,925 UART: [art] Derive Key Pair - Done
4,069,617 UART: [art] Signing Cert with AUTHO
4,070,097 UART: RITY.KEYID = 7
4,085,149 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,914 UART: [art] PUB.X = F1C95E7DDCFCBF9FC80591881394E15B067BB1903F6AEF970D3436BE7CB5683E6C927A51122B5BFE1D5F28110DED8897
4,092,684 UART: [art] PUB.Y = 4CCAED02167EA8EC66FF9103FFDCB797F937B81AA35F0CCC818B83B2C9DD96C9E1297269B86F380BF33E5C04DFE5040B
4,099,633 UART: [art] SIG.R = 95C7E64260219985E4BE8F57A82145CE5C0716DED206FCE8C8707FAB8ED96C392424B13C66B4A034148A254F5FC1669F
4,106,399 UART: [art] SIG.S = BB415A36F860748EA1A9288A81D8D04047EEA6FC78480790BBDCFAD88724FAEC90EEE034CD806C8C16A126D5CF0DCDCC
4,130,658 UART: mbox::rt_entry...
4,131,030 UART: ____ _ _ _ ____ _____
4,131,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,150 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,918 UART: |_|
4,135,230 UART:
4,421,872 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Production
85,801 UART: [state] DebugLocked = Yes
86,527 UART: [state] Starting the WD Timer 40000000 cycles
88,228 UART: [kat] SHA2-256
891,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,907 UART: [kat] ++
896,059 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,810 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,174,866 ready_for_fw is high
1,174,866 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,579 UART: [idev] --
1,209,794 UART: [ldev] ++
1,209,962 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,753 UART: [ldev] AUTHORITY.KEYID = 7
1,211,216 UART: [ldev] FE.KEYID = 1
1,216,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,971 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,841 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,547 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,551 UART: [ldev] --
1,280,857 UART: [fwproc] Wait for Commands...
1,281,588 UART: [fwproc] Recv command 0x46574c44
1,282,321 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,345 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,828 >>> mbox cmd response: success
2,338,984 UART: [afmc] ++
2,339,152 UART: [afmc] CDI.KEYID = 6
2,339,515 UART: [afmc] SUBJECT.KEYID = 7
2,339,941 UART: [afmc] AUTHORITY.KEYID = 5
2,375,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,391 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,110 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,003 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,710 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,511 UART: [afmc] --
2,418,570 UART: [cold-reset] --
2,419,192 UART: [state] Locking Datavault
2,420,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,817 UART: [state] Locking ICCM
2,421,379 UART: [exit] Launching FMC @ 0x40000130
2,426,708 UART:
2,426,724 UART: Running Caliptra FMC ...
2,427,132 UART:
2,427,186 UART: [state] CFI Enabled
2,438,069 UART: [fht] FMC Alias Private Key: 7
2,545,832 UART: [art] Extend RT PCRs Done
2,546,260 UART: [art] Lock RT PCRs Done
2,547,936 UART: [art] Populate DV Done
2,556,226 UART: [fht] FMC Alias Private Key: 7
2,557,180 UART: [art] Derive CDI
2,557,460 UART: [art] Store in in slot 0x4
2,642,809 UART: [art] Derive Key Pair
2,643,169 UART: [art] Store priv key in slot 0x5
2,656,777 UART: [art] Derive Key Pair - Done
2,671,559 UART: [art] Signing Cert with AUTHO
2,672,039 UART: RITY.KEYID = 7
2,687,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,084 UART: [art] PUB.X = 2BEC9BB2E8F79B89D09565EC2D688AB896A25FA8640163A9DA33CCF4C752D23892B63C43D8F1816883386B02602EA5ED
2,694,854 UART: [art] PUB.Y = 561FC7115AB0FDFB38FAE581089C7B08879CF7081A4F6747A9082A82748674D5B772DFE2B2EDE0845C0AC86036D0D7EE
2,701,797 UART: [art] SIG.R = 3755D53D6C64298771129BA68B7A224FD7D2FDA3C42373981423153F3F7398842FFC1F98D3F048A16F117AC59A589EFF
2,708,565 UART: [art] SIG.S = 986F86E3CCBE543A3955206609041D30CFC3F04F458D156506470CC344C2BE3C65DCA763FE18C981AF9314E15FAC9816
2,731,912 UART: mbox::rt_entry...
2,732,284 UART: ____ _ _ _ ____ _____
2,733,068 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,868 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,636 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,404 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,172 UART: |_|
2,736,484 UART:
2,843,092 UART: [rt] Runtime listening for mailbox commands...
2,843,854 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,969 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,063 UART:
2,844,079 UART: Running Caliptra ROM ...
2,844,487 UART:
2,844,542 UART: [state] CFI Enabled
2,847,345 UART: [state] LifecycleState = Production
2,847,953 UART: [state] DebugLocked = Yes
2,848,555 UART: [state] Starting the WD Timer 40000000 cycles
2,850,166 UART: [kat] SHA2-256
3,653,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,845 UART: [kat] ++
3,657,997 UART: [kat] sha1
3,662,223 UART: [kat] SHA2-256
3,664,163 UART: [kat] SHA2-384
3,666,886 UART: [kat] SHA2-512-ACC
3,668,787 UART: [kat] ECC-384
3,677,962 UART: [kat] HMAC-384Kdf
3,682,564 UART: [kat] LMS
3,930,876 UART: [kat] --
3,931,680 UART: [warm-reset] ++
3,932,641 UART: [warm-reset] --
3,933,494 UART: [state] Locking Datavault
3,934,318 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,922 UART: [state] Locking ICCM
3,935,552 UART: [exit] Launching FMC @ 0x40000130
3,940,881 UART:
3,940,897 UART: Running Caliptra FMC ...
3,941,305 UART:
3,941,359 UART: [state] CFI Enabled
3,942,286 UART: [aliasrt :skip pcr extension
3,942,759 UART: [art] Extend RT PCRs Done
3,943,187 UART: [art] Lock RT PCRs Done
3,944,284 UART: [art] Populate DV Done
3,952,164 UART: [fht] FMC Alias Private Key: 7
3,953,114 UART: [art] Derive CDI
3,953,394 UART: [art] Store in in slot 0x4
4,038,649 UART: [art] Derive Key Pair
4,039,009 UART: [art] Store priv key in slot 0x5
4,052,289 UART: [art] Derive Key Pair - Done
4,066,565 UART: [art] Signing Cert with AUTHO
4,067,045 UART: RITY.KEYID = 7
4,082,181 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,946 UART: [art] PUB.X = 2BEC9BB2E8F79B89D09565EC2D688AB896A25FA8640163A9DA33CCF4C752D23892B63C43D8F1816883386B02602EA5ED
4,089,716 UART: [art] PUB.Y = 561FC7115AB0FDFB38FAE581089C7B08879CF7081A4F6747A9082A82748674D5B772DFE2B2EDE0845C0AC86036D0D7EE
4,096,659 UART: [art] SIG.R = 3755D53D6C64298771129BA68B7A224FD7D2FDA3C42373981423153F3F7398842FFC1F98D3F048A16F117AC59A589EFF
4,103,427 UART: [art] SIG.S = 986F86E3CCBE543A3955206609041D30CFC3F04F458D156506470CC344C2BE3C65DCA763FE18C981AF9314E15FAC9816
4,127,024 UART: mbox::rt_entry...
4,127,396 UART: ____ _ _ _ ____ _____
4,128,180 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,980 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,748 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,516 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,284 UART: |_|
4,131,596 UART:
4,414,942 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Production
86,090 UART: [state] DebugLocked = Yes
86,656 UART: [state] Starting the WD Timer 40000000 cycles
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,502 UART: [kat] SHA2-256
902,442 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 ready_for_fw is high
1,174,591 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,735 UART: [idev] Sha1 KeyId Algorithm
1,208,672 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,050 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,920 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,626 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,576 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,822 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,229 >>> mbox cmd response: success
2,339,289 UART: [afmc] ++
2,339,457 UART: [afmc] CDI.KEYID = 6
2,339,820 UART: [afmc] SUBJECT.KEYID = 7
2,340,246 UART: [afmc] AUTHORITY.KEYID = 5
2,375,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,324 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,043 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,936 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,643 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,612 UART: [afmc] --
2,419,579 UART: [cold-reset] --
2,420,313 UART: [state] Locking Datavault
2,421,424 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,028 UART: [state] Locking ICCM
2,422,600 UART: [exit] Launching FMC @ 0x40000130
2,427,929 UART:
2,427,945 UART: Running Caliptra FMC ...
2,428,353 UART:
2,428,496 UART: [state] CFI Enabled
2,439,543 UART: [fht] FMC Alias Private Key: 7
2,547,988 UART: [art] Extend RT PCRs Done
2,548,416 UART: [art] Lock RT PCRs Done
2,549,878 UART: [art] Populate DV Done
2,558,284 UART: [fht] FMC Alias Private Key: 7
2,559,362 UART: [art] Derive CDI
2,559,642 UART: [art] Store in in slot 0x4
2,645,357 UART: [art] Derive Key Pair
2,645,717 UART: [art] Store priv key in slot 0x5
2,659,111 UART: [art] Derive Key Pair - Done
2,673,899 UART: [art] Signing Cert with AUTHO
2,674,379 UART: RITY.KEYID = 7
2,689,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,146 UART: [art] PUB.X = 37FFF8CD5085DC080AD52FE803751B85E55AECAB62D8A7AF677FF8A79FB07575BF289D8A2F0B2B78C3FE54389A10BFBD
2,696,926 UART: [art] PUB.Y = 1C6ABCF504F313826B7787C1E9BE480E96117B9CC13DD31401382184968BC4054A3BB52D3B4CAA6D348754E44E466310
2,703,862 UART: [art] SIG.R = 62412E9DCCA509A3AED64582831CB6995AF630A4DE62DE51CA3796C80CD480141B10E017D7E83B2A05827D5372EC5FA2
2,710,629 UART: [art] SIG.S = C285F2648BE616D5B753D2C011F4371BFDAA923BD27FA69E445BC3E62E48EC6DB454ABAC814A97B7DB8C337A9CC24749
2,734,056 UART: mbox::rt_entry...
2,734,428 UART: ____ _ _ _ ____ _____
2,735,212 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,012 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,737,548 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,316 UART: |_|
2,738,628 UART:
2,845,004 UART: [rt] Runtime listening for mailbox commands...
2,845,766 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,845,881 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,975 UART:
2,845,991 UART: Running Caliptra ROM ...
2,846,399 UART:
2,846,541 UART: [state] CFI Enabled
2,849,634 UART: [state] LifecycleState = Production
2,850,242 UART: [state] DebugLocked = Yes
2,850,830 UART: [state] Starting the WD Timer 40000000 cycles
2,852,427 UART: [kat] SHA2-256
3,655,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,106 UART: [kat] ++
3,660,258 UART: [kat] sha1
3,664,510 UART: [kat] SHA2-256
3,666,450 UART: [kat] SHA2-384
3,669,097 UART: [kat] SHA2-512-ACC
3,670,998 UART: [kat] ECC-384
3,680,929 UART: [kat] HMAC-384Kdf
3,685,535 UART: [kat] LMS
3,933,847 UART: [kat] --
3,934,653 UART: [warm-reset] ++
3,935,406 UART: [warm-reset] --
3,936,089 UART: [state] Locking Datavault
3,936,947 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,551 UART: [state] Locking ICCM
3,938,165 UART: [exit] Launching FMC @ 0x40000130
3,943,494 UART:
3,943,510 UART: Running Caliptra FMC ...
3,943,918 UART:
3,944,061 UART: [state] CFI Enabled
3,945,572 UART: [aliasrt :skip pcr extension
3,946,045 UART: [art] Extend RT PCRs Done
3,946,473 UART: [art] Lock RT PCRs Done
3,947,896 UART: [art] Populate DV Done
3,956,268 UART: [fht] FMC Alias Private Key: 7
3,957,238 UART: [art] Derive CDI
3,957,518 UART: [art] Store in in slot 0x4
4,043,149 UART: [art] Derive Key Pair
4,043,509 UART: [art] Store priv key in slot 0x5
4,056,467 UART: [art] Derive Key Pair - Done
4,071,263 UART: [art] Signing Cert with AUTHO
4,071,743 UART: RITY.KEYID = 7
4,086,935 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,700 UART: [art] PUB.X = 37FFF8CD5085DC080AD52FE803751B85E55AECAB62D8A7AF677FF8A79FB07575BF289D8A2F0B2B78C3FE54389A10BFBD
4,094,480 UART: [art] PUB.Y = 1C6ABCF504F313826B7787C1E9BE480E96117B9CC13DD31401382184968BC4054A3BB52D3B4CAA6D348754E44E466310
4,101,416 UART: [art] SIG.R = 62412E9DCCA509A3AED64582831CB6995AF630A4DE62DE51CA3796C80CD480141B10E017D7E83B2A05827D5372EC5FA2
4,108,183 UART: [art] SIG.S = C285F2648BE616D5B753D2C011F4371BFDAA923BD27FA69E445BC3E62E48EC6DB454ABAC814A97B7DB8C337A9CC24749
4,131,632 UART: mbox::rt_entry...
4,132,004 UART: ____ _ _ _ ____ _____
4,132,788 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,356 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,135,124 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,892 UART: |_|
4,136,204 UART:
4,414,978 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,746 UART: [state] LifecycleState = Production
86,354 UART: [state] DebugLocked = Yes
87,098 UART: [state] Starting the WD Timer 40000000 cycles
88,583 UART: [kat] SHA2-256
892,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,262 UART: [kat] ++
896,414 UART: [kat] sha1
900,628 UART: [kat] SHA2-256
902,568 UART: [kat] SHA2-384
905,259 UART: [kat] SHA2-512-ACC
907,160 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,485 UART: [kat] LMS
1,169,797 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,903 UART: [fht] FHT @ 0x50003400
1,173,597 UART: [idev] ++
1,173,765 UART: [idev] CDI.KEYID = 6
1,174,126 UART: [idev] SUBJECT.KEYID = 7
1,174,551 UART: [idev] UDS.KEYID = 0
1,174,897 ready_for_fw is high
1,174,897 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,241,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,808 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,502 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,372 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,078 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,034 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,280,991 UART: [fwproc] Recv command 0x46574c44
1,281,724 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,924 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,235 >>> mbox cmd response: success
2,337,293 UART: [afmc] ++
2,337,461 UART: [afmc] CDI.KEYID = 6
2,337,824 UART: [afmc] SUBJECT.KEYID = 7
2,338,250 UART: [afmc] AUTHORITY.KEYID = 5
2,374,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,444 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,163 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,056 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,763 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,756 UART: [afmc] --
2,417,793 UART: [cold-reset] --
2,418,749 UART: [state] Locking Datavault
2,420,146 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,750 UART: [state] Locking ICCM
2,421,368 UART: [exit] Launching FMC @ 0x40000130
2,426,697 UART:
2,426,713 UART: Running Caliptra FMC ...
2,427,121 UART:
2,427,264 UART: [state] CFI Enabled
2,437,757 UART: [fht] FMC Alias Private Key: 7
2,545,630 UART: [art] Extend RT PCRs Done
2,546,058 UART: [art] Lock RT PCRs Done
2,547,576 UART: [art] Populate DV Done
2,556,126 UART: [fht] FMC Alias Private Key: 7
2,557,166 UART: [art] Derive CDI
2,557,446 UART: [art] Store in in slot 0x4
2,642,577 UART: [art] Derive Key Pair
2,642,937 UART: [art] Store priv key in slot 0x5
2,655,855 UART: [art] Derive Key Pair - Done
2,670,592 UART: [art] Signing Cert with AUTHO
2,671,072 UART: RITY.KEYID = 7
2,686,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,313 UART: [art] PUB.X = 8356EC4C2F4D3D41FE1F68CD0199076976A0303C5D00A6D394934336405362633DC579B25BF3BE43652C6590EF0D1119
2,694,044 UART: [art] PUB.Y = 3E6C5696781565BCB7996C0F3B729D9316577038F9FA5CB25ACC1A0083BE3A50ED8EA5F8A794CB405584901F6928E37F
2,700,971 UART: [art] SIG.R = 069D46F92902A913466D947B583624711081A89D287139BDCA7214EEE354E3BC83C93DD4DCCD494DAF504FD5C57C5E77
2,707,737 UART: [art] SIG.S = 9EC1A192A9B4DA51543C4919648E1B6C1583588A7AE3629B78FCDFF07B239196829BE23BACE97CB59D599DD16EF0EC27
2,731,404 UART: mbox::rt_entry...
2,731,776 UART: ____ _ _ _ ____ _____
2,732,560 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,360 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,664 UART: |_|
2,735,976 UART:
2,842,250 UART: [rt] Runtime listening for mailbox commands...
2,843,012 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,127 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,221 UART:
2,843,237 UART: Running Caliptra ROM ...
2,843,645 UART:
2,843,787 UART: [state] CFI Enabled
2,846,688 UART: [state] LifecycleState = Production
2,847,296 UART: [state] DebugLocked = Yes
2,847,880 UART: [state] Starting the WD Timer 40000000 cycles
2,849,469 UART: [kat] SHA2-256
3,653,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,148 UART: [kat] ++
3,657,300 UART: [kat] sha1
3,661,494 UART: [kat] SHA2-256
3,663,434 UART: [kat] SHA2-384
3,666,195 UART: [kat] SHA2-512-ACC
3,668,096 UART: [kat] ECC-384
3,677,803 UART: [kat] HMAC-384Kdf
3,682,533 UART: [kat] LMS
3,930,845 UART: [kat] --
3,931,841 UART: [warm-reset] ++
3,932,868 UART: [warm-reset] --
3,933,611 UART: [state] Locking Datavault
3,934,379 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,983 UART: [state] Locking ICCM
3,935,495 UART: [exit] Launching FMC @ 0x40000130
3,940,824 UART:
3,940,840 UART: Running Caliptra FMC ...
3,941,248 UART:
3,941,391 UART: [state] CFI Enabled
3,942,590 UART: [aliasrt :skip pcr extension
3,943,063 UART: [art] Extend RT PCRs Done
3,943,491 UART: [art] Lock RT PCRs Done
3,944,794 UART: [art] Populate DV Done
3,952,960 UART: [fht] FMC Alias Private Key: 7
3,953,922 UART: [art] Derive CDI
3,954,202 UART: [art] Store in in slot 0x4
4,039,487 UART: [art] Derive Key Pair
4,039,847 UART: [art] Store priv key in slot 0x5
4,053,051 UART: [art] Derive Key Pair - Done
4,067,748 UART: [art] Signing Cert with AUTHO
4,068,228 UART: RITY.KEYID = 7
4,083,868 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,633 UART: [art] PUB.X = 8356EC4C2F4D3D41FE1F68CD0199076976A0303C5D00A6D394934336405362633DC579B25BF3BE43652C6590EF0D1119
4,091,364 UART: [art] PUB.Y = 3E6C5696781565BCB7996C0F3B729D9316577038F9FA5CB25ACC1A0083BE3A50ED8EA5F8A794CB405584901F6928E37F
4,098,291 UART: [art] SIG.R = 069D46F92902A913466D947B583624711081A89D287139BDCA7214EEE354E3BC83C93DD4DCCD494DAF504FD5C57C5E77
4,105,057 UART: [art] SIG.S = 9EC1A192A9B4DA51543C4919648E1B6C1583588A7AE3629B78FCDFF07B239196829BE23BACE97CB59D599DD16EF0EC27
4,128,854 UART: mbox::rt_entry...
4,129,226 UART: ____ _ _ _ ____ _____
4,130,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,578 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,114 UART: |_|
4,133,426 UART:
4,413,738 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
191,467 UART:
191,824 UART: Running Caliptra ROM ...
192,937 UART:
193,079 UART: [state] CFI Enabled
264,136 UART: [state] LifecycleState = Production
266,372 UART: [state] DebugLocked = Yes
268,003 UART: [state] Starting the WD Timer 40000000 cycles
272,602 UART: [kat] SHA2-256
454,632 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,106 UART: [kat] ++
466,626 UART: [kat] sha1
478,019 UART: [kat] SHA2-256
481,108 UART: [kat] SHA2-384
486,548 UART: [kat] SHA2-512-ACC
489,026 UART: [kat] ECC-384
3,777,064 UART: [kat] HMAC-384Kdf
3,802,822 UART: [kat] LMS
4,876,014 UART: [kat] --
4,881,615 UART: [cold-reset] ++
4,883,200 UART: [fht] FHT @ 0x50003400
4,894,552 UART: [idev] ++
4,895,232 UART: [idev] CDI.KEYID = 6
4,896,413 UART: [idev] SUBJECT.KEYID = 7
4,897,589 UART: [idev] UDS.KEYID = 0
4,898,530 ready_for_fw is high
4,898,720 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,042,121 UART: [idev] Erasing UDS.KEYID = 0
8,240,524 UART: [idev] Sha1 KeyId Algorithm
8,260,832 UART: [idev] --
8,264,865 UART: [ldev] ++
8,265,446 UART: [ldev] CDI.KEYID = 6
8,266,679 UART: [ldev] SUBJECT.KEYID = 5
8,267,784 UART: [ldev] AUTHORITY.KEYID = 7
8,269,014 UART: [ldev] FE.KEYID = 1
8,297,507 UART: [ldev] Erasing FE.KEYID = 1
11,628,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,981 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,939,350 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,955,336 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,971,419 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,992,086 UART: [ldev] --
13,996,649 UART: [fwproc] Wait for Commands...
13,999,286 UART: [fwproc] Recv command 0x46574c44
14,001,592 UART: [fwproc] Recv'd Img size: 114124 bytes
18,105,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,174,193 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,242,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,559,812 >>> mbox cmd response: success
18,564,727 UART: [afmc] ++
18,565,340 UART: [afmc] CDI.KEYID = 6
18,566,413 UART: [afmc] SUBJECT.KEYID = 7
18,567,761 UART: [afmc] AUTHORITY.KEYID = 5
21,929,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,231 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,245,180 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,261,333 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,277,385 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,300,112 UART: [afmc] --
24,304,022 UART: [cold-reset] --
24,307,345 UART: [state] Locking Datavault
24,313,728 UART: [state] Locking PCR0, PCR1 and PCR31
24,315,431 UART: [state] Locking ICCM
24,317,073 UART: [exit] Launching FMC @ 0x40000130
24,325,742 UART:
24,325,976 UART: Running Caliptra FMC ...
24,327,246 UART:
24,327,412 UART: [state] CFI Enabled
24,385,887 UART: [fht] FMC Alias Private Key: 7
26,723,959 UART: [art] Extend RT PCRs Done
26,725,191 UART: [art] Lock RT PCRs Done
26,726,822 UART: [art] Populate DV Done
26,732,435 UART: [fht] FMC Alias Private Key: 7
26,734,033 UART: [art] Derive CDI
26,734,773 UART: [art] Store in in slot 0x4
26,794,296 UART: [art] Derive Key Pair
26,795,292 UART: [art] Store priv key in slot 0x5
30,087,947 UART: [art] Derive Key Pair - Done
30,101,166 UART: [art] Signing Cert with AUTHO
30,102,478 UART: RITY.KEYID = 7
32,389,544 UART: [art] Erasing AUTHORITY.KEYID = 7
32,391,057 UART: [art] PUB.X = 7A744D22706AE3EE54194C47A595C467D60AE5FA5C2E6A103D71C1B3925B39E7EE50F5850626E462FFF08CAF024EBE57
32,398,334 UART: [art] PUB.Y = 4375DB0031682751B69B1A63BA9456BAAE1C21E11C6A34B1DED38416157B0E1B8A567B9E19205EECF4D6FC05CF129282
32,405,573 UART: [art] SIG.R = CD3534BBD09AA97BF0F28FAFE8821D4BCF100250D1387D4D34E2F57E057564ABF567DBBA8E75CCD212569DFE2CBE41A8
32,413,021 UART: [art] SIG.S = 83F9E52D27E3E380236B91B0AF4F96EC7EDFCD0AA69C93F4126721620E619B972F0C8DC020D3F866E51C7A777A6825CA
33,718,128 UART: Caliptra RT
33,718,848 UART: [state] CFI Enabled
33,879,109 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,008 UART:
1,178 UART: Running Caliptra ROM ...
2,227 UART:
2,375 UART: [state] CFI Enabled
62,541 UART: [state] LifecycleState = Production
64,305 UART: [state] DebugLocked = Yes
66,829 UART: [state] Starting the WD Timer 40000000 cycles
71,772 UART: [kat] SHA2-256
253,742 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
265,223 UART: [kat] ++
265,739 UART: [kat] sha1
276,189 UART: [kat] SHA2-256
279,204 UART: [kat] SHA2-384
286,477 UART: [kat] SHA2-512-ACC
289,130 UART: [kat] ECC-384
3,575,238 UART: [kat] HMAC-384Kdf
3,602,219 UART: [kat] LMS
4,675,355 UART: [kat] --
4,679,568 UART: [warm-reset] ++
4,683,228 UART: [warm-reset] --
4,687,434 UART: [state] Locking Datavault
4,690,077 UART: [state] Locking PCR0, PCR1 and PCR31
4,692,282 UART: [state] Locking ICCM
4,694,001 UART: [exit] Launching FMC @ 0x40000130
4,702,676 UART:
4,702,931 UART: Running Caliptra FMC ...
4,704,041 UART:
4,704,207 UART: [state] CFI Enabled
4,766,901 UART: [aliasrt :skip pcr extension
4,768,191 UART: [art] Extend RT PCRs Done
4,769,337 UART: [art] Lock RT PCRs Done
4,770,620 UART: [art] Populate DV Done
4,776,404 UART: [fht] FMC Alias Private Key: 7
4,778,059 UART: [art] Derive CDI
4,778,878 UART: [art] Store in in slot 0x4
4,835,485 UART: [art] Derive Key Pair
4,836,485 UART: [art] Store priv key in slot 0x5
8,129,117 UART: [art] Derive Key Pair - Done
8,142,072 UART: [art] Signing Cert with AUTHO
8,143,391 UART: RITY.KEYID = 7
10,431,629 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,168 UART: [art] PUB.X = 7A744D22706AE3EE54194C47A595C467D60AE5FA5C2E6A103D71C1B3925B39E7EE50F5850626E462FFF08CAF024EBE57
10,440,394 UART: [art] PUB.Y = 4375DB0031682751B69B1A63BA9456BAAE1C21E11C6A34B1DED38416157B0E1B8A567B9E19205EECF4D6FC05CF129282
10,447,632 UART: [art] SIG.R = CD3534BBD09AA97BF0F28FAFE8821D4BCF100250D1387D4D34E2F57E057564ABF567DBBA8E75CCD212569DFE2CBE41A8
10,455,048 UART: [art] SIG.S = 83F9E52D27E3E380236B91B0AF4F96EC7EDFCD0AA69C93F4126721620E619B972F0C8DC020D3F866E51C7A777A6825CA
11,760,572 UART: Caliptra RT
11,761,276 UART: [state] CFI Enabled
12,096,330 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,534 UART:
191,897 UART: Running Caliptra ROM ...
193,015 UART:
193,168 UART: [state] CFI Enabled
264,084 UART: [state] LifecycleState = Production
266,321 UART: [state] DebugLocked = Yes
269,175 UART: [state] Starting the WD Timer 40000000 cycles
273,836 UART: [kat] SHA2-256
455,799 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,357 UART: [kat] ++
467,804 UART: [kat] sha1
478,700 UART: [kat] SHA2-256
481,716 UART: [kat] SHA2-384
487,568 UART: [kat] SHA2-512-ACC
490,220 UART: [kat] ECC-384
3,774,541 UART: [kat] HMAC-384Kdf
3,802,770 UART: [kat] LMS
4,875,935 UART: [kat] --
4,881,493 UART: [cold-reset] ++
4,883,782 UART: [fht] FHT @ 0x50003400
4,895,982 UART: [idev] ++
4,896,689 UART: [idev] CDI.KEYID = 6
4,897,926 UART: [idev] SUBJECT.KEYID = 7
4,899,031 UART: [idev] UDS.KEYID = 0
4,899,963 ready_for_fw is high
4,900,155 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,043,784 UART: [idev] Erasing UDS.KEYID = 0
8,246,793 UART: [idev] Sha1 KeyId Algorithm
8,270,215 UART: [idev] --
8,274,264 UART: [ldev] ++
8,274,838 UART: [ldev] CDI.KEYID = 6
8,276,073 UART: [ldev] SUBJECT.KEYID = 5
8,277,181 UART: [ldev] AUTHORITY.KEYID = 7
8,278,409 UART: [ldev] FE.KEYID = 1
8,316,727 UART: [ldev] Erasing FE.KEYID = 1
11,656,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,544 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,979,849 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,995,821 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,011,975 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,032,532 UART: [ldev] --
14,037,955 UART: [fwproc] Wait for Commands...
14,041,209 UART: [fwproc] Recv command 0x46574c44
14,043,093 UART: [fwproc] Recv'd Img size: 114124 bytes
18,154,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,230,627 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,299,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,615,987 >>> mbox cmd response: success
18,619,278 UART: [afmc] ++
18,619,898 UART: [afmc] CDI.KEYID = 6
18,621,087 UART: [afmc] SUBJECT.KEYID = 7
18,622,195 UART: [afmc] AUTHORITY.KEYID = 5
21,988,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,288,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,290,333 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,306,338 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,322,415 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,338,464 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,359,853 UART: [afmc] --
24,363,609 UART: [cold-reset] --
24,366,383 UART: [state] Locking Datavault
24,372,938 UART: [state] Locking PCR0, PCR1 and PCR31
24,374,635 UART: [state] Locking ICCM
24,376,188 UART: [exit] Launching FMC @ 0x40000130
24,384,852 UART:
24,385,092 UART: Running Caliptra FMC ...
24,386,193 UART:
24,386,355 UART: [state] CFI Enabled
24,445,196 UART: [fht] FMC Alias Private Key: 7
26,783,848 UART: [art] Extend RT PCRs Done
26,785,083 UART: [art] Lock RT PCRs Done
26,786,819 UART: [art] Populate DV Done
26,792,397 UART: [fht] FMC Alias Private Key: 7
26,794,053 UART: [art] Derive CDI
26,794,873 UART: [art] Store in in slot 0x4
26,853,376 UART: [art] Derive Key Pair
26,854,417 UART: [art] Store priv key in slot 0x5
30,146,559 UART: [art] Derive Key Pair - Done
30,159,661 UART: [art] Signing Cert with AUTHO
30,160,959 UART: RITY.KEYID = 7
32,448,299 UART: [art] Erasing AUTHORITY.KEYID = 7
32,449,816 UART: [art] PUB.X = 6A63B814810902D03AA69E4BBFBC70867546E32B848DC309C2E1C3689824979339436B5AC9A6BD305DB9B070A5B31857
32,457,093 UART: [art] PUB.Y = 143043B36981DA1EAAC8CEC5FC528B4F9EACFB677BED437465DDBA9D53254B9CEFC13C516BED5911AE9C0C798EAD7D07
32,464,346 UART: [art] SIG.R = 63E54437A6B34317A024813B59D6F1013B0BEBCDADCA3538CFE657E9E8825393F5A9206AE6664C6625B8AD6D19D20B18
32,471,714 UART: [art] SIG.S = 63EA7C345DB8071C00910D730361556100874BC42DEFBDCAEDD44BDB45430969F907CA8B513207B983059A35637D5A98
33,777,027 UART: Caliptra RT
33,777,746 UART: [state] CFI Enabled
33,938,422 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,012 UART:
1,178 UART: Running Caliptra ROM ...
2,220 UART:
2,367 UART: [state] CFI Enabled
67,886 UART: [state] LifecycleState = Production
69,647 UART: [state] DebugLocked = Yes
71,711 UART: [state] Starting the WD Timer 40000000 cycles
76,609 UART: [kat] SHA2-256
258,547 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
270,086 UART: [kat] ++
270,594 UART: [kat] sha1
280,792 UART: [kat] SHA2-256
283,809 UART: [kat] SHA2-384
289,686 UART: [kat] SHA2-512-ACC
292,300 UART: [kat] ECC-384
3,576,079 UART: [kat] HMAC-384Kdf
3,602,945 UART: [kat] LMS
4,676,124 UART: [kat] --
4,680,816 UART: [warm-reset] ++
4,686,699 UART: [warm-reset] --
4,690,411 UART: [state] Locking Datavault
4,694,430 UART: [state] Locking PCR0, PCR1 and PCR31
4,696,629 UART: [state] Locking ICCM
4,698,084 UART: [exit] Launching FMC @ 0x40000130
4,706,721 UART:
4,706,960 UART: Running Caliptra FMC ...
4,708,066 UART:
4,708,244 UART: [state] CFI Enabled
4,769,584 UART: [aliasrt :skip pcr extension
4,770,874 UART: [art] Extend RT PCRs Done
4,772,022 UART: [art] Lock RT PCRs Done
4,773,255 UART: [art] Populate DV Done
4,778,824 UART: [fht] FMC Alias Private Key: 7
4,780,578 UART: [art] Derive CDI
4,781,389 UART: [art] Store in in slot 0x4
4,838,193 UART: [art] Derive Key Pair
4,839,260 UART: [art] Store priv key in slot 0x5
8,132,307 UART: [art] Derive Key Pair - Done
8,145,625 UART: [art] Signing Cert with AUTHO
8,146,938 UART: RITY.KEYID = 7
10,432,967 UART: [art] Erasing AUTHORITY.KEYID = 7
10,434,474 UART: [art] PUB.X = 6A63B814810902D03AA69E4BBFBC70867546E32B848DC309C2E1C3689824979339436B5AC9A6BD305DB9B070A5B31857
10,441,713 UART: [art] PUB.Y = 143043B36981DA1EAAC8CEC5FC528B4F9EACFB677BED437465DDBA9D53254B9CEFC13C516BED5911AE9C0C798EAD7D07
10,448,963 UART: [art] SIG.R = 63E54437A6B34317A024813B59D6F1013B0BEBCDADCA3538CFE657E9E8825393F5A9206AE6664C6625B8AD6D19D20B18
10,456,358 UART: [art] SIG.S = 63EA7C345DB8071C00910D730361556100874BC42DEFBDCAEDD44BDB45430969F907CA8B513207B983059A35637D5A98
11,762,163 UART: Caliptra RT
11,762,874 UART: [state] CFI Enabled
12,097,071 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
191,800 UART:
192,199 UART: Running Caliptra ROM ...
193,391 UART:
603,129 UART: [state] CFI Enabled
617,222 UART: [state] LifecycleState = Production
619,421 UART: [state] DebugLocked = Yes
622,269 UART: [state] Starting the WD Timer 40000000 cycles
627,863 UART: [kat] SHA2-256
809,883 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,431 UART: [kat] ++
821,875 UART: [kat] sha1
832,627 UART: [kat] SHA2-256
835,635 UART: [kat] SHA2-384
840,721 UART: [kat] SHA2-512-ACC
843,338 UART: [kat] ECC-384
4,098,597 UART: [kat] HMAC-384Kdf
4,110,694 UART: [kat] LMS
5,183,800 UART: [kat] --
5,186,997 UART: [cold-reset] ++
5,189,713 UART: [fht] FHT @ 0x50003400
5,201,333 UART: [idev] ++
5,202,039 UART: [idev] CDI.KEYID = 6
5,203,211 UART: [idev] SUBJECT.KEYID = 7
5,204,666 UART: [idev] UDS.KEYID = 0
5,205,919 ready_for_fw is high
5,206,140 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,349,533 UART: [idev] Erasing UDS.KEYID = 0
8,497,827 UART: [idev] Sha1 KeyId Algorithm
8,518,442 UART: [idev] --
8,523,169 UART: [ldev] ++
8,523,749 UART: [ldev] CDI.KEYID = 6
8,524,907 UART: [ldev] SUBJECT.KEYID = 5
8,526,113 UART: [ldev] AUTHORITY.KEYID = 7
8,527,280 UART: [ldev] FE.KEYID = 1
8,539,612 UART: [ldev] Erasing FE.KEYID = 1
11,824,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,471 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,131,733 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,147,766 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,163,861 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,183,701 UART: [ldev] --
14,189,060 UART: [fwproc] Wait for Commands...
14,191,793 UART: [fwproc] Recv command 0x46574c44
14,194,037 UART: [fwproc] Recv'd Img size: 114124 bytes
18,300,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,368,542 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,437,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,754,870 >>> mbox cmd response: success
18,758,717 UART: [afmc] ++
18,759,375 UART: [afmc] CDI.KEYID = 6
18,760,520 UART: [afmc] SUBJECT.KEYID = 7
18,761,678 UART: [afmc] AUTHORITY.KEYID = 5
22,077,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,372,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,375,153 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,391,100 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,407,251 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,423,282 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,445,840 UART: [afmc] --
24,450,025 UART: [cold-reset] --
24,455,076 UART: [state] Locking Datavault
24,459,942 UART: [state] Locking PCR0, PCR1 and PCR31
24,461,636 UART: [state] Locking ICCM
24,463,575 UART: [exit] Launching FMC @ 0x40000130
24,472,242 UART:
24,472,494 UART: Running Caliptra FMC ...
24,473,591 UART:
24,473,751 UART: [state] CFI Enabled
24,481,737 UART: [fht] FMC Alias Private Key: 7
26,812,319 UART: [art] Extend RT PCRs Done
26,813,539 UART: [art] Lock RT PCRs Done
26,815,108 UART: [art] Populate DV Done
26,820,247 UART: [fht] FMC Alias Private Key: 7
26,821,943 UART: [art] Derive CDI
26,822,750 UART: [art] Store in in slot 0x4
26,865,189 UART: [art] Derive Key Pair
26,866,226 UART: [art] Store priv key in slot 0x5
30,108,077 UART: [art] Derive Key Pair - Done
30,121,173 UART: [art] Signing Cert with AUTHO
30,122,499 UART: RITY.KEYID = 7
32,401,904 UART: [art] Erasing AUTHORITY.KEYID = 7
32,403,425 UART: [art] PUB.X = 19F3CF2F4748839D148B418A9BF7FEBB09CA315B3275A9A9CD01B8EF61AB085408252C84A2E1C8087E803D1F88EA59CC
32,410,689 UART: [art] PUB.Y = D6AE8338F3C1120BD3070FADC43B5D1D20874D9247B4086FAEBA54EC83E05D49D94C4762F7F44231EC28F9113459FA95
32,417,926 UART: [art] SIG.R = 08872035B9B558B87283B7A87881B202D7BEB4AD83FD7F0BA66A7B711C76D25AB6E69871A762FC2B6B9D72CFEA9806BD
32,425,327 UART: [art] SIG.S = D7A939F7DE9C5976F5B3DC23873837404F8032EBC4091CABB8BE58000968005740CEB53B45A417E25895F0DC8F845044
33,730,450 UART: Caliptra RT
33,731,151 UART: [state] CFI Enabled
33,848,589 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,021 UART:
1,279 UART: Running Caliptra ROM ...
2,386 UART:
6,669,858 UART: [state] CFI Enabled
6,682,990 UART: [state] LifecycleState = Production
6,684,740 UART: [state] DebugLocked = Yes
6,686,950 UART: [state] Starting the WD Timer 40000000 cycles
6,691,520 UART: [kat] SHA2-256
6,873,520 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,885,072 UART: [kat] ++
6,885,540 UART: [kat] sha1
6,895,831 UART: [kat] SHA2-256
6,898,901 UART: [kat] SHA2-384
6,904,231 UART: [kat] SHA2-512-ACC
6,906,849 UART: [kat] ECC-384
10,162,775 UART: [kat] HMAC-384Kdf
10,174,677 UART: [kat] LMS
11,247,860 UART: [kat] --
11,251,217 UART: [warm-reset] ++
11,257,309 UART: [warm-reset] --
11,263,060 UART: [state] Locking Datavault
11,266,317 UART: [state] Locking PCR0, PCR1 and PCR31
11,268,509 UART: [state] Locking ICCM
11,271,234 UART: [exit] Launching FMC @ 0x40000130
11,279,866 UART:
11,280,101 UART: Running Caliptra FMC ...
11,281,198 UART:
11,281,348 UART: [state] CFI Enabled
11,283,554 UART: [aliasrt :skip pcr extension
11,284,792 UART: [art] Extend RT PCRs Done
11,285,923 UART: [art] Lock RT PCRs Done
11,287,198 UART: [art] Populate DV Done
11,292,917 UART: [fht] FMC Alias Private Key: 7
11,294,615 UART: [art] Derive CDI
11,295,417 UART: [art] Store in in slot 0x4
11,337,852 UART: [art] Derive Key Pair
11,338,889 UART: [art] Store priv key in slot 0x5
14,581,116 UART: [art] Derive Key Pair - Done
14,594,321 UART: [art] Signing Cert with AUTHO
14,595,650 UART: RITY.KEYID = 7
16,875,313 UART: [art] Erasing AUTHORITY.KEYID = 7
16,876,815 UART: [art] PUB.X = 19F3CF2F4748839D148B418A9BF7FEBB09CA315B3275A9A9CD01B8EF61AB085408252C84A2E1C8087E803D1F88EA59CC
16,884,051 UART: [art] PUB.Y = D6AE8338F3C1120BD3070FADC43B5D1D20874D9247B4086FAEBA54EC83E05D49D94C4762F7F44231EC28F9113459FA95
16,891,284 UART: [art] SIG.R = 08872035B9B558B87283B7A87881B202D7BEB4AD83FD7F0BA66A7B711C76D25AB6E69871A762FC2B6B9D72CFEA9806BD
16,898,671 UART: [art] SIG.S = D7A939F7DE9C5976F5B3DC23873837404F8032EBC4091CABB8BE58000968005740CEB53B45A417E25895F0DC8F845044
18,203,220 UART: Caliptra RT
18,203,932 UART: [state] CFI Enabled
18,492,724 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
191,689 UART:
192,243 UART: Running Caliptra ROM ...
193,390 UART:
602,844 UART: [state] CFI Enabled
620,890 UART: [state] LifecycleState = Production
623,076 UART: [state] DebugLocked = Yes
625,918 UART: [state] Starting the WD Timer 40000000 cycles
630,721 UART: [kat] SHA2-256
812,683 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
824,222 UART: [kat] ++
824,823 UART: [kat] sha1
834,896 UART: [kat] SHA2-256
837,976 UART: [kat] SHA2-384
844,256 UART: [kat] SHA2-512-ACC
846,846 UART: [kat] ECC-384
4,103,452 UART: [kat] HMAC-384Kdf
4,115,066 UART: [kat] LMS
5,188,269 UART: [kat] --
5,192,696 UART: [cold-reset] ++
5,195,214 UART: [fht] FHT @ 0x50003400
5,207,890 UART: [idev] ++
5,208,589 UART: [idev] CDI.KEYID = 6
5,209,831 UART: [idev] SUBJECT.KEYID = 7
5,211,214 UART: [idev] UDS.KEYID = 0
5,212,471 ready_for_fw is high
5,212,670 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,355,994 UART: [idev] Erasing UDS.KEYID = 0
8,503,186 UART: [idev] Sha1 KeyId Algorithm
8,526,186 UART: [idev] --
8,529,776 UART: [ldev] ++
8,530,349 UART: [ldev] CDI.KEYID = 6
8,531,584 UART: [ldev] SUBJECT.KEYID = 5
8,532,687 UART: [ldev] AUTHORITY.KEYID = 7
8,533,959 UART: [ldev] FE.KEYID = 1
8,545,172 UART: [ldev] Erasing FE.KEYID = 1
11,833,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,305 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,139,671 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,155,698 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,171,741 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,192,623 UART: [ldev] --
14,196,524 UART: [fwproc] Wait for Commands...
14,198,941 UART: [fwproc] Recv command 0x46574c44
14,201,283 UART: [fwproc] Recv'd Img size: 114124 bytes
18,309,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,388,217 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,457,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,774,614 >>> mbox cmd response: success
18,778,253 UART: [afmc] ++
18,778,865 UART: [afmc] CDI.KEYID = 6
18,780,001 UART: [afmc] SUBJECT.KEYID = 7
18,781,182 UART: [afmc] AUTHORITY.KEYID = 5
22,104,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,397,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,399,720 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,415,701 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,431,826 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,447,895 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,470,308 UART: [afmc] --
24,473,299 UART: [cold-reset] --
24,478,027 UART: [state] Locking Datavault
24,482,528 UART: [state] Locking PCR0, PCR1 and PCR31
24,484,225 UART: [state] Locking ICCM
24,486,267 UART: [exit] Launching FMC @ 0x40000130
24,494,986 UART:
24,495,214 UART: Running Caliptra FMC ...
24,496,311 UART:
24,496,487 UART: [state] CFI Enabled
24,505,020 UART: [fht] FMC Alias Private Key: 7
26,835,895 UART: [art] Extend RT PCRs Done
26,837,115 UART: [art] Lock RT PCRs Done
26,838,927 UART: [art] Populate DV Done
26,844,222 UART: [fht] FMC Alias Private Key: 7
26,845,703 UART: [art] Derive CDI
26,846,461 UART: [art] Store in in slot 0x4
26,889,054 UART: [art] Derive Key Pair
26,890,054 UART: [art] Store priv key in slot 0x5
30,132,419 UART: [art] Derive Key Pair - Done
30,145,415 UART: [art] Signing Cert with AUTHO
30,146,716 UART: RITY.KEYID = 7
32,426,108 UART: [art] Erasing AUTHORITY.KEYID = 7
32,427,612 UART: [art] PUB.X = 3EBD5272F3E289231F829E9B319B9B1E6AA0EEFB3882E3A12B8B3FCFF48D4B8CF643423F63AD7D43C6FEDDFDA34F9E00
32,434,875 UART: [art] PUB.Y = A03511EDD0A0446009785B05F340EAB5428A1FFEB46ED99DD77F43397B8813AB4DC5AB3C6D7E67DBE5D41B70B2E4EBE7
32,442,124 UART: [art] SIG.R = DD826BBC4255D0A372BDB6018850D09CA623C54722584F2AE615F8ACC30343C93D5589C053B3131366632E7B4B416279
32,449,524 UART: [art] SIG.S = 6DE88E7EBD838AE27F9D5AF4BD1FB1048D548D58A91E6D6CD14DDF3AC7AB68584BEDECCD65BD5F56DECEF2EB98464672
33,754,683 UART: Caliptra RT
33,755,395 UART: [state] CFI Enabled
33,872,432 UART: [rt] RT listening for mailbox commands...
Initializing fuses
999 UART:
1,149 UART: Running Caliptra ROM ...
2,189 UART:
6,658,140 UART: [state] CFI Enabled
6,670,093 UART: [state] LifecycleState = Production
6,671,845 UART: [state] DebugLocked = Yes
6,674,454 UART: [state] Starting the WD Timer 40000000 cycles
6,680,167 UART: [kat] SHA2-256
6,862,166 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,873,720 UART: [kat] ++
6,874,331 UART: [kat] sha1
6,884,317 UART: [kat] SHA2-256
6,887,331 UART: [kat] SHA2-384
6,892,945 UART: [kat] SHA2-512-ACC
6,895,566 UART: [kat] ECC-384
10,151,664 UART: [kat] HMAC-384Kdf
10,164,011 UART: [kat] LMS
11,237,201 UART: [kat] --
11,242,225 UART: [warm-reset] ++
11,246,324 UART: [warm-reset] --
11,251,157 UART: [state] Locking Datavault
11,254,082 UART: [state] Locking PCR0, PCR1 and PCR31
11,256,219 UART: [state] Locking ICCM
11,258,291 UART: [exit] Launching FMC @ 0x40000130
11,266,959 UART:
11,267,185 UART: Running Caliptra FMC ...
11,268,224 UART:
11,268,365 UART: [state] CFI Enabled
11,270,305 UART: [aliasrt :skip pcr extension
11,271,539 UART: [art] Extend RT PCRs Done
11,272,590 UART: [art] Lock RT PCRs Done
11,273,973 UART: [art] Populate DV Done
11,279,813 UART: [fht] FMC Alias Private Key: 7
11,281,495 UART: [art] Derive CDI
11,282,231 UART: [art] Store in in slot 0x4
11,324,659 UART: [art] Derive Key Pair
11,325,660 UART: [art] Store priv key in slot 0x5
14,567,760 UART: [art] Derive Key Pair - Done
14,580,271 UART: [art] Signing Cert with AUTHO
14,581,573 UART: RITY.KEYID = 7
16,860,807 UART: [art] Erasing AUTHORITY.KEYID = 7
16,862,310 UART: [art] PUB.X = 3EBD5272F3E289231F829E9B319B9B1E6AA0EEFB3882E3A12B8B3FCFF48D4B8CF643423F63AD7D43C6FEDDFDA34F9E00
16,869,620 UART: [art] PUB.Y = A03511EDD0A0446009785B05F340EAB5428A1FFEB46ED99DD77F43397B8813AB4DC5AB3C6D7E67DBE5D41B70B2E4EBE7
16,876,856 UART: [art] SIG.R = DD826BBC4255D0A372BDB6018850D09CA623C54722584F2AE615F8ACC30343C93D5589C053B3131366632E7B4B416279
16,884,302 UART: [art] SIG.S = 6DE88E7EBD838AE27F9D5AF4BD1FB1048D548D58A91E6D6CD14DDF3AC7AB68584BEDECCD65BD5F56DECEF2EB98464672
18,188,903 UART: Caliptra RT
18,189,642 UART: [state] CFI Enabled
18,479,050 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
191,677 UART:
192,038 UART: Running Caliptra ROM ...
193,226 UART:
193,380 UART: [state] CFI Enabled
263,397 UART: [state] LifecycleState = Production
265,131 UART: [state] DebugLocked = Yes
267,125 UART: [state] Starting the WD Timer 40000000 cycles
272,716 UART: [kat] SHA2-256
451,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,483 UART: [kat] ++
463,930 UART: [kat] sha1
476,339 UART: [kat] SHA2-256
479,382 UART: [kat] SHA2-384
483,957 UART: [kat] SHA2-512-ACC
486,909 UART: [kat] ECC-384
2,949,449 UART: [kat] HMAC-384Kdf
2,972,133 UART: [kat] LMS
3,501,556 UART: [kat] --
3,505,471 UART: [cold-reset] ++
3,507,814 UART: [fht] FHT @ 0x50003400
3,518,452 UART: [idev] ++
3,519,049 UART: [idev] CDI.KEYID = 6
3,519,937 UART: [idev] SUBJECT.KEYID = 7
3,521,128 UART: [idev] UDS.KEYID = 0
3,522,178 ready_for_fw is high
3,522,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,143 UART: [idev] Erasing UDS.KEYID = 0
6,024,357 UART: [idev] Sha1 KeyId Algorithm
6,046,980 UART: [idev] --
6,051,249 UART: [ldev] ++
6,051,841 UART: [ldev] CDI.KEYID = 6
6,052,768 UART: [ldev] SUBJECT.KEYID = 5
6,053,929 UART: [ldev] AUTHORITY.KEYID = 7
6,055,213 UART: [ldev] FE.KEYID = 1
6,101,520 UART: [ldev] Erasing FE.KEYID = 1
8,602,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,194 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,197 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,352,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,975 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,690 UART: [ldev] --
10,393,585 UART: [fwproc] Wait for Commands...
10,395,715 UART: [fwproc] Recv command 0x46574c44
10,397,812 UART: [fwproc] Recv'd Img size: 114448 bytes
13,839,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,981,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,299,888 >>> mbox cmd response: success
14,303,771 UART: [afmc] ++
14,304,390 UART: [afmc] CDI.KEYID = 6
14,305,306 UART: [afmc] SUBJECT.KEYID = 7
14,306,406 UART: [afmc] AUTHORITY.KEYID = 5
16,850,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,651 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,592,640 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,608,505 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,202 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,647,769 UART: [afmc] --
18,651,196 UART: [cold-reset] --
18,654,626 UART: [state] Locking Datavault
18,661,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,218 UART: [state] Locking ICCM
18,665,098 UART: [exit] Launching FMC @ 0x40000130
18,673,498 UART:
18,673,729 UART: Running Caliptra FMC ...
18,674,830 UART:
18,674,996 UART: [state] CFI Enabled
18,731,575 UART: [fht] FMC Alias Private Key: 7
20,494,333 UART: [art] Extend RT PCRs Done
20,495,535 UART: [art] Lock RT PCRs Done
20,496,939 UART: [art] Populate DV Done
20,502,235 UART: [fht] FMC Alias Private Key: 7
20,503,767 UART: [art] Derive CDI
20,504,582 UART: [art] Store in in slot 0x4
20,563,350 UART: [art] Derive Key Pair
20,564,383 UART: [art] Store priv key in slot 0x5
23,027,423 UART: [art] Derive Key Pair - Done
23,040,171 UART: [art] Signing Cert with AUTHO
23,041,501 UART: RITY.KEYID = 7
24,752,408 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,895 UART: [art] PUB.X = 28990C6FD73C9C447FE21FDD1E82F1BD3EB3D2C157E200E0FE04C62D6AF638D46890F5E1FA06DB4F788B4FB0BAD75C9D
24,761,192 UART: [art] PUB.Y = 5335F02FF092CA1A21D0ABBFB681EDB0F826C8852167530AD6CA7B39B3FC64FF0012CF316A719BF80D836168EE152025
24,768,424 UART: [art] SIG.R = 537523F62076563BD26C19518220E6F9DCCC526B46B854A597D6CB6BAD25EBA0979623529BBDB39D19FF341E3A40A1AC
24,775,809 UART: [art] SIG.S = 1A758E55EA7424010249135475AC0D09D06D89338E6BDB0247AAB28E993A90571C36E9B9DA9EE532DB4D2F06DCCC353C
25,754,174 UART: Caliptra RT
25,754,882 UART: [state] CFI Enabled
25,920,060 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,000 UART:
1,163 UART: Running Caliptra ROM ...
2,208 UART:
2,351 UART: [state] CFI Enabled
67,809 UART: [state] LifecycleState = Production
69,692 UART: [state] DebugLocked = Yes
71,949 UART: [state] Starting the WD Timer 40000000 cycles
77,156 UART: [kat] SHA2-256
256,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,847 UART: [kat] ++
268,294 UART: [kat] sha1
280,680 UART: [kat] SHA2-256
283,728 UART: [kat] SHA2-384
290,725 UART: [kat] SHA2-512-ACC
293,718 UART: [kat] ECC-384
2,750,088 UART: [kat] HMAC-384Kdf
2,766,062 UART: [kat] LMS
3,295,575 UART: [kat] --
3,301,682 UART: [warm-reset] ++
3,304,963 UART: [warm-reset] --
3,310,393 UART: [state] Locking Datavault
3,313,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,360 UART: [state] Locking ICCM
3,317,998 UART: [exit] Launching FMC @ 0x40000130
3,326,449 UART:
3,326,687 UART: Running Caliptra FMC ...
3,327,788 UART:
3,327,951 UART: [state] CFI Enabled
3,376,097 UART: [aliasrt :skip pcr extension
3,377,384 UART: [art] Extend RT PCRs Done
3,378,529 UART: [art] Lock RT PCRs Done
3,379,816 UART: [art] Populate DV Done
3,385,327 UART: [fht] FMC Alias Private Key: 7
3,387,026 UART: [art] Derive CDI
3,387,839 UART: [art] Store in in slot 0x4
3,444,659 UART: [art] Derive Key Pair
3,445,688 UART: [art] Store priv key in slot 0x5
5,909,327 UART: [art] Derive Key Pair - Done
5,922,000 UART: [art] Signing Cert with AUTHO
5,923,304 UART: RITY.KEYID = 7
7,634,520 UART: [art] Erasing AUTHORITY.KEYID = 7
7,636,077 UART: [art] PUB.X = 28990C6FD73C9C447FE21FDD1E82F1BD3EB3D2C157E200E0FE04C62D6AF638D46890F5E1FA06DB4F788B4FB0BAD75C9D
7,643,347 UART: [art] PUB.Y = 5335F02FF092CA1A21D0ABBFB681EDB0F826C8852167530AD6CA7B39B3FC64FF0012CF316A719BF80D836168EE152025
7,650,555 UART: [art] SIG.R = 537523F62076563BD26C19518220E6F9DCCC526B46B854A597D6CB6BAD25EBA0979623529BBDB39D19FF341E3A40A1AC
7,657,965 UART: [art] SIG.S = 1A758E55EA7424010249135475AC0D09D06D89338E6BDB0247AAB28E993A90571C36E9B9DA9EE532DB4D2F06DCCC353C
8,636,797 UART: Caliptra RT
8,637,487 UART: [state] CFI Enabled
8,974,915 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,557 UART:
191,923 UART: Running Caliptra ROM ...
193,020 UART:
193,165 UART: [state] CFI Enabled
261,744 UART: [state] LifecycleState = Production
263,541 UART: [state] DebugLocked = Yes
265,100 UART: [state] Starting the WD Timer 40000000 cycles
269,501 UART: [kat] SHA2-256
448,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,241 UART: [kat] ++
460,684 UART: [kat] sha1
471,219 UART: [kat] SHA2-256
474,225 UART: [kat] SHA2-384
479,003 UART: [kat] SHA2-512-ACC
482,016 UART: [kat] ECC-384
2,947,631 UART: [kat] HMAC-384Kdf
2,971,367 UART: [kat] LMS
3,500,846 UART: [kat] --
3,505,044 UART: [cold-reset] ++
3,506,901 UART: [fht] FHT @ 0x50003400
3,518,086 UART: [idev] ++
3,518,649 UART: [idev] CDI.KEYID = 6
3,519,562 UART: [idev] SUBJECT.KEYID = 7
3,520,752 UART: [idev] UDS.KEYID = 0
3,521,678 ready_for_fw is high
3,521,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,836 UART: [idev] Erasing UDS.KEYID = 0
6,027,683 UART: [idev] Sha1 KeyId Algorithm
6,051,453 UART: [idev] --
6,055,429 UART: [ldev] ++
6,056,014 UART: [ldev] CDI.KEYID = 6
6,056,938 UART: [ldev] SUBJECT.KEYID = 5
6,058,099 UART: [ldev] AUTHORITY.KEYID = 7
6,059,393 UART: [ldev] FE.KEYID = 1
6,099,779 UART: [ldev] Erasing FE.KEYID = 1
8,604,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,597 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,631 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,439 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,406 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,214 UART: [ldev] --
10,412,046 UART: [fwproc] Wait for Commands...
10,413,874 UART: [fwproc] Recv command 0x46574c44
10,415,913 UART: [fwproc] Recv'd Img size: 114448 bytes
13,851,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,995,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,313,120 >>> mbox cmd response: success
14,317,978 UART: [afmc] ++
14,318,589 UART: [afmc] CDI.KEYID = 6
14,319,473 UART: [afmc] SUBJECT.KEYID = 7
14,320,689 UART: [afmc] AUTHORITY.KEYID = 5
16,849,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,803 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,589,835 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,605,671 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,621,444 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,643,881 UART: [afmc] --
18,647,627 UART: [cold-reset] --
18,652,463 UART: [state] Locking Datavault
18,658,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,216 UART: [state] Locking ICCM
18,661,882 UART: [exit] Launching FMC @ 0x40000130
18,670,277 UART:
18,670,506 UART: Running Caliptra FMC ...
18,671,606 UART:
18,671,763 UART: [state] CFI Enabled
18,730,973 UART: [fht] FMC Alias Private Key: 7
20,494,356 UART: [art] Extend RT PCRs Done
20,495,562 UART: [art] Lock RT PCRs Done
20,496,932 UART: [art] Populate DV Done
20,502,290 UART: [fht] FMC Alias Private Key: 7
20,503,774 UART: [art] Derive CDI
20,504,535 UART: [art] Store in in slot 0x4
20,563,899 UART: [art] Derive Key Pair
20,564,940 UART: [art] Store priv key in slot 0x5
23,027,547 UART: [art] Derive Key Pair - Done
23,040,488 UART: [art] Signing Cert with AUTHO
23,041,787 UART: RITY.KEYID = 7
24,753,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,299 UART: [art] PUB.X = 570932B374995D30ECF5F71FD3CC5383691A0AB50EBDC0A296DBB5632D09EC2CC892E9C5C5C42214FA82448D24B03D62
24,762,554 UART: [art] PUB.Y = 0A25F3412F791F3335052EA8F96F9E35A8D18E6FE1E5B2324DA06E3061D952A6029AD876FEB56543578603239080B845
24,769,826 UART: [art] SIG.R = 1799D658896E7F20FA9236CC18AB6641ED360C8323082CB5A307225C6DB4F02F0AF64EB2397D7A68AF4FA671DC4632AE
24,777,185 UART: [art] SIG.S = 4ADF8DE599C75BC98511B2581F2783EFDF82767531C31D52C1430C8AD78592DCA40D3E7706200FB4512E0F13D68579F9
25,755,603 UART: Caliptra RT
25,756,308 UART: [state] CFI Enabled
25,922,530 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,008 UART:
1,266 UART: Running Caliptra ROM ...
2,370 UART:
2,526 UART: [state] CFI Enabled
67,500 UART: [state] LifecycleState = Production
69,205 UART: [state] DebugLocked = Yes
70,888 UART: [state] Starting the WD Timer 40000000 cycles
75,122 UART: [kat] SHA2-256
254,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,846 UART: [kat] ++
266,371 UART: [kat] sha1
278,334 UART: [kat] SHA2-256
281,342 UART: [kat] SHA2-384
287,011 UART: [kat] SHA2-512-ACC
289,987 UART: [kat] ECC-384
2,751,309 UART: [kat] HMAC-384Kdf
2,771,799 UART: [kat] LMS
3,301,311 UART: [kat] --
3,304,831 UART: [warm-reset] ++
3,309,031 UART: [warm-reset] --
3,312,251 UART: [state] Locking Datavault
3,315,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,823 UART: [state] Locking ICCM
3,318,192 UART: [exit] Launching FMC @ 0x40000130
3,326,601 UART:
3,326,876 UART: Running Caliptra FMC ...
3,327,909 UART:
3,328,058 UART: [state] CFI Enabled
3,381,405 UART: [aliasrt :skip pcr extension
3,382,659 UART: [art] Extend RT PCRs Done
3,383,742 UART: [art] Lock RT PCRs Done
3,385,294 UART: [art] Populate DV Done
3,390,859 UART: [fht] FMC Alias Private Key: 7
3,392,392 UART: [art] Derive CDI
3,393,131 UART: [art] Store in in slot 0x4
3,450,494 UART: [art] Derive Key Pair
3,451,532 UART: [art] Store priv key in slot 0x5
5,914,083 UART: [art] Derive Key Pair - Done
5,927,454 UART: [art] Signing Cert with AUTHO
5,928,753 UART: RITY.KEYID = 7
7,640,210 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,708 UART: [art] PUB.X = 570932B374995D30ECF5F71FD3CC5383691A0AB50EBDC0A296DBB5632D09EC2CC892E9C5C5C42214FA82448D24B03D62
7,649,029 UART: [art] PUB.Y = 0A25F3412F791F3335052EA8F96F9E35A8D18E6FE1E5B2324DA06E3061D952A6029AD876FEB56543578603239080B845
7,656,220 UART: [art] SIG.R = 1799D658896E7F20FA9236CC18AB6641ED360C8323082CB5A307225C6DB4F02F0AF64EB2397D7A68AF4FA671DC4632AE
7,663,614 UART: [art] SIG.S = 4ADF8DE599C75BC98511B2581F2783EFDF82767531C31D52C1430C8AD78592DCA40D3E7706200FB4512E0F13D68579F9
8,642,496 UART: Caliptra RT
8,643,200 UART: [state] CFI Enabled
8,978,591 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
191,813 UART:
192,203 UART: Running Caliptra ROM ...
193,335 UART:
603,041 UART: [state] CFI Enabled
617,076 UART: [state] LifecycleState = Production
618,759 UART: [state] DebugLocked = Yes
621,657 UART: [state] Starting the WD Timer 40000000 cycles
625,887 UART: [kat] SHA2-256
805,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,621 UART: [kat] ++
817,063 UART: [kat] sha1
827,600 UART: [kat] SHA2-256
830,694 UART: [kat] SHA2-384
836,714 UART: [kat] SHA2-512-ACC
839,649 UART: [kat] ECC-384
3,280,414 UART: [kat] HMAC-384Kdf
3,293,635 UART: [kat] LMS
3,823,157 UART: [kat] --
3,826,866 UART: [cold-reset] ++
3,828,717 UART: [fht] FHT @ 0x50003400
3,840,262 UART: [idev] ++
3,840,818 UART: [idev] CDI.KEYID = 6
3,841,788 UART: [idev] SUBJECT.KEYID = 7
3,842,951 UART: [idev] UDS.KEYID = 0
3,844,010 ready_for_fw is high
3,844,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,910 UART: [idev] Erasing UDS.KEYID = 0
6,319,537 UART: [idev] Sha1 KeyId Algorithm
6,341,305 UART: [idev] --
6,346,210 UART: [ldev] ++
6,346,776 UART: [ldev] CDI.KEYID = 6
6,347,648 UART: [ldev] SUBJECT.KEYID = 5
6,348,853 UART: [ldev] AUTHORITY.KEYID = 7
6,350,341 UART: [ldev] FE.KEYID = 1
6,360,317 UART: [ldev] Erasing FE.KEYID = 1
8,833,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,954 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,567,979 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,583,786 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,599,750 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,743 UART: [ldev] --
10,624,467 UART: [fwproc] Wait for Commands...
10,627,587 UART: [fwproc] Recv command 0x46574c44
10,629,676 UART: [fwproc] Recv'd Img size: 114448 bytes
14,070,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,211,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,530,011 >>> mbox cmd response: success
14,535,054 UART: [afmc] ++
14,535,669 UART: [afmc] CDI.KEYID = 6
14,536,580 UART: [afmc] SUBJECT.KEYID = 7
14,537,733 UART: [afmc] AUTHORITY.KEYID = 5
17,034,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,751,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,753,508 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,769,487 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,785,360 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,801,105 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,823,755 UART: [afmc] --
18,828,049 UART: [cold-reset] --
18,832,418 UART: [state] Locking Datavault
18,836,080 UART: [state] Locking PCR0, PCR1 and PCR31
18,837,729 UART: [state] Locking ICCM
18,839,981 UART: [exit] Launching FMC @ 0x40000130
18,848,420 UART:
18,848,657 UART: Running Caliptra FMC ...
18,849,752 UART:
18,849,907 UART: [state] CFI Enabled
18,858,322 UART: [fht] FMC Alias Private Key: 7
20,615,446 UART: [art] Extend RT PCRs Done
20,616,664 UART: [art] Lock RT PCRs Done
20,618,180 UART: [art] Populate DV Done
20,623,615 UART: [fht] FMC Alias Private Key: 7
20,625,310 UART: [art] Derive CDI
20,626,118 UART: [art] Store in in slot 0x4
20,668,876 UART: [art] Derive Key Pair
20,669,870 UART: [art] Store priv key in slot 0x5
23,097,135 UART: [art] Derive Key Pair - Done
23,110,193 UART: [art] Signing Cert with AUTHO
23,111,490 UART: RITY.KEYID = 7
24,816,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,989 UART: [art] PUB.X = E5FF9403A9A9DF1B8E4BBF553EA9164AB67086627C5247623D329F838E0E1DBFD33A03B3E56E46257D6053E23DF962D3
24,825,285 UART: [art] PUB.Y = ECB472CA7B5F1950FD500DE48E711564D16533FD48A3120B32E67D0D217FE6B0B17C1C3E24D7F870EE6D4A79FA987D73
24,832,527 UART: [art] SIG.R = 480E450FF105B363FDBE0517E531182D097E9A0E191BDE610173F3527D6562377F10827372D95C75D2388F0BE154549C
24,839,923 UART: [art] SIG.S = E5E05CB5532F470C8083E47012F157B4FCA59A1CC29745418C50FDBE4E8DD8FC252ACADEE1E0D116F39D29A5B3F0998E
25,818,861 UART: Caliptra RT
25,819,566 UART: [state] CFI Enabled
25,935,596 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,003 UART:
1,262 UART: Running Caliptra ROM ...
2,369 UART:
14,594,386 UART: [state] CFI Enabled
14,607,545 UART: [state] LifecycleState = Production
14,609,283 UART: [state] DebugLocked = Yes
14,610,965 UART: [state] Starting the WD Timer 40000000 cycles
14,616,454 UART: [kat] SHA2-256
14,795,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,807,165 UART: [kat] ++
14,807,700 UART: [kat] sha1
14,818,371 UART: [kat] SHA2-256
14,821,416 UART: [kat] SHA2-384
14,827,895 UART: [kat] SHA2-512-ACC
14,830,883 UART: [kat] ECC-384
17,274,477 UART: [kat] HMAC-384Kdf
17,286,962 UART: [kat] LMS
17,816,455 UART: [kat] --
17,818,596 UART: [warm-reset] ++
17,823,812 UART: [warm-reset] --
17,825,834 UART: [state] Locking Datavault
17,828,909 UART: [state] Locking PCR0, PCR1 and PCR31
17,830,597 UART: [state] Locking ICCM
17,832,575 UART: [exit] Launching FMC @ 0x40000130
17,841,011 UART:
17,841,243 UART: Running Caliptra FMC ...
17,842,333 UART:
17,842,479 UART: [state] CFI Enabled
17,844,356 UART: [aliasrt :skip pcr extension
17,845,594 UART: [art] Extend RT PCRs Done
17,846,717 UART: [art] Lock RT PCRs Done
17,847,788 UART: [art] Populate DV Done
17,853,460 UART: [fht] FMC Alias Private Key: 7
17,855,135 UART: [art] Derive CDI
17,855,949 UART: [art] Store in in slot 0x4
17,898,589 UART: [art] Derive Key Pair
17,899,581 UART: [art] Store priv key in slot 0x5
20,325,963 UART: [art] Derive Key Pair - Done
20,339,100 UART: [art] Signing Cert with AUTHO
20,340,449 UART: RITY.KEYID = 7
22,045,364 UART: [art] Erasing AUTHORITY.KEYID = 7
22,046,858 UART: [art] PUB.X = E5FF9403A9A9DF1B8E4BBF553EA9164AB67086627C5247623D329F838E0E1DBFD33A03B3E56E46257D6053E23DF962D3
22,054,100 UART: [art] PUB.Y = ECB472CA7B5F1950FD500DE48E711564D16533FD48A3120B32E67D0D217FE6B0B17C1C3E24D7F870EE6D4A79FA987D73
22,061,412 UART: [art] SIG.R = 480E450FF105B363FDBE0517E531182D097E9A0E191BDE610173F3527D6562377F10827372D95C75D2388F0BE154549C
22,068,751 UART: [art] SIG.S = E5E05CB5532F470C8083E47012F157B4FCA59A1CC29745418C50FDBE4E8DD8FC252ACADEE1E0D116F39D29A5B3F0998E
23,047,786 UART: Caliptra RT
23,048,496 UART: [state] CFI Enabled
23,336,081 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
191,794 UART:
192,180 UART: Running Caliptra ROM ...
193,358 UART:
603,034 UART: [state] CFI Enabled
615,123 UART: [state] LifecycleState = Production
616,892 UART: [state] DebugLocked = Yes
618,243 UART: [state] Starting the WD Timer 40000000 cycles
623,606 UART: [kat] SHA2-256
802,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,367 UART: [kat] ++
814,849 UART: [kat] sha1
824,959 UART: [kat] SHA2-256
828,038 UART: [kat] SHA2-384
834,097 UART: [kat] SHA2-512-ACC
837,028 UART: [kat] ECC-384
3,280,889 UART: [kat] HMAC-384Kdf
3,293,500 UART: [kat] LMS
3,823,024 UART: [kat] --
3,827,225 UART: [cold-reset] ++
3,829,712 UART: [fht] FHT @ 0x50003400
3,839,472 UART: [idev] ++
3,840,035 UART: [idev] CDI.KEYID = 6
3,840,938 UART: [idev] SUBJECT.KEYID = 7
3,842,102 UART: [idev] UDS.KEYID = 0
3,843,144 ready_for_fw is high
3,843,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,201 UART: [idev] Erasing UDS.KEYID = 0
6,317,815 UART: [idev] Sha1 KeyId Algorithm
6,341,151 UART: [idev] --
6,345,058 UART: [ldev] ++
6,345,628 UART: [ldev] CDI.KEYID = 6
6,346,532 UART: [ldev] SUBJECT.KEYID = 5
6,347,737 UART: [ldev] AUTHORITY.KEYID = 7
6,349,036 UART: [ldev] FE.KEYID = 1
6,360,167 UART: [ldev] Erasing FE.KEYID = 1
8,834,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,778 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,567,764 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,583,627 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,599,562 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,681 UART: [ldev] --
10,624,611 UART: [fwproc] Wait for Commands...
10,627,828 UART: [fwproc] Recv command 0x46574c44
10,629,923 UART: [fwproc] Recv'd Img size: 114448 bytes
14,064,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,134,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,203,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,522,129 >>> mbox cmd response: success
14,526,586 UART: [afmc] ++
14,527,222 UART: [afmc] CDI.KEYID = 6
14,528,135 UART: [afmc] SUBJECT.KEYID = 7
14,529,236 UART: [afmc] AUTHORITY.KEYID = 5
17,029,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,751,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,753,244 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,769,225 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,785,085 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,800,784 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,823,701 UART: [afmc] --
18,827,072 UART: [cold-reset] --
18,831,045 UART: [state] Locking Datavault
18,835,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,837,564 UART: [state] Locking ICCM
18,840,083 UART: [exit] Launching FMC @ 0x40000130
18,848,476 UART:
18,848,724 UART: Running Caliptra FMC ...
18,849,823 UART:
18,849,973 UART: [state] CFI Enabled
18,857,854 UART: [fht] FMC Alias Private Key: 7
20,615,439 UART: [art] Extend RT PCRs Done
20,616,658 UART: [art] Lock RT PCRs Done
20,618,762 UART: [art] Populate DV Done
20,624,004 UART: [fht] FMC Alias Private Key: 7
20,625,700 UART: [art] Derive CDI
20,626,507 UART: [art] Store in in slot 0x4
20,668,767 UART: [art] Derive Key Pair
20,669,800 UART: [art] Store priv key in slot 0x5
23,096,385 UART: [art] Derive Key Pair - Done
23,109,328 UART: [art] Signing Cert with AUTHO
23,110,633 UART: RITY.KEYID = 7
24,815,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,437 UART: [art] PUB.X = BF04C573B3C93547CE33D8757FB1914F39573A603555AEE005D416D34C6A194EAE6F56FB332B6881071632392B5296C5
24,824,624 UART: [art] PUB.Y = F585822D98961C5F4611D0EFDC5442F92FB07ED9B11F9195E33CA2952306F4BE69A7267D2CBE0E02F853AAA7B45BE974
24,831,912 UART: [art] SIG.R = 4C6340D70093B96709D17776DEB9ED661312662B20CF61A4522B7AE26D2819EFE8D9FDA43DD7FD92B56721528579330C
24,839,239 UART: [art] SIG.S = 88D89DB162DBE0676EDE8C67DA93AFE7CAE679CF8034B207C7AEA7A314CA745243E19490FE41A1E131982C9177F763E0
25,817,928 UART: Caliptra RT
25,818,641 UART: [state] CFI Enabled
25,936,418 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,004 UART:
1,265 UART: Running Caliptra ROM ...
2,376 UART:
14,598,334 UART: [state] CFI Enabled
14,613,123 UART: [state] LifecycleState = Production
14,614,854 UART: [state] DebugLocked = Yes
14,616,998 UART: [state] Starting the WD Timer 40000000 cycles
14,622,218 UART: [kat] SHA2-256
14,801,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,812,975 UART: [kat] ++
14,813,426 UART: [kat] sha1
14,824,682 UART: [kat] SHA2-256
14,827,685 UART: [kat] SHA2-384
14,834,423 UART: [kat] SHA2-512-ACC
14,837,366 UART: [kat] ECC-384
17,279,093 UART: [kat] HMAC-384Kdf
17,291,537 UART: [kat] LMS
17,821,075 UART: [kat] --
17,824,581 UART: [warm-reset] ++
17,829,735 UART: [warm-reset] --
17,833,577 UART: [state] Locking Datavault
17,835,753 UART: [state] Locking PCR0, PCR1 and PCR31
17,837,394 UART: [state] Locking ICCM
17,839,565 UART: [exit] Launching FMC @ 0x40000130
17,848,027 UART:
17,848,262 UART: Running Caliptra FMC ...
17,849,278 UART:
17,849,417 UART: [state] CFI Enabled
17,851,406 UART: [aliasrt :skip pcr extension
17,852,642 UART: [art] Extend RT PCRs Done
17,853,693 UART: [art] Lock RT PCRs Done
17,854,804 UART: [art] Populate DV Done
17,860,148 UART: [fht] FMC Alias Private Key: 7
17,861,783 UART: [art] Derive CDI
17,862,514 UART: [art] Store in in slot 0x4
17,905,582 UART: [art] Derive Key Pair
17,906,606 UART: [art] Store priv key in slot 0x5
20,332,787 UART: [art] Derive Key Pair - Done
20,345,781 UART: [art] Signing Cert with AUTHO
20,347,084 UART: RITY.KEYID = 7
22,052,417 UART: [art] Erasing AUTHORITY.KEYID = 7
22,053,917 UART: [art] PUB.X = BF04C573B3C93547CE33D8757FB1914F39573A603555AEE005D416D34C6A194EAE6F56FB332B6881071632392B5296C5
22,061,154 UART: [art] PUB.Y = F585822D98961C5F4611D0EFDC5442F92FB07ED9B11F9195E33CA2952306F4BE69A7267D2CBE0E02F853AAA7B45BE974
22,068,433 UART: [art] SIG.R = 4C6340D70093B96709D17776DEB9ED661312662B20CF61A4522B7AE26D2819EFE8D9FDA43DD7FD92B56721528579330C
22,075,795 UART: [art] SIG.S = 88D89DB162DBE0676EDE8C67DA93AFE7CAE679CF8034B207C7AEA7A314CA745243E19490FE41A1E131982C9177F763E0
23,055,100 UART: Caliptra RT
23,055,806 UART: [state] CFI Enabled
23,345,070 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
191,632 UART:
191,986 UART: Running Caliptra ROM ...
193,175 UART:
193,331 UART: [state] CFI Enabled
265,771 UART: [state] LifecycleState = Production
267,486 UART: [state] DebugLocked = Yes
269,336 UART: [state] Starting the WD Timer 40000000 cycles
274,939 UART: [kat] SHA2-256
454,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,660 UART: [kat] ++
466,189 UART: [kat] sha1
477,519 UART: [kat] SHA2-256
480,525 UART: [kat] SHA2-384
487,431 UART: [kat] SHA2-512-ACC
490,373 UART: [kat] ECC-384
2,949,127 UART: [kat] HMAC-384Kdf
2,969,758 UART: [kat] LMS
3,499,188 UART: [kat] --
3,502,068 UART: [cold-reset] ++
3,504,225 UART: [fht] FHT @ 0x50003400
3,514,206 UART: [idev] ++
3,514,766 UART: [idev] CDI.KEYID = 6
3,515,717 UART: [idev] SUBJECT.KEYID = 7
3,516,905 UART: [idev] UDS.KEYID = 0
3,517,808 ready_for_fw is high
3,517,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,930 UART: [idev] Erasing UDS.KEYID = 0
6,024,283 UART: [idev] Sha1 KeyId Algorithm
6,046,809 UART: [idev] --
6,051,028 UART: [ldev] ++
6,051,607 UART: [ldev] CDI.KEYID = 6
6,052,529 UART: [ldev] SUBJECT.KEYID = 5
6,053,861 UART: [ldev] AUTHORITY.KEYID = 7
6,055,001 UART: [ldev] FE.KEYID = 1
6,099,418 UART: [ldev] Erasing FE.KEYID = 1
8,601,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,626 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,606 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,474 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,404 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,887 UART: [ldev] --
10,392,678 UART: [fwproc] Wait for Commands...
10,395,041 UART: [fwproc] Recv command 0x46574c44
10,397,135 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,298 >>> mbox cmd response: success
14,291,371 UART: [afmc] ++
14,291,983 UART: [afmc] CDI.KEYID = 6
14,292,874 UART: [afmc] SUBJECT.KEYID = 7
14,294,305 UART: [afmc] AUTHORITY.KEYID = 5
16,829,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,568,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,570,521 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,586,527 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,602,385 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,618,118 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,641,019 UART: [afmc] --
18,645,673 UART: [cold-reset] --
18,650,719 UART: [state] Locking Datavault
18,655,862 UART: [state] Locking PCR0, PCR1 and PCR31
18,657,507 UART: [state] Locking ICCM
18,658,524 UART: [exit] Launching FMC @ 0x40000130
18,666,919 UART:
18,667,151 UART: Running Caliptra FMC ...
18,668,248 UART:
18,668,407 UART: [state] CFI Enabled
18,724,609 UART: [fht] FMC Alias Private Key: 7
20,488,169 UART: [art] Extend RT PCRs Done
20,489,382 UART: [art] Lock RT PCRs Done
20,491,376 UART: [art] Populate DV Done
20,496,891 UART: [fht] FMC Alias Private Key: 7
20,498,423 UART: [art] Derive CDI
20,499,159 UART: [art] Store in in slot 0x4
20,557,603 UART: [art] Derive Key Pair
20,558,640 UART: [art] Store priv key in slot 0x5
23,020,935 UART: [art] Derive Key Pair - Done
23,033,824 UART: [art] Signing Cert with AUTHO
23,035,130 UART: RITY.KEYID = 7
24,746,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,749,010 UART: [art] PUB.X = C5A61CF713FA97EC7C3BA135E62A87F1B75F7C9B689CA8EF028B7A6D980ADABAC0FCFFD9D7C90F62D0E47E0554579992
24,755,743 UART: [art] PUB.Y = 77EBF6C875BB1DB89A2ED7B962C082EB7635EAF471C68DB83FE713034490792CBA66C492EE9F0C10233E47DA3DB70023
24,762,965 UART: [art] SIG.R = DEF17AA1AEAF9B2A43B76F4BEFF1AC1990B494449EFA46676E914B4EFE14925B0F5D7D49096F4459F5B2979F9A77E558
24,770,363 UART: [art] SIG.S = 044E13DEC607F19B4DF53A4C123413CA0D986528AE8F7DFBAA30CBFA70EBAE04E79221EA5FD66807872C2859562D5050
25,749,438 UART: Caliptra RT
25,750,174 UART: [state] CFI Enabled
25,916,146 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,020 UART:
1,276 UART: Running Caliptra ROM ...
2,379 UART:
2,532 UART: [state] CFI Enabled
63,628 UART: [state] LifecycleState = Production
65,390 UART: [state] DebugLocked = Yes
67,346 UART: [state] Starting the WD Timer 40000000 cycles
72,615 UART: [kat] SHA2-256
251,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,315 UART: [kat] ++
263,761 UART: [kat] sha1
274,634 UART: [kat] SHA2-256
277,628 UART: [kat] SHA2-384
284,846 UART: [kat] SHA2-512-ACC
287,793 UART: [kat] ECC-384
2,750,435 UART: [kat] HMAC-384Kdf
2,773,066 UART: [kat] LMS
3,302,599 UART: [kat] --
3,306,960 UART: [warm-reset] ++
3,311,366 UART: [warm-reset] --
3,314,847 UART: [state] Locking Datavault
3,318,205 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,849 UART: [state] Locking ICCM
3,322,302 UART: [exit] Launching FMC @ 0x40000130
3,330,750 UART:
3,330,987 UART: Running Caliptra FMC ...
3,332,084 UART:
3,332,246 UART: [state] CFI Enabled
3,382,505 UART: [aliasrt :skip pcr extension
3,383,799 UART: [art] Extend RT PCRs Done
3,384,960 UART: [art] Lock RT PCRs Done
3,386,192 UART: [art] Populate DV Done
3,391,812 UART: [fht] FMC Alias Private Key: 7
3,393,343 UART: [art] Derive CDI
3,394,155 UART: [art] Store in in slot 0x4
3,451,462 UART: [art] Derive Key Pair
3,452,506 UART: [art] Store priv key in slot 0x5
5,915,527 UART: [art] Derive Key Pair - Done
5,928,733 UART: [art] Signing Cert with AUTHO
5,930,035 UART: RITY.KEYID = 7
7,641,408 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,914 UART: [art] PUB.X = C5A61CF713FA97EC7C3BA135E62A87F1B75F7C9B689CA8EF028B7A6D980ADABAC0FCFFD9D7C90F62D0E47E0554579992
7,650,194 UART: [art] PUB.Y = 77EBF6C875BB1DB89A2ED7B962C082EB7635EAF471C68DB83FE713034490792CBA66C492EE9F0C10233E47DA3DB70023
7,657,470 UART: [art] SIG.R = DEF17AA1AEAF9B2A43B76F4BEFF1AC1990B494449EFA46676E914B4EFE14925B0F5D7D49096F4459F5B2979F9A77E558
7,664,881 UART: [art] SIG.S = 044E13DEC607F19B4DF53A4C123413CA0D986528AE8F7DFBAA30CBFA70EBAE04E79221EA5FD66807872C2859562D5050
8,643,870 UART: Caliptra RT
8,644,579 UART: [state] CFI Enabled
8,978,474 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
191,609 UART:
191,977 UART: Running Caliptra ROM ...
193,165 UART:
193,318 UART: [state] CFI Enabled
267,761 UART: [state] LifecycleState = Production
269,553 UART: [state] DebugLocked = Yes
271,407 UART: [state] Starting the WD Timer 40000000 cycles
275,711 UART: [kat] SHA2-256
454,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,437 UART: [kat] ++
466,967 UART: [kat] sha1
478,793 UART: [kat] SHA2-256
481,793 UART: [kat] SHA2-384
487,952 UART: [kat] SHA2-512-ACC
490,860 UART: [kat] ECC-384
2,948,403 UART: [kat] HMAC-384Kdf
2,973,811 UART: [kat] LMS
3,503,304 UART: [kat] --
3,509,723 UART: [cold-reset] ++
3,511,945 UART: [fht] FHT @ 0x50003400
3,522,215 UART: [idev] ++
3,522,779 UART: [idev] CDI.KEYID = 6
3,523,693 UART: [idev] SUBJECT.KEYID = 7
3,524,866 UART: [idev] UDS.KEYID = 0
3,526,017 ready_for_fw is high
3,526,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,147 UART: [idev] Erasing UDS.KEYID = 0
6,029,977 UART: [idev] Sha1 KeyId Algorithm
6,054,227 UART: [idev] --
6,057,141 UART: [ldev] ++
6,057,711 UART: [ldev] CDI.KEYID = 6
6,058,631 UART: [ldev] SUBJECT.KEYID = 5
6,059,806 UART: [ldev] AUTHORITY.KEYID = 7
6,061,041 UART: [ldev] FE.KEYID = 1
6,102,230 UART: [ldev] Erasing FE.KEYID = 1
8,605,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,740 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,775 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,594 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,528 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,272 UART: [ldev] --
10,413,658 UART: [fwproc] Wait for Commands...
10,415,975 UART: [fwproc] Recv command 0x46574c44
10,418,067 UART: [fwproc] Recv'd Img size: 114448 bytes
13,854,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,002,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,320,670 >>> mbox cmd response: success
14,325,029 UART: [afmc] ++
14,325,642 UART: [afmc] CDI.KEYID = 6
14,326,554 UART: [afmc] SUBJECT.KEYID = 7
14,327,711 UART: [afmc] AUTHORITY.KEYID = 5
16,851,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,355 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,593,342 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,609,205 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,944 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,648,694 UART: [afmc] --
18,651,993 UART: [cold-reset] --
18,655,319 UART: [state] Locking Datavault
18,659,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,759 UART: [state] Locking ICCM
18,663,017 UART: [exit] Launching FMC @ 0x40000130
18,671,435 UART:
18,671,679 UART: Running Caliptra FMC ...
18,672,781 UART:
18,672,943 UART: [state] CFI Enabled
18,731,412 UART: [fht] FMC Alias Private Key: 7
20,495,500 UART: [art] Extend RT PCRs Done
20,496,730 UART: [art] Lock RT PCRs Done
20,498,168 UART: [art] Populate DV Done
20,503,464 UART: [fht] FMC Alias Private Key: 7
20,504,997 UART: [art] Derive CDI
20,505,811 UART: [art] Store in in slot 0x4
20,564,090 UART: [art] Derive Key Pair
20,565,089 UART: [art] Store priv key in slot 0x5
23,027,942 UART: [art] Derive Key Pair - Done
23,040,671 UART: [art] Signing Cert with AUTHO
23,041,978 UART: RITY.KEYID = 7
24,753,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,432 UART: [art] PUB.X = 755966EDB211239050EDF9D49C3696499E8DE6CF00022DB637ACEAD05631A6D88618C2933DE41C2EB259B454CA039F63
24,762,673 UART: [art] PUB.Y = B86385C3CF45EC2E3707F9BC4AF6ED3CF3C0ADC062C4143174B208BD7616767BF133F43E2EBB190C129B2EF3B099556C
24,769,951 UART: [art] SIG.R = C1901B388F4757AC134E685C0BB2D9029F933A72BB4C1C30C65A6B1819FA549E7B12D0EC3F5B9E4404C402CDAC8EBA64
24,777,341 UART: [art] SIG.S = 428DFD08EA1BDCCA40C9C1E491107437496FA7B62EDE96AA94E955362EDED54E540DD767C9974C390FF91903AB393E67
25,755,768 UART: Caliptra RT
25,756,468 UART: [state] CFI Enabled
25,920,608 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,004 UART:
1,167 UART: Running Caliptra ROM ...
2,213 UART:
2,358 UART: [state] CFI Enabled
64,401 UART: [state] LifecycleState = Production
66,159 UART: [state] DebugLocked = Yes
68,305 UART: [state] Starting the WD Timer 40000000 cycles
73,478 UART: [kat] SHA2-256
252,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,218 UART: [kat] ++
264,664 UART: [kat] sha1
276,456 UART: [kat] SHA2-256
279,515 UART: [kat] SHA2-384
285,920 UART: [kat] SHA2-512-ACC
288,851 UART: [kat] ECC-384
2,751,035 UART: [kat] HMAC-384Kdf
2,774,000 UART: [kat] LMS
3,303,515 UART: [kat] --
3,306,576 UART: [warm-reset] ++
3,310,172 UART: [warm-reset] --
3,311,873 UART: [state] Locking Datavault
3,315,395 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,101 UART: [state] Locking ICCM
3,319,813 UART: [exit] Launching FMC @ 0x40000130
3,328,266 UART:
3,328,502 UART: Running Caliptra FMC ...
3,329,608 UART:
3,329,768 UART: [state] CFI Enabled
3,383,209 UART: [aliasrt :skip pcr extension
3,384,492 UART: [art] Extend RT PCRs Done
3,385,558 UART: [art] Lock RT PCRs Done
3,386,950 UART: [art] Populate DV Done
3,392,305 UART: [fht] FMC Alias Private Key: 7
3,393,840 UART: [art] Derive CDI
3,394,575 UART: [art] Store in in slot 0x4
3,451,991 UART: [art] Derive Key Pair
3,453,028 UART: [art] Store priv key in slot 0x5
5,915,539 UART: [art] Derive Key Pair - Done
5,928,300 UART: [art] Signing Cert with AUTHO
5,929,642 UART: RITY.KEYID = 7
7,641,381 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,883 UART: [art] PUB.X = 755966EDB211239050EDF9D49C3696499E8DE6CF00022DB637ACEAD05631A6D88618C2933DE41C2EB259B454CA039F63
7,650,145 UART: [art] PUB.Y = B86385C3CF45EC2E3707F9BC4AF6ED3CF3C0ADC062C4143174B208BD7616767BF133F43E2EBB190C129B2EF3B099556C
7,657,394 UART: [art] SIG.R = C1901B388F4757AC134E685C0BB2D9029F933A72BB4C1C30C65A6B1819FA549E7B12D0EC3F5B9E4404C402CDAC8EBA64
7,664,787 UART: [art] SIG.S = 428DFD08EA1BDCCA40C9C1E491107437496FA7B62EDE96AA94E955362EDED54E540DD767C9974C390FF91903AB393E67
8,644,140 UART: Caliptra RT
8,644,850 UART: [state] CFI Enabled
8,979,545 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
191,825 UART:
192,191 UART: Running Caliptra ROM ...
193,313 UART:
602,942 UART: [state] CFI Enabled
620,732 UART: [state] LifecycleState = Production
622,504 UART: [state] DebugLocked = Yes
625,428 UART: [state] Starting the WD Timer 40000000 cycles
631,154 UART: [kat] SHA2-256
810,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,838 UART: [kat] ++
822,362 UART: [kat] sha1
832,338 UART: [kat] SHA2-256
835,414 UART: [kat] SHA2-384
841,325 UART: [kat] SHA2-512-ACC
844,253 UART: [kat] ECC-384
3,285,727 UART: [kat] HMAC-384Kdf
3,299,235 UART: [kat] LMS
3,828,780 UART: [kat] --
3,834,973 UART: [cold-reset] ++
3,837,060 UART: [fht] FHT @ 0x50003400
3,848,565 UART: [idev] ++
3,849,129 UART: [idev] CDI.KEYID = 6
3,850,050 UART: [idev] SUBJECT.KEYID = 7
3,851,230 UART: [idev] UDS.KEYID = 0
3,852,276 ready_for_fw is high
3,852,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,996,078 UART: [idev] Erasing UDS.KEYID = 0
6,322,676 UART: [idev] Sha1 KeyId Algorithm
6,345,336 UART: [idev] --
6,348,937 UART: [ldev] ++
6,349,498 UART: [ldev] CDI.KEYID = 6
6,350,460 UART: [ldev] SUBJECT.KEYID = 5
6,351,606 UART: [ldev] AUTHORITY.KEYID = 7
6,352,884 UART: [ldev] FE.KEYID = 1
6,365,569 UART: [ldev] Erasing FE.KEYID = 1
8,844,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,851 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,576,837 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,592,676 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,608,620 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,629,161 UART: [ldev] --
10,633,817 UART: [fwproc] Wait for Commands...
10,635,683 UART: [fwproc] Recv command 0x46574c44
10,637,761 UART: [fwproc] Recv'd Img size: 114448 bytes
14,071,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,207,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,525,549 >>> mbox cmd response: success
14,529,634 UART: [afmc] ++
14,530,242 UART: [afmc] CDI.KEYID = 6
14,531,122 UART: [afmc] SUBJECT.KEYID = 7
14,532,330 UART: [afmc] AUTHORITY.KEYID = 5
17,029,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,751,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,752,908 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,768,885 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,784,746 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,800,521 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,822,701 UART: [afmc] --
18,826,761 UART: [cold-reset] --
18,831,491 UART: [state] Locking Datavault
18,836,949 UART: [state] Locking PCR0, PCR1 and PCR31
18,838,585 UART: [state] Locking ICCM
18,840,457 UART: [exit] Launching FMC @ 0x40000130
18,848,902 UART:
18,849,136 UART: Running Caliptra FMC ...
18,850,229 UART:
18,850,382 UART: [state] CFI Enabled
18,858,255 UART: [fht] FMC Alias Private Key: 7
20,615,329 UART: [art] Extend RT PCRs Done
20,616,561 UART: [art] Lock RT PCRs Done
20,618,103 UART: [art] Populate DV Done
20,623,231 UART: [fht] FMC Alias Private Key: 7
20,624,867 UART: [art] Derive CDI
20,625,599 UART: [art] Store in in slot 0x4
20,668,068 UART: [art] Derive Key Pair
20,669,108 UART: [art] Store priv key in slot 0x5
23,095,955 UART: [art] Derive Key Pair - Done
23,109,059 UART: [art] Signing Cert with AUTHO
23,110,365 UART: RITY.KEYID = 7
24,815,733 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,234 UART: [art] PUB.X = 8CB0114DAA30B1AFA0914860A6F90266BAA6C1203CCB51EA0BCDAB6A2F9F2439EEE39B040FB02577C2B5CA810250FEFA
24,824,525 UART: [art] PUB.Y = 7059B0AE3EEA807B3258EC027F4E55DEB2F7F583F2625313B214A5BEEE1FE0C020E14FCA9726EE4883F9A82F424B6C51
24,831,850 UART: [art] SIG.R = 829EC86EE0176A9BF360DE70358323F1F21376F8AB0CA25672CE301536DE2036905B4BF0AD30693E32874619E299E197
24,839,226 UART: [art] SIG.S = 557DF59FB2582A82AA6C25F677A55C374A57E29F2ECEAABE4C13132B1F535B7C532BDB6727797AC27330647D4CD9EC27
25,818,300 UART: Caliptra RT
25,819,028 UART: [state] CFI Enabled
25,935,840 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,010 UART:
1,267 UART: Running Caliptra ROM ...
2,369 UART:
14,590,040 UART: [state] CFI Enabled
14,603,855 UART: [state] LifecycleState = Production
14,605,604 UART: [state] DebugLocked = Yes
14,607,446 UART: [state] Starting the WD Timer 40000000 cycles
14,612,333 UART: [kat] SHA2-256
14,791,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,803,036 UART: [kat] ++
14,803,574 UART: [kat] sha1
14,813,434 UART: [kat] SHA2-256
14,816,494 UART: [kat] SHA2-384
14,823,085 UART: [kat] SHA2-512-ACC
14,826,032 UART: [kat] ECC-384
17,267,083 UART: [kat] HMAC-384Kdf
17,280,817 UART: [kat] LMS
17,810,318 UART: [kat] --
17,813,920 UART: [warm-reset] ++
17,817,677 UART: [warm-reset] --
17,821,799 UART: [state] Locking Datavault
17,825,092 UART: [state] Locking PCR0, PCR1 and PCR31
17,826,793 UART: [state] Locking ICCM
17,828,395 UART: [exit] Launching FMC @ 0x40000130
17,836,837 UART:
17,837,068 UART: Running Caliptra FMC ...
17,838,161 UART:
17,838,309 UART: [state] CFI Enabled
17,840,405 UART: [aliasrt :skip pcr extension
17,841,662 UART: [art] Extend RT PCRs Done
17,842,788 UART: [art] Lock RT PCRs Done
17,844,011 UART: [art] Populate DV Done
17,849,570 UART: [fht] FMC Alias Private Key: 7
17,851,258 UART: [art] Derive CDI
17,852,067 UART: [art] Store in in slot 0x4
17,894,764 UART: [art] Derive Key Pair
17,895,756 UART: [art] Store priv key in slot 0x5
20,322,223 UART: [art] Derive Key Pair - Done
20,335,537 UART: [art] Signing Cert with AUTHO
20,336,832 UART: RITY.KEYID = 7
22,042,153 UART: [art] Erasing AUTHORITY.KEYID = 7
22,043,677 UART: [art] PUB.X = 8CB0114DAA30B1AFA0914860A6F90266BAA6C1203CCB51EA0BCDAB6A2F9F2439EEE39B040FB02577C2B5CA810250FEFA
22,050,978 UART: [art] PUB.Y = 7059B0AE3EEA807B3258EC027F4E55DEB2F7F583F2625313B214A5BEEE1FE0C020E14FCA9726EE4883F9A82F424B6C51
22,058,281 UART: [art] SIG.R = 829EC86EE0176A9BF360DE70358323F1F21376F8AB0CA25672CE301536DE2036905B4BF0AD30693E32874619E299E197
22,065,669 UART: [art] SIG.S = 557DF59FB2582A82AA6C25F677A55C374A57E29F2ECEAABE4C13132B1F535B7C532BDB6727797AC27330647D4CD9EC27
23,044,417 UART: Caliptra RT
23,045,134 UART: [state] CFI Enabled
23,334,316 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
191,901 UART:
192,368 UART: Running Caliptra ROM ...
193,505 UART:
603,041 UART: [state] CFI Enabled
617,558 UART: [state] LifecycleState = Production
619,326 UART: [state] DebugLocked = Yes
620,876 UART: [state] Starting the WD Timer 40000000 cycles
625,114 UART: [kat] SHA2-256
804,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,838 UART: [kat] ++
816,275 UART: [kat] sha1
826,807 UART: [kat] SHA2-256
829,875 UART: [kat] SHA2-384
835,286 UART: [kat] SHA2-512-ACC
838,284 UART: [kat] ECC-384
3,280,487 UART: [kat] HMAC-384Kdf
3,292,563 UART: [kat] LMS
3,822,099 UART: [kat] --
3,828,225 UART: [cold-reset] ++
3,829,303 UART: [fht] FHT @ 0x50003400
3,839,560 UART: [idev] ++
3,840,114 UART: [idev] CDI.KEYID = 6
3,841,133 UART: [idev] SUBJECT.KEYID = 7
3,842,298 UART: [idev] UDS.KEYID = 0
3,843,289 ready_for_fw is high
3,843,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,280 UART: [idev] Erasing UDS.KEYID = 0
6,317,507 UART: [idev] Sha1 KeyId Algorithm
6,340,616 UART: [idev] --
6,344,061 UART: [ldev] ++
6,344,627 UART: [ldev] CDI.KEYID = 6
6,345,540 UART: [ldev] SUBJECT.KEYID = 5
6,346,743 UART: [ldev] AUTHORITY.KEYID = 7
6,347,980 UART: [ldev] FE.KEYID = 1
6,358,347 UART: [ldev] Erasing FE.KEYID = 1
8,832,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,549 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,540 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,356 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,342 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,620,264 UART: [ldev] --
10,624,727 UART: [fwproc] Wait for Commands...
10,626,448 UART: [fwproc] Recv command 0x46574c44
10,628,533 UART: [fwproc] Recv'd Img size: 114448 bytes
14,063,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,137,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,206,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,524,589 >>> mbox cmd response: success
14,529,316 UART: [afmc] ++
14,529,933 UART: [afmc] CDI.KEYID = 6
14,530,847 UART: [afmc] SUBJECT.KEYID = 7
14,532,002 UART: [afmc] AUTHORITY.KEYID = 5
17,031,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,753,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,755,185 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,771,188 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,787,026 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,802,769 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,825,107 UART: [afmc] --
18,828,837 UART: [cold-reset] --
18,832,155 UART: [state] Locking Datavault
18,838,045 UART: [state] Locking PCR0, PCR1 and PCR31
18,839,686 UART: [state] Locking ICCM
18,842,101 UART: [exit] Launching FMC @ 0x40000130
18,850,531 UART:
18,850,779 UART: Running Caliptra FMC ...
18,851,876 UART:
18,852,025 UART: [state] CFI Enabled
18,860,121 UART: [fht] FMC Alias Private Key: 7
20,616,877 UART: [art] Extend RT PCRs Done
20,618,091 UART: [art] Lock RT PCRs Done
20,619,714 UART: [art] Populate DV Done
20,625,298 UART: [fht] FMC Alias Private Key: 7
20,626,990 UART: [art] Derive CDI
20,627,796 UART: [art] Store in in slot 0x4
20,670,052 UART: [art] Derive Key Pair
20,671,039 UART: [art] Store priv key in slot 0x5
23,097,993 UART: [art] Derive Key Pair - Done
23,110,817 UART: [art] Signing Cert with AUTHO
23,112,111 UART: RITY.KEYID = 7
24,817,447 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,938 UART: [art] PUB.X = A076DB1DB0053535C664076B3650E034391B609CDBD1ADD83DB549EB53A702279A76484F3BDE3D4D02485B5036ED57B2
24,826,178 UART: [art] PUB.Y = FCBFD3031DFDCD0D18244F71E18A86C4C6A00756802986C045B2F6573DEE4B7D965C3DBCF22E15C46D6F52C9F05B979B
24,833,455 UART: [art] SIG.R = 92FDBD3767AB91E5F054949D64DEB852A617F42FAD7677F8DBF7B2D2E412A55D5302ECBAF30DDFBD820C7FCD4DEED729
24,840,889 UART: [art] SIG.S = 9858EAB49C6757966978706009D6EF575A35ED9D75BE54BB1495E8ED35BC5BD132B69A7E73ADF06A3C7571099DA956DD
25,819,881 UART: Caliptra RT
25,820,573 UART: [state] CFI Enabled
25,937,954 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,008 UART:
1,265 UART: Running Caliptra ROM ...
2,365 UART:
14,584,367 UART: [state] CFI Enabled
14,601,805 UART: [state] LifecycleState = Production
14,603,550 UART: [state] DebugLocked = Yes
14,605,935 UART: [state] Starting the WD Timer 40000000 cycles
14,610,495 UART: [kat] SHA2-256
14,789,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,801,211 UART: [kat] ++
14,801,739 UART: [kat] sha1
14,813,268 UART: [kat] SHA2-256
14,816,323 UART: [kat] SHA2-384
14,822,457 UART: [kat] SHA2-512-ACC
14,825,416 UART: [kat] ECC-384
17,266,423 UART: [kat] HMAC-384Kdf
17,280,054 UART: [kat] LMS
17,809,569 UART: [kat] --
17,814,412 UART: [warm-reset] ++
17,819,895 UART: [warm-reset] --
17,823,318 UART: [state] Locking Datavault
17,826,778 UART: [state] Locking PCR0, PCR1 and PCR31
17,828,413 UART: [state] Locking ICCM
17,830,879 UART: [exit] Launching FMC @ 0x40000130
17,839,318 UART:
17,839,545 UART: Running Caliptra FMC ...
17,840,640 UART:
17,840,788 UART: [state] CFI Enabled
17,842,724 UART: [aliasrt :skip pcr extension
17,843,952 UART: [art] Extend RT PCRs Done
17,845,078 UART: [art] Lock RT PCRs Done
17,846,262 UART: [art] Populate DV Done
17,851,773 UART: [fht] FMC Alias Private Key: 7
17,853,513 UART: [art] Derive CDI
17,854,315 UART: [art] Store in in slot 0x4
17,896,905 UART: [art] Derive Key Pair
17,897,951 UART: [art] Store priv key in slot 0x5
20,324,588 UART: [art] Derive Key Pair - Done
20,337,636 UART: [art] Signing Cert with AUTHO
20,338,937 UART: RITY.KEYID = 7
22,044,779 UART: [art] Erasing AUTHORITY.KEYID = 7
22,046,295 UART: [art] PUB.X = A076DB1DB0053535C664076B3650E034391B609CDBD1ADD83DB549EB53A702279A76484F3BDE3D4D02485B5036ED57B2
22,053,545 UART: [art] PUB.Y = FCBFD3031DFDCD0D18244F71E18A86C4C6A00756802986C045B2F6573DEE4B7D965C3DBCF22E15C46D6F52C9F05B979B
22,060,796 UART: [art] SIG.R = 92FDBD3767AB91E5F054949D64DEB852A617F42FAD7677F8DBF7B2D2E412A55D5302ECBAF30DDFBD820C7FCD4DEED729
22,068,191 UART: [art] SIG.S = 9858EAB49C6757966978706009D6EF575A35ED9D75BE54BB1495E8ED35BC5BD132B69A7E73ADF06A3C7571099DA956DD
23,046,981 UART: Caliptra RT
23,047,694 UART: [state] CFI Enabled
23,334,480 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,801 UART: [state] LifecycleState = Production
85,409 UART: [state] DebugLocked = Yes
85,919 UART: [state] Starting the WD Timer 40000000 cycles
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,794 UART: [idev] ++
1,172,962 UART: [idev] CDI.KEYID = 6
1,173,323 UART: [idev] SUBJECT.KEYID = 7
1,173,748 UART: [idev] UDS.KEYID = 0
1,174,094 ready_for_fw is high
1,174,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,022 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,069 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,763 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,633 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,339 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,455 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,335 >>> mbox cmd response: success
2,799,347 UART: [afmc] ++
2,799,515 UART: [afmc] CDI.KEYID = 6
2,799,878 UART: [afmc] SUBJECT.KEYID = 7
2,800,304 UART: [afmc] AUTHORITY.KEYID = 5
2,835,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,240 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,959 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,852 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,559 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,570 UART: [afmc] --
2,879,683 UART: [cold-reset] --
2,880,435 UART: [state] Locking Datavault
2,881,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,442 UART: [state] Locking ICCM
2,882,922 UART: [exit] Launching FMC @ 0x40000130
2,888,251 UART:
2,888,267 UART: Running Caliptra FMC ...
2,888,675 UART:
2,888,729 UART: [state] CFI Enabled
2,898,800 UART: [fht] FMC Alias Private Key: 7
3,006,855 UART: [art] Extend RT PCRs Done
3,007,283 UART: [art] Lock RT PCRs Done
3,008,961 UART: [art] Populate DV Done
3,017,319 UART: [fht] FMC Alias Private Key: 7
3,018,339 UART: [art] Derive CDI
3,018,619 UART: [art] Store in in slot 0x4
3,104,216 UART: [art] Derive Key Pair
3,104,576 UART: [art] Store priv key in slot 0x5
3,117,694 UART: [art] Derive Key Pair - Done
3,132,584 UART: [art] Signing Cert with AUTHO
3,133,064 UART: RITY.KEYID = 7
3,148,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,983 UART: [art] PUB.X = B8DE37EE8D64944E52BBE5528EAF76387B05DC6A269BCB294F2719A67B4BD10EF07BC89BC3E5288590FD182048B31A48
3,155,757 UART: [art] PUB.Y = 4C1E8BF0C1101D1B1697135E4524131A7F9FA7B6E235A8E14970B1DB81E3F4C0D5EA7C1BCC3339EACB2CEAF2AD544409
3,162,720 UART: [art] SIG.R = 92CF4BB005269C33308EABBF4A8FF939C27A430C02B81D3F2CA0D83CF0B5DD4CF379CCA31AD4BDB969DEC056126E3C75
3,169,503 UART: [art] SIG.S = A6BAA4D330EB02DA944B9CB070993F9D879BC8C9441BFF62564A40478CB96966DF21AB280BE8BB87F68F0DFDC9BE96E7
3,193,005 UART: Caliptra RT
3,193,258 UART: [state] CFI Enabled
3,301,031 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,787 UART:
3,301,803 UART: Running Caliptra ROM ...
3,302,211 UART:
3,302,266 UART: [state] CFI Enabled
3,304,997 UART: [state] LifecycleState = Production
3,305,605 UART: [state] DebugLocked = Yes
3,306,315 UART: [state] Starting the WD Timer 40000000 cycles
3,307,962 UART: [kat] SHA2-256
4,111,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,641 UART: [kat] ++
4,115,793 UART: [kat] sha1
4,120,011 UART: [kat] SHA2-256
4,121,951 UART: [kat] SHA2-384
4,124,714 UART: [kat] SHA2-512-ACC
4,126,615 UART: [kat] ECC-384
4,136,136 UART: [kat] HMAC-384Kdf
4,140,670 UART: [kat] LMS
4,388,982 UART: [kat] --
4,389,884 UART: [warm-reset] ++
4,390,957 UART: [warm-reset] --
4,391,830 UART: [state] Locking Datavault
4,392,570 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,174 UART: [state] Locking ICCM
4,393,820 UART: [exit] Launching FMC @ 0x40000130
4,399,149 UART:
4,399,165 UART: Running Caliptra FMC ...
4,399,573 UART:
4,399,627 UART: [state] CFI Enabled
4,400,792 UART: [aliasrt :skip pcr extension
4,401,265 UART: [art] Extend RT PCRs Done
4,401,693 UART: [art] Lock RT PCRs Done
4,402,864 UART: [art] Populate DV Done
4,410,906 UART: [fht] FMC Alias Private Key: 7
4,411,994 UART: [art] Derive CDI
4,412,274 UART: [art] Store in in slot 0x4
4,497,839 UART: [art] Derive Key Pair
4,498,199 UART: [art] Store priv key in slot 0x5
4,511,907 UART: [art] Derive Key Pair - Done
4,526,441 UART: [art] Signing Cert with AUTHO
4,526,921 UART: RITY.KEYID = 7
4,542,449 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,214 UART: [art] PUB.X = B8DE37EE8D64944E52BBE5528EAF76387B05DC6A269BCB294F2719A67B4BD10EF07BC89BC3E5288590FD182048B31A48
4,549,988 UART: [art] PUB.Y = 4C1E8BF0C1101D1B1697135E4524131A7F9FA7B6E235A8E14970B1DB81E3F4C0D5EA7C1BCC3339EACB2CEAF2AD544409
4,556,951 UART: [art] SIG.R = 92CF4BB005269C33308EABBF4A8FF939C27A430C02B81D3F2CA0D83CF0B5DD4CF379CCA31AD4BDB969DEC056126E3C75
4,563,734 UART: [art] SIG.S = A6BAA4D330EB02DA944B9CB070993F9D879BC8C9441BFF62564A40478CB96966DF21AB280BE8BB87F68F0DFDC9BE96E7
4,587,246 UART: Caliptra RT
4,587,499 UART: [state] CFI Enabled
4,870,446 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Production
85,793 UART: [state] DebugLocked = Yes
86,539 UART: [state] Starting the WD Timer 40000000 cycles
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,285 UART: [kat] SHA2-256
902,225 UART: [kat] SHA2-384
905,076 UART: [kat] SHA2-512-ACC
906,977 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 ready_for_fw is high
1,174,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,771 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,641 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,347 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,483 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,533 >>> mbox cmd response: success
2,799,731 UART: [afmc] ++
2,799,899 UART: [afmc] CDI.KEYID = 6
2,800,262 UART: [afmc] SUBJECT.KEYID = 7
2,800,688 UART: [afmc] AUTHORITY.KEYID = 5
2,835,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,706 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,425 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,318 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,025 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,682 UART: [afmc] --
2,878,759 UART: [cold-reset] --
2,879,559 UART: [state] Locking Datavault
2,880,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,330 UART: [state] Locking ICCM
2,881,798 UART: [exit] Launching FMC @ 0x40000130
2,887,127 UART:
2,887,143 UART: Running Caliptra FMC ...
2,887,551 UART:
2,887,605 UART: [state] CFI Enabled
2,898,092 UART: [fht] FMC Alias Private Key: 7
3,006,123 UART: [art] Extend RT PCRs Done
3,006,551 UART: [art] Lock RT PCRs Done
3,008,065 UART: [art] Populate DV Done
3,016,385 UART: [fht] FMC Alias Private Key: 7
3,017,393 UART: [art] Derive CDI
3,017,673 UART: [art] Store in in slot 0x4
3,103,102 UART: [art] Derive Key Pair
3,103,462 UART: [art] Store priv key in slot 0x5
3,116,394 UART: [art] Derive Key Pair - Done
3,131,345 UART: [art] Signing Cert with AUTHO
3,131,825 UART: RITY.KEYID = 7
3,146,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,672 UART: [art] PUB.X = A448132E0EE13371AFE45AA840CFE5FA609981381361EE4F882ECD8A6AC1BF6FD2718EF4B8D4F7BD9F50FCEA5B7B86EE
3,154,463 UART: [art] PUB.Y = 8E4D87CBE02592CE7B23C9154C78DAEE10C24A40F3D3F7A2051B402E0D59A6669A4F2E23A9496E43C33F8704620142EE
3,161,405 UART: [art] SIG.R = B78242F03309B6F1B8D5FEEDEBED0126558BEBDB85B78F9096CC35CB3672E59C375715639C5B92E3DE5467FC5EA504BB
3,168,180 UART: [art] SIG.S = 3D531877DFCA9B4B02C03393030DA8D5022203CB11A60CA3D692F01E40A641D73F3313E1641FEC1659F1195006E79DDF
3,191,886 UART: Caliptra RT
3,192,139 UART: [state] CFI Enabled
3,300,144 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,900 UART:
3,300,916 UART: Running Caliptra ROM ...
3,301,324 UART:
3,301,379 UART: [state] CFI Enabled
3,304,412 UART: [state] LifecycleState = Production
3,305,020 UART: [state] DebugLocked = Yes
3,305,674 UART: [state] Starting the WD Timer 40000000 cycles
3,307,291 UART: [kat] SHA2-256
4,110,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,970 UART: [kat] ++
4,115,122 UART: [kat] sha1
4,119,392 UART: [kat] SHA2-256
4,121,332 UART: [kat] SHA2-384
4,124,247 UART: [kat] SHA2-512-ACC
4,126,148 UART: [kat] ECC-384
4,135,473 UART: [kat] HMAC-384Kdf
4,140,087 UART: [kat] LMS
4,388,399 UART: [kat] --
4,389,219 UART: [warm-reset] ++
4,390,130 UART: [warm-reset] --
4,390,953 UART: [state] Locking Datavault
4,391,931 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,535 UART: [state] Locking ICCM
4,393,195 UART: [exit] Launching FMC @ 0x40000130
4,398,524 UART:
4,398,540 UART: Running Caliptra FMC ...
4,398,948 UART:
4,399,002 UART: [state] CFI Enabled
4,400,387 UART: [aliasrt :skip pcr extension
4,400,860 UART: [art] Extend RT PCRs Done
4,401,288 UART: [art] Lock RT PCRs Done
4,402,797 UART: [art] Populate DV Done
4,411,153 UART: [fht] FMC Alias Private Key: 7
4,412,171 UART: [art] Derive CDI
4,412,451 UART: [art] Store in in slot 0x4
4,498,162 UART: [art] Derive Key Pair
4,498,522 UART: [art] Store priv key in slot 0x5
4,512,282 UART: [art] Derive Key Pair - Done
4,526,979 UART: [art] Signing Cert with AUTHO
4,527,459 UART: RITY.KEYID = 7
4,543,017 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,782 UART: [art] PUB.X = A448132E0EE13371AFE45AA840CFE5FA609981381361EE4F882ECD8A6AC1BF6FD2718EF4B8D4F7BD9F50FCEA5B7B86EE
4,550,573 UART: [art] PUB.Y = 8E4D87CBE02592CE7B23C9154C78DAEE10C24A40F3D3F7A2051B402E0D59A6669A4F2E23A9496E43C33F8704620142EE
4,557,515 UART: [art] SIG.R = B78242F03309B6F1B8D5FEEDEBED0126558BEBDB85B78F9096CC35CB3672E59C375715639C5B92E3DE5467FC5EA504BB
4,564,290 UART: [art] SIG.S = 3D531877DFCA9B4B02C03393030DA8D5022203CB11A60CA3D692F01E40A641D73F3313E1641FEC1659F1195006E79DDF
4,587,700 UART: Caliptra RT
4,587,953 UART: [state] CFI Enabled
4,873,438 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Production
86,382 UART: [state] DebugLocked = Yes
87,004 UART: [state] Starting the WD Timer 40000000 cycles
88,677 UART: [kat] SHA2-256
892,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,356 UART: [kat] ++
896,508 UART: [kat] sha1
900,688 UART: [kat] SHA2-256
902,628 UART: [kat] SHA2-384
905,445 UART: [kat] SHA2-512-ACC
907,346 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 ready_for_fw is high
1,174,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,633 UART: [ldev] ++
1,208,801 UART: [ldev] CDI.KEYID = 6
1,209,165 UART: [ldev] SUBJECT.KEYID = 5
1,209,592 UART: [ldev] AUTHORITY.KEYID = 7
1,210,055 UART: [ldev] FE.KEYID = 1
1,215,563 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,102 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,972 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,678 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,682 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,466 >>> mbox cmd response: success
2,799,526 UART: [afmc] ++
2,799,694 UART: [afmc] CDI.KEYID = 6
2,800,057 UART: [afmc] SUBJECT.KEYID = 7
2,800,483 UART: [afmc] AUTHORITY.KEYID = 5
2,836,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,851 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,570 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,463 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,170 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,059 UART: [afmc] --
2,880,166 UART: [cold-reset] --
2,881,202 UART: [state] Locking Datavault
2,882,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,291 UART: [state] Locking ICCM
2,883,883 UART: [exit] Launching FMC @ 0x40000130
2,889,212 UART:
2,889,228 UART: Running Caliptra FMC ...
2,889,636 UART:
2,889,779 UART: [state] CFI Enabled
2,900,570 UART: [fht] FMC Alias Private Key: 7
3,008,383 UART: [art] Extend RT PCRs Done
3,008,811 UART: [art] Lock RT PCRs Done
3,010,531 UART: [art] Populate DV Done
3,018,569 UART: [fht] FMC Alias Private Key: 7
3,019,525 UART: [art] Derive CDI
3,019,805 UART: [art] Store in in slot 0x4
3,105,270 UART: [art] Derive Key Pair
3,105,630 UART: [art] Store priv key in slot 0x5
3,119,426 UART: [art] Derive Key Pair - Done
3,134,440 UART: [art] Signing Cert with AUTHO
3,134,920 UART: RITY.KEYID = 7
3,150,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,961 UART: [art] PUB.X = D142D723A4995475B020996058C7DBC5B6D8C249AF21A50FA1833992D3EE5EEF21ED225AD29521ABF553FDACC05B2804
3,157,733 UART: [art] PUB.Y = C5C38837DE7046A1095F8564DD8DAF81E319E928495E021DD5B05705EC731ECEE95EAECD3FA9C48878C24433FB4DDC0D
3,164,685 UART: [art] SIG.R = 7F2E3BD36A6BE8C3ECEA261B594252AD0D78B5F5146072B499C9D298F7B19B06C56389FBB4644ED40DAF0913602FA74C
3,171,453 UART: [art] SIG.S = 53B27B566A0B08BEE459D43D72F4AE2C3FB371194999A6A5457940D8872810E9936F3D1C0B846E9E3FE25553D563276D
3,195,047 UART: Caliptra RT
3,195,392 UART: [state] CFI Enabled
3,302,006 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,762 UART:
3,302,778 UART: Running Caliptra ROM ...
3,303,186 UART:
3,303,328 UART: [state] CFI Enabled
3,306,031 UART: [state] LifecycleState = Production
3,306,639 UART: [state] DebugLocked = Yes
3,307,321 UART: [state] Starting the WD Timer 40000000 cycles
3,308,784 UART: [kat] SHA2-256
4,112,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,463 UART: [kat] ++
4,116,615 UART: [kat] sha1
4,120,905 UART: [kat] SHA2-256
4,122,845 UART: [kat] SHA2-384
4,125,574 UART: [kat] SHA2-512-ACC
4,127,475 UART: [kat] ECC-384
4,136,988 UART: [kat] HMAC-384Kdf
4,141,670 UART: [kat] LMS
4,389,982 UART: [kat] --
4,390,926 UART: [warm-reset] ++
4,391,869 UART: [warm-reset] --
4,392,542 UART: [state] Locking Datavault
4,393,386 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,990 UART: [state] Locking ICCM
4,394,626 UART: [exit] Launching FMC @ 0x40000130
4,399,955 UART:
4,399,971 UART: Running Caliptra FMC ...
4,400,379 UART:
4,400,522 UART: [state] CFI Enabled
4,402,081 UART: [aliasrt :skip pcr extension
4,402,554 UART: [art] Extend RT PCRs Done
4,402,982 UART: [art] Lock RT PCRs Done
4,404,307 UART: [art] Populate DV Done
4,412,495 UART: [fht] FMC Alias Private Key: 7
4,413,423 UART: [art] Derive CDI
4,413,703 UART: [art] Store in in slot 0x4
4,499,166 UART: [art] Derive Key Pair
4,499,526 UART: [art] Store priv key in slot 0x5
4,512,588 UART: [art] Derive Key Pair - Done
4,527,476 UART: [art] Signing Cert with AUTHO
4,527,956 UART: RITY.KEYID = 7
4,542,542 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,307 UART: [art] PUB.X = D142D723A4995475B020996058C7DBC5B6D8C249AF21A50FA1833992D3EE5EEF21ED225AD29521ABF553FDACC05B2804
4,550,079 UART: [art] PUB.Y = C5C38837DE7046A1095F8564DD8DAF81E319E928495E021DD5B05705EC731ECEE95EAECD3FA9C48878C24433FB4DDC0D
4,557,031 UART: [art] SIG.R = 7F2E3BD36A6BE8C3ECEA261B594252AD0D78B5F5146072B499C9D298F7B19B06C56389FBB4644ED40DAF0913602FA74C
4,563,799 UART: [art] SIG.S = 53B27B566A0B08BEE459D43D72F4AE2C3FB371194999A6A5457940D8872810E9936F3D1C0B846E9E3FE25553D563276D
4,587,613 UART: Caliptra RT
4,587,958 UART: [state] CFI Enabled
4,867,926 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Production
85,820 UART: [state] DebugLocked = Yes
86,444 UART: [state] Starting the WD Timer 40000000 cycles
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
905,203 UART: [kat] SHA2-512-ACC
907,104 UART: [kat] ECC-384
916,909 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,706 UART: [cold-reset] ++
1,171,081 UART: [fht] FHT @ 0x50003400
1,173,789 UART: [idev] ++
1,173,957 UART: [idev] CDI.KEYID = 6
1,174,318 UART: [idev] SUBJECT.KEYID = 7
1,174,743 UART: [idev] UDS.KEYID = 0
1,175,089 ready_for_fw is high
1,175,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,117 UART: [idev] Sha1 KeyId Algorithm
1,208,864 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,584 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,454 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,160 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,320 UART: [ldev] --
1,282,790 UART: [fwproc] Wait for Commands...
1,283,527 UART: [fwproc] Recv command 0x46574c44
1,284,260 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,778 >>> mbox cmd response: success
2,801,820 UART: [afmc] ++
2,801,988 UART: [afmc] CDI.KEYID = 6
2,802,351 UART: [afmc] SUBJECT.KEYID = 7
2,802,777 UART: [afmc] AUTHORITY.KEYID = 5
2,838,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,599 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,318 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,211 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,918 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,577 UART: [afmc] --
2,881,534 UART: [cold-reset] --
2,882,194 UART: [state] Locking Datavault
2,883,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,855 UART: [state] Locking ICCM
2,884,463 UART: [exit] Launching FMC @ 0x40000130
2,889,792 UART:
2,889,808 UART: Running Caliptra FMC ...
2,890,216 UART:
2,890,359 UART: [state] CFI Enabled
2,901,010 UART: [fht] FMC Alias Private Key: 7
3,009,075 UART: [art] Extend RT PCRs Done
3,009,503 UART: [art] Lock RT PCRs Done
3,011,269 UART: [art] Populate DV Done
3,019,391 UART: [fht] FMC Alias Private Key: 7
3,020,457 UART: [art] Derive CDI
3,020,737 UART: [art] Store in in slot 0x4
3,106,184 UART: [art] Derive Key Pair
3,106,544 UART: [art] Store priv key in slot 0x5
3,120,176 UART: [art] Derive Key Pair - Done
3,135,069 UART: [art] Signing Cert with AUTHO
3,135,549 UART: RITY.KEYID = 7
3,150,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,378 UART: [art] PUB.X = CCB6CE684F25B3FB1BDD242487C5F0C968D3E1FB0FB215E83C5C3CC34F884FC20FE824C3B3AB823CE3AEE9ACAE368592
3,158,168 UART: [art] PUB.Y = F92D08E322F0ECEEA127369033C2539458E9C2D9781F506F9064C997DE3B59C69C9761E9E4A323340B27C6CECF807B91
3,165,112 UART: [art] SIG.R = 5880F6C4592B9CCD1EF67FCF8D5602BCFF3B6DE75D7E3402081042A340C48FC4FF8546B122273F0E42721A97FC644FF3
3,171,878 UART: [art] SIG.S = E9501D9214B259BE0F96D0F2C47AF5B740799350CAA49FA01829AB75B4AEA61AE43C580459CDAB97928D9C993C62041E
3,195,930 UART: Caliptra RT
3,196,275 UART: [state] CFI Enabled
3,303,764 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,520 UART:
3,304,536 UART: Running Caliptra ROM ...
3,304,944 UART:
3,305,086 UART: [state] CFI Enabled
3,307,597 UART: [state] LifecycleState = Production
3,308,205 UART: [state] DebugLocked = Yes
3,308,915 UART: [state] Starting the WD Timer 40000000 cycles
3,310,446 UART: [kat] SHA2-256
4,113,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,125 UART: [kat] ++
4,118,277 UART: [kat] sha1
4,122,575 UART: [kat] SHA2-256
4,124,515 UART: [kat] SHA2-384
4,127,258 UART: [kat] SHA2-512-ACC
4,129,159 UART: [kat] ECC-384
4,138,970 UART: [kat] HMAC-384Kdf
4,143,530 UART: [kat] LMS
4,391,842 UART: [kat] --
4,392,870 UART: [warm-reset] ++
4,394,017 UART: [warm-reset] --
4,394,840 UART: [state] Locking Datavault
4,395,752 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,356 UART: [state] Locking ICCM
4,396,868 UART: [exit] Launching FMC @ 0x40000130
4,402,197 UART:
4,402,213 UART: Running Caliptra FMC ...
4,402,621 UART:
4,402,764 UART: [state] CFI Enabled
4,404,323 UART: [aliasrt :skip pcr extension
4,404,796 UART: [art] Extend RT PCRs Done
4,405,224 UART: [art] Lock RT PCRs Done
4,406,323 UART: [art] Populate DV Done
4,414,537 UART: [fht] FMC Alias Private Key: 7
4,415,697 UART: [art] Derive CDI
4,415,977 UART: [art] Store in in slot 0x4
4,501,770 UART: [art] Derive Key Pair
4,502,130 UART: [art] Store priv key in slot 0x5
4,515,094 UART: [art] Derive Key Pair - Done
4,529,817 UART: [art] Signing Cert with AUTHO
4,530,297 UART: RITY.KEYID = 7
4,545,325 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,090 UART: [art] PUB.X = CCB6CE684F25B3FB1BDD242487C5F0C968D3E1FB0FB215E83C5C3CC34F884FC20FE824C3B3AB823CE3AEE9ACAE368592
4,552,880 UART: [art] PUB.Y = F92D08E322F0ECEEA127369033C2539458E9C2D9781F506F9064C997DE3B59C69C9761E9E4A323340B27C6CECF807B91
4,559,824 UART: [art] SIG.R = 5880F6C4592B9CCD1EF67FCF8D5602BCFF3B6DE75D7E3402081042A340C48FC4FF8546B122273F0E42721A97FC644FF3
4,566,590 UART: [art] SIG.S = E9501D9214B259BE0F96D0F2C47AF5B740799350CAA49FA01829AB75B4AEA61AE43C580459CDAB97928D9C993C62041E
4,589,624 UART: Caliptra RT
4,589,969 UART: [state] CFI Enabled
4,875,650 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Production
86,069 UART: [state] DebugLocked = Yes
86,757 UART: [state] Starting the WD Timer 40000000 cycles
88,298 UART: [kat] SHA2-256
891,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,977 UART: [kat] ++
896,129 UART: [kat] sha1
900,545 UART: [kat] SHA2-256
902,485 UART: [kat] SHA2-384
905,302 UART: [kat] SHA2-512-ACC
907,203 UART: [kat] ECC-384
917,116 UART: [kat] HMAC-384Kdf
921,686 UART: [kat] LMS
1,169,998 UART: [kat] --
1,171,031 UART: [cold-reset] ++
1,171,388 UART: [fht] FHT @ 0x50003400
1,173,940 UART: [idev] ++
1,174,108 UART: [idev] CDI.KEYID = 6
1,174,469 UART: [idev] SUBJECT.KEYID = 7
1,174,894 UART: [idev] UDS.KEYID = 0
1,175,240 ready_for_fw is high
1,175,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,263 UART: [idev] Erasing UDS.KEYID = 0
1,200,506 UART: [idev] Sha1 KeyId Algorithm
1,209,421 UART: [idev] --
1,210,556 UART: [ldev] ++
1,210,724 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,515 UART: [ldev] AUTHORITY.KEYID = 7
1,211,978 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,271 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,965 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,835 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,541 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,699 UART: [ldev] --
1,283,097 UART: [fwproc] Wait for Commands...
1,283,890 UART: [fwproc] Recv command 0x46574c44
1,284,623 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,259 >>> mbox cmd response: success
2,802,305 UART: [afmc] ++
2,802,473 UART: [afmc] CDI.KEYID = 6
2,802,836 UART: [afmc] SUBJECT.KEYID = 7
2,803,262 UART: [afmc] AUTHORITY.KEYID = 5
2,838,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,962 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,681 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,574 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,281 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,072 UART: [afmc] --
2,882,087 UART: [cold-reset] --
2,882,805 UART: [state] Locking Datavault
2,883,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,438 UART: [state] Locking ICCM
2,885,094 UART: [exit] Launching FMC @ 0x40000130
2,890,423 UART:
2,890,439 UART: Running Caliptra FMC ...
2,890,847 UART:
2,890,901 UART: [state] CFI Enabled
2,901,110 UART: [fht] FMC Alias Private Key: 7
3,008,339 UART: [art] Extend RT PCRs Done
3,008,767 UART: [art] Lock RT PCRs Done
3,010,461 UART: [art] Populate DV Done
3,018,531 UART: [fht] FMC Alias Private Key: 7
3,019,583 UART: [art] Derive CDI
3,019,863 UART: [art] Store in in slot 0x4
3,105,302 UART: [art] Derive Key Pair
3,105,662 UART: [art] Store priv key in slot 0x5
3,118,944 UART: [art] Derive Key Pair - Done
3,133,755 UART: [art] Signing Cert with AUTHO
3,134,235 UART: RITY.KEYID = 7
3,149,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,496 UART: [art] PUB.X = 51EE6E26EC3B86F580354B18A96874C5F1C9C8C4852761B56FB165EBE98518ED196C38CAED06368120FA1608DA40DC54
3,157,264 UART: [art] PUB.Y = 17BC05021310AA6A536791A5A061FA8FC223F7399C2258C3EA49EDF079FEAE7F75361BB7077BFBB6F16E052A828BEC0F
3,164,211 UART: [art] SIG.R = A4BCE5F1EEE2A17EDB50A18ECF909F8C30F7A1A2CEC5DDC125105C854756816A3BF43C4B26E704CA10C50D09B622D2C6
3,170,992 UART: [art] SIG.S = 0ADC4044CF4FFFC2FCD0E49F5324B75E81D5841A30E0108FCD30679675026D2FCD5FD8066609B0DC490ABB1947429C52
3,194,758 UART: Caliptra RT
3,195,011 UART: [state] CFI Enabled
3,301,856 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,612 UART:
3,302,628 UART: Running Caliptra ROM ...
3,303,036 UART:
3,303,091 UART: [state] CFI Enabled
3,305,422 UART: [state] LifecycleState = Production
3,306,030 UART: [state] DebugLocked = Yes
3,306,650 UART: [state] Starting the WD Timer 40000000 cycles
3,308,245 UART: [kat] SHA2-256
4,111,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,924 UART: [kat] ++
4,116,076 UART: [kat] sha1
4,120,524 UART: [kat] SHA2-256
4,122,464 UART: [kat] SHA2-384
4,125,185 UART: [kat] SHA2-512-ACC
4,127,086 UART: [kat] ECC-384
4,137,253 UART: [kat] HMAC-384Kdf
4,141,721 UART: [kat] LMS
4,390,033 UART: [kat] --
4,390,915 UART: [warm-reset] ++
4,391,982 UART: [warm-reset] --
4,393,027 UART: [state] Locking Datavault
4,393,901 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,505 UART: [state] Locking ICCM
4,394,927 UART: [exit] Launching FMC @ 0x40000130
4,400,256 UART:
4,400,272 UART: Running Caliptra FMC ...
4,400,680 UART:
4,400,734 UART: [state] CFI Enabled
4,402,315 UART: [aliasrt :skip pcr extension
4,402,788 UART: [art] Extend RT PCRs Done
4,403,216 UART: [art] Lock RT PCRs Done
4,404,417 UART: [art] Populate DV Done
4,412,695 UART: [fht] FMC Alias Private Key: 7
4,413,651 UART: [art] Derive CDI
4,413,931 UART: [art] Store in in slot 0x4
4,499,732 UART: [art] Derive Key Pair
4,500,092 UART: [art] Store priv key in slot 0x5
4,513,906 UART: [art] Derive Key Pair - Done
4,528,465 UART: [art] Signing Cert with AUTHO
4,528,945 UART: RITY.KEYID = 7
4,544,459 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,224 UART: [art] PUB.X = 51EE6E26EC3B86F580354B18A96874C5F1C9C8C4852761B56FB165EBE98518ED196C38CAED06368120FA1608DA40DC54
4,551,992 UART: [art] PUB.Y = 17BC05021310AA6A536791A5A061FA8FC223F7399C2258C3EA49EDF079FEAE7F75361BB7077BFBB6F16E052A828BEC0F
4,558,939 UART: [art] SIG.R = A4BCE5F1EEE2A17EDB50A18ECF909F8C30F7A1A2CEC5DDC125105C854756816A3BF43C4B26E704CA10C50D09B622D2C6
4,565,720 UART: [art] SIG.S = 0ADC4044CF4FFFC2FCD0E49F5324B75E81D5841A30E0108FCD30679675026D2FCD5FD8066609B0DC490ABB1947429C52
4,589,828 UART: Caliptra RT
4,590,081 UART: [state] CFI Enabled
4,872,546 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Production
85,737 UART: [state] DebugLocked = Yes
86,413 UART: [state] Starting the WD Timer 40000000 cycles
88,044 UART: [kat] SHA2-256
891,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,723 UART: [kat] ++
895,875 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,994 UART: [kat] SHA2-512-ACC
906,895 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,112 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,175,114 ready_for_fw is high
1,175,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,129 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,208,917 UART: [idev] --
1,210,000 UART: [ldev] ++
1,210,168 UART: [ldev] CDI.KEYID = 6
1,210,532 UART: [ldev] SUBJECT.KEYID = 5
1,210,959 UART: [ldev] AUTHORITY.KEYID = 7
1,211,422 UART: [ldev] FE.KEYID = 1
1,216,252 UART: [ldev] Erasing FE.KEYID = 1
1,242,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,109 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,979 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,685 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,817 UART: [ldev] --
1,282,127 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,307 >>> mbox cmd response: success
2,802,337 UART: [afmc] ++
2,802,505 UART: [afmc] CDI.KEYID = 6
2,802,868 UART: [afmc] SUBJECT.KEYID = 7
2,803,294 UART: [afmc] AUTHORITY.KEYID = 5
2,838,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,308 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,027 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,920 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,627 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,494 UART: [afmc] --
2,881,479 UART: [cold-reset] --
2,882,401 UART: [state] Locking Datavault
2,883,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,196 UART: [state] Locking ICCM
2,884,706 UART: [exit] Launching FMC @ 0x40000130
2,890,035 UART:
2,890,051 UART: Running Caliptra FMC ...
2,890,459 UART:
2,890,513 UART: [state] CFI Enabled
2,900,880 UART: [fht] FMC Alias Private Key: 7
3,008,085 UART: [art] Extend RT PCRs Done
3,008,513 UART: [art] Lock RT PCRs Done
3,010,315 UART: [art] Populate DV Done
3,018,375 UART: [fht] FMC Alias Private Key: 7
3,019,415 UART: [art] Derive CDI
3,019,695 UART: [art] Store in in slot 0x4
3,104,898 UART: [art] Derive Key Pair
3,105,258 UART: [art] Store priv key in slot 0x5
3,118,220 UART: [art] Derive Key Pair - Done
3,132,962 UART: [art] Signing Cert with AUTHO
3,133,442 UART: RITY.KEYID = 7
3,149,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,777 UART: [art] PUB.X = 0707356E138F84668EC00EE988322E4986284E983C15536D979004316008243F7BB3501AE84D068114B1ACB8D73DC966
3,156,513 UART: [art] PUB.Y = 1D23799332B921C39A31AC68E84C25067DB9ECC467A152407AA910A911A775142D498305B9A9EA387FA923513F5006D4
3,163,446 UART: [art] SIG.R = C2D706C28818BB0D3CB401A80ACE7A7527F393819E50A2ADD12DE425BD96E7D9113D48F337CA8D975AFA60FB6D348E9E
3,170,218 UART: [art] SIG.S = 704AECF667590F51BEE9033789F987F08796E3686DA1D61C8C752AB4981AC3CFFF2A4F61C32B05BA0A6C3174692F1F24
3,193,659 UART: Caliptra RT
3,193,912 UART: [state] CFI Enabled
3,301,451 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,207 UART:
3,302,223 UART: Running Caliptra ROM ...
3,302,631 UART:
3,302,686 UART: [state] CFI Enabled
3,304,981 UART: [state] LifecycleState = Production
3,305,589 UART: [state] DebugLocked = Yes
3,306,123 UART: [state] Starting the WD Timer 40000000 cycles
3,307,816 UART: [kat] SHA2-256
4,111,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,495 UART: [kat] ++
4,115,647 UART: [kat] sha1
4,119,709 UART: [kat] SHA2-256
4,121,649 UART: [kat] SHA2-384
4,124,312 UART: [kat] SHA2-512-ACC
4,126,213 UART: [kat] ECC-384
4,135,984 UART: [kat] HMAC-384Kdf
4,140,456 UART: [kat] LMS
4,388,768 UART: [kat] --
4,389,904 UART: [warm-reset] ++
4,390,877 UART: [warm-reset] --
4,391,590 UART: [state] Locking Datavault
4,392,236 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,840 UART: [state] Locking ICCM
4,393,330 UART: [exit] Launching FMC @ 0x40000130
4,398,659 UART:
4,398,675 UART: Running Caliptra FMC ...
4,399,083 UART:
4,399,137 UART: [state] CFI Enabled
4,400,454 UART: [aliasrt :skip pcr extension
4,400,927 UART: [art] Extend RT PCRs Done
4,401,355 UART: [art] Lock RT PCRs Done
4,402,616 UART: [art] Populate DV Done
4,410,784 UART: [fht] FMC Alias Private Key: 7
4,411,840 UART: [art] Derive CDI
4,412,120 UART: [art] Store in in slot 0x4
4,497,801 UART: [art] Derive Key Pair
4,498,161 UART: [art] Store priv key in slot 0x5
4,511,715 UART: [art] Derive Key Pair - Done
4,526,485 UART: [art] Signing Cert with AUTHO
4,526,965 UART: RITY.KEYID = 7
4,542,339 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,104 UART: [art] PUB.X = 0707356E138F84668EC00EE988322E4986284E983C15536D979004316008243F7BB3501AE84D068114B1ACB8D73DC966
4,549,840 UART: [art] PUB.Y = 1D23799332B921C39A31AC68E84C25067DB9ECC467A152407AA910A911A775142D498305B9A9EA387FA923513F5006D4
4,556,773 UART: [art] SIG.R = C2D706C28818BB0D3CB401A80ACE7A7527F393819E50A2ADD12DE425BD96E7D9113D48F337CA8D975AFA60FB6D348E9E
4,563,545 UART: [art] SIG.S = 704AECF667590F51BEE9033789F987F08796E3686DA1D61C8C752AB4981AC3CFFF2A4F61C32B05BA0A6C3174692F1F24
4,587,552 UART: Caliptra RT
4,587,805 UART: [state] CFI Enabled
4,869,810 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Production
85,628 UART: [state] DebugLocked = Yes
86,264 UART: [state] Starting the WD Timer 40000000 cycles
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,231 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 ready_for_fw is high
1,174,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,622 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,316 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,186 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,892 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,860 UART: [ldev] --
1,281,228 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,416 >>> mbox cmd response: success
2,798,654 UART: [afmc] ++
2,798,822 UART: [afmc] CDI.KEYID = 6
2,799,185 UART: [afmc] SUBJECT.KEYID = 7
2,799,611 UART: [afmc] AUTHORITY.KEYID = 5
2,835,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,309 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,028 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,921 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,628 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,493 UART: [afmc] --
2,878,498 UART: [cold-reset] --
2,879,402 UART: [state] Locking Datavault
2,880,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,169 UART: [state] Locking ICCM
2,881,753 UART: [exit] Launching FMC @ 0x40000130
2,887,082 UART:
2,887,098 UART: Running Caliptra FMC ...
2,887,506 UART:
2,887,649 UART: [state] CFI Enabled
2,898,218 UART: [fht] FMC Alias Private Key: 7
3,005,915 UART: [art] Extend RT PCRs Done
3,006,343 UART: [art] Lock RT PCRs Done
3,008,125 UART: [art] Populate DV Done
3,016,487 UART: [fht] FMC Alias Private Key: 7
3,017,551 UART: [art] Derive CDI
3,017,831 UART: [art] Store in in slot 0x4
3,103,518 UART: [art] Derive Key Pair
3,103,878 UART: [art] Store priv key in slot 0x5
3,117,024 UART: [art] Derive Key Pair - Done
3,132,030 UART: [art] Signing Cert with AUTHO
3,132,510 UART: RITY.KEYID = 7
3,147,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,921 UART: [art] PUB.X = 2BEE69BF298B5E270D554BA7C5398B99BA39912B876FE8F8BC76800286F10C71BAC20605C95FCAEFD78B237CE364883C
3,154,686 UART: [art] PUB.Y = A7EA9A86489682AE0DBE772E48BA6D25F22C9D6766B4E00D64A6B860E4B1AA9B3D98522958AE092772905E99BF0821D0
3,161,628 UART: [art] SIG.R = 5379E0173A02158C86566F9A8B82BD11F179DB92B3CABC0FFAFD11DE71CAB6B60FD37FA4C05589B25515FD3A338AE971
3,168,403 UART: [art] SIG.S = DA6937C675248AC533EE65B630729CA1236906C610F7BF781622AEEAE8C98B511B6C90E495D79091C8C34BD7DF9EE9D4
3,191,911 UART: Caliptra RT
3,192,256 UART: [state] CFI Enabled
3,299,287 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,043 UART:
3,300,059 UART: Running Caliptra ROM ...
3,300,467 UART:
3,300,609 UART: [state] CFI Enabled
3,303,540 UART: [state] LifecycleState = Production
3,304,148 UART: [state] DebugLocked = Yes
3,304,718 UART: [state] Starting the WD Timer 40000000 cycles
3,306,317 UART: [kat] SHA2-256
4,109,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,996 UART: [kat] ++
4,114,148 UART: [kat] sha1
4,118,368 UART: [kat] SHA2-256
4,120,308 UART: [kat] SHA2-384
4,122,891 UART: [kat] SHA2-512-ACC
4,124,792 UART: [kat] ECC-384
4,134,511 UART: [kat] HMAC-384Kdf
4,139,167 UART: [kat] LMS
4,387,479 UART: [kat] --
4,388,449 UART: [warm-reset] ++
4,389,338 UART: [warm-reset] --
4,389,975 UART: [state] Locking Datavault
4,390,623 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,227 UART: [state] Locking ICCM
4,391,815 UART: [exit] Launching FMC @ 0x40000130
4,397,144 UART:
4,397,160 UART: Running Caliptra FMC ...
4,397,568 UART:
4,397,711 UART: [state] CFI Enabled
4,399,082 UART: [aliasrt :skip pcr extension
4,399,555 UART: [art] Extend RT PCRs Done
4,399,983 UART: [art] Lock RT PCRs Done
4,400,964 UART: [art] Populate DV Done
4,409,050 UART: [fht] FMC Alias Private Key: 7
4,410,172 UART: [art] Derive CDI
4,410,452 UART: [art] Store in in slot 0x4
4,495,953 UART: [art] Derive Key Pair
4,496,313 UART: [art] Store priv key in slot 0x5
4,509,743 UART: [art] Derive Key Pair - Done
4,524,369 UART: [art] Signing Cert with AUTHO
4,524,849 UART: RITY.KEYID = 7
4,540,165 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,930 UART: [art] PUB.X = 2BEE69BF298B5E270D554BA7C5398B99BA39912B876FE8F8BC76800286F10C71BAC20605C95FCAEFD78B237CE364883C
4,547,695 UART: [art] PUB.Y = A7EA9A86489682AE0DBE772E48BA6D25F22C9D6766B4E00D64A6B860E4B1AA9B3D98522958AE092772905E99BF0821D0
4,554,637 UART: [art] SIG.R = 5379E0173A02158C86566F9A8B82BD11F179DB92B3CABC0FFAFD11DE71CAB6B60FD37FA4C05589B25515FD3A338AE971
4,561,412 UART: [art] SIG.S = DA6937C675248AC533EE65B630729CA1236906C610F7BF781622AEEAE8C98B511B6C90E495D79091C8C34BD7DF9EE9D4
4,585,610 UART: Caliptra RT
4,585,955 UART: [state] CFI Enabled
4,866,472 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Production
85,786 UART: [state] DebugLocked = Yes
86,500 UART: [state] Starting the WD Timer 40000000 cycles
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,824 UART: [kat] ++
895,976 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
917,185 UART: [kat] HMAC-384Kdf
921,853 UART: [kat] LMS
1,170,165 UART: [kat] --
1,171,242 UART: [cold-reset] ++
1,171,801 UART: [fht] FHT @ 0x50003400
1,174,373 UART: [idev] ++
1,174,541 UART: [idev] CDI.KEYID = 6
1,174,902 UART: [idev] SUBJECT.KEYID = 7
1,175,327 UART: [idev] UDS.KEYID = 0
1,175,673 ready_for_fw is high
1,175,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,350 UART: [idev] --
1,210,407 UART: [ldev] ++
1,210,575 UART: [ldev] CDI.KEYID = 6
1,210,939 UART: [ldev] SUBJECT.KEYID = 5
1,211,366 UART: [ldev] AUTHORITY.KEYID = 7
1,211,829 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,918 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,788 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,494 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,588 UART: [ldev] --
1,283,104 UART: [fwproc] Wait for Commands...
1,283,679 UART: [fwproc] Recv command 0x46574c44
1,284,412 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,718 >>> mbox cmd response: success
2,800,948 UART: [afmc] ++
2,801,116 UART: [afmc] CDI.KEYID = 6
2,801,479 UART: [afmc] SUBJECT.KEYID = 7
2,801,905 UART: [afmc] AUTHORITY.KEYID = 5
2,837,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,985 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,704 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,597 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,304 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,231 UART: [afmc] --
2,881,126 UART: [cold-reset] --
2,881,856 UART: [state] Locking Datavault
2,882,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,211 UART: [state] Locking ICCM
2,883,883 UART: [exit] Launching FMC @ 0x40000130
2,889,212 UART:
2,889,228 UART: Running Caliptra FMC ...
2,889,636 UART:
2,889,779 UART: [state] CFI Enabled
2,900,282 UART: [fht] FMC Alias Private Key: 7
3,007,897 UART: [art] Extend RT PCRs Done
3,008,325 UART: [art] Lock RT PCRs Done
3,010,023 UART: [art] Populate DV Done
3,018,183 UART: [fht] FMC Alias Private Key: 7
3,019,259 UART: [art] Derive CDI
3,019,539 UART: [art] Store in in slot 0x4
3,105,052 UART: [art] Derive Key Pair
3,105,412 UART: [art] Store priv key in slot 0x5
3,118,308 UART: [art] Derive Key Pair - Done
3,133,092 UART: [art] Signing Cert with AUTHO
3,133,572 UART: RITY.KEYID = 7
3,148,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,643 UART: [art] PUB.X = 41DE0A9DC9F3B41C6BC09F2E1B8B1557C7FBF742DF46F7DEA3C330B05AA3BE20526868FC0AA979C7D280B25DFD42D1B3
3,156,429 UART: [art] PUB.Y = F23AB56593C3040FFBBF824129FFF1C4F3FECD516606354CD49A1F1B6D6D35E0AA89FE3040CED1E0E1963713DD432FDC
3,163,388 UART: [art] SIG.R = 5B993FD500F4A9C0FEA28EAC12F944C699B50C4CCB050BF6D60D22FE2E32BDA1CE9241EA6C29563A78AAB0D8A6F382AF
3,170,148 UART: [art] SIG.S = E65DB840AAAE5521C70769619B24616B9D0511AC4F330031B0B249414008FD462329E7B7B1A2727726BCA022B287F909
3,193,751 UART: Caliptra RT
3,194,096 UART: [state] CFI Enabled
3,302,999 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,755 UART:
3,303,771 UART: Running Caliptra ROM ...
3,304,179 UART:
3,304,321 UART: [state] CFI Enabled
3,307,152 UART: [state] LifecycleState = Production
3,307,760 UART: [state] DebugLocked = Yes
3,308,324 UART: [state] Starting the WD Timer 40000000 cycles
3,309,887 UART: [kat] SHA2-256
4,113,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,566 UART: [kat] ++
4,117,718 UART: [kat] sha1
4,121,974 UART: [kat] SHA2-256
4,123,914 UART: [kat] SHA2-384
4,126,893 UART: [kat] SHA2-512-ACC
4,128,794 UART: [kat] ECC-384
4,138,557 UART: [kat] HMAC-384Kdf
4,143,123 UART: [kat] LMS
4,391,435 UART: [kat] --
4,392,409 UART: [warm-reset] ++
4,393,506 UART: [warm-reset] --
4,394,211 UART: [state] Locking Datavault
4,395,003 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,607 UART: [state] Locking ICCM
4,396,239 UART: [exit] Launching FMC @ 0x40000130
4,401,568 UART:
4,401,584 UART: Running Caliptra FMC ...
4,401,992 UART:
4,402,135 UART: [state] CFI Enabled
4,403,444 UART: [aliasrt :skip pcr extension
4,403,917 UART: [art] Extend RT PCRs Done
4,404,345 UART: [art] Lock RT PCRs Done
4,405,460 UART: [art] Populate DV Done
4,413,452 UART: [fht] FMC Alias Private Key: 7
4,414,438 UART: [art] Derive CDI
4,414,718 UART: [art] Store in in slot 0x4
4,499,919 UART: [art] Derive Key Pair
4,500,279 UART: [art] Store priv key in slot 0x5
4,513,871 UART: [art] Derive Key Pair - Done
4,528,847 UART: [art] Signing Cert with AUTHO
4,529,327 UART: RITY.KEYID = 7
4,544,825 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,590 UART: [art] PUB.X = 41DE0A9DC9F3B41C6BC09F2E1B8B1557C7FBF742DF46F7DEA3C330B05AA3BE20526868FC0AA979C7D280B25DFD42D1B3
4,552,376 UART: [art] PUB.Y = F23AB56593C3040FFBBF824129FFF1C4F3FECD516606354CD49A1F1B6D6D35E0AA89FE3040CED1E0E1963713DD432FDC
4,559,335 UART: [art] SIG.R = 5B993FD500F4A9C0FEA28EAC12F944C699B50C4CCB050BF6D60D22FE2E32BDA1CE9241EA6C29563A78AAB0D8A6F382AF
4,566,095 UART: [art] SIG.S = E65DB840AAAE5521C70769619B24616B9D0511AC4F330031B0B249414008FD462329E7B7B1A2727726BCA022B287F909
4,589,440 UART: Caliptra RT
4,589,785 UART: [state] CFI Enabled
4,869,728 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Production
86,301 UART: [state] DebugLocked = Yes
87,005 UART: [state] Starting the WD Timer 40000000 cycles
88,524 UART: [kat] SHA2-256
892,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,203 UART: [kat] ++
896,355 UART: [kat] sha1
900,549 UART: [kat] SHA2-256
902,489 UART: [kat] SHA2-384
905,250 UART: [kat] SHA2-512-ACC
907,151 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,384 UART: [kat] LMS
1,169,696 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 ready_for_fw is high
1,174,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,533 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,227 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,097 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,803 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,929 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,154 UART: [fwproc] Recv command 0x46574c44
1,281,887 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,941 >>> mbox cmd response: success
2,799,197 UART: [afmc] ++
2,799,365 UART: [afmc] CDI.KEYID = 6
2,799,728 UART: [afmc] SUBJECT.KEYID = 7
2,800,154 UART: [afmc] AUTHORITY.KEYID = 5
2,836,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,014 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,733 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,626 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,333 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,176 UART: [afmc] --
2,879,059 UART: [cold-reset] --
2,879,987 UART: [state] Locking Datavault
2,881,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,710 UART: [state] Locking ICCM
2,882,164 UART: [exit] Launching FMC @ 0x40000130
2,887,493 UART:
2,887,509 UART: Running Caliptra FMC ...
2,887,917 UART:
2,887,971 UART: [state] CFI Enabled
2,898,526 UART: [fht] FMC Alias Private Key: 7
3,006,353 UART: [art] Extend RT PCRs Done
3,006,781 UART: [art] Lock RT PCRs Done
3,008,263 UART: [art] Populate DV Done
3,016,487 UART: [fht] FMC Alias Private Key: 7
3,017,565 UART: [art] Derive CDI
3,017,845 UART: [art] Store in in slot 0x4
3,103,782 UART: [art] Derive Key Pair
3,104,142 UART: [art] Store priv key in slot 0x5
3,117,584 UART: [art] Derive Key Pair - Done
3,131,989 UART: [art] Signing Cert with AUTHO
3,132,469 UART: RITY.KEYID = 7
3,147,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,294 UART: [art] PUB.X = 06EA755AADC31F4A71DEBCE9FCFE3715F4268A45455922CD8A32F35134460E0FC9BCA50C587D4E190A0161AACDCDE2C3
3,155,066 UART: [art] PUB.Y = 225C8D65824FECD809DD559A04284707CC2235ED8CA2802CE1B9797E69447C60E07DE2D3D22B6F45618B4C66F9364CC5
3,162,009 UART: [art] SIG.R = 0AC4F7DA9F1779FB1E51BB321942F8C6D980FFF888B1CCA075D99AF1E693461EEDCE1A35747BBC6D19D0040B4C5BB442
3,168,788 UART: [art] SIG.S = FC0BF21A8DED04F093C6C5C471BA3C189F0528A50E671AAB924C056E7E75581331DC9548575008941CF6BD5B2076191E
3,192,433 UART: Caliptra RT
3,192,686 UART: [state] CFI Enabled
3,300,479 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,235 UART:
3,301,251 UART: Running Caliptra ROM ...
3,301,659 UART:
3,301,714 UART: [state] CFI Enabled
3,304,671 UART: [state] LifecycleState = Production
3,305,279 UART: [state] DebugLocked = Yes
3,306,041 UART: [state] Starting the WD Timer 40000000 cycles
3,307,650 UART: [kat] SHA2-256
4,111,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,329 UART: [kat] ++
4,115,481 UART: [kat] sha1
4,119,765 UART: [kat] SHA2-256
4,121,705 UART: [kat] SHA2-384
4,124,410 UART: [kat] SHA2-512-ACC
4,126,311 UART: [kat] ECC-384
4,136,108 UART: [kat] HMAC-384Kdf
4,140,756 UART: [kat] LMS
4,389,068 UART: [kat] --
4,389,726 UART: [warm-reset] ++
4,390,659 UART: [warm-reset] --
4,391,298 UART: [state] Locking Datavault
4,392,110 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,714 UART: [state] Locking ICCM
4,393,234 UART: [exit] Launching FMC @ 0x40000130
4,398,563 UART:
4,398,579 UART: Running Caliptra FMC ...
4,398,987 UART:
4,399,041 UART: [state] CFI Enabled
4,400,346 UART: [aliasrt :skip pcr extension
4,400,819 UART: [art] Extend RT PCRs Done
4,401,247 UART: [art] Lock RT PCRs Done
4,402,330 UART: [art] Populate DV Done
4,410,660 UART: [fht] FMC Alias Private Key: 7
4,411,832 UART: [art] Derive CDI
4,412,112 UART: [art] Store in in slot 0x4
4,497,705 UART: [art] Derive Key Pair
4,498,065 UART: [art] Store priv key in slot 0x5
4,510,999 UART: [art] Derive Key Pair - Done
4,526,148 UART: [art] Signing Cert with AUTHO
4,526,628 UART: RITY.KEYID = 7
4,542,080 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,845 UART: [art] PUB.X = 06EA755AADC31F4A71DEBCE9FCFE3715F4268A45455922CD8A32F35134460E0FC9BCA50C587D4E190A0161AACDCDE2C3
4,549,617 UART: [art] PUB.Y = 225C8D65824FECD809DD559A04284707CC2235ED8CA2802CE1B9797E69447C60E07DE2D3D22B6F45618B4C66F9364CC5
4,556,560 UART: [art] SIG.R = 0AC4F7DA9F1779FB1E51BB321942F8C6D980FFF888B1CCA075D99AF1E693461EEDCE1A35747BBC6D19D0040B4C5BB442
4,563,339 UART: [art] SIG.S = FC0BF21A8DED04F093C6C5C471BA3C189F0528A50E671AAB924C056E7E75581331DC9548575008941CF6BD5B2076191E
4,587,250 UART: Caliptra RT
4,587,503 UART: [state] CFI Enabled
4,868,962 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Production
85,615 UART: [state] DebugLocked = Yes
86,173 UART: [state] Starting the WD Timer 40000000 cycles
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,174,866 ready_for_fw is high
1,174,866 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,567 UART: [idev] --
1,209,518 UART: [ldev] ++
1,209,686 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,477 UART: [ldev] AUTHORITY.KEYID = 7
1,210,940 UART: [ldev] FE.KEYID = 1
1,216,284 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,401 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,271 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,977 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,065 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,867 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,813 >>> mbox cmd response: success
2,799,849 UART: [afmc] ++
2,800,017 UART: [afmc] CDI.KEYID = 6
2,800,380 UART: [afmc] SUBJECT.KEYID = 7
2,800,806 UART: [afmc] AUTHORITY.KEYID = 5
2,836,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,978 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,697 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,590 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,297 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,178 UART: [afmc] --
2,879,309 UART: [cold-reset] --
2,880,021 UART: [state] Locking Datavault
2,881,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,758 UART: [state] Locking ICCM
2,882,356 UART: [exit] Launching FMC @ 0x40000130
2,887,685 UART:
2,887,701 UART: Running Caliptra FMC ...
2,888,109 UART:
2,888,163 UART: [state] CFI Enabled
2,898,466 UART: [fht] FMC Alias Private Key: 7
3,005,457 UART: [art] Extend RT PCRs Done
3,005,885 UART: [art] Lock RT PCRs Done
3,007,587 UART: [art] Populate DV Done
3,015,809 UART: [fht] FMC Alias Private Key: 7
3,016,947 UART: [art] Derive CDI
3,017,227 UART: [art] Store in in slot 0x4
3,103,158 UART: [art] Derive Key Pair
3,103,518 UART: [art] Store priv key in slot 0x5
3,116,422 UART: [art] Derive Key Pair - Done
3,131,066 UART: [art] Signing Cert with AUTHO
3,131,546 UART: RITY.KEYID = 7
3,146,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,723 UART: [art] PUB.X = CE087BB985955406F2E5AFE45E2BF1F62D3B6671E73D84B6A2ED0956CC8DA69C14BE30D83B8D715122A5A7A283568C87
3,154,492 UART: [art] PUB.Y = 37405D9F4689734CAF4FBDBBEE28B0BCC675E61F42576E4AE3397162318DC5E21EF2F6DF76E64F1CD88BE87BF9A0DCC8
3,161,462 UART: [art] SIG.R = 089AABCEA550F66A46133BAAB99913A2ADCE8EAF57A150B890836B430EADEE15AEEFC72B3AD90D7D0D735779F083FD47
3,168,242 UART: [art] SIG.S = E6B8DC420DFAD40FA3E7FBBD63C921E9A707F5DDECCE582DFB3967EBBDDF3729867B95F36E7E9A83632537B4BE9960F1
3,192,112 UART: Caliptra RT
3,192,365 UART: [state] CFI Enabled
3,299,938 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,694 UART:
3,300,710 UART: Running Caliptra ROM ...
3,301,118 UART:
3,301,173 UART: [state] CFI Enabled
3,303,420 UART: [state] LifecycleState = Production
3,304,028 UART: [state] DebugLocked = Yes
3,304,760 UART: [state] Starting the WD Timer 40000000 cycles
3,306,291 UART: [kat] SHA2-256
4,109,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,970 UART: [kat] ++
4,114,122 UART: [kat] sha1
4,118,476 UART: [kat] SHA2-256
4,120,416 UART: [kat] SHA2-384
4,122,979 UART: [kat] SHA2-512-ACC
4,124,880 UART: [kat] ECC-384
4,134,573 UART: [kat] HMAC-384Kdf
4,139,131 UART: [kat] LMS
4,387,443 UART: [kat] --
4,388,353 UART: [warm-reset] ++
4,389,088 UART: [warm-reset] --
4,389,687 UART: [state] Locking Datavault
4,390,345 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,949 UART: [state] Locking ICCM
4,391,599 UART: [exit] Launching FMC @ 0x40000130
4,396,928 UART:
4,396,944 UART: Running Caliptra FMC ...
4,397,352 UART:
4,397,406 UART: [state] CFI Enabled
4,398,717 UART: [aliasrt :skip pcr extension
4,399,190 UART: [art] Extend RT PCRs Done
4,399,618 UART: [art] Lock RT PCRs Done
4,401,119 UART: [art] Populate DV Done
4,409,559 UART: [fht] FMC Alias Private Key: 7
4,410,525 UART: [art] Derive CDI
4,410,805 UART: [art] Store in in slot 0x4
4,496,596 UART: [art] Derive Key Pair
4,496,956 UART: [art] Store priv key in slot 0x5
4,509,958 UART: [art] Derive Key Pair - Done
4,524,644 UART: [art] Signing Cert with AUTHO
4,525,124 UART: RITY.KEYID = 7
4,539,768 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,533 UART: [art] PUB.X = CE087BB985955406F2E5AFE45E2BF1F62D3B6671E73D84B6A2ED0956CC8DA69C14BE30D83B8D715122A5A7A283568C87
4,547,302 UART: [art] PUB.Y = 37405D9F4689734CAF4FBDBBEE28B0BCC675E61F42576E4AE3397162318DC5E21EF2F6DF76E64F1CD88BE87BF9A0DCC8
4,554,272 UART: [art] SIG.R = 089AABCEA550F66A46133BAAB99913A2ADCE8EAF57A150B890836B430EADEE15AEEFC72B3AD90D7D0D735779F083FD47
4,561,052 UART: [art] SIG.S = E6B8DC420DFAD40FA3E7FBBD63C921E9A707F5DDECCE582DFB3967EBBDDF3729867B95F36E7E9A83632537B4BE9960F1
4,584,986 UART: Caliptra RT
4,585,239 UART: [state] CFI Enabled
4,871,236 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,970 UART: [state] LifecycleState = Production
86,578 UART: [state] DebugLocked = Yes
87,258 UART: [state] Starting the WD Timer 40000000 cycles
88,975 UART: [kat] SHA2-256
892,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,654 UART: [kat] ++
896,806 UART: [kat] sha1
900,950 UART: [kat] SHA2-256
902,890 UART: [kat] SHA2-384
905,587 UART: [kat] SHA2-512-ACC
907,488 UART: [kat] ECC-384
917,193 UART: [kat] HMAC-384Kdf
921,763 UART: [kat] LMS
1,170,075 UART: [kat] --
1,171,000 UART: [cold-reset] ++
1,171,477 UART: [fht] FHT @ 0x50003400
1,174,271 UART: [idev] ++
1,174,439 UART: [idev] CDI.KEYID = 6
1,174,800 UART: [idev] SUBJECT.KEYID = 7
1,175,225 UART: [idev] UDS.KEYID = 0
1,175,571 ready_for_fw is high
1,175,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,311 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,596 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,290 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,160 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,866 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,008 UART: [ldev] --
1,282,524 UART: [fwproc] Wait for Commands...
1,283,143 UART: [fwproc] Recv command 0x46574c44
1,283,876 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,326 >>> mbox cmd response: success
2,800,546 UART: [afmc] ++
2,800,714 UART: [afmc] CDI.KEYID = 6
2,801,077 UART: [afmc] SUBJECT.KEYID = 7
2,801,503 UART: [afmc] AUTHORITY.KEYID = 5
2,836,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,531 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,250 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,143 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,850 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,695 UART: [afmc] --
2,879,700 UART: [cold-reset] --
2,880,558 UART: [state] Locking Datavault
2,881,633 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,237 UART: [state] Locking ICCM
2,882,713 UART: [exit] Launching FMC @ 0x40000130
2,888,042 UART:
2,888,058 UART: Running Caliptra FMC ...
2,888,466 UART:
2,888,609 UART: [state] CFI Enabled
2,899,530 UART: [fht] FMC Alias Private Key: 7
3,007,325 UART: [art] Extend RT PCRs Done
3,007,753 UART: [art] Lock RT PCRs Done
3,009,125 UART: [art] Populate DV Done
3,017,517 UART: [fht] FMC Alias Private Key: 7
3,018,645 UART: [art] Derive CDI
3,018,925 UART: [art] Store in in slot 0x4
3,104,624 UART: [art] Derive Key Pair
3,104,984 UART: [art] Store priv key in slot 0x5
3,118,466 UART: [art] Derive Key Pair - Done
3,133,438 UART: [art] Signing Cert with AUTHO
3,133,918 UART: RITY.KEYID = 7
3,148,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,639 UART: [art] PUB.X = B93D9F6DC6105D981D507624874E4BFB08C6AAF77ADFE42EB1884F75474CA10AA70B1334FF6D46179168B41550830293
3,156,397 UART: [art] PUB.Y = 9432C5F394E0C024568E827226C8E2E9243B74A89CD8C215E6EAC9722B86A0F160E96C403A19A576B0599C86ADEAF48B
3,163,349 UART: [art] SIG.R = 04986045D2D306D6B62D1C6A89A4D452EAFB6F6A92633ABEABDA3921C51308EA97A9B85841573F78D3D555F7B933A04E
3,170,116 UART: [art] SIG.S = 9A2434A6C641056C616C827328F90772283FFBB90E78467958C11520C6EA589315B4EFD24A2E550896DF6B0F8ED23AB7
3,193,556 UART: Caliptra RT
3,193,901 UART: [state] CFI Enabled
3,302,890 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,646 UART:
3,303,662 UART: Running Caliptra ROM ...
3,304,070 UART:
3,304,212 UART: [state] CFI Enabled
3,306,933 UART: [state] LifecycleState = Production
3,307,541 UART: [state] DebugLocked = Yes
3,308,291 UART: [state] Starting the WD Timer 40000000 cycles
3,309,886 UART: [kat] SHA2-256
4,113,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,565 UART: [kat] ++
4,117,717 UART: [kat] sha1
4,121,933 UART: [kat] SHA2-256
4,123,873 UART: [kat] SHA2-384
4,126,540 UART: [kat] SHA2-512-ACC
4,128,441 UART: [kat] ECC-384
4,137,876 UART: [kat] HMAC-384Kdf
4,142,594 UART: [kat] LMS
4,390,906 UART: [kat] --
4,392,008 UART: [warm-reset] ++
4,392,795 UART: [warm-reset] --
4,393,622 UART: [state] Locking Datavault
4,394,608 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,212 UART: [state] Locking ICCM
4,395,832 UART: [exit] Launching FMC @ 0x40000130
4,401,161 UART:
4,401,177 UART: Running Caliptra FMC ...
4,401,585 UART:
4,401,728 UART: [state] CFI Enabled
4,402,983 UART: [aliasrt :skip pcr extension
4,403,456 UART: [art] Extend RT PCRs Done
4,403,884 UART: [art] Lock RT PCRs Done
4,405,013 UART: [art] Populate DV Done
4,413,275 UART: [fht] FMC Alias Private Key: 7
4,414,427 UART: [art] Derive CDI
4,414,707 UART: [art] Store in in slot 0x4
4,500,284 UART: [art] Derive Key Pair
4,500,644 UART: [art] Store priv key in slot 0x5
4,513,710 UART: [art] Derive Key Pair - Done
4,528,324 UART: [art] Signing Cert with AUTHO
4,528,804 UART: RITY.KEYID = 7
4,544,188 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,953 UART: [art] PUB.X = B93D9F6DC6105D981D507624874E4BFB08C6AAF77ADFE42EB1884F75474CA10AA70B1334FF6D46179168B41550830293
4,551,711 UART: [art] PUB.Y = 9432C5F394E0C024568E827226C8E2E9243B74A89CD8C215E6EAC9722B86A0F160E96C403A19A576B0599C86ADEAF48B
4,558,663 UART: [art] SIG.R = 04986045D2D306D6B62D1C6A89A4D452EAFB6F6A92633ABEABDA3921C51308EA97A9B85841573F78D3D555F7B933A04E
4,565,430 UART: [art] SIG.S = 9A2434A6C641056C616C827328F90772283FFBB90E78467958C11520C6EA589315B4EFD24A2E550896DF6B0F8ED23AB7
4,588,936 UART: Caliptra RT
4,589,281 UART: [state] CFI Enabled
4,872,362 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Production
86,182 UART: [state] DebugLocked = Yes
86,840 UART: [state] Starting the WD Timer 40000000 cycles
88,365 UART: [kat] SHA2-256
891,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,044 UART: [kat] ++
896,196 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,997 UART: [kat] HMAC-384Kdf
921,529 UART: [kat] LMS
1,169,841 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,189 UART: [fht] FHT @ 0x50003400
1,173,811 UART: [idev] ++
1,173,979 UART: [idev] CDI.KEYID = 6
1,174,340 UART: [idev] SUBJECT.KEYID = 7
1,174,765 UART: [idev] UDS.KEYID = 0
1,175,111 ready_for_fw is high
1,175,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,235 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,210,077 UART: [ldev] ++
1,210,245 UART: [ldev] CDI.KEYID = 6
1,210,609 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,000 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,870 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,576 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,708 UART: [ldev] --
1,283,152 UART: [fwproc] Wait for Commands...
1,283,773 UART: [fwproc] Recv command 0x46574c44
1,284,506 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,444 >>> mbox cmd response: success
2,799,488 UART: [afmc] ++
2,799,656 UART: [afmc] CDI.KEYID = 6
2,800,019 UART: [afmc] SUBJECT.KEYID = 7
2,800,445 UART: [afmc] AUTHORITY.KEYID = 5
2,835,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,861 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,580 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,473 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,180 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,169 UART: [afmc] --
2,879,052 UART: [cold-reset] --
2,880,072 UART: [state] Locking Datavault
2,881,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,737 UART: [state] Locking ICCM
2,882,311 UART: [exit] Launching FMC @ 0x40000130
2,887,640 UART:
2,887,656 UART: Running Caliptra FMC ...
2,888,064 UART:
2,888,207 UART: [state] CFI Enabled
2,898,742 UART: [fht] FMC Alias Private Key: 7
3,006,681 UART: [art] Extend RT PCRs Done
3,007,109 UART: [art] Lock RT PCRs Done
3,008,705 UART: [art] Populate DV Done
3,016,823 UART: [fht] FMC Alias Private Key: 7
3,017,779 UART: [art] Derive CDI
3,018,059 UART: [art] Store in in slot 0x4
3,103,966 UART: [art] Derive Key Pair
3,104,326 UART: [art] Store priv key in slot 0x5
3,117,898 UART: [art] Derive Key Pair - Done
3,132,634 UART: [art] Signing Cert with AUTHO
3,133,114 UART: RITY.KEYID = 7
3,148,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,387 UART: [art] PUB.X = C32CB5C09BEF2ABB6EBB832C7F8FD68901DEE4D8198D3E9E73E4A005A4CA46E9D27D683AAFC5154226242BCD39F2BD9F
3,156,175 UART: [art] PUB.Y = EEC993CDB7055D00FE5ABD62B5A00779DD0B9C03D0EDF35CC4FDB450029FBB38FD98CD1348056BBC2B850205AD83D456
3,163,099 UART: [art] SIG.R = FE93A87F470F6B7C05696DAE071DA2C9AA767B1C9C7EA468C244A7B3D0C12DE2EE8CE643938CACEB166519DE9CFFDD91
3,169,884 UART: [art] SIG.S = DCCADC7D9840ABF0FC8C7412F563B3C8A981A2357296349F8BCF460B956D027158754EC6DB75156487B1AC245E03C07E
3,193,736 UART: Caliptra RT
3,194,081 UART: [state] CFI Enabled
3,301,604 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,360 UART:
3,302,376 UART: Running Caliptra ROM ...
3,302,784 UART:
3,302,926 UART: [state] CFI Enabled
3,305,397 UART: [state] LifecycleState = Production
3,306,005 UART: [state] DebugLocked = Yes
3,306,593 UART: [state] Starting the WD Timer 40000000 cycles
3,308,198 UART: [kat] SHA2-256
4,111,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,877 UART: [kat] ++
4,116,029 UART: [kat] sha1
4,120,237 UART: [kat] SHA2-256
4,122,177 UART: [kat] SHA2-384
4,124,878 UART: [kat] SHA2-512-ACC
4,126,779 UART: [kat] ECC-384
4,136,480 UART: [kat] HMAC-384Kdf
4,141,130 UART: [kat] LMS
4,389,442 UART: [kat] --
4,390,266 UART: [warm-reset] ++
4,391,321 UART: [warm-reset] --
4,392,192 UART: [state] Locking Datavault
4,392,948 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,552 UART: [state] Locking ICCM
4,394,080 UART: [exit] Launching FMC @ 0x40000130
4,399,409 UART:
4,399,425 UART: Running Caliptra FMC ...
4,399,833 UART:
4,399,976 UART: [state] CFI Enabled
4,401,249 UART: [aliasrt :skip pcr extension
4,401,722 UART: [art] Extend RT PCRs Done
4,402,150 UART: [art] Lock RT PCRs Done
4,403,545 UART: [art] Populate DV Done
4,411,575 UART: [fht] FMC Alias Private Key: 7
4,412,721 UART: [art] Derive CDI
4,413,001 UART: [art] Store in in slot 0x4
4,498,676 UART: [art] Derive Key Pair
4,499,036 UART: [art] Store priv key in slot 0x5
4,511,922 UART: [art] Derive Key Pair - Done
4,526,556 UART: [art] Signing Cert with AUTHO
4,527,036 UART: RITY.KEYID = 7
4,542,296 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,061 UART: [art] PUB.X = C32CB5C09BEF2ABB6EBB832C7F8FD68901DEE4D8198D3E9E73E4A005A4CA46E9D27D683AAFC5154226242BCD39F2BD9F
4,549,849 UART: [art] PUB.Y = EEC993CDB7055D00FE5ABD62B5A00779DD0B9C03D0EDF35CC4FDB450029FBB38FD98CD1348056BBC2B850205AD83D456
4,556,773 UART: [art] SIG.R = FE93A87F470F6B7C05696DAE071DA2C9AA767B1C9C7EA468C244A7B3D0C12DE2EE8CE643938CACEB166519DE9CFFDD91
4,563,558 UART: [art] SIG.S = DCCADC7D9840ABF0FC8C7412F563B3C8A981A2357296349F8BCF460B956D027158754EC6DB75156487B1AC245E03C07E
4,586,718 UART: Caliptra RT
4,587,063 UART: [state] CFI Enabled
4,867,330 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,542 UART:
191,906 UART: Running Caliptra ROM ...
193,028 UART:
193,180 UART: [state] CFI Enabled
264,526 UART: [state] LifecycleState = Production
267,007 UART: [state] DebugLocked = Yes
269,373 UART: [state] Starting the WD Timer 40000000 cycles
275,039 UART: [kat] SHA2-256
456,978 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,516 UART: [kat] ++
469,037 UART: [kat] sha1
480,078 UART: [kat] SHA2-256
483,082 UART: [kat] SHA2-384
488,148 UART: [kat] SHA2-512-ACC
490,799 UART: [kat] ECC-384
3,775,356 UART: [kat] HMAC-384Kdf
3,801,760 UART: [kat] LMS
4,874,978 UART: [kat] --
4,879,826 UART: [cold-reset] ++
4,881,335 UART: [fht] FHT @ 0x50003400
4,894,018 UART: [idev] ++
4,894,754 UART: [idev] CDI.KEYID = 6
4,895,929 UART: [idev] SUBJECT.KEYID = 7
4,897,034 UART: [idev] UDS.KEYID = 0
4,897,968 ready_for_fw is high
4,898,167 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,997,574 UART: [idev] Erasing UDS.KEYID = 0
8,245,088 UART: [idev] Sha1 KeyId Algorithm
8,265,631 UART: [idev] --
8,269,311 UART: [ldev] ++
8,269,917 UART: [ldev] CDI.KEYID = 6
8,271,158 UART: [ldev] SUBJECT.KEYID = 5
8,272,267 UART: [ldev] AUTHORITY.KEYID = 7
8,273,498 UART: [ldev] FE.KEYID = 1
8,316,928 UART: [ldev] Erasing FE.KEYID = 1
11,649,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,010 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,980,355 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,996,292 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,012,456 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,033,683 UART: [ldev] --
14,037,991 UART: [fwproc] Wait for Commands...
14,040,137 UART: [fwproc] Recv command 0x46574c44
14,042,391 UART: [fwproc] Recv'd Img size: 78740 bytes
17,707,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,779,852 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,848,622 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,042,663 >>> mbox cmd response: success
18,045,944 UART: [afmc] ++
18,046,672 UART: [afmc] CDI.KEYID = 6
18,047,564 UART: [afmc] SUBJECT.KEYID = 7
18,048,732 UART: [afmc] AUTHORITY.KEYID = 5
21,412,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,712,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,715,145 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,731,099 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,747,251 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,763,278 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,787,308 UART: [afmc] --
23,791,753 UART: [cold-reset] --
23,796,818 UART: [state] Locking Datavault
23,802,611 UART: [state] Locking PCR0, PCR1 and PCR31
23,804,308 UART: [state] Locking ICCM
23,807,247 UART: [exit] Launching FMC @ 0x40000130
23,815,964 UART:
23,816,196 UART: Running Caliptra FMC ...
23,817,234 UART:
23,817,383 UART: [state] CFI Enabled
23,873,962 UART: [fht] FMC Alias Private Key: 7
26,211,864 UART: [art] Extend RT PCRs Done
26,213,078 UART: [art] Lock RT PCRs Done
26,214,624 UART: [art] Populate DV Done
26,219,927 UART: [fht] FMC Alias Private Key: 7
26,221,410 UART: [art] Derive CDI
26,222,144 UART: [art] Store in in slot 0x4
26,283,186 UART: [art] Derive Key Pair
26,284,228 UART: [art] Store priv key in slot 0x5
29,576,692 UART: [art] Derive Key Pair - Done
29,589,259 UART: [art] Signing Cert with AUTHO
29,590,557 UART: RITY.KEYID = 7
31,878,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,880,486 UART: [art] PUB.X = 6D36CF114EDAF88CC082327AFF6AEA3D88642356D6E69D76504900A7F7C1E1901FBE63EE5077E77C1C1463FC654BC12F
31,887,739 UART: [art] PUB.Y = EFEF2B635B194067547A24504DF50AD7DE8B32F43272664821D90A9F75763CD2FF22EC2176D682461AF9190E5EA4B74C
31,894,978 UART: [art] SIG.R = F3A3DD0D323B147ECF0BA3D9CD58082CF8AA1C0028E2EC1CBC72F81D006F2B0E654687773EC171448E378213287622D0
31,902,327 UART: [art] SIG.S = 07F43F7068FCACA4A1B9C264C092EB1800122E009CAF433A1C7D3D63A6EDBC116E13189C9AD5853D56B5B1D8EC846152
33,207,181 UART: mbox::rt_entry...
33,208,153 UART: ____ _ _ _ ____ _____
33,210,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,212,098 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,214,031 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,215,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,217,886 UART: |_|
33,218,716 UART:
33,332,186 UART: [rt] Runtime listening for mailbox commands...
33,334,212 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,335,005 >>> mbox cmd response data (0 bytes)
Initializing fuses
988 UART:
1,232 UART: Running Caliptra ROM ...
2,287 UART:
2,435 UART: [state] CFI Enabled
78,621 UART: [state] LifecycleState = Production
80,386 UART: [state] DebugLocked = Yes
82,667 UART: [state] Starting the WD Timer 40000000 cycles
88,384 UART: [kat] SHA2-256
270,333 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
281,834 UART: [kat] ++
282,416 UART: [kat] sha1
293,675 UART: [kat] SHA2-256
296,679 UART: [kat] SHA2-384
302,555 UART: [kat] SHA2-512-ACC
305,176 UART: [kat] ECC-384
3,587,113 UART: [kat] HMAC-384Kdf
3,614,267 UART: [kat] LMS
4,687,427 UART: [kat] --
4,692,347 UART: [warm-reset] ++
4,697,558 UART: [warm-reset] --
4,701,393 UART: [state] Locking Datavault
4,706,229 UART: [state] Locking PCR0, PCR1 and PCR31
4,708,438 UART: [state] Locking ICCM
4,710,212 UART: [exit] Launching FMC @ 0x40000130
4,718,841 UART:
4,719,074 UART: Running Caliptra FMC ...
4,720,179 UART:
4,720,340 UART: [state] CFI Enabled
4,779,242 UART: [aliasrt :skip pcr extension
4,780,536 UART: [art] Extend RT PCRs Done
4,781,684 UART: [art] Lock RT PCRs Done
4,782,751 UART: [art] Populate DV Done
4,788,373 UART: [fht] FMC Alias Private Key: 7
4,790,125 UART: [art] Derive CDI
4,790,934 UART: [art] Store in in slot 0x4
4,847,754 UART: [art] Derive Key Pair
4,848,785 UART: [art] Store priv key in slot 0x5
8,141,292 UART: [art] Derive Key Pair - Done
8,154,296 UART: [art] Signing Cert with AUTHO
8,155,604 UART: RITY.KEYID = 7
10,442,433 UART: [art] Erasing AUTHORITY.KEYID = 7
10,443,936 UART: [art] PUB.X = 6D36CF114EDAF88CC082327AFF6AEA3D88642356D6E69D76504900A7F7C1E1901FBE63EE5077E77C1C1463FC654BC12F
10,451,388 UART: [art] PUB.Y = EFEF2B635B194067547A24504DF50AD7DE8B32F43272664821D90A9F75763CD2FF22EC2176D682461AF9190E5EA4B74C
10,458,438 UART: [art] SIG.R = F3A3DD0D323B147ECF0BA3D9CD58082CF8AA1C0028E2EC1CBC72F81D006F2B0E654687773EC171448E378213287622D0
10,465,792 UART: [art] SIG.S = 07F43F7068FCACA4A1B9C264C092EB1800122E009CAF433A1C7D3D63A6EDBC116E13189C9AD5853D56B5B1D8EC846152
11,771,371 UART: mbox::rt_entry...
11,772,336 UART: ____ _ _ _ ____ _____
11,774,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,776,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,778,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,780,210 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,782,061 UART: |_|
11,782,888 UART:
15,350,743 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,355,166 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
192,419 UART:
192,790 UART: Running Caliptra ROM ...
193,963 UART:
194,120 UART: [state] CFI Enabled
260,919 UART: [state] LifecycleState = Production
263,145 UART: [state] DebugLocked = Yes
265,712 UART: [state] Starting the WD Timer 40000000 cycles
270,453 UART: [kat] SHA2-256
452,376 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,933 UART: [kat] ++
464,536 UART: [kat] sha1
473,891 UART: [kat] SHA2-256
476,907 UART: [kat] SHA2-384
482,574 UART: [kat] SHA2-512-ACC
485,221 UART: [kat] ECC-384
3,777,866 UART: [kat] HMAC-384Kdf
3,804,394 UART: [kat] LMS
4,877,540 UART: [kat] --
4,883,203 UART: [cold-reset] ++
4,885,312 UART: [fht] FHT @ 0x50003400
4,896,796 UART: [idev] ++
4,897,511 UART: [idev] CDI.KEYID = 6
4,898,688 UART: [idev] SUBJECT.KEYID = 7
4,899,860 UART: [idev] UDS.KEYID = 0
4,900,790 ready_for_fw is high
4,900,982 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,000,131 UART: [idev] Erasing UDS.KEYID = 0
8,244,971 UART: [idev] Sha1 KeyId Algorithm
8,266,704 UART: [idev] --
8,269,509 UART: [ldev] ++
8,270,076 UART: [ldev] CDI.KEYID = 6
8,271,310 UART: [ldev] SUBJECT.KEYID = 5
8,272,430 UART: [ldev] AUTHORITY.KEYID = 7
8,273,661 UART: [ldev] FE.KEYID = 1
8,319,309 UART: [ldev] Erasing FE.KEYID = 1
11,650,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,322 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,960,634 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,976,611 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,992,726 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,013,749 UART: [ldev] --
14,017,781 UART: [fwproc] Wait for Commands...
14,019,776 UART: [fwproc] Recv command 0x46574c44
14,022,086 UART: [fwproc] Recv'd Img size: 78740 bytes
17,688,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,766,862 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,835,601 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,028,417 >>> mbox cmd response: success
18,033,082 UART: [afmc] ++
18,033,704 UART: [afmc] CDI.KEYID = 6
18,034,903 UART: [afmc] SUBJECT.KEYID = 7
18,036,025 UART: [afmc] AUTHORITY.KEYID = 5
21,392,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,693,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,696,006 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,711,971 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,728,076 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,744,120 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,765,465 UART: [afmc] --
23,769,467 UART: [cold-reset] --
23,774,798 UART: [state] Locking Datavault
23,779,130 UART: [state] Locking PCR0, PCR1 and PCR31
23,780,776 UART: [state] Locking ICCM
23,783,605 UART: [exit] Launching FMC @ 0x40000130
23,792,284 UART:
23,792,527 UART: Running Caliptra FMC ...
23,793,552 UART:
23,793,699 UART: [state] CFI Enabled
23,850,545 UART: [fht] FMC Alias Private Key: 7
26,188,376 UART: [art] Extend RT PCRs Done
26,189,593 UART: [art] Lock RT PCRs Done
26,191,388 UART: [art] Populate DV Done
26,196,803 UART: [fht] FMC Alias Private Key: 7
26,198,450 UART: [art] Derive CDI
26,199,263 UART: [art] Store in in slot 0x4
26,258,032 UART: [art] Derive Key Pair
26,259,076 UART: [art] Store priv key in slot 0x5
29,551,697 UART: [art] Derive Key Pair - Done
29,564,961 UART: [art] Signing Cert with AUTHO
29,566,264 UART: RITY.KEYID = 7
31,853,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,854,625 UART: [art] PUB.X = 60E9F97E38229686E953E1935C9722F8C29C0C28089D8484172D08F251E0B7FE9CECB483D997CE4F30C162C4F5F7F568
31,861,840 UART: [art] PUB.Y = E609541ED2A0D95BAD7BCC0954E2533CAB323DE615FC8DC84E33789AC52F4DFF1109EB0876F4C12C3A6CA2FEE5AAFA1C
31,869,152 UART: [art] SIG.R = 00A54FF6DAED085185A61F79239228E1F55C286A8DD55F5B847D0C09D395BB42B06AC04D00AFC4898E53B23511768406
31,876,502 UART: [art] SIG.S = 2F888B554F9D74CDB0F6158BD58F841817E8375D16A4A72ABF88B329F9D63B5B08417E7218B9C71AAFEBF7A1167DEDBC
33,181,511 UART: mbox::rt_entry...
33,182,464 UART: ____ _ _ _ ____ _____
33,184,388 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,186,409 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,188,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,190,272 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,192,198 UART: |_|
33,193,008 UART:
33,305,831 UART: [rt] Runtime listening for mailbox commands...
33,307,842 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,308,641 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,006 UART:
1,271 UART: Running Caliptra ROM ...
2,382 UART:
2,535 UART: [state] CFI Enabled
59,025 UART: [state] LifecycleState = Production
60,787 UART: [state] DebugLocked = Yes
63,177 UART: [state] Starting the WD Timer 40000000 cycles
68,464 UART: [kat] SHA2-256
250,469 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
261,987 UART: [kat] ++
262,489 UART: [kat] sha1
273,258 UART: [kat] SHA2-256
276,318 UART: [kat] SHA2-384
282,071 UART: [kat] SHA2-512-ACC
284,688 UART: [kat] ECC-384
3,570,533 UART: [kat] HMAC-384Kdf
3,596,570 UART: [kat] LMS
4,669,715 UART: [kat] --
4,673,139 UART: [warm-reset] ++
4,677,892 UART: [warm-reset] --
4,681,335 UART: [state] Locking Datavault
4,684,656 UART: [state] Locking PCR0, PCR1 and PCR31
4,686,806 UART: [state] Locking ICCM
4,688,588 UART: [exit] Launching FMC @ 0x40000130
4,697,217 UART:
4,697,524 UART: Running Caliptra FMC ...
4,698,587 UART:
4,698,745 UART: [state] CFI Enabled
4,762,476 UART: [aliasrt :skip pcr extension
4,763,731 UART: [art] Extend RT PCRs Done
4,764,872 UART: [art] Lock RT PCRs Done
4,766,068 UART: [art] Populate DV Done
4,771,730 UART: [fht] FMC Alias Private Key: 7
4,773,207 UART: [art] Derive CDI
4,774,136 UART: [art] Store in in slot 0x4
4,830,939 UART: [art] Derive Key Pair
4,831,950 UART: [art] Store priv key in slot 0x5
8,124,730 UART: [art] Derive Key Pair - Done
8,137,680 UART: [art] Signing Cert with AUTHO
8,139,020 UART: RITY.KEYID = 7
10,426,631 UART: [art] Erasing AUTHORITY.KEYID = 7
10,428,140 UART: [art] PUB.X = 60E9F97E38229686E953E1935C9722F8C29C0C28089D8484172D08F251E0B7FE9CECB483D997CE4F30C162C4F5F7F568
10,435,380 UART: [art] PUB.Y = E609541ED2A0D95BAD7BCC0954E2533CAB323DE615FC8DC84E33789AC52F4DFF1109EB0876F4C12C3A6CA2FEE5AAFA1C
10,442,634 UART: [art] SIG.R = 00A54FF6DAED085185A61F79239228E1F55C286A8DD55F5B847D0C09D395BB42B06AC04D00AFC4898E53B23511768406
10,450,015 UART: [art] SIG.S = 2F888B554F9D74CDB0F6158BD58F841817E8375D16A4A72ABF88B329F9D63B5B08417E7218B9C71AAFEBF7A1167DEDBC
11,754,987 UART: mbox::rt_entry...
11,755,950 UART: ____ _ _ _ ____ _____
11,757,958 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,759,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,761,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,763,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,765,718 UART: |_|
11,766,547 UART:
15,335,061 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,339,495 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
191,764 UART:
192,323 UART: Running Caliptra ROM ...
193,441 UART:
603,077 UART: [state] CFI Enabled
617,393 UART: [state] LifecycleState = Production
619,588 UART: [state] DebugLocked = Yes
621,791 UART: [state] Starting the WD Timer 40000000 cycles
627,635 UART: [kat] SHA2-256
809,666 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,209 UART: [kat] ++
821,744 UART: [kat] sha1
832,864 UART: [kat] SHA2-256
835,865 UART: [kat] SHA2-384
840,713 UART: [kat] SHA2-512-ACC
843,286 UART: [kat] ECC-384
4,099,865 UART: [kat] HMAC-384Kdf
4,112,971 UART: [kat] LMS
5,186,161 UART: [kat] --
5,191,654 UART: [cold-reset] ++
5,193,582 UART: [fht] FHT @ 0x50003400
5,205,049 UART: [idev] ++
5,205,681 UART: [idev] CDI.KEYID = 6
5,206,917 UART: [idev] SUBJECT.KEYID = 7
5,208,387 UART: [idev] UDS.KEYID = 0
5,209,577 ready_for_fw is high
5,209,790 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,308,946 UART: [idev] Erasing UDS.KEYID = 0
8,503,737 UART: [idev] Sha1 KeyId Algorithm
8,525,645 UART: [idev] --
8,528,451 UART: [ldev] ++
8,529,017 UART: [ldev] CDI.KEYID = 6
8,530,248 UART: [ldev] SUBJECT.KEYID = 5
8,531,346 UART: [ldev] AUTHORITY.KEYID = 7
8,532,574 UART: [ldev] FE.KEYID = 1
8,543,163 UART: [ldev] Erasing FE.KEYID = 1
11,836,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,129,351 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,145,657 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,161,692 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,177,831 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,199,460 UART: [ldev] --
14,204,030 UART: [fwproc] Wait for Commands...
14,205,530 UART: [fwproc] Recv command 0x46574c44
14,207,507 UART: [fwproc] Recv'd Img size: 78740 bytes
17,879,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,955,743 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,024,453 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,218,564 >>> mbox cmd response: success
18,221,820 UART: [afmc] ++
18,222,546 UART: [afmc] CDI.KEYID = 6
18,223,462 UART: [afmc] SUBJECT.KEYID = 7
18,224,621 UART: [afmc] AUTHORITY.KEYID = 5
21,540,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,837,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,839,313 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,855,286 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,871,397 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,887,456 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,910,740 UART: [afmc] --
23,914,974 UART: [cold-reset] --
23,918,891 UART: [state] Locking Datavault
23,927,053 UART: [state] Locking PCR0, PCR1 and PCR31
23,928,703 UART: [state] Locking ICCM
23,931,122 UART: [exit] Launching FMC @ 0x40000130
23,939,787 UART:
23,940,061 UART: Running Caliptra FMC ...
23,941,169 UART:
23,941,342 UART: [state] CFI Enabled
23,949,710 UART: [fht] FMC Alias Private Key: 7
26,281,001 UART: [art] Extend RT PCRs Done
26,282,227 UART: [art] Lock RT PCRs Done
26,283,791 UART: [art] Populate DV Done
26,289,147 UART: [fht] FMC Alias Private Key: 7
26,290,784 UART: [art] Derive CDI
26,291,515 UART: [art] Store in in slot 0x4
26,334,098 UART: [art] Derive Key Pair
26,335,095 UART: [art] Store priv key in slot 0x5
29,576,859 UART: [art] Derive Key Pair - Done
29,589,582 UART: [art] Signing Cert with AUTHO
29,590,885 UART: RITY.KEYID = 7
31,870,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,872,104 UART: [art] PUB.X = E1CD8B8AD73F52A511ACC31029F569AE2271B719BECAE20A8F08902A771BD3C607FA8BA15AA80F320A3E0334EE4136C6
31,879,362 UART: [art] PUB.Y = 04AB191B676F8F9444E90702C479770B03EB73A2E6D983E1DC73D82F61F9B24389DD94883E2D942ED34E50B440A3E607
31,886,603 UART: [art] SIG.R = 905973351CF262DC56BD96130FC2E12F1C0CBD35A2C66B10F07692D5DE9EB0EDC55AB60162A61705F02C616411D25E71
31,893,952 UART: [art] SIG.S = D6D9E7E08B8612D73C26F277BE3A9DFD4ED3AF95AE6168B360689FEA62B2CFF18B91F8F1F79FE5E85A23B5B87C9742F5
33,199,526 UART: mbox::rt_entry...
33,200,491 UART: ____ _ _ _ ____ _____
33,202,430 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,204,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,206,285 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,208,201 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,210,251 UART: |_|
33,211,057 UART:
33,323,774 UART: [rt] Runtime listening for mailbox commands...
33,325,791 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,326,571 >>> mbox cmd response data (0 bytes)
Initializing fuses
991 UART:
1,249 UART: Running Caliptra ROM ...
2,266 UART:
7,202,140 UART: [state] CFI Enabled
7,214,020 UART: [state] LifecycleState = Production
7,215,776 UART: [state] DebugLocked = Yes
7,217,053 UART: [state] Starting the WD Timer 40000000 cycles
7,221,904 UART: [kat] SHA2-256
7,403,914 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,415,413 UART: [kat] ++
7,416,015 UART: [kat] sha1
7,426,371 UART: [kat] SHA2-256
7,429,436 UART: [kat] SHA2-384
7,435,092 UART: [kat] SHA2-512-ACC
7,437,718 UART: [kat] ECC-384
10,691,557 UART: [kat] HMAC-384Kdf
10,703,151 UART: [kat] LMS
11,776,317 UART: [kat] --
11,780,221 UART: [warm-reset] ++
11,784,478 UART: [warm-reset] --
11,788,505 UART: [state] Locking Datavault
11,793,221 UART: [state] Locking PCR0, PCR1 and PCR31
11,795,439 UART: [state] Locking ICCM
11,798,298 UART: [exit] Launching FMC @ 0x40000130
11,806,937 UART:
11,807,169 UART: Running Caliptra FMC ...
11,808,195 UART:
11,808,335 UART: [state] CFI Enabled
11,810,487 UART: [aliasrt :skip pcr extension
11,811,935 UART: [art] Extend RT PCRs Done
11,813,002 UART: [art] Lock RT PCRs Done
11,814,307 UART: [art] Populate DV Done
11,819,666 UART: [fht] FMC Alias Private Key: 7
11,821,312 UART: [art] Derive CDI
11,822,042 UART: [art] Store in in slot 0x4
11,864,558 UART: [art] Derive Key Pair
11,865,571 UART: [art] Store priv key in slot 0x5
15,107,498 UART: [art] Derive Key Pair - Done
15,120,190 UART: [art] Signing Cert with AUTHO
15,121,491 UART: RITY.KEYID = 7
17,400,926 UART: [art] Erasing AUTHORITY.KEYID = 7
17,402,431 UART: [art] PUB.X = E1CD8B8AD73F52A511ACC31029F569AE2271B719BECAE20A8F08902A771BD3C607FA8BA15AA80F320A3E0334EE4136C6
17,409,695 UART: [art] PUB.Y = 04AB191B676F8F9444E90702C479770B03EB73A2E6D983E1DC73D82F61F9B24389DD94883E2D942ED34E50B440A3E607
17,416,937 UART: [art] SIG.R = 905973351CF262DC56BD96130FC2E12F1C0CBD35A2C66B10F07692D5DE9EB0EDC55AB60162A61705F02C616411D25E71
17,424,276 UART: [art] SIG.S = D6D9E7E08B8612D73C26F277BE3A9DFD4ED3AF95AE6168B360689FEA62B2CFF18B91F8F1F79FE5E85A23B5B87C9742F5
18,729,303 UART: mbox::rt_entry...
18,730,262 UART: ____ _ _ _ ____ _____
18,732,189 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,734,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,736,115 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,738,035 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,739,960 UART: |_|
18,740,757 UART:
22,268,041 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,272,488 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
191,714 UART:
192,072 UART: Running Caliptra ROM ...
193,255 UART:
602,875 UART: [state] CFI Enabled
617,355 UART: [state] LifecycleState = Production
619,542 UART: [state] DebugLocked = Yes
621,388 UART: [state] Starting the WD Timer 40000000 cycles
626,351 UART: [kat] SHA2-256
808,314 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,875 UART: [kat] ++
820,513 UART: [kat] sha1
832,206 UART: [kat] SHA2-256
835,281 UART: [kat] SHA2-384
841,417 UART: [kat] SHA2-512-ACC
844,063 UART: [kat] ECC-384
4,101,018 UART: [kat] HMAC-384Kdf
4,113,888 UART: [kat] LMS
5,187,074 UART: [kat] --
5,191,067 UART: [cold-reset] ++
5,192,509 UART: [fht] FHT @ 0x50003400
5,205,024 UART: [idev] ++
5,205,703 UART: [idev] CDI.KEYID = 6
5,206,952 UART: [idev] SUBJECT.KEYID = 7
5,208,335 UART: [idev] UDS.KEYID = 0
5,209,591 ready_for_fw is high
5,209,807 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,308,835 UART: [idev] Erasing UDS.KEYID = 0
8,500,360 UART: [idev] Sha1 KeyId Algorithm
8,522,487 UART: [idev] --
8,526,968 UART: [ldev] ++
8,527,531 UART: [ldev] CDI.KEYID = 6
8,528,762 UART: [ldev] SUBJECT.KEYID = 5
8,529,926 UART: [ldev] AUTHORITY.KEYID = 7
8,531,070 UART: [ldev] FE.KEYID = 1
8,541,409 UART: [ldev] Erasing FE.KEYID = 1
11,833,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,256 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,144,591 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,160,599 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,176,712 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,197,263 UART: [ldev] --
14,201,233 UART: [fwproc] Wait for Commands...
14,203,218 UART: [fwproc] Recv command 0x46574c44
14,205,468 UART: [fwproc] Recv'd Img size: 78740 bytes
17,870,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,945,194 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,013,943 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,207,149 >>> mbox cmd response: success
18,212,130 UART: [afmc] ++
18,212,781 UART: [afmc] CDI.KEYID = 6
18,213,919 UART: [afmc] SUBJECT.KEYID = 7
18,215,074 UART: [afmc] AUTHORITY.KEYID = 5
21,532,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,825,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,827,578 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,843,604 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,859,697 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,875,763 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,898,689 UART: [afmc] --
23,902,813 UART: [cold-reset] --
23,906,682 UART: [state] Locking Datavault
23,913,072 UART: [state] Locking PCR0, PCR1 and PCR31
23,914,712 UART: [state] Locking ICCM
23,916,484 UART: [exit] Launching FMC @ 0x40000130
23,925,201 UART:
23,925,452 UART: Running Caliptra FMC ...
23,926,555 UART:
23,926,717 UART: [state] CFI Enabled
23,934,997 UART: [fht] FMC Alias Private Key: 7
26,265,078 UART: [art] Extend RT PCRs Done
26,266,304 UART: [art] Lock RT PCRs Done
26,267,524 UART: [art] Populate DV Done
26,273,152 UART: [fht] FMC Alias Private Key: 7
26,274,634 UART: [art] Derive CDI
26,275,394 UART: [art] Store in in slot 0x4
26,318,256 UART: [art] Derive Key Pair
26,319,287 UART: [art] Store priv key in slot 0x5
29,561,632 UART: [art] Derive Key Pair - Done
29,574,395 UART: [art] Signing Cert with AUTHO
29,575,696 UART: RITY.KEYID = 7
31,855,228 UART: [art] Erasing AUTHORITY.KEYID = 7
31,856,732 UART: [art] PUB.X = ED22023E96E31330584590C5D92EEF60B88EE5676A37A9F9268DD1DA2AC5C98B9785C5A2200DF83C9454E416FC470FDC
31,863,981 UART: [art] PUB.Y = 2F5937C4E8910F7C126E10D1DEFB2C74479A77EB0616E8F3DE503446C8A3D1FF0AD231F9EB29990A9270A3C6D1518E1A
31,871,264 UART: [art] SIG.R = 82270E43ADC7F7E3D166F6F51B517B4066EE6226B6C37BCF431996B659D1D934E7560348E667E25EA2592453834BCE35
31,878,620 UART: [art] SIG.S = 65F7A2EC6207F12157E47625D0909A1EA437790152ACCB2A1EFBABFF2BC6FC0A66E3E578F11B12779A72C89AE705B18C
33,182,783 UART: mbox::rt_entry...
33,183,752 UART: ____ _ _ _ ____ _____
33,185,729 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,187,728 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,189,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,191,571 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,193,494 UART: |_|
33,194,298 UART:
33,306,787 UART: [rt] Runtime listening for mailbox commands...
33,308,809 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,309,598 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,002 UART:
1,260 UART: Running Caliptra ROM ...
2,362 UART:
7,229,292 UART: [state] CFI Enabled
7,244,896 UART: [state] LifecycleState = Production
7,246,645 UART: [state] DebugLocked = Yes
7,249,297 UART: [state] Starting the WD Timer 40000000 cycles
7,255,195 UART: [kat] SHA2-256
7,437,188 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,448,723 UART: [kat] ++
7,449,319 UART: [kat] sha1
7,459,991 UART: [kat] SHA2-256
7,463,064 UART: [kat] SHA2-384
7,468,724 UART: [kat] SHA2-512-ACC
7,471,346 UART: [kat] ECC-384
10,728,712 UART: [kat] HMAC-384Kdf
10,740,910 UART: [kat] LMS
11,814,059 UART: [kat] --
11,819,698 UART: [warm-reset] ++
11,824,255 UART: [warm-reset] --
11,830,068 UART: [state] Locking Datavault
11,833,276 UART: [state] Locking PCR0, PCR1 and PCR31
11,835,430 UART: [state] Locking ICCM
11,838,282 UART: [exit] Launching FMC @ 0x40000130
11,846,922 UART:
11,847,153 UART: Running Caliptra FMC ...
11,848,251 UART:
11,848,402 UART: [state] CFI Enabled
11,850,231 UART: [aliasrt :skip pcr extension
11,851,469 UART: [art] Extend RT PCRs Done
11,852,599 UART: [art] Lock RT PCRs Done
11,853,658 UART: [art] Populate DV Done
11,858,947 UART: [fht] FMC Alias Private Key: 7
11,860,644 UART: [art] Derive CDI
11,861,452 UART: [art] Store in in slot 0x4
11,903,820 UART: [art] Derive Key Pair
11,904,866 UART: [art] Store priv key in slot 0x5
15,147,225 UART: [art] Derive Key Pair - Done
15,160,167 UART: [art] Signing Cert with AUTHO
15,161,472 UART: RITY.KEYID = 7
17,440,691 UART: [art] Erasing AUTHORITY.KEYID = 7
17,442,199 UART: [art] PUB.X = ED22023E96E31330584590C5D92EEF60B88EE5676A37A9F9268DD1DA2AC5C98B9785C5A2200DF83C9454E416FC470FDC
17,449,424 UART: [art] PUB.Y = 2F5937C4E8910F7C126E10D1DEFB2C74479A77EB0616E8F3DE503446C8A3D1FF0AD231F9EB29990A9270A3C6D1518E1A
17,456,693 UART: [art] SIG.R = 82270E43ADC7F7E3D166F6F51B517B4066EE6226B6C37BCF431996B659D1D934E7560348E667E25EA2592453834BCE35
17,464,046 UART: [art] SIG.S = 65F7A2EC6207F12157E47625D0909A1EA437790152ACCB2A1EFBABFF2BC6FC0A66E3E578F11B12779A72C89AE705B18C
18,769,569 UART: mbox::rt_entry...
18,770,509 UART: ____ _ _ _ ____ _____
18,772,428 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,774,426 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,776,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,778,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,780,094 UART: |_|
18,780,979 UART:
22,308,777 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,313,203 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
191,494 UART:
191,853 UART: Running Caliptra ROM ...
192,974 UART:
193,130 UART: [state] CFI Enabled
263,175 UART: [state] LifecycleState = Production
264,903 UART: [state] DebugLocked = Yes
266,180 UART: [state] Starting the WD Timer 40000000 cycles
270,916 UART: [kat] SHA2-256
450,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,651 UART: [kat] ++
462,100 UART: [kat] sha1
473,282 UART: [kat] SHA2-256
476,365 UART: [kat] SHA2-384
482,788 UART: [kat] SHA2-512-ACC
485,793 UART: [kat] ECC-384
2,949,941 UART: [kat] HMAC-384Kdf
2,973,887 UART: [kat] LMS
3,503,349 UART: [kat] --
3,509,680 UART: [cold-reset] ++
3,510,748 UART: [fht] FHT @ 0x50003400
3,521,601 UART: [idev] ++
3,522,160 UART: [idev] CDI.KEYID = 6
3,523,069 UART: [idev] SUBJECT.KEYID = 7
3,524,314 UART: [idev] UDS.KEYID = 0
3,525,237 ready_for_fw is high
3,525,436 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,624,534 UART: [idev] Erasing UDS.KEYID = 0
6,029,242 UART: [idev] Sha1 KeyId Algorithm
6,051,209 UART: [idev] --
6,054,261 UART: [ldev] ++
6,054,841 UART: [ldev] CDI.KEYID = 6
6,055,761 UART: [ldev] SUBJECT.KEYID = 5
6,056,847 UART: [ldev] AUTHORITY.KEYID = 7
6,058,184 UART: [ldev] FE.KEYID = 1
6,100,781 UART: [ldev] Erasing FE.KEYID = 1
8,603,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,537 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,337,569 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,353,387 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,369,333 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,389,851 UART: [ldev] --
10,393,929 UART: [fwproc] Wait for Commands...
10,395,966 UART: [fwproc] Recv command 0x46574c44
10,398,058 UART: [fwproc] Recv'd Img size: 78704 bytes
13,395,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,470,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,539,085 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,732,628 >>> mbox cmd response: success
13,736,522 UART: [afmc] ++
13,737,133 UART: [afmc] CDI.KEYID = 6
13,738,046 UART: [afmc] SUBJECT.KEYID = 7
13,739,211 UART: [afmc] AUTHORITY.KEYID = 5
16,274,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,001,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,002,867 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,018,849 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,034,716 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,050,459 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,074,219 UART: [afmc] --
18,078,710 UART: [cold-reset] --
18,082,570 UART: [state] Locking Datavault
18,089,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,091,148 UART: [state] Locking ICCM
18,093,301 UART: [exit] Launching FMC @ 0x40000130
18,101,755 UART:
18,101,990 UART: Running Caliptra FMC ...
18,103,092 UART:
18,103,255 UART: [state] CFI Enabled
18,156,496 UART: [fht] FMC Alias Private Key: 7
19,920,679 UART: [art] Extend RT PCRs Done
19,921,904 UART: [art] Lock RT PCRs Done
19,923,238 UART: [art] Populate DV Done
19,928,704 UART: [fht] FMC Alias Private Key: 7
19,930,455 UART: [art] Derive CDI
19,931,266 UART: [art] Store in in slot 0x4
19,989,009 UART: [art] Derive Key Pair
19,990,057 UART: [art] Store priv key in slot 0x5
22,452,730 UART: [art] Derive Key Pair - Done
22,465,613 UART: [art] Signing Cert with AUTHO
22,466,913 UART: RITY.KEYID = 7
24,178,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,179,709 UART: [art] PUB.X = C99F4CA82F2FD52AAC495C38F20FB56E2D84FB5851AFC26F988162A39543746D70A19A5230C68CC19F3106B4493D065E
24,186,953 UART: [art] PUB.Y = B851582AD98EAACBCEA568B3E458CE78E2A34DA69A95F2A151F44571B48C42C17BC606838068545905D3BC906FE9E90F
24,194,239 UART: [art] SIG.R = 1291B19479C79BE4E9C381D4DCCA6A88FDAD1A53BB30D0F3F1B8748A1510BD1B53D030F3D956CFDAA3630F8E79828CD3
24,201,649 UART: [art] SIG.S = 4D6FDE8B172B07E4A5A77F5A23D0AC4DEC04BD8832CED10937F126EF87DAC8697045E1170C86CB3CED5811DA3A9A8E56
25,179,824 UART: mbox::rt_entry...
25,180,789 UART: ____ _ _ _ ____ _____
25,182,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,184,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,186,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,188,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,190,434 UART: |_|
25,191,241 UART:
25,304,737 UART: [rt] Runtime listening for mailbox commands...
25,306,753 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,307,537 >>> mbox cmd response data (0 bytes)
Initializing fuses
976 UART:
1,227 UART: Running Caliptra ROM ...
2,252 UART:
2,411 UART: [state] CFI Enabled
64,012 UART: [state] LifecycleState = Production
65,726 UART: [state] DebugLocked = Yes
67,496 UART: [state] Starting the WD Timer 40000000 cycles
71,574 UART: [kat] SHA2-256
250,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,291 UART: [kat] ++
262,833 UART: [kat] sha1
274,745 UART: [kat] SHA2-256
277,754 UART: [kat] SHA2-384
284,761 UART: [kat] SHA2-512-ACC
287,747 UART: [kat] ECC-384
2,744,867 UART: [kat] HMAC-384Kdf
2,768,318 UART: [kat] LMS
3,297,827 UART: [kat] --
3,302,295 UART: [warm-reset] ++
3,308,453 UART: [warm-reset] --
3,312,057 UART: [state] Locking Datavault
3,315,584 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,230 UART: [state] Locking ICCM
3,319,979 UART: [exit] Launching FMC @ 0x40000130
3,328,439 UART:
3,328,683 UART: Running Caliptra FMC ...
3,329,794 UART:
3,329,956 UART: [state] CFI Enabled
3,378,638 UART: [aliasrt :skip pcr extension
3,379,922 UART: [art] Extend RT PCRs Done
3,381,065 UART: [art] Lock RT PCRs Done
3,382,354 UART: [art] Populate DV Done
3,388,037 UART: [fht] FMC Alias Private Key: 7
3,389,787 UART: [art] Derive CDI
3,390,527 UART: [art] Store in in slot 0x4
3,447,254 UART: [art] Derive Key Pair
3,448,272 UART: [art] Store priv key in slot 0x5
5,910,667 UART: [art] Derive Key Pair - Done
5,923,723 UART: [art] Signing Cert with AUTHO
5,925,031 UART: RITY.KEYID = 7
7,636,656 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,153 UART: [art] PUB.X = C99F4CA82F2FD52AAC495C38F20FB56E2D84FB5851AFC26F988162A39543746D70A19A5230C68CC19F3106B4493D065E
7,645,400 UART: [art] PUB.Y = B851582AD98EAACBCEA568B3E458CE78E2A34DA69A95F2A151F44571B48C42C17BC606838068545905D3BC906FE9E90F
7,652,694 UART: [art] SIG.R = 1291B19479C79BE4E9C381D4DCCA6A88FDAD1A53BB30D0F3F1B8748A1510BD1B53D030F3D956CFDAA3630F8E79828CD3
7,660,087 UART: [art] SIG.S = 4D6FDE8B172B07E4A5A77F5A23D0AC4DEC04BD8832CED10937F126EF87DAC8697045E1170C86CB3CED5811DA3A9A8E56
8,638,445 UART: mbox::rt_entry...
8,639,409 UART: ____ _ _ _ ____ _____
8,641,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,014 UART: |_|
8,649,905 UART:
11,390,783 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,395,231 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,491 UART:
191,860 UART: Running Caliptra ROM ...
192,993 UART:
193,140 UART: [state] CFI Enabled
264,162 UART: [state] LifecycleState = Production
265,892 UART: [state] DebugLocked = Yes
267,323 UART: [state] Starting the WD Timer 40000000 cycles
273,139 UART: [kat] SHA2-256
452,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,804 UART: [kat] ++
464,255 UART: [kat] sha1
476,289 UART: [kat] SHA2-256
479,295 UART: [kat] SHA2-384
485,141 UART: [kat] SHA2-512-ACC
488,084 UART: [kat] ECC-384
2,951,188 UART: [kat] HMAC-384Kdf
2,971,478 UART: [kat] LMS
3,500,929 UART: [kat] --
3,504,783 UART: [cold-reset] ++
3,506,364 UART: [fht] FHT @ 0x50003400
3,516,351 UART: [idev] ++
3,516,913 UART: [idev] CDI.KEYID = 6
3,517,821 UART: [idev] SUBJECT.KEYID = 7
3,519,012 UART: [idev] UDS.KEYID = 0
3,519,944 ready_for_fw is high
3,520,141 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,439 UART: [idev] Erasing UDS.KEYID = 0
6,029,761 UART: [idev] Sha1 KeyId Algorithm
6,051,678 UART: [idev] --
6,056,487 UART: [ldev] ++
6,057,062 UART: [ldev] CDI.KEYID = 6
6,057,979 UART: [ldev] SUBJECT.KEYID = 5
6,059,193 UART: [ldev] AUTHORITY.KEYID = 7
6,060,426 UART: [ldev] FE.KEYID = 1
6,100,306 UART: [ldev] Erasing FE.KEYID = 1
8,602,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,556 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,577 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,396 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,375 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,087 UART: [ldev] --
10,393,515 UART: [fwproc] Wait for Commands...
10,395,441 UART: [fwproc] Recv command 0x46574c44
10,397,531 UART: [fwproc] Recv'd Img size: 78704 bytes
13,397,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,473,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,541,824 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,734,747 >>> mbox cmd response: success
13,738,789 UART: [afmc] ++
13,739,405 UART: [afmc] CDI.KEYID = 6
13,740,321 UART: [afmc] SUBJECT.KEYID = 7
13,741,480 UART: [afmc] AUTHORITY.KEYID = 5
16,275,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,997,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,999,545 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,015,538 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,031,410 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,047,090 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,070,541 UART: [afmc] --
18,073,519 UART: [cold-reset] --
18,077,808 UART: [state] Locking Datavault
18,084,402 UART: [state] Locking PCR0, PCR1 and PCR31
18,086,048 UART: [state] Locking ICCM
18,087,450 UART: [exit] Launching FMC @ 0x40000130
18,095,889 UART:
18,096,161 UART: Running Caliptra FMC ...
18,097,266 UART:
18,097,430 UART: [state] CFI Enabled
18,156,547 UART: [fht] FMC Alias Private Key: 7
19,919,878 UART: [art] Extend RT PCRs Done
19,921,087 UART: [art] Lock RT PCRs Done
19,922,793 UART: [art] Populate DV Done
19,928,260 UART: [fht] FMC Alias Private Key: 7
19,929,859 UART: [art] Derive CDI
19,930,790 UART: [art] Store in in slot 0x4
19,989,151 UART: [art] Derive Key Pair
19,990,152 UART: [art] Store priv key in slot 0x5
22,453,338 UART: [art] Derive Key Pair - Done
22,466,189 UART: [art] Signing Cert with AUTHO
22,467,492 UART: RITY.KEYID = 7
24,179,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,180,563 UART: [art] PUB.X = 89C4917611616EA09F4895346D64EEFEEF450E8CBECBB5BFE7461DA8B95131F7F090A3CB705CD5A6047038850B10DFF7
24,187,828 UART: [art] PUB.Y = CB8DF8AB43859FAFDDC316604D8E3EA2C14C595094655924DC9903A40C9469A44181B53B18F29C0F74A2BC21CC88A4E0
24,195,065 UART: [art] SIG.R = 901E69B8C0F73FD36B9DE887E3F0C8995AD19A96014B4762F4DE033AE942BE024F20AA01409C5224708AFC640A3416A1
24,202,415 UART: [art] SIG.S = 996468B68B0E2667B01B8983604295EEBC53C8897AC3408FC46B2434BAE44CD4CA3AAB882E9F52B7216E0EC6A6255433
25,181,018 UART: mbox::rt_entry...
25,181,982 UART: ____ _ _ _ ____ _____
25,183,929 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,185,939 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,187,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,189,719 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,191,572 UART: |_|
25,192,397 UART:
25,305,708 UART: [rt] Runtime listening for mailbox commands...
25,307,724 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,308,519 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,001 UART:
1,263 UART: Running Caliptra ROM ...
2,284 UART:
2,426 UART: [state] CFI Enabled
65,165 UART: [state] LifecycleState = Production
66,926 UART: [state] DebugLocked = Yes
69,414 UART: [state] Starting the WD Timer 40000000 cycles
73,716 UART: [kat] SHA2-256
252,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,440 UART: [kat] ++
264,889 UART: [kat] sha1
275,008 UART: [kat] SHA2-256
278,069 UART: [kat] SHA2-384
284,581 UART: [kat] SHA2-512-ACC
287,566 UART: [kat] ECC-384
2,748,112 UART: [kat] HMAC-384Kdf
2,769,568 UART: [kat] LMS
3,299,045 UART: [kat] --
3,304,332 UART: [warm-reset] ++
3,309,444 UART: [warm-reset] --
3,313,523 UART: [state] Locking Datavault
3,315,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,419 UART: [state] Locking ICCM
3,319,785 UART: [exit] Launching FMC @ 0x40000130
3,328,192 UART:
3,328,427 UART: Running Caliptra FMC ...
3,329,528 UART:
3,329,687 UART: [state] CFI Enabled
3,379,458 UART: [aliasrt :skip pcr extension
3,380,748 UART: [art] Extend RT PCRs Done
3,381,893 UART: [art] Lock RT PCRs Done
3,383,072 UART: [art] Populate DV Done
3,388,911 UART: [fht] FMC Alias Private Key: 7
3,390,556 UART: [art] Derive CDI
3,391,371 UART: [art] Store in in slot 0x4
3,447,796 UART: [art] Derive Key Pair
3,448,843 UART: [art] Store priv key in slot 0x5
5,911,596 UART: [art] Derive Key Pair - Done
5,924,717 UART: [art] Signing Cert with AUTHO
5,926,032 UART: RITY.KEYID = 7
7,636,832 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,326 UART: [art] PUB.X = 89C4917611616EA09F4895346D64EEFEEF450E8CBECBB5BFE7461DA8B95131F7F090A3CB705CD5A6047038850B10DFF7
7,645,588 UART: [art] PUB.Y = CB8DF8AB43859FAFDDC316604D8E3EA2C14C595094655924DC9903A40C9469A44181B53B18F29C0F74A2BC21CC88A4E0
7,652,824 UART: [art] SIG.R = 901E69B8C0F73FD36B9DE887E3F0C8995AD19A96014B4762F4DE033AE942BE024F20AA01409C5224708AFC640A3416A1
7,660,221 UART: [art] SIG.S = 996468B68B0E2667B01B8983604295EEBC53C8897AC3408FC46B2434BAE44CD4CA3AAB882E9F52B7216E0EC6A6255433
8,639,028 UART: mbox::rt_entry...
8,639,994 UART: ____ _ _ _ ____ _____
8,641,925 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,930 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,580 UART: |_|
8,650,410 UART:
11,390,964 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,395,408 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
191,824 UART:
192,206 UART: Running Caliptra ROM ...
193,422 UART:
603,128 UART: [state] CFI Enabled
617,728 UART: [state] LifecycleState = Production
619,484 UART: [state] DebugLocked = Yes
621,548 UART: [state] Starting the WD Timer 40000000 cycles
627,057 UART: [kat] SHA2-256
806,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,777 UART: [kat] ++
818,308 UART: [kat] sha1
829,308 UART: [kat] SHA2-256
832,359 UART: [kat] SHA2-384
839,345 UART: [kat] SHA2-512-ACC
842,271 UART: [kat] ECC-384
3,284,465 UART: [kat] HMAC-384Kdf
3,297,689 UART: [kat] LMS
3,827,210 UART: [kat] --
3,831,580 UART: [cold-reset] ++
3,833,149 UART: [fht] FHT @ 0x50003400
3,844,327 UART: [idev] ++
3,844,885 UART: [idev] CDI.KEYID = 6
3,845,782 UART: [idev] SUBJECT.KEYID = 7
3,847,010 UART: [idev] UDS.KEYID = 0
3,847,931 ready_for_fw is high
3,848,113 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,947,145 UART: [idev] Erasing UDS.KEYID = 0
6,321,531 UART: [idev] Sha1 KeyId Algorithm
6,345,250 UART: [idev] --
6,348,134 UART: [ldev] ++
6,348,708 UART: [ldev] CDI.KEYID = 6
6,349,590 UART: [ldev] SUBJECT.KEYID = 5
6,350,716 UART: [ldev] AUTHORITY.KEYID = 7
6,352,095 UART: [ldev] FE.KEYID = 1
6,360,731 UART: [ldev] Erasing FE.KEYID = 1
8,837,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,705 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,570,680 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,586,512 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,602,479 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,622,326 UART: [ldev] --
10,627,472 UART: [fwproc] Wait for Commands...
10,629,985 UART: [fwproc] Recv command 0x46574c44
10,632,068 UART: [fwproc] Recv'd Img size: 78704 bytes
13,629,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,702,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,771,386 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,965,262 >>> mbox cmd response: success
13,969,784 UART: [afmc] ++
13,970,392 UART: [afmc] CDI.KEYID = 6
13,971,323 UART: [afmc] SUBJECT.KEYID = 7
13,972,482 UART: [afmc] AUTHORITY.KEYID = 5
16,471,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,192,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,194,423 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,210,416 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,226,273 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,241,972 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,265,285 UART: [afmc] --
18,268,188 UART: [cold-reset] --
18,272,543 UART: [state] Locking Datavault
18,276,599 UART: [state] Locking PCR0, PCR1 and PCR31
18,278,289 UART: [state] Locking ICCM
18,279,839 UART: [exit] Launching FMC @ 0x40000130
18,288,280 UART:
18,288,504 UART: Running Caliptra FMC ...
18,289,621 UART:
18,289,777 UART: [state] CFI Enabled
18,297,925 UART: [fht] FMC Alias Private Key: 7
20,054,959 UART: [art] Extend RT PCRs Done
20,056,182 UART: [art] Lock RT PCRs Done
20,057,940 UART: [art] Populate DV Done
20,063,489 UART: [fht] FMC Alias Private Key: 7
20,065,174 UART: [art] Derive CDI
20,065,930 UART: [art] Store in in slot 0x4
20,108,672 UART: [art] Derive Key Pair
20,109,703 UART: [art] Store priv key in slot 0x5
22,536,421 UART: [art] Derive Key Pair - Done
22,549,688 UART: [art] Signing Cert with AUTHO
22,550,975 UART: RITY.KEYID = 7
24,256,315 UART: [art] Erasing AUTHORITY.KEYID = 7
24,257,811 UART: [art] PUB.X = 36157EB3B5910E34D210A787ED20E0600CB95C6912A9950BB89C9DCA65A1CCEACDC22000170F96D5423CB9D984295FDB
24,265,139 UART: [art] PUB.Y = 0ECAA962EF47F40F7DE5CE28CAC20028FB85DCEAAC637F6A2908ABF9812ADBFF96779778DAE548D9FAC1A7CD59626631
24,272,375 UART: [art] SIG.R = A547FD7A3258AB14BDF68BE69989B8629351D822969F5A1E53C5EAD982F91CFD8B8D4491CF2C483C57E7CFDA1B2BB9DF
24,279,762 UART: [art] SIG.S = AC696E502B48A37B4D06EEA1803127661C8632578EE3F5C3515D21DE5C6A08809E06152C3753B3459AAF7617504D7918
25,258,456 UART: mbox::rt_entry...
25,259,395 UART: ____ _ _ _ ____ _____
25,261,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,263,308 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,265,229 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,267,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,269,067 UART: |_|
25,269,891 UART:
25,383,405 UART: [rt] Runtime listening for mailbox commands...
25,385,442 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,386,228 >>> mbox cmd response data (0 bytes)
Initializing fuses
996 UART:
1,260 UART: Running Caliptra ROM ...
2,357 UART:
15,141,337 UART: [state] CFI Enabled
15,157,445 UART: [state] LifecycleState = Production
15,159,193 UART: [state] DebugLocked = Yes
15,160,694 UART: [state] Starting the WD Timer 40000000 cycles
15,164,936 UART: [kat] SHA2-256
15,344,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,355,638 UART: [kat] ++
15,356,089 UART: [kat] sha1
15,368,586 UART: [kat] SHA2-256
15,371,593 UART: [kat] SHA2-384
15,376,759 UART: [kat] SHA2-512-ACC
15,379,748 UART: [kat] ECC-384
17,821,565 UART: [kat] HMAC-384Kdf
17,833,080 UART: [kat] LMS
18,362,597 UART: [kat] --
18,367,342 UART: [warm-reset] ++
18,371,159 UART: [warm-reset] --
18,376,686 UART: [state] Locking Datavault
18,379,821 UART: [state] Locking PCR0, PCR1 and PCR31
18,381,460 UART: [state] Locking ICCM
18,383,172 UART: [exit] Launching FMC @ 0x40000130
18,391,611 UART:
18,391,849 UART: Running Caliptra FMC ...
18,392,942 UART:
18,393,093 UART: [state] CFI Enabled
18,395,052 UART: [aliasrt :skip pcr extension
18,396,320 UART: [art] Extend RT PCRs Done
18,397,458 UART: [art] Lock RT PCRs Done
18,398,512 UART: [art] Populate DV Done
18,404,232 UART: [fht] FMC Alias Private Key: 7
18,405,939 UART: [art] Derive CDI
18,406,748 UART: [art] Store in in slot 0x4
18,449,373 UART: [art] Derive Key Pair
18,450,387 UART: [art] Store priv key in slot 0x5
20,877,536 UART: [art] Derive Key Pair - Done
20,890,546 UART: [art] Signing Cert with AUTHO
20,891,851 UART: RITY.KEYID = 7
22,597,493 UART: [art] Erasing AUTHORITY.KEYID = 7
22,598,980 UART: [art] PUB.X = 36157EB3B5910E34D210A787ED20E0600CB95C6912A9950BB89C9DCA65A1CCEACDC22000170F96D5423CB9D984295FDB
22,606,267 UART: [art] PUB.Y = 0ECAA962EF47F40F7DE5CE28CAC20028FB85DCEAAC637F6A2908ABF9812ADBFF96779778DAE548D9FAC1A7CD59626631
22,613,530 UART: [art] SIG.R = A547FD7A3258AB14BDF68BE69989B8629351D822969F5A1E53C5EAD982F91CFD8B8D4491CF2C483C57E7CFDA1B2BB9DF
22,620,940 UART: [art] SIG.S = AC696E502B48A37B4D06EEA1803127661C8632578EE3F5C3515D21DE5C6A08809E06152C3753B3459AAF7617504D7918
23,599,597 UART: mbox::rt_entry...
23,600,552 UART: ____ _ _ _ ____ _____
23,602,476 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,604,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,606,341 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,608,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,610,107 UART: |_|
23,610,977 UART:
26,319,844 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,324,266 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
191,829 UART:
192,205 UART: Running Caliptra ROM ...
193,375 UART:
603,092 UART: [state] CFI Enabled
615,385 UART: [state] LifecycleState = Production
617,081 UART: [state] DebugLocked = Yes
619,780 UART: [state] Starting the WD Timer 40000000 cycles
624,797 UART: [kat] SHA2-256
803,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,506 UART: [kat] ++
816,031 UART: [kat] sha1
827,723 UART: [kat] SHA2-256
830,730 UART: [kat] SHA2-384
837,496 UART: [kat] SHA2-512-ACC
840,493 UART: [kat] ECC-384
3,284,425 UART: [kat] HMAC-384Kdf
3,296,656 UART: [kat] LMS
3,826,162 UART: [kat] --
3,831,786 UART: [cold-reset] ++
3,832,926 UART: [fht] FHT @ 0x50003400
3,842,845 UART: [idev] ++
3,843,405 UART: [idev] CDI.KEYID = 6
3,844,378 UART: [idev] SUBJECT.KEYID = 7
3,845,542 UART: [idev] UDS.KEYID = 0
3,846,457 ready_for_fw is high
3,846,640 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,945,493 UART: [idev] Erasing UDS.KEYID = 0
6,320,101 UART: [idev] Sha1 KeyId Algorithm
6,343,556 UART: [idev] --
6,347,389 UART: [ldev] ++
6,347,954 UART: [ldev] CDI.KEYID = 6
6,348,912 UART: [ldev] SUBJECT.KEYID = 5
6,350,062 UART: [ldev] AUTHORITY.KEYID = 7
6,351,344 UART: [ldev] FE.KEYID = 1
6,362,094 UART: [ldev] Erasing FE.KEYID = 1
8,840,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,727 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,575,786 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,591,549 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,607,495 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,628,318 UART: [ldev] --
10,632,756 UART: [fwproc] Wait for Commands...
10,635,549 UART: [fwproc] Recv command 0x46574c44
10,637,635 UART: [fwproc] Recv'd Img size: 78704 bytes
13,644,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,723,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,791,862 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,984,676 >>> mbox cmd response: success
13,989,493 UART: [afmc] ++
13,990,126 UART: [afmc] CDI.KEYID = 6
13,991,038 UART: [afmc] SUBJECT.KEYID = 7
13,992,202 UART: [afmc] AUTHORITY.KEYID = 5
16,494,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,215,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,217,537 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,233,550 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,249,363 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,265,108 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,286,692 UART: [afmc] --
18,291,118 UART: [cold-reset] --
18,294,594 UART: [state] Locking Datavault
18,300,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,302,560 UART: [state] Locking ICCM
18,304,216 UART: [exit] Launching FMC @ 0x40000130
18,312,642 UART:
18,312,882 UART: Running Caliptra FMC ...
18,313,977 UART:
18,314,129 UART: [state] CFI Enabled
18,322,130 UART: [fht] FMC Alias Private Key: 7
20,079,047 UART: [art] Extend RT PCRs Done
20,080,389 UART: [art] Lock RT PCRs Done
20,081,908 UART: [art] Populate DV Done
20,087,269 UART: [fht] FMC Alias Private Key: 7
20,088,857 UART: [art] Derive CDI
20,089,609 UART: [art] Store in in slot 0x4
20,132,138 UART: [art] Derive Key Pair
20,133,132 UART: [art] Store priv key in slot 0x5
22,559,858 UART: [art] Derive Key Pair - Done
22,573,065 UART: [art] Signing Cert with AUTHO
22,574,374 UART: RITY.KEYID = 7
24,280,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,281,615 UART: [art] PUB.X = B014F775DFF57F31E531DC508631A80A16298DA754E68C577300E880B414E2531254E83B4A8853BCBF02DD3FA3A423FB
24,288,856 UART: [art] PUB.Y = CB9E534A5EB4E24937F7352BAA707F30B659E516EC280F252D957ED8F18453D76891695606E78E7C5FCB85D2D4F3AECB
24,296,088 UART: [art] SIG.R = 262A8AB98F452BC76143A33F50FE18CD36295B70E229168B0DC4C5C1DC6A333CCE5B7162676759EFB2A2569A4DB79A4F
24,303,493 UART: [art] SIG.S = 245A3B3AE5AE0FDD4595E711735C2D3A81F1A16E4FDF1E6336E32A123C6985D451E655439646A1D2C8A79CB57A071802
25,281,290 UART: mbox::rt_entry...
25,282,245 UART: ____ _ _ _ ____ _____
25,284,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,286,162 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,288,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,289,929 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,291,776 UART: |_|
25,292,591 UART:
25,406,117 UART: [rt] Runtime listening for mailbox commands...
25,408,151 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,408,927 >>> mbox cmd response data (0 bytes)
Initializing fuses
995 UART:
1,236 UART: Running Caliptra ROM ...
2,247 UART:
15,121,039 UART: [state] CFI Enabled
15,134,504 UART: [state] LifecycleState = Production
15,136,190 UART: [state] DebugLocked = Yes
15,137,566 UART: [state] Starting the WD Timer 40000000 cycles
15,141,942 UART: [kat] SHA2-256
15,321,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,332,665 UART: [kat] ++
15,333,113 UART: [kat] sha1
15,344,745 UART: [kat] SHA2-256
15,347,805 UART: [kat] SHA2-384
15,353,408 UART: [kat] SHA2-512-ACC
15,356,343 UART: [kat] ECC-384
17,797,591 UART: [kat] HMAC-384Kdf
17,808,948 UART: [kat] LMS
18,338,482 UART: [kat] --
18,343,256 UART: [warm-reset] ++
18,348,227 UART: [warm-reset] --
18,351,987 UART: [state] Locking Datavault
18,355,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,357,574 UART: [state] Locking ICCM
18,358,993 UART: [exit] Launching FMC @ 0x40000130
18,367,436 UART:
18,367,670 UART: Running Caliptra FMC ...
18,368,768 UART:
18,368,918 UART: [state] CFI Enabled
18,370,696 UART: [aliasrt :skip pcr extension
18,371,940 UART: [art] Extend RT PCRs Done
18,373,070 UART: [art] Lock RT PCRs Done
18,374,244 UART: [art] Populate DV Done
18,380,076 UART: [fht] FMC Alias Private Key: 7
18,381,664 UART: [art] Derive CDI
18,382,472 UART: [art] Store in in slot 0x4
18,425,395 UART: [art] Derive Key Pair
18,426,438 UART: [art] Store priv key in slot 0x5
20,853,463 UART: [art] Derive Key Pair - Done
20,866,406 UART: [art] Signing Cert with AUTHO
20,867,706 UART: RITY.KEYID = 7
22,573,123 UART: [art] Erasing AUTHORITY.KEYID = 7
22,574,636 UART: [art] PUB.X = B014F775DFF57F31E531DC508631A80A16298DA754E68C577300E880B414E2531254E83B4A8853BCBF02DD3FA3A423FB
22,581,949 UART: [art] PUB.Y = CB9E534A5EB4E24937F7352BAA707F30B659E516EC280F252D957ED8F18453D76891695606E78E7C5FCB85D2D4F3AECB
22,589,171 UART: [art] SIG.R = 262A8AB98F452BC76143A33F50FE18CD36295B70E229168B0DC4C5C1DC6A333CCE5B7162676759EFB2A2569A4DB79A4F
22,596,544 UART: [art] SIG.S = 245A3B3AE5AE0FDD4595E711735C2D3A81F1A16E4FDF1E6336E32A123C6985D451E655439646A1D2C8A79CB57A071802
23,574,798 UART: mbox::rt_entry...
23,575,755 UART: ____ _ _ _ ____ _____
23,577,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,579,674 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,581,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,583,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,585,452 UART: |_|
23,586,283 UART:
26,298,507 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,302,921 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
191,542 UART:
191,902 UART: Running Caliptra ROM ...
193,012 UART:
193,183 UART: [state] CFI Enabled
269,050 UART: [state] LifecycleState = Production
270,841 UART: [state] DebugLocked = Yes
272,979 UART: [state] Starting the WD Timer 40000000 cycles
278,010 UART: [kat] SHA2-256
457,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,750 UART: [kat] ++
469,194 UART: [kat] sha1
480,524 UART: [kat] SHA2-256
483,537 UART: [kat] SHA2-384
490,595 UART: [kat] SHA2-512-ACC
493,596 UART: [kat] ECC-384
2,949,079 UART: [kat] HMAC-384Kdf
2,970,909 UART: [kat] LMS
3,500,354 UART: [kat] --
3,504,915 UART: [cold-reset] ++
3,506,360 UART: [fht] FHT @ 0x50003400
3,516,272 UART: [idev] ++
3,516,843 UART: [idev] CDI.KEYID = 6
3,517,797 UART: [idev] SUBJECT.KEYID = 7
3,518,966 UART: [idev] UDS.KEYID = 0
3,519,890 ready_for_fw is high
3,520,080 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,532 UART: [idev] Erasing UDS.KEYID = 0
6,026,019 UART: [idev] Sha1 KeyId Algorithm
6,049,220 UART: [idev] --
6,053,432 UART: [ldev] ++
6,054,061 UART: [ldev] CDI.KEYID = 6
6,054,957 UART: [ldev] SUBJECT.KEYID = 5
6,056,005 UART: [ldev] AUTHORITY.KEYID = 7
6,057,354 UART: [ldev] FE.KEYID = 1
6,100,057 UART: [ldev] Erasing FE.KEYID = 1
8,604,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,765 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,711 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,579 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,514 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,966 UART: [ldev] --
10,410,879 UART: [fwproc] Wait for Commands...
10,413,781 UART: [fwproc] Recv command 0x46574c44
10,415,874 UART: [fwproc] Recv'd Img size: 78704 bytes
13,414,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,482,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,550,921 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,744,589 >>> mbox cmd response: success
13,748,621 UART: [afmc] ++
13,749,232 UART: [afmc] CDI.KEYID = 6
13,750,146 UART: [afmc] SUBJECT.KEYID = 7
13,751,330 UART: [afmc] AUTHORITY.KEYID = 5
16,275,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,999,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,001,832 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,017,775 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,033,674 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,049,384 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,072,291 UART: [afmc] --
18,076,630 UART: [cold-reset] --
18,080,333 UART: [state] Locking Datavault
18,084,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,086,633 UART: [state] Locking ICCM
18,089,381 UART: [exit] Launching FMC @ 0x40000130
18,097,787 UART:
18,098,026 UART: Running Caliptra FMC ...
18,099,132 UART:
18,099,316 UART: [state] CFI Enabled
18,158,357 UART: [fht] FMC Alias Private Key: 7
19,922,299 UART: [art] Extend RT PCRs Done
19,923,493 UART: [art] Lock RT PCRs Done
19,924,843 UART: [art] Populate DV Done
19,930,366 UART: [fht] FMC Alias Private Key: 7
19,932,062 UART: [art] Derive CDI
19,932,881 UART: [art] Store in in slot 0x4
19,990,239 UART: [art] Derive Key Pair
19,991,289 UART: [art] Store priv key in slot 0x5
22,454,299 UART: [art] Derive Key Pair - Done
22,467,290 UART: [art] Signing Cert with AUTHO
22,468,588 UART: RITY.KEYID = 7
24,180,119 UART: [art] Erasing AUTHORITY.KEYID = 7
24,181,593 UART: [art] PUB.X = CD95F3E31377EB8CE958E8E4EF39AFBBDC86A0B61060EA9D8CBFC0E8DBD63EEC4AA26373B0C877556229ED67EB0FC683
24,188,950 UART: [art] PUB.Y = 81C748ECBF5EE96F240394E61EB8E8188557FE8BD914E46629824CC9806EE48752F15F565F0E9DDDEF618A947D8C4BA8
24,196,168 UART: [art] SIG.R = 926A2EA4141D17C30D18591D967A415761A46072F70975BA427E2E4C7D4FBCF8A7A9D1B8C6DBDE55FEC128BE3D4C4CB0
24,203,555 UART: [art] SIG.S = B85600852998D08BFCB55F41FE8179C075FBA6D50E61484B386F3DD86AC918DC9EC87C93B05B506FFA2C4A57132B1D10
25,181,896 UART: mbox::rt_entry...
25,182,862 UART: ____ _ _ _ ____ _____
25,184,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,186,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,188,693 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,190,617 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,192,540 UART: |_|
25,193,373 UART:
25,307,281 UART: [rt] Runtime listening for mailbox commands...
25,309,290 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,310,068 >>> mbox cmd response data (0 bytes)
Initializing fuses
986 UART:
1,226 UART: Running Caliptra ROM ...
2,348 UART:
2,502 UART: [state] CFI Enabled
61,315 UART: [state] LifecycleState = Production
63,038 UART: [state] DebugLocked = Yes
64,933 UART: [state] Starting the WD Timer 40000000 cycles
70,034 UART: [kat] SHA2-256
249,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,727 UART: [kat] ++
261,248 UART: [kat] sha1
272,024 UART: [kat] SHA2-256
275,036 UART: [kat] SHA2-384
281,069 UART: [kat] SHA2-512-ACC
284,000 UART: [kat] ECC-384
2,744,538 UART: [kat] HMAC-384Kdf
2,768,969 UART: [kat] LMS
3,298,426 UART: [kat] --
3,300,607 UART: [warm-reset] ++
3,304,911 UART: [warm-reset] --
3,307,580 UART: [state] Locking Datavault
3,309,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,310,811 UART: [state] Locking ICCM
3,312,047 UART: [exit] Launching FMC @ 0x40000130
3,320,443 UART:
3,320,678 UART: Running Caliptra FMC ...
3,321,783 UART:
3,321,944 UART: [state] CFI Enabled
3,379,290 UART: [aliasrt :skip pcr extension
3,380,627 UART: [art] Extend RT PCRs Done
3,381,726 UART: [art] Lock RT PCRs Done
3,383,017 UART: [art] Populate DV Done
3,388,643 UART: [fht] FMC Alias Private Key: 7
3,390,229 UART: [art] Derive CDI
3,391,061 UART: [art] Store in in slot 0x4
3,447,918 UART: [art] Derive Key Pair
3,448,961 UART: [art] Store priv key in slot 0x5
5,912,325 UART: [art] Derive Key Pair - Done
5,925,537 UART: [art] Signing Cert with AUTHO
5,926,833 UART: RITY.KEYID = 7
7,637,945 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,453 UART: [art] PUB.X = CD95F3E31377EB8CE958E8E4EF39AFBBDC86A0B61060EA9D8CBFC0E8DBD63EEC4AA26373B0C877556229ED67EB0FC683
7,646,748 UART: [art] PUB.Y = 81C748ECBF5EE96F240394E61EB8E8188557FE8BD914E46629824CC9806EE48752F15F565F0E9DDDEF618A947D8C4BA8
7,653,982 UART: [art] SIG.R = 926A2EA4141D17C30D18591D967A415761A46072F70975BA427E2E4C7D4FBCF8A7A9D1B8C6DBDE55FEC128BE3D4C4CB0
7,661,367 UART: [art] SIG.S = B85600852998D08BFCB55F41FE8179C075FBA6D50E61484B386F3DD86AC918DC9EC87C93B05B506FFA2C4A57132B1D10
8,640,153 UART: mbox::rt_entry...
8,641,094 UART: ____ _ _ _ ____ _____
8,643,074 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,886 UART: |_|
8,651,696 UART:
11,394,772 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,399,186 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,531 UART:
191,906 UART: Running Caliptra ROM ...
192,988 UART:
193,126 UART: [state] CFI Enabled
266,861 UART: [state] LifecycleState = Production
268,573 UART: [state] DebugLocked = Yes
270,340 UART: [state] Starting the WD Timer 40000000 cycles
275,577 UART: [kat] SHA2-256
454,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,310 UART: [kat] ++
466,763 UART: [kat] sha1
479,298 UART: [kat] SHA2-256
482,300 UART: [kat] SHA2-384
489,710 UART: [kat] SHA2-512-ACC
492,643 UART: [kat] ECC-384
2,949,903 UART: [kat] HMAC-384Kdf
2,970,899 UART: [kat] LMS
3,500,360 UART: [kat] --
3,506,124 UART: [cold-reset] ++
3,507,984 UART: [fht] FHT @ 0x50003400
3,519,028 UART: [idev] ++
3,519,592 UART: [idev] CDI.KEYID = 6
3,520,511 UART: [idev] SUBJECT.KEYID = 7
3,521,681 UART: [idev] UDS.KEYID = 0
3,522,608 ready_for_fw is high
3,522,796 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,898 UART: [idev] Erasing UDS.KEYID = 0
6,025,473 UART: [idev] Sha1 KeyId Algorithm
6,049,264 UART: [idev] --
6,053,949 UART: [ldev] ++
6,054,529 UART: [ldev] CDI.KEYID = 6
6,055,417 UART: [ldev] SUBJECT.KEYID = 5
6,056,648 UART: [ldev] AUTHORITY.KEYID = 7
6,057,887 UART: [ldev] FE.KEYID = 1
6,099,192 UART: [ldev] Erasing FE.KEYID = 1
8,604,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,656 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,693 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,533 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,444 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,289 UART: [ldev] --
10,412,165 UART: [fwproc] Wait for Commands...
10,414,792 UART: [fwproc] Recv command 0x46574c44
10,416,878 UART: [fwproc] Recv'd Img size: 78704 bytes
13,420,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,489,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,558,087 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,751,585 >>> mbox cmd response: success
13,756,260 UART: [afmc] ++
13,756,874 UART: [afmc] CDI.KEYID = 6
13,757,761 UART: [afmc] SUBJECT.KEYID = 7
13,758,977 UART: [afmc] AUTHORITY.KEYID = 5
16,294,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,016,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,018,049 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,034,034 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,049,899 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,065,669 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,089,089 UART: [afmc] --
18,092,985 UART: [cold-reset] --
18,095,604 UART: [state] Locking Datavault
18,099,446 UART: [state] Locking PCR0, PCR1 and PCR31
18,101,097 UART: [state] Locking ICCM
18,102,306 UART: [exit] Launching FMC @ 0x40000130
18,110,715 UART:
18,110,955 UART: Running Caliptra FMC ...
18,112,007 UART:
18,112,166 UART: [state] CFI Enabled
18,174,552 UART: [fht] FMC Alias Private Key: 7
19,939,189 UART: [art] Extend RT PCRs Done
19,940,403 UART: [art] Lock RT PCRs Done
19,942,130 UART: [art] Populate DV Done
19,947,434 UART: [fht] FMC Alias Private Key: 7
19,948,974 UART: [art] Derive CDI
19,949,735 UART: [art] Store in in slot 0x4
20,006,654 UART: [art] Derive Key Pair
20,007,708 UART: [art] Store priv key in slot 0x5
22,470,564 UART: [art] Derive Key Pair - Done
22,483,339 UART: [art] Signing Cert with AUTHO
22,484,642 UART: RITY.KEYID = 7
24,196,238 UART: [art] Erasing AUTHORITY.KEYID = 7
24,197,748 UART: [art] PUB.X = 9644DBA9EDAFC9462C8B015CE121208D461CFA2B1D2B42FD5AF70B0C3CD76BABF8B0C5FB5AF39097937C7B633520CC6D
24,205,050 UART: [art] PUB.Y = 87FB86208C8F8935243813BEEC08FEB1ED09CC5AFC3652E2310A5CDFE36FBF412BC21FF79543245D27069A8935575A08
24,212,312 UART: [art] SIG.R = 9D4AE3D21CCA606A06F5029506E2E6D684D47D5AFC3FFE9B0A6A5982DD495C753B67279C2A547B4968F8EFF04A59571D
24,219,707 UART: [art] SIG.S = 85B201224F78A3AB828000726C24F5993D0785CC66A9EEB0594914C58A7349AC4EBEB49B0B2837599CF8EEBEBA7FB57B
25,198,140 UART: mbox::rt_entry...
25,199,109 UART: ____ _ _ _ ____ _____
25,201,039 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,203,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,204,990 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,206,917 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,208,843 UART: |_|
25,209,655 UART:
25,323,111 UART: [rt] Runtime listening for mailbox commands...
25,325,123 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,326,085 >>> mbox cmd response data (0 bytes)
Initializing fuses
975 UART:
1,217 UART: Running Caliptra ROM ...
2,323 UART:
2,480 UART: [state] CFI Enabled
60,268 UART: [state] LifecycleState = Production
61,988 UART: [state] DebugLocked = Yes
63,396 UART: [state] Starting the WD Timer 40000000 cycles
68,982 UART: [kat] SHA2-256
248,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
259,722 UART: [kat] ++
260,256 UART: [kat] sha1
270,923 UART: [kat] SHA2-256
273,924 UART: [kat] SHA2-384
280,712 UART: [kat] SHA2-512-ACC
283,652 UART: [kat] ECC-384
2,742,487 UART: [kat] HMAC-384Kdf
2,767,403 UART: [kat] LMS
3,296,881 UART: [kat] --
3,302,916 UART: [warm-reset] ++
3,307,821 UART: [warm-reset] --
3,311,954 UART: [state] Locking Datavault
3,315,262 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,910 UART: [state] Locking ICCM
3,318,553 UART: [exit] Launching FMC @ 0x40000130
3,327,006 UART:
3,327,256 UART: Running Caliptra FMC ...
3,328,362 UART:
3,328,522 UART: [state] CFI Enabled
3,376,345 UART: [aliasrt :skip pcr extension
3,377,638 UART: [art] Extend RT PCRs Done
3,378,784 UART: [art] Lock RT PCRs Done
3,380,201 UART: [art] Populate DV Done
3,385,775 UART: [fht] FMC Alias Private Key: 7
3,387,478 UART: [art] Derive CDI
3,388,217 UART: [art] Store in in slot 0x4
3,444,619 UART: [art] Derive Key Pair
3,445,664 UART: [art] Store priv key in slot 0x5
5,908,410 UART: [art] Derive Key Pair - Done
5,921,717 UART: [art] Signing Cert with AUTHO
5,923,049 UART: RITY.KEYID = 7
7,634,053 UART: [art] Erasing AUTHORITY.KEYID = 7
7,635,562 UART: [art] PUB.X = 9644DBA9EDAFC9462C8B015CE121208D461CFA2B1D2B42FD5AF70B0C3CD76BABF8B0C5FB5AF39097937C7B633520CC6D
7,642,863 UART: [art] PUB.Y = 87FB86208C8F8935243813BEEC08FEB1ED09CC5AFC3652E2310A5CDFE36FBF412BC21FF79543245D27069A8935575A08
7,650,145 UART: [art] SIG.R = 9D4AE3D21CCA606A06F5029506E2E6D684D47D5AFC3FFE9B0A6A5982DD495C753B67279C2A547B4968F8EFF04A59571D
7,657,538 UART: [art] SIG.S = 85B201224F78A3AB828000726C24F5993D0785CC66A9EEB0594914C58A7349AC4EBEB49B0B2837599CF8EEBEBA7FB57B
8,635,716 UART: mbox::rt_entry...
8,636,658 UART: ____ _ _ _ ____ _____
8,638,601 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,641,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,111 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,646,966 UART: |_|
8,647,800 UART:
11,388,991 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,393,410 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
191,926 UART:
192,288 UART: Running Caliptra ROM ...
193,454 UART:
603,184 UART: [state] CFI Enabled
618,408 UART: [state] LifecycleState = Production
620,089 UART: [state] DebugLocked = Yes
622,713 UART: [state] Starting the WD Timer 40000000 cycles
626,752 UART: [kat] SHA2-256
805,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,502 UART: [kat] ++
818,040 UART: [kat] sha1
830,373 UART: [kat] SHA2-256
833,377 UART: [kat] SHA2-384
838,365 UART: [kat] SHA2-512-ACC
841,360 UART: [kat] ECC-384
3,282,835 UART: [kat] HMAC-384Kdf
3,296,854 UART: [kat] LMS
3,826,338 UART: [kat] --
3,832,115 UART: [cold-reset] ++
3,834,708 UART: [fht] FHT @ 0x50003400
3,845,114 UART: [idev] ++
3,845,667 UART: [idev] CDI.KEYID = 6
3,846,577 UART: [idev] SUBJECT.KEYID = 7
3,847,830 UART: [idev] UDS.KEYID = 0
3,848,749 ready_for_fw is high
3,848,951 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,947,922 UART: [idev] Erasing UDS.KEYID = 0
6,321,058 UART: [idev] Sha1 KeyId Algorithm
6,345,011 UART: [idev] --
6,347,972 UART: [ldev] ++
6,348,533 UART: [ldev] CDI.KEYID = 6
6,349,435 UART: [ldev] SUBJECT.KEYID = 5
6,350,640 UART: [ldev] AUTHORITY.KEYID = 7
6,351,865 UART: [ldev] FE.KEYID = 1
6,363,364 UART: [ldev] Erasing FE.KEYID = 1
8,839,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,599 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,573,585 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,589,451 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,605,421 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,626,511 UART: [ldev] --
10,630,911 UART: [fwproc] Wait for Commands...
10,632,659 UART: [fwproc] Recv command 0x46574c44
10,634,747 UART: [fwproc] Recv'd Img size: 78704 bytes
13,633,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,713,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,781,871 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,974,506 >>> mbox cmd response: success
13,979,091 UART: [afmc] ++
13,979,711 UART: [afmc] CDI.KEYID = 6
13,980,617 UART: [afmc] SUBJECT.KEYID = 7
13,981,772 UART: [afmc] AUTHORITY.KEYID = 5
16,477,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,199,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,201,446 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,217,445 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,233,278 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,249,021 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,271,623 UART: [afmc] --
18,274,755 UART: [cold-reset] --
18,277,907 UART: [state] Locking Datavault
18,285,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,286,886 UART: [state] Locking ICCM
18,289,406 UART: [exit] Launching FMC @ 0x40000130
18,297,795 UART:
18,298,029 UART: Running Caliptra FMC ...
18,299,051 UART:
18,299,194 UART: [state] CFI Enabled
18,307,340 UART: [fht] FMC Alias Private Key: 7
20,064,096 UART: [art] Extend RT PCRs Done
20,065,469 UART: [art] Lock RT PCRs Done
20,066,908 UART: [art] Populate DV Done
20,072,247 UART: [fht] FMC Alias Private Key: 7
20,073,848 UART: [art] Derive CDI
20,074,616 UART: [art] Store in in slot 0x4
20,117,584 UART: [art] Derive Key Pair
20,118,581 UART: [art] Store priv key in slot 0x5
22,545,223 UART: [art] Derive Key Pair - Done
22,558,170 UART: [art] Signing Cert with AUTHO
22,559,503 UART: RITY.KEYID = 7
24,264,888 UART: [art] Erasing AUTHORITY.KEYID = 7
24,266,379 UART: [art] PUB.X = FBA1C2FC732EEC319E787F628DF4946986F71FD78E51B5A7F3753F0E6C1ED42F30111D9ED2DED7F53F51811293C6A977
24,273,672 UART: [art] PUB.Y = 30F2D4F503BB99DB700C5F066AA9A1E617964D15A61734BFCDBE38899454F870C91730B8733B82C3A75B7C49D15A4891
24,280,889 UART: [art] SIG.R = A8BA7A65B3FD207A6CEEB047F530E0125066AEF03548EBD460C98083B808DF3F36FF30944D64E29F7A47915CA4ED275E
24,288,271 UART: [art] SIG.S = 1962FEC48BB88EED0DEAFAEEB74D62913243A7528E8C5E3A74FF51146563DEE0ED6E8BC2E22961A5FD1C7EF00B6FC8B9
25,266,430 UART: mbox::rt_entry...
25,267,376 UART: ____ _ _ _ ____ _____
25,269,547 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,271,550 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,273,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,275,304 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,277,176 UART: |_|
25,278,050 UART:
25,390,632 UART: [rt] Runtime listening for mailbox commands...
25,392,633 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,393,412 >>> mbox cmd response data (0 bytes)
Initializing fuses
992 UART:
1,234 UART: Running Caliptra ROM ...
2,277 UART:
15,134,617 UART: [state] CFI Enabled
15,148,377 UART: [state] LifecycleState = Production
15,150,113 UART: [state] DebugLocked = Yes
15,152,515 UART: [state] Starting the WD Timer 40000000 cycles
15,156,595 UART: [kat] SHA2-256
15,335,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,347,332 UART: [kat] ++
15,347,870 UART: [kat] sha1
15,360,483 UART: [kat] SHA2-256
15,363,538 UART: [kat] SHA2-384
15,368,711 UART: [kat] SHA2-512-ACC
15,371,644 UART: [kat] ECC-384
17,813,930 UART: [kat] HMAC-384Kdf
17,826,801 UART: [kat] LMS
18,356,294 UART: [kat] --
18,360,593 UART: [warm-reset] ++
18,366,505 UART: [warm-reset] --
18,370,411 UART: [state] Locking Datavault
18,372,785 UART: [state] Locking PCR0, PCR1 and PCR31
18,374,441 UART: [state] Locking ICCM
18,376,235 UART: [exit] Launching FMC @ 0x40000130
18,384,621 UART:
18,384,854 UART: Running Caliptra FMC ...
18,385,945 UART:
18,386,095 UART: [state] CFI Enabled
18,388,142 UART: [aliasrt :skip pcr extension
18,389,371 UART: [art] Extend RT PCRs Done
18,390,498 UART: [art] Lock RT PCRs Done
18,391,550 UART: [art] Populate DV Done
18,397,051 UART: [fht] FMC Alias Private Key: 7
18,398,578 UART: [art] Derive CDI
18,399,384 UART: [art] Store in in slot 0x4
18,441,938 UART: [art] Derive Key Pair
18,442,978 UART: [art] Store priv key in slot 0x5
20,869,654 UART: [art] Derive Key Pair - Done
20,882,450 UART: [art] Signing Cert with AUTHO
20,883,755 UART: RITY.KEYID = 7
22,589,305 UART: [art] Erasing AUTHORITY.KEYID = 7
22,590,802 UART: [art] PUB.X = FBA1C2FC732EEC319E787F628DF4946986F71FD78E51B5A7F3753F0E6C1ED42F30111D9ED2DED7F53F51811293C6A977
22,598,148 UART: [art] PUB.Y = 30F2D4F503BB99DB700C5F066AA9A1E617964D15A61734BFCDBE38899454F870C91730B8733B82C3A75B7C49D15A4891
22,605,362 UART: [art] SIG.R = A8BA7A65B3FD207A6CEEB047F530E0125066AEF03548EBD460C98083B808DF3F36FF30944D64E29F7A47915CA4ED275E
22,612,731 UART: [art] SIG.S = 1962FEC48BB88EED0DEAFAEEB74D62913243A7528E8C5E3A74FF51146563DEE0ED6E8BC2E22961A5FD1C7EF00B6FC8B9
23,591,674 UART: mbox::rt_entry...
23,592,629 UART: ____ _ _ _ ____ _____
23,594,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,596,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,598,379 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,600,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,602,137 UART: |_|
23,603,005 UART:
26,315,956 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,320,994 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
191,847 UART:
192,223 UART: Running Caliptra ROM ...
193,515 UART:
602,910 UART: [state] CFI Enabled
617,490 UART: [state] LifecycleState = Production
619,184 UART: [state] DebugLocked = Yes
621,671 UART: [state] Starting the WD Timer 40000000 cycles
627,134 UART: [kat] SHA2-256
806,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,817 UART: [kat] ++
818,347 UART: [kat] sha1
828,540 UART: [kat] SHA2-256
831,540 UART: [kat] SHA2-384
838,232 UART: [kat] SHA2-512-ACC
841,239 UART: [kat] ECC-384
3,283,188 UART: [kat] HMAC-384Kdf
3,296,418 UART: [kat] LMS
3,825,876 UART: [kat] --
3,831,786 UART: [cold-reset] ++
3,833,990 UART: [fht] FHT @ 0x50003400
3,845,105 UART: [idev] ++
3,845,668 UART: [idev] CDI.KEYID = 6
3,846,574 UART: [idev] SUBJECT.KEYID = 7
3,847,833 UART: [idev] UDS.KEYID = 0
3,848,756 ready_for_fw is high
3,848,933 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,947,835 UART: [idev] Erasing UDS.KEYID = 0
6,318,471 UART: [idev] Sha1 KeyId Algorithm
6,341,075 UART: [idev] --
6,344,474 UART: [ldev] ++
6,345,037 UART: [ldev] CDI.KEYID = 6
6,345,943 UART: [ldev] SUBJECT.KEYID = 5
6,347,147 UART: [ldev] AUTHORITY.KEYID = 7
6,348,373 UART: [ldev] FE.KEYID = 1
6,358,580 UART: [ldev] Erasing FE.KEYID = 1
8,832,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,041 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,185 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,581,841 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,597,815 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,151 UART: [ldev] --
10,621,024 UART: [fwproc] Wait for Commands...
10,623,277 UART: [fwproc] Recv command 0x46574c44
10,625,363 UART: [fwproc] Recv'd Img size: 78704 bytes
13,621,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,701,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,769,945 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,964,057 >>> mbox cmd response: success
13,968,386 UART: [afmc] ++
13,969,036 UART: [afmc] CDI.KEYID = 6
13,970,117 UART: [afmc] SUBJECT.KEYID = 7
13,971,222 UART: [afmc] AUTHORITY.KEYID = 5
16,468,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,188,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,190,238 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,206,220 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,222,038 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,237,783 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,259,792 UART: [afmc] --
18,264,392 UART: [cold-reset] --
18,269,383 UART: [state] Locking Datavault
18,275,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,277,012 UART: [state] Locking ICCM
18,279,268 UART: [exit] Launching FMC @ 0x40000130
18,287,664 UART:
18,287,947 UART: Running Caliptra FMC ...
18,289,053 UART:
18,289,216 UART: [state] CFI Enabled
18,297,202 UART: [fht] FMC Alias Private Key: 7
20,054,678 UART: [art] Extend RT PCRs Done
20,055,919 UART: [art] Lock RT PCRs Done
20,057,567 UART: [art] Populate DV Done
20,062,983 UART: [fht] FMC Alias Private Key: 7
20,064,685 UART: [art] Derive CDI
20,065,457 UART: [art] Store in in slot 0x4
20,108,245 UART: [art] Derive Key Pair
20,109,330 UART: [art] Store priv key in slot 0x5
22,535,760 UART: [art] Derive Key Pair - Done
22,548,586 UART: [art] Signing Cert with AUTHO
22,549,884 UART: RITY.KEYID = 7
24,255,425 UART: [art] Erasing AUTHORITY.KEYID = 7
24,256,920 UART: [art] PUB.X = 5720EA846CA1CAC49E4E469AC5935321E6286BFFBCA3BF775439A882786A19E72EB22C3508302D7B6AC63D17E2530CA8
24,264,221 UART: [art] PUB.Y = 58DF75491AE03930C5FEBA27BBFCA753409B678C4B408132F7AD47A1A0755CE4F89B28B3C955A8B693C6B22E4F3F268C
24,271,438 UART: [art] SIG.R = D6D8A0383B606357338EBB1D87722CDF232A9AEA97D975FAF9972593DE6115D07FDAE4232389D737FC00CD83DFA3FBFD
24,278,817 UART: [art] SIG.S = 9FD3D46FE2AC9BFF6FBB4EFCF92081ABF58BB1A68BAE0FAD771F34254D91D4594AC7E5085BD9B7E84A9FD67EA30BCF0B
25,258,260 UART: mbox::rt_entry...
25,259,204 UART: ____ _ _ _ ____ _____
25,261,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,263,202 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,265,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,267,050 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,268,971 UART: |_|
25,269,770 UART:
25,382,298 UART: [rt] Runtime listening for mailbox commands...
25,384,298 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,385,078 >>> mbox cmd response data (0 bytes)
Initializing fuses
997 UART:
1,239 UART: Running Caliptra ROM ...
2,334 UART:
15,151,026 UART: [state] CFI Enabled
15,163,225 UART: [state] LifecycleState = Production
15,164,970 UART: [state] DebugLocked = Yes
15,166,516 UART: [state] Starting the WD Timer 40000000 cycles
15,170,871 UART: [kat] SHA2-256
15,350,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,361,573 UART: [kat] ++
15,362,029 UART: [kat] sha1
15,372,313 UART: [kat] SHA2-256
15,375,323 UART: [kat] SHA2-384
15,381,911 UART: [kat] SHA2-512-ACC
15,384,845 UART: [kat] ECC-384
17,827,772 UART: [kat] HMAC-384Kdf
17,841,069 UART: [kat] LMS
18,370,579 UART: [kat] --
18,376,349 UART: [warm-reset] ++
18,379,728 UART: [warm-reset] --
18,383,643 UART: [state] Locking Datavault
18,387,696 UART: [state] Locking PCR0, PCR1 and PCR31
18,389,357 UART: [state] Locking ICCM
18,390,369 UART: [exit] Launching FMC @ 0x40000130
18,398,763 UART:
18,398,992 UART: Running Caliptra FMC ...
18,400,084 UART:
18,400,240 UART: [state] CFI Enabled
18,402,069 UART: [aliasrt :skip pcr extension
18,403,317 UART: [art] Extend RT PCRs Done
18,404,444 UART: [art] Lock RT PCRs Done
18,406,098 UART: [art] Populate DV Done
18,411,822 UART: [fht] FMC Alias Private Key: 7
18,413,299 UART: [art] Derive CDI
18,414,103 UART: [art] Store in in slot 0x4
18,456,784 UART: [art] Derive Key Pair
18,457,833 UART: [art] Store priv key in slot 0x5
20,884,440 UART: [art] Derive Key Pair - Done
20,897,507 UART: [art] Signing Cert with AUTHO
20,898,964 UART: RITY.KEYID = 7
22,604,094 UART: [art] Erasing AUTHORITY.KEYID = 7
22,605,600 UART: [art] PUB.X = 5720EA846CA1CAC49E4E469AC5935321E6286BFFBCA3BF775439A882786A19E72EB22C3508302D7B6AC63D17E2530CA8
22,612,880 UART: [art] PUB.Y = 58DF75491AE03930C5FEBA27BBFCA753409B678C4B408132F7AD47A1A0755CE4F89B28B3C955A8B693C6B22E4F3F268C
22,620,146 UART: [art] SIG.R = D6D8A0383B606357338EBB1D87722CDF232A9AEA97D975FAF9972593DE6115D07FDAE4232389D737FC00CD83DFA3FBFD
22,627,512 UART: [art] SIG.S = 9FD3D46FE2AC9BFF6FBB4EFCF92081ABF58BB1A68BAE0FAD771F34254D91D4594AC7E5085BD9B7E84A9FD67EA30BCF0B
23,606,156 UART: mbox::rt_entry...
23,607,121 UART: ____ _ _ _ ____ _____
23,609,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,611,020 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,612,940 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,614,784 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,616,697 UART: |_|
23,617,494 UART:
26,326,944 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,331,384 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Production
85,701 UART: [state] DebugLocked = Yes
86,435 UART: [state] Starting the WD Timer 40000000 cycles
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,954 UART: [kat] HMAC-384Kdf
921,512 UART: [kat] LMS
1,169,824 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,796 UART: [idev] ++
1,173,964 UART: [idev] CDI.KEYID = 6
1,174,325 UART: [idev] SUBJECT.KEYID = 7
1,174,750 UART: [idev] UDS.KEYID = 0
1,175,096 ready_for_fw is high
1,175,096 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,885 UART: [idev] Erasing UDS.KEYID = 0
1,200,340 UART: [idev] Sha1 KeyId Algorithm
1,209,199 UART: [idev] --
1,210,088 UART: [ldev] ++
1,210,256 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,047 UART: [ldev] AUTHORITY.KEYID = 7
1,211,510 UART: [ldev] FE.KEYID = 1
1,216,534 UART: [ldev] Erasing FE.KEYID = 1
1,243,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,363 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,057 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,927 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,633 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,579 UART: [ldev] --
1,281,993 UART: [fwproc] Wait for Commands...
1,282,690 UART: [fwproc] Recv command 0x46574c44
1,283,423 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,943 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,266 >>> mbox cmd response: success
2,337,410 UART: [afmc] ++
2,337,578 UART: [afmc] CDI.KEYID = 6
2,337,941 UART: [afmc] SUBJECT.KEYID = 7
2,338,367 UART: [afmc] AUTHORITY.KEYID = 5
2,373,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,989 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,708 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,601 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,308 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,197 UART: [afmc] --
2,417,108 UART: [cold-reset] --
2,418,016 UART: [state] Locking Datavault
2,419,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,025 UART: [state] Locking ICCM
2,420,525 UART: [exit] Launching FMC @ 0x40000130
2,425,854 UART:
2,425,870 UART: Running Caliptra FMC ...
2,426,278 UART:
2,426,332 UART: [state] CFI Enabled
2,436,803 UART: [fht] FMC Alias Private Key: 7
2,544,720 UART: [art] Extend RT PCRs Done
2,545,148 UART: [art] Lock RT PCRs Done
2,546,740 UART: [art] Populate DV Done
2,555,198 UART: [fht] FMC Alias Private Key: 7
2,556,186 UART: [art] Derive CDI
2,556,466 UART: [art] Store in in slot 0x4
2,642,177 UART: [art] Derive Key Pair
2,642,537 UART: [art] Store priv key in slot 0x5
2,655,431 UART: [art] Derive Key Pair - Done
2,670,028 UART: [art] Signing Cert with AUTHO
2,670,508 UART: RITY.KEYID = 7
2,685,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,657 UART: [art] PUB.X = 48EED749D94985DA9639CE6C1E7B59F50514C018B30942D04F5D9FF3DEA6A17EC33FCFAFD40B9598416E5474C49CF958
2,693,428 UART: [art] PUB.Y = 603D469A558D2767CCBF1410FD961BB0DCC18148014C100F9E60F4F10D0D17DDCA76A82C667CB08B041B273200F28992
2,700,343 UART: [art] SIG.R = BF2C4C6E16D52AC57C1D478ED5E84375D26DDD5404FCDA6FDFD8275A5C926E7454437AD05DB8F06E617251EA350B1549
2,707,119 UART: [art] SIG.S = BC800B5FB48A375DCA0A32D39123A46E03966545C71FA53103ABBEADA47BFB32635F091C03AF2F55AD6E5EF03E7E6620
2,731,362 UART: mbox::rt_entry...
2,731,734 UART: ____ _ _ _ ____ _____
2,732,518 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,318 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,854 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,622 UART: |_|
2,735,934 UART:
2,842,686 UART: [rt] Runtime listening for mailbox commands...
2,843,448 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,668 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,762 UART:
2,843,778 UART: Running Caliptra ROM ...
2,844,186 UART:
2,844,241 UART: [state] CFI Enabled
2,846,890 UART: [state] LifecycleState = Production
2,847,498 UART: [state] DebugLocked = Yes
2,848,026 UART: [state] Starting the WD Timer 40000000 cycles
2,849,553 UART: [kat] SHA2-256
3,653,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,232 UART: [kat] ++
3,657,384 UART: [kat] sha1
3,661,808 UART: [kat] SHA2-256
3,663,748 UART: [kat] SHA2-384
3,666,333 UART: [kat] SHA2-512-ACC
3,668,234 UART: [kat] ECC-384
3,678,025 UART: [kat] HMAC-384Kdf
3,682,427 UART: [kat] LMS
3,930,739 UART: [kat] --
3,931,713 UART: [warm-reset] ++
3,932,482 UART: [warm-reset] --
3,933,463 UART: [state] Locking Datavault
3,934,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,701 UART: [state] Locking ICCM
3,935,309 UART: [exit] Launching FMC @ 0x40000130
3,940,638 UART:
3,940,654 UART: Running Caliptra FMC ...
3,941,062 UART:
3,941,116 UART: [state] CFI Enabled
3,942,251 UART: [aliasrt :skip pcr extension
3,942,724 UART: [art] Extend RT PCRs Done
3,943,152 UART: [art] Lock RT PCRs Done
3,944,379 UART: [art] Populate DV Done
3,952,533 UART: [fht] FMC Alias Private Key: 7
3,953,557 UART: [art] Derive CDI
3,953,837 UART: [art] Store in in slot 0x4
4,039,240 UART: [art] Derive Key Pair
4,039,600 UART: [art] Store priv key in slot 0x5
4,053,012 UART: [art] Derive Key Pair - Done
4,067,991 UART: [art] Signing Cert with AUTHO
4,068,471 UART: RITY.KEYID = 7
4,083,917 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,682 UART: [art] PUB.X = 48EED749D94985DA9639CE6C1E7B59F50514C018B30942D04F5D9FF3DEA6A17EC33FCFAFD40B9598416E5474C49CF958
4,091,453 UART: [art] PUB.Y = 603D469A558D2767CCBF1410FD961BB0DCC18148014C100F9E60F4F10D0D17DDCA76A82C667CB08B041B273200F28992
4,098,368 UART: [art] SIG.R = BF2C4C6E16D52AC57C1D478ED5E84375D26DDD5404FCDA6FDFD8275A5C926E7454437AD05DB8F06E617251EA350B1549
4,105,144 UART: [art] SIG.S = BC800B5FB48A375DCA0A32D39123A46E03966545C71FA53103ABBEADA47BFB32635F091C03AF2F55AD6E5EF03E7E6620
4,128,949 UART: mbox::rt_entry...
4,129,321 UART: ____ _ _ _ ____ _____
4,130,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,209 UART: |_|
4,133,521 UART:
4,429,962 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,432,152 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Production
86,037 UART: [state] DebugLocked = Yes
86,711 UART: [state] Starting the WD Timer 40000000 cycles
88,186 UART: [kat] SHA2-256
891,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,865 UART: [kat] ++
896,017 UART: [kat] sha1
900,329 UART: [kat] SHA2-256
902,269 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,890 UART: [kat] HMAC-384Kdf
921,546 UART: [kat] LMS
1,169,858 UART: [kat] --
1,170,799 UART: [cold-reset] ++
1,171,312 UART: [fht] FHT @ 0x50003400
1,173,972 UART: [idev] ++
1,174,140 UART: [idev] CDI.KEYID = 6
1,174,501 UART: [idev] SUBJECT.KEYID = 7
1,174,926 UART: [idev] UDS.KEYID = 0
1,175,272 ready_for_fw is high
1,175,272 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,027 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,209,075 UART: [idev] --
1,210,100 UART: [ldev] ++
1,210,268 UART: [ldev] CDI.KEYID = 6
1,210,632 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,628 UART: [ldev] Erasing FE.KEYID = 1
1,242,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,689 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,559 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,265 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,277 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,277 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,119 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,372 >>> mbox cmd response: success
2,338,410 UART: [afmc] ++
2,338,578 UART: [afmc] CDI.KEYID = 6
2,338,941 UART: [afmc] SUBJECT.KEYID = 7
2,339,367 UART: [afmc] AUTHORITY.KEYID = 5
2,374,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,603 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,322 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,215 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,922 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,581 UART: [afmc] --
2,417,480 UART: [cold-reset] --
2,418,360 UART: [state] Locking Datavault
2,419,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,253 UART: [state] Locking ICCM
2,420,847 UART: [exit] Launching FMC @ 0x40000130
2,426,176 UART:
2,426,192 UART: Running Caliptra FMC ...
2,426,600 UART:
2,426,654 UART: [state] CFI Enabled
2,436,951 UART: [fht] FMC Alias Private Key: 7
2,544,530 UART: [art] Extend RT PCRs Done
2,544,958 UART: [art] Lock RT PCRs Done
2,546,282 UART: [art] Populate DV Done
2,554,376 UART: [fht] FMC Alias Private Key: 7
2,555,320 UART: [art] Derive CDI
2,555,600 UART: [art] Store in in slot 0x4
2,641,103 UART: [art] Derive Key Pair
2,641,463 UART: [art] Store priv key in slot 0x5
2,654,653 UART: [art] Derive Key Pair - Done
2,669,132 UART: [art] Signing Cert with AUTHO
2,669,612 UART: RITY.KEYID = 7
2,684,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,181 UART: [art] PUB.X = B7B68D15052805E8680B3A3F08EB3F56CA1AC76047C825421C3DDACB888F1BFFB4F7D45994B792910358208641ACC5CF
2,691,942 UART: [art] PUB.Y = 454528DBA11F07221C376AB05948BE77098B7AE74645C6DDDFE5080D3624E5B95C061400E86A04C1ACCE1373CF3B0FD2
2,698,855 UART: [art] SIG.R = 48DE512CBEAAF1AE6745CBEDB7EF99BFD1670CC680720EC061EE993DCB597A84D8FA48A81A44C0993B2E73BA9A9DD3B4
2,705,645 UART: [art] SIG.S = 04D14DB10E4370A0D19BA2738ECF23953E10EF410049D9CB561301BF7D47C8FD7B3ABE39AF171F57E7ADE007979EB7A0
2,728,840 UART: mbox::rt_entry...
2,729,212 UART: ____ _ _ _ ____ _____
2,729,996 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,796 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,332 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,100 UART: |_|
2,733,412 UART:
2,839,521 UART: [rt] Runtime listening for mailbox commands...
2,840,283 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,503 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,597 UART:
2,840,613 UART: Running Caliptra ROM ...
2,841,021 UART:
2,841,076 UART: [state] CFI Enabled
2,843,791 UART: [state] LifecycleState = Production
2,844,399 UART: [state] DebugLocked = Yes
2,844,971 UART: [state] Starting the WD Timer 40000000 cycles
2,846,502 UART: [kat] SHA2-256
3,650,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,181 UART: [kat] ++
3,654,333 UART: [kat] sha1
3,658,817 UART: [kat] SHA2-256
3,660,757 UART: [kat] SHA2-384
3,663,324 UART: [kat] SHA2-512-ACC
3,665,225 UART: [kat] ECC-384
3,674,898 UART: [kat] HMAC-384Kdf
3,679,430 UART: [kat] LMS
3,927,742 UART: [kat] --
3,928,706 UART: [warm-reset] ++
3,929,779 UART: [warm-reset] --
3,930,774 UART: [state] Locking Datavault
3,931,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,190 UART: [state] Locking ICCM
3,932,860 UART: [exit] Launching FMC @ 0x40000130
3,938,189 UART:
3,938,205 UART: Running Caliptra FMC ...
3,938,613 UART:
3,938,667 UART: [state] CFI Enabled
3,940,130 UART: [aliasrt :skip pcr extension
3,940,603 UART: [art] Extend RT PCRs Done
3,941,031 UART: [art] Lock RT PCRs Done
3,942,226 UART: [art] Populate DV Done
3,950,362 UART: [fht] FMC Alias Private Key: 7
3,951,318 UART: [art] Derive CDI
3,951,598 UART: [art] Store in in slot 0x4
4,037,207 UART: [art] Derive Key Pair
4,037,567 UART: [art] Store priv key in slot 0x5
4,050,709 UART: [art] Derive Key Pair - Done
4,065,220 UART: [art] Signing Cert with AUTHO
4,065,700 UART: RITY.KEYID = 7
4,081,144 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,909 UART: [art] PUB.X = B7B68D15052805E8680B3A3F08EB3F56CA1AC76047C825421C3DDACB888F1BFFB4F7D45994B792910358208641ACC5CF
4,088,670 UART: [art] PUB.Y = 454528DBA11F07221C376AB05948BE77098B7AE74645C6DDDFE5080D3624E5B95C061400E86A04C1ACCE1373CF3B0FD2
4,095,583 UART: [art] SIG.R = 48DE512CBEAAF1AE6745CBEDB7EF99BFD1670CC680720EC061EE993DCB597A84D8FA48A81A44C0993B2E73BA9A9DD3B4
4,102,373 UART: [art] SIG.S = 04D14DB10E4370A0D19BA2738ECF23953E10EF410049D9CB561301BF7D47C8FD7B3ABE39AF171F57E7ADE007979EB7A0
4,125,984 UART: mbox::rt_entry...
4,126,356 UART: ____ _ _ _ ____ _____
4,127,140 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,940 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,708 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,476 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,244 UART: |_|
4,130,556 UART:
4,419,644 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,421,866 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Production
86,156 UART: [state] DebugLocked = Yes
86,838 UART: [state] Starting the WD Timer 40000000 cycles
88,501 UART: [kat] SHA2-256
892,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,180 UART: [kat] ++
896,332 UART: [kat] sha1
900,624 UART: [kat] SHA2-256
902,564 UART: [kat] SHA2-384
905,505 UART: [kat] SHA2-512-ACC
907,406 UART: [kat] ECC-384
917,079 UART: [kat] HMAC-384Kdf
921,675 UART: [kat] LMS
1,169,987 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,137 UART: [fht] FHT @ 0x50003400
1,173,811 UART: [idev] ++
1,173,979 UART: [idev] CDI.KEYID = 6
1,174,340 UART: [idev] SUBJECT.KEYID = 7
1,174,765 UART: [idev] UDS.KEYID = 0
1,175,111 ready_for_fw is high
1,175,111 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,771 UART: [idev] Sha1 KeyId Algorithm
1,208,750 UART: [idev] --
1,209,561 UART: [ldev] ++
1,209,729 UART: [ldev] CDI.KEYID = 6
1,210,093 UART: [ldev] SUBJECT.KEYID = 5
1,210,520 UART: [ldev] AUTHORITY.KEYID = 7
1,210,983 UART: [ldev] FE.KEYID = 1
1,216,191 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,300 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,170 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,876 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,084 UART: [ldev] --
1,281,346 UART: [fwproc] Wait for Commands...
1,282,097 UART: [fwproc] Recv command 0x46574c44
1,282,830 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,628 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,047 >>> mbox cmd response: success
2,337,075 UART: [afmc] ++
2,337,243 UART: [afmc] CDI.KEYID = 6
2,337,606 UART: [afmc] SUBJECT.KEYID = 7
2,338,032 UART: [afmc] AUTHORITY.KEYID = 5
2,373,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,202 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,921 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,814 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,521 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,396 UART: [afmc] --
2,417,307 UART: [cold-reset] --
2,417,901 UART: [state] Locking Datavault
2,419,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,822 UART: [state] Locking ICCM
2,420,434 UART: [exit] Launching FMC @ 0x40000130
2,425,763 UART:
2,425,779 UART: Running Caliptra FMC ...
2,426,187 UART:
2,426,330 UART: [state] CFI Enabled
2,436,681 UART: [fht] FMC Alias Private Key: 7
2,544,554 UART: [art] Extend RT PCRs Done
2,544,982 UART: [art] Lock RT PCRs Done
2,546,390 UART: [art] Populate DV Done
2,554,450 UART: [fht] FMC Alias Private Key: 7
2,555,420 UART: [art] Derive CDI
2,555,700 UART: [art] Store in in slot 0x4
2,641,111 UART: [art] Derive Key Pair
2,641,471 UART: [art] Store priv key in slot 0x5
2,654,545 UART: [art] Derive Key Pair - Done
2,669,229 UART: [art] Signing Cert with AUTHO
2,669,709 UART: RITY.KEYID = 7
2,685,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,982 UART: [art] PUB.X = 905FF2BC20EB47AC8CFAC9BCBE3DCAF84F118E0ADBBDA574172448D13A5FC5CACFAA20C733BBBCBB0CED9B1E1F5D5F84
2,692,790 UART: [art] PUB.Y = 5C35B61D042A78CF31C6C74361A94C3D3108CAEE5D822C38A9735597B1FEDC4944EC643F666A7A3289297FEF9D3ABC89
2,699,742 UART: [art] SIG.R = 063DD32C8030EE2D6F55B4942086A0C578FB805718DF0B2A026E6B7015A6AD61F20689E11065A23716D3BE50C78CB1FC
2,706,502 UART: [art] SIG.S = DCA0116D861647C5393653FC9723587FDF4C6D5C43E8338B2AAF72CDC6C9412B51D024210C9B66D6574193D8AEC50CC1
2,729,761 UART: mbox::rt_entry...
2,730,133 UART: ____ _ _ _ ____ _____
2,730,917 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,717 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,485 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,021 UART: |_|
2,734,333 UART:
2,839,877 UART: [rt] Runtime listening for mailbox commands...
2,840,639 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,859 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,953 UART:
2,840,969 UART: Running Caliptra ROM ...
2,841,377 UART:
2,841,519 UART: [state] CFI Enabled
2,844,364 UART: [state] LifecycleState = Production
2,844,972 UART: [state] DebugLocked = Yes
2,845,708 UART: [state] Starting the WD Timer 40000000 cycles
2,847,213 UART: [kat] SHA2-256
3,650,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,892 UART: [kat] ++
3,655,044 UART: [kat] sha1
3,659,400 UART: [kat] SHA2-256
3,661,340 UART: [kat] SHA2-384
3,664,163 UART: [kat] SHA2-512-ACC
3,666,064 UART: [kat] ECC-384
3,675,909 UART: [kat] HMAC-384Kdf
3,680,439 UART: [kat] LMS
3,928,751 UART: [kat] --
3,929,467 UART: [warm-reset] ++
3,930,180 UART: [warm-reset] --
3,931,035 UART: [state] Locking Datavault
3,931,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,401 UART: [state] Locking ICCM
3,932,885 UART: [exit] Launching FMC @ 0x40000130
3,938,214 UART:
3,938,230 UART: Running Caliptra FMC ...
3,938,638 UART:
3,938,781 UART: [state] CFI Enabled
3,940,172 UART: [aliasrt :skip pcr extension
3,940,645 UART: [art] Extend RT PCRs Done
3,941,073 UART: [art] Lock RT PCRs Done
3,942,426 UART: [art] Populate DV Done
3,950,312 UART: [fht] FMC Alias Private Key: 7
3,951,492 UART: [art] Derive CDI
3,951,772 UART: [art] Store in in slot 0x4
4,037,413 UART: [art] Derive Key Pair
4,037,773 UART: [art] Store priv key in slot 0x5
4,051,251 UART: [art] Derive Key Pair - Done
4,065,733 UART: [art] Signing Cert with AUTHO
4,066,213 UART: RITY.KEYID = 7
4,081,327 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,092 UART: [art] PUB.X = 905FF2BC20EB47AC8CFAC9BCBE3DCAF84F118E0ADBBDA574172448D13A5FC5CACFAA20C733BBBCBB0CED9B1E1F5D5F84
4,088,900 UART: [art] PUB.Y = 5C35B61D042A78CF31C6C74361A94C3D3108CAEE5D822C38A9735597B1FEDC4944EC643F666A7A3289297FEF9D3ABC89
4,095,852 UART: [art] SIG.R = 063DD32C8030EE2D6F55B4942086A0C578FB805718DF0B2A026E6B7015A6AD61F20689E11065A23716D3BE50C78CB1FC
4,102,612 UART: [art] SIG.S = DCA0116D861647C5393653FC9723587FDF4C6D5C43E8338B2AAF72CDC6C9412B51D024210C9B66D6574193D8AEC50CC1
4,125,863 UART: mbox::rt_entry...
4,126,235 UART: ____ _ _ _ ____ _____
4,127,019 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,819 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,587 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,123 UART: |_|
4,130,435 UART:
4,424,246 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,286 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Production
86,056 UART: [state] DebugLocked = Yes
86,722 UART: [state] Starting the WD Timer 40000000 cycles
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,872 UART: [kat] ++
896,024 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
917,103 UART: [kat] HMAC-384Kdf
921,529 UART: [kat] LMS
1,169,841 UART: [kat] --
1,170,756 UART: [cold-reset] ++
1,171,293 UART: [fht] FHT @ 0x50003400
1,173,831 UART: [idev] ++
1,173,999 UART: [idev] CDI.KEYID = 6
1,174,360 UART: [idev] SUBJECT.KEYID = 7
1,174,785 UART: [idev] UDS.KEYID = 0
1,175,131 ready_for_fw is high
1,175,131 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,944 UART: [idev] Erasing UDS.KEYID = 0
1,200,151 UART: [idev] Sha1 KeyId Algorithm
1,209,230 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,819 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,941 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,360 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,054 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,924 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,630 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,812 UART: [ldev] --
1,283,088 UART: [fwproc] Wait for Commands...
1,283,843 UART: [fwproc] Recv command 0x46574c44
1,284,576 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,682 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,061 >>> mbox cmd response: success
2,339,219 UART: [afmc] ++
2,339,387 UART: [afmc] CDI.KEYID = 6
2,339,750 UART: [afmc] SUBJECT.KEYID = 7
2,340,176 UART: [afmc] AUTHORITY.KEYID = 5
2,375,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,054 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,773 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,666 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,373 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,392 UART: [afmc] --
2,419,283 UART: [cold-reset] --
2,420,083 UART: [state] Locking Datavault
2,421,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,774 UART: [state] Locking ICCM
2,422,270 UART: [exit] Launching FMC @ 0x40000130
2,427,599 UART:
2,427,615 UART: Running Caliptra FMC ...
2,428,023 UART:
2,428,166 UART: [state] CFI Enabled
2,439,125 UART: [fht] FMC Alias Private Key: 7
2,546,958 UART: [art] Extend RT PCRs Done
2,547,386 UART: [art] Lock RT PCRs Done
2,549,028 UART: [art] Populate DV Done
2,557,248 UART: [fht] FMC Alias Private Key: 7
2,558,318 UART: [art] Derive CDI
2,558,598 UART: [art] Store in in slot 0x4
2,644,383 UART: [art] Derive Key Pair
2,644,743 UART: [art] Store priv key in slot 0x5
2,657,855 UART: [art] Derive Key Pair - Done
2,672,486 UART: [art] Signing Cert with AUTHO
2,672,966 UART: RITY.KEYID = 7
2,688,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,021 UART: [art] PUB.X = 5265B8131A628EEFAD7D672435EE8F0909E3FF12C9111462EBE6570101F1587B0D1258FB955DEE2AD05E96D68F74B7CD
2,695,782 UART: [art] PUB.Y = AEA7AC3621082D76B552051E5D8196E1333331CD020BFA0A76024D2853E3C7BEE0459E905163C9E9D98084E3AEFA1CA1
2,702,718 UART: [art] SIG.R = B1E14D845AB7DDA4019B56B22233A6A5F32EF43100F32E4DDD82A824E82D9C96E2128616DFDD1D5C91646BA34AD55B14
2,709,473 UART: [art] SIG.S = A6A5CFE33B0031C60FC3F3DD379E017652F3A5A2EB4784BC1C892FFBCFCE671C3A53E5ED3E5226B6FAD5790B08B36F6B
2,733,144 UART: mbox::rt_entry...
2,733,516 UART: ____ _ _ _ ____ _____
2,734,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,404 UART: |_|
2,737,716 UART:
2,844,264 UART: [rt] Runtime listening for mailbox commands...
2,845,026 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,845,246 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,340 UART:
2,845,356 UART: Running Caliptra ROM ...
2,845,764 UART:
2,845,906 UART: [state] CFI Enabled
2,848,643 UART: [state] LifecycleState = Production
2,849,251 UART: [state] DebugLocked = Yes
2,849,815 UART: [state] Starting the WD Timer 40000000 cycles
2,851,396 UART: [kat] SHA2-256
3,654,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,075 UART: [kat] ++
3,659,227 UART: [kat] sha1
3,663,311 UART: [kat] SHA2-256
3,665,251 UART: [kat] SHA2-384
3,668,082 UART: [kat] SHA2-512-ACC
3,669,983 UART: [kat] ECC-384
3,679,480 UART: [kat] HMAC-384Kdf
3,684,050 UART: [kat] LMS
3,932,362 UART: [kat] --
3,933,160 UART: [warm-reset] ++
3,934,239 UART: [warm-reset] --
3,934,872 UART: [state] Locking Datavault
3,935,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,162 UART: [state] Locking ICCM
3,936,830 UART: [exit] Launching FMC @ 0x40000130
3,942,159 UART:
3,942,175 UART: Running Caliptra FMC ...
3,942,583 UART:
3,942,726 UART: [state] CFI Enabled
3,944,257 UART: [aliasrt :skip pcr extension
3,944,730 UART: [art] Extend RT PCRs Done
3,945,158 UART: [art] Lock RT PCRs Done
3,946,447 UART: [art] Populate DV Done
3,954,551 UART: [fht] FMC Alias Private Key: 7
3,955,639 UART: [art] Derive CDI
3,955,919 UART: [art] Store in in slot 0x4
4,041,786 UART: [art] Derive Key Pair
4,042,146 UART: [art] Store priv key in slot 0x5
4,055,908 UART: [art] Derive Key Pair - Done
4,070,325 UART: [art] Signing Cert with AUTHO
4,070,805 UART: RITY.KEYID = 7
4,085,847 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,612 UART: [art] PUB.X = 5265B8131A628EEFAD7D672435EE8F0909E3FF12C9111462EBE6570101F1587B0D1258FB955DEE2AD05E96D68F74B7CD
4,093,373 UART: [art] PUB.Y = AEA7AC3621082D76B552051E5D8196E1333331CD020BFA0A76024D2853E3C7BEE0459E905163C9E9D98084E3AEFA1CA1
4,100,309 UART: [art] SIG.R = B1E14D845AB7DDA4019B56B22233A6A5F32EF43100F32E4DDD82A824E82D9C96E2128616DFDD1D5C91646BA34AD55B14
4,107,064 UART: [art] SIG.S = A6A5CFE33B0031C60FC3F3DD379E017652F3A5A2EB4784BC1C892FFBCFCE671C3A53E5ED3E5226B6FAD5790B08B36F6B
4,130,803 UART: mbox::rt_entry...
4,131,175 UART: ____ _ _ _ ____ _____
4,131,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,063 UART: |_|
4,135,375 UART:
4,427,490 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,546 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Production
85,535 UART: [state] DebugLocked = Yes
86,249 UART: [state] Starting the WD Timer 40000000 cycles
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
900,137 UART: [kat] SHA2-256
902,077 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,595 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,704 UART: [idev] ++
1,173,872 UART: [idev] CDI.KEYID = 6
1,174,233 UART: [idev] SUBJECT.KEYID = 7
1,174,658 UART: [idev] UDS.KEYID = 0
1,175,004 ready_for_fw is high
1,175,004 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,524 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,216,002 UART: [ldev] Erasing FE.KEYID = 1
1,242,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,419 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,113 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,983 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,689 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,519 UART: [ldev] --
1,280,795 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,777 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,174 >>> mbox cmd response: success
2,337,340 UART: [afmc] ++
2,337,508 UART: [afmc] CDI.KEYID = 6
2,337,871 UART: [afmc] SUBJECT.KEYID = 7
2,338,297 UART: [afmc] AUTHORITY.KEYID = 5
2,373,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,559 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,278 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,171 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,878 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,647 UART: [afmc] --
2,416,704 UART: [cold-reset] --
2,417,532 UART: [state] Locking Datavault
2,418,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,071 UART: [state] Locking ICCM
2,419,737 UART: [exit] Launching FMC @ 0x40000130
2,425,066 UART:
2,425,082 UART: Running Caliptra FMC ...
2,425,490 UART:
2,425,544 UART: [state] CFI Enabled
2,436,057 UART: [fht] FMC Alias Private Key: 7
2,543,600 UART: [art] Extend RT PCRs Done
2,544,028 UART: [art] Lock RT PCRs Done
2,546,006 UART: [art] Populate DV Done
2,554,644 UART: [fht] FMC Alias Private Key: 7
2,555,766 UART: [art] Derive CDI
2,556,046 UART: [art] Store in in slot 0x4
2,641,951 UART: [art] Derive Key Pair
2,642,311 UART: [art] Store priv key in slot 0x5
2,654,925 UART: [art] Derive Key Pair - Done
2,669,559 UART: [art] Signing Cert with AUTHO
2,670,039 UART: RITY.KEYID = 7
2,685,233 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,998 UART: [art] PUB.X = 9777B460D0CAFB537D91D44E907C56FDA04A240A7F56CD0A5010387AE4B72181C6D74550EE7840D3F7DA51BC15E2DAEF
2,692,774 UART: [art] PUB.Y = 7F5AE308B09E2ADE3B0425B0E08C381A134E3791D1BAA71FB8F2F2AC784F210CD9696C39AA6A1175E688C31F60E593F8
2,699,725 UART: [art] SIG.R = C955B31137C12156BAE61E4D68D03FA5D5983783949ABE858455815BC71789EE98C57F607AC496142207072085D05C54
2,706,477 UART: [art] SIG.S = DAB61041E41453CE9AB8539B3AADA07F67C7394414CDFEEC302DD7AE2553CC7B39C9B400C4C9D7D76779DFCCD5537A00
2,730,046 UART: mbox::rt_entry...
2,730,418 UART: ____ _ _ _ ____ _____
2,731,202 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,002 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,770 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,538 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,306 UART: |_|
2,734,618 UART:
2,841,216 UART: [rt] Runtime listening for mailbox commands...
2,841,978 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,198 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,292 UART:
2,842,308 UART: Running Caliptra ROM ...
2,842,716 UART:
2,842,771 UART: [state] CFI Enabled
2,845,410 UART: [state] LifecycleState = Production
2,846,018 UART: [state] DebugLocked = Yes
2,846,586 UART: [state] Starting the WD Timer 40000000 cycles
2,848,265 UART: [kat] SHA2-256
3,651,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,944 UART: [kat] ++
3,656,096 UART: [kat] sha1
3,660,250 UART: [kat] SHA2-256
3,662,190 UART: [kat] SHA2-384
3,664,987 UART: [kat] SHA2-512-ACC
3,666,888 UART: [kat] ECC-384
3,676,219 UART: [kat] HMAC-384Kdf
3,680,801 UART: [kat] LMS
3,929,113 UART: [kat] --
3,929,807 UART: [warm-reset] ++
3,930,738 UART: [warm-reset] --
3,931,665 UART: [state] Locking Datavault
3,932,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,095 UART: [state] Locking ICCM
3,933,643 UART: [exit] Launching FMC @ 0x40000130
3,938,972 UART:
3,938,988 UART: Running Caliptra FMC ...
3,939,396 UART:
3,939,450 UART: [state] CFI Enabled
3,940,731 UART: [aliasrt :skip pcr extension
3,941,204 UART: [art] Extend RT PCRs Done
3,941,632 UART: [art] Lock RT PCRs Done
3,942,823 UART: [art] Populate DV Done
3,951,083 UART: [fht] FMC Alias Private Key: 7
3,952,029 UART: [art] Derive CDI
3,952,309 UART: [art] Store in in slot 0x4
4,038,324 UART: [art] Derive Key Pair
4,038,684 UART: [art] Store priv key in slot 0x5
4,052,156 UART: [art] Derive Key Pair - Done
4,067,214 UART: [art] Signing Cert with AUTHO
4,067,694 UART: RITY.KEYID = 7
4,082,986 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,751 UART: [art] PUB.X = 9777B460D0CAFB537D91D44E907C56FDA04A240A7F56CD0A5010387AE4B72181C6D74550EE7840D3F7DA51BC15E2DAEF
4,090,527 UART: [art] PUB.Y = 7F5AE308B09E2ADE3B0425B0E08C381A134E3791D1BAA71FB8F2F2AC784F210CD9696C39AA6A1175E688C31F60E593F8
4,097,478 UART: [art] SIG.R = C955B31137C12156BAE61E4D68D03FA5D5983783949ABE858455815BC71789EE98C57F607AC496142207072085D05C54
4,104,230 UART: [art] SIG.S = DAB61041E41453CE9AB8539B3AADA07F67C7394414CDFEEC302DD7AE2553CC7B39C9B400C4C9D7D76779DFCCD5537A00
4,128,061 UART: mbox::rt_entry...
4,128,433 UART: ____ _ _ _ ____ _____
4,129,217 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,017 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,785 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,553 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,321 UART: |_|
4,132,633 UART:
4,424,200 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,224 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Production
86,145 UART: [state] DebugLocked = Yes
86,679 UART: [state] Starting the WD Timer 40000000 cycles
88,238 UART: [kat] SHA2-256
891,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,917 UART: [kat] ++
896,069 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 ready_for_fw is high
1,174,920 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,414 UART: [ldev] ++
1,209,582 UART: [ldev] CDI.KEYID = 6
1,209,946 UART: [ldev] SUBJECT.KEYID = 5
1,210,373 UART: [ldev] AUTHORITY.KEYID = 7
1,210,836 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,113 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,807 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,677 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,383 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,469 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,997 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,480 >>> mbox cmd response: success
2,338,536 UART: [afmc] ++
2,338,704 UART: [afmc] CDI.KEYID = 6
2,339,067 UART: [afmc] SUBJECT.KEYID = 7
2,339,493 UART: [afmc] AUTHORITY.KEYID = 5
2,375,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,843 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,562 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,455 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,162 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,047 UART: [afmc] --
2,417,998 UART: [cold-reset] --
2,418,946 UART: [state] Locking Datavault
2,419,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,389 UART: [state] Locking ICCM
2,421,023 UART: [exit] Launching FMC @ 0x40000130
2,426,352 UART:
2,426,368 UART: Running Caliptra FMC ...
2,426,776 UART:
2,426,830 UART: [state] CFI Enabled
2,437,293 UART: [fht] FMC Alias Private Key: 7
2,545,548 UART: [art] Extend RT PCRs Done
2,545,976 UART: [art] Lock RT PCRs Done
2,547,644 UART: [art] Populate DV Done
2,556,042 UART: [fht] FMC Alias Private Key: 7
2,557,070 UART: [art] Derive CDI
2,557,350 UART: [art] Store in in slot 0x4
2,642,653 UART: [art] Derive Key Pair
2,643,013 UART: [art] Store priv key in slot 0x5
2,656,125 UART: [art] Derive Key Pair - Done
2,670,700 UART: [art] Signing Cert with AUTHO
2,671,180 UART: RITY.KEYID = 7
2,686,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,075 UART: [art] PUB.X = 798D068EE8CC557109172F68508A0CE3BB4943077FF44B9E0B298FE870B89B8312891C5ECA2D27487A5D009F0796CE94
2,693,803 UART: [art] PUB.Y = 34F2EAF902E5BC49B85D44BE09125B3F4C2640BB7556F06B68C4FC3404DA72E6EFDD84289942CAFBFABB9B00556928B7
2,700,736 UART: [art] SIG.R = C9B54BEC8831291B8C824F22EEEC8122400503DCB12670DDFBD68FB3E7DC8ACE0ABBC659DFF99C9F2676545C0B16B9F0
2,707,514 UART: [art] SIG.S = 9E1946F47C6D8444D9B867585AF67D442BB5ABBD8AFD70452965173372A3C7E1E8E18F49634DFCC63547F03306AD3CC9
2,731,136 UART: mbox::rt_entry...
2,731,508 UART: ____ _ _ _ ____ _____
2,732,292 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,092 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,860 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,396 UART: |_|
2,735,708 UART:
2,842,186 UART: [rt] Runtime listening for mailbox commands...
2,842,948 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,168 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,262 UART:
2,843,278 UART: Running Caliptra ROM ...
2,843,686 UART:
2,843,741 UART: [state] CFI Enabled
2,846,222 UART: [state] LifecycleState = Production
2,846,830 UART: [state] DebugLocked = Yes
2,847,518 UART: [state] Starting the WD Timer 40000000 cycles
2,849,161 UART: [kat] SHA2-256
3,652,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,840 UART: [kat] ++
3,656,992 UART: [kat] sha1
3,661,252 UART: [kat] SHA2-256
3,663,192 UART: [kat] SHA2-384
3,665,817 UART: [kat] SHA2-512-ACC
3,667,718 UART: [kat] ECC-384
3,677,225 UART: [kat] HMAC-384Kdf
3,681,657 UART: [kat] LMS
3,929,969 UART: [kat] --
3,931,051 UART: [warm-reset] ++
3,932,340 UART: [warm-reset] --
3,933,463 UART: [state] Locking Datavault
3,934,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,825 UART: [state] Locking ICCM
3,935,473 UART: [exit] Launching FMC @ 0x40000130
3,940,802 UART:
3,940,818 UART: Running Caliptra FMC ...
3,941,226 UART:
3,941,280 UART: [state] CFI Enabled
3,942,541 UART: [aliasrt :skip pcr extension
3,943,014 UART: [art] Extend RT PCRs Done
3,943,442 UART: [art] Lock RT PCRs Done
3,945,003 UART: [art] Populate DV Done
3,953,411 UART: [fht] FMC Alias Private Key: 7
3,954,351 UART: [art] Derive CDI
3,954,631 UART: [art] Store in in slot 0x4
4,040,180 UART: [art] Derive Key Pair
4,040,540 UART: [art] Store priv key in slot 0x5
4,054,046 UART: [art] Derive Key Pair - Done
4,068,945 UART: [art] Signing Cert with AUTHO
4,069,425 UART: RITY.KEYID = 7
4,084,705 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,470 UART: [art] PUB.X = 798D068EE8CC557109172F68508A0CE3BB4943077FF44B9E0B298FE870B89B8312891C5ECA2D27487A5D009F0796CE94
4,092,198 UART: [art] PUB.Y = 34F2EAF902E5BC49B85D44BE09125B3F4C2640BB7556F06B68C4FC3404DA72E6EFDD84289942CAFBFABB9B00556928B7
4,099,131 UART: [art] SIG.R = C9B54BEC8831291B8C824F22EEEC8122400503DCB12670DDFBD68FB3E7DC8ACE0ABBC659DFF99C9F2676545C0B16B9F0
4,105,909 UART: [art] SIG.S = 9E1946F47C6D8444D9B867585AF67D442BB5ABBD8AFD70452965173372A3C7E1E8E18F49634DFCC63547F03306AD3CC9
4,129,613 UART: mbox::rt_entry...
4,129,985 UART: ____ _ _ _ ____ _____
4,130,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,337 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,873 UART: |_|
4,134,185 UART:
4,433,136 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,435,316 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Production
85,676 UART: [state] DebugLocked = Yes
86,378 UART: [state] Starting the WD Timer 40000000 cycles
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,401 UART: [kat] LMS
1,169,713 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,613 UART: [idev] ++
1,173,781 UART: [idev] CDI.KEYID = 6
1,174,142 UART: [idev] SUBJECT.KEYID = 7
1,174,567 UART: [idev] UDS.KEYID = 0
1,174,913 ready_for_fw is high
1,174,913 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,007 UART: [idev] Sha1 KeyId Algorithm
1,208,862 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,056 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,750 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,620 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,326 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,590 UART: [ldev] --
1,282,034 UART: [fwproc] Wait for Commands...
1,282,749 UART: [fwproc] Recv command 0x46574c44
1,283,482 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,590 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,895 >>> mbox cmd response: success
2,338,001 UART: [afmc] ++
2,338,169 UART: [afmc] CDI.KEYID = 6
2,338,532 UART: [afmc] SUBJECT.KEYID = 7
2,338,958 UART: [afmc] AUTHORITY.KEYID = 5
2,374,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,420 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,139 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,032 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,739 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,566 UART: [afmc] --
2,418,607 UART: [cold-reset] --
2,419,457 UART: [state] Locking Datavault
2,420,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,064 UART: [state] Locking ICCM
2,421,560 UART: [exit] Launching FMC @ 0x40000130
2,426,889 UART:
2,426,905 UART: Running Caliptra FMC ...
2,427,313 UART:
2,427,456 UART: [state] CFI Enabled
2,437,885 UART: [fht] FMC Alias Private Key: 7
2,545,232 UART: [art] Extend RT PCRs Done
2,545,660 UART: [art] Lock RT PCRs Done
2,547,026 UART: [art] Populate DV Done
2,555,418 UART: [fht] FMC Alias Private Key: 7
2,556,464 UART: [art] Derive CDI
2,556,744 UART: [art] Store in in slot 0x4
2,642,301 UART: [art] Derive Key Pair
2,642,661 UART: [art] Store priv key in slot 0x5
2,656,391 UART: [art] Derive Key Pair - Done
2,671,167 UART: [art] Signing Cert with AUTHO
2,671,647 UART: RITY.KEYID = 7
2,687,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,026 UART: [art] PUB.X = C96A3BCEFD500690E2DB9BE2A48414A49346923EE7A84278843DC4F45CBB3FD9449A38D135FEE1D2A79715FC9BDC55DB
2,694,809 UART: [art] PUB.Y = 25D869FDEB7EFCF95569037083B23531F15FDDDB5D7D2455D8E029C8974AE581B9D9037594ED4D54256227CEB66C3A1F
2,701,759 UART: [art] SIG.R = 2B42F754907529A557AEFCEAAC3858F7BEC223F9CEA60B832AA249C1BB1D9A3B42762C57EF997512F0D72920BB30604B
2,708,536 UART: [art] SIG.S = EF1F403242C9D11712B22EF3DB005DFF111A90688BF328E19F2044F5E95CA36A14F0CED904961D3E1F0088DB5AA7F509
2,732,063 UART: mbox::rt_entry...
2,732,435 UART: ____ _ _ _ ____ _____
2,733,219 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,019 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,787 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,323 UART: |_|
2,736,635 UART:
2,843,021 UART: [rt] Runtime listening for mailbox commands...
2,843,783 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,003 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,097 UART:
2,844,113 UART: Running Caliptra ROM ...
2,844,521 UART:
2,844,663 UART: [state] CFI Enabled
2,847,550 UART: [state] LifecycleState = Production
2,848,158 UART: [state] DebugLocked = Yes
2,848,882 UART: [state] Starting the WD Timer 40000000 cycles
2,850,411 UART: [kat] SHA2-256
3,653,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,090 UART: [kat] ++
3,658,242 UART: [kat] sha1
3,662,480 UART: [kat] SHA2-256
3,664,420 UART: [kat] SHA2-384
3,667,121 UART: [kat] SHA2-512-ACC
3,669,022 UART: [kat] ECC-384
3,678,533 UART: [kat] HMAC-384Kdf
3,682,989 UART: [kat] LMS
3,931,301 UART: [kat] --
3,932,381 UART: [warm-reset] ++
3,933,106 UART: [warm-reset] --
3,933,943 UART: [state] Locking Datavault
3,934,781 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,385 UART: [state] Locking ICCM
3,935,823 UART: [exit] Launching FMC @ 0x40000130
3,941,152 UART:
3,941,168 UART: Running Caliptra FMC ...
3,941,576 UART:
3,941,719 UART: [state] CFI Enabled
3,943,302 UART: [aliasrt :skip pcr extension
3,943,775 UART: [art] Extend RT PCRs Done
3,944,203 UART: [art] Lock RT PCRs Done
3,945,350 UART: [art] Populate DV Done
3,953,920 UART: [fht] FMC Alias Private Key: 7
3,954,900 UART: [art] Derive CDI
3,955,180 UART: [art] Store in in slot 0x4
4,041,051 UART: [art] Derive Key Pair
4,041,411 UART: [art] Store priv key in slot 0x5
4,054,229 UART: [art] Derive Key Pair - Done
4,068,927 UART: [art] Signing Cert with AUTHO
4,069,407 UART: RITY.KEYID = 7
4,084,583 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,348 UART: [art] PUB.X = C96A3BCEFD500690E2DB9BE2A48414A49346923EE7A84278843DC4F45CBB3FD9449A38D135FEE1D2A79715FC9BDC55DB
4,092,131 UART: [art] PUB.Y = 25D869FDEB7EFCF95569037083B23531F15FDDDB5D7D2455D8E029C8974AE581B9D9037594ED4D54256227CEB66C3A1F
4,099,081 UART: [art] SIG.R = 2B42F754907529A557AEFCEAAC3858F7BEC223F9CEA60B832AA249C1BB1D9A3B42762C57EF997512F0D72920BB30604B
4,105,858 UART: [art] SIG.S = EF1F403242C9D11712B22EF3DB005DFF111A90688BF328E19F2044F5E95CA36A14F0CED904961D3E1F0088DB5AA7F509
4,129,337 UART: mbox::rt_entry...
4,129,709 UART: ____ _ _ _ ____ _____
4,130,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,293 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,829 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,597 UART: |_|
4,133,909 UART:
4,427,402 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,592 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Production
86,066 UART: [state] DebugLocked = Yes
86,750 UART: [state] Starting the WD Timer 40000000 cycles
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,174,787 ready_for_fw is high
1,174,787 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,241,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,290 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,984 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,854 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,560 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,602 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,112 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,607 >>> mbox cmd response: success
2,337,799 UART: [afmc] ++
2,337,967 UART: [afmc] CDI.KEYID = 6
2,338,330 UART: [afmc] SUBJECT.KEYID = 7
2,338,756 UART: [afmc] AUTHORITY.KEYID = 5
2,374,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,870 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,589 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,482 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,189 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,806 UART: [afmc] --
2,417,759 UART: [cold-reset] --
2,418,703 UART: [state] Locking Datavault
2,419,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,432 UART: [state] Locking ICCM
2,421,044 UART: [exit] Launching FMC @ 0x40000130
2,426,373 UART:
2,426,389 UART: Running Caliptra FMC ...
2,426,797 UART:
2,426,940 UART: [state] CFI Enabled
2,437,183 UART: [fht] FMC Alias Private Key: 7
2,544,754 UART: [art] Extend RT PCRs Done
2,545,182 UART: [art] Lock RT PCRs Done
2,546,456 UART: [art] Populate DV Done
2,554,682 UART: [fht] FMC Alias Private Key: 7
2,555,758 UART: [art] Derive CDI
2,556,038 UART: [art] Store in in slot 0x4
2,641,589 UART: [art] Derive Key Pair
2,641,949 UART: [art] Store priv key in slot 0x5
2,655,385 UART: [art] Derive Key Pair - Done
2,669,910 UART: [art] Signing Cert with AUTHO
2,670,390 UART: RITY.KEYID = 7
2,685,136 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,901 UART: [art] PUB.X = 76E8F800FE07F07D8D4495485AE0A1DCD73701D67CC9DF975AA97AF13333FB0B04B0BDCA2AC9CCEBE181292E251C4C45
2,692,655 UART: [art] PUB.Y = F26C65E92A0DBFA5444B24D924EAC6796990885FAE06887A2733F98BB946480065980C02D8C44957E0C474BB1AE35141
2,699,567 UART: [art] SIG.R = 39225C70B62529ADFEAA07321FBFF45AEB440A7F401B54144CDD46649B20BD7F7A03A53C12750B427846972D75CAE8FA
2,706,333 UART: [art] SIG.S = 9E93F9DE7CB7D4CE45F168E6D927B8194D3AE5E7C230392539AB5FFA26084578DBFED744CAA64C6B8D20F8F4180D1CD4
2,730,534 UART: mbox::rt_entry...
2,730,906 UART: ____ _ _ _ ____ _____
2,731,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,258 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,794 UART: |_|
2,735,106 UART:
2,841,888 UART: [rt] Runtime listening for mailbox commands...
2,842,650 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,870 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,964 UART:
2,842,980 UART: Running Caliptra ROM ...
2,843,388 UART:
2,843,530 UART: [state] CFI Enabled
2,846,249 UART: [state] LifecycleState = Production
2,846,857 UART: [state] DebugLocked = Yes
2,847,613 UART: [state] Starting the WD Timer 40000000 cycles
2,849,174 UART: [kat] SHA2-256
3,652,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,853 UART: [kat] ++
3,657,005 UART: [kat] sha1
3,661,483 UART: [kat] SHA2-256
3,663,423 UART: [kat] SHA2-384
3,666,240 UART: [kat] SHA2-512-ACC
3,668,141 UART: [kat] ECC-384
3,678,050 UART: [kat] HMAC-384Kdf
3,682,816 UART: [kat] LMS
3,931,128 UART: [kat] --
3,932,098 UART: [warm-reset] ++
3,932,831 UART: [warm-reset] --
3,933,698 UART: [state] Locking Datavault
3,934,390 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,994 UART: [state] Locking ICCM
3,935,564 UART: [exit] Launching FMC @ 0x40000130
3,940,893 UART:
3,940,909 UART: Running Caliptra FMC ...
3,941,317 UART:
3,941,460 UART: [state] CFI Enabled
3,942,807 UART: [aliasrt :skip pcr extension
3,943,280 UART: [art] Extend RT PCRs Done
3,943,708 UART: [art] Lock RT PCRs Done
3,944,857 UART: [art] Populate DV Done
3,953,035 UART: [fht] FMC Alias Private Key: 7
3,954,129 UART: [art] Derive CDI
3,954,409 UART: [art] Store in in slot 0x4
4,040,212 UART: [art] Derive Key Pair
4,040,572 UART: [art] Store priv key in slot 0x5
4,053,626 UART: [art] Derive Key Pair - Done
4,068,595 UART: [art] Signing Cert with AUTHO
4,069,075 UART: RITY.KEYID = 7
4,084,237 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,002 UART: [art] PUB.X = 76E8F800FE07F07D8D4495485AE0A1DCD73701D67CC9DF975AA97AF13333FB0B04B0BDCA2AC9CCEBE181292E251C4C45
4,091,756 UART: [art] PUB.Y = F26C65E92A0DBFA5444B24D924EAC6796990885FAE06887A2733F98BB946480065980C02D8C44957E0C474BB1AE35141
4,098,668 UART: [art] SIG.R = 39225C70B62529ADFEAA07321FBFF45AEB440A7F401B54144CDD46649B20BD7F7A03A53C12750B427846972D75CAE8FA
4,105,434 UART: [art] SIG.S = 9E93F9DE7CB7D4CE45F168E6D927B8194D3AE5E7C230392539AB5FFA26084578DBFED744CAA64C6B8D20F8F4180D1CD4
4,128,379 UART: mbox::rt_entry...
4,128,751 UART: ____ _ _ _ ____ _____
4,129,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,335 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,103 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,871 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,639 UART: |_|
4,132,951 UART:
4,424,860 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,064 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Production
85,597 UART: [state] DebugLocked = Yes
86,355 UART: [state] Starting the WD Timer 40000000 cycles
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
915,832 UART: [kat] HMAC-384Kdf
920,320 UART: [kat] LMS
1,168,632 UART: [kat] --
1,169,395 UART: [cold-reset] ++
1,169,736 UART: [fht] FHT @ 0x50003400
1,172,592 UART: [idev] ++
1,172,760 UART: [idev] CDI.KEYID = 6
1,173,121 UART: [idev] SUBJECT.KEYID = 7
1,173,546 UART: [idev] UDS.KEYID = 0
1,173,892 ready_for_fw is high
1,173,892 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,455 UART: [idev] Erasing UDS.KEYID = 0
1,198,262 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,214,794 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,385 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,079 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,855 UART: [ldev] --
1,280,283 UART: [fwproc] Wait for Commands...
1,281,084 UART: [fwproc] Recv command 0x46574c44
1,281,817 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,459 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,948 >>> mbox cmd response: success
2,337,096 UART: [afmc] ++
2,337,264 UART: [afmc] CDI.KEYID = 6
2,337,627 UART: [afmc] SUBJECT.KEYID = 7
2,338,053 UART: [afmc] AUTHORITY.KEYID = 5
2,373,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,869 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,588 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,481 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,188 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,933 UART: [afmc] --
2,417,026 UART: [cold-reset] --
2,417,674 UART: [state] Locking Datavault
2,418,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,471 UART: [state] Locking ICCM
2,420,015 UART: [exit] Launching FMC @ 0x40000130
2,425,344 UART:
2,425,360 UART: Running Caliptra FMC ...
2,425,768 UART:
2,425,822 UART: [state] CFI Enabled
2,436,137 UART: [fht] FMC Alias Private Key: 7
2,543,204 UART: [art] Extend RT PCRs Done
2,543,632 UART: [art] Lock RT PCRs Done
2,545,276 UART: [art] Populate DV Done
2,553,268 UART: [fht] FMC Alias Private Key: 7
2,554,324 UART: [art] Derive CDI
2,554,604 UART: [art] Store in in slot 0x4
2,640,045 UART: [art] Derive Key Pair
2,640,405 UART: [art] Store priv key in slot 0x5
2,652,945 UART: [art] Derive Key Pair - Done
2,667,722 UART: [art] Signing Cert with AUTHO
2,668,202 UART: RITY.KEYID = 7
2,683,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,167 UART: [art] PUB.X = AF4FF09E9E6B29C53B091036AD6AC5F43BE71772551554D99DFBEDB19165A684E4FF168FA9290269C391B2F15AC415DD
2,690,941 UART: [art] PUB.Y = 3E6605BF955339D7D9C223F8DAE5EC97C463D09BD7E4AFC690C1E8BBB82E70E13F8A6BBAFC13C9ACB4BC360EF6998F19
2,697,909 UART: [art] SIG.R = 4C257108A79F922D1C4197B7BBF925B0137AC659096BB46F563D5A8C077E6718932C431A8027097BA8B91FF56F4C14C9
2,704,663 UART: [art] SIG.S = 33475A1E1B4BD42D9913643AD33AC6AD804DDB4029AAF7F842A7482605CA6E909694AC37D9588775A80D15D2BF22A111
2,728,126 UART: mbox::rt_entry...
2,728,498 UART: ____ _ _ _ ____ _____
2,729,282 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,082 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,850 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,618 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,386 UART: |_|
2,732,698 UART:
2,839,149 UART: [rt] Runtime listening for mailbox commands...
2,839,911 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,131 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,225 UART:
2,840,241 UART: Running Caliptra ROM ...
2,840,649 UART:
2,840,704 UART: [state] CFI Enabled
2,843,623 UART: [state] LifecycleState = Production
2,844,231 UART: [state] DebugLocked = Yes
2,844,929 UART: [state] Starting the WD Timer 40000000 cycles
2,846,458 UART: [kat] SHA2-256
3,650,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,137 UART: [kat] ++
3,654,289 UART: [kat] sha1
3,658,737 UART: [kat] SHA2-256
3,660,677 UART: [kat] SHA2-384
3,663,434 UART: [kat] SHA2-512-ACC
3,665,335 UART: [kat] ECC-384
3,675,006 UART: [kat] HMAC-384Kdf
3,679,632 UART: [kat] LMS
3,927,944 UART: [kat] --
3,929,062 UART: [warm-reset] ++
3,930,055 UART: [warm-reset] --
3,930,918 UART: [state] Locking Datavault
3,931,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,160 UART: [state] Locking ICCM
3,932,594 UART: [exit] Launching FMC @ 0x40000130
3,937,923 UART:
3,937,939 UART: Running Caliptra FMC ...
3,938,347 UART:
3,938,401 UART: [state] CFI Enabled
3,939,796 UART: [aliasrt :skip pcr extension
3,940,269 UART: [art] Extend RT PCRs Done
3,940,697 UART: [art] Lock RT PCRs Done
3,941,990 UART: [art] Populate DV Done
3,950,202 UART: [fht] FMC Alias Private Key: 7
3,951,378 UART: [art] Derive CDI
3,951,658 UART: [art] Store in in slot 0x4
4,037,385 UART: [art] Derive Key Pair
4,037,745 UART: [art] Store priv key in slot 0x5
4,050,537 UART: [art] Derive Key Pair - Done
4,065,198 UART: [art] Signing Cert with AUTHO
4,065,678 UART: RITY.KEYID = 7
4,080,324 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,089 UART: [art] PUB.X = AF4FF09E9E6B29C53B091036AD6AC5F43BE71772551554D99DFBEDB19165A684E4FF168FA9290269C391B2F15AC415DD
4,087,863 UART: [art] PUB.Y = 3E6605BF955339D7D9C223F8DAE5EC97C463D09BD7E4AFC690C1E8BBB82E70E13F8A6BBAFC13C9ACB4BC360EF6998F19
4,094,831 UART: [art] SIG.R = 4C257108A79F922D1C4197B7BBF925B0137AC659096BB46F563D5A8C077E6718932C431A8027097BA8B91FF56F4C14C9
4,101,585 UART: [art] SIG.S = 33475A1E1B4BD42D9913643AD33AC6AD804DDB4029AAF7F842A7482605CA6E909694AC37D9588775A80D15D2BF22A111
4,125,452 UART: mbox::rt_entry...
4,125,824 UART: ____ _ _ _ ____ _____
4,126,608 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,408 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,176 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,944 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,712 UART: |_|
4,130,024 UART:
4,421,362 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,423,464 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Production
85,651 UART: [state] DebugLocked = Yes
86,209 UART: [state] Starting the WD Timer 40000000 cycles
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 ready_for_fw is high
1,174,362 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,215,974 UART: [ldev] Erasing FE.KEYID = 1
1,242,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,427 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,297 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,003 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,131 UART: [ldev] --
1,281,553 UART: [fwproc] Wait for Commands...
1,282,182 UART: [fwproc] Recv command 0x46574c44
1,282,915 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,405 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,784 >>> mbox cmd response: success
2,338,974 UART: [afmc] ++
2,339,142 UART: [afmc] CDI.KEYID = 6
2,339,505 UART: [afmc] SUBJECT.KEYID = 7
2,339,931 UART: [afmc] AUTHORITY.KEYID = 5
2,375,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,257 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,976 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,869 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,576 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,531 UART: [afmc] --
2,418,548 UART: [cold-reset] --
2,419,508 UART: [state] Locking Datavault
2,420,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,287 UART: [state] Locking ICCM
2,421,765 UART: [exit] Launching FMC @ 0x40000130
2,427,094 UART:
2,427,110 UART: Running Caliptra FMC ...
2,427,518 UART:
2,427,572 UART: [state] CFI Enabled
2,438,045 UART: [fht] FMC Alias Private Key: 7
2,545,952 UART: [art] Extend RT PCRs Done
2,546,380 UART: [art] Lock RT PCRs Done
2,547,718 UART: [art] Populate DV Done
2,555,792 UART: [fht] FMC Alias Private Key: 7
2,556,944 UART: [art] Derive CDI
2,557,224 UART: [art] Store in in slot 0x4
2,642,553 UART: [art] Derive Key Pair
2,642,913 UART: [art] Store priv key in slot 0x5
2,655,723 UART: [art] Derive Key Pair - Done
2,670,468 UART: [art] Signing Cert with AUTHO
2,670,948 UART: RITY.KEYID = 7
2,686,074 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,839 UART: [art] PUB.X = CDC1FA18BCCF68304F062B57BD49DE7660935067F23DD7D97E2FAB58CC1A0E795C21B3E46FB36088D64B2F216F26CA8C
2,693,619 UART: [art] PUB.Y = 65160A6B2CB795870AC94B9411365DC0504AB1A17A075CD98112D08752C776296AB37A2220A2A49357CB4B591EF4F81F
2,700,556 UART: [art] SIG.R = 91E74B4311A2D76768AB01DCFECA80CE8C529FC4210E49FDC3BFF78DADB2592D98894C8A23194AE2D65E62C6053CC4A1
2,707,333 UART: [art] SIG.S = 1E31E8E4450AE0C4B6EF0B6FFF9D416442A97C1B857349C94B67BADE68734E9FF17B3194252D85C9A05C4FFA2CB2B096
2,731,186 UART: mbox::rt_entry...
2,731,558 UART: ____ _ _ _ ____ _____
2,732,342 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,142 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,910 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,678 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,446 UART: |_|
2,735,758 UART:
2,841,760 UART: [rt] Runtime listening for mailbox commands...
2,842,522 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,742 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,836 UART:
2,842,852 UART: Running Caliptra ROM ...
2,843,260 UART:
2,843,315 UART: [state] CFI Enabled
2,846,042 UART: [state] LifecycleState = Production
2,846,650 UART: [state] DebugLocked = Yes
2,847,256 UART: [state] Starting the WD Timer 40000000 cycles
2,848,851 UART: [kat] SHA2-256
3,652,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,530 UART: [kat] ++
3,656,682 UART: [kat] sha1
3,661,044 UART: [kat] SHA2-256
3,662,984 UART: [kat] SHA2-384
3,665,839 UART: [kat] SHA2-512-ACC
3,667,740 UART: [kat] ECC-384
3,677,109 UART: [kat] HMAC-384Kdf
3,681,683 UART: [kat] LMS
3,929,995 UART: [kat] --
3,930,755 UART: [warm-reset] ++
3,931,462 UART: [warm-reset] --
3,932,181 UART: [state] Locking Datavault
3,932,841 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,445 UART: [state] Locking ICCM
3,933,903 UART: [exit] Launching FMC @ 0x40000130
3,939,232 UART:
3,939,248 UART: Running Caliptra FMC ...
3,939,656 UART:
3,939,710 UART: [state] CFI Enabled
3,940,905 UART: [aliasrt :skip pcr extension
3,941,378 UART: [art] Extend RT PCRs Done
3,941,806 UART: [art] Lock RT PCRs Done
3,943,031 UART: [art] Populate DV Done
3,951,335 UART: [fht] FMC Alias Private Key: 7
3,952,445 UART: [art] Derive CDI
3,952,725 UART: [art] Store in in slot 0x4
4,038,438 UART: [art] Derive Key Pair
4,038,798 UART: [art] Store priv key in slot 0x5
4,052,202 UART: [art] Derive Key Pair - Done
4,066,727 UART: [art] Signing Cert with AUTHO
4,067,207 UART: RITY.KEYID = 7
4,082,109 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,874 UART: [art] PUB.X = CDC1FA18BCCF68304F062B57BD49DE7660935067F23DD7D97E2FAB58CC1A0E795C21B3E46FB36088D64B2F216F26CA8C
4,089,654 UART: [art] PUB.Y = 65160A6B2CB795870AC94B9411365DC0504AB1A17A075CD98112D08752C776296AB37A2220A2A49357CB4B591EF4F81F
4,096,591 UART: [art] SIG.R = 91E74B4311A2D76768AB01DCFECA80CE8C529FC4210E49FDC3BFF78DADB2592D98894C8A23194AE2D65E62C6053CC4A1
4,103,368 UART: [art] SIG.S = 1E31E8E4450AE0C4B6EF0B6FFF9D416442A97C1B857349C94B67BADE68734E9FF17B3194252D85C9A05C4FFA2CB2B096
4,127,331 UART: mbox::rt_entry...
4,127,703 UART: ____ _ _ _ ____ _____
4,128,487 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,287 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,823 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,591 UART: |_|
4,131,903 UART:
4,422,422 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,424,466 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Production
85,902 UART: [state] DebugLocked = Yes
86,456 UART: [state] Starting the WD Timer 40000000 cycles
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,348 UART: [kat] SHA2-256
902,288 UART: [kat] SHA2-384
904,975 UART: [kat] SHA2-512-ACC
906,876 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,663 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 ready_for_fw is high
1,174,479 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,200,279 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,243,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,842 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,712 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,418 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,362 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,108 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,640 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,923 >>> mbox cmd response: success
2,339,005 UART: [afmc] ++
2,339,173 UART: [afmc] CDI.KEYID = 6
2,339,536 UART: [afmc] SUBJECT.KEYID = 7
2,339,962 UART: [afmc] AUTHORITY.KEYID = 5
2,375,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,980 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,699 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,592 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,299 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,190 UART: [afmc] --
2,419,289 UART: [cold-reset] --
2,420,289 UART: [state] Locking Datavault
2,421,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,062 UART: [state] Locking ICCM
2,422,496 UART: [exit] Launching FMC @ 0x40000130
2,427,825 UART:
2,427,841 UART: Running Caliptra FMC ...
2,428,249 UART:
2,428,392 UART: [state] CFI Enabled
2,439,167 UART: [fht] FMC Alias Private Key: 7
2,547,720 UART: [art] Extend RT PCRs Done
2,548,148 UART: [art] Lock RT PCRs Done
2,549,814 UART: [art] Populate DV Done
2,558,050 UART: [fht] FMC Alias Private Key: 7
2,559,090 UART: [art] Derive CDI
2,559,370 UART: [art] Store in in slot 0x4
2,645,399 UART: [art] Derive Key Pair
2,645,759 UART: [art] Store priv key in slot 0x5
2,659,217 UART: [art] Derive Key Pair - Done
2,674,028 UART: [art] Signing Cert with AUTHO
2,674,508 UART: RITY.KEYID = 7
2,689,672 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,437 UART: [art] PUB.X = 32643136BD928BC1E5A76F03F5AA4B85E14323504F22BE170D88EAA4BAA9EA482AEDE6D87577B6A23045FBC0AFB8E2A3
2,697,217 UART: [art] PUB.Y = F1C74439F3329A78907E9E6E3360E45B8739557730DA3C768E9E48008C795FA07373B9C26516857902FAF4CC8C7CD390
2,704,134 UART: [art] SIG.R = BFF76C3D25186AAC34EA501D9033DA700A77F7877F6B020A3432C9A7EBFDB0C4B37FFAEC3E05B80B0A72BEB31901A4D7
2,710,903 UART: [art] SIG.S = B8BBF6C6DB6E2B686C6D9F994EA3A7ABBA5ECCF3CEEC881035492EC86E93C21C109EAE382AF030258D24A08EF86C00B3
2,735,138 UART: mbox::rt_entry...
2,735,510 UART: ____ _ _ _ ____ _____
2,736,294 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,737,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,737,862 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,738,630 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,739,398 UART: |_|
2,739,710 UART:
2,846,312 UART: [rt] Runtime listening for mailbox commands...
2,847,074 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,847,294 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,847,388 UART:
2,847,404 UART: Running Caliptra ROM ...
2,847,812 UART:
2,847,954 UART: [state] CFI Enabled
2,850,733 UART: [state] LifecycleState = Production
2,851,341 UART: [state] DebugLocked = Yes
2,851,891 UART: [state] Starting the WD Timer 40000000 cycles
2,853,564 UART: [kat] SHA2-256
3,657,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,243 UART: [kat] ++
3,661,395 UART: [kat] sha1
3,665,425 UART: [kat] SHA2-256
3,667,365 UART: [kat] SHA2-384
3,670,264 UART: [kat] SHA2-512-ACC
3,672,165 UART: [kat] ECC-384
3,682,030 UART: [kat] HMAC-384Kdf
3,686,716 UART: [kat] LMS
3,935,028 UART: [kat] --
3,935,990 UART: [warm-reset] ++
3,936,881 UART: [warm-reset] --
3,937,806 UART: [state] Locking Datavault
3,938,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,232 UART: [state] Locking ICCM
3,939,878 UART: [exit] Launching FMC @ 0x40000130
3,945,207 UART:
3,945,223 UART: Running Caliptra FMC ...
3,945,631 UART:
3,945,774 UART: [state] CFI Enabled
3,947,175 UART: [aliasrt :skip pcr extension
3,947,648 UART: [art] Extend RT PCRs Done
3,948,076 UART: [art] Lock RT PCRs Done
3,949,355 UART: [art] Populate DV Done
3,957,777 UART: [fht] FMC Alias Private Key: 7
3,958,889 UART: [art] Derive CDI
3,959,169 UART: [art] Store in in slot 0x4
4,044,908 UART: [art] Derive Key Pair
4,045,268 UART: [art] Store priv key in slot 0x5
4,058,498 UART: [art] Derive Key Pair - Done
4,073,345 UART: [art] Signing Cert with AUTHO
4,073,825 UART: RITY.KEYID = 7
4,089,121 UART: [art] Erasing AUTHORITY.KEYID = 7
4,089,886 UART: [art] PUB.X = 32643136BD928BC1E5A76F03F5AA4B85E14323504F22BE170D88EAA4BAA9EA482AEDE6D87577B6A23045FBC0AFB8E2A3
4,096,666 UART: [art] PUB.Y = F1C74439F3329A78907E9E6E3360E45B8739557730DA3C768E9E48008C795FA07373B9C26516857902FAF4CC8C7CD390
4,103,583 UART: [art] SIG.R = BFF76C3D25186AAC34EA501D9033DA700A77F7877F6B020A3432C9A7EBFDB0C4B37FFAEC3E05B80B0A72BEB31901A4D7
4,110,352 UART: [art] SIG.S = B8BBF6C6DB6E2B686C6D9F994EA3A7ABBA5ECCF3CEEC881035492EC86E93C21C109EAE382AF030258D24A08EF86C00B3
4,134,343 UART: mbox::rt_entry...
4,134,715 UART: ____ _ _ _ ____ _____
4,135,499 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,136,299 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,137,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,137,835 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,138,603 UART: |_|
4,138,915 UART:
4,434,866 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,437,010 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Production
85,838 UART: [state] DebugLocked = Yes
86,592 UART: [state] Starting the WD Timer 40000000 cycles
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,975 UART: [kat] HMAC-384Kdf
921,799 UART: [kat] LMS
1,170,111 UART: [kat] --
1,171,132 UART: [cold-reset] ++
1,171,539 UART: [fht] FHT @ 0x50003400
1,174,339 UART: [idev] ++
1,174,507 UART: [idev] CDI.KEYID = 6
1,174,868 UART: [idev] SUBJECT.KEYID = 7
1,175,293 UART: [idev] UDS.KEYID = 0
1,175,639 ready_for_fw is high
1,175,639 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,221 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,145 UART: [ldev] ++
1,210,313 UART: [ldev] CDI.KEYID = 6
1,210,677 UART: [ldev] SUBJECT.KEYID = 5
1,211,104 UART: [ldev] AUTHORITY.KEYID = 7
1,211,567 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,243,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,160 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,030 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,736 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,708 UART: [ldev] --
1,282,170 UART: [fwproc] Wait for Commands...
1,282,923 UART: [fwproc] Recv command 0x46574c44
1,283,656 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,227,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,256,326 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,727 >>> mbox cmd response: success
2,339,799 UART: [afmc] ++
2,339,967 UART: [afmc] CDI.KEYID = 6
2,340,330 UART: [afmc] SUBJECT.KEYID = 7
2,340,756 UART: [afmc] AUTHORITY.KEYID = 5
2,375,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,392,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,660 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,379 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,272 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,410,979 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,418,826 UART: [afmc] --
2,419,893 UART: [cold-reset] --
2,420,753 UART: [state] Locking Datavault
2,422,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,692 UART: [state] Locking ICCM
2,423,316 UART: [exit] Launching FMC @ 0x40000130
2,428,645 UART:
2,428,661 UART: Running Caliptra FMC ...
2,429,069 UART:
2,429,212 UART: [state] CFI Enabled
2,439,803 UART: [fht] FMC Alias Private Key: 7
2,548,210 UART: [art] Extend RT PCRs Done
2,548,638 UART: [art] Lock RT PCRs Done
2,550,218 UART: [art] Populate DV Done
2,558,590 UART: [fht] FMC Alias Private Key: 7
2,559,636 UART: [art] Derive CDI
2,559,916 UART: [art] Store in in slot 0x4
2,645,803 UART: [art] Derive Key Pair
2,646,163 UART: [art] Store priv key in slot 0x5
2,659,361 UART: [art] Derive Key Pair - Done
2,673,816 UART: [art] Signing Cert with AUTHO
2,674,296 UART: RITY.KEYID = 7
2,689,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,991 UART: [art] PUB.X = 21DE6260ACE468342EF23A38F80A4BAAF2B32EF3B7B2E6D04C77963FC966CBBB2164FE07E077DB175BB96E5FB9C8F5BE
2,696,777 UART: [art] PUB.Y = 0B36FBBCF25B1F3F9C6D98168272DAF434CBBC114312EEABF638CE8D5922FC9139E5BEC1C9875CEC3DFFC1E1A8D43747
2,703,748 UART: [art] SIG.R = AFC512038C659C78860CC2BF6C4E6E9D55C4E45E65D59B64C90FFEB5D1BA6BFABA5EF72C49B7C707F1C08D94DD7121B3
2,710,528 UART: [art] SIG.S = D93EF81E19C9464E4139214E8F617B2E95D7FE8357B88F5E6AEF285A619B07A9C4BBA3FD7BB535A407D14183878738F0
2,734,729 UART: mbox::rt_entry...
2,735,101 UART: ____ _ _ _ ____ _____
2,735,885 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,685 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,737,453 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,738,221 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,989 UART: |_|
2,739,301 UART:
2,846,007 UART: [rt] Runtime listening for mailbox commands...
2,846,769 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,846,989 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,847,083 UART:
2,847,099 UART: Running Caliptra ROM ...
2,847,507 UART:
2,847,649 UART: [state] CFI Enabled
2,850,428 UART: [state] LifecycleState = Production
2,851,036 UART: [state] DebugLocked = Yes
2,851,594 UART: [state] Starting the WD Timer 40000000 cycles
2,853,191 UART: [kat] SHA2-256
3,656,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,870 UART: [kat] ++
3,661,022 UART: [kat] sha1
3,665,158 UART: [kat] SHA2-256
3,667,098 UART: [kat] SHA2-384
3,669,875 UART: [kat] SHA2-512-ACC
3,671,776 UART: [kat] ECC-384
3,681,813 UART: [kat] HMAC-384Kdf
3,686,317 UART: [kat] LMS
3,934,629 UART: [kat] --
3,935,627 UART: [warm-reset] ++
3,936,618 UART: [warm-reset] --
3,937,651 UART: [state] Locking Datavault
3,938,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,939,187 UART: [state] Locking ICCM
3,939,653 UART: [exit] Launching FMC @ 0x40000130
3,944,982 UART:
3,944,998 UART: Running Caliptra FMC ...
3,945,406 UART:
3,945,549 UART: [state] CFI Enabled
3,946,878 UART: [aliasrt :skip pcr extension
3,947,351 UART: [art] Extend RT PCRs Done
3,947,779 UART: [art] Lock RT PCRs Done
3,949,378 UART: [art] Populate DV Done
3,957,366 UART: [fht] FMC Alias Private Key: 7
3,958,328 UART: [art] Derive CDI
3,958,608 UART: [art] Store in in slot 0x4
4,043,901 UART: [art] Derive Key Pair
4,044,261 UART: [art] Store priv key in slot 0x5
4,057,211 UART: [art] Derive Key Pair - Done
4,071,924 UART: [art] Signing Cert with AUTHO
4,072,404 UART: RITY.KEYID = 7
4,087,596 UART: [art] Erasing AUTHORITY.KEYID = 7
4,088,361 UART: [art] PUB.X = 21DE6260ACE468342EF23A38F80A4BAAF2B32EF3B7B2E6D04C77963FC966CBBB2164FE07E077DB175BB96E5FB9C8F5BE
4,095,147 UART: [art] PUB.Y = 0B36FBBCF25B1F3F9C6D98168272DAF434CBBC114312EEABF638CE8D5922FC9139E5BEC1C9875CEC3DFFC1E1A8D43747
4,102,118 UART: [art] SIG.R = AFC512038C659C78860CC2BF6C4E6E9D55C4E45E65D59B64C90FFEB5D1BA6BFABA5EF72C49B7C707F1C08D94DD7121B3
4,108,898 UART: [art] SIG.S = D93EF81E19C9464E4139214E8F617B2E95D7FE8357B88F5E6AEF285A619B07A9C4BBA3FD7BB535A407D14183878738F0
4,132,655 UART: mbox::rt_entry...
4,133,027 UART: ____ _ _ _ ____ _____
4,133,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,134,611 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,135,379 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,136,147 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,136,915 UART: |_|
4,137,227 UART:
4,430,070 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,432,204 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
192,936 UART:
193,311 UART: Running Caliptra ROM ...
194,563 UART:
194,709 UART: [state] CFI Enabled
266,369 UART: [state] LifecycleState = Unprovisioned
268,825 UART: [state] DebugLocked = No
270,715 UART: [state] WD Timer not started. Device not locked for debugging
275,741 UART: [fake-rom-cold-reset] ++
278,768 ready_for_fw is high
279,025 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
403,983 UART: [fht] FHT @ 0x50003400
405,084 UART: [fwproc] Wait for Commands...
406,374 UART: [fwproc] Recv command 0x46574c44
407,799 UART: [fwproc] Recv'd Img size: 99400 bytes
1,685,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,761,221 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,791,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,376,969 >>> mbox cmd response: success
2,383,035 UART: [fake-rom-cold-reset] --
2,386,709 UART: [state] Locking Datavault
2,392,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,130 UART: [state] Locking ICCM
2,398,086 UART: [exit] Launching FMC @ 0x40000130
2,406,916 UART:
2,407,153 UART: Running Caliptra FMC ...
2,408,256 UART:
2,408,413 UART: [state] CFI Enabled
2,474,980 UART: Caliptra RT
2,475,663 UART: [state] CFI Enabled
2,645,109 UART: [rt] RT listening for mailbox commands...
2,647,301 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,677,121 UART: [rt]cmd =0x4c444556, len=4
2,688,206 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,091,600 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,121,380 UART: [rt]cmd =0x43455246, len=4
3,133,992 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,881 writing to cptra_bootfsm_go
192,992 UART:
193,359 UART: Running Caliptra ROM ...
194,537 UART:
194,690 UART: [state] CFI Enabled
265,727 UART: [state] LifecycleState = Unprovisioned
268,107 UART: [state] DebugLocked = No
270,632 UART: [state] WD Timer not started. Device not locked for debugging
276,164 UART: [fake-rom-cold-reset] ++
279,190 ready_for_fw is high
279,442 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
404,468 UART: [fht] FHT @ 0x50003400
405,575 UART: [fwproc] Wait for Commands...
406,863 UART: [fwproc] Recv command 0x46574c44
408,268 UART: [fwproc] Recv'd Img size: 99400 bytes
1,678,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,753,852 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,783,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,369,770 >>> mbox cmd response: success
2,375,829 UART: [fake-rom-cold-reset] --
2,379,140 UART: [state] Locking Datavault
2,385,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,387,363 UART: [state] Locking ICCM
2,389,961 UART: [exit] Launching FMC @ 0x40000130
2,398,749 UART:
2,398,987 UART: Running Caliptra FMC ...
2,400,093 UART:
2,400,294 UART: [state] CFI Enabled
2,456,682 UART: Caliptra RT
2,457,365 UART: [state] CFI Enabled
2,626,922 UART: [rt] RT listening for mailbox commands...
2,629,093 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,658,539 UART: [rt]cmd =0x4c444556, len=4
2,669,625 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,073,637 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,103,561 UART: [rt]cmd =0x43455246, len=4
3,116,250 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,365 UART:
192,751 UART: Running Caliptra ROM ...
193,918 UART:
604,005 UART: [state] CFI Enabled
618,446 UART: [state] LifecycleState = Unprovisioned
620,839 UART: [state] DebugLocked = No
623,213 UART: [state] WD Timer not started. Device not locked for debugging
629,600 UART: [fake-rom-cold-reset] ++
632,628 ready_for_fw is high
632,890 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
757,654 UART: [fht] FHT @ 0x50003400
758,740 UART: [fwproc] Wait for Commands...
760,025 UART: [fwproc] Recv command 0x46574c44
761,436 UART: [fwproc] Recv'd Img size: 99400 bytes
2,034,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,111,126 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,141,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,727,589 >>> mbox cmd response: success
2,733,636 UART: [fake-rom-cold-reset] --
2,737,644 UART: [state] Locking Datavault
2,743,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,745,376 UART: [state] Locking ICCM
2,748,319 UART: [exit] Launching FMC @ 0x40000130
2,757,101 UART:
2,757,344 UART: Running Caliptra FMC ...
2,758,367 UART:
2,758,515 UART: [state] CFI Enabled
2,762,412 UART: Caliptra RT
2,763,096 UART: [state] CFI Enabled
2,872,566 UART: [rt] RT listening for mailbox commands...
2,874,737 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,904,718 UART: [rt]cmd =0x4c444556, len=4
2,915,847 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,319,865 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,349,625 UART: [rt]cmd =0x43455246, len=4
3,362,273 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,471 UART:
192,829 UART: Running Caliptra ROM ...
194,089 UART:
603,984 UART: [state] CFI Enabled
618,165 UART: [state] LifecycleState = Unprovisioned
620,589 UART: [state] DebugLocked = No
623,095 UART: [state] WD Timer not started. Device not locked for debugging
629,698 UART: [fake-rom-cold-reset] ++
632,730 ready_for_fw is high
632,988 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
757,744 UART: [fht] FHT @ 0x50003400
758,833 UART: [fwproc] Wait for Commands...
760,325 UART: [fwproc] Recv command 0x46574c44
761,766 UART: [fwproc] Recv'd Img size: 99400 bytes
2,036,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,110,993 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,141,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,726,952 >>> mbox cmd response: success
2,732,968 UART: [fake-rom-cold-reset] --
2,736,816 UART: [state] Locking Datavault
2,741,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,743,639 UART: [state] Locking ICCM
2,745,901 UART: [exit] Launching FMC @ 0x40000130
2,754,693 UART:
2,754,927 UART: Running Caliptra FMC ...
2,756,024 UART:
2,756,181 UART: [state] CFI Enabled
2,759,862 UART: Caliptra RT
2,760,595 UART: [state] CFI Enabled
2,871,280 UART: [rt] RT listening for mailbox commands...
2,873,431 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,903,093 UART: [rt]cmd =0x4c444556, len=4
2,914,274 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,320,578 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,350,420 UART: [rt]cmd =0x43455246, len=4
3,363,096 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,862 writing to cptra_bootfsm_go
192,910 UART:
193,269 UART: Running Caliptra ROM ...
194,449 UART:
194,599 UART: [state] CFI Enabled
264,790 UART: [state] LifecycleState = Unprovisioned
266,543 UART: [state] DebugLocked = No
269,354 UART: [state] WD Timer not started. Device not locked for debugging
273,107 UART: [fake-rom-cold-reset] ++
275,431 ready_for_fw is high
275,687 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
401,073 UART: [fht] FHT @ 0x50003400
402,170 UART: [fwproc] Wait for Commands...
403,372 UART: [fwproc] Recv command 0x46574c44
404,778 UART: [fwproc] Recv'd Img size: 99748 bytes
1,709,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,782,628 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,799,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,118,399 >>> mbox cmd response: success
2,124,205 UART: [fake-rom-cold-reset] --
2,127,933 UART: [state] Locking Datavault
2,132,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,134,195 UART: [state] Locking ICCM
2,135,618 UART: [exit] Launching FMC @ 0x40000130
2,143,850 UART:
2,144,093 UART: Running Caliptra FMC ...
2,145,199 UART:
2,145,353 UART: [state] CFI Enabled
2,196,100 UART: Caliptra RT
2,196,784 UART: [state] CFI Enabled
2,366,193 UART: [rt] RT listening for mailbox commands...
2,368,376 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,398,203 UART: [rt]cmd =0x4c444556, len=4
2,409,265 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,812,495 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,842,440 UART: [rt]cmd =0x43455246, len=4
2,855,053 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,817 writing to cptra_bootfsm_go
192,906 UART:
193,316 UART: Running Caliptra ROM ...
194,511 UART:
194,662 UART: [state] CFI Enabled
266,017 UART: [state] LifecycleState = Unprovisioned
267,769 UART: [state] DebugLocked = No
268,875 UART: [state] WD Timer not started. Device not locked for debugging
273,984 UART: [fake-rom-cold-reset] ++
276,299 ready_for_fw is high
276,555 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
401,754 UART: [fht] FHT @ 0x50003400
402,845 UART: [fwproc] Wait for Commands...
404,357 UART: [fwproc] Recv command 0x46574c44
405,811 UART: [fwproc] Recv'd Img size: 99748 bytes
1,707,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,780,443 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,797,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,116,481 >>> mbox cmd response: success
2,122,305 UART: [fake-rom-cold-reset] --
2,124,956 UART: [state] Locking Datavault
2,131,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,883 UART: [state] Locking ICCM
2,134,791 UART: [exit] Launching FMC @ 0x40000130
2,143,078 UART:
2,143,316 UART: Running Caliptra FMC ...
2,144,353 UART:
2,144,499 UART: [state] CFI Enabled
2,196,988 UART: Caliptra RT
2,197,672 UART: [state] CFI Enabled
2,366,485 UART: [rt] RT listening for mailbox commands...
2,368,646 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,398,517 UART: [rt]cmd =0x4c444556, len=4
2,409,611 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,814,013 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,843,775 UART: [rt]cmd =0x43455246, len=4
2,856,294 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,222 writing to cptra_bootfsm_go
193,461 UART:
193,856 UART: Running Caliptra ROM ...
195,046 UART:
604,464 UART: [state] CFI Enabled
618,525 UART: [state] LifecycleState = Unprovisioned
620,236 UART: [state] DebugLocked = No
621,714 UART: [state] WD Timer not started. Device not locked for debugging
625,901 UART: [fake-rom-cold-reset] ++
628,291 ready_for_fw is high
628,550 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
753,753 UART: [fht] FHT @ 0x50003400
754,844 UART: [fwproc] Wait for Commands...
756,043 UART: [fwproc] Recv command 0x46574c44
757,460 UART: [fwproc] Recv'd Img size: 99748 bytes
2,057,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,128,097 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,145,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,463,262 >>> mbox cmd response: success
2,469,079 UART: [fake-rom-cold-reset] --
2,472,274 UART: [state] Locking Datavault
2,477,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,479,359 UART: [state] Locking ICCM
2,480,759 UART: [exit] Launching FMC @ 0x40000130
2,489,043 UART:
2,489,292 UART: Running Caliptra FMC ...
2,490,391 UART:
2,490,545 UART: [state] CFI Enabled
2,494,434 UART: Caliptra RT
2,495,063 UART: [state] CFI Enabled
2,604,244 UART: [rt] RT listening for mailbox commands...
2,606,414 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,636,068 UART: [rt]cmd =0x4c444556, len=4
2,647,036 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,049,713 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,079,561 UART: [rt]cmd =0x43455246, len=4
3,092,422 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,266 writing to cptra_bootfsm_go
193,466 UART:
193,902 UART: Running Caliptra ROM ...
195,014 UART:
604,481 UART: [state] CFI Enabled
619,322 UART: [state] LifecycleState = Unprovisioned
621,039 UART: [state] DebugLocked = No
622,560 UART: [state] WD Timer not started. Device not locked for debugging
626,612 UART: [fake-rom-cold-reset] ++
628,930 ready_for_fw is high
629,127 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
754,495 UART: [fht] FHT @ 0x50003400
755,581 UART: [fwproc] Wait for Commands...
756,782 UART: [fwproc] Recv command 0x46574c44
758,183 UART: [fwproc] Recv'd Img size: 99748 bytes
2,054,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,126,936 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,143,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,461,431 >>> mbox cmd response: success
2,467,248 UART: [fake-rom-cold-reset] --
2,470,716 UART: [state] Locking Datavault
2,477,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,478,897 UART: [state] Locking ICCM
2,481,049 UART: [exit] Launching FMC @ 0x40000130
2,489,338 UART:
2,489,582 UART: Running Caliptra FMC ...
2,490,684 UART:
2,490,840 UART: [state] CFI Enabled
2,494,729 UART: Caliptra RT
2,495,417 UART: [state] CFI Enabled
2,605,270 UART: [rt] RT listening for mailbox commands...
2,607,448 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,637,166 UART: [rt]cmd =0x4c444556, len=4
2,648,454 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,051,289 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,080,961 UART: [rt]cmd =0x43455246, len=4
3,093,618 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,896 writing to cptra_bootfsm_go
192,941 UART:
193,306 UART: Running Caliptra ROM ...
194,507 UART:
194,661 UART: [state] CFI Enabled
264,422 UART: [state] LifecycleState = Unprovisioned
266,173 UART: [state] DebugLocked = No
268,200 UART: [state] WD Timer not started. Device not locked for debugging
272,663 UART: [fake-rom-cold-reset] ++
275,050 ready_for_fw is high
275,310 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
400,696 UART: [fht] FHT @ 0x50003400
401,811 UART: [fwproc] Wait for Commands...
403,092 UART: [fwproc] Recv command 0x46574c44
404,508 UART: [fwproc] Recv'd Img size: 99748 bytes
1,699,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,773,002 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,789,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,108,313 >>> mbox cmd response: success
2,114,180 UART: [fake-rom-cold-reset] --
2,118,284 UART: [state] Locking Datavault
2,123,537 UART: [state] Locking PCR0, PCR1 and PCR31
2,125,140 UART: [state] Locking ICCM
2,126,871 UART: [exit] Launching FMC @ 0x40000130
2,135,161 UART:
2,135,398 UART: Running Caliptra FMC ...
2,136,496 UART:
2,136,654 UART: [state] CFI Enabled
2,196,456 UART: Caliptra RT
2,197,136 UART: [state] CFI Enabled
2,365,499 UART: [rt] RT listening for mailbox commands...
2,367,666 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,397,438 UART: [rt]cmd =0x4c444556, len=4
2,408,606 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,813,199 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,843,054 UART: [rt]cmd =0x43455246, len=4
2,855,676 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
192,933 UART:
193,318 UART: Running Caliptra ROM ...
194,406 UART:
194,547 UART: [state] CFI Enabled
267,325 UART: [state] LifecycleState = Unprovisioned
269,075 UART: [state] DebugLocked = No
271,680 UART: [state] WD Timer not started. Device not locked for debugging
276,073 UART: [fake-rom-cold-reset] ++
278,472 ready_for_fw is high
278,729 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
404,792 UART: [fht] FHT @ 0x50003400
405,915 UART: [fwproc] Wait for Commands...
407,201 UART: [fwproc] Recv command 0x46574c44
408,617 UART: [fwproc] Recv'd Img size: 99748 bytes
1,707,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,780,912 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,797,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,116,323 >>> mbox cmd response: success
2,122,166 UART: [fake-rom-cold-reset] --
2,125,381 UART: [state] Locking Datavault
2,128,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,129,762 UART: [state] Locking ICCM
2,132,145 UART: [exit] Launching FMC @ 0x40000130
2,140,379 UART:
2,140,612 UART: Running Caliptra FMC ...
2,141,713 UART:
2,141,875 UART: [state] CFI Enabled
2,196,618 UART: Caliptra RT
2,197,259 UART: [state] CFI Enabled
2,367,255 UART: [rt] RT listening for mailbox commands...
2,369,426 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,399,040 UART: [rt]cmd =0x4c444556, len=4
2,410,185 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,814,370 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,844,227 UART: [rt]cmd =0x43455246, len=4
2,856,985 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,524 writing to cptra_bootfsm_go
193,653 UART:
194,016 UART: Running Caliptra ROM ...
195,122 UART:
604,595 UART: [state] CFI Enabled
620,066 UART: [state] LifecycleState = Unprovisioned
621,881 UART: [state] DebugLocked = No
624,039 UART: [state] WD Timer not started. Device not locked for debugging
627,166 UART: [fake-rom-cold-reset] ++
629,510 ready_for_fw is high
629,818 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
754,999 UART: [fht] FHT @ 0x50003400
756,093 UART: [fwproc] Wait for Commands...
757,298 UART: [fwproc] Recv command 0x46574c44
758,710 UART: [fwproc] Recv'd Img size: 99748 bytes
2,054,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,124,522 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,141,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,458,721 >>> mbox cmd response: success
2,464,579 UART: [fake-rom-cold-reset] --
2,468,044 UART: [state] Locking Datavault
2,472,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,474,555 UART: [state] Locking ICCM
2,476,792 UART: [exit] Launching FMC @ 0x40000130
2,485,024 UART:
2,485,265 UART: Running Caliptra FMC ...
2,486,301 UART:
2,486,444 UART: [state] CFI Enabled
2,490,602 UART: Caliptra RT
2,491,232 UART: [state] CFI Enabled
2,600,976 UART: [rt] RT listening for mailbox commands...
2,603,126 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,633,006 UART: [rt]cmd =0x4c444556, len=4
2,644,126 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,047,784 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,077,633 UART: [rt]cmd =0x43455246, len=4
3,090,305 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,486 writing to cptra_bootfsm_go
193,644 UART:
194,022 UART: Running Caliptra ROM ...
195,120 UART:
604,693 UART: [state] CFI Enabled
622,774 UART: [state] LifecycleState = Unprovisioned
624,491 UART: [state] DebugLocked = No
626,029 UART: [state] WD Timer not started. Device not locked for debugging
629,085 UART: [fake-rom-cold-reset] ++
631,472 ready_for_fw is high
631,740 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
757,880 UART: [fht] FHT @ 0x50003400
759,125 UART: [fwproc] Wait for Commands...
760,340 UART: [fwproc] Recv command 0x46574c44
761,791 UART: [fwproc] Recv'd Img size: 99748 bytes
2,063,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,135,172 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,152,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,469,618 >>> mbox cmd response: success
2,475,457 UART: [fake-rom-cold-reset] --
2,477,739 UART: [state] Locking Datavault
2,482,833 UART: [state] Locking PCR0, PCR1 and PCR31
2,484,425 UART: [state] Locking ICCM
2,486,090 UART: [exit] Launching FMC @ 0x40000130
2,494,384 UART:
2,494,617 UART: Running Caliptra FMC ...
2,495,639 UART:
2,495,791 UART: [state] CFI Enabled
2,499,629 UART: Caliptra RT
2,500,273 UART: [state] CFI Enabled
2,609,805 UART: [rt] RT listening for mailbox commands...
2,611,989 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,641,594 UART: [rt]cmd =0x4c444556, len=4
2,652,841 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,056,124 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,085,945 UART: [rt]cmd =0x43455246, len=4
3,098,821 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,050 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [fake-rom-cold-reset] ++
88,334 ready_for_fw is high
88,334 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,500 UART: [fht] FHT @ 0x50003400
91,967 UART: [fwproc] Wait for Commands...
92,702 UART: [fwproc] Recv command 0x46574c44
93,430 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,946 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,288 >>> mbox cmd response: success
1,389,446 UART: [fake-rom-cold-reset] --
1,390,328 UART: [state] Locking Datavault
1,391,453 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,057 UART: [state] Locking ICCM
1,392,673 UART: [exit] Launching FMC @ 0x40000130
1,397,995 UART:
1,398,011 UART: Running Caliptra FMC ...
1,398,419 UART:
1,398,473 UART: [state] CFI Enabled
1,401,196 UART: Caliptra RT
1,401,449 UART: [state] CFI Enabled
1,502,348 UART: [rt] RT listening for mailbox commands...
1,503,018 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,028 UART: [rt]cmd =0x4c444556, len=4
1,543,594 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,595 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,980 UART: [rt]cmd =0x43455246, len=4
1,584,992 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [fake-rom-cold-reset] ++
88,416 ready_for_fw is high
88,416 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,642 UART: [fht] FHT @ 0x50003400
92,089 UART: [fwproc] Wait for Commands...
92,690 UART: [fwproc] Recv command 0x46574c44
93,418 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,792 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,096 >>> mbox cmd response: success
1,390,254 UART: [fake-rom-cold-reset] --
1,390,986 UART: [state] Locking Datavault
1,392,181 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,785 UART: [state] Locking ICCM
1,393,291 UART: [exit] Launching FMC @ 0x40000130
1,398,613 UART:
1,398,629 UART: Running Caliptra FMC ...
1,399,037 UART:
1,399,091 UART: [state] CFI Enabled
1,401,750 UART: Caliptra RT
1,402,003 UART: [state] CFI Enabled
1,502,430 UART: [rt] RT listening for mailbox commands...
1,503,100 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,930 UART: [rt]cmd =0x4c444556, len=4
1,543,292 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,293 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,732 UART: [rt]cmd =0x43455246, len=4
1,584,816 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [fake-rom-cold-reset] ++
88,769 ready_for_fw is high
88,769 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,023 UART: [fht] FHT @ 0x50003400
92,372 UART: [fwproc] Wait for Commands...
93,081 UART: [fwproc] Recv command 0x46574c44
93,809 UART: [fwproc] Recv'd Img size: 99748 bytes
1,220,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,247,137 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,254,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,390,465 >>> mbox cmd response: success
1,391,623 UART: [fake-rom-cold-reset] --
1,392,381 UART: [state] Locking Datavault
1,393,628 UART: [state] Locking PCR0, PCR1 and PCR31
1,394,232 UART: [state] Locking ICCM
1,394,802 UART: [exit] Launching FMC @ 0x40000130
1,400,124 UART:
1,400,140 UART: Running Caliptra FMC ...
1,400,548 UART:
1,400,689 UART: [state] CFI Enabled
1,403,481 UART: Caliptra RT
1,403,826 UART: [state] CFI Enabled
1,503,343 UART: [rt] RT listening for mailbox commands...
1,504,013 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,953 UART: [rt]cmd =0x4c444556, len=4
1,544,369 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,544,370 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,735 UART: [rt]cmd =0x43455246, len=4
1,585,855 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [fake-rom-cold-reset] ++
88,819 ready_for_fw is high
88,819 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,995 UART: [fht] FHT @ 0x50003400
92,212 UART: [fwproc] Wait for Commands...
92,985 UART: [fwproc] Recv command 0x46574c44
93,713 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,815 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,119 >>> mbox cmd response: success
1,390,277 UART: [fake-rom-cold-reset] --
1,391,037 UART: [state] Locking Datavault
1,392,370 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,974 UART: [state] Locking ICCM
1,393,598 UART: [exit] Launching FMC @ 0x40000130
1,398,920 UART:
1,398,936 UART: Running Caliptra FMC ...
1,399,344 UART:
1,399,485 UART: [state] CFI Enabled
1,402,349 UART: Caliptra RT
1,402,694 UART: [state] CFI Enabled
1,503,073 UART: [rt] RT listening for mailbox commands...
1,503,743 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,697 UART: [rt]cmd =0x4c444556, len=4
1,543,929 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,930 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,315 UART: [rt]cmd =0x43455246, len=4
1,585,569 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [fake-rom-cold-reset] ++
88,962 ready_for_fw is high
88,962 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,192 UART: [fht] FHT @ 0x50003400
92,645 UART: [fwproc] Wait for Commands...
93,366 UART: [fwproc] Recv command 0x46574c44
94,094 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,200 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,518 >>> mbox cmd response: success
1,390,676 UART: [fake-rom-cold-reset] --
1,391,452 UART: [state] Locking Datavault
1,392,779 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,383 UART: [state] Locking ICCM
1,394,009 UART: [exit] Launching FMC @ 0x40000130
1,399,331 UART:
1,399,347 UART: Running Caliptra FMC ...
1,399,755 UART:
1,399,809 UART: [state] CFI Enabled
1,402,582 UART: Caliptra RT
1,402,835 UART: [state] CFI Enabled
1,503,126 UART: [rt] RT listening for mailbox commands...
1,503,796 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,520 UART: [rt]cmd =0x4c444556, len=4
1,543,844 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,845 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,258 UART: [rt]cmd =0x43455246, len=4
1,585,178 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [fake-rom-cold-reset] ++
88,794 ready_for_fw is high
88,794 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,038 UART: [fht] FHT @ 0x50003400
92,349 UART: [fwproc] Wait for Commands...
93,192 UART: [fwproc] Recv command 0x46574c44
93,920 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,570 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,784 >>> mbox cmd response: success
1,389,942 UART: [fake-rom-cold-reset] --
1,390,842 UART: [state] Locking Datavault
1,392,071 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,675 UART: [state] Locking ICCM
1,393,189 UART: [exit] Launching FMC @ 0x40000130
1,398,511 UART:
1,398,527 UART: Running Caliptra FMC ...
1,398,935 UART:
1,398,989 UART: [state] CFI Enabled
1,401,518 UART: Caliptra RT
1,401,771 UART: [state] CFI Enabled
1,502,278 UART: [rt] RT listening for mailbox commands...
1,502,948 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,864 UART: [rt]cmd =0x4c444556, len=4
1,543,302 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,303 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,534 UART: [rt]cmd =0x43455246, len=4
1,584,666 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [fake-rom-cold-reset] ++
89,353 ready_for_fw is high
89,353 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,467 UART: [fht] FHT @ 0x50003400
92,770 UART: [fwproc] Wait for Commands...
93,417 UART: [fwproc] Recv command 0x46574c44
94,145 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,248,155 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,255,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,391,277 >>> mbox cmd response: success
1,392,435 UART: [fake-rom-cold-reset] --
1,393,211 UART: [state] Locking Datavault
1,394,382 UART: [state] Locking PCR0, PCR1 and PCR31
1,394,986 UART: [state] Locking ICCM
1,395,636 UART: [exit] Launching FMC @ 0x40000130
1,400,958 UART:
1,400,974 UART: Running Caliptra FMC ...
1,401,382 UART:
1,401,523 UART: [state] CFI Enabled
1,404,387 UART: Caliptra RT
1,404,732 UART: [state] CFI Enabled
1,506,133 UART: [rt] RT listening for mailbox commands...
1,506,803 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,536,767 UART: [rt]cmd =0x4c444556, len=4
1,547,209 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,547,210 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,576,523 UART: [rt]cmd =0x43455246, len=4
1,588,561 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [fake-rom-cold-reset] ++
88,817 ready_for_fw is high
88,817 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,005 UART: [fht] FHT @ 0x50003400
92,450 UART: [fwproc] Wait for Commands...
93,185 UART: [fwproc] Recv command 0x46574c44
93,913 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,329 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,425 >>> mbox cmd response: success
1,390,583 UART: [fake-rom-cold-reset] --
1,391,497 UART: [state] Locking Datavault
1,392,440 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,044 UART: [state] Locking ICCM
1,393,472 UART: [exit] Launching FMC @ 0x40000130
1,398,794 UART:
1,398,810 UART: Running Caliptra FMC ...
1,399,218 UART:
1,399,359 UART: [state] CFI Enabled
1,402,053 UART: Caliptra RT
1,402,398 UART: [state] CFI Enabled
1,502,843 UART: [rt] RT listening for mailbox commands...
1,503,513 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,287 UART: [rt]cmd =0x4c444556, len=4
1,543,679 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,680 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,287 UART: [rt]cmd =0x43455246, len=4
1,585,373 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [fake-rom-cold-reset] ++
88,982 ready_for_fw is high
88,982 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,248 UART: [fht] FHT @ 0x50003400
92,677 UART: [fwproc] Wait for Commands...
93,376 UART: [fwproc] Recv command 0x46574c44
94,104 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,910 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,120 >>> mbox cmd response: success
1,389,278 UART: [fake-rom-cold-reset] --
1,390,106 UART: [state] Locking Datavault
1,391,115 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,719 UART: [state] Locking ICCM
1,392,361 UART: [exit] Launching FMC @ 0x40000130
1,397,683 UART:
1,397,699 UART: Running Caliptra FMC ...
1,398,107 UART:
1,398,161 UART: [state] CFI Enabled
1,400,700 UART: Caliptra RT
1,400,953 UART: [state] CFI Enabled
1,501,730 UART: [rt] RT listening for mailbox commands...
1,502,400 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,484 UART: [rt]cmd =0x4c444556, len=4
1,542,828 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,829 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,088 UART: [rt]cmd =0x43455246, len=4
1,584,110 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [fake-rom-cold-reset] ++
88,824 ready_for_fw is high
88,824 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,074 UART: [fht] FHT @ 0x50003400
92,289 UART: [fwproc] Wait for Commands...
93,020 UART: [fwproc] Recv command 0x46574c44
93,748 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,328 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,616 >>> mbox cmd response: success
1,390,774 UART: [fake-rom-cold-reset] --
1,391,492 UART: [state] Locking Datavault
1,392,589 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,193 UART: [state] Locking ICCM
1,393,787 UART: [exit] Launching FMC @ 0x40000130
1,399,109 UART:
1,399,125 UART: Running Caliptra FMC ...
1,399,533 UART:
1,399,587 UART: [state] CFI Enabled
1,402,502 UART: Caliptra RT
1,402,755 UART: [state] CFI Enabled
1,503,024 UART: [rt] RT listening for mailbox commands...
1,503,694 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,452 UART: [rt]cmd =0x4c444556, len=4
1,543,974 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,975 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,502 UART: [rt]cmd =0x43455246, len=4
1,585,778 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,951 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [fake-rom-cold-reset] ++
88,461 ready_for_fw is high
88,461 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,725 UART: [fht] FHT @ 0x50003400
91,948 UART: [fwproc] Wait for Commands...
92,631 UART: [fwproc] Recv command 0x46574c44
93,359 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,669 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,387,925 >>> mbox cmd response: success
1,389,083 UART: [fake-rom-cold-reset] --
1,390,007 UART: [state] Locking Datavault
1,391,378 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,982 UART: [state] Locking ICCM
1,392,528 UART: [exit] Launching FMC @ 0x40000130
1,397,850 UART:
1,397,866 UART: Running Caliptra FMC ...
1,398,274 UART:
1,398,415 UART: [state] CFI Enabled
1,401,049 UART: Caliptra RT
1,401,394 UART: [state] CFI Enabled
1,501,357 UART: [rt] RT listening for mailbox commands...
1,502,027 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,661 UART: [rt]cmd =0x4c444556, len=4
1,542,213 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,214 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,647 UART: [rt]cmd =0x43455246, len=4
1,583,641 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,561 UART: [fake-rom-cold-reset] ++
89,489 ready_for_fw is high
89,489 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,601 UART: [fht] FHT @ 0x50003400
92,848 UART: [fwproc] Wait for Commands...
93,537 UART: [fwproc] Recv command 0x46574c44
94,265 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,597 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,879 >>> mbox cmd response: success
1,390,037 UART: [fake-rom-cold-reset] --
1,391,019 UART: [state] Locking Datavault
1,392,054 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,658 UART: [state] Locking ICCM
1,393,328 UART: [exit] Launching FMC @ 0x40000130
1,398,650 UART:
1,398,666 UART: Running Caliptra FMC ...
1,399,074 UART:
1,399,215 UART: [state] CFI Enabled
1,402,033 UART: Caliptra RT
1,402,378 UART: [state] CFI Enabled
1,501,809 UART: [rt] RT listening for mailbox commands...
1,502,479 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,963 UART: [rt]cmd =0x4c444556, len=4
1,542,513 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,514 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,823 UART: [rt]cmd =0x43455246, len=4
1,583,959 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,464 UART:
192,826 UART: Running Caliptra ROM ...
194,018 UART:
194,172 UART: [state] CFI Enabled
267,197 UART: [state] LifecycleState = Production
268,990 UART: [state] DebugLocked = No
270,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,142 UART: [kat] SHA2-256
444,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,289 UART: [kat] ++
455,840 UART: [kat] sha1
465,218 UART: [kat] SHA2-256
467,869 UART: [kat] SHA2-384
475,070 UART: [kat] SHA2-512-ACC
477,441 UART: [kat] ECC-384
2,768,806 UART: [kat] HMAC-384Kdf
2,801,609 UART: [kat] LMS
3,991,891 UART: [kat] --
3,996,499 UART: [cold-reset] ++
3,998,223 UART: [fht] Storing FHT @ 0x50003400
4,008,566 UART: [idev] ++
4,009,134 UART: [idev] CDI.KEYID = 6
4,010,047 UART: [idev] SUBJECT.KEYID = 7
4,011,293 UART: [idev] UDS.KEYID = 0
4,012,266 ready_for_fw is high
4,012,460 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,020 UART: [idev] Erasing UDS.KEYID = 0
7,347,191 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,728 UART: [idev] --
7,373,527 UART: [ldev] ++
7,374,093 UART: [ldev] CDI.KEYID = 6
7,375,057 UART: [ldev] SUBJECT.KEYID = 5
7,376,271 UART: [ldev] AUTHORITY.KEYID = 7
7,377,547 UART: [ldev] FE.KEYID = 1
7,424,027 UART: [ldev] Erasing FE.KEYID = 1
10,755,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,563 UART: [ldev] --
13,134,796 UART: [fwproc] Waiting for Commands...
13,137,760 UART: [fwproc] Received command 0x46574c44
13,139,993 UART: [fwproc] Received Image of size 114124 bytes
21,740,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,817,387 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,886,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,202,692 >>> mbox cmd response: success
22,207,472 UART: [afmc] ++
22,208,085 UART: [afmc] CDI.KEYID = 6
22,209,039 UART: [afmc] SUBJECT.KEYID = 7
22,210,338 UART: [afmc] AUTHORITY.KEYID = 5
25,572,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,874,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,876,293 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
27,890,924 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
27,905,696 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
27,920,104 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
27,941,716 UART: [afmc] --
27,945,308 UART: [cold-reset] --
27,949,632 UART: [state] Locking Datavault
27,955,521 UART: [state] Locking PCR0, PCR1 and PCR31
27,957,247 UART: [state] Locking ICCM
27,958,435 UART: [exit] Launching FMC @ 0x40000130
27,966,872 UART:
27,967,122 UART: Running Caliptra FMC ...
27,968,280 UART:
27,968,434 UART: [state] CFI Enabled
28,034,551 UART: [fht] FMC Alias Private Key: 7
30,372,330 UART: [art] Extend RT PCRs Done
30,373,734 UART: [art] Lock RT PCRs Done
30,375,136 UART: [art] Populate DV Done
30,380,466 UART: [fht] FMC Alias Private Key: 7
30,381,959 UART: [art] Derive CDI
30,382,755 UART: [art] Store in in slot 0x4
30,443,693 UART: [art] Derive Key Pair
30,444,730 UART: [art] Store priv key in slot 0x5
33,737,364 UART: [art] Derive Key Pair - Done
33,750,313 UART: [art] Signing Cert with AUTHO
33,751,662 UART: RITY.KEYID = 7
36,039,112 UART: [art] Erasing AUTHORITY.KEYID = 7
36,040,673 UART: [art] PUB.X = C6A93B368F9202402BBD0EFA0B010960129779B9EF5CA66ECED349375A60848B55FD4C672D4EEBF6C979B8B836E06DC0
36,047,930 UART: [art] PUB.Y = 50FF2F950FABC7D62DD716BD58B91705C822B6F567FD0D47A19C75073BE761C8E29E35C70AEDC5ECFC0ED55A162557DF
36,055,179 UART: [art] SIG.R = BD51C0E94AEB8365AC0F06EBFE8447AE2201B1A9109CEF878707BBA04F6905BB3F1C8A05E410581C7992028529F87C44
36,062,535 UART: [art] SIG.S = 0F3F4425EEB19CD8A346D1F918B1945F48578E3E55DD7F696DBBD4B8F88CE14A8F4A59FD5BAAF9BA7A131397F655ABB9
37,367,760 UART: Caliptra RT
37,368,501 UART: [state] CFI Enabled
37,530,306 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,783,427 ready_for_fw is high
3,783,811 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,862,994 >>> mbox cmd response: success
27,547,525 UART:
27,547,936 UART: Running Caliptra FMC ...
27,549,086 UART:
27,549,253 UART: [state] CFI Enabled
27,602,557 UART: [fht] FMC Alias Private Key: 7
29,940,401 UART: [art] Extend RT PCRs Done
29,941,665 UART: [art] Lock RT PCRs Done
29,943,318 UART: [art] Populate DV Done
29,948,396 UART: [fht] FMC Alias Private Key: 7
29,949,905 UART: [art] Derive CDI
29,950,705 UART: [art] Store in in slot 0x4
30,011,410 UART: [art] Derive Key Pair
30,012,491 UART: [art] Store priv key in slot 0x5
33,305,686 UART: [art] Derive Key Pair - Done
33,318,585 UART: [art] Signing Cert with AUTHO
33,319,921 UART: RITY.KEYID = 7
35,607,493 UART: [art] Erasing AUTHORITY.KEYID = 7
35,609,048 UART: [art] PUB.X = AF40F9335E0CD155FBBE5B7E725C5A240722BC2AAF2CC0DBE51116784B7DA5FCBD344AF8E0579328AF0AA769EF7E61B2
35,616,260 UART: [art] PUB.Y = 35BFEA86D69ED847B6B68AFC300EAC3CC238BD0D9A0AC06B95E3C8BF453BC2AC47945FC9A86671ACED9ABE852F994F2C
35,623,536 UART: [art] SIG.R = EFFD9C8F83603F89C90168636AC9D2FEFF494CDB4E6D01F89C555BECBB3A2A2933FBFC462C62C1807196E767F7D18182
35,630,974 UART: [art] SIG.S = CF92060BEBAE8F9FC80E0084503277654AC590272845C0F6345CD5D55C7E170C2A8B6D69AEE7C9AEEC3F775443DEE303
36,936,103 UART: Caliptra RT
36,936,827 UART: [state] CFI Enabled
37,099,510 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,255 writing to cptra_bootfsm_go
193,334 UART:
193,724 UART: Running Caliptra ROM ...
194,914 UART:
604,714 UART: [state] CFI Enabled
619,807 UART: [state] LifecycleState = Production
621,579 UART: [state] DebugLocked = No
624,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,330 UART: [kat] SHA2-256
798,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,643 UART: [kat] ++
809,121 UART: [kat] sha1
820,558 UART: [kat] SHA2-256
823,278 UART: [kat] SHA2-384
830,187 UART: [kat] SHA2-512-ACC
832,559 UART: [kat] ECC-384
3,117,493 UART: [kat] HMAC-384Kdf
3,129,342 UART: [kat] LMS
4,319,456 UART: [kat] --
4,322,541 UART: [cold-reset] ++
4,323,449 UART: [fht] Storing FHT @ 0x50003400
4,334,222 UART: [idev] ++
4,334,864 UART: [idev] CDI.KEYID = 6
4,335,777 UART: [idev] SUBJECT.KEYID = 7
4,337,019 UART: [idev] UDS.KEYID = 0
4,338,092 ready_for_fw is high
4,338,306 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,541 UART: [idev] Erasing UDS.KEYID = 0
7,623,069 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,294 UART: [idev] --
7,647,691 UART: [ldev] ++
7,648,258 UART: [ldev] CDI.KEYID = 6
7,649,220 UART: [ldev] SUBJECT.KEYID = 5
7,650,431 UART: [ldev] AUTHORITY.KEYID = 7
7,651,738 UART: [ldev] FE.KEYID = 1
7,662,816 UART: [ldev] Erasing FE.KEYID = 1
10,949,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,529 UART: [ldev] --
13,308,878 UART: [fwproc] Waiting for Commands...
13,311,726 UART: [fwproc] Received command 0x46574c44
13,313,902 UART: [fwproc] Received Image of size 114124 bytes
22,533,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,621,849 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,690,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
23,007,348 >>> mbox cmd response: success
23,012,022 UART: [afmc] ++
23,012,653 UART: [afmc] CDI.KEYID = 6
23,013,590 UART: [afmc] SUBJECT.KEYID = 7
23,014,907 UART: [afmc] AUTHORITY.KEYID = 5
26,326,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,622,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,624,597 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,639,232 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,653,954 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,668,363 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,690,489 UART: [afmc] --
28,694,908 UART: [cold-reset] --
28,699,824 UART: [state] Locking Datavault
28,703,217 UART: [state] Locking PCR0, PCR1 and PCR31
28,704,950 UART: [state] Locking ICCM
28,706,604 UART: [exit] Launching FMC @ 0x40000130
28,714,999 UART:
28,715,271 UART: Running Caliptra FMC ...
28,716,418 UART:
28,716,586 UART: [state] CFI Enabled
28,724,636 UART: [fht] FMC Alias Private Key: 7
31,055,389 UART: [art] Extend RT PCRs Done
31,056,660 UART: [art] Lock RT PCRs Done
31,058,282 UART: [art] Populate DV Done
31,063,882 UART: [fht] FMC Alias Private Key: 7
31,065,488 UART: [art] Derive CDI
31,066,353 UART: [art] Store in in slot 0x4
31,108,677 UART: [art] Derive Key Pair
31,109,719 UART: [art] Store priv key in slot 0x5
34,351,797 UART: [art] Derive Key Pair - Done
34,364,803 UART: [art] Signing Cert with AUTHO
34,366,149 UART: RITY.KEYID = 7
36,645,641 UART: [art] Erasing AUTHORITY.KEYID = 7
36,647,224 UART: [art] PUB.X = 24F24A4A3F8B8AB274BD184FE613CC46C97B94661456BAF2AAC73FA26AA326DEAEAFF016A22485CA7DC5617DD12FE560
36,654,493 UART: [art] PUB.Y = 155EEF8559222E4BCBB2BEA6B0507AC41BBBCFA9F6B14C439DACF4E302E6F5450DC0D9F40BE71A0B21CF7957E6299FB1
36,661,766 UART: [art] SIG.R = 60ACD8267B1590C6281FD2C2D7E7154361167595030D41903F9ABC5C9E02A4A338718D281F0CE6AC00BF989C9B33F82A
36,669,103 UART: [art] SIG.S = EC7C6409F08924BACB740C78E66A8F3E98DD844F6CFFA77EB68E609ADEB0AF55BD5E9E8C5905F20A185FF9BAC9C2ABB9
37,974,127 UART: Caliptra RT
37,974,854 UART: [state] CFI Enabled
38,091,951 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 7.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
4,132,999 ready_for_fw is high
4,133,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,084,517 >>> mbox cmd response: success
27,726,536 UART:
27,726,934 UART: Running Caliptra FMC ...
27,728,044 UART:
27,728,207 UART: [state] CFI Enabled
27,735,854 UART: [fht] FMC Alias Private Key: 7
30,067,055 UART: [art] Extend RT PCRs Done
30,068,335 UART: [art] Lock RT PCRs Done
30,069,883 UART: [art] Populate DV Done
30,075,087 UART: [fht] FMC Alias Private Key: 7
30,076,810 UART: [art] Derive CDI
30,077,586 UART: [art] Store in in slot 0x4
30,120,283 UART: [art] Derive Key Pair
30,121,324 UART: [art] Store priv key in slot 0x5
33,363,746 UART: [art] Derive Key Pair - Done
33,376,860 UART: [art] Signing Cert with AUTHO
33,378,196 UART: RITY.KEYID = 7
35,657,820 UART: [art] Erasing AUTHORITY.KEYID = 7
35,659,376 UART: [art] PUB.X = FF497B10DB64D5AEA3401335527B0422DE64441E1682C192D4EBFA6324B9BD750E1510110F391AB02530185257A96F34
35,666,580 UART: [art] PUB.Y = 0D7AFEBF8D73EE558A61EBD38F3B40D1D89C94B583A050696EEFC59056F7BDBD9F70F134147D1ADEC29E12DC2233A2D0
35,673,836 UART: [art] SIG.R = 57FB630CB2768E507A9E4E0156CFA3FAC90152E4AF65447FDBCE026082F9323AC892B93A15DC162EC79F4B58C200D1BA
35,681,230 UART: [art] SIG.S = C5CE98F53E4300EF20290F5E554E1B69D6621B2E6B5B272E4B4F74F7C7C27D29FED83B8D685B21242E89F09369CEED8E
36,986,362 UART: Caliptra RT
36,987,090 UART: [state] CFI Enabled
37,104,338 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
192,641 UART:
193,101 UART: Running Caliptra ROM ...
194,248 UART:
194,393 UART: [state] CFI Enabled
259,278 UART: [state] LifecycleState = Production
261,014 UART: [state] DebugLocked = No
262,272 UART: [state] WD Timer not started. Device not locked for debugging
266,100 UART: [kat] SHA2-256
445,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,792 UART: [kat] ++
457,324 UART: [kat] sha1
468,573 UART: [kat] SHA2-256
471,583 UART: [kat] SHA2-384
477,424 UART: [kat] SHA2-512-ACC
480,334 UART: [kat] ECC-384
2,927,892 UART: [kat] HMAC-384Kdf
2,951,147 UART: [kat] LMS
3,480,604 UART: [kat] --
3,484,738 UART: [cold-reset] ++
3,486,873 UART: [fht] FHT @ 0x50003400
3,498,058 UART: [idev] ++
3,498,621 UART: [idev] CDI.KEYID = 6
3,499,499 UART: [idev] SUBJECT.KEYID = 7
3,500,738 UART: [idev] UDS.KEYID = 0
3,501,669 ready_for_fw is high
3,501,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,869 UART: [idev] Erasing UDS.KEYID = 0
6,006,412 UART: [idev] Sha1 KeyId Algorithm
6,029,539 UART: [idev] --
6,033,643 UART: [ldev] ++
6,034,258 UART: [ldev] CDI.KEYID = 6
6,035,146 UART: [ldev] SUBJECT.KEYID = 5
6,036,305 UART: [ldev] AUTHORITY.KEYID = 7
6,037,540 UART: [ldev] FE.KEYID = 1
6,079,089 UART: [ldev] Erasing FE.KEYID = 1
8,583,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,850 UART: [ldev] --
10,393,931 UART: [fwproc] Wait for Commands...
10,395,520 UART: [fwproc] Recv command 0x46574c44
10,397,643 UART: [fwproc] Recv'd Img size: 114448 bytes
14,985,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,057,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,126,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,445,276 >>> mbox cmd response: success
15,449,553 UART: [afmc] ++
15,450,159 UART: [afmc] CDI.KEYID = 6
15,451,089 UART: [afmc] SUBJECT.KEYID = 7
15,452,242 UART: [afmc] AUTHORITY.KEYID = 5
17,982,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,724,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,726,036 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,742,064 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,758,072 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,774,015 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,798,017 UART: [afmc] --
19,802,452 UART: [cold-reset] --
19,804,622 UART: [state] Locking Datavault
19,809,318 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,988 UART: [state] Locking ICCM
19,812,946 UART: [exit] Launching FMC @ 0x40000130
19,821,371 UART:
19,821,619 UART: Running Caliptra FMC ...
19,822,753 UART:
19,822,910 UART: [state] CFI Enabled
19,883,726 UART: [fht] FMC Alias Private Key: 7
21,647,523 UART: [art] Extend RT PCRs Done
21,648,789 UART: [art] Lock RT PCRs Done
21,650,194 UART: [art] Populate DV Done
21,655,620 UART: [fht] FMC Alias Private Key: 7
21,657,115 UART: [art] Derive CDI
21,657,906 UART: [art] Store in in slot 0x4
21,716,380 UART: [art] Derive Key Pair
21,717,457 UART: [art] Store priv key in slot 0x5
24,180,102 UART: [art] Derive Key Pair - Done
24,193,053 UART: [art] Signing Cert with AUTHO
24,194,394 UART: RITY.KEYID = 7
25,906,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,907,899 UART: [art] PUB.X = 798FB65592FF5E5A9C6D510A25B77D2A7769F83747F875D02159FAB4CA7FB68C9DFA16611A344D4CFA373DC7766D92F5
25,915,146 UART: [art] PUB.Y = 78862129FED8E0F0DB5C4E5B35CD365BB3DB0D15770FE4266044AE532DB3E6CCA16037980BE320A300C7374A0B1F248A
25,922,336 UART: [art] SIG.R = 11EFCE9E5FF064431812D893E896C0E24DA4B4B4DE6B97F038DC47EED371A0433AB2C5832F75F4C5B490A1339130A1C6
25,929,783 UART: [art] SIG.S = D0CCF9BB85EA8E6B6766CACF628470BAC44730B4D11AFD51C148571CEC8A94C0526E2E1CD1958CFAD8C8B8B5CA49312A
26,908,711 UART: Caliptra RT
26,909,426 UART: [state] CFI Enabled
27,074,716 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,618 writing to cptra_bootfsm_go
3,362,200 ready_for_fw is high
3,362,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,048,113 >>> mbox cmd response: success
19,347,731 UART:
19,348,109 UART: Running Caliptra FMC ...
19,349,211 UART:
19,349,360 UART: [state] CFI Enabled
19,413,704 UART: [fht] FMC Alias Private Key: 7
21,178,161 UART: [art] Extend RT PCRs Done
21,179,434 UART: [art] Lock RT PCRs Done
21,180,929 UART: [art] Populate DV Done
21,186,244 UART: [fht] FMC Alias Private Key: 7
21,187,916 UART: [art] Derive CDI
21,188,776 UART: [art] Store in in slot 0x4
21,246,146 UART: [art] Derive Key Pair
21,247,230 UART: [art] Store priv key in slot 0x5
23,710,265 UART: [art] Derive Key Pair - Done
23,723,331 UART: [art] Signing Cert with AUTHO
23,724,677 UART: RITY.KEYID = 7
25,436,068 UART: [art] Erasing AUTHORITY.KEYID = 7
25,437,632 UART: [art] PUB.X = F8F3937E8160A0B017823108CD425AD81FB8C6DF9CB9BC0A2D152440C51CCB2E9580BF2CCCA780808F366BC77961C9BB
25,444,848 UART: [art] PUB.Y = E06374EC2E165F0E07B04DB060FC1FCFCE68CD7E2F5F6EA3857DBF3BAF640B81BAF1FEFC9E36F391AAEAC1BA6CC5F0CF
25,452,148 UART: [art] SIG.R = C458EE0AFD56FDE518CCBDD04728AF7D1539ADF1F3CB0BC51944A4B3686B4284B353683E15608947086BD5756A5F4EA6
25,459,586 UART: [art] SIG.S = 0287106F4A1818FF64DDF0D215B4F4E3C307DB37DBB4F4F5929855EE3C65C11A82492D4C96B8B27C5D8B5BC0861B7010
26,438,643 UART: Caliptra RT
26,439,381 UART: [state] CFI Enabled
26,604,602 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
192,729 UART:
193,110 UART: Running Caliptra ROM ...
194,234 UART:
603,772 UART: [state] CFI Enabled
619,052 UART: [state] LifecycleState = Production
620,748 UART: [state] DebugLocked = No
622,414 UART: [state] WD Timer not started. Device not locked for debugging
626,659 UART: [kat] SHA2-256
805,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,414 UART: [kat] ++
817,952 UART: [kat] sha1
827,902 UART: [kat] SHA2-256
830,975 UART: [kat] SHA2-384
838,261 UART: [kat] SHA2-512-ACC
841,239 UART: [kat] ECC-384
3,283,575 UART: [kat] HMAC-384Kdf
3,294,603 UART: [kat] LMS
3,824,146 UART: [kat] --
3,828,781 UART: [cold-reset] ++
3,831,202 UART: [fht] FHT @ 0x50003400
3,841,321 UART: [idev] ++
3,841,888 UART: [idev] CDI.KEYID = 6
3,842,773 UART: [idev] SUBJECT.KEYID = 7
3,844,014 UART: [idev] UDS.KEYID = 0
3,844,941 ready_for_fw is high
3,845,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,441 UART: [idev] Erasing UDS.KEYID = 0
6,318,469 UART: [idev] Sha1 KeyId Algorithm
6,341,857 UART: [idev] --
6,345,255 UART: [ldev] ++
6,345,821 UART: [ldev] CDI.KEYID = 6
6,346,829 UART: [ldev] SUBJECT.KEYID = 5
6,347,929 UART: [ldev] AUTHORITY.KEYID = 7
6,349,207 UART: [ldev] FE.KEYID = 1
6,357,159 UART: [ldev] Erasing FE.KEYID = 1
8,830,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,646 UART: [ldev] --
10,623,174 UART: [fwproc] Wait for Commands...
10,625,644 UART: [fwproc] Recv command 0x46574c44
10,627,730 UART: [fwproc] Recv'd Img size: 114448 bytes
15,214,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,293,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,362,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,680,239 >>> mbox cmd response: success
15,684,581 UART: [afmc] ++
15,685,183 UART: [afmc] CDI.KEYID = 6
15,686,085 UART: [afmc] SUBJECT.KEYID = 7
15,687,181 UART: [afmc] AUTHORITY.KEYID = 5
18,189,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,907,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,909,470 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,925,539 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,941,565 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,957,511 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,979,327 UART: [afmc] --
19,982,291 UART: [cold-reset] --
19,986,554 UART: [state] Locking Datavault
19,990,176 UART: [state] Locking PCR0, PCR1 and PCR31
19,991,856 UART: [state] Locking ICCM
19,993,188 UART: [exit] Launching FMC @ 0x40000130
20,001,598 UART:
20,001,856 UART: Running Caliptra FMC ...
20,003,006 UART:
20,003,171 UART: [state] CFI Enabled
20,011,543 UART: [fht] FMC Alias Private Key: 7
21,768,438 UART: [art] Extend RT PCRs Done
21,769,695 UART: [art] Lock RT PCRs Done
21,771,334 UART: [art] Populate DV Done
21,776,664 UART: [fht] FMC Alias Private Key: 7
21,778,186 UART: [art] Derive CDI
21,778,981 UART: [art] Store in in slot 0x4
21,821,104 UART: [art] Derive Key Pair
21,822,183 UART: [art] Store priv key in slot 0x5
24,249,112 UART: [art] Derive Key Pair - Done
24,261,761 UART: [art] Signing Cert with AUTHO
24,263,101 UART: RITY.KEYID = 7
25,968,967 UART: [art] Erasing AUTHORITY.KEYID = 7
25,970,526 UART: [art] PUB.X = 0AA07BC44279D0E4E70E3D396731D0DC332AC8AD3F27B862AC444E8096A3529E14477BD73EA49BDE9ACC4DB320E07462
25,977,740 UART: [art] PUB.Y = 4C643B16D4CAF1733E130C80F2D90E6C3D06DBDAB05CE194CA492402C3B1C02125535686BA88549E8D841EB59A307031
25,985,037 UART: [art] SIG.R = E98036BAB8FAE445D442550EF59E7931B37A3AD87B92AD207981CCA6CE2DA48E4400E929C3E63256609A14A728D4A0DA
25,992,402 UART: [art] SIG.S = F864381971E0D1CF7436FB0ABC55A380ACD8B0CA9CAF317AC1E3CBF28F7F9EE6ADAEA88F4F13617B8C624BC5BA5F4B09
26,971,378 UART: Caliptra RT
26,972,108 UART: [state] CFI Enabled
27,089,774 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,882 writing to cptra_bootfsm_go
3,697,518 ready_for_fw is high
3,697,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,310,217 >>> mbox cmd response: success
19,553,138 UART:
19,553,550 UART: Running Caliptra FMC ...
19,554,673 UART:
19,554,824 UART: [state] CFI Enabled
19,562,738 UART: [fht] FMC Alias Private Key: 7
21,319,814 UART: [art] Extend RT PCRs Done
21,321,090 UART: [art] Lock RT PCRs Done
21,322,539 UART: [art] Populate DV Done
21,327,814 UART: [fht] FMC Alias Private Key: 7
21,329,422 UART: [art] Derive CDI
21,330,216 UART: [art] Store in in slot 0x4
21,373,480 UART: [art] Derive Key Pair
21,374,573 UART: [art] Store priv key in slot 0x5
23,801,932 UART: [art] Derive Key Pair - Done
23,814,955 UART: [art] Signing Cert with AUTHO
23,816,332 UART: RITY.KEYID = 7
25,521,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,523,251 UART: [art] PUB.X = 9DCD54DEBC2331E97D66353733E93178A3FE073E2CDEDA38CAF5157D591E9E0D411CB01C067C47FEC1380AB12C9A99B3
25,530,543 UART: [art] PUB.Y = 06A57B0D723963F1955780F57E211B15C6D83E8556D69BF911E26AEB595931D46AAA3838D77245435654CAC68E5DAD33
25,537,766 UART: [art] SIG.R = 52B8F3C439E19DC86874E700FDD3B328C46D55A1312875719B364628B9C240E85A9DC92B29BF698F242D2D5C7E360084
25,545,052 UART: [art] SIG.S = 5396B53A9BE60D4B493C995FD4C092AFC2632DAACB077FE666EF3CA92A67962F04BC783B955748982BFCEEB499910199
26,523,718 UART: Caliptra RT
26,524,457 UART: [state] CFI Enabled
26,641,280 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,514 UART:
192,880 UART: Running Caliptra ROM ...
194,059 UART:
194,218 UART: [state] CFI Enabled
262,175 UART: [state] LifecycleState = Production
264,421 UART: [state] DebugLocked = No
266,386 UART: [state] WD Timer not started. Device not locked for debugging
271,279 UART: [kat] SHA2-256
461,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,940 UART: [kat] ++
472,418 UART: [kat] sha1
483,434 UART: [kat] SHA2-256
486,505 UART: [kat] SHA2-384
492,132 UART: [kat] SHA2-512-ACC
494,725 UART: [kat] ECC-384
2,945,625 UART: [kat] HMAC-384Kdf
2,968,191 UART: [kat] LMS
3,499,962 UART: [kat] --
3,505,545 UART: [cold-reset] ++
3,507,690 UART: [fht] FHT @ 0x50003400
3,520,727 UART: [idev] ++
3,521,438 UART: [idev] CDI.KEYID = 6
3,522,414 UART: [idev] SUBJECT.KEYID = 7
3,523,583 UART: [idev] UDS.KEYID = 0
3,524,502 ready_for_fw is high
3,524,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,759 UART: [idev] Erasing UDS.KEYID = 0
6,027,645 UART: [idev] Sha1 KeyId Algorithm
6,049,035 UART: [idev] --
6,053,935 UART: [ldev] ++
6,054,620 UART: [ldev] CDI.KEYID = 6
6,055,538 UART: [ldev] SUBJECT.KEYID = 5
6,056,701 UART: [ldev] AUTHORITY.KEYID = 7
6,057,931 UART: [ldev] FE.KEYID = 1
6,098,178 UART: [ldev] Erasing FE.KEYID = 1
8,605,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,246 UART: [ldev] --
10,412,066 UART: [fwproc] Wait for Commands...
10,414,219 UART: [fwproc] Recv command 0x46574c44
10,416,526 UART: [fwproc] Recv'd Img size: 114448 bytes
15,078,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,161,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,277,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,821,010 >>> mbox cmd response: success
15,825,262 UART: [afmc] ++
15,826,099 UART: [afmc] CDI.KEYID = 6
15,827,154 UART: [afmc] SUBJECT.KEYID = 7
15,828,622 UART: [afmc] AUTHORITY.KEYID = 5
18,366,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,088,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,090,084 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,105,319 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,120,534 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,135,521 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,160,517 UART: [afmc] --
20,164,261 UART: [cold-reset] --
20,168,037 UART: [state] Locking Datavault
20,173,504 UART: [state] Locking PCR0, PCR1 and PCR31
20,175,695 UART: [state] Locking ICCM
20,178,460 UART: [exit] Launching FMC @ 0x40000130
20,187,099 UART:
20,187,345 UART: Running Caliptra FMC ...
20,188,488 UART:
20,188,652 UART: [state] CFI Enabled
20,245,044 UART: [fht] FMC Alias Private Key: 7
22,008,712 UART: [art] Extend RT PCRs Done
22,009,949 UART: [art] Lock RT PCRs Done
22,011,726 UART: [art] Populate DV Done
22,017,009 UART: [fht] FMC Alias Private Key: 7
22,018,545 UART: [art] Derive CDI
22,019,358 UART: [art] Store in in slot 0x4
22,077,222 UART: [art] Derive Key Pair
22,078,326 UART: [art] Store priv key in slot 0x5
24,541,702 UART: [art] Derive Key Pair - Done
24,554,493 UART: [art] Signing Cert with AUTHO
24,555,837 UART: RITY.KEYID = 7
26,266,243 UART: [art] Erasing AUTHORITY.KEYID = 7
26,267,796 UART: [art] PUB.X = 5285F9248178A35E7B4CDC841AB94336AC1AFCBCFDFE0CA36E2EF545F5ED76B8440726FA3436180EA1B909A6231E9342
26,275,077 UART: [art] PUB.Y = 57830E4C914A24F942A8A0084E1771C604ECFF438F0AFE45D077B016E8B45004DA69B50824D33CD9843C481BA64E12CC
26,282,344 UART: [art] SIG.R = 8EDB72FD7D811B59899058D7206030D8DC07347B4E8E22696B94D05B6C221EE1091A1AEE4091B573267C50B33DEF2AFA
26,289,717 UART: [art] SIG.S = 40A81AF62B5AD2DB4F04CD920F8BE61AE446AC45902F81079C7BDAAE951C10895B9B21740612CF264128DA4C389C556D
27,269,056 UART: Caliptra RT
27,269,784 UART: [state] CFI Enabled
27,433,591 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,418,621 ready_for_fw is high
3,419,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,863,482 >>> mbox cmd response: success
20,176,485 UART:
20,177,268 UART: Running Caliptra FMC ...
20,178,405 UART:
20,178,560 UART: [state] CFI Enabled
20,245,823 UART: [fht] FMC Alias Private Key: 7
22,009,984 UART: [art] Extend RT PCRs Done
22,011,283 UART: [art] Lock RT PCRs Done
22,013,131 UART: [art] Populate DV Done
22,018,573 UART: [fht] FMC Alias Private Key: 7
22,020,038 UART: [art] Derive CDI
22,020,846 UART: [art] Store in in slot 0x4
22,077,886 UART: [art] Derive Key Pair
22,078,935 UART: [art] Store priv key in slot 0x5
24,541,532 UART: [art] Derive Key Pair - Done
24,554,340 UART: [art] Signing Cert with AUTHO
24,555,691 UART: RITY.KEYID = 7
26,266,511 UART: [art] Erasing AUTHORITY.KEYID = 7
26,268,079 UART: [art] PUB.X = 2D62DAF9661079D29281A0A01A0845CB6B43D7DBDD88A07D04345F18FD2C0219C6AFCC8206CEF84ADF939652DB29BAFE
26,275,298 UART: [art] PUB.Y = 7FB08B8DC125FD99EB81473735F655CD14D31A297E3C68A820CECAD1E3825A79956E3DB0E5A0FAFF4E4B1B1F2AD5E445
26,282,578 UART: [art] SIG.R = BD760A8CB02758820ABD2FA6387B219E2F86793255773451051FBF722272CA5EACD81B023D98DAF4CA911B252EBA3B27
26,289,955 UART: [art] SIG.S = 085D2FF23E3318DA75CD6921297FD805F17AE9F68344B3AC8EC13DB65AF63A2721E4E5E7006AD16CD1F9411853BFF5A0
27,269,311 UART: Caliptra RT
27,270,058 UART: [state] CFI Enabled
27,432,731 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.97s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
192,679 UART:
193,041 UART: Running Caliptra ROM ...
194,170 UART:
604,006 UART: [state] CFI Enabled
620,373 UART: [state] LifecycleState = Production
622,573 UART: [state] DebugLocked = No
625,436 UART: [state] WD Timer not started. Device not locked for debugging
629,109 UART: [kat] SHA2-256
818,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,796 UART: [kat] ++
830,310 UART: [kat] sha1
841,341 UART: [kat] SHA2-256
844,386 UART: [kat] SHA2-384
849,103 UART: [kat] SHA2-512-ACC
851,681 UART: [kat] ECC-384
3,293,117 UART: [kat] HMAC-384Kdf
3,307,060 UART: [kat] LMS
3,838,876 UART: [kat] --
3,843,233 UART: [cold-reset] ++
3,845,018 UART: [fht] FHT @ 0x50003400
3,857,628 UART: [idev] ++
3,858,264 UART: [idev] CDI.KEYID = 6
3,859,212 UART: [idev] SUBJECT.KEYID = 7
3,860,453 UART: [idev] UDS.KEYID = 0
3,861,708 ready_for_fw is high
3,861,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,647 UART: [idev] Erasing UDS.KEYID = 0
6,335,808 UART: [idev] Sha1 KeyId Algorithm
6,359,194 UART: [idev] --
6,362,698 UART: [ldev] ++
6,363,467 UART: [ldev] CDI.KEYID = 6
6,364,383 UART: [ldev] SUBJECT.KEYID = 5
6,365,484 UART: [ldev] AUTHORITY.KEYID = 7
6,366,712 UART: [ldev] FE.KEYID = 1
6,379,028 UART: [ldev] Erasing FE.KEYID = 1
8,858,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,326 UART: [ldev] --
10,651,195 UART: [fwproc] Wait for Commands...
10,653,232 UART: [fwproc] Recv command 0x46574c44
10,655,537 UART: [fwproc] Recv'd Img size: 114448 bytes
15,321,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,405,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,521,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,064,646 >>> mbox cmd response: success
16,069,090 UART: [afmc] ++
16,069,913 UART: [afmc] CDI.KEYID = 6
16,070,919 UART: [afmc] SUBJECT.KEYID = 7
16,072,445 UART: [afmc] AUTHORITY.KEYID = 5
18,576,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,299,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,300,972 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,316,181 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,331,400 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,346,381 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,369,838 UART: [afmc] --
20,373,205 UART: [cold-reset] --
20,377,977 UART: [state] Locking Datavault
20,384,350 UART: [state] Locking PCR0, PCR1 and PCR31
20,386,558 UART: [state] Locking ICCM
20,387,952 UART: [exit] Launching FMC @ 0x40000130
20,396,640 UART:
20,396,884 UART: Running Caliptra FMC ...
20,398,033 UART:
20,398,193 UART: [state] CFI Enabled
20,406,350 UART: [fht] FMC Alias Private Key: 7
22,163,210 UART: [art] Extend RT PCRs Done
22,164,469 UART: [art] Lock RT PCRs Done
22,165,996 UART: [art] Populate DV Done
22,171,481 UART: [fht] FMC Alias Private Key: 7
22,173,060 UART: [art] Derive CDI
22,173,841 UART: [art] Store in in slot 0x4
22,216,535 UART: [art] Derive Key Pair
22,217,616 UART: [art] Store priv key in slot 0x5
24,644,083 UART: [art] Derive Key Pair - Done
24,657,094 UART: [art] Signing Cert with AUTHO
24,658,439 UART: RITY.KEYID = 7
26,363,860 UART: [art] Erasing AUTHORITY.KEYID = 7
26,365,420 UART: [art] PUB.X = B05FF789CC08DDA9BCFAD3DDA2816F61A46938F1B804FC34AF5AAFBBE091573D62603A91C6158C3070A6BAD3F9A61A8B
26,372,618 UART: [art] PUB.Y = 114E49990D740A09F10F3E70DEA88AB829D5C61734444601FE71566F2929D4A65096505C05B4337677B0414E372F2ACB
26,379,905 UART: [art] SIG.R = 52637E4EE9CE9A49EFE230D6282BFDCCE8C63A7888C1FE03A473D54780D927AB9216678F3766E9DE4B84C27A3DC93BBF
26,387,279 UART: [art] SIG.S = 3E8E7978B8A5DB85A1FD06B64C67CFD0718644A02F966620DBC492E33CB860FEA8CD400238F047B81B83127C8E54599E
27,365,673 UART: Caliptra RT
27,366,387 UART: [state] CFI Enabled
27,483,416 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,647 writing to cptra_bootfsm_go
3,760,697 ready_for_fw is high
3,761,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,123,601 >>> mbox cmd response: success
20,375,052 UART:
20,375,468 UART: Running Caliptra FMC ...
20,376,671 UART:
20,376,862 UART: [state] CFI Enabled
20,384,565 UART: [fht] FMC Alias Private Key: 7
22,141,414 UART: [art] Extend RT PCRs Done
22,142,678 UART: [art] Lock RT PCRs Done
22,144,414 UART: [art] Populate DV Done
22,150,000 UART: [fht] FMC Alias Private Key: 7
22,151,675 UART: [art] Derive CDI
22,152,482 UART: [art] Store in in slot 0x4
22,194,769 UART: [art] Derive Key Pair
22,195,857 UART: [art] Store priv key in slot 0x5
24,623,106 UART: [art] Derive Key Pair - Done
24,636,136 UART: [art] Signing Cert with AUTHO
24,637,509 UART: RITY.KEYID = 7
26,343,291 UART: [art] Erasing AUTHORITY.KEYID = 7
26,344,862 UART: [art] PUB.X = BDB87B19C1A2E6E94A1ABF6F8370199FB56E64C803A6A4EA7AFA6B0E963AE83CB1F5AADCF1D383E38C936511FA3DFBEF
26,352,165 UART: [art] PUB.Y = 7DA4A459ECEF7C52830E21607452B3E641BABF4C96D2B52363F2DFD67599714E2DDD952183AC5B280751097776025A2C
26,359,415 UART: [art] SIG.R = 5542E217DB65D01D42484127E76D1C9FB60FD72AFEF4362E402970581EFF64817A82989F146F3968C376BA9392045C90
26,366,782 UART: [art] SIG.S = 392A34ADE006EF91B1269CBB1FAAB1E2F3371D55BAFAF2BBAFE0998BAA646BD608DF24C0D4D5C55731D3785E06E90F7F
27,346,031 UART: Caliptra RT
27,346,776 UART: [state] CFI Enabled
27,463,898 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,416 UART:
193,536 UART: Running Caliptra ROM ...
194,760 UART:
194,913 UART: [state] CFI Enabled
265,217 UART: [state] LifecycleState = Unprovisioned
267,405 UART: [state] DebugLocked = Yes
269,469 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,462 UART: [kat] SHA2-256
445,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,717 UART: [kat] ++
456,293 UART: [kat] sha1
467,111 UART: [kat] SHA2-256
469,800 UART: [kat] SHA2-384
475,669 UART: [kat] SHA2-512-ACC
478,003 UART: [kat] ECC-384
2,767,521 UART: [kat] HMAC-384Kdf
2,779,205 UART: [kat] LMS
3,969,507 UART: [kat] --
3,974,827 UART: [cold-reset] ++
3,977,358 UART: [fht] Storing FHT @ 0x50003400
3,988,783 UART: [idev] ++
3,989,373 UART: [idev] CDI.KEYID = 6
3,990,288 UART: [idev] SUBJECT.KEYID = 7
3,991,556 UART: [idev] UDS.KEYID = 0
4,012,176 UART: [idev] Erasing UDS.KEYID = 0
7,327,379 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,751 UART: [idev] CSR upload requested
7,353,932 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,656,769 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,671,327 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,686,125 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,700,384 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,723,399 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,105 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,051 UART:
193,079 UART: Running Caliptra ROM ...
194,302 UART:
603,336 UART: [state] CFI Enabled
618,487 UART: [state] LifecycleState = Unprovisioned
620,424 UART: [state] DebugLocked = Yes
623,298 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,763 UART: [kat] SHA2-256
798,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,117 UART: [kat] ++
809,612 UART: [kat] sha1
819,242 UART: [kat] SHA2-256
821,918 UART: [kat] SHA2-384
827,134 UART: [kat] SHA2-512-ACC
829,530 UART: [kat] ECC-384
3,115,233 UART: [kat] HMAC-384Kdf
3,125,973 UART: [kat] LMS
4,316,081 UART: [kat] --
4,320,832 UART: [cold-reset] ++
4,323,119 UART: [fht] Storing FHT @ 0x50003400
4,334,707 UART: [idev] ++
4,335,332 UART: [idev] CDI.KEYID = 6
4,336,210 UART: [idev] SUBJECT.KEYID = 7
4,337,471 UART: [idev] UDS.KEYID = 0
4,354,442 UART: [idev] Erasing UDS.KEYID = 0
7,628,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,673 UART: [idev] CSR upload requested
7,655,834 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,947,910 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,962,484 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,977,249 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,991,566 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,014,554 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
18,183 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
192,441 UART:
193,384 UART: Running Caliptra ROM ...
194,579 UART:
194,784 UART: [state] CFI Enabled
266,484 UART: [state] LifecycleState = Unprovisioned
268,843 UART: [state] DebugLocked = Yes
270,104 UART: [state] Starting the WD Timer 40000000 cycles
275,668 UART: [kat] SHA2-256
454,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,385 UART: [kat] ++
466,944 UART: [kat] sha1
478,853 UART: [kat] SHA2-256
481,853 UART: [kat] SHA2-384
488,634 UART: [kat] SHA2-512-ACC
491,570 UART: [kat] ECC-384
2,955,305 UART: [kat] HMAC-384Kdf
2,976,965 UART: [kat] LMS
3,506,458 UART: [kat] --
3,512,145 UART: [cold-reset] ++
3,514,678 UART: [fht] FHT @ 0x50003400
3,525,272 UART: [idev] ++
3,525,831 UART: [idev] CDI.KEYID = 6
3,526,845 UART: [idev] SUBJECT.KEYID = 7
3,527,944 UART: [idev] UDS.KEYID = 0
3,549,225 UART: [idev] Erasing UDS.KEYID = 0
6,032,540 UART: [idev] Sha1 KeyId Algorithm
6,053,978 UART: [idev] CSR upload begun
6,058,664 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,786,344 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,802,423 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,818,294 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,834,086 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,858,158 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,943 writing to cptra_bootfsm_go
192,571 UART:
193,666 UART: Running Caliptra ROM ...
194,852 UART:
603,560 UART: [state] CFI Enabled
615,500 UART: [state] LifecycleState = Unprovisioned
617,370 UART: [state] DebugLocked = Yes
619,049 UART: [state] Starting the WD Timer 40000000 cycles
623,687 UART: [kat] SHA2-256
802,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,417 UART: [kat] ++
814,907 UART: [kat] sha1
825,730 UART: [kat] SHA2-256
828,747 UART: [kat] SHA2-384
835,043 UART: [kat] SHA2-512-ACC
838,035 UART: [kat] ECC-384
3,282,165 UART: [kat] HMAC-384Kdf
3,295,544 UART: [kat] LMS
3,825,067 UART: [kat] --
3,830,854 UART: [cold-reset] ++
3,831,699 UART: [fht] FHT @ 0x50003400
3,843,027 UART: [idev] ++
3,843,589 UART: [idev] CDI.KEYID = 6
3,844,600 UART: [idev] SUBJECT.KEYID = 7
3,845,697 UART: [idev] UDS.KEYID = 0
3,859,763 UART: [idev] Erasing UDS.KEYID = 0
6,314,387 UART: [idev] Sha1 KeyId Algorithm
6,334,825 UART: [idev] CSR upload begun
6,339,564 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,055,015 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,071,084 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,087,001 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,102,785 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,126,818 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,355 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,013 writing to cptra_bootfsm_go
192,643 UART:
193,758 UART: Running Caliptra ROM ...
194,986 UART:
195,142 UART: [state] CFI Enabled
262,122 UART: [state] LifecycleState = Unprovisioned
264,835 UART: [state] DebugLocked = Yes
266,556 UART: [state] Starting the WD Timer 40000000 cycles
272,617 UART: [kat] SHA2-256
462,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,261 UART: [kat] ++
473,856 UART: [kat] sha1
484,998 UART: [kat] SHA2-256
488,014 UART: [kat] SHA2-384
495,253 UART: [kat] SHA2-512-ACC
497,816 UART: [kat] ECC-384
2,950,271 UART: [kat] HMAC-384Kdf
2,972,652 UART: [kat] LMS
3,504,435 UART: [kat] --
3,508,647 UART: [cold-reset] ++
3,510,354 UART: [fht] FHT @ 0x50003400
3,522,261 UART: [idev] ++
3,522,944 UART: [idev] CDI.KEYID = 6
3,523,961 UART: [idev] SUBJECT.KEYID = 7
3,525,117 UART: [idev] UDS.KEYID = 0
3,544,135 UART: [idev] Erasing UDS.KEYID = 0
6,029,506 UART: [idev] Sha1 KeyId Algorithm
6,051,634 UART: [idev] CSR upload begun
6,056,733 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,782,447 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,797,599 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,812,735 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,827,783 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,852,849 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,730 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
17,062 writing to cptra_bootfsm_go
205,696 UART:
206,790 UART: Running Caliptra ROM ...
208,030 UART:
616,821 UART: [state] CFI Enabled
631,009 UART: [state] LifecycleState = Unprovisioned
633,386 UART: [state] DebugLocked = Yes
635,396 UART: [state] Starting the WD Timer 40000000 cycles
641,601 UART: [kat] SHA2-256
831,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
842,335 UART: [kat] ++
842,904 UART: [kat] sha1
853,941 UART: [kat] SHA2-256
856,932 UART: [kat] SHA2-384
862,955 UART: [kat] SHA2-512-ACC
865,575 UART: [kat] ECC-384
3,303,185 UART: [kat] HMAC-384Kdf
3,316,203 UART: [kat] LMS
3,848,016 UART: [kat] --
3,852,746 UART: [cold-reset] ++
3,854,840 UART: [fht] FHT @ 0x50003400
3,866,302 UART: [idev] ++
3,866,969 UART: [idev] CDI.KEYID = 6
3,867,906 UART: [idev] SUBJECT.KEYID = 7
3,869,114 UART: [idev] UDS.KEYID = 0
3,886,251 UART: [idev] Erasing UDS.KEYID = 0
6,345,228 UART: [idev] Sha1 KeyId Algorithm
6,366,148 UART: [idev] CSR upload begun
6,371,245 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,089,770 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,104,934 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,120,019 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,134,979 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,160,144 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,958 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = Yes
86,415 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,475,783 UART: [cold-reset] ++
1,476,312 UART: [fht] Storing FHT @ 0x50003400
1,479,089 UART: [idev] ++
1,479,257 UART: [idev] CDI.KEYID = 6
1,479,617 UART: [idev] SUBJECT.KEYID = 7
1,480,041 UART: [idev] UDS.KEYID = 0
1,488,072 UART: [idev] Erasing UDS.KEYID = 0
1,504,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,837 UART: [idev] CSR upload requested
1,514,683 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,198 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,530,910 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,536,812 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,542,516 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,051 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = Yes
86,748 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,493 UART: [kat] SHA2-512-ACC
897,394 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,488,485 UART: [idev] Erasing UDS.KEYID = 0
1,505,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,476 UART: [idev] CSR upload requested
1,515,322 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,887 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,599 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,501 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,205 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,740 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = Yes
86,479 UART: [state] Starting the WD Timer 40000000 cycles
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,271 UART: [kat] SHA2-256
904,211 UART: [kat] SHA2-384
906,856 UART: [kat] SHA2-512-ACC
908,757 UART: [kat] ECC-384
918,486 UART: [kat] HMAC-384Kdf
923,310 UART: [kat] LMS
1,171,638 UART: [kat] --
1,172,553 UART: [cold-reset] ++
1,173,092 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,184,722 UART: [idev] Erasing UDS.KEYID = 0
1,201,250 UART: [idev] Sha1 KeyId Algorithm
1,209,439 UART: [idev] CSR upload begun
1,211,220 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,984 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,696 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,598 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,302 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,837 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = Yes
87,132 UART: [state] Starting the WD Timer 40000000 cycles
88,755 UART: [kat] SHA2-256
894,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,530 UART: [kat] ++
898,682 UART: [kat] sha1
903,000 UART: [kat] SHA2-256
904,940 UART: [kat] SHA2-384
907,665 UART: [kat] SHA2-512-ACC
909,566 UART: [kat] ECC-384
919,181 UART: [kat] HMAC-384Kdf
923,741 UART: [kat] LMS
1,172,069 UART: [kat] --
1,172,870 UART: [cold-reset] ++
1,173,273 UART: [fht] FHT @ 0x50003400
1,175,964 UART: [idev] ++
1,176,132 UART: [idev] CDI.KEYID = 6
1,176,492 UART: [idev] SUBJECT.KEYID = 7
1,176,916 UART: [idev] UDS.KEYID = 0
1,184,571 UART: [idev] Erasing UDS.KEYID = 0
1,200,735 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] CSR upload begun
1,210,849 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,477 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,189 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,091 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,238,795 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,330 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = Yes
86,593 UART: [state] Starting the WD Timer 40000000 cycles
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,813 UART: [kat] ++
895,965 UART: [kat] sha1
900,399 UART: [kat] SHA2-256
902,339 UART: [kat] SHA2-384
905,146 UART: [kat] SHA2-512-ACC
907,047 UART: [kat] ECC-384
916,750 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] CSR upload begun
1,209,678 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,189 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,902 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,807 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,512 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,056 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = Yes
86,332 UART: [state] Starting the WD Timer 40000000 cycles
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,210 UART: [idev] CSR upload begun
1,208,989 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,532 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,245 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,150 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,236,855 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,399 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
Truncated 5078 bytes from beginning
063E897E1CA8CF1C845C2087CB02E2FDBFBC3D0DBF6958C3
36,443,369 UART: [art] SIG.S = 1E5E3273873B21864B4C90C7268587EDFD69E48252BB530F908A46FCA4EDB94C648BCB90040E47D7543DE4282EDD8C7B
37,747,896 UART: Caliptra RT
37,748,624 UART: [state] CFI Enabled
37,909,800 UART: [rt] RT listening for mailbox commands...
38,065,028 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,508,955 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,941,833 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6d:42:41:c0:f4:4b:69:07:3d:01:0d:38:4b:86:ac:67:44:ca:e5:fb
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6D4241C0F44B69073D010D384B86AC6744CAE5FBAFA4171D5087EC26F9678D0B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:04:97:52:47:0e:ff:7c:bb:70:1e:fe:96:ae:38:
5e:31:ba:e4:e2:52:7e:97:22:d0:dc:5e:fa:b0:c0:
3e:2a:bb:f2:c5:78:65:e9:da:9e:20:79:bc:44:48:
fc:9a:2b:dd:37:5e:67:ef:eb:63:a3:0e:fa:bf:c2:
45:03:1f:94:50:3c:48:6d:3c:cc:f3:19:3c:7f:39:
b9:5f:60:53:d9:99:86:d3:5f:8e:88:25:51:f2:0b:
85:18:27:40:6a:b7:b9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
6D:42:41:C0:F4:4B:69:07:3D:01:0D:38:4B:86:AC:67:44:CA:E5:FB
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:3b:68:4f:93:57:6f:83:f6:40:05:7a:51:41:fd:
f0:de:8b:ed:3b:c9:06:d4:17:f7:06:3e:89:7e:1c:a8:cf:1c:
84:5c:20:87:cb:02:e2:fd:bf:bc:3d:0d:bf:69:58:c3:02:30:
1e:5e:32:73:87:3b:21:86:4b:4c:90:c7:26:85:87:ed:fd:69:
e4:82:52:bb:53:0f:90:8a:46:fc:a4:ed:b9:4c:64:8b:cb:90:
04:0e:47:d7:54:3d:e4:28:2e:dd:8c:7b
41,411,643 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
41,553,850 UART:
41,554,226 UART: Running Caliptra ROM ...
41,555,361 UART:
41,555,526 UART: [state] CFI Enabled
41,622,827 UART: [state] LifecycleState = Production
41,624,605 UART: [state] DebugLocked = Yes
41,626,448 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,631,966 UART: [kat] SHA2-256
41,801,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,812,181 UART: [kat] ++
41,812,632 UART: [kat] sha1
41,822,647 UART: [kat] SHA2-256
41,825,336 UART: [kat] SHA2-384
41,831,538 UART: [kat] SHA2-512-ACC
41,833,936 UART: [kat] ECC-384
44,127,839 UART: [kat] HMAC-384Kdf
44,139,169 UART: [kat] LMS
45,329,506 UART: [kat] --
45,333,994 UART: [update-reset] ++
54,222,137 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,225,699 UART: [update-reset] Loading Runtime at address 0x40005000 len 87160
54,600,074 >>> mbox cmd response: success
54,600,663 UART: [update-reset] Copying MAN_2 To MAN_1
54,622,817 UART: [update-reset Success] --
54,627,327 UART: [state] Locking Datavault
54,630,469 UART: [state] Locking PCR0, PCR1 and PCR31
54,632,168 UART: [state] Locking ICCM
54,634,541 UART: [exit] Launching FMC @ 0x40000130
54,642,937 UART:
54,643,173 UART: Running Caliptra FMC ...
54,644,272 UART:
54,644,430 UART: [state] CFI Enabled
54,731,333 UART: [art] Extend RT PCRs Done
54,732,534 UART: [art] Lock RT PCRs Done
54,733,935 UART: [art] Populate DV Done
54,739,612 UART: [fht] FMC Alias Private Key: 7
54,741,307 UART: [art] Derive CDI
54,742,118 UART: [art] Store in in slot 0x4
54,800,614 UART: [art] Derive Key Pair
54,801,719 UART: [art] Store priv key in slot 0x5
58,094,307 UART: [art] Derive Key Pair - Done
58,107,399 UART: [art] Signing Cert with AUTHO
58,108,706 UART: RITY.KEYID = 7
60,395,684 UART: [art] Erasing AUTHORITY.KEYID = 7
60,397,193 UART: [art] PUB.X = A9CAE978A29F6996C3DFFFA9C798AE2A3605BBEA290F4112E1E1CF519A9058502A0010D255A7ED2B5331607BB458D0AB
60,404,438 UART: [art] PUB.Y = 377C6FDD6515AF2DEB8C9E5B5213B91457E2ABE7A7EED0F468D390E701E0E1B901549AB25C80068594444E126BF121D3
60,411,725 UART: [art] SIG.R = 24869516D19CD347550C662B59F661E614798B4E7C7B2B9525DE32C9985652AB792BBFE14B6A4B0180F586849BF2AAE1
60,419,067 UART: [art] SIG.S = A92C1ECB82D3C412DE49A262C46AD6F1518DD5D545309A314C5CD74C97BA55D97BF6D35DAC469512B30D49EC11437D64
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:ea:d2:06:92:a4:dd:1b:91:f5:f0:97:61:00:03:27:3a:2c:ab:06
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7EEAD20692A4DD1B91F5F097610003273A2CAB060DD4E16A3A9DDCF0311EB7B7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a9:ca:e9:78:a2:9f:69:96:c3:df:ff:a9:c7:98:
ae:2a:36:05:bb:ea:29:0f:41:12:e1:e1:cf:51:9a:
90:58:50:2a:00:10:d2:55:a7:ed:2b:53:31:60:7b:
b4:58:d0:ab:37:7c:6f:dd:65:15:af:2d:eb:8c:9e:
5b:52:13:b9:14:57:e2:ab:e7:a7:ee:d0:f4:68:d3:
90:e7:01:e0:e1:b9:01:54:9a:b2:5c:80:06:85:94:
44:4e:12:6b:f1:21:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
7E:EA:D2:06:92:A4:DD:1B:91:F5:F0:97:61:00:03:27:3A:2C:AB:06
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:24:86:95:16:d1:9c:d3:47:55:0c:66:2b:59:f6:
61:e6:14:79:8b:4e:7c:7b:2b:95:25:de:32:c9:98:56:52:ab:
79:2b:bf:e1:4b:6a:4b:01:80:f5:86:84:9b:f2:aa:e1:02:31:
00:a9:2c:1e:cb:82:d3:c4:12:de:49:a2:62:c4:6a:d6:f1:51:
8d:d5:d5:45:30:9a:31:4c:5c:d7:4c:97:ba:55:d9:7b:f6:d3:
5d:ac:46:95:12:b3:0d:49:ec:11:43:7d:64
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.24s
Truncated 561 bytes from beginning
eady_for_fw is high
3,807,552 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,320,447 >>> mbox cmd response: success
28,009,307 UART:
28,009,808 UART: Running Caliptra FMC ...
28,010,941 UART:
28,011,102 UART: [state] CFI Enabled
28,078,032 UART: [fht] FMC Alias Private Key: 7
30,415,592 UART: [art] Extend RT PCRs Done
30,416,829 UART: [art] Lock RT PCRs Done
30,418,731 UART: [art] Populate DV Done
30,424,352 UART: [fht] FMC Alias Private Key: 7
30,425,950 UART: [art] Derive CDI
30,426,767 UART: [art] Store in in slot 0x4
30,487,625 UART: [art] Derive Key Pair
30,488,664 UART: [art] Store priv key in slot 0x5
33,781,526 UART: [art] Derive Key Pair - Done
33,795,017 UART: [art] Signing Cert with AUTHO
33,796,325 UART: RITY.KEYID = 7
36,083,449 UART: [art] Erasing AUTHORITY.KEYID = 7
36,084,978 UART: [art] PUB.X = 27B83BD5B57306909BAC345AA9A6E7F185370176EDEA6DB4EBA085281DF2C8A3568ADAEAED24190CE45CF81F06F734AC
36,092,238 UART: [art] PUB.Y = 9B60F67F0294976F3B88D0DEA6A32A7B831DA024994D98A5B17ACCAC7C330C3444B2315FBBE3B8EE6E1CCF6C2682A99C
36,099,456 UART: [art] SIG.R = C350F789565C1E9E3302DFC0C6230B0B4B6A0F161CC5D428BF7AA856AE53202E07FE52B5E7321CE7EC44BC29CAA1AB95
36,106,854 UART: [art] SIG.S = 4C6DA129832E10E7B3A7CE676AA67AEF4EDF6C54BF75F5159AD0077E4DC46B47D2C80785867F029BF141D4B12DACF417
37,412,005 UART: Caliptra RT
37,412,728 UART: [state] CFI Enabled
37,575,133 UART: [rt] RT listening for mailbox commands...
37,606,330 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,051,527 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,484,199 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:57:08:17:28:c3:e8:e7:7a:06:c6:86:5b:7b:c0:d6:81:23:38:b6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8E57081728C3E8E77A06C6865B7BC0D6812338B6D589FAB17CDB2369E7CD10B1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:27:b8:3b:d5:b5:73:06:90:9b:ac:34:5a:a9:a6:
e7:f1:85:37:01:76:ed:ea:6d:b4:eb:a0:85:28:1d:
f2:c8:a3:56:8a:da:ea:ed:24:19:0c:e4:5c:f8:1f:
06:f7:34:ac:9b:60:f6:7f:02:94:97:6f:3b:88:d0:
de:a6:a3:2a:7b:83:1d:a0:24:99:4d:98:a5:b1:7a:
cc:ac:7c:33:0c:34:44:b2:31:5f:bb:e3:b8:ee:6e:
1c:cf:6c:26:82:a9:9c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
8E:57:08:17:28:C3:E8:E7:7A:06:C6:86:5B:7B:C0:D6:81:23:38:B6
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:c3:50:f7:89:56:5c:1e:9e:33:02:df:c0:c6:
23:0b:0b:4b:6a:0f:16:1c:c5:d4:28:bf:7a:a8:56:ae:53:20:
2e:07:fe:52:b5:e7:32:1c:e7:ec:44:bc:29:ca:a1:ab:95:02:
30:4c:6d:a1:29:83:2e:10:e7:b3:a7:ce:67:6a:a6:7a:ef:4e:
df:6c:54:bf:75:f5:15:9a:d0:07:7e:4d:c4:6b:47:d2:c8:07:
85:86:7f:02:9b:f1:41:d4:b1:2d:ac:f4:17
40,946,598 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
53,526,008 >>> mbox cmd response: success
53,559,459 UART:
53,559,793 UART: Running Caliptra FMC ...
53,561,012 UART:
53,561,181 UART: [state] CFI Enabled
53,650,830 UART: [art] Extend RT PCRs Done
53,652,041 UART: [art] Lock RT PCRs Done
53,653,751 UART: [art] Populate DV Done
53,659,451 UART: [fht] FMC Alias Private Key: 7
53,660,976 UART: [art] Derive CDI
53,661,723 UART: [art] Store in in slot 0x4
53,719,880 UART: [art] Derive Key Pair
53,720,873 UART: [art] Store priv key in slot 0x5
57,013,091 UART: [art] Derive Key Pair - Done
57,025,937 UART: [art] Signing Cert with AUTHO
57,027,274 UART: RITY.KEYID = 7
59,315,838 UART: [art] Erasing AUTHORITY.KEYID = 7
59,317,344 UART: [art] PUB.X = 909587D0B64A84ADA07B2E3FBF2A36FE4C6848E47D4463DA1529EE53EFBD28755946E5907ADA194B159AB66467C6B4A6
59,324,603 UART: [art] PUB.Y = 4DB435972F9333BC0DEA92B4CBF9B427BED8209649308BE5200AEA78CF5F141F1967D09DB266A971BD9A59607EBA3982
59,331,838 UART: [art] SIG.R = 11F6F062CA586784070EBA1F683D51E750DC5470936E3B7DCB1DC2AC2BB16985DE7B1AC75F6964758592948957EAB594
59,339,229 UART: [art] SIG.S = C2089CF9797EEB90CE4F6D88238514A7C14AD45A4B8124DF96A36537BECF930DACDBB9A600780EE9686C24BABDA14BEB
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6e:17:46:d9:1c:24:ef:21:ca:69:45:91:28:9a:a2:85:17:e8:ed:36
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EE1746D91C24EF21CA694591289AA28517E8ED36EE819B766E144A578CA0250F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:90:95:87:d0:b6:4a:84:ad:a0:7b:2e:3f:bf:2a:
36:fe:4c:68:48:e4:7d:44:63:da:15:29:ee:53:ef:
bd:28:75:59:46:e5:90:7a:da:19:4b:15:9a:b6:64:
67:c6:b4:a6:4d:b4:35:97:2f:93:33:bc:0d:ea:92:
b4:cb:f9:b4:27:be:d8:20:96:49:30:8b:e5:20:0a:
ea:78:cf:5f:14:1f:19:67:d0:9d:b2:66:a9:71:bd:
9a:59:60:7e:ba:39:82
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
EE:17:46:D9:1C:24:EF:21:CA:69:45:91:28:9A:A2:85:17:E8:ED:36
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:11:f6:f0:62:ca:58:67:84:07:0e:ba:1f:68:3d:
51:e7:50:dc:54:70:93:6e:3b:7d:cb:1d:c2:ac:2b:b1:69:85:
de:7b:1a:c7:5f:69:64:75:85:92:94:89:57:ea:b5:94:02:31:
00:c2:08:9c:f9:79:7e:eb:90:ce:4f:6d:88:23:85:14:a7:c1:
4a:d4:5a:4b:81:24:df:96:a3:65:37:be:cf:93:0d:ac:db:b9:
a6:00:78:0e:e9:68:6c:24:ba:bd:a1:4b:eb
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.18s
Truncated 5078 bytes from beginning
A8AD2C1F32A4B71EE647C2C0617036A370BB94754B742B92
36,118,842 UART: [art] SIG.S = 432E0505837ED6EBCD1452EE272F5ED7A956AF67FC6F80B7858F4ABB6EE0943839C22C6D3F67E46BCFDD93AF5F693F18
37,423,725 UART: Caliptra RT
37,424,465 UART: [state] CFI Enabled
37,541,645 UART: [rt] RT listening for mailbox commands...
37,695,612 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,140,880 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,575,133 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:4c:25:f3:b5:9a:40:b5:4a:56:93:54:82:04:71:72:07:3f:bf:98
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C04C25F3B59A40B54A56935482047172073FBF98565670C1E4111D5CE4FAB010
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9c:4a:20:6b:b2:37:5b:f4:a5:4c:67:9c:be:7d:
6a:69:9b:b1:d3:b2:47:1d:84:10:95:b0:50:2f:c8:
28:63:70:07:13:ad:8b:ec:8d:e4:de:9d:09:25:2c:
2a:e8:b4:35:d1:b7:80:24:e9:0f:c5:e1:c4:10:e8:
de:7f:e6:13:57:ec:7e:98:65:59:27:74:a4:0f:6c:
fd:be:08:a3:71:98:44:c7:9f:5d:1e:62:42:a0:ca:
0e:82:8a:e9:5a:34:81
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
C0:4C:25:F3:B5:9A:40:B5:4A:56:93:54:82:04:71:72:07:3F:BF:98
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b4:b1:5a:1f:2d:dc:69:4c:ce:32:67:78:05:
81:74:e9:41:5f:f7:5d:a5:e7:df:5f:a8:ad:2c:1f:32:a4:b7:
1e:e6:47:c2:c0:61:70:36:a3:70:bb:94:75:4b:74:2b:92:02:
30:43:2e:05:05:83:7e:d6:eb:cd:14:52:ee:27:2f:5e:d7:a9:
56:af:67:fc:6f:80:b7:85:8f:4a:bb:6e:e0:94:38:39:c2:2c:
6d:3f:67:e4:6b:cf:dd:93:af:5f:69:3f:18
41,038,397 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
41,180,339 UART:
41,180,710 UART: Running Caliptra ROM ...
41,181,754 UART:
41,181,957 UART: [state] CFI Enabled
41,198,893 UART: [state] LifecycleState = Production
41,200,671 UART: [state] DebugLocked = Yes
41,202,299 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,208,430 UART: [kat] SHA2-256
41,378,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,388,712 UART: [kat] ++
41,389,169 UART: [kat] sha1
41,399,780 UART: [kat] SHA2-256
41,402,477 UART: [kat] SHA2-384
41,408,352 UART: [kat] SHA2-512-ACC
41,410,757 UART: [kat] ECC-384
43,694,426 UART: [kat] HMAC-384Kdf
43,705,729 UART: [kat] LMS
44,895,793 UART: [kat] --
44,902,167 UART: [update-reset] ++
53,722,438 UART: [update-reset] Image verified using Vendor ECC Key Index 0
53,725,322 UART: [update-reset] Loading Runtime at address 0x40005000 len 87160
54,099,715 >>> mbox cmd response: success
54,100,265 UART: [update-reset] Copying MAN_2 To MAN_1
54,122,564 UART: [update-reset Success] --
54,127,021 UART: [state] Locking Datavault
54,129,951 UART: [state] Locking PCR0, PCR1 and PCR31
54,131,703 UART: [state] Locking ICCM
54,133,801 UART: [exit] Launching FMC @ 0x40000130
54,142,199 UART:
54,142,432 UART: Running Caliptra FMC ...
54,143,529 UART:
54,143,687 UART: [state] CFI Enabled
54,187,762 UART: [art] Extend RT PCRs Done
54,188,945 UART: [art] Lock RT PCRs Done
54,190,611 UART: [art] Populate DV Done
54,196,068 UART: [fht] FMC Alias Private Key: 7
54,197,770 UART: [art] Derive CDI
54,198,579 UART: [art] Store in in slot 0x4
54,241,033 UART: [art] Derive Key Pair
54,242,076 UART: [art] Store priv key in slot 0x5
57,484,474 UART: [art] Derive Key Pair - Done
57,497,097 UART: [art] Signing Cert with AUTHO
57,498,407 UART: RITY.KEYID = 7
59,777,793 UART: [art] Erasing AUTHORITY.KEYID = 7
59,779,301 UART: [art] PUB.X = 865AFEACF767A28F9F6CA4AB776185B05EE9541A2CCAFDA7486EE39809128156B6D5FD7A29FE5774D3CF2BF100F206D4
59,786,494 UART: [art] PUB.Y = F537E51F30F0068B7BB792E094A6BD5B632152A3C82891EFA6FFF7FC81CF66A6CBA6EAA10A5F1754B6184FE44131C256
59,793,788 UART: [art] SIG.R = 7A11B879626B5864F82884B26B5A18DE51D5B494BE1EF0C1A0BF9F32D1344AA8C313E171487AEFEE1EFED47739D50327
59,801,192 UART: [art] SIG.S = 7C057F3A4B299486B32F0CA1E8013663A52BAACCC2C16CBA70FC2715C3D4ECC1DBBDB327234078BFF5E256CBF7E57BD9
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:c5:07:2d:6a:c5:41:84:7c:5c:18:88:3f:a6:fa:4f:05:62:29:ae
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=56C5072D6AC541847C5C18883FA6FA4F056229AE337EE1D86E6A36A394CC56A9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:86:5a:fe:ac:f7:67:a2:8f:9f:6c:a4:ab:77:61:
85:b0:5e:e9:54:1a:2c:ca:fd:a7:48:6e:e3:98:09:
12:81:56:b6:d5:fd:7a:29:fe:57:74:d3:cf:2b:f1:
00:f2:06:d4:f5:37:e5:1f:30:f0:06:8b:7b:b7:92:
e0:94:a6:bd:5b:63:21:52:a3:c8:28:91:ef:a6:ff:
f7:fc:81:cf:66:a6:cb:a6:ea:a1:0a:5f:17:54:b6:
18:4f:e4:41:31:c2:56
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
56:C5:07:2D:6A:C5:41:84:7C:5C:18:88:3F:A6:FA:4F:05:62:29:AE
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7a:11:b8:79:62:6b:58:64:f8:28:84:b2:6b:5a:
18:de:51:d5:b4:94:be:1e:f0:c1:a0:bf:9f:32:d1:34:4a:a8:
c3:13:e1:71:48:7a:ef:ee:1e:fe:d4:77:39:d5:03:27:02:30:
7c:05:7f:3a:4b:29:94:86:b3:2f:0c:a1:e8:01:36:63:a5:2b:
aa:cc:c2:c1:6c:ba:70:fc:27:15:c3:d4:ec:c1:db:bd:b3:27:
23:40:78:bf:f5:e2:56:cb:f7:e5:7b:d9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.21s
Truncated 561 bytes from beginning
eady_for_fw is high
4,130,525 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,365,316 >>> mbox cmd response: success
28,008,187 UART:
28,008,788 UART: Running Caliptra FMC ...
28,010,163 UART:
28,010,343 UART: [state] CFI Enabled
28,017,975 UART: [fht] FMC Alias Private Key: 7
30,348,240 UART: [art] Extend RT PCRs Done
30,349,468 UART: [art] Lock RT PCRs Done
30,351,044 UART: [art] Populate DV Done
30,356,287 UART: [fht] FMC Alias Private Key: 7
30,357,943 UART: [art] Derive CDI
30,358,756 UART: [art] Store in in slot 0x4
30,401,344 UART: [art] Derive Key Pair
30,402,339 UART: [art] Store priv key in slot 0x5
33,644,107 UART: [art] Derive Key Pair - Done
33,657,317 UART: [art] Signing Cert with AUTHO
33,658,626 UART: RITY.KEYID = 7
35,938,434 UART: [art] Erasing AUTHORITY.KEYID = 7
35,939,938 UART: [art] PUB.X = AF4CBC4F61BF1B591E91DF1BF72DE6D41814F76711900C7674DF1465519DE4EB3B16E910F098DD2C1832302C218FB0C2
35,947,206 UART: [art] PUB.Y = B8E486F25BD4E5B4D33CD3FB211445DB57F07E3EC3732B47B0F446617E73A3D864C443105BFF89FB01B60250B2334050
35,954,408 UART: [art] SIG.R = EB1B7B41DEDDB0D513F2CCF25A3BB1907C87DDFA14DEC4244A2AA0DE95C01EDC64B2D26F21A34575A32704D7A6C41D6E
35,961,802 UART: [art] SIG.S = 6A3D70D0090835680FCC03AFF36EDD1E36441BECB26CD81F22BE6EF693481A1ADC357B480053605A89BD600824C43D86
37,267,801 UART: Caliptra RT
37,268,524 UART: [state] CFI Enabled
37,385,450 UART: [rt] RT listening for mailbox commands...
37,416,863 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,862,560 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,297,271 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:ed:2b:96:e8:bc:80:5f:35:f1:33:6e:31:d2:e3:6a:2c:8b:75:a7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CAED2B96E8BC805F35F1336E31D2E36A2C8B75A7317A6D981366CBA3A93A2DAC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:af:4c:bc:4f:61:bf:1b:59:1e:91:df:1b:f7:2d:
e6:d4:18:14:f7:67:11:90:0c:76:74:df:14:65:51:
9d:e4:eb:3b:16:e9:10:f0:98:dd:2c:18:32:30:2c:
21:8f:b0:c2:b8:e4:86:f2:5b:d4:e5:b4:d3:3c:d3:
fb:21:14:45:db:57:f0:7e:3e:c3:73:2b:47:b0:f4:
46:61:7e:73:a3:d8:64:c4:43:10:5b:ff:89:fb:01:
b6:02:50:b2:33:40:50
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
CA:ED:2B:96:E8:BC:80:5F:35:F1:33:6E:31:D2:E3:6A:2C:8B:75:A7
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:eb:1b:7b:41:de:dd:b0:d5:13:f2:cc:f2:5a:
3b:b1:90:7c:87:dd:fa:14:de:c4:24:4a:2a:a0:de:95:c0:1e:
dc:64:b2:d2:6f:21:a3:45:75:a3:27:04:d7:a6:c4:1d:6e:02:
30:6a:3d:70:d0:09:08:35:68:0f:cc:03:af:f3:6e:dd:1e:36:
44:1b:ec:b2:6c:d8:1f:22:be:6e:f6:93:48:1a:1a:dc:35:7b:
48:00:53:60:5a:89:bd:60:08:24:c4:3d:86
40,754,449 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
53,927,744 >>> mbox cmd response: success
53,960,991 UART:
53,961,334 UART: Running Caliptra FMC ...
53,962,563 UART:
53,962,729 UART: [state] CFI Enabled
54,006,532 UART: [art] Extend RT PCRs Done
54,007,680 UART: [art] Lock RT PCRs Done
54,009,031 UART: [art] Populate DV Done
54,014,432 UART: [fht] FMC Alias Private Key: 7
54,016,163 UART: [art] Derive CDI
54,016,979 UART: [art] Store in in slot 0x4
54,060,002 UART: [art] Derive Key Pair
54,061,005 UART: [art] Store priv key in slot 0x5
57,303,877 UART: [art] Derive Key Pair - Done
57,316,998 UART: [art] Signing Cert with AUTHO
57,318,300 UART: RITY.KEYID = 7
59,597,430 UART: [art] Erasing AUTHORITY.KEYID = 7
59,598,945 UART: [art] PUB.X = 6DE5D0B682C710D11E22A5ED10E2CFCBA04893EB10AB448ABC24AF766EC9425C7A67FB8512FF1052F764AE4B2CCEC5BA
59,606,191 UART: [art] PUB.Y = A67FD9FA5C9E7D4C7056F82220E4FE1BB26C33AFAF18FB83F8B1CFC5C8154078FC09E80A7C03C77FEB307CB4FB4C3DF5
59,613,472 UART: [art] SIG.R = 13D2259E18DD8EBEAFD1CE93EB1B9642B85F61A95A46ACAD3792CF89D0DE4D43C73A2CED04E28C6923ADAEE3D6B4BA55
59,620,887 UART: [art] SIG.S = B0C782E1DA3105D446771D6781493828742378B986B854F48745891294D48ED28ED16A537CAD347726A3115A4429C5CB
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:07:0a:ab:6b:76:87:cb:f9:59:9b:69:09:4f:14:b6:26:35:8e:b2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1D070AAB6B7687CBF9599B69094F14B626358EB2A6237334EE8E8AE291FF3E39
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6d:e5:d0:b6:82:c7:10:d1:1e:22:a5:ed:10:e2:
cf:cb:a0:48:93:eb:10:ab:44:8a:bc:24:af:76:6e:
c9:42:5c:7a:67:fb:85:12:ff:10:52:f7:64:ae:4b:
2c:ce:c5:ba:a6:7f:d9:fa:5c:9e:7d:4c:70:56:f8:
22:20:e4:fe:1b:b2:6c:33:af:af:18:fb:83:f8:b1:
cf:c5:c8:15:40:78:fc:09:e8:0a:7c:03:c7:7f:eb:
30:7c:b4:fb:4c:3d:f5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
1D:07:0A:AB:6B:76:87:CB:F9:59:9B:69:09:4F:14:B6:26:35:8E:B2
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:13:d2:25:9e:18:dd:8e:be:af:d1:ce:93:eb:1b:
96:42:b8:5f:61:a9:5a:46:ac:ad:37:92:cf:89:d0:de:4d:43:
c7:3a:2c:ed:04:e2:8c:69:23:ad:ae:e3:d6:b4:ba:55:02:31:
00:b0:c7:82:e1:da:31:05:d4:46:77:1d:67:81:49:38:28:74:
23:78:b9:86:b8:54:f4:87:45:89:12:94:d4:8e:d2:8e:d1:6a:
53:7c:ad:34:77:26:a3:11:5a:44:29:c5:cb
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.20s
Truncated 4980 bytes from beginning
A39A32540A4B49985D4AA063748ECF48988CD3F0DE4E6036D634DD961456525F3EA999581E65515EEA325BA8DB
25,926,825 UART: [art] SIG.S = AE95EFED1BC3B908E4D11FD25FAB642134372E75FDA4EE678EB89AD3BD9CD767E5FB293765186BE71BEE33E7B849BAF2
26,905,600 UART: Caliptra RT
26,906,336 UART: [state] CFI Enabled
27,072,219 UART: [rt] RT listening for mailbox commands...
27,223,838 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,669,873 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,105,052 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:93:68:9d:90:0b:2f:8d:0d:68:65:a6:a2:79:b2:67:a5:65:95:58
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0893689D900B2F8D0D6865A6A279B267A56595589427CEC61801847D35F4E992
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:87:1a:fa:3a:05:b2:39:58:6c:6e:c3:b5:1a:30:
cd:0d:cc:f4:a6:2c:7c:c2:60:2b:ea:fc:92:43:6d:
09:10:0a:0a:93:ed:51:02:c3:89:94:fd:0b:7a:82:
eb:2b:f6:c7:bd:79:fb:65:f3:95:12:b5:08:f1:00:
aa:f2:c7:f7:15:0e:ee:c5:91:2c:35:ef:03:aa:30:
95:75:3a:1d:28:a4:c0:13:9d:3b:ee:12:a4:b3:5d:
f6:d9:16:f8:b2:51:5a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
08:93:68:9D:90:0B:2F:8D:0D:68:65:A6:A2:79:B2:67:A5:65:95:58
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:fa:17:46:a3:9a:32:54:0a:4b:49:98:5d:4a:
a0:63:74:8e:cf:48:98:8c:d3:f0:de:4e:60:36:d6:34:dd:96:
14:56:52:5f:3e:a9:99:58:1e:65:51:5e:ea:32:5b:a8:db:02:
31:00:ae:95:ef:ed:1b:c3:b9:08:e4:d1:1f:d2:5f:ab:64:21:
34:37:2e:75:fd:a4:ee:67:8e:b8:9a:d3:bd:9c:d7:67:e5:fb:
29:37:65:18:6b:e7:1b:ee:33:e7:b8:49:ba:f2
30,565,387 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
30,707,887 UART:
30,708,280 UART: Running Caliptra ROM ...
30,709,328 UART:
30,709,480 UART: [state] CFI Enabled
30,768,973 UART: [state] LifecycleState = Production
30,770,744 UART: [state] DebugLocked = Yes
30,773,761 UART: [state] Starting the WD Timer 40000000 cycles
30,778,713 UART: [kat] SHA2-256
30,957,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,969,465 UART: [kat] ++
30,969,922 UART: [kat] sha1
30,982,153 UART: [kat] SHA2-256
30,985,224 UART: [kat] SHA2-384
30,990,534 UART: [kat] SHA2-512-ACC
30,993,523 UART: [kat] ECC-384
33,449,930 UART: [kat] HMAC-384Kdf
33,474,578 UART: [kat] LMS
34,004,052 UART: [kat] --
34,009,948 UART: [update-reset] ++
38,610,688 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,614,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
38,990,206 >>> mbox cmd response: success
38,990,706 UART: [update-reset] Copying MAN_2 To MAN_1
39,012,836 UART: [update-reset Success] --
39,017,133 UART: [state] Locking Datavault
39,019,039 UART: [state] Locking PCR0, PCR1 and PCR31
39,020,746 UART: [state] Locking ICCM
39,023,385 UART: [exit] Launching FMC @ 0x40000130
39,031,840 UART:
39,032,079 UART: Running Caliptra FMC ...
39,033,183 UART:
39,033,363 UART: [state] CFI Enabled
39,138,195 UART: [art] Extend RT PCRs Done
39,139,381 UART: [art] Lock RT PCRs Done
39,141,107 UART: [art] Populate DV Done
39,146,510 UART: [fht] FMC Alias Private Key: 7
39,148,108 UART: [art] Derive CDI
39,148,948 UART: [art] Store in in slot 0x4
39,207,110 UART: [art] Derive Key Pair
39,208,111 UART: [art] Store priv key in slot 0x5
41,670,901 UART: [art] Derive Key Pair - Done
41,683,959 UART: [art] Signing Cert with AUTHO
41,685,337 UART: RITY.KEYID = 7
43,396,594 UART: [art] Erasing AUTHORITY.KEYID = 7
43,398,102 UART: [art] PUB.X = 52CC9B2E9C7E74063288C05A5AA4D32180F0CC81397B65460A448FA56FE00DB0B6B7D4F2997641AA1FDFD5E126D8B6F2
43,405,357 UART: [art] PUB.Y = 926F93BED961027FBBBD3174CEE9D7A14A177294B915D0D16F724E5A95B9E3FEA784476D2D9D26208FDCB883BDF830A4
43,412,640 UART: [art] SIG.R = 82682C96671C192C42C872ED2F37C4CEF96473D224941F8FE58DD30773C39EA613B7F2988F080C7CA5D863E0E43E82BF
43,420,053 UART: [art] SIG.S = 778A7021ED9016BA3DCCAD2B9E92C66E04CC31213B293C726C6585B7CDD3A44588C051E256108AD0CC7CBD149E0EF586
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:b6:48:9a:31:ea:7f:f1:0f:ff:5c:ee:85:13:56:eb:17:f3:9c:c2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=47B6489A31EA7FF10FFF5CEE851356EB17F39CC2A60475EC9BCA82C8C1B712EE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:52:cc:9b:2e:9c:7e:74:06:32:88:c0:5a:5a:a4:
d3:21:80:f0:cc:81:39:7b:65:46:0a:44:8f:a5:6f:
e0:0d:b0:b6:b7:d4:f2:99:76:41:aa:1f:df:d5:e1:
26:d8:b6:f2:92:6f:93:be:d9:61:02:7f:bb:bd:31:
74:ce:e9:d7:a1:4a:17:72:94:b9:15:d0:d1:6f:72:
4e:5a:95:b9:e3:fe:a7:84:47:6d:2d:9d:26:20:8f:
dc:b8:83:bd:f8:30:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
47:B6:48:9A:31:EA:7F:F1:0F:FF:5C:EE:85:13:56:EB:17:F3:9C:C2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:82:68:2c:96:67:1c:19:2c:42:c8:72:ed:2f:
37:c4:ce:f9:64:73:d2:24:94:1f:8f:e5:8d:d3:07:73:c3:9e:
a6:13:b7:f2:98:8f:08:0c:7c:a5:d8:63:e0:e4:3e:82:bf:02:
30:77:8a:70:21:ed:90:16:ba:3d:cc:ad:2b:9e:92:c6:6e:04:
cc:31:21:3b:29:3c:72:6c:65:85:b7:cd:d3:a4:45:88:c0:51:
e2:56:10:8a:d0:cc:7c:bd:14:9e:0e:f5:86
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.37s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,380,323 ready_for_fw is high
3,380,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,077,067 >>> mbox cmd response: success
19,376,690 UART:
19,377,095 UART: Running Caliptra FMC ...
19,378,215 UART:
19,378,376 UART: [state] CFI Enabled
19,443,920 UART: [fht] FMC Alias Private Key: 7
21,207,941 UART: [art] Extend RT PCRs Done
21,209,161 UART: [art] Lock RT PCRs Done
21,210,737 UART: [art] Populate DV Done
21,216,039 UART: [fht] FMC Alias Private Key: 7
21,217,636 UART: [art] Derive CDI
21,218,452 UART: [art] Store in in slot 0x4
21,276,605 UART: [art] Derive Key Pair
21,277,646 UART: [art] Store priv key in slot 0x5
23,740,794 UART: [art] Derive Key Pair - Done
23,753,741 UART: [art] Signing Cert with AUTHO
23,755,044 UART: RITY.KEYID = 7
25,467,145 UART: [art] Erasing AUTHORITY.KEYID = 7
25,468,656 UART: [art] PUB.X = 9660CE828D9A0DF64C6C855DE56756E700ADC817B64D2E9FBBAB0941A95FF2096250519FC456DC1B83A8E590EDBB66FA
25,475,906 UART: [art] PUB.Y = 91DD0337D16183CC11CD34A7EB92196571CCEC66D94B0159ACFF2BEA5879C3A248A0CE3B7F592D5F47CFB99162955367
25,483,119 UART: [art] SIG.R = B5D1C5CA95CBC79F06FD0CAFD762C7D9048C75B0CD6B97228667AC411BCF9E710819EC35CE5C73D551C7864D429C15DA
25,490,571 UART: [art] SIG.S = 2170C5762156DC6E106E978FDFEA0C99BA1CDE1AA83BB2D453FAB1A9BFBFE3EF0690E34520427FBF50493A6581E0A7AF
26,469,699 UART: Caliptra RT
26,470,393 UART: [state] CFI Enabled
26,633,701 UART: [rt] RT listening for mailbox commands...
26,664,906 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,109,906 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,545,639 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:cd:43:e9:8a:ad:4d:d7:e9:30:65:31:86:02:83:7b:04:52:1c:b9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=23CD43E98AAD4DD7E93065318602837B04521CB9CF52C4386EAB3083E5E53F7C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:96:60:ce:82:8d:9a:0d:f6:4c:6c:85:5d:e5:67:
56:e7:00:ad:c8:17:b6:4d:2e:9f:bb:ab:09:41:a9:
5f:f2:09:62:50:51:9f:c4:56:dc:1b:83:a8:e5:90:
ed:bb:66:fa:91:dd:03:37:d1:61:83:cc:11:cd:34:
a7:eb:92:19:65:71:cc:ec:66:d9:4b:01:59:ac:ff:
2b:ea:58:79:c3:a2:48:a0:ce:3b:7f:59:2d:5f:47:
cf:b9:91:62:95:53:67
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
23:CD:43:E9:8A:AD:4D:D7:E9:30:65:31:86:02:83:7B:04:52:1C:B9
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b5:d1:c5:ca:95:cb:c7:9f:06:fd:0c:af:d7:
62:c7:d9:04:8c:75:b0:cd:6b:97:22:86:67:ac:41:1b:cf:9e:
71:08:19:ec:35:ce:5c:73:d5:51:c7:86:4d:42:9c:15:da:02:
30:21:70:c5:76:21:56:dc:6e:10:6e:97:8f:df:ea:0c:99:ba:
1c:de:1a:a8:3b:b2:d4:53:fa:b1:a9:bf:bf:e3:ef:06:90:e3:
45:20:42:7f:bf:50:49:3a:65:81:e0:a7:af
30,005,612 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
38,105,211 >>> mbox cmd response: success
38,141,898 UART:
38,142,264 UART: Running Caliptra FMC ...
38,143,415 UART:
38,143,600 UART: [state] CFI Enabled
38,251,337 UART: [art] Extend RT PCRs Done
38,252,531 UART: [art] Lock RT PCRs Done
38,254,005 UART: [art] Populate DV Done
38,259,432 UART: [fht] FMC Alias Private Key: 7
38,261,127 UART: [art] Derive CDI
38,261,943 UART: [art] Store in in slot 0x4
38,319,794 UART: [art] Derive Key Pair
38,320,838 UART: [art] Store priv key in slot 0x5
40,783,270 UART: [art] Derive Key Pair - Done
40,796,545 UART: [art] Signing Cert with AUTHO
40,797,856 UART: RITY.KEYID = 7
42,509,656 UART: [art] Erasing AUTHORITY.KEYID = 7
42,511,169 UART: [art] PUB.X = A8262C3E484B3D92234484261416392B0F7776EA5CF6EBD5F5BEA3FBB44A825E47202D0879781137FC3D56A99569AE45
42,518,418 UART: [art] PUB.Y = 59B26FD2005F089445AFB69445EF5FF0F5C48516766868DFF8025C56EBDEC827BB3540F5FD7BEEA559374FADE83CC726
42,525,705 UART: [art] SIG.R = DE86CD806AC8974F8B8808DD0EAF424D986BBFEB5BAB757CA6FF095D48BB0C20F9AF129074FC34B30CB3049766587FDA
42,533,163 UART: [art] SIG.S = 215DF8F94F7FA5B121EC6D2E056CA4174B7F942B31C33983B038E0E6B69508CEB198FAFDF420CF8E85786F914C075AAF
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:18:9c:bd:ae:d3:b6:34:b1:8a:8d:0e:81:d4:38:2e:90:50:9a:4f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=97189CBDAED3B634B18A8D0E81D4382E90509A4F947FCE7AB33A7F9D9072A377
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a8:26:2c:3e:48:4b:3d:92:23:44:84:26:14:16:
39:2b:0f:77:76:ea:5c:f6:eb:d5:f5:be:a3:fb:b4:
4a:82:5e:47:20:2d:08:79:78:11:37:fc:3d:56:a9:
95:69:ae:45:59:b2:6f:d2:00:5f:08:94:45:af:b6:
94:45:ef:5f:f0:f5:c4:85:16:76:68:68:df:f8:02:
5c:56:eb:de:c8:27:bb:35:40:f5:fd:7b:ee:a5:59:
37:4f:ad:e8:3c:c7:26
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
97:18:9C:BD:AE:D3:B6:34:B1:8A:8D:0E:81:D4:38:2E:90:50:9A:4F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:86:cd:80:6a:c8:97:4f:8b:88:08:dd:0e:
af:42:4d:98:6b:bf:eb:5b:ab:75:7c:a6:ff:09:5d:48:bb:0c:
20:f9:af:12:90:74:fc:34:b3:0c:b3:04:97:66:58:7f:da:02:
30:21:5d:f8:f9:4f:7f:a5:b1:21:ec:6d:2e:05:6c:a4:17:4b:
7f:94:2b:31:c3:39:83:b0:38:e0:e6:b6:95:08:ce:b1:98:fa:
fd:f4:20:cf:8e:85:78:6f:91:4c:07:5a:af
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
Truncated 4977 bytes from beginning
ADCD8836FC3C5E646A29A1F751DB386B8F4084091A3924F8AE8D61ACF44F1A9167562214A3D0794C6AC17AE947879
26,016,893 UART: [art] SIG.S = 8BD6077B13C6E7D91BBE7538EC5EAE0CC9D8651B252639AC787D918951D74A8011AC1654C777F23C5B27FDBCF51824C6
26,995,829 UART: Caliptra RT
26,996,563 UART: [state] CFI Enabled
27,113,827 UART: [rt] RT listening for mailbox commands...
27,268,653 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,714,126 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,150,693 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
76:39:6a:fa:c9:02:55:1d:58:83:ac:4d:c7:a5:73:b1:58:5c:c6:23
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=72396AFAC902551D5883AC4DC7A573B1585CC62382695D41D64629490AC18E6F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a2:41:9c:17:24:ac:23:f7:1b:6a:91:0c:b5:d6:
3e:e5:5c:b1:c3:7c:35:12:4d:53:ef:07:bc:1d:7b:
c4:f6:f7:ad:89:e8:26:8b:f7:2f:2b:12:b5:b4:e4:
bc:e2:b0:5a:6e:aa:99:37:48:45:e0:60:a3:79:0a:
5a:77:b7:f1:93:60:61:35:24:ee:d1:31:42:b5:cd:
74:48:50:7a:b3:3c:a2:2e:91:cc:d9:01:d0:a4:de:
39:28:3d:53:48:2d:ce
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
72:39:6A:FA:C9:02:55:1D:58:83:AC:4D:C7:A5:73:B1:58:5C:C6:23
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ee:0a:dc:d8:83:6f:c3:c5:e6:46:a2:9a:1f:
75:1d:b3:86:b8:f4:08:40:91:a3:92:4f:8a:e8:d6:1a:cf:44:
f1:a9:16:75:62:21:4a:3d:07:94:c6:ac:17:ae:94:78:79:02:
31:00:8b:d6:07:7b:13:c6:e7:d9:1b:be:75:38:ec:5e:ae:0c:
c9:d8:65:1b:25:26:39:ac:78:7d:91:89:51:d7:4a:80:11:ac:
16:54:c7:77:f2:3c:5b:27:fd:bc:f5:18:24:c6
30,610,685 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
30,753,969 UART:
30,754,367 UART: Running Caliptra ROM ...
30,755,450 UART:
30,755,615 UART: [state] CFI Enabled
30,768,757 UART: [state] LifecycleState = Production
30,770,513 UART: [state] DebugLocked = Yes
30,772,307 UART: [state] Starting the WD Timer 40000000 cycles
30,776,850 UART: [kat] SHA2-256
30,956,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,967,584 UART: [kat] ++
30,968,122 UART: [kat] sha1
30,978,905 UART: [kat] SHA2-256
30,981,975 UART: [kat] SHA2-384
30,988,709 UART: [kat] SHA2-512-ACC
30,991,647 UART: [kat] ECC-384
33,433,870 UART: [kat] HMAC-384Kdf
33,447,351 UART: [kat] LMS
33,976,914 UART: [kat] --
33,980,144 UART: [update-reset] ++
38,591,089 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,594,638 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
38,970,046 >>> mbox cmd response: success
38,971,375 UART: [update-reset] Copying MAN_2 To MAN_1
38,993,744 UART: [update-reset Success] --
38,998,726 UART: [state] Locking Datavault
39,002,189 UART: [state] Locking PCR0, PCR1 and PCR31
39,003,838 UART: [state] Locking ICCM
39,005,291 UART: [exit] Launching FMC @ 0x40000130
39,013,763 UART:
39,014,048 UART: Running Caliptra FMC ...
39,015,167 UART:
39,015,339 UART: [state] CFI Enabled
39,059,408 UART: [art] Extend RT PCRs Done
39,060,551 UART: [art] Lock RT PCRs Done
39,061,996 UART: [art] Populate DV Done
39,067,403 UART: [fht] FMC Alias Private Key: 7
39,068,948 UART: [art] Derive CDI
39,069,767 UART: [art] Store in in slot 0x4
39,112,852 UART: [art] Derive Key Pair
39,113,950 UART: [art] Store priv key in slot 0x5
41,540,572 UART: [art] Derive Key Pair - Done
41,553,852 UART: [art] Signing Cert with AUTHO
41,555,159 UART: RITY.KEYID = 7
43,260,760 UART: [art] Erasing AUTHORITY.KEYID = 7
43,262,328 UART: [art] PUB.X = F385F7A3509E61BD4A692E993A61AAAE82E264D61AB6D2C5171D34FB67ABC8771F6D356E49E5E61C57B462D54B3317BC
43,269,579 UART: [art] PUB.Y = CA1BC92DBA2CA418FFA004B802B5CBA59CB1A05D7F2217092053CFB1BFE5A437696C580238BFBA2F9D97C552EDB46964
43,276,856 UART: [art] SIG.R = 3304B696D36C12B796B704A0ECD6E6368904DD9E6F382F181C1432BFA1F89AC5D036CEB8B53DF4B5BD54243DD6AA879F
43,284,240 UART: [art] SIG.S = 768490F6C413AFE517BB66DF5BAE8B7E14822E7AA31ECF43B43D4204D25E8FE29791E9C9C05DA9706FF37EB047791058
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:c2:0d:51:33:6c:6e:dd:58:8e:38:53:0e:06:1b:f1:10:f2:89:2f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EBC20D51336C6EDD588E38530E061BF110F2892F61ACE37EB310BA1F6DF02BAB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f3:85:f7:a3:50:9e:61:bd:4a:69:2e:99:3a:61:
aa:ae:82:e2:64:d6:1a:b6:d2:c5:17:1d:34:fb:67:
ab:c8:77:1f:6d:35:6e:49:e5:e6:1c:57:b4:62:d5:
4b:33:17:bc:ca:1b:c9:2d:ba:2c:a4:18:ff:a0:04:
b8:02:b5:cb:a5:9c:b1:a0:5d:7f:22:17:09:20:53:
cf:b1:bf:e5:a4:37:69:6c:58:02:38:bf:ba:2f:9d:
97:c5:52:ed:b4:69:64
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
EB:C2:0D:51:33:6C:6E:DD:58:8E:38:53:0E:06:1B:F1:10:F2:89:2F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:33:04:b6:96:d3:6c:12:b7:96:b7:04:a0:ec:d6:
e6:36:89:04:dd:9e:6f:38:2f:18:1c:14:32:bf:a1:f8:9a:c5:
d0:36:ce:b8:b5:3d:f4:b5:bd:54:24:3d:d6:aa:87:9f:02:30:
76:84:90:f6:c4:13:af:e5:17:bb:66:df:5b:ae:8b:7e:14:82:
2e:7a:a3:1e:cf:43:b4:3d:42:04:d2:5e:8f:e2:97:91:e9:c9:
c0:5d:a9:70:6f:f3:7e:b0:47:79:10:58
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.36s
Truncated 524 bytes from beginning
ing to cptra_bootfsm_go
3,693,004 ready_for_fw is high
3,693,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,256,742 >>> mbox cmd response: success
19,507,663 UART:
19,508,100 UART: Running Caliptra FMC ...
19,509,228 UART:
19,509,388 UART: [state] CFI Enabled
19,517,073 UART: [fht] FMC Alias Private Key: 7
21,273,793 UART: [art] Extend RT PCRs Done
21,275,023 UART: [art] Lock RT PCRs Done
21,276,582 UART: [art] Populate DV Done
21,282,096 UART: [fht] FMC Alias Private Key: 7
21,283,693 UART: [art] Derive CDI
21,284,429 UART: [art] Store in in slot 0x4
21,327,288 UART: [art] Derive Key Pair
21,328,284 UART: [art] Store priv key in slot 0x5
23,754,792 UART: [art] Derive Key Pair - Done
23,767,472 UART: [art] Signing Cert with AUTHO
23,768,778 UART: RITY.KEYID = 7
25,474,643 UART: [art] Erasing AUTHORITY.KEYID = 7
25,476,177 UART: [art] PUB.X = EFA76FC2C5F26C71D2DF2A419E74E2D6DDB005A89EE5BD1018A7E542F4A15638F6D0280E539EC78C24FA0BD70C6B7EF4
25,483,424 UART: [art] PUB.Y = ECE80E120091E0C6C4FB7451A15004DA18978402FE7220EB77ACF667D4F073820756024C58D31056E3D88CDA6F0F9FA3
25,490,628 UART: [art] SIG.R = 0671F7BFE555883511FA523A5FF908D7C2F924F4978DA519681CE97BEAF71796A5106ABC45857CA8804B375A57B30315
25,498,024 UART: [art] SIG.S = 71749E6B9E98B8FE84F028C0622F5E7DFFBBAACE030C2B85E92A3A5C86270A72FE962051B4261A3C5C4D667B1D152985
26,476,719 UART: Caliptra RT
26,477,413 UART: [state] CFI Enabled
26,593,765 UART: [rt] RT listening for mailbox commands...
26,625,533 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,069,877 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,506,252 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0d:a1:5a:29:d0:37:e9:01:9c:a6:80:f0:84:7a:87:c2:59:c1:78:89
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0DA15A29D037E9019CA680F0847A87C259C178898EBFAAEE5769919931B0C7B2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ef:a7:6f:c2:c5:f2:6c:71:d2:df:2a:41:9e:74:
e2:d6:dd:b0:05:a8:9e:e5:bd:10:18:a7:e5:42:f4:
a1:56:38:f6:d0:28:0e:53:9e:c7:8c:24:fa:0b:d7:
0c:6b:7e:f4:ec:e8:0e:12:00:91:e0:c6:c4:fb:74:
51:a1:50:04:da:18:97:84:02:fe:72:20:eb:77:ac:
f6:67:d4:f0:73:82:07:56:02:4c:58:d3:10:56:e3:
d8:8c:da:6f:0f:9f:a3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
0D:A1:5A:29:D0:37:E9:01:9C:A6:80:F0:84:7A:87:C2:59:C1:78:89
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:06:71:f7:bf:e5:55:88:35:11:fa:52:3a:5f:f9:
08:d7:c2:f9:24:f4:97:8d:a5:19:68:1c:e9:7b:ea:f7:17:96:
a5:10:6a:bc:45:85:7c:a8:80:4b:37:5a:57:b3:03:15:02:30:
71:74:9e:6b:9e:98:b8:fe:84:f0:28:c0:62:2f:5e:7d:ff:bb:
aa:ce:03:0c:2b:85:e9:2a:3a:5c:86:27:0a:72:fe:96:20:51:
b4:26:1a:3c:5c:4d:66:7b:1d:15:29:85
29,963,586 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
37,975,082 >>> mbox cmd response: success
38,009,776 UART:
38,010,131 UART: Running Caliptra FMC ...
38,011,355 UART:
38,011,528 UART: [state] CFI Enabled
38,055,446 UART: [art] Extend RT PCRs Done
38,056,597 UART: [art] Lock RT PCRs Done
38,057,995 UART: [art] Populate DV Done
38,063,263 UART: [fht] FMC Alias Private Key: 7
38,064,975 UART: [art] Derive CDI
38,065,784 UART: [art] Store in in slot 0x4
38,108,444 UART: [art] Derive Key Pair
38,109,445 UART: [art] Store priv key in slot 0x5
40,535,716 UART: [art] Derive Key Pair - Done
40,548,503 UART: [art] Signing Cert with AUTHO
40,549,851 UART: RITY.KEYID = 7
42,255,564 UART: [art] Erasing AUTHORITY.KEYID = 7
42,257,075 UART: [art] PUB.X = 0B59585784AAA4EFF0F00925B5026AFC8C6C3846FECD5E260377A9DFBAB699D8D0CC66FD47FC461C909031A638CF36FC
42,264,373 UART: [art] PUB.Y = 874E13B5986F56962C1B335E9E760F951330D61C26C21BD6F1EB7A3ACD729161FE87832BEA05CAC949264676C31B68A5
42,271,597 UART: [art] SIG.R = A85DF703ABC9E2D6623928AD84FEB23F9352185CEB4A233B0DA02986E07ECDAE56CA164EA175EC0C0B272C0815884541
42,278,984 UART: [art] SIG.S = 7F7DBDD28326F5B28A63175B9158A9FFC33C3F5F675660A45818A47D9E775579E363FF1BED55701398701B1192223901
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
67:8d:f1:50:49:78:dc:00:02:75:af:f5:68:96:61:5d:2a:bc:1c:b5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=638DF1504978DC000275AFF56896615D2ABC1CB51DC3C0226BC519901D7321D7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0b:59:58:57:84:aa:a4:ef:f0:f0:09:25:b5:02:
6a:fc:8c:6c:38:46:fe:cd:5e:26:03:77:a9:df:ba:
b6:99:d8:d0:cc:66:fd:47:fc:46:1c:90:90:31:a6:
38:cf:36:fc:87:4e:13:b5:98:6f:56:96:2c:1b:33:
5e:9e:76:0f:95:13:30:d6:1c:26:c2:1b:d6:f1:eb:
7a:3a:cd:72:91:61:fe:87:83:2b:ea:05:ca:c9:49:
26:46:76:c3:1b:68:a5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
63:8D:F1:50:49:78:DC:00:02:75:AF:F5:68:96:61:5D:2A:BC:1C:B5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a8:5d:f7:03:ab:c9:e2:d6:62:39:28:ad:84:
fe:b2:3f:93:52:18:5c:eb:4a:23:3b:0d:a0:29:86:e0:7e:cd:
ae:56:ca:16:4e:a1:75:ec:0c:0b:27:2c:08:15:88:45:41:02:
30:7f:7d:bd:d2:83:26:f5:b2:8a:63:17:5b:91:58:a9:ff:c3:
3c:3f:5f:67:56:60:a4:58:18:a4:7d:9e:77:55:79:e3:63:ff:
1b:ed:55:70:13:98:70:1b:11:92:22:39:01
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
Truncated 4974 bytes from beginning
F9C3A3A1D3612EDE03E5658C8174F30CFFA7E89EC084FFF63DC6AE94217930741DB830523B1E1AC12A477E81CC10FEE8
26,293,130 UART: [art] SIG.S = 509DFD1B229E1B2C2ED715B025C370F30D1945C5C9C70DD762BC7698C42E08FC5A43DBADD0665BCAADDC36788F816754
27,271,918 UART: Caliptra RT
27,272,636 UART: [state] CFI Enabled
27,438,142 UART: [rt] RT listening for mailbox commands...
27,590,208 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,036,157 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,471,244 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:ca:38:9f:7e:91:b7:66:aa:04:b0:f0:6f:18:99:29:8b:29:f7:63
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=91CA389F7E91B766AA04B0F06F1899298B29F763ED5C895BDC1AC804A2407E6D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9b:25:29:b7:64:2f:e7:8e:1f:0d:5e:9c:00:f0:
dd:6e:97:81:b8:e5:cb:13:bf:34:ae:c9:33:d9:c8:
d8:67:e9:32:ea:50:b9:cb:14:09:10:13:3c:e4:31:
36:4a:2a:e8:80:69:cb:07:80:71:69:ce:87:95:93:
a5:85:0d:40:34:e8:10:b9:60:7a:3c:c9:ef:de:cb:
98:a2:a0:86:64:26:bd:3e:f1:40:5a:45:59:39:67:
a4:22:4e:7c:ea:8e:be
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
91:CA:38:9F:7E:91:B7:66:AA:04:B0:F0:6F:18:99:29:8B:29:F7:63
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f9:c3:a3:a1:d3:61:2e:de:03:e5:65:8c:81:
74:f3:0c:ff:a7:e8:9e:c0:84:ff:f6:3d:c6:ae:94:21:79:30:
74:1d:b8:30:52:3b:1e:1a:c1:2a:47:7e:81:cc:10:fe:e8:02:
30:50:9d:fd:1b:22:9e:1b:2c:2e:d7:15:b0:25:c3:70:f3:0d:
19:45:c5:c9:c7:0d:d7:62:bc:76:98:c4:2e:08:fc:5a:43:db:
ad:d0:66:5b:ca:ad:dc:36:78:8f:81:67:54
30,938,237 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
31,080,882 UART:
31,081,310 UART: Running Caliptra ROM ...
31,082,368 UART:
31,082,520 UART: [state] CFI Enabled
31,153,853 UART: [state] LifecycleState = Production
31,155,783 UART: [state] DebugLocked = Yes
31,158,091 UART: [state] Starting the WD Timer 40000000 cycles
31,163,201 UART: [kat] SHA2-256
31,353,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,363,788 UART: [kat] ++
31,364,303 UART: [kat] sha1
31,375,618 UART: [kat] SHA2-256
31,378,630 UART: [kat] SHA2-384
31,384,478 UART: [kat] SHA2-512-ACC
31,387,042 UART: [kat] ECC-384
33,836,009 UART: [kat] HMAC-384Kdf
33,860,669 UART: [kat] LMS
34,392,260 UART: [kat] --
34,395,837 UART: [update-reset] ++
39,020,873 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,023,659 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
39,618,326 >>> mbox cmd response: success
39,620,282 UART: [update-reset] Copying MAN_2 To MAN_1
39,657,869 UART: [update-reset Success] --
39,662,633 UART: [state] Locking Datavault
39,666,015 UART: [state] Locking PCR0, PCR1 and PCR31
39,668,161 UART: [state] Locking ICCM
39,670,746 UART: [exit] Launching FMC @ 0x40000130
39,679,416 UART:
39,679,670 UART: Running Caliptra FMC ...
39,680,772 UART:
39,680,928 UART: [state] CFI Enabled
39,781,394 UART: [art] Extend RT PCRs Done
39,782,572 UART: [art] Lock RT PCRs Done
39,783,975 UART: [art] Populate DV Done
39,789,378 UART: [fht] FMC Alias Private Key: 7
39,791,024 UART: [art] Derive CDI
39,792,046 UART: [art] Store in in slot 0x4
39,851,125 UART: [art] Derive Key Pair
39,852,128 UART: [art] Store priv key in slot 0x5
42,314,967 UART: [art] Derive Key Pair - Done
42,327,886 UART: [art] Signing Cert with AUTHO
42,329,192 UART: RITY.KEYID = 7
44,040,620 UART: [art] Erasing AUTHORITY.KEYID = 7
44,042,123 UART: [art] PUB.X = 3D5F64D69335018CF323D1D14F2214B91613BACB09534BD3EA31DB604563EB357ED060690E7D8E95FCDCE3A8DE194B4B
44,049,447 UART: [art] PUB.Y = D24FDEFC9C4F457E33D243BE4B00ED70F867AE25ECD9FA2412AB33845B8F15755C463F3DEDA682C40D583F6A35200941
44,056,676 UART: [art] SIG.R = 116D79EC71286D3E95F6C1AFC68892DE9B75C3D90298368B9BBA158D9E605CACE21EA7D6B9F2205112FC1829E36F4078
44,064,010 UART: [art] SIG.S = 1C079B03527D9B6003B2FFA0DC4F3F01D6522B74A2AC5B75C71C1AD3D42D85BC61046FCC5D46C941A09E8BD52A7BE970
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:fb:8e:72:c5:85:62:8e:5a:a1:8b:46:96:cb:29:a8:2f:c3:9f:91
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0BFB8E72C585628E5AA18B4696CB29A82FC39F915881116FFA1DBD4254B26A7F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3d:5f:64:d6:93:35:01:8c:f3:23:d1:d1:4f:22:
14:b9:16:13:ba:cb:09:53:4b:d3:ea:31:db:60:45:
63:eb:35:7e:d0:60:69:0e:7d:8e:95:fc:dc:e3:a8:
de:19:4b:4b:d2:4f:de:fc:9c:4f:45:7e:33:d2:43:
be:4b:00:ed:70:f8:67:ae:25:ec:d9:fa:24:12:ab:
33:84:5b:8f:15:75:5c:46:3f:3d:ed:a6:82:c4:0d:
58:3f:6a:35:20:09:41
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
0B:FB:8E:72:C5:85:62:8E:5A:A1:8B:46:96:CB:29:A8:2F:C3:9F:91
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:11:6d:79:ec:71:28:6d:3e:95:f6:c1:af:c6:88:
92:de:9b:75:c3:d9:02:98:36:8b:9b:ba:15:8d:9e:60:5c:ac:
e2:1e:a7:d6:b9:f2:20:51:12:fc:18:29:e3:6f:40:78:02:30:
1c:07:9b:03:52:7d:9b:60:03:b2:ff:a0:dc:4f:3f:01:d6:52:
2b:74:a2:ac:5b:75:c7:1c:1a:d3:d4:2d:85:bc:61:04:6f:cc:
5d:46:c9:41:a0:9e:8b:d5:2a:7b:e9:70
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 524 bytes from beginning
ing to cptra_bootfsm_go
3,439,675 ready_for_fw is high
3,440,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,883,640 >>> mbox cmd response: success
20,176,320 UART:
20,176,785 UART: Running Caliptra FMC ...
20,177,911 UART:
20,178,060 UART: [state] CFI Enabled
20,246,020 UART: [fht] FMC Alias Private Key: 7
22,010,139 UART: [art] Extend RT PCRs Done
22,011,372 UART: [art] Lock RT PCRs Done
22,012,918 UART: [art] Populate DV Done
22,018,271 UART: [fht] FMC Alias Private Key: 7
22,019,976 UART: [art] Derive CDI
22,020,791 UART: [art] Store in in slot 0x4
22,079,125 UART: [art] Derive Key Pair
22,080,175 UART: [art] Store priv key in slot 0x5
24,542,969 UART: [art] Derive Key Pair - Done
24,555,775 UART: [art] Signing Cert with AUTHO
24,557,081 UART: RITY.KEYID = 7
26,269,384 UART: [art] Erasing AUTHORITY.KEYID = 7
26,271,029 UART: [art] PUB.X = 25A834833D4CEC6257A1E8807A63ECA6A2BEF2FE1ABFB58F3BDB18A36D4AC5B7842471463E4DB64BB5E63429AF766A99
26,278,195 UART: [art] PUB.Y = AD797F66A2F8BDA8533CEF4E2193EFDACEE7D93E8D80A15E845D75C7F9ADE6D0C4BCE764DADEB6DCA4B804E3F7DE89A4
26,285,460 UART: [art] SIG.R = 3ABB503BE51AC12ED43147448F8FF458B3B21E1A1BBC374260F70FCDF7CE4F286D02FE10C04573BC3902305E847377F5
26,292,856 UART: [art] SIG.S = 55E9A7439757B250FAC9ECB8EBC24D2E53C6044AEE778546B7D80B42BF9DC59DCFF3454DE2ACBA984BCE22DF8F7E77D1
27,271,663 UART: Caliptra RT
27,272,375 UART: [state] CFI Enabled
27,436,417 UART: [rt] RT listening for mailbox commands...
27,467,952 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,914,570 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,350,238 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:ba:dc:47:08:64:af:8b:c1:c7:5a:ef:55:e0:c7:cd:44:de:2e:51
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9ABADC470864AF8BC1C75AEF55E0C7CD44DE2E512F79F7BD3B6F4157CBB80760
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:25:a8:34:83:3d:4c:ec:62:57:a1:e8:80:7a:63:
ec:a6:a2:be:f2:fe:1a:bf:b5:8f:3b:db:18:a3:6d:
4a:c5:b7:84:24:71:46:3e:4d:b6:4b:b5:e6:34:29:
af:76:6a:99:ad:79:7f:66:a2:f8:bd:a8:53:3c:ef:
4e:21:93:ef:da:ce:e7:d9:3e:8d:80:a1:5e:84:5d:
75:c7:f9:ad:e6:d0:c4:bc:e7:64:da:de:b6:dc:a4:
b8:04:e3:f7:de:89:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
9A:BA:DC:47:08:64:AF:8B:C1:C7:5A:EF:55:E0:C7:CD:44:DE:2E:51
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:3a:bb:50:3b:e5:1a:c1:2e:d4:31:47:44:8f:8f:
f4:58:b3:b2:1e:1a:1b:bc:37:42:60:f7:0f:cd:f7:ce:4f:28:
6d:02:fe:10:c0:45:73:bc:39:02:30:5e:84:73:77:f5:02:30:
55:e9:a7:43:97:57:b2:50:fa:c9:ec:b8:eb:c2:4d:2e:53:c6:
04:4a:ee:77:85:46:b7:d8:0b:42:bf:9d:c5:9d:cf:f3:45:4d:
e2:ac:ba:98:4b:ce:22:df:8f:7e:77:d1
30,811,959 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
39,708,892 >>> mbox cmd response: success
39,744,390 UART:
39,744,750 UART: Running Caliptra FMC ...
39,745,966 UART:
39,746,137 UART: [state] CFI Enabled
39,840,992 UART: [art] Extend RT PCRs Done
39,842,200 UART: [art] Lock RT PCRs Done
39,843,658 UART: [art] Populate DV Done
39,848,954 UART: [fht] FMC Alias Private Key: 7
39,850,484 UART: [art] Derive CDI
39,851,295 UART: [art] Store in in slot 0x4
39,910,526 UART: [art] Derive Key Pair
39,911,567 UART: [art] Store priv key in slot 0x5
42,374,339 UART: [art] Derive Key Pair - Done
42,387,178 UART: [art] Signing Cert with AUTHO
42,388,483 UART: RITY.KEYID = 7
44,100,140 UART: [art] Erasing AUTHORITY.KEYID = 7
44,101,645 UART: [art] PUB.X = 2A26F8499D59FDAEA52372EF88CBD6C1DC22432CB9EBFFA438361E1D8067E9323991F2A9A088F495369BC90D656968F1
44,108,891 UART: [art] PUB.Y = A3AB0589297796EE387A8A67C857D1AB9C7BC7B15396F2D931F02FBE499D88EEFF42BB853A23E32FAF8B0C83F31ABD29
44,116,213 UART: [art] SIG.R = 6D4D8A7C9E83271D26C6111CB28C7F79A6922D43307043611E3B1B80A159ABAFE3BEE6E206BBA65C17444EA6285AB32A
44,123,621 UART: [art] SIG.S = C9FA2CC56776CA4AAAB71B4B91A5E151E53166FF26BA49070DD3B7F4B9CE66E6F4844962CF082DEC35DA0717479BBDD5
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:4a:6c:d8:a8:2b:f9:dd:78:30:76:a6:29:bb:ea:32:7e:d7:5e:3e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7D4A6CD8A82BF9DD783076A629BBEA327ED75E3E17861D0581695D74B672CB97
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2a:26:f8:49:9d:59:fd:ae:a5:23:72:ef:88:cb:
d6:c1:dc:22:43:2c:b9:eb:ff:a4:38:36:1e:1d:80:
67:e9:32:39:91:f2:a9:a0:88:f4:95:36:9b:c9:0d:
65:69:68:f1:a3:ab:05:89:29:77:96:ee:38:7a:8a:
67:c8:57:d1:ab:9c:7b:c7:b1:53:96:f2:d9:31:f0:
2f:be:49:9d:88:ee:ff:42:bb:85:3a:23:e3:2f:af:
8b:0c:83:f3:1a:bd:29
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
7D:4A:6C:D8:A8:2B:F9:DD:78:30:76:A6:29:BB:EA:32:7E:D7:5E:3E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6d:4d:8a:7c:9e:83:27:1d:26:c6:11:1c:b2:8c:
7f:79:a6:92:2d:43:30:70:43:61:1e:3b:1b:80:a1:59:ab:af:
e3:be:e6:e2:06:bb:a6:5c:17:44:4e:a6:28:5a:b3:2a:02:31:
00:c9:fa:2c:c5:67:76:ca:4a:aa:b7:1b:4b:91:a5:e1:51:e5:
31:66:ff:26:ba:49:07:0d:d3:b7:f4:b9:ce:66:e6:f4:84:49:
62:cf:08:2d:ec:35:da:07:17:47:9b:bd:d5
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.41s
Truncated 4977 bytes from beginning
4515F86F18926AB0D20903A1ACAF619C0F9A10F7666C2116CF779BDD1EFD7005CDDB869E99A009FDE72905F82ED90
26,390,650 UART: [art] SIG.S = 3FDF53849D6CA6BBA65A303E288AACF9B7FFE2B783E0AB80376C823CBEF616C9938B4B2FFE7867420E850AFC7B499191
27,369,411 UART: Caliptra RT
27,370,123 UART: [state] CFI Enabled
27,486,328 UART: [rt] RT listening for mailbox commands...
27,638,379 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,082,998 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,517,910 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
07:18:f4:65:9c:5f:ef:1e:50:bc:7c:49:b8:93:43:e7:1d:d1:d5:3d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0718F4659C5FEF1E50BC7C49B89343E71DD1D53DA559217BB3D4CFBDF834A6F3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6b:f3:0c:5d:11:84:a9:fc:6b:66:c0:86:23:88:
ef:8c:61:13:5e:ca:7a:16:82:a1:78:c8:63:0a:79:
f3:96:ab:dd:5b:84:4f:a6:bc:ed:67:fa:01:2e:69:
78:f8:87:c4:c3:c8:0f:02:7e:b7:61:db:81:ca:3f:
9e:cb:5f:1d:17:45:a8:68:85:a7:a4:54:a5:0c:d3:
3d:a7:db:ba:c2:4d:23:75:e7:b7:4d:70:56:29:33:
16:2c:f7:37:f9:c7:21
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
07:18:F4:65:9C:5F:EF:1E:50:BC:7C:49:B8:93:43:E7:1D:D1:D5:3D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d3:b4:51:5f:86:f1:89:26:ab:0d:20:90:3a:
1a:ca:f6:19:c0:f9:a1:0f:76:66:c2:11:6c:f7:79:bd:d1:ef:
d7:00:5c:dd:b8:69:e9:9a:00:9f:de:72:90:5f:82:ed:90:02:
30:3f:df:53:84:9d:6c:a6:bb:a6:5a:30:3e:28:8a:ac:f9:b7:
ff:e2:b7:83:e0:ab:80:37:6c:82:3c:be:f6:16:c9:93:8b:4b:
2f:fe:78:67:42:0e:85:0a:fc:7b:49:91:91
30,977,494 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
31,120,099 UART:
31,120,519 UART: Running Caliptra ROM ...
31,121,564 UART:
31,121,723 UART: [state] CFI Enabled
31,136,754 UART: [state] LifecycleState = Production
31,138,485 UART: [state] DebugLocked = Yes
31,141,466 UART: [state] Starting the WD Timer 40000000 cycles
31,147,334 UART: [kat] SHA2-256
31,337,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,348,111 UART: [kat] ++
31,348,732 UART: [kat] sha1
31,359,460 UART: [kat] SHA2-256
31,362,475 UART: [kat] SHA2-384
31,368,238 UART: [kat] SHA2-512-ACC
31,370,854 UART: [kat] ECC-384
33,810,170 UART: [kat] HMAC-384Kdf
33,823,268 UART: [kat] LMS
34,354,887 UART: [kat] --
34,358,612 UART: [update-reset] ++
39,023,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,028,006 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
39,622,655 >>> mbox cmd response: success
39,624,299 UART: [update-reset] Copying MAN_2 To MAN_1
39,661,883 UART: [update-reset Success] --
39,665,030 UART: [state] Locking Datavault
39,669,160 UART: [state] Locking PCR0, PCR1 and PCR31
39,671,324 UART: [state] Locking ICCM
39,674,019 UART: [exit] Launching FMC @ 0x40000130
39,682,690 UART:
39,682,922 UART: Running Caliptra FMC ...
39,684,023 UART:
39,684,184 UART: [state] CFI Enabled
39,728,256 UART: [art] Extend RT PCRs Done
39,729,442 UART: [art] Lock RT PCRs Done
39,730,680 UART: [art] Populate DV Done
39,736,356 UART: [fht] FMC Alias Private Key: 7
39,738,107 UART: [art] Derive CDI
39,738,916 UART: [art] Store in in slot 0x4
39,781,237 UART: [art] Derive Key Pair
39,782,235 UART: [art] Store priv key in slot 0x5
42,209,031 UART: [art] Derive Key Pair - Done
42,222,108 UART: [art] Signing Cert with AUTHO
42,223,443 UART: RITY.KEYID = 7
43,929,009 UART: [art] Erasing AUTHORITY.KEYID = 7
43,930,508 UART: [art] PUB.X = DC4F82DD063D3ABA91B489865B5C024B1447CB4FEB9C6314CA831C4CF5F7613598CC50D09576EF890B2066A054F5C323
43,937,804 UART: [art] PUB.Y = 2E3419E4080651927BBD7C12DF4F8F4421FDFDA6B2BACBCB2DC5A198A08784D46779447E830FCBF6739780B36D1E9BA0
43,945,033 UART: [art] SIG.R = 67E09C931905BBAA78280D37795EF6211992659054F5E6C31D0431D6FA04530962ED1451A2E4698F2F1DF47BBBFA975A
43,952,420 UART: [art] SIG.S = B2C226531E7B682D58ADEA213C96F75F2AF937E699D896FEFDF03D065C3C7420C58D3CAC4DF6CD149A323AB22D6340C0
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0d:88:55:b3:af:24:46:43:b1:83:3a:75:12:bb:97:b3:df:79:34:36
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0D8855B3AF244643B1833A7512BB97B3DF793436FFEBA41353FFC3B6A5838632
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dc:4f:82:dd:06:3d:3a:ba:91:b4:89:86:5b:5c:
02:4b:14:47:cb:4f:eb:9c:63:14:ca:83:1c:4c:f5:
f7:61:35:98:cc:50:d0:95:76:ef:89:0b:20:66:a0:
54:f5:c3:23:2e:34:19:e4:08:06:51:92:7b:bd:7c:
12:df:4f:8f:44:21:fd:fd:a6:b2:ba:cb:cb:2d:c5:
a1:98:a0:87:84:d4:67:79:44:7e:83:0f:cb:f6:73:
97:80:b3:6d:1e:9b:a0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
0D:88:55:B3:AF:24:46:43:B1:83:3A:75:12:BB:97:B3:DF:79:34:36
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:67:e0:9c:93:19:05:bb:aa:78:28:0d:37:79:5e:
f6:21:19:92:65:90:54:f5:e6:c3:1d:04:31:d6:fa:04:53:09:
62:ed:14:51:a2:e4:69:8f:2f:1d:f4:7b:bb:fa:97:5a:02:31:
00:b2:c2:26:53:1e:7b:68:2d:58:ad:ea:21:3c:96:f7:5f:2a:
f9:37:e6:99:d8:96:fe:fd:f0:3d:06:5c:3c:74:20:c5:8d:3c:
ac:4d:f6:cd:14:9a:32:3a:b2:2d:63:40:c0
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,758,493 ready_for_fw is high
3,758,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,099,083 >>> mbox cmd response: success
20,351,766 UART:
20,352,219 UART: Running Caliptra FMC ...
20,353,341 UART:
20,353,518 UART: [state] CFI Enabled
20,361,511 UART: [fht] FMC Alias Private Key: 7
22,118,130 UART: [art] Extend RT PCRs Done
22,119,354 UART: [art] Lock RT PCRs Done
22,120,892 UART: [art] Populate DV Done
22,126,242 UART: [fht] FMC Alias Private Key: 7
22,127,943 UART: [art] Derive CDI
22,128,777 UART: [art] Store in in slot 0x4
22,171,425 UART: [art] Derive Key Pair
22,172,427 UART: [art] Store priv key in slot 0x5
24,599,822 UART: [art] Derive Key Pair - Done
24,612,703 UART: [art] Signing Cert with AUTHO
24,614,045 UART: RITY.KEYID = 7
26,319,030 UART: [art] Erasing AUTHORITY.KEYID = 7
26,320,541 UART: [art] PUB.X = 54F27CEA80F2BAA419B659B5DD288B4AF9E0EA174C5CFD226A66E31EC8C589EFE366DE694BFF6469EE240B6684E1C3D5
26,327,838 UART: [art] PUB.Y = 8A0E73156ED16F825FF4A131F3E58D9803B3F9C78B0B030ED221090EE99B77B3A9330325A66A22A6E2B98885CED20E91
26,335,099 UART: [art] SIG.R = 2762BCF0DBD928EEE1FFA18DA1C995B50CC528718E3C03EFA504ED5A66FD42B496640C78DCDC15F30526AEA738BC1106
26,342,487 UART: [art] SIG.S = 8260672E2E86266E7E00F548E0D17709549FC097FA4F9F1A363A03C95A93E565A2AB3A24B4FAB59163BC931CCA439CB4
27,322,251 UART: Caliptra RT
27,322,969 UART: [state] CFI Enabled
27,439,550 UART: [rt] RT listening for mailbox commands...
27,470,808 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,915,293 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,349,082 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:b1:44:d2:83:73:4c:8d:49:50:3a:c8:e8:4a:2f:90:71:1d:56:7e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=17B144D283734C8D49503AC8E84A2F90711D567E9045EEA4B5F397D6338282C4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:54:f2:7c:ea:80:f2:ba:a4:19:b6:59:b5:dd:28:
8b:4a:f9:e0:ea:17:4c:5c:fd:22:6a:66:e3:1e:c8:
c5:89:ef:e3:66:de:69:4b:ff:64:69:ee:24:0b:66:
84:e1:c3:d5:8a:0e:73:15:6e:d1:6f:82:5f:f4:a1:
31:f3:e5:8d:98:03:b3:f9:c7:8b:0b:03:0e:d2:21:
09:0e:e9:9b:77:b3:a9:33:03:25:a6:6a:22:a6:e2:
b9:88:85:ce:d2:0e:91
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
17:B1:44:D2:83:73:4C:8D:49:50:3A:C8:E8:4A:2F:90:71:1D:56:7E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:27:62:bc:f0:db:d9:28:ee:e1:ff:a1:8d:a1:c9:
95:b5:0c:c5:28:71:8e:3c:03:ef:a5:04:ed:5a:66:fd:42:b4:
96:64:0c:78:dc:dc:15:f3:05:26:ae:a7:38:bc:11:06:02:31:
00:82:60:67:2e:2e:86:26:6e:7e:00:f5:48:e0:d1:77:09:54:
9f:c0:97:fa:4f:9f:1a:36:3a:03:c9:5a:93:e5:65:a2:ab:3a:
24:b4:fa:b5:91:63:bc:93:1c:ca:43:9c:b4
30,804,612 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
39,645,965 >>> mbox cmd response: success
39,679,690 UART:
39,680,059 UART: Running Caliptra FMC ...
39,681,214 UART:
39,681,394 UART: [state] CFI Enabled
39,725,216 UART: [art] Extend RT PCRs Done
39,726,378 UART: [art] Lock RT PCRs Done
39,727,562 UART: [art] Populate DV Done
39,733,089 UART: [fht] FMC Alias Private Key: 7
39,734,594 UART: [art] Derive CDI
39,735,414 UART: [art] Store in in slot 0x4
39,777,580 UART: [art] Derive Key Pair
39,778,579 UART: [art] Store priv key in slot 0x5
42,204,896 UART: [art] Derive Key Pair - Done
42,217,746 UART: [art] Signing Cert with AUTHO
42,219,080 UART: RITY.KEYID = 7
43,924,589 UART: [art] Erasing AUTHORITY.KEYID = 7
43,926,094 UART: [art] PUB.X = 27D6AC59E1C7E307093CF36A4D296B0D2E1C4F8B305B55617A3C3EA868B03381D37EDFAAD7D9B9A0DE0BC273A54144A1
43,933,340 UART: [art] PUB.Y = 6DD9E8320ECDF12BDAFE1669F2FA3F96966A0062EBF7D6B1773B037EC9E3F908414C5616DC97966C52CFECDD97AAFDAC
43,940,625 UART: [art] SIG.R = D7334394258E9B8F1D84599EAC71FD238BD962C32D2B7A30C9FE38A48DDED47AD767267AB0BF2298B54E7AB8ED8A4EB1
43,948,039 UART: [art] SIG.S = 5850814B28C9205A1AAE2165DDE966BF3E79E17B16CEA5737F720280592B227EB58920E04FA00FB632B6186A94A860B3
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3d:ac:13:8b:49:c5:22:31:3c:6c:36:74:d0:c8:7b:30:4e:97:2d:77
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BDAC138B49C522313C6C3674D0C87B304E972D775B9A1506E28786F700A8FEF4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:27:d6:ac:59:e1:c7:e3:07:09:3c:f3:6a:4d:29:
6b:0d:2e:1c:4f:8b:30:5b:55:61:7a:3c:3e:a8:68:
b0:33:81:d3:7e:df:aa:d7:d9:b9:a0:de:0b:c2:73:
a5:41:44:a1:6d:d9:e8:32:0e:cd:f1:2b:da:fe:16:
69:f2:fa:3f:96:96:6a:00:62:eb:f7:d6:b1:77:3b:
03:7e:c9:e3:f9:08:41:4c:56:16:dc:97:96:6c:52:
cf:ec:dd:97:aa:fd:ac
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
BD:AC:13:8B:49:C5:22:31:3C:6C:36:74:D0:C8:7B:30:4E:97:2D:77
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d7:33:43:94:25:8e:9b:8f:1d:84:59:9e:ac:
71:fd:23:8b:d9:62:c3:2d:2b:7a:30:c9:fe:38:a4:8d:de:d4:
7a:d7:67:26:7a:b0:bf:22:98:b5:4e:7a:b8:ed:8a:4e:b1:02:
30:58:50:81:4b:28:c9:20:5a:1a:ae:21:65:dd:e9:66:bf:3e:
79:e1:7b:16:ce:a5:73:7f:72:02:80:59:2b:22:7e:b5:89:20:
e0:4f:a0:0f:b6:32:b6:18:6a:94:a8:60:b3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 5404 bytes from beginning
c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,949,107 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,791 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:49:bb:98:ec:85:aa:e2:67:d2:9c:aa:5b:91:02:db:ed:a9:cc:d8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1D49BB98EC85AAE267D29CAA5B9102DBEDA9CCD878712B4374AE13EC80E756A1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8f:bf:f6:38:47:8b:77:c3:73:a5:c9:bd:0d:6b:
b6:c0:d4:bb:5e:8a:4f:58:6f:a6:ce:45:6b:9a:0b:
c9:20:ef:42:96:21:41:c5:74:54:80:ab:5e:cc:4d:
aa:85:7f:69:7d:ef:0f:92:fa:2f:ee:ec:00:5e:5b:
6b:4b:cb:85:44:e1:95:4c:e8:da:b8:76:0e:a0:b3:
aa:f7:0f:a0:e3:d0:a8:29:91:ea:0d:ff:c4:9d:c5:
19:3e:1b:61:4f:0e:f6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
1D:49:BB:98:EC:85:AA:E2:67:D2:9C:AA:5B:91:02:DB:ED:A9:CC:D8
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:2a:ff:f2:fb:5a:e3:e3:06:1d:ae:e9:b6:
a2:e7:ee:10:0f:1a:07:7c:34:84:21:5e:b7:7b:48:97:31:6d:
08:73:9f:6f:ff:be:d7:bd:3c:6d:f7:5f:26:85:e1:8d:8b:02:
31:00:8e:e5:e3:84:e1:fd:e0:2a:90:fb:06:5a:75:31:22:d5:
1b:2f:9e:43:ff:79:24:62:d4:85:8d:36:45:b9:85:18:92:f5:
7f:9f:c7:96:db:2f:7f:d1:89:e6:ab:4a:c1:30
6,001,577 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,002,270 UART:
6,002,286 UART: Running Caliptra ROM ...
6,002,694 UART:
6,002,748 UART: [state] CFI Enabled
6,005,415 UART: [state] LifecycleState = Production
6,006,023 UART: [state] DebugLocked = Yes
6,006,635 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,008,308 UART: [kat] SHA2-256
6,802,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,806,354 UART: [kat] ++
6,806,506 UART: [kat] sha1
6,810,650 UART: [kat] SHA2-256
6,812,588 UART: [kat] SHA2-384
6,815,323 UART: [kat] SHA2-512-ACC
6,817,223 UART: [kat] ECC-384
6,822,652 UART: [kat] HMAC-384Kdf
6,827,266 UART: [kat] LMS
7,395,462 UART: [kat] --
7,396,101 UART: [update-reset] ++
10,966,502 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,967,680 UART: [update-reset] Loading Runtime at address 0x40005000 len 87504
11,114,340 >>> mbox cmd response: success
11,114,482 UART: [update-reset] Copying MAN_2 To MAN_1
11,122,494 UART: [update-reset Success] --
11,123,429 UART: [state] Locking Datavault
11,124,293 UART: [state] Locking PCR0, PCR1 and PCR31
11,124,897 UART: [state] Locking ICCM
11,125,363 UART: [exit] Launching FMC @ 0x40000130
11,130,692 UART:
11,130,708 UART: Running Caliptra FMC ...
11,131,116 UART:
11,131,170 UART: [state] CFI Enabled
11,220,011 UART: [art] Extend RT PCRs Done
11,220,439 UART: [art] Lock RT PCRs Done
11,221,642 UART: [art] Populate DV Done
11,229,836 UART: [fht] FMC Alias Private Key: 7
11,231,016 UART: [art] Derive CDI
11,231,296 UART: [art] Store in in slot 0x4
11,317,275 UART: [art] Derive Key Pair
11,317,635 UART: [art] Store priv key in slot 0x5
11,330,781 UART: [art] Derive Key Pair - Done
11,345,379 UART: [art] Signing Cert with AUTHO
11,345,859 UART: RITY.KEYID = 7
11,360,951 UART: [art] Erasing AUTHORITY.KEYID = 7
11,361,716 UART: [art] PUB.X = 6B4F53494A08E62C83B6C73289158562A15B47EA440D2434F0B8DD3B47354904DB184CB56332174B18A47FDD591EB086
11,368,471 UART: [art] PUB.Y = 69736E114D61EE1FA17140AE5F88AF4DE128ED53F7CE31847316189543FF5E9C6E70318DEF3BEEAD313E07DC3083526F
11,375,426 UART: [art] SIG.R = 62459BECB4597B0383979C2C9F4406CE7DBD39BEC441ACD60A4A67554C53F8DAFC57D64696C1C218800CDC37F131C3D3
11,382,194 UART: [art] SIG.S = 45D59ACB8CBF9CEB50F5E8A45040876A4A932B975C5551F2210BC0FFE92C056D906B305F407DD18C037569365D4C9C36
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:34:a3:2a:f3:d7:ca:2f:53:ba:bb:db:26:5c:6b:15:ea:eb:e0:e9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3634A32AF3D7CA2F53BABBDB265C6B15EAEBE0E9DB7FB4A95C2E30406B79819C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6b:4f:53:49:4a:08:e6:2c:83:b6:c7:32:89:15:
85:62:a1:5b:47:ea:44:0d:24:34:f0:b8:dd:3b:47:
35:49:04:db:18:4c:b5:63:32:17:4b:18:a4:7f:dd:
59:1e:b0:86:69:73:6e:11:4d:61:ee:1f:a1:71:40:
ae:5f:88:af:4d:e1:28:ed:53:f7:ce:31:84:73:16:
18:95:43:ff:5e:9c:6e:70:31:8d:ef:3b:ee:ad:31:
3e:07:dc:30:83:52:6f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
36:34:A3:2A:F3:D7:CA:2F:53:BA:BB:DB:26:5C:6B:15:EA:EB:E0:E9
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:62:45:9b:ec:b4:59:7b:03:83:97:9c:2c:9f:44:
06:ce:7d:bd:39:be:c4:41:ac:d6:0a:4a:67:55:4c:53:f8:da:
fc:57:d6:46:96:c1:c2:18:80:0c:dc:37:f1:31:c3:d3:02:30:
45:d5:9a:cb:8c:bf:9c:eb:50:f5:e8:a4:50:40:87:6a:4a:93:
2b:97:5c:55:51:f2:21:0b:c0:ff:e9:2c:05:6d:90:6b:30:5f:
40:7d:d1:8c:03:75:69:36:5d:4c:9c:36
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.83s
Truncated 881 bytes from beginning
e
5,600,160 UART: [art] Populate DV Done
5,608,466 UART: [fht] FMC Alias Private Key: 7
5,609,608 UART: [art] Derive CDI
5,609,888 UART: [art] Store in in slot 0x4
5,695,441 UART: [art] Derive Key Pair
5,695,801 UART: [art] Store priv key in slot 0x5
5,708,587 UART: [art] Derive Key Pair - Done
5,723,290 UART: [art] Signing Cert with AUTHO
5,723,770 UART: RITY.KEYID = 7
5,738,968 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,733 UART: [art] PUB.X = 58E82BE969CA9ED6D2C206DF988E0990A53D6880DCBF993458F438B26009D973F0C36B920C33492DD4C840A56A21D783
5,746,491 UART: [art] PUB.Y = 8DC5336A426E061F92325E3E93DE855D77ED9A296920DD8EE098EC4C18C88120CDA4EFC9FFEC69C8129738E15EA10CF8
5,753,447 UART: [art] SIG.R = 270F63B3DD952ACC1A7317A249E7FCA5ED2498254DC1A058109E4F3373AB2FDDBB2AE05452B047B81F44F26EE5343914
5,760,222 UART: [art] SIG.S = 48046F2FE9CFBCFEB7F43CDE99B6034EFD18122B0168C48654E7D219F6865BF0AF0CAFF35B5CF49471F2A3056375254E
5,783,970 UART: Caliptra RT
5,784,223 UART: [state] CFI Enabled
5,893,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,923,466 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,963,138 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,416 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:5f:7c:3c:a4:7a:82:78:44:3a:48:e5:55:b9:f0:8e:09:e1:7d:66
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7D5F7C3CA47A8278443A48E555B9F08E09E17D6616FED07116017EB4198EB6D5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:58:e8:2b:e9:69:ca:9e:d6:d2:c2:06:df:98:8e:
09:90:a5:3d:68:80:dc:bf:99:34:58:f4:38:b2:60:
09:d9:73:f0:c3:6b:92:0c:33:49:2d:d4:c8:40:a5:
6a:21:d7:83:8d:c5:33:6a:42:6e:06:1f:92:32:5e:
3e:93:de:85:5d:77:ed:9a:29:69:20:dd:8e:e0:98:
ec:4c:18:c8:81:20:cd:a4:ef:c9:ff:ec:69:c8:12:
97:38:e1:5e:a1:0c:f8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
7D:5F:7C:3C:A4:7A:82:78:44:3A:48:E5:55:B9:F0:8E:09:E1:7D:66
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:27:0f:63:b3:dd:95:2a:cc:1a:73:17:a2:49:e7:
fc:a5:ed:24:98:25:4d:c1:a0:58:10:9e:4f:33:73:ab:2f:dd:
bb:2a:e0:54:52:b0:47:b8:1f:44:f2:6e:e5:34:39:14:02:30:
48:04:6f:2f:e9:cf:bc:fe:b7:f4:3c:de:99:b6:03:4e:fd:18:
12:2b:01:68:c4:86:54:e7:d2:19:f6:86:5b:f0:af:0c:af:f3:
5b:5c:f4:94:71:f2:a3:05:63:75:25:4e
6,015,489 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,935,400 >>> mbox cmd response: success
10,948,816 UART:
10,948,832 UART: Running Caliptra FMC ...
10,949,240 UART:
10,949,294 UART: [state] CFI Enabled
11,038,385 UART: [art] Extend RT PCRs Done
11,038,813 UART: [art] Lock RT PCRs Done
11,040,044 UART: [art] Populate DV Done
11,048,456 UART: [fht] FMC Alias Private Key: 7
11,049,604 UART: [art] Derive CDI
11,049,884 UART: [art] Store in in slot 0x4
11,135,549 UART: [art] Derive Key Pair
11,135,909 UART: [art] Store priv key in slot 0x5
11,148,517 UART: [art] Derive Key Pair - Done
11,163,133 UART: [art] Signing Cert with AUTHO
11,163,613 UART: RITY.KEYID = 7
11,178,829 UART: [art] Erasing AUTHORITY.KEYID = 7
11,179,594 UART: [art] PUB.X = 8647A8D789B83D48D014608A3C915A0481CF691A1991A83FDB31B8C78FD4539729EF5F8A2EA1DBE4FB9EE2F364ED97D2
11,186,371 UART: [art] PUB.Y = BE72FA50BBBB85232ED3353A96AA40AEC03A0621AF5C7CE6096C39212F9821F7418A8B07709E2630C2654FF43940C90B
11,193,313 UART: [art] SIG.R = F8C9B0F796256EABFE047188DBD1F375917423BD0FF218C845CD99EB6344CAC9C5F1F2B9F4B231B61A898A4BDDFDD8A4
11,200,097 UART: [art] SIG.S = 5C78684C888535DFF6943F0E41962B0007C0EC388BD3A485F8A5E6047321E1DB26E32CD0F8AA1FE47F693A6F22312001
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:30:13:af:be:ca:70:ed:a7:73:d9:6a:e8:e6:ba:fb:11:54:dc:f5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=443013AFBECA70EDA773D96AE8E6BAFB1154DCF5AF66D4588217FAE69F1B9F3A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:86:47:a8:d7:89:b8:3d:48:d0:14:60:8a:3c:91:
5a:04:81:cf:69:1a:19:91:a8:3f:db:31:b8:c7:8f:
d4:53:97:29:ef:5f:8a:2e:a1:db:e4:fb:9e:e2:f3:
64:ed:97:d2:be:72:fa:50:bb:bb:85:23:2e:d3:35:
3a:96:aa:40:ae:c0:3a:06:21:af:5c:7c:e6:09:6c:
39:21:2f:98:21:f7:41:8a:8b:07:70:9e:26:30:c2:
65:4f:f4:39:40:c9:0b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
44:30:13:AF:BE:CA:70:ED:A7:73:D9:6A:E8:E6:BA:FB:11:54:DC:F5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f8:c9:b0:f7:96:25:6e:ab:fe:04:71:88:db:
d1:f3:75:91:74:23:bd:0f:f2:18:c8:45:cd:99:eb:63:44:ca:
c9:c5:f1:f2:b9:f4:b2:31:b6:1a:89:8a:4b:dd:fd:d8:a4:02:
30:5c:78:68:4c:88:85:35:df:f6:94:3f:0e:41:96:2b:00:07:
c0:ec:38:8b:d3:a4:85:f8:a5:e6:04:73:21:e1:db:26:e3:2c:
d0:f8:aa:1f:e4:7f:69:3a:6f:22:31:20:01
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.87s
Truncated 5404 bytes from beginning
c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,520 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,957,090 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:34:4a:d3:21:55:4d:3e:42:80:95:b6:a6:16:95:45:3c:1a:22:ba
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=99344AD321554D3E428095B6A61695453C1A22BA7EEF5344CA585C08667F0383
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:d8:e7:07:19:35:3a:5a:30:e8:3e:e6:39:d9:
51:b0:c6:1d:3a:e2:fa:ea:56:ed:ef:2f:dc:77:a2:
91:f6:de:b6:45:3b:ec:ef:9c:a0:4e:3c:2d:1d:9f:
c7:4c:b4:67:18:b5:b5:a2:64:d9:b3:89:44:10:5e:
5c:c7:87:ec:47:3e:6a:37:c9:7d:04:8f:b5:1d:d3:
f8:b8:3d:0f:64:fe:4c:57:97:c7:6e:4c:cd:85:f0:
ac:47:6b:76:fb:b1:a8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
99:34:4A:D3:21:55:4D:3E:42:80:95:B6:A6:16:95:45:3C:1A:22:BA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d9:02:21:0d:0d:8d:65:be:c2:ba:f5:c7:ce:
b5:f4:96:f0:67:a6:24:3b:bb:b8:20:fe:90:a8:83:bc:80:59:
a7:69:0c:85:17:e5:87:e9:e4:9a:df:da:47:db:18:f6:bf:02:
30:59:ec:7e:7e:31:df:e1:4e:3b:af:8a:0f:b2:ad:fa:b0:b1:
13:32:ed:b2:10:f0:98:a1:d5:5d:cb:44:11:99:2a:4a:49:fd:
ed:df:54:3a:bd:90:56:1c:38:54:21:3b:2f
5,967,997 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,968,948 UART:
5,968,964 UART: Running Caliptra ROM ...
5,969,372 UART:
5,969,513 UART: [state] CFI Enabled
5,972,474 UART: [state] LifecycleState = Production
5,973,082 UART: [state] DebugLocked = Yes
5,973,742 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,975,425 UART: [kat] SHA2-256
6,769,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,773,471 UART: [kat] ++
6,773,623 UART: [kat] sha1
6,778,015 UART: [kat] SHA2-256
6,779,953 UART: [kat] SHA2-384
6,782,816 UART: [kat] SHA2-512-ACC
6,784,716 UART: [kat] ECC-384
6,790,331 UART: [kat] HMAC-384Kdf
6,794,939 UART: [kat] LMS
7,363,135 UART: [kat] --
7,363,930 UART: [update-reset] ++
10,934,231 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,935,453 UART: [update-reset] Loading Runtime at address 0x40005000 len 87504
11,082,113 >>> mbox cmd response: success
11,082,395 UART: [update-reset] Copying MAN_2 To MAN_1
11,090,407 UART: [update-reset Success] --
11,091,194 UART: [state] Locking Datavault
11,092,104 UART: [state] Locking PCR0, PCR1 and PCR31
11,092,708 UART: [state] Locking ICCM
11,093,168 UART: [exit] Launching FMC @ 0x40000130
11,098,497 UART:
11,098,513 UART: Running Caliptra FMC ...
11,098,921 UART:
11,099,064 UART: [state] CFI Enabled
11,188,195 UART: [art] Extend RT PCRs Done
11,188,623 UART: [art] Lock RT PCRs Done
11,190,102 UART: [art] Populate DV Done
11,198,478 UART: [fht] FMC Alias Private Key: 7
11,199,604 UART: [art] Derive CDI
11,199,884 UART: [art] Store in in slot 0x4
11,285,373 UART: [art] Derive Key Pair
11,285,733 UART: [art] Store priv key in slot 0x5
11,298,549 UART: [art] Derive Key Pair - Done
11,313,292 UART: [art] Signing Cert with AUTHO
11,313,772 UART: RITY.KEYID = 7
11,329,128 UART: [art] Erasing AUTHORITY.KEYID = 7
11,329,893 UART: [art] PUB.X = D3718496BE8DF3F85904EDA43F782B48B2826AA710F11A7B06EEE8EBA1E5F75FE978899E3F3E1434F02751D7A2CA4B44
11,336,667 UART: [art] PUB.Y = 3539E8AD7FD64F96B5E1744C7ABCFD2348E477FB7087917C824C4AF513417108F3AA4D659F25E06A5601D1632EA3EF60
11,343,615 UART: [art] SIG.R = 67D2520B5473304FA270B704EBFBA4959E1CC45A7D144ED81F2FFC63F674173406ABEB37452BF3830DAA551D8DF27AA9
11,350,383 UART: [art] SIG.S = F1464EF31E1BAA4CE75419914AF160887292C13A3A835951146489DA61E62516E629C2CA5D389A7434BF05CA5EE455D3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:0f:d6:f2:92:37:29:59:4e:47:f9:d9:6c:63:2f:4a:f9:ec:64:a3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=430FD6F2923729594E47F9D96C632F4AF9EC64A3128ABDC4C0CB593E113CE033
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d3:71:84:96:be:8d:f3:f8:59:04:ed:a4:3f:78:
2b:48:b2:82:6a:a7:10:f1:1a:7b:06:ee:e8:eb:a1:
e5:f7:5f:e9:78:89:9e:3f:3e:14:34:f0:27:51:d7:
a2:ca:4b:44:35:39:e8:ad:7f:d6:4f:96:b5:e1:74:
4c:7a:bc:fd:23:48:e4:77:fb:70:87:91:7c:82:4c:
4a:f5:13:41:71:08:f3:aa:4d:65:9f:25:e0:6a:56:
01:d1:63:2e:a3:ef:60
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
43:0F:D6:F2:92:37:29:59:4E:47:F9:D9:6C:63:2F:4A:F9:EC:64:A3
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:67:d2:52:0b:54:73:30:4f:a2:70:b7:04:eb:fb:
a4:95:9e:1c:c4:5a:7d:14:4e:d8:1f:2f:fc:63:f6:74:17:34:
06:ab:eb:37:45:2b:f3:83:0d:aa:55:1d:8d:f2:7a:a9:02:31:
00:f1:46:4e:f3:1e:1b:aa:4c:e7:54:19:91:4a:f1:60:88:72:
92:c1:3a:3a:83:59:51:14:64:89:da:61:e6:25:16:e6:29:c2:
ca:5d:38:9a:74:34:bf:05:ca:5e:e4:55:d3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.72s
Truncated 881 bytes from beginning
e
5,412,709 UART: [art] Populate DV Done
5,420,943 UART: [fht] FMC Alias Private Key: 7
5,422,083 UART: [art] Derive CDI
5,422,363 UART: [art] Store in in slot 0x4
5,508,366 UART: [art] Derive Key Pair
5,508,726 UART: [art] Store priv key in slot 0x5
5,522,432 UART: [art] Derive Key Pair - Done
5,537,041 UART: [art] Signing Cert with AUTHO
5,537,521 UART: RITY.KEYID = 7
5,552,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,553,616 UART: [art] PUB.X = F67D298C3B6116634CBA76B9862C81007C7ED1701ACC74B20394E277E48BD73A6ED21EE69CD00E4358F01DD07ABC099F
5,560,363 UART: [art] PUB.Y = A4F213A05441FE73F37DFC85632319B581E368744EFF283E0DCFDEB3B1536E117EEBFE62D712E5E008BDE5EFB71516D4
5,567,321 UART: [art] SIG.R = 368A8E448D5A223E1123AA76522370461058171BD1F4FF27C39BA0F068B4F54FF81C123B36A7BC6908E8D34C12115044
5,574,082 UART: [art] SIG.S = 5C743BD76FC76687735A5118C48384AD4FF488A36C01FB29E2CE5FB7AAD03CADBD7620FE4A1DEEF3048B59B755405D15
5,597,491 UART: Caliptra RT
5,597,836 UART: [state] CFI Enabled
5,705,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,145 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,776,107 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,817,737 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:f6:3f:5b:16:c2:20:94:f7:25:1e:5b:ed:39:30:95:2f:f1:7d:ce
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=57F63F5B16C22094F7251E5BED3930952FF17DCE9538FF77C0BF46302E5065C1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f6:7d:29:8c:3b:61:16:63:4c:ba:76:b9:86:2c:
81:00:7c:7e:d1:70:1a:cc:74:b2:03:94:e2:77:e4:
8b:d7:3a:6e:d2:1e:e6:9c:d0:0e:43:58:f0:1d:d0:
7a:bc:09:9f:a4:f2:13:a0:54:41:fe:73:f3:7d:fc:
85:63:23:19:b5:81:e3:68:74:4e:ff:28:3e:0d:cf:
de:b3:b1:53:6e:11:7e:eb:fe:62:d7:12:e5:e0:08:
bd:e5:ef:b7:15:16:d4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
57:F6:3F:5B:16:C2:20:94:F7:25:1E:5B:ED:39:30:95:2F:F1:7D:CE
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:36:8a:8e:44:8d:5a:22:3e:11:23:aa:76:52:23:
70:46:10:58:17:1b:d1:f4:ff:27:c3:9b:a0:f0:68:b4:f5:4f:
f8:1c:12:3b:36:a7:bc:69:08:e8:d3:4c:12:11:50:44:02:30:
5c:74:3b:d7:6f:c7:66:87:73:5a:51:18:c4:83:84:ad:4f:f4:
88:a3:6c:01:fb:29:e2:ce:5f:b7:aa:d0:3c:ad:bd:76:20:fe:
4a:1d:ee:f3:04:8b:59:b7:55:40:5d:15
5,828,662 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,748,484 >>> mbox cmd response: success
10,761,762 UART:
10,761,778 UART: Running Caliptra FMC ...
10,762,186 UART:
10,762,329 UART: [state] CFI Enabled
10,851,112 UART: [art] Extend RT PCRs Done
10,851,540 UART: [art] Lock RT PCRs Done
10,852,987 UART: [art] Populate DV Done
10,860,921 UART: [fht] FMC Alias Private Key: 7
10,862,103 UART: [art] Derive CDI
10,862,383 UART: [art] Store in in slot 0x4
10,948,032 UART: [art] Derive Key Pair
10,948,392 UART: [art] Store priv key in slot 0x5
10,961,900 UART: [art] Derive Key Pair - Done
10,976,662 UART: [art] Signing Cert with AUTHO
10,977,142 UART: RITY.KEYID = 7
10,992,684 UART: [art] Erasing AUTHORITY.KEYID = 7
10,993,449 UART: [art] PUB.X = E509E94263DD93F909EA434751C05418EECCB41A7A3677BD64742912490F0D72E7A98E946B4A72124C1BDA6B9A0E6F32
11,000,206 UART: [art] PUB.Y = DEB2B0F879B1486D78DF03325C50BBAAA4A7ED38CCB27F510C93E4F4834B1F15F945B0A47C7CD4F49B9D9E4134DC38B7
11,007,168 UART: [art] SIG.R = 8E729AF4C67D87F6C411843236661975E903E7A4B5E3F1738550E76A99B49905863D4681388B7EDF29825A8CAC7E3A55
11,013,924 UART: [art] SIG.S = 649DBFF5F803F4B99365458A80BD8DF75AD42BC042B2E4312327A92D19CCEF3B213995B7F206AED49E9CB26A12D6530B
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:05:b3:87:59:81:b0:e4:17:2f:95:fa:3e:64:72:1d:80:e1:23:bf
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4905B3875981B0E4172F95FA3E64721D80E123BFB40A88A49AB516E8E49F03A3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e5:09:e9:42:63:dd:93:f9:09:ea:43:47:51:c0:
54:18:ee:cc:b4:1a:7a:36:77:bd:64:74:29:12:49:
0f:0d:72:e7:a9:8e:94:6b:4a:72:12:4c:1b:da:6b:
9a:0e:6f:32:de:b2:b0:f8:79:b1:48:6d:78:df:03:
32:5c:50:bb:aa:a4:a7:ed:38:cc:b2:7f:51:0c:93:
e4:f4:83:4b:1f:15:f9:45:b0:a4:7c:7c:d4:f4:9b:
9d:9e:41:34:dc:38:b7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
49:05:B3:87:59:81:B0:E4:17:2F:95:FA:3E:64:72:1D:80:E1:23:BF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8e:72:9a:f4:c6:7d:87:f6:c4:11:84:32:36:
66:19:75:e9:03:e7:a4:b5:e3:f1:73:85:50:e7:6a:99:b4:99:
05:86:3d:46:81:38:8b:7e:df:29:82:5a:8c:ac:7e:3a:55:02:
30:64:9d:bf:f5:f8:03:f4:b9:93:65:45:8a:80:bd:8d:f7:5a:
d4:2b:c0:42:b2:e4:31:23:27:a9:2d:19:cc:ef:3b:21:39:95:
b7:f2:06:ae:d4:9e:9c:b2:6a:12:d6:53:0b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.79s
Truncated 5292 bytes from beginning
mtval=0, next_pc=40005400
3,888,685 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,928,611 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,927 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:a3:58:ac:96:1e:20:9f:2e:00:ec:3c:c0:ce:5a:40:68:29:6e:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=99A358AC961E209F2E00EC3CC0CE5A4068296E12556E92A4892FD9E6693021B7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:76:b3:d2:8d:49:b9:4a:bf:b2:03:1c:fa:97:46:
0c:c2:d9:53:9c:90:12:ad:6c:8e:99:70:ba:b2:0e:
67:6f:6a:b8:10:de:c2:e9:b1:36:6a:b2:86:f5:7c:
df:b1:9d:8d:b4:3f:8c:b1:aa:8c:10:4d:2e:d7:1c:
7f:95:e2:63:6d:77:8d:d6:b2:ef:da:de:34:28:5d:
38:ce:52:a8:71:85:c6:f5:ab:5a:07:6f:24:33:3e:
fe:fe:ba:28:7b:15:bb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
99:A3:58:AC:96:1E:20:9F:2E:00:EC:3C:C0:CE:5A:40:68:29:6E:12
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:62:6b:7a:84:f7:80:68:af:bc:14:e4:1b:7a:cf:
e7:08:58:3d:67:79:43:f9:4a:cd:55:ba:87:3b:0e:99:e3:6a:
df:7e:be:6e:14:47:cd:6c:af:44:a2:22:6f:da:66:c2:02:30:
53:b0:a7:4c:d7:6e:5a:6a:6f:63:ba:06:cb:83:54:d1:72:54:
cc:36:f0:bd:f4:c0:05:65:dd:a2:1b:a3:8b:1d:85:6f:f3:e2:
54:ad:a7:91:7d:b9:62:3b:ff:75:7e:a0
3,980,666 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,981,390 UART:
3,981,406 UART: Running Caliptra ROM ...
3,981,814 UART:
3,981,869 UART: [state] CFI Enabled
3,984,330 UART: [state] LifecycleState = Production
3,984,938 UART: [state] DebugLocked = Yes
3,985,668 UART: [state] Starting the WD Timer 40000000 cycles
3,987,262 UART: [kat] SHA2-256
4,792,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,797,037 UART: [kat] ++
4,797,189 UART: [kat] sha1
4,801,657 UART: [kat] SHA2-256
4,803,597 UART: [kat] SHA2-384
4,806,532 UART: [kat] SHA2-512-ACC
4,808,432 UART: [kat] ECC-384
4,818,263 UART: [kat] HMAC-384Kdf
4,822,931 UART: [kat] LMS
5,071,259 UART: [kat] --
5,072,149 UART: [update-reset] ++
6,930,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,931,218 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,077,826 >>> mbox cmd response: success
7,078,174 UART: [update-reset] Copying MAN_2 To MAN_1
7,086,186 UART: [update-reset Success] --
7,087,339 UART: [state] Locking Datavault
7,088,197 UART: [state] Locking PCR0, PCR1 and PCR31
7,088,801 UART: [state] Locking ICCM
7,089,307 UART: [exit] Launching FMC @ 0x40000130
7,094,636 UART:
7,094,652 UART: Running Caliptra FMC ...
7,095,060 UART:
7,095,114 UART: [state] CFI Enabled
7,184,027 UART: [art] Extend RT PCRs Done
7,184,455 UART: [art] Lock RT PCRs Done
7,185,580 UART: [art] Populate DV Done
7,193,522 UART: [fht] FMC Alias Private Key: 7
7,194,592 UART: [art] Derive CDI
7,194,872 UART: [art] Store in in slot 0x4
7,280,921 UART: [art] Derive Key Pair
7,281,281 UART: [art] Store priv key in slot 0x5
7,293,561 UART: [art] Derive Key Pair - Done
7,308,539 UART: [art] Signing Cert with AUTHO
7,309,019 UART: RITY.KEYID = 7
7,324,057 UART: [art] Erasing AUTHORITY.KEYID = 7
7,324,822 UART: [art] PUB.X = 4C2142CE746C1D9BE9A4CACF061CB0D21506B575C5CAE4002F15EF38B224585E38DBA363B779FD7DC577C7B9856DCB6E
7,331,580 UART: [art] PUB.Y = 44665809A70E274981D1B4D0066DF1EAE585B434E3D45FDA3F40C1E8E32BD0D9893819E670D9853C10BD805FBD16EC07
7,338,522 UART: [art] SIG.R = 4E95B66D3232AB19B52F6AC6A5A91D5BE500509B5A3EDDB95480B095312D86C5D33837BC6941AF4FF84BAE36DA1300CE
7,345,260 UART: [art] SIG.S = 76E7311CE50937223DFC1CD529FCB42637E499163BB660C1A0BEFD3F06702164BC22070B9F0DC69183A606DA399C5AD9
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:f0:d8:e1:8f:7f:4f:51:37:9f:c8:27:6d:63:d7:c1:ac:e5:be:76
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4BF0D8E18F7F4F51379FC8276D63D7C1ACE5BE765A53D56EB9CDFEDDF7582DD2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4c:21:42:ce:74:6c:1d:9b:e9:a4:ca:cf:06:1c:
b0:d2:15:06:b5:75:c5:ca:e4:00:2f:15:ef:38:b2:
24:58:5e:38:db:a3:63:b7:79:fd:7d:c5:77:c7:b9:
85:6d:cb:6e:44:66:58:09:a7:0e:27:49:81:d1:b4:
d0:06:6d:f1:ea:e5:85:b4:34:e3:d4:5f:da:3f:40:
c1:e8:e3:2b:d0:d9:89:38:19:e6:70:d9:85:3c:10:
bd:80:5f:bd:16:ec:07
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
4B:F0:D8:E1:8F:7F:4F:51:37:9F:C8:27:6D:63:D7:C1:AC:E5:BE:76
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4e:95:b6:6d:32:32:ab:19:b5:2f:6a:c6:a5:a9:
1d:5b:e5:00:50:9b:5a:3e:dd:b9:54:80:b0:95:31:2d:86:c5:
d3:38:37:bc:69:41:af:4f:f8:4b:ae:36:da:13:00:ce:02:30:
76:e7:31:1c:e5:09:37:22:3d:fc:1c:d5:29:fc:b4:26:37:e4:
99:16:3b:b6:60:c1:a0:be:fd:3f:06:70:21:64:bc:22:07:0b:
9f:0d:c6:91:83:a6:06:da:39:9c:5a:d9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.13s
Truncated 848 bytes from beginning
,516 UART: [art] Lock RT PCRs Done
3,378,994 UART: [art] Populate DV Done
3,387,134 UART: [fht] FMC Alias Private Key: 7
3,388,182 UART: [art] Derive CDI
3,388,462 UART: [art] Store in in slot 0x4
3,474,063 UART: [art] Derive Key Pair
3,474,423 UART: [art] Store priv key in slot 0x5
3,487,543 UART: [art] Derive Key Pair - Done
3,502,536 UART: [art] Signing Cert with AUTHO
3,503,016 UART: RITY.KEYID = 7
3,518,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,921 UART: [art] PUB.X = 4336E10501532523BE5E902CAE60DD6406685A09449EE0EE5F76C0AF79F7A86B29C4EAEC6A4CB756558ED6AD6F5AA431
3,525,689 UART: [art] PUB.Y = E6FF7AF6950178C9F616EB9BC61B91F49A4AA622612C4E075BFB211C1600F088A4B7575A5678AEBFF74917506CD445AD
3,532,619 UART: [art] SIG.R = A0F747F99FBA468EC313023CB4F0F47D362A66E63B5747B3C1889129868136771AC6223074008404052421D78EC601E3
3,539,341 UART: [art] SIG.S = 40D155AC1816423A76EF2BB0021DB8A57406BEE801172862BBA581A46232CF511438006C3A711710656146E6A34B2BF5
3,563,273 UART: Caliptra RT
3,563,526 UART: [state] CFI Enabled
3,671,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,224 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,992 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,512 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:eb:d9:5d:14:63:b3:b6:ef:42:87:e1:14:52:20:d0:d4:2e:1f:e3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1CEBD95D1463B3B6EF4287E1145220D0D42E1FE3B043627500A22BB94442DE27
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:43:36:e1:05:01:53:25:23:be:5e:90:2c:ae:60:
dd:64:06:68:5a:09:44:9e:e0:ee:5f:76:c0:af:79:
f7:a8:6b:29:c4:ea:ec:6a:4c:b7:56:55:8e:d6:ad:
6f:5a:a4:31:e6:ff:7a:f6:95:01:78:c9:f6:16:eb:
9b:c6:1b:91:f4:9a:4a:a6:22:61:2c:4e:07:5b:fb:
21:1c:16:00:f0:88:a4:b7:57:5a:56:78:ae:bf:f7:
49:17:50:6c:d4:45:ad
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
1C:EB:D9:5D:14:63:B3:B6:EF:42:87:E1:14:52:20:D0:D4:2E:1F:E3
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a0:f7:47:f9:9f:ba:46:8e:c3:13:02:3c:b4:
f0:f4:7d:36:2a:66:e6:3b:57:47:b3:c1:88:91:29:86:81:36:
77:1a:c6:22:30:74:00:84:04:05:24:21:d7:8e:c6:01:e3:02:
30:40:d1:55:ac:18:16:42:3a:76:ef:2b:b0:02:1d:b8:a5:74:
06:be:e8:01:17:28:62:bb:a5:81:a4:62:32:cf:51:14:38:00:
6c:3a:71:17:10:65:61:46:e6:a3:4b:2b:f5
3,794,203 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,771,757 >>> mbox cmd response: success
6,785,136 UART:
6,785,152 UART: Running Caliptra FMC ...
6,785,560 UART:
6,785,614 UART: [state] CFI Enabled
6,874,835 UART: [art] Extend RT PCRs Done
6,875,263 UART: [art] Lock RT PCRs Done
6,876,624 UART: [art] Populate DV Done
6,885,100 UART: [fht] FMC Alias Private Key: 7
6,886,280 UART: [art] Derive CDI
6,886,560 UART: [art] Store in in slot 0x4
6,972,293 UART: [art] Derive Key Pair
6,972,653 UART: [art] Store priv key in slot 0x5
6,985,417 UART: [art] Derive Key Pair - Done
7,000,181 UART: [art] Signing Cert with AUTHO
7,000,661 UART: RITY.KEYID = 7
7,015,915 UART: [art] Erasing AUTHORITY.KEYID = 7
7,016,680 UART: [art] PUB.X = DDFB5C0CE740E36A80BDD1417369762601E96DE9F47913F92EE99AF34F0644E8D30121189FD42F455B14DD097041866B
7,023,435 UART: [art] PUB.Y = 5D8A63B50A44C528D0BEBDBFD68FA83FFBE9EB47318FD184F65D4E57ED449C779A71722BD243FF681BFDD26431FD6BB6
7,030,404 UART: [art] SIG.R = AD791AA09D45C26B1581616AF328962A5BB29D1C809A16E0603B2A12CCE2CAE97885349E7404C6EBF7933F001DB93EE9
7,037,155 UART: [art] SIG.S = 396A66B477300D98F7B9AF04CD717A95FE3E4A18E127A3760F7612A42B147449FE84C26F9DC735BDBAD69838C4509324
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:ef:ec:7a:61:53:1f:39:a9:16:05:9f:6d:06:0c:29:ff:1e:1e:db
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=27EFEC7A61531F39A916059F6D060C29FF1E1EDB740BF92E033F98CBE334AF3A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dd:fb:5c:0c:e7:40:e3:6a:80:bd:d1:41:73:69:
76:26:01:e9:6d:e9:f4:79:13:f9:2e:e9:9a:f3:4f:
06:44:e8:d3:01:21:18:9f:d4:2f:45:5b:14:dd:09:
70:41:86:6b:5d:8a:63:b5:0a:44:c5:28:d0:be:bd:
bf:d6:8f:a8:3f:fb:e9:eb:47:31:8f:d1:84:f6:5d:
4e:57:ed:44:9c:77:9a:71:72:2b:d2:43:ff:68:1b:
fd:d2:64:31:fd:6b:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
27:EF:EC:7A:61:53:1F:39:A9:16:05:9F:6D:06:0C:29:FF:1E:1E:DB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ad:79:1a:a0:9d:45:c2:6b:15:81:61:6a:f3:
28:96:2a:5b:b2:9d:1c:80:9a:16:e0:60:3b:2a:12:cc:e2:ca:
e9:78:85:34:9e:74:04:c6:eb:f7:93:3f:00:1d:b9:3e:e9:02:
30:39:6a:66:b4:77:30:0d:98:f7:b9:af:04:cd:71:7a:95:fe:
3e:4a:18:e1:27:a3:76:0f:76:12:a4:2b:14:74:49:fe:84:c2:
6f:9d:c7:35:bd:ba:d6:98:38:c4:50:93:24
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
Truncated 5295 bytes from beginning
al=0, next_pc=40005400
3,874,900 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,696 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,068 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:51:e1:e3:68:6b:cb:77:91:d0:58:f7:8d:bf:c0:e2:68:1a:14:9d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1C51E1E3686BCB7791D058F78DBFC0E2681A149DFC25CAD2BD5FABBDD39ACF7A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6e:83:cf:10:d6:99:7d:f5:57:5e:ee:61:da:c0:
89:bf:f1:90:70:52:4b:28:45:35:01:3b:be:11:5b:
b1:6f:4c:8e:43:2a:84:c5:56:cf:26:8f:f3:51:ad:
aa:c5:b6:0b:8c:82:ec:ac:f9:41:cb:75:1a:cd:88:
39:84:40:ab:23:04:cc:e3:f4:b2:99:62:fe:c5:8e:
9b:07:03:14:be:29:b3:3a:a8:65:6b:5c:aa:cf:cb:
86:c7:a6:86:dd:a2:67
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
1C:51:E1:E3:68:6B:CB:77:91:D0:58:F7:8D:BF:C0:E2:68:1A:14:9D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:11:e1:7a:c5:91:94:87:b0:06:30:32:b8:9f:59:
de:e1:5e:7c:78:5d:dd:fd:6d:82:b6:99:f2:60:a3:50:de:5d:
44:8e:70:42:96:a1:86:73:20:07:a7:54:02:e5:07:75:02:30:
3f:b9:75:19:81:f9:0a:72:de:fd:52:9b:f5:fc:9d:3b:fc:51:
1a:30:8c:4d:ef:d0:3a:d9:51:79:a2:57:40:81:3f:75:e2:cb:
7c:8f:00:6b:a5:8a:0f:77:a8:60:66:25
3,966,895 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,505 UART:
3,967,521 UART: Running Caliptra ROM ...
3,967,929 UART:
3,968,071 UART: [state] CFI Enabled
3,970,904 UART: [state] LifecycleState = Production
3,971,512 UART: [state] DebugLocked = Yes
3,972,196 UART: [state] Starting the WD Timer 40000000 cycles
3,973,786 UART: [kat] SHA2-256
4,779,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,783,561 UART: [kat] ++
4,783,713 UART: [kat] sha1
4,787,879 UART: [kat] SHA2-256
4,789,819 UART: [kat] SHA2-384
4,792,800 UART: [kat] SHA2-512-ACC
4,794,700 UART: [kat] ECC-384
4,804,629 UART: [kat] HMAC-384Kdf
4,809,267 UART: [kat] LMS
5,057,595 UART: [kat] --
5,058,265 UART: [update-reset] ++
6,915,149 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,916,142 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,062,750 >>> mbox cmd response: success
7,062,974 UART: [update-reset] Copying MAN_2 To MAN_1
7,070,986 UART: [update-reset Success] --
7,072,087 UART: [state] Locking Datavault
7,072,951 UART: [state] Locking PCR0, PCR1 and PCR31
7,073,555 UART: [state] Locking ICCM
7,074,175 UART: [exit] Launching FMC @ 0x40000130
7,079,504 UART:
7,079,520 UART: Running Caliptra FMC ...
7,079,928 UART:
7,080,071 UART: [state] CFI Enabled
7,169,500 UART: [art] Extend RT PCRs Done
7,169,928 UART: [art] Lock RT PCRs Done
7,170,961 UART: [art] Populate DV Done
7,179,095 UART: [fht] FMC Alias Private Key: 7
7,180,063 UART: [art] Derive CDI
7,180,343 UART: [art] Store in in slot 0x4
7,266,134 UART: [art] Derive Key Pair
7,266,494 UART: [art] Store priv key in slot 0x5
7,279,500 UART: [art] Derive Key Pair - Done
7,294,165 UART: [art] Signing Cert with AUTHO
7,294,645 UART: RITY.KEYID = 7
7,309,981 UART: [art] Erasing AUTHORITY.KEYID = 7
7,310,746 UART: [art] PUB.X = 9C23FFB6B484760F04411721FBFC6FD6E4EBBD0983B61B7A82E33D52ED9AE359A15AD2F06EEF2293DDF9F3C3BCCA9AB3
7,317,533 UART: [art] PUB.Y = 99E1B1233C4F7EBA1F0D7420795EB6A70D93CBD0AB2A0F733794939EA234F00E4A5BEA3AAEF7DD58DD488D2E1537AE2E
7,324,491 UART: [art] SIG.R = E0D711F8E2288BA006D3C7D32946B348D1EC4C3FC7A09336A78DC9B4A7483CADB98B5BE779B30D16A8802DD48A5B57C1
7,331,267 UART: [art] SIG.S = 613702425A1B07DBFA85A80303BAEB71951D8BFAB663DD2C39B042D50E3F8BBDCC09D053FD8748A5BFC3B7CB63574E46
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:6d:96:9f:4a:e9:d1:8c:8e:a6:13:90:3a:f6:75:fd:56:10:0d:a4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9C6D969F4AE9D18C8EA613903AF675FD56100DA44FC6075E8BA49453D515ED84
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9c:23:ff:b6:b4:84:76:0f:04:41:17:21:fb:fc:
6f:d6:e4:eb:bd:09:83:b6:1b:7a:82:e3:3d:52:ed:
9a:e3:59:a1:5a:d2:f0:6e:ef:22:93:dd:f9:f3:c3:
bc:ca:9a:b3:99:e1:b1:23:3c:4f:7e:ba:1f:0d:74:
20:79:5e:b6:a7:0d:93:cb:d0:ab:2a:0f:73:37:94:
93:9e:a2:34:f0:0e:4a:5b:ea:3a:ae:f7:dd:58:dd:
48:8d:2e:15:37:ae:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
9C:6D:96:9F:4A:E9:D1:8C:8E:A6:13:90:3A:F6:75:FD:56:10:0D:A4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e0:d7:11:f8:e2:28:8b:a0:06:d3:c7:d3:29:
46:b3:48:d1:ec:4c:3f:c7:a0:93:36:a7:8d:c9:b4:a7:48:3c:
ad:b9:8b:5b:e7:79:b3:0d:16:a8:80:2d:d4:8a:5b:57:c1:02:
30:61:37:02:42:5a:1b:07:db:fa:85:a8:03:03:ba:eb:71:95:
1d:8b:fa:b6:63:dd:2c:39:b0:42:d5:0e:3f:8b:bd:cc:09:d0:
53:fd:87:48:a5:bf:c3:b7:cb:63:57:4e:46
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.14s
Truncated 848 bytes from beginning
,602 UART: [art] Lock RT PCRs Done
3,385,156 UART: [art] Populate DV Done
3,393,514 UART: [fht] FMC Alias Private Key: 7
3,394,598 UART: [art] Derive CDI
3,394,878 UART: [art] Store in in slot 0x4
3,480,343 UART: [art] Derive Key Pair
3,480,703 UART: [art] Store priv key in slot 0x5
3,493,825 UART: [art] Derive Key Pair - Done
3,508,577 UART: [art] Signing Cert with AUTHO
3,509,057 UART: RITY.KEYID = 7
3,524,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,524,854 UART: [art] PUB.X = FA1EE3E41EA347E34A912BC342399635E45DD366F27BE090EE4ED1AFC8A1DB8AE3B87E1EA046E72E59A367781F0F75D3
3,531,637 UART: [art] PUB.Y = 75B21BE99736A6A66811FFB1CB60059EFC0EE236AEBC22258F226835DB8B1874C17E3EE59BC4B531C08312183BF2E707
3,538,584 UART: [art] SIG.R = D9682DE554B9E91A9F828B60A0B3B49969944D40210197064DEA3A7CC98F0FF78558D79598D75B86F40BFC6E9D00D63E
3,545,322 UART: [art] SIG.S = 3C01C2ACE92C85B99523CEA2D8AADA32310035B42A7BCEF17BE33B9906841AAD1C2C95C79E72A09F03B7F1123EB3147D
3,569,240 UART: Caliptra RT
3,569,585 UART: [state] CFI Enabled
3,677,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,651 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,623 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,749 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:97:20:c3:9b:e7:10:53:68:48:1f:9b:51:5c:e4:b2:7b:d3:16:75
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A59720C39BE7105368481F9B515CE4B27BD31675AD1A3A176A7307F191D60616
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fa:1e:e3:e4:1e:a3:47:e3:4a:91:2b:c3:42:39:
96:35:e4:5d:d3:66:f2:7b:e0:90:ee:4e:d1:af:c8:
a1:db:8a:e3:b8:7e:1e:a0:46:e7:2e:59:a3:67:78:
1f:0f:75:d3:75:b2:1b:e9:97:36:a6:a6:68:11:ff:
b1:cb:60:05:9e:fc:0e:e2:36:ae:bc:22:25:8f:22:
68:35:db:8b:18:74:c1:7e:3e:e5:9b:c4:b5:31:c0:
83:12:18:3b:f2:e7:07
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
A5:97:20:C3:9B:E7:10:53:68:48:1F:9B:51:5C:E4:B2:7B:D3:16:75
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d9:68:2d:e5:54:b9:e9:1a:9f:82:8b:60:a0:
b3:b4:99:69:94:4d:40:21:01:97:06:4d:ea:3a:7c:c9:8f:0f:
f7:85:58:d7:95:98:d7:5b:86:f4:0b:fc:6e:9d:00:d6:3e:02:
30:3c:01:c2:ac:e9:2c:85:b9:95:23:ce:a2:d8:aa:da:32:31:
00:35:b4:2a:7b:ce:f1:7b:e3:3b:99:06:84:1a:ad:1c:2c:95:
c7:9e:72:a0:9f:03:b7:f1:12:3e:b3:14:7d
3,799,400 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,771,735 >>> mbox cmd response: success
6,785,388 UART:
6,785,404 UART: Running Caliptra FMC ...
6,785,812 UART:
6,785,955 UART: [state] CFI Enabled
6,875,120 UART: [art] Extend RT PCRs Done
6,875,548 UART: [art] Lock RT PCRs Done
6,876,853 UART: [art] Populate DV Done
6,885,029 UART: [fht] FMC Alias Private Key: 7
6,886,201 UART: [art] Derive CDI
6,886,481 UART: [art] Store in in slot 0x4
6,971,990 UART: [art] Derive Key Pair
6,972,350 UART: [art] Store priv key in slot 0x5
6,985,664 UART: [art] Derive Key Pair - Done
7,000,391 UART: [art] Signing Cert with AUTHO
7,000,871 UART: RITY.KEYID = 7
7,015,627 UART: [art] Erasing AUTHORITY.KEYID = 7
7,016,392 UART: [art] PUB.X = 2264718615BE594FAB72AD42C362C84AC76A1832CB3D91B096A153318DA982A21626EB53ACF9280A73851138C2111A3C
7,023,155 UART: [art] PUB.Y = 364433F9C2F6FCF72AAE745942D45E918A350759116D72B601244CB76A6E017F23D508EB4D024E2BEA19A54744804269
7,030,084 UART: [art] SIG.R = 74E37DB895BCAEE177F9618F57A0AFF054D99B4FE515632DF7A4673893653F0D2D88E2FD327251157B666DE98AF4148D
7,036,855 UART: [art] SIG.S = CA89F1FF3F010345C31B678A122D9C828BBCBBC374DB2BD44DB29B9E68B5FD6BD0230F6F69CF637A91D47213B5FA675A
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:96:23:fc:c7:aa:96:15:16:d3:14:a6:88:9b:39:a7:af:f7:3c:e0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1F9623FCC7AA961516D314A6889B39A7AFF73CE058C5E924609F3792BCF2C9F4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:22:64:71:86:15:be:59:4f:ab:72:ad:42:c3:62:
c8:4a:c7:6a:18:32:cb:3d:91:b0:96:a1:53:31:8d:
a9:82:a2:16:26:eb:53:ac:f9:28:0a:73:85:11:38:
c2:11:1a:3c:36:44:33:f9:c2:f6:fc:f7:2a:ae:74:
59:42:d4:5e:91:8a:35:07:59:11:6d:72:b6:01:24:
4c:b7:6a:6e:01:7f:23:d5:08:eb:4d:02:4e:2b:ea:
19:a5:47:44:80:42:69
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
1F:96:23:FC:C7:AA:96:15:16:D3:14:A6:88:9B:39:A7:AF:F7:3C:E0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:74:e3:7d:b8:95:bc:ae:e1:77:f9:61:8f:57:a0:
af:f0:54:d9:9b:4f:e5:15:63:2d:f7:a4:67:38:93:65:3f:0d:
2d:88:e2:fd:32:72:51:15:7b:66:6d:e9:8a:f4:14:8d:02:31:
00:ca:89:f1:ff:3f:01:03:45:c3:1b:67:8a:12:2d:9c:82:8b:
bc:bb:c3:74:db:2b:d4:4d:b2:9b:9e:68:b5:fd:6b:d0:23:0f:
6f:69:cf:63:7a:91:d4:72:13:b5:fa:67:5a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 5298 bytes from beginning
0, next_pc=40005400
3,876,135 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,283 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,733 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:bf:4d:c2:fe:ac:e6:79:44:7f:3f:6d:74:b4:f9:83:38:f4:6f:16
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=85BF4DC2FEACE679447F3F6D74B4F98338F46F16633FF6FF4802C4BEE113C545
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dd:a1:6d:59:69:c5:da:50:5b:0f:d4:da:ee:0f:
10:fb:bd:87:c5:23:54:63:f4:cc:01:33:55:33:b7:
34:3c:e1:ea:4e:4a:ab:56:eb:fd:81:07:77:b3:8c:
ab:1b:80:01:47:14:ad:42:ab:ea:90:59:6c:60:08:
79:96:1a:a7:c7:98:c4:0a:0f:8a:a4:07:53:27:f5:
63:93:67:b6:bf:fc:47:72:a8:6f:f9:e8:aa:11:e2:
f4:33:39:46:7d:16:3f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
85:BF:4D:C2:FE:AC:E6:79:44:7F:3F:6D:74:B4:F9:83:38:F4:6F:16
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3f:bb:38:ef:73:94:db:da:89:10:73:c7:8d:72:
db:dd:cf:33:4b:74:2e:46:56:6a:96:61:1a:cd:45:78:ac:3e:
5b:de:6c:4a:64:a5:2d:a1:75:91:12:34:78:81:94:db:02:31:
00:dc:0c:d8:17:03:33:f1:70:98:e9:41:43:3e:74:40:5b:b7:
22:5c:06:ed:4a:39:53:70:6f:00:2c:0f:ff:16:f4:b1:cb:8f:
9f:23:1a:95:e8:34:3c:65:6c:bf:04:83:a2
3,968,760 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,358 UART:
3,969,374 UART: Running Caliptra ROM ...
3,969,782 UART:
3,969,837 UART: [state] CFI Enabled
3,972,722 UART: [state] LifecycleState = Production
3,973,330 UART: [state] DebugLocked = Yes
3,974,034 UART: [state] Starting the WD Timer 40000000 cycles
3,975,582 UART: [kat] SHA2-256
4,779,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,783,261 UART: [kat] ++
4,783,413 UART: [kat] sha1
4,787,617 UART: [kat] SHA2-256
4,789,557 UART: [kat] SHA2-384
4,792,162 UART: [kat] SHA2-512-ACC
4,794,062 UART: [kat] ECC-384
4,803,587 UART: [kat] HMAC-384Kdf
4,808,133 UART: [kat] LMS
5,056,445 UART: [kat] --
5,057,573 UART: [update-reset] ++
6,920,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,921,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,068,245 >>> mbox cmd response: success
7,068,477 UART: [update-reset] Copying MAN_2 To MAN_1
7,076,489 UART: [update-reset Success] --
7,077,310 UART: [state] Locking Datavault
7,078,112 UART: [state] Locking PCR0, PCR1 and PCR31
7,078,716 UART: [state] Locking ICCM
7,079,336 UART: [exit] Launching FMC @ 0x40000130
7,084,665 UART:
7,084,681 UART: Running Caliptra FMC ...
7,085,089 UART:
7,085,143 UART: [state] CFI Enabled
7,174,258 UART: [art] Extend RT PCRs Done
7,174,686 UART: [art] Lock RT PCRs Done
7,176,025 UART: [art] Populate DV Done
7,184,007 UART: [fht] FMC Alias Private Key: 7
7,184,965 UART: [art] Derive CDI
7,185,245 UART: [art] Store in in slot 0x4
7,270,726 UART: [art] Derive Key Pair
7,271,086 UART: [art] Store priv key in slot 0x5
7,284,062 UART: [art] Derive Key Pair - Done
7,299,126 UART: [art] Signing Cert with AUTHO
7,299,606 UART: RITY.KEYID = 7
7,314,486 UART: [art] Erasing AUTHORITY.KEYID = 7
7,315,251 UART: [art] PUB.X = 16595D1DF5CE2A8149761F3FBB3ED2982780F47E4A614995D1A823103E165C97E82AF9D287D32F3AA7B210A733DB2FA1
7,322,025 UART: [art] PUB.Y = 9247EB4982206951F1BCA4F7B24B4DBB877971F5CBF68560769CF0E98F1912BE9EA35F2B6A5A1ACBF0F72C52E4061A0D
7,328,981 UART: [art] SIG.R = A55F2E94C337F4DEF116C3E12928410B0C2E7FD261D7CB36061D418DBB412ED5449F01B8D9B04DE2920071A4B0B63F21
7,335,723 UART: [art] SIG.S = 4E580A11E9F4E5A689CE2CCC4D3262FC3990334D5C46FE8A94E4F0C88E17F6D01C2B45EDC4561F25747868E63D78A141
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:f4:58:a4:55:df:da:80:a9:78:7b:1b:70:58:82:95:5d:12:e0:b7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7DF458A455DFDA80A9787B1B705882955D12E0B7C912F84ED5E17CD6276A323C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:16:59:5d:1d:f5:ce:2a:81:49:76:1f:3f:bb:3e:
d2:98:27:80:f4:7e:4a:61:49:95:d1:a8:23:10:3e:
16:5c:97:e8:2a:f9:d2:87:d3:2f:3a:a7:b2:10:a7:
33:db:2f:a1:92:47:eb:49:82:20:69:51:f1:bc:a4:
f7:b2:4b:4d:bb:87:79:71:f5:cb:f6:85:60:76:9c:
f0:e9:8f:19:12:be:9e:a3:5f:2b:6a:5a:1a:cb:f0:
f7:2c:52:e4:06:1a:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
7D:F4:58:A4:55:DF:DA:80:A9:78:7B:1B:70:58:82:95:5D:12:E0:B7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a5:5f:2e:94:c3:37:f4:de:f1:16:c3:e1:29:
28:41:0b:0c:2e:7f:d2:61:d7:cb:36:06:1d:41:8d:bb:41:2e:
d5:44:9f:01:b8:d9:b0:4d:e2:92:00:71:a4:b0:b6:3f:21:02:
30:4e:58:0a:11:e9:f4:e5:a6:89:ce:2c:cc:4d:32:62:fc:39:
90:33:4d:5c:46:fe:8a:94:e4:f0:c8:8e:17:f6:d0:1c:2b:45:
ed:c4:56:1f:25:74:78:68:e6:3d:78:a1:41
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
Truncated 845 bytes from beginning
376,778 UART: [art] Lock RT PCRs Done
3,378,306 UART: [art] Populate DV Done
3,386,606 UART: [fht] FMC Alias Private Key: 7
3,387,650 UART: [art] Derive CDI
3,387,930 UART: [art] Store in in slot 0x4
3,473,417 UART: [art] Derive Key Pair
3,473,777 UART: [art] Store priv key in slot 0x5
3,486,791 UART: [art] Derive Key Pair - Done
3,501,354 UART: [art] Signing Cert with AUTHO
3,501,834 UART: RITY.KEYID = 7
3,517,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,841 UART: [art] PUB.X = 030F2324AFBB0E0E845F642A9BE2156E3FFD1794487A819EE921AB5EE2780E8C4E237A57518594F6FD78600F800B1C3B
3,524,594 UART: [art] PUB.Y = 63EE91BB07247858870521BDF5FD56777A1096B3AF81A435E450371A866E72600E6EBF305AFF6D63BE2B0BC49FF246A5
3,531,536 UART: [art] SIG.R = 4B33D9288FCE5AAF3393071634DF88D0BE1FB8785609D14A8A14839C844B869AF786C402A9C32BD0EB9C0F12C3073897
3,538,293 UART: [art] SIG.S = 66CB4A9E571ED662FFCA2F0BB6839ED04B01E321AAD6290B2CAA0BC85705122CBCC99C0C8C1B63A251F79DCFD6BE5F7C
3,562,756 UART: Caliptra RT
3,563,009 UART: [state] CFI Enabled
3,669,579 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,822 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,640 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,926 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
46:20:48:9a:cf:4f:f6:14:26:be:5d:cb:23:87:25:e4:39:de:01:28
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4220489ACF4FF61426BE5DCB238725E439DE01281EC4257DD504D7C55032B43B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:03:0f:23:24:af:bb:0e:0e:84:5f:64:2a:9b:e2:
15:6e:3f:fd:17:94:48:7a:81:9e:e9:21:ab:5e:e2:
78:0e:8c:4e:23:7a:57:51:85:94:f6:fd:78:60:0f:
80:0b:1c:3b:63:ee:91:bb:07:24:78:58:87:05:21:
bd:f5:fd:56:77:7a:10:96:b3:af:81:a4:35:e4:50:
37:1a:86:6e:72:60:0e:6e:bf:30:5a:ff:6d:63:be:
2b:0b:c4:9f:f2:46:a5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
42:20:48:9A:CF:4F:F6:14:26:BE:5D:CB:23:87:25:E4:39:DE:01:28
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4b:33:d9:28:8f:ce:5a:af:33:93:07:16:34:df:
88:d0:be:1f:b8:78:56:09:d1:4a:8a:14:83:9c:84:4b:86:9a:
f7:86:c4:02:a9:c3:2b:d0:eb:9c:0f:12:c3:07:38:97:02:30:
66:cb:4a:9e:57:1e:d6:62:ff:ca:2f:0b:b6:83:9e:d0:4b:01:
e3:21:aa:d6:29:0b:2c:aa:0b:c8:57:05:12:2c:bc:c9:9c:0c:
8c:1b:63:a2:51:f7:9d:cf:d6:be:5f:7c
3,791,847 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,777,276 >>> mbox cmd response: success
6,790,677 UART:
6,790,693 UART: Running Caliptra FMC ...
6,791,101 UART:
6,791,155 UART: [state] CFI Enabled
6,880,168 UART: [art] Extend RT PCRs Done
6,880,596 UART: [art] Lock RT PCRs Done
6,881,705 UART: [art] Populate DV Done
6,890,123 UART: [fht] FMC Alias Private Key: 7
6,891,103 UART: [art] Derive CDI
6,891,383 UART: [art] Store in in slot 0x4
6,977,068 UART: [art] Derive Key Pair
6,977,428 UART: [art] Store priv key in slot 0x5
6,990,410 UART: [art] Derive Key Pair - Done
7,005,419 UART: [art] Signing Cert with AUTHO
7,005,899 UART: RITY.KEYID = 7
7,020,815 UART: [art] Erasing AUTHORITY.KEYID = 7
7,021,580 UART: [art] PUB.X = D46050F0D945FDCF1C35C941D8874DBF2DFCA470A6DA3F8A78D30F1D335DCCB2118465148FDEF56A6755A345F4C0071C
7,028,358 UART: [art] PUB.Y = F42C2A3EB38FE1DC6C1B0652C40BCBF4B11F0FEE7BD9BC51063309D5C111737276626758C3FAA3D1A5F54C0DF1FE7FD3
7,035,310 UART: [art] SIG.R = 8AFA3DBC70423DFD3C9DB2AB0C8D91FE537CBE9A78F61DE28184E95C9CCAB61CCD9056F61715A2AE83053922819A2409
7,042,087 UART: [art] SIG.S = 6EFCFE47AC10F2D08551C61F29196C6E8B7E912383285AF34558E1153C20BEA9440E2A6C6EDD79351CF519F7DDB7B2D5
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:74:44:c3:6f:c5:86:69:00:32:78:91:bd:61:53:c9:d4:db:e1:70
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A57444C36FC5866900327891BD6153C9D4DBE170A4C35017BF88100C140D6793
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:60:50:f0:d9:45:fd:cf:1c:35:c9:41:d8:87:
4d:bf:2d:fc:a4:70:a6:da:3f:8a:78:d3:0f:1d:33:
5d:cc:b2:11:84:65:14:8f:de:f5:6a:67:55:a3:45:
f4:c0:07:1c:f4:2c:2a:3e:b3:8f:e1:dc:6c:1b:06:
52:c4:0b:cb:f4:b1:1f:0f:ee:7b:d9:bc:51:06:33:
09:d5:c1:11:73:72:76:62:67:58:c3:fa:a3:d1:a5:
f5:4c:0d:f1:fe:7f:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
A5:74:44:C3:6F:C5:86:69:00:32:78:91:BD:61:53:C9:D4:DB:E1:70
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8a:fa:3d:bc:70:42:3d:fd:3c:9d:b2:ab:0c:
8d:91:fe:53:7c:be:9a:78:f6:1d:e2:81:84:e9:5c:9c:ca:b6:
1c:cd:90:56:f6:17:15:a2:ae:83:05:39:22:81:9a:24:09:02:
30:6e:fc:fe:47:ac:10:f2:d0:85:51:c6:1f:29:19:6c:6e:8b:
7e:91:23:83:28:5a:f3:45:58:e1:15:3c:20:be:a9:44:0e:2a:
6c:6e:dd:79:35:1c:f5:19:f7:dd:b7:b2:d5
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 5298 bytes from beginning
0, next_pc=40005400
3,874,748 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,520 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,106 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5f:4c:fb:3a:46:a8:2b:52:ac:6b:14:47:12:d0:77:6a:51:8e:07:27
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5F4CFB3A46A82B52AC6B144712D0776A518E0727C39F2370751F7527F706625E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cf:0c:eb:d6:8b:30:c5:93:5e:9a:f4:8f:18:d7:
f2:38:76:22:f4:27:6f:dc:75:cf:97:a5:c1:84:3c:
94:b8:f2:83:b4:bc:0b:4c:f9:e4:aa:20:94:07:d8:
0e:08:04:e1:7a:d5:00:2e:6e:54:25:29:f9:f3:2b:
19:d3:5d:62:2e:a5:5c:51:90:96:d9:03:eb:87:e3:
ec:ce:3f:07:8c:d8:c4:0a:c6:b6:53:5d:f2:4c:5d:
72:a6:7c:8a:de:30:09
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
5F:4C:FB:3A:46:A8:2B:52:AC:6B:14:47:12:D0:77:6A:51:8E:07:27
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:f4:c6:e8:ff:d5:7d:56:4f:ba:b8:d1:90:2f:
f3:91:0b:9d:d5:c4:8e:a3:31:9c:ad:0f:ca:e3:89:ee:d0:38:
7e:e4:f2:6b:68:1c:7c:01:b4:5a:2f:cf:cd:59:3a:a9:08:02:
31:00:b2:c2:a3:70:a5:1e:69:72:76:99:c1:41:45:00:be:41:
fd:58:7d:cd:9e:92:4a:2c:d6:01:44:d7:ee:77:56:25:1f:d6:
4a:c7:0c:aa:66:40:8c:9a:1c:7b:1e:39:67:ce
3,967,120 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,004 UART:
3,968,020 UART: Running Caliptra ROM ...
3,968,428 UART:
3,968,570 UART: [state] CFI Enabled
3,971,167 UART: [state] LifecycleState = Production
3,971,775 UART: [state] DebugLocked = Yes
3,972,341 UART: [state] Starting the WD Timer 40000000 cycles
3,973,837 UART: [kat] SHA2-256
4,777,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,781,516 UART: [kat] ++
4,781,668 UART: [kat] sha1
4,785,980 UART: [kat] SHA2-256
4,787,920 UART: [kat] SHA2-384
4,790,829 UART: [kat] SHA2-512-ACC
4,792,729 UART: [kat] ECC-384
4,802,530 UART: [kat] HMAC-384Kdf
4,807,284 UART: [kat] LMS
5,055,596 UART: [kat] --
5,056,666 UART: [update-reset] ++
6,913,611 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,914,746 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,061,354 >>> mbox cmd response: success
7,061,610 UART: [update-reset] Copying MAN_2 To MAN_1
7,069,622 UART: [update-reset Success] --
7,070,697 UART: [state] Locking Datavault
7,071,621 UART: [state] Locking PCR0, PCR1 and PCR31
7,072,225 UART: [state] Locking ICCM
7,072,787 UART: [exit] Launching FMC @ 0x40000130
7,078,116 UART:
7,078,132 UART: Running Caliptra FMC ...
7,078,540 UART:
7,078,683 UART: [state] CFI Enabled
7,167,108 UART: [art] Extend RT PCRs Done
7,167,536 UART: [art] Lock RT PCRs Done
7,168,963 UART: [art] Populate DV Done
7,177,209 UART: [fht] FMC Alias Private Key: 7
7,178,335 UART: [art] Derive CDI
7,178,615 UART: [art] Store in in slot 0x4
7,264,488 UART: [art] Derive Key Pair
7,264,848 UART: [art] Store priv key in slot 0x5
7,277,938 UART: [art] Derive Key Pair - Done
7,292,810 UART: [art] Signing Cert with AUTHO
7,293,290 UART: RITY.KEYID = 7
7,308,410 UART: [art] Erasing AUTHORITY.KEYID = 7
7,309,175 UART: [art] PUB.X = 3D77D9FED34714CFAF1489D0CE47FA9BD5B4EA222BCDE6A7CBF87F87ECD700F05CE7532599CCEED8EDF51EEC89ECEEE8
7,315,961 UART: [art] PUB.Y = 7785F739AA5B5DB6A07580A95BD7B7EA251780572EDF39B5CBE25FCBBA1C4F780C9F6FE04EA355981A42C396E1583D6A
7,322,922 UART: [art] SIG.R = 2C8936280DB8F96E137A6E6D4FF8A531A14FEF95F5A741F033D0B8297B87690EBFBB7D548970BE29CEC3AA034FA8E2E8
7,329,697 UART: [art] SIG.S = 5ECBA3176AB318FD50EF9F14C88C654A0569665C2ACBCE8AB0CFD3C22F94EC991F5BB1EDFE41699EAD3A647BF87A2222
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:25:ac:ad:b2:7c:90:84:6b:99:2b:cc:4f:e2:03:c0:3f:92:06:15
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3A25ACADB27C90846B992BCC4FE203C03F9206152BBD2E651E6F2DEBED88E6E2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3d:77:d9:fe:d3:47:14:cf:af:14:89:d0:ce:47:
fa:9b:d5:b4:ea:22:2b:cd:e6:a7:cb:f8:7f:87:ec:
d7:00:f0:5c:e7:53:25:99:cc:ee:d8:ed:f5:1e:ec:
89:ec:ee:e8:77:85:f7:39:aa:5b:5d:b6:a0:75:80:
a9:5b:d7:b7:ea:25:17:80:57:2e:df:39:b5:cb:e2:
5f:cb:ba:1c:4f:78:0c:9f:6f:e0:4e:a3:55:98:1a:
42:c3:96:e1:58:3d:6a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
3A:25:AC:AD:B2:7C:90:84:6B:99:2B:CC:4F:E2:03:C0:3F:92:06:15
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:2c:89:36:28:0d:b8:f9:6e:13:7a:6e:6d:4f:f8:
a5:31:a1:4f:ef:95:f5:a7:41:f0:33:d0:b8:29:7b:87:69:0e:
bf:bb:7d:54:89:70:be:29:ce:c3:aa:03:4f:a8:e2:e8:02:30:
5e:cb:a3:17:6a:b3:18:fd:50:ef:9f:14:c8:8c:65:4a:05:69:
66:5c:2a:cb:ce:8a:b0:cf:d3:c2:2f:94:ec:99:1f:5b:b1:ed:
fe:41:69:9e:ad:3a:64:7b:f8:7a:22:22
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 845 bytes from beginning
376,453 UART: [art] Lock RT PCRs Done
3,377,695 UART: [art] Populate DV Done
3,386,077 UART: [fht] FMC Alias Private Key: 7
3,387,133 UART: [art] Derive CDI
3,387,413 UART: [art] Store in in slot 0x4
3,473,276 UART: [art] Derive Key Pair
3,473,636 UART: [art] Store priv key in slot 0x5
3,486,286 UART: [art] Derive Key Pair - Done
3,501,252 UART: [art] Signing Cert with AUTHO
3,501,732 UART: RITY.KEYID = 7
3,516,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,405 UART: [art] PUB.X = FEE74A1687AC6ADA62E43117A742A60F69B74C354E0604FA01D2423044B12C0BD516EB1EA4150F521635747C94CE7886
3,524,157 UART: [art] PUB.Y = ADE0E7D69B7246048624EAD516CF28EB02640F8AD8010C977E1106445A64A65D0ED144C78E83E4E9E0B49B1658D8A409
3,531,085 UART: [art] SIG.R = 7231DAD115781016457A6EB1C190C212BA964EF06B4CD0D84056DFDD00E111B2EF4970E8EA9A151F2F9E7BA9AD783DB8
3,537,845 UART: [art] SIG.S = 2F223F2416CA0417C80EDF43B03A27F313E6D39293122A4CBE25B56AEEDD8145445F4121DA0A1439131DD143C2CEED28
3,561,697 UART: Caliptra RT
3,562,042 UART: [state] CFI Enabled
3,669,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,163 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,005 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,519 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:eb:72:ef:b8:b7:c3:94:c3:4a:17:63:7c:01:8a:ed:51:69:5c:36
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=49EB72EFB8B7C394C34A17637C018AED51695C36C77FB1ED6480018F33B0136E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fe:e7:4a:16:87:ac:6a:da:62:e4:31:17:a7:42:
a6:0f:69:b7:4c:35:4e:06:04:fa:01:d2:42:30:44:
b1:2c:0b:d5:16:eb:1e:a4:15:0f:52:16:35:74:7c:
94:ce:78:86:ad:e0:e7:d6:9b:72:46:04:86:24:ea:
d5:16:cf:28:eb:02:64:0f:8a:d8:01:0c:97:7e:11:
06:44:5a:64:a6:5d:0e:d1:44:c7:8e:83:e4:e9:e0:
b4:9b:16:58:d8:a4:09
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
49:EB:72:EF:B8:B7:C3:94:C3:4A:17:63:7C:01:8A:ED:51:69:5C:36
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:72:31:da:d1:15:78:10:16:45:7a:6e:b1:c1:90:
c2:12:ba:96:4e:f0:6b:4c:d0:d8:40:56:df:dd:00:e1:11:b2:
ef:49:70:e8:ea:9a:15:1f:2f:9e:7b:a9:ad:78:3d:b8:02:30:
2f:22:3f:24:16:ca:04:17:c8:0e:df:43:b0:3a:27:f3:13:e6:
d3:92:93:12:2a:4c:be:25:b5:6a:ee:dd:81:45:44:5f:41:21:
da:0a:14:39:13:1d:d1:43:c2:ce:ed:28
3,792,436 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,765,402 >>> mbox cmd response: success
6,778,731 UART:
6,778,747 UART: Running Caliptra FMC ...
6,779,155 UART:
6,779,298 UART: [state] CFI Enabled
6,868,693 UART: [art] Extend RT PCRs Done
6,869,121 UART: [art] Lock RT PCRs Done
6,870,400 UART: [art] Populate DV Done
6,878,440 UART: [fht] FMC Alias Private Key: 7
6,879,520 UART: [art] Derive CDI
6,879,800 UART: [art] Store in in slot 0x4
6,965,623 UART: [art] Derive Key Pair
6,965,983 UART: [art] Store priv key in slot 0x5
6,979,155 UART: [art] Derive Key Pair - Done
6,993,800 UART: [art] Signing Cert with AUTHO
6,994,280 UART: RITY.KEYID = 7
7,009,464 UART: [art] Erasing AUTHORITY.KEYID = 7
7,010,229 UART: [art] PUB.X = B787CE77303D2249C703839D114D0D04A8407774204C158404CF0D0DA297F6D14BDB585B40F7F2221D23ACF71B47A3DF
7,016,981 UART: [art] PUB.Y = 6A80D842F27445AE713969A29FB92214695F2129854C28BC8EA09F91942AE5F6E3F6189913BA96DDCA3D6D1A0BCB22BE
7,023,934 UART: [art] SIG.R = 52AB39F604E519BB536A6B3EF5D4372559D5C46BCC42E4896914BF1880CDDE51E8E37730D4AF24F318CE97A0FBF89701
7,030,706 UART: [art] SIG.S = A136F10A9D75A8F316D89B14D885E7338FD6CDAFA2E497A798D19F5F3CA28A86CC3266DB2D8543E14B9C49346A821455
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:52:10:4d:62:82:89:c7:3c:14:f0:60:f6:0b:ba:04:52:9b:c2:fa
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2852104D628289C73C14F060F60BBA04529BC2FAB2F77DB363EA2D123E6C26BD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b7:87:ce:77:30:3d:22:49:c7:03:83:9d:11:4d:
0d:04:a8:40:77:74:20:4c:15:84:04:cf:0d:0d:a2:
97:f6:d1:4b:db:58:5b:40:f7:f2:22:1d:23:ac:f7:
1b:47:a3:df:6a:80:d8:42:f2:74:45:ae:71:39:69:
a2:9f:b9:22:14:69:5f:21:29:85:4c:28:bc:8e:a0:
9f:91:94:2a:e5:f6:e3:f6:18:99:13:ba:96:dd:ca:
3d:6d:1a:0b:cb:22:be
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
28:52:10:4D:62:82:89:C7:3C:14:F0:60:F6:0B:BA:04:52:9B:C2:FA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:52:ab:39:f6:04:e5:19:bb:53:6a:6b:3e:f5:d4:
37:25:59:d5:c4:6b:cc:42:e4:89:69:14:bf:18:80:cd:de:51:
e8:e3:77:30:d4:af:24:f3:18:ce:97:a0:fb:f8:97:01:02:31:
00:a1:36:f1:0a:9d:75:a8:f3:16:d8:9b:14:d8:85:e7:33:8f:
d6:cd:af:a2:e4:97:a7:98:d1:9f:5f:3c:a2:8a:86:cc:32:66:
db:2d:85:43:e1:4b:9c:49:34:6a:82:14:55
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,346 UART:
192,719 UART: Running Caliptra ROM ...
193,847 UART:
193,996 UART: [state] CFI Enabled
264,412 UART: [state] LifecycleState = Unprovisioned
266,394 UART: [state] DebugLocked = No
268,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
421,706 UART: [kat] SHA2-256
442,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,227 UART: [kat] ++
453,724 UART: [kat] sha1
463,844 UART: [kat] SHA2-256
466,528 UART: [kat] SHA2-384
471,657 UART: [kat] SHA2-512-ACC
474,002 UART: [kat] ECC-384
2,769,078 UART: [kat] HMAC-384Kdf
2,800,653 UART: [kat] LMS
3,990,979 UART: [kat] --
3,994,174 UART: [cold-reset] ++
3,996,105 UART: [fht] Storing FHT @ 0x50003400
4,006,717 UART: [idev] ++
4,007,284 UART: [idev] CDI.KEYID = 6
4,008,230 UART: [idev] SUBJECT.KEYID = 7
4,009,500 UART: [idev] UDS.KEYID = 0
4,035,967 UART: [idev] Erasing UDS.KEYID = 0
7,345,741 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,001 UART: [idev] --
7,373,326 UART: [ldev] ++
7,373,894 UART: [ldev] CDI.KEYID = 6
7,374,928 UART: [ldev] SUBJECT.KEYID = 5
7,376,029 UART: [ldev] AUTHORITY.KEYID = 7
7,377,315 UART: [ldev] FE.KEYID = 1
7,424,598 UART: [ldev] Erasing FE.KEYID = 1
10,754,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,632 UART: [ldev] --
13,116,598 UART: [fwproc] Waiting for Commands...
13,119,941 UART: [fwproc] Received command 0x46574c44
13,122,122 UART: [fwproc] Received Image of size 114124 bytes
17,168,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,947 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,630,359 >>> mbox cmd response: success
17,635,113 UART: [afmc] ++
17,635,703 UART: [afmc] CDI.KEYID = 6
17,636,666 UART: [afmc] SUBJECT.KEYID = 7
17,637,882 UART: [afmc] AUTHORITY.KEYID = 5
21,004,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,338 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,726 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,586 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,017 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,824 UART: [afmc] --
23,381,689 UART: [cold-reset] --
23,384,576 UART: [state] Locking Datavault
23,388,360 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,105 UART: [state] Locking ICCM
23,392,107 UART: [exit] Launching FMC @ 0x40000130
23,400,497 UART:
23,400,730 UART: Running Caliptra FMC ...
23,401,823 UART:
23,401,981 UART: [state] CFI Enabled
23,466,670 UART: [fht] FMC Alias Private Key: 7
25,804,812 UART: [art] Extend RT PCRs Done
25,806,170 UART: [art] Lock RT PCRs Done
25,807,642 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
191,589 UART:
191,957 UART: Running Caliptra ROM ...
193,077 UART:
193,227 UART: [state] CFI Enabled
261,390 UART: [state] LifecycleState = Unprovisioned
263,318 UART: [state] DebugLocked = Yes
265,167 UART: [state] Starting the Watchdog Timer 25535775 cycles
270,466 UART: [kat] SHA2-256
440,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,682 UART: [kat] ++
451,163 UART: [kat] sha1
461,270 UART: [kat] SHA2-256
463,936 UART: [kat] SHA2-384
469,074 UART: [kat] SHA2-512-ACC
471,440 UART: [kat] ECC-384
2,766,014 UART: [kat] HMAC-384Kdf
2,797,590 UART: [kat] LMS
3,987,865 UART: [kat] --
3,991,103 UART: [cold-reset] ++
3,993,035 UART: [fht] Storing FHT @ 0x50003400
4,003,595 UART: [idev] ++
4,004,241 UART: [idev] CDI.KEYID = 6
4,005,152 UART: [idev] SUBJECT.KEYID = 7
4,006,400 UART: [idev] UDS.KEYID = 0
4,007,327 ready_for_fw is high
4,007,521 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,080 UART: [idev] Erasing UDS.KEYID = 0
7,341,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,141 UART: [idev] --
7,369,405 UART: [ldev] ++
7,369,970 UART: [ldev] CDI.KEYID = 6
7,370,929 UART: [ldev] SUBJECT.KEYID = 5
7,372,192 UART: [ldev] AUTHORITY.KEYID = 7
7,373,418 UART: [ldev] FE.KEYID = 1
7,419,912 UART: [ldev] Erasing FE.KEYID = 1
10,751,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,828 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,059,366 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,074,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,088,406 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,107,930 UART: [ldev] --
13,111,902 UART: [fwproc] Waiting for Commands...
13,115,233 UART: [fwproc] Received command 0x46574c44
13,117,430 UART: [fwproc] Received Image of size 114124 bytes
17,163,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,703 >>> mbox cmd response: success
17,630,457 UART: [afmc] ++
17,631,051 UART: [afmc] CDI.KEYID = 6
17,631,998 UART: [afmc] SUBJECT.KEYID = 7
17,633,213 UART: [afmc] AUTHORITY.KEYID = 5
21,000,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,299,796 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,314,313 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,329,071 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,343,383 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,366,309 UART: [afmc] --
23,370,184 UART: [cold-reset] --
23,373,073 UART: [state] Locking Datavault
23,376,861 UART: [state] Locking PCR0, PCR1 and PCR31
23,378,610 UART: [state] Locking ICCM
23,380,594 UART: [exit] Launching FMC @ 0x40000130
23,388,985 UART:
23,389,233 UART: Running Caliptra FMC ...
23,390,282 UART:
23,390,427 UART: [state] CFI Enabled
23,454,949 UART: [fht] FMC Alias Private Key: 7
25,793,064 UART: [art] Extend RT PCRs Done
25,794,286 UART: [art] Lock RT PCRs Done
25,795,882 UART: [art] Populate DV Done
25,801,294 UART: [fht] FMC Alias Private Key: 7
25,802,882 UART: [art] Derive CDI
25,803,693 UART: [art] Store in in slot 0x4
25,805,043 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400040CEerror_internal_intr_r=00000040
25,808,521 UART: WDT Expired
25,809,073 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
270,595 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,849,745 >>> mbox cmd response: success
23,551,517 UART:
23,551,933 UART: Running Caliptra FMC ...
23,553,067 UART:
23,553,237 UART: [state] CFI Enabled
23,620,529 UART: [fht] FMC Alias Private Key: 7
25,958,637 UART: [art] Extend RT PCRs Done
25,959,872 UART: [art] Lock RT PCRs Done
25,961,503 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,801,973 ready_for_fw is high
3,802,377 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,859,969 >>> mbox cmd response: success
23,565,335 UART:
23,565,737 UART: Running Caliptra FMC ...
23,566,882 UART:
23,567,038 UART: [state] CFI Enabled
23,634,177 UART: [fht] FMC Alias Private Key: 7
25,960,180 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002974error_internal_intr_r=00000040
25,963,803 UART: WDT Expired
25,964,374 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,465 UART:
192,827 UART: Running Caliptra ROM ...
194,002 UART:
603,588 UART: [state] CFI Enabled
620,946 UART: [state] LifecycleState = Unprovisioned
622,889 UART: [state] DebugLocked = No
625,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,047 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
778,577 UART: [kat] SHA2-256
800,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,050 UART: [kat] ++
811,581 UART: [kat] sha1
822,194 UART: [kat] SHA2-256
824,875 UART: [kat] SHA2-384
830,428 UART: [kat] SHA2-512-ACC
832,839 UART: [kat] ECC-384
3,118,193 UART: [kat] HMAC-384Kdf
3,130,225 UART: [kat] LMS
4,320,339 UART: [kat] --
4,324,346 UART: [cold-reset] ++
4,325,960 UART: [fht] Storing FHT @ 0x50003400
4,336,795 UART: [idev] ++
4,337,414 UART: [idev] CDI.KEYID = 6
4,338,327 UART: [idev] SUBJECT.KEYID = 7
4,339,599 UART: [idev] UDS.KEYID = 0
4,355,331 UART: [idev] Erasing UDS.KEYID = 0
7,628,265 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,106 UART: [idev] --
7,654,316 UART: [ldev] ++
7,654,879 UART: [ldev] CDI.KEYID = 6
7,655,847 UART: [ldev] SUBJECT.KEYID = 5
7,657,080 UART: [ldev] AUTHORITY.KEYID = 7
7,658,317 UART: [ldev] FE.KEYID = 1
7,670,182 UART: [ldev] Erasing FE.KEYID = 1
10,956,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,329 UART: [ldev] --
13,316,440 UART: [fwproc] Waiting for Commands...
13,318,909 UART: [fwproc] Received command 0x46574c44
13,321,089 UART: [fwproc] Received Image of size 114124 bytes
17,362,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,392 >>> mbox cmd response: success
17,828,292 UART: [afmc] ++
17,828,884 UART: [afmc] CDI.KEYID = 6
17,829,798 UART: [afmc] SUBJECT.KEYID = 7
17,831,063 UART: [afmc] AUTHORITY.KEYID = 5
21,148,225 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,187 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,557 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,391 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,790 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,739 UART: [afmc] --
23,514,118 UART: [cold-reset] --
23,518,685 UART: [state] Locking Datavault
23,523,930 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,683 UART: [state] Locking ICCM
23,527,991 UART: [exit] Launching FMC @ 0x40000130
23,536,404 UART:
23,536,645 UART: Running Caliptra FMC ...
23,537,747 UART:
23,537,902 UART: [state] CFI Enabled
23,546,114 UART: [fht] FMC Alias Private Key: 7
25,876,947 UART: [art] Extend RT PCRs Done
25,878,177 UART: [art] Lock RT PCRs Done
25,879,699 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
191,880 UART:
192,240 UART: Running Caliptra ROM ...
193,415 UART:
603,268 UART: [state] CFI Enabled
620,619 UART: [state] LifecycleState = Unprovisioned
622,552 UART: [state] DebugLocked = Yes
625,527 UART: [state] Starting the Watchdog Timer 25250085 cycles
630,910 UART: [kat] SHA2-256
800,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,173 UART: [kat] ++
811,689 UART: [kat] sha1
822,371 UART: [kat] SHA2-256
825,083 UART: [kat] SHA2-384
830,586 UART: [kat] SHA2-512-ACC
833,021 UART: [kat] ECC-384
3,118,380 UART: [kat] HMAC-384Kdf
3,130,415 UART: [kat] LMS
4,320,551 UART: [kat] --
4,324,500 UART: [cold-reset] ++
4,326,147 UART: [fht] Storing FHT @ 0x50003400
4,336,978 UART: [idev] ++
4,337,607 UART: [idev] CDI.KEYID = 6
4,338,510 UART: [idev] SUBJECT.KEYID = 7
4,339,758 UART: [idev] UDS.KEYID = 0
4,340,858 ready_for_fw is high
4,341,074 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,360 UART: [idev] Erasing UDS.KEYID = 0
7,628,499 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,333 UART: [idev] --
7,654,544 UART: [ldev] ++
7,655,114 UART: [ldev] CDI.KEYID = 6
7,656,071 UART: [ldev] SUBJECT.KEYID = 5
7,657,281 UART: [ldev] AUTHORITY.KEYID = 7
7,658,506 UART: [ldev] FE.KEYID = 1
7,670,387 UART: [ldev] Erasing FE.KEYID = 1
10,956,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,351 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,264,020 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,556 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,904 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,290 UART: [ldev] --
13,316,397 UART: [fwproc] Waiting for Commands...
13,318,868 UART: [fwproc] Received command 0x46574c44
13,321,100 UART: [fwproc] Received Image of size 114124 bytes
17,362,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,405 >>> mbox cmd response: success
17,828,250 UART: [afmc] ++
17,828,850 UART: [afmc] CDI.KEYID = 6
17,829,870 UART: [afmc] SUBJECT.KEYID = 7
17,831,024 UART: [afmc] AUTHORITY.KEYID = 5
21,148,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,273 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,459,845 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,474,607 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,488,959 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,510,913 UART: [afmc] --
23,514,292 UART: [cold-reset] --
23,518,870 UART: [state] Locking Datavault
23,524,115 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,865 UART: [state] Locking ICCM
23,528,173 UART: [exit] Launching FMC @ 0x40000130
23,536,572 UART:
23,536,804 UART: Running Caliptra FMC ...
23,537,903 UART:
23,538,061 UART: [state] CFI Enabled
23,546,291 UART: [fht] FMC Alias Private Key: 7
25,877,197 UART: [art] Extend RT PCRs Done
25,878,421 UART: [art] Lock RT PCRs Done
25,879,748 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026A4error_internal_intr_r=00000040
25,883,232 UART: WDT Expired
25,883,785 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
625,794 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,060,774 >>> mbox cmd response: success
23,705,905 UART:
23,706,325 UART: Running Caliptra FMC ...
23,707,441 UART:
23,707,618 UART: [state] CFI Enabled
23,715,621 UART: [fht] FMC Alias Private Key: 7
26,046,448 UART: [art] Extend RT PCRs Done
26,047,674 UART: [art] Lock RT PCRs Done
26,049,197 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,131,741 ready_for_fw is high
4,132,112 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,232 >>> mbox cmd response: success
23,706,375 UART:
23,706,747 UART: Running Caliptra FMC ...
23,707,961 UART:
23,708,129 UART: [state] CFI Enabled
23,716,134 UART: [fht] FMC Alias Private Key: 7
26,046,968 UART: [art] Extend RT PCRs Done
26,048,231 UART: [art] Lock RT PCRs Done
26,049,838 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028ECerror_internal_intr_r=00000040
26,053,592 UART: WDT Expired
26,054,161 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,466 UART:
192,829 UART: Running Caliptra ROM ...
193,996 UART:
194,149 UART: [state] CFI Enabled
263,916 UART: [state] LifecycleState = Unprovisioned
265,776 UART: [state] DebugLocked = No
267,426 UART: [state] WD Timer not started. Device not locked for debugging
275,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
419,655 UART: [kat] SHA2-256
450,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,891 UART: [kat] ++
462,432 UART: [kat] sha1
472,556 UART: [kat] SHA2-256
475,616 UART: [kat] SHA2-384
480,992 UART: [kat] SHA2-512-ACC
483,970 UART: [kat] ECC-384
2,948,952 UART: [kat] HMAC-384Kdf
2,964,224 UART: [kat] LMS
3,493,690 UART: [kat] --
3,497,956 UART: [cold-reset] ++
3,499,776 UART: [fht] FHT @ 0x50003400
3,511,396 UART: [idev] ++
3,511,952 UART: [idev] CDI.KEYID = 6
3,512,892 UART: [idev] SUBJECT.KEYID = 7
3,514,121 UART: [idev] UDS.KEYID = 0
3,536,015 UART: [idev] Erasing UDS.KEYID = 0
6,018,401 UART: [idev] Sha1 KeyId Algorithm
6,040,489 UART: [idev] --
6,045,737 UART: [ldev] ++
6,046,350 UART: [ldev] CDI.KEYID = 6
6,047,281 UART: [ldev] SUBJECT.KEYID = 5
6,048,387 UART: [ldev] AUTHORITY.KEYID = 7
6,049,618 UART: [ldev] FE.KEYID = 1
6,093,634 UART: [ldev] Erasing FE.KEYID = 1
8,593,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,632 UART: [ldev] --
10,385,963 UART: [fwproc] Wait for Commands...
10,388,225 UART: [fwproc] Recv command 0x46574c44
10,390,322 UART: [fwproc] Recv'd Img size: 114448 bytes
13,787,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,861,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,247,879 >>> mbox cmd response: success
14,252,316 UART: [afmc] ++
14,252,902 UART: [afmc] CDI.KEYID = 6
14,253,808 UART: [afmc] SUBJECT.KEYID = 7
14,254,965 UART: [afmc] AUTHORITY.KEYID = 5
16,781,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,502,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,504,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,520,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,536,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,552,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,574,323 UART: [afmc] --
18,578,564 UART: [cold-reset] --
18,582,904 UART: [state] Locking Datavault
18,588,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,589,907 UART: [state] Locking ICCM
18,590,924 UART: [exit] Launching FMC @ 0x40000130
18,599,318 UART:
18,599,551 UART: Running Caliptra FMC ...
18,600,649 UART:
18,600,807 UART: [state] CFI Enabled
18,662,199 UART: [fht] FMC Alias Private Key: 7
20,425,752 UART: [art] Extend RT PCRs Done
20,426,981 UART: [art] Lock RT PCRs Done
20,428,826 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
191,547 UART:
191,903 UART: Running Caliptra ROM ...
192,979 UART:
193,117 UART: [state] CFI Enabled
261,948 UART: [state] LifecycleState = Unprovisioned
263,871 UART: [state] DebugLocked = Yes
265,571 UART: [state] Starting the WD Timer 20158788 cycles
270,517 UART: [kat] SHA2-256
449,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,249 UART: [kat] ++
461,729 UART: [kat] sha1
471,885 UART: [kat] SHA2-256
474,956 UART: [kat] SHA2-384
480,317 UART: [kat] SHA2-512-ACC
483,255 UART: [kat] ECC-384
2,946,762 UART: [kat] HMAC-384Kdf
2,970,653 UART: [kat] LMS
3,500,138 UART: [kat] --
3,504,421 UART: [cold-reset] ++
3,506,278 UART: [fht] FHT @ 0x50003400
3,517,891 UART: [idev] ++
3,518,451 UART: [idev] CDI.KEYID = 6
3,519,356 UART: [idev] SUBJECT.KEYID = 7
3,520,593 UART: [idev] UDS.KEYID = 0
3,521,513 ready_for_fw is high
3,521,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,654 UART: [idev] Erasing UDS.KEYID = 0
6,025,519 UART: [idev] Sha1 KeyId Algorithm
6,047,617 UART: [idev] --
6,052,874 UART: [ldev] ++
6,053,446 UART: [ldev] CDI.KEYID = 6
6,054,330 UART: [ldev] SUBJECT.KEYID = 5
6,055,541 UART: [ldev] AUTHORITY.KEYID = 7
6,056,778 UART: [ldev] FE.KEYID = 1
6,100,730 UART: [ldev] Erasing FE.KEYID = 1
8,601,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,339 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,327 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,138 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,108 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,390 UART: [ldev] --
10,414,697 UART: [fwproc] Wait for Commands...
10,416,989 UART: [fwproc] Recv command 0x46574c44
10,419,036 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,612 >>> mbox cmd response: success
14,281,048 UART: [afmc] ++
14,281,639 UART: [afmc] CDI.KEYID = 6
14,282,521 UART: [afmc] SUBJECT.KEYID = 7
14,283,731 UART: [afmc] AUTHORITY.KEYID = 5
16,811,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,475 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,549,621 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,565,531 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,581,323 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,603,611 UART: [afmc] --
18,607,827 UART: [cold-reset] --
18,612,167 UART: [state] Locking Datavault
18,617,536 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,186 UART: [state] Locking ICCM
18,620,199 UART: [exit] Launching FMC @ 0x40000130
18,628,592 UART:
18,628,824 UART: Running Caliptra FMC ...
18,629,920 UART:
18,630,074 UART: [state] CFI Enabled
18,691,743 UART: [fht] FMC Alias Private Key: 7
20,428,174 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002976error_internal_intr_r=00000040
20,431,713 UART: WDT Expired
20,432,276 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
269,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,022,066 >>> mbox cmd response: success
18,300,065 UART:
18,300,630 UART: Running Caliptra FMC ...
18,301,743 UART:
18,301,896 UART: [state] CFI Enabled
18,369,918 UART: [fht] FMC Alias Private Key: 7
20,133,454 UART: [art] Extend RT PCRs Done
20,134,688 UART: [art] Lock RT PCRs Done
20,136,537 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,360,283 ready_for_fw is high
3,360,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,660 >>> mbox cmd response: success
18,333,645 UART:
18,334,054 UART: Running Caliptra FMC ...
18,335,218 UART:
18,335,372 UART: [state] CFI Enabled
18,402,917 UART: [fht] FMC Alias Private Key: 7
20,136,030 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000314Aerror_internal_intr_r=00000040
20,139,646 UART: WDT Expired
20,140,213 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,955 writing to cptra_bootfsm_go
193,118 UART:
193,523 UART: Running Caliptra ROM ...
194,687 UART:
604,311 UART: [state] CFI Enabled
621,100 UART: [state] LifecycleState = Unprovisioned
622,994 UART: [state] DebugLocked = No
625,849 UART: [state] WD Timer not started. Device not locked for debugging
633,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
777,886 UART: [kat] SHA2-256
808,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,333 UART: [kat] ++
820,783 UART: [kat] sha1
831,599 UART: [kat] SHA2-256
834,601 UART: [kat] SHA2-384
840,416 UART: [kat] SHA2-512-ACC
843,396 UART: [kat] ECC-384
3,285,856 UART: [kat] HMAC-384Kdf
3,298,518 UART: [kat] LMS
3,828,015 UART: [kat] --
3,832,115 UART: [cold-reset] ++
3,833,611 UART: [fht] FHT @ 0x50003400
3,845,920 UART: [idev] ++
3,846,549 UART: [idev] CDI.KEYID = 6
3,847,434 UART: [idev] SUBJECT.KEYID = 7
3,848,542 UART: [idev] UDS.KEYID = 0
3,862,515 UART: [idev] Erasing UDS.KEYID = 0
6,321,694 UART: [idev] Sha1 KeyId Algorithm
6,345,062 UART: [idev] --
6,349,470 UART: [ldev] ++
6,350,047 UART: [ldev] CDI.KEYID = 6
6,350,930 UART: [ldev] SUBJECT.KEYID = 5
6,352,138 UART: [ldev] AUTHORITY.KEYID = 7
6,353,388 UART: [ldev] FE.KEYID = 1
6,364,030 UART: [ldev] Erasing FE.KEYID = 1
8,835,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,897 UART: [ldev] --
10,626,046 UART: [fwproc] Wait for Commands...
10,627,611 UART: [fwproc] Recv command 0x46574c44
10,629,704 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,256 >>> mbox cmd response: success
14,486,679 UART: [afmc] ++
14,487,318 UART: [afmc] CDI.KEYID = 6
14,488,237 UART: [afmc] SUBJECT.KEYID = 7
14,489,337 UART: [afmc] AUTHORITY.KEYID = 5
16,992,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,927 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,939 UART: [afmc] --
18,788,782 UART: [cold-reset] --
18,793,986 UART: [state] Locking Datavault
18,800,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,056 UART: [state] Locking ICCM
18,803,448 UART: [exit] Launching FMC @ 0x40000130
18,811,894 UART:
18,812,161 UART: Running Caliptra FMC ...
18,813,264 UART:
18,813,425 UART: [state] CFI Enabled
18,821,472 UART: [fht] FMC Alias Private Key: 7
20,577,774 UART: [art] Extend RT PCRs Done
20,578,997 UART: [art] Lock RT PCRs Done
20,580,619 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
191,948 UART:
192,305 UART: Running Caliptra ROM ...
193,463 UART:
603,109 UART: [state] CFI Enabled
619,893 UART: [state] LifecycleState = Unprovisioned
621,777 UART: [state] DebugLocked = Yes
624,737 UART: [state] Starting the WD Timer 19952082 cycles
629,647 UART: [kat] SHA2-256
808,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,367 UART: [kat] ++
820,943 UART: [kat] sha1
831,606 UART: [kat] SHA2-256
834,615 UART: [kat] SHA2-384
840,459 UART: [kat] SHA2-512-ACC
843,458 UART: [kat] ECC-384
3,285,898 UART: [kat] HMAC-384Kdf
3,298,580 UART: [kat] LMS
3,828,094 UART: [kat] --
3,832,175 UART: [cold-reset] ++
3,833,687 UART: [fht] FHT @ 0x50003400
3,846,015 UART: [idev] ++
3,846,586 UART: [idev] CDI.KEYID = 6
3,847,521 UART: [idev] SUBJECT.KEYID = 7
3,848,697 UART: [idev] UDS.KEYID = 0
3,849,639 ready_for_fw is high
3,849,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,175 UART: [idev] Erasing UDS.KEYID = 0
6,321,804 UART: [idev] Sha1 KeyId Algorithm
6,345,190 UART: [idev] --
6,349,570 UART: [ldev] ++
6,350,142 UART: [ldev] CDI.KEYID = 6
6,351,050 UART: [ldev] SUBJECT.KEYID = 5
6,352,270 UART: [ldev] AUTHORITY.KEYID = 7
6,353,495 UART: [ldev] FE.KEYID = 1
6,364,169 UART: [ldev] Erasing FE.KEYID = 1
8,835,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,411 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,407 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,246 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,183 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,192 UART: [ldev] --
10,626,305 UART: [fwproc] Wait for Commands...
10,627,903 UART: [fwproc] Recv command 0x46574c44
10,630,000 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,548 >>> mbox cmd response: success
14,486,981 UART: [afmc] ++
14,487,582 UART: [afmc] CDI.KEYID = 6
14,488,496 UART: [afmc] SUBJECT.KEYID = 7
14,489,658 UART: [afmc] AUTHORITY.KEYID = 5
16,992,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,408 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,731,582 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,747,465 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,763,191 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,786,323 UART: [afmc] --
18,789,194 UART: [cold-reset] --
18,794,417 UART: [state] Locking Datavault
18,800,849 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,497 UART: [state] Locking ICCM
18,803,890 UART: [exit] Launching FMC @ 0x40000130
18,812,286 UART:
18,812,580 UART: Running Caliptra FMC ...
18,813,609 UART:
18,813,762 UART: [state] CFI Enabled
18,821,920 UART: [fht] FMC Alias Private Key: 7
20,578,263 UART: [art] Extend RT PCRs Done
20,579,501 UART: [art] Lock RT PCRs Done
20,580,582 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026DCerror_internal_intr_r=00000040
20,584,072 UART: WDT Expired
20,584,629 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,658 writing to cptra_bootfsm_go
626,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,203 >>> mbox cmd response: success
18,519,189 UART:
18,519,634 UART: Running Caliptra FMC ...
18,520,736 UART:
18,520,898 UART: [state] CFI Enabled
18,528,730 UART: [fht] FMC Alias Private Key: 7
20,285,072 UART: [art] Extend RT PCRs Done
20,286,301 UART: [art] Lock RT PCRs Done
20,287,884 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,701,371 ready_for_fw is high
3,701,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,979 >>> mbox cmd response: success
18,519,021 UART:
18,519,420 UART: Running Caliptra FMC ...
18,520,627 UART:
18,520,789 UART: [state] CFI Enabled
18,528,588 UART: [fht] FMC Alias Private Key: 7
20,284,931 UART: [art] Extend RT PCRs Done
20,286,166 UART: [art] Lock RT PCRs Done
20,287,420 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026C6error_internal_intr_r=00000040
20,290,963 UART: WDT Expired
20,291,726 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,262 writing to cptra_bootfsm_go
193,324 UART:
193,698 UART: Running Caliptra ROM ...
194,866 UART:
195,032 UART: [state] CFI Enabled
264,288 UART: [state] LifecycleState = Unprovisioned
266,700 UART: [state] DebugLocked = No
268,348 UART: [state] WD Timer not started. Device not locked for debugging
277,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
421,333 UART: [kat] SHA2-256
462,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,627 UART: [kat] ++
474,145 UART: [kat] sha1
484,695 UART: [kat] SHA2-256
487,693 UART: [kat] SHA2-384
492,924 UART: [kat] SHA2-512-ACC
495,532 UART: [kat] ECC-384
2,949,488 UART: [kat] HMAC-384Kdf
2,974,001 UART: [kat] LMS
3,505,722 UART: [kat] --
3,510,091 UART: [cold-reset] ++
3,511,968 UART: [fht] FHT @ 0x50003400
3,524,130 UART: [idev] ++
3,524,848 UART: [idev] CDI.KEYID = 6
3,525,739 UART: [idev] SUBJECT.KEYID = 7
3,526,901 UART: [idev] UDS.KEYID = 0
3,546,001 UART: [idev] Erasing UDS.KEYID = 0
6,029,604 UART: [idev] Sha1 KeyId Algorithm
6,051,144 UART: [idev] --
6,057,291 UART: [ldev] ++
6,057,979 UART: [ldev] CDI.KEYID = 6
6,058,866 UART: [ldev] SUBJECT.KEYID = 5
6,060,083 UART: [ldev] AUTHORITY.KEYID = 7
6,061,260 UART: [ldev] FE.KEYID = 1
6,101,618 UART: [ldev] Erasing FE.KEYID = 1
8,604,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,789 UART: [ldev] --
10,414,903 UART: [fwproc] Wait for Commands...
10,417,171 UART: [fwproc] Recv command 0x46574c44
10,419,484 UART: [fwproc] Recv'd Img size: 114448 bytes
13,861,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,598,402 >>> mbox cmd response: success
14,602,677 UART: [afmc] ++
14,603,377 UART: [afmc] CDI.KEYID = 6
14,604,584 UART: [afmc] SUBJECT.KEYID = 7
14,606,021 UART: [afmc] AUTHORITY.KEYID = 5
17,152,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,460 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,762 UART: [afmc] --
18,966,770 UART: [cold-reset] --
18,971,398 UART: [state] Locking Datavault
18,977,094 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,237 UART: [state] Locking ICCM
18,980,527 UART: [exit] Launching FMC @ 0x40000130
18,988,866 UART:
18,989,097 UART: Running Caliptra FMC ...
18,990,214 UART:
18,990,374 UART: [state] CFI Enabled
19,050,562 UART: [fht] FMC Alias Private Key: 7
20,814,102 UART: [art] Extend RT PCRs Done
20,815,312 UART: [art] Lock RT PCRs Done
20,817,169 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
191,595 UART:
191,986 UART: Running Caliptra ROM ...
193,162 UART:
193,309 UART: [state] CFI Enabled
261,345 UART: [state] LifecycleState = Unprovisioned
263,685 UART: [state] DebugLocked = Yes
265,468 UART: [state] Starting the WD Timer 20545308 cycles
270,833 UART: [kat] SHA2-256
460,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,435 UART: [kat] ++
472,068 UART: [kat] sha1
482,595 UART: [kat] SHA2-256
485,600 UART: [kat] SHA2-384
490,872 UART: [kat] SHA2-512-ACC
493,391 UART: [kat] ECC-384
2,946,127 UART: [kat] HMAC-384Kdf
2,969,443 UART: [kat] LMS
3,501,248 UART: [kat] --
3,505,599 UART: [cold-reset] ++
3,507,455 UART: [fht] FHT @ 0x50003400
3,519,634 UART: [idev] ++
3,520,267 UART: [idev] CDI.KEYID = 6
3,521,219 UART: [idev] SUBJECT.KEYID = 7
3,522,457 UART: [idev] UDS.KEYID = 0
3,523,359 ready_for_fw is high
3,523,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,507 UART: [idev] Erasing UDS.KEYID = 0
6,048,000 UART: [idev] Sha1 KeyId Algorithm
6,069,623 UART: [idev] --
6,075,887 UART: [ldev] ++
6,076,585 UART: [ldev] CDI.KEYID = 6
6,077,513 UART: [ldev] SUBJECT.KEYID = 5
6,078,669 UART: [ldev] AUTHORITY.KEYID = 7
6,079,901 UART: [ldev] FE.KEYID = 1
6,120,418 UART: [ldev] Erasing FE.KEYID = 1
8,623,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,583 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,377,807 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,392,860 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,407,866 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,428,842 UART: [ldev] --
10,433,953 UART: [fwproc] Wait for Commands...
10,436,203 UART: [fwproc] Recv command 0x46574c44
10,438,190 UART: [fwproc] Recv'd Img size: 114448 bytes
13,880,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,617,177 >>> mbox cmd response: success
14,621,412 UART: [afmc] ++
14,622,113 UART: [afmc] CDI.KEYID = 6
14,623,300 UART: [afmc] SUBJECT.KEYID = 7
14,624,786 UART: [afmc] AUTHORITY.KEYID = 5
17,171,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,911,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,913,520 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,928,578 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,943,686 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,958,680 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,981,876 UART: [afmc] --
18,985,866 UART: [cold-reset] --
18,990,279 UART: [state] Locking Datavault
18,995,961 UART: [state] Locking PCR0, PCR1 and PCR31
18,998,161 UART: [state] Locking ICCM
18,999,394 UART: [exit] Launching FMC @ 0x40000130
19,007,730 UART:
19,007,969 UART: Running Caliptra FMC ...
19,009,070 UART:
19,009,228 UART: [state] CFI Enabled
19,070,188 UART: [fht] FMC Alias Private Key: 7
20,814,992 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029BCerror_internal_intr_r=00000040
20,818,688 UART: WDT Expired
20,819,263 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
269,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,708,796 >>> mbox cmd response: success
19,020,581 UART:
19,021,051 UART: Running Caliptra FMC ...
19,022,161 UART:
19,022,327 UART: [state] CFI Enabled
19,090,053 UART: [fht] FMC Alias Private Key: 7
20,853,525 UART: [art] Extend RT PCRs Done
20,854,752 UART: [art] Lock RT PCRs Done
20,856,594 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,490 writing to cptra_bootfsm_go
3,436,441 ready_for_fw is high
3,436,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,728,420 >>> mbox cmd response: success
19,042,768 UART:
19,043,191 UART: Running Caliptra FMC ...
19,044,411 UART:
19,044,581 UART: [state] CFI Enabled
19,112,243 UART: [fht] FMC Alias Private Key: 7
20,856,458 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029B6error_internal_intr_r=00000040
20,860,095 UART: WDT Expired
20,860,673 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,393 writing to cptra_bootfsm_go
194,786 UART:
195,145 UART: Running Caliptra ROM ...
196,315 UART:
605,954 UART: [state] CFI Enabled
622,903 UART: [state] LifecycleState = Unprovisioned
625,295 UART: [state] DebugLocked = No
628,078 UART: [state] WD Timer not started. Device not locked for debugging
637,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
781,043 UART: [kat] SHA2-256
822,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
833,486 UART: [kat] ++
834,072 UART: [kat] sha1
845,124 UART: [kat] SHA2-256
848,129 UART: [kat] SHA2-384
853,836 UART: [kat] SHA2-512-ACC
856,443 UART: [kat] ECC-384
3,299,225 UART: [kat] HMAC-384Kdf
3,312,426 UART: [kat] LMS
3,844,266 UART: [kat] --
3,848,431 UART: [cold-reset] ++
3,849,950 UART: [fht] FHT @ 0x50003400
3,862,772 UART: [idev] ++
3,863,454 UART: [idev] CDI.KEYID = 6
3,864,470 UART: [idev] SUBJECT.KEYID = 7
3,865,626 UART: [idev] UDS.KEYID = 0
3,880,052 UART: [idev] Erasing UDS.KEYID = 0
6,343,009 UART: [idev] Sha1 KeyId Algorithm
6,365,837 UART: [idev] --
6,371,128 UART: [ldev] ++
6,371,864 UART: [ldev] CDI.KEYID = 6
6,372,754 UART: [ldev] SUBJECT.KEYID = 5
6,373,870 UART: [ldev] AUTHORITY.KEYID = 7
6,375,070 UART: [ldev] FE.KEYID = 1
6,386,151 UART: [ldev] Erasing FE.KEYID = 1
8,861,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,092 UART: [ldev] --
10,653,049 UART: [fwproc] Wait for Commands...
10,654,619 UART: [fwproc] Recv command 0x46574c44
10,656,932 UART: [fwproc] Recv'd Img size: 114448 bytes
14,094,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,832,286 >>> mbox cmd response: success
14,835,502 UART: [afmc] ++
14,836,259 UART: [afmc] CDI.KEYID = 6
14,837,445 UART: [afmc] SUBJECT.KEYID = 7
14,838,878 UART: [afmc] AUTHORITY.KEYID = 5
17,345,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,405 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,387 UART: [afmc] --
19,142,068 UART: [cold-reset] --
19,147,570 UART: [state] Locking Datavault
19,154,282 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,477 UART: [state] Locking ICCM
19,158,146 UART: [exit] Launching FMC @ 0x40000130
19,166,765 UART:
19,166,996 UART: Running Caliptra FMC ...
19,168,020 UART:
19,168,170 UART: [state] CFI Enabled
19,176,378 UART: [fht] FMC Alias Private Key: 7
20,932,714 UART: [art] Extend RT PCRs Done
20,933,933 UART: [art] Lock RT PCRs Done
20,935,538 UART: [art] Populate DV Done
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
191,930 UART:
192,316 UART: Running Caliptra ROM ...
193,505 UART:
603,151 UART: [state] CFI Enabled
620,112 UART: [state] LifecycleState = Unprovisioned
622,479 UART: [state] DebugLocked = Yes
625,448 UART: [state] Starting the WD Timer 20303892 cycles
630,883 UART: [kat] SHA2-256
820,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,536 UART: [kat] ++
832,089 UART: [kat] sha1
843,179 UART: [kat] SHA2-256
846,254 UART: [kat] SHA2-384
851,881 UART: [kat] SHA2-512-ACC
854,534 UART: [kat] ECC-384
3,297,311 UART: [kat] HMAC-384Kdf
3,310,546 UART: [kat] LMS
3,842,368 UART: [kat] --
3,846,507 UART: [cold-reset] ++
3,848,008 UART: [fht] FHT @ 0x50003400
3,860,838 UART: [idev] ++
3,861,545 UART: [idev] CDI.KEYID = 6
3,862,574 UART: [idev] SUBJECT.KEYID = 7
3,863,673 UART: [idev] UDS.KEYID = 0
3,864,600 ready_for_fw is high
3,864,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,592 UART: [idev] Erasing UDS.KEYID = 0
6,341,119 UART: [idev] Sha1 KeyId Algorithm
6,363,967 UART: [idev] --
6,369,362 UART: [ldev] ++
6,370,089 UART: [ldev] CDI.KEYID = 6
6,370,970 UART: [ldev] SUBJECT.KEYID = 5
6,372,179 UART: [ldev] AUTHORITY.KEYID = 7
6,373,429 UART: [ldev] FE.KEYID = 1
6,384,377 UART: [ldev] Erasing FE.KEYID = 1
8,859,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,309 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,485 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,549 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,569 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,273 UART: [ldev] --
10,651,256 UART: [fwproc] Wait for Commands...
10,652,751 UART: [fwproc] Recv command 0x46574c44
10,654,735 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,139 >>> mbox cmd response: success
14,833,364 UART: [afmc] ++
14,834,087 UART: [afmc] CDI.KEYID = 6
14,835,198 UART: [afmc] SUBJECT.KEYID = 7
14,836,738 UART: [afmc] AUTHORITY.KEYID = 5
17,343,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,961 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
19,083,065 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
19,098,146 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
19,113,146 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
19,137,140 UART: [afmc] --
19,139,808 UART: [cold-reset] --
19,145,069 UART: [state] Locking Datavault
19,151,830 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,014 UART: [state] Locking ICCM
19,155,660 UART: [exit] Launching FMC @ 0x40000130
19,164,321 UART:
19,164,570 UART: Running Caliptra FMC ...
19,165,595 UART:
19,165,743 UART: [state] CFI Enabled
19,173,900 UART: [fht] FMC Alias Private Key: 7
20,930,228 UART: [art] Extend RT PCRs Done
20,931,464 UART: [art] Lock RT PCRs Done
20,933,062 UART: [art] PopulFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
20,937,058 UART: WDT Expired
20,937,618 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
626,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,087 >>> mbox cmd response: success
19,208,296 UART:
19,208,686 UART: Running Caliptra FMC ...
19,209,803 UART:
19,209,954 UART: [state] CFI Enabled
19,217,900 UART: [fht] FMC Alias Private Key: 7
20,974,173 UART: [art] Extend RT PCRs Done
20,975,388 UART: [art] Lock RT PCRs Done
20,977,042 UART: [art] Populate DV Done
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,761,115 ready_for_fw is high
3,761,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,166 >>> mbox cmd response: success
19,208,460 UART:
19,208,843 UART: Running Caliptra FMC ...
19,209,988 UART:
19,210,146 UART: [state] CFI Enabled
19,218,068 UART: [fht] FMC Alias Private Key: 7
20,974,375 UART: [art] Extend RT PCRs Done
20,975,603 UART: [art] Lock RT PCRs Done
20,977,182 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E4error_internal_intr_r=00000040
20,980,747 UART: WDT Expired
20,981,324 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114448 bytes
2,885,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,835 >>> mbox cmd response: success
3,079,055 UART: [afmc] ++
3,079,223 UART: [afmc] CDI.KEYID = 6
3,079,585 UART: [afmc] SUBJECT.KEYID = 7
3,080,010 UART: [afmc] AUTHORITY.KEYID = 5
3,114,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,360 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,050 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,137 UART: [afmc] --
3,158,145 UART: [cold-reset] --
3,158,839 UART: [state] Locking Datavault
3,159,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,396 UART: [state] Locking ICCM
3,160,952 UART: [exit] Launching FMC @ 0x40000130
3,166,281 UART:
3,166,297 UART: Running Caliptra FMC ...
3,166,705 UART:
3,166,759 UART: [state] CFI Enabled
3,177,124 UART: [fht] FMC Alias Private Key: 7
3,285,049 UART: [art] Extend RT PCRs Done
3,285,477 UART: [art] Lock RT PCRs Done
3,286,965 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3199468 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114448 bytes
2,885,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,794 >>> mbox cmd response: success
3,079,011 UART: [afmc] ++
3,079,179 UART: [afmc] CDI.KEYID = 6
3,079,541 UART: [afmc] SUBJECT.KEYID = 7
3,079,966 UART: [afmc] AUTHORITY.KEYID = 5
3,114,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,699 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,410 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,310 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,039 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,113 UART: [afmc] --
3,158,120 UART: [cold-reset] --
3,158,814 UART: [state] Locking Datavault
3,159,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,371 UART: [state] Locking ICCM
3,160,927 UART: [exit] Launching FMC @ 0x40000130
3,166,256 UART:
3,166,272 UART: Running Caliptra FMC ...
3,166,680 UART:
3,166,734 UART: [state] CFI Enabled
3,177,100 UART: [fht] FMC Alias Private Key: 7
3,285,035 UART: [art] Extend RT PCRs Done
3,285,463 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,286,951 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,289,285 UART: WDT Expired
3,289,494 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,471 >>> mbox cmd response: success
2,988,559 UART:
2,988,575 UART: Running Caliptra FMC ...
2,988,983 UART:
2,989,037 UART: [state] CFI Enabled
2,999,402 UART: [fht] FMC Alias Private Key: 7
3,107,327 UART: [art] Extend RT PCRs Done
3,107,755 UART: [art] Lock RT PCRs Done
3,109,243 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,718 >>> mbox cmd response: success
2,988,795 UART:
2,988,811 UART: Running Caliptra FMC ...
2,989,219 UART:
2,989,273 UART: [state] CFI Enabled
2,999,639 UART: [fht] FMC Alias Private Key: 7
3,107,574 UART: [art] Extend RT PCRs Done
3,108,002 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,109,490 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,111,807 UART: WDT Expired
3,112,016 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114448 bytes
2,886,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,994 >>> mbox cmd response: success
3,080,226 UART: [afmc] ++
3,080,394 UART: [afmc] CDI.KEYID = 6
3,080,756 UART: [afmc] SUBJECT.KEYID = 7
3,081,181 UART: [afmc] AUTHORITY.KEYID = 5
3,116,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,130 UART: [afmc] --
3,160,070 UART: [cold-reset] --
3,161,006 UART: [state] Locking Datavault
3,162,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,767 UART: [state] Locking ICCM
3,163,373 UART: [exit] Launching FMC @ 0x40000130
3,168,702 UART:
3,168,718 UART: Running Caliptra FMC ...
3,169,126 UART:
3,169,269 UART: [state] CFI Enabled
3,179,896 UART: [fht] FMC Alias Private Key: 7
3,287,645 UART: [art] Extend RT PCRs Done
3,288,073 UART: [art] Lock RT PCRs Done
3,289,375 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3200889 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114448 bytes
2,886,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,953 >>> mbox cmd response: success
3,080,182 UART: [afmc] ++
3,080,350 UART: [afmc] CDI.KEYID = 6
3,080,712 UART: [afmc] SUBJECT.KEYID = 7
3,081,137 UART: [afmc] AUTHORITY.KEYID = 5
3,116,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,822 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,139,533 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,145,433 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,151,162 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,159,106 UART: [afmc] --
3,160,045 UART: [cold-reset] --
3,160,981 UART: [state] Locking Datavault
3,162,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,742 UART: [state] Locking ICCM
3,163,348 UART: [exit] Launching FMC @ 0x40000130
3,168,677 UART:
3,168,693 UART: Running Caliptra FMC ...
3,169,101 UART:
3,169,244 UART: [state] CFI Enabled
3,179,872 UART: [fht] FMC Alias Private Key: 7
3,287,631 UART: [art] Extend RT PCRs Done
3,288,059 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,289,361 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,291,685 UART: WDT Expired
3,291,894 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,630 >>> mbox cmd response: success
2,990,980 UART:
2,990,996 UART: Running Caliptra FMC ...
2,991,404 UART:
2,991,547 UART: [state] CFI Enabled
3,002,174 UART: [fht] FMC Alias Private Key: 7
3,109,923 UART: [art] Extend RT PCRs Done
3,110,351 UART: [art] Lock RT PCRs Done
3,111,653 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,877 >>> mbox cmd response: success
2,991,216 UART:
2,991,232 UART: Running Caliptra FMC ...
2,991,640 UART:
2,991,783 UART: [state] CFI Enabled
3,002,411 UART: [fht] FMC Alias Private Key: 7
3,110,170 UART: [art] Extend RT PCRs Done
3,110,598 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,111,900 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,114,209 UART: WDT Expired
3,114,418 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,064 >>> mbox cmd response: success
2,775,220 UART: [afmc] ++
2,775,388 UART: [afmc] CDI.KEYID = 6
2,775,750 UART: [afmc] SUBJECT.KEYID = 7
2,776,175 UART: [afmc] AUTHORITY.KEYID = 5
2,811,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,435 UART: [afmc] --
2,854,507 UART: [cold-reset] --
2,855,427 UART: [state] Locking Datavault
2,856,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,222 UART: [state] Locking ICCM
2,857,642 UART: [exit] Launching FMC @ 0x40000130
2,862,971 UART:
2,862,987 UART: Running Caliptra FMC ...
2,863,395 UART:
2,863,449 UART: [state] CFI Enabled
2,874,034 UART: [fht] FMC Alias Private Key: 7
2,981,375 UART: [art] Extend RT PCRs Done
2,981,803 UART: [art] Lock RT PCRs Done
2,983,535 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2896407 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,295 >>> mbox cmd response: success
2,775,448 UART: [afmc] ++
2,775,616 UART: [afmc] CDI.KEYID = 6
2,775,978 UART: [afmc] SUBJECT.KEYID = 7
2,776,403 UART: [afmc] AUTHORITY.KEYID = 5
2,811,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,577 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,288 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,188 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,845,885 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,853,620 UART: [afmc] --
2,854,691 UART: [cold-reset] --
2,855,611 UART: [state] Locking Datavault
2,856,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,406 UART: [state] Locking ICCM
2,857,826 UART: [exit] Launching FMC @ 0x40000130
2,863,155 UART:
2,863,171 UART: Running Caliptra FMC ...
2,863,579 UART:
2,863,633 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,981,570 UART: [art] Extend RT PCRs Done
2,981,998 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,983,730 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,986,124 UART: WDT Expired
2,986,333 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,045 >>> mbox cmd response: success
2,687,615 UART:
2,687,631 UART: Running Caliptra FMC ...
2,688,039 UART:
2,688,093 UART: [state] CFI Enabled
2,698,678 UART: [fht] FMC Alias Private Key: 7
2,806,019 UART: [art] Extend RT PCRs Done
2,806,447 UART: [art] Lock RT PCRs Done
2,808,179 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,292 >>> mbox cmd response: success
2,687,851 UART:
2,687,867 UART: Running Caliptra FMC ...
2,688,275 UART:
2,688,329 UART: [state] CFI Enabled
2,698,915 UART: [fht] FMC Alias Private Key: 7
2,806,266 UART: [art] Extend RT PCRs Done
2,806,694 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,808,426 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,810,744 UART: WDT Expired
2,810,953 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,445 >>> mbox cmd response: success
2,776,461 UART: [afmc] ++
2,776,629 UART: [afmc] CDI.KEYID = 6
2,776,991 UART: [afmc] SUBJECT.KEYID = 7
2,777,416 UART: [afmc] AUTHORITY.KEYID = 5
2,813,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,972 UART: [afmc] --
2,856,850 UART: [cold-reset] --
2,857,894 UART: [state] Locking Datavault
2,859,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,841 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,877,140 UART: [fht] FMC Alias Private Key: 7
2,985,849 UART: [art] Extend RT PCRs Done
2,986,277 UART: [art] Lock RT PCRs Done
2,987,885 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2899768 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,676 >>> mbox cmd response: success
2,776,689 UART: [afmc] ++
2,776,857 UART: [afmc] CDI.KEYID = 6
2,777,219 UART: [afmc] SUBJECT.KEYID = 7
2,777,644 UART: [afmc] AUTHORITY.KEYID = 5
2,813,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,998 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,836,709 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,842,609 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,848,306 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,856,157 UART: [afmc] --
2,857,034 UART: [cold-reset] --
2,858,078 UART: [state] Locking Datavault
2,859,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,025 UART: [state] Locking ICCM
2,860,499 UART: [exit] Launching FMC @ 0x40000130
2,865,828 UART:
2,865,844 UART: Running Caliptra FMC ...
2,866,252 UART:
2,866,395 UART: [state] CFI Enabled
2,877,325 UART: [fht] FMC Alias Private Key: 7
2,986,044 UART: [art] Extend RT PCRs Done
2,986,472 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,988,080 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,990,468 UART: WDT Expired
2,990,677 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,426 >>> mbox cmd response: success
2,690,288 UART:
2,690,304 UART: Running Caliptra FMC ...
2,690,712 UART:
2,690,855 UART: [state] CFI Enabled
2,701,784 UART: [fht] FMC Alias Private Key: 7
2,810,493 UART: [art] Extend RT PCRs Done
2,810,921 UART: [art] Lock RT PCRs Done
2,812,529 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,673 >>> mbox cmd response: success
2,690,524 UART:
2,690,540 UART: Running Caliptra FMC ...
2,690,948 UART:
2,691,091 UART: [state] CFI Enabled
2,702,021 UART: [fht] FMC Alias Private Key: 7
2,810,740 UART: [art] Extend RT PCRs Done
2,811,168 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,812,776 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,815,084 UART: WDT Expired
2,815,293 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,164 >>> mbox cmd response: success
2,773,327 UART: [afmc] ++
2,773,495 UART: [afmc] CDI.KEYID = 6
2,773,858 UART: [afmc] SUBJECT.KEYID = 7
2,774,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,572 UART: [afmc] --
2,852,644 UART: [cold-reset] --
2,853,564 UART: [state] Locking Datavault
2,854,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,359 UART: [state] Locking ICCM
2,855,779 UART: [exit] Launching FMC @ 0x40000130
2,861,108 UART:
2,861,124 UART: Running Caliptra FMC ...
2,861,532 UART:
2,861,586 UART: [state] CFI Enabled
2,872,171 UART: [fht] FMC Alias Private Key: 7
2,979,512 UART: [art] Extend RT PCRs Done
2,979,940 UART: [art] Lock RT PCRs Done
2,981,672 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2894574 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,395 >>> mbox cmd response: success
2,773,555 UART: [afmc] ++
2,773,723 UART: [afmc] CDI.KEYID = 6
2,774,086 UART: [afmc] SUBJECT.KEYID = 7
2,774,512 UART: [afmc] AUTHORITY.KEYID = 5
2,809,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,710 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,422 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,320 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,017 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,757 UART: [afmc] --
2,852,828 UART: [cold-reset] --
2,853,748 UART: [state] Locking Datavault
2,854,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,543 UART: [state] Locking ICCM
2,855,963 UART: [exit] Launching FMC @ 0x40000130
2,861,292 UART:
2,861,308 UART: Running Caliptra FMC ...
2,861,716 UART:
2,861,770 UART: [state] CFI Enabled
2,872,356 UART: [fht] FMC Alias Private Key: 7
2,979,707 UART: [art] Extend RT PCRs Done
2,980,135 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,981,867 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,984,261 UART: WDT Expired
2,984,470 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,030 >>> mbox cmd response: success
2,683,630 UART:
2,683,646 UART: Running Caliptra FMC ...
2,684,054 UART:
2,684,108 UART: [state] CFI Enabled
2,694,693 UART: [fht] FMC Alias Private Key: 7
2,802,034 UART: [art] Extend RT PCRs Done
2,802,462 UART: [art] Lock RT PCRs Done
2,804,194 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,277 >>> mbox cmd response: success
2,683,866 UART:
2,683,882 UART: Running Caliptra FMC ...
2,684,290 UART:
2,684,344 UART: [state] CFI Enabled
2,694,930 UART: [fht] FMC Alias Private Key: 7
2,802,281 UART: [art] Extend RT PCRs Done
2,802,709 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,804,441 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,806,759 UART: WDT Expired
2,806,968 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,811,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,109 UART: [afmc] --
2,854,987 UART: [cold-reset] --
2,856,031 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,452 UART: [exit] Launching FMC @ 0x40000130
2,863,781 UART:
2,863,797 UART: Running Caliptra FMC ...
2,864,205 UART:
2,864,348 UART: [state] CFI Enabled
2,875,277 UART: [fht] FMC Alias Private Key: 7
2,983,986 UART: [art] Extend RT PCRs Done
2,984,414 UART: [art] Lock RT PCRs Done
2,986,022 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2897935 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,796 UART: [afmc] ++
2,774,964 UART: [afmc] CDI.KEYID = 6
2,775,327 UART: [afmc] SUBJECT.KEYID = 7
2,775,753 UART: [afmc] AUTHORITY.KEYID = 5
2,811,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,843 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,741 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,438 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,294 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,215 UART: [state] Locking Datavault
2,857,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,162 UART: [state] Locking ICCM
2,858,636 UART: [exit] Launching FMC @ 0x40000130
2,863,965 UART:
2,863,981 UART: Running Caliptra FMC ...
2,864,389 UART:
2,864,532 UART: [state] CFI Enabled
2,875,462 UART: [fht] FMC Alias Private Key: 7
2,984,181 UART: [art] Extend RT PCRs Done
2,984,609 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,986,217 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,988,605 UART: WDT Expired
2,988,814 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,411 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,870 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,806,508 UART: [art] Extend RT PCRs Done
2,806,936 UART: [art] Lock RT PCRs Done
2,808,544 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
2,686,539 UART:
2,686,555 UART: Running Caliptra FMC ...
2,686,963 UART:
2,687,106 UART: [state] CFI Enabled
2,698,036 UART: [fht] FMC Alias Private Key: 7
2,806,755 UART: [art] Extend RT PCRs Done
2,807,183 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,808,791 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,811,099 UART: WDT Expired
2,811,308 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114448 bytes
2,885,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,835 >>> mbox cmd response: success
3,079,055 UART: [afmc] ++
3,079,223 UART: [afmc] CDI.KEYID = 6
3,079,585 UART: [afmc] SUBJECT.KEYID = 7
3,080,010 UART: [afmc] AUTHORITY.KEYID = 5
3,114,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,360 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,050 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,137 UART: [afmc] --
3,158,145 UART: [cold-reset] --
3,158,839 UART: [state] Locking Datavault
3,159,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,396 UART: [state] Locking ICCM
3,160,952 UART: [exit] Launching FMC @ 0x40000130
3,166,281 UART:
3,166,297 UART: Running Caliptra FMC ...
3,166,705 UART:
3,166,759 UART: [state] CFI Enabled
3,177,124 UART: [fht] FMC Alias Private Key: 7
3,285,049 UART: [art] Extend RT PCRs Done
3,285,477 UART: [art] Lock RT PCRs Done
3,286,965 UART: [art] Populate DV Done
3,295,184 UART: [fht] FMC Alias Private Key: 7
3,296,208 UART: [art] Derive CDI
3,296,488 UART: [art] Store in in slot 0x4
3,381,677 UART: [art] Derive Key Pair
3,382,037 UART: [art] Store priv key in slot 0x5
3,395,141 UART: [art] Derive Key Pair - Done
3,409,722 UART: [art] Signing Cert with AUTHO
3,410,202 UART: RITY.KEYID = 7
3,425,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,373 UART: [art] PUB.X = FB5359E35F5904D3A607FD952232BD682F939075ACC7D4217C7978DD0F10E41FBE7A61F720CB9E92C8A0E2C4636BC9FD
3,433,144 UART: [art] PUB.Y = B76A4B9BB185DA458B5038488BAD397869520942BEB1133717BE2E9E2BC2FD22F95346AE785C6CE463B721F98EB11648
3,440,093 UART: [art] SIG.R = A11EABC9A25F0E976A67584004E649738677D04D715330A9251EC5F4FA5FFB13979D99D6B0E386A3315DBA9EE474A452
3,446,859 UART: [art] SIG.S = 4250A4A6DD7EA63FD0D9598B5EA74FBC3BC223343C3BE2F2EC2B6D2921C4D6AE77EF7E3B8B2F1862CB62B5962786F0E7
3,471,198 UART: Caliptra RT
3,471,451 UART: [state] CFI Enabled
3,579,234 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3487045 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114448 bytes
2,885,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,794 >>> mbox cmd response: success
3,079,011 UART: [afmc] ++
3,079,179 UART: [afmc] CDI.KEYID = 6
3,079,541 UART: [afmc] SUBJECT.KEYID = 7
3,079,966 UART: [afmc] AUTHORITY.KEYID = 5
3,114,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,699 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,410 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,310 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,039 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,113 UART: [afmc] --
3,158,120 UART: [cold-reset] --
3,158,814 UART: [state] Locking Datavault
3,159,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,371 UART: [state] Locking ICCM
3,160,927 UART: [exit] Launching FMC @ 0x40000130
3,166,256 UART:
3,166,272 UART: Running Caliptra FMC ...
3,166,680 UART:
3,166,734 UART: [state] CFI Enabled
3,177,100 UART: [fht] FMC Alias Private Key: 7
3,285,035 UART: [art] Extend RT PCRs Done
3,285,463 UART: [art] Lock RT PCRs Done
3,286,951 UART: [art] Populate DV Done
3,295,170 UART: [fht] FMC Alias Private Key: 7
3,296,194 UART: [art] Derive CDI
3,296,474 UART: [art] Store in in slot 0x4
3,381,661 UART: [art] Derive Key Pair
3,382,021 UART: [art] Store priv key in slot 0x5
3,395,125 UART: [art] Derive Key Pair - Done
3,409,704 UART: [art] Signing Cert with AUTHO
3,410,184 UART: RITY.KEYID = 7
3,425,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,355 UART: [art] PUB.X = A1213000BA9050E63F5833DA96D3913A1A59A869CF399DCD221C769C207BC1E3249371BC69D9CFAA0330B6D4A61D09EA
3,433,103 UART: [art] PUB.Y = FDE4ADB93540C71F72D3C5F9C9E5AC82144CF0ADBAD0D183E7A0C7C68D72D9863B337893DC27395EAECE8CFD3124BF34
3,440,075 UART: [art] SIG.R = 4DE416E0062CB2F3F72B0689D861D80CF1EF3AD9465D6867B700CB3068A81DCE275CED4D279E501FF87C89779C0ED55A
3,446,821 UART: [art] SIG.S = 3770607545A4B0B027591761D549DD9BBBADF48B05B488D7CAE97DD8926DFBB06FFACD503957A81D13241FC2063365B8
3,471,140 UART: Caliptra RT
3,471,393 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,574,765 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,577,262 UART: [rt] WDT Expired
3,577,549 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,471 >>> mbox cmd response: success
2,988,559 UART:
2,988,575 UART: Running Caliptra FMC ...
2,988,983 UART:
2,989,037 UART: [state] CFI Enabled
2,999,402 UART: [fht] FMC Alias Private Key: 7
3,107,327 UART: [art] Extend RT PCRs Done
3,107,755 UART: [art] Lock RT PCRs Done
3,109,243 UART: [art] Populate DV Done
3,117,462 UART: [fht] FMC Alias Private Key: 7
3,118,486 UART: [art] Derive CDI
3,118,766 UART: [art] Store in in slot 0x4
3,203,955 UART: [art] Derive Key Pair
3,204,315 UART: [art] Store priv key in slot 0x5
3,217,419 UART: [art] Derive Key Pair - Done
3,232,001 UART: [art] Signing Cert with AUTHO
3,232,481 UART: RITY.KEYID = 7
3,247,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,652 UART: [art] PUB.X = A635914455155AD571D206E07902E8C19618B0D48C832DE8409935E221243717B181C6C9C3F834845B241AE1C7EA0459
3,255,399 UART: [art] PUB.Y = 69B481E14AD7866E14D07A9505B90701A0742224C5A4A9816AC9AE64E0671C02A047ACEF6118F80A3AF5AC686A90CAEE
3,262,340 UART: [art] SIG.R = B908F051DCC25E451DF4A21620C9F893C78B0A7543D5911AB9D57DC88C5EC11FE09DA0C66DC053D84EB4D044633CB29C
3,269,116 UART: [art] SIG.S = 272F2CDE5BFD24B9FA232A5475DD1DAAD2FDD5E0709B6C49B50B71B283CF7FE24652039B7FA275AEABCB17A1AC3C9BE1
3,293,459 UART: Caliptra RT
3,293,712 UART: [state] CFI Enabled
3,401,495 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,718 >>> mbox cmd response: success
2,988,795 UART:
2,988,811 UART: Running Caliptra FMC ...
2,989,219 UART:
2,989,273 UART: [state] CFI Enabled
2,999,639 UART: [fht] FMC Alias Private Key: 7
3,107,574 UART: [art] Extend RT PCRs Done
3,108,002 UART: [art] Lock RT PCRs Done
3,109,490 UART: [art] Populate DV Done
3,117,709 UART: [fht] FMC Alias Private Key: 7
3,118,733 UART: [art] Derive CDI
3,119,013 UART: [art] Store in in slot 0x4
3,204,200 UART: [art] Derive Key Pair
3,204,560 UART: [art] Store priv key in slot 0x5
3,217,664 UART: [art] Derive Key Pair - Done
3,232,253 UART: [art] Signing Cert with AUTHO
3,232,733 UART: RITY.KEYID = 7
3,248,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,904 UART: [art] PUB.X = C3B53E832AED73D468ECC1E93AE551554F7C34764C7749A672322D869E2AFDF72E6224F98ECD1D854154B94853286FA5
3,255,676 UART: [art] PUB.Y = 4622608684B2651C4AD23DC1A2111B9FDF82B661FD39E9AC89A3E0892BF241E9C6B6E5A6F33EEAC0DFAC082A515E7D3E
3,262,639 UART: [art] SIG.R = 391A8E40B3B433E1FAC5ECC15B1D780A7EBE4C54057F0DBBE97B75846572D1137EDD525A3DA363AA28902A5A445FA636
3,269,412 UART: [art] SIG.S = 26DFFA6EE4B5B96A15F772E7F6C420AE511FA62E45D979B366525B0B21E2638CE683A2DC25CA0B0B7FE4AD9964836AE7
3,293,736 UART: Caliptra RT
3,293,989 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,397,272 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE4 ra=0x40007056 error_internal_intr_r=00000040
3,399,769 UART: [rt] WDT Expired
3,400,056 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114448 bytes
2,886,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,994 >>> mbox cmd response: success
3,080,226 UART: [afmc] ++
3,080,394 UART: [afmc] CDI.KEYID = 6
3,080,756 UART: [afmc] SUBJECT.KEYID = 7
3,081,181 UART: [afmc] AUTHORITY.KEYID = 5
3,116,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,130 UART: [afmc] --
3,160,070 UART: [cold-reset] --
3,161,006 UART: [state] Locking Datavault
3,162,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,767 UART: [state] Locking ICCM
3,163,373 UART: [exit] Launching FMC @ 0x40000130
3,168,702 UART:
3,168,718 UART: Running Caliptra FMC ...
3,169,126 UART:
3,169,269 UART: [state] CFI Enabled
3,179,896 UART: [fht] FMC Alias Private Key: 7
3,287,645 UART: [art] Extend RT PCRs Done
3,288,073 UART: [art] Lock RT PCRs Done
3,289,375 UART: [art] Populate DV Done
3,297,614 UART: [fht] FMC Alias Private Key: 7
3,298,628 UART: [art] Derive CDI
3,298,908 UART: [art] Store in in slot 0x4
3,384,673 UART: [art] Derive Key Pair
3,385,033 UART: [art] Store priv key in slot 0x5
3,398,251 UART: [art] Derive Key Pair - Done
3,413,044 UART: [art] Signing Cert with AUTHO
3,413,524 UART: RITY.KEYID = 7
3,428,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,679 UART: [art] PUB.X = 78265FC5B018D86A1A75FFFDBFAF57A1BD26FB477D4A20B4FB2BCB5C2E022A6C2A69591DB85CA4375902C1851B158BF3
3,436,461 UART: [art] PUB.Y = 672E22D18BE3E371E2000F8AE1891329A8FD172FE308B72606039E643CA6A9BA2DECFE52EFD3F3C912816B1CD48B73F8
3,443,387 UART: [art] SIG.R = FE2A084A1E88210D953B6FE46C16522D399E7C825E3DBB9E5DA4022FD8B30ED4614A8FEC4AAC6076340C849BEDEEA547
3,450,158 UART: [art] SIG.S = 3D900C6C7647039E20B138C6AE6A312E81A61B9AD4171ED84CADC1218E2BEBF12A94D0E71AF479035AF1E6CBA0CD2ED8
3,473,794 UART: Caliptra RT
3,474,139 UART: [state] CFI Enabled
3,582,774 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3489596 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114448 bytes
2,886,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,953 >>> mbox cmd response: success
3,080,182 UART: [afmc] ++
3,080,350 UART: [afmc] CDI.KEYID = 6
3,080,712 UART: [afmc] SUBJECT.KEYID = 7
3,081,137 UART: [afmc] AUTHORITY.KEYID = 5
3,116,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,822 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,139,533 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,145,433 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,151,162 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,159,106 UART: [afmc] --
3,160,045 UART: [cold-reset] --
3,160,981 UART: [state] Locking Datavault
3,162,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,742 UART: [state] Locking ICCM
3,163,348 UART: [exit] Launching FMC @ 0x40000130
3,168,677 UART:
3,168,693 UART: Running Caliptra FMC ...
3,169,101 UART:
3,169,244 UART: [state] CFI Enabled
3,179,872 UART: [fht] FMC Alias Private Key: 7
3,287,631 UART: [art] Extend RT PCRs Done
3,288,059 UART: [art] Lock RT PCRs Done
3,289,361 UART: [art] Populate DV Done
3,297,600 UART: [fht] FMC Alias Private Key: 7
3,298,614 UART: [art] Derive CDI
3,298,894 UART: [art] Store in in slot 0x4
3,384,657 UART: [art] Derive Key Pair
3,385,017 UART: [art] Store priv key in slot 0x5
3,398,235 UART: [art] Derive Key Pair - Done
3,413,027 UART: [art] Signing Cert with AUTHO
3,413,507 UART: RITY.KEYID = 7
3,428,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,662 UART: [art] PUB.X = 201FD1B3BE7B4BA2DEC012202E3C4FF81BC2649EB59AF4D115F86D15446AAC65A4E81169A99D425129E80719CA2703EE
3,436,436 UART: [art] PUB.Y = 5893E08B716E4F7BB899A7C40DFF26A2C321CA1A40B5A42A43EFD6E6E7791567519D878B580A3AABDF41DE287D98CA19
3,443,392 UART: [art] SIG.R = C18BB7F7AFCCB1DE74A4766CBCC4DA71B6F11B8B84CCEB95BAF2DCE44FDF9ED8FEE623933C6DF992C5DECF12709447CA
3,450,200 UART: [art] SIG.S = 5D0CDA720F89CCF7F8A8E49DC849C0E29EE51F7B04F8DB86D0B1312BB2C24C8936F24AF23310F98DEFF3F926524C8D71
3,473,832 UART: Caliptra RT
3,474,177 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,578,297 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,580,794 UART: [rt] WDT Expired
3,581,081 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,630 >>> mbox cmd response: success
2,990,980 UART:
2,990,996 UART: Running Caliptra FMC ...
2,991,404 UART:
2,991,547 UART: [state] CFI Enabled
3,002,174 UART: [fht] FMC Alias Private Key: 7
3,109,923 UART: [art] Extend RT PCRs Done
3,110,351 UART: [art] Lock RT PCRs Done
3,111,653 UART: [art] Populate DV Done
3,119,892 UART: [fht] FMC Alias Private Key: 7
3,120,906 UART: [art] Derive CDI
3,121,186 UART: [art] Store in in slot 0x4
3,206,951 UART: [art] Derive Key Pair
3,207,311 UART: [art] Store priv key in slot 0x5
3,220,529 UART: [art] Derive Key Pair - Done
3,235,317 UART: [art] Signing Cert with AUTHO
3,235,797 UART: RITY.KEYID = 7
3,251,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,952 UART: [art] PUB.X = 184FA93DE3EF67B6FBB5EB3C94E76A66BDB8D38AD2B2A9FEA84577FF3C6BB790099E6148A2D4B25DAD6E3D70A4BC5BA0
3,258,747 UART: [art] PUB.Y = B5749EE29860F72A9F7C112F22385D08F0DEA222D6F1EF1182CB9910B056FDAA7C040581822234294C3DACD8DF6F9049
3,265,692 UART: [art] SIG.R = AFEA1687A2EAC899C017609AFD19A32880D20EB89D7D0CCC9A2561613BBB05771A732A168BEEDEBF1F9C7AF77CE8A6F5
3,272,475 UART: [art] SIG.S = 624DCC73FF4363FC1B9484E785B3C2B6BD5056C9AB9436511DE8CEB8B6D69CC78F14F4A4BE0D33F8B8F83432A4C50395
3,296,108 UART: Caliptra RT
3,296,453 UART: [state] CFI Enabled
3,405,088 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,877 >>> mbox cmd response: success
2,991,216 UART:
2,991,232 UART: Running Caliptra FMC ...
2,991,640 UART:
2,991,783 UART: [state] CFI Enabled
3,002,411 UART: [fht] FMC Alias Private Key: 7
3,110,170 UART: [art] Extend RT PCRs Done
3,110,598 UART: [art] Lock RT PCRs Done
3,111,900 UART: [art] Populate DV Done
3,120,139 UART: [fht] FMC Alias Private Key: 7
3,121,153 UART: [art] Derive CDI
3,121,433 UART: [art] Store in in slot 0x4
3,207,196 UART: [art] Derive Key Pair
3,207,556 UART: [art] Store priv key in slot 0x5
3,220,774 UART: [art] Derive Key Pair - Done
3,235,562 UART: [art] Signing Cert with AUTHO
3,236,042 UART: RITY.KEYID = 7
3,251,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,197 UART: [art] PUB.X = F127BDA9EDCB19D2AEC8D58A9362D80F940EE062FBA1809D0E1B32EE5FD1DF69D09FF0A96E671B53B38D45F468441C92
3,258,976 UART: [art] PUB.Y = 7CF992F0E954D54FA5D36D4E7CCBC37BB47FA55A24C67C17434D4B2294E7DB8464919F24118611BCE5A4B72FAA5DA4A2
3,265,940 UART: [art] SIG.R = E11E961055273F41B2A35A372E1B73DCCE1D1B0900D955B1A977F00F8F5D4E9E67451C9421C30AF92E9BE8736B50E8CA
3,272,685 UART: [art] SIG.S = C136355B231E177A34C5A208CB2A5DB61AA8F37A41404FDACDDA0E63FD196E38CA1C3A8D6227DD0609A89ACC7E048B9C
3,296,313 UART: Caliptra RT
3,296,658 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,400,857 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,403,354 UART: [rt] WDT Expired
3,403,641 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,064 >>> mbox cmd response: success
2,775,220 UART: [afmc] ++
2,775,388 UART: [afmc] CDI.KEYID = 6
2,775,750 UART: [afmc] SUBJECT.KEYID = 7
2,776,175 UART: [afmc] AUTHORITY.KEYID = 5
2,811,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,435 UART: [afmc] --
2,854,507 UART: [cold-reset] --
2,855,427 UART: [state] Locking Datavault
2,856,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,222 UART: [state] Locking ICCM
2,857,642 UART: [exit] Launching FMC @ 0x40000130
2,862,971 UART:
2,862,987 UART: Running Caliptra FMC ...
2,863,395 UART:
2,863,449 UART: [state] CFI Enabled
2,874,034 UART: [fht] FMC Alias Private Key: 7
2,981,375 UART: [art] Extend RT PCRs Done
2,981,803 UART: [art] Lock RT PCRs Done
2,983,535 UART: [art] Populate DV Done
2,991,814 UART: [fht] FMC Alias Private Key: 7
2,992,806 UART: [art] Derive CDI
2,993,086 UART: [art] Store in in slot 0x4
3,078,157 UART: [art] Derive Key Pair
3,078,517 UART: [art] Store priv key in slot 0x5
3,092,143 UART: [art] Derive Key Pair - Done
3,107,138 UART: [art] Signing Cert with AUTHO
3,107,618 UART: RITY.KEYID = 7
3,122,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,571 UART: [art] PUB.X = 382A55AB36BCE3334C75A83E536247176A0C37F27C15B4CF4D86F0C8308D3E87C25A8D90DDB0DEB153C3F6FBA1B61B1C
3,130,352 UART: [art] PUB.Y = 728840A6DD75FBB07C7AE88C63E82D94A9FDA79CA9CE5059322924901D61D31645A672424A996C398BBDEA12D4AF1ECA
3,137,312 UART: [art] SIG.R = D7F75E3D531C30056B2E77E419C29326A06A7C937573DD2407EE1CDB0AC368722416908BE9014199CFB4A060F8CD1D26
3,144,070 UART: [art] SIG.S = DC16BC81725BC59E75A0ECA1298D8DD2716A59CFC1BED1FE7F0FD814C9FF0BB632FC35A9D3F4A99A793A2A587640801F
3,167,655 UART: Caliptra RT
3,167,908 UART: [state] CFI Enabled
3,275,644 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3183824 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,295 >>> mbox cmd response: success
2,775,448 UART: [afmc] ++
2,775,616 UART: [afmc] CDI.KEYID = 6
2,775,978 UART: [afmc] SUBJECT.KEYID = 7
2,776,403 UART: [afmc] AUTHORITY.KEYID = 5
2,811,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,577 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,288 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,188 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,845,885 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,853,620 UART: [afmc] --
2,854,691 UART: [cold-reset] --
2,855,611 UART: [state] Locking Datavault
2,856,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,406 UART: [state] Locking ICCM
2,857,826 UART: [exit] Launching FMC @ 0x40000130
2,863,155 UART:
2,863,171 UART: Running Caliptra FMC ...
2,863,579 UART:
2,863,633 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,981,570 UART: [art] Extend RT PCRs Done
2,981,998 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,993,001 UART: [art] Derive CDI
2,993,281 UART: [art] Store in in slot 0x4
3,078,350 UART: [art] Derive Key Pair
3,078,710 UART: [art] Store priv key in slot 0x5
3,092,336 UART: [art] Derive Key Pair - Done
3,107,322 UART: [art] Signing Cert with AUTHO
3,107,802 UART: RITY.KEYID = 7
3,122,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,755 UART: [art] PUB.X = D29FBAD1798A20E5B403A67992740E346F5AAFAC061B9B58286B588411726CBE8DA9F973A28B92F5CCA5330DFD5A64F7
3,130,523 UART: [art] PUB.Y = 79816EF8AE735D1CAE2771CF9121F6EFF65347513C657D792B870B20E60AA2046A24A1D86BAA2BA631AC80B1A1F937BE
3,137,474 UART: [art] SIG.R = 96663F64A32A2046BAC91CAFCD7B16798DDD791704ED224D92DC733273EB537BBAAA638463A660A9112A532724C886A2
3,144,243 UART: [art] SIG.S = 02028286F289CED4B103A0E3813E4CB4BEC83243EB307FA86BE0E0B38E5E302AEC5698401B2844F116BC7B8EDA3CDB11
3,167,815 UART: Caliptra RT
3,168,068 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,271,446 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE4 ra=0x40007056 error_internal_intr_r=00000040
3,273,943 UART: [rt] WDT Expired
3,274,230 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,045 >>> mbox cmd response: success
2,687,615 UART:
2,687,631 UART: Running Caliptra FMC ...
2,688,039 UART:
2,688,093 UART: [state] CFI Enabled
2,698,678 UART: [fht] FMC Alias Private Key: 7
2,806,019 UART: [art] Extend RT PCRs Done
2,806,447 UART: [art] Lock RT PCRs Done
2,808,179 UART: [art] Populate DV Done
2,816,458 UART: [fht] FMC Alias Private Key: 7
2,817,450 UART: [art] Derive CDI
2,817,730 UART: [art] Store in in slot 0x4
2,902,801 UART: [art] Derive Key Pair
2,903,161 UART: [art] Store priv key in slot 0x5
2,916,787 UART: [art] Derive Key Pair - Done
2,931,774 UART: [art] Signing Cert with AUTHO
2,932,254 UART: RITY.KEYID = 7
2,947,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,207 UART: [art] PUB.X = 53432DC283D9B64426B598914DE89D879067CAD6B8E4D8C7243EE8310DC19EFDC562B454B00C03D40A3BB7E2AA57E8EB
2,954,975 UART: [art] PUB.Y = 9D5C9CBD907AF31A341D9163562F490B1F3676EEE280D358A7A40665205A121555EC4F92D881EA45FE7DC81D5191D562
2,961,919 UART: [art] SIG.R = 469C2D660385E2F99446ABBF691FF82CD05C901FDA123E46D99E71DAF37D737A3004374D02B6BE5C259516751A2800D1
2,968,658 UART: [art] SIG.S = 59BDF6FCD701B6E8E34F2D991838D3E0384FDF2847F876E12CA75677C609B15A89126A93B7D963EAFD201173B0797240
2,992,223 UART: Caliptra RT
2,992,476 UART: [state] CFI Enabled
3,100,245 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,292 >>> mbox cmd response: success
2,687,851 UART:
2,687,867 UART: Running Caliptra FMC ...
2,688,275 UART:
2,688,329 UART: [state] CFI Enabled
2,698,915 UART: [fht] FMC Alias Private Key: 7
2,806,266 UART: [art] Extend RT PCRs Done
2,806,694 UART: [art] Lock RT PCRs Done
2,808,426 UART: [art] Populate DV Done
2,816,705 UART: [fht] FMC Alias Private Key: 7
2,817,697 UART: [art] Derive CDI
2,817,977 UART: [art] Store in in slot 0x4
2,903,046 UART: [art] Derive Key Pair
2,903,406 UART: [art] Store priv key in slot 0x5
2,917,032 UART: [art] Derive Key Pair - Done
2,932,014 UART: [art] Signing Cert with AUTHO
2,932,494 UART: RITY.KEYID = 7
2,947,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,447 UART: [art] PUB.X = 754379DA018D904FD138C6C723B4096D5BD54B35D8F2BD6FFE6B74BBC14348E2B555A0B2A60661D96C8354814949AF20
2,955,210 UART: [art] PUB.Y = E774A153FC91D74DA3B9A52F08942990A384EDBB0A32EC950231C9A1D805549F8916802E172B117E550157616E7D114A
2,962,139 UART: [art] SIG.R = F28D16C396055AAF2C0682CC1068B8AB893795DB1A649CC40D6355FFCC29A587F28321602494B39F048D8FA8237F79DC
2,968,899 UART: [art] SIG.S = F2DB5C31345DE4C017D800D78BFDCF2F5671BDA4F28EED0847E3C1DB0FF7D004E09D8AF8AC200A72FE8A0CFA8E3A47DF
2,992,461 UART: Caliptra RT
2,992,714 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,096,021 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,098,520 UART: [rt] WDT Expired
3,098,807 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,445 >>> mbox cmd response: success
2,776,461 UART: [afmc] ++
2,776,629 UART: [afmc] CDI.KEYID = 6
2,776,991 UART: [afmc] SUBJECT.KEYID = 7
2,777,416 UART: [afmc] AUTHORITY.KEYID = 5
2,813,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,972 UART: [afmc] --
2,856,850 UART: [cold-reset] --
2,857,894 UART: [state] Locking Datavault
2,859,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,841 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,877,140 UART: [fht] FMC Alias Private Key: 7
2,985,849 UART: [art] Extend RT PCRs Done
2,986,277 UART: [art] Lock RT PCRs Done
2,987,885 UART: [art] Populate DV Done
2,995,960 UART: [fht] FMC Alias Private Key: 7
2,996,900 UART: [art] Derive CDI
2,997,180 UART: [art] Store in in slot 0x4
3,082,761 UART: [art] Derive Key Pair
3,083,121 UART: [art] Store priv key in slot 0x5
3,096,427 UART: [art] Derive Key Pair - Done
3,111,298 UART: [art] Signing Cert with AUTHO
3,111,778 UART: RITY.KEYID = 7
3,126,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,745 UART: [art] PUB.X = 0FC8CE3843C18D327CA5BBA5D981DF4EA5D51051C0933DF7120127B6B26F045B9B2AD444C4DADA5D5CEB4F5E7E3DC188
3,134,526 UART: [art] PUB.Y = E497810D274ABC7B179B93E13633A9E31227DA35C02990BEFBDC3128F07535E4687B20FC4BE0833D1639E0CCED168BAD
3,141,481 UART: [art] SIG.R = A799A5147BAFA75EC937B03DF3DAF372D4E80AFA328DC0212C8F5A8D12C69A7A930D91095BA22FBC6E623EE9C52B7C77
3,148,260 UART: [art] SIG.S = E4CC5E59E92FF805573ECA702761BA041CBBC018FE5D065E8441C5C816E78DA97F6ECCFE6FC37BBA5AA21A9E7F97F6A4
3,172,574 UART: Caliptra RT
3,172,919 UART: [state] CFI Enabled
3,280,843 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3188034 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,676 >>> mbox cmd response: success
2,776,689 UART: [afmc] ++
2,776,857 UART: [afmc] CDI.KEYID = 6
2,777,219 UART: [afmc] SUBJECT.KEYID = 7
2,777,644 UART: [afmc] AUTHORITY.KEYID = 5
2,813,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,998 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,836,709 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,842,609 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,848,306 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,856,157 UART: [afmc] --
2,857,034 UART: [cold-reset] --
2,858,078 UART: [state] Locking Datavault
2,859,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,025 UART: [state] Locking ICCM
2,860,499 UART: [exit] Launching FMC @ 0x40000130
2,865,828 UART:
2,865,844 UART: Running Caliptra FMC ...
2,866,252 UART:
2,866,395 UART: [state] CFI Enabled
2,877,325 UART: [fht] FMC Alias Private Key: 7
2,986,044 UART: [art] Extend RT PCRs Done
2,986,472 UART: [art] Lock RT PCRs Done
2,988,080 UART: [art] Populate DV Done
2,996,155 UART: [fht] FMC Alias Private Key: 7
2,997,095 UART: [art] Derive CDI
2,997,375 UART: [art] Store in in slot 0x4
3,082,954 UART: [art] Derive Key Pair
3,083,314 UART: [art] Store priv key in slot 0x5
3,096,620 UART: [art] Derive Key Pair - Done
3,111,486 UART: [art] Signing Cert with AUTHO
3,111,966 UART: RITY.KEYID = 7
3,127,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,933 UART: [art] PUB.X = 0065A92C7CCFF521AD3C22E190C8A9114BDD5BAE372CA0617A90E0E893C7DE5C03A180104F26AAB8F2EF277AAB914FBF
3,134,698 UART: [art] PUB.Y = 393784043360E724E285B50FA6CD2356815E833893039DC9E70D40DB9F6C64E79F339C1B71ED1A5B00C2681D7D800DC1
3,141,607 UART: [art] SIG.R = 598298C63697243A30E632E3B4146BC491E41356F4004790CED6656B363D3EFF076DC515AEC491050EDE15F6EF467B0B
3,148,341 UART: [art] SIG.S = F5C2D663F866C6BC281A365588BDA2196F4A4BB964912319D4DF4268F0733112A85FADAD8C2BDFA4FCEC4B5B15A11D0E
3,172,651 UART: Caliptra RT
3,172,996 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,276,637 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,279,134 UART: [rt] WDT Expired
3,279,421 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,426 >>> mbox cmd response: success
2,690,288 UART:
2,690,304 UART: Running Caliptra FMC ...
2,690,712 UART:
2,690,855 UART: [state] CFI Enabled
2,701,784 UART: [fht] FMC Alias Private Key: 7
2,810,493 UART: [art] Extend RT PCRs Done
2,810,921 UART: [art] Lock RT PCRs Done
2,812,529 UART: [art] Populate DV Done
2,820,604 UART: [fht] FMC Alias Private Key: 7
2,821,544 UART: [art] Derive CDI
2,821,824 UART: [art] Store in in slot 0x4
2,907,405 UART: [art] Derive Key Pair
2,907,765 UART: [art] Store priv key in slot 0x5
2,921,071 UART: [art] Derive Key Pair - Done
2,935,943 UART: [art] Signing Cert with AUTHO
2,936,423 UART: RITY.KEYID = 7
2,951,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,390 UART: [art] PUB.X = D1DF1DFCD9CCC23F11096121528892DDEF5E31E7EF0FEB9D383B2F4C1E7A0E4E2A5E5F2D75D7C1ACDA6AE004CE166667
2,959,174 UART: [art] PUB.Y = 20E3E77A9DE9B0CA1CA4A061FC9862FA1EA3DA92992BC548339DF4757770A948C7EF3E25EF30CE147077774B9C01B5C0
2,966,131 UART: [art] SIG.R = 47D380AECD520238EFF7CFA1E62DC033F354920CDEB6B28B4E48F1AB30BC67FAC80A8995066CF1496D05BBC17B742DA0
2,972,904 UART: [art] SIG.S = 73CD8E034C19B88B2D0AF1E4AB8E302E406947F7E2ED86C311256E6E9BDD01233D99BE2E36B674CC16B731885B9F5A40
2,997,202 UART: Caliptra RT
2,997,547 UART: [state] CFI Enabled
3,105,504 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,673 >>> mbox cmd response: success
2,690,524 UART:
2,690,540 UART: Running Caliptra FMC ...
2,690,948 UART:
2,691,091 UART: [state] CFI Enabled
2,702,021 UART: [fht] FMC Alias Private Key: 7
2,810,740 UART: [art] Extend RT PCRs Done
2,811,168 UART: [art] Lock RT PCRs Done
2,812,776 UART: [art] Populate DV Done
2,820,851 UART: [fht] FMC Alias Private Key: 7
2,821,791 UART: [art] Derive CDI
2,822,071 UART: [art] Store in in slot 0x4
2,907,650 UART: [art] Derive Key Pair
2,908,010 UART: [art] Store priv key in slot 0x5
2,921,316 UART: [art] Derive Key Pair - Done
2,936,189 UART: [art] Signing Cert with AUTHO
2,936,669 UART: RITY.KEYID = 7
2,951,871 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,636 UART: [art] PUB.X = 04FE706D3D023FE0776F577E66F1DF76F33B4B89E8BD3358D2F154075919C2FF1ECE86ED5770403A10F457680C4BE6BC
2,959,400 UART: [art] PUB.Y = 936A87983F9AA58AFAE40CA8A98E3662C783045822EAD4B31AA3328F1FBE42188D8BADF00026C9E2A15E5586C0155C59
2,966,328 UART: [art] SIG.R = BCA2D3A8A2ED828223D0F0FDB8E394BA0D76A27AC2A15FED49B20A5A72F66AB233C271BE5DFAC71B4363C8098D94AB54
2,973,111 UART: [art] SIG.S = 5AACE047EFCC990A3022D9386EAA0E9647D0D99073BE407712DC92FAB402B46A023960BF4EF2D6A8040DB82C794FF475
2,997,400 UART: Caliptra RT
2,997,745 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,101,272 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDE ra=0x40007056 error_internal_intr_r=00000040
3,103,771 UART: [rt] WDT Expired
3,104,058 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,164 >>> mbox cmd response: success
2,773,327 UART: [afmc] ++
2,773,495 UART: [afmc] CDI.KEYID = 6
2,773,858 UART: [afmc] SUBJECT.KEYID = 7
2,774,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,572 UART: [afmc] --
2,852,644 UART: [cold-reset] --
2,853,564 UART: [state] Locking Datavault
2,854,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,359 UART: [state] Locking ICCM
2,855,779 UART: [exit] Launching FMC @ 0x40000130
2,861,108 UART:
2,861,124 UART: Running Caliptra FMC ...
2,861,532 UART:
2,861,586 UART: [state] CFI Enabled
2,872,171 UART: [fht] FMC Alias Private Key: 7
2,979,512 UART: [art] Extend RT PCRs Done
2,979,940 UART: [art] Lock RT PCRs Done
2,981,672 UART: [art] Populate DV Done
2,989,951 UART: [fht] FMC Alias Private Key: 7
2,990,943 UART: [art] Derive CDI
2,991,223 UART: [art] Store in in slot 0x4
3,076,294 UART: [art] Derive Key Pair
3,076,654 UART: [art] Store priv key in slot 0x5
3,090,280 UART: [art] Derive Key Pair - Done
3,105,270 UART: [art] Signing Cert with AUTHO
3,105,750 UART: RITY.KEYID = 7
3,120,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,703 UART: [art] PUB.X = 11596BF70A149A17A4FB77871C4EB186EB4A4223B3ADFF1617973BE77560660A41980096A559FB3201A2F7A6E672D164
3,128,438 UART: [art] PUB.Y = E870DA51D10AA3A2E7F137BED7BA1898200894AAB56AA13E53D6A1D36724D3F0C24BC8B1F865C1813E9BAB5B88186787
3,135,392 UART: [art] SIG.R = F31FECC8F4AE1E514613BF82A69D29310EBF3129BF60B2D24F55D99C415AAE6953B86D1B09330A8364E16A9D40984815
3,142,157 UART: [art] SIG.S = 2830A287DF16744DC37566AED1DF602A9CC4634C14B49086D3E4F23BB779D115761AE3C1E7A240E4AA79441ED405C6D6
3,165,729 UART: Caliptra RT
3,165,982 UART: [state] CFI Enabled
3,273,701 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3181911 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,395 >>> mbox cmd response: success
2,773,555 UART: [afmc] ++
2,773,723 UART: [afmc] CDI.KEYID = 6
2,774,086 UART: [afmc] SUBJECT.KEYID = 7
2,774,512 UART: [afmc] AUTHORITY.KEYID = 5
2,809,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,710 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,422 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,320 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,017 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,757 UART: [afmc] --
2,852,828 UART: [cold-reset] --
2,853,748 UART: [state] Locking Datavault
2,854,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,543 UART: [state] Locking ICCM
2,855,963 UART: [exit] Launching FMC @ 0x40000130
2,861,292 UART:
2,861,308 UART: Running Caliptra FMC ...
2,861,716 UART:
2,861,770 UART: [state] CFI Enabled
2,872,356 UART: [fht] FMC Alias Private Key: 7
2,979,707 UART: [art] Extend RT PCRs Done
2,980,135 UART: [art] Lock RT PCRs Done
2,981,867 UART: [art] Populate DV Done
2,990,146 UART: [fht] FMC Alias Private Key: 7
2,991,138 UART: [art] Derive CDI
2,991,418 UART: [art] Store in in slot 0x4
3,076,487 UART: [art] Derive Key Pair
3,076,847 UART: [art] Store priv key in slot 0x5
3,090,473 UART: [art] Derive Key Pair - Done
3,105,455 UART: [art] Signing Cert with AUTHO
3,105,935 UART: RITY.KEYID = 7
3,121,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,888 UART: [art] PUB.X = 3CE0F9D6949F8DC548D8AEF4017F2A6BE8F92F11FE224AC5699838B0EF401BF2AE7BAE2627740F880F5BA71A61B69407
3,128,658 UART: [art] PUB.Y = 590FAD105150406F209F74A67C843848278845A0261DA3822D3A4A85982BD640AC5DB9DB3575A0F1D7C7F54DE5236808
3,135,596 UART: [art] SIG.R = 3228877C22772C61C7F04640C3110D47D74FA8E59E173D28D9741231545CEEFA94B2B283EB19A800D5EB7F120BA36FFB
3,142,340 UART: [art] SIG.S = 300F97706077B4F7CF121FC95DFF70FFFFE7430A320A2DAD697FEC37DFD8B1FBE4818702E3417318A0F0A02846144284
3,165,903 UART: Caliptra RT
3,166,156 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,503 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,272,000 UART: [rt] WDT Expired
3,272,287 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,030 >>> mbox cmd response: success
2,683,630 UART:
2,683,646 UART: Running Caliptra FMC ...
2,684,054 UART:
2,684,108 UART: [state] CFI Enabled
2,694,693 UART: [fht] FMC Alias Private Key: 7
2,802,034 UART: [art] Extend RT PCRs Done
2,802,462 UART: [art] Lock RT PCRs Done
2,804,194 UART: [art] Populate DV Done
2,812,473 UART: [fht] FMC Alias Private Key: 7
2,813,465 UART: [art] Derive CDI
2,813,745 UART: [art] Store in in slot 0x4
2,898,816 UART: [art] Derive Key Pair
2,899,176 UART: [art] Store priv key in slot 0x5
2,912,802 UART: [art] Derive Key Pair - Done
2,927,788 UART: [art] Signing Cert with AUTHO
2,928,268 UART: RITY.KEYID = 7
2,943,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,221 UART: [art] PUB.X = 191A33BCBB9DF10E6A985A981A6FE9947642F8EEC4A00348EA24A4C3148EE642C1055C60EBB4F39BAE61597683AB8537
2,950,990 UART: [art] PUB.Y = 5C830BDCDFDDCE0522D719DE59A249D47D715A2A371730A47804A47F15796420FCBBA93A9BDCA2743071645F5C72F5A2
2,957,939 UART: [art] SIG.R = 04BD6FAB7A5D4F704B09E593D43638BCD973EF9737B2DA1C465C8763B4B7388658A768F5A033389539EFD6D9AD730448
2,964,702 UART: [art] SIG.S = E9E7B91C11141513A99A0DA507244CDB261146DEF39F32D3C1BD7712E88C13FDE1A37194A70DC0D525971E3884BCFDA1
2,988,272 UART: Caliptra RT
2,988,525 UART: [state] CFI Enabled
3,096,312 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,277 >>> mbox cmd response: success
2,683,866 UART:
2,683,882 UART: Running Caliptra FMC ...
2,684,290 UART:
2,684,344 UART: [state] CFI Enabled
2,694,930 UART: [fht] FMC Alias Private Key: 7
2,802,281 UART: [art] Extend RT PCRs Done
2,802,709 UART: [art] Lock RT PCRs Done
2,804,441 UART: [art] Populate DV Done
2,812,720 UART: [fht] FMC Alias Private Key: 7
2,813,712 UART: [art] Derive CDI
2,813,992 UART: [art] Store in in slot 0x4
2,899,061 UART: [art] Derive Key Pair
2,899,421 UART: [art] Store priv key in slot 0x5
2,913,047 UART: [art] Derive Key Pair - Done
2,928,024 UART: [art] Signing Cert with AUTHO
2,928,504 UART: RITY.KEYID = 7
2,943,692 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,457 UART: [art] PUB.X = 0CE832EC201948821CABAFA0BF024FB11B03AB4CDE051B57BBDBCBB6161965525ECC7441393905476564A05ABC0E75EA
2,951,223 UART: [art] PUB.Y = B2EF55C956DD0EBD4BE4C984E194B8CEC8CF5D1FE3EC1407195D791B90F5139ABC8C436820402BC24E7D00B68410F39B
2,958,159 UART: [art] SIG.R = 8A0315FDA955A52D89158A07456E0B2451A404140CC8FA8822706EC95AFE974768BA14CE25F51357FE1FF7C39819AEAE
2,964,918 UART: [art] SIG.S = F7EC97BD0D1F384468FC6B6ED6BAAAAD451179C9875C706DDC68739C229EC650EADBD9F4F734242DA7A670E52DB7DCEB
2,988,508 UART: Caliptra RT
2,988,761 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,092,088 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,094,587 UART: [rt] WDT Expired
3,094,874 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,811,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,109 UART: [afmc] --
2,854,987 UART: [cold-reset] --
2,856,031 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,452 UART: [exit] Launching FMC @ 0x40000130
2,863,781 UART:
2,863,797 UART: Running Caliptra FMC ...
2,864,205 UART:
2,864,348 UART: [state] CFI Enabled
2,875,277 UART: [fht] FMC Alias Private Key: 7
2,983,986 UART: [art] Extend RT PCRs Done
2,984,414 UART: [art] Lock RT PCRs Done
2,986,022 UART: [art] Populate DV Done
2,994,097 UART: [fht] FMC Alias Private Key: 7
2,995,037 UART: [art] Derive CDI
2,995,317 UART: [art] Store in in slot 0x4
3,080,898 UART: [art] Derive Key Pair
3,081,258 UART: [art] Store priv key in slot 0x5
3,094,564 UART: [art] Derive Key Pair - Done
3,109,435 UART: [art] Signing Cert with AUTHO
3,109,915 UART: RITY.KEYID = 7
3,125,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,882 UART: [art] PUB.X = B14590D8D1018B9D7EEB4EC27BBDE105E61132D79AEC631CD27BFEE4F2A583AC4CFC335B33E743305C794965AFC60FD9
3,132,661 UART: [art] PUB.Y = 1462403F809BFB35C714090893A5529C259270E7B14D44F1D37690F49FD9DEF8A041EDC6B386584F5DA85B2F6C401FAA
3,139,607 UART: [art] SIG.R = 9FF632C9CCA152082592B581641079D9BE0AC5D6BF6F543E5ABA7D5AA916622941AAC6357BC1FC98519A03790684C83D
3,146,369 UART: [art] SIG.S = 6C44EA4DF33DD016B2B6581EA0C89ABC480C70914A94FEF88857D82109C8DFFFBEDCC66007C3C53A90C5EC8D658E0DDB
3,170,678 UART: Caliptra RT
3,171,023 UART: [state] CFI Enabled
3,278,930 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3186151 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,796 UART: [afmc] ++
2,774,964 UART: [afmc] CDI.KEYID = 6
2,775,327 UART: [afmc] SUBJECT.KEYID = 7
2,775,753 UART: [afmc] AUTHORITY.KEYID = 5
2,811,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,843 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,741 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,438 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,294 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,215 UART: [state] Locking Datavault
2,857,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,162 UART: [state] Locking ICCM
2,858,636 UART: [exit] Launching FMC @ 0x40000130
2,863,965 UART:
2,863,981 UART: Running Caliptra FMC ...
2,864,389 UART:
2,864,532 UART: [state] CFI Enabled
2,875,462 UART: [fht] FMC Alias Private Key: 7
2,984,181 UART: [art] Extend RT PCRs Done
2,984,609 UART: [art] Lock RT PCRs Done
2,986,217 UART: [art] Populate DV Done
2,994,292 UART: [fht] FMC Alias Private Key: 7
2,995,232 UART: [art] Derive CDI
2,995,512 UART: [art] Store in in slot 0x4
3,081,091 UART: [art] Derive Key Pair
3,081,451 UART: [art] Store priv key in slot 0x5
3,094,757 UART: [art] Derive Key Pair - Done
3,109,632 UART: [art] Signing Cert with AUTHO
3,110,112 UART: RITY.KEYID = 7
3,125,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,079 UART: [art] PUB.X = 45D9B4D670220FE9A4985FF1D8AA5647F066080A5FA747EDAFB3BA9A139FF8B18467C38A338B221D9B9A12218C72E35B
3,132,848 UART: [art] PUB.Y = DDC3848E8E2E30B253FB1BB2759A11439C097A721E9977B9FFB04190D00CC22ECD5265CABF784BC52A3A969282F75F97
3,139,800 UART: [art] SIG.R = AC060354172BF2F0F341B10E1D26E28A249B88A8702DC1CB1F80FF02ABEA3B1942747B33D4CD330E2D0E93BB4E68AF85
3,146,564 UART: [art] SIG.S = 0785826D7E6DDE2CD82E2E4530F2BBF98A0AEFC47310114633F8D7636D6BB7EEA5D7521B282B851083187EBDAF687701
3,170,858 UART: Caliptra RT
3,171,203 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,274,724 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,277,223 UART: [rt] WDT Expired
3,277,510 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,411 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,870 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,806,508 UART: [art] Extend RT PCRs Done
2,806,936 UART: [art] Lock RT PCRs Done
2,808,544 UART: [art] Populate DV Done
2,816,619 UART: [fht] FMC Alias Private Key: 7
2,817,559 UART: [art] Derive CDI
2,817,839 UART: [art] Store in in slot 0x4
2,903,420 UART: [art] Derive Key Pair
2,903,780 UART: [art] Store priv key in slot 0x5
2,917,086 UART: [art] Derive Key Pair - Done
2,931,954 UART: [art] Signing Cert with AUTHO
2,932,434 UART: RITY.KEYID = 7
2,947,636 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,401 UART: [art] PUB.X = 55AAA0B0FBFEE2796C402F3C35FBCC4E2E84E3D09D8B6686CDBCB0FF15917E9D7444DB74D24567010C7B151E9F66C223
2,955,181 UART: [art] PUB.Y = FE373CF20D28ADD2393EBEFD6A30A2FEAD032495D95CBE45608A87E9E1FD206D576B2792CB7DEF572DD603A2A6A071CD
2,962,144 UART: [art] SIG.R = D75A8ED0005B14CC7EED30226E25D9CF4C13FE3E1C342E3D61BE9DE8BB57611D56C031C0A9F7A7305A3677AFD4A52E07
2,968,905 UART: [art] SIG.S = CC982B6BB3886A3E5A46FA266AFD4D6426EDC3DA0B2859F2DB9DEBE9DEEBEEAAC34143FE3CF7E355D52A1328FBAA93CE
2,993,237 UART: Caliptra RT
2,993,582 UART: [state] CFI Enabled
3,101,506 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
2,686,539 UART:
2,686,555 UART: Running Caliptra FMC ...
2,686,963 UART:
2,687,106 UART: [state] CFI Enabled
2,698,036 UART: [fht] FMC Alias Private Key: 7
2,806,755 UART: [art] Extend RT PCRs Done
2,807,183 UART: [art] Lock RT PCRs Done
2,808,791 UART: [art] Populate DV Done
2,816,866 UART: [fht] FMC Alias Private Key: 7
2,817,806 UART: [art] Derive CDI
2,818,086 UART: [art] Store in in slot 0x4
2,903,665 UART: [art] Derive Key Pair
2,904,025 UART: [art] Store priv key in slot 0x5
2,917,331 UART: [art] Derive Key Pair - Done
2,932,206 UART: [art] Signing Cert with AUTHO
2,932,686 UART: RITY.KEYID = 7
2,947,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,653 UART: [art] PUB.X = E37762560DD2BE3B55952FF256321493D31AFC837F2D84DEEC34D18D6287AB01E685BA8171CB504022F1422022665F31
2,955,413 UART: [art] PUB.Y = 7E89A19ADB1CEA17F07F47DFDCBA592B8BF9971D702D45397F6CE8289FE258B3EC47CFAE23C2F10566E3057ABA9F0A73
2,962,374 UART: [art] SIG.R = FB31668D55410371560B0683A0A649A61A9329F0F99A965B4F5C5B620FBF7D67052F2909731C37A939B3E3F6C289D33B
2,969,120 UART: [art] SIG.S = 3FBC9EDB2A8B85669B93E32F5F4A11535846B24ED58837EB5CA4148A2C7A4E3B94C24F584D4C1133D7555C2284F4D948
2,993,421 UART: Caliptra RT
2,993,766 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,097,274 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,099,771 UART: [rt] WDT Expired
3,100,058 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,797 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,189 UART: [kat] SHA2-256
891,739 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,868 UART: [kat] ++
896,020 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,873 UART: [kat] HMAC-384Kdf
921,515 UART: [kat] LMS
1,169,827 UART: [kat] --
1,170,732 UART: [cold-reset] ++
1,171,226 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,740 UART: [kat] HMAC-384Kdf
921,278 UART: [kat] LMS
1,169,590 UART: [kat] --
1,170,681 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,797 UART: [idev] ++
1,173,965 UART: [idev] CDI.KEYID = 6
1,174,326 UART: [idev] SUBJECT.KEYID = 7
1,174,751 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
192,128 UART:
192,510 UART: Running Caliptra ROM ...
193,636 UART:
193,776 UART: [state] CFI Enabled
264,038 UART: [state] LifecycleState = Production
265,851 UART: [state] DebugLocked = Yes
267,704 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,142 UART: [kat] SHA2-256
442,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,375 UART: [kat] ++
453,868 UART: [kat] sha1
465,966 UART: [kat] SHA2-256
468,690 UART: [kat] SHA2-384
474,604 UART: [kat] SHA2-512-ACC
476,976 UART: [kat] ECC-384
2,768,887 UART: [kat] HMAC-384Kdf
2,800,944 UART: [kat] LMS
3,991,247 UART: [kat] --
3,996,257 UART: [cold-reset] ++
3,997,331 UART: [fht] Storing FHT @ 0x50003400
4,008,953 UART: [idev] ++
4,009,523 UART: [idev] CDI.KEYID = 6
4,010,431 UART: [idev] SUBJECT.KEYID = 7
4,011,683 UART: [idev] UDS.KEYID = 0
4,012,584 ready_for_fw is high
4,012,774 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,322 UART: [idev] Erasing UDS.KEYID = 0
7,347,860 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,359 UART: [idev] --
7,375,007 UART: [ldev] ++
7,375,588 UART: [ldev] CDI.KEYID = 6
7,376,523 UART: [ldev] SUBJECT.KEYID = 5
7,377,784 UART: [ldev] AUTHORITY.KEYID = 7
7,379,013 UART: [ldev] FE.KEYID = 1
7,424,156 UART: [ldev] Erasing FE.KEYID = 1
10,754,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,375 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,063,911 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,078,562 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,092,921 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,112,078 UART: [ldev] --
13,116,910 UART: [fwproc] Waiting for Commands...
13,118,834 UART: [fwproc] Received command 0x46574c44
13,121,035 UART: [fwproc] Received Image of size 114124 bytes
17,201,690 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,759 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,348,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,665,988 >>> mbox cmd response: success
17,669,747 UART: [afmc] ++
17,670,339 UART: [afmc] CDI.KEYID = 6
17,671,227 UART: [afmc] SUBJECT.KEYID = 7
17,672,500 UART: [afmc] AUTHORITY.KEYID = 5
21,029,451 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,118 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,344,760 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,359,493 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,373,775 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,395,291 UART: [afmc] --
23,399,678 UART: [cold-reset] --
23,404,162 UART: [state] Locking Datavault
23,411,625 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,325 UART: [state] Locking ICCM
23,415,281 UART: [exit] Launching FMC @ 0x40000130
23,423,667 UART:
23,423,895 UART: Running Caliptra FMC ...
23,424,915 UART:
23,425,059 UART: [state] CFI Enabled
23,488,661 UART: [fht] FMC Alias Private Key: 7
25,826,550 UART: [art] Extend RT PCRs Done
25,827,775 UART: [art] Lock RT PCRs Done
25,829,273 UART: [art] Populate DV Done
25,834,697 UART: [fht] FMC Alias Private Key: 7
25,836,290 UART: [art] Derive CDI
25,837,028 UART: [art] Store in in slot 0x4
25,896,468 UART: [art] Derive Key Pair
25,897,506 UART: [art] Store priv key in slot 0x5
29,189,841 UART: [art] Derive Key Pair - Done
29,202,671 UART: [art] Signing Cert with AUTHO
29,203,972 UART: RITY.KEYID = 7
31,490,874 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,388 UART: [art] PUB.X = EAE821344C95313A50B5660F4A757F72977027121C418250D1ED35BDB6E0976D58595E1318B204E39BAA206D96566E37
31,499,603 UART: [art] PUB.Y = A4F23BE3DDC9748C2CA9AC0178F3A4378EDC056C37577D3320AE93E57DB9A63F0B65975C095C16FBF44526A450E01CBE
31,506,871 UART: [art] SIG.R = 2008403D693B0D106856E31352FBA9EB00BBA9C9A3131F1530FC1609A6C2EB1B4B0E6D7E76686EA9F71FCDDAEF73C8C3
31,514,235 UART: [art] SIG.S = 45907FF221672F8BE9F8641D8244E67C682384A18D21F653EA88B72F9CB9CFECC176E19E87F582BCE5D5AA7C6EA33298
32,819,448 UART: Caliptra RT
32,820,163 UART: [state] CFI Enabled
32,982,454 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,004 UART:
1,172 UART: Running Caliptra ROM ...
2,232 UART:
2,377 UART: [state] CFI Enabled
62,663 UART: [state] LifecycleState = Production
64,429 UART: [state] DebugLocked = Yes
65,738 UART: [state] Starting the Watchdog Timer 40000000 cycles
70,520 UART: [kat] SHA2-256
240,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
250,770 UART: [kat] ++
251,296 UART: [kat] sha1
263,171 UART: [kat] SHA2-256
265,865 UART: [kat] SHA2-384
271,301 UART: [kat] SHA2-512-ACC
273,641 UART: [kat] ECC-384
2,569,004 UART: [kat] HMAC-384Kdf
2,598,625 UART: [kat] LMS
3,788,994 UART: [kat] --
3,793,458 UART: [warm-reset] ++
3,797,616 UART: [warm-reset] --
3,800,728 UART: [state] Locking Datavault
3,805,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,806,917 UART: [state] Locking ICCM
3,809,232 UART: [exit] Launching FMC @ 0x40000130
3,817,625 UART:
3,817,864 UART: Running Caliptra FMC ...
3,818,963 UART:
3,819,120 UART: [state] CFI Enabled
3,870,021 UART: [aliasrt :skip pcr extension
3,871,317 UART: [art] Extend RT PCRs Done
3,872,464 UART: [art] Lock RT PCRs Done
3,873,800 UART: [art] Populate DV Done
3,879,149 UART: [fht] FMC Alias Private Key: 7
3,880,741 UART: [art] Derive CDI
3,881,574 UART: [art] Store in in slot 0x4
3,938,401 UART: [art] Derive Key Pair
3,939,441 UART: [art] Store priv key in slot 0x5
7,232,134 UART: [art] Derive Key Pair - Done
7,245,515 UART: [art] Signing Cert with AUTHO
7,246,816 UART: RITY.KEYID = 7
9,533,378 UART: [art] Erasing AUTHORITY.KEYID = 7
9,534,889 UART: [art] PUB.X = EAE821344C95313A50B5660F4A757F72977027121C418250D1ED35BDB6E0976D58595E1318B204E39BAA206D96566E37
9,542,147 UART: [art] PUB.Y = A4F23BE3DDC9748C2CA9AC0178F3A4378EDC056C37577D3320AE93E57DB9A63F0B65975C095C16FBF44526A450E01CBE
9,549,378 UART: [art] SIG.R = 2008403D693B0D106856E31352FBA9EB00BBA9C9A3131F1530FC1609A6C2EB1B4B0E6D7E76686EA9F71FCDDAEF73C8C3
9,556,761 UART: [art] SIG.S = 45907FF221672F8BE9F8641D8244E67C682384A18D21F653EA88B72F9CB9CFECC176E19E87F582BCE5D5AA7C6EA33298
10,862,179 UART: Caliptra RT
10,862,870 UART: [state] CFI Enabled
11,199,587 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,784,203 ready_for_fw is high
3,784,612 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,474 >>> mbox cmd response: success
23,590,433 UART:
23,590,834 UART: Running Caliptra FMC ...
23,591,954 UART:
23,592,104 UART: [state] CFI Enabled
23,659,999 UART: [fht] FMC Alias Private Key: 7
25,997,922 UART: [art] Extend RT PCRs Done
25,999,167 UART: [art] Lock RT PCRs Done
26,000,885 UART: [art] Populate DV Done
26,006,262 UART: [fht] FMC Alias Private Key: 7
26,007,812 UART: [art] Derive CDI
26,008,552 UART: [art] Store in in slot 0x4
26,061,817 UART: [art] Derive Key Pair
26,062,863 UART: [art] Store priv key in slot 0x5
29,355,305 UART: [art] Derive Key Pair - Done
29,368,486 UART: [art] Signing Cert with AUTHO
29,369,797 UART: RITY.KEYID = 7
31,657,957 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,464 UART: [art] PUB.X = DAF018E8EF79D9A34AEC6F4F2B64752EA7174DFA04FEACB466769BF27CFF6BFFEF6949CCE9C9C9B2FD3EED57FDF0209A
31,666,782 UART: [art] PUB.Y = 0EA21E5CC540473993B87C2B198F97F4FBFF105784EE5ED61052CB232020F98242C85615D7A3744481DEEAD745B45ED0
31,674,016 UART: [art] SIG.R = B9C248AB2A265D30B30AF3E6182CF753D9795A8C9287CD157F2B5CC7D8390A5641B6659C425B4A604117EA68C0C32F34
31,681,361 UART: [art] SIG.S = 1A99CF88EAB5418B3C7FCF9808DE3A913F3A678DCE4A41A44EB8E6349FB428589A41E3503EB60608889B9D499A076E10
32,986,601 UART: Caliptra RT
32,987,307 UART: [state] CFI Enabled
33,147,421 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,590,846 UART:
3,591,165 UART: Running Caliptra FMC ...
3,592,402 UART:
3,592,569 UART: [state] CFI Enabled
3,638,455 UART: [aliasrt :skip pcr extension
3,639,772 UART: [art] Extend RT PCRs Done
3,640,926 UART: [art] Lock RT PCRs Done
3,642,120 UART: [art] Populate DV Done
3,647,937 UART: [fht] FMC Alias Private Key: 7
3,649,520 UART: [art] Derive CDI
3,650,257 UART: [art] Store in in slot 0x4
3,707,189 UART: [art] Derive Key Pair
3,708,234 UART: [art] Store priv key in slot 0x5
7,001,745 UART: [art] Derive Key Pair - Done
7,014,642 UART: [art] Signing Cert with AUTHO
7,015,960 UART: RITY.KEYID = 7
9,303,332 UART: [art] Erasing AUTHORITY.KEYID = 7
9,304,981 UART: [art] PUB.X = DAF018E8EF79D9A34AEC6F4F2B64752EA7174DFA04FEACB466769BF27CFF6BFFEF6949CCE9C9C9B2FD3EED57FDF0209A
9,312,119 UART: [art] PUB.Y = 0EA21E5CC540473993B87C2B198F97F4FBFF105784EE5ED61052CB232020F98242C85615D7A3744481DEEAD745B45ED0
9,319,358 UART: [art] SIG.R = B9C248AB2A265D30B30AF3E6182CF753D9795A8C9287CD157F2B5CC7D8390A5641B6659C425B4A604117EA68C0C32F34
9,326,746 UART: [art] SIG.S = 1A99CF88EAB5418B3C7FCF9808DE3A913F3A678DCE4A41A44EB8E6349FB428589A41E3503EB60608889B9D499A076E10
10,632,280 UART: Caliptra RT
10,632,999 UART: [state] CFI Enabled
10,961,835 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
191,862 UART:
192,219 UART: Running Caliptra ROM ...
193,310 UART:
603,154 UART: [state] CFI Enabled
617,164 UART: [state] LifecycleState = Production
618,990 UART: [state] DebugLocked = Yes
620,835 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,866 UART: [kat] SHA2-256
796,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,156 UART: [kat] ++
807,655 UART: [kat] sha1
817,956 UART: [kat] SHA2-256
820,687 UART: [kat] SHA2-384
825,963 UART: [kat] SHA2-512-ACC
828,327 UART: [kat] ECC-384
3,112,208 UART: [kat] HMAC-384Kdf
3,123,955 UART: [kat] LMS
4,314,107 UART: [kat] --
4,320,183 UART: [cold-reset] ++
4,322,619 UART: [fht] Storing FHT @ 0x50003400
4,334,734 UART: [idev] ++
4,335,368 UART: [idev] CDI.KEYID = 6
4,336,271 UART: [idev] SUBJECT.KEYID = 7
4,337,532 UART: [idev] UDS.KEYID = 0
4,338,508 ready_for_fw is high
4,338,706 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,038 UART: [idev] Erasing UDS.KEYID = 0
7,622,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,973 UART: [idev] --
7,649,293 UART: [ldev] ++
7,649,869 UART: [ldev] CDI.KEYID = 6
7,650,832 UART: [ldev] SUBJECT.KEYID = 5
7,652,040 UART: [ldev] AUTHORITY.KEYID = 7
7,653,273 UART: [ldev] FE.KEYID = 1
7,664,727 UART: [ldev] Erasing FE.KEYID = 1
10,957,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,658 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,245 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,277,827 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,206 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,310,060 UART: [ldev] --
13,314,256 UART: [fwproc] Waiting for Commands...
13,317,368 UART: [fwproc] Received command 0x46574c44
13,319,555 UART: [fwproc] Received Image of size 114124 bytes
17,395,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,466,674 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,535,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,853,233 >>> mbox cmd response: success
17,858,036 UART: [afmc] ++
17,858,625 UART: [afmc] CDI.KEYID = 6
17,859,530 UART: [afmc] SUBJECT.KEYID = 7
17,860,741 UART: [afmc] AUTHORITY.KEYID = 5
21,173,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,467,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,760 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,484,489 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,499,187 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,513,538 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,535,007 UART: [afmc] --
23,539,678 UART: [cold-reset] --
23,545,318 UART: [state] Locking Datavault
23,550,017 UART: [state] Locking PCR0, PCR1 and PCR31
23,551,774 UART: [state] Locking ICCM
23,553,278 UART: [exit] Launching FMC @ 0x40000130
23,561,660 UART:
23,561,902 UART: Running Caliptra FMC ...
23,562,996 UART:
23,563,154 UART: [state] CFI Enabled
23,571,064 UART: [fht] FMC Alias Private Key: 7
25,901,678 UART: [art] Extend RT PCRs Done
25,902,902 UART: [art] Lock RT PCRs Done
25,904,491 UART: [art] Populate DV Done
25,909,686 UART: [fht] FMC Alias Private Key: 7
25,911,218 UART: [art] Derive CDI
25,912,031 UART: [art] Store in in slot 0x4
25,954,520 UART: [art] Derive Key Pair
25,955,560 UART: [art] Store priv key in slot 0x5
29,197,667 UART: [art] Derive Key Pair - Done
29,210,329 UART: [art] Signing Cert with AUTHO
29,211,635 UART: RITY.KEYID = 7
31,491,456 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,968 UART: [art] PUB.X = CC8E93048466DCBA6C04C18DF23F0B8C5002B6E0FD94BDB83D60415857FF47C89051794F97568CA5D1E0E2C38017661C
31,500,229 UART: [art] PUB.Y = F2EEB026AA1139FED12F4F2DFC6E5703CB017287A7B6D0E7B6C40AB7A516D91D43D973356CEF824A68ADEFFFCDA710FF
31,507,516 UART: [art] SIG.R = 244EBC0CF20E94D346DE94B8B3F09644F1483FC17FB965D9C3B379C0245B6E1140B6C453164E644292424BEE013310D6
31,514,850 UART: [art] SIG.S = F29D5EF64375D9FC3AABE5A8247EC63E7D5806E526B08F7C23479B4B272F90D9B3C44F8B02FD0C50C00FE4E049F97DF6
32,819,530 UART: Caliptra RT
32,820,245 UART: [state] CFI Enabled
32,937,784 UART: [rt] RT listening for mailbox commands...
Initializing fuses
998 UART:
1,152 UART: Running Caliptra ROM ...
2,256 UART:
7,589,876 UART: [state] CFI Enabled
7,602,953 UART: [state] LifecycleState = Production
7,604,754 UART: [state] DebugLocked = Yes
7,607,069 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,612,454 UART: [kat] SHA2-256
7,782,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,792,726 UART: [kat] ++
7,793,241 UART: [kat] sha1
7,804,068 UART: [kat] SHA2-256
7,806,813 UART: [kat] SHA2-384
7,813,388 UART: [kat] SHA2-512-ACC
7,815,770 UART: [kat] ECC-384
10,099,002 UART: [kat] HMAC-384Kdf
10,111,283 UART: [kat] LMS
11,301,372 UART: [kat] --
11,304,765 UART: [warm-reset] ++
11,311,059 UART: [warm-reset] --
11,315,144 UART: [state] Locking Datavault
11,316,986 UART: [state] Locking PCR0, PCR1 and PCR31
11,318,743 UART: [state] Locking ICCM
11,321,564 UART: [exit] Launching FMC @ 0x40000130
11,329,957 UART:
11,330,197 UART: Running Caliptra FMC ...
11,331,217 UART:
11,331,360 UART: [state] CFI Enabled
11,333,357 UART: [aliasrt :skip pcr extension
11,334,788 UART: [art] Extend RT PCRs Done
11,335,880 UART: [art] Lock RT PCRs Done
11,336,945 UART: [art] Populate DV Done
11,342,487 UART: [fht] FMC Alias Private Key: 7
11,344,010 UART: [art] Derive CDI
11,344,744 UART: [art] Store in in slot 0x4
11,387,331 UART: [art] Derive Key Pair
11,388,329 UART: [art] Store priv key in slot 0x5
14,630,267 UART: [art] Derive Key Pair - Done
14,643,225 UART: [art] Signing Cert with AUTHO
14,644,539 UART: RITY.KEYID = 7
16,923,798 UART: [art] Erasing AUTHORITY.KEYID = 7
16,925,308 UART: [art] PUB.X = CC8E93048466DCBA6C04C18DF23F0B8C5002B6E0FD94BDB83D60415857FF47C89051794F97568CA5D1E0E2C38017661C
16,932,576 UART: [art] PUB.Y = F2EEB026AA1139FED12F4F2DFC6E5703CB017287A7B6D0E7B6C40AB7A516D91D43D973356CEF824A68ADEFFFCDA710FF
16,939,798 UART: [art] SIG.R = 244EBC0CF20E94D346DE94B8B3F09644F1483FC17FB965D9C3B379C0245B6E1140B6C453164E644292424BEE013310D6
16,947,197 UART: [art] SIG.S = F29D5EF64375D9FC3AABE5A8247EC63E7D5806E526B08F7C23479B4B272F90D9B3C44F8B02FD0C50C00FE4E049F97DF6
18,252,905 UART: Caliptra RT
18,253,623 UART: [state] CFI Enabled
18,539,696 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,132,414 ready_for_fw is high
4,132,792 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,104,668 >>> mbox cmd response: success
23,740,390 UART:
23,740,790 UART: Running Caliptra FMC ...
23,741,937 UART:
23,742,095 UART: [state] CFI Enabled
23,750,101 UART: [fht] FMC Alias Private Key: 7
26,080,620 UART: [art] Extend RT PCRs Done
26,081,860 UART: [art] Lock RT PCRs Done
26,083,547 UART: [art] Populate DV Done
26,088,750 UART: [fht] FMC Alias Private Key: 7
26,090,286 UART: [art] Derive CDI
26,091,101 UART: [art] Store in in slot 0x4
26,133,586 UART: [art] Derive Key Pair
26,134,575 UART: [art] Store priv key in slot 0x5
29,376,924 UART: [art] Derive Key Pair - Done
29,389,767 UART: [art] Signing Cert with AUTHO
29,391,071 UART: RITY.KEYID = 7
31,670,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,672,262 UART: [art] PUB.X = 1E78B0992CC7495F5BF2B13F9476A8BB1F4DD918800F27FA9A3FDB7DFFEEE456322A55F02FEE5920C6B7971619C7752A
31,679,526 UART: [art] PUB.Y = 323036DFDBAB3C087C1429D2FC74A5255AFDF9926EACDBE9589724FFE616EA74595091DA1F7336AF8476B2B452DA9EAC
31,686,766 UART: [art] SIG.R = 842AB339694952B28975231462397D370944D1E67865F9175932EFF23D347072FBEA9A9D8E2D94FADD8F9352C4CF4583
31,694,111 UART: [art] SIG.S = 23417C849171D40D1A6B3BE644DE637C8EECC8595117A92BEEEF1C54D89E84698D420DEB304C3BBD40EA4D8C88B74ED0
32,999,804 UART: Caliptra RT
33,000,523 UART: [state] CFI Enabled
33,117,901 UART: [rt] RT listening for mailbox commands...
Initializing fuses
10,943,235 UART:
10,943,579 UART: Running Caliptra FMC ...
10,944,646 UART:
10,944,797 UART: [state] CFI Enabled
10,946,698 UART: [aliasrt :skip pcr extension
10,947,947 UART: [art] Extend RT PCRs Done
10,949,077 UART: [art] Lock RT PCRs Done
10,950,327 UART: [art] Populate DV Done
10,955,948 UART: [fht] FMC Alias Private Key: 7
10,957,423 UART: [art] Derive CDI
10,958,178 UART: [art] Store in in slot 0x4
11,000,603 UART: [art] Derive Key Pair
11,001,608 UART: [art] Store priv key in slot 0x5
14,243,832 UART: [art] Derive Key Pair - Done
14,256,625 UART: [art] Signing Cert with AUTHO
14,257,926 UART: RITY.KEYID = 7
16,537,060 UART: [art] Erasing AUTHORITY.KEYID = 7
16,538,697 UART: [art] PUB.X = 1E78B0992CC7495F5BF2B13F9476A8BB1F4DD918800F27FA9A3FDB7DFFEEE456322A55F02FEE5920C6B7971619C7752A
16,545,845 UART: [art] PUB.Y = 323036DFDBAB3C087C1429D2FC74A5255AFDF9926EACDBE9589724FFE616EA74595091DA1F7336AF8476B2B452DA9EAC
16,553,089 UART: [art] SIG.R = 842AB339694952B28975231462397D370944D1E67865F9175932EFF23D347072FBEA9A9D8E2D94FADD8F9352C4CF4583
16,560,431 UART: [art] SIG.S = 23417C849171D40D1A6B3BE644DE637C8EECC8595117A92BEEEF1C54D89E84698D420DEB304C3BBD40EA4D8C88B74ED0
17,866,026 UART: Caliptra RT
17,866,737 UART: [state] CFI Enabled
18,155,559 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
192,179 UART:
192,548 UART: Running Caliptra ROM ...
193,720 UART:
193,870 UART: [state] CFI Enabled
260,435 UART: [state] LifecycleState = Production
262,172 UART: [state] DebugLocked = Yes
264,450 UART: [state] Starting the WD Timer 40000000 cycles
268,763 UART: [kat] SHA2-256
447,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,469 UART: [kat] ++
459,912 UART: [kat] sha1
469,523 UART: [kat] SHA2-256
472,542 UART: [kat] SHA2-384
478,898 UART: [kat] SHA2-512-ACC
481,868 UART: [kat] ECC-384
2,926,462 UART: [kat] HMAC-384Kdf
2,950,064 UART: [kat] LMS
3,479,538 UART: [kat] --
3,484,383 UART: [cold-reset] ++
3,485,315 UART: [fht] FHT @ 0x50003400
3,496,857 UART: [idev] ++
3,497,423 UART: [idev] CDI.KEYID = 6
3,498,401 UART: [idev] SUBJECT.KEYID = 7
3,499,569 UART: [idev] UDS.KEYID = 0
3,500,488 ready_for_fw is high
3,500,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,012 UART: [idev] Erasing UDS.KEYID = 0
6,005,796 UART: [idev] Sha1 KeyId Algorithm
6,029,716 UART: [idev] --
6,033,931 UART: [ldev] ++
6,034,521 UART: [ldev] CDI.KEYID = 6
6,035,408 UART: [ldev] SUBJECT.KEYID = 5
6,036,651 UART: [ldev] AUTHORITY.KEYID = 7
6,037,829 UART: [ldev] FE.KEYID = 1
6,081,508 UART: [ldev] Erasing FE.KEYID = 1
8,587,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,954 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,938 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,352,757 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,368,695 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,389,403 UART: [ldev] --
10,394,878 UART: [fwproc] Wait for Commands...
10,396,488 UART: [fwproc] Recv command 0x46574c44
10,398,583 UART: [fwproc] Recv'd Img size: 114448 bytes
13,834,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,979,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,298,214 >>> mbox cmd response: success
14,302,547 UART: [afmc] ++
14,303,130 UART: [afmc] CDI.KEYID = 6
14,304,040 UART: [afmc] SUBJECT.KEYID = 7
14,305,201 UART: [afmc] AUTHORITY.KEYID = 5
16,829,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,344 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,572,277 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,588,182 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,603,880 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,627,789 UART: [afmc] --
18,631,736 UART: [cold-reset] --
18,636,806 UART: [state] Locking Datavault
18,641,888 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,543 UART: [state] Locking ICCM
18,646,230 UART: [exit] Launching FMC @ 0x40000130
18,654,623 UART:
18,654,853 UART: Running Caliptra FMC ...
18,655,948 UART:
18,656,104 UART: [state] CFI Enabled
18,713,643 UART: [fht] FMC Alias Private Key: 7
20,476,817 UART: [art] Extend RT PCRs Done
20,478,046 UART: [art] Lock RT PCRs Done
20,479,811 UART: [art] Populate DV Done
20,485,438 UART: [fht] FMC Alias Private Key: 7
20,486,926 UART: [art] Derive CDI
20,487,684 UART: [art] Store in in slot 0x4
20,545,694 UART: [art] Derive Key Pair
20,546,706 UART: [art] Store priv key in slot 0x5
23,009,695 UART: [art] Derive Key Pair - Done
23,022,314 UART: [art] Signing Cert with AUTHO
23,023,614 UART: RITY.KEYID = 7
24,735,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,282 UART: [art] PUB.X = C98ED1E633DAA3994BB0E0E7DD3B85D63D725F269B5939B36B911E17B35C2AAD110F712F7C997BBDE8221F939EFBE048
24,744,528 UART: [art] PUB.Y = 875020647F114048FA695E31644E45EB38243E9351EF7CCFEDD6A2F8AEA3E760B42B94CE5B2E6F74ACD21FBAB1486E31
24,751,813 UART: [art] SIG.R = 2E511998FF42A5439ECB2BD9543263BCF4112ED6D4984D317EB07E5321F5FE65009BA6DF8AE4473DA127575BA6E7105E
24,759,198 UART: [art] SIG.S = 9690F117457EB282AB7C9DA67D967A5828F55793BDC3E18D883EC36EFB89BB3EC2F581F6AE255DA2011496EF8B0867AC
25,738,620 UART: Caliptra RT
25,739,321 UART: [state] CFI Enabled
25,904,271 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,012 UART:
1,273 UART: Running Caliptra ROM ...
2,378 UART:
2,555 UART: [state] CFI Enabled
63,640 UART: [state] LifecycleState = Production
65,399 UART: [state] DebugLocked = Yes
67,835 UART: [state] Starting the WD Timer 40000000 cycles
73,156 UART: [kat] SHA2-256
252,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,928 UART: [kat] ++
264,446 UART: [kat] sha1
274,788 UART: [kat] SHA2-256
277,784 UART: [kat] SHA2-384
284,401 UART: [kat] SHA2-512-ACC
287,334 UART: [kat] ECC-384
2,750,639 UART: [kat] HMAC-384Kdf
2,772,757 UART: [kat] LMS
3,302,237 UART: [kat] --
3,305,793 UART: [warm-reset] ++
3,310,495 UART: [warm-reset] --
3,314,249 UART: [state] Locking Datavault
3,318,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,839 UART: [state] Locking ICCM
3,320,962 UART: [exit] Launching FMC @ 0x40000130
3,329,414 UART:
3,329,652 UART: Running Caliptra FMC ...
3,330,753 UART:
3,330,908 UART: [state] CFI Enabled
3,382,142 UART: [aliasrt :skip pcr extension
3,383,430 UART: [art] Extend RT PCRs Done
3,384,576 UART: [art] Lock RT PCRs Done
3,385,861 UART: [art] Populate DV Done
3,391,480 UART: [fht] FMC Alias Private Key: 7
3,393,066 UART: [art] Derive CDI
3,393,881 UART: [art] Store in in slot 0x4
3,451,038 UART: [art] Derive Key Pair
3,452,087 UART: [art] Store priv key in slot 0x5
5,914,531 UART: [art] Derive Key Pair - Done
5,927,325 UART: [art] Signing Cert with AUTHO
5,928,643 UART: RITY.KEYID = 7
7,639,995 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,512 UART: [art] PUB.X = C98ED1E633DAA3994BB0E0E7DD3B85D63D725F269B5939B36B911E17B35C2AAD110F712F7C997BBDE8221F939EFBE048
7,648,816 UART: [art] PUB.Y = 875020647F114048FA695E31644E45EB38243E9351EF7CCFEDD6A2F8AEA3E760B42B94CE5B2E6F74ACD21FBAB1486E31
7,656,060 UART: [art] SIG.R = 2E511998FF42A5439ECB2BD9543263BCF4112ED6D4984D317EB07E5321F5FE65009BA6DF8AE4473DA127575BA6E7105E
7,663,418 UART: [art] SIG.S = 9690F117457EB282AB7C9DA67D967A5828F55793BDC3E18D883EC36EFB89BB3EC2F581F6AE255DA2011496EF8B0867AC
8,642,261 UART: Caliptra RT
8,642,955 UART: [state] CFI Enabled
8,978,694 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,384,073 ready_for_fw is high
3,384,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,099,521 >>> mbox cmd response: success
18,388,578 UART:
18,389,314 UART: Running Caliptra FMC ...
18,390,435 UART:
18,390,589 UART: [state] CFI Enabled
18,457,533 UART: [fht] FMC Alias Private Key: 7
20,222,018 UART: [art] Extend RT PCRs Done
20,223,254 UART: [art] Lock RT PCRs Done
20,224,639 UART: [art] Populate DV Done
20,229,953 UART: [fht] FMC Alias Private Key: 7
20,231,458 UART: [art] Derive CDI
20,232,223 UART: [art] Store in in slot 0x4
20,291,864 UART: [art] Derive Key Pair
20,292,902 UART: [art] Store priv key in slot 0x5
22,755,498 UART: [art] Derive Key Pair - Done
22,768,562 UART: [art] Signing Cert with AUTHO
22,769,862 UART: RITY.KEYID = 7
24,482,343 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,845 UART: [art] PUB.X = B7BCCB7E1C8961B2FB82AC88471B823CB1B2A35584CB493D2A74087B5576FD5542427EBCD61B3355C4F454647FB18289
24,491,065 UART: [art] PUB.Y = C7F35E565FFDC8930FAA3F1334DCE8ACB8316F5550129F76FD6FD82A8B6459127A886CD1DD3802334418F1BA069F8B36
24,498,375 UART: [art] SIG.R = 5FE8CFBDDAD700DC29890EF8A5CB3D8850A0CDFCD57A3010F90958DE97E58DA9517B4F0EC8E797D66E8A244E02AA7F9C
24,505,803 UART: [art] SIG.S = D2C23DC8AF6E37820D045CAE95BA89EDDE5870A06F1B77D11EB725CF5510368BB49781BE560C7EDAC317EA0CAFA39886
25,484,365 UART: Caliptra RT
25,485,081 UART: [state] CFI Enabled
25,649,831 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,189,724 UART:
3,190,039 UART: Running Caliptra FMC ...
3,191,113 UART:
3,191,265 UART: [state] CFI Enabled
3,254,222 UART: [aliasrt :skip pcr extension
3,255,523 UART: [art] Extend RT PCRs Done
3,256,673 UART: [art] Lock RT PCRs Done
3,258,081 UART: [art] Populate DV Done
3,263,544 UART: [fht] FMC Alias Private Key: 7
3,265,025 UART: [art] Derive CDI
3,265,838 UART: [art] Store in in slot 0x4
3,322,713 UART: [art] Derive Key Pair
3,323,750 UART: [art] Store priv key in slot 0x5
5,787,383 UART: [art] Derive Key Pair - Done
5,800,121 UART: [art] Signing Cert with AUTHO
5,801,612 UART: RITY.KEYID = 7
7,512,449 UART: [art] Erasing AUTHORITY.KEYID = 7
7,513,961 UART: [art] PUB.X = B7BCCB7E1C8961B2FB82AC88471B823CB1B2A35584CB493D2A74087B5576FD5542427EBCD61B3355C4F454647FB18289
7,521,216 UART: [art] PUB.Y = C7F35E565FFDC8930FAA3F1334DCE8ACB8316F5550129F76FD6FD82A8B6459127A886CD1DD3802334418F1BA069F8B36
7,528,501 UART: [art] SIG.R = 5FE8CFBDDAD700DC29890EF8A5CB3D8850A0CDFCD57A3010F90958DE97E58DA9517B4F0EC8E797D66E8A244E02AA7F9C
7,535,945 UART: [art] SIG.S = D2C23DC8AF6E37820D045CAE95BA89EDDE5870A06F1B77D11EB725CF5510368BB49781BE560C7EDAC317EA0CAFA39886
8,515,166 UART: Caliptra RT
8,515,874 UART: [state] CFI Enabled
8,851,726 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,789 writing to cptra_bootfsm_go
192,436 UART:
192,809 UART: Running Caliptra ROM ...
193,993 UART:
603,773 UART: [state] CFI Enabled
615,648 UART: [state] LifecycleState = Production
617,337 UART: [state] DebugLocked = Yes
619,950 UART: [state] Starting the WD Timer 40000000 cycles
624,920 UART: [kat] SHA2-256
804,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,658 UART: [kat] ++
816,097 UART: [kat] sha1
826,356 UART: [kat] SHA2-256
829,367 UART: [kat] SHA2-384
835,002 UART: [kat] SHA2-512-ACC
837,942 UART: [kat] ECC-384
3,278,775 UART: [kat] HMAC-384Kdf
3,291,586 UART: [kat] LMS
3,821,117 UART: [kat] --
3,825,111 UART: [cold-reset] ++
3,826,043 UART: [fht] FHT @ 0x50003400
3,836,948 UART: [idev] ++
3,837,509 UART: [idev] CDI.KEYID = 6
3,838,413 UART: [idev] SUBJECT.KEYID = 7
3,839,587 UART: [idev] UDS.KEYID = 0
3,840,629 ready_for_fw is high
3,840,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,535 UART: [idev] Erasing UDS.KEYID = 0
6,310,688 UART: [idev] Sha1 KeyId Algorithm
6,334,517 UART: [idev] --
6,338,346 UART: [ldev] ++
6,338,910 UART: [ldev] CDI.KEYID = 6
6,339,817 UART: [ldev] SUBJECT.KEYID = 5
6,341,024 UART: [ldev] AUTHORITY.KEYID = 7
6,342,275 UART: [ldev] FE.KEYID = 1
6,351,191 UART: [ldev] Erasing FE.KEYID = 1
8,825,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,398 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,558,405 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,574,227 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,590,152 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,611,190 UART: [ldev] --
10,615,529 UART: [fwproc] Wait for Commands...
10,617,029 UART: [fwproc] Recv command 0x46574c44
10,619,466 UART: [fwproc] Recv'd Img size: 114448 bytes
14,057,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,128,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,197,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,516,207 >>> mbox cmd response: success
14,520,460 UART: [afmc] ++
14,521,066 UART: [afmc] CDI.KEYID = 6
14,521,977 UART: [afmc] SUBJECT.KEYID = 7
14,523,139 UART: [afmc] AUTHORITY.KEYID = 5
17,025,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,746,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,880 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,763,861 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,779,713 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,795,429 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,818,260 UART: [afmc] --
18,822,553 UART: [cold-reset] --
18,826,681 UART: [state] Locking Datavault
18,831,655 UART: [state] Locking PCR0, PCR1 and PCR31
18,833,296 UART: [state] Locking ICCM
18,834,472 UART: [exit] Launching FMC @ 0x40000130
18,842,918 UART:
18,843,169 UART: Running Caliptra FMC ...
18,844,271 UART:
18,844,428 UART: [state] CFI Enabled
18,852,475 UART: [fht] FMC Alias Private Key: 7
20,609,938 UART: [art] Extend RT PCRs Done
20,611,167 UART: [art] Lock RT PCRs Done
20,612,689 UART: [art] Populate DV Done
20,618,212 UART: [fht] FMC Alias Private Key: 7
20,619,579 UART: [art] Derive CDI
20,620,321 UART: [art] Store in in slot 0x4
20,662,750 UART: [art] Derive Key Pair
20,663,745 UART: [art] Store priv key in slot 0x5
23,090,278 UART: [art] Derive Key Pair - Done
23,103,432 UART: [art] Signing Cert with AUTHO
23,104,766 UART: RITY.KEYID = 7
24,810,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,652 UART: [art] PUB.X = B1569A3C924D0E843B086C7AD3ED99241B9862D51B39448310F9A72CD54907CCC91641DD2C8977F2E876EE4878C2B0F1
24,818,899 UART: [art] PUB.Y = 1E5422E9BFFCF77481D5CDF4D78D6391895F8CFDCAE7AD93900F9EA9F389796726B00D3575E5E645B7B1FCCBC6E2680F
24,826,184 UART: [art] SIG.R = 4FE6DD220BDF01FB6BC5792C1CC06720FCB333DB2F60D43274F9D81FB97A542435B23C5E24BB85D61714CE50B8726C10
24,833,583 UART: [art] SIG.S = 82DFED5415FAFB81F288DCB4640CC0BF1E4C126F40160E9DB2422DA67988013E2E90F83297596BD72700075ACFD75AE5
25,812,538 UART: Caliptra RT
25,813,237 UART: [state] CFI Enabled
25,930,094 UART: [rt] RT listening for mailbox commands...
Initializing fuses
967 UART:
1,114 UART: Running Caliptra ROM ...
2,157 UART:
14,600,562 UART: [state] CFI Enabled
14,615,871 UART: [state] LifecycleState = Production
14,617,663 UART: [state] DebugLocked = Yes
14,618,982 UART: [state] Starting the WD Timer 40000000 cycles
14,624,633 UART: [kat] SHA2-256
14,803,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,815,391 UART: [kat] ++
14,815,925 UART: [kat] sha1
14,826,923 UART: [kat] SHA2-256
14,829,929 UART: [kat] SHA2-384
14,835,257 UART: [kat] SHA2-512-ACC
14,838,197 UART: [kat] ECC-384
17,279,051 UART: [kat] HMAC-384Kdf
17,292,301 UART: [kat] LMS
17,821,850 UART: [kat] --
17,828,593 UART: [warm-reset] ++
17,834,840 UART: [warm-reset] --
17,837,837 UART: [state] Locking Datavault
17,841,629 UART: [state] Locking PCR0, PCR1 and PCR31
17,843,270 UART: [state] Locking ICCM
17,844,611 UART: [exit] Launching FMC @ 0x40000130
17,853,080 UART:
17,853,318 UART: Running Caliptra FMC ...
17,854,412 UART:
17,854,564 UART: [state] CFI Enabled
17,856,508 UART: [aliasrt :skip pcr extension
17,857,757 UART: [art] Extend RT PCRs Done
17,858,890 UART: [art] Lock RT PCRs Done
17,860,171 UART: [art] Populate DV Done
17,865,735 UART: [fht] FMC Alias Private Key: 7
17,867,318 UART: [art] Derive CDI
17,868,127 UART: [art] Store in in slot 0x4
17,911,098 UART: [art] Derive Key Pair
17,912,143 UART: [art] Store priv key in slot 0x5
20,339,438 UART: [art] Derive Key Pair - Done
20,352,386 UART: [art] Signing Cert with AUTHO
20,353,691 UART: RITY.KEYID = 7
22,058,569 UART: [art] Erasing AUTHORITY.KEYID = 7
22,060,085 UART: [art] PUB.X = B1569A3C924D0E843B086C7AD3ED99241B9862D51B39448310F9A72CD54907CCC91641DD2C8977F2E876EE4878C2B0F1
22,067,332 UART: [art] PUB.Y = 1E5422E9BFFCF77481D5CDF4D78D6391895F8CFDCAE7AD93900F9EA9F389796726B00D3575E5E645B7B1FCCBC6E2680F
22,074,571 UART: [art] SIG.R = 4FE6DD220BDF01FB6BC5792C1CC06720FCB333DB2F60D43274F9D81FB97A542435B23C5E24BB85D61714CE50B8726C10
22,081,961 UART: [art] SIG.S = 82DFED5415FAFB81F288DCB4640CC0BF1E4C126F40160E9DB2422DA67988013E2E90F83297596BD72700075ACFD75AE5
23,061,262 UART: Caliptra RT
23,061,975 UART: [state] CFI Enabled
23,354,620 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,665 writing to cptra_bootfsm_go
3,696,790 ready_for_fw is high
3,697,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,306,158 >>> mbox cmd response: success
18,552,378 UART:
18,552,794 UART: Running Caliptra FMC ...
18,553,918 UART:
18,554,066 UART: [state] CFI Enabled
18,561,880 UART: [fht] FMC Alias Private Key: 7
20,318,811 UART: [art] Extend RT PCRs Done
20,320,038 UART: [art] Lock RT PCRs Done
20,321,582 UART: [art] Populate DV Done
20,326,894 UART: [fht] FMC Alias Private Key: 7
20,328,485 UART: [art] Derive CDI
20,329,220 UART: [art] Store in in slot 0x4
20,371,979 UART: [art] Derive Key Pair
20,373,018 UART: [art] Store priv key in slot 0x5
22,799,247 UART: [art] Derive Key Pair - Done
22,812,081 UART: [art] Signing Cert with AUTHO
22,813,389 UART: RITY.KEYID = 7
24,518,795 UART: [art] Erasing AUTHORITY.KEYID = 7
24,520,301 UART: [art] PUB.X = 214823A4D2EE2E4CCEBAC51F9B347DC0B53F8E611F3BD3262363DD88749F69E156D5C42F8E56D3BE9E7A9BF7B8A9F9BF
24,527,552 UART: [art] PUB.Y = C5E62307BAF1B489D48155C99DDA7F7CCDBF39032CB5F9348E7DE2FAC9B5C7E369BCB55A2BAB8E6E2B1E65C1BDC7CC8B
24,534,849 UART: [art] SIG.R = C3B34E795B24BBDFC127DF1588CE5702A3404E4A8E66666AD060C8104AA631191DBD1BD2A3B21A58D3A82864AE7CD899
24,542,259 UART: [art] SIG.S = 3A9579F62F5E7EC494CA1F416F513262B22C32F33360D038AF806561B1D8C594FAD92EA3E71C3135BFB796D9078309CF
25,521,088 UART: Caliptra RT
25,521,794 UART: [state] CFI Enabled
25,639,301 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,989,064 UART:
17,989,448 UART: Running Caliptra FMC ...
17,990,498 UART:
17,990,653 UART: [state] CFI Enabled
17,992,626 UART: [aliasrt :skip pcr extension
17,993,875 UART: [art] Extend RT PCRs Done
17,995,020 UART: [art] Lock RT PCRs Done
17,996,227 UART: [art] Populate DV Done
18,001,854 UART: [fht] FMC Alias Private Key: 7
18,003,444 UART: [art] Derive CDI
18,004,258 UART: [art] Store in in slot 0x4
18,046,824 UART: [art] Derive Key Pair
18,047,828 UART: [art] Store priv key in slot 0x5
20,474,649 UART: [art] Derive Key Pair - Done
20,488,084 UART: [art] Signing Cert with AUTHO
20,489,389 UART: RITY.KEYID = 7
22,195,001 UART: [art] Erasing AUTHORITY.KEYID = 7
22,196,518 UART: [art] PUB.X = 214823A4D2EE2E4CCEBAC51F9B347DC0B53F8E611F3BD3262363DD88749F69E156D5C42F8E56D3BE9E7A9BF7B8A9F9BF
22,203,778 UART: [art] PUB.Y = C5E62307BAF1B489D48155C99DDA7F7CCDBF39032CB5F9348E7DE2FAC9B5C7E369BCB55A2BAB8E6E2B1E65C1BDC7CC8B
22,211,065 UART: [art] SIG.R = C3B34E795B24BBDFC127DF1588CE5702A3404E4A8E66666AD060C8104AA631191DBD1BD2A3B21A58D3A82864AE7CD899
22,218,457 UART: [art] SIG.S = 3A9579F62F5E7EC494CA1F416F513262B22C32F33360D038AF806561B1D8C594FAD92EA3E71C3135BFB796D9078309CF
23,197,271 UART: Caliptra RT
23,197,963 UART: [state] CFI Enabled
23,486,871 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,035 UART:
192,415 UART: Running Caliptra ROM ...
193,562 UART:
193,704 UART: [state] CFI Enabled
267,162 UART: [state] LifecycleState = Production
269,398 UART: [state] DebugLocked = Yes
272,249 UART: [state] Starting the WD Timer 40000000 cycles
277,408 UART: [kat] SHA2-256
467,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,995 UART: [kat] ++
478,548 UART: [kat] sha1
489,159 UART: [kat] SHA2-256
492,178 UART: [kat] SHA2-384
496,462 UART: [kat] SHA2-512-ACC
499,042 UART: [kat] ECC-384
2,946,899 UART: [kat] HMAC-384Kdf
2,970,996 UART: [kat] LMS
3,502,827 UART: [kat] --
3,508,315 UART: [cold-reset] ++
3,510,600 UART: [fht] FHT @ 0x50003400
3,521,288 UART: [idev] ++
3,521,990 UART: [idev] CDI.KEYID = 6
3,523,021 UART: [idev] SUBJECT.KEYID = 7
3,524,123 UART: [idev] UDS.KEYID = 0
3,525,047 ready_for_fw is high
3,525,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,187 UART: [idev] Erasing UDS.KEYID = 0
6,030,164 UART: [idev] Sha1 KeyId Algorithm
6,052,430 UART: [idev] --
6,058,860 UART: [ldev] ++
6,059,707 UART: [ldev] CDI.KEYID = 6
6,060,656 UART: [ldev] SUBJECT.KEYID = 5
6,061,776 UART: [ldev] AUTHORITY.KEYID = 7
6,062,958 UART: [ldev] FE.KEYID = 1
6,098,176 UART: [ldev] Erasing FE.KEYID = 1
8,601,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,352 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,541 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,654 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,384,638 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,404,069 UART: [ldev] --
10,410,109 UART: [fwproc] Wait for Commands...
10,412,313 UART: [fwproc] Recv command 0x46574c44
10,414,294 UART: [fwproc] Recv'd Img size: 114448 bytes
13,902,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,094,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,636,805 >>> mbox cmd response: success
14,640,380 UART: [afmc] ++
14,641,079 UART: [afmc] CDI.KEYID = 6
14,642,262 UART: [afmc] SUBJECT.KEYID = 7
14,643,747 UART: [afmc] AUTHORITY.KEYID = 5
17,190,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,911,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,913,315 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,928,539 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,943,738 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,958,713 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,983,754 UART: [afmc] --
18,987,703 UART: [cold-reset] --
18,991,239 UART: [state] Locking Datavault
18,999,351 UART: [state] Locking PCR0, PCR1 and PCR31
19,001,487 UART: [state] Locking ICCM
19,004,130 UART: [exit] Launching FMC @ 0x40000130
19,012,812 UART:
19,013,051 UART: Running Caliptra FMC ...
19,014,151 UART:
19,014,308 UART: [state] CFI Enabled
19,069,685 UART: [fht] FMC Alias Private Key: 7
20,834,359 UART: [art] Extend RT PCRs Done
20,835,582 UART: [art] Lock RT PCRs Done
20,836,989 UART: [art] Populate DV Done
20,842,244 UART: [fht] FMC Alias Private Key: 7
20,843,908 UART: [art] Derive CDI
20,844,644 UART: [art] Store in in slot 0x4
20,902,714 UART: [art] Derive Key Pair
20,903,752 UART: [art] Store priv key in slot 0x5
23,367,107 UART: [art] Derive Key Pair - Done
23,380,162 UART: [art] Signing Cert with AUTHO
23,381,456 UART: RITY.KEYID = 7
25,092,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,357 UART: [art] PUB.X = BEFCA712B0EF2DAFBA8C25FCABFAC620F9E402BF36255FD4903A3B067D5BCFB1FE63659D0A66CF640D6EBF8593BE551A
25,101,729 UART: [art] PUB.Y = E0B48AACECADEF2FE42A4E24DAA2BC87DC21B1111C1A2BBCBE0DEDCC060BE170DC400B23E24046D335B75D7F446B9C23
25,109,032 UART: [art] SIG.R = 3F76EEAA1471294BEBC6C81B32023881041883D734B438DD0C98B1AA64466302FFE6FF977BFAB6CAFDA4DC31F46AD52F
25,116,425 UART: [art] SIG.S = 4727750708493A811C82001593490E939CC93F5F2E7A543549459708ED232BB91EA2EAAC964C9807B3F84FC48B17B45C
26,094,936 UART: Caliptra RT
26,095,648 UART: [state] CFI Enabled
26,261,142 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,025 UART:
1,186 UART: Running Caliptra ROM ...
2,227 UART:
2,371 UART: [state] CFI Enabled
65,823 UART: [state] LifecycleState = Production
67,692 UART: [state] DebugLocked = Yes
69,354 UART: [state] Starting the WD Timer 40000000 cycles
74,085 UART: [kat] SHA2-256
263,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,717 UART: [kat] ++
275,214 UART: [kat] sha1
285,873 UART: [kat] SHA2-256
288,859 UART: [kat] SHA2-384
295,868 UART: [kat] SHA2-512-ACC
298,485 UART: [kat] ECC-384
2,749,520 UART: [kat] HMAC-384Kdf
2,773,372 UART: [kat] LMS
3,304,905 UART: [kat] --
3,309,221 UART: [warm-reset] ++
3,313,739 UART: [warm-reset] --
3,318,086 UART: [state] Locking Datavault
3,321,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,323,276 UART: [state] Locking ICCM
3,324,619 UART: [exit] Launching FMC @ 0x40000130
3,333,287 UART:
3,333,520 UART: Running Caliptra FMC ...
3,334,618 UART:
3,334,772 UART: [state] CFI Enabled
3,382,265 UART: [aliasrt :skip pcr extension
3,383,518 UART: [art] Extend RT PCRs Done
3,384,651 UART: [art] Lock RT PCRs Done
3,385,984 UART: [art] Populate DV Done
3,391,459 UART: [fht] FMC Alias Private Key: 7
3,393,099 UART: [art] Derive CDI
3,393,914 UART: [art] Store in in slot 0x4
3,450,795 UART: [art] Derive Key Pair
3,451,838 UART: [art] Store priv key in slot 0x5
5,914,301 UART: [art] Derive Key Pair - Done
5,927,093 UART: [art] Signing Cert with AUTHO
5,928,389 UART: RITY.KEYID = 7
7,640,633 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,149 UART: [art] PUB.X = BEFCA712B0EF2DAFBA8C25FCABFAC620F9E402BF36255FD4903A3B067D5BCFB1FE63659D0A66CF640D6EBF8593BE551A
7,649,448 UART: [art] PUB.Y = E0B48AACECADEF2FE42A4E24DAA2BC87DC21B1111C1A2BBCBE0DEDCC060BE170DC400B23E24046D335B75D7F446B9C23
7,656,744 UART: [art] SIG.R = 3F76EEAA1471294BEBC6C81B32023881041883D734B438DD0C98B1AA64466302FFE6FF977BFAB6CAFDA4DC31F46AD52F
7,664,132 UART: [art] SIG.S = 4727750708493A811C82001593490E939CC93F5F2E7A543549459708ED232BB91EA2EAAC964C9807B3F84FC48B17B45C
8,643,497 UART: Caliptra RT
8,644,198 UART: [state] CFI Enabled
8,980,542 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,439,595 ready_for_fw is high
3,440,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,776,633 >>> mbox cmd response: success
19,067,302 UART:
19,067,753 UART: Running Caliptra FMC ...
19,068,871 UART:
19,069,029 UART: [state] CFI Enabled
19,136,519 UART: [fht] FMC Alias Private Key: 7
20,900,496 UART: [art] Extend RT PCRs Done
20,901,731 UART: [art] Lock RT PCRs Done
20,903,329 UART: [art] Populate DV Done
20,908,956 UART: [fht] FMC Alias Private Key: 7
20,910,602 UART: [art] Derive CDI
20,911,415 UART: [art] Store in in slot 0x4
20,969,705 UART: [art] Derive Key Pair
20,970,759 UART: [art] Store priv key in slot 0x5
23,433,642 UART: [art] Derive Key Pair - Done
23,446,654 UART: [art] Signing Cert with AUTHO
23,447,992 UART: RITY.KEYID = 7
25,159,945 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,451 UART: [art] PUB.X = 38B37570129DBDF7DDA04F9F52DD027546F8084E9D9835D8775B1F5A57550198B04A4939CD299428289EDCE54BBB2584
25,168,700 UART: [art] PUB.Y = 44E2C4AEFE092863FBDFB75D1514378F929786DDAF6F1146CFE1B86FB58F6FDD36BA26F2B34BB6C5AB4430F3F3A511B2
25,175,950 UART: [art] SIG.R = 76FE49FC02DA7584DDB16FFAB8765A9606F6EA4E062BAAD0F8A9CBE29E6606EBD7FC1C6137F63B52E64E1A71D1B40F05
25,183,400 UART: [art] SIG.S = A5E79EAEEC1343D21F36E2883A267588AD8C049631A421E9C57D4512A3C8A21592BB40216C0462556B7352F2F1016714
26,162,440 UART: Caliptra RT
26,163,134 UART: [state] CFI Enabled
26,328,751 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,245,908 UART:
3,246,230 UART: Running Caliptra FMC ...
3,247,355 UART:
3,247,538 UART: [state] CFI Enabled
3,295,920 UART: [aliasrt :skip pcr extension
3,297,210 UART: [art] Extend RT PCRs Done
3,298,359 UART: [art] Lock RT PCRs Done
3,299,604 UART: [art] Populate DV Done
3,305,553 UART: [fht] FMC Alias Private Key: 7
3,307,193 UART: [art] Derive CDI
3,308,004 UART: [art] Store in in slot 0x4
3,364,618 UART: [art] Derive Key Pair
3,365,656 UART: [art] Store priv key in slot 0x5
5,828,529 UART: [art] Derive Key Pair - Done
5,841,232 UART: [art] Signing Cert with AUTHO
5,842,559 UART: RITY.KEYID = 7
7,554,602 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,108 UART: [art] PUB.X = 38B37570129DBDF7DDA04F9F52DD027546F8084E9D9835D8775B1F5A57550198B04A4939CD299428289EDCE54BBB2584
7,563,354 UART: [art] PUB.Y = 44E2C4AEFE092863FBDFB75D1514378F929786DDAF6F1146CFE1B86FB58F6FDD36BA26F2B34BB6C5AB4430F3F3A511B2
7,570,665 UART: [art] SIG.R = 76FE49FC02DA7584DDB16FFAB8765A9606F6EA4E062BAAD0F8A9CBE29E6606EBD7FC1C6137F63B52E64E1A71D1B40F05
7,578,059 UART: [art] SIG.S = A5E79EAEEC1343D21F36E2883A267588AD8C049631A421E9C57D4512A3C8A21592BB40216C0462556B7352F2F1016714
8,557,088 UART: Caliptra RT
8,557,805 UART: [state] CFI Enabled
8,897,198 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
192,492 UART:
192,861 UART: Running Caliptra ROM ...
194,045 UART:
603,735 UART: [state] CFI Enabled
616,537 UART: [state] LifecycleState = Production
618,923 UART: [state] DebugLocked = Yes
621,633 UART: [state] Starting the WD Timer 40000000 cycles
627,293 UART: [kat] SHA2-256
817,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,941 UART: [kat] ++
828,538 UART: [kat] sha1
840,926 UART: [kat] SHA2-256
843,934 UART: [kat] SHA2-384
850,086 UART: [kat] SHA2-512-ACC
852,671 UART: [kat] ECC-384
3,293,916 UART: [kat] HMAC-384Kdf
3,308,437 UART: [kat] LMS
3,840,249 UART: [kat] --
3,843,891 UART: [cold-reset] ++
3,846,244 UART: [fht] FHT @ 0x50003400
3,858,781 UART: [idev] ++
3,859,491 UART: [idev] CDI.KEYID = 6
3,860,370 UART: [idev] SUBJECT.KEYID = 7
3,861,608 UART: [idev] UDS.KEYID = 0
3,862,528 ready_for_fw is high
3,862,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,806 UART: [idev] Erasing UDS.KEYID = 0
6,336,805 UART: [idev] Sha1 KeyId Algorithm
6,358,275 UART: [idev] --
6,362,772 UART: [ldev] ++
6,363,449 UART: [ldev] CDI.KEYID = 6
6,364,357 UART: [ldev] SUBJECT.KEYID = 5
6,365,514 UART: [ldev] AUTHORITY.KEYID = 7
6,366,741 UART: [ldev] FE.KEYID = 1
6,376,628 UART: [ldev] Erasing FE.KEYID = 1
8,857,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,415 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,592,592 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,607,704 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,622,704 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,643,594 UART: [ldev] --
10,648,910 UART: [fwproc] Wait for Commands...
10,650,998 UART: [fwproc] Recv command 0x46574c44
10,652,976 UART: [fwproc] Recv'd Img size: 114448 bytes
14,131,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,206,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,322,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,866,456 >>> mbox cmd response: success
14,869,924 UART: [afmc] ++
14,870,636 UART: [afmc] CDI.KEYID = 6
14,871,874 UART: [afmc] SUBJECT.KEYID = 7
14,873,305 UART: [afmc] AUTHORITY.KEYID = 5
17,379,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,103,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,105,649 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
19,120,870 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
19,136,038 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
19,150,980 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
19,174,883 UART: [afmc] --
19,177,701 UART: [cold-reset] --
19,182,320 UART: [state] Locking Datavault
19,186,768 UART: [state] Locking PCR0, PCR1 and PCR31
19,188,925 UART: [state] Locking ICCM
19,190,520 UART: [exit] Launching FMC @ 0x40000130
19,199,189 UART:
19,199,422 UART: Running Caliptra FMC ...
19,200,651 UART:
19,200,814 UART: [state] CFI Enabled
19,208,861 UART: [fht] FMC Alias Private Key: 7
20,965,454 UART: [art] Extend RT PCRs Done
20,966,695 UART: [art] Lock RT PCRs Done
20,968,610 UART: [art] Populate DV Done
20,974,019 UART: [fht] FMC Alias Private Key: 7
20,975,780 UART: [art] Derive CDI
20,976,516 UART: [art] Store in in slot 0x4
21,018,954 UART: [art] Derive Key Pair
21,020,000 UART: [art] Store priv key in slot 0x5
23,447,100 UART: [art] Derive Key Pair - Done
23,459,939 UART: [art] Signing Cert with AUTHO
23,461,238 UART: RITY.KEYID = 7
25,166,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,499 UART: [art] PUB.X = 878A90862A9032E3458BCA93606C42F2DDCB5DAC9DCD3154381BC8730826C79A28FB3038106CDDB23ED6DAB21253CD6C
25,175,803 UART: [art] PUB.Y = FEFD0F6295886F17926AA1707261E6ADB2F7EDC2DB0F973D56E4B8EAC7FFCA06682C5CC3FA657A585057A47185EB1139
25,183,063 UART: [art] SIG.R = 71EA6EA970F2413064FEEA251BDB41CE6A33CA34A5E6DA6831BDBFA7736414D7C5D847954F4341205371CABA1122BCF8
25,190,476 UART: [art] SIG.S = 5A7DC4890246571CF80DF5AF5162A92717F7F6EF79E091E36A60108ED274A136DAF7DCC5C56E2BB64F691A2AF1E348C4
26,169,149 UART: Caliptra RT
26,169,839 UART: [state] CFI Enabled
26,286,621 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,000 UART:
1,264 UART: Running Caliptra ROM ...
2,365 UART:
14,240,055 UART: [state] CFI Enabled
14,255,604 UART: [state] LifecycleState = Production
14,257,397 UART: [state] DebugLocked = Yes
14,259,755 UART: [state] Starting the WD Timer 40000000 cycles
14,265,584 UART: [kat] SHA2-256
14,455,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,466,328 UART: [kat] ++
14,466,838 UART: [kat] sha1
14,478,965 UART: [kat] SHA2-256
14,481,977 UART: [kat] SHA2-384
14,488,668 UART: [kat] SHA2-512-ACC
14,491,283 UART: [kat] ECC-384
16,934,415 UART: [kat] HMAC-384Kdf
16,946,439 UART: [kat] LMS
17,478,002 UART: [kat] --
17,482,994 UART: [warm-reset] ++
17,487,684 UART: [warm-reset] --
17,489,897 UART: [state] Locking Datavault
17,494,557 UART: [state] Locking PCR0, PCR1 and PCR31
17,496,199 UART: [state] Locking ICCM
17,498,564 UART: [exit] Launching FMC @ 0x40000130
17,507,192 UART:
17,507,426 UART: Running Caliptra FMC ...
17,508,526 UART:
17,508,683 UART: [state] CFI Enabled
17,510,733 UART: [aliasrt :skip pcr extension
17,511,975 UART: [art] Extend RT PCRs Done
17,513,111 UART: [art] Lock RT PCRs Done
17,514,711 UART: [art] Populate DV Done
17,520,001 UART: [fht] FMC Alias Private Key: 7
17,521,592 UART: [art] Derive CDI
17,522,401 UART: [art] Store in in slot 0x4
17,564,756 UART: [art] Derive Key Pair
17,565,813 UART: [art] Store priv key in slot 0x5
19,992,848 UART: [art] Derive Key Pair - Done
20,005,686 UART: [art] Signing Cert with AUTHO
20,006,995 UART: RITY.KEYID = 7
21,712,817 UART: [art] Erasing AUTHORITY.KEYID = 7
21,714,322 UART: [art] PUB.X = 878A90862A9032E3458BCA93606C42F2DDCB5DAC9DCD3154381BC8730826C79A28FB3038106CDDB23ED6DAB21253CD6C
21,721,570 UART: [art] PUB.Y = FEFD0F6295886F17926AA1707261E6ADB2F7EDC2DB0F973D56E4B8EAC7FFCA06682C5CC3FA657A585057A47185EB1139
21,728,853 UART: [art] SIG.R = 71EA6EA970F2413064FEEA251BDB41CE6A33CA34A5E6DA6831BDBFA7736414D7C5D847954F4341205371CABA1122BCF8
21,736,243 UART: [art] SIG.S = 5A7DC4890246571CF80DF5AF5162A92717F7F6EF79E091E36A60108ED274A136DAF7DCC5C56E2BB64F691A2AF1E348C4
22,714,734 UART: Caliptra RT
22,715,425 UART: [state] CFI Enabled
22,999,039 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,594 writing to cptra_bootfsm_go
3,753,974 ready_for_fw is high
3,754,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,004,775 >>> mbox cmd response: success
19,260,141 UART:
19,260,537 UART: Running Caliptra FMC ...
19,261,655 UART:
19,261,807 UART: [state] CFI Enabled
19,269,766 UART: [fht] FMC Alias Private Key: 7
21,026,645 UART: [art] Extend RT PCRs Done
21,027,893 UART: [art] Lock RT PCRs Done
21,029,494 UART: [art] Populate DV Done
21,034,756 UART: [fht] FMC Alias Private Key: 7
21,036,304 UART: [art] Derive CDI
21,037,045 UART: [art] Store in in slot 0x4
21,079,215 UART: [art] Derive Key Pair
21,080,258 UART: [art] Store priv key in slot 0x5
23,506,830 UART: [art] Derive Key Pair - Done
23,520,054 UART: [art] Signing Cert with AUTHO
23,521,373 UART: RITY.KEYID = 7
25,227,139 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,672 UART: [art] PUB.X = BD9DBAB3D6FB6893F39B92B64FF383077303E1B948911058A9A55C676864D6DEB88D59DD3C557257D1A27E49E0C16C96
25,235,865 UART: [art] PUB.Y = 31FA21A4814FDE3D06420C08F9D5E1094D1E9D5E001B28F0A6C2400E3B0362C6E0DC86518EA25297D676EF27CA252538
25,243,122 UART: [art] SIG.R = D0E3D6692991DF20543A727DE705895D13E6DC18C6AE4A0BA028D79717E21181CD6434EDE06EACA5609365E297E5BEFD
25,250,524 UART: [art] SIG.S = 1BD282A8E3105E25E67F6E625D4F08A11F30BDF90D7B5D8751E3ADF35936E563172A24033A52034B8A935DD44015FBAC
26,229,026 UART: Caliptra RT
26,229,727 UART: [state] CFI Enabled
26,347,332 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,336,235 UART:
17,336,596 UART: Running Caliptra FMC ...
17,337,633 UART:
17,337,785 UART: [state] CFI Enabled
17,339,955 UART: [aliasrt :skip pcr extension
17,341,203 UART: [art] Extend RT PCRs Done
17,342,342 UART: [art] Lock RT PCRs Done
17,343,499 UART: [art] Populate DV Done
17,348,749 UART: [fht] FMC Alias Private Key: 7
17,350,338 UART: [art] Derive CDI
17,351,384 UART: [art] Store in in slot 0x4
17,393,454 UART: [art] Derive Key Pair
17,394,480 UART: [art] Store priv key in slot 0x5
19,821,787 UART: [art] Derive Key Pair - Done
19,834,884 UART: [art] Signing Cert with AUTHO
19,836,226 UART: RITY.KEYID = 7
21,541,852 UART: [art] Erasing AUTHORITY.KEYID = 7
21,543,357 UART: [art] PUB.X = BD9DBAB3D6FB6893F39B92B64FF383077303E1B948911058A9A55C676864D6DEB88D59DD3C557257D1A27E49E0C16C96
21,550,621 UART: [art] PUB.Y = 31FA21A4814FDE3D06420C08F9D5E1094D1E9D5E001B28F0A6C2400E3B0362C6E0DC86518EA25297D676EF27CA252538
21,557,849 UART: [art] SIG.R = D0E3D6692991DF20543A727DE705895D13E6DC18C6AE4A0BA028D79717E21181CD6434EDE06EACA5609365E297E5BEFD
21,565,240 UART: [art] SIG.S = 1BD282A8E3105E25E67F6E625D4F08A11F30BDF90D7B5D8751E3ADF35936E563172A24033A52034B8A935DD44015FBAC
22,543,768 UART: Caliptra RT
22,544,453 UART: [state] CFI Enabled
22,834,600 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Production
86,221 UART: [state] DebugLocked = Yes
86,851 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,423 UART: [kat] SHA2-256
882,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,469 UART: [kat] ++
886,621 UART: [kat] sha1
890,985 UART: [kat] SHA2-256
892,923 UART: [kat] SHA2-384
895,510 UART: [kat] SHA2-512-ACC
897,411 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,110 UART: [kat] LMS
1,475,306 UART: [kat] --
1,476,283 UART: [cold-reset] ++
1,476,654 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 ready_for_fw is high
1,480,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,504,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,207 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,039 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,733 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,605 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,311 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,499 UART: [ldev] --
1,585,802 UART: [fwproc] Waiting for Commands...
1,586,657 UART: [fwproc] Received command 0x46574c44
1,587,448 UART: [fwproc] Received Image of size 114448 bytes
2,911,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,104,700 >>> mbox cmd response: success
3,105,805 UART: [afmc] ++
3,105,973 UART: [afmc] CDI.KEYID = 6
3,106,335 UART: [afmc] SUBJECT.KEYID = 7
3,106,760 UART: [afmc] AUTHORITY.KEYID = 5
3,141,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,157,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,158,523 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,164,241 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,170,136 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,175,847 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,183,581 UART: [afmc] --
3,184,568 UART: [cold-reset] --
3,185,444 UART: [state] Locking Datavault
3,186,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,187,379 UART: [state] Locking ICCM
3,187,943 UART: [exit] Launching FMC @ 0x40000130
3,193,272 UART:
3,193,288 UART: Running Caliptra FMC ...
3,193,696 UART:
3,193,750 UART: [state] CFI Enabled
3,204,363 UART: [fht] FMC Alias Private Key: 7
3,311,714 UART: [art] Extend RT PCRs Done
3,312,142 UART: [art] Lock RT PCRs Done
3,313,888 UART: [art] Populate DV Done
3,321,982 UART: [fht] FMC Alias Private Key: 7
3,323,114 UART: [art] Derive CDI
3,323,394 UART: [art] Store in in slot 0x4
3,409,457 UART: [art] Derive Key Pair
3,409,817 UART: [art] Store priv key in slot 0x5
3,422,931 UART: [art] Derive Key Pair - Done
3,437,421 UART: [art] Signing Cert with AUTHO
3,437,901 UART: RITY.KEYID = 7
3,453,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,453,830 UART: [art] PUB.X = F7E0C7B753A79A8BFC359507BA2895CF40900F681AE7BB6B413BBDB9FD45D405E286864F9AA4B89021EC5E365EB4C7E1
3,460,605 UART: [art] PUB.Y = 6B17F3A81C8A6261D034FD7A28BF8970745BA9E6A45E9CEDEB2FCD8A386471C78E700495EE3E7B769E8B7886DB0F9F40
3,467,561 UART: [art] SIG.R = ABABE0519BA92265EEA0C3D8EB3B656FFFBF07D34798B1C1C48674F153ED78BEAE1B06F69B91C4B0F14444FBF0D8BFE0
3,474,351 UART: [art] SIG.S = 5519D5734363407F57C3C5EBDD69DC5FBC63BDF26C5DCB81B0EFE92E02E4A094C60F829CB0AFE9087A0F29B2408AFB07
3,498,125 UART: Caliptra RT
3,498,378 UART: [state] CFI Enabled
3,605,931 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,606,690 UART:
3,606,706 UART: Running Caliptra ROM ...
3,607,114 UART:
3,607,168 UART: [state] CFI Enabled
3,610,103 UART: [state] LifecycleState = Production
3,610,711 UART: [state] DebugLocked = Yes
3,611,363 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,612,985 UART: [kat] SHA2-256
4,406,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,411,031 UART: [kat] ++
4,411,183 UART: [kat] sha1
4,415,249 UART: [kat] SHA2-256
4,417,187 UART: [kat] SHA2-384
4,419,824 UART: [kat] SHA2-512-ACC
4,421,725 UART: [kat] ECC-384
4,427,464 UART: [kat] HMAC-384Kdf
4,432,108 UART: [kat] LMS
5,000,304 UART: [kat] --
5,000,854 UART: [warm-reset] ++
5,001,749 UART: [warm-reset] --
5,002,596 UART: [state] Locking Datavault
5,003,444 UART: [state] Locking PCR0, PCR1 and PCR31
5,004,048 UART: [state] Locking ICCM
5,004,604 UART: [exit] Launching FMC @ 0x40000130
5,009,933 UART:
5,009,949 UART: Running Caliptra FMC ...
5,010,357 UART:
5,010,411 UART: [state] CFI Enabled
5,011,842 UART: [aliasrt :skip pcr extension
5,012,315 UART: [art] Extend RT PCRs Done
5,012,743 UART: [art] Lock RT PCRs Done
5,013,874 UART: [art] Populate DV Done
5,021,944 UART: [fht] FMC Alias Private Key: 7
5,023,090 UART: [art] Derive CDI
5,023,370 UART: [art] Store in in slot 0x4
5,108,913 UART: [art] Derive Key Pair
5,109,273 UART: [art] Store priv key in slot 0x5
5,122,501 UART: [art] Derive Key Pair - Done
5,137,561 UART: [art] Signing Cert with AUTHO
5,138,041 UART: RITY.KEYID = 7
5,152,867 UART: [art] Erasing AUTHORITY.KEYID = 7
5,153,632 UART: [art] PUB.X = F7E0C7B753A79A8BFC359507BA2895CF40900F681AE7BB6B413BBDB9FD45D405E286864F9AA4B89021EC5E365EB4C7E1
5,160,407 UART: [art] PUB.Y = 6B17F3A81C8A6261D034FD7A28BF8970745BA9E6A45E9CEDEB2FCD8A386471C78E700495EE3E7B769E8B7886DB0F9F40
5,167,363 UART: [art] SIG.R = ABABE0519BA92265EEA0C3D8EB3B656FFFBF07D34798B1C1C48674F153ED78BEAE1B06F69B91C4B0F14444FBF0D8BFE0
5,174,153 UART: [art] SIG.S = 5519D5734363407F57C3C5EBDD69DC5FBC63BDF26C5DCB81B0EFE92E02E4A094C60F829CB0AFE9087A0F29B2408AFB07
5,197,501 UART: Caliptra RT
5,197,754 UART: [state] CFI Enabled
5,478,153 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,378 ready_for_fw is high
1,362,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,953,542 >>> mbox cmd response: success
3,014,499 UART:
3,014,515 UART: Running Caliptra FMC ...
3,014,923 UART:
3,014,977 UART: [state] CFI Enabled
3,025,240 UART: [fht] FMC Alias Private Key: 7
3,132,983 UART: [art] Extend RT PCRs Done
3,133,411 UART: [art] Lock RT PCRs Done
3,134,967 UART: [art] Populate DV Done
3,143,309 UART: [fht] FMC Alias Private Key: 7
3,144,401 UART: [art] Derive CDI
3,144,681 UART: [art] Store in in slot 0x4
3,230,368 UART: [art] Derive Key Pair
3,230,728 UART: [art] Store priv key in slot 0x5
3,244,382 UART: [art] Derive Key Pair - Done
3,259,281 UART: [art] Signing Cert with AUTHO
3,259,761 UART: RITY.KEYID = 7
3,274,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,275,684 UART: [art] PUB.X = 4390F4B4AD36F2BBF6971F5F1E86DE8D275C3342420E8B7111D1CED471CE54E2FE4E2B09FA08D08FA61D74D4B608D79B
3,282,456 UART: [art] PUB.Y = 447ACF83B425DF79BC4A185E17DB0F4C681B87C74A24003BBDBDCDEE23BED158AA1EFF95D75BE744AB957B32A47174E1
3,289,403 UART: [art] SIG.R = 47E9EF99DEEC601B1F40B2535FD4E9DD0841E53B92CC4F45038136157921E39215023F7841A0F35FD81AC7001E6CD213
3,296,142 UART: [art] SIG.S = 7E337E78959BC72B8A97BD0DFFBB7B4259E634C82030FB7FD5BC732EF823E499CD9040225AD3B3DCC5C5CE134B6F0CEA
3,319,455 UART: Caliptra RT
3,319,708 UART: [state] CFI Enabled
3,429,128 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,714,382 UART:
4,714,398 UART: Running Caliptra FMC ...
4,714,806 UART:
4,714,860 UART: [state] CFI Enabled
4,716,347 UART: [aliasrt :skip pcr extension
4,716,820 UART: [art] Extend RT PCRs Done
4,717,248 UART: [art] Lock RT PCRs Done
4,718,395 UART: [art] Populate DV Done
4,726,687 UART: [fht] FMC Alias Private Key: 7
4,727,655 UART: [art] Derive CDI
4,727,935 UART: [art] Store in in slot 0x4
4,813,594 UART: [art] Derive Key Pair
4,813,954 UART: [art] Store priv key in slot 0x5
4,826,866 UART: [art] Derive Key Pair - Done
4,841,797 UART: [art] Signing Cert with AUTHO
4,842,277 UART: RITY.KEYID = 7
4,857,231 UART: [art] Erasing AUTHORITY.KEYID = 7
4,857,996 UART: [art] PUB.X = 4390F4B4AD36F2BBF6971F5F1E86DE8D275C3342420E8B7111D1CED471CE54E2FE4E2B09FA08D08FA61D74D4B608D79B
4,864,768 UART: [art] PUB.Y = 447ACF83B425DF79BC4A185E17DB0F4C681B87C74A24003BBDBDCDEE23BED158AA1EFF95D75BE744AB957B32A47174E1
4,871,715 UART: [art] SIG.R = 47E9EF99DEEC601B1F40B2535FD4E9DD0841E53B92CC4F45038136157921E39215023F7841A0F35FD81AC7001E6CD213
4,878,454 UART: [art] SIG.S = 7E337E78959BC72B8A97BD0DFFBB7B4259E634C82030FB7FD5BC732EF823E499CD9040225AD3B3DCC5C5CE134B6F0CEA
4,901,881 UART: Caliptra RT
4,902,134 UART: [state] CFI Enabled
5,185,058 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Production
86,220 UART: [state] DebugLocked = Yes
86,778 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,872 UART: [kat] SHA2-256
892,810 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,191 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 ready_for_fw is high
1,481,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,131 UART: [idev] Erasing UDS.KEYID = 0
1,505,616 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,213 UART: [idev] --
1,515,354 UART: [ldev] ++
1,515,522 UART: [ldev] CDI.KEYID = 6
1,515,885 UART: [ldev] SUBJECT.KEYID = 5
1,516,311 UART: [ldev] AUTHORITY.KEYID = 7
1,516,774 UART: [ldev] FE.KEYID = 1
1,522,164 UART: [ldev] Erasing FE.KEYID = 1
1,547,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,552 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,246 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,118 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,824 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,092 UART: [ldev] --
1,587,391 UART: [fwproc] Waiting for Commands...
1,588,080 UART: [fwproc] Received command 0x46574c44
1,588,871 UART: [fwproc] Received Image of size 114448 bytes
2,912,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,969,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,104,967 >>> mbox cmd response: success
3,106,224 UART: [afmc] ++
3,106,392 UART: [afmc] CDI.KEYID = 6
3,106,754 UART: [afmc] SUBJECT.KEYID = 7
3,107,179 UART: [afmc] AUTHORITY.KEYID = 5
3,142,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,158,766 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,159,546 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,165,264 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,171,159 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,176,870 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,184,610 UART: [afmc] --
3,185,581 UART: [cold-reset] --
3,186,495 UART: [state] Locking Datavault
3,187,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,188,356 UART: [state] Locking ICCM
3,188,786 UART: [exit] Launching FMC @ 0x40000130
3,194,115 UART:
3,194,131 UART: Running Caliptra FMC ...
3,194,539 UART:
3,194,682 UART: [state] CFI Enabled
3,205,111 UART: [fht] FMC Alias Private Key: 7
3,313,094 UART: [art] Extend RT PCRs Done
3,313,522 UART: [art] Lock RT PCRs Done
3,315,186 UART: [art] Populate DV Done
3,323,584 UART: [fht] FMC Alias Private Key: 7
3,324,696 UART: [art] Derive CDI
3,324,976 UART: [art] Store in in slot 0x4
3,410,549 UART: [art] Derive Key Pair
3,410,909 UART: [art] Store priv key in slot 0x5
3,424,483 UART: [art] Derive Key Pair - Done
3,439,157 UART: [art] Signing Cert with AUTHO
3,439,637 UART: RITY.KEYID = 7
3,455,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,456,088 UART: [art] PUB.X = C621DB0D3C139AA8869D0307E72D17F3766552B7EC96DF9CA62A39196AB101F9408997D70EF25D7E0DF74FEFD3FD864D
3,462,850 UART: [art] PUB.Y = ADC02A4B5504EAAD5B892A575700455FFA0CD3CBE178246445C19647891666F570573D9424AC43A4F1BE51BB7E055F6C
3,469,773 UART: [art] SIG.R = BF835A1115B0F234132A37495174F4EC5119113D22B58CA88AA79D19ECFB97EB67DD113DE2B08AD03576AF83D4ED2D70
3,476,551 UART: [art] SIG.S = 5EAD39214541ACD3821FA6DAC4EDADCE0BF83B032692D4E95C2EC5EA57AB4668A3EE58AF9765BDAEA6F352F8421AE433
3,500,614 UART: Caliptra RT
3,500,959 UART: [state] CFI Enabled
3,609,008 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,609,767 UART:
3,609,783 UART: Running Caliptra ROM ...
3,610,191 UART:
3,610,332 UART: [state] CFI Enabled
3,613,535 UART: [state] LifecycleState = Production
3,614,143 UART: [state] DebugLocked = Yes
3,614,819 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,616,427 UART: [kat] SHA2-256
4,410,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,414,473 UART: [kat] ++
4,414,625 UART: [kat] sha1
4,418,877 UART: [kat] SHA2-256
4,420,815 UART: [kat] SHA2-384
4,423,466 UART: [kat] SHA2-512-ACC
4,425,367 UART: [kat] ECC-384
4,430,918 UART: [kat] HMAC-384Kdf
4,435,336 UART: [kat] LMS
5,003,532 UART: [kat] --
5,004,520 UART: [warm-reset] ++
5,005,429 UART: [warm-reset] --
5,006,476 UART: [state] Locking Datavault
5,007,384 UART: [state] Locking PCR0, PCR1 and PCR31
5,007,988 UART: [state] Locking ICCM
5,008,612 UART: [exit] Launching FMC @ 0x40000130
5,013,941 UART:
5,013,957 UART: Running Caliptra FMC ...
5,014,365 UART:
5,014,508 UART: [state] CFI Enabled
5,016,003 UART: [aliasrt :skip pcr extension
5,016,476 UART: [art] Extend RT PCRs Done
5,016,904 UART: [art] Lock RT PCRs Done
5,018,217 UART: [art] Populate DV Done
5,026,147 UART: [fht] FMC Alias Private Key: 7
5,027,185 UART: [art] Derive CDI
5,027,465 UART: [art] Store in in slot 0x4
5,113,014 UART: [art] Derive Key Pair
5,113,374 UART: [art] Store priv key in slot 0x5
5,126,590 UART: [art] Derive Key Pair - Done
5,141,104 UART: [art] Signing Cert with AUTHO
5,141,584 UART: RITY.KEYID = 7
5,156,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,157,501 UART: [art] PUB.X = C621DB0D3C139AA8869D0307E72D17F3766552B7EC96DF9CA62A39196AB101F9408997D70EF25D7E0DF74FEFD3FD864D
5,164,263 UART: [art] PUB.Y = ADC02A4B5504EAAD5B892A575700455FFA0CD3CBE178246445C19647891666F570573D9424AC43A4F1BE51BB7E055F6C
5,171,186 UART: [art] SIG.R = BF835A1115B0F234132A37495174F4EC5119113D22B58CA88AA79D19ECFB97EB67DD113DE2B08AD03576AF83D4ED2D70
5,177,964 UART: [art] SIG.S = 5EAD39214541ACD3821FA6DAC4EDADCE0BF83B032692D4E95C2EC5EA57AB4668A3EE58AF9765BDAEA6F352F8421AE433
5,201,859 UART: Caliptra RT
5,202,204 UART: [state] CFI Enabled
5,482,083 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 ready_for_fw is high
1,363,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,956,853 >>> mbox cmd response: success
3,018,212 UART:
3,018,228 UART: Running Caliptra FMC ...
3,018,636 UART:
3,018,779 UART: [state] CFI Enabled
3,029,476 UART: [fht] FMC Alias Private Key: 7
3,137,475 UART: [art] Extend RT PCRs Done
3,137,903 UART: [art] Lock RT PCRs Done
3,139,525 UART: [art] Populate DV Done
3,147,871 UART: [fht] FMC Alias Private Key: 7
3,148,819 UART: [art] Derive CDI
3,149,099 UART: [art] Store in in slot 0x4
3,234,738 UART: [art] Derive Key Pair
3,235,098 UART: [art] Store priv key in slot 0x5
3,248,416 UART: [art] Derive Key Pair - Done
3,263,229 UART: [art] Signing Cert with AUTHO
3,263,709 UART: RITY.KEYID = 7
3,278,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,416 UART: [art] PUB.X = E588C6711BAAAD197E7F748D3CA08BA76003BEDC9E0B8EAAD7CCFCBBB13A9A683E2358B3A71DB496D0683652C0D6EB2C
3,286,206 UART: [art] PUB.Y = 67882DFF8F9845B3A33151B197C57D15E8DA11A85260938539C9FEB7CFB1A6B94DCFACD3B88257E7D05A905828A5E01A
3,293,164 UART: [art] SIG.R = 33687757200650A50FE4CF13A680CCE7BDE18201635745CCB1372AD4074D0C9F343AB48A6CF14F4319B1715A5105EAA7
3,299,916 UART: [art] SIG.S = 7B8DE9355F809A82CF37F6A4E6DB512D85438460D5ABB8FDB54D384E412B13C135D0F43BCE2A3189C85CC4B47C048BF2
3,324,266 UART: Caliptra RT
3,324,611 UART: [state] CFI Enabled
3,433,087 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,719,278 UART:
4,719,294 UART: Running Caliptra FMC ...
4,719,702 UART:
4,719,845 UART: [state] CFI Enabled
4,721,094 UART: [aliasrt :skip pcr extension
4,721,567 UART: [art] Extend RT PCRs Done
4,721,995 UART: [art] Lock RT PCRs Done
4,723,332 UART: [art] Populate DV Done
4,731,506 UART: [fht] FMC Alias Private Key: 7
4,732,490 UART: [art] Derive CDI
4,732,770 UART: [art] Store in in slot 0x4
4,818,515 UART: [art] Derive Key Pair
4,818,875 UART: [art] Store priv key in slot 0x5
4,832,409 UART: [art] Derive Key Pair - Done
4,847,350 UART: [art] Signing Cert with AUTHO
4,847,830 UART: RITY.KEYID = 7
4,862,848 UART: [art] Erasing AUTHORITY.KEYID = 7
4,863,613 UART: [art] PUB.X = E588C6711BAAAD197E7F748D3CA08BA76003BEDC9E0B8EAAD7CCFCBBB13A9A683E2358B3A71DB496D0683652C0D6EB2C
4,870,403 UART: [art] PUB.Y = 67882DFF8F9845B3A33151B197C57D15E8DA11A85260938539C9FEB7CFB1A6B94DCFACD3B88257E7D05A905828A5E01A
4,877,361 UART: [art] SIG.R = 33687757200650A50FE4CF13A680CCE7BDE18201635745CCB1372AD4074D0C9F343AB48A6CF14F4319B1715A5105EAA7
4,884,113 UART: [art] SIG.S = 7B8DE9355F809A82CF37F6A4E6DB512D85438460D5ABB8FDB54D384E412B13C135D0F43BCE2A3189C85CC4B47C048BF2
4,907,631 UART: Caliptra RT
4,907,976 UART: [state] CFI Enabled
5,192,184 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Production
85,817 UART: [state] DebugLocked = Yes
86,477 UART: [state] Starting the WD Timer 40000000 cycles
88,010 UART: [kat] SHA2-256
893,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,785 UART: [kat] ++
897,937 UART: [kat] sha1
902,281 UART: [kat] SHA2-256
904,221 UART: [kat] SHA2-384
906,960 UART: [kat] SHA2-512-ACC
908,861 UART: [kat] ECC-384
918,602 UART: [kat] HMAC-384Kdf
923,064 UART: [kat] LMS
1,171,392 UART: [kat] --
1,172,445 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 ready_for_fw is high
1,176,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,746 UART: [idev] Erasing UDS.KEYID = 0
1,201,964 UART: [idev] Sha1 KeyId Algorithm
1,210,561 UART: [idev] --
1,211,605 UART: [ldev] ++
1,211,773 UART: [ldev] CDI.KEYID = 6
1,212,136 UART: [ldev] SUBJECT.KEYID = 5
1,212,562 UART: [ldev] AUTHORITY.KEYID = 7
1,213,025 UART: [ldev] FE.KEYID = 1
1,217,873 UART: [ldev] Erasing FE.KEYID = 1
1,244,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,717 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,411 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,283 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,989 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,010 UART: [ldev] --
1,283,459 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,461 >>> mbox cmd response: success
2,802,700 UART: [afmc] ++
2,802,868 UART: [afmc] CDI.KEYID = 6
2,803,230 UART: [afmc] SUBJECT.KEYID = 7
2,803,655 UART: [afmc] AUTHORITY.KEYID = 5
2,838,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,325 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,043 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,938 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,645 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,331 UART: [afmc] --
2,881,290 UART: [cold-reset] --
2,882,112 UART: [state] Locking Datavault
2,883,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,687 UART: [state] Locking ICCM
2,884,189 UART: [exit] Launching FMC @ 0x40000130
2,889,518 UART:
2,889,534 UART: Running Caliptra FMC ...
2,889,942 UART:
2,889,996 UART: [state] CFI Enabled
2,900,619 UART: [fht] FMC Alias Private Key: 7
3,009,118 UART: [art] Extend RT PCRs Done
3,009,546 UART: [art] Lock RT PCRs Done
3,010,800 UART: [art] Populate DV Done
3,019,170 UART: [fht] FMC Alias Private Key: 7
3,020,178 UART: [art] Derive CDI
3,020,458 UART: [art] Store in in slot 0x4
3,106,457 UART: [art] Derive Key Pair
3,106,817 UART: [art] Store priv key in slot 0x5
3,119,541 UART: [art] Derive Key Pair - Done
3,134,325 UART: [art] Signing Cert with AUTHO
3,134,805 UART: RITY.KEYID = 7
3,149,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,448 UART: [art] PUB.X = B2431DDCEB3A1142028C3E22EA428E10AA85B0F6FDC07C01AA9C079C73C4A7B929B388083983296A2C5F5154921B6927
3,157,208 UART: [art] PUB.Y = 2F5BDA9500FD6D1900F64F7B332AC252E378C6FC6AECC9DEB1B64FE133EC2E2B375F0940CC65E87B9114E31F2AB2B55B
3,164,131 UART: [art] SIG.R = 85723C287E021C0A2E54451C6C699D14082E2E00F851DD75297234AD99D4A0AC33AB6F573233AA4B608063F9BBCA7E19
3,170,870 UART: [art] SIG.S = B26DF5481397DE32A0542836974B04F9411902AC374B0364AB0A4022144D80F53A34A2132F4D2C28B6DD8423DC8BBAC3
3,194,225 UART: Caliptra RT
3,194,478 UART: [state] CFI Enabled
3,303,045 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,801 UART:
3,303,817 UART: Running Caliptra ROM ...
3,304,225 UART:
3,304,280 UART: [state] CFI Enabled
3,307,363 UART: [state] LifecycleState = Production
3,307,971 UART: [state] DebugLocked = Yes
3,308,647 UART: [state] Starting the WD Timer 40000000 cycles
3,310,340 UART: [kat] SHA2-256
4,115,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,120,115 UART: [kat] ++
4,120,267 UART: [kat] sha1
4,124,505 UART: [kat] SHA2-256
4,126,445 UART: [kat] SHA2-384
4,129,194 UART: [kat] SHA2-512-ACC
4,131,095 UART: [kat] ECC-384
4,140,526 UART: [kat] HMAC-384Kdf
4,145,078 UART: [kat] LMS
4,393,406 UART: [kat] --
4,394,296 UART: [warm-reset] ++
4,394,993 UART: [warm-reset] --
4,395,782 UART: [state] Locking Datavault
4,396,584 UART: [state] Locking PCR0, PCR1 and PCR31
4,397,188 UART: [state] Locking ICCM
4,397,706 UART: [exit] Launching FMC @ 0x40000130
4,403,035 UART:
4,403,051 UART: Running Caliptra FMC ...
4,403,459 UART:
4,403,513 UART: [state] CFI Enabled
4,404,820 UART: [aliasrt :skip pcr extension
4,405,293 UART: [art] Extend RT PCRs Done
4,405,721 UART: [art] Lock RT PCRs Done
4,406,986 UART: [art] Populate DV Done
4,415,218 UART: [fht] FMC Alias Private Key: 7
4,416,364 UART: [art] Derive CDI
4,416,644 UART: [art] Store in in slot 0x4
4,502,769 UART: [art] Derive Key Pair
4,503,129 UART: [art] Store priv key in slot 0x5
4,516,515 UART: [art] Derive Key Pair - Done
4,531,309 UART: [art] Signing Cert with AUTHO
4,531,789 UART: RITY.KEYID = 7
4,546,781 UART: [art] Erasing AUTHORITY.KEYID = 7
4,547,546 UART: [art] PUB.X = B2431DDCEB3A1142028C3E22EA428E10AA85B0F6FDC07C01AA9C079C73C4A7B929B388083983296A2C5F5154921B6927
4,554,306 UART: [art] PUB.Y = 2F5BDA9500FD6D1900F64F7B332AC252E378C6FC6AECC9DEB1B64FE133EC2E2B375F0940CC65E87B9114E31F2AB2B55B
4,561,229 UART: [art] SIG.R = 85723C287E021C0A2E54451C6C699D14082E2E00F851DD75297234AD99D4A0AC33AB6F573233AA4B608063F9BBCA7E19
4,567,968 UART: [art] SIG.S = B26DF5481397DE32A0542836974B04F9411902AC374B0364AB0A4022144D80F53A34A2132F4D2C28B6DD8423DC8BBAC3
4,591,931 UART: Caliptra RT
4,592,184 UART: [state] CFI Enabled
4,872,677 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,826 ready_for_fw is high
1,060,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,654,252 >>> mbox cmd response: success
2,716,691 UART:
2,716,707 UART: Running Caliptra FMC ...
2,717,115 UART:
2,717,169 UART: [state] CFI Enabled
2,727,820 UART: [fht] FMC Alias Private Key: 7
2,835,895 UART: [art] Extend RT PCRs Done
2,836,323 UART: [art] Lock RT PCRs Done
2,837,821 UART: [art] Populate DV Done
2,845,997 UART: [fht] FMC Alias Private Key: 7
2,846,983 UART: [art] Derive CDI
2,847,263 UART: [art] Store in in slot 0x4
2,932,514 UART: [art] Derive Key Pair
2,932,874 UART: [art] Store priv key in slot 0x5
2,945,814 UART: [art] Derive Key Pair - Done
2,960,650 UART: [art] Signing Cert with AUTHO
2,961,130 UART: RITY.KEYID = 7
2,976,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,977,315 UART: [art] PUB.X = 0B0E272F0F3EBAE19E563B7D90100EFFF360606AF7732D0818BCCF5BA4295E110FD6114E0FD1A88100A1FBF8EF2BD0FB
2,984,062 UART: [art] PUB.Y = 252DF02BBDA9190B290A25A48D4CCDA9A70634B09E13838A110EB4EEA18BE37A5A08D5A4B6437D1763A0BCA4086D97F9
2,991,006 UART: [art] SIG.R = 4B2177EC7759EB0F1DD4C0EC2AA813F0548F4DC6CE54CCA1C6C9D4321A668B87C5E882E38B3FA3225624D59F7E61DABA
2,997,791 UART: [art] SIG.S = 05641883C1931A0CD4AAC302C90FC4745180B3E5D2BB7E8E28CC647B69B27AB43E79CAA7F247390407B239F5714B5FEC
3,021,532 UART: Caliptra RT
3,021,785 UART: [state] CFI Enabled
3,129,611 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,113,005 UART:
4,113,021 UART: Running Caliptra FMC ...
4,113,429 UART:
4,113,483 UART: [state] CFI Enabled
4,114,616 UART: [aliasrt :skip pcr extension
4,115,089 UART: [art] Extend RT PCRs Done
4,115,517 UART: [art] Lock RT PCRs Done
4,116,718 UART: [art] Populate DV Done
4,124,998 UART: [fht] FMC Alias Private Key: 7
4,125,966 UART: [art] Derive CDI
4,126,246 UART: [art] Store in in slot 0x4
4,211,879 UART: [art] Derive Key Pair
4,212,239 UART: [art] Store priv key in slot 0x5
4,225,245 UART: [art] Derive Key Pair - Done
4,240,119 UART: [art] Signing Cert with AUTHO
4,240,599 UART: RITY.KEYID = 7
4,255,291 UART: [art] Erasing AUTHORITY.KEYID = 7
4,256,056 UART: [art] PUB.X = 0B0E272F0F3EBAE19E563B7D90100EFFF360606AF7732D0818BCCF5BA4295E110FD6114E0FD1A88100A1FBF8EF2BD0FB
4,262,803 UART: [art] PUB.Y = 252DF02BBDA9190B290A25A48D4CCDA9A70634B09E13838A110EB4EEA18BE37A5A08D5A4B6437D1763A0BCA4086D97F9
4,269,747 UART: [art] SIG.R = 4B2177EC7759EB0F1DD4C0EC2AA813F0548F4DC6CE54CCA1C6C9D4321A668B87C5E882E38B3FA3225624D59F7E61DABA
4,276,532 UART: [art] SIG.S = 05641883C1931A0CD4AAC302C90FC4745180B3E5D2BB7E8E28CC647B69B27AB43E79CAA7F247390407B239F5714B5FEC
4,300,639 UART: Caliptra RT
4,300,892 UART: [state] CFI Enabled
4,586,594 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Production
86,038 UART: [state] DebugLocked = Yes
86,636 UART: [state] Starting the WD Timer 40000000 cycles
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,430 UART: [idev] ++
1,175,598 UART: [idev] CDI.KEYID = 6
1,175,958 UART: [idev] SUBJECT.KEYID = 7
1,176,382 UART: [idev] UDS.KEYID = 0
1,176,727 ready_for_fw is high
1,176,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,425 UART: [idev] Sha1 KeyId Algorithm
1,209,936 UART: [idev] --
1,211,012 UART: [ldev] ++
1,211,180 UART: [ldev] CDI.KEYID = 6
1,211,543 UART: [ldev] SUBJECT.KEYID = 5
1,211,969 UART: [ldev] AUTHORITY.KEYID = 7
1,212,432 UART: [ldev] FE.KEYID = 1
1,217,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,024 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,718 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,590 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,296 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,383 UART: [ldev] --
1,283,822 UART: [fwproc] Wait for Commands...
1,284,560 UART: [fwproc] Recv command 0x46574c44
1,285,288 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,750 >>> mbox cmd response: success
2,802,809 UART: [afmc] ++
2,802,977 UART: [afmc] CDI.KEYID = 6
2,803,339 UART: [afmc] SUBJECT.KEYID = 7
2,803,764 UART: [afmc] AUTHORITY.KEYID = 5
2,838,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,856,234 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,952 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,847 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,554 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,424 UART: [afmc] --
2,882,309 UART: [cold-reset] --
2,883,157 UART: [state] Locking Datavault
2,883,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,590 UART: [state] Locking ICCM
2,885,218 UART: [exit] Launching FMC @ 0x40000130
2,890,547 UART:
2,890,563 UART: Running Caliptra FMC ...
2,890,971 UART:
2,891,114 UART: [state] CFI Enabled
2,901,381 UART: [fht] FMC Alias Private Key: 7
3,008,924 UART: [art] Extend RT PCRs Done
3,009,352 UART: [art] Lock RT PCRs Done
3,010,976 UART: [art] Populate DV Done
3,019,380 UART: [fht] FMC Alias Private Key: 7
3,020,506 UART: [art] Derive CDI
3,020,786 UART: [art] Store in in slot 0x4
3,106,581 UART: [art] Derive Key Pair
3,106,941 UART: [art] Store priv key in slot 0x5
3,119,827 UART: [art] Derive Key Pair - Done
3,134,722 UART: [art] Signing Cert with AUTHO
3,135,202 UART: RITY.KEYID = 7
3,150,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,131 UART: [art] PUB.X = C16280DD22D2F7B82C40D3CDBB0F99A5981114E40C335B868545462C6A22FA061126EAF920BCDCC3A80A77B2031FAB86
3,157,894 UART: [art] PUB.Y = DF908734F7A7080BD648C55B7F19F543B8D41999237706D8C3C25EA097B0DF3F43099B3E6296BF1654BB99E5DE29C475
3,164,832 UART: [art] SIG.R = 7F78B71D1D5923539FBB02C1196CD12F4F0DEB9B17AA1425D58155899BEAA1662C9D62DA1FA60297B8F952F804966EC8
3,171,596 UART: [art] SIG.S = FFCFC10EC3F457B99AC78A4056587156D423A263C12F41A1673C370A07A935E8460C0A5C6273AC16A013B5546683F6C2
3,195,332 UART: Caliptra RT
3,195,677 UART: [state] CFI Enabled
3,303,412 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,168 UART:
3,304,184 UART: Running Caliptra ROM ...
3,304,592 UART:
3,304,734 UART: [state] CFI Enabled
3,307,835 UART: [state] LifecycleState = Production
3,308,443 UART: [state] DebugLocked = Yes
3,309,093 UART: [state] Starting the WD Timer 40000000 cycles
3,310,650 UART: [kat] SHA2-256
4,116,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,120,425 UART: [kat] ++
4,120,577 UART: [kat] sha1
4,124,969 UART: [kat] SHA2-256
4,126,909 UART: [kat] SHA2-384
4,129,572 UART: [kat] SHA2-512-ACC
4,131,473 UART: [kat] ECC-384
4,141,510 UART: [kat] HMAC-384Kdf
4,146,046 UART: [kat] LMS
4,394,374 UART: [kat] --
4,395,286 UART: [warm-reset] ++
4,396,351 UART: [warm-reset] --
4,397,126 UART: [state] Locking Datavault
4,397,720 UART: [state] Locking PCR0, PCR1 and PCR31
4,398,324 UART: [state] Locking ICCM
4,398,886 UART: [exit] Launching FMC @ 0x40000130
4,404,215 UART:
4,404,231 UART: Running Caliptra FMC ...
4,404,639 UART:
4,404,782 UART: [state] CFI Enabled
4,406,145 UART: [aliasrt :skip pcr extension
4,406,618 UART: [art] Extend RT PCRs Done
4,407,046 UART: [art] Lock RT PCRs Done
4,408,255 UART: [art] Populate DV Done
4,416,611 UART: [fht] FMC Alias Private Key: 7
4,417,581 UART: [art] Derive CDI
4,417,861 UART: [art] Store in in slot 0x4
4,503,386 UART: [art] Derive Key Pair
4,503,746 UART: [art] Store priv key in slot 0x5
4,517,520 UART: [art] Derive Key Pair - Done
4,532,151 UART: [art] Signing Cert with AUTHO
4,532,631 UART: RITY.KEYID = 7
4,548,195 UART: [art] Erasing AUTHORITY.KEYID = 7
4,548,960 UART: [art] PUB.X = C16280DD22D2F7B82C40D3CDBB0F99A5981114E40C335B868545462C6A22FA061126EAF920BCDCC3A80A77B2031FAB86
4,555,723 UART: [art] PUB.Y = DF908734F7A7080BD648C55B7F19F543B8D41999237706D8C3C25EA097B0DF3F43099B3E6296BF1654BB99E5DE29C475
4,562,661 UART: [art] SIG.R = 7F78B71D1D5923539FBB02C1196CD12F4F0DEB9B17AA1425D58155899BEAA1662C9D62DA1FA60297B8F952F804966EC8
4,569,425 UART: [art] SIG.S = FFCFC10EC3F457B99AC78A4056587156D423A263C12F41A1673C370A07A935E8460C0A5C6273AC16A013B5546683F6C2
4,593,491 UART: Caliptra RT
4,593,836 UART: [state] CFI Enabled
4,879,121 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 ready_for_fw is high
1,060,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,653,271 >>> mbox cmd response: success
2,714,048 UART:
2,714,064 UART: Running Caliptra FMC ...
2,714,472 UART:
2,714,615 UART: [state] CFI Enabled
2,725,292 UART: [fht] FMC Alias Private Key: 7
2,833,339 UART: [art] Extend RT PCRs Done
2,833,767 UART: [art] Lock RT PCRs Done
2,835,247 UART: [art] Populate DV Done
2,843,421 UART: [fht] FMC Alias Private Key: 7
2,844,485 UART: [art] Derive CDI
2,844,765 UART: [art] Store in in slot 0x4
2,930,182 UART: [art] Derive Key Pair
2,930,542 UART: [art] Store priv key in slot 0x5
2,943,954 UART: [art] Derive Key Pair - Done
2,958,601 UART: [art] Signing Cert with AUTHO
2,959,081 UART: RITY.KEYID = 7
2,974,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,204 UART: [art] PUB.X = 3A159C596506E7E89E692352758A01E4BD964D6D05615DB380C617B3B44B262377B7301D00FC3DC57B24D4678A2A0EF7
2,981,936 UART: [art] PUB.Y = 05C817735576FE66EDA90F2538F822120D35641E903E75C2B2F674A242BF5AE4D795EF1E1CAEEF6DD9257F7DB5895207
2,988,878 UART: [art] SIG.R = FC9C8A4EEF1400B14885DAC21E37078CF4D359C319ABAC38D7E980F991055FD1809B9A51B5E75EAFEA979260763276AE
2,995,630 UART: [art] SIG.S = 183D79FA3A5D39E010994785088A1E64E2BC84DE3669D7525BC79D86365F3E5FA412B75C0A91970475608C8C67A61E8C
3,019,058 UART: Caliptra RT
3,019,403 UART: [state] CFI Enabled
3,128,042 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,111,169 UART:
4,111,185 UART: Running Caliptra FMC ...
4,111,593 UART:
4,111,736 UART: [state] CFI Enabled
4,113,147 UART: [aliasrt :skip pcr extension
4,113,620 UART: [art] Extend RT PCRs Done
4,114,048 UART: [art] Lock RT PCRs Done
4,115,185 UART: [art] Populate DV Done
4,123,203 UART: [fht] FMC Alias Private Key: 7
4,124,139 UART: [art] Derive CDI
4,124,419 UART: [art] Store in in slot 0x4
4,210,210 UART: [art] Derive Key Pair
4,210,570 UART: [art] Store priv key in slot 0x5
4,223,654 UART: [art] Derive Key Pair - Done
4,238,289 UART: [art] Signing Cert with AUTHO
4,238,769 UART: RITY.KEYID = 7
4,253,933 UART: [art] Erasing AUTHORITY.KEYID = 7
4,254,698 UART: [art] PUB.X = 3A159C596506E7E89E692352758A01E4BD964D6D05615DB380C617B3B44B262377B7301D00FC3DC57B24D4678A2A0EF7
4,261,430 UART: [art] PUB.Y = 05C817735576FE66EDA90F2538F822120D35641E903E75C2B2F674A242BF5AE4D795EF1E1CAEEF6DD9257F7DB5895207
4,268,372 UART: [art] SIG.R = FC9C8A4EEF1400B14885DAC21E37078CF4D359C319ABAC38D7E980F991055FD1809B9A51B5E75EAFEA979260763276AE
4,275,124 UART: [art] SIG.S = 183D79FA3A5D39E010994785088A1E64E2BC84DE3669D7525BC79D86365F3E5FA412B75C0A91970475608C8C67A61E8C
4,299,044 UART: Caliptra RT
4,299,389 UART: [state] CFI Enabled
4,579,614 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Production
85,791 UART: [state] DebugLocked = Yes
86,515 UART: [state] Starting the WD Timer 40000000 cycles
88,014 UART: [kat] SHA2-256
891,564 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,693 UART: [kat] ++
895,845 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,174,106 ready_for_fw is high
1,174,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,565 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,259 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,129 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,835 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,841 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,313 >>> mbox cmd response: success
2,800,429 UART: [afmc] ++
2,800,597 UART: [afmc] CDI.KEYID = 6
2,800,960 UART: [afmc] SUBJECT.KEYID = 7
2,801,386 UART: [afmc] AUTHORITY.KEYID = 5
2,836,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,304 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,023 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,916 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,623 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,484 UART: [afmc] --
2,879,453 UART: [cold-reset] --
2,880,361 UART: [state] Locking Datavault
2,881,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,212 UART: [state] Locking ICCM
2,882,694 UART: [exit] Launching FMC @ 0x40000130
2,888,023 UART:
2,888,039 UART: Running Caliptra FMC ...
2,888,447 UART:
2,888,501 UART: [state] CFI Enabled
2,899,072 UART: [fht] FMC Alias Private Key: 7
3,006,775 UART: [art] Extend RT PCRs Done
3,007,203 UART: [art] Lock RT PCRs Done
3,008,679 UART: [art] Populate DV Done
3,016,785 UART: [fht] FMC Alias Private Key: 7
3,017,749 UART: [art] Derive CDI
3,018,029 UART: [art] Store in in slot 0x4
3,104,030 UART: [art] Derive Key Pair
3,104,390 UART: [art] Store priv key in slot 0x5
3,117,584 UART: [art] Derive Key Pair - Done
3,132,664 UART: [art] Signing Cert with AUTHO
3,133,144 UART: RITY.KEYID = 7
3,148,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,099 UART: [art] PUB.X = E4BA494CF37FF4327D15BB6393A8D06364C629750D6C6316E3CB3D221D817C75A7CE35B25C2A896D33AB021328975E71
3,155,863 UART: [art] PUB.Y = 483F65C69134A5E00547DE5D4CFF7B6DFEB81BD0D9ED24019C739D691EF448BE4DC45CAF24D6B908D0211911CC7DA2DF
3,162,822 UART: [art] SIG.R = F248B50B50FD03D96C6E1B656176776774D5D4A731B72EB70BB083477D61431082D8740438F1957747ECA3E1F1DC1122
3,169,572 UART: [art] SIG.S = CCD9CD2588A7F22E80020BF22CF80369B81DE0941B82219AEE0DE2707696C60C07F2AE799FE44A46443A01F41D77432D
3,193,656 UART: Caliptra RT
3,193,909 UART: [state] CFI Enabled
3,301,126 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,882 UART:
3,301,898 UART: Running Caliptra ROM ...
3,302,306 UART:
3,302,361 UART: [state] CFI Enabled
3,305,114 UART: [state] LifecycleState = Production
3,305,722 UART: [state] DebugLocked = Yes
3,306,454 UART: [state] Starting the WD Timer 40000000 cycles
3,308,009 UART: [kat] SHA2-256
4,111,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,688 UART: [kat] ++
4,115,840 UART: [kat] sha1
4,119,952 UART: [kat] SHA2-256
4,121,892 UART: [kat] SHA2-384
4,124,775 UART: [kat] SHA2-512-ACC
4,126,676 UART: [kat] ECC-384
4,136,611 UART: [kat] HMAC-384Kdf
4,141,349 UART: [kat] LMS
4,389,661 UART: [kat] --
4,390,557 UART: [warm-reset] ++
4,391,816 UART: [warm-reset] --
4,392,627 UART: [state] Locking Datavault
4,393,477 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,081 UART: [state] Locking ICCM
4,394,513 UART: [exit] Launching FMC @ 0x40000130
4,399,842 UART:
4,399,858 UART: Running Caliptra FMC ...
4,400,266 UART:
4,400,320 UART: [state] CFI Enabled
4,401,659 UART: [aliasrt :skip pcr extension
4,402,132 UART: [art] Extend RT PCRs Done
4,402,560 UART: [art] Lock RT PCRs Done
4,403,851 UART: [art] Populate DV Done
4,411,957 UART: [fht] FMC Alias Private Key: 7
4,413,077 UART: [art] Derive CDI
4,413,357 UART: [art] Store in in slot 0x4
4,499,158 UART: [art] Derive Key Pair
4,499,518 UART: [art] Store priv key in slot 0x5
4,513,116 UART: [art] Derive Key Pair - Done
4,527,950 UART: [art] Signing Cert with AUTHO
4,528,430 UART: RITY.KEYID = 7
4,543,328 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,093 UART: [art] PUB.X = E4BA494CF37FF4327D15BB6393A8D06364C629750D6C6316E3CB3D221D817C75A7CE35B25C2A896D33AB021328975E71
4,550,857 UART: [art] PUB.Y = 483F65C69134A5E00547DE5D4CFF7B6DFEB81BD0D9ED24019C739D691EF448BE4DC45CAF24D6B908D0211911CC7DA2DF
4,557,816 UART: [art] SIG.R = F248B50B50FD03D96C6E1B656176776774D5D4A731B72EB70BB083477D61431082D8740438F1957747ECA3E1F1DC1122
4,564,566 UART: [art] SIG.S = CCD9CD2588A7F22E80020BF22CF80369B81DE0941B82219AEE0DE2707696C60C07F2AE799FE44A46443A01F41D77432D
4,588,760 UART: Caliptra RT
4,589,013 UART: [state] CFI Enabled
4,871,228 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,467 ready_for_fw is high
1,056,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,289 >>> mbox cmd response: success
2,712,234 UART:
2,712,250 UART: Running Caliptra FMC ...
2,712,658 UART:
2,712,712 UART: [state] CFI Enabled
2,723,395 UART: [fht] FMC Alias Private Key: 7
2,830,672 UART: [art] Extend RT PCRs Done
2,831,100 UART: [art] Lock RT PCRs Done
2,832,308 UART: [art] Populate DV Done
2,840,388 UART: [fht] FMC Alias Private Key: 7
2,841,492 UART: [art] Derive CDI
2,841,772 UART: [art] Store in in slot 0x4
2,927,541 UART: [art] Derive Key Pair
2,927,901 UART: [art] Store priv key in slot 0x5
2,941,091 UART: [art] Derive Key Pair - Done
2,956,135 UART: [art] Signing Cert with AUTHO
2,956,615 UART: RITY.KEYID = 7
2,971,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,428 UART: [art] PUB.X = A19610E24E3FDD795285A550908C655AF43E8224B56FDE8927830850B69C50C3D9D056AE1742DE915F92EE22D99D2E89
2,979,193 UART: [art] PUB.Y = 7768071D02F70DE4704627483D4A9692F489243238813F0E80EC2C4EB33CC570E0729BD7E841E2F5BACE6F7B8017D242
2,986,127 UART: [art] SIG.R = 4E68CBC574E0FB29B09C650744F5E1291803EAC9EFD1443C09B563AE6D9537557D1504245FAAC5ED9B9653908B17D76A
2,992,889 UART: [art] SIG.S = AD043388EFA530D2AB3EC2BD79F93BAFBDBDCDADA598DD272E80E949AE40D7C566D975691A2AA7A67E5B1798FE2568C2
3,017,385 UART: Caliptra RT
3,017,638 UART: [state] CFI Enabled
3,124,979 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,104,113 UART:
4,104,129 UART: Running Caliptra FMC ...
4,104,537 UART:
4,104,591 UART: [state] CFI Enabled
4,105,922 UART: [aliasrt :skip pcr extension
4,106,395 UART: [art] Extend RT PCRs Done
4,106,823 UART: [art] Lock RT PCRs Done
4,108,036 UART: [art] Populate DV Done
4,116,202 UART: [fht] FMC Alias Private Key: 7
4,117,170 UART: [art] Derive CDI
4,117,450 UART: [art] Store in in slot 0x4
4,203,389 UART: [art] Derive Key Pair
4,203,749 UART: [art] Store priv key in slot 0x5
4,216,553 UART: [art] Derive Key Pair - Done
4,231,243 UART: [art] Signing Cert with AUTHO
4,231,723 UART: RITY.KEYID = 7
4,246,633 UART: [art] Erasing AUTHORITY.KEYID = 7
4,247,398 UART: [art] PUB.X = A19610E24E3FDD795285A550908C655AF43E8224B56FDE8927830850B69C50C3D9D056AE1742DE915F92EE22D99D2E89
4,254,163 UART: [art] PUB.Y = 7768071D02F70DE4704627483D4A9692F489243238813F0E80EC2C4EB33CC570E0729BD7E841E2F5BACE6F7B8017D242
4,261,097 UART: [art] SIG.R = 4E68CBC574E0FB29B09C650744F5E1291803EAC9EFD1443C09B563AE6D9537557D1504245FAAC5ED9B9653908B17D76A
4,267,859 UART: [art] SIG.S = AD043388EFA530D2AB3EC2BD79F93BAFBDBDCDADA598DD272E80E949AE40D7C566D975691A2AA7A67E5B1798FE2568C2
4,291,229 UART: Caliptra RT
4,291,482 UART: [state] CFI Enabled
4,573,261 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Production
85,622 UART: [state] DebugLocked = Yes
86,224 UART: [state] Starting the WD Timer 40000000 cycles
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,623 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,174,715 ready_for_fw is high
1,174,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,228 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,264 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,958 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,828 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,534 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,804 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,620 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,902 >>> mbox cmd response: success
2,801,030 UART: [afmc] ++
2,801,198 UART: [afmc] CDI.KEYID = 6
2,801,561 UART: [afmc] SUBJECT.KEYID = 7
2,801,987 UART: [afmc] AUTHORITY.KEYID = 5
2,837,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,995 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,714 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,607 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,314 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,051 UART: [afmc] --
2,881,094 UART: [cold-reset] --
2,881,704 UART: [state] Locking Datavault
2,882,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,591 UART: [state] Locking ICCM
2,884,087 UART: [exit] Launching FMC @ 0x40000130
2,889,416 UART:
2,889,432 UART: Running Caliptra FMC ...
2,889,840 UART:
2,889,983 UART: [state] CFI Enabled
2,900,414 UART: [fht] FMC Alias Private Key: 7
3,008,363 UART: [art] Extend RT PCRs Done
3,008,791 UART: [art] Lock RT PCRs Done
3,010,167 UART: [art] Populate DV Done
3,018,537 UART: [fht] FMC Alias Private Key: 7
3,019,503 UART: [art] Derive CDI
3,019,783 UART: [art] Store in in slot 0x4
3,105,502 UART: [art] Derive Key Pair
3,105,862 UART: [art] Store priv key in slot 0x5
3,119,256 UART: [art] Derive Key Pair - Done
3,133,897 UART: [art] Signing Cert with AUTHO
3,134,377 UART: RITY.KEYID = 7
3,149,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,408 UART: [art] PUB.X = 8FBA0F4A649725EB82FD7A03AFFD77AD787E8F7E5C5640757A3C947ABB282B389B959C131A77A72FA9420E240B34EC47
3,157,176 UART: [art] PUB.Y = F37C80F3873CF48B3B6A6E5404B53FE5BCF49EAE1AF8A67AA7E7CC0F7D711D47A341CF82E501F9F6EB63918C0625FB5C
3,164,134 UART: [art] SIG.R = EF29562F17259F15EC3E800C797448D3E71941D21F7272DEA5C32672F29EB93AFFC4F5F46662B24DFCB82E9B87824B02
3,170,902 UART: [art] SIG.S = 2A622B2654DC0656171540A67B8210525640E9A4057BD33A8E98585E18E04CB3EA7D739C9CC559A2BF5CDC76092646C4
3,194,724 UART: Caliptra RT
3,195,069 UART: [state] CFI Enabled
3,302,664 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,420 UART:
3,303,436 UART: Running Caliptra ROM ...
3,303,844 UART:
3,303,986 UART: [state] CFI Enabled
3,306,743 UART: [state] LifecycleState = Production
3,307,351 UART: [state] DebugLocked = Yes
3,307,893 UART: [state] Starting the WD Timer 40000000 cycles
3,309,418 UART: [kat] SHA2-256
4,112,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,097 UART: [kat] ++
4,117,249 UART: [kat] sha1
4,121,423 UART: [kat] SHA2-256
4,123,363 UART: [kat] SHA2-384
4,126,066 UART: [kat] SHA2-512-ACC
4,127,967 UART: [kat] ECC-384
4,138,096 UART: [kat] HMAC-384Kdf
4,142,824 UART: [kat] LMS
4,391,136 UART: [kat] --
4,392,012 UART: [warm-reset] ++
4,393,103 UART: [warm-reset] --
4,393,878 UART: [state] Locking Datavault
4,394,742 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,346 UART: [state] Locking ICCM
4,395,938 UART: [exit] Launching FMC @ 0x40000130
4,401,267 UART:
4,401,283 UART: Running Caliptra FMC ...
4,401,691 UART:
4,401,834 UART: [state] CFI Enabled
4,403,213 UART: [aliasrt :skip pcr extension
4,403,686 UART: [art] Extend RT PCRs Done
4,404,114 UART: [art] Lock RT PCRs Done
4,405,517 UART: [art] Populate DV Done
4,413,917 UART: [fht] FMC Alias Private Key: 7
4,415,039 UART: [art] Derive CDI
4,415,319 UART: [art] Store in in slot 0x4
4,501,422 UART: [art] Derive Key Pair
4,501,782 UART: [art] Store priv key in slot 0x5
4,514,980 UART: [art] Derive Key Pair - Done
4,529,729 UART: [art] Signing Cert with AUTHO
4,530,209 UART: RITY.KEYID = 7
4,545,733 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,498 UART: [art] PUB.X = 8FBA0F4A649725EB82FD7A03AFFD77AD787E8F7E5C5640757A3C947ABB282B389B959C131A77A72FA9420E240B34EC47
4,553,266 UART: [art] PUB.Y = F37C80F3873CF48B3B6A6E5404B53FE5BCF49EAE1AF8A67AA7E7CC0F7D711D47A341CF82E501F9F6EB63918C0625FB5C
4,560,224 UART: [art] SIG.R = EF29562F17259F15EC3E800C797448D3E71941D21F7272DEA5C32672F29EB93AFFC4F5F46662B24DFCB82E9B87824B02
4,566,992 UART: [art] SIG.S = 2A622B2654DC0656171540A67B8210525640E9A4057BD33A8E98585E18E04CB3EA7D739C9CC559A2BF5CDC76092646C4
4,590,642 UART: Caliptra RT
4,590,987 UART: [state] CFI Enabled
4,872,862 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,952 ready_for_fw is high
1,056,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,498 >>> mbox cmd response: success
2,712,015 UART:
2,712,031 UART: Running Caliptra FMC ...
2,712,439 UART:
2,712,582 UART: [state] CFI Enabled
2,723,095 UART: [fht] FMC Alias Private Key: 7
2,830,912 UART: [art] Extend RT PCRs Done
2,831,340 UART: [art] Lock RT PCRs Done
2,832,634 UART: [art] Populate DV Done
2,840,860 UART: [fht] FMC Alias Private Key: 7
2,841,850 UART: [art] Derive CDI
2,842,130 UART: [art] Store in in slot 0x4
2,927,921 UART: [art] Derive Key Pair
2,928,281 UART: [art] Store priv key in slot 0x5
2,942,141 UART: [art] Derive Key Pair - Done
2,956,858 UART: [art] Signing Cert with AUTHO
2,957,338 UART: RITY.KEYID = 7
2,972,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,947 UART: [art] PUB.X = 1FA7AA4E35AF5D9587D44139755E69C380483272534B202C72B8AC9504C5BF4FBBF6EA9182149D2065619788073A4CF5
2,979,707 UART: [art] PUB.Y = 2F32945A9004497FA7BE239319873D9CB51E9A1895FD02610954E2B09FFF2ED96D7D8081CC6DB3CA921F03B85F0B410C
2,986,643 UART: [art] SIG.R = 89EFDA128F4B93B9D12B89EC4E150467F5BA63B40B8F792856D07E1738D28554384B159ACA6C02E96CD3AFBD2159C00D
2,993,409 UART: [art] SIG.S = A939440BDD97AA25200BF49F6237D67F300D3FE39115580139D6B037FA44665E504B948C59659098A393ECE1B68088ED
3,017,890 UART: Caliptra RT
3,018,235 UART: [state] CFI Enabled
3,125,670 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,104,561 UART:
4,104,577 UART: Running Caliptra FMC ...
4,104,985 UART:
4,105,128 UART: [state] CFI Enabled
4,106,547 UART: [aliasrt :skip pcr extension
4,107,020 UART: [art] Extend RT PCRs Done
4,107,448 UART: [art] Lock RT PCRs Done
4,108,613 UART: [art] Populate DV Done
4,116,859 UART: [fht] FMC Alias Private Key: 7
4,118,001 UART: [art] Derive CDI
4,118,281 UART: [art] Store in in slot 0x4
4,204,028 UART: [art] Derive Key Pair
4,204,388 UART: [art] Store priv key in slot 0x5
4,218,432 UART: [art] Derive Key Pair - Done
4,233,275 UART: [art] Signing Cert with AUTHO
4,233,755 UART: RITY.KEYID = 7
4,249,105 UART: [art] Erasing AUTHORITY.KEYID = 7
4,249,870 UART: [art] PUB.X = 1FA7AA4E35AF5D9587D44139755E69C380483272534B202C72B8AC9504C5BF4FBBF6EA9182149D2065619788073A4CF5
4,256,630 UART: [art] PUB.Y = 2F32945A9004497FA7BE239319873D9CB51E9A1895FD02610954E2B09FFF2ED96D7D8081CC6DB3CA921F03B85F0B410C
4,263,566 UART: [art] SIG.R = 89EFDA128F4B93B9D12B89EC4E150467F5BA63B40B8F792856D07E1738D28554384B159ACA6C02E96CD3AFBD2159C00D
4,270,332 UART: [art] SIG.S = A939440BDD97AA25200BF49F6237D67F300D3FE39115580139D6B037FA44665E504B948C59659098A393ECE1B68088ED
4,294,753 UART: Caliptra RT
4,295,098 UART: [state] CFI Enabled
4,578,475 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
191,858 UART:
192,215 UART: Running Caliptra ROM ...
193,493 UART:
193,644 UART: [state] CFI Enabled
267,527 UART: [state] LifecycleState = Production
269,356 UART: [state] DebugLocked = Yes
271,470 UART: [state] Starting the Watchdog Timer 40000000 cycles
276,898 UART: [kat] SHA2-256
446,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,135 UART: [kat] ++
457,621 UART: [kat] sha1
467,513 UART: [kat] SHA2-256
470,235 UART: [kat] SHA2-384
477,339 UART: [kat] SHA2-512-ACC
479,694 UART: [kat] ECC-384
2,768,076 UART: [kat] HMAC-384Kdf
2,779,373 UART: [kat] LMS
3,969,732 UART: [kat] --
3,974,472 UART: [cold-reset] ++
3,976,750 UART: [fht] Storing FHT @ 0x50003400
3,988,178 UART: [idev] ++
3,988,733 UART: [idev] CDI.KEYID = 6
3,989,662 UART: [idev] SUBJECT.KEYID = 7
3,990,915 UART: [idev] UDS.KEYID = 0
Initializing fuses
894 UART: [idev] Erasing UDS.KEYID = 0
2,172 UART:
2,329 UART: Running Caliptra ROM ...
3,439 UART:
3,606 UART: [state] CFI Enabled
75,080 UART: [state] LifecycleState = Production
76,844 UART: [state] DebugLocked = Yes
78,700 UART: [state] Starting the Watchdog Timer 40000000 cycles
83,803 UART: [kat] SHA2-256
253,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
264,045 UART: [kat] ++
264,500 UART: [kat] sha1
274,940 UART: [kat] SHA2-256
277,614 UART: [kat] SHA2-384
284,791 UART: [kat] SHA2-512-ACC
287,181 UART: [kat] ECC-384
2,577,100 UART: [kat] HMAC-384Kdf
2,610,009 UART: [kat] LMS
3,800,301 UART: [kat] --
3,806,311 UART: [warm-reset] ++
3,807,170 UART: [warm-reset] Previous Cold-Reset was not successful.
3,812,269 UART: ROM Fatal Error: 0x01040010test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,522 writing to cptra_bootfsm_go
192,139 UART:
192,492 UART: Running Caliptra ROM ...
193,608 UART:
603,499 UART: [state] CFI Enabled
621,665 UART: [state] LifecycleState = Production
623,448 UART: [state] DebugLocked = Yes
625,371 UART: [state] Starting the Watchdog Timer 40000000 cycles
630,133 UART: [kat] SHA2-256
799,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,414 UART: [kat] ++
810,881 UART: [kat] sha1
821,080 UART: [kat] SHA2-256
823,783 UART: [kat] SHA2-384
829,313 UART: [kat] SHA2-512-ACC
831,703 UART: [kat] ECC-384
3,116,181 UART: [kat] HMAC-384Kdf
3,128,063 UART: [kat] LMS
4,318,145 UART: [kat] --
4,321,770 UART: [cold-reset] ++
4,322,726 UART: [fht] Storing FHT @ 0x50003400
4,334,197 UART: [idev] ++
4,334,754 UART: [idev] CDI.KEYID = 6
4,335,713 UART: [idev] SUBJECT.KEYID = 7
4,336,966 UART: [idev] UDS.KEYID = 0
Initializing fuses
891 UART: [idev] Erasing UDS.KEYID = 0
2,274 UART:
2,464 UART: Running Caliptra ROM ...
3,564 UART:
15,983,958 UART: [state] CFI Enabled
15,998,642 UART: [state] LifecycleState = Production
16,000,452 UART: [state] DebugLocked = Yes
16,001,937 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,006,945 UART: [kat] SHA2-256
16,176,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,187,201 UART: [kat] ++
16,187,794 UART: [kat] sha1
16,200,412 UART: [kat] SHA2-256
16,203,104 UART: [kat] SHA2-384
16,208,655 UART: [kat] SHA2-512-ACC
16,210,995 UART: [kat] ECC-384
18,493,777 UART: [kat] HMAC-384Kdf
18,506,005 UART: [kat] LMS
19,696,162 UART: [kat] --
19,701,193 UART: [warm-reset] ++
19,702,039 UART: [warm-reset] Previous Cold-Reset was not successful.
19,706,790 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,112 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,003 UART:
192,387 UART: Running Caliptra ROM ...
193,580 UART:
193,731 UART: [state] CFI Enabled
259,164 UART: [state] LifecycleState = Production
260,915 UART: [state] DebugLocked = Yes
263,597 UART: [state] Starting the WD Timer 40000000 cycles
268,145 UART: [kat] SHA2-256
447,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,881 UART: [kat] ++
459,375 UART: [kat] sha1
470,644 UART: [kat] SHA2-256
473,668 UART: [kat] SHA2-384
480,988 UART: [kat] SHA2-512-ACC
483,964 UART: [kat] ECC-384
2,947,125 UART: [kat] HMAC-384Kdf
2,969,596 UART: [kat] LMS
3,499,049 UART: [kat] --
3,503,971 UART: [cold-reset] ++
3,505,514 UART: [fht] FHT @ 0x50003400
3,516,713 UART: [idev] ++
3,517,274 UART: [idev] CDI.KEYID = 6
3,518,207 UART: [idev] SUBJECT.KEYID = 7
3,519,411 UART: [idev] UDS.KEYID = 0
Initializing fuses
882 UART: [idev] Erasing UDS.KEYID = 0
2,076 UART:
2,294 UART: Running Caliptra ROM ...
3,411 UART:
3,561 UART: [state] CFI Enabled
72,247 UART: [state] LifecycleState = Production
74,185 UART: [state] DebugLocked = Yes
76,601 UART: [state] Starting the WD Timer 40000000 cycles
81,706 UART: [kat] SHA2-256
260,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
272,391 UART: [kat] ++
272,832 UART: [kat] sha1
283,811 UART: [kat] SHA2-256
286,865 UART: [kat] SHA2-384
292,568 UART: [kat] SHA2-512-ACC
295,501 UART: [kat] ECC-384
2,755,749 UART: [kat] HMAC-384Kdf
2,780,351 UART: [kat] LMS
3,309,817 UART: [kat] --
3,313,265 UART: [warm-reset] ++
3,314,121 UART: [warm-reset] Prev Cold-Reset failed
3,317,426 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
192,335 UART:
192,697 UART: Running Caliptra ROM ...
193,870 UART:
603,610 UART: [state] CFI Enabled
614,485 UART: [state] LifecycleState = Production
616,240 UART: [state] DebugLocked = Yes
618,576 UART: [state] Starting the WD Timer 40000000 cycles
623,840 UART: [kat] SHA2-256
802,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,566 UART: [kat] ++
815,008 UART: [kat] sha1
826,001 UART: [kat] SHA2-256
829,032 UART: [kat] SHA2-384
835,738 UART: [kat] SHA2-512-ACC
838,700 UART: [kat] ECC-384
3,279,511 UART: [kat] HMAC-384Kdf
3,293,517 UART: [kat] LMS
3,823,053 UART: [kat] --
3,825,838 UART: [cold-reset] ++
3,828,235 UART: [fht] FHT @ 0x50003400
3,839,928 UART: [idev] ++
3,840,489 UART: [idev] CDI.KEYID = 6
3,841,499 UART: [idev] SUBJECT.KEYID = 7
3,842,651 UART: [idev] UDS.KEYID = 0
Initializing fuses
892 UART: [idev] Erasing UDS.KEYID = 0
2,178 UART:
2,397 UART: Running Caliptra ROM ...
3,503 UART:
16,473,178 UART: [state] CFI Enabled
16,489,042 UART: [state] LifecycleState = Production
16,490,813 UART: [state] DebugLocked = Yes
16,492,412 UART: [state] Starting the WD Timer 40000000 cycles
16,497,313 UART: [kat] SHA2-256
16,676,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,687,998 UART: [kat] ++
16,688,544 UART: [kat] sha1
16,699,815 UART: [kat] SHA2-256
16,702,876 UART: [kat] SHA2-384
16,709,194 UART: [kat] SHA2-512-ACC
16,712,139 UART: [kat] ECC-384
19,153,372 UART: [kat] HMAC-384Kdf
19,165,818 UART: [kat] LMS
19,695,350 UART: [kat] --
19,697,573 UART: [warm-reset] ++
19,698,426 UART: [warm-reset] Prev Cold-Reset failed
19,703,011 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
191,861 UART:
192,249 UART: Running Caliptra ROM ...
193,433 UART:
193,581 UART: [state] CFI Enabled
264,239 UART: [state] LifecycleState = Production
266,460 UART: [state] DebugLocked = Yes
269,293 UART: [state] Starting the WD Timer 40000000 cycles
274,090 UART: [kat] SHA2-256
463,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,705 UART: [kat] ++
475,334 UART: [kat] sha1
487,138 UART: [kat] SHA2-256
490,112 UART: [kat] SHA2-384
496,613 UART: [kat] SHA2-512-ACC
499,219 UART: [kat] ECC-384
2,947,129 UART: [kat] HMAC-384Kdf
2,971,742 UART: [kat] LMS
3,503,492 UART: [kat] --
3,508,315 UART: [cold-reset] ++
3,510,435 UART: [fht] FHT @ 0x50003400
3,520,650 UART: [idev] ++
3,521,308 UART: [idev] CDI.KEYID = 6
3,522,281 UART: [idev] SUBJECT.KEYID = 7
3,523,424 UART: [idev] UDS.KEYID = 0
Initializing fuses
884 UART: [idev] Erasing UDS.KEYID = 0
2,161 UART:
2,393 UART: Running Caliptra ROM ...
3,495 UART:
3,648 UART: [state] CFI Enabled
70,634 UART: [state] LifecycleState = Production
72,569 UART: [state] DebugLocked = Yes
74,542 UART: [state] Starting the WD Timer 40000000 cycles
79,927 UART: [kat] SHA2-256
269,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
280,538 UART: [kat] ++
281,067 UART: [kat] sha1
293,520 UART: [kat] SHA2-256
296,520 UART: [kat] SHA2-384
302,322 UART: [kat] SHA2-512-ACC
304,949 UART: [kat] ECC-384
2,751,442 UART: [kat] HMAC-384Kdf
2,776,085 UART: [kat] LMS
3,307,617 UART: [kat] --
3,313,622 UART: [warm-reset] ++
3,314,470 UART: [warm-reset] Prev Cold-Reset failed
3,318,249 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
192,353 UART:
192,714 UART: Running Caliptra ROM ...
193,897 UART:
603,599 UART: [state] CFI Enabled
617,810 UART: [state] LifecycleState = Production
620,043 UART: [state] DebugLocked = Yes
622,310 UART: [state] Starting the WD Timer 40000000 cycles
626,964 UART: [kat] SHA2-256
816,880 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,661 UART: [kat] ++
828,180 UART: [kat] sha1
838,504 UART: [kat] SHA2-256
841,491 UART: [kat] SHA2-384
847,835 UART: [kat] SHA2-512-ACC
850,441 UART: [kat] ECC-384
3,291,538 UART: [kat] HMAC-384Kdf
3,306,104 UART: [kat] LMS
3,837,916 UART: [kat] --
3,840,824 UART: [cold-reset] ++
3,843,403 UART: [fht] FHT @ 0x50003400
3,854,944 UART: [idev] ++
3,855,684 UART: [idev] CDI.KEYID = 6
3,856,603 UART: [idev] SUBJECT.KEYID = 7
3,857,809 UART: [idev] UDS.KEYID = 0
Initializing fuses
888 UART: [idev] Erasing UDS.KEYID = 0
2,172 UART:
2,426 UART: Running Caliptra ROM ...
3,533 UART:
16,461,452 UART: [state] CFI Enabled
16,473,028 UART: [state] LifecycleState = Production
16,474,822 UART: [state] DebugLocked = Yes
16,477,169 UART: [state] Starting the WD Timer 40000000 cycles
16,482,889 UART: [kat] SHA2-256
16,672,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,683,634 UART: [kat] ++
16,684,196 UART: [kat] sha1
16,695,896 UART: [kat] SHA2-256
16,698,921 UART: [kat] SHA2-384
16,705,339 UART: [kat] SHA2-512-ACC
16,707,945 UART: [kat] ECC-384
19,151,080 UART: [kat] HMAC-384Kdf
19,165,041 UART: [kat] LMS
19,696,652 UART: [kat] --
19,701,778 UART: [warm-reset] ++
19,702,625 UART: [warm-reset] Prev Cold-Reset failed
19,706,186 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Production
85,599 UART: [state] DebugLocked = Yes
86,277 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,313 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,569 UART: [idev] ++
1,479,737 UART: [idev] CDI.KEYID = 6
1,480,097 UART: [idev] SUBJECT.KEYID = 7
1,480,521 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,962 UART:
1,480,978 UART: Running Caliptra ROM ...
1,481,386 UART:
1,481,440 UART: [state] CFI Enabled
1,484,077 UART: [state] LifecycleState = Production
1,484,685 UART: [state] DebugLocked = Yes
1,485,301 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,007 UART: [kat] SHA2-256
2,280,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,053 UART: [kat] ++
2,285,205 UART: [kat] sha1
2,289,393 UART: [kat] SHA2-256
2,291,331 UART: [kat] SHA2-384
2,293,970 UART: [kat] SHA2-512-ACC
2,295,871 UART: [kat] ECC-384
2,301,710 UART: [kat] HMAC-384Kdf
2,306,410 UART: [kat] LMS
2,874,606 UART: [kat] --
2,875,450 UART: [warm-reset] ++
2,875,721 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,166 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Production
86,012 UART: [state] DebugLocked = Yes
86,586 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,495 UART: [kat] HMAC-384Kdf
907,197 UART: [kat] LMS
1,475,393 UART: [kat] --
1,476,156 UART: [cold-reset] ++
1,476,491 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,551 UART:
1,480,567 UART: Running Caliptra ROM ...
1,480,975 UART:
1,481,116 UART: [state] CFI Enabled
1,483,875 UART: [state] LifecycleState = Production
1,484,483 UART: [state] DebugLocked = Yes
1,485,187 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,859 UART: [kat] SHA2-256
2,280,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,284,905 UART: [kat] ++
2,285,057 UART: [kat] sha1
2,289,387 UART: [kat] SHA2-256
2,291,325 UART: [kat] SHA2-384
2,293,906 UART: [kat] SHA2-512-ACC
2,295,807 UART: [kat] ECC-384
2,301,602 UART: [kat] HMAC-384Kdf
2,306,218 UART: [kat] LMS
2,874,414 UART: [kat] --
2,875,656 UART: [warm-reset] ++
2,875,927 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,166 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,629 UART: [state] LifecycleState = Production
85,237 UART: [state] DebugLocked = Yes
85,763 UART: [state] Starting the WD Timer 40000000 cycles
87,308 UART: [kat] SHA2-256
892,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,083 UART: [kat] ++
897,235 UART: [kat] sha1
901,415 UART: [kat] SHA2-256
903,355 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
918,014 UART: [kat] HMAC-384Kdf
922,542 UART: [kat] LMS
1,170,870 UART: [kat] --
1,171,873 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,174,827 UART: [idev] ++
1,174,995 UART: [idev] CDI.KEYID = 6
1,175,355 UART: [idev] SUBJECT.KEYID = 7
1,175,779 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,217 UART:
1,176,233 UART: Running Caliptra ROM ...
1,176,641 UART:
1,176,696 UART: [state] CFI Enabled
1,179,131 UART: [state] LifecycleState = Production
1,179,739 UART: [state] DebugLocked = Yes
1,180,313 UART: [state] Starting the WD Timer 40000000 cycles
1,181,830 UART: [kat] SHA2-256
1,987,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,991,605 UART: [kat] ++
1,991,757 UART: [kat] sha1
1,995,979 UART: [kat] SHA2-256
1,997,919 UART: [kat] SHA2-384
2,000,686 UART: [kat] SHA2-512-ACC
2,002,587 UART: [kat] ECC-384
2,012,002 UART: [kat] HMAC-384Kdf
2,016,654 UART: [kat] LMS
2,264,982 UART: [kat] --
2,265,528 UART: [warm-reset] ++
2,265,799 UART: [warm-reset] Prev Cold-Reset failed
2,266,904 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Production
85,896 UART: [state] DebugLocked = Yes
86,504 UART: [state] Starting the WD Timer 40000000 cycles
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
906,973 UART: [kat] SHA2-512-ACC
908,874 UART: [kat] ECC-384
918,951 UART: [kat] HMAC-384Kdf
923,649 UART: [kat] LMS
1,171,977 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,177 UART: [fht] FHT @ 0x50003400
1,175,996 UART: [idev] ++
1,176,164 UART: [idev] CDI.KEYID = 6
1,176,524 UART: [idev] SUBJECT.KEYID = 7
1,176,948 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,386 UART:
1,177,402 UART: Running Caliptra ROM ...
1,177,810 UART:
1,177,952 UART: [state] CFI Enabled
1,181,023 UART: [state] LifecycleState = Production
1,181,631 UART: [state] DebugLocked = Yes
1,182,243 UART: [state] Starting the WD Timer 40000000 cycles
1,183,924 UART: [kat] SHA2-256
1,989,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,699 UART: [kat] ++
1,993,851 UART: [kat] sha1
1,998,171 UART: [kat] SHA2-256
2,000,111 UART: [kat] SHA2-384
2,002,666 UART: [kat] SHA2-512-ACC
2,004,567 UART: [kat] ECC-384
2,014,278 UART: [kat] HMAC-384Kdf
2,018,728 UART: [kat] LMS
2,267,056 UART: [kat] --
2,268,234 UART: [warm-reset] ++
2,268,505 UART: [warm-reset] Prev Cold-Reset failed
2,269,492 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Production
85,961 UART: [state] DebugLocked = Yes
86,553 UART: [state] Starting the WD Timer 40000000 cycles
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,281 UART: [kat] SHA2-256
902,221 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
917,130 UART: [kat] HMAC-384Kdf
921,668 UART: [kat] LMS
1,169,980 UART: [kat] --
1,170,759 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,174,028 UART: [idev] ++
1,174,196 UART: [idev] CDI.KEYID = 6
1,174,557 UART: [idev] SUBJECT.KEYID = 7
1,174,982 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,421 UART:
1,175,437 UART: Running Caliptra ROM ...
1,175,845 UART:
1,175,900 UART: [state] CFI Enabled
1,178,701 UART: [state] LifecycleState = Production
1,179,309 UART: [state] DebugLocked = Yes
1,179,987 UART: [state] Starting the WD Timer 40000000 cycles
1,181,662 UART: [kat] SHA2-256
1,985,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,341 UART: [kat] ++
1,989,493 UART: [kat] sha1
1,993,863 UART: [kat] SHA2-256
1,995,803 UART: [kat] SHA2-384
1,998,634 UART: [kat] SHA2-512-ACC
2,000,535 UART: [kat] ECC-384
2,010,246 UART: [kat] HMAC-384Kdf
2,014,710 UART: [kat] LMS
2,263,022 UART: [kat] --
2,264,022 UART: [warm-reset] ++
2,264,290 UART: [warm-reset] Prev Cold-Reset failed
2,265,161 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Production
85,960 UART: [state] DebugLocked = Yes
86,714 UART: [state] Starting the WD Timer 40000000 cycles
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,648 UART:
1,174,664 UART: Running Caliptra ROM ...
1,175,072 UART:
1,175,214 UART: [state] CFI Enabled
1,178,551 UART: [state] LifecycleState = Production
1,179,159 UART: [state] DebugLocked = Yes
1,179,755 UART: [state] Starting the WD Timer 40000000 cycles
1,181,340 UART: [kat] SHA2-256
1,984,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,019 UART: [kat] ++
1,989,171 UART: [kat] sha1
1,993,495 UART: [kat] SHA2-256
1,995,435 UART: [kat] SHA2-384
1,998,092 UART: [kat] SHA2-512-ACC
1,999,993 UART: [kat] ECC-384
2,009,698 UART: [kat] HMAC-384Kdf
2,014,136 UART: [kat] LMS
2,262,448 UART: [kat] --
2,263,238 UART: [warm-reset] ++
2,263,506 UART: [warm-reset] Prev Cold-Reset failed
2,264,523 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,187 UART:
192,560 UART: Running Caliptra ROM ...
193,636 UART:
193,782 UART: [state] CFI Enabled
263,596 UART: [state] LifecycleState = Unprovisioned
265,535 UART: [state] DebugLocked = No
267,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,741 UART: [kat] SHA2-256
442,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,891 UART: [kat] ++
453,369 UART: [kat] sha1
464,300 UART: [kat] SHA2-256
467,001 UART: [kat] SHA2-384
473,149 UART: [kat] SHA2-512-ACC
475,497 UART: [kat] ECC-384
2,765,687 UART: [kat] HMAC-384Kdf
2,798,499 UART: [kat] LMS
3,988,767 UART: [kat] --
3,993,251 UART: [cold-reset] ++
3,995,128 UART: [fht] Storing FHT @ 0x50003400
4,005,971 UART: [idev] ++
4,006,547 UART: [idev] CDI.KEYID = 6
4,007,471 UART: [idev] SUBJECT.KEYID = 7
4,008,692 UART: [idev] UDS.KEYID = 0
6,589,787 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,734,227 UART: [idev] Erasing UDS.KEYID = 0
7,346,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,281 UART: [idev] --
7,372,902 UART: [ldev] ++
7,373,488 UART: [ldev] CDI.KEYID = 6
7,374,419 UART: [ldev] SUBJECT.KEYID = 5
7,375,640 UART: [ldev] AUTHORITY.KEYID = 7
7,376,876 UART: [ldev] FE.KEYID = 1
7,421,890 UART: [ldev] Erasing FE.KEYID = 1
10,760,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,373 UART: [ldev] --
13,136,762 UART: [fwproc] Waiting for Commands...
13,139,079 UART: [fwproc] Received command 0x46574c44
13,141,279 UART: [fwproc] Received Image of size 114124 bytes
17,192,092 UART: ROM Fatal Error: 0x000B0016
17,195,571 >>> mbox cmd response: failed
17,195,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,196,331 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
6,396,141 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,157,967 >>> mbox cmd response: failed
17,158,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,158,999 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,477 UART:
192,871 UART: Running Caliptra ROM ...
194,030 UART:
603,669 UART: [state] CFI Enabled
618,943 UART: [state] LifecycleState = Unprovisioned
620,862 UART: [state] DebugLocked = No
623,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,550 UART: [kat] SHA2-256
798,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,873 UART: [kat] ++
809,324 UART: [kat] sha1
820,902 UART: [kat] SHA2-256
823,608 UART: [kat] SHA2-384
828,417 UART: [kat] SHA2-512-ACC
830,814 UART: [kat] ECC-384
3,116,505 UART: [kat] HMAC-384Kdf
3,129,118 UART: [kat] LMS
4,319,257 UART: [kat] --
4,323,307 UART: [cold-reset] ++
4,325,570 UART: [fht] Storing FHT @ 0x50003400
4,335,759 UART: [idev] ++
4,336,321 UART: [idev] CDI.KEYID = 6
4,337,437 UART: [idev] SUBJECT.KEYID = 7
4,338,556 UART: [idev] UDS.KEYID = 0
6,923,350 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,067,605 UART: [idev] Erasing UDS.KEYID = 0
7,626,994 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,105 UART: [idev] --
7,653,017 UART: [ldev] ++
7,653,595 UART: [ldev] CDI.KEYID = 6
7,654,579 UART: [ldev] SUBJECT.KEYID = 5
7,655,800 UART: [ldev] AUTHORITY.KEYID = 7
7,657,005 UART: [ldev] FE.KEYID = 1
7,666,714 UART: [ldev] Erasing FE.KEYID = 1
10,954,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,267 UART: [ldev] --
13,313,356 UART: [fwproc] Waiting for Commands...
13,316,644 UART: [fwproc] Received command 0x46574c44
13,318,832 UART: [fwproc] Received Image of size 114124 bytes
17,367,984 UART: ROM Fatal Error: 0x000B0016
17,371,398 >>> mbox cmd response: failed
17,371,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,372,107 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
6,710,045 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,333,713 >>> mbox cmd response: failed
17,334,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,777 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,199 UART:
192,568 UART: Running Caliptra ROM ...
193,693 UART:
193,839 UART: [state] CFI Enabled
264,069 UART: [state] LifecycleState = Unprovisioned
265,985 UART: [state] DebugLocked = No
267,802 UART: [state] WD Timer not started. Device not locked for debugging
270,642 UART: [kat] SHA2-256
449,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,353 UART: [kat] ++
461,889 UART: [kat] sha1
472,987 UART: [kat] SHA2-256
475,987 UART: [kat] SHA2-384
482,445 UART: [kat] SHA2-512-ACC
485,377 UART: [kat] ECC-384
2,948,005 UART: [kat] HMAC-384Kdf
2,973,091 UART: [kat] LMS
3,502,530 UART: [kat] --
3,507,357 UART: [cold-reset] ++
3,509,134 UART: [fht] FHT @ 0x50003400
3,520,388 UART: [idev] ++
3,520,952 UART: [idev] CDI.KEYID = 6
3,521,872 UART: [idev] SUBJECT.KEYID = 7
3,523,029 UART: [idev] UDS.KEYID = 0
6,063,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,208,307 UART: [idev] Erasing UDS.KEYID = 0
6,209,746 UART: [idev] Sha1 KeyId Algorithm
6,210,981 UART: [idev] --
6,211,520 UART: [ldev] ++
6,212,027 UART: [ldev] CDI.KEYID = 6
6,212,991 UART: [ldev] SUBJECT.KEYID = 5
6,214,101 UART: [ldev] AUTHORITY.KEYID = 7
6,215,278 UART: [ldev] FE.KEYID = 1
6,216,307 UART: [ldev] Erasing FE.KEYID = 1
8,607,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,379,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,395,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,333 UART: [ldev] --
10,420,163 UART: [fwproc] Wait for Commands...
10,422,201 UART: [fwproc] Recv command 0x46574c44
10,424,301 UART: [fwproc] Recv'd Img size: 114448 bytes
13,813,630 UART: ROM Fatal Error: 0x000B0016
13,816,763 >>> mbox cmd response: failed
13,817,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,550 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,444 writing to cptra_bootfsm_go
5,899,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,569,857 >>> mbox cmd response: failed
13,570,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,570,894 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,623 UART:
193,010 UART: Running Caliptra ROM ...
194,106 UART:
603,687 UART: [state] CFI Enabled
614,882 UART: [state] LifecycleState = Unprovisioned
616,747 UART: [state] DebugLocked = No
619,503 UART: [state] WD Timer not started. Device not locked for debugging
623,467 UART: [kat] SHA2-256
802,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,177 UART: [kat] ++
814,627 UART: [kat] sha1
826,150 UART: [kat] SHA2-256
829,131 UART: [kat] SHA2-384
834,450 UART: [kat] SHA2-512-ACC
837,398 UART: [kat] ECC-384
3,276,739 UART: [kat] HMAC-384Kdf
3,289,025 UART: [kat] LMS
3,818,529 UART: [kat] --
3,822,973 UART: [cold-reset] ++
3,823,872 UART: [fht] FHT @ 0x50003400
3,834,254 UART: [idev] ++
3,834,825 UART: [idev] CDI.KEYID = 6
3,835,732 UART: [idev] SUBJECT.KEYID = 7
3,836,943 UART: [idev] UDS.KEYID = 0
6,376,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,521,330 UART: [idev] Erasing UDS.KEYID = 0
6,522,804 UART: [idev] Sha1 KeyId Algorithm
6,523,969 UART: [idev] --
6,524,455 UART: [ldev] ++
6,524,935 UART: [ldev] CDI.KEYID = 6
6,525,807 UART: [ldev] SUBJECT.KEYID = 5
6,526,823 UART: [ldev] AUTHORITY.KEYID = 7
6,528,017 UART: [ldev] FE.KEYID = 1
6,528,873 UART: [ldev] Erasing FE.KEYID = 1
8,825,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,793 UART: [ldev] --
10,614,088 UART: [fwproc] Wait for Commands...
10,615,868 UART: [fwproc] Recv command 0x46574c44
10,617,934 UART: [fwproc] Recv'd Img size: 114448 bytes
14,016,412 UART: ROM Fatal Error: 0x000B0016
14,019,501 >>> mbox cmd response: failed
14,019,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,020,284 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,902 writing to cptra_bootfsm_go
6,227,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,823,695 >>> mbox cmd response: failed
13,824,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,824,672 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,054 UART:
192,454 UART: Running Caliptra ROM ...
193,576 UART:
193,727 UART: [state] CFI Enabled
263,813 UART: [state] LifecycleState = Unprovisioned
266,186 UART: [state] DebugLocked = No
267,455 UART: [state] WD Timer not started. Device not locked for debugging
271,961 UART: [kat] SHA2-256
461,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,652 UART: [kat] ++
473,127 UART: [kat] sha1
484,241 UART: [kat] SHA2-256
487,259 UART: [kat] SHA2-384
493,299 UART: [kat] SHA2-512-ACC
495,915 UART: [kat] ECC-384
2,948,784 UART: [kat] HMAC-384Kdf
2,972,290 UART: [kat] LMS
3,504,045 UART: [kat] --
3,509,743 UART: [cold-reset] ++
3,511,739 UART: [fht] FHT @ 0x50003400
3,524,396 UART: [idev] ++
3,525,074 UART: [idev] CDI.KEYID = 6
3,526,094 UART: [idev] SUBJECT.KEYID = 7
3,527,261 UART: [idev] UDS.KEYID = 0
6,105,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,249,837 UART: [idev] Erasing UDS.KEYID = 0
6,251,287 UART: [idev] Sha1 KeyId Algorithm
6,252,536 UART: [idev] --
6,253,030 UART: [ldev] ++
6,253,521 UART: [ldev] CDI.KEYID = 6
6,254,438 UART: [ldev] SUBJECT.KEYID = 5
6,255,457 UART: [ldev] AUTHORITY.KEYID = 7
6,256,636 UART: [ldev] FE.KEYID = 1
6,257,485 UART: [ldev] Erasing FE.KEYID = 1
8,627,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,367,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,382,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,397,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,412,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,360 UART: [ldev] --
10,438,451 UART: [fwproc] Wait for Commands...
10,441,306 UART: [fwproc] Recv command 0x46574c44
10,443,619 UART: [fwproc] Recv'd Img size: 114448 bytes
13,886,937 UART: ROM Fatal Error: 0x000B0016
13,890,563 >>> mbox cmd response: failed
13,891,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,891,292 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
6,024,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,255,042 >>> mbox cmd response: failed
14,255,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,076 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,465 UART:
192,833 UART: Running Caliptra ROM ...
193,999 UART:
603,769 UART: [state] CFI Enabled
619,658 UART: [state] LifecycleState = Unprovisioned
622,098 UART: [state] DebugLocked = No
624,736 UART: [state] WD Timer not started. Device not locked for debugging
628,601 UART: [kat] SHA2-256
818,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,255 UART: [kat] ++
829,788 UART: [kat] sha1
841,264 UART: [kat] SHA2-256
844,267 UART: [kat] SHA2-384
850,039 UART: [kat] SHA2-512-ACC
852,625 UART: [kat] ECC-384
3,294,540 UART: [kat] HMAC-384Kdf
3,308,501 UART: [kat] LMS
3,840,303 UART: [kat] --
3,844,807 UART: [cold-reset] ++
3,845,879 UART: [fht] FHT @ 0x50003400
3,855,862 UART: [idev] ++
3,856,533 UART: [idev] CDI.KEYID = 6
3,857,469 UART: [idev] SUBJECT.KEYID = 7
3,858,680 UART: [idev] UDS.KEYID = 0
6,435,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,579,802 UART: [idev] Erasing UDS.KEYID = 0
6,581,265 UART: [idev] Sha1 KeyId Algorithm
6,582,426 UART: [idev] --
6,582,912 UART: [ldev] ++
6,583,392 UART: [ldev] CDI.KEYID = 6
6,584,265 UART: [ldev] SUBJECT.KEYID = 5
6,585,375 UART: [ldev] AUTHORITY.KEYID = 7
6,586,557 UART: [ldev] FE.KEYID = 1
6,587,447 UART: [ldev] Erasing FE.KEYID = 1
8,853,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,439 UART: [ldev] --
10,642,626 UART: [fwproc] Wait for Commands...
10,644,805 UART: [fwproc] Recv command 0x46574c44
10,647,125 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,954 UART: ROM Fatal Error: 0x000B0016
14,097,626 >>> mbox cmd response: failed
14,098,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,098,425 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
6,322,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,496,536 >>> mbox cmd response: failed
14,497,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,491 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,472 UART: [idev] Erasing UDS.KEYID = 0
1,505,116 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,515,077 UART: [ldev] ++
1,515,245 UART: [ldev] CDI.KEYID = 6
1,515,608 UART: [ldev] SUBJECT.KEYID = 5
1,516,034 UART: [ldev] AUTHORITY.KEYID = 7
1,516,497 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,546,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,274 UART: [ldev] --
1,586,703 UART: [fwproc] Waiting for Commands...
1,587,568 UART: [fwproc] Received command 0x46574c44
1,588,359 UART: [fwproc] Received Image of size 114448 bytes
2,885,718 UART: ROM Fatal Error: 0x000B0016
2,886,875 >>> mbox cmd response: failed
2,886,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,881 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,300 >>> mbox cmd response: failed
2,739,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,306 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,762 UART: [kat] SHA2-256
882,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,808 UART: [kat] ++
886,960 UART: [kat] sha1
891,390 UART: [kat] SHA2-256
893,328 UART: [kat] SHA2-384
896,019 UART: [kat] SHA2-512-ACC
897,920 UART: [kat] ECC-384
903,555 UART: [kat] HMAC-384Kdf
908,267 UART: [kat] LMS
1,476,463 UART: [kat] --
1,477,534 UART: [cold-reset] ++
1,477,870 UART: [fht] Storing FHT @ 0x50003400
1,480,659 UART: [idev] ++
1,480,827 UART: [idev] CDI.KEYID = 6
1,481,187 UART: [idev] SUBJECT.KEYID = 7
1,481,611 UART: [idev] UDS.KEYID = 0
1,481,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,049 UART: [idev] Erasing UDS.KEYID = 0
1,507,243 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,963 UART: [idev] --
1,516,926 UART: [ldev] ++
1,517,094 UART: [ldev] CDI.KEYID = 6
1,517,457 UART: [ldev] SUBJECT.KEYID = 5
1,517,883 UART: [ldev] AUTHORITY.KEYID = 7
1,518,346 UART: [ldev] FE.KEYID = 1
1,523,782 UART: [ldev] Erasing FE.KEYID = 1
1,548,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,987 UART: [ldev] --
1,588,372 UART: [fwproc] Waiting for Commands...
1,589,063 UART: [fwproc] Received command 0x46574c44
1,589,854 UART: [fwproc] Received Image of size 114448 bytes
2,887,947 UART: ROM Fatal Error: 0x000B0016
2,889,104 >>> mbox cmd response: failed
2,889,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,110 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,738,589 >>> mbox cmd response: failed
2,738,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,595 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
893,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,611 UART: [kat] ++
897,763 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,343 UART: [fht] FHT @ 0x50003400
1,175,050 UART: [idev] ++
1,175,218 UART: [idev] CDI.KEYID = 6
1,175,578 UART: [idev] SUBJECT.KEYID = 7
1,176,002 UART: [idev] UDS.KEYID = 0
1,176,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,201,079 UART: [idev] Sha1 KeyId Algorithm
1,209,403 UART: [idev] --
1,210,245 UART: [ldev] ++
1,210,413 UART: [ldev] CDI.KEYID = 6
1,210,776 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,178 UART: [fwproc] Recv command 0x46574c44
1,283,906 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,241 UART: ROM Fatal Error: 0x000B0016
2,583,398 >>> mbox cmd response: failed
2,583,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,404 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,287 >>> mbox cmd response: failed
2,437,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,293 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,875 UART: [state] LifecycleState = Unprovisioned
85,530 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,395 UART: [kat] SHA2-256
893,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,170 UART: [kat] ++
897,322 UART: [kat] sha1
901,752 UART: [kat] SHA2-256
903,692 UART: [kat] SHA2-384
906,357 UART: [kat] SHA2-512-ACC
908,258 UART: [kat] ECC-384
918,079 UART: [kat] HMAC-384Kdf
922,563 UART: [kat] LMS
1,170,891 UART: [kat] --
1,171,780 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,174,913 UART: [idev] ++
1,175,081 UART: [idev] CDI.KEYID = 6
1,175,441 UART: [idev] SUBJECT.KEYID = 7
1,175,865 UART: [idev] UDS.KEYID = 0
1,176,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,546 UART: [ldev] ++
1,210,714 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,503 UART: [ldev] AUTHORITY.KEYID = 7
1,211,966 UART: [ldev] FE.KEYID = 1
1,217,250 UART: [ldev] Erasing FE.KEYID = 1
1,243,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,700 UART: [ldev] --
1,283,175 UART: [fwproc] Wait for Commands...
1,283,795 UART: [fwproc] Recv command 0x46574c44
1,284,523 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,322 UART: ROM Fatal Error: 0x000B0016
2,585,479 >>> mbox cmd response: failed
2,585,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,485 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,950 >>> mbox cmd response: failed
2,438,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,956 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,335 UART: [kat] SHA2-256
901,275 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,064 UART: [kat] LMS
1,168,376 UART: [kat] --
1,169,191 UART: [cold-reset] ++
1,169,555 UART: [fht] FHT @ 0x50003400
1,172,181 UART: [idev] ++
1,172,349 UART: [idev] CDI.KEYID = 6
1,172,710 UART: [idev] SUBJECT.KEYID = 7
1,173,135 UART: [idev] UDS.KEYID = 0
1,173,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,464 UART: [fwproc] Wait for Commands...
1,281,067 UART: [fwproc] Recv command 0x46574c44
1,281,800 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,203 UART: ROM Fatal Error: 0x000B0016
2,581,360 >>> mbox cmd response: failed
2,581,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,366 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,451 >>> mbox cmd response: failed
2,433,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,457 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,174,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,282,111 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x46574c44
1,283,453 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,692 UART: ROM Fatal Error: 0x000B0016
2,581,849 >>> mbox cmd response: failed
2,581,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,855 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,170 >>> mbox cmd response: failed
2,435,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,176 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,226 UART:
192,770 UART: Running Caliptra ROM ...
193,904 UART:
194,055 UART: [state] CFI Enabled
263,985 UART: [state] LifecycleState = Production
265,758 UART: [state] DebugLocked = No
267,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,803 UART: [kat] SHA2-256
441,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,846 UART: [kat] ++
452,381 UART: [kat] sha1
462,456 UART: [kat] SHA2-256
465,141 UART: [kat] SHA2-384
470,522 UART: [kat] SHA2-512-ACC
472,916 UART: [kat] ECC-384
2,767,477 UART: [kat] HMAC-384Kdf
2,779,841 UART: [kat] LMS
3,970,153 UART: [kat] --
3,974,718 UART: [cold-reset] ++
3,975,738 UART: [fht] Storing FHT @ 0x50003400
3,987,274 UART: [idev] ++
3,987,848 UART: [idev] CDI.KEYID = 6
3,988,785 UART: [idev] SUBJECT.KEYID = 7
3,990,004 UART: [idev] UDS.KEYID = 0
3,992,916 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,703 UART: [idev] Erasing UDS.KEYID = 0
7,327,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,927 UART: [idev] --
7,353,441 UART: [ldev] ++
7,354,087 UART: [ldev] CDI.KEYID = 6
7,354,982 UART: [ldev] SUBJECT.KEYID = 5
7,356,221 UART: [ldev] AUTHORITY.KEYID = 7
7,357,463 UART: [ldev] FE.KEYID = 1
7,400,160 UART: [ldev] Erasing FE.KEYID = 1
10,733,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,591 UART: [ldev] --
13,094,674 UART: [fwproc] Waiting for Commands...
13,096,292 UART: [fwproc] Received command 0x46574c44
13,098,534 UART: [fwproc] Received Image of size 114124 bytes
13,201,120 UART: ROM Fatal Error: 0x000B0007
13,204,586 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,805,785 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,940,682 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,647 UART:
193,009 UART: Running Caliptra ROM ...
194,197 UART:
604,018 UART: [state] CFI Enabled
617,868 UART: [state] LifecycleState = Production
619,677 UART: [state] DebugLocked = No
621,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,749 UART: [kat] SHA2-256
795,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,034 UART: [kat] ++
806,485 UART: [kat] sha1
818,658 UART: [kat] SHA2-256
821,336 UART: [kat] SHA2-384
827,259 UART: [kat] SHA2-512-ACC
829,653 UART: [kat] ECC-384
3,113,397 UART: [kat] HMAC-384Kdf
3,125,754 UART: [kat] LMS
4,315,866 UART: [kat] --
4,321,751 UART: [cold-reset] ++
4,323,102 UART: [fht] Storing FHT @ 0x50003400
4,333,297 UART: [idev] ++
4,333,861 UART: [idev] CDI.KEYID = 6
4,334,895 UART: [idev] SUBJECT.KEYID = 7
4,336,062 UART: [idev] UDS.KEYID = 0
4,338,986 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,566 UART: [idev] Erasing UDS.KEYID = 0
7,623,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,609 UART: [idev] --
7,648,236 UART: [ldev] ++
7,648,863 UART: [ldev] CDI.KEYID = 6
7,649,786 UART: [ldev] SUBJECT.KEYID = 5
7,651,002 UART: [ldev] AUTHORITY.KEYID = 7
7,652,238 UART: [ldev] FE.KEYID = 1
7,663,340 UART: [ldev] Erasing FE.KEYID = 1
10,952,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,055 UART: [ldev] --
13,313,458 UART: [fwproc] Waiting for Commands...
13,316,742 UART: [fwproc] Received command 0x46574c44
13,318,937 UART: [fwproc] Received Image of size 114124 bytes
13,418,841 UART: ROM Fatal Error: 0x000B0007
13,422,317 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,125,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,145,848 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,117 UART:
192,492 UART: Running Caliptra ROM ...
193,576 UART:
193,718 UART: [state] CFI Enabled
264,626 UART: [state] LifecycleState = Production
266,350 UART: [state] DebugLocked = No
268,792 UART: [state] WD Timer not started. Device not locked for debugging
271,623 UART: [kat] SHA2-256
450,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,333 UART: [kat] ++
462,869 UART: [kat] sha1
474,350 UART: [kat] SHA2-256
477,354 UART: [kat] SHA2-384
482,436 UART: [kat] SHA2-512-ACC
485,425 UART: [kat] ECC-384
2,950,636 UART: [kat] HMAC-384Kdf
2,971,737 UART: [kat] LMS
3,501,192 UART: [kat] --
3,507,910 UART: [cold-reset] ++
3,508,931 UART: [fht] FHT @ 0x50003400
3,519,021 UART: [idev] ++
3,519,583 UART: [idev] CDI.KEYID = 6
3,520,469 UART: [idev] SUBJECT.KEYID = 7
3,521,684 UART: [idev] UDS.KEYID = 0
3,524,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,004 UART: [idev] Erasing UDS.KEYID = 0
6,026,448 UART: [idev] Sha1 KeyId Algorithm
6,050,332 UART: [idev] --
6,053,662 UART: [ldev] ++
6,054,267 UART: [ldev] CDI.KEYID = 6
6,055,182 UART: [ldev] SUBJECT.KEYID = 5
6,056,345 UART: [ldev] AUTHORITY.KEYID = 7
6,057,583 UART: [ldev] FE.KEYID = 1
6,100,585 UART: [ldev] Erasing FE.KEYID = 1
8,602,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,212 UART: [ldev] --
10,415,886 UART: [fwproc] Wait for Commands...
10,417,444 UART: [fwproc] Recv command 0x46574c44
10,419,488 UART: [fwproc] Recv'd Img size: 114448 bytes
10,517,654 UART: ROM Fatal Error: 0x000B0007
10,520,761 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,361,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,019 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,572 UART:
192,935 UART: Running Caliptra ROM ...
194,053 UART:
603,661 UART: [state] CFI Enabled
619,285 UART: [state] LifecycleState = Production
621,018 UART: [state] DebugLocked = No
623,534 UART: [state] WD Timer not started. Device not locked for debugging
627,267 UART: [kat] SHA2-256
806,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,989 UART: [kat] ++
818,531 UART: [kat] sha1
829,417 UART: [kat] SHA2-256
832,478 UART: [kat] SHA2-384
838,399 UART: [kat] SHA2-512-ACC
841,340 UART: [kat] ECC-384
3,281,122 UART: [kat] HMAC-384Kdf
3,294,981 UART: [kat] LMS
3,824,443 UART: [kat] --
3,830,460 UART: [cold-reset] ++
3,832,546 UART: [fht] FHT @ 0x50003400
3,843,628 UART: [idev] ++
3,844,197 UART: [idev] CDI.KEYID = 6
3,845,264 UART: [idev] SUBJECT.KEYID = 7
3,846,386 UART: [idev] UDS.KEYID = 0
3,849,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,307 UART: [idev] Erasing UDS.KEYID = 0
6,315,722 UART: [idev] Sha1 KeyId Algorithm
6,338,910 UART: [idev] --
6,342,249 UART: [ldev] ++
6,342,819 UART: [ldev] CDI.KEYID = 6
6,343,726 UART: [ldev] SUBJECT.KEYID = 5
6,344,944 UART: [ldev] AUTHORITY.KEYID = 7
6,346,179 UART: [ldev] FE.KEYID = 1
6,355,964 UART: [ldev] Erasing FE.KEYID = 1
8,829,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,331 UART: [ldev] --
10,619,905 UART: [fwproc] Wait for Commands...
10,621,734 UART: [fwproc] Recv command 0x46574c44
10,623,778 UART: [fwproc] Recv'd Img size: 114448 bytes
10,722,999 UART: ROM Fatal Error: 0x000B0007
10,726,086 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,692,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,497,873 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
192,022 UART:
192,397 UART: Running Caliptra ROM ...
193,491 UART:
193,636 UART: [state] CFI Enabled
266,849 UART: [state] LifecycleState = Production
269,096 UART: [state] DebugLocked = No
270,454 UART: [state] WD Timer not started. Device not locked for debugging
274,389 UART: [kat] SHA2-256
464,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,025 UART: [kat] ++
475,478 UART: [kat] sha1
487,652 UART: [kat] SHA2-256
490,670 UART: [kat] SHA2-384
496,277 UART: [kat] SHA2-512-ACC
498,833 UART: [kat] ECC-384
2,950,428 UART: [kat] HMAC-384Kdf
2,972,621 UART: [kat] LMS
3,504,413 UART: [kat] --
3,510,750 UART: [cold-reset] ++
3,513,175 UART: [fht] FHT @ 0x50003400
3,524,701 UART: [idev] ++
3,525,441 UART: [idev] CDI.KEYID = 6
3,526,356 UART: [idev] SUBJECT.KEYID = 7
3,527,572 UART: [idev] UDS.KEYID = 0
3,530,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,674,693 UART: [idev] Erasing UDS.KEYID = 0
6,030,963 UART: [idev] Sha1 KeyId Algorithm
6,052,524 UART: [idev] --
6,057,749 UART: [ldev] ++
6,058,448 UART: [ldev] CDI.KEYID = 6
6,059,334 UART: [ldev] SUBJECT.KEYID = 5
6,060,569 UART: [ldev] AUTHORITY.KEYID = 7
6,061,759 UART: [ldev] FE.KEYID = 1
6,100,951 UART: [ldev] Erasing FE.KEYID = 1
8,605,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,094 UART: [ldev] --
10,414,417 UART: [fwproc] Wait for Commands...
10,416,351 UART: [fwproc] Recv command 0x46574c44
10,418,668 UART: [fwproc] Recv'd Img size: 114448 bytes
10,548,473 UART: ROM Fatal Error: 0x000B0007
10,552,116 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,439,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,335,784 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,482 UART:
192,984 UART: Running Caliptra ROM ...
194,099 UART:
603,577 UART: [state] CFI Enabled
617,100 UART: [state] LifecycleState = Production
619,278 UART: [state] DebugLocked = No
620,875 UART: [state] WD Timer not started. Device not locked for debugging
625,876 UART: [kat] SHA2-256
815,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,507 UART: [kat] ++
827,097 UART: [kat] sha1
837,503 UART: [kat] SHA2-256
840,509 UART: [kat] SHA2-384
846,644 UART: [kat] SHA2-512-ACC
849,253 UART: [kat] ECC-384
3,289,059 UART: [kat] HMAC-384Kdf
3,303,940 UART: [kat] LMS
3,835,805 UART: [kat] --
3,841,531 UART: [cold-reset] ++
3,843,307 UART: [fht] FHT @ 0x50003400
3,853,531 UART: [idev] ++
3,854,248 UART: [idev] CDI.KEYID = 6
3,855,274 UART: [idev] SUBJECT.KEYID = 7
3,856,382 UART: [idev] UDS.KEYID = 0
3,859,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,241 UART: [idev] Erasing UDS.KEYID = 0
6,337,066 UART: [idev] Sha1 KeyId Algorithm
6,359,557 UART: [idev] --
6,364,212 UART: [ldev] ++
6,364,899 UART: [ldev] CDI.KEYID = 6
6,365,815 UART: [ldev] SUBJECT.KEYID = 5
6,366,980 UART: [ldev] AUTHORITY.KEYID = 7
6,368,211 UART: [ldev] FE.KEYID = 1
6,377,692 UART: [ldev] Erasing FE.KEYID = 1
8,859,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,840 UART: [ldev] --
10,651,382 UART: [fwproc] Wait for Commands...
10,654,436 UART: [fwproc] Recv command 0x46574c44
10,656,701 UART: [fwproc] Recv'd Img size: 114448 bytes
10,788,744 UART: ROM Fatal Error: 0x000B0007
10,792,423 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,758,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,586,871 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Production
86,319 UART: [state] DebugLocked = No
86,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,527 UART: [kat] SHA2-256
882,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,573 UART: [kat] ++
886,725 UART: [kat] sha1
890,873 UART: [kat] SHA2-256
892,811 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,068 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,913 UART: [cold-reset] ++
1,477,427 UART: [fht] Storing FHT @ 0x50003400
1,480,218 UART: [idev] ++
1,480,386 UART: [idev] CDI.KEYID = 6
1,480,746 UART: [idev] SUBJECT.KEYID = 7
1,481,170 UART: [idev] UDS.KEYID = 0
1,481,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,326 UART: [idev] Erasing UDS.KEYID = 0
1,505,480 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,050 UART: [idev] --
1,515,055 UART: [ldev] ++
1,515,223 UART: [ldev] CDI.KEYID = 6
1,515,586 UART: [ldev] SUBJECT.KEYID = 5
1,516,012 UART: [ldev] AUTHORITY.KEYID = 7
1,516,475 UART: [ldev] FE.KEYID = 1
1,521,273 UART: [ldev] Erasing FE.KEYID = 1
1,546,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,236 UART: [ldev] --
1,585,515 UART: [fwproc] Waiting for Commands...
1,586,168 UART: [fwproc] Received command 0x46574c44
1,586,959 UART: [fwproc] Received Image of size 114448 bytes
1,635,514 UART: ROM Fatal Error: 0x000B0007
1,636,671 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,616 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Production
85,994 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,276 UART: [kat] SHA2-256
892,214 UART: [kat] SHA2-384
894,887 UART: [kat] SHA2-512-ACC
896,788 UART: [kat] ECC-384
902,269 UART: [kat] HMAC-384Kdf
907,135 UART: [kat] LMS
1,475,331 UART: [kat] --
1,475,878 UART: [cold-reset] ++
1,476,304 UART: [fht] Storing FHT @ 0x50003400
1,479,079 UART: [idev] ++
1,479,247 UART: [idev] CDI.KEYID = 6
1,479,607 UART: [idev] SUBJECT.KEYID = 7
1,480,031 UART: [idev] UDS.KEYID = 0
1,480,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,169 UART: [idev] Erasing UDS.KEYID = 0
1,504,929 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,449 UART: [idev] --
1,514,386 UART: [ldev] ++
1,514,554 UART: [ldev] CDI.KEYID = 6
1,514,917 UART: [ldev] SUBJECT.KEYID = 5
1,515,343 UART: [ldev] AUTHORITY.KEYID = 7
1,515,806 UART: [ldev] FE.KEYID = 1
1,521,068 UART: [ldev] Erasing FE.KEYID = 1
1,546,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,947 UART: [ldev] --
1,586,328 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 114448 bytes
1,637,291 UART: ROM Fatal Error: 0x000B0007
1,638,448 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,491,517 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Production
86,043 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,434 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,663 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,152 UART: [idev] Erasing UDS.KEYID = 0
1,200,721 UART: [idev] Sha1 KeyId Algorithm
1,209,119 UART: [idev] --
1,210,251 UART: [ldev] ++
1,210,419 UART: [ldev] CDI.KEYID = 6
1,210,782 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,305 UART: [ldev] --
1,282,740 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,248 UART: [fwproc] Recv'd Img size: 114448 bytes
1,333,887 UART: ROM Fatal Error: 0x000B0007
1,335,044 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,591 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Production
86,094 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,494 UART: [fht] FHT @ 0x50003400
1,175,013 UART: [idev] ++
1,175,181 UART: [idev] CDI.KEYID = 6
1,175,541 UART: [idev] SUBJECT.KEYID = 7
1,175,965 UART: [idev] UDS.KEYID = 0
1,176,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,035 UART: [idev] Erasing UDS.KEYID = 0
1,200,554 UART: [idev] Sha1 KeyId Algorithm
1,208,972 UART: [idev] --
1,210,046 UART: [ldev] ++
1,210,214 UART: [ldev] CDI.KEYID = 6
1,210,577 UART: [ldev] SUBJECT.KEYID = 5
1,211,003 UART: [ldev] AUTHORITY.KEYID = 7
1,211,466 UART: [ldev] FE.KEYID = 1
1,216,778 UART: [ldev] Erasing FE.KEYID = 1
1,243,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,396 UART: [ldev] --
1,282,911 UART: [fwproc] Wait for Commands...
1,283,675 UART: [fwproc] Recv command 0x46574c44
1,284,403 UART: [fwproc] Recv'd Img size: 114448 bytes
1,333,490 UART: ROM Fatal Error: 0x000B0007
1,334,647 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,548 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Production
85,745 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: [kat] ++
895,325 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,276 UART: [kat] LMS
1,168,588 UART: [kat] --
1,169,399 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,325 UART: [idev] ++
1,172,493 UART: [idev] CDI.KEYID = 6
1,172,854 UART: [idev] SUBJECT.KEYID = 7
1,173,279 UART: [idev] UDS.KEYID = 0
1,173,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,079 UART: [idev] Erasing UDS.KEYID = 0
1,197,517 UART: [idev] Sha1 KeyId Algorithm
1,206,361 UART: [idev] --
1,207,398 UART: [ldev] ++
1,207,566 UART: [ldev] CDI.KEYID = 6
1,207,930 UART: [ldev] SUBJECT.KEYID = 5
1,208,357 UART: [ldev] AUTHORITY.KEYID = 7
1,208,820 UART: [ldev] FE.KEYID = 1
1,213,982 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,142 UART: [ldev] --
1,279,496 UART: [fwproc] Wait for Commands...
1,280,247 UART: [fwproc] Recv command 0x46574c44
1,280,980 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,799 UART: ROM Fatal Error: 0x000B0007
1,330,956 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,057 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Production
86,158 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,207,640 UART: [idev] --
1,208,797 UART: [ldev] ++
1,208,965 UART: [ldev] CDI.KEYID = 6
1,209,329 UART: [ldev] SUBJECT.KEYID = 5
1,209,756 UART: [ldev] AUTHORITY.KEYID = 7
1,210,219 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,808 UART: ROM Fatal Error: 0x000B0007
1,332,965 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,834 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,200 UART:
192,565 UART: Running Caliptra ROM ...
193,661 UART:
193,805 UART: [state] CFI Enabled
268,830 UART: [state] LifecycleState = Production
270,647 UART: [state] DebugLocked = No
271,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,927 UART: [kat] SHA2-256
446,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,138 UART: [kat] ++
457,585 UART: [kat] sha1
468,080 UART: [kat] SHA2-256
470,772 UART: [kat] SHA2-384
475,606 UART: [kat] SHA2-512-ACC
477,963 UART: [kat] ECC-384
2,766,419 UART: [kat] HMAC-384Kdf
2,779,555 UART: [kat] LMS
3,969,822 UART: [kat] --
3,973,500 UART: [cold-reset] ++
3,974,841 UART: [fht] Storing FHT @ 0x50003400
3,985,162 UART: [idev] ++
3,985,726 UART: [idev] CDI.KEYID = 6
3,986,667 UART: [idev] SUBJECT.KEYID = 7
3,987,933 UART: [idev] UDS.KEYID = 0
3,990,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,644 UART: [idev] Erasing UDS.KEYID = 0
7,326,981 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,219 UART: [idev] --
7,352,222 UART: [ldev] ++
7,353,002 UART: [ldev] CDI.KEYID = 6
7,353,910 UART: [ldev] SUBJECT.KEYID = 5
7,355,016 UART: [ldev] AUTHORITY.KEYID = 7
7,356,146 UART: [ldev] FE.KEYID = 1
7,403,137 UART: [ldev] Erasing FE.KEYID = 1
10,735,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,724 UART: [ldev] --
13,117,112 UART: [fwproc] Waiting for Commands...
13,118,983 UART: [fwproc] Received command 0x46574c44
13,121,178 UART: [fwproc] Received Image of size 114124 bytes
13,220,352 UART: ROM Fatal Error: 0x000B0007
13,223,865 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,808,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,984,823 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,574 UART:
192,931 UART: Running Caliptra ROM ...
194,107 UART:
603,783 UART: [state] CFI Enabled
615,298 UART: [state] LifecycleState = Production
617,125 UART: [state] DebugLocked = No
619,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,258 UART: [kat] SHA2-256
794,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,563 UART: [kat] ++
805,099 UART: [kat] sha1
815,013 UART: [kat] SHA2-256
817,747 UART: [kat] SHA2-384
823,455 UART: [kat] SHA2-512-ACC
825,848 UART: [kat] ECC-384
3,111,178 UART: [kat] HMAC-384Kdf
3,122,389 UART: [kat] LMS
4,312,508 UART: [kat] --
4,317,113 UART: [cold-reset] ++
4,318,887 UART: [fht] Storing FHT @ 0x50003400
4,331,781 UART: [idev] ++
4,332,368 UART: [idev] CDI.KEYID = 6
4,333,284 UART: [idev] SUBJECT.KEYID = 7
4,334,555 UART: [idev] UDS.KEYID = 0
4,337,308 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,801 UART: [idev] Erasing UDS.KEYID = 0
7,626,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,790 UART: [idev] --
7,652,706 UART: [ldev] ++
7,653,277 UART: [ldev] CDI.KEYID = 6
7,654,358 UART: [ldev] SUBJECT.KEYID = 5
7,655,420 UART: [ldev] AUTHORITY.KEYID = 7
7,656,723 UART: [ldev] FE.KEYID = 1
7,668,695 UART: [ldev] Erasing FE.KEYID = 1
10,953,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,515 UART: [ldev] --
13,312,971 UART: [fwproc] Waiting for Commands...
13,315,824 UART: [fwproc] Received command 0x46574c44
13,318,018 UART: [fwproc] Received Image of size 114124 bytes
13,415,657 UART: ROM Fatal Error: 0x000B0007
13,419,184 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,127,448 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,155,950 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,113 UART:
192,485 UART: Running Caliptra ROM ...
193,567 UART:
193,707 UART: [state] CFI Enabled
265,092 UART: [state] LifecycleState = Production
266,828 UART: [state] DebugLocked = No
268,099 UART: [state] WD Timer not started. Device not locked for debugging
271,335 UART: [kat] SHA2-256
450,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,026 UART: [kat] ++
462,566 UART: [kat] sha1
474,696 UART: [kat] SHA2-256
477,707 UART: [kat] SHA2-384
485,091 UART: [kat] SHA2-512-ACC
488,069 UART: [kat] ECC-384
2,949,561 UART: [kat] HMAC-384Kdf
2,972,202 UART: [kat] LMS
3,501,693 UART: [kat] --
3,506,931 UART: [cold-reset] ++
3,508,760 UART: [fht] FHT @ 0x50003400
3,518,985 UART: [idev] ++
3,519,560 UART: [idev] CDI.KEYID = 6
3,520,577 UART: [idev] SUBJECT.KEYID = 7
3,521,685 UART: [idev] UDS.KEYID = 0
3,524,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,731 UART: [idev] Erasing UDS.KEYID = 0
6,026,931 UART: [idev] Sha1 KeyId Algorithm
6,048,824 UART: [idev] --
6,054,066 UART: [ldev] ++
6,054,650 UART: [ldev] CDI.KEYID = 6
6,055,564 UART: [ldev] SUBJECT.KEYID = 5
6,056,749 UART: [ldev] AUTHORITY.KEYID = 7
6,057,985 UART: [ldev] FE.KEYID = 1
6,099,600 UART: [ldev] Erasing FE.KEYID = 1
8,603,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,957 UART: [ldev] --
10,411,862 UART: [fwproc] Wait for Commands...
10,414,127 UART: [fwproc] Recv command 0x46574c44
10,416,225 UART: [fwproc] Recv'd Img size: 114448 bytes
10,515,050 UART: ROM Fatal Error: 0x000B0007
10,518,202 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,385,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,513 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
192,653 UART:
193,023 UART: Running Caliptra ROM ...
194,116 UART:
603,808 UART: [state] CFI Enabled
617,445 UART: [state] LifecycleState = Production
619,206 UART: [state] DebugLocked = No
620,911 UART: [state] WD Timer not started. Device not locked for debugging
625,210 UART: [kat] SHA2-256
804,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,824 UART: [kat] ++
816,358 UART: [kat] sha1
826,376 UART: [kat] SHA2-256
829,378 UART: [kat] SHA2-384
834,491 UART: [kat] SHA2-512-ACC
837,433 UART: [kat] ECC-384
3,280,271 UART: [kat] HMAC-384Kdf
3,293,797 UART: [kat] LMS
3,823,302 UART: [kat] --
3,828,518 UART: [cold-reset] ++
3,830,206 UART: [fht] FHT @ 0x50003400
3,841,417 UART: [idev] ++
3,842,003 UART: [idev] CDI.KEYID = 6
3,842,920 UART: [idev] SUBJECT.KEYID = 7
3,844,080 UART: [idev] UDS.KEYID = 0
3,846,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,904 UART: [idev] Erasing UDS.KEYID = 0
6,314,845 UART: [idev] Sha1 KeyId Algorithm
6,338,079 UART: [idev] --
6,342,297 UART: [ldev] ++
6,342,868 UART: [ldev] CDI.KEYID = 6
6,343,780 UART: [ldev] SUBJECT.KEYID = 5
6,344,998 UART: [ldev] AUTHORITY.KEYID = 7
6,346,228 UART: [ldev] FE.KEYID = 1
6,356,958 UART: [ldev] Erasing FE.KEYID = 1
8,828,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,741 UART: [ldev] --
10,617,784 UART: [fwproc] Wait for Commands...
10,620,148 UART: [fwproc] Recv command 0x46574c44
10,622,188 UART: [fwproc] Recv'd Img size: 114448 bytes
10,724,303 UART: ROM Fatal Error: 0x000B0007
10,727,396 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
3,699,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,501,854 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,058 UART:
192,414 UART: Running Caliptra ROM ...
193,604 UART:
193,758 UART: [state] CFI Enabled
264,268 UART: [state] LifecycleState = Production
266,469 UART: [state] DebugLocked = No
269,088 UART: [state] WD Timer not started. Device not locked for debugging
274,248 UART: [kat] SHA2-256
464,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,897 UART: [kat] ++
475,393 UART: [kat] sha1
487,516 UART: [kat] SHA2-256
490,524 UART: [kat] SHA2-384
496,776 UART: [kat] SHA2-512-ACC
499,341 UART: [kat] ECC-384
2,948,670 UART: [kat] HMAC-384Kdf
2,973,233 UART: [kat] LMS
3,504,991 UART: [kat] --
3,508,851 UART: [cold-reset] ++
3,510,840 UART: [fht] FHT @ 0x50003400
3,522,252 UART: [idev] ++
3,522,988 UART: [idev] CDI.KEYID = 6
3,523,896 UART: [idev] SUBJECT.KEYID = 7
3,525,109 UART: [idev] UDS.KEYID = 0
3,527,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,971 UART: [idev] Erasing UDS.KEYID = 0
6,030,793 UART: [idev] Sha1 KeyId Algorithm
6,053,549 UART: [idev] --
6,057,928 UART: [ldev] ++
6,058,621 UART: [ldev] CDI.KEYID = 6
6,059,691 UART: [ldev] SUBJECT.KEYID = 5
6,060,801 UART: [ldev] AUTHORITY.KEYID = 7
6,061,985 UART: [ldev] FE.KEYID = 1
6,100,880 UART: [ldev] Erasing FE.KEYID = 1
8,606,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,291 UART: [ldev] --
10,415,203 UART: [fwproc] Wait for Commands...
10,417,513 UART: [fwproc] Recv command 0x46574c44
10,419,790 UART: [fwproc] Recv'd Img size: 114448 bytes
10,551,359 UART: ROM Fatal Error: 0x000B0007
10,555,067 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,440,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,358,602 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,397 UART:
192,756 UART: Running Caliptra ROM ...
193,953 UART:
603,402 UART: [state] CFI Enabled
620,527 UART: [state] LifecycleState = Production
622,743 UART: [state] DebugLocked = No
624,335 UART: [state] WD Timer not started. Device not locked for debugging
629,304 UART: [kat] SHA2-256
819,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,952 UART: [kat] ++
830,542 UART: [kat] sha1
841,916 UART: [kat] SHA2-256
844,928 UART: [kat] SHA2-384
850,904 UART: [kat] SHA2-512-ACC
853,514 UART: [kat] ECC-384
3,295,632 UART: [kat] HMAC-384Kdf
3,309,105 UART: [kat] LMS
3,840,943 UART: [kat] --
3,844,501 UART: [cold-reset] ++
3,846,650 UART: [fht] FHT @ 0x50003400
3,859,250 UART: [idev] ++
3,859,932 UART: [idev] CDI.KEYID = 6
3,860,949 UART: [idev] SUBJECT.KEYID = 7
3,862,128 UART: [idev] UDS.KEYID = 0
3,864,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,847 UART: [idev] Erasing UDS.KEYID = 0
6,341,948 UART: [idev] Sha1 KeyId Algorithm
6,363,471 UART: [idev] --
6,367,785 UART: [ldev] ++
6,368,468 UART: [ldev] CDI.KEYID = 6
6,369,379 UART: [ldev] SUBJECT.KEYID = 5
6,370,533 UART: [ldev] AUTHORITY.KEYID = 7
6,371,765 UART: [ldev] FE.KEYID = 1
6,382,520 UART: [ldev] Erasing FE.KEYID = 1
8,862,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,992 UART: [ldev] --
10,653,008 UART: [fwproc] Wait for Commands...
10,655,986 UART: [fwproc] Recv command 0x46574c44
10,658,297 UART: [fwproc] Recv'd Img size: 114448 bytes
10,786,576 UART: ROM Fatal Error: 0x000B0007
10,790,203 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,755,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,576,479 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Production
85,769 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,062 UART: [kat] SHA2-512-ACC
896,963 UART: [kat] ECC-384
902,282 UART: [kat] HMAC-384Kdf
906,846 UART: [kat] LMS
1,475,042 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,493 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,522 UART: [idev] Erasing UDS.KEYID = 0
1,504,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,464 UART: [idev] --
1,514,597 UART: [ldev] ++
1,514,765 UART: [ldev] CDI.KEYID = 6
1,515,128 UART: [ldev] SUBJECT.KEYID = 5
1,515,554 UART: [ldev] AUTHORITY.KEYID = 7
1,516,017 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,546,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,018 UART: [ldev] --
1,585,293 UART: [fwproc] Waiting for Commands...
1,585,990 UART: [fwproc] Received command 0x46574c44
1,586,781 UART: [fwproc] Received Image of size 114448 bytes
1,636,420 UART: ROM Fatal Error: 0x000B0007
1,637,577 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,582 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Production
86,110 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,290 UART: [kat] SHA2-256
882,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,336 UART: [kat] ++
886,488 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,795 UART: [kat] LMS
1,475,991 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,479,787 UART: [idev] ++
1,479,955 UART: [idev] CDI.KEYID = 6
1,480,315 UART: [idev] SUBJECT.KEYID = 7
1,480,739 UART: [idev] UDS.KEYID = 0
1,481,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,311 UART: [idev] Erasing UDS.KEYID = 0
1,504,651 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,277 UART: [idev] --
1,514,320 UART: [ldev] ++
1,514,488 UART: [ldev] CDI.KEYID = 6
1,514,851 UART: [ldev] SUBJECT.KEYID = 5
1,515,277 UART: [ldev] AUTHORITY.KEYID = 7
1,515,740 UART: [ldev] FE.KEYID = 1
1,521,126 UART: [ldev] Erasing FE.KEYID = 1
1,546,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,885 UART: [ldev] --
1,586,370 UART: [fwproc] Waiting for Commands...
1,587,073 UART: [fwproc] Received command 0x46574c44
1,587,864 UART: [fwproc] Received Image of size 114448 bytes
1,636,803 UART: ROM Fatal Error: 0x000B0007
1,637,960 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,809 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,692 UART: [state] LifecycleState = Production
86,299 UART: [state] DebugLocked = No
86,973 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
893,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,887 UART: [kat] ++
898,039 UART: [kat] sha1
902,295 UART: [kat] SHA2-256
904,235 UART: [kat] SHA2-384
907,044 UART: [kat] SHA2-512-ACC
908,945 UART: [kat] ECC-384
919,198 UART: [kat] HMAC-384Kdf
923,636 UART: [kat] LMS
1,171,964 UART: [kat] --
1,172,963 UART: [cold-reset] ++
1,173,331 UART: [fht] FHT @ 0x50003400
1,175,924 UART: [idev] ++
1,176,092 UART: [idev] CDI.KEYID = 6
1,176,452 UART: [idev] SUBJECT.KEYID = 7
1,176,876 UART: [idev] UDS.KEYID = 0
1,177,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,660 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,209,915 UART: [idev] --
1,210,917 UART: [ldev] ++
1,211,085 UART: [ldev] CDI.KEYID = 6
1,211,448 UART: [ldev] SUBJECT.KEYID = 5
1,211,874 UART: [ldev] AUTHORITY.KEYID = 7
1,212,337 UART: [ldev] FE.KEYID = 1
1,217,645 UART: [ldev] Erasing FE.KEYID = 1
1,244,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,519 UART: [ldev] --
1,283,980 UART: [fwproc] Wait for Commands...
1,284,644 UART: [fwproc] Recv command 0x46574c44
1,285,372 UART: [fwproc] Recv'd Img size: 114448 bytes
1,334,661 UART: ROM Fatal Error: 0x000B0007
1,335,818 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,811 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Production
85,610 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
893,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,224 UART: [kat] ++
897,376 UART: [kat] sha1
901,686 UART: [kat] SHA2-256
903,626 UART: [kat] SHA2-384
906,267 UART: [kat] SHA2-512-ACC
908,168 UART: [kat] ECC-384
918,219 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,954 UART: [cold-reset] ++
1,172,468 UART: [fht] FHT @ 0x50003400
1,175,249 UART: [idev] ++
1,175,417 UART: [idev] CDI.KEYID = 6
1,175,777 UART: [idev] SUBJECT.KEYID = 7
1,176,201 UART: [idev] UDS.KEYID = 0
1,176,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,414 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,944 UART: [ldev] ++
1,211,112 UART: [ldev] CDI.KEYID = 6
1,211,475 UART: [ldev] SUBJECT.KEYID = 5
1,211,901 UART: [ldev] AUTHORITY.KEYID = 7
1,212,364 UART: [ldev] FE.KEYID = 1
1,217,284 UART: [ldev] Erasing FE.KEYID = 1
1,243,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,704 UART: [ldev] --
1,283,203 UART: [fwproc] Wait for Commands...
1,283,847 UART: [fwproc] Recv command 0x46574c44
1,284,575 UART: [fwproc] Recv'd Img size: 114448 bytes
1,334,352 UART: ROM Fatal Error: 0x000B0007
1,335,509 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,190,936 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Production
85,975 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,054 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,919 UART: ROM Fatal Error: 0x000B0007
1,332,076 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,501 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Production
85,726 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,331 UART: [kat] LMS
1,168,643 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,198,888 UART: [idev] Sha1 KeyId Algorithm
1,207,790 UART: [idev] --
1,208,763 UART: [ldev] ++
1,208,931 UART: [ldev] CDI.KEYID = 6
1,209,295 UART: [ldev] SUBJECT.KEYID = 5
1,209,722 UART: [ldev] AUTHORITY.KEYID = 7
1,210,185 UART: [ldev] FE.KEYID = 1
1,215,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,869 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,896 UART: ROM Fatal Error: 0x000B0007
1,332,053 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,982 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,266 UART:
192,630 UART: Running Caliptra ROM ...
193,820 UART:
193,978 UART: [state] CFI Enabled
266,505 UART: [state] LifecycleState = Production
268,313 UART: [state] DebugLocked = No
269,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,097 UART: [kat] SHA2-256
443,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,299 UART: [kat] ++
454,826 UART: [kat] sha1
465,656 UART: [kat] SHA2-256
468,386 UART: [kat] SHA2-384
475,331 UART: [kat] SHA2-512-ACC
477,674 UART: [kat] ECC-384
2,769,155 UART: [kat] HMAC-384Kdf
2,801,751 UART: [kat] LMS
3,992,049 UART: [kat] --
3,997,350 UART: [cold-reset] ++
3,999,390 UART: [fht] Storing FHT @ 0x50003400
4,011,844 UART: [idev] ++
4,012,409 UART: [idev] CDI.KEYID = 6
4,013,410 UART: [idev] SUBJECT.KEYID = 7
4,014,583 UART: [idev] UDS.KEYID = 0
4,017,435 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,161,641 UART: [idev] Erasing UDS.KEYID = 0
7,348,796 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,223 UART: [idev] --
7,373,707 UART: [ldev] ++
7,374,280 UART: [ldev] CDI.KEYID = 6
7,375,245 UART: [ldev] SUBJECT.KEYID = 5
7,376,459 UART: [ldev] AUTHORITY.KEYID = 7
7,377,691 UART: [ldev] FE.KEYID = 1
7,424,620 UART: [ldev] Erasing FE.KEYID = 1
10,754,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,657 UART: [ldev] --
13,120,137 UART: [fwproc] Waiting for Commands...
13,121,856 UART: [fwproc] Received command 0x46574c44
13,124,096 UART: [fwproc] Received Image of size 114124 bytes
13,216,908 UART: ROM Fatal Error: 0x000B0005
13,220,419 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,800,686 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,948,426 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,577 UART:
192,923 UART: Running Caliptra ROM ...
194,010 UART:
603,964 UART: [state] CFI Enabled
618,895 UART: [state] LifecycleState = Production
620,695 UART: [state] DebugLocked = No
622,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,856 UART: [kat] SHA2-256
796,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,176 UART: [kat] ++
807,708 UART: [kat] sha1
819,024 UART: [kat] SHA2-256
821,720 UART: [kat] SHA2-384
827,480 UART: [kat] SHA2-512-ACC
829,817 UART: [kat] ECC-384
3,113,291 UART: [kat] HMAC-384Kdf
3,124,232 UART: [kat] LMS
4,314,323 UART: [kat] --
4,318,853 UART: [cold-reset] ++
4,321,325 UART: [fht] Storing FHT @ 0x50003400
4,334,319 UART: [idev] ++
4,334,939 UART: [idev] CDI.KEYID = 6
4,335,997 UART: [idev] SUBJECT.KEYID = 7
4,337,055 UART: [idev] UDS.KEYID = 0
4,339,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,263 UART: [idev] Erasing UDS.KEYID = 0
7,623,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,574 UART: [idev] --
7,648,166 UART: [ldev] ++
7,648,735 UART: [ldev] CDI.KEYID = 6
7,649,756 UART: [ldev] SUBJECT.KEYID = 5
7,650,939 UART: [ldev] AUTHORITY.KEYID = 7
7,652,177 UART: [ldev] FE.KEYID = 1
7,662,669 UART: [ldev] Erasing FE.KEYID = 1
10,950,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,327 UART: [ldev] --
13,312,647 UART: [fwproc] Waiting for Commands...
13,315,617 UART: [fwproc] Received command 0x46574c44
13,317,803 UART: [fwproc] Received Image of size 114124 bytes
13,411,146 UART: ROM Fatal Error: 0x000B0005
13,414,652 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
4,126,235 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,140,680 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,038 writing to cptra_bootfsm_go
193,296 UART:
193,648 UART: Running Caliptra ROM ...
194,725 UART:
194,865 UART: [state] CFI Enabled
266,044 UART: [state] LifecycleState = Production
267,799 UART: [state] DebugLocked = No
270,124 UART: [state] WD Timer not started. Device not locked for debugging
274,373 UART: [kat] SHA2-256
453,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,090 UART: [kat] ++
465,628 UART: [kat] sha1
477,484 UART: [kat] SHA2-256
480,489 UART: [kat] SHA2-384
487,158 UART: [kat] SHA2-512-ACC
490,123 UART: [kat] ECC-384
2,950,959 UART: [kat] HMAC-384Kdf
2,973,515 UART: [kat] LMS
3,502,944 UART: [kat] --
3,507,635 UART: [cold-reset] ++
3,509,137 UART: [fht] FHT @ 0x50003400
3,519,305 UART: [idev] ++
3,519,869 UART: [idev] CDI.KEYID = 6
3,520,813 UART: [idev] SUBJECT.KEYID = 7
3,522,054 UART: [idev] UDS.KEYID = 0
3,524,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,975 UART: [idev] Erasing UDS.KEYID = 0
6,027,175 UART: [idev] Sha1 KeyId Algorithm
6,050,977 UART: [idev] --
6,055,572 UART: [ldev] ++
6,056,143 UART: [ldev] CDI.KEYID = 6
6,057,052 UART: [ldev] SUBJECT.KEYID = 5
6,058,216 UART: [ldev] AUTHORITY.KEYID = 7
6,059,454 UART: [ldev] FE.KEYID = 1
6,102,872 UART: [ldev] Erasing FE.KEYID = 1
8,607,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,092 UART: [ldev] --
10,414,286 UART: [fwproc] Wait for Commands...
10,416,550 UART: [fwproc] Recv command 0x46574c44
10,418,591 UART: [fwproc] Recv'd Img size: 114448 bytes
10,508,039 UART: ROM Fatal Error: 0x000B0005
10,511,138 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,383,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,299,321 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,493 UART:
192,856 UART: Running Caliptra ROM ...
194,040 UART:
603,564 UART: [state] CFI Enabled
617,099 UART: [state] LifecycleState = Production
618,841 UART: [state] DebugLocked = No
621,246 UART: [state] WD Timer not started. Device not locked for debugging
625,281 UART: [kat] SHA2-256
804,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,938 UART: [kat] ++
816,472 UART: [kat] sha1
827,306 UART: [kat] SHA2-256
830,360 UART: [kat] SHA2-384
835,686 UART: [kat] SHA2-512-ACC
838,672 UART: [kat] ECC-384
3,281,223 UART: [kat] HMAC-384Kdf
3,292,719 UART: [kat] LMS
3,822,233 UART: [kat] --
3,825,828 UART: [cold-reset] ++
3,826,792 UART: [fht] FHT @ 0x50003400
3,837,634 UART: [idev] ++
3,838,252 UART: [idev] CDI.KEYID = 6
3,839,169 UART: [idev] SUBJECT.KEYID = 7
3,840,332 UART: [idev] UDS.KEYID = 0
3,843,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,109 UART: [idev] Erasing UDS.KEYID = 0
6,314,713 UART: [idev] Sha1 KeyId Algorithm
6,336,561 UART: [idev] --
6,340,311 UART: [ldev] ++
6,340,889 UART: [ldev] CDI.KEYID = 6
6,341,776 UART: [ldev] SUBJECT.KEYID = 5
6,342,989 UART: [ldev] AUTHORITY.KEYID = 7
6,344,223 UART: [ldev] FE.KEYID = 1
6,357,030 UART: [ldev] Erasing FE.KEYID = 1
8,830,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,279 UART: [ldev] --
10,619,301 UART: [fwproc] Wait for Commands...
10,622,375 UART: [fwproc] Recv command 0x46574c44
10,624,470 UART: [fwproc] Recv'd Img size: 114448 bytes
10,714,406 UART: ROM Fatal Error: 0x000B0005
10,717,544 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
3,693,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,491,362 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,003 UART:
192,373 UART: Running Caliptra ROM ...
193,569 UART:
193,721 UART: [state] CFI Enabled
265,732 UART: [state] LifecycleState = Production
267,640 UART: [state] DebugLocked = No
269,636 UART: [state] WD Timer not started. Device not locked for debugging
273,875 UART: [kat] SHA2-256
463,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,539 UART: [kat] ++
475,008 UART: [kat] sha1
487,891 UART: [kat] SHA2-256
490,904 UART: [kat] SHA2-384
496,888 UART: [kat] SHA2-512-ACC
499,445 UART: [kat] ECC-384
2,950,308 UART: [kat] HMAC-384Kdf
2,974,407 UART: [kat] LMS
3,506,163 UART: [kat] --
3,512,052 UART: [cold-reset] ++
3,514,480 UART: [fht] FHT @ 0x50003400
3,525,464 UART: [idev] ++
3,526,135 UART: [idev] CDI.KEYID = 6
3,527,102 UART: [idev] SUBJECT.KEYID = 7
3,528,320 UART: [idev] UDS.KEYID = 0
3,531,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,675,377 UART: [idev] Erasing UDS.KEYID = 0
6,030,925 UART: [idev] Sha1 KeyId Algorithm
6,052,587 UART: [idev] --
6,056,584 UART: [ldev] ++
6,057,266 UART: [ldev] CDI.KEYID = 6
6,058,178 UART: [ldev] SUBJECT.KEYID = 5
6,059,392 UART: [ldev] AUTHORITY.KEYID = 7
6,060,569 UART: [ldev] FE.KEYID = 1
6,101,896 UART: [ldev] Erasing FE.KEYID = 1
8,609,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,760 UART: [ldev] --
10,415,976 UART: [fwproc] Wait for Commands...
10,417,802 UART: [fwproc] Recv command 0x46574c44
10,420,138 UART: [fwproc] Recv'd Img size: 114448 bytes
10,544,451 UART: ROM Fatal Error: 0x000B0005
10,548,104 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,441,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,329,072 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,541 UART:
192,899 UART: Running Caliptra ROM ...
194,092 UART:
603,603 UART: [state] CFI Enabled
616,351 UART: [state] LifecycleState = Production
618,549 UART: [state] DebugLocked = No
620,568 UART: [state] WD Timer not started. Device not locked for debugging
625,785 UART: [kat] SHA2-256
815,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,454 UART: [kat] ++
827,043 UART: [kat] sha1
838,959 UART: [kat] SHA2-256
841,968 UART: [kat] SHA2-384
847,461 UART: [kat] SHA2-512-ACC
850,020 UART: [kat] ECC-384
3,290,414 UART: [kat] HMAC-384Kdf
3,303,151 UART: [kat] LMS
3,834,944 UART: [kat] --
3,840,469 UART: [cold-reset] ++
3,842,350 UART: [fht] FHT @ 0x50003400
3,853,166 UART: [idev] ++
3,853,840 UART: [idev] CDI.KEYID = 6
3,854,820 UART: [idev] SUBJECT.KEYID = 7
3,855,977 UART: [idev] UDS.KEYID = 0
3,858,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,694 UART: [idev] Erasing UDS.KEYID = 0
6,330,711 UART: [idev] Sha1 KeyId Algorithm
6,353,346 UART: [idev] --
6,358,853 UART: [ldev] ++
6,359,536 UART: [ldev] CDI.KEYID = 6
6,360,505 UART: [ldev] SUBJECT.KEYID = 5
6,361,668 UART: [ldev] AUTHORITY.KEYID = 7
6,362,860 UART: [ldev] FE.KEYID = 1
6,373,894 UART: [ldev] Erasing FE.KEYID = 1
8,847,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,416 UART: [ldev] --
10,640,290 UART: [fwproc] Wait for Commands...
10,643,472 UART: [fwproc] Recv command 0x46574c44
10,645,786 UART: [fwproc] Recv'd Img size: 114448 bytes
10,767,786 UART: ROM Fatal Error: 0x000B0005
10,771,467 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,754,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,561,443 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Production
85,703 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,958 UART: [kat] HMAC-384Kdf
907,712 UART: [kat] LMS
1,475,908 UART: [kat] --
1,476,695 UART: [cold-reset] ++
1,477,129 UART: [fht] Storing FHT @ 0x50003400
1,480,048 UART: [idev] ++
1,480,216 UART: [idev] CDI.KEYID = 6
1,480,576 UART: [idev] SUBJECT.KEYID = 7
1,481,000 UART: [idev] UDS.KEYID = 0
1,481,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,505,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,634 UART: [idev] --
1,515,739 UART: [ldev] ++
1,515,907 UART: [ldev] CDI.KEYID = 6
1,516,270 UART: [ldev] SUBJECT.KEYID = 5
1,516,696 UART: [ldev] AUTHORITY.KEYID = 7
1,517,159 UART: [ldev] FE.KEYID = 1
1,522,187 UART: [ldev] Erasing FE.KEYID = 1
1,547,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,416 UART: [ldev] --
1,586,731 UART: [fwproc] Waiting for Commands...
1,587,466 UART: [fwproc] Received command 0x46574c44
1,588,257 UART: [fwproc] Received Image of size 114448 bytes
1,633,364 UART: ROM Fatal Error: 0x000B0005
1,634,521 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,544 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Production
85,780 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,516 UART: [kat] SHA2-256
892,454 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
903,267 UART: [kat] HMAC-384Kdf
908,089 UART: [kat] LMS
1,476,285 UART: [kat] --
1,477,138 UART: [cold-reset] ++
1,477,718 UART: [fht] Storing FHT @ 0x50003400
1,480,563 UART: [idev] ++
1,480,731 UART: [idev] CDI.KEYID = 6
1,481,091 UART: [idev] SUBJECT.KEYID = 7
1,481,515 UART: [idev] UDS.KEYID = 0
1,481,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,361 UART: [idev] Erasing UDS.KEYID = 0
1,506,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,159 UART: [idev] --
1,516,212 UART: [ldev] ++
1,516,380 UART: [ldev] CDI.KEYID = 6
1,516,743 UART: [ldev] SUBJECT.KEYID = 5
1,517,169 UART: [ldev] AUTHORITY.KEYID = 7
1,517,632 UART: [ldev] FE.KEYID = 1
1,522,812 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,077 UART: [ldev] --
1,587,398 UART: [fwproc] Waiting for Commands...
1,588,145 UART: [fwproc] Received command 0x46574c44
1,588,936 UART: [fwproc] Received Image of size 114448 bytes
1,633,873 UART: ROM Fatal Error: 0x000B0005
1,635,030 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,915 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Production
85,531 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
893,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,365 UART: [kat] ++
897,517 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,532 UART: [kat] SHA2-512-ACC
908,433 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,861 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,174,774 UART: [idev] ++
1,174,942 UART: [idev] CDI.KEYID = 6
1,175,302 UART: [idev] SUBJECT.KEYID = 7
1,175,726 UART: [idev] UDS.KEYID = 0
1,176,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,638 UART: [idev] Erasing UDS.KEYID = 0
1,200,933 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,111 UART: [ldev] ++
1,210,279 UART: [ldev] CDI.KEYID = 6
1,210,642 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,348 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,799 UART: ROM Fatal Error: 0x000B0005
1,329,956 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,975 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Production
85,966 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
893,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,548 UART: [kat] ++
897,700 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,172,142 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,009 UART: [idev] Erasing UDS.KEYID = 0
1,201,638 UART: [idev] Sha1 KeyId Algorithm
1,210,050 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,218,178 UART: [ldev] Erasing FE.KEYID = 1
1,244,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,724 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,705 UART: [fwproc] Recv command 0x46574c44
1,285,433 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,178 UART: ROM Fatal Error: 0x000B0005
1,331,335 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,966 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,501 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,621 UART: ROM Fatal Error: 0x000B0005
1,327,778 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,827 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Production
85,684 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,694 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,173,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,260 UART: [idev] Erasing UDS.KEYID = 0
1,198,516 UART: [idev] Sha1 KeyId Algorithm
1,207,308 UART: [idev] --
1,208,341 UART: [ldev] ++
1,208,509 UART: [ldev] CDI.KEYID = 6
1,208,873 UART: [ldev] SUBJECT.KEYID = 5
1,209,300 UART: [ldev] AUTHORITY.KEYID = 7
1,209,763 UART: [ldev] FE.KEYID = 1
1,214,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,111 UART: [ldev] --
1,280,445 UART: [fwproc] Wait for Commands...
1,281,188 UART: [fwproc] Recv command 0x46574c44
1,281,921 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,662 UART: ROM Fatal Error: 0x000B0005
1,327,819 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,734 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,191 UART:
192,546 UART: Running Caliptra ROM ...
193,756 UART:
193,922 UART: [state] CFI Enabled
267,422 UART: [state] LifecycleState = Production
269,235 UART: [state] DebugLocked = No
272,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,327 UART: [kat] SHA2-256
447,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,564 UART: [kat] ++
458,008 UART: [kat] sha1
470,041 UART: [kat] SHA2-256
472,719 UART: [kat] SHA2-384
478,054 UART: [kat] SHA2-512-ACC
480,458 UART: [kat] ECC-384
2,769,046 UART: [kat] HMAC-384Kdf
2,800,025 UART: [kat] LMS
3,990,275 UART: [kat] --
3,995,446 UART: [cold-reset] ++
3,997,822 UART: [fht] Storing FHT @ 0x50003400
4,009,360 UART: [idev] ++
4,009,930 UART: [idev] CDI.KEYID = 6
4,010,951 UART: [idev] SUBJECT.KEYID = 7
4,012,113 UART: [idev] UDS.KEYID = 0
4,014,895 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,615 UART: [idev] Erasing UDS.KEYID = 0
7,346,880 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,283 UART: [idev] --
7,372,981 UART: [ldev] ++
7,373,608 UART: [ldev] CDI.KEYID = 6
7,374,496 UART: [ldev] SUBJECT.KEYID = 5
7,375,760 UART: [ldev] AUTHORITY.KEYID = 7
7,376,943 UART: [ldev] FE.KEYID = 1
7,421,071 UART: [ldev] Erasing FE.KEYID = 1
10,755,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,553 UART: [ldev] --
13,135,898 UART: [fwproc] Waiting for Commands...
13,139,074 UART: [fwproc] Received command 0x46574c44
13,141,319 UART: [fwproc] Received Image of size 114124 bytes
13,233,962 UART: ROM Fatal Error: 0x000B0005
13,237,432 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,811,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,981,758 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,424 UART:
192,786 UART: Running Caliptra ROM ...
193,967 UART:
603,519 UART: [state] CFI Enabled
619,007 UART: [state] LifecycleState = Production
620,791 UART: [state] DebugLocked = No
622,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,268 UART: [kat] SHA2-256
798,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,559 UART: [kat] ++
809,011 UART: [kat] sha1
820,055 UART: [kat] SHA2-256
822,789 UART: [kat] SHA2-384
829,198 UART: [kat] SHA2-512-ACC
831,598 UART: [kat] ECC-384
3,114,146 UART: [kat] HMAC-384Kdf
3,127,255 UART: [kat] LMS
4,317,388 UART: [kat] --
4,322,757 UART: [cold-reset] ++
4,325,036 UART: [fht] Storing FHT @ 0x50003400
4,337,231 UART: [idev] ++
4,337,806 UART: [idev] CDI.KEYID = 6
4,338,822 UART: [idev] SUBJECT.KEYID = 7
4,339,979 UART: [idev] UDS.KEYID = 0
4,342,917 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,466 UART: [idev] Erasing UDS.KEYID = 0
7,629,843 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,739 UART: [idev] --
7,657,382 UART: [ldev] ++
7,657,950 UART: [ldev] CDI.KEYID = 6
7,658,890 UART: [ldev] SUBJECT.KEYID = 5
7,660,104 UART: [ldev] AUTHORITY.KEYID = 7
7,661,318 UART: [ldev] FE.KEYID = 1
7,671,945 UART: [ldev] Erasing FE.KEYID = 1
10,960,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,550 UART: [ldev] --
13,316,680 UART: [fwproc] Waiting for Commands...
13,319,855 UART: [fwproc] Received command 0x46574c44
13,322,038 UART: [fwproc] Received Image of size 114124 bytes
13,416,139 UART: ROM Fatal Error: 0x000B0005
13,419,602 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
4,135,439 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,163,293 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,326 UART:
192,693 UART: Running Caliptra ROM ...
193,884 UART:
194,038 UART: [state] CFI Enabled
260,626 UART: [state] LifecycleState = Production
262,415 UART: [state] DebugLocked = No
264,126 UART: [state] WD Timer not started. Device not locked for debugging
267,082 UART: [kat] SHA2-256
446,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,771 UART: [kat] ++
458,224 UART: [kat] sha1
469,367 UART: [kat] SHA2-256
472,380 UART: [kat] SHA2-384
478,533 UART: [kat] SHA2-512-ACC
481,513 UART: [kat] ECC-384
2,924,445 UART: [kat] HMAC-384Kdf
2,949,099 UART: [kat] LMS
3,478,572 UART: [kat] --
3,481,582 UART: [cold-reset] ++
3,483,198 UART: [fht] FHT @ 0x50003400
3,494,391 UART: [idev] ++
3,494,964 UART: [idev] CDI.KEYID = 6
3,495,890 UART: [idev] SUBJECT.KEYID = 7
3,497,051 UART: [idev] UDS.KEYID = 0
3,499,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,832 UART: [idev] Erasing UDS.KEYID = 0
6,003,409 UART: [idev] Sha1 KeyId Algorithm
6,026,428 UART: [idev] --
6,031,454 UART: [ldev] ++
6,032,026 UART: [ldev] CDI.KEYID = 6
6,032,944 UART: [ldev] SUBJECT.KEYID = 5
6,034,107 UART: [ldev] AUTHORITY.KEYID = 7
6,035,342 UART: [ldev] FE.KEYID = 1
6,077,051 UART: [ldev] Erasing FE.KEYID = 1
8,580,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,543 UART: [ldev] --
10,389,480 UART: [fwproc] Wait for Commands...
10,392,444 UART: [fwproc] Recv command 0x46574c44
10,394,488 UART: [fwproc] Recv'd Img size: 114448 bytes
10,485,485 UART: ROM Fatal Error: 0x000B0005
10,488,572 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,362,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,760 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,443 UART:
192,832 UART: Running Caliptra ROM ...
193,952 UART:
603,424 UART: [state] CFI Enabled
617,958 UART: [state] LifecycleState = Production
619,695 UART: [state] DebugLocked = No
621,776 UART: [state] WD Timer not started. Device not locked for debugging
625,922 UART: [kat] SHA2-256
805,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,647 UART: [kat] ++
817,176 UART: [kat] sha1
827,677 UART: [kat] SHA2-256
830,693 UART: [kat] SHA2-384
838,060 UART: [kat] SHA2-512-ACC
841,062 UART: [kat] ECC-384
3,282,292 UART: [kat] HMAC-384Kdf
3,294,590 UART: [kat] LMS
3,824,056 UART: [kat] --
3,829,850 UART: [cold-reset] ++
3,831,889 UART: [fht] FHT @ 0x50003400
3,843,569 UART: [idev] ++
3,844,133 UART: [idev] CDI.KEYID = 6
3,845,014 UART: [idev] SUBJECT.KEYID = 7
3,846,228 UART: [idev] UDS.KEYID = 0
3,849,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,233 UART: [idev] Erasing UDS.KEYID = 0
6,317,070 UART: [idev] Sha1 KeyId Algorithm
6,341,116 UART: [idev] --
6,344,677 UART: [ldev] ++
6,345,245 UART: [ldev] CDI.KEYID = 6
6,346,125 UART: [ldev] SUBJECT.KEYID = 5
6,347,342 UART: [ldev] AUTHORITY.KEYID = 7
6,348,574 UART: [ldev] FE.KEYID = 1
6,357,111 UART: [ldev] Erasing FE.KEYID = 1
8,834,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,119 UART: [ldev] --
10,625,498 UART: [fwproc] Wait for Commands...
10,628,189 UART: [fwproc] Recv command 0x46574c44
10,630,281 UART: [fwproc] Recv'd Img size: 114448 bytes
10,724,101 UART: ROM Fatal Error: 0x000B0005
10,727,194 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,117 writing to cptra_bootfsm_go
3,702,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,501,564 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,186 UART:
192,554 UART: Running Caliptra ROM ...
193,687 UART:
193,835 UART: [state] CFI Enabled
263,964 UART: [state] LifecycleState = Production
266,164 UART: [state] DebugLocked = No
267,766 UART: [state] WD Timer not started. Device not locked for debugging
272,766 UART: [kat] SHA2-256
462,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,430 UART: [kat] ++
473,906 UART: [kat] sha1
485,923 UART: [kat] SHA2-256
488,939 UART: [kat] SHA2-384
495,512 UART: [kat] SHA2-512-ACC
498,102 UART: [kat] ECC-384
2,946,624 UART: [kat] HMAC-384Kdf
2,972,792 UART: [kat] LMS
3,504,577 UART: [kat] --
3,507,498 UART: [cold-reset] ++
3,508,464 UART: [fht] FHT @ 0x50003400
3,518,800 UART: [idev] ++
3,519,544 UART: [idev] CDI.KEYID = 6
3,520,455 UART: [idev] SUBJECT.KEYID = 7
3,521,670 UART: [idev] UDS.KEYID = 0
3,524,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,790 UART: [idev] Erasing UDS.KEYID = 0
6,028,965 UART: [idev] Sha1 KeyId Algorithm
6,051,333 UART: [idev] --
6,055,818 UART: [ldev] ++
6,056,503 UART: [ldev] CDI.KEYID = 6
6,057,441 UART: [ldev] SUBJECT.KEYID = 5
6,058,610 UART: [ldev] AUTHORITY.KEYID = 7
6,059,790 UART: [ldev] FE.KEYID = 1
6,101,226 UART: [ldev] Erasing FE.KEYID = 1
8,606,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,522 UART: [ldev] --
10,416,538 UART: [fwproc] Wait for Commands...
10,419,596 UART: [fwproc] Recv command 0x46574c44
10,421,866 UART: [fwproc] Recv'd Img size: 114448 bytes
10,547,362 UART: ROM Fatal Error: 0x000B0005
10,551,053 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,439,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,353,916 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,567 UART:
192,926 UART: Running Caliptra ROM ...
194,024 UART:
603,710 UART: [state] CFI Enabled
619,709 UART: [state] LifecycleState = Production
621,924 UART: [state] DebugLocked = No
624,031 UART: [state] WD Timer not started. Device not locked for debugging
628,502 UART: [kat] SHA2-256
818,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,174 UART: [kat] ++
829,677 UART: [kat] sha1
841,047 UART: [kat] SHA2-256
844,057 UART: [kat] SHA2-384
849,496 UART: [kat] SHA2-512-ACC
852,103 UART: [kat] ECC-384
3,295,308 UART: [kat] HMAC-384Kdf
3,307,993 UART: [kat] LMS
3,839,804 UART: [kat] --
3,845,396 UART: [cold-reset] ++
3,846,311 UART: [fht] FHT @ 0x50003400
3,858,157 UART: [idev] ++
3,858,831 UART: [idev] CDI.KEYID = 6
3,859,850 UART: [idev] SUBJECT.KEYID = 7
3,861,029 UART: [idev] UDS.KEYID = 0
3,863,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,900 UART: [idev] Erasing UDS.KEYID = 0
6,337,520 UART: [idev] Sha1 KeyId Algorithm
6,359,719 UART: [idev] --
6,364,623 UART: [ldev] ++
6,365,301 UART: [ldev] CDI.KEYID = 6
6,366,260 UART: [ldev] SUBJECT.KEYID = 5
6,367,415 UART: [ldev] AUTHORITY.KEYID = 7
6,368,643 UART: [ldev] FE.KEYID = 1
6,381,232 UART: [ldev] Erasing FE.KEYID = 1
8,860,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,261 UART: [ldev] --
10,649,595 UART: [fwproc] Wait for Commands...
10,651,639 UART: [fwproc] Recv command 0x46574c44
10,653,952 UART: [fwproc] Recv'd Img size: 114448 bytes
10,776,593 UART: ROM Fatal Error: 0x000B0005
10,780,266 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,756,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,573,609 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Production
85,837 UART: [state] DebugLocked = No
86,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,967 UART: [kat] SHA2-256
881,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,013 UART: [kat] ++
886,165 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,475,981 UART: [cold-reset] ++
1,476,373 UART: [fht] Storing FHT @ 0x50003400
1,479,118 UART: [idev] ++
1,479,286 UART: [idev] CDI.KEYID = 6
1,479,646 UART: [idev] SUBJECT.KEYID = 7
1,480,070 UART: [idev] UDS.KEYID = 0
1,480,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,394 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,605 UART: [ldev] ++
1,514,773 UART: [ldev] CDI.KEYID = 6
1,515,136 UART: [ldev] SUBJECT.KEYID = 5
1,515,562 UART: [ldev] AUTHORITY.KEYID = 7
1,516,025 UART: [ldev] FE.KEYID = 1
1,521,195 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,838 UART: [ldev] --
1,586,289 UART: [fwproc] Waiting for Commands...
1,587,044 UART: [fwproc] Received command 0x46574c44
1,587,835 UART: [fwproc] Received Image of size 114448 bytes
1,633,190 UART: ROM Fatal Error: 0x000B0005
1,634,347 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,390 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Production
85,828 UART: [state] DebugLocked = No
86,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,926 UART: [kat] SHA2-256
881,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,972 UART: [kat] ++
886,124 UART: [kat] sha1
890,376 UART: [kat] SHA2-256
892,314 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,023 UART: [kat] LMS
1,475,219 UART: [kat] --
1,475,876 UART: [cold-reset] ++
1,476,214 UART: [fht] Storing FHT @ 0x50003400
1,478,963 UART: [idev] ++
1,479,131 UART: [idev] CDI.KEYID = 6
1,479,491 UART: [idev] SUBJECT.KEYID = 7
1,479,915 UART: [idev] UDS.KEYID = 0
1,480,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,991 UART: [idev] Erasing UDS.KEYID = 0
1,504,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,105 UART: [idev] --
1,514,226 UART: [ldev] ++
1,514,394 UART: [ldev] CDI.KEYID = 6
1,514,757 UART: [ldev] SUBJECT.KEYID = 5
1,515,183 UART: [ldev] AUTHORITY.KEYID = 7
1,515,646 UART: [ldev] FE.KEYID = 1
1,520,866 UART: [ldev] Erasing FE.KEYID = 1
1,546,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,143 UART: [ldev] --
1,585,630 UART: [fwproc] Waiting for Commands...
1,586,359 UART: [fwproc] Received command 0x46574c44
1,587,150 UART: [fwproc] Received Image of size 114448 bytes
1,632,643 UART: ROM Fatal Error: 0x000B0005
1,633,800 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,449 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Production
85,321 UART: [state] DebugLocked = No
85,879 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
892,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,927 UART: [kat] ++
897,079 UART: [kat] sha1
901,295 UART: [kat] SHA2-256
903,235 UART: [kat] SHA2-384
905,988 UART: [kat] SHA2-512-ACC
907,889 UART: [kat] ECC-384
917,370 UART: [kat] HMAC-384Kdf
921,988 UART: [kat] LMS
1,170,316 UART: [kat] --
1,171,083 UART: [cold-reset] ++
1,171,659 UART: [fht] FHT @ 0x50003400
1,174,132 UART: [idev] ++
1,174,300 UART: [idev] CDI.KEYID = 6
1,174,660 UART: [idev] SUBJECT.KEYID = 7
1,175,084 UART: [idev] UDS.KEYID = 0
1,175,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,215 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,354 UART: [ldev] SUBJECT.KEYID = 5
1,210,780 UART: [ldev] AUTHORITY.KEYID = 7
1,211,243 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,512 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,185 UART: ROM Fatal Error: 0x000B0005
1,329,342 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,295 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Production
86,462 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
893,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,052 UART: [kat] ++
898,204 UART: [kat] sha1
902,422 UART: [kat] SHA2-256
904,362 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,600 UART: [cold-reset] ++
1,173,000 UART: [fht] FHT @ 0x50003400
1,175,731 UART: [idev] ++
1,175,899 UART: [idev] CDI.KEYID = 6
1,176,259 UART: [idev] SUBJECT.KEYID = 7
1,176,683 UART: [idev] UDS.KEYID = 0
1,177,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,853 UART: [idev] Erasing UDS.KEYID = 0
1,202,334 UART: [idev] Sha1 KeyId Algorithm
1,210,798 UART: [idev] --
1,211,938 UART: [ldev] ++
1,212,106 UART: [ldev] CDI.KEYID = 6
1,212,469 UART: [ldev] SUBJECT.KEYID = 5
1,212,895 UART: [ldev] AUTHORITY.KEYID = 7
1,213,358 UART: [ldev] FE.KEYID = 1
1,218,452 UART: [ldev] Erasing FE.KEYID = 1
1,244,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,708 UART: [ldev] --
1,284,161 UART: [fwproc] Wait for Commands...
1,284,951 UART: [fwproc] Recv command 0x46574c44
1,285,679 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,634 UART: ROM Fatal Error: 0x000B0005
1,331,791 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,054 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Production
85,353 UART: [state] DebugLocked = No
85,867 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
890,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,721 UART: [kat] ++
894,873 UART: [kat] sha1
899,299 UART: [kat] SHA2-256
901,239 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,578 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,173,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,366 UART: [ldev] ++
1,208,534 UART: [ldev] CDI.KEYID = 6
1,208,898 UART: [ldev] SUBJECT.KEYID = 5
1,209,325 UART: [ldev] AUTHORITY.KEYID = 7
1,209,788 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,724 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x46574c44
1,282,124 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,593 UART: ROM Fatal Error: 0x000B0005
1,327,750 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,183 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Production
85,658 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
891,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,174,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,650 UART: ROM Fatal Error: 0x000B0005
1,328,807 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,940 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,235 UART:
192,600 UART: Running Caliptra ROM ...
193,786 UART:
193,942 UART: [state] CFI Enabled
263,510 UART: [state] LifecycleState = Production
265,326 UART: [state] DebugLocked = No
267,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,222 UART: [kat] SHA2-256
441,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,411 UART: [kat] ++
452,914 UART: [kat] sha1
464,784 UART: [kat] SHA2-256
467,470 UART: [kat] SHA2-384
472,152 UART: [kat] SHA2-512-ACC
474,490 UART: [kat] ECC-384
2,770,154 UART: [kat] HMAC-384Kdf
2,801,517 UART: [kat] LMS
3,991,785 UART: [kat] --
3,995,639 UART: [cold-reset] ++
3,996,659 UART: [fht] Storing FHT @ 0x50003400
4,007,818 UART: [idev] ++
4,008,437 UART: [idev] CDI.KEYID = 6
4,009,375 UART: [idev] SUBJECT.KEYID = 7
4,010,541 UART: [idev] UDS.KEYID = 0
4,016,612 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,289 UART: [idev] Erasing UDS.KEYID = 0
7,350,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,727 UART: [idev] --
7,377,372 UART: [ldev] ++
7,377,951 UART: [ldev] CDI.KEYID = 6
7,378,896 UART: [ldev] SUBJECT.KEYID = 5
7,380,111 UART: [ldev] AUTHORITY.KEYID = 7
7,381,344 UART: [ldev] FE.KEYID = 1
7,425,051 UART: [ldev] Erasing FE.KEYID = 1
10,761,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,705 UART: [ldev] --
13,138,596 UART: [fwproc] Waiting for Commands...
13,140,752 UART: [fwproc] Received command 0x46574c44
13,142,956 UART: [fwproc] Received Image of size 114124 bytes
13,199,601 UART: ROM Fatal Error: 0x000B0003
13,203,078 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,954 writing to cptra_bootfsm_go
3,788,706 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,901,990 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,494 UART:
192,858 UART: Running Caliptra ROM ...
194,063 UART:
603,740 UART: [state] CFI Enabled
618,109 UART: [state] LifecycleState = Production
619,904 UART: [state] DebugLocked = No
621,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,502 UART: [kat] SHA2-256
795,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,772 UART: [kat] ++
806,305 UART: [kat] sha1
816,803 UART: [kat] SHA2-256
819,487 UART: [kat] SHA2-384
825,998 UART: [kat] SHA2-512-ACC
828,342 UART: [kat] ECC-384
3,112,931 UART: [kat] HMAC-384Kdf
3,123,178 UART: [kat] LMS
4,313,279 UART: [kat] --
4,317,916 UART: [cold-reset] ++
4,320,494 UART: [fht] Storing FHT @ 0x50003400
4,331,653 UART: [idev] ++
4,332,248 UART: [idev] CDI.KEYID = 6
4,333,275 UART: [idev] SUBJECT.KEYID = 7
4,334,437 UART: [idev] UDS.KEYID = 0
4,339,836 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,427 UART: [idev] Erasing UDS.KEYID = 0
7,621,661 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,977 UART: [idev] --
7,648,232 UART: [ldev] ++
7,648,811 UART: [ldev] CDI.KEYID = 6
7,649,794 UART: [ldev] SUBJECT.KEYID = 5
7,651,010 UART: [ldev] AUTHORITY.KEYID = 7
7,652,251 UART: [ldev] FE.KEYID = 1
7,661,765 UART: [ldev] Erasing FE.KEYID = 1
10,954,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,848 UART: [ldev] --
13,314,252 UART: [fwproc] Waiting for Commands...
13,317,485 UART: [fwproc] Received command 0x46574c44
13,319,726 UART: [fwproc] Received Image of size 114124 bytes
13,381,465 UART: ROM Fatal Error: 0x000B0003
13,384,993 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,131,123 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,113,942 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,327 UART:
192,700 UART: Running Caliptra ROM ...
193,883 UART:
194,037 UART: [state] CFI Enabled
265,648 UART: [state] LifecycleState = Production
267,408 UART: [state] DebugLocked = No
269,521 UART: [state] WD Timer not started. Device not locked for debugging
272,854 UART: [kat] SHA2-256
452,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,591 UART: [kat] ++
464,121 UART: [kat] sha1
476,627 UART: [kat] SHA2-256
479,636 UART: [kat] SHA2-384
485,877 UART: [kat] SHA2-512-ACC
488,809 UART: [kat] ECC-384
2,947,954 UART: [kat] HMAC-384Kdf
2,971,659 UART: [kat] LMS
3,501,108 UART: [kat] --
3,506,079 UART: [cold-reset] ++
3,508,177 UART: [fht] FHT @ 0x50003400
3,520,072 UART: [idev] ++
3,520,643 UART: [idev] CDI.KEYID = 6
3,521,553 UART: [idev] SUBJECT.KEYID = 7
3,522,772 UART: [idev] UDS.KEYID = 0
3,525,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,672 UART: [idev] Erasing UDS.KEYID = 0
6,028,493 UART: [idev] Sha1 KeyId Algorithm
6,050,807 UART: [idev] --
6,055,559 UART: [ldev] ++
6,056,132 UART: [ldev] CDI.KEYID = 6
6,057,051 UART: [ldev] SUBJECT.KEYID = 5
6,058,215 UART: [ldev] AUTHORITY.KEYID = 7
6,059,447 UART: [ldev] FE.KEYID = 1
6,100,133 UART: [ldev] Erasing FE.KEYID = 1
8,602,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,999 UART: [ldev] --
10,413,765 UART: [fwproc] Wait for Commands...
10,416,576 UART: [fwproc] Recv command 0x46574c44
10,418,676 UART: [fwproc] Recv'd Img size: 114448 bytes
10,483,034 UART: ROM Fatal Error: 0x000B0003
10,486,139 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,384,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,283,984 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,540 UART:
192,913 UART: Running Caliptra ROM ...
194,027 UART:
603,690 UART: [state] CFI Enabled
615,476 UART: [state] LifecycleState = Production
617,194 UART: [state] DebugLocked = No
620,082 UART: [state] WD Timer not started. Device not locked for debugging
623,226 UART: [kat] SHA2-256
802,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,925 UART: [kat] ++
814,372 UART: [kat] sha1
825,625 UART: [kat] SHA2-256
828,670 UART: [kat] SHA2-384
833,572 UART: [kat] SHA2-512-ACC
836,507 UART: [kat] ECC-384
3,276,272 UART: [kat] HMAC-384Kdf
3,289,968 UART: [kat] LMS
3,819,462 UART: [kat] --
3,824,238 UART: [cold-reset] ++
3,825,804 UART: [fht] FHT @ 0x50003400
3,836,462 UART: [idev] ++
3,837,021 UART: [idev] CDI.KEYID = 6
3,837,962 UART: [idev] SUBJECT.KEYID = 7
3,839,190 UART: [idev] UDS.KEYID = 0
3,842,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,143 UART: [idev] Erasing UDS.KEYID = 0
6,315,548 UART: [idev] Sha1 KeyId Algorithm
6,338,628 UART: [idev] --
6,343,002 UART: [ldev] ++
6,343,581 UART: [ldev] CDI.KEYID = 6
6,344,665 UART: [ldev] SUBJECT.KEYID = 5
6,345,789 UART: [ldev] AUTHORITY.KEYID = 7
6,346,924 UART: [ldev] FE.KEYID = 1
6,358,892 UART: [ldev] Erasing FE.KEYID = 1
8,832,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,574 UART: [ldev] --
10,623,762 UART: [fwproc] Wait for Commands...
10,625,209 UART: [fwproc] Recv command 0x46574c44
10,627,306 UART: [fwproc] Recv'd Img size: 114448 bytes
10,687,513 UART: ROM Fatal Error: 0x000B0003
10,690,653 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,695,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,457,230 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,407 UART:
192,756 UART: Running Caliptra ROM ...
193,941 UART:
194,092 UART: [state] CFI Enabled
261,997 UART: [state] LifecycleState = Production
264,209 UART: [state] DebugLocked = No
266,240 UART: [state] WD Timer not started. Device not locked for debugging
270,941 UART: [kat] SHA2-256
460,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,577 UART: [kat] ++
472,023 UART: [kat] sha1
482,999 UART: [kat] SHA2-256
486,036 UART: [kat] SHA2-384
492,570 UART: [kat] SHA2-512-ACC
495,131 UART: [kat] ECC-384
2,945,768 UART: [kat] HMAC-384Kdf
2,970,960 UART: [kat] LMS
3,502,705 UART: [kat] --
3,506,975 UART: [cold-reset] ++
3,508,643 UART: [fht] FHT @ 0x50003400
3,519,248 UART: [idev] ++
3,519,968 UART: [idev] CDI.KEYID = 6
3,520,941 UART: [idev] SUBJECT.KEYID = 7
3,522,101 UART: [idev] UDS.KEYID = 0
3,527,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,678 UART: [idev] Erasing UDS.KEYID = 0
6,028,381 UART: [idev] Sha1 KeyId Algorithm
6,050,943 UART: [idev] --
6,056,026 UART: [ldev] ++
6,056,767 UART: [ldev] CDI.KEYID = 6
6,057,658 UART: [ldev] SUBJECT.KEYID = 5
6,058,764 UART: [ldev] AUTHORITY.KEYID = 7
6,060,052 UART: [ldev] FE.KEYID = 1
6,098,822 UART: [ldev] Erasing FE.KEYID = 1
8,610,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,361 UART: [ldev] --
10,412,475 UART: [fwproc] Wait for Commands...
10,414,788 UART: [fwproc] Recv command 0x46574c44
10,417,053 UART: [fwproc] Recv'd Img size: 114448 bytes
10,507,362 UART: ROM Fatal Error: 0x000B0003
10,510,992 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,441,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,300,419 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,524 UART:
192,874 UART: Running Caliptra ROM ...
194,057 UART:
603,606 UART: [state] CFI Enabled
618,500 UART: [state] LifecycleState = Production
620,724 UART: [state] DebugLocked = No
622,823 UART: [state] WD Timer not started. Device not locked for debugging
627,053 UART: [kat] SHA2-256
816,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,759 UART: [kat] ++
828,349 UART: [kat] sha1
839,678 UART: [kat] SHA2-256
842,742 UART: [kat] SHA2-384
848,718 UART: [kat] SHA2-512-ACC
851,279 UART: [kat] ECC-384
3,297,372 UART: [kat] HMAC-384Kdf
3,310,586 UART: [kat] LMS
3,842,400 UART: [kat] --
3,848,874 UART: [cold-reset] ++
3,851,419 UART: [fht] FHT @ 0x50003400
3,863,531 UART: [idev] ++
3,864,203 UART: [idev] CDI.KEYID = 6
3,865,143 UART: [idev] SUBJECT.KEYID = 7
3,866,350 UART: [idev] UDS.KEYID = 0
3,872,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,016,085 UART: [idev] Erasing UDS.KEYID = 0
6,342,872 UART: [idev] Sha1 KeyId Algorithm
6,365,248 UART: [idev] --
6,370,377 UART: [ldev] ++
6,371,055 UART: [ldev] CDI.KEYID = 6
6,371,941 UART: [ldev] SUBJECT.KEYID = 5
6,373,196 UART: [ldev] AUTHORITY.KEYID = 7
6,374,388 UART: [ldev] FE.KEYID = 1
6,384,899 UART: [ldev] Erasing FE.KEYID = 1
8,863,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,268 UART: [ldev] --
10,654,346 UART: [fwproc] Wait for Commands...
10,656,929 UART: [fwproc] Recv command 0x46574c44
10,659,242 UART: [fwproc] Recv'd Img size: 114448 bytes
10,749,154 UART: ROM Fatal Error: 0x000B0003
10,752,780 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,761,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,532,076 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Production
85,355 UART: [state] DebugLocked = No
85,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,607 UART: [kat] SHA2-256
881,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,653 UART: [kat] ++
885,805 UART: [kat] sha1
889,939 UART: [kat] SHA2-256
891,877 UART: [kat] SHA2-384
894,814 UART: [kat] SHA2-512-ACC
896,715 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,476,095 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,204 UART: [idev] ++
1,479,372 UART: [idev] CDI.KEYID = 6
1,479,732 UART: [idev] SUBJECT.KEYID = 7
1,480,156 UART: [idev] UDS.KEYID = 0
1,480,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,505,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,802 UART: [idev] --
1,514,733 UART: [ldev] ++
1,514,901 UART: [ldev] CDI.KEYID = 6
1,515,264 UART: [ldev] SUBJECT.KEYID = 5
1,515,690 UART: [ldev] AUTHORITY.KEYID = 7
1,516,153 UART: [ldev] FE.KEYID = 1
1,521,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,942 UART: [ldev] --
1,585,369 UART: [fwproc] Waiting for Commands...
1,586,086 UART: [fwproc] Received command 0x46574c44
1,586,877 UART: [fwproc] Received Image of size 114448 bytes
1,607,305 UART: ROM Fatal Error: 0x000B0003
1,608,462 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,461,175 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Production
85,808 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,920 UART: [kat] SHA2-256
881,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,966 UART: [kat] ++
886,118 UART: [kat] sha1
890,262 UART: [kat] SHA2-256
892,200 UART: [kat] SHA2-384
894,951 UART: [kat] SHA2-512-ACC
896,852 UART: [kat] ECC-384
902,879 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,756 UART: [cold-reset] ++
1,477,092 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,151 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,521,788 UART: [ldev] Erasing FE.KEYID = 1
1,548,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,013 UART: [ldev] --
1,587,460 UART: [fwproc] Waiting for Commands...
1,588,241 UART: [fwproc] Received command 0x46574c44
1,589,032 UART: [fwproc] Received Image of size 114448 bytes
1,609,186 UART: ROM Fatal Error: 0x000B0003
1,610,343 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,462,422 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Production
85,763 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,463 UART: [kat] SHA2-256
903,403 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,856 UART: [kat] LMS
1,171,184 UART: [kat] --
1,172,247 UART: [cold-reset] ++
1,172,821 UART: [fht] FHT @ 0x50003400
1,175,404 UART: [idev] ++
1,175,572 UART: [idev] CDI.KEYID = 6
1,175,932 UART: [idev] SUBJECT.KEYID = 7
1,176,356 UART: [idev] UDS.KEYID = 0
1,176,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,232 UART: [idev] Erasing UDS.KEYID = 0
1,200,945 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,956 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,554 UART: [fwproc] Wait for Commands...
1,283,354 UART: [fwproc] Recv command 0x46574c44
1,284,082 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,822 UART: ROM Fatal Error: 0x000B0003
1,305,979 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,302 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Production
85,756 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
893,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,458 UART: [kat] ++
897,610 UART: [kat] sha1
901,820 UART: [kat] SHA2-256
903,760 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,118 UART: [cold-reset] ++
1,172,524 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,033 UART: [idev] Erasing UDS.KEYID = 0
1,201,440 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,626 UART: [ldev] ++
1,210,794 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,583 UART: [ldev] AUTHORITY.KEYID = 7
1,212,046 UART: [ldev] FE.KEYID = 1
1,217,222 UART: [ldev] Erasing FE.KEYID = 1
1,243,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,620 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,575 UART: [fwproc] Recv command 0x46574c44
1,284,303 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,407 UART: ROM Fatal Error: 0x000B0003
1,305,564 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,475 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Production
85,661 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
903,946 UART: [kat] SHA2-512-ACC
905,847 UART: [kat] ECC-384
915,030 UART: [kat] HMAC-384Kdf
919,600 UART: [kat] LMS
1,167,912 UART: [kat] --
1,168,805 UART: [cold-reset] ++
1,169,255 UART: [fht] FHT @ 0x50003400
1,171,837 UART: [idev] ++
1,172,005 UART: [idev] CDI.KEYID = 6
1,172,366 UART: [idev] SUBJECT.KEYID = 7
1,172,791 UART: [idev] UDS.KEYID = 0
1,173,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,723 UART: [idev] Erasing UDS.KEYID = 0
1,197,445 UART: [idev] Sha1 KeyId Algorithm
1,206,377 UART: [idev] --
1,207,358 UART: [ldev] ++
1,207,526 UART: [ldev] CDI.KEYID = 6
1,207,890 UART: [ldev] SUBJECT.KEYID = 5
1,208,317 UART: [ldev] AUTHORITY.KEYID = 7
1,208,780 UART: [ldev] FE.KEYID = 1
1,213,860 UART: [ldev] Erasing FE.KEYID = 1
1,240,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,590 UART: [ldev] --
1,278,986 UART: [fwproc] Wait for Commands...
1,279,651 UART: [fwproc] Recv command 0x46574c44
1,280,384 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,771 UART: ROM Fatal Error: 0x000B0003
1,301,928 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,631 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Production
86,078 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,559 UART: [ldev] Erasing FE.KEYID = 1
1,242,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,408 UART: [fwproc] Recv command 0x46574c44
1,283,141 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,560 UART: ROM Fatal Error: 0x000B0003
1,304,717 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,318 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,171 UART:
192,552 UART: Running Caliptra ROM ...
193,737 UART:
193,886 UART: [state] CFI Enabled
262,013 UART: [state] LifecycleState = Production
263,882 UART: [state] DebugLocked = No
266,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,251 UART: [kat] SHA2-256
441,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,472 UART: [kat] ++
452,918 UART: [kat] sha1
464,975 UART: [kat] SHA2-256
467,634 UART: [kat] SHA2-384
473,671 UART: [kat] SHA2-512-ACC
476,075 UART: [kat] ECC-384
2,766,288 UART: [kat] HMAC-384Kdf
2,798,341 UART: [kat] LMS
3,988,658 UART: [kat] --
3,992,256 UART: [cold-reset] ++
3,994,736 UART: [fht] Storing FHT @ 0x50003400
4,005,246 UART: [idev] ++
4,005,818 UART: [idev] CDI.KEYID = 6
4,006,764 UART: [idev] SUBJECT.KEYID = 7
4,007,983 UART: [idev] UDS.KEYID = 0
4,010,993 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,773 UART: [idev] Erasing UDS.KEYID = 0
7,344,985 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,203 UART: [idev] --
7,370,525 UART: [ldev] ++
7,371,095 UART: [ldev] CDI.KEYID = 6
7,372,043 UART: [ldev] SUBJECT.KEYID = 5
7,373,257 UART: [ldev] AUTHORITY.KEYID = 7
7,374,546 UART: [ldev] FE.KEYID = 1
7,421,213 UART: [ldev] Erasing FE.KEYID = 1
10,756,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,861 UART: [ldev] --
13,138,049 UART: [fwproc] Waiting for Commands...
13,141,065 UART: [fwproc] Received command 0x46574c44
13,143,254 UART: [fwproc] Received Image of size 114124 bytes
13,235,675 UART: ROM Fatal Error: 0x000B0005
13,239,196 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,812,114 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,961,169 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,514 UART:
192,900 UART: Running Caliptra ROM ...
194,086 UART:
603,646 UART: [state] CFI Enabled
618,619 UART: [state] LifecycleState = Production
620,394 UART: [state] DebugLocked = No
621,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,510 UART: [kat] SHA2-256
797,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,816 UART: [kat] ++
808,350 UART: [kat] sha1
820,216 UART: [kat] SHA2-256
822,933 UART: [kat] SHA2-384
827,997 UART: [kat] SHA2-512-ACC
830,344 UART: [kat] ECC-384
3,117,502 UART: [kat] HMAC-384Kdf
3,130,390 UART: [kat] LMS
4,320,513 UART: [kat] --
4,325,766 UART: [cold-reset] ++
4,326,999 UART: [fht] Storing FHT @ 0x50003400
4,339,776 UART: [idev] ++
4,340,377 UART: [idev] CDI.KEYID = 6
4,341,293 UART: [idev] SUBJECT.KEYID = 7
4,342,509 UART: [idev] UDS.KEYID = 0
4,345,248 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,637 UART: [idev] Erasing UDS.KEYID = 0
7,631,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,193 UART: [idev] --
7,658,005 UART: [ldev] ++
7,658,582 UART: [ldev] CDI.KEYID = 6
7,659,465 UART: [ldev] SUBJECT.KEYID = 5
7,660,745 UART: [ldev] AUTHORITY.KEYID = 7
7,661,976 UART: [ldev] FE.KEYID = 1
7,673,223 UART: [ldev] Erasing FE.KEYID = 1
10,960,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,761 UART: [ldev] --
13,318,111 UART: [fwproc] Waiting for Commands...
13,319,851 UART: [fwproc] Received command 0x46574c44
13,322,042 UART: [fwproc] Received Image of size 114124 bytes
13,414,675 UART: ROM Fatal Error: 0x000B0005
13,418,190 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
4,128,604 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,146,984 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,219 UART:
192,585 UART: Running Caliptra ROM ...
193,709 UART:
193,852 UART: [state] CFI Enabled
266,021 UART: [state] LifecycleState = Production
267,807 UART: [state] DebugLocked = No
270,347 UART: [state] WD Timer not started. Device not locked for debugging
274,544 UART: [kat] SHA2-256
453,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,241 UART: [kat] ++
465,772 UART: [kat] sha1
476,762 UART: [kat] SHA2-256
479,771 UART: [kat] SHA2-384
485,533 UART: [kat] SHA2-512-ACC
488,516 UART: [kat] ECC-384
2,950,082 UART: [kat] HMAC-384Kdf
2,974,437 UART: [kat] LMS
3,503,941 UART: [kat] --
3,508,970 UART: [cold-reset] ++
3,510,905 UART: [fht] FHT @ 0x50003400
3,521,026 UART: [idev] ++
3,521,597 UART: [idev] CDI.KEYID = 6
3,522,524 UART: [idev] SUBJECT.KEYID = 7
3,523,684 UART: [idev] UDS.KEYID = 0
3,526,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,592 UART: [idev] Erasing UDS.KEYID = 0
6,028,172 UART: [idev] Sha1 KeyId Algorithm
6,051,134 UART: [idev] --
6,055,701 UART: [ldev] ++
6,056,286 UART: [ldev] CDI.KEYID = 6
6,057,195 UART: [ldev] SUBJECT.KEYID = 5
6,058,356 UART: [ldev] AUTHORITY.KEYID = 7
6,059,644 UART: [ldev] FE.KEYID = 1
6,102,406 UART: [ldev] Erasing FE.KEYID = 1
8,606,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,858 UART: [ldev] --
10,418,589 UART: [fwproc] Wait for Commands...
10,420,901 UART: [fwproc] Recv command 0x46574c44
10,422,996 UART: [fwproc] Recv'd Img size: 114448 bytes
10,511,257 UART: ROM Fatal Error: 0x000B0005
10,514,346 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,383,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,287,822 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,135 writing to cptra_bootfsm_go
193,345 UART:
193,701 UART: Running Caliptra ROM ...
194,882 UART:
604,605 UART: [state] CFI Enabled
619,514 UART: [state] LifecycleState = Production
621,246 UART: [state] DebugLocked = No
623,378 UART: [state] WD Timer not started. Device not locked for debugging
626,661 UART: [kat] SHA2-256
805,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,368 UART: [kat] ++
817,897 UART: [kat] sha1
828,022 UART: [kat] SHA2-256
831,025 UART: [kat] SHA2-384
835,704 UART: [kat] SHA2-512-ACC
838,689 UART: [kat] ECC-384
3,280,371 UART: [kat] HMAC-384Kdf
3,293,725 UART: [kat] LMS
3,823,256 UART: [kat] --
3,827,039 UART: [cold-reset] ++
3,828,188 UART: [fht] FHT @ 0x50003400
3,839,355 UART: [idev] ++
3,839,918 UART: [idev] CDI.KEYID = 6
3,840,934 UART: [idev] SUBJECT.KEYID = 7
3,842,037 UART: [idev] UDS.KEYID = 0
3,844,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,770 UART: [idev] Erasing UDS.KEYID = 0
6,313,986 UART: [idev] Sha1 KeyId Algorithm
6,336,283 UART: [idev] --
6,340,456 UART: [ldev] ++
6,341,028 UART: [ldev] CDI.KEYID = 6
6,341,942 UART: [ldev] SUBJECT.KEYID = 5
6,343,102 UART: [ldev] AUTHORITY.KEYID = 7
6,344,332 UART: [ldev] FE.KEYID = 1
6,355,035 UART: [ldev] Erasing FE.KEYID = 1
8,830,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,921 UART: [ldev] --
10,621,727 UART: [fwproc] Wait for Commands...
10,624,639 UART: [fwproc] Recv command 0x46574c44
10,626,735 UART: [fwproc] Recv'd Img size: 114448 bytes
10,718,393 UART: ROM Fatal Error: 0x000B0005
10,721,472 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,699,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,497,945 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,146 UART:
192,529 UART: Running Caliptra ROM ...
193,667 UART:
193,812 UART: [state] CFI Enabled
263,610 UART: [state] LifecycleState = Production
265,851 UART: [state] DebugLocked = No
267,614 UART: [state] WD Timer not started. Device not locked for debugging
272,458 UART: [kat] SHA2-256
462,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,113 UART: [kat] ++
473,591 UART: [kat] sha1
483,789 UART: [kat] SHA2-256
486,800 UART: [kat] SHA2-384
492,671 UART: [kat] SHA2-512-ACC
495,236 UART: [kat] ECC-384
2,949,328 UART: [kat] HMAC-384Kdf
2,972,860 UART: [kat] LMS
3,504,615 UART: [kat] --
3,508,984 UART: [cold-reset] ++
3,510,382 UART: [fht] FHT @ 0x50003400
3,521,906 UART: [idev] ++
3,522,579 UART: [idev] CDI.KEYID = 6
3,523,516 UART: [idev] SUBJECT.KEYID = 7
3,524,729 UART: [idev] UDS.KEYID = 0
3,527,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,499 UART: [idev] Erasing UDS.KEYID = 0
6,029,581 UART: [idev] Sha1 KeyId Algorithm
6,051,164 UART: [idev] --
6,056,768 UART: [ldev] ++
6,057,462 UART: [ldev] CDI.KEYID = 6
6,058,350 UART: [ldev] SUBJECT.KEYID = 5
6,059,570 UART: [ldev] AUTHORITY.KEYID = 7
6,060,708 UART: [ldev] FE.KEYID = 1
6,100,577 UART: [ldev] Erasing FE.KEYID = 1
8,605,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,036 UART: [ldev] --
10,413,426 UART: [fwproc] Wait for Commands...
10,415,631 UART: [fwproc] Recv command 0x46574c44
10,417,946 UART: [fwproc] Recv'd Img size: 114448 bytes
10,541,605 UART: ROM Fatal Error: 0x000B0005
10,545,285 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,441,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,352,221 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,389 UART:
192,746 UART: Running Caliptra ROM ...
193,850 UART:
603,398 UART: [state] CFI Enabled
619,654 UART: [state] LifecycleState = Production
621,878 UART: [state] DebugLocked = No
624,290 UART: [state] WD Timer not started. Device not locked for debugging
628,968 UART: [kat] SHA2-256
818,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,637 UART: [kat] ++
830,231 UART: [kat] sha1
841,818 UART: [kat] SHA2-256
844,854 UART: [kat] SHA2-384
851,700 UART: [kat] SHA2-512-ACC
854,261 UART: [kat] ECC-384
3,295,494 UART: [kat] HMAC-384Kdf
3,307,037 UART: [kat] LMS
3,838,824 UART: [kat] --
3,845,675 UART: [cold-reset] ++
3,848,310 UART: [fht] FHT @ 0x50003400
3,858,703 UART: [idev] ++
3,859,442 UART: [idev] CDI.KEYID = 6
3,860,418 UART: [idev] SUBJECT.KEYID = 7
3,861,581 UART: [idev] UDS.KEYID = 0
3,864,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,081 UART: [idev] Erasing UDS.KEYID = 0
6,337,097 UART: [idev] Sha1 KeyId Algorithm
6,360,663 UART: [idev] --
6,365,569 UART: [ldev] ++
6,366,302 UART: [ldev] CDI.KEYID = 6
6,367,216 UART: [ldev] SUBJECT.KEYID = 5
6,368,380 UART: [ldev] AUTHORITY.KEYID = 7
6,369,610 UART: [ldev] FE.KEYID = 1
6,380,366 UART: [ldev] Erasing FE.KEYID = 1
8,861,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,967 UART: [ldev] --
10,653,917 UART: [fwproc] Wait for Commands...
10,656,174 UART: [fwproc] Recv command 0x46574c44
10,658,437 UART: [fwproc] Recv'd Img size: 114448 bytes
10,781,120 UART: ROM Fatal Error: 0x000B0005
10,784,747 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,758,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,573,942 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Production
85,539 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,058 UART: [kat] HMAC-384Kdf
906,664 UART: [kat] LMS
1,474,860 UART: [kat] --
1,475,635 UART: [cold-reset] ++
1,475,985 UART: [fht] Storing FHT @ 0x50003400
1,478,900 UART: [idev] ++
1,479,068 UART: [idev] CDI.KEYID = 6
1,479,428 UART: [idev] SUBJECT.KEYID = 7
1,479,852 UART: [idev] UDS.KEYID = 0
1,480,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,960 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,920 UART: [idev] --
1,513,959 UART: [ldev] ++
1,514,127 UART: [ldev] CDI.KEYID = 6
1,514,490 UART: [ldev] SUBJECT.KEYID = 5
1,514,916 UART: [ldev] AUTHORITY.KEYID = 7
1,515,379 UART: [ldev] FE.KEYID = 1
1,520,225 UART: [ldev] Erasing FE.KEYID = 1
1,545,746 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,782 UART: [ldev] --
1,585,145 UART: [fwproc] Waiting for Commands...
1,585,934 UART: [fwproc] Received command 0x46574c44
1,586,725 UART: [fwproc] Received Image of size 114448 bytes
1,631,932 UART: ROM Fatal Error: 0x000B0005
1,633,089 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,484,838 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,849 UART: [kat] SHA2-512-ACC
897,750 UART: [kat] ECC-384
903,497 UART: [kat] HMAC-384Kdf
908,143 UART: [kat] LMS
1,476,339 UART: [kat] --
1,477,230 UART: [cold-reset] ++
1,477,706 UART: [fht] Storing FHT @ 0x50003400
1,480,555 UART: [idev] ++
1,480,723 UART: [idev] CDI.KEYID = 6
1,481,083 UART: [idev] SUBJECT.KEYID = 7
1,481,507 UART: [idev] UDS.KEYID = 0
1,481,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,727 UART: [idev] Erasing UDS.KEYID = 0
1,506,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,759 UART: [idev] --
1,515,828 UART: [ldev] ++
1,515,996 UART: [ldev] CDI.KEYID = 6
1,516,359 UART: [ldev] SUBJECT.KEYID = 5
1,516,785 UART: [ldev] AUTHORITY.KEYID = 7
1,517,248 UART: [ldev] FE.KEYID = 1
1,522,340 UART: [ldev] Erasing FE.KEYID = 1
1,547,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,898 UART: [fwproc] Waiting for Commands...
1,587,657 UART: [fwproc] Received command 0x46574c44
1,588,448 UART: [fwproc] Received Image of size 114448 bytes
1,633,213 UART: ROM Fatal Error: 0x000B0005
1,634,370 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,023 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Production
85,879 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
918,084 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,785 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,616 UART: [idev] Erasing UDS.KEYID = 0
1,200,271 UART: [idev] Sha1 KeyId Algorithm
1,208,623 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,400 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,147 UART: ROM Fatal Error: 0x000B0005
1,329,304 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,617 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Production
86,462 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,373 UART: [kat] SHA2-256
894,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,148 UART: [kat] ++
898,300 UART: [kat] sha1
902,766 UART: [kat] SHA2-256
904,706 UART: [kat] SHA2-384
907,427 UART: [kat] SHA2-512-ACC
909,328 UART: [kat] ECC-384
919,471 UART: [kat] HMAC-384Kdf
924,001 UART: [kat] LMS
1,172,329 UART: [kat] --
1,173,108 UART: [cold-reset] ++
1,173,470 UART: [fht] FHT @ 0x50003400
1,176,183 UART: [idev] ++
1,176,351 UART: [idev] CDI.KEYID = 6
1,176,711 UART: [idev] SUBJECT.KEYID = 7
1,177,135 UART: [idev] UDS.KEYID = 0
1,177,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,195 UART: [idev] Erasing UDS.KEYID = 0
1,202,880 UART: [idev] Sha1 KeyId Algorithm
1,211,188 UART: [idev] --
1,212,254 UART: [ldev] ++
1,212,422 UART: [ldev] CDI.KEYID = 6
1,212,785 UART: [ldev] SUBJECT.KEYID = 5
1,213,211 UART: [ldev] AUTHORITY.KEYID = 7
1,213,674 UART: [ldev] FE.KEYID = 1
1,218,808 UART: [ldev] Erasing FE.KEYID = 1
1,245,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,424 UART: [ldev] --
1,284,903 UART: [fwproc] Wait for Commands...
1,285,543 UART: [fwproc] Recv command 0x46574c44
1,286,271 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,194 UART: ROM Fatal Error: 0x000B0005
1,332,351 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,234 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Production
85,369 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
903,792 UART: [kat] SHA2-512-ACC
905,693 UART: [kat] ECC-384
915,274 UART: [kat] HMAC-384Kdf
920,018 UART: [kat] LMS
1,168,330 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,737 UART: [fht] FHT @ 0x50003400
1,172,479 UART: [idev] ++
1,172,647 UART: [idev] CDI.KEYID = 6
1,173,008 UART: [idev] SUBJECT.KEYID = 7
1,173,433 UART: [idev] UDS.KEYID = 0
1,173,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,608 UART: [ldev] ++
1,208,776 UART: [ldev] CDI.KEYID = 6
1,209,140 UART: [ldev] SUBJECT.KEYID = 5
1,209,567 UART: [ldev] AUTHORITY.KEYID = 7
1,210,030 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,192 UART: [fwproc] Wait for Commands...
1,281,779 UART: [fwproc] Recv command 0x46574c44
1,282,512 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,917 UART: ROM Fatal Error: 0x000B0005
1,328,074 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,113 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Production
85,888 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,093 UART: [ldev] --
1,281,435 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,816 UART: ROM Fatal Error: 0x000B0005
1,328,973 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,236 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
4,879,215 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,646,109 >>> mbox cmd response: failed
16,646,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,647,266 >>> mbox cmd response: failed
16,647,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,647,821 >>> mbox cmd response: failed
Initializing fuses
2,056,677 writing to cptra_bootfsm_go
6,914,313 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,497,341 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
4,880,228 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,668,634 >>> mbox cmd response: failed
16,669,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,669,771 >>> mbox cmd response: failed
16,670,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,670,350 >>> mbox cmd response: failed
Initializing fuses
2,063,735 writing to cptra_bootfsm_go
6,931,954 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,508,414 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
5,191,422 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,817,646 >>> mbox cmd response: failed
16,818,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,818,627 >>> mbox cmd response: failed
16,818,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,819,200 >>> mbox cmd response: failed
Initializing fuses
2,057,617 writing to cptra_bootfsm_go
8,235,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,682,333 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
5,193,112 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,822,977 >>> mbox cmd response: failed
16,823,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,824,004 >>> mbox cmd response: failed
16,824,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,824,576 >>> mbox cmd response: failed
Initializing fuses
2,064,444 writing to cptra_bootfsm_go
8,225,098 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,665,997 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,443,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,412,538 >>> mbox cmd response: failed
12,413,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,413,658 >>> mbox cmd response: failed
12,413,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,414,219 >>> mbox cmd response: failed
Initializing fuses
2,064,582 writing to cptra_bootfsm_go
5,512,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,354,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,435,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,415,684 >>> mbox cmd response: failed
12,416,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,416,616 >>> mbox cmd response: failed
12,416,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,417,184 >>> mbox cmd response: failed
Initializing fuses
2,053,332 writing to cptra_bootfsm_go
5,483,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,283,610 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,785,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,664,288 >>> mbox cmd response: failed
12,665,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,461 >>> mbox cmd response: failed
12,665,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,067 >>> mbox cmd response: failed
Initializing fuses
2,052,904 writing to cptra_bootfsm_go
10,973,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,689,088 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
3,786,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,645,435 >>> mbox cmd response: failed
12,646,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,646,478 >>> mbox cmd response: failed
12,646,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,647,095 >>> mbox cmd response: failed
Initializing fuses
2,054,468 writing to cptra_bootfsm_go
10,998,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,720,911 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,441,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,415,281 >>> mbox cmd response: failed
12,416,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,416,443 >>> mbox cmd response: failed
12,416,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,416,999 >>> mbox cmd response: failed
Initializing fuses
2,063,704 writing to cptra_bootfsm_go
5,503,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,359,870 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,468,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,413,777 >>> mbox cmd response: failed
12,414,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,414,962 >>> mbox cmd response: failed
12,415,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,415,525 >>> mbox cmd response: failed
Initializing fuses
2,066,448 writing to cptra_bootfsm_go
5,486,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,342,370 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,781,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,652,776 >>> mbox cmd response: failed
12,653,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,653,707 >>> mbox cmd response: failed
12,653,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,261 >>> mbox cmd response: failed
Initializing fuses
2,057,734 writing to cptra_bootfsm_go
11,008,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,731,206 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,783,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,644,886 >>> mbox cmd response: failed
12,645,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,754 >>> mbox cmd response: failed
12,646,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,646,329 >>> mbox cmd response: failed
Initializing fuses
2,055,565 writing to cptra_bootfsm_go
11,005,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,733,305 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,206,492 >>> mbox cmd response: failed
1,206,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,498 >>> mbox cmd response: failed
1,206,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,937 UART: [kat] SHA2-256
881,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,983 UART: [kat] ++
886,135 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,476,245 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,806 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,324 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,520,845 UART: [ldev] Erasing FE.KEYID = 1
1,546,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 114448 bytes
2,886,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,521 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,204,642 >>> mbox cmd response: failed
1,204,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,648 >>> mbox cmd response: failed
1,204,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,732 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,017 >>> mbox cmd response: failed
1,208,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,023 >>> mbox cmd response: failed
1,208,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,598 UART: [kat] SHA2-256
882,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,644 UART: [kat] ++
886,796 UART: [kat] sha1
891,180 UART: [kat] SHA2-256
893,118 UART: [kat] SHA2-384
895,941 UART: [kat] SHA2-512-ACC
897,842 UART: [kat] ECC-384
903,433 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,264 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,347 UART: [idev] ++
1,480,515 UART: [idev] CDI.KEYID = 6
1,480,875 UART: [idev] SUBJECT.KEYID = 7
1,481,299 UART: [idev] UDS.KEYID = 0
1,481,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,917 UART: [idev] --
1,514,826 UART: [ldev] ++
1,514,994 UART: [ldev] CDI.KEYID = 6
1,515,357 UART: [ldev] SUBJECT.KEYID = 5
1,515,783 UART: [ldev] AUTHORITY.KEYID = 7
1,516,246 UART: [ldev] FE.KEYID = 1
1,521,384 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,151 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,257 UART: [fwproc] Received command 0x46574c44
1,588,048 UART: [fwproc] Received Image of size 114448 bytes
2,887,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,030 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,319 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,453 >>> mbox cmd response: failed
1,207,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,459 >>> mbox cmd response: failed
1,207,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,757 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,206,608 >>> mbox cmd response: failed
1,206,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,614 >>> mbox cmd response: failed
1,206,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,613 UART: [cold-reset] ++
1,172,065 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,646 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,208,943 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,528 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,929 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,304 >>> mbox cmd response: failed
1,207,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,310 >>> mbox cmd response: failed
1,207,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,836 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,715 >>> mbox cmd response: failed
1,207,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,721 >>> mbox cmd response: failed
1,207,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
893,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,328 UART: [kat] ++
897,480 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,351 UART: [kat] SHA2-512-ACC
908,252 UART: [kat] ECC-384
917,885 UART: [kat] HMAC-384Kdf
922,563 UART: [kat] LMS
1,170,891 UART: [kat] --
1,171,634 UART: [cold-reset] ++
1,172,210 UART: [fht] FHT @ 0x50003400
1,174,977 UART: [idev] ++
1,175,145 UART: [idev] CDI.KEYID = 6
1,175,505 UART: [idev] SUBJECT.KEYID = 7
1,175,929 UART: [idev] UDS.KEYID = 0
1,176,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,869 UART: [idev] Erasing UDS.KEYID = 0
1,200,674 UART: [idev] Sha1 KeyId Algorithm
1,209,130 UART: [idev] --
1,210,192 UART: [ldev] ++
1,210,360 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,149 UART: [ldev] AUTHORITY.KEYID = 7
1,211,612 UART: [ldev] FE.KEYID = 1
1,216,874 UART: [ldev] Erasing FE.KEYID = 1
1,243,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,452 UART: [ldev] --
1,282,963 UART: [fwproc] Wait for Commands...
1,283,647 UART: [fwproc] Recv command 0x46574c44
1,284,375 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,128 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,477 >>> mbox cmd response: failed
1,207,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,483 >>> mbox cmd response: failed
1,207,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,299 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,206,604 >>> mbox cmd response: failed
1,206,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,610 >>> mbox cmd response: failed
1,206,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,193 UART: [idev] Erasing UDS.KEYID = 0
1,199,361 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,838 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,685 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,936 >>> mbox cmd response: failed
1,208,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,942 >>> mbox cmd response: failed
1,208,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,211 >>> mbox cmd response: failed
1,208,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,217 >>> mbox cmd response: failed
1,208,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,169,968 UART: [fht] FHT @ 0x50003400
1,172,480 UART: [idev] ++
1,172,648 UART: [idev] CDI.KEYID = 6
1,173,009 UART: [idev] SUBJECT.KEYID = 7
1,173,434 UART: [idev] UDS.KEYID = 0
1,173,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,038 UART: [idev] Sha1 KeyId Algorithm
1,207,884 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,306 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,403 >>> mbox cmd response: failed
1,208,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,409 >>> mbox cmd response: failed
1,208,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,038 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,172 UART:
192,532 UART: Running Caliptra ROM ...
193,624 UART:
193,768 UART: [state] CFI Enabled
263,883 UART: [state] LifecycleState = Unprovisioned
265,846 UART: [state] DebugLocked = No
267,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,879 UART: [kat] SHA2-256
442,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,092 UART: [kat] ++
453,583 UART: [kat] sha1
465,764 UART: [kat] SHA2-256
468,444 UART: [kat] SHA2-384
473,835 UART: [kat] SHA2-512-ACC
476,232 UART: [kat] ECC-384
2,766,577 UART: [kat] HMAC-384Kdf
2,777,188 UART: [kat] LMS
3,967,486 UART: [kat] --
3,971,283 UART: [cold-reset] ++
3,973,385 UART: [fht] Storing FHT @ 0x50003400
3,983,701 UART: [idev] ++
3,984,316 UART: [idev] CDI.KEYID = 6
3,985,222 UART: [idev] SUBJECT.KEYID = 7
3,986,497 UART: [idev] UDS.KEYID = 0
3,989,153 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,723 UART: [idev] Erasing UDS.KEYID = 0
7,323,660 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,628 UART: [idev] --
7,349,091 UART: [ldev] ++
7,349,674 UART: [ldev] CDI.KEYID = 6
7,350,563 UART: [ldev] SUBJECT.KEYID = 5
7,351,830 UART: [ldev] AUTHORITY.KEYID = 7
7,353,013 UART: [ldev] FE.KEYID = 1
7,399,781 UART: [ldev] Erasing FE.KEYID = 1
10,731,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,920 UART: [ldev] --
13,095,347 UART: [fwproc] Waiting for Commands...
13,098,260 UART: [fwproc] Received command 0x46574c44
13,100,516 UART: [fwproc] Received Image of size 114124 bytes
16,040,842 UART: ROM Fatal Error: 0x000B0014
16,044,278 >>> mbox cmd response: failed
16,044,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,045,062 >>> mbox cmd response: failed
16,045,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,045,623 >>> mbox cmd response: failed
Initializing fuses
2,054,864 writing to cptra_bootfsm_go
2,244,203 UART:
2,244,561 UART: Running Caliptra ROM ...
2,245,704 UART:
2,245,866 UART: [state] CFI Enabled
2,310,815 UART: [state] LifecycleState = Unprovisioned
2,312,759 UART: [state] DebugLocked = No
2,315,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,730 UART: [kat] SHA2-256
2,490,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,958 UART: [kat] ++
2,501,459 UART: [kat] sha1
2,513,211 UART: [kat] SHA2-256
2,515,917 UART: [kat] SHA2-384
2,522,501 UART: [kat] SHA2-512-ACC
2,524,851 UART: [kat] ECC-384
4,813,007 UART: [kat] HMAC-384Kdf
4,844,882 UART: [kat] LMS
6,035,177 UART: [kat] --
6,040,976 UART: [cold-reset] ++
6,043,619 UART: [fht] Storing FHT @ 0x50003400
6,056,453 UART: [idev] ++
6,057,153 UART: [idev] CDI.KEYID = 6
6,058,048 UART: [idev] SUBJECT.KEYID = 7
6,059,133 UART: [idev] UDS.KEYID = 0
6,061,939 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,205,615 UART: [idev] Erasing UDS.KEYID = 0
9,389,682 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,090 UART: [idev] --
9,415,578 UART: [ldev] ++
9,416,151 UART: [ldev] CDI.KEYID = 6
9,417,092 UART: [ldev] SUBJECT.KEYID = 5
9,418,365 UART: [ldev] AUTHORITY.KEYID = 7
9,419,541 UART: [ldev] FE.KEYID = 1
9,466,197 UART: [ldev] Erasing FE.KEYID = 1
12,798,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,150 UART: [ldev] --
15,160,309 UART: [fwproc] Waiting for Commands...
15,162,143 UART: [fwproc] Received command 0x46574c44
15,164,331 UART: [fwproc] Received Image of size 114124 bytes
19,215,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,290,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,359,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,676,544 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,785,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,830,156 >>> mbox cmd response: failed
15,830,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,271 >>> mbox cmd response: failed
15,831,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,774 >>> mbox cmd response: failed
Initializing fuses
2,055,490 writing to cptra_bootfsm_go
5,840,591 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,934,158 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,436 UART:
192,798 UART: Running Caliptra ROM ...
194,010 UART:
603,800 UART: [state] CFI Enabled
618,350 UART: [state] LifecycleState = Unprovisioned
620,303 UART: [state] DebugLocked = No
623,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,787 UART: [kat] SHA2-256
797,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,036 UART: [kat] ++
808,515 UART: [kat] sha1
820,204 UART: [kat] SHA2-256
822,895 UART: [kat] SHA2-384
828,549 UART: [kat] SHA2-512-ACC
830,940 UART: [kat] ECC-384
3,115,320 UART: [kat] HMAC-384Kdf
3,127,184 UART: [kat] LMS
4,317,280 UART: [kat] --
4,320,818 UART: [cold-reset] ++
4,322,215 UART: [fht] Storing FHT @ 0x50003400
4,334,458 UART: [idev] ++
4,335,026 UART: [idev] CDI.KEYID = 6
4,335,938 UART: [idev] SUBJECT.KEYID = 7
4,337,206 UART: [idev] UDS.KEYID = 0
4,339,912 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,427 UART: [idev] Erasing UDS.KEYID = 0
7,618,861 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,560 UART: [idev] --
7,643,734 UART: [ldev] ++
7,644,301 UART: [ldev] CDI.KEYID = 6
7,645,268 UART: [ldev] SUBJECT.KEYID = 5
7,646,482 UART: [ldev] AUTHORITY.KEYID = 7
7,647,718 UART: [ldev] FE.KEYID = 1
7,657,156 UART: [ldev] Erasing FE.KEYID = 1
10,943,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,217 UART: [ldev] --
13,303,101 UART: [fwproc] Waiting for Commands...
13,305,100 UART: [fwproc] Received command 0x46574c44
13,307,293 UART: [fwproc] Received Image of size 114124 bytes
16,246,219 UART: ROM Fatal Error: 0x000B0014
16,249,671 >>> mbox cmd response: failed
16,250,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,250,334 >>> mbox cmd response: failed
16,250,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,250,898 >>> mbox cmd response: failed
Initializing fuses
2,060,336 writing to cptra_bootfsm_go
2,249,627 UART:
2,249,976 UART: Running Caliptra ROM ...
2,251,026 UART:
4,218,935 UART: [state] CFI Enabled
4,230,543 UART: [state] LifecycleState = Unprovisioned
4,232,460 UART: [state] DebugLocked = No
4,234,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,238,619 UART: [kat] SHA2-256
4,408,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,875 UART: [kat] ++
4,419,337 UART: [kat] sha1
4,430,061 UART: [kat] SHA2-256
4,432,779 UART: [kat] SHA2-384
4,439,796 UART: [kat] SHA2-512-ACC
4,442,158 UART: [kat] ECC-384
6,725,529 UART: [kat] HMAC-384Kdf
6,738,154 UART: [kat] LMS
7,928,225 UART: [kat] --
7,933,143 UART: [cold-reset] ++
7,935,183 UART: [fht] Storing FHT @ 0x50003400
7,945,481 UART: [idev] ++
7,946,048 UART: [idev] CDI.KEYID = 6
7,947,019 UART: [idev] SUBJECT.KEYID = 7
7,948,238 UART: [idev] UDS.KEYID = 0
7,951,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,094,852 UART: [idev] Erasing UDS.KEYID = 0
11,232,909 UART: [idev] Using Sha1 for KeyId Algorithm
11,255,496 UART: [idev] --
11,260,812 UART: [ldev] ++
11,261,394 UART: [ldev] CDI.KEYID = 6
11,262,413 UART: [ldev] SUBJECT.KEYID = 5
11,263,693 UART: [ldev] AUTHORITY.KEYID = 7
11,264,872 UART: [ldev] FE.KEYID = 1
11,277,150 UART: [ldev] Erasing FE.KEYID = 1
14,558,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,848,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,863,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,877,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,892,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,911,447 UART: [ldev] --
16,916,674 UART: [fwproc] Waiting for Commands...
16,918,671 UART: [fwproc] Received command 0x46574c44
16,920,865 UART: [fwproc] Received Image of size 114124 bytes
20,972,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,053,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,122,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,439,258 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,123,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,030,790 >>> mbox cmd response: failed
16,031,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,740 >>> mbox cmd response: failed
16,032,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,309 >>> mbox cmd response: failed
Initializing fuses
2,049,656 writing to cptra_bootfsm_go
7,966,763 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,913,202 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,216 UART:
192,584 UART: Running Caliptra ROM ...
193,762 UART:
193,915 UART: [state] CFI Enabled
264,649 UART: [state] LifecycleState = Unprovisioned
266,482 UART: [state] DebugLocked = No
268,614 UART: [state] WD Timer not started. Device not locked for debugging
272,800 UART: [kat] SHA2-256
451,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,522 UART: [kat] ++
464,053 UART: [kat] sha1
474,345 UART: [kat] SHA2-256
477,347 UART: [kat] SHA2-384
484,733 UART: [kat] SHA2-512-ACC
487,722 UART: [kat] ECC-384
2,946,804 UART: [kat] HMAC-384Kdf
2,971,256 UART: [kat] LMS
3,500,688 UART: [kat] --
3,504,324 UART: [cold-reset] ++
3,506,210 UART: [fht] FHT @ 0x50003400
3,517,404 UART: [idev] ++
3,517,973 UART: [idev] CDI.KEYID = 6
3,518,860 UART: [idev] SUBJECT.KEYID = 7
3,520,071 UART: [idev] UDS.KEYID = 0
3,523,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,199 UART: [idev] Erasing UDS.KEYID = 0
6,026,520 UART: [idev] Sha1 KeyId Algorithm
6,048,638 UART: [idev] --
6,053,430 UART: [ldev] ++
6,054,016 UART: [ldev] CDI.KEYID = 6
6,054,947 UART: [ldev] SUBJECT.KEYID = 5
6,056,114 UART: [ldev] AUTHORITY.KEYID = 7
6,057,347 UART: [ldev] FE.KEYID = 1
6,100,346 UART: [ldev] Erasing FE.KEYID = 1
8,604,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,871 UART: [ldev] --
10,414,105 UART: [fwproc] Wait for Commands...
10,416,961 UART: [fwproc] Recv command 0x46574c44
10,419,003 UART: [fwproc] Recv'd Img size: 114448 bytes
12,709,195 UART: ROM Fatal Error: 0x000B0014
12,712,312 >>> mbox cmd response: failed
12,712,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,069 >>> mbox cmd response: failed
12,713,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,635 >>> mbox cmd response: failed
Initializing fuses
2,060,118 writing to cptra_bootfsm_go
2,249,388 UART:
2,249,734 UART: Running Caliptra ROM ...
2,250,890 UART:
2,251,055 UART: [state] CFI Enabled
2,305,713 UART: [state] LifecycleState = Unprovisioned
2,307,581 UART: [state] DebugLocked = No
2,309,968 UART: [state] WD Timer not started. Device not locked for debugging
2,314,251 UART: [kat] SHA2-256
2,493,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,938 UART: [kat] ++
2,505,395 UART: [kat] sha1
2,516,657 UART: [kat] SHA2-256
2,519,666 UART: [kat] SHA2-384
2,525,585 UART: [kat] SHA2-512-ACC
2,528,546 UART: [kat] ECC-384
4,992,694 UART: [kat] HMAC-384Kdf
5,016,210 UART: [kat] LMS
5,545,651 UART: [kat] --
5,550,371 UART: [cold-reset] ++
5,552,203 UART: [fht] FHT @ 0x50003400
5,563,133 UART: [idev] ++
5,563,733 UART: [idev] CDI.KEYID = 6
5,564,619 UART: [idev] SUBJECT.KEYID = 7
5,565,837 UART: [idev] UDS.KEYID = 0
5,568,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,459 UART: [idev] Erasing UDS.KEYID = 0
8,069,198 UART: [idev] Sha1 KeyId Algorithm
8,091,624 UART: [idev] --
8,096,706 UART: [ldev] ++
8,097,279 UART: [ldev] CDI.KEYID = 6
8,098,214 UART: [ldev] SUBJECT.KEYID = 5
8,099,376 UART: [ldev] AUTHORITY.KEYID = 7
8,100,614 UART: [ldev] FE.KEYID = 1
8,143,183 UART: [ldev] Erasing FE.KEYID = 1
10,642,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,220 UART: [ldev] --
12,456,337 UART: [fwproc] Wait for Commands...
12,457,792 UART: [fwproc] Recv command 0x46574c44
12,459,892 UART: [fwproc] Recv'd Img size: 114448 bytes
15,856,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,927,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,996,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,315,675 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,383,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,515,261 >>> mbox cmd response: failed
12,515,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,151 >>> mbox cmd response: failed
12,516,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,662 >>> mbox cmd response: failed
Initializing fuses
2,054,614 writing to cptra_bootfsm_go
5,430,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,095,079 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,515 UART:
192,903 UART: Running Caliptra ROM ...
194,086 UART:
603,446 UART: [state] CFI Enabled
616,841 UART: [state] LifecycleState = Unprovisioned
618,730 UART: [state] DebugLocked = No
620,863 UART: [state] WD Timer not started. Device not locked for debugging
624,094 UART: [kat] SHA2-256
803,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,804 UART: [kat] ++
815,311 UART: [kat] sha1
825,871 UART: [kat] SHA2-256
828,883 UART: [kat] SHA2-384
836,374 UART: [kat] SHA2-512-ACC
839,317 UART: [kat] ECC-384
3,280,355 UART: [kat] HMAC-384Kdf
3,292,810 UART: [kat] LMS
3,822,302 UART: [kat] --
3,826,042 UART: [cold-reset] ++
3,828,003 UART: [fht] FHT @ 0x50003400
3,838,768 UART: [idev] ++
3,839,332 UART: [idev] CDI.KEYID = 6
3,840,267 UART: [idev] SUBJECT.KEYID = 7
3,841,477 UART: [idev] UDS.KEYID = 0
3,844,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,182 UART: [idev] Erasing UDS.KEYID = 0
6,314,674 UART: [idev] Sha1 KeyId Algorithm
6,336,707 UART: [idev] --
6,339,915 UART: [ldev] ++
6,340,493 UART: [ldev] CDI.KEYID = 6
6,341,406 UART: [ldev] SUBJECT.KEYID = 5
6,342,566 UART: [ldev] AUTHORITY.KEYID = 7
6,343,798 UART: [ldev] FE.KEYID = 1
6,353,420 UART: [ldev] Erasing FE.KEYID = 1
8,828,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,143 UART: [ldev] --
10,617,949 UART: [fwproc] Wait for Commands...
10,620,800 UART: [fwproc] Recv command 0x46574c44
10,622,844 UART: [fwproc] Recv'd Img size: 114448 bytes
12,914,359 UART: ROM Fatal Error: 0x000B0014
12,917,477 >>> mbox cmd response: failed
12,917,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,245 >>> mbox cmd response: failed
12,918,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,847 >>> mbox cmd response: failed
Initializing fuses
2,052,676 writing to cptra_bootfsm_go
2,242,015 UART:
2,242,369 UART: Running Caliptra ROM ...
2,243,466 UART:
7,551,930 UART: [state] CFI Enabled
7,567,085 UART: [state] LifecycleState = Unprovisioned
7,568,962 UART: [state] DebugLocked = No
7,571,862 UART: [state] WD Timer not started. Device not locked for debugging
7,575,283 UART: [kat] SHA2-256
7,754,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,765,990 UART: [kat] ++
7,766,536 UART: [kat] sha1
7,776,191 UART: [kat] SHA2-256
7,779,211 UART: [kat] SHA2-384
7,784,733 UART: [kat] SHA2-512-ACC
7,787,684 UART: [kat] ECC-384
10,229,382 UART: [kat] HMAC-384Kdf
10,242,681 UART: [kat] LMS
10,772,203 UART: [kat] --
10,775,643 UART: [cold-reset] ++
10,777,704 UART: [fht] FHT @ 0x50003400
10,790,083 UART: [idev] ++
10,790,650 UART: [idev] CDI.KEYID = 6
10,791,555 UART: [idev] SUBJECT.KEYID = 7
10,792,766 UART: [idev] UDS.KEYID = 0
10,795,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,939,270 UART: [idev] Erasing UDS.KEYID = 0
13,264,393 UART: [idev] Sha1 KeyId Algorithm
13,287,979 UART: [idev] --
13,291,373 UART: [ldev] ++
13,291,971 UART: [ldev] CDI.KEYID = 6
13,292,888 UART: [ldev] SUBJECT.KEYID = 5
13,294,048 UART: [ldev] AUTHORITY.KEYID = 7
13,295,286 UART: [ldev] FE.KEYID = 1
13,306,676 UART: [ldev] Erasing FE.KEYID = 1
15,778,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,498,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,514,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,529,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,545,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,566,567 UART: [ldev] --
17,570,811 UART: [fwproc] Wait for Commands...
17,573,561 UART: [fwproc] Recv command 0x46574c44
17,575,661 UART: [fwproc] Recv'd Img size: 114448 bytes
20,984,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,057,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,126,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,443,981 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,695,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,693,559 >>> mbox cmd response: failed
12,694,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,468 >>> mbox cmd response: failed
12,694,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,695,028 >>> mbox cmd response: failed
Initializing fuses
2,049,016 writing to cptra_bootfsm_go
10,876,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,452,770 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,185 UART:
192,609 UART: Running Caliptra ROM ...
193,711 UART:
193,851 UART: [state] CFI Enabled
265,919 UART: [state] LifecycleState = Unprovisioned
268,336 UART: [state] DebugLocked = No
270,964 UART: [state] WD Timer not started. Device not locked for debugging
276,461 UART: [kat] SHA2-256
466,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,089 UART: [kat] ++
477,571 UART: [kat] sha1
489,965 UART: [kat] SHA2-256
492,980 UART: [kat] SHA2-384
500,147 UART: [kat] SHA2-512-ACC
502,757 UART: [kat] ECC-384
2,947,601 UART: [kat] HMAC-384Kdf
2,972,043 UART: [kat] LMS
3,503,789 UART: [kat] --
3,505,609 UART: [cold-reset] ++
3,508,182 UART: [fht] FHT @ 0x50003400
3,519,630 UART: [idev] ++
3,520,321 UART: [idev] CDI.KEYID = 6
3,521,236 UART: [idev] SUBJECT.KEYID = 7
3,522,451 UART: [idev] UDS.KEYID = 0
3,525,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,413 UART: [idev] Erasing UDS.KEYID = 0
6,028,797 UART: [idev] Sha1 KeyId Algorithm
6,052,704 UART: [idev] --
6,057,462 UART: [ldev] ++
6,058,151 UART: [ldev] CDI.KEYID = 6
6,059,068 UART: [ldev] SUBJECT.KEYID = 5
6,060,287 UART: [ldev] AUTHORITY.KEYID = 7
6,061,466 UART: [ldev] FE.KEYID = 1
6,102,912 UART: [ldev] Erasing FE.KEYID = 1
8,613,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,988 UART: [ldev] --
10,415,601 UART: [fwproc] Wait for Commands...
10,418,291 UART: [fwproc] Recv command 0x46574c44
10,420,551 UART: [fwproc] Recv'd Img size: 114448 bytes
12,741,500 UART: ROM Fatal Error: 0x000B0014
12,745,115 >>> mbox cmd response: failed
12,745,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,788 >>> mbox cmd response: failed
12,746,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,389 >>> mbox cmd response: failed
Initializing fuses
2,053,752 writing to cptra_bootfsm_go
2,243,058 UART:
2,243,409 UART: Running Caliptra ROM ...
2,244,454 UART:
2,244,605 UART: [state] CFI Enabled
2,302,211 UART: [state] LifecycleState = Unprovisioned
2,304,574 UART: [state] DebugLocked = No
2,306,313 UART: [state] WD Timer not started. Device not locked for debugging
2,311,683 UART: [kat] SHA2-256
2,501,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,311 UART: [kat] ++
2,512,772 UART: [kat] sha1
2,523,248 UART: [kat] SHA2-256
2,526,303 UART: [kat] SHA2-384
2,531,919 UART: [kat] SHA2-512-ACC
2,534,502 UART: [kat] ECC-384
4,987,389 UART: [kat] HMAC-384Kdf
5,011,369 UART: [kat] LMS
5,543,140 UART: [kat] --
5,547,048 UART: [cold-reset] ++
5,548,560 UART: [fht] FHT @ 0x50003400
5,559,329 UART: [idev] ++
5,560,229 UART: [idev] CDI.KEYID = 6
5,561,124 UART: [idev] SUBJECT.KEYID = 7
5,562,232 UART: [idev] UDS.KEYID = 0
5,564,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,708,646 UART: [idev] Erasing UDS.KEYID = 0
8,067,175 UART: [idev] Sha1 KeyId Algorithm
8,089,517 UART: [idev] --
8,095,407 UART: [ldev] ++
8,096,093 UART: [ldev] CDI.KEYID = 6
8,097,009 UART: [ldev] SUBJECT.KEYID = 5
8,098,175 UART: [ldev] AUTHORITY.KEYID = 7
8,099,410 UART: [ldev] FE.KEYID = 1
8,139,119 UART: [ldev] Erasing FE.KEYID = 1
10,648,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,302 UART: [ldev] --
12,453,527 UART: [fwproc] Wait for Commands...
12,455,685 UART: [fwproc] Recv command 0x46574c44
12,458,003 UART: [fwproc] Recv'd Img size: 114448 bytes
15,902,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,101,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,644,831 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,439,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,628,004 >>> mbox cmd response: failed
12,628,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,327 >>> mbox cmd response: failed
12,629,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,912 >>> mbox cmd response: failed
Initializing fuses
2,049,615 writing to cptra_bootfsm_go
5,488,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,800,406 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,357 UART:
192,717 UART: Running Caliptra ROM ...
193,904 UART:
603,493 UART: [state] CFI Enabled
618,031 UART: [state] LifecycleState = Unprovisioned
620,410 UART: [state] DebugLocked = No
623,138 UART: [state] WD Timer not started. Device not locked for debugging
628,154 UART: [kat] SHA2-256
818,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,829 UART: [kat] ++
829,418 UART: [kat] sha1
839,768 UART: [kat] SHA2-256
842,786 UART: [kat] SHA2-384
849,887 UART: [kat] SHA2-512-ACC
852,453 UART: [kat] ECC-384
3,293,227 UART: [kat] HMAC-384Kdf
3,307,261 UART: [kat] LMS
3,839,085 UART: [kat] --
3,842,646 UART: [cold-reset] ++
3,843,764 UART: [fht] FHT @ 0x50003400
3,855,826 UART: [idev] ++
3,856,501 UART: [idev] CDI.KEYID = 6
3,857,517 UART: [idev] SUBJECT.KEYID = 7
3,858,676 UART: [idev] UDS.KEYID = 0
3,861,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,364 UART: [idev] Erasing UDS.KEYID = 0
6,331,061 UART: [idev] Sha1 KeyId Algorithm
6,353,333 UART: [idev] --
6,357,329 UART: [ldev] ++
6,358,009 UART: [ldev] CDI.KEYID = 6
6,358,922 UART: [ldev] SUBJECT.KEYID = 5
6,360,132 UART: [ldev] AUTHORITY.KEYID = 7
6,361,533 UART: [ldev] FE.KEYID = 1
6,372,136 UART: [ldev] Erasing FE.KEYID = 1
8,849,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,824 UART: [ldev] --
10,639,666 UART: [fwproc] Wait for Commands...
10,641,599 UART: [fwproc] Recv command 0x46574c44
10,643,858 UART: [fwproc] Recv'd Img size: 114448 bytes
12,961,231 UART: ROM Fatal Error: 0x000B0014
12,964,893 >>> mbox cmd response: failed
12,965,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,965,510 >>> mbox cmd response: failed
12,965,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,089 >>> mbox cmd response: failed
Initializing fuses
2,058,199 writing to cptra_bootfsm_go
2,247,492 UART:
2,247,840 UART: Running Caliptra ROM ...
2,248,924 UART:
7,505,026 UART: [state] CFI Enabled
7,518,752 UART: [state] LifecycleState = Unprovisioned
7,521,096 UART: [state] DebugLocked = No
7,523,834 UART: [state] WD Timer not started. Device not locked for debugging
7,528,280 UART: [kat] SHA2-256
7,718,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,728,972 UART: [kat] ++
7,729,513 UART: [kat] sha1
7,741,541 UART: [kat] SHA2-256
7,744,568 UART: [kat] SHA2-384
7,751,316 UART: [kat] SHA2-512-ACC
7,753,934 UART: [kat] ECC-384
10,197,420 UART: [kat] HMAC-384Kdf
10,210,032 UART: [kat] LMS
10,741,813 UART: [kat] --
10,746,580 UART: [cold-reset] ++
10,748,403 UART: [fht] FHT @ 0x50003400
10,760,186 UART: [idev] ++
10,760,907 UART: [idev] CDI.KEYID = 6
10,761,819 UART: [idev] SUBJECT.KEYID = 7
10,763,036 UART: [idev] UDS.KEYID = 0
10,765,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,909,454 UART: [idev] Erasing UDS.KEYID = 0
13,235,661 UART: [idev] Sha1 KeyId Algorithm
13,257,488 UART: [idev] --
13,261,967 UART: [ldev] ++
13,262,645 UART: [ldev] CDI.KEYID = 6
13,263,555 UART: [ldev] SUBJECT.KEYID = 5
13,264,765 UART: [ldev] AUTHORITY.KEYID = 7
13,265,937 UART: [ldev] FE.KEYID = 1
13,276,686 UART: [ldev] Erasing FE.KEYID = 1
15,758,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,478,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,493,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,509,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,524,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,545,514 UART: [ldev] --
17,550,183 UART: [fwproc] Wait for Commands...
17,553,205 UART: [fwproc] Recv command 0x46574c44
17,555,621 UART: [fwproc] Recv'd Img size: 114448 bytes
21,003,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,077,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,193,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,736,997 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,763,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,880,336 >>> mbox cmd response: failed
12,880,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,881,252 >>> mbox cmd response: failed
12,881,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,881,821 >>> mbox cmd response: failed
Initializing fuses
2,051,267 writing to cptra_bootfsm_go
10,735,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,944,695 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,353 UART: [kat] SHA2-256
882,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,399 UART: [kat] ++
886,551 UART: [kat] sha1
890,733 UART: [kat] SHA2-256
892,671 UART: [kat] SHA2-384
895,464 UART: [kat] SHA2-512-ACC
897,365 UART: [kat] ECC-384
903,010 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,477,067 UART: [cold-reset] ++
1,477,633 UART: [fht] Storing FHT @ 0x50003400
1,480,316 UART: [idev] ++
1,480,484 UART: [idev] CDI.KEYID = 6
1,480,844 UART: [idev] SUBJECT.KEYID = 7
1,481,268 UART: [idev] UDS.KEYID = 0
1,481,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,722 UART: [idev] Erasing UDS.KEYID = 0
1,506,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,282 UART: [idev] --
1,516,365 UART: [ldev] ++
1,516,533 UART: [ldev] CDI.KEYID = 6
1,516,896 UART: [ldev] SUBJECT.KEYID = 5
1,517,322 UART: [ldev] AUTHORITY.KEYID = 7
1,517,785 UART: [ldev] FE.KEYID = 1
1,522,695 UART: [ldev] Erasing FE.KEYID = 1
1,548,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,424 UART: [ldev] --
1,587,735 UART: [fwproc] Waiting for Commands...
1,588,604 UART: [fwproc] Received command 0x46574c44
1,589,395 UART: [fwproc] Received Image of size 114448 bytes
1,855,507 UART: ROM Fatal Error: 0x000B0014
1,856,664 >>> mbox cmd response: failed
1,856,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,670 >>> mbox cmd response: failed
1,856,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,528 UART: [kat] SHA2-512-ACC
897,429 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,556 UART: [kat] LMS
1,475,752 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,524 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,076 UART: [idev] --
1,515,295 UART: [ldev] ++
1,515,463 UART: [ldev] CDI.KEYID = 6
1,515,826 UART: [ldev] SUBJECT.KEYID = 5
1,516,252 UART: [ldev] AUTHORITY.KEYID = 7
1,516,715 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,738 UART: [ldev] --
1,586,131 UART: [fwproc] Waiting for Commands...
1,586,786 UART: [fwproc] Received command 0x46574c44
1,587,577 UART: [fwproc] Received Image of size 114448 bytes
2,886,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,456 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,706,939 >>> mbox cmd response: failed
1,706,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,945 >>> mbox cmd response: failed
1,706,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,402 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,661 UART: [kat] SHA2-512-ACC
897,562 UART: [kat] ECC-384
903,213 UART: [kat] HMAC-384Kdf
908,003 UART: [kat] LMS
1,476,199 UART: [kat] --
1,477,140 UART: [cold-reset] ++
1,477,644 UART: [fht] Storing FHT @ 0x50003400
1,480,551 UART: [idev] ++
1,480,719 UART: [idev] CDI.KEYID = 6
1,481,079 UART: [idev] SUBJECT.KEYID = 7
1,481,503 UART: [idev] UDS.KEYID = 0
1,481,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,387 UART: [idev] Erasing UDS.KEYID = 0
1,506,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,699 UART: [idev] --
1,515,684 UART: [ldev] ++
1,515,852 UART: [ldev] CDI.KEYID = 6
1,516,215 UART: [ldev] SUBJECT.KEYID = 5
1,516,641 UART: [ldev] AUTHORITY.KEYID = 7
1,517,104 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,053 UART: [ldev] --
1,587,396 UART: [fwproc] Waiting for Commands...
1,588,061 UART: [fwproc] Received command 0x46574c44
1,588,852 UART: [fwproc] Received Image of size 114448 bytes
1,854,830 UART: ROM Fatal Error: 0x000B0014
1,855,987 >>> mbox cmd response: failed
1,855,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,993 >>> mbox cmd response: failed
1,855,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,999 UART: [kat] HMAC-384Kdf
907,671 UART: [kat] LMS
1,475,867 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,480,179 UART: [idev] ++
1,480,347 UART: [idev] CDI.KEYID = 6
1,480,707 UART: [idev] SUBJECT.KEYID = 7
1,481,131 UART: [idev] UDS.KEYID = 0
1,481,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,043 UART: [idev] Erasing UDS.KEYID = 0
1,505,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,879 UART: [idev] --
1,515,106 UART: [ldev] ++
1,515,274 UART: [ldev] CDI.KEYID = 6
1,515,637 UART: [ldev] SUBJECT.KEYID = 5
1,516,063 UART: [ldev] AUTHORITY.KEYID = 7
1,516,526 UART: [ldev] FE.KEYID = 1
1,522,002 UART: [ldev] Erasing FE.KEYID = 1
1,548,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,105 UART: [ldev] --
1,587,576 UART: [fwproc] Waiting for Commands...
1,588,361 UART: [fwproc] Received command 0x46574c44
1,589,152 UART: [fwproc] Received Image of size 114448 bytes
2,887,814 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,425 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,038 >>> mbox cmd response: failed
1,707,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,044 >>> mbox cmd response: failed
1,707,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,801 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,481 UART: [kat] SHA2-256
904,421 UART: [kat] SHA2-384
907,286 UART: [kat] SHA2-512-ACC
909,187 UART: [kat] ECC-384
919,122 UART: [kat] HMAC-384Kdf
923,606 UART: [kat] LMS
1,171,934 UART: [kat] --
1,172,773 UART: [cold-reset] ++
1,173,227 UART: [fht] FHT @ 0x50003400
1,175,836 UART: [idev] ++
1,176,004 UART: [idev] CDI.KEYID = 6
1,176,364 UART: [idev] SUBJECT.KEYID = 7
1,176,788 UART: [idev] UDS.KEYID = 0
1,177,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,201,517 UART: [idev] Sha1 KeyId Algorithm
1,210,025 UART: [idev] --
1,211,209 UART: [ldev] ++
1,211,377 UART: [ldev] CDI.KEYID = 6
1,211,740 UART: [ldev] SUBJECT.KEYID = 5
1,212,166 UART: [ldev] AUTHORITY.KEYID = 7
1,212,629 UART: [ldev] FE.KEYID = 1
1,217,997 UART: [ldev] Erasing FE.KEYID = 1
1,244,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,045 UART: [ldev] --
1,283,528 UART: [fwproc] Wait for Commands...
1,284,284 UART: [fwproc] Recv command 0x46574c44
1,285,012 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,208 UART: ROM Fatal Error: 0x000B0014
1,552,365 >>> mbox cmd response: failed
1,552,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,371 >>> mbox cmd response: failed
1,552,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,377 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
893,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,459 UART: [kat] ++
897,611 UART: [kat] sha1
901,817 UART: [kat] SHA2-256
903,757 UART: [kat] SHA2-384
906,616 UART: [kat] SHA2-512-ACC
908,517 UART: [kat] ECC-384
918,760 UART: [kat] HMAC-384Kdf
923,284 UART: [kat] LMS
1,171,612 UART: [kat] --
1,172,621 UART: [cold-reset] ++
1,172,979 UART: [fht] FHT @ 0x50003400
1,175,628 UART: [idev] ++
1,175,796 UART: [idev] CDI.KEYID = 6
1,176,156 UART: [idev] SUBJECT.KEYID = 7
1,176,580 UART: [idev] UDS.KEYID = 0
1,176,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,496 UART: [idev] Erasing UDS.KEYID = 0
1,201,165 UART: [idev] Sha1 KeyId Algorithm
1,209,617 UART: [idev] --
1,210,593 UART: [ldev] ++
1,210,761 UART: [ldev] CDI.KEYID = 6
1,211,124 UART: [ldev] SUBJECT.KEYID = 5
1,211,550 UART: [ldev] AUTHORITY.KEYID = 7
1,212,013 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,296 UART: [fwproc] Recv command 0x46574c44
1,284,024 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,049 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,404,472 >>> mbox cmd response: failed
1,404,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,478 >>> mbox cmd response: failed
1,404,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,870 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
893,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,516 UART: [kat] ++
897,668 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,564 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,523 UART: [idev] ++
1,175,691 UART: [idev] CDI.KEYID = 6
1,176,051 UART: [idev] SUBJECT.KEYID = 7
1,176,475 UART: [idev] UDS.KEYID = 0
1,176,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,922 UART: [idev] Sha1 KeyId Algorithm
1,210,478 UART: [idev] --
1,211,440 UART: [ldev] ++
1,211,608 UART: [ldev] CDI.KEYID = 6
1,211,971 UART: [ldev] SUBJECT.KEYID = 5
1,212,397 UART: [ldev] AUTHORITY.KEYID = 7
1,212,860 UART: [ldev] FE.KEYID = 1
1,218,372 UART: [ldev] Erasing FE.KEYID = 1
1,244,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,724 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,815 UART: [fwproc] Recv command 0x46574c44
1,285,543 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,393 UART: ROM Fatal Error: 0x000B0014
1,552,550 >>> mbox cmd response: failed
1,552,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,556 >>> mbox cmd response: failed
1,552,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,429 UART: [kat] SHA2-512-ACC
908,330 UART: [kat] ECC-384
918,465 UART: [kat] HMAC-384Kdf
923,139 UART: [kat] LMS
1,171,467 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,839 UART: [idev] ++
1,176,007 UART: [idev] CDI.KEYID = 6
1,176,367 UART: [idev] SUBJECT.KEYID = 7
1,176,791 UART: [idev] UDS.KEYID = 0
1,177,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,817 UART: [idev] Erasing UDS.KEYID = 0
1,202,408 UART: [idev] Sha1 KeyId Algorithm
1,210,670 UART: [idev] --
1,211,906 UART: [ldev] ++
1,212,074 UART: [ldev] CDI.KEYID = 6
1,212,437 UART: [ldev] SUBJECT.KEYID = 5
1,212,863 UART: [ldev] AUTHORITY.KEYID = 7
1,213,326 UART: [ldev] FE.KEYID = 1
1,218,802 UART: [ldev] Erasing FE.KEYID = 1
1,244,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,284,905 UART: [fwproc] Recv command 0x46574c44
1,285,633 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,480 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,407,137 >>> mbox cmd response: failed
1,407,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,143 >>> mbox cmd response: failed
1,407,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,794 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
890,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,825 UART: [kat] ++
894,977 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,918 UART: [kat] SHA2-512-ACC
905,819 UART: [kat] ECC-384
915,520 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,327 UART: [idev] ++
1,172,495 UART: [idev] CDI.KEYID = 6
1,172,856 UART: [idev] SUBJECT.KEYID = 7
1,173,281 UART: [idev] UDS.KEYID = 0
1,173,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,433 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,598 UART: [ldev] ++
1,208,766 UART: [ldev] CDI.KEYID = 6
1,209,130 UART: [ldev] SUBJECT.KEYID = 5
1,209,557 UART: [ldev] AUTHORITY.KEYID = 7
1,210,020 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,668 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,779 UART: ROM Fatal Error: 0x000B0014
1,548,936 >>> mbox cmd response: failed
1,548,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,942 >>> mbox cmd response: failed
1,548,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
903,938 UART: [kat] SHA2-512-ACC
905,839 UART: [kat] ECC-384
915,626 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,173,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,140 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,109 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,153 >>> mbox cmd response: failed
1,402,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,159 >>> mbox cmd response: failed
1,402,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,275 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,953 UART: [state] LifecycleState = Unprovisioned
86,608 UART: [state] DebugLocked = No
87,328 UART: [state] WD Timer not started. Device not locked for debugging
88,489 UART: [kat] SHA2-256
892,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,168 UART: [kat] ++
896,320 UART: [kat] sha1
900,686 UART: [kat] SHA2-256
902,626 UART: [kat] SHA2-384
905,243 UART: [kat] SHA2-512-ACC
907,144 UART: [kat] ECC-384
917,091 UART: [kat] HMAC-384Kdf
921,599 UART: [kat] LMS
1,169,911 UART: [kat] --
1,170,948 UART: [cold-reset] ++
1,171,482 UART: [fht] FHT @ 0x50003400
1,173,924 UART: [idev] ++
1,174,092 UART: [idev] CDI.KEYID = 6
1,174,453 UART: [idev] SUBJECT.KEYID = 7
1,174,878 UART: [idev] UDS.KEYID = 0
1,175,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,336 UART: [idev] Erasing UDS.KEYID = 0
1,200,500 UART: [idev] Sha1 KeyId Algorithm
1,209,302 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,733 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,031 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,990 UART: ROM Fatal Error: 0x000B0014
1,550,147 >>> mbox cmd response: failed
1,550,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,153 >>> mbox cmd response: failed
1,550,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,529 UART: [kat] LMS
1,169,841 UART: [kat] --
1,170,750 UART: [cold-reset] ++
1,171,142 UART: [fht] FHT @ 0x50003400
1,173,734 UART: [idev] ++
1,173,902 UART: [idev] CDI.KEYID = 6
1,174,263 UART: [idev] SUBJECT.KEYID = 7
1,174,688 UART: [idev] UDS.KEYID = 0
1,175,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,183 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x46574c44
1,283,247 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,238 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,824 >>> mbox cmd response: failed
1,402,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,830 >>> mbox cmd response: failed
1,402,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,074 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,183 UART:
192,547 UART: Running Caliptra ROM ...
193,674 UART:
193,824 UART: [state] CFI Enabled
263,718 UART: [state] LifecycleState = Unprovisioned
265,690 UART: [state] DebugLocked = No
267,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,810 UART: [kat] SHA2-256
442,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,059 UART: [kat] ++
453,529 UART: [kat] sha1
465,056 UART: [kat] SHA2-256
467,738 UART: [kat] SHA2-384
472,581 UART: [kat] SHA2-512-ACC
474,974 UART: [kat] ECC-384
2,767,559 UART: [kat] HMAC-384Kdf
2,798,322 UART: [kat] LMS
3,988,623 UART: [kat] --
3,993,233 UART: [cold-reset] ++
3,994,847 UART: [fht] Storing FHT @ 0x50003400
4,005,145 UART: [idev] ++
4,005,721 UART: [idev] CDI.KEYID = 6
4,006,640 UART: [idev] SUBJECT.KEYID = 7
4,007,914 UART: [idev] UDS.KEYID = 0
4,010,554 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,413 UART: [idev] Erasing UDS.KEYID = 0
7,343,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,183 UART: [idev] --
7,370,447 UART: [ldev] ++
7,371,014 UART: [ldev] CDI.KEYID = 6
7,371,957 UART: [ldev] SUBJECT.KEYID = 5
7,373,166 UART: [ldev] AUTHORITY.KEYID = 7
7,374,456 UART: [ldev] FE.KEYID = 1
7,420,188 UART: [ldev] Erasing FE.KEYID = 1
10,752,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,247 UART: [ldev] --
13,113,813 UART: [fwproc] Waiting for Commands...
13,115,855 UART: [fwproc] Received command 0x46574c44
13,118,111 UART: [fwproc] Received Image of size 114124 bytes
16,060,060 UART: ROM Fatal Error: 0x000B0023
16,063,520 >>> mbox cmd response: failed
16,063,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,181 >>> mbox cmd response: failed
16,064,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,793 >>> mbox cmd response: failed
Initializing fuses
2,061,306 writing to cptra_bootfsm_go
2,250,582 UART:
2,250,948 UART: Running Caliptra ROM ...
2,251,996 UART:
2,252,149 UART: [state] CFI Enabled
2,326,276 UART: [state] LifecycleState = Unprovisioned
2,328,236 UART: [state] DebugLocked = No
2,331,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,336,211 UART: [kat] SHA2-256
2,505,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,463 UART: [kat] ++
2,516,954 UART: [kat] sha1
2,528,008 UART: [kat] SHA2-256
2,530,711 UART: [kat] SHA2-384
2,537,671 UART: [kat] SHA2-512-ACC
2,540,023 UART: [kat] ECC-384
4,829,884 UART: [kat] HMAC-384Kdf
4,860,204 UART: [kat] LMS
6,050,508 UART: [kat] --
6,054,685 UART: [cold-reset] ++
6,055,602 UART: [fht] Storing FHT @ 0x50003400
6,066,849 UART: [idev] ++
6,067,481 UART: [idev] CDI.KEYID = 6
6,068,372 UART: [idev] SUBJECT.KEYID = 7
6,069,648 UART: [idev] UDS.KEYID = 0
6,071,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,215,245 UART: [idev] Erasing UDS.KEYID = 0
9,406,562 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,555 UART: [idev] --
9,430,823 UART: [ldev] ++
9,431,398 UART: [ldev] CDI.KEYID = 6
9,432,360 UART: [ldev] SUBJECT.KEYID = 5
9,433,617 UART: [ldev] AUTHORITY.KEYID = 7
9,434,862 UART: [ldev] FE.KEYID = 1
9,481,181 UART: [ldev] Erasing FE.KEYID = 1
12,812,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,122,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,630 UART: [ldev] --
15,174,672 UART: [fwproc] Waiting for Commands...
15,177,045 UART: [fwproc] Received command 0x46574c44
15,179,234 UART: [fwproc] Received Image of size 114124 bytes
19,225,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,298,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,367,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,685,472 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,809,248 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,848,309 >>> mbox cmd response: failed
15,848,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,221 >>> mbox cmd response: failed
15,849,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,791 >>> mbox cmd response: failed
Initializing fuses
2,063,230 writing to cptra_bootfsm_go
5,856,460 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,926,708 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,537 writing to cptra_bootfsm_go
192,852 UART:
193,543 UART: Running Caliptra ROM ...
194,667 UART:
604,148 UART: [state] CFI Enabled
621,322 UART: [state] LifecycleState = Unprovisioned
623,299 UART: [state] DebugLocked = No
624,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,652 UART: [kat] SHA2-256
798,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,948 UART: [kat] ++
809,445 UART: [kat] sha1
819,960 UART: [kat] SHA2-256
822,657 UART: [kat] SHA2-384
828,269 UART: [kat] SHA2-512-ACC
830,665 UART: [kat] ECC-384
3,113,531 UART: [kat] HMAC-384Kdf
3,125,989 UART: [kat] LMS
4,316,105 UART: [kat] --
4,321,313 UART: [cold-reset] ++
4,323,405 UART: [fht] Storing FHT @ 0x50003400
4,335,709 UART: [idev] ++
4,336,336 UART: [idev] CDI.KEYID = 6
4,337,261 UART: [idev] SUBJECT.KEYID = 7
4,338,484 UART: [idev] UDS.KEYID = 0
4,341,171 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,050 UART: [idev] Erasing UDS.KEYID = 0
7,627,362 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,608 UART: [idev] --
7,654,007 UART: [ldev] ++
7,654,599 UART: [ldev] CDI.KEYID = 6
7,655,528 UART: [ldev] SUBJECT.KEYID = 5
7,656,750 UART: [ldev] AUTHORITY.KEYID = 7
7,657,984 UART: [ldev] FE.KEYID = 1
7,669,391 UART: [ldev] Erasing FE.KEYID = 1
10,956,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,492 UART: [ldev] --
13,317,448 UART: [fwproc] Waiting for Commands...
13,320,684 UART: [fwproc] Received command 0x46574c44
13,322,906 UART: [fwproc] Received Image of size 114124 bytes
16,266,830 UART: ROM Fatal Error: 0x000B0023
16,270,255 >>> mbox cmd response: failed
16,270,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,972 >>> mbox cmd response: failed
16,271,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,271,663 >>> mbox cmd response: failed
Initializing fuses
2,055,827 writing to cptra_bootfsm_go
2,245,113 UART:
2,245,489 UART: Running Caliptra ROM ...
2,246,540 UART:
4,176,209 UART: [state] CFI Enabled
4,192,186 UART: [state] LifecycleState = Unprovisioned
4,194,109 UART: [state] DebugLocked = No
4,196,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,201,563 UART: [kat] SHA2-256
4,371,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,381,838 UART: [kat] ++
4,382,386 UART: [kat] sha1
4,393,500 UART: [kat] SHA2-256
4,396,196 UART: [kat] SHA2-384
4,401,810 UART: [kat] SHA2-512-ACC
4,404,159 UART: [kat] ECC-384
6,689,442 UART: [kat] HMAC-384Kdf
6,701,726 UART: [kat] LMS
7,891,848 UART: [kat] --
7,894,297 UART: [cold-reset] ++
7,895,264 UART: [fht] Storing FHT @ 0x50003400
7,906,266 UART: [idev] ++
7,906,854 UART: [idev] CDI.KEYID = 6
7,907,827 UART: [idev] SUBJECT.KEYID = 7
7,909,044 UART: [idev] UDS.KEYID = 0
7,911,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,054,828 UART: [idev] Erasing UDS.KEYID = 0
11,198,398 UART: [idev] Using Sha1 for KeyId Algorithm
11,219,616 UART: [idev] --
11,223,580 UART: [ldev] ++
11,224,153 UART: [ldev] CDI.KEYID = 6
11,225,095 UART: [ldev] SUBJECT.KEYID = 5
11,226,337 UART: [ldev] AUTHORITY.KEYID = 7
11,227,571 UART: [ldev] FE.KEYID = 1
11,238,683 UART: [ldev] Erasing FE.KEYID = 1
14,527,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,820,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,835,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,850,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,864,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,883,473 UART: [ldev] --
16,888,904 UART: [fwproc] Waiting for Commands...
16,892,082 UART: [fwproc] Received command 0x46574c44
16,894,290 UART: [fwproc] Received Image of size 114124 bytes
20,941,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,016,524 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,085,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,402,605 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
4,126,880 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,054,700 >>> mbox cmd response: failed
16,055,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,055,643 >>> mbox cmd response: failed
16,055,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,056,212 >>> mbox cmd response: failed
Initializing fuses
2,062,870 writing to cptra_bootfsm_go
7,948,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,896,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,266 UART:
192,634 UART: Running Caliptra ROM ...
193,836 UART:
193,986 UART: [state] CFI Enabled
259,935 UART: [state] LifecycleState = Unprovisioned
261,857 UART: [state] DebugLocked = No
263,782 UART: [state] WD Timer not started. Device not locked for debugging
268,306 UART: [kat] SHA2-256
447,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,959 UART: [kat] ++
459,495 UART: [kat] sha1
470,164 UART: [kat] SHA2-256
473,228 UART: [kat] SHA2-384
479,742 UART: [kat] SHA2-512-ACC
482,674 UART: [kat] ECC-384
2,946,991 UART: [kat] HMAC-384Kdf
2,970,404 UART: [kat] LMS
3,499,891 UART: [kat] --
3,503,797 UART: [cold-reset] ++
3,505,953 UART: [fht] FHT @ 0x50003400
3,517,849 UART: [idev] ++
3,518,432 UART: [idev] CDI.KEYID = 6
3,519,313 UART: [idev] SUBJECT.KEYID = 7
3,520,524 UART: [idev] UDS.KEYID = 0
3,523,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,267 UART: [idev] Erasing UDS.KEYID = 0
6,023,684 UART: [idev] Sha1 KeyId Algorithm
6,045,664 UART: [idev] --
6,050,771 UART: [ldev] ++
6,051,351 UART: [ldev] CDI.KEYID = 6
6,052,237 UART: [ldev] SUBJECT.KEYID = 5
6,053,415 UART: [ldev] AUTHORITY.KEYID = 7
6,054,708 UART: [ldev] FE.KEYID = 1
6,097,192 UART: [ldev] Erasing FE.KEYID = 1
8,599,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,354 UART: [ldev] --
10,411,867 UART: [fwproc] Wait for Commands...
10,414,124 UART: [fwproc] Recv command 0x46574c44
10,416,165 UART: [fwproc] Recv'd Img size: 114448 bytes
12,706,433 UART: ROM Fatal Error: 0x000B0023
12,709,561 >>> mbox cmd response: failed
12,709,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,710,320 >>> mbox cmd response: failed
12,710,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,710,922 >>> mbox cmd response: failed
Initializing fuses
2,060,741 writing to cptra_bootfsm_go
2,250,097 UART:
2,250,461 UART: Running Caliptra ROM ...
2,251,546 UART:
2,251,708 UART: [state] CFI Enabled
2,309,449 UART: [state] LifecycleState = Unprovisioned
2,311,332 UART: [state] DebugLocked = No
2,313,536 UART: [state] WD Timer not started. Device not locked for debugging
2,317,177 UART: [kat] SHA2-256
2,496,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,873 UART: [kat] ++
2,508,410 UART: [kat] sha1
2,520,056 UART: [kat] SHA2-256
2,523,076 UART: [kat] SHA2-384
2,528,040 UART: [kat] SHA2-512-ACC
2,530,990 UART: [kat] ECC-384
4,994,750 UART: [kat] HMAC-384Kdf
5,018,121 UART: [kat] LMS
5,547,574 UART: [kat] --
5,551,317 UART: [cold-reset] ++
5,552,652 UART: [fht] FHT @ 0x50003400
5,565,089 UART: [idev] ++
5,565,667 UART: [idev] CDI.KEYID = 6
5,566,574 UART: [idev] SUBJECT.KEYID = 7
5,567,790 UART: [idev] UDS.KEYID = 0
5,570,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,045 UART: [idev] Erasing UDS.KEYID = 0
8,074,219 UART: [idev] Sha1 KeyId Algorithm
8,095,880 UART: [idev] --
8,099,182 UART: [ldev] ++
8,099,758 UART: [ldev] CDI.KEYID = 6
8,100,671 UART: [ldev] SUBJECT.KEYID = 5
8,101,777 UART: [ldev] AUTHORITY.KEYID = 7
8,103,137 UART: [ldev] FE.KEYID = 1
8,147,434 UART: [ldev] Erasing FE.KEYID = 1
10,650,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,675 UART: [ldev] --
12,460,790 UART: [fwproc] Wait for Commands...
12,463,167 UART: [fwproc] Recv command 0x46574c44
12,465,268 UART: [fwproc] Recv'd Img size: 114448 bytes
15,865,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,324,017 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,362,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,224 >>> mbox cmd response: failed
12,454,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,291 >>> mbox cmd response: failed
12,455,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,807 >>> mbox cmd response: failed
Initializing fuses
2,060,840 writing to cptra_bootfsm_go
5,409,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,092,350 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
192,787 UART:
193,156 UART: Running Caliptra ROM ...
194,274 UART:
603,812 UART: [state] CFI Enabled
614,466 UART: [state] LifecycleState = Unprovisioned
616,360 UART: [state] DebugLocked = No
619,157 UART: [state] WD Timer not started. Device not locked for debugging
623,528 UART: [kat] SHA2-256
802,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,203 UART: [kat] ++
814,732 UART: [kat] sha1
825,724 UART: [kat] SHA2-256
828,730 UART: [kat] SHA2-384
835,027 UART: [kat] SHA2-512-ACC
838,014 UART: [kat] ECC-384
3,278,655 UART: [kat] HMAC-384Kdf
3,291,148 UART: [kat] LMS
3,820,659 UART: [kat] --
3,824,010 UART: [cold-reset] ++
3,825,086 UART: [fht] FHT @ 0x50003400
3,835,800 UART: [idev] ++
3,836,387 UART: [idev] CDI.KEYID = 6
3,837,310 UART: [idev] SUBJECT.KEYID = 7
3,838,524 UART: [idev] UDS.KEYID = 0
3,841,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,138 UART: [idev] Erasing UDS.KEYID = 0
6,311,841 UART: [idev] Sha1 KeyId Algorithm
6,333,893 UART: [idev] --
6,336,537 UART: [ldev] ++
6,337,108 UART: [ldev] CDI.KEYID = 6
6,337,995 UART: [ldev] SUBJECT.KEYID = 5
6,339,124 UART: [ldev] AUTHORITY.KEYID = 7
6,340,468 UART: [ldev] FE.KEYID = 1
6,351,465 UART: [ldev] Erasing FE.KEYID = 1
8,822,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,223 UART: [ldev] --
10,615,739 UART: [fwproc] Wait for Commands...
10,618,812 UART: [fwproc] Recv command 0x46574c44
10,620,908 UART: [fwproc] Recv'd Img size: 114448 bytes
12,911,254 UART: ROM Fatal Error: 0x000B0023
12,914,376 >>> mbox cmd response: failed
12,914,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,127 >>> mbox cmd response: failed
12,915,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,676 >>> mbox cmd response: failed
Initializing fuses
2,053,871 writing to cptra_bootfsm_go
2,243,201 UART:
2,243,544 UART: Running Caliptra ROM ...
2,244,679 UART:
7,527,401 UART: [state] CFI Enabled
7,542,963 UART: [state] LifecycleState = Unprovisioned
7,544,853 UART: [state] DebugLocked = No
7,546,489 UART: [state] WD Timer not started. Device not locked for debugging
7,549,482 UART: [kat] SHA2-256
7,728,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,740,187 UART: [kat] ++
7,740,643 UART: [kat] sha1
7,751,797 UART: [kat] SHA2-256
7,754,830 UART: [kat] SHA2-384
7,759,795 UART: [kat] SHA2-512-ACC
7,762,739 UART: [kat] ECC-384
10,205,625 UART: [kat] HMAC-384Kdf
10,218,314 UART: [kat] LMS
10,747,824 UART: [kat] --
10,751,549 UART: [cold-reset] ++
10,753,801 UART: [fht] FHT @ 0x50003400
10,764,563 UART: [idev] ++
10,765,125 UART: [idev] CDI.KEYID = 6
10,766,089 UART: [idev] SUBJECT.KEYID = 7
10,767,251 UART: [idev] UDS.KEYID = 0
10,769,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,913,420 UART: [idev] Erasing UDS.KEYID = 0
13,236,227 UART: [idev] Sha1 KeyId Algorithm
13,259,360 UART: [idev] --
13,263,194 UART: [ldev] ++
13,263,770 UART: [ldev] CDI.KEYID = 6
13,264,676 UART: [ldev] SUBJECT.KEYID = 5
13,265,835 UART: [ldev] AUTHORITY.KEYID = 7
13,267,143 UART: [ldev] FE.KEYID = 1
13,276,223 UART: [ldev] Erasing FE.KEYID = 1
15,746,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,465,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,481,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,497,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,513,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,533,589 UART: [ldev] --
17,538,355 UART: [fwproc] Wait for Commands...
17,539,976 UART: [fwproc] Recv command 0x46574c44
17,542,082 UART: [fwproc] Recv'd Img size: 114448 bytes
20,945,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,015,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,084,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,402,981 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,697,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,693,403 >>> mbox cmd response: failed
12,693,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,265 >>> mbox cmd response: failed
12,694,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,854 >>> mbox cmd response: failed
Initializing fuses
2,059,512 writing to cptra_bootfsm_go
10,870,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,435,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,240 UART:
192,597 UART: Running Caliptra ROM ...
193,795 UART:
193,949 UART: [state] CFI Enabled
262,535 UART: [state] LifecycleState = Unprovisioned
264,942 UART: [state] DebugLocked = No
267,242 UART: [state] WD Timer not started. Device not locked for debugging
271,013 UART: [kat] SHA2-256
460,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,499 UART: [kat] ++
471,979 UART: [kat] sha1
482,861 UART: [kat] SHA2-256
485,873 UART: [kat] SHA2-384
493,257 UART: [kat] SHA2-512-ACC
495,821 UART: [kat] ECC-384
2,946,516 UART: [kat] HMAC-384Kdf
2,969,060 UART: [kat] LMS
3,500,812 UART: [kat] --
3,505,855 UART: [cold-reset] ++
3,507,308 UART: [fht] FHT @ 0x50003400
3,519,703 UART: [idev] ++
3,520,377 UART: [idev] CDI.KEYID = 6
3,521,348 UART: [idev] SUBJECT.KEYID = 7
3,522,563 UART: [idev] UDS.KEYID = 0
3,525,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,412 UART: [idev] Erasing UDS.KEYID = 0
6,028,159 UART: [idev] Sha1 KeyId Algorithm
6,051,081 UART: [idev] --
6,056,011 UART: [ldev] ++
6,056,738 UART: [ldev] CDI.KEYID = 6
6,057,662 UART: [ldev] SUBJECT.KEYID = 5
6,058,772 UART: [ldev] AUTHORITY.KEYID = 7
6,060,031 UART: [ldev] FE.KEYID = 1
6,098,392 UART: [ldev] Erasing FE.KEYID = 1
8,604,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,480 UART: [ldev] --
10,414,185 UART: [fwproc] Wait for Commands...
10,416,505 UART: [fwproc] Recv command 0x46574c44
10,418,820 UART: [fwproc] Recv'd Img size: 114448 bytes
12,743,162 UART: ROM Fatal Error: 0x000B0023
12,746,822 >>> mbox cmd response: failed
12,747,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,600 >>> mbox cmd response: failed
12,747,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,188 >>> mbox cmd response: failed
Initializing fuses
2,061,773 writing to cptra_bootfsm_go
2,251,117 UART:
2,251,467 UART: Running Caliptra ROM ...
2,252,557 UART:
2,252,712 UART: [state] CFI Enabled
2,316,557 UART: [state] LifecycleState = Unprovisioned
2,318,930 UART: [state] DebugLocked = No
2,320,977 UART: [state] WD Timer not started. Device not locked for debugging
2,325,048 UART: [kat] SHA2-256
2,514,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,742 UART: [kat] ++
2,526,281 UART: [kat] sha1
2,538,601 UART: [kat] SHA2-256
2,541,625 UART: [kat] SHA2-384
2,547,075 UART: [kat] SHA2-512-ACC
2,549,646 UART: [kat] ECC-384
5,004,691 UART: [kat] HMAC-384Kdf
5,025,954 UART: [kat] LMS
5,557,749 UART: [kat] --
5,562,180 UART: [cold-reset] ++
5,563,735 UART: [fht] FHT @ 0x50003400
5,576,287 UART: [idev] ++
5,576,969 UART: [idev] CDI.KEYID = 6
5,577,908 UART: [idev] SUBJECT.KEYID = 7
5,579,121 UART: [idev] UDS.KEYID = 0
5,581,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,725,354 UART: [idev] Erasing UDS.KEYID = 0
8,084,892 UART: [idev] Sha1 KeyId Algorithm
8,108,480 UART: [idev] --
8,113,697 UART: [ldev] ++
8,114,398 UART: [ldev] CDI.KEYID = 6
8,115,316 UART: [ldev] SUBJECT.KEYID = 5
8,116,482 UART: [ldev] AUTHORITY.KEYID = 7
8,117,657 UART: [ldev] FE.KEYID = 1
8,154,874 UART: [ldev] Erasing FE.KEYID = 1
10,657,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,885 UART: [ldev] --
12,470,204 UART: [fwproc] Wait for Commands...
12,472,150 UART: [fwproc] Recv command 0x46574c44
12,474,414 UART: [fwproc] Recv'd Img size: 114448 bytes
15,923,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,654,575 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,441,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,653,676 >>> mbox cmd response: failed
12,654,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,654 >>> mbox cmd response: failed
12,654,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,209 >>> mbox cmd response: failed
Initializing fuses
2,061,518 writing to cptra_bootfsm_go
5,456,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,758,696 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,486 UART:
192,860 UART: Running Caliptra ROM ...
194,060 UART:
603,566 UART: [state] CFI Enabled
616,351 UART: [state] LifecycleState = Unprovisioned
618,730 UART: [state] DebugLocked = No
620,220 UART: [state] WD Timer not started. Device not locked for debugging
625,468 UART: [kat] SHA2-256
814,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,761 UART: [kat] ++
826,294 UART: [kat] sha1
838,205 UART: [kat] SHA2-256
841,216 UART: [kat] SHA2-384
846,712 UART: [kat] SHA2-512-ACC
849,318 UART: [kat] ECC-384
3,292,936 UART: [kat] HMAC-384Kdf
3,306,923 UART: [kat] LMS
3,838,740 UART: [kat] --
3,844,896 UART: [cold-reset] ++
3,846,723 UART: [fht] FHT @ 0x50003400
3,859,487 UART: [idev] ++
3,860,230 UART: [idev] CDI.KEYID = 6
3,861,121 UART: [idev] SUBJECT.KEYID = 7
3,862,235 UART: [idev] UDS.KEYID = 0
3,865,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,150 UART: [idev] Erasing UDS.KEYID = 0
6,341,551 UART: [idev] Sha1 KeyId Algorithm
6,362,578 UART: [idev] --
6,367,110 UART: [ldev] ++
6,367,789 UART: [ldev] CDI.KEYID = 6
6,368,726 UART: [ldev] SUBJECT.KEYID = 5
6,369,882 UART: [ldev] AUTHORITY.KEYID = 7
6,371,114 UART: [ldev] FE.KEYID = 1
6,382,509 UART: [ldev] Erasing FE.KEYID = 1
8,854,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,256 UART: [ldev] --
10,643,155 UART: [fwproc] Wait for Commands...
10,645,527 UART: [fwproc] Recv command 0x46574c44
10,647,786 UART: [fwproc] Recv'd Img size: 114448 bytes
12,972,688 UART: ROM Fatal Error: 0x000B0023
12,976,347 >>> mbox cmd response: failed
12,976,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,977,090 >>> mbox cmd response: failed
12,977,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,977,651 >>> mbox cmd response: failed
Initializing fuses
2,059,691 writing to cptra_bootfsm_go
2,249,011 UART:
2,249,379 UART: Running Caliptra ROM ...
2,250,434 UART:
7,469,140 UART: [state] CFI Enabled
7,484,594 UART: [state] LifecycleState = Unprovisioned
7,486,940 UART: [state] DebugLocked = No
7,489,233 UART: [state] WD Timer not started. Device not locked for debugging
7,493,169 UART: [kat] SHA2-256
7,683,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,693,840 UART: [kat] ++
7,694,436 UART: [kat] sha1
7,705,386 UART: [kat] SHA2-256
7,708,381 UART: [kat] SHA2-384
7,714,267 UART: [kat] SHA2-512-ACC
7,716,833 UART: [kat] ECC-384
10,157,328 UART: [kat] HMAC-384Kdf
10,169,386 UART: [kat] LMS
10,701,203 UART: [kat] --
10,706,295 UART: [cold-reset] ++
10,707,693 UART: [fht] FHT @ 0x50003400
10,719,051 UART: [idev] ++
10,719,726 UART: [idev] CDI.KEYID = 6
10,720,693 UART: [idev] SUBJECT.KEYID = 7
10,721,906 UART: [idev] UDS.KEYID = 0
10,724,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,868,037 UART: [idev] Erasing UDS.KEYID = 0
13,196,860 UART: [idev] Sha1 KeyId Algorithm
13,219,746 UART: [idev] --
13,224,784 UART: [ldev] ++
13,225,523 UART: [ldev] CDI.KEYID = 6
13,226,429 UART: [ldev] SUBJECT.KEYID = 5
13,227,585 UART: [ldev] AUTHORITY.KEYID = 7
13,228,811 UART: [ldev] FE.KEYID = 1
13,241,505 UART: [ldev] Erasing FE.KEYID = 1
15,719,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,440,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,455,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,471,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,486,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,507,520 UART: [ldev] --
17,513,013 UART: [fwproc] Wait for Commands...
17,516,191 UART: [fwproc] Recv command 0x46574c44
17,518,513 UART: [fwproc] Recv'd Img size: 114448 bytes
20,966,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,041,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,157,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,700,495 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,758,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,865,064 >>> mbox cmd response: failed
12,865,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,865,914 >>> mbox cmd response: failed
12,866,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,866,495 >>> mbox cmd response: failed
Initializing fuses
2,059,073 writing to cptra_bootfsm_go
10,752,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,963,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,381 UART: [kat] SHA2-256
882,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,427 UART: [kat] ++
886,579 UART: [kat] sha1
890,889 UART: [kat] SHA2-256
892,827 UART: [kat] SHA2-384
895,664 UART: [kat] SHA2-512-ACC
897,565 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,536 UART: [kat] LMS
1,475,732 UART: [kat] --
1,476,843 UART: [cold-reset] ++
1,477,355 UART: [fht] Storing FHT @ 0x50003400
1,480,306 UART: [idev] ++
1,480,474 UART: [idev] CDI.KEYID = 6
1,480,834 UART: [idev] SUBJECT.KEYID = 7
1,481,258 UART: [idev] UDS.KEYID = 0
1,481,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,048 UART: [idev] Erasing UDS.KEYID = 0
1,505,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,456 UART: [idev] --
1,515,691 UART: [ldev] ++
1,515,859 UART: [ldev] CDI.KEYID = 6
1,516,222 UART: [ldev] SUBJECT.KEYID = 5
1,516,648 UART: [ldev] AUTHORITY.KEYID = 7
1,517,111 UART: [ldev] FE.KEYID = 1
1,522,167 UART: [ldev] Erasing FE.KEYID = 1
1,547,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,522 UART: [ldev] --
1,586,947 UART: [fwproc] Waiting for Commands...
1,587,692 UART: [fwproc] Received command 0x46574c44
1,588,483 UART: [fwproc] Received Image of size 114448 bytes
1,855,282 UART: ROM Fatal Error: 0x000B0023
1,856,439 >>> mbox cmd response: failed
1,856,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,445 >>> mbox cmd response: failed
1,856,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,302 UART: [kat] LMS
1,475,498 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,746 UART: [idev] Erasing UDS.KEYID = 0
1,505,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,994 UART: [idev] --
1,514,839 UART: [ldev] ++
1,515,007 UART: [ldev] CDI.KEYID = 6
1,515,370 UART: [ldev] SUBJECT.KEYID = 5
1,515,796 UART: [ldev] AUTHORITY.KEYID = 7
1,516,259 UART: [ldev] FE.KEYID = 1
1,521,317 UART: [ldev] Erasing FE.KEYID = 1
1,546,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,902 UART: [ldev] --
1,586,339 UART: [fwproc] Waiting for Commands...
1,586,968 UART: [fwproc] Received command 0x46574c44
1,587,759 UART: [fwproc] Received Image of size 114448 bytes
2,886,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,183 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,492 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,732 >>> mbox cmd response: failed
1,707,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,738 >>> mbox cmd response: failed
1,707,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,127 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,244 UART: [fht] Storing FHT @ 0x50003400
1,479,943 UART: [idev] ++
1,480,111 UART: [idev] CDI.KEYID = 6
1,480,471 UART: [idev] SUBJECT.KEYID = 7
1,480,895 UART: [idev] UDS.KEYID = 0
1,481,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,505,385 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,861 UART: [idev] --
1,515,014 UART: [ldev] ++
1,515,182 UART: [ldev] CDI.KEYID = 6
1,515,545 UART: [ldev] SUBJECT.KEYID = 5
1,515,971 UART: [ldev] AUTHORITY.KEYID = 7
1,516,434 UART: [ldev] FE.KEYID = 1
1,521,636 UART: [ldev] Erasing FE.KEYID = 1
1,547,075 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,083 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,353 UART: [fwproc] Received command 0x46574c44
1,588,144 UART: [fwproc] Received Image of size 114448 bytes
1,854,251 UART: ROM Fatal Error: 0x000B0023
1,855,408 >>> mbox cmd response: failed
1,855,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,414 >>> mbox cmd response: failed
1,855,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,974 UART: [kat] SHA2-256
881,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,020 UART: [kat] ++
886,172 UART: [kat] sha1
890,350 UART: [kat] SHA2-256
892,288 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,458 UART: [cold-reset] ++
1,476,912 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,735 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,017 UART: [ldev] --
1,587,350 UART: [fwproc] Waiting for Commands...
1,588,115 UART: [fwproc] Received command 0x46574c44
1,588,906 UART: [fwproc] Received Image of size 114448 bytes
2,887,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,001 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,351 >>> mbox cmd response: failed
1,707,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,357 >>> mbox cmd response: failed
1,707,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,697 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,590 UART: [kat] LMS
1,170,918 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,111 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,131 UART: [idev] Sha1 KeyId Algorithm
1,208,421 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,008 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,711 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,844 UART: [fwproc] Recv command 0x46574c44
1,282,572 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,705 UART: ROM Fatal Error: 0x000B0023
1,550,862 >>> mbox cmd response: failed
1,550,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,868 >>> mbox cmd response: failed
1,550,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,702 UART: [kat] SHA2-512-ACC
908,603 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,746 UART: [kat] LMS
1,171,074 UART: [kat] --
1,171,849 UART: [cold-reset] ++
1,172,289 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,501 UART: [idev] Sha1 KeyId Algorithm
1,209,051 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,646 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,412 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,503 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,405,035 >>> mbox cmd response: failed
1,405,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,041 >>> mbox cmd response: failed
1,405,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,326 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,573 UART: [kat] HMAC-384Kdf
923,167 UART: [kat] LMS
1,171,495 UART: [kat] --
1,172,494 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,387 UART: [idev] ++
1,175,555 UART: [idev] CDI.KEYID = 6
1,175,915 UART: [idev] SUBJECT.KEYID = 7
1,176,339 UART: [idev] UDS.KEYID = 0
1,176,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,601 UART: [idev] Erasing UDS.KEYID = 0
1,201,738 UART: [idev] Sha1 KeyId Algorithm
1,210,294 UART: [idev] --
1,211,488 UART: [ldev] ++
1,211,656 UART: [ldev] CDI.KEYID = 6
1,212,019 UART: [ldev] SUBJECT.KEYID = 5
1,212,445 UART: [ldev] AUTHORITY.KEYID = 7
1,212,908 UART: [ldev] FE.KEYID = 1
1,218,364 UART: [ldev] Erasing FE.KEYID = 1
1,244,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,574 UART: [ldev] --
1,284,089 UART: [fwproc] Wait for Commands...
1,284,747 UART: [fwproc] Recv command 0x46574c44
1,285,475 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,870 UART: ROM Fatal Error: 0x000B0023
1,553,027 >>> mbox cmd response: failed
1,553,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,033 >>> mbox cmd response: failed
1,553,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,629 UART: [kat] SHA2-512-ACC
908,530 UART: [kat] ECC-384
918,125 UART: [kat] HMAC-384Kdf
922,597 UART: [kat] LMS
1,170,925 UART: [kat] --
1,171,738 UART: [cold-reset] ++
1,172,238 UART: [fht] FHT @ 0x50003400
1,174,925 UART: [idev] ++
1,175,093 UART: [idev] CDI.KEYID = 6
1,175,453 UART: [idev] SUBJECT.KEYID = 7
1,175,877 UART: [idev] UDS.KEYID = 0
1,176,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,899 UART: [idev] Erasing UDS.KEYID = 0
1,200,482 UART: [idev] Sha1 KeyId Algorithm
1,209,102 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,216,978 UART: [ldev] Erasing FE.KEYID = 1
1,243,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,452 UART: [ldev] --
1,282,815 UART: [fwproc] Wait for Commands...
1,283,583 UART: [fwproc] Recv command 0x46574c44
1,284,311 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,778 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,407,634 >>> mbox cmd response: failed
1,407,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,640 >>> mbox cmd response: failed
1,407,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,581 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
915,456 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,453 UART: [idev] ++
1,172,621 UART: [idev] CDI.KEYID = 6
1,172,982 UART: [idev] SUBJECT.KEYID = 7
1,173,407 UART: [idev] UDS.KEYID = 0
1,173,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,208,226 UART: [ldev] ++
1,208,394 UART: [ldev] CDI.KEYID = 6
1,208,758 UART: [ldev] SUBJECT.KEYID = 5
1,209,185 UART: [ldev] AUTHORITY.KEYID = 7
1,209,648 UART: [ldev] FE.KEYID = 1
1,214,668 UART: [ldev] Erasing FE.KEYID = 1
1,240,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,279,978 UART: [fwproc] Wait for Commands...
1,280,657 UART: [fwproc] Recv command 0x46574c44
1,281,390 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,406 UART: ROM Fatal Error: 0x000B0023
1,548,563 >>> mbox cmd response: failed
1,548,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,569 >>> mbox cmd response: failed
1,548,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,099 UART: [kat] SHA2-256
901,039 UART: [kat] SHA2-384
903,610 UART: [kat] SHA2-512-ACC
905,511 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,173,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,436 UART: [ldev] ++
1,208,604 UART: [ldev] CDI.KEYID = 6
1,208,968 UART: [ldev] SUBJECT.KEYID = 5
1,209,395 UART: [ldev] AUTHORITY.KEYID = 7
1,209,858 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,348 UART: [ldev] --
1,279,858 UART: [fwproc] Wait for Commands...
1,280,657 UART: [fwproc] Recv command 0x46574c44
1,281,390 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,287 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,302 >>> mbox cmd response: failed
1,400,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,308 >>> mbox cmd response: failed
1,400,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,487 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,578 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,173,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,162 UART: [idev] Sha1 KeyId Algorithm
1,208,064 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,677 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x46574c44
1,283,025 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,523 UART: ROM Fatal Error: 0x000B0023
1,549,680 >>> mbox cmd response: failed
1,549,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,686 >>> mbox cmd response: failed
1,549,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
916,943 UART: [kat] HMAC-384Kdf
921,601 UART: [kat] LMS
1,169,913 UART: [kat] --
1,171,122 UART: [cold-reset] ++
1,171,594 UART: [fht] FHT @ 0x50003400
1,174,240 UART: [idev] ++
1,174,408 UART: [idev] CDI.KEYID = 6
1,174,769 UART: [idev] SUBJECT.KEYID = 7
1,175,194 UART: [idev] UDS.KEYID = 0
1,175,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,463 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,467 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,810 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,621 >>> mbox cmd response: failed
1,402,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,627 >>> mbox cmd response: failed
1,402,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,716 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,048 UART:
192,413 UART: Running Caliptra ROM ...
193,600 UART:
193,751 UART: [state] CFI Enabled
265,004 UART: [state] LifecycleState = Unprovisioned
267,050 UART: [state] DebugLocked = No
268,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,590 UART: [kat] SHA2-256
443,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,809 UART: [kat] ++
454,260 UART: [kat] sha1
465,894 UART: [kat] SHA2-256
468,570 UART: [kat] SHA2-384
474,329 UART: [kat] SHA2-512-ACC
476,719 UART: [kat] ECC-384
2,765,137 UART: [kat] HMAC-384Kdf
2,778,450 UART: [kat] LMS
3,968,741 UART: [kat] --
3,973,287 UART: [cold-reset] ++
3,975,600 UART: [fht] Storing FHT @ 0x50003400
3,987,619 UART: [idev] ++
3,988,243 UART: [idev] CDI.KEYID = 6
3,989,126 UART: [idev] SUBJECT.KEYID = 7
3,990,393 UART: [idev] UDS.KEYID = 0
3,992,988 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,824 UART: [idev] Erasing UDS.KEYID = 0
7,326,958 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,245 UART: [idev] --
7,352,233 UART: [ldev] ++
7,352,806 UART: [ldev] CDI.KEYID = 6
7,353,773 UART: [ldev] SUBJECT.KEYID = 5
7,354,987 UART: [ldev] AUTHORITY.KEYID = 7
7,356,239 UART: [ldev] FE.KEYID = 1
7,402,213 UART: [ldev] Erasing FE.KEYID = 1
10,738,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,170 UART: [ldev] --
13,116,164 UART: [fwproc] Waiting for Commands...
13,118,909 UART: [fwproc] Received command 0x46574c44
13,121,093 UART: [fwproc] Received Image of size 114124 bytes
16,066,647 UART: ROM Fatal Error: 0x000B0024
16,070,059 >>> mbox cmd response: failed
16,070,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,070,828 >>> mbox cmd response: failed
16,071,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,071,423 >>> mbox cmd response: failed
Initializing fuses
2,055,236 writing to cptra_bootfsm_go
2,244,561 UART:
2,244,914 UART: Running Caliptra ROM ...
2,246,050 UART:
2,246,223 UART: [state] CFI Enabled
2,307,968 UART: [state] LifecycleState = Unprovisioned
2,309,908 UART: [state] DebugLocked = No
2,311,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,426 UART: [kat] SHA2-256
2,486,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,648 UART: [kat] ++
2,497,197 UART: [kat] sha1
2,507,896 UART: [kat] SHA2-256
2,510,548 UART: [kat] SHA2-384
2,516,705 UART: [kat] SHA2-512-ACC
2,519,040 UART: [kat] ECC-384
4,808,490 UART: [kat] HMAC-384Kdf
4,839,823 UART: [kat] LMS
6,030,141 UART: [kat] --
6,034,770 UART: [cold-reset] ++
6,036,835 UART: [fht] Storing FHT @ 0x50003400
6,048,326 UART: [idev] ++
6,048,907 UART: [idev] CDI.KEYID = 6
6,050,041 UART: [idev] SUBJECT.KEYID = 7
6,051,155 UART: [idev] UDS.KEYID = 0
6,053,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,197,041 UART: [idev] Erasing UDS.KEYID = 0
9,385,428 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,098 UART: [idev] --
9,410,369 UART: [ldev] ++
9,410,949 UART: [ldev] CDI.KEYID = 6
9,411,860 UART: [ldev] SUBJECT.KEYID = 5
9,413,158 UART: [ldev] AUTHORITY.KEYID = 7
9,414,264 UART: [ldev] FE.KEYID = 1
9,457,942 UART: [ldev] Erasing FE.KEYID = 1
12,789,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,083,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,098,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,127,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,145,589 UART: [ldev] --
15,150,525 UART: [fwproc] Waiting for Commands...
15,153,276 UART: [fwproc] Received command 0x46574c44
15,155,501 UART: [fwproc] Received Image of size 114124 bytes
19,213,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,292,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,361,844 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,679,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,785,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,832,700 >>> mbox cmd response: failed
15,833,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,597 >>> mbox cmd response: failed
15,833,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,834,107 >>> mbox cmd response: failed
Initializing fuses
2,056,117 writing to cptra_bootfsm_go
5,829,192 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,911,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,588 UART:
192,932 UART: Running Caliptra ROM ...
194,127 UART:
603,922 UART: [state] CFI Enabled
617,846 UART: [state] LifecycleState = Unprovisioned
619,783 UART: [state] DebugLocked = No
622,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,042 UART: [kat] SHA2-256
796,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,307 UART: [kat] ++
807,750 UART: [kat] sha1
819,549 UART: [kat] SHA2-256
822,231 UART: [kat] SHA2-384
827,458 UART: [kat] SHA2-512-ACC
829,815 UART: [kat] ECC-384
3,114,939 UART: [kat] HMAC-384Kdf
3,126,641 UART: [kat] LMS
4,316,749 UART: [kat] --
4,321,103 UART: [cold-reset] ++
4,322,608 UART: [fht] Storing FHT @ 0x50003400
4,335,335 UART: [idev] ++
4,335,959 UART: [idev] CDI.KEYID = 6
4,336,870 UART: [idev] SUBJECT.KEYID = 7
4,338,139 UART: [idev] UDS.KEYID = 0
4,340,726 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,244 UART: [idev] Erasing UDS.KEYID = 0
7,629,324 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,005 UART: [idev] --
7,654,982 UART: [ldev] ++
7,655,552 UART: [ldev] CDI.KEYID = 6
7,656,587 UART: [ldev] SUBJECT.KEYID = 5
7,657,692 UART: [ldev] AUTHORITY.KEYID = 7
7,658,975 UART: [ldev] FE.KEYID = 1
7,669,075 UART: [ldev] Erasing FE.KEYID = 1
10,957,959 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,696 UART: [ldev] --
13,318,472 UART: [fwproc] Waiting for Commands...
13,320,239 UART: [fwproc] Received command 0x46574c44
13,322,427 UART: [fwproc] Received Image of size 114124 bytes
16,265,439 UART: ROM Fatal Error: 0x000B0024
16,268,853 >>> mbox cmd response: failed
16,269,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,529 >>> mbox cmd response: failed
16,269,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,140 >>> mbox cmd response: failed
Initializing fuses
2,055,619 writing to cptra_bootfsm_go
2,244,906 UART:
2,245,281 UART: Running Caliptra ROM ...
2,246,338 UART:
4,189,454 UART: [state] CFI Enabled
4,206,512 UART: [state] LifecycleState = Unprovisioned
4,208,461 UART: [state] DebugLocked = No
4,210,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,214,986 UART: [kat] SHA2-256
4,384,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,395,330 UART: [kat] ++
4,395,871 UART: [kat] sha1
4,405,635 UART: [kat] SHA2-256
4,408,382 UART: [kat] SHA2-384
4,415,342 UART: [kat] SHA2-512-ACC
4,417,757 UART: [kat] ECC-384
6,702,614 UART: [kat] HMAC-384Kdf
6,714,959 UART: [kat] LMS
7,905,029 UART: [kat] --
7,909,139 UART: [cold-reset] ++
7,911,019 UART: [fht] Storing FHT @ 0x50003400
7,922,442 UART: [idev] ++
7,923,073 UART: [idev] CDI.KEYID = 6
7,923,991 UART: [idev] SUBJECT.KEYID = 7
7,925,204 UART: [idev] UDS.KEYID = 0
7,927,640 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,071,497 UART: [idev] Erasing UDS.KEYID = 0
11,209,695 UART: [idev] Using Sha1 for KeyId Algorithm
11,231,883 UART: [idev] --
11,234,958 UART: [ldev] ++
11,235,580 UART: [ldev] CDI.KEYID = 6
11,236,683 UART: [ldev] SUBJECT.KEYID = 5
11,237,916 UART: [ldev] AUTHORITY.KEYID = 7
11,239,105 UART: [ldev] FE.KEYID = 1
11,250,753 UART: [ldev] Erasing FE.KEYID = 1
14,539,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,831,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,846,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,861,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,875,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,895,237 UART: [ldev] --
16,899,476 UART: [fwproc] Waiting for Commands...
16,901,753 UART: [fwproc] Received command 0x46574c44
16,903,945 UART: [fwproc] Received Image of size 114124 bytes
20,959,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,040,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,109,719 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,427,664 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,133,356 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,051,065 >>> mbox cmd response: failed
16,051,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,314 >>> mbox cmd response: failed
16,052,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,847 >>> mbox cmd response: failed
Initializing fuses
2,058,277 writing to cptra_bootfsm_go
7,939,862 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,886,470 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,369 UART:
192,718 UART: Running Caliptra ROM ...
193,916 UART:
194,070 UART: [state] CFI Enabled
260,571 UART: [state] LifecycleState = Unprovisioned
262,466 UART: [state] DebugLocked = No
263,909 UART: [state] WD Timer not started. Device not locked for debugging
267,270 UART: [kat] SHA2-256
446,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,959 UART: [kat] ++
458,498 UART: [kat] sha1
470,572 UART: [kat] SHA2-256
473,639 UART: [kat] SHA2-384
480,373 UART: [kat] SHA2-512-ACC
483,306 UART: [kat] ECC-384
2,946,945 UART: [kat] HMAC-384Kdf
2,968,966 UART: [kat] LMS
3,498,413 UART: [kat] --
3,504,630 UART: [cold-reset] ++
3,506,021 UART: [fht] FHT @ 0x50003400
3,517,494 UART: [idev] ++
3,518,060 UART: [idev] CDI.KEYID = 6
3,518,991 UART: [idev] SUBJECT.KEYID = 7
3,520,169 UART: [idev] UDS.KEYID = 0
3,523,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,322 UART: [idev] Erasing UDS.KEYID = 0
6,022,747 UART: [idev] Sha1 KeyId Algorithm
6,045,169 UART: [idev] --
6,050,626 UART: [ldev] ++
6,051,475 UART: [ldev] CDI.KEYID = 6
6,052,377 UART: [ldev] SUBJECT.KEYID = 5
6,053,494 UART: [ldev] AUTHORITY.KEYID = 7
6,054,676 UART: [ldev] FE.KEYID = 1
6,097,733 UART: [ldev] Erasing FE.KEYID = 1
8,601,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,773 UART: [ldev] --
10,413,829 UART: [fwproc] Wait for Commands...
10,415,604 UART: [fwproc] Recv command 0x46574c44
10,417,702 UART: [fwproc] Recv'd Img size: 114448 bytes
12,707,864 UART: ROM Fatal Error: 0x000B0024
12,710,982 >>> mbox cmd response: failed
12,711,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,711,728 >>> mbox cmd response: failed
12,712,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,712,332 >>> mbox cmd response: failed
Initializing fuses
2,053,708 writing to cptra_bootfsm_go
2,243,042 UART:
2,243,400 UART: Running Caliptra ROM ...
2,244,569 UART:
2,244,740 UART: [state] CFI Enabled
2,307,365 UART: [state] LifecycleState = Unprovisioned
2,309,247 UART: [state] DebugLocked = No
2,311,556 UART: [state] WD Timer not started. Device not locked for debugging
2,314,543 UART: [kat] SHA2-256
2,493,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,280 UART: [kat] ++
2,505,823 UART: [kat] sha1
2,517,746 UART: [kat] SHA2-256
2,520,773 UART: [kat] SHA2-384
2,526,548 UART: [kat] SHA2-512-ACC
2,529,550 UART: [kat] ECC-384
4,974,787 UART: [kat] HMAC-384Kdf
4,997,756 UART: [kat] LMS
5,527,227 UART: [kat] --
5,531,559 UART: [cold-reset] ++
5,532,628 UART: [fht] FHT @ 0x50003400
5,544,555 UART: [idev] ++
5,545,123 UART: [idev] CDI.KEYID = 6
5,546,005 UART: [idev] SUBJECT.KEYID = 7
5,547,226 UART: [idev] UDS.KEYID = 0
5,549,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,693,587 UART: [idev] Erasing UDS.KEYID = 0
8,048,580 UART: [idev] Sha1 KeyId Algorithm
8,070,718 UART: [idev] --
8,075,561 UART: [ldev] ++
8,076,151 UART: [ldev] CDI.KEYID = 6
8,077,068 UART: [ldev] SUBJECT.KEYID = 5
8,078,233 UART: [ldev] AUTHORITY.KEYID = 7
8,079,473 UART: [ldev] FE.KEYID = 1
8,125,043 UART: [ldev] Erasing FE.KEYID = 1
10,629,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,366,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,382,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,398,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,434,683 UART: [ldev] --
12,438,863 UART: [fwproc] Wait for Commands...
12,440,795 UART: [fwproc] Recv command 0x46574c44
12,442,888 UART: [fwproc] Recv'd Img size: 114448 bytes
15,851,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,922,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,308,890 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,362,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,488,575 >>> mbox cmd response: failed
12,489,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,489,690 >>> mbox cmd response: failed
12,489,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,490,310 >>> mbox cmd response: failed
Initializing fuses
2,054,548 writing to cptra_bootfsm_go
5,398,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,059,978 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,526 UART:
192,889 UART: Running Caliptra ROM ...
194,089 UART:
603,453 UART: [state] CFI Enabled
619,011 UART: [state] LifecycleState = Unprovisioned
620,839 UART: [state] DebugLocked = No
623,731 UART: [state] WD Timer not started. Device not locked for debugging
626,807 UART: [kat] SHA2-256
805,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,496 UART: [kat] ++
817,946 UART: [kat] sha1
828,300 UART: [kat] SHA2-256
831,359 UART: [kat] SHA2-384
839,014 UART: [kat] SHA2-512-ACC
841,940 UART: [kat] ECC-384
3,282,435 UART: [kat] HMAC-384Kdf
3,293,976 UART: [kat] LMS
3,823,476 UART: [kat] --
3,827,860 UART: [cold-reset] ++
3,829,308 UART: [fht] FHT @ 0x50003400
3,841,581 UART: [idev] ++
3,842,155 UART: [idev] CDI.KEYID = 6
3,843,069 UART: [idev] SUBJECT.KEYID = 7
3,844,234 UART: [idev] UDS.KEYID = 0
3,846,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,244 UART: [idev] Erasing UDS.KEYID = 0
6,314,556 UART: [idev] Sha1 KeyId Algorithm
6,338,190 UART: [idev] --
6,341,543 UART: [ldev] ++
6,342,112 UART: [ldev] CDI.KEYID = 6
6,342,995 UART: [ldev] SUBJECT.KEYID = 5
6,344,208 UART: [ldev] AUTHORITY.KEYID = 7
6,345,501 UART: [ldev] FE.KEYID = 1
6,356,231 UART: [ldev] Erasing FE.KEYID = 1
8,829,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,188 UART: [ldev] --
10,619,600 UART: [fwproc] Wait for Commands...
10,622,076 UART: [fwproc] Recv command 0x46574c44
10,624,179 UART: [fwproc] Recv'd Img size: 114448 bytes
12,917,604 UART: ROM Fatal Error: 0x000B0024
12,920,698 >>> mbox cmd response: failed
12,921,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,344 >>> mbox cmd response: failed
12,921,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,122 >>> mbox cmd response: failed
Initializing fuses
2,060,216 writing to cptra_bootfsm_go
2,249,523 UART:
2,249,873 UART: Running Caliptra ROM ...
2,250,968 UART:
7,528,604 UART: [state] CFI Enabled
7,541,079 UART: [state] LifecycleState = Unprovisioned
7,542,940 UART: [state] DebugLocked = No
7,545,751 UART: [state] WD Timer not started. Device not locked for debugging
7,549,946 UART: [kat] SHA2-256
7,729,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,740,600 UART: [kat] ++
7,741,150 UART: [kat] sha1
7,751,081 UART: [kat] SHA2-256
7,754,098 UART: [kat] SHA2-384
7,759,404 UART: [kat] SHA2-512-ACC
7,762,331 UART: [kat] ECC-384
10,204,706 UART: [kat] HMAC-384Kdf
10,217,521 UART: [kat] LMS
10,746,979 UART: [kat] --
10,753,301 UART: [cold-reset] ++
10,755,284 UART: [fht] FHT @ 0x50003400
10,765,021 UART: [idev] ++
10,765,588 UART: [idev] CDI.KEYID = 6
10,766,544 UART: [idev] SUBJECT.KEYID = 7
10,767,706 UART: [idev] UDS.KEYID = 0
10,770,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,913,885 UART: [idev] Erasing UDS.KEYID = 0
13,238,061 UART: [idev] Sha1 KeyId Algorithm
13,262,065 UART: [idev] --
13,265,576 UART: [ldev] ++
13,266,151 UART: [ldev] CDI.KEYID = 6
13,267,030 UART: [ldev] SUBJECT.KEYID = 5
13,268,162 UART: [ldev] AUTHORITY.KEYID = 7
13,269,493 UART: [ldev] FE.KEYID = 1
13,280,232 UART: [ldev] Erasing FE.KEYID = 1
15,755,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,470,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,486,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,502,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,518,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,538,970 UART: [ldev] --
17,543,644 UART: [fwproc] Wait for Commands...
17,546,712 UART: [fwproc] Recv command 0x46574c44
17,548,811 UART: [fwproc] Recv'd Img size: 114448 bytes
20,955,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,031,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,100,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,419,072 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,699,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,706,076 >>> mbox cmd response: failed
12,706,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,706,991 >>> mbox cmd response: failed
12,707,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,552 >>> mbox cmd response: failed
Initializing fuses
2,057,665 writing to cptra_bootfsm_go
10,848,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,438,717 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,100 UART:
192,467 UART: Running Caliptra ROM ...
193,661 UART:
193,817 UART: [state] CFI Enabled
264,637 UART: [state] LifecycleState = Unprovisioned
267,050 UART: [state] DebugLocked = No
268,438 UART: [state] WD Timer not started. Device not locked for debugging
273,289 UART: [kat] SHA2-256
463,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,908 UART: [kat] ++
474,382 UART: [kat] sha1
486,186 UART: [kat] SHA2-256
489,198 UART: [kat] SHA2-384
496,257 UART: [kat] SHA2-512-ACC
498,865 UART: [kat] ECC-384
2,946,072 UART: [kat] HMAC-384Kdf
2,969,108 UART: [kat] LMS
3,500,849 UART: [kat] --
3,505,606 UART: [cold-reset] ++
3,506,707 UART: [fht] FHT @ 0x50003400
3,518,145 UART: [idev] ++
3,518,833 UART: [idev] CDI.KEYID = 6
3,519,849 UART: [idev] SUBJECT.KEYID = 7
3,521,007 UART: [idev] UDS.KEYID = 0
3,523,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,729 UART: [idev] Erasing UDS.KEYID = 0
6,027,386 UART: [idev] Sha1 KeyId Algorithm
6,049,069 UART: [idev] --
6,054,533 UART: [ldev] ++
6,055,219 UART: [ldev] CDI.KEYID = 6
6,056,107 UART: [ldev] SUBJECT.KEYID = 5
6,057,323 UART: [ldev] AUTHORITY.KEYID = 7
6,058,559 UART: [ldev] FE.KEYID = 1
6,097,603 UART: [ldev] Erasing FE.KEYID = 1
8,604,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,386 UART: [ldev] --
10,408,225 UART: [fwproc] Wait for Commands...
10,410,319 UART: [fwproc] Recv command 0x46574c44
10,412,631 UART: [fwproc] Recv'd Img size: 114448 bytes
12,737,986 UART: ROM Fatal Error: 0x000B0024
12,741,647 >>> mbox cmd response: failed
12,741,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,294 >>> mbox cmd response: failed
12,742,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,889 >>> mbox cmd response: failed
Initializing fuses
2,062,125 writing to cptra_bootfsm_go
2,251,507 UART:
2,251,854 UART: Running Caliptra ROM ...
2,252,932 UART:
2,253,093 UART: [state] CFI Enabled
2,321,818 UART: [state] LifecycleState = Unprovisioned
2,324,193 UART: [state] DebugLocked = No
2,325,692 UART: [state] WD Timer not started. Device not locked for debugging
2,331,115 UART: [kat] SHA2-256
2,521,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,815 UART: [kat] ++
2,532,303 UART: [kat] sha1
2,544,223 UART: [kat] SHA2-256
2,547,249 UART: [kat] SHA2-384
2,554,321 UART: [kat] SHA2-512-ACC
2,556,898 UART: [kat] ECC-384
5,007,797 UART: [kat] HMAC-384Kdf
5,029,977 UART: [kat] LMS
5,561,773 UART: [kat] --
5,567,509 UART: [cold-reset] ++
5,569,278 UART: [fht] FHT @ 0x50003400
5,581,983 UART: [idev] ++
5,582,669 UART: [idev] CDI.KEYID = 6
5,583,634 UART: [idev] SUBJECT.KEYID = 7
5,584,845 UART: [idev] UDS.KEYID = 0
5,587,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,731,062 UART: [idev] Erasing UDS.KEYID = 0
8,088,079 UART: [idev] Sha1 KeyId Algorithm
8,110,401 UART: [idev] --
8,114,823 UART: [ldev] ++
8,115,507 UART: [ldev] CDI.KEYID = 6
8,116,421 UART: [ldev] SUBJECT.KEYID = 5
8,117,603 UART: [ldev] AUTHORITY.KEYID = 7
8,118,836 UART: [ldev] FE.KEYID = 1
8,158,948 UART: [ldev] Erasing FE.KEYID = 1
10,664,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,563 UART: [ldev] --
12,471,095 UART: [fwproc] Wait for Commands...
12,473,896 UART: [fwproc] Recv command 0x46574c44
12,476,155 UART: [fwproc] Recv'd Img size: 114448 bytes
15,923,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,121,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,664,721 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,441,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,641,366 >>> mbox cmd response: failed
12,641,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,642,246 >>> mbox cmd response: failed
12,642,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,642,808 >>> mbox cmd response: failed
Initializing fuses
2,056,176 writing to cptra_bootfsm_go
5,488,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,784,009 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,507 UART:
192,860 UART: Running Caliptra ROM ...
194,065 UART:
603,489 UART: [state] CFI Enabled
617,028 UART: [state] LifecycleState = Unprovisioned
619,441 UART: [state] DebugLocked = No
621,741 UART: [state] WD Timer not started. Device not locked for debugging
627,183 UART: [kat] SHA2-256
817,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,872 UART: [kat] ++
828,433 UART: [kat] sha1
839,961 UART: [kat] SHA2-256
842,965 UART: [kat] SHA2-384
849,534 UART: [kat] SHA2-512-ACC
852,096 UART: [kat] ECC-384
3,293,438 UART: [kat] HMAC-384Kdf
3,307,418 UART: [kat] LMS
3,839,284 UART: [kat] --
3,844,093 UART: [cold-reset] ++
3,845,544 UART: [fht] FHT @ 0x50003400
3,858,519 UART: [idev] ++
3,859,206 UART: [idev] CDI.KEYID = 6
3,860,174 UART: [idev] SUBJECT.KEYID = 7
3,861,389 UART: [idev] UDS.KEYID = 0
3,863,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,907 UART: [idev] Erasing UDS.KEYID = 0
6,339,062 UART: [idev] Sha1 KeyId Algorithm
6,362,894 UART: [idev] --
6,367,266 UART: [ldev] ++
6,367,954 UART: [ldev] CDI.KEYID = 6
6,368,862 UART: [ldev] SUBJECT.KEYID = 5
6,370,024 UART: [ldev] AUTHORITY.KEYID = 7
6,371,255 UART: [ldev] FE.KEYID = 1
6,382,770 UART: [ldev] Erasing FE.KEYID = 1
8,859,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,852 UART: [ldev] --
10,653,877 UART: [fwproc] Wait for Commands...
10,655,591 UART: [fwproc] Recv command 0x46574c44
10,657,926 UART: [fwproc] Recv'd Img size: 114448 bytes
12,980,689 UART: ROM Fatal Error: 0x000B0024
12,984,348 >>> mbox cmd response: failed
12,984,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,985,000 >>> mbox cmd response: failed
12,985,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,985,505 >>> mbox cmd response: failed
Initializing fuses
2,054,871 writing to cptra_bootfsm_go
2,244,166 UART:
2,244,507 UART: Running Caliptra ROM ...
2,245,643 UART:
7,467,229 UART: [state] CFI Enabled
7,479,472 UART: [state] LifecycleState = Unprovisioned
7,481,872 UART: [state] DebugLocked = No
7,483,783 UART: [state] WD Timer not started. Device not locked for debugging
7,488,832 UART: [kat] SHA2-256
7,678,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,689,492 UART: [kat] ++
7,690,006 UART: [kat] sha1
7,700,198 UART: [kat] SHA2-256
7,703,222 UART: [kat] SHA2-384
7,708,952 UART: [kat] SHA2-512-ACC
7,711,538 UART: [kat] ECC-384
10,152,117 UART: [kat] HMAC-384Kdf
10,165,813 UART: [kat] LMS
10,697,650 UART: [kat] --
10,702,458 UART: [cold-reset] ++
10,703,965 UART: [fht] FHT @ 0x50003400
10,714,074 UART: [idev] ++
10,714,774 UART: [idev] CDI.KEYID = 6
10,715,690 UART: [idev] SUBJECT.KEYID = 7
10,716,903 UART: [idev] UDS.KEYID = 0
10,719,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,863,443 UART: [idev] Erasing UDS.KEYID = 0
13,195,094 UART: [idev] Sha1 KeyId Algorithm
13,218,757 UART: [idev] --
13,222,859 UART: [ldev] ++
13,223,537 UART: [ldev] CDI.KEYID = 6
13,224,444 UART: [ldev] SUBJECT.KEYID = 5
13,225,601 UART: [ldev] AUTHORITY.KEYID = 7
13,226,838 UART: [ldev] FE.KEYID = 1
13,237,710 UART: [ldev] Erasing FE.KEYID = 1
15,716,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,439,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,454,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,470,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,485,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,505,446 UART: [ldev] --
17,511,363 UART: [fwproc] Wait for Commands...
17,514,001 UART: [fwproc] Recv command 0x46574c44
17,516,265 UART: [fwproc] Recv'd Img size: 114448 bytes
20,962,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,042,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,158,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,702,140 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,756,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,869,237 >>> mbox cmd response: failed
12,869,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,097 >>> mbox cmd response: failed
12,870,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,719 >>> mbox cmd response: failed
Initializing fuses
2,058,847 writing to cptra_bootfsm_go
10,753,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,942,772 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,514 UART: [kat] SHA2-512-ACC
897,415 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,358 UART: [kat] LMS
1,475,554 UART: [kat] --
1,476,801 UART: [cold-reset] ++
1,477,349 UART: [fht] Storing FHT @ 0x50003400
1,480,088 UART: [idev] ++
1,480,256 UART: [idev] CDI.KEYID = 6
1,480,616 UART: [idev] SUBJECT.KEYID = 7
1,481,040 UART: [idev] UDS.KEYID = 0
1,481,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,506,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,912 UART: [idev] --
1,516,021 UART: [ldev] ++
1,516,189 UART: [ldev] CDI.KEYID = 6
1,516,552 UART: [ldev] SUBJECT.KEYID = 5
1,516,978 UART: [ldev] AUTHORITY.KEYID = 7
1,517,441 UART: [ldev] FE.KEYID = 1
1,522,357 UART: [ldev] Erasing FE.KEYID = 1
1,547,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,950 UART: [ldev] --
1,587,359 UART: [fwproc] Waiting for Commands...
1,588,218 UART: [fwproc] Received command 0x46574c44
1,589,009 UART: [fwproc] Received Image of size 114448 bytes
1,854,263 UART: ROM Fatal Error: 0x000B0024
1,855,420 >>> mbox cmd response: failed
1,855,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,426 >>> mbox cmd response: failed
1,855,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,740 UART: [state] LifecycleState = Unprovisioned
86,395 UART: [state] DebugLocked = No
87,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,759 UART: [kat] SHA2-256
882,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,805 UART: [kat] ++
886,957 UART: [kat] sha1
891,229 UART: [kat] SHA2-256
893,167 UART: [kat] SHA2-384
895,980 UART: [kat] SHA2-512-ACC
897,881 UART: [kat] ECC-384
903,648 UART: [kat] HMAC-384Kdf
908,114 UART: [kat] LMS
1,476,310 UART: [kat] --
1,477,331 UART: [cold-reset] ++
1,477,721 UART: [fht] Storing FHT @ 0x50003400
1,480,556 UART: [idev] ++
1,480,724 UART: [idev] CDI.KEYID = 6
1,481,084 UART: [idev] SUBJECT.KEYID = 7
1,481,508 UART: [idev] UDS.KEYID = 0
1,481,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,482 UART: [idev] Erasing UDS.KEYID = 0
1,506,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,130 UART: [idev] --
1,516,017 UART: [ldev] ++
1,516,185 UART: [ldev] CDI.KEYID = 6
1,516,548 UART: [ldev] SUBJECT.KEYID = 5
1,516,974 UART: [ldev] AUTHORITY.KEYID = 7
1,517,437 UART: [ldev] FE.KEYID = 1
1,522,631 UART: [ldev] Erasing FE.KEYID = 1
1,547,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,742 UART: [ldev] --
1,587,169 UART: [fwproc] Waiting for Commands...
1,587,966 UART: [fwproc] Received command 0x46574c44
1,588,757 UART: [fwproc] Received Image of size 114448 bytes
2,887,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,666 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,863 >>> mbox cmd response: failed
1,707,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,869 >>> mbox cmd response: failed
1,707,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,534 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,056 UART: [kat] SHA2-256
881,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,102 UART: [kat] ++
886,254 UART: [kat] sha1
890,498 UART: [kat] SHA2-256
892,436 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,571 UART: [kat] HMAC-384Kdf
907,329 UART: [kat] LMS
1,475,525 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,479,925 UART: [idev] ++
1,480,093 UART: [idev] CDI.KEYID = 6
1,480,453 UART: [idev] SUBJECT.KEYID = 7
1,480,877 UART: [idev] UDS.KEYID = 0
1,481,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,713 UART: [idev] --
1,515,684 UART: [ldev] ++
1,515,852 UART: [ldev] CDI.KEYID = 6
1,516,215 UART: [ldev] SUBJECT.KEYID = 5
1,516,641 UART: [ldev] AUTHORITY.KEYID = 7
1,517,104 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,547,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,025 UART: [ldev] --
1,587,346 UART: [fwproc] Waiting for Commands...
1,588,171 UART: [fwproc] Received command 0x46574c44
1,588,962 UART: [fwproc] Received Image of size 114448 bytes
1,856,140 UART: ROM Fatal Error: 0x000B0024
1,857,297 >>> mbox cmd response: failed
1,857,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,303 >>> mbox cmd response: failed
1,857,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,993 UART: [kat] HMAC-384Kdf
907,559 UART: [kat] LMS
1,475,755 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,479,865 UART: [idev] ++
1,480,033 UART: [idev] CDI.KEYID = 6
1,480,393 UART: [idev] SUBJECT.KEYID = 7
1,480,817 UART: [idev] UDS.KEYID = 0
1,481,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,725 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,323 UART: [idev] --
1,515,306 UART: [ldev] ++
1,515,474 UART: [ldev] CDI.KEYID = 6
1,515,837 UART: [ldev] SUBJECT.KEYID = 5
1,516,263 UART: [ldev] AUTHORITY.KEYID = 7
1,516,726 UART: [ldev] FE.KEYID = 1
1,521,878 UART: [ldev] Erasing FE.KEYID = 1
1,547,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,355 UART: [ldev] --
1,586,758 UART: [fwproc] Waiting for Commands...
1,587,407 UART: [fwproc] Received command 0x46574c44
1,588,198 UART: [fwproc] Received Image of size 114448 bytes
2,887,264 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,016 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,368 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,331 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,709,592 >>> mbox cmd response: failed
1,709,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,598 >>> mbox cmd response: failed
1,709,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,551 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,348 UART: [kat] LMS
1,170,676 UART: [kat] --
1,171,735 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,858 UART: [idev] ++
1,175,026 UART: [idev] CDI.KEYID = 6
1,175,386 UART: [idev] SUBJECT.KEYID = 7
1,175,810 UART: [idev] UDS.KEYID = 0
1,176,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,753 UART: [idev] Sha1 KeyId Algorithm
1,209,181 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,884 UART: [ldev] SUBJECT.KEYID = 5
1,211,310 UART: [ldev] AUTHORITY.KEYID = 7
1,211,773 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,212 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,710 UART: ROM Fatal Error: 0x000B0024
1,551,867 >>> mbox cmd response: failed
1,551,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,873 >>> mbox cmd response: failed
1,551,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,485 UART: [cold-reset] ++
1,171,815 UART: [fht] FHT @ 0x50003400
1,174,626 UART: [idev] ++
1,174,794 UART: [idev] CDI.KEYID = 6
1,175,154 UART: [idev] SUBJECT.KEYID = 7
1,175,578 UART: [idev] UDS.KEYID = 0
1,175,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,275 UART: [idev] Sha1 KeyId Algorithm
1,208,869 UART: [idev] --
1,210,145 UART: [ldev] ++
1,210,313 UART: [ldev] CDI.KEYID = 6
1,210,676 UART: [ldev] SUBJECT.KEYID = 5
1,211,102 UART: [ldev] AUTHORITY.KEYID = 7
1,211,565 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,888 UART: [fwproc] Wait for Commands...
1,282,576 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,868 >>> mbox cmd response: failed
1,406,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,874 >>> mbox cmd response: failed
1,406,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,116 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
893,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,466 UART: [kat] ++
897,618 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,625 UART: [kat] LMS
1,170,953 UART: [kat] --
1,171,858 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,175,083 UART: [idev] ++
1,175,251 UART: [idev] CDI.KEYID = 6
1,175,611 UART: [idev] SUBJECT.KEYID = 7
1,176,035 UART: [idev] UDS.KEYID = 0
1,176,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,985 UART: [idev] Erasing UDS.KEYID = 0
1,200,200 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,926 UART: [ldev] ++
1,210,094 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,883 UART: [ldev] AUTHORITY.KEYID = 7
1,211,346 UART: [ldev] FE.KEYID = 1
1,216,596 UART: [ldev] Erasing FE.KEYID = 1
1,242,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,158 UART: [ldev] --
1,281,657 UART: [fwproc] Wait for Commands...
1,282,363 UART: [fwproc] Recv command 0x46574c44
1,283,091 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,143 UART: ROM Fatal Error: 0x000B0024
1,550,300 >>> mbox cmd response: failed
1,550,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,306 >>> mbox cmd response: failed
1,550,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,923 UART: [state] LifecycleState = Unprovisioned
86,578 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
893,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,072 UART: [kat] ++
898,224 UART: [kat] sha1
902,590 UART: [kat] SHA2-256
904,530 UART: [kat] SHA2-384
907,177 UART: [kat] SHA2-512-ACC
909,078 UART: [kat] ECC-384
919,227 UART: [kat] HMAC-384Kdf
923,753 UART: [kat] LMS
1,172,081 UART: [kat] --
1,172,986 UART: [cold-reset] ++
1,173,482 UART: [fht] FHT @ 0x50003400
1,176,215 UART: [idev] ++
1,176,383 UART: [idev] CDI.KEYID = 6
1,176,743 UART: [idev] SUBJECT.KEYID = 7
1,177,167 UART: [idev] UDS.KEYID = 0
1,177,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,516 UART: [idev] --
1,211,396 UART: [ldev] ++
1,211,564 UART: [ldev] CDI.KEYID = 6
1,211,927 UART: [ldev] SUBJECT.KEYID = 5
1,212,353 UART: [ldev] AUTHORITY.KEYID = 7
1,212,816 UART: [ldev] FE.KEYID = 1
1,218,248 UART: [ldev] Erasing FE.KEYID = 1
1,243,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,546 UART: [ldev] --
1,283,021 UART: [fwproc] Wait for Commands...
1,283,735 UART: [fwproc] Recv command 0x46574c44
1,284,463 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,862 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,019 >>> mbox cmd response: failed
1,406,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,025 >>> mbox cmd response: failed
1,406,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,919 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,792 UART: [state] LifecycleState = Unprovisioned
86,447 UART: [state] DebugLocked = No
86,967 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
891,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,913 UART: [kat] ++
896,065 UART: [kat] sha1
900,211 UART: [kat] SHA2-256
902,151 UART: [kat] SHA2-384
905,084 UART: [kat] SHA2-512-ACC
906,985 UART: [kat] ECC-384
916,942 UART: [kat] HMAC-384Kdf
921,474 UART: [kat] LMS
1,169,786 UART: [kat] --
1,170,817 UART: [cold-reset] ++
1,171,231 UART: [fht] FHT @ 0x50003400
1,173,909 UART: [idev] ++
1,174,077 UART: [idev] CDI.KEYID = 6
1,174,438 UART: [idev] SUBJECT.KEYID = 7
1,174,863 UART: [idev] UDS.KEYID = 0
1,175,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,831 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,351 UART: [idev] --
1,209,504 UART: [ldev] ++
1,209,672 UART: [ldev] CDI.KEYID = 6
1,210,036 UART: [ldev] SUBJECT.KEYID = 5
1,210,463 UART: [ldev] AUTHORITY.KEYID = 7
1,210,926 UART: [ldev] FE.KEYID = 1
1,215,870 UART: [ldev] Erasing FE.KEYID = 1
1,242,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,680 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,575 UART: [fwproc] Recv command 0x46574c44
1,283,308 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,249 UART: ROM Fatal Error: 0x000B0024
1,550,406 >>> mbox cmd response: failed
1,550,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,412 >>> mbox cmd response: failed
1,550,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
903,992 UART: [kat] SHA2-512-ACC
905,893 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,941 UART: [fht] FHT @ 0x50003400
1,172,483 UART: [idev] ++
1,172,651 UART: [idev] CDI.KEYID = 6
1,173,012 UART: [idev] SUBJECT.KEYID = 7
1,173,437 UART: [idev] UDS.KEYID = 0
1,173,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,001 UART: [idev] Sha1 KeyId Algorithm
1,206,813 UART: [idev] --
1,207,660 UART: [ldev] ++
1,207,828 UART: [ldev] CDI.KEYID = 6
1,208,192 UART: [ldev] SUBJECT.KEYID = 5
1,208,619 UART: [ldev] AUTHORITY.KEYID = 7
1,209,082 UART: [ldev] FE.KEYID = 1
1,214,122 UART: [ldev] Erasing FE.KEYID = 1
1,240,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,848 UART: [fwproc] Wait for Commands...
1,280,463 UART: [fwproc] Recv command 0x46574c44
1,281,196 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,137 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,559 >>> mbox cmd response: failed
1,402,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,565 >>> mbox cmd response: failed
1,402,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,963 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,674 UART: [cold-reset] ++
1,170,098 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,173,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,390 UART: [idev] Erasing UDS.KEYID = 0
1,198,432 UART: [idev] Sha1 KeyId Algorithm
1,207,358 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,025 UART: [ldev] --
1,281,345 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,889 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,870 UART: ROM Fatal Error: 0x000B0024
1,550,027 >>> mbox cmd response: failed
1,550,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,033 >>> mbox cmd response: failed
1,550,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,534 UART: [fwproc] Recv command 0x46574c44
1,283,267 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,604 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,938 >>> mbox cmd response: failed
1,403,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,944 >>> mbox cmd response: failed
1,403,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,806 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,253 UART:
192,598 UART: Running Caliptra ROM ...
193,781 UART:
193,933 UART: [state] CFI Enabled
264,526 UART: [state] LifecycleState = Unprovisioned
266,507 UART: [state] DebugLocked = No
267,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,574 UART: [kat] SHA2-256
443,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,771 UART: [kat] ++
454,263 UART: [kat] sha1
465,145 UART: [kat] SHA2-256
467,788 UART: [kat] SHA2-384
474,085 UART: [kat] SHA2-512-ACC
476,436 UART: [kat] ECC-384
2,767,343 UART: [kat] HMAC-384Kdf
2,799,155 UART: [kat] LMS
3,989,463 UART: [kat] --
3,991,807 UART: [cold-reset] ++
3,993,314 UART: [fht] Storing FHT @ 0x50003400
4,004,421 UART: [idev] ++
4,005,036 UART: [idev] CDI.KEYID = 6
4,005,955 UART: [idev] SUBJECT.KEYID = 7
4,007,231 UART: [idev] UDS.KEYID = 0
4,009,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,371 UART: [idev] Erasing UDS.KEYID = 0
7,346,425 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,478 UART: [idev] --
7,371,415 UART: [ldev] ++
7,371,995 UART: [ldev] CDI.KEYID = 6
7,372,958 UART: [ldev] SUBJECT.KEYID = 5
7,374,181 UART: [ldev] AUTHORITY.KEYID = 7
7,375,423 UART: [ldev] FE.KEYID = 1
7,420,153 UART: [ldev] Erasing FE.KEYID = 1
10,754,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,229 UART: [ldev] --
13,134,749 UART: [fwproc] Waiting for Commands...
13,137,930 UART: [fwproc] Received command 0x46574c44
13,140,116 UART: [fwproc] Received Image of size 114124 bytes
16,085,241 UART: ROM Fatal Error: 0x000B0021
16,088,669 >>> mbox cmd response: failed
16,089,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,089,436 >>> mbox cmd response: failed
16,089,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,089,992 >>> mbox cmd response: failed
Initializing fuses
2,061,991 writing to cptra_bootfsm_go
2,251,287 UART:
2,251,650 UART: Running Caliptra ROM ...
2,252,693 UART:
2,252,844 UART: [state] CFI Enabled
2,326,286 UART: [state] LifecycleState = Unprovisioned
2,328,221 UART: [state] DebugLocked = No
2,329,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,642 UART: [kat] SHA2-256
2,504,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,857 UART: [kat] ++
2,515,398 UART: [kat] sha1
2,526,510 UART: [kat] SHA2-256
2,529,204 UART: [kat] SHA2-384
2,535,027 UART: [kat] SHA2-512-ACC
2,537,383 UART: [kat] ECC-384
4,826,114 UART: [kat] HMAC-384Kdf
4,857,567 UART: [kat] LMS
6,047,901 UART: [kat] --
6,052,940 UART: [cold-reset] ++
6,054,065 UART: [fht] Storing FHT @ 0x50003400
6,065,985 UART: [idev] ++
6,066,549 UART: [idev] CDI.KEYID = 6
6,067,518 UART: [idev] SUBJECT.KEYID = 7
6,068,924 UART: [idev] UDS.KEYID = 0
6,071,101 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,214,603 UART: [idev] Erasing UDS.KEYID = 0
9,404,148 UART: [idev] Using Sha1 for KeyId Algorithm
9,426,774 UART: [idev] --
9,431,041 UART: [ldev] ++
9,431,656 UART: [ldev] CDI.KEYID = 6
9,432,572 UART: [ldev] SUBJECT.KEYID = 5
9,433,767 UART: [ldev] AUTHORITY.KEYID = 7
9,435,009 UART: [ldev] FE.KEYID = 1
9,480,877 UART: [ldev] Erasing FE.KEYID = 1
12,812,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,108,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,123,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,137,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,152,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,171,937 UART: [ldev] --
15,177,420 UART: [fwproc] Waiting for Commands...
15,180,004 UART: [fwproc] Received command 0x46574c44
15,182,197 UART: [fwproc] Received Image of size 114124 bytes
19,237,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,310,491 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,379,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,695,925 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,805,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,872,795 >>> mbox cmd response: failed
15,873,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,873,641 >>> mbox cmd response: failed
15,873,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,874,157 >>> mbox cmd response: failed
Initializing fuses
2,055,299 writing to cptra_bootfsm_go
5,845,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,906,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,401 UART:
192,823 UART: Running Caliptra ROM ...
193,998 UART:
603,578 UART: [state] CFI Enabled
617,722 UART: [state] LifecycleState = Unprovisioned
619,665 UART: [state] DebugLocked = No
622,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,041 UART: [kat] SHA2-256
796,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,318 UART: [kat] ++
807,797 UART: [kat] sha1
819,656 UART: [kat] SHA2-256
822,350 UART: [kat] SHA2-384
826,888 UART: [kat] SHA2-512-ACC
829,231 UART: [kat] ECC-384
3,115,106 UART: [kat] HMAC-384Kdf
3,126,929 UART: [kat] LMS
4,317,060 UART: [kat] --
4,320,242 UART: [cold-reset] ++
4,322,780 UART: [fht] Storing FHT @ 0x50003400
4,334,332 UART: [idev] ++
4,334,942 UART: [idev] CDI.KEYID = 6
4,335,915 UART: [idev] SUBJECT.KEYID = 7
4,337,131 UART: [idev] UDS.KEYID = 0
4,339,724 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,176 UART: [idev] Erasing UDS.KEYID = 0
7,630,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,233 UART: [idev] --
7,656,802 UART: [ldev] ++
7,657,384 UART: [ldev] CDI.KEYID = 6
7,658,353 UART: [ldev] SUBJECT.KEYID = 5
7,659,570 UART: [ldev] AUTHORITY.KEYID = 7
7,660,806 UART: [ldev] FE.KEYID = 1
7,671,236 UART: [ldev] Erasing FE.KEYID = 1
10,957,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,878 UART: [ldev] --
13,316,930 UART: [fwproc] Waiting for Commands...
13,320,002 UART: [fwproc] Received command 0x46574c44
13,322,202 UART: [fwproc] Received Image of size 114124 bytes
16,265,162 UART: ROM Fatal Error: 0x000B0021
16,268,568 >>> mbox cmd response: failed
16,268,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,305 >>> mbox cmd response: failed
16,269,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,862 >>> mbox cmd response: failed
Initializing fuses
2,057,272 writing to cptra_bootfsm_go
2,246,533 UART:
2,246,893 UART: Running Caliptra ROM ...
2,248,039 UART:
4,185,808 UART: [state] CFI Enabled
4,200,936 UART: [state] LifecycleState = Unprovisioned
4,202,910 UART: [state] DebugLocked = No
4,204,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,208,664 UART: [kat] SHA2-256
4,378,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,969 UART: [kat] ++
4,389,467 UART: [kat] sha1
4,400,903 UART: [kat] SHA2-256
4,403,597 UART: [kat] SHA2-384
4,410,256 UART: [kat] SHA2-512-ACC
4,412,618 UART: [kat] ECC-384
6,696,447 UART: [kat] HMAC-384Kdf
6,709,102 UART: [kat] LMS
7,899,202 UART: [kat] --
7,905,280 UART: [cold-reset] ++
7,906,901 UART: [fht] Storing FHT @ 0x50003400
7,918,762 UART: [idev] ++
7,919,335 UART: [idev] CDI.KEYID = 6
7,920,300 UART: [idev] SUBJECT.KEYID = 7
7,921,514 UART: [idev] UDS.KEYID = 0
7,923,882 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,067,315 UART: [idev] Erasing UDS.KEYID = 0
11,211,037 UART: [idev] Using Sha1 for KeyId Algorithm
11,231,456 UART: [idev] --
11,234,267 UART: [ldev] ++
11,234,856 UART: [ldev] CDI.KEYID = 6
11,235,877 UART: [ldev] SUBJECT.KEYID = 5
11,237,081 UART: [ldev] AUTHORITY.KEYID = 7
11,238,263 UART: [ldev] FE.KEYID = 1
11,246,807 UART: [ldev] Erasing FE.KEYID = 1
14,534,075 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,827,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,842,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,857,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,871,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,889,643 UART: [ldev] --
16,894,802 UART: [fwproc] Waiting for Commands...
16,896,959 UART: [fwproc] Received command 0x46574c44
16,899,148 UART: [fwproc] Received Image of size 114124 bytes
20,953,640 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,028,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,097,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,414,380 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,126,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,028,939 >>> mbox cmd response: failed
16,029,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,894 >>> mbox cmd response: failed
16,030,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,471 >>> mbox cmd response: failed
Initializing fuses
2,056,290 writing to cptra_bootfsm_go
7,968,059 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,902,700 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,105 UART:
192,472 UART: Running Caliptra ROM ...
193,577 UART:
193,722 UART: [state] CFI Enabled
263,134 UART: [state] LifecycleState = Unprovisioned
264,994 UART: [state] DebugLocked = No
267,157 UART: [state] WD Timer not started. Device not locked for debugging
271,641 UART: [kat] SHA2-256
450,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,383 UART: [kat] ++
462,831 UART: [kat] sha1
473,381 UART: [kat] SHA2-256
476,439 UART: [kat] SHA2-384
483,760 UART: [kat] SHA2-512-ACC
486,708 UART: [kat] ECC-384
2,946,357 UART: [kat] HMAC-384Kdf
2,968,644 UART: [kat] LMS
3,498,101 UART: [kat] --
3,501,667 UART: [cold-reset] ++
3,502,898 UART: [fht] FHT @ 0x50003400
3,513,556 UART: [idev] ++
3,514,122 UART: [idev] CDI.KEYID = 6
3,515,031 UART: [idev] SUBJECT.KEYID = 7
3,516,271 UART: [idev] UDS.KEYID = 0
3,518,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,211 UART: [idev] Erasing UDS.KEYID = 0
6,026,883 UART: [idev] Sha1 KeyId Algorithm
6,049,200 UART: [idev] --
6,052,120 UART: [ldev] ++
6,052,698 UART: [ldev] CDI.KEYID = 6
6,053,611 UART: [ldev] SUBJECT.KEYID = 5
6,054,831 UART: [ldev] AUTHORITY.KEYID = 7
6,056,068 UART: [ldev] FE.KEYID = 1
6,097,575 UART: [ldev] Erasing FE.KEYID = 1
8,603,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,871 UART: [ldev] --
10,409,586 UART: [fwproc] Wait for Commands...
10,411,533 UART: [fwproc] Recv command 0x46574c44
10,413,633 UART: [fwproc] Recv'd Img size: 114448 bytes
12,701,870 UART: ROM Fatal Error: 0x000B0021
12,704,999 >>> mbox cmd response: failed
12,705,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,756 >>> mbox cmd response: failed
12,706,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,706,318 >>> mbox cmd response: failed
Initializing fuses
2,053,268 writing to cptra_bootfsm_go
2,242,557 UART:
2,242,910 UART: Running Caliptra ROM ...
2,244,069 UART:
2,244,237 UART: [state] CFI Enabled
2,318,953 UART: [state] LifecycleState = Unprovisioned
2,320,840 UART: [state] DebugLocked = No
2,322,990 UART: [state] WD Timer not started. Device not locked for debugging
2,326,037 UART: [kat] SHA2-256
2,505,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,728 UART: [kat] ++
2,517,275 UART: [kat] sha1
2,528,549 UART: [kat] SHA2-256
2,531,565 UART: [kat] SHA2-384
2,537,076 UART: [kat] SHA2-512-ACC
2,540,021 UART: [kat] ECC-384
4,997,909 UART: [kat] HMAC-384Kdf
5,022,243 UART: [kat] LMS
5,551,716 UART: [kat] --
5,556,992 UART: [cold-reset] ++
5,559,250 UART: [fht] FHT @ 0x50003400
5,569,595 UART: [idev] ++
5,570,171 UART: [idev] CDI.KEYID = 6
5,571,055 UART: [idev] SUBJECT.KEYID = 7
5,572,272 UART: [idev] UDS.KEYID = 0
5,574,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,745 UART: [idev] Erasing UDS.KEYID = 0
8,081,335 UART: [idev] Sha1 KeyId Algorithm
8,104,992 UART: [idev] --
8,109,718 UART: [ldev] ++
8,110,295 UART: [ldev] CDI.KEYID = 6
8,111,353 UART: [ldev] SUBJECT.KEYID = 5
8,112,461 UART: [ldev] AUTHORITY.KEYID = 7
8,113,636 UART: [ldev] FE.KEYID = 1
8,152,967 UART: [ldev] Erasing FE.KEYID = 1
10,660,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,519 UART: [ldev] --
12,467,482 UART: [fwproc] Wait for Commands...
12,470,171 UART: [fwproc] Recv command 0x46574c44
12,472,268 UART: [fwproc] Recv'd Img size: 114448 bytes
15,875,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,946,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,334,218 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,387,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,494,310 >>> mbox cmd response: failed
12,494,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,495,289 >>> mbox cmd response: failed
12,495,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,495,875 >>> mbox cmd response: failed
Initializing fuses
2,055,548 writing to cptra_bootfsm_go
5,415,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,123,096 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,337 UART:
192,713 UART: Running Caliptra ROM ...
193,824 UART:
603,518 UART: [state] CFI Enabled
620,005 UART: [state] LifecycleState = Unprovisioned
621,845 UART: [state] DebugLocked = No
624,624 UART: [state] WD Timer not started. Device not locked for debugging
629,098 UART: [kat] SHA2-256
808,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,764 UART: [kat] ++
820,298 UART: [kat] sha1
831,937 UART: [kat] SHA2-256
834,940 UART: [kat] SHA2-384
841,614 UART: [kat] SHA2-512-ACC
844,545 UART: [kat] ECC-384
3,285,055 UART: [kat] HMAC-384Kdf
3,298,023 UART: [kat] LMS
3,827,557 UART: [kat] --
3,831,886 UART: [cold-reset] ++
3,833,824 UART: [fht] FHT @ 0x50003400
3,845,016 UART: [idev] ++
3,845,582 UART: [idev] CDI.KEYID = 6
3,846,703 UART: [idev] SUBJECT.KEYID = 7
3,847,840 UART: [idev] UDS.KEYID = 0
3,850,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,593 UART: [idev] Erasing UDS.KEYID = 0
6,311,958 UART: [idev] Sha1 KeyId Algorithm
6,334,186 UART: [idev] --
6,337,720 UART: [ldev] ++
6,338,293 UART: [ldev] CDI.KEYID = 6
6,339,203 UART: [ldev] SUBJECT.KEYID = 5
6,340,384 UART: [ldev] AUTHORITY.KEYID = 7
6,341,618 UART: [ldev] FE.KEYID = 1
6,355,509 UART: [ldev] Erasing FE.KEYID = 1
8,830,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,493 UART: [ldev] --
10,622,970 UART: [fwproc] Wait for Commands...
10,625,884 UART: [fwproc] Recv command 0x46574c44
10,627,926 UART: [fwproc] Recv'd Img size: 114448 bytes
12,910,694 UART: ROM Fatal Error: 0x000B0021
12,913,817 >>> mbox cmd response: failed
12,914,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,560 >>> mbox cmd response: failed
12,914,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,134 >>> mbox cmd response: failed
Initializing fuses
2,054,720 writing to cptra_bootfsm_go
2,244,007 UART:
2,244,345 UART: Running Caliptra ROM ...
2,245,489 UART:
7,540,498 UART: [state] CFI Enabled
7,549,567 UART: [state] LifecycleState = Unprovisioned
7,551,425 UART: [state] DebugLocked = No
7,552,969 UART: [state] WD Timer not started. Device not locked for debugging
7,557,036 UART: [kat] SHA2-256
7,736,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,747,792 UART: [kat] ++
7,748,352 UART: [kat] sha1
7,759,305 UART: [kat] SHA2-256
7,762,330 UART: [kat] SHA2-384
7,769,072 UART: [kat] SHA2-512-ACC
7,772,018 UART: [kat] ECC-384
10,212,664 UART: [kat] HMAC-384Kdf
10,223,955 UART: [kat] LMS
10,753,445 UART: [kat] --
10,758,328 UART: [cold-reset] ++
10,760,857 UART: [fht] FHT @ 0x50003400
10,772,439 UART: [idev] ++
10,773,035 UART: [idev] CDI.KEYID = 6
10,773,923 UART: [idev] SUBJECT.KEYID = 7
10,775,138 UART: [idev] UDS.KEYID = 0
10,777,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,921,205 UART: [idev] Erasing UDS.KEYID = 0
13,245,871 UART: [idev] Sha1 KeyId Algorithm
13,268,395 UART: [idev] --
13,272,735 UART: [ldev] ++
13,273,311 UART: [ldev] CDI.KEYID = 6
13,274,191 UART: [ldev] SUBJECT.KEYID = 5
13,275,399 UART: [ldev] AUTHORITY.KEYID = 7
13,276,576 UART: [ldev] FE.KEYID = 1
13,287,971 UART: [ldev] Erasing FE.KEYID = 1
15,762,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,481,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,497,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,513,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,529,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,549,941 UART: [ldev] --
17,553,750 UART: [fwproc] Wait for Commands...
17,556,444 UART: [fwproc] Recv command 0x46574c44
17,558,511 UART: [fwproc] Recv'd Img size: 114448 bytes
20,964,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,039,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,108,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,427,529 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,977 writing to cptra_bootfsm_go
3,700,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,702,262 >>> mbox cmd response: failed
12,702,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,127 >>> mbox cmd response: failed
12,703,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,683 >>> mbox cmd response: failed
Initializing fuses
2,059,073 writing to cptra_bootfsm_go
10,853,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,428,676 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,219 UART:
192,575 UART: Running Caliptra ROM ...
193,761 UART:
193,911 UART: [state] CFI Enabled
259,867 UART: [state] LifecycleState = Unprovisioned
262,276 UART: [state] DebugLocked = No
264,737 UART: [state] WD Timer not started. Device not locked for debugging
269,640 UART: [kat] SHA2-256
459,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,286 UART: [kat] ++
470,777 UART: [kat] sha1
483,276 UART: [kat] SHA2-256
486,299 UART: [kat] SHA2-384
492,770 UART: [kat] SHA2-512-ACC
495,384 UART: [kat] ECC-384
2,945,907 UART: [kat] HMAC-384Kdf
2,969,385 UART: [kat] LMS
3,501,148 UART: [kat] --
3,506,835 UART: [cold-reset] ++
3,508,610 UART: [fht] FHT @ 0x50003400
3,520,292 UART: [idev] ++
3,521,031 UART: [idev] CDI.KEYID = 6
3,521,917 UART: [idev] SUBJECT.KEYID = 7
3,523,183 UART: [idev] UDS.KEYID = 0
3,525,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,066 UART: [idev] Erasing UDS.KEYID = 0
6,026,783 UART: [idev] Sha1 KeyId Algorithm
6,049,863 UART: [idev] --
6,056,186 UART: [ldev] ++
6,056,870 UART: [ldev] CDI.KEYID = 6
6,057,757 UART: [ldev] SUBJECT.KEYID = 5
6,058,995 UART: [ldev] AUTHORITY.KEYID = 7
6,060,175 UART: [ldev] FE.KEYID = 1
6,097,472 UART: [ldev] Erasing FE.KEYID = 1
8,605,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,259 UART: [ldev] --
10,410,930 UART: [fwproc] Wait for Commands...
10,412,810 UART: [fwproc] Recv command 0x46574c44
10,415,070 UART: [fwproc] Recv'd Img size: 114448 bytes
12,740,157 UART: ROM Fatal Error: 0x000B0021
12,743,822 >>> mbox cmd response: failed
12,744,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,574 >>> mbox cmd response: failed
12,744,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,154 >>> mbox cmd response: failed
Initializing fuses
2,056,221 writing to cptra_bootfsm_go
2,245,554 UART:
2,245,907 UART: Running Caliptra ROM ...
2,247,046 UART:
2,247,210 UART: [state] CFI Enabled
2,319,989 UART: [state] LifecycleState = Unprovisioned
2,322,365 UART: [state] DebugLocked = No
2,323,539 UART: [state] WD Timer not started. Device not locked for debugging
2,327,605 UART: [kat] SHA2-256
2,517,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,240 UART: [kat] ++
2,528,813 UART: [kat] sha1
2,540,246 UART: [kat] SHA2-256
2,543,272 UART: [kat] SHA2-384
2,549,639 UART: [kat] SHA2-512-ACC
2,552,265 UART: [kat] ECC-384
5,001,375 UART: [kat] HMAC-384Kdf
5,024,882 UART: [kat] LMS
5,556,613 UART: [kat] --
5,561,571 UART: [cold-reset] ++
5,562,698 UART: [fht] FHT @ 0x50003400
5,574,990 UART: [idev] ++
5,575,667 UART: [idev] CDI.KEYID = 6
5,576,607 UART: [idev] SUBJECT.KEYID = 7
5,577,870 UART: [idev] UDS.KEYID = 0
5,580,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,725,149 UART: [idev] Erasing UDS.KEYID = 0
8,101,847 UART: [idev] Sha1 KeyId Algorithm
8,124,205 UART: [idev] --
8,128,892 UART: [ldev] ++
8,129,582 UART: [ldev] CDI.KEYID = 6
8,130,465 UART: [ldev] SUBJECT.KEYID = 5
8,131,678 UART: [ldev] AUTHORITY.KEYID = 7
8,132,857 UART: [ldev] FE.KEYID = 1
8,174,040 UART: [ldev] Erasing FE.KEYID = 1
10,676,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,414,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,429,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,444,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,460,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,481,479 UART: [ldev] --
12,487,070 UART: [fwproc] Wait for Commands...
12,489,927 UART: [fwproc] Recv command 0x46574c44
12,492,259 UART: [fwproc] Recv'd Img size: 114448 bytes
15,948,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,028,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,144,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,687,387 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,439,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,647,331 >>> mbox cmd response: failed
12,647,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,310 >>> mbox cmd response: failed
12,648,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,878 >>> mbox cmd response: failed
Initializing fuses
2,063,485 writing to cptra_bootfsm_go
5,491,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,788,114 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,439 UART:
192,800 UART: Running Caliptra ROM ...
193,945 UART:
603,609 UART: [state] CFI Enabled
615,044 UART: [state] LifecycleState = Unprovisioned
617,447 UART: [state] DebugLocked = No
619,584 UART: [state] WD Timer not started. Device not locked for debugging
623,783 UART: [kat] SHA2-256
813,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,380 UART: [kat] ++
824,967 UART: [kat] sha1
836,069 UART: [kat] SHA2-256
839,081 UART: [kat] SHA2-384
844,693 UART: [kat] SHA2-512-ACC
847,247 UART: [kat] ECC-384
3,290,470 UART: [kat] HMAC-384Kdf
3,303,465 UART: [kat] LMS
3,835,316 UART: [kat] --
3,837,537 UART: [cold-reset] ++
3,839,744 UART: [fht] FHT @ 0x50003400
3,851,754 UART: [idev] ++
3,852,487 UART: [idev] CDI.KEYID = 6
3,853,401 UART: [idev] SUBJECT.KEYID = 7
3,854,564 UART: [idev] UDS.KEYID = 0
3,857,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,067 UART: [idev] Erasing UDS.KEYID = 0
6,330,959 UART: [idev] Sha1 KeyId Algorithm
6,354,241 UART: [idev] --
6,359,044 UART: [ldev] ++
6,359,729 UART: [ldev] CDI.KEYID = 6
6,360,641 UART: [ldev] SUBJECT.KEYID = 5
6,361,853 UART: [ldev] AUTHORITY.KEYID = 7
6,363,027 UART: [ldev] FE.KEYID = 1
6,376,049 UART: [ldev] Erasing FE.KEYID = 1
8,856,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,135 UART: [ldev] --
10,646,348 UART: [fwproc] Wait for Commands...
10,649,415 UART: [fwproc] Recv command 0x46574c44
10,651,719 UART: [fwproc] Recv'd Img size: 114448 bytes
12,976,667 UART: ROM Fatal Error: 0x000B0021
12,980,335 >>> mbox cmd response: failed
12,980,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,067 >>> mbox cmd response: failed
12,981,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,569 >>> mbox cmd response: failed
Initializing fuses
2,059,845 writing to cptra_bootfsm_go
2,249,189 UART:
2,249,530 UART: Running Caliptra ROM ...
2,250,668 UART:
7,470,553 UART: [state] CFI Enabled
7,484,812 UART: [state] LifecycleState = Unprovisioned
7,487,205 UART: [state] DebugLocked = No
7,488,752 UART: [state] WD Timer not started. Device not locked for debugging
7,493,957 UART: [kat] SHA2-256
7,683,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,694,642 UART: [kat] ++
7,695,190 UART: [kat] sha1
7,707,813 UART: [kat] SHA2-256
7,710,838 UART: [kat] SHA2-384
7,716,128 UART: [kat] SHA2-512-ACC
7,718,693 UART: [kat] ECC-384
10,163,125 UART: [kat] HMAC-384Kdf
10,176,614 UART: [kat] LMS
10,708,452 UART: [kat] --
10,714,121 UART: [cold-reset] ++
10,716,485 UART: [fht] FHT @ 0x50003400
10,728,062 UART: [idev] ++
10,728,738 UART: [idev] CDI.KEYID = 6
10,729,751 UART: [idev] SUBJECT.KEYID = 7
10,730,903 UART: [idev] UDS.KEYID = 0
10,733,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,877,013 UART: [idev] Erasing UDS.KEYID = 0
13,204,718 UART: [idev] Sha1 KeyId Algorithm
13,228,374 UART: [idev] --
13,233,765 UART: [ldev] ++
13,234,506 UART: [ldev] CDI.KEYID = 6
13,235,417 UART: [ldev] SUBJECT.KEYID = 5
13,236,512 UART: [ldev] AUTHORITY.KEYID = 7
13,237,812 UART: [ldev] FE.KEYID = 1
13,250,456 UART: [ldev] Erasing FE.KEYID = 1
15,726,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,446,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,461,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,476,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,492,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,513,179 UART: [ldev] --
17,518,327 UART: [fwproc] Wait for Commands...
17,520,327 UART: [fwproc] Recv command 0x46574c44
17,522,643 UART: [fwproc] Recv'd Img size: 114448 bytes
20,968,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,046,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,162,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,705,571 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,756,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,858,419 >>> mbox cmd response: failed
12,858,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,859,280 >>> mbox cmd response: failed
12,859,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,859,842 >>> mbox cmd response: failed
Initializing fuses
2,054,438 writing to cptra_bootfsm_go
10,748,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,954,325 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,405 UART: [kat] SHA2-256
892,343 UART: [kat] SHA2-384
895,290 UART: [kat] SHA2-512-ACC
897,191 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,594 UART: [kat] LMS
1,475,790 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,117 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,706 UART: [idev] Erasing UDS.KEYID = 0
1,505,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,688 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,546,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,164 UART: [ldev] --
1,585,439 UART: [fwproc] Waiting for Commands...
1,586,174 UART: [fwproc] Received command 0x46574c44
1,586,965 UART: [fwproc] Received Image of size 114448 bytes
1,854,277 UART: ROM Fatal Error: 0x000B0021
1,855,434 >>> mbox cmd response: failed
1,855,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,440 >>> mbox cmd response: failed
1,855,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,659 UART: [kat] SHA2-256
881,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,705 UART: [kat] ++
885,857 UART: [kat] sha1
890,035 UART: [kat] SHA2-256
891,973 UART: [kat] SHA2-384
894,730 UART: [kat] SHA2-512-ACC
896,631 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,640 UART: [kat] LMS
1,474,836 UART: [kat] --
1,475,451 UART: [cold-reset] ++
1,475,901 UART: [fht] Storing FHT @ 0x50003400
1,478,550 UART: [idev] ++
1,478,718 UART: [idev] CDI.KEYID = 6
1,479,078 UART: [idev] SUBJECT.KEYID = 7
1,479,502 UART: [idev] UDS.KEYID = 0
1,479,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,228 UART: [idev] Erasing UDS.KEYID = 0
1,503,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,290 UART: [idev] --
1,513,341 UART: [ldev] ++
1,513,509 UART: [ldev] CDI.KEYID = 6
1,513,872 UART: [ldev] SUBJECT.KEYID = 5
1,514,298 UART: [ldev] AUTHORITY.KEYID = 7
1,514,761 UART: [ldev] FE.KEYID = 1
1,520,157 UART: [ldev] Erasing FE.KEYID = 1
1,545,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,932 UART: [ldev] --
1,585,369 UART: [fwproc] Waiting for Commands...
1,586,046 UART: [fwproc] Received command 0x46574c44
1,586,837 UART: [fwproc] Received Image of size 114448 bytes
2,885,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,812 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,733 >>> mbox cmd response: failed
1,707,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,739 >>> mbox cmd response: failed
1,707,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,058 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,227 UART: [kat] SHA2-512-ACC
897,128 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,656 UART: [cold-reset] ++
1,477,234 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,505,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,629 UART: [idev] --
1,515,858 UART: [ldev] ++
1,516,026 UART: [ldev] CDI.KEYID = 6
1,516,389 UART: [ldev] SUBJECT.KEYID = 5
1,516,815 UART: [ldev] AUTHORITY.KEYID = 7
1,517,278 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,548,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,369 UART: [ldev] --
1,587,702 UART: [fwproc] Waiting for Commands...
1,588,381 UART: [fwproc] Received command 0x46574c44
1,589,172 UART: [fwproc] Received Image of size 114448 bytes
1,855,908 UART: ROM Fatal Error: 0x000B0021
1,857,065 >>> mbox cmd response: failed
1,857,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,071 >>> mbox cmd response: failed
1,857,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,438 UART: [cold-reset] ++
1,476,764 UART: [fht] Storing FHT @ 0x50003400
1,479,463 UART: [idev] ++
1,479,631 UART: [idev] CDI.KEYID = 6
1,479,991 UART: [idev] SUBJECT.KEYID = 7
1,480,415 UART: [idev] UDS.KEYID = 0
1,480,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,515,076 UART: [ldev] ++
1,515,244 UART: [ldev] CDI.KEYID = 6
1,515,607 UART: [ldev] SUBJECT.KEYID = 5
1,516,033 UART: [ldev] AUTHORITY.KEYID = 7
1,516,496 UART: [ldev] FE.KEYID = 1
1,521,602 UART: [ldev] Erasing FE.KEYID = 1
1,546,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,843 UART: [ldev] --
1,586,332 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 114448 bytes
2,888,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,292 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,708,174 >>> mbox cmd response: failed
1,708,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,180 >>> mbox cmd response: failed
1,708,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,019 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,455 UART: [kat] SHA2-256
903,395 UART: [kat] SHA2-384
906,284 UART: [kat] SHA2-512-ACC
908,185 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,518 UART: [idev] ++
1,174,686 UART: [idev] CDI.KEYID = 6
1,175,046 UART: [idev] SUBJECT.KEYID = 7
1,175,470 UART: [idev] UDS.KEYID = 0
1,175,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,588 UART: [idev] Erasing UDS.KEYID = 0
1,201,155 UART: [idev] Sha1 KeyId Algorithm
1,209,563 UART: [idev] --
1,210,561 UART: [ldev] ++
1,210,729 UART: [ldev] CDI.KEYID = 6
1,211,092 UART: [ldev] SUBJECT.KEYID = 5
1,211,518 UART: [ldev] AUTHORITY.KEYID = 7
1,211,981 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,938 UART: [fwproc] Wait for Commands...
1,283,512 UART: [fwproc] Recv command 0x46574c44
1,284,240 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,966 UART: ROM Fatal Error: 0x000B0021
1,552,123 >>> mbox cmd response: failed
1,552,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,129 >>> mbox cmd response: failed
1,552,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
892,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,033 UART: [kat] ++
897,185 UART: [kat] sha1
901,325 UART: [kat] SHA2-256
903,265 UART: [kat] SHA2-384
906,020 UART: [kat] SHA2-512-ACC
907,921 UART: [kat] ECC-384
917,904 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,694 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,555 UART: [idev] --
1,210,649 UART: [ldev] ++
1,210,817 UART: [ldev] CDI.KEYID = 6
1,211,180 UART: [ldev] SUBJECT.KEYID = 5
1,211,606 UART: [ldev] AUTHORITY.KEYID = 7
1,212,069 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,463 UART: [ldev] --
1,282,752 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,088 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,433 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,574 >>> mbox cmd response: failed
1,406,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,580 >>> mbox cmd response: failed
1,406,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,970 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,403 UART: [kat] HMAC-384Kdf
922,825 UART: [kat] LMS
1,171,153 UART: [kat] --
1,171,824 UART: [cold-reset] ++
1,172,258 UART: [fht] FHT @ 0x50003400
1,174,779 UART: [idev] ++
1,174,947 UART: [idev] CDI.KEYID = 6
1,175,307 UART: [idev] SUBJECT.KEYID = 7
1,175,731 UART: [idev] UDS.KEYID = 0
1,176,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,551 UART: [idev] Erasing UDS.KEYID = 0
1,201,558 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,211,076 UART: [ldev] ++
1,211,244 UART: [ldev] CDI.KEYID = 6
1,211,607 UART: [ldev] SUBJECT.KEYID = 5
1,212,033 UART: [ldev] AUTHORITY.KEYID = 7
1,212,496 UART: [ldev] FE.KEYID = 1
1,217,512 UART: [ldev] Erasing FE.KEYID = 1
1,244,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,894 UART: [ldev] --
1,283,329 UART: [fwproc] Wait for Commands...
1,284,141 UART: [fwproc] Recv command 0x46574c44
1,284,869 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,759 UART: ROM Fatal Error: 0x000B0021
1,551,916 >>> mbox cmd response: failed
1,551,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,922 >>> mbox cmd response: failed
1,551,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,767 UART: [kat] SHA2-512-ACC
908,668 UART: [kat] ECC-384
918,355 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,171,902 UART: [cold-reset] ++
1,172,296 UART: [fht] FHT @ 0x50003400
1,174,811 UART: [idev] ++
1,174,979 UART: [idev] CDI.KEYID = 6
1,175,339 UART: [idev] SUBJECT.KEYID = 7
1,175,763 UART: [idev] UDS.KEYID = 0
1,176,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,107 UART: [idev] Erasing UDS.KEYID = 0
1,200,766 UART: [idev] Sha1 KeyId Algorithm
1,209,336 UART: [idev] --
1,210,394 UART: [ldev] ++
1,210,562 UART: [ldev] CDI.KEYID = 6
1,210,925 UART: [ldev] SUBJECT.KEYID = 5
1,211,351 UART: [ldev] AUTHORITY.KEYID = 7
1,211,814 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,120 UART: [ldev] --
1,282,469 UART: [fwproc] Wait for Commands...
1,283,121 UART: [fwproc] Recv command 0x46574c44
1,283,849 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,656 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,707 >>> mbox cmd response: failed
1,406,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,713 >>> mbox cmd response: failed
1,406,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,323 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,242,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,281,997 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,033 UART: ROM Fatal Error: 0x000B0021
1,549,190 >>> mbox cmd response: failed
1,549,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,196 >>> mbox cmd response: failed
1,549,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,377 UART: [cold-reset] ++
1,170,807 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,174,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,560 UART: [ldev] ++
1,208,728 UART: [ldev] CDI.KEYID = 6
1,209,092 UART: [ldev] SUBJECT.KEYID = 5
1,209,519 UART: [ldev] AUTHORITY.KEYID = 7
1,209,982 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,282,135 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,180 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,403 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,237 >>> mbox cmd response: failed
1,403,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,243 >>> mbox cmd response: failed
1,403,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,571 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,894 UART: [fht] FHT @ 0x50003400
1,172,420 UART: [idev] ++
1,172,588 UART: [idev] CDI.KEYID = 6
1,172,949 UART: [idev] SUBJECT.KEYID = 7
1,173,374 UART: [idev] UDS.KEYID = 0
1,173,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,592 UART: [idev] Erasing UDS.KEYID = 0
1,197,698 UART: [idev] Sha1 KeyId Algorithm
1,206,714 UART: [idev] --
1,207,759 UART: [ldev] ++
1,207,927 UART: [ldev] CDI.KEYID = 6
1,208,291 UART: [ldev] SUBJECT.KEYID = 5
1,208,718 UART: [ldev] AUTHORITY.KEYID = 7
1,209,181 UART: [ldev] FE.KEYID = 1
1,214,637 UART: [ldev] Erasing FE.KEYID = 1
1,241,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,467 UART: [ldev] --
1,279,953 UART: [fwproc] Wait for Commands...
1,280,632 UART: [fwproc] Recv command 0x46574c44
1,281,365 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,630 UART: ROM Fatal Error: 0x000B0021
1,548,787 >>> mbox cmd response: failed
1,548,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,793 >>> mbox cmd response: failed
1,548,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,491 UART: [kat] LMS
1,169,803 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,174,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,023 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,916 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,158 >>> mbox cmd response: failed
1,402,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,164 >>> mbox cmd response: failed
1,402,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,372 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,825 writing to cptra_bootfsm_go
192,950 UART:
193,312 UART: Running Caliptra ROM ...
194,513 UART:
194,671 UART: [state] CFI Enabled
262,162 UART: [state] LifecycleState = Unprovisioned
264,130 UART: [state] DebugLocked = No
266,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,624 UART: [kat] SHA2-256
441,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,835 UART: [kat] ++
452,317 UART: [kat] sha1
463,305 UART: [kat] SHA2-256
465,988 UART: [kat] SHA2-384
472,775 UART: [kat] SHA2-512-ACC
475,110 UART: [kat] ECC-384
2,766,156 UART: [kat] HMAC-384Kdf
2,798,901 UART: [kat] LMS
3,989,191 UART: [kat] --
3,994,501 UART: [cold-reset] ++
3,996,008 UART: [fht] Storing FHT @ 0x50003400
4,007,723 UART: [idev] ++
4,008,341 UART: [idev] CDI.KEYID = 6
4,009,269 UART: [idev] SUBJECT.KEYID = 7
4,010,498 UART: [idev] UDS.KEYID = 0
4,013,039 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,659 UART: [idev] Erasing UDS.KEYID = 0
7,330,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,165 UART: [idev] --
7,355,562 UART: [ldev] ++
7,356,185 UART: [ldev] CDI.KEYID = 6
7,357,069 UART: [ldev] SUBJECT.KEYID = 5
7,358,284 UART: [ldev] AUTHORITY.KEYID = 7
7,359,575 UART: [ldev] FE.KEYID = 1
7,386,868 UART: [ldev] Erasing FE.KEYID = 1
10,718,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,492 UART: [ldev] --
13,100,838 UART: [fwproc] Waiting for Commands...
13,103,442 UART: [fwproc] Received command 0x46574c44
13,105,629 UART: [fwproc] Received Image of size 114124 bytes
16,049,588 UART: ROM Fatal Error: 0x000B0022
16,052,989 >>> mbox cmd response: failed
16,053,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,053,655 >>> mbox cmd response: failed
16,053,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,054,235 >>> mbox cmd response: failed
Initializing fuses
2,055,623 writing to cptra_bootfsm_go
2,244,929 UART:
2,245,273 UART: Running Caliptra ROM ...
2,246,411 UART:
2,246,580 UART: [state] CFI Enabled
2,304,312 UART: [state] LifecycleState = Unprovisioned
2,306,247 UART: [state] DebugLocked = No
2,307,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,189 UART: [kat] SHA2-256
2,482,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,405 UART: [kat] ++
2,493,954 UART: [kat] sha1
2,504,365 UART: [kat] SHA2-256
2,507,052 UART: [kat] SHA2-384
2,512,391 UART: [kat] SHA2-512-ACC
2,514,750 UART: [kat] ECC-384
4,810,701 UART: [kat] HMAC-384Kdf
4,841,761 UART: [kat] LMS
6,032,077 UART: [kat] --
6,038,140 UART: [cold-reset] ++
6,040,674 UART: [fht] Storing FHT @ 0x50003400
6,052,612 UART: [idev] ++
6,053,195 UART: [idev] CDI.KEYID = 6
6,054,079 UART: [idev] SUBJECT.KEYID = 7
6,055,354 UART: [idev] UDS.KEYID = 0
6,057,672 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,201,307 UART: [idev] Erasing UDS.KEYID = 0
9,387,549 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,285 UART: [idev] --
9,414,058 UART: [ldev] ++
9,414,632 UART: [ldev] CDI.KEYID = 6
9,415,599 UART: [ldev] SUBJECT.KEYID = 5
9,416,815 UART: [ldev] AUTHORITY.KEYID = 7
9,418,124 UART: [ldev] FE.KEYID = 1
9,462,922 UART: [ldev] Erasing FE.KEYID = 1
12,798,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,139,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,084 UART: [ldev] --
15,177,488 UART: [fwproc] Waiting for Commands...
15,180,020 UART: [fwproc] Received command 0x46574c44
15,182,212 UART: [fwproc] Received Image of size 114124 bytes
19,231,306 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,305,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,374,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,744 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,806,754 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,843,475 >>> mbox cmd response: failed
15,844,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,386 >>> mbox cmd response: failed
15,844,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,954 >>> mbox cmd response: failed
Initializing fuses
2,063,113 writing to cptra_bootfsm_go
5,861,171 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,935,257 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,495 UART:
192,869 UART: Running Caliptra ROM ...
194,085 UART:
603,513 UART: [state] CFI Enabled
618,320 UART: [state] LifecycleState = Unprovisioned
620,256 UART: [state] DebugLocked = No
622,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,894 UART: [kat] SHA2-256
796,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,213 UART: [kat] ++
807,655 UART: [kat] sha1
818,533 UART: [kat] SHA2-256
821,217 UART: [kat] SHA2-384
826,924 UART: [kat] SHA2-512-ACC
829,264 UART: [kat] ECC-384
3,111,682 UART: [kat] HMAC-384Kdf
3,123,164 UART: [kat] LMS
4,313,265 UART: [kat] --
4,318,692 UART: [cold-reset] ++
4,320,472 UART: [fht] Storing FHT @ 0x50003400
4,332,850 UART: [idev] ++
4,333,476 UART: [idev] CDI.KEYID = 6
4,334,391 UART: [idev] SUBJECT.KEYID = 7
4,335,660 UART: [idev] UDS.KEYID = 0
4,338,233 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,825 UART: [idev] Erasing UDS.KEYID = 0
7,623,805 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,943 UART: [idev] --
7,647,675 UART: [ldev] ++
7,648,259 UART: [ldev] CDI.KEYID = 6
7,649,151 UART: [ldev] SUBJECT.KEYID = 5
7,650,337 UART: [ldev] AUTHORITY.KEYID = 7
7,651,683 UART: [ldev] FE.KEYID = 1
7,662,734 UART: [ldev] Erasing FE.KEYID = 1
10,950,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,144 UART: [ldev] --
13,312,790 UART: [fwproc] Waiting for Commands...
13,315,367 UART: [fwproc] Received command 0x46574c44
13,317,563 UART: [fwproc] Received Image of size 114124 bytes
16,259,212 UART: ROM Fatal Error: 0x000B0022
16,262,647 >>> mbox cmd response: failed
16,263,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,263,435 >>> mbox cmd response: failed
16,263,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,263,998 >>> mbox cmd response: failed
Initializing fuses
2,056,647 writing to cptra_bootfsm_go
2,245,967 UART:
2,246,323 UART: Running Caliptra ROM ...
2,247,615 UART:
4,194,385 UART: [state] CFI Enabled
4,209,416 UART: [state] LifecycleState = Unprovisioned
4,211,394 UART: [state] DebugLocked = No
4,212,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,218,281 UART: [kat] SHA2-256
4,388,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,398,557 UART: [kat] ++
4,399,054 UART: [kat] sha1
4,410,167 UART: [kat] SHA2-256
4,412,845 UART: [kat] SHA2-384
4,418,843 UART: [kat] SHA2-512-ACC
4,421,196 UART: [kat] ECC-384
6,706,144 UART: [kat] HMAC-384Kdf
6,717,910 UART: [kat] LMS
7,908,002 UART: [kat] --
7,913,262 UART: [cold-reset] ++
7,915,200 UART: [fht] Storing FHT @ 0x50003400
7,925,992 UART: [idev] ++
7,926,564 UART: [idev] CDI.KEYID = 6
7,927,719 UART: [idev] SUBJECT.KEYID = 7
7,928,857 UART: [idev] UDS.KEYID = 0
7,931,175 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,074,478 UART: [idev] Erasing UDS.KEYID = 0
11,217,099 UART: [idev] Using Sha1 for KeyId Algorithm
11,239,619 UART: [idev] --
11,243,340 UART: [ldev] ++
11,243,965 UART: [ldev] CDI.KEYID = 6
11,244,927 UART: [ldev] SUBJECT.KEYID = 5
11,246,158 UART: [ldev] AUTHORITY.KEYID = 7
11,247,397 UART: [ldev] FE.KEYID = 1
11,258,208 UART: [ldev] Erasing FE.KEYID = 1
14,548,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,843,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,858,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,873,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,887,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,905,583 UART: [ldev] --
16,909,562 UART: [fwproc] Waiting for Commands...
16,912,148 UART: [fwproc] Received command 0x46574c44
16,914,400 UART: [fwproc] Received Image of size 114124 bytes
20,972,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,051,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,119,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,437,590 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,129,282 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,038,032 >>> mbox cmd response: failed
16,038,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,039,072 >>> mbox cmd response: failed
16,039,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,039,643 >>> mbox cmd response: failed
Initializing fuses
2,063,935 writing to cptra_bootfsm_go
7,955,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,893,230 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,268 UART:
192,643 UART: Running Caliptra ROM ...
193,758 UART:
193,901 UART: [state] CFI Enabled
261,547 UART: [state] LifecycleState = Unprovisioned
263,411 UART: [state] DebugLocked = No
266,167 UART: [state] WD Timer not started. Device not locked for debugging
269,338 UART: [kat] SHA2-256
448,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,051 UART: [kat] ++
460,507 UART: [kat] sha1
470,786 UART: [kat] SHA2-256
473,788 UART: [kat] SHA2-384
479,443 UART: [kat] SHA2-512-ACC
482,376 UART: [kat] ECC-384
2,948,688 UART: [kat] HMAC-384Kdf
2,970,364 UART: [kat] LMS
3,499,831 UART: [kat] --
3,502,907 UART: [cold-reset] ++
3,504,413 UART: [fht] FHT @ 0x50003400
3,515,505 UART: [idev] ++
3,516,067 UART: [idev] CDI.KEYID = 6
3,516,955 UART: [idev] SUBJECT.KEYID = 7
3,518,225 UART: [idev] UDS.KEYID = 0
3,520,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,707 UART: [idev] Erasing UDS.KEYID = 0
6,027,058 UART: [idev] Sha1 KeyId Algorithm
6,050,787 UART: [idev] --
6,055,501 UART: [ldev] ++
6,056,084 UART: [ldev] CDI.KEYID = 6
6,056,983 UART: [ldev] SUBJECT.KEYID = 5
6,058,152 UART: [ldev] AUTHORITY.KEYID = 7
6,059,393 UART: [ldev] FE.KEYID = 1
6,098,381 UART: [ldev] Erasing FE.KEYID = 1
8,602,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,501 UART: [ldev] --
10,413,793 UART: [fwproc] Wait for Commands...
10,416,122 UART: [fwproc] Recv command 0x46574c44
10,418,241 UART: [fwproc] Recv'd Img size: 114448 bytes
12,710,037 UART: ROM Fatal Error: 0x000B0022
12,713,175 >>> mbox cmd response: failed
12,713,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,894 >>> mbox cmd response: failed
12,714,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,714,454 >>> mbox cmd response: failed
Initializing fuses
2,054,614 writing to cptra_bootfsm_go
2,243,944 UART:
2,244,291 UART: Running Caliptra ROM ...
2,245,426 UART:
2,245,612 UART: [state] CFI Enabled
2,311,121 UART: [state] LifecycleState = Unprovisioned
2,313,006 UART: [state] DebugLocked = No
2,314,132 UART: [state] WD Timer not started. Device not locked for debugging
2,317,882 UART: [kat] SHA2-256
2,497,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,584 UART: [kat] ++
2,509,137 UART: [kat] sha1
2,519,873 UART: [kat] SHA2-256
2,522,884 UART: [kat] SHA2-384
2,528,869 UART: [kat] SHA2-512-ACC
2,531,812 UART: [kat] ECC-384
4,996,440 UART: [kat] HMAC-384Kdf
5,020,657 UART: [kat] LMS
5,550,112 UART: [kat] --
5,552,172 UART: [cold-reset] ++
5,554,658 UART: [fht] FHT @ 0x50003400
5,565,657 UART: [idev] ++
5,566,226 UART: [idev] CDI.KEYID = 6
5,567,136 UART: [idev] SUBJECT.KEYID = 7
5,568,352 UART: [idev] UDS.KEYID = 0
5,570,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,725 UART: [idev] Erasing UDS.KEYID = 0
8,073,967 UART: [idev] Sha1 KeyId Algorithm
8,096,226 UART: [idev] --
8,099,414 UART: [ldev] ++
8,099,985 UART: [ldev] CDI.KEYID = 6
8,100,897 UART: [ldev] SUBJECT.KEYID = 5
8,102,059 UART: [ldev] AUTHORITY.KEYID = 7
8,103,455 UART: [ldev] FE.KEYID = 1
8,129,921 UART: [ldev] Erasing FE.KEYID = 1
10,631,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,360 UART: [ldev] --
12,442,285 UART: [fwproc] Wait for Commands...
12,444,003 UART: [fwproc] Recv command 0x46574c44
12,446,103 UART: [fwproc] Recv'd Img size: 114448 bytes
15,849,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,308,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,365,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,471,467 >>> mbox cmd response: failed
12,472,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,387 >>> mbox cmd response: failed
12,472,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,943 >>> mbox cmd response: failed
Initializing fuses
2,054,316 writing to cptra_bootfsm_go
5,433,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,099,433 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,615 writing to cptra_bootfsm_go
192,774 UART:
193,128 UART: Running Caliptra ROM ...
194,248 UART:
603,690 UART: [state] CFI Enabled
619,298 UART: [state] LifecycleState = Unprovisioned
621,175 UART: [state] DebugLocked = No
622,946 UART: [state] WD Timer not started. Device not locked for debugging
626,072 UART: [kat] SHA2-256
805,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,764 UART: [kat] ++
817,298 UART: [kat] sha1
828,724 UART: [kat] SHA2-256
831,728 UART: [kat] SHA2-384
837,651 UART: [kat] SHA2-512-ACC
840,593 UART: [kat] ECC-384
3,278,602 UART: [kat] HMAC-384Kdf
3,290,473 UART: [kat] LMS
3,819,923 UART: [kat] --
3,824,370 UART: [cold-reset] ++
3,826,416 UART: [fht] FHT @ 0x50003400
3,836,424 UART: [idev] ++
3,837,019 UART: [idev] CDI.KEYID = 6
3,837,935 UART: [idev] SUBJECT.KEYID = 7
3,839,103 UART: [idev] UDS.KEYID = 0
3,842,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,039 UART: [idev] Erasing UDS.KEYID = 0
6,311,085 UART: [idev] Sha1 KeyId Algorithm
6,334,263 UART: [idev] --
6,338,311 UART: [ldev] ++
6,338,882 UART: [ldev] CDI.KEYID = 6
6,339,793 UART: [ldev] SUBJECT.KEYID = 5
6,341,011 UART: [ldev] AUTHORITY.KEYID = 7
6,342,244 UART: [ldev] FE.KEYID = 1
6,351,976 UART: [ldev] Erasing FE.KEYID = 1
8,828,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,279 UART: [ldev] --
10,616,476 UART: [fwproc] Wait for Commands...
10,618,267 UART: [fwproc] Recv command 0x46574c44
10,620,312 UART: [fwproc] Recv'd Img size: 114448 bytes
12,912,465 UART: ROM Fatal Error: 0x000B0022
12,915,635 >>> mbox cmd response: failed
12,915,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,292 >>> mbox cmd response: failed
12,916,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,883 >>> mbox cmd response: failed
Initializing fuses
2,052,870 writing to cptra_bootfsm_go
2,242,228 UART:
2,242,581 UART: Running Caliptra ROM ...
2,243,659 UART:
7,523,691 UART: [state] CFI Enabled
7,536,639 UART: [state] LifecycleState = Unprovisioned
7,538,499 UART: [state] DebugLocked = No
7,541,055 UART: [state] WD Timer not started. Device not locked for debugging
7,544,591 UART: [kat] SHA2-256
7,723,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,735,263 UART: [kat] ++
7,735,721 UART: [kat] sha1
7,747,037 UART: [kat] SHA2-256
7,750,056 UART: [kat] SHA2-384
7,756,532 UART: [kat] SHA2-512-ACC
7,759,534 UART: [kat] ECC-384
10,199,507 UART: [kat] HMAC-384Kdf
10,212,892 UART: [kat] LMS
10,742,367 UART: [kat] --
10,745,128 UART: [cold-reset] ++
10,747,228 UART: [fht] FHT @ 0x50003400
10,759,718 UART: [idev] ++
10,760,289 UART: [idev] CDI.KEYID = 6
10,761,199 UART: [idev] SUBJECT.KEYID = 7
10,762,412 UART: [idev] UDS.KEYID = 0
10,764,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,908,598 UART: [idev] Erasing UDS.KEYID = 0
13,232,668 UART: [idev] Sha1 KeyId Algorithm
13,255,134 UART: [idev] --
13,259,667 UART: [ldev] ++
13,260,237 UART: [ldev] CDI.KEYID = 6
13,261,182 UART: [ldev] SUBJECT.KEYID = 5
13,262,339 UART: [ldev] AUTHORITY.KEYID = 7
13,263,646 UART: [ldev] FE.KEYID = 1
13,273,891 UART: [ldev] Erasing FE.KEYID = 1
15,744,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,461,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,477,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,493,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,509,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,529,650 UART: [ldev] --
17,534,372 UART: [fwproc] Wait for Commands...
17,536,992 UART: [fwproc] Recv command 0x46574c44
17,539,102 UART: [fwproc] Recv'd Img size: 114448 bytes
20,939,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,006,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,075,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,394,359 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,698,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,703,180 >>> mbox cmd response: failed
12,703,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,704,149 >>> mbox cmd response: failed
12,704,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,704,716 >>> mbox cmd response: failed
Initializing fuses
2,059,136 writing to cptra_bootfsm_go
10,856,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,442,200 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,221 UART:
192,592 UART: Running Caliptra ROM ...
194,021 UART:
194,179 UART: [state] CFI Enabled
263,706 UART: [state] LifecycleState = Unprovisioned
266,082 UART: [state] DebugLocked = No
267,323 UART: [state] WD Timer not started. Device not locked for debugging
271,697 UART: [kat] SHA2-256
461,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,366 UART: [kat] ++
472,848 UART: [kat] sha1
484,863 UART: [kat] SHA2-256
487,882 UART: [kat] SHA2-384
493,178 UART: [kat] SHA2-512-ACC
495,791 UART: [kat] ECC-384
2,945,646 UART: [kat] HMAC-384Kdf
2,971,233 UART: [kat] LMS
3,502,982 UART: [kat] --
3,507,081 UART: [cold-reset] ++
3,508,475 UART: [fht] FHT @ 0x50003400
3,520,330 UART: [idev] ++
3,521,004 UART: [idev] CDI.KEYID = 6
3,521,950 UART: [idev] SUBJECT.KEYID = 7
3,523,163 UART: [idev] UDS.KEYID = 0
3,525,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,054 UART: [idev] Erasing UDS.KEYID = 0
6,026,267 UART: [idev] Sha1 KeyId Algorithm
6,049,510 UART: [idev] --
6,053,814 UART: [ldev] ++
6,054,533 UART: [ldev] CDI.KEYID = 6
6,055,450 UART: [ldev] SUBJECT.KEYID = 5
6,056,556 UART: [ldev] AUTHORITY.KEYID = 7
6,057,789 UART: [ldev] FE.KEYID = 1
6,097,385 UART: [ldev] Erasing FE.KEYID = 1
8,608,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,228 UART: [ldev] --
10,411,388 UART: [fwproc] Wait for Commands...
10,413,000 UART: [fwproc] Recv command 0x46574c44
10,415,263 UART: [fwproc] Recv'd Img size: 114448 bytes
12,740,791 UART: ROM Fatal Error: 0x000B0022
12,744,478 >>> mbox cmd response: failed
12,744,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,250 >>> mbox cmd response: failed
12,745,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,809 >>> mbox cmd response: failed
Initializing fuses
2,062,919 writing to cptra_bootfsm_go
2,252,291 UART:
2,252,646 UART: Running Caliptra ROM ...
2,253,782 UART:
2,253,947 UART: [state] CFI Enabled
2,318,389 UART: [state] LifecycleState = Unprovisioned
2,320,724 UART: [state] DebugLocked = No
2,322,646 UART: [state] WD Timer not started. Device not locked for debugging
2,326,338 UART: [kat] SHA2-256
2,516,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,021 UART: [kat] ++
2,527,571 UART: [kat] sha1
2,538,196 UART: [kat] SHA2-256
2,541,211 UART: [kat] SHA2-384
2,546,115 UART: [kat] SHA2-512-ACC
2,548,744 UART: [kat] ECC-384
5,002,222 UART: [kat] HMAC-384Kdf
5,025,214 UART: [kat] LMS
5,556,959 UART: [kat] --
5,561,111 UART: [cold-reset] ++
5,561,958 UART: [fht] FHT @ 0x50003400
5,572,394 UART: [idev] ++
5,573,082 UART: [idev] CDI.KEYID = 6
5,574,105 UART: [idev] SUBJECT.KEYID = 7
5,575,260 UART: [idev] UDS.KEYID = 0
5,577,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,721,601 UART: [idev] Erasing UDS.KEYID = 0
8,080,205 UART: [idev] Sha1 KeyId Algorithm
8,101,763 UART: [idev] --
8,106,809 UART: [ldev] ++
8,107,552 UART: [ldev] CDI.KEYID = 6
8,108,457 UART: [ldev] SUBJECT.KEYID = 5
8,109,615 UART: [ldev] AUTHORITY.KEYID = 7
8,110,843 UART: [ldev] FE.KEYID = 1
8,155,596 UART: [ldev] Erasing FE.KEYID = 1
10,664,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,893 UART: [ldev] --
12,468,854 UART: [fwproc] Wait for Commands...
12,470,791 UART: [fwproc] Recv command 0x46574c44
12,473,043 UART: [fwproc] Recv'd Img size: 114448 bytes
15,923,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,180 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,113,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,656,928 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,439,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,671,164 >>> mbox cmd response: failed
12,671,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,077 >>> mbox cmd response: failed
12,672,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,647 >>> mbox cmd response: failed
Initializing fuses
2,058,758 writing to cptra_bootfsm_go
5,486,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,787,955 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,412 UART:
192,763 UART: Running Caliptra ROM ...
193,967 UART:
603,667 UART: [state] CFI Enabled
619,380 UART: [state] LifecycleState = Unprovisioned
621,758 UART: [state] DebugLocked = No
623,836 UART: [state] WD Timer not started. Device not locked for debugging
628,044 UART: [kat] SHA2-256
817,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,709 UART: [kat] ++
829,299 UART: [kat] sha1
842,239 UART: [kat] SHA2-256
845,230 UART: [kat] SHA2-384
852,024 UART: [kat] SHA2-512-ACC
854,614 UART: [kat] ECC-384
3,298,050 UART: [kat] HMAC-384Kdf
3,310,722 UART: [kat] LMS
3,842,548 UART: [kat] --
3,846,760 UART: [cold-reset] ++
3,848,637 UART: [fht] FHT @ 0x50003400
3,860,435 UART: [idev] ++
3,861,110 UART: [idev] CDI.KEYID = 6
3,862,046 UART: [idev] SUBJECT.KEYID = 7
3,863,316 UART: [idev] UDS.KEYID = 0
3,865,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,854 UART: [idev] Erasing UDS.KEYID = 0
6,344,368 UART: [idev] Sha1 KeyId Algorithm
6,365,603 UART: [idev] --
6,369,837 UART: [ldev] ++
6,370,525 UART: [ldev] CDI.KEYID = 6
6,371,458 UART: [ldev] SUBJECT.KEYID = 5
6,372,624 UART: [ldev] AUTHORITY.KEYID = 7
6,373,801 UART: [ldev] FE.KEYID = 1
6,384,449 UART: [ldev] Erasing FE.KEYID = 1
8,864,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,569 UART: [ldev] --
10,653,135 UART: [fwproc] Wait for Commands...
10,654,962 UART: [fwproc] Recv command 0x46574c44
10,657,273 UART: [fwproc] Recv'd Img size: 114448 bytes
12,982,704 UART: ROM Fatal Error: 0x000B0022
12,986,315 >>> mbox cmd response: failed
12,986,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,094 >>> mbox cmd response: failed
12,987,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,667 >>> mbox cmd response: failed
Initializing fuses
2,055,507 writing to cptra_bootfsm_go
2,244,769 UART:
2,245,132 UART: Running Caliptra ROM ...
2,246,218 UART:
7,460,446 UART: [state] CFI Enabled
7,476,174 UART: [state] LifecycleState = Unprovisioned
7,478,579 UART: [state] DebugLocked = No
7,480,182 UART: [state] WD Timer not started. Device not locked for debugging
7,484,956 UART: [kat] SHA2-256
7,674,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,685,622 UART: [kat] ++
7,686,164 UART: [kat] sha1
7,697,540 UART: [kat] SHA2-256
7,700,542 UART: [kat] SHA2-384
7,707,680 UART: [kat] SHA2-512-ACC
7,710,246 UART: [kat] ECC-384
10,155,117 UART: [kat] HMAC-384Kdf
10,166,913 UART: [kat] LMS
10,698,758 UART: [kat] --
10,701,941 UART: [cold-reset] ++
10,703,662 UART: [fht] FHT @ 0x50003400
10,715,991 UART: [idev] ++
10,716,663 UART: [idev] CDI.KEYID = 6
10,717,624 UART: [idev] SUBJECT.KEYID = 7
10,718,834 UART: [idev] UDS.KEYID = 0
10,721,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,864,983 UART: [idev] Erasing UDS.KEYID = 0
13,199,980 UART: [idev] Sha1 KeyId Algorithm
13,222,506 UART: [idev] --
13,228,366 UART: [ldev] ++
13,229,054 UART: [ldev] CDI.KEYID = 6
13,229,964 UART: [ldev] SUBJECT.KEYID = 5
13,231,064 UART: [ldev] AUTHORITY.KEYID = 7
13,232,350 UART: [ldev] FE.KEYID = 1
13,243,965 UART: [ldev] Erasing FE.KEYID = 1
15,720,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,439,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,454,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,469,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,484,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,505,349 UART: [ldev] --
17,511,531 UART: [fwproc] Wait for Commands...
17,513,649 UART: [fwproc] Recv command 0x46574c44
17,515,922 UART: [fwproc] Recv'd Img size: 114448 bytes
20,968,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,046,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,162,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,705,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,764,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,874,270 >>> mbox cmd response: failed
12,875,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,875,570 >>> mbox cmd response: failed
12,875,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,876,123 >>> mbox cmd response: failed
Initializing fuses
2,057,927 writing to cptra_bootfsm_go
10,732,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,938,318 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,227 UART: [kat] SHA2-256
892,165 UART: [kat] SHA2-384
894,970 UART: [kat] SHA2-512-ACC
896,871 UART: [kat] ECC-384
902,382 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,475,885 UART: [cold-reset] ++
1,476,219 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,253 UART: [ldev] ++
1,514,421 UART: [ldev] CDI.KEYID = 6
1,514,784 UART: [ldev] SUBJECT.KEYID = 5
1,515,210 UART: [ldev] AUTHORITY.KEYID = 7
1,515,673 UART: [ldev] FE.KEYID = 1
1,520,771 UART: [ldev] Erasing FE.KEYID = 1
1,546,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,460 UART: [ldev] --
1,585,941 UART: [fwproc] Waiting for Commands...
1,586,802 UART: [fwproc] Received command 0x46574c44
1,587,593 UART: [fwproc] Received Image of size 114448 bytes
1,853,749 UART: ROM Fatal Error: 0x000B0022
1,854,906 >>> mbox cmd response: failed
1,854,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,912 >>> mbox cmd response: failed
1,854,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,597 UART: [kat] SHA2-256
881,528 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,643 UART: [kat] ++
885,795 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,058 UART: [kat] HMAC-384Kdf
906,704 UART: [kat] LMS
1,474,900 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,479,036 UART: [idev] ++
1,479,204 UART: [idev] CDI.KEYID = 6
1,479,564 UART: [idev] SUBJECT.KEYID = 7
1,479,988 UART: [idev] UDS.KEYID = 0
1,480,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,034 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,526 UART: [ldev] --
1,585,969 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46574c44
1,587,523 UART: [fwproc] Received Image of size 114448 bytes
2,886,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,985 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,337 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,326 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,705 >>> mbox cmd response: failed
1,707,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,711 >>> mbox cmd response: failed
1,707,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,188 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,170 UART: [kat] SHA2-256
882,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,216 UART: [kat] ++
886,368 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,981 UART: [kat] LMS
1,476,177 UART: [kat] --
1,477,088 UART: [cold-reset] ++
1,477,518 UART: [fht] Storing FHT @ 0x50003400
1,480,371 UART: [idev] ++
1,480,539 UART: [idev] CDI.KEYID = 6
1,480,899 UART: [idev] SUBJECT.KEYID = 7
1,481,323 UART: [idev] UDS.KEYID = 0
1,481,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,569 UART: [idev] Erasing UDS.KEYID = 0
1,506,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,199 UART: [idev] --
1,516,256 UART: [ldev] ++
1,516,424 UART: [ldev] CDI.KEYID = 6
1,516,787 UART: [ldev] SUBJECT.KEYID = 5
1,517,213 UART: [ldev] AUTHORITY.KEYID = 7
1,517,676 UART: [ldev] FE.KEYID = 1
1,522,928 UART: [ldev] Erasing FE.KEYID = 1
1,549,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,089 UART: [ldev] --
1,588,564 UART: [fwproc] Waiting for Commands...
1,589,283 UART: [fwproc] Received command 0x46574c44
1,590,074 UART: [fwproc] Received Image of size 114448 bytes
1,857,048 UART: ROM Fatal Error: 0x000B0022
1,858,205 >>> mbox cmd response: failed
1,858,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,211 >>> mbox cmd response: failed
1,858,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,952 UART: [kat] SHA2-256
882,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,998 UART: [kat] ++
887,150 UART: [kat] sha1
891,508 UART: [kat] SHA2-256
893,446 UART: [kat] SHA2-384
896,125 UART: [kat] SHA2-512-ACC
898,026 UART: [kat] ECC-384
903,731 UART: [kat] HMAC-384Kdf
908,235 UART: [kat] LMS
1,476,431 UART: [kat] --
1,477,362 UART: [cold-reset] ++
1,477,764 UART: [fht] Storing FHT @ 0x50003400
1,480,629 UART: [idev] ++
1,480,797 UART: [idev] CDI.KEYID = 6
1,481,157 UART: [idev] SUBJECT.KEYID = 7
1,481,581 UART: [idev] UDS.KEYID = 0
1,481,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,717 UART: [idev] Erasing UDS.KEYID = 0
1,506,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,853 UART: [idev] --
1,515,772 UART: [ldev] ++
1,515,940 UART: [ldev] CDI.KEYID = 6
1,516,303 UART: [ldev] SUBJECT.KEYID = 5
1,516,729 UART: [ldev] AUTHORITY.KEYID = 7
1,517,192 UART: [ldev] FE.KEYID = 1
1,522,210 UART: [ldev] Erasing FE.KEYID = 1
1,547,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,679 UART: [ldev] --
1,587,102 UART: [fwproc] Waiting for Commands...
1,587,729 UART: [fwproc] Received command 0x46574c44
1,588,520 UART: [fwproc] Received Image of size 114448 bytes
2,887,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,802 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,785 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,709,930 >>> mbox cmd response: failed
1,709,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,936 >>> mbox cmd response: failed
1,709,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,111 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,180 UART: [kat] SHA2-256
893,830 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,955 UART: [kat] ++
898,107 UART: [kat] sha1
902,439 UART: [kat] SHA2-256
904,379 UART: [kat] SHA2-384
907,238 UART: [kat] SHA2-512-ACC
909,139 UART: [kat] ECC-384
918,730 UART: [kat] HMAC-384Kdf
923,266 UART: [kat] LMS
1,171,594 UART: [kat] --
1,172,531 UART: [cold-reset] ++
1,172,993 UART: [fht] FHT @ 0x50003400
1,175,788 UART: [idev] ++
1,175,956 UART: [idev] CDI.KEYID = 6
1,176,316 UART: [idev] SUBJECT.KEYID = 7
1,176,740 UART: [idev] UDS.KEYID = 0
1,177,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,653 UART: [idev] Sha1 KeyId Algorithm
1,210,331 UART: [idev] --
1,211,341 UART: [ldev] ++
1,211,509 UART: [ldev] CDI.KEYID = 6
1,211,872 UART: [ldev] SUBJECT.KEYID = 5
1,212,298 UART: [ldev] AUTHORITY.KEYID = 7
1,212,761 UART: [ldev] FE.KEYID = 1
1,217,985 UART: [ldev] Erasing FE.KEYID = 1
1,244,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,845 UART: [ldev] --
1,283,340 UART: [fwproc] Wait for Commands...
1,284,002 UART: [fwproc] Recv command 0x46574c44
1,284,730 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,272 UART: ROM Fatal Error: 0x000B0022
1,552,429 >>> mbox cmd response: failed
1,552,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,435 >>> mbox cmd response: failed
1,552,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
902,017 UART: [kat] SHA2-256
903,957 UART: [kat] SHA2-384
906,526 UART: [kat] SHA2-512-ACC
908,427 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,994 UART: [kat] LMS
1,171,322 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,201,485 UART: [idev] Sha1 KeyId Algorithm
1,209,869 UART: [idev] --
1,211,053 UART: [ldev] ++
1,211,221 UART: [ldev] CDI.KEYID = 6
1,211,584 UART: [ldev] SUBJECT.KEYID = 5
1,212,010 UART: [ldev] AUTHORITY.KEYID = 7
1,212,473 UART: [ldev] FE.KEYID = 1
1,217,651 UART: [ldev] Erasing FE.KEYID = 1
1,243,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,827 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,834 UART: [fwproc] Recv command 0x46574c44
1,284,562 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,521 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,405,580 >>> mbox cmd response: failed
1,405,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,586 >>> mbox cmd response: failed
1,405,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,250 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,864 UART: [kat] SHA2-256
903,804 UART: [kat] SHA2-384
906,587 UART: [kat] SHA2-512-ACC
908,488 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,129 UART: [kat] LMS
1,171,457 UART: [kat] --
1,172,346 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,207 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,654 UART: [idev] --
1,210,756 UART: [ldev] ++
1,210,924 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,713 UART: [ldev] AUTHORITY.KEYID = 7
1,212,176 UART: [ldev] FE.KEYID = 1
1,217,542 UART: [ldev] Erasing FE.KEYID = 1
1,243,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,238 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,207 UART: [fwproc] Recv command 0x46574c44
1,283,935 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,067 UART: ROM Fatal Error: 0x000B0022
1,551,224 >>> mbox cmd response: failed
1,551,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,230 >>> mbox cmd response: failed
1,551,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
893,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,014 UART: [kat] ++
898,166 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
919,087 UART: [kat] HMAC-384Kdf
923,657 UART: [kat] LMS
1,171,985 UART: [kat] --
1,173,008 UART: [cold-reset] ++
1,173,502 UART: [fht] FHT @ 0x50003400
1,176,245 UART: [idev] ++
1,176,413 UART: [idev] CDI.KEYID = 6
1,176,773 UART: [idev] SUBJECT.KEYID = 7
1,177,197 UART: [idev] UDS.KEYID = 0
1,177,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,537 UART: [idev] Erasing UDS.KEYID = 0
1,202,698 UART: [idev] Sha1 KeyId Algorithm
1,211,166 UART: [idev] --
1,212,462 UART: [ldev] ++
1,212,630 UART: [ldev] CDI.KEYID = 6
1,212,993 UART: [ldev] SUBJECT.KEYID = 5
1,213,419 UART: [ldev] AUTHORITY.KEYID = 7
1,213,882 UART: [ldev] FE.KEYID = 1
1,219,068 UART: [ldev] Erasing FE.KEYID = 1
1,245,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,004 UART: [ldev] --
1,284,421 UART: [fwproc] Wait for Commands...
1,285,011 UART: [fwproc] Recv command 0x46574c44
1,285,739 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,022 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,404,821 >>> mbox cmd response: failed
1,404,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,827 >>> mbox cmd response: failed
1,404,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,559 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,696 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,336 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,607 UART: ROM Fatal Error: 0x000B0022
1,549,764 >>> mbox cmd response: failed
1,549,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,770 >>> mbox cmd response: failed
1,549,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,280 UART: [kat] LMS
1,168,592 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,173,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,042 UART: [ldev] ++
1,208,210 UART: [ldev] CDI.KEYID = 6
1,208,574 UART: [ldev] SUBJECT.KEYID = 5
1,209,001 UART: [ldev] AUTHORITY.KEYID = 7
1,209,464 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,402 UART: [ldev] --
1,279,826 UART: [fwproc] Wait for Commands...
1,280,515 UART: [fwproc] Recv command 0x46574c44
1,281,248 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,951 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,681 >>> mbox cmd response: failed
1,401,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,687 >>> mbox cmd response: failed
1,401,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,419 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
916,871 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,878 UART: [cold-reset] ++
1,171,378 UART: [fht] FHT @ 0x50003400
1,173,942 UART: [idev] ++
1,174,110 UART: [idev] CDI.KEYID = 6
1,174,471 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,175,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,846 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,339 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,986 UART: ROM Fatal Error: 0x000B0022
1,549,143 >>> mbox cmd response: failed
1,549,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,149 >>> mbox cmd response: failed
1,549,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,198,114 UART: [idev] Sha1 KeyId Algorithm
1,206,918 UART: [idev] --
1,207,989 UART: [ldev] ++
1,208,157 UART: [ldev] CDI.KEYID = 6
1,208,521 UART: [ldev] SUBJECT.KEYID = 5
1,208,948 UART: [ldev] AUTHORITY.KEYID = 7
1,209,411 UART: [ldev] FE.KEYID = 1
1,214,559 UART: [ldev] Erasing FE.KEYID = 1
1,241,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,067 UART: [ldev] --
1,280,381 UART: [fwproc] Wait for Commands...
1,281,034 UART: [fwproc] Recv command 0x46574c44
1,281,767 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,824 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,594 >>> mbox cmd response: failed
1,401,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,600 >>> mbox cmd response: failed
1,401,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,442 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,247 UART:
192,604 UART: Running Caliptra ROM ...
193,792 UART:
193,964 UART: [state] CFI Enabled
261,926 UART: [state] LifecycleState = Unprovisioned
263,900 UART: [state] DebugLocked = No
265,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,743 UART: [kat] SHA2-256
439,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,994 UART: [kat] ++
450,528 UART: [kat] sha1
461,515 UART: [kat] SHA2-256
464,190 UART: [kat] SHA2-384
471,147 UART: [kat] SHA2-512-ACC
473,497 UART: [kat] ECC-384
2,763,741 UART: [kat] HMAC-384Kdf
2,775,431 UART: [kat] LMS
3,965,755 UART: [kat] --
3,970,946 UART: [cold-reset] ++
3,971,942 UART: [fht] Storing FHT @ 0x50003400
3,983,271 UART: [idev] ++
3,983,877 UART: [idev] CDI.KEYID = 6
3,984,807 UART: [idev] SUBJECT.KEYID = 7
3,986,026 UART: [idev] UDS.KEYID = 0
3,988,691 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,401 UART: [idev] Erasing UDS.KEYID = 0
7,320,444 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,811 UART: [idev] --
7,346,031 UART: [ldev] ++
7,346,625 UART: [ldev] CDI.KEYID = 6
7,347,549 UART: [ldev] SUBJECT.KEYID = 5
7,348,770 UART: [ldev] AUTHORITY.KEYID = 7
7,350,010 UART: [ldev] FE.KEYID = 1
7,375,195 UART: [ldev] Erasing FE.KEYID = 1
10,710,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,970 UART: [ldev] --
13,089,378 UART: [fwproc] Waiting for Commands...
13,091,151 UART: [fwproc] Received command 0x46574c44
13,093,398 UART: [fwproc] Received Image of size 114124 bytes
15,796,926 UART: ROM Fatal Error: 0x000B003E
15,800,381 >>> mbox cmd response: failed
15,800,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,801,163 >>> mbox cmd response: failed
15,801,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,801,724 >>> mbox cmd response: failed
Initializing fuses
2,060,780 writing to cptra_bootfsm_go
2,250,095 UART:
2,250,444 UART: Running Caliptra ROM ...
2,251,580 UART:
2,251,745 UART: [state] CFI Enabled
2,310,320 UART: [state] LifecycleState = Unprovisioned
2,312,260 UART: [state] DebugLocked = No
2,314,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,749 UART: [kat] SHA2-256
2,489,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,971 UART: [kat] ++
2,500,520 UART: [kat] sha1
2,510,282 UART: [kat] SHA2-256
2,512,976 UART: [kat] SHA2-384
2,518,909 UART: [kat] SHA2-512-ACC
2,521,280 UART: [kat] ECC-384
4,814,832 UART: [kat] HMAC-384Kdf
4,847,415 UART: [kat] LMS
6,037,720 UART: [kat] --
6,041,124 UART: [cold-reset] ++
6,043,438 UART: [fht] Storing FHT @ 0x50003400
6,055,188 UART: [idev] ++
6,055,817 UART: [idev] CDI.KEYID = 6
6,056,702 UART: [idev] SUBJECT.KEYID = 7
6,057,971 UART: [idev] UDS.KEYID = 0
6,060,255 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,204,234 UART: [idev] Erasing UDS.KEYID = 0
9,394,997 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,943 UART: [idev] --
9,422,097 UART: [ldev] ++
9,422,667 UART: [ldev] CDI.KEYID = 6
9,423,655 UART: [ldev] SUBJECT.KEYID = 5
9,424,853 UART: [ldev] AUTHORITY.KEYID = 7
9,426,095 UART: [ldev] FE.KEYID = 1
9,469,807 UART: [ldev] Erasing FE.KEYID = 1
12,799,451 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,052 UART: [ldev] --
15,162,302 UART: [fwproc] Waiting for Commands...
15,164,616 UART: [fwproc] Received command 0x46574c44
15,166,800 UART: [fwproc] Received Image of size 114124 bytes
19,215,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,290,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,359,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,677,690 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,787,027 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,549,869 >>> mbox cmd response: failed
15,550,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,843 >>> mbox cmd response: failed
15,551,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,551,431 >>> mbox cmd response: failed
Initializing fuses
2,062,758 writing to cptra_bootfsm_go
5,854,563 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,934,881 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,329 UART:
192,705 UART: Running Caliptra ROM ...
193,896 UART:
603,441 UART: [state] CFI Enabled
620,659 UART: [state] LifecycleState = Unprovisioned
622,603 UART: [state] DebugLocked = No
625,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,906 UART: [kat] SHA2-256
799,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,193 UART: [kat] ++
810,660 UART: [kat] sha1
820,726 UART: [kat] SHA2-256
823,460 UART: [kat] SHA2-384
829,540 UART: [kat] SHA2-512-ACC
831,861 UART: [kat] ECC-384
3,116,970 UART: [kat] HMAC-384Kdf
3,129,205 UART: [kat] LMS
4,319,301 UART: [kat] --
4,323,319 UART: [cold-reset] ++
4,325,709 UART: [fht] Storing FHT @ 0x50003400
4,338,662 UART: [idev] ++
4,339,233 UART: [idev] CDI.KEYID = 6
4,340,119 UART: [idev] SUBJECT.KEYID = 7
4,341,390 UART: [idev] UDS.KEYID = 0
4,343,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,514 UART: [idev] Erasing UDS.KEYID = 0
7,626,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,117 UART: [idev] --
7,652,549 UART: [ldev] ++
7,653,119 UART: [ldev] CDI.KEYID = 6
7,654,086 UART: [ldev] SUBJECT.KEYID = 5
7,655,306 UART: [ldev] AUTHORITY.KEYID = 7
7,656,540 UART: [ldev] FE.KEYID = 1
7,667,189 UART: [ldev] Erasing FE.KEYID = 1
10,958,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,036 UART: [ldev] --
13,318,426 UART: [fwproc] Waiting for Commands...
13,321,230 UART: [fwproc] Received command 0x46574c44
13,323,419 UART: [fwproc] Received Image of size 114124 bytes
16,028,630 UART: ROM Fatal Error: 0x000B003E
16,032,149 >>> mbox cmd response: failed
16,032,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,914 >>> mbox cmd response: failed
16,033,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,478 >>> mbox cmd response: failed
Initializing fuses
2,061,691 writing to cptra_bootfsm_go
2,251,067 UART:
2,251,438 UART: Running Caliptra ROM ...
2,252,587 UART:
4,420,882 UART: [state] CFI Enabled
4,430,760 UART: [state] LifecycleState = Unprovisioned
4,432,674 UART: [state] DebugLocked = No
4,434,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,438,751 UART: [kat] SHA2-256
4,608,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,619,076 UART: [kat] ++
4,619,627 UART: [kat] sha1
4,630,850 UART: [kat] SHA2-256
4,633,556 UART: [kat] SHA2-384
4,640,517 UART: [kat] SHA2-512-ACC
4,642,890 UART: [kat] ECC-384
6,927,365 UART: [kat] HMAC-384Kdf
6,938,519 UART: [kat] LMS
8,128,650 UART: [kat] --
8,135,188 UART: [cold-reset] ++
8,137,500 UART: [fht] Storing FHT @ 0x50003400
8,148,988 UART: [idev] ++
8,149,556 UART: [idev] CDI.KEYID = 6
8,150,572 UART: [idev] SUBJECT.KEYID = 7
8,151,732 UART: [idev] UDS.KEYID = 0
8,154,333 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,297,637 UART: [idev] Erasing UDS.KEYID = 0
11,438,287 UART: [idev] Using Sha1 for KeyId Algorithm
11,459,846 UART: [idev] --
11,464,006 UART: [ldev] ++
11,464,579 UART: [ldev] CDI.KEYID = 6
11,465,543 UART: [ldev] SUBJECT.KEYID = 5
11,466,789 UART: [ldev] AUTHORITY.KEYID = 7
11,467,944 UART: [ldev] FE.KEYID = 1
11,480,344 UART: [ldev] Erasing FE.KEYID = 1
14,769,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,060,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,075,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,090,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,104,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,122,180 UART: [ldev] --
17,127,240 UART: [fwproc] Waiting for Commands...
17,130,042 UART: [fwproc] Received command 0x46574c44
17,132,230 UART: [fwproc] Received Image of size 114124 bytes
21,193,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,267,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,336,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,654,066 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,127,181 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,778,645 >>> mbox cmd response: failed
15,779,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,779,699 >>> mbox cmd response: failed
15,779,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,780,260 >>> mbox cmd response: failed
Initializing fuses
2,055,356 writing to cptra_bootfsm_go
8,207,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,158,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,162 UART:
192,537 UART: Running Caliptra ROM ...
193,732 UART:
193,886 UART: [state] CFI Enabled
266,726 UART: [state] LifecycleState = Unprovisioned
268,651 UART: [state] DebugLocked = No
270,738 UART: [state] WD Timer not started. Device not locked for debugging
274,566 UART: [kat] SHA2-256
453,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,266 UART: [kat] ++
465,747 UART: [kat] sha1
476,516 UART: [kat] SHA2-256
479,520 UART: [kat] SHA2-384
485,225 UART: [kat] SHA2-512-ACC
488,217 UART: [kat] ECC-384
2,947,502 UART: [kat] HMAC-384Kdf
2,971,889 UART: [kat] LMS
3,501,338 UART: [kat] --
3,506,486 UART: [cold-reset] ++
3,507,945 UART: [fht] FHT @ 0x50003400
3,517,542 UART: [idev] ++
3,518,111 UART: [idev] CDI.KEYID = 6
3,519,019 UART: [idev] SUBJECT.KEYID = 7
3,520,239 UART: [idev] UDS.KEYID = 0
3,522,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,055 UART: [idev] Erasing UDS.KEYID = 0
6,026,932 UART: [idev] Sha1 KeyId Algorithm
6,050,978 UART: [idev] --
6,054,469 UART: [ldev] ++
6,055,118 UART: [ldev] CDI.KEYID = 6
6,056,018 UART: [ldev] SUBJECT.KEYID = 5
6,057,128 UART: [ldev] AUTHORITY.KEYID = 7
6,058,369 UART: [ldev] FE.KEYID = 1
6,100,987 UART: [ldev] Erasing FE.KEYID = 1
8,606,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,547 UART: [ldev] --
10,412,462 UART: [fwproc] Wait for Commands...
10,414,503 UART: [fwproc] Recv command 0x46574c44
10,416,598 UART: [fwproc] Recv'd Img size: 114448 bytes
12,473,597 UART: ROM Fatal Error: 0x000B003E
12,476,723 >>> mbox cmd response: failed
12,477,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,477,475 >>> mbox cmd response: failed
12,477,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,478,037 >>> mbox cmd response: failed
Initializing fuses
2,066,234 writing to cptra_bootfsm_go
2,255,561 UART:
2,255,909 UART: Running Caliptra ROM ...
2,256,950 UART:
2,257,101 UART: [state] CFI Enabled
2,316,071 UART: [state] LifecycleState = Unprovisioned
2,317,906 UART: [state] DebugLocked = No
2,320,812 UART: [state] WD Timer not started. Device not locked for debugging
2,324,184 UART: [kat] SHA2-256
2,503,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,882 UART: [kat] ++
2,515,339 UART: [kat] sha1
2,525,630 UART: [kat] SHA2-256
2,528,684 UART: [kat] SHA2-384
2,534,308 UART: [kat] SHA2-512-ACC
2,537,252 UART: [kat] ECC-384
5,000,582 UART: [kat] HMAC-384Kdf
5,021,677 UART: [kat] LMS
5,551,119 UART: [kat] --
5,555,778 UART: [cold-reset] ++
5,557,659 UART: [fht] FHT @ 0x50003400
5,570,204 UART: [idev] ++
5,570,806 UART: [idev] CDI.KEYID = 6
5,571,690 UART: [idev] SUBJECT.KEYID = 7
5,572,907 UART: [idev] UDS.KEYID = 0
5,575,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,015 UART: [idev] Erasing UDS.KEYID = 0
8,076,283 UART: [idev] Sha1 KeyId Algorithm
8,099,629 UART: [idev] --
8,103,898 UART: [ldev] ++
8,104,463 UART: [ldev] CDI.KEYID = 6
8,105,343 UART: [ldev] SUBJECT.KEYID = 5
8,106,576 UART: [ldev] AUTHORITY.KEYID = 7
8,107,812 UART: [ldev] FE.KEYID = 1
8,151,108 UART: [ldev] Erasing FE.KEYID = 1
10,654,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,917 UART: [ldev] --
12,463,903 UART: [fwproc] Wait for Commands...
12,466,115 UART: [fwproc] Recv command 0x46574c44
12,468,208 UART: [fwproc] Recv'd Img size: 114448 bytes
15,874,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,947,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,016,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,334,078 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,381,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,249,151 >>> mbox cmd response: failed
12,249,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,250,062 >>> mbox cmd response: failed
12,250,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,250,629 >>> mbox cmd response: failed
Initializing fuses
2,056,880 writing to cptra_bootfsm_go
5,399,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,103,886 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
192,658 UART:
193,019 UART: Running Caliptra ROM ...
194,247 UART:
603,698 UART: [state] CFI Enabled
615,758 UART: [state] LifecycleState = Unprovisioned
617,678 UART: [state] DebugLocked = No
620,265 UART: [state] WD Timer not started. Device not locked for debugging
623,515 UART: [kat] SHA2-256
802,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,189 UART: [kat] ++
814,723 UART: [kat] sha1
825,068 UART: [kat] SHA2-256
828,127 UART: [kat] SHA2-384
834,479 UART: [kat] SHA2-512-ACC
837,421 UART: [kat] ECC-384
3,279,128 UART: [kat] HMAC-384Kdf
3,290,985 UART: [kat] LMS
3,820,494 UART: [kat] --
3,824,045 UART: [cold-reset] ++
3,825,880 UART: [fht] FHT @ 0x50003400
3,838,264 UART: [idev] ++
3,838,834 UART: [idev] CDI.KEYID = 6
3,839,720 UART: [idev] SUBJECT.KEYID = 7
3,840,935 UART: [idev] UDS.KEYID = 0
3,843,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,854 UART: [idev] Erasing UDS.KEYID = 0
6,313,337 UART: [idev] Sha1 KeyId Algorithm
6,337,166 UART: [idev] --
6,342,406 UART: [ldev] ++
6,342,982 UART: [ldev] CDI.KEYID = 6
6,343,869 UART: [ldev] SUBJECT.KEYID = 5
6,345,086 UART: [ldev] AUTHORITY.KEYID = 7
6,346,325 UART: [ldev] FE.KEYID = 1
6,356,299 UART: [ldev] Erasing FE.KEYID = 1
8,830,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,055 UART: [ldev] --
10,619,913 UART: [fwproc] Wait for Commands...
10,623,033 UART: [fwproc] Recv command 0x46574c44
10,625,138 UART: [fwproc] Recv'd Img size: 114448 bytes
12,684,393 UART: ROM Fatal Error: 0x000B003E
12,687,480 >>> mbox cmd response: failed
12,687,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,284 >>> mbox cmd response: failed
12,688,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,840 >>> mbox cmd response: failed
Initializing fuses
2,055,606 writing to cptra_bootfsm_go
2,244,901 UART:
2,245,262 UART: Running Caliptra ROM ...
2,246,313 UART:
7,764,887 UART: [state] CFI Enabled
7,776,615 UART: [state] LifecycleState = Unprovisioned
7,778,482 UART: [state] DebugLocked = No
7,781,086 UART: [state] WD Timer not started. Device not locked for debugging
7,784,563 UART: [kat] SHA2-256
7,963,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,975,257 UART: [kat] ++
7,975,752 UART: [kat] sha1
7,986,427 UART: [kat] SHA2-256
7,989,450 UART: [kat] SHA2-384
7,995,087 UART: [kat] SHA2-512-ACC
7,998,048 UART: [kat] ECC-384
10,436,663 UART: [kat] HMAC-384Kdf
10,449,926 UART: [kat] LMS
10,979,445 UART: [kat] --
10,983,065 UART: [cold-reset] ++
10,984,410 UART: [fht] FHT @ 0x50003400
10,996,317 UART: [idev] ++
10,996,883 UART: [idev] CDI.KEYID = 6
10,997,763 UART: [idev] SUBJECT.KEYID = 7
10,998,975 UART: [idev] UDS.KEYID = 0
11,001,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,145,209 UART: [idev] Erasing UDS.KEYID = 0
13,467,679 UART: [idev] Sha1 KeyId Algorithm
13,490,462 UART: [idev] --
13,493,164 UART: [ldev] ++
13,493,750 UART: [ldev] CDI.KEYID = 6
13,494,662 UART: [ldev] SUBJECT.KEYID = 5
13,495,877 UART: [ldev] AUTHORITY.KEYID = 7
13,497,107 UART: [ldev] FE.KEYID = 1
13,506,891 UART: [ldev] Erasing FE.KEYID = 1
15,985,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,734,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,750,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,771,218 UART: [ldev] --
17,775,843 UART: [fwproc] Wait for Commands...
17,778,651 UART: [fwproc] Recv command 0x46574c44
17,780,745 UART: [fwproc] Recv'd Img size: 114448 bytes
21,178,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,249,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,318,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,636,752 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,697,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,954 >>> mbox cmd response: failed
12,455,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,915 >>> mbox cmd response: failed
12,456,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,481 >>> mbox cmd response: failed
Initializing fuses
2,054,974 writing to cptra_bootfsm_go
11,107,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,681,166 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,273 UART:
192,675 UART: Running Caliptra ROM ...
193,777 UART:
193,923 UART: [state] CFI Enabled
263,446 UART: [state] LifecycleState = Unprovisioned
265,867 UART: [state] DebugLocked = No
267,650 UART: [state] WD Timer not started. Device not locked for debugging
272,134 UART: [kat] SHA2-256
461,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,781 UART: [kat] ++
473,228 UART: [kat] sha1
485,781 UART: [kat] SHA2-256
488,795 UART: [kat] SHA2-384
493,695 UART: [kat] SHA2-512-ACC
496,250 UART: [kat] ECC-384
2,947,940 UART: [kat] HMAC-384Kdf
2,969,311 UART: [kat] LMS
3,501,072 UART: [kat] --
3,505,837 UART: [cold-reset] ++
3,506,748 UART: [fht] FHT @ 0x50003400
3,517,947 UART: [idev] ++
3,518,623 UART: [idev] CDI.KEYID = 6
3,519,597 UART: [idev] SUBJECT.KEYID = 7
3,520,814 UART: [idev] UDS.KEYID = 0
3,523,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,990 UART: [idev] Erasing UDS.KEYID = 0
6,027,632 UART: [idev] Sha1 KeyId Algorithm
6,049,462 UART: [idev] --
6,054,206 UART: [ldev] ++
6,054,905 UART: [ldev] CDI.KEYID = 6
6,055,820 UART: [ldev] SUBJECT.KEYID = 5
6,056,984 UART: [ldev] AUTHORITY.KEYID = 7
6,058,219 UART: [ldev] FE.KEYID = 1
6,098,542 UART: [ldev] Erasing FE.KEYID = 1
8,604,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,273 UART: [ldev] --
10,413,130 UART: [fwproc] Wait for Commands...
10,414,852 UART: [fwproc] Recv command 0x46574c44
10,417,167 UART: [fwproc] Recv'd Img size: 114448 bytes
12,503,409 UART: ROM Fatal Error: 0x000B003E
12,507,077 >>> mbox cmd response: failed
12,507,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,783 >>> mbox cmd response: failed
12,508,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,286 >>> mbox cmd response: failed
Initializing fuses
2,061,833 writing to cptra_bootfsm_go
2,251,129 UART:
2,251,492 UART: Running Caliptra ROM ...
2,252,576 UART:
2,252,741 UART: [state] CFI Enabled
2,322,310 UART: [state] LifecycleState = Unprovisioned
2,324,646 UART: [state] DebugLocked = No
2,325,871 UART: [state] WD Timer not started. Device not locked for debugging
2,330,042 UART: [kat] SHA2-256
2,519,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,634 UART: [kat] ++
2,531,125 UART: [kat] sha1
2,541,747 UART: [kat] SHA2-256
2,544,729 UART: [kat] SHA2-384
2,550,785 UART: [kat] SHA2-512-ACC
2,553,360 UART: [kat] ECC-384
5,008,825 UART: [kat] HMAC-384Kdf
5,031,225 UART: [kat] LMS
5,562,969 UART: [kat] --
5,565,773 UART: [cold-reset] ++
5,567,664 UART: [fht] FHT @ 0x50003400
5,578,487 UART: [idev] ++
5,579,167 UART: [idev] CDI.KEYID = 6
5,580,135 UART: [idev] SUBJECT.KEYID = 7
5,581,347 UART: [idev] UDS.KEYID = 0
5,583,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,727,993 UART: [idev] Erasing UDS.KEYID = 0
8,086,466 UART: [idev] Sha1 KeyId Algorithm
8,108,761 UART: [idev] --
8,114,888 UART: [ldev] ++
8,115,575 UART: [ldev] CDI.KEYID = 6
8,116,482 UART: [ldev] SUBJECT.KEYID = 5
8,117,644 UART: [ldev] AUTHORITY.KEYID = 7
8,118,876 UART: [ldev] FE.KEYID = 1
8,160,038 UART: [ldev] Erasing FE.KEYID = 1
10,667,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,288 UART: [ldev] --
12,475,387 UART: [fwproc] Wait for Commands...
12,476,892 UART: [fwproc] Recv command 0x46574c44
12,479,205 UART: [fwproc] Recv'd Img size: 114448 bytes
15,928,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,006,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,122,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,665,246 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,443,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,301,445 >>> mbox cmd response: failed
12,302,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,411 >>> mbox cmd response: failed
12,302,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,017 >>> mbox cmd response: failed
Initializing fuses
2,057,556 writing to cptra_bootfsm_go
5,494,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,791,809 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,528 UART:
192,893 UART: Running Caliptra ROM ...
194,035 UART:
603,563 UART: [state] CFI Enabled
616,131 UART: [state] LifecycleState = Unprovisioned
618,520 UART: [state] DebugLocked = No
620,492 UART: [state] WD Timer not started. Device not locked for debugging
624,795 UART: [kat] SHA2-256
814,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,467 UART: [kat] ++
826,054 UART: [kat] sha1
838,889 UART: [kat] SHA2-256
841,898 UART: [kat] SHA2-384
847,010 UART: [kat] SHA2-512-ACC
849,616 UART: [kat] ECC-384
3,287,320 UART: [kat] HMAC-384Kdf
3,299,513 UART: [kat] LMS
3,831,308 UART: [kat] --
3,837,311 UART: [cold-reset] ++
3,838,385 UART: [fht] FHT @ 0x50003400
3,850,190 UART: [idev] ++
3,850,886 UART: [idev] CDI.KEYID = 6
3,851,855 UART: [idev] SUBJECT.KEYID = 7
3,853,016 UART: [idev] UDS.KEYID = 0
3,855,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,715 UART: [idev] Erasing UDS.KEYID = 0
6,331,759 UART: [idev] Sha1 KeyId Algorithm
6,354,666 UART: [idev] --
6,359,442 UART: [ldev] ++
6,360,132 UART: [ldev] CDI.KEYID = 6
6,361,042 UART: [ldev] SUBJECT.KEYID = 5
6,362,207 UART: [ldev] AUTHORITY.KEYID = 7
6,363,440 UART: [ldev] FE.KEYID = 1
6,372,680 UART: [ldev] Erasing FE.KEYID = 1
8,850,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,987 UART: [ldev] --
10,643,797 UART: [fwproc] Wait for Commands...
10,646,213 UART: [fwproc] Recv command 0x46574c44
10,648,526 UART: [fwproc] Recv'd Img size: 114448 bytes
12,734,286 UART: ROM Fatal Error: 0x000B003E
12,737,973 >>> mbox cmd response: failed
12,738,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,631 >>> mbox cmd response: failed
12,738,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,193 >>> mbox cmd response: failed
Initializing fuses
2,055,230 writing to cptra_bootfsm_go
2,244,576 UART:
2,244,922 UART: Running Caliptra ROM ...
2,246,064 UART:
7,711,653 UART: [state] CFI Enabled
7,725,175 UART: [state] LifecycleState = Unprovisioned
7,727,519 UART: [state] DebugLocked = No
7,728,936 UART: [state] WD Timer not started. Device not locked for debugging
7,734,088 UART: [kat] SHA2-256
7,923,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,934,775 UART: [kat] ++
7,935,234 UART: [kat] sha1
7,946,177 UART: [kat] SHA2-256
7,949,200 UART: [kat] SHA2-384
7,955,192 UART: [kat] SHA2-512-ACC
7,957,759 UART: [kat] ECC-384
10,401,197 UART: [kat] HMAC-384Kdf
10,413,764 UART: [kat] LMS
10,945,591 UART: [kat] --
10,949,908 UART: [cold-reset] ++
10,951,563 UART: [fht] FHT @ 0x50003400
10,962,427 UART: [idev] ++
10,963,144 UART: [idev] CDI.KEYID = 6
10,964,082 UART: [idev] SUBJECT.KEYID = 7
10,965,298 UART: [idev] UDS.KEYID = 0
10,967,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,111,383 UART: [idev] Erasing UDS.KEYID = 0
13,440,249 UART: [idev] Sha1 KeyId Algorithm
13,461,215 UART: [idev] --
13,466,178 UART: [ldev] ++
13,466,907 UART: [ldev] CDI.KEYID = 6
13,467,820 UART: [ldev] SUBJECT.KEYID = 5
13,468,979 UART: [ldev] AUTHORITY.KEYID = 7
13,470,230 UART: [ldev] FE.KEYID = 1
13,481,148 UART: [ldev] Erasing FE.KEYID = 1
15,960,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,680,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,711,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,726,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,747,230 UART: [ldev] --
17,752,494 UART: [fwproc] Wait for Commands...
17,755,131 UART: [fwproc] Recv command 0x46574c44
17,757,489 UART: [fwproc] Recv'd Img size: 114448 bytes
21,203,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,283,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,399,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,942,664 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,758,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,538,780 >>> mbox cmd response: failed
12,539,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,539,693 >>> mbox cmd response: failed
12,539,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,540,255 >>> mbox cmd response: failed
Initializing fuses
2,055,203 writing to cptra_bootfsm_go
11,080,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,288,649 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,719 UART: [kat] SHA2-256
881,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,765 UART: [kat] ++
885,917 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,244 UART: [kat] LMS
1,475,440 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,993 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,504,522 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,094 UART: [idev] --
1,514,069 UART: [ldev] ++
1,514,237 UART: [ldev] CDI.KEYID = 6
1,514,600 UART: [ldev] SUBJECT.KEYID = 5
1,515,026 UART: [ldev] AUTHORITY.KEYID = 7
1,515,489 UART: [ldev] FE.KEYID = 1
1,520,565 UART: [ldev] Erasing FE.KEYID = 1
1,545,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,366 UART: [ldev] --
1,584,725 UART: [fwproc] Waiting for Commands...
1,585,424 UART: [fwproc] Received command 0x46574c44
1,586,215 UART: [fwproc] Received Image of size 114448 bytes
1,634,061 UART: ROM Fatal Error: 0x000B003E
1,635,220 >>> mbox cmd response: failed
1,635,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,226 >>> mbox cmd response: failed
1,635,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,348 UART: [kat] SHA2-512-ACC
897,249 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,085 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,364 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,208 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,110 UART: [fwproc] Received command 0x46574c44
1,586,901 UART: [fwproc] Received Image of size 114448 bytes
2,885,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,620 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,451 >>> mbox cmd response: failed
1,487,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,457 >>> mbox cmd response: failed
1,487,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,244 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,868 UART: [kat] SHA2-256
881,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,914 UART: [kat] ++
886,066 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,479,911 UART: [idev] ++
1,480,079 UART: [idev] CDI.KEYID = 6
1,480,439 UART: [idev] SUBJECT.KEYID = 7
1,480,863 UART: [idev] UDS.KEYID = 0
1,481,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,001 UART: [idev] --
1,514,874 UART: [ldev] ++
1,515,042 UART: [ldev] CDI.KEYID = 6
1,515,405 UART: [ldev] SUBJECT.KEYID = 5
1,515,831 UART: [ldev] AUTHORITY.KEYID = 7
1,516,294 UART: [ldev] FE.KEYID = 1
1,521,564 UART: [ldev] Erasing FE.KEYID = 1
1,547,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,237 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,565 UART: [fwproc] Received command 0x46574c44
1,588,356 UART: [fwproc] Received Image of size 114448 bytes
1,635,670 UART: ROM Fatal Error: 0x000B003E
1,636,829 >>> mbox cmd response: failed
1,636,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,835 >>> mbox cmd response: failed
1,636,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,375 UART: [kat] SHA2-512-ACC
897,276 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,801 UART: [idev] ++
1,479,969 UART: [idev] CDI.KEYID = 6
1,480,329 UART: [idev] SUBJECT.KEYID = 7
1,480,753 UART: [idev] UDS.KEYID = 0
1,481,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,851 UART: [idev] --
1,514,872 UART: [ldev] ++
1,515,040 UART: [ldev] CDI.KEYID = 6
1,515,403 UART: [ldev] SUBJECT.KEYID = 5
1,515,829 UART: [ldev] AUTHORITY.KEYID = 7
1,516,292 UART: [ldev] FE.KEYID = 1
1,521,818 UART: [ldev] Erasing FE.KEYID = 1
1,547,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,421 UART: [ldev] --
1,586,698 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 114448 bytes
2,887,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,988 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,880 >>> mbox cmd response: failed
1,489,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,886 >>> mbox cmd response: failed
1,489,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,381 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,431 UART: [kat] SHA2-256
903,371 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
917,748 UART: [kat] HMAC-384Kdf
922,288 UART: [kat] LMS
1,170,616 UART: [kat] --
1,171,459 UART: [cold-reset] ++
1,171,911 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,333 UART: [idev] Sha1 KeyId Algorithm
1,208,939 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,560 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,286 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,808 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,298 UART: ROM Fatal Error: 0x000B003E
1,331,457 >>> mbox cmd response: failed
1,331,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,463 >>> mbox cmd response: failed
1,331,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,564 UART: [kat] SHA2-512-ACC
908,465 UART: [kat] ECC-384
917,890 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,271 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,196 UART: [idev] Erasing UDS.KEYID = 0
1,201,327 UART: [idev] Sha1 KeyId Algorithm
1,209,727 UART: [idev] --
1,210,919 UART: [ldev] ++
1,211,087 UART: [ldev] CDI.KEYID = 6
1,211,450 UART: [ldev] SUBJECT.KEYID = 5
1,211,876 UART: [ldev] AUTHORITY.KEYID = 7
1,212,339 UART: [ldev] FE.KEYID = 1
1,217,497 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,098 UART: [fwproc] Recv command 0x46574c44
1,283,826 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,435 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,584 >>> mbox cmd response: failed
1,186,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,590 >>> mbox cmd response: failed
1,186,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
893,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,548 UART: [kat] ++
897,700 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,899 UART: [kat] SHA2-512-ACC
908,800 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,654 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,116 UART: [ldev] ++
1,211,284 UART: [ldev] CDI.KEYID = 6
1,211,647 UART: [ldev] SUBJECT.KEYID = 5
1,212,073 UART: [ldev] AUTHORITY.KEYID = 7
1,212,536 UART: [ldev] FE.KEYID = 1
1,218,008 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,474 UART: [ldev] --
1,282,879 UART: [fwproc] Wait for Commands...
1,283,543 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,363 UART: ROM Fatal Error: 0x000B003E
1,333,522 >>> mbox cmd response: failed
1,333,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,528 >>> mbox cmd response: failed
1,333,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,871 UART: [kat] SHA2-512-ACC
908,772 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,234 UART: [cold-reset] ++
1,172,602 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,723 UART: [idev] Erasing UDS.KEYID = 0
1,200,832 UART: [idev] Sha1 KeyId Algorithm
1,209,408 UART: [idev] --
1,210,536 UART: [ldev] ++
1,210,704 UART: [ldev] CDI.KEYID = 6
1,211,067 UART: [ldev] SUBJECT.KEYID = 5
1,211,493 UART: [ldev] AUTHORITY.KEYID = 7
1,211,956 UART: [ldev] FE.KEYID = 1
1,217,060 UART: [ldev] Erasing FE.KEYID = 1
1,243,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,996 UART: [ldev] --
1,282,375 UART: [fwproc] Wait for Commands...
1,283,073 UART: [fwproc] Recv command 0x46574c44
1,283,801 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,716 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,011 >>> mbox cmd response: failed
1,187,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,017 >>> mbox cmd response: failed
1,187,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,329 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,548 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,239 UART: ROM Fatal Error: 0x000B003E
1,331,398 >>> mbox cmd response: failed
1,331,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,404 >>> mbox cmd response: failed
1,331,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
86,975 UART: [state] WD Timer not started. Device not locked for debugging
88,180 UART: [kat] SHA2-256
891,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,550 UART: [kat] LMS
1,168,862 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,045 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,173,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,199,451 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,215,798 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,272 UART: [fwproc] Wait for Commands...
1,281,971 UART: [fwproc] Recv command 0x46574c44
1,282,704 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,497 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,135 >>> mbox cmd response: failed
1,182,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,141 >>> mbox cmd response: failed
1,182,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,829 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
915,601 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,173,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,838 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,822 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,943 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,682 UART: ROM Fatal Error: 0x000B003E
1,330,841 >>> mbox cmd response: failed
1,330,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,847 >>> mbox cmd response: failed
1,330,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,174,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,722 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,282,082 UART: [fwproc] Recv command 0x46574c44
1,282,815 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,540 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,566 >>> mbox cmd response: failed
1,183,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,572 >>> mbox cmd response: failed
1,183,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,874 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,237 UART:
192,597 UART: Running Caliptra ROM ...
193,783 UART:
193,931 UART: [state] CFI Enabled
261,680 UART: [state] LifecycleState = Unprovisioned
263,659 UART: [state] DebugLocked = No
265,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,840 UART: [kat] SHA2-256
440,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,097 UART: [kat] ++
451,581 UART: [kat] sha1
462,072 UART: [kat] SHA2-256
464,761 UART: [kat] SHA2-384
470,508 UART: [kat] SHA2-512-ACC
472,878 UART: [kat] ECC-384
2,767,375 UART: [kat] HMAC-384Kdf
2,779,318 UART: [kat] LMS
3,969,642 UART: [kat] --
3,973,828 UART: [cold-reset] ++
3,975,393 UART: [fht] Storing FHT @ 0x50003400
3,988,007 UART: [idev] ++
3,988,616 UART: [idev] CDI.KEYID = 6
3,989,535 UART: [idev] SUBJECT.KEYID = 7
3,990,752 UART: [idev] UDS.KEYID = 0
3,993,331 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,010 UART: [idev] Erasing UDS.KEYID = 0
7,327,502 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,537 UART: [idev] --
7,354,716 UART: [ldev] ++
7,355,298 UART: [ldev] CDI.KEYID = 6
7,356,289 UART: [ldev] SUBJECT.KEYID = 5
7,357,394 UART: [ldev] AUTHORITY.KEYID = 7
7,358,738 UART: [ldev] FE.KEYID = 1
7,404,201 UART: [ldev] Erasing FE.KEYID = 1
10,737,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,627 UART: [ldev] --
13,118,474 UART: [fwproc] Waiting for Commands...
13,120,949 UART: [fwproc] Received command 0x46574c44
13,123,133 UART: [fwproc] Received Image of size 114124 bytes
15,833,594 UART: ROM Fatal Error: 0x000B0018
15,837,084 >>> mbox cmd response: failed
15,837,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,837,847 >>> mbox cmd response: failed
15,838,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,838,413 >>> mbox cmd response: failed
Initializing fuses
2,055,546 writing to cptra_bootfsm_go
2,244,884 UART:
2,245,222 UART: Running Caliptra ROM ...
2,246,358 UART:
2,246,524 UART: [state] CFI Enabled
2,305,028 UART: [state] LifecycleState = Unprovisioned
2,307,071 UART: [state] DebugLocked = No
2,309,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,636 UART: [kat] SHA2-256
2,483,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,861 UART: [kat] ++
2,494,323 UART: [kat] sha1
2,504,831 UART: [kat] SHA2-256
2,507,525 UART: [kat] SHA2-384
2,513,892 UART: [kat] SHA2-512-ACC
2,516,298 UART: [kat] ECC-384
4,808,354 UART: [kat] HMAC-384Kdf
4,838,462 UART: [kat] LMS
6,028,739 UART: [kat] --
6,033,070 UART: [cold-reset] ++
6,035,063 UART: [fht] Storing FHT @ 0x50003400
6,046,549 UART: [idev] ++
6,047,123 UART: [idev] CDI.KEYID = 6
6,048,037 UART: [idev] SUBJECT.KEYID = 7
6,049,311 UART: [idev] UDS.KEYID = 0
6,051,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,195,644 UART: [idev] Erasing UDS.KEYID = 0
9,385,218 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,036 UART: [idev] --
9,411,088 UART: [ldev] ++
9,411,661 UART: [ldev] CDI.KEYID = 6
9,412,604 UART: [ldev] SUBJECT.KEYID = 5
9,413,864 UART: [ldev] AUTHORITY.KEYID = 7
9,415,022 UART: [ldev] FE.KEYID = 1
9,461,509 UART: [ldev] Erasing FE.KEYID = 1
12,792,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,100,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,115,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,129,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,932 UART: [ldev] --
15,152,060 UART: [fwproc] Waiting for Commands...
15,154,609 UART: [fwproc] Received command 0x46574c44
15,156,849 UART: [fwproc] Received Image of size 114124 bytes
19,203,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,278,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,347,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,663,749 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,807,279 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,557,605 >>> mbox cmd response: failed
15,558,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,559,220 >>> mbox cmd response: failed
15,559,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,559,790 >>> mbox cmd response: failed
Initializing fuses
2,066,143 writing to cptra_bootfsm_go
5,860,723 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,939,931 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
192,714 UART:
193,066 UART: Running Caliptra ROM ...
194,260 UART:
604,015 UART: [state] CFI Enabled
618,737 UART: [state] LifecycleState = Unprovisioned
620,647 UART: [state] DebugLocked = No
623,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,832 UART: [kat] SHA2-256
798,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,130 UART: [kat] ++
809,619 UART: [kat] sha1
821,006 UART: [kat] SHA2-256
823,702 UART: [kat] SHA2-384
827,951 UART: [kat] SHA2-512-ACC
830,345 UART: [kat] ECC-384
3,114,715 UART: [kat] HMAC-384Kdf
3,126,508 UART: [kat] LMS
4,316,657 UART: [kat] --
4,320,069 UART: [cold-reset] ++
4,321,797 UART: [fht] Storing FHT @ 0x50003400
4,334,039 UART: [idev] ++
4,334,614 UART: [idev] CDI.KEYID = 6
4,335,533 UART: [idev] SUBJECT.KEYID = 7
4,336,751 UART: [idev] UDS.KEYID = 0
4,339,399 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,026 UART: [idev] Erasing UDS.KEYID = 0
7,622,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,989 UART: [idev] --
7,649,423 UART: [ldev] ++
7,649,994 UART: [ldev] CDI.KEYID = 6
7,651,083 UART: [ldev] SUBJECT.KEYID = 5
7,652,209 UART: [ldev] AUTHORITY.KEYID = 7
7,653,451 UART: [ldev] FE.KEYID = 1
7,662,581 UART: [ldev] Erasing FE.KEYID = 1
10,947,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,429 UART: [ldev] --
13,308,697 UART: [fwproc] Waiting for Commands...
13,310,316 UART: [fwproc] Received command 0x46574c44
13,312,505 UART: [fwproc] Received Image of size 114124 bytes
16,020,857 UART: ROM Fatal Error: 0x000B0018
16,024,378 >>> mbox cmd response: failed
16,024,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,027 >>> mbox cmd response: failed
16,025,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,633 >>> mbox cmd response: failed
Initializing fuses
2,057,135 writing to cptra_bootfsm_go
2,246,426 UART:
2,246,783 UART: Running Caliptra ROM ...
2,247,831 UART:
4,433,232 UART: [state] CFI Enabled
4,446,997 UART: [state] LifecycleState = Unprovisioned
4,448,904 UART: [state] DebugLocked = No
4,450,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,054 UART: [kat] SHA2-256
4,625,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,636,329 UART: [kat] ++
4,636,789 UART: [kat] sha1
4,646,976 UART: [kat] SHA2-256
4,649,673 UART: [kat] SHA2-384
4,655,560 UART: [kat] SHA2-512-ACC
4,657,969 UART: [kat] ECC-384
6,943,554 UART: [kat] HMAC-384Kdf
6,956,324 UART: [kat] LMS
8,146,453 UART: [kat] --
8,151,063 UART: [cold-reset] ++
8,152,249 UART: [fht] Storing FHT @ 0x50003400
8,165,086 UART: [idev] ++
8,165,651 UART: [idev] CDI.KEYID = 6
8,166,611 UART: [idev] SUBJECT.KEYID = 7
8,167,882 UART: [idev] UDS.KEYID = 0
8,170,226 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,313,652 UART: [idev] Erasing UDS.KEYID = 0
11,452,515 UART: [idev] Using Sha1 for KeyId Algorithm
11,474,813 UART: [idev] --
11,477,584 UART: [ldev] ++
11,478,212 UART: [ldev] CDI.KEYID = 6
11,479,126 UART: [ldev] SUBJECT.KEYID = 5
11,480,370 UART: [ldev] AUTHORITY.KEYID = 7
11,481,608 UART: [ldev] FE.KEYID = 1
11,493,606 UART: [ldev] Erasing FE.KEYID = 1
14,781,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,072,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,087,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,102,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,116,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,135,647 UART: [ldev] --
17,141,288 UART: [fwproc] Waiting for Commands...
17,143,986 UART: [fwproc] Received command 0x46574c44
17,146,215 UART: [fwproc] Received Image of size 114124 bytes
21,202,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,274,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,342,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,660,172 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,133,978 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,762,390 >>> mbox cmd response: failed
15,763,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,424 >>> mbox cmd response: failed
15,763,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,993 >>> mbox cmd response: failed
Initializing fuses
2,063,836 writing to cptra_bootfsm_go
8,229,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,169,852 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,288 UART:
192,655 UART: Running Caliptra ROM ...
193,828 UART:
193,974 UART: [state] CFI Enabled
259,132 UART: [state] LifecycleState = Unprovisioned
261,010 UART: [state] DebugLocked = No
262,556 UART: [state] WD Timer not started. Device not locked for debugging
265,571 UART: [kat] SHA2-256
444,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,255 UART: [kat] ++
456,791 UART: [kat] sha1
468,054 UART: [kat] SHA2-256
471,078 UART: [kat] SHA2-384
477,216 UART: [kat] SHA2-512-ACC
480,200 UART: [kat] ECC-384
2,923,891 UART: [kat] HMAC-384Kdf
2,948,812 UART: [kat] LMS
3,478,229 UART: [kat] --
3,483,433 UART: [cold-reset] ++
3,484,295 UART: [fht] FHT @ 0x50003400
3,495,817 UART: [idev] ++
3,496,381 UART: [idev] CDI.KEYID = 6
3,497,300 UART: [idev] SUBJECT.KEYID = 7
3,498,458 UART: [idev] UDS.KEYID = 0
3,501,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,391 UART: [idev] Erasing UDS.KEYID = 0
6,002,673 UART: [idev] Sha1 KeyId Algorithm
6,025,587 UART: [idev] --
6,029,558 UART: [ldev] ++
6,030,137 UART: [ldev] CDI.KEYID = 6
6,031,056 UART: [ldev] SUBJECT.KEYID = 5
6,032,457 UART: [ldev] AUTHORITY.KEYID = 7
6,033,573 UART: [ldev] FE.KEYID = 1
6,077,712 UART: [ldev] Erasing FE.KEYID = 1
8,583,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,771 UART: [ldev] --
10,393,280 UART: [fwproc] Wait for Commands...
10,396,349 UART: [fwproc] Recv command 0x46574c44
10,398,455 UART: [fwproc] Recv'd Img size: 114448 bytes
12,450,375 UART: ROM Fatal Error: 0x000B0018
12,453,525 >>> mbox cmd response: failed
12,453,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,287 >>> mbox cmd response: failed
12,454,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,851 >>> mbox cmd response: failed
Initializing fuses
2,053,373 writing to cptra_bootfsm_go
2,242,688 UART:
2,243,038 UART: Running Caliptra ROM ...
2,244,084 UART:
2,244,239 UART: [state] CFI Enabled
2,314,650 UART: [state] LifecycleState = Unprovisioned
2,316,530 UART: [state] DebugLocked = No
2,318,055 UART: [state] WD Timer not started. Device not locked for debugging
2,322,364 UART: [kat] SHA2-256
2,501,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,062 UART: [kat] ++
2,513,524 UART: [kat] sha1
2,524,514 UART: [kat] SHA2-256
2,527,522 UART: [kat] SHA2-384
2,533,399 UART: [kat] SHA2-512-ACC
2,536,396 UART: [kat] ECC-384
4,998,282 UART: [kat] HMAC-384Kdf
5,021,685 UART: [kat] LMS
5,551,136 UART: [kat] --
5,555,345 UART: [cold-reset] ++
5,556,952 UART: [fht] FHT @ 0x50003400
5,568,906 UART: [idev] ++
5,569,472 UART: [idev] CDI.KEYID = 6
5,570,385 UART: [idev] SUBJECT.KEYID = 7
5,571,619 UART: [idev] UDS.KEYID = 0
5,573,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,283 UART: [idev] Erasing UDS.KEYID = 0
8,075,382 UART: [idev] Sha1 KeyId Algorithm
8,097,800 UART: [idev] --
8,102,662 UART: [ldev] ++
8,103,232 UART: [ldev] CDI.KEYID = 6
8,104,143 UART: [ldev] SUBJECT.KEYID = 5
8,105,361 UART: [ldev] AUTHORITY.KEYID = 7
8,106,593 UART: [ldev] FE.KEYID = 1
8,150,194 UART: [ldev] Erasing FE.KEYID = 1
10,653,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,150 UART: [ldev] --
12,464,159 UART: [fwproc] Wait for Commands...
12,466,261 UART: [fwproc] Recv command 0x46574c44
12,468,307 UART: [fwproc] Recv'd Img size: 114448 bytes
15,869,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,327,990 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,363,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,229,513 >>> mbox cmd response: failed
12,230,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,419 >>> mbox cmd response: failed
12,230,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,992 >>> mbox cmd response: failed
Initializing fuses
2,062,857 writing to cptra_bootfsm_go
5,447,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,155,009 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
192,818 UART:
193,172 UART: Running Caliptra ROM ...
194,753 UART:
603,910 UART: [state] CFI Enabled
615,737 UART: [state] LifecycleState = Unprovisioned
617,613 UART: [state] DebugLocked = No
620,039 UART: [state] WD Timer not started. Device not locked for debugging
623,159 UART: [kat] SHA2-256
802,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,872 UART: [kat] ++
814,317 UART: [kat] sha1
825,624 UART: [kat] SHA2-256
828,688 UART: [kat] SHA2-384
834,337 UART: [kat] SHA2-512-ACC
837,306 UART: [kat] ECC-384
3,280,332 UART: [kat] HMAC-384Kdf
3,293,517 UART: [kat] LMS
3,822,979 UART: [kat] --
3,827,090 UART: [cold-reset] ++
3,828,376 UART: [fht] FHT @ 0x50003400
3,839,947 UART: [idev] ++
3,840,514 UART: [idev] CDI.KEYID = 6
3,841,424 UART: [idev] SUBJECT.KEYID = 7
3,842,638 UART: [idev] UDS.KEYID = 0
3,845,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,347 UART: [idev] Erasing UDS.KEYID = 0
6,312,609 UART: [idev] Sha1 KeyId Algorithm
6,335,199 UART: [idev] --
6,340,169 UART: [ldev] ++
6,340,744 UART: [ldev] CDI.KEYID = 6
6,341,655 UART: [ldev] SUBJECT.KEYID = 5
6,342,816 UART: [ldev] AUTHORITY.KEYID = 7
6,344,066 UART: [ldev] FE.KEYID = 1
6,355,303 UART: [ldev] Erasing FE.KEYID = 1
8,828,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,582 UART: [ldev] --
10,614,510 UART: [fwproc] Wait for Commands...
10,616,072 UART: [fwproc] Recv command 0x46574c44
10,618,171 UART: [fwproc] Recv'd Img size: 114448 bytes
12,674,675 UART: ROM Fatal Error: 0x000B0018
12,677,741 >>> mbox cmd response: failed
12,678,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,678,489 >>> mbox cmd response: failed
12,678,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,073 >>> mbox cmd response: failed
Initializing fuses
2,058,942 writing to cptra_bootfsm_go
2,248,246 UART:
2,248,591 UART: Running Caliptra ROM ...
2,249,727 UART:
7,769,266 UART: [state] CFI Enabled
7,779,262 UART: [state] LifecycleState = Unprovisioned
7,781,124 UART: [state] DebugLocked = No
7,783,535 UART: [state] WD Timer not started. Device not locked for debugging
7,787,221 UART: [kat] SHA2-256
7,966,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,977,903 UART: [kat] ++
7,978,440 UART: [kat] sha1
7,988,493 UART: [kat] SHA2-256
7,991,505 UART: [kat] SHA2-384
7,998,240 UART: [kat] SHA2-512-ACC
8,001,216 UART: [kat] ECC-384
10,444,214 UART: [kat] HMAC-384Kdf
10,456,001 UART: [kat] LMS
10,985,499 UART: [kat] --
10,991,332 UART: [cold-reset] ++
10,993,474 UART: [fht] FHT @ 0x50003400
11,004,499 UART: [idev] ++
11,005,072 UART: [idev] CDI.KEYID = 6
11,005,990 UART: [idev] SUBJECT.KEYID = 7
11,007,210 UART: [idev] UDS.KEYID = 0
11,009,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,153,786 UART: [idev] Erasing UDS.KEYID = 0
13,483,268 UART: [idev] Sha1 KeyId Algorithm
13,505,976 UART: [idev] --
13,511,208 UART: [ldev] ++
13,511,775 UART: [ldev] CDI.KEYID = 6
13,512,654 UART: [ldev] SUBJECT.KEYID = 5
13,513,862 UART: [ldev] AUTHORITY.KEYID = 7
13,515,097 UART: [ldev] FE.KEYID = 1
13,524,614 UART: [ldev] Erasing FE.KEYID = 1
15,998,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,716,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,732,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,748,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,764,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,784,186 UART: [ldev] --
17,788,639 UART: [fwproc] Wait for Commands...
17,791,009 UART: [fwproc] Recv command 0x46574c44
17,793,112 UART: [fwproc] Recv'd Img size: 114448 bytes
21,196,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,273,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,341,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,659,945 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,695,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,528 >>> mbox cmd response: failed
12,459,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,485 >>> mbox cmd response: failed
12,459,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,996 >>> mbox cmd response: failed
Initializing fuses
2,053,955 writing to cptra_bootfsm_go
11,098,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,668,400 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,153 UART:
192,522 UART: Running Caliptra ROM ...
193,725 UART:
193,883 UART: [state] CFI Enabled
261,739 UART: [state] LifecycleState = Unprovisioned
264,102 UART: [state] DebugLocked = No
265,318 UART: [state] WD Timer not started. Device not locked for debugging
269,940 UART: [kat] SHA2-256
459,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,467 UART: [kat] ++
470,943 UART: [kat] sha1
482,766 UART: [kat] SHA2-256
485,791 UART: [kat] SHA2-384
491,936 UART: [kat] SHA2-512-ACC
494,492 UART: [kat] ECC-384
2,947,133 UART: [kat] HMAC-384Kdf
2,971,002 UART: [kat] LMS
3,502,771 UART: [kat] --
3,506,386 UART: [cold-reset] ++
3,508,106 UART: [fht] FHT @ 0x50003400
3,519,682 UART: [idev] ++
3,520,421 UART: [idev] CDI.KEYID = 6
3,521,333 UART: [idev] SUBJECT.KEYID = 7
3,522,546 UART: [idev] UDS.KEYID = 0
3,525,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,836 UART: [idev] Erasing UDS.KEYID = 0
6,025,406 UART: [idev] Sha1 KeyId Algorithm
6,047,683 UART: [idev] --
6,051,448 UART: [ldev] ++
6,052,154 UART: [ldev] CDI.KEYID = 6
6,053,045 UART: [ldev] SUBJECT.KEYID = 5
6,054,212 UART: [ldev] AUTHORITY.KEYID = 7
6,055,449 UART: [ldev] FE.KEYID = 1
6,098,937 UART: [ldev] Erasing FE.KEYID = 1
8,607,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,971 UART: [ldev] --
10,408,293 UART: [fwproc] Wait for Commands...
10,410,663 UART: [fwproc] Recv command 0x46574c44
10,412,924 UART: [fwproc] Recv'd Img size: 114448 bytes
12,494,099 UART: ROM Fatal Error: 0x000B0018
12,497,773 >>> mbox cmd response: failed
12,498,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,431 >>> mbox cmd response: failed
12,498,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,499,034 >>> mbox cmd response: failed
Initializing fuses
2,057,130 writing to cptra_bootfsm_go
2,246,431 UART:
2,246,770 UART: Running Caliptra ROM ...
2,247,907 UART:
2,248,072 UART: [state] CFI Enabled
2,311,509 UART: [state] LifecycleState = Unprovisioned
2,313,936 UART: [state] DebugLocked = No
2,315,673 UART: [state] WD Timer not started. Device not locked for debugging
2,320,407 UART: [kat] SHA2-256
2,510,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,044 UART: [kat] ++
2,521,548 UART: [kat] sha1
2,533,953 UART: [kat] SHA2-256
2,536,980 UART: [kat] SHA2-384
2,542,272 UART: [kat] SHA2-512-ACC
2,544,840 UART: [kat] ECC-384
4,993,916 UART: [kat] HMAC-384Kdf
5,019,761 UART: [kat] LMS
5,551,549 UART: [kat] --
5,555,913 UART: [cold-reset] ++
5,558,384 UART: [fht] FHT @ 0x50003400
5,569,632 UART: [idev] ++
5,570,315 UART: [idev] CDI.KEYID = 6
5,571,275 UART: [idev] SUBJECT.KEYID = 7
5,572,490 UART: [idev] UDS.KEYID = 0
5,574,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,773 UART: [idev] Erasing UDS.KEYID = 0
8,073,750 UART: [idev] Sha1 KeyId Algorithm
8,095,741 UART: [idev] --
8,101,875 UART: [ldev] ++
8,102,569 UART: [ldev] CDI.KEYID = 6
8,103,638 UART: [ldev] SUBJECT.KEYID = 5
8,104,744 UART: [ldev] AUTHORITY.KEYID = 7
8,105,919 UART: [ldev] FE.KEYID = 1
8,146,267 UART: [ldev] Erasing FE.KEYID = 1
10,651,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,764 UART: [ldev] --
12,462,058 UART: [fwproc] Wait for Commands...
12,463,942 UART: [fwproc] Recv command 0x46574c44
12,466,258 UART: [fwproc] Recv'd Img size: 114448 bytes
15,912,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,647,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,421,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,275,852 >>> mbox cmd response: failed
12,276,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,276,750 >>> mbox cmd response: failed
12,277,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,277,340 >>> mbox cmd response: failed
Initializing fuses
2,062,425 writing to cptra_bootfsm_go
5,494,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,787,522 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,079 writing to cptra_bootfsm_go
193,430 UART:
193,788 UART: Running Caliptra ROM ...
194,989 UART:
604,662 UART: [state] CFI Enabled
619,129 UART: [state] LifecycleState = Unprovisioned
621,457 UART: [state] DebugLocked = No
622,726 UART: [state] WD Timer not started. Device not locked for debugging
626,336 UART: [kat] SHA2-256
816,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,009 UART: [kat] ++
827,551 UART: [kat] sha1
839,407 UART: [kat] SHA2-256
842,405 UART: [kat] SHA2-384
847,299 UART: [kat] SHA2-512-ACC
849,855 UART: [kat] ECC-384
3,292,777 UART: [kat] HMAC-384Kdf
3,305,559 UART: [kat] LMS
3,837,396 UART: [kat] --
3,842,258 UART: [cold-reset] ++
3,843,682 UART: [fht] FHT @ 0x50003400
3,855,263 UART: [idev] ++
3,855,950 UART: [idev] CDI.KEYID = 6
3,856,969 UART: [idev] SUBJECT.KEYID = 7
3,858,132 UART: [idev] UDS.KEYID = 0
3,860,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,852 UART: [idev] Erasing UDS.KEYID = 0
6,334,456 UART: [idev] Sha1 KeyId Algorithm
6,356,117 UART: [idev] --
6,362,324 UART: [ldev] ++
6,363,068 UART: [ldev] CDI.KEYID = 6
6,363,985 UART: [ldev] SUBJECT.KEYID = 5
6,365,145 UART: [ldev] AUTHORITY.KEYID = 7
6,366,318 UART: [ldev] FE.KEYID = 1
6,375,077 UART: [ldev] Erasing FE.KEYID = 1
8,851,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,619 UART: [ldev] --
10,643,453 UART: [fwproc] Wait for Commands...
10,645,809 UART: [fwproc] Recv command 0x46574c44
10,648,130 UART: [fwproc] Recv'd Img size: 114448 bytes
12,737,428 UART: ROM Fatal Error: 0x000B0018
12,741,049 >>> mbox cmd response: failed
12,741,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,685 >>> mbox cmd response: failed
12,741,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,281 >>> mbox cmd response: failed
Initializing fuses
2,054,397 writing to cptra_bootfsm_go
2,243,687 UART:
2,244,033 UART: Running Caliptra ROM ...
2,245,086 UART:
7,708,085 UART: [state] CFI Enabled
7,722,735 UART: [state] LifecycleState = Unprovisioned
7,725,078 UART: [state] DebugLocked = No
7,727,396 UART: [state] WD Timer not started. Device not locked for debugging
7,731,914 UART: [kat] SHA2-256
7,921,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,932,559 UART: [kat] ++
7,933,080 UART: [kat] sha1
7,945,211 UART: [kat] SHA2-256
7,948,240 UART: [kat] SHA2-384
7,954,394 UART: [kat] SHA2-512-ACC
7,957,015 UART: [kat] ECC-384
10,399,222 UART: [kat] HMAC-384Kdf
10,414,036 UART: [kat] LMS
10,945,856 UART: [kat] --
10,951,363 UART: [cold-reset] ++
10,952,392 UART: [fht] FHT @ 0x50003400
10,964,155 UART: [idev] ++
10,964,836 UART: [idev] CDI.KEYID = 6
10,965,773 UART: [idev] SUBJECT.KEYID = 7
10,966,983 UART: [idev] UDS.KEYID = 0
10,969,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,113,080 UART: [idev] Erasing UDS.KEYID = 0
13,446,077 UART: [idev] Sha1 KeyId Algorithm
13,468,988 UART: [idev] --
13,474,165 UART: [ldev] ++
13,474,844 UART: [ldev] CDI.KEYID = 6
13,475,778 UART: [ldev] SUBJECT.KEYID = 5
13,476,941 UART: [ldev] AUTHORITY.KEYID = 7
13,478,175 UART: [ldev] FE.KEYID = 1
13,489,819 UART: [ldev] Erasing FE.KEYID = 1
15,966,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,685,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,701,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,716,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,731,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,751,434 UART: [ldev] --
17,756,876 UART: [fwproc] Wait for Commands...
17,759,467 UART: [fwproc] Recv command 0x46574c44
17,761,787 UART: [fwproc] Recv'd Img size: 114448 bytes
21,204,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,282,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,397,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,941,434 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,757,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,517,484 >>> mbox cmd response: failed
12,518,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,518,409 >>> mbox cmd response: failed
12,518,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,518,975 >>> mbox cmd response: failed
Initializing fuses
2,073,606 writing to cptra_bootfsm_go
11,096,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,295,374 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,663 UART: [kat] SHA2-256
892,601 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,059 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,080 UART: [idev] Erasing UDS.KEYID = 0
1,504,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,520,877 UART: [ldev] Erasing FE.KEYID = 1
1,546,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,502 UART: [ldev] --
1,586,017 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 114448 bytes
1,634,006 UART: ROM Fatal Error: 0x000B0018
1,635,163 >>> mbox cmd response: failed
1,635,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,169 >>> mbox cmd response: failed
1,635,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,826 UART: [kat] SHA2-512-ACC
896,727 UART: [kat] ECC-384
902,088 UART: [kat] HMAC-384Kdf
906,660 UART: [kat] LMS
1,474,856 UART: [kat] --
1,475,587 UART: [cold-reset] ++
1,476,155 UART: [fht] Storing FHT @ 0x50003400
1,478,816 UART: [idev] ++
1,478,984 UART: [idev] CDI.KEYID = 6
1,479,344 UART: [idev] SUBJECT.KEYID = 7
1,479,768 UART: [idev] UDS.KEYID = 0
1,480,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,696 UART: [idev] Erasing UDS.KEYID = 0
1,503,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,316 UART: [idev] --
1,513,563 UART: [ldev] ++
1,513,731 UART: [ldev] CDI.KEYID = 6
1,514,094 UART: [ldev] SUBJECT.KEYID = 5
1,514,520 UART: [ldev] AUTHORITY.KEYID = 7
1,514,983 UART: [ldev] FE.KEYID = 1
1,520,097 UART: [ldev] Erasing FE.KEYID = 1
1,545,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,286 UART: [ldev] --
1,584,581 UART: [fwproc] Waiting for Commands...
1,585,202 UART: [fwproc] Received command 0x46574c44
1,585,993 UART: [fwproc] Received Image of size 114448 bytes
2,884,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,393 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,076,896 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,710 >>> mbox cmd response: failed
1,488,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,716 >>> mbox cmd response: failed
1,488,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,880 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,521 UART: [kat] LMS
1,475,717 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,121 UART: [idev] ++
1,480,289 UART: [idev] CDI.KEYID = 6
1,480,649 UART: [idev] SUBJECT.KEYID = 7
1,481,073 UART: [idev] UDS.KEYID = 0
1,481,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,203 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,639 UART: [idev] --
1,515,754 UART: [ldev] ++
1,515,922 UART: [ldev] CDI.KEYID = 6
1,516,285 UART: [ldev] SUBJECT.KEYID = 5
1,516,711 UART: [ldev] AUTHORITY.KEYID = 7
1,517,174 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,547,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,453 UART: [ldev] --
1,586,922 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 114448 bytes
1,636,739 UART: ROM Fatal Error: 0x000B0018
1,637,896 >>> mbox cmd response: failed
1,637,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,902 >>> mbox cmd response: failed
1,637,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,158 UART: [kat] SHA2-256
882,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,204 UART: [kat] ++
886,356 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,479 UART: [kat] HMAC-384Kdf
906,963 UART: [kat] LMS
1,475,159 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,578 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,429 UART: [idev] --
1,515,362 UART: [ldev] ++
1,515,530 UART: [ldev] CDI.KEYID = 6
1,515,893 UART: [ldev] SUBJECT.KEYID = 5
1,516,319 UART: [ldev] AUTHORITY.KEYID = 7
1,516,782 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,547,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,377 UART: [ldev] --
1,586,716 UART: [fwproc] Waiting for Commands...
1,587,415 UART: [fwproc] Received command 0x46574c44
1,588,206 UART: [fwproc] Received Image of size 114448 bytes
2,887,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,563 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,221 >>> mbox cmd response: failed
1,488,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,227 >>> mbox cmd response: failed
1,488,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,035 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,736 UART: [kat] SHA2-512-ACC
908,637 UART: [kat] ECC-384
918,408 UART: [kat] HMAC-384Kdf
923,110 UART: [kat] LMS
1,171,438 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,811 UART: [fht] FHT @ 0x50003400
1,175,228 UART: [idev] ++
1,175,396 UART: [idev] CDI.KEYID = 6
1,175,756 UART: [idev] SUBJECT.KEYID = 7
1,176,180 UART: [idev] UDS.KEYID = 0
1,176,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,112 UART: [idev] Erasing UDS.KEYID = 0
1,200,873 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,129 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,262 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,581 UART: ROM Fatal Error: 0x000B0018
1,331,738 >>> mbox cmd response: failed
1,331,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,744 >>> mbox cmd response: failed
1,331,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
893,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,483 UART: [kat] ++
897,635 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,604 UART: [kat] SHA2-512-ACC
908,505 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,708 UART: [kat] LMS
1,171,036 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,542 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,500 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,774 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,596 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,973 >>> mbox cmd response: failed
1,186,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,979 >>> mbox cmd response: failed
1,186,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,244 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,865 UART: [kat] SHA2-512-ACC
908,766 UART: [kat] ECC-384
918,361 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,100 UART: [cold-reset] ++
1,172,482 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,861 UART: [idev] Erasing UDS.KEYID = 0
1,201,672 UART: [idev] Sha1 KeyId Algorithm
1,210,048 UART: [idev] --
1,211,024 UART: [ldev] ++
1,211,192 UART: [ldev] CDI.KEYID = 6
1,211,555 UART: [ldev] SUBJECT.KEYID = 5
1,211,981 UART: [ldev] AUTHORITY.KEYID = 7
1,212,444 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,243,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,636 UART: [ldev] --
1,283,039 UART: [fwproc] Wait for Commands...
1,283,791 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,798 UART: ROM Fatal Error: 0x000B0018
1,331,955 >>> mbox cmd response: failed
1,331,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,961 >>> mbox cmd response: failed
1,331,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
893,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,632 UART: [kat] ++
897,784 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
917,921 UART: [kat] HMAC-384Kdf
922,679 UART: [kat] LMS
1,171,007 UART: [kat] --
1,171,848 UART: [cold-reset] ++
1,172,384 UART: [fht] FHT @ 0x50003400
1,175,197 UART: [idev] ++
1,175,365 UART: [idev] CDI.KEYID = 6
1,175,725 UART: [idev] SUBJECT.KEYID = 7
1,176,149 UART: [idev] UDS.KEYID = 0
1,176,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,390 UART: [idev] Sha1 KeyId Algorithm
1,209,856 UART: [idev] --
1,210,774 UART: [ldev] ++
1,210,942 UART: [ldev] CDI.KEYID = 6
1,211,305 UART: [ldev] SUBJECT.KEYID = 5
1,211,731 UART: [ldev] AUTHORITY.KEYID = 7
1,212,194 UART: [ldev] FE.KEYID = 1
1,217,688 UART: [ldev] Erasing FE.KEYID = 1
1,244,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,960 UART: [ldev] --
1,283,439 UART: [fwproc] Wait for Commands...
1,284,213 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,650 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,302 >>> mbox cmd response: failed
1,187,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,308 >>> mbox cmd response: failed
1,187,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,344 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,989 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,174,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,369 UART: [idev] Erasing UDS.KEYID = 0
1,199,543 UART: [idev] Sha1 KeyId Algorithm
1,208,391 UART: [idev] --
1,209,362 UART: [ldev] ++
1,209,530 UART: [ldev] CDI.KEYID = 6
1,209,894 UART: [ldev] SUBJECT.KEYID = 5
1,210,321 UART: [ldev] AUTHORITY.KEYID = 7
1,210,784 UART: [ldev] FE.KEYID = 1
1,216,032 UART: [ldev] Erasing FE.KEYID = 1
1,242,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,696 UART: [ldev] --
1,282,062 UART: [fwproc] Wait for Commands...
1,282,761 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,838 UART: ROM Fatal Error: 0x000B0018
1,330,995 >>> mbox cmd response: failed
1,330,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,001 >>> mbox cmd response: failed
1,331,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,445 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,447 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,215,870 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,359 UART: [fwproc] Recv command 0x46574c44
1,283,092 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,553 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,232 >>> mbox cmd response: failed
1,183,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,238 >>> mbox cmd response: failed
1,183,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,399 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,174,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,198,944 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,379 UART: [ldev] Erasing FE.KEYID = 1
1,241,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,171 UART: [ldev] --
1,280,525 UART: [fwproc] Wait for Commands...
1,281,186 UART: [fwproc] Recv command 0x46574c44
1,281,919 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,381 UART: ROM Fatal Error: 0x000B0018
1,329,538 >>> mbox cmd response: failed
1,329,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,544 >>> mbox cmd response: failed
1,329,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,575 UART: [kat] HMAC-384Kdf
920,177 UART: [kat] LMS
1,168,489 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,174,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,608 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,169 UART: [ldev] Erasing FE.KEYID = 1
1,241,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,955 UART: [ldev] --
1,280,409 UART: [fwproc] Wait for Commands...
1,281,004 UART: [fwproc] Recv command 0x46574c44
1,281,737 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,682 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,731 >>> mbox cmd response: failed
1,184,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,737 >>> mbox cmd response: failed
1,184,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,390 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
191,988 UART:
192,348 UART: Running Caliptra ROM ...
193,451 UART:
193,593 UART: [state] CFI Enabled
264,680 UART: [state] LifecycleState = Unprovisioned
266,655 UART: [state] DebugLocked = No
269,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,508 UART: [kat] SHA2-256
443,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,716 UART: [kat] ++
454,198 UART: [kat] sha1
465,615 UART: [kat] SHA2-256
468,308 UART: [kat] SHA2-384
474,411 UART: [kat] SHA2-512-ACC
476,810 UART: [kat] ECC-384
2,768,576 UART: [kat] HMAC-384Kdf
2,799,899 UART: [kat] LMS
3,990,191 UART: [kat] --
3,994,745 UART: [cold-reset] ++
3,996,790 UART: [fht] Storing FHT @ 0x50003400
4,008,869 UART: [idev] ++
4,009,449 UART: [idev] CDI.KEYID = 6
4,010,520 UART: [idev] SUBJECT.KEYID = 7
4,011,627 UART: [idev] UDS.KEYID = 0
4,014,164 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,951 UART: [idev] Erasing UDS.KEYID = 0
7,343,345 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,647 UART: [idev] --
7,369,482 UART: [ldev] ++
7,370,074 UART: [ldev] CDI.KEYID = 6
7,370,994 UART: [ldev] SUBJECT.KEYID = 5
7,372,209 UART: [ldev] AUTHORITY.KEYID = 7
7,373,497 UART: [ldev] FE.KEYID = 1
7,421,092 UART: [ldev] Erasing FE.KEYID = 1
10,752,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,821 UART: [ldev] --
13,110,825 UART: [fwproc] Waiting for Commands...
13,114,058 UART: [fwproc] Received command 0x46574c44
13,116,247 UART: [fwproc] Received Image of size 114124 bytes
15,823,565 UART: ROM Fatal Error: 0x000B0034
15,827,064 >>> mbox cmd response: failed
15,827,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,816 >>> mbox cmd response: failed
15,828,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,380 >>> mbox cmd response: failed
Initializing fuses
2,054,237 writing to cptra_bootfsm_go
2,243,830 UART:
2,244,171 UART: Running Caliptra ROM ...
2,245,308 UART:
2,245,483 UART: [state] CFI Enabled
2,302,216 UART: [state] LifecycleState = Unprovisioned
2,304,142 UART: [state] DebugLocked = No
2,306,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,632 UART: [kat] SHA2-256
2,481,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,821 UART: [kat] ++
2,492,284 UART: [kat] sha1
2,503,443 UART: [kat] SHA2-256
2,506,143 UART: [kat] SHA2-384
2,513,052 UART: [kat] SHA2-512-ACC
2,515,413 UART: [kat] ECC-384
4,809,081 UART: [kat] HMAC-384Kdf
4,840,314 UART: [kat] LMS
6,030,619 UART: [kat] --
6,034,583 UART: [cold-reset] ++
6,036,523 UART: [fht] Storing FHT @ 0x50003400
6,048,389 UART: [idev] ++
6,048,962 UART: [idev] CDI.KEYID = 6
6,049,873 UART: [idev] SUBJECT.KEYID = 7
6,051,143 UART: [idev] UDS.KEYID = 0
6,053,349 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,196,989 UART: [idev] Erasing UDS.KEYID = 0
9,387,646 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,211 UART: [idev] --
9,414,526 UART: [ldev] ++
9,415,137 UART: [ldev] CDI.KEYID = 6
9,416,054 UART: [ldev] SUBJECT.KEYID = 5
9,417,271 UART: [ldev] AUTHORITY.KEYID = 7
9,418,403 UART: [ldev] FE.KEYID = 1
9,462,699 UART: [ldev] Erasing FE.KEYID = 1
12,792,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,215 UART: [ldev] --
15,158,396 UART: [fwproc] Waiting for Commands...
15,160,280 UART: [fwproc] Received command 0x46574c44
15,162,464 UART: [fwproc] Received Image of size 114124 bytes
19,210,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,291,423 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,360,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,678,124 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,807,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,590,366 >>> mbox cmd response: failed
15,590,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,591,327 >>> mbox cmd response: failed
15,591,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,591,889 >>> mbox cmd response: failed
Initializing fuses
2,061,368 writing to cptra_bootfsm_go
5,855,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,925,400 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,491 UART:
192,849 UART: Running Caliptra ROM ...
193,951 UART:
603,634 UART: [state] CFI Enabled
619,718 UART: [state] LifecycleState = Unprovisioned
621,653 UART: [state] DebugLocked = No
623,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,618 UART: [kat] SHA2-256
797,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,707 UART: [kat] ++
808,293 UART: [kat] sha1
818,744 UART: [kat] SHA2-256
821,442 UART: [kat] SHA2-384
826,822 UART: [kat] SHA2-512-ACC
829,215 UART: [kat] ECC-384
3,113,674 UART: [kat] HMAC-384Kdf
3,125,760 UART: [kat] LMS
4,315,857 UART: [kat] --
4,321,008 UART: [cold-reset] ++
4,322,137 UART: [fht] Storing FHT @ 0x50003400
4,333,842 UART: [idev] ++
4,334,406 UART: [idev] CDI.KEYID = 6
4,335,344 UART: [idev] SUBJECT.KEYID = 7
4,336,556 UART: [idev] UDS.KEYID = 0
4,339,077 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,637 UART: [idev] Erasing UDS.KEYID = 0
7,621,952 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,361 UART: [idev] --
7,646,407 UART: [ldev] ++
7,646,981 UART: [ldev] CDI.KEYID = 6
7,647,943 UART: [ldev] SUBJECT.KEYID = 5
7,649,160 UART: [ldev] AUTHORITY.KEYID = 7
7,650,396 UART: [ldev] FE.KEYID = 1
7,661,421 UART: [ldev] Erasing FE.KEYID = 1
10,949,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,162 UART: [ldev] --
13,310,049 UART: [fwproc] Waiting for Commands...
13,312,099 UART: [fwproc] Received command 0x46574c44
13,314,289 UART: [fwproc] Received Image of size 114124 bytes
16,019,243 UART: ROM Fatal Error: 0x000B0034
16,022,768 >>> mbox cmd response: failed
16,023,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,511 >>> mbox cmd response: failed
16,023,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,076 >>> mbox cmd response: failed
Initializing fuses
2,061,161 writing to cptra_bootfsm_go
2,250,477 UART:
2,250,833 UART: Running Caliptra ROM ...
2,251,977 UART:
4,433,253 UART: [state] CFI Enabled
4,446,039 UART: [state] LifecycleState = Unprovisioned
4,447,980 UART: [state] DebugLocked = No
4,449,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,734 UART: [kat] SHA2-256
4,624,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,635,024 UART: [kat] ++
4,635,493 UART: [kat] sha1
4,647,515 UART: [kat] SHA2-256
4,650,218 UART: [kat] SHA2-384
4,656,582 UART: [kat] SHA2-512-ACC
4,658,928 UART: [kat] ECC-384
6,945,723 UART: [kat] HMAC-384Kdf
6,958,057 UART: [kat] LMS
8,148,141 UART: [kat] --
8,151,753 UART: [cold-reset] ++
8,153,409 UART: [fht] Storing FHT @ 0x50003400
8,165,753 UART: [idev] ++
8,166,328 UART: [idev] CDI.KEYID = 6
8,167,242 UART: [idev] SUBJECT.KEYID = 7
8,168,531 UART: [idev] UDS.KEYID = 0
8,170,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,314,253 UART: [idev] Erasing UDS.KEYID = 0
11,458,528 UART: [idev] Using Sha1 for KeyId Algorithm
11,480,209 UART: [idev] --
11,483,625 UART: [ldev] ++
11,484,285 UART: [ldev] CDI.KEYID = 6
11,485,177 UART: [ldev] SUBJECT.KEYID = 5
11,486,447 UART: [ldev] AUTHORITY.KEYID = 7
11,487,687 UART: [ldev] FE.KEYID = 1
11,498,145 UART: [ldev] Erasing FE.KEYID = 1
14,786,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,093,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,140,464 UART: [ldev] --
17,145,949 UART: [fwproc] Waiting for Commands...
17,148,316 UART: [fwproc] Received command 0x46574c44
17,150,497 UART: [fwproc] Received Image of size 114124 bytes
21,198,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,272,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,341,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,659,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,131,880 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,758,951 >>> mbox cmd response: failed
15,759,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,825 >>> mbox cmd response: failed
15,760,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,390 >>> mbox cmd response: failed
Initializing fuses
2,055,779 writing to cptra_bootfsm_go
8,235,029 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,186,827 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,282 UART:
192,651 UART: Running Caliptra ROM ...
193,848 UART:
194,004 UART: [state] CFI Enabled
260,976 UART: [state] LifecycleState = Unprovisioned
262,897 UART: [state] DebugLocked = No
265,687 UART: [state] WD Timer not started. Device not locked for debugging
269,577 UART: [kat] SHA2-256
448,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,275 UART: [kat] ++
460,817 UART: [kat] sha1
471,324 UART: [kat] SHA2-256
474,327 UART: [kat] SHA2-384
480,518 UART: [kat] SHA2-512-ACC
483,477 UART: [kat] ECC-384
2,945,237 UART: [kat] HMAC-384Kdf
2,971,247 UART: [kat] LMS
3,500,682 UART: [kat] --
3,505,804 UART: [cold-reset] ++
3,507,896 UART: [fht] FHT @ 0x50003400
3,518,443 UART: [idev] ++
3,519,008 UART: [idev] CDI.KEYID = 6
3,519,895 UART: [idev] SUBJECT.KEYID = 7
3,521,106 UART: [idev] UDS.KEYID = 0
3,524,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,451 UART: [idev] Erasing UDS.KEYID = 0
6,028,139 UART: [idev] Sha1 KeyId Algorithm
6,051,321 UART: [idev] --
6,055,944 UART: [ldev] ++
6,056,524 UART: [ldev] CDI.KEYID = 6
6,057,434 UART: [ldev] SUBJECT.KEYID = 5
6,058,658 UART: [ldev] AUTHORITY.KEYID = 7
6,059,899 UART: [ldev] FE.KEYID = 1
6,100,067 UART: [ldev] Erasing FE.KEYID = 1
8,606,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,218 UART: [ldev] --
10,413,079 UART: [fwproc] Wait for Commands...
10,415,826 UART: [fwproc] Recv command 0x46574c44
10,417,922 UART: [fwproc] Recv'd Img size: 114448 bytes
12,472,070 UART: ROM Fatal Error: 0x000B0034
12,475,195 >>> mbox cmd response: failed
12,475,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,475,889 >>> mbox cmd response: failed
12,476,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,667 >>> mbox cmd response: failed
Initializing fuses
2,053,394 writing to cptra_bootfsm_go
2,242,705 UART:
2,243,045 UART: Running Caliptra ROM ...
2,244,184 UART:
2,244,348 UART: [state] CFI Enabled
2,314,796 UART: [state] LifecycleState = Unprovisioned
2,316,678 UART: [state] DebugLocked = No
2,319,470 UART: [state] WD Timer not started. Device not locked for debugging
2,322,350 UART: [kat] SHA2-256
2,501,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,039 UART: [kat] ++
2,513,596 UART: [kat] sha1
2,524,981 UART: [kat] SHA2-256
2,528,050 UART: [kat] SHA2-384
2,534,529 UART: [kat] SHA2-512-ACC
2,537,457 UART: [kat] ECC-384
5,000,468 UART: [kat] HMAC-384Kdf
5,022,576 UART: [kat] LMS
5,551,992 UART: [kat] --
5,555,123 UART: [cold-reset] ++
5,556,522 UART: [fht] FHT @ 0x50003400
5,566,478 UART: [idev] ++
5,567,040 UART: [idev] CDI.KEYID = 6
5,567,952 UART: [idev] SUBJECT.KEYID = 7
5,569,166 UART: [idev] UDS.KEYID = 0
5,571,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,486 UART: [idev] Erasing UDS.KEYID = 0
8,079,223 UART: [idev] Sha1 KeyId Algorithm
8,102,517 UART: [idev] --
8,106,727 UART: [ldev] ++
8,107,297 UART: [ldev] CDI.KEYID = 6
8,108,179 UART: [ldev] SUBJECT.KEYID = 5
8,109,309 UART: [ldev] AUTHORITY.KEYID = 7
8,110,564 UART: [ldev] FE.KEYID = 1
8,153,686 UART: [ldev] Erasing FE.KEYID = 1
10,654,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,373,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,086 UART: [ldev] --
12,445,163 UART: [fwproc] Wait for Commands...
12,447,549 UART: [fwproc] Recv command 0x46574c44
12,449,648 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,930,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,999,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,317,489 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,384,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,256,296 >>> mbox cmd response: failed
12,256,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,257,231 >>> mbox cmd response: failed
12,257,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,257,831 >>> mbox cmd response: failed
Initializing fuses
2,056,966 writing to cptra_bootfsm_go
5,442,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,148,431 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,503 UART:
192,883 UART: Running Caliptra ROM ...
194,092 UART:
603,788 UART: [state] CFI Enabled
615,214 UART: [state] LifecycleState = Unprovisioned
617,047 UART: [state] DebugLocked = No
618,490 UART: [state] WD Timer not started. Device not locked for debugging
622,595 UART: [kat] SHA2-256
801,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,244 UART: [kat] ++
813,780 UART: [kat] sha1
824,668 UART: [kat] SHA2-256
827,728 UART: [kat] SHA2-384
833,266 UART: [kat] SHA2-512-ACC
836,197 UART: [kat] ECC-384
3,278,699 UART: [kat] HMAC-384Kdf
3,291,155 UART: [kat] LMS
3,820,685 UART: [kat] --
3,826,466 UART: [cold-reset] ++
3,828,907 UART: [fht] FHT @ 0x50003400
3,839,166 UART: [idev] ++
3,839,743 UART: [idev] CDI.KEYID = 6
3,840,655 UART: [idev] SUBJECT.KEYID = 7
3,841,872 UART: [idev] UDS.KEYID = 0
3,844,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,539 UART: [idev] Erasing UDS.KEYID = 0
6,317,396 UART: [idev] Sha1 KeyId Algorithm
6,339,916 UART: [idev] --
6,343,902 UART: [ldev] ++
6,344,472 UART: [ldev] CDI.KEYID = 6
6,345,383 UART: [ldev] SUBJECT.KEYID = 5
6,346,543 UART: [ldev] AUTHORITY.KEYID = 7
6,347,828 UART: [ldev] FE.KEYID = 1
6,359,390 UART: [ldev] Erasing FE.KEYID = 1
8,830,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,057 UART: [ldev] --
10,622,549 UART: [fwproc] Wait for Commands...
10,624,480 UART: [fwproc] Recv command 0x46574c44
10,626,525 UART: [fwproc] Recv'd Img size: 114448 bytes
12,686,282 UART: ROM Fatal Error: 0x000B0034
12,689,403 >>> mbox cmd response: failed
12,689,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,690,223 >>> mbox cmd response: failed
12,690,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,690,826 >>> mbox cmd response: failed
Initializing fuses
2,053,790 writing to cptra_bootfsm_go
2,243,127 UART:
2,243,471 UART: Running Caliptra ROM ...
2,244,609 UART:
7,761,422 UART: [state] CFI Enabled
7,775,899 UART: [state] LifecycleState = Unprovisioned
7,777,759 UART: [state] DebugLocked = No
7,780,171 UART: [state] WD Timer not started. Device not locked for debugging
7,783,773 UART: [kat] SHA2-256
7,962,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,974,519 UART: [kat] ++
7,975,064 UART: [kat] sha1
7,986,616 UART: [kat] SHA2-256
7,989,628 UART: [kat] SHA2-384
7,995,624 UART: [kat] SHA2-512-ACC
7,998,586 UART: [kat] ECC-384
10,439,511 UART: [kat] HMAC-384Kdf
10,452,007 UART: [kat] LMS
10,981,518 UART: [kat] --
10,985,970 UART: [cold-reset] ++
10,987,361 UART: [fht] FHT @ 0x50003400
10,999,319 UART: [idev] ++
10,999,888 UART: [idev] CDI.KEYID = 6
11,000,801 UART: [idev] SUBJECT.KEYID = 7
11,001,964 UART: [idev] UDS.KEYID = 0
11,004,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,148,393 UART: [idev] Erasing UDS.KEYID = 0
13,472,362 UART: [idev] Sha1 KeyId Algorithm
13,495,646 UART: [idev] --
13,500,175 UART: [ldev] ++
13,500,744 UART: [ldev] CDI.KEYID = 6
13,501,671 UART: [ldev] SUBJECT.KEYID = 5
13,502,887 UART: [ldev] AUTHORITY.KEYID = 7
13,504,117 UART: [ldev] FE.KEYID = 1
13,515,893 UART: [ldev] Erasing FE.KEYID = 1
15,994,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,780,668 UART: [ldev] --
17,785,857 UART: [fwproc] Wait for Commands...
17,788,349 UART: [fwproc] Recv command 0x46574c44
17,790,447 UART: [fwproc] Recv'd Img size: 114448 bytes
21,194,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,268,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,337,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,655,387 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,694,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,457,791 >>> mbox cmd response: failed
12,458,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,798 >>> mbox cmd response: failed
12,459,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,310 >>> mbox cmd response: failed
Initializing fuses
2,053,112 writing to cptra_bootfsm_go
11,102,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,687,556 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,100 UART:
192,470 UART: Running Caliptra ROM ...
193,573 UART:
193,715 UART: [state] CFI Enabled
265,558 UART: [state] LifecycleState = Unprovisioned
267,938 UART: [state] DebugLocked = No
269,508 UART: [state] WD Timer not started. Device not locked for debugging
274,692 UART: [kat] SHA2-256
464,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,338 UART: [kat] ++
475,786 UART: [kat] sha1
487,856 UART: [kat] SHA2-256
490,881 UART: [kat] SHA2-384
497,403 UART: [kat] SHA2-512-ACC
499,959 UART: [kat] ECC-384
2,944,901 UART: [kat] HMAC-384Kdf
2,970,315 UART: [kat] LMS
3,502,119 UART: [kat] --
3,505,106 UART: [cold-reset] ++
3,507,480 UART: [fht] FHT @ 0x50003400
3,519,598 UART: [idev] ++
3,520,293 UART: [idev] CDI.KEYID = 6
3,521,227 UART: [idev] SUBJECT.KEYID = 7
3,522,441 UART: [idev] UDS.KEYID = 0
3,525,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,266 UART: [idev] Erasing UDS.KEYID = 0
6,027,097 UART: [idev] Sha1 KeyId Algorithm
6,048,547 UART: [idev] --
6,053,398 UART: [ldev] ++
6,054,095 UART: [ldev] CDI.KEYID = 6
6,054,987 UART: [ldev] SUBJECT.KEYID = 5
6,056,149 UART: [ldev] AUTHORITY.KEYID = 7
6,057,384 UART: [ldev] FE.KEYID = 1
6,099,497 UART: [ldev] Erasing FE.KEYID = 1
8,601,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,881 UART: [ldev] --
10,415,128 UART: [fwproc] Wait for Commands...
10,418,142 UART: [fwproc] Recv command 0x46574c44
10,420,400 UART: [fwproc] Recv'd Img size: 114448 bytes
12,499,012 UART: ROM Fatal Error: 0x000B0034
12,502,678 >>> mbox cmd response: failed
12,503,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,351 >>> mbox cmd response: failed
12,503,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,905 >>> mbox cmd response: failed
Initializing fuses
2,055,252 writing to cptra_bootfsm_go
2,244,570 UART:
2,244,924 UART: Running Caliptra ROM ...
2,245,974 UART:
2,246,124 UART: [state] CFI Enabled
2,308,684 UART: [state] LifecycleState = Unprovisioned
2,311,064 UART: [state] DebugLocked = No
2,313,190 UART: [state] WD Timer not started. Device not locked for debugging
2,317,214 UART: [kat] SHA2-256
2,507,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,517,817 UART: [kat] ++
2,518,312 UART: [kat] sha1
2,529,263 UART: [kat] SHA2-256
2,532,283 UART: [kat] SHA2-384
2,536,600 UART: [kat] SHA2-512-ACC
2,539,183 UART: [kat] ECC-384
4,988,093 UART: [kat] HMAC-384Kdf
5,014,680 UART: [kat] LMS
5,546,425 UART: [kat] --
5,551,948 UART: [cold-reset] ++
5,554,375 UART: [fht] FHT @ 0x50003400
5,567,030 UART: [idev] ++
5,567,710 UART: [idev] CDI.KEYID = 6
5,568,649 UART: [idev] SUBJECT.KEYID = 7
5,569,869 UART: [idev] UDS.KEYID = 0
5,572,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,716,167 UART: [idev] Erasing UDS.KEYID = 0
8,094,477 UART: [idev] Sha1 KeyId Algorithm
8,117,122 UART: [idev] --
8,122,668 UART: [ldev] ++
8,123,357 UART: [ldev] CDI.KEYID = 6
8,124,243 UART: [ldev] SUBJECT.KEYID = 5
8,125,458 UART: [ldev] AUTHORITY.KEYID = 7
8,126,666 UART: [ldev] FE.KEYID = 1
8,164,726 UART: [ldev] Erasing FE.KEYID = 1
10,670,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,452,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,967 UART: [ldev] --
12,477,746 UART: [fwproc] Wait for Commands...
12,479,635 UART: [fwproc] Recv command 0x46574c44
12,481,955 UART: [fwproc] Recv'd Img size: 114448 bytes
15,934,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,006,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,122,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,665,245 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,441,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,321,883 >>> mbox cmd response: failed
12,322,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,322,829 >>> mbox cmd response: failed
12,323,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,323,396 >>> mbox cmd response: failed
Initializing fuses
2,059,866 writing to cptra_bootfsm_go
5,496,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,789,173 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,614 UART:
192,979 UART: Running Caliptra ROM ...
194,097 UART:
603,667 UART: [state] CFI Enabled
615,645 UART: [state] LifecycleState = Unprovisioned
618,065 UART: [state] DebugLocked = No
619,800 UART: [state] WD Timer not started. Device not locked for debugging
624,651 UART: [kat] SHA2-256
814,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,308 UART: [kat] ++
825,809 UART: [kat] sha1
837,011 UART: [kat] SHA2-256
840,071 UART: [kat] SHA2-384
845,568 UART: [kat] SHA2-512-ACC
848,172 UART: [kat] ECC-384
3,290,126 UART: [kat] HMAC-384Kdf
3,303,345 UART: [kat] LMS
3,835,153 UART: [kat] --
3,839,363 UART: [cold-reset] ++
3,841,457 UART: [fht] FHT @ 0x50003400
3,852,060 UART: [idev] ++
3,852,740 UART: [idev] CDI.KEYID = 6
3,853,754 UART: [idev] SUBJECT.KEYID = 7
3,854,860 UART: [idev] UDS.KEYID = 0
3,857,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,647 UART: [idev] Erasing UDS.KEYID = 0
6,330,707 UART: [idev] Sha1 KeyId Algorithm
6,353,912 UART: [idev] --
6,357,854 UART: [ldev] ++
6,358,532 UART: [ldev] CDI.KEYID = 6
6,359,417 UART: [ldev] SUBJECT.KEYID = 5
6,360,630 UART: [ldev] AUTHORITY.KEYID = 7
6,361,885 UART: [ldev] FE.KEYID = 1
6,371,771 UART: [ldev] Erasing FE.KEYID = 1
8,852,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,424 UART: [ldev] --
10,640,284 UART: [fwproc] Wait for Commands...
10,642,823 UART: [fwproc] Recv command 0x46574c44
10,645,137 UART: [fwproc] Recv'd Img size: 114448 bytes
12,728,576 UART: ROM Fatal Error: 0x000B0034
12,732,220 >>> mbox cmd response: failed
12,732,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,732,876 >>> mbox cmd response: failed
12,733,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,498 >>> mbox cmd response: failed
Initializing fuses
2,060,427 writing to cptra_bootfsm_go
2,249,712 UART:
2,250,044 UART: Running Caliptra ROM ...
2,251,092 UART:
7,717,819 UART: [state] CFI Enabled
7,732,139 UART: [state] LifecycleState = Unprovisioned
7,734,546 UART: [state] DebugLocked = No
7,736,852 UART: [state] WD Timer not started. Device not locked for debugging
7,741,583 UART: [kat] SHA2-256
7,931,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,942,226 UART: [kat] ++
7,942,824 UART: [kat] sha1
7,955,680 UART: [kat] SHA2-256
7,958,676 UART: [kat] SHA2-384
7,963,592 UART: [kat] SHA2-512-ACC
7,966,214 UART: [kat] ECC-384
10,407,291 UART: [kat] HMAC-384Kdf
10,422,009 UART: [kat] LMS
10,953,824 UART: [kat] --
10,959,766 UART: [cold-reset] ++
10,961,858 UART: [fht] FHT @ 0x50003400
10,972,994 UART: [idev] ++
10,973,674 UART: [idev] CDI.KEYID = 6
10,974,611 UART: [idev] SUBJECT.KEYID = 7
10,975,819 UART: [idev] UDS.KEYID = 0
10,978,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,121,833 UART: [idev] Erasing UDS.KEYID = 0
13,448,658 UART: [idev] Sha1 KeyId Algorithm
13,472,394 UART: [idev] --
13,477,660 UART: [ldev] ++
13,478,347 UART: [ldev] CDI.KEYID = 6
13,479,260 UART: [ldev] SUBJECT.KEYID = 5
13,480,415 UART: [ldev] AUTHORITY.KEYID = 7
13,481,643 UART: [ldev] FE.KEYID = 1
13,491,371 UART: [ldev] Erasing FE.KEYID = 1
15,966,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,687,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,717,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,754,040 UART: [ldev] --
17,759,847 UART: [fwproc] Wait for Commands...
17,763,022 UART: [fwproc] Recv command 0x46574c44
17,765,292 UART: [fwproc] Recv'd Img size: 114448 bytes
21,210,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,298,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,414,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,958,365 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,756,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,522,583 >>> mbox cmd response: failed
12,523,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,476 >>> mbox cmd response: failed
12,523,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,095 >>> mbox cmd response: failed
Initializing fuses
2,054,776 writing to cptra_bootfsm_go
11,095,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,294,665 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,112 UART: [kat] HMAC-384Kdf
906,718 UART: [kat] LMS
1,474,914 UART: [kat] --
1,475,747 UART: [cold-reset] ++
1,476,159 UART: [fht] Storing FHT @ 0x50003400
1,478,770 UART: [idev] ++
1,478,938 UART: [idev] CDI.KEYID = 6
1,479,298 UART: [idev] SUBJECT.KEYID = 7
1,479,722 UART: [idev] UDS.KEYID = 0
1,480,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,386 UART: [idev] Erasing UDS.KEYID = 0
1,503,732 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,404 UART: [idev] --
1,513,399 UART: [ldev] ++
1,513,567 UART: [ldev] CDI.KEYID = 6
1,513,930 UART: [ldev] SUBJECT.KEYID = 5
1,514,356 UART: [ldev] AUTHORITY.KEYID = 7
1,514,819 UART: [ldev] FE.KEYID = 1
1,520,031 UART: [ldev] Erasing FE.KEYID = 1
1,545,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,682 UART: [ldev] --
1,585,001 UART: [fwproc] Waiting for Commands...
1,585,738 UART: [fwproc] Received command 0x46574c44
1,586,529 UART: [fwproc] Received Image of size 114448 bytes
1,633,552 UART: ROM Fatal Error: 0x000B0034
1,634,709 >>> mbox cmd response: failed
1,634,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,715 >>> mbox cmd response: failed
1,634,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,750 UART: [state] LifecycleState = Unprovisioned
86,405 UART: [state] DebugLocked = No
87,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,551 UART: [kat] SHA2-256
882,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,597 UART: [kat] ++
886,749 UART: [kat] sha1
890,801 UART: [kat] SHA2-256
892,739 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,153 UART: [fht] Storing FHT @ 0x50003400
1,479,938 UART: [idev] ++
1,480,106 UART: [idev] CDI.KEYID = 6
1,480,466 UART: [idev] SUBJECT.KEYID = 7
1,480,890 UART: [idev] UDS.KEYID = 0
1,481,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,866 UART: [idev] Erasing UDS.KEYID = 0
1,505,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,242 UART: [idev] --
1,515,201 UART: [ldev] ++
1,515,369 UART: [ldev] CDI.KEYID = 6
1,515,732 UART: [ldev] SUBJECT.KEYID = 5
1,516,158 UART: [ldev] AUTHORITY.KEYID = 7
1,516,621 UART: [ldev] FE.KEYID = 1
1,521,889 UART: [ldev] Erasing FE.KEYID = 1
1,547,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,632 UART: [ldev] --
1,586,979 UART: [fwproc] Waiting for Commands...
1,587,798 UART: [fwproc] Received command 0x46574c44
1,588,589 UART: [fwproc] Received Image of size 114448 bytes
2,887,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,142 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,210 >>> mbox cmd response: failed
1,488,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,216 >>> mbox cmd response: failed
1,488,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,896 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
902,937 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,662 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,965 UART: [idev] ++
1,480,133 UART: [idev] CDI.KEYID = 6
1,480,493 UART: [idev] SUBJECT.KEYID = 7
1,480,917 UART: [idev] UDS.KEYID = 0
1,481,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,885 UART: [idev] Erasing UDS.KEYID = 0
1,505,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,851 UART: [idev] --
1,514,764 UART: [ldev] ++
1,514,932 UART: [ldev] CDI.KEYID = 6
1,515,295 UART: [ldev] SUBJECT.KEYID = 5
1,515,721 UART: [ldev] AUTHORITY.KEYID = 7
1,516,184 UART: [ldev] FE.KEYID = 1
1,521,480 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,033 UART: [ldev] --
1,586,450 UART: [fwproc] Waiting for Commands...
1,587,169 UART: [fwproc] Received command 0x46574c44
1,587,960 UART: [fwproc] Received Image of size 114448 bytes
1,635,763 UART: ROM Fatal Error: 0x000B0034
1,636,920 >>> mbox cmd response: failed
1,636,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,926 >>> mbox cmd response: failed
1,636,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,467 UART: [kat] HMAC-384Kdf
908,279 UART: [kat] LMS
1,476,475 UART: [kat] --
1,477,248 UART: [cold-reset] ++
1,477,810 UART: [fht] Storing FHT @ 0x50003400
1,480,547 UART: [idev] ++
1,480,715 UART: [idev] CDI.KEYID = 6
1,481,075 UART: [idev] SUBJECT.KEYID = 7
1,481,499 UART: [idev] UDS.KEYID = 0
1,481,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,053 UART: [idev] Erasing UDS.KEYID = 0
1,505,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,652 UART: [ldev] ++
1,515,820 UART: [ldev] CDI.KEYID = 6
1,516,183 UART: [ldev] SUBJECT.KEYID = 5
1,516,609 UART: [ldev] AUTHORITY.KEYID = 7
1,517,072 UART: [ldev] FE.KEYID = 1
1,522,384 UART: [ldev] Erasing FE.KEYID = 1
1,548,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,351 UART: [ldev] --
1,587,660 UART: [fwproc] Waiting for Commands...
1,588,403 UART: [fwproc] Received command 0x46574c44
1,589,194 UART: [fwproc] Received Image of size 114448 bytes
2,887,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,621 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,579 >>> mbox cmd response: failed
1,489,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,585 >>> mbox cmd response: failed
1,489,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,201 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,531 UART: [kat] SHA2-256
903,471 UART: [kat] SHA2-384
906,102 UART: [kat] SHA2-512-ACC
908,003 UART: [kat] ECC-384
917,716 UART: [kat] HMAC-384Kdf
922,342 UART: [kat] LMS
1,170,670 UART: [kat] --
1,171,531 UART: [cold-reset] ++
1,172,017 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,542 UART: [idev] Erasing UDS.KEYID = 0
1,200,951 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,269 UART: [ldev] ++
1,210,437 UART: [ldev] CDI.KEYID = 6
1,210,800 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,739 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,226 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,709 UART: ROM Fatal Error: 0x000B0034
1,332,866 >>> mbox cmd response: failed
1,332,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,872 >>> mbox cmd response: failed
1,332,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
893,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,185 UART: [kat] ++
897,337 UART: [kat] sha1
901,399 UART: [kat] SHA2-256
903,339 UART: [kat] SHA2-384
906,068 UART: [kat] SHA2-512-ACC
907,969 UART: [kat] ECC-384
917,602 UART: [kat] HMAC-384Kdf
922,382 UART: [kat] LMS
1,170,710 UART: [kat] --
1,171,533 UART: [cold-reset] ++
1,171,869 UART: [fht] FHT @ 0x50003400
1,174,388 UART: [idev] ++
1,174,556 UART: [idev] CDI.KEYID = 6
1,174,916 UART: [idev] SUBJECT.KEYID = 7
1,175,340 UART: [idev] UDS.KEYID = 0
1,175,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,201,025 UART: [idev] Sha1 KeyId Algorithm
1,209,657 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,080 UART: [ldev] SUBJECT.KEYID = 5
1,211,506 UART: [ldev] AUTHORITY.KEYID = 7
1,211,969 UART: [ldev] FE.KEYID = 1
1,217,279 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,249 UART: [ldev] --
1,282,698 UART: [fwproc] Wait for Commands...
1,283,362 UART: [fwproc] Recv command 0x46574c44
1,284,090 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,939 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,411 >>> mbox cmd response: failed
1,186,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,417 >>> mbox cmd response: failed
1,186,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,914 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,639 UART: [kat] HMAC-384Kdf
923,101 UART: [kat] LMS
1,171,429 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,387 UART: [idev] ++
1,175,555 UART: [idev] CDI.KEYID = 6
1,175,915 UART: [idev] SUBJECT.KEYID = 7
1,176,339 UART: [idev] UDS.KEYID = 0
1,176,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,405 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,866 UART: [ldev] ++
1,211,034 UART: [ldev] CDI.KEYID = 6
1,211,397 UART: [ldev] SUBJECT.KEYID = 5
1,211,823 UART: [ldev] AUTHORITY.KEYID = 7
1,212,286 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,244,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,814 UART: [ldev] --
1,283,153 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,944 UART: ROM Fatal Error: 0x000B0034
1,332,101 >>> mbox cmd response: failed
1,332,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,107 >>> mbox cmd response: failed
1,332,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,529 UART: [kat] SHA2-512-ACC
908,430 UART: [kat] ECC-384
918,009 UART: [kat] HMAC-384Kdf
922,673 UART: [kat] LMS
1,171,001 UART: [kat] --
1,171,828 UART: [cold-reset] ++
1,172,230 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,095 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,814 UART: [idev] --
1,210,632 UART: [ldev] ++
1,210,800 UART: [ldev] CDI.KEYID = 6
1,211,163 UART: [ldev] SUBJECT.KEYID = 5
1,211,589 UART: [ldev] AUTHORITY.KEYID = 7
1,212,052 UART: [ldev] FE.KEYID = 1
1,217,146 UART: [ldev] Erasing FE.KEYID = 1
1,243,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,554 UART: [ldev] --
1,283,061 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,012 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,996 >>> mbox cmd response: failed
1,187,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,002 >>> mbox cmd response: failed
1,188,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,543 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
890,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,845 UART: [kat] ++
894,997 UART: [kat] sha1
899,259 UART: [kat] SHA2-256
901,199 UART: [kat] SHA2-384
903,850 UART: [kat] SHA2-512-ACC
905,751 UART: [kat] ECC-384
915,540 UART: [kat] HMAC-384Kdf
920,162 UART: [kat] LMS
1,168,474 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,173,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,183 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,094 UART: [ldev] ++
1,208,262 UART: [ldev] CDI.KEYID = 6
1,208,626 UART: [ldev] SUBJECT.KEYID = 5
1,209,053 UART: [ldev] AUTHORITY.KEYID = 7
1,209,516 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,240,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,628 UART: [ldev] --
1,279,898 UART: [fwproc] Wait for Commands...
1,280,519 UART: [fwproc] Recv command 0x46574c44
1,281,252 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,034 UART: ROM Fatal Error: 0x000B0034
1,330,191 >>> mbox cmd response: failed
1,330,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,197 >>> mbox cmd response: failed
1,330,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,090 UART: [kat] LMS
1,168,402 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,659 UART: [fht] FHT @ 0x50003400
1,172,405 UART: [idev] ++
1,172,573 UART: [idev] CDI.KEYID = 6
1,172,934 UART: [idev] SUBJECT.KEYID = 7
1,173,359 UART: [idev] UDS.KEYID = 0
1,173,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,197,733 UART: [idev] Sha1 KeyId Algorithm
1,206,563 UART: [idev] --
1,207,622 UART: [ldev] ++
1,207,790 UART: [ldev] CDI.KEYID = 6
1,208,154 UART: [ldev] SUBJECT.KEYID = 5
1,208,581 UART: [ldev] AUTHORITY.KEYID = 7
1,209,044 UART: [ldev] FE.KEYID = 1
1,213,900 UART: [ldev] Erasing FE.KEYID = 1
1,240,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,658 UART: [ldev] --
1,278,988 UART: [fwproc] Wait for Commands...
1,279,641 UART: [fwproc] Recv command 0x46574c44
1,280,374 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,436 >>> mbox cmd response: failed
1,182,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,442 >>> mbox cmd response: failed
1,182,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,453 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,995 UART: [state] LifecycleState = Unprovisioned
86,650 UART: [state] DebugLocked = No
87,252 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
892,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,188 UART: [kat] ++
896,340 UART: [kat] sha1
900,500 UART: [kat] SHA2-256
902,440 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
917,109 UART: [kat] HMAC-384Kdf
921,775 UART: [kat] LMS
1,170,087 UART: [kat] --
1,170,976 UART: [cold-reset] ++
1,171,408 UART: [fht] FHT @ 0x50003400
1,173,816 UART: [idev] ++
1,173,984 UART: [idev] CDI.KEYID = 6
1,174,345 UART: [idev] SUBJECT.KEYID = 7
1,174,770 UART: [idev] UDS.KEYID = 0
1,175,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,461 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,997 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,409 UART: ROM Fatal Error: 0x000B0034
1,331,566 >>> mbox cmd response: failed
1,331,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,572 >>> mbox cmd response: failed
1,331,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,452 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,024 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,810 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,549 >>> mbox cmd response: failed
1,182,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,555 >>> mbox cmd response: failed
1,182,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,308 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,226 UART:
192,628 UART: Running Caliptra ROM ...
193,777 UART:
193,925 UART: [state] CFI Enabled
259,381 UART: [state] LifecycleState = Unprovisioned
261,348 UART: [state] DebugLocked = No
263,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,673 UART: [kat] SHA2-256
439,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,872 UART: [kat] ++
450,351 UART: [kat] sha1
463,014 UART: [kat] SHA2-256
465,727 UART: [kat] SHA2-384
471,864 UART: [kat] SHA2-512-ACC
474,253 UART: [kat] ECC-384
2,764,731 UART: [kat] HMAC-384Kdf
2,795,332 UART: [kat] LMS
3,985,629 UART: [kat] --
3,990,790 UART: [cold-reset] ++
3,992,194 UART: [fht] Storing FHT @ 0x50003400
4,002,708 UART: [idev] ++
4,003,343 UART: [idev] CDI.KEYID = 6
4,004,256 UART: [idev] SUBJECT.KEYID = 7
4,005,477 UART: [idev] UDS.KEYID = 0
4,008,204 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,848 UART: [idev] Erasing UDS.KEYID = 0
7,342,915 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,813 UART: [idev] --
7,369,102 UART: [ldev] ++
7,369,710 UART: [ldev] CDI.KEYID = 6
7,370,631 UART: [ldev] SUBJECT.KEYID = 5
7,371,852 UART: [ldev] AUTHORITY.KEYID = 7
7,373,090 UART: [ldev] FE.KEYID = 1
7,419,879 UART: [ldev] Erasing FE.KEYID = 1
10,752,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,794 UART: [ldev] --
13,112,873 UART: [fwproc] Waiting for Commands...
13,116,106 UART: [fwproc] Received command 0x46574c44
13,118,292 UART: [fwproc] Received Image of size 114124 bytes
15,823,783 UART: ROM Fatal Error: 0x000B0017
15,827,294 >>> mbox cmd response: failed
15,827,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,029 >>> mbox cmd response: failed
15,828,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,594 >>> mbox cmd response: failed
Initializing fuses
2,055,887 writing to cptra_bootfsm_go
2,245,176 UART:
2,245,525 UART: Running Caliptra ROM ...
2,246,669 UART:
2,246,850 UART: [state] CFI Enabled
2,308,281 UART: [state] LifecycleState = Unprovisioned
2,310,223 UART: [state] DebugLocked = No
2,311,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,350 UART: [kat] SHA2-256
2,487,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,533 UART: [kat] ++
2,498,033 UART: [kat] sha1
2,508,070 UART: [kat] SHA2-256
2,510,754 UART: [kat] SHA2-384
2,516,869 UART: [kat] SHA2-512-ACC
2,519,229 UART: [kat] ECC-384
4,812,119 UART: [kat] HMAC-384Kdf
4,846,121 UART: [kat] LMS
6,036,433 UART: [kat] --
6,040,645 UART: [cold-reset] ++
6,042,860 UART: [fht] Storing FHT @ 0x50003400
6,056,072 UART: [idev] ++
6,056,645 UART: [idev] CDI.KEYID = 6
6,057,558 UART: [idev] SUBJECT.KEYID = 7
6,058,849 UART: [idev] UDS.KEYID = 0
6,061,098 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,204,739 UART: [idev] Erasing UDS.KEYID = 0
9,389,591 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,583 UART: [idev] --
9,414,307 UART: [ldev] ++
9,414,870 UART: [ldev] CDI.KEYID = 6
9,415,811 UART: [ldev] SUBJECT.KEYID = 5
9,417,072 UART: [ldev] AUTHORITY.KEYID = 7
9,418,313 UART: [ldev] FE.KEYID = 1
9,447,134 UART: [ldev] Erasing FE.KEYID = 1
12,781,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,201 UART: [ldev] --
15,159,155 UART: [fwproc] Waiting for Commands...
15,162,396 UART: [fwproc] Received command 0x46574c44
15,164,647 UART: [fwproc] Received Image of size 114124 bytes
19,225,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,303,715 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,372,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,506 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,805,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,549,448 >>> mbox cmd response: failed
15,550,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,364 >>> mbox cmd response: failed
15,550,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,931 >>> mbox cmd response: failed
Initializing fuses
2,061,368 writing to cptra_bootfsm_go
5,851,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,912,060 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,550 UART:
192,912 UART: Running Caliptra ROM ...
194,063 UART:
603,754 UART: [state] CFI Enabled
619,409 UART: [state] LifecycleState = Unprovisioned
621,348 UART: [state] DebugLocked = No
623,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,368 UART: [kat] SHA2-256
798,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,639 UART: [kat] ++
809,114 UART: [kat] sha1
820,153 UART: [kat] SHA2-256
822,872 UART: [kat] SHA2-384
829,346 UART: [kat] SHA2-512-ACC
831,690 UART: [kat] ECC-384
3,116,164 UART: [kat] HMAC-384Kdf
3,128,843 UART: [kat] LMS
4,318,936 UART: [kat] --
4,323,521 UART: [cold-reset] ++
4,325,947 UART: [fht] Storing FHT @ 0x50003400
4,338,628 UART: [idev] ++
4,339,238 UART: [idev] CDI.KEYID = 6
4,340,156 UART: [idev] SUBJECT.KEYID = 7
4,341,376 UART: [idev] UDS.KEYID = 0
4,344,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,543 UART: [idev] Erasing UDS.KEYID = 0
7,627,252 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,265 UART: [idev] --
7,653,018 UART: [ldev] ++
7,653,592 UART: [ldev] CDI.KEYID = 6
7,654,505 UART: [ldev] SUBJECT.KEYID = 5
7,655,726 UART: [ldev] AUTHORITY.KEYID = 7
7,657,016 UART: [ldev] FE.KEYID = 1
7,668,209 UART: [ldev] Erasing FE.KEYID = 1
10,955,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,762 UART: [ldev] --
13,317,604 UART: [fwproc] Waiting for Commands...
13,320,352 UART: [fwproc] Received command 0x46574c44
13,322,542 UART: [fwproc] Received Image of size 114124 bytes
16,029,175 UART: ROM Fatal Error: 0x000B0017
16,032,689 >>> mbox cmd response: failed
16,033,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,434 >>> mbox cmd response: failed
16,033,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,001 >>> mbox cmd response: failed
Initializing fuses
2,054,615 writing to cptra_bootfsm_go
2,243,934 UART:
2,244,299 UART: Running Caliptra ROM ...
2,245,445 UART:
4,423,041 UART: [state] CFI Enabled
4,436,710 UART: [state] LifecycleState = Unprovisioned
4,438,623 UART: [state] DebugLocked = No
4,440,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,445,409 UART: [kat] SHA2-256
4,615,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,625,675 UART: [kat] ++
4,626,140 UART: [kat] sha1
4,637,033 UART: [kat] SHA2-256
4,639,743 UART: [kat] SHA2-384
4,644,513 UART: [kat] SHA2-512-ACC
4,646,926 UART: [kat] ECC-384
6,930,036 UART: [kat] HMAC-384Kdf
6,940,816 UART: [kat] LMS
8,130,963 UART: [kat] --
8,134,641 UART: [cold-reset] ++
8,136,903 UART: [fht] Storing FHT @ 0x50003400
8,147,090 UART: [idev] ++
8,147,697 UART: [idev] CDI.KEYID = 6
8,148,610 UART: [idev] SUBJECT.KEYID = 7
8,149,890 UART: [idev] UDS.KEYID = 0
8,152,233 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,295,568 UART: [idev] Erasing UDS.KEYID = 0
11,440,727 UART: [idev] Using Sha1 for KeyId Algorithm
11,462,621 UART: [idev] --
11,465,920 UART: [ldev] ++
11,466,520 UART: [ldev] CDI.KEYID = 6
11,467,432 UART: [ldev] SUBJECT.KEYID = 5
11,468,709 UART: [ldev] AUTHORITY.KEYID = 7
11,469,950 UART: [ldev] FE.KEYID = 1
11,479,623 UART: [ldev] Erasing FE.KEYID = 1
14,768,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,060,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,075,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,089,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,104,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,123,052 UART: [ldev] --
17,127,513 UART: [fwproc] Waiting for Commands...
17,129,649 UART: [fwproc] Received command 0x46574c44
17,131,845 UART: [fwproc] Received Image of size 114124 bytes
21,177,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,246,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,315,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,633,190 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,128,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,768,917 >>> mbox cmd response: failed
15,769,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,874 >>> mbox cmd response: failed
15,770,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,440 >>> mbox cmd response: failed
Initializing fuses
2,057,487 writing to cptra_bootfsm_go
8,224,296 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,180,202 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,172 UART:
192,530 UART: Running Caliptra ROM ...
193,724 UART:
193,880 UART: [state] CFI Enabled
258,279 UART: [state] LifecycleState = Unprovisioned
260,144 UART: [state] DebugLocked = No
261,421 UART: [state] WD Timer not started. Device not locked for debugging
265,460 UART: [kat] SHA2-256
444,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,159 UART: [kat] ++
456,607 UART: [kat] sha1
468,198 UART: [kat] SHA2-256
471,250 UART: [kat] SHA2-384
477,234 UART: [kat] SHA2-512-ACC
480,233 UART: [kat] ECC-384
2,943,449 UART: [kat] HMAC-384Kdf
2,968,310 UART: [kat] LMS
3,497,738 UART: [kat] --
3,502,752 UART: [cold-reset] ++
3,503,974 UART: [fht] FHT @ 0x50003400
3,515,178 UART: [idev] ++
3,515,745 UART: [idev] CDI.KEYID = 6
3,516,672 UART: [idev] SUBJECT.KEYID = 7
3,517,831 UART: [idev] UDS.KEYID = 0
3,520,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,683 UART: [idev] Erasing UDS.KEYID = 0
6,027,140 UART: [idev] Sha1 KeyId Algorithm
6,051,248 UART: [idev] --
6,056,224 UART: [ldev] ++
6,056,799 UART: [ldev] CDI.KEYID = 6
6,057,690 UART: [ldev] SUBJECT.KEYID = 5
6,058,907 UART: [ldev] AUTHORITY.KEYID = 7
6,060,144 UART: [ldev] FE.KEYID = 1
6,097,174 UART: [ldev] Erasing FE.KEYID = 1
8,599,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,303 UART: [ldev] --
10,410,781 UART: [fwproc] Wait for Commands...
10,412,685 UART: [fwproc] Recv command 0x46574c44
10,414,731 UART: [fwproc] Recv'd Img size: 114448 bytes
12,463,557 UART: ROM Fatal Error: 0x000B0017
12,466,656 >>> mbox cmd response: failed
12,467,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,368 >>> mbox cmd response: failed
12,467,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,973 >>> mbox cmd response: failed
Initializing fuses
2,053,743 writing to cptra_bootfsm_go
2,243,044 UART:
2,243,409 UART: Running Caliptra ROM ...
2,244,458 UART:
2,244,607 UART: [state] CFI Enabled
2,319,624 UART: [state] LifecycleState = Unprovisioned
2,321,511 UART: [state] DebugLocked = No
2,324,279 UART: [state] WD Timer not started. Device not locked for debugging
2,327,376 UART: [kat] SHA2-256
2,506,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,094 UART: [kat] ++
2,518,557 UART: [kat] sha1
2,530,958 UART: [kat] SHA2-256
2,533,973 UART: [kat] SHA2-384
2,540,124 UART: [kat] SHA2-512-ACC
2,543,073 UART: [kat] ECC-384
5,003,123 UART: [kat] HMAC-384Kdf
5,026,214 UART: [kat] LMS
5,555,654 UART: [kat] --
5,559,347 UART: [cold-reset] ++
5,561,775 UART: [fht] FHT @ 0x50003400
5,572,614 UART: [idev] ++
5,573,182 UART: [idev] CDI.KEYID = 6
5,574,146 UART: [idev] SUBJECT.KEYID = 7
5,575,305 UART: [idev] UDS.KEYID = 0
5,577,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,721,642 UART: [idev] Erasing UDS.KEYID = 0
8,083,777 UART: [idev] Sha1 KeyId Algorithm
8,105,776 UART: [idev] --
8,109,231 UART: [ldev] ++
8,109,807 UART: [ldev] CDI.KEYID = 6
8,110,885 UART: [ldev] SUBJECT.KEYID = 5
8,111,992 UART: [ldev] AUTHORITY.KEYID = 7
8,113,171 UART: [ldev] FE.KEYID = 1
8,156,169 UART: [ldev] Erasing FE.KEYID = 1
10,657,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,805 UART: [ldev] --
12,469,881 UART: [fwproc] Wait for Commands...
12,471,546 UART: [fwproc] Recv command 0x46574c44
12,473,692 UART: [fwproc] Recv'd Img size: 114448 bytes
15,878,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,950,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,019,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,338,560 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,385,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,236,788 >>> mbox cmd response: failed
12,237,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,237,676 >>> mbox cmd response: failed
12,237,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,238,280 >>> mbox cmd response: failed
Initializing fuses
2,054,930 writing to cptra_bootfsm_go
5,412,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,078,077 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,532 UART:
192,909 UART: Running Caliptra ROM ...
194,014 UART:
603,485 UART: [state] CFI Enabled
614,307 UART: [state] LifecycleState = Unprovisioned
616,195 UART: [state] DebugLocked = No
618,031 UART: [state] WD Timer not started. Device not locked for debugging
622,069 UART: [kat] SHA2-256
801,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,783 UART: [kat] ++
813,230 UART: [kat] sha1
823,562 UART: [kat] SHA2-256
826,620 UART: [kat] SHA2-384
831,995 UART: [kat] SHA2-512-ACC
834,960 UART: [kat] ECC-384
3,277,395 UART: [kat] HMAC-384Kdf
3,289,743 UART: [kat] LMS
3,819,231 UART: [kat] --
3,824,586 UART: [cold-reset] ++
3,826,689 UART: [fht] FHT @ 0x50003400
3,839,198 UART: [idev] ++
3,839,764 UART: [idev] CDI.KEYID = 6
3,840,674 UART: [idev] SUBJECT.KEYID = 7
3,841,889 UART: [idev] UDS.KEYID = 0
3,844,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,660 UART: [idev] Erasing UDS.KEYID = 0
6,312,631 UART: [idev] Sha1 KeyId Algorithm
6,334,736 UART: [idev] --
6,338,679 UART: [ldev] ++
6,339,248 UART: [ldev] CDI.KEYID = 6
6,340,160 UART: [ldev] SUBJECT.KEYID = 5
6,341,374 UART: [ldev] AUTHORITY.KEYID = 7
6,342,608 UART: [ldev] FE.KEYID = 1
6,353,746 UART: [ldev] Erasing FE.KEYID = 1
8,829,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,414 UART: [ldev] --
10,623,630 UART: [fwproc] Wait for Commands...
10,625,343 UART: [fwproc] Recv command 0x46574c44
10,627,388 UART: [fwproc] Recv'd Img size: 114448 bytes
12,679,597 UART: ROM Fatal Error: 0x000B0017
12,682,718 >>> mbox cmd response: failed
12,683,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,464 >>> mbox cmd response: failed
12,683,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,018 >>> mbox cmd response: failed
Initializing fuses
2,056,408 writing to cptra_bootfsm_go
2,245,731 UART:
2,246,073 UART: Running Caliptra ROM ...
2,247,215 UART:
7,766,240 UART: [state] CFI Enabled
7,777,865 UART: [state] LifecycleState = Unprovisioned
7,779,727 UART: [state] DebugLocked = No
7,782,148 UART: [state] WD Timer not started. Device not locked for debugging
7,786,383 UART: [kat] SHA2-256
7,965,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,977,082 UART: [kat] ++
7,977,633 UART: [kat] sha1
7,990,038 UART: [kat] SHA2-256
7,993,107 UART: [kat] SHA2-384
7,998,947 UART: [kat] SHA2-512-ACC
8,001,946 UART: [kat] ECC-384
10,443,110 UART: [kat] HMAC-384Kdf
10,456,526 UART: [kat] LMS
10,986,037 UART: [kat] --
10,988,960 UART: [cold-reset] ++
10,990,837 UART: [fht] FHT @ 0x50003400
11,000,785 UART: [idev] ++
11,001,357 UART: [idev] CDI.KEYID = 6
11,002,272 UART: [idev] SUBJECT.KEYID = 7
11,003,491 UART: [idev] UDS.KEYID = 0
11,005,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,149,579 UART: [idev] Erasing UDS.KEYID = 0
13,477,189 UART: [idev] Sha1 KeyId Algorithm
13,500,798 UART: [idev] --
13,504,626 UART: [ldev] ++
13,505,191 UART: [ldev] CDI.KEYID = 6
13,506,066 UART: [ldev] SUBJECT.KEYID = 5
13,507,298 UART: [ldev] AUTHORITY.KEYID = 7
13,508,687 UART: [ldev] FE.KEYID = 1
13,521,181 UART: [ldev] Erasing FE.KEYID = 1
15,994,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,709,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,725,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,740,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,756,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,777,485 UART: [ldev] --
17,781,884 UART: [fwproc] Wait for Commands...
17,784,624 UART: [fwproc] Recv command 0x46574c44
17,786,667 UART: [fwproc] Recv'd Img size: 114448 bytes
21,187,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,261,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,330,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,648,441 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,700,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,456,830 >>> mbox cmd response: failed
12,457,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,726 >>> mbox cmd response: failed
12,457,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,287 >>> mbox cmd response: failed
Initializing fuses
2,054,411 writing to cptra_bootfsm_go
11,106,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,684,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
192,011 UART:
192,387 UART: Running Caliptra ROM ...
193,534 UART:
193,678 UART: [state] CFI Enabled
264,553 UART: [state] LifecycleState = Unprovisioned
266,974 UART: [state] DebugLocked = No
269,115 UART: [state] WD Timer not started. Device not locked for debugging
273,051 UART: [kat] SHA2-256
462,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,734 UART: [kat] ++
474,212 UART: [kat] sha1
485,688 UART: [kat] SHA2-256
488,707 UART: [kat] SHA2-384
494,204 UART: [kat] SHA2-512-ACC
496,762 UART: [kat] ECC-384
2,944,371 UART: [kat] HMAC-384Kdf
2,969,950 UART: [kat] LMS
3,501,720 UART: [kat] --
3,506,062 UART: [cold-reset] ++
3,506,922 UART: [fht] FHT @ 0x50003400
3,517,979 UART: [idev] ++
3,518,660 UART: [idev] CDI.KEYID = 6
3,519,675 UART: [idev] SUBJECT.KEYID = 7
3,520,843 UART: [idev] UDS.KEYID = 0
3,523,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,807 UART: [idev] Erasing UDS.KEYID = 0
6,026,587 UART: [idev] Sha1 KeyId Algorithm
6,048,860 UART: [idev] --
6,052,738 UART: [ldev] ++
6,053,433 UART: [ldev] CDI.KEYID = 6
6,054,351 UART: [ldev] SUBJECT.KEYID = 5
6,055,514 UART: [ldev] AUTHORITY.KEYID = 7
6,056,748 UART: [ldev] FE.KEYID = 1
6,098,987 UART: [ldev] Erasing FE.KEYID = 1
8,608,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,260 UART: [ldev] --
10,415,581 UART: [fwproc] Wait for Commands...
10,418,268 UART: [fwproc] Recv command 0x46574c44
10,420,524 UART: [fwproc] Recv'd Img size: 114448 bytes
12,503,985 UART: ROM Fatal Error: 0x000B0017
12,507,610 >>> mbox cmd response: failed
12,508,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,379 >>> mbox cmd response: failed
12,508,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,938 >>> mbox cmd response: failed
Initializing fuses
2,056,593 writing to cptra_bootfsm_go
2,245,922 UART:
2,246,269 UART: Running Caliptra ROM ...
2,247,400 UART:
2,247,564 UART: [state] CFI Enabled
2,303,440 UART: [state] LifecycleState = Unprovisioned
2,305,814 UART: [state] DebugLocked = No
2,308,638 UART: [state] WD Timer not started. Device not locked for debugging
2,312,817 UART: [kat] SHA2-256
2,502,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,483 UART: [kat] ++
2,513,941 UART: [kat] sha1
2,526,611 UART: [kat] SHA2-256
2,529,632 UART: [kat] SHA2-384
2,536,269 UART: [kat] SHA2-512-ACC
2,538,839 UART: [kat] ECC-384
4,988,089 UART: [kat] HMAC-384Kdf
5,012,807 UART: [kat] LMS
5,544,564 UART: [kat] --
5,549,326 UART: [cold-reset] ++
5,550,246 UART: [fht] FHT @ 0x50003400
5,562,306 UART: [idev] ++
5,562,984 UART: [idev] CDI.KEYID = 6
5,563,955 UART: [idev] SUBJECT.KEYID = 7
5,565,166 UART: [idev] UDS.KEYID = 0
5,567,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,711,491 UART: [idev] Erasing UDS.KEYID = 0
8,069,608 UART: [idev] Sha1 KeyId Algorithm
8,092,030 UART: [idev] --
8,096,066 UART: [ldev] ++
8,096,801 UART: [ldev] CDI.KEYID = 6
8,097,696 UART: [ldev] SUBJECT.KEYID = 5
8,098,823 UART: [ldev] AUTHORITY.KEYID = 7
8,100,117 UART: [ldev] FE.KEYID = 1
8,141,716 UART: [ldev] Erasing FE.KEYID = 1
10,648,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,504 UART: [ldev] --
12,456,309 UART: [fwproc] Wait for Commands...
12,457,812 UART: [fwproc] Recv command 0x46574c44
12,459,800 UART: [fwproc] Recv'd Img size: 114448 bytes
15,904,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,982,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,098,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,641,464 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,419,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,285,894 >>> mbox cmd response: failed
12,286,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,286,794 >>> mbox cmd response: failed
12,287,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,287,381 >>> mbox cmd response: failed
Initializing fuses
2,054,746 writing to cptra_bootfsm_go
5,487,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,784,036 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,590 UART:
192,978 UART: Running Caliptra ROM ...
194,184 UART:
603,661 UART: [state] CFI Enabled
618,613 UART: [state] LifecycleState = Unprovisioned
620,990 UART: [state] DebugLocked = No
622,906 UART: [state] WD Timer not started. Device not locked for debugging
627,755 UART: [kat] SHA2-256
817,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,418 UART: [kat] ++
828,919 UART: [kat] sha1
841,150 UART: [kat] SHA2-256
844,159 UART: [kat] SHA2-384
850,087 UART: [kat] SHA2-512-ACC
852,703 UART: [kat] ECC-384
3,294,802 UART: [kat] HMAC-384Kdf
3,307,338 UART: [kat] LMS
3,839,188 UART: [kat] --
3,845,136 UART: [cold-reset] ++
3,847,021 UART: [fht] FHT @ 0x50003400
3,857,668 UART: [idev] ++
3,858,356 UART: [idev] CDI.KEYID = 6
3,859,350 UART: [idev] SUBJECT.KEYID = 7
3,860,514 UART: [idev] UDS.KEYID = 0
3,863,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,208 UART: [idev] Erasing UDS.KEYID = 0
6,339,815 UART: [idev] Sha1 KeyId Algorithm
6,362,084 UART: [idev] --
6,365,439 UART: [ldev] ++
6,366,012 UART: [ldev] CDI.KEYID = 6
6,366,928 UART: [ldev] SUBJECT.KEYID = 5
6,368,089 UART: [ldev] AUTHORITY.KEYID = 7
6,369,325 UART: [ldev] FE.KEYID = 1
6,379,652 UART: [ldev] Erasing FE.KEYID = 1
8,863,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,431 UART: [ldev] --
10,653,956 UART: [fwproc] Wait for Commands...
10,656,221 UART: [fwproc] Recv command 0x46574c44
10,658,491 UART: [fwproc] Recv'd Img size: 114448 bytes
12,740,375 UART: ROM Fatal Error: 0x000B0017
12,744,046 >>> mbox cmd response: failed
12,744,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,806 >>> mbox cmd response: failed
12,745,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,374 >>> mbox cmd response: failed
Initializing fuses
2,055,033 writing to cptra_bootfsm_go
2,244,324 UART:
2,244,696 UART: Running Caliptra ROM ...
2,245,747 UART:
7,706,753 UART: [state] CFI Enabled
7,719,396 UART: [state] LifecycleState = Unprovisioned
7,721,744 UART: [state] DebugLocked = No
7,724,483 UART: [state] WD Timer not started. Device not locked for debugging
7,729,484 UART: [kat] SHA2-256
7,919,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,930,137 UART: [kat] ++
7,930,738 UART: [kat] sha1
7,941,905 UART: [kat] SHA2-256
7,944,930 UART: [kat] SHA2-384
7,951,082 UART: [kat] SHA2-512-ACC
7,953,710 UART: [kat] ECC-384
10,393,633 UART: [kat] HMAC-384Kdf
10,405,704 UART: [kat] LMS
10,937,502 UART: [kat] --
10,941,552 UART: [cold-reset] ++
10,943,396 UART: [fht] FHT @ 0x50003400
10,954,383 UART: [idev] ++
10,955,060 UART: [idev] CDI.KEYID = 6
10,956,031 UART: [idev] SUBJECT.KEYID = 7
10,957,194 UART: [idev] UDS.KEYID = 0
10,959,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,103,213 UART: [idev] Erasing UDS.KEYID = 0
13,436,305 UART: [idev] Sha1 KeyId Algorithm
13,457,978 UART: [idev] --
13,464,024 UART: [ldev] ++
13,464,709 UART: [ldev] CDI.KEYID = 6
13,465,675 UART: [ldev] SUBJECT.KEYID = 5
13,466,833 UART: [ldev] AUTHORITY.KEYID = 7
13,468,065 UART: [ldev] FE.KEYID = 1
13,480,830 UART: [ldev] Erasing FE.KEYID = 1
15,957,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,678,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,693,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,708,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,723,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,744,691 UART: [ldev] --
17,750,371 UART: [fwproc] Wait for Commands...
17,752,056 UART: [fwproc] Recv command 0x46574c44
17,754,326 UART: [fwproc] Recv'd Img size: 114448 bytes
21,198,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,275,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,390,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,934,160 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,754,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,524,900 >>> mbox cmd response: failed
12,525,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,789 >>> mbox cmd response: failed
12,526,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,404 >>> mbox cmd response: failed
Initializing fuses
2,054,488 writing to cptra_bootfsm_go
11,082,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,287,558 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,493 UART: [kat] SHA2-256
892,431 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,461 UART: [cold-reset] ++
1,477,003 UART: [fht] Storing FHT @ 0x50003400
1,479,656 UART: [idev] ++
1,479,824 UART: [idev] CDI.KEYID = 6
1,480,184 UART: [idev] SUBJECT.KEYID = 7
1,480,608 UART: [idev] UDS.KEYID = 0
1,480,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,710 UART: [idev] Erasing UDS.KEYID = 0
1,505,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,814 UART: [idev] --
1,514,769 UART: [ldev] ++
1,514,937 UART: [ldev] CDI.KEYID = 6
1,515,300 UART: [ldev] SUBJECT.KEYID = 5
1,515,726 UART: [ldev] AUTHORITY.KEYID = 7
1,516,189 UART: [ldev] FE.KEYID = 1
1,521,333 UART: [ldev] Erasing FE.KEYID = 1
1,546,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,298 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 114448 bytes
1,634,502 UART: ROM Fatal Error: 0x000B0017
1,635,659 >>> mbox cmd response: failed
1,635,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,665 >>> mbox cmd response: failed
1,635,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
86,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,727 UART: [kat] SHA2-256
881,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,773 UART: [kat] ++
885,925 UART: [kat] sha1
890,109 UART: [kat] SHA2-256
892,047 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,475,687 UART: [cold-reset] ++
1,476,103 UART: [fht] Storing FHT @ 0x50003400
1,478,934 UART: [idev] ++
1,479,102 UART: [idev] CDI.KEYID = 6
1,479,462 UART: [idev] SUBJECT.KEYID = 7
1,479,886 UART: [idev] UDS.KEYID = 0
1,480,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,896 UART: [idev] Erasing UDS.KEYID = 0
1,504,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,102 UART: [idev] --
1,514,229 UART: [ldev] ++
1,514,397 UART: [ldev] CDI.KEYID = 6
1,514,760 UART: [ldev] SUBJECT.KEYID = 5
1,515,186 UART: [ldev] AUTHORITY.KEYID = 7
1,515,649 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,602 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,816 UART: [fwproc] Received command 0x46574c44
1,587,607 UART: [fwproc] Received Image of size 114448 bytes
2,886,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,588 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,218 >>> mbox cmd response: failed
1,487,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,224 >>> mbox cmd response: failed
1,487,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,842 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
902,923 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,396 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,287 UART: [idev] Erasing UDS.KEYID = 0
1,504,813 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,399 UART: [idev] --
1,514,476 UART: [ldev] ++
1,514,644 UART: [ldev] CDI.KEYID = 6
1,515,007 UART: [ldev] SUBJECT.KEYID = 5
1,515,433 UART: [ldev] AUTHORITY.KEYID = 7
1,515,896 UART: [ldev] FE.KEYID = 1
1,521,194 UART: [ldev] Erasing FE.KEYID = 1
1,546,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,797 UART: [ldev] --
1,586,294 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 114448 bytes
1,634,251 UART: ROM Fatal Error: 0x000B0017
1,635,408 >>> mbox cmd response: failed
1,635,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,414 >>> mbox cmd response: failed
1,635,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,972 UART: [kat] SHA2-256
882,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,018 UART: [kat] ++
887,170 UART: [kat] sha1
891,620 UART: [kat] SHA2-256
893,558 UART: [kat] SHA2-384
896,221 UART: [kat] SHA2-512-ACC
898,122 UART: [kat] ECC-384
903,745 UART: [kat] HMAC-384Kdf
908,419 UART: [kat] LMS
1,476,615 UART: [kat] --
1,477,446 UART: [cold-reset] ++
1,478,012 UART: [fht] Storing FHT @ 0x50003400
1,480,859 UART: [idev] ++
1,481,027 UART: [idev] CDI.KEYID = 6
1,481,387 UART: [idev] SUBJECT.KEYID = 7
1,481,811 UART: [idev] UDS.KEYID = 0
1,482,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,861 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,835 UART: [idev] --
1,515,806 UART: [ldev] ++
1,515,974 UART: [ldev] CDI.KEYID = 6
1,516,337 UART: [ldev] SUBJECT.KEYID = 5
1,516,763 UART: [ldev] AUTHORITY.KEYID = 7
1,517,226 UART: [ldev] FE.KEYID = 1
1,522,396 UART: [ldev] Erasing FE.KEYID = 1
1,548,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,885 UART: [ldev] --
1,588,400 UART: [fwproc] Waiting for Commands...
1,589,193 UART: [fwproc] Received command 0x46574c44
1,589,984 UART: [fwproc] Received Image of size 114448 bytes
2,889,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,645 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,329 >>> mbox cmd response: failed
1,489,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,335 >>> mbox cmd response: failed
1,489,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,857 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
923,026 UART: [kat] LMS
1,171,354 UART: [kat] --
1,172,293 UART: [cold-reset] ++
1,172,693 UART: [fht] FHT @ 0x50003400
1,175,336 UART: [idev] ++
1,175,504 UART: [idev] CDI.KEYID = 6
1,175,864 UART: [idev] SUBJECT.KEYID = 7
1,176,288 UART: [idev] UDS.KEYID = 0
1,176,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,388 UART: [idev] Erasing UDS.KEYID = 0
1,201,373 UART: [idev] Sha1 KeyId Algorithm
1,209,927 UART: [idev] --
1,211,015 UART: [ldev] ++
1,211,183 UART: [ldev] CDI.KEYID = 6
1,211,546 UART: [ldev] SUBJECT.KEYID = 5
1,211,972 UART: [ldev] AUTHORITY.KEYID = 7
1,212,435 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,033 UART: [ldev] --
1,283,314 UART: [fwproc] Wait for Commands...
1,284,116 UART: [fwproc] Recv command 0x46574c44
1,284,844 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,299 UART: ROM Fatal Error: 0x000B0017
1,332,456 >>> mbox cmd response: failed
1,332,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,462 >>> mbox cmd response: failed
1,332,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
892,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,017 UART: [kat] ++
897,169 UART: [kat] sha1
901,413 UART: [kat] SHA2-256
903,353 UART: [kat] SHA2-384
906,136 UART: [kat] SHA2-512-ACC
908,037 UART: [kat] ECC-384
917,668 UART: [kat] HMAC-384Kdf
922,382 UART: [kat] LMS
1,170,710 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,612 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,433 UART: [ldev] ++
1,210,601 UART: [ldev] CDI.KEYID = 6
1,210,964 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,512 UART: [fwproc] Wait for Commands...
1,283,152 UART: [fwproc] Recv command 0x46574c44
1,283,880 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,399 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,369 >>> mbox cmd response: failed
1,187,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,375 >>> mbox cmd response: failed
1,187,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,134 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
901,976 UART: [kat] SHA2-256
903,916 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,807 UART: [kat] HMAC-384Kdf
923,359 UART: [kat] LMS
1,171,687 UART: [kat] --
1,172,680 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,771 UART: [idev] ++
1,175,939 UART: [idev] CDI.KEYID = 6
1,176,299 UART: [idev] SUBJECT.KEYID = 7
1,176,723 UART: [idev] UDS.KEYID = 0
1,177,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,507 UART: [idev] Erasing UDS.KEYID = 0
1,202,142 UART: [idev] Sha1 KeyId Algorithm
1,210,528 UART: [idev] --
1,211,638 UART: [ldev] ++
1,211,806 UART: [ldev] CDI.KEYID = 6
1,212,169 UART: [ldev] SUBJECT.KEYID = 5
1,212,595 UART: [ldev] AUTHORITY.KEYID = 7
1,213,058 UART: [ldev] FE.KEYID = 1
1,218,304 UART: [ldev] Erasing FE.KEYID = 1
1,245,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,974 UART: [ldev] --
1,284,281 UART: [fwproc] Wait for Commands...
1,285,049 UART: [fwproc] Recv command 0x46574c44
1,285,777 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,634 UART: ROM Fatal Error: 0x000B0017
1,333,791 >>> mbox cmd response: failed
1,333,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,797 >>> mbox cmd response: failed
1,333,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
893,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,982 UART: [kat] ++
898,134 UART: [kat] sha1
902,294 UART: [kat] SHA2-256
904,234 UART: [kat] SHA2-384
906,831 UART: [kat] SHA2-512-ACC
908,732 UART: [kat] ECC-384
918,545 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,176,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,593 UART: [idev] Erasing UDS.KEYID = 0
1,200,832 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,546 UART: [ldev] ++
1,210,714 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,503 UART: [ldev] AUTHORITY.KEYID = 7
1,211,966 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,186 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,071 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,766 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,248 >>> mbox cmd response: failed
1,187,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,254 >>> mbox cmd response: failed
1,187,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,089 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,672 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,173,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha1 KeyId Algorithm
1,206,959 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,242 UART: [ldev] --
1,279,688 UART: [fwproc] Wait for Commands...
1,280,331 UART: [fwproc] Recv command 0x46574c44
1,281,064 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,310 UART: ROM Fatal Error: 0x000B0017
1,329,467 >>> mbox cmd response: failed
1,329,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,473 >>> mbox cmd response: failed
1,329,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,013 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,174,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,770 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,504 UART: [ldev] --
1,279,936 UART: [fwproc] Wait for Commands...
1,280,645 UART: [fwproc] Recv command 0x46574c44
1,281,378 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,285 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,528 >>> mbox cmd response: failed
1,181,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,534 >>> mbox cmd response: failed
1,181,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,323 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,732 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,215,271 UART: [ldev] Erasing FE.KEYID = 1
1,241,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,991 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,215 UART: ROM Fatal Error: 0x000B0017
1,331,372 >>> mbox cmd response: failed
1,331,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,378 >>> mbox cmd response: failed
1,331,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,153 UART: [kat] SHA2-512-ACC
906,054 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,174,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,836 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,864 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,581 >>> mbox cmd response: failed
1,186,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,587 >>> mbox cmd response: failed
1,186,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,972 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,084 UART:
192,457 UART: Running Caliptra ROM ...
193,582 UART:
193,728 UART: [state] CFI Enabled
264,555 UART: [state] LifecycleState = Unprovisioned
266,528 UART: [state] DebugLocked = No
269,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,356 UART: [kat] SHA2-256
444,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,588 UART: [kat] ++
455,041 UART: [kat] sha1
466,301 UART: [kat] SHA2-256
468,985 UART: [kat] SHA2-384
475,932 UART: [kat] SHA2-512-ACC
478,265 UART: [kat] ECC-384
2,767,191 UART: [kat] HMAC-384Kdf
2,798,219 UART: [kat] LMS
3,988,549 UART: [kat] --
3,993,573 UART: [cold-reset] ++
3,995,187 UART: [fht] Storing FHT @ 0x50003400
4,006,724 UART: [idev] ++
4,007,294 UART: [idev] CDI.KEYID = 6
4,008,317 UART: [idev] SUBJECT.KEYID = 7
4,009,479 UART: [idev] UDS.KEYID = 0
4,011,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,757 UART: [idev] Erasing UDS.KEYID = 0
7,343,203 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,838 UART: [idev] --
7,369,991 UART: [ldev] ++
7,370,569 UART: [ldev] CDI.KEYID = 6
7,371,537 UART: [ldev] SUBJECT.KEYID = 5
7,372,695 UART: [ldev] AUTHORITY.KEYID = 7
7,373,982 UART: [ldev] FE.KEYID = 1
7,422,006 UART: [ldev] Erasing FE.KEYID = 1
10,756,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,757 UART: [ldev] --
13,138,371 UART: [fwproc] Waiting for Commands...
13,141,458 UART: [fwproc] Received command 0x46574c44
13,143,646 UART: [fwproc] Received Image of size 114124 bytes
15,844,807 UART: ROM Fatal Error: 0x000B003B
15,848,264 >>> mbox cmd response: failed
15,848,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,994 >>> mbox cmd response: failed
15,849,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,553 >>> mbox cmd response: failed
Initializing fuses
2,062,880 writing to cptra_bootfsm_go
2,252,170 UART:
2,252,528 UART: Running Caliptra ROM ...
2,253,665 UART:
2,253,827 UART: [state] CFI Enabled
2,318,686 UART: [state] LifecycleState = Unprovisioned
2,320,627 UART: [state] DebugLocked = No
2,322,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,349 UART: [kat] SHA2-256
2,497,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,546 UART: [kat] ++
2,508,010 UART: [kat] sha1
2,519,282 UART: [kat] SHA2-256
2,521,971 UART: [kat] SHA2-384
2,527,853 UART: [kat] SHA2-512-ACC
2,530,213 UART: [kat] ECC-384
4,820,525 UART: [kat] HMAC-384Kdf
4,851,801 UART: [kat] LMS
6,042,061 UART: [kat] --
6,047,209 UART: [cold-reset] ++
6,049,684 UART: [fht] Storing FHT @ 0x50003400
6,061,036 UART: [idev] ++
6,061,666 UART: [idev] CDI.KEYID = 6
6,062,552 UART: [idev] SUBJECT.KEYID = 7
6,063,819 UART: [idev] UDS.KEYID = 0
6,066,130 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,209,774 UART: [idev] Erasing UDS.KEYID = 0
9,399,106 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,465 UART: [idev] --
9,425,136 UART: [ldev] ++
9,425,706 UART: [ldev] CDI.KEYID = 6
9,426,644 UART: [ldev] SUBJECT.KEYID = 5
9,427,890 UART: [ldev] AUTHORITY.KEYID = 7
9,429,125 UART: [ldev] FE.KEYID = 1
9,474,081 UART: [ldev] Erasing FE.KEYID = 1
12,808,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,589 UART: [ldev] --
15,167,380 UART: [fwproc] Waiting for Commands...
15,169,586 UART: [fwproc] Received command 0x46574c44
15,171,769 UART: [fwproc] Received Image of size 114124 bytes
19,234,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,307,915 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,376,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,694,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,809,106 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,587,932 >>> mbox cmd response: failed
15,588,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,588,858 >>> mbox cmd response: failed
15,589,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,589,421 >>> mbox cmd response: failed
Initializing fuses
2,056,593 writing to cptra_bootfsm_go
5,851,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,937,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,641 UART:
192,993 UART: Running Caliptra ROM ...
194,185 UART:
603,842 UART: [state] CFI Enabled
616,921 UART: [state] LifecycleState = Unprovisioned
618,879 UART: [state] DebugLocked = No
620,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,603 UART: [kat] SHA2-256
795,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,922 UART: [kat] ++
806,410 UART: [kat] sha1
816,481 UART: [kat] SHA2-256
819,221 UART: [kat] SHA2-384
826,120 UART: [kat] SHA2-512-ACC
828,516 UART: [kat] ECC-384
3,112,186 UART: [kat] HMAC-384Kdf
3,124,114 UART: [kat] LMS
4,314,200 UART: [kat] --
4,317,453 UART: [cold-reset] ++
4,319,711 UART: [fht] Storing FHT @ 0x50003400
4,330,389 UART: [idev] ++
4,330,957 UART: [idev] CDI.KEYID = 6
4,331,976 UART: [idev] SUBJECT.KEYID = 7
4,333,138 UART: [idev] UDS.KEYID = 0
4,335,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,207 UART: [idev] Erasing UDS.KEYID = 0
7,622,038 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,158 UART: [idev] --
7,648,512 UART: [ldev] ++
7,649,122 UART: [ldev] CDI.KEYID = 6
7,650,040 UART: [ldev] SUBJECT.KEYID = 5
7,651,264 UART: [ldev] AUTHORITY.KEYID = 7
7,652,512 UART: [ldev] FE.KEYID = 1
7,662,161 UART: [ldev] Erasing FE.KEYID = 1
10,950,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,538 UART: [ldev] --
13,311,315 UART: [fwproc] Waiting for Commands...
13,314,181 UART: [fwproc] Received command 0x46574c44
13,316,425 UART: [fwproc] Received Image of size 114124 bytes
16,019,142 UART: ROM Fatal Error: 0x000B003B
16,022,670 >>> mbox cmd response: failed
16,022,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,330 >>> mbox cmd response: failed
16,023,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,915 >>> mbox cmd response: failed
Initializing fuses
2,056,448 writing to cptra_bootfsm_go
2,245,768 UART:
2,246,108 UART: Running Caliptra ROM ...
2,247,202 UART:
4,435,624 UART: [state] CFI Enabled
4,449,233 UART: [state] LifecycleState = Unprovisioned
4,451,157 UART: [state] DebugLocked = No
4,453,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,457,730 UART: [kat] SHA2-256
4,627,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,638,040 UART: [kat] ++
4,638,592 UART: [kat] sha1
4,650,754 UART: [kat] SHA2-256
4,653,459 UART: [kat] SHA2-384
4,659,289 UART: [kat] SHA2-512-ACC
4,661,695 UART: [kat] ECC-384
6,945,352 UART: [kat] HMAC-384Kdf
6,957,103 UART: [kat] LMS
8,147,244 UART: [kat] --
8,152,408 UART: [cold-reset] ++
8,154,628 UART: [fht] Storing FHT @ 0x50003400
8,165,957 UART: [idev] ++
8,166,524 UART: [idev] CDI.KEYID = 6
8,167,547 UART: [idev] SUBJECT.KEYID = 7
8,168,709 UART: [idev] UDS.KEYID = 0
8,171,117 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,314,542 UART: [idev] Erasing UDS.KEYID = 0
11,459,158 UART: [idev] Using Sha1 for KeyId Algorithm
11,480,504 UART: [idev] --
11,483,029 UART: [ldev] ++
11,483,618 UART: [ldev] CDI.KEYID = 6
11,484,561 UART: [ldev] SUBJECT.KEYID = 5
11,485,730 UART: [ldev] AUTHORITY.KEYID = 7
11,487,081 UART: [ldev] FE.KEYID = 1
11,499,703 UART: [ldev] Erasing FE.KEYID = 1
14,784,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,092,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,141,906 UART: [ldev] --
17,147,063 UART: [fwproc] Waiting for Commands...
17,149,481 UART: [fwproc] Received command 0x46574c44
17,151,678 UART: [fwproc] Received Image of size 114124 bytes
21,199,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,277,330 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,346,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,663,496 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,133,118 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,767,238 >>> mbox cmd response: failed
15,768,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,400 >>> mbox cmd response: failed
15,768,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,996 >>> mbox cmd response: failed
Initializing fuses
2,062,523 writing to cptra_bootfsm_go
8,225,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,172,681 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,639 UART:
192,988 UART: Running Caliptra ROM ...
194,193 UART:
194,347 UART: [state] CFI Enabled
265,648 UART: [state] LifecycleState = Unprovisioned
267,519 UART: [state] DebugLocked = No
268,688 UART: [state] WD Timer not started. Device not locked for debugging
272,358 UART: [kat] SHA2-256
451,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,073 UART: [kat] ++
463,822 UART: [kat] sha1
473,187 UART: [kat] SHA2-256
476,200 UART: [kat] SHA2-384
482,824 UART: [kat] SHA2-512-ACC
485,765 UART: [kat] ECC-384
2,946,480 UART: [kat] HMAC-384Kdf
2,970,349 UART: [kat] LMS
3,499,841 UART: [kat] --
3,503,882 UART: [cold-reset] ++
3,505,206 UART: [fht] FHT @ 0x50003400
3,516,358 UART: [idev] ++
3,516,921 UART: [idev] CDI.KEYID = 6
3,517,834 UART: [idev] SUBJECT.KEYID = 7
3,519,049 UART: [idev] UDS.KEYID = 0
3,521,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,112 UART: [idev] Erasing UDS.KEYID = 0
6,024,815 UART: [idev] Sha1 KeyId Algorithm
6,048,433 UART: [idev] --
6,052,599 UART: [ldev] ++
6,053,177 UART: [ldev] CDI.KEYID = 6
6,054,068 UART: [ldev] SUBJECT.KEYID = 5
6,055,282 UART: [ldev] AUTHORITY.KEYID = 7
6,056,534 UART: [ldev] FE.KEYID = 1
6,099,002 UART: [ldev] Erasing FE.KEYID = 1
8,605,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,597 UART: [ldev] --
10,411,403 UART: [fwproc] Wait for Commands...
10,413,338 UART: [fwproc] Recv command 0x46574c44
10,415,436 UART: [fwproc] Recv'd Img size: 114448 bytes
12,471,773 UART: ROM Fatal Error: 0x000B003B
12,474,893 >>> mbox cmd response: failed
12,475,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,475,664 >>> mbox cmd response: failed
12,475,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,291 >>> mbox cmd response: failed
Initializing fuses
2,054,526 writing to cptra_bootfsm_go
2,243,864 UART:
2,244,219 UART: Running Caliptra ROM ...
2,245,351 UART:
2,245,517 UART: [state] CFI Enabled
2,313,410 UART: [state] LifecycleState = Unprovisioned
2,315,293 UART: [state] DebugLocked = No
2,316,529 UART: [state] WD Timer not started. Device not locked for debugging
2,319,525 UART: [kat] SHA2-256
2,498,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,231 UART: [kat] ++
2,510,691 UART: [kat] sha1
2,521,760 UART: [kat] SHA2-256
2,524,789 UART: [kat] SHA2-384
2,531,372 UART: [kat] SHA2-512-ACC
2,534,320 UART: [kat] ECC-384
4,999,607 UART: [kat] HMAC-384Kdf
5,022,095 UART: [kat] LMS
5,551,499 UART: [kat] --
5,555,493 UART: [cold-reset] ++
5,556,616 UART: [fht] FHT @ 0x50003400
5,567,301 UART: [idev] ++
5,567,871 UART: [idev] CDI.KEYID = 6
5,568,754 UART: [idev] SUBJECT.KEYID = 7
5,569,968 UART: [idev] UDS.KEYID = 0
5,572,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,716,602 UART: [idev] Erasing UDS.KEYID = 0
8,076,869 UART: [idev] Sha1 KeyId Algorithm
8,098,180 UART: [idev] --
8,101,637 UART: [ldev] ++
8,102,213 UART: [ldev] CDI.KEYID = 6
8,103,132 UART: [ldev] SUBJECT.KEYID = 5
8,104,295 UART: [ldev] AUTHORITY.KEYID = 7
8,105,531 UART: [ldev] FE.KEYID = 1
8,150,045 UART: [ldev] Erasing FE.KEYID = 1
10,654,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,990 UART: [ldev] --
12,464,554 UART: [fwproc] Wait for Commands...
12,467,787 UART: [fwproc] Recv command 0x46574c44
12,469,922 UART: [fwproc] Recv'd Img size: 114448 bytes
15,871,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,944,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,013,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,332,368 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,383,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,253,397 >>> mbox cmd response: failed
12,253,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,254,341 >>> mbox cmd response: failed
12,254,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,254,911 >>> mbox cmd response: failed
Initializing fuses
2,059,973 writing to cptra_bootfsm_go
5,438,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,123,392 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,601 UART:
192,970 UART: Running Caliptra ROM ...
194,199 UART:
603,588 UART: [state] CFI Enabled
618,197 UART: [state] LifecycleState = Unprovisioned
620,028 UART: [state] DebugLocked = No
621,464 UART: [state] WD Timer not started. Device not locked for debugging
624,916 UART: [kat] SHA2-256
804,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,601 UART: [kat] ++
816,133 UART: [kat] sha1
827,229 UART: [kat] SHA2-256
830,238 UART: [kat] SHA2-384
835,563 UART: [kat] SHA2-512-ACC
838,491 UART: [kat] ECC-384
3,282,303 UART: [kat] HMAC-384Kdf
3,295,418 UART: [kat] LMS
3,824,898 UART: [kat] --
3,829,000 UART: [cold-reset] ++
3,831,423 UART: [fht] FHT @ 0x50003400
3,842,723 UART: [idev] ++
3,843,288 UART: [idev] CDI.KEYID = 6
3,844,506 UART: [idev] SUBJECT.KEYID = 7
3,845,633 UART: [idev] UDS.KEYID = 0
3,848,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,188 UART: [idev] Erasing UDS.KEYID = 0
6,314,326 UART: [idev] Sha1 KeyId Algorithm
6,337,508 UART: [idev] --
6,341,476 UART: [ldev] ++
6,342,049 UART: [ldev] CDI.KEYID = 6
6,343,115 UART: [ldev] SUBJECT.KEYID = 5
6,344,221 UART: [ldev] AUTHORITY.KEYID = 7
6,345,423 UART: [ldev] FE.KEYID = 1
6,356,775 UART: [ldev] Erasing FE.KEYID = 1
8,833,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,410 UART: [ldev] --
10,625,108 UART: [fwproc] Wait for Commands...
10,628,177 UART: [fwproc] Recv command 0x46574c44
10,630,270 UART: [fwproc] Recv'd Img size: 114448 bytes
12,681,629 UART: ROM Fatal Error: 0x000B003B
12,684,749 >>> mbox cmd response: failed
12,685,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,685,499 >>> mbox cmd response: failed
12,685,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,085 >>> mbox cmd response: failed
Initializing fuses
2,064,161 writing to cptra_bootfsm_go
2,253,462 UART:
2,253,806 UART: Running Caliptra ROM ...
2,254,954 UART:
7,765,571 UART: [state] CFI Enabled
7,781,420 UART: [state] LifecycleState = Unprovisioned
7,783,276 UART: [state] DebugLocked = No
7,785,316 UART: [state] WD Timer not started. Device not locked for debugging
7,788,791 UART: [kat] SHA2-256
7,967,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,979,480 UART: [kat] ++
7,980,031 UART: [kat] sha1
7,991,762 UART: [kat] SHA2-256
7,994,835 UART: [kat] SHA2-384
8,001,958 UART: [kat] SHA2-512-ACC
8,004,907 UART: [kat] ECC-384
10,443,259 UART: [kat] HMAC-384Kdf
10,455,534 UART: [kat] LMS
10,985,042 UART: [kat] --
10,989,705 UART: [cold-reset] ++
10,990,766 UART: [fht] FHT @ 0x50003400
11,001,880 UART: [idev] ++
11,002,495 UART: [idev] CDI.KEYID = 6
11,003,392 UART: [idev] SUBJECT.KEYID = 7
11,004,613 UART: [idev] UDS.KEYID = 0
11,006,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,150,654 UART: [idev] Erasing UDS.KEYID = 0
13,476,886 UART: [idev] Sha1 KeyId Algorithm
13,500,700 UART: [idev] --
13,505,285 UART: [ldev] ++
13,505,853 UART: [ldev] CDI.KEYID = 6
13,506,766 UART: [ldev] SUBJECT.KEYID = 5
13,507,978 UART: [ldev] AUTHORITY.KEYID = 7
13,509,203 UART: [ldev] FE.KEYID = 1
13,517,854 UART: [ldev] Erasing FE.KEYID = 1
15,991,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,709,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,725,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,741,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,757,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,777,596 UART: [ldev] --
17,782,586 UART: [fwproc] Wait for Commands...
17,785,602 UART: [fwproc] Recv command 0x46574c44
17,787,709 UART: [fwproc] Recv'd Img size: 114448 bytes
21,189,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,264,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,333,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,651,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,698,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,457,801 >>> mbox cmd response: failed
12,458,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,867 >>> mbox cmd response: failed
12,459,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,500 >>> mbox cmd response: failed
Initializing fuses
2,058,026 writing to cptra_bootfsm_go
11,099,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,682,270 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
192,288 UART:
192,640 UART: Running Caliptra ROM ...
193,849 UART:
194,006 UART: [state] CFI Enabled
264,491 UART: [state] LifecycleState = Unprovisioned
266,863 UART: [state] DebugLocked = No
268,519 UART: [state] WD Timer not started. Device not locked for debugging
272,926 UART: [kat] SHA2-256
462,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,583 UART: [kat] ++
474,031 UART: [kat] sha1
486,211 UART: [kat] SHA2-256
489,220 UART: [kat] SHA2-384
495,412 UART: [kat] SHA2-512-ACC
498,031 UART: [kat] ECC-384
2,946,168 UART: [kat] HMAC-384Kdf
2,971,161 UART: [kat] LMS
3,502,936 UART: [kat] --
3,507,092 UART: [cold-reset] ++
3,508,324 UART: [fht] FHT @ 0x50003400
3,520,280 UART: [idev] ++
3,520,962 UART: [idev] CDI.KEYID = 6
3,521,982 UART: [idev] SUBJECT.KEYID = 7
3,523,164 UART: [idev] UDS.KEYID = 0
3,525,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,290 UART: [idev] Erasing UDS.KEYID = 0
6,053,743 UART: [idev] Sha1 KeyId Algorithm
6,076,199 UART: [idev] --
6,082,468 UART: [ldev] ++
6,083,152 UART: [ldev] CDI.KEYID = 6
6,084,097 UART: [ldev] SUBJECT.KEYID = 5
6,085,264 UART: [ldev] AUTHORITY.KEYID = 7
6,086,502 UART: [ldev] FE.KEYID = 1
6,125,430 UART: [ldev] Erasing FE.KEYID = 1
8,634,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,368,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,384,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,399,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,414,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,436,859 UART: [ldev] --
10,441,539 UART: [fwproc] Wait for Commands...
10,444,608 UART: [fwproc] Recv command 0x46574c44
10,446,923 UART: [fwproc] Recv'd Img size: 114448 bytes
12,533,794 UART: ROM Fatal Error: 0x000B003B
12,537,462 >>> mbox cmd response: failed
12,537,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,241 >>> mbox cmd response: failed
12,538,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,798 >>> mbox cmd response: failed
Initializing fuses
2,058,944 writing to cptra_bootfsm_go
2,248,227 UART:
2,248,583 UART: Running Caliptra ROM ...
2,249,743 UART:
2,249,912 UART: [state] CFI Enabled
2,321,874 UART: [state] LifecycleState = Unprovisioned
2,324,309 UART: [state] DebugLocked = No
2,325,862 UART: [state] WD Timer not started. Device not locked for debugging
2,331,290 UART: [kat] SHA2-256
2,521,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,929 UART: [kat] ++
2,532,427 UART: [kat] sha1
2,544,471 UART: [kat] SHA2-256
2,547,494 UART: [kat] SHA2-384
2,552,191 UART: [kat] SHA2-512-ACC
2,554,754 UART: [kat] ECC-384
5,006,515 UART: [kat] HMAC-384Kdf
5,030,731 UART: [kat] LMS
5,562,517 UART: [kat] --
5,566,146 UART: [cold-reset] ++
5,567,110 UART: [fht] FHT @ 0x50003400
5,579,148 UART: [idev] ++
5,579,828 UART: [idev] CDI.KEYID = 6
5,580,766 UART: [idev] SUBJECT.KEYID = 7
5,581,981 UART: [idev] UDS.KEYID = 0
5,584,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,728,565 UART: [idev] Erasing UDS.KEYID = 0
8,088,782 UART: [idev] Sha1 KeyId Algorithm
8,111,738 UART: [idev] --
8,117,351 UART: [ldev] ++
8,118,030 UART: [ldev] CDI.KEYID = 6
8,118,922 UART: [ldev] SUBJECT.KEYID = 5
8,120,132 UART: [ldev] AUTHORITY.KEYID = 7
8,121,363 UART: [ldev] FE.KEYID = 1
8,160,035 UART: [ldev] Erasing FE.KEYID = 1
10,664,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,442 UART: [ldev] --
12,472,707 UART: [fwproc] Wait for Commands...
12,474,194 UART: [fwproc] Recv command 0x46574c44
12,476,519 UART: [fwproc] Recv'd Img size: 114448 bytes
15,923,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,113,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,656,307 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,440,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,294,675 >>> mbox cmd response: failed
12,295,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,295,579 >>> mbox cmd response: failed
12,295,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,141 >>> mbox cmd response: failed
Initializing fuses
2,065,599 writing to cptra_bootfsm_go
5,511,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,816,970 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,477 UART:
193,123 UART: Running Caliptra ROM ...
194,270 UART:
603,556 UART: [state] CFI Enabled
617,892 UART: [state] LifecycleState = Unprovisioned
620,226 UART: [state] DebugLocked = No
622,223 UART: [state] WD Timer not started. Device not locked for debugging
626,210 UART: [kat] SHA2-256
816,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,873 UART: [kat] ++
827,373 UART: [kat] sha1
838,217 UART: [kat] SHA2-256
841,227 UART: [kat] SHA2-384
847,313 UART: [kat] SHA2-512-ACC
849,924 UART: [kat] ECC-384
3,294,868 UART: [kat] HMAC-384Kdf
3,306,833 UART: [kat] LMS
3,838,619 UART: [kat] --
3,842,034 UART: [cold-reset] ++
3,843,812 UART: [fht] FHT @ 0x50003400
3,855,062 UART: [idev] ++
3,855,741 UART: [idev] CDI.KEYID = 6
3,856,757 UART: [idev] SUBJECT.KEYID = 7
3,857,917 UART: [idev] UDS.KEYID = 0
3,860,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,830 UART: [idev] Erasing UDS.KEYID = 0
6,334,493 UART: [idev] Sha1 KeyId Algorithm
6,357,642 UART: [idev] --
6,362,990 UART: [ldev] ++
6,363,675 UART: [ldev] CDI.KEYID = 6
6,364,642 UART: [ldev] SUBJECT.KEYID = 5
6,365,799 UART: [ldev] AUTHORITY.KEYID = 7
6,367,031 UART: [ldev] FE.KEYID = 1
6,378,870 UART: [ldev] Erasing FE.KEYID = 1
8,856,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,153 UART: [ldev] --
10,647,646 UART: [fwproc] Wait for Commands...
10,649,474 UART: [fwproc] Recv command 0x46574c44
10,651,792 UART: [fwproc] Recv'd Img size: 114448 bytes
12,730,702 UART: ROM Fatal Error: 0x000B003B
12,734,372 >>> mbox cmd response: failed
12,734,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,102 >>> mbox cmd response: failed
12,735,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,660 >>> mbox cmd response: failed
Initializing fuses
2,054,560 writing to cptra_bootfsm_go
2,243,885 UART:
2,244,234 UART: Running Caliptra ROM ...
2,245,376 UART:
7,715,553 UART: [state] CFI Enabled
7,730,581 UART: [state] LifecycleState = Unprovisioned
7,733,082 UART: [state] DebugLocked = No
7,734,683 UART: [state] WD Timer not started. Device not locked for debugging
7,739,743 UART: [kat] SHA2-256
7,929,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,940,426 UART: [kat] ++
7,941,023 UART: [kat] sha1
7,952,572 UART: [kat] SHA2-256
7,955,594 UART: [kat] SHA2-384
7,961,795 UART: [kat] SHA2-512-ACC
7,964,414 UART: [kat] ECC-384
10,405,295 UART: [kat] HMAC-384Kdf
10,418,104 UART: [kat] LMS
10,949,939 UART: [kat] --
10,955,358 UART: [cold-reset] ++
10,957,081 UART: [fht] FHT @ 0x50003400
10,969,041 UART: [idev] ++
10,969,726 UART: [idev] CDI.KEYID = 6
10,970,712 UART: [idev] SUBJECT.KEYID = 7
10,971,873 UART: [idev] UDS.KEYID = 0
10,974,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,117,953 UART: [idev] Erasing UDS.KEYID = 0
13,444,587 UART: [idev] Sha1 KeyId Algorithm
13,466,938 UART: [idev] --
13,472,068 UART: [ldev] ++
13,472,749 UART: [ldev] CDI.KEYID = 6
13,473,760 UART: [ldev] SUBJECT.KEYID = 5
13,474,863 UART: [ldev] AUTHORITY.KEYID = 7
13,476,095 UART: [ldev] FE.KEYID = 1
13,489,177 UART: [ldev] Erasing FE.KEYID = 1
15,965,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,682,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,697,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,712,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,727,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,750,004 UART: [ldev] --
17,754,968 UART: [fwproc] Wait for Commands...
17,757,767 UART: [fwproc] Recv command 0x46574c44
17,760,033 UART: [fwproc] Recv'd Img size: 114448 bytes
21,208,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,284,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,400,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,944,300 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,756,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,525,869 >>> mbox cmd response: failed
12,526,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,830 >>> mbox cmd response: failed
12,527,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,396 >>> mbox cmd response: failed
Initializing fuses
2,054,651 writing to cptra_bootfsm_go
11,096,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,311,385 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,090 UART: [kat] SHA2-512-ACC
896,991 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,751 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,444 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,690 UART: [idev] --
1,514,989 UART: [ldev] ++
1,515,157 UART: [ldev] CDI.KEYID = 6
1,515,520 UART: [ldev] SUBJECT.KEYID = 5
1,515,946 UART: [ldev] AUTHORITY.KEYID = 7
1,516,409 UART: [ldev] FE.KEYID = 1
1,521,543 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,804 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,880 UART: [fwproc] Received command 0x46574c44
1,587,671 UART: [fwproc] Received Image of size 114448 bytes
1,635,318 UART: ROM Fatal Error: 0x000B003B
1,636,477 >>> mbox cmd response: failed
1,636,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,483 >>> mbox cmd response: failed
1,636,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,250 UART: [state] LifecycleState = Unprovisioned
84,905 UART: [state] DebugLocked = No
85,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,235 UART: [kat] SHA2-256
881,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,281 UART: [kat] ++
885,433 UART: [kat] sha1
889,525 UART: [kat] SHA2-256
891,463 UART: [kat] SHA2-384
894,146 UART: [kat] SHA2-512-ACC
896,047 UART: [kat] ECC-384
901,636 UART: [kat] HMAC-384Kdf
906,234 UART: [kat] LMS
1,474,430 UART: [kat] --
1,475,357 UART: [cold-reset] ++
1,475,937 UART: [fht] Storing FHT @ 0x50003400
1,478,722 UART: [idev] ++
1,478,890 UART: [idev] CDI.KEYID = 6
1,479,250 UART: [idev] SUBJECT.KEYID = 7
1,479,674 UART: [idev] UDS.KEYID = 0
1,480,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,620 UART: [idev] Erasing UDS.KEYID = 0
1,504,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,220 UART: [idev] --
1,514,039 UART: [ldev] ++
1,514,207 UART: [ldev] CDI.KEYID = 6
1,514,570 UART: [ldev] SUBJECT.KEYID = 5
1,514,996 UART: [ldev] AUTHORITY.KEYID = 7
1,515,459 UART: [ldev] FE.KEYID = 1
1,520,629 UART: [ldev] Erasing FE.KEYID = 1
1,545,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,100 UART: [ldev] --
1,585,599 UART: [fwproc] Waiting for Commands...
1,586,362 UART: [fwproc] Received command 0x46574c44
1,587,153 UART: [fwproc] Received Image of size 114448 bytes
2,886,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,387 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,739 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,008 >>> mbox cmd response: failed
1,489,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,014 >>> mbox cmd response: failed
1,489,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,948 UART: [kat] SHA2-256
881,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,994 UART: [kat] ++
886,146 UART: [kat] sha1
890,324 UART: [kat] SHA2-256
892,262 UART: [kat] SHA2-384
895,037 UART: [kat] SHA2-512-ACC
896,938 UART: [kat] ECC-384
902,061 UART: [kat] HMAC-384Kdf
906,723 UART: [kat] LMS
1,474,919 UART: [kat] --
1,475,558 UART: [cold-reset] ++
1,475,954 UART: [fht] Storing FHT @ 0x50003400
1,478,827 UART: [idev] ++
1,478,995 UART: [idev] CDI.KEYID = 6
1,479,355 UART: [idev] SUBJECT.KEYID = 7
1,479,779 UART: [idev] UDS.KEYID = 0
1,480,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,803 UART: [idev] Erasing UDS.KEYID = 0
1,504,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,025 UART: [idev] --
1,514,116 UART: [ldev] ++
1,514,284 UART: [ldev] CDI.KEYID = 6
1,514,647 UART: [ldev] SUBJECT.KEYID = 5
1,515,073 UART: [ldev] AUTHORITY.KEYID = 7
1,515,536 UART: [ldev] FE.KEYID = 1
1,520,766 UART: [ldev] Erasing FE.KEYID = 1
1,545,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,755 UART: [ldev] --
1,585,212 UART: [fwproc] Waiting for Commands...
1,585,963 UART: [fwproc] Received command 0x46574c44
1,586,754 UART: [fwproc] Received Image of size 114448 bytes
1,634,815 UART: ROM Fatal Error: 0x000B003B
1,635,974 >>> mbox cmd response: failed
1,635,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,980 >>> mbox cmd response: failed
1,635,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,550 UART: [kat] SHA2-256
892,488 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,783 UART: [kat] HMAC-384Kdf
907,201 UART: [kat] LMS
1,475,397 UART: [kat] --
1,476,084 UART: [cold-reset] ++
1,476,588 UART: [fht] Storing FHT @ 0x50003400
1,479,345 UART: [idev] ++
1,479,513 UART: [idev] CDI.KEYID = 6
1,479,873 UART: [idev] SUBJECT.KEYID = 7
1,480,297 UART: [idev] UDS.KEYID = 0
1,480,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,335 UART: [idev] Erasing UDS.KEYID = 0
1,505,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,502 UART: [ldev] ++
1,515,670 UART: [ldev] CDI.KEYID = 6
1,516,033 UART: [ldev] SUBJECT.KEYID = 5
1,516,459 UART: [ldev] AUTHORITY.KEYID = 7
1,516,922 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,546,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,011 UART: [ldev] --
1,586,346 UART: [fwproc] Waiting for Commands...
1,586,991 UART: [fwproc] Received command 0x46574c44
1,587,782 UART: [fwproc] Received Image of size 114448 bytes
2,886,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,875 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,887 >>> mbox cmd response: failed
1,486,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,893 >>> mbox cmd response: failed
1,486,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,453 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,467 UART: [cold-reset] ++
1,171,799 UART: [fht] FHT @ 0x50003400
1,174,428 UART: [idev] ++
1,174,596 UART: [idev] CDI.KEYID = 6
1,174,956 UART: [idev] SUBJECT.KEYID = 7
1,175,380 UART: [idev] UDS.KEYID = 0
1,175,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,602 UART: [idev] Erasing UDS.KEYID = 0
1,200,527 UART: [idev] Sha1 KeyId Algorithm
1,209,105 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,207 UART: ROM Fatal Error: 0x000B003B
1,332,366 >>> mbox cmd response: failed
1,332,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,372 >>> mbox cmd response: failed
1,332,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
907,010 UART: [kat] SHA2-512-ACC
908,911 UART: [kat] ECC-384
917,960 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,223 UART: [fht] FHT @ 0x50003400
1,174,730 UART: [idev] ++
1,174,898 UART: [idev] CDI.KEYID = 6
1,175,258 UART: [idev] SUBJECT.KEYID = 7
1,175,682 UART: [idev] UDS.KEYID = 0
1,176,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,940 UART: [idev] Erasing UDS.KEYID = 0
1,201,491 UART: [idev] Sha1 KeyId Algorithm
1,209,785 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,419 UART: [ldev] Erasing FE.KEYID = 1
1,243,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,487 UART: [ldev] --
1,282,806 UART: [fwproc] Wait for Commands...
1,283,524 UART: [fwproc] Recv command 0x46574c44
1,284,252 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,787 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,745 >>> mbox cmd response: failed
1,187,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,751 >>> mbox cmd response: failed
1,187,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,166 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
893,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,600 UART: [kat] ++
897,752 UART: [kat] sha1
901,872 UART: [kat] SHA2-256
903,812 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,087 UART: [kat] HMAC-384Kdf
922,575 UART: [kat] LMS
1,170,903 UART: [kat] --
1,171,944 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,174,879 UART: [idev] ++
1,175,047 UART: [idev] CDI.KEYID = 6
1,175,407 UART: [idev] SUBJECT.KEYID = 7
1,175,831 UART: [idev] UDS.KEYID = 0
1,176,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,847 UART: [idev] Erasing UDS.KEYID = 0
1,201,770 UART: [idev] Sha1 KeyId Algorithm
1,210,178 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,106 UART: [ldev] --
1,283,579 UART: [fwproc] Wait for Commands...
1,284,267 UART: [fwproc] Recv command 0x46574c44
1,284,995 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,958 UART: ROM Fatal Error: 0x000B003B
1,333,117 >>> mbox cmd response: failed
1,333,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,123 >>> mbox cmd response: failed
1,333,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,480 UART: [kat] SHA2-256
904,420 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,226 UART: [cold-reset] ++
1,172,754 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,603 UART: [idev] Erasing UDS.KEYID = 0
1,200,556 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,270 UART: [ldev] ++
1,210,438 UART: [ldev] CDI.KEYID = 6
1,210,801 UART: [ldev] SUBJECT.KEYID = 5
1,211,227 UART: [ldev] AUTHORITY.KEYID = 7
1,211,690 UART: [ldev] FE.KEYID = 1
1,217,028 UART: [ldev] Erasing FE.KEYID = 1
1,243,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,148 UART: [ldev] --
1,282,573 UART: [fwproc] Wait for Commands...
1,283,377 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,702 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,158 >>> mbox cmd response: failed
1,188,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,164 >>> mbox cmd response: failed
1,188,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,185 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,440 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,174,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,301 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,440 UART: [ldev] ++
1,208,608 UART: [ldev] CDI.KEYID = 6
1,208,972 UART: [ldev] SUBJECT.KEYID = 5
1,209,399 UART: [ldev] AUTHORITY.KEYID = 7
1,209,862 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,838 UART: [ldev] --
1,280,256 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,676 UART: ROM Fatal Error: 0x000B003B
1,329,835 >>> mbox cmd response: failed
1,329,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,841 >>> mbox cmd response: failed
1,329,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,581 UART: [fwproc] Recv command 0x46574c44
1,282,314 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,027 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,628 >>> mbox cmd response: failed
1,183,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,634 >>> mbox cmd response: failed
1,183,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,174,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,501 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,485 UART: ROM Fatal Error: 0x000B003B
1,331,644 >>> mbox cmd response: failed
1,331,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,650 >>> mbox cmd response: failed
1,331,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,868 UART: [idev] Erasing UDS.KEYID = 0
1,198,732 UART: [idev] Sha1 KeyId Algorithm
1,207,756 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,159 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,221 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,208 UART: [fwproc] Recv command 0x46574c44
1,282,941 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,222 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,323 >>> mbox cmd response: failed
1,182,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,329 >>> mbox cmd response: failed
1,182,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,138 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
193,029 UART:
193,393 UART: Running Caliptra ROM ...
194,572 UART:
194,724 UART: [state] CFI Enabled
265,078 UART: [state] LifecycleState = Manufacturing
267,006 UART: [state] DebugLocked = No
268,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,621 UART: [kat] SHA2-256
442,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,814 UART: [kat] ++
453,266 UART: [kat] sha1
463,913 UART: [kat] SHA2-256
466,597 UART: [kat] SHA2-384
472,198 UART: [kat] SHA2-512-ACC
474,531 UART: [kat] ECC-384
2,767,980 UART: [kat] HMAC-384Kdf
2,801,395 UART: [kat] LMS
3,991,733 UART: [kat] --
3,997,207 UART: [cold-reset] ++
3,998,281 UART: [fht] Storing FHT @ 0x50003400
4,011,379 UART: [idev] ++
4,011,998 UART: [idev] CDI.KEYID = 6
4,012,926 UART: [idev] SUBJECT.KEYID = 7
4,014,150 UART: [idev] UDS.KEYID = 0
4,016,988 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,659 UART: [idev] Erasing UDS.KEYID = 0
7,349,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,087 UART: [idev] --
7,376,033 UART: [ldev] ++
7,376,615 UART: [ldev] CDI.KEYID = 6
7,377,591 UART: [ldev] SUBJECT.KEYID = 5
7,378,756 UART: [ldev] AUTHORITY.KEYID = 7
7,380,046 UART: [ldev] FE.KEYID = 1
7,423,778 UART: [ldev] Erasing FE.KEYID = 1
10,757,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,547 UART: [ldev] --
13,116,826 UART: [fwproc] Waiting for Commands...
13,118,977 UART: [fwproc] Received command 0x46574c44
13,121,163 UART: [fwproc] Received Image of size 114124 bytes
16,094,840 UART: ROM Fatal Error: 0x000B0025
16,098,304 >>> mbox cmd response: failed
16,098,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,099,070 >>> mbox cmd response: failed
16,099,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,099,640 >>> mbox cmd response: failed
Initializing fuses
2,048,998 writing to cptra_bootfsm_go
2,238,339 UART:
2,238,702 UART: Running Caliptra ROM ...
2,239,860 UART:
2,240,026 UART: [state] CFI Enabled
2,298,323 UART: [state] LifecycleState = Manufacturing
2,300,212 UART: [state] DebugLocked = No
2,303,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,050 UART: [kat] SHA2-256
2,477,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,259 UART: [kat] ++
2,488,806 UART: [kat] sha1
2,499,866 UART: [kat] SHA2-256
2,502,563 UART: [kat] SHA2-384
2,508,818 UART: [kat] SHA2-512-ACC
2,511,230 UART: [kat] ECC-384
4,802,236 UART: [kat] HMAC-384Kdf
4,833,367 UART: [kat] LMS
6,023,660 UART: [kat] --
6,025,576 UART: [cold-reset] ++
6,027,674 UART: [fht] Storing FHT @ 0x50003400
6,039,050 UART: [idev] ++
6,039,628 UART: [idev] CDI.KEYID = 6
6,040,544 UART: [idev] SUBJECT.KEYID = 7
6,041,761 UART: [idev] UDS.KEYID = 0
6,044,515 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,188,158 UART: [idev] Erasing UDS.KEYID = 0
9,378,694 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,268 UART: [idev] --
9,405,750 UART: [ldev] ++
9,406,323 UART: [ldev] CDI.KEYID = 6
9,407,264 UART: [ldev] SUBJECT.KEYID = 5
9,408,526 UART: [ldev] AUTHORITY.KEYID = 7
9,409,762 UART: [ldev] FE.KEYID = 1
9,457,284 UART: [ldev] Erasing FE.KEYID = 1
12,791,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,118,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,133,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,843 UART: [ldev] --
15,170,616 UART: [fwproc] Waiting for Commands...
15,173,140 UART: [fwproc] Received command 0x46574c44
15,175,381 UART: [fwproc] Received Image of size 114124 bytes
19,257,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,330,974 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,399,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,717,537 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,930 writing to cptra_bootfsm_go
3,805,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,858,748 >>> mbox cmd response: failed
15,859,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,859,690 >>> mbox cmd response: failed
15,859,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,860,261 >>> mbox cmd response: failed
Initializing fuses
2,045,591 writing to cptra_bootfsm_go
5,847,715 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,945,684 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,512 UART:
192,871 UART: Running Caliptra ROM ...
194,052 UART:
603,827 UART: [state] CFI Enabled
619,730 UART: [state] LifecycleState = Manufacturing
621,613 UART: [state] DebugLocked = No
623,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,078 UART: [kat] SHA2-256
797,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,381 UART: [kat] ++
808,829 UART: [kat] sha1
821,053 UART: [kat] SHA2-256
823,747 UART: [kat] SHA2-384
829,733 UART: [kat] SHA2-512-ACC
832,086 UART: [kat] ECC-384
3,115,115 UART: [kat] HMAC-384Kdf
3,126,931 UART: [kat] LMS
4,317,004 UART: [kat] --
4,321,996 UART: [cold-reset] ++
4,323,711 UART: [fht] Storing FHT @ 0x50003400
4,334,977 UART: [idev] ++
4,335,604 UART: [idev] CDI.KEYID = 6
4,336,493 UART: [idev] SUBJECT.KEYID = 7
4,337,758 UART: [idev] UDS.KEYID = 0
4,340,730 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,137 UART: [idev] Erasing UDS.KEYID = 0
7,621,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,955 UART: [idev] --
7,646,495 UART: [ldev] ++
7,647,070 UART: [ldev] CDI.KEYID = 6
7,648,092 UART: [ldev] SUBJECT.KEYID = 5
7,649,202 UART: [ldev] AUTHORITY.KEYID = 7
7,650,490 UART: [ldev] FE.KEYID = 1
7,660,928 UART: [ldev] Erasing FE.KEYID = 1
10,948,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,539 UART: [ldev] --
13,310,662 UART: [fwproc] Waiting for Commands...
13,313,198 UART: [fwproc] Received command 0x46574c44
13,315,388 UART: [fwproc] Received Image of size 114124 bytes
16,296,631 UART: ROM Fatal Error: 0x000B0025
16,300,066 >>> mbox cmd response: failed
16,300,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,300,894 >>> mbox cmd response: failed
16,301,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,301,456 >>> mbox cmd response: failed
Initializing fuses
2,056,186 writing to cptra_bootfsm_go
2,245,518 UART:
2,245,882 UART: Running Caliptra ROM ...
2,247,021 UART:
4,156,046 UART: [state] CFI Enabled
4,170,287 UART: [state] LifecycleState = Manufacturing
4,172,192 UART: [state] DebugLocked = No
4,174,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,178,296 UART: [kat] SHA2-256
4,348,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,358,530 UART: [kat] ++
4,359,020 UART: [kat] sha1
4,370,886 UART: [kat] SHA2-256
4,373,597 UART: [kat] SHA2-384
4,379,748 UART: [kat] SHA2-512-ACC
4,382,099 UART: [kat] ECC-384
6,667,800 UART: [kat] HMAC-384Kdf
6,678,839 UART: [kat] LMS
7,868,979 UART: [kat] --
7,873,131 UART: [cold-reset] ++
7,874,793 UART: [fht] Storing FHT @ 0x50003400
7,885,034 UART: [idev] ++
7,885,643 UART: [idev] CDI.KEYID = 6
7,886,585 UART: [idev] SUBJECT.KEYID = 7
7,887,810 UART: [idev] UDS.KEYID = 0
7,890,617 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,033,934 UART: [idev] Erasing UDS.KEYID = 0
11,176,358 UART: [idev] Using Sha1 for KeyId Algorithm
11,198,392 UART: [idev] --
11,203,525 UART: [ldev] ++
11,204,094 UART: [ldev] CDI.KEYID = 6
11,205,037 UART: [ldev] SUBJECT.KEYID = 5
11,206,290 UART: [ldev] AUTHORITY.KEYID = 7
11,207,528 UART: [ldev] FE.KEYID = 1
11,218,258 UART: [ldev] Erasing FE.KEYID = 1
14,506,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,800,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,815,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,830,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,844,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,863,517 UART: [ldev] --
16,869,061 UART: [fwproc] Waiting for Commands...
16,872,080 UART: [fwproc] Received command 0x46574c44
16,874,273 UART: [fwproc] Received Image of size 114124 bytes
20,953,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,022,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,091,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,408,595 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,132,280 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,081,247 >>> mbox cmd response: failed
16,081,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,295 >>> mbox cmd response: failed
16,082,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,865 >>> mbox cmd response: failed
Initializing fuses
2,046,080 writing to cptra_bootfsm_go
7,916,758 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,894,137 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,148 UART:
192,517 UART: Running Caliptra ROM ...
193,699 UART:
193,855 UART: [state] CFI Enabled
259,529 UART: [state] LifecycleState = Manufacturing
261,397 UART: [state] DebugLocked = No
264,192 UART: [state] WD Timer not started. Device not locked for debugging
267,580 UART: [kat] SHA2-256
446,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,233 UART: [kat] ++
458,768 UART: [kat] sha1
469,700 UART: [kat] SHA2-256
472,763 UART: [kat] SHA2-384
477,762 UART: [kat] SHA2-512-ACC
480,748 UART: [kat] ECC-384
2,947,962 UART: [kat] HMAC-384Kdf
2,969,652 UART: [kat] LMS
3,499,120 UART: [kat] --
3,503,343 UART: [cold-reset] ++
3,504,950 UART: [fht] FHT @ 0x50003400
3,514,526 UART: [idev] ++
3,515,088 UART: [idev] CDI.KEYID = 6
3,516,003 UART: [idev] SUBJECT.KEYID = 7
3,517,233 UART: [idev] UDS.KEYID = 0
3,520,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,237 UART: [idev] Erasing UDS.KEYID = 0
6,024,279 UART: [idev] Sha1 KeyId Algorithm
6,046,815 UART: [idev] --
6,051,569 UART: [ldev] ++
6,052,145 UART: [ldev] CDI.KEYID = 6
6,053,033 UART: [ldev] SUBJECT.KEYID = 5
6,054,247 UART: [ldev] AUTHORITY.KEYID = 7
6,055,483 UART: [ldev] FE.KEYID = 1
6,102,376 UART: [ldev] Erasing FE.KEYID = 1
8,605,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,931 UART: [ldev] --
10,415,141 UART: [fwproc] Wait for Commands...
10,418,321 UART: [fwproc] Recv command 0x46574c44
10,420,379 UART: [fwproc] Recv'd Img size: 114448 bytes
12,733,306 UART: ROM Fatal Error: 0x000B0025
12,736,408 >>> mbox cmd response: failed
12,736,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,196 >>> mbox cmd response: failed
12,737,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,753 >>> mbox cmd response: failed
Initializing fuses
2,047,260 writing to cptra_bootfsm_go
2,236,526 UART:
2,236,869 UART: Running Caliptra ROM ...
2,238,613 UART:
2,238,814 UART: [state] CFI Enabled
2,310,220 UART: [state] LifecycleState = Manufacturing
2,312,075 UART: [state] DebugLocked = No
2,314,013 UART: [state] WD Timer not started. Device not locked for debugging
2,316,952 UART: [kat] SHA2-256
2,496,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,650 UART: [kat] ++
2,508,109 UART: [kat] sha1
2,519,857 UART: [kat] SHA2-256
2,522,875 UART: [kat] SHA2-384
2,529,140 UART: [kat] SHA2-512-ACC
2,532,134 UART: [kat] ECC-384
4,995,617 UART: [kat] HMAC-384Kdf
5,016,007 UART: [kat] LMS
5,545,477 UART: [kat] --
5,547,806 UART: [cold-reset] ++
5,550,354 UART: [fht] FHT @ 0x50003400
5,560,038 UART: [idev] ++
5,560,607 UART: [idev] CDI.KEYID = 6
5,561,488 UART: [idev] SUBJECT.KEYID = 7
5,562,699 UART: [idev] UDS.KEYID = 0
5,565,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,452 UART: [idev] Erasing UDS.KEYID = 0
8,072,990 UART: [idev] Sha1 KeyId Algorithm
8,095,252 UART: [idev] --
8,098,689 UART: [ldev] ++
8,099,275 UART: [ldev] CDI.KEYID = 6
8,100,165 UART: [ldev] SUBJECT.KEYID = 5
8,101,299 UART: [ldev] AUTHORITY.KEYID = 7
8,102,552 UART: [ldev] FE.KEYID = 1
8,145,567 UART: [ldev] Erasing FE.KEYID = 1
10,651,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,694 UART: [ldev] --
12,459,312 UART: [fwproc] Wait for Commands...
12,462,159 UART: [fwproc] Recv command 0x46574c44
12,464,251 UART: [fwproc] Recv'd Img size: 114448 bytes
15,889,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,960,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,029,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,347,171 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,384,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,525,188 >>> mbox cmd response: failed
12,525,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,234 >>> mbox cmd response: failed
12,526,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,787 >>> mbox cmd response: failed
Initializing fuses
2,044,880 writing to cptra_bootfsm_go
5,426,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,153,485 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,609 UART:
192,972 UART: Running Caliptra ROM ...
194,172 UART:
603,932 UART: [state] CFI Enabled
615,439 UART: [state] LifecycleState = Manufacturing
617,343 UART: [state] DebugLocked = No
618,619 UART: [state] WD Timer not started. Device not locked for debugging
622,384 UART: [kat] SHA2-256
801,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,111 UART: [kat] ++
813,642 UART: [kat] sha1
823,552 UART: [kat] SHA2-256
826,564 UART: [kat] SHA2-384
832,395 UART: [kat] SHA2-512-ACC
835,331 UART: [kat] ECC-384
3,276,868 UART: [kat] HMAC-384Kdf
3,287,748 UART: [kat] LMS
3,817,214 UART: [kat] --
3,821,476 UART: [cold-reset] ++
3,822,819 UART: [fht] FHT @ 0x50003400
3,833,369 UART: [idev] ++
3,833,934 UART: [idev] CDI.KEYID = 6
3,834,950 UART: [idev] SUBJECT.KEYID = 7
3,836,059 UART: [idev] UDS.KEYID = 0
3,838,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,835 UART: [idev] Erasing UDS.KEYID = 0
6,305,350 UART: [idev] Sha1 KeyId Algorithm
6,328,041 UART: [idev] --
6,332,595 UART: [ldev] ++
6,333,194 UART: [ldev] CDI.KEYID = 6
6,334,106 UART: [ldev] SUBJECT.KEYID = 5
6,335,271 UART: [ldev] AUTHORITY.KEYID = 7
6,336,505 UART: [ldev] FE.KEYID = 1
6,347,744 UART: [ldev] Erasing FE.KEYID = 1
8,820,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,416 UART: [ldev] --
10,612,844 UART: [fwproc] Wait for Commands...
10,615,160 UART: [fwproc] Recv command 0x46574c44
10,617,271 UART: [fwproc] Recv'd Img size: 114448 bytes
12,937,375 UART: ROM Fatal Error: 0x000B0025
12,940,438 >>> mbox cmd response: failed
12,940,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,218 >>> mbox cmd response: failed
12,941,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,779 >>> mbox cmd response: failed
Initializing fuses
2,049,598 writing to cptra_bootfsm_go
2,238,896 UART:
2,239,237 UART: Running Caliptra ROM ...
2,240,377 UART:
7,514,611 UART: [state] CFI Enabled
7,526,588 UART: [state] LifecycleState = Manufacturing
7,528,448 UART: [state] DebugLocked = No
7,531,028 UART: [state] WD Timer not started. Device not locked for debugging
7,534,534 UART: [kat] SHA2-256
7,713,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,725,239 UART: [kat] ++
7,725,781 UART: [kat] sha1
7,737,972 UART: [kat] SHA2-256
7,740,988 UART: [kat] SHA2-384
7,746,711 UART: [kat] SHA2-512-ACC
7,749,652 UART: [kat] ECC-384
10,192,691 UART: [kat] HMAC-384Kdf
10,206,165 UART: [kat] LMS
10,735,613 UART: [kat] --
10,739,642 UART: [cold-reset] ++
10,741,498 UART: [fht] FHT @ 0x50003400
10,752,591 UART: [idev] ++
10,753,190 UART: [idev] CDI.KEYID = 6
10,754,081 UART: [idev] SUBJECT.KEYID = 7
10,755,357 UART: [idev] UDS.KEYID = 0
10,758,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,902,169 UART: [idev] Erasing UDS.KEYID = 0
13,229,486 UART: [idev] Sha1 KeyId Algorithm
13,252,489 UART: [idev] --
13,256,483 UART: [ldev] ++
13,257,062 UART: [ldev] CDI.KEYID = 6
13,257,979 UART: [ldev] SUBJECT.KEYID = 5
13,259,145 UART: [ldev] AUTHORITY.KEYID = 7
13,260,375 UART: [ldev] FE.KEYID = 1
13,269,511 UART: [ldev] Erasing FE.KEYID = 1
15,742,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,461,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,477,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,493,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,508,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,530,533 UART: [ldev] --
17,535,530 UART: [fwproc] Wait for Commands...
17,538,612 UART: [fwproc] Recv command 0x46574c44
17,540,751 UART: [fwproc] Recv'd Img size: 114448 bytes
20,980,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,050,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,119,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,437,212 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,696,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,738,000 >>> mbox cmd response: failed
12,738,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,267 >>> mbox cmd response: failed
12,739,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,799 >>> mbox cmd response: failed
Initializing fuses
2,046,805 writing to cptra_bootfsm_go
10,819,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,438,168 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,068 UART:
192,440 UART: Running Caliptra ROM ...
193,545 UART:
193,687 UART: [state] CFI Enabled
263,715 UART: [state] LifecycleState = Manufacturing
266,118 UART: [state] DebugLocked = No
268,170 UART: [state] WD Timer not started. Device not locked for debugging
272,795 UART: [kat] SHA2-256
462,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,450 UART: [kat] ++
473,933 UART: [kat] sha1
485,034 UART: [kat] SHA2-256
488,051 UART: [kat] SHA2-384
494,647 UART: [kat] SHA2-512-ACC
497,207 UART: [kat] ECC-384
2,945,935 UART: [kat] HMAC-384Kdf
2,969,620 UART: [kat] LMS
3,501,375 UART: [kat] --
3,506,134 UART: [cold-reset] ++
3,508,438 UART: [fht] FHT @ 0x50003400
3,519,204 UART: [idev] ++
3,519,881 UART: [idev] CDI.KEYID = 6
3,520,844 UART: [idev] SUBJECT.KEYID = 7
3,522,003 UART: [idev] UDS.KEYID = 0
3,524,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,829 UART: [idev] Erasing UDS.KEYID = 0
6,027,567 UART: [idev] Sha1 KeyId Algorithm
6,049,978 UART: [idev] --
6,053,417 UART: [ldev] ++
6,054,131 UART: [ldev] CDI.KEYID = 6
6,055,057 UART: [ldev] SUBJECT.KEYID = 5
6,056,170 UART: [ldev] AUTHORITY.KEYID = 7
6,057,403 UART: [ldev] FE.KEYID = 1
6,098,662 UART: [ldev] Erasing FE.KEYID = 1
8,602,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,441 UART: [ldev] --
10,413,142 UART: [fwproc] Wait for Commands...
10,414,966 UART: [fwproc] Recv command 0x46574c44
10,417,223 UART: [fwproc] Recv'd Img size: 114448 bytes
12,776,034 UART: ROM Fatal Error: 0x000B0025
12,779,713 >>> mbox cmd response: failed
12,780,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,780,544 >>> mbox cmd response: failed
12,780,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,781,104 >>> mbox cmd response: failed
Initializing fuses
2,048,096 writing to cptra_bootfsm_go
2,237,399 UART:
2,237,754 UART: Running Caliptra ROM ...
2,238,888 UART:
2,239,052 UART: [state] CFI Enabled
2,309,278 UART: [state] LifecycleState = Manufacturing
2,311,655 UART: [state] DebugLocked = No
2,314,396 UART: [state] WD Timer not started. Device not locked for debugging
2,319,300 UART: [kat] SHA2-256
2,509,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,982 UART: [kat] ++
2,520,480 UART: [kat] sha1
2,532,776 UART: [kat] SHA2-256
2,535,805 UART: [kat] SHA2-384
2,542,425 UART: [kat] SHA2-512-ACC
2,544,997 UART: [kat] ECC-384
4,990,534 UART: [kat] HMAC-384Kdf
5,014,537 UART: [kat] LMS
5,546,328 UART: [kat] --
5,550,326 UART: [cold-reset] ++
5,552,315 UART: [fht] FHT @ 0x50003400
5,562,925 UART: [idev] ++
5,563,604 UART: [idev] CDI.KEYID = 6
5,564,621 UART: [idev] SUBJECT.KEYID = 7
5,565,798 UART: [idev] UDS.KEYID = 0
5,568,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,389 UART: [idev] Erasing UDS.KEYID = 0
8,072,859 UART: [idev] Sha1 KeyId Algorithm
8,093,783 UART: [idev] --
8,098,594 UART: [ldev] ++
8,099,276 UART: [ldev] CDI.KEYID = 6
8,100,165 UART: [ldev] SUBJECT.KEYID = 5
8,101,376 UART: [ldev] AUTHORITY.KEYID = 7
8,102,608 UART: [ldev] FE.KEYID = 1
8,142,245 UART: [ldev] Erasing FE.KEYID = 1
10,646,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,415 UART: [ldev] --
12,456,711 UART: [fwproc] Wait for Commands...
12,459,384 UART: [fwproc] Recv command 0x46574c44
12,461,650 UART: [fwproc] Recv'd Img size: 114448 bytes
15,951,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,028,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,144,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,687,714 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,439,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,692,275 >>> mbox cmd response: failed
12,693,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,693,562 >>> mbox cmd response: failed
12,693,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,137 >>> mbox cmd response: failed
Initializing fuses
2,056,972 writing to cptra_bootfsm_go
5,488,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,833,966 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,679 UART:
193,038 UART: Running Caliptra ROM ...
194,233 UART:
603,741 UART: [state] CFI Enabled
619,248 UART: [state] LifecycleState = Manufacturing
621,625 UART: [state] DebugLocked = No
622,839 UART: [state] WD Timer not started. Device not locked for debugging
628,058 UART: [kat] SHA2-256
817,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,715 UART: [kat] ++
829,224 UART: [kat] sha1
840,845 UART: [kat] SHA2-256
843,856 UART: [kat] SHA2-384
850,748 UART: [kat] SHA2-512-ACC
853,361 UART: [kat] ECC-384
3,294,240 UART: [kat] HMAC-384Kdf
3,307,634 UART: [kat] LMS
3,839,471 UART: [kat] --
3,843,682 UART: [cold-reset] ++
3,845,988 UART: [fht] FHT @ 0x50003400
3,857,880 UART: [idev] ++
3,858,551 UART: [idev] CDI.KEYID = 6
3,859,493 UART: [idev] SUBJECT.KEYID = 7
3,860,701 UART: [idev] UDS.KEYID = 0
3,863,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,552 UART: [idev] Erasing UDS.KEYID = 0
6,337,278 UART: [idev] Sha1 KeyId Algorithm
6,360,506 UART: [idev] --
6,364,070 UART: [ldev] ++
6,364,752 UART: [ldev] CDI.KEYID = 6
6,365,633 UART: [ldev] SUBJECT.KEYID = 5
6,366,865 UART: [ldev] AUTHORITY.KEYID = 7
6,368,042 UART: [ldev] FE.KEYID = 1
6,377,835 UART: [ldev] Erasing FE.KEYID = 1
8,853,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,373 UART: [ldev] --
10,646,976 UART: [fwproc] Wait for Commands...
10,649,362 UART: [fwproc] Recv command 0x46574c44
10,651,677 UART: [fwproc] Recv'd Img size: 114448 bytes
13,012,101 UART: ROM Fatal Error: 0x000B0025
13,015,776 >>> mbox cmd response: failed
13,016,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,016,379 >>> mbox cmd response: failed
13,016,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,016,967 >>> mbox cmd response: failed
Initializing fuses
2,048,957 writing to cptra_bootfsm_go
2,238,221 UART:
2,238,585 UART: Running Caliptra ROM ...
2,239,635 UART:
7,438,034 UART: [state] CFI Enabled
7,451,726 UART: [state] LifecycleState = Manufacturing
7,454,129 UART: [state] DebugLocked = No
7,456,950 UART: [state] WD Timer not started. Device not locked for debugging
7,460,850 UART: [kat] SHA2-256
7,650,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,661,472 UART: [kat] ++
7,661,990 UART: [kat] sha1
7,673,149 UART: [kat] SHA2-256
7,676,173 UART: [kat] SHA2-384
7,682,865 UART: [kat] SHA2-512-ACC
7,685,490 UART: [kat] ECC-384
10,124,953 UART: [kat] HMAC-384Kdf
10,138,254 UART: [kat] LMS
10,670,076 UART: [kat] --
10,673,805 UART: [cold-reset] ++
10,675,748 UART: [fht] FHT @ 0x50003400
10,687,594 UART: [idev] ++
10,688,283 UART: [idev] CDI.KEYID = 6
10,689,252 UART: [idev] SUBJECT.KEYID = 7
10,690,467 UART: [idev] UDS.KEYID = 0
10,693,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,837,284 UART: [idev] Erasing UDS.KEYID = 0
13,170,428 UART: [idev] Sha1 KeyId Algorithm
13,193,115 UART: [idev] --
13,196,995 UART: [ldev] ++
13,197,673 UART: [ldev] CDI.KEYID = 6
13,198,634 UART: [ldev] SUBJECT.KEYID = 5
13,199,791 UART: [ldev] AUTHORITY.KEYID = 7
13,201,021 UART: [ldev] FE.KEYID = 1
13,209,129 UART: [ldev] Erasing FE.KEYID = 1
15,685,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,405,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,420,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,435,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,450,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,472,936 UART: [ldev] --
17,478,748 UART: [fwproc] Wait for Commands...
17,481,134 UART: [fwproc] Recv command 0x46574c44
17,483,449 UART: [fwproc] Recv'd Img size: 114448 bytes
20,973,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,053,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,169,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,712,749 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,757,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,918,156 >>> mbox cmd response: failed
12,918,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,085 >>> mbox cmd response: failed
12,919,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,676 >>> mbox cmd response: failed
Initializing fuses
2,054,153 writing to cptra_bootfsm_go
10,708,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,952,546 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Manufacturing
85,987 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
903,056 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,921 UART: [cold-reset] ++
1,477,283 UART: [fht] Storing FHT @ 0x50003400
1,479,934 UART: [idev] ++
1,480,102 UART: [idev] CDI.KEYID = 6
1,480,462 UART: [idev] SUBJECT.KEYID = 7
1,480,886 UART: [idev] UDS.KEYID = 0
1,481,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,578 UART: [idev] Erasing UDS.KEYID = 0
1,505,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,564 UART: [idev] --
1,514,615 UART: [ldev] ++
1,514,783 UART: [ldev] CDI.KEYID = 6
1,515,146 UART: [ldev] SUBJECT.KEYID = 5
1,515,572 UART: [ldev] AUTHORITY.KEYID = 7
1,516,035 UART: [ldev] FE.KEYID = 1
1,521,213 UART: [ldev] Erasing FE.KEYID = 1
1,546,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,550 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 114448 bytes
1,879,518 UART: ROM Fatal Error: 0x000B0025
1,880,675 >>> mbox cmd response: failed
1,880,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,681 >>> mbox cmd response: failed
1,880,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,551 UART: [kat] SHA2-256
882,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,597 UART: [kat] ++
886,749 UART: [kat] sha1
891,033 UART: [kat] SHA2-256
892,971 UART: [kat] SHA2-384
895,676 UART: [kat] SHA2-512-ACC
897,577 UART: [kat] ECC-384
903,508 UART: [kat] HMAC-384Kdf
907,990 UART: [kat] LMS
1,476,186 UART: [kat] --
1,477,123 UART: [cold-reset] ++
1,477,673 UART: [fht] Storing FHT @ 0x50003400
1,480,384 UART: [idev] ++
1,480,552 UART: [idev] CDI.KEYID = 6
1,480,912 UART: [idev] SUBJECT.KEYID = 7
1,481,336 UART: [idev] UDS.KEYID = 0
1,481,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,238 UART: [idev] Erasing UDS.KEYID = 0
1,506,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,804 UART: [idev] --
1,515,811 UART: [ldev] ++
1,515,979 UART: [ldev] CDI.KEYID = 6
1,516,342 UART: [ldev] SUBJECT.KEYID = 5
1,516,768 UART: [ldev] AUTHORITY.KEYID = 7
1,517,231 UART: [ldev] FE.KEYID = 1
1,522,703 UART: [ldev] Erasing FE.KEYID = 1
1,548,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,410 UART: [ldev] --
1,587,797 UART: [fwproc] Waiting for Commands...
1,588,570 UART: [fwproc] Received command 0x46574c44
1,589,361 UART: [fwproc] Received Image of size 114448 bytes
2,888,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,851 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,336 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,733,380 >>> mbox cmd response: failed
1,733,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,386 >>> mbox cmd response: failed
1,733,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,996 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Manufacturing
86,066 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,169 UART: [kat] SHA2-512-ACC
897,070 UART: [kat] ECC-384
902,693 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,884 UART: [fht] Storing FHT @ 0x50003400
1,479,761 UART: [idev] ++
1,479,929 UART: [idev] CDI.KEYID = 6
1,480,289 UART: [idev] SUBJECT.KEYID = 7
1,480,713 UART: [idev] UDS.KEYID = 0
1,481,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,743 UART: [idev] --
1,514,770 UART: [ldev] ++
1,514,938 UART: [ldev] CDI.KEYID = 6
1,515,301 UART: [ldev] SUBJECT.KEYID = 5
1,515,727 UART: [ldev] AUTHORITY.KEYID = 7
1,516,190 UART: [ldev] FE.KEYID = 1
1,521,328 UART: [ldev] Erasing FE.KEYID = 1
1,546,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,821 UART: [ldev] --
1,586,122 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 114448 bytes
1,878,913 UART: ROM Fatal Error: 0x000B0025
1,880,070 >>> mbox cmd response: failed
1,880,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,076 >>> mbox cmd response: failed
1,880,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,432 UART: [kat] SHA2-256
882,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,478 UART: [kat] ++
886,630 UART: [kat] sha1
890,846 UART: [kat] SHA2-256
892,784 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
903,139 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,388 UART: [fht] Storing FHT @ 0x50003400
1,480,009 UART: [idev] ++
1,480,177 UART: [idev] CDI.KEYID = 6
1,480,537 UART: [idev] SUBJECT.KEYID = 7
1,480,961 UART: [idev] UDS.KEYID = 0
1,481,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,663 UART: [idev] Erasing UDS.KEYID = 0
1,505,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,069 UART: [idev] --
1,515,120 UART: [ldev] ++
1,515,288 UART: [ldev] CDI.KEYID = 6
1,515,651 UART: [ldev] SUBJECT.KEYID = 5
1,516,077 UART: [ldev] AUTHORITY.KEYID = 7
1,516,540 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,548,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,881 UART: [ldev] --
1,587,166 UART: [fwproc] Waiting for Commands...
1,588,033 UART: [fwproc] Received command 0x46574c44
1,588,824 UART: [fwproc] Received Image of size 114448 bytes
2,887,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,772 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,039 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,732,481 >>> mbox cmd response: failed
1,732,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,487 >>> mbox cmd response: failed
1,732,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Manufacturing
86,021 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
902,029 UART: [kat] SHA2-256
903,969 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,574 UART: [kat] LMS
1,170,902 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,399 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,120 UART: [idev] Erasing UDS.KEYID = 0
1,201,159 UART: [idev] Sha1 KeyId Algorithm
1,209,557 UART: [idev] --
1,210,591 UART: [ldev] ++
1,210,759 UART: [ldev] CDI.KEYID = 6
1,211,122 UART: [ldev] SUBJECT.KEYID = 5
1,211,548 UART: [ldev] AUTHORITY.KEYID = 7
1,212,011 UART: [ldev] FE.KEYID = 1
1,217,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,757 UART: ROM Fatal Error: 0x000B0025
1,576,914 >>> mbox cmd response: failed
1,576,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,920 >>> mbox cmd response: failed
1,576,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
85,999 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
892,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,103 UART: [kat] ++
897,255 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,162 UART: [kat] SHA2-512-ACC
908,063 UART: [kat] ECC-384
917,318 UART: [kat] HMAC-384Kdf
921,768 UART: [kat] LMS
1,170,096 UART: [kat] --
1,170,957 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,174,192 UART: [idev] ++
1,174,360 UART: [idev] CDI.KEYID = 6
1,174,720 UART: [idev] SUBJECT.KEYID = 7
1,175,144 UART: [idev] UDS.KEYID = 0
1,175,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,637 UART: [ldev] ++
1,208,805 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,285 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,154 UART: [fwproc] Wait for Commands...
1,281,842 UART: [fwproc] Recv command 0x46574c44
1,282,570 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,461 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,431,389 >>> mbox cmd response: failed
1,431,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,395 >>> mbox cmd response: failed
1,431,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,822 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Manufacturing
85,672 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
893,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,216 UART: [kat] ++
897,368 UART: [kat] sha1
901,612 UART: [kat] SHA2-256
903,552 UART: [kat] SHA2-384
906,257 UART: [kat] SHA2-512-ACC
908,158 UART: [kat] ECC-384
918,015 UART: [kat] HMAC-384Kdf
922,671 UART: [kat] LMS
1,170,999 UART: [kat] --
1,171,830 UART: [cold-reset] ++
1,172,164 UART: [fht] FHT @ 0x50003400
1,174,731 UART: [idev] ++
1,174,899 UART: [idev] CDI.KEYID = 6
1,175,259 UART: [idev] SUBJECT.KEYID = 7
1,175,683 UART: [idev] UDS.KEYID = 0
1,176,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,800 UART: [ldev] ++
1,210,968 UART: [ldev] CDI.KEYID = 6
1,211,331 UART: [ldev] SUBJECT.KEYID = 5
1,211,757 UART: [ldev] AUTHORITY.KEYID = 7
1,212,220 UART: [ldev] FE.KEYID = 1
1,217,400 UART: [ldev] Erasing FE.KEYID = 1
1,243,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,204 UART: [ldev] --
1,282,627 UART: [fwproc] Wait for Commands...
1,283,387 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114448 bytes
1,576,000 UART: ROM Fatal Error: 0x000B0025
1,577,157 >>> mbox cmd response: failed
1,577,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,163 >>> mbox cmd response: failed
1,577,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,175 UART: [kat] SHA2-512-ACC
909,076 UART: [kat] ECC-384
918,555 UART: [kat] HMAC-384Kdf
923,187 UART: [kat] LMS
1,171,515 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,327 UART: [idev] Erasing UDS.KEYID = 0
1,201,216 UART: [idev] Sha1 KeyId Algorithm
1,209,614 UART: [idev] --
1,210,900 UART: [ldev] ++
1,211,068 UART: [ldev] CDI.KEYID = 6
1,211,431 UART: [ldev] SUBJECT.KEYID = 5
1,211,857 UART: [ldev] AUTHORITY.KEYID = 7
1,212,320 UART: [ldev] FE.KEYID = 1
1,217,576 UART: [ldev] Erasing FE.KEYID = 1
1,243,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,926 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,181 UART: [fwproc] Recv command 0x46574c44
1,284,909 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,184 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,431,902 >>> mbox cmd response: failed
1,431,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,908 >>> mbox cmd response: failed
1,431,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,807 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Manufacturing
85,935 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,957 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,417 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,215,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,763 UART: [fwproc] Recv command 0x46574c44
1,282,496 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,911 UART: ROM Fatal Error: 0x000B0025
1,575,068 >>> mbox cmd response: failed
1,575,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,074 >>> mbox cmd response: failed
1,575,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,378 UART: [kat] LMS
1,169,690 UART: [kat] --
1,170,643 UART: [cold-reset] ++
1,171,075 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,174,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,913 UART: [idev] Erasing UDS.KEYID = 0
1,199,551 UART: [idev] Sha1 KeyId Algorithm
1,208,335 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,292 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,503 UART: [fwproc] Recv command 0x46574c44
1,282,236 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,019 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,425,539 >>> mbox cmd response: failed
1,425,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,545 >>> mbox cmd response: failed
1,425,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,289 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Manufacturing
86,180 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,591 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,914 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,282,091 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,527 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,306 UART: ROM Fatal Error: 0x000B0025
1,576,463 >>> mbox cmd response: failed
1,576,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,469 >>> mbox cmd response: failed
1,576,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
905,245 UART: [kat] SHA2-512-ACC
907,146 UART: [kat] ECC-384
916,877 UART: [kat] HMAC-384Kdf
921,489 UART: [kat] LMS
1,169,801 UART: [kat] --
1,170,614 UART: [cold-reset] ++
1,171,112 UART: [fht] FHT @ 0x50003400
1,173,808 UART: [idev] ++
1,173,976 UART: [idev] CDI.KEYID = 6
1,174,337 UART: [idev] SUBJECT.KEYID = 7
1,174,762 UART: [idev] UDS.KEYID = 0
1,175,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,080 UART: [idev] Sha1 KeyId Algorithm
1,209,004 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,565 UART: [ldev] SUBJECT.KEYID = 5
1,210,992 UART: [ldev] AUTHORITY.KEYID = 7
1,211,455 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,281 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,416 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,682 >>> mbox cmd response: failed
1,427,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,688 >>> mbox cmd response: failed
1,427,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,918 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,208 UART:
192,564 UART: Running Caliptra ROM ...
193,734 UART:
193,887 UART: [state] CFI Enabled
263,241 UART: [state] LifecycleState = Manufacturing
265,197 UART: [state] DebugLocked = No
267,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,973 UART: [kat] SHA2-256
441,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,196 UART: [kat] ++
452,686 UART: [kat] sha1
464,049 UART: [kat] SHA2-256
466,740 UART: [kat] SHA2-384
473,307 UART: [kat] SHA2-512-ACC
475,677 UART: [kat] ECC-384
2,765,847 UART: [kat] HMAC-384Kdf
2,777,898 UART: [kat] LMS
3,968,247 UART: [kat] --
3,970,983 UART: [cold-reset] ++
3,972,978 UART: [fht] Storing FHT @ 0x50003400
3,985,059 UART: [idev] ++
3,985,622 UART: [idev] CDI.KEYID = 6
3,986,507 UART: [idev] SUBJECT.KEYID = 7
3,987,777 UART: [idev] UDS.KEYID = 0
3,990,683 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,463 UART: [idev] Erasing UDS.KEYID = 0
7,325,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,315 UART: [idev] --
7,351,062 UART: [ldev] ++
7,351,637 UART: [ldev] CDI.KEYID = 6
7,352,605 UART: [ldev] SUBJECT.KEYID = 5
7,353,999 UART: [ldev] AUTHORITY.KEYID = 7
7,355,229 UART: [ldev] FE.KEYID = 1
7,404,149 UART: [ldev] Erasing FE.KEYID = 1
10,735,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,767 UART: [ldev] --
13,098,032 UART: [fwproc] Waiting for Commands...
13,100,511 UART: [fwproc] Received command 0x46574c44
13,102,695 UART: [fwproc] Received Image of size 114124 bytes
16,078,650 UART: ROM Fatal Error: 0x000B0027
16,082,066 >>> mbox cmd response: failed
16,082,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,832 >>> mbox cmd response: failed
16,083,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,083,417 >>> mbox cmd response: failed
Initializing fuses
2,056,596 writing to cptra_bootfsm_go
2,245,953 UART:
2,246,306 UART: Running Caliptra ROM ...
2,247,450 UART:
2,247,623 UART: [state] CFI Enabled
2,306,616 UART: [state] LifecycleState = Manufacturing
2,308,513 UART: [state] DebugLocked = No
2,309,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,428 UART: [kat] SHA2-256
2,485,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,641 UART: [kat] ++
2,496,149 UART: [kat] sha1
2,508,013 UART: [kat] SHA2-256
2,510,712 UART: [kat] SHA2-384
2,515,898 UART: [kat] SHA2-512-ACC
2,518,248 UART: [kat] ECC-384
4,810,915 UART: [kat] HMAC-384Kdf
4,841,622 UART: [kat] LMS
6,031,928 UART: [kat] --
6,037,184 UART: [cold-reset] ++
6,039,774 UART: [fht] Storing FHT @ 0x50003400
6,051,804 UART: [idev] ++
6,052,426 UART: [idev] CDI.KEYID = 6
6,053,337 UART: [idev] SUBJECT.KEYID = 7
6,054,604 UART: [idev] UDS.KEYID = 0
6,057,126 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,200,788 UART: [idev] Erasing UDS.KEYID = 0
9,386,587 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,353 UART: [idev] --
9,412,884 UART: [ldev] ++
9,413,464 UART: [ldev] CDI.KEYID = 6
9,414,432 UART: [ldev] SUBJECT.KEYID = 5
9,415,696 UART: [ldev] AUTHORITY.KEYID = 7
9,416,938 UART: [ldev] FE.KEYID = 1
9,465,699 UART: [ldev] Erasing FE.KEYID = 1
12,796,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,018 UART: [ldev] --
15,159,902 UART: [fwproc] Waiting for Commands...
15,163,240 UART: [fwproc] Received command 0x46574c44
15,165,501 UART: [fwproc] Received Image of size 114124 bytes
19,254,506 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,333,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,402,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,720,102 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,787,492 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,867,108 >>> mbox cmd response: failed
15,867,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,868,062 >>> mbox cmd response: failed
15,868,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,868,629 >>> mbox cmd response: failed
Initializing fuses
2,047,359 writing to cptra_bootfsm_go
5,818,160 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,926,657 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,572 UART:
192,922 UART: Running Caliptra ROM ...
194,127 UART:
603,904 UART: [state] CFI Enabled
616,401 UART: [state] LifecycleState = Manufacturing
618,377 UART: [state] DebugLocked = No
621,300 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,913 UART: [kat] SHA2-256
795,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,172 UART: [kat] ++
806,657 UART: [kat] sha1
817,375 UART: [kat] SHA2-256
820,059 UART: [kat] SHA2-384
827,073 UART: [kat] SHA2-512-ACC
829,473 UART: [kat] ECC-384
3,111,517 UART: [kat] HMAC-384Kdf
3,124,675 UART: [kat] LMS
4,314,783 UART: [kat] --
4,316,745 UART: [cold-reset] ++
4,319,340 UART: [fht] Storing FHT @ 0x50003400
4,332,013 UART: [idev] ++
4,332,582 UART: [idev] CDI.KEYID = 6
4,333,530 UART: [idev] SUBJECT.KEYID = 7
4,334,799 UART: [idev] UDS.KEYID = 0
4,337,694 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,286 UART: [idev] Erasing UDS.KEYID = 0
7,613,615 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,044 UART: [idev] --
7,638,394 UART: [ldev] ++
7,638,963 UART: [ldev] CDI.KEYID = 6
7,639,908 UART: [ldev] SUBJECT.KEYID = 5
7,641,128 UART: [ldev] AUTHORITY.KEYID = 7
7,642,362 UART: [ldev] FE.KEYID = 1
7,653,377 UART: [ldev] Erasing FE.KEYID = 1
10,944,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,857 UART: [ldev] --
13,306,364 UART: [fwproc] Waiting for Commands...
13,309,007 UART: [fwproc] Received command 0x46574c44
13,311,198 UART: [fwproc] Received Image of size 114124 bytes
16,285,500 UART: ROM Fatal Error: 0x000B0027
16,288,897 >>> mbox cmd response: failed
16,289,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,289,698 >>> mbox cmd response: failed
16,289,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,290,261 >>> mbox cmd response: failed
Initializing fuses
2,051,217 writing to cptra_bootfsm_go
2,240,578 UART:
2,240,941 UART: Running Caliptra ROM ...
2,242,068 UART:
4,179,505 UART: [state] CFI Enabled
4,193,224 UART: [state] LifecycleState = Manufacturing
4,195,187 UART: [state] DebugLocked = No
4,197,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,201,780 UART: [kat] SHA2-256
4,371,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,043 UART: [kat] ++
4,382,511 UART: [kat] sha1
4,393,077 UART: [kat] SHA2-256
4,395,779 UART: [kat] SHA2-384
4,401,571 UART: [kat] SHA2-512-ACC
4,403,912 UART: [kat] ECC-384
6,689,083 UART: [kat] HMAC-384Kdf
6,701,476 UART: [kat] LMS
7,891,561 UART: [kat] --
7,895,958 UART: [cold-reset] ++
7,898,115 UART: [fht] Storing FHT @ 0x50003400
7,909,763 UART: [idev] ++
7,910,330 UART: [idev] CDI.KEYID = 6
7,911,295 UART: [idev] SUBJECT.KEYID = 7
7,912,513 UART: [idev] UDS.KEYID = 0
7,915,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,058,619 UART: [idev] Erasing UDS.KEYID = 0
11,199,964 UART: [idev] Using Sha1 for KeyId Algorithm
11,221,893 UART: [idev] --
11,226,431 UART: [ldev] ++
11,227,004 UART: [ldev] CDI.KEYID = 6
11,227,900 UART: [ldev] SUBJECT.KEYID = 5
11,229,158 UART: [ldev] AUTHORITY.KEYID = 7
11,230,398 UART: [ldev] FE.KEYID = 1
11,240,805 UART: [ldev] Erasing FE.KEYID = 1
14,529,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,822,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,836,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,851,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,866,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,885,099 UART: [ldev] --
16,889,359 UART: [fwproc] Waiting for Commands...
16,891,311 UART: [fwproc] Received command 0x46574c44
16,893,497 UART: [fwproc] Received Image of size 114124 bytes
20,980,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,059,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,127,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,444,863 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
4,125,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,073,055 >>> mbox cmd response: failed
16,073,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,042 >>> mbox cmd response: failed
16,074,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,631 >>> mbox cmd response: failed
Initializing fuses
2,051,983 writing to cptra_bootfsm_go
7,924,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,899,417 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,623 writing to cptra_bootfsm_go
193,727 UART:
194,080 UART: Running Caliptra ROM ...
195,262 UART:
195,415 UART: [state] CFI Enabled
263,196 UART: [state] LifecycleState = Manufacturing
265,069 UART: [state] DebugLocked = No
267,536 UART: [state] WD Timer not started. Device not locked for debugging
270,717 UART: [kat] SHA2-256
449,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,441 UART: [kat] ++
461,979 UART: [kat] sha1
473,348 UART: [kat] SHA2-256
476,405 UART: [kat] SHA2-384
482,279 UART: [kat] SHA2-512-ACC
485,207 UART: [kat] ECC-384
2,947,432 UART: [kat] HMAC-384Kdf
2,970,251 UART: [kat] LMS
3,499,702 UART: [kat] --
3,502,234 UART: [cold-reset] ++
3,503,360 UART: [fht] FHT @ 0x50003400
3,513,257 UART: [idev] ++
3,513,821 UART: [idev] CDI.KEYID = 6
3,514,704 UART: [idev] SUBJECT.KEYID = 7
3,515,915 UART: [idev] UDS.KEYID = 0
3,518,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,762 UART: [idev] Erasing UDS.KEYID = 0
6,027,948 UART: [idev] Sha1 KeyId Algorithm
6,051,198 UART: [idev] --
6,054,876 UART: [ldev] ++
6,055,454 UART: [ldev] CDI.KEYID = 6
6,056,340 UART: [ldev] SUBJECT.KEYID = 5
6,057,555 UART: [ldev] AUTHORITY.KEYID = 7
6,058,789 UART: [ldev] FE.KEYID = 1
6,103,184 UART: [ldev] Erasing FE.KEYID = 1
8,603,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,880 UART: [ldev] --
10,415,147 UART: [fwproc] Wait for Commands...
10,416,974 UART: [fwproc] Recv command 0x46574c44
10,419,068 UART: [fwproc] Recv'd Img size: 114448 bytes
12,750,884 UART: ROM Fatal Error: 0x000B0027
12,754,003 >>> mbox cmd response: failed
12,754,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,911 >>> mbox cmd response: failed
12,755,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,755,465 >>> mbox cmd response: failed
Initializing fuses
2,060,032 writing to cptra_bootfsm_go
2,249,335 UART:
2,249,791 UART: Running Caliptra ROM ...
2,250,862 UART:
2,251,017 UART: [state] CFI Enabled
2,312,627 UART: [state] LifecycleState = Manufacturing
2,314,503 UART: [state] DebugLocked = No
2,315,894 UART: [state] WD Timer not started. Device not locked for debugging
2,319,000 UART: [kat] SHA2-256
2,498,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,688 UART: [kat] ++
2,510,232 UART: [kat] sha1
2,520,482 UART: [kat] SHA2-256
2,523,494 UART: [kat] SHA2-384
2,530,780 UART: [kat] SHA2-512-ACC
2,533,716 UART: [kat] ECC-384
4,998,778 UART: [kat] HMAC-384Kdf
5,022,303 UART: [kat] LMS
5,551,734 UART: [kat] --
5,557,211 UART: [cold-reset] ++
5,558,982 UART: [fht] FHT @ 0x50003400
5,570,822 UART: [idev] ++
5,571,430 UART: [idev] CDI.KEYID = 6
5,572,322 UART: [idev] SUBJECT.KEYID = 7
5,573,539 UART: [idev] UDS.KEYID = 0
5,576,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,720,071 UART: [idev] Erasing UDS.KEYID = 0
8,075,010 UART: [idev] Sha1 KeyId Algorithm
8,098,455 UART: [idev] --
8,102,667 UART: [ldev] ++
8,103,239 UART: [ldev] CDI.KEYID = 6
8,104,148 UART: [ldev] SUBJECT.KEYID = 5
8,105,364 UART: [ldev] AUTHORITY.KEYID = 7
8,106,498 UART: [ldev] FE.KEYID = 1
8,151,801 UART: [ldev] Erasing FE.KEYID = 1
10,653,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,235 UART: [ldev] --
12,444,580 UART: [fwproc] Wait for Commands...
12,447,165 UART: [fwproc] Recv command 0x46574c44
12,449,301 UART: [fwproc] Recv'd Img size: 114448 bytes
15,878,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,954,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,023,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,341,291 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,362,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,530,475 >>> mbox cmd response: failed
12,531,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,599 >>> mbox cmd response: failed
12,531,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,186 >>> mbox cmd response: failed
Initializing fuses
2,048,776 writing to cptra_bootfsm_go
5,424,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,134,731 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,357 UART:
192,763 UART: Running Caliptra ROM ...
193,946 UART:
603,327 UART: [state] CFI Enabled
619,207 UART: [state] LifecycleState = Manufacturing
621,066 UART: [state] DebugLocked = No
622,348 UART: [state] WD Timer not started. Device not locked for debugging
626,432 UART: [kat] SHA2-256
805,564 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,135 UART: [kat] ++
817,671 UART: [kat] sha1
828,711 UART: [kat] SHA2-256
831,755 UART: [kat] SHA2-384
837,091 UART: [kat] SHA2-512-ACC
840,027 UART: [kat] ECC-384
3,280,710 UART: [kat] HMAC-384Kdf
3,292,134 UART: [kat] LMS
3,821,619 UART: [kat] --
3,827,959 UART: [cold-reset] ++
3,829,412 UART: [fht] FHT @ 0x50003400
3,840,718 UART: [idev] ++
3,841,279 UART: [idev] CDI.KEYID = 6
3,842,161 UART: [idev] SUBJECT.KEYID = 7
3,843,427 UART: [idev] UDS.KEYID = 0
3,846,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,236 UART: [idev] Erasing UDS.KEYID = 0
6,316,010 UART: [idev] Sha1 KeyId Algorithm
6,339,514 UART: [idev] --
6,342,052 UART: [ldev] ++
6,342,627 UART: [ldev] CDI.KEYID = 6
6,343,534 UART: [ldev] SUBJECT.KEYID = 5
6,344,696 UART: [ldev] AUTHORITY.KEYID = 7
6,345,982 UART: [ldev] FE.KEYID = 1
6,356,709 UART: [ldev] Erasing FE.KEYID = 1
8,830,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,492 UART: [ldev] --
10,620,198 UART: [fwproc] Wait for Commands...
10,622,730 UART: [fwproc] Recv command 0x46574c44
10,624,773 UART: [fwproc] Recv'd Img size: 114448 bytes
12,946,154 UART: ROM Fatal Error: 0x000B0027
12,949,281 >>> mbox cmd response: failed
12,949,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,950,042 >>> mbox cmd response: failed
12,950,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,950,644 >>> mbox cmd response: failed
Initializing fuses
2,049,319 writing to cptra_bootfsm_go
2,238,599 UART:
2,238,949 UART: Running Caliptra ROM ...
2,240,092 UART:
7,505,989 UART: [state] CFI Enabled
7,518,919 UART: [state] LifecycleState = Manufacturing
7,520,777 UART: [state] DebugLocked = No
7,523,515 UART: [state] WD Timer not started. Device not locked for debugging
7,528,013 UART: [kat] SHA2-256
7,707,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,718,714 UART: [kat] ++
7,719,258 UART: [kat] sha1
7,730,171 UART: [kat] SHA2-256
7,733,195 UART: [kat] SHA2-384
7,739,503 UART: [kat] SHA2-512-ACC
7,742,446 UART: [kat] ECC-384
10,182,617 UART: [kat] HMAC-384Kdf
10,196,465 UART: [kat] LMS
10,725,977 UART: [kat] --
10,731,639 UART: [cold-reset] ++
10,733,410 UART: [fht] FHT @ 0x50003400
10,744,226 UART: [idev] ++
10,744,784 UART: [idev] CDI.KEYID = 6
10,745,724 UART: [idev] SUBJECT.KEYID = 7
10,746,932 UART: [idev] UDS.KEYID = 0
10,749,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,893,413 UART: [idev] Erasing UDS.KEYID = 0
13,220,544 UART: [idev] Sha1 KeyId Algorithm
13,243,458 UART: [idev] --
13,248,670 UART: [ldev] ++
13,249,244 UART: [ldev] CDI.KEYID = 6
13,250,128 UART: [ldev] SUBJECT.KEYID = 5
13,251,340 UART: [ldev] AUTHORITY.KEYID = 7
13,252,573 UART: [ldev] FE.KEYID = 1
13,263,080 UART: [ldev] Erasing FE.KEYID = 1
15,738,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,456,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,472,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,488,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,503,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,523,833 UART: [ldev] --
17,528,011 UART: [fwproc] Wait for Commands...
17,530,540 UART: [fwproc] Recv command 0x46574c44
17,532,645 UART: [fwproc] Recv'd Img size: 114448 bytes
20,973,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,048,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,117,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,434,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,696,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,734,431 >>> mbox cmd response: failed
12,735,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,426 >>> mbox cmd response: failed
12,735,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,980 >>> mbox cmd response: failed
Initializing fuses
2,045,006 writing to cptra_bootfsm_go
10,823,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,416,599 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,241 UART:
192,667 UART: Running Caliptra ROM ...
193,776 UART:
193,921 UART: [state] CFI Enabled
263,619 UART: [state] LifecycleState = Manufacturing
266,044 UART: [state] DebugLocked = No
268,143 UART: [state] WD Timer not started. Device not locked for debugging
272,880 UART: [kat] SHA2-256
462,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,522 UART: [kat] ++
473,996 UART: [kat] sha1
486,068 UART: [kat] SHA2-256
489,123 UART: [kat] SHA2-384
495,651 UART: [kat] SHA2-512-ACC
498,263 UART: [kat] ECC-384
2,946,174 UART: [kat] HMAC-384Kdf
2,971,772 UART: [kat] LMS
3,503,546 UART: [kat] --
3,510,779 UART: [cold-reset] ++
3,511,745 UART: [fht] FHT @ 0x50003400
3,523,370 UART: [idev] ++
3,524,082 UART: [idev] CDI.KEYID = 6
3,525,033 UART: [idev] SUBJECT.KEYID = 7
3,526,251 UART: [idev] UDS.KEYID = 0
3,529,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,095 UART: [idev] Erasing UDS.KEYID = 0
6,052,520 UART: [idev] Sha1 KeyId Algorithm
6,076,034 UART: [idev] --
6,081,284 UART: [ldev] ++
6,082,010 UART: [ldev] CDI.KEYID = 6
6,082,904 UART: [ldev] SUBJECT.KEYID = 5
6,084,014 UART: [ldev] AUTHORITY.KEYID = 7
6,085,246 UART: [ldev] FE.KEYID = 1
6,121,255 UART: [ldev] Erasing FE.KEYID = 1
8,628,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,944 UART: [ldev] --
10,436,238 UART: [fwproc] Wait for Commands...
10,438,334 UART: [fwproc] Recv command 0x46574c44
10,440,593 UART: [fwproc] Recv'd Img size: 114448 bytes
12,792,771 UART: ROM Fatal Error: 0x000B0027
12,796,400 >>> mbox cmd response: failed
12,796,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,797,065 >>> mbox cmd response: failed
12,797,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,797,630 >>> mbox cmd response: failed
Initializing fuses
2,058,801 writing to cptra_bootfsm_go
2,248,076 UART:
2,248,422 UART: Running Caliptra ROM ...
2,249,468 UART:
2,249,617 UART: [state] CFI Enabled
2,312,500 UART: [state] LifecycleState = Manufacturing
2,314,832 UART: [state] DebugLocked = No
2,316,351 UART: [state] WD Timer not started. Device not locked for debugging
2,320,527 UART: [kat] SHA2-256
2,510,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,128 UART: [kat] ++
2,521,591 UART: [kat] sha1
2,534,101 UART: [kat] SHA2-256
2,537,121 UART: [kat] SHA2-384
2,543,274 UART: [kat] SHA2-512-ACC
2,545,818 UART: [kat] ECC-384
4,997,147 UART: [kat] HMAC-384Kdf
5,019,925 UART: [kat] LMS
5,551,657 UART: [kat] --
5,555,546 UART: [cold-reset] ++
5,557,963 UART: [fht] FHT @ 0x50003400
5,570,513 UART: [idev] ++
5,571,188 UART: [idev] CDI.KEYID = 6
5,572,155 UART: [idev] SUBJECT.KEYID = 7
5,573,373 UART: [idev] UDS.KEYID = 0
5,575,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,970 UART: [idev] Erasing UDS.KEYID = 0
8,075,057 UART: [idev] Sha1 KeyId Algorithm
8,095,972 UART: [idev] --
8,100,911 UART: [ldev] ++
8,101,603 UART: [ldev] CDI.KEYID = 6
8,102,511 UART: [ldev] SUBJECT.KEYID = 5
8,103,731 UART: [ldev] AUTHORITY.KEYID = 7
8,104,868 UART: [ldev] FE.KEYID = 1
8,148,832 UART: [ldev] Erasing FE.KEYID = 1
10,654,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,121 UART: [ldev] --
12,460,871 UART: [fwproc] Wait for Commands...
12,463,996 UART: [fwproc] Recv command 0x46574c44
12,466,308 UART: [fwproc] Recv'd Img size: 114448 bytes
15,946,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,026,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,142,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,685,433 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,437,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,690,264 >>> mbox cmd response: failed
12,690,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,203 >>> mbox cmd response: failed
12,691,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,759 >>> mbox cmd response: failed
Initializing fuses
2,052,679 writing to cptra_bootfsm_go
5,488,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,834,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,492 UART:
192,836 UART: Running Caliptra ROM ...
194,018 UART:
603,612 UART: [state] CFI Enabled
620,191 UART: [state] LifecycleState = Manufacturing
622,559 UART: [state] DebugLocked = No
623,772 UART: [state] WD Timer not started. Device not locked for debugging
627,528 UART: [kat] SHA2-256
817,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,027 UART: [kat] ++
828,618 UART: [kat] sha1
838,364 UART: [kat] SHA2-256
841,382 UART: [kat] SHA2-384
848,547 UART: [kat] SHA2-512-ACC
851,168 UART: [kat] ECC-384
3,292,753 UART: [kat] HMAC-384Kdf
3,305,621 UART: [kat] LMS
3,837,458 UART: [kat] --
3,840,788 UART: [cold-reset] ++
3,842,619 UART: [fht] FHT @ 0x50003400
3,852,736 UART: [idev] ++
3,853,408 UART: [idev] CDI.KEYID = 6
3,854,378 UART: [idev] SUBJECT.KEYID = 7
3,855,590 UART: [idev] UDS.KEYID = 0
3,858,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,515 UART: [idev] Erasing UDS.KEYID = 0
6,339,189 UART: [idev] Sha1 KeyId Algorithm
6,361,605 UART: [idev] --
6,366,596 UART: [ldev] ++
6,367,304 UART: [ldev] CDI.KEYID = 6
6,368,216 UART: [ldev] SUBJECT.KEYID = 5
6,369,374 UART: [ldev] AUTHORITY.KEYID = 7
6,370,606 UART: [ldev] FE.KEYID = 1
6,382,277 UART: [ldev] Erasing FE.KEYID = 1
8,859,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,198 UART: [ldev] --
10,652,493 UART: [fwproc] Wait for Commands...
10,655,129 UART: [fwproc] Recv command 0x46574c44
10,657,439 UART: [fwproc] Recv'd Img size: 114448 bytes
13,015,271 UART: ROM Fatal Error: 0x000B0027
13,018,943 >>> mbox cmd response: failed
13,019,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,019,735 >>> mbox cmd response: failed
13,020,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,020,259 >>> mbox cmd response: failed
Initializing fuses
2,054,967 writing to cptra_bootfsm_go
2,244,212 UART:
2,244,549 UART: Running Caliptra ROM ...
2,245,682 UART:
7,432,649 UART: [state] CFI Enabled
7,445,430 UART: [state] LifecycleState = Manufacturing
7,447,832 UART: [state] DebugLocked = No
7,450,249 UART: [state] WD Timer not started. Device not locked for debugging
7,454,123 UART: [kat] SHA2-256
7,644,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,654,827 UART: [kat] ++
7,655,287 UART: [kat] sha1
7,666,608 UART: [kat] SHA2-256
7,669,669 UART: [kat] SHA2-384
7,675,185 UART: [kat] SHA2-512-ACC
7,677,754 UART: [kat] ECC-384
10,119,808 UART: [kat] HMAC-384Kdf
10,131,983 UART: [kat] LMS
10,663,808 UART: [kat] --
10,667,520 UART: [cold-reset] ++
10,669,772 UART: [fht] FHT @ 0x50003400
10,681,064 UART: [idev] ++
10,681,746 UART: [idev] CDI.KEYID = 6
10,682,682 UART: [idev] SUBJECT.KEYID = 7
10,683,914 UART: [idev] UDS.KEYID = 0
10,686,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,830,638 UART: [idev] Erasing UDS.KEYID = 0
13,163,384 UART: [idev] Sha1 KeyId Algorithm
13,186,019 UART: [idev] --
13,191,612 UART: [ldev] ++
13,192,295 UART: [ldev] CDI.KEYID = 6
13,193,262 UART: [ldev] SUBJECT.KEYID = 5
13,194,425 UART: [ldev] AUTHORITY.KEYID = 7
13,195,598 UART: [ldev] FE.KEYID = 1
13,206,192 UART: [ldev] Erasing FE.KEYID = 1
15,687,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,408,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,423,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,438,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,454,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,474,873 UART: [ldev] --
17,479,647 UART: [fwproc] Wait for Commands...
17,481,361 UART: [fwproc] Recv command 0x46574c44
17,483,675 UART: [fwproc] Recv'd Img size: 114448 bytes
20,957,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,035,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,152,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,694,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,760,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,916,714 >>> mbox cmd response: failed
12,917,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,634 >>> mbox cmd response: failed
12,917,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,203 >>> mbox cmd response: failed
Initializing fuses
2,045,707 writing to cptra_bootfsm_go
10,711,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,962,744 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,502 UART: [state] LifecycleState = Manufacturing
85,157 UART: [state] DebugLocked = No
85,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,365 UART: [kat] SHA2-256
881,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,411 UART: [kat] ++
885,563 UART: [kat] sha1
889,755 UART: [kat] SHA2-256
891,693 UART: [kat] SHA2-384
894,470 UART: [kat] SHA2-512-ACC
896,371 UART: [kat] ECC-384
902,072 UART: [kat] HMAC-384Kdf
906,528 UART: [kat] LMS
1,474,724 UART: [kat] --
1,475,465 UART: [cold-reset] ++
1,475,807 UART: [fht] Storing FHT @ 0x50003400
1,478,596 UART: [idev] ++
1,478,764 UART: [idev] CDI.KEYID = 6
1,479,124 UART: [idev] SUBJECT.KEYID = 7
1,479,548 UART: [idev] UDS.KEYID = 0
1,479,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,466 UART: [idev] Erasing UDS.KEYID = 0
1,503,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,392 UART: [idev] --
1,513,355 UART: [ldev] ++
1,513,523 UART: [ldev] CDI.KEYID = 6
1,513,886 UART: [ldev] SUBJECT.KEYID = 5
1,514,312 UART: [ldev] AUTHORITY.KEYID = 7
1,514,775 UART: [ldev] FE.KEYID = 1
1,519,757 UART: [ldev] Erasing FE.KEYID = 1
1,545,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,928 UART: [ldev] --
1,584,281 UART: [fwproc] Waiting for Commands...
1,585,112 UART: [fwproc] Received command 0x46574c44
1,585,903 UART: [fwproc] Received Image of size 114448 bytes
1,877,660 UART: ROM Fatal Error: 0x000B0027
1,878,817 >>> mbox cmd response: failed
1,878,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,823 >>> mbox cmd response: failed
1,878,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,038 UART: [kat] LMS
1,475,234 UART: [kat] --
1,476,085 UART: [cold-reset] ++
1,476,413 UART: [fht] Storing FHT @ 0x50003400
1,478,982 UART: [idev] ++
1,479,150 UART: [idev] CDI.KEYID = 6
1,479,510 UART: [idev] SUBJECT.KEYID = 7
1,479,934 UART: [idev] UDS.KEYID = 0
1,480,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,504,756 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,276 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,521,093 UART: [ldev] Erasing FE.KEYID = 1
1,546,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,276 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,444 UART: [fwproc] Received command 0x46574c44
1,587,235 UART: [fwproc] Received Image of size 114448 bytes
2,885,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,330 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,733,412 >>> mbox cmd response: failed
1,733,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,418 >>> mbox cmd response: failed
1,733,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Manufacturing
85,644 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,024 UART: [kat] SHA2-256
881,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,070 UART: [kat] ++
886,222 UART: [kat] sha1
890,430 UART: [kat] SHA2-256
892,368 UART: [kat] SHA2-384
895,023 UART: [kat] SHA2-512-ACC
896,924 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,365 UART: [kat] LMS
1,475,561 UART: [kat] --
1,476,510 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,681 UART: [idev] ++
1,479,849 UART: [idev] CDI.KEYID = 6
1,480,209 UART: [idev] SUBJECT.KEYID = 7
1,480,633 UART: [idev] UDS.KEYID = 0
1,480,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,741 UART: [idev] --
1,514,710 UART: [ldev] ++
1,514,878 UART: [ldev] CDI.KEYID = 6
1,515,241 UART: [ldev] SUBJECT.KEYID = 5
1,515,667 UART: [ldev] AUTHORITY.KEYID = 7
1,516,130 UART: [ldev] FE.KEYID = 1
1,521,228 UART: [ldev] Erasing FE.KEYID = 1
1,546,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,085 UART: [ldev] --
1,585,552 UART: [fwproc] Waiting for Commands...
1,586,289 UART: [fwproc] Received command 0x46574c44
1,587,080 UART: [fwproc] Received Image of size 114448 bytes
1,878,695 UART: ROM Fatal Error: 0x000B0027
1,879,852 >>> mbox cmd response: failed
1,879,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,858 >>> mbox cmd response: failed
1,879,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,912 UART: [kat] SHA2-256
881,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,958 UART: [kat] ++
886,110 UART: [kat] sha1
890,224 UART: [kat] SHA2-256
892,162 UART: [kat] SHA2-384
895,023 UART: [kat] SHA2-512-ACC
896,924 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,208 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,522,216 UART: [ldev] Erasing FE.KEYID = 1
1,548,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,175 UART: [ldev] --
1,587,558 UART: [fwproc] Waiting for Commands...
1,588,385 UART: [fwproc] Received command 0x46574c44
1,589,176 UART: [fwproc] Received Image of size 114448 bytes
2,887,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,737 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,040 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,732,615 >>> mbox cmd response: failed
1,732,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,621 >>> mbox cmd response: failed
1,732,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Manufacturing
85,505 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
892,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,045 UART: [kat] ++
897,197 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
918,118 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,178 UART: [idev] ++
1,175,346 UART: [idev] CDI.KEYID = 6
1,175,706 UART: [idev] SUBJECT.KEYID = 7
1,176,130 UART: [idev] UDS.KEYID = 0
1,176,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,201,445 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,211,031 UART: [ldev] ++
1,211,199 UART: [ldev] CDI.KEYID = 6
1,211,562 UART: [ldev] SUBJECT.KEYID = 5
1,211,988 UART: [ldev] AUTHORITY.KEYID = 7
1,212,451 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,244,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,757 UART: [ldev] --
1,284,022 UART: [fwproc] Wait for Commands...
1,284,798 UART: [fwproc] Recv command 0x46574c44
1,285,526 UART: [fwproc] Recv'd Img size: 114448 bytes
1,577,627 UART: ROM Fatal Error: 0x000B0027
1,578,784 >>> mbox cmd response: failed
1,578,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,790 >>> mbox cmd response: failed
1,578,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
893,312 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,437 UART: [kat] ++
897,589 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
923,128 UART: [kat] LMS
1,171,456 UART: [kat] --
1,172,323 UART: [cold-reset] ++
1,172,753 UART: [fht] FHT @ 0x50003400
1,175,252 UART: [idev] ++
1,175,420 UART: [idev] CDI.KEYID = 6
1,175,780 UART: [idev] SUBJECT.KEYID = 7
1,176,204 UART: [idev] UDS.KEYID = 0
1,176,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,248 UART: [idev] Erasing UDS.KEYID = 0
1,201,103 UART: [idev] Sha1 KeyId Algorithm
1,209,487 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,980 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,216,993 UART: [ldev] Erasing FE.KEYID = 1
1,243,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,090 UART: [fwproc] Recv command 0x46574c44
1,283,818 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,377 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,432,943 >>> mbox cmd response: failed
1,432,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,949 >>> mbox cmd response: failed
1,432,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,912 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Manufacturing
85,572 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
893,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,232 UART: [kat] ++
897,384 UART: [kat] sha1
901,540 UART: [kat] SHA2-256
903,480 UART: [kat] SHA2-384
906,311 UART: [kat] SHA2-512-ACC
908,212 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,705 UART: [kat] LMS
1,171,033 UART: [kat] --
1,172,050 UART: [cold-reset] ++
1,172,516 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,987 UART: [idev] Erasing UDS.KEYID = 0
1,201,454 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,914 UART: [ldev] ++
1,211,082 UART: [ldev] CDI.KEYID = 6
1,211,445 UART: [ldev] SUBJECT.KEYID = 5
1,211,871 UART: [ldev] AUTHORITY.KEYID = 7
1,212,334 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,243,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,552 UART: [ldev] --
1,283,065 UART: [fwproc] Wait for Commands...
1,283,661 UART: [fwproc] Recv command 0x46574c44
1,284,389 UART: [fwproc] Recv'd Img size: 114448 bytes
1,577,132 UART: ROM Fatal Error: 0x000B0027
1,578,289 >>> mbox cmd response: failed
1,578,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,295 >>> mbox cmd response: failed
1,578,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,989 UART: [kat] HMAC-384Kdf
923,561 UART: [kat] LMS
1,171,889 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,172,938 UART: [fht] FHT @ 0x50003400
1,175,751 UART: [idev] ++
1,175,919 UART: [idev] CDI.KEYID = 6
1,176,279 UART: [idev] SUBJECT.KEYID = 7
1,176,703 UART: [idev] UDS.KEYID = 0
1,177,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,808 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,206 UART: [ldev] ++
1,211,374 UART: [ldev] CDI.KEYID = 6
1,211,737 UART: [ldev] SUBJECT.KEYID = 5
1,212,163 UART: [ldev] AUTHORITY.KEYID = 7
1,212,626 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,243,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,540 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,869 UART: [fwproc] Recv command 0x46574c44
1,284,597 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,530 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,431,710 >>> mbox cmd response: failed
1,431,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,716 >>> mbox cmd response: failed
1,431,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,567 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Manufacturing
85,835 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,174,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,209,174 UART: [ldev] ++
1,209,342 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,133 UART: [ldev] AUTHORITY.KEYID = 7
1,210,596 UART: [ldev] FE.KEYID = 1
1,216,022 UART: [ldev] Erasing FE.KEYID = 1
1,242,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,752 UART: [ldev] --
1,281,224 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,089 UART: ROM Fatal Error: 0x000B0027
1,575,246 >>> mbox cmd response: failed
1,575,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,252 >>> mbox cmd response: failed
1,575,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,788 UART: [ldev] ++
1,208,956 UART: [ldev] CDI.KEYID = 6
1,209,320 UART: [ldev] SUBJECT.KEYID = 5
1,209,747 UART: [ldev] AUTHORITY.KEYID = 7
1,210,210 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,238 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,305 UART: [fwproc] Recv command 0x46574c44
1,282,038 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,499 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,089 >>> mbox cmd response: failed
1,429,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,095 >>> mbox cmd response: failed
1,429,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,213 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Manufacturing
85,536 UART: [state] DebugLocked = No
86,080 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
890,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,642 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,583 UART: [ldev] ++
1,208,751 UART: [ldev] CDI.KEYID = 6
1,209,115 UART: [ldev] SUBJECT.KEYID = 5
1,209,542 UART: [ldev] AUTHORITY.KEYID = 7
1,210,005 UART: [ldev] FE.KEYID = 1
1,214,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,216 UART: [fwproc] Recv command 0x46574c44
1,282,949 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,198 UART: ROM Fatal Error: 0x000B0027
1,575,355 >>> mbox cmd response: failed
1,575,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,361 >>> mbox cmd response: failed
1,575,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,034 UART: [idev] ++
1,173,202 UART: [idev] CDI.KEYID = 6
1,173,563 UART: [idev] SUBJECT.KEYID = 7
1,173,988 UART: [idev] UDS.KEYID = 0
1,174,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,355 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,984 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,734 >>> mbox cmd response: failed
1,429,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,740 >>> mbox cmd response: failed
1,429,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,876 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,223 UART:
192,575 UART: Running Caliptra ROM ...
193,707 UART:
193,872 UART: [state] CFI Enabled
264,167 UART: [state] LifecycleState = Unprovisioned
266,130 UART: [state] DebugLocked = No
268,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,141 UART: [kat] SHA2-256
442,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,357 UART: [kat] ++
453,894 UART: [kat] sha1
465,099 UART: [kat] SHA2-256
467,777 UART: [kat] SHA2-384
473,585 UART: [kat] SHA2-512-ACC
475,920 UART: [kat] ECC-384
2,767,433 UART: [kat] HMAC-384Kdf
2,779,455 UART: [kat] LMS
3,969,789 UART: [kat] --
3,975,202 UART: [cold-reset] ++
3,977,537 UART: [fht] Storing FHT @ 0x50003400
3,989,570 UART: [idev] ++
3,990,194 UART: [idev] CDI.KEYID = 6
3,991,103 UART: [idev] SUBJECT.KEYID = 7
3,992,373 UART: [idev] UDS.KEYID = 0
3,994,911 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,654 UART: [idev] Erasing UDS.KEYID = 0
7,325,786 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,949 UART: [idev] --
7,354,346 UART: [ldev] ++
7,354,925 UART: [ldev] CDI.KEYID = 6
7,355,889 UART: [ldev] SUBJECT.KEYID = 5
7,357,108 UART: [ldev] AUTHORITY.KEYID = 7
7,358,345 UART: [ldev] FE.KEYID = 1
7,401,997 UART: [ldev] Erasing FE.KEYID = 1
10,737,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,578 UART: [ldev] --
13,116,982 UART: [fwproc] Waiting for Commands...
13,118,754 UART: [fwproc] Received command 0x46574c44
13,120,951 UART: [fwproc] Received Image of size 114124 bytes
15,824,317 UART: ROM Fatal Error: 0x000B002F
15,827,765 >>> mbox cmd response: failed
15,828,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,529 >>> mbox cmd response: failed
15,828,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,829,085 >>> mbox cmd response: failed
Initializing fuses
2,062,917 writing to cptra_bootfsm_go
2,252,213 UART:
2,252,568 UART: Running Caliptra ROM ...
2,253,813 UART:
2,253,981 UART: [state] CFI Enabled
2,313,873 UART: [state] LifecycleState = Unprovisioned
2,315,839 UART: [state] DebugLocked = No
2,317,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,515 UART: [kat] SHA2-256
2,492,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,726 UART: [kat] ++
2,503,270 UART: [kat] sha1
2,514,491 UART: [kat] SHA2-256
2,517,190 UART: [kat] SHA2-384
2,521,668 UART: [kat] SHA2-512-ACC
2,524,034 UART: [kat] ECC-384
4,816,482 UART: [kat] HMAC-384Kdf
4,828,983 UART: [kat] LMS
6,019,278 UART: [kat] --
6,023,138 UART: [cold-reset] ++
6,024,814 UART: [fht] Storing FHT @ 0x50003400
6,036,301 UART: [idev] ++
6,036,878 UART: [idev] CDI.KEYID = 6
6,037,859 UART: [idev] SUBJECT.KEYID = 7
6,039,081 UART: [idev] UDS.KEYID = 0
6,041,363 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,184,995 UART: [idev] Erasing UDS.KEYID = 0
9,374,778 UART: [idev] Using Sha1 for KeyId Algorithm
9,395,030 UART: [idev] --
9,399,458 UART: [ldev] ++
9,400,028 UART: [ldev] CDI.KEYID = 6
9,400,991 UART: [ldev] SUBJECT.KEYID = 5
9,402,271 UART: [ldev] AUTHORITY.KEYID = 7
9,403,371 UART: [ldev] FE.KEYID = 1
9,450,623 UART: [ldev] Erasing FE.KEYID = 1
12,784,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,076,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,091,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,106,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,120,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,139,294 UART: [ldev] --
15,144,787 UART: [fwproc] Waiting for Commands...
15,147,049 UART: [fwproc] Received command 0x46574c44
15,149,237 UART: [fwproc] Received Image of size 114124 bytes
19,191,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,265,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,333,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,651,128 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,808,380 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,568,877 >>> mbox cmd response: failed
15,569,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,569,797 >>> mbox cmd response: failed
15,570,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,410 >>> mbox cmd response: failed
Initializing fuses
2,054,939 writing to cptra_bootfsm_go
5,855,233 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,896,803 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,515 UART:
192,885 UART: Running Caliptra ROM ...
194,037 UART:
603,761 UART: [state] CFI Enabled
619,518 UART: [state] LifecycleState = Unprovisioned
621,447 UART: [state] DebugLocked = No
623,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,180 UART: [kat] SHA2-256
796,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,513 UART: [kat] ++
808,052 UART: [kat] sha1
818,305 UART: [kat] SHA2-256
820,983 UART: [kat] SHA2-384
826,746 UART: [kat] SHA2-512-ACC
829,080 UART: [kat] ECC-384
3,111,702 UART: [kat] HMAC-384Kdf
3,123,832 UART: [kat] LMS
4,313,921 UART: [kat] --
4,319,351 UART: [cold-reset] ++
4,320,965 UART: [fht] Storing FHT @ 0x50003400
4,333,700 UART: [idev] ++
4,334,302 UART: [idev] CDI.KEYID = 6
4,335,222 UART: [idev] SUBJECT.KEYID = 7
4,336,441 UART: [idev] UDS.KEYID = 0
4,339,003 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,432 UART: [idev] Erasing UDS.KEYID = 0
7,621,960 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,819 UART: [idev] --
7,648,879 UART: [ldev] ++
7,649,451 UART: [ldev] CDI.KEYID = 6
7,650,414 UART: [ldev] SUBJECT.KEYID = 5
7,651,626 UART: [ldev] AUTHORITY.KEYID = 7
7,652,853 UART: [ldev] FE.KEYID = 1
7,663,336 UART: [ldev] Erasing FE.KEYID = 1
10,953,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,892 UART: [ldev] --
13,316,345 UART: [fwproc] Waiting for Commands...
13,319,367 UART: [fwproc] Received command 0x46574c44
13,321,554 UART: [fwproc] Received Image of size 114124 bytes
16,027,042 UART: ROM Fatal Error: 0x000B002F
16,030,509 >>> mbox cmd response: failed
16,030,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,256 >>> mbox cmd response: failed
16,031,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,817 >>> mbox cmd response: failed
Initializing fuses
2,055,534 writing to cptra_bootfsm_go
2,244,857 UART:
2,245,217 UART: Running Caliptra ROM ...
2,246,323 UART:
4,444,384 UART: [state] CFI Enabled
4,459,176 UART: [state] LifecycleState = Unprovisioned
4,461,125 UART: [state] DebugLocked = No
4,463,230 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,467,384 UART: [kat] SHA2-256
4,637,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,647,658 UART: [kat] ++
4,648,144 UART: [kat] sha1
4,658,443 UART: [kat] SHA2-256
4,661,141 UART: [kat] SHA2-384
4,666,323 UART: [kat] SHA2-512-ACC
4,668,728 UART: [kat] ECC-384
6,953,890 UART: [kat] HMAC-384Kdf
6,965,148 UART: [kat] LMS
8,155,241 UART: [kat] --
8,160,556 UART: [cold-reset] ++
8,161,544 UART: [fht] Storing FHT @ 0x50003400
8,173,139 UART: [idev] ++
8,173,713 UART: [idev] CDI.KEYID = 6
8,174,733 UART: [idev] SUBJECT.KEYID = 7
8,175,894 UART: [idev] UDS.KEYID = 0
8,178,239 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,321,680 UART: [idev] Erasing UDS.KEYID = 0
11,463,553 UART: [idev] Using Sha1 for KeyId Algorithm
11,485,481 UART: [idev] --
11,489,536 UART: [ldev] ++
11,490,105 UART: [ldev] CDI.KEYID = 6
11,491,120 UART: [ldev] SUBJECT.KEYID = 5
11,492,306 UART: [ldev] AUTHORITY.KEYID = 7
11,493,545 UART: [ldev] FE.KEYID = 1
11,502,715 UART: [ldev] Erasing FE.KEYID = 1
14,791,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,084,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,099,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,114,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,128,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,146,618 UART: [ldev] --
17,150,806 UART: [fwproc] Waiting for Commands...
17,152,637 UART: [fwproc] Received command 0x46574c44
17,154,828 UART: [fwproc] Received Image of size 114124 bytes
21,214,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,291,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,360,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,677,026 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
4,132,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,769,257 >>> mbox cmd response: failed
15,769,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,225 >>> mbox cmd response: failed
15,770,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,734 >>> mbox cmd response: failed
Initializing fuses
2,072,182 writing to cptra_bootfsm_go
8,216,448 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,160,053 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,195 UART:
192,575 UART: Running Caliptra ROM ...
193,750 UART:
193,895 UART: [state] CFI Enabled
265,743 UART: [state] LifecycleState = Unprovisioned
267,660 UART: [state] DebugLocked = No
269,817 UART: [state] WD Timer not started. Device not locked for debugging
273,181 UART: [kat] SHA2-256
452,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,899 UART: [kat] ++
464,436 UART: [kat] sha1
474,561 UART: [kat] SHA2-256
477,617 UART: [kat] SHA2-384
483,053 UART: [kat] SHA2-512-ACC
485,998 UART: [kat] ECC-384
2,949,767 UART: [kat] HMAC-384Kdf
2,973,236 UART: [kat] LMS
3,502,704 UART: [kat] --
3,507,680 UART: [cold-reset] ++
3,508,967 UART: [fht] FHT @ 0x50003400
3,521,128 UART: [idev] ++
3,521,692 UART: [idev] CDI.KEYID = 6
3,522,617 UART: [idev] SUBJECT.KEYID = 7
3,523,776 UART: [idev] UDS.KEYID = 0
3,526,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,734 UART: [idev] Erasing UDS.KEYID = 0
6,026,360 UART: [idev] Sha1 KeyId Algorithm
6,048,290 UART: [idev] --
6,052,430 UART: [ldev] ++
6,053,010 UART: [ldev] CDI.KEYID = 6
6,053,903 UART: [ldev] SUBJECT.KEYID = 5
6,055,124 UART: [ldev] AUTHORITY.KEYID = 7
6,056,307 UART: [ldev] FE.KEYID = 1
6,101,569 UART: [ldev] Erasing FE.KEYID = 1
8,608,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,923 UART: [ldev] --
10,415,807 UART: [fwproc] Wait for Commands...
10,417,414 UART: [fwproc] Recv command 0x46574c44
10,419,507 UART: [fwproc] Recv'd Img size: 114448 bytes
12,465,278 UART: ROM Fatal Error: 0x000B002F
12,468,416 >>> mbox cmd response: failed
12,468,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,190 >>> mbox cmd response: failed
12,469,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,743 >>> mbox cmd response: failed
Initializing fuses
2,054,032 writing to cptra_bootfsm_go
2,243,310 UART:
2,243,691 UART: Running Caliptra ROM ...
2,244,737 UART:
2,244,887 UART: [state] CFI Enabled
2,302,607 UART: [state] LifecycleState = Unprovisioned
2,304,489 UART: [state] DebugLocked = No
2,307,359 UART: [state] WD Timer not started. Device not locked for debugging
2,311,379 UART: [kat] SHA2-256
2,490,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,070 UART: [kat] ++
2,502,529 UART: [kat] sha1
2,512,121 UART: [kat] SHA2-256
2,515,143 UART: [kat] SHA2-384
2,521,673 UART: [kat] SHA2-512-ACC
2,524,618 UART: [kat] ECC-384
4,987,062 UART: [kat] HMAC-384Kdf
5,010,151 UART: [kat] LMS
5,539,641 UART: [kat] --
5,544,339 UART: [cold-reset] ++
5,546,386 UART: [fht] FHT @ 0x50003400
5,557,527 UART: [idev] ++
5,558,095 UART: [idev] CDI.KEYID = 6
5,559,009 UART: [idev] SUBJECT.KEYID = 7
5,560,228 UART: [idev] UDS.KEYID = 0
5,562,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,706,431 UART: [idev] Erasing UDS.KEYID = 0
8,066,747 UART: [idev] Sha1 KeyId Algorithm
8,090,248 UART: [idev] --
8,095,332 UART: [ldev] ++
8,095,909 UART: [ldev] CDI.KEYID = 6
8,096,822 UART: [ldev] SUBJECT.KEYID = 5
8,097,983 UART: [ldev] AUTHORITY.KEYID = 7
8,099,223 UART: [ldev] FE.KEYID = 1
8,140,023 UART: [ldev] Erasing FE.KEYID = 1
10,641,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,362,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,378,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,394,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,410,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,429,476 UART: [ldev] --
12,434,580 UART: [fwproc] Wait for Commands...
12,436,298 UART: [fwproc] Recv command 0x46574c44
12,438,345 UART: [fwproc] Recv'd Img size: 114448 bytes
15,838,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,911,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,979,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,298,241 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,385,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,273,968 >>> mbox cmd response: failed
12,274,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,274,862 >>> mbox cmd response: failed
12,275,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,275,423 >>> mbox cmd response: failed
Initializing fuses
2,055,829 writing to cptra_bootfsm_go
5,420,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,133,133 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,633 UART:
193,047 UART: Running Caliptra ROM ...
194,222 UART:
603,849 UART: [state] CFI Enabled
618,303 UART: [state] LifecycleState = Unprovisioned
620,216 UART: [state] DebugLocked = No
622,350 UART: [state] WD Timer not started. Device not locked for debugging
625,325 UART: [kat] SHA2-256
804,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,008 UART: [kat] ++
816,469 UART: [kat] sha1
827,127 UART: [kat] SHA2-256
830,189 UART: [kat] SHA2-384
836,058 UART: [kat] SHA2-512-ACC
839,014 UART: [kat] ECC-384
3,279,359 UART: [kat] HMAC-384Kdf
3,291,054 UART: [kat] LMS
3,820,562 UART: [kat] --
3,825,305 UART: [cold-reset] ++
3,827,076 UART: [fht] FHT @ 0x50003400
3,837,945 UART: [idev] ++
3,838,548 UART: [idev] CDI.KEYID = 6
3,839,470 UART: [idev] SUBJECT.KEYID = 7
3,840,638 UART: [idev] UDS.KEYID = 0
3,843,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,320 UART: [idev] Erasing UDS.KEYID = 0
6,310,145 UART: [idev] Sha1 KeyId Algorithm
6,333,573 UART: [idev] --
6,338,332 UART: [ldev] ++
6,338,906 UART: [ldev] CDI.KEYID = 6
6,339,836 UART: [ldev] SUBJECT.KEYID = 5
6,340,998 UART: [ldev] AUTHORITY.KEYID = 7
6,342,231 UART: [ldev] FE.KEYID = 1
6,352,612 UART: [ldev] Erasing FE.KEYID = 1
8,828,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,600 UART: [ldev] --
10,620,140 UART: [fwproc] Wait for Commands...
10,623,380 UART: [fwproc] Recv command 0x46574c44
10,625,481 UART: [fwproc] Recv'd Img size: 114448 bytes
12,677,972 UART: ROM Fatal Error: 0x000B002F
12,681,049 >>> mbox cmd response: failed
12,681,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,719 >>> mbox cmd response: failed
12,681,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,389 >>> mbox cmd response: failed
Initializing fuses
2,052,651 writing to cptra_bootfsm_go
2,241,969 UART:
2,242,325 UART: Running Caliptra ROM ...
2,243,383 UART:
7,774,719 UART: [state] CFI Enabled
7,788,827 UART: [state] LifecycleState = Unprovisioned
7,790,656 UART: [state] DebugLocked = No
7,792,836 UART: [state] WD Timer not started. Device not locked for debugging
7,796,961 UART: [kat] SHA2-256
7,976,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,987,686 UART: [kat] ++
7,988,147 UART: [kat] sha1
8,000,601 UART: [kat] SHA2-256
8,003,635 UART: [kat] SHA2-384
8,009,037 UART: [kat] SHA2-512-ACC
8,011,993 UART: [kat] ECC-384
10,452,558 UART: [kat] HMAC-384Kdf
10,464,416 UART: [kat] LMS
10,993,928 UART: [kat] --
10,996,632 UART: [cold-reset] ++
10,999,105 UART: [fht] FHT @ 0x50003400
11,009,873 UART: [idev] ++
11,010,440 UART: [idev] CDI.KEYID = 6
11,011,324 UART: [idev] SUBJECT.KEYID = 7
11,012,539 UART: [idev] UDS.KEYID = 0
11,015,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,158,878 UART: [idev] Erasing UDS.KEYID = 0
13,484,158 UART: [idev] Sha1 KeyId Algorithm
13,507,911 UART: [idev] --
13,512,238 UART: [ldev] ++
13,512,811 UART: [ldev] CDI.KEYID = 6
13,513,719 UART: [ldev] SUBJECT.KEYID = 5
13,514,878 UART: [ldev] AUTHORITY.KEYID = 7
13,516,160 UART: [ldev] FE.KEYID = 1
13,528,105 UART: [ldev] Erasing FE.KEYID = 1
16,003,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,719,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,735,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,751,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,767,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,787,149 UART: [ldev] --
17,791,334 UART: [fwproc] Wait for Commands...
17,793,705 UART: [fwproc] Recv command 0x46574c44
17,795,773 UART: [fwproc] Recv'd Img size: 114448 bytes
21,204,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,271,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,340,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,658,484 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,697,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,451,900 >>> mbox cmd response: failed
12,452,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,851 >>> mbox cmd response: failed
12,453,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,638 >>> mbox cmd response: failed
Initializing fuses
2,059,928 writing to cptra_bootfsm_go
11,107,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,686,330 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,288 UART:
192,653 UART: Running Caliptra ROM ...
193,862 UART:
194,017 UART: [state] CFI Enabled
267,013 UART: [state] LifecycleState = Unprovisioned
269,467 UART: [state] DebugLocked = No
272,204 UART: [state] WD Timer not started. Device not locked for debugging
277,174 UART: [kat] SHA2-256
467,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,832 UART: [kat] ++
478,319 UART: [kat] sha1
489,359 UART: [kat] SHA2-256
492,419 UART: [kat] SHA2-384
498,236 UART: [kat] SHA2-512-ACC
500,803 UART: [kat] ECC-384
2,948,213 UART: [kat] HMAC-384Kdf
2,972,562 UART: [kat] LMS
3,504,339 UART: [kat] --
3,510,447 UART: [cold-reset] ++
3,512,327 UART: [fht] FHT @ 0x50003400
3,523,683 UART: [idev] ++
3,524,382 UART: [idev] CDI.KEYID = 6
3,525,399 UART: [idev] SUBJECT.KEYID = 7
3,526,507 UART: [idev] UDS.KEYID = 0
3,529,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,371 UART: [idev] Erasing UDS.KEYID = 0
6,030,674 UART: [idev] Sha1 KeyId Algorithm
6,052,521 UART: [idev] --
6,057,901 UART: [ldev] ++
6,058,598 UART: [ldev] CDI.KEYID = 6
6,059,528 UART: [ldev] SUBJECT.KEYID = 5
6,060,692 UART: [ldev] AUTHORITY.KEYID = 7
6,061,871 UART: [ldev] FE.KEYID = 1
6,100,327 UART: [ldev] Erasing FE.KEYID = 1
8,607,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,834 UART: [ldev] --
10,414,962 UART: [fwproc] Wait for Commands...
10,416,689 UART: [fwproc] Recv command 0x46574c44
10,418,951 UART: [fwproc] Recv'd Img size: 114448 bytes
12,493,639 UART: ROM Fatal Error: 0x000B002F
12,497,304 >>> mbox cmd response: failed
12,497,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,173 >>> mbox cmd response: failed
12,498,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,845 >>> mbox cmd response: failed
Initializing fuses
2,059,610 writing to cptra_bootfsm_go
2,249,030 UART:
2,249,394 UART: Running Caliptra ROM ...
2,250,472 UART:
2,250,635 UART: [state] CFI Enabled
2,315,320 UART: [state] LifecycleState = Unprovisioned
2,317,726 UART: [state] DebugLocked = No
2,319,827 UART: [state] WD Timer not started. Device not locked for debugging
2,325,042 UART: [kat] SHA2-256
2,514,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,658 UART: [kat] ++
2,526,152 UART: [kat] sha1
2,537,909 UART: [kat] SHA2-256
2,540,881 UART: [kat] SHA2-384
2,548,277 UART: [kat] SHA2-512-ACC
2,550,847 UART: [kat] ECC-384
5,001,182 UART: [kat] HMAC-384Kdf
5,021,215 UART: [kat] LMS
5,553,005 UART: [kat] --
5,558,464 UART: [cold-reset] ++
5,559,424 UART: [fht] FHT @ 0x50003400
5,569,647 UART: [idev] ++
5,570,336 UART: [idev] CDI.KEYID = 6
5,571,302 UART: [idev] SUBJECT.KEYID = 7
5,572,520 UART: [idev] UDS.KEYID = 0
5,574,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,830 UART: [idev] Erasing UDS.KEYID = 0
8,078,989 UART: [idev] Sha1 KeyId Algorithm
8,099,752 UART: [idev] --
8,104,903 UART: [ldev] ++
8,105,628 UART: [ldev] CDI.KEYID = 6
8,106,547 UART: [ldev] SUBJECT.KEYID = 5
8,107,710 UART: [ldev] AUTHORITY.KEYID = 7
8,108,905 UART: [ldev] FE.KEYID = 1
8,149,363 UART: [ldev] Erasing FE.KEYID = 1
10,657,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,156 UART: [ldev] --
12,461,530 UART: [fwproc] Wait for Commands...
12,463,949 UART: [fwproc] Recv command 0x46574c44
12,466,211 UART: [fwproc] Recv'd Img size: 114448 bytes
15,916,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,654,153 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,443,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,297,709 >>> mbox cmd response: failed
12,298,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,693 >>> mbox cmd response: failed
12,298,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,259 >>> mbox cmd response: failed
Initializing fuses
2,054,817 writing to cptra_bootfsm_go
5,474,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,769,652 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,561 UART:
192,909 UART: Running Caliptra ROM ...
194,104 UART:
603,656 UART: [state] CFI Enabled
616,443 UART: [state] LifecycleState = Unprovisioned
618,810 UART: [state] DebugLocked = No
620,270 UART: [state] WD Timer not started. Device not locked for debugging
624,727 UART: [kat] SHA2-256
814,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,398 UART: [kat] ++
825,916 UART: [kat] sha1
838,252 UART: [kat] SHA2-256
841,262 UART: [kat] SHA2-384
846,164 UART: [kat] SHA2-512-ACC
848,779 UART: [kat] ECC-384
3,292,079 UART: [kat] HMAC-384Kdf
3,305,540 UART: [kat] LMS
3,837,346 UART: [kat] --
3,840,381 UART: [cold-reset] ++
3,841,666 UART: [fht] FHT @ 0x50003400
3,853,945 UART: [idev] ++
3,854,624 UART: [idev] CDI.KEYID = 6
3,855,567 UART: [idev] SUBJECT.KEYID = 7
3,856,778 UART: [idev] UDS.KEYID = 0
3,859,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,656 UART: [idev] Erasing UDS.KEYID = 0
6,332,933 UART: [idev] Sha1 KeyId Algorithm
6,355,596 UART: [idev] --
6,358,999 UART: [ldev] ++
6,359,686 UART: [ldev] CDI.KEYID = 6
6,360,573 UART: [ldev] SUBJECT.KEYID = 5
6,361,805 UART: [ldev] AUTHORITY.KEYID = 7
6,363,043 UART: [ldev] FE.KEYID = 1
6,373,261 UART: [ldev] Erasing FE.KEYID = 1
8,853,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,491 UART: [ldev] --
10,643,335 UART: [fwproc] Wait for Commands...
10,646,200 UART: [fwproc] Recv command 0x46574c44
10,648,471 UART: [fwproc] Recv'd Img size: 114448 bytes
12,733,949 UART: ROM Fatal Error: 0x000B002F
12,737,613 >>> mbox cmd response: failed
12,738,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,302 >>> mbox cmd response: failed
12,738,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,884 >>> mbox cmd response: failed
Initializing fuses
2,062,885 writing to cptra_bootfsm_go
2,252,192 UART:
2,252,544 UART: Running Caliptra ROM ...
2,253,620 UART:
7,731,226 UART: [state] CFI Enabled
7,745,432 UART: [state] LifecycleState = Unprovisioned
7,747,841 UART: [state] DebugLocked = No
7,749,181 UART: [state] WD Timer not started. Device not locked for debugging
7,754,552 UART: [kat] SHA2-256
7,944,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,955,245 UART: [kat] ++
7,955,861 UART: [kat] sha1
7,967,461 UART: [kat] SHA2-256
7,970,472 UART: [kat] SHA2-384
7,976,637 UART: [kat] SHA2-512-ACC
7,979,206 UART: [kat] ECC-384
10,418,238 UART: [kat] HMAC-384Kdf
10,431,487 UART: [kat] LMS
10,963,320 UART: [kat] --
10,969,474 UART: [cold-reset] ++
10,971,684 UART: [fht] FHT @ 0x50003400
10,982,718 UART: [idev] ++
10,983,391 UART: [idev] CDI.KEYID = 6
10,984,403 UART: [idev] SUBJECT.KEYID = 7
10,985,557 UART: [idev] UDS.KEYID = 0
10,987,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,131,722 UART: [idev] Erasing UDS.KEYID = 0
13,460,863 UART: [idev] Sha1 KeyId Algorithm
13,483,599 UART: [idev] --
13,489,186 UART: [ldev] ++
13,489,868 UART: [ldev] CDI.KEYID = 6
13,490,757 UART: [ldev] SUBJECT.KEYID = 5
13,491,965 UART: [ldev] AUTHORITY.KEYID = 7
13,493,194 UART: [ldev] FE.KEYID = 1
13,506,081 UART: [ldev] Erasing FE.KEYID = 1
15,983,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,704,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,719,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,734,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,749,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,770,957 UART: [ldev] --
17,776,494 UART: [fwproc] Wait for Commands...
17,778,050 UART: [fwproc] Recv command 0x46574c44
17,780,385 UART: [fwproc] Recv'd Img size: 114448 bytes
21,222,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,303,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,419,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,963,090 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,156 writing to cptra_bootfsm_go
3,755,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,519,797 >>> mbox cmd response: failed
12,520,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,704 >>> mbox cmd response: failed
12,520,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,264 >>> mbox cmd response: failed
Initializing fuses
2,054,797 writing to cptra_bootfsm_go
11,102,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,296,815 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,719 UART: [cold-reset] ++
1,477,131 UART: [fht] Storing FHT @ 0x50003400
1,479,846 UART: [idev] ++
1,480,014 UART: [idev] CDI.KEYID = 6
1,480,374 UART: [idev] SUBJECT.KEYID = 7
1,480,798 UART: [idev] UDS.KEYID = 0
1,481,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,858 UART: [idev] Erasing UDS.KEYID = 0
1,505,094 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,692 UART: [idev] --
1,514,741 UART: [ldev] ++
1,514,909 UART: [ldev] CDI.KEYID = 6
1,515,272 UART: [ldev] SUBJECT.KEYID = 5
1,515,698 UART: [ldev] AUTHORITY.KEYID = 7
1,516,161 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,546,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,427 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 114448 bytes
1,634,355 UART: ROM Fatal Error: 0x000B002F
1,635,514 >>> mbox cmd response: failed
1,635,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,520 >>> mbox cmd response: failed
1,635,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,898 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,835 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,505,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,792 UART: [idev] --
1,514,975 UART: [ldev] ++
1,515,143 UART: [ldev] CDI.KEYID = 6
1,515,506 UART: [ldev] SUBJECT.KEYID = 5
1,515,932 UART: [ldev] AUTHORITY.KEYID = 7
1,516,395 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,818 UART: [ldev] --
1,586,259 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 114448 bytes
2,887,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,394 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,179 >>> mbox cmd response: failed
1,489,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,185 >>> mbox cmd response: failed
1,489,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,828 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,428 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,797 UART: [idev] ++
1,479,965 UART: [idev] CDI.KEYID = 6
1,480,325 UART: [idev] SUBJECT.KEYID = 7
1,480,749 UART: [idev] UDS.KEYID = 0
1,481,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,291 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,703 UART: [idev] --
1,514,804 UART: [ldev] ++
1,514,972 UART: [ldev] CDI.KEYID = 6
1,515,335 UART: [ldev] SUBJECT.KEYID = 5
1,515,761 UART: [ldev] AUTHORITY.KEYID = 7
1,516,224 UART: [ldev] FE.KEYID = 1
1,521,680 UART: [ldev] Erasing FE.KEYID = 1
1,547,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,802 UART: [fwproc] Waiting for Commands...
1,587,645 UART: [fwproc] Received command 0x46574c44
1,588,436 UART: [fwproc] Received Image of size 114448 bytes
1,635,410 UART: ROM Fatal Error: 0x000B002F
1,636,569 >>> mbox cmd response: failed
1,636,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,575 >>> mbox cmd response: failed
1,636,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,200 UART: [kat] SHA2-256
882,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,246 UART: [kat] ++
886,398 UART: [kat] sha1
890,546 UART: [kat] SHA2-256
892,484 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,727 UART: [kat] LMS
1,475,923 UART: [kat] --
1,476,882 UART: [cold-reset] ++
1,477,280 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,861 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,329 UART: [idev] --
1,515,436 UART: [ldev] ++
1,515,604 UART: [ldev] CDI.KEYID = 6
1,515,967 UART: [ldev] SUBJECT.KEYID = 5
1,516,393 UART: [ldev] AUTHORITY.KEYID = 7
1,516,856 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,559 UART: [ldev] --
1,586,978 UART: [fwproc] Waiting for Commands...
1,587,727 UART: [fwproc] Received command 0x46574c44
1,588,518 UART: [fwproc] Received Image of size 114448 bytes
2,887,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,052 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,989 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,866 >>> mbox cmd response: failed
1,489,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,872 >>> mbox cmd response: failed
1,489,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,719 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
893,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,765 UART: [kat] ++
897,917 UART: [kat] sha1
902,251 UART: [kat] SHA2-256
904,191 UART: [kat] SHA2-384
907,064 UART: [kat] SHA2-512-ACC
908,965 UART: [kat] ECC-384
918,554 UART: [kat] HMAC-384Kdf
923,228 UART: [kat] LMS
1,171,556 UART: [kat] --
1,172,661 UART: [cold-reset] ++
1,173,061 UART: [fht] FHT @ 0x50003400
1,175,740 UART: [idev] ++
1,175,908 UART: [idev] CDI.KEYID = 6
1,176,268 UART: [idev] SUBJECT.KEYID = 7
1,176,692 UART: [idev] UDS.KEYID = 0
1,177,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,734 UART: [idev] Erasing UDS.KEYID = 0
1,201,549 UART: [idev] Sha1 KeyId Algorithm
1,210,039 UART: [idev] --
1,211,059 UART: [ldev] ++
1,211,227 UART: [ldev] CDI.KEYID = 6
1,211,590 UART: [ldev] SUBJECT.KEYID = 5
1,212,016 UART: [ldev] AUTHORITY.KEYID = 7
1,212,479 UART: [ldev] FE.KEYID = 1
1,217,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,487 UART: [ldev] --
1,282,932 UART: [fwproc] Wait for Commands...
1,283,538 UART: [fwproc] Recv command 0x46574c44
1,284,266 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,224 UART: ROM Fatal Error: 0x000B002F
1,333,383 >>> mbox cmd response: failed
1,333,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,389 >>> mbox cmd response: failed
1,333,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
893,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,691 UART: [kat] ++
897,843 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,754 UART: [kat] SHA2-512-ACC
908,655 UART: [kat] ECC-384
918,554 UART: [kat] HMAC-384Kdf
923,066 UART: [kat] LMS
1,171,394 UART: [kat] --
1,172,171 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,936 UART: [idev] Erasing UDS.KEYID = 0
1,201,233 UART: [idev] Sha1 KeyId Algorithm
1,209,635 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,286 UART: [ldev] SUBJECT.KEYID = 5
1,211,712 UART: [ldev] AUTHORITY.KEYID = 7
1,212,175 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,943 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,322 >>> mbox cmd response: failed
1,186,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,328 >>> mbox cmd response: failed
1,186,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,622 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,205 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,442 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,227 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,211,008 UART: [ldev] ++
1,211,176 UART: [ldev] CDI.KEYID = 6
1,211,539 UART: [ldev] SUBJECT.KEYID = 5
1,211,965 UART: [ldev] AUTHORITY.KEYID = 7
1,212,428 UART: [ldev] FE.KEYID = 1
1,217,760 UART: [ldev] Erasing FE.KEYID = 1
1,243,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,228 UART: [ldev] --
1,282,669 UART: [fwproc] Wait for Commands...
1,283,279 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,011 UART: ROM Fatal Error: 0x000B002F
1,333,170 >>> mbox cmd response: failed
1,333,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,176 >>> mbox cmd response: failed
1,333,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
923,031 UART: [kat] LMS
1,171,359 UART: [kat] --
1,172,212 UART: [cold-reset] ++
1,172,784 UART: [fht] FHT @ 0x50003400
1,175,501 UART: [idev] ++
1,175,669 UART: [idev] CDI.KEYID = 6
1,176,029 UART: [idev] SUBJECT.KEYID = 7
1,176,453 UART: [idev] UDS.KEYID = 0
1,176,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,387 UART: [idev] Erasing UDS.KEYID = 0
1,201,614 UART: [idev] Sha1 KeyId Algorithm
1,210,258 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,217,928 UART: [ldev] Erasing FE.KEYID = 1
1,244,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,828 UART: [ldev] --
1,284,291 UART: [fwproc] Wait for Commands...
1,284,975 UART: [fwproc] Recv command 0x46574c44
1,285,703 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,152 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,075 >>> mbox cmd response: failed
1,187,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,081 >>> mbox cmd response: failed
1,187,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,505 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,347 UART: [kat] SHA2-256
901,287 UART: [kat] SHA2-384
903,920 UART: [kat] SHA2-512-ACC
905,821 UART: [kat] ECC-384
915,300 UART: [kat] HMAC-384Kdf
919,966 UART: [kat] LMS
1,168,278 UART: [kat] --
1,169,001 UART: [cold-reset] ++
1,169,525 UART: [fht] FHT @ 0x50003400
1,172,109 UART: [idev] ++
1,172,277 UART: [idev] CDI.KEYID = 6
1,172,638 UART: [idev] SUBJECT.KEYID = 7
1,173,063 UART: [idev] UDS.KEYID = 0
1,173,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,214,790 UART: [ldev] Erasing FE.KEYID = 1
1,241,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,356 UART: [fwproc] Wait for Commands...
1,281,057 UART: [fwproc] Recv command 0x46574c44
1,281,790 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,203 UART: ROM Fatal Error: 0x000B002F
1,330,362 >>> mbox cmd response: failed
1,330,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,368 >>> mbox cmd response: failed
1,330,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,074 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,631 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,861 >>> mbox cmd response: failed
1,182,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,867 >>> mbox cmd response: failed
1,182,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,283 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,946 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,679 UART: [ldev] ++
1,209,847 UART: [ldev] CDI.KEYID = 6
1,210,211 UART: [ldev] SUBJECT.KEYID = 5
1,210,638 UART: [ldev] AUTHORITY.KEYID = 7
1,211,101 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,855 UART: [fwproc] Wait for Commands...
1,282,468 UART: [fwproc] Recv command 0x46574c44
1,283,201 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,204 UART: ROM Fatal Error: 0x000B002F
1,331,363 >>> mbox cmd response: failed
1,331,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,369 >>> mbox cmd response: failed
1,331,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,873 UART: [kat] SHA2-512-ACC
906,774 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,174,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,487 UART: [ldev] Erasing FE.KEYID = 1
1,242,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,844 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,724 >>> mbox cmd response: failed
1,183,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,730 >>> mbox cmd response: failed
1,183,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,460 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,167 UART:
192,524 UART: Running Caliptra ROM ...
193,616 UART:
193,759 UART: [state] CFI Enabled
263,259 UART: [state] LifecycleState = Unprovisioned
265,242 UART: [state] DebugLocked = No
266,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,420 UART: [kat] SHA2-256
441,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,617 UART: [kat] ++
452,210 UART: [kat] sha1
463,635 UART: [kat] SHA2-256
466,341 UART: [kat] SHA2-384
472,059 UART: [kat] SHA2-512-ACC
474,405 UART: [kat] ECC-384
2,765,328 UART: [kat] HMAC-384Kdf
2,777,831 UART: [kat] LMS
3,968,144 UART: [kat] --
3,971,393 UART: [cold-reset] ++
3,973,006 UART: [fht] Storing FHT @ 0x50003400
3,985,256 UART: [idev] ++
3,985,911 UART: [idev] CDI.KEYID = 6
3,986,801 UART: [idev] SUBJECT.KEYID = 7
3,988,088 UART: [idev] UDS.KEYID = 0
3,991,018 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,633 UART: [idev] Erasing UDS.KEYID = 0
7,326,646 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,990 UART: [idev] --
7,352,203 UART: [ldev] ++
7,352,843 UART: [ldev] CDI.KEYID = 6
7,353,733 UART: [ldev] SUBJECT.KEYID = 5
7,355,008 UART: [ldev] AUTHORITY.KEYID = 7
7,356,172 UART: [ldev] FE.KEYID = 1
7,401,552 UART: [ldev] Erasing FE.KEYID = 1
10,734,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,769 UART: [ldev] --
13,118,643 UART: [fwproc] Waiting for Commands...
13,120,320 UART: [fwproc] Received command 0x46574c44
13,122,505 UART: [fwproc] Received Image of size 114124 bytes
13,177,418 UART: ROM Fatal Error: 0x000B0001
13,180,946 >>> mbox cmd response: failed
13,181,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,181,658 >>> mbox cmd response: failed
13,181,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,213 >>> mbox cmd response: failed
Initializing fuses
2,050,725 writing to cptra_bootfsm_go
2,240,086 UART:
2,240,474 UART: Running Caliptra ROM ...
2,241,612 UART:
2,241,984 UART: [state] CFI Enabled
2,312,487 UART: [state] LifecycleState = Unprovisioned
2,314,444 UART: [state] DebugLocked = No
2,316,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,592 UART: [kat] SHA2-256
2,491,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,821 UART: [kat] ++
2,502,308 UART: [kat] sha1
2,512,521 UART: [kat] SHA2-256
2,515,223 UART: [kat] SHA2-384
2,520,835 UART: [kat] SHA2-512-ACC
2,523,241 UART: [kat] ECC-384
4,816,160 UART: [kat] HMAC-384Kdf
4,828,307 UART: [kat] LMS
6,018,578 UART: [kat] --
6,021,781 UART: [cold-reset] ++
6,024,259 UART: [fht] Storing FHT @ 0x50003400
6,036,556 UART: [idev] ++
6,037,124 UART: [idev] CDI.KEYID = 6
6,038,035 UART: [idev] SUBJECT.KEYID = 7
6,039,316 UART: [idev] UDS.KEYID = 0
6,041,873 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,185,528 UART: [idev] Erasing UDS.KEYID = 0
9,374,744 UART: [idev] Using Sha1 for KeyId Algorithm
9,395,691 UART: [idev] --
9,398,556 UART: [ldev] ++
9,399,128 UART: [ldev] CDI.KEYID = 6
9,400,072 UART: [ldev] SUBJECT.KEYID = 5
9,401,263 UART: [ldev] AUTHORITY.KEYID = 7
9,402,564 UART: [ldev] FE.KEYID = 1
9,449,209 UART: [ldev] Erasing FE.KEYID = 1
12,784,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,026 UART: [ldev] --
15,162,643 UART: [fwproc] Waiting for Commands...
15,165,338 UART: [fwproc] Received command 0x46574c44
15,167,580 UART: [fwproc] Received Image of size 114124 bytes
19,224,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,303,908 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,372,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,686 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,807,435 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,897,141 >>> mbox cmd response: failed
12,897,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,898,037 >>> mbox cmd response: failed
12,898,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,898,667 >>> mbox cmd response: failed
Initializing fuses
2,047,371 writing to cptra_bootfsm_go
5,841,009 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,932,156 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,621 UART:
192,988 UART: Running Caliptra ROM ...
194,116 UART:
603,720 UART: [state] CFI Enabled
619,468 UART: [state] LifecycleState = Unprovisioned
621,360 UART: [state] DebugLocked = No
623,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,772 UART: [kat] SHA2-256
798,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,085 UART: [kat] ++
809,564 UART: [kat] sha1
821,471 UART: [kat] SHA2-256
824,210 UART: [kat] SHA2-384
830,293 UART: [kat] SHA2-512-ACC
832,684 UART: [kat] ECC-384
3,116,350 UART: [kat] HMAC-384Kdf
3,128,694 UART: [kat] LMS
4,318,790 UART: [kat] --
4,323,782 UART: [cold-reset] ++
4,324,695 UART: [fht] Storing FHT @ 0x50003400
4,335,257 UART: [idev] ++
4,335,879 UART: [idev] CDI.KEYID = 6
4,336,787 UART: [idev] SUBJECT.KEYID = 7
4,338,078 UART: [idev] UDS.KEYID = 0
4,340,830 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,753 UART: [idev] Erasing UDS.KEYID = 0
7,626,647 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,575 UART: [idev] --
7,651,536 UART: [ldev] ++
7,652,116 UART: [ldev] CDI.KEYID = 6
7,653,088 UART: [ldev] SUBJECT.KEYID = 5
7,654,319 UART: [ldev] AUTHORITY.KEYID = 7
7,655,562 UART: [ldev] FE.KEYID = 1
7,665,465 UART: [ldev] Erasing FE.KEYID = 1
10,952,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,644 UART: [ldev] --
13,310,561 UART: [fwproc] Waiting for Commands...
13,313,091 UART: [fwproc] Received command 0x46574c44
13,315,278 UART: [fwproc] Received Image of size 114124 bytes
13,370,971 UART: ROM Fatal Error: 0x000B0001
13,374,490 >>> mbox cmd response: failed
13,374,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,246 >>> mbox cmd response: failed
13,375,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,805 >>> mbox cmd response: failed
Initializing fuses
2,049,519 writing to cptra_bootfsm_go
2,238,847 UART:
2,239,217 UART: Running Caliptra ROM ...
2,240,354 UART:
7,098,792 UART: [state] CFI Enabled
7,113,223 UART: [state] LifecycleState = Unprovisioned
7,115,141 UART: [state] DebugLocked = No
7,118,207 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,122,192 UART: [kat] SHA2-256
7,291,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,302,512 UART: [kat] ++
7,303,056 UART: [kat] sha1
7,314,499 UART: [kat] SHA2-256
7,317,175 UART: [kat] SHA2-384
7,323,385 UART: [kat] SHA2-512-ACC
7,325,741 UART: [kat] ECC-384
9,610,749 UART: [kat] HMAC-384Kdf
9,622,269 UART: [kat] LMS
10,812,353 UART: [kat] --
10,816,962 UART: [cold-reset] ++
10,818,683 UART: [fht] Storing FHT @ 0x50003400
10,829,679 UART: [idev] ++
10,830,285 UART: [idev] CDI.KEYID = 6
10,831,198 UART: [idev] SUBJECT.KEYID = 7
10,832,419 UART: [idev] UDS.KEYID = 0
10,835,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,978,335 UART: [idev] Erasing UDS.KEYID = 0
14,120,695 UART: [idev] Using Sha1 for KeyId Algorithm
14,142,754 UART: [idev] --
14,147,833 UART: [ldev] ++
14,148,458 UART: [ldev] CDI.KEYID = 6
14,149,420 UART: [ldev] SUBJECT.KEYID = 5
14,150,618 UART: [ldev] AUTHORITY.KEYID = 7
14,151,854 UART: [ldev] FE.KEYID = 1
14,162,303 UART: [ldev] Erasing FE.KEYID = 1
17,451,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,741,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,756,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,771,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,786,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,803,525 UART: [ldev] --
19,809,009 UART: [fwproc] Waiting for Commands...
19,811,333 UART: [fwproc] Received command 0x46574c44
19,813,522 UART: [fwproc] Received Image of size 114124 bytes
23,862,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,937,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,006,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,323,309 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
4,133,489 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,113,990 >>> mbox cmd response: failed
13,114,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,115,096 >>> mbox cmd response: failed
13,115,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,115,666 >>> mbox cmd response: failed
Initializing fuses
2,047,465 writing to cptra_bootfsm_go
10,885,241 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,821,205 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,206 UART:
192,627 UART: Running Caliptra ROM ...
193,951 UART:
194,110 UART: [state] CFI Enabled
262,791 UART: [state] LifecycleState = Unprovisioned
264,681 UART: [state] DebugLocked = No
266,976 UART: [state] WD Timer not started. Device not locked for debugging
270,094 UART: [kat] SHA2-256
449,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,795 UART: [kat] ++
461,339 UART: [kat] sha1
472,922 UART: [kat] SHA2-256
475,978 UART: [kat] SHA2-384
482,654 UART: [kat] SHA2-512-ACC
485,592 UART: [kat] ECC-384
2,948,473 UART: [kat] HMAC-384Kdf
2,971,346 UART: [kat] LMS
3,500,794 UART: [kat] --
3,505,458 UART: [cold-reset] ++
3,507,125 UART: [fht] FHT @ 0x50003400
3,517,509 UART: [idev] ++
3,518,074 UART: [idev] CDI.KEYID = 6
3,518,957 UART: [idev] SUBJECT.KEYID = 7
3,520,167 UART: [idev] UDS.KEYID = 0
3,522,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,036 UART: [idev] Erasing UDS.KEYID = 0
6,025,539 UART: [idev] Sha1 KeyId Algorithm
6,047,968 UART: [idev] --
6,052,106 UART: [ldev] ++
6,052,691 UART: [ldev] CDI.KEYID = 6
6,053,602 UART: [ldev] SUBJECT.KEYID = 5
6,054,766 UART: [ldev] AUTHORITY.KEYID = 7
6,055,998 UART: [ldev] FE.KEYID = 1
6,100,075 UART: [ldev] Erasing FE.KEYID = 1
8,603,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,830 UART: [ldev] --
10,414,982 UART: [fwproc] Wait for Commands...
10,418,048 UART: [fwproc] Recv command 0x46574c44
10,420,096 UART: [fwproc] Recv'd Img size: 114448 bytes
10,475,136 UART: ROM Fatal Error: 0x000B0001
10,478,226 >>> mbox cmd response: failed
10,478,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,478,950 >>> mbox cmd response: failed
10,479,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,553 >>> mbox cmd response: failed
Initializing fuses
2,049,466 writing to cptra_bootfsm_go
2,238,750 UART:
2,239,095 UART: Running Caliptra ROM ...
2,240,142 UART:
2,240,295 UART: [state] CFI Enabled
2,305,393 UART: [state] LifecycleState = Unprovisioned
2,307,279 UART: [state] DebugLocked = No
2,308,965 UART: [state] WD Timer not started. Device not locked for debugging
2,313,308 UART: [kat] SHA2-256
2,492,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,991 UART: [kat] ++
2,504,454 UART: [kat] sha1
2,515,930 UART: [kat] SHA2-256
2,518,960 UART: [kat] SHA2-384
2,524,796 UART: [kat] SHA2-512-ACC
2,527,741 UART: [kat] ECC-384
4,988,943 UART: [kat] HMAC-384Kdf
5,014,223 UART: [kat] LMS
5,543,662 UART: [kat] --
5,549,273 UART: [cold-reset] ++
5,550,885 UART: [fht] FHT @ 0x50003400
5,562,675 UART: [idev] ++
5,563,286 UART: [idev] CDI.KEYID = 6
5,564,204 UART: [idev] SUBJECT.KEYID = 7
5,565,365 UART: [idev] UDS.KEYID = 0
5,567,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,711,764 UART: [idev] Erasing UDS.KEYID = 0
8,065,204 UART: [idev] Sha1 KeyId Algorithm
8,087,155 UART: [idev] --
8,091,991 UART: [ldev] ++
8,092,567 UART: [ldev] CDI.KEYID = 6
8,093,461 UART: [ldev] SUBJECT.KEYID = 5
8,094,622 UART: [ldev] AUTHORITY.KEYID = 7
8,095,917 UART: [ldev] FE.KEYID = 1
8,141,555 UART: [ldev] Erasing FE.KEYID = 1
10,648,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,044 UART: [ldev] --
12,456,056 UART: [fwproc] Wait for Commands...
12,457,610 UART: [fwproc] Recv command 0x46574c44
12,459,714 UART: [fwproc] Recv'd Img size: 114448 bytes
15,867,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,012,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,330,615 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,360,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,237,698 >>> mbox cmd response: failed
10,238,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,238,607 >>> mbox cmd response: failed
10,238,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,239,160 >>> mbox cmd response: failed
Initializing fuses
2,045,570 writing to cptra_bootfsm_go
5,409,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,117,209 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,551 UART:
192,908 UART: Running Caliptra ROM ...
194,095 UART:
603,761 UART: [state] CFI Enabled
618,081 UART: [state] LifecycleState = Unprovisioned
619,934 UART: [state] DebugLocked = No
622,558 UART: [state] WD Timer not started. Device not locked for debugging
625,725 UART: [kat] SHA2-256
804,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,457 UART: [kat] ++
816,986 UART: [kat] sha1
827,867 UART: [kat] SHA2-256
830,869 UART: [kat] SHA2-384
837,167 UART: [kat] SHA2-512-ACC
840,171 UART: [kat] ECC-384
3,280,036 UART: [kat] HMAC-384Kdf
3,293,861 UART: [kat] LMS
3,823,319 UART: [kat] --
3,829,788 UART: [cold-reset] ++
3,831,213 UART: [fht] FHT @ 0x50003400
3,840,956 UART: [idev] ++
3,841,524 UART: [idev] CDI.KEYID = 6
3,842,499 UART: [idev] SUBJECT.KEYID = 7
3,843,660 UART: [idev] UDS.KEYID = 0
3,846,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,511 UART: [idev] Erasing UDS.KEYID = 0
6,315,688 UART: [idev] Sha1 KeyId Algorithm
6,338,434 UART: [idev] --
6,342,644 UART: [ldev] ++
6,343,217 UART: [ldev] CDI.KEYID = 6
6,344,150 UART: [ldev] SUBJECT.KEYID = 5
6,345,313 UART: [ldev] AUTHORITY.KEYID = 7
6,346,545 UART: [ldev] FE.KEYID = 1
6,358,221 UART: [ldev] Erasing FE.KEYID = 1
8,828,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,588 UART: [ldev] --
10,618,092 UART: [fwproc] Wait for Commands...
10,619,761 UART: [fwproc] Recv command 0x46574c44
10,621,862 UART: [fwproc] Recv'd Img size: 114448 bytes
10,676,834 UART: ROM Fatal Error: 0x000B0001
10,679,970 >>> mbox cmd response: failed
10,680,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,680,736 >>> mbox cmd response: failed
10,681,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,412 >>> mbox cmd response: failed
Initializing fuses
2,050,320 writing to cptra_bootfsm_go
2,239,628 UART:
2,239,978 UART: Running Caliptra ROM ...
2,241,124 UART:
9,776,063 UART: [state] CFI Enabled
9,787,605 UART: [state] LifecycleState = Unprovisioned
9,789,496 UART: [state] DebugLocked = No
9,791,433 UART: [state] WD Timer not started. Device not locked for debugging
9,795,775 UART: [kat] SHA2-256
9,974,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,986,475 UART: [kat] ++
9,987,024 UART: [kat] sha1
9,998,519 UART: [kat] SHA2-256
10,001,539 UART: [kat] SHA2-384
10,007,371 UART: [kat] SHA2-512-ACC
10,010,326 UART: [kat] ECC-384
12,452,327 UART: [kat] HMAC-384Kdf
12,464,937 UART: [kat] LMS
12,994,441 UART: [kat] --
12,999,189 UART: [cold-reset] ++
13,001,121 UART: [fht] FHT @ 0x50003400
13,012,051 UART: [idev] ++
13,012,620 UART: [idev] CDI.KEYID = 6
13,013,636 UART: [idev] SUBJECT.KEYID = 7
13,014,740 UART: [idev] UDS.KEYID = 0
13,017,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,161,502 UART: [idev] Erasing UDS.KEYID = 0
15,490,315 UART: [idev] Sha1 KeyId Algorithm
15,512,642 UART: [idev] --
15,516,958 UART: [ldev] ++
15,517,521 UART: [ldev] CDI.KEYID = 6
15,518,403 UART: [ldev] SUBJECT.KEYID = 5
15,519,614 UART: [ldev] AUTHORITY.KEYID = 7
15,520,848 UART: [ldev] FE.KEYID = 1
15,530,981 UART: [ldev] Erasing FE.KEYID = 1
18,007,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,727,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,743,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,759,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,774,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,794,566 UART: [ldev] --
19,798,727 UART: [fwproc] Wait for Commands...
19,800,299 UART: [fwproc] Recv command 0x46574c44
19,802,401 UART: [fwproc] Recv'd Img size: 114448 bytes
23,203,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,277,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,346,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,665,466 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,699,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,463,771 >>> mbox cmd response: failed
10,464,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,847 >>> mbox cmd response: failed
10,465,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,465,413 >>> mbox cmd response: failed
Initializing fuses
2,048,304 writing to cptra_bootfsm_go
13,105,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,668,823 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,260 UART:
192,633 UART: Running Caliptra ROM ...
193,823 UART:
193,978 UART: [state] CFI Enabled
265,254 UART: [state] LifecycleState = Unprovisioned
267,601 UART: [state] DebugLocked = No
270,117 UART: [state] WD Timer not started. Device not locked for debugging
275,278 UART: [kat] SHA2-256
465,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,951 UART: [kat] ++
476,432 UART: [kat] sha1
487,418 UART: [kat] SHA2-256
490,422 UART: [kat] SHA2-384
497,113 UART: [kat] SHA2-512-ACC
499,725 UART: [kat] ECC-384
2,948,034 UART: [kat] HMAC-384Kdf
2,970,177 UART: [kat] LMS
3,501,911 UART: [kat] --
3,506,612 UART: [cold-reset] ++
3,507,896 UART: [fht] FHT @ 0x50003400
3,518,988 UART: [idev] ++
3,519,697 UART: [idev] CDI.KEYID = 6
3,520,614 UART: [idev] SUBJECT.KEYID = 7
3,521,829 UART: [idev] UDS.KEYID = 0
3,524,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,120 UART: [idev] Erasing UDS.KEYID = 0
6,025,262 UART: [idev] Sha1 KeyId Algorithm
6,047,039 UART: [idev] --
6,051,368 UART: [ldev] ++
6,052,048 UART: [ldev] CDI.KEYID = 6
6,052,991 UART: [ldev] SUBJECT.KEYID = 5
6,054,158 UART: [ldev] AUTHORITY.KEYID = 7
6,055,397 UART: [ldev] FE.KEYID = 1
6,099,994 UART: [ldev] Erasing FE.KEYID = 1
8,606,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,576 UART: [ldev] --
10,415,754 UART: [fwproc] Wait for Commands...
10,418,880 UART: [fwproc] Recv command 0x46574c44
10,421,142 UART: [fwproc] Recv'd Img size: 114448 bytes
10,505,697 UART: ROM Fatal Error: 0x000B0001
10,509,374 >>> mbox cmd response: failed
10,509,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,510,121 >>> mbox cmd response: failed
10,510,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,510,683 >>> mbox cmd response: failed
Initializing fuses
2,049,001 writing to cptra_bootfsm_go
2,238,318 UART:
2,238,663 UART: Running Caliptra ROM ...
2,239,743 UART:
2,239,904 UART: [state] CFI Enabled
2,298,466 UART: [state] LifecycleState = Unprovisioned
2,300,844 UART: [state] DebugLocked = No
2,302,858 UART: [state] WD Timer not started. Device not locked for debugging
2,307,634 UART: [kat] SHA2-256
2,497,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,508,251 UART: [kat] ++
2,508,710 UART: [kat] sha1
2,519,411 UART: [kat] SHA2-256
2,522,437 UART: [kat] SHA2-384
2,527,453 UART: [kat] SHA2-512-ACC
2,530,030 UART: [kat] ECC-384
4,978,818 UART: [kat] HMAC-384Kdf
5,003,940 UART: [kat] LMS
5,535,719 UART: [kat] --
5,540,889 UART: [cold-reset] ++
5,542,933 UART: [fht] FHT @ 0x50003400
5,554,824 UART: [idev] ++
5,555,496 UART: [idev] CDI.KEYID = 6
5,556,461 UART: [idev] SUBJECT.KEYID = 7
5,557,674 UART: [idev] UDS.KEYID = 0
5,560,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,704,626 UART: [idev] Erasing UDS.KEYID = 0
8,061,897 UART: [idev] Sha1 KeyId Algorithm
8,084,129 UART: [idev] --
8,088,347 UART: [ldev] ++
8,089,032 UART: [ldev] CDI.KEYID = 6
8,089,946 UART: [ldev] SUBJECT.KEYID = 5
8,091,166 UART: [ldev] AUTHORITY.KEYID = 7
8,092,343 UART: [ldev] FE.KEYID = 1
8,133,947 UART: [ldev] Erasing FE.KEYID = 1
10,642,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,002 UART: [ldev] --
12,449,972 UART: [fwproc] Wait for Commands...
12,452,944 UART: [fwproc] Recv command 0x46574c44
12,455,259 UART: [fwproc] Recv'd Img size: 114448 bytes
15,906,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,643,250 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,440,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,298,772 >>> mbox cmd response: failed
10,299,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,763 >>> mbox cmd response: failed
10,300,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,339 >>> mbox cmd response: failed
Initializing fuses
2,056,594 writing to cptra_bootfsm_go
5,489,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,811,325 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,558 UART:
192,916 UART: Running Caliptra ROM ...
194,104 UART:
603,747 UART: [state] CFI Enabled
618,699 UART: [state] LifecycleState = Unprovisioned
621,116 UART: [state] DebugLocked = No
622,953 UART: [state] WD Timer not started. Device not locked for debugging
627,907 UART: [kat] SHA2-256
817,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,527 UART: [kat] ++
829,036 UART: [kat] sha1
841,160 UART: [kat] SHA2-256
844,219 UART: [kat] SHA2-384
850,847 UART: [kat] SHA2-512-ACC
853,275 UART: [kat] ECC-384
3,296,041 UART: [kat] HMAC-384Kdf
3,308,386 UART: [kat] LMS
3,840,186 UART: [kat] --
3,843,952 UART: [cold-reset] ++
3,845,466 UART: [fht] FHT @ 0x50003400
3,856,446 UART: [idev] ++
3,857,122 UART: [idev] CDI.KEYID = 6
3,858,137 UART: [idev] SUBJECT.KEYID = 7
3,859,298 UART: [idev] UDS.KEYID = 0
3,862,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,211 UART: [idev] Erasing UDS.KEYID = 0
6,337,160 UART: [idev] Sha1 KeyId Algorithm
6,359,795 UART: [idev] --
6,366,378 UART: [ldev] ++
6,367,059 UART: [ldev] CDI.KEYID = 6
6,367,945 UART: [ldev] SUBJECT.KEYID = 5
6,369,181 UART: [ldev] AUTHORITY.KEYID = 7
6,370,364 UART: [ldev] FE.KEYID = 1
6,381,735 UART: [ldev] Erasing FE.KEYID = 1
8,859,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,537 UART: [ldev] --
10,650,260 UART: [fwproc] Wait for Commands...
10,651,761 UART: [fwproc] Recv command 0x46574c44
10,654,070 UART: [fwproc] Recv'd Img size: 114448 bytes
10,740,447 UART: ROM Fatal Error: 0x000B0001
10,744,070 >>> mbox cmd response: failed
10,744,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,730 >>> mbox cmd response: failed
10,745,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,745,313 >>> mbox cmd response: failed
Initializing fuses
2,061,751 writing to cptra_bootfsm_go
2,251,007 UART:
2,251,352 UART: Running Caliptra ROM ...
2,252,492 UART:
9,710,515 UART: [state] CFI Enabled
9,724,913 UART: [state] LifecycleState = Unprovisioned
9,727,328 UART: [state] DebugLocked = No
9,730,074 UART: [state] WD Timer not started. Device not locked for debugging
9,734,318 UART: [kat] SHA2-256
9,924,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,934,972 UART: [kat] ++
9,935,571 UART: [kat] sha1
9,945,982 UART: [kat] SHA2-256
9,948,986 UART: [kat] SHA2-384
9,955,199 UART: [kat] SHA2-512-ACC
9,957,824 UART: [kat] ECC-384
12,399,371 UART: [kat] HMAC-384Kdf
12,413,489 UART: [kat] LMS
12,945,328 UART: [kat] --
12,950,583 UART: [cold-reset] ++
12,952,357 UART: [fht] FHT @ 0x50003400
12,964,196 UART: [idev] ++
12,964,877 UART: [idev] CDI.KEYID = 6
12,965,841 UART: [idev] SUBJECT.KEYID = 7
12,967,054 UART: [idev] UDS.KEYID = 0
12,969,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,113,572 UART: [idev] Erasing UDS.KEYID = 0
15,442,099 UART: [idev] Sha1 KeyId Algorithm
15,465,651 UART: [idev] --
15,471,664 UART: [ldev] ++
15,472,346 UART: [ldev] CDI.KEYID = 6
15,473,287 UART: [ldev] SUBJECT.KEYID = 5
15,474,444 UART: [ldev] AUTHORITY.KEYID = 7
15,475,678 UART: [ldev] FE.KEYID = 1
15,488,782 UART: [ldev] Erasing FE.KEYID = 1
17,967,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,689,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,704,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,719,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,734,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,958 UART: [ldev] --
19,760,901 UART: [fwproc] Wait for Commands...
19,764,099 UART: [fwproc] Recv command 0x46574c44
19,766,366 UART: [fwproc] Recv'd Img size: 114448 bytes
23,215,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,295,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,411,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,954,328 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,761,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,520,536 >>> mbox cmd response: failed
10,521,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,435 >>> mbox cmd response: failed
10,521,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,013 >>> mbox cmd response: failed
Initializing fuses
2,051,979 writing to cptra_bootfsm_go
13,105,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,311,677 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,035 UART: [kat] SHA2-256
881,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,081 UART: [kat] ++
886,233 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,306 UART: [kat] LMS
1,475,502 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,893 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,505,086 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,544 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,520,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,601 UART: [fwproc] Waiting for Commands...
1,586,430 UART: [fwproc] Received command 0x46574c44
1,587,221 UART: [fwproc] Received Image of size 114448 bytes
1,606,519 UART: ROM Fatal Error: 0x000B0001
1,607,676 >>> mbox cmd response: failed
1,607,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,682 >>> mbox cmd response: failed
1,607,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,170 UART: [idev] ++
1,479,338 UART: [idev] CDI.KEYID = 6
1,479,698 UART: [idev] SUBJECT.KEYID = 7
1,480,122 UART: [idev] UDS.KEYID = 0
1,480,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,988 UART: [idev] Erasing UDS.KEYID = 0
1,504,194 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,618 UART: [idev] --
1,513,547 UART: [ldev] ++
1,513,715 UART: [ldev] CDI.KEYID = 6
1,514,078 UART: [ldev] SUBJECT.KEYID = 5
1,514,504 UART: [ldev] AUTHORITY.KEYID = 7
1,514,967 UART: [ldev] FE.KEYID = 1
1,520,315 UART: [ldev] Erasing FE.KEYID = 1
1,546,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,922 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,176 UART: [fwproc] Received command 0x46574c44
1,586,967 UART: [fwproc] Received Image of size 114448 bytes
2,885,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,448 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,460,597 >>> mbox cmd response: failed
1,460,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,603 >>> mbox cmd response: failed
1,460,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,682 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,345 UART: [kat] SHA2-512-ACC
897,246 UART: [kat] ECC-384
902,775 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,943 UART: [idev] ++
1,480,111 UART: [idev] CDI.KEYID = 6
1,480,471 UART: [idev] SUBJECT.KEYID = 7
1,480,895 UART: [idev] UDS.KEYID = 0
1,481,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,295 UART: [idev] Erasing UDS.KEYID = 0
1,505,631 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,281 UART: [idev] --
1,515,494 UART: [ldev] ++
1,515,662 UART: [ldev] CDI.KEYID = 6
1,516,025 UART: [ldev] SUBJECT.KEYID = 5
1,516,451 UART: [ldev] AUTHORITY.KEYID = 7
1,516,914 UART: [ldev] FE.KEYID = 1
1,522,452 UART: [ldev] Erasing FE.KEYID = 1
1,548,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,251 UART: [ldev] --
1,587,732 UART: [fwproc] Waiting for Commands...
1,588,575 UART: [fwproc] Received command 0x46574c44
1,589,366 UART: [fwproc] Received Image of size 114448 bytes
1,608,528 UART: ROM Fatal Error: 0x000B0001
1,609,685 >>> mbox cmd response: failed
1,609,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,691 >>> mbox cmd response: failed
1,609,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,850 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,343 UART: [idev] Erasing UDS.KEYID = 0
1,504,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,529 UART: [idev] --
1,514,534 UART: [ldev] ++
1,514,702 UART: [ldev] CDI.KEYID = 6
1,515,065 UART: [ldev] SUBJECT.KEYID = 5
1,515,491 UART: [ldev] AUTHORITY.KEYID = 7
1,515,954 UART: [ldev] FE.KEYID = 1
1,521,234 UART: [ldev] Erasing FE.KEYID = 1
1,546,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,157 UART: [ldev] --
1,585,532 UART: [fwproc] Waiting for Commands...
1,586,357 UART: [fwproc] Received command 0x46574c44
1,587,148 UART: [fwproc] Received Image of size 114448 bytes
2,887,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,607 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,461,412 >>> mbox cmd response: failed
1,461,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,418 >>> mbox cmd response: failed
1,461,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,499 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
917,698 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,890 UART: [idev] ++
1,175,058 UART: [idev] CDI.KEYID = 6
1,175,418 UART: [idev] SUBJECT.KEYID = 7
1,175,842 UART: [idev] UDS.KEYID = 0
1,176,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,201,089 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,168 UART: [ldev] SUBJECT.KEYID = 5
1,211,594 UART: [ldev] AUTHORITY.KEYID = 7
1,212,057 UART: [ldev] FE.KEYID = 1
1,217,185 UART: [ldev] Erasing FE.KEYID = 1
1,244,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,913 UART: [ldev] --
1,283,334 UART: [fwproc] Wait for Commands...
1,284,006 UART: [fwproc] Recv command 0x46574c44
1,284,734 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,922 UART: ROM Fatal Error: 0x000B0001
1,305,079 >>> mbox cmd response: failed
1,305,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,085 >>> mbox cmd response: failed
1,305,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,344 UART: [kat] SHA2-512-ACC
908,245 UART: [kat] ECC-384
918,372 UART: [kat] HMAC-384Kdf
923,054 UART: [kat] LMS
1,171,382 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,673 UART: [fht] FHT @ 0x50003400
1,175,386 UART: [idev] ++
1,175,554 UART: [idev] CDI.KEYID = 6
1,175,914 UART: [idev] SUBJECT.KEYID = 7
1,176,338 UART: [idev] UDS.KEYID = 0
1,176,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,414 UART: [idev] Erasing UDS.KEYID = 0
1,201,661 UART: [idev] Sha1 KeyId Algorithm
1,210,125 UART: [idev] --
1,211,085 UART: [ldev] ++
1,211,253 UART: [ldev] CDI.KEYID = 6
1,211,616 UART: [ldev] SUBJECT.KEYID = 5
1,212,042 UART: [ldev] AUTHORITY.KEYID = 7
1,212,505 UART: [ldev] FE.KEYID = 1
1,217,557 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,382 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,868 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,773 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,362 >>> mbox cmd response: failed
1,158,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,368 >>> mbox cmd response: failed
1,158,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,904 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
902,062 UART: [kat] SHA2-256
904,002 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,044 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,143 UART: [idev] Erasing UDS.KEYID = 0
1,201,300 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,560 UART: [ldev] ++
1,210,728 UART: [ldev] CDI.KEYID = 6
1,211,091 UART: [ldev] SUBJECT.KEYID = 5
1,211,517 UART: [ldev] AUTHORITY.KEYID = 7
1,211,980 UART: [ldev] FE.KEYID = 1
1,217,236 UART: [ldev] Erasing FE.KEYID = 1
1,243,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,422 UART: [ldev] --
1,282,695 UART: [fwproc] Wait for Commands...
1,283,481 UART: [fwproc] Recv command 0x46574c44
1,284,209 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,205 UART: ROM Fatal Error: 0x000B0001
1,304,362 >>> mbox cmd response: failed
1,304,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,368 >>> mbox cmd response: failed
1,304,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,683 UART: [kat] SHA2-512-ACC
908,584 UART: [kat] ECC-384
918,199 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,310 UART: [cold-reset] ++
1,172,878 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,549 UART: [idev] Erasing UDS.KEYID = 0
1,200,792 UART: [idev] Sha1 KeyId Algorithm
1,209,266 UART: [idev] --
1,210,306 UART: [ldev] ++
1,210,474 UART: [ldev] CDI.KEYID = 6
1,210,837 UART: [ldev] SUBJECT.KEYID = 5
1,211,263 UART: [ldev] AUTHORITY.KEYID = 7
1,211,726 UART: [ldev] FE.KEYID = 1
1,217,050 UART: [ldev] Erasing FE.KEYID = 1
1,243,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,846 UART: [ldev] --
1,283,107 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,258 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,013 >>> mbox cmd response: failed
1,159,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,019 >>> mbox cmd response: failed
1,159,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,141 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,736 UART: [state] LifecycleState = Unprovisioned
86,391 UART: [state] DebugLocked = No
87,069 UART: [state] WD Timer not started. Device not locked for debugging
88,426 UART: [kat] SHA2-256
891,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,105 UART: [kat] ++
896,257 UART: [kat] sha1
900,359 UART: [kat] SHA2-256
902,299 UART: [kat] SHA2-384
905,152 UART: [kat] SHA2-512-ACC
907,053 UART: [kat] ECC-384
916,722 UART: [kat] HMAC-384Kdf
921,458 UART: [kat] LMS
1,169,770 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,655 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,522 UART: [ldev] ++
1,209,690 UART: [ldev] CDI.KEYID = 6
1,210,054 UART: [ldev] SUBJECT.KEYID = 5
1,210,481 UART: [ldev] AUTHORITY.KEYID = 7
1,210,944 UART: [ldev] FE.KEYID = 1
1,216,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,009 UART: ROM Fatal Error: 0x000B0001
1,302,166 >>> mbox cmd response: failed
1,302,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,172 >>> mbox cmd response: failed
1,302,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,703 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,068 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,493 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,329 >>> mbox cmd response: failed
1,155,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,335 >>> mbox cmd response: failed
1,155,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,945 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,663 UART: [kat] HMAC-384Kdf
921,271 UART: [kat] LMS
1,169,583 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,171,076 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,175,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,192 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,523 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,384 UART: ROM Fatal Error: 0x000B0001
1,304,541 >>> mbox cmd response: failed
1,304,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,547 >>> mbox cmd response: failed
1,304,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,960 UART: [kat] ++
896,112 UART: [kat] sha1
900,348 UART: [kat] SHA2-256
902,288 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,174,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,355 UART: [ldev] --
1,282,691 UART: [fwproc] Wait for Commands...
1,283,438 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,312 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,684 >>> mbox cmd response: failed
1,155,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,690 >>> mbox cmd response: failed
1,155,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,228 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,143 UART:
192,499 UART: Running Caliptra ROM ...
193,588 UART:
193,730 UART: [state] CFI Enabled
263,695 UART: [state] LifecycleState = Unprovisioned
265,678 UART: [state] DebugLocked = No
268,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,881 UART: [kat] SHA2-256
442,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,089 UART: [kat] ++
453,544 UART: [kat] sha1
465,233 UART: [kat] SHA2-256
467,919 UART: [kat] SHA2-384
474,382 UART: [kat] SHA2-512-ACC
476,775 UART: [kat] ECC-384
2,768,201 UART: [kat] HMAC-384Kdf
2,796,667 UART: [kat] LMS
3,986,951 UART: [kat] --
3,989,997 UART: [cold-reset] ++
3,992,535 UART: [fht] Storing FHT @ 0x50003400
4,004,662 UART: [idev] ++
4,005,261 UART: [idev] CDI.KEYID = 6
4,006,149 UART: [idev] SUBJECT.KEYID = 7
4,007,425 UART: [idev] UDS.KEYID = 0
4,010,169 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,878 UART: [idev] Erasing UDS.KEYID = 0
7,342,257 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,388 UART: [idev] --
7,368,087 UART: [ldev] ++
7,368,662 UART: [ldev] CDI.KEYID = 6
7,369,679 UART: [ldev] SUBJECT.KEYID = 5
7,370,787 UART: [ldev] AUTHORITY.KEYID = 7
7,372,077 UART: [ldev] FE.KEYID = 1
7,398,720 UART: [ldev] Erasing FE.KEYID = 1
10,732,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,681 UART: [ldev] --
13,093,319 UART: [fwproc] Waiting for Commands...
13,096,379 UART: [fwproc] Received command 0x46574c44
13,098,577 UART: [fwproc] Received Image of size 114124 bytes
13,156,084 UART: ROM Fatal Error: 0x000B0002
13,159,568 >>> mbox cmd response: failed
13,159,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,276 >>> mbox cmd response: failed
13,160,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,837 >>> mbox cmd response: failed
Initializing fuses
2,049,670 writing to cptra_bootfsm_go
2,239,021 UART:
2,239,389 UART: Running Caliptra ROM ...
2,240,528 UART:
2,240,702 UART: [state] CFI Enabled
2,313,325 UART: [state] LifecycleState = Unprovisioned
2,315,262 UART: [state] DebugLocked = No
2,316,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,257 UART: [kat] SHA2-256
2,491,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,498 UART: [kat] ++
2,503,042 UART: [kat] sha1
2,513,834 UART: [kat] SHA2-256
2,516,521 UART: [kat] SHA2-384
2,522,346 UART: [kat] SHA2-512-ACC
2,524,707 UART: [kat] ECC-384
4,813,566 UART: [kat] HMAC-384Kdf
4,824,999 UART: [kat] LMS
6,015,248 UART: [kat] --
6,018,931 UART: [cold-reset] ++
6,021,196 UART: [fht] Storing FHT @ 0x50003400
6,033,867 UART: [idev] ++
6,034,447 UART: [idev] CDI.KEYID = 6
6,035,420 UART: [idev] SUBJECT.KEYID = 7
6,036,637 UART: [idev] UDS.KEYID = 0
6,039,237 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,182,912 UART: [idev] Erasing UDS.KEYID = 0
9,375,814 UART: [idev] Using Sha1 for KeyId Algorithm
9,398,225 UART: [idev] --
9,402,597 UART: [ldev] ++
9,403,173 UART: [ldev] CDI.KEYID = 6
9,404,139 UART: [ldev] SUBJECT.KEYID = 5
9,405,374 UART: [ldev] AUTHORITY.KEYID = 7
9,406,615 UART: [ldev] FE.KEYID = 1
9,448,209 UART: [ldev] Erasing FE.KEYID = 1
12,780,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,075,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,119,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,139,785 UART: [ldev] --
15,145,002 UART: [fwproc] Waiting for Commands...
15,146,945 UART: [fwproc] Received command 0x46574c44
15,149,200 UART: [fwproc] Received Image of size 114124 bytes
19,196,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,270,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,339,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,657,297 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,808,595 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,926,143 >>> mbox cmd response: failed
12,927,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,462 >>> mbox cmd response: failed
12,927,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,963 >>> mbox cmd response: failed
Initializing fuses
2,045,426 writing to cptra_bootfsm_go
5,841,637 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,916,784 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,575 UART:
192,922 UART: Running Caliptra ROM ...
194,045 UART:
603,681 UART: [state] CFI Enabled
617,479 UART: [state] LifecycleState = Unprovisioned
619,414 UART: [state] DebugLocked = No
622,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,260 UART: [kat] SHA2-256
795,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,493 UART: [kat] ++
806,965 UART: [kat] sha1
818,975 UART: [kat] SHA2-256
821,646 UART: [kat] SHA2-384
827,740 UART: [kat] SHA2-512-ACC
830,080 UART: [kat] ECC-384
3,115,218 UART: [kat] HMAC-384Kdf
3,126,645 UART: [kat] LMS
4,316,759 UART: [kat] --
4,320,335 UART: [cold-reset] ++
4,322,438 UART: [fht] Storing FHT @ 0x50003400
4,332,358 UART: [idev] ++
4,332,977 UART: [idev] CDI.KEYID = 6
4,334,060 UART: [idev] SUBJECT.KEYID = 7
4,335,185 UART: [idev] UDS.KEYID = 0
4,338,196 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,615 UART: [idev] Erasing UDS.KEYID = 0
7,627,599 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,512 UART: [idev] --
7,652,840 UART: [ldev] ++
7,653,415 UART: [ldev] CDI.KEYID = 6
7,654,386 UART: [ldev] SUBJECT.KEYID = 5
7,655,620 UART: [ldev] AUTHORITY.KEYID = 7
7,656,865 UART: [ldev] FE.KEYID = 1
7,669,776 UART: [ldev] Erasing FE.KEYID = 1
10,957,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,577 UART: [ldev] --
13,316,806 UART: [fwproc] Waiting for Commands...
13,318,696 UART: [fwproc] Received command 0x46574c44
13,320,887 UART: [fwproc] Received Image of size 114124 bytes
13,375,853 UART: ROM Fatal Error: 0x000B0002
13,379,364 >>> mbox cmd response: failed
13,379,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,112 >>> mbox cmd response: failed
13,380,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,697 >>> mbox cmd response: failed
Initializing fuses
2,049,714 writing to cptra_bootfsm_go
2,239,021 UART:
2,239,382 UART: Running Caliptra ROM ...
2,240,441 UART:
7,086,275 UART: [state] CFI Enabled
7,101,792 UART: [state] LifecycleState = Unprovisioned
7,103,715 UART: [state] DebugLocked = No
7,106,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,110,285 UART: [kat] SHA2-256
7,279,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,290,550 UART: [kat] ++
7,291,045 UART: [kat] sha1
7,302,327 UART: [kat] SHA2-256
7,305,076 UART: [kat] SHA2-384
7,311,064 UART: [kat] SHA2-512-ACC
7,313,427 UART: [kat] ECC-384
9,599,012 UART: [kat] HMAC-384Kdf
9,610,294 UART: [kat] LMS
10,800,407 UART: [kat] --
10,804,993 UART: [cold-reset] ++
10,805,951 UART: [fht] Storing FHT @ 0x50003400
10,818,835 UART: [idev] ++
10,819,406 UART: [idev] CDI.KEYID = 6
10,820,420 UART: [idev] SUBJECT.KEYID = 7
10,821,578 UART: [idev] UDS.KEYID = 0
10,824,212 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,967,717 UART: [idev] Erasing UDS.KEYID = 0
14,109,894 UART: [idev] Using Sha1 for KeyId Algorithm
14,132,422 UART: [idev] --
14,136,959 UART: [ldev] ++
14,137,582 UART: [ldev] CDI.KEYID = 6
14,138,487 UART: [ldev] SUBJECT.KEYID = 5
14,139,724 UART: [ldev] AUTHORITY.KEYID = 7
14,140,963 UART: [ldev] FE.KEYID = 1
14,152,976 UART: [ldev] Erasing FE.KEYID = 1
17,435,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,728,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,743,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,758,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,772,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,790,199 UART: [ldev] --
19,794,542 UART: [fwproc] Waiting for Commands...
19,797,359 UART: [fwproc] Received command 0x46574c44
19,799,548 UART: [fwproc] Received Image of size 114124 bytes
23,850,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,925,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,994,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,310,619 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,132,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,117,108 >>> mbox cmd response: failed
13,117,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,118,054 >>> mbox cmd response: failed
13,118,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,118,568 >>> mbox cmd response: failed
Initializing fuses
2,046,733 writing to cptra_bootfsm_go
10,883,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,820,956 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,092 UART:
192,458 UART: Running Caliptra ROM ...
193,558 UART:
193,702 UART: [state] CFI Enabled
261,655 UART: [state] LifecycleState = Unprovisioned
263,546 UART: [state] DebugLocked = No
266,325 UART: [state] WD Timer not started. Device not locked for debugging
270,100 UART: [kat] SHA2-256
449,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,795 UART: [kat] ++
461,247 UART: [kat] sha1
471,960 UART: [kat] SHA2-256
474,969 UART: [kat] SHA2-384
482,408 UART: [kat] SHA2-512-ACC
485,395 UART: [kat] ECC-384
2,947,130 UART: [kat] HMAC-384Kdf
2,971,144 UART: [kat] LMS
3,500,551 UART: [kat] --
3,507,460 UART: [cold-reset] ++
3,510,040 UART: [fht] FHT @ 0x50003400
3,521,356 UART: [idev] ++
3,521,925 UART: [idev] CDI.KEYID = 6
3,523,011 UART: [idev] SUBJECT.KEYID = 7
3,524,123 UART: [idev] UDS.KEYID = 0
3,526,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,980 UART: [idev] Erasing UDS.KEYID = 0
6,024,118 UART: [idev] Sha1 KeyId Algorithm
6,046,643 UART: [idev] --
6,050,781 UART: [ldev] ++
6,051,367 UART: [ldev] CDI.KEYID = 6
6,052,444 UART: [ldev] SUBJECT.KEYID = 5
6,053,555 UART: [ldev] AUTHORITY.KEYID = 7
6,054,694 UART: [ldev] FE.KEYID = 1
6,099,636 UART: [ldev] Erasing FE.KEYID = 1
8,602,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,309 UART: [ldev] --
10,414,094 UART: [fwproc] Wait for Commands...
10,416,194 UART: [fwproc] Recv command 0x46574c44
10,418,288 UART: [fwproc] Recv'd Img size: 114448 bytes
10,472,485 UART: ROM Fatal Error: 0x000B0002
10,475,580 >>> mbox cmd response: failed
10,476,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,354 >>> mbox cmd response: failed
10,476,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,914 >>> mbox cmd response: failed
Initializing fuses
2,050,045 writing to cptra_bootfsm_go
2,239,388 UART:
2,239,739 UART: Running Caliptra ROM ...
2,240,832 UART:
2,240,988 UART: [state] CFI Enabled
2,308,301 UART: [state] LifecycleState = Unprovisioned
2,310,191 UART: [state] DebugLocked = No
2,312,565 UART: [state] WD Timer not started. Device not locked for debugging
2,316,310 UART: [kat] SHA2-256
2,495,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,002 UART: [kat] ++
2,507,468 UART: [kat] sha1
2,518,788 UART: [kat] SHA2-256
2,521,807 UART: [kat] SHA2-384
2,528,178 UART: [kat] SHA2-512-ACC
2,531,106 UART: [kat] ECC-384
4,991,569 UART: [kat] HMAC-384Kdf
5,013,981 UART: [kat] LMS
5,543,430 UART: [kat] --
5,548,495 UART: [cold-reset] ++
5,550,746 UART: [fht] FHT @ 0x50003400
5,561,447 UART: [idev] ++
5,562,009 UART: [idev] CDI.KEYID = 6
5,562,982 UART: [idev] SUBJECT.KEYID = 7
5,564,141 UART: [idev] UDS.KEYID = 0
5,566,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,857 UART: [idev] Erasing UDS.KEYID = 0
8,068,476 UART: [idev] Sha1 KeyId Algorithm
8,091,874 UART: [idev] --
8,095,552 UART: [ldev] ++
8,096,130 UART: [ldev] CDI.KEYID = 6
8,097,043 UART: [ldev] SUBJECT.KEYID = 5
8,098,128 UART: [ldev] AUTHORITY.KEYID = 7
8,099,489 UART: [ldev] FE.KEYID = 1
8,143,313 UART: [ldev] Erasing FE.KEYID = 1
10,651,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,602 UART: [ldev] --
12,458,379 UART: [fwproc] Wait for Commands...
12,461,667 UART: [fwproc] Recv command 0x46574c44
12,463,711 UART: [fwproc] Recv'd Img size: 114448 bytes
15,863,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,784 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,361,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,211,847 >>> mbox cmd response: failed
10,212,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,212,920 >>> mbox cmd response: failed
10,213,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,213,484 >>> mbox cmd response: failed
Initializing fuses
2,057,903 writing to cptra_bootfsm_go
5,414,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,088,465 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,590 UART:
192,952 UART: Running Caliptra ROM ...
194,046 UART:
603,775 UART: [state] CFI Enabled
616,097 UART: [state] LifecycleState = Unprovisioned
618,008 UART: [state] DebugLocked = No
620,425 UART: [state] WD Timer not started. Device not locked for debugging
624,625 UART: [kat] SHA2-256
803,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,311 UART: [kat] ++
815,849 UART: [kat] sha1
827,437 UART: [kat] SHA2-256
830,503 UART: [kat] SHA2-384
837,336 UART: [kat] SHA2-512-ACC
840,319 UART: [kat] ECC-384
3,282,976 UART: [kat] HMAC-384Kdf
3,295,926 UART: [kat] LMS
3,825,435 UART: [kat] --
3,830,093 UART: [cold-reset] ++
3,832,199 UART: [fht] FHT @ 0x50003400
3,841,781 UART: [idev] ++
3,842,346 UART: [idev] CDI.KEYID = 6
3,843,233 UART: [idev] SUBJECT.KEYID = 7
3,844,447 UART: [idev] UDS.KEYID = 0
3,847,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,516 UART: [idev] Erasing UDS.KEYID = 0
6,316,413 UART: [idev] Sha1 KeyId Algorithm
6,338,301 UART: [idev] --
6,342,571 UART: [ldev] ++
6,343,147 UART: [ldev] CDI.KEYID = 6
6,344,058 UART: [ldev] SUBJECT.KEYID = 5
6,345,223 UART: [ldev] AUTHORITY.KEYID = 7
6,346,512 UART: [ldev] FE.KEYID = 1
6,357,832 UART: [ldev] Erasing FE.KEYID = 1
8,832,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,648 UART: [ldev] --
10,623,147 UART: [fwproc] Wait for Commands...
10,626,400 UART: [fwproc] Recv command 0x46574c44
10,628,494 UART: [fwproc] Recv'd Img size: 114448 bytes
10,681,612 UART: ROM Fatal Error: 0x000B0002
10,684,723 >>> mbox cmd response: failed
10,685,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,685,459 >>> mbox cmd response: failed
10,685,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,686,013 >>> mbox cmd response: failed
Initializing fuses
2,051,621 writing to cptra_bootfsm_go
2,240,955 UART:
2,241,296 UART: Running Caliptra ROM ...
2,242,438 UART:
9,755,806 UART: [state] CFI Enabled
9,770,361 UART: [state] LifecycleState = Unprovisioned
9,772,267 UART: [state] DebugLocked = No
9,773,633 UART: [state] WD Timer not started. Device not locked for debugging
9,778,085 UART: [kat] SHA2-256
9,957,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,968,778 UART: [kat] ++
9,969,233 UART: [kat] sha1
9,980,521 UART: [kat] SHA2-256
9,983,555 UART: [kat] SHA2-384
9,988,141 UART: [kat] SHA2-512-ACC
9,991,087 UART: [kat] ECC-384
12,431,927 UART: [kat] HMAC-384Kdf
12,444,288 UART: [kat] LMS
12,973,793 UART: [kat] --
12,978,321 UART: [cold-reset] ++
12,979,388 UART: [fht] FHT @ 0x50003400
12,990,427 UART: [idev] ++
12,990,990 UART: [idev] CDI.KEYID = 6
12,992,005 UART: [idev] SUBJECT.KEYID = 7
12,993,115 UART: [idev] UDS.KEYID = 0
12,996,046 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,139,937 UART: [idev] Erasing UDS.KEYID = 0
15,464,484 UART: [idev] Sha1 KeyId Algorithm
15,487,636 UART: [idev] --
15,491,849 UART: [ldev] ++
15,492,420 UART: [ldev] CDI.KEYID = 6
15,493,326 UART: [ldev] SUBJECT.KEYID = 5
15,494,540 UART: [ldev] AUTHORITY.KEYID = 7
15,495,773 UART: [ldev] FE.KEYID = 1
15,505,928 UART: [ldev] Erasing FE.KEYID = 1
17,981,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,699,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,715,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,731,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,747,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,766,619 UART: [ldev] --
19,771,244 UART: [fwproc] Wait for Commands...
19,774,520 UART: [fwproc] Recv command 0x46574c44
19,776,573 UART: [fwproc] Recv'd Img size: 114448 bytes
23,176,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,250,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,319,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,637,546 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,697,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,454,474 >>> mbox cmd response: failed
10,455,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,455,429 >>> mbox cmd response: failed
10,455,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,456,051 >>> mbox cmd response: failed
Initializing fuses
2,047,002 writing to cptra_bootfsm_go
13,122,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,691,481 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,226 UART:
192,583 UART: Running Caliptra ROM ...
193,675 UART:
193,815 UART: [state] CFI Enabled
262,763 UART: [state] LifecycleState = Unprovisioned
265,174 UART: [state] DebugLocked = No
266,475 UART: [state] WD Timer not started. Device not locked for debugging
270,677 UART: [kat] SHA2-256
460,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,297 UART: [kat] ++
471,763 UART: [kat] sha1
484,427 UART: [kat] SHA2-256
487,445 UART: [kat] SHA2-384
493,837 UART: [kat] SHA2-512-ACC
496,402 UART: [kat] ECC-384
2,947,646 UART: [kat] HMAC-384Kdf
2,970,511 UART: [kat] LMS
3,502,316 UART: [kat] --
3,506,715 UART: [cold-reset] ++
3,509,084 UART: [fht] FHT @ 0x50003400
3,521,475 UART: [idev] ++
3,522,159 UART: [idev] CDI.KEYID = 6
3,523,150 UART: [idev] SUBJECT.KEYID = 7
3,524,250 UART: [idev] UDS.KEYID = 0
3,527,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,424 UART: [idev] Erasing UDS.KEYID = 0
6,028,287 UART: [idev] Sha1 KeyId Algorithm
6,049,427 UART: [idev] --
6,054,557 UART: [ldev] ++
6,055,292 UART: [ldev] CDI.KEYID = 6
6,056,178 UART: [ldev] SUBJECT.KEYID = 5
6,057,283 UART: [ldev] AUTHORITY.KEYID = 7
6,058,572 UART: [ldev] FE.KEYID = 1
6,097,451 UART: [ldev] Erasing FE.KEYID = 1
8,603,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,137 UART: [ldev] --
10,410,411 UART: [fwproc] Wait for Commands...
10,413,304 UART: [fwproc] Recv command 0x46574c44
10,415,596 UART: [fwproc] Recv'd Img size: 114448 bytes
10,500,801 UART: ROM Fatal Error: 0x000B0002
10,504,442 >>> mbox cmd response: failed
10,504,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,128 >>> mbox cmd response: failed
10,505,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,680 >>> mbox cmd response: failed
Initializing fuses
2,049,760 writing to cptra_bootfsm_go
2,239,055 UART:
2,239,404 UART: Running Caliptra ROM ...
2,240,449 UART:
2,240,600 UART: [state] CFI Enabled
2,299,632 UART: [state] LifecycleState = Unprovisioned
2,302,001 UART: [state] DebugLocked = No
2,303,318 UART: [state] WD Timer not started. Device not locked for debugging
2,308,420 UART: [kat] SHA2-256
2,498,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,509,059 UART: [kat] ++
2,509,523 UART: [kat] sha1
2,520,248 UART: [kat] SHA2-256
2,523,276 UART: [kat] SHA2-384
2,530,075 UART: [kat] SHA2-512-ACC
2,532,703 UART: [kat] ECC-384
4,983,671 UART: [kat] HMAC-384Kdf
5,007,030 UART: [kat] LMS
5,538,754 UART: [kat] --
5,544,719 UART: [cold-reset] ++
5,546,870 UART: [fht] FHT @ 0x50003400
5,558,300 UART: [idev] ++
5,558,985 UART: [idev] CDI.KEYID = 6
5,560,004 UART: [idev] SUBJECT.KEYID = 7
5,561,111 UART: [idev] UDS.KEYID = 0
5,563,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,689 UART: [idev] Erasing UDS.KEYID = 0
8,069,743 UART: [idev] Sha1 KeyId Algorithm
8,092,344 UART: [idev] --
8,096,506 UART: [ldev] ++
8,097,192 UART: [ldev] CDI.KEYID = 6
8,098,102 UART: [ldev] SUBJECT.KEYID = 5
8,099,263 UART: [ldev] AUTHORITY.KEYID = 7
8,100,496 UART: [ldev] FE.KEYID = 1
8,134,691 UART: [ldev] Erasing FE.KEYID = 1
10,640,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,268 UART: [ldev] --
12,449,153 UART: [fwproc] Wait for Commands...
12,450,978 UART: [fwproc] Recv command 0x46574c44
12,453,235 UART: [fwproc] Recv'd Img size: 114448 bytes
15,906,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,099,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,641,934 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,443,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,706 >>> mbox cmd response: failed
10,303,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,303,605 >>> mbox cmd response: failed
10,303,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,304,174 >>> mbox cmd response: failed
Initializing fuses
2,051,607 writing to cptra_bootfsm_go
5,485,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,759,418 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,593 UART:
192,964 UART: Running Caliptra ROM ...
194,157 UART:
603,735 UART: [state] CFI Enabled
614,600 UART: [state] LifecycleState = Unprovisioned
616,968 UART: [state] DebugLocked = No
619,831 UART: [state] WD Timer not started. Device not locked for debugging
624,990 UART: [kat] SHA2-256
814,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,658 UART: [kat] ++
826,163 UART: [kat] sha1
838,067 UART: [kat] SHA2-256
841,063 UART: [kat] SHA2-384
847,269 UART: [kat] SHA2-512-ACC
849,885 UART: [kat] ECC-384
3,292,282 UART: [kat] HMAC-384Kdf
3,305,647 UART: [kat] LMS
3,837,498 UART: [kat] --
3,841,162 UART: [cold-reset] ++
3,843,740 UART: [fht] FHT @ 0x50003400
3,854,611 UART: [idev] ++
3,855,286 UART: [idev] CDI.KEYID = 6
3,856,299 UART: [idev] SUBJECT.KEYID = 7
3,857,461 UART: [idev] UDS.KEYID = 0
3,860,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,074 UART: [idev] Erasing UDS.KEYID = 0
6,332,549 UART: [idev] Sha1 KeyId Algorithm
6,355,787 UART: [idev] --
6,360,324 UART: [ldev] ++
6,361,018 UART: [ldev] CDI.KEYID = 6
6,361,933 UART: [ldev] SUBJECT.KEYID = 5
6,363,060 UART: [ldev] AUTHORITY.KEYID = 7
6,364,235 UART: [ldev] FE.KEYID = 1
6,376,293 UART: [ldev] Erasing FE.KEYID = 1
8,857,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,756 UART: [ldev] --
10,648,325 UART: [fwproc] Wait for Commands...
10,651,505 UART: [fwproc] Recv command 0x46574c44
10,653,764 UART: [fwproc] Recv'd Img size: 114448 bytes
10,736,879 UART: ROM Fatal Error: 0x000B0002
10,740,562 >>> mbox cmd response: failed
10,740,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,741,316 >>> mbox cmd response: failed
10,741,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,741,900 >>> mbox cmd response: failed
Initializing fuses
2,054,831 writing to cptra_bootfsm_go
2,244,131 UART:
2,244,483 UART: Running Caliptra ROM ...
2,245,567 UART:
9,712,907 UART: [state] CFI Enabled
9,727,288 UART: [state] LifecycleState = Unprovisioned
9,729,688 UART: [state] DebugLocked = No
9,732,128 UART: [state] WD Timer not started. Device not locked for debugging
9,736,854 UART: [kat] SHA2-256
9,926,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,937,533 UART: [kat] ++
9,938,052 UART: [kat] sha1
9,949,104 UART: [kat] SHA2-256
9,952,077 UART: [kat] SHA2-384
9,959,314 UART: [kat] SHA2-512-ACC
9,961,884 UART: [kat] ECC-384
12,401,466 UART: [kat] HMAC-384Kdf
12,414,296 UART: [kat] LMS
12,946,130 UART: [kat] --
12,951,141 UART: [cold-reset] ++
12,953,068 UART: [fht] FHT @ 0x50003400
12,964,695 UART: [idev] ++
12,965,432 UART: [idev] CDI.KEYID = 6
12,966,316 UART: [idev] SUBJECT.KEYID = 7
12,967,520 UART: [idev] UDS.KEYID = 0
12,970,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,114,417 UART: [idev] Erasing UDS.KEYID = 0
15,444,273 UART: [idev] Sha1 KeyId Algorithm
15,466,311 UART: [idev] --
15,470,598 UART: [ldev] ++
15,471,285 UART: [ldev] CDI.KEYID = 6
15,472,166 UART: [ldev] SUBJECT.KEYID = 5
15,473,376 UART: [ldev] AUTHORITY.KEYID = 7
15,474,608 UART: [ldev] FE.KEYID = 1
15,486,090 UART: [ldev] Erasing FE.KEYID = 1
17,964,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,685,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,730,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,751,559 UART: [ldev] --
19,757,037 UART: [fwproc] Wait for Commands...
19,759,154 UART: [fwproc] Recv command 0x46574c44
19,761,414 UART: [fwproc] Recv'd Img size: 114448 bytes
23,210,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,283,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,399,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,943,160 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,754,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,518,405 >>> mbox cmd response: failed
10,518,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,519,287 >>> mbox cmd response: failed
10,519,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,519,844 >>> mbox cmd response: failed
Initializing fuses
2,053,397 writing to cptra_bootfsm_go
13,101,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,301,005 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,571 UART: [kat] SHA2-256
892,509 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
906,928 UART: [kat] LMS
1,475,124 UART: [kat] --
1,476,071 UART: [cold-reset] ++
1,476,573 UART: [fht] Storing FHT @ 0x50003400
1,479,174 UART: [idev] ++
1,479,342 UART: [idev] CDI.KEYID = 6
1,479,702 UART: [idev] SUBJECT.KEYID = 7
1,480,126 UART: [idev] UDS.KEYID = 0
1,480,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,678 UART: [idev] Erasing UDS.KEYID = 0
1,503,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,690 UART: [idev] --
1,513,627 UART: [ldev] ++
1,513,795 UART: [ldev] CDI.KEYID = 6
1,514,158 UART: [ldev] SUBJECT.KEYID = 5
1,514,584 UART: [ldev] AUTHORITY.KEYID = 7
1,515,047 UART: [ldev] FE.KEYID = 1
1,520,209 UART: [ldev] Erasing FE.KEYID = 1
1,545,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,494 UART: [ldev] --
1,584,831 UART: [fwproc] Waiting for Commands...
1,585,656 UART: [fwproc] Received command 0x46574c44
1,586,447 UART: [fwproc] Received Image of size 114448 bytes
1,605,672 UART: ROM Fatal Error: 0x000B0002
1,606,829 >>> mbox cmd response: failed
1,606,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,835 >>> mbox cmd response: failed
1,606,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,363 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,298 UART: [idev] --
1,514,175 UART: [ldev] ++
1,514,343 UART: [ldev] CDI.KEYID = 6
1,514,706 UART: [ldev] SUBJECT.KEYID = 5
1,515,132 UART: [ldev] AUTHORITY.KEYID = 7
1,515,595 UART: [ldev] FE.KEYID = 1
1,520,821 UART: [ldev] Erasing FE.KEYID = 1
1,545,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,536 UART: [ldev] --
1,584,957 UART: [fwproc] Waiting for Commands...
1,585,786 UART: [fwproc] Received command 0x46574c44
1,586,577 UART: [fwproc] Received Image of size 114448 bytes
2,885,599 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,198 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,459,104 >>> mbox cmd response: failed
1,459,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,110 >>> mbox cmd response: failed
1,459,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,862 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,477,072 UART: [fht] Storing FHT @ 0x50003400
1,479,771 UART: [idev] ++
1,479,939 UART: [idev] CDI.KEYID = 6
1,480,299 UART: [idev] SUBJECT.KEYID = 7
1,480,723 UART: [idev] UDS.KEYID = 0
1,481,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,506,233 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,717 UART: [idev] --
1,515,684 UART: [ldev] ++
1,515,852 UART: [ldev] CDI.KEYID = 6
1,516,215 UART: [ldev] SUBJECT.KEYID = 5
1,516,641 UART: [ldev] AUTHORITY.KEYID = 7
1,517,104 UART: [ldev] FE.KEYID = 1
1,522,462 UART: [ldev] Erasing FE.KEYID = 1
1,547,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,674 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114448 bytes
1,607,765 UART: ROM Fatal Error: 0x000B0002
1,608,922 >>> mbox cmd response: failed
1,608,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,928 >>> mbox cmd response: failed
1,608,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,785 UART: [kat] SHA2-512-ACC
897,686 UART: [kat] ECC-384
903,445 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,258 UART: [cold-reset] ++
1,477,594 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,637 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,165 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,521,994 UART: [ldev] Erasing FE.KEYID = 1
1,547,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,423 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,611 UART: [fwproc] Received command 0x46574c44
1,588,402 UART: [fwproc] Received Image of size 114448 bytes
2,889,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,545 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,460,819 >>> mbox cmd response: failed
1,460,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,825 >>> mbox cmd response: failed
1,460,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,477 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,966 UART: [kat] LMS
1,171,294 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,795 UART: [fht] FHT @ 0x50003400
1,175,400 UART: [idev] ++
1,175,568 UART: [idev] CDI.KEYID = 6
1,175,928 UART: [idev] SUBJECT.KEYID = 7
1,176,352 UART: [idev] UDS.KEYID = 0
1,176,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,110 UART: [idev] Erasing UDS.KEYID = 0
1,200,831 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,609 UART: [ldev] ++
1,210,777 UART: [ldev] CDI.KEYID = 6
1,211,140 UART: [ldev] SUBJECT.KEYID = 5
1,211,566 UART: [ldev] AUTHORITY.KEYID = 7
1,212,029 UART: [ldev] FE.KEYID = 1
1,217,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,867 UART: [ldev] --
1,283,316 UART: [fwproc] Wait for Commands...
1,283,972 UART: [fwproc] Recv command 0x46574c44
1,284,700 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,979 UART: ROM Fatal Error: 0x000B0002
1,305,136 >>> mbox cmd response: failed
1,305,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,142 >>> mbox cmd response: failed
1,305,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,396 UART: [kat] LMS
1,170,724 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,018 UART: [idev] Erasing UDS.KEYID = 0
1,200,689 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,512 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,207 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,745 >>> mbox cmd response: failed
1,158,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,751 >>> mbox cmd response: failed
1,158,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,842 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,587 UART: [kat] LMS
1,170,915 UART: [kat] --
1,171,552 UART: [cold-reset] ++
1,171,984 UART: [fht] FHT @ 0x50003400
1,174,631 UART: [idev] ++
1,174,799 UART: [idev] CDI.KEYID = 6
1,175,159 UART: [idev] SUBJECT.KEYID = 7
1,175,583 UART: [idev] UDS.KEYID = 0
1,175,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,915 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,210,986 UART: [ldev] ++
1,211,154 UART: [ldev] CDI.KEYID = 6
1,211,517 UART: [ldev] SUBJECT.KEYID = 5
1,211,943 UART: [ldev] AUTHORITY.KEYID = 7
1,212,406 UART: [ldev] FE.KEYID = 1
1,217,512 UART: [ldev] Erasing FE.KEYID = 1
1,243,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,618 UART: [ldev] --
1,283,071 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,568 UART: ROM Fatal Error: 0x000B0002
1,304,725 >>> mbox cmd response: failed
1,304,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,731 >>> mbox cmd response: failed
1,304,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,503 UART: [kat] LMS
1,171,831 UART: [kat] --
1,172,758 UART: [cold-reset] ++
1,173,098 UART: [fht] FHT @ 0x50003400
1,175,765 UART: [idev] ++
1,175,933 UART: [idev] CDI.KEYID = 6
1,176,293 UART: [idev] SUBJECT.KEYID = 7
1,176,717 UART: [idev] UDS.KEYID = 0
1,177,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,919 UART: [idev] Erasing UDS.KEYID = 0
1,202,300 UART: [idev] Sha1 KeyId Algorithm
1,210,822 UART: [idev] --
1,211,940 UART: [ldev] ++
1,212,108 UART: [ldev] CDI.KEYID = 6
1,212,471 UART: [ldev] SUBJECT.KEYID = 5
1,212,897 UART: [ldev] AUTHORITY.KEYID = 7
1,213,360 UART: [ldev] FE.KEYID = 1
1,218,654 UART: [ldev] Erasing FE.KEYID = 1
1,245,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,474 UART: [ldev] --
1,284,777 UART: [fwproc] Wait for Commands...
1,285,477 UART: [fwproc] Recv command 0x46574c44
1,286,205 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,086 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,408 >>> mbox cmd response: failed
1,159,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,414 >>> mbox cmd response: failed
1,159,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,143 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
85,919 UART: [state] WD Timer not started. Device not locked for debugging
87,132 UART: [kat] SHA2-256
890,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,811 UART: [kat] ++
894,963 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
904,032 UART: [kat] SHA2-512-ACC
905,933 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,197 UART: [idev] Erasing UDS.KEYID = 0
1,197,835 UART: [idev] Sha1 KeyId Algorithm
1,206,575 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,436 UART: [ldev] Erasing FE.KEYID = 1
1,240,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,554 UART: [ldev] --
1,279,852 UART: [fwproc] Wait for Commands...
1,280,531 UART: [fwproc] Recv command 0x46574c44
1,281,264 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,102 UART: ROM Fatal Error: 0x000B0002
1,301,259 >>> mbox cmd response: failed
1,301,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,265 >>> mbox cmd response: failed
1,301,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
905,010 UART: [kat] SHA2-512-ACC
906,911 UART: [kat] ECC-384
916,802 UART: [kat] HMAC-384Kdf
921,258 UART: [kat] LMS
1,169,570 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,174,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,208,976 UART: [ldev] ++
1,209,144 UART: [ldev] CDI.KEYID = 6
1,209,508 UART: [ldev] SUBJECT.KEYID = 5
1,209,935 UART: [ldev] AUTHORITY.KEYID = 7
1,210,398 UART: [ldev] FE.KEYID = 1
1,215,748 UART: [ldev] Erasing FE.KEYID = 1
1,241,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,315 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,676 >>> mbox cmd response: failed
1,154,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,682 >>> mbox cmd response: failed
1,154,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,545 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,789 UART: [ldev] ++
1,208,957 UART: [ldev] CDI.KEYID = 6
1,209,321 UART: [ldev] SUBJECT.KEYID = 5
1,209,748 UART: [ldev] AUTHORITY.KEYID = 7
1,210,211 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,241,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,163 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,140 UART: [fwproc] Recv command 0x46574c44
1,282,873 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,427 UART: ROM Fatal Error: 0x000B0002
1,303,584 >>> mbox cmd response: failed
1,303,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,590 >>> mbox cmd response: failed
1,303,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,343 UART: [kat] SHA2-256
891,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,022 UART: [kat] ++
896,174 UART: [kat] sha1
900,526 UART: [kat] SHA2-256
902,466 UART: [kat] SHA2-384
905,077 UART: [kat] SHA2-512-ACC
906,978 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,764 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,555 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,961 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,482 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,931 >>> mbox cmd response: failed
1,155,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,937 >>> mbox cmd response: failed
1,155,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,834 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,142 UART:
192,509 UART: Running Caliptra ROM ...
193,640 UART:
193,788 UART: [state] CFI Enabled
263,953 UART: [state] LifecycleState = Unprovisioned
265,949 UART: [state] DebugLocked = No
268,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,395 UART: [kat] SHA2-256
443,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,613 UART: [kat] ++
454,141 UART: [kat] sha1
464,160 UART: [kat] SHA2-256
466,837 UART: [kat] SHA2-384
471,306 UART: [kat] SHA2-512-ACC
473,696 UART: [kat] ECC-384
2,767,625 UART: [kat] HMAC-384Kdf
2,799,208 UART: [kat] LMS
3,989,498 UART: [kat] --
3,995,789 UART: [cold-reset] ++
3,998,106 UART: [fht] Storing FHT @ 0x50003400
4,009,755 UART: [idev] ++
4,010,353 UART: [idev] CDI.KEYID = 6
4,011,245 UART: [idev] SUBJECT.KEYID = 7
4,012,517 UART: [idev] UDS.KEYID = 0
4,015,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,210 UART: [idev] Erasing UDS.KEYID = 0
7,344,636 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,322 UART: [idev] --
7,370,072 UART: [ldev] ++
7,370,642 UART: [ldev] CDI.KEYID = 6
7,371,610 UART: [ldev] SUBJECT.KEYID = 5
7,372,822 UART: [ldev] AUTHORITY.KEYID = 7
7,374,111 UART: [ldev] FE.KEYID = 1
7,420,736 UART: [ldev] Erasing FE.KEYID = 1
10,755,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,810 UART: [ldev] --
13,132,726 UART: [fwproc] Waiting for Commands...
13,134,719 UART: [fwproc] Received command 0x46574c44
13,136,910 UART: [fwproc] Received Image of size 114124 bytes
14,532,787 UART: ROM Fatal Error: 0x000B0019
14,536,286 >>> mbox cmd response: failed
14,536,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,537,015 >>> mbox cmd response: failed
14,537,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,537,579 >>> mbox cmd response: failed
Initializing fuses
2,053,262 writing to cptra_bootfsm_go
2,242,579 UART:
2,242,925 UART: Running Caliptra ROM ...
2,244,077 UART:
2,244,252 UART: [state] CFI Enabled
2,317,566 UART: [state] LifecycleState = Unprovisioned
2,319,501 UART: [state] DebugLocked = No
2,322,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,308 UART: [kat] SHA2-256
2,496,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,506 UART: [kat] ++
2,507,971 UART: [kat] sha1
2,518,966 UART: [kat] SHA2-256
2,521,679 UART: [kat] SHA2-384
2,527,837 UART: [kat] SHA2-512-ACC
2,530,231 UART: [kat] ECC-384
4,820,967 UART: [kat] HMAC-384Kdf
4,834,571 UART: [kat] LMS
6,024,921 UART: [kat] --
6,029,538 UART: [cold-reset] ++
6,030,992 UART: [fht] Storing FHT @ 0x50003400
6,042,049 UART: [idev] ++
6,042,624 UART: [idev] CDI.KEYID = 6
6,043,509 UART: [idev] SUBJECT.KEYID = 7
6,044,782 UART: [idev] UDS.KEYID = 0
6,047,603 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,191,119 UART: [idev] Erasing UDS.KEYID = 0
9,379,757 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,449 UART: [idev] --
9,405,960 UART: [ldev] ++
9,406,569 UART: [ldev] CDI.KEYID = 6
9,407,457 UART: [ldev] SUBJECT.KEYID = 5
9,408,667 UART: [ldev] AUTHORITY.KEYID = 7
9,409,855 UART: [ldev] FE.KEYID = 1
9,457,558 UART: [ldev] Erasing FE.KEYID = 1
12,787,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,098,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,148,367 UART: [ldev] --
15,152,769 UART: [fwproc] Waiting for Commands...
15,154,542 UART: [fwproc] Received command 0x46574c44
15,156,730 UART: [fwproc] Received Image of size 114124 bytes
19,212,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,287,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,356,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,674,086 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,812,866 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,283,592 >>> mbox cmd response: failed
14,284,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,284,490 >>> mbox cmd response: failed
14,284,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,285,051 >>> mbox cmd response: failed
Initializing fuses
2,051,187 writing to cptra_bootfsm_go
5,820,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,892,524 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,535 UART:
192,890 UART: Running Caliptra ROM ...
194,067 UART:
603,559 UART: [state] CFI Enabled
615,570 UART: [state] LifecycleState = Unprovisioned
617,516 UART: [state] DebugLocked = No
619,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,933 UART: [kat] SHA2-256
794,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,222 UART: [kat] ++
805,755 UART: [kat] sha1
817,452 UART: [kat] SHA2-256
820,136 UART: [kat] SHA2-384
824,764 UART: [kat] SHA2-512-ACC
827,100 UART: [kat] ECC-384
3,109,670 UART: [kat] HMAC-384Kdf
3,122,630 UART: [kat] LMS
4,312,767 UART: [kat] --
4,318,330 UART: [cold-reset] ++
4,320,486 UART: [fht] Storing FHT @ 0x50003400
4,332,564 UART: [idev] ++
4,333,152 UART: [idev] CDI.KEYID = 6
4,334,174 UART: [idev] SUBJECT.KEYID = 7
4,335,338 UART: [idev] UDS.KEYID = 0
4,338,288 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,869 UART: [idev] Erasing UDS.KEYID = 0
7,619,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,501 UART: [idev] --
7,645,854 UART: [ldev] ++
7,646,479 UART: [ldev] CDI.KEYID = 6
7,647,393 UART: [ldev] SUBJECT.KEYID = 5
7,648,608 UART: [ldev] AUTHORITY.KEYID = 7
7,649,891 UART: [ldev] FE.KEYID = 1
7,661,409 UART: [ldev] Erasing FE.KEYID = 1
10,949,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,737 UART: [ldev] --
13,308,297 UART: [fwproc] Waiting for Commands...
13,310,555 UART: [fwproc] Received command 0x46574c44
13,312,739 UART: [fwproc] Received Image of size 114124 bytes
14,707,600 UART: ROM Fatal Error: 0x000B0019
14,711,102 >>> mbox cmd response: failed
14,711,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,711,767 >>> mbox cmd response: failed
14,712,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,712,330 >>> mbox cmd response: failed
Initializing fuses
2,057,604 writing to cptra_bootfsm_go
2,246,876 UART:
2,247,232 UART: Running Caliptra ROM ...
2,248,285 UART:
5,757,716 UART: [state] CFI Enabled
5,773,434 UART: [state] LifecycleState = Unprovisioned
5,775,350 UART: [state] DebugLocked = No
5,776,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,781,821 UART: [kat] SHA2-256
5,951,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,962,153 UART: [kat] ++
5,962,612 UART: [kat] sha1
5,972,851 UART: [kat] SHA2-256
5,975,540 UART: [kat] SHA2-384
5,980,178 UART: [kat] SHA2-512-ACC
5,982,526 UART: [kat] ECC-384
8,267,068 UART: [kat] HMAC-384Kdf
8,278,825 UART: [kat] LMS
9,468,970 UART: [kat] --
9,472,926 UART: [cold-reset] ++
9,475,565 UART: [fht] Storing FHT @ 0x50003400
9,486,344 UART: [idev] ++
9,486,919 UART: [idev] CDI.KEYID = 6
9,488,044 UART: [idev] SUBJECT.KEYID = 7
9,489,154 UART: [idev] UDS.KEYID = 0
9,491,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,635,218 UART: [idev] Erasing UDS.KEYID = 0
12,777,458 UART: [idev] Using Sha1 for KeyId Algorithm
12,798,946 UART: [idev] --
12,802,809 UART: [ldev] ++
12,803,384 UART: [ldev] CDI.KEYID = 6
12,804,324 UART: [ldev] SUBJECT.KEYID = 5
12,805,586 UART: [ldev] AUTHORITY.KEYID = 7
12,806,828 UART: [ldev] FE.KEYID = 1
12,817,505 UART: [ldev] Erasing FE.KEYID = 1
16,103,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,396,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,410,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,425,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,440,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,459,955 UART: [ldev] --
18,465,384 UART: [fwproc] Waiting for Commands...
18,467,465 UART: [fwproc] Received command 0x46574c44
18,469,661 UART: [fwproc] Received Image of size 114124 bytes
22,521,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,597,978 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,666,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,984,606 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,125,822 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,452,401 >>> mbox cmd response: failed
14,452,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,307 >>> mbox cmd response: failed
14,453,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,882 >>> mbox cmd response: failed
Initializing fuses
2,048,500 writing to cptra_bootfsm_go
9,552,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,490,575 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,274 UART:
192,629 UART: Running Caliptra ROM ...
193,804 UART:
193,958 UART: [state] CFI Enabled
261,274 UART: [state] LifecycleState = Unprovisioned
263,147 UART: [state] DebugLocked = No
264,966 UART: [state] WD Timer not started. Device not locked for debugging
269,023 UART: [kat] SHA2-256
448,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,740 UART: [kat] ++
460,276 UART: [kat] sha1
470,891 UART: [kat] SHA2-256
473,892 UART: [kat] SHA2-384
480,471 UART: [kat] SHA2-512-ACC
483,443 UART: [kat] ECC-384
2,946,163 UART: [kat] HMAC-384Kdf
2,971,415 UART: [kat] LMS
3,500,870 UART: [kat] --
3,504,534 UART: [cold-reset] ++
3,506,087 UART: [fht] FHT @ 0x50003400
3,516,021 UART: [idev] ++
3,516,632 UART: [idev] CDI.KEYID = 6
3,517,524 UART: [idev] SUBJECT.KEYID = 7
3,518,760 UART: [idev] UDS.KEYID = 0
3,521,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,726 UART: [idev] Erasing UDS.KEYID = 0
6,022,511 UART: [idev] Sha1 KeyId Algorithm
6,045,534 UART: [idev] --
6,050,233 UART: [ldev] ++
6,050,806 UART: [ldev] CDI.KEYID = 6
6,051,691 UART: [ldev] SUBJECT.KEYID = 5
6,052,906 UART: [ldev] AUTHORITY.KEYID = 7
6,054,140 UART: [ldev] FE.KEYID = 1
6,100,219 UART: [ldev] Erasing FE.KEYID = 1
8,599,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,947 UART: [ldev] --
10,393,293 UART: [fwproc] Wait for Commands...
10,395,609 UART: [fwproc] Recv command 0x46574c44
10,397,698 UART: [fwproc] Recv'd Img size: 114448 bytes
11,468,690 UART: ROM Fatal Error: 0x000B0019
11,471,805 >>> mbox cmd response: failed
11,472,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,567 >>> mbox cmd response: failed
11,472,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,473,129 >>> mbox cmd response: failed
Initializing fuses
2,052,219 writing to cptra_bootfsm_go
2,241,531 UART:
2,241,895 UART: Running Caliptra ROM ...
2,243,038 UART:
2,243,214 UART: [state] CFI Enabled
2,315,877 UART: [state] LifecycleState = Unprovisioned
2,317,755 UART: [state] DebugLocked = No
2,319,113 UART: [state] WD Timer not started. Device not locked for debugging
2,322,426 UART: [kat] SHA2-256
2,501,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,152 UART: [kat] ++
2,513,610 UART: [kat] sha1
2,525,195 UART: [kat] SHA2-256
2,528,197 UART: [kat] SHA2-384
2,534,200 UART: [kat] SHA2-512-ACC
2,537,158 UART: [kat] ECC-384
5,000,093 UART: [kat] HMAC-384Kdf
5,022,334 UART: [kat] LMS
5,551,780 UART: [kat] --
5,557,822 UART: [cold-reset] ++
5,559,158 UART: [fht] FHT @ 0x50003400
5,569,002 UART: [idev] ++
5,569,613 UART: [idev] CDI.KEYID = 6
5,570,538 UART: [idev] SUBJECT.KEYID = 7
5,571,702 UART: [idev] UDS.KEYID = 0
5,574,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,431 UART: [idev] Erasing UDS.KEYID = 0
8,077,081 UART: [idev] Sha1 KeyId Algorithm
8,100,266 UART: [idev] --
8,104,208 UART: [ldev] ++
8,104,782 UART: [ldev] CDI.KEYID = 6
8,105,691 UART: [ldev] SUBJECT.KEYID = 5
8,106,852 UART: [ldev] AUTHORITY.KEYID = 7
8,108,141 UART: [ldev] FE.KEYID = 1
8,150,747 UART: [ldev] Erasing FE.KEYID = 1
10,655,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,019 UART: [ldev] --
12,461,898 UART: [fwproc] Wait for Commands...
12,463,510 UART: [fwproc] Recv command 0x46574c44
12,465,604 UART: [fwproc] Recv'd Img size: 114448 bytes
15,868,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,945,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,014,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,332,590 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,363,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,272,034 >>> mbox cmd response: failed
11,272,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,273,054 >>> mbox cmd response: failed
11,273,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,273,615 >>> mbox cmd response: failed
Initializing fuses
2,062,183 writing to cptra_bootfsm_go
5,418,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,136,920 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,498 UART:
192,855 UART: Running Caliptra ROM ...
194,062 UART:
603,438 UART: [state] CFI Enabled
614,398 UART: [state] LifecycleState = Unprovisioned
616,292 UART: [state] DebugLocked = No
618,297 UART: [state] WD Timer not started. Device not locked for debugging
621,189 UART: [kat] SHA2-256
800,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,880 UART: [kat] ++
812,330 UART: [kat] sha1
822,773 UART: [kat] SHA2-256
825,841 UART: [kat] SHA2-384
832,577 UART: [kat] SHA2-512-ACC
835,510 UART: [kat] ECC-384
3,277,292 UART: [kat] HMAC-384Kdf
3,288,432 UART: [kat] LMS
3,817,931 UART: [kat] --
3,823,656 UART: [cold-reset] ++
3,824,650 UART: [fht] FHT @ 0x50003400
3,836,664 UART: [idev] ++
3,837,235 UART: [idev] CDI.KEYID = 6
3,838,214 UART: [idev] SUBJECT.KEYID = 7
3,839,312 UART: [idev] UDS.KEYID = 0
3,842,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,394 UART: [idev] Erasing UDS.KEYID = 0
6,309,121 UART: [idev] Sha1 KeyId Algorithm
6,332,903 UART: [idev] --
6,337,275 UART: [ldev] ++
6,337,843 UART: [ldev] CDI.KEYID = 6
6,338,739 UART: [ldev] SUBJECT.KEYID = 5
6,339,894 UART: [ldev] AUTHORITY.KEYID = 7
6,341,180 UART: [ldev] FE.KEYID = 1
6,351,800 UART: [ldev] Erasing FE.KEYID = 1
8,823,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,230 UART: [ldev] --
10,616,382 UART: [fwproc] Wait for Commands...
10,619,661 UART: [fwproc] Recv command 0x46574c44
10,621,885 UART: [fwproc] Recv'd Img size: 114448 bytes
11,690,597 UART: ROM Fatal Error: 0x000B0019
11,693,713 >>> mbox cmd response: failed
11,694,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,694,443 >>> mbox cmd response: failed
11,694,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,694,998 >>> mbox cmd response: failed
Initializing fuses
2,052,557 writing to cptra_bootfsm_go
2,241,918 UART:
2,242,256 UART: Running Caliptra ROM ...
2,243,389 UART:
8,760,457 UART: [state] CFI Enabled
8,772,880 UART: [state] LifecycleState = Unprovisioned
8,774,775 UART: [state] DebugLocked = No
8,776,874 UART: [state] WD Timer not started. Device not locked for debugging
8,780,565 UART: [kat] SHA2-256
8,959,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,971,298 UART: [kat] ++
8,971,842 UART: [kat] sha1
8,983,219 UART: [kat] SHA2-256
8,986,261 UART: [kat] SHA2-384
8,993,757 UART: [kat] SHA2-512-ACC
8,996,701 UART: [kat] ECC-384
11,437,997 UART: [kat] HMAC-384Kdf
11,450,985 UART: [kat] LMS
11,980,475 UART: [kat] --
11,985,014 UART: [cold-reset] ++
11,985,985 UART: [fht] FHT @ 0x50003400
11,996,433 UART: [idev] ++
11,996,997 UART: [idev] CDI.KEYID = 6
11,998,010 UART: [idev] SUBJECT.KEYID = 7
11,999,116 UART: [idev] UDS.KEYID = 0
12,001,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,145,810 UART: [idev] Erasing UDS.KEYID = 0
14,468,767 UART: [idev] Sha1 KeyId Algorithm
14,492,065 UART: [idev] --
14,496,783 UART: [ldev] ++
14,497,354 UART: [ldev] CDI.KEYID = 6
14,498,237 UART: [ldev] SUBJECT.KEYID = 5
14,499,448 UART: [ldev] AUTHORITY.KEYID = 7
14,500,740 UART: [ldev] FE.KEYID = 1
14,509,904 UART: [ldev] Erasing FE.KEYID = 1
16,979,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,699,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,715,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,731,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,747,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,767,586 UART: [ldev] --
18,772,455 UART: [fwproc] Wait for Commands...
18,775,694 UART: [fwproc] Recv command 0x46574c44
18,777,746 UART: [fwproc] Recv'd Img size: 114448 bytes
22,184,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,257,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,326,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,644,728 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,695,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,478,904 >>> mbox cmd response: failed
11,480,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,480,412 >>> mbox cmd response: failed
11,480,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,480,929 >>> mbox cmd response: failed
Initializing fuses
2,050,382 writing to cptra_bootfsm_go
12,084,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,650,256 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,069 UART:
192,432 UART: Running Caliptra ROM ...
193,572 UART:
193,720 UART: [state] CFI Enabled
260,009 UART: [state] LifecycleState = Unprovisioned
262,422 UART: [state] DebugLocked = No
264,401 UART: [state] WD Timer not started. Device not locked for debugging
268,707 UART: [kat] SHA2-256
458,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,356 UART: [kat] ++
469,839 UART: [kat] sha1
480,883 UART: [kat] SHA2-256
483,892 UART: [kat] SHA2-384
491,598 UART: [kat] SHA2-512-ACC
494,160 UART: [kat] ECC-384
2,949,480 UART: [kat] HMAC-384Kdf
2,971,620 UART: [kat] LMS
3,503,370 UART: [kat] --
3,508,226 UART: [cold-reset] ++
3,509,403 UART: [fht] FHT @ 0x50003400
3,521,244 UART: [idev] ++
3,521,921 UART: [idev] CDI.KEYID = 6
3,522,939 UART: [idev] SUBJECT.KEYID = 7
3,524,099 UART: [idev] UDS.KEYID = 0
3,526,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,929 UART: [idev] Erasing UDS.KEYID = 0
6,025,182 UART: [idev] Sha1 KeyId Algorithm
6,047,542 UART: [idev] --
6,052,538 UART: [ldev] ++
6,053,229 UART: [ldev] CDI.KEYID = 6
6,054,116 UART: [ldev] SUBJECT.KEYID = 5
6,055,219 UART: [ldev] AUTHORITY.KEYID = 7
6,056,530 UART: [ldev] FE.KEYID = 1
6,099,885 UART: [ldev] Erasing FE.KEYID = 1
8,601,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,874 UART: [ldev] --
10,413,900 UART: [fwproc] Wait for Commands...
10,416,160 UART: [fwproc] Recv command 0x46574c44
10,418,420 UART: [fwproc] Recv'd Img size: 114448 bytes
11,518,004 UART: ROM Fatal Error: 0x000B0019
11,521,669 >>> mbox cmd response: failed
11,522,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,364 >>> mbox cmd response: failed
11,522,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,943 >>> mbox cmd response: failed
Initializing fuses
2,053,368 writing to cptra_bootfsm_go
2,242,668 UART:
2,243,018 UART: Running Caliptra ROM ...
2,244,160 UART:
2,244,326 UART: [state] CFI Enabled
2,306,879 UART: [state] LifecycleState = Unprovisioned
2,309,307 UART: [state] DebugLocked = No
2,310,645 UART: [state] WD Timer not started. Device not locked for debugging
2,315,964 UART: [kat] SHA2-256
2,505,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,648 UART: [kat] ++
2,517,210 UART: [kat] sha1
2,528,102 UART: [kat] SHA2-256
2,531,109 UART: [kat] SHA2-384
2,535,543 UART: [kat] SHA2-512-ACC
2,538,115 UART: [kat] ECC-384
4,992,558 UART: [kat] HMAC-384Kdf
5,016,348 UART: [kat] LMS
5,548,129 UART: [kat] --
5,553,901 UART: [cold-reset] ++
5,555,457 UART: [fht] FHT @ 0x50003400
5,566,405 UART: [idev] ++
5,567,145 UART: [idev] CDI.KEYID = 6
5,568,070 UART: [idev] SUBJECT.KEYID = 7
5,569,240 UART: [idev] UDS.KEYID = 0
5,571,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,647 UART: [idev] Erasing UDS.KEYID = 0
8,073,952 UART: [idev] Sha1 KeyId Algorithm
8,096,170 UART: [idev] --
8,101,087 UART: [ldev] ++
8,101,770 UART: [ldev] CDI.KEYID = 6
8,102,839 UART: [ldev] SUBJECT.KEYID = 5
8,103,947 UART: [ldev] AUTHORITY.KEYID = 7
8,105,122 UART: [ldev] FE.KEYID = 1
8,144,661 UART: [ldev] Erasing FE.KEYID = 1
10,651,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,109 UART: [ldev] --
12,458,310 UART: [fwproc] Wait for Commands...
12,460,410 UART: [fwproc] Recv command 0x46574c44
12,462,740 UART: [fwproc] Recv'd Img size: 114448 bytes
15,914,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,654,094 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,440,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,328,739 >>> mbox cmd response: failed
11,329,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,329,630 >>> mbox cmd response: failed
11,329,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,330,212 >>> mbox cmd response: failed
Initializing fuses
2,055,176 writing to cptra_bootfsm_go
5,487,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,791,052 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,637 UART:
192,986 UART: Running Caliptra ROM ...
194,180 UART:
603,897 UART: [state] CFI Enabled
619,089 UART: [state] LifecycleState = Unprovisioned
621,472 UART: [state] DebugLocked = No
623,012 UART: [state] WD Timer not started. Device not locked for debugging
628,358 UART: [kat] SHA2-256
818,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,011 UART: [kat] ++
829,548 UART: [kat] sha1
841,135 UART: [kat] SHA2-256
844,130 UART: [kat] SHA2-384
850,004 UART: [kat] SHA2-512-ACC
852,570 UART: [kat] ECC-384
3,294,665 UART: [kat] HMAC-384Kdf
3,307,919 UART: [kat] LMS
3,839,744 UART: [kat] --
3,844,974 UART: [cold-reset] ++
3,846,854 UART: [fht] FHT @ 0x50003400
3,858,590 UART: [idev] ++
3,859,270 UART: [idev] CDI.KEYID = 6
3,860,237 UART: [idev] SUBJECT.KEYID = 7
3,861,411 UART: [idev] UDS.KEYID = 0
3,864,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,033 UART: [idev] Erasing UDS.KEYID = 0
6,338,713 UART: [idev] Sha1 KeyId Algorithm
6,360,002 UART: [idev] --
6,364,140 UART: [ldev] ++
6,364,830 UART: [ldev] CDI.KEYID = 6
6,365,712 UART: [ldev] SUBJECT.KEYID = 5
6,366,924 UART: [ldev] AUTHORITY.KEYID = 7
6,368,061 UART: [ldev] FE.KEYID = 1
6,380,655 UART: [ldev] Erasing FE.KEYID = 1
8,859,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,448 UART: [ldev] --
10,652,038 UART: [fwproc] Wait for Commands...
10,653,927 UART: [fwproc] Recv command 0x46574c44
10,656,190 UART: [fwproc] Recv'd Img size: 114448 bytes
11,763,267 UART: ROM Fatal Error: 0x000B0019
11,766,884 >>> mbox cmd response: failed
11,767,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,767,653 >>> mbox cmd response: failed
11,767,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,768,214 >>> mbox cmd response: failed
Initializing fuses
2,057,379 writing to cptra_bootfsm_go
2,246,689 UART:
2,247,053 UART: Running Caliptra ROM ...
2,248,196 UART:
8,687,755 UART: [state] CFI Enabled
8,702,619 UART: [state] LifecycleState = Unprovisioned
8,705,028 UART: [state] DebugLocked = No
8,707,015 UART: [state] WD Timer not started. Device not locked for debugging
8,710,981 UART: [kat] SHA2-256
8,900,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,911,642 UART: [kat] ++
8,912,247 UART: [kat] sha1
8,923,633 UART: [kat] SHA2-256
8,926,699 UART: [kat] SHA2-384
8,932,263 UART: [kat] SHA2-512-ACC
8,934,843 UART: [kat] ECC-384
11,377,114 UART: [kat] HMAC-384Kdf
11,388,747 UART: [kat] LMS
11,920,598 UART: [kat] --
11,924,241 UART: [cold-reset] ++
11,925,157 UART: [fht] FHT @ 0x50003400
11,937,001 UART: [idev] ++
11,937,692 UART: [idev] CDI.KEYID = 6
11,938,708 UART: [idev] SUBJECT.KEYID = 7
11,939,810 UART: [idev] UDS.KEYID = 0
11,942,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,086,503 UART: [idev] Erasing UDS.KEYID = 0
14,416,315 UART: [idev] Sha1 KeyId Algorithm
14,438,687 UART: [idev] --
14,443,746 UART: [ldev] ++
14,444,442 UART: [ldev] CDI.KEYID = 6
14,445,362 UART: [ldev] SUBJECT.KEYID = 5
14,446,522 UART: [ldev] AUTHORITY.KEYID = 7
14,447,695 UART: [ldev] FE.KEYID = 1
14,458,626 UART: [ldev] Erasing FE.KEYID = 1
16,934,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,654,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,669,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,684,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,699,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,721,093 UART: [ldev] --
18,726,358 UART: [fwproc] Wait for Commands...
18,728,677 UART: [fwproc] Recv command 0x46574c44
18,730,935 UART: [fwproc] Recv'd Img size: 114448 bytes
22,174,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,250,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,366,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,909,160 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,758,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,531,815 >>> mbox cmd response: failed
11,532,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,533,026 >>> mbox cmd response: failed
11,533,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,533,596 >>> mbox cmd response: failed
Initializing fuses
2,047,414 writing to cptra_bootfsm_go
12,088,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,283,374 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,669 UART: [kat] SHA2-256
881,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,715 UART: [kat] ++
885,867 UART: [kat] sha1
890,043 UART: [kat] SHA2-256
891,981 UART: [kat] SHA2-384
894,848 UART: [kat] SHA2-512-ACC
896,749 UART: [kat] ECC-384
902,324 UART: [kat] HMAC-384Kdf
906,912 UART: [kat] LMS
1,475,108 UART: [kat] --
1,475,781 UART: [cold-reset] ++
1,476,345 UART: [fht] Storing FHT @ 0x50003400
1,479,140 UART: [idev] ++
1,479,308 UART: [idev] CDI.KEYID = 6
1,479,668 UART: [idev] SUBJECT.KEYID = 7
1,480,092 UART: [idev] UDS.KEYID = 0
1,480,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,136 UART: [idev] Erasing UDS.KEYID = 0
1,504,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,878 UART: [idev] --
1,514,027 UART: [ldev] ++
1,514,195 UART: [ldev] CDI.KEYID = 6
1,514,558 UART: [ldev] SUBJECT.KEYID = 5
1,514,984 UART: [ldev] AUTHORITY.KEYID = 7
1,515,447 UART: [ldev] FE.KEYID = 1
1,520,711 UART: [ldev] Erasing FE.KEYID = 1
1,546,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,008 UART: [ldev] --
1,585,287 UART: [fwproc] Waiting for Commands...
1,585,982 UART: [fwproc] Received command 0x46574c44
1,586,773 UART: [fwproc] Received Image of size 114448 bytes
1,626,340 UART: ROM Fatal Error: 0x000B0019
1,627,497 >>> mbox cmd response: failed
1,627,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,503 >>> mbox cmd response: failed
1,627,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,185 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,628 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,117 UART: [ldev] ++
1,515,285 UART: [ldev] CDI.KEYID = 6
1,515,648 UART: [ldev] SUBJECT.KEYID = 5
1,516,074 UART: [ldev] AUTHORITY.KEYID = 7
1,516,537 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,546,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,966 UART: [ldev] --
1,586,411 UART: [fwproc] Waiting for Commands...
1,587,074 UART: [fwproc] Received command 0x46574c44
1,587,865 UART: [fwproc] Received Image of size 114448 bytes
2,886,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,210 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,610 >>> mbox cmd response: failed
1,479,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,616 >>> mbox cmd response: failed
1,479,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,008 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,462 UART: [kat] SHA2-256
882,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,508 UART: [kat] ++
886,660 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,369 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,476,972 UART: [cold-reset] ++
1,477,384 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,181 UART: [idev] Erasing UDS.KEYID = 0
1,506,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,325 UART: [idev] --
1,516,400 UART: [ldev] ++
1,516,568 UART: [ldev] CDI.KEYID = 6
1,516,931 UART: [ldev] SUBJECT.KEYID = 5
1,517,357 UART: [ldev] AUTHORITY.KEYID = 7
1,517,820 UART: [ldev] FE.KEYID = 1
1,523,372 UART: [ldev] Erasing FE.KEYID = 1
1,548,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,717 UART: [ldev] --
1,588,096 UART: [fwproc] Waiting for Commands...
1,588,801 UART: [fwproc] Received command 0x46574c44
1,589,592 UART: [fwproc] Received Image of size 114448 bytes
1,628,903 UART: ROM Fatal Error: 0x000B0019
1,630,060 >>> mbox cmd response: failed
1,630,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,066 >>> mbox cmd response: failed
1,630,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,970 UART: [kat] SHA2-256
881,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,016 UART: [kat] ++
886,168 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
907,105 UART: [kat] LMS
1,475,301 UART: [kat] --
1,476,108 UART: [cold-reset] ++
1,476,526 UART: [fht] Storing FHT @ 0x50003400
1,479,417 UART: [idev] ++
1,479,585 UART: [idev] CDI.KEYID = 6
1,479,945 UART: [idev] SUBJECT.KEYID = 7
1,480,369 UART: [idev] UDS.KEYID = 0
1,480,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,111 UART: [idev] Erasing UDS.KEYID = 0
1,504,139 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,911 UART: [idev] --
1,514,102 UART: [ldev] ++
1,514,270 UART: [ldev] CDI.KEYID = 6
1,514,633 UART: [ldev] SUBJECT.KEYID = 5
1,515,059 UART: [ldev] AUTHORITY.KEYID = 7
1,515,522 UART: [ldev] FE.KEYID = 1
1,520,848 UART: [ldev] Erasing FE.KEYID = 1
1,546,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,313 UART: [ldev] --
1,585,812 UART: [fwproc] Waiting for Commands...
1,586,647 UART: [fwproc] Received command 0x46574c44
1,587,438 UART: [fwproc] Received Image of size 114448 bytes
2,885,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,480,801 >>> mbox cmd response: failed
1,480,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,807 >>> mbox cmd response: failed
1,480,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,323 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
893,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,633 UART: [kat] ++
897,785 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,926 UART: [kat] LMS
1,171,254 UART: [kat] --
1,172,087 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,366 UART: [idev] ++
1,175,534 UART: [idev] CDI.KEYID = 6
1,175,894 UART: [idev] SUBJECT.KEYID = 7
1,176,318 UART: [idev] UDS.KEYID = 0
1,176,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,516 UART: [idev] Erasing UDS.KEYID = 0
1,201,719 UART: [idev] Sha1 KeyId Algorithm
1,210,209 UART: [idev] --
1,211,329 UART: [ldev] ++
1,211,497 UART: [ldev] CDI.KEYID = 6
1,211,860 UART: [ldev] SUBJECT.KEYID = 5
1,212,286 UART: [ldev] AUTHORITY.KEYID = 7
1,212,749 UART: [ldev] FE.KEYID = 1
1,217,533 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,781 UART: [ldev] --
1,283,150 UART: [fwproc] Wait for Commands...
1,283,922 UART: [fwproc] Recv command 0x46574c44
1,284,650 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,505 UART: ROM Fatal Error: 0x000B0019
1,324,662 >>> mbox cmd response: failed
1,324,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,668 >>> mbox cmd response: failed
1,324,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,580 UART: [state] LifecycleState = Unprovisioned
85,235 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
892,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,927 UART: [kat] ++
897,079 UART: [kat] sha1
901,275 UART: [kat] SHA2-256
903,215 UART: [kat] SHA2-384
905,830 UART: [kat] SHA2-512-ACC
907,731 UART: [kat] ECC-384
917,594 UART: [kat] HMAC-384Kdf
922,248 UART: [kat] LMS
1,170,576 UART: [kat] --
1,171,679 UART: [cold-reset] ++
1,172,065 UART: [fht] FHT @ 0x50003400
1,174,714 UART: [idev] ++
1,174,882 UART: [idev] CDI.KEYID = 6
1,175,242 UART: [idev] SUBJECT.KEYID = 7
1,175,666 UART: [idev] UDS.KEYID = 0
1,176,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,739 UART: [idev] Sha1 KeyId Algorithm
1,209,153 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,730 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,216,725 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,773 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,099 >>> mbox cmd response: failed
1,180,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,105 >>> mbox cmd response: failed
1,180,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,830 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,711 UART: [kat] LMS
1,171,039 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,660 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,103 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,924 UART: [idev] --
1,210,840 UART: [ldev] ++
1,211,008 UART: [ldev] CDI.KEYID = 6
1,211,371 UART: [ldev] SUBJECT.KEYID = 5
1,211,797 UART: [ldev] AUTHORITY.KEYID = 7
1,212,260 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,243,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,490 UART: [ldev] --
1,282,789 UART: [fwproc] Wait for Commands...
1,283,359 UART: [fwproc] Recv command 0x46574c44
1,284,087 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,012 UART: ROM Fatal Error: 0x000B0019
1,325,169 >>> mbox cmd response: failed
1,325,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,175 >>> mbox cmd response: failed
1,325,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
893,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,980 UART: [kat] ++
898,132 UART: [kat] sha1
902,502 UART: [kat] SHA2-256
904,442 UART: [kat] SHA2-384
907,265 UART: [kat] SHA2-512-ACC
909,166 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,166 UART: [fht] FHT @ 0x50003400
1,176,027 UART: [idev] ++
1,176,195 UART: [idev] CDI.KEYID = 6
1,176,555 UART: [idev] SUBJECT.KEYID = 7
1,176,979 UART: [idev] UDS.KEYID = 0
1,177,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,429 UART: [idev] Erasing UDS.KEYID = 0
1,202,666 UART: [idev] Sha1 KeyId Algorithm
1,211,266 UART: [idev] --
1,212,438 UART: [ldev] ++
1,212,606 UART: [ldev] CDI.KEYID = 6
1,212,969 UART: [ldev] SUBJECT.KEYID = 5
1,213,395 UART: [ldev] AUTHORITY.KEYID = 7
1,213,858 UART: [ldev] FE.KEYID = 1
1,218,726 UART: [ldev] Erasing FE.KEYID = 1
1,245,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,360 UART: [ldev] --
1,284,805 UART: [fwproc] Wait for Commands...
1,285,453 UART: [fwproc] Recv command 0x46574c44
1,286,181 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,898 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,114 >>> mbox cmd response: failed
1,179,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,120 >>> mbox cmd response: failed
1,179,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,357 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,639 UART: [fwproc] Recv command 0x46574c44
1,282,372 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,804 UART: ROM Fatal Error: 0x000B0019
1,321,961 >>> mbox cmd response: failed
1,321,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,967 >>> mbox cmd response: failed
1,321,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,861 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,521 UART: [idev] --
1,209,534 UART: [ldev] ++
1,209,702 UART: [ldev] CDI.KEYID = 6
1,210,066 UART: [ldev] SUBJECT.KEYID = 5
1,210,493 UART: [ldev] AUTHORITY.KEYID = 7
1,210,956 UART: [ldev] FE.KEYID = 1
1,216,042 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,934 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,073 UART: [fwproc] Recv command 0x46574c44
1,282,806 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,275 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,098 >>> mbox cmd response: failed
1,175,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,104 >>> mbox cmd response: failed
1,175,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,077 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,174,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,598 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,155 UART: ROM Fatal Error: 0x000B0019
1,323,312 >>> mbox cmd response: failed
1,323,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,318 >>> mbox cmd response: failed
1,323,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,130 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
890,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,033 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,356 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,589 >>> mbox cmd response: failed
1,175,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,595 >>> mbox cmd response: failed
1,175,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,162 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,112 UART:
192,547 UART: Running Caliptra ROM ...
193,760 UART:
193,915 UART: [state] CFI Enabled
265,833 UART: [state] LifecycleState = Unprovisioned
267,809 UART: [state] DebugLocked = No
270,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,622 UART: [kat] SHA2-256
444,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,829 UART: [kat] ++
455,313 UART: [kat] sha1
465,758 UART: [kat] SHA2-256
468,445 UART: [kat] SHA2-384
474,641 UART: [kat] SHA2-512-ACC
476,978 UART: [kat] ECC-384
2,768,005 UART: [kat] HMAC-384Kdf
2,798,872 UART: [kat] LMS
3,989,194 UART: [kat] --
3,994,513 UART: [cold-reset] ++
3,996,721 UART: [fht] Storing FHT @ 0x50003400
4,006,960 UART: [idev] ++
4,007,545 UART: [idev] CDI.KEYID = 6
4,008,436 UART: [idev] SUBJECT.KEYID = 7
4,009,710 UART: [idev] UDS.KEYID = 0
4,012,529 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,285 UART: [idev] Erasing UDS.KEYID = 0
7,343,214 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,668 UART: [idev] --
7,370,202 UART: [ldev] ++
7,370,773 UART: [ldev] CDI.KEYID = 6
7,371,745 UART: [ldev] SUBJECT.KEYID = 5
7,372,910 UART: [ldev] AUTHORITY.KEYID = 7
7,374,203 UART: [ldev] FE.KEYID = 1
7,421,710 UART: [ldev] Erasing FE.KEYID = 1
10,753,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,504 UART: [ldev] --
13,114,541 UART: [fwproc] Waiting for Commands...
13,117,069 UART: [fwproc] Received command 0x46574c44
13,119,252 UART: [fwproc] Received Image of size 114124 bytes
15,807,528 UART: ROM Fatal Error: 0x000B000F
15,810,973 >>> mbox cmd response: failed
15,811,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,811,719 >>> mbox cmd response: failed
15,811,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,812,280 >>> mbox cmd response: failed
Initializing fuses
2,059,335 writing to cptra_bootfsm_go
2,248,639 UART:
2,249,002 UART: Running Caliptra ROM ...
2,250,060 UART:
2,250,226 UART: [state] CFI Enabled
2,323,332 UART: [state] LifecycleState = Unprovisioned
2,325,273 UART: [state] DebugLocked = No
2,326,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,823 UART: [kat] SHA2-256
2,500,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,022 UART: [kat] ++
2,511,570 UART: [kat] sha1
2,523,888 UART: [kat] SHA2-256
2,526,539 UART: [kat] SHA2-384
2,531,747 UART: [kat] SHA2-512-ACC
2,534,119 UART: [kat] ECC-384
4,828,884 UART: [kat] HMAC-384Kdf
4,860,188 UART: [kat] LMS
6,050,491 UART: [kat] --
6,055,350 UART: [cold-reset] ++
6,056,798 UART: [fht] Storing FHT @ 0x50003400
6,068,247 UART: [idev] ++
6,068,826 UART: [idev] CDI.KEYID = 6
6,069,741 UART: [idev] SUBJECT.KEYID = 7
6,071,016 UART: [idev] UDS.KEYID = 0
6,073,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,217,291 UART: [idev] Erasing UDS.KEYID = 0
9,407,126 UART: [idev] Using Sha1 for KeyId Algorithm
9,429,619 UART: [idev] --
9,434,753 UART: [ldev] ++
9,435,328 UART: [ldev] CDI.KEYID = 6
9,436,298 UART: [ldev] SUBJECT.KEYID = 5
9,437,503 UART: [ldev] AUTHORITY.KEYID = 7
9,438,746 UART: [ldev] FE.KEYID = 1
9,483,912 UART: [ldev] Erasing FE.KEYID = 1
12,817,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,133,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,147,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,162,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,177,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,195,414 UART: [ldev] --
15,200,141 UART: [fwproc] Waiting for Commands...
15,202,778 UART: [fwproc] Received command 0x46574c44
15,204,968 UART: [fwproc] Received Image of size 114124 bytes
19,260,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,325,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,394,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,711,057 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,803,918 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,557,351 >>> mbox cmd response: failed
15,557,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,558,287 >>> mbox cmd response: failed
15,558,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,558,864 >>> mbox cmd response: failed
Initializing fuses
2,056,268 writing to cptra_bootfsm_go
5,842,650 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,909,101 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,452 UART:
192,827 UART: Running Caliptra ROM ...
193,933 UART:
603,743 UART: [state] CFI Enabled
619,769 UART: [state] LifecycleState = Unprovisioned
621,717 UART: [state] DebugLocked = No
624,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,082 UART: [kat] SHA2-256
799,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,379 UART: [kat] ++
810,914 UART: [kat] sha1
821,198 UART: [kat] SHA2-256
823,879 UART: [kat] SHA2-384
829,798 UART: [kat] SHA2-512-ACC
832,197 UART: [kat] ECC-384
3,115,256 UART: [kat] HMAC-384Kdf
3,128,046 UART: [kat] LMS
4,318,178 UART: [kat] --
4,323,390 UART: [cold-reset] ++
4,325,645 UART: [fht] Storing FHT @ 0x50003400
4,336,012 UART: [idev] ++
4,336,630 UART: [idev] CDI.KEYID = 6
4,337,522 UART: [idev] SUBJECT.KEYID = 7
4,338,795 UART: [idev] UDS.KEYID = 0
4,341,584 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,987 UART: [idev] Erasing UDS.KEYID = 0
7,632,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,877 UART: [idev] --
7,659,535 UART: [ldev] ++
7,660,107 UART: [ldev] CDI.KEYID = 6
7,661,125 UART: [ldev] SUBJECT.KEYID = 5
7,662,310 UART: [ldev] AUTHORITY.KEYID = 7
7,663,547 UART: [ldev] FE.KEYID = 1
7,675,273 UART: [ldev] Erasing FE.KEYID = 1
10,960,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,689 UART: [ldev] --
13,321,715 UART: [fwproc] Waiting for Commands...
13,324,621 UART: [fwproc] Received command 0x46574c44
13,326,811 UART: [fwproc] Received Image of size 114124 bytes
16,017,069 UART: ROM Fatal Error: 0x000B000F
16,020,528 >>> mbox cmd response: failed
16,020,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,307 >>> mbox cmd response: failed
16,021,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,897 >>> mbox cmd response: failed
Initializing fuses
2,060,608 writing to cptra_bootfsm_go
2,249,950 UART:
2,250,303 UART: Running Caliptra ROM ...
2,251,439 UART:
4,448,674 UART: [state] CFI Enabled
4,463,271 UART: [state] LifecycleState = Unprovisioned
4,465,183 UART: [state] DebugLocked = No
4,467,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,472,636 UART: [kat] SHA2-256
4,642,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,652,913 UART: [kat] ++
4,653,376 UART: [kat] sha1
4,663,888 UART: [kat] SHA2-256
4,666,582 UART: [kat] SHA2-384
4,672,301 UART: [kat] SHA2-512-ACC
4,674,660 UART: [kat] ECC-384
6,960,157 UART: [kat] HMAC-384Kdf
6,972,065 UART: [kat] LMS
8,162,196 UART: [kat] --
8,167,730 UART: [cold-reset] ++
8,169,992 UART: [fht] Storing FHT @ 0x50003400
8,181,185 UART: [idev] ++
8,181,758 UART: [idev] CDI.KEYID = 6
8,182,642 UART: [idev] SUBJECT.KEYID = 7
8,183,911 UART: [idev] UDS.KEYID = 0
8,186,630 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,330,133 UART: [idev] Erasing UDS.KEYID = 0
11,467,487 UART: [idev] Using Sha1 for KeyId Algorithm
11,489,358 UART: [idev] --
11,494,267 UART: [ldev] ++
11,494,837 UART: [ldev] CDI.KEYID = 6
11,495,801 UART: [ldev] SUBJECT.KEYID = 5
11,497,005 UART: [ldev] AUTHORITY.KEYID = 7
11,498,245 UART: [ldev] FE.KEYID = 1
11,510,954 UART: [ldev] Erasing FE.KEYID = 1
14,798,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,089,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,103,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,118,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,133,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,151,285 UART: [ldev] --
17,155,577 UART: [fwproc] Waiting for Commands...
17,157,748 UART: [fwproc] Received command 0x46574c44
17,159,938 UART: [fwproc] Received Image of size 114124 bytes
21,210,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,283,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,352,145 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,669,927 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,123,532 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,736,831 >>> mbox cmd response: failed
15,737,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,737,766 >>> mbox cmd response: failed
15,738,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,738,337 >>> mbox cmd response: failed
Initializing fuses
2,055,277 writing to cptra_bootfsm_go
8,251,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,193,089 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,126 UART:
192,494 UART: Running Caliptra ROM ...
193,580 UART:
193,722 UART: [state] CFI Enabled
265,069 UART: [state] LifecycleState = Unprovisioned
266,959 UART: [state] DebugLocked = No
269,501 UART: [state] WD Timer not started. Device not locked for debugging
273,698 UART: [kat] SHA2-256
452,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,385 UART: [kat] ++
464,860 UART: [kat] sha1
475,790 UART: [kat] SHA2-256
478,808 UART: [kat] SHA2-384
485,328 UART: [kat] SHA2-512-ACC
488,316 UART: [kat] ECC-384
2,948,486 UART: [kat] HMAC-384Kdf
2,972,310 UART: [kat] LMS
3,501,752 UART: [kat] --
3,506,349 UART: [cold-reset] ++
3,508,820 UART: [fht] FHT @ 0x50003400
3,518,823 UART: [idev] ++
3,519,392 UART: [idev] CDI.KEYID = 6
3,520,302 UART: [idev] SUBJECT.KEYID = 7
3,521,516 UART: [idev] UDS.KEYID = 0
3,524,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,876 UART: [idev] Erasing UDS.KEYID = 0
6,030,164 UART: [idev] Sha1 KeyId Algorithm
6,053,394 UART: [idev] --
6,057,477 UART: [ldev] ++
6,058,060 UART: [ldev] CDI.KEYID = 6
6,058,979 UART: [ldev] SUBJECT.KEYID = 5
6,060,142 UART: [ldev] AUTHORITY.KEYID = 7
6,061,378 UART: [ldev] FE.KEYID = 1
6,101,356 UART: [ldev] Erasing FE.KEYID = 1
8,604,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,490 UART: [ldev] --
10,412,268 UART: [fwproc] Wait for Commands...
10,415,398 UART: [fwproc] Recv command 0x46574c44
10,417,514 UART: [fwproc] Recv'd Img size: 114448 bytes
12,450,234 UART: ROM Fatal Error: 0x000B000F
12,453,357 >>> mbox cmd response: failed
12,453,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,033 >>> mbox cmd response: failed
12,454,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,602 >>> mbox cmd response: failed
Initializing fuses
2,054,426 writing to cptra_bootfsm_go
2,243,707 UART:
2,244,049 UART: Running Caliptra ROM ...
2,245,186 UART:
2,245,353 UART: [state] CFI Enabled
2,316,961 UART: [state] LifecycleState = Unprovisioned
2,318,838 UART: [state] DebugLocked = No
2,320,285 UART: [state] WD Timer not started. Device not locked for debugging
2,324,624 UART: [kat] SHA2-256
2,503,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,300 UART: [kat] ++
2,515,762 UART: [kat] sha1
2,528,264 UART: [kat] SHA2-256
2,531,277 UART: [kat] SHA2-384
2,536,508 UART: [kat] SHA2-512-ACC
2,539,453 UART: [kat] ECC-384
5,002,122 UART: [kat] HMAC-384Kdf
5,023,584 UART: [kat] LMS
5,553,041 UART: [kat] --
5,557,479 UART: [cold-reset] ++
5,558,715 UART: [fht] FHT @ 0x50003400
5,570,142 UART: [idev] ++
5,570,710 UART: [idev] CDI.KEYID = 6
5,571,621 UART: [idev] SUBJECT.KEYID = 7
5,572,837 UART: [idev] UDS.KEYID = 0
5,575,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,591 UART: [idev] Erasing UDS.KEYID = 0
8,076,446 UART: [idev] Sha1 KeyId Algorithm
8,099,197 UART: [idev] --
8,104,661 UART: [ldev] ++
8,105,234 UART: [ldev] CDI.KEYID = 6
8,106,302 UART: [ldev] SUBJECT.KEYID = 5
8,107,364 UART: [ldev] AUTHORITY.KEYID = 7
8,108,600 UART: [ldev] FE.KEYID = 1
8,151,385 UART: [ldev] Erasing FE.KEYID = 1
10,655,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,798 UART: [ldev] --
12,463,820 UART: [fwproc] Wait for Commands...
12,466,188 UART: [fwproc] Recv command 0x46574c44
12,468,229 UART: [fwproc] Recv'd Img size: 114448 bytes
15,869,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,012,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,330,810 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,363,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,216,959 >>> mbox cmd response: failed
12,217,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,217,911 >>> mbox cmd response: failed
12,218,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,218,471 >>> mbox cmd response: failed
Initializing fuses
2,049,926 writing to cptra_bootfsm_go
5,392,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,056,102 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,709 UART:
193,072 UART: Running Caliptra ROM ...
194,246 UART:
603,860 UART: [state] CFI Enabled
618,274 UART: [state] LifecycleState = Unprovisioned
620,186 UART: [state] DebugLocked = No
622,538 UART: [state] WD Timer not started. Device not locked for debugging
625,716 UART: [kat] SHA2-256
804,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,397 UART: [kat] ++
816,924 UART: [kat] sha1
826,423 UART: [kat] SHA2-256
829,477 UART: [kat] SHA2-384
836,478 UART: [kat] SHA2-512-ACC
839,416 UART: [kat] ECC-384
3,280,754 UART: [kat] HMAC-384Kdf
3,293,244 UART: [kat] LMS
3,822,731 UART: [kat] --
3,828,310 UART: [cold-reset] ++
3,830,302 UART: [fht] FHT @ 0x50003400
3,841,883 UART: [idev] ++
3,842,449 UART: [idev] CDI.KEYID = 6
3,843,372 UART: [idev] SUBJECT.KEYID = 7
3,844,529 UART: [idev] UDS.KEYID = 0
3,847,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,222 UART: [idev] Erasing UDS.KEYID = 0
6,316,126 UART: [idev] Sha1 KeyId Algorithm
6,339,471 UART: [idev] --
6,343,254 UART: [ldev] ++
6,343,823 UART: [ldev] CDI.KEYID = 6
6,344,734 UART: [ldev] SUBJECT.KEYID = 5
6,345,890 UART: [ldev] AUTHORITY.KEYID = 7
6,347,119 UART: [ldev] FE.KEYID = 1
6,356,900 UART: [ldev] Erasing FE.KEYID = 1
8,833,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,039 UART: [ldev] --
10,621,856 UART: [fwproc] Wait for Commands...
10,624,603 UART: [fwproc] Recv command 0x46574c44
10,626,697 UART: [fwproc] Recv'd Img size: 114448 bytes
12,666,521 UART: ROM Fatal Error: 0x000B000F
12,669,641 >>> mbox cmd response: failed
12,670,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,670,412 >>> mbox cmd response: failed
12,670,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,670,970 >>> mbox cmd response: failed
Initializing fuses
2,055,038 writing to cptra_bootfsm_go
2,244,351 UART:
2,244,694 UART: Running Caliptra ROM ...
2,245,839 UART:
7,780,954 UART: [state] CFI Enabled
7,796,021 UART: [state] LifecycleState = Unprovisioned
7,797,910 UART: [state] DebugLocked = No
7,800,758 UART: [state] WD Timer not started. Device not locked for debugging
7,805,101 UART: [kat] SHA2-256
7,984,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,995,791 UART: [kat] ++
7,996,336 UART: [kat] sha1
8,007,825 UART: [kat] SHA2-256
8,010,851 UART: [kat] SHA2-384
8,016,196 UART: [kat] SHA2-512-ACC
8,019,126 UART: [kat] ECC-384
10,464,039 UART: [kat] HMAC-384Kdf
10,476,863 UART: [kat] LMS
11,006,354 UART: [kat] --
11,009,376 UART: [cold-reset] ++
11,011,684 UART: [fht] FHT @ 0x50003400
11,022,005 UART: [idev] ++
11,022,595 UART: [idev] CDI.KEYID = 6
11,023,509 UART: [idev] SUBJECT.KEYID = 7
11,024,669 UART: [idev] UDS.KEYID = 0
11,027,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,171,431 UART: [idev] Erasing UDS.KEYID = 0
13,496,550 UART: [idev] Sha1 KeyId Algorithm
13,520,762 UART: [idev] --
13,523,243 UART: [ldev] ++
13,523,819 UART: [ldev] CDI.KEYID = 6
13,524,726 UART: [ldev] SUBJECT.KEYID = 5
13,525,940 UART: [ldev] AUTHORITY.KEYID = 7
13,527,172 UART: [ldev] FE.KEYID = 1
13,538,420 UART: [ldev] Erasing FE.KEYID = 1
16,011,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,728,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,744,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,760,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,776,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,795,761 UART: [ldev] --
17,800,820 UART: [fwproc] Wait for Commands...
17,804,052 UART: [fwproc] Recv command 0x46574c44
17,806,151 UART: [fwproc] Recv'd Img size: 114448 bytes
21,213,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,288,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,356,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,675,112 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,699,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,942 >>> mbox cmd response: failed
12,459,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,865 >>> mbox cmd response: failed
12,460,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,432 >>> mbox cmd response: failed
Initializing fuses
2,051,893 writing to cptra_bootfsm_go
11,108,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,687,877 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,607 UART:
192,959 UART: Running Caliptra ROM ...
194,146 UART:
194,297 UART: [state] CFI Enabled
261,225 UART: [state] LifecycleState = Unprovisioned
263,643 UART: [state] DebugLocked = No
265,779 UART: [state] WD Timer not started. Device not locked for debugging
269,754 UART: [kat] SHA2-256
459,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,395 UART: [kat] ++
470,842 UART: [kat] sha1
482,484 UART: [kat] SHA2-256
485,494 UART: [kat] SHA2-384
491,880 UART: [kat] SHA2-512-ACC
494,490 UART: [kat] ECC-384
2,946,028 UART: [kat] HMAC-384Kdf
2,968,727 UART: [kat] LMS
3,500,498 UART: [kat] --
3,504,024 UART: [cold-reset] ++
3,505,588 UART: [fht] FHT @ 0x50003400
3,516,417 UART: [idev] ++
3,517,128 UART: [idev] CDI.KEYID = 6
3,518,012 UART: [idev] SUBJECT.KEYID = 7
3,519,285 UART: [idev] UDS.KEYID = 0
3,521,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,941 UART: [idev] Erasing UDS.KEYID = 0
6,027,319 UART: [idev] Sha1 KeyId Algorithm
6,050,987 UART: [idev] --
6,056,658 UART: [ldev] ++
6,057,357 UART: [ldev] CDI.KEYID = 6
6,058,247 UART: [ldev] SUBJECT.KEYID = 5
6,059,407 UART: [ldev] AUTHORITY.KEYID = 7
6,060,643 UART: [ldev] FE.KEYID = 1
6,097,196 UART: [ldev] Erasing FE.KEYID = 1
8,605,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,362 UART: [ldev] --
10,412,458 UART: [fwproc] Wait for Commands...
10,414,775 UART: [fwproc] Recv command 0x46574c44
10,417,089 UART: [fwproc] Recv'd Img size: 114448 bytes
12,487,265 UART: ROM Fatal Error: 0x000B000F
12,490,932 >>> mbox cmd response: failed
12,491,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,491,790 >>> mbox cmd response: failed
12,492,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,492,368 >>> mbox cmd response: failed
Initializing fuses
2,059,664 writing to cptra_bootfsm_go
2,248,971 UART:
2,249,320 UART: Running Caliptra ROM ...
2,250,370 UART:
2,250,524 UART: [state] CFI Enabled
2,316,388 UART: [state] LifecycleState = Unprovisioned
2,318,801 UART: [state] DebugLocked = No
2,320,703 UART: [state] WD Timer not started. Device not locked for debugging
2,325,818 UART: [kat] SHA2-256
2,515,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,456 UART: [kat] ++
2,526,915 UART: [kat] sha1
2,538,939 UART: [kat] SHA2-256
2,541,956 UART: [kat] SHA2-384
2,547,836 UART: [kat] SHA2-512-ACC
2,550,417 UART: [kat] ECC-384
4,999,187 UART: [kat] HMAC-384Kdf
5,022,490 UART: [kat] LMS
5,554,287 UART: [kat] --
5,557,708 UART: [cold-reset] ++
5,558,615 UART: [fht] FHT @ 0x50003400
5,570,491 UART: [idev] ++
5,571,167 UART: [idev] CDI.KEYID = 6
5,572,102 UART: [idev] SUBJECT.KEYID = 7
5,573,386 UART: [idev] UDS.KEYID = 0
5,575,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,888 UART: [idev] Erasing UDS.KEYID = 0
8,079,149 UART: [idev] Sha1 KeyId Algorithm
8,101,849 UART: [idev] --
8,106,652 UART: [ldev] ++
8,107,332 UART: [ldev] CDI.KEYID = 6
8,108,245 UART: [ldev] SUBJECT.KEYID = 5
8,109,459 UART: [ldev] AUTHORITY.KEYID = 7
8,110,637 UART: [ldev] FE.KEYID = 1
8,151,260 UART: [ldev] Erasing FE.KEYID = 1
10,656,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,375 UART: [ldev] --
12,466,476 UART: [fwproc] Wait for Commands...
12,468,728 UART: [fwproc] Recv command 0x46574c44
12,470,996 UART: [fwproc] Recv'd Img size: 114448 bytes
15,925,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,009,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,668,672 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,438,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,282,844 >>> mbox cmd response: failed
12,283,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,283,943 >>> mbox cmd response: failed
12,284,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,284,502 >>> mbox cmd response: failed
Initializing fuses
2,055,080 writing to cptra_bootfsm_go
5,487,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,792,481 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,677 UART:
193,031 UART: Running Caliptra ROM ...
194,237 UART:
603,742 UART: [state] CFI Enabled
613,502 UART: [state] LifecycleState = Unprovisioned
615,871 UART: [state] DebugLocked = No
618,110 UART: [state] WD Timer not started. Device not locked for debugging
622,794 UART: [kat] SHA2-256
812,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,427 UART: [kat] ++
823,961 UART: [kat] sha1
835,821 UART: [kat] SHA2-256
838,829 UART: [kat] SHA2-384
845,935 UART: [kat] SHA2-512-ACC
848,496 UART: [kat] ECC-384
3,290,477 UART: [kat] HMAC-384Kdf
3,304,841 UART: [kat] LMS
3,836,631 UART: [kat] --
3,842,363 UART: [cold-reset] ++
3,844,946 UART: [fht] FHT @ 0x50003400
3,856,463 UART: [idev] ++
3,857,189 UART: [idev] CDI.KEYID = 6
3,858,208 UART: [idev] SUBJECT.KEYID = 7
3,859,318 UART: [idev] UDS.KEYID = 0
3,861,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,917 UART: [idev] Erasing UDS.KEYID = 0
6,340,004 UART: [idev] Sha1 KeyId Algorithm
6,362,816 UART: [idev] --
6,368,134 UART: [ldev] ++
6,368,821 UART: [ldev] CDI.KEYID = 6
6,369,730 UART: [ldev] SUBJECT.KEYID = 5
6,370,896 UART: [ldev] AUTHORITY.KEYID = 7
6,372,142 UART: [ldev] FE.KEYID = 1
6,383,974 UART: [ldev] Erasing FE.KEYID = 1
8,861,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,924 UART: [ldev] --
10,650,701 UART: [fwproc] Wait for Commands...
10,653,229 UART: [fwproc] Recv command 0x46574c44
10,655,548 UART: [fwproc] Recv'd Img size: 114448 bytes
12,726,605 UART: ROM Fatal Error: 0x000B000F
12,730,268 >>> mbox cmd response: failed
12,730,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,867 >>> mbox cmd response: failed
12,731,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,429 >>> mbox cmd response: failed
Initializing fuses
2,060,085 writing to cptra_bootfsm_go
2,249,412 UART:
2,249,767 UART: Running Caliptra ROM ...
2,250,820 UART:
7,728,802 UART: [state] CFI Enabled
7,739,182 UART: [state] LifecycleState = Unprovisioned
7,741,539 UART: [state] DebugLocked = No
7,744,227 UART: [state] WD Timer not started. Device not locked for debugging
7,748,944 UART: [kat] SHA2-256
7,938,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,949,650 UART: [kat] ++
7,950,266 UART: [kat] sha1
7,961,161 UART: [kat] SHA2-256
7,964,181 UART: [kat] SHA2-384
7,969,411 UART: [kat] SHA2-512-ACC
7,971,985 UART: [kat] ECC-384
10,413,914 UART: [kat] HMAC-384Kdf
10,427,053 UART: [kat] LMS
10,958,914 UART: [kat] --
10,963,335 UART: [cold-reset] ++
10,964,730 UART: [fht] FHT @ 0x50003400
10,977,722 UART: [idev] ++
10,978,449 UART: [idev] CDI.KEYID = 6
10,979,358 UART: [idev] SUBJECT.KEYID = 7
10,980,567 UART: [idev] UDS.KEYID = 0
10,983,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,127,488 UART: [idev] Erasing UDS.KEYID = 0
13,458,661 UART: [idev] Sha1 KeyId Algorithm
13,481,283 UART: [idev] --
13,485,788 UART: [ldev] ++
13,486,472 UART: [ldev] CDI.KEYID = 6
13,487,386 UART: [ldev] SUBJECT.KEYID = 5
13,488,598 UART: [ldev] AUTHORITY.KEYID = 7
13,489,775 UART: [ldev] FE.KEYID = 1
13,498,425 UART: [ldev] Erasing FE.KEYID = 1
15,981,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,238 UART: [ldev] --
17,767,017 UART: [fwproc] Wait for Commands...
17,769,765 UART: [fwproc] Recv command 0x46574c44
17,772,100 UART: [fwproc] Recv'd Img size: 114448 bytes
21,228,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,306,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,422,639 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,966,183 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,759,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,502,271 >>> mbox cmd response: failed
12,502,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,249 >>> mbox cmd response: failed
12,503,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,834 >>> mbox cmd response: failed
Initializing fuses
2,051,975 writing to cptra_bootfsm_go
11,115,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,314,721 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,821 UART: [kat] SHA2-256
881,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,867 UART: [kat] ++
886,019 UART: [kat] sha1
890,221 UART: [kat] SHA2-256
892,159 UART: [kat] SHA2-384
894,882 UART: [kat] SHA2-512-ACC
896,783 UART: [kat] ECC-384
902,146 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,533 UART: [cold-reset] ++
1,476,065 UART: [fht] Storing FHT @ 0x50003400
1,478,636 UART: [idev] ++
1,478,804 UART: [idev] CDI.KEYID = 6
1,479,164 UART: [idev] SUBJECT.KEYID = 7
1,479,588 UART: [idev] UDS.KEYID = 0
1,479,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,298 UART: [idev] Erasing UDS.KEYID = 0
1,503,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,026 UART: [idev] --
1,513,219 UART: [ldev] ++
1,513,387 UART: [ldev] CDI.KEYID = 6
1,513,750 UART: [ldev] SUBJECT.KEYID = 5
1,514,176 UART: [ldev] AUTHORITY.KEYID = 7
1,514,639 UART: [ldev] FE.KEYID = 1
1,519,905 UART: [ldev] Erasing FE.KEYID = 1
1,545,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,402 UART: [ldev] --
1,584,901 UART: [fwproc] Waiting for Commands...
1,585,682 UART: [fwproc] Received command 0x46574c44
1,586,473 UART: [fwproc] Received Image of size 114448 bytes
1,628,487 UART: ROM Fatal Error: 0x000B000F
1,629,646 >>> mbox cmd response: failed
1,629,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,652 >>> mbox cmd response: failed
1,629,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,562 UART: [kat] SHA2-512-ACC
897,463 UART: [kat] ECC-384
903,050 UART: [kat] HMAC-384Kdf
907,754 UART: [kat] LMS
1,475,950 UART: [kat] --
1,476,913 UART: [cold-reset] ++
1,477,303 UART: [fht] Storing FHT @ 0x50003400
1,480,092 UART: [idev] ++
1,480,260 UART: [idev] CDI.KEYID = 6
1,480,620 UART: [idev] SUBJECT.KEYID = 7
1,481,044 UART: [idev] UDS.KEYID = 0
1,481,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,312 UART: [idev] Erasing UDS.KEYID = 0
1,506,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,750 UART: [idev] --
1,515,739 UART: [ldev] ++
1,515,907 UART: [ldev] CDI.KEYID = 6
1,516,270 UART: [ldev] SUBJECT.KEYID = 5
1,516,696 UART: [ldev] AUTHORITY.KEYID = 7
1,517,159 UART: [ldev] FE.KEYID = 1
1,522,003 UART: [ldev] Erasing FE.KEYID = 1
1,547,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,856 UART: [ldev] --
1,587,249 UART: [fwproc] Waiting for Commands...
1,587,938 UART: [fwproc] Received command 0x46574c44
1,588,729 UART: [fwproc] Received Image of size 114448 bytes
2,888,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,895 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,482,373 >>> mbox cmd response: failed
1,482,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,379 >>> mbox cmd response: failed
1,482,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,796 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
903,029 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,564 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,807 UART: [idev] ++
1,479,975 UART: [idev] CDI.KEYID = 6
1,480,335 UART: [idev] SUBJECT.KEYID = 7
1,480,759 UART: [idev] UDS.KEYID = 0
1,481,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,537 UART: [idev] Erasing UDS.KEYID = 0
1,505,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,941 UART: [idev] --
1,514,766 UART: [ldev] ++
1,514,934 UART: [ldev] CDI.KEYID = 6
1,515,297 UART: [ldev] SUBJECT.KEYID = 5
1,515,723 UART: [ldev] AUTHORITY.KEYID = 7
1,516,186 UART: [ldev] FE.KEYID = 1
1,521,494 UART: [ldev] Erasing FE.KEYID = 1
1,547,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,623 UART: [ldev] --
1,587,132 UART: [fwproc] Waiting for Commands...
1,587,917 UART: [fwproc] Received command 0x46574c44
1,588,708 UART: [fwproc] Received Image of size 114448 bytes
1,630,584 UART: ROM Fatal Error: 0x000B000F
1,631,743 >>> mbox cmd response: failed
1,631,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,749 >>> mbox cmd response: failed
1,631,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,675 UART: [kat] SHA2-512-ACC
897,576 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,845 UART: [kat] LMS
1,476,041 UART: [kat] --
1,476,742 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,148 UART: [ldev] ++
1,515,316 UART: [ldev] CDI.KEYID = 6
1,515,679 UART: [ldev] SUBJECT.KEYID = 5
1,516,105 UART: [ldev] AUTHORITY.KEYID = 7
1,516,568 UART: [ldev] FE.KEYID = 1
1,521,676 UART: [ldev] Erasing FE.KEYID = 1
1,546,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,951 UART: [ldev] --
1,586,300 UART: [fwproc] Waiting for Commands...
1,587,083 UART: [fwproc] Received command 0x46574c44
1,587,874 UART: [fwproc] Received Image of size 114448 bytes
2,886,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,204 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,717 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,483,986 >>> mbox cmd response: failed
1,483,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,992 >>> mbox cmd response: failed
1,483,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,955 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
917,968 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,171,955 UART: [fht] FHT @ 0x50003400
1,174,530 UART: [idev] ++
1,174,698 UART: [idev] CDI.KEYID = 6
1,175,058 UART: [idev] SUBJECT.KEYID = 7
1,175,482 UART: [idev] UDS.KEYID = 0
1,175,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,346 UART: [idev] Erasing UDS.KEYID = 0
1,200,523 UART: [idev] Sha1 KeyId Algorithm
1,209,067 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,764 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,896 UART: [fwproc] Recv command 0x46574c44
1,283,624 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,412 UART: ROM Fatal Error: 0x000B000F
1,325,571 >>> mbox cmd response: failed
1,325,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,577 >>> mbox cmd response: failed
1,325,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,730 UART: [kat] SHA2-512-ACC
908,631 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,554 UART: [kat] LMS
1,170,882 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,131 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,915 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,617 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,127 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,394 >>> mbox cmd response: failed
1,180,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,400 >>> mbox cmd response: failed
1,180,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,030 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,443 UART: [kat] LMS
1,171,771 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,318 UART: [fht] FHT @ 0x50003400
1,176,011 UART: [idev] ++
1,176,179 UART: [idev] CDI.KEYID = 6
1,176,539 UART: [idev] SUBJECT.KEYID = 7
1,176,963 UART: [idev] UDS.KEYID = 0
1,177,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,965 UART: [idev] Erasing UDS.KEYID = 0
1,201,874 UART: [idev] Sha1 KeyId Algorithm
1,210,408 UART: [idev] --
1,211,480 UART: [ldev] ++
1,211,648 UART: [ldev] CDI.KEYID = 6
1,212,011 UART: [ldev] SUBJECT.KEYID = 5
1,212,437 UART: [ldev] AUTHORITY.KEYID = 7
1,212,900 UART: [ldev] FE.KEYID = 1
1,218,268 UART: [ldev] Erasing FE.KEYID = 1
1,244,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,374 UART: [ldev] --
1,283,791 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46574c44
1,285,289 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,727 UART: ROM Fatal Error: 0x000B000F
1,327,886 >>> mbox cmd response: failed
1,327,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,892 >>> mbox cmd response: failed
1,327,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,029 UART: [idev] ++
1,175,197 UART: [idev] CDI.KEYID = 6
1,175,557 UART: [idev] SUBJECT.KEYID = 7
1,175,981 UART: [idev] UDS.KEYID = 0
1,176,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,975 UART: [idev] Erasing UDS.KEYID = 0
1,200,894 UART: [idev] Sha1 KeyId Algorithm
1,209,330 UART: [idev] --
1,210,520 UART: [ldev] ++
1,210,688 UART: [ldev] CDI.KEYID = 6
1,211,051 UART: [ldev] SUBJECT.KEYID = 5
1,211,477 UART: [ldev] AUTHORITY.KEYID = 7
1,211,940 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,244,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,678 UART: [ldev] --
1,284,033 UART: [fwproc] Wait for Commands...
1,284,637 UART: [fwproc] Recv command 0x46574c44
1,285,365 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,014 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,713 >>> mbox cmd response: failed
1,182,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,719 >>> mbox cmd response: failed
1,182,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,195 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,889 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,298 UART: [kat] LMS
1,169,610 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,174,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,689 UART: [idev] Erasing UDS.KEYID = 0
1,199,845 UART: [idev] Sha1 KeyId Algorithm
1,208,905 UART: [idev] --
1,209,742 UART: [ldev] ++
1,209,910 UART: [ldev] CDI.KEYID = 6
1,210,274 UART: [ldev] SUBJECT.KEYID = 5
1,210,701 UART: [ldev] AUTHORITY.KEYID = 7
1,211,164 UART: [ldev] FE.KEYID = 1
1,216,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,912 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,664 UART: ROM Fatal Error: 0x000B000F
1,325,823 >>> mbox cmd response: failed
1,325,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,829 >>> mbox cmd response: failed
1,325,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,128 UART: [kat] SHA2-256
891,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
904,962 UART: [kat] SHA2-512-ACC
906,863 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,745 UART: [fwproc] Recv command 0x46574c44
1,282,478 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,681 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,322 >>> mbox cmd response: failed
1,178,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,328 >>> mbox cmd response: failed
1,178,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,263 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,174,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,480 UART: [idev] Sha1 KeyId Algorithm
1,209,326 UART: [idev] --
1,210,307 UART: [ldev] ++
1,210,475 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,266 UART: [ldev] AUTHORITY.KEYID = 7
1,211,729 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,243,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,695 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,936 UART: [fwproc] Recv command 0x46574c44
1,284,669 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,101 UART: ROM Fatal Error: 0x000B000F
1,327,260 >>> mbox cmd response: failed
1,327,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,266 >>> mbox cmd response: failed
1,327,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,227 UART: [ldev] SUBJECT.KEYID = 5
1,210,654 UART: [ldev] AUTHORITY.KEYID = 7
1,211,117 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,885 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,082 UART: [fwproc] Recv command 0x46574c44
1,282,815 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,198 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,631 >>> mbox cmd response: failed
1,179,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,637 >>> mbox cmd response: failed
1,179,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,088 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
193,027 UART:
193,381 UART: Running Caliptra ROM ...
194,466 UART:
194,611 UART: [state] CFI Enabled
258,605 UART: [state] LifecycleState = Unprovisioned
260,528 UART: [state] DebugLocked = No
263,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,619 UART: [kat] SHA2-256
437,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,799 UART: [kat] ++
448,249 UART: [kat] sha1
459,618 UART: [kat] SHA2-256
462,298 UART: [kat] SHA2-384
467,323 UART: [kat] SHA2-512-ACC
469,672 UART: [kat] ECC-384
2,765,512 UART: [kat] HMAC-384Kdf
2,797,308 UART: [kat] LMS
3,987,620 UART: [kat] --
3,990,666 UART: [cold-reset] ++
3,991,906 UART: [fht] Storing FHT @ 0x50003400
4,003,178 UART: [idev] ++
4,003,787 UART: [idev] CDI.KEYID = 6
4,004,682 UART: [idev] SUBJECT.KEYID = 7
4,005,905 UART: [idev] UDS.KEYID = 0
4,008,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,248 UART: [idev] Erasing UDS.KEYID = 0
7,345,159 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,626 UART: [idev] --
7,370,410 UART: [ldev] ++
7,371,012 UART: [ldev] CDI.KEYID = 6
7,371,927 UART: [ldev] SUBJECT.KEYID = 5
7,373,144 UART: [ldev] AUTHORITY.KEYID = 7
7,374,378 UART: [ldev] FE.KEYID = 1
7,423,155 UART: [ldev] Erasing FE.KEYID = 1
10,755,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,793 UART: [ldev] --
13,114,358 UART: [fwproc] Waiting for Commands...
13,116,462 UART: [fwproc] Received command 0x46574c44
13,118,650 UART: [fwproc] Received Image of size 114124 bytes
14,517,918 UART: ROM Fatal Error: 0x000B001A
14,521,357 >>> mbox cmd response: failed
14,521,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,522,112 >>> mbox cmd response: failed
14,522,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,522,669 >>> mbox cmd response: failed
Initializing fuses
2,054,077 writing to cptra_bootfsm_go
2,243,375 UART:
2,243,745 UART: Running Caliptra ROM ...
2,244,795 UART:
2,244,953 UART: [state] CFI Enabled
2,312,815 UART: [state] LifecycleState = Unprovisioned
2,314,805 UART: [state] DebugLocked = No
2,317,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,831 UART: [kat] SHA2-256
2,491,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,081 UART: [kat] ++
2,502,632 UART: [kat] sha1
2,513,039 UART: [kat] SHA2-256
2,515,736 UART: [kat] SHA2-384
2,521,786 UART: [kat] SHA2-512-ACC
2,524,119 UART: [kat] ECC-384
4,819,274 UART: [kat] HMAC-384Kdf
4,850,055 UART: [kat] LMS
6,040,332 UART: [kat] --
6,044,950 UART: [cold-reset] ++
6,046,781 UART: [fht] Storing FHT @ 0x50003400
6,057,187 UART: [idev] ++
6,057,759 UART: [idev] CDI.KEYID = 6
6,058,731 UART: [idev] SUBJECT.KEYID = 7
6,059,970 UART: [idev] UDS.KEYID = 0
6,062,590 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,206,295 UART: [idev] Erasing UDS.KEYID = 0
9,396,932 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,921 UART: [idev] --
9,423,164 UART: [ldev] ++
9,423,743 UART: [ldev] CDI.KEYID = 6
9,424,655 UART: [ldev] SUBJECT.KEYID = 5
9,425,918 UART: [ldev] AUTHORITY.KEYID = 7
9,427,161 UART: [ldev] FE.KEYID = 1
9,472,709 UART: [ldev] Erasing FE.KEYID = 1
12,805,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,159,797 UART: [ldev] --
15,164,243 UART: [fwproc] Waiting for Commands...
15,165,920 UART: [fwproc] Received command 0x46574c44
15,168,109 UART: [fwproc] Received Image of size 114124 bytes
19,219,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,297,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,366,739 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,684,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,787,031 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,262,212 >>> mbox cmd response: failed
14,262,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,263,108 >>> mbox cmd response: failed
14,263,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,263,674 >>> mbox cmd response: failed
Initializing fuses
2,055,198 writing to cptra_bootfsm_go
5,857,789 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,926,874 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,438 UART:
192,801 UART: Running Caliptra ROM ...
194,129 UART:
603,611 UART: [state] CFI Enabled
617,945 UART: [state] LifecycleState = Unprovisioned
619,928 UART: [state] DebugLocked = No
621,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,560 UART: [kat] SHA2-256
797,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,855 UART: [kat] ++
808,332 UART: [kat] sha1
820,797 UART: [kat] SHA2-256
823,488 UART: [kat] SHA2-384
828,929 UART: [kat] SHA2-512-ACC
831,268 UART: [kat] ECC-384
3,117,316 UART: [kat] HMAC-384Kdf
3,130,059 UART: [kat] LMS
4,320,179 UART: [kat] --
4,324,719 UART: [cold-reset] ++
4,326,438 UART: [fht] Storing FHT @ 0x50003400
4,337,218 UART: [idev] ++
4,337,782 UART: [idev] CDI.KEYID = 6
4,338,743 UART: [idev] SUBJECT.KEYID = 7
4,340,016 UART: [idev] UDS.KEYID = 0
4,342,892 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,439 UART: [idev] Erasing UDS.KEYID = 0
7,624,898 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,162 UART: [idev] --
7,649,131 UART: [ldev] ++
7,649,711 UART: [ldev] CDI.KEYID = 6
7,650,621 UART: [ldev] SUBJECT.KEYID = 5
7,651,834 UART: [ldev] AUTHORITY.KEYID = 7
7,653,121 UART: [ldev] FE.KEYID = 1
7,665,009 UART: [ldev] Erasing FE.KEYID = 1
10,955,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,179 UART: [ldev] --
13,311,903 UART: [fwproc] Waiting for Commands...
13,315,142 UART: [fwproc] Received command 0x46574c44
13,317,379 UART: [fwproc] Received Image of size 114124 bytes
14,717,557 UART: ROM Fatal Error: 0x000B001A
14,721,002 >>> mbox cmd response: failed
14,721,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,721,753 >>> mbox cmd response: failed
14,722,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,722,318 >>> mbox cmd response: failed
Initializing fuses
2,053,689 writing to cptra_bootfsm_go
2,242,997 UART:
2,243,352 UART: Running Caliptra ROM ...
2,244,482 UART:
5,750,550 UART: [state] CFI Enabled
5,764,780 UART: [state] LifecycleState = Unprovisioned
5,766,712 UART: [state] DebugLocked = No
5,768,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,773,421 UART: [kat] SHA2-256
5,943,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,953,698 UART: [kat] ++
5,954,162 UART: [kat] sha1
5,965,591 UART: [kat] SHA2-256
5,968,289 UART: [kat] SHA2-384
5,973,897 UART: [kat] SHA2-512-ACC
5,976,301 UART: [kat] ECC-384
8,260,653 UART: [kat] HMAC-384Kdf
8,272,018 UART: [kat] LMS
9,462,116 UART: [kat] --
9,466,334 UART: [cold-reset] ++
9,468,481 UART: [fht] Storing FHT @ 0x50003400
9,480,574 UART: [idev] ++
9,481,207 UART: [idev] CDI.KEYID = 6
9,482,099 UART: [idev] SUBJECT.KEYID = 7
9,483,322 UART: [idev] UDS.KEYID = 0
9,486,159 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,629,453 UART: [idev] Erasing UDS.KEYID = 0
12,771,411 UART: [idev] Using Sha1 for KeyId Algorithm
12,791,835 UART: [idev] --
12,796,317 UART: [ldev] ++
12,796,938 UART: [ldev] CDI.KEYID = 6
12,797,901 UART: [ldev] SUBJECT.KEYID = 5
12,799,107 UART: [ldev] AUTHORITY.KEYID = 7
12,800,340 UART: [ldev] FE.KEYID = 1
12,811,743 UART: [ldev] Erasing FE.KEYID = 1
16,097,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,391,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,405,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,420,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,434,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,454,297 UART: [ldev] --
18,458,439 UART: [fwproc] Waiting for Commands...
18,461,242 UART: [fwproc] Received command 0x46574c44
18,463,429 UART: [fwproc] Received Image of size 114124 bytes
22,515,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,593,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,662,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,980,478 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,128,554 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,460,378 >>> mbox cmd response: failed
14,461,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,383 >>> mbox cmd response: failed
14,461,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,972 >>> mbox cmd response: failed
Initializing fuses
2,049,767 writing to cptra_bootfsm_go
9,536,810 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,478,223 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
192,938 UART:
193,284 UART: Running Caliptra ROM ...
194,458 UART:
194,612 UART: [state] CFI Enabled
263,053 UART: [state] LifecycleState = Unprovisioned
264,933 UART: [state] DebugLocked = No
267,364 UART: [state] WD Timer not started. Device not locked for debugging
270,751 UART: [kat] SHA2-256
449,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,436 UART: [kat] ++
461,982 UART: [kat] sha1
471,791 UART: [kat] SHA2-256
474,847 UART: [kat] SHA2-384
482,060 UART: [kat] SHA2-512-ACC
484,986 UART: [kat] ECC-384
2,946,611 UART: [kat] HMAC-384Kdf
2,969,370 UART: [kat] LMS
3,498,855 UART: [kat] --
3,503,017 UART: [cold-reset] ++
3,503,823 UART: [fht] FHT @ 0x50003400
3,515,048 UART: [idev] ++
3,515,614 UART: [idev] CDI.KEYID = 6
3,516,575 UART: [idev] SUBJECT.KEYID = 7
3,517,737 UART: [idev] UDS.KEYID = 0
3,520,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,659 UART: [idev] Erasing UDS.KEYID = 0
6,023,885 UART: [idev] Sha1 KeyId Algorithm
6,046,425 UART: [idev] --
6,049,453 UART: [ldev] ++
6,050,026 UART: [ldev] CDI.KEYID = 6
6,050,944 UART: [ldev] SUBJECT.KEYID = 5
6,052,108 UART: [ldev] AUTHORITY.KEYID = 7
6,053,347 UART: [ldev] FE.KEYID = 1
6,099,278 UART: [ldev] Erasing FE.KEYID = 1
8,601,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,529 UART: [ldev] --
10,414,020 UART: [fwproc] Wait for Commands...
10,416,392 UART: [fwproc] Recv command 0x46574c44
10,418,488 UART: [fwproc] Recv'd Img size: 114448 bytes
11,486,378 UART: ROM Fatal Error: 0x000B001A
11,489,484 >>> mbox cmd response: failed
11,489,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,490,240 >>> mbox cmd response: failed
11,490,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,490,801 >>> mbox cmd response: failed
Initializing fuses
2,053,064 writing to cptra_bootfsm_go
2,242,480 UART:
2,242,854 UART: Running Caliptra ROM ...
2,243,909 UART:
2,244,067 UART: [state] CFI Enabled
2,318,641 UART: [state] LifecycleState = Unprovisioned
2,320,532 UART: [state] DebugLocked = No
2,322,059 UART: [state] WD Timer not started. Device not locked for debugging
2,324,942 UART: [kat] SHA2-256
2,504,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,650 UART: [kat] ++
2,516,110 UART: [kat] sha1
2,526,837 UART: [kat] SHA2-256
2,529,856 UART: [kat] SHA2-384
2,535,468 UART: [kat] SHA2-512-ACC
2,538,409 UART: [kat] ECC-384
5,002,256 UART: [kat] HMAC-384Kdf
5,023,651 UART: [kat] LMS
5,553,115 UART: [kat] --
5,557,236 UART: [cold-reset] ++
5,558,637 UART: [fht] FHT @ 0x50003400
5,570,107 UART: [idev] ++
5,570,674 UART: [idev] CDI.KEYID = 6
5,571,693 UART: [idev] SUBJECT.KEYID = 7
5,572,801 UART: [idev] UDS.KEYID = 0
5,575,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,455 UART: [idev] Erasing UDS.KEYID = 0
8,082,403 UART: [idev] Sha1 KeyId Algorithm
8,105,538 UART: [idev] --
8,109,819 UART: [ldev] ++
8,110,392 UART: [ldev] CDI.KEYID = 6
8,111,617 UART: [ldev] SUBJECT.KEYID = 5
8,112,760 UART: [ldev] AUTHORITY.KEYID = 7
8,113,886 UART: [ldev] FE.KEYID = 1
8,153,562 UART: [ldev] Erasing FE.KEYID = 1
10,652,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,502 UART: [ldev] --
12,444,030 UART: [fwproc] Wait for Commands...
12,446,673 UART: [fwproc] Recv command 0x46574c44
12,448,767 UART: [fwproc] Recv'd Img size: 114448 bytes
15,857,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,931,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,319,418 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,384,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,273,725 >>> mbox cmd response: failed
11,274,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,274,984 >>> mbox cmd response: failed
11,275,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,275,554 >>> mbox cmd response: failed
Initializing fuses
2,050,285 writing to cptra_bootfsm_go
5,424,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,118,392 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,485 writing to cptra_bootfsm_go
192,651 UART:
193,000 UART: Running Caliptra ROM ...
194,096 UART:
603,771 UART: [state] CFI Enabled
615,552 UART: [state] LifecycleState = Unprovisioned
617,390 UART: [state] DebugLocked = No
620,142 UART: [state] WD Timer not started. Device not locked for debugging
623,578 UART: [kat] SHA2-256
802,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,257 UART: [kat] ++
814,794 UART: [kat] sha1
825,950 UART: [kat] SHA2-256
828,951 UART: [kat] SHA2-384
834,977 UART: [kat] SHA2-512-ACC
837,939 UART: [kat] ECC-384
3,283,506 UART: [kat] HMAC-384Kdf
3,295,348 UART: [kat] LMS
3,824,842 UART: [kat] --
3,831,101 UART: [cold-reset] ++
3,832,601 UART: [fht] FHT @ 0x50003400
3,844,337 UART: [idev] ++
3,844,901 UART: [idev] CDI.KEYID = 6
3,845,807 UART: [idev] SUBJECT.KEYID = 7
3,847,026 UART: [idev] UDS.KEYID = 0
3,849,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,766 UART: [idev] Erasing UDS.KEYID = 0
6,319,293 UART: [idev] Sha1 KeyId Algorithm
6,342,192 UART: [idev] --
6,346,245 UART: [ldev] ++
6,346,819 UART: [ldev] CDI.KEYID = 6
6,347,755 UART: [ldev] SUBJECT.KEYID = 5
6,348,926 UART: [ldev] AUTHORITY.KEYID = 7
6,350,163 UART: [ldev] FE.KEYID = 1
6,359,625 UART: [ldev] Erasing FE.KEYID = 1
8,836,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,547 UART: [ldev] --
10,627,870 UART: [fwproc] Wait for Commands...
10,630,778 UART: [fwproc] Recv command 0x46574c44
10,632,879 UART: [fwproc] Recv'd Img size: 114448 bytes
11,703,086 UART: ROM Fatal Error: 0x000B001A
11,706,205 >>> mbox cmd response: failed
11,706,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,707,019 >>> mbox cmd response: failed
11,707,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,707,715 >>> mbox cmd response: failed
Initializing fuses
2,051,907 writing to cptra_bootfsm_go
2,241,253 UART:
2,241,591 UART: Running Caliptra ROM ...
2,242,734 UART:
8,754,559 UART: [state] CFI Enabled
8,769,406 UART: [state] LifecycleState = Unprovisioned
8,771,276 UART: [state] DebugLocked = No
8,772,775 UART: [state] WD Timer not started. Device not locked for debugging
8,777,111 UART: [kat] SHA2-256
8,956,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,967,826 UART: [kat] ++
8,968,378 UART: [kat] sha1
8,980,512 UART: [kat] SHA2-256
8,983,567 UART: [kat] SHA2-384
8,989,458 UART: [kat] SHA2-512-ACC
8,992,413 UART: [kat] ECC-384
11,434,098 UART: [kat] HMAC-384Kdf
11,446,389 UART: [kat] LMS
11,975,884 UART: [kat] --
11,979,679 UART: [cold-reset] ++
11,980,644 UART: [fht] FHT @ 0x50003400
11,991,457 UART: [idev] ++
11,992,027 UART: [idev] CDI.KEYID = 6
11,993,154 UART: [idev] SUBJECT.KEYID = 7
11,994,261 UART: [idev] UDS.KEYID = 0
11,997,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,140,984 UART: [idev] Erasing UDS.KEYID = 0
14,460,479 UART: [idev] Sha1 KeyId Algorithm
14,483,330 UART: [idev] --
14,487,322 UART: [ldev] ++
14,487,891 UART: [ldev] CDI.KEYID = 6
14,488,771 UART: [ldev] SUBJECT.KEYID = 5
14,489,989 UART: [ldev] AUTHORITY.KEYID = 7
14,491,223 UART: [ldev] FE.KEYID = 1
14,502,556 UART: [ldev] Erasing FE.KEYID = 1
16,976,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,692,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,708,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,724,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,739,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,759,914 UART: [ldev] --
18,763,746 UART: [fwproc] Wait for Commands...
18,765,414 UART: [fwproc] Recv command 0x46574c44
18,767,519 UART: [fwproc] Recv'd Img size: 114448 bytes
22,166,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,248,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,316,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,635,174 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,700,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,473,467 >>> mbox cmd response: failed
11,474,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,474,422 >>> mbox cmd response: failed
11,474,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,474,927 >>> mbox cmd response: failed
Initializing fuses
2,048,149 writing to cptra_bootfsm_go
12,091,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,669,507 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,256 UART:
192,640 UART: Running Caliptra ROM ...
193,828 UART:
193,986 UART: [state] CFI Enabled
261,604 UART: [state] LifecycleState = Unprovisioned
264,005 UART: [state] DebugLocked = No
266,581 UART: [state] WD Timer not started. Device not locked for debugging
271,220 UART: [kat] SHA2-256
461,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,875 UART: [kat] ++
472,362 UART: [kat] sha1
483,131 UART: [kat] SHA2-256
486,155 UART: [kat] SHA2-384
492,480 UART: [kat] SHA2-512-ACC
495,063 UART: [kat] ECC-384
2,946,163 UART: [kat] HMAC-384Kdf
2,970,732 UART: [kat] LMS
3,502,504 UART: [kat] --
3,507,097 UART: [cold-reset] ++
3,509,036 UART: [fht] FHT @ 0x50003400
3,520,830 UART: [idev] ++
3,521,512 UART: [idev] CDI.KEYID = 6
3,522,478 UART: [idev] SUBJECT.KEYID = 7
3,523,892 UART: [idev] UDS.KEYID = 0
3,526,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,526 UART: [idev] Erasing UDS.KEYID = 0
6,027,700 UART: [idev] Sha1 KeyId Algorithm
6,051,047 UART: [idev] --
6,056,512 UART: [ldev] ++
6,057,207 UART: [ldev] CDI.KEYID = 6
6,058,116 UART: [ldev] SUBJECT.KEYID = 5
6,059,279 UART: [ldev] AUTHORITY.KEYID = 7
6,060,513 UART: [ldev] FE.KEYID = 1
6,099,257 UART: [ldev] Erasing FE.KEYID = 1
8,603,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,340 UART: [ldev] --
10,413,272 UART: [fwproc] Wait for Commands...
10,415,597 UART: [fwproc] Recv command 0x46574c44
10,417,866 UART: [fwproc] Recv'd Img size: 114448 bytes
11,520,109 UART: ROM Fatal Error: 0x000B001A
11,523,820 >>> mbox cmd response: failed
11,524,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,524,643 >>> mbox cmd response: failed
11,524,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,525,214 >>> mbox cmd response: failed
Initializing fuses
2,052,471 writing to cptra_bootfsm_go
2,241,858 UART:
2,242,195 UART: Running Caliptra ROM ...
2,243,325 UART:
2,243,496 UART: [state] CFI Enabled
2,304,647 UART: [state] LifecycleState = Unprovisioned
2,306,972 UART: [state] DebugLocked = No
2,308,357 UART: [state] WD Timer not started. Device not locked for debugging
2,313,302 UART: [kat] SHA2-256
2,503,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,926 UART: [kat] ++
2,514,433 UART: [kat] sha1
2,525,439 UART: [kat] SHA2-256
2,528,472 UART: [kat] SHA2-384
2,535,601 UART: [kat] SHA2-512-ACC
2,538,168 UART: [kat] ECC-384
4,987,517 UART: [kat] HMAC-384Kdf
5,011,380 UART: [kat] LMS
5,543,161 UART: [kat] --
5,549,060 UART: [cold-reset] ++
5,550,406 UART: [fht] FHT @ 0x50003400
5,563,060 UART: [idev] ++
5,563,748 UART: [idev] CDI.KEYID = 6
5,564,722 UART: [idev] SUBJECT.KEYID = 7
5,565,877 UART: [idev] UDS.KEYID = 0
5,568,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,530 UART: [idev] Erasing UDS.KEYID = 0
8,069,808 UART: [idev] Sha1 KeyId Algorithm
8,090,996 UART: [idev] --
8,095,401 UART: [ldev] ++
8,096,093 UART: [ldev] CDI.KEYID = 6
8,096,988 UART: [ldev] SUBJECT.KEYID = 5
8,098,206 UART: [ldev] AUTHORITY.KEYID = 7
8,099,388 UART: [ldev] FE.KEYID = 1
8,139,557 UART: [ldev] Erasing FE.KEYID = 1
10,645,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,214 UART: [ldev] --
12,451,174 UART: [fwproc] Wait for Commands...
12,453,111 UART: [fwproc] Recv command 0x46574c44
12,455,429 UART: [fwproc] Recv'd Img size: 114448 bytes
15,903,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,102,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,645,311 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,439,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,321,471 >>> mbox cmd response: failed
11,322,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,322,454 >>> mbox cmd response: failed
11,322,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,323,024 >>> mbox cmd response: failed
Initializing fuses
2,048,139 writing to cptra_bootfsm_go
5,469,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,760,720 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,568 UART:
192,924 UART: Running Caliptra ROM ...
194,028 UART:
603,550 UART: [state] CFI Enabled
616,102 UART: [state] LifecycleState = Unprovisioned
618,475 UART: [state] DebugLocked = No
619,804 UART: [state] WD Timer not started. Device not locked for debugging
625,237 UART: [kat] SHA2-256
815,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,956 UART: [kat] ++
826,546 UART: [kat] sha1
837,759 UART: [kat] SHA2-256
840,800 UART: [kat] SHA2-384
847,717 UART: [kat] SHA2-512-ACC
850,277 UART: [kat] ECC-384
3,293,481 UART: [kat] HMAC-384Kdf
3,306,202 UART: [kat] LMS
3,838,030 UART: [kat] --
3,843,321 UART: [cold-reset] ++
3,844,408 UART: [fht] FHT @ 0x50003400
3,854,746 UART: [idev] ++
3,855,420 UART: [idev] CDI.KEYID = 6
3,856,363 UART: [idev] SUBJECT.KEYID = 7
3,857,574 UART: [idev] UDS.KEYID = 0
3,860,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,226 UART: [idev] Erasing UDS.KEYID = 0
6,335,537 UART: [idev] Sha1 KeyId Algorithm
6,356,604 UART: [idev] --
6,361,009 UART: [ldev] ++
6,361,703 UART: [ldev] CDI.KEYID = 6
6,362,619 UART: [ldev] SUBJECT.KEYID = 5
6,363,795 UART: [ldev] AUTHORITY.KEYID = 7
6,365,026 UART: [ldev] FE.KEYID = 1
6,375,489 UART: [ldev] Erasing FE.KEYID = 1
8,851,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,689 UART: [ldev] --
10,642,855 UART: [fwproc] Wait for Commands...
10,644,361 UART: [fwproc] Recv command 0x46574c44
10,646,673 UART: [fwproc] Recv'd Img size: 114448 bytes
11,748,390 UART: ROM Fatal Error: 0x000B001A
11,752,061 >>> mbox cmd response: failed
11,752,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,752,749 >>> mbox cmd response: failed
11,753,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,312 >>> mbox cmd response: failed
Initializing fuses
2,064,752 writing to cptra_bootfsm_go
2,254,052 UART:
2,254,407 UART: Running Caliptra ROM ...
2,255,549 UART:
8,705,482 UART: [state] CFI Enabled
8,716,366 UART: [state] LifecycleState = Unprovisioned
8,718,771 UART: [state] DebugLocked = No
8,720,596 UART: [state] WD Timer not started. Device not locked for debugging
8,725,596 UART: [kat] SHA2-256
8,915,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,926,273 UART: [kat] ++
8,926,828 UART: [kat] sha1
8,938,320 UART: [kat] SHA2-256
8,941,349 UART: [kat] SHA2-384
8,947,624 UART: [kat] SHA2-512-ACC
8,950,200 UART: [kat] ECC-384
11,393,660 UART: [kat] HMAC-384Kdf
11,406,476 UART: [kat] LMS
11,938,305 UART: [kat] --
11,942,043 UART: [cold-reset] ++
11,943,658 UART: [fht] FHT @ 0x50003400
11,956,045 UART: [idev] ++
11,956,726 UART: [idev] CDI.KEYID = 6
11,957,665 UART: [idev] SUBJECT.KEYID = 7
11,958,874 UART: [idev] UDS.KEYID = 0
11,961,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,105,427 UART: [idev] Erasing UDS.KEYID = 0
14,432,561 UART: [idev] Sha1 KeyId Algorithm
14,455,729 UART: [idev] --
14,460,937 UART: [ldev] ++
14,461,647 UART: [ldev] CDI.KEYID = 6
14,462,529 UART: [ldev] SUBJECT.KEYID = 5
14,463,608 UART: [ldev] AUTHORITY.KEYID = 7
14,464,859 UART: [ldev] FE.KEYID = 1
14,476,285 UART: [ldev] Erasing FE.KEYID = 1
16,953,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,672,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,687,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,703,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,718,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,740,329 UART: [ldev] --
18,746,406 UART: [fwproc] Wait for Commands...
18,748,774 UART: [fwproc] Recv command 0x46574c44
18,751,088 UART: [fwproc] Recv'd Img size: 114448 bytes
22,195,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,275,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,391,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,934,700 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,753,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,544,737 >>> mbox cmd response: failed
11,545,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,545,882 >>> mbox cmd response: failed
11,546,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,546,449 >>> mbox cmd response: failed
Initializing fuses
2,050,881 writing to cptra_bootfsm_go
12,078,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,273,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,279 UART: [kat] SHA2-256
892,217 UART: [kat] SHA2-384
895,014 UART: [kat] SHA2-512-ACC
896,915 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,476,241 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,598 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,118 UART: [idev] --
1,515,173 UART: [ldev] ++
1,515,341 UART: [ldev] CDI.KEYID = 6
1,515,704 UART: [ldev] SUBJECT.KEYID = 5
1,516,130 UART: [ldev] AUTHORITY.KEYID = 7
1,516,593 UART: [ldev] FE.KEYID = 1
1,521,707 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,236 UART: [ldev] --
1,586,543 UART: [fwproc] Waiting for Commands...
1,587,264 UART: [fwproc] Received command 0x46574c44
1,588,055 UART: [fwproc] Received Image of size 114448 bytes
1,628,419 UART: ROM Fatal Error: 0x000B001A
1,629,578 >>> mbox cmd response: failed
1,629,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,584 >>> mbox cmd response: failed
1,629,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,113 UART: [kat] SHA2-256
882,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,159 UART: [kat] ++
886,311 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,926 UART: [kat] LMS
1,475,122 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,494 UART: [idev] Erasing UDS.KEYID = 0
1,504,576 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,084 UART: [idev] --
1,514,147 UART: [ldev] ++
1,514,315 UART: [ldev] CDI.KEYID = 6
1,514,678 UART: [ldev] SUBJECT.KEYID = 5
1,515,104 UART: [ldev] AUTHORITY.KEYID = 7
1,515,567 UART: [ldev] FE.KEYID = 1
1,520,835 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,398 UART: [ldev] --
1,585,773 UART: [fwproc] Waiting for Commands...
1,586,470 UART: [fwproc] Received command 0x46574c44
1,587,261 UART: [fwproc] Received Image of size 114448 bytes
2,886,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,176 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,775 >>> mbox cmd response: failed
1,479,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,781 >>> mbox cmd response: failed
1,479,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,230 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,254 UART: [kat] SHA2-256
892,192 UART: [kat] SHA2-384
894,763 UART: [kat] SHA2-512-ACC
896,664 UART: [kat] ECC-384
902,405 UART: [kat] HMAC-384Kdf
906,981 UART: [kat] LMS
1,475,177 UART: [kat] --
1,475,838 UART: [cold-reset] ++
1,476,250 UART: [fht] Storing FHT @ 0x50003400
1,478,837 UART: [idev] ++
1,479,005 UART: [idev] CDI.KEYID = 6
1,479,365 UART: [idev] SUBJECT.KEYID = 7
1,479,789 UART: [idev] UDS.KEYID = 0
1,480,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,591 UART: [idev] Erasing UDS.KEYID = 0
1,504,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,569 UART: [idev] --
1,513,820 UART: [ldev] ++
1,513,988 UART: [ldev] CDI.KEYID = 6
1,514,351 UART: [ldev] SUBJECT.KEYID = 5
1,514,777 UART: [ldev] AUTHORITY.KEYID = 7
1,515,240 UART: [ldev] FE.KEYID = 1
1,520,308 UART: [ldev] Erasing FE.KEYID = 1
1,545,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,933 UART: [ldev] --
1,584,226 UART: [fwproc] Waiting for Commands...
1,585,035 UART: [fwproc] Received command 0x46574c44
1,585,826 UART: [fwproc] Received Image of size 114448 bytes
1,625,408 UART: ROM Fatal Error: 0x000B001A
1,626,567 >>> mbox cmd response: failed
1,626,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,573 >>> mbox cmd response: failed
1,626,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,892 UART: [kat] SHA2-256
881,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,938 UART: [kat] ++
886,090 UART: [kat] sha1
890,320 UART: [kat] SHA2-256
892,258 UART: [kat] SHA2-384
895,153 UART: [kat] SHA2-512-ACC
897,054 UART: [kat] ECC-384
902,521 UART: [kat] HMAC-384Kdf
907,069 UART: [kat] LMS
1,475,265 UART: [kat] --
1,476,266 UART: [cold-reset] ++
1,476,650 UART: [fht] Storing FHT @ 0x50003400
1,479,335 UART: [idev] ++
1,479,503 UART: [idev] CDI.KEYID = 6
1,479,863 UART: [idev] SUBJECT.KEYID = 7
1,480,287 UART: [idev] UDS.KEYID = 0
1,480,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,459 UART: [idev] Erasing UDS.KEYID = 0
1,505,271 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,811 UART: [idev] --
1,514,862 UART: [ldev] ++
1,515,030 UART: [ldev] CDI.KEYID = 6
1,515,393 UART: [ldev] SUBJECT.KEYID = 5
1,515,819 UART: [ldev] AUTHORITY.KEYID = 7
1,516,282 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,547,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,335 UART: [ldev] --
1,586,662 UART: [fwproc] Waiting for Commands...
1,587,277 UART: [fwproc] Received command 0x46574c44
1,588,068 UART: [fwproc] Received Image of size 114448 bytes
2,886,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,072 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,533 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,480,640 >>> mbox cmd response: failed
1,480,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,646 >>> mbox cmd response: failed
1,480,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,265 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,828 UART: [kat] HMAC-384Kdf
922,188 UART: [kat] LMS
1,170,516 UART: [kat] --
1,171,177 UART: [cold-reset] ++
1,171,633 UART: [fht] FHT @ 0x50003400
1,174,276 UART: [idev] ++
1,174,444 UART: [idev] CDI.KEYID = 6
1,174,804 UART: [idev] SUBJECT.KEYID = 7
1,175,228 UART: [idev] UDS.KEYID = 0
1,175,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,381 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,075 UART: [ldev] Erasing FE.KEYID = 1
1,241,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,599 UART: [ldev] --
1,280,860 UART: [fwproc] Wait for Commands...
1,281,604 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,354 UART: ROM Fatal Error: 0x000B001A
1,322,513 >>> mbox cmd response: failed
1,322,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,519 >>> mbox cmd response: failed
1,322,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,901 UART: [kat] SHA2-256
903,841 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
918,478 UART: [kat] HMAC-384Kdf
922,944 UART: [kat] LMS
1,171,272 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,849 UART: [fht] FHT @ 0x50003400
1,175,494 UART: [idev] ++
1,175,662 UART: [idev] CDI.KEYID = 6
1,176,022 UART: [idev] SUBJECT.KEYID = 7
1,176,446 UART: [idev] UDS.KEYID = 0
1,176,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,464 UART: [idev] Erasing UDS.KEYID = 0
1,201,393 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,402 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,093 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,448 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,960 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,237 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,474 >>> mbox cmd response: failed
1,178,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,480 >>> mbox cmd response: failed
1,178,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,910 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,743 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,902 UART: [idev] Sha1 KeyId Algorithm
1,210,380 UART: [idev] --
1,211,332 UART: [ldev] ++
1,211,500 UART: [ldev] CDI.KEYID = 6
1,211,863 UART: [ldev] SUBJECT.KEYID = 5
1,212,289 UART: [ldev] AUTHORITY.KEYID = 7
1,212,752 UART: [ldev] FE.KEYID = 1
1,217,642 UART: [ldev] Erasing FE.KEYID = 1
1,244,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,772 UART: [ldev] --
1,284,281 UART: [fwproc] Wait for Commands...
1,285,065 UART: [fwproc] Recv command 0x46574c44
1,285,793 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,585 UART: ROM Fatal Error: 0x000B001A
1,325,744 >>> mbox cmd response: failed
1,325,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,750 >>> mbox cmd response: failed
1,325,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
893,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,028 UART: [kat] ++
898,180 UART: [kat] sha1
902,604 UART: [kat] SHA2-256
904,544 UART: [kat] SHA2-384
907,179 UART: [kat] SHA2-512-ACC
909,080 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,477 UART: [kat] LMS
1,171,805 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,173,198 UART: [fht] FHT @ 0x50003400
1,175,801 UART: [idev] ++
1,175,969 UART: [idev] CDI.KEYID = 6
1,176,329 UART: [idev] SUBJECT.KEYID = 7
1,176,753 UART: [idev] UDS.KEYID = 0
1,177,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,961 UART: [idev] Erasing UDS.KEYID = 0
1,202,224 UART: [idev] Sha1 KeyId Algorithm
1,210,860 UART: [idev] --
1,212,140 UART: [ldev] ++
1,212,308 UART: [ldev] CDI.KEYID = 6
1,212,671 UART: [ldev] SUBJECT.KEYID = 5
1,213,097 UART: [ldev] AUTHORITY.KEYID = 7
1,213,560 UART: [ldev] FE.KEYID = 1
1,218,932 UART: [ldev] Erasing FE.KEYID = 1
1,244,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,476 UART: [ldev] --
1,283,883 UART: [fwproc] Wait for Commands...
1,284,697 UART: [fwproc] Recv command 0x46574c44
1,285,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,510 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,177,841 >>> mbox cmd response: failed
1,177,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,847 >>> mbox cmd response: failed
1,177,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,341 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,313 UART: [kat] SHA2-256
901,253 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,452 UART: [kat] HMAC-384Kdf
919,930 UART: [kat] LMS
1,168,242 UART: [kat] --
1,169,269 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,305 UART: [idev] ++
1,172,473 UART: [idev] CDI.KEYID = 6
1,172,834 UART: [idev] SUBJECT.KEYID = 7
1,173,259 UART: [idev] UDS.KEYID = 0
1,173,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,208,125 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,912 UART: [ldev] Erasing FE.KEYID = 1
1,242,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,734 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,989 UART: ROM Fatal Error: 0x000B001A
1,323,148 >>> mbox cmd response: failed
1,323,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,154 >>> mbox cmd response: failed
1,323,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,213 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,906 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,241 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,733 >>> mbox cmd response: failed
1,176,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,739 >>> mbox cmd response: failed
1,176,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,421 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,681 UART: [ldev] --
1,281,099 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,599 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,237 UART: ROM Fatal Error: 0x000B001A
1,322,396 >>> mbox cmd response: failed
1,322,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,402 >>> mbox cmd response: failed
1,322,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,729 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,174,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,620 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,432 UART: [idev] --
1,208,369 UART: [ldev] ++
1,208,537 UART: [ldev] CDI.KEYID = 6
1,208,901 UART: [ldev] SUBJECT.KEYID = 5
1,209,328 UART: [ldev] AUTHORITY.KEYID = 7
1,209,791 UART: [ldev] FE.KEYID = 1
1,214,947 UART: [ldev] Erasing FE.KEYID = 1
1,241,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,825 UART: [ldev] --
1,280,205 UART: [fwproc] Wait for Commands...
1,280,948 UART: [fwproc] Recv command 0x46574c44
1,281,681 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,932 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,006 >>> mbox cmd response: failed
1,174,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,012 >>> mbox cmd response: failed
1,174,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,366 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
4,880,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,358,706 >>> mbox cmd response: failed
15,359,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,359,759 >>> mbox cmd response: failed
15,360,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,360,322 >>> mbox cmd response: failed
Initializing fuses
2,062,225 writing to cptra_bootfsm_go
6,923,065 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,494,511 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
4,878,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,319,278 >>> mbox cmd response: failed
15,319,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,320,236 >>> mbox cmd response: failed
15,320,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,320,801 >>> mbox cmd response: failed
Initializing fuses
2,063,074 writing to cptra_bootfsm_go
6,937,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,495,245 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
5,188,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,500,211 >>> mbox cmd response: failed
15,500,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,501,302 >>> mbox cmd response: failed
15,501,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,501,862 >>> mbox cmd response: failed
Initializing fuses
2,057,237 writing to cptra_bootfsm_go
9,547,129 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,989,564 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,621 writing to cptra_bootfsm_go
5,189,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,498,365 >>> mbox cmd response: failed
15,499,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,499,357 >>> mbox cmd response: failed
15,499,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,499,921 >>> mbox cmd response: failed
Initializing fuses
2,063,128 writing to cptra_bootfsm_go
9,552,656 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,999,334 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,439,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,401,907 >>> mbox cmd response: failed
11,402,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,403,008 >>> mbox cmd response: failed
11,403,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,403,578 >>> mbox cmd response: failed
Initializing fuses
2,053,778 writing to cptra_bootfsm_go
5,524,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,328,670 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,458,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,423,382 >>> mbox cmd response: failed
11,423,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,424,263 >>> mbox cmd response: failed
11,424,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,424,830 >>> mbox cmd response: failed
Initializing fuses
2,057,491 writing to cptra_bootfsm_go
5,520,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,319,783 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,788,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,669,073 >>> mbox cmd response: failed
11,669,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,670,039 >>> mbox cmd response: failed
11,670,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,670,603 >>> mbox cmd response: failed
Initializing fuses
2,053,822 writing to cptra_bootfsm_go
11,967,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,686,278 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,795,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,680,836 >>> mbox cmd response: failed
11,681,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,681,761 >>> mbox cmd response: failed
11,682,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,682,317 >>> mbox cmd response: failed
Initializing fuses
2,056,053 writing to cptra_bootfsm_go
11,964,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,695,412 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,445,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,433,042 >>> mbox cmd response: failed
11,433,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,433,972 >>> mbox cmd response: failed
11,434,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,434,536 >>> mbox cmd response: failed
Initializing fuses
2,056,469 writing to cptra_bootfsm_go
5,509,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,326,742 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,468,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,424,531 >>> mbox cmd response: failed
11,425,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,425,515 >>> mbox cmd response: failed
11,425,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,426,092 >>> mbox cmd response: failed
Initializing fuses
2,059,790 writing to cptra_bootfsm_go
5,522,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,352,357 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,795,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,676,907 >>> mbox cmd response: failed
11,677,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,677,857 >>> mbox cmd response: failed
11,678,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,678,425 >>> mbox cmd response: failed
Initializing fuses
2,057,267 writing to cptra_bootfsm_go
11,954,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,689,620 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,785,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,666,422 >>> mbox cmd response: failed
11,666,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,667,318 >>> mbox cmd response: failed
11,667,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,667,878 >>> mbox cmd response: failed
Initializing fuses
2,060,734 writing to cptra_bootfsm_go
11,983,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,697,962 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,081 >>> mbox cmd response: failed
1,198,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,087 >>> mbox cmd response: failed
1,198,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,783 UART: [kat] SHA2-256
892,721 UART: [kat] SHA2-384
895,486 UART: [kat] SHA2-512-ACC
897,387 UART: [kat] ECC-384
903,054 UART: [kat] HMAC-384Kdf
907,534 UART: [kat] LMS
1,475,730 UART: [kat] --
1,476,725 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,800 UART: [idev] Erasing UDS.KEYID = 0
1,505,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,236 UART: [idev] --
1,515,407 UART: [ldev] ++
1,515,575 UART: [ldev] CDI.KEYID = 6
1,515,938 UART: [ldev] SUBJECT.KEYID = 5
1,516,364 UART: [ldev] AUTHORITY.KEYID = 7
1,516,827 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,546,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,394 UART: [ldev] --
1,585,823 UART: [fwproc] Waiting for Commands...
1,586,540 UART: [fwproc] Received command 0x46574c44
1,587,331 UART: [fwproc] Received Image of size 114448 bytes
2,886,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,540 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,027 >>> mbox cmd response: failed
1,199,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,033 >>> mbox cmd response: failed
1,199,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,990 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,882 >>> mbox cmd response: failed
1,197,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,888 >>> mbox cmd response: failed
1,197,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,824 UART: [kat] SHA2-256
881,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,870 UART: [kat] ++
886,022 UART: [kat] sha1
890,192 UART: [kat] SHA2-256
892,130 UART: [kat] SHA2-384
894,973 UART: [kat] SHA2-512-ACC
896,874 UART: [kat] ECC-384
902,529 UART: [kat] HMAC-384Kdf
906,957 UART: [kat] LMS
1,475,153 UART: [kat] --
1,476,176 UART: [cold-reset] ++
1,476,516 UART: [fht] Storing FHT @ 0x50003400
1,479,511 UART: [idev] ++
1,479,679 UART: [idev] CDI.KEYID = 6
1,480,039 UART: [idev] SUBJECT.KEYID = 7
1,480,463 UART: [idev] UDS.KEYID = 0
1,480,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,923 UART: [idev] Erasing UDS.KEYID = 0
1,504,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,311 UART: [idev] --
1,514,404 UART: [ldev] ++
1,514,572 UART: [ldev] CDI.KEYID = 6
1,514,935 UART: [ldev] SUBJECT.KEYID = 5
1,515,361 UART: [ldev] AUTHORITY.KEYID = 7
1,515,824 UART: [ldev] FE.KEYID = 1
1,521,160 UART: [ldev] Erasing FE.KEYID = 1
1,546,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,189 UART: [ldev] --
1,585,548 UART: [fwproc] Waiting for Commands...
1,586,165 UART: [fwproc] Received command 0x46574c44
1,586,956 UART: [fwproc] Received Image of size 114448 bytes
2,885,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,711 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,260 >>> mbox cmd response: failed
1,200,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,266 >>> mbox cmd response: failed
1,200,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,063 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,149 >>> mbox cmd response: failed
1,200,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,155 >>> mbox cmd response: failed
1,200,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,863 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
892,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,817 UART: [kat] ++
896,969 UART: [kat] sha1
901,187 UART: [kat] SHA2-256
903,127 UART: [kat] SHA2-384
905,810 UART: [kat] SHA2-512-ACC
907,711 UART: [kat] ECC-384
917,576 UART: [kat] HMAC-384Kdf
922,168 UART: [kat] LMS
1,170,496 UART: [kat] --
1,171,331 UART: [cold-reset] ++
1,171,741 UART: [fht] FHT @ 0x50003400
1,174,376 UART: [idev] ++
1,174,544 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,328 UART: [idev] UDS.KEYID = 0
1,175,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,681 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,250 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,300 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,887 >>> mbox cmd response: failed
1,196,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,893 >>> mbox cmd response: failed
1,196,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,098 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,956 >>> mbox cmd response: failed
1,199,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,962 >>> mbox cmd response: failed
1,199,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
893,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,880 UART: [kat] ++
898,032 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,691 UART: [kat] HMAC-384Kdf
923,425 UART: [kat] LMS
1,171,753 UART: [kat] --
1,172,620 UART: [cold-reset] ++
1,173,156 UART: [fht] FHT @ 0x50003400
1,175,895 UART: [idev] ++
1,176,063 UART: [idev] CDI.KEYID = 6
1,176,423 UART: [idev] SUBJECT.KEYID = 7
1,176,847 UART: [idev] UDS.KEYID = 0
1,177,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,773 UART: [idev] Erasing UDS.KEYID = 0
1,201,912 UART: [idev] Sha1 KeyId Algorithm
1,210,388 UART: [idev] --
1,211,536 UART: [ldev] ++
1,211,704 UART: [ldev] CDI.KEYID = 6
1,212,067 UART: [ldev] SUBJECT.KEYID = 5
1,212,493 UART: [ldev] AUTHORITY.KEYID = 7
1,212,956 UART: [ldev] FE.KEYID = 1
1,218,316 UART: [ldev] Erasing FE.KEYID = 1
1,244,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,728 UART: [ldev] --
1,284,063 UART: [fwproc] Wait for Commands...
1,284,669 UART: [fwproc] Recv command 0x46574c44
1,285,397 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,372 >>> mbox cmd response: failed
1,200,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,378 >>> mbox cmd response: failed
1,200,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,775 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,295 >>> mbox cmd response: failed
1,199,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,301 >>> mbox cmd response: failed
1,199,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,174,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,309 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,884 UART: [fwproc] Wait for Commands...
1,281,551 UART: [fwproc] Recv command 0x46574c44
1,282,284 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,717 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,951 >>> mbox cmd response: failed
1,199,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,957 >>> mbox cmd response: failed
1,199,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,787 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,912 >>> mbox cmd response: failed
1,199,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,918 >>> mbox cmd response: failed
1,199,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,411 UART: [kat] LMS
1,169,723 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,174,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,484 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,077 UART: [ldev] SUBJECT.KEYID = 5
1,210,504 UART: [ldev] AUTHORITY.KEYID = 7
1,210,967 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,699 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,942 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,201,206 >>> mbox cmd response: failed
1,201,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,212 >>> mbox cmd response: failed
1,201,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,874 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,079 UART:
192,452 UART: Running Caliptra ROM ...
193,625 UART:
193,776 UART: [state] CFI Enabled
262,507 UART: [state] LifecycleState = Unprovisioned
264,472 UART: [state] DebugLocked = No
266,233 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,571 UART: [kat] SHA2-256
440,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,793 UART: [kat] ++
451,284 UART: [kat] sha1
463,724 UART: [kat] SHA2-256
466,416 UART: [kat] SHA2-384
472,015 UART: [kat] SHA2-512-ACC
474,357 UART: [kat] ECC-384
2,767,998 UART: [kat] HMAC-384Kdf
2,800,308 UART: [kat] LMS
3,990,617 UART: [kat] --
3,995,309 UART: [cold-reset] ++
3,997,790 UART: [fht] Storing FHT @ 0x50003400
4,007,984 UART: [idev] ++
4,008,553 UART: [idev] CDI.KEYID = 6
4,009,501 UART: [idev] SUBJECT.KEYID = 7
4,010,962 UART: [idev] UDS.KEYID = 0
4,014,097 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,726 UART: [idev] Erasing UDS.KEYID = 0
7,342,061 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,614 UART: [idev] --
7,367,233 UART: [ldev] ++
7,367,805 UART: [ldev] CDI.KEYID = 6
7,368,927 UART: [ldev] SUBJECT.KEYID = 5
7,370,340 UART: [ldev] AUTHORITY.KEYID = 7
7,371,511 UART: [ldev] FE.KEYID = 1
7,400,237 UART: [ldev] Erasing FE.KEYID = 1
10,734,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,066 UART: [ldev] --
13,116,068 UART: [fwproc] Waiting for Commands...
13,117,950 UART: [fwproc] Received command 0x46574c44
13,120,135 UART: [fwproc] Received Image of size 114124 bytes
20,711,777 UART: ROM Fatal Error: 0x000B0038
20,715,176 >>> mbox cmd response: failed
20,715,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,715,947 >>> mbox cmd response: failed
20,716,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,716,527 >>> mbox cmd response: failed
Initializing fuses
2,059,225 writing to cptra_bootfsm_go
2,248,529 UART:
2,248,876 UART: Running Caliptra ROM ...
2,250,015 UART:
2,250,182 UART: [state] CFI Enabled
2,302,975 UART: [state] LifecycleState = Unprovisioned
2,304,970 UART: [state] DebugLocked = No
2,307,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,178 UART: [kat] SHA2-256
2,481,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,365 UART: [kat] ++
2,492,883 UART: [kat] sha1
2,504,341 UART: [kat] SHA2-256
2,506,995 UART: [kat] SHA2-384
2,512,176 UART: [kat] SHA2-512-ACC
2,514,527 UART: [kat] ECC-384
4,810,187 UART: [kat] HMAC-384Kdf
4,820,747 UART: [kat] LMS
6,011,054 UART: [kat] --
6,016,531 UART: [cold-reset] ++
6,017,587 UART: [fht] Storing FHT @ 0x50003400
6,028,920 UART: [idev] ++
6,029,489 UART: [idev] CDI.KEYID = 6
6,030,431 UART: [idev] SUBJECT.KEYID = 7
6,031,703 UART: [idev] UDS.KEYID = 0
6,034,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,177,969 UART: [idev] Erasing UDS.KEYID = 0
9,369,242 UART: [idev] Using Sha1 for KeyId Algorithm
9,391,424 UART: [idev] --
9,395,984 UART: [ldev] ++
9,396,559 UART: [ldev] CDI.KEYID = 6
9,397,497 UART: [ldev] SUBJECT.KEYID = 5
9,398,756 UART: [ldev] AUTHORITY.KEYID = 7
9,399,909 UART: [ldev] FE.KEYID = 1
9,442,873 UART: [ldev] Erasing FE.KEYID = 1
12,777,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,088,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,103,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,118,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,132,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,910 UART: [ldev] --
15,157,650 UART: [fwproc] Waiting for Commands...
15,160,776 UART: [fwproc] Received command 0x46574c44
15,162,991 UART: [fwproc] Received Image of size 114124 bytes
19,217,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,296,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,364,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,683,014 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,808,069 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,886,542 >>> mbox cmd response: failed
19,887,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,887,664 >>> mbox cmd response: failed
19,887,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,888,229 >>> mbox cmd response: failed
Initializing fuses
2,044,658 writing to cptra_bootfsm_go
5,818,799 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,863,229 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,382 UART:
192,732 UART: Running Caliptra ROM ...
193,912 UART:
603,740 UART: [state] CFI Enabled
619,414 UART: [state] LifecycleState = Unprovisioned
621,354 UART: [state] DebugLocked = No
622,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,361 UART: [kat] SHA2-256
798,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,633 UART: [kat] ++
809,107 UART: [kat] sha1
820,850 UART: [kat] SHA2-256
823,591 UART: [kat] SHA2-384
830,870 UART: [kat] SHA2-512-ACC
833,275 UART: [kat] ECC-384
3,120,270 UART: [kat] HMAC-384Kdf
3,133,094 UART: [kat] LMS
4,323,210 UART: [kat] --
4,326,333 UART: [cold-reset] ++
4,327,405 UART: [fht] Storing FHT @ 0x50003400
4,337,751 UART: [idev] ++
4,338,323 UART: [idev] CDI.KEYID = 6
4,339,233 UART: [idev] SUBJECT.KEYID = 7
4,340,506 UART: [idev] UDS.KEYID = 0
4,343,537 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,121 UART: [idev] Erasing UDS.KEYID = 0
7,625,957 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,071 UART: [idev] --
7,652,910 UART: [ldev] ++
7,653,481 UART: [ldev] CDI.KEYID = 6
7,654,444 UART: [ldev] SUBJECT.KEYID = 5
7,655,657 UART: [ldev] AUTHORITY.KEYID = 7
7,656,950 UART: [ldev] FE.KEYID = 1
7,667,221 UART: [ldev] Erasing FE.KEYID = 1
10,955,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,022 UART: [ldev] --
13,318,754 UART: [fwproc] Waiting for Commands...
13,321,610 UART: [fwproc] Received command 0x46574c44
13,323,818 UART: [fwproc] Received Image of size 114124 bytes
20,841,167 UART: ROM Fatal Error: 0x000B0038
20,844,634 >>> mbox cmd response: failed
20,845,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,845,446 >>> mbox cmd response: failed
20,845,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,846,009 >>> mbox cmd response: failed
Initializing fuses
2,048,276 writing to cptra_bootfsm_go
2,237,592 UART:
2,237,945 UART: Running Caliptra ROM ...
2,239,088 UART:
2,648,592 UART: [state] CFI Enabled
2,664,671 UART: [state] LifecycleState = Unprovisioned
2,666,629 UART: [state] DebugLocked = No
2,667,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,672,681 UART: [kat] SHA2-256
2,842,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,852,948 UART: [kat] ++
2,853,489 UART: [kat] sha1
2,864,007 UART: [kat] SHA2-256
2,866,711 UART: [kat] SHA2-384
2,872,915 UART: [kat] SHA2-512-ACC
2,875,264 UART: [kat] ECC-384
5,158,451 UART: [kat] HMAC-384Kdf
5,170,417 UART: [kat] LMS
6,360,526 UART: [kat] --
6,364,059 UART: [cold-reset] ++
6,365,734 UART: [fht] Storing FHT @ 0x50003400
6,376,101 UART: [idev] ++
6,376,667 UART: [idev] CDI.KEYID = 6
6,377,634 UART: [idev] SUBJECT.KEYID = 7
6,378,845 UART: [idev] UDS.KEYID = 0
6,381,488 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,524,958 UART: [idev] Erasing UDS.KEYID = 0
9,665,694 UART: [idev] Using Sha1 for KeyId Algorithm
9,686,059 UART: [idev] --
9,690,274 UART: [ldev] ++
9,690,847 UART: [ldev] CDI.KEYID = 6
9,691,813 UART: [ldev] SUBJECT.KEYID = 5
9,693,071 UART: [ldev] AUTHORITY.KEYID = 7
9,694,316 UART: [ldev] FE.KEYID = 1
9,706,913 UART: [ldev] Erasing FE.KEYID = 1
12,995,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,285,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,300,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,315,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,329,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,349,136 UART: [ldev] --
15,354,564 UART: [fwproc] Waiting for Commands...
15,356,605 UART: [fwproc] Received command 0x46574c44
15,358,792 UART: [fwproc] Received Image of size 114124 bytes
19,412,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,490,405 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,559,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,876,141 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,125,791 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,923,575 >>> mbox cmd response: failed
19,924,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,924,547 >>> mbox cmd response: failed
19,924,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,925,119 >>> mbox cmd response: failed
Initializing fuses
2,045,060 writing to cptra_bootfsm_go
6,169,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,116,461 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,273 UART:
192,634 UART: Running Caliptra ROM ...
193,812 UART:
194,314 UART: [state] CFI Enabled
264,553 UART: [state] LifecycleState = Unprovisioned
266,447 UART: [state] DebugLocked = No
267,821 UART: [state] WD Timer not started. Device not locked for debugging
272,067 UART: [kat] SHA2-256
451,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,761 UART: [kat] ++
463,301 UART: [kat] sha1
472,947 UART: [kat] SHA2-256
475,950 UART: [kat] SHA2-384
483,329 UART: [kat] SHA2-512-ACC
486,279 UART: [kat] ECC-384
2,950,631 UART: [kat] HMAC-384Kdf
2,972,436 UART: [kat] LMS
3,501,896 UART: [kat] --
3,507,462 UART: [cold-reset] ++
3,509,777 UART: [fht] FHT @ 0x50003400
3,520,863 UART: [idev] ++
3,521,426 UART: [idev] CDI.KEYID = 6
3,522,339 UART: [idev] SUBJECT.KEYID = 7
3,523,553 UART: [idev] UDS.KEYID = 0
3,526,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,399 UART: [idev] Erasing UDS.KEYID = 0
6,027,106 UART: [idev] Sha1 KeyId Algorithm
6,049,531 UART: [idev] --
6,052,711 UART: [ldev] ++
6,053,292 UART: [ldev] CDI.KEYID = 6
6,054,228 UART: [ldev] SUBJECT.KEYID = 5
6,055,395 UART: [ldev] AUTHORITY.KEYID = 7
6,056,629 UART: [ldev] FE.KEYID = 1
6,101,301 UART: [ldev] Erasing FE.KEYID = 1
8,602,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,652 UART: [ldev] --
10,413,784 UART: [fwproc] Wait for Commands...
10,416,906 UART: [fwproc] Recv command 0x46574c44
10,418,955 UART: [fwproc] Recv'd Img size: 114448 bytes
13,635,978 UART: ROM Fatal Error: 0x000B0038
13,639,065 >>> mbox cmd response: failed
13,639,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,639,911 >>> mbox cmd response: failed
13,640,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,640,539 >>> mbox cmd response: failed
Initializing fuses
2,050,137 writing to cptra_bootfsm_go
2,239,458 UART:
2,239,813 UART: Running Caliptra ROM ...
2,240,859 UART:
2,241,010 UART: [state] CFI Enabled
2,303,676 UART: [state] LifecycleState = Unprovisioned
2,305,519 UART: [state] DebugLocked = No
2,308,334 UART: [state] WD Timer not started. Device not locked for debugging
2,311,479 UART: [kat] SHA2-256
2,490,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,200 UART: [kat] ++
2,502,664 UART: [kat] sha1
2,513,765 UART: [kat] SHA2-256
2,516,785 UART: [kat] SHA2-384
2,522,717 UART: [kat] SHA2-512-ACC
2,525,660 UART: [kat] ECC-384
4,988,475 UART: [kat] HMAC-384Kdf
5,011,119 UART: [kat] LMS
5,540,575 UART: [kat] --
5,546,073 UART: [cold-reset] ++
5,548,655 UART: [fht] FHT @ 0x50003400
5,560,495 UART: [idev] ++
5,561,060 UART: [idev] CDI.KEYID = 6
5,561,971 UART: [idev] SUBJECT.KEYID = 7
5,563,184 UART: [idev] UDS.KEYID = 0
5,566,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,656 UART: [idev] Erasing UDS.KEYID = 0
8,069,510 UART: [idev] Sha1 KeyId Algorithm
8,092,131 UART: [idev] --
8,095,513 UART: [ldev] ++
8,096,095 UART: [ldev] CDI.KEYID = 6
8,097,009 UART: [ldev] SUBJECT.KEYID = 5
8,098,178 UART: [ldev] AUTHORITY.KEYID = 7
8,099,465 UART: [ldev] FE.KEYID = 1
8,140,849 UART: [ldev] Erasing FE.KEYID = 1
10,644,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,977 UART: [ldev] --
12,452,451 UART: [fwproc] Wait for Commands...
12,454,497 UART: [fwproc] Recv command 0x46574c44
12,456,595 UART: [fwproc] Recv'd Img size: 114448 bytes
15,861,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,001,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,319,280 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,384,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,241,584 >>> mbox cmd response: failed
13,242,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,242,610 >>> mbox cmd response: failed
13,242,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,243,177 >>> mbox cmd response: failed
Initializing fuses
2,051,752 writing to cptra_bootfsm_go
5,413,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,066,557 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
192,539 UART:
192,907 UART: Running Caliptra ROM ...
193,989 UART:
603,507 UART: [state] CFI Enabled
619,404 UART: [state] LifecycleState = Unprovisioned
621,328 UART: [state] DebugLocked = No
623,600 UART: [state] WD Timer not started. Device not locked for debugging
627,526 UART: [kat] SHA2-256
806,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,221 UART: [kat] ++
818,670 UART: [kat] sha1
828,894 UART: [kat] SHA2-256
831,903 UART: [kat] SHA2-384
837,663 UART: [kat] SHA2-512-ACC
840,593 UART: [kat] ECC-384
3,283,385 UART: [kat] HMAC-384Kdf
3,297,075 UART: [kat] LMS
3,826,526 UART: [kat] --
3,830,463 UART: [cold-reset] ++
3,832,502 UART: [fht] FHT @ 0x50003400
3,842,457 UART: [idev] ++
3,843,041 UART: [idev] CDI.KEYID = 6
3,844,006 UART: [idev] SUBJECT.KEYID = 7
3,845,116 UART: [idev] UDS.KEYID = 0
3,847,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,938 UART: [idev] Erasing UDS.KEYID = 0
6,316,853 UART: [idev] Sha1 KeyId Algorithm
6,339,818 UART: [idev] --
6,343,215 UART: [ldev] ++
6,343,787 UART: [ldev] CDI.KEYID = 6
6,344,695 UART: [ldev] SUBJECT.KEYID = 5
6,345,856 UART: [ldev] AUTHORITY.KEYID = 7
6,347,144 UART: [ldev] FE.KEYID = 1
6,358,761 UART: [ldev] Erasing FE.KEYID = 1
8,827,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,066 UART: [ldev] --
10,617,889 UART: [fwproc] Wait for Commands...
10,619,399 UART: [fwproc] Recv command 0x46574c44
10,621,453 UART: [fwproc] Recv'd Img size: 114448 bytes
13,831,141 UART: ROM Fatal Error: 0x000B0038
13,834,216 >>> mbox cmd response: failed
13,834,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,834,991 >>> mbox cmd response: failed
13,835,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,835,555 >>> mbox cmd response: failed
Initializing fuses
2,050,409 writing to cptra_bootfsm_go
2,239,735 UART:
2,240,077 UART: Running Caliptra ROM ...
2,241,135 UART:
6,636,021 UART: [state] CFI Enabled
6,648,892 UART: [state] LifecycleState = Unprovisioned
6,650,749 UART: [state] DebugLocked = No
6,652,970 UART: [state] WD Timer not started. Device not locked for debugging
6,656,493 UART: [kat] SHA2-256
6,835,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,847,193 UART: [kat] ++
6,847,652 UART: [kat] sha1
6,859,614 UART: [kat] SHA2-256
6,862,616 UART: [kat] SHA2-384
6,867,746 UART: [kat] SHA2-512-ACC
6,870,690 UART: [kat] ECC-384
9,312,020 UART: [kat] HMAC-384Kdf
9,325,002 UART: [kat] LMS
9,854,444 UART: [kat] --
9,859,637 UART: [cold-reset] ++
9,861,629 UART: [fht] FHT @ 0x50003400
9,873,092 UART: [idev] ++
9,873,669 UART: [idev] CDI.KEYID = 6
9,874,591 UART: [idev] SUBJECT.KEYID = 7
9,875,808 UART: [idev] UDS.KEYID = 0
9,878,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,022,339 UART: [idev] Erasing UDS.KEYID = 0
12,348,498 UART: [idev] Sha1 KeyId Algorithm
12,371,775 UART: [idev] --
12,375,137 UART: [ldev] ++
12,375,741 UART: [ldev] CDI.KEYID = 6
12,376,821 UART: [ldev] SUBJECT.KEYID = 5
12,377,947 UART: [ldev] AUTHORITY.KEYID = 7
12,379,126 UART: [ldev] FE.KEYID = 1
12,386,961 UART: [ldev] Erasing FE.KEYID = 1
14,861,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,578,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,594,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,610,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,626,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,646,925 UART: [ldev] --
16,652,415 UART: [fwproc] Wait for Commands...
16,655,272 UART: [fwproc] Recv command 0x46574c44
16,657,315 UART: [fwproc] Recv'd Img size: 114448 bytes
20,055,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,131,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,200,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,517,992 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,697,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,414,641 >>> mbox cmd response: failed
13,415,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,415,558 >>> mbox cmd response: failed
13,415,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,416,146 >>> mbox cmd response: failed
Initializing fuses
2,046,619 writing to cptra_bootfsm_go
10,147,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,733,179 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,246 UART:
192,600 UART: Running Caliptra ROM ...
193,782 UART:
193,934 UART: [state] CFI Enabled
266,059 UART: [state] LifecycleState = Unprovisioned
268,477 UART: [state] DebugLocked = No
270,473 UART: [state] WD Timer not started. Device not locked for debugging
274,514 UART: [kat] SHA2-256
464,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,129 UART: [kat] ++
475,621 UART: [kat] sha1
486,989 UART: [kat] SHA2-256
489,998 UART: [kat] SHA2-384
494,297 UART: [kat] SHA2-512-ACC
496,861 UART: [kat] ECC-384
2,947,180 UART: [kat] HMAC-384Kdf
2,970,237 UART: [kat] LMS
3,501,992 UART: [kat] --
3,506,522 UART: [cold-reset] ++
3,508,723 UART: [fht] FHT @ 0x50003400
3,519,755 UART: [idev] ++
3,520,475 UART: [idev] CDI.KEYID = 6
3,521,382 UART: [idev] SUBJECT.KEYID = 7
3,522,603 UART: [idev] UDS.KEYID = 0
3,525,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,702 UART: [idev] Erasing UDS.KEYID = 0
6,028,437 UART: [idev] Sha1 KeyId Algorithm
6,051,240 UART: [idev] --
6,056,586 UART: [ldev] ++
6,057,270 UART: [ldev] CDI.KEYID = 6
6,058,164 UART: [ldev] SUBJECT.KEYID = 5
6,059,381 UART: [ldev] AUTHORITY.KEYID = 7
6,060,559 UART: [ldev] FE.KEYID = 1
6,099,192 UART: [ldev] Erasing FE.KEYID = 1
8,607,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,771 UART: [ldev] --
10,414,699 UART: [fwproc] Wait for Commands...
10,417,514 UART: [fwproc] Recv command 0x46574c44
10,419,827 UART: [fwproc] Recv'd Img size: 114448 bytes
13,657,986 UART: ROM Fatal Error: 0x000B0038
13,661,449 >>> mbox cmd response: failed
13,661,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,662,220 >>> mbox cmd response: failed
13,662,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,662,777 >>> mbox cmd response: failed
Initializing fuses
2,047,651 writing to cptra_bootfsm_go
2,236,982 UART:
2,237,337 UART: Running Caliptra ROM ...
2,238,419 UART:
2,238,578 UART: [state] CFI Enabled
2,296,490 UART: [state] LifecycleState = Unprovisioned
2,298,911 UART: [state] DebugLocked = No
2,301,383 UART: [state] WD Timer not started. Device not locked for debugging
2,306,485 UART: [kat] SHA2-256
2,496,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,507,133 UART: [kat] ++
2,507,626 UART: [kat] sha1
2,517,868 UART: [kat] SHA2-256
2,520,890 UART: [kat] SHA2-384
2,525,690 UART: [kat] SHA2-512-ACC
2,528,309 UART: [kat] ECC-384
4,984,731 UART: [kat] HMAC-384Kdf
5,006,488 UART: [kat] LMS
5,538,309 UART: [kat] --
5,542,566 UART: [cold-reset] ++
5,544,176 UART: [fht] FHT @ 0x50003400
5,555,529 UART: [idev] ++
5,556,205 UART: [idev] CDI.KEYID = 6
5,557,223 UART: [idev] SUBJECT.KEYID = 7
5,558,382 UART: [idev] UDS.KEYID = 0
5,561,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,705,357 UART: [idev] Erasing UDS.KEYID = 0
8,064,752 UART: [idev] Sha1 KeyId Algorithm
8,086,741 UART: [idev] --
8,091,357 UART: [ldev] ++
8,092,069 UART: [ldev] CDI.KEYID = 6
8,092,990 UART: [ldev] SUBJECT.KEYID = 5
8,094,155 UART: [ldev] AUTHORITY.KEYID = 7
8,095,358 UART: [ldev] FE.KEYID = 1
8,135,448 UART: [ldev] Erasing FE.KEYID = 1
10,642,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,361 UART: [ldev] --
12,450,656 UART: [fwproc] Wait for Commands...
12,452,427 UART: [fwproc] Recv command 0x46574c44
12,454,739 UART: [fwproc] Recv'd Img size: 114448 bytes
15,902,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,097,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,640,542 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,441,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,384,053 >>> mbox cmd response: failed
13,384,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,067 >>> mbox cmd response: failed
13,385,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,659 >>> mbox cmd response: failed
Initializing fuses
2,046,474 writing to cptra_bootfsm_go
5,477,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,763,883 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,180 writing to cptra_bootfsm_go
193,423 UART:
193,784 UART: Running Caliptra ROM ...
194,888 UART:
604,635 UART: [state] CFI Enabled
617,438 UART: [state] LifecycleState = Unprovisioned
619,764 UART: [state] DebugLocked = No
621,113 UART: [state] WD Timer not started. Device not locked for debugging
624,924 UART: [kat] SHA2-256
814,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,599 UART: [kat] ++
826,127 UART: [kat] sha1
837,597 UART: [kat] SHA2-256
840,610 UART: [kat] SHA2-384
846,698 UART: [kat] SHA2-512-ACC
849,260 UART: [kat] ECC-384
3,289,377 UART: [kat] HMAC-384Kdf
3,302,927 UART: [kat] LMS
3,834,767 UART: [kat] --
3,838,845 UART: [cold-reset] ++
3,840,836 UART: [fht] FHT @ 0x50003400
3,851,713 UART: [idev] ++
3,852,430 UART: [idev] CDI.KEYID = 6
3,853,354 UART: [idev] SUBJECT.KEYID = 7
3,854,524 UART: [idev] UDS.KEYID = 0
3,857,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,987 UART: [idev] Erasing UDS.KEYID = 0
6,332,864 UART: [idev] Sha1 KeyId Algorithm
6,355,393 UART: [idev] --
6,359,714 UART: [ldev] ++
6,360,456 UART: [ldev] CDI.KEYID = 6
6,361,365 UART: [ldev] SUBJECT.KEYID = 5
6,362,527 UART: [ldev] AUTHORITY.KEYID = 7
6,363,709 UART: [ldev] FE.KEYID = 1
6,373,950 UART: [ldev] Erasing FE.KEYID = 1
8,849,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,965 UART: [ldev] --
10,642,497 UART: [fwproc] Wait for Commands...
10,644,953 UART: [fwproc] Recv command 0x46574c44
10,647,293 UART: [fwproc] Recv'd Img size: 114448 bytes
13,882,943 UART: ROM Fatal Error: 0x000B0038
13,886,395 >>> mbox cmd response: failed
13,886,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,887,156 >>> mbox cmd response: failed
13,887,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,887,714 >>> mbox cmd response: failed
Initializing fuses
2,050,809 writing to cptra_bootfsm_go
2,240,144 UART:
2,240,496 UART: Running Caliptra ROM ...
2,241,733 UART:
6,579,822 UART: [state] CFI Enabled
6,592,932 UART: [state] LifecycleState = Unprovisioned
6,595,489 UART: [state] DebugLocked = No
6,596,595 UART: [state] WD Timer not started. Device not locked for debugging
6,601,482 UART: [kat] SHA2-256
6,791,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,802,123 UART: [kat] ++
6,802,641 UART: [kat] sha1
6,814,287 UART: [kat] SHA2-256
6,817,304 UART: [kat] SHA2-384
6,824,048 UART: [kat] SHA2-512-ACC
6,826,670 UART: [kat] ECC-384
9,267,853 UART: [kat] HMAC-384Kdf
9,281,278 UART: [kat] LMS
9,813,108 UART: [kat] --
9,817,638 UART: [cold-reset] ++
9,820,268 UART: [fht] FHT @ 0x50003400
9,831,429 UART: [idev] ++
9,832,163 UART: [idev] CDI.KEYID = 6
9,833,176 UART: [idev] SUBJECT.KEYID = 7
9,834,277 UART: [idev] UDS.KEYID = 0
9,837,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,980,912 UART: [idev] Erasing UDS.KEYID = 0
12,312,449 UART: [idev] Sha1 KeyId Algorithm
12,335,085 UART: [idev] --
12,340,430 UART: [ldev] ++
12,341,109 UART: [ldev] CDI.KEYID = 6
12,341,991 UART: [ldev] SUBJECT.KEYID = 5
12,343,202 UART: [ldev] AUTHORITY.KEYID = 7
12,344,433 UART: [ldev] FE.KEYID = 1
12,353,865 UART: [ldev] Erasing FE.KEYID = 1
14,833,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,551,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,566,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,582,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,597,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,617,800 UART: [ldev] --
16,623,230 UART: [fwproc] Wait for Commands...
16,625,649 UART: [fwproc] Recv command 0x46574c44
16,627,907 UART: [fwproc] Recv'd Img size: 114448 bytes
20,075,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,157,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,273,952 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,816,368 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,755,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,586,280 >>> mbox cmd response: failed
13,587,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,587,387 >>> mbox cmd response: failed
13,587,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,587,962 >>> mbox cmd response: failed
Initializing fuses
2,047,161 writing to cptra_bootfsm_go
10,034,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,226,216 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,477,109 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,662 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,966 UART: [idev] --
1,515,033 UART: [ldev] ++
1,515,201 UART: [ldev] CDI.KEYID = 6
1,515,564 UART: [ldev] SUBJECT.KEYID = 5
1,515,990 UART: [ldev] AUTHORITY.KEYID = 7
1,516,453 UART: [ldev] FE.KEYID = 1
1,521,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,374 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 114448 bytes
3,827,249 UART: ROM Fatal Error: 0x000B0038
3,828,406 >>> mbox cmd response: failed
3,828,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,828,412 >>> mbox cmd response: failed
3,828,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,828,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,067 UART: [kat] SHA2-256
881,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,113 UART: [kat] ++
886,265 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,438 UART: [kat] LMS
1,475,634 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,480,154 UART: [idev] ++
1,480,322 UART: [idev] CDI.KEYID = 6
1,480,682 UART: [idev] SUBJECT.KEYID = 7
1,481,106 UART: [idev] UDS.KEYID = 0
1,481,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,916 UART: [idev] Erasing UDS.KEYID = 0
1,505,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,878 UART: [idev] --
1,514,939 UART: [ldev] ++
1,515,107 UART: [ldev] CDI.KEYID = 6
1,515,470 UART: [ldev] SUBJECT.KEYID = 5
1,515,896 UART: [ldev] AUTHORITY.KEYID = 7
1,516,359 UART: [ldev] FE.KEYID = 1
1,521,543 UART: [ldev] Erasing FE.KEYID = 1
1,546,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,918 UART: [ldev] --
1,585,419 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 114448 bytes
2,886,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,928 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,906,827 >>> mbox cmd response: failed
3,906,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,906,833 >>> mbox cmd response: failed
3,906,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,906,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,456 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,536 UART: [kat] SHA2-256
882,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,582 UART: [kat] ++
886,734 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
903,051 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,507 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,031 UART: [idev] --
1,514,920 UART: [ldev] ++
1,515,088 UART: [ldev] CDI.KEYID = 6
1,515,451 UART: [ldev] SUBJECT.KEYID = 5
1,515,877 UART: [ldev] AUTHORITY.KEYID = 7
1,516,340 UART: [ldev] FE.KEYID = 1
1,521,566 UART: [ldev] Erasing FE.KEYID = 1
1,546,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,733 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,586,849 UART: [fwproc] Received command 0x46574c44
1,587,640 UART: [fwproc] Received Image of size 114448 bytes
3,940,491 UART: ROM Fatal Error: 0x000B0038
3,941,648 >>> mbox cmd response: failed
3,941,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,941,654 >>> mbox cmd response: failed
3,941,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,941,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,290 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,513 UART: [idev] ++
1,479,681 UART: [idev] CDI.KEYID = 6
1,480,041 UART: [idev] SUBJECT.KEYID = 7
1,480,465 UART: [idev] UDS.KEYID = 0
1,480,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,504,885 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,611 UART: [idev] --
1,514,744 UART: [ldev] ++
1,514,912 UART: [ldev] CDI.KEYID = 6
1,515,275 UART: [ldev] SUBJECT.KEYID = 5
1,515,701 UART: [ldev] AUTHORITY.KEYID = 7
1,516,164 UART: [ldev] FE.KEYID = 1
1,521,286 UART: [ldev] Erasing FE.KEYID = 1
1,546,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,847 UART: [ldev] --
1,586,184 UART: [fwproc] Waiting for Commands...
1,587,005 UART: [fwproc] Received command 0x46574c44
1,587,796 UART: [fwproc] Received Image of size 114448 bytes
2,887,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,619 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,794,585 >>> mbox cmd response: failed
3,794,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,794,591 >>> mbox cmd response: failed
3,794,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,794,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,439 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
893,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,843 UART: [kat] ++
897,995 UART: [kat] sha1
902,219 UART: [kat] SHA2-256
904,159 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,822 UART: [kat] HMAC-384Kdf
923,508 UART: [kat] LMS
1,171,836 UART: [kat] --
1,172,577 UART: [cold-reset] ++
1,173,057 UART: [fht] FHT @ 0x50003400
1,175,644 UART: [idev] ++
1,175,812 UART: [idev] CDI.KEYID = 6
1,176,172 UART: [idev] SUBJECT.KEYID = 7
1,176,596 UART: [idev] UDS.KEYID = 0
1,176,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,391 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,210,779 UART: [ldev] ++
1,210,947 UART: [ldev] CDI.KEYID = 6
1,211,310 UART: [ldev] SUBJECT.KEYID = 5
1,211,736 UART: [ldev] AUTHORITY.KEYID = 7
1,212,199 UART: [ldev] FE.KEYID = 1
1,217,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,844 UART: [fwproc] Wait for Commands...
1,283,594 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 114448 bytes
1,870,772 UART: ROM Fatal Error: 0x000B0038
1,871,929 >>> mbox cmd response: failed
1,871,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,871,935 >>> mbox cmd response: failed
1,871,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,871,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
892,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,009 UART: [kat] ++
897,161 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,016 UART: [kat] SHA2-512-ACC
907,917 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,472 UART: [kat] LMS
1,170,800 UART: [kat] --
1,171,709 UART: [cold-reset] ++
1,172,093 UART: [fht] FHT @ 0x50003400
1,174,686 UART: [idev] ++
1,174,854 UART: [idev] CDI.KEYID = 6
1,175,214 UART: [idev] SUBJECT.KEYID = 7
1,175,638 UART: [idev] UDS.KEYID = 0
1,175,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,997 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,352 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,338 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,735 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,722,159 >>> mbox cmd response: failed
1,722,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,165 >>> mbox cmd response: failed
1,722,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,426 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
917,789 UART: [kat] HMAC-384Kdf
922,397 UART: [kat] LMS
1,170,725 UART: [kat] --
1,171,652 UART: [cold-reset] ++
1,172,008 UART: [fht] FHT @ 0x50003400
1,174,701 UART: [idev] ++
1,174,869 UART: [idev] CDI.KEYID = 6
1,175,229 UART: [idev] SUBJECT.KEYID = 7
1,175,653 UART: [idev] UDS.KEYID = 0
1,175,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,337 UART: [idev] Erasing UDS.KEYID = 0
1,200,180 UART: [idev] Sha1 KeyId Algorithm
1,208,756 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,211 UART: [ldev] SUBJECT.KEYID = 5
1,210,637 UART: [ldev] AUTHORITY.KEYID = 7
1,211,100 UART: [ldev] FE.KEYID = 1
1,216,532 UART: [ldev] Erasing FE.KEYID = 1
1,243,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,182 UART: [ldev] --
1,282,491 UART: [fwproc] Wait for Commands...
1,283,235 UART: [fwproc] Recv command 0x46574c44
1,283,963 UART: [fwproc] Recv'd Img size: 114448 bytes
1,875,125 UART: ROM Fatal Error: 0x000B0038
1,876,282 >>> mbox cmd response: failed
1,876,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,876,288 >>> mbox cmd response: failed
1,876,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,876,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,219 UART: [state] LifecycleState = Unprovisioned
86,874 UART: [state] DebugLocked = No
87,608 UART: [state] WD Timer not started. Device not locked for debugging
88,881 UART: [kat] SHA2-256
894,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,656 UART: [kat] ++
898,808 UART: [kat] sha1
902,962 UART: [kat] SHA2-256
904,902 UART: [kat] SHA2-384
907,499 UART: [kat] SHA2-512-ACC
909,400 UART: [kat] ECC-384
919,499 UART: [kat] HMAC-384Kdf
924,087 UART: [kat] LMS
1,172,415 UART: [kat] --
1,173,282 UART: [cold-reset] ++
1,173,730 UART: [fht] FHT @ 0x50003400
1,176,197 UART: [idev] ++
1,176,365 UART: [idev] CDI.KEYID = 6
1,176,725 UART: [idev] SUBJECT.KEYID = 7
1,177,149 UART: [idev] UDS.KEYID = 0
1,177,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,439 UART: [idev] Erasing UDS.KEYID = 0
1,203,268 UART: [idev] Sha1 KeyId Algorithm
1,211,684 UART: [idev] --
1,212,844 UART: [ldev] ++
1,213,012 UART: [ldev] CDI.KEYID = 6
1,213,375 UART: [ldev] SUBJECT.KEYID = 5
1,213,801 UART: [ldev] AUTHORITY.KEYID = 7
1,214,264 UART: [ldev] FE.KEYID = 1
1,219,866 UART: [ldev] Erasing FE.KEYID = 1
1,246,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,682 UART: [ldev] --
1,286,189 UART: [fwproc] Wait for Commands...
1,286,803 UART: [fwproc] Recv command 0x46574c44
1,287,531 UART: [fwproc] Recv'd Img size: 114448 bytes
2,587,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,780,946 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,719,378 >>> mbox cmd response: failed
1,719,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,384 >>> mbox cmd response: failed
1,719,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,085 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,173,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,206,891 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,500 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,172 UART: [ldev] --
1,280,456 UART: [fwproc] Wait for Commands...
1,281,121 UART: [fwproc] Recv command 0x46574c44
1,281,854 UART: [fwproc] Recv'd Img size: 114448 bytes
1,853,254 UART: ROM Fatal Error: 0x000B0038
1,854,411 >>> mbox cmd response: failed
1,854,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,417 >>> mbox cmd response: failed
1,854,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,335 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,722,842 >>> mbox cmd response: failed
1,722,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,848 >>> mbox cmd response: failed
1,722,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,875 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,174,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,359 UART: [ldev] ++
1,209,527 UART: [ldev] CDI.KEYID = 6
1,209,891 UART: [ldev] SUBJECT.KEYID = 5
1,210,318 UART: [ldev] AUTHORITY.KEYID = 7
1,210,781 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,135 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114448 bytes
1,881,908 UART: ROM Fatal Error: 0x000B0038
1,883,065 >>> mbox cmd response: failed
1,883,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,071 >>> mbox cmd response: failed
1,883,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
905,057 UART: [kat] SHA2-512-ACC
906,958 UART: [kat] ECC-384
916,815 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,838 UART: [cold-reset] ++
1,171,392 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,175,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,506 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,627 UART: [ldev] ++
1,210,795 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,586 UART: [ldev] AUTHORITY.KEYID = 7
1,212,049 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,524 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,478 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,724,812 >>> mbox cmd response: failed
1,724,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,724,818 >>> mbox cmd response: failed
1,724,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,724,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,856 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
4,878,492 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,666,547 >>> mbox cmd response: failed
18,667,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,667,511 >>> mbox cmd response: failed
18,667,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,668,076 >>> mbox cmd response: failed
Initializing fuses
2,057,161 writing to cptra_bootfsm_go
6,920,645 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,476,936 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
4,880,273 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,881,658 >>> mbox cmd response: failed
18,882,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,882,682 >>> mbox cmd response: failed
18,882,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,883,255 >>> mbox cmd response: failed
Initializing fuses
2,050,347 writing to cptra_bootfsm_go
6,922,563 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,497,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,252 writing to cptra_bootfsm_go
5,189,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,987,168 >>> mbox cmd response: failed
18,987,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,988,111 >>> mbox cmd response: failed
18,988,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,988,735 >>> mbox cmd response: failed
Initializing fuses
2,050,880 writing to cptra_bootfsm_go
7,232,803 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,671,034 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,191,161 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,911,876 >>> mbox cmd response: failed
18,912,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,913,120 >>> mbox cmd response: failed
18,913,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,913,690 >>> mbox cmd response: failed
Initializing fuses
2,049,382 writing to cptra_bootfsm_go
7,227,068 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,669,653 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
3,440,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,964,133 >>> mbox cmd response: failed
12,964,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,965,034 >>> mbox cmd response: failed
12,965,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,965,620 >>> mbox cmd response: failed
Initializing fuses
2,047,351 writing to cptra_bootfsm_go
5,507,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,344,312 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,460,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,934,437 >>> mbox cmd response: failed
12,935,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,584 >>> mbox cmd response: failed
12,935,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,150 >>> mbox cmd response: failed
Initializing fuses
2,054,245 writing to cptra_bootfsm_go
5,504,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,351,433 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,494 writing to cptra_bootfsm_go
3,790,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,154,589 >>> mbox cmd response: failed
13,155,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,155,509 >>> mbox cmd response: failed
13,155,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,066 >>> mbox cmd response: failed
Initializing fuses
2,048,691 writing to cptra_bootfsm_go
10,505,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,239,715 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,785,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,153,174 >>> mbox cmd response: failed
13,153,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,154,329 >>> mbox cmd response: failed
13,154,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,154,892 >>> mbox cmd response: failed
Initializing fuses
2,047,938 writing to cptra_bootfsm_go
10,505,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,221,494 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,441,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,942,230 >>> mbox cmd response: failed
12,943,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,943,459 >>> mbox cmd response: failed
12,943,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,944,016 >>> mbox cmd response: failed
Initializing fuses
2,050,206 writing to cptra_bootfsm_go
5,496,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,369,537 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,455,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,939,038 >>> mbox cmd response: failed
12,939,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,190 >>> mbox cmd response: failed
12,940,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,761 >>> mbox cmd response: failed
Initializing fuses
2,059,211 writing to cptra_bootfsm_go
5,518,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,373,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,788,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,172,135 >>> mbox cmd response: failed
13,172,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,173,111 >>> mbox cmd response: failed
13,173,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,173,680 >>> mbox cmd response: failed
Initializing fuses
2,055,449 writing to cptra_bootfsm_go
10,476,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,205,146 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,787,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,159,101 >>> mbox cmd response: failed
13,159,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,262 >>> mbox cmd response: failed
13,160,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,824 >>> mbox cmd response: failed
Initializing fuses
2,059,211 writing to cptra_bootfsm_go
10,488,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,224,423 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,473,686 >>> mbox cmd response: failed
1,473,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,692 >>> mbox cmd response: failed
1,473,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,731 UART: [fht] Storing FHT @ 0x50003400
1,479,272 UART: [idev] ++
1,479,440 UART: [idev] CDI.KEYID = 6
1,479,800 UART: [idev] SUBJECT.KEYID = 7
1,480,224 UART: [idev] UDS.KEYID = 0
1,480,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,012 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,652 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,529 UART: [ldev] Erasing FE.KEYID = 1
1,546,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,803 UART: [fwproc] Waiting for Commands...
1,586,560 UART: [fwproc] Received command 0x46574c44
1,587,351 UART: [fwproc] Received Image of size 114448 bytes
2,886,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,552 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,473,847 >>> mbox cmd response: failed
1,473,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,853 >>> mbox cmd response: failed
1,473,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,130 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,474,508 >>> mbox cmd response: failed
1,474,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,514 >>> mbox cmd response: failed
1,474,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,647 UART: [kat] SHA2-512-ACC
897,548 UART: [kat] ECC-384
903,457 UART: [kat] HMAC-384Kdf
908,067 UART: [kat] LMS
1,476,263 UART: [kat] --
1,477,216 UART: [cold-reset] ++
1,477,642 UART: [fht] Storing FHT @ 0x50003400
1,480,411 UART: [idev] ++
1,480,579 UART: [idev] CDI.KEYID = 6
1,480,939 UART: [idev] SUBJECT.KEYID = 7
1,481,363 UART: [idev] UDS.KEYID = 0
1,481,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,149 UART: [idev] Erasing UDS.KEYID = 0
1,505,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,859 UART: [idev] --
1,514,950 UART: [ldev] ++
1,515,118 UART: [ldev] CDI.KEYID = 6
1,515,481 UART: [ldev] SUBJECT.KEYID = 5
1,515,907 UART: [ldev] AUTHORITY.KEYID = 7
1,516,370 UART: [ldev] FE.KEYID = 1
1,521,668 UART: [ldev] Erasing FE.KEYID = 1
1,546,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,741 UART: [ldev] --
1,586,096 UART: [fwproc] Waiting for Commands...
1,586,853 UART: [fwproc] Received command 0x46574c44
1,587,644 UART: [fwproc] Received Image of size 114448 bytes
2,887,648 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,379 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,464,443 >>> mbox cmd response: failed
1,464,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,449 >>> mbox cmd response: failed
1,464,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,489 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,474,907 >>> mbox cmd response: failed
1,474,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,913 >>> mbox cmd response: failed
1,474,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,715 UART: [kat] SHA2-256
903,655 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,560 UART: [kat] HMAC-384Kdf
922,296 UART: [kat] LMS
1,170,624 UART: [kat] --
1,171,545 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,986 UART: [idev] Erasing UDS.KEYID = 0
1,200,867 UART: [idev] Sha1 KeyId Algorithm
1,209,403 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,010 UART: [ldev] SUBJECT.KEYID = 5
1,211,436 UART: [ldev] AUTHORITY.KEYID = 7
1,211,899 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,185 UART: [ldev] --
1,282,544 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,475,477 >>> mbox cmd response: failed
1,475,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,483 >>> mbox cmd response: failed
1,475,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,782 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,434 >>> mbox cmd response: failed
1,478,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,440 >>> mbox cmd response: failed
1,478,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
919,027 UART: [kat] HMAC-384Kdf
923,587 UART: [kat] LMS
1,171,915 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,175,823 UART: [idev] ++
1,175,991 UART: [idev] CDI.KEYID = 6
1,176,351 UART: [idev] SUBJECT.KEYID = 7
1,176,775 UART: [idev] UDS.KEYID = 0
1,177,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,293 UART: [idev] Erasing UDS.KEYID = 0
1,201,386 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,246 UART: [ldev] --
1,283,625 UART: [fwproc] Wait for Commands...
1,284,351 UART: [fwproc] Recv command 0x46574c44
1,285,079 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,190 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,474,479 >>> mbox cmd response: failed
1,474,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,485 >>> mbox cmd response: failed
1,474,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,685 >>> mbox cmd response: failed
1,479,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,691 >>> mbox cmd response: failed
1,479,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,094 UART: [kat] SHA2-512-ACC
905,995 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,174,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,319 UART: [idev] Erasing UDS.KEYID = 0
1,199,003 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,486 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,546 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,841 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,471,853 >>> mbox cmd response: failed
1,471,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,859 >>> mbox cmd response: failed
1,471,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,735 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,292 >>> mbox cmd response: failed
1,477,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,298 >>> mbox cmd response: failed
1,477,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
917,101 UART: [kat] HMAC-384Kdf
921,781 UART: [kat] LMS
1,170,093 UART: [kat] --
1,170,926 UART: [cold-reset] ++
1,171,414 UART: [fht] FHT @ 0x50003400
1,174,126 UART: [idev] ++
1,174,294 UART: [idev] CDI.KEYID = 6
1,174,655 UART: [idev] SUBJECT.KEYID = 7
1,175,080 UART: [idev] UDS.KEYID = 0
1,175,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,412 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,817 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,932 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,473,551 >>> mbox cmd response: failed
1,473,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,557 >>> mbox cmd response: failed
1,473,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,232 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
4,878,189 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,989,667 >>> mbox cmd response: failed
13,990,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,990,998 >>> mbox cmd response: failed
13,991,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,991,563 >>> mbox cmd response: failed
Initializing fuses
2,062,967 writing to cptra_bootfsm_go
6,932,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,531,540 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
4,877,663 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,968,893 >>> mbox cmd response: failed
13,969,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,969,793 >>> mbox cmd response: failed
13,970,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,970,387 >>> mbox cmd response: failed
Initializing fuses
2,060,455 writing to cptra_bootfsm_go
6,921,856 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,502,651 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
5,185,267 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,159,075 >>> mbox cmd response: failed
14,159,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,160,218 >>> mbox cmd response: failed
14,160,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,160,787 >>> mbox cmd response: failed
Initializing fuses
2,056,574 writing to cptra_bootfsm_go
10,892,395 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,327,656 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
5,190,868 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,160,138 >>> mbox cmd response: failed
14,160,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,161,105 >>> mbox cmd response: failed
14,161,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,161,696 >>> mbox cmd response: failed
Initializing fuses
2,062,820 writing to cptra_bootfsm_go
10,887,721 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,330,448 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,441,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,362,732 >>> mbox cmd response: failed
10,363,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,363,629 >>> mbox cmd response: failed
10,363,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,364,187 >>> mbox cmd response: failed
Initializing fuses
2,059,658 writing to cptra_bootfsm_go
5,492,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,324,589 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,461,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,387,914 >>> mbox cmd response: failed
10,388,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,388,900 >>> mbox cmd response: failed
10,389,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,389,478 >>> mbox cmd response: failed
Initializing fuses
2,061,571 writing to cptra_bootfsm_go
5,505,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,375,709 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
3,778,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,611,117 >>> mbox cmd response: failed
10,611,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,612,144 >>> mbox cmd response: failed
10,612,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,612,700 >>> mbox cmd response: failed
Initializing fuses
2,053,508 writing to cptra_bootfsm_go
13,039,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,778,148 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,788,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,617,880 >>> mbox cmd response: failed
10,618,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,618,792 >>> mbox cmd response: failed
10,619,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,619,363 >>> mbox cmd response: failed
Initializing fuses
2,059,726 writing to cptra_bootfsm_go
13,030,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,737,506 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,465,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,372,233 >>> mbox cmd response: failed
10,372,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,221 >>> mbox cmd response: failed
10,373,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,823 >>> mbox cmd response: failed
Initializing fuses
2,057,668 writing to cptra_bootfsm_go
5,526,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,321,706 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,465,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,394,910 >>> mbox cmd response: failed
10,395,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,395,915 >>> mbox cmd response: failed
10,396,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,396,471 >>> mbox cmd response: failed
Initializing fuses
2,056,490 writing to cptra_bootfsm_go
5,522,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,369,731 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,782,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,606,093 >>> mbox cmd response: failed
10,606,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,607,195 >>> mbox cmd response: failed
10,607,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,607,758 >>> mbox cmd response: failed
Initializing fuses
2,055,458 writing to cptra_bootfsm_go
13,042,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,749,312 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,789,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,619,095 >>> mbox cmd response: failed
10,619,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,620,018 >>> mbox cmd response: failed
10,620,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,620,572 >>> mbox cmd response: failed
Initializing fuses
2,057,989 writing to cptra_bootfsm_go
13,021,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,751,619 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,094 >>> mbox cmd response: failed
1,179,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,100 >>> mbox cmd response: failed
1,179,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,079 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,797 UART: [kat] SHA2-256
881,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,843 UART: [kat] ++
885,995 UART: [kat] sha1
890,003 UART: [kat] SHA2-256
891,941 UART: [kat] SHA2-384
894,502 UART: [kat] SHA2-512-ACC
896,403 UART: [kat] ECC-384
901,552 UART: [kat] HMAC-384Kdf
906,356 UART: [kat] LMS
1,474,552 UART: [kat] --
1,475,365 UART: [cold-reset] ++
1,475,861 UART: [fht] Storing FHT @ 0x50003400
1,478,792 UART: [idev] ++
1,478,960 UART: [idev] CDI.KEYID = 6
1,479,320 UART: [idev] SUBJECT.KEYID = 7
1,479,744 UART: [idev] UDS.KEYID = 0
1,480,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,734 UART: [idev] Erasing UDS.KEYID = 0
1,503,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,464 UART: [idev] --
1,513,605 UART: [ldev] ++
1,513,773 UART: [ldev] CDI.KEYID = 6
1,514,136 UART: [ldev] SUBJECT.KEYID = 5
1,514,562 UART: [ldev] AUTHORITY.KEYID = 7
1,515,025 UART: [ldev] FE.KEYID = 1
1,520,409 UART: [ldev] Erasing FE.KEYID = 1
1,546,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,186 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,258 UART: [fwproc] Received command 0x46574c44
1,587,049 UART: [fwproc] Received Image of size 114448 bytes
2,886,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,723 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,042 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,210 >>> mbox cmd response: failed
1,181,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,216 >>> mbox cmd response: failed
1,181,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,624 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,763 >>> mbox cmd response: failed
1,180,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,769 >>> mbox cmd response: failed
1,180,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,027 UART: [kat] SHA2-512-ACC
896,928 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,208 UART: [cold-reset] ++
1,476,564 UART: [fht] Storing FHT @ 0x50003400
1,479,233 UART: [idev] ++
1,479,401 UART: [idev] CDI.KEYID = 6
1,479,761 UART: [idev] SUBJECT.KEYID = 7
1,480,185 UART: [idev] UDS.KEYID = 0
1,480,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,081 UART: [idev] Erasing UDS.KEYID = 0
1,504,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,517 UART: [idev] --
1,514,350 UART: [ldev] ++
1,514,518 UART: [ldev] CDI.KEYID = 6
1,514,881 UART: [ldev] SUBJECT.KEYID = 5
1,515,307 UART: [ldev] AUTHORITY.KEYID = 7
1,515,770 UART: [ldev] FE.KEYID = 1
1,521,310 UART: [ldev] Erasing FE.KEYID = 1
1,546,703 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,639 UART: [ldev] --
1,585,946 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 114448 bytes
2,887,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,721 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,067 >>> mbox cmd response: failed
1,180,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,073 >>> mbox cmd response: failed
1,180,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,297 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,262 >>> mbox cmd response: failed
1,180,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,268 >>> mbox cmd response: failed
1,180,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,895 UART: [state] WD Timer not started. Device not locked for debugging
87,068 UART: [kat] SHA2-256
892,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,843 UART: [kat] ++
896,995 UART: [kat] sha1
901,235 UART: [kat] SHA2-256
903,175 UART: [kat] SHA2-384
906,020 UART: [kat] SHA2-512-ACC
907,921 UART: [kat] ECC-384
917,692 UART: [kat] HMAC-384Kdf
922,344 UART: [kat] LMS
1,170,672 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,035 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,175,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,201 UART: [idev] --
1,210,355 UART: [ldev] ++
1,210,523 UART: [ldev] CDI.KEYID = 6
1,210,886 UART: [ldev] SUBJECT.KEYID = 5
1,211,312 UART: [ldev] AUTHORITY.KEYID = 7
1,211,775 UART: [ldev] FE.KEYID = 1
1,217,093 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,148 UART: [fwproc] Recv command 0x46574c44
1,283,876 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,003 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,078 >>> mbox cmd response: failed
1,180,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,084 >>> mbox cmd response: failed
1,180,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,866 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,173 >>> mbox cmd response: failed
1,180,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,179 >>> mbox cmd response: failed
1,180,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,571 UART: [kat] HMAC-384Kdf
923,197 UART: [kat] LMS
1,171,525 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,110 UART: [fht] FHT @ 0x50003400
1,175,751 UART: [idev] ++
1,175,919 UART: [idev] CDI.KEYID = 6
1,176,279 UART: [idev] SUBJECT.KEYID = 7
1,176,703 UART: [idev] UDS.KEYID = 0
1,177,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,799 UART: [idev] Erasing UDS.KEYID = 0
1,201,886 UART: [idev] Sha1 KeyId Algorithm
1,210,334 UART: [idev] --
1,211,286 UART: [ldev] ++
1,211,454 UART: [ldev] CDI.KEYID = 6
1,211,817 UART: [ldev] SUBJECT.KEYID = 5
1,212,243 UART: [ldev] AUTHORITY.KEYID = 7
1,212,706 UART: [ldev] FE.KEYID = 1
1,217,766 UART: [ldev] Erasing FE.KEYID = 1
1,244,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,078 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,303 UART: [fwproc] Recv command 0x46574c44
1,285,031 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,288 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,399 >>> mbox cmd response: failed
1,179,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,405 >>> mbox cmd response: failed
1,179,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,297 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,234 >>> mbox cmd response: failed
1,178,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,240 >>> mbox cmd response: failed
1,178,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,871 UART: [kat] ++
895,023 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
903,916 UART: [kat] SHA2-512-ACC
905,817 UART: [kat] ECC-384
915,804 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,174,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,390 UART: [ldev] ++
1,208,558 UART: [ldev] CDI.KEYID = 6
1,208,922 UART: [ldev] SUBJECT.KEYID = 5
1,209,349 UART: [ldev] AUTHORITY.KEYID = 7
1,209,812 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,722 UART: [ldev] --
1,280,140 UART: [fwproc] Wait for Commands...
1,280,753 UART: [fwproc] Recv command 0x46574c44
1,281,486 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,645 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,314 >>> mbox cmd response: failed
1,179,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,320 >>> mbox cmd response: failed
1,179,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,173 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,737 >>> mbox cmd response: failed
1,179,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,743 >>> mbox cmd response: failed
1,179,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,309 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,174,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,310 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,245 UART: [ldev] --
1,281,685 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,999 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,052 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,203 >>> mbox cmd response: failed
1,180,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,209 >>> mbox cmd response: failed
1,180,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,372 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,177 UART:
192,544 UART: Running Caliptra ROM ...
193,732 UART:
193,913 UART: [state] CFI Enabled
262,425 UART: [state] LifecycleState = Unprovisioned
264,346 UART: [state] DebugLocked = No
266,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,132 UART: [kat] SHA2-256
440,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,335 UART: [kat] ++
451,838 UART: [kat] sha1
462,442 UART: [kat] SHA2-256
465,174 UART: [kat] SHA2-384
470,296 UART: [kat] SHA2-512-ACC
472,635 UART: [kat] ECC-384
2,768,528 UART: [kat] HMAC-384Kdf
2,801,588 UART: [kat] LMS
3,991,880 UART: [kat] --
3,995,876 UART: [cold-reset] ++
3,997,128 UART: [fht] Storing FHT @ 0x50003400
4,008,612 UART: [idev] ++
4,009,185 UART: [idev] CDI.KEYID = 6
4,010,163 UART: [idev] SUBJECT.KEYID = 7
4,011,380 UART: [idev] UDS.KEYID = 0
4,017,278 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,162,052 UART: [idev] Erasing UDS.KEYID = 0
7,345,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,295 UART: [idev] --
7,371,695 UART: [ldev] ++
7,372,262 UART: [ldev] CDI.KEYID = 6
7,373,235 UART: [ldev] SUBJECT.KEYID = 5
7,374,449 UART: [ldev] AUTHORITY.KEYID = 7
7,375,681 UART: [ldev] FE.KEYID = 1
7,423,815 UART: [ldev] Erasing FE.KEYID = 1
10,755,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,500 UART: [ldev] --
13,118,671 UART: [fwproc] Waiting for Commands...
13,120,446 UART: [fwproc] Received command 0x46574c44
13,122,630 UART: [fwproc] Received Image of size 114124 bytes
13,186,296 UART: ROM Fatal Error: 0x000B0007
13,189,811 >>> mbox cmd response: failed
13,190,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,190,550 >>> mbox cmd response: failed
13,190,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,191,110 >>> mbox cmd response: failed
Initializing fuses
2,053,465 writing to cptra_bootfsm_go
2,242,785 UART:
2,243,128 UART: Running Caliptra ROM ...
2,244,263 UART:
2,244,430 UART: [state] CFI Enabled
2,305,318 UART: [state] LifecycleState = Unprovisioned
2,307,269 UART: [state] DebugLocked = No
2,309,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,078 UART: [kat] SHA2-256
2,484,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,300 UART: [kat] ++
2,495,845 UART: [kat] sha1
2,506,580 UART: [kat] SHA2-256
2,509,272 UART: [kat] SHA2-384
2,514,448 UART: [kat] SHA2-512-ACC
2,516,854 UART: [kat] ECC-384
4,810,813 UART: [kat] HMAC-384Kdf
4,842,483 UART: [kat] LMS
6,032,773 UART: [kat] --
6,036,461 UART: [cold-reset] ++
6,038,186 UART: [fht] Storing FHT @ 0x50003400
6,050,213 UART: [idev] ++
6,050,780 UART: [idev] CDI.KEYID = 6
6,051,749 UART: [idev] SUBJECT.KEYID = 7
6,052,968 UART: [idev] UDS.KEYID = 0
6,055,560 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,199,233 UART: [idev] Erasing UDS.KEYID = 0
9,385,192 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,778 UART: [idev] --
9,411,556 UART: [ldev] ++
9,412,135 UART: [ldev] CDI.KEYID = 6
9,413,044 UART: [ldev] SUBJECT.KEYID = 5
9,414,305 UART: [ldev] AUTHORITY.KEYID = 7
9,415,551 UART: [ldev] FE.KEYID = 1
9,443,983 UART: [ldev] Erasing FE.KEYID = 1
12,780,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,202 UART: [ldev] --
15,159,811 UART: [fwproc] Waiting for Commands...
15,161,918 UART: [fwproc] Received command 0x46574c44
15,164,108 UART: [fwproc] Received Image of size 114124 bytes
19,213,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,675,823 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,811,200 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,909,920 >>> mbox cmd response: failed
12,910,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,913 >>> mbox cmd response: failed
12,911,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,482 >>> mbox cmd response: failed
Initializing fuses
2,055,924 writing to cptra_bootfsm_go
5,850,404 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,936,878 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,639 UART:
192,991 UART: Running Caliptra ROM ...
194,182 UART:
603,743 UART: [state] CFI Enabled
616,747 UART: [state] LifecycleState = Unprovisioned
618,709 UART: [state] DebugLocked = No
620,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,631 UART: [kat] SHA2-256
795,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,883 UART: [kat] ++
806,328 UART: [kat] sha1
817,584 UART: [kat] SHA2-256
820,294 UART: [kat] SHA2-384
826,980 UART: [kat] SHA2-512-ACC
829,372 UART: [kat] ECC-384
3,113,927 UART: [kat] HMAC-384Kdf
3,125,574 UART: [kat] LMS
4,315,682 UART: [kat] --
4,320,342 UART: [cold-reset] ++
4,321,905 UART: [fht] Storing FHT @ 0x50003400
4,333,396 UART: [idev] ++
4,333,963 UART: [idev] CDI.KEYID = 6
4,334,981 UART: [idev] SUBJECT.KEYID = 7
4,336,148 UART: [idev] UDS.KEYID = 0
4,341,898 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,502 UART: [idev] Erasing UDS.KEYID = 0
7,621,740 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,615 UART: [idev] --
7,646,928 UART: [ldev] ++
7,647,498 UART: [ldev] CDI.KEYID = 6
7,648,480 UART: [ldev] SUBJECT.KEYID = 5
7,649,694 UART: [ldev] AUTHORITY.KEYID = 7
7,650,927 UART: [ldev] FE.KEYID = 1
7,661,566 UART: [ldev] Erasing FE.KEYID = 1
10,951,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,602 UART: [ldev] --
13,312,139 UART: [fwproc] Waiting for Commands...
13,313,912 UART: [fwproc] Received command 0x46574c44
13,316,110 UART: [fwproc] Received Image of size 114124 bytes
13,387,532 UART: ROM Fatal Error: 0x000B0007
13,391,002 >>> mbox cmd response: failed
13,391,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,784 >>> mbox cmd response: failed
13,392,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,340 >>> mbox cmd response: failed
Initializing fuses
2,053,273 writing to cptra_bootfsm_go
2,242,586 UART:
2,242,964 UART: Running Caliptra ROM ...
2,244,047 UART:
7,076,290 UART: [state] CFI Enabled
7,088,077 UART: [state] LifecycleState = Unprovisioned
7,089,994 UART: [state] DebugLocked = No
7,091,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,096,307 UART: [kat] SHA2-256
7,266,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,276,583 UART: [kat] ++
7,277,045 UART: [kat] sha1
7,287,289 UART: [kat] SHA2-256
7,289,983 UART: [kat] SHA2-384
7,294,513 UART: [kat] SHA2-512-ACC
7,296,861 UART: [kat] ECC-384
9,580,906 UART: [kat] HMAC-384Kdf
9,593,144 UART: [kat] LMS
10,783,223 UART: [kat] --
10,788,564 UART: [cold-reset] ++
10,790,820 UART: [fht] Storing FHT @ 0x50003400
10,803,270 UART: [idev] ++
10,803,832 UART: [idev] CDI.KEYID = 6
10,804,794 UART: [idev] SUBJECT.KEYID = 7
10,806,003 UART: [idev] UDS.KEYID = 0
10,808,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,951,991 UART: [idev] Erasing UDS.KEYID = 0
14,093,594 UART: [idev] Using Sha1 for KeyId Algorithm
14,116,025 UART: [idev] --
14,119,839 UART: [ldev] ++
14,120,481 UART: [ldev] CDI.KEYID = 6
14,121,392 UART: [ldev] SUBJECT.KEYID = 5
14,122,660 UART: [ldev] AUTHORITY.KEYID = 7
14,123,896 UART: [ldev] FE.KEYID = 1
14,134,161 UART: [ldev] Erasing FE.KEYID = 1
17,419,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,727,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,742,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,576 UART: [ldev] --
19,781,465 UART: [fwproc] Waiting for Commands...
19,783,881 UART: [fwproc] Received command 0x46574c44
19,786,082 UART: [fwproc] Received Image of size 114124 bytes
23,835,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,915,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,984,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,301,954 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
4,135,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,125,785 >>> mbox cmd response: failed
13,126,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,750 >>> mbox cmd response: failed
13,127,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,328 >>> mbox cmd response: failed
Initializing fuses
2,059,163 writing to cptra_bootfsm_go
10,872,781 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,813,343 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,161 UART:
192,541 UART: Running Caliptra ROM ...
193,670 UART:
193,816 UART: [state] CFI Enabled
262,582 UART: [state] LifecycleState = Unprovisioned
264,465 UART: [state] DebugLocked = No
266,953 UART: [state] WD Timer not started. Device not locked for debugging
270,392 UART: [kat] SHA2-256
449,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,071 UART: [kat] ++
461,539 UART: [kat] sha1
473,062 UART: [kat] SHA2-256
476,083 UART: [kat] SHA2-384
483,742 UART: [kat] SHA2-512-ACC
486,672 UART: [kat] ECC-384
2,948,785 UART: [kat] HMAC-384Kdf
2,971,566 UART: [kat] LMS
3,501,037 UART: [kat] --
3,506,545 UART: [cold-reset] ++
3,508,269 UART: [fht] FHT @ 0x50003400
3,519,087 UART: [idev] ++
3,519,654 UART: [idev] CDI.KEYID = 6
3,520,636 UART: [idev] SUBJECT.KEYID = 7
3,521,795 UART: [idev] UDS.KEYID = 0
3,524,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,855 UART: [idev] Erasing UDS.KEYID = 0
6,026,877 UART: [idev] Sha1 KeyId Algorithm
6,050,004 UART: [idev] --
6,053,740 UART: [ldev] ++
6,054,314 UART: [ldev] CDI.KEYID = 6
6,055,200 UART: [ldev] SUBJECT.KEYID = 5
6,056,339 UART: [ldev] AUTHORITY.KEYID = 7
6,057,688 UART: [ldev] FE.KEYID = 1
6,101,804 UART: [ldev] Erasing FE.KEYID = 1
8,605,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,697 UART: [ldev] --
10,415,066 UART: [fwproc] Wait for Commands...
10,417,224 UART: [fwproc] Recv command 0x46574c44
10,419,268 UART: [fwproc] Recv'd Img size: 114448 bytes
10,484,714 UART: ROM Fatal Error: 0x000B0007
10,487,825 >>> mbox cmd response: failed
10,488,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,488,556 >>> mbox cmd response: failed
10,488,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,489,112 >>> mbox cmd response: failed
Initializing fuses
2,048,641 writing to cptra_bootfsm_go
2,237,952 UART:
2,238,346 UART: Running Caliptra ROM ...
2,239,488 UART:
2,239,654 UART: [state] CFI Enabled
2,296,795 UART: [state] LifecycleState = Unprovisioned
2,298,657 UART: [state] DebugLocked = No
2,300,995 UART: [state] WD Timer not started. Device not locked for debugging
2,305,450 UART: [kat] SHA2-256
2,484,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,496,171 UART: [kat] ++
2,496,640 UART: [kat] sha1
2,506,609 UART: [kat] SHA2-256
2,509,632 UART: [kat] SHA2-384
2,516,110 UART: [kat] SHA2-512-ACC
2,519,068 UART: [kat] ECC-384
4,980,935 UART: [kat] HMAC-384Kdf
5,005,531 UART: [kat] LMS
5,534,999 UART: [kat] --
5,540,023 UART: [cold-reset] ++
5,540,875 UART: [fht] FHT @ 0x50003400
5,550,612 UART: [idev] ++
5,551,178 UART: [idev] CDI.KEYID = 6
5,552,087 UART: [idev] SUBJECT.KEYID = 7
5,553,306 UART: [idev] UDS.KEYID = 0
5,555,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,699,956 UART: [idev] Erasing UDS.KEYID = 0
8,062,684 UART: [idev] Sha1 KeyId Algorithm
8,085,978 UART: [idev] --
8,090,842 UART: [ldev] ++
8,091,459 UART: [ldev] CDI.KEYID = 6
8,092,353 UART: [ldev] SUBJECT.KEYID = 5
8,093,404 UART: [ldev] AUTHORITY.KEYID = 7
8,094,587 UART: [ldev] FE.KEYID = 1
8,136,443 UART: [ldev] Erasing FE.KEYID = 1
10,642,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,425 UART: [ldev] --
12,449,505 UART: [fwproc] Wait for Commands...
12,452,249 UART: [fwproc] Recv command 0x46574c44
12,454,298 UART: [fwproc] Recv'd Img size: 114448 bytes
15,861,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,001,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,320,531 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,384,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,266,716 >>> mbox cmd response: failed
10,267,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,267,624 >>> mbox cmd response: failed
10,267,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,268,192 >>> mbox cmd response: failed
Initializing fuses
2,061,229 writing to cptra_bootfsm_go
5,444,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,131,383 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
192,767 UART:
193,140 UART: Running Caliptra ROM ...
194,276 UART:
603,724 UART: [state] CFI Enabled
616,758 UART: [state] LifecycleState = Unprovisioned
618,634 UART: [state] DebugLocked = No
619,958 UART: [state] WD Timer not started. Device not locked for debugging
623,995 UART: [kat] SHA2-256
803,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,695 UART: [kat] ++
815,227 UART: [kat] sha1
826,670 UART: [kat] SHA2-256
829,672 UART: [kat] SHA2-384
836,951 UART: [kat] SHA2-512-ACC
839,877 UART: [kat] ECC-384
3,282,540 UART: [kat] HMAC-384Kdf
3,296,098 UART: [kat] LMS
3,825,627 UART: [kat] --
3,830,534 UART: [cold-reset] ++
3,832,843 UART: [fht] FHT @ 0x50003400
3,843,764 UART: [idev] ++
3,844,332 UART: [idev] CDI.KEYID = 6
3,845,242 UART: [idev] SUBJECT.KEYID = 7
3,846,458 UART: [idev] UDS.KEYID = 0
3,849,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,760 UART: [idev] Erasing UDS.KEYID = 0
6,315,621 UART: [idev] Sha1 KeyId Algorithm
6,337,414 UART: [idev] --
6,341,465 UART: [ldev] ++
6,342,033 UART: [ldev] CDI.KEYID = 6
6,342,948 UART: [ldev] SUBJECT.KEYID = 5
6,344,167 UART: [ldev] AUTHORITY.KEYID = 7
6,345,401 UART: [ldev] FE.KEYID = 1
6,355,737 UART: [ldev] Erasing FE.KEYID = 1
8,829,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,386 UART: [ldev] --
10,617,514 UART: [fwproc] Wait for Commands...
10,619,937 UART: [fwproc] Recv command 0x46574c44
10,622,029 UART: [fwproc] Recv'd Img size: 114448 bytes
10,682,743 UART: ROM Fatal Error: 0x000B0007
10,685,892 >>> mbox cmd response: failed
10,686,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,686,638 >>> mbox cmd response: failed
10,686,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,687,194 >>> mbox cmd response: failed
Initializing fuses
2,049,552 writing to cptra_bootfsm_go
2,238,871 UART:
2,239,198 UART: Running Caliptra ROM ...
2,240,332 UART:
9,784,196 UART: [state] CFI Enabled
9,797,266 UART: [state] LifecycleState = Unprovisioned
9,799,126 UART: [state] DebugLocked = No
9,800,948 UART: [state] WD Timer not started. Device not locked for debugging
9,804,861 UART: [kat] SHA2-256
9,983,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,995,577 UART: [kat] ++
9,996,133 UART: [kat] sha1
10,006,865 UART: [kat] SHA2-256
10,009,881 UART: [kat] SHA2-384
10,017,123 UART: [kat] SHA2-512-ACC
10,020,064 UART: [kat] ECC-384
12,462,504 UART: [kat] HMAC-384Kdf
12,473,957 UART: [kat] LMS
13,003,467 UART: [kat] --
13,009,727 UART: [cold-reset] ++
13,011,828 UART: [fht] FHT @ 0x50003400
13,023,311 UART: [idev] ++
13,023,918 UART: [idev] CDI.KEYID = 6
13,024,811 UART: [idev] SUBJECT.KEYID = 7
13,025,918 UART: [idev] UDS.KEYID = 0
13,028,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,172,610 UART: [idev] Erasing UDS.KEYID = 0
15,496,789 UART: [idev] Sha1 KeyId Algorithm
15,520,009 UART: [idev] --
15,524,237 UART: [ldev] ++
15,524,830 UART: [ldev] CDI.KEYID = 6
15,525,745 UART: [ldev] SUBJECT.KEYID = 5
15,526,910 UART: [ldev] AUTHORITY.KEYID = 7
15,528,138 UART: [ldev] FE.KEYID = 1
15,538,677 UART: [ldev] Erasing FE.KEYID = 1
18,014,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,732,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,748,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,764,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,779,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,799,322 UART: [ldev] --
19,803,238 UART: [fwproc] Wait for Commands...
19,804,964 UART: [fwproc] Recv command 0x46574c44
19,807,064 UART: [fwproc] Recv'd Img size: 114448 bytes
23,211,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,283,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,352,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,670,895 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,700,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,131 >>> mbox cmd response: failed
10,480,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,054 >>> mbox cmd response: failed
10,481,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,642 >>> mbox cmd response: failed
Initializing fuses
2,051,857 writing to cptra_bootfsm_go
13,086,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,662,427 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,176 UART:
192,536 UART: Running Caliptra ROM ...
193,719 UART:
193,870 UART: [state] CFI Enabled
262,259 UART: [state] LifecycleState = Unprovisioned
264,653 UART: [state] DebugLocked = No
266,902 UART: [state] WD Timer not started. Device not locked for debugging
270,799 UART: [kat] SHA2-256
460,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,399 UART: [kat] ++
471,845 UART: [kat] sha1
483,156 UART: [kat] SHA2-256
486,166 UART: [kat] SHA2-384
491,010 UART: [kat] SHA2-512-ACC
493,625 UART: [kat] ECC-384
2,947,451 UART: [kat] HMAC-384Kdf
2,969,581 UART: [kat] LMS
3,501,304 UART: [kat] --
3,507,653 UART: [cold-reset] ++
3,510,245 UART: [fht] FHT @ 0x50003400
3,521,064 UART: [idev] ++
3,521,752 UART: [idev] CDI.KEYID = 6
3,522,729 UART: [idev] SUBJECT.KEYID = 7
3,523,890 UART: [idev] UDS.KEYID = 0
3,529,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,674,003 UART: [idev] Erasing UDS.KEYID = 0
6,027,999 UART: [idev] Sha1 KeyId Algorithm
6,050,937 UART: [idev] --
6,055,265 UART: [ldev] ++
6,056,143 UART: [ldev] CDI.KEYID = 6
6,057,069 UART: [ldev] SUBJECT.KEYID = 5
6,058,183 UART: [ldev] AUTHORITY.KEYID = 7
6,059,365 UART: [ldev] FE.KEYID = 1
6,099,663 UART: [ldev] Erasing FE.KEYID = 1
8,603,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,327 UART: [ldev] --
10,414,295 UART: [fwproc] Wait for Commands...
10,415,852 UART: [fwproc] Recv command 0x46574c44
10,418,114 UART: [fwproc] Recv'd Img size: 114448 bytes
10,513,361 UART: ROM Fatal Error: 0x000B0007
10,517,040 >>> mbox cmd response: failed
10,517,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,733 >>> mbox cmd response: failed
10,518,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,518,258 >>> mbox cmd response: failed
Initializing fuses
2,053,012 writing to cptra_bootfsm_go
2,242,342 UART:
2,242,696 UART: Running Caliptra ROM ...
2,243,832 UART:
2,243,999 UART: [state] CFI Enabled
2,307,160 UART: [state] LifecycleState = Unprovisioned
2,309,530 UART: [state] DebugLocked = No
2,311,303 UART: [state] WD Timer not started. Device not locked for debugging
2,316,250 UART: [kat] SHA2-256
2,506,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,900 UART: [kat] ++
2,517,401 UART: [kat] sha1
2,528,670 UART: [kat] SHA2-256
2,531,652 UART: [kat] SHA2-384
2,538,153 UART: [kat] SHA2-512-ACC
2,540,781 UART: [kat] ECC-384
4,991,439 UART: [kat] HMAC-384Kdf
5,015,339 UART: [kat] LMS
5,547,085 UART: [kat] --
5,551,586 UART: [cold-reset] ++
5,553,685 UART: [fht] FHT @ 0x50003400
5,565,530 UART: [idev] ++
5,566,213 UART: [idev] CDI.KEYID = 6
5,567,149 UART: [idev] SUBJECT.KEYID = 7
5,568,418 UART: [idev] UDS.KEYID = 0
5,571,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,144 UART: [idev] Erasing UDS.KEYID = 0
8,071,147 UART: [idev] Sha1 KeyId Algorithm
8,094,229 UART: [idev] --
8,098,825 UART: [ldev] ++
8,099,565 UART: [ldev] CDI.KEYID = 6
8,100,461 UART: [ldev] SUBJECT.KEYID = 5
8,101,506 UART: [ldev] AUTHORITY.KEYID = 7
8,102,794 UART: [ldev] FE.KEYID = 1
8,142,881 UART: [ldev] Erasing FE.KEYID = 1
10,645,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,378,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,408,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,429,795 UART: [ldev] --
12,434,370 UART: [fwproc] Wait for Commands...
12,436,518 UART: [fwproc] Recv command 0x46574c44
12,438,774 UART: [fwproc] Recv'd Img size: 114448 bytes
15,887,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,964,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,079,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,623,821 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,438,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,333,975 >>> mbox cmd response: failed
10,334,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,335,040 >>> mbox cmd response: failed
10,335,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,335,634 >>> mbox cmd response: failed
Initializing fuses
2,051,770 writing to cptra_bootfsm_go
5,474,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,766,342 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,514 UART:
192,886 UART: Running Caliptra ROM ...
194,080 UART:
603,583 UART: [state] CFI Enabled
618,298 UART: [state] LifecycleState = Unprovisioned
620,647 UART: [state] DebugLocked = No
623,126 UART: [state] WD Timer not started. Device not locked for debugging
628,585 UART: [kat] SHA2-256
818,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,214 UART: [kat] ++
829,729 UART: [kat] sha1
841,272 UART: [kat] SHA2-256
844,281 UART: [kat] SHA2-384
849,290 UART: [kat] SHA2-512-ACC
851,899 UART: [kat] ECC-384
3,292,241 UART: [kat] HMAC-384Kdf
3,306,380 UART: [kat] LMS
3,838,181 UART: [kat] --
3,844,442 UART: [cold-reset] ++
3,845,833 UART: [fht] FHT @ 0x50003400
3,856,648 UART: [idev] ++
3,857,328 UART: [idev] CDI.KEYID = 6
3,858,267 UART: [idev] SUBJECT.KEYID = 7
3,859,477 UART: [idev] UDS.KEYID = 0
3,865,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,228 UART: [idev] Erasing UDS.KEYID = 0
6,336,099 UART: [idev] Sha1 KeyId Algorithm
6,357,824 UART: [idev] --
6,363,552 UART: [ldev] ++
6,364,230 UART: [ldev] CDI.KEYID = 6
6,365,140 UART: [ldev] SUBJECT.KEYID = 5
6,366,304 UART: [ldev] AUTHORITY.KEYID = 7
6,367,532 UART: [ldev] FE.KEYID = 1
6,377,369 UART: [ldev] Erasing FE.KEYID = 1
8,861,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,497 UART: [ldev] --
10,650,888 UART: [fwproc] Wait for Commands...
10,653,741 UART: [fwproc] Recv command 0x46574c44
10,656,069 UART: [fwproc] Recv'd Img size: 114448 bytes
10,750,097 UART: ROM Fatal Error: 0x000B0007
10,753,752 >>> mbox cmd response: failed
10,754,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,404 >>> mbox cmd response: failed
10,754,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,963 >>> mbox cmd response: failed
Initializing fuses
2,057,838 writing to cptra_bootfsm_go
2,247,161 UART:
2,247,493 UART: Running Caliptra ROM ...
2,248,540 UART:
9,717,871 UART: [state] CFI Enabled
9,733,156 UART: [state] LifecycleState = Unprovisioned
9,735,541 UART: [state] DebugLocked = No
9,738,307 UART: [state] WD Timer not started. Device not locked for debugging
9,742,976 UART: [kat] SHA2-256
9,932,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,943,659 UART: [kat] ++
9,944,175 UART: [kat] sha1
9,954,524 UART: [kat] SHA2-256
9,957,549 UART: [kat] SHA2-384
9,963,222 UART: [kat] SHA2-512-ACC
9,965,774 UART: [kat] ECC-384
12,406,542 UART: [kat] HMAC-384Kdf
12,418,540 UART: [kat] LMS
12,950,379 UART: [kat] --
12,952,902 UART: [cold-reset] ++
12,954,783 UART: [fht] FHT @ 0x50003400
12,965,924 UART: [idev] ++
12,966,601 UART: [idev] CDI.KEYID = 6
12,967,535 UART: [idev] SUBJECT.KEYID = 7
12,968,801 UART: [idev] UDS.KEYID = 0
12,971,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,115,859 UART: [idev] Erasing UDS.KEYID = 0
15,448,117 UART: [idev] Sha1 KeyId Algorithm
15,469,725 UART: [idev] --
15,474,151 UART: [ldev] ++
15,474,884 UART: [ldev] CDI.KEYID = 6
15,475,768 UART: [ldev] SUBJECT.KEYID = 5
15,476,982 UART: [ldev] AUTHORITY.KEYID = 7
15,478,176 UART: [ldev] FE.KEYID = 1
15,487,845 UART: [ldev] Erasing FE.KEYID = 1
17,963,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,683,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,714,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,750,329 UART: [ldev] --
19,756,140 UART: [fwproc] Wait for Commands...
19,758,237 UART: [fwproc] Recv command 0x46574c44
19,760,549 UART: [fwproc] Recv'd Img size: 114448 bytes
23,205,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,276,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,392,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,936,243 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,759,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,539,033 >>> mbox cmd response: failed
10,539,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,072 >>> mbox cmd response: failed
10,540,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,704 >>> mbox cmd response: failed
Initializing fuses
2,051,804 writing to cptra_bootfsm_go
13,085,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,284,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,477 UART: [kat] SHA2-256
892,415 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,322 UART: [kat] LMS
1,475,518 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,887 UART: [fht] Storing FHT @ 0x50003400
1,479,712 UART: [idev] ++
1,479,880 UART: [idev] CDI.KEYID = 6
1,480,240 UART: [idev] SUBJECT.KEYID = 7
1,480,664 UART: [idev] UDS.KEYID = 0
1,481,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,130 UART: [idev] Erasing UDS.KEYID = 0
1,504,490 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,156 UART: [idev] --
1,514,387 UART: [ldev] ++
1,514,555 UART: [ldev] CDI.KEYID = 6
1,514,918 UART: [ldev] SUBJECT.KEYID = 5
1,515,344 UART: [ldev] AUTHORITY.KEYID = 7
1,515,807 UART: [ldev] FE.KEYID = 1
1,520,671 UART: [ldev] Erasing FE.KEYID = 1
1,545,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,420 UART: [ldev] --
1,584,861 UART: [fwproc] Waiting for Commands...
1,585,722 UART: [fwproc] Received command 0x46574c44
1,586,513 UART: [fwproc] Received Image of size 114448 bytes
1,610,654 UART: ROM Fatal Error: 0x000B0007
1,611,811 >>> mbox cmd response: failed
1,611,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,817 >>> mbox cmd response: failed
1,611,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,312 UART: [kat] SHA2-512-ACC
897,213 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,386 UART: [kat] LMS
1,475,582 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,851 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,530 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,197 UART: [ldev] ++
1,514,365 UART: [ldev] CDI.KEYID = 6
1,514,728 UART: [ldev] SUBJECT.KEYID = 5
1,515,154 UART: [ldev] AUTHORITY.KEYID = 7
1,515,617 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,546,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,360 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 114448 bytes
2,886,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,626 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,463,552 >>> mbox cmd response: failed
1,463,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,558 >>> mbox cmd response: failed
1,463,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,766 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,950 UART: [kat] SHA2-256
892,888 UART: [kat] SHA2-384
895,487 UART: [kat] SHA2-512-ACC
897,388 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,312 UART: [cold-reset] ++
1,476,682 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,875 UART: [idev] --
1,515,136 UART: [ldev] ++
1,515,304 UART: [ldev] CDI.KEYID = 6
1,515,667 UART: [ldev] SUBJECT.KEYID = 5
1,516,093 UART: [ldev] AUTHORITY.KEYID = 7
1,516,556 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,547,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,561 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,915 UART: [fwproc] Received command 0x46574c44
1,588,706 UART: [fwproc] Received Image of size 114448 bytes
1,613,007 UART: ROM Fatal Error: 0x000B0007
1,614,164 >>> mbox cmd response: failed
1,614,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,170 >>> mbox cmd response: failed
1,614,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
902,943 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,458 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,699 UART: [idev] ++
1,479,867 UART: [idev] CDI.KEYID = 6
1,480,227 UART: [idev] SUBJECT.KEYID = 7
1,480,651 UART: [idev] UDS.KEYID = 0
1,480,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,565 UART: [idev] Erasing UDS.KEYID = 0
1,505,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,713 UART: [idev] --
1,514,914 UART: [ldev] ++
1,515,082 UART: [ldev] CDI.KEYID = 6
1,515,445 UART: [ldev] SUBJECT.KEYID = 5
1,515,871 UART: [ldev] AUTHORITY.KEYID = 7
1,516,334 UART: [ldev] FE.KEYID = 1
1,521,684 UART: [ldev] Erasing FE.KEYID = 1
1,547,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,843 UART: [ldev] --
1,587,220 UART: [fwproc] Waiting for Commands...
1,588,043 UART: [fwproc] Received command 0x46574c44
1,588,834 UART: [fwproc] Received Image of size 114448 bytes
2,888,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,205 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,245 >>> mbox cmd response: failed
1,466,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,251 >>> mbox cmd response: failed
1,466,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,671 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,450 UART: [kat] LMS
1,170,778 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,171,909 UART: [fht] FHT @ 0x50003400
1,174,538 UART: [idev] ++
1,174,706 UART: [idev] CDI.KEYID = 6
1,175,066 UART: [idev] SUBJECT.KEYID = 7
1,175,490 UART: [idev] UDS.KEYID = 0
1,175,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,522 UART: [idev] Erasing UDS.KEYID = 0
1,200,025 UART: [idev] Sha1 KeyId Algorithm
1,208,481 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,028 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,650 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,743 UART: ROM Fatal Error: 0x000B0007
1,307,900 >>> mbox cmd response: failed
1,307,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,906 >>> mbox cmd response: failed
1,307,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,346 UART: [kat] HMAC-384Kdf
922,794 UART: [kat] LMS
1,171,122 UART: [kat] --
1,171,873 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,392 UART: [idev] Erasing UDS.KEYID = 0
1,201,583 UART: [idev] Sha1 KeyId Algorithm
1,209,841 UART: [idev] --
1,210,795 UART: [ldev] ++
1,210,963 UART: [ldev] CDI.KEYID = 6
1,211,326 UART: [ldev] SUBJECT.KEYID = 5
1,211,752 UART: [ldev] AUTHORITY.KEYID = 7
1,212,215 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,933 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,275 >>> mbox cmd response: failed
1,164,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,281 >>> mbox cmd response: failed
1,164,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,600 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,108 UART: [kat] SHA2-256
904,048 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,659 UART: [kat] HMAC-384Kdf
923,393 UART: [kat] LMS
1,171,721 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,836 UART: [fht] FHT @ 0x50003400
1,175,529 UART: [idev] ++
1,175,697 UART: [idev] CDI.KEYID = 6
1,176,057 UART: [idev] SUBJECT.KEYID = 7
1,176,481 UART: [idev] UDS.KEYID = 0
1,176,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,761 UART: [idev] Erasing UDS.KEYID = 0
1,201,570 UART: [idev] Sha1 KeyId Algorithm
1,209,968 UART: [idev] --
1,211,038 UART: [ldev] ++
1,211,206 UART: [ldev] CDI.KEYID = 6
1,211,569 UART: [ldev] SUBJECT.KEYID = 5
1,211,995 UART: [ldev] AUTHORITY.KEYID = 7
1,212,458 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,244,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,018 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,153 UART: [fwproc] Recv command 0x46574c44
1,284,881 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,960 UART: ROM Fatal Error: 0x000B0007
1,309,117 >>> mbox cmd response: failed
1,309,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,123 >>> mbox cmd response: failed
1,309,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,835 UART: [kat] HMAC-384Kdf
923,501 UART: [kat] LMS
1,171,829 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,090 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,994 UART: [idev] Sha1 KeyId Algorithm
1,210,466 UART: [idev] --
1,211,466 UART: [ldev] ++
1,211,634 UART: [ldev] CDI.KEYID = 6
1,211,997 UART: [ldev] SUBJECT.KEYID = 5
1,212,423 UART: [ldev] AUTHORITY.KEYID = 7
1,212,886 UART: [ldev] FE.KEYID = 1
1,218,266 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,460 UART: [ldev] --
1,283,853 UART: [fwproc] Wait for Commands...
1,284,665 UART: [fwproc] Recv command 0x46574c44
1,285,393 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,247 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,256 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,398 >>> mbox cmd response: failed
1,164,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,404 >>> mbox cmd response: failed
1,164,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,003 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
903,934 UART: [kat] SHA2-512-ACC
905,835 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,367 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,173,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,334 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,985 UART: ROM Fatal Error: 0x000B0007
1,306,142 >>> mbox cmd response: failed
1,306,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,148 >>> mbox cmd response: failed
1,306,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,170,109 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,173,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,240,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,004 UART: [fwproc] Wait for Commands...
1,280,595 UART: [fwproc] Recv command 0x46574c44
1,281,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,483 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,157,245 >>> mbox cmd response: failed
1,157,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,251 >>> mbox cmd response: failed
1,157,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,919 UART: [state] LifecycleState = Unprovisioned
86,574 UART: [state] DebugLocked = No
87,296 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
891,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,082 UART: [kat] ++
896,234 UART: [kat] sha1
900,612 UART: [kat] SHA2-256
902,552 UART: [kat] SHA2-384
905,237 UART: [kat] SHA2-512-ACC
907,138 UART: [kat] ECC-384
917,219 UART: [kat] HMAC-384Kdf
921,999 UART: [kat] LMS
1,170,311 UART: [kat] --
1,171,036 UART: [cold-reset] ++
1,171,528 UART: [fht] FHT @ 0x50003400
1,174,280 UART: [idev] ++
1,174,448 UART: [idev] CDI.KEYID = 6
1,174,809 UART: [idev] SUBJECT.KEYID = 7
1,175,234 UART: [idev] UDS.KEYID = 0
1,175,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,170 UART: [idev] Erasing UDS.KEYID = 0
1,200,226 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,951 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,378 UART: ROM Fatal Error: 0x000B0007
1,308,535 >>> mbox cmd response: failed
1,308,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,541 >>> mbox cmd response: failed
1,308,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,943 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,072 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,504 >>> mbox cmd response: failed
1,162,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,510 >>> mbox cmd response: failed
1,162,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,462 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
4,880,578 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,905,572 >>> mbox cmd response: failed
16,906,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,906,732 >>> mbox cmd response: failed
16,907,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,907,303 >>> mbox cmd response: failed
Initializing fuses
2,063,260 writing to cptra_bootfsm_go
6,924,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,499,710 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
4,878,657 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,889,563 >>> mbox cmd response: failed
16,890,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,890,692 >>> mbox cmd response: failed
16,890,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,891,250 >>> mbox cmd response: failed
Initializing fuses
2,070,790 writing to cptra_bootfsm_go
6,950,092 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,525,108 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,185,425 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,061,212 >>> mbox cmd response: failed
17,061,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,286 >>> mbox cmd response: failed
17,062,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,916 >>> mbox cmd response: failed
Initializing fuses
2,057,907 writing to cptra_bootfsm_go
7,985,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,409,362 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
5,186,317 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,056,877 >>> mbox cmd response: failed
17,057,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,057,859 >>> mbox cmd response: failed
17,058,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,058,431 >>> mbox cmd response: failed
Initializing fuses
2,057,850 writing to cptra_bootfsm_go
7,992,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,430,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,458,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,655,173 >>> mbox cmd response: failed
12,655,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,172 >>> mbox cmd response: failed
12,656,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,739 >>> mbox cmd response: failed
Initializing fuses
2,067,585 writing to cptra_bootfsm_go
5,541,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,335,436 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,438,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,676,984 >>> mbox cmd response: failed
12,677,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,678,175 >>> mbox cmd response: failed
12,678,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,678,741 >>> mbox cmd response: failed
Initializing fuses
2,057,635 writing to cptra_bootfsm_go
5,499,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,320,241 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,790,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,907,757 >>> mbox cmd response: failed
12,908,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,908,704 >>> mbox cmd response: failed
12,908,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,909,264 >>> mbox cmd response: failed
Initializing fuses
2,056,118 writing to cptra_bootfsm_go
10,742,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,460,638 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,783,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,921,098 >>> mbox cmd response: failed
12,921,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,226 >>> mbox cmd response: failed
12,922,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,783 >>> mbox cmd response: failed
Initializing fuses
2,064,380 writing to cptra_bootfsm_go
10,727,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,429,572 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,466,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,660,326 >>> mbox cmd response: failed
12,660,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,303 >>> mbox cmd response: failed
12,661,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,864 >>> mbox cmd response: failed
Initializing fuses
2,057,348 writing to cptra_bootfsm_go
5,541,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,382,215 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,442,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,689,992 >>> mbox cmd response: failed
12,690,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,188 >>> mbox cmd response: failed
12,691,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,744 >>> mbox cmd response: failed
Initializing fuses
2,061,864 writing to cptra_bootfsm_go
5,541,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,379,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,782,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,902,643 >>> mbox cmd response: failed
12,903,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,903,622 >>> mbox cmd response: failed
12,903,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,904,186 >>> mbox cmd response: failed
Initializing fuses
2,060,489 writing to cptra_bootfsm_go
10,744,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,475,890 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,791,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,905,368 >>> mbox cmd response: failed
12,906,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,906,536 >>> mbox cmd response: failed
12,906,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,907,099 >>> mbox cmd response: failed
Initializing fuses
2,055,872 writing to cptra_bootfsm_go
10,736,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,464,521 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,823 >>> mbox cmd response: failed
1,428,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,829 >>> mbox cmd response: failed
1,428,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,536 UART: [kat] SHA2-512-ACC
897,437 UART: [kat] ECC-384
903,154 UART: [kat] HMAC-384Kdf
907,664 UART: [kat] LMS
1,475,860 UART: [kat] --
1,476,675 UART: [cold-reset] ++
1,477,221 UART: [fht] Storing FHT @ 0x50003400
1,479,852 UART: [idev] ++
1,480,020 UART: [idev] CDI.KEYID = 6
1,480,380 UART: [idev] SUBJECT.KEYID = 7
1,480,804 UART: [idev] UDS.KEYID = 0
1,481,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,686 UART: [idev] Erasing UDS.KEYID = 0
1,505,012 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,736 UART: [idev] --
1,514,653 UART: [ldev] ++
1,514,821 UART: [ldev] CDI.KEYID = 6
1,515,184 UART: [ldev] SUBJECT.KEYID = 5
1,515,610 UART: [ldev] AUTHORITY.KEYID = 7
1,516,073 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,130 UART: [ldev] --
1,585,585 UART: [fwproc] Waiting for Commands...
1,586,266 UART: [fwproc] Received command 0x46574c44
1,587,057 UART: [fwproc] Received Image of size 114448 bytes
2,885,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,700 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,179 >>> mbox cmd response: failed
1,427,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,185 >>> mbox cmd response: failed
1,427,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,610 >>> mbox cmd response: failed
1,428,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,616 >>> mbox cmd response: failed
1,428,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,916 UART: [kat] SHA2-256
881,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,962 UART: [kat] ++
886,114 UART: [kat] sha1
890,334 UART: [kat] SHA2-256
892,272 UART: [kat] SHA2-384
894,981 UART: [kat] SHA2-512-ACC
896,882 UART: [kat] ECC-384
902,353 UART: [kat] HMAC-384Kdf
907,069 UART: [kat] LMS
1,475,265 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,534 UART: [fht] Storing FHT @ 0x50003400
1,479,297 UART: [idev] ++
1,479,465 UART: [idev] CDI.KEYID = 6
1,479,825 UART: [idev] SUBJECT.KEYID = 7
1,480,249 UART: [idev] UDS.KEYID = 0
1,480,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,207 UART: [idev] --
1,515,282 UART: [ldev] ++
1,515,450 UART: [ldev] CDI.KEYID = 6
1,515,813 UART: [ldev] SUBJECT.KEYID = 5
1,516,239 UART: [ldev] AUTHORITY.KEYID = 7
1,516,702 UART: [ldev] FE.KEYID = 1
1,521,830 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,625 UART: [fwproc] Received command 0x46574c44
1,588,416 UART: [fwproc] Received Image of size 114448 bytes
2,886,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,284 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,723 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,508 >>> mbox cmd response: failed
1,429,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,514 >>> mbox cmd response: failed
1,429,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,579 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,835 >>> mbox cmd response: failed
1,427,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,841 >>> mbox cmd response: failed
1,427,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
893,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,627 UART: [kat] ++
897,779 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,907 UART: [cold-reset] ++
1,172,255 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,221 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,230 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,645 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,975 >>> mbox cmd response: failed
1,426,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,981 >>> mbox cmd response: failed
1,426,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,966 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,798 >>> mbox cmd response: failed
1,428,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,804 >>> mbox cmd response: failed
1,428,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,902 UART: [kat] SHA2-256
903,842 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,201 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,632 UART: [fht] FHT @ 0x50003400
1,175,267 UART: [idev] ++
1,175,435 UART: [idev] CDI.KEYID = 6
1,175,795 UART: [idev] SUBJECT.KEYID = 7
1,176,219 UART: [idev] UDS.KEYID = 0
1,176,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,202,116 UART: [idev] Sha1 KeyId Algorithm
1,210,556 UART: [idev] --
1,211,630 UART: [ldev] ++
1,211,798 UART: [ldev] CDI.KEYID = 6
1,212,161 UART: [ldev] SUBJECT.KEYID = 5
1,212,587 UART: [ldev] AUTHORITY.KEYID = 7
1,213,050 UART: [ldev] FE.KEYID = 1
1,218,428 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,786 UART: [ldev] --
1,284,061 UART: [fwproc] Wait for Commands...
1,284,701 UART: [fwproc] Recv command 0x46574c44
1,285,429 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,176 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,430,810 >>> mbox cmd response: failed
1,430,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,816 >>> mbox cmd response: failed
1,430,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,575 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,169 >>> mbox cmd response: failed
1,428,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,175 >>> mbox cmd response: failed
1,428,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,780 UART: [kat] HMAC-384Kdf
921,316 UART: [kat] LMS
1,169,628 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,174,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,687 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,525 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,242,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,795 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,605 >>> mbox cmd response: failed
1,428,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,611 >>> mbox cmd response: failed
1,428,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,917 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,094 >>> mbox cmd response: failed
1,428,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,100 >>> mbox cmd response: failed
1,428,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,796 UART: [cold-reset] ++
1,171,286 UART: [fht] FHT @ 0x50003400
1,173,830 UART: [idev] ++
1,173,998 UART: [idev] CDI.KEYID = 6
1,174,359 UART: [idev] SUBJECT.KEYID = 7
1,174,784 UART: [idev] UDS.KEYID = 0
1,175,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,707 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,266 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,228 >>> mbox cmd response: failed
1,429,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,234 >>> mbox cmd response: failed
1,429,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,308 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,172 UART:
192,529 UART: Running Caliptra ROM ...
193,630 UART:
193,771 UART: [state] CFI Enabled
265,132 UART: [state] LifecycleState = Unprovisioned
267,045 UART: [state] DebugLocked = No
269,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,324 UART: [kat] SHA2-256
445,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,511 UART: [kat] ++
455,957 UART: [kat] sha1
468,088 UART: [kat] SHA2-256
470,764 UART: [kat] SHA2-384
475,779 UART: [kat] SHA2-512-ACC
478,183 UART: [kat] ECC-384
2,766,832 UART: [kat] HMAC-384Kdf
2,800,142 UART: [kat] LMS
3,990,459 UART: [kat] --
3,994,611 UART: [cold-reset] ++
3,996,284 UART: [fht] Storing FHT @ 0x50003400
4,009,554 UART: [idev] ++
4,010,125 UART: [idev] CDI.KEYID = 6
4,011,192 UART: [idev] SUBJECT.KEYID = 7
4,012,303 UART: [idev] UDS.KEYID = 0
4,015,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,344 UART: [idev] Erasing UDS.KEYID = 0
7,348,104 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,507 UART: [idev] --
7,371,592 UART: [ldev] ++
7,372,162 UART: [ldev] CDI.KEYID = 6
7,373,183 UART: [ldev] SUBJECT.KEYID = 5
7,374,289 UART: [ldev] AUTHORITY.KEYID = 7
7,375,598 UART: [ldev] FE.KEYID = 1
7,419,122 UART: [ldev] Erasing FE.KEYID = 1
10,754,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,971 UART: [ldev] --
13,133,319 UART: [fwproc] Waiting for Commands...
13,136,440 UART: [fwproc] Received command 0x46574c44
13,138,631 UART: [fwproc] Received Image of size 114124 bytes
17,185,457 UART: ROM Fatal Error: 0x000B0016
17,188,903 >>> mbox cmd response: failed
17,189,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,189,702 >>> mbox cmd response: failed
17,189,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,190,286 >>> mbox cmd response: failed
Initializing fuses
2,052,963 writing to cptra_bootfsm_go
2,242,292 UART:
2,242,648 UART: Running Caliptra ROM ...
2,243,785 UART:
2,243,971 UART: [state] CFI Enabled
2,309,443 UART: [state] LifecycleState = Unprovisioned
2,311,340 UART: [state] DebugLocked = No
2,312,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,152 UART: [kat] SHA2-256
2,487,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,331 UART: [kat] ++
2,498,849 UART: [kat] sha1
2,511,038 UART: [kat] SHA2-256
2,513,735 UART: [kat] SHA2-384
2,518,805 UART: [kat] SHA2-512-ACC
2,521,158 UART: [kat] ECC-384
4,813,019 UART: [kat] HMAC-384Kdf
4,825,897 UART: [kat] LMS
6,016,206 UART: [kat] --
6,022,535 UART: [cold-reset] ++
6,024,307 UART: [fht] Storing FHT @ 0x50003400
6,036,927 UART: [idev] ++
6,037,551 UART: [idev] CDI.KEYID = 6
6,038,468 UART: [idev] SUBJECT.KEYID = 7
6,039,683 UART: [idev] UDS.KEYID = 0
6,042,405 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,186,088 UART: [idev] Erasing UDS.KEYID = 0
9,372,893 UART: [idev] Using Sha1 for KeyId Algorithm
9,395,173 UART: [idev] --
9,400,301 UART: [ldev] ++
9,400,932 UART: [ldev] CDI.KEYID = 6
9,401,846 UART: [ldev] SUBJECT.KEYID = 5
9,403,116 UART: [ldev] AUTHORITY.KEYID = 7
9,404,364 UART: [ldev] FE.KEYID = 1
9,449,317 UART: [ldev] Erasing FE.KEYID = 1
12,782,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,879 UART: [ldev] --
15,163,547 UART: [fwproc] Waiting for Commands...
15,166,620 UART: [fwproc] Received command 0x46574c44
15,168,826 UART: [fwproc] Received Image of size 114124 bytes
19,222,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,301,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,370,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,688,554 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,790,148 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,146,559 >>> mbox cmd response: failed
17,147,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,147,591 >>> mbox cmd response: failed
17,147,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,148,105 >>> mbox cmd response: failed
Initializing fuses
2,048,614 writing to cptra_bootfsm_go
5,835,807 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,898,700 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,517 UART:
192,869 UART: Running Caliptra ROM ...
194,029 UART:
603,771 UART: [state] CFI Enabled
616,756 UART: [state] LifecycleState = Unprovisioned
618,689 UART: [state] DebugLocked = No
621,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,819 UART: [kat] SHA2-256
796,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,130 UART: [kat] ++
807,604 UART: [kat] sha1
819,940 UART: [kat] SHA2-256
822,685 UART: [kat] SHA2-384
827,154 UART: [kat] SHA2-512-ACC
829,545 UART: [kat] ECC-384
3,113,231 UART: [kat] HMAC-384Kdf
3,124,500 UART: [kat] LMS
4,314,660 UART: [kat] --
4,318,811 UART: [cold-reset] ++
4,320,751 UART: [fht] Storing FHT @ 0x50003400
4,333,475 UART: [idev] ++
4,334,100 UART: [idev] CDI.KEYID = 6
4,335,012 UART: [idev] SUBJECT.KEYID = 7
4,336,287 UART: [idev] UDS.KEYID = 0
4,339,337 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,903 UART: [idev] Erasing UDS.KEYID = 0
7,625,834 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,623 UART: [idev] --
7,649,735 UART: [ldev] ++
7,650,316 UART: [ldev] CDI.KEYID = 6
7,651,225 UART: [ldev] SUBJECT.KEYID = 5
7,652,447 UART: [ldev] AUTHORITY.KEYID = 7
7,653,733 UART: [ldev] FE.KEYID = 1
7,664,759 UART: [ldev] Erasing FE.KEYID = 1
10,952,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,231 UART: [ldev] --
13,314,346 UART: [fwproc] Waiting for Commands...
13,316,594 UART: [fwproc] Received command 0x46574c44
13,318,803 UART: [fwproc] Received Image of size 114124 bytes
17,364,307 UART: ROM Fatal Error: 0x000B0016
17,367,715 >>> mbox cmd response: failed
17,368,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,491 >>> mbox cmd response: failed
17,368,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,170 >>> mbox cmd response: failed
Initializing fuses
2,059,645 writing to cptra_bootfsm_go
2,248,939 UART:
2,249,291 UART: Running Caliptra ROM ...
2,250,337 UART:
3,092,696 UART: [state] CFI Enabled
3,109,871 UART: [state] LifecycleState = Unprovisioned
3,111,841 UART: [state] DebugLocked = No
3,113,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,118,217 UART: [kat] SHA2-256
3,287,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,298,524 UART: [kat] ++
3,298,982 UART: [kat] sha1
3,309,977 UART: [kat] SHA2-256
3,312,680 UART: [kat] SHA2-384
3,318,034 UART: [kat] SHA2-512-ACC
3,320,394 UART: [kat] ECC-384
5,605,378 UART: [kat] HMAC-384Kdf
5,615,625 UART: [kat] LMS
6,805,761 UART: [kat] --
6,809,277 UART: [cold-reset] ++
6,810,722 UART: [fht] Storing FHT @ 0x50003400
6,822,320 UART: [idev] ++
6,822,923 UART: [idev] CDI.KEYID = 6
6,823,815 UART: [idev] SUBJECT.KEYID = 7
6,825,089 UART: [idev] UDS.KEYID = 0
6,827,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,971,322 UART: [idev] Erasing UDS.KEYID = 0
10,114,509 UART: [idev] Using Sha1 for KeyId Algorithm
10,135,087 UART: [idev] --
10,138,187 UART: [ldev] ++
10,138,816 UART: [ldev] CDI.KEYID = 6
10,139,726 UART: [ldev] SUBJECT.KEYID = 5
10,140,982 UART: [ldev] AUTHORITY.KEYID = 7
10,142,220 UART: [ldev] FE.KEYID = 1
10,154,324 UART: [ldev] Erasing FE.KEYID = 1
13,444,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,737,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,751,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,766,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,781,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,799,748 UART: [ldev] --
15,804,265 UART: [fwproc] Waiting for Commands...
15,807,284 UART: [fwproc] Received command 0x46574c44
15,809,482 UART: [fwproc] Received Image of size 114124 bytes
19,864,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,944,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,013,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,331,110 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,127,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,332,641 >>> mbox cmd response: failed
17,333,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,333,554 >>> mbox cmd response: failed
17,333,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,117 >>> mbox cmd response: failed
Initializing fuses
2,049,899 writing to cptra_bootfsm_go
6,662,148 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,601,051 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,355 UART:
192,706 UART: Running Caliptra ROM ...
193,786 UART:
193,928 UART: [state] CFI Enabled
263,686 UART: [state] LifecycleState = Unprovisioned
265,545 UART: [state] DebugLocked = No
267,654 UART: [state] WD Timer not started. Device not locked for debugging
271,903 UART: [kat] SHA2-256
451,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,563 UART: [kat] ++
463,105 UART: [kat] sha1
474,299 UART: [kat] SHA2-256
477,344 UART: [kat] SHA2-384
482,788 UART: [kat] SHA2-512-ACC
485,733 UART: [kat] ECC-384
2,947,823 UART: [kat] HMAC-384Kdf
2,971,695 UART: [kat] LMS
3,501,155 UART: [kat] --
3,504,290 UART: [cold-reset] ++
3,506,873 UART: [fht] FHT @ 0x50003400
3,516,662 UART: [idev] ++
3,517,266 UART: [idev] CDI.KEYID = 6
3,518,154 UART: [idev] SUBJECT.KEYID = 7
3,519,374 UART: [idev] UDS.KEYID = 0
3,522,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,012 UART: [idev] Erasing UDS.KEYID = 0
6,028,097 UART: [idev] Sha1 KeyId Algorithm
6,051,438 UART: [idev] --
6,055,486 UART: [ldev] ++
6,056,055 UART: [ldev] CDI.KEYID = 6
6,056,944 UART: [ldev] SUBJECT.KEYID = 5
6,058,182 UART: [ldev] AUTHORITY.KEYID = 7
6,059,342 UART: [ldev] FE.KEYID = 1
6,102,267 UART: [ldev] Erasing FE.KEYID = 1
8,606,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,943 UART: [ldev] --
10,415,732 UART: [fwproc] Wait for Commands...
10,418,317 UART: [fwproc] Recv command 0x46574c44
10,420,414 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,109 UART: ROM Fatal Error: 0x000B0016
13,821,240 >>> mbox cmd response: failed
13,821,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,000 >>> mbox cmd response: failed
13,822,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,587 >>> mbox cmd response: failed
Initializing fuses
2,052,790 writing to cptra_bootfsm_go
2,242,053 UART:
2,242,397 UART: Running Caliptra ROM ...
2,243,445 UART:
2,243,595 UART: [state] CFI Enabled
2,313,614 UART: [state] LifecycleState = Unprovisioned
2,315,495 UART: [state] DebugLocked = No
2,317,722 UART: [state] WD Timer not started. Device not locked for debugging
2,321,248 UART: [kat] SHA2-256
2,500,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,929 UART: [kat] ++
2,512,394 UART: [kat] sha1
2,523,442 UART: [kat] SHA2-256
2,526,459 UART: [kat] SHA2-384
2,533,199 UART: [kat] SHA2-512-ACC
2,536,148 UART: [kat] ECC-384
4,997,967 UART: [kat] HMAC-384Kdf
5,021,707 UART: [kat] LMS
5,551,180 UART: [kat] --
5,555,672 UART: [cold-reset] ++
5,557,504 UART: [fht] FHT @ 0x50003400
5,569,129 UART: [idev] ++
5,569,691 UART: [idev] CDI.KEYID = 6
5,570,659 UART: [idev] SUBJECT.KEYID = 7
5,571,818 UART: [idev] UDS.KEYID = 0
5,574,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,607 UART: [idev] Erasing UDS.KEYID = 0
8,074,352 UART: [idev] Sha1 KeyId Algorithm
8,098,161 UART: [idev] --
8,102,575 UART: [ldev] ++
8,103,154 UART: [ldev] CDI.KEYID = 6
8,104,064 UART: [ldev] SUBJECT.KEYID = 5
8,105,284 UART: [ldev] AUTHORITY.KEYID = 7
8,106,522 UART: [ldev] FE.KEYID = 1
8,150,926 UART: [ldev] Erasing FE.KEYID = 1
10,651,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,437,490 UART: [ldev] --
12,442,488 UART: [fwproc] Wait for Commands...
12,444,821 UART: [fwproc] Recv command 0x46574c44
12,446,916 UART: [fwproc] Recv'd Img size: 114448 bytes
15,862,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,003,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,321,455 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,364,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,608,264 >>> mbox cmd response: failed
13,609,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,609,608 >>> mbox cmd response: failed
13,609,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,610,172 >>> mbox cmd response: failed
Initializing fuses
2,055,611 writing to cptra_bootfsm_go
5,432,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,116,487 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,533 UART:
192,906 UART: Running Caliptra ROM ...
194,012 UART:
603,538 UART: [state] CFI Enabled
616,459 UART: [state] LifecycleState = Unprovisioned
618,352 UART: [state] DebugLocked = No
619,837 UART: [state] WD Timer not started. Device not locked for debugging
624,157 UART: [kat] SHA2-256
803,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,861 UART: [kat] ++
815,397 UART: [kat] sha1
825,525 UART: [kat] SHA2-256
828,511 UART: [kat] SHA2-384
835,139 UART: [kat] SHA2-512-ACC
838,081 UART: [kat] ECC-384
3,277,594 UART: [kat] HMAC-384Kdf
3,290,876 UART: [kat] LMS
3,820,381 UART: [kat] --
3,823,662 UART: [cold-reset] ++
3,826,130 UART: [fht] FHT @ 0x50003400
3,837,233 UART: [idev] ++
3,837,815 UART: [idev] CDI.KEYID = 6
3,838,699 UART: [idev] SUBJECT.KEYID = 7
3,839,914 UART: [idev] UDS.KEYID = 0
3,842,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,840 UART: [idev] Erasing UDS.KEYID = 0
6,310,867 UART: [idev] Sha1 KeyId Algorithm
6,332,699 UART: [idev] --
6,337,460 UART: [ldev] ++
6,338,031 UART: [ldev] CDI.KEYID = 6
6,338,960 UART: [ldev] SUBJECT.KEYID = 5
6,340,118 UART: [ldev] AUTHORITY.KEYID = 7
6,341,524 UART: [ldev] FE.KEYID = 1
6,351,643 UART: [ldev] Erasing FE.KEYID = 1
8,826,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,554 UART: [ldev] --
10,615,931 UART: [fwproc] Wait for Commands...
10,619,106 UART: [fwproc] Recv command 0x46574c44
10,621,207 UART: [fwproc] Recv'd Img size: 114448 bytes
14,017,272 UART: ROM Fatal Error: 0x000B0016
14,020,398 >>> mbox cmd response: failed
14,020,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,021,298 >>> mbox cmd response: failed
14,021,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,021,906 >>> mbox cmd response: failed
Initializing fuses
2,060,133 writing to cptra_bootfsm_go
2,249,399 UART:
2,249,745 UART: Running Caliptra ROM ...
2,250,790 UART:
6,448,882 UART: [state] CFI Enabled
6,463,528 UART: [state] LifecycleState = Unprovisioned
6,465,403 UART: [state] DebugLocked = No
6,467,958 UART: [state] WD Timer not started. Device not locked for debugging
6,471,441 UART: [kat] SHA2-256
6,650,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,662,157 UART: [kat] ++
6,662,627 UART: [kat] sha1
6,672,927 UART: [kat] SHA2-256
6,675,954 UART: [kat] SHA2-384
6,683,672 UART: [kat] SHA2-512-ACC
6,686,638 UART: [kat] ECC-384
9,128,576 UART: [kat] HMAC-384Kdf
9,141,290 UART: [kat] LMS
9,670,780 UART: [kat] --
9,675,252 UART: [cold-reset] ++
9,676,854 UART: [fht] FHT @ 0x50003400
9,687,774 UART: [idev] ++
9,688,375 UART: [idev] CDI.KEYID = 6
9,689,261 UART: [idev] SUBJECT.KEYID = 7
9,690,478 UART: [idev] UDS.KEYID = 0
9,693,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,837,368 UART: [idev] Erasing UDS.KEYID = 0
12,164,788 UART: [idev] Sha1 KeyId Algorithm
12,188,901 UART: [idev] --
12,192,894 UART: [ldev] ++
12,193,461 UART: [ldev] CDI.KEYID = 6
12,194,393 UART: [ldev] SUBJECT.KEYID = 5
12,195,554 UART: [ldev] AUTHORITY.KEYID = 7
12,196,783 UART: [ldev] FE.KEYID = 1
12,207,753 UART: [ldev] Erasing FE.KEYID = 1
14,680,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,398,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,414,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,430,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,446,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,465,592 UART: [ldev] --
16,471,015 UART: [fwproc] Wait for Commands...
16,474,249 UART: [fwproc] Recv command 0x46574c44
16,476,346 UART: [fwproc] Recv'd Img size: 114448 bytes
19,878,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,952,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,020,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,339,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,699,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,812,037 >>> mbox cmd response: failed
13,812,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,812,911 >>> mbox cmd response: failed
13,813,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,813,471 >>> mbox cmd response: failed
Initializing fuses
2,058,351 writing to cptra_bootfsm_go
9,754,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,321,754 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,050 UART:
192,420 UART: Running Caliptra ROM ...
193,550 UART:
193,696 UART: [state] CFI Enabled
264,723 UART: [state] LifecycleState = Unprovisioned
267,145 UART: [state] DebugLocked = No
269,241 UART: [state] WD Timer not started. Device not locked for debugging
273,008 UART: [kat] SHA2-256
462,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,434 UART: [kat] ++
473,912 UART: [kat] sha1
484,898 UART: [kat] SHA2-256
487,911 UART: [kat] SHA2-384
494,172 UART: [kat] SHA2-512-ACC
496,733 UART: [kat] ECC-384
2,948,507 UART: [kat] HMAC-384Kdf
2,971,760 UART: [kat] LMS
3,503,541 UART: [kat] --
3,508,824 UART: [cold-reset] ++
3,510,441 UART: [fht] FHT @ 0x50003400
3,520,884 UART: [idev] ++
3,521,561 UART: [idev] CDI.KEYID = 6
3,522,527 UART: [idev] SUBJECT.KEYID = 7
3,523,738 UART: [idev] UDS.KEYID = 0
3,526,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,645 UART: [idev] Erasing UDS.KEYID = 0
6,028,994 UART: [idev] Sha1 KeyId Algorithm
6,051,259 UART: [idev] --
6,056,931 UART: [ldev] ++
6,057,667 UART: [ldev] CDI.KEYID = 6
6,058,580 UART: [ldev] SUBJECT.KEYID = 5
6,059,739 UART: [ldev] AUTHORITY.KEYID = 7
6,060,990 UART: [ldev] FE.KEYID = 1
6,101,080 UART: [ldev] Erasing FE.KEYID = 1
8,608,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,618 UART: [ldev] --
10,416,778 UART: [fwproc] Wait for Commands...
10,418,885 UART: [fwproc] Recv command 0x46574c44
10,421,144 UART: [fwproc] Recv'd Img size: 114448 bytes
13,862,704 UART: ROM Fatal Error: 0x000B0016
13,866,375 >>> mbox cmd response: failed
13,866,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,867,124 >>> mbox cmd response: failed
13,867,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,867,704 >>> mbox cmd response: failed
Initializing fuses
2,051,744 writing to cptra_bootfsm_go
2,241,059 UART:
2,241,402 UART: Running Caliptra ROM ...
2,242,536 UART:
2,242,708 UART: [state] CFI Enabled
2,307,539 UART: [state] LifecycleState = Unprovisioned
2,309,587 UART: [state] DebugLocked = No
2,312,494 UART: [state] WD Timer not started. Device not locked for debugging
2,317,430 UART: [kat] SHA2-256
2,507,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,104 UART: [kat] ++
2,518,613 UART: [kat] sha1
2,528,966 UART: [kat] SHA2-256
2,531,987 UART: [kat] SHA2-384
2,537,221 UART: [kat] SHA2-512-ACC
2,539,777 UART: [kat] ECC-384
4,993,064 UART: [kat] HMAC-384Kdf
5,018,451 UART: [kat] LMS
5,550,261 UART: [kat] --
5,553,959 UART: [cold-reset] ++
5,556,281 UART: [fht] FHT @ 0x50003400
5,568,235 UART: [idev] ++
5,568,916 UART: [idev] CDI.KEYID = 6
5,569,934 UART: [idev] SUBJECT.KEYID = 7
5,571,100 UART: [idev] UDS.KEYID = 0
5,573,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,717,814 UART: [idev] Erasing UDS.KEYID = 0
8,075,286 UART: [idev] Sha1 KeyId Algorithm
8,096,972 UART: [idev] --
8,101,890 UART: [ldev] ++
8,102,623 UART: [ldev] CDI.KEYID = 6
8,103,534 UART: [ldev] SUBJECT.KEYID = 5
8,104,690 UART: [ldev] AUTHORITY.KEYID = 7
8,105,921 UART: [ldev] FE.KEYID = 1
8,145,955 UART: [ldev] Erasing FE.KEYID = 1
10,651,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,779 UART: [ldev] --
12,455,830 UART: [fwproc] Wait for Commands...
12,458,427 UART: [fwproc] Recv command 0x46574c44
12,460,780 UART: [fwproc] Recv'd Img size: 114448 bytes
15,906,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,646,940 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,439,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,146 >>> mbox cmd response: failed
14,274,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,275,072 >>> mbox cmd response: failed
14,275,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,275,642 >>> mbox cmd response: failed
Initializing fuses
2,049,575 writing to cptra_bootfsm_go
5,481,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,780,642 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,543 UART:
192,911 UART: Running Caliptra ROM ...
194,110 UART:
603,569 UART: [state] CFI Enabled
616,688 UART: [state] LifecycleState = Unprovisioned
619,057 UART: [state] DebugLocked = No
620,762 UART: [state] WD Timer not started. Device not locked for debugging
625,710 UART: [kat] SHA2-256
815,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,390 UART: [kat] ++
826,972 UART: [kat] sha1
838,723 UART: [kat] SHA2-256
841,783 UART: [kat] SHA2-384
847,651 UART: [kat] SHA2-512-ACC
850,270 UART: [kat] ECC-384
3,293,153 UART: [kat] HMAC-384Kdf
3,306,868 UART: [kat] LMS
3,838,656 UART: [kat] --
3,844,588 UART: [cold-reset] ++
3,845,992 UART: [fht] FHT @ 0x50003400
3,857,311 UART: [idev] ++
3,858,023 UART: [idev] CDI.KEYID = 6
3,858,918 UART: [idev] SUBJECT.KEYID = 7
3,860,133 UART: [idev] UDS.KEYID = 0
3,863,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,039 UART: [idev] Erasing UDS.KEYID = 0
6,337,019 UART: [idev] Sha1 KeyId Algorithm
6,359,458 UART: [idev] --
6,363,996 UART: [ldev] ++
6,364,684 UART: [ldev] CDI.KEYID = 6
6,365,567 UART: [ldev] SUBJECT.KEYID = 5
6,366,710 UART: [ldev] AUTHORITY.KEYID = 7
6,368,000 UART: [ldev] FE.KEYID = 1
6,378,813 UART: [ldev] Erasing FE.KEYID = 1
8,853,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,196 UART: [ldev] --
10,646,222 UART: [fwproc] Wait for Commands...
10,647,939 UART: [fwproc] Recv command 0x46574c44
10,650,249 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,675 UART: ROM Fatal Error: 0x000B0016
14,097,301 >>> mbox cmd response: failed
14,097,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,098,070 >>> mbox cmd response: failed
14,098,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,098,669 >>> mbox cmd response: failed
Initializing fuses
2,058,183 writing to cptra_bootfsm_go
2,247,473 UART:
2,247,815 UART: Running Caliptra ROM ...
2,248,953 UART:
6,358,156 UART: [state] CFI Enabled
6,371,848 UART: [state] LifecycleState = Unprovisioned
6,374,189 UART: [state] DebugLocked = No
6,375,714 UART: [state] WD Timer not started. Device not locked for debugging
6,380,761 UART: [kat] SHA2-256
6,570,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,581,421 UART: [kat] ++
6,581,938 UART: [kat] sha1
6,593,368 UART: [kat] SHA2-256
6,596,383 UART: [kat] SHA2-384
6,602,050 UART: [kat] SHA2-512-ACC
6,604,672 UART: [kat] ECC-384
9,046,813 UART: [kat] HMAC-384Kdf
9,059,802 UART: [kat] LMS
9,591,640 UART: [kat] --
9,595,669 UART: [cold-reset] ++
9,596,706 UART: [fht] FHT @ 0x50003400
9,608,231 UART: [idev] ++
9,608,914 UART: [idev] CDI.KEYID = 6
9,609,932 UART: [idev] SUBJECT.KEYID = 7
9,611,037 UART: [idev] UDS.KEYID = 0
9,613,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,757,857 UART: [idev] Erasing UDS.KEYID = 0
12,087,664 UART: [idev] Sha1 KeyId Algorithm
12,110,191 UART: [idev] --
12,115,258 UART: [ldev] ++
12,115,934 UART: [ldev] CDI.KEYID = 6
12,116,812 UART: [ldev] SUBJECT.KEYID = 5
12,118,024 UART: [ldev] AUTHORITY.KEYID = 7
12,119,255 UART: [ldev] FE.KEYID = 1
12,130,523 UART: [ldev] Erasing FE.KEYID = 1
14,607,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,327,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,342,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,357,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,372,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,392,175 UART: [ldev] --
16,397,604 UART: [fwproc] Wait for Commands...
16,400,677 UART: [fwproc] Recv command 0x46574c44
16,402,956 UART: [fwproc] Recv'd Img size: 114448 bytes
19,848,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,925,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,041,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,585,523 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,763,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,512,020 >>> mbox cmd response: failed
14,512,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,513,058 >>> mbox cmd response: failed
14,513,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,513,644 >>> mbox cmd response: failed
Initializing fuses
2,050,528 writing to cptra_bootfsm_go
9,108,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,302,679 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,274 UART: [kat] LMS
1,475,470 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,192 UART: [idev] Erasing UDS.KEYID = 0
1,504,880 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,567 UART: [ldev] ++
1,514,735 UART: [ldev] CDI.KEYID = 6
1,515,098 UART: [ldev] SUBJECT.KEYID = 5
1,515,524 UART: [ldev] AUTHORITY.KEYID = 7
1,515,987 UART: [ldev] FE.KEYID = 1
1,521,219 UART: [ldev] Erasing FE.KEYID = 1
1,546,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,842 UART: [ldev] --
1,586,345 UART: [fwproc] Waiting for Commands...
1,586,978 UART: [fwproc] Received command 0x46574c44
1,587,769 UART: [fwproc] Received Image of size 114448 bytes
2,885,018 UART: ROM Fatal Error: 0x000B0016
2,886,175 >>> mbox cmd response: failed
2,886,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,181 >>> mbox cmd response: failed
2,886,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,458 UART: [kat] HMAC-384Kdf
907,044 UART: [kat] LMS
1,475,240 UART: [kat] --
1,475,929 UART: [cold-reset] ++
1,476,309 UART: [fht] Storing FHT @ 0x50003400
1,479,170 UART: [idev] ++
1,479,338 UART: [idev] CDI.KEYID = 6
1,479,698 UART: [idev] SUBJECT.KEYID = 7
1,480,122 UART: [idev] UDS.KEYID = 0
1,480,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,588 UART: [idev] Erasing UDS.KEYID = 0
1,504,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,240 UART: [idev] --
1,514,369 UART: [ldev] ++
1,514,537 UART: [ldev] CDI.KEYID = 6
1,514,900 UART: [ldev] SUBJECT.KEYID = 5
1,515,326 UART: [ldev] AUTHORITY.KEYID = 7
1,515,789 UART: [ldev] FE.KEYID = 1
1,520,861 UART: [ldev] Erasing FE.KEYID = 1
1,546,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,383 UART: [fwproc] Waiting for Commands...
1,586,022 UART: [fwproc] Received command 0x46574c44
1,586,813 UART: [fwproc] Received Image of size 114448 bytes
2,886,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,576 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,736,254 >>> mbox cmd response: failed
2,736,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,260 >>> mbox cmd response: failed
2,736,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,481 UART: [kat] HMAC-384Kdf
908,129 UART: [kat] LMS
1,476,325 UART: [kat] --
1,477,332 UART: [cold-reset] ++
1,477,814 UART: [fht] Storing FHT @ 0x50003400
1,480,629 UART: [idev] ++
1,480,797 UART: [idev] CDI.KEYID = 6
1,481,157 UART: [idev] SUBJECT.KEYID = 7
1,481,581 UART: [idev] UDS.KEYID = 0
1,481,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,391 UART: [idev] Erasing UDS.KEYID = 0
1,506,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,225 UART: [idev] --
1,516,288 UART: [ldev] ++
1,516,456 UART: [ldev] CDI.KEYID = 6
1,516,819 UART: [ldev] SUBJECT.KEYID = 5
1,517,245 UART: [ldev] AUTHORITY.KEYID = 7
1,517,708 UART: [ldev] FE.KEYID = 1
1,522,836 UART: [ldev] Erasing FE.KEYID = 1
1,548,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,965 UART: [ldev] --
1,587,292 UART: [fwproc] Waiting for Commands...
1,588,065 UART: [fwproc] Received command 0x46574c44
1,588,856 UART: [fwproc] Received Image of size 114448 bytes
2,886,449 UART: ROM Fatal Error: 0x000B0016
2,887,606 >>> mbox cmd response: failed
2,887,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,612 >>> mbox cmd response: failed
2,887,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,361 UART: [kat] LMS
1,475,557 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,958 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,543 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,412 UART: [ldev] Erasing FE.KEYID = 1
1,547,921 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,269 UART: [ldev] --
1,587,784 UART: [fwproc] Waiting for Commands...
1,588,505 UART: [fwproc] Received command 0x46574c44
1,589,296 UART: [fwproc] Received Image of size 114448 bytes
2,887,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,207 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,265 >>> mbox cmd response: failed
2,740,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,271 >>> mbox cmd response: failed
2,740,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
86,180 UART: [state] LifecycleState = Unprovisioned
86,835 UART: [state] DebugLocked = No
87,497 UART: [state] WD Timer not started. Device not locked for debugging
88,680 UART: [kat] SHA2-256
894,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,455 UART: [kat] ++
898,607 UART: [kat] sha1
902,881 UART: [kat] SHA2-256
904,821 UART: [kat] SHA2-384
907,694 UART: [kat] SHA2-512-ACC
909,595 UART: [kat] ECC-384
919,400 UART: [kat] HMAC-384Kdf
923,982 UART: [kat] LMS
1,172,310 UART: [kat] --
1,173,319 UART: [cold-reset] ++
1,173,863 UART: [fht] FHT @ 0x50003400
1,176,574 UART: [idev] ++
1,176,742 UART: [idev] CDI.KEYID = 6
1,177,102 UART: [idev] SUBJECT.KEYID = 7
1,177,526 UART: [idev] UDS.KEYID = 0
1,177,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,670 UART: [idev] Erasing UDS.KEYID = 0
1,203,103 UART: [idev] Sha1 KeyId Algorithm
1,211,781 UART: [idev] --
1,212,617 UART: [ldev] ++
1,212,785 UART: [ldev] CDI.KEYID = 6
1,213,148 UART: [ldev] SUBJECT.KEYID = 5
1,213,574 UART: [ldev] AUTHORITY.KEYID = 7
1,214,037 UART: [ldev] FE.KEYID = 1
1,219,345 UART: [ldev] Erasing FE.KEYID = 1
1,246,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,349 UART: [ldev] --
1,285,726 UART: [fwproc] Wait for Commands...
1,286,436 UART: [fwproc] Recv command 0x46574c44
1,287,164 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,917 UART: ROM Fatal Error: 0x000B0016
2,586,074 >>> mbox cmd response: failed
2,586,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,586,080 >>> mbox cmd response: failed
2,586,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,586,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
893,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,329 UART: [kat] ++
897,481 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,328 UART: [kat] SHA2-512-ACC
908,229 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,166 UART: [kat] LMS
1,170,494 UART: [kat] --
1,171,343 UART: [cold-reset] ++
1,171,693 UART: [fht] FHT @ 0x50003400
1,174,312 UART: [idev] ++
1,174,480 UART: [idev] CDI.KEYID = 6
1,174,840 UART: [idev] SUBJECT.KEYID = 7
1,175,264 UART: [idev] UDS.KEYID = 0
1,175,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,223 UART: [idev] Sha1 KeyId Algorithm
1,208,641 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,170 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,214 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,247 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,483 >>> mbox cmd response: failed
2,435,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,489 >>> mbox cmd response: failed
2,435,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,462 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,211 UART: [kat] LMS
1,171,539 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,172,818 UART: [fht] FHT @ 0x50003400
1,175,529 UART: [idev] ++
1,175,697 UART: [idev] CDI.KEYID = 6
1,176,057 UART: [idev] SUBJECT.KEYID = 7
1,176,481 UART: [idev] UDS.KEYID = 0
1,176,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,856 UART: [idev] Sha1 KeyId Algorithm
1,210,262 UART: [idev] --
1,211,346 UART: [ldev] ++
1,211,514 UART: [ldev] CDI.KEYID = 6
1,211,877 UART: [ldev] SUBJECT.KEYID = 5
1,212,303 UART: [ldev] AUTHORITY.KEYID = 7
1,212,766 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,245,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,038 UART: [ldev] --
1,284,309 UART: [fwproc] Wait for Commands...
1,285,011 UART: [fwproc] Recv command 0x46574c44
1,285,739 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,140 UART: ROM Fatal Error: 0x000B0016
2,584,297 >>> mbox cmd response: failed
2,584,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,303 >>> mbox cmd response: failed
2,584,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,079 UART: [kat] HMAC-384Kdf
922,711 UART: [kat] LMS
1,171,039 UART: [kat] --
1,171,756 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,174,871 UART: [idev] ++
1,175,039 UART: [idev] CDI.KEYID = 6
1,175,399 UART: [idev] SUBJECT.KEYID = 7
1,175,823 UART: [idev] UDS.KEYID = 0
1,176,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,118 UART: [idev] Sha1 KeyId Algorithm
1,209,764 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,243,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,349 UART: [fwproc] Wait for Commands...
1,284,119 UART: [fwproc] Recv command 0x46574c44
1,284,847 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,708 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,439,494 >>> mbox cmd response: failed
2,439,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,500 >>> mbox cmd response: failed
2,439,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,243 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,917 UART: [idev] Erasing UDS.KEYID = 0
1,198,157 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,208,006 UART: [ldev] ++
1,208,174 UART: [ldev] CDI.KEYID = 6
1,208,538 UART: [ldev] SUBJECT.KEYID = 5
1,208,965 UART: [ldev] AUTHORITY.KEYID = 7
1,209,428 UART: [ldev] FE.KEYID = 1
1,214,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,088 UART: [ldev] --
1,280,458 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,327 UART: ROM Fatal Error: 0x000B0016
2,581,484 >>> mbox cmd response: failed
2,581,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,490 >>> mbox cmd response: failed
2,581,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,070 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,997 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,717 >>> mbox cmd response: failed
2,432,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,723 >>> mbox cmd response: failed
2,432,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,857 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,234 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,698 UART: ROM Fatal Error: 0x000B0016
2,581,855 >>> mbox cmd response: failed
2,581,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,861 >>> mbox cmd response: failed
2,581,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,230 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,203 UART: [ldev] --
1,282,543 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,358 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,622 >>> mbox cmd response: failed
2,433,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,628 >>> mbox cmd response: failed
2,433,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,724 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,150 UART:
192,536 UART: Running Caliptra ROM ...
193,646 UART:
193,788 UART: [state] CFI Enabled
260,746 UART: [state] LifecycleState = Unprovisioned
262,705 UART: [state] DebugLocked = No
265,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,205 UART: [kat] SHA2-256
440,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,425 UART: [kat] ++
451,909 UART: [kat] sha1
462,409 UART: [kat] SHA2-256
465,100 UART: [kat] SHA2-384
470,932 UART: [kat] SHA2-512-ACC
473,328 UART: [kat] ECC-384
2,765,176 UART: [kat] HMAC-384Kdf
2,776,674 UART: [kat] LMS
3,967,004 UART: [kat] --
3,971,766 UART: [cold-reset] ++
3,973,811 UART: [fht] Storing FHT @ 0x50003400
3,985,775 UART: [idev] ++
3,986,341 UART: [idev] CDI.KEYID = 6
3,987,308 UART: [idev] SUBJECT.KEYID = 7
3,988,522 UART: [idev] UDS.KEYID = 0
3,991,054 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,241 UART: [idev] Erasing UDS.KEYID = 0
7,325,670 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,429 UART: [idev] --
7,350,719 UART: [ldev] ++
7,351,309 UART: [ldev] CDI.KEYID = 6
7,352,272 UART: [ldev] SUBJECT.KEYID = 5
7,353,501 UART: [ldev] AUTHORITY.KEYID = 7
7,354,740 UART: [ldev] FE.KEYID = 1
7,401,319 UART: [ldev] Erasing FE.KEYID = 1
10,735,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,666 UART: [ldev] --
13,116,281 UART: [fwproc] Waiting for Commands...
13,118,053 UART: [fwproc] Received command 0x46574c44
13,120,242 UART: [fwproc] Received Image of size 114124 bytes
17,165,531 UART: ROM Fatal Error: 0x000B002A
17,168,924 >>> mbox cmd response: failed
17,169,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,169,637 >>> mbox cmd response: failed
17,169,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,170,248 >>> mbox cmd response: failed
Initializing fuses
2,056,548 writing to cptra_bootfsm_go
2,245,823 UART:
2,246,170 UART: Running Caliptra ROM ...
2,247,250 UART:
2,247,407 UART: [state] CFI Enabled
2,312,772 UART: [state] LifecycleState = Unprovisioned
2,314,710 UART: [state] DebugLocked = No
2,317,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,353 UART: [kat] SHA2-256
2,492,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,576 UART: [kat] ++
2,503,062 UART: [kat] sha1
2,513,730 UART: [kat] SHA2-256
2,516,447 UART: [kat] SHA2-384
2,522,269 UART: [kat] SHA2-512-ACC
2,524,625 UART: [kat] ECC-384
4,812,683 UART: [kat] HMAC-384Kdf
4,825,090 UART: [kat] LMS
6,015,389 UART: [kat] --
6,020,824 UART: [cold-reset] ++
6,021,960 UART: [fht] Storing FHT @ 0x50003400
6,032,691 UART: [idev] ++
6,033,261 UART: [idev] CDI.KEYID = 6
6,034,170 UART: [idev] SUBJECT.KEYID = 7
6,035,577 UART: [idev] UDS.KEYID = 0
6,037,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,181,341 UART: [idev] Erasing UDS.KEYID = 0
9,367,844 UART: [idev] Using Sha1 for KeyId Algorithm
9,390,632 UART: [idev] --
9,394,403 UART: [ldev] ++
9,395,184 UART: [ldev] CDI.KEYID = 6
9,396,129 UART: [ldev] SUBJECT.KEYID = 5
9,397,340 UART: [ldev] AUTHORITY.KEYID = 7
9,398,526 UART: [ldev] FE.KEYID = 1
9,424,894 UART: [ldev] Erasing FE.KEYID = 1
12,758,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,051,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,065,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,080,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,094,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,113,628 UART: [ldev] --
15,118,534 UART: [fwproc] Waiting for Commands...
15,120,476 UART: [fwproc] Received command 0x46574c44
15,122,666 UART: [fwproc] Received Image of size 114124 bytes
19,173,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,248,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,317,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,634,705 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,785,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,145,540 >>> mbox cmd response: failed
17,146,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,378 >>> mbox cmd response: failed
17,146,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,947 >>> mbox cmd response: failed
Initializing fuses
2,055,499 writing to cptra_bootfsm_go
5,837,067 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,920,333 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,538 UART:
192,889 UART: Running Caliptra ROM ...
194,072 UART:
603,877 UART: [state] CFI Enabled
618,344 UART: [state] LifecycleState = Unprovisioned
620,277 UART: [state] DebugLocked = No
623,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,892 UART: [kat] SHA2-256
797,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,155 UART: [kat] ++
808,645 UART: [kat] sha1
820,069 UART: [kat] SHA2-256
822,755 UART: [kat] SHA2-384
828,247 UART: [kat] SHA2-512-ACC
830,589 UART: [kat] ECC-384
3,116,119 UART: [kat] HMAC-384Kdf
3,128,734 UART: [kat] LMS
4,318,854 UART: [kat] --
4,324,378 UART: [cold-reset] ++
4,326,709 UART: [fht] Storing FHT @ 0x50003400
4,336,900 UART: [idev] ++
4,337,463 UART: [idev] CDI.KEYID = 6
4,338,426 UART: [idev] SUBJECT.KEYID = 7
4,339,640 UART: [idev] UDS.KEYID = 0
4,342,142 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,654 UART: [idev] Erasing UDS.KEYID = 0
7,628,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,043 UART: [idev] --
7,653,889 UART: [ldev] ++
7,654,471 UART: [ldev] CDI.KEYID = 6
7,655,357 UART: [ldev] SUBJECT.KEYID = 5
7,656,630 UART: [ldev] AUTHORITY.KEYID = 7
7,657,864 UART: [ldev] FE.KEYID = 1
7,671,049 UART: [ldev] Erasing FE.KEYID = 1
10,959,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,652 UART: [ldev] --
13,320,995 UART: [fwproc] Waiting for Commands...
13,322,718 UART: [fwproc] Received command 0x46574c44
13,324,845 UART: [fwproc] Received Image of size 114124 bytes
17,376,941 UART: ROM Fatal Error: 0x000B002A
17,380,361 >>> mbox cmd response: failed
17,380,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,381,018 >>> mbox cmd response: failed
17,381,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,381,704 >>> mbox cmd response: failed
Initializing fuses
2,062,844 writing to cptra_bootfsm_go
2,252,150 UART:
2,252,522 UART: Running Caliptra ROM ...
2,253,573 UART:
3,078,204 UART: [state] CFI Enabled
3,089,735 UART: [state] LifecycleState = Unprovisioned
3,091,643 UART: [state] DebugLocked = No
3,093,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,097,588 UART: [kat] SHA2-256
3,267,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,277,893 UART: [kat] ++
3,278,436 UART: [kat] sha1
3,289,545 UART: [kat] SHA2-256
3,292,248 UART: [kat] SHA2-384
3,297,917 UART: [kat] SHA2-512-ACC
3,300,401 UART: [kat] ECC-384
5,584,465 UART: [kat] HMAC-384Kdf
5,596,323 UART: [kat] LMS
6,786,458 UART: [kat] --
6,791,627 UART: [cold-reset] ++
6,793,838 UART: [fht] Storing FHT @ 0x50003400
6,805,864 UART: [idev] ++
6,806,430 UART: [idev] CDI.KEYID = 6
6,807,448 UART: [idev] SUBJECT.KEYID = 7
6,808,609 UART: [idev] UDS.KEYID = 0
6,811,122 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,954,574 UART: [idev] Erasing UDS.KEYID = 0
10,095,680 UART: [idev] Using Sha1 for KeyId Algorithm
10,117,821 UART: [idev] --
10,121,952 UART: [ldev] ++
10,122,588 UART: [ldev] CDI.KEYID = 6
10,123,492 UART: [ldev] SUBJECT.KEYID = 5
10,124,746 UART: [ldev] AUTHORITY.KEYID = 7
10,125,988 UART: [ldev] FE.KEYID = 1
10,138,046 UART: [ldev] Erasing FE.KEYID = 1
13,426,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,719,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,734,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,749,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,763,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,782,756 UART: [ldev] --
15,787,365 UART: [fwproc] Waiting for Commands...
15,790,230 UART: [fwproc] Received command 0x46574c44
15,792,421 UART: [fwproc] Received Image of size 114124 bytes
19,841,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,916,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,985,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,302,388 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,129,994 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,336,339 >>> mbox cmd response: failed
17,336,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,337,252 >>> mbox cmd response: failed
17,337,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,337,839 >>> mbox cmd response: failed
Initializing fuses
2,062,776 writing to cptra_bootfsm_go
6,661,549 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,605,931 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,148 UART:
192,518 UART: Running Caliptra ROM ...
193,634 UART:
193,779 UART: [state] CFI Enabled
261,393 UART: [state] LifecycleState = Unprovisioned
263,303 UART: [state] DebugLocked = No
266,059 UART: [state] WD Timer not started. Device not locked for debugging
270,372 UART: [kat] SHA2-256
449,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,098 UART: [kat] ++
461,553 UART: [kat] sha1
471,942 UART: [kat] SHA2-256
474,954 UART: [kat] SHA2-384
480,501 UART: [kat] SHA2-512-ACC
483,493 UART: [kat] ECC-384
2,945,628 UART: [kat] HMAC-384Kdf
2,969,882 UART: [kat] LMS
3,499,302 UART: [kat] --
3,503,911 UART: [cold-reset] ++
3,504,979 UART: [fht] FHT @ 0x50003400
3,516,713 UART: [idev] ++
3,517,275 UART: [idev] CDI.KEYID = 6
3,518,243 UART: [idev] SUBJECT.KEYID = 7
3,519,343 UART: [idev] UDS.KEYID = 0
3,522,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,738 UART: [idev] Erasing UDS.KEYID = 0
6,024,617 UART: [idev] Sha1 KeyId Algorithm
6,048,063 UART: [idev] --
6,052,602 UART: [ldev] ++
6,053,178 UART: [ldev] CDI.KEYID = 6
6,054,091 UART: [ldev] SUBJECT.KEYID = 5
6,055,254 UART: [ldev] AUTHORITY.KEYID = 7
6,056,564 UART: [ldev] FE.KEYID = 1
6,098,773 UART: [ldev] Erasing FE.KEYID = 1
8,598,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,961 UART: [ldev] --
10,392,065 UART: [fwproc] Wait for Commands...
10,394,706 UART: [fwproc] Recv command 0x46574c44
10,396,803 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,289 UART: ROM Fatal Error: 0x000B002A
13,802,425 >>> mbox cmd response: failed
13,802,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,202 >>> mbox cmd response: failed
13,803,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,779 >>> mbox cmd response: failed
Initializing fuses
2,053,851 writing to cptra_bootfsm_go
2,243,189 UART:
2,243,556 UART: Running Caliptra ROM ...
2,244,693 UART:
2,244,858 UART: [state] CFI Enabled
2,306,984 UART: [state] LifecycleState = Unprovisioned
2,308,818 UART: [state] DebugLocked = No
2,310,590 UART: [state] WD Timer not started. Device not locked for debugging
2,313,960 UART: [kat] SHA2-256
2,493,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,646 UART: [kat] ++
2,505,187 UART: [kat] sha1
2,516,371 UART: [kat] SHA2-256
2,519,393 UART: [kat] SHA2-384
2,524,244 UART: [kat] SHA2-512-ACC
2,527,221 UART: [kat] ECC-384
4,992,100 UART: [kat] HMAC-384Kdf
5,015,618 UART: [kat] LMS
5,545,092 UART: [kat] --
5,548,542 UART: [cold-reset] ++
5,550,040 UART: [fht] FHT @ 0x50003400
5,560,978 UART: [idev] ++
5,561,550 UART: [idev] CDI.KEYID = 6
5,562,489 UART: [idev] SUBJECT.KEYID = 7
5,563,701 UART: [idev] UDS.KEYID = 0
5,566,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,983 UART: [idev] Erasing UDS.KEYID = 0
8,071,667 UART: [idev] Sha1 KeyId Algorithm
8,094,758 UART: [idev] --
8,099,131 UART: [ldev] ++
8,099,703 UART: [ldev] CDI.KEYID = 6
8,100,587 UART: [ldev] SUBJECT.KEYID = 5
8,101,799 UART: [ldev] AUTHORITY.KEYID = 7
8,103,035 UART: [ldev] FE.KEYID = 1
8,144,825 UART: [ldev] Erasing FE.KEYID = 1
10,649,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,514 UART: [ldev] --
12,455,248 UART: [fwproc] Wait for Commands...
12,458,002 UART: [fwproc] Recv command 0x46574c44
12,460,049 UART: [fwproc] Recv'd Img size: 114448 bytes
15,858,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,926,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,994,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,313,604 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,384,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,610,995 >>> mbox cmd response: failed
13,611,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,611,913 >>> mbox cmd response: failed
13,612,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,612,464 >>> mbox cmd response: failed
Initializing fuses
2,054,279 writing to cptra_bootfsm_go
5,411,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,107,515 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,718 UART:
193,071 UART: Running Caliptra ROM ...
194,268 UART:
604,004 UART: [state] CFI Enabled
617,499 UART: [state] LifecycleState = Unprovisioned
619,363 UART: [state] DebugLocked = No
621,367 UART: [state] WD Timer not started. Device not locked for debugging
624,599 UART: [kat] SHA2-256
803,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,301 UART: [kat] ++
815,746 UART: [kat] sha1
827,481 UART: [kat] SHA2-256
830,545 UART: [kat] SHA2-384
835,006 UART: [kat] SHA2-512-ACC
837,961 UART: [kat] ECC-384
3,279,615 UART: [kat] HMAC-384Kdf
3,291,128 UART: [kat] LMS
3,820,648 UART: [kat] --
3,824,661 UART: [cold-reset] ++
3,825,625 UART: [fht] FHT @ 0x50003400
3,835,415 UART: [idev] ++
3,835,982 UART: [idev] CDI.KEYID = 6
3,836,905 UART: [idev] SUBJECT.KEYID = 7
3,838,121 UART: [idev] UDS.KEYID = 0
3,841,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,222 UART: [idev] Erasing UDS.KEYID = 0
6,313,925 UART: [idev] Sha1 KeyId Algorithm
6,337,539 UART: [idev] --
6,340,611 UART: [ldev] ++
6,341,184 UART: [ldev] CDI.KEYID = 6
6,342,114 UART: [ldev] SUBJECT.KEYID = 5
6,343,280 UART: [ldev] AUTHORITY.KEYID = 7
6,344,514 UART: [ldev] FE.KEYID = 1
6,355,753 UART: [ldev] Erasing FE.KEYID = 1
8,831,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,686 UART: [ldev] --
10,623,072 UART: [fwproc] Wait for Commands...
10,625,773 UART: [fwproc] Recv command 0x46574c44
10,627,818 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,107 UART: ROM Fatal Error: 0x000B002A
14,031,184 >>> mbox cmd response: failed
14,031,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,031,973 >>> mbox cmd response: failed
14,032,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,032,545 >>> mbox cmd response: failed
Initializing fuses
2,053,335 writing to cptra_bootfsm_go
2,242,653 UART:
2,242,998 UART: Running Caliptra ROM ...
2,244,140 UART:
6,418,687 UART: [state] CFI Enabled
6,427,340 UART: [state] LifecycleState = Unprovisioned
6,429,195 UART: [state] DebugLocked = No
6,430,635 UART: [state] WD Timer not started. Device not locked for debugging
6,433,517 UART: [kat] SHA2-256
6,612,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,624,200 UART: [kat] ++
6,624,754 UART: [kat] sha1
6,635,657 UART: [kat] SHA2-256
6,638,680 UART: [kat] SHA2-384
6,645,584 UART: [kat] SHA2-512-ACC
6,648,531 UART: [kat] ECC-384
9,090,584 UART: [kat] HMAC-384Kdf
9,103,250 UART: [kat] LMS
9,632,752 UART: [kat] --
9,636,326 UART: [cold-reset] ++
9,637,830 UART: [fht] FHT @ 0x50003400
9,648,544 UART: [idev] ++
9,649,116 UART: [idev] CDI.KEYID = 6
9,650,136 UART: [idev] SUBJECT.KEYID = 7
9,651,166 UART: [idev] UDS.KEYID = 0
9,653,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,797,379 UART: [idev] Erasing UDS.KEYID = 0
12,126,827 UART: [idev] Sha1 KeyId Algorithm
12,148,700 UART: [idev] --
12,152,904 UART: [ldev] ++
12,153,474 UART: [ldev] CDI.KEYID = 6
12,154,381 UART: [ldev] SUBJECT.KEYID = 5
12,155,540 UART: [ldev] AUTHORITY.KEYID = 7
12,156,774 UART: [ldev] FE.KEYID = 1
12,167,930 UART: [ldev] Erasing FE.KEYID = 1
14,643,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,361,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,377,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,393,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,409,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,428,860 UART: [ldev] --
16,433,433 UART: [fwproc] Wait for Commands...
16,435,927 UART: [fwproc] Recv command 0x46574c44
16,437,973 UART: [fwproc] Recv'd Img size: 114448 bytes
19,835,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,912,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,980,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,298,382 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,699,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,819,046 >>> mbox cmd response: failed
13,819,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,972 >>> mbox cmd response: failed
13,820,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,480 >>> mbox cmd response: failed
Initializing fuses
2,053,475 writing to cptra_bootfsm_go
9,738,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,309,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,225 UART:
192,580 UART: Running Caliptra ROM ...
193,731 UART:
193,895 UART: [state] CFI Enabled
260,417 UART: [state] LifecycleState = Unprovisioned
262,849 UART: [state] DebugLocked = No
264,240 UART: [state] WD Timer not started. Device not locked for debugging
269,571 UART: [kat] SHA2-256
459,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,213 UART: [kat] ++
470,693 UART: [kat] sha1
482,385 UART: [kat] SHA2-256
485,400 UART: [kat] SHA2-384
489,923 UART: [kat] SHA2-512-ACC
492,534 UART: [kat] ECC-384
2,947,742 UART: [kat] HMAC-384Kdf
2,971,324 UART: [kat] LMS
3,503,058 UART: [kat] --
3,507,589 UART: [cold-reset] ++
3,509,053 UART: [fht] FHT @ 0x50003400
3,521,397 UART: [idev] ++
3,522,076 UART: [idev] CDI.KEYID = 6
3,522,999 UART: [idev] SUBJECT.KEYID = 7
3,524,216 UART: [idev] UDS.KEYID = 0
3,527,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,453 UART: [idev] Erasing UDS.KEYID = 0
6,028,636 UART: [idev] Sha1 KeyId Algorithm
6,050,977 UART: [idev] --
6,057,300 UART: [ldev] ++
6,057,986 UART: [ldev] CDI.KEYID = 6
6,058,902 UART: [ldev] SUBJECT.KEYID = 5
6,060,073 UART: [ldev] AUTHORITY.KEYID = 7
6,061,309 UART: [ldev] FE.KEYID = 1
6,099,252 UART: [ldev] Erasing FE.KEYID = 1
8,608,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,335 UART: [ldev] --
10,411,650 UART: [fwproc] Wait for Commands...
10,413,207 UART: [fwproc] Recv command 0x46574c44
10,415,512 UART: [fwproc] Recv'd Img size: 114448 bytes
13,862,001 UART: ROM Fatal Error: 0x000B002A
13,865,681 >>> mbox cmd response: failed
13,866,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,435 >>> mbox cmd response: failed
13,866,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,994 >>> mbox cmd response: failed
Initializing fuses
2,056,122 writing to cptra_bootfsm_go
2,245,482 UART:
2,245,851 UART: Running Caliptra ROM ...
2,246,903 UART:
2,247,053 UART: [state] CFI Enabled
2,310,107 UART: [state] LifecycleState = Unprovisioned
2,312,535 UART: [state] DebugLocked = No
2,314,221 UART: [state] WD Timer not started. Device not locked for debugging
2,318,031 UART: [kat] SHA2-256
2,507,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,678 UART: [kat] ++
2,519,132 UART: [kat] sha1
2,529,915 UART: [kat] SHA2-256
2,532,928 UART: [kat] SHA2-384
2,539,514 UART: [kat] SHA2-512-ACC
2,542,101 UART: [kat] ECC-384
4,993,911 UART: [kat] HMAC-384Kdf
5,017,498 UART: [kat] LMS
5,549,252 UART: [kat] --
5,554,886 UART: [cold-reset] ++
5,556,118 UART: [fht] FHT @ 0x50003400
5,567,643 UART: [idev] ++
5,568,317 UART: [idev] CDI.KEYID = 6
5,569,252 UART: [idev] SUBJECT.KEYID = 7
5,570,521 UART: [idev] UDS.KEYID = 0
5,572,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,716,815 UART: [idev] Erasing UDS.KEYID = 0
8,070,865 UART: [idev] Sha1 KeyId Algorithm
8,092,912 UART: [idev] --
8,096,962 UART: [ldev] ++
8,097,652 UART: [ldev] CDI.KEYID = 6
8,098,559 UART: [ldev] SUBJECT.KEYID = 5
8,099,774 UART: [ldev] AUTHORITY.KEYID = 7
8,101,072 UART: [ldev] FE.KEYID = 1
8,145,840 UART: [ldev] Erasing FE.KEYID = 1
10,654,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,656 UART: [ldev] --
12,459,457 UART: [fwproc] Wait for Commands...
12,461,985 UART: [fwproc] Recv command 0x46574c44
12,464,298 UART: [fwproc] Recv'd Img size: 114448 bytes
15,906,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,982,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,098,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,641,349 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,440,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,259 >>> mbox cmd response: failed
14,271,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,272,189 >>> mbox cmd response: failed
14,272,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,272,745 >>> mbox cmd response: failed
Initializing fuses
2,059,366 writing to cptra_bootfsm_go
5,502,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,780,344 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,546 UART:
192,912 UART: Running Caliptra ROM ...
194,017 UART:
603,849 UART: [state] CFI Enabled
615,079 UART: [state] LifecycleState = Unprovisioned
617,457 UART: [state] DebugLocked = No
619,213 UART: [state] WD Timer not started. Device not locked for debugging
623,510 UART: [kat] SHA2-256
813,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,195 UART: [kat] ++
824,733 UART: [kat] sha1
835,668 UART: [kat] SHA2-256
838,682 UART: [kat] SHA2-384
844,442 UART: [kat] SHA2-512-ACC
847,052 UART: [kat] ECC-384
3,289,699 UART: [kat] HMAC-384Kdf
3,303,026 UART: [kat] LMS
3,834,838 UART: [kat] --
3,837,597 UART: [cold-reset] ++
3,839,474 UART: [fht] FHT @ 0x50003400
3,852,675 UART: [idev] ++
3,853,361 UART: [idev] CDI.KEYID = 6
3,854,328 UART: [idev] SUBJECT.KEYID = 7
3,855,490 UART: [idev] UDS.KEYID = 0
3,858,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,724 UART: [idev] Erasing UDS.KEYID = 0
6,334,867 UART: [idev] Sha1 KeyId Algorithm
6,357,609 UART: [idev] --
6,362,631 UART: [ldev] ++
6,363,313 UART: [ldev] CDI.KEYID = 6
6,364,224 UART: [ldev] SUBJECT.KEYID = 5
6,365,383 UART: [ldev] AUTHORITY.KEYID = 7
6,366,614 UART: [ldev] FE.KEYID = 1
6,377,606 UART: [ldev] Erasing FE.KEYID = 1
8,854,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,164 UART: [ldev] --
10,645,941 UART: [fwproc] Wait for Commands...
10,647,725 UART: [fwproc] Recv command 0x46574c44
10,649,988 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,166 UART: ROM Fatal Error: 0x000B002A
14,095,834 >>> mbox cmd response: failed
14,096,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,096,565 >>> mbox cmd response: failed
14,096,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,097,124 >>> mbox cmd response: failed
Initializing fuses
2,060,062 writing to cptra_bootfsm_go
2,249,364 UART:
2,249,703 UART: Running Caliptra ROM ...
2,250,789 UART:
6,347,149 UART: [state] CFI Enabled
6,360,341 UART: [state] LifecycleState = Unprovisioned
6,362,765 UART: [state] DebugLocked = No
6,364,111 UART: [state] WD Timer not started. Device not locked for debugging
6,368,618 UART: [kat] SHA2-256
6,558,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,569,292 UART: [kat] ++
6,569,785 UART: [kat] sha1
6,581,113 UART: [kat] SHA2-256
6,584,150 UART: [kat] SHA2-384
6,589,498 UART: [kat] SHA2-512-ACC
6,592,066 UART: [kat] ECC-384
9,032,275 UART: [kat] HMAC-384Kdf
9,045,588 UART: [kat] LMS
9,577,384 UART: [kat] --
9,580,306 UART: [cold-reset] ++
9,582,242 UART: [fht] FHT @ 0x50003400
9,593,164 UART: [idev] ++
9,593,852 UART: [idev] CDI.KEYID = 6
9,594,872 UART: [idev] SUBJECT.KEYID = 7
9,595,976 UART: [idev] UDS.KEYID = 0
9,598,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,742,065 UART: [idev] Erasing UDS.KEYID = 0
12,074,096 UART: [idev] Sha1 KeyId Algorithm
12,097,667 UART: [idev] --
12,102,172 UART: [ldev] ++
12,102,852 UART: [ldev] CDI.KEYID = 6
12,103,758 UART: [ldev] SUBJECT.KEYID = 5
12,104,970 UART: [ldev] AUTHORITY.KEYID = 7
12,106,200 UART: [ldev] FE.KEYID = 1
12,116,576 UART: [ldev] Erasing FE.KEYID = 1
14,595,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,317,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,332,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,347,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,362,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,382,794 UART: [ldev] --
16,387,901 UART: [fwproc] Wait for Commands...
16,390,928 UART: [fwproc] Recv command 0x46574c44
16,393,241 UART: [fwproc] Recv'd Img size: 114448 bytes
19,847,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,927,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,043,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,587,311 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,759,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,497,295 >>> mbox cmd response: failed
14,497,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,259 >>> mbox cmd response: failed
14,498,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,844 >>> mbox cmd response: failed
Initializing fuses
2,063,249 writing to cptra_bootfsm_go
9,118,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,323,576 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,832 UART: [kat] SHA2-512-ACC
896,733 UART: [kat] ECC-384
902,168 UART: [kat] HMAC-384Kdf
906,536 UART: [kat] LMS
1,474,732 UART: [kat] --
1,475,769 UART: [cold-reset] ++
1,476,201 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,066 UART: [idev] Erasing UDS.KEYID = 0
1,504,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,514,147 UART: [ldev] ++
1,514,315 UART: [ldev] CDI.KEYID = 6
1,514,678 UART: [ldev] SUBJECT.KEYID = 5
1,515,104 UART: [ldev] AUTHORITY.KEYID = 7
1,515,567 UART: [ldev] FE.KEYID = 1
1,520,789 UART: [ldev] Erasing FE.KEYID = 1
1,545,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,794 UART: [ldev] --
1,585,175 UART: [fwproc] Waiting for Commands...
1,586,040 UART: [fwproc] Received command 0x46574c44
1,586,831 UART: [fwproc] Received Image of size 114448 bytes
2,885,883 UART: ROM Fatal Error: 0x000B002A
2,887,042 >>> mbox cmd response: failed
2,887,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,048 >>> mbox cmd response: failed
2,887,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,665 UART: [kat] SHA2-256
892,603 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,270 UART: [kat] LMS
1,475,466 UART: [kat] --
1,476,493 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,424 UART: [idev] Erasing UDS.KEYID = 0
1,504,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,160 UART: [idev] --
1,514,213 UART: [ldev] ++
1,514,381 UART: [ldev] CDI.KEYID = 6
1,514,744 UART: [ldev] SUBJECT.KEYID = 5
1,515,170 UART: [ldev] AUTHORITY.KEYID = 7
1,515,633 UART: [ldev] FE.KEYID = 1
1,520,819 UART: [ldev] Erasing FE.KEYID = 1
1,546,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,552 UART: [ldev] --
1,584,913 UART: [fwproc] Waiting for Commands...
1,585,696 UART: [fwproc] Received command 0x46574c44
1,586,487 UART: [fwproc] Received Image of size 114448 bytes
2,884,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,111 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,408 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,709 >>> mbox cmd response: failed
2,739,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,715 >>> mbox cmd response: failed
2,739,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,070 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,610 UART: [kat] SHA2-256
882,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,656 UART: [kat] ++
886,808 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,783 UART: [kat] SHA2-512-ACC
897,684 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,946 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,623 UART: [idev] Erasing UDS.KEYID = 0
1,506,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,067 UART: [idev] --
1,516,204 UART: [ldev] ++
1,516,372 UART: [ldev] CDI.KEYID = 6
1,516,735 UART: [ldev] SUBJECT.KEYID = 5
1,517,161 UART: [ldev] AUTHORITY.KEYID = 7
1,517,624 UART: [ldev] FE.KEYID = 1
1,522,760 UART: [ldev] Erasing FE.KEYID = 1
1,548,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,687 UART: [ldev] --
1,588,050 UART: [fwproc] Waiting for Commands...
1,588,911 UART: [fwproc] Received command 0x46574c44
1,589,702 UART: [fwproc] Received Image of size 114448 bytes
2,888,286 UART: ROM Fatal Error: 0x000B002A
2,889,445 >>> mbox cmd response: failed
2,889,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,451 >>> mbox cmd response: failed
2,889,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,355 UART: [kat] LMS
1,475,551 UART: [kat] --
1,476,404 UART: [cold-reset] ++
1,476,860 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,463 UART: [idev] Erasing UDS.KEYID = 0
1,505,243 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,711 UART: [idev] --
1,514,624 UART: [ldev] ++
1,514,792 UART: [ldev] CDI.KEYID = 6
1,515,155 UART: [ldev] SUBJECT.KEYID = 5
1,515,581 UART: [ldev] AUTHORITY.KEYID = 7
1,516,044 UART: [ldev] FE.KEYID = 1
1,521,474 UART: [ldev] Erasing FE.KEYID = 1
1,547,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,293 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,231 UART: [fwproc] Received command 0x46574c44
1,588,022 UART: [fwproc] Received Image of size 114448 bytes
2,886,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,568 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,959 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,741,232 >>> mbox cmd response: failed
2,741,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,238 >>> mbox cmd response: failed
2,741,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,395 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
892,898 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,023 UART: [kat] ++
897,175 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,201,131 UART: [idev] Sha1 KeyId Algorithm
1,209,837 UART: [idev] --
1,210,783 UART: [ldev] ++
1,210,951 UART: [ldev] CDI.KEYID = 6
1,211,314 UART: [ldev] SUBJECT.KEYID = 5
1,211,740 UART: [ldev] AUTHORITY.KEYID = 7
1,212,203 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,244,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,097 UART: [ldev] --
1,283,556 UART: [fwproc] Wait for Commands...
1,284,322 UART: [fwproc] Recv command 0x46574c44
1,285,050 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,328 UART: ROM Fatal Error: 0x000B002A
2,584,487 >>> mbox cmd response: failed
2,584,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,493 >>> mbox cmd response: failed
2,584,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
922,766 UART: [kat] LMS
1,171,094 UART: [kat] --
1,171,869 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,201,021 UART: [idev] Sha1 KeyId Algorithm
1,209,577 UART: [idev] --
1,210,495 UART: [ldev] ++
1,210,663 UART: [ldev] CDI.KEYID = 6
1,211,026 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,551 UART: [ldev] --
1,282,868 UART: [fwproc] Wait for Commands...
1,283,686 UART: [fwproc] Recv command 0x46574c44
1,284,414 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,579 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,486 >>> mbox cmd response: failed
2,436,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,492 >>> mbox cmd response: failed
2,436,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,376 UART: [kat] SHA2-256
904,316 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,833 UART: [kat] LMS
1,171,161 UART: [kat] --
1,171,852 UART: [cold-reset] ++
1,172,304 UART: [fht] FHT @ 0x50003400
1,175,103 UART: [idev] ++
1,175,271 UART: [idev] CDI.KEYID = 6
1,175,631 UART: [idev] SUBJECT.KEYID = 7
1,176,055 UART: [idev] UDS.KEYID = 0
1,176,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,833 UART: [idev] Erasing UDS.KEYID = 0
1,200,978 UART: [idev] Sha1 KeyId Algorithm
1,209,412 UART: [idev] --
1,210,474 UART: [ldev] ++
1,210,642 UART: [ldev] CDI.KEYID = 6
1,211,005 UART: [ldev] SUBJECT.KEYID = 5
1,211,431 UART: [ldev] AUTHORITY.KEYID = 7
1,211,894 UART: [ldev] FE.KEYID = 1
1,217,164 UART: [ldev] Erasing FE.KEYID = 1
1,243,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,202 UART: [ldev] --
1,282,529 UART: [fwproc] Wait for Commands...
1,283,265 UART: [fwproc] Recv command 0x46574c44
1,283,993 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,189 UART: ROM Fatal Error: 0x000B002A
2,583,348 >>> mbox cmd response: failed
2,583,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,354 >>> mbox cmd response: failed
2,583,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
907,069 UART: [kat] SHA2-512-ACC
908,970 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,290 UART: [cold-reset] ++
1,172,810 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,919 UART: [idev] Erasing UDS.KEYID = 0
1,200,940 UART: [idev] Sha1 KeyId Algorithm
1,209,414 UART: [idev] --
1,210,530 UART: [ldev] ++
1,210,698 UART: [ldev] CDI.KEYID = 6
1,211,061 UART: [ldev] SUBJECT.KEYID = 5
1,211,487 UART: [ldev] AUTHORITY.KEYID = 7
1,211,950 UART: [ldev] FE.KEYID = 1
1,217,178 UART: [ldev] Erasing FE.KEYID = 1
1,243,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,476 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,593 UART: [fwproc] Recv command 0x46574c44
1,284,321 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,108 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,955 >>> mbox cmd response: failed
2,436,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,961 >>> mbox cmd response: failed
2,436,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,115 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,210 UART: [fwproc] Wait for Commands...
1,282,031 UART: [fwproc] Recv command 0x46574c44
1,282,764 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,778 UART: ROM Fatal Error: 0x000B002A
2,582,937 >>> mbox cmd response: failed
2,582,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,943 >>> mbox cmd response: failed
2,582,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,345 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,174,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,393 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,216,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,039 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,032 >>> mbox cmd response: failed
2,434,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,038 >>> mbox cmd response: failed
2,434,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,453 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,174,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,422 UART: [idev] --
1,209,589 UART: [ldev] ++
1,209,757 UART: [ldev] CDI.KEYID = 6
1,210,121 UART: [ldev] SUBJECT.KEYID = 5
1,210,548 UART: [ldev] AUTHORITY.KEYID = 7
1,211,011 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,289 UART: ROM Fatal Error: 0x000B002A
2,582,448 >>> mbox cmd response: failed
2,582,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,454 >>> mbox cmd response: failed
2,582,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,182 UART: [idev] Sha1 KeyId Algorithm
1,208,970 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,209 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,370 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,847 >>> mbox cmd response: failed
2,434,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,853 >>> mbox cmd response: failed
2,434,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,104 UART:
192,475 UART: Running Caliptra ROM ...
193,576 UART:
193,717 UART: [state] CFI Enabled
260,936 UART: [state] LifecycleState = Unprovisioned
262,889 UART: [state] DebugLocked = No
264,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,233 UART: [kat] SHA2-256
439,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,428 UART: [kat] ++
450,879 UART: [kat] sha1
462,585 UART: [kat] SHA2-256
465,272 UART: [kat] SHA2-384
470,612 UART: [kat] SHA2-512-ACC
473,006 UART: [kat] ECC-384
2,765,498 UART: [kat] HMAC-384Kdf
2,797,821 UART: [kat] LMS
3,988,129 UART: [kat] --
3,993,106 UART: [cold-reset] ++
3,994,607 UART: [fht] Storing FHT @ 0x50003400
4,006,200 UART: [idev] ++
4,006,765 UART: [idev] CDI.KEYID = 6
4,007,705 UART: [idev] SUBJECT.KEYID = 7
4,008,921 UART: [idev] UDS.KEYID = 0
4,011,448 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,202 UART: [idev] Erasing UDS.KEYID = 0
7,346,426 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,395 UART: [idev] --
7,371,016 UART: [ldev] ++
7,371,649 UART: [ldev] CDI.KEYID = 6
7,372,565 UART: [ldev] SUBJECT.KEYID = 5
7,373,782 UART: [ldev] AUTHORITY.KEYID = 7
7,375,070 UART: [ldev] FE.KEYID = 1
7,423,099 UART: [ldev] Erasing FE.KEYID = 1
10,758,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,917 UART: [ldev] --
13,138,108 UART: [fwproc] Waiting for Commands...
13,140,855 UART: [fwproc] Received command 0x46574c44
13,143,038 UART: [fwproc] Received Image of size 114124 bytes
17,186,667 UART: ROM Fatal Error: 0x000B002B
17,190,133 >>> mbox cmd response: failed
17,190,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,190,781 >>> mbox cmd response: failed
17,191,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,191,392 >>> mbox cmd response: failed
Initializing fuses
2,056,260 writing to cptra_bootfsm_go
2,245,573 UART:
2,245,915 UART: Running Caliptra ROM ...
2,247,166 UART:
2,247,333 UART: [state] CFI Enabled
2,302,123 UART: [state] LifecycleState = Unprovisioned
2,304,059 UART: [state] DebugLocked = No
2,306,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,994 UART: [kat] SHA2-256
2,481,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,212 UART: [kat] ++
2,492,670 UART: [kat] sha1
2,504,099 UART: [kat] SHA2-256
2,506,796 UART: [kat] SHA2-384
2,513,488 UART: [kat] SHA2-512-ACC
2,515,889 UART: [kat] ECC-384
4,809,572 UART: [kat] HMAC-384Kdf
4,841,246 UART: [kat] LMS
6,031,544 UART: [kat] --
6,035,664 UART: [cold-reset] ++
6,037,169 UART: [fht] Storing FHT @ 0x50003400
6,048,440 UART: [idev] ++
6,049,016 UART: [idev] CDI.KEYID = 6
6,050,006 UART: [idev] SUBJECT.KEYID = 7
6,051,174 UART: [idev] UDS.KEYID = 0
6,053,542 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,197,039 UART: [idev] Erasing UDS.KEYID = 0
9,380,532 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,732 UART: [idev] --
9,408,123 UART: [ldev] ++
9,408,701 UART: [ldev] CDI.KEYID = 6
9,409,671 UART: [ldev] SUBJECT.KEYID = 5
9,410,927 UART: [ldev] AUTHORITY.KEYID = 7
9,412,834 UART: [ldev] FE.KEYID = 1
9,454,016 UART: [ldev] Erasing FE.KEYID = 1
12,787,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,073 UART: [ldev] --
15,168,847 UART: [fwproc] Waiting for Commands...
15,170,728 UART: [fwproc] Received command 0x46574c44
15,172,965 UART: [fwproc] Received Image of size 114124 bytes
19,229,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,527 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,965 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
3,785,433 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,137,227 >>> mbox cmd response: failed
17,137,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,138,212 >>> mbox cmd response: failed
17,138,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,138,776 >>> mbox cmd response: failed
Initializing fuses
2,055,879 writing to cptra_bootfsm_go
5,860,315 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,954,991 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,244 writing to cptra_bootfsm_go
193,532 UART:
193,883 UART: Running Caliptra ROM ...
195,074 UART:
604,858 UART: [state] CFI Enabled
618,187 UART: [state] LifecycleState = Unprovisioned
620,134 UART: [state] DebugLocked = No
621,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,465 UART: [kat] SHA2-256
797,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,763 UART: [kat] ++
808,242 UART: [kat] sha1
819,142 UART: [kat] SHA2-256
821,828 UART: [kat] SHA2-384
826,676 UART: [kat] SHA2-512-ACC
829,070 UART: [kat] ECC-384
3,113,305 UART: [kat] HMAC-384Kdf
3,125,590 UART: [kat] LMS
4,315,727 UART: [kat] --
4,319,732 UART: [cold-reset] ++
4,320,644 UART: [fht] Storing FHT @ 0x50003400
4,332,354 UART: [idev] ++
4,332,931 UART: [idev] CDI.KEYID = 6
4,333,821 UART: [idev] SUBJECT.KEYID = 7
4,335,096 UART: [idev] UDS.KEYID = 0
4,337,631 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,215 UART: [idev] Erasing UDS.KEYID = 0
7,623,067 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,906 UART: [idev] --
7,648,400 UART: [ldev] ++
7,649,027 UART: [ldev] CDI.KEYID = 6
7,649,923 UART: [ldev] SUBJECT.KEYID = 5
7,651,189 UART: [ldev] AUTHORITY.KEYID = 7
7,652,421 UART: [ldev] FE.KEYID = 1
7,662,532 UART: [ldev] Erasing FE.KEYID = 1
10,954,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,402 UART: [ldev] --
13,312,855 UART: [fwproc] Waiting for Commands...
13,314,897 UART: [fwproc] Received command 0x46574c44
13,317,080 UART: [fwproc] Received Image of size 114124 bytes
17,364,107 UART: ROM Fatal Error: 0x000B002B
17,367,510 >>> mbox cmd response: failed
17,367,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,197 >>> mbox cmd response: failed
17,368,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,796 >>> mbox cmd response: failed
Initializing fuses
2,061,328 writing to cptra_bootfsm_go
2,250,659 UART:
2,251,005 UART: Running Caliptra ROM ...
2,252,064 UART:
3,088,183 UART: [state] CFI Enabled
3,099,938 UART: [state] LifecycleState = Unprovisioned
3,101,856 UART: [state] DebugLocked = No
3,103,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,108,400 UART: [kat] SHA2-256
3,278,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,288,723 UART: [kat] ++
3,289,182 UART: [kat] sha1
3,300,340 UART: [kat] SHA2-256
3,303,038 UART: [kat] SHA2-384
3,310,168 UART: [kat] SHA2-512-ACC
3,312,583 UART: [kat] ECC-384
5,597,548 UART: [kat] HMAC-384Kdf
5,608,978 UART: [kat] LMS
6,799,078 UART: [kat] --
6,804,382 UART: [cold-reset] ++
6,806,260 UART: [fht] Storing FHT @ 0x50003400
6,817,365 UART: [idev] ++
6,817,993 UART: [idev] CDI.KEYID = 6
6,818,925 UART: [idev] SUBJECT.KEYID = 7
6,820,149 UART: [idev] UDS.KEYID = 0
6,822,460 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,965,901 UART: [idev] Erasing UDS.KEYID = 0
10,102,949 UART: [idev] Using Sha1 for KeyId Algorithm
10,123,634 UART: [idev] --
10,128,653 UART: [ldev] ++
10,129,232 UART: [ldev] CDI.KEYID = 6
10,130,194 UART: [ldev] SUBJECT.KEYID = 5
10,131,455 UART: [ldev] AUTHORITY.KEYID = 7
10,132,634 UART: [ldev] FE.KEYID = 1
10,144,684 UART: [ldev] Erasing FE.KEYID = 1
13,431,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,725,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,740,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,754,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,769,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,787,972 UART: [ldev] --
15,791,832 UART: [fwproc] Waiting for Commands...
15,794,900 UART: [fwproc] Received command 0x46574c44
15,797,086 UART: [fwproc] Received Image of size 114124 bytes
19,852,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,927,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,996,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,312,848 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,134,886 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,339,913 >>> mbox cmd response: failed
17,340,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,340,869 >>> mbox cmd response: failed
17,341,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,341,475 >>> mbox cmd response: failed
Initializing fuses
2,057,420 writing to cptra_bootfsm_go
6,657,685 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,589,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,089 UART:
192,460 UART: Running Caliptra ROM ...
193,677 UART:
193,827 UART: [state] CFI Enabled
265,711 UART: [state] LifecycleState = Unprovisioned
267,578 UART: [state] DebugLocked = No
270,254 UART: [state] WD Timer not started. Device not locked for debugging
274,246 UART: [kat] SHA2-256
453,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,958 UART: [kat] ++
465,497 UART: [kat] sha1
477,247 UART: [kat] SHA2-256
480,305 UART: [kat] SHA2-384
487,413 UART: [kat] SHA2-512-ACC
490,349 UART: [kat] ECC-384
2,947,909 UART: [kat] HMAC-384Kdf
2,970,299 UART: [kat] LMS
3,499,757 UART: [kat] --
3,502,948 UART: [cold-reset] ++
3,505,318 UART: [fht] FHT @ 0x50003400
3,517,324 UART: [idev] ++
3,517,890 UART: [idev] CDI.KEYID = 6
3,518,798 UART: [idev] SUBJECT.KEYID = 7
3,520,012 UART: [idev] UDS.KEYID = 0
3,522,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,864 UART: [idev] Erasing UDS.KEYID = 0
6,028,305 UART: [idev] Sha1 KeyId Algorithm
6,051,002 UART: [idev] --
6,055,411 UART: [ldev] ++
6,055,990 UART: [ldev] CDI.KEYID = 6
6,056,882 UART: [ldev] SUBJECT.KEYID = 5
6,058,097 UART: [ldev] AUTHORITY.KEYID = 7
6,059,258 UART: [ldev] FE.KEYID = 1
6,098,833 UART: [ldev] Erasing FE.KEYID = 1
8,607,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,449 UART: [ldev] --
10,413,412 UART: [fwproc] Wait for Commands...
10,416,589 UART: [fwproc] Recv command 0x46574c44
10,418,685 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,385 UART: ROM Fatal Error: 0x000B002B
13,828,517 >>> mbox cmd response: failed
13,828,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,829,294 >>> mbox cmd response: failed
13,829,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,829,851 >>> mbox cmd response: failed
Initializing fuses
2,054,178 writing to cptra_bootfsm_go
2,243,489 UART:
2,243,834 UART: Running Caliptra ROM ...
2,244,975 UART:
2,245,171 UART: [state] CFI Enabled
2,303,137 UART: [state] LifecycleState = Unprovisioned
2,305,014 UART: [state] DebugLocked = No
2,307,166 UART: [state] WD Timer not started. Device not locked for debugging
2,310,590 UART: [kat] SHA2-256
2,489,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,274 UART: [kat] ++
2,501,740 UART: [kat] sha1
2,513,492 UART: [kat] SHA2-256
2,516,513 UART: [kat] SHA2-384
2,522,344 UART: [kat] SHA2-512-ACC
2,525,289 UART: [kat] ECC-384
4,987,545 UART: [kat] HMAC-384Kdf
5,012,202 UART: [kat] LMS
5,541,635 UART: [kat] --
5,545,414 UART: [cold-reset] ++
5,546,285 UART: [fht] FHT @ 0x50003400
5,556,730 UART: [idev] ++
5,557,304 UART: [idev] CDI.KEYID = 6
5,558,216 UART: [idev] SUBJECT.KEYID = 7
5,559,432 UART: [idev] UDS.KEYID = 0
5,561,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,705,577 UART: [idev] Erasing UDS.KEYID = 0
8,068,622 UART: [idev] Sha1 KeyId Algorithm
8,091,650 UART: [idev] --
8,095,812 UART: [ldev] ++
8,096,387 UART: [ldev] CDI.KEYID = 6
8,097,304 UART: [ldev] SUBJECT.KEYID = 5
8,098,469 UART: [ldev] AUTHORITY.KEYID = 7
8,099,705 UART: [ldev] FE.KEYID = 1
8,141,797 UART: [ldev] Erasing FE.KEYID = 1
10,645,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,946 UART: [ldev] --
12,450,475 UART: [fwproc] Wait for Commands...
12,452,032 UART: [fwproc] Recv command 0x46574c44
12,454,150 UART: [fwproc] Recv'd Img size: 114448 bytes
15,850,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,930,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,999,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,318,443 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,361,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,605,423 >>> mbox cmd response: failed
13,605,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,606,310 >>> mbox cmd response: failed
13,606,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,606,895 >>> mbox cmd response: failed
Initializing fuses
2,060,860 writing to cptra_bootfsm_go
5,410,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,100,890 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,534 UART:
192,896 UART: Running Caliptra ROM ...
194,018 UART:
603,823 UART: [state] CFI Enabled
620,081 UART: [state] LifecycleState = Unprovisioned
621,972 UART: [state] DebugLocked = No
623,793 UART: [state] WD Timer not started. Device not locked for debugging
627,400 UART: [kat] SHA2-256
806,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,107 UART: [kat] ++
818,643 UART: [kat] sha1
829,315 UART: [kat] SHA2-256
832,317 UART: [kat] SHA2-384
838,567 UART: [kat] SHA2-512-ACC
841,496 UART: [kat] ECC-384
3,281,752 UART: [kat] HMAC-384Kdf
3,293,788 UART: [kat] LMS
3,823,245 UART: [kat] --
3,828,001 UART: [cold-reset] ++
3,830,044 UART: [fht] FHT @ 0x50003400
3,839,513 UART: [idev] ++
3,840,078 UART: [idev] CDI.KEYID = 6
3,841,019 UART: [idev] SUBJECT.KEYID = 7
3,842,231 UART: [idev] UDS.KEYID = 0
3,844,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,907 UART: [idev] Erasing UDS.KEYID = 0
6,314,182 UART: [idev] Sha1 KeyId Algorithm
6,337,679 UART: [idev] --
6,342,081 UART: [ldev] ++
6,342,663 UART: [ldev] CDI.KEYID = 6
6,343,573 UART: [ldev] SUBJECT.KEYID = 5
6,344,808 UART: [ldev] AUTHORITY.KEYID = 7
6,346,043 UART: [ldev] FE.KEYID = 1
6,356,803 UART: [ldev] Erasing FE.KEYID = 1
8,828,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,547 UART: [ldev] --
10,622,975 UART: [fwproc] Wait for Commands...
10,625,667 UART: [fwproc] Recv command 0x46574c44
10,627,710 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,733 UART: ROM Fatal Error: 0x000B002B
14,029,860 >>> mbox cmd response: failed
14,030,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,535 >>> mbox cmd response: failed
14,030,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,031,121 >>> mbox cmd response: failed
Initializing fuses
2,062,333 writing to cptra_bootfsm_go
2,251,638 UART:
2,251,980 UART: Running Caliptra ROM ...
2,253,027 UART:
6,422,759 UART: [state] CFI Enabled
6,437,676 UART: [state] LifecycleState = Unprovisioned
6,439,541 UART: [state] DebugLocked = No
6,441,687 UART: [state] WD Timer not started. Device not locked for debugging
6,444,678 UART: [kat] SHA2-256
6,623,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,635,342 UART: [kat] ++
6,635,919 UART: [kat] sha1
6,645,743 UART: [kat] SHA2-256
6,648,767 UART: [kat] SHA2-384
6,655,567 UART: [kat] SHA2-512-ACC
6,658,512 UART: [kat] ECC-384
9,097,577 UART: [kat] HMAC-384Kdf
9,110,010 UART: [kat] LMS
9,639,534 UART: [kat] --
9,646,072 UART: [cold-reset] ++
9,648,490 UART: [fht] FHT @ 0x50003400
9,660,279 UART: [idev] ++
9,660,855 UART: [idev] CDI.KEYID = 6
9,661,768 UART: [idev] SUBJECT.KEYID = 7
9,662,927 UART: [idev] UDS.KEYID = 0
9,665,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,809,372 UART: [idev] Erasing UDS.KEYID = 0
12,137,239 UART: [idev] Sha1 KeyId Algorithm
12,159,403 UART: [idev] --
12,163,588 UART: [ldev] ++
12,164,164 UART: [ldev] CDI.KEYID = 6
12,165,046 UART: [ldev] SUBJECT.KEYID = 5
12,166,150 UART: [ldev] AUTHORITY.KEYID = 7
12,167,489 UART: [ldev] FE.KEYID = 1
12,178,296 UART: [ldev] Erasing FE.KEYID = 1
14,649,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,365,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,382,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,397,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,413,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,434,817 UART: [ldev] --
16,439,767 UART: [fwproc] Wait for Commands...
16,441,485 UART: [fwproc] Recv command 0x46574c44
16,443,608 UART: [fwproc] Recv'd Img size: 114448 bytes
19,851,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,924,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,993,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,312,352 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,705,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,824,996 >>> mbox cmd response: failed
13,825,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,825,916 >>> mbox cmd response: failed
13,826,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,826,473 >>> mbox cmd response: failed
Initializing fuses
2,055,664 writing to cptra_bootfsm_go
9,733,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,297,847 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,099 UART:
192,477 UART: Running Caliptra ROM ...
193,679 UART:
193,830 UART: [state] CFI Enabled
264,278 UART: [state] LifecycleState = Unprovisioned
266,654 UART: [state] DebugLocked = No
269,538 UART: [state] WD Timer not started. Device not locked for debugging
274,915 UART: [kat] SHA2-256
464,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,534 UART: [kat] ++
476,014 UART: [kat] sha1
487,438 UART: [kat] SHA2-256
490,454 UART: [kat] SHA2-384
495,301 UART: [kat] SHA2-512-ACC
497,881 UART: [kat] ECC-384
2,945,524 UART: [kat] HMAC-384Kdf
2,969,826 UART: [kat] LMS
3,501,588 UART: [kat] --
3,505,604 UART: [cold-reset] ++
3,506,889 UART: [fht] FHT @ 0x50003400
3,519,166 UART: [idev] ++
3,519,841 UART: [idev] CDI.KEYID = 6
3,520,779 UART: [idev] SUBJECT.KEYID = 7
3,522,042 UART: [idev] UDS.KEYID = 0
3,524,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,028 UART: [idev] Erasing UDS.KEYID = 0
6,027,229 UART: [idev] Sha1 KeyId Algorithm
6,049,439 UART: [idev] --
6,054,780 UART: [ldev] ++
6,055,477 UART: [ldev] CDI.KEYID = 6
6,056,383 UART: [ldev] SUBJECT.KEYID = 5
6,057,609 UART: [ldev] AUTHORITY.KEYID = 7
6,058,740 UART: [ldev] FE.KEYID = 1
6,097,806 UART: [ldev] Erasing FE.KEYID = 1
8,606,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,455 UART: [ldev] --
10,412,046 UART: [fwproc] Wait for Commands...
10,414,524 UART: [fwproc] Recv command 0x46574c44
10,416,843 UART: [fwproc] Recv'd Img size: 114448 bytes
13,863,951 UART: ROM Fatal Error: 0x000B002B
13,867,633 >>> mbox cmd response: failed
13,868,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,868,434 >>> mbox cmd response: failed
13,868,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,001 >>> mbox cmd response: failed
Initializing fuses
2,058,924 writing to cptra_bootfsm_go
2,248,267 UART:
2,248,621 UART: Running Caliptra ROM ...
2,249,760 UART:
2,249,929 UART: [state] CFI Enabled
2,323,408 UART: [state] LifecycleState = Unprovisioned
2,325,780 UART: [state] DebugLocked = No
2,328,689 UART: [state] WD Timer not started. Device not locked for debugging
2,334,069 UART: [kat] SHA2-256
2,523,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,731 UART: [kat] ++
2,535,227 UART: [kat] sha1
2,547,306 UART: [kat] SHA2-256
2,550,333 UART: [kat] SHA2-384
2,556,216 UART: [kat] SHA2-512-ACC
2,558,840 UART: [kat] ECC-384
5,009,220 UART: [kat] HMAC-384Kdf
5,031,015 UART: [kat] LMS
5,562,814 UART: [kat] --
5,566,421 UART: [cold-reset] ++
5,567,975 UART: [fht] FHT @ 0x50003400
5,580,414 UART: [idev] ++
5,581,090 UART: [idev] CDI.KEYID = 6
5,582,059 UART: [idev] SUBJECT.KEYID = 7
5,583,276 UART: [idev] UDS.KEYID = 0
5,585,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,729,563 UART: [idev] Erasing UDS.KEYID = 0
8,088,338 UART: [idev] Sha1 KeyId Algorithm
8,111,161 UART: [idev] --
8,115,109 UART: [ldev] ++
8,115,790 UART: [ldev] CDI.KEYID = 6
8,116,676 UART: [ldev] SUBJECT.KEYID = 5
8,117,888 UART: [ldev] AUTHORITY.KEYID = 7
8,119,066 UART: [ldev] FE.KEYID = 1
8,158,394 UART: [ldev] Erasing FE.KEYID = 1
10,662,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,643 UART: [ldev] --
12,473,021 UART: [fwproc] Wait for Commands...
12,474,550 UART: [fwproc] Recv command 0x46574c44
12,476,872 UART: [fwproc] Recv'd Img size: 114448 bytes
15,918,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,653,149 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,069 writing to cptra_bootfsm_go
3,439,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,255,050 >>> mbox cmd response: failed
14,255,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,255,968 >>> mbox cmd response: failed
14,256,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,534 >>> mbox cmd response: failed
Initializing fuses
2,057,966 writing to cptra_bootfsm_go
5,479,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,776,530 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,707 UART:
193,072 UART: Running Caliptra ROM ...
194,291 UART:
604,019 UART: [state] CFI Enabled
616,810 UART: [state] LifecycleState = Unprovisioned
619,145 UART: [state] DebugLocked = No
621,002 UART: [state] WD Timer not started. Device not locked for debugging
624,893 UART: [kat] SHA2-256
814,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,578 UART: [kat] ++
826,110 UART: [kat] sha1
838,396 UART: [kat] SHA2-256
841,385 UART: [kat] SHA2-384
846,673 UART: [kat] SHA2-512-ACC
849,228 UART: [kat] ECC-384
3,290,357 UART: [kat] HMAC-384Kdf
3,301,734 UART: [kat] LMS
3,833,531 UART: [kat] --
3,839,317 UART: [cold-reset] ++
3,841,959 UART: [fht] FHT @ 0x50003400
3,853,811 UART: [idev] ++
3,854,491 UART: [idev] CDI.KEYID = 6
3,855,471 UART: [idev] SUBJECT.KEYID = 7
3,856,632 UART: [idev] UDS.KEYID = 0
3,859,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,003,445 UART: [idev] Erasing UDS.KEYID = 0
6,332,575 UART: [idev] Sha1 KeyId Algorithm
6,354,510 UART: [idev] --
6,360,096 UART: [ldev] ++
6,360,801 UART: [ldev] CDI.KEYID = 6
6,361,716 UART: [ldev] SUBJECT.KEYID = 5
6,362,878 UART: [ldev] AUTHORITY.KEYID = 7
6,364,109 UART: [ldev] FE.KEYID = 1
6,375,510 UART: [ldev] Erasing FE.KEYID = 1
8,849,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,035 UART: [ldev] --
10,640,715 UART: [fwproc] Wait for Commands...
10,643,461 UART: [fwproc] Recv command 0x46574c44
10,645,724 UART: [fwproc] Recv'd Img size: 114448 bytes
14,096,999 UART: ROM Fatal Error: 0x000B002B
14,100,674 >>> mbox cmd response: failed
14,101,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,376 >>> mbox cmd response: failed
14,101,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,937 >>> mbox cmd response: failed
Initializing fuses
2,059,902 writing to cptra_bootfsm_go
2,249,250 UART:
2,249,610 UART: Running Caliptra ROM ...
2,250,750 UART:
6,348,576 UART: [state] CFI Enabled
6,362,196 UART: [state] LifecycleState = Unprovisioned
6,364,537 UART: [state] DebugLocked = No
6,366,846 UART: [state] WD Timer not started. Device not locked for debugging
6,371,358 UART: [kat] SHA2-256
6,561,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,572,038 UART: [kat] ++
6,572,741 UART: [kat] sha1
6,585,054 UART: [kat] SHA2-256
6,588,060 UART: [kat] SHA2-384
6,593,901 UART: [kat] SHA2-512-ACC
6,596,523 UART: [kat] ECC-384
9,034,539 UART: [kat] HMAC-384Kdf
9,048,720 UART: [kat] LMS
9,580,526 UART: [kat] --
9,584,044 UART: [cold-reset] ++
9,585,279 UART: [fht] FHT @ 0x50003400
9,597,552 UART: [idev] ++
9,598,227 UART: [idev] CDI.KEYID = 6
9,599,202 UART: [idev] SUBJECT.KEYID = 7
9,600,368 UART: [idev] UDS.KEYID = 0
9,602,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,746,455 UART: [idev] Erasing UDS.KEYID = 0
12,078,220 UART: [idev] Sha1 KeyId Algorithm
12,099,614 UART: [idev] --
12,104,340 UART: [ldev] ++
12,105,027 UART: [ldev] CDI.KEYID = 6
12,105,936 UART: [ldev] SUBJECT.KEYID = 5
12,107,148 UART: [ldev] AUTHORITY.KEYID = 7
12,108,319 UART: [ldev] FE.KEYID = 1
12,118,067 UART: [ldev] Erasing FE.KEYID = 1
14,596,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,313,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,329,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,344,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,359,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,379,584 UART: [ldev] --
16,384,846 UART: [fwproc] Wait for Commands...
16,387,806 UART: [fwproc] Recv command 0x46574c44
16,390,116 UART: [fwproc] Recv'd Img size: 114448 bytes
19,837,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,913,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,029,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,573,050 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,760,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,496,520 >>> mbox cmd response: failed
14,497,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,393 >>> mbox cmd response: failed
14,497,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,959 >>> mbox cmd response: failed
Initializing fuses
2,058,418 writing to cptra_bootfsm_go
9,113,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,314,861 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,128 UART: [kat] SHA2-512-ACC
897,029 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,170 UART: [kat] LMS
1,475,366 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,615 UART: [fht] Storing FHT @ 0x50003400
1,479,408 UART: [idev] ++
1,479,576 UART: [idev] CDI.KEYID = 6
1,479,936 UART: [idev] SUBJECT.KEYID = 7
1,480,360 UART: [idev] UDS.KEYID = 0
1,480,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,373 UART: [ldev] ++
1,514,541 UART: [ldev] CDI.KEYID = 6
1,514,904 UART: [ldev] SUBJECT.KEYID = 5
1,515,330 UART: [ldev] AUTHORITY.KEYID = 7
1,515,793 UART: [ldev] FE.KEYID = 1
1,520,861 UART: [ldev] Erasing FE.KEYID = 1
1,546,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,540 UART: [ldev] --
1,585,937 UART: [fwproc] Waiting for Commands...
1,586,630 UART: [fwproc] Received command 0x46574c44
1,587,421 UART: [fwproc] Received Image of size 114448 bytes
2,885,783 UART: ROM Fatal Error: 0x000B002B
2,886,942 >>> mbox cmd response: failed
2,886,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,948 >>> mbox cmd response: failed
2,886,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
906,798 UART: [kat] LMS
1,474,994 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,259 UART: [fht] Storing FHT @ 0x50003400
1,478,856 UART: [idev] ++
1,479,024 UART: [idev] CDI.KEYID = 6
1,479,384 UART: [idev] SUBJECT.KEYID = 7
1,479,808 UART: [idev] UDS.KEYID = 0
1,480,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,738 UART: [idev] Erasing UDS.KEYID = 0
1,503,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,758 UART: [idev] --
1,513,807 UART: [ldev] ++
1,513,975 UART: [ldev] CDI.KEYID = 6
1,514,338 UART: [ldev] SUBJECT.KEYID = 5
1,514,764 UART: [ldev] AUTHORITY.KEYID = 7
1,515,227 UART: [ldev] FE.KEYID = 1
1,520,429 UART: [ldev] Erasing FE.KEYID = 1
1,546,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,742 UART: [ldev] --
1,586,239 UART: [fwproc] Waiting for Commands...
1,586,918 UART: [fwproc] Received command 0x46574c44
1,587,709 UART: [fwproc] Received Image of size 114448 bytes
2,886,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,389 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,728 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,738,173 >>> mbox cmd response: failed
2,738,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,179 >>> mbox cmd response: failed
2,738,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,826 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,371 UART: [kat] SHA2-512-ACC
897,272 UART: [kat] ECC-384
902,685 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,798 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,247 UART: [idev] ++
1,480,415 UART: [idev] CDI.KEYID = 6
1,480,775 UART: [idev] SUBJECT.KEYID = 7
1,481,199 UART: [idev] UDS.KEYID = 0
1,481,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,011 UART: [idev] Erasing UDS.KEYID = 0
1,506,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,889 UART: [idev] --
1,515,874 UART: [ldev] ++
1,516,042 UART: [ldev] CDI.KEYID = 6
1,516,405 UART: [ldev] SUBJECT.KEYID = 5
1,516,831 UART: [ldev] AUTHORITY.KEYID = 7
1,517,294 UART: [ldev] FE.KEYID = 1
1,522,602 UART: [ldev] Erasing FE.KEYID = 1
1,548,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,569 UART: [ldev] --
1,588,058 UART: [fwproc] Waiting for Commands...
1,588,751 UART: [fwproc] Received command 0x46574c44
1,589,542 UART: [fwproc] Received Image of size 114448 bytes
2,887,864 UART: ROM Fatal Error: 0x000B002B
2,889,023 >>> mbox cmd response: failed
2,889,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,029 >>> mbox cmd response: failed
2,889,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,558 UART: [kat] SHA2-256
882,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,604 UART: [kat] ++
886,756 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,615 UART: [kat] SHA2-512-ACC
897,516 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,677 UART: [kat] LMS
1,475,873 UART: [kat] --
1,476,880 UART: [cold-reset] ++
1,477,330 UART: [fht] Storing FHT @ 0x50003400
1,480,175 UART: [idev] ++
1,480,343 UART: [idev] CDI.KEYID = 6
1,480,703 UART: [idev] SUBJECT.KEYID = 7
1,481,127 UART: [idev] UDS.KEYID = 0
1,481,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,521,632 UART: [ldev] Erasing FE.KEYID = 1
1,547,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,099 UART: [ldev] --
1,586,556 UART: [fwproc] Waiting for Commands...
1,587,365 UART: [fwproc] Received command 0x46574c44
1,588,156 UART: [fwproc] Received Image of size 114448 bytes
2,887,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,863 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,432 >>> mbox cmd response: failed
2,740,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,438 >>> mbox cmd response: failed
2,740,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,695 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,172 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,657 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,070 UART: [idev] Erasing UDS.KEYID = 0
1,201,131 UART: [idev] Sha1 KeyId Algorithm
1,209,497 UART: [idev] --
1,210,551 UART: [ldev] ++
1,210,719 UART: [ldev] CDI.KEYID = 6
1,211,082 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,217,117 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,168 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,612 UART: ROM Fatal Error: 0x000B002B
2,584,771 >>> mbox cmd response: failed
2,584,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,777 >>> mbox cmd response: failed
2,584,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,256 UART: [kat] LMS
1,171,584 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,358 UART: [idev] ++
1,175,526 UART: [idev] CDI.KEYID = 6
1,175,886 UART: [idev] SUBJECT.KEYID = 7
1,176,310 UART: [idev] UDS.KEYID = 0
1,176,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,765 UART: [idev] Sha1 KeyId Algorithm
1,210,197 UART: [idev] --
1,211,233 UART: [ldev] ++
1,211,401 UART: [ldev] CDI.KEYID = 6
1,211,764 UART: [ldev] SUBJECT.KEYID = 5
1,212,190 UART: [ldev] AUTHORITY.KEYID = 7
1,212,653 UART: [ldev] FE.KEYID = 1
1,217,747 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,952 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,217 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,174 >>> mbox cmd response: failed
2,438,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,180 >>> mbox cmd response: failed
2,438,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,004 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
918,251 UART: [kat] HMAC-384Kdf
922,715 UART: [kat] LMS
1,171,043 UART: [kat] --
1,171,922 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,239 UART: [idev] ++
1,175,407 UART: [idev] CDI.KEYID = 6
1,175,767 UART: [idev] SUBJECT.KEYID = 7
1,176,191 UART: [idev] UDS.KEYID = 0
1,176,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,852 UART: [idev] --
1,210,892 UART: [ldev] ++
1,211,060 UART: [ldev] CDI.KEYID = 6
1,211,423 UART: [ldev] SUBJECT.KEYID = 5
1,211,849 UART: [ldev] AUTHORITY.KEYID = 7
1,212,312 UART: [ldev] FE.KEYID = 1
1,217,750 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,238 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,417 UART: [fwproc] Recv command 0x46574c44
1,285,145 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,057 UART: ROM Fatal Error: 0x000B002B
2,585,216 >>> mbox cmd response: failed
2,585,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,222 >>> mbox cmd response: failed
2,585,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
893,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,772 UART: [kat] ++
897,924 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,484 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,725 UART: [idev] ++
1,175,893 UART: [idev] CDI.KEYID = 6
1,176,253 UART: [idev] SUBJECT.KEYID = 7
1,176,677 UART: [idev] UDS.KEYID = 0
1,177,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,639 UART: [idev] Erasing UDS.KEYID = 0
1,201,168 UART: [idev] Sha1 KeyId Algorithm
1,209,818 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,400 UART: [ldev] Erasing FE.KEYID = 1
1,243,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,568 UART: [ldev] --
1,282,943 UART: [fwproc] Wait for Commands...
1,283,627 UART: [fwproc] Recv command 0x46574c44
1,284,355 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,318 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,391 >>> mbox cmd response: failed
2,437,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,397 >>> mbox cmd response: failed
2,437,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,311 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,174,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,948 UART: ROM Fatal Error: 0x000B002B
2,580,107 >>> mbox cmd response: failed
2,580,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,113 >>> mbox cmd response: failed
2,580,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,241,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,526 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,583 UART: [fwproc] Recv command 0x46574c44
1,282,316 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,323 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,458 >>> mbox cmd response: failed
2,434,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,464 >>> mbox cmd response: failed
2,434,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,307 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,174,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,644 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,299 UART: [ldev] Erasing FE.KEYID = 1
1,241,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,645 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,707 UART: ROM Fatal Error: 0x000B002B
2,581,866 >>> mbox cmd response: failed
2,581,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,872 >>> mbox cmd response: failed
2,581,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,888 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x46574c44
1,283,639 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,646 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,025 >>> mbox cmd response: failed
2,436,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,031 >>> mbox cmd response: failed
2,436,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,278 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,191 UART:
192,539 UART: Running Caliptra ROM ...
193,722 UART:
193,876 UART: [state] CFI Enabled
260,319 UART: [state] LifecycleState = Unprovisioned
262,309 UART: [state] DebugLocked = No
264,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,045 UART: [kat] SHA2-256
439,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,251 UART: [kat] ++
450,792 UART: [kat] sha1
461,831 UART: [kat] SHA2-256
464,519 UART: [kat] SHA2-384
469,955 UART: [kat] SHA2-512-ACC
472,344 UART: [kat] ECC-384
2,765,455 UART: [kat] HMAC-384Kdf
2,796,010 UART: [kat] LMS
3,986,316 UART: [kat] --
3,990,587 UART: [cold-reset] ++
3,993,218 UART: [fht] Storing FHT @ 0x50003400
4,005,008 UART: [idev] ++
4,005,672 UART: [idev] CDI.KEYID = 6
4,006,573 UART: [idev] SUBJECT.KEYID = 7
4,007,744 UART: [idev] UDS.KEYID = 0
4,010,317 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,011 UART: [idev] Erasing UDS.KEYID = 0
7,343,792 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,972 UART: [idev] --
7,370,583 UART: [ldev] ++
7,371,161 UART: [ldev] CDI.KEYID = 6
7,372,129 UART: [ldev] SUBJECT.KEYID = 5
7,373,342 UART: [ldev] AUTHORITY.KEYID = 7
7,374,577 UART: [ldev] FE.KEYID = 1
7,418,604 UART: [ldev] Erasing FE.KEYID = 1
10,753,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,221 UART: [ldev] --
13,131,143 UART: [fwproc] Waiting for Commands...
13,133,298 UART: [fwproc] Received command 0x46574c44
13,135,484 UART: [fwproc] Received Image of size 114124 bytes
17,183,375 UART: ROM Fatal Error: 0x000B0028
17,186,838 >>> mbox cmd response: failed
17,187,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,608 >>> mbox cmd response: failed
17,187,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,188,171 >>> mbox cmd response: failed
Initializing fuses
2,054,437 writing to cptra_bootfsm_go
2,243,756 UART:
2,244,099 UART: Running Caliptra ROM ...
2,245,182 UART:
2,245,340 UART: [state] CFI Enabled
2,317,196 UART: [state] LifecycleState = Unprovisioned
2,319,134 UART: [state] DebugLocked = No
2,320,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,687 UART: [kat] SHA2-256
2,495,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,891 UART: [kat] ++
2,506,382 UART: [kat] sha1
2,517,383 UART: [kat] SHA2-256
2,520,073 UART: [kat] SHA2-384
2,525,856 UART: [kat] SHA2-512-ACC
2,528,208 UART: [kat] ECC-384
4,817,204 UART: [kat] HMAC-384Kdf
4,849,536 UART: [kat] LMS
6,039,827 UART: [kat] --
6,043,563 UART: [cold-reset] ++
6,044,973 UART: [fht] Storing FHT @ 0x50003400
6,055,327 UART: [idev] ++
6,055,955 UART: [idev] CDI.KEYID = 6
6,056,840 UART: [idev] SUBJECT.KEYID = 7
6,058,108 UART: [idev] UDS.KEYID = 0
6,060,438 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,204,185 UART: [idev] Erasing UDS.KEYID = 0
9,397,611 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,631 UART: [idev] --
9,423,142 UART: [ldev] ++
9,423,708 UART: [ldev] CDI.KEYID = 6
9,424,649 UART: [ldev] SUBJECT.KEYID = 5
9,425,902 UART: [ldev] AUTHORITY.KEYID = 7
9,427,161 UART: [ldev] FE.KEYID = 1
9,474,294 UART: [ldev] Erasing FE.KEYID = 1
12,808,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,123,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,137,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,152,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,166,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,762 UART: [ldev] --
15,189,054 UART: [fwproc] Waiting for Commands...
15,190,787 UART: [fwproc] Received command 0x46574c44
15,192,980 UART: [fwproc] Received Image of size 114124 bytes
19,243,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,386,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,703,211 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,806,905 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,145,088 >>> mbox cmd response: failed
17,145,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,344 >>> mbox cmd response: failed
17,146,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,909 >>> mbox cmd response: failed
Initializing fuses
2,061,139 writing to cptra_bootfsm_go
5,838,281 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,904,985 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,447 UART:
192,827 UART: Running Caliptra ROM ...
193,935 UART:
603,527 UART: [state] CFI Enabled
616,423 UART: [state] LifecycleState = Unprovisioned
618,354 UART: [state] DebugLocked = No
620,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,934 UART: [kat] SHA2-256
795,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,223 UART: [kat] ++
806,671 UART: [kat] sha1
818,086 UART: [kat] SHA2-256
820,779 UART: [kat] SHA2-384
826,500 UART: [kat] SHA2-512-ACC
828,843 UART: [kat] ECC-384
3,115,394 UART: [kat] HMAC-384Kdf
3,128,659 UART: [kat] LMS
4,318,727 UART: [kat] --
4,323,986 UART: [cold-reset] ++
4,325,763 UART: [fht] Storing FHT @ 0x50003400
4,338,542 UART: [idev] ++
4,339,155 UART: [idev] CDI.KEYID = 6
4,340,079 UART: [idev] SUBJECT.KEYID = 7
4,341,299 UART: [idev] UDS.KEYID = 0
4,343,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,282 UART: [idev] Erasing UDS.KEYID = 0
7,629,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,572 UART: [idev] --
7,655,266 UART: [ldev] ++
7,655,890 UART: [ldev] CDI.KEYID = 6
7,656,837 UART: [ldev] SUBJECT.KEYID = 5
7,658,049 UART: [ldev] AUTHORITY.KEYID = 7
7,659,287 UART: [ldev] FE.KEYID = 1
7,672,854 UART: [ldev] Erasing FE.KEYID = 1
10,964,988 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,311 UART: [ldev] --
13,322,553 UART: [fwproc] Waiting for Commands...
13,324,707 UART: [fwproc] Received command 0x46574c44
13,326,896 UART: [fwproc] Received Image of size 114124 bytes
17,380,096 UART: ROM Fatal Error: 0x000B0028
17,383,489 >>> mbox cmd response: failed
17,383,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,384,250 >>> mbox cmd response: failed
17,384,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,384,813 >>> mbox cmd response: failed
Initializing fuses
2,055,565 writing to cptra_bootfsm_go
2,244,870 UART:
2,245,217 UART: Running Caliptra ROM ...
2,246,265 UART:
3,068,417 UART: [state] CFI Enabled
3,079,299 UART: [state] LifecycleState = Unprovisioned
3,081,216 UART: [state] DebugLocked = No
3,082,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,087,885 UART: [kat] SHA2-256
3,257,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,268,174 UART: [kat] ++
3,268,635 UART: [kat] sha1
3,279,401 UART: [kat] SHA2-256
3,282,114 UART: [kat] SHA2-384
3,288,545 UART: [kat] SHA2-512-ACC
3,290,900 UART: [kat] ECC-384
5,576,956 UART: [kat] HMAC-384Kdf
5,589,522 UART: [kat] LMS
6,779,630 UART: [kat] --
6,785,361 UART: [cold-reset] ++
6,787,733 UART: [fht] Storing FHT @ 0x50003400
6,798,201 UART: [idev] ++
6,798,778 UART: [idev] CDI.KEYID = 6
6,799,753 UART: [idev] SUBJECT.KEYID = 7
6,800,988 UART: [idev] UDS.KEYID = 0
6,803,161 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,946,458 UART: [idev] Erasing UDS.KEYID = 0
10,083,339 UART: [idev] Using Sha1 for KeyId Algorithm
10,106,304 UART: [idev] --
10,109,328 UART: [ldev] ++
10,109,897 UART: [ldev] CDI.KEYID = 6
10,110,843 UART: [ldev] SUBJECT.KEYID = 5
10,112,087 UART: [ldev] AUTHORITY.KEYID = 7
10,113,329 UART: [ldev] FE.KEYID = 1
10,123,900 UART: [ldev] Erasing FE.KEYID = 1
13,412,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,705,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,720,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,735,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,749,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,768,405 UART: [ldev] --
15,772,486 UART: [fwproc] Waiting for Commands...
15,774,965 UART: [fwproc] Received command 0x46574c44
15,777,152 UART: [fwproc] Received Image of size 114124 bytes
19,830,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,906,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,975,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,292,116 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,128,881 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,336,879 >>> mbox cmd response: failed
17,337,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,337,883 >>> mbox cmd response: failed
17,338,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,338,449 >>> mbox cmd response: failed
Initializing fuses
2,062,177 writing to cptra_bootfsm_go
6,657,257 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,607,707 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,308 UART:
192,656 UART: Running Caliptra ROM ...
193,861 UART:
194,010 UART: [state] CFI Enabled
261,298 UART: [state] LifecycleState = Unprovisioned
263,183 UART: [state] DebugLocked = No
265,619 UART: [state] WD Timer not started. Device not locked for debugging
269,552 UART: [kat] SHA2-256
448,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,275 UART: [kat] ++
460,807 UART: [kat] sha1
472,761 UART: [kat] SHA2-256
475,799 UART: [kat] SHA2-384
480,758 UART: [kat] SHA2-512-ACC
483,700 UART: [kat] ECC-384
2,946,327 UART: [kat] HMAC-384Kdf
2,971,352 UART: [kat] LMS
3,500,849 UART: [kat] --
3,506,172 UART: [cold-reset] ++
3,507,131 UART: [fht] FHT @ 0x50003400
3,516,635 UART: [idev] ++
3,517,235 UART: [idev] CDI.KEYID = 6
3,518,144 UART: [idev] SUBJECT.KEYID = 7
3,519,311 UART: [idev] UDS.KEYID = 0
3,522,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,109 UART: [idev] Erasing UDS.KEYID = 0
6,028,053 UART: [idev] Sha1 KeyId Algorithm
6,050,376 UART: [idev] --
6,053,514 UART: [ldev] ++
6,054,087 UART: [ldev] CDI.KEYID = 6
6,054,978 UART: [ldev] SUBJECT.KEYID = 5
6,056,193 UART: [ldev] AUTHORITY.KEYID = 7
6,057,432 UART: [ldev] FE.KEYID = 1
6,099,385 UART: [ldev] Erasing FE.KEYID = 1
8,601,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,407 UART: [ldev] --
10,393,499 UART: [fwproc] Wait for Commands...
10,396,087 UART: [fwproc] Recv command 0x46574c44
10,398,194 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,580 UART: ROM Fatal Error: 0x000B0028
13,801,708 >>> mbox cmd response: failed
13,802,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,802,348 >>> mbox cmd response: failed
13,802,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,010 >>> mbox cmd response: failed
Initializing fuses
2,053,140 writing to cptra_bootfsm_go
2,242,447 UART:
2,242,805 UART: Running Caliptra ROM ...
2,243,938 UART:
2,244,100 UART: [state] CFI Enabled
2,308,664 UART: [state] LifecycleState = Unprovisioned
2,310,545 UART: [state] DebugLocked = No
2,312,480 UART: [state] WD Timer not started. Device not locked for debugging
2,316,445 UART: [kat] SHA2-256
2,495,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,258 UART: [kat] ++
2,507,837 UART: [kat] sha1
2,518,880 UART: [kat] SHA2-256
2,521,910 UART: [kat] SHA2-384
2,527,200 UART: [kat] SHA2-512-ACC
2,530,140 UART: [kat] ECC-384
4,996,454 UART: [kat] HMAC-384Kdf
5,017,402 UART: [kat] LMS
5,546,843 UART: [kat] --
5,551,966 UART: [cold-reset] ++
5,553,263 UART: [fht] FHT @ 0x50003400
5,564,036 UART: [idev] ++
5,564,607 UART: [idev] CDI.KEYID = 6
5,565,517 UART: [idev] SUBJECT.KEYID = 7
5,566,730 UART: [idev] UDS.KEYID = 0
5,569,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,132 UART: [idev] Erasing UDS.KEYID = 0
8,074,521 UART: [idev] Sha1 KeyId Algorithm
8,096,237 UART: [idev] --
8,100,235 UART: [ldev] ++
8,100,807 UART: [ldev] CDI.KEYID = 6
8,101,877 UART: [ldev] SUBJECT.KEYID = 5
8,102,982 UART: [ldev] AUTHORITY.KEYID = 7
8,104,160 UART: [ldev] FE.KEYID = 1
8,148,011 UART: [ldev] Erasing FE.KEYID = 1
10,650,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,011 UART: [ldev] --
12,460,203 UART: [fwproc] Wait for Commands...
12,461,972 UART: [fwproc] Recv command 0x46574c44
12,464,071 UART: [fwproc] Recv'd Img size: 114448 bytes
15,865,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,329,734 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,385,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,615,873 >>> mbox cmd response: failed
13,616,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,199 >>> mbox cmd response: failed
13,617,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,762 >>> mbox cmd response: failed
Initializing fuses
2,055,020 writing to cptra_bootfsm_go
5,427,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,136,876 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
192,713 UART:
193,089 UART: Running Caliptra ROM ...
194,207 UART:
603,721 UART: [state] CFI Enabled
616,147 UART: [state] LifecycleState = Unprovisioned
617,980 UART: [state] DebugLocked = No
620,355 UART: [state] WD Timer not started. Device not locked for debugging
624,019 UART: [kat] SHA2-256
803,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,719 UART: [kat] ++
815,169 UART: [kat] sha1
826,658 UART: [kat] SHA2-256
829,674 UART: [kat] SHA2-384
835,971 UART: [kat] SHA2-512-ACC
838,958 UART: [kat] ECC-384
3,278,111 UART: [kat] HMAC-384Kdf
3,290,552 UART: [kat] LMS
3,820,068 UART: [kat] --
3,825,137 UART: [cold-reset] ++
3,826,551 UART: [fht] FHT @ 0x50003400
3,838,130 UART: [idev] ++
3,838,696 UART: [idev] CDI.KEYID = 6
3,839,603 UART: [idev] SUBJECT.KEYID = 7
3,840,816 UART: [idev] UDS.KEYID = 0
3,843,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,669 UART: [idev] Erasing UDS.KEYID = 0
6,314,546 UART: [idev] Sha1 KeyId Algorithm
6,337,485 UART: [idev] --
6,342,884 UART: [ldev] ++
6,343,459 UART: [ldev] CDI.KEYID = 6
6,344,372 UART: [ldev] SUBJECT.KEYID = 5
6,345,589 UART: [ldev] AUTHORITY.KEYID = 7
6,346,825 UART: [ldev] FE.KEYID = 1
6,358,872 UART: [ldev] Erasing FE.KEYID = 1
8,832,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,721 UART: [ldev] --
10,623,611 UART: [fwproc] Wait for Commands...
10,626,499 UART: [fwproc] Recv command 0x46574c44
10,628,611 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,754 UART: ROM Fatal Error: 0x000B0028
14,038,887 >>> mbox cmd response: failed
14,039,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,039,659 >>> mbox cmd response: failed
14,039,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,040,222 >>> mbox cmd response: failed
Initializing fuses
2,052,885 writing to cptra_bootfsm_go
2,242,245 UART:
2,242,587 UART: Running Caliptra ROM ...
2,243,735 UART:
6,411,865 UART: [state] CFI Enabled
6,426,237 UART: [state] LifecycleState = Unprovisioned
6,428,118 UART: [state] DebugLocked = No
6,429,284 UART: [state] WD Timer not started. Device not locked for debugging
6,432,395 UART: [kat] SHA2-256
6,611,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,623,092 UART: [kat] ++
6,623,552 UART: [kat] sha1
6,634,656 UART: [kat] SHA2-256
6,637,679 UART: [kat] SHA2-384
6,643,940 UART: [kat] SHA2-512-ACC
6,646,942 UART: [kat] ECC-384
9,087,530 UART: [kat] HMAC-384Kdf
9,100,671 UART: [kat] LMS
9,630,163 UART: [kat] --
9,633,530 UART: [cold-reset] ++
9,635,574 UART: [fht] FHT @ 0x50003400
9,646,226 UART: [idev] ++
9,646,802 UART: [idev] CDI.KEYID = 6
9,647,736 UART: [idev] SUBJECT.KEYID = 7
9,648,900 UART: [idev] UDS.KEYID = 0
9,651,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,795,114 UART: [idev] Erasing UDS.KEYID = 0
12,119,769 UART: [idev] Sha1 KeyId Algorithm
12,142,348 UART: [idev] --
12,145,911 UART: [ldev] ++
12,146,480 UART: [ldev] CDI.KEYID = 6
12,147,362 UART: [ldev] SUBJECT.KEYID = 5
12,148,625 UART: [ldev] AUTHORITY.KEYID = 7
12,149,864 UART: [ldev] FE.KEYID = 1
12,160,401 UART: [ldev] Erasing FE.KEYID = 1
14,633,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,351,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,367,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,383,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,399,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,418,625 UART: [ldev] --
16,422,755 UART: [fwproc] Wait for Commands...
16,424,685 UART: [fwproc] Recv command 0x46574c44
16,426,754 UART: [fwproc] Recv'd Img size: 114448 bytes
19,818,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,889,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,958,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,277,076 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,691,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,814,552 >>> mbox cmd response: failed
13,815,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,815,440 >>> mbox cmd response: failed
13,815,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,815,998 >>> mbox cmd response: failed
Initializing fuses
2,062,848 writing to cptra_bootfsm_go
9,743,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,326,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,163 UART:
192,557 UART: Running Caliptra ROM ...
193,715 UART:
193,860 UART: [state] CFI Enabled
262,630 UART: [state] LifecycleState = Unprovisioned
265,062 UART: [state] DebugLocked = No
267,722 UART: [state] WD Timer not started. Device not locked for debugging
271,546 UART: [kat] SHA2-256
461,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,231 UART: [kat] ++
472,677 UART: [kat] sha1
484,851 UART: [kat] SHA2-256
487,868 UART: [kat] SHA2-384
493,903 UART: [kat] SHA2-512-ACC
496,517 UART: [kat] ECC-384
2,947,751 UART: [kat] HMAC-384Kdf
2,970,898 UART: [kat] LMS
3,502,664 UART: [kat] --
3,507,869 UART: [cold-reset] ++
3,509,858 UART: [fht] FHT @ 0x50003400
3,522,784 UART: [idev] ++
3,523,466 UART: [idev] CDI.KEYID = 6
3,524,486 UART: [idev] SUBJECT.KEYID = 7
3,525,594 UART: [idev] UDS.KEYID = 0
3,528,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,473 UART: [idev] Erasing UDS.KEYID = 0
6,027,890 UART: [idev] Sha1 KeyId Algorithm
6,051,245 UART: [idev] --
6,055,836 UART: [ldev] ++
6,056,521 UART: [ldev] CDI.KEYID = 6
6,057,408 UART: [ldev] SUBJECT.KEYID = 5
6,058,512 UART: [ldev] AUTHORITY.KEYID = 7
6,059,803 UART: [ldev] FE.KEYID = 1
6,098,747 UART: [ldev] Erasing FE.KEYID = 1
8,603,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,099 UART: [ldev] --
10,411,366 UART: [fwproc] Wait for Commands...
10,412,976 UART: [fwproc] Recv command 0x46574c44
10,415,289 UART: [fwproc] Recv'd Img size: 114448 bytes
13,856,968 UART: ROM Fatal Error: 0x000B0028
13,860,582 >>> mbox cmd response: failed
13,860,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,237 >>> mbox cmd response: failed
13,861,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,841 >>> mbox cmd response: failed
Initializing fuses
2,064,853 writing to cptra_bootfsm_go
2,254,112 UART:
2,254,471 UART: Running Caliptra ROM ...
2,255,520 UART:
2,255,673 UART: [state] CFI Enabled
2,313,593 UART: [state] LifecycleState = Unprovisioned
2,315,982 UART: [state] DebugLocked = No
2,318,149 UART: [state] WD Timer not started. Device not locked for debugging
2,322,544 UART: [kat] SHA2-256
2,512,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,214 UART: [kat] ++
2,523,673 UART: [kat] sha1
2,534,839 UART: [kat] SHA2-256
2,537,836 UART: [kat] SHA2-384
2,543,131 UART: [kat] SHA2-512-ACC
2,545,757 UART: [kat] ECC-384
4,995,337 UART: [kat] HMAC-384Kdf
5,020,321 UART: [kat] LMS
5,552,120 UART: [kat] --
5,556,001 UART: [cold-reset] ++
5,558,371 UART: [fht] FHT @ 0x50003400
5,570,486 UART: [idev] ++
5,571,164 UART: [idev] CDI.KEYID = 6
5,572,178 UART: [idev] SUBJECT.KEYID = 7
5,573,337 UART: [idev] UDS.KEYID = 0
5,575,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,611 UART: [idev] Erasing UDS.KEYID = 0
8,079,362 UART: [idev] Sha1 KeyId Algorithm
8,102,417 UART: [idev] --
8,105,754 UART: [ldev] ++
8,106,335 UART: [ldev] CDI.KEYID = 6
8,107,248 UART: [ldev] SUBJECT.KEYID = 5
8,108,412 UART: [ldev] AUTHORITY.KEYID = 7
8,109,643 UART: [ldev] FE.KEYID = 1
8,148,644 UART: [ldev] Erasing FE.KEYID = 1
10,650,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,005 UART: [ldev] --
12,462,167 UART: [fwproc] Wait for Commands...
12,464,050 UART: [fwproc] Recv command 0x46574c44
12,466,314 UART: [fwproc] Recv'd Img size: 114448 bytes
15,918,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,116,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,659,288 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,439,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,744 >>> mbox cmd response: failed
14,280,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,871 >>> mbox cmd response: failed
14,281,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,281,466 >>> mbox cmd response: failed
Initializing fuses
2,057,027 writing to cptra_bootfsm_go
5,496,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,800,051 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,453 UART:
192,831 UART: Running Caliptra ROM ...
193,979 UART:
603,512 UART: [state] CFI Enabled
615,744 UART: [state] LifecycleState = Unprovisioned
618,094 UART: [state] DebugLocked = No
619,432 UART: [state] WD Timer not started. Device not locked for debugging
623,749 UART: [kat] SHA2-256
813,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,374 UART: [kat] ++
824,961 UART: [kat] sha1
835,798 UART: [kat] SHA2-256
838,849 UART: [kat] SHA2-384
844,496 UART: [kat] SHA2-512-ACC
847,109 UART: [kat] ECC-384
3,289,073 UART: [kat] HMAC-384Kdf
3,302,120 UART: [kat] LMS
3,833,943 UART: [kat] --
3,838,009 UART: [cold-reset] ++
3,840,544 UART: [fht] FHT @ 0x50003400
3,851,903 UART: [idev] ++
3,852,629 UART: [idev] CDI.KEYID = 6
3,853,569 UART: [idev] SUBJECT.KEYID = 7
3,854,777 UART: [idev] UDS.KEYID = 0
3,857,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,409 UART: [idev] Erasing UDS.KEYID = 0
6,329,326 UART: [idev] Sha1 KeyId Algorithm
6,351,150 UART: [idev] --
6,356,686 UART: [ldev] ++
6,357,372 UART: [ldev] CDI.KEYID = 6
6,358,280 UART: [ldev] SUBJECT.KEYID = 5
6,359,492 UART: [ldev] AUTHORITY.KEYID = 7
6,360,667 UART: [ldev] FE.KEYID = 1
6,372,033 UART: [ldev] Erasing FE.KEYID = 1
8,852,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,571 UART: [ldev] --
10,642,809 UART: [fwproc] Wait for Commands...
10,644,697 UART: [fwproc] Recv command 0x46574c44
10,647,016 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,990 UART: ROM Fatal Error: 0x000B0028
14,096,611 >>> mbox cmd response: failed
14,097,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,097,321 >>> mbox cmd response: failed
14,097,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,097,887 >>> mbox cmd response: failed
Initializing fuses
2,055,006 writing to cptra_bootfsm_go
2,244,323 UART:
2,244,673 UART: Running Caliptra ROM ...
2,245,815 UART:
6,353,645 UART: [state] CFI Enabled
6,371,413 UART: [state] LifecycleState = Unprovisioned
6,373,748 UART: [state] DebugLocked = No
6,376,428 UART: [state] WD Timer not started. Device not locked for debugging
6,381,036 UART: [kat] SHA2-256
6,570,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,581,662 UART: [kat] ++
6,582,261 UART: [kat] sha1
6,594,564 UART: [kat] SHA2-256
6,597,552 UART: [kat] SHA2-384
6,603,381 UART: [kat] SHA2-512-ACC
6,606,000 UART: [kat] ECC-384
9,049,917 UART: [kat] HMAC-384Kdf
9,063,777 UART: [kat] LMS
9,595,575 UART: [kat] --
9,600,925 UART: [cold-reset] ++
9,602,663 UART: [fht] FHT @ 0x50003400
9,612,745 UART: [idev] ++
9,613,427 UART: [idev] CDI.KEYID = 6
9,614,367 UART: [idev] SUBJECT.KEYID = 7
9,615,633 UART: [idev] UDS.KEYID = 0
9,617,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,761,619 UART: [idev] Erasing UDS.KEYID = 0
12,097,827 UART: [idev] Sha1 KeyId Algorithm
12,120,258 UART: [idev] --
12,125,135 UART: [ldev] ++
12,125,817 UART: [ldev] CDI.KEYID = 6
12,126,702 UART: [ldev] SUBJECT.KEYID = 5
12,127,915 UART: [ldev] AUTHORITY.KEYID = 7
12,129,147 UART: [ldev] FE.KEYID = 1
12,140,091 UART: [ldev] Erasing FE.KEYID = 1
14,613,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,333,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,348,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,363,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,378,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,400,233 UART: [ldev] --
16,405,778 UART: [fwproc] Wait for Commands...
16,408,186 UART: [fwproc] Recv command 0x46574c44
16,410,451 UART: [fwproc] Recv'd Img size: 114448 bytes
19,859,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,936,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,052,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,595,970 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,752,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,495,248 >>> mbox cmd response: failed
14,495,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,222 >>> mbox cmd response: failed
14,496,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,779 >>> mbox cmd response: failed
Initializing fuses
2,054,912 writing to cptra_bootfsm_go
9,122,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,324,589 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,669 UART: [kat] SHA2-256
881,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,715 UART: [kat] ++
885,867 UART: [kat] sha1
890,171 UART: [kat] SHA2-256
892,109 UART: [kat] SHA2-384
894,710 UART: [kat] SHA2-512-ACC
896,611 UART: [kat] ECC-384
902,178 UART: [kat] HMAC-384Kdf
906,696 UART: [kat] LMS
1,474,892 UART: [kat] --
1,475,663 UART: [cold-reset] ++
1,476,185 UART: [fht] Storing FHT @ 0x50003400
1,479,060 UART: [idev] ++
1,479,228 UART: [idev] CDI.KEYID = 6
1,479,588 UART: [idev] SUBJECT.KEYID = 7
1,480,012 UART: [idev] UDS.KEYID = 0
1,480,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,660 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,546,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,758 UART: [ldev] --
1,586,201 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 114448 bytes
2,885,946 UART: ROM Fatal Error: 0x000B0028
2,887,103 >>> mbox cmd response: failed
2,887,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,109 >>> mbox cmd response: failed
2,887,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,440 UART: [kat] HMAC-384Kdf
906,858 UART: [kat] LMS
1,475,054 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,700 UART: [idev] ++
1,479,868 UART: [idev] CDI.KEYID = 6
1,480,228 UART: [idev] SUBJECT.KEYID = 7
1,480,652 UART: [idev] UDS.KEYID = 0
1,480,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,626 UART: [idev] Erasing UDS.KEYID = 0
1,505,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,264 UART: [idev] --
1,515,287 UART: [ldev] ++
1,515,455 UART: [ldev] CDI.KEYID = 6
1,515,818 UART: [ldev] SUBJECT.KEYID = 5
1,516,244 UART: [ldev] AUTHORITY.KEYID = 7
1,516,707 UART: [ldev] FE.KEYID = 1
1,522,057 UART: [ldev] Erasing FE.KEYID = 1
1,547,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,088 UART: [ldev] --
1,586,519 UART: [fwproc] Waiting for Commands...
1,587,342 UART: [fwproc] Received command 0x46574c44
1,588,133 UART: [fwproc] Received Image of size 114448 bytes
2,887,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,046 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,268 >>> mbox cmd response: failed
2,740,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,274 >>> mbox cmd response: failed
2,740,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,462 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,545 UART: [kat] SHA2-512-ACC
897,446 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,828 UART: [cold-reset] ++
1,477,214 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,124 UART: [ldev] ++
1,515,292 UART: [ldev] CDI.KEYID = 6
1,515,655 UART: [ldev] SUBJECT.KEYID = 5
1,516,081 UART: [ldev] AUTHORITY.KEYID = 7
1,516,544 UART: [ldev] FE.KEYID = 1
1,521,714 UART: [ldev] Erasing FE.KEYID = 1
1,547,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,591 UART: [ldev] --
1,585,886 UART: [fwproc] Waiting for Commands...
1,586,537 UART: [fwproc] Received command 0x46574c44
1,587,328 UART: [fwproc] Received Image of size 114448 bytes
2,885,495 UART: ROM Fatal Error: 0x000B0028
2,886,652 >>> mbox cmd response: failed
2,886,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,658 >>> mbox cmd response: failed
2,886,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,228 UART: [fht] Storing FHT @ 0x50003400
1,479,789 UART: [idev] ++
1,479,957 UART: [idev] CDI.KEYID = 6
1,480,317 UART: [idev] SUBJECT.KEYID = 7
1,480,741 UART: [idev] UDS.KEYID = 0
1,481,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,505,691 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,343 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,521,864 UART: [ldev] Erasing FE.KEYID = 1
1,547,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,147 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,295 UART: [fwproc] Received command 0x46574c44
1,588,086 UART: [fwproc] Received Image of size 114448 bytes
2,887,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,563 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,185 >>> mbox cmd response: failed
2,740,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,191 >>> mbox cmd response: failed
2,740,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,997 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
892,810 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,935 UART: [kat] ++
897,087 UART: [kat] sha1
901,455 UART: [kat] SHA2-256
903,395 UART: [kat] SHA2-384
905,968 UART: [kat] SHA2-512-ACC
907,869 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,732 UART: [idev] ++
1,174,900 UART: [idev] CDI.KEYID = 6
1,175,260 UART: [idev] SUBJECT.KEYID = 7
1,175,684 UART: [idev] UDS.KEYID = 0
1,176,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,724 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,399 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,851 UART: ROM Fatal Error: 0x000B0028
2,583,008 >>> mbox cmd response: failed
2,583,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,014 >>> mbox cmd response: failed
2,583,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,544 UART: [kat] LMS
1,170,872 UART: [kat] --
1,171,771 UART: [cold-reset] ++
1,172,163 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,824 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,217,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,041 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,259 >>> mbox cmd response: failed
2,438,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,265 >>> mbox cmd response: failed
2,438,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,218 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,123 UART: [kat] SHA2-512-ACC
909,024 UART: [kat] ECC-384
918,881 UART: [kat] HMAC-384Kdf
923,651 UART: [kat] LMS
1,171,979 UART: [kat] --
1,172,688 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,749 UART: [idev] ++
1,175,917 UART: [idev] CDI.KEYID = 6
1,176,277 UART: [idev] SUBJECT.KEYID = 7
1,176,701 UART: [idev] UDS.KEYID = 0
1,177,046 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,801 UART: [idev] Erasing UDS.KEYID = 0
1,202,000 UART: [idev] Sha1 KeyId Algorithm
1,210,630 UART: [idev] --
1,211,658 UART: [ldev] ++
1,211,826 UART: [ldev] CDI.KEYID = 6
1,212,189 UART: [ldev] SUBJECT.KEYID = 5
1,212,615 UART: [ldev] AUTHORITY.KEYID = 7
1,213,078 UART: [ldev] FE.KEYID = 1
1,217,976 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,212 UART: [ldev] --
1,283,653 UART: [fwproc] Wait for Commands...
1,284,305 UART: [fwproc] Recv command 0x46574c44
1,285,033 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,822 UART: ROM Fatal Error: 0x000B0028
2,584,979 >>> mbox cmd response: failed
2,584,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,985 >>> mbox cmd response: failed
2,584,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,324 UART: [kat] SHA2-256
904,264 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
918,667 UART: [kat] HMAC-384Kdf
923,155 UART: [kat] LMS
1,171,483 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,898 UART: [fht] FHT @ 0x50003400
1,175,783 UART: [idev] ++
1,175,951 UART: [idev] CDI.KEYID = 6
1,176,311 UART: [idev] SUBJECT.KEYID = 7
1,176,735 UART: [idev] UDS.KEYID = 0
1,177,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,405 UART: [idev] Erasing UDS.KEYID = 0
1,201,626 UART: [idev] Sha1 KeyId Algorithm
1,210,308 UART: [idev] --
1,211,402 UART: [ldev] ++
1,211,570 UART: [ldev] CDI.KEYID = 6
1,211,933 UART: [ldev] SUBJECT.KEYID = 5
1,212,359 UART: [ldev] AUTHORITY.KEYID = 7
1,212,822 UART: [ldev] FE.KEYID = 1
1,218,100 UART: [ldev] Erasing FE.KEYID = 1
1,245,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,288 UART: [ldev] --
1,284,587 UART: [fwproc] Wait for Commands...
1,285,179 UART: [fwproc] Recv command 0x46574c44
1,285,907 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,590 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,439,112 >>> mbox cmd response: failed
2,439,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,118 >>> mbox cmd response: failed
2,439,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,917 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,476 UART: [ldev] ++
1,209,644 UART: [ldev] CDI.KEYID = 6
1,210,008 UART: [ldev] SUBJECT.KEYID = 5
1,210,435 UART: [ldev] AUTHORITY.KEYID = 7
1,210,898 UART: [ldev] FE.KEYID = 1
1,216,100 UART: [ldev] Erasing FE.KEYID = 1
1,242,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,758 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,843 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,837 UART: ROM Fatal Error: 0x000B0028
2,582,994 >>> mbox cmd response: failed
2,582,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,000 >>> mbox cmd response: failed
2,583,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,305 UART: [kat] SHA2-256
901,245 UART: [kat] SHA2-384
903,990 UART: [kat] SHA2-512-ACC
905,891 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,173,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,358 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,881 >>> mbox cmd response: failed
2,433,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,887 >>> mbox cmd response: failed
2,433,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,511 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,173,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,556 UART: [idev] Erasing UDS.KEYID = 0
1,198,446 UART: [idev] Sha1 KeyId Algorithm
1,207,378 UART: [idev] --
1,208,523 UART: [ldev] ++
1,208,691 UART: [ldev] CDI.KEYID = 6
1,209,055 UART: [ldev] SUBJECT.KEYID = 5
1,209,482 UART: [ldev] AUTHORITY.KEYID = 7
1,209,945 UART: [ldev] FE.KEYID = 1
1,215,211 UART: [ldev] Erasing FE.KEYID = 1
1,241,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,024 UART: [fwproc] Recv command 0x46574c44
1,282,757 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,950 UART: ROM Fatal Error: 0x000B0028
2,583,107 >>> mbox cmd response: failed
2,583,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,113 >>> mbox cmd response: failed
2,583,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,460 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,174,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,198,968 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,829 UART: [ldev] ++
1,208,997 UART: [ldev] CDI.KEYID = 6
1,209,361 UART: [ldev] SUBJECT.KEYID = 5
1,209,788 UART: [ldev] AUTHORITY.KEYID = 7
1,210,251 UART: [ldev] FE.KEYID = 1
1,215,547 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,718 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,130 >>> mbox cmd response: failed
2,434,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,136 >>> mbox cmd response: failed
2,434,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,310 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,262 UART:
192,629 UART: Running Caliptra ROM ...
193,723 UART:
193,866 UART: [state] CFI Enabled
259,030 UART: [state] LifecycleState = Unprovisioned
260,903 UART: [state] DebugLocked = No
262,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,494 UART: [kat] SHA2-256
437,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,713 UART: [kat] ++
448,174 UART: [kat] sha1
460,187 UART: [kat] SHA2-256
462,869 UART: [kat] SHA2-384
469,494 UART: [kat] SHA2-512-ACC
471,894 UART: [kat] ECC-384
2,764,221 UART: [kat] HMAC-384Kdf
2,775,644 UART: [kat] LMS
3,965,952 UART: [kat] --
3,970,546 UART: [cold-reset] ++
3,972,490 UART: [fht] Storing FHT @ 0x50003400
3,984,299 UART: [idev] ++
3,984,867 UART: [idev] CDI.KEYID = 6
3,985,750 UART: [idev] SUBJECT.KEYID = 7
3,987,018 UART: [idev] UDS.KEYID = 0
3,989,517 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,671 UART: [idev] Erasing UDS.KEYID = 0
7,322,002 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,492 UART: [idev] --
7,348,020 UART: [ldev] ++
7,348,597 UART: [ldev] CDI.KEYID = 6
7,349,588 UART: [ldev] SUBJECT.KEYID = 5
7,350,751 UART: [ldev] AUTHORITY.KEYID = 7
7,352,038 UART: [ldev] FE.KEYID = 1
7,399,309 UART: [ldev] Erasing FE.KEYID = 1
10,733,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,772 UART: [ldev] --
13,111,246 UART: [fwproc] Waiting for Commands...
13,114,595 UART: [fwproc] Received command 0x46574c44
13,116,785 UART: [fwproc] Received Image of size 114124 bytes
17,165,974 UART: ROM Fatal Error: 0x000B0029
17,169,397 >>> mbox cmd response: failed
17,169,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,170,138 >>> mbox cmd response: failed
17,170,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,170,687 >>> mbox cmd response: failed
Initializing fuses
2,056,618 writing to cptra_bootfsm_go
2,245,929 UART:
2,246,288 UART: Running Caliptra ROM ...
2,247,336 UART:
2,247,505 UART: [state] CFI Enabled
2,312,175 UART: [state] LifecycleState = Unprovisioned
2,314,111 UART: [state] DebugLocked = No
2,316,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,371 UART: [kat] SHA2-256
2,492,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,581 UART: [kat] ++
2,503,127 UART: [kat] sha1
2,512,620 UART: [kat] SHA2-256
2,515,314 UART: [kat] SHA2-384
2,521,031 UART: [kat] SHA2-512-ACC
2,523,384 UART: [kat] ECC-384
4,813,385 UART: [kat] HMAC-384Kdf
4,845,975 UART: [kat] LMS
6,036,295 UART: [kat] --
6,041,993 UART: [cold-reset] ++
6,043,946 UART: [fht] Storing FHT @ 0x50003400
6,055,484 UART: [idev] ++
6,056,063 UART: [idev] CDI.KEYID = 6
6,057,006 UART: [idev] SUBJECT.KEYID = 7
6,058,263 UART: [idev] UDS.KEYID = 0
6,060,438 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,939 UART: [idev] Erasing UDS.KEYID = 0
9,390,123 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,170 UART: [idev] --
9,417,750 UART: [ldev] ++
9,418,353 UART: [ldev] CDI.KEYID = 6
9,419,295 UART: [ldev] SUBJECT.KEYID = 5
9,420,550 UART: [ldev] AUTHORITY.KEYID = 7
9,421,708 UART: [ldev] FE.KEYID = 1
9,467,815 UART: [ldev] Erasing FE.KEYID = 1
12,799,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,313 UART: [ldev] --
15,163,422 UART: [fwproc] Waiting for Commands...
15,165,085 UART: [fwproc] Received command 0x46574c44
15,167,273 UART: [fwproc] Received Image of size 114124 bytes
19,219,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,290,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,675,941 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,786,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,120,457 >>> mbox cmd response: failed
17,121,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,121,440 >>> mbox cmd response: failed
17,121,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,122,005 >>> mbox cmd response: failed
Initializing fuses
2,063,482 writing to cptra_bootfsm_go
5,859,950 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,948,341 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,482 UART:
192,845 UART: Running Caliptra ROM ...
194,269 UART:
603,636 UART: [state] CFI Enabled
617,983 UART: [state] LifecycleState = Unprovisioned
619,912 UART: [state] DebugLocked = No
622,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,475 UART: [kat] SHA2-256
797,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,787 UART: [kat] ++
808,252 UART: [kat] sha1
819,726 UART: [kat] SHA2-256
822,464 UART: [kat] SHA2-384
827,844 UART: [kat] SHA2-512-ACC
830,235 UART: [kat] ECC-384
3,114,082 UART: [kat] HMAC-384Kdf
3,125,350 UART: [kat] LMS
4,315,456 UART: [kat] --
4,320,562 UART: [cold-reset] ++
4,321,751 UART: [fht] Storing FHT @ 0x50003400
4,333,881 UART: [idev] ++
4,334,455 UART: [idev] CDI.KEYID = 6
4,335,369 UART: [idev] SUBJECT.KEYID = 7
4,336,638 UART: [idev] UDS.KEYID = 0
4,339,254 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,876 UART: [idev] Erasing UDS.KEYID = 0
7,624,767 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,699 UART: [idev] --
7,651,230 UART: [ldev] ++
7,651,812 UART: [ldev] CDI.KEYID = 6
7,652,781 UART: [ldev] SUBJECT.KEYID = 5
7,653,950 UART: [ldev] AUTHORITY.KEYID = 7
7,655,187 UART: [ldev] FE.KEYID = 1
7,666,860 UART: [ldev] Erasing FE.KEYID = 1
10,957,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,753 UART: [ldev] --
13,318,140 UART: [fwproc] Waiting for Commands...
13,319,759 UART: [fwproc] Received command 0x46574c44
13,321,963 UART: [fwproc] Received Image of size 114124 bytes
17,375,395 UART: ROM Fatal Error: 0x000B0029
17,378,860 >>> mbox cmd response: failed
17,379,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,524 >>> mbox cmd response: failed
17,379,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,123 >>> mbox cmd response: failed
Initializing fuses
2,055,944 writing to cptra_bootfsm_go
2,245,242 UART:
2,245,585 UART: Running Caliptra ROM ...
2,246,636 UART:
3,075,644 UART: [state] CFI Enabled
3,087,464 UART: [state] LifecycleState = Unprovisioned
3,089,392 UART: [state] DebugLocked = No
3,091,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,095,882 UART: [kat] SHA2-256
3,265,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,276,128 UART: [kat] ++
3,276,584 UART: [kat] sha1
3,287,258 UART: [kat] SHA2-256
3,289,957 UART: [kat] SHA2-384
3,295,518 UART: [kat] SHA2-512-ACC
3,297,902 UART: [kat] ECC-384
5,582,345 UART: [kat] HMAC-384Kdf
5,595,277 UART: [kat] LMS
6,785,355 UART: [kat] --
6,789,097 UART: [cold-reset] ++
6,790,818 UART: [fht] Storing FHT @ 0x50003400
6,802,678 UART: [idev] ++
6,803,315 UART: [idev] CDI.KEYID = 6
6,804,205 UART: [idev] SUBJECT.KEYID = 7
6,805,474 UART: [idev] UDS.KEYID = 0
6,807,818 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,951,630 UART: [idev] Erasing UDS.KEYID = 0
10,094,942 UART: [idev] Using Sha1 for KeyId Algorithm
10,117,459 UART: [idev] --
10,122,363 UART: [ldev] ++
10,122,936 UART: [ldev] CDI.KEYID = 6
10,123,951 UART: [ldev] SUBJECT.KEYID = 5
10,125,153 UART: [ldev] AUTHORITY.KEYID = 7
10,126,329 UART: [ldev] FE.KEYID = 1
10,138,221 UART: [ldev] Erasing FE.KEYID = 1
13,427,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,719,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,733,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,748,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,762,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,781,914 UART: [ldev] --
15,787,248 UART: [fwproc] Waiting for Commands...
15,788,914 UART: [fwproc] Received command 0x46574c44
15,791,163 UART: [fwproc] Received Image of size 114124 bytes
19,838,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,913,541 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,982,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,300,433 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,127,383 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,331,567 >>> mbox cmd response: failed
17,332,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,332,510 >>> mbox cmd response: failed
17,332,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,333,074 >>> mbox cmd response: failed
Initializing fuses
2,060,532 writing to cptra_bootfsm_go
6,670,608 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,626,424 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,008 UART:
192,386 UART: Running Caliptra ROM ...
193,550 UART:
193,721 UART: [state] CFI Enabled
262,087 UART: [state] LifecycleState = Unprovisioned
264,010 UART: [state] DebugLocked = No
266,370 UART: [state] WD Timer not started. Device not locked for debugging
269,769 UART: [kat] SHA2-256
448,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,486 UART: [kat] ++
460,938 UART: [kat] sha1
473,115 UART: [kat] SHA2-256
476,184 UART: [kat] SHA2-384
482,162 UART: [kat] SHA2-512-ACC
485,097 UART: [kat] ECC-384
2,946,441 UART: [kat] HMAC-384Kdf
2,971,063 UART: [kat] LMS
3,500,546 UART: [kat] --
3,503,782 UART: [cold-reset] ++
3,504,763 UART: [fht] FHT @ 0x50003400
3,514,750 UART: [idev] ++
3,515,318 UART: [idev] CDI.KEYID = 6
3,516,203 UART: [idev] SUBJECT.KEYID = 7
3,517,417 UART: [idev] UDS.KEYID = 0
3,520,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,494 UART: [idev] Erasing UDS.KEYID = 0
6,021,843 UART: [idev] Sha1 KeyId Algorithm
6,045,788 UART: [idev] --
6,048,765 UART: [ldev] ++
6,049,336 UART: [ldev] CDI.KEYID = 6
6,050,252 UART: [ldev] SUBJECT.KEYID = 5
6,051,415 UART: [ldev] AUTHORITY.KEYID = 7
6,052,650 UART: [ldev] FE.KEYID = 1
6,099,446 UART: [ldev] Erasing FE.KEYID = 1
8,604,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,438 UART: [ldev] --
10,413,934 UART: [fwproc] Wait for Commands...
10,415,720 UART: [fwproc] Recv command 0x46574c44
10,417,820 UART: [fwproc] Recv'd Img size: 114448 bytes
13,812,575 UART: ROM Fatal Error: 0x000B0029
13,815,707 >>> mbox cmd response: failed
13,816,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,816,477 >>> mbox cmd response: failed
13,816,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,086 >>> mbox cmd response: failed
Initializing fuses
2,056,012 writing to cptra_bootfsm_go
2,245,286 UART:
2,245,633 UART: Running Caliptra ROM ...
2,246,678 UART:
2,246,832 UART: [state] CFI Enabled
2,317,121 UART: [state] LifecycleState = Unprovisioned
2,319,002 UART: [state] DebugLocked = No
2,320,908 UART: [state] WD Timer not started. Device not locked for debugging
2,325,081 UART: [kat] SHA2-256
2,504,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,750 UART: [kat] ++
2,516,214 UART: [kat] sha1
2,527,638 UART: [kat] SHA2-256
2,530,713 UART: [kat] SHA2-384
2,537,294 UART: [kat] SHA2-512-ACC
2,540,200 UART: [kat] ECC-384
4,999,766 UART: [kat] HMAC-384Kdf
5,024,762 UART: [kat] LMS
5,554,210 UART: [kat] --
5,558,949 UART: [cold-reset] ++
5,560,666 UART: [fht] FHT @ 0x50003400
5,571,481 UART: [idev] ++
5,572,048 UART: [idev] CDI.KEYID = 6
5,573,013 UART: [idev] SUBJECT.KEYID = 7
5,574,171 UART: [idev] UDS.KEYID = 0
5,576,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,720,947 UART: [idev] Erasing UDS.KEYID = 0
8,084,715 UART: [idev] Sha1 KeyId Algorithm
8,108,267 UART: [idev] --
8,111,364 UART: [ldev] ++
8,112,005 UART: [ldev] CDI.KEYID = 6
8,112,954 UART: [ldev] SUBJECT.KEYID = 5
8,114,067 UART: [ldev] AUTHORITY.KEYID = 7
8,115,248 UART: [ldev] FE.KEYID = 1
8,152,793 UART: [ldev] Erasing FE.KEYID = 1
10,657,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,825 UART: [ldev] --
12,466,849 UART: [fwproc] Wait for Commands...
12,469,862 UART: [fwproc] Recv command 0x46574c44
12,471,955 UART: [fwproc] Recv'd Img size: 114448 bytes
15,872,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,329,909 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,363,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,616,427 >>> mbox cmd response: failed
13,617,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,353 >>> mbox cmd response: failed
13,617,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,990 >>> mbox cmd response: failed
Initializing fuses
2,058,932 writing to cptra_bootfsm_go
5,422,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,138,260 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,645 UART:
193,021 UART: Running Caliptra ROM ...
194,229 UART:
603,661 UART: [state] CFI Enabled
616,290 UART: [state] LifecycleState = Unprovisioned
618,144 UART: [state] DebugLocked = No
619,530 UART: [state] WD Timer not started. Device not locked for debugging
623,203 UART: [kat] SHA2-256
802,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,949 UART: [kat] ++
814,483 UART: [kat] sha1
825,690 UART: [kat] SHA2-256
828,698 UART: [kat] SHA2-384
833,914 UART: [kat] SHA2-512-ACC
836,853 UART: [kat] ECC-384
3,276,341 UART: [kat] HMAC-384Kdf
3,288,832 UART: [kat] LMS
3,818,310 UART: [kat] --
3,822,522 UART: [cold-reset] ++
3,824,852 UART: [fht] FHT @ 0x50003400
3,836,486 UART: [idev] ++
3,837,057 UART: [idev] CDI.KEYID = 6
3,837,941 UART: [idev] SUBJECT.KEYID = 7
3,839,209 UART: [idev] UDS.KEYID = 0
3,841,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,834 UART: [idev] Erasing UDS.KEYID = 0
6,308,956 UART: [idev] Sha1 KeyId Algorithm
6,331,986 UART: [idev] --
6,336,308 UART: [ldev] ++
6,336,877 UART: [ldev] CDI.KEYID = 6
6,337,758 UART: [ldev] SUBJECT.KEYID = 5
6,338,922 UART: [ldev] AUTHORITY.KEYID = 7
6,340,129 UART: [ldev] FE.KEYID = 1
6,349,825 UART: [ldev] Erasing FE.KEYID = 1
8,821,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,865 UART: [ldev] --
10,612,217 UART: [fwproc] Wait for Commands...
10,613,809 UART: [fwproc] Recv command 0x46574c44
10,615,959 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,485 UART: ROM Fatal Error: 0x000B0029
14,023,609 >>> mbox cmd response: failed
14,024,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,024,364 >>> mbox cmd response: failed
14,024,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,024,969 >>> mbox cmd response: failed
Initializing fuses
2,056,777 writing to cptra_bootfsm_go
2,246,064 UART:
2,246,416 UART: Running Caliptra ROM ...
2,247,466 UART:
6,429,588 UART: [state] CFI Enabled
6,443,581 UART: [state] LifecycleState = Unprovisioned
6,445,447 UART: [state] DebugLocked = No
6,447,810 UART: [state] WD Timer not started. Device not locked for debugging
6,452,477 UART: [kat] SHA2-256
6,631,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,167 UART: [kat] ++
6,643,757 UART: [kat] sha1
6,655,418 UART: [kat] SHA2-256
6,658,434 UART: [kat] SHA2-384
6,664,690 UART: [kat] SHA2-512-ACC
6,667,633 UART: [kat] ECC-384
9,105,765 UART: [kat] HMAC-384Kdf
9,117,571 UART: [kat] LMS
9,647,072 UART: [kat] --
9,651,994 UART: [cold-reset] ++
9,654,252 UART: [fht] FHT @ 0x50003400
9,665,121 UART: [idev] ++
9,665,696 UART: [idev] CDI.KEYID = 6
9,666,607 UART: [idev] SUBJECT.KEYID = 7
9,667,767 UART: [idev] UDS.KEYID = 0
9,670,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,814,091 UART: [idev] Erasing UDS.KEYID = 0
12,138,185 UART: [idev] Sha1 KeyId Algorithm
12,161,680 UART: [idev] --
12,165,127 UART: [ldev] ++
12,165,691 UART: [ldev] CDI.KEYID = 6
12,166,593 UART: [ldev] SUBJECT.KEYID = 5
12,167,755 UART: [ldev] AUTHORITY.KEYID = 7
12,169,045 UART: [ldev] FE.KEYID = 1
12,180,316 UART: [ldev] Erasing FE.KEYID = 1
14,655,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,373,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,389,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,405,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,420,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,439,994 UART: [ldev] --
16,444,519 UART: [fwproc] Wait for Commands...
16,446,130 UART: [fwproc] Recv command 0x46574c44
16,448,181 UART: [fwproc] Recv'd Img size: 114448 bytes
19,855,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,925,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,994,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,312,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,698,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,814,859 >>> mbox cmd response: failed
13,815,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,816,125 >>> mbox cmd response: failed
13,816,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,816,687 >>> mbox cmd response: failed
Initializing fuses
2,059,899 writing to cptra_bootfsm_go
9,748,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,330,548 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,243 UART:
192,606 UART: Running Caliptra ROM ...
193,752 UART:
193,898 UART: [state] CFI Enabled
263,062 UART: [state] LifecycleState = Unprovisioned
265,478 UART: [state] DebugLocked = No
267,891 UART: [state] WD Timer not started. Device not locked for debugging
273,356 UART: [kat] SHA2-256
463,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,030 UART: [kat] ++
474,479 UART: [kat] sha1
487,194 UART: [kat] SHA2-256
490,197 UART: [kat] SHA2-384
495,426 UART: [kat] SHA2-512-ACC
497,991 UART: [kat] ECC-384
2,948,446 UART: [kat] HMAC-384Kdf
2,971,371 UART: [kat] LMS
3,503,153 UART: [kat] --
3,508,781 UART: [cold-reset] ++
3,510,014 UART: [fht] FHT @ 0x50003400
3,522,252 UART: [idev] ++
3,522,982 UART: [idev] CDI.KEYID = 6
3,523,947 UART: [idev] SUBJECT.KEYID = 7
3,525,102 UART: [idev] UDS.KEYID = 0
3,527,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,216 UART: [idev] Erasing UDS.KEYID = 0
6,050,498 UART: [idev] Sha1 KeyId Algorithm
6,072,278 UART: [idev] --
6,078,221 UART: [ldev] ++
6,078,906 UART: [ldev] CDI.KEYID = 6
6,079,845 UART: [ldev] SUBJECT.KEYID = 5
6,081,012 UART: [ldev] AUTHORITY.KEYID = 7
6,082,249 UART: [ldev] FE.KEYID = 1
6,119,851 UART: [ldev] Erasing FE.KEYID = 1
8,628,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,702 UART: [ldev] --
10,437,935 UART: [fwproc] Wait for Commands...
10,439,442 UART: [fwproc] Recv command 0x46574c44
10,441,375 UART: [fwproc] Recv'd Img size: 114448 bytes
13,887,981 UART: ROM Fatal Error: 0x000B0029
13,891,640 >>> mbox cmd response: failed
13,892,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,892,431 >>> mbox cmd response: failed
13,892,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,892,991 >>> mbox cmd response: failed
Initializing fuses
2,059,376 writing to cptra_bootfsm_go
2,248,732 UART:
2,249,082 UART: Running Caliptra ROM ...
2,250,128 UART:
2,250,290 UART: [state] CFI Enabled
2,323,622 UART: [state] LifecycleState = Unprovisioned
2,326,046 UART: [state] DebugLocked = No
2,327,333 UART: [state] WD Timer not started. Device not locked for debugging
2,331,899 UART: [kat] SHA2-256
2,521,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,571 UART: [kat] ++
2,533,037 UART: [kat] sha1
2,544,336 UART: [kat] SHA2-256
2,547,362 UART: [kat] SHA2-384
2,553,142 UART: [kat] SHA2-512-ACC
2,555,711 UART: [kat] ECC-384
5,010,271 UART: [kat] HMAC-384Kdf
5,034,712 UART: [kat] LMS
5,566,489 UART: [kat] --
5,571,992 UART: [cold-reset] ++
5,574,458 UART: [fht] FHT @ 0x50003400
5,586,299 UART: [idev] ++
5,587,030 UART: [idev] CDI.KEYID = 6
5,587,940 UART: [idev] SUBJECT.KEYID = 7
5,589,155 UART: [idev] UDS.KEYID = 0
5,591,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,735,387 UART: [idev] Erasing UDS.KEYID = 0
8,088,872 UART: [idev] Sha1 KeyId Algorithm
8,111,307 UART: [idev] --
8,116,757 UART: [ldev] ++
8,117,489 UART: [ldev] CDI.KEYID = 6
8,118,380 UART: [ldev] SUBJECT.KEYID = 5
8,119,539 UART: [ldev] AUTHORITY.KEYID = 7
8,120,772 UART: [ldev] FE.KEYID = 1
8,163,192 UART: [ldev] Erasing FE.KEYID = 1
10,670,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,965 UART: [ldev] --
12,475,497 UART: [fwproc] Wait for Commands...
12,477,832 UART: [fwproc] Recv command 0x46574c44
12,480,094 UART: [fwproc] Recv'd Img size: 114448 bytes
15,931,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,009,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,126,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,668,411 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,420,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,250,276 >>> mbox cmd response: failed
14,250,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,251,182 >>> mbox cmd response: failed
14,251,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,251,759 >>> mbox cmd response: failed
Initializing fuses
2,062,452 writing to cptra_bootfsm_go
5,487,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,775,435 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,584 UART:
192,937 UART: Running Caliptra ROM ...
194,135 UART:
603,860 UART: [state] CFI Enabled
618,679 UART: [state] LifecycleState = Unprovisioned
621,037 UART: [state] DebugLocked = No
623,640 UART: [state] WD Timer not started. Device not locked for debugging
628,010 UART: [kat] SHA2-256
817,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,682 UART: [kat] ++
829,186 UART: [kat] sha1
839,956 UART: [kat] SHA2-256
842,967 UART: [kat] SHA2-384
849,217 UART: [kat] SHA2-512-ACC
851,828 UART: [kat] ECC-384
3,294,842 UART: [kat] HMAC-384Kdf
3,308,045 UART: [kat] LMS
3,839,877 UART: [kat] --
3,844,921 UART: [cold-reset] ++
3,847,348 UART: [fht] FHT @ 0x50003400
3,858,132 UART: [idev] ++
3,858,819 UART: [idev] CDI.KEYID = 6
3,859,782 UART: [idev] SUBJECT.KEYID = 7
3,860,941 UART: [idev] UDS.KEYID = 0
3,863,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,561 UART: [idev] Erasing UDS.KEYID = 0
6,338,778 UART: [idev] Sha1 KeyId Algorithm
6,361,534 UART: [idev] --
6,367,365 UART: [ldev] ++
6,368,048 UART: [ldev] CDI.KEYID = 6
6,368,929 UART: [ldev] SUBJECT.KEYID = 5
6,370,138 UART: [ldev] AUTHORITY.KEYID = 7
6,371,375 UART: [ldev] FE.KEYID = 1
6,381,729 UART: [ldev] Erasing FE.KEYID = 1
8,859,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,511 UART: [ldev] --
10,651,694 UART: [fwproc] Wait for Commands...
10,654,341 UART: [fwproc] Recv command 0x46574c44
10,656,600 UART: [fwproc] Recv'd Img size: 114448 bytes
14,101,871 UART: ROM Fatal Error: 0x000B0029
14,105,481 >>> mbox cmd response: failed
14,105,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,106,212 >>> mbox cmd response: failed
14,106,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,106,771 >>> mbox cmd response: failed
Initializing fuses
2,055,702 writing to cptra_bootfsm_go
2,245,012 UART:
2,245,360 UART: Running Caliptra ROM ...
2,246,497 UART:
6,339,976 UART: [state] CFI Enabled
6,354,382 UART: [state] LifecycleState = Unprovisioned
6,356,805 UART: [state] DebugLocked = No
6,358,113 UART: [state] WD Timer not started. Device not locked for debugging
6,363,333 UART: [kat] SHA2-256
6,553,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,563,994 UART: [kat] ++
6,564,510 UART: [kat] sha1
6,576,153 UART: [kat] SHA2-256
6,579,171 UART: [kat] SHA2-384
6,584,406 UART: [kat] SHA2-512-ACC
6,586,972 UART: [kat] ECC-384
9,027,267 UART: [kat] HMAC-384Kdf
9,040,206 UART: [kat] LMS
9,571,993 UART: [kat] --
9,576,156 UART: [cold-reset] ++
9,578,250 UART: [fht] FHT @ 0x50003400
9,589,017 UART: [idev] ++
9,589,705 UART: [idev] CDI.KEYID = 6
9,590,725 UART: [idev] SUBJECT.KEYID = 7
9,591,832 UART: [idev] UDS.KEYID = 0
9,594,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,737,903 UART: [idev] Erasing UDS.KEYID = 0
12,068,494 UART: [idev] Sha1 KeyId Algorithm
12,089,670 UART: [idev] --
12,094,372 UART: [ldev] ++
12,095,055 UART: [ldev] CDI.KEYID = 6
12,095,971 UART: [ldev] SUBJECT.KEYID = 5
12,097,110 UART: [ldev] AUTHORITY.KEYID = 7
12,098,411 UART: [ldev] FE.KEYID = 1
12,107,767 UART: [ldev] Erasing FE.KEYID = 1
14,592,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,311,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,327,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,342,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,357,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,377,133 UART: [ldev] --
16,382,726 UART: [fwproc] Wait for Commands...
16,384,724 UART: [fwproc] Recv command 0x46574c44
16,387,038 UART: [fwproc] Recv'd Img size: 114448 bytes
19,831,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,911,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,027,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,570,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
49 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,758,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,488,880 >>> mbox cmd response: failed
14,489,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,489,774 >>> mbox cmd response: failed
14,490,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,490,337 >>> mbox cmd response: failed
Initializing fuses
2,054,995 writing to cptra_bootfsm_go
9,126,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,315,946 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,730 UART: [kat] SHA2-512-ACC
896,631 UART: [kat] ECC-384
902,204 UART: [kat] HMAC-384Kdf
906,734 UART: [kat] LMS
1,474,930 UART: [kat] --
1,475,791 UART: [cold-reset] ++
1,476,157 UART: [fht] Storing FHT @ 0x50003400
1,479,130 UART: [idev] ++
1,479,298 UART: [idev] CDI.KEYID = 6
1,479,658 UART: [idev] SUBJECT.KEYID = 7
1,480,082 UART: [idev] UDS.KEYID = 0
1,480,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,182 UART: [idev] Erasing UDS.KEYID = 0
1,504,388 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,040 UART: [idev] --
1,514,079 UART: [ldev] ++
1,514,247 UART: [ldev] CDI.KEYID = 6
1,514,610 UART: [ldev] SUBJECT.KEYID = 5
1,515,036 UART: [ldev] AUTHORITY.KEYID = 7
1,515,499 UART: [ldev] FE.KEYID = 1
1,520,637 UART: [ldev] Erasing FE.KEYID = 1
1,545,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,708 UART: [ldev] --
1,584,975 UART: [fwproc] Waiting for Commands...
1,585,806 UART: [fwproc] Received command 0x46574c44
1,586,597 UART: [fwproc] Received Image of size 114448 bytes
2,884,594 UART: ROM Fatal Error: 0x000B0029
2,885,751 >>> mbox cmd response: failed
2,885,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,757 >>> mbox cmd response: failed
2,885,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,620 UART: [idev] ++
1,479,788 UART: [idev] CDI.KEYID = 6
1,480,148 UART: [idev] SUBJECT.KEYID = 7
1,480,572 UART: [idev] UDS.KEYID = 0
1,480,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,521,275 UART: [ldev] Erasing FE.KEYID = 1
1,546,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,984 UART: [ldev] --
1,586,487 UART: [fwproc] Waiting for Commands...
1,587,176 UART: [fwproc] Received command 0x46574c44
1,587,967 UART: [fwproc] Received Image of size 114448 bytes
2,885,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,555 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,036 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,700 >>> mbox cmd response: failed
2,739,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,706 >>> mbox cmd response: failed
2,739,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,946 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,062 UART: [kat] SHA2-256
881,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,108 UART: [kat] ++
886,260 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,943 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,123 UART: [idev] Erasing UDS.KEYID = 0
1,506,093 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,713 UART: [idev] --
1,515,670 UART: [ldev] ++
1,515,838 UART: [ldev] CDI.KEYID = 6
1,516,201 UART: [ldev] SUBJECT.KEYID = 5
1,516,627 UART: [ldev] AUTHORITY.KEYID = 7
1,517,090 UART: [ldev] FE.KEYID = 1
1,522,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,701 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 114448 bytes
2,886,355 UART: ROM Fatal Error: 0x000B0029
2,887,512 >>> mbox cmd response: failed
2,887,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,518 >>> mbox cmd response: failed
2,887,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,575 UART: [kat] LMS
1,475,771 UART: [kat] --
1,476,826 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,599 UART: [idev] --
1,515,528 UART: [ldev] ++
1,515,696 UART: [ldev] CDI.KEYID = 6
1,516,059 UART: [ldev] SUBJECT.KEYID = 5
1,516,485 UART: [ldev] AUTHORITY.KEYID = 7
1,516,948 UART: [ldev] FE.KEYID = 1
1,522,304 UART: [ldev] Erasing FE.KEYID = 1
1,547,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,169 UART: [ldev] --
1,587,534 UART: [fwproc] Waiting for Commands...
1,588,237 UART: [fwproc] Received command 0x46574c44
1,589,028 UART: [fwproc] Received Image of size 114448 bytes
2,888,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,081 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,917 >>> mbox cmd response: failed
2,740,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,923 >>> mbox cmd response: failed
2,740,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,175 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
893,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,713 UART: [kat] ++
897,865 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,178 UART: [kat] HMAC-384Kdf
923,002 UART: [kat] LMS
1,171,330 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,346 UART: [idev] ++
1,175,514 UART: [idev] CDI.KEYID = 6
1,175,874 UART: [idev] SUBJECT.KEYID = 7
1,176,298 UART: [idev] UDS.KEYID = 0
1,176,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,442 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,731 UART: [ldev] ++
1,210,899 UART: [ldev] CDI.KEYID = 6
1,211,262 UART: [ldev] SUBJECT.KEYID = 5
1,211,688 UART: [ldev] AUTHORITY.KEYID = 7
1,212,151 UART: [ldev] FE.KEYID = 1
1,217,145 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,528 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,479 UART: ROM Fatal Error: 0x000B0029
2,582,636 >>> mbox cmd response: failed
2,582,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,642 >>> mbox cmd response: failed
2,582,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
893,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,865 UART: [kat] ++
898,017 UART: [kat] sha1
902,209 UART: [kat] SHA2-256
904,149 UART: [kat] SHA2-384
906,856 UART: [kat] SHA2-512-ACC
908,757 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,519 UART: [fht] FHT @ 0x50003400
1,175,144 UART: [idev] ++
1,175,312 UART: [idev] CDI.KEYID = 6
1,175,672 UART: [idev] SUBJECT.KEYID = 7
1,176,096 UART: [idev] UDS.KEYID = 0
1,176,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,138 UART: [ldev] SUBJECT.KEYID = 5
1,211,564 UART: [ldev] AUTHORITY.KEYID = 7
1,212,027 UART: [ldev] FE.KEYID = 1
1,217,509 UART: [ldev] Erasing FE.KEYID = 1
1,244,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,883 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,814 UART: [fwproc] Recv command 0x46574c44
1,284,542 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,293 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,907 >>> mbox cmd response: failed
2,437,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,913 >>> mbox cmd response: failed
2,437,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,228 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,758 UART: [kat] SHA2-256
903,698 UART: [kat] SHA2-384
906,311 UART: [kat] SHA2-512-ACC
908,212 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,992 UART: [fht] FHT @ 0x50003400
1,175,627 UART: [idev] ++
1,175,795 UART: [idev] CDI.KEYID = 6
1,176,155 UART: [idev] SUBJECT.KEYID = 7
1,176,579 UART: [idev] UDS.KEYID = 0
1,176,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,208 UART: [idev] Sha1 KeyId Algorithm
1,209,642 UART: [idev] --
1,210,820 UART: [ldev] ++
1,210,988 UART: [ldev] CDI.KEYID = 6
1,211,351 UART: [ldev] SUBJECT.KEYID = 5
1,211,777 UART: [ldev] AUTHORITY.KEYID = 7
1,212,240 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,243,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,488 UART: [ldev] --
1,282,909 UART: [fwproc] Wait for Commands...
1,283,709 UART: [fwproc] Recv command 0x46574c44
1,284,437 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,844 UART: ROM Fatal Error: 0x000B0029
2,584,001 >>> mbox cmd response: failed
2,584,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,007 >>> mbox cmd response: failed
2,584,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
893,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,408 UART: [kat] ++
897,560 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,483 UART: [kat] SHA2-512-ACC
908,384 UART: [kat] ECC-384
918,319 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,171,940 UART: [cold-reset] ++
1,172,412 UART: [fht] FHT @ 0x50003400
1,175,099 UART: [idev] ++
1,175,267 UART: [idev] CDI.KEYID = 6
1,175,627 UART: [idev] SUBJECT.KEYID = 7
1,176,051 UART: [idev] UDS.KEYID = 0
1,176,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,743 UART: [idev] Erasing UDS.KEYID = 0
1,200,722 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,819 UART: [ldev] SUBJECT.KEYID = 5
1,211,245 UART: [ldev] AUTHORITY.KEYID = 7
1,211,708 UART: [ldev] FE.KEYID = 1
1,216,962 UART: [ldev] Erasing FE.KEYID = 1
1,243,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,862 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,728 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,092 >>> mbox cmd response: failed
2,438,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,098 >>> mbox cmd response: failed
2,438,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,345 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,997 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,241,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,926 UART: [ldev] --
1,280,290 UART: [fwproc] Wait for Commands...
1,280,943 UART: [fwproc] Recv command 0x46574c44
1,281,676 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,923 UART: ROM Fatal Error: 0x000B0029
2,581,080 >>> mbox cmd response: failed
2,581,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,086 >>> mbox cmd response: failed
2,581,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
915,776 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,174,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,206,995 UART: [idev] --
1,208,008 UART: [ldev] ++
1,208,176 UART: [ldev] CDI.KEYID = 6
1,208,540 UART: [ldev] SUBJECT.KEYID = 5
1,208,967 UART: [ldev] AUTHORITY.KEYID = 7
1,209,430 UART: [ldev] FE.KEYID = 1
1,214,688 UART: [ldev] Erasing FE.KEYID = 1
1,241,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,800 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,282,101 UART: [fwproc] Recv command 0x46574c44
1,282,834 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,065 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,363 >>> mbox cmd response: failed
2,433,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,369 >>> mbox cmd response: failed
2,433,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,285 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,736 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,998 UART: [idev] ++
1,174,166 UART: [idev] CDI.KEYID = 6
1,174,527 UART: [idev] SUBJECT.KEYID = 7
1,174,952 UART: [idev] UDS.KEYID = 0
1,175,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,276 UART: ROM Fatal Error: 0x000B0029
2,582,433 >>> mbox cmd response: failed
2,582,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,439 >>> mbox cmd response: failed
2,582,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,174,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,776 UART: [idev] Erasing UDS.KEYID = 0
1,198,480 UART: [idev] Sha1 KeyId Algorithm
1,207,348 UART: [idev] --
1,208,417 UART: [ldev] ++
1,208,585 UART: [ldev] CDI.KEYID = 6
1,208,949 UART: [ldev] SUBJECT.KEYID = 5
1,209,376 UART: [ldev] AUTHORITY.KEYID = 7
1,209,839 UART: [ldev] FE.KEYID = 1
1,215,479 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,733 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,932 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,242 >>> mbox cmd response: failed
2,433,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,248 >>> mbox cmd response: failed
2,433,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,284 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,997 UART:
192,355 UART: Running Caliptra ROM ...
193,493 UART:
193,641 UART: [state] CFI Enabled
261,810 UART: [state] LifecycleState = Unprovisioned
263,953 UART: [state] DebugLocked = No
265,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,593 UART: [kat] SHA2-256
439,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,809 UART: [kat] ++
450,271 UART: [kat] sha1
461,686 UART: [kat] SHA2-256
464,371 UART: [kat] SHA2-384
470,512 UART: [kat] SHA2-512-ACC
472,847 UART: [kat] ECC-384
2,765,384 UART: [kat] HMAC-384Kdf
2,777,349 UART: [kat] LMS
3,967,647 UART: [kat] --
3,972,573 UART: [cold-reset] ++
3,974,456 UART: [fht] Storing FHT @ 0x50003400
3,985,991 UART: [idev] ++
3,986,566 UART: [idev] CDI.KEYID = 6
3,987,583 UART: [idev] SUBJECT.KEYID = 7
3,988,762 UART: [idev] UDS.KEYID = 0
3,991,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,075 UART: [idev] Erasing UDS.KEYID = 0
7,323,222 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,389 UART: [idev] --
7,348,817 UART: [ldev] ++
7,349,439 UART: [ldev] CDI.KEYID = 6
7,350,354 UART: [ldev] SUBJECT.KEYID = 5
7,351,566 UART: [ldev] AUTHORITY.KEYID = 7
7,352,850 UART: [ldev] FE.KEYID = 1
7,400,039 UART: [ldev] Erasing FE.KEYID = 1
10,732,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,121 UART: [ldev] --
13,092,579 UART: [fwproc] Waiting for Commands...
13,095,216 UART: [fwproc] Received command 0x46574c44
13,097,402 UART: [fwproc] Received Image of size 114124 bytes
15,797,555 UART: ROM Fatal Error: 0x000B003F
15,801,002 >>> mbox cmd response: failed
15,801,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,801,740 >>> mbox cmd response: failed
15,802,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,802,308 >>> mbox cmd response: failed
Initializing fuses
2,055,159 writing to cptra_bootfsm_go
2,244,471 UART:
2,244,814 UART: Running Caliptra ROM ...
2,245,969 UART:
2,246,135 UART: [state] CFI Enabled
2,315,127 UART: [state] LifecycleState = Unprovisioned
2,317,063 UART: [state] DebugLocked = No
2,318,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,839 UART: [kat] SHA2-256
2,493,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,076 UART: [kat] ++
2,504,622 UART: [kat] sha1
2,515,137 UART: [kat] SHA2-256
2,517,824 UART: [kat] SHA2-384
2,523,752 UART: [kat] SHA2-512-ACC
2,526,161 UART: [kat] ECC-384
4,818,020 UART: [kat] HMAC-384Kdf
4,851,328 UART: [kat] LMS
6,041,602 UART: [kat] --
6,045,779 UART: [cold-reset] ++
6,048,210 UART: [fht] Storing FHT @ 0x50003400
6,060,284 UART: [idev] ++
6,060,886 UART: [idev] CDI.KEYID = 6
6,061,807 UART: [idev] SUBJECT.KEYID = 7
6,063,027 UART: [idev] UDS.KEYID = 0
6,065,440 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,945 UART: [idev] Erasing UDS.KEYID = 0
9,397,597 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,940 UART: [idev] --
9,423,137 UART: [ldev] ++
9,423,715 UART: [ldev] CDI.KEYID = 6
9,424,700 UART: [ldev] SUBJECT.KEYID = 5
9,425,903 UART: [ldev] AUTHORITY.KEYID = 7
9,427,140 UART: [ldev] FE.KEYID = 1
9,474,788 UART: [ldev] Erasing FE.KEYID = 1
12,805,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,872 UART: [ldev] --
15,167,431 UART: [fwproc] Waiting for Commands...
15,170,016 UART: [fwproc] Received command 0x46574c44
15,172,205 UART: [fwproc] Received Image of size 114124 bytes
19,228,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,305,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,431 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,809,945 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,567,348 >>> mbox cmd response: failed
15,567,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,568,259 >>> mbox cmd response: failed
15,568,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,568,819 >>> mbox cmd response: failed
Initializing fuses
2,060,711 writing to cptra_bootfsm_go
5,862,204 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,954,063 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,607 UART:
193,061 UART: Running Caliptra ROM ...
194,212 UART:
603,872 UART: [state] CFI Enabled
618,536 UART: [state] LifecycleState = Unprovisioned
620,426 UART: [state] DebugLocked = No
622,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,135 UART: [kat] SHA2-256
796,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,412 UART: [kat] ++
807,893 UART: [kat] sha1
818,770 UART: [kat] SHA2-256
821,453 UART: [kat] SHA2-384
827,321 UART: [kat] SHA2-512-ACC
829,714 UART: [kat] ECC-384
3,116,057 UART: [kat] HMAC-384Kdf
3,127,787 UART: [kat] LMS
4,317,880 UART: [kat] --
4,323,143 UART: [cold-reset] ++
4,325,244 UART: [fht] Storing FHT @ 0x50003400
4,336,805 UART: [idev] ++
4,337,387 UART: [idev] CDI.KEYID = 6
4,338,407 UART: [idev] SUBJECT.KEYID = 7
4,339,630 UART: [idev] UDS.KEYID = 0
4,342,180 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,800 UART: [idev] Erasing UDS.KEYID = 0
7,630,155 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,388 UART: [idev] --
7,655,038 UART: [ldev] ++
7,655,620 UART: [ldev] CDI.KEYID = 6
7,656,588 UART: [ldev] SUBJECT.KEYID = 5
7,657,803 UART: [ldev] AUTHORITY.KEYID = 7
7,659,036 UART: [ldev] FE.KEYID = 1
7,669,847 UART: [ldev] Erasing FE.KEYID = 1
10,956,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,928 UART: [ldev] --
13,317,011 UART: [fwproc] Waiting for Commands...
13,319,921 UART: [fwproc] Received command 0x46574c44
13,322,108 UART: [fwproc] Received Image of size 114124 bytes
16,024,131 UART: ROM Fatal Error: 0x000B003F
16,027,592 >>> mbox cmd response: failed
16,027,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,260 >>> mbox cmd response: failed
16,028,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,866 >>> mbox cmd response: failed
Initializing fuses
2,055,489 writing to cptra_bootfsm_go
2,244,780 UART:
2,245,127 UART: Running Caliptra ROM ...
2,246,222 UART:
4,427,518 UART: [state] CFI Enabled
4,441,249 UART: [state] LifecycleState = Unprovisioned
4,443,166 UART: [state] DebugLocked = No
4,445,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,451,079 UART: [kat] SHA2-256
4,620,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,631,382 UART: [kat] ++
4,631,868 UART: [kat] sha1
4,642,864 UART: [kat] SHA2-256
4,645,563 UART: [kat] SHA2-384
4,651,826 UART: [kat] SHA2-512-ACC
4,654,189 UART: [kat] ECC-384
6,937,930 UART: [kat] HMAC-384Kdf
6,949,031 UART: [kat] LMS
8,139,134 UART: [kat] --
8,144,187 UART: [cold-reset] ++
8,146,400 UART: [fht] Storing FHT @ 0x50003400
8,157,673 UART: [idev] ++
8,158,242 UART: [idev] CDI.KEYID = 6
8,159,260 UART: [idev] SUBJECT.KEYID = 7
8,160,423 UART: [idev] UDS.KEYID = 0
8,162,849 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,306,297 UART: [idev] Erasing UDS.KEYID = 0
11,450,713 UART: [idev] Using Sha1 for KeyId Algorithm
11,472,147 UART: [idev] --
11,476,122 UART: [ldev] ++
11,476,704 UART: [ldev] CDI.KEYID = 6
11,477,671 UART: [ldev] SUBJECT.KEYID = 5
11,478,893 UART: [ldev] AUTHORITY.KEYID = 7
11,480,131 UART: [ldev] FE.KEYID = 1
11,490,075 UART: [ldev] Erasing FE.KEYID = 1
14,782,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,076,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,090,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,105,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,119,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,138,988 UART: [ldev] --
17,143,029 UART: [fwproc] Waiting for Commands...
17,146,052 UART: [fwproc] Received command 0x46574c44
17,148,244 UART: [fwproc] Received Image of size 114124 bytes
21,201,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,277,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,346,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,663,526 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,127,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,750,432 >>> mbox cmd response: failed
15,750,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,289 >>> mbox cmd response: failed
15,751,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,920 >>> mbox cmd response: failed
Initializing fuses
2,057,359 writing to cptra_bootfsm_go
8,246,531 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,173,226 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,385 UART:
192,744 UART: Running Caliptra ROM ...
193,978 UART:
194,133 UART: [state] CFI Enabled
264,876 UART: [state] LifecycleState = Unprovisioned
266,747 UART: [state] DebugLocked = No
268,761 UART: [state] WD Timer not started. Device not locked for debugging
272,801 UART: [kat] SHA2-256
451,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,495 UART: [kat] ++
464,031 UART: [kat] sha1
474,589 UART: [kat] SHA2-256
477,604 UART: [kat] SHA2-384
482,772 UART: [kat] SHA2-512-ACC
485,703 UART: [kat] ECC-384
2,946,622 UART: [kat] HMAC-384Kdf
2,971,056 UART: [kat] LMS
3,500,525 UART: [kat] --
3,505,824 UART: [cold-reset] ++
3,507,706 UART: [fht] FHT @ 0x50003400
3,519,276 UART: [idev] ++
3,519,852 UART: [idev] CDI.KEYID = 6
3,520,766 UART: [idev] SUBJECT.KEYID = 7
3,521,982 UART: [idev] UDS.KEYID = 0
3,524,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,013 UART: [idev] Erasing UDS.KEYID = 0
6,029,644 UART: [idev] Sha1 KeyId Algorithm
6,052,688 UART: [idev] --
6,055,662 UART: [ldev] ++
6,056,238 UART: [ldev] CDI.KEYID = 6
6,057,128 UART: [ldev] SUBJECT.KEYID = 5
6,058,295 UART: [ldev] AUTHORITY.KEYID = 7
6,059,584 UART: [ldev] FE.KEYID = 1
6,102,336 UART: [ldev] Erasing FE.KEYID = 1
8,606,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,924 UART: [ldev] --
10,417,976 UART: [fwproc] Wait for Commands...
10,420,285 UART: [fwproc] Recv command 0x46574c44
10,422,321 UART: [fwproc] Recv'd Img size: 114448 bytes
12,471,855 UART: ROM Fatal Error: 0x000B003F
12,474,983 >>> mbox cmd response: failed
12,475,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,475,771 >>> mbox cmd response: failed
12,476,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,374 >>> mbox cmd response: failed
Initializing fuses
2,055,443 writing to cptra_bootfsm_go
2,244,730 UART:
2,245,081 UART: Running Caliptra ROM ...
2,246,131 UART:
2,246,280 UART: [state] CFI Enabled
2,318,349 UART: [state] LifecycleState = Unprovisioned
2,320,235 UART: [state] DebugLocked = No
2,322,297 UART: [state] WD Timer not started. Device not locked for debugging
2,326,691 UART: [kat] SHA2-256
2,505,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,409 UART: [kat] ++
2,517,872 UART: [kat] sha1
2,528,760 UART: [kat] SHA2-256
2,531,780 UART: [kat] SHA2-384
2,537,413 UART: [kat] SHA2-512-ACC
2,540,358 UART: [kat] ECC-384
5,001,528 UART: [kat] HMAC-384Kdf
5,023,640 UART: [kat] LMS
5,553,130 UART: [kat] --
5,557,716 UART: [cold-reset] ++
5,558,619 UART: [fht] FHT @ 0x50003400
5,570,623 UART: [idev] ++
5,571,194 UART: [idev] CDI.KEYID = 6
5,572,108 UART: [idev] SUBJECT.KEYID = 7
5,573,324 UART: [idev] UDS.KEYID = 0
5,575,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,580 UART: [idev] Erasing UDS.KEYID = 0
8,080,030 UART: [idev] Sha1 KeyId Algorithm
8,102,987 UART: [idev] --
8,106,605 UART: [ldev] ++
8,107,198 UART: [ldev] CDI.KEYID = 6
8,108,106 UART: [ldev] SUBJECT.KEYID = 5
8,109,269 UART: [ldev] AUTHORITY.KEYID = 7
8,110,500 UART: [ldev] FE.KEYID = 1
8,151,989 UART: [ldev] Erasing FE.KEYID = 1
10,656,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,645 UART: [ldev] --
12,467,885 UART: [fwproc] Wait for Commands...
12,469,815 UART: [fwproc] Recv command 0x46574c44
12,471,910 UART: [fwproc] Recv'd Img size: 114448 bytes
15,874,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,948,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,017,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,336,098 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,386,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,277,838 >>> mbox cmd response: failed
12,278,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,278,738 >>> mbox cmd response: failed
12,279,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,279,303 >>> mbox cmd response: failed
Initializing fuses
2,054,323 writing to cptra_bootfsm_go
5,401,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,096,510 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,450 UART:
192,847 UART: Running Caliptra ROM ...
194,059 UART:
603,680 UART: [state] CFI Enabled
617,560 UART: [state] LifecycleState = Unprovisioned
619,443 UART: [state] DebugLocked = No
621,709 UART: [state] WD Timer not started. Device not locked for debugging
625,634 UART: [kat] SHA2-256
804,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,359 UART: [kat] ++
816,802 UART: [kat] sha1
828,120 UART: [kat] SHA2-256
831,166 UART: [kat] SHA2-384
838,173 UART: [kat] SHA2-512-ACC
841,106 UART: [kat] ECC-384
3,282,384 UART: [kat] HMAC-384Kdf
3,294,291 UART: [kat] LMS
3,823,771 UART: [kat] --
3,829,083 UART: [cold-reset] ++
3,830,700 UART: [fht] FHT @ 0x50003400
3,841,794 UART: [idev] ++
3,842,364 UART: [idev] CDI.KEYID = 6
3,843,329 UART: [idev] SUBJECT.KEYID = 7
3,844,489 UART: [idev] UDS.KEYID = 0
3,847,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,207 UART: [idev] Erasing UDS.KEYID = 0
6,314,023 UART: [idev] Sha1 KeyId Algorithm
6,337,201 UART: [idev] --
6,339,843 UART: [ldev] ++
6,340,451 UART: [ldev] CDI.KEYID = 6
6,341,341 UART: [ldev] SUBJECT.KEYID = 5
6,342,472 UART: [ldev] AUTHORITY.KEYID = 7
6,343,815 UART: [ldev] FE.KEYID = 1
6,353,857 UART: [ldev] Erasing FE.KEYID = 1
8,824,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,050 UART: [ldev] --
10,618,191 UART: [fwproc] Wait for Commands...
10,619,854 UART: [fwproc] Recv command 0x46574c44
10,621,954 UART: [fwproc] Recv'd Img size: 114448 bytes
12,672,982 UART: ROM Fatal Error: 0x000B003F
12,676,098 >>> mbox cmd response: failed
12,676,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,745 >>> mbox cmd response: failed
12,677,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,339 >>> mbox cmd response: failed
Initializing fuses
2,057,046 writing to cptra_bootfsm_go
2,246,407 UART:
2,246,754 UART: Running Caliptra ROM ...
2,247,807 UART:
7,765,192 UART: [state] CFI Enabled
7,777,864 UART: [state] LifecycleState = Unprovisioned
7,779,731 UART: [state] DebugLocked = No
7,782,419 UART: [state] WD Timer not started. Device not locked for debugging
7,785,355 UART: [kat] SHA2-256
7,964,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,976,062 UART: [kat] ++
7,976,612 UART: [kat] sha1
7,987,069 UART: [kat] SHA2-256
7,990,097 UART: [kat] SHA2-384
7,995,352 UART: [kat] SHA2-512-ACC
7,998,297 UART: [kat] ECC-384
10,440,412 UART: [kat] HMAC-384Kdf
10,453,126 UART: [kat] LMS
10,982,617 UART: [kat] --
10,985,804 UART: [cold-reset] ++
10,987,302 UART: [fht] FHT @ 0x50003400
10,998,289 UART: [idev] ++
10,998,852 UART: [idev] CDI.KEYID = 6
10,999,866 UART: [idev] SUBJECT.KEYID = 7
11,000,966 UART: [idev] UDS.KEYID = 0
11,003,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,147,183 UART: [idev] Erasing UDS.KEYID = 0
13,470,348 UART: [idev] Sha1 KeyId Algorithm
13,493,904 UART: [idev] --
13,496,515 UART: [ldev] ++
13,497,091 UART: [ldev] CDI.KEYID = 6
13,497,977 UART: [ldev] SUBJECT.KEYID = 5
13,499,108 UART: [ldev] AUTHORITY.KEYID = 7
13,500,448 UART: [ldev] FE.KEYID = 1
13,511,481 UART: [ldev] Erasing FE.KEYID = 1
15,980,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,698,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,730,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,767,248 UART: [ldev] --
17,771,058 UART: [fwproc] Wait for Commands...
17,773,265 UART: [fwproc] Recv command 0x46574c44
17,775,360 UART: [fwproc] Recv'd Img size: 114448 bytes
21,187,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,261,537 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,330,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,648,166 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,698,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,455,807 >>> mbox cmd response: failed
12,456,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,808 >>> mbox cmd response: failed
12,457,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,316 >>> mbox cmd response: failed
Initializing fuses
2,054,697 writing to cptra_bootfsm_go
11,096,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,674,456 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,078 UART:
192,454 UART: Running Caliptra ROM ...
193,659 UART:
193,810 UART: [state] CFI Enabled
263,315 UART: [state] LifecycleState = Unprovisioned
265,726 UART: [state] DebugLocked = No
267,325 UART: [state] WD Timer not started. Device not locked for debugging
272,506 UART: [kat] SHA2-256
462,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,167 UART: [kat] ++
473,617 UART: [kat] sha1
484,553 UART: [kat] SHA2-256
487,566 UART: [kat] SHA2-384
493,271 UART: [kat] SHA2-512-ACC
495,880 UART: [kat] ECC-384
2,949,079 UART: [kat] HMAC-384Kdf
2,970,225 UART: [kat] LMS
3,502,024 UART: [kat] --
3,506,040 UART: [cold-reset] ++
3,508,471 UART: [fht] FHT @ 0x50003400
3,519,994 UART: [idev] ++
3,520,669 UART: [idev] CDI.KEYID = 6
3,521,687 UART: [idev] SUBJECT.KEYID = 7
3,522,845 UART: [idev] UDS.KEYID = 0
3,525,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,725 UART: [idev] Erasing UDS.KEYID = 0
6,027,958 UART: [idev] Sha1 KeyId Algorithm
6,049,604 UART: [idev] --
6,053,803 UART: [ldev] ++
6,054,493 UART: [ldev] CDI.KEYID = 6
6,055,385 UART: [ldev] SUBJECT.KEYID = 5
6,056,620 UART: [ldev] AUTHORITY.KEYID = 7
6,057,803 UART: [ldev] FE.KEYID = 1
6,097,644 UART: [ldev] Erasing FE.KEYID = 1
8,608,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,385 UART: [ldev] --
10,412,194 UART: [fwproc] Wait for Commands...
10,415,370 UART: [fwproc] Recv command 0x46574c44
10,417,684 UART: [fwproc] Recv'd Img size: 114448 bytes
12,505,739 UART: ROM Fatal Error: 0x000B003F
12,509,401 >>> mbox cmd response: failed
12,509,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,066 >>> mbox cmd response: failed
12,510,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,775 >>> mbox cmd response: failed
Initializing fuses
2,054,778 writing to cptra_bootfsm_go
2,244,101 UART:
2,244,452 UART: Running Caliptra ROM ...
2,245,591 UART:
2,245,759 UART: [state] CFI Enabled
2,321,702 UART: [state] LifecycleState = Unprovisioned
2,324,072 UART: [state] DebugLocked = No
2,326,007 UART: [state] WD Timer not started. Device not locked for debugging
2,330,087 UART: [kat] SHA2-256
2,519,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,766 UART: [kat] ++
2,531,335 UART: [kat] sha1
2,543,311 UART: [kat] SHA2-256
2,546,381 UART: [kat] SHA2-384
2,552,531 UART: [kat] SHA2-512-ACC
2,555,109 UART: [kat] ECC-384
5,005,807 UART: [kat] HMAC-384Kdf
5,027,773 UART: [kat] LMS
5,559,520 UART: [kat] --
5,563,367 UART: [cold-reset] ++
5,565,089 UART: [fht] FHT @ 0x50003400
5,577,101 UART: [idev] ++
5,577,790 UART: [idev] CDI.KEYID = 6
5,578,809 UART: [idev] SUBJECT.KEYID = 7
5,579,971 UART: [idev] UDS.KEYID = 0
5,582,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,726,193 UART: [idev] Erasing UDS.KEYID = 0
8,083,667 UART: [idev] Sha1 KeyId Algorithm
8,106,894 UART: [idev] --
8,111,062 UART: [ldev] ++
8,111,762 UART: [ldev] CDI.KEYID = 6
8,112,646 UART: [ldev] SUBJECT.KEYID = 5
8,113,774 UART: [ldev] AUTHORITY.KEYID = 7
8,115,071 UART: [ldev] FE.KEYID = 1
8,155,245 UART: [ldev] Erasing FE.KEYID = 1
10,661,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,135 UART: [ldev] --
12,467,883 UART: [fwproc] Wait for Commands...
12,470,250 UART: [fwproc] Recv command 0x46574c44
12,472,539 UART: [fwproc] Recv'd Img size: 114448 bytes
15,915,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,109,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,653,217 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,442,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,304,317 >>> mbox cmd response: failed
12,304,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,327 >>> mbox cmd response: failed
12,305,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,898 >>> mbox cmd response: failed
Initializing fuses
2,056,444 writing to cptra_bootfsm_go
5,487,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,770,500 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,468 UART:
192,818 UART: Running Caliptra ROM ...
194,025 UART:
603,813 UART: [state] CFI Enabled
616,369 UART: [state] LifecycleState = Unprovisioned
618,716 UART: [state] DebugLocked = No
620,855 UART: [state] WD Timer not started. Device not locked for debugging
625,386 UART: [kat] SHA2-256
815,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,059 UART: [kat] ++
826,619 UART: [kat] sha1
838,073 UART: [kat] SHA2-256
841,083 UART: [kat] SHA2-384
848,312 UART: [kat] SHA2-512-ACC
850,904 UART: [kat] ECC-384
3,295,148 UART: [kat] HMAC-384Kdf
3,307,218 UART: [kat] LMS
3,839,046 UART: [kat] --
3,844,576 UART: [cold-reset] ++
3,845,876 UART: [fht] FHT @ 0x50003400
3,858,206 UART: [idev] ++
3,858,882 UART: [idev] CDI.KEYID = 6
3,859,903 UART: [idev] SUBJECT.KEYID = 7
3,861,062 UART: [idev] UDS.KEYID = 0
3,863,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,595 UART: [idev] Erasing UDS.KEYID = 0
6,337,034 UART: [idev] Sha1 KeyId Algorithm
6,359,630 UART: [idev] --
6,363,302 UART: [ldev] ++
6,363,992 UART: [ldev] CDI.KEYID = 6
6,365,168 UART: [ldev] SUBJECT.KEYID = 5
6,366,245 UART: [ldev] AUTHORITY.KEYID = 7
6,367,428 UART: [ldev] FE.KEYID = 1
6,378,839 UART: [ldev] Erasing FE.KEYID = 1
8,855,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,944 UART: [ldev] --
10,648,323 UART: [fwproc] Wait for Commands...
10,650,440 UART: [fwproc] Recv command 0x46574c44
10,652,701 UART: [fwproc] Recv'd Img size: 114448 bytes
12,734,538 UART: ROM Fatal Error: 0x000B003F
12,738,208 >>> mbox cmd response: failed
12,738,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,955 >>> mbox cmd response: failed
12,739,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,464 >>> mbox cmd response: failed
Initializing fuses
2,058,439 writing to cptra_bootfsm_go
2,247,719 UART:
2,248,063 UART: Running Caliptra ROM ...
2,249,124 UART:
7,713,222 UART: [state] CFI Enabled
7,727,409 UART: [state] LifecycleState = Unprovisioned
7,729,757 UART: [state] DebugLocked = No
7,731,766 UART: [state] WD Timer not started. Device not locked for debugging
7,736,651 UART: [kat] SHA2-256
7,926,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,937,305 UART: [kat] ++
7,937,855 UART: [kat] sha1
7,949,504 UART: [kat] SHA2-256
7,952,513 UART: [kat] SHA2-384
7,958,680 UART: [kat] SHA2-512-ACC
7,961,308 UART: [kat] ECC-384
10,403,925 UART: [kat] HMAC-384Kdf
10,417,664 UART: [kat] LMS
10,949,505 UART: [kat] --
10,954,115 UART: [cold-reset] ++
10,955,566 UART: [fht] FHT @ 0x50003400
10,968,136 UART: [idev] ++
10,968,819 UART: [idev] CDI.KEYID = 6
10,969,755 UART: [idev] SUBJECT.KEYID = 7
10,970,969 UART: [idev] UDS.KEYID = 0
10,973,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,117,081 UART: [idev] Erasing UDS.KEYID = 0
13,447,364 UART: [idev] Sha1 KeyId Algorithm
13,470,325 UART: [idev] --
13,474,613 UART: [ldev] ++
13,475,298 UART: [ldev] CDI.KEYID = 6
13,476,181 UART: [ldev] SUBJECT.KEYID = 5
13,477,394 UART: [ldev] AUTHORITY.KEYID = 7
13,478,495 UART: [ldev] FE.KEYID = 1
13,488,865 UART: [ldev] Erasing FE.KEYID = 1
15,968,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,687,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,717,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,753,966 UART: [ldev] --
17,759,770 UART: [fwproc] Wait for Commands...
17,761,821 UART: [fwproc] Recv command 0x46574c44
17,764,081 UART: [fwproc] Recv'd Img size: 114448 bytes
21,211,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,292,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,408,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,951,460 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,767,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,527,383 >>> mbox cmd response: failed
12,527,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,297 >>> mbox cmd response: failed
12,528,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,859 >>> mbox cmd response: failed
Initializing fuses
2,054,899 writing to cptra_bootfsm_go
11,090,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,287,913 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,504 UART: [kat] SHA2-512-ACC
897,405 UART: [kat] ECC-384
903,012 UART: [kat] HMAC-384Kdf
907,720 UART: [kat] LMS
1,475,916 UART: [kat] --
1,476,559 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,682 UART: [idev] ++
1,479,850 UART: [idev] CDI.KEYID = 6
1,480,210 UART: [idev] SUBJECT.KEYID = 7
1,480,634 UART: [idev] UDS.KEYID = 0
1,480,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,567 UART: [ldev] ++
1,514,735 UART: [ldev] CDI.KEYID = 6
1,515,098 UART: [ldev] SUBJECT.KEYID = 5
1,515,524 UART: [ldev] AUTHORITY.KEYID = 7
1,515,987 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,545,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,086 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,238 UART: [fwproc] Received command 0x46574c44
1,587,029 UART: [fwproc] Received Image of size 114448 bytes
1,634,447 UART: ROM Fatal Error: 0x000B003F
1,635,606 >>> mbox cmd response: failed
1,635,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,612 >>> mbox cmd response: failed
1,635,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,286 UART: [kat] LMS
1,475,482 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,482 UART: [idev] ++
1,479,650 UART: [idev] CDI.KEYID = 6
1,480,010 UART: [idev] SUBJECT.KEYID = 7
1,480,434 UART: [idev] UDS.KEYID = 0
1,480,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,503,942 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,724 UART: [idev] --
1,513,551 UART: [ldev] ++
1,513,719 UART: [ldev] CDI.KEYID = 6
1,514,082 UART: [ldev] SUBJECT.KEYID = 5
1,514,508 UART: [ldev] AUTHORITY.KEYID = 7
1,514,971 UART: [ldev] FE.KEYID = 1
1,520,081 UART: [ldev] Erasing FE.KEYID = 1
1,545,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,502 UART: [ldev] --
1,584,911 UART: [fwproc] Waiting for Commands...
1,585,780 UART: [fwproc] Received command 0x46574c44
1,586,571 UART: [fwproc] Received Image of size 114448 bytes
2,886,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,043 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,097 >>> mbox cmd response: failed
1,486,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,103 >>> mbox cmd response: failed
1,486,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,304 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,676 UART: [kat] SHA2-256
892,614 UART: [kat] SHA2-384
895,137 UART: [kat] SHA2-512-ACC
897,038 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,201 UART: [kat] LMS
1,475,397 UART: [kat] --
1,476,492 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,605 UART: [idev] ++
1,479,773 UART: [idev] CDI.KEYID = 6
1,480,133 UART: [idev] SUBJECT.KEYID = 7
1,480,557 UART: [idev] UDS.KEYID = 0
1,480,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,959 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,549 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,521,910 UART: [ldev] Erasing FE.KEYID = 1
1,546,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,475 UART: [ldev] --
1,585,858 UART: [fwproc] Waiting for Commands...
1,586,593 UART: [fwproc] Received command 0x46574c44
1,587,384 UART: [fwproc] Received Image of size 114448 bytes
1,635,332 UART: ROM Fatal Error: 0x000B003F
1,636,491 >>> mbox cmd response: failed
1,636,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,497 >>> mbox cmd response: failed
1,636,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,661 UART: [kat] LMS
1,475,857 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,087 UART: [idev] ++
1,480,255 UART: [idev] CDI.KEYID = 6
1,480,615 UART: [idev] SUBJECT.KEYID = 7
1,481,039 UART: [idev] UDS.KEYID = 0
1,481,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,133 UART: [idev] Erasing UDS.KEYID = 0
1,505,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,405 UART: [idev] --
1,515,544 UART: [ldev] ++
1,515,712 UART: [ldev] CDI.KEYID = 6
1,516,075 UART: [ldev] SUBJECT.KEYID = 5
1,516,501 UART: [ldev] AUTHORITY.KEYID = 7
1,516,964 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,547,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,543 UART: [ldev] --
1,586,818 UART: [fwproc] Waiting for Commands...
1,587,587 UART: [fwproc] Received command 0x46574c44
1,588,378 UART: [fwproc] Received Image of size 114448 bytes
2,888,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,921 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,480 >>> mbox cmd response: failed
1,489,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,486 >>> mbox cmd response: failed
1,489,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,749 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
893,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,677 UART: [kat] ++
897,829 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,612 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,335 UART: [cold-reset] ++
1,172,711 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,113 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,533 UART: [ldev] ++
1,210,701 UART: [ldev] CDI.KEYID = 6
1,211,064 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,624 UART: ROM Fatal Error: 0x000B003F
1,330,783 >>> mbox cmd response: failed
1,330,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,789 >>> mbox cmd response: failed
1,330,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,075 UART: [kat] SHA2-256
904,015 UART: [kat] SHA2-384
906,758 UART: [kat] SHA2-512-ACC
908,659 UART: [kat] ECC-384
918,412 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,037 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,218 UART: [idev] ++
1,175,386 UART: [idev] CDI.KEYID = 6
1,175,746 UART: [idev] SUBJECT.KEYID = 7
1,176,170 UART: [idev] UDS.KEYID = 0
1,176,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,084 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,169 UART: [idev] --
1,210,327 UART: [ldev] ++
1,210,495 UART: [ldev] CDI.KEYID = 6
1,210,858 UART: [ldev] SUBJECT.KEYID = 5
1,211,284 UART: [ldev] AUTHORITY.KEYID = 7
1,211,747 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,726 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,439 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,946 >>> mbox cmd response: failed
1,186,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,952 >>> mbox cmd response: failed
1,186,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,578 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,174 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,087 UART: [idev] ++
1,175,255 UART: [idev] CDI.KEYID = 6
1,175,615 UART: [idev] SUBJECT.KEYID = 7
1,176,039 UART: [idev] UDS.KEYID = 0
1,176,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,815 UART: [idev] Erasing UDS.KEYID = 0
1,201,194 UART: [idev] Sha1 KeyId Algorithm
1,209,506 UART: [idev] --
1,210,504 UART: [ldev] ++
1,210,672 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,461 UART: [ldev] AUTHORITY.KEYID = 7
1,211,924 UART: [ldev] FE.KEYID = 1
1,217,238 UART: [ldev] Erasing FE.KEYID = 1
1,243,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,768 UART: [ldev] --
1,283,215 UART: [fwproc] Wait for Commands...
1,283,847 UART: [fwproc] Recv command 0x46574c44
1,284,575 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,257 UART: ROM Fatal Error: 0x000B003F
1,333,416 >>> mbox cmd response: failed
1,333,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,422 >>> mbox cmd response: failed
1,333,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,351 UART: [kat] SHA2-512-ACC
908,252 UART: [kat] ECC-384
918,089 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,132 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,195 UART: [idev] ++
1,175,363 UART: [idev] CDI.KEYID = 6
1,175,723 UART: [idev] SUBJECT.KEYID = 7
1,176,147 UART: [idev] UDS.KEYID = 0
1,176,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,450 UART: [idev] Sha1 KeyId Algorithm
1,209,844 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,243,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,500 UART: [ldev] --
1,282,995 UART: [fwproc] Wait for Commands...
1,283,691 UART: [fwproc] Recv command 0x46574c44
1,284,419 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,002 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,051 >>> mbox cmd response: failed
1,186,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,057 >>> mbox cmd response: failed
1,186,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,927 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,655 UART: [cold-reset] ++
1,171,021 UART: [fht] FHT @ 0x50003400
1,173,737 UART: [idev] ++
1,173,905 UART: [idev] CDI.KEYID = 6
1,174,266 UART: [idev] SUBJECT.KEYID = 7
1,174,691 UART: [idev] UDS.KEYID = 0
1,175,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,887 UART: [idev] Erasing UDS.KEYID = 0
1,199,887 UART: [idev] Sha1 KeyId Algorithm
1,209,011 UART: [idev] --
1,209,894 UART: [ldev] ++
1,210,062 UART: [ldev] CDI.KEYID = 6
1,210,426 UART: [ldev] SUBJECT.KEYID = 5
1,210,853 UART: [ldev] AUTHORITY.KEYID = 7
1,211,316 UART: [ldev] FE.KEYID = 1
1,216,330 UART: [ldev] Erasing FE.KEYID = 1
1,242,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,416 UART: [ldev] --
1,281,834 UART: [fwproc] Wait for Commands...
1,282,507 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,575 UART: ROM Fatal Error: 0x000B003F
1,331,734 >>> mbox cmd response: failed
1,331,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,740 >>> mbox cmd response: failed
1,331,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,332 UART: [ldev] ++
1,209,500 UART: [ldev] CDI.KEYID = 6
1,209,864 UART: [ldev] SUBJECT.KEYID = 5
1,210,291 UART: [ldev] AUTHORITY.KEYID = 7
1,210,754 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,242,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,416 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,731 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,735 >>> mbox cmd response: failed
1,183,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,741 >>> mbox cmd response: failed
1,183,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,339 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,174,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,498 UART: [fwproc] Recv command 0x46574c44
1,283,231 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,022 UART: ROM Fatal Error: 0x000B003F
1,332,181 >>> mbox cmd response: failed
1,332,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,187 >>> mbox cmd response: failed
1,332,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,713 UART: [kat] HMAC-384Kdf
921,415 UART: [kat] LMS
1,169,727 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,066 UART: [fht] FHT @ 0x50003400
1,173,592 UART: [idev] ++
1,173,760 UART: [idev] CDI.KEYID = 6
1,174,121 UART: [idev] SUBJECT.KEYID = 7
1,174,546 UART: [idev] UDS.KEYID = 0
1,174,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,336 UART: [idev] Erasing UDS.KEYID = 0
1,199,102 UART: [idev] Sha1 KeyId Algorithm
1,207,950 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,655 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,068 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,390 >>> mbox cmd response: failed
1,183,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,396 >>> mbox cmd response: failed
1,183,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,168 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,129 UART:
192,519 UART: Running Caliptra ROM ...
193,625 UART:
193,769 UART: [state] CFI Enabled
261,864 UART: [state] LifecycleState = Unprovisioned
263,830 UART: [state] DebugLocked = No
266,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,544 UART: [kat] SHA2-256
440,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,769 UART: [kat] ++
451,214 UART: [kat] sha1
461,593 UART: [kat] SHA2-256
464,279 UART: [kat] SHA2-384
469,664 UART: [kat] SHA2-512-ACC
472,000 UART: [kat] ECC-384
2,767,284 UART: [kat] HMAC-384Kdf
2,798,699 UART: [kat] LMS
3,989,012 UART: [kat] --
3,995,262 UART: [cold-reset] ++
3,997,636 UART: [fht] Storing FHT @ 0x50003400
4,008,313 UART: [idev] ++
4,009,094 UART: [idev] CDI.KEYID = 6
4,010,035 UART: [idev] SUBJECT.KEYID = 7
4,011,149 UART: [idev] UDS.KEYID = 0
4,013,844 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,543 UART: [idev] Erasing UDS.KEYID = 0
7,346,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,823 UART: [idev] --
7,373,400 UART: [ldev] ++
7,373,978 UART: [ldev] CDI.KEYID = 6
7,374,956 UART: [ldev] SUBJECT.KEYID = 5
7,376,123 UART: [ldev] AUTHORITY.KEYID = 7
7,377,412 UART: [ldev] FE.KEYID = 1
7,420,864 UART: [ldev] Erasing FE.KEYID = 1
10,753,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,353 UART: [ldev] --
13,114,887 UART: [fwproc] Waiting for Commands...
13,118,065 UART: [fwproc] Received command 0x46574c44
13,120,253 UART: [fwproc] Received Image of size 114124 bytes
15,824,660 UART: ROM Fatal Error: 0x000B003C
15,828,117 >>> mbox cmd response: failed
15,828,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,867 >>> mbox cmd response: failed
15,829,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,829,425 >>> mbox cmd response: failed
Initializing fuses
2,062,233 writing to cptra_bootfsm_go
2,251,544 UART:
2,251,884 UART: Running Caliptra ROM ...
2,253,021 UART:
2,253,189 UART: [state] CFI Enabled
2,309,335 UART: [state] LifecycleState = Unprovisioned
2,311,267 UART: [state] DebugLocked = No
2,313,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,763 UART: [kat] SHA2-256
2,488,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,131 UART: [kat] ++
2,499,612 UART: [kat] sha1
2,510,122 UART: [kat] SHA2-256
2,512,840 UART: [kat] SHA2-384
2,519,478 UART: [kat] SHA2-512-ACC
2,521,827 UART: [kat] ECC-384
4,811,830 UART: [kat] HMAC-384Kdf
4,825,655 UART: [kat] LMS
6,015,970 UART: [kat] --
6,020,615 UART: [cold-reset] ++
6,021,996 UART: [fht] Storing FHT @ 0x50003400
6,032,896 UART: [idev] ++
6,033,470 UART: [idev] CDI.KEYID = 6
6,034,441 UART: [idev] SUBJECT.KEYID = 7
6,035,666 UART: [idev] UDS.KEYID = 0
6,037,897 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,181,518 UART: [idev] Erasing UDS.KEYID = 0
9,370,471 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,447 UART: [idev] --
9,396,756 UART: [ldev] ++
9,397,336 UART: [ldev] CDI.KEYID = 6
9,398,243 UART: [ldev] SUBJECT.KEYID = 5
9,399,501 UART: [ldev] AUTHORITY.KEYID = 7
9,400,739 UART: [ldev] FE.KEYID = 1
9,447,244 UART: [ldev] Erasing FE.KEYID = 1
12,783,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,117 UART: [ldev] --
15,158,255 UART: [fwproc] Waiting for Commands...
15,160,838 UART: [fwproc] Received command 0x46574c44
15,163,036 UART: [fwproc] Received Image of size 114124 bytes
19,212,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,296,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,365,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,682,899 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,804,619 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,551,692 >>> mbox cmd response: failed
15,552,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,552,756 >>> mbox cmd response: failed
15,553,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,553,376 >>> mbox cmd response: failed
Initializing fuses
2,055,663 writing to cptra_bootfsm_go
5,852,903 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,916,371 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,552 UART:
192,905 UART: Running Caliptra ROM ...
194,090 UART:
603,848 UART: [state] CFI Enabled
620,047 UART: [state] LifecycleState = Unprovisioned
621,983 UART: [state] DebugLocked = No
623,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,828 UART: [kat] SHA2-256
798,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,113 UART: [kat] ++
809,559 UART: [kat] sha1
820,672 UART: [kat] SHA2-256
823,355 UART: [kat] SHA2-384
829,493 UART: [kat] SHA2-512-ACC
831,841 UART: [kat] ECC-384
3,116,837 UART: [kat] HMAC-384Kdf
3,127,797 UART: [kat] LMS
4,317,915 UART: [kat] --
4,323,845 UART: [cold-reset] ++
4,324,758 UART: [fht] Storing FHT @ 0x50003400
4,337,024 UART: [idev] ++
4,337,598 UART: [idev] CDI.KEYID = 6
4,338,487 UART: [idev] SUBJECT.KEYID = 7
4,339,755 UART: [idev] UDS.KEYID = 0
4,342,275 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,905 UART: [idev] Erasing UDS.KEYID = 0
7,627,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,919 UART: [idev] --
7,653,295 UART: [ldev] ++
7,653,868 UART: [ldev] CDI.KEYID = 6
7,654,839 UART: [ldev] SUBJECT.KEYID = 5
7,656,000 UART: [ldev] AUTHORITY.KEYID = 7
7,657,293 UART: [ldev] FE.KEYID = 1
7,667,096 UART: [ldev] Erasing FE.KEYID = 1
10,958,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,223 UART: [ldev] --
13,319,760 UART: [fwproc] Waiting for Commands...
13,322,560 UART: [fwproc] Received command 0x46574c44
13,324,750 UART: [fwproc] Received Image of size 114124 bytes
16,025,418 UART: ROM Fatal Error: 0x000B003C
16,028,883 >>> mbox cmd response: failed
16,029,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,670 >>> mbox cmd response: failed
16,029,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,235 >>> mbox cmd response: failed
Initializing fuses
2,055,816 writing to cptra_bootfsm_go
2,245,181 UART:
2,245,531 UART: Running Caliptra ROM ...
2,246,666 UART:
4,431,663 UART: [state] CFI Enabled
4,444,891 UART: [state] LifecycleState = Unprovisioned
4,446,830 UART: [state] DebugLocked = No
4,448,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,071 UART: [kat] SHA2-256
4,623,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,634,346 UART: [kat] ++
4,634,893 UART: [kat] sha1
4,646,167 UART: [kat] SHA2-256
4,648,855 UART: [kat] SHA2-384
4,654,948 UART: [kat] SHA2-512-ACC
4,657,352 UART: [kat] ECC-384
6,941,575 UART: [kat] HMAC-384Kdf
6,952,560 UART: [kat] LMS
8,142,647 UART: [kat] --
8,145,412 UART: [cold-reset] ++
8,147,073 UART: [fht] Storing FHT @ 0x50003400
8,158,508 UART: [idev] ++
8,159,074 UART: [idev] CDI.KEYID = 6
8,159,982 UART: [idev] SUBJECT.KEYID = 7
8,161,251 UART: [idev] UDS.KEYID = 0
8,163,583 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,307,012 UART: [idev] Erasing UDS.KEYID = 0
11,447,085 UART: [idev] Using Sha1 for KeyId Algorithm
11,468,959 UART: [idev] --
11,474,518 UART: [ldev] ++
11,475,136 UART: [ldev] CDI.KEYID = 6
11,476,029 UART: [ldev] SUBJECT.KEYID = 5
11,477,198 UART: [ldev] AUTHORITY.KEYID = 7
11,478,435 UART: [ldev] FE.KEYID = 1
11,489,779 UART: [ldev] Erasing FE.KEYID = 1
14,779,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,074,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,088,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,103,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,118,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,138,059 UART: [ldev] --
17,143,598 UART: [fwproc] Waiting for Commands...
17,146,180 UART: [fwproc] Received command 0x46574c44
17,148,368 UART: [fwproc] Received Image of size 114124 bytes
21,195,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,267,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,336,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,653,140 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,126,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,767,211 >>> mbox cmd response: failed
15,767,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,210 >>> mbox cmd response: failed
15,768,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,778 >>> mbox cmd response: failed
Initializing fuses
2,061,035 writing to cptra_bootfsm_go
8,227,410 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,163,039 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,273 UART:
192,681 UART: Running Caliptra ROM ...
193,835 UART:
193,982 UART: [state] CFI Enabled
261,661 UART: [state] LifecycleState = Unprovisioned
263,526 UART: [state] DebugLocked = No
266,102 UART: [state] WD Timer not started. Device not locked for debugging
269,929 UART: [kat] SHA2-256
449,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,653 UART: [kat] ++
461,186 UART: [kat] sha1
473,420 UART: [kat] SHA2-256
476,481 UART: [kat] SHA2-384
483,482 UART: [kat] SHA2-512-ACC
486,472 UART: [kat] ECC-384
2,948,298 UART: [kat] HMAC-384Kdf
2,969,442 UART: [kat] LMS
3,498,881 UART: [kat] --
3,503,909 UART: [cold-reset] ++
3,504,819 UART: [fht] FHT @ 0x50003400
3,514,667 UART: [idev] ++
3,515,228 UART: [idev] CDI.KEYID = 6
3,516,194 UART: [idev] SUBJECT.KEYID = 7
3,517,294 UART: [idev] UDS.KEYID = 0
3,519,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,101 UART: [idev] Erasing UDS.KEYID = 0
6,022,293 UART: [idev] Sha1 KeyId Algorithm
6,045,150 UART: [idev] --
6,049,416 UART: [ldev] ++
6,049,995 UART: [ldev] CDI.KEYID = 6
6,050,882 UART: [ldev] SUBJECT.KEYID = 5
6,052,044 UART: [ldev] AUTHORITY.KEYID = 7
6,053,337 UART: [ldev] FE.KEYID = 1
6,097,773 UART: [ldev] Erasing FE.KEYID = 1
8,599,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,045 UART: [ldev] --
10,412,668 UART: [fwproc] Wait for Commands...
10,415,669 UART: [fwproc] Recv command 0x46574c44
10,417,724 UART: [fwproc] Recv'd Img size: 114448 bytes
12,467,590 UART: ROM Fatal Error: 0x000B003C
12,470,716 >>> mbox cmd response: failed
12,471,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,471 >>> mbox cmd response: failed
12,471,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,070 >>> mbox cmd response: failed
Initializing fuses
2,074,040 writing to cptra_bootfsm_go
2,263,393 UART:
2,263,746 UART: Running Caliptra ROM ...
2,264,877 UART:
2,265,042 UART: [state] CFI Enabled
2,338,236 UART: [state] LifecycleState = Unprovisioned
2,340,084 UART: [state] DebugLocked = No
2,342,131 UART: [state] WD Timer not started. Device not locked for debugging
2,346,654 UART: [kat] SHA2-256
2,525,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,537,325 UART: [kat] ++
2,537,782 UART: [kat] sha1
2,549,100 UART: [kat] SHA2-256
2,552,089 UART: [kat] SHA2-384
2,557,383 UART: [kat] SHA2-512-ACC
2,560,326 UART: [kat] ECC-384
5,022,064 UART: [kat] HMAC-384Kdf
5,042,965 UART: [kat] LMS
5,572,447 UART: [kat] --
5,577,194 UART: [cold-reset] ++
5,579,399 UART: [fht] FHT @ 0x50003400
5,591,353 UART: [idev] ++
5,591,924 UART: [idev] CDI.KEYID = 6
5,592,859 UART: [idev] SUBJECT.KEYID = 7
5,594,021 UART: [idev] UDS.KEYID = 0
5,596,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,740,665 UART: [idev] Erasing UDS.KEYID = 0
8,097,868 UART: [idev] Sha1 KeyId Algorithm
8,121,373 UART: [idev] --
8,125,676 UART: [ldev] ++
8,126,256 UART: [ldev] CDI.KEYID = 6
8,127,144 UART: [ldev] SUBJECT.KEYID = 5
8,128,300 UART: [ldev] AUTHORITY.KEYID = 7
8,129,585 UART: [ldev] FE.KEYID = 1
8,171,453 UART: [ldev] Erasing FE.KEYID = 1
10,675,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,410,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,426,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,458,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,480,192 UART: [ldev] --
12,485,079 UART: [fwproc] Wait for Commands...
12,488,269 UART: [fwproc] Recv command 0x46574c44
12,490,319 UART: [fwproc] Recv'd Img size: 114448 bytes
15,898,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,042,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,360,599 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,363,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,226,806 >>> mbox cmd response: failed
12,227,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,227,928 >>> mbox cmd response: failed
12,228,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,228,484 >>> mbox cmd response: failed
Initializing fuses
2,060,158 writing to cptra_bootfsm_go
5,422,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,132,524 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,382 UART:
192,767 UART: Running Caliptra ROM ...
193,912 UART:
603,661 UART: [state] CFI Enabled
619,659 UART: [state] LifecycleState = Unprovisioned
621,538 UART: [state] DebugLocked = No
623,125 UART: [state] WD Timer not started. Device not locked for debugging
627,436 UART: [kat] SHA2-256
806,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,149 UART: [kat] ++
818,682 UART: [kat] sha1
830,323 UART: [kat] SHA2-256
833,380 UART: [kat] SHA2-384
840,442 UART: [kat] SHA2-512-ACC
843,371 UART: [kat] ECC-384
3,284,356 UART: [kat] HMAC-384Kdf
3,295,763 UART: [kat] LMS
3,825,275 UART: [kat] --
3,830,718 UART: [cold-reset] ++
3,832,812 UART: [fht] FHT @ 0x50003400
3,844,833 UART: [idev] ++
3,845,403 UART: [idev] CDI.KEYID = 6
3,846,315 UART: [idev] SUBJECT.KEYID = 7
3,847,530 UART: [idev] UDS.KEYID = 0
3,850,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,231 UART: [idev] Erasing UDS.KEYID = 0
6,313,592 UART: [idev] Sha1 KeyId Algorithm
6,336,500 UART: [idev] --
6,340,584 UART: [ldev] ++
6,341,168 UART: [ldev] CDI.KEYID = 6
6,342,055 UART: [ldev] SUBJECT.KEYID = 5
6,343,275 UART: [ldev] AUTHORITY.KEYID = 7
6,344,509 UART: [ldev] FE.KEYID = 1
6,354,513 UART: [ldev] Erasing FE.KEYID = 1
8,827,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,810 UART: [ldev] --
10,618,000 UART: [fwproc] Wait for Commands...
10,619,892 UART: [fwproc] Recv command 0x46574c44
10,621,989 UART: [fwproc] Recv'd Img size: 114448 bytes
12,677,793 UART: ROM Fatal Error: 0x000B003C
12,680,911 >>> mbox cmd response: failed
12,681,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,664 >>> mbox cmd response: failed
12,681,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,268 >>> mbox cmd response: failed
Initializing fuses
2,052,631 writing to cptra_bootfsm_go
2,242,050 UART:
2,242,399 UART: Running Caliptra ROM ...
2,243,544 UART:
7,776,679 UART: [state] CFI Enabled
7,792,735 UART: [state] LifecycleState = Unprovisioned
7,794,601 UART: [state] DebugLocked = No
7,795,780 UART: [state] WD Timer not started. Device not locked for debugging
7,799,310 UART: [kat] SHA2-256
7,978,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,989,969 UART: [kat] ++
7,990,428 UART: [kat] sha1
8,000,827 UART: [kat] SHA2-256
8,003,853 UART: [kat] SHA2-384
8,009,142 UART: [kat] SHA2-512-ACC
8,012,094 UART: [kat] ECC-384
10,452,254 UART: [kat] HMAC-384Kdf
10,464,648 UART: [kat] LMS
10,994,121 UART: [kat] --
10,997,956 UART: [cold-reset] ++
10,999,991 UART: [fht] FHT @ 0x50003400
11,009,723 UART: [idev] ++
11,010,336 UART: [idev] CDI.KEYID = 6
11,011,258 UART: [idev] SUBJECT.KEYID = 7
11,012,367 UART: [idev] UDS.KEYID = 0
11,014,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,158,481 UART: [idev] Erasing UDS.KEYID = 0
13,488,671 UART: [idev] Sha1 KeyId Algorithm
13,511,468 UART: [idev] --
13,515,503 UART: [ldev] ++
13,516,068 UART: [ldev] CDI.KEYID = 6
13,516,979 UART: [ldev] SUBJECT.KEYID = 5
13,518,213 UART: [ldev] AUTHORITY.KEYID = 7
13,519,446 UART: [ldev] FE.KEYID = 1
13,529,606 UART: [ldev] Erasing FE.KEYID = 1
16,006,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,723,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,739,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,755,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,771,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,791,481 UART: [ldev] --
17,796,205 UART: [fwproc] Wait for Commands...
17,799,003 UART: [fwproc] Recv command 0x46574c44
17,801,052 UART: [fwproc] Recv'd Img size: 114448 bytes
21,207,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,279,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,348,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,665,614 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
3,694,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,101 >>> mbox cmd response: failed
12,458,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,053 >>> mbox cmd response: failed
12,459,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,612 >>> mbox cmd response: failed
Initializing fuses
2,053,896 writing to cptra_bootfsm_go
11,098,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,673,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,143 UART:
192,514 UART: Running Caliptra ROM ...
193,649 UART:
193,792 UART: [state] CFI Enabled
263,599 UART: [state] LifecycleState = Unprovisioned
265,981 UART: [state] DebugLocked = No
268,542 UART: [state] WD Timer not started. Device not locked for debugging
273,412 UART: [kat] SHA2-256
463,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,004 UART: [kat] ++
474,489 UART: [kat] sha1
485,643 UART: [kat] SHA2-256
488,659 UART: [kat] SHA2-384
494,260 UART: [kat] SHA2-512-ACC
496,822 UART: [kat] ECC-384
2,945,771 UART: [kat] HMAC-384Kdf
2,969,730 UART: [kat] LMS
3,501,549 UART: [kat] --
3,503,254 UART: [cold-reset] ++
3,505,244 UART: [fht] FHT @ 0x50003400
3,515,913 UART: [idev] ++
3,516,587 UART: [idev] CDI.KEYID = 6
3,517,604 UART: [idev] SUBJECT.KEYID = 7
3,518,786 UART: [idev] UDS.KEYID = 0
3,521,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,654 UART: [idev] Erasing UDS.KEYID = 0
6,025,891 UART: [idev] Sha1 KeyId Algorithm
6,048,593 UART: [idev] --
6,052,786 UART: [ldev] ++
6,053,488 UART: [ldev] CDI.KEYID = 6
6,054,402 UART: [ldev] SUBJECT.KEYID = 5
6,055,573 UART: [ldev] AUTHORITY.KEYID = 7
6,056,807 UART: [ldev] FE.KEYID = 1
6,097,057 UART: [ldev] Erasing FE.KEYID = 1
8,602,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,689 UART: [ldev] --
10,411,387 UART: [fwproc] Wait for Commands...
10,413,645 UART: [fwproc] Recv command 0x46574c44
10,415,905 UART: [fwproc] Recv'd Img size: 114448 bytes
12,496,364 UART: ROM Fatal Error: 0x000B003C
12,500,033 >>> mbox cmd response: failed
12,500,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,774 >>> mbox cmd response: failed
12,501,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,338 >>> mbox cmd response: failed
Initializing fuses
2,059,106 writing to cptra_bootfsm_go
2,248,443 UART:
2,248,790 UART: Running Caliptra ROM ...
2,249,947 UART:
2,250,114 UART: [state] CFI Enabled
2,318,501 UART: [state] LifecycleState = Unprovisioned
2,320,928 UART: [state] DebugLocked = No
2,323,398 UART: [state] WD Timer not started. Device not locked for debugging
2,327,100 UART: [kat] SHA2-256
2,516,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,737 UART: [kat] ++
2,528,243 UART: [kat] sha1
2,539,191 UART: [kat] SHA2-256
2,542,221 UART: [kat] SHA2-384
2,548,101 UART: [kat] SHA2-512-ACC
2,550,674 UART: [kat] ECC-384
5,002,348 UART: [kat] HMAC-384Kdf
5,023,864 UART: [kat] LMS
5,555,629 UART: [kat] --
5,559,224 UART: [cold-reset] ++
5,561,220 UART: [fht] FHT @ 0x50003400
5,571,610 UART: [idev] ++
5,572,296 UART: [idev] CDI.KEYID = 6
5,573,258 UART: [idev] SUBJECT.KEYID = 7
5,574,473 UART: [idev] UDS.KEYID = 0
5,576,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,720,845 UART: [idev] Erasing UDS.KEYID = 0
8,081,637 UART: [idev] Sha1 KeyId Algorithm
8,103,620 UART: [idev] --
8,109,753 UART: [ldev] ++
8,110,451 UART: [ldev] CDI.KEYID = 6
8,111,362 UART: [ldev] SUBJECT.KEYID = 5
8,112,525 UART: [ldev] AUTHORITY.KEYID = 7
8,113,755 UART: [ldev] FE.KEYID = 1
8,152,696 UART: [ldev] Erasing FE.KEYID = 1
10,656,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,700 UART: [ldev] --
12,465,374 UART: [fwproc] Wait for Commands...
12,468,013 UART: [fwproc] Recv command 0x46574c44
12,470,281 UART: [fwproc] Recv'd Img size: 114448 bytes
15,924,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,116,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,660,194 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,418,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,282,860 >>> mbox cmd response: failed
12,283,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,283,788 >>> mbox cmd response: failed
12,284,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,284,360 >>> mbox cmd response: failed
Initializing fuses
2,062,774 writing to cptra_bootfsm_go
5,491,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,792,677 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,607 UART:
192,980 UART: Running Caliptra ROM ...
194,192 UART:
603,948 UART: [state] CFI Enabled
618,743 UART: [state] LifecycleState = Unprovisioned
621,082 UART: [state] DebugLocked = No
624,006 UART: [state] WD Timer not started. Device not locked for debugging
628,101 UART: [kat] SHA2-256
817,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,745 UART: [kat] ++
829,253 UART: [kat] sha1
839,862 UART: [kat] SHA2-256
842,875 UART: [kat] SHA2-384
849,882 UART: [kat] SHA2-512-ACC
852,493 UART: [kat] ECC-384
3,296,508 UART: [kat] HMAC-384Kdf
3,309,550 UART: [kat] LMS
3,841,412 UART: [kat] --
3,845,530 UART: [cold-reset] ++
3,848,115 UART: [fht] FHT @ 0x50003400
3,858,987 UART: [idev] ++
3,859,667 UART: [idev] CDI.KEYID = 6
3,860,682 UART: [idev] SUBJECT.KEYID = 7
3,861,844 UART: [idev] UDS.KEYID = 0
3,864,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,540 UART: [idev] Erasing UDS.KEYID = 0
6,340,728 UART: [idev] Sha1 KeyId Algorithm
6,363,950 UART: [idev] --
6,368,643 UART: [ldev] ++
6,369,331 UART: [ldev] CDI.KEYID = 6
6,370,238 UART: [ldev] SUBJECT.KEYID = 5
6,371,453 UART: [ldev] AUTHORITY.KEYID = 7
6,372,628 UART: [ldev] FE.KEYID = 1
6,383,402 UART: [ldev] Erasing FE.KEYID = 1
8,862,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,677 UART: [ldev] --
10,651,729 UART: [fwproc] Wait for Commands...
10,654,965 UART: [fwproc] Recv command 0x46574c44
10,657,224 UART: [fwproc] Recv'd Img size: 114448 bytes
12,736,795 UART: ROM Fatal Error: 0x000B003C
12,740,446 >>> mbox cmd response: failed
12,740,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,177 >>> mbox cmd response: failed
12,741,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,746 >>> mbox cmd response: failed
Initializing fuses
2,062,333 writing to cptra_bootfsm_go
2,251,626 UART:
2,251,973 UART: Running Caliptra ROM ...
2,253,026 UART:
7,709,036 UART: [state] CFI Enabled
7,724,106 UART: [state] LifecycleState = Unprovisioned
7,726,466 UART: [state] DebugLocked = No
7,727,965 UART: [state] WD Timer not started. Device not locked for debugging
7,732,205 UART: [kat] SHA2-256
7,922,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,932,908 UART: [kat] ++
7,933,450 UART: [kat] sha1
7,946,240 UART: [kat] SHA2-256
7,949,278 UART: [kat] SHA2-384
7,956,250 UART: [kat] SHA2-512-ACC
7,958,875 UART: [kat] ECC-384
10,401,053 UART: [kat] HMAC-384Kdf
10,414,157 UART: [kat] LMS
10,946,013 UART: [kat] --
10,949,752 UART: [cold-reset] ++
10,951,966 UART: [fht] FHT @ 0x50003400
10,963,159 UART: [idev] ++
10,963,836 UART: [idev] CDI.KEYID = 6
10,964,805 UART: [idev] SUBJECT.KEYID = 7
10,966,018 UART: [idev] UDS.KEYID = 0
10,968,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,112,165 UART: [idev] Erasing UDS.KEYID = 0
13,438,482 UART: [idev] Sha1 KeyId Algorithm
13,460,198 UART: [idev] --
13,465,121 UART: [ldev] ++
13,465,865 UART: [ldev] CDI.KEYID = 6
13,466,790 UART: [ldev] SUBJECT.KEYID = 5
13,467,950 UART: [ldev] AUTHORITY.KEYID = 7
13,469,124 UART: [ldev] FE.KEYID = 1
13,480,396 UART: [ldev] Erasing FE.KEYID = 1
15,960,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,711,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,726,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,747,411 UART: [ldev] --
17,752,956 UART: [fwproc] Wait for Commands...
17,755,646 UART: [fwproc] Recv command 0x46574c44
17,757,958 UART: [fwproc] Recv'd Img size: 114448 bytes
21,197,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,276,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,392,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,936,417 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,753,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,512,432 >>> mbox cmd response: failed
12,512,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,282 >>> mbox cmd response: failed
12,513,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,867 >>> mbox cmd response: failed
Initializing fuses
2,056,861 writing to cptra_bootfsm_go
11,105,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,305,617 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,380 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,476,107 UART: [cold-reset] ++
1,476,559 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,248 UART: [idev] Erasing UDS.KEYID = 0
1,503,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,560 UART: [idev] --
1,513,683 UART: [ldev] ++
1,513,851 UART: [ldev] CDI.KEYID = 6
1,514,214 UART: [ldev] SUBJECT.KEYID = 5
1,514,640 UART: [ldev] AUTHORITY.KEYID = 7
1,515,103 UART: [ldev] FE.KEYID = 1
1,520,139 UART: [ldev] Erasing FE.KEYID = 1
1,545,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,612 UART: [ldev] --
1,584,877 UART: [fwproc] Waiting for Commands...
1,585,704 UART: [fwproc] Received command 0x46574c44
1,586,495 UART: [fwproc] Received Image of size 114448 bytes
1,633,857 UART: ROM Fatal Error: 0x000B003C
1,635,016 >>> mbox cmd response: failed
1,635,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,022 >>> mbox cmd response: failed
1,635,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,965 UART: [kat] SHA2-256
881,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,011 UART: [kat] ++
886,163 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
894,924 UART: [kat] SHA2-512-ACC
896,825 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,580 UART: [kat] LMS
1,474,776 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,231 UART: [fht] Storing FHT @ 0x50003400
1,478,880 UART: [idev] ++
1,479,048 UART: [idev] CDI.KEYID = 6
1,479,408 UART: [idev] SUBJECT.KEYID = 7
1,479,832 UART: [idev] UDS.KEYID = 0
1,480,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,618 UART: [idev] Erasing UDS.KEYID = 0
1,503,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,354 UART: [idev] --
1,513,433 UART: [ldev] ++
1,513,601 UART: [ldev] CDI.KEYID = 6
1,513,964 UART: [ldev] SUBJECT.KEYID = 5
1,514,390 UART: [ldev] AUTHORITY.KEYID = 7
1,514,853 UART: [ldev] FE.KEYID = 1
1,520,393 UART: [ldev] Erasing FE.KEYID = 1
1,545,512 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,120 UART: [ldev] --
1,584,589 UART: [fwproc] Waiting for Commands...
1,585,428 UART: [fwproc] Received command 0x46574c44
1,586,219 UART: [fwproc] Received Image of size 114448 bytes
2,885,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,135 >>> mbox cmd response: failed
1,488,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,141 >>> mbox cmd response: failed
1,488,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,709 UART: [kat] LMS
1,475,905 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,081 UART: [idev] Erasing UDS.KEYID = 0
1,505,603 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,289 UART: [idev] --
1,515,344 UART: [ldev] ++
1,515,512 UART: [ldev] CDI.KEYID = 6
1,515,875 UART: [ldev] SUBJECT.KEYID = 5
1,516,301 UART: [ldev] AUTHORITY.KEYID = 7
1,516,764 UART: [ldev] FE.KEYID = 1
1,521,958 UART: [ldev] Erasing FE.KEYID = 1
1,546,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,123 UART: [ldev] --
1,586,456 UART: [fwproc] Waiting for Commands...
1,587,245 UART: [fwproc] Received command 0x46574c44
1,588,036 UART: [fwproc] Received Image of size 114448 bytes
1,635,120 UART: ROM Fatal Error: 0x000B003C
1,636,279 >>> mbox cmd response: failed
1,636,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,285 >>> mbox cmd response: failed
1,636,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,411 UART: [kat] LMS
1,475,607 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,940 UART: [fht] Storing FHT @ 0x50003400
1,479,787 UART: [idev] ++
1,479,955 UART: [idev] CDI.KEYID = 6
1,480,315 UART: [idev] SUBJECT.KEYID = 7
1,480,739 UART: [idev] UDS.KEYID = 0
1,481,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,059 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,285 UART: [idev] --
1,515,340 UART: [ldev] ++
1,515,508 UART: [ldev] CDI.KEYID = 6
1,515,871 UART: [ldev] SUBJECT.KEYID = 5
1,516,297 UART: [ldev] AUTHORITY.KEYID = 7
1,516,760 UART: [ldev] FE.KEYID = 1
1,521,742 UART: [ldev] Erasing FE.KEYID = 1
1,547,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,563 UART: [ldev] --
1,586,852 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 114448 bytes
2,887,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,975 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,102 >>> mbox cmd response: failed
1,489,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,108 >>> mbox cmd response: failed
1,489,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,829 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
892,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,053 UART: [kat] ++
897,205 UART: [kat] sha1
901,255 UART: [kat] SHA2-256
903,195 UART: [kat] SHA2-384
906,012 UART: [kat] SHA2-512-ACC
907,913 UART: [kat] ECC-384
917,398 UART: [kat] HMAC-384Kdf
921,798 UART: [kat] LMS
1,170,126 UART: [kat] --
1,170,897 UART: [cold-reset] ++
1,171,365 UART: [fht] FHT @ 0x50003400
1,174,058 UART: [idev] ++
1,174,226 UART: [idev] CDI.KEYID = 6
1,174,586 UART: [idev] SUBJECT.KEYID = 7
1,175,010 UART: [idev] UDS.KEYID = 0
1,175,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,320 UART: ROM Fatal Error: 0x000B003C
1,332,479 >>> mbox cmd response: failed
1,332,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,485 >>> mbox cmd response: failed
1,332,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,806 UART: [kat] HMAC-384Kdf
922,274 UART: [kat] LMS
1,170,602 UART: [kat] --
1,171,395 UART: [cold-reset] ++
1,171,919 UART: [fht] FHT @ 0x50003400
1,174,582 UART: [idev] ++
1,174,750 UART: [idev] CDI.KEYID = 6
1,175,110 UART: [idev] SUBJECT.KEYID = 7
1,175,534 UART: [idev] UDS.KEYID = 0
1,175,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,532 UART: [idev] Erasing UDS.KEYID = 0
1,200,389 UART: [idev] Sha1 KeyId Algorithm
1,208,879 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,150 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,933 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,154 >>> mbox cmd response: failed
1,186,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,160 >>> mbox cmd response: failed
1,186,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,586 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,055 UART: [state] LifecycleState = Unprovisioned
86,710 UART: [state] DebugLocked = No
87,258 UART: [state] WD Timer not started. Device not locked for debugging
88,585 UART: [kat] SHA2-256
894,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,360 UART: [kat] ++
898,512 UART: [kat] sha1
902,820 UART: [kat] SHA2-256
904,760 UART: [kat] SHA2-384
907,605 UART: [kat] SHA2-512-ACC
909,506 UART: [kat] ECC-384
919,551 UART: [kat] HMAC-384Kdf
924,135 UART: [kat] LMS
1,172,463 UART: [kat] --
1,173,188 UART: [cold-reset] ++
1,173,736 UART: [fht] FHT @ 0x50003400
1,176,559 UART: [idev] ++
1,176,727 UART: [idev] CDI.KEYID = 6
1,177,087 UART: [idev] SUBJECT.KEYID = 7
1,177,511 UART: [idev] UDS.KEYID = 0
1,177,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,917 UART: [idev] Erasing UDS.KEYID = 0
1,203,616 UART: [idev] Sha1 KeyId Algorithm
1,212,064 UART: [idev] --
1,213,136 UART: [ldev] ++
1,213,304 UART: [ldev] CDI.KEYID = 6
1,213,667 UART: [ldev] SUBJECT.KEYID = 5
1,214,093 UART: [ldev] AUTHORITY.KEYID = 7
1,214,556 UART: [ldev] FE.KEYID = 1
1,219,674 UART: [ldev] Erasing FE.KEYID = 1
1,246,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,968 UART: [ldev] --
1,285,345 UART: [fwproc] Wait for Commands...
1,286,093 UART: [fwproc] Recv command 0x46574c44
1,286,821 UART: [fwproc] Recv'd Img size: 114448 bytes
1,334,491 UART: ROM Fatal Error: 0x000B003C
1,335,650 >>> mbox cmd response: failed
1,335,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,656 >>> mbox cmd response: failed
1,335,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,301 UART: [kat] LMS
1,171,629 UART: [kat] --
1,172,708 UART: [cold-reset] ++
1,173,230 UART: [fht] FHT @ 0x50003400
1,175,785 UART: [idev] ++
1,175,953 UART: [idev] CDI.KEYID = 6
1,176,313 UART: [idev] SUBJECT.KEYID = 7
1,176,737 UART: [idev] UDS.KEYID = 0
1,177,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,202,080 UART: [idev] Sha1 KeyId Algorithm
1,210,650 UART: [idev] --
1,211,506 UART: [ldev] ++
1,211,674 UART: [ldev] CDI.KEYID = 6
1,212,037 UART: [ldev] SUBJECT.KEYID = 5
1,212,463 UART: [ldev] AUTHORITY.KEYID = 7
1,212,926 UART: [ldev] FE.KEYID = 1
1,217,910 UART: [ldev] Erasing FE.KEYID = 1
1,244,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,956 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,284,069 UART: [fwproc] Recv command 0x46574c44
1,284,797 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,344 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,709 >>> mbox cmd response: failed
1,188,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,715 >>> mbox cmd response: failed
1,188,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,835 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,978 UART: [kat] SHA2-512-ACC
905,879 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,785 UART: [fht] FHT @ 0x50003400
1,172,449 UART: [idev] ++
1,172,617 UART: [idev] CDI.KEYID = 6
1,172,978 UART: [idev] SUBJECT.KEYID = 7
1,173,403 UART: [idev] UDS.KEYID = 0
1,173,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,825 UART: [idev] Erasing UDS.KEYID = 0
1,197,753 UART: [idev] Sha1 KeyId Algorithm
1,206,649 UART: [idev] --
1,207,564 UART: [ldev] ++
1,207,732 UART: [ldev] CDI.KEYID = 6
1,208,096 UART: [ldev] SUBJECT.KEYID = 5
1,208,523 UART: [ldev] AUTHORITY.KEYID = 7
1,208,986 UART: [ldev] FE.KEYID = 1
1,214,180 UART: [ldev] Erasing FE.KEYID = 1
1,240,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,108 UART: [ldev] --
1,279,560 UART: [fwproc] Wait for Commands...
1,280,147 UART: [fwproc] Recv command 0x46574c44
1,280,880 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,359 UART: ROM Fatal Error: 0x000B003C
1,328,518 >>> mbox cmd response: failed
1,328,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,524 >>> mbox cmd response: failed
1,328,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,297 UART: [kat] SHA2-256
901,237 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
915,646 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,174,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,542 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,368 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,897 >>> mbox cmd response: failed
1,182,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,903 >>> mbox cmd response: failed
1,182,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,891 UART: [kat] HMAC-384Kdf
921,603 UART: [kat] LMS
1,169,915 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,373 UART: [idev] SUBJECT.KEYID = 7
1,174,798 UART: [idev] UDS.KEYID = 0
1,175,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,018 UART: [idev] Erasing UDS.KEYID = 0
1,200,374 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,603 UART: [ldev] SUBJECT.KEYID = 5
1,211,030 UART: [ldev] AUTHORITY.KEYID = 7
1,211,493 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,243,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,310 UART: [fwproc] Recv command 0x46574c44
1,284,043 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,292 UART: ROM Fatal Error: 0x000B003C
1,333,451 >>> mbox cmd response: failed
1,333,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,457 >>> mbox cmd response: failed
1,333,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,847 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,350 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,406 >>> mbox cmd response: failed
1,183,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,412 >>> mbox cmd response: failed
1,183,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,518 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,333 UART:
192,699 UART: Running Caliptra ROM ...
193,871 UART:
194,043 UART: [state] CFI Enabled
260,182 UART: [state] LifecycleState = Manufacturing
262,103 UART: [state] DebugLocked = No
264,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,269 UART: [kat] SHA2-256
439,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,472 UART: [kat] ++
450,917 UART: [kat] sha1
460,547 UART: [kat] SHA2-256
463,234 UART: [kat] SHA2-384
469,349 UART: [kat] SHA2-512-ACC
471,683 UART: [kat] ECC-384
2,765,091 UART: [kat] HMAC-384Kdf
2,791,575 UART: [kat] LMS
3,981,890 UART: [kat] --
3,987,316 UART: [cold-reset] ++
3,988,276 UART: [fht] Storing FHT @ 0x50003400
3,998,797 UART: [idev] ++
3,999,377 UART: [idev] CDI.KEYID = 6
4,000,292 UART: [idev] SUBJECT.KEYID = 7
4,001,571 UART: [idev] UDS.KEYID = 0
4,004,527 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,148,312 UART: [idev] Erasing UDS.KEYID = 0
7,340,102 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,768 UART: [idev] --
7,365,423 UART: [ldev] ++
7,366,062 UART: [ldev] CDI.KEYID = 6
7,366,978 UART: [ldev] SUBJECT.KEYID = 5
7,368,195 UART: [ldev] AUTHORITY.KEYID = 7
7,369,426 UART: [ldev] FE.KEYID = 1
7,414,643 UART: [ldev] Erasing FE.KEYID = 1
10,749,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,625 UART: [ldev] --
13,128,676 UART: [fwproc] Waiting for Commands...
13,131,964 UART: [fwproc] Received command 0x46574c44
13,134,202 UART: [fwproc] Received Image of size 114124 bytes
17,220,959 UART: ROM Fatal Error: 0x000B002C
17,224,387 >>> mbox cmd response: failed
17,224,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,225,152 >>> mbox cmd response: failed
17,225,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,225,712 >>> mbox cmd response: failed
Initializing fuses
2,057,283 writing to cptra_bootfsm_go
2,246,585 UART:
2,246,931 UART: Running Caliptra ROM ...
2,248,068 UART:
2,248,239 UART: [state] CFI Enabled
2,310,527 UART: [state] LifecycleState = Manufacturing
2,312,460 UART: [state] DebugLocked = No
2,313,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,240 UART: [kat] SHA2-256
2,488,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,467 UART: [kat] ++
2,499,969 UART: [kat] sha1
2,510,807 UART: [kat] SHA2-256
2,513,503 UART: [kat] SHA2-384
2,519,834 UART: [kat] SHA2-512-ACC
2,522,235 UART: [kat] ECC-384
4,814,970 UART: [kat] HMAC-384Kdf
4,826,008 UART: [kat] LMS
6,016,315 UART: [kat] --
6,021,904 UART: [cold-reset] ++
6,022,977 UART: [fht] Storing FHT @ 0x50003400
6,034,623 UART: [idev] ++
6,035,189 UART: [idev] CDI.KEYID = 6
6,036,153 UART: [idev] SUBJECT.KEYID = 7
6,037,368 UART: [idev] UDS.KEYID = 0
6,040,229 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,183,748 UART: [idev] Erasing UDS.KEYID = 0
9,371,868 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,846 UART: [idev] --
9,396,495 UART: [ldev] ++
9,397,085 UART: [ldev] CDI.KEYID = 6
9,398,055 UART: [ldev] SUBJECT.KEYID = 5
9,399,465 UART: [ldev] AUTHORITY.KEYID = 7
9,400,658 UART: [ldev] FE.KEYID = 1
9,449,250 UART: [ldev] Erasing FE.KEYID = 1
12,781,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,160 UART: [ldev] --
15,162,923 UART: [fwproc] Waiting for Commands...
15,165,353 UART: [fwproc] Received command 0x46574c44
15,167,549 UART: [fwproc] Received Image of size 114124 bytes
19,251,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,328,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,397,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,713,825 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,785,530 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,137,465 >>> mbox cmd response: failed
17,138,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,138,419 >>> mbox cmd response: failed
17,138,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,138,978 >>> mbox cmd response: failed
Initializing fuses
2,045,704 writing to cptra_bootfsm_go
5,819,246 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,903,002 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,535 UART:
192,903 UART: Running Caliptra ROM ...
194,026 UART:
603,555 UART: [state] CFI Enabled
614,108 UART: [state] LifecycleState = Manufacturing
616,046 UART: [state] DebugLocked = No
617,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,599 UART: [kat] SHA2-256
792,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,899 UART: [kat] ++
803,487 UART: [kat] sha1
815,016 UART: [kat] SHA2-256
817,700 UART: [kat] SHA2-384
823,401 UART: [kat] SHA2-512-ACC
825,766 UART: [kat] ECC-384
3,109,202 UART: [kat] HMAC-384Kdf
3,122,098 UART: [kat] LMS
4,312,213 UART: [kat] --
4,316,345 UART: [cold-reset] ++
4,318,180 UART: [fht] Storing FHT @ 0x50003400
4,329,449 UART: [idev] ++
4,330,023 UART: [idev] CDI.KEYID = 6
4,331,150 UART: [idev] SUBJECT.KEYID = 7
4,332,259 UART: [idev] UDS.KEYID = 0
4,335,249 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,843 UART: [idev] Erasing UDS.KEYID = 0
7,618,953 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,391 UART: [idev] --
7,644,687 UART: [ldev] ++
7,645,323 UART: [ldev] CDI.KEYID = 6
7,646,279 UART: [ldev] SUBJECT.KEYID = 5
7,647,443 UART: [ldev] AUTHORITY.KEYID = 7
7,648,731 UART: [ldev] FE.KEYID = 1
7,660,404 UART: [ldev] Erasing FE.KEYID = 1
10,948,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,132 UART: [ldev] --
13,306,215 UART: [fwproc] Waiting for Commands...
13,308,258 UART: [fwproc] Received command 0x46574c44
13,310,444 UART: [fwproc] Received Image of size 114124 bytes
17,390,486 UART: ROM Fatal Error: 0x000B002C
17,393,884 >>> mbox cmd response: failed
17,394,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,394,695 >>> mbox cmd response: failed
17,394,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,395,249 >>> mbox cmd response: failed
Initializing fuses
2,054,126 writing to cptra_bootfsm_go
2,243,429 UART:
2,243,889 UART: Running Caliptra ROM ...
2,244,940 UART:
3,065,994 UART: [state] CFI Enabled
3,081,856 UART: [state] LifecycleState = Manufacturing
3,083,774 UART: [state] DebugLocked = No
3,086,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,092,407 UART: [kat] SHA2-256
3,262,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,272,715 UART: [kat] ++
3,273,207 UART: [kat] sha1
3,283,821 UART: [kat] SHA2-256
3,286,557 UART: [kat] SHA2-384
3,293,262 UART: [kat] SHA2-512-ACC
3,295,617 UART: [kat] ECC-384
5,577,984 UART: [kat] HMAC-384Kdf
5,589,454 UART: [kat] LMS
6,779,565 UART: [kat] --
6,782,385 UART: [cold-reset] ++
6,784,969 UART: [fht] Storing FHT @ 0x50003400
6,797,149 UART: [idev] ++
6,797,731 UART: [idev] CDI.KEYID = 6
6,798,701 UART: [idev] SUBJECT.KEYID = 7
6,799,956 UART: [idev] UDS.KEYID = 0
6,802,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,946,052 UART: [idev] Erasing UDS.KEYID = 0
10,090,489 UART: [idev] Using Sha1 for KeyId Algorithm
10,111,884 UART: [idev] --
10,115,875 UART: [ldev] ++
10,116,443 UART: [ldev] CDI.KEYID = 6
10,117,381 UART: [ldev] SUBJECT.KEYID = 5
10,118,646 UART: [ldev] AUTHORITY.KEYID = 7
10,119,885 UART: [ldev] FE.KEYID = 1
10,130,019 UART: [ldev] Erasing FE.KEYID = 1
13,421,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,717,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,731,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,746,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,761,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,780,792 UART: [ldev] --
15,785,246 UART: [fwproc] Waiting for Commands...
15,787,632 UART: [fwproc] Received command 0x46574c44
15,789,826 UART: [fwproc] Received Image of size 114124 bytes
19,870,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,950,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,018,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,335,954 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,131,323 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,379,066 >>> mbox cmd response: failed
17,379,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,092 >>> mbox cmd response: failed
17,380,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,660 >>> mbox cmd response: failed
Initializing fuses
2,046,083 writing to cptra_bootfsm_go
6,616,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,596,277 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,270 UART:
192,640 UART: Running Caliptra ROM ...
193,829 UART:
193,983 UART: [state] CFI Enabled
262,819 UART: [state] LifecycleState = Manufacturing
264,700 UART: [state] DebugLocked = No
267,648 UART: [state] WD Timer not started. Device not locked for debugging
271,242 UART: [kat] SHA2-256
450,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,966 UART: [kat] ++
462,504 UART: [kat] sha1
472,251 UART: [kat] SHA2-256
475,266 UART: [kat] SHA2-384
480,763 UART: [kat] SHA2-512-ACC
483,749 UART: [kat] ECC-384
2,947,535 UART: [kat] HMAC-384Kdf
2,968,944 UART: [kat] LMS
3,498,371 UART: [kat] --
3,503,252 UART: [cold-reset] ++
3,505,463 UART: [fht] FHT @ 0x50003400
3,518,010 UART: [idev] ++
3,518,586 UART: [idev] CDI.KEYID = 6
3,519,650 UART: [idev] SUBJECT.KEYID = 7
3,520,753 UART: [idev] UDS.KEYID = 0
3,523,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,667 UART: [idev] Erasing UDS.KEYID = 0
6,022,643 UART: [idev] Sha1 KeyId Algorithm
6,046,648 UART: [idev] --
6,050,236 UART: [ldev] ++
6,050,808 UART: [ldev] CDI.KEYID = 6
6,051,733 UART: [ldev] SUBJECT.KEYID = 5
6,052,895 UART: [ldev] AUTHORITY.KEYID = 7
6,054,184 UART: [ldev] FE.KEYID = 1
6,093,312 UART: [ldev] Erasing FE.KEYID = 1
8,598,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,907 UART: [ldev] --
10,408,573 UART: [fwproc] Wait for Commands...
10,410,231 UART: [fwproc] Recv command 0x46574c44
10,412,330 UART: [fwproc] Recv'd Img size: 114448 bytes
13,850,751 UART: ROM Fatal Error: 0x000B002C
13,853,897 >>> mbox cmd response: failed
13,854,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,854,624 >>> mbox cmd response: failed
13,854,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,855,226 >>> mbox cmd response: failed
Initializing fuses
2,052,229 writing to cptra_bootfsm_go
2,241,540 UART:
2,241,892 UART: Running Caliptra ROM ...
2,242,942 UART:
2,243,095 UART: [state] CFI Enabled
2,314,033 UART: [state] LifecycleState = Manufacturing
2,315,875 UART: [state] DebugLocked = No
2,318,882 UART: [state] WD Timer not started. Device not locked for debugging
2,322,717 UART: [kat] SHA2-256
2,501,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,382 UART: [kat] ++
2,513,924 UART: [kat] sha1
2,525,574 UART: [kat] SHA2-256
2,528,589 UART: [kat] SHA2-384
2,533,068 UART: [kat] SHA2-512-ACC
2,536,021 UART: [kat] ECC-384
4,999,668 UART: [kat] HMAC-384Kdf
5,023,302 UART: [kat] LMS
5,552,767 UART: [kat] --
5,556,595 UART: [cold-reset] ++
5,557,826 UART: [fht] FHT @ 0x50003400
5,568,784 UART: [idev] ++
5,569,343 UART: [idev] CDI.KEYID = 6
5,570,246 UART: [idev] SUBJECT.KEYID = 7
5,571,459 UART: [idev] UDS.KEYID = 0
5,573,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,042 UART: [idev] Erasing UDS.KEYID = 0
8,078,196 UART: [idev] Sha1 KeyId Algorithm
8,101,978 UART: [idev] --
8,104,794 UART: [ldev] ++
8,105,320 UART: [ldev] CDI.KEYID = 6
8,106,341 UART: [ldev] SUBJECT.KEYID = 5
8,107,400 UART: [ldev] AUTHORITY.KEYID = 7
8,108,750 UART: [ldev] FE.KEYID = 1
8,151,124 UART: [ldev] Erasing FE.KEYID = 1
10,655,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,718 UART: [ldev] --
12,465,708 UART: [fwproc] Wait for Commands...
12,468,827 UART: [fwproc] Recv command 0x46574c44
12,470,866 UART: [fwproc] Recv'd Img size: 114448 bytes
15,902,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,048,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,367,076 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,364,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,624,844 >>> mbox cmd response: failed
13,625,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,625,760 >>> mbox cmd response: failed
13,626,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,626,321 >>> mbox cmd response: failed
Initializing fuses
2,045,216 writing to cptra_bootfsm_go
5,393,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,109,658 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,456 UART:
192,824 UART: Running Caliptra ROM ...
193,909 UART:
603,598 UART: [state] CFI Enabled
616,183 UART: [state] LifecycleState = Manufacturing
618,077 UART: [state] DebugLocked = No
619,271 UART: [state] WD Timer not started. Device not locked for debugging
623,730 UART: [kat] SHA2-256
802,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,406 UART: [kat] ++
814,856 UART: [kat] sha1
825,787 UART: [kat] SHA2-256
828,801 UART: [kat] SHA2-384
836,075 UART: [kat] SHA2-512-ACC
839,016 UART: [kat] ECC-384
3,280,216 UART: [kat] HMAC-384Kdf
3,291,901 UART: [kat] LMS
3,821,405 UART: [kat] --
3,825,615 UART: [cold-reset] ++
3,827,380 UART: [fht] FHT @ 0x50003400
3,839,115 UART: [idev] ++
3,839,685 UART: [idev] CDI.KEYID = 6
3,840,596 UART: [idev] SUBJECT.KEYID = 7
3,841,815 UART: [idev] UDS.KEYID = 0
3,844,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,570 UART: [idev] Erasing UDS.KEYID = 0
6,314,780 UART: [idev] Sha1 KeyId Algorithm
6,336,976 UART: [idev] --
6,341,273 UART: [ldev] ++
6,341,851 UART: [ldev] CDI.KEYID = 6
6,342,762 UART: [ldev] SUBJECT.KEYID = 5
6,343,998 UART: [ldev] AUTHORITY.KEYID = 7
6,345,234 UART: [ldev] FE.KEYID = 1
6,353,560 UART: [ldev] Erasing FE.KEYID = 1
8,828,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,623 UART: [ldev] --
10,618,289 UART: [fwproc] Wait for Commands...
10,620,925 UART: [fwproc] Recv command 0x46574c44
10,623,025 UART: [fwproc] Recv'd Img size: 114448 bytes
14,056,743 UART: ROM Fatal Error: 0x000B002C
14,059,817 >>> mbox cmd response: failed
14,060,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,060,578 >>> mbox cmd response: failed
14,060,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,061,170 >>> mbox cmd response: failed
Initializing fuses
2,048,448 writing to cptra_bootfsm_go
2,237,743 UART:
2,238,122 UART: Running Caliptra ROM ...
2,239,169 UART:
6,393,670 UART: [state] CFI Enabled
6,406,963 UART: [state] LifecycleState = Manufacturing
6,408,825 UART: [state] DebugLocked = No
6,410,398 UART: [state] WD Timer not started. Device not locked for debugging
6,414,521 UART: [kat] SHA2-256
6,593,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,605,236 UART: [kat] ++
6,605,695 UART: [kat] sha1
6,616,959 UART: [kat] SHA2-256
6,619,982 UART: [kat] SHA2-384
6,625,539 UART: [kat] SHA2-512-ACC
6,628,489 UART: [kat] ECC-384
9,069,353 UART: [kat] HMAC-384Kdf
9,081,689 UART: [kat] LMS
9,611,197 UART: [kat] --
9,615,317 UART: [cold-reset] ++
9,617,087 UART: [fht] FHT @ 0x50003400
9,627,590 UART: [idev] ++
9,628,194 UART: [idev] CDI.KEYID = 6
9,629,115 UART: [idev] SUBJECT.KEYID = 7
9,630,279 UART: [idev] UDS.KEYID = 0
9,632,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,776,600 UART: [idev] Erasing UDS.KEYID = 0
12,100,714 UART: [idev] Sha1 KeyId Algorithm
12,124,872 UART: [idev] --
12,129,545 UART: [ldev] ++
12,130,127 UART: [ldev] CDI.KEYID = 6
12,131,036 UART: [ldev] SUBJECT.KEYID = 5
12,132,258 UART: [ldev] AUTHORITY.KEYID = 7
12,133,487 UART: [ldev] FE.KEYID = 1
12,143,703 UART: [ldev] Erasing FE.KEYID = 1
14,619,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,337,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,353,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,369,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,384,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,406,306 UART: [ldev] --
16,410,763 UART: [fwproc] Wait for Commands...
16,413,692 UART: [fwproc] Recv command 0x46574c44
16,415,793 UART: [fwproc] Recv'd Img size: 114448 bytes
19,854,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,992,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,311,103 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,690,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,838,991 >>> mbox cmd response: failed
13,839,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,839,975 >>> mbox cmd response: failed
13,840,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,840,533 >>> mbox cmd response: failed
Initializing fuses
2,046,131 writing to cptra_bootfsm_go
9,717,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,335,222 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,174 UART:
192,524 UART: Running Caliptra ROM ...
193,703 UART:
193,858 UART: [state] CFI Enabled
261,616 UART: [state] LifecycleState = Manufacturing
264,041 UART: [state] DebugLocked = No
266,411 UART: [state] WD Timer not started. Device not locked for debugging
270,442 UART: [kat] SHA2-256
460,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,099 UART: [kat] ++
471,605 UART: [kat] sha1
482,867 UART: [kat] SHA2-256
485,882 UART: [kat] SHA2-384
491,214 UART: [kat] SHA2-512-ACC
493,835 UART: [kat] ECC-384
2,944,379 UART: [kat] HMAC-384Kdf
2,970,594 UART: [kat] LMS
3,502,381 UART: [kat] --
3,507,210 UART: [cold-reset] ++
3,508,988 UART: [fht] FHT @ 0x50003400
3,520,830 UART: [idev] ++
3,521,503 UART: [idev] CDI.KEYID = 6
3,522,445 UART: [idev] SUBJECT.KEYID = 7
3,523,655 UART: [idev] UDS.KEYID = 0
3,526,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,520 UART: [idev] Erasing UDS.KEYID = 0
6,029,889 UART: [idev] Sha1 KeyId Algorithm
6,051,165 UART: [idev] --
6,056,175 UART: [ldev] ++
6,056,871 UART: [ldev] CDI.KEYID = 6
6,057,762 UART: [ldev] SUBJECT.KEYID = 5
6,058,870 UART: [ldev] AUTHORITY.KEYID = 7
6,060,160 UART: [ldev] FE.KEYID = 1
6,098,979 UART: [ldev] Erasing FE.KEYID = 1
8,606,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,919 UART: [ldev] --
10,413,452 UART: [fwproc] Wait for Commands...
10,416,093 UART: [fwproc] Recv command 0x46574c44
10,418,376 UART: [fwproc] Recv'd Img size: 114448 bytes
13,892,605 UART: ROM Fatal Error: 0x000B002C
13,896,237 >>> mbox cmd response: failed
13,896,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,897,023 >>> mbox cmd response: failed
13,897,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,897,588 >>> mbox cmd response: failed
Initializing fuses
2,051,268 writing to cptra_bootfsm_go
2,240,554 UART:
2,240,907 UART: Running Caliptra ROM ...
2,242,044 UART:
2,242,224 UART: [state] CFI Enabled
2,299,508 UART: [state] LifecycleState = Manufacturing
2,301,844 UART: [state] DebugLocked = No
2,303,395 UART: [state] WD Timer not started. Device not locked for debugging
2,307,181 UART: [kat] SHA2-256
2,496,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,507,605 UART: [kat] ++
2,508,090 UART: [kat] sha1
2,517,962 UART: [kat] SHA2-256
2,520,992 UART: [kat] SHA2-384
2,527,145 UART: [kat] SHA2-512-ACC
2,529,712 UART: [kat] ECC-384
4,983,805 UART: [kat] HMAC-384Kdf
5,010,731 UART: [kat] LMS
5,542,498 UART: [kat] --
5,547,321 UART: [cold-reset] ++
5,548,771 UART: [fht] FHT @ 0x50003400
5,559,349 UART: [idev] ++
5,560,025 UART: [idev] CDI.KEYID = 6
5,560,970 UART: [idev] SUBJECT.KEYID = 7
5,562,179 UART: [idev] UDS.KEYID = 0
5,564,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,708,724 UART: [idev] Erasing UDS.KEYID = 0
8,072,205 UART: [idev] Sha1 KeyId Algorithm
8,094,706 UART: [idev] --
8,100,220 UART: [ldev] ++
8,100,897 UART: [ldev] CDI.KEYID = 6
8,101,781 UART: [ldev] SUBJECT.KEYID = 5
8,102,995 UART: [ldev] AUTHORITY.KEYID = 7
8,104,229 UART: [ldev] FE.KEYID = 1
8,139,099 UART: [ldev] Erasing FE.KEYID = 1
10,646,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,979 UART: [ldev] --
12,452,868 UART: [fwproc] Wait for Commands...
12,455,455 UART: [fwproc] Recv command 0x46574c44
12,457,717 UART: [fwproc] Recv'd Img size: 114448 bytes
15,939,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,019,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,135,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,678,944 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,420,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,318,986 >>> mbox cmd response: failed
14,319,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,319,976 >>> mbox cmd response: failed
14,320,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,320,535 >>> mbox cmd response: failed
Initializing fuses
2,043,918 writing to cptra_bootfsm_go
5,479,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,816,299 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,368 UART:
192,728 UART: Running Caliptra ROM ...
193,824 UART:
603,643 UART: [state] CFI Enabled
616,130 UART: [state] LifecycleState = Manufacturing
618,501 UART: [state] DebugLocked = No
620,878 UART: [state] WD Timer not started. Device not locked for debugging
626,117 UART: [kat] SHA2-256
816,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,777 UART: [kat] ++
827,360 UART: [kat] sha1
838,832 UART: [kat] SHA2-256
841,845 UART: [kat] SHA2-384
847,285 UART: [kat] SHA2-512-ACC
849,893 UART: [kat] ECC-384
3,290,294 UART: [kat] HMAC-384Kdf
3,304,961 UART: [kat] LMS
3,836,798 UART: [kat] --
3,841,815 UART: [cold-reset] ++
3,842,825 UART: [fht] FHT @ 0x50003400
3,853,269 UART: [idev] ++
3,853,952 UART: [idev] CDI.KEYID = 6
3,854,917 UART: [idev] SUBJECT.KEYID = 7
3,856,149 UART: [idev] UDS.KEYID = 0
3,858,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,706 UART: [idev] Erasing UDS.KEYID = 0
6,337,268 UART: [idev] Sha1 KeyId Algorithm
6,360,395 UART: [idev] --
6,364,558 UART: [ldev] ++
6,365,137 UART: [ldev] CDI.KEYID = 6
6,366,048 UART: [ldev] SUBJECT.KEYID = 5
6,367,213 UART: [ldev] AUTHORITY.KEYID = 7
6,368,448 UART: [ldev] FE.KEYID = 1
6,380,016 UART: [ldev] Erasing FE.KEYID = 1
8,861,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,337 UART: [ldev] --
10,654,640 UART: [fwproc] Wait for Commands...
10,657,280 UART: [fwproc] Recv command 0x46574c44
10,659,589 UART: [fwproc] Recv'd Img size: 114448 bytes
14,138,166 UART: ROM Fatal Error: 0x000B002C
14,141,845 >>> mbox cmd response: failed
14,142,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,142,524 >>> mbox cmd response: failed
14,142,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,143,120 >>> mbox cmd response: failed
Initializing fuses
2,049,923 writing to cptra_bootfsm_go
2,239,216 UART:
2,239,577 UART: Running Caliptra ROM ...
2,240,713 UART:
6,312,180 UART: [state] CFI Enabled
6,326,273 UART: [state] LifecycleState = Manufacturing
6,328,863 UART: [state] DebugLocked = No
6,330,943 UART: [state] WD Timer not started. Device not locked for debugging
6,335,726 UART: [kat] SHA2-256
6,525,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,536,399 UART: [kat] ++
6,536,915 UART: [kat] sha1
6,547,482 UART: [kat] SHA2-256
6,550,502 UART: [kat] SHA2-384
6,555,305 UART: [kat] SHA2-512-ACC
6,557,870 UART: [kat] ECC-384
8,999,767 UART: [kat] HMAC-384Kdf
9,011,351 UART: [kat] LMS
9,543,195 UART: [kat] --
9,547,259 UART: [cold-reset] ++
9,548,659 UART: [fht] FHT @ 0x50003400
9,560,826 UART: [idev] ++
9,561,498 UART: [idev] CDI.KEYID = 6
9,562,512 UART: [idev] SUBJECT.KEYID = 7
9,563,665 UART: [idev] UDS.KEYID = 0
9,566,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,710,098 UART: [idev] Erasing UDS.KEYID = 0
12,043,449 UART: [idev] Sha1 KeyId Algorithm
12,066,408 UART: [idev] --
12,070,290 UART: [ldev] ++
12,070,973 UART: [ldev] CDI.KEYID = 6
12,071,856 UART: [ldev] SUBJECT.KEYID = 5
12,073,008 UART: [ldev] AUTHORITY.KEYID = 7
12,074,302 UART: [ldev] FE.KEYID = 1
12,087,157 UART: [ldev] Erasing FE.KEYID = 1
14,568,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,288,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,303,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,318,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,333,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,353,797 UART: [ldev] --
16,358,843 UART: [fwproc] Wait for Commands...
16,360,667 UART: [fwproc] Recv command 0x46574c44
16,362,981 UART: [fwproc] Recv'd Img size: 114448 bytes
19,852,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,929,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,045,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,587,892 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,761,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,541,235 >>> mbox cmd response: failed
14,541,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,155 >>> mbox cmd response: failed
14,542,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,746 >>> mbox cmd response: failed
Initializing fuses
2,047,223 writing to cptra_bootfsm_go
9,080,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,315,960 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Manufacturing
85,515 UART: [state] DebugLocked = No
86,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,611 UART: [kat] SHA2-256
881,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,657 UART: [kat] ++
885,809 UART: [kat] sha1
889,997 UART: [kat] SHA2-256
891,935 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,314 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,597 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,288 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,408 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,520,763 UART: [ldev] Erasing FE.KEYID = 1
1,546,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,208 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,382 UART: [fwproc] Received command 0x46574c44
1,587,173 UART: [fwproc] Received Image of size 114448 bytes
2,910,652 UART: ROM Fatal Error: 0x000B002C
2,911,811 >>> mbox cmd response: failed
2,911,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,817 >>> mbox cmd response: failed
2,911,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,369 UART: [kat] SHA2-256
892,307 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,492 UART: [idev] Erasing UDS.KEYID = 0
1,504,798 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,424 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,520,649 UART: [ldev] Erasing FE.KEYID = 1
1,546,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,852 UART: [ldev] --
1,585,119 UART: [fwproc] Waiting for Commands...
1,585,920 UART: [fwproc] Received command 0x46574c44
1,586,711 UART: [fwproc] Received Image of size 114448 bytes
2,885,403 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,764,912 >>> mbox cmd response: failed
2,764,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,918 >>> mbox cmd response: failed
2,764,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,532 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Manufacturing
86,046 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,345 UART: [kat] HMAC-384Kdf
907,083 UART: [kat] LMS
1,475,279 UART: [kat] --
1,476,050 UART: [cold-reset] ++
1,476,456 UART: [fht] Storing FHT @ 0x50003400
1,479,459 UART: [idev] ++
1,479,627 UART: [idev] CDI.KEYID = 6
1,479,987 UART: [idev] SUBJECT.KEYID = 7
1,480,411 UART: [idev] UDS.KEYID = 0
1,480,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,221 UART: [idev] Erasing UDS.KEYID = 0
1,505,341 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,522,078 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,845 UART: [ldev] --
1,587,210 UART: [fwproc] Waiting for Commands...
1,587,933 UART: [fwproc] Received command 0x46574c44
1,588,724 UART: [fwproc] Received Image of size 114448 bytes
2,912,197 UART: ROM Fatal Error: 0x000B002C
2,913,356 >>> mbox cmd response: failed
2,913,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,362 >>> mbox cmd response: failed
2,913,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
86,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,158 UART: [kat] SHA2-256
893,096 UART: [kat] SHA2-384
895,865 UART: [kat] SHA2-512-ACC
897,766 UART: [kat] ECC-384
903,501 UART: [kat] HMAC-384Kdf
908,111 UART: [kat] LMS
1,476,307 UART: [kat] --
1,477,376 UART: [cold-reset] ++
1,477,776 UART: [fht] Storing FHT @ 0x50003400
1,480,625 UART: [idev] ++
1,480,793 UART: [idev] CDI.KEYID = 6
1,481,153 UART: [idev] SUBJECT.KEYID = 7
1,481,577 UART: [idev] UDS.KEYID = 0
1,481,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,775 UART: [idev] Erasing UDS.KEYID = 0
1,506,711 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,237 UART: [idev] --
1,516,298 UART: [ldev] ++
1,516,466 UART: [ldev] CDI.KEYID = 6
1,516,829 UART: [ldev] SUBJECT.KEYID = 5
1,517,255 UART: [ldev] AUTHORITY.KEYID = 7
1,517,718 UART: [ldev] FE.KEYID = 1
1,523,050 UART: [ldev] Erasing FE.KEYID = 1
1,548,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,785 UART: [ldev] --
1,588,184 UART: [fwproc] Waiting for Commands...
1,589,041 UART: [fwproc] Received command 0x46574c44
1,589,832 UART: [fwproc] Received Image of size 114448 bytes
2,888,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,973 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,767,187 >>> mbox cmd response: failed
2,767,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,767,193 >>> mbox cmd response: failed
2,767,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,767,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,395 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Manufacturing
85,515 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,391 UART: [kat] SHA2-256
903,331 UART: [kat] SHA2-384
906,068 UART: [kat] SHA2-512-ACC
907,969 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,448 UART: [kat] LMS
1,170,776 UART: [kat] --
1,171,319 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,117 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,198 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,499 UART: ROM Fatal Error: 0x000B002C
2,608,658 >>> mbox cmd response: failed
2,608,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,664 >>> mbox cmd response: failed
2,608,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
893,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,441 UART: [kat] ++
897,593 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,564 UART: [kat] SHA2-512-ACC
908,465 UART: [kat] ECC-384
918,028 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,823 UART: [cold-reset] ++
1,172,153 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,877 UART: [idev] Sha1 KeyId Algorithm
1,209,151 UART: [idev] --
1,210,163 UART: [ldev] ++
1,210,331 UART: [ldev] CDI.KEYID = 6
1,210,694 UART: [ldev] SUBJECT.KEYID = 5
1,211,120 UART: [ldev] AUTHORITY.KEYID = 7
1,211,583 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,838 UART: [fwproc] Recv command 0x46574c44
1,283,566 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,005 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,462,521 >>> mbox cmd response: failed
2,462,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,527 >>> mbox cmd response: failed
2,462,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,676 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Manufacturing
86,050 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,187 UART: [kat] HMAC-384Kdf
922,731 UART: [kat] LMS
1,171,059 UART: [kat] --
1,171,836 UART: [cold-reset] ++
1,172,340 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,859 UART: [idev] Erasing UDS.KEYID = 0
1,201,662 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,874 UART: [ldev] Erasing FE.KEYID = 1
1,244,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,732 UART: [ldev] --
1,284,185 UART: [fwproc] Wait for Commands...
1,284,923 UART: [fwproc] Recv command 0x46574c44
1,285,651 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,892 UART: ROM Fatal Error: 0x000B002C
2,610,051 >>> mbox cmd response: failed
2,610,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,057 >>> mbox cmd response: failed
2,610,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
917,931 UART: [kat] HMAC-384Kdf
922,319 UART: [kat] LMS
1,170,647 UART: [kat] --
1,171,886 UART: [cold-reset] ++
1,172,236 UART: [fht] FHT @ 0x50003400
1,174,669 UART: [idev] ++
1,174,837 UART: [idev] CDI.KEYID = 6
1,175,197 UART: [idev] SUBJECT.KEYID = 7
1,175,621 UART: [idev] UDS.KEYID = 0
1,175,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,503 UART: [idev] Erasing UDS.KEYID = 0
1,200,576 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,154 UART: [ldev] ++
1,210,322 UART: [ldev] CDI.KEYID = 6
1,210,685 UART: [ldev] SUBJECT.KEYID = 5
1,211,111 UART: [ldev] AUTHORITY.KEYID = 7
1,211,574 UART: [ldev] FE.KEYID = 1
1,216,822 UART: [ldev] Erasing FE.KEYID = 1
1,243,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,688 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,779 UART: [fwproc] Recv command 0x46574c44
1,283,507 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,128 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,464,508 >>> mbox cmd response: failed
2,464,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,514 >>> mbox cmd response: failed
2,464,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,743 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Manufacturing
85,513 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,829 UART: [kat] ++
894,981 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
903,918 UART: [kat] SHA2-512-ACC
905,819 UART: [kat] ECC-384
915,428 UART: [kat] HMAC-384Kdf
920,160 UART: [kat] LMS
1,168,472 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,669 UART: [fht] FHT @ 0x50003400
1,172,363 UART: [idev] ++
1,172,531 UART: [idev] CDI.KEYID = 6
1,172,892 UART: [idev] SUBJECT.KEYID = 7
1,173,317 UART: [idev] UDS.KEYID = 0
1,173,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,197,811 UART: [idev] Sha1 KeyId Algorithm
1,206,713 UART: [idev] --
1,207,596 UART: [ldev] ++
1,207,764 UART: [ldev] CDI.KEYID = 6
1,208,128 UART: [ldev] SUBJECT.KEYID = 5
1,208,555 UART: [ldev] AUTHORITY.KEYID = 7
1,209,018 UART: [ldev] FE.KEYID = 1
1,213,998 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,724 UART: [ldev] --
1,280,088 UART: [fwproc] Wait for Commands...
1,280,893 UART: [fwproc] Recv command 0x46574c44
1,281,626 UART: [fwproc] Recv'd Img size: 114448 bytes
2,604,960 UART: ROM Fatal Error: 0x000B002C
2,606,119 >>> mbox cmd response: failed
2,606,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,125 >>> mbox cmd response: failed
2,606,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,330 UART: [kat] SHA2-256
891,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,009 UART: [kat] ++
896,161 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,643 UART: [cold-reset] ++
1,171,119 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,937 UART: [idev] Erasing UDS.KEYID = 0
1,199,705 UART: [idev] Sha1 KeyId Algorithm
1,208,473 UART: [idev] --
1,209,532 UART: [ldev] ++
1,209,700 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,491 UART: [ldev] AUTHORITY.KEYID = 7
1,210,954 UART: [ldev] FE.KEYID = 1
1,216,224 UART: [ldev] Erasing FE.KEYID = 1
1,242,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,364 UART: [ldev] --
1,281,640 UART: [fwproc] Wait for Commands...
1,282,327 UART: [fwproc] Recv command 0x46574c44
1,283,060 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,481 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,100 >>> mbox cmd response: failed
2,458,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,106 >>> mbox cmd response: failed
2,458,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,801 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Manufacturing
86,374 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,174,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,446 UART: [idev] --
1,208,703 UART: [ldev] ++
1,208,871 UART: [ldev] CDI.KEYID = 6
1,209,235 UART: [ldev] SUBJECT.KEYID = 5
1,209,662 UART: [ldev] AUTHORITY.KEYID = 7
1,210,125 UART: [ldev] FE.KEYID = 1
1,215,455 UART: [ldev] Erasing FE.KEYID = 1
1,241,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,347 UART: [ldev] --
1,280,787 UART: [fwproc] Wait for Commands...
1,281,566 UART: [fwproc] Recv command 0x46574c44
1,282,299 UART: [fwproc] Recv'd Img size: 114448 bytes
2,604,783 UART: ROM Fatal Error: 0x000B002C
2,605,942 >>> mbox cmd response: failed
2,605,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,948 >>> mbox cmd response: failed
2,605,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,517 UART: [kat] HMAC-384Kdf
920,061 UART: [kat] LMS
1,168,373 UART: [kat] --
1,169,392 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,440 UART: [idev] ++
1,172,608 UART: [idev] CDI.KEYID = 6
1,172,969 UART: [idev] SUBJECT.KEYID = 7
1,173,394 UART: [idev] UDS.KEYID = 0
1,173,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,694 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,637 UART: [ldev] ++
1,208,805 UART: [ldev] CDI.KEYID = 6
1,209,169 UART: [ldev] SUBJECT.KEYID = 5
1,209,596 UART: [ldev] AUTHORITY.KEYID = 7
1,210,059 UART: [ldev] FE.KEYID = 1
1,215,255 UART: [ldev] Erasing FE.KEYID = 1
1,240,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,855 UART: [ldev] --
1,280,181 UART: [fwproc] Wait for Commands...
1,280,976 UART: [fwproc] Recv command 0x46574c44
1,281,709 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,652 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,393 >>> mbox cmd response: failed
2,461,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,399 >>> mbox cmd response: failed
2,461,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,704 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,231 UART:
192,597 UART: Running Caliptra ROM ...
193,783 UART:
193,938 UART: [state] CFI Enabled
265,243 UART: [state] LifecycleState = Manufacturing
267,228 UART: [state] DebugLocked = No
270,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,510 UART: [kat] SHA2-256
444,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,704 UART: [kat] ++
455,213 UART: [kat] sha1
466,790 UART: [kat] SHA2-256
469,494 UART: [kat] SHA2-384
476,731 UART: [kat] SHA2-512-ACC
479,073 UART: [kat] ECC-384
2,767,515 UART: [kat] HMAC-384Kdf
2,798,065 UART: [kat] LMS
3,988,361 UART: [kat] --
3,993,034 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,007,701 UART: [idev] ++
4,008,277 UART: [idev] CDI.KEYID = 6
4,009,223 UART: [idev] SUBJECT.KEYID = 7
4,010,499 UART: [idev] UDS.KEYID = 0
4,013,494 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,316 UART: [idev] Erasing UDS.KEYID = 0
7,349,393 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,452 UART: [idev] --
7,375,749 UART: [ldev] ++
7,376,319 UART: [ldev] CDI.KEYID = 6
7,377,289 UART: [ldev] SUBJECT.KEYID = 5
7,378,503 UART: [ldev] AUTHORITY.KEYID = 7
7,379,737 UART: [ldev] FE.KEYID = 1
7,422,355 UART: [ldev] Erasing FE.KEYID = 1
10,754,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,187 UART: [ldev] --
13,138,458 UART: [fwproc] Waiting for Commands...
13,141,765 UART: [fwproc] Received command 0x46574c44
13,143,951 UART: [fwproc] Received Image of size 114124 bytes
17,225,454 UART: ROM Fatal Error: 0x000B002E
17,228,901 >>> mbox cmd response: failed
17,229,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,229,666 >>> mbox cmd response: failed
17,229,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,230,227 >>> mbox cmd response: failed
Initializing fuses
2,052,509 writing to cptra_bootfsm_go
2,241,825 UART:
2,242,170 UART: Running Caliptra ROM ...
2,243,261 UART:
2,243,440 UART: [state] CFI Enabled
2,315,398 UART: [state] LifecycleState = Manufacturing
2,317,338 UART: [state] DebugLocked = No
2,318,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,606 UART: [kat] SHA2-256
2,494,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,771 UART: [kat] ++
2,505,251 UART: [kat] sha1
2,516,736 UART: [kat] SHA2-256
2,519,472 UART: [kat] SHA2-384
2,525,577 UART: [kat] SHA2-512-ACC
2,527,923 UART: [kat] ECC-384
4,822,142 UART: [kat] HMAC-384Kdf
4,853,861 UART: [kat] LMS
6,044,193 UART: [kat] --
6,049,986 UART: [cold-reset] ++
6,051,520 UART: [fht] Storing FHT @ 0x50003400
6,063,178 UART: [idev] ++
6,063,746 UART: [idev] CDI.KEYID = 6
6,064,711 UART: [idev] SUBJECT.KEYID = 7
6,065,926 UART: [idev] UDS.KEYID = 0
6,068,514 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,212,158 UART: [idev] Erasing UDS.KEYID = 0
9,401,070 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,374 UART: [idev] --
9,427,057 UART: [ldev] ++
9,427,637 UART: [ldev] CDI.KEYID = 6
9,428,602 UART: [ldev] SUBJECT.KEYID = 5
9,429,856 UART: [ldev] AUTHORITY.KEYID = 7
9,431,043 UART: [ldev] FE.KEYID = 1
9,474,805 UART: [ldev] Erasing FE.KEYID = 1
12,806,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,120,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,135,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,164,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,861 UART: [ldev] --
15,187,830 UART: [fwproc] Waiting for Commands...
15,189,440 UART: [fwproc] Received command 0x46574c44
15,191,630 UART: [fwproc] Received Image of size 114124 bytes
19,277,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,348,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,417,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,735,335 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,787,560 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,181,439 >>> mbox cmd response: failed
17,182,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,182,365 >>> mbox cmd response: failed
17,182,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,182,920 >>> mbox cmd response: failed
Initializing fuses
2,055,211 writing to cptra_bootfsm_go
5,862,251 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,982,290 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,319 UART:
192,681 UART: Running Caliptra ROM ...
193,873 UART:
603,373 UART: [state] CFI Enabled
618,355 UART: [state] LifecycleState = Manufacturing
620,289 UART: [state] DebugLocked = No
622,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,724 UART: [kat] SHA2-256
796,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,980 UART: [kat] ++
807,480 UART: [kat] sha1
819,061 UART: [kat] SHA2-256
821,751 UART: [kat] SHA2-384
826,915 UART: [kat] SHA2-512-ACC
829,259 UART: [kat] ECC-384
3,114,368 UART: [kat] HMAC-384Kdf
3,127,035 UART: [kat] LMS
4,317,154 UART: [kat] --
4,321,926 UART: [cold-reset] ++
4,323,322 UART: [fht] Storing FHT @ 0x50003400
4,334,911 UART: [idev] ++
4,335,534 UART: [idev] CDI.KEYID = 6
4,336,448 UART: [idev] SUBJECT.KEYID = 7
4,337,664 UART: [idev] UDS.KEYID = 0
4,340,709 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,297 UART: [idev] Erasing UDS.KEYID = 0
7,625,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,268 UART: [idev] --
7,652,190 UART: [ldev] ++
7,652,772 UART: [ldev] CDI.KEYID = 6
7,653,736 UART: [ldev] SUBJECT.KEYID = 5
7,654,953 UART: [ldev] AUTHORITY.KEYID = 7
7,656,182 UART: [ldev] FE.KEYID = 1
7,665,857 UART: [ldev] Erasing FE.KEYID = 1
10,953,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,018 UART: [ldev] --
13,314,202 UART: [fwproc] Waiting for Commands...
13,317,484 UART: [fwproc] Received command 0x46574c44
13,319,740 UART: [fwproc] Received Image of size 114124 bytes
17,401,489 UART: ROM Fatal Error: 0x000B002E
17,404,897 >>> mbox cmd response: failed
17,405,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,405,659 >>> mbox cmd response: failed
17,405,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,224 >>> mbox cmd response: failed
Initializing fuses
2,061,217 writing to cptra_bootfsm_go
2,250,559 UART:
2,250,910 UART: Running Caliptra ROM ...
2,252,056 UART:
3,066,849 UART: [state] CFI Enabled
3,080,902 UART: [state] LifecycleState = Manufacturing
3,082,820 UART: [state] DebugLocked = No
3,084,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,089,982 UART: [kat] SHA2-256
3,259,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,270,248 UART: [kat] ++
3,270,756 UART: [kat] sha1
3,282,075 UART: [kat] SHA2-256
3,284,763 UART: [kat] SHA2-384
3,290,983 UART: [kat] SHA2-512-ACC
3,293,334 UART: [kat] ECC-384
5,576,848 UART: [kat] HMAC-384Kdf
5,587,893 UART: [kat] LMS
6,777,964 UART: [kat] --
6,782,064 UART: [cold-reset] ++
6,783,727 UART: [fht] Storing FHT @ 0x50003400
6,795,709 UART: [idev] ++
6,796,316 UART: [idev] CDI.KEYID = 6
6,797,208 UART: [idev] SUBJECT.KEYID = 7
6,798,476 UART: [idev] UDS.KEYID = 0
6,801,043 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,944,350 UART: [idev] Erasing UDS.KEYID = 0
10,091,020 UART: [idev] Using Sha1 for KeyId Algorithm
10,113,274 UART: [idev] --
10,117,647 UART: [ldev] ++
10,118,217 UART: [ldev] CDI.KEYID = 6
10,119,185 UART: [ldev] SUBJECT.KEYID = 5
10,120,381 UART: [ldev] AUTHORITY.KEYID = 7
10,121,617 UART: [ldev] FE.KEYID = 1
10,133,231 UART: [ldev] Erasing FE.KEYID = 1
13,421,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,714,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,729,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,744,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,758,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,777,107 UART: [ldev] --
15,781,725 UART: [fwproc] Waiting for Commands...
15,783,719 UART: [fwproc] Received command 0x46574c44
15,785,906 UART: [fwproc] Received Image of size 114124 bytes
19,874,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,947,978 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,016,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,333,497 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
4,125,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,362,356 >>> mbox cmd response: failed
17,363,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,363,726 >>> mbox cmd response: failed
17,363,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,364,294 >>> mbox cmd response: failed
Initializing fuses
2,050,073 writing to cptra_bootfsm_go
6,635,991 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,614,373 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,137 UART:
192,510 UART: Running Caliptra ROM ...
193,691 UART:
193,841 UART: [state] CFI Enabled
263,650 UART: [state] LifecycleState = Manufacturing
265,529 UART: [state] DebugLocked = No
267,132 UART: [state] WD Timer not started. Device not locked for debugging
270,852 UART: [kat] SHA2-256
449,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,524 UART: [kat] ++
462,070 UART: [kat] sha1
472,692 UART: [kat] SHA2-256
475,699 UART: [kat] SHA2-384
482,808 UART: [kat] SHA2-512-ACC
485,792 UART: [kat] ECC-384
2,947,020 UART: [kat] HMAC-384Kdf
2,968,988 UART: [kat] LMS
3,498,411 UART: [kat] --
3,502,357 UART: [cold-reset] ++
3,503,581 UART: [fht] FHT @ 0x50003400
3,513,806 UART: [idev] ++
3,514,370 UART: [idev] CDI.KEYID = 6
3,515,284 UART: [idev] SUBJECT.KEYID = 7
3,516,495 UART: [idev] UDS.KEYID = 0
3,519,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,330 UART: [idev] Erasing UDS.KEYID = 0
6,024,703 UART: [idev] Sha1 KeyId Algorithm
6,048,038 UART: [idev] --
6,052,341 UART: [ldev] ++
6,052,921 UART: [ldev] CDI.KEYID = 6
6,053,834 UART: [ldev] SUBJECT.KEYID = 5
6,055,014 UART: [ldev] AUTHORITY.KEYID = 7
6,056,257 UART: [ldev] FE.KEYID = 1
6,098,806 UART: [ldev] Erasing FE.KEYID = 1
8,599,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,371 UART: [ldev] --
10,415,415 UART: [fwproc] Wait for Commands...
10,418,263 UART: [fwproc] Recv command 0x46574c44
10,420,355 UART: [fwproc] Recv'd Img size: 114448 bytes
13,862,552 UART: ROM Fatal Error: 0x000B002E
13,865,692 >>> mbox cmd response: failed
13,866,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,403 >>> mbox cmd response: failed
13,866,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,867,101 >>> mbox cmd response: failed
Initializing fuses
2,052,502 writing to cptra_bootfsm_go
2,241,852 UART:
2,242,200 UART: Running Caliptra ROM ...
2,243,246 UART:
2,243,399 UART: [state] CFI Enabled
2,306,848 UART: [state] LifecycleState = Manufacturing
2,308,736 UART: [state] DebugLocked = No
2,311,073 UART: [state] WD Timer not started. Device not locked for debugging
2,314,230 UART: [kat] SHA2-256
2,493,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,915 UART: [kat] ++
2,505,378 UART: [kat] sha1
2,517,129 UART: [kat] SHA2-256
2,520,150 UART: [kat] SHA2-384
2,526,733 UART: [kat] SHA2-512-ACC
2,529,675 UART: [kat] ECC-384
4,997,028 UART: [kat] HMAC-384Kdf
5,017,425 UART: [kat] LMS
5,546,863 UART: [kat] --
5,551,366 UART: [cold-reset] ++
5,553,837 UART: [fht] FHT @ 0x50003400
5,564,443 UART: [idev] ++
5,565,006 UART: [idev] CDI.KEYID = 6
5,565,943 UART: [idev] SUBJECT.KEYID = 7
5,567,156 UART: [idev] UDS.KEYID = 0
5,569,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,767 UART: [idev] Erasing UDS.KEYID = 0
8,073,865 UART: [idev] Sha1 KeyId Algorithm
8,096,882 UART: [idev] --
8,100,739 UART: [ldev] ++
8,101,315 UART: [ldev] CDI.KEYID = 6
8,102,228 UART: [ldev] SUBJECT.KEYID = 5
8,103,392 UART: [ldev] AUTHORITY.KEYID = 7
8,104,676 UART: [ldev] FE.KEYID = 1
8,148,373 UART: [ldev] Erasing FE.KEYID = 1
10,648,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,434,804 UART: [ldev] --
12,439,437 UART: [fwproc] Wait for Commands...
12,441,664 UART: [fwproc] Recv command 0x46574c44
12,443,765 UART: [fwproc] Recv'd Img size: 114448 bytes
15,868,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,324,191 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,364,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,640,637 >>> mbox cmd response: failed
13,641,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,641,573 >>> mbox cmd response: failed
13,641,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,642,139 >>> mbox cmd response: failed
Initializing fuses
2,057,647 writing to cptra_bootfsm_go
5,422,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,125,416 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
192,893 UART:
193,245 UART: Running Caliptra ROM ...
194,430 UART:
604,049 UART: [state] CFI Enabled
616,187 UART: [state] LifecycleState = Manufacturing
618,062 UART: [state] DebugLocked = No
620,638 UART: [state] WD Timer not started. Device not locked for debugging
625,162 UART: [kat] SHA2-256
804,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,884 UART: [kat] ++
816,413 UART: [kat] sha1
826,268 UART: [kat] SHA2-256
829,327 UART: [kat] SHA2-384
835,405 UART: [kat] SHA2-512-ACC
838,398 UART: [kat] ECC-384
3,280,736 UART: [kat] HMAC-384Kdf
3,293,804 UART: [kat] LMS
3,823,297 UART: [kat] --
3,828,047 UART: [cold-reset] ++
3,830,484 UART: [fht] FHT @ 0x50003400
3,842,332 UART: [idev] ++
3,842,905 UART: [idev] CDI.KEYID = 6
3,843,830 UART: [idev] SUBJECT.KEYID = 7
3,845,043 UART: [idev] UDS.KEYID = 0
3,847,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,917 UART: [idev] Erasing UDS.KEYID = 0
6,311,975 UART: [idev] Sha1 KeyId Algorithm
6,334,183 UART: [idev] --
6,338,343 UART: [ldev] ++
6,338,912 UART: [ldev] CDI.KEYID = 6
6,339,978 UART: [ldev] SUBJECT.KEYID = 5
6,341,082 UART: [ldev] AUTHORITY.KEYID = 7
6,342,265 UART: [ldev] FE.KEYID = 1
6,353,513 UART: [ldev] Erasing FE.KEYID = 1
8,825,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,389 UART: [ldev] --
10,614,360 UART: [fwproc] Wait for Commands...
10,617,307 UART: [fwproc] Recv command 0x46574c44
10,619,409 UART: [fwproc] Recv'd Img size: 114448 bytes
14,052,891 UART: ROM Fatal Error: 0x000B002E
14,055,992 >>> mbox cmd response: failed
14,056,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,056,777 >>> mbox cmd response: failed
14,057,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,057,390 >>> mbox cmd response: failed
Initializing fuses
2,058,828 writing to cptra_bootfsm_go
2,248,102 UART:
2,248,450 UART: Running Caliptra ROM ...
2,249,499 UART:
6,398,698 UART: [state] CFI Enabled
6,412,596 UART: [state] LifecycleState = Manufacturing
6,414,462 UART: [state] DebugLocked = No
6,415,744 UART: [state] WD Timer not started. Device not locked for debugging
6,418,625 UART: [kat] SHA2-256
6,597,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,609,331 UART: [kat] ++
6,609,794 UART: [kat] sha1
6,620,844 UART: [kat] SHA2-256
6,623,868 UART: [kat] SHA2-384
6,630,199 UART: [kat] SHA2-512-ACC
6,633,150 UART: [kat] ECC-384
9,072,363 UART: [kat] HMAC-384Kdf
9,085,086 UART: [kat] LMS
9,614,587 UART: [kat] --
9,619,245 UART: [cold-reset] ++
9,621,232 UART: [fht] FHT @ 0x50003400
9,631,776 UART: [idev] ++
9,632,337 UART: [idev] CDI.KEYID = 6
9,633,242 UART: [idev] SUBJECT.KEYID = 7
9,634,459 UART: [idev] UDS.KEYID = 0
9,637,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,781,048 UART: [idev] Erasing UDS.KEYID = 0
12,107,354 UART: [idev] Sha1 KeyId Algorithm
12,129,491 UART: [idev] --
12,133,425 UART: [ldev] ++
12,134,012 UART: [ldev] CDI.KEYID = 6
12,134,900 UART: [ldev] SUBJECT.KEYID = 5
12,136,058 UART: [ldev] AUTHORITY.KEYID = 7
12,137,273 UART: [ldev] FE.KEYID = 1
12,147,726 UART: [ldev] Erasing FE.KEYID = 1
14,623,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,344,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,360,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,375,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,391,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,412,214 UART: [ldev] --
16,416,736 UART: [fwproc] Wait for Commands...
16,418,673 UART: [fwproc] Recv command 0x46574c44
16,420,769 UART: [fwproc] Recv'd Img size: 114448 bytes
19,852,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,925,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,994,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,313,626 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,697,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,858,637 >>> mbox cmd response: failed
13,859,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,638 >>> mbox cmd response: failed
13,859,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,860,203 >>> mbox cmd response: failed
Initializing fuses
2,051,257 writing to cptra_bootfsm_go
9,690,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,287,723 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,290 UART:
192,633 UART: Running Caliptra ROM ...
193,813 UART:
193,963 UART: [state] CFI Enabled
264,315 UART: [state] LifecycleState = Manufacturing
266,737 UART: [state] DebugLocked = No
268,988 UART: [state] WD Timer not started. Device not locked for debugging
274,474 UART: [kat] SHA2-256
464,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,133 UART: [kat] ++
475,597 UART: [kat] sha1
487,666 UART: [kat] SHA2-256
490,681 UART: [kat] SHA2-384
496,405 UART: [kat] SHA2-512-ACC
498,976 UART: [kat] ECC-384
2,946,557 UART: [kat] HMAC-384Kdf
2,969,591 UART: [kat] LMS
3,501,391 UART: [kat] --
3,506,196 UART: [cold-reset] ++
3,507,697 UART: [fht] FHT @ 0x50003400
3,520,139 UART: [idev] ++
3,520,859 UART: [idev] CDI.KEYID = 6
3,521,746 UART: [idev] SUBJECT.KEYID = 7
3,522,958 UART: [idev] UDS.KEYID = 0
3,525,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,677 UART: [idev] Erasing UDS.KEYID = 0
6,031,213 UART: [idev] Sha1 KeyId Algorithm
6,052,089 UART: [idev] --
6,058,405 UART: [ldev] ++
6,059,105 UART: [ldev] CDI.KEYID = 6
6,059,989 UART: [ldev] SUBJECT.KEYID = 5
6,061,149 UART: [ldev] AUTHORITY.KEYID = 7
6,062,386 UART: [ldev] FE.KEYID = 1
6,098,074 UART: [ldev] Erasing FE.KEYID = 1
8,604,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,483 UART: [ldev] --
10,413,106 UART: [fwproc] Wait for Commands...
10,415,796 UART: [fwproc] Recv command 0x46574c44
10,418,053 UART: [fwproc] Recv'd Img size: 114448 bytes
13,897,943 UART: ROM Fatal Error: 0x000B002E
13,901,608 >>> mbox cmd response: failed
13,901,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,902,330 >>> mbox cmd response: failed
13,902,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,902,955 >>> mbox cmd response: failed
Initializing fuses
2,060,230 writing to cptra_bootfsm_go
2,249,504 UART:
2,249,851 UART: Running Caliptra ROM ...
2,250,897 UART:
2,251,255 UART: [state] CFI Enabled
2,318,581 UART: [state] LifecycleState = Manufacturing
2,320,933 UART: [state] DebugLocked = No
2,322,564 UART: [state] WD Timer not started. Device not locked for debugging
2,327,411 UART: [kat] SHA2-256
2,517,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,064 UART: [kat] ++
2,528,524 UART: [kat] sha1
2,539,684 UART: [kat] SHA2-256
2,542,707 UART: [kat] SHA2-384
2,549,240 UART: [kat] SHA2-512-ACC
2,551,863 UART: [kat] ECC-384
5,002,270 UART: [kat] HMAC-384Kdf
5,026,071 UART: [kat] LMS
5,557,818 UART: [kat] --
5,561,129 UART: [cold-reset] ++
5,562,306 UART: [fht] FHT @ 0x50003400
5,574,152 UART: [idev] ++
5,574,831 UART: [idev] CDI.KEYID = 6
5,575,770 UART: [idev] SUBJECT.KEYID = 7
5,577,000 UART: [idev] UDS.KEYID = 0
5,579,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,723,557 UART: [idev] Erasing UDS.KEYID = 0
8,085,201 UART: [idev] Sha1 KeyId Algorithm
8,107,999 UART: [idev] --
8,112,349 UART: [ldev] ++
8,113,033 UART: [ldev] CDI.KEYID = 6
8,113,920 UART: [ldev] SUBJECT.KEYID = 5
8,115,128 UART: [ldev] AUTHORITY.KEYID = 7
8,116,360 UART: [ldev] FE.KEYID = 1
8,153,554 UART: [ldev] Erasing FE.KEYID = 1
10,657,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,393 UART: [ldev] --
12,467,253 UART: [fwproc] Wait for Commands...
12,469,620 UART: [fwproc] Recv command 0x46574c44
12,471,876 UART: [fwproc] Recv'd Img size: 114448 bytes
15,955,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,031,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,148,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,691,032 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,440,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,330,273 >>> mbox cmd response: failed
14,330,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,331,228 >>> mbox cmd response: failed
14,331,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,331,799 >>> mbox cmd response: failed
Initializing fuses
2,047,719 writing to cptra_bootfsm_go
5,459,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,792,389 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,506 UART:
192,872 UART: Running Caliptra ROM ...
193,980 UART:
603,609 UART: [state] CFI Enabled
619,603 UART: [state] LifecycleState = Manufacturing
621,975 UART: [state] DebugLocked = No
624,920 UART: [state] WD Timer not started. Device not locked for debugging
629,822 UART: [kat] SHA2-256
819,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,503 UART: [kat] ++
831,011 UART: [kat] sha1
843,890 UART: [kat] SHA2-256
846,904 UART: [kat] SHA2-384
854,288 UART: [kat] SHA2-512-ACC
856,847 UART: [kat] ECC-384
3,296,788 UART: [kat] HMAC-384Kdf
3,309,926 UART: [kat] LMS
3,841,694 UART: [kat] --
3,846,337 UART: [cold-reset] ++
3,848,327 UART: [fht] FHT @ 0x50003400
3,858,977 UART: [idev] ++
3,859,661 UART: [idev] CDI.KEYID = 6
3,860,678 UART: [idev] SUBJECT.KEYID = 7
3,861,779 UART: [idev] UDS.KEYID = 0
3,864,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,334 UART: [idev] Erasing UDS.KEYID = 0
6,340,346 UART: [idev] Sha1 KeyId Algorithm
6,361,957 UART: [idev] --
6,366,634 UART: [ldev] ++
6,367,324 UART: [ldev] CDI.KEYID = 6
6,368,237 UART: [ldev] SUBJECT.KEYID = 5
6,369,395 UART: [ldev] AUTHORITY.KEYID = 7
6,370,630 UART: [ldev] FE.KEYID = 1
6,382,519 UART: [ldev] Erasing FE.KEYID = 1
8,857,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,590 UART: [ldev] --
10,648,694 UART: [fwproc] Wait for Commands...
10,650,172 UART: [fwproc] Recv command 0x46574c44
10,652,164 UART: [fwproc] Recv'd Img size: 114448 bytes
14,136,691 UART: ROM Fatal Error: 0x000B002E
14,140,355 >>> mbox cmd response: failed
14,140,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,141,090 >>> mbox cmd response: failed
14,141,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,141,658 >>> mbox cmd response: failed
Initializing fuses
2,058,911 writing to cptra_bootfsm_go
2,248,223 UART:
2,248,573 UART: Running Caliptra ROM ...
2,249,712 UART:
6,308,029 UART: [state] CFI Enabled
6,324,668 UART: [state] LifecycleState = Manufacturing
6,327,076 UART: [state] DebugLocked = No
6,328,634 UART: [state] WD Timer not started. Device not locked for debugging
6,333,843 UART: [kat] SHA2-256
6,523,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,534,505 UART: [kat] ++
6,535,106 UART: [kat] sha1
6,546,167 UART: [kat] SHA2-256
6,549,185 UART: [kat] SHA2-384
6,555,280 UART: [kat] SHA2-512-ACC
6,557,855 UART: [kat] ECC-384
9,004,435 UART: [kat] HMAC-384Kdf
9,017,582 UART: [kat] LMS
9,549,382 UART: [kat] --
9,553,170 UART: [cold-reset] ++
9,555,016 UART: [fht] FHT @ 0x50003400
9,566,923 UART: [idev] ++
9,567,597 UART: [idev] CDI.KEYID = 6
9,568,692 UART: [idev] SUBJECT.KEYID = 7
9,569,829 UART: [idev] UDS.KEYID = 0
9,572,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,716,067 UART: [idev] Erasing UDS.KEYID = 0
12,046,125 UART: [idev] Sha1 KeyId Algorithm
12,068,537 UART: [idev] --
12,072,990 UART: [ldev] ++
12,073,677 UART: [ldev] CDI.KEYID = 6
12,074,589 UART: [ldev] SUBJECT.KEYID = 5
12,075,754 UART: [ldev] AUTHORITY.KEYID = 7
12,076,986 UART: [ldev] FE.KEYID = 1
12,087,580 UART: [ldev] Erasing FE.KEYID = 1
14,565,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,287,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,303,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,318,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,333,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,355,669 UART: [ldev] --
16,361,683 UART: [fwproc] Wait for Commands...
16,364,317 UART: [fwproc] Recv command 0x46574c44
16,366,648 UART: [fwproc] Recv'd Img size: 114448 bytes
19,851,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,929,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,046,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,590,056 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,755,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,537,373 >>> mbox cmd response: failed
14,537,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,538,250 >>> mbox cmd response: failed
14,538,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,538,810 >>> mbox cmd response: failed
Initializing fuses
2,049,340 writing to cptra_bootfsm_go
9,069,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,303,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Manufacturing
86,009 UART: [state] DebugLocked = No
86,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,252 UART: [kat] SHA2-512-ACC
897,153 UART: [kat] ECC-384
903,008 UART: [kat] HMAC-384Kdf
907,620 UART: [kat] LMS
1,475,816 UART: [kat] --
1,476,721 UART: [cold-reset] ++
1,477,127 UART: [fht] Storing FHT @ 0x50003400
1,479,918 UART: [idev] ++
1,480,086 UART: [idev] CDI.KEYID = 6
1,480,446 UART: [idev] SUBJECT.KEYID = 7
1,480,870 UART: [idev] UDS.KEYID = 0
1,481,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,090 UART: [idev] Erasing UDS.KEYID = 0
1,505,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,135 UART: [ldev] ++
1,515,303 UART: [ldev] CDI.KEYID = 6
1,515,666 UART: [ldev] SUBJECT.KEYID = 5
1,516,092 UART: [ldev] AUTHORITY.KEYID = 7
1,516,555 UART: [ldev] FE.KEYID = 1
1,521,933 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,270 UART: [ldev] --
1,585,661 UART: [fwproc] Waiting for Commands...
1,586,482 UART: [fwproc] Received command 0x46574c44
1,587,273 UART: [fwproc] Received Image of size 114448 bytes
2,910,632 UART: ROM Fatal Error: 0x000B002E
2,911,791 >>> mbox cmd response: failed
2,911,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,797 >>> mbox cmd response: failed
2,911,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,480 UART: [state] LifecycleState = Unprovisioned
85,135 UART: [state] DebugLocked = No
85,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,465 UART: [kat] SHA2-256
881,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,511 UART: [kat] ++
885,663 UART: [kat] sha1
889,793 UART: [kat] SHA2-256
891,731 UART: [kat] SHA2-384
894,356 UART: [kat] SHA2-512-ACC
896,257 UART: [kat] ECC-384
901,954 UART: [kat] HMAC-384Kdf
906,702 UART: [kat] LMS
1,474,898 UART: [kat] --
1,475,583 UART: [cold-reset] ++
1,475,955 UART: [fht] Storing FHT @ 0x50003400
1,478,684 UART: [idev] ++
1,478,852 UART: [idev] CDI.KEYID = 6
1,479,212 UART: [idev] SUBJECT.KEYID = 7
1,479,636 UART: [idev] UDS.KEYID = 0
1,479,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,132 UART: [idev] Erasing UDS.KEYID = 0
1,504,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,968 UART: [idev] --
1,514,043 UART: [ldev] ++
1,514,211 UART: [ldev] CDI.KEYID = 6
1,514,574 UART: [ldev] SUBJECT.KEYID = 5
1,515,000 UART: [ldev] AUTHORITY.KEYID = 7
1,515,463 UART: [ldev] FE.KEYID = 1
1,520,711 UART: [ldev] Erasing FE.KEYID = 1
1,545,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,644 UART: [ldev] --
1,585,149 UART: [fwproc] Waiting for Commands...
1,585,820 UART: [fwproc] Received command 0x46574c44
1,586,611 UART: [fwproc] Received Image of size 114448 bytes
2,887,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,028 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,764,382 >>> mbox cmd response: failed
2,764,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,388 >>> mbox cmd response: failed
2,764,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,404 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Manufacturing
86,406 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,697 UART: [kat] SHA2-512-ACC
897,598 UART: [kat] ECC-384
903,301 UART: [kat] HMAC-384Kdf
907,895 UART: [kat] LMS
1,476,091 UART: [kat] --
1,477,114 UART: [cold-reset] ++
1,477,476 UART: [fht] Storing FHT @ 0x50003400
1,480,213 UART: [idev] ++
1,480,381 UART: [idev] CDI.KEYID = 6
1,480,741 UART: [idev] SUBJECT.KEYID = 7
1,481,165 UART: [idev] UDS.KEYID = 0
1,481,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,491 UART: [idev] Erasing UDS.KEYID = 0
1,506,297 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,011 UART: [idev] --
1,516,010 UART: [ldev] ++
1,516,178 UART: [ldev] CDI.KEYID = 6
1,516,541 UART: [ldev] SUBJECT.KEYID = 5
1,516,967 UART: [ldev] AUTHORITY.KEYID = 7
1,517,430 UART: [ldev] FE.KEYID = 1
1,522,558 UART: [ldev] Erasing FE.KEYID = 1
1,548,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,207 UART: [ldev] --
1,587,610 UART: [fwproc] Waiting for Commands...
1,588,319 UART: [fwproc] Received command 0x46574c44
1,589,110 UART: [fwproc] Received Image of size 114448 bytes
2,914,437 UART: ROM Fatal Error: 0x000B002E
2,915,596 >>> mbox cmd response: failed
2,915,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,915,602 >>> mbox cmd response: failed
2,915,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,915,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,586 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,865 UART: [idev] ++
1,480,033 UART: [idev] CDI.KEYID = 6
1,480,393 UART: [idev] SUBJECT.KEYID = 7
1,480,817 UART: [idev] UDS.KEYID = 0
1,481,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,505,647 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,219 UART: [idev] --
1,515,280 UART: [ldev] ++
1,515,448 UART: [ldev] CDI.KEYID = 6
1,515,811 UART: [ldev] SUBJECT.KEYID = 5
1,516,237 UART: [ldev] AUTHORITY.KEYID = 7
1,516,700 UART: [ldev] FE.KEYID = 1
1,521,868 UART: [ldev] Erasing FE.KEYID = 1
1,547,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,933 UART: [ldev] --
1,586,312 UART: [fwproc] Waiting for Commands...
1,587,033 UART: [fwproc] Received command 0x46574c44
1,587,824 UART: [fwproc] Received Image of size 114448 bytes
2,888,220 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,850 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,321 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,765,843 >>> mbox cmd response: failed
2,765,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,849 >>> mbox cmd response: failed
2,765,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,513 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Manufacturing
85,887 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,522 UART: [kat] HMAC-384Kdf
923,140 UART: [kat] LMS
1,171,468 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,741 UART: [fht] FHT @ 0x50003400
1,175,298 UART: [idev] ++
1,175,466 UART: [idev] CDI.KEYID = 6
1,175,826 UART: [idev] SUBJECT.KEYID = 7
1,176,250 UART: [idev] UDS.KEYID = 0
1,176,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,838 UART: [idev] Erasing UDS.KEYID = 0
1,201,807 UART: [idev] Sha1 KeyId Algorithm
1,210,281 UART: [idev] --
1,211,287 UART: [ldev] ++
1,211,455 UART: [ldev] CDI.KEYID = 6
1,211,818 UART: [ldev] SUBJECT.KEYID = 5
1,212,244 UART: [ldev] AUTHORITY.KEYID = 7
1,212,707 UART: [ldev] FE.KEYID = 1
1,217,947 UART: [ldev] Erasing FE.KEYID = 1
1,244,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,613 UART: [ldev] --
1,284,072 UART: [fwproc] Wait for Commands...
1,284,874 UART: [fwproc] Recv command 0x46574c44
1,285,602 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,829 UART: ROM Fatal Error: 0x000B002E
2,610,988 >>> mbox cmd response: failed
2,610,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,994 >>> mbox cmd response: failed
2,610,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,611,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
893,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,741 UART: [kat] ++
897,893 UART: [kat] sha1
902,245 UART: [kat] SHA2-256
904,185 UART: [kat] SHA2-384
907,054 UART: [kat] SHA2-512-ACC
908,955 UART: [kat] ECC-384
918,816 UART: [kat] HMAC-384Kdf
923,562 UART: [kat] LMS
1,171,890 UART: [kat] --
1,172,861 UART: [cold-reset] ++
1,173,213 UART: [fht] FHT @ 0x50003400
1,175,764 UART: [idev] ++
1,175,932 UART: [idev] CDI.KEYID = 6
1,176,292 UART: [idev] SUBJECT.KEYID = 7
1,176,716 UART: [idev] UDS.KEYID = 0
1,177,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,710 UART: [idev] Erasing UDS.KEYID = 0
1,201,635 UART: [idev] Sha1 KeyId Algorithm
1,210,081 UART: [idev] --
1,211,245 UART: [ldev] ++
1,211,413 UART: [ldev] CDI.KEYID = 6
1,211,776 UART: [ldev] SUBJECT.KEYID = 5
1,212,202 UART: [ldev] AUTHORITY.KEYID = 7
1,212,665 UART: [ldev] FE.KEYID = 1
1,218,187 UART: [ldev] Erasing FE.KEYID = 1
1,244,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,357 UART: [ldev] --
1,283,864 UART: [fwproc] Wait for Commands...
1,284,452 UART: [fwproc] Recv command 0x46574c44
1,285,180 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,465,303 >>> mbox cmd response: failed
2,465,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,465,309 >>> mbox cmd response: failed
2,465,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,465,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,516 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Manufacturing
86,068 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,461 UART: [kat] HMAC-384Kdf
923,199 UART: [kat] LMS
1,171,527 UART: [kat] --
1,172,162 UART: [cold-reset] ++
1,172,702 UART: [fht] FHT @ 0x50003400
1,175,593 UART: [idev] ++
1,175,761 UART: [idev] CDI.KEYID = 6
1,176,121 UART: [idev] SUBJECT.KEYID = 7
1,176,545 UART: [idev] UDS.KEYID = 0
1,176,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,775 UART: [idev] Erasing UDS.KEYID = 0
1,202,480 UART: [idev] Sha1 KeyId Algorithm
1,210,950 UART: [idev] --
1,212,000 UART: [ldev] ++
1,212,168 UART: [ldev] CDI.KEYID = 6
1,212,531 UART: [ldev] SUBJECT.KEYID = 5
1,212,957 UART: [ldev] AUTHORITY.KEYID = 7
1,213,420 UART: [ldev] FE.KEYID = 1
1,218,652 UART: [ldev] Erasing FE.KEYID = 1
1,244,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,931 UART: [fwproc] Wait for Commands...
1,284,697 UART: [fwproc] Recv command 0x46574c44
1,285,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,970 UART: ROM Fatal Error: 0x000B002E
2,610,129 >>> mbox cmd response: failed
2,610,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,135 >>> mbox cmd response: failed
2,610,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,160 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
893,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,284 UART: [kat] ++
897,436 UART: [kat] sha1
901,666 UART: [kat] SHA2-256
903,606 UART: [kat] SHA2-384
906,241 UART: [kat] SHA2-512-ACC
908,142 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,483 UART: [kat] LMS
1,170,811 UART: [kat] --
1,171,800 UART: [cold-reset] ++
1,172,214 UART: [fht] FHT @ 0x50003400
1,174,929 UART: [idev] ++
1,175,097 UART: [idev] CDI.KEYID = 6
1,175,457 UART: [idev] SUBJECT.KEYID = 7
1,175,881 UART: [idev] UDS.KEYID = 0
1,176,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,035 UART: [idev] Erasing UDS.KEYID = 0
1,200,878 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,456 UART: [ldev] ++
1,210,624 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,413 UART: [ldev] AUTHORITY.KEYID = 7
1,211,876 UART: [ldev] FE.KEYID = 1
1,217,244 UART: [ldev] Erasing FE.KEYID = 1
1,243,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,012 UART: [ldev] --
1,282,417 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0x46574c44
1,283,723 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,268 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,464,684 >>> mbox cmd response: failed
2,464,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,690 >>> mbox cmd response: failed
2,464,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,811 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Manufacturing
85,789 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,229 UART: [idev] ++
1,173,397 UART: [idev] CDI.KEYID = 6
1,173,758 UART: [idev] SUBJECT.KEYID = 7
1,174,183 UART: [idev] UDS.KEYID = 0
1,174,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,732 UART: [ldev] ++
1,208,900 UART: [ldev] CDI.KEYID = 6
1,209,264 UART: [ldev] SUBJECT.KEYID = 5
1,209,691 UART: [ldev] AUTHORITY.KEYID = 7
1,210,154 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,799 UART: [fwproc] Recv command 0x46574c44
1,282,532 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,760 UART: ROM Fatal Error: 0x000B002E
2,606,919 >>> mbox cmd response: failed
2,606,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,925 >>> mbox cmd response: failed
2,606,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,546 UART: [kat] LMS
1,168,858 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,174,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,681 UART: [idev] Sha1 KeyId Algorithm
1,208,637 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,215,906 UART: [ldev] Erasing FE.KEYID = 1
1,242,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,472 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,173 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,824 >>> mbox cmd response: failed
2,458,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,830 >>> mbox cmd response: failed
2,458,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Manufacturing
85,848 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,200,232 UART: [idev] Sha1 KeyId Algorithm
1,209,164 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,571 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x46574c44
1,283,733 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,341 UART: ROM Fatal Error: 0x000B002E
2,608,500 >>> mbox cmd response: failed
2,608,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,506 >>> mbox cmd response: failed
2,608,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,543 UART: [kat] LMS
1,169,855 UART: [kat] --
1,171,012 UART: [cold-reset] ++
1,171,478 UART: [fht] FHT @ 0x50003400
1,174,180 UART: [idev] ++
1,174,348 UART: [idev] CDI.KEYID = 6
1,174,709 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,175,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,146 UART: [idev] Erasing UDS.KEYID = 0
1,200,406 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,507 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,774 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,691 >>> mbox cmd response: failed
2,460,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,697 >>> mbox cmd response: failed
2,460,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,836 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
4,878,854 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,631,625 >>> mbox cmd response: failed
16,632,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,632,627 >>> mbox cmd response: failed
16,632,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,633,187 >>> mbox cmd response: failed
Initializing fuses
2,062,953 writing to cptra_bootfsm_go
6,918,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,501,261 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
4,866,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,625,124 >>> mbox cmd response: failed
16,625,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,626,154 >>> mbox cmd response: failed
16,626,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,626,721 >>> mbox cmd response: failed
Initializing fuses
2,056,198 writing to cptra_bootfsm_go
6,910,846 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,493,490 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
5,190,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,803,215 >>> mbox cmd response: failed
16,803,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,804,313 >>> mbox cmd response: failed
16,804,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,804,892 >>> mbox cmd response: failed
Initializing fuses
2,056,146 writing to cptra_bootfsm_go
8,245,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,673,613 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,186,960 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,793,852 >>> mbox cmd response: failed
16,794,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,795,083 >>> mbox cmd response: failed
16,795,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,795,644 >>> mbox cmd response: failed
Initializing fuses
2,057,784 writing to cptra_bootfsm_go
8,258,677 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,689,368 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,439,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,378,968 >>> mbox cmd response: failed
12,379,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,380,065 >>> mbox cmd response: failed
12,380,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,380,635 >>> mbox cmd response: failed
Initializing fuses
2,060,769 writing to cptra_bootfsm_go
5,523,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,361,513 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,461,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,449,492 >>> mbox cmd response: failed
12,450,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,479 >>> mbox cmd response: failed
12,450,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,033 >>> mbox cmd response: failed
Initializing fuses
2,055,614 writing to cptra_bootfsm_go
5,520,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,343,578 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,785,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,628,620 >>> mbox cmd response: failed
12,629,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,555 >>> mbox cmd response: failed
12,629,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,119 >>> mbox cmd response: failed
Initializing fuses
2,059,764 writing to cptra_bootfsm_go
11,019,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,737,070 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,779,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,651,073 >>> mbox cmd response: failed
12,651,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,652,158 >>> mbox cmd response: failed
12,652,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,652,714 >>> mbox cmd response: failed
Initializing fuses
2,055,183 writing to cptra_bootfsm_go
11,009,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,739,669 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,463,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,398,122 >>> mbox cmd response: failed
12,398,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,399,224 >>> mbox cmd response: failed
12,399,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,399,843 >>> mbox cmd response: failed
Initializing fuses
2,064,412 writing to cptra_bootfsm_go
5,519,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,357,439 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,464,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,434,966 >>> mbox cmd response: failed
12,435,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,435,936 >>> mbox cmd response: failed
12,436,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,503 >>> mbox cmd response: failed
Initializing fuses
2,057,198 writing to cptra_bootfsm_go
5,481,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,280,248 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,784,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,618,503 >>> mbox cmd response: failed
12,619,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,619,443 >>> mbox cmd response: failed
12,619,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,619,991 >>> mbox cmd response: failed
Initializing fuses
2,056,938 writing to cptra_bootfsm_go
11,017,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,723,100 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,792,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,629,889 >>> mbox cmd response: failed
12,630,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,802 >>> mbox cmd response: failed
12,631,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,631,372 >>> mbox cmd response: failed
Initializing fuses
2,056,412 writing to cptra_bootfsm_go
11,029,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,750,244 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,299 >>> mbox cmd response: failed
1,203,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,305 >>> mbox cmd response: failed
1,203,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,288 UART: [kat] SHA2-512-ACC
897,189 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,873 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,592 UART: [idev] --
1,514,637 UART: [ldev] ++
1,514,805 UART: [ldev] CDI.KEYID = 6
1,515,168 UART: [ldev] SUBJECT.KEYID = 5
1,515,594 UART: [ldev] AUTHORITY.KEYID = 7
1,516,057 UART: [ldev] FE.KEYID = 1
1,521,433 UART: [ldev] Erasing FE.KEYID = 1
1,546,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,996 UART: [ldev] --
1,586,393 UART: [fwproc] Waiting for Commands...
1,587,062 UART: [fwproc] Received command 0x46574c44
1,587,853 UART: [fwproc] Received Image of size 114448 bytes
2,885,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,584 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,513 >>> mbox cmd response: failed
1,202,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,519 >>> mbox cmd response: failed
1,202,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,466 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,010 >>> mbox cmd response: failed
1,203,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,016 >>> mbox cmd response: failed
1,203,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,293 UART: [kat] SHA2-512-ACC
897,194 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,742 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
1,481,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,513 UART: [idev] Erasing UDS.KEYID = 0
1,505,007 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,651 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,546,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,205 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,253 UART: [fwproc] Received command 0x46574c44
1,588,044 UART: [fwproc] Received Image of size 114448 bytes
2,887,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,387 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,910 >>> mbox cmd response: failed
1,203,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,916 >>> mbox cmd response: failed
1,203,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,941 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,201,847 >>> mbox cmd response: failed
1,201,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,853 >>> mbox cmd response: failed
1,201,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,136 UART: [kat] SHA2-256
892,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,911 UART: [kat] ++
897,063 UART: [kat] sha1
901,449 UART: [kat] SHA2-256
903,389 UART: [kat] SHA2-384
906,066 UART: [kat] SHA2-512-ACC
907,967 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,386 UART: [kat] LMS
1,170,714 UART: [kat] --
1,171,633 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,176,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,655 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,780 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,293 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,208 UART: [fwproc] Recv command 0x46574c44
1,282,936 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,655 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,039 >>> mbox cmd response: failed
1,202,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,045 >>> mbox cmd response: failed
1,202,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,028 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,204,388 >>> mbox cmd response: failed
1,204,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,394 >>> mbox cmd response: failed
1,204,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
893,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,064 UART: [kat] ++
898,216 UART: [kat] sha1
902,330 UART: [kat] SHA2-256
904,270 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,885 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,528 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,388 UART: [idev] --
1,211,226 UART: [ldev] ++
1,211,394 UART: [ldev] CDI.KEYID = 6
1,211,757 UART: [ldev] SUBJECT.KEYID = 5
1,212,183 UART: [ldev] AUTHORITY.KEYID = 7
1,212,646 UART: [ldev] FE.KEYID = 1
1,217,846 UART: [ldev] Erasing FE.KEYID = 1
1,244,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,568 UART: [ldev] --
1,283,955 UART: [fwproc] Wait for Commands...
1,284,679 UART: [fwproc] Recv command 0x46574c44
1,285,407 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,562 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,754 >>> mbox cmd response: failed
1,203,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,760 >>> mbox cmd response: failed
1,203,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,031 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,561 >>> mbox cmd response: failed
1,203,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,567 >>> mbox cmd response: failed
1,203,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,174,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,860 UART: [ldev] --
1,281,234 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,325 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,417 >>> mbox cmd response: failed
1,202,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,423 >>> mbox cmd response: failed
1,202,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,631 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,764 >>> mbox cmd response: failed
1,203,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,770 >>> mbox cmd response: failed
1,203,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,174,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,241,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,567 UART: [ldev] --
1,280,845 UART: [fwproc] Wait for Commands...
1,281,628 UART: [fwproc] Recv command 0x46574c44
1,282,361 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,428 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,624 >>> mbox cmd response: failed
1,203,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,630 >>> mbox cmd response: failed
1,203,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,210 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,351 UART:
192,704 UART: Running Caliptra ROM ...
193,906 UART:
194,062 UART: [state] CFI Enabled
262,200 UART: [state] LifecycleState = Unprovisioned
264,178 UART: [state] DebugLocked = No
266,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,722 UART: [kat] SHA2-256
441,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,921 UART: [kat] ++
452,450 UART: [kat] sha1
463,443 UART: [kat] SHA2-256
466,118 UART: [kat] SHA2-384
471,929 UART: [kat] SHA2-512-ACC
474,327 UART: [kat] ECC-384
2,769,301 UART: [kat] HMAC-384Kdf
2,802,669 UART: [kat] LMS
3,992,938 UART: [kat] --
3,999,011 UART: [cold-reset] ++
4,000,367 UART: [fht] Storing FHT @ 0x50003400
4,011,694 UART: [idev] ++
4,012,269 UART: [idev] CDI.KEYID = 6
4,013,289 UART: [idev] SUBJECT.KEYID = 7
4,014,453 UART: [idev] UDS.KEYID = 0
4,017,010 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,755 UART: [idev] Erasing UDS.KEYID = 0
7,348,372 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,529 UART: [idev] --
7,375,654 UART: [ldev] ++
7,376,243 UART: [ldev] CDI.KEYID = 6
7,377,236 UART: [ldev] SUBJECT.KEYID = 5
7,378,404 UART: [ldev] AUTHORITY.KEYID = 7
7,379,641 UART: [ldev] FE.KEYID = 1
7,423,612 UART: [ldev] Erasing FE.KEYID = 1
10,758,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,950 UART: [ldev] --
13,138,623 UART: [fwproc] Waiting for Commands...
13,140,566 UART: [fwproc] Received command 0x46574c44
13,142,754 UART: [fwproc] Received Image of size 114124 bytes
15,847,504 UART: ROM Fatal Error: 0x000B0012
15,851,020 >>> mbox cmd response: failed
15,851,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,851,807 >>> mbox cmd response: failed
15,852,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,372 >>> mbox cmd response: failed
Initializing fuses
2,062,059 writing to cptra_bootfsm_go
2,251,367 UART:
2,251,709 UART: Running Caliptra ROM ...
2,252,843 UART:
2,253,016 UART: [state] CFI Enabled
2,312,607 UART: [state] LifecycleState = Unprovisioned
2,314,535 UART: [state] DebugLocked = No
2,317,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,373 UART: [kat] SHA2-256
2,491,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,535 UART: [kat] ++
2,501,997 UART: [kat] sha1
2,512,290 UART: [kat] SHA2-256
2,514,987 UART: [kat] SHA2-384
2,521,410 UART: [kat] SHA2-512-ACC
2,523,760 UART: [kat] ECC-384
4,815,137 UART: [kat] HMAC-384Kdf
4,848,044 UART: [kat] LMS
6,038,358 UART: [kat] --
6,041,407 UART: [cold-reset] ++
6,043,727 UART: [fht] Storing FHT @ 0x50003400
6,055,641 UART: [idev] ++
6,056,214 UART: [idev] CDI.KEYID = 6
6,057,154 UART: [idev] SUBJECT.KEYID = 7
6,058,367 UART: [idev] UDS.KEYID = 0
6,061,177 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,204,748 UART: [idev] Erasing UDS.KEYID = 0
9,394,670 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,380 UART: [idev] --
9,419,185 UART: [ldev] ++
9,419,951 UART: [ldev] CDI.KEYID = 6
9,420,871 UART: [ldev] SUBJECT.KEYID = 5
9,422,080 UART: [ldev] AUTHORITY.KEYID = 7
9,423,268 UART: [ldev] FE.KEYID = 1
9,469,840 UART: [ldev] Erasing FE.KEYID = 1
12,804,437 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,116 UART: [ldev] --
15,186,177 UART: [fwproc] Waiting for Commands...
15,188,253 UART: [fwproc] Received command 0x46574c44
15,190,441 UART: [fwproc] Received Image of size 114124 bytes
19,246,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,319,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,388,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,705,442 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,806,896 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,589,063 >>> mbox cmd response: failed
15,589,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,589,940 >>> mbox cmd response: failed
15,590,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,590,503 >>> mbox cmd response: failed
Initializing fuses
2,055,201 writing to cptra_bootfsm_go
5,836,040 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,921,748 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,439 UART:
192,808 UART: Running Caliptra ROM ...
193,917 UART:
603,491 UART: [state] CFI Enabled
614,628 UART: [state] LifecycleState = Unprovisioned
616,567 UART: [state] DebugLocked = No
618,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,231 UART: [kat] SHA2-256
792,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,492 UART: [kat] ++
803,997 UART: [kat] sha1
815,735 UART: [kat] SHA2-256
818,476 UART: [kat] SHA2-384
823,062 UART: [kat] SHA2-512-ACC
825,410 UART: [kat] ECC-384
3,109,485 UART: [kat] HMAC-384Kdf
3,123,065 UART: [kat] LMS
4,313,142 UART: [kat] --
4,316,763 UART: [cold-reset] ++
4,318,321 UART: [fht] Storing FHT @ 0x50003400
4,331,478 UART: [idev] ++
4,332,044 UART: [idev] CDI.KEYID = 6
4,332,987 UART: [idev] SUBJECT.KEYID = 7
4,334,254 UART: [idev] UDS.KEYID = 0
4,336,696 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,142 UART: [idev] Erasing UDS.KEYID = 0
7,617,872 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,126 UART: [idev] --
7,642,891 UART: [ldev] ++
7,643,470 UART: [ldev] CDI.KEYID = 6
7,644,379 UART: [ldev] SUBJECT.KEYID = 5
7,645,597 UART: [ldev] AUTHORITY.KEYID = 7
7,646,888 UART: [ldev] FE.KEYID = 1
7,658,428 UART: [ldev] Erasing FE.KEYID = 1
10,946,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,093 UART: [ldev] --
13,308,403 UART: [fwproc] Waiting for Commands...
13,310,456 UART: [fwproc] Received command 0x46574c44
13,312,654 UART: [fwproc] Received Image of size 114124 bytes
16,016,006 UART: ROM Fatal Error: 0x000B0012
16,019,517 >>> mbox cmd response: failed
16,019,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,020,207 >>> mbox cmd response: failed
16,020,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,020,769 >>> mbox cmd response: failed
Initializing fuses
2,055,130 writing to cptra_bootfsm_go
2,244,473 UART:
2,244,823 UART: Running Caliptra ROM ...
2,245,969 UART:
4,449,520 UART: [state] CFI Enabled
4,465,164 UART: [state] LifecycleState = Unprovisioned
4,467,084 UART: [state] DebugLocked = No
4,469,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,474,413 UART: [kat] SHA2-256
4,644,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,654,725 UART: [kat] ++
4,655,277 UART: [kat] sha1
4,666,605 UART: [kat] SHA2-256
4,669,302 UART: [kat] SHA2-384
4,675,453 UART: [kat] SHA2-512-ACC
4,677,864 UART: [kat] ECC-384
6,961,672 UART: [kat] HMAC-384Kdf
6,974,122 UART: [kat] LMS
8,164,200 UART: [kat] --
8,168,587 UART: [cold-reset] ++
8,171,275 UART: [fht] Storing FHT @ 0x50003400
8,183,137 UART: [idev] ++
8,183,699 UART: [idev] CDI.KEYID = 6
8,184,639 UART: [idev] SUBJECT.KEYID = 7
8,185,909 UART: [idev] UDS.KEYID = 0
8,188,084 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,331,449 UART: [idev] Erasing UDS.KEYID = 0
11,472,662 UART: [idev] Using Sha1 for KeyId Algorithm
11,493,658 UART: [idev] --
11,499,012 UART: [ldev] ++
11,499,582 UART: [ldev] CDI.KEYID = 6
11,500,529 UART: [ldev] SUBJECT.KEYID = 5
11,501,787 UART: [ldev] AUTHORITY.KEYID = 7
11,502,940 UART: [ldev] FE.KEYID = 1
11,512,638 UART: [ldev] Erasing FE.KEYID = 1
14,797,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,090,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,104,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,119,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,133,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,152,830 UART: [ldev] --
17,156,973 UART: [fwproc] Waiting for Commands...
17,159,361 UART: [fwproc] Received command 0x46574c44
17,161,554 UART: [fwproc] Received Image of size 114124 bytes
21,210,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,286,954 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,355,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,673,938 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,384 writing to cptra_bootfsm_go
4,141,720 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,783,787 >>> mbox cmd response: failed
15,784,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,784,673 >>> mbox cmd response: failed
15,784,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,785,236 >>> mbox cmd response: failed
Initializing fuses
2,061,894 writing to cptra_bootfsm_go
8,210,744 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,155,614 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,198 UART:
192,565 UART: Running Caliptra ROM ...
193,762 UART:
193,919 UART: [state] CFI Enabled
267,112 UART: [state] LifecycleState = Unprovisioned
269,030 UART: [state] DebugLocked = No
270,420 UART: [state] WD Timer not started. Device not locked for debugging
274,031 UART: [kat] SHA2-256
453,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,718 UART: [kat] ++
465,185 UART: [kat] sha1
476,710 UART: [kat] SHA2-256
479,712 UART: [kat] SHA2-384
486,992 UART: [kat] SHA2-512-ACC
489,983 UART: [kat] ECC-384
2,949,293 UART: [kat] HMAC-384Kdf
2,971,923 UART: [kat] LMS
3,501,379 UART: [kat] --
3,507,272 UART: [cold-reset] ++
3,508,127 UART: [fht] FHT @ 0x50003400
3,518,893 UART: [idev] ++
3,519,458 UART: [idev] CDI.KEYID = 6
3,520,382 UART: [idev] SUBJECT.KEYID = 7
3,521,593 UART: [idev] UDS.KEYID = 0
3,524,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,742 UART: [idev] Erasing UDS.KEYID = 0
6,028,482 UART: [idev] Sha1 KeyId Algorithm
6,050,564 UART: [idev] --
6,054,431 UART: [ldev] ++
6,055,013 UART: [ldev] CDI.KEYID = 6
6,056,080 UART: [ldev] SUBJECT.KEYID = 5
6,057,193 UART: [ldev] AUTHORITY.KEYID = 7
6,058,381 UART: [ldev] FE.KEYID = 1
6,100,008 UART: [ldev] Erasing FE.KEYID = 1
8,600,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,524 UART: [ldev] --
10,391,465 UART: [fwproc] Wait for Commands...
10,394,156 UART: [fwproc] Recv command 0x46574c44
10,396,274 UART: [fwproc] Recv'd Img size: 114448 bytes
12,444,951 UART: ROM Fatal Error: 0x000B0012
12,448,019 >>> mbox cmd response: failed
12,448,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,676 >>> mbox cmd response: failed
12,448,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,240 >>> mbox cmd response: failed
Initializing fuses
2,056,884 writing to cptra_bootfsm_go
2,246,167 UART:
2,246,515 UART: Running Caliptra ROM ...
2,247,569 UART:
2,247,718 UART: [state] CFI Enabled
2,317,517 UART: [state] LifecycleState = Unprovisioned
2,319,418 UART: [state] DebugLocked = No
2,322,183 UART: [state] WD Timer not started. Device not locked for debugging
2,326,194 UART: [kat] SHA2-256
2,505,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,873 UART: [kat] ++
2,517,330 UART: [kat] sha1
2,528,483 UART: [kat] SHA2-256
2,531,500 UART: [kat] SHA2-384
2,536,732 UART: [kat] SHA2-512-ACC
2,539,678 UART: [kat] ECC-384
5,002,161 UART: [kat] HMAC-384Kdf
5,025,629 UART: [kat] LMS
5,555,069 UART: [kat] --
5,558,305 UART: [cold-reset] ++
5,559,216 UART: [fht] FHT @ 0x50003400
5,569,817 UART: [idev] ++
5,570,408 UART: [idev] CDI.KEYID = 6
5,571,324 UART: [idev] SUBJECT.KEYID = 7
5,572,541 UART: [idev] UDS.KEYID = 0
5,574,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,779 UART: [idev] Erasing UDS.KEYID = 0
8,080,422 UART: [idev] Sha1 KeyId Algorithm
8,103,558 UART: [idev] --
8,106,802 UART: [ldev] ++
8,107,381 UART: [ldev] CDI.KEYID = 6
8,108,264 UART: [ldev] SUBJECT.KEYID = 5
8,109,423 UART: [ldev] AUTHORITY.KEYID = 7
8,110,719 UART: [ldev] FE.KEYID = 1
8,153,915 UART: [ldev] Erasing FE.KEYID = 1
10,656,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,978 UART: [ldev] --
12,446,136 UART: [fwproc] Wait for Commands...
12,447,961 UART: [fwproc] Recv command 0x46574c44
12,450,064 UART: [fwproc] Recv'd Img size: 114448 bytes
15,858,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,928,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,997,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,316,532 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,384,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,250,809 >>> mbox cmd response: failed
12,251,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,778 >>> mbox cmd response: failed
12,252,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,252,348 >>> mbox cmd response: failed
Initializing fuses
2,059,656 writing to cptra_bootfsm_go
5,439,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,141,359 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,735 UART:
193,109 UART: Running Caliptra ROM ...
194,235 UART:
603,887 UART: [state] CFI Enabled
616,776 UART: [state] LifecycleState = Unprovisioned
618,659 UART: [state] DebugLocked = No
620,009 UART: [state] WD Timer not started. Device not locked for debugging
624,109 UART: [kat] SHA2-256
803,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,771 UART: [kat] ++
815,219 UART: [kat] sha1
826,867 UART: [kat] SHA2-256
829,875 UART: [kat] SHA2-384
836,176 UART: [kat] SHA2-512-ACC
839,159 UART: [kat] ECC-384
3,281,150 UART: [kat] HMAC-384Kdf
3,292,998 UART: [kat] LMS
3,822,470 UART: [kat] --
3,825,551 UART: [cold-reset] ++
3,827,590 UART: [fht] FHT @ 0x50003400
3,838,120 UART: [idev] ++
3,838,695 UART: [idev] CDI.KEYID = 6
3,839,604 UART: [idev] SUBJECT.KEYID = 7
3,840,820 UART: [idev] UDS.KEYID = 0
3,843,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,478 UART: [idev] Erasing UDS.KEYID = 0
6,315,191 UART: [idev] Sha1 KeyId Algorithm
6,338,106 UART: [idev] --
6,341,181 UART: [ldev] ++
6,341,751 UART: [ldev] CDI.KEYID = 6
6,342,660 UART: [ldev] SUBJECT.KEYID = 5
6,343,882 UART: [ldev] AUTHORITY.KEYID = 7
6,345,113 UART: [ldev] FE.KEYID = 1
6,355,106 UART: [ldev] Erasing FE.KEYID = 1
8,830,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,591 UART: [ldev] --
10,619,828 UART: [fwproc] Wait for Commands...
10,622,460 UART: [fwproc] Recv command 0x46574c44
10,624,554 UART: [fwproc] Recv'd Img size: 114448 bytes
12,679,563 UART: ROM Fatal Error: 0x000B0012
12,682,638 >>> mbox cmd response: failed
12,683,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,399 >>> mbox cmd response: failed
12,683,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,967 >>> mbox cmd response: failed
Initializing fuses
2,054,547 writing to cptra_bootfsm_go
2,243,863 UART:
2,244,215 UART: Running Caliptra ROM ...
2,245,291 UART:
7,781,116 UART: [state] CFI Enabled
7,797,439 UART: [state] LifecycleState = Unprovisioned
7,799,338 UART: [state] DebugLocked = No
7,801,191 UART: [state] WD Timer not started. Device not locked for debugging
7,805,439 UART: [kat] SHA2-256
7,984,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,996,114 UART: [kat] ++
7,996,664 UART: [kat] sha1
8,006,806 UART: [kat] SHA2-256
8,009,838 UART: [kat] SHA2-384
8,016,207 UART: [kat] SHA2-512-ACC
8,019,154 UART: [kat] ECC-384
10,461,890 UART: [kat] HMAC-384Kdf
10,474,543 UART: [kat] LMS
11,004,038 UART: [kat] --
11,008,867 UART: [cold-reset] ++
11,010,053 UART: [fht] FHT @ 0x50003400
11,021,736 UART: [idev] ++
11,022,338 UART: [idev] CDI.KEYID = 6
11,023,247 UART: [idev] SUBJECT.KEYID = 7
11,024,413 UART: [idev] UDS.KEYID = 0
11,026,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,170,602 UART: [idev] Erasing UDS.KEYID = 0
13,496,469 UART: [idev] Sha1 KeyId Algorithm
13,520,394 UART: [idev] --
13,524,550 UART: [ldev] ++
13,525,114 UART: [ldev] CDI.KEYID = 6
13,526,022 UART: [ldev] SUBJECT.KEYID = 5
13,527,240 UART: [ldev] AUTHORITY.KEYID = 7
13,528,472 UART: [ldev] FE.KEYID = 1
13,540,199 UART: [ldev] Erasing FE.KEYID = 1
16,014,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,733,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,749,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,765,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,781,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,801,665 UART: [ldev] --
17,806,886 UART: [fwproc] Wait for Commands...
17,810,062 UART: [fwproc] Recv command 0x46574c44
17,812,108 UART: [fwproc] Recv'd Img size: 114448 bytes
21,219,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,296,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,364,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,683,120 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,697,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,458,877 >>> mbox cmd response: failed
12,459,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,733 >>> mbox cmd response: failed
12,460,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,305 >>> mbox cmd response: failed
Initializing fuses
2,054,242 writing to cptra_bootfsm_go
11,101,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,689,056 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,084 UART:
192,530 UART: Running Caliptra ROM ...
193,689 UART:
193,835 UART: [state] CFI Enabled
266,634 UART: [state] LifecycleState = Unprovisioned
269,064 UART: [state] DebugLocked = No
271,801 UART: [state] WD Timer not started. Device not locked for debugging
276,637 UART: [kat] SHA2-256
466,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,258 UART: [kat] ++
477,751 UART: [kat] sha1
489,172 UART: [kat] SHA2-256
492,185 UART: [kat] SHA2-384
497,950 UART: [kat] SHA2-512-ACC
500,511 UART: [kat] ECC-384
2,950,701 UART: [kat] HMAC-384Kdf
2,974,017 UART: [kat] LMS
3,505,793 UART: [kat] --
3,510,828 UART: [cold-reset] ++
3,512,984 UART: [fht] FHT @ 0x50003400
3,524,020 UART: [idev] ++
3,524,702 UART: [idev] CDI.KEYID = 6
3,525,646 UART: [idev] SUBJECT.KEYID = 7
3,526,858 UART: [idev] UDS.KEYID = 0
3,529,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,600 UART: [idev] Erasing UDS.KEYID = 0
6,030,530 UART: [idev] Sha1 KeyId Algorithm
6,051,271 UART: [idev] --
6,056,065 UART: [ldev] ++
6,056,760 UART: [ldev] CDI.KEYID = 6
6,057,678 UART: [ldev] SUBJECT.KEYID = 5
6,058,845 UART: [ldev] AUTHORITY.KEYID = 7
6,060,081 UART: [ldev] FE.KEYID = 1
6,102,061 UART: [ldev] Erasing FE.KEYID = 1
8,608,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,119 UART: [ldev] --
10,418,299 UART: [fwproc] Wait for Commands...
10,420,077 UART: [fwproc] Recv command 0x46574c44
10,422,337 UART: [fwproc] Recv'd Img size: 114448 bytes
12,503,839 UART: ROM Fatal Error: 0x000B0012
12,507,498 >>> mbox cmd response: failed
12,507,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,195 >>> mbox cmd response: failed
12,508,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,749 >>> mbox cmd response: failed
Initializing fuses
2,065,132 writing to cptra_bootfsm_go
2,254,469 UART:
2,254,817 UART: Running Caliptra ROM ...
2,255,869 UART:
2,256,018 UART: [state] CFI Enabled
2,333,384 UART: [state] LifecycleState = Unprovisioned
2,335,809 UART: [state] DebugLocked = No
2,337,550 UART: [state] WD Timer not started. Device not locked for debugging
2,341,304 UART: [kat] SHA2-256
2,530,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,541,749 UART: [kat] ++
2,542,208 UART: [kat] sha1
2,553,259 UART: [kat] SHA2-256
2,556,287 UART: [kat] SHA2-384
2,562,299 UART: [kat] SHA2-512-ACC
2,564,927 UART: [kat] ECC-384
5,012,123 UART: [kat] HMAC-384Kdf
5,038,922 UART: [kat] LMS
5,570,724 UART: [kat] --
5,574,862 UART: [cold-reset] ++
5,576,747 UART: [fht] FHT @ 0x50003400
5,588,221 UART: [idev] ++
5,588,898 UART: [idev] CDI.KEYID = 6
5,589,874 UART: [idev] SUBJECT.KEYID = 7
5,591,034 UART: [idev] UDS.KEYID = 0
5,593,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,737,685 UART: [idev] Erasing UDS.KEYID = 0
8,098,926 UART: [idev] Sha1 KeyId Algorithm
8,119,894 UART: [idev] --
8,125,236 UART: [ldev] ++
8,125,936 UART: [ldev] CDI.KEYID = 6
8,126,847 UART: [ldev] SUBJECT.KEYID = 5
8,128,009 UART: [ldev] AUTHORITY.KEYID = 7
8,129,191 UART: [ldev] FE.KEYID = 1
8,168,734 UART: [ldev] Erasing FE.KEYID = 1
10,672,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,409,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,440,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,455,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,476,680 UART: [ldev] --
12,481,839 UART: [fwproc] Wait for Commands...
12,484,149 UART: [fwproc] Recv command 0x46574c44
12,486,461 UART: [fwproc] Recv'd Img size: 114448 bytes
15,935,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,014,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,130,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,674,502 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,419,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,282,030 >>> mbox cmd response: failed
12,282,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,282,925 >>> mbox cmd response: failed
12,283,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,283,485 >>> mbox cmd response: failed
Initializing fuses
2,058,756 writing to cptra_bootfsm_go
5,491,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,779,535 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,421 UART:
192,778 UART: Running Caliptra ROM ...
193,924 UART:
603,515 UART: [state] CFI Enabled
618,297 UART: [state] LifecycleState = Unprovisioned
620,669 UART: [state] DebugLocked = No
621,990 UART: [state] WD Timer not started. Device not locked for debugging
626,202 UART: [kat] SHA2-256
816,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,894 UART: [kat] ++
827,478 UART: [kat] sha1
839,622 UART: [kat] SHA2-256
842,636 UART: [kat] SHA2-384
850,137 UART: [kat] SHA2-512-ACC
852,747 UART: [kat] ECC-384
3,292,449 UART: [kat] HMAC-384Kdf
3,304,535 UART: [kat] LMS
3,836,378 UART: [kat] --
3,840,659 UART: [cold-reset] ++
3,842,433 UART: [fht] FHT @ 0x50003400
3,853,794 UART: [idev] ++
3,854,468 UART: [idev] CDI.KEYID = 6
3,855,433 UART: [idev] SUBJECT.KEYID = 7
3,856,646 UART: [idev] UDS.KEYID = 0
3,859,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,988 UART: [idev] Erasing UDS.KEYID = 0
6,331,693 UART: [idev] Sha1 KeyId Algorithm
6,354,119 UART: [idev] --
6,359,006 UART: [ldev] ++
6,359,702 UART: [ldev] CDI.KEYID = 6
6,360,765 UART: [ldev] SUBJECT.KEYID = 5
6,361,892 UART: [ldev] AUTHORITY.KEYID = 7
6,363,069 UART: [ldev] FE.KEYID = 1
6,374,146 UART: [ldev] Erasing FE.KEYID = 1
8,853,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,487 UART: [ldev] --
10,644,240 UART: [fwproc] Wait for Commands...
10,646,120 UART: [fwproc] Recv command 0x46574c44
10,648,377 UART: [fwproc] Recv'd Img size: 114448 bytes
12,733,980 UART: ROM Fatal Error: 0x000B0012
12,737,642 >>> mbox cmd response: failed
12,738,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,370 >>> mbox cmd response: failed
12,738,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,957 >>> mbox cmd response: failed
Initializing fuses
2,055,965 writing to cptra_bootfsm_go
2,245,266 UART:
2,245,606 UART: Running Caliptra ROM ...
2,246,749 UART:
7,731,413 UART: [state] CFI Enabled
7,746,016 UART: [state] LifecycleState = Unprovisioned
7,748,371 UART: [state] DebugLocked = No
7,749,849 UART: [state] WD Timer not started. Device not locked for debugging
7,753,918 UART: [kat] SHA2-256
7,943,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,954,560 UART: [kat] ++
7,955,097 UART: [kat] sha1
7,967,613 UART: [kat] SHA2-256
7,970,634 UART: [kat] SHA2-384
7,975,760 UART: [kat] SHA2-512-ACC
7,978,381 UART: [kat] ECC-384
10,421,946 UART: [kat] HMAC-384Kdf
10,436,120 UART: [kat] LMS
10,967,955 UART: [kat] --
10,971,611 UART: [cold-reset] ++
10,973,938 UART: [fht] FHT @ 0x50003400
10,985,733 UART: [idev] ++
10,986,415 UART: [idev] CDI.KEYID = 6
10,987,377 UART: [idev] SUBJECT.KEYID = 7
10,988,593 UART: [idev] UDS.KEYID = 0
10,990,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,134,807 UART: [idev] Erasing UDS.KEYID = 0
13,462,349 UART: [idev] Sha1 KeyId Algorithm
13,485,096 UART: [idev] --
13,489,141 UART: [ldev] ++
13,489,818 UART: [ldev] CDI.KEYID = 6
13,490,699 UART: [ldev] SUBJECT.KEYID = 5
13,491,909 UART: [ldev] AUTHORITY.KEYID = 7
13,493,138 UART: [ldev] FE.KEYID = 1
13,504,677 UART: [ldev] Erasing FE.KEYID = 1
15,983,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,731,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,874 UART: [ldev] --
17,772,627 UART: [fwproc] Wait for Commands...
17,774,874 UART: [fwproc] Recv command 0x46574c44
17,777,211 UART: [fwproc] Recv'd Img size: 114448 bytes
21,225,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,302,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,418,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,960,779 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,756,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,318 >>> mbox cmd response: failed
12,513,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,270 >>> mbox cmd response: failed
12,514,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,831 >>> mbox cmd response: failed
Initializing fuses
2,058,296 writing to cptra_bootfsm_go
11,095,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,299,780 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,479 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,104 UART: [idev] --
1,515,205 UART: [ldev] ++
1,515,373 UART: [ldev] CDI.KEYID = 6
1,515,736 UART: [ldev] SUBJECT.KEYID = 5
1,516,162 UART: [ldev] AUTHORITY.KEYID = 7
1,516,625 UART: [ldev] FE.KEYID = 1
1,521,985 UART: [ldev] Erasing FE.KEYID = 1
1,547,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,482 UART: [ldev] --
1,586,917 UART: [fwproc] Waiting for Commands...
1,587,630 UART: [fwproc] Received command 0x46574c44
1,588,421 UART: [fwproc] Received Image of size 114448 bytes
1,635,646 UART: ROM Fatal Error: 0x000B0012
1,636,803 >>> mbox cmd response: failed
1,636,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,809 >>> mbox cmd response: failed
1,636,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,193 UART: [kat] SHA2-256
892,131 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,416 UART: [idev] ++
1,479,584 UART: [idev] CDI.KEYID = 6
1,479,944 UART: [idev] SUBJECT.KEYID = 7
1,480,368 UART: [idev] UDS.KEYID = 0
1,480,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,186 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,024 UART: [idev] --
1,514,041 UART: [ldev] ++
1,514,209 UART: [ldev] CDI.KEYID = 6
1,514,572 UART: [ldev] SUBJECT.KEYID = 5
1,514,998 UART: [ldev] AUTHORITY.KEYID = 7
1,515,461 UART: [ldev] FE.KEYID = 1
1,520,717 UART: [ldev] Erasing FE.KEYID = 1
1,545,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,192 UART: [ldev] --
1,585,623 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 114448 bytes
2,886,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,225 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,712 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,162 >>> mbox cmd response: failed
1,488,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,168 >>> mbox cmd response: failed
1,488,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,306 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,713 UART: [kat] SHA2-512-ACC
897,614 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,667 UART: [kat] LMS
1,475,863 UART: [kat] --
1,476,710 UART: [cold-reset] ++
1,477,120 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,227 UART: [idev] Erasing UDS.KEYID = 0
1,506,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,741 UART: [idev] --
1,515,714 UART: [ldev] ++
1,515,882 UART: [ldev] CDI.KEYID = 6
1,516,245 UART: [ldev] SUBJECT.KEYID = 5
1,516,671 UART: [ldev] AUTHORITY.KEYID = 7
1,517,134 UART: [ldev] FE.KEYID = 1
1,522,724 UART: [ldev] Erasing FE.KEYID = 1
1,548,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,649 UART: [ldev] --
1,588,160 UART: [fwproc] Waiting for Commands...
1,589,029 UART: [fwproc] Received command 0x46574c44
1,589,820 UART: [fwproc] Received Image of size 114448 bytes
1,636,429 UART: ROM Fatal Error: 0x000B0012
1,637,586 >>> mbox cmd response: failed
1,637,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,592 >>> mbox cmd response: failed
1,637,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,968 UART: [kat] SHA2-256
892,906 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,265 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,880 UART: [cold-reset] ++
1,477,274 UART: [fht] Storing FHT @ 0x50003400
1,480,221 UART: [idev] ++
1,480,389 UART: [idev] CDI.KEYID = 6
1,480,749 UART: [idev] SUBJECT.KEYID = 7
1,481,173 UART: [idev] UDS.KEYID = 0
1,481,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,514,956 UART: [ldev] ++
1,515,124 UART: [ldev] CDI.KEYID = 6
1,515,487 UART: [ldev] SUBJECT.KEYID = 5
1,515,913 UART: [ldev] AUTHORITY.KEYID = 7
1,516,376 UART: [ldev] FE.KEYID = 1
1,521,624 UART: [ldev] Erasing FE.KEYID = 1
1,547,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,551 UART: [ldev] --
1,586,992 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 114448 bytes
2,887,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,841 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,351 >>> mbox cmd response: failed
1,490,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,357 >>> mbox cmd response: failed
1,490,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,263 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
893,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,273 UART: [kat] ++
897,425 UART: [kat] sha1
901,789 UART: [kat] SHA2-256
903,729 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,172,151 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,388 UART: [idev] Erasing UDS.KEYID = 0
1,201,665 UART: [idev] Sha1 KeyId Algorithm
1,210,091 UART: [idev] --
1,211,299 UART: [ldev] ++
1,211,467 UART: [ldev] CDI.KEYID = 6
1,211,830 UART: [ldev] SUBJECT.KEYID = 5
1,212,256 UART: [ldev] AUTHORITY.KEYID = 7
1,212,719 UART: [ldev] FE.KEYID = 1
1,217,789 UART: [ldev] Erasing FE.KEYID = 1
1,244,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,089 UART: [ldev] --
1,283,520 UART: [fwproc] Wait for Commands...
1,284,262 UART: [fwproc] Recv command 0x46574c44
1,284,990 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,193 UART: ROM Fatal Error: 0x000B0012
1,332,350 >>> mbox cmd response: failed
1,332,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,356 >>> mbox cmd response: failed
1,332,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
87,027 UART: [state] WD Timer not started. Device not locked for debugging
88,248 UART: [kat] SHA2-256
893,898 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,023 UART: [kat] ++
898,175 UART: [kat] sha1
902,347 UART: [kat] SHA2-256
904,287 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,440 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,237 UART: [cold-reset] ++
1,172,691 UART: [fht] FHT @ 0x50003400
1,175,214 UART: [idev] ++
1,175,382 UART: [idev] CDI.KEYID = 6
1,175,742 UART: [idev] SUBJECT.KEYID = 7
1,176,166 UART: [idev] UDS.KEYID = 0
1,176,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,234 UART: [idev] Erasing UDS.KEYID = 0
1,200,773 UART: [idev] Sha1 KeyId Algorithm
1,209,059 UART: [idev] --
1,210,141 UART: [ldev] ++
1,210,309 UART: [ldev] CDI.KEYID = 6
1,210,672 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,968 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,314 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,827 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,227 >>> mbox cmd response: failed
1,186,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,233 >>> mbox cmd response: failed
1,186,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,712 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
893,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,454 UART: [kat] ++
897,606 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,300 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,451 UART: [idev] ++
1,175,619 UART: [idev] CDI.KEYID = 6
1,175,979 UART: [idev] SUBJECT.KEYID = 7
1,176,403 UART: [idev] UDS.KEYID = 0
1,176,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,799 UART: [idev] Erasing UDS.KEYID = 0
1,201,800 UART: [idev] Sha1 KeyId Algorithm
1,210,192 UART: [idev] --
1,211,372 UART: [ldev] ++
1,211,540 UART: [ldev] CDI.KEYID = 6
1,211,903 UART: [ldev] SUBJECT.KEYID = 5
1,212,329 UART: [ldev] AUTHORITY.KEYID = 7
1,212,792 UART: [ldev] FE.KEYID = 1
1,217,918 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,040 UART: [ldev] --
1,283,465 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,960 UART: ROM Fatal Error: 0x000B0012
1,333,117 >>> mbox cmd response: failed
1,333,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,123 >>> mbox cmd response: failed
1,333,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
918,397 UART: [kat] HMAC-384Kdf
923,065 UART: [kat] LMS
1,171,393 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,750 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,210,106 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,218,246 UART: [ldev] Erasing FE.KEYID = 1
1,244,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,833 UART: [fwproc] Wait for Commands...
1,284,581 UART: [fwproc] Recv command 0x46574c44
1,285,309 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,328 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,950 >>> mbox cmd response: failed
1,184,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,956 >>> mbox cmd response: failed
1,184,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,707 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,914 UART: [state] LifecycleState = Unprovisioned
86,569 UART: [state] DebugLocked = No
87,143 UART: [state] WD Timer not started. Device not locked for debugging
88,282 UART: [kat] SHA2-256
891,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,961 UART: [kat] ++
896,113 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
905,000 UART: [kat] SHA2-512-ACC
906,901 UART: [kat] ECC-384
916,700 UART: [kat] HMAC-384Kdf
921,442 UART: [kat] LMS
1,169,754 UART: [kat] --
1,170,647 UART: [cold-reset] ++
1,171,223 UART: [fht] FHT @ 0x50003400
1,173,911 UART: [idev] ++
1,174,079 UART: [idev] CDI.KEYID = 6
1,174,440 UART: [idev] SUBJECT.KEYID = 7
1,174,865 UART: [idev] UDS.KEYID = 0
1,175,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,937 UART: [idev] Erasing UDS.KEYID = 0
1,199,929 UART: [idev] Sha1 KeyId Algorithm
1,208,835 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,370 UART: [ldev] Erasing FE.KEYID = 1
1,242,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,646 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,717 UART: [fwproc] Recv command 0x46574c44
1,283,450 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,459 UART: ROM Fatal Error: 0x000B0012
1,331,616 >>> mbox cmd response: failed
1,331,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,622 >>> mbox cmd response: failed
1,331,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,174,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,283 UART: [idev] Sha1 KeyId Algorithm
1,208,075 UART: [idev] --
1,209,040 UART: [ldev] ++
1,209,208 UART: [ldev] CDI.KEYID = 6
1,209,572 UART: [ldev] SUBJECT.KEYID = 5
1,209,999 UART: [ldev] AUTHORITY.KEYID = 7
1,210,462 UART: [ldev] FE.KEYID = 1
1,215,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,178 UART: [ldev] --
1,280,568 UART: [fwproc] Wait for Commands...
1,281,255 UART: [fwproc] Recv command 0x46574c44
1,281,988 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,497 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,579 >>> mbox cmd response: failed
1,181,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,585 >>> mbox cmd response: failed
1,181,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,797 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,924 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,382 UART: [idev] Erasing UDS.KEYID = 0
1,198,222 UART: [idev] Sha1 KeyId Algorithm
1,207,074 UART: [idev] --
1,207,963 UART: [ldev] ++
1,208,131 UART: [ldev] CDI.KEYID = 6
1,208,495 UART: [ldev] SUBJECT.KEYID = 5
1,208,922 UART: [ldev] AUTHORITY.KEYID = 7
1,209,385 UART: [ldev] FE.KEYID = 1
1,214,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,401 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,560 UART: ROM Fatal Error: 0x000B0012
1,329,717 >>> mbox cmd response: failed
1,329,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,723 >>> mbox cmd response: failed
1,329,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,174,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,198,738 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,547 UART: [ldev] ++
1,208,715 UART: [ldev] CDI.KEYID = 6
1,209,079 UART: [ldev] SUBJECT.KEYID = 5
1,209,506 UART: [ldev] AUTHORITY.KEYID = 7
1,209,969 UART: [ldev] FE.KEYID = 1
1,215,041 UART: [ldev] Erasing FE.KEYID = 1
1,241,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,378 UART: [fwproc] Recv command 0x46574c44
1,282,111 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,496 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,804 >>> mbox cmd response: failed
1,182,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,810 >>> mbox cmd response: failed
1,182,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,388 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,188 UART:
192,552 UART: Running Caliptra ROM ...
193,742 UART:
193,895 UART: [state] CFI Enabled
262,997 UART: [state] LifecycleState = Unprovisioned
264,915 UART: [state] DebugLocked = No
266,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,328 UART: [kat] SHA2-256
441,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,530 UART: [kat] ++
452,113 UART: [kat] sha1
462,237 UART: [kat] SHA2-256
464,919 UART: [kat] SHA2-384
470,674 UART: [kat] SHA2-512-ACC
473,046 UART: [kat] ECC-384
2,767,254 UART: [kat] HMAC-384Kdf
2,798,173 UART: [kat] LMS
3,988,474 UART: [kat] --
3,993,195 UART: [cold-reset] ++
3,994,649 UART: [fht] Storing FHT @ 0x50003400
4,005,220 UART: [idev] ++
4,005,792 UART: [idev] CDI.KEYID = 6
4,006,811 UART: [idev] SUBJECT.KEYID = 7
4,007,976 UART: [idev] UDS.KEYID = 0
4,010,584 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,026 UART: [idev] Erasing UDS.KEYID = 0
7,341,973 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,628 UART: [idev] --
7,368,305 UART: [ldev] ++
7,368,885 UART: [ldev] CDI.KEYID = 6
7,369,873 UART: [ldev] SUBJECT.KEYID = 5
7,371,037 UART: [ldev] AUTHORITY.KEYID = 7
7,372,334 UART: [ldev] FE.KEYID = 1
7,419,814 UART: [ldev] Erasing FE.KEYID = 1
10,752,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,904 UART: [ldev] --
13,116,272 UART: [fwproc] Waiting for Commands...
13,118,867 UART: [fwproc] Received command 0x46574c44
13,121,055 UART: [fwproc] Received Image of size 114124 bytes
15,813,001 UART: ROM Fatal Error: 0x000B0010
15,816,455 >>> mbox cmd response: failed
15,816,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,817,217 >>> mbox cmd response: failed
15,817,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,817,780 >>> mbox cmd response: failed
Initializing fuses
2,055,549 writing to cptra_bootfsm_go
2,244,877 UART:
2,245,226 UART: Running Caliptra ROM ...
2,246,366 UART:
2,246,530 UART: [state] CFI Enabled
2,318,050 UART: [state] LifecycleState = Unprovisioned
2,319,962 UART: [state] DebugLocked = No
2,322,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,913 UART: [kat] SHA2-256
2,496,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,155 UART: [kat] ++
2,507,663 UART: [kat] sha1
2,519,417 UART: [kat] SHA2-256
2,522,129 UART: [kat] SHA2-384
2,528,173 UART: [kat] SHA2-512-ACC
2,530,584 UART: [kat] ECC-384
4,819,579 UART: [kat] HMAC-384Kdf
4,851,790 UART: [kat] LMS
6,042,126 UART: [kat] --
6,046,831 UART: [cold-reset] ++
6,048,818 UART: [fht] Storing FHT @ 0x50003400
6,059,978 UART: [idev] ++
6,060,552 UART: [idev] CDI.KEYID = 6
6,061,435 UART: [idev] SUBJECT.KEYID = 7
6,062,704 UART: [idev] UDS.KEYID = 0
6,064,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,622 UART: [idev] Erasing UDS.KEYID = 0
9,401,167 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,035 UART: [idev] --
9,426,390 UART: [ldev] ++
9,426,961 UART: [ldev] CDI.KEYID = 6
9,427,924 UART: [ldev] SUBJECT.KEYID = 5
9,429,186 UART: [ldev] AUTHORITY.KEYID = 7
9,430,424 UART: [ldev] FE.KEYID = 1
9,473,657 UART: [ldev] Erasing FE.KEYID = 1
12,799,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,563 UART: [ldev] --
15,158,475 UART: [fwproc] Waiting for Commands...
15,161,623 UART: [fwproc] Received command 0x46574c44
15,163,811 UART: [fwproc] Received Image of size 114124 bytes
19,215,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,292,904 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,361,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,678,366 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,788,683 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,542,204 >>> mbox cmd response: failed
15,542,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,092 >>> mbox cmd response: failed
15,543,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,659 >>> mbox cmd response: failed
Initializing fuses
2,055,869 writing to cptra_bootfsm_go
5,849,302 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,938,584 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,394 UART:
192,772 UART: Running Caliptra ROM ...
193,975 UART:
603,388 UART: [state] CFI Enabled
615,664 UART: [state] LifecycleState = Unprovisioned
617,538 UART: [state] DebugLocked = No
619,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,839 UART: [kat] SHA2-256
794,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,139 UART: [kat] ++
805,619 UART: [kat] sha1
816,492 UART: [kat] SHA2-256
819,178 UART: [kat] SHA2-384
824,689 UART: [kat] SHA2-512-ACC
827,081 UART: [kat] ECC-384
3,110,252 UART: [kat] HMAC-384Kdf
3,122,858 UART: [kat] LMS
4,312,962 UART: [kat] --
4,317,623 UART: [cold-reset] ++
4,318,911 UART: [fht] Storing FHT @ 0x50003400
4,329,532 UART: [idev] ++
4,330,097 UART: [idev] CDI.KEYID = 6
4,331,077 UART: [idev] SUBJECT.KEYID = 7
4,332,296 UART: [idev] UDS.KEYID = 0
4,334,927 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,570 UART: [idev] Erasing UDS.KEYID = 0
7,616,231 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,993 UART: [idev] --
7,643,371 UART: [ldev] ++
7,643,975 UART: [ldev] CDI.KEYID = 6
7,644,891 UART: [ldev] SUBJECT.KEYID = 5
7,646,110 UART: [ldev] AUTHORITY.KEYID = 7
7,647,348 UART: [ldev] FE.KEYID = 1
7,658,648 UART: [ldev] Erasing FE.KEYID = 1
10,946,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,854 UART: [ldev] --
13,306,778 UART: [fwproc] Waiting for Commands...
13,309,249 UART: [fwproc] Received command 0x46574c44
13,311,454 UART: [fwproc] Received Image of size 114124 bytes
16,007,513 UART: ROM Fatal Error: 0x000B0010
16,011,023 >>> mbox cmd response: failed
16,011,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,011,807 >>> mbox cmd response: failed
16,012,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,012,377 >>> mbox cmd response: failed
Initializing fuses
2,062,705 writing to cptra_bootfsm_go
2,252,041 UART:
2,252,385 UART: Running Caliptra ROM ...
2,253,526 UART:
4,430,245 UART: [state] CFI Enabled
4,445,208 UART: [state] LifecycleState = Unprovisioned
4,447,171 UART: [state] DebugLocked = No
4,449,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,223 UART: [kat] SHA2-256
4,623,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,634,541 UART: [kat] ++
4,635,003 UART: [kat] sha1
4,646,760 UART: [kat] SHA2-256
4,649,463 UART: [kat] SHA2-384
4,654,536 UART: [kat] SHA2-512-ACC
4,656,879 UART: [kat] ECC-384
6,938,864 UART: [kat] HMAC-384Kdf
6,950,929 UART: [kat] LMS
8,141,059 UART: [kat] --
8,145,189 UART: [cold-reset] ++
8,147,496 UART: [fht] Storing FHT @ 0x50003400
8,158,758 UART: [idev] ++
8,159,320 UART: [idev] CDI.KEYID = 6
8,160,262 UART: [idev] SUBJECT.KEYID = 7
8,161,530 UART: [idev] UDS.KEYID = 0
8,164,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,307,493 UART: [idev] Erasing UDS.KEYID = 0
11,450,278 UART: [idev] Using Sha1 for KeyId Algorithm
11,471,408 UART: [idev] --
11,476,080 UART: [ldev] ++
11,476,663 UART: [ldev] CDI.KEYID = 6
11,477,628 UART: [ldev] SUBJECT.KEYID = 5
11,478,842 UART: [ldev] AUTHORITY.KEYID = 7
11,480,077 UART: [ldev] FE.KEYID = 1
11,491,860 UART: [ldev] Erasing FE.KEYID = 1
14,780,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,072,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,087,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,102,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,116,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,135,404 UART: [ldev] --
17,140,021 UART: [fwproc] Waiting for Commands...
17,141,703 UART: [fwproc] Received command 0x46574c44
17,143,893 UART: [fwproc] Received Image of size 114124 bytes
21,200,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,279,160 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,348,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,665,574 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
4,130,803 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,750,341 >>> mbox cmd response: failed
15,750,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,177 >>> mbox cmd response: failed
15,751,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,738 >>> mbox cmd response: failed
Initializing fuses
2,063,476 writing to cptra_bootfsm_go
8,244,248 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,180,608 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,424 UART:
192,782 UART: Running Caliptra ROM ...
193,974 UART:
194,130 UART: [state] CFI Enabled
260,436 UART: [state] LifecycleState = Unprovisioned
262,356 UART: [state] DebugLocked = No
263,742 UART: [state] WD Timer not started. Device not locked for debugging
266,866 UART: [kat] SHA2-256
445,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,570 UART: [kat] ++
458,120 UART: [kat] sha1
468,788 UART: [kat] SHA2-256
471,797 UART: [kat] SHA2-384
478,753 UART: [kat] SHA2-512-ACC
481,670 UART: [kat] ECC-384
2,945,239 UART: [kat] HMAC-384Kdf
2,968,216 UART: [kat] LMS
3,497,693 UART: [kat] --
3,502,712 UART: [cold-reset] ++
3,504,267 UART: [fht] FHT @ 0x50003400
3,515,299 UART: [idev] ++
3,515,866 UART: [idev] CDI.KEYID = 6
3,516,781 UART: [idev] SUBJECT.KEYID = 7
3,518,638 UART: [idev] UDS.KEYID = 0
3,521,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,440 UART: [idev] Erasing UDS.KEYID = 0
6,020,560 UART: [idev] Sha1 KeyId Algorithm
6,043,258 UART: [idev] --
6,046,876 UART: [ldev] ++
6,047,453 UART: [ldev] CDI.KEYID = 6
6,048,369 UART: [ldev] SUBJECT.KEYID = 5
6,049,587 UART: [ldev] AUTHORITY.KEYID = 7
6,050,818 UART: [ldev] FE.KEYID = 1
6,097,983 UART: [ldev] Erasing FE.KEYID = 1
8,613,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,196 UART: [ldev] --
10,399,445 UART: [fwproc] Wait for Commands...
10,401,041 UART: [fwproc] Recv command 0x46574c44
10,403,117 UART: [fwproc] Recv'd Img size: 114448 bytes
12,447,164 UART: ROM Fatal Error: 0x000B0010
12,450,289 >>> mbox cmd response: failed
12,450,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,050 >>> mbox cmd response: failed
12,451,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,727 >>> mbox cmd response: failed
Initializing fuses
2,053,666 writing to cptra_bootfsm_go
2,243,010 UART:
2,243,360 UART: Running Caliptra ROM ...
2,244,492 UART:
2,244,668 UART: [state] CFI Enabled
2,312,740 UART: [state] LifecycleState = Unprovisioned
2,314,636 UART: [state] DebugLocked = No
2,317,374 UART: [state] WD Timer not started. Device not locked for debugging
2,320,368 UART: [kat] SHA2-256
2,499,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,076 UART: [kat] ++
2,511,633 UART: [kat] sha1
2,523,012 UART: [kat] SHA2-256
2,526,036 UART: [kat] SHA2-384
2,533,326 UART: [kat] SHA2-512-ACC
2,536,270 UART: [kat] ECC-384
4,994,626 UART: [kat] HMAC-384Kdf
5,016,200 UART: [kat] LMS
5,545,670 UART: [kat] --
5,550,835 UART: [cold-reset] ++
5,552,076 UART: [fht] FHT @ 0x50003400
5,563,921 UART: [idev] ++
5,564,506 UART: [idev] CDI.KEYID = 6
5,565,420 UART: [idev] SUBJECT.KEYID = 7
5,566,581 UART: [idev] UDS.KEYID = 0
5,568,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,353 UART: [idev] Erasing UDS.KEYID = 0
8,070,091 UART: [idev] Sha1 KeyId Algorithm
8,092,461 UART: [idev] --
8,095,652 UART: [ldev] ++
8,096,225 UART: [ldev] CDI.KEYID = 6
8,097,138 UART: [ldev] SUBJECT.KEYID = 5
8,098,299 UART: [ldev] AUTHORITY.KEYID = 7
8,099,538 UART: [ldev] FE.KEYID = 1
8,144,930 UART: [ldev] Erasing FE.KEYID = 1
10,645,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,957 UART: [ldev] --
12,458,900 UART: [fwproc] Wait for Commands...
12,461,875 UART: [fwproc] Recv command 0x46574c44
12,463,971 UART: [fwproc] Recv'd Img size: 114448 bytes
15,863,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,322,258 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,372,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,233,868 >>> mbox cmd response: failed
12,234,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,234,840 >>> mbox cmd response: failed
12,235,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,235,406 >>> mbox cmd response: failed
Initializing fuses
2,054,798 writing to cptra_bootfsm_go
5,421,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,121,834 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,548 UART:
192,946 UART: Running Caliptra ROM ...
194,156 UART:
603,602 UART: [state] CFI Enabled
618,424 UART: [state] LifecycleState = Unprovisioned
620,310 UART: [state] DebugLocked = No
621,739 UART: [state] WD Timer not started. Device not locked for debugging
624,709 UART: [kat] SHA2-256
803,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,402 UART: [kat] ++
815,936 UART: [kat] sha1
826,442 UART: [kat] SHA2-256
829,439 UART: [kat] SHA2-384
835,919 UART: [kat] SHA2-512-ACC
838,917 UART: [kat] ECC-384
3,275,913 UART: [kat] HMAC-384Kdf
3,290,013 UART: [kat] LMS
3,819,469 UART: [kat] --
3,824,859 UART: [cold-reset] ++
3,826,575 UART: [fht] FHT @ 0x50003400
3,837,027 UART: [idev] ++
3,837,608 UART: [idev] CDI.KEYID = 6
3,838,534 UART: [idev] SUBJECT.KEYID = 7
3,839,697 UART: [idev] UDS.KEYID = 0
3,842,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,522 UART: [idev] Erasing UDS.KEYID = 0
6,310,981 UART: [idev] Sha1 KeyId Algorithm
6,332,699 UART: [idev] --
6,336,504 UART: [ldev] ++
6,337,100 UART: [ldev] CDI.KEYID = 6
6,338,029 UART: [ldev] SUBJECT.KEYID = 5
6,339,077 UART: [ldev] AUTHORITY.KEYID = 7
6,340,422 UART: [ldev] FE.KEYID = 1
6,351,282 UART: [ldev] Erasing FE.KEYID = 1
8,822,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,744 UART: [ldev] --
10,612,662 UART: [fwproc] Wait for Commands...
10,614,862 UART: [fwproc] Recv command 0x46574c44
10,616,906 UART: [fwproc] Recv'd Img size: 114448 bytes
12,658,960 UART: ROM Fatal Error: 0x000B0010
12,662,077 >>> mbox cmd response: failed
12,662,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,840 >>> mbox cmd response: failed
12,663,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,400 >>> mbox cmd response: failed
Initializing fuses
2,053,264 writing to cptra_bootfsm_go
2,242,560 UART:
2,242,911 UART: Running Caliptra ROM ...
2,244,048 UART:
7,786,660 UART: [state] CFI Enabled
7,800,727 UART: [state] LifecycleState = Unprovisioned
7,802,545 UART: [state] DebugLocked = No
7,805,338 UART: [state] WD Timer not started. Device not locked for debugging
7,808,813 UART: [kat] SHA2-256
7,987,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,999,527 UART: [kat] ++
8,000,075 UART: [kat] sha1
8,010,546 UART: [kat] SHA2-256
8,013,576 UART: [kat] SHA2-384
8,019,995 UART: [kat] SHA2-512-ACC
8,022,940 UART: [kat] ECC-384
10,464,243 UART: [kat] HMAC-384Kdf
10,477,124 UART: [kat] LMS
11,006,581 UART: [kat] --
11,011,675 UART: [cold-reset] ++
11,013,937 UART: [fht] FHT @ 0x50003400
11,025,294 UART: [idev] ++
11,025,897 UART: [idev] CDI.KEYID = 6
11,026,781 UART: [idev] SUBJECT.KEYID = 7
11,028,001 UART: [idev] UDS.KEYID = 0
11,030,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,174,021 UART: [idev] Erasing UDS.KEYID = 0
13,499,342 UART: [idev] Sha1 KeyId Algorithm
13,522,239 UART: [idev] --
13,525,347 UART: [ldev] ++
13,525,923 UART: [ldev] CDI.KEYID = 6
13,526,805 UART: [ldev] SUBJECT.KEYID = 5
13,527,963 UART: [ldev] AUTHORITY.KEYID = 7
13,529,247 UART: [ldev] FE.KEYID = 1
13,542,785 UART: [ldev] Erasing FE.KEYID = 1
16,014,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,735,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,751,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,766,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,782,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,802,435 UART: [ldev] --
17,806,211 UART: [fwproc] Wait for Commands...
17,808,041 UART: [fwproc] Recv command 0x46574c44
17,810,087 UART: [fwproc] Recv'd Img size: 114448 bytes
21,212,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,288,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,357,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,675,943 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,701,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,448,212 >>> mbox cmd response: failed
12,448,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,076 >>> mbox cmd response: failed
12,449,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,639 >>> mbox cmd response: failed
Initializing fuses
2,052,959 writing to cptra_bootfsm_go
11,109,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,683,228 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,212 UART:
192,579 UART: Running Caliptra ROM ...
193,776 UART:
193,930 UART: [state] CFI Enabled
264,018 UART: [state] LifecycleState = Unprovisioned
266,397 UART: [state] DebugLocked = No
268,836 UART: [state] WD Timer not started. Device not locked for debugging
272,867 UART: [kat] SHA2-256
462,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,516 UART: [kat] ++
473,994 UART: [kat] sha1
485,094 UART: [kat] SHA2-256
488,106 UART: [kat] SHA2-384
494,353 UART: [kat] SHA2-512-ACC
496,971 UART: [kat] ECC-384
2,948,218 UART: [kat] HMAC-384Kdf
2,971,431 UART: [kat] LMS
3,503,177 UART: [kat] --
3,506,483 UART: [cold-reset] ++
3,507,719 UART: [fht] FHT @ 0x50003400
3,519,540 UART: [idev] ++
3,520,225 UART: [idev] CDI.KEYID = 6
3,521,167 UART: [idev] SUBJECT.KEYID = 7
3,522,381 UART: [idev] UDS.KEYID = 0
3,525,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,193 UART: [idev] Erasing UDS.KEYID = 0
6,026,485 UART: [idev] Sha1 KeyId Algorithm
6,049,556 UART: [idev] --
6,054,821 UART: [ldev] ++
6,055,517 UART: [ldev] CDI.KEYID = 6
6,056,429 UART: [ldev] SUBJECT.KEYID = 5
6,057,595 UART: [ldev] AUTHORITY.KEYID = 7
6,058,827 UART: [ldev] FE.KEYID = 1
6,098,645 UART: [ldev] Erasing FE.KEYID = 1
8,604,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,882 UART: [ldev] --
10,411,930 UART: [fwproc] Wait for Commands...
10,414,791 UART: [fwproc] Recv command 0x46574c44
10,417,107 UART: [fwproc] Recv'd Img size: 114448 bytes
12,494,085 UART: ROM Fatal Error: 0x000B0010
12,497,752 >>> mbox cmd response: failed
12,498,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,433 >>> mbox cmd response: failed
12,498,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,998 >>> mbox cmd response: failed
Initializing fuses
2,061,407 writing to cptra_bootfsm_go
2,250,708 UART:
2,251,050 UART: Running Caliptra ROM ...
2,252,140 UART:
2,252,294 UART: [state] CFI Enabled
2,309,807 UART: [state] LifecycleState = Unprovisioned
2,312,141 UART: [state] DebugLocked = No
2,313,587 UART: [state] WD Timer not started. Device not locked for debugging
2,318,700 UART: [kat] SHA2-256
2,508,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,353 UART: [kat] ++
2,519,842 UART: [kat] sha1
2,531,701 UART: [kat] SHA2-256
2,534,729 UART: [kat] SHA2-384
2,540,726 UART: [kat] SHA2-512-ACC
2,543,298 UART: [kat] ECC-384
4,995,922 UART: [kat] HMAC-384Kdf
5,017,181 UART: [kat] LMS
5,548,929 UART: [kat] --
5,553,898 UART: [cold-reset] ++
5,555,454 UART: [fht] FHT @ 0x50003400
5,566,596 UART: [idev] ++
5,567,278 UART: [idev] CDI.KEYID = 6
5,568,241 UART: [idev] SUBJECT.KEYID = 7
5,569,454 UART: [idev] UDS.KEYID = 0
5,571,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,688 UART: [idev] Erasing UDS.KEYID = 0
8,073,343 UART: [idev] Sha1 KeyId Algorithm
8,094,965 UART: [idev] --
8,099,162 UART: [ldev] ++
8,099,858 UART: [ldev] CDI.KEYID = 6
8,100,748 UART: [ldev] SUBJECT.KEYID = 5
8,101,928 UART: [ldev] AUTHORITY.KEYID = 7
8,103,165 UART: [ldev] FE.KEYID = 1
8,145,215 UART: [ldev] Erasing FE.KEYID = 1
10,652,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,647 UART: [ldev] --
12,458,698 UART: [fwproc] Wait for Commands...
12,460,582 UART: [fwproc] Recv command 0x46574c44
12,462,895 UART: [fwproc] Recv'd Img size: 114448 bytes
15,911,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,650,721 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,439,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,293,023 >>> mbox cmd response: failed
12,293,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,294,095 >>> mbox cmd response: failed
12,294,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,294,653 >>> mbox cmd response: failed
Initializing fuses
2,055,736 writing to cptra_bootfsm_go
5,493,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,797,859 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,671 UART:
193,025 UART: Running Caliptra ROM ...
194,239 UART:
603,672 UART: [state] CFI Enabled
618,186 UART: [state] LifecycleState = Unprovisioned
620,556 UART: [state] DebugLocked = No
622,537 UART: [state] WD Timer not started. Device not locked for debugging
627,999 UART: [kat] SHA2-256
817,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,655 UART: [kat] ++
829,180 UART: [kat] sha1
840,333 UART: [kat] SHA2-256
843,348 UART: [kat] SHA2-384
849,654 UART: [kat] SHA2-512-ACC
852,264 UART: [kat] ECC-384
3,296,987 UART: [kat] HMAC-384Kdf
3,308,475 UART: [kat] LMS
3,840,287 UART: [kat] --
3,846,134 UART: [cold-reset] ++
3,847,206 UART: [fht] FHT @ 0x50003400
3,859,077 UART: [idev] ++
3,859,810 UART: [idev] CDI.KEYID = 6
3,860,690 UART: [idev] SUBJECT.KEYID = 7
3,861,956 UART: [idev] UDS.KEYID = 0
3,864,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,488 UART: [idev] Erasing UDS.KEYID = 0
6,336,992 UART: [idev] Sha1 KeyId Algorithm
6,360,072 UART: [idev] --
6,364,603 UART: [ldev] ++
6,365,287 UART: [ldev] CDI.KEYID = 6
6,366,164 UART: [ldev] SUBJECT.KEYID = 5
6,367,374 UART: [ldev] AUTHORITY.KEYID = 7
6,368,550 UART: [ldev] FE.KEYID = 1
6,379,012 UART: [ldev] Erasing FE.KEYID = 1
8,858,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,923 UART: [ldev] --
10,648,078 UART: [fwproc] Wait for Commands...
10,649,589 UART: [fwproc] Recv command 0x46574c44
10,651,490 UART: [fwproc] Recv'd Img size: 114448 bytes
12,722,974 UART: ROM Fatal Error: 0x000B0010
12,726,631 >>> mbox cmd response: failed
12,726,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,224 >>> mbox cmd response: failed
12,727,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,823 >>> mbox cmd response: failed
Initializing fuses
2,055,519 writing to cptra_bootfsm_go
2,244,845 UART:
2,245,187 UART: Running Caliptra ROM ...
2,246,330 UART:
7,723,937 UART: [state] CFI Enabled
7,734,694 UART: [state] LifecycleState = Unprovisioned
7,737,097 UART: [state] DebugLocked = No
7,739,627 UART: [state] WD Timer not started. Device not locked for debugging
7,744,184 UART: [kat] SHA2-256
7,934,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,944,868 UART: [kat] ++
7,945,467 UART: [kat] sha1
7,957,879 UART: [kat] SHA2-256
7,960,889 UART: [kat] SHA2-384
7,967,255 UART: [kat] SHA2-512-ACC
7,969,833 UART: [kat] ECC-384
10,413,284 UART: [kat] HMAC-384Kdf
10,427,296 UART: [kat] LMS
10,959,154 UART: [kat] --
10,963,111 UART: [cold-reset] ++
10,964,837 UART: [fht] FHT @ 0x50003400
10,976,312 UART: [idev] ++
10,977,002 UART: [idev] CDI.KEYID = 6
10,977,915 UART: [idev] SUBJECT.KEYID = 7
10,979,128 UART: [idev] UDS.KEYID = 0
10,981,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,125,220 UART: [idev] Erasing UDS.KEYID = 0
13,456,976 UART: [idev] Sha1 KeyId Algorithm
13,478,746 UART: [idev] --
13,483,106 UART: [ldev] ++
13,483,800 UART: [ldev] CDI.KEYID = 6
13,484,872 UART: [ldev] SUBJECT.KEYID = 5
13,485,978 UART: [ldev] AUTHORITY.KEYID = 7
13,487,153 UART: [ldev] FE.KEYID = 1
13,500,342 UART: [ldev] Erasing FE.KEYID = 1
15,978,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,688 UART: [ldev] --
17,768,874 UART: [fwproc] Wait for Commands...
17,770,485 UART: [fwproc] Recv command 0x46574c44
17,772,740 UART: [fwproc] Recv'd Img size: 114448 bytes
21,217,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,298,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,414,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,957,486 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,766,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,720 >>> mbox cmd response: failed
12,514,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,603 >>> mbox cmd response: failed
12,514,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,168 >>> mbox cmd response: failed
Initializing fuses
2,054,122 writing to cptra_bootfsm_go
11,101,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,294,931 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,925 UART: [cold-reset] ++
1,476,411 UART: [fht] Storing FHT @ 0x50003400
1,479,094 UART: [idev] ++
1,479,262 UART: [idev] CDI.KEYID = 6
1,479,622 UART: [idev] SUBJECT.KEYID = 7
1,480,046 UART: [idev] UDS.KEYID = 0
1,480,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,354 UART: [idev] --
1,514,381 UART: [ldev] ++
1,514,549 UART: [ldev] CDI.KEYID = 6
1,514,912 UART: [ldev] SUBJECT.KEYID = 5
1,515,338 UART: [ldev] AUTHORITY.KEYID = 7
1,515,801 UART: [ldev] FE.KEYID = 1
1,520,801 UART: [ldev] Erasing FE.KEYID = 1
1,546,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,178 UART: [ldev] --
1,585,511 UART: [fwproc] Waiting for Commands...
1,586,188 UART: [fwproc] Received command 0x46574c44
1,586,979 UART: [fwproc] Received Image of size 114448 bytes
1,629,902 UART: ROM Fatal Error: 0x000B0010
1,631,059 >>> mbox cmd response: failed
1,631,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,065 >>> mbox cmd response: failed
1,631,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
85,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,525 UART: [kat] SHA2-256
881,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,571 UART: [kat] ++
885,723 UART: [kat] sha1
889,991 UART: [kat] SHA2-256
891,929 UART: [kat] SHA2-384
894,592 UART: [kat] SHA2-512-ACC
896,493 UART: [kat] ECC-384
902,278 UART: [kat] HMAC-384Kdf
906,968 UART: [kat] LMS
1,475,164 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,817 UART: [fht] Storing FHT @ 0x50003400
1,479,620 UART: [idev] ++
1,479,788 UART: [idev] CDI.KEYID = 6
1,480,148 UART: [idev] SUBJECT.KEYID = 7
1,480,572 UART: [idev] UDS.KEYID = 0
1,480,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,505,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,744 UART: [idev] --
1,514,739 UART: [ldev] ++
1,514,907 UART: [ldev] CDI.KEYID = 6
1,515,270 UART: [ldev] SUBJECT.KEYID = 5
1,515,696 UART: [ldev] AUTHORITY.KEYID = 7
1,516,159 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,688 UART: [ldev] --
1,586,167 UART: [fwproc] Waiting for Commands...
1,586,940 UART: [fwproc] Received command 0x46574c44
1,587,731 UART: [fwproc] Received Image of size 114448 bytes
2,887,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,050 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,483,896 >>> mbox cmd response: failed
1,483,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,902 >>> mbox cmd response: failed
1,483,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,504 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,952 UART: [kat] SHA2-256
881,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,998 UART: [kat] ++
886,150 UART: [kat] sha1
890,462 UART: [kat] SHA2-256
892,400 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,339 UART: [kat] HMAC-384Kdf
907,109 UART: [kat] LMS
1,475,305 UART: [kat] --
1,475,906 UART: [cold-reset] ++
1,476,486 UART: [fht] Storing FHT @ 0x50003400
1,479,343 UART: [idev] ++
1,479,511 UART: [idev] CDI.KEYID = 6
1,479,871 UART: [idev] SUBJECT.KEYID = 7
1,480,295 UART: [idev] UDS.KEYID = 0
1,480,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,373 UART: [idev] Erasing UDS.KEYID = 0
1,505,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,456 UART: [ldev] Erasing FE.KEYID = 1
1,547,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,561 UART: [ldev] --
1,585,946 UART: [fwproc] Waiting for Commands...
1,586,797 UART: [fwproc] Received command 0x46574c44
1,587,588 UART: [fwproc] Received Image of size 114448 bytes
1,631,379 UART: ROM Fatal Error: 0x000B0010
1,632,536 >>> mbox cmd response: failed
1,632,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,542 >>> mbox cmd response: failed
1,632,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,874 UART: [kat] SHA2-256
892,812 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
902,923 UART: [kat] HMAC-384Kdf
907,505 UART: [kat] LMS
1,475,701 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,687 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,714 UART: [ldev] ++
1,514,882 UART: [ldev] CDI.KEYID = 6
1,515,245 UART: [ldev] SUBJECT.KEYID = 5
1,515,671 UART: [ldev] AUTHORITY.KEYID = 7
1,516,134 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,029 UART: [ldev] --
1,586,426 UART: [fwproc] Waiting for Commands...
1,587,131 UART: [fwproc] Received command 0x46574c44
1,587,922 UART: [fwproc] Received Image of size 114448 bytes
2,886,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,385 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,484,823 >>> mbox cmd response: failed
1,484,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,829 >>> mbox cmd response: failed
1,484,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,890 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
893,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,627 UART: [kat] ++
897,779 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,998 UART: [kat] SHA2-512-ACC
908,899 UART: [kat] ECC-384
919,014 UART: [kat] HMAC-384Kdf
923,574 UART: [kat] LMS
1,171,902 UART: [kat] --
1,172,795 UART: [cold-reset] ++
1,173,283 UART: [fht] FHT @ 0x50003400
1,176,064 UART: [idev] ++
1,176,232 UART: [idev] CDI.KEYID = 6
1,176,592 UART: [idev] SUBJECT.KEYID = 7
1,177,016 UART: [idev] UDS.KEYID = 0
1,177,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,208 UART: [idev] Erasing UDS.KEYID = 0
1,202,211 UART: [idev] Sha1 KeyId Algorithm
1,210,669 UART: [idev] --
1,211,773 UART: [ldev] ++
1,211,941 UART: [ldev] CDI.KEYID = 6
1,212,304 UART: [ldev] SUBJECT.KEYID = 5
1,212,730 UART: [ldev] AUTHORITY.KEYID = 7
1,213,193 UART: [ldev] FE.KEYID = 1
1,218,451 UART: [ldev] Erasing FE.KEYID = 1
1,245,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,771 UART: [ldev] --
1,284,118 UART: [fwproc] Wait for Commands...
1,284,906 UART: [fwproc] Recv command 0x46574c44
1,285,634 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,175 UART: ROM Fatal Error: 0x000B0010
1,329,332 >>> mbox cmd response: failed
1,329,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,338 >>> mbox cmd response: failed
1,329,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,726 UART: [kat] LMS
1,171,054 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,517 UART: [idev] Sha1 KeyId Algorithm
1,209,073 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,610 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,150 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,899 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,945 >>> mbox cmd response: failed
1,181,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,951 >>> mbox cmd response: failed
1,181,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,286 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
893,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,220 UART: [kat] ++
897,372 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,303 UART: [kat] SHA2-512-ACC
908,204 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,171,744 UART: [cold-reset] ++
1,172,296 UART: [fht] FHT @ 0x50003400
1,174,755 UART: [idev] ++
1,174,923 UART: [idev] CDI.KEYID = 6
1,175,283 UART: [idev] SUBJECT.KEYID = 7
1,175,707 UART: [idev] UDS.KEYID = 0
1,176,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,735 UART: [idev] Erasing UDS.KEYID = 0
1,201,318 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,686 UART: [ldev] ++
1,210,854 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,643 UART: [ldev] AUTHORITY.KEYID = 7
1,212,106 UART: [ldev] FE.KEYID = 1
1,217,210 UART: [ldev] Erasing FE.KEYID = 1
1,243,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,142 UART: [ldev] --
1,283,637 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,050 UART: ROM Fatal Error: 0x000B0010
1,329,207 >>> mbox cmd response: failed
1,329,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,213 >>> mbox cmd response: failed
1,329,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,188 UART: [state] WD Timer not started. Device not locked for debugging
87,371 UART: [kat] SHA2-256
893,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,146 UART: [kat] ++
897,298 UART: [kat] sha1
901,572 UART: [kat] SHA2-256
903,512 UART: [kat] SHA2-384
906,187 UART: [kat] SHA2-512-ACC
908,088 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,519 UART: [kat] LMS
1,170,847 UART: [kat] --
1,171,558 UART: [cold-reset] ++
1,171,974 UART: [fht] FHT @ 0x50003400
1,174,609 UART: [idev] ++
1,174,777 UART: [idev] CDI.KEYID = 6
1,175,137 UART: [idev] SUBJECT.KEYID = 7
1,175,561 UART: [idev] UDS.KEYID = 0
1,175,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,001 UART: [idev] Erasing UDS.KEYID = 0
1,200,660 UART: [idev] Sha1 KeyId Algorithm
1,209,078 UART: [idev] --
1,209,922 UART: [ldev] ++
1,210,090 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,879 UART: [ldev] AUTHORITY.KEYID = 7
1,211,342 UART: [ldev] FE.KEYID = 1
1,216,840 UART: [ldev] Erasing FE.KEYID = 1
1,244,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,824 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,015 UART: [fwproc] Recv command 0x46574c44
1,284,743 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,758 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,894 >>> mbox cmd response: failed
1,183,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,900 >>> mbox cmd response: failed
1,183,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,525 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,358 UART: [kat] HMAC-384Kdf
919,992 UART: [kat] LMS
1,168,304 UART: [kat] --
1,168,963 UART: [cold-reset] ++
1,169,501 UART: [fht] FHT @ 0x50003400
1,172,103 UART: [idev] ++
1,172,271 UART: [idev] CDI.KEYID = 6
1,172,632 UART: [idev] SUBJECT.KEYID = 7
1,173,057 UART: [idev] UDS.KEYID = 0
1,173,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,771 UART: [idev] Erasing UDS.KEYID = 0
1,197,931 UART: [idev] Sha1 KeyId Algorithm
1,206,787 UART: [idev] --
1,207,810 UART: [ldev] ++
1,207,978 UART: [ldev] CDI.KEYID = 6
1,208,342 UART: [ldev] SUBJECT.KEYID = 5
1,208,769 UART: [ldev] AUTHORITY.KEYID = 7
1,209,232 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,580 UART: [ldev] --
1,279,858 UART: [fwproc] Wait for Commands...
1,280,459 UART: [fwproc] Recv command 0x46574c44
1,281,192 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,127 UART: ROM Fatal Error: 0x000B0010
1,325,284 >>> mbox cmd response: failed
1,325,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,290 >>> mbox cmd response: failed
1,325,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,199,057 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,485 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,135 >>> mbox cmd response: failed
1,178,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,141 >>> mbox cmd response: failed
1,178,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,805 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,174,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,330 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,183 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,490 UART: ROM Fatal Error: 0x000B0010
1,326,647 >>> mbox cmd response: failed
1,326,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,653 >>> mbox cmd response: failed
1,326,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,185 UART: [kat] SHA2-512-ACC
906,086 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,332 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,304 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,177,166 >>> mbox cmd response: failed
1,177,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,172 >>> mbox cmd response: failed
1,177,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,624 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,458 UART:
192,819 UART: Running Caliptra ROM ...
194,017 UART:
194,175 UART: [state] CFI Enabled
261,673 UART: [state] LifecycleState = Unprovisioned
263,649 UART: [state] DebugLocked = No
266,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,672 UART: [kat] SHA2-256
440,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,897 UART: [kat] ++
451,376 UART: [kat] sha1
462,498 UART: [kat] SHA2-256
465,222 UART: [kat] SHA2-384
471,798 UART: [kat] SHA2-512-ACC
474,144 UART: [kat] ECC-384
2,764,683 UART: [kat] HMAC-384Kdf
2,797,121 UART: [kat] LMS
3,987,442 UART: [kat] --
3,990,797 UART: [cold-reset] ++
3,991,664 UART: [fht] Storing FHT @ 0x50003400
4,004,232 UART: [idev] ++
4,004,809 UART: [idev] CDI.KEYID = 6
4,005,791 UART: [idev] SUBJECT.KEYID = 7
4,007,013 UART: [idev] UDS.KEYID = 0
4,009,685 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,537 UART: [idev] Erasing UDS.KEYID = 0
7,342,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,635 UART: [idev] --
7,368,008 UART: [ldev] ++
7,368,594 UART: [ldev] CDI.KEYID = 6
7,369,568 UART: [ldev] SUBJECT.KEYID = 5
7,370,729 UART: [ldev] AUTHORITY.KEYID = 7
7,372,021 UART: [ldev] FE.KEYID = 1
7,406,710 UART: [ldev] Erasing FE.KEYID = 1
10,743,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,297 UART: [ldev] --
13,123,616 UART: [fwproc] Waiting for Commands...
13,126,656 UART: [fwproc] Received command 0x46574c44
13,128,847 UART: [fwproc] Received Image of size 114124 bytes
15,841,305 UART: ROM Fatal Error: 0x000B0040
15,844,820 >>> mbox cmd response: failed
15,845,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,566 >>> mbox cmd response: failed
15,845,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,127 >>> mbox cmd response: failed
Initializing fuses
2,058,020 writing to cptra_bootfsm_go
2,247,304 UART:
2,247,654 UART: Running Caliptra ROM ...
2,248,695 UART:
2,248,851 UART: [state] CFI Enabled
2,322,619 UART: [state] LifecycleState = Unprovisioned
2,324,610 UART: [state] DebugLocked = No
2,326,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,462 UART: [kat] SHA2-256
2,501,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,681 UART: [kat] ++
2,512,141 UART: [kat] sha1
2,522,649 UART: [kat] SHA2-256
2,525,346 UART: [kat] SHA2-384
2,530,585 UART: [kat] SHA2-512-ACC
2,532,944 UART: [kat] ECC-384
4,823,368 UART: [kat] HMAC-384Kdf
4,854,718 UART: [kat] LMS
6,045,019 UART: [kat] --
6,049,738 UART: [cold-reset] ++
6,051,486 UART: [fht] Storing FHT @ 0x50003400
6,063,869 UART: [idev] ++
6,064,496 UART: [idev] CDI.KEYID = 6
6,065,413 UART: [idev] SUBJECT.KEYID = 7
6,066,632 UART: [idev] UDS.KEYID = 0
6,068,974 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,212,585 UART: [idev] Erasing UDS.KEYID = 0
9,401,841 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,596 UART: [idev] --
9,427,623 UART: [ldev] ++
9,428,206 UART: [ldev] CDI.KEYID = 6
9,429,175 UART: [ldev] SUBJECT.KEYID = 5
9,430,454 UART: [ldev] AUTHORITY.KEYID = 7
9,431,641 UART: [ldev] FE.KEYID = 1
9,476,592 UART: [ldev] Erasing FE.KEYID = 1
12,809,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,954 UART: [ldev] --
15,170,566 UART: [fwproc] Waiting for Commands...
15,173,468 UART: [fwproc] Received command 0x46574c44
15,175,673 UART: [fwproc] Received Image of size 114124 bytes
19,224,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,300,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,369,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,685,989 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,800,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,544,918 >>> mbox cmd response: failed
15,545,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,545,880 >>> mbox cmd response: failed
15,546,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,546,442 >>> mbox cmd response: failed
Initializing fuses
2,064,288 writing to cptra_bootfsm_go
5,849,828 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,941,348 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,506 UART:
192,861 UART: Running Caliptra ROM ...
194,047 UART:
603,562 UART: [state] CFI Enabled
614,515 UART: [state] LifecycleState = Unprovisioned
616,419 UART: [state] DebugLocked = No
618,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,879 UART: [kat] SHA2-256
793,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,165 UART: [kat] ++
804,640 UART: [kat] sha1
814,925 UART: [kat] SHA2-256
817,630 UART: [kat] SHA2-384
823,448 UART: [kat] SHA2-512-ACC
825,837 UART: [kat] ECC-384
3,108,793 UART: [kat] HMAC-384Kdf
3,120,373 UART: [kat] LMS
4,310,513 UART: [kat] --
4,315,289 UART: [cold-reset] ++
4,317,396 UART: [fht] Storing FHT @ 0x50003400
4,329,533 UART: [idev] ++
4,330,153 UART: [idev] CDI.KEYID = 6
4,331,043 UART: [idev] SUBJECT.KEYID = 7
4,332,314 UART: [idev] UDS.KEYID = 0
4,335,127 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,660 UART: [idev] Erasing UDS.KEYID = 0
7,618,967 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,572 UART: [idev] --
7,644,697 UART: [ldev] ++
7,645,269 UART: [ldev] CDI.KEYID = 6
7,646,209 UART: [ldev] SUBJECT.KEYID = 5
7,647,421 UART: [ldev] AUTHORITY.KEYID = 7
7,648,708 UART: [ldev] FE.KEYID = 1
7,659,449 UART: [ldev] Erasing FE.KEYID = 1
10,945,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,582 UART: [ldev] --
13,306,041 UART: [fwproc] Waiting for Commands...
13,308,307 UART: [fwproc] Received command 0x46574c44
13,310,494 UART: [fwproc] Received Image of size 114124 bytes
16,020,107 UART: ROM Fatal Error: 0x000B0040
16,023,584 >>> mbox cmd response: failed
16,024,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,343 >>> mbox cmd response: failed
16,024,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,909 >>> mbox cmd response: failed
Initializing fuses
2,063,840 writing to cptra_bootfsm_go
2,253,166 UART:
2,253,510 UART: Running Caliptra ROM ...
2,254,567 UART:
4,433,175 UART: [state] CFI Enabled
4,448,856 UART: [state] LifecycleState = Unprovisioned
4,450,774 UART: [state] DebugLocked = No
4,452,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,457,980 UART: [kat] SHA2-256
4,627,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,638,308 UART: [kat] ++
4,638,774 UART: [kat] sha1
4,649,393 UART: [kat] SHA2-256
4,652,095 UART: [kat] SHA2-384
4,658,573 UART: [kat] SHA2-512-ACC
4,660,924 UART: [kat] ECC-384
6,946,229 UART: [kat] HMAC-384Kdf
6,957,919 UART: [kat] LMS
8,148,007 UART: [kat] --
8,151,740 UART: [cold-reset] ++
8,153,518 UART: [fht] Storing FHT @ 0x50003400
8,163,922 UART: [idev] ++
8,164,488 UART: [idev] CDI.KEYID = 6
8,165,504 UART: [idev] SUBJECT.KEYID = 7
8,166,679 UART: [idev] UDS.KEYID = 0
8,168,978 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,312,411 UART: [idev] Erasing UDS.KEYID = 0
11,450,781 UART: [idev] Using Sha1 for KeyId Algorithm
11,471,932 UART: [idev] --
11,476,113 UART: [ldev] ++
11,476,682 UART: [ldev] CDI.KEYID = 6
11,477,625 UART: [ldev] SUBJECT.KEYID = 5
11,478,872 UART: [ldev] AUTHORITY.KEYID = 7
11,480,110 UART: [ldev] FE.KEYID = 1
11,491,921 UART: [ldev] Erasing FE.KEYID = 1
14,777,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,073,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,088,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,102,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,117,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,137,528 UART: [ldev] --
17,141,660 UART: [fwproc] Waiting for Commands...
17,144,352 UART: [fwproc] Received command 0x46574c44
17,146,796 UART: [fwproc] Received Image of size 114124 bytes
21,197,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,268,663 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,337,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,654,215 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,125,308 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,769,425 >>> mbox cmd response: failed
15,770,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,363 >>> mbox cmd response: failed
15,770,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,935 >>> mbox cmd response: failed
Initializing fuses
2,060,098 writing to cptra_bootfsm_go
8,220,642 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,163,187 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,121 UART:
192,500 UART: Running Caliptra ROM ...
193,651 UART:
193,798 UART: [state] CFI Enabled
259,972 UART: [state] LifecycleState = Unprovisioned
261,796 UART: [state] DebugLocked = No
263,498 UART: [state] WD Timer not started. Device not locked for debugging
268,083 UART: [kat] SHA2-256
447,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,792 UART: [kat] ++
459,239 UART: [kat] sha1
471,567 UART: [kat] SHA2-256
474,634 UART: [kat] SHA2-384
482,068 UART: [kat] SHA2-512-ACC
485,061 UART: [kat] ECC-384
2,945,474 UART: [kat] HMAC-384Kdf
2,970,351 UART: [kat] LMS
3,499,805 UART: [kat] --
3,501,767 UART: [cold-reset] ++
3,503,216 UART: [fht] FHT @ 0x50003400
3,513,942 UART: [idev] ++
3,514,506 UART: [idev] CDI.KEYID = 6
3,515,441 UART: [idev] SUBJECT.KEYID = 7
3,516,653 UART: [idev] UDS.KEYID = 0
3,519,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,446 UART: [idev] Erasing UDS.KEYID = 0
6,024,227 UART: [idev] Sha1 KeyId Algorithm
6,047,081 UART: [idev] --
6,051,921 UART: [ldev] ++
6,052,506 UART: [ldev] CDI.KEYID = 6
6,053,426 UART: [ldev] SUBJECT.KEYID = 5
6,054,533 UART: [ldev] AUTHORITY.KEYID = 7
6,055,882 UART: [ldev] FE.KEYID = 1
6,100,050 UART: [ldev] Erasing FE.KEYID = 1
8,605,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,846 UART: [ldev] --
10,414,631 UART: [fwproc] Wait for Commands...
10,416,348 UART: [fwproc] Recv command 0x46574c44
10,418,446 UART: [fwproc] Recv'd Img size: 114448 bytes
12,468,752 UART: ROM Fatal Error: 0x000B0040
12,471,876 >>> mbox cmd response: failed
12,472,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,648 >>> mbox cmd response: failed
12,472,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,473,250 >>> mbox cmd response: failed
Initializing fuses
2,065,219 writing to cptra_bootfsm_go
2,254,544 UART:
2,254,882 UART: Running Caliptra ROM ...
2,256,021 UART:
2,256,191 UART: [state] CFI Enabled
2,315,900 UART: [state] LifecycleState = Unprovisioned
2,317,728 UART: [state] DebugLocked = No
2,320,639 UART: [state] WD Timer not started. Device not locked for debugging
2,324,608 UART: [kat] SHA2-256
2,503,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,294 UART: [kat] ++
2,515,833 UART: [kat] sha1
2,527,481 UART: [kat] SHA2-256
2,530,544 UART: [kat] SHA2-384
2,537,565 UART: [kat] SHA2-512-ACC
2,540,511 UART: [kat] ECC-384
5,000,900 UART: [kat] HMAC-384Kdf
5,024,111 UART: [kat] LMS
5,553,575 UART: [kat] --
5,557,726 UART: [cold-reset] ++
5,560,275 UART: [fht] FHT @ 0x50003400
5,570,452 UART: [idev] ++
5,571,029 UART: [idev] CDI.KEYID = 6
5,571,947 UART: [idev] SUBJECT.KEYID = 7
5,573,165 UART: [idev] UDS.KEYID = 0
5,575,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,362 UART: [idev] Erasing UDS.KEYID = 0
8,080,455 UART: [idev] Sha1 KeyId Algorithm
8,104,014 UART: [idev] --
8,107,747 UART: [ldev] ++
8,108,323 UART: [ldev] CDI.KEYID = 6
8,109,233 UART: [ldev] SUBJECT.KEYID = 5
8,110,414 UART: [ldev] AUTHORITY.KEYID = 7
8,111,650 UART: [ldev] FE.KEYID = 1
8,152,601 UART: [ldev] Erasing FE.KEYID = 1
10,656,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,870 UART: [ldev] --
12,466,851 UART: [fwproc] Wait for Commands...
12,468,841 UART: [fwproc] Recv command 0x46574c44
12,470,941 UART: [fwproc] Recv'd Img size: 114448 bytes
15,877,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,951,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,020,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,339,103 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,363,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,235,459 >>> mbox cmd response: failed
12,236,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,236,364 >>> mbox cmd response: failed
12,236,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,236,927 >>> mbox cmd response: failed
Initializing fuses
2,060,398 writing to cptra_bootfsm_go
5,420,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,088,652 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,678 UART:
193,028 UART: Running Caliptra ROM ...
194,242 UART:
603,813 UART: [state] CFI Enabled
617,602 UART: [state] LifecycleState = Unprovisioned
619,442 UART: [state] DebugLocked = No
620,658 UART: [state] WD Timer not started. Device not locked for debugging
624,318 UART: [kat] SHA2-256
803,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,979 UART: [kat] ++
815,510 UART: [kat] sha1
826,826 UART: [kat] SHA2-256
829,889 UART: [kat] SHA2-384
835,807 UART: [kat] SHA2-512-ACC
838,747 UART: [kat] ECC-384
3,281,738 UART: [kat] HMAC-384Kdf
3,293,225 UART: [kat] LMS
3,822,699 UART: [kat] --
3,826,649 UART: [cold-reset] ++
3,829,011 UART: [fht] FHT @ 0x50003400
3,840,104 UART: [idev] ++
3,840,669 UART: [idev] CDI.KEYID = 6
3,841,581 UART: [idev] SUBJECT.KEYID = 7
3,842,798 UART: [idev] UDS.KEYID = 0
3,845,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,465 UART: [idev] Erasing UDS.KEYID = 0
6,318,089 UART: [idev] Sha1 KeyId Algorithm
6,341,157 UART: [idev] --
6,344,451 UART: [ldev] ++
6,345,020 UART: [ldev] CDI.KEYID = 6
6,345,927 UART: [ldev] SUBJECT.KEYID = 5
6,347,080 UART: [ldev] AUTHORITY.KEYID = 7
6,348,370 UART: [ldev] FE.KEYID = 1
6,360,024 UART: [ldev] Erasing FE.KEYID = 1
8,835,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,866 UART: [ldev] --
10,628,297 UART: [fwproc] Wait for Commands...
10,630,466 UART: [fwproc] Recv command 0x46574c44
10,632,514 UART: [fwproc] Recv'd Img size: 114448 bytes
12,685,323 UART: ROM Fatal Error: 0x000B0040
12,688,395 >>> mbox cmd response: failed
12,688,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,147 >>> mbox cmd response: failed
12,689,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,745 >>> mbox cmd response: failed
Initializing fuses
2,053,267 writing to cptra_bootfsm_go
2,242,601 UART:
2,242,964 UART: Running Caliptra ROM ...
2,244,060 UART:
7,760,526 UART: [state] CFI Enabled
7,774,989 UART: [state] LifecycleState = Unprovisioned
7,776,856 UART: [state] DebugLocked = No
7,778,377 UART: [state] WD Timer not started. Device not locked for debugging
7,781,853 UART: [kat] SHA2-256
7,960,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,972,577 UART: [kat] ++
7,973,038 UART: [kat] sha1
7,984,737 UART: [kat] SHA2-256
7,987,759 UART: [kat] SHA2-384
7,993,351 UART: [kat] SHA2-512-ACC
7,996,313 UART: [kat] ECC-384
10,438,948 UART: [kat] HMAC-384Kdf
10,451,129 UART: [kat] LMS
10,980,632 UART: [kat] --
10,987,671 UART: [cold-reset] ++
10,989,065 UART: [fht] FHT @ 0x50003400
11,000,118 UART: [idev] ++
11,000,698 UART: [idev] CDI.KEYID = 6
11,001,609 UART: [idev] SUBJECT.KEYID = 7
11,002,772 UART: [idev] UDS.KEYID = 0
11,005,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,148,832 UART: [idev] Erasing UDS.KEYID = 0
13,472,764 UART: [idev] Sha1 KeyId Algorithm
13,495,939 UART: [idev] --
13,498,256 UART: [ldev] ++
13,498,823 UART: [ldev] CDI.KEYID = 6
13,499,731 UART: [ldev] SUBJECT.KEYID = 5
13,500,947 UART: [ldev] AUTHORITY.KEYID = 7
13,502,177 UART: [ldev] FE.KEYID = 1
13,514,717 UART: [ldev] Erasing FE.KEYID = 1
15,990,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,709,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,725,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,741,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,757,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,777,054 UART: [ldev] --
17,781,942 UART: [fwproc] Wait for Commands...
17,783,498 UART: [fwproc] Recv command 0x46574c44
17,785,540 UART: [fwproc] Recv'd Img size: 114448 bytes
21,193,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,266,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,335,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,653,373 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,694,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,114 >>> mbox cmd response: failed
12,454,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,986 >>> mbox cmd response: failed
12,455,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,556 >>> mbox cmd response: failed
Initializing fuses
2,054,006 writing to cptra_bootfsm_go
11,108,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,681,504 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,373 UART:
192,745 UART: Running Caliptra ROM ...
193,938 UART:
194,109 UART: [state] CFI Enabled
263,916 UART: [state] LifecycleState = Unprovisioned
266,284 UART: [state] DebugLocked = No
267,929 UART: [state] WD Timer not started. Device not locked for debugging
271,665 UART: [kat] SHA2-256
461,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,110 UART: [kat] ++
472,700 UART: [kat] sha1
483,098 UART: [kat] SHA2-256
486,113 UART: [kat] SHA2-384
491,823 UART: [kat] SHA2-512-ACC
494,442 UART: [kat] ECC-384
2,947,158 UART: [kat] HMAC-384Kdf
2,970,416 UART: [kat] LMS
3,502,212 UART: [kat] --
3,506,577 UART: [cold-reset] ++
3,509,012 UART: [fht] FHT @ 0x50003400
3,520,767 UART: [idev] ++
3,521,443 UART: [idev] CDI.KEYID = 6
3,522,455 UART: [idev] SUBJECT.KEYID = 7
3,523,614 UART: [idev] UDS.KEYID = 0
3,526,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,292 UART: [idev] Erasing UDS.KEYID = 0
6,025,312 UART: [idev] Sha1 KeyId Algorithm
6,046,672 UART: [idev] --
6,051,808 UART: [ldev] ++
6,052,495 UART: [ldev] CDI.KEYID = 6
6,053,414 UART: [ldev] SUBJECT.KEYID = 5
6,054,576 UART: [ldev] AUTHORITY.KEYID = 7
6,055,807 UART: [ldev] FE.KEYID = 1
6,098,425 UART: [ldev] Erasing FE.KEYID = 1
8,603,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,988 UART: [ldev] --
10,414,580 UART: [fwproc] Wait for Commands...
10,416,729 UART: [fwproc] Recv command 0x46574c44
10,419,044 UART: [fwproc] Recv'd Img size: 114448 bytes
12,502,449 UART: ROM Fatal Error: 0x000B0040
12,506,064 >>> mbox cmd response: failed
12,506,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,947 >>> mbox cmd response: failed
12,507,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,511 >>> mbox cmd response: failed
Initializing fuses
2,054,747 writing to cptra_bootfsm_go
2,244,048 UART:
2,244,405 UART: Running Caliptra ROM ...
2,245,539 UART:
2,245,704 UART: [state] CFI Enabled
2,303,349 UART: [state] LifecycleState = Unprovisioned
2,305,732 UART: [state] DebugLocked = No
2,308,088 UART: [state] WD Timer not started. Device not locked for debugging
2,312,380 UART: [kat] SHA2-256
2,502,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,029 UART: [kat] ++
2,513,496 UART: [kat] sha1
2,524,484 UART: [kat] SHA2-256
2,527,508 UART: [kat] SHA2-384
2,533,340 UART: [kat] SHA2-512-ACC
2,535,931 UART: [kat] ECC-384
4,988,248 UART: [kat] HMAC-384Kdf
5,012,584 UART: [kat] LMS
5,544,331 UART: [kat] --
5,547,942 UART: [cold-reset] ++
5,549,872 UART: [fht] FHT @ 0x50003400
5,560,693 UART: [idev] ++
5,561,381 UART: [idev] CDI.KEYID = 6
5,562,397 UART: [idev] SUBJECT.KEYID = 7
5,563,501 UART: [idev] UDS.KEYID = 0
5,566,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,083 UART: [idev] Erasing UDS.KEYID = 0
8,069,388 UART: [idev] Sha1 KeyId Algorithm
8,091,559 UART: [idev] --
8,095,920 UART: [ldev] ++
8,096,620 UART: [ldev] CDI.KEYID = 6
8,097,556 UART: [ldev] SUBJECT.KEYID = 5
8,098,725 UART: [ldev] AUTHORITY.KEYID = 7
8,099,964 UART: [ldev] FE.KEYID = 1
8,140,705 UART: [ldev] Erasing FE.KEYID = 1
10,646,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,871 UART: [ldev] --
12,451,586 UART: [fwproc] Wait for Commands...
12,454,502 UART: [fwproc] Recv command 0x46574c44
12,456,771 UART: [fwproc] Recv'd Img size: 114448 bytes
15,908,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,650,450 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,442,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,303,970 >>> mbox cmd response: failed
12,304,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,870 >>> mbox cmd response: failed
12,305,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,431 >>> mbox cmd response: failed
Initializing fuses
2,062,975 writing to cptra_bootfsm_go
5,472,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,763,448 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,548 UART:
192,893 UART: Running Caliptra ROM ...
194,098 UART:
603,839 UART: [state] CFI Enabled
620,240 UART: [state] LifecycleState = Unprovisioned
622,622 UART: [state] DebugLocked = No
624,969 UART: [state] WD Timer not started. Device not locked for debugging
628,765 UART: [kat] SHA2-256
818,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,443 UART: [kat] ++
829,950 UART: [kat] sha1
840,399 UART: [kat] SHA2-256
843,468 UART: [kat] SHA2-384
848,833 UART: [kat] SHA2-512-ACC
851,397 UART: [kat] ECC-384
3,292,281 UART: [kat] HMAC-384Kdf
3,306,300 UART: [kat] LMS
3,838,121 UART: [kat] --
3,841,382 UART: [cold-reset] ++
3,843,264 UART: [fht] FHT @ 0x50003400
3,855,155 UART: [idev] ++
3,855,837 UART: [idev] CDI.KEYID = 6
3,856,805 UART: [idev] SUBJECT.KEYID = 7
3,858,041 UART: [idev] UDS.KEYID = 0
3,860,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,004,650 UART: [idev] Erasing UDS.KEYID = 0
6,333,666 UART: [idev] Sha1 KeyId Algorithm
6,354,687 UART: [idev] --
6,360,086 UART: [ldev] ++
6,360,771 UART: [ldev] CDI.KEYID = 6
6,361,687 UART: [ldev] SUBJECT.KEYID = 5
6,362,847 UART: [ldev] AUTHORITY.KEYID = 7
6,364,222 UART: [ldev] FE.KEYID = 1
6,376,016 UART: [ldev] Erasing FE.KEYID = 1
8,849,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,646 UART: [ldev] --
10,635,947 UART: [fwproc] Wait for Commands...
10,638,693 UART: [fwproc] Recv command 0x46574c44
10,641,006 UART: [fwproc] Recv'd Img size: 114448 bytes
12,724,975 UART: ROM Fatal Error: 0x000B0040
12,728,638 >>> mbox cmd response: failed
12,729,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,729,371 >>> mbox cmd response: failed
12,729,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,729,880 >>> mbox cmd response: failed
Initializing fuses
2,060,805 writing to cptra_bootfsm_go
2,250,138 UART:
2,250,474 UART: Running Caliptra ROM ...
2,251,578 UART:
7,718,800 UART: [state] CFI Enabled
7,732,537 UART: [state] LifecycleState = Unprovisioned
7,734,956 UART: [state] DebugLocked = No
7,737,588 UART: [state] WD Timer not started. Device not locked for debugging
7,742,747 UART: [kat] SHA2-256
7,932,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,943,441 UART: [kat] ++
7,944,043 UART: [kat] sha1
7,955,592 UART: [kat] SHA2-256
7,958,591 UART: [kat] SHA2-384
7,965,021 UART: [kat] SHA2-512-ACC
7,967,601 UART: [kat] ECC-384
10,411,173 UART: [kat] HMAC-384Kdf
10,424,538 UART: [kat] LMS
10,956,381 UART: [kat] --
10,960,012 UART: [cold-reset] ++
10,962,065 UART: [fht] FHT @ 0x50003400
10,974,125 UART: [idev] ++
10,974,804 UART: [idev] CDI.KEYID = 6
10,975,765 UART: [idev] SUBJECT.KEYID = 7
10,976,974 UART: [idev] UDS.KEYID = 0
10,979,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,123,072 UART: [idev] Erasing UDS.KEYID = 0
13,454,378 UART: [idev] Sha1 KeyId Algorithm
13,477,923 UART: [idev] --
13,481,938 UART: [ldev] ++
13,482,619 UART: [ldev] CDI.KEYID = 6
13,483,501 UART: [ldev] SUBJECT.KEYID = 5
13,484,713 UART: [ldev] AUTHORITY.KEYID = 7
13,485,942 UART: [ldev] FE.KEYID = 1
13,497,080 UART: [ldev] Erasing FE.KEYID = 1
15,976,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,694,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,709,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,739,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,759,875 UART: [ldev] --
17,764,818 UART: [fwproc] Wait for Commands...
17,767,185 UART: [fwproc] Recv command 0x46574c44
17,769,442 UART: [fwproc] Recv'd Img size: 114448 bytes
21,215,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,294,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,411,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,953,669 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,755,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,521,523 >>> mbox cmd response: failed
12,522,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,434 >>> mbox cmd response: failed
12,522,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,993 >>> mbox cmd response: failed
Initializing fuses
2,054,714 writing to cptra_bootfsm_go
11,097,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,302,234 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,524 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,601 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,380 UART: [idev] Erasing UDS.KEYID = 0
1,505,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,757 UART: [ldev] ++
1,514,925 UART: [ldev] CDI.KEYID = 6
1,515,288 UART: [ldev] SUBJECT.KEYID = 5
1,515,714 UART: [ldev] AUTHORITY.KEYID = 7
1,516,177 UART: [ldev] FE.KEYID = 1
1,521,173 UART: [ldev] Erasing FE.KEYID = 1
1,546,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,648 UART: [ldev] --
1,585,975 UART: [fwproc] Waiting for Commands...
1,586,592 UART: [fwproc] Received command 0x46574c44
1,587,383 UART: [fwproc] Received Image of size 114448 bytes
1,635,528 UART: ROM Fatal Error: 0x000B0040
1,636,685 >>> mbox cmd response: failed
1,636,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,691 >>> mbox cmd response: failed
1,636,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,233 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,282 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,619 UART: [fht] Storing FHT @ 0x50003400
1,479,394 UART: [idev] ++
1,479,562 UART: [idev] CDI.KEYID = 6
1,479,922 UART: [idev] SUBJECT.KEYID = 7
1,480,346 UART: [idev] UDS.KEYID = 0
1,480,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,888 UART: [idev] Erasing UDS.KEYID = 0
1,504,480 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,962 UART: [idev] --
1,513,863 UART: [ldev] ++
1,514,031 UART: [ldev] CDI.KEYID = 6
1,514,394 UART: [ldev] SUBJECT.KEYID = 5
1,514,820 UART: [ldev] AUTHORITY.KEYID = 7
1,515,283 UART: [ldev] FE.KEYID = 1
1,520,547 UART: [ldev] Erasing FE.KEYID = 1
1,545,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,802 UART: [ldev] --
1,584,109 UART: [fwproc] Waiting for Commands...
1,584,966 UART: [fwproc] Received command 0x46574c44
1,585,757 UART: [fwproc] Received Image of size 114448 bytes
2,885,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,049 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,401 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,448 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,888 >>> mbox cmd response: failed
1,487,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,894 >>> mbox cmd response: failed
1,487,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,776 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,704 UART: [kat] SHA2-256
892,642 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,276 UART: [cold-reset] ++
1,476,686 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,721 UART: [idev] Erasing UDS.KEYID = 0
1,505,339 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,887 UART: [idev] --
1,514,810 UART: [ldev] ++
1,514,978 UART: [ldev] CDI.KEYID = 6
1,515,341 UART: [ldev] SUBJECT.KEYID = 5
1,515,767 UART: [ldev] AUTHORITY.KEYID = 7
1,516,230 UART: [ldev] FE.KEYID = 1
1,521,712 UART: [ldev] Erasing FE.KEYID = 1
1,547,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,781 UART: [ldev] --
1,587,266 UART: [fwproc] Waiting for Commands...
1,587,997 UART: [fwproc] Received command 0x46574c44
1,588,788 UART: [fwproc] Received Image of size 114448 bytes
1,635,691 UART: ROM Fatal Error: 0x000B0040
1,636,848 >>> mbox cmd response: failed
1,636,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,854 >>> mbox cmd response: failed
1,636,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,642 UART: [kat] SHA2-256
882,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,688 UART: [kat] ++
886,840 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,609 UART: [kat] SHA2-512-ACC
897,510 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,477,110 UART: [cold-reset] ++
1,477,498 UART: [fht] Storing FHT @ 0x50003400
1,480,313 UART: [idev] ++
1,480,481 UART: [idev] CDI.KEYID = 6
1,480,841 UART: [idev] SUBJECT.KEYID = 7
1,481,265 UART: [idev] UDS.KEYID = 0
1,481,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,517 UART: [idev] Erasing UDS.KEYID = 0
1,505,641 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,181 UART: [idev] --
1,515,240 UART: [ldev] ++
1,515,408 UART: [ldev] CDI.KEYID = 6
1,515,771 UART: [ldev] SUBJECT.KEYID = 5
1,516,197 UART: [ldev] AUTHORITY.KEYID = 7
1,516,660 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,546,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,069 UART: [ldev] --
1,585,504 UART: [fwproc] Waiting for Commands...
1,586,361 UART: [fwproc] Received command 0x46574c44
1,587,152 UART: [fwproc] Received Image of size 114448 bytes
2,886,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,149 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,475 >>> mbox cmd response: failed
1,488,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,481 >>> mbox cmd response: failed
1,488,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,159 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
892,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,999 UART: [kat] ++
897,151 UART: [kat] sha1
901,421 UART: [kat] SHA2-256
903,361 UART: [kat] SHA2-384
906,196 UART: [kat] SHA2-512-ACC
908,097 UART: [kat] ECC-384
917,806 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,117 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,581 UART: [idev] Sha1 KeyId Algorithm
1,209,055 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,644 UART: [ldev] SUBJECT.KEYID = 5
1,211,070 UART: [ldev] AUTHORITY.KEYID = 7
1,211,533 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,021 UART: ROM Fatal Error: 0x000B0040
1,333,178 >>> mbox cmd response: failed
1,333,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,184 >>> mbox cmd response: failed
1,333,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
892,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,003 UART: [kat] ++
897,155 UART: [kat] sha1
901,341 UART: [kat] SHA2-256
903,281 UART: [kat] SHA2-384
905,960 UART: [kat] SHA2-512-ACC
907,861 UART: [kat] ECC-384
917,164 UART: [kat] HMAC-384Kdf
921,724 UART: [kat] LMS
1,170,052 UART: [kat] --
1,170,963 UART: [cold-reset] ++
1,171,517 UART: [fht] FHT @ 0x50003400
1,174,154 UART: [idev] ++
1,174,322 UART: [idev] CDI.KEYID = 6
1,174,682 UART: [idev] SUBJECT.KEYID = 7
1,175,106 UART: [idev] UDS.KEYID = 0
1,175,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,901 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,988 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,051 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,341 >>> mbox cmd response: failed
1,186,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,347 >>> mbox cmd response: failed
1,186,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,706 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
902,012 UART: [kat] SHA2-256
903,952 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,549 UART: [kat] HMAC-384Kdf
923,073 UART: [kat] LMS
1,171,401 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,431 UART: [idev] ++
1,175,599 UART: [idev] CDI.KEYID = 6
1,175,959 UART: [idev] SUBJECT.KEYID = 7
1,176,383 UART: [idev] UDS.KEYID = 0
1,176,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,408 UART: [idev] Sha1 KeyId Algorithm
1,209,848 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,640 UART: [ldev] Erasing FE.KEYID = 1
1,244,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,378 UART: [ldev] --
1,283,795 UART: [fwproc] Wait for Commands...
1,284,495 UART: [fwproc] Recv command 0x46574c44
1,285,223 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,632 UART: ROM Fatal Error: 0x000B0040
1,333,789 >>> mbox cmd response: failed
1,333,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,795 >>> mbox cmd response: failed
1,333,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,861 UART: [state] LifecycleState = Unprovisioned
85,516 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,395 UART: [kat] SHA2-256
893,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,170 UART: [kat] ++
897,322 UART: [kat] sha1
901,470 UART: [kat] SHA2-256
903,410 UART: [kat] SHA2-384
906,305 UART: [kat] SHA2-512-ACC
908,206 UART: [kat] ECC-384
917,891 UART: [kat] HMAC-384Kdf
922,611 UART: [kat] LMS
1,170,939 UART: [kat] --
1,172,022 UART: [cold-reset] ++
1,172,358 UART: [fht] FHT @ 0x50003400
1,175,027 UART: [idev] ++
1,175,195 UART: [idev] CDI.KEYID = 6
1,175,555 UART: [idev] SUBJECT.KEYID = 7
1,175,979 UART: [idev] UDS.KEYID = 0
1,176,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,035 UART: [idev] Erasing UDS.KEYID = 0
1,201,644 UART: [idev] Sha1 KeyId Algorithm
1,210,056 UART: [idev] --
1,211,204 UART: [ldev] ++
1,211,372 UART: [ldev] CDI.KEYID = 6
1,211,735 UART: [ldev] SUBJECT.KEYID = 5
1,212,161 UART: [ldev] AUTHORITY.KEYID = 7
1,212,624 UART: [ldev] FE.KEYID = 1
1,217,956 UART: [ldev] Erasing FE.KEYID = 1
1,244,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,622 UART: [ldev] --
1,283,999 UART: [fwproc] Wait for Commands...
1,284,659 UART: [fwproc] Recv command 0x46574c44
1,285,387 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,432 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,514 >>> mbox cmd response: failed
1,189,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,520 >>> mbox cmd response: failed
1,189,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,276 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,690 UART: [ldev] ++
1,208,858 UART: [ldev] CDI.KEYID = 6
1,209,222 UART: [ldev] SUBJECT.KEYID = 5
1,209,649 UART: [ldev] AUTHORITY.KEYID = 7
1,210,112 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,291 UART: [fwproc] Recv command 0x46574c44
1,282,024 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,912 UART: ROM Fatal Error: 0x000B0040
1,330,069 >>> mbox cmd response: failed
1,330,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,075 >>> mbox cmd response: failed
1,330,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,262 UART: [kat] LMS
1,169,574 UART: [kat] --
1,170,693 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,173,607 UART: [idev] ++
1,173,775 UART: [idev] CDI.KEYID = 6
1,174,136 UART: [idev] SUBJECT.KEYID = 7
1,174,561 UART: [idev] UDS.KEYID = 0
1,174,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,623 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,521 UART: [idev] --
1,209,382 UART: [ldev] ++
1,209,550 UART: [ldev] CDI.KEYID = 6
1,209,914 UART: [ldev] SUBJECT.KEYID = 5
1,210,341 UART: [ldev] AUTHORITY.KEYID = 7
1,210,804 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,960 UART: [ldev] --
1,281,438 UART: [fwproc] Wait for Commands...
1,282,067 UART: [fwproc] Recv command 0x46574c44
1,282,800 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,643 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,738 >>> mbox cmd response: failed
1,181,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,744 >>> mbox cmd response: failed
1,181,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,859 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
915,741 UART: [kat] HMAC-384Kdf
920,271 UART: [kat] LMS
1,168,583 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,882 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,173,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,503 UART: [ldev] ++
1,208,671 UART: [ldev] CDI.KEYID = 6
1,209,035 UART: [ldev] SUBJECT.KEYID = 5
1,209,462 UART: [ldev] AUTHORITY.KEYID = 7
1,209,925 UART: [ldev] FE.KEYID = 1
1,215,157 UART: [ldev] Erasing FE.KEYID = 1
1,241,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,051 UART: [ldev] --
1,280,495 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,135 UART: ROM Fatal Error: 0x000B0040
1,330,292 >>> mbox cmd response: failed
1,330,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,298 >>> mbox cmd response: failed
1,330,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,553 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,190 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,923 >>> mbox cmd response: failed
1,181,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,929 >>> mbox cmd response: failed
1,181,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,554 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,183 UART:
192,550 UART: Running Caliptra ROM ...
193,693 UART:
193,840 UART: [state] CFI Enabled
263,437 UART: [state] LifecycleState = Unprovisioned
265,397 UART: [state] DebugLocked = No
268,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,595 UART: [kat] SHA2-256
443,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,835 UART: [kat] ++
454,308 UART: [kat] sha1
466,215 UART: [kat] SHA2-256
468,920 UART: [kat] SHA2-384
475,978 UART: [kat] SHA2-512-ACC
478,321 UART: [kat] ECC-384
2,765,160 UART: [kat] HMAC-384Kdf
2,778,598 UART: [kat] LMS
3,968,934 UART: [kat] --
3,973,802 UART: [cold-reset] ++
3,975,248 UART: [fht] Storing FHT @ 0x50003400
3,986,466 UART: [idev] ++
3,987,087 UART: [idev] CDI.KEYID = 6
3,987,974 UART: [idev] SUBJECT.KEYID = 7
3,989,239 UART: [idev] UDS.KEYID = 0
3,991,764 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,517 UART: [idev] Erasing UDS.KEYID = 0
7,321,842 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,901 UART: [idev] --
7,347,130 UART: [ldev] ++
7,347,705 UART: [ldev] CDI.KEYID = 6
7,348,729 UART: [ldev] SUBJECT.KEYID = 5
7,349,888 UART: [ldev] AUTHORITY.KEYID = 7
7,351,118 UART: [ldev] FE.KEYID = 1
7,380,469 UART: [ldev] Erasing FE.KEYID = 1
10,712,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,005,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,019,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,034,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,049,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,067,871 UART: [ldev] --
13,071,745 UART: [fwproc] Waiting for Commands...
13,073,467 UART: [fwproc] Received command 0x46574c44
13,075,662 UART: [fwproc] Received Image of size 114124 bytes
17,128,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,204,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,273,154 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,590,084 >>> mbox cmd response: success
17,592,596 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
17,717,837 UART: [afmc] ++
17,718,485 UART: [afmc] CDI.KEYID = 6
17,719,417 UART: [afmc] SUBJECT.KEYID = 7
17,720,529 UART: [afmc] AUTHORITY.KEYID = 5
20,962,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,344 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,708 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,571 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,310,030 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,329,886 UART: [afmc] --
23,332,884 UART: [cold-reset] --
23,337,688 UART: [state] Locking Datavault
23,344,501 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,255 UART: [state] Locking ICCM
23,348,649 UART: [exit] Launching FMC @ 0x40000130
23,357,040 UART:
23,357,286 UART: Running Caliptra FMC ...
23,358,390 UART:
23,358,549 UART: [state] CFI Enabled
23,422,238 UART: [fht] FMC Alias Private Key: 7
25,760,796 UART: [art] Extend RT PCRs Done
25,762,024 UART: [art] Lock RT PCRs Done
25,763,626 UART: [art] Populate DV Done
25,768,882 UART: [fht] FMC Alias Private Key: 7
25,770,370 UART: [art] Derive CDI
25,771,134 UART: [art] Store in in slot 0x4
25,830,646 UART: [art] Derive Key Pair
25,831,681 UART: [art] Store priv key in slot 0x5
29,124,813 UART: [art] Derive Key Pair - Done
29,138,073 UART: [art] Signing Cert with AUTHO
29,139,405 UART: RITY.KEYID = 7
31,425,932 UART: [art] Erasing AUTHORITY.KEYID = 7
31,427,440 UART: [art] PUB.X = 8635AE97DC5EA2C977D5215EB27AB1483DB589B9E0836EB0DD60B45419315EC756832265610CF2323075873CCEFD6065
31,434,654 UART: [art] PUB.Y = 81BA98976636A229008F69FA3F763BB302F7AFBA033A87BF0253C2F89635B7BA258BA7498275B959F830E5A0CC5E9713
31,441,899 UART: [art] SIG.R = 4A6A93130A59D1BA4D161DF3913B0ED78B8EEC4DBD75E83F336608A48108E83D4093C81B3907EFB34B7EC93BE9C1743F
31,449,262 UART: [art] SIG.S = DE65C1B695E3B9D2603FB8AD6C1438472D358E194CF69CD564352D23A7E1BD4801ABA7BA7C3BBA844DBA7890E842BC93
32,754,791 UART: Caliptra RT
32,755,507 UART: [state] CFI Enabled
32,914,822 UART: [rt] RT listening for mailbox commands...
32,917,621 UART:
32,917,788 UART: Running Caliptra ROM ...
32,918,901 UART:
32,919,060 UART: [state] CFI Enabled
32,980,521 UART: [state] LifecycleState = Unprovisioned
32,982,451 UART: [state] DebugLocked = No
32,984,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,989,892 UART: [kat] SHA2-256
33,159,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,170,048 UART: [kat] ++
33,170,504 UART: [kat] sha1
33,182,303 UART: [kat] SHA2-256
33,184,993 UART: [kat] SHA2-384
33,191,731 UART: [kat] SHA2-512-ACC
33,194,090 UART: [kat] ECC-384
35,485,876 UART: [kat] HMAC-384Kdf
35,516,079 UART: [kat] LMS
36,706,402 UART: [kat] --
36,711,818 UART: [update-reset] ++
39,514,404 >>> mbox cmd response: failed
39,516,200 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,659,716 UART: ROM Non-Fatal Error: 0x000B001F
39,661,159 UART: [state] Locking Datavault
39,662,233 UART: [state] Locking PCR0, PCR1 and PCR31
39,663,771 UART: [state] Locking ICCM
39,664,651 UART: [exit] Launching FMC @ 0x40000130
39,665,994 UART:
39,666,141 UART: Running Caliptra FMC ...
39,667,243 UART:
39,667,397 UART: [state] CFI Enabled
39,668,230 UART: [art] Extend RT PCRs Done
39,669,282 UART: [art] Lock RT PCRs Done
39,670,262 UART: [art] Populate DV Done
39,671,287 UART: [fht] FMC Alias Private Key: 7
39,672,527 UART: [art] Derive CDI
39,673,255 UART: [art] Store in in slot 0x4
39,714,316 UART: [art] Derive Key Pair
39,715,362 UART: [art] Store priv key in slot 0x5
43,007,655 UART: [art] Derive Key Pair - Done
43,020,931 UART: [art] Signing Cert with AUTHO
43,022,243 UART: RITY.KEYID = 7
45,309,624 UART: [art] Erasing AUTHORITY.KEYID = 7
45,311,134 UART: [art] PUB.X = 8635AE97DC5EA2C977D5215EB27AB1483DB589B9E0836EB0DD60B45419315EC756832265610CF2323075873CCEFD6065
45,318,397 UART: [art] PUB.Y = 81BA98976636A229008F69FA3F763BB302F7AFBA033A87BF0253C2F89635B7BA258BA7498275B959F830E5A0CC5E9713
45,325,640 UART: [art] SIG.R = 4A6A93130A59D1BA4D161DF3913B0ED78B8EEC4DBD75E83F336608A48108E83D4093C81B3907EFB34B7EC93BE9C1743F
45,333,000 UART: [art] SIG.S = DE65C1B695E3B9D2603FB8AD6C1438472D358E194CF69CD564352D23A7E1BD4801ABA7BA7C3BBA844DBA7890E842BC93
46,638,009 UART: Caliptra RT
46,638,726 UART: [state] CFI Enabled
46,973,218 UART: [rt] RT listening for mailbox commands...
46,976,013 UART:
46,976,181 UART: Running Caliptra ROM ...
46,977,290 UART:
46,977,472 UART: [state] CFI Enabled
47,036,829 UART: [state] LifecycleState = Unprovisioned
47,038,780 UART: [state] DebugLocked = No
47,040,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,045,054 UART: [kat] SHA2-256
47,214,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,225,221 UART: [kat] ++
47,225,823 UART: [kat] sha1
47,237,576 UART: [kat] SHA2-256
47,240,261 UART: [kat] SHA2-384
47,246,303 UART: [kat] SHA2-512-ACC
47,248,649 UART: [kat] ECC-384
49,539,208 UART: [kat] HMAC-384Kdf
49,573,145 UART: [kat] LMS
50,763,488 UART: [kat] --
50,769,116 UART: [update-reset] ++
54,909,177 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,913,767 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
55,296,031 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,786,988 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,423 >>> mbox cmd response: success
17,859,064 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
23,549,355 UART:
23,549,767 UART: Running Caliptra FMC ...
23,550,874 UART:
23,551,045 UART: [state] CFI Enabled
23,618,191 UART: [fht] FMC Alias Private Key: 7
25,956,455 UART: [art] Extend RT PCRs Done
25,957,680 UART: [art] Lock RT PCRs Done
25,959,657 UART: [art] Populate DV Done
25,964,859 UART: [fht] FMC Alias Private Key: 7
25,966,504 UART: [art] Derive CDI
25,967,238 UART: [art] Store in in slot 0x4
26,025,827 UART: [art] Derive Key Pair
26,026,873 UART: [art] Store priv key in slot 0x5
29,319,434 UART: [art] Derive Key Pair - Done
29,332,818 UART: [art] Signing Cert with AUTHO
29,334,155 UART: RITY.KEYID = 7
31,620,526 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,037 UART: [art] PUB.X = E0654596E868EA8BDC9B152B0E8776D1F174B4F248AD53A04A4C892FEC58B25C2815564E06EDB510CAFE453DC57A62BD
31,629,262 UART: [art] PUB.Y = 921846801191BE4629CCE40D1FD43C37684386DFB7AF3008CD77B663E2627A9662BF6659B04B00E29FFA302669209C61
31,636,497 UART: [art] SIG.R = B73DC8E7068976D9946EF49568D77514FEF633800F7C8DCCB5A70A2AFEC7E543B7529E41D39677BD6AD87C1636F3CD10
31,643,854 UART: [art] SIG.S = 09810F0F5D9A7923601EB036D3EC6E35E27C192127D35E248F04378D497D75972D812E72C6D7840990F037E646880526
32,948,787 UART: Caliptra RT
32,949,499 UART: [state] CFI Enabled
33,109,597 UART: [rt] RT listening for mailbox commands...
39,509,809 >>> mbox cmd response: failed
39,511,709 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,655,248 UART:
39,655,569 UART: Running Caliptra FMC ...
39,656,614 UART:
39,656,764 UART: [state] CFI Enabled
39,657,695 UART: [art] Extend RT PCRs Done
39,658,843 UART: [art] Lock RT PCRs Done
39,659,859 UART: [art] Populate DV Done
39,660,962 UART: [fht] FMC Alias Private Key: 7
39,662,202 UART: [art] Derive CDI
39,662,947 UART: [art] Store in in slot 0x4
39,699,602 UART: [art] Derive Key Pair
39,700,601 UART: [art] Store priv key in slot 0x5
42,993,149 UART: [art] Derive Key Pair - Done
43,006,416 UART: [art] Signing Cert with AUTHO
43,007,731 UART: RITY.KEYID = 7
45,294,007 UART: [art] Erasing AUTHORITY.KEYID = 7
45,295,522 UART: [art] PUB.X = E0654596E868EA8BDC9B152B0E8776D1F174B4F248AD53A04A4C892FEC58B25C2815564E06EDB510CAFE453DC57A62BD
45,302,785 UART: [art] PUB.Y = 921846801191BE4629CCE40D1FD43C37684386DFB7AF3008CD77B663E2627A9662BF6659B04B00E29FFA302669209C61
45,310,029 UART: [art] SIG.R = B73DC8E7068976D9946EF49568D77514FEF633800F7C8DCCB5A70A2AFEC7E543B7529E41D39677BD6AD87C1636F3CD10
45,317,388 UART: [art] SIG.S = 09810F0F5D9A7923601EB036D3EC6E35E27C192127D35E248F04378D497D75972D812E72C6D7840990F037E646880526
46,622,660 UART: Caliptra RT
46,623,361 UART: [state] CFI Enabled
46,958,192 UART: [rt] RT listening for mailbox commands...
55,550,636 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,494 UART:
192,864 UART: Running Caliptra ROM ...
194,056 UART:
603,792 UART: [state] CFI Enabled
617,771 UART: [state] LifecycleState = Unprovisioned
619,657 UART: [state] DebugLocked = No
622,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,564 UART: [kat] SHA2-256
797,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,844 UART: [kat] ++
808,335 UART: [kat] sha1
819,865 UART: [kat] SHA2-256
822,603 UART: [kat] SHA2-384
828,146 UART: [kat] SHA2-512-ACC
830,536 UART: [kat] ECC-384
3,115,195 UART: [kat] HMAC-384Kdf
3,127,702 UART: [kat] LMS
4,317,856 UART: [kat] --
4,320,889 UART: [cold-reset] ++
4,323,313 UART: [fht] Storing FHT @ 0x50003400
4,335,206 UART: [idev] ++
4,335,783 UART: [idev] CDI.KEYID = 6
4,336,695 UART: [idev] SUBJECT.KEYID = 7
4,337,985 UART: [idev] UDS.KEYID = 0
4,340,581 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,076 UART: [idev] Erasing UDS.KEYID = 0
7,625,222 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,994 UART: [idev] --
7,652,398 UART: [ldev] ++
7,652,971 UART: [ldev] CDI.KEYID = 6
7,653,934 UART: [ldev] SUBJECT.KEYID = 5
7,655,148 UART: [ldev] AUTHORITY.KEYID = 7
7,656,434 UART: [ldev] FE.KEYID = 1
7,669,510 UART: [ldev] Erasing FE.KEYID = 1
10,958,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,703 UART: [ldev] --
13,315,690 UART: [fwproc] Waiting for Commands...
13,317,472 UART: [fwproc] Received command 0x46574c44
13,319,662 UART: [fwproc] Received Image of size 114124 bytes
17,372,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,808 >>> mbox cmd response: success
17,843,409 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
17,968,472 UART: [afmc] ++
17,969,117 UART: [afmc] CDI.KEYID = 6
17,970,011 UART: [afmc] SUBJECT.KEYID = 7
17,971,033 UART: [afmc] AUTHORITY.KEYID = 5
21,163,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,069 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,292 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,696 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,099 UART: [afmc] --
23,526,331 UART: [cold-reset] --
23,530,615 UART: [state] Locking Datavault
23,535,661 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,420 UART: [state] Locking ICCM
23,538,980 UART: [exit] Launching FMC @ 0x40000130
23,547,374 UART:
23,547,611 UART: Running Caliptra FMC ...
23,548,714 UART:
23,548,880 UART: [state] CFI Enabled
23,557,064 UART: [fht] FMC Alias Private Key: 7
25,887,867 UART: [art] Extend RT PCRs Done
25,889,079 UART: [art] Lock RT PCRs Done
25,890,614 UART: [art] Populate DV Done
25,896,300 UART: [fht] FMC Alias Private Key: 7
25,897,783 UART: [art] Derive CDI
25,898,546 UART: [art] Store in in slot 0x4
25,941,365 UART: [art] Derive Key Pair
25,942,407 UART: [art] Store priv key in slot 0x5
29,184,931 UART: [art] Derive Key Pair - Done
29,197,878 UART: [art] Signing Cert with AUTHO
29,199,182 UART: RITY.KEYID = 7
31,478,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,097 UART: [art] PUB.X = 83D008371A58D7776D31D60ACED7E8D73A4F43BFD5C27E5D473E3117A208BE34282295B33F90B3C56809CDD20D370BC9
31,487,310 UART: [art] PUB.Y = C65365FBF9763ABE43D4BC39DA48472E431B7748035296038947CB8F3AA5C4C2412816CD3AE190F4A7E12D335EFD0711
31,494,517 UART: [art] SIG.R = 81FC42EADE9529D959610DE9328645463796E2AAC7EE6083FAAF2B7DA4864F44AABCDC28768C312602D5AF5EE0D07F6A
31,501,953 UART: [art] SIG.S = 02E7DACD79ED07D913307BBD9CE309CEE983B677113BC2CCD5BCDCBE498D6286BD7EFA9EFBFEDE4F010F58A56D55484E
32,807,194 UART: Caliptra RT
32,807,909 UART: [state] CFI Enabled
32,925,373 UART: [rt] RT listening for mailbox commands...
32,928,487 UART:
32,928,738 UART: Running Caliptra ROM ...
32,929,847 UART:
32,930,117 UART: [state] CFI Enabled
32,946,919 UART: [state] LifecycleState = Unprovisioned
32,948,865 UART: [state] DebugLocked = No
32,950,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,956,174 UART: [kat] SHA2-256
33,125,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,136,393 UART: [kat] ++
33,136,844 UART: [kat] sha1
33,148,108 UART: [kat] SHA2-256
33,150,848 UART: [kat] SHA2-384
33,156,344 UART: [kat] SHA2-512-ACC
33,158,753 UART: [kat] ECC-384
35,441,544 UART: [kat] HMAC-384Kdf
35,454,309 UART: [kat] LMS
36,644,359 UART: [kat] --
36,649,850 UART: [update-reset] ++
39,446,689 >>> mbox cmd response: failed
39,448,562 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,591,704 UART: ROM Non-Fatal Error: 0x000B001F
39,593,137 UART: [state] Locking Datavault
39,594,240 UART: [state] Locking PCR0, PCR1 and PCR31
39,595,782 UART: [state] Locking ICCM
39,596,690 UART: [exit] Launching FMC @ 0x40000130
39,598,117 UART:
39,598,278 UART: Running Caliptra FMC ...
39,599,383 UART:
39,599,545 UART: [state] CFI Enabled
39,600,467 UART: [art] Extend RT PCRs Done
39,601,571 UART: [art] Lock RT PCRs Done
39,602,581 UART: [art] Populate DV Done
39,603,548 UART: [fht] FMC Alias Private Key: 7
39,605,092 UART: [art] Derive CDI
39,605,837 UART: [art] Store in in slot 0x4
39,606,971 UART: [art] Derive Key Pair
39,607,884 UART: [art] Store priv key in slot 0x5
42,808,475 UART: [art] Derive Key Pair - Done
42,821,319 UART: [art] Signing Cert with AUTHO
42,822,615 UART: RITY.KEYID = 7
45,101,750 UART: [art] Erasing AUTHORITY.KEYID = 7
45,103,276 UART: [art] PUB.X = 83D008371A58D7776D31D60ACED7E8D73A4F43BFD5C27E5D473E3117A208BE34282295B33F90B3C56809CDD20D370BC9
45,110,532 UART: [art] PUB.Y = C65365FBF9763ABE43D4BC39DA48472E431B7748035296038947CB8F3AA5C4C2412816CD3AE190F4A7E12D335EFD0711
45,117,775 UART: [art] SIG.R = 81FC42EADE9529D959610DE9328645463796E2AAC7EE6083FAAF2B7DA4864F44AABCDC28768C312602D5AF5EE0D07F6A
45,125,217 UART: [art] SIG.S = 02E7DACD79ED07D913307BBD9CE309CEE983B677113BC2CCD5BCDCBE498D6286BD7EFA9EFBFEDE4F010F58A56D55484E
46,430,067 UART: Caliptra RT
46,430,803 UART: [state] CFI Enabled
46,720,927 UART: [rt] RT listening for mailbox commands...
46,723,676 UART:
46,723,857 UART: Running Caliptra ROM ...
46,725,173 UART:
46,725,336 UART: [state] CFI Enabled
46,742,248 UART: [state] LifecycleState = Unprovisioned
46,744,130 UART: [state] DebugLocked = No
46,746,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,751,940 UART: [kat] SHA2-256
46,921,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
46,932,178 UART: [kat] ++
46,932,633 UART: [kat] sha1
46,943,842 UART: [kat] SHA2-256
46,946,539 UART: [kat] SHA2-384
46,951,558 UART: [kat] SHA2-512-ACC
46,953,927 UART: [kat] ECC-384
49,239,864 UART: [kat] HMAC-384Kdf
49,250,631 UART: [kat] LMS
50,440,674 UART: [kat] --
50,445,444 UART: [update-reset] ++
54,587,737 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,591,526 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
54,973,792 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
4,133,425 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,246 >>> mbox cmd response: success
18,078,790 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
23,714,919 UART:
23,715,315 UART: Running Caliptra FMC ...
23,716,512 UART:
23,716,699 UART: [state] CFI Enabled
23,724,637 UART: [fht] FMC Alias Private Key: 7
26,055,469 UART: [art] Extend RT PCRs Done
26,056,702 UART: [art] Lock RT PCRs Done
26,058,363 UART: [art] Populate DV Done
26,063,737 UART: [fht] FMC Alias Private Key: 7
26,065,360 UART: [art] Derive CDI
26,066,183 UART: [art] Store in in slot 0x4
26,108,955 UART: [art] Derive Key Pair
26,109,999 UART: [art] Store priv key in slot 0x5
29,351,691 UART: [art] Derive Key Pair - Done
29,364,858 UART: [art] Signing Cert with AUTHO
29,366,158 UART: RITY.KEYID = 7
31,644,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,387 UART: [art] PUB.X = 9910B21E179008AB4AB4CE9E79F9060C60B8D92D452876673DD235B8CFA8DFC4DA910D82A716F4A6B3184C47E38D404C
31,653,667 UART: [art] PUB.Y = 98C6B00592D18A6EB1BDD7980B6CC70A7081BBFDAA43FFC87B20640C7340F1C384048E4D1FCCE237EB0284140ECFDA0F
31,660,900 UART: [art] SIG.R = 7C3C1CCD52E34B25553DD2F70B6B38EDAA9A88F4A78DB3B9FBD0FDDB84687242C37ED5CC4BADE843B4A656F577EB6230
31,668,323 UART: [art] SIG.S = 6E33CE704E5936E8C8186EEC3B1F3E9620611DCFF1082276D3DF1D1900E2C0DA63706CA6BBFBECE34C6491348B16BF31
32,973,287 UART: Caliptra RT
32,974,005 UART: [state] CFI Enabled
33,090,842 UART: [rt] RT listening for mailbox commands...
39,434,632 >>> mbox cmd response: failed
39,436,501 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,579,815 UART:
39,580,141 UART: Running Caliptra FMC ...
39,581,207 UART:
39,581,365 UART: [state] CFI Enabled
39,582,228 UART: [art] Extend RT PCRs Done
39,583,368 UART: [art] Lock RT PCRs Done
39,584,443 UART: [art] Populate DV Done
39,585,535 UART: [fht] FMC Alias Private Key: 7
39,586,854 UART: [art] Derive CDI
39,587,590 UART: [art] Store in in slot 0x4
39,588,759 UART: [art] Derive Key Pair
39,589,698 UART: [art] Store priv key in slot 0x5
42,788,894 UART: [art] Derive Key Pair - Done
42,802,063 UART: [art] Signing Cert with AUTHO
42,803,386 UART: RITY.KEYID = 7
45,082,431 UART: [art] Erasing AUTHORITY.KEYID = 7
45,083,957 UART: [art] PUB.X = 9910B21E179008AB4AB4CE9E79F9060C60B8D92D452876673DD235B8CFA8DFC4DA910D82A716F4A6B3184C47E38D404C
45,091,151 UART: [art] PUB.Y = 98C6B00592D18A6EB1BDD7980B6CC70A7081BBFDAA43FFC87B20640C7340F1C384048E4D1FCCE237EB0284140ECFDA0F
45,098,444 UART: [art] SIG.R = 7C3C1CCD52E34B25553DD2F70B6B38EDAA9A88F4A78DB3B9FBD0FDDB84687242C37ED5CC4BADE843B4A656F577EB6230
45,105,847 UART: [art] SIG.S = 6E33CE704E5936E8C8186EEC3B1F3E9620611DCFF1082276D3DF1D1900E2C0DA63706CA6BBFBECE34C6491348B16BF31
46,410,840 UART: Caliptra RT
46,411,567 UART: [state] CFI Enabled
46,700,683 UART: [rt] RT listening for mailbox commands...
55,211,609 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,192 UART:
192,543 UART: Running Caliptra ROM ...
193,677 UART:
193,822 UART: [state] CFI Enabled
262,192 UART: [state] LifecycleState = Unprovisioned
264,072 UART: [state] DebugLocked = No
265,643 UART: [state] WD Timer not started. Device not locked for debugging
269,197 UART: [kat] SHA2-256
448,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,908 UART: [kat] ++
460,361 UART: [kat] sha1
470,857 UART: [kat] SHA2-256
473,917 UART: [kat] SHA2-384
481,131 UART: [kat] SHA2-512-ACC
484,061 UART: [kat] ECC-384
2,945,938 UART: [kat] HMAC-384Kdf
2,969,570 UART: [kat] LMS
3,498,987 UART: [kat] --
3,502,009 UART: [cold-reset] ++
3,503,999 UART: [fht] FHT @ 0x50003400
3,514,598 UART: [idev] ++
3,515,170 UART: [idev] CDI.KEYID = 6
3,516,156 UART: [idev] SUBJECT.KEYID = 7
3,517,316 UART: [idev] UDS.KEYID = 0
3,519,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,906 UART: [idev] Erasing UDS.KEYID = 0
6,025,357 UART: [idev] Sha1 KeyId Algorithm
6,048,369 UART: [idev] --
6,053,139 UART: [ldev] ++
6,053,718 UART: [ldev] CDI.KEYID = 6
6,054,606 UART: [ldev] SUBJECT.KEYID = 5
6,055,821 UART: [ldev] AUTHORITY.KEYID = 7
6,057,056 UART: [ldev] FE.KEYID = 1
6,096,954 UART: [ldev] Erasing FE.KEYID = 1
8,602,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,309 UART: [ldev] --
10,409,083 UART: [fwproc] Wait for Commands...
10,411,505 UART: [fwproc] Recv command 0x46574c44
10,413,606 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,273 >>> mbox cmd response: success
14,285,836 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,411,313 UART: [afmc] ++
14,411,941 UART: [afmc] CDI.KEYID = 6
14,412,834 UART: [afmc] SUBJECT.KEYID = 7
14,413,881 UART: [afmc] AUTHORITY.KEYID = 5
16,827,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,651 UART: [afmc] --
18,627,834 UART: [cold-reset] --
18,632,826 UART: [state] Locking Datavault
18,636,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,993 UART: [state] Locking ICCM
18,639,115 UART: [exit] Launching FMC @ 0x40000130
18,647,564 UART:
18,647,801 UART: Running Caliptra FMC ...
18,648,852 UART:
18,649,006 UART: [state] CFI Enabled
18,708,907 UART: [fht] FMC Alias Private Key: 7
20,472,295 UART: [art] Extend RT PCRs Done
20,473,528 UART: [art] Lock RT PCRs Done
20,475,126 UART: [art] Populate DV Done
20,480,648 UART: [fht] FMC Alias Private Key: 7
20,482,356 UART: [art] Derive CDI
20,483,171 UART: [art] Store in in slot 0x4
20,541,155 UART: [art] Derive Key Pair
20,542,197 UART: [art] Store priv key in slot 0x5
23,005,054 UART: [art] Derive Key Pair - Done
23,018,268 UART: [art] Signing Cert with AUTHO
23,019,575 UART: RITY.KEYID = 7
24,730,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,033 UART: [art] PUB.X = 9CBC2ED7E7559D38AAB65310B0A5E53511189FA413172ECCCC311B41F2143388862FB5F635B2FB1B1131CD554DE3AC69
24,739,270 UART: [art] PUB.Y = 1D1C49D223DB52336D6AC8C23B35BAB73670EB1B6EF707ACEC848FF14C9D6AAB1BB6344CDDA77A4181F444C0E3598655
24,746,599 UART: [art] SIG.R = D240E4698FDBB3E9AE6DAF3199AC798CCE9E2DEA6CF90428B05F917BC45B9F2ACADB61BF4CA306293791BCC0C2A6DF05
24,753,978 UART: [art] SIG.S = D97EF4696A2C1B51E9787F67759252DDD0900AFD02CB0EAA2FE5A0D920E9A1485D675B299832B53C031B4B60E4DEF004
25,733,606 UART: Caliptra RT
25,734,341 UART: [state] CFI Enabled
25,898,932 UART: [rt] RT listening for mailbox commands...
25,902,106 UART:
25,902,351 UART: Running Caliptra ROM ...
25,903,453 UART:
25,903,614 UART: [state] CFI Enabled
25,968,860 UART: [state] LifecycleState = Unprovisioned
25,970,727 UART: [state] DebugLocked = No
25,972,325 UART: [state] WD Timer not started. Device not locked for debugging
25,976,287 UART: [kat] SHA2-256
26,155,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,166,998 UART: [kat] ++
26,167,536 UART: [kat] sha1
26,178,640 UART: [kat] SHA2-256
26,181,649 UART: [kat] SHA2-384
26,188,498 UART: [kat] SHA2-512-ACC
26,191,402 UART: [kat] ECC-384
28,650,036 UART: [kat] HMAC-384Kdf
28,671,342 UART: [kat] LMS
29,200,810 UART: [kat] --
29,204,903 UART: [update-reset] ++
31,290,997 >>> mbox cmd response: failed
31,292,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,436,987 UART: ROM Non-Fatal Error: 0x000B001F
31,438,420 UART: [state] Locking Datavault
31,439,516 UART: [state] Locking PCR0, PCR1 and PCR31
31,441,052 UART: [state] Locking ICCM
31,442,120 UART: [exit] Launching FMC @ 0x40000130
31,443,547 UART:
31,443,705 UART: Running Caliptra FMC ...
31,444,803 UART:
31,444,956 UART: [state] CFI Enabled
31,445,893 UART: [art] Extend RT PCRs Done
31,447,031 UART: [art] Lock RT PCRs Done
31,448,097 UART: [art] Populate DV Done
31,449,128 UART: [fht] FMC Alias Private Key: 7
31,450,443 UART: [art] Derive CDI
31,451,178 UART: [art] Store in in slot 0x4
31,484,431 UART: [art] Derive Key Pair
31,485,468 UART: [art] Store priv key in slot 0x5
33,947,849 UART: [art] Derive Key Pair - Done
33,960,792 UART: [art] Signing Cert with AUTHO
33,962,129 UART: RITY.KEYID = 7
35,673,034 UART: [art] Erasing AUTHORITY.KEYID = 7
35,674,531 UART: [art] PUB.X = 9CBC2ED7E7559D38AAB65310B0A5E53511189FA413172ECCCC311B41F2143388862FB5F635B2FB1B1131CD554DE3AC69
35,681,784 UART: [art] PUB.Y = 1D1C49D223DB52336D6AC8C23B35BAB73670EB1B6EF707ACEC848FF14C9D6AAB1BB6344CDDA77A4181F444C0E3598655
35,689,069 UART: [art] SIG.R = D240E4698FDBB3E9AE6DAF3199AC798CCE9E2DEA6CF90428B05F917BC45B9F2ACADB61BF4CA306293791BCC0C2A6DF05
35,696,512 UART: [art] SIG.S = D97EF4696A2C1B51E9787F67759252DDD0900AFD02CB0EAA2FE5A0D920E9A1485D675B299832B53C031B4B60E4DEF004
36,675,433 UART: Caliptra RT
36,676,146 UART: [state] CFI Enabled
37,008,370 UART: [rt] RT listening for mailbox commands...
37,010,850 UART:
37,011,050 UART: Running Caliptra ROM ...
37,012,161 UART:
37,012,327 UART: [state] CFI Enabled
37,079,086 UART: [state] LifecycleState = Unprovisioned
37,081,066 UART: [state] DebugLocked = No
37,082,891 UART: [state] WD Timer not started. Device not locked for debugging
37,086,417 UART: [kat] SHA2-256
37,265,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
37,277,112 UART: [kat] ++
37,277,649 UART: [kat] sha1
37,289,024 UART: [kat] SHA2-256
37,292,089 UART: [kat] SHA2-384
37,299,117 UART: [kat] SHA2-512-ACC
37,302,073 UART: [kat] ECC-384
39,762,167 UART: [kat] HMAC-384Kdf
39,785,297 UART: [kat] LMS
40,314,795 UART: [kat] --
40,319,941 UART: [update-reset] ++
43,744,560 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,748,741 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,132,036 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,381,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,082,868 >>> mbox cmd response: success
14,084,589 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
18,367,351 UART:
18,367,748 UART: Running Caliptra FMC ...
18,368,847 UART:
18,368,995 UART: [state] CFI Enabled
18,435,801 UART: [fht] FMC Alias Private Key: 7
20,199,557 UART: [art] Extend RT PCRs Done
20,200,772 UART: [art] Lock RT PCRs Done
20,202,695 UART: [art] Populate DV Done
20,208,324 UART: [fht] FMC Alias Private Key: 7
20,209,863 UART: [art] Derive CDI
20,210,619 UART: [art] Store in in slot 0x4
20,268,336 UART: [art] Derive Key Pair
20,269,334 UART: [art] Store priv key in slot 0x5
22,732,237 UART: [art] Derive Key Pair - Done
22,745,243 UART: [art] Signing Cert with AUTHO
22,746,549 UART: RITY.KEYID = 7
24,457,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,485 UART: [art] PUB.X = 98B215DAB28BA12F9055E54581297EBC5ECE1D361EA86738F0A001CF32C30B521556004FB30E5570A396D60A93AFCF08
24,466,737 UART: [art] PUB.Y = 27445287B1A795817FBFA88DBA31B2F621DE851924ED4AA31FFC8F84D2CAFF568257708C4BFA2F179AFF747F66B843B0
24,474,009 UART: [art] SIG.R = 7AD1724B5D1B70928EE7AF258B1E4C85FBA30942E973A40C8F3C01E95724E323534947E87AC5DC4C487799A3D69FB492
24,481,417 UART: [art] SIG.S = AA12AAC4DA4AE979B4817CDF93ABD068E5C5EC5926CC763D0969ACABE3FD9452B5F05F9C552279ACC6B21C53D20159F4
25,460,728 UART: Caliptra RT
25,461,453 UART: [state] CFI Enabled
25,626,152 UART: [rt] RT listening for mailbox commands...
30,860,655 >>> mbox cmd response: failed
30,862,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,006,427 UART:
31,006,763 UART: Running Caliptra FMC ...
31,007,844 UART:
31,008,007 UART: [state] CFI Enabled
31,008,946 UART: [art] Extend RT PCRs Done
31,010,094 UART: [art] Lock RT PCRs Done
31,011,171 UART: [art] Populate DV Done
31,012,291 UART: [fht] FMC Alias Private Key: 7
31,013,618 UART: [art] Derive CDI
31,014,358 UART: [art] Store in in slot 0x4
31,042,609 UART: [art] Derive Key Pair
31,043,625 UART: [art] Store priv key in slot 0x5
33,505,944 UART: [art] Derive Key Pair - Done
33,519,112 UART: [art] Signing Cert with AUTHO
33,520,423 UART: RITY.KEYID = 7
35,231,806 UART: [art] Erasing AUTHORITY.KEYID = 7
35,233,331 UART: [art] PUB.X = 98B215DAB28BA12F9055E54581297EBC5ECE1D361EA86738F0A001CF32C30B521556004FB30E5570A396D60A93AFCF08
35,240,588 UART: [art] PUB.Y = 27445287B1A795817FBFA88DBA31B2F621DE851924ED4AA31FFC8F84D2CAFF568257708C4BFA2F179AFF747F66B843B0
35,247,869 UART: [art] SIG.R = 7AD1724B5D1B70928EE7AF258B1E4C85FBA30942E973A40C8F3C01E95724E323534947E87AC5DC4C487799A3D69FB492
35,255,250 UART: [art] SIG.S = AA12AAC4DA4AE979B4817CDF93ABD068E5C5EC5926CC763D0969ACABE3FD9452B5F05F9C552279ACC6B21C53D20159F4
36,234,317 UART: Caliptra RT
36,235,021 UART: [state] CFI Enabled
36,571,618 UART: [rt] RT listening for mailbox commands...
43,562,064 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,608 UART:
192,987 UART: Running Caliptra ROM ...
194,106 UART:
603,883 UART: [state] CFI Enabled
617,972 UART: [state] LifecycleState = Unprovisioned
619,811 UART: [state] DebugLocked = No
622,433 UART: [state] WD Timer not started. Device not locked for debugging
625,390 UART: [kat] SHA2-256
804,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,073 UART: [kat] ++
816,616 UART: [kat] sha1
827,232 UART: [kat] SHA2-256
830,251 UART: [kat] SHA2-384
836,846 UART: [kat] SHA2-512-ACC
839,780 UART: [kat] ECC-384
3,280,103 UART: [kat] HMAC-384Kdf
3,292,940 UART: [kat] LMS
3,822,444 UART: [kat] --
3,826,116 UART: [cold-reset] ++
3,828,480 UART: [fht] FHT @ 0x50003400
3,840,756 UART: [idev] ++
3,841,330 UART: [idev] CDI.KEYID = 6
3,842,241 UART: [idev] SUBJECT.KEYID = 7
3,843,404 UART: [idev] UDS.KEYID = 0
3,845,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,036 UART: [idev] Erasing UDS.KEYID = 0
6,312,619 UART: [idev] Sha1 KeyId Algorithm
6,335,011 UART: [idev] --
6,339,261 UART: [ldev] ++
6,339,862 UART: [ldev] CDI.KEYID = 6
6,340,748 UART: [ldev] SUBJECT.KEYID = 5
6,341,967 UART: [ldev] AUTHORITY.KEYID = 7
6,343,205 UART: [ldev] FE.KEYID = 1
6,352,094 UART: [ldev] Erasing FE.KEYID = 1
8,823,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,626 UART: [ldev] --
10,614,784 UART: [fwproc] Wait for Commands...
10,616,400 UART: [fwproc] Recv command 0x46574c44
10,618,505 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,201 >>> mbox cmd response: success
14,487,818 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,613,153 UART: [afmc] ++
14,613,792 UART: [afmc] CDI.KEYID = 6
14,614,684 UART: [afmc] SUBJECT.KEYID = 7
14,615,735 UART: [afmc] AUTHORITY.KEYID = 5
16,991,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,008 UART: [afmc] --
18,790,416 UART: [cold-reset] --
18,796,114 UART: [state] Locking Datavault
18,801,270 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,919 UART: [state] Locking ICCM
18,805,014 UART: [exit] Launching FMC @ 0x40000130
18,813,469 UART:
18,813,716 UART: Running Caliptra FMC ...
18,815,020 UART:
18,815,194 UART: [state] CFI Enabled
18,823,467 UART: [fht] FMC Alias Private Key: 7
20,580,123 UART: [art] Extend RT PCRs Done
20,581,347 UART: [art] Lock RT PCRs Done
20,582,783 UART: [art] Populate DV Done
20,588,086 UART: [fht] FMC Alias Private Key: 7
20,589,627 UART: [art] Derive CDI
20,590,444 UART: [art] Store in in slot 0x4
20,633,198 UART: [art] Derive Key Pair
20,634,202 UART: [art] Store priv key in slot 0x5
23,060,603 UART: [art] Derive Key Pair - Done
23,073,377 UART: [art] Signing Cert with AUTHO
23,074,686 UART: RITY.KEYID = 7
24,780,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,807 UART: [art] PUB.X = C9417712C1823DF651383E2BE51758DC82A32CF7E82BBEEA0F2B3FD6EA8E8263C3EE547914780BB48598E1963E057D5D
24,789,025 UART: [art] PUB.Y = 60363D46310F9FAF273A8D53E27B645F8640244A956AFE0676D28A8E6D918ABBF1AE5AD2AC6E3846749D937649B17603
24,796,315 UART: [art] SIG.R = 78BFD327899BE7C7C48FD161F7542BE541AA2CC90502C74545883BC189015D7B6A2DAD85650CC1ACF38597CAB3A20180
24,803,699 UART: [art] SIG.S = ED421F750477D7BC0B5F1E0C169DCF5E08A0854641A9B315505F0E5B4A08DF86B3E97A763391AE686D05B2965E873F8B
25,782,721 UART: Caliptra RT
25,783,418 UART: [state] CFI Enabled
25,900,866 UART: [rt] RT listening for mailbox commands...
25,903,894 UART:
25,904,149 UART: Running Caliptra ROM ...
25,905,177 UART:
25,905,436 UART: [state] CFI Enabled
25,916,627 UART: [state] LifecycleState = Unprovisioned
25,918,476 UART: [state] DebugLocked = No
25,920,130 UART: [state] WD Timer not started. Device not locked for debugging
25,924,034 UART: [kat] SHA2-256
26,103,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,114,803 UART: [kat] ++
26,115,346 UART: [kat] sha1
26,126,181 UART: [kat] SHA2-256
26,129,242 UART: [kat] SHA2-384
26,135,166 UART: [kat] SHA2-512-ACC
26,138,117 UART: [kat] ECC-384
28,578,728 UART: [kat] HMAC-384Kdf
28,589,816 UART: [kat] LMS
29,119,315 UART: [kat] --
29,123,204 UART: [update-reset] ++
31,208,966 >>> mbox cmd response: failed
31,210,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,354,668 UART: ROM Non-Fatal Error: 0x000B001F
31,356,109 UART: [state] Locking Datavault
31,357,270 UART: [state] Locking PCR0, PCR1 and PCR31
31,358,808 UART: [state] Locking ICCM
31,359,716 UART: [exit] Launching FMC @ 0x40000130
31,361,140 UART:
31,361,301 UART: Running Caliptra FMC ...
31,362,403 UART:
31,362,559 UART: [state] CFI Enabled
31,363,476 UART: [art] Extend RT PCRs Done
31,364,617 UART: [art] Lock RT PCRs Done
31,365,603 UART: [art] Populate DV Done
31,366,630 UART: [fht] FMC Alias Private Key: 7
31,367,950 UART: [art] Derive CDI
31,368,686 UART: [art] Store in in slot 0x4
31,369,856 UART: [art] Derive Key Pair
31,370,800 UART: [art] Store priv key in slot 0x5
33,756,990 UART: [art] Derive Key Pair - Done
33,770,267 UART: [art] Signing Cert with AUTHO
33,771,581 UART: RITY.KEYID = 7
35,477,108 UART: [art] Erasing AUTHORITY.KEYID = 7
35,478,622 UART: [art] PUB.X = C9417712C1823DF651383E2BE51758DC82A32CF7E82BBEEA0F2B3FD6EA8E8263C3EE547914780BB48598E1963E057D5D
35,485,906 UART: [art] PUB.Y = 60363D46310F9FAF273A8D53E27B645F8640244A956AFE0676D28A8E6D918ABBF1AE5AD2AC6E3846749D937649B17603
35,493,145 UART: [art] SIG.R = 78BFD327899BE7C7C48FD161F7542BE541AA2CC90502C74545883BC189015D7B6A2DAD85650CC1ACF38597CAB3A20180
35,500,517 UART: [art] SIG.S = ED421F750477D7BC0B5F1E0C169DCF5E08A0854641A9B315505F0E5B4A08DF86B3E97A763391AE686D05B2965E873F8B
36,479,686 UART: Caliptra RT
36,480,399 UART: [state] CFI Enabled
36,773,050 UART: [rt] RT listening for mailbox commands...
36,775,694 UART:
36,775,953 UART: Running Caliptra ROM ...
36,777,060 UART:
36,777,276 UART: [state] CFI Enabled
40,320,721 UART: [state] LifecycleState = Unprovisioned
40,322,635 UART: [state] DebugLocked = No
40,324,787 UART: [state] WD Timer not started. Device not locked for debugging
40,329,289 UART: [kat] SHA2-256
40,508,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,519,995 UART: [kat] ++
40,520,538 UART: [kat] sha1
40,531,274 UART: [kat] SHA2-256
40,534,339 UART: [kat] SHA2-384
40,540,482 UART: [kat] SHA2-512-ACC
40,543,430 UART: [kat] ECC-384
42,988,874 UART: [kat] HMAC-384Kdf
43,001,094 UART: [kat] LMS
43,530,613 UART: [kat] --
43,534,760 UART: [update-reset] ++
46,957,275 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,960,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,344,062 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
3,699,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,959 >>> mbox cmd response: success
14,271,742 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
18,512,704 UART:
18,513,101 UART: Running Caliptra FMC ...
18,514,410 UART:
18,514,587 UART: [state] CFI Enabled
18,522,033 UART: [fht] FMC Alias Private Key: 7
20,279,583 UART: [art] Extend RT PCRs Done
20,280,806 UART: [art] Lock RT PCRs Done
20,282,486 UART: [art] Populate DV Done
20,288,015 UART: [fht] FMC Alias Private Key: 7
20,289,514 UART: [art] Derive CDI
20,290,276 UART: [art] Store in in slot 0x4
20,332,771 UART: [art] Derive Key Pair
20,333,818 UART: [art] Store priv key in slot 0x5
22,760,720 UART: [art] Derive Key Pair - Done
22,773,745 UART: [art] Signing Cert with AUTHO
22,775,053 UART: RITY.KEYID = 7
24,480,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,145 UART: [art] PUB.X = 5A58A04141926CD6C7627B6E1A2AA9E1B02D82A8F4097B4981597DEFCA04FAE9BD4C18F2F86079C2466A9FC0C021480D
24,489,375 UART: [art] PUB.Y = 98C184B95FBC9F6360BEF9B625EF12F92B0D539D1FAF751F39A09DA75FA3154CA10BA39354E72FD4BC711F6E66832CDA
24,496,676 UART: [art] SIG.R = 792974B74786CB062F55AA7836B6C37E44FC39E0CED71A8F174BAA446E2326CE0ACA064B7C89F751C1FCEFE97275DCE9
24,504,084 UART: [art] SIG.S = 2F7876B16AFDF698AAA48C473FBE2B624C0D011BA552BF2D73C149CFDAD440C2BF37834C66DC21EAE0B6077739832006
25,483,254 UART: Caliptra RT
25,483,974 UART: [state] CFI Enabled
25,600,568 UART: [rt] RT listening for mailbox commands...
30,777,853 >>> mbox cmd response: failed
30,779,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,923,345 UART:
30,923,670 UART: Running Caliptra FMC ...
30,924,739 UART:
30,924,895 UART: [state] CFI Enabled
30,925,845 UART: [art] Extend RT PCRs Done
30,926,991 UART: [art] Lock RT PCRs Done
30,928,060 UART: [art] Populate DV Done
30,929,170 UART: [fht] FMC Alias Private Key: 7
30,930,492 UART: [art] Derive CDI
30,931,227 UART: [art] Store in in slot 0x4
30,932,395 UART: [art] Derive Key Pair
30,933,336 UART: [art] Store priv key in slot 0x5
33,317,422 UART: [art] Derive Key Pair - Done
33,330,323 UART: [art] Signing Cert with AUTHO
33,331,632 UART: RITY.KEYID = 7
35,037,119 UART: [art] Erasing AUTHORITY.KEYID = 7
35,038,610 UART: [art] PUB.X = 5A58A04141926CD6C7627B6E1A2AA9E1B02D82A8F4097B4981597DEFCA04FAE9BD4C18F2F86079C2466A9FC0C021480D
35,045,886 UART: [art] PUB.Y = 98C184B95FBC9F6360BEF9B625EF12F92B0D539D1FAF751F39A09DA75FA3154CA10BA39354E72FD4BC711F6E66832CDA
35,053,167 UART: [art] SIG.R = 792974B74786CB062F55AA7836B6C37E44FC39E0CED71A8F174BAA446E2326CE0ACA064B7C89F751C1FCEFE97275DCE9
35,060,553 UART: [art] SIG.S = 2F7876B16AFDF698AAA48C473FBE2B624C0D011BA552BF2D73C149CFDAD440C2BF37834C66DC21EAE0B6077739832006
36,039,520 UART: Caliptra RT
36,040,233 UART: [state] CFI Enabled
36,326,361 UART: [rt] RT listening for mailbox commands...
47,221,383 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,250 UART:
192,620 UART: Running Caliptra ROM ...
193,722 UART:
193,865 UART: [state] CFI Enabled
260,357 UART: [state] LifecycleState = Unprovisioned
262,729 UART: [state] DebugLocked = No
264,076 UART: [state] WD Timer not started. Device not locked for debugging
268,550 UART: [kat] SHA2-256
458,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,205 UART: [kat] ++
469,657 UART: [kat] sha1
480,913 UART: [kat] SHA2-256
483,974 UART: [kat] SHA2-384
488,331 UART: [kat] SHA2-512-ACC
490,945 UART: [kat] ECC-384
2,950,063 UART: [kat] HMAC-384Kdf
2,971,098 UART: [kat] LMS
3,502,853 UART: [kat] --
3,508,530 UART: [cold-reset] ++
3,509,983 UART: [fht] FHT @ 0x50003400
3,521,505 UART: [idev] ++
3,522,178 UART: [idev] CDI.KEYID = 6
3,523,161 UART: [idev] SUBJECT.KEYID = 7
3,524,262 UART: [idev] UDS.KEYID = 0
3,526,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,028 UART: [idev] Erasing UDS.KEYID = 0
6,030,969 UART: [idev] Sha1 KeyId Algorithm
6,053,456 UART: [idev] --
6,058,427 UART: [ldev] ++
6,059,110 UART: [ldev] CDI.KEYID = 6
6,060,003 UART: [ldev] SUBJECT.KEYID = 5
6,061,221 UART: [ldev] AUTHORITY.KEYID = 7
6,062,420 UART: [ldev] FE.KEYID = 1
6,100,369 UART: [ldev] Erasing FE.KEYID = 1
8,604,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,815 UART: [ldev] --
10,415,106 UART: [fwproc] Wait for Commands...
10,417,847 UART: [fwproc] Recv command 0x46574c44
10,420,164 UART: [fwproc] Recv'd Img size: 114448 bytes
13,866,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,609,227 >>> mbox cmd response: success
14,611,773 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,737,338 UART: [afmc] ++
14,737,987 UART: [afmc] CDI.KEYID = 6
14,738,878 UART: [afmc] SUBJECT.KEYID = 7
14,739,941 UART: [afmc] AUTHORITY.KEYID = 5
17,147,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,009 UART: [afmc] --
18,948,047 UART: [cold-reset] --
18,951,320 UART: [state] Locking Datavault
18,956,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,923 UART: [state] Locking ICCM
18,960,313 UART: [exit] Launching FMC @ 0x40000130
18,969,006 UART:
18,969,255 UART: Running Caliptra FMC ...
18,970,362 UART:
18,970,520 UART: [state] CFI Enabled
19,029,075 UART: [fht] FMC Alias Private Key: 7
20,793,353 UART: [art] Extend RT PCRs Done
20,794,575 UART: [art] Lock RT PCRs Done
20,796,187 UART: [art] Populate DV Done
20,801,977 UART: [fht] FMC Alias Private Key: 7
20,803,679 UART: [art] Derive CDI
20,804,417 UART: [art] Store in in slot 0x4
20,861,916 UART: [art] Derive Key Pair
20,862,956 UART: [art] Store priv key in slot 0x5
23,326,445 UART: [art] Derive Key Pair - Done
23,339,328 UART: [art] Signing Cert with AUTHO
23,340,627 UART: RITY.KEYID = 7
25,051,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,290 UART: [art] PUB.X = 8D0ECA5CDCB7A3086CE61E13810E5519CF31F6DA4A383E0B2CA02EC282E4C2DD1DA18900EAC52665D920D5E0900D35C4
25,060,552 UART: [art] PUB.Y = FE6B5B650A36D86F555789D4965F612BAC4B351F1856D6650F043E6928AFE98E2F15FFA3065A6D0B37E49B5233964D02
25,067,780 UART: [art] SIG.R = 3F812AB8297D60B7DBD2B60B5DFFF873530F7B32999AD41C7AF00864EBB6A55036C138B037D7B93DB53E6594B5EC2149
25,075,212 UART: [art] SIG.S = 0822D8E79D2A13DBAF19F303E4F258A166801DD2C6FF972253D45A6A18590DC28B9DB933C5075A2F7125F1A7E9ACBE0F
26,053,896 UART: Caliptra RT
26,054,617 UART: [state] CFI Enabled
26,219,879 UART: [rt] RT listening for mailbox commands...
26,223,105 UART:
26,223,353 UART: Running Caliptra ROM ...
26,224,458 UART:
26,224,616 UART: [state] CFI Enabled
26,286,201 UART: [state] LifecycleState = Unprovisioned
26,288,296 UART: [state] DebugLocked = No
26,289,464 UART: [state] WD Timer not started. Device not locked for debugging
26,292,856 UART: [kat] SHA2-256
26,482,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,493,455 UART: [kat] ++
26,493,916 UART: [kat] sha1
26,505,019 UART: [kat] SHA2-256
26,508,041 UART: [kat] SHA2-384
26,515,385 UART: [kat] SHA2-512-ACC
26,517,949 UART: [kat] ECC-384
28,973,983 UART: [kat] HMAC-384Kdf
28,995,814 UART: [kat] LMS
29,527,396 UART: [kat] --
29,532,782 UART: [update-reset] ++
31,636,288 >>> mbox cmd response: failed
31,638,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,782,138 UART: ROM Non-Fatal Error: 0x000B001F
31,783,579 UART: [state] Locking Datavault
31,784,733 UART: [state] Locking PCR0, PCR1 and PCR31
31,786,290 UART: [state] Locking ICCM
31,787,196 UART: [exit] Launching FMC @ 0x40000130
31,788,625 UART:
31,788,790 UART: Running Caliptra FMC ...
31,790,115 UART:
31,790,286 UART: [state] CFI Enabled
31,791,213 UART: [art] Extend RT PCRs Done
31,792,349 UART: [art] Lock RT PCRs Done
31,793,415 UART: [art] Populate DV Done
31,794,446 UART: [fht] FMC Alias Private Key: 7
31,795,759 UART: [art] Derive CDI
31,796,496 UART: [art] Store in in slot 0x4
31,828,720 UART: [art] Derive Key Pair
31,829,721 UART: [art] Store priv key in slot 0x5
34,292,600 UART: [art] Derive Key Pair - Done
34,305,440 UART: [art] Signing Cert with AUTHO
34,306,759 UART: RITY.KEYID = 7
36,017,595 UART: [art] Erasing AUTHORITY.KEYID = 7
36,019,107 UART: [art] PUB.X = 8D0ECA5CDCB7A3086CE61E13810E5519CF31F6DA4A383E0B2CA02EC282E4C2DD1DA18900EAC52665D920D5E0900D35C4
36,026,388 UART: [art] PUB.Y = FE6B5B650A36D86F555789D4965F612BAC4B351F1856D6650F043E6928AFE98E2F15FFA3065A6D0B37E49B5233964D02
36,033,597 UART: [art] SIG.R = 3F812AB8297D60B7DBD2B60B5DFFF873530F7B32999AD41C7AF00864EBB6A55036C138B037D7B93DB53E6594B5EC2149
36,040,979 UART: [art] SIG.S = 0822D8E79D2A13DBAF19F303E4F258A166801DD2C6FF972253D45A6A18590DC28B9DB933C5075A2F7125F1A7E9ACBE0F
37,019,984 UART: Caliptra RT
37,020,686 UART: [state] CFI Enabled
37,354,915 UART: [rt] RT listening for mailbox commands...
37,357,574 UART:
37,357,775 UART: Running Caliptra ROM ...
37,358,885 UART:
37,359,045 UART: [state] CFI Enabled
37,422,881 UART: [state] LifecycleState = Unprovisioned
37,424,966 UART: [state] DebugLocked = No
37,427,026 UART: [state] WD Timer not started. Device not locked for debugging
37,430,837 UART: [kat] SHA2-256
37,620,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,631,482 UART: [kat] ++
37,631,939 UART: [kat] sha1
37,644,553 UART: [kat] SHA2-256
37,647,567 UART: [kat] SHA2-384
37,652,036 UART: [kat] SHA2-512-ACC
37,654,601 UART: [kat] ECC-384
40,106,812 UART: [kat] HMAC-384Kdf
40,130,371 UART: [kat] LMS
40,661,934 UART: [kat] --
40,666,252 UART: [update-reset] ++
44,130,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,134,549 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,742,814 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,418,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,717,511 >>> mbox cmd response: success
14,720,063 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
19,003,688 UART:
19,004,125 UART: Running Caliptra FMC ...
19,005,234 UART:
19,005,398 UART: [state] CFI Enabled
19,075,209 UART: [fht] FMC Alias Private Key: 7
20,838,293 UART: [art] Extend RT PCRs Done
20,839,516 UART: [art] Lock RT PCRs Done
20,841,307 UART: [art] Populate DV Done
20,846,878 UART: [fht] FMC Alias Private Key: 7
20,848,507 UART: [art] Derive CDI
20,849,329 UART: [art] Store in in slot 0x4
20,907,750 UART: [art] Derive Key Pair
20,908,754 UART: [art] Store priv key in slot 0x5
23,372,383 UART: [art] Derive Key Pair - Done
23,385,701 UART: [art] Signing Cert with AUTHO
23,387,010 UART: RITY.KEYID = 7
25,097,932 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,468 UART: [art] PUB.X = D25C67ED4A7470B07A136F6F58CB4BC8170E147577CA7FAB4E7940C58677FAAD42CDBF3CFECA630A685B6BC99E060175
25,106,726 UART: [art] PUB.Y = 5F8CAA7F2A2059A1F39FC0DE45E4C2C74F2E71F043DEEA6EFA68C40257242B279ADEAAC2E9C7074A4E67747B4DDC1D7E
25,114,010 UART: [art] SIG.R = CA1FB389100660CCB82D261F9D6B00703E346979F71E1AA85B3D987F8D2C851C45E37F6F78FF0791096CAA8085EC556B
25,121,361 UART: [art] SIG.S = BCA6C61B4D0A71D24DFF368D032A4A8E7EFF12709D8DD628DDB2240FF858B1A6CA83B7B1729CAEB89958277F2C8CB312
26,100,185 UART: Caliptra RT
26,100,897 UART: [state] CFI Enabled
26,267,243 UART: [rt] RT listening for mailbox commands...
31,614,774 >>> mbox cmd response: failed
31,616,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,760,486 UART:
31,760,813 UART: Running Caliptra FMC ...
31,761,882 UART:
31,762,035 UART: [state] CFI Enabled
31,762,880 UART: [art] Extend RT PCRs Done
31,764,027 UART: [art] Lock RT PCRs Done
31,765,014 UART: [art] Populate DV Done
31,766,059 UART: [fht] FMC Alias Private Key: 7
31,767,391 UART: [art] Derive CDI
31,768,130 UART: [art] Store in in slot 0x4
31,789,209 UART: [art] Derive Key Pair
31,790,206 UART: [art] Store priv key in slot 0x5
34,252,841 UART: [art] Derive Key Pair - Done
34,266,171 UART: [art] Signing Cert with AUTHO
34,267,480 UART: RITY.KEYID = 7
35,977,952 UART: [art] Erasing AUTHORITY.KEYID = 7
35,979,440 UART: [art] PUB.X = D25C67ED4A7470B07A136F6F58CB4BC8170E147577CA7FAB4E7940C58677FAAD42CDBF3CFECA630A685B6BC99E060175
35,986,705 UART: [art] PUB.Y = 5F8CAA7F2A2059A1F39FC0DE45E4C2C74F2E71F043DEEA6EFA68C40257242B279ADEAAC2E9C7074A4E67747B4DDC1D7E
35,994,016 UART: [art] SIG.R = CA1FB389100660CCB82D261F9D6B00703E346979F71E1AA85B3D987F8D2C851C45E37F6F78FF0791096CAA8085EC556B
36,001,339 UART: [art] SIG.S = BCA6C61B4D0A71D24DFF368D032A4A8E7EFF12709D8DD628DDB2240FF858B1A6CA83B7B1729CAEB89958277F2C8CB312
36,979,754 UART: Caliptra RT
36,980,463 UART: [state] CFI Enabled
37,315,174 UART: [rt] RT listening for mailbox commands...
44,968,920 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,529 UART:
192,886 UART: Running Caliptra ROM ...
193,989 UART:
603,509 UART: [state] CFI Enabled
615,472 UART: [state] LifecycleState = Unprovisioned
617,850 UART: [state] DebugLocked = No
619,153 UART: [state] WD Timer not started. Device not locked for debugging
624,004 UART: [kat] SHA2-256
813,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,680 UART: [kat] ++
825,183 UART: [kat] sha1
836,545 UART: [kat] SHA2-256
839,560 UART: [kat] SHA2-384
846,672 UART: [kat] SHA2-512-ACC
849,229 UART: [kat] ECC-384
3,292,694 UART: [kat] HMAC-384Kdf
3,306,517 UART: [kat] LMS
3,838,348 UART: [kat] --
3,842,935 UART: [cold-reset] ++
3,845,408 UART: [fht] FHT @ 0x50003400
3,857,081 UART: [idev] ++
3,857,817 UART: [idev] CDI.KEYID = 6
3,858,708 UART: [idev] SUBJECT.KEYID = 7
3,859,921 UART: [idev] UDS.KEYID = 0
3,862,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,006,261 UART: [idev] Erasing UDS.KEYID = 0
6,333,944 UART: [idev] Sha1 KeyId Algorithm
6,356,155 UART: [idev] --
6,359,559 UART: [ldev] ++
6,360,242 UART: [ldev] CDI.KEYID = 6
6,361,262 UART: [ldev] SUBJECT.KEYID = 5
6,362,364 UART: [ldev] AUTHORITY.KEYID = 7
6,363,612 UART: [ldev] FE.KEYID = 1
6,374,533 UART: [ldev] Erasing FE.KEYID = 1
8,855,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,981 UART: [ldev] --
10,647,619 UART: [fwproc] Wait for Commands...
10,650,414 UART: [fwproc] Recv command 0x46574c44
10,652,727 UART: [fwproc] Recv'd Img size: 114448 bytes
14,101,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,841,909 >>> mbox cmd response: success
14,844,211 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,970,362 UART: [afmc] ++
14,971,021 UART: [afmc] CDI.KEYID = 6
14,971,920 UART: [afmc] SUBJECT.KEYID = 7
14,972,968 UART: [afmc] AUTHORITY.KEYID = 5
17,348,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,511 UART: [afmc] --
19,146,419 UART: [cold-reset] --
19,151,314 UART: [state] Locking Datavault
19,155,205 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,388 UART: [state] Locking ICCM
19,160,323 UART: [exit] Launching FMC @ 0x40000130
19,169,002 UART:
19,169,252 UART: Running Caliptra FMC ...
19,170,355 UART:
19,170,513 UART: [state] CFI Enabled
19,178,236 UART: [fht] FMC Alias Private Key: 7
20,935,636 UART: [art] Extend RT PCRs Done
20,936,858 UART: [art] Lock RT PCRs Done
20,938,253 UART: [art] Populate DV Done
20,943,395 UART: [fht] FMC Alias Private Key: 7
20,944,983 UART: [art] Derive CDI
20,945,718 UART: [art] Store in in slot 0x4
20,988,463 UART: [art] Derive Key Pair
20,989,500 UART: [art] Store priv key in slot 0x5
23,416,351 UART: [art] Derive Key Pair - Done
23,429,661 UART: [art] Signing Cert with AUTHO
23,430,967 UART: RITY.KEYID = 7
25,136,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,334 UART: [art] PUB.X = CE5214035A85A1F65A3C1E987EC5D03AD0BCC79DEC6349DF900B6835C864AE6AD2B1ECAF007D18D887D3D75F5AF7A566
25,145,658 UART: [art] PUB.Y = 2C2DA9D089082D0BB0381A4FDC0A632700A702BC07A247AD0E3BB0F1D9F1BA1A5F34C21BDE28FB74B9147F913A02F1D5
25,152,896 UART: [art] SIG.R = C490AABC5827F36496C3D2FAE32FB58F27E82454F4F945CC0DA914645D737B183385D6FF83CA93DEE261AD1E60E63131
25,160,289 UART: [art] SIG.S = B197660ADD62A3AB15F662B402EEADCC578AFD2003C4CE788BD55D8CDE0EFB4D0495828541710EA97F514B7F411E64DC
26,139,425 UART: Caliptra RT
26,140,113 UART: [state] CFI Enabled
26,257,619 UART: [rt] RT listening for mailbox commands...
26,260,613 UART:
26,260,867 UART: Running Caliptra ROM ...
26,261,977 UART:
26,262,248 UART: [state] CFI Enabled
26,276,238 UART: [state] LifecycleState = Unprovisioned
26,278,131 UART: [state] DebugLocked = No
26,280,858 UART: [state] WD Timer not started. Device not locked for debugging
26,285,299 UART: [kat] SHA2-256
26,475,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,485,919 UART: [kat] ++
26,486,519 UART: [kat] sha1
26,499,188 UART: [kat] SHA2-256
26,502,185 UART: [kat] SHA2-384
26,508,880 UART: [kat] SHA2-512-ACC
26,511,450 UART: [kat] ECC-384
28,954,638 UART: [kat] HMAC-384Kdf
28,968,046 UART: [kat] LMS
29,499,622 UART: [kat] --
29,504,003 UART: [update-reset] ++
31,607,152 >>> mbox cmd response: failed
31,608,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,752,619 UART: ROM Non-Fatal Error: 0x000B001F
31,754,050 UART: [state] Locking Datavault
31,755,154 UART: [state] Locking PCR0, PCR1 and PCR31
31,756,720 UART: [state] Locking ICCM
31,757,628 UART: [exit] Launching FMC @ 0x40000130
31,759,061 UART:
31,759,229 UART: Running Caliptra FMC ...
31,760,331 UART:
31,760,488 UART: [state] CFI Enabled
31,761,414 UART: [art] Extend RT PCRs Done
31,762,497 UART: [art] Lock RT PCRs Done
31,763,562 UART: [art] Populate DV Done
31,764,534 UART: [fht] FMC Alias Private Key: 7
31,765,854 UART: [art] Derive CDI
31,766,582 UART: [art] Store in in slot 0x4
31,767,670 UART: [art] Derive Key Pair
31,768,657 UART: [art] Store priv key in slot 0x5
34,154,375 UART: [art] Derive Key Pair - Done
34,167,535 UART: [art] Signing Cert with AUTHO
34,168,854 UART: RITY.KEYID = 7
35,874,788 UART: [art] Erasing AUTHORITY.KEYID = 7
35,876,298 UART: [art] PUB.X = CE5214035A85A1F65A3C1E987EC5D03AD0BCC79DEC6349DF900B6835C864AE6AD2B1ECAF007D18D887D3D75F5AF7A566
35,883,593 UART: [art] PUB.Y = 2C2DA9D089082D0BB0381A4FDC0A632700A702BC07A247AD0E3BB0F1D9F1BA1A5F34C21BDE28FB74B9147F913A02F1D5
35,890,834 UART: [art] SIG.R = C490AABC5827F36496C3D2FAE32FB58F27E82454F4F945CC0DA914645D737B183385D6FF83CA93DEE261AD1E60E63131
35,898,210 UART: [art] SIG.S = B197660ADD62A3AB15F662B402EEADCC578AFD2003C4CE788BD55D8CDE0EFB4D0495828541710EA97F514B7F411E64DC
36,877,404 UART: Caliptra RT
36,878,105 UART: [state] CFI Enabled
37,170,678 UART: [rt] RT listening for mailbox commands...
37,173,420 UART:
37,173,586 UART: Running Caliptra ROM ...
37,174,700 UART:
37,175,023 UART: [state] CFI Enabled
40,323,120 UART: [state] LifecycleState = Unprovisioned
40,325,096 UART: [state] DebugLocked = No
40,327,921 UART: [state] WD Timer not started. Device not locked for debugging
40,332,824 UART: [kat] SHA2-256
40,522,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,533,481 UART: [kat] ++
40,533,962 UART: [kat] sha1
40,544,475 UART: [kat] SHA2-256
40,547,490 UART: [kat] SHA2-384
40,553,741 UART: [kat] SHA2-512-ACC
40,556,301 UART: [kat] ECC-384
43,002,040 UART: [kat] HMAC-384Kdf
43,015,186 UART: [kat] LMS
43,546,842 UART: [kat] --
43,550,402 UART: [update-reset] ++
47,011,643 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,015,018 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,623,272 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,754,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,964,213 >>> mbox cmd response: success
14,966,737 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
19,220,886 UART:
19,221,270 UART: Running Caliptra FMC ...
19,222,377 UART:
19,222,530 UART: [state] CFI Enabled
19,230,270 UART: [fht] FMC Alias Private Key: 7
20,987,422 UART: [art] Extend RT PCRs Done
20,988,645 UART: [art] Lock RT PCRs Done
20,990,026 UART: [art] Populate DV Done
20,995,493 UART: [fht] FMC Alias Private Key: 7
20,997,082 UART: [art] Derive CDI
20,997,821 UART: [art] Store in in slot 0x4
21,040,146 UART: [art] Derive Key Pair
21,041,191 UART: [art] Store priv key in slot 0x5
23,467,331 UART: [art] Derive Key Pair - Done
23,480,435 UART: [art] Signing Cert with AUTHO
23,481,735 UART: RITY.KEYID = 7
25,187,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,089 UART: [art] PUB.X = 99526F8DA91E9CCE9F06894C9A007FA108AE262C93FBA9F77A3629C948F1FC4538FFC70EAD0D006BCF6CF0F11F0E10F6
25,196,298 UART: [art] PUB.Y = F721F520BD8D4C807CF4C6E95C337103E77AE654880142EFB8298A1645A4392BE2DB1F4AE0A4B96CBA0C06549CA64806
25,203,559 UART: [art] SIG.R = 422E2B1B00D945FB29F8A9CCBD1ED2C5B3795E1680C0BA709CFA66B113DE083CB209B449DB060809263CDEDBB60E8825
25,210,969 UART: [art] SIG.S = E7215C6F3DB40DD61B2283814AEA1C1A24C3C1646F6FE59C1FF5DBAF544D71DB802953EE46A7C2CA0428BF69191606AE
26,189,579 UART: Caliptra RT
26,190,298 UART: [state] CFI Enabled
26,307,863 UART: [rt] RT listening for mailbox commands...
31,560,563 >>> mbox cmd response: failed
31,562,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,706,054 UART:
31,706,370 UART: Running Caliptra FMC ...
31,707,438 UART:
31,707,595 UART: [state] CFI Enabled
31,708,523 UART: [art] Extend RT PCRs Done
31,709,664 UART: [art] Lock RT PCRs Done
31,710,729 UART: [art] Populate DV Done
31,711,822 UART: [fht] FMC Alias Private Key: 7
31,713,143 UART: [art] Derive CDI
31,713,879 UART: [art] Store in in slot 0x4
31,715,047 UART: [art] Derive Key Pair
31,716,011 UART: [art] Store priv key in slot 0x5
34,100,811 UART: [art] Derive Key Pair - Done
34,113,927 UART: [art] Signing Cert with AUTHO
34,115,232 UART: RITY.KEYID = 7
35,821,060 UART: [art] Erasing AUTHORITY.KEYID = 7
35,822,571 UART: [art] PUB.X = 99526F8DA91E9CCE9F06894C9A007FA108AE262C93FBA9F77A3629C948F1FC4538FFC70EAD0D006BCF6CF0F11F0E10F6
35,829,830 UART: [art] PUB.Y = F721F520BD8D4C807CF4C6E95C337103E77AE654880142EFB8298A1645A4392BE2DB1F4AE0A4B96CBA0C06549CA64806
35,837,069 UART: [art] SIG.R = 422E2B1B00D945FB29F8A9CCBD1ED2C5B3795E1680C0BA709CFA66B113DE083CB209B449DB060809263CDEDBB60E8825
35,844,479 UART: [art] SIG.S = E7215C6F3DB40DD61B2283814AEA1C1A24C3C1646F6FE59C1FF5DBAF544D71DB802953EE46A7C2CA0428BF69191606AE
36,823,342 UART: Caliptra RT
36,824,049 UART: [state] CFI Enabled
37,110,819 UART: [rt] RT listening for mailbox commands...
47,909,477 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,948 UART: [kat] SHA2-512-ACC
896,849 UART: [kat] ECC-384
902,682 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,476,995 UART: [fht] Storing FHT @ 0x50003400
1,479,932 UART: [idev] ++
1,480,100 UART: [idev] CDI.KEYID = 6
1,480,460 UART: [idev] SUBJECT.KEYID = 7
1,480,884 UART: [idev] UDS.KEYID = 0
1,481,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,034 UART: [idev] Erasing UDS.KEYID = 0
1,505,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,388 UART: [idev] --
1,515,629 UART: [ldev] ++
1,515,797 UART: [ldev] CDI.KEYID = 6
1,516,160 UART: [ldev] SUBJECT.KEYID = 5
1,516,586 UART: [ldev] AUTHORITY.KEYID = 7
1,517,049 UART: [ldev] FE.KEYID = 1
1,522,173 UART: [ldev] Erasing FE.KEYID = 1
1,547,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,590 UART: [ldev] --
1,587,061 UART: [fwproc] Waiting for Commands...
1,587,886 UART: [fwproc] Received command 0x46574c44
1,588,677 UART: [fwproc] Received Image of size 114448 bytes
2,887,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,422 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,753 >>> mbox cmd response: success
3,080,753 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
3,081,853 UART: [afmc] ++
3,082,021 UART: [afmc] CDI.KEYID = 6
3,082,383 UART: [afmc] SUBJECT.KEYID = 7
3,082,808 UART: [afmc] AUTHORITY.KEYID = 5
3,117,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,623 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,508 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,198 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,985 UART: [afmc] --
3,161,117 UART: [cold-reset] --
3,161,729 UART: [state] Locking Datavault
3,162,944 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,548 UART: [state] Locking ICCM
3,164,078 UART: [exit] Launching FMC @ 0x40000130
3,169,407 UART:
3,169,423 UART: Running Caliptra FMC ...
3,169,831 UART:
3,169,885 UART: [state] CFI Enabled
3,180,158 UART: [fht] FMC Alias Private Key: 7
3,287,869 UART: [art] Extend RT PCRs Done
3,288,297 UART: [art] Lock RT PCRs Done
3,289,761 UART: [art] Populate DV Done
3,297,682 UART: [fht] FMC Alias Private Key: 7
3,298,784 UART: [art] Derive CDI
3,299,064 UART: [art] Store in in slot 0x4
3,384,939 UART: [art] Derive Key Pair
3,385,299 UART: [art] Store priv key in slot 0x5
3,398,393 UART: [art] Derive Key Pair - Done
3,413,014 UART: [art] Signing Cert with AUTHO
3,413,494 UART: RITY.KEYID = 7
3,428,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,475 UART: [art] PUB.X = 0C82B182A18FA2742B11DA38ABBA9CD566721C59637F9C96350B3C31B1F5B16F30020C68B5195FEF2C7D8F07E3E571E0
3,436,236 UART: [art] PUB.Y = 3BD5B9AA38F4646BE6D365474AB1DF9239D2B553C4ABA45EE422315F561B4BEF40D3A44B4D3778296725BBBDB8DE58FE
3,443,202 UART: [art] SIG.R = F52EB0DA9DD56DAC164872EE21DA2383B3C75623DB8A452E786C7F210BE9E827C430D152727687ED90250035D9AEA05C
3,449,953 UART: [art] SIG.S = BB76F9AFD9C524DD6ECA8068BCC1D09A47FF18A10CE88E6A4E00A74DF968B0DA32F93A2D9C5B73E1E77F4DB05D17F20B
3,474,456 UART: Caliptra RT
3,474,709 UART: [state] CFI Enabled
3,582,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,504 UART:
3,584,520 UART: Running Caliptra ROM ...
3,584,928 UART:
3,584,982 UART: [state] CFI Enabled
3,587,364 UART: [state] LifecycleState = Unprovisioned
3,588,019 UART: [state] DebugLocked = No
3,588,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,088 UART: [kat] SHA2-256
4,384,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,134 UART: [kat] ++
4,388,286 UART: [kat] sha1
4,392,502 UART: [kat] SHA2-256
4,394,440 UART: [kat] SHA2-384
4,397,051 UART: [kat] SHA2-512-ACC
4,398,951 UART: [kat] ECC-384
4,404,548 UART: [kat] HMAC-384Kdf
4,409,074 UART: [kat] LMS
4,977,270 UART: [kat] --
4,978,123 UART: [update-reset] ++
5,090,806 >>> mbox cmd response: failed
5,090,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,091,218 UART: ROM Non-Fatal Error: 0x000B001F
5,092,228 UART: [state] Locking Datavault
5,093,148 UART: [state] Locking PCR0, PCR1 and PCR31
5,093,752 UART: [state] Locking ICCM
5,094,396 UART: [exit] Launching FMC @ 0x40000130
5,099,725 UART:
5,099,741 UART: Running Caliptra FMC ...
5,100,149 UART:
5,100,203 UART: [state] CFI Enabled
5,189,472 UART: [art] Extend RT PCRs Done
5,189,900 UART: [art] Lock RT PCRs Done
5,191,335 UART: [art] Populate DV Done
5,199,424 UART: [fht] FMC Alias Private Key: 7
5,200,468 UART: [art] Derive CDI
5,200,748 UART: [art] Store in in slot 0x4
5,286,241 UART: [art] Derive Key Pair
5,286,601 UART: [art] Store priv key in slot 0x5
5,300,483 UART: [art] Derive Key Pair - Done
5,315,164 UART: [art] Signing Cert with AUTHO
5,315,644 UART: RITY.KEYID = 7
5,330,746 UART: [art] Erasing AUTHORITY.KEYID = 7
5,331,511 UART: [art] PUB.X = 0C82B182A18FA2742B11DA38ABBA9CD566721C59637F9C96350B3C31B1F5B16F30020C68B5195FEF2C7D8F07E3E571E0
5,338,272 UART: [art] PUB.Y = 3BD5B9AA38F4646BE6D365474AB1DF9239D2B553C4ABA45EE422315F561B4BEF40D3A44B4D3778296725BBBDB8DE58FE
5,345,238 UART: [art] SIG.R = F52EB0DA9DD56DAC164872EE21DA2383B3C75623DB8A452E786C7F210BE9E827C430D152727687ED90250035D9AEA05C
5,351,989 UART: [art] SIG.S = BB76F9AFD9C524DD6ECA8068BCC1D09A47FF18A10CE88E6A4E00A74DF968B0DA32F93A2D9C5B73E1E77F4DB05D17F20B
5,376,226 UART: Caliptra RT
5,376,479 UART: [state] CFI Enabled
5,656,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,657,865 UART:
5,657,881 UART: Running Caliptra ROM ...
5,658,289 UART:
5,658,343 UART: [state] CFI Enabled
5,661,029 UART: [state] LifecycleState = Unprovisioned
5,661,684 UART: [state] DebugLocked = No
5,662,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,663,963 UART: [kat] SHA2-256
6,457,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,462,009 UART: [kat] ++
6,462,161 UART: [kat] sha1
6,466,343 UART: [kat] SHA2-256
6,468,281 UART: [kat] SHA2-384
6,471,006 UART: [kat] SHA2-512-ACC
6,472,906 UART: [kat] ECC-384
6,478,655 UART: [kat] HMAC-384Kdf
6,483,199 UART: [kat] LMS
7,051,395 UART: [kat] --
7,052,496 UART: [update-reset] ++
8,388,107 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,389,287 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,539,337 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,087 >>> mbox cmd response: success
2,927,087 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,988,529 UART:
2,988,545 UART: Running Caliptra FMC ...
2,988,953 UART:
2,989,007 UART: [state] CFI Enabled
2,999,276 UART: [fht] FMC Alias Private Key: 7
3,107,117 UART: [art] Extend RT PCRs Done
3,107,545 UART: [art] Lock RT PCRs Done
3,109,391 UART: [art] Populate DV Done
3,117,610 UART: [fht] FMC Alias Private Key: 7
3,118,690 UART: [art] Derive CDI
3,118,970 UART: [art] Store in in slot 0x4
3,204,839 UART: [art] Derive Key Pair
3,205,199 UART: [art] Store priv key in slot 0x5
3,218,363 UART: [art] Derive Key Pair - Done
3,232,739 UART: [art] Signing Cert with AUTHO
3,233,219 UART: RITY.KEYID = 7
3,248,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,312 UART: [art] PUB.X = C70F952108328AB973A671F868E0BB3A6809B8ACC8E17E3070C5435A386D3247E3243B1424EBB770D3AE5C4F07465A4B
3,256,070 UART: [art] PUB.Y = 8481A3A5B641F7E9258F95647135BE5F731B20AF03EF7EF846D2C308ED46D12FBF43DF91B078FE89C0B2D7898E30B744
3,263,020 UART: [art] SIG.R = E58672FC16D7B5B98437B01B8E3C5D73810C762936B3200870F00441458C668A2D54E07F9C7455D8971859E0A9265A60
3,269,767 UART: [art] SIG.S = 95F886DFCE680BD261A8A775B251F8ACED38C605656230EBAADF792DCFED89321FD692331B350EBD1B1DB9CCC7B8141E
3,293,361 UART: Caliptra RT
3,293,614 UART: [state] CFI Enabled
3,401,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,793,348 >>> mbox cmd response: failed
4,793,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,799,199 UART:
4,799,215 UART: Running Caliptra FMC ...
4,799,623 UART:
4,799,677 UART: [state] CFI Enabled
4,888,136 UART: [art] Extend RT PCRs Done
4,888,564 UART: [art] Lock RT PCRs Done
4,889,705 UART: [art] Populate DV Done
4,897,974 UART: [fht] FMC Alias Private Key: 7
4,898,942 UART: [art] Derive CDI
4,899,222 UART: [art] Store in in slot 0x4
4,984,849 UART: [art] Derive Key Pair
4,985,209 UART: [art] Store priv key in slot 0x5
4,998,687 UART: [art] Derive Key Pair - Done
5,013,313 UART: [art] Signing Cert with AUTHO
5,013,793 UART: RITY.KEYID = 7
5,028,451 UART: [art] Erasing AUTHORITY.KEYID = 7
5,029,216 UART: [art] PUB.X = C70F952108328AB973A671F868E0BB3A6809B8ACC8E17E3070C5435A386D3247E3243B1424EBB770D3AE5C4F07465A4B
5,035,974 UART: [art] PUB.Y = 8481A3A5B641F7E9258F95647135BE5F731B20AF03EF7EF846D2C308ED46D12FBF43DF91B078FE89C0B2D7898E30B744
5,042,924 UART: [art] SIG.R = E58672FC16D7B5B98437B01B8E3C5D73810C762936B3200870F00441458C668A2D54E07F9C7455D8971859E0A9265A60
5,049,671 UART: [art] SIG.S = 95F886DFCE680BD261A8A775B251F8ACED38C605656230EBAADF792DCFED89321FD692331B350EBD1B1DB9CCC7B8141E
5,073,375 UART: Caliptra RT
5,073,628 UART: [state] CFI Enabled
5,357,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,122,164 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,477,138 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,739 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,413 UART: [idev] --
1,515,674 UART: [ldev] ++
1,515,842 UART: [ldev] CDI.KEYID = 6
1,516,205 UART: [ldev] SUBJECT.KEYID = 5
1,516,631 UART: [ldev] AUTHORITY.KEYID = 7
1,517,094 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,803 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,907 UART: [fwproc] Received command 0x46574c44
1,588,698 UART: [fwproc] Received Image of size 114448 bytes
2,887,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,266 >>> mbox cmd response: success
3,080,266 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
3,081,308 UART: [afmc] ++
3,081,476 UART: [afmc] CDI.KEYID = 6
3,081,838 UART: [afmc] SUBJECT.KEYID = 7
3,082,263 UART: [afmc] AUTHORITY.KEYID = 5
3,117,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,985 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,675 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,426 UART: [afmc] --
3,160,450 UART: [cold-reset] --
3,161,386 UART: [state] Locking Datavault
3,162,601 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,205 UART: [state] Locking ICCM
3,163,737 UART: [exit] Launching FMC @ 0x40000130
3,169,066 UART:
3,169,082 UART: Running Caliptra FMC ...
3,169,490 UART:
3,169,633 UART: [state] CFI Enabled
3,180,384 UART: [fht] FMC Alias Private Key: 7
3,289,089 UART: [art] Extend RT PCRs Done
3,289,517 UART: [art] Lock RT PCRs Done
3,290,879 UART: [art] Populate DV Done
3,299,254 UART: [fht] FMC Alias Private Key: 7
3,300,266 UART: [art] Derive CDI
3,300,546 UART: [art] Store in in slot 0x4
3,386,427 UART: [art] Derive Key Pair
3,386,787 UART: [art] Store priv key in slot 0x5
3,399,899 UART: [art] Derive Key Pair - Done
3,414,346 UART: [art] Signing Cert with AUTHO
3,414,826 UART: RITY.KEYID = 7
3,429,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,457 UART: [art] PUB.X = 1B748EF6CC510DA41D4432E5F7A2900D87F0E3197E489548503E0E3025BCABC9418F83AAD74E27A370626F3238482B3C
3,437,218 UART: [art] PUB.Y = F679A9093F46D0005925FC811CC2B3D0897BD6202A32DAFC3921BB92254D9F4F6D62B824ADBA4F73229DF3D1891C93CF
3,444,151 UART: [art] SIG.R = 8C1AC0625149EA6A9A480C570C1C20C5DF35E90FBF655C9B531A534A0A6DE2074C5CC3C0304066D89F86CC45B755FE69
3,450,914 UART: [art] SIG.S = 2B1D6DD53BCD2B0B314972B7428E471997F407A516A61A599FB8E72BD0938FC8A09BFC96DA44969420B70806C878AE7F
3,474,599 UART: Caliptra RT
3,474,944 UART: [state] CFI Enabled
3,583,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,920 UART:
3,585,936 UART: Running Caliptra ROM ...
3,586,344 UART:
3,586,485 UART: [state] CFI Enabled
3,589,509 UART: [state] LifecycleState = Unprovisioned
3,590,164 UART: [state] DebugLocked = No
3,590,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,592,313 UART: [kat] SHA2-256
4,386,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,359 UART: [kat] ++
4,390,511 UART: [kat] sha1
4,394,617 UART: [kat] SHA2-256
4,396,555 UART: [kat] SHA2-384
4,399,382 UART: [kat] SHA2-512-ACC
4,401,282 UART: [kat] ECC-384
4,406,721 UART: [kat] HMAC-384Kdf
4,411,335 UART: [kat] LMS
4,979,531 UART: [kat] --
4,980,604 UART: [update-reset] ++
5,092,405 >>> mbox cmd response: failed
5,092,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,093,019 UART: ROM Non-Fatal Error: 0x000B001F
5,093,777 UART: [state] Locking Datavault
5,094,559 UART: [state] Locking PCR0, PCR1 and PCR31
5,095,163 UART: [state] Locking ICCM
5,095,757 UART: [exit] Launching FMC @ 0x40000130
5,101,086 UART:
5,101,102 UART: Running Caliptra FMC ...
5,101,510 UART:
5,101,653 UART: [state] CFI Enabled
5,191,142 UART: [art] Extend RT PCRs Done
5,191,570 UART: [art] Lock RT PCRs Done
5,192,665 UART: [art] Populate DV Done
5,200,782 UART: [fht] FMC Alias Private Key: 7
5,201,846 UART: [art] Derive CDI
5,202,126 UART: [art] Store in in slot 0x4
5,288,073 UART: [art] Derive Key Pair
5,288,433 UART: [art] Store priv key in slot 0x5
5,302,197 UART: [art] Derive Key Pair - Done
5,317,088 UART: [art] Signing Cert with AUTHO
5,317,568 UART: RITY.KEYID = 7
5,332,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,333,501 UART: [art] PUB.X = 1B748EF6CC510DA41D4432E5F7A2900D87F0E3197E489548503E0E3025BCABC9418F83AAD74E27A370626F3238482B3C
5,340,262 UART: [art] PUB.Y = F679A9093F46D0005925FC811CC2B3D0897BD6202A32DAFC3921BB92254D9F4F6D62B824ADBA4F73229DF3D1891C93CF
5,347,195 UART: [art] SIG.R = 8C1AC0625149EA6A9A480C570C1C20C5DF35E90FBF655C9B531A534A0A6DE2074C5CC3C0304066D89F86CC45B755FE69
5,353,958 UART: [art] SIG.S = 2B1D6DD53BCD2B0B314972B7428E471997F407A516A61A599FB8E72BD0938FC8A09BFC96DA44969420B70806C878AE7F
5,377,469 UART: Caliptra RT
5,377,814 UART: [state] CFI Enabled
5,657,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,659,769 UART:
5,659,785 UART: Running Caliptra ROM ...
5,660,193 UART:
5,660,334 UART: [state] CFI Enabled
5,663,230 UART: [state] LifecycleState = Unprovisioned
5,663,885 UART: [state] DebugLocked = No
5,664,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,665,958 UART: [kat] SHA2-256
6,459,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,464,004 UART: [kat] ++
6,464,156 UART: [kat] sha1
6,468,494 UART: [kat] SHA2-256
6,470,432 UART: [kat] SHA2-384
6,473,307 UART: [kat] SHA2-512-ACC
6,475,207 UART: [kat] ECC-384
6,480,618 UART: [kat] HMAC-384Kdf
6,485,052 UART: [kat] LMS
7,053,248 UART: [kat] --
7,054,121 UART: [update-reset] ++
8,389,408 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,390,530 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,540,580 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,440 >>> mbox cmd response: success
2,928,440 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,989,784 UART:
2,989,800 UART: Running Caliptra FMC ...
2,990,208 UART:
2,990,351 UART: [state] CFI Enabled
3,001,178 UART: [fht] FMC Alias Private Key: 7
3,109,513 UART: [art] Extend RT PCRs Done
3,109,941 UART: [art] Lock RT PCRs Done
3,111,337 UART: [art] Populate DV Done
3,119,326 UART: [fht] FMC Alias Private Key: 7
3,120,360 UART: [art] Derive CDI
3,120,640 UART: [art] Store in in slot 0x4
3,206,365 UART: [art] Derive Key Pair
3,206,725 UART: [art] Store priv key in slot 0x5
3,220,057 UART: [art] Derive Key Pair - Done
3,234,994 UART: [art] Signing Cert with AUTHO
3,235,474 UART: RITY.KEYID = 7
3,251,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,837 UART: [art] PUB.X = 7F7CEEA78F37E4FFD9AD615AC70C25909A498FEC56C4AEA9ED18093C5957E524CE3B4D6852F4887DD2A11B68940CE05C
3,258,614 UART: [art] PUB.Y = 4D385463760CDC6AE55CAD091656EB7208D10F5C33551AEC53F55433B41C7DB6FF8F1D71EC35ED697B70AF0B99E159CC
3,265,561 UART: [art] SIG.R = EB84E6BB273A687CAEEC5D3B3778AB8143DB2BA4A00CD80F31EE61C572D0161BC78EC54B92238B72723C565ED3BC3F40
3,272,341 UART: [art] SIG.S = 27ABEA3EBDE4DA35B0D014335BD06A479ED68D1DE3FADD51D56C6DDB79407AE8F9B5C8EDC7CEDE9C613C6B011EF5B934
3,296,243 UART: Caliptra RT
3,296,588 UART: [state] CFI Enabled
3,405,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,796,548 >>> mbox cmd response: failed
4,796,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,802,295 UART:
4,802,311 UART: Running Caliptra FMC ...
4,802,719 UART:
4,802,862 UART: [state] CFI Enabled
4,892,295 UART: [art] Extend RT PCRs Done
4,892,723 UART: [art] Lock RT PCRs Done
4,893,756 UART: [art] Populate DV Done
4,901,955 UART: [fht] FMC Alias Private Key: 7
4,903,075 UART: [art] Derive CDI
4,903,355 UART: [art] Store in in slot 0x4
4,989,466 UART: [art] Derive Key Pair
4,989,826 UART: [art] Store priv key in slot 0x5
5,003,380 UART: [art] Derive Key Pair - Done
5,018,175 UART: [art] Signing Cert with AUTHO
5,018,655 UART: RITY.KEYID = 7
5,033,923 UART: [art] Erasing AUTHORITY.KEYID = 7
5,034,688 UART: [art] PUB.X = 7F7CEEA78F37E4FFD9AD615AC70C25909A498FEC56C4AEA9ED18093C5957E524CE3B4D6852F4887DD2A11B68940CE05C
5,041,465 UART: [art] PUB.Y = 4D385463760CDC6AE55CAD091656EB7208D10F5C33551AEC53F55433B41C7DB6FF8F1D71EC35ED697B70AF0B99E159CC
5,048,412 UART: [art] SIG.R = EB84E6BB273A687CAEEC5D3B3778AB8143DB2BA4A00CD80F31EE61C572D0161BC78EC54B92238B72723C565ED3BC3F40
5,055,192 UART: [art] SIG.S = 27ABEA3EBDE4DA35B0D014335BD06A479ED68D1DE3FADD51D56C6DDB79407AE8F9B5C8EDC7CEDE9C613C6B011EF5B934
5,079,290 UART: Caliptra RT
5,079,635 UART: [state] CFI Enabled
5,363,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,128,745 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
893,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,295 UART: [kat] ++
897,447 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
918,282 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,393 UART: [cold-reset] ++
1,172,923 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,238 UART: [idev] Erasing UDS.KEYID = 0
1,201,183 UART: [idev] Sha1 KeyId Algorithm
1,209,697 UART: [idev] --
1,210,649 UART: [ldev] ++
1,210,817 UART: [ldev] CDI.KEYID = 6
1,211,180 UART: [ldev] SUBJECT.KEYID = 5
1,211,606 UART: [ldev] AUTHORITY.KEYID = 7
1,212,069 UART: [ldev] FE.KEYID = 1
1,217,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,465 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,354 UART: [fwproc] Recv command 0x46574c44
1,284,082 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,938 >>> mbox cmd response: success
2,775,938 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,777,058 UART: [afmc] ++
2,777,226 UART: [afmc] CDI.KEYID = 6
2,777,588 UART: [afmc] SUBJECT.KEYID = 7
2,778,013 UART: [afmc] AUTHORITY.KEYID = 5
2,812,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,300 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,881 UART: [afmc] --
2,855,937 UART: [cold-reset] --
2,856,625 UART: [state] Locking Datavault
2,857,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,184 UART: [state] Locking ICCM
2,858,736 UART: [exit] Launching FMC @ 0x40000130
2,864,065 UART:
2,864,081 UART: Running Caliptra FMC ...
2,864,489 UART:
2,864,543 UART: [state] CFI Enabled
2,875,460 UART: [fht] FMC Alias Private Key: 7
2,983,647 UART: [art] Extend RT PCRs Done
2,984,075 UART: [art] Lock RT PCRs Done
2,985,441 UART: [art] Populate DV Done
2,993,622 UART: [fht] FMC Alias Private Key: 7
2,994,714 UART: [art] Derive CDI
2,994,994 UART: [art] Store in in slot 0x4
3,080,507 UART: [art] Derive Key Pair
3,080,867 UART: [art] Store priv key in slot 0x5
3,094,233 UART: [art] Derive Key Pair - Done
3,108,883 UART: [art] Signing Cert with AUTHO
3,109,363 UART: RITY.KEYID = 7
3,124,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,876 UART: [art] PUB.X = 81707DAD5878C76480C7A00A1D455465AADDE78AE8E1A08B9FB4ED01C22A725FC573DD6FB4835378A06D0C7098F224AA
3,131,647 UART: [art] PUB.Y = 739E3DBECBB7D2BB9B6D330531C05347AC8357CCF6EEF06308430788694FCFF2F0A750F1ABF55D2E2236180962B7536C
3,138,593 UART: [art] SIG.R = A1DD257D450B57332E2B07359026A2A996507A99F1F90B5E4B232E4ADD7A03A378880F7C311F61003DF8C08C24368E6F
3,145,324 UART: [art] SIG.S = E74B38E36053DA291C68BC1B19DC5D84CCCF3AB3896F3C45796821772D8AFAD8507E0DC84F2553F7F2FFB90EB1FEBC09
3,169,346 UART: Caliptra RT
3,169,599 UART: [state] CFI Enabled
3,277,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,109 UART:
3,279,125 UART: Running Caliptra ROM ...
3,279,533 UART:
3,279,588 UART: [state] CFI Enabled
3,281,774 UART: [state] LifecycleState = Unprovisioned
3,282,429 UART: [state] DebugLocked = No
3,283,149 UART: [state] WD Timer not started. Device not locked for debugging
3,284,291 UART: [kat] SHA2-256
4,089,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,066 UART: [kat] ++
4,094,218 UART: [kat] sha1
4,098,226 UART: [kat] SHA2-256
4,100,166 UART: [kat] SHA2-384
4,102,911 UART: [kat] SHA2-512-ACC
4,104,811 UART: [kat] ECC-384
4,114,420 UART: [kat] HMAC-384Kdf
4,119,188 UART: [kat] LMS
4,367,516 UART: [kat] --
4,368,528 UART: [update-reset] ++
4,458,465 >>> mbox cmd response: failed
4,458,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,459,041 UART: ROM Non-Fatal Error: 0x000B001F
4,459,999 UART: [state] Locking Datavault
4,460,855 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,459 UART: [state] Locking ICCM
4,461,943 UART: [exit] Launching FMC @ 0x40000130
4,467,272 UART:
4,467,288 UART: Running Caliptra FMC ...
4,467,696 UART:
4,467,750 UART: [state] CFI Enabled
4,557,005 UART: [art] Extend RT PCRs Done
4,557,433 UART: [art] Lock RT PCRs Done
4,558,672 UART: [art] Populate DV Done
4,566,807 UART: [fht] FMC Alias Private Key: 7
4,567,845 UART: [art] Derive CDI
4,568,125 UART: [art] Store in in slot 0x4
4,654,058 UART: [art] Derive Key Pair
4,654,418 UART: [art] Store priv key in slot 0x5
4,667,208 UART: [art] Derive Key Pair - Done
4,682,478 UART: [art] Signing Cert with AUTHO
4,682,958 UART: RITY.KEYID = 7
4,697,732 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,497 UART: [art] PUB.X = 81707DAD5878C76480C7A00A1D455465AADDE78AE8E1A08B9FB4ED01C22A725FC573DD6FB4835378A06D0C7098F224AA
4,705,268 UART: [art] PUB.Y = 739E3DBECBB7D2BB9B6D330531C05347AC8357CCF6EEF06308430788694FCFF2F0A750F1ABF55D2E2236180962B7536C
4,712,214 UART: [art] SIG.R = A1DD257D450B57332E2B07359026A2A996507A99F1F90B5E4B232E4ADD7A03A378880F7C311F61003DF8C08C24368E6F
4,718,945 UART: [art] SIG.S = E74B38E36053DA291C68BC1B19DC5D84CCCF3AB3896F3C45796821772D8AFAD8507E0DC84F2553F7F2FFB90EB1FEBC09
4,742,867 UART: Caliptra RT
4,743,120 UART: [state] CFI Enabled
5,026,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,027,725 UART:
5,027,741 UART: Running Caliptra ROM ...
5,028,149 UART:
5,028,204 UART: [state] CFI Enabled
5,030,584 UART: [state] LifecycleState = Unprovisioned
5,031,239 UART: [state] DebugLocked = No
5,031,773 UART: [state] WD Timer not started. Device not locked for debugging
5,033,129 UART: [kat] SHA2-256
5,838,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,842,904 UART: [kat] ++
5,843,056 UART: [kat] sha1
5,847,234 UART: [kat] SHA2-256
5,849,174 UART: [kat] SHA2-384
5,851,881 UART: [kat] SHA2-512-ACC
5,853,781 UART: [kat] ECC-384
5,863,240 UART: [kat] HMAC-384Kdf
5,867,836 UART: [kat] LMS
6,116,164 UART: [kat] --
6,116,966 UART: [update-reset] ++
7,430,699 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,431,904 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,581,902 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,317 >>> mbox cmd response: success
2,627,317 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,689,911 UART:
2,689,927 UART: Running Caliptra FMC ...
2,690,335 UART:
2,690,389 UART: [state] CFI Enabled
2,700,410 UART: [fht] FMC Alias Private Key: 7
2,808,201 UART: [art] Extend RT PCRs Done
2,808,629 UART: [art] Lock RT PCRs Done
2,810,083 UART: [art] Populate DV Done
2,818,232 UART: [fht] FMC Alias Private Key: 7
2,819,302 UART: [art] Derive CDI
2,819,582 UART: [art] Store in in slot 0x4
2,904,999 UART: [art] Derive Key Pair
2,905,359 UART: [art] Store priv key in slot 0x5
2,918,497 UART: [art] Derive Key Pair - Done
2,933,248 UART: [art] Signing Cert with AUTHO
2,933,728 UART: RITY.KEYID = 7
2,948,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,591 UART: [art] PUB.X = 0DA174E20D17135D97750C0AA16736E32D393C8A11F48A5A7D822A1B7A205CBD5A566CD6AE448902DB27E94B742CBEB2
2,956,354 UART: [art] PUB.Y = 0DB3F8CDDBD1FF4492FA8B57D323354A4F8246998E09A94AC2E201BFE5F687B7A79EB4D92E50F80BCD0A167BB4553B50
2,963,305 UART: [art] SIG.R = 6C4B32389AD3662394FD421C453D45E14C4D7B8B1CEB376F09C0D4B2ADADBE8BBD5DDE3ED393ADDDD72B4DFD761F9616
2,970,098 UART: [art] SIG.S = D49A7C0C766B6070D0C03B85A638E108CFB2C1639DFDCD8249BD2E1AEFE0E7D8A2DF5D841C78E25E1893C11CDF7EAC53
2,993,987 UART: Caliptra RT
2,994,240 UART: [state] CFI Enabled
3,101,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,335 >>> mbox cmd response: failed
4,168,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,173,998 UART:
4,174,014 UART: Running Caliptra FMC ...
4,174,422 UART:
4,174,476 UART: [state] CFI Enabled
4,263,947 UART: [art] Extend RT PCRs Done
4,264,375 UART: [art] Lock RT PCRs Done
4,265,854 UART: [art] Populate DV Done
4,274,009 UART: [fht] FMC Alias Private Key: 7
4,275,001 UART: [art] Derive CDI
4,275,281 UART: [art] Store in in slot 0x4
4,361,044 UART: [art] Derive Key Pair
4,361,404 UART: [art] Store priv key in slot 0x5
4,375,242 UART: [art] Derive Key Pair - Done
4,389,735 UART: [art] Signing Cert with AUTHO
4,390,215 UART: RITY.KEYID = 7
4,405,625 UART: [art] Erasing AUTHORITY.KEYID = 7
4,406,390 UART: [art] PUB.X = 0DA174E20D17135D97750C0AA16736E32D393C8A11F48A5A7D822A1B7A205CBD5A566CD6AE448902DB27E94B742CBEB2
4,413,153 UART: [art] PUB.Y = 0DB3F8CDDBD1FF4492FA8B57D323354A4F8246998E09A94AC2E201BFE5F687B7A79EB4D92E50F80BCD0A167BB4553B50
4,420,104 UART: [art] SIG.R = 6C4B32389AD3662394FD421C453D45E14C4D7B8B1CEB376F09C0D4B2ADADBE8BBD5DDE3ED393ADDDD72B4DFD761F9616
4,426,897 UART: [art] SIG.S = D49A7C0C766B6070D0C03B85A638E108CFB2C1639DFDCD8249BD2E1AEFE0E7D8A2DF5D841C78E25E1893C11CDF7EAC53
4,450,750 UART: Caliptra RT
4,451,003 UART: [state] CFI Enabled
4,732,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,171,887 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
919,057 UART: [kat] HMAC-384Kdf
923,767 UART: [kat] LMS
1,172,095 UART: [kat] --
1,172,926 UART: [cold-reset] ++
1,173,286 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,997 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,382 UART: [idev] --
1,211,576 UART: [ldev] ++
1,211,744 UART: [ldev] CDI.KEYID = 6
1,212,107 UART: [ldev] SUBJECT.KEYID = 5
1,212,533 UART: [ldev] AUTHORITY.KEYID = 7
1,212,996 UART: [ldev] FE.KEYID = 1
1,218,296 UART: [ldev] Erasing FE.KEYID = 1
1,244,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,578 UART: [ldev] --
1,283,861 UART: [fwproc] Wait for Commands...
1,284,449 UART: [fwproc] Recv command 0x46574c44
1,285,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,991 >>> mbox cmd response: success
2,776,991 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,778,157 UART: [afmc] ++
2,778,325 UART: [afmc] CDI.KEYID = 6
2,778,687 UART: [afmc] SUBJECT.KEYID = 7
2,779,112 UART: [afmc] AUTHORITY.KEYID = 5
2,815,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,172 UART: [afmc] --
2,858,230 UART: [cold-reset] --
2,859,218 UART: [state] Locking Datavault
2,860,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,807 UART: [state] Locking ICCM
2,861,295 UART: [exit] Launching FMC @ 0x40000130
2,866,624 UART:
2,866,640 UART: Running Caliptra FMC ...
2,867,048 UART:
2,867,191 UART: [state] CFI Enabled
2,877,864 UART: [fht] FMC Alias Private Key: 7
2,986,357 UART: [art] Extend RT PCRs Done
2,986,785 UART: [art] Lock RT PCRs Done
2,988,299 UART: [art] Populate DV Done
2,996,350 UART: [fht] FMC Alias Private Key: 7
2,997,372 UART: [art] Derive CDI
2,997,652 UART: [art] Store in in slot 0x4
3,083,241 UART: [art] Derive Key Pair
3,083,601 UART: [art] Store priv key in slot 0x5
3,096,593 UART: [art] Derive Key Pair - Done
3,111,356 UART: [art] Signing Cert with AUTHO
3,111,836 UART: RITY.KEYID = 7
3,127,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,995 UART: [art] PUB.X = 20295916B5743075A300205C85224789E988DF1540521C6DD27A74B2E21C4AE61EFA391E53177B5009D27DA93E13592A
3,134,728 UART: [art] PUB.Y = 3718E6AD4A42FC915CE883CFE6E955B84B17F21B4B76B3F35C1EC6192FF3ABE5EC5AC49301CF6A2816C8935D9830F46A
3,141,689 UART: [art] SIG.R = 578125658B98E5EEF97ABA4FBAFEF9E02A9F1F93978D5A7205AFAE55909E418E9A558127016100696929A60292F14623
3,148,424 UART: [art] SIG.S = F332A5E06565F3247C53FC3D6085EAF9EB313D1B0377A2C10BCB644122F2B763E4596DA145478799C07B1B88AABF78FC
3,172,815 UART: Caliptra RT
3,173,160 UART: [state] CFI Enabled
3,280,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,571 UART:
3,282,587 UART: Running Caliptra ROM ...
3,282,995 UART:
3,283,137 UART: [state] CFI Enabled
3,285,787 UART: [state] LifecycleState = Unprovisioned
3,286,442 UART: [state] DebugLocked = No
3,287,018 UART: [state] WD Timer not started. Device not locked for debugging
3,288,286 UART: [kat] SHA2-256
4,093,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,098,061 UART: [kat] ++
4,098,213 UART: [kat] sha1
4,102,449 UART: [kat] SHA2-256
4,104,389 UART: [kat] SHA2-384
4,107,264 UART: [kat] SHA2-512-ACC
4,109,164 UART: [kat] ECC-384
4,118,829 UART: [kat] HMAC-384Kdf
4,123,281 UART: [kat] LMS
4,371,609 UART: [kat] --
4,372,585 UART: [update-reset] ++
4,463,176 >>> mbox cmd response: failed
4,463,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,463,592 UART: ROM Non-Fatal Error: 0x000B001F
4,464,372 UART: [state] Locking Datavault
4,465,106 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,710 UART: [state] Locking ICCM
4,466,316 UART: [exit] Launching FMC @ 0x40000130
4,471,645 UART:
4,471,661 UART: Running Caliptra FMC ...
4,472,069 UART:
4,472,212 UART: [state] CFI Enabled
4,561,167 UART: [art] Extend RT PCRs Done
4,561,595 UART: [art] Lock RT PCRs Done
4,562,704 UART: [art] Populate DV Done
4,570,867 UART: [fht] FMC Alias Private Key: 7
4,571,813 UART: [art] Derive CDI
4,572,093 UART: [art] Store in in slot 0x4
4,657,798 UART: [art] Derive Key Pair
4,658,158 UART: [art] Store priv key in slot 0x5
4,671,804 UART: [art] Derive Key Pair - Done
4,686,723 UART: [art] Signing Cert with AUTHO
4,687,203 UART: RITY.KEYID = 7
4,702,577 UART: [art] Erasing AUTHORITY.KEYID = 7
4,703,342 UART: [art] PUB.X = 20295916B5743075A300205C85224789E988DF1540521C6DD27A74B2E21C4AE61EFA391E53177B5009D27DA93E13592A
4,710,075 UART: [art] PUB.Y = 3718E6AD4A42FC915CE883CFE6E955B84B17F21B4B76B3F35C1EC6192FF3ABE5EC5AC49301CF6A2816C8935D9830F46A
4,717,036 UART: [art] SIG.R = 578125658B98E5EEF97ABA4FBAFEF9E02A9F1F93978D5A7205AFAE55909E418E9A558127016100696929A60292F14623
4,723,771 UART: [art] SIG.S = F332A5E06565F3247C53FC3D6085EAF9EB313D1B0377A2C10BCB644122F2B763E4596DA145478799C07B1B88AABF78FC
4,747,372 UART: Caliptra RT
4,747,717 UART: [state] CFI Enabled
5,026,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,028,527 UART:
5,028,543 UART: Running Caliptra ROM ...
5,028,951 UART:
5,029,093 UART: [state] CFI Enabled
5,031,913 UART: [state] LifecycleState = Unprovisioned
5,032,568 UART: [state] DebugLocked = No
5,033,102 UART: [state] WD Timer not started. Device not locked for debugging
5,034,256 UART: [kat] SHA2-256
5,839,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,844,031 UART: [kat] ++
5,844,183 UART: [kat] sha1
5,848,263 UART: [kat] SHA2-256
5,850,203 UART: [kat] SHA2-384
5,853,018 UART: [kat] SHA2-512-ACC
5,854,918 UART: [kat] ECC-384
5,864,715 UART: [kat] HMAC-384Kdf
5,869,279 UART: [kat] LMS
6,117,607 UART: [kat] --
6,118,401 UART: [update-reset] ++
7,432,048 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,433,235 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,583,233 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,970 >>> mbox cmd response: success
2,628,970 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,690,936 UART:
2,690,952 UART: Running Caliptra FMC ...
2,691,360 UART:
2,691,503 UART: [state] CFI Enabled
2,702,164 UART: [fht] FMC Alias Private Key: 7
2,810,649 UART: [art] Extend RT PCRs Done
2,811,077 UART: [art] Lock RT PCRs Done
2,812,695 UART: [art] Populate DV Done
2,820,736 UART: [fht] FMC Alias Private Key: 7
2,821,866 UART: [art] Derive CDI
2,822,146 UART: [art] Store in in slot 0x4
2,908,169 UART: [art] Derive Key Pair
2,908,529 UART: [art] Store priv key in slot 0x5
2,921,793 UART: [art] Derive Key Pair - Done
2,936,599 UART: [art] Signing Cert with AUTHO
2,937,079 UART: RITY.KEYID = 7
2,952,551 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,316 UART: [art] PUB.X = 5761FA0C020D0154CCB37C33E415DB5870020704CEA15BBCA05F6CD787955B2E81BDD1C0CEC601F0FA9C710EE064519B
2,960,071 UART: [art] PUB.Y = 8D88E9F2375D4CC674E37625EDEFCA1CB1417B836CFB55C925EC846C1867C3E2BC90C7DCFD620FFC6F51F4EE796C1148
2,967,036 UART: [art] SIG.R = 33097136C2642E2EB76779D7664D90708AE64F0DF4C1CB4F15D60108503DFF4141451243952FB805BF3470FC125A17CF
2,973,785 UART: [art] SIG.S = 88EDECC28FF68C0DF1BBC364FFE7CF4B2286AA2F07794402B3B82FB8ECC55FB22FC44392B0271F295AD8498243C64945
2,997,893 UART: Caliptra RT
2,998,238 UART: [state] CFI Enabled
3,106,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,173,678 >>> mbox cmd response: failed
4,173,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,179,519 UART:
4,179,535 UART: Running Caliptra FMC ...
4,179,943 UART:
4,180,086 UART: [state] CFI Enabled
4,269,003 UART: [art] Extend RT PCRs Done
4,269,431 UART: [art] Lock RT PCRs Done
4,270,640 UART: [art] Populate DV Done
4,278,875 UART: [fht] FMC Alias Private Key: 7
4,279,919 UART: [art] Derive CDI
4,280,199 UART: [art] Store in in slot 0x4
4,365,848 UART: [art] Derive Key Pair
4,366,208 UART: [art] Store priv key in slot 0x5
4,379,842 UART: [art] Derive Key Pair - Done
4,394,938 UART: [art] Signing Cert with AUTHO
4,395,418 UART: RITY.KEYID = 7
4,410,418 UART: [art] Erasing AUTHORITY.KEYID = 7
4,411,183 UART: [art] PUB.X = 5761FA0C020D0154CCB37C33E415DB5870020704CEA15BBCA05F6CD787955B2E81BDD1C0CEC601F0FA9C710EE064519B
4,417,938 UART: [art] PUB.Y = 8D88E9F2375D4CC674E37625EDEFCA1CB1417B836CFB55C925EC846C1867C3E2BC90C7DCFD620FFC6F51F4EE796C1148
4,424,903 UART: [art] SIG.R = 33097136C2642E2EB76779D7664D90708AE64F0DF4C1CB4F15D60108503DFF4141451243952FB805BF3470FC125A17CF
4,431,652 UART: [art] SIG.S = 88EDECC28FF68C0DF1BBC364FFE7CF4B2286AA2F07794402B3B82FB8ECC55FB22FC44392B0271F295AD8498243C64945
4,455,982 UART: Caliptra RT
4,456,327 UART: [state] CFI Enabled
4,742,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,182,252 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,214,872 UART: [ldev] Erasing FE.KEYID = 1
1,241,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,244 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,438 >>> mbox cmd response: success
2,774,438 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,775,669 UART: [afmc] ++
2,775,837 UART: [afmc] CDI.KEYID = 6
2,776,200 UART: [afmc] SUBJECT.KEYID = 7
2,776,626 UART: [afmc] AUTHORITY.KEYID = 5
2,811,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,082 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,694 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,360 UART: [afmc] --
2,855,442 UART: [cold-reset] --
2,856,168 UART: [state] Locking Datavault
2,857,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,959 UART: [state] Locking ICCM
2,858,477 UART: [exit] Launching FMC @ 0x40000130
2,863,806 UART:
2,863,822 UART: Running Caliptra FMC ...
2,864,230 UART:
2,864,284 UART: [state] CFI Enabled
2,874,809 UART: [fht] FMC Alias Private Key: 7
2,982,526 UART: [art] Extend RT PCRs Done
2,982,954 UART: [art] Lock RT PCRs Done
2,984,334 UART: [art] Populate DV Done
2,992,627 UART: [fht] FMC Alias Private Key: 7
2,993,769 UART: [art] Derive CDI
2,994,049 UART: [art] Store in in slot 0x4
3,079,484 UART: [art] Derive Key Pair
3,079,844 UART: [art] Store priv key in slot 0x5
3,093,806 UART: [art] Derive Key Pair - Done
3,108,927 UART: [art] Signing Cert with AUTHO
3,109,407 UART: RITY.KEYID = 7
3,124,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,298 UART: [art] PUB.X = ECE5A140F406B7983C789DBE4239B376A1CE5EB2FD75EAFF5ACDD3D0C6F61993A69E22097EA06BD52C5F3FBEDAB26B8E
3,132,090 UART: [art] PUB.Y = 084CBBF84300AAFBA71E485BCFC938A855B117DFBA520E0CAD59AA69A3B82890489CC4E2B16446ABAC14F94631D86979
3,139,023 UART: [art] SIG.R = ACECFCA0AF3D4F5B80FEC3F5FBF05A264967E9597B425B7EA2EE8C16185C1A9B950AF8F359D447B710C01031679BC2AC
3,145,810 UART: [art] SIG.S = 85010B90358ADDD7B4775A121A5E51A0D598AAE73F6BAF46433FD0BE87540D052D827D2540F7648B6ABF7ABB54E969D4
3,169,157 UART: Caliptra RT
3,169,410 UART: [state] CFI Enabled
3,276,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,384 UART:
3,278,400 UART: Running Caliptra ROM ...
3,278,808 UART:
3,278,863 UART: [state] CFI Enabled
3,281,571 UART: [state] LifecycleState = Unprovisioned
3,282,226 UART: [state] DebugLocked = No
3,282,710 UART: [state] WD Timer not started. Device not locked for debugging
3,283,834 UART: [kat] SHA2-256
4,087,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,513 UART: [kat] ++
4,091,665 UART: [kat] sha1
4,095,933 UART: [kat] SHA2-256
4,097,873 UART: [kat] SHA2-384
4,100,512 UART: [kat] SHA2-512-ACC
4,102,412 UART: [kat] ECC-384
4,111,949 UART: [kat] HMAC-384Kdf
4,116,477 UART: [kat] LMS
4,364,789 UART: [kat] --
4,365,589 UART: [update-reset] ++
4,454,779 >>> mbox cmd response: failed
4,454,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,455,121 UART: ROM Non-Fatal Error: 0x000B001F
4,455,949 UART: [state] Locking Datavault
4,456,567 UART: [state] Locking PCR0, PCR1 and PCR31
4,457,171 UART: [state] Locking ICCM
4,457,593 UART: [exit] Launching FMC @ 0x40000130
4,462,922 UART:
4,462,938 UART: Running Caliptra FMC ...
4,463,346 UART:
4,463,400 UART: [state] CFI Enabled
4,552,867 UART: [art] Extend RT PCRs Done
4,553,295 UART: [art] Lock RT PCRs Done
4,554,410 UART: [art] Populate DV Done
4,562,609 UART: [fht] FMC Alias Private Key: 7
4,563,689 UART: [art] Derive CDI
4,563,969 UART: [art] Store in in slot 0x4
4,649,764 UART: [art] Derive Key Pair
4,650,124 UART: [art] Store priv key in slot 0x5
4,663,360 UART: [art] Derive Key Pair - Done
4,677,909 UART: [art] Signing Cert with AUTHO
4,678,389 UART: RITY.KEYID = 7
4,693,251 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,016 UART: [art] PUB.X = ECE5A140F406B7983C789DBE4239B376A1CE5EB2FD75EAFF5ACDD3D0C6F61993A69E22097EA06BD52C5F3FBEDAB26B8E
4,700,808 UART: [art] PUB.Y = 084CBBF84300AAFBA71E485BCFC938A855B117DFBA520E0CAD59AA69A3B82890489CC4E2B16446ABAC14F94631D86979
4,707,741 UART: [art] SIG.R = ACECFCA0AF3D4F5B80FEC3F5FBF05A264967E9597B425B7EA2EE8C16185C1A9B950AF8F359D447B710C01031679BC2AC
4,714,528 UART: [art] SIG.S = 85010B90358ADDD7B4775A121A5E51A0D598AAE73F6BAF46433FD0BE87540D052D827D2540F7648B6ABF7ABB54E969D4
4,738,355 UART: Caliptra RT
4,738,608 UART: [state] CFI Enabled
5,014,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,016,373 UART:
5,016,389 UART: Running Caliptra ROM ...
5,016,797 UART:
5,016,852 UART: [state] CFI Enabled
5,019,744 UART: [state] LifecycleState = Unprovisioned
5,020,399 UART: [state] DebugLocked = No
5,021,057 UART: [state] WD Timer not started. Device not locked for debugging
5,022,293 UART: [kat] SHA2-256
5,825,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,829,972 UART: [kat] ++
5,830,124 UART: [kat] sha1
5,834,278 UART: [kat] SHA2-256
5,836,218 UART: [kat] SHA2-384
5,839,033 UART: [kat] SHA2-512-ACC
5,840,933 UART: [kat] ECC-384
5,850,286 UART: [kat] HMAC-384Kdf
5,855,022 UART: [kat] LMS
6,103,334 UART: [kat] --
6,104,232 UART: [update-reset] ++
7,418,558 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,419,685 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,569,683 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,034 >>> mbox cmd response: success
2,624,034 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,686,222 UART:
2,686,238 UART: Running Caliptra FMC ...
2,686,646 UART:
2,686,700 UART: [state] CFI Enabled
2,696,971 UART: [fht] FMC Alias Private Key: 7
2,805,320 UART: [art] Extend RT PCRs Done
2,805,748 UART: [art] Lock RT PCRs Done
2,807,340 UART: [art] Populate DV Done
2,815,507 UART: [fht] FMC Alias Private Key: 7
2,816,665 UART: [art] Derive CDI
2,816,945 UART: [art] Store in in slot 0x4
2,902,486 UART: [art] Derive Key Pair
2,902,846 UART: [art] Store priv key in slot 0x5
2,915,932 UART: [art] Derive Key Pair - Done
2,930,461 UART: [art] Signing Cert with AUTHO
2,930,941 UART: RITY.KEYID = 7
2,945,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,686 UART: [art] PUB.X = ED526BE3DAA196CDA0A02FC929E3B24AC47D0E9DD761FD6817DA4A06D2CEDF94FEC33D042E9DC10F628C948F37CE5701
2,953,465 UART: [art] PUB.Y = B65E03185F62A3ED8355B33389E117A9F405F27B729CA68A811FD6232FF2C103B1EDB36D7B51C7D4FD5C9ED96A8468DE
2,960,416 UART: [art] SIG.R = 304EF4AEE9A122E99879EDDD7C432B6521FA2AD0533B63CE4DEF19125DFE0608CD238F65F12413F85C161F3CDB497998
2,967,190 UART: [art] SIG.S = 4B23F104B806E23C356962484A7F72DE4AE5105F8E18F7E46E5EFF490A3B088E42A38812F80042D8AD0A61CFF30061BB
2,990,506 UART: Caliptra RT
2,990,759 UART: [state] CFI Enabled
3,099,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,751 >>> mbox cmd response: failed
4,159,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,165,672 UART:
4,165,688 UART: Running Caliptra FMC ...
4,166,096 UART:
4,166,150 UART: [state] CFI Enabled
4,255,457 UART: [art] Extend RT PCRs Done
4,255,885 UART: [art] Lock RT PCRs Done
4,257,118 UART: [art] Populate DV Done
4,265,363 UART: [fht] FMC Alias Private Key: 7
4,266,539 UART: [art] Derive CDI
4,266,819 UART: [art] Store in in slot 0x4
4,352,184 UART: [art] Derive Key Pair
4,352,544 UART: [art] Store priv key in slot 0x5
4,366,158 UART: [art] Derive Key Pair - Done
4,380,969 UART: [art] Signing Cert with AUTHO
4,381,449 UART: RITY.KEYID = 7
4,396,229 UART: [art] Erasing AUTHORITY.KEYID = 7
4,396,994 UART: [art] PUB.X = ED526BE3DAA196CDA0A02FC929E3B24AC47D0E9DD761FD6817DA4A06D2CEDF94FEC33D042E9DC10F628C948F37CE5701
4,403,773 UART: [art] PUB.Y = B65E03185F62A3ED8355B33389E117A9F405F27B729CA68A811FD6232FF2C103B1EDB36D7B51C7D4FD5C9ED96A8468DE
4,410,724 UART: [art] SIG.R = 304EF4AEE9A122E99879EDDD7C432B6521FA2AD0533B63CE4DEF19125DFE0608CD238F65F12413F85C161F3CDB497998
4,417,498 UART: [art] SIG.S = 4B23F104B806E23C356962484A7F72DE4AE5105F8E18F7E46E5EFF490A3B088E42A38812F80042D8AD0A61CFF30061BB
4,441,260 UART: Caliptra RT
4,441,513 UART: [state] CFI Enabled
4,723,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,157,316 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,045 UART: [state] LifecycleState = Unprovisioned
86,700 UART: [state] DebugLocked = No
87,246 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
892,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,176 UART: [kat] ++
896,328 UART: [kat] sha1
900,742 UART: [kat] SHA2-256
902,682 UART: [kat] SHA2-384
905,645 UART: [kat] SHA2-512-ACC
907,546 UART: [kat] ECC-384
917,759 UART: [kat] HMAC-384Kdf
922,307 UART: [kat] LMS
1,170,619 UART: [kat] --
1,171,384 UART: [cold-reset] ++
1,171,710 UART: [fht] FHT @ 0x50003400
1,174,356 UART: [idev] ++
1,174,524 UART: [idev] CDI.KEYID = 6
1,174,885 UART: [idev] SUBJECT.KEYID = 7
1,175,310 UART: [idev] UDS.KEYID = 0
1,175,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,313 UART: [ldev] ++
1,210,481 UART: [ldev] CDI.KEYID = 6
1,210,845 UART: [ldev] SUBJECT.KEYID = 5
1,211,272 UART: [ldev] AUTHORITY.KEYID = 7
1,211,735 UART: [ldev] FE.KEYID = 1
1,217,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,712 UART: [fwproc] Recv command 0x46574c44
1,284,445 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,069 >>> mbox cmd response: success
2,775,069 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,776,200 UART: [afmc] ++
2,776,368 UART: [afmc] CDI.KEYID = 6
2,776,731 UART: [afmc] SUBJECT.KEYID = 7
2,777,157 UART: [afmc] AUTHORITY.KEYID = 5
2,812,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,909 UART: [afmc] --
2,856,033 UART: [cold-reset] --
2,856,791 UART: [state] Locking Datavault
2,858,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,814 UART: [state] Locking ICCM
2,859,398 UART: [exit] Launching FMC @ 0x40000130
2,864,727 UART:
2,864,743 UART: Running Caliptra FMC ...
2,865,151 UART:
2,865,294 UART: [state] CFI Enabled
2,875,887 UART: [fht] FMC Alias Private Key: 7
2,983,582 UART: [art] Extend RT PCRs Done
2,984,010 UART: [art] Lock RT PCRs Done
2,985,522 UART: [art] Populate DV Done
2,993,935 UART: [fht] FMC Alias Private Key: 7
2,995,047 UART: [art] Derive CDI
2,995,327 UART: [art] Store in in slot 0x4
3,080,692 UART: [art] Derive Key Pair
3,081,052 UART: [art] Store priv key in slot 0x5
3,094,166 UART: [art] Derive Key Pair - Done
3,108,845 UART: [art] Signing Cert with AUTHO
3,109,325 UART: RITY.KEYID = 7
3,124,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,680 UART: [art] PUB.X = 925DC564B6668E115D1546555BAF7D934CD4D73E02275DFFF3F0B82EEB325BE2CC31EE5D0C798AFBE974BB456ACEA3F7
3,132,464 UART: [art] PUB.Y = 8FC9CF1070FAC61075B191899FB59DC4816E6FE08884ABABC60084717FA392372F644E8B32F25C34736242F333A3DE15
3,139,392 UART: [art] SIG.R = 5734504882BA7EC2469C74C035998D45ED3C93A5A268A18D9B70666B1373B77BACC75007A13B5A205069100AAD144B0F
3,146,149 UART: [art] SIG.S = 02C82DE6717C818B006256B4DC69FD7BAE3986CA203E1D9DA8BF8A7C77018E8E8676E6C17D7A9BD62CD73DA42102D261
3,170,077 UART: Caliptra RT
3,170,422 UART: [state] CFI Enabled
3,278,493 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,813 UART:
3,280,829 UART: Running Caliptra ROM ...
3,281,237 UART:
3,281,379 UART: [state] CFI Enabled
3,284,559 UART: [state] LifecycleState = Unprovisioned
3,285,214 UART: [state] DebugLocked = No
3,285,828 UART: [state] WD Timer not started. Device not locked for debugging
3,287,164 UART: [kat] SHA2-256
4,090,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,094,843 UART: [kat] ++
4,094,995 UART: [kat] sha1
4,099,229 UART: [kat] SHA2-256
4,101,169 UART: [kat] SHA2-384
4,104,022 UART: [kat] SHA2-512-ACC
4,105,922 UART: [kat] ECC-384
4,115,575 UART: [kat] HMAC-384Kdf
4,120,365 UART: [kat] LMS
4,368,677 UART: [kat] --
4,369,323 UART: [update-reset] ++
4,458,553 >>> mbox cmd response: failed
4,458,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,459,059 UART: ROM Non-Fatal Error: 0x000B001F
4,459,953 UART: [state] Locking Datavault
4,460,767 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,371 UART: [state] Locking ICCM
4,461,885 UART: [exit] Launching FMC @ 0x40000130
4,467,214 UART:
4,467,230 UART: Running Caliptra FMC ...
4,467,638 UART:
4,467,781 UART: [state] CFI Enabled
4,556,918 UART: [art] Extend RT PCRs Done
4,557,346 UART: [art] Lock RT PCRs Done
4,558,607 UART: [art] Populate DV Done
4,566,926 UART: [fht] FMC Alias Private Key: 7
4,568,076 UART: [art] Derive CDI
4,568,356 UART: [art] Store in in slot 0x4
4,653,527 UART: [art] Derive Key Pair
4,653,887 UART: [art] Store priv key in slot 0x5
4,667,679 UART: [art] Derive Key Pair - Done
4,682,630 UART: [art] Signing Cert with AUTHO
4,683,110 UART: RITY.KEYID = 7
4,697,966 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,731 UART: [art] PUB.X = 925DC564B6668E115D1546555BAF7D934CD4D73E02275DFFF3F0B82EEB325BE2CC31EE5D0C798AFBE974BB456ACEA3F7
4,705,515 UART: [art] PUB.Y = 8FC9CF1070FAC61075B191899FB59DC4816E6FE08884ABABC60084717FA392372F644E8B32F25C34736242F333A3DE15
4,712,443 UART: [art] SIG.R = 5734504882BA7EC2469C74C035998D45ED3C93A5A268A18D9B70666B1373B77BACC75007A13B5A205069100AAD144B0F
4,719,200 UART: [art] SIG.S = 02C82DE6717C818B006256B4DC69FD7BAE3986CA203E1D9DA8BF8A7C77018E8E8676E6C17D7A9BD62CD73DA42102D261
4,743,040 UART: Caliptra RT
4,743,385 UART: [state] CFI Enabled
5,024,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,025,803 UART:
5,025,819 UART: Running Caliptra ROM ...
5,026,227 UART:
5,026,369 UART: [state] CFI Enabled
5,029,035 UART: [state] LifecycleState = Unprovisioned
5,029,690 UART: [state] DebugLocked = No
5,030,340 UART: [state] WD Timer not started. Device not locked for debugging
5,031,634 UART: [kat] SHA2-256
5,835,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,839,313 UART: [kat] ++
5,839,465 UART: [kat] sha1
5,843,593 UART: [kat] SHA2-256
5,845,533 UART: [kat] SHA2-384
5,848,272 UART: [kat] SHA2-512-ACC
5,850,172 UART: [kat] ECC-384
5,859,497 UART: [kat] HMAC-384Kdf
5,864,113 UART: [kat] LMS
6,112,425 UART: [kat] --
6,113,427 UART: [update-reset] ++
7,426,511 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,427,706 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,577,704 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,169 >>> mbox cmd response: success
2,624,169 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,686,229 UART:
2,686,245 UART: Running Caliptra FMC ...
2,686,653 UART:
2,686,796 UART: [state] CFI Enabled
2,697,739 UART: [fht] FMC Alias Private Key: 7
2,805,678 UART: [art] Extend RT PCRs Done
2,806,106 UART: [art] Lock RT PCRs Done
2,807,582 UART: [art] Populate DV Done
2,815,767 UART: [fht] FMC Alias Private Key: 7
2,816,701 UART: [art] Derive CDI
2,816,981 UART: [art] Store in in slot 0x4
2,902,928 UART: [art] Derive Key Pair
2,903,288 UART: [art] Store priv key in slot 0x5
2,916,680 UART: [art] Derive Key Pair - Done
2,931,433 UART: [art] Signing Cert with AUTHO
2,931,913 UART: RITY.KEYID = 7
2,947,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,938 UART: [art] PUB.X = EB8F42A98CD29E76F72BD9A9DDAA36E198A75766C42BDD7356CC453EE90618E9941CD1F95D6FE60B71AC3155509C1DE7
2,954,716 UART: [art] PUB.Y = 2D53F797CFE0DA0E64D1EA014E139F864434EAF5D8CD2275EDCEB74272BBAE21673A1464CB3D2D13E8FB60C05176E57D
2,961,676 UART: [art] SIG.R = 268C9612C5F0A6CB3BFF25D319397A4A3ACF646745179E070595ED54E20044A1B6673802E984CEE06E0792ADE6316C2B
2,968,412 UART: [art] SIG.S = A1AABFE689B25CEDC33A0FBE457B4CAA1B4BEAF03C7F1E9B575F01A063042FA905F706B695484DC49167A8AF3A995556
2,992,310 UART: Caliptra RT
2,992,655 UART: [state] CFI Enabled
3,100,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,518 >>> mbox cmd response: failed
4,163,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,168,951 UART:
4,168,967 UART: Running Caliptra FMC ...
4,169,375 UART:
4,169,518 UART: [state] CFI Enabled
4,258,743 UART: [art] Extend RT PCRs Done
4,259,171 UART: [art] Lock RT PCRs Done
4,260,320 UART: [art] Populate DV Done
4,268,609 UART: [fht] FMC Alias Private Key: 7
4,269,693 UART: [art] Derive CDI
4,269,973 UART: [art] Store in in slot 0x4
4,355,382 UART: [art] Derive Key Pair
4,355,742 UART: [art] Store priv key in slot 0x5
4,368,912 UART: [art] Derive Key Pair - Done
4,383,807 UART: [art] Signing Cert with AUTHO
4,384,287 UART: RITY.KEYID = 7
4,399,239 UART: [art] Erasing AUTHORITY.KEYID = 7
4,400,004 UART: [art] PUB.X = EB8F42A98CD29E76F72BD9A9DDAA36E198A75766C42BDD7356CC453EE90618E9941CD1F95D6FE60B71AC3155509C1DE7
4,406,782 UART: [art] PUB.Y = 2D53F797CFE0DA0E64D1EA014E139F864434EAF5D8CD2275EDCEB74272BBAE21673A1464CB3D2D13E8FB60C05176E57D
4,413,742 UART: [art] SIG.R = 268C9612C5F0A6CB3BFF25D319397A4A3ACF646745179E070595ED54E20044A1B6673802E984CEE06E0792ADE6316C2B
4,420,478 UART: [art] SIG.S = A1AABFE689B25CEDC33A0FBE457B4CAA1B4BEAF03C7F1E9B575F01A063042FA905F706B695484DC49167A8AF3A995556
4,444,592 UART: Caliptra RT
4,444,937 UART: [state] CFI Enabled
4,722,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,159,899 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,080 UART:
192,454 UART: Running Caliptra ROM ...
193,637 UART:
193,785 UART: [state] CFI Enabled
262,182 UART: [state] LifecycleState = Unprovisioned
264,154 UART: [state] DebugLocked = No
266,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,511 UART: [kat] SHA2-256
440,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,736 UART: [kat] ++
451,200 UART: [kat] sha1
463,482 UART: [kat] SHA2-256
466,219 UART: [kat] SHA2-384
471,490 UART: [kat] SHA2-512-ACC
473,825 UART: [kat] ECC-384
2,762,818 UART: [kat] HMAC-384Kdf
2,774,850 UART: [kat] LMS
3,965,149 UART: [kat] --
3,969,864 UART: [cold-reset] ++
3,972,013 UART: [fht] Storing FHT @ 0x50003400
3,984,523 UART: [idev] ++
3,985,096 UART: [idev] CDI.KEYID = 6
3,986,010 UART: [idev] SUBJECT.KEYID = 7
3,987,286 UART: [idev] UDS.KEYID = 0
3,990,028 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,743 UART: [idev] Erasing UDS.KEYID = 0
7,319,012 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,129 UART: [idev] --
7,344,993 UART: [ldev] ++
7,345,559 UART: [ldev] CDI.KEYID = 6
7,346,499 UART: [ldev] SUBJECT.KEYID = 5
7,347,767 UART: [ldev] AUTHORITY.KEYID = 7
7,348,919 UART: [ldev] FE.KEYID = 1
7,375,155 UART: [ldev] Erasing FE.KEYID = 1
10,707,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,002,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,016,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,031,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,046,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,064,378 UART: [ldev] --
13,069,706 UART: [fwproc] Waiting for Commands...
13,072,345 UART: [fwproc] Received command 0x46574c44
13,074,550 UART: [fwproc] Received Image of size 114124 bytes
17,133,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,211,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,597,058 >>> mbox cmd response: success
17,599,092 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,742,728 UART: [afmc] ++
17,743,360 UART: [afmc] CDI.KEYID = 6
17,744,283 UART: [afmc] SUBJECT.KEYID = 7
17,745,325 UART: [afmc] AUTHORITY.KEYID = 5
20,963,869 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,262,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,264,355 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,278,744 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,293,572 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,308,005 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,327,748 UART: [afmc] --
23,331,396 UART: [cold-reset] --
23,335,200 UART: [state] Locking Datavault
23,341,525 UART: [state] Locking PCR0, PCR1 and PCR31
23,343,284 UART: [state] Locking ICCM
23,345,054 UART: [exit] Launching FMC @ 0x40000130
23,353,397 UART:
23,353,632 UART: Running Caliptra FMC ...
23,354,731 UART:
23,354,887 UART: [state] CFI Enabled
23,423,924 UART: [fht] FMC Alias Private Key: 7
25,762,131 UART: [art] Extend RT PCRs Done
25,763,339 UART: [art] Lock RT PCRs Done
25,764,804 UART: [art] Populate DV Done
25,770,151 UART: [fht] FMC Alias Private Key: 7
25,771,727 UART: [art] Derive CDI
25,772,573 UART: [art] Store in in slot 0x4
25,832,557 UART: [art] Derive Key Pair
25,833,550 UART: [art] Store priv key in slot 0x5
29,126,394 UART: [art] Derive Key Pair - Done
29,139,451 UART: [art] Signing Cert with AUTHO
29,140,754 UART: RITY.KEYID = 7
31,427,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,429,517 UART: [art] PUB.X = B4455C23EF29B04A8B48A50043026053C31D72CE5E8C8C3730B5981EC846EBAAB51C29BAA5741A3C60645797B27733B3
31,436,725 UART: [art] PUB.Y = 3819849CACC41124A5B9E0843742F43BD43B6E8050148C42E3C8BBD537198C0DB56A606A8A0F443F52082E109E904402
31,443,960 UART: [art] SIG.R = FF9C327382BC0E43DE7C9A2D537D17B6452C9F7C3E0FA33A414D1A3CD59E5738D25F655D2D5BA35344C26163736E1B9B
31,451,396 UART: [art] SIG.S = 03D9D5760EDD4E55C438E678573988BFA1C9AD64D3BD1C12B1329F6CD35C5BD44EE3EEACDDB57E348C645D120875F011
32,757,395 UART: Caliptra RT
32,758,111 UART: [state] CFI Enabled
32,931,190 UART: [rt] RT listening for mailbox commands...
32,933,934 UART:
32,934,186 UART: Running Caliptra ROM ...
32,935,309 UART:
32,935,480 UART: [state] CFI Enabled
32,996,782 UART: [state] LifecycleState = Unprovisioned
32,998,709 UART: [state] DebugLocked = No
33,000,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,005,209 UART: [kat] SHA2-256
33,174,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,185,413 UART: [kat] ++
33,185,948 UART: [kat] sha1
33,196,838 UART: [kat] SHA2-256
33,199,528 UART: [kat] SHA2-384
33,205,133 UART: [kat] SHA2-512-ACC
33,207,529 UART: [kat] ECC-384
35,500,438 UART: [kat] HMAC-384Kdf
35,512,389 UART: [kat] LMS
36,702,748 UART: [kat] --
36,707,041 UART: [update-reset] ++
36,810,844 >>> mbox cmd response: failed
36,812,486 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,955,898 UART: ROM Non-Fatal Error: 0x000B001D
36,957,323 UART: [state] Locking Datavault
36,958,479 UART: [state] Locking PCR0, PCR1 and PCR31
36,960,019 UART: [state] Locking ICCM
36,960,932 UART: [exit] Launching FMC @ 0x40000130
36,962,354 UART:
36,962,509 UART: Running Caliptra FMC ...
36,963,604 UART:
36,963,759 UART: [state] CFI Enabled
36,964,677 UART: [art] Extend RT PCRs Done
36,965,813 UART: [art] Lock RT PCRs Done
36,967,020 UART: [art] Populate DV Done
36,968,066 UART: [fht] FMC Alias Private Key: 7
36,969,412 UART: [art] Derive CDI
36,970,148 UART: [art] Store in in slot 0x4
37,002,593 UART: [art] Derive Key Pair
37,003,591 UART: [art] Store priv key in slot 0x5
40,296,447 UART: [art] Derive Key Pair - Done
40,309,333 UART: [art] Signing Cert with AUTHO
40,310,638 UART: RITY.KEYID = 7
42,597,794 UART: [art] Erasing AUTHORITY.KEYID = 7
42,599,305 UART: [art] PUB.X = B4455C23EF29B04A8B48A50043026053C31D72CE5E8C8C3730B5981EC846EBAAB51C29BAA5741A3C60645797B27733B3
42,606,561 UART: [art] PUB.Y = 3819849CACC41124A5B9E0843742F43BD43B6E8050148C42E3C8BBD537198C0DB56A606A8A0F443F52082E109E904402
42,613,774 UART: [art] SIG.R = FF9C327382BC0E43DE7C9A2D537D17B6452C9F7C3E0FA33A414D1A3CD59E5738D25F655D2D5BA35344C26163736E1B9B
42,621,171 UART: [art] SIG.S = 03D9D5760EDD4E55C438E678573988BFA1C9AD64D3BD1C12B1329F6CD35C5BD44EE3EEACDDB57E348C645D120875F011
43,926,514 UART: Caliptra RT
43,927,212 UART: [state] CFI Enabled
44,258,896 UART: [rt] RT listening for mailbox commands...
44,261,527 UART:
44,261,708 UART: Running Caliptra ROM ...
44,262,815 UART:
44,262,968 UART: [state] CFI Enabled
44,324,519 UART: [state] LifecycleState = Unprovisioned
44,326,629 UART: [state] DebugLocked = No
44,329,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,334,847 UART: [kat] SHA2-256
44,504,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,515,019 UART: [kat] ++
44,515,472 UART: [kat] sha1
44,527,489 UART: [kat] SHA2-256
44,530,180 UART: [kat] SHA2-384
44,534,328 UART: [kat] SHA2-512-ACC
44,536,726 UART: [kat] ECC-384
46,827,467 UART: [kat] HMAC-384Kdf
46,859,464 UART: [kat] LMS
48,049,798 UART: [kat] --
48,055,900 UART: [update-reset] ++
52,196,700 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,200,538 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,582,810 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,803,806 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,264 >>> mbox cmd response: success
17,879,246 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,570,785 UART:
23,571,176 UART: Running Caliptra FMC ...
23,572,361 UART:
23,572,539 UART: [state] CFI Enabled
23,638,258 UART: [fht] FMC Alias Private Key: 7
25,976,825 UART: [art] Extend RT PCRs Done
25,978,051 UART: [art] Lock RT PCRs Done
25,979,526 UART: [art] Populate DV Done
25,984,932 UART: [fht] FMC Alias Private Key: 7
25,986,484 UART: [art] Derive CDI
25,987,263 UART: [art] Store in in slot 0x4
26,047,156 UART: [art] Derive Key Pair
26,048,203 UART: [art] Store priv key in slot 0x5
29,341,125 UART: [art] Derive Key Pair - Done
29,353,867 UART: [art] Signing Cert with AUTHO
29,355,180 UART: RITY.KEYID = 7
31,642,796 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,306 UART: [art] PUB.X = 24C4AE184CC050956128B281405166569A05805E865FCEBCA6DA767C2E87E8EB9C9E42E30A670E4E91FA6A99F131F0BB
31,651,595 UART: [art] PUB.Y = 70399AEA9AFDC1B97F6716F78D5095C734F69ABEE616AD2983EBFE4F47BBF758ED23D733BB039A9F9E1DDCE000564A4B
31,658,826 UART: [art] SIG.R = 3405176DFE279CB4DD3585E2D119C38092C48B2612CE40E6B1F8D138F498D80AB42A7459742FDC8AE6C5EED22A8FEF3E
31,666,185 UART: [art] SIG.S = C5484701DC5537189E2210286EFFBA20E150E4859795C8AC5E3278129CF46ADD899409A9E8AAD58E71B3EBE07C253F32
32,971,462 UART: Caliptra RT
32,972,179 UART: [state] CFI Enabled
33,152,300 UART: [rt] RT listening for mailbox commands...
36,861,280 >>> mbox cmd response: failed
36,862,973 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
37,006,781 UART:
37,007,775 UART: Running Caliptra FMC ...
37,008,942 UART:
37,009,118 UART: [state] CFI Enabled
37,010,068 UART: [art] Extend RT PCRs Done
37,011,218 UART: [art] Lock RT PCRs Done
37,012,289 UART: [art] Populate DV Done
37,013,402 UART: [fht] FMC Alias Private Key: 7
37,014,724 UART: [art] Derive CDI
37,015,467 UART: [art] Store in in slot 0x4
37,030,634 UART: [art] Derive Key Pair
37,031,632 UART: [art] Store priv key in slot 0x5
40,324,872 UART: [art] Derive Key Pair - Done
40,337,608 UART: [art] Signing Cert with AUTHO
40,338,918 UART: RITY.KEYID = 7
42,625,979 UART: [art] Erasing AUTHORITY.KEYID = 7
42,627,494 UART: [art] PUB.X = 24C4AE184CC050956128B281405166569A05805E865FCEBCA6DA767C2E87E8EB9C9E42E30A670E4E91FA6A99F131F0BB
42,634,751 UART: [art] PUB.Y = 70399AEA9AFDC1B97F6716F78D5095C734F69ABEE616AD2983EBFE4F47BBF758ED23D733BB039A9F9E1DDCE000564A4B
42,641,999 UART: [art] SIG.R = 3405176DFE279CB4DD3585E2D119C38092C48B2612CE40E6B1F8D138F498D80AB42A7459742FDC8AE6C5EED22A8FEF3E
42,649,366 UART: [art] SIG.S = C5484701DC5537189E2210286EFFBA20E150E4859795C8AC5E3278129CF46ADD899409A9E8AAD58E71B3EBE07C253F32
43,954,010 UART: Caliptra RT
43,954,724 UART: [state] CFI Enabled
44,289,131 UART: [rt] RT listening for mailbox commands...
52,857,847 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,676 UART:
193,030 UART: Running Caliptra ROM ...
194,220 UART:
603,984 UART: [state] CFI Enabled
615,546 UART: [state] LifecycleState = Unprovisioned
617,488 UART: [state] DebugLocked = No
619,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,026 UART: [kat] SHA2-256
794,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,367 UART: [kat] ++
805,854 UART: [kat] sha1
817,509 UART: [kat] SHA2-256
820,196 UART: [kat] SHA2-384
825,201 UART: [kat] SHA2-512-ACC
827,590 UART: [kat] ECC-384
3,111,095 UART: [kat] HMAC-384Kdf
3,122,478 UART: [kat] LMS
4,312,574 UART: [kat] --
4,318,002 UART: [cold-reset] ++
4,319,351 UART: [fht] Storing FHT @ 0x50003400
4,332,625 UART: [idev] ++
4,333,186 UART: [idev] CDI.KEYID = 6
4,334,131 UART: [idev] SUBJECT.KEYID = 7
4,335,397 UART: [idev] UDS.KEYID = 0
4,338,027 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,562 UART: [idev] Erasing UDS.KEYID = 0
7,623,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,331 UART: [idev] --
7,650,387 UART: [ldev] ++
7,650,961 UART: [ldev] CDI.KEYID = 6
7,651,902 UART: [ldev] SUBJECT.KEYID = 5
7,653,116 UART: [ldev] AUTHORITY.KEYID = 7
7,654,347 UART: [ldev] FE.KEYID = 1
7,665,892 UART: [ldev] Erasing FE.KEYID = 1
10,955,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,614 UART: [ldev] --
13,318,251 UART: [fwproc] Waiting for Commands...
13,321,271 UART: [fwproc] Received command 0x46574c44
13,323,456 UART: [fwproc] Received Image of size 114124 bytes
17,368,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,717 >>> mbox cmd response: success
17,834,782 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,978,026 UART: [afmc] ++
17,978,678 UART: [afmc] CDI.KEYID = 6
17,979,575 UART: [afmc] SUBJECT.KEYID = 7
17,980,624 UART: [afmc] AUTHORITY.KEYID = 5
21,158,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,053 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,314 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,680 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,531 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,976 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,758 UART: [afmc] --
23,522,327 UART: [cold-reset] --
23,526,734 UART: [state] Locking Datavault
23,532,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,551 UART: [state] Locking ICCM
23,536,046 UART: [exit] Launching FMC @ 0x40000130
23,544,445 UART:
23,544,679 UART: Running Caliptra FMC ...
23,545,782 UART:
23,545,942 UART: [state] CFI Enabled
23,553,966 UART: [fht] FMC Alias Private Key: 7
25,884,513 UART: [art] Extend RT PCRs Done
25,885,737 UART: [art] Lock RT PCRs Done
25,887,125 UART: [art] Populate DV Done
25,892,753 UART: [fht] FMC Alias Private Key: 7
25,894,452 UART: [art] Derive CDI
25,895,185 UART: [art] Store in in slot 0x4
25,938,021 UART: [art] Derive Key Pair
25,939,066 UART: [art] Store priv key in slot 0x5
29,181,083 UART: [art] Derive Key Pair - Done
29,194,148 UART: [art] Signing Cert with AUTHO
29,195,495 UART: RITY.KEYID = 7
31,475,202 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,726 UART: [art] PUB.X = E025BDB806B041FF3950FA88C45C4C8BD5C64034D003F174DB3B1175AFF8D1C052577DD118AFB868ECE7F5A59821BD7B
31,483,927 UART: [art] PUB.Y = 73C50651A0ED21E2488E6596D73F51A22B9A0214046E9348EC291350CC8AC195E1E29ACF0135DF70DE7F04AD6A5B6387
31,491,167 UART: [art] SIG.R = 57D423F4A4D2A4F376E7EFD195EF38CE1AC33C2AD64A575DD16B85CAF2BE6043C1F6DD6507006D2D44F32E9BEFFC5D93
31,498,572 UART: [art] SIG.S = 86ABD7ECD0EDEFBB32B75F3AC2CA7DC73769C89D569962C03005D14A2F2F8AD4DCD4ED4D6D5C972EC307105A14E3DF61
32,803,563 UART: Caliptra RT
32,804,312 UART: [state] CFI Enabled
32,921,529 UART: [rt] RT listening for mailbox commands...
32,924,807 UART:
32,925,057 UART: Running Caliptra ROM ...
32,926,164 UART:
32,926,457 UART: [state] CFI Enabled
32,944,283 UART: [state] LifecycleState = Unprovisioned
32,946,222 UART: [state] DebugLocked = No
32,948,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,952,704 UART: [kat] SHA2-256
33,122,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,132,933 UART: [kat] ++
33,133,417 UART: [kat] sha1
33,143,761 UART: [kat] SHA2-256
33,146,456 UART: [kat] SHA2-384
33,151,472 UART: [kat] SHA2-512-ACC
33,153,875 UART: [kat] ECC-384
35,439,639 UART: [kat] HMAC-384Kdf
35,452,028 UART: [kat] LMS
36,642,110 UART: [kat] --
36,646,248 UART: [update-reset] ++
36,747,198 >>> mbox cmd response: failed
36,748,871 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,892,304 UART: ROM Non-Fatal Error: 0x000B001D
36,893,738 UART: [state] Locking Datavault
36,894,818 UART: [state] Locking PCR0, PCR1 and PCR31
36,896,362 UART: [state] Locking ICCM
36,897,240 UART: [exit] Launching FMC @ 0x40000130
36,898,581 UART:
36,898,730 UART: Running Caliptra FMC ...
36,899,827 UART:
36,899,981 UART: [state] CFI Enabled
36,900,813 UART: [art] Extend RT PCRs Done
36,901,866 UART: [art] Lock RT PCRs Done
36,902,879 UART: [art] Populate DV Done
36,903,823 UART: [fht] FMC Alias Private Key: 7
36,905,052 UART: [art] Derive CDI
36,905,798 UART: [art] Store in in slot 0x4
36,906,980 UART: [art] Derive Key Pair
36,907,894 UART: [art] Store priv key in slot 0x5
40,110,689 UART: [art] Derive Key Pair - Done
40,123,876 UART: [art] Signing Cert with AUTHO
40,125,288 UART: RITY.KEYID = 7
42,404,743 UART: [art] Erasing AUTHORITY.KEYID = 7
42,406,259 UART: [art] PUB.X = E025BDB806B041FF3950FA88C45C4C8BD5C64034D003F174DB3B1175AFF8D1C052577DD118AFB868ECE7F5A59821BD7B
42,413,503 UART: [art] PUB.Y = 73C50651A0ED21E2488E6596D73F51A22B9A0214046E9348EC291350CC8AC195E1E29ACF0135DF70DE7F04AD6A5B6387
42,420,731 UART: [art] SIG.R = 57D423F4A4D2A4F376E7EFD195EF38CE1AC33C2AD64A575DD16B85CAF2BE6043C1F6DD6507006D2D44F32E9BEFFC5D93
42,428,128 UART: [art] SIG.S = 86ABD7ECD0EDEFBB32B75F3AC2CA7DC73769C89D569962C03005D14A2F2F8AD4DCD4ED4D6D5C972EC307105A14E3DF61
43,733,377 UART: Caliptra RT
43,734,101 UART: [state] CFI Enabled
44,024,328 UART: [rt] RT listening for mailbox commands...
44,026,756 UART:
44,026,929 UART: Running Caliptra ROM ...
44,028,053 UART:
44,028,387 UART: [state] CFI Enabled
44,043,248 UART: [state] LifecycleState = Unprovisioned
44,045,140 UART: [state] DebugLocked = No
44,046,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,051,903 UART: [kat] SHA2-256
44,221,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,232,179 UART: [kat] ++
44,232,724 UART: [kat] sha1
44,243,887 UART: [kat] SHA2-256
44,246,579 UART: [kat] SHA2-384
44,252,561 UART: [kat] SHA2-512-ACC
44,254,916 UART: [kat] ECC-384
46,539,512 UART: [kat] HMAC-384Kdf
46,551,849 UART: [kat] LMS
47,741,917 UART: [kat] --
47,748,059 UART: [update-reset] ++
51,877,915 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,881,105 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,263,380 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,131,317 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,324 >>> mbox cmd response: success
18,076,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,720,049 UART:
23,720,480 UART: Running Caliptra FMC ...
23,721,614 UART:
23,721,783 UART: [state] CFI Enabled
23,729,450 UART: [fht] FMC Alias Private Key: 7
26,060,550 UART: [art] Extend RT PCRs Done
26,061,783 UART: [art] Lock RT PCRs Done
26,063,499 UART: [art] Populate DV Done
26,068,649 UART: [fht] FMC Alias Private Key: 7
26,070,163 UART: [art] Derive CDI
26,070,986 UART: [art] Store in in slot 0x4
26,113,872 UART: [art] Derive Key Pair
26,114,916 UART: [art] Store priv key in slot 0x5
29,357,297 UART: [art] Derive Key Pair - Done
29,370,028 UART: [art] Signing Cert with AUTHO
29,371,332 UART: RITY.KEYID = 7
31,650,542 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,053 UART: [art] PUB.X = 97189E755CF9A1D69E7BF850D62211EDBF976D469415219708B6CDBE13CF69E8DBB097737E077BF596352CD686A44126
31,659,306 UART: [art] PUB.Y = 05B39ADB25189959A070D957321A631A9BACAF494DA14174B60D7ADD4C1859C5324FDCCB1A10A79C36299BA0C9D2FC24
31,666,512 UART: [art] SIG.R = 60369F7704546AADF5B7DEAC3FC8F666782970CD76466D542B8D80BC370DCC251639320DE7086F930CF315AD5E23F217
31,673,916 UART: [art] SIG.S = 75F61064358CF1089F13AFC097B4327A3D2B98A9216DB1999D7F4BF77789FB6483AF81B274CCF19AE495FB3602D04717
32,979,167 UART: Caliptra RT
32,979,879 UART: [state] CFI Enabled
33,096,295 UART: [rt] RT listening for mailbox commands...
36,730,631 >>> mbox cmd response: failed
36,732,407 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,875,818 UART:
36,876,130 UART: Running Caliptra FMC ...
36,877,259 UART:
36,877,442 UART: [state] CFI Enabled
36,878,367 UART: [art] Extend RT PCRs Done
36,879,509 UART: [art] Lock RT PCRs Done
36,880,578 UART: [art] Populate DV Done
36,881,683 UART: [fht] FMC Alias Private Key: 7
36,883,013 UART: [art] Derive CDI
36,883,754 UART: [art] Store in in slot 0x4
36,884,927 UART: [art] Derive Key Pair
36,885,869 UART: [art] Store priv key in slot 0x5
40,086,518 UART: [art] Derive Key Pair - Done
40,099,089 UART: [art] Signing Cert with AUTHO
40,100,435 UART: RITY.KEYID = 7
42,379,533 UART: [art] Erasing AUTHORITY.KEYID = 7
42,381,036 UART: [art] PUB.X = 97189E755CF9A1D69E7BF850D62211EDBF976D469415219708B6CDBE13CF69E8DBB097737E077BF596352CD686A44126
42,388,299 UART: [art] PUB.Y = 05B39ADB25189959A070D957321A631A9BACAF494DA14174B60D7ADD4C1859C5324FDCCB1A10A79C36299BA0C9D2FC24
42,395,534 UART: [art] SIG.R = 60369F7704546AADF5B7DEAC3FC8F666782970CD76466D542B8D80BC370DCC251639320DE7086F930CF315AD5E23F217
42,402,934 UART: [art] SIG.S = 75F61064358CF1089F13AFC097B4327A3D2B98A9216DB1999D7F4BF77789FB6483AF81B274CCF19AE495FB3602D04717
43,708,203 UART: Caliptra RT
43,708,921 UART: [state] CFI Enabled
43,998,836 UART: [rt] RT listening for mailbox commands...
52,511,565 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,303 UART:
192,656 UART: Running Caliptra ROM ...
193,862 UART:
194,018 UART: [state] CFI Enabled
260,369 UART: [state] LifecycleState = Unprovisioned
262,241 UART: [state] DebugLocked = No
265,141 UART: [state] WD Timer not started. Device not locked for debugging
268,798 UART: [kat] SHA2-256
447,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,488 UART: [kat] ++
459,939 UART: [kat] sha1
470,920 UART: [kat] SHA2-256
473,932 UART: [kat] SHA2-384
479,425 UART: [kat] SHA2-512-ACC
482,359 UART: [kat] ECC-384
2,945,153 UART: [kat] HMAC-384Kdf
2,967,532 UART: [kat] LMS
3,496,989 UART: [kat] --
3,500,620 UART: [cold-reset] ++
3,501,962 UART: [fht] FHT @ 0x50003400
3,512,127 UART: [idev] ++
3,512,692 UART: [idev] CDI.KEYID = 6
3,513,621 UART: [idev] SUBJECT.KEYID = 7
3,514,836 UART: [idev] UDS.KEYID = 0
3,517,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,907 UART: [idev] Erasing UDS.KEYID = 0
6,021,906 UART: [idev] Sha1 KeyId Algorithm
6,044,274 UART: [idev] --
6,049,459 UART: [ldev] ++
6,050,031 UART: [ldev] CDI.KEYID = 6
6,050,945 UART: [ldev] SUBJECT.KEYID = 5
6,052,112 UART: [ldev] AUTHORITY.KEYID = 7
6,053,401 UART: [ldev] FE.KEYID = 1
6,097,343 UART: [ldev] Erasing FE.KEYID = 1
8,602,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,093 UART: [ldev] --
10,411,548 UART: [fwproc] Wait for Commands...
10,413,479 UART: [fwproc] Recv command 0x46574c44
10,415,577 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,011 >>> mbox cmd response: success
14,278,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,422,087 UART: [afmc] ++
14,422,737 UART: [afmc] CDI.KEYID = 6
14,423,654 UART: [afmc] SUBJECT.KEYID = 7
14,424,704 UART: [afmc] AUTHORITY.KEYID = 5
16,808,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,961 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,495 UART: [afmc] --
18,605,954 UART: [cold-reset] --
18,609,866 UART: [state] Locking Datavault
18,613,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,060 UART: [state] Locking ICCM
18,616,012 UART: [exit] Launching FMC @ 0x40000130
18,624,413 UART:
18,624,656 UART: Running Caliptra FMC ...
18,625,713 UART:
18,625,862 UART: [state] CFI Enabled
18,687,862 UART: [fht] FMC Alias Private Key: 7
20,451,708 UART: [art] Extend RT PCRs Done
20,452,933 UART: [art] Lock RT PCRs Done
20,454,558 UART: [art] Populate DV Done
20,459,959 UART: [fht] FMC Alias Private Key: 7
20,461,507 UART: [art] Derive CDI
20,462,243 UART: [art] Store in in slot 0x4
20,519,843 UART: [art] Derive Key Pair
20,520,844 UART: [art] Store priv key in slot 0x5
22,983,701 UART: [art] Derive Key Pair - Done
22,996,257 UART: [art] Signing Cert with AUTHO
22,997,551 UART: RITY.KEYID = 7
24,709,846 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,349 UART: [art] PUB.X = 998EE2DB67FFDB8F6E67AEC0EEAB0ADEA7B416D0AC041122A99145E1261F8660460BFF2E4484AE58642286A30F0A40B0
24,718,647 UART: [art] PUB.Y = 7B84438048599ED7F077FF067AD21B2550101C20B9A29A9179B4166B3D6B48B8E620465D377AD3FB358F3064623DFD91
24,725,856 UART: [art] SIG.R = 4BF0297BA3438284F11EE0A445EE3EFD2F9AB739AA01FADA01B9F9328DDF1D9ACF4BBC81736B7EB5225017E48CFCCAD3
24,733,296 UART: [art] SIG.S = 0BFCE4F1BC5838562FB3C9F78469EDBEE43D2234FA4FFBEE88718C084F21274645DB6631DE5D73BB7FF67D051C0163B7
25,712,634 UART: Caliptra RT
25,713,327 UART: [state] CFI Enabled
25,876,354 UART: [rt] RT listening for mailbox commands...
25,879,533 UART:
25,879,780 UART: Running Caliptra ROM ...
25,880,881 UART:
25,881,034 UART: [state] CFI Enabled
25,945,190 UART: [state] LifecycleState = Unprovisioned
25,947,058 UART: [state] DebugLocked = No
25,949,820 UART: [state] WD Timer not started. Device not locked for debugging
25,953,283 UART: [kat] SHA2-256
26,132,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,144,026 UART: [kat] ++
26,144,508 UART: [kat] sha1
26,155,175 UART: [kat] SHA2-256
26,158,204 UART: [kat] SHA2-384
26,165,110 UART: [kat] SHA2-512-ACC
26,168,056 UART: [kat] ECC-384
28,628,354 UART: [kat] HMAC-384Kdf
28,650,843 UART: [kat] LMS
29,180,277 UART: [kat] --
29,186,016 UART: [update-reset] ++
29,223,649 >>> mbox cmd response: failed
29,225,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,369,299 UART: ROM Non-Fatal Error: 0x000B001D
29,370,740 UART: [state] Locking Datavault
29,371,890 UART: [state] Locking PCR0, PCR1 and PCR31
29,373,428 UART: [state] Locking ICCM
29,374,334 UART: [exit] Launching FMC @ 0x40000130
29,375,774 UART:
29,375,945 UART: Running Caliptra FMC ...
29,377,043 UART:
29,377,200 UART: [state] CFI Enabled
29,378,120 UART: [art] Extend RT PCRs Done
29,379,256 UART: [art] Lock RT PCRs Done
29,380,270 UART: [art] Populate DV Done
29,381,240 UART: [fht] FMC Alias Private Key: 7
29,382,551 UART: [art] Derive CDI
29,383,286 UART: [art] Store in in slot 0x4
29,415,461 UART: [art] Derive Key Pair
29,416,506 UART: [art] Store priv key in slot 0x5
31,877,990 UART: [art] Derive Key Pair - Done
31,891,154 UART: [art] Signing Cert with AUTHO
31,892,455 UART: RITY.KEYID = 7
33,604,638 UART: [art] Erasing AUTHORITY.KEYID = 7
33,606,170 UART: [art] PUB.X = 998EE2DB67FFDB8F6E67AEC0EEAB0ADEA7B416D0AC041122A99145E1261F8660460BFF2E4484AE58642286A30F0A40B0
33,613,464 UART: [art] PUB.Y = 7B84438048599ED7F077FF067AD21B2550101C20B9A29A9179B4166B3D6B48B8E620465D377AD3FB358F3064623DFD91
33,620,669 UART: [art] SIG.R = 4BF0297BA3438284F11EE0A445EE3EFD2F9AB739AA01FADA01B9F9328DDF1D9ACF4BBC81736B7EB5225017E48CFCCAD3
33,628,098 UART: [art] SIG.S = 0BFCE4F1BC5838562FB3C9F78469EDBEE43D2234FA4FFBEE88718C084F21274645DB6631DE5D73BB7FF67D051C0163B7
34,606,508 UART: Caliptra RT
34,607,201 UART: [state] CFI Enabled
34,946,620 UART: [rt] RT listening for mailbox commands...
34,949,600 UART:
34,949,856 UART: Running Caliptra ROM ...
34,950,886 UART:
34,951,038 UART: [state] CFI Enabled
35,011,132 UART: [state] LifecycleState = Unprovisioned
35,012,969 UART: [state] DebugLocked = No
35,014,472 UART: [state] WD Timer not started. Device not locked for debugging
35,017,770 UART: [kat] SHA2-256
35,196,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,208,442 UART: [kat] ++
35,208,978 UART: [kat] sha1
35,220,842 UART: [kat] SHA2-256
35,223,850 UART: [kat] SHA2-384
35,229,720 UART: [kat] SHA2-512-ACC
35,232,657 UART: [kat] ECC-384
37,694,653 UART: [kat] HMAC-384Kdf
37,720,576 UART: [kat] LMS
38,250,017 UART: [kat] --
38,253,259 UART: [update-reset] ++
41,679,845 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,683,534 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,066,856 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,381,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,095,980 >>> mbox cmd response: success
14,097,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,384,760 UART:
18,385,159 UART: Running Caliptra FMC ...
18,386,291 UART:
18,386,453 UART: [state] CFI Enabled
18,451,579 UART: [fht] FMC Alias Private Key: 7
20,215,455 UART: [art] Extend RT PCRs Done
20,216,667 UART: [art] Lock RT PCRs Done
20,218,396 UART: [art] Populate DV Done
20,224,020 UART: [fht] FMC Alias Private Key: 7
20,225,726 UART: [art] Derive CDI
20,226,547 UART: [art] Store in in slot 0x4
20,283,368 UART: [art] Derive Key Pair
20,284,433 UART: [art] Store priv key in slot 0x5
22,747,151 UART: [art] Derive Key Pair - Done
22,759,987 UART: [art] Signing Cert with AUTHO
22,761,296 UART: RITY.KEYID = 7
24,473,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,040 UART: [art] PUB.X = 1FA4AB8227FEF4175D53CE157D4DD73B0DE239F4C0BEB5B2428BCF5770D0A9ADCB668AB009FC2A2F11A27FC9FF0DC570
24,482,322 UART: [art] PUB.Y = 95D8A14643C8FC617FF147878065CEA576D9F74E8F328A985F23E32835BF044658100EBBAE20F55D8525D9C70665A0CF
24,489,557 UART: [art] SIG.R = 47094593C4D8CCABDEEB642DC303D8394BF253BEAF6F4D68F7C44052715F48520FF08118694F554957E9CE2611113810
24,496,932 UART: [art] SIG.S = 112412F952965C527D2953CFE27BEC23F28D2C09AF9E6A3A86E82C40D085D96A8A2698943EC11D6CC4D3158BC0CA1B36
25,476,347 UART: Caliptra RT
25,477,041 UART: [state] CFI Enabled
25,643,484 UART: [rt] RT listening for mailbox commands...
28,833,390 >>> mbox cmd response: failed
28,835,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,979,189 UART:
28,979,510 UART: Running Caliptra FMC ...
28,980,570 UART:
28,980,720 UART: [state] CFI Enabled
28,981,655 UART: [art] Extend RT PCRs Done
28,982,799 UART: [art] Lock RT PCRs Done
28,983,796 UART: [art] Populate DV Done
28,984,902 UART: [fht] FMC Alias Private Key: 7
28,986,146 UART: [art] Derive CDI
28,986,872 UART: [art] Store in in slot 0x4
29,009,536 UART: [art] Derive Key Pair
29,010,545 UART: [art] Store priv key in slot 0x5
31,473,541 UART: [art] Derive Key Pair - Done
31,486,230 UART: [art] Signing Cert with AUTHO
31,487,539 UART: RITY.KEYID = 7
33,199,126 UART: [art] Erasing AUTHORITY.KEYID = 7
33,200,636 UART: [art] PUB.X = 1FA4AB8227FEF4175D53CE157D4DD73B0DE239F4C0BEB5B2428BCF5770D0A9ADCB668AB009FC2A2F11A27FC9FF0DC570
33,207,943 UART: [art] PUB.Y = 95D8A14643C8FC617FF147878065CEA576D9F74E8F328A985F23E32835BF044658100EBBAE20F55D8525D9C70665A0CF
33,215,181 UART: [art] SIG.R = 47094593C4D8CCABDEEB642DC303D8394BF253BEAF6F4D68F7C44052715F48520FF08118694F554957E9CE2611113810
33,222,568 UART: [art] SIG.S = 112412F952965C527D2953CFE27BEC23F28D2C09AF9E6A3A86E82C40D085D96A8A2698943EC11D6CC4D3158BC0CA1B36
34,201,458 UART: Caliptra RT
34,202,162 UART: [state] CFI Enabled
34,540,760 UART: [rt] RT listening for mailbox commands...
41,525,620 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,436 UART:
192,797 UART: Running Caliptra ROM ...
193,884 UART:
603,607 UART: [state] CFI Enabled
619,330 UART: [state] LifecycleState = Unprovisioned
621,177 UART: [state] DebugLocked = No
623,800 UART: [state] WD Timer not started. Device not locked for debugging
628,268 UART: [kat] SHA2-256
807,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,979 UART: [kat] ++
819,506 UART: [kat] sha1
831,524 UART: [kat] SHA2-256
834,537 UART: [kat] SHA2-384
839,274 UART: [kat] SHA2-512-ACC
842,258 UART: [kat] ECC-384
3,283,767 UART: [kat] HMAC-384Kdf
3,296,920 UART: [kat] LMS
3,826,425 UART: [kat] --
3,830,704 UART: [cold-reset] ++
3,832,282 UART: [fht] FHT @ 0x50003400
3,843,650 UART: [idev] ++
3,844,256 UART: [idev] CDI.KEYID = 6
3,845,174 UART: [idev] SUBJECT.KEYID = 7
3,846,336 UART: [idev] UDS.KEYID = 0
3,849,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,861 UART: [idev] Erasing UDS.KEYID = 0
6,316,550 UART: [idev] Sha1 KeyId Algorithm
6,339,243 UART: [idev] --
6,341,839 UART: [ldev] ++
6,342,410 UART: [ldev] CDI.KEYID = 6
6,343,298 UART: [ldev] SUBJECT.KEYID = 5
6,344,434 UART: [ldev] AUTHORITY.KEYID = 7
6,345,774 UART: [ldev] FE.KEYID = 1
6,357,638 UART: [ldev] Erasing FE.KEYID = 1
8,832,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,797 UART: [ldev] --
10,622,734 UART: [fwproc] Wait for Commands...
10,625,159 UART: [fwproc] Recv command 0x46574c44
10,627,255 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,782 >>> mbox cmd response: success
14,488,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,632,423 UART: [afmc] ++
14,633,065 UART: [afmc] CDI.KEYID = 6
14,633,959 UART: [afmc] SUBJECT.KEYID = 7
14,635,027 UART: [afmc] AUTHORITY.KEYID = 5
16,996,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,870 UART: [afmc] --
18,791,001 UART: [cold-reset] --
18,794,268 UART: [state] Locking Datavault
18,798,493 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,191 UART: [state] Locking ICCM
18,802,295 UART: [exit] Launching FMC @ 0x40000130
18,810,690 UART:
18,810,926 UART: Running Caliptra FMC ...
18,812,029 UART:
18,812,209 UART: [state] CFI Enabled
18,820,477 UART: [fht] FMC Alias Private Key: 7
20,577,560 UART: [art] Extend RT PCRs Done
20,578,782 UART: [art] Lock RT PCRs Done
20,580,211 UART: [art] Populate DV Done
20,585,563 UART: [fht] FMC Alias Private Key: 7
20,587,260 UART: [art] Derive CDI
20,587,994 UART: [art] Store in in slot 0x4
20,630,646 UART: [art] Derive Key Pair
20,631,645 UART: [art] Store priv key in slot 0x5
23,058,494 UART: [art] Derive Key Pair - Done
23,071,486 UART: [art] Signing Cert with AUTHO
23,072,787 UART: RITY.KEYID = 7
24,778,121 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,623 UART: [art] PUB.X = 03B7AC682CE6624B4B15B4F134E4B98C03108D94CDAB8156FC6A1D0002234D8E8BD1462C8AF8B3380686AFBA43F1D8E6
24,786,828 UART: [art] PUB.Y = 2F6A6A00DA5C48C8736C99012530CFC93849061F330AD8DE76F43A711B1480F80E7B1F8F3DA7B8C8D0139D99CCA6FBA0
24,794,087 UART: [art] SIG.R = D7F650C8F4ED8447C3DC32C7DCB9C1FFB173557EAEC709F9C729E6CFDD42026159157E17535C80360568E0F7E36FE12E
24,801,535 UART: [art] SIG.S = 78E45F5D12505BF54B3C3D973C22CBF02D0321A799A55B1EB03D6A13876D43FB4A177E1E986ABED4568A03F6837489BD
25,780,660 UART: Caliptra RT
25,781,355 UART: [state] CFI Enabled
25,897,913 UART: [rt] RT listening for mailbox commands...
25,900,637 UART:
25,900,801 UART: Running Caliptra ROM ...
25,901,907 UART:
25,902,224 UART: [state] CFI Enabled
25,915,312 UART: [state] LifecycleState = Unprovisioned
25,917,281 UART: [state] DebugLocked = No
25,918,583 UART: [state] WD Timer not started. Device not locked for debugging
25,922,103 UART: [kat] SHA2-256
26,101,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,112,831 UART: [kat] ++
26,113,284 UART: [kat] sha1
26,123,374 UART: [kat] SHA2-256
26,126,390 UART: [kat] SHA2-384
26,133,509 UART: [kat] SHA2-512-ACC
26,136,454 UART: [kat] ECC-384
28,580,299 UART: [kat] HMAC-384Kdf
28,592,733 UART: [kat] LMS
29,122,259 UART: [kat] --
29,127,511 UART: [update-reset] ++
29,166,387 >>> mbox cmd response: failed
29,168,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,311,855 UART: ROM Non-Fatal Error: 0x000B001D
29,313,289 UART: [state] Locking Datavault
29,314,447 UART: [state] Locking PCR0, PCR1 and PCR31
29,315,986 UART: [state] Locking ICCM
29,316,896 UART: [exit] Launching FMC @ 0x40000130
29,318,322 UART:
29,318,501 UART: Running Caliptra FMC ...
29,319,604 UART:
29,319,759 UART: [state] CFI Enabled
29,320,673 UART: [art] Extend RT PCRs Done
29,321,812 UART: [art] Lock RT PCRs Done
29,322,876 UART: [art] Populate DV Done
29,323,903 UART: [fht] FMC Alias Private Key: 7
29,325,222 UART: [art] Derive CDI
29,325,956 UART: [art] Store in in slot 0x4
29,327,119 UART: [art] Derive Key Pair
29,328,057 UART: [art] Store priv key in slot 0x5
31,713,721 UART: [art] Derive Key Pair - Done
31,726,276 UART: [art] Signing Cert with AUTHO
31,727,577 UART: RITY.KEYID = 7
33,433,158 UART: [art] Erasing AUTHORITY.KEYID = 7
33,434,657 UART: [art] PUB.X = 03B7AC682CE6624B4B15B4F134E4B98C03108D94CDAB8156FC6A1D0002234D8E8BD1462C8AF8B3380686AFBA43F1D8E6
33,442,010 UART: [art] PUB.Y = 2F6A6A00DA5C48C8736C99012530CFC93849061F330AD8DE76F43A711B1480F80E7B1F8F3DA7B8C8D0139D99CCA6FBA0
33,449,157 UART: [art] SIG.R = D7F650C8F4ED8447C3DC32C7DCB9C1FFB173557EAEC709F9C729E6CFDD42026159157E17535C80360568E0F7E36FE12E
33,456,557 UART: [art] SIG.S = 78E45F5D12505BF54B3C3D973C22CBF02D0321A799A55B1EB03D6A13876D43FB4A177E1E986ABED4568A03F6837489BD
34,435,307 UART: Caliptra RT
34,435,994 UART: [state] CFI Enabled
34,724,527 UART: [rt] RT listening for mailbox commands...
34,727,425 UART:
34,727,683 UART: Running Caliptra ROM ...
34,728,805 UART:
34,728,962 UART: [state] CFI Enabled
40,321,116 UART: [state] LifecycleState = Unprovisioned
40,322,981 UART: [state] DebugLocked = No
40,324,883 UART: [state] WD Timer not started. Device not locked for debugging
40,328,847 UART: [kat] SHA2-256
40,508,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,519,621 UART: [kat] ++
40,520,099 UART: [kat] sha1
40,531,309 UART: [kat] SHA2-256
40,534,381 UART: [kat] SHA2-384
40,541,658 UART: [kat] SHA2-512-ACC
40,544,599 UART: [kat] ECC-384
42,984,969 UART: [kat] HMAC-384Kdf
42,997,780 UART: [kat] LMS
43,527,248 UART: [kat] --
43,531,097 UART: [update-reset] ++
46,953,445 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,957,664 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,341,004 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,694,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,533 >>> mbox cmd response: success
14,271,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,517,187 UART:
18,517,628 UART: Running Caliptra FMC ...
18,518,728 UART:
18,518,883 UART: [state] CFI Enabled
18,526,751 UART: [fht] FMC Alias Private Key: 7
20,283,656 UART: [art] Extend RT PCRs Done
20,284,889 UART: [art] Lock RT PCRs Done
20,286,270 UART: [art] Populate DV Done
20,291,843 UART: [fht] FMC Alias Private Key: 7
20,293,492 UART: [art] Derive CDI
20,294,227 UART: [art] Store in in slot 0x4
20,336,448 UART: [art] Derive Key Pair
20,337,486 UART: [art] Store priv key in slot 0x5
22,763,803 UART: [art] Derive Key Pair - Done
22,776,691 UART: [art] Signing Cert with AUTHO
22,778,001 UART: RITY.KEYID = 7
24,483,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,985 UART: [art] PUB.X = 8D37278BB223C3323418D032DB0910FB79F007377C9359C2C5F4DE7AF91C12AF51428CB85F42F1018E72A878CCE544B0
24,492,199 UART: [art] PUB.Y = D920A192D9323F3F62E2D488E6BB4FAC8704A5F58941106AC17E167C97C6A3E8D0BFEC026F5C2F8C2D9E06A97D1BA60F
24,499,464 UART: [art] SIG.R = CDAED21B784FEFA2F4967152F3EE582705E1550F8EF604223AF7AB2096A66AB129C68648581F586800500B7F860FCE05
24,506,839 UART: [art] SIG.S = DA4308175F402A6412587EEBC998C7515F9E2D395C5AC8705A17EBDAAED78E677863887B0F6762307D32DB9FE7755A77
25,485,333 UART: Caliptra RT
25,486,023 UART: [state] CFI Enabled
25,603,243 UART: [rt] RT listening for mailbox commands...
28,726,643 >>> mbox cmd response: failed
28,728,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,872,075 UART:
28,872,405 UART: Running Caliptra FMC ...
28,873,480 UART:
28,873,638 UART: [state] CFI Enabled
28,874,570 UART: [art] Extend RT PCRs Done
28,875,711 UART: [art] Lock RT PCRs Done
28,876,774 UART: [art] Populate DV Done
28,877,887 UART: [fht] FMC Alias Private Key: 7
28,879,213 UART: [art] Derive CDI
28,879,955 UART: [art] Store in in slot 0x4
28,881,123 UART: [art] Derive Key Pair
28,882,063 UART: [art] Store priv key in slot 0x5
31,265,585 UART: [art] Derive Key Pair - Done
31,278,361 UART: [art] Signing Cert with AUTHO
31,279,666 UART: RITY.KEYID = 7
32,985,339 UART: [art] Erasing AUTHORITY.KEYID = 7
32,986,842 UART: [art] PUB.X = 8D37278BB223C3323418D032DB0910FB79F007377C9359C2C5F4DE7AF91C12AF51428CB85F42F1018E72A878CCE544B0
32,994,058 UART: [art] PUB.Y = D920A192D9323F3F62E2D488E6BB4FAC8704A5F58941106AC17E167C97C6A3E8D0BFEC026F5C2F8C2D9E06A97D1BA60F
33,001,345 UART: [art] SIG.R = CDAED21B784FEFA2F4967152F3EE582705E1550F8EF604223AF7AB2096A66AB129C68648581F586800500B7F860FCE05
33,008,677 UART: [art] SIG.S = DA4308175F402A6412587EEBC998C7515F9E2D395C5AC8705A17EBDAAED78E677863887B0F6762307D32DB9FE7755A77
33,987,759 UART: Caliptra RT
33,988,476 UART: [state] CFI Enabled
34,277,837 UART: [rt] RT listening for mailbox commands...
47,205,027 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,120 UART:
192,495 UART: Running Caliptra ROM ...
193,715 UART:
193,869 UART: [state] CFI Enabled
261,338 UART: [state] LifecycleState = Unprovisioned
263,758 UART: [state] DebugLocked = No
266,385 UART: [state] WD Timer not started. Device not locked for debugging
271,395 UART: [kat] SHA2-256
461,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,053 UART: [kat] ++
472,593 UART: [kat] sha1
483,424 UART: [kat] SHA2-256
486,435 UART: [kat] SHA2-384
491,712 UART: [kat] SHA2-512-ACC
494,316 UART: [kat] ECC-384
2,943,702 UART: [kat] HMAC-384Kdf
2,965,820 UART: [kat] LMS
3,497,595 UART: [kat] --
3,500,898 UART: [cold-reset] ++
3,502,083 UART: [fht] FHT @ 0x50003400
3,513,830 UART: [idev] ++
3,514,506 UART: [idev] CDI.KEYID = 6
3,515,524 UART: [idev] SUBJECT.KEYID = 7
3,516,682 UART: [idev] UDS.KEYID = 0
3,519,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,630 UART: [idev] Erasing UDS.KEYID = 0
6,024,056 UART: [idev] Sha1 KeyId Algorithm
6,046,047 UART: [idev] --
6,050,693 UART: [ldev] ++
6,051,379 UART: [ldev] CDI.KEYID = 6
6,052,298 UART: [ldev] SUBJECT.KEYID = 5
6,053,460 UART: [ldev] AUTHORITY.KEYID = 7
6,054,694 UART: [ldev] FE.KEYID = 1
6,095,753 UART: [ldev] Erasing FE.KEYID = 1
8,602,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,114 UART: [ldev] --
10,406,791 UART: [fwproc] Wait for Commands...
10,409,696 UART: [fwproc] Recv command 0x46574c44
10,412,014 UART: [fwproc] Recv'd Img size: 114448 bytes
13,859,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,597,852 >>> mbox cmd response: success
14,600,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,745,065 UART: [afmc] ++
14,745,740 UART: [afmc] CDI.KEYID = 6
14,746,662 UART: [afmc] SUBJECT.KEYID = 7
14,747,718 UART: [afmc] AUTHORITY.KEYID = 5
17,145,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,889,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,891,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,906,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,921,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,936,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,960,755 UART: [afmc] --
18,965,054 UART: [cold-reset] --
18,968,215 UART: [state] Locking Datavault
18,974,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,407 UART: [state] Locking ICCM
18,977,889 UART: [exit] Launching FMC @ 0x40000130
18,986,561 UART:
18,986,808 UART: Running Caliptra FMC ...
18,987,850 UART:
18,987,999 UART: [state] CFI Enabled
19,045,796 UART: [fht] FMC Alias Private Key: 7
20,809,945 UART: [art] Extend RT PCRs Done
20,811,145 UART: [art] Lock RT PCRs Done
20,812,740 UART: [art] Populate DV Done
20,817,871 UART: [fht] FMC Alias Private Key: 7
20,819,379 UART: [art] Derive CDI
20,820,125 UART: [art] Store in in slot 0x4
20,878,080 UART: [art] Derive Key Pair
20,879,080 UART: [art] Store priv key in slot 0x5
23,342,138 UART: [art] Derive Key Pair - Done
23,355,135 UART: [art] Signing Cert with AUTHO
23,356,439 UART: RITY.KEYID = 7
25,068,133 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,625 UART: [art] PUB.X = 10165D85BC3A15A0673D0A3B6C378E23D652F88D04592D967A40B1615A2ED9780F404414120407395643172BDBD9EC63
25,076,885 UART: [art] PUB.Y = EDBC997C1C9C6C2BC8A987A151C087CE098E56AF9F0F65B5A74A8083C8E2D9C1CD63E96F0FFC1638CC7FC7660D1784DB
25,084,155 UART: [art] SIG.R = 5AB097F52D723FF3AB3610481D5059D4283E0AEF748AC7FF995543A959B2FAF2CB9F03F83A18CAB82DE92D763F3F65D5
25,091,585 UART: [art] SIG.S = 8ADF96BF4147352502F856C33FCC657E22428AD381EAB9D203C34496B2B61A22769701FFEB551186EFEFB67B45A5932E
26,070,800 UART: Caliptra RT
26,071,516 UART: [state] CFI Enabled
26,236,154 UART: [rt] RT listening for mailbox commands...
26,239,107 UART:
26,239,355 UART: Running Caliptra ROM ...
26,240,384 UART:
26,240,533 UART: [state] CFI Enabled
26,301,837 UART: [state] LifecycleState = Unprovisioned
26,303,929 UART: [state] DebugLocked = No
26,305,497 UART: [state] WD Timer not started. Device not locked for debugging
26,309,781 UART: [kat] SHA2-256
26,499,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,510,423 UART: [kat] ++
26,510,978 UART: [kat] sha1
26,522,299 UART: [kat] SHA2-256
26,525,306 UART: [kat] SHA2-384
26,531,559 UART: [kat] SHA2-512-ACC
26,534,131 UART: [kat] ECC-384
28,986,618 UART: [kat] HMAC-384Kdf
29,010,193 UART: [kat] LMS
29,541,752 UART: [kat] --
29,547,006 UART: [update-reset] ++
29,600,428 >>> mbox cmd response: failed
29,602,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,746,090 UART: ROM Non-Fatal Error: 0x000B001D
29,747,523 UART: [state] Locking Datavault
29,748,680 UART: [state] Locking PCR0, PCR1 and PCR31
29,750,217 UART: [state] Locking ICCM
29,751,121 UART: [exit] Launching FMC @ 0x40000130
29,752,563 UART:
29,752,724 UART: Running Caliptra FMC ...
29,753,825 UART:
29,753,993 UART: [state] CFI Enabled
29,754,911 UART: [art] Extend RT PCRs Done
29,756,048 UART: [art] Lock RT PCRs Done
29,757,113 UART: [art] Populate DV Done
29,758,137 UART: [fht] FMC Alias Private Key: 7
29,759,450 UART: [art] Derive CDI
29,760,185 UART: [art] Store in in slot 0x4
29,796,252 UART: [art] Derive Key Pair
29,797,286 UART: [art] Store priv key in slot 0x5
32,260,070 UART: [art] Derive Key Pair - Done
32,272,904 UART: [art] Signing Cert with AUTHO
32,274,202 UART: RITY.KEYID = 7
33,985,441 UART: [art] Erasing AUTHORITY.KEYID = 7
33,986,964 UART: [art] PUB.X = 10165D85BC3A15A0673D0A3B6C378E23D652F88D04592D967A40B1615A2ED9780F404414120407395643172BDBD9EC63
33,994,195 UART: [art] PUB.Y = EDBC997C1C9C6C2BC8A987A151C087CE098E56AF9F0F65B5A74A8083C8E2D9C1CD63E96F0FFC1638CC7FC7660D1784DB
34,001,475 UART: [art] SIG.R = 5AB097F52D723FF3AB3610481D5059D4283E0AEF748AC7FF995543A959B2FAF2CB9F03F83A18CAB82DE92D763F3F65D5
34,008,842 UART: [art] SIG.S = 8ADF96BF4147352502F856C33FCC657E22428AD381EAB9D203C34496B2B61A22769701FFEB551186EFEFB67B45A5932E
34,988,143 UART: Caliptra RT
34,988,853 UART: [state] CFI Enabled
35,325,064 UART: [rt] RT listening for mailbox commands...
35,327,705 UART:
35,327,873 UART: Running Caliptra ROM ...
35,328,978 UART:
35,329,132 UART: [state] CFI Enabled
35,390,098 UART: [state] LifecycleState = Unprovisioned
35,392,131 UART: [state] DebugLocked = No
35,393,513 UART: [state] WD Timer not started. Device not locked for debugging
35,397,960 UART: [kat] SHA2-256
35,587,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,598,564 UART: [kat] ++
35,599,049 UART: [kat] sha1
35,610,968 UART: [kat] SHA2-256
35,613,986 UART: [kat] SHA2-384
35,620,685 UART: [kat] SHA2-512-ACC
35,623,289 UART: [kat] ECC-384
38,075,247 UART: [kat] HMAC-384Kdf
38,099,080 UART: [kat] LMS
38,630,556 UART: [kat] --
38,635,740 UART: [update-reset] ++
42,095,556 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,098,282 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,706,508 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,438,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,189 >>> mbox cmd response: success
14,737,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,018,693 UART:
19,019,138 UART: Running Caliptra FMC ...
19,020,267 UART:
19,020,430 UART: [state] CFI Enabled
19,090,198 UART: [fht] FMC Alias Private Key: 7
20,854,256 UART: [art] Extend RT PCRs Done
20,855,487 UART: [art] Lock RT PCRs Done
20,856,953 UART: [art] Populate DV Done
20,862,368 UART: [fht] FMC Alias Private Key: 7
20,863,908 UART: [art] Derive CDI
20,864,724 UART: [art] Store in in slot 0x4
20,922,711 UART: [art] Derive Key Pair
20,923,709 UART: [art] Store priv key in slot 0x5
23,386,904 UART: [art] Derive Key Pair - Done
23,400,065 UART: [art] Signing Cert with AUTHO
23,401,390 UART: RITY.KEYID = 7
25,112,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,969 UART: [art] PUB.X = 57BA63D87DA3B2863B69706AF85494BAB1C8746FF2E8FE9A608A0D3533242F051893CF995378DA28EFFCD8A762046686
25,121,204 UART: [art] PUB.Y = 6D62A14A277B530B96929E6BED967F19B9952EC49CF1FA917CC259D79989F7EB76D47C11981A16962C51EF7AB64BC1E8
25,128,505 UART: [art] SIG.R = 9BFE53FA1849E02A75292C6657A5DB1FF3B1B428BA9DB380F5DC70800C448AC09D7CC42797B77364B9CD9A8E4020648F
25,135,890 UART: [art] SIG.S = 6DC57E38B9587701431A79699E21A27BC5DED3590E07A978DA8387CA6708523E70D71A254FCADE7A18AE1779F99E8916
26,114,316 UART: Caliptra RT
26,115,019 UART: [state] CFI Enabled
26,280,420 UART: [rt] RT listening for mailbox commands...
29,551,344 >>> mbox cmd response: failed
29,553,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,697,087 UART:
29,697,413 UART: Running Caliptra FMC ...
29,698,450 UART:
29,698,597 UART: [state] CFI Enabled
29,699,461 UART: [art] Extend RT PCRs Done
29,700,539 UART: [art] Lock RT PCRs Done
29,701,611 UART: [art] Populate DV Done
29,702,632 UART: [fht] FMC Alias Private Key: 7
29,703,866 UART: [art] Derive CDI
29,704,591 UART: [art] Store in in slot 0x4
29,734,033 UART: [art] Derive Key Pair
29,735,083 UART: [art] Store priv key in slot 0x5
32,197,144 UART: [art] Derive Key Pair - Done
32,210,049 UART: [art] Signing Cert with AUTHO
32,211,364 UART: RITY.KEYID = 7
33,923,597 UART: [art] Erasing AUTHORITY.KEYID = 7
33,925,114 UART: [art] PUB.X = 57BA63D87DA3B2863B69706AF85494BAB1C8746FF2E8FE9A608A0D3533242F051893CF995378DA28EFFCD8A762046686
33,932,367 UART: [art] PUB.Y = 6D62A14A277B530B96929E6BED967F19B9952EC49CF1FA917CC259D79989F7EB76D47C11981A16962C51EF7AB64BC1E8
33,939,593 UART: [art] SIG.R = 9BFE53FA1849E02A75292C6657A5DB1FF3B1B428BA9DB380F5DC70800C448AC09D7CC42797B77364B9CD9A8E4020648F
33,946,986 UART: [art] SIG.S = 6DC57E38B9587701431A79699E21A27BC5DED3590E07A978DA8387CA6708523E70D71A254FCADE7A18AE1779F99E8916
34,925,751 UART: Caliptra RT
34,926,458 UART: [state] CFI Enabled
35,260,032 UART: [rt] RT listening for mailbox commands...
42,937,015 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,519 UART:
192,886 UART: Running Caliptra ROM ...
194,104 UART:
603,713 UART: [state] CFI Enabled
617,769 UART: [state] LifecycleState = Unprovisioned
620,164 UART: [state] DebugLocked = No
623,122 UART: [state] WD Timer not started. Device not locked for debugging
628,067 UART: [kat] SHA2-256
817,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,728 UART: [kat] ++
829,313 UART: [kat] sha1
840,847 UART: [kat] SHA2-256
843,847 UART: [kat] SHA2-384
850,585 UART: [kat] SHA2-512-ACC
853,140 UART: [kat] ECC-384
3,296,519 UART: [kat] HMAC-384Kdf
3,308,963 UART: [kat] LMS
3,840,796 UART: [kat] --
3,843,517 UART: [cold-reset] ++
3,845,882 UART: [fht] FHT @ 0x50003400
3,856,048 UART: [idev] ++
3,856,727 UART: [idev] CDI.KEYID = 6
3,857,690 UART: [idev] SUBJECT.KEYID = 7
3,858,905 UART: [idev] UDS.KEYID = 0
3,861,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,490 UART: [idev] Erasing UDS.KEYID = 0
6,332,179 UART: [idev] Sha1 KeyId Algorithm
6,354,874 UART: [idev] --
6,359,030 UART: [ldev] ++
6,359,715 UART: [ldev] CDI.KEYID = 6
6,360,681 UART: [ldev] SUBJECT.KEYID = 5
6,361,842 UART: [ldev] AUTHORITY.KEYID = 7
6,363,068 UART: [ldev] FE.KEYID = 1
6,374,741 UART: [ldev] Erasing FE.KEYID = 1
8,847,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,206 UART: [ldev] --
10,637,207 UART: [fwproc] Wait for Commands...
10,639,261 UART: [fwproc] Recv command 0x46574c44
10,641,580 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,830,766 >>> mbox cmd response: success
14,832,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,976,524 UART: [afmc] ++
14,977,160 UART: [afmc] CDI.KEYID = 6
14,978,075 UART: [afmc] SUBJECT.KEYID = 7
14,979,123 UART: [afmc] AUTHORITY.KEYID = 5
17,342,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,347 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,111 UART: [afmc] --
19,144,816 UART: [cold-reset] --
19,148,405 UART: [state] Locking Datavault
19,155,543 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,684 UART: [state] Locking ICCM
19,159,457 UART: [exit] Launching FMC @ 0x40000130
19,168,124 UART:
19,168,357 UART: Running Caliptra FMC ...
19,169,404 UART:
19,169,552 UART: [state] CFI Enabled
19,177,330 UART: [fht] FMC Alias Private Key: 7
20,934,070 UART: [art] Extend RT PCRs Done
20,935,324 UART: [art] Lock RT PCRs Done
20,937,247 UART: [art] Populate DV Done
20,942,555 UART: [fht] FMC Alias Private Key: 7
20,944,140 UART: [art] Derive CDI
20,944,890 UART: [art] Store in in slot 0x4
20,987,653 UART: [art] Derive Key Pair
20,988,653 UART: [art] Store priv key in slot 0x5
23,415,276 UART: [art] Derive Key Pair - Done
23,428,557 UART: [art] Signing Cert with AUTHO
23,429,892 UART: RITY.KEYID = 7
25,135,624 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,134 UART: [art] PUB.X = 855C057A60D33D7AEC87A0F8E6CD528680488CCAE5E0B853154238DFF7F8FA92E3117169B7A84FB3769090AEEF2695C5
25,144,439 UART: [art] PUB.Y = 2D04EB88F42D83EF2A042ED7415B34409B9D2D658B0CE6B0F93F5B4A46BDBA928270F6A34A60B759BE718215340487BD
25,151,655 UART: [art] SIG.R = CD580A8A8BB2808137830A4D379FB2145B7C2716CAD76B5F8A085124CD2B284C024506D6EAAA30CC055F8F738A0FEAB1
25,159,028 UART: [art] SIG.S = 9C20CA9CDA9C6AEBBFCAFAE866E7C856C64EE1D4EBC5920A98F4AA8B1CB8788E9612861B06B59649522AC896C5D9AD4B
26,138,546 UART: Caliptra RT
26,139,244 UART: [state] CFI Enabled
26,255,682 UART: [rt] RT listening for mailbox commands...
26,258,686 UART:
26,258,936 UART: Running Caliptra ROM ...
26,260,039 UART:
26,260,311 UART: [state] CFI Enabled
26,274,459 UART: [state] LifecycleState = Unprovisioned
26,276,335 UART: [state] DebugLocked = No
26,277,977 UART: [state] WD Timer not started. Device not locked for debugging
26,282,532 UART: [kat] SHA2-256
26,472,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,483,160 UART: [kat] ++
26,483,773 UART: [kat] sha1
26,496,232 UART: [kat] SHA2-256
26,499,251 UART: [kat] SHA2-384
26,504,751 UART: [kat] SHA2-512-ACC
26,507,367 UART: [kat] ECC-384
28,949,180 UART: [kat] HMAC-384Kdf
28,961,354 UART: [kat] LMS
29,492,966 UART: [kat] --
29,498,842 UART: [update-reset] ++
29,552,557 >>> mbox cmd response: failed
29,554,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,698,141 UART: ROM Non-Fatal Error: 0x000B001D
29,699,566 UART: [state] Locking Datavault
29,700,715 UART: [state] Locking PCR0, PCR1 and PCR31
29,702,253 UART: [state] Locking ICCM
29,703,160 UART: [exit] Launching FMC @ 0x40000130
29,704,600 UART:
29,704,759 UART: Running Caliptra FMC ...
29,705,858 UART:
29,706,013 UART: [state] CFI Enabled
29,706,937 UART: [art] Extend RT PCRs Done
29,708,072 UART: [art] Lock RT PCRs Done
29,709,084 UART: [art] Populate DV Done
29,710,055 UART: [fht] FMC Alias Private Key: 7
29,711,369 UART: [art] Derive CDI
29,712,103 UART: [art] Store in in slot 0x4
29,713,270 UART: [art] Derive Key Pair
29,714,210 UART: [art] Store priv key in slot 0x5
32,099,822 UART: [art] Derive Key Pair - Done
32,112,884 UART: [art] Signing Cert with AUTHO
32,114,190 UART: RITY.KEYID = 7
33,819,945 UART: [art] Erasing AUTHORITY.KEYID = 7
33,821,464 UART: [art] PUB.X = 855C057A60D33D7AEC87A0F8E6CD528680488CCAE5E0B853154238DFF7F8FA92E3117169B7A84FB3769090AEEF2695C5
33,828,733 UART: [art] PUB.Y = 2D04EB88F42D83EF2A042ED7415B34409B9D2D658B0CE6B0F93F5B4A46BDBA928270F6A34A60B759BE718215340487BD
33,835,980 UART: [art] SIG.R = CD580A8A8BB2808137830A4D379FB2145B7C2716CAD76B5F8A085124CD2B284C024506D6EAAA30CC055F8F738A0FEAB1
33,843,376 UART: [art] SIG.S = 9C20CA9CDA9C6AEBBFCAFAE866E7C856C64EE1D4EBC5920A98F4AA8B1CB8788E9612861B06B59649522AC896C5D9AD4B
34,822,386 UART: Caliptra RT
34,823,076 UART: [state] CFI Enabled
35,111,389 UART: [rt] RT listening for mailbox commands...
35,114,096 UART:
35,114,268 UART: Running Caliptra ROM ...
35,115,376 UART:
35,115,750 UART: [state] CFI Enabled
40,330,078 UART: [state] LifecycleState = Unprovisioned
40,331,997 UART: [state] DebugLocked = No
40,333,744 UART: [state] WD Timer not started. Device not locked for debugging
40,338,247 UART: [kat] SHA2-256
40,528,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,538,866 UART: [kat] ++
40,539,405 UART: [kat] sha1
40,549,495 UART: [kat] SHA2-256
40,552,469 UART: [kat] SHA2-384
40,557,599 UART: [kat] SHA2-512-ACC
40,560,165 UART: [kat] ECC-384
43,003,041 UART: [kat] HMAC-384Kdf
43,015,599 UART: [kat] LMS
43,547,177 UART: [kat] --
43,552,103 UART: [update-reset] ++
47,010,590 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,013,739 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,621,976 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,761,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,078 >>> mbox cmd response: success
14,957,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,207,585 UART:
19,207,988 UART: Running Caliptra FMC ...
19,209,124 UART:
19,209,305 UART: [state] CFI Enabled
19,216,963 UART: [fht] FMC Alias Private Key: 7
20,973,752 UART: [art] Extend RT PCRs Done
20,974,963 UART: [art] Lock RT PCRs Done
20,976,506 UART: [art] Populate DV Done
20,981,956 UART: [fht] FMC Alias Private Key: 7
20,983,499 UART: [art] Derive CDI
20,984,239 UART: [art] Store in in slot 0x4
21,027,046 UART: [art] Derive Key Pair
21,028,050 UART: [art] Store priv key in slot 0x5
23,455,437 UART: [art] Derive Key Pair - Done
23,468,642 UART: [art] Signing Cert with AUTHO
23,469,955 UART: RITY.KEYID = 7
25,175,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,011 UART: [art] PUB.X = 024501BEE80C2340EDC65BBAEC940211BA16444E1B98CA3FCAB43D8C7736CE8295DAEDE4A09283B2A7A53C3D3D43547C
25,184,266 UART: [art] PUB.Y = AE80862B3B1E221FA3287863601BB6AEC5885ECC204C0443AD506029E4A119C2A0B0443AC9F84121B1FE37335B19319F
25,191,556 UART: [art] SIG.R = 24AA087EF3C62CE5357C7DCFB7CED83ED1B83009F8022BBD90CCC705E00524EB59239B621D363DDE9498B865DB3E80A1
25,199,001 UART: [art] SIG.S = 5E14A5E18F3B1C2961D8FE796B653FA06BA632CE199A440A61B68007A4D8F9C25052965DE706260B844E5B8A39518A17
26,177,524 UART: Caliptra RT
26,178,230 UART: [state] CFI Enabled
26,295,992 UART: [rt] RT listening for mailbox commands...
29,481,461 >>> mbox cmd response: failed
29,483,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,627,177 UART:
29,627,489 UART: Running Caliptra FMC ...
29,628,526 UART:
29,628,684 UART: [state] CFI Enabled
29,629,611 UART: [art] Extend RT PCRs Done
29,630,753 UART: [art] Lock RT PCRs Done
29,631,818 UART: [art] Populate DV Done
29,632,915 UART: [fht] FMC Alias Private Key: 7
29,634,233 UART: [art] Derive CDI
29,634,991 UART: [art] Store in in slot 0x4
29,636,164 UART: [art] Derive Key Pair
29,637,124 UART: [art] Store priv key in slot 0x5
32,021,151 UART: [art] Derive Key Pair - Done
32,033,880 UART: [art] Signing Cert with AUTHO
32,035,189 UART: RITY.KEYID = 7
33,740,529 UART: [art] Erasing AUTHORITY.KEYID = 7
33,742,030 UART: [art] PUB.X = 024501BEE80C2340EDC65BBAEC940211BA16444E1B98CA3FCAB43D8C7736CE8295DAEDE4A09283B2A7A53C3D3D43547C
33,749,346 UART: [art] PUB.Y = AE80862B3B1E221FA3287863601BB6AEC5885ECC204C0443AD506029E4A119C2A0B0443AC9F84121B1FE37335B19319F
33,756,593 UART: [art] SIG.R = 24AA087EF3C62CE5357C7DCFB7CED83ED1B83009F8022BBD90CCC705E00524EB59239B621D363DDE9498B865DB3E80A1
33,764,007 UART: [art] SIG.S = 5E14A5E18F3B1C2961D8FE796B653FA06BA632CE199A440A61B68007A4D8F9C25052965DE706260B844E5B8A39518A17
34,743,221 UART: Caliptra RT
34,743,904 UART: [state] CFI Enabled
35,034,648 UART: [rt] RT listening for mailbox commands...
47,886,939 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
907,052 UART: [kat] LMS
1,475,248 UART: [kat] --
1,475,819 UART: [cold-reset] ++
1,476,337 UART: [fht] Storing FHT @ 0x50003400
1,478,890 UART: [idev] ++
1,479,058 UART: [idev] CDI.KEYID = 6
1,479,418 UART: [idev] SUBJECT.KEYID = 7
1,479,842 UART: [idev] UDS.KEYID = 0
1,480,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,410 UART: [idev] Erasing UDS.KEYID = 0
1,504,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,672 UART: [idev] --
1,513,819 UART: [ldev] ++
1,513,987 UART: [ldev] CDI.KEYID = 6
1,514,350 UART: [ldev] SUBJECT.KEYID = 5
1,514,776 UART: [ldev] AUTHORITY.KEYID = 7
1,515,239 UART: [ldev] FE.KEYID = 1
1,520,321 UART: [ldev] Erasing FE.KEYID = 1
1,545,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,427 UART: [fwproc] Waiting for Commands...
1,586,106 UART: [fwproc] Received command 0x46574c44
1,586,897 UART: [fwproc] Received Image of size 114448 bytes
2,885,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,927 >>> mbox cmd response: success
3,078,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,080,103 UART: [afmc] ++
3,080,271 UART: [afmc] CDI.KEYID = 6
3,080,633 UART: [afmc] SUBJECT.KEYID = 7
3,081,058 UART: [afmc] AUTHORITY.KEYID = 5
3,115,941 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,638 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,328 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,389 UART: [afmc] --
3,159,489 UART: [cold-reset] --
3,160,383 UART: [state] Locking Datavault
3,161,444 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,048 UART: [state] Locking ICCM
3,162,536 UART: [exit] Launching FMC @ 0x40000130
3,167,865 UART:
3,167,881 UART: Running Caliptra FMC ...
3,168,289 UART:
3,168,343 UART: [state] CFI Enabled
3,178,724 UART: [fht] FMC Alias Private Key: 7
3,286,857 UART: [art] Extend RT PCRs Done
3,287,285 UART: [art] Lock RT PCRs Done
3,288,813 UART: [art] Populate DV Done
3,297,328 UART: [fht] FMC Alias Private Key: 7
3,298,304 UART: [art] Derive CDI
3,298,584 UART: [art] Store in in slot 0x4
3,384,683 UART: [art] Derive Key Pair
3,385,043 UART: [art] Store priv key in slot 0x5
3,398,447 UART: [art] Derive Key Pair - Done
3,413,313 UART: [art] Signing Cert with AUTHO
3,413,793 UART: RITY.KEYID = 7
3,429,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,836 UART: [art] PUB.X = 430F76749D3ACA6BF0F0F919CF564D714F70A22AF3E169E638DB90359AA578602E3610119D4F876DB5AB7F30A5C7C033
3,436,607 UART: [art] PUB.Y = C7821EECCDE65AC9834C42D12542265F2AAC0564D3D1B7AD172B68D3124CEFD25585DCD8C04BEA31B0DE4FEE3478F92E
3,443,574 UART: [art] SIG.R = 77C57EF24623CAD5B236A3598EEA5AB98F39A4608CA179A2EA8D500C4F0DD968DBC5CD7702019C5F4CFC2C8AE6E0F2EA
3,450,354 UART: [art] SIG.S = A1D577321854F153D9BCB0D2C1D5E9806376BE53003FA3B9B87F231BE5C12CFE9A33BA0648CED2D0D318EF3988C549F4
3,473,854 UART: Caliptra RT
3,474,107 UART: [state] CFI Enabled
3,582,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,927 UART:
3,583,943 UART: Running Caliptra ROM ...
3,584,351 UART:
3,584,405 UART: [state] CFI Enabled
3,587,287 UART: [state] LifecycleState = Unprovisioned
3,587,942 UART: [state] DebugLocked = No
3,588,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,037 UART: [kat] SHA2-256
4,383,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,083 UART: [kat] ++
4,388,235 UART: [kat] sha1
4,392,445 UART: [kat] SHA2-256
4,394,383 UART: [kat] SHA2-384
4,397,064 UART: [kat] SHA2-512-ACC
4,398,964 UART: [kat] ECC-384
4,404,811 UART: [kat] HMAC-384Kdf
4,409,425 UART: [kat] LMS
4,977,621 UART: [kat] --
4,978,660 UART: [update-reset] ++
5,015,995 >>> mbox cmd response: failed
5,015,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,016,367 UART: ROM Non-Fatal Error: 0x000B001D
5,017,307 UART: [state] Locking Datavault
5,018,111 UART: [state] Locking PCR0, PCR1 and PCR31
5,018,715 UART: [state] Locking ICCM
5,019,171 UART: [exit] Launching FMC @ 0x40000130
5,024,500 UART:
5,024,516 UART: Running Caliptra FMC ...
5,024,924 UART:
5,024,978 UART: [state] CFI Enabled
5,114,217 UART: [art] Extend RT PCRs Done
5,114,645 UART: [art] Lock RT PCRs Done
5,115,846 UART: [art] Populate DV Done
5,124,027 UART: [fht] FMC Alias Private Key: 7
5,125,083 UART: [art] Derive CDI
5,125,363 UART: [art] Store in in slot 0x4
5,210,878 UART: [art] Derive Key Pair
5,211,238 UART: [art] Store priv key in slot 0x5
5,224,458 UART: [art] Derive Key Pair - Done
5,239,384 UART: [art] Signing Cert with AUTHO
5,239,864 UART: RITY.KEYID = 7
5,254,868 UART: [art] Erasing AUTHORITY.KEYID = 7
5,255,633 UART: [art] PUB.X = 430F76749D3ACA6BF0F0F919CF564D714F70A22AF3E169E638DB90359AA578602E3610119D4F876DB5AB7F30A5C7C033
5,262,404 UART: [art] PUB.Y = C7821EECCDE65AC9834C42D12542265F2AAC0564D3D1B7AD172B68D3124CEFD25585DCD8C04BEA31B0DE4FEE3478F92E
5,269,371 UART: [art] SIG.R = 77C57EF24623CAD5B236A3598EEA5AB98F39A4608CA179A2EA8D500C4F0DD968DBC5CD7702019C5F4CFC2C8AE6E0F2EA
5,276,151 UART: [art] SIG.S = A1D577321854F153D9BCB0D2C1D5E9806376BE53003FA3B9B87F231BE5C12CFE9A33BA0648CED2D0D318EF3988C549F4
5,299,963 UART: Caliptra RT
5,300,216 UART: [state] CFI Enabled
5,588,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,723 UART:
5,589,739 UART: Running Caliptra ROM ...
5,590,147 UART:
5,590,201 UART: [state] CFI Enabled
5,592,613 UART: [state] LifecycleState = Unprovisioned
5,593,268 UART: [state] DebugLocked = No
5,593,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,595,537 UART: [kat] SHA2-256
6,389,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,393,583 UART: [kat] ++
6,393,735 UART: [kat] sha1
6,397,857 UART: [kat] SHA2-256
6,399,795 UART: [kat] SHA2-384
6,402,510 UART: [kat] SHA2-512-ACC
6,404,410 UART: [kat] ECC-384
6,410,099 UART: [kat] HMAC-384Kdf
6,414,697 UART: [kat] LMS
6,982,893 UART: [kat] --
6,983,508 UART: [update-reset] ++
8,319,583 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,320,703 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,470,753 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,815 >>> mbox cmd response: success
2,927,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,989,165 UART:
2,989,181 UART: Running Caliptra FMC ...
2,989,589 UART:
2,989,643 UART: [state] CFI Enabled
2,999,706 UART: [fht] FMC Alias Private Key: 7
3,107,971 UART: [art] Extend RT PCRs Done
3,108,399 UART: [art] Lock RT PCRs Done
3,109,627 UART: [art] Populate DV Done
3,117,574 UART: [fht] FMC Alias Private Key: 7
3,118,608 UART: [art] Derive CDI
3,118,888 UART: [art] Store in in slot 0x4
3,204,407 UART: [art] Derive Key Pair
3,204,767 UART: [art] Store priv key in slot 0x5
3,218,503 UART: [art] Derive Key Pair - Done
3,233,307 UART: [art] Signing Cert with AUTHO
3,233,787 UART: RITY.KEYID = 7
3,249,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,082 UART: [art] PUB.X = C34FA4B59F8C79E04AB9DE34C7C0144EB2C4BD230F33EC400462F49863BC5F6B4A03C75C4C4F058E0839BB31C2694CB9
3,256,849 UART: [art] PUB.Y = 798C5C3E98AFE60B1158459B2745CFE116463AF3A35934C581378D14C1834639D536F5537ED0A0415C66A145794C8D42
3,263,786 UART: [art] SIG.R = A59336F5F26032DCE75E9B7FD0C372739592EF3CF40E1B6B7140EF7A12A73666966C09DD3865A69F03F2EEBFD3B4DD28
3,270,557 UART: [art] SIG.S = F7CD6E0DFB26A8713489F32D0205B7D3281CC1A24FE330419257B9D4ED1F84F30D13E13EC78B82BCDC7E7B2BF130E22F
3,294,386 UART: Caliptra RT
3,294,639 UART: [state] CFI Enabled
3,403,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,721,671 >>> mbox cmd response: failed
4,721,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,727,368 UART:
4,727,384 UART: Running Caliptra FMC ...
4,727,792 UART:
4,727,846 UART: [state] CFI Enabled
4,816,917 UART: [art] Extend RT PCRs Done
4,817,345 UART: [art] Lock RT PCRs Done
4,818,650 UART: [art] Populate DV Done
4,826,627 UART: [fht] FMC Alias Private Key: 7
4,827,583 UART: [art] Derive CDI
4,827,863 UART: [art] Store in in slot 0x4
4,913,470 UART: [art] Derive Key Pair
4,913,830 UART: [art] Store priv key in slot 0x5
4,926,754 UART: [art] Derive Key Pair - Done
4,942,034 UART: [art] Signing Cert with AUTHO
4,942,514 UART: RITY.KEYID = 7
4,957,578 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,343 UART: [art] PUB.X = C34FA4B59F8C79E04AB9DE34C7C0144EB2C4BD230F33EC400462F49863BC5F6B4A03C75C4C4F058E0839BB31C2694CB9
4,965,110 UART: [art] PUB.Y = 798C5C3E98AFE60B1158459B2745CFE116463AF3A35934C581378D14C1834639D536F5537ED0A0415C66A145794C8D42
4,972,047 UART: [art] SIG.R = A59336F5F26032DCE75E9B7FD0C372739592EF3CF40E1B6B7140EF7A12A73666966C09DD3865A69F03F2EEBFD3B4DD28
4,978,818 UART: [art] SIG.S = F7CD6E0DFB26A8713489F32D0205B7D3281CC1A24FE330419257B9D4ED1F84F30D13E13EC78B82BCDC7E7B2BF130E22F
5,002,501 UART: Caliptra RT
5,002,754 UART: [state] CFI Enabled
5,284,298 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,048,906 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,173 UART: [kat] SHA2-512-ACC
897,074 UART: [kat] ECC-384
902,861 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,532 UART: [cold-reset] ++
1,477,004 UART: [fht] Storing FHT @ 0x50003400
1,479,987 UART: [idev] ++
1,480,155 UART: [idev] CDI.KEYID = 6
1,480,515 UART: [idev] SUBJECT.KEYID = 7
1,480,939 UART: [idev] UDS.KEYID = 0
1,481,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,587 UART: [idev] Erasing UDS.KEYID = 0
1,504,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,371 UART: [idev] --
1,514,506 UART: [ldev] ++
1,514,674 UART: [ldev] CDI.KEYID = 6
1,515,037 UART: [ldev] SUBJECT.KEYID = 5
1,515,463 UART: [ldev] AUTHORITY.KEYID = 7
1,515,926 UART: [ldev] FE.KEYID = 1
1,521,030 UART: [ldev] Erasing FE.KEYID = 1
1,546,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,629 UART: [ldev] --
1,586,060 UART: [fwproc] Waiting for Commands...
1,586,765 UART: [fwproc] Received command 0x46574c44
1,587,556 UART: [fwproc] Received Image of size 114448 bytes
2,887,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,448 >>> mbox cmd response: success
3,080,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,081,684 UART: [afmc] ++
3,081,852 UART: [afmc] CDI.KEYID = 6
3,082,214 UART: [afmc] SUBJECT.KEYID = 7
3,082,639 UART: [afmc] AUTHORITY.KEYID = 5
3,117,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,713 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,403 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,120 UART: [afmc] --
3,160,000 UART: [cold-reset] --
3,160,674 UART: [state] Locking Datavault
3,161,635 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,239 UART: [state] Locking ICCM
3,162,887 UART: [exit] Launching FMC @ 0x40000130
3,168,216 UART:
3,168,232 UART: Running Caliptra FMC ...
3,168,640 UART:
3,168,783 UART: [state] CFI Enabled
3,179,592 UART: [fht] FMC Alias Private Key: 7
3,287,591 UART: [art] Extend RT PCRs Done
3,288,019 UART: [art] Lock RT PCRs Done
3,289,303 UART: [art] Populate DV Done
3,297,286 UART: [fht] FMC Alias Private Key: 7
3,298,432 UART: [art] Derive CDI
3,298,712 UART: [art] Store in in slot 0x4
3,384,537 UART: [art] Derive Key Pair
3,384,897 UART: [art] Store priv key in slot 0x5
3,398,493 UART: [art] Derive Key Pair - Done
3,413,429 UART: [art] Signing Cert with AUTHO
3,413,909 UART: RITY.KEYID = 7
3,428,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,666 UART: [art] PUB.X = 424592AC38B09D14A40B7601C2058BDE975FED6B7BC5AB561F4668ABDF465E860F4D1E3CC2D4E9A2339CBC5AEF7811FF
3,436,442 UART: [art] PUB.Y = 773A170BFE9FB63409B59BB71CC8B94512D3FBD627AA764E558783D48FA84C190563C009EEE582A61FEC2FB2281E9CB5
3,443,390 UART: [art] SIG.R = DAB9928249097895BFCB6F6162A7353A19015213DA6ED8DD3A2622AA0A4411B4D55A759728205EADCD7E599B031FACDB
3,450,156 UART: [art] SIG.S = FC03B5FD8770F35511361A307233E6BD3DBB06A29EF460A70F0F0089DAC1F7A0A95F43243442D52FA033CCA5D3BBF11A
3,473,649 UART: Caliptra RT
3,473,994 UART: [state] CFI Enabled
3,582,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,809 UART:
3,584,825 UART: Running Caliptra ROM ...
3,585,233 UART:
3,585,374 UART: [state] CFI Enabled
3,588,080 UART: [state] LifecycleState = Unprovisioned
3,588,735 UART: [state] DebugLocked = No
3,589,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,922 UART: [kat] SHA2-256
4,384,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,968 UART: [kat] ++
4,389,120 UART: [kat] sha1
4,393,290 UART: [kat] SHA2-256
4,395,228 UART: [kat] SHA2-384
4,397,987 UART: [kat] SHA2-512-ACC
4,399,887 UART: [kat] ECC-384
4,405,682 UART: [kat] HMAC-384Kdf
4,410,310 UART: [kat] LMS
4,978,506 UART: [kat] --
4,979,335 UART: [update-reset] ++
5,016,662 >>> mbox cmd response: failed
5,016,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,017,146 UART: ROM Non-Fatal Error: 0x000B001D
5,018,032 UART: [state] Locking Datavault
5,018,902 UART: [state] Locking PCR0, PCR1 and PCR31
5,019,506 UART: [state] Locking ICCM
5,020,172 UART: [exit] Launching FMC @ 0x40000130
5,025,501 UART:
5,025,517 UART: Running Caliptra FMC ...
5,025,925 UART:
5,026,068 UART: [state] CFI Enabled
5,115,207 UART: [art] Extend RT PCRs Done
5,115,635 UART: [art] Lock RT PCRs Done
5,117,168 UART: [art] Populate DV Done
5,125,221 UART: [fht] FMC Alias Private Key: 7
5,126,209 UART: [art] Derive CDI
5,126,489 UART: [art] Store in in slot 0x4
5,212,200 UART: [art] Derive Key Pair
5,212,560 UART: [art] Store priv key in slot 0x5
5,225,810 UART: [art] Derive Key Pair - Done
5,240,562 UART: [art] Signing Cert with AUTHO
5,241,042 UART: RITY.KEYID = 7
5,256,088 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,853 UART: [art] PUB.X = 424592AC38B09D14A40B7601C2058BDE975FED6B7BC5AB561F4668ABDF465E860F4D1E3CC2D4E9A2339CBC5AEF7811FF
5,263,629 UART: [art] PUB.Y = 773A170BFE9FB63409B59BB71CC8B94512D3FBD627AA764E558783D48FA84C190563C009EEE582A61FEC2FB2281E9CB5
5,270,577 UART: [art] SIG.R = DAB9928249097895BFCB6F6162A7353A19015213DA6ED8DD3A2622AA0A4411B4D55A759728205EADCD7E599B031FACDB
5,277,343 UART: [art] SIG.S = FC03B5FD8770F35511361A307233E6BD3DBB06A29EF460A70F0F0089DAC1F7A0A95F43243442D52FA033CCA5D3BBF11A
5,301,786 UART: Caliptra RT
5,302,131 UART: [state] CFI Enabled
5,584,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,331 UART:
5,586,347 UART: Running Caliptra ROM ...
5,586,755 UART:
5,586,896 UART: [state] CFI Enabled
5,589,858 UART: [state] LifecycleState = Unprovisioned
5,590,513 UART: [state] DebugLocked = No
5,591,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,592,656 UART: [kat] SHA2-256
6,386,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,390,702 UART: [kat] ++
6,390,854 UART: [kat] sha1
6,395,078 UART: [kat] SHA2-256
6,397,016 UART: [kat] SHA2-384
6,399,761 UART: [kat] SHA2-512-ACC
6,401,661 UART: [kat] ECC-384
6,407,062 UART: [kat] HMAC-384Kdf
6,411,736 UART: [kat] LMS
6,979,932 UART: [kat] --
6,980,713 UART: [update-reset] ++
8,315,742 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,316,858 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,466,908 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,494 >>> mbox cmd response: success
2,929,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,874 UART:
2,990,890 UART: Running Caliptra FMC ...
2,991,298 UART:
2,991,441 UART: [state] CFI Enabled
3,002,078 UART: [fht] FMC Alias Private Key: 7
3,109,693 UART: [art] Extend RT PCRs Done
3,110,121 UART: [art] Lock RT PCRs Done
3,111,751 UART: [art] Populate DV Done
3,120,138 UART: [fht] FMC Alias Private Key: 7
3,121,302 UART: [art] Derive CDI
3,121,582 UART: [art] Store in in slot 0x4
3,207,233 UART: [art] Derive Key Pair
3,207,593 UART: [art] Store priv key in slot 0x5
3,220,757 UART: [art] Derive Key Pair - Done
3,235,465 UART: [art] Signing Cert with AUTHO
3,235,945 UART: RITY.KEYID = 7
3,251,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,010 UART: [art] PUB.X = E9B685EEB6E3EC5F1988813D2A5C212856F9EFFFE461097AF4F3934FB9B845D1BD9F468644167520D447499852217284
3,258,773 UART: [art] PUB.Y = 412711D170D485D0946E930D1835FD9A7D5EC042A7B2239956B36B18D92EA48E63E3B4B4E2C62CF8ADD86E96BDC8E6AD
3,265,730 UART: [art] SIG.R = 590DBB1B40D8765B8A07A186F36F17024A6AD0B619C73CAB487D1036C5ED1F59EC3FA35334E7F391C902B9E4BA1280CC
3,272,498 UART: [art] SIG.S = 9017896DFE76D3E26CBD6715823C7E949193F6FBED1B8BF60E403D71DC4126C871AE41DF32EB40FAF41E9A9805D4ABAA
3,295,607 UART: Caliptra RT
3,295,952 UART: [state] CFI Enabled
3,404,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,258 >>> mbox cmd response: failed
4,723,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,729,039 UART:
4,729,055 UART: Running Caliptra FMC ...
4,729,463 UART:
4,729,606 UART: [state] CFI Enabled
4,819,021 UART: [art] Extend RT PCRs Done
4,819,449 UART: [art] Lock RT PCRs Done
4,820,736 UART: [art] Populate DV Done
4,828,781 UART: [fht] FMC Alias Private Key: 7
4,829,927 UART: [art] Derive CDI
4,830,207 UART: [art] Store in in slot 0x4
4,915,720 UART: [art] Derive Key Pair
4,916,080 UART: [art] Store priv key in slot 0x5
4,929,202 UART: [art] Derive Key Pair - Done
4,944,156 UART: [art] Signing Cert with AUTHO
4,944,636 UART: RITY.KEYID = 7
4,959,674 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,439 UART: [art] PUB.X = E9B685EEB6E3EC5F1988813D2A5C212856F9EFFFE461097AF4F3934FB9B845D1BD9F468644167520D447499852217284
4,967,202 UART: [art] PUB.Y = 412711D170D485D0946E930D1835FD9A7D5EC042A7B2239956B36B18D92EA48E63E3B4B4E2C62CF8ADD86E96BDC8E6AD
4,974,159 UART: [art] SIG.R = 590DBB1B40D8765B8A07A186F36F17024A6AD0B619C73CAB487D1036C5ED1F59EC3FA35334E7F391C902B9E4BA1280CC
4,980,927 UART: [art] SIG.S = 9017896DFE76D3E26CBD6715823C7E949193F6FBED1B8BF60E403D71DC4126C871AE41DF32EB40FAF41E9A9805D4ABAA
5,004,636 UART: Caliptra RT
5,004,981 UART: [state] CFI Enabled
5,290,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,055,299 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,204 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,715 UART: [fht] FHT @ 0x50003400
1,175,430 UART: [idev] ++
1,175,598 UART: [idev] CDI.KEYID = 6
1,175,958 UART: [idev] SUBJECT.KEYID = 7
1,176,382 UART: [idev] UDS.KEYID = 0
1,176,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,654 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,739 UART: [ldev] ++
1,210,907 UART: [ldev] CDI.KEYID = 6
1,211,270 UART: [ldev] SUBJECT.KEYID = 5
1,211,696 UART: [ldev] AUTHORITY.KEYID = 7
1,212,159 UART: [ldev] FE.KEYID = 1
1,217,487 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,811 UART: [ldev] --
1,283,184 UART: [fwproc] Wait for Commands...
1,283,768 UART: [fwproc] Recv command 0x46574c44
1,284,496 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,352 >>> mbox cmd response: success
2,776,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,777,498 UART: [afmc] ++
2,777,666 UART: [afmc] CDI.KEYID = 6
2,778,028 UART: [afmc] SUBJECT.KEYID = 7
2,778,453 UART: [afmc] AUTHORITY.KEYID = 5
2,813,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,646 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,365 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,123 UART: [afmc] --
2,857,083 UART: [cold-reset] --
2,857,637 UART: [state] Locking Datavault
2,858,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,376 UART: [state] Locking ICCM
2,859,936 UART: [exit] Launching FMC @ 0x40000130
2,865,265 UART:
2,865,281 UART: Running Caliptra FMC ...
2,865,689 UART:
2,865,743 UART: [state] CFI Enabled
2,875,916 UART: [fht] FMC Alias Private Key: 7
2,984,087 UART: [art] Extend RT PCRs Done
2,984,515 UART: [art] Lock RT PCRs Done
2,986,059 UART: [art] Populate DV Done
2,994,486 UART: [fht] FMC Alias Private Key: 7
2,995,650 UART: [art] Derive CDI
2,995,930 UART: [art] Store in in slot 0x4
3,081,331 UART: [art] Derive Key Pair
3,081,691 UART: [art] Store priv key in slot 0x5
3,095,357 UART: [art] Derive Key Pair - Done
3,110,073 UART: [art] Signing Cert with AUTHO
3,110,553 UART: RITY.KEYID = 7
3,125,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,908 UART: [art] PUB.X = C4A1F4F0BA48C2D4984F4BCBE426BA7B906EBBF8A9742FB8D1D9BA4D11481F46F0B730F48ECD21E07F565DC989FACA15
3,132,702 UART: [art] PUB.Y = 52174569E1FC14102BC4670E2011A6796216AAEF02DAED4557974864A53EC99AC5B1C3D6E72CAE4C9836CAD29C543478
3,139,648 UART: [art] SIG.R = 2A809260328B3C3EF71AD0199F20367920CA0045229E0CA00747E76C822BEBA793B3BBA61A67E514CDEAC944E8B022B8
3,146,394 UART: [art] SIG.S = 718192BFF8F239366AF82445CD49FFFEC26CBEDFA83D852D38711513EB02B869BBF2B2AB0131EF6D52BD5F2AD485E0A2
3,170,427 UART: Caliptra RT
3,170,680 UART: [state] CFI Enabled
3,277,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,343 UART:
3,279,359 UART: Running Caliptra ROM ...
3,279,767 UART:
3,279,822 UART: [state] CFI Enabled
3,282,490 UART: [state] LifecycleState = Unprovisioned
3,283,145 UART: [state] DebugLocked = No
3,283,773 UART: [state] WD Timer not started. Device not locked for debugging
3,284,967 UART: [kat] SHA2-256
4,090,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,742 UART: [kat] ++
4,094,894 UART: [kat] sha1
4,099,122 UART: [kat] SHA2-256
4,101,062 UART: [kat] SHA2-384
4,103,771 UART: [kat] SHA2-512-ACC
4,105,671 UART: [kat] ECC-384
4,115,164 UART: [kat] HMAC-384Kdf
4,119,578 UART: [kat] LMS
4,367,906 UART: [kat] --
4,368,600 UART: [update-reset] ++
4,384,323 >>> mbox cmd response: failed
4,384,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,384,693 UART: ROM Non-Fatal Error: 0x000B001D
4,385,589 UART: [state] Locking Datavault
4,386,565 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,169 UART: [state] Locking ICCM
4,387,601 UART: [exit] Launching FMC @ 0x40000130
4,392,930 UART:
4,392,946 UART: Running Caliptra FMC ...
4,393,354 UART:
4,393,408 UART: [state] CFI Enabled
4,483,071 UART: [art] Extend RT PCRs Done
4,483,499 UART: [art] Lock RT PCRs Done
4,484,736 UART: [art] Populate DV Done
4,492,817 UART: [fht] FMC Alias Private Key: 7
4,493,937 UART: [art] Derive CDI
4,494,217 UART: [art] Store in in slot 0x4
4,580,038 UART: [art] Derive Key Pair
4,580,398 UART: [art] Store priv key in slot 0x5
4,593,644 UART: [art] Derive Key Pair - Done
4,608,286 UART: [art] Signing Cert with AUTHO
4,608,766 UART: RITY.KEYID = 7
4,623,794 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,559 UART: [art] PUB.X = C4A1F4F0BA48C2D4984F4BCBE426BA7B906EBBF8A9742FB8D1D9BA4D11481F46F0B730F48ECD21E07F565DC989FACA15
4,631,353 UART: [art] PUB.Y = 52174569E1FC14102BC4670E2011A6796216AAEF02DAED4557974864A53EC99AC5B1C3D6E72CAE4C9836CAD29C543478
4,638,299 UART: [art] SIG.R = 2A809260328B3C3EF71AD0199F20367920CA0045229E0CA00747E76C822BEBA793B3BBA61A67E514CDEAC944E8B022B8
4,645,045 UART: [art] SIG.S = 718192BFF8F239366AF82445CD49FFFEC26CBEDFA83D852D38711513EB02B869BBF2B2AB0131EF6D52BD5F2AD485E0A2
4,668,952 UART: Caliptra RT
4,669,205 UART: [state] CFI Enabled
4,952,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,859 UART:
4,953,875 UART: Running Caliptra ROM ...
4,954,283 UART:
4,954,338 UART: [state] CFI Enabled
4,956,836 UART: [state] LifecycleState = Unprovisioned
4,957,491 UART: [state] DebugLocked = No
4,958,059 UART: [state] WD Timer not started. Device not locked for debugging
4,959,217 UART: [kat] SHA2-256
5,764,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,768,992 UART: [kat] ++
5,769,144 UART: [kat] sha1
5,773,404 UART: [kat] SHA2-256
5,775,344 UART: [kat] SHA2-384
5,778,203 UART: [kat] SHA2-512-ACC
5,780,103 UART: [kat] ECC-384
5,789,638 UART: [kat] HMAC-384Kdf
5,794,224 UART: [kat] LMS
6,042,552 UART: [kat] --
6,043,334 UART: [update-reset] ++
7,357,663 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,358,852 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,508,850 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,043 >>> mbox cmd response: success
2,628,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,690,067 UART:
2,690,083 UART: Running Caliptra FMC ...
2,690,491 UART:
2,690,545 UART: [state] CFI Enabled
2,701,248 UART: [fht] FMC Alias Private Key: 7
2,809,049 UART: [art] Extend RT PCRs Done
2,809,477 UART: [art] Lock RT PCRs Done
2,811,231 UART: [art] Populate DV Done
2,819,692 UART: [fht] FMC Alias Private Key: 7
2,820,778 UART: [art] Derive CDI
2,821,058 UART: [art] Store in in slot 0x4
2,906,685 UART: [art] Derive Key Pair
2,907,045 UART: [art] Store priv key in slot 0x5
2,920,469 UART: [art] Derive Key Pair - Done
2,935,182 UART: [art] Signing Cert with AUTHO
2,935,662 UART: RITY.KEYID = 7
2,950,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,483 UART: [art] PUB.X = 779FFCF364997B79DF6B01BDAFD41A5C72355D09A3BA84B51941864F4FC40B4001B44F3E5A3F1AF04564C30A3BC8CD9F
2,958,252 UART: [art] PUB.Y = 6435601B2873852852B01A7EDEAE098022CCF3DB27E249B4F303F506228C05D54C65C67913B4089B3E12AAA30AC6522B
2,965,182 UART: [art] SIG.R = 8C7AC27CC0E6F1DCED3DBAB19E8F37C4F753C3E849028A5F5F91EDBDDEBC3C3E74C31440BBD01EEA95D8830131D9CD33
2,971,974 UART: [art] SIG.S = 93FBDC746ACA33FCB18F7E7F6BFD25875068B65F0E105398BD03DC6252FEB169DEC1C31FCA127FB032525C0F2D630680
2,995,857 UART: Caliptra RT
2,996,110 UART: [state] CFI Enabled
3,103,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,138 >>> mbox cmd response: failed
4,097,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,103,137 UART:
4,103,153 UART: Running Caliptra FMC ...
4,103,561 UART:
4,103,615 UART: [state] CFI Enabled
4,193,018 UART: [art] Extend RT PCRs Done
4,193,446 UART: [art] Lock RT PCRs Done
4,194,733 UART: [art] Populate DV Done
4,202,672 UART: [fht] FMC Alias Private Key: 7
4,203,832 UART: [art] Derive CDI
4,204,112 UART: [art] Store in in slot 0x4
4,289,925 UART: [art] Derive Key Pair
4,290,285 UART: [art] Store priv key in slot 0x5
4,303,937 UART: [art] Derive Key Pair - Done
4,319,072 UART: [art] Signing Cert with AUTHO
4,319,552 UART: RITY.KEYID = 7
4,334,578 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,343 UART: [art] PUB.X = 779FFCF364997B79DF6B01BDAFD41A5C72355D09A3BA84B51941864F4FC40B4001B44F3E5A3F1AF04564C30A3BC8CD9F
4,342,112 UART: [art] PUB.Y = 6435601B2873852852B01A7EDEAE098022CCF3DB27E249B4F303F506228C05D54C65C67913B4089B3E12AAA30AC6522B
4,349,042 UART: [art] SIG.R = 8C7AC27CC0E6F1DCED3DBAB19E8F37C4F753C3E849028A5F5F91EDBDDEBC3C3E74C31440BBD01EEA95D8830131D9CD33
4,355,834 UART: [art] SIG.S = 93FBDC746ACA33FCB18F7E7F6BFD25875068B65F0E105398BD03DC6252FEB169DEC1C31FCA127FB032525C0F2D630680
4,379,595 UART: Caliptra RT
4,379,848 UART: [state] CFI Enabled
4,656,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,519 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,078 UART: [kat] SHA2-256
904,018 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,408 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,730 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,540 UART: [ldev] ++
1,211,708 UART: [ldev] CDI.KEYID = 6
1,212,071 UART: [ldev] SUBJECT.KEYID = 5
1,212,497 UART: [ldev] AUTHORITY.KEYID = 7
1,212,960 UART: [ldev] FE.KEYID = 1
1,218,280 UART: [ldev] Erasing FE.KEYID = 1
1,244,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,327 UART: [fwproc] Wait for Commands...
1,284,939 UART: [fwproc] Recv command 0x46574c44
1,285,667 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,869 >>> mbox cmd response: success
2,776,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,778,015 UART: [afmc] ++
2,778,183 UART: [afmc] CDI.KEYID = 6
2,778,545 UART: [afmc] SUBJECT.KEYID = 7
2,778,970 UART: [afmc] AUTHORITY.KEYID = 5
2,814,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,410 UART: [afmc] --
2,857,316 UART: [cold-reset] --
2,857,988 UART: [state] Locking Datavault
2,859,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,657 UART: [state] Locking ICCM
2,860,249 UART: [exit] Launching FMC @ 0x40000130
2,865,578 UART:
2,865,594 UART: Running Caliptra FMC ...
2,866,002 UART:
2,866,145 UART: [state] CFI Enabled
2,876,904 UART: [fht] FMC Alias Private Key: 7
2,985,163 UART: [art] Extend RT PCRs Done
2,985,591 UART: [art] Lock RT PCRs Done
2,987,045 UART: [art] Populate DV Done
2,995,504 UART: [fht] FMC Alias Private Key: 7
2,996,466 UART: [art] Derive CDI
2,996,746 UART: [art] Store in in slot 0x4
3,082,207 UART: [art] Derive Key Pair
3,082,567 UART: [art] Store priv key in slot 0x5
3,096,165 UART: [art] Derive Key Pair - Done
3,110,951 UART: [art] Signing Cert with AUTHO
3,111,431 UART: RITY.KEYID = 7
3,126,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,616 UART: [art] PUB.X = E0843F70809DDB5975D17F9B31C425873C81CDC79D777C2BEFC617202F9129776E6F3C00B468B2029CA3B12DADCCB138
3,134,367 UART: [art] PUB.Y = BD44E6D173CF69097220984D8DDC1E498585DD3DAEB83DBBAC46E21A91E975FC71BFF414D6D7B9E47194BE36DCD66252
3,141,330 UART: [art] SIG.R = 3C0413B4B0A4973DC829E08B5A25014FAD34E71397036F9C0FD53F54E9496F793F8137EFE59F36BC10CB717B22EFCF60
3,148,094 UART: [art] SIG.S = BCF97CE391BE72CF151B94C2BC584916E941480DF892AA88D4473FB12B55EFF9B866ADB923B7247E2BEF6F3F3C59F85A
3,172,366 UART: Caliptra RT
3,172,711 UART: [state] CFI Enabled
3,280,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,748 UART:
3,282,764 UART: Running Caliptra ROM ...
3,283,172 UART:
3,283,314 UART: [state] CFI Enabled
3,286,238 UART: [state] LifecycleState = Unprovisioned
3,286,893 UART: [state] DebugLocked = No
3,287,563 UART: [state] WD Timer not started. Device not locked for debugging
3,288,887 UART: [kat] SHA2-256
4,094,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,098,662 UART: [kat] ++
4,098,814 UART: [kat] sha1
4,103,136 UART: [kat] SHA2-256
4,105,076 UART: [kat] SHA2-384
4,107,725 UART: [kat] SHA2-512-ACC
4,109,625 UART: [kat] ECC-384
4,118,708 UART: [kat] HMAC-384Kdf
4,123,266 UART: [kat] LMS
4,371,594 UART: [kat] --
4,372,258 UART: [update-reset] ++
4,387,613 >>> mbox cmd response: failed
4,387,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,388,043 UART: ROM Non-Fatal Error: 0x000B001D
4,389,025 UART: [state] Locking Datavault
4,389,733 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,337 UART: [state] Locking ICCM
4,391,005 UART: [exit] Launching FMC @ 0x40000130
4,396,334 UART:
4,396,350 UART: Running Caliptra FMC ...
4,396,758 UART:
4,396,901 UART: [state] CFI Enabled
4,485,694 UART: [art] Extend RT PCRs Done
4,486,122 UART: [art] Lock RT PCRs Done
4,487,655 UART: [art] Populate DV Done
4,495,866 UART: [fht] FMC Alias Private Key: 7
4,496,864 UART: [art] Derive CDI
4,497,144 UART: [art] Store in in slot 0x4
4,582,805 UART: [art] Derive Key Pair
4,583,165 UART: [art] Store priv key in slot 0x5
4,596,455 UART: [art] Derive Key Pair - Done
4,611,369 UART: [art] Signing Cert with AUTHO
4,611,849 UART: RITY.KEYID = 7
4,627,221 UART: [art] Erasing AUTHORITY.KEYID = 7
4,627,986 UART: [art] PUB.X = E0843F70809DDB5975D17F9B31C425873C81CDC79D777C2BEFC617202F9129776E6F3C00B468B2029CA3B12DADCCB138
4,634,737 UART: [art] PUB.Y = BD44E6D173CF69097220984D8DDC1E498585DD3DAEB83DBBAC46E21A91E975FC71BFF414D6D7B9E47194BE36DCD66252
4,641,700 UART: [art] SIG.R = 3C0413B4B0A4973DC829E08B5A25014FAD34E71397036F9C0FD53F54E9496F793F8137EFE59F36BC10CB717B22EFCF60
4,648,464 UART: [art] SIG.S = BCF97CE391BE72CF151B94C2BC584916E941480DF892AA88D4473FB12B55EFF9B866ADB923B7247E2BEF6F3F3C59F85A
4,672,512 UART: Caliptra RT
4,672,857 UART: [state] CFI Enabled
4,950,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,803 UART:
4,951,819 UART: Running Caliptra ROM ...
4,952,227 UART:
4,952,369 UART: [state] CFI Enabled
4,955,433 UART: [state] LifecycleState = Unprovisioned
4,956,088 UART: [state] DebugLocked = No
4,956,658 UART: [state] WD Timer not started. Device not locked for debugging
4,957,872 UART: [kat] SHA2-256
5,763,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,767,647 UART: [kat] ++
5,767,799 UART: [kat] sha1
5,772,039 UART: [kat] SHA2-256
5,773,979 UART: [kat] SHA2-384
5,776,892 UART: [kat] SHA2-512-ACC
5,778,792 UART: [kat] ECC-384
5,788,733 UART: [kat] HMAC-384Kdf
5,793,419 UART: [kat] LMS
6,041,747 UART: [kat] --
6,042,603 UART: [update-reset] ++
7,357,892 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,358,907 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,508,905 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,690 >>> mbox cmd response: success
2,627,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,690,032 UART:
2,690,048 UART: Running Caliptra FMC ...
2,690,456 UART:
2,690,599 UART: [state] CFI Enabled
2,701,498 UART: [fht] FMC Alias Private Key: 7
2,809,019 UART: [art] Extend RT PCRs Done
2,809,447 UART: [art] Lock RT PCRs Done
2,810,949 UART: [art] Populate DV Done
2,819,238 UART: [fht] FMC Alias Private Key: 7
2,820,240 UART: [art] Derive CDI
2,820,520 UART: [art] Store in in slot 0x4
2,906,257 UART: [art] Derive Key Pair
2,906,617 UART: [art] Store priv key in slot 0x5
2,919,685 UART: [art] Derive Key Pair - Done
2,934,248 UART: [art] Signing Cert with AUTHO
2,934,728 UART: RITY.KEYID = 7
2,949,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,343 UART: [art] PUB.X = E7EAE3278BC769DC2FA4571B0853F2CE434F397235942996E1D0EAA2BFDB2AF51BD1AE29E0C5329DA89CA8EF447E1C46
2,957,128 UART: [art] PUB.Y = D582943942FD609DC73F88ADE8DD2BD8431214348728AEF0C6865F6E83F81A99B06EABC63808456B6332B10D9D2FA863
2,964,074 UART: [art] SIG.R = EEBEF877EBC7BDFC35ADD524F5CA28566BCE23CF2A7B457EA4EC1C1A69E396ECD8F1460F6A0F9AD50473B30DCED0AC84
2,970,866 UART: [art] SIG.S = 438A8AEEDA03002C90206DF40DC112D1800532D269142E7AB542E8F00C87BAE868A422795536ACFB939C378EE6928A1A
2,994,827 UART: Caliptra RT
2,995,172 UART: [state] CFI Enabled
3,102,661 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,124 >>> mbox cmd response: failed
4,096,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,102,001 UART:
4,102,017 UART: Running Caliptra FMC ...
4,102,425 UART:
4,102,568 UART: [state] CFI Enabled
4,191,133 UART: [art] Extend RT PCRs Done
4,191,561 UART: [art] Lock RT PCRs Done
4,192,818 UART: [art] Populate DV Done
4,201,171 UART: [fht] FMC Alias Private Key: 7
4,202,323 UART: [art] Derive CDI
4,202,603 UART: [art] Store in in slot 0x4
4,288,090 UART: [art] Derive Key Pair
4,288,450 UART: [art] Store priv key in slot 0x5
4,301,418 UART: [art] Derive Key Pair - Done
4,315,921 UART: [art] Signing Cert with AUTHO
4,316,401 UART: RITY.KEYID = 7
4,331,911 UART: [art] Erasing AUTHORITY.KEYID = 7
4,332,676 UART: [art] PUB.X = E7EAE3278BC769DC2FA4571B0853F2CE434F397235942996E1D0EAA2BFDB2AF51BD1AE29E0C5329DA89CA8EF447E1C46
4,339,461 UART: [art] PUB.Y = D582943942FD609DC73F88ADE8DD2BD8431214348728AEF0C6865F6E83F81A99B06EABC63808456B6332B10D9D2FA863
4,346,407 UART: [art] SIG.R = EEBEF877EBC7BDFC35ADD524F5CA28566BCE23CF2A7B457EA4EC1C1A69E396ECD8F1460F6A0F9AD50473B30DCED0AC84
4,353,199 UART: [art] SIG.S = 438A8AEEDA03002C90206DF40DC112D1800532D269142E7AB542E8F00C87BAE868A422795536ACFB939C378EE6928A1A
4,377,368 UART: Caliptra RT
4,377,713 UART: [state] CFI Enabled
4,658,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,252 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,209,092 UART: [ldev] ++
1,209,260 UART: [ldev] CDI.KEYID = 6
1,209,624 UART: [ldev] SUBJECT.KEYID = 5
1,210,051 UART: [ldev] AUTHORITY.KEYID = 7
1,210,514 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,490 UART: [ldev] --
1,280,828 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,642 >>> mbox cmd response: success
2,775,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,657 UART: [afmc] ++
2,776,825 UART: [afmc] CDI.KEYID = 6
2,777,188 UART: [afmc] SUBJECT.KEYID = 7
2,777,614 UART: [afmc] AUTHORITY.KEYID = 5
2,813,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,314 UART: [afmc] --
2,856,278 UART: [cold-reset] --
2,857,266 UART: [state] Locking Datavault
2,858,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,221 UART: [state] Locking ICCM
2,859,839 UART: [exit] Launching FMC @ 0x40000130
2,865,168 UART:
2,865,184 UART: Running Caliptra FMC ...
2,865,592 UART:
2,865,646 UART: [state] CFI Enabled
2,876,531 UART: [fht] FMC Alias Private Key: 7
2,983,698 UART: [art] Extend RT PCRs Done
2,984,126 UART: [art] Lock RT PCRs Done
2,985,900 UART: [art] Populate DV Done
2,994,023 UART: [fht] FMC Alias Private Key: 7
2,994,959 UART: [art] Derive CDI
2,995,239 UART: [art] Store in in slot 0x4
3,081,166 UART: [art] Derive Key Pair
3,081,526 UART: [art] Store priv key in slot 0x5
3,094,580 UART: [art] Derive Key Pair - Done
3,109,217 UART: [art] Signing Cert with AUTHO
3,109,697 UART: RITY.KEYID = 7
3,124,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,510 UART: [art] PUB.X = 90413F8850E5A3BA7A05CC0817D4D265D51BAC2E5D19F949DB2A81087363E6355BF5525B0A2E0E98E53B3F0991C78021
3,132,262 UART: [art] PUB.Y = 4054CAC61C3F83440B274157BD20F7C494EB59B6D21B2DE96BB9986BDDE3D1D001DCE9DD48E247EAF412DF7F9D808C0E
3,139,221 UART: [art] SIG.R = A3B99729BA47F743DB7C3C22584D4A593C97B8B5107D9C2F6C83005619DA9D852BB5BD2608DFA8E3FCC72310652DBBD4
3,145,976 UART: [art] SIG.S = 84F99889809C90AB2F357F970130D03E609BA2C89B4FD91B9F198FF62A2D4F6BC41BEFEE06F4DD5F55B1CAAA0B054BA2
3,169,347 UART: Caliptra RT
3,169,600 UART: [state] CFI Enabled
3,277,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,946 UART:
3,278,962 UART: Running Caliptra ROM ...
3,279,370 UART:
3,279,425 UART: [state] CFI Enabled
3,282,065 UART: [state] LifecycleState = Unprovisioned
3,282,720 UART: [state] DebugLocked = No
3,283,342 UART: [state] WD Timer not started. Device not locked for debugging
3,284,656 UART: [kat] SHA2-256
4,088,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,335 UART: [kat] ++
4,092,487 UART: [kat] sha1
4,096,581 UART: [kat] SHA2-256
4,098,521 UART: [kat] SHA2-384
4,101,414 UART: [kat] SHA2-512-ACC
4,103,314 UART: [kat] ECC-384
4,113,151 UART: [kat] HMAC-384Kdf
4,117,511 UART: [kat] LMS
4,365,823 UART: [kat] --
4,366,503 UART: [update-reset] ++
4,381,558 >>> mbox cmd response: failed
4,381,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,381,786 UART: ROM Non-Fatal Error: 0x000B001D
4,382,664 UART: [state] Locking Datavault
4,383,410 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,014 UART: [state] Locking ICCM
4,384,492 UART: [exit] Launching FMC @ 0x40000130
4,389,821 UART:
4,389,837 UART: Running Caliptra FMC ...
4,390,245 UART:
4,390,299 UART: [state] CFI Enabled
4,479,372 UART: [art] Extend RT PCRs Done
4,479,800 UART: [art] Lock RT PCRs Done
4,481,085 UART: [art] Populate DV Done
4,489,402 UART: [fht] FMC Alias Private Key: 7
4,490,492 UART: [art] Derive CDI
4,490,772 UART: [art] Store in in slot 0x4
4,576,213 UART: [art] Derive Key Pair
4,576,573 UART: [art] Store priv key in slot 0x5
4,590,165 UART: [art] Derive Key Pair - Done
4,604,782 UART: [art] Signing Cert with AUTHO
4,605,262 UART: RITY.KEYID = 7
4,620,620 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,385 UART: [art] PUB.X = 90413F8850E5A3BA7A05CC0817D4D265D51BAC2E5D19F949DB2A81087363E6355BF5525B0A2E0E98E53B3F0991C78021
4,628,137 UART: [art] PUB.Y = 4054CAC61C3F83440B274157BD20F7C494EB59B6D21B2DE96BB9986BDDE3D1D001DCE9DD48E247EAF412DF7F9D808C0E
4,635,096 UART: [art] SIG.R = A3B99729BA47F743DB7C3C22584D4A593C97B8B5107D9C2F6C83005619DA9D852BB5BD2608DFA8E3FCC72310652DBBD4
4,641,851 UART: [art] SIG.S = 84F99889809C90AB2F357F970130D03E609BA2C89B4FD91B9F198FF62A2D4F6BC41BEFEE06F4DD5F55B1CAAA0B054BA2
4,666,070 UART: Caliptra RT
4,666,323 UART: [state] CFI Enabled
4,945,151 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,946,960 UART:
4,946,976 UART: Running Caliptra ROM ...
4,947,384 UART:
4,947,439 UART: [state] CFI Enabled
4,949,909 UART: [state] LifecycleState = Unprovisioned
4,950,564 UART: [state] DebugLocked = No
4,951,228 UART: [state] WD Timer not started. Device not locked for debugging
4,952,354 UART: [kat] SHA2-256
5,755,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,760,033 UART: [kat] ++
5,760,185 UART: [kat] sha1
5,764,535 UART: [kat] SHA2-256
5,766,475 UART: [kat] SHA2-384
5,769,338 UART: [kat] SHA2-512-ACC
5,771,238 UART: [kat] ECC-384
5,780,673 UART: [kat] HMAC-384Kdf
5,785,213 UART: [kat] LMS
6,033,525 UART: [kat] --
6,034,517 UART: [update-reset] ++
7,347,339 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,348,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,498,322 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,740 >>> mbox cmd response: success
2,622,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,684,848 UART:
2,684,864 UART: Running Caliptra FMC ...
2,685,272 UART:
2,685,326 UART: [state] CFI Enabled
2,696,157 UART: [fht] FMC Alias Private Key: 7
2,804,384 UART: [art] Extend RT PCRs Done
2,804,812 UART: [art] Lock RT PCRs Done
2,806,770 UART: [art] Populate DV Done
2,815,081 UART: [fht] FMC Alias Private Key: 7
2,816,063 UART: [art] Derive CDI
2,816,343 UART: [art] Store in in slot 0x4
2,901,714 UART: [art] Derive Key Pair
2,902,074 UART: [art] Store priv key in slot 0x5
2,914,456 UART: [art] Derive Key Pair - Done
2,929,108 UART: [art] Signing Cert with AUTHO
2,929,588 UART: RITY.KEYID = 7
2,944,774 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,539 UART: [art] PUB.X = BD08F4D2CA7FD54E21F5482168B3ACC72233FD3BCE9F789039E0D656614BF4672E195231732909D29272BDAB725A55E0
2,952,305 UART: [art] PUB.Y = ED88150BF544FE89256F2ADE95A30C41ADE93374148268031037ECD285E3CCB3EFC431105961D640AE0A9CBE4CABB354
2,959,253 UART: [art] SIG.R = 558897B27B9E77DC17B88609F9E1D55235DC139F2E0F40839ADB7516E7E6DCC518FFCE9573073EC37B6A4E3C9F4B5283
2,966,020 UART: [art] SIG.S = F5B6BA0E1C19669DDC8DFD7881E5F68ADC85099653958037359A1A00963620620A1BC502D05845EA02F2F8E34DD471D0
2,989,554 UART: Caliptra RT
2,989,807 UART: [state] CFI Enabled
3,097,022 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,234 >>> mbox cmd response: failed
4,085,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,090,955 UART:
4,090,971 UART: Running Caliptra FMC ...
4,091,379 UART:
4,091,433 UART: [state] CFI Enabled
4,180,090 UART: [art] Extend RT PCRs Done
4,180,518 UART: [art] Lock RT PCRs Done
4,181,839 UART: [art] Populate DV Done
4,190,384 UART: [fht] FMC Alias Private Key: 7
4,191,346 UART: [art] Derive CDI
4,191,626 UART: [art] Store in in slot 0x4
4,277,085 UART: [art] Derive Key Pair
4,277,445 UART: [art] Store priv key in slot 0x5
4,290,603 UART: [art] Derive Key Pair - Done
4,305,443 UART: [art] Signing Cert with AUTHO
4,305,923 UART: RITY.KEYID = 7
4,321,161 UART: [art] Erasing AUTHORITY.KEYID = 7
4,321,926 UART: [art] PUB.X = BD08F4D2CA7FD54E21F5482168B3ACC72233FD3BCE9F789039E0D656614BF4672E195231732909D29272BDAB725A55E0
4,328,692 UART: [art] PUB.Y = ED88150BF544FE89256F2ADE95A30C41ADE93374148268031037ECD285E3CCB3EFC431105961D640AE0A9CBE4CABB354
4,335,640 UART: [art] SIG.R = 558897B27B9E77DC17B88609F9E1D55235DC139F2E0F40839ADB7516E7E6DCC518FFCE9573073EC37B6A4E3C9F4B5283
4,342,407 UART: [art] SIG.S = F5B6BA0E1C19669DDC8DFD7881E5F68ADC85099653958037359A1A00963620620A1BC502D05845EA02F2F8E34DD471D0
4,365,981 UART: Caliptra RT
4,366,234 UART: [state] CFI Enabled
4,646,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,783 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,568 UART: [idev] ++
1,172,736 UART: [idev] CDI.KEYID = 6
1,173,097 UART: [idev] SUBJECT.KEYID = 7
1,173,522 UART: [idev] UDS.KEYID = 0
1,173,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,198,644 UART: [idev] Sha1 KeyId Algorithm
1,207,644 UART: [idev] --
1,208,843 UART: [ldev] ++
1,209,011 UART: [ldev] CDI.KEYID = 6
1,209,375 UART: [ldev] SUBJECT.KEYID = 5
1,209,802 UART: [ldev] AUTHORITY.KEYID = 7
1,210,265 UART: [ldev] FE.KEYID = 1
1,215,763 UART: [ldev] Erasing FE.KEYID = 1
1,241,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,479 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,736 UART: [fwproc] Recv command 0x46574c44
1,282,469 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,625 >>> mbox cmd response: success
2,773,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,774,874 UART: [afmc] ++
2,775,042 UART: [afmc] CDI.KEYID = 6
2,775,405 UART: [afmc] SUBJECT.KEYID = 7
2,775,831 UART: [afmc] AUTHORITY.KEYID = 5
2,811,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,643 UART: [afmc] --
2,854,747 UART: [cold-reset] --
2,855,511 UART: [state] Locking Datavault
2,856,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,060 UART: [state] Locking ICCM
2,857,656 UART: [exit] Launching FMC @ 0x40000130
2,862,985 UART:
2,863,001 UART: Running Caliptra FMC ...
2,863,409 UART:
2,863,552 UART: [state] CFI Enabled
2,874,645 UART: [fht] FMC Alias Private Key: 7
2,983,816 UART: [art] Extend RT PCRs Done
2,984,244 UART: [art] Lock RT PCRs Done
2,985,666 UART: [art] Populate DV Done
2,994,111 UART: [fht] FMC Alias Private Key: 7
2,995,215 UART: [art] Derive CDI
2,995,495 UART: [art] Store in in slot 0x4
3,081,268 UART: [art] Derive Key Pair
3,081,628 UART: [art] Store priv key in slot 0x5
3,095,584 UART: [art] Derive Key Pair - Done
3,110,467 UART: [art] Signing Cert with AUTHO
3,110,947 UART: RITY.KEYID = 7
3,126,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,318 UART: [art] PUB.X = E0DFEC362D75CF976841D86441B3C27D05C485EBAA04D4488B5B3196D439EF180900E55D68F8239551D85FA713B35873
3,134,055 UART: [art] PUB.Y = 4071A0D2E65E1F36DEA34EDC3FE7C28244A4D3310ECB2871B6963382B4F6966232D8B31889E9C182E84C0BA4B64E329D
3,141,003 UART: [art] SIG.R = 59A1F4A1045980FF09B4928BBC4B85CEDF394A0F2D5F5EC0510294CD725AEC2C2503AAA3EC0F2924D9BA6A9A294D5410
3,147,769 UART: [art] SIG.S = E03ED954C33486E401FD9DFEE034DBCB18241C7B89DCCA18975E1BD54FEBE919548743B432EF60143DBA8FFA4DEC92AC
3,171,505 UART: Caliptra RT
3,171,850 UART: [state] CFI Enabled
3,280,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,271 UART:
3,282,287 UART: Running Caliptra ROM ...
3,282,695 UART:
3,282,837 UART: [state] CFI Enabled
3,285,677 UART: [state] LifecycleState = Unprovisioned
3,286,332 UART: [state] DebugLocked = No
3,286,964 UART: [state] WD Timer not started. Device not locked for debugging
3,288,280 UART: [kat] SHA2-256
4,091,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,095,959 UART: [kat] ++
4,096,111 UART: [kat] sha1
4,100,497 UART: [kat] SHA2-256
4,102,437 UART: [kat] SHA2-384
4,105,224 UART: [kat] SHA2-512-ACC
4,107,124 UART: [kat] ECC-384
4,116,883 UART: [kat] HMAC-384Kdf
4,121,553 UART: [kat] LMS
4,369,865 UART: [kat] --
4,370,705 UART: [update-reset] ++
4,386,230 >>> mbox cmd response: failed
4,386,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,386,594 UART: ROM Non-Fatal Error: 0x000B001D
4,387,586 UART: [state] Locking Datavault
4,388,356 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,960 UART: [state] Locking ICCM
4,389,568 UART: [exit] Launching FMC @ 0x40000130
4,394,897 UART:
4,394,913 UART: Running Caliptra FMC ...
4,395,321 UART:
4,395,464 UART: [state] CFI Enabled
4,484,161 UART: [art] Extend RT PCRs Done
4,484,589 UART: [art] Lock RT PCRs Done
4,486,096 UART: [art] Populate DV Done
4,494,451 UART: [fht] FMC Alias Private Key: 7
4,495,401 UART: [art] Derive CDI
4,495,681 UART: [art] Store in in slot 0x4
4,581,046 UART: [art] Derive Key Pair
4,581,406 UART: [art] Store priv key in slot 0x5
4,594,560 UART: [art] Derive Key Pair - Done
4,609,343 UART: [art] Signing Cert with AUTHO
4,609,823 UART: RITY.KEYID = 7
4,624,895 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,660 UART: [art] PUB.X = E0DFEC362D75CF976841D86441B3C27D05C485EBAA04D4488B5B3196D439EF180900E55D68F8239551D85FA713B35873
4,632,397 UART: [art] PUB.Y = 4071A0D2E65E1F36DEA34EDC3FE7C28244A4D3310ECB2871B6963382B4F6966232D8B31889E9C182E84C0BA4B64E329D
4,639,345 UART: [art] SIG.R = 59A1F4A1045980FF09B4928BBC4B85CEDF394A0F2D5F5EC0510294CD725AEC2C2503AAA3EC0F2924D9BA6A9A294D5410
4,646,111 UART: [art] SIG.S = E03ED954C33486E401FD9DFEE034DBCB18241C7B89DCCA18975E1BD54FEBE919548743B432EF60143DBA8FFA4DEC92AC
4,669,775 UART: Caliptra RT
4,670,120 UART: [state] CFI Enabled
4,950,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,840 UART:
4,951,856 UART: Running Caliptra ROM ...
4,952,264 UART:
4,952,406 UART: [state] CFI Enabled
4,955,302 UART: [state] LifecycleState = Unprovisioned
4,955,957 UART: [state] DebugLocked = No
4,956,559 UART: [state] WD Timer not started. Device not locked for debugging
4,957,793 UART: [kat] SHA2-256
5,761,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,765,472 UART: [kat] ++
5,765,624 UART: [kat] sha1
5,769,714 UART: [kat] SHA2-256
5,771,654 UART: [kat] SHA2-384
5,774,223 UART: [kat] SHA2-512-ACC
5,776,123 UART: [kat] ECC-384
5,785,850 UART: [kat] HMAC-384Kdf
5,790,364 UART: [kat] LMS
6,038,676 UART: [kat] --
6,039,542 UART: [update-reset] ++
7,353,300 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,354,455 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,504,453 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,711 >>> mbox cmd response: success
2,623,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,181 UART:
2,686,197 UART: Running Caliptra FMC ...
2,686,605 UART:
2,686,748 UART: [state] CFI Enabled
2,696,983 UART: [fht] FMC Alias Private Key: 7
2,805,194 UART: [art] Extend RT PCRs Done
2,805,622 UART: [art] Lock RT PCRs Done
2,807,192 UART: [art] Populate DV Done
2,815,463 UART: [fht] FMC Alias Private Key: 7
2,816,393 UART: [art] Derive CDI
2,816,673 UART: [art] Store in in slot 0x4
2,902,654 UART: [art] Derive Key Pair
2,903,014 UART: [art] Store priv key in slot 0x5
2,916,110 UART: [art] Derive Key Pair - Done
2,931,031 UART: [art] Signing Cert with AUTHO
2,931,511 UART: RITY.KEYID = 7
2,946,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,322 UART: [art] PUB.X = 0CE837296AF7871D20900BBC992B09315176F84F31551E9A7E3B10B44C7D64B1C445A67852B867BC3EFFBFBF80C8FD10
2,954,089 UART: [art] PUB.Y = 1CFCFC4CAE7FF854B1C81513A51992C9E0248416A9F26D0A11B222106B99ED3FEA836EE72E5EAE6A5BDE73341651951A
2,961,048 UART: [art] SIG.R = 2283C6BECA5FF7FD399CD10ACC551DDB090A7DA6D929EBDFD0F710628589C0C7B99CCE1A004B1C6257B265F178F07A8E
2,967,807 UART: [art] SIG.S = 43D1A1AD970F408A24B35C88339A4A8E74E297118779B6F038400C3981B42A913F877C35BC4173782F1B54EE9D1125A3
2,991,748 UART: Caliptra RT
2,992,093 UART: [state] CFI Enabled
3,099,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,865 >>> mbox cmd response: failed
4,087,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,093,472 UART:
4,093,488 UART: Running Caliptra FMC ...
4,093,896 UART:
4,094,039 UART: [state] CFI Enabled
4,183,904 UART: [art] Extend RT PCRs Done
4,184,332 UART: [art] Lock RT PCRs Done
4,185,385 UART: [art] Populate DV Done
4,193,686 UART: [fht] FMC Alias Private Key: 7
4,194,766 UART: [art] Derive CDI
4,195,046 UART: [art] Store in in slot 0x4
4,280,865 UART: [art] Derive Key Pair
4,281,225 UART: [art] Store priv key in slot 0x5
4,294,525 UART: [art] Derive Key Pair - Done
4,309,262 UART: [art] Signing Cert with AUTHO
4,309,742 UART: RITY.KEYID = 7
4,325,016 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,781 UART: [art] PUB.X = 0CE837296AF7871D20900BBC992B09315176F84F31551E9A7E3B10B44C7D64B1C445A67852B867BC3EFFBFBF80C8FD10
4,332,548 UART: [art] PUB.Y = 1CFCFC4CAE7FF854B1C81513A51992C9E0248416A9F26D0A11B222106B99ED3FEA836EE72E5EAE6A5BDE73341651951A
4,339,507 UART: [art] SIG.R = 2283C6BECA5FF7FD399CD10ACC551DDB090A7DA6D929EBDFD0F710628589C0C7B99CCE1A004B1C6257B265F178F07A8E
4,346,266 UART: [art] SIG.S = 43D1A1AD970F408A24B35C88339A4A8E74E297118779B6F038400C3981B42A913F877C35BC4173782F1B54EE9D1125A3
4,370,757 UART: Caliptra RT
4,371,102 UART: [state] CFI Enabled
4,652,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,088,642 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,044 UART:
192,424 UART: Running Caliptra ROM ...
193,517 UART:
193,658 UART: [state] CFI Enabled
264,621 UART: [state] LifecycleState = Unprovisioned
266,591 UART: [state] DebugLocked = No
268,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,265 UART: [kat] SHA2-256
442,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,525 UART: [kat] ++
453,973 UART: [kat] sha1
465,170 UART: [kat] SHA2-256
467,855 UART: [kat] SHA2-384
473,186 UART: [kat] SHA2-512-ACC
475,576 UART: [kat] ECC-384
2,762,306 UART: [kat] HMAC-384Kdf
2,774,838 UART: [kat] LMS
3,965,113 UART: [kat] --
3,968,804 UART: [cold-reset] ++
3,970,688 UART: [fht] Storing FHT @ 0x50003400
3,982,550 UART: [idev] ++
3,983,116 UART: [idev] CDI.KEYID = 6
3,984,130 UART: [idev] SUBJECT.KEYID = 7
3,985,293 UART: [idev] UDS.KEYID = 0
3,988,106 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,131,850 UART: [idev] Erasing UDS.KEYID = 0
7,324,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,792 UART: [idev] --
7,350,650 UART: [ldev] ++
7,351,215 UART: [ldev] CDI.KEYID = 6
7,352,197 UART: [ldev] SUBJECT.KEYID = 5
7,353,357 UART: [ldev] AUTHORITY.KEYID = 7
7,354,662 UART: [ldev] FE.KEYID = 1
7,395,885 UART: [ldev] Erasing FE.KEYID = 1
10,731,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,757 UART: [ldev] --
13,110,321 UART: [fwproc] Waiting for Commands...
13,111,942 UART: [fwproc] Received command 0x46574c44
13,114,179 UART: [fwproc] Received Image of size 114124 bytes
17,165,226 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,239,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,058 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,625,794 >>> mbox cmd response: success
17,627,571 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,771,114 UART: [afmc] ++
17,771,765 UART: [afmc] CDI.KEYID = 6
17,772,657 UART: [afmc] SUBJECT.KEYID = 7
17,773,703 UART: [afmc] AUTHORITY.KEYID = 5
21,000,563 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,617 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,319,240 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,333,999 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,348,263 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,368,295 UART: [afmc] --
23,371,407 UART: [cold-reset] --
23,375,110 UART: [state] Locking Datavault
23,378,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,162 UART: [state] Locking ICCM
23,382,523 UART: [exit] Launching FMC @ 0x40000130
23,390,885 UART:
23,391,168 UART: Running Caliptra FMC ...
23,392,285 UART:
23,392,453 UART: [state] CFI Enabled
23,462,985 UART: [fht] FMC Alias Private Key: 7
25,800,583 UART: [art] Extend RT PCRs Done
25,801,803 UART: [art] Lock RT PCRs Done
25,803,352 UART: [art] Populate DV Done
25,808,872 UART: [fht] FMC Alias Private Key: 7
25,810,518 UART: [art] Derive CDI
25,811,331 UART: [art] Store in in slot 0x4
25,872,550 UART: [art] Derive Key Pair
25,873,680 UART: [art] Store priv key in slot 0x5
29,166,719 UART: [art] Derive Key Pair - Done
29,179,300 UART: [art] Signing Cert with AUTHO
29,180,611 UART: RITY.KEYID = 7
31,467,857 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,365 UART: [art] PUB.X = 59543F3BD99D0CFF5CA8DE6BD835C3C3E1B2CA9FD44308B7A21BB8EFFDE303FAD868550A9C49516409C7B763BE1CA5FE
31,476,675 UART: [art] PUB.Y = FF523F8CEB9B9DF5F69799462CF8784E5FED432E6505920D66A9888A4E4EEC6FDAD616CF4604E0837213DDE457A25EA2
31,483,883 UART: [art] SIG.R = 74478218EC192F2D29B90FA1FA02220FB897941C2B2572B512B86761309C5178B50C64EAEB1CB9696D81D2FD03DE0303
31,491,239 UART: [art] SIG.S = 585F063F7BF3978604E29B5AE0B8060DE1E83E7294674E9E62C1C8E1BCAAC33CC6B130FB6DD6AAB81093BE0DC26BB721
32,795,945 UART: Caliptra RT
32,796,654 UART: [state] CFI Enabled
32,958,459 UART: [rt] RT listening for mailbox commands...
32,961,200 UART:
32,961,451 UART: Running Caliptra ROM ...
32,962,559 UART:
32,962,720 UART: [state] CFI Enabled
33,026,075 UART: [state] LifecycleState = Unprovisioned
33,028,011 UART: [state] DebugLocked = No
33,030,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,035,161 UART: [kat] SHA2-256
33,204,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,215,381 UART: [kat] ++
33,215,916 UART: [kat] sha1
33,227,130 UART: [kat] SHA2-256
33,229,821 UART: [kat] SHA2-384
33,235,515 UART: [kat] SHA2-512-ACC
33,237,892 UART: [kat] ECC-384
35,527,921 UART: [kat] HMAC-384Kdf
35,538,365 UART: [kat] LMS
36,728,674 UART: [kat] --
36,730,847 UART: [update-reset] ++
36,832,646 >>> mbox cmd response: failed
36,834,351 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,977,716 UART: ROM Non-Fatal Error: 0x000B001E
36,979,145 UART: [state] Locking Datavault
36,980,299 UART: [state] Locking PCR0, PCR1 and PCR31
36,981,857 UART: [state] Locking ICCM
36,982,765 UART: [exit] Launching FMC @ 0x40000130
36,984,190 UART:
36,984,351 UART: Running Caliptra FMC ...
36,985,445 UART:
36,985,600 UART: [state] CFI Enabled
36,986,515 UART: [art] Extend RT PCRs Done
36,987,647 UART: [art] Lock RT PCRs Done
36,988,710 UART: [art] Populate DV Done
36,989,739 UART: [fht] FMC Alias Private Key: 7
36,991,267 UART: [art] Derive CDI
36,992,015 UART: [art] Store in in slot 0x4
37,029,642 UART: [art] Derive Key Pair
37,030,643 UART: [art] Store priv key in slot 0x5
40,322,466 UART: [art] Derive Key Pair - Done
40,335,465 UART: [art] Signing Cert with AUTHO
40,336,793 UART: RITY.KEYID = 7
42,625,016 UART: [art] Erasing AUTHORITY.KEYID = 7
42,626,539 UART: [art] PUB.X = 59543F3BD99D0CFF5CA8DE6BD835C3C3E1B2CA9FD44308B7A21BB8EFFDE303FAD868550A9C49516409C7B763BE1CA5FE
42,633,836 UART: [art] PUB.Y = FF523F8CEB9B9DF5F69799462CF8784E5FED432E6505920D66A9888A4E4EEC6FDAD616CF4604E0837213DDE457A25EA2
42,641,077 UART: [art] SIG.R = 74478218EC192F2D29B90FA1FA02220FB897941C2B2572B512B86761309C5178B50C64EAEB1CB9696D81D2FD03DE0303
42,648,415 UART: [art] SIG.S = 585F063F7BF3978604E29B5AE0B8060DE1E83E7294674E9E62C1C8E1BCAAC33CC6B130FB6DD6AAB81093BE0DC26BB721
43,953,941 UART: Caliptra RT
43,954,643 UART: [state] CFI Enabled
44,284,623 UART: [rt] RT listening for mailbox commands...
44,287,365 UART:
44,287,533 UART: Running Caliptra ROM ...
44,288,637 UART:
44,288,795 UART: [state] CFI Enabled
44,351,015 UART: [state] LifecycleState = Unprovisioned
44,352,835 UART: [state] DebugLocked = No
44,355,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,361,585 UART: [kat] SHA2-256
44,531,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,541,813 UART: [kat] ++
44,542,271 UART: [kat] sha1
44,554,019 UART: [kat] SHA2-256
44,556,714 UART: [kat] SHA2-384
44,563,831 UART: [kat] SHA2-512-ACC
44,566,228 UART: [kat] ECC-384
46,855,447 UART: [kat] HMAC-384Kdf
46,866,755 UART: [kat] LMS
48,057,082 UART: [kat] --
48,061,131 UART: [update-reset] ++
52,197,909 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,202,223 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,584,477 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,784,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,835,776 >>> mbox cmd response: success
17,837,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,528,118 UART:
23,528,563 UART: Running Caliptra FMC ...
23,529,675 UART:
23,529,833 UART: [state] CFI Enabled
23,598,828 UART: [fht] FMC Alias Private Key: 7
25,937,000 UART: [art] Extend RT PCRs Done
25,938,229 UART: [art] Lock RT PCRs Done
25,940,106 UART: [art] Populate DV Done
25,945,404 UART: [fht] FMC Alias Private Key: 7
25,947,163 UART: [art] Derive CDI
25,947,979 UART: [art] Store in in slot 0x4
26,006,399 UART: [art] Derive Key Pair
26,007,452 UART: [art] Store priv key in slot 0x5
29,299,586 UART: [art] Derive Key Pair - Done
29,312,394 UART: [art] Signing Cert with AUTHO
29,313,712 UART: RITY.KEYID = 7
31,602,039 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,550 UART: [art] PUB.X = 5F3F5E4767B07824BCE03B069AD16400E9D56F330171AB84E0191F3072E3ED63E8DA7054B2F0FBDE0744C680DAF1255E
31,610,742 UART: [art] PUB.Y = 6F1492B8D90CC1759B19786521CC99318D717B214A896F0949C8A6FD4E28834B9666EF59CE9A273E01FA365AE8A2C246
31,618,006 UART: [art] SIG.R = E7E29C826C9AFFF60BE3FCD55476196BEE3D9D3FD7FA399AEDA1573ECCD13E493FFA1CD03B07A65A38F4FD12438F5C5C
31,625,458 UART: [art] SIG.S = B1F6794220321D25ACF3AA7CC42877E9712D6B0174CA463E62C23819F0C8F180FEDDFD605A2496AB0328D08CFDFAC65E
32,931,223 UART: Caliptra RT
32,931,929 UART: [state] CFI Enabled
33,092,179 UART: [rt] RT listening for mailbox commands...
36,789,764 >>> mbox cmd response: failed
36,792,052 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,935,730 UART:
36,936,044 UART: Running Caliptra FMC ...
36,937,172 UART:
36,937,337 UART: [state] CFI Enabled
36,938,198 UART: [art] Extend RT PCRs Done
36,939,349 UART: [art] Lock RT PCRs Done
36,940,335 UART: [art] Populate DV Done
36,941,308 UART: [fht] FMC Alias Private Key: 7
36,942,626 UART: [art] Derive CDI
36,943,357 UART: [art] Store in in slot 0x4
36,971,186 UART: [art] Derive Key Pair
36,972,185 UART: [art] Store priv key in slot 0x5
40,265,171 UART: [art] Derive Key Pair - Done
40,278,223 UART: [art] Signing Cert with AUTHO
40,279,555 UART: RITY.KEYID = 7
42,566,842 UART: [art] Erasing AUTHORITY.KEYID = 7
42,568,353 UART: [art] PUB.X = 5F3F5E4767B07824BCE03B069AD16400E9D56F330171AB84E0191F3072E3ED63E8DA7054B2F0FBDE0744C680DAF1255E
42,575,601 UART: [art] PUB.Y = 6F1492B8D90CC1759B19786521CC99318D717B214A896F0949C8A6FD4E28834B9666EF59CE9A273E01FA365AE8A2C246
42,582,842 UART: [art] SIG.R = E7E29C826C9AFFF60BE3FCD55476196BEE3D9D3FD7FA399AEDA1573ECCD13E493FFA1CD03B07A65A38F4FD12438F5C5C
42,590,290 UART: [art] SIG.S = B1F6794220321D25ACF3AA7CC42877E9712D6B0174CA463E62C23819F0C8F180FEDDFD605A2496AB0328D08CFDFAC65E
43,895,351 UART: Caliptra RT
43,896,066 UART: [state] CFI Enabled
44,233,346 UART: [rt] RT listening for mailbox commands...
52,798,355 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,488 UART:
192,851 UART: Running Caliptra ROM ...
194,032 UART:
603,706 UART: [state] CFI Enabled
619,051 UART: [state] LifecycleState = Unprovisioned
620,924 UART: [state] DebugLocked = No
623,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,873 UART: [kat] SHA2-256
797,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,135 UART: [kat] ++
808,647 UART: [kat] sha1
819,262 UART: [kat] SHA2-256
821,948 UART: [kat] SHA2-384
827,818 UART: [kat] SHA2-512-ACC
830,210 UART: [kat] ECC-384
3,115,800 UART: [kat] HMAC-384Kdf
3,128,629 UART: [kat] LMS
4,318,746 UART: [kat] --
4,322,500 UART: [cold-reset] ++
4,324,710 UART: [fht] Storing FHT @ 0x50003400
4,334,832 UART: [idev] ++
4,335,403 UART: [idev] CDI.KEYID = 6
4,336,422 UART: [idev] SUBJECT.KEYID = 7
4,337,584 UART: [idev] UDS.KEYID = 0
4,340,391 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,771 UART: [idev] Erasing UDS.KEYID = 0
7,624,957 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,368 UART: [idev] --
7,648,500 UART: [ldev] ++
7,649,072 UART: [ldev] CDI.KEYID = 6
7,650,045 UART: [ldev] SUBJECT.KEYID = 5
7,651,264 UART: [ldev] AUTHORITY.KEYID = 7
7,652,496 UART: [ldev] FE.KEYID = 1
7,663,576 UART: [ldev] Erasing FE.KEYID = 1
10,951,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,075 UART: [ldev] --
13,315,507 UART: [fwproc] Waiting for Commands...
13,318,474 UART: [fwproc] Received command 0x46574c44
13,320,678 UART: [fwproc] Received Image of size 114124 bytes
17,371,557 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,448,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,652 >>> mbox cmd response: success
17,837,511 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,980,848 UART: [afmc] ++
17,981,484 UART: [afmc] CDI.KEYID = 6
17,982,377 UART: [afmc] SUBJECT.KEYID = 7
17,983,489 UART: [afmc] AUTHORITY.KEYID = 5
21,159,057 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,240 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,510 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,470,005 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,484,839 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,499,091 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,520,141 UART: [afmc] --
23,524,602 UART: [cold-reset] --
23,528,079 UART: [state] Locking Datavault
23,533,232 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,987 UART: [state] Locking ICCM
23,536,764 UART: [exit] Launching FMC @ 0x40000130
23,545,165 UART:
23,545,400 UART: Running Caliptra FMC ...
23,546,505 UART:
23,546,673 UART: [state] CFI Enabled
23,554,399 UART: [fht] FMC Alias Private Key: 7
25,885,165 UART: [art] Extend RT PCRs Done
25,886,392 UART: [art] Lock RT PCRs Done
25,887,586 UART: [art] Populate DV Done
25,892,628 UART: [fht] FMC Alias Private Key: 7
25,894,330 UART: [art] Derive CDI
25,895,114 UART: [art] Store in in slot 0x4
25,937,876 UART: [art] Derive Key Pair
25,938,921 UART: [art] Store priv key in slot 0x5
29,180,339 UART: [art] Derive Key Pair - Done
29,193,254 UART: [art] Signing Cert with AUTHO
29,194,562 UART: RITY.KEYID = 7
31,473,986 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,502 UART: [art] PUB.X = 50E3E1D7BC60CB62C2BC9EBF8C7D2BF45DE785A3A772C153502561043388A3A0D87E26C684581371C8551AAF8215E7A8
31,482,772 UART: [art] PUB.Y = 2D5C566F0979D9E8193157FBC6AD5577A1DEDE4BC77929E39480A5026C7F1A268CF00656D633F338A439C2FC416E0A22
31,489,968 UART: [art] SIG.R = 69594996EEF6C600FCD6B83E76F2B76D2571429963F126D1B18CB5FBA3DEB24602D211DD3A5612C8636DF84535E429FA
31,497,364 UART: [art] SIG.S = 4C729E8EB6F137FBF88DEA6AA33FF22FD7A740299BBADC51148655D93E4A45303BE9E423203CAF17232E1726104B0FFB
32,802,665 UART: Caliptra RT
32,803,357 UART: [state] CFI Enabled
32,920,596 UART: [rt] RT listening for mailbox commands...
32,923,705 UART:
32,923,871 UART: Running Caliptra ROM ...
32,925,096 UART:
32,925,318 UART: [state] CFI Enabled
32,939,067 UART: [state] LifecycleState = Unprovisioned
32,941,005 UART: [state] DebugLocked = No
32,943,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,948,223 UART: [kat] SHA2-256
33,117,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,128,467 UART: [kat] ++
33,128,922 UART: [kat] sha1
33,140,672 UART: [kat] SHA2-256
33,143,370 UART: [kat] SHA2-384
33,149,786 UART: [kat] SHA2-512-ACC
33,152,135 UART: [kat] ECC-384
35,433,129 UART: [kat] HMAC-384Kdf
35,444,885 UART: [kat] LMS
36,634,881 UART: [kat] --
36,639,981 UART: [update-reset] ++
36,745,245 >>> mbox cmd response: failed
36,746,944 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,890,218 UART: ROM Non-Fatal Error: 0x000B001E
36,891,646 UART: [state] Locking Datavault
36,892,723 UART: [state] Locking PCR0, PCR1 and PCR31
36,894,268 UART: [state] Locking ICCM
36,895,148 UART: [exit] Launching FMC @ 0x40000130
36,896,488 UART:
36,896,634 UART: Running Caliptra FMC ...
36,897,733 UART:
36,897,888 UART: [state] CFI Enabled
36,898,722 UART: [art] Extend RT PCRs Done
36,899,775 UART: [art] Lock RT PCRs Done
36,900,837 UART: [art] Populate DV Done
36,901,792 UART: [fht] FMC Alias Private Key: 7
36,903,121 UART: [art] Derive CDI
36,903,856 UART: [art] Store in in slot 0x4
36,904,948 UART: [art] Derive Key Pair
36,905,880 UART: [art] Store priv key in slot 0x5
40,108,566 UART: [art] Derive Key Pair - Done
40,121,325 UART: [art] Signing Cert with AUTHO
40,122,804 UART: RITY.KEYID = 7
42,402,052 UART: [art] Erasing AUTHORITY.KEYID = 7
42,403,567 UART: [art] PUB.X = 50E3E1D7BC60CB62C2BC9EBF8C7D2BF45DE785A3A772C153502561043388A3A0D87E26C684581371C8551AAF8215E7A8
42,410,793 UART: [art] PUB.Y = 2D5C566F0979D9E8193157FBC6AD5577A1DEDE4BC77929E39480A5026C7F1A268CF00656D633F338A439C2FC416E0A22
42,417,989 UART: [art] SIG.R = 69594996EEF6C600FCD6B83E76F2B76D2571429963F126D1B18CB5FBA3DEB24602D211DD3A5612C8636DF84535E429FA
42,425,395 UART: [art] SIG.S = 4C729E8EB6F137FBF88DEA6AA33FF22FD7A740299BBADC51148655D93E4A45303BE9E423203CAF17232E1726104B0FFB
43,730,782 UART: Caliptra RT
43,731,494 UART: [state] CFI Enabled
44,020,590 UART: [rt] RT listening for mailbox commands...
44,023,231 UART:
44,023,448 UART: Running Caliptra ROM ...
44,024,570 UART:
44,024,855 UART: [state] CFI Enabled
44,041,984 UART: [state] LifecycleState = Unprovisioned
44,043,868 UART: [state] DebugLocked = No
44,045,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,050,319 UART: [kat] SHA2-256
44,220,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,230,604 UART: [kat] ++
44,231,059 UART: [kat] sha1
44,241,942 UART: [kat] SHA2-256
44,244,640 UART: [kat] SHA2-384
44,249,364 UART: [kat] SHA2-512-ACC
44,251,725 UART: [kat] ECC-384
46,535,926 UART: [kat] HMAC-384Kdf
46,548,254 UART: [kat] LMS
47,738,316 UART: [kat] --
47,745,139 UART: [update-reset] ++
51,883,493 UART: [update-reset] Image verified using Vendor ECC Key Index 3
51,887,739 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,270,008 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,128,801 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,436 >>> mbox cmd response: success
18,066,453 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,713,454 UART:
23,713,889 UART: Running Caliptra FMC ...
23,715,000 UART:
23,715,160 UART: [state] CFI Enabled
23,723,167 UART: [fht] FMC Alias Private Key: 7
26,053,978 UART: [art] Extend RT PCRs Done
26,055,208 UART: [art] Lock RT PCRs Done
26,056,922 UART: [art] Populate DV Done
26,062,382 UART: [fht] FMC Alias Private Key: 7
26,063,945 UART: [art] Derive CDI
26,064,685 UART: [art] Store in in slot 0x4
26,107,617 UART: [art] Derive Key Pair
26,108,690 UART: [art] Store priv key in slot 0x5
29,351,366 UART: [art] Derive Key Pair - Done
29,363,989 UART: [art] Signing Cert with AUTHO
29,365,292 UART: RITY.KEYID = 7
31,644,885 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,515 UART: [art] PUB.X = E35EAD5A65F3821EA635C4E5948A4B6BA6F49DBC247149E363CD67FB871978FC6EEBF916D94E880A9C3E0F688C267214
31,653,670 UART: [art] PUB.Y = C0B6C3D35E86C6F016763EF64FF164F2FF30B526C89873C861D1C16E950D0B6FC66FDE7BF511EE5642E056D71FCAD888
31,660,893 UART: [art] SIG.R = C0C295F60A12E31C22725E3E1D3D1A9CB5305CA7B63FBA198DEACF88B5A4E4D01C055ACD1B435BA3A93C743C42B8A4D9
31,668,326 UART: [art] SIG.S = 35764A476DB8AB4EF15E5498E4C770EC487786A360E1B0460CFF462CA0FCB060843BA57EAA3576483DE55037DE8AADBA
32,973,205 UART: Caliptra RT
32,973,934 UART: [state] CFI Enabled
33,091,773 UART: [rt] RT listening for mailbox commands...
36,736,519 >>> mbox cmd response: failed
36,738,889 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,882,346 UART:
36,882,672 UART: Running Caliptra FMC ...
36,883,717 UART:
36,883,866 UART: [state] CFI Enabled
36,884,894 UART: [art] Extend RT PCRs Done
36,885,993 UART: [art] Lock RT PCRs Done
36,887,062 UART: [art] Populate DV Done
36,888,136 UART: [fht] FMC Alias Private Key: 7
36,889,460 UART: [art] Derive CDI
36,890,197 UART: [art] Store in in slot 0x4
36,891,430 UART: [art] Derive Key Pair
36,892,354 UART: [art] Store priv key in slot 0x5
40,090,895 UART: [art] Derive Key Pair - Done
40,103,529 UART: [art] Signing Cert with AUTHO
40,104,839 UART: RITY.KEYID = 7
42,384,469 UART: [art] Erasing AUTHORITY.KEYID = 7
42,385,993 UART: [art] PUB.X = E35EAD5A65F3821EA635C4E5948A4B6BA6F49DBC247149E363CD67FB871978FC6EEBF916D94E880A9C3E0F688C267214
42,393,256 UART: [art] PUB.Y = C0B6C3D35E86C6F016763EF64FF164F2FF30B526C89873C861D1C16E950D0B6FC66FDE7BF511EE5642E056D71FCAD888
42,400,509 UART: [art] SIG.R = C0C295F60A12E31C22725E3E1D3D1A9CB5305CA7B63FBA198DEACF88B5A4E4D01C055ACD1B435BA3A93C743C42B8A4D9
42,407,900 UART: [art] SIG.S = 35764A476DB8AB4EF15E5498E4C770EC487786A360E1B0460CFF462CA0FCB060843BA57EAA3576483DE55037DE8AADBA
43,713,043 UART: Caliptra RT
43,713,770 UART: [state] CFI Enabled
44,002,897 UART: [rt] RT listening for mailbox commands...
52,519,345 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,246 UART:
192,617 UART: Running Caliptra ROM ...
193,792 UART:
193,944 UART: [state] CFI Enabled
261,639 UART: [state] LifecycleState = Unprovisioned
263,527 UART: [state] DebugLocked = No
265,293 UART: [state] WD Timer not started. Device not locked for debugging
269,451 UART: [kat] SHA2-256
448,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,141 UART: [kat] ++
460,675 UART: [kat] sha1
471,522 UART: [kat] SHA2-256
474,545 UART: [kat] SHA2-384
479,668 UART: [kat] SHA2-512-ACC
482,601 UART: [kat] ECC-384
2,945,042 UART: [kat] HMAC-384Kdf
2,967,226 UART: [kat] LMS
3,496,690 UART: [kat] --
3,499,983 UART: [cold-reset] ++
3,502,077 UART: [fht] FHT @ 0x50003400
3,511,877 UART: [idev] ++
3,512,490 UART: [idev] CDI.KEYID = 6
3,513,379 UART: [idev] SUBJECT.KEYID = 7
3,514,540 UART: [idev] UDS.KEYID = 0
3,517,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,095 UART: [idev] Erasing UDS.KEYID = 0
6,022,573 UART: [idev] Sha1 KeyId Algorithm
6,045,973 UART: [idev] --
6,049,500 UART: [ldev] ++
6,050,074 UART: [ldev] CDI.KEYID = 6
6,050,967 UART: [ldev] SUBJECT.KEYID = 5
6,052,182 UART: [ldev] AUTHORITY.KEYID = 7
6,053,415 UART: [ldev] FE.KEYID = 1
6,093,856 UART: [ldev] Erasing FE.KEYID = 1
8,598,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,715 UART: [ldev] --
10,408,204 UART: [fwproc] Wait for Commands...
10,410,900 UART: [fwproc] Recv command 0x46574c44
10,412,997 UART: [fwproc] Recv'd Img size: 114448 bytes
13,810,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,881,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,918 >>> mbox cmd response: success
14,270,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,414,260 UART: [afmc] ++
14,414,908 UART: [afmc] CDI.KEYID = 6
14,415,840 UART: [afmc] SUBJECT.KEYID = 7
14,416,944 UART: [afmc] AUTHORITY.KEYID = 5
16,806,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,081 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,546,060 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,561,835 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,577,610 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,601,702 UART: [afmc] --
18,604,915 UART: [cold-reset] --
18,607,711 UART: [state] Locking Datavault
18,610,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,449 UART: [state] Locking ICCM
18,615,136 UART: [exit] Launching FMC @ 0x40000130
18,623,529 UART:
18,623,762 UART: Running Caliptra FMC ...
18,625,007 UART:
18,625,204 UART: [state] CFI Enabled
18,686,140 UART: [fht] FMC Alias Private Key: 7
20,451,090 UART: [art] Extend RT PCRs Done
20,452,311 UART: [art] Lock RT PCRs Done
20,454,148 UART: [art] Populate DV Done
20,459,775 UART: [fht] FMC Alias Private Key: 7
20,461,314 UART: [art] Derive CDI
20,462,127 UART: [art] Store in in slot 0x4
20,518,761 UART: [art] Derive Key Pair
20,519,818 UART: [art] Store priv key in slot 0x5
22,983,131 UART: [art] Derive Key Pair - Done
22,995,915 UART: [art] Signing Cert with AUTHO
22,997,225 UART: RITY.KEYID = 7
24,708,421 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,926 UART: [art] PUB.X = 901BC1A31FA101723D1EF85EF8971F9D06768E1635B237AB67717AA0317CCBF3E030F93B6467104D563926259C789E75
24,717,154 UART: [art] PUB.Y = 094A7A480B464C51A98983DC681A4C5CBC7D7AE6273087FF029AE7B293E10A1F9F941A853C7B48215D64B5AA2088F0B7
24,724,426 UART: [art] SIG.R = 4F172015F78AD7E74AEBF7899D64C939EA58E8AB4F10A58BFB25F76FDC073ACBA8CB5154364487759CBAFD132B473B1F
24,731,805 UART: [art] SIG.S = F00FA689F92377B5DB47B7988CF7E4D63B8808C9E744BB0828B5CE4A1829B19316B068AD0885A7B2EF9083118F794A38
25,710,824 UART: Caliptra RT
25,711,518 UART: [state] CFI Enabled
25,876,551 UART: [rt] RT listening for mailbox commands...
25,879,506 UART:
25,879,763 UART: Running Caliptra ROM ...
25,880,793 UART:
25,880,944 UART: [state] CFI Enabled
25,942,962 UART: [state] LifecycleState = Unprovisioned
25,944,835 UART: [state] DebugLocked = No
25,946,783 UART: [state] WD Timer not started. Device not locked for debugging
25,951,011 UART: [kat] SHA2-256
26,130,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,141,693 UART: [kat] ++
26,142,148 UART: [kat] sha1
26,154,105 UART: [kat] SHA2-256
26,157,153 UART: [kat] SHA2-384
26,162,168 UART: [kat] SHA2-512-ACC
26,165,105 UART: [kat] ECC-384
28,629,687 UART: [kat] HMAC-384Kdf
28,652,660 UART: [kat] LMS
29,182,133 UART: [kat] --
29,186,394 UART: [update-reset] ++
29,232,425 >>> mbox cmd response: failed
29,234,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,378,013 UART: ROM Non-Fatal Error: 0x000B001E
29,379,442 UART: [state] Locking Datavault
29,380,516 UART: [state] Locking PCR0, PCR1 and PCR31
29,382,053 UART: [state] Locking ICCM
29,382,935 UART: [exit] Launching FMC @ 0x40000130
29,384,277 UART:
29,384,425 UART: Running Caliptra FMC ...
29,385,523 UART:
29,385,678 UART: [state] CFI Enabled
29,386,507 UART: [art] Extend RT PCRs Done
29,387,554 UART: [art] Lock RT PCRs Done
29,388,563 UART: [art] Populate DV Done
29,389,592 UART: [fht] FMC Alias Private Key: 7
29,390,836 UART: [art] Derive CDI
29,391,569 UART: [art] Store in in slot 0x4
29,415,877 UART: [art] Derive Key Pair
29,416,880 UART: [art] Store priv key in slot 0x5
31,879,817 UART: [art] Derive Key Pair - Done
31,892,869 UART: [art] Signing Cert with AUTHO
31,894,175 UART: RITY.KEYID = 7
33,604,925 UART: [art] Erasing AUTHORITY.KEYID = 7
33,606,432 UART: [art] PUB.X = 901BC1A31FA101723D1EF85EF8971F9D06768E1635B237AB67717AA0317CCBF3E030F93B6467104D563926259C789E75
33,613,704 UART: [art] PUB.Y = 094A7A480B464C51A98983DC681A4C5CBC7D7AE6273087FF029AE7B293E10A1F9F941A853C7B48215D64B5AA2088F0B7
33,620,938 UART: [art] SIG.R = 4F172015F78AD7E74AEBF7899D64C939EA58E8AB4F10A58BFB25F76FDC073ACBA8CB5154364487759CBAFD132B473B1F
33,628,377 UART: [art] SIG.S = F00FA689F92377B5DB47B7988CF7E4D63B8808C9E744BB0828B5CE4A1829B19316B068AD0885A7B2EF9083118F794A38
34,606,864 UART: Caliptra RT
34,607,566 UART: [state] CFI Enabled
34,946,196 UART: [rt] RT listening for mailbox commands...
34,948,852 UART:
34,949,017 UART: Running Caliptra ROM ...
34,950,121 UART:
34,950,299 UART: [state] CFI Enabled
35,009,930 UART: [state] LifecycleState = Unprovisioned
35,011,771 UART: [state] DebugLocked = No
35,014,284 UART: [state] WD Timer not started. Device not locked for debugging
35,018,828 UART: [kat] SHA2-256
35,197,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,209,529 UART: [kat] ++
35,210,068 UART: [kat] sha1
35,221,988 UART: [kat] SHA2-256
35,225,057 UART: [kat] SHA2-384
35,230,124 UART: [kat] SHA2-512-ACC
35,233,065 UART: [kat] ECC-384
37,695,308 UART: [kat] HMAC-384Kdf
37,718,810 UART: [kat] LMS
38,248,261 UART: [kat] --
38,252,304 UART: [update-reset] ++
41,679,587 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,683,070 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,066,419 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,384,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,083 >>> mbox cmd response: success
14,040,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,322,696 UART:
18,323,123 UART: Running Caliptra FMC ...
18,324,265 UART:
18,324,427 UART: [state] CFI Enabled
18,390,070 UART: [fht] FMC Alias Private Key: 7
20,153,865 UART: [art] Extend RT PCRs Done
20,155,234 UART: [art] Lock RT PCRs Done
20,156,598 UART: [art] Populate DV Done
20,162,093 UART: [fht] FMC Alias Private Key: 7
20,163,647 UART: [art] Derive CDI
20,164,468 UART: [art] Store in in slot 0x4
20,223,049 UART: [art] Derive Key Pair
20,224,051 UART: [art] Store priv key in slot 0x5
22,687,270 UART: [art] Derive Key Pair - Done
22,700,218 UART: [art] Signing Cert with AUTHO
22,701,526 UART: RITY.KEYID = 7
24,412,762 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,274 UART: [art] PUB.X = 0E9E4A75872EE4D1D96D4795332CA960E96B33D8EEA73A87B1053A656F2DECE4CEAD4189AC5E91D975529C64E7EAA585
24,421,522 UART: [art] PUB.Y = 726A8D1B268991571E9798C5DA09BB4189DC376B79A4D1B35DDA9EC6E5A99AF5A1C4F192D760D2C09E6BBFD276DE1815
24,428,788 UART: [art] SIG.R = 16F32134798BD46620D809F33A98D1D6AD9BA644D8436B10576DE80AFF9014A7DB4CED2C79280E6C7D71081C3230ABDC
24,436,160 UART: [art] SIG.S = 2B0D1763CE75AA750C470D8C5CA92BE6010F024E8A3574674E0BBA242BC2D9F5C374019B2087D612800FDFB5787ED01F
25,414,839 UART: Caliptra RT
25,415,532 UART: [state] CFI Enabled
25,580,345 UART: [rt] RT listening for mailbox commands...
28,797,857 >>> mbox cmd response: failed
28,799,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,943,317 UART:
28,943,624 UART: Running Caliptra FMC ...
28,944,699 UART:
28,944,855 UART: [state] CFI Enabled
28,945,712 UART: [art] Extend RT PCRs Done
28,946,784 UART: [art] Lock RT PCRs Done
28,947,782 UART: [art] Populate DV Done
28,948,881 UART: [fht] FMC Alias Private Key: 7
28,950,207 UART: [art] Derive CDI
28,950,943 UART: [art] Store in in slot 0x4
28,969,262 UART: [art] Derive Key Pair
28,970,305 UART: [art] Store priv key in slot 0x5
31,433,283 UART: [art] Derive Key Pair - Done
31,446,556 UART: [art] Signing Cert with AUTHO
31,447,905 UART: RITY.KEYID = 7
33,158,792 UART: [art] Erasing AUTHORITY.KEYID = 7
33,160,299 UART: [art] PUB.X = 0E9E4A75872EE4D1D96D4795332CA960E96B33D8EEA73A87B1053A656F2DECE4CEAD4189AC5E91D975529C64E7EAA585
33,167,573 UART: [art] PUB.Y = 726A8D1B268991571E9798C5DA09BB4189DC376B79A4D1B35DDA9EC6E5A99AF5A1C4F192D760D2C09E6BBFD276DE1815
33,174,829 UART: [art] SIG.R = 16F32134798BD46620D809F33A98D1D6AD9BA644D8436B10576DE80AFF9014A7DB4CED2C79280E6C7D71081C3230ABDC
33,182,263 UART: [art] SIG.S = 2B0D1763CE75AA750C470D8C5CA92BE6010F024E8A3574674E0BBA242BC2D9F5C374019B2087D612800FDFB5787ED01F
34,161,676 UART: Caliptra RT
34,162,390 UART: [state] CFI Enabled
34,495,766 UART: [rt] RT listening for mailbox commands...
41,456,211 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,644 UART:
193,015 UART: Running Caliptra ROM ...
194,138 UART:
603,754 UART: [state] CFI Enabled
618,993 UART: [state] LifecycleState = Unprovisioned
620,837 UART: [state] DebugLocked = No
623,511 UART: [state] WD Timer not started. Device not locked for debugging
627,237 UART: [kat] SHA2-256
806,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,891 UART: [kat] ++
818,419 UART: [kat] sha1
829,249 UART: [kat] SHA2-256
832,302 UART: [kat] SHA2-384
838,672 UART: [kat] SHA2-512-ACC
841,669 UART: [kat] ECC-384
3,284,688 UART: [kat] HMAC-384Kdf
3,297,546 UART: [kat] LMS
3,826,989 UART: [kat] --
3,831,697 UART: [cold-reset] ++
3,833,792 UART: [fht] FHT @ 0x50003400
3,845,357 UART: [idev] ++
3,845,977 UART: [idev] CDI.KEYID = 6
3,846,896 UART: [idev] SUBJECT.KEYID = 7
3,848,002 UART: [idev] UDS.KEYID = 0
3,850,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,612 UART: [idev] Erasing UDS.KEYID = 0
6,322,114 UART: [idev] Sha1 KeyId Algorithm
6,345,348 UART: [idev] --
6,350,199 UART: [ldev] ++
6,350,800 UART: [ldev] CDI.KEYID = 6
6,351,718 UART: [ldev] SUBJECT.KEYID = 5
6,352,894 UART: [ldev] AUTHORITY.KEYID = 7
6,354,130 UART: [ldev] FE.KEYID = 1
6,364,732 UART: [ldev] Erasing FE.KEYID = 1
8,836,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,355 UART: [ldev] --
10,626,756 UART: [fwproc] Wait for Commands...
10,629,877 UART: [fwproc] Recv command 0x46574c44
10,631,979 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,104,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,559 >>> mbox cmd response: success
14,494,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,638,430 UART: [afmc] ++
14,639,067 UART: [afmc] CDI.KEYID = 6
14,639,988 UART: [afmc] SUBJECT.KEYID = 7
14,641,096 UART: [afmc] AUTHORITY.KEYID = 5
17,002,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,817 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,740,791 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,756,641 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,772,366 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,795,732 UART: [afmc] --
18,798,940 UART: [cold-reset] --
18,801,397 UART: [state] Locking Datavault
18,806,015 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,757 UART: [state] Locking ICCM
18,809,053 UART: [exit] Launching FMC @ 0x40000130
18,817,515 UART:
18,817,753 UART: Running Caliptra FMC ...
18,818,855 UART:
18,819,023 UART: [state] CFI Enabled
18,827,292 UART: [fht] FMC Alias Private Key: 7
20,584,644 UART: [art] Extend RT PCRs Done
20,585,866 UART: [art] Lock RT PCRs Done
20,587,548 UART: [art] Populate DV Done
20,592,908 UART: [fht] FMC Alias Private Key: 7
20,594,341 UART: [art] Derive CDI
20,595,102 UART: [art] Store in in slot 0x4
20,637,749 UART: [art] Derive Key Pair
20,638,749 UART: [art] Store priv key in slot 0x5
23,065,065 UART: [art] Derive Key Pair - Done
23,078,062 UART: [art] Signing Cert with AUTHO
23,079,369 UART: RITY.KEYID = 7
24,784,870 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,388 UART: [art] PUB.X = 9264FFF3AAD25BC902592B35F139E20AC81BB0881E9642BA0C8D0D0F3F62F9175E78D5874671DA579B34E7DC25072A71
24,793,615 UART: [art] PUB.Y = AEBB042810B092A53BBACFFF7E92580AFC9E147DBA051C3EBD74C6255359E0E99819116F9D012BF22B7B8464F855EC8F
24,800,890 UART: [art] SIG.R = C456CC0B773B31FC7B809F01C730ED11F14615F9E72B997ACE18AACC8CA46E3E0CCB56586C192AD7DF14E942C9DFA742
24,808,315 UART: [art] SIG.S = BFF1849DDE50C715658C45EC94FD30CAE42A1C7EC601A5565BD5F8E4F22CAF13A12E95D8B8C1003C13D3CD4978EF824D
25,787,341 UART: Caliptra RT
25,788,030 UART: [state] CFI Enabled
25,905,934 UART: [rt] RT listening for mailbox commands...
25,908,936 UART:
25,909,186 UART: Running Caliptra ROM ...
25,910,211 UART:
25,910,526 UART: [state] CFI Enabled
25,923,620 UART: [state] LifecycleState = Unprovisioned
25,925,655 UART: [state] DebugLocked = No
25,927,050 UART: [state] WD Timer not started. Device not locked for debugging
25,930,958 UART: [kat] SHA2-256
26,110,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,121,749 UART: [kat] ++
26,122,290 UART: [kat] sha1
26,133,939 UART: [kat] SHA2-256
26,137,014 UART: [kat] SHA2-384
26,143,435 UART: [kat] SHA2-512-ACC
26,146,377 UART: [kat] ECC-384
28,587,339 UART: [kat] HMAC-384Kdf
28,598,816 UART: [kat] LMS
29,128,313 UART: [kat] --
29,133,511 UART: [update-reset] ++
29,179,566 >>> mbox cmd response: failed
29,181,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,325,076 UART: ROM Non-Fatal Error: 0x000B001E
29,326,573 UART: [state] Locking Datavault
29,327,676 UART: [state] Locking PCR0, PCR1 and PCR31
29,329,218 UART: [state] Locking ICCM
29,330,105 UART: [exit] Launching FMC @ 0x40000130
29,331,534 UART:
29,331,691 UART: Running Caliptra FMC ...
29,332,848 UART:
29,333,014 UART: [state] CFI Enabled
29,333,881 UART: [art] Extend RT PCRs Done
29,334,956 UART: [art] Lock RT PCRs Done
29,335,958 UART: [art] Populate DV Done
29,336,929 UART: [fht] FMC Alias Private Key: 7
29,338,284 UART: [art] Derive CDI
29,339,030 UART: [art] Store in in slot 0x4
29,340,148 UART: [art] Derive Key Pair
29,341,076 UART: [art] Store priv key in slot 0x5
31,725,440 UART: [art] Derive Key Pair - Done
31,738,278 UART: [art] Signing Cert with AUTHO
31,739,576 UART: RITY.KEYID = 7
33,445,495 UART: [art] Erasing AUTHORITY.KEYID = 7
33,447,002 UART: [art] PUB.X = 9264FFF3AAD25BC902592B35F139E20AC81BB0881E9642BA0C8D0D0F3F62F9175E78D5874671DA579B34E7DC25072A71
33,454,251 UART: [art] PUB.Y = AEBB042810B092A53BBACFFF7E92580AFC9E147DBA051C3EBD74C6255359E0E99819116F9D012BF22B7B8464F855EC8F
33,461,536 UART: [art] SIG.R = C456CC0B773B31FC7B809F01C730ED11F14615F9E72B997ACE18AACC8CA46E3E0CCB56586C192AD7DF14E942C9DFA742
33,468,927 UART: [art] SIG.S = BFF1849DDE50C715658C45EC94FD30CAE42A1C7EC601A5565BD5F8E4F22CAF13A12E95D8B8C1003C13D3CD4978EF824D
34,447,467 UART: Caliptra RT
34,448,169 UART: [state] CFI Enabled
34,734,975 UART: [rt] RT listening for mailbox commands...
34,737,814 UART:
34,737,979 UART: Running Caliptra ROM ...
34,739,092 UART:
34,739,415 UART: [state] CFI Enabled
40,321,974 UART: [state] LifecycleState = Unprovisioned
40,323,892 UART: [state] DebugLocked = No
40,326,708 UART: [state] WD Timer not started. Device not locked for debugging
40,330,610 UART: [kat] SHA2-256
40,509,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,521,332 UART: [kat] ++
40,521,785 UART: [kat] sha1
40,533,100 UART: [kat] SHA2-256
40,536,168 UART: [kat] SHA2-384
40,542,266 UART: [kat] SHA2-512-ACC
40,545,206 UART: [kat] ECC-384
42,988,365 UART: [kat] HMAC-384Kdf
42,999,498 UART: [kat] LMS
43,529,007 UART: [kat] --
43,536,057 UART: [update-reset] ++
46,961,955 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,964,540 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,347,829 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,704,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,177 >>> mbox cmd response: success
14,277,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,524,497 UART:
18,524,921 UART: Running Caliptra FMC ...
18,526,044 UART:
18,526,201 UART: [state] CFI Enabled
18,534,356 UART: [fht] FMC Alias Private Key: 7
20,291,030 UART: [art] Extend RT PCRs Done
20,292,265 UART: [art] Lock RT PCRs Done
20,293,918 UART: [art] Populate DV Done
20,299,565 UART: [fht] FMC Alias Private Key: 7
20,301,116 UART: [art] Derive CDI
20,301,862 UART: [art] Store in in slot 0x4
20,344,675 UART: [art] Derive Key Pair
20,345,678 UART: [art] Store priv key in slot 0x5
22,772,707 UART: [art] Derive Key Pair - Done
22,785,551 UART: [art] Signing Cert with AUTHO
22,786,853 UART: RITY.KEYID = 7
24,492,425 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,934 UART: [art] PUB.X = 9F03F222EAA26A697F6E4CCA6B628839F2485467A1CB7616D85FD4132E1AB952CDAF8F56A9DA8DD13E5DCE4477BA3BC6
24,501,172 UART: [art] PUB.Y = FC89DB87E6E1359B775445D51E4F6A3558D2B598495C5D82EB8F161420F0D13237D91C2C5E35C272BDD97FDCD56C9508
24,508,450 UART: [art] SIG.R = 1C291111726B12657591422A6C57F6AB0ED282208AAB7F4A76BD1D63EDA966C9143D7B6B6EDC2DB17F4113B5AAFB4442
24,515,855 UART: [art] SIG.S = 14067C6F0377BEF95E2CFAFC37EF2AF016530C3B680A80CDE2F72686C2320DE59ED86D14EAA9F59006CACF747DDF7DCA
25,495,105 UART: Caliptra RT
25,495,824 UART: [state] CFI Enabled
25,613,156 UART: [rt] RT listening for mailbox commands...
28,746,048 >>> mbox cmd response: failed
28,748,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,891,720 UART:
28,892,026 UART: Running Caliptra FMC ...
28,893,150 UART:
28,893,350 UART: [state] CFI Enabled
28,894,277 UART: [art] Extend RT PCRs Done
28,895,417 UART: [art] Lock RT PCRs Done
28,896,480 UART: [art] Populate DV Done
28,897,587 UART: [fht] FMC Alias Private Key: 7
28,898,914 UART: [art] Derive CDI
28,899,653 UART: [art] Store in in slot 0x4
28,900,823 UART: [art] Derive Key Pair
28,901,742 UART: [art] Store priv key in slot 0x5
31,285,382 UART: [art] Derive Key Pair - Done
31,298,064 UART: [art] Signing Cert with AUTHO
31,299,367 UART: RITY.KEYID = 7
33,005,417 UART: [art] Erasing AUTHORITY.KEYID = 7
33,006,924 UART: [art] PUB.X = 9F03F222EAA26A697F6E4CCA6B628839F2485467A1CB7616D85FD4132E1AB952CDAF8F56A9DA8DD13E5DCE4477BA3BC6
33,014,175 UART: [art] PUB.Y = FC89DB87E6E1359B775445D51E4F6A3558D2B598495C5D82EB8F161420F0D13237D91C2C5E35C272BDD97FDCD56C9508
33,021,464 UART: [art] SIG.R = 1C291111726B12657591422A6C57F6AB0ED282208AAB7F4A76BD1D63EDA966C9143D7B6B6EDC2DB17F4113B5AAFB4442
33,028,890 UART: [art] SIG.S = 14067C6F0377BEF95E2CFAFC37EF2AF016530C3B680A80CDE2F72686C2320DE59ED86D14EAA9F59006CACF747DDF7DCA
34,007,734 UART: Caliptra RT
34,008,460 UART: [state] CFI Enabled
34,295,666 UART: [rt] RT listening for mailbox commands...
47,223,002 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,734 writing to cptra_bootfsm_go
192,984 UART:
193,330 UART: Running Caliptra ROM ...
194,515 UART:
194,667 UART: [state] CFI Enabled
262,475 UART: [state] LifecycleState = Unprovisioned
264,933 UART: [state] DebugLocked = No
267,538 UART: [state] WD Timer not started. Device not locked for debugging
272,837 UART: [kat] SHA2-256
462,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,530 UART: [kat] ++
474,011 UART: [kat] sha1
484,902 UART: [kat] SHA2-256
487,921 UART: [kat] SHA2-384
494,566 UART: [kat] SHA2-512-ACC
497,124 UART: [kat] ECC-384
2,945,355 UART: [kat] HMAC-384Kdf
2,968,328 UART: [kat] LMS
3,500,063 UART: [kat] --
3,502,810 UART: [cold-reset] ++
3,503,714 UART: [fht] FHT @ 0x50003400
3,515,236 UART: [idev] ++
3,515,918 UART: [idev] CDI.KEYID = 6
3,516,935 UART: [idev] SUBJECT.KEYID = 7
3,518,092 UART: [idev] UDS.KEYID = 0
3,520,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,966 UART: [idev] Erasing UDS.KEYID = 0
6,021,238 UART: [idev] Sha1 KeyId Algorithm
6,044,095 UART: [idev] --
6,048,654 UART: [ldev] ++
6,049,333 UART: [ldev] CDI.KEYID = 6
6,050,221 UART: [ldev] SUBJECT.KEYID = 5
6,051,437 UART: [ldev] AUTHORITY.KEYID = 7
6,052,613 UART: [ldev] FE.KEYID = 1
6,096,431 UART: [ldev] Erasing FE.KEYID = 1
8,600,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,501 UART: [ldev] --
10,408,323 UART: [fwproc] Wait for Commands...
10,410,866 UART: [fwproc] Recv command 0x46574c44
10,413,128 UART: [fwproc] Recv'd Img size: 114448 bytes
13,855,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,935,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,595,417 >>> mbox cmd response: success
14,597,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,458 UART: [afmc] ++
14,742,109 UART: [afmc] CDI.KEYID = 6
14,743,031 UART: [afmc] SUBJECT.KEYID = 7
14,744,145 UART: [afmc] AUTHORITY.KEYID = 5
17,148,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,797 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,908,982 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,924,100 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,938,951 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,963,322 UART: [afmc] --
18,966,896 UART: [cold-reset] --
18,970,894 UART: [state] Locking Datavault
18,976,850 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,041 UART: [state] Locking ICCM
18,980,813 UART: [exit] Launching FMC @ 0x40000130
18,989,486 UART:
18,989,730 UART: Running Caliptra FMC ...
18,990,831 UART:
18,990,992 UART: [state] CFI Enabled
19,049,746 UART: [fht] FMC Alias Private Key: 7
20,813,708 UART: [art] Extend RT PCRs Done
20,814,909 UART: [art] Lock RT PCRs Done
20,816,724 UART: [art] Populate DV Done
20,822,294 UART: [fht] FMC Alias Private Key: 7
20,823,938 UART: [art] Derive CDI
20,824,747 UART: [art] Store in in slot 0x4
20,882,512 UART: [art] Derive Key Pair
20,883,561 UART: [art] Store priv key in slot 0x5
23,346,518 UART: [art] Derive Key Pair - Done
23,359,727 UART: [art] Signing Cert with AUTHO
23,361,021 UART: RITY.KEYID = 7
25,071,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,252 UART: [art] PUB.X = E0CEA6BC1C0B1DC0D40641D319D1C3BE6EFFD05E240068A6AC2421737C7B68D575AAED333AF34C4D7829A4F47320EC7E
25,080,520 UART: [art] PUB.Y = E7F84B17F4B0B42C925E8B8DE27D90787581F54678FF06D51D70FAC9574DD68F01C533D43FAB0123ECB01FD3F60B8741
25,087,816 UART: [art] SIG.R = 13D579C9DB34BEE988A6EB3380780D7E1F94542513F2D8C58BEDBFACD33B9A7AF0942548E053F9E0C880F24DDAFBFF83
25,095,218 UART: [art] SIG.S = B649E178399B5A878E0A7AB3167AF1045590F744340F59F60E954DCC02D2D49106D3F504967D66E21B9C608BD27FF340
26,073,699 UART: Caliptra RT
26,074,419 UART: [state] CFI Enabled
26,241,624 UART: [rt] RT listening for mailbox commands...
26,244,554 UART:
26,244,724 UART: Running Caliptra ROM ...
26,245,833 UART:
26,245,989 UART: [state] CFI Enabled
26,308,177 UART: [state] LifecycleState = Unprovisioned
26,310,235 UART: [state] DebugLocked = No
26,312,614 UART: [state] WD Timer not started. Device not locked for debugging
26,317,538 UART: [kat] SHA2-256
26,507,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,518,168 UART: [kat] ++
26,518,628 UART: [kat] sha1
26,529,569 UART: [kat] SHA2-256
26,532,573 UART: [kat] SHA2-384
26,538,340 UART: [kat] SHA2-512-ACC
26,540,966 UART: [kat] ECC-384
28,993,162 UART: [kat] HMAC-384Kdf
29,015,870 UART: [kat] LMS
29,547,455 UART: [kat] --
29,553,238 UART: [update-reset] ++
29,615,464 >>> mbox cmd response: failed
29,617,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,760,949 UART: ROM Non-Fatal Error: 0x000B001E
29,762,543 UART: [state] Locking Datavault
29,763,639 UART: [state] Locking PCR0, PCR1 and PCR31
29,765,196 UART: [state] Locking ICCM
29,766,081 UART: [exit] Launching FMC @ 0x40000130
29,767,509 UART:
29,767,663 UART: Running Caliptra FMC ...
29,768,762 UART:
29,768,917 UART: [state] CFI Enabled
29,769,749 UART: [art] Extend RT PCRs Done
29,770,798 UART: [art] Lock RT PCRs Done
29,771,855 UART: [art] Populate DV Done
29,772,804 UART: [fht] FMC Alias Private Key: 7
29,774,039 UART: [art] Derive CDI
29,774,800 UART: [art] Store in in slot 0x4
29,800,950 UART: [art] Derive Key Pair
29,801,949 UART: [art] Store priv key in slot 0x5
32,264,243 UART: [art] Derive Key Pair - Done
32,277,398 UART: [art] Signing Cert with AUTHO
32,278,700 UART: RITY.KEYID = 7
33,990,174 UART: [art] Erasing AUTHORITY.KEYID = 7
33,991,683 UART: [art] PUB.X = E0CEA6BC1C0B1DC0D40641D319D1C3BE6EFFD05E240068A6AC2421737C7B68D575AAED333AF34C4D7829A4F47320EC7E
33,998,957 UART: [art] PUB.Y = E7F84B17F4B0B42C925E8B8DE27D90787581F54678FF06D51D70FAC9574DD68F01C533D43FAB0123ECB01FD3F60B8741
34,006,219 UART: [art] SIG.R = 13D579C9DB34BEE988A6EB3380780D7E1F94542513F2D8C58BEDBFACD33B9A7AF0942548E053F9E0C880F24DDAFBFF83
34,013,631 UART: [art] SIG.S = B649E178399B5A878E0A7AB3167AF1045590F744340F59F60E954DCC02D2D49106D3F504967D66E21B9C608BD27FF340
34,993,024 UART: Caliptra RT
34,993,722 UART: [state] CFI Enabled
35,331,609 UART: [rt] RT listening for mailbox commands...
35,334,182 UART:
35,334,348 UART: Running Caliptra ROM ...
35,335,392 UART:
35,335,555 UART: [state] CFI Enabled
35,399,290 UART: [state] LifecycleState = Unprovisioned
35,401,331 UART: [state] DebugLocked = No
35,403,039 UART: [state] WD Timer not started. Device not locked for debugging
35,407,651 UART: [kat] SHA2-256
35,597,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,608,257 UART: [kat] ++
35,608,743 UART: [kat] sha1
35,620,058 UART: [kat] SHA2-256
35,623,084 UART: [kat] SHA2-384
35,628,644 UART: [kat] SHA2-512-ACC
35,631,208 UART: [kat] ECC-384
38,081,707 UART: [kat] HMAC-384Kdf
38,104,004 UART: [kat] LMS
38,635,607 UART: [kat] --
38,639,595 UART: [update-reset] ++
42,095,106 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,099,242 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,707,489 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,439,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,713,648 >>> mbox cmd response: success
14,715,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,008,370 UART:
19,008,811 UART: Running Caliptra FMC ...
19,009,923 UART:
19,010,081 UART: [state] CFI Enabled
19,073,768 UART: [fht] FMC Alias Private Key: 7
20,838,171 UART: [art] Extend RT PCRs Done
20,839,391 UART: [art] Lock RT PCRs Done
20,841,149 UART: [art] Populate DV Done
20,846,509 UART: [fht] FMC Alias Private Key: 7
20,848,209 UART: [art] Derive CDI
20,848,949 UART: [art] Store in in slot 0x4
20,906,843 UART: [art] Derive Key Pair
20,907,915 UART: [art] Store priv key in slot 0x5
23,370,890 UART: [art] Derive Key Pair - Done
23,383,784 UART: [art] Signing Cert with AUTHO
23,385,085 UART: RITY.KEYID = 7
25,097,159 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,711 UART: [art] PUB.X = 297036BA84E1F3A2B70FC32BF4F61E17C247BE09D0238CE0AB352FB594E28C935BF9AC764287CA9052B77B6C3A304B7D
25,105,953 UART: [art] PUB.Y = 8E2AB0EFA982E5BACBA46AA958E4F295868323F42C12859F60A8A42F4F7EC8604C451751F68F0F494BA9E847608672ED
25,113,206 UART: [art] SIG.R = 902037AB30935EC6C5DA44E83803F375F84048CD013ED1590BDB486D9D43E7E44AB03CC69C1C9B1C66A82B216161A3CC
25,120,580 UART: [art] SIG.S = A8D237DE52630183994FF70856E1498B3C57A0A8DC676F0709FA23A6E8E99694E62221CA7CBC883D42220F0D2AFEAC72
26,099,521 UART: Caliptra RT
26,100,218 UART: [state] CFI Enabled
26,277,346 UART: [rt] RT listening for mailbox commands...
29,551,405 >>> mbox cmd response: failed
29,553,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,697,000 UART:
29,697,313 UART: Running Caliptra FMC ...
29,698,433 UART:
29,698,598 UART: [state] CFI Enabled
29,699,523 UART: [art] Extend RT PCRs Done
29,700,667 UART: [art] Lock RT PCRs Done
29,701,737 UART: [art] Populate DV Done
29,702,861 UART: [fht] FMC Alias Private Key: 7
29,704,200 UART: [art] Derive CDI
29,704,935 UART: [art] Store in in slot 0x4
29,730,342 UART: [art] Derive Key Pair
29,731,387 UART: [art] Store priv key in slot 0x5
32,194,758 UART: [art] Derive Key Pair - Done
32,207,596 UART: [art] Signing Cert with AUTHO
32,208,903 UART: RITY.KEYID = 7
33,920,824 UART: [art] Erasing AUTHORITY.KEYID = 7
33,922,337 UART: [art] PUB.X = 297036BA84E1F3A2B70FC32BF4F61E17C247BE09D0238CE0AB352FB594E28C935BF9AC764287CA9052B77B6C3A304B7D
33,929,562 UART: [art] PUB.Y = 8E2AB0EFA982E5BACBA46AA958E4F295868323F42C12859F60A8A42F4F7EC8604C451751F68F0F494BA9E847608672ED
33,936,844 UART: [art] SIG.R = 902037AB30935EC6C5DA44E83803F375F84048CD013ED1590BDB486D9D43E7E44AB03CC69C1C9B1C66A82B216161A3CC
33,944,250 UART: [art] SIG.S = A8D237DE52630183994FF70856E1498B3C57A0A8DC676F0709FA23A6E8E99694E62221CA7CBC883D42220F0D2AFEAC72
34,923,022 UART: Caliptra RT
34,923,732 UART: [state] CFI Enabled
35,270,064 UART: [rt] RT listening for mailbox commands...
42,943,727 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,395 UART:
192,760 UART: Running Caliptra ROM ...
193,976 UART:
603,397 UART: [state] CFI Enabled
615,450 UART: [state] LifecycleState = Unprovisioned
617,450 UART: [state] DebugLocked = No
619,822 UART: [state] WD Timer not started. Device not locked for debugging
623,926 UART: [kat] SHA2-256
813,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,557 UART: [kat] ++
825,080 UART: [kat] sha1
835,856 UART: [kat] SHA2-256
838,870 UART: [kat] SHA2-384
844,955 UART: [kat] SHA2-512-ACC
847,512 UART: [kat] ECC-384
3,289,208 UART: [kat] HMAC-384Kdf
3,301,121 UART: [kat] LMS
3,832,933 UART: [kat] --
3,836,411 UART: [cold-reset] ++
3,838,960 UART: [fht] FHT @ 0x50003400
3,849,085 UART: [idev] ++
3,849,658 UART: [idev] CDI.KEYID = 6
3,850,596 UART: [idev] SUBJECT.KEYID = 7
3,851,810 UART: [idev] UDS.KEYID = 0
3,854,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,485 UART: [idev] Erasing UDS.KEYID = 0
6,330,814 UART: [idev] Sha1 KeyId Algorithm
6,353,565 UART: [idev] --
6,359,129 UART: [ldev] ++
6,359,808 UART: [ldev] CDI.KEYID = 6
6,360,729 UART: [ldev] SUBJECT.KEYID = 5
6,361,890 UART: [ldev] AUTHORITY.KEYID = 7
6,363,127 UART: [ldev] FE.KEYID = 1
6,375,068 UART: [ldev] Erasing FE.KEYID = 1
8,850,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,435 UART: [ldev] --
10,643,361 UART: [fwproc] Wait for Commands...
10,644,934 UART: [fwproc] Recv command 0x46574c44
10,647,251 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,172,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,832,341 >>> mbox cmd response: success
14,834,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,978,180 UART: [afmc] ++
14,978,816 UART: [afmc] CDI.KEYID = 6
14,979,754 UART: [afmc] SUBJECT.KEYID = 7
14,980,865 UART: [afmc] AUTHORITY.KEYID = 5
17,343,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,104 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
19,084,254 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
19,099,390 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
19,114,188 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
19,138,999 UART: [afmc] --
19,142,612 UART: [cold-reset] --
19,145,730 UART: [state] Locking Datavault
19,151,627 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,758 UART: [state] Locking ICCM
19,155,478 UART: [exit] Launching FMC @ 0x40000130
19,164,150 UART:
19,164,383 UART: Running Caliptra FMC ...
19,165,502 UART:
19,165,668 UART: [state] CFI Enabled
19,173,822 UART: [fht] FMC Alias Private Key: 7
20,931,495 UART: [art] Extend RT PCRs Done
20,932,684 UART: [art] Lock RT PCRs Done
20,934,301 UART: [art] Populate DV Done
20,939,605 UART: [fht] FMC Alias Private Key: 7
20,941,315 UART: [art] Derive CDI
20,942,127 UART: [art] Store in in slot 0x4
20,984,161 UART: [art] Derive Key Pair
20,985,228 UART: [art] Store priv key in slot 0x5
23,411,882 UART: [art] Derive Key Pair - Done
23,424,933 UART: [art] Signing Cert with AUTHO
23,426,235 UART: RITY.KEYID = 7
25,131,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,244 UART: [art] PUB.X = CCBF6D8B38A12BA7C18B73428016E536171382AC733091BB0D2B6EBD6BB47CC7850EF96CFF82DA08AA88E6C55ACB599C
25,140,545 UART: [art] PUB.Y = 46B8610FBD03B6A2F3890A71D16E84EA8122134433580C42299E53D05259B5367AABDCBC223A28043AD7ABFAA45F434A
25,147,767 UART: [art] SIG.R = E83E863500C763590AB1231C997F0E5644A865166ECA6F00E3D79629CB1DC8951DCD881ECCA4ED580D6279CC133DA66F
25,155,150 UART: [art] SIG.S = CE60EBA5DC28E586790F54F176AAB758262FDD74450C661741705195AA9F63F0751D0E6954DE6DC9BE4FF52F0F9988B3
26,134,042 UART: Caliptra RT
26,134,746 UART: [state] CFI Enabled
26,253,017 UART: [rt] RT listening for mailbox commands...
26,256,141 UART:
26,256,392 UART: Running Caliptra ROM ...
26,257,495 UART:
26,257,760 UART: [state] CFI Enabled
26,272,017 UART: [state] LifecycleState = Unprovisioned
26,273,855 UART: [state] DebugLocked = No
26,275,448 UART: [state] WD Timer not started. Device not locked for debugging
26,280,376 UART: [kat] SHA2-256
26,470,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,481,058 UART: [kat] ++
26,481,567 UART: [kat] sha1
26,493,372 UART: [kat] SHA2-256
26,496,383 UART: [kat] SHA2-384
26,501,404 UART: [kat] SHA2-512-ACC
26,504,023 UART: [kat] ECC-384
28,944,573 UART: [kat] HMAC-384Kdf
28,957,925 UART: [kat] LMS
29,489,501 UART: [kat] --
29,492,484 UART: [update-reset] ++
29,551,660 >>> mbox cmd response: failed
29,553,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,697,058 UART: ROM Non-Fatal Error: 0x000B001E
29,698,496 UART: [state] Locking Datavault
29,699,646 UART: [state] Locking PCR0, PCR1 and PCR31
29,701,183 UART: [state] Locking ICCM
29,702,065 UART: [exit] Launching FMC @ 0x40000130
29,703,429 UART:
29,703,581 UART: Running Caliptra FMC ...
29,704,683 UART:
29,704,838 UART: [state] CFI Enabled
29,705,669 UART: [art] Extend RT PCRs Done
29,706,751 UART: [art] Lock RT PCRs Done
29,707,728 UART: [art] Populate DV Done
29,708,751 UART: [fht] FMC Alias Private Key: 7
29,710,071 UART: [art] Derive CDI
29,710,807 UART: [art] Store in in slot 0x4
29,711,894 UART: [art] Derive Key Pair
29,712,828 UART: [art] Store priv key in slot 0x5
32,101,724 UART: [art] Derive Key Pair - Done
32,114,561 UART: [art] Signing Cert with AUTHO
32,115,859 UART: RITY.KEYID = 7
33,821,364 UART: [art] Erasing AUTHORITY.KEYID = 7
33,822,892 UART: [art] PUB.X = CCBF6D8B38A12BA7C18B73428016E536171382AC733091BB0D2B6EBD6BB47CC7850EF96CFF82DA08AA88E6C55ACB599C
33,830,160 UART: [art] PUB.Y = 46B8610FBD03B6A2F3890A71D16E84EA8122134433580C42299E53D05259B5367AABDCBC223A28043AD7ABFAA45F434A
33,837,439 UART: [art] SIG.R = E83E863500C763590AB1231C997F0E5644A865166ECA6F00E3D79629CB1DC8951DCD881ECCA4ED580D6279CC133DA66F
33,844,790 UART: [art] SIG.S = CE60EBA5DC28E586790F54F176AAB758262FDD74450C661741705195AA9F63F0751D0E6954DE6DC9BE4FF52F0F9988B3
34,823,790 UART: Caliptra RT
34,824,473 UART: [state] CFI Enabled
35,109,864 UART: [rt] RT listening for mailbox commands...
35,112,331 UART:
35,112,523 UART: Running Caliptra ROM ...
35,113,570 UART:
35,113,937 UART: [state] CFI Enabled
40,319,010 UART: [state] LifecycleState = Unprovisioned
40,320,966 UART: [state] DebugLocked = No
40,323,193 UART: [state] WD Timer not started. Device not locked for debugging
40,327,369 UART: [kat] SHA2-256
40,517,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,527,999 UART: [kat] ++
40,528,514 UART: [kat] sha1
40,538,865 UART: [kat] SHA2-256
40,541,875 UART: [kat] SHA2-384
40,547,536 UART: [kat] SHA2-512-ACC
40,550,106 UART: [kat] ECC-384
42,991,900 UART: [kat] HMAC-384Kdf
43,005,609 UART: [kat] LMS
43,537,252 UART: [kat] --
43,542,671 UART: [update-reset] ++
46,997,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,999,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,608,129 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,761,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,748 >>> mbox cmd response: success
14,957,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,208,411 UART:
19,208,811 UART: Running Caliptra FMC ...
19,209,948 UART:
19,210,110 UART: [state] CFI Enabled
19,217,903 UART: [fht] FMC Alias Private Key: 7
20,974,746 UART: [art] Extend RT PCRs Done
20,975,970 UART: [art] Lock RT PCRs Done
20,977,920 UART: [art] Populate DV Done
20,983,229 UART: [fht] FMC Alias Private Key: 7
20,984,830 UART: [art] Derive CDI
20,985,650 UART: [art] Store in in slot 0x4
21,027,880 UART: [art] Derive Key Pair
21,028,951 UART: [art] Store priv key in slot 0x5
23,454,737 UART: [art] Derive Key Pair - Done
23,468,005 UART: [art] Signing Cert with AUTHO
23,469,315 UART: RITY.KEYID = 7
25,175,089 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,607 UART: [art] PUB.X = 3A06CF3976B27FB9C51E6BD430E98A0A34AC3A10CD5F4A75AF64E761A803D782CAE94FF896851293A08BFB691F44EF38
25,183,892 UART: [art] PUB.Y = E271C2F3423F0EF0BD1C89C605B0CC5DB9369A6132F69CEBE50ABF5C91EE961D42A2BD5EF2B2CE769F29E703DA8BB830
25,191,193 UART: [art] SIG.R = AE19049242E0E16C222F327E0A9147639C89902000234891EB7815A89F8359598BF4ED939D035234BB0CB9424084543B
25,198,562 UART: [art] SIG.S = 1D3813AA6DC4AA82990FE0D15A2C2ADEFB84D388AB3A87EA0DC08CAF33FB9A0AE259F80A3B822F6F7B7C8227BF6B55BA
26,177,889 UART: Caliptra RT
26,178,578 UART: [state] CFI Enabled
26,295,623 UART: [rt] RT listening for mailbox commands...
29,489,183 >>> mbox cmd response: failed
29,490,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,634,728 UART:
29,635,036 UART: Running Caliptra FMC ...
29,636,082 UART:
29,636,234 UART: [state] CFI Enabled
29,637,165 UART: [art] Extend RT PCRs Done
29,638,256 UART: [art] Lock RT PCRs Done
29,639,260 UART: [art] Populate DV Done
29,640,288 UART: [fht] FMC Alias Private Key: 7
29,641,615 UART: [art] Derive CDI
29,642,347 UART: [art] Store in in slot 0x4
29,643,454 UART: [art] Derive Key Pair
29,644,452 UART: [art] Store priv key in slot 0x5
32,027,554 UART: [art] Derive Key Pair - Done
32,040,439 UART: [art] Signing Cert with AUTHO
32,041,747 UART: RITY.KEYID = 7
33,746,554 UART: [art] Erasing AUTHORITY.KEYID = 7
33,748,062 UART: [art] PUB.X = 3A06CF3976B27FB9C51E6BD430E98A0A34AC3A10CD5F4A75AF64E761A803D782CAE94FF896851293A08BFB691F44EF38
33,755,361 UART: [art] PUB.Y = E271C2F3423F0EF0BD1C89C605B0CC5DB9369A6132F69CEBE50ABF5C91EE961D42A2BD5EF2B2CE769F29E703DA8BB830
33,762,650 UART: [art] SIG.R = AE19049242E0E16C222F327E0A9147639C89902000234891EB7815A89F8359598BF4ED939D035234BB0CB9424084543B
33,770,017 UART: [art] SIG.S = 1D3813AA6DC4AA82990FE0D15A2C2ADEFB84D388AB3A87EA0DC08CAF33FB9A0AE259F80A3B822F6F7B7C8227BF6B55BA
34,749,171 UART: Caliptra RT
34,749,863 UART: [state] CFI Enabled
35,035,627 UART: [rt] RT listening for mailbox commands...
47,892,029 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,431 UART: [kat] SHA2-256
882,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,477 UART: [kat] ++
886,629 UART: [kat] sha1
890,961 UART: [kat] SHA2-256
892,899 UART: [kat] SHA2-384
895,698 UART: [kat] SHA2-512-ACC
897,599 UART: [kat] ECC-384
903,348 UART: [kat] HMAC-384Kdf
908,112 UART: [kat] LMS
1,476,308 UART: [kat] --
1,477,131 UART: [cold-reset] ++
1,477,577 UART: [fht] Storing FHT @ 0x50003400
1,480,248 UART: [idev] ++
1,480,416 UART: [idev] CDI.KEYID = 6
1,480,776 UART: [idev] SUBJECT.KEYID = 7
1,481,200 UART: [idev] UDS.KEYID = 0
1,481,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,162 UART: [idev] Erasing UDS.KEYID = 0
1,505,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,166 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,521,715 UART: [ldev] Erasing FE.KEYID = 1
1,547,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,152 UART: [ldev] --
1,586,489 UART: [fwproc] Waiting for Commands...
1,587,230 UART: [fwproc] Received command 0x46574c44
1,588,021 UART: [fwproc] Received Image of size 114448 bytes
2,885,872 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,913,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,185 >>> mbox cmd response: success
3,079,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,080,387 UART: [afmc] ++
3,080,555 UART: [afmc] CDI.KEYID = 6
3,080,917 UART: [afmc] SUBJECT.KEYID = 7
3,081,342 UART: [afmc] AUTHORITY.KEYID = 5
3,116,695 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,949 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,139,661 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,145,572 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,151,279 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,159,013 UART: [afmc] --
3,159,993 UART: [cold-reset] --
3,161,107 UART: [state] Locking Datavault
3,162,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,954 UART: [state] Locking ICCM
3,163,578 UART: [exit] Launching FMC @ 0x40000130
3,168,907 UART:
3,168,923 UART: Running Caliptra FMC ...
3,169,331 UART:
3,169,385 UART: [state] CFI Enabled
3,179,938 UART: [fht] FMC Alias Private Key: 7
3,287,628 UART: [art] Extend RT PCRs Done
3,288,056 UART: [art] Lock RT PCRs Done
3,289,676 UART: [art] Populate DV Done
3,297,813 UART: [fht] FMC Alias Private Key: 7
3,298,995 UART: [art] Derive CDI
3,299,275 UART: [art] Store in in slot 0x4
3,384,934 UART: [art] Derive Key Pair
3,385,294 UART: [art] Store priv key in slot 0x5
3,398,132 UART: [art] Derive Key Pair - Done
3,412,814 UART: [art] Signing Cert with AUTHO
3,413,294 UART: RITY.KEYID = 7
3,428,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,919 UART: [art] PUB.X = F4E7EEBFE0DEA8624F53443B4E367E2AA7527C658874931F67DB8E579BD15C7F3D2FA74589C42C0BAA00DD976CA5A204
3,435,675 UART: [art] PUB.Y = 8D32F3567381C6620945A3E8A8D8C351FC17774D4EADFC23C7F6236620787C7C3122496AB3AE983CC4AB305A69157C69
3,442,620 UART: [art] SIG.R = 3D691F5E95B97AB2131BBA693DC52B39523469056F05EE03F2AB19D59B7920F109AA28CB180A7E9ED35204D91B9AEE87
3,449,378 UART: [art] SIG.S = 0D0BA28BCC3E0AD35F8B27AC6DBC7061675C108A40FD2BBF76AA507B1FFA6514FE02B9E611E18B6A69794A567AF98772
3,472,587 UART: Caliptra RT
3,472,840 UART: [state] CFI Enabled
3,581,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,661 UART:
3,583,677 UART: Running Caliptra ROM ...
3,584,085 UART:
3,584,139 UART: [state] CFI Enabled
3,587,029 UART: [state] LifecycleState = Unprovisioned
3,587,684 UART: [state] DebugLocked = No
3,588,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,749 UART: [kat] SHA2-256
4,383,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,795 UART: [kat] ++
4,387,947 UART: [kat] sha1
4,392,219 UART: [kat] SHA2-256
4,394,157 UART: [kat] SHA2-384
4,396,930 UART: [kat] SHA2-512-ACC
4,398,830 UART: [kat] ECC-384
4,404,283 UART: [kat] HMAC-384Kdf
4,408,909 UART: [kat] LMS
4,977,105 UART: [kat] --
4,977,770 UART: [update-reset] ++
5,016,745 >>> mbox cmd response: failed
5,016,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,017,199 UART: ROM Non-Fatal Error: 0x000B001E
5,018,005 UART: [state] Locking Datavault
5,018,911 UART: [state] Locking PCR0, PCR1 and PCR31
5,019,515 UART: [state] Locking ICCM
5,019,963 UART: [exit] Launching FMC @ 0x40000130
5,025,292 UART:
5,025,308 UART: Running Caliptra FMC ...
5,025,716 UART:
5,025,770 UART: [state] CFI Enabled
5,114,623 UART: [art] Extend RT PCRs Done
5,115,051 UART: [art] Lock RT PCRs Done
5,116,264 UART: [art] Populate DV Done
5,124,463 UART: [fht] FMC Alias Private Key: 7
5,125,619 UART: [art] Derive CDI
5,125,899 UART: [art] Store in in slot 0x4
5,211,636 UART: [art] Derive Key Pair
5,211,996 UART: [art] Store priv key in slot 0x5
5,225,424 UART: [art] Derive Key Pair - Done
5,239,964 UART: [art] Signing Cert with AUTHO
5,240,444 UART: RITY.KEYID = 7
5,255,684 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,449 UART: [art] PUB.X = F4E7EEBFE0DEA8624F53443B4E367E2AA7527C658874931F67DB8E579BD15C7F3D2FA74589C42C0BAA00DD976CA5A204
5,263,205 UART: [art] PUB.Y = 8D32F3567381C6620945A3E8A8D8C351FC17774D4EADFC23C7F6236620787C7C3122496AB3AE983CC4AB305A69157C69
5,270,150 UART: [art] SIG.R = 3D691F5E95B97AB2131BBA693DC52B39523469056F05EE03F2AB19D59B7920F109AA28CB180A7E9ED35204D91B9AEE87
5,276,908 UART: [art] SIG.S = 0D0BA28BCC3E0AD35F8B27AC6DBC7061675C108A40FD2BBF76AA507B1FFA6514FE02B9E611E18B6A69794A567AF98772
5,301,461 UART: Caliptra RT
5,301,714 UART: [state] CFI Enabled
5,585,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,114 UART:
5,587,130 UART: Running Caliptra ROM ...
5,587,538 UART:
5,587,592 UART: [state] CFI Enabled
5,589,822 UART: [state] LifecycleState = Unprovisioned
5,590,477 UART: [state] DebugLocked = No
5,591,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,592,622 UART: [kat] SHA2-256
6,386,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,390,668 UART: [kat] ++
6,390,820 UART: [kat] sha1
6,394,956 UART: [kat] SHA2-256
6,396,894 UART: [kat] SHA2-384
6,399,745 UART: [kat] SHA2-512-ACC
6,401,645 UART: [kat] ECC-384
6,407,520 UART: [kat] HMAC-384Kdf
6,412,114 UART: [kat] LMS
6,980,310 UART: [kat] --
6,981,035 UART: [update-reset] ++
8,317,652 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,318,862 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,468,912 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,237 >>> mbox cmd response: success
2,928,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,989,521 UART:
2,989,537 UART: Running Caliptra FMC ...
2,989,945 UART:
2,989,999 UART: [state] CFI Enabled
3,000,584 UART: [fht] FMC Alias Private Key: 7
3,108,312 UART: [art] Extend RT PCRs Done
3,108,740 UART: [art] Lock RT PCRs Done
3,110,726 UART: [art] Populate DV Done
3,119,047 UART: [fht] FMC Alias Private Key: 7
3,120,169 UART: [art] Derive CDI
3,120,449 UART: [art] Store in in slot 0x4
3,205,926 UART: [art] Derive Key Pair
3,206,286 UART: [art] Store priv key in slot 0x5
3,219,906 UART: [art] Derive Key Pair - Done
3,234,844 UART: [art] Signing Cert with AUTHO
3,235,324 UART: RITY.KEYID = 7
3,250,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,567 UART: [art] PUB.X = 0EF6460CC8A8558900A9FE9341F29A5A48CE19E43CB505E37859A611140EAA53A0AAE3A8E315646946FFEECE256BE335
3,258,311 UART: [art] PUB.Y = 226C6F81E1D18A8279737459D086B2E5A95CCB6DF3F62EF74E041BDC2E3C194647778709F9A46A66D22F06C8F8435BAB
3,265,256 UART: [art] SIG.R = ACFFA5A5958849978DBF096A62AB0D96742CC6C060A141DB6BE75870E5A853DCE6D9D19F3EC406173AABDE24FA73A104
3,272,030 UART: [art] SIG.S = 4FEF9400E60353B9D590C4D22A13A55BE1A3D46B4EDBB660EB6BD14BDDBD6796FB2FBFF0A0C82571773B453E37712CF7
3,296,050 UART: Caliptra RT
3,296,303 UART: [state] CFI Enabled
3,404,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,592 >>> mbox cmd response: failed
4,723,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,729,499 UART:
4,729,515 UART: Running Caliptra FMC ...
4,729,923 UART:
4,729,977 UART: [state] CFI Enabled
4,819,024 UART: [art] Extend RT PCRs Done
4,819,452 UART: [art] Lock RT PCRs Done
4,820,709 UART: [art] Populate DV Done
4,829,014 UART: [fht] FMC Alias Private Key: 7
4,829,996 UART: [art] Derive CDI
4,830,276 UART: [art] Store in in slot 0x4
4,916,171 UART: [art] Derive Key Pair
4,916,531 UART: [art] Store priv key in slot 0x5
4,929,391 UART: [art] Derive Key Pair - Done
4,944,165 UART: [art] Signing Cert with AUTHO
4,944,645 UART: RITY.KEYID = 7
4,960,389 UART: [art] Erasing AUTHORITY.KEYID = 7
4,961,154 UART: [art] PUB.X = 0EF6460CC8A8558900A9FE9341F29A5A48CE19E43CB505E37859A611140EAA53A0AAE3A8E315646946FFEECE256BE335
4,967,898 UART: [art] PUB.Y = 226C6F81E1D18A8279737459D086B2E5A95CCB6DF3F62EF74E041BDC2E3C194647778709F9A46A66D22F06C8F8435BAB
4,974,843 UART: [art] SIG.R = ACFFA5A5958849978DBF096A62AB0D96742CC6C060A141DB6BE75870E5A853DCE6D9D19F3EC406173AABDE24FA73A104
4,981,617 UART: [art] SIG.S = 4FEF9400E60353B9D590C4D22A13A55BE1A3D46B4EDBB660EB6BD14BDDBD6796FB2FBFF0A0C82571773B453E37712CF7
5,005,493 UART: Caliptra RT
5,005,746 UART: [state] CFI Enabled
5,289,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,055,077 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,205 UART: [idev] ++
1,480,373 UART: [idev] CDI.KEYID = 6
1,480,733 UART: [idev] SUBJECT.KEYID = 7
1,481,157 UART: [idev] UDS.KEYID = 0
1,481,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,443 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,063 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,521,742 UART: [ldev] Erasing FE.KEYID = 1
1,547,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,643 UART: [ldev] --
1,587,092 UART: [fwproc] Waiting for Commands...
1,587,885 UART: [fwproc] Received command 0x46574c44
1,588,676 UART: [fwproc] Received Image of size 114448 bytes
2,887,487 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,914,621 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,104 >>> mbox cmd response: success
3,080,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,081,152 UART: [afmc] ++
3,081,320 UART: [afmc] CDI.KEYID = 6
3,081,682 UART: [afmc] SUBJECT.KEYID = 7
3,082,107 UART: [afmc] AUTHORITY.KEYID = 5
3,117,402 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,912 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,140,624 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,146,535 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,152,242 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,160,148 UART: [afmc] --
3,161,068 UART: [cold-reset] --
3,161,842 UART: [state] Locking Datavault
3,163,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,607 UART: [state] Locking ICCM
3,164,095 UART: [exit] Launching FMC @ 0x40000130
3,169,424 UART:
3,169,440 UART: Running Caliptra FMC ...
3,169,848 UART:
3,169,991 UART: [state] CFI Enabled
3,180,284 UART: [fht] FMC Alias Private Key: 7
3,288,892 UART: [art] Extend RT PCRs Done
3,289,320 UART: [art] Lock RT PCRs Done
3,290,788 UART: [art] Populate DV Done
3,298,881 UART: [fht] FMC Alias Private Key: 7
3,300,011 UART: [art] Derive CDI
3,300,291 UART: [art] Store in in slot 0x4
3,385,886 UART: [art] Derive Key Pair
3,386,246 UART: [art] Store priv key in slot 0x5
3,399,562 UART: [art] Derive Key Pair - Done
3,413,970 UART: [art] Signing Cert with AUTHO
3,414,450 UART: RITY.KEYID = 7
3,429,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,593 UART: [art] PUB.X = 62425E883D449668A7DFAE4B5C0FB5B03DBF2A611FE425C79D8CAA2F548A6EB021E56130A060F6C796FC26BDCD90DC86
3,437,376 UART: [art] PUB.Y = 3A701E12C56D5388717D21323E0CA749CBBB3CB481F499481BB322504286C8ED68551688DADED00866AC3429976C8665
3,444,314 UART: [art] SIG.R = 389C4414171C638686110886397B4F2DF52FFD85C4A9C1012164EE4173629B2369F23DD6E386473824DE292A31DA8B28
3,451,066 UART: [art] SIG.S = FDC880C8EB9565119C20ED4401AC3A389334F0A36FCC55100994B294F267922699958117B52DDEB7B9CC75B8FE0D3B0D
3,474,995 UART: Caliptra RT
3,475,340 UART: [state] CFI Enabled
3,583,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,046 UART:
3,585,062 UART: Running Caliptra ROM ...
3,585,470 UART:
3,585,611 UART: [state] CFI Enabled
3,588,331 UART: [state] LifecycleState = Unprovisioned
3,588,986 UART: [state] DebugLocked = No
3,589,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,177 UART: [kat] SHA2-256
4,385,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,223 UART: [kat] ++
4,389,375 UART: [kat] sha1
4,393,595 UART: [kat] SHA2-256
4,395,533 UART: [kat] SHA2-384
4,398,254 UART: [kat] SHA2-512-ACC
4,400,154 UART: [kat] ECC-384
4,405,739 UART: [kat] HMAC-384Kdf
4,410,473 UART: [kat] LMS
4,978,669 UART: [kat] --
4,979,824 UART: [update-reset] ++
5,018,691 >>> mbox cmd response: failed
5,018,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,019,085 UART: ROM Non-Fatal Error: 0x000B001E
5,019,927 UART: [state] Locking Datavault
5,020,879 UART: [state] Locking PCR0, PCR1 and PCR31
5,021,483 UART: [state] Locking ICCM
5,021,927 UART: [exit] Launching FMC @ 0x40000130
5,027,256 UART:
5,027,272 UART: Running Caliptra FMC ...
5,027,680 UART:
5,027,823 UART: [state] CFI Enabled
5,117,394 UART: [art] Extend RT PCRs Done
5,117,822 UART: [art] Lock RT PCRs Done
5,119,167 UART: [art] Populate DV Done
5,127,296 UART: [fht] FMC Alias Private Key: 7
5,128,454 UART: [art] Derive CDI
5,128,734 UART: [art] Store in in slot 0x4
5,214,535 UART: [art] Derive Key Pair
5,214,895 UART: [art] Store priv key in slot 0x5
5,227,869 UART: [art] Derive Key Pair - Done
5,242,315 UART: [art] Signing Cert with AUTHO
5,242,795 UART: RITY.KEYID = 7
5,257,847 UART: [art] Erasing AUTHORITY.KEYID = 7
5,258,612 UART: [art] PUB.X = 62425E883D449668A7DFAE4B5C0FB5B03DBF2A611FE425C79D8CAA2F548A6EB021E56130A060F6C796FC26BDCD90DC86
5,265,395 UART: [art] PUB.Y = 3A701E12C56D5388717D21323E0CA749CBBB3CB481F499481BB322504286C8ED68551688DADED00866AC3429976C8665
5,272,333 UART: [art] SIG.R = 389C4414171C638686110886397B4F2DF52FFD85C4A9C1012164EE4173629B2369F23DD6E386473824DE292A31DA8B28
5,279,085 UART: [art] SIG.S = FDC880C8EB9565119C20ED4401AC3A389334F0A36FCC55100994B294F267922699958117B52DDEB7B9CC75B8FE0D3B0D
5,303,400 UART: Caliptra RT
5,303,745 UART: [state] CFI Enabled
5,589,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,754 UART:
5,590,770 UART: Running Caliptra ROM ...
5,591,178 UART:
5,591,319 UART: [state] CFI Enabled
5,593,871 UART: [state] LifecycleState = Unprovisioned
5,594,526 UART: [state] DebugLocked = No
5,595,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,596,605 UART: [kat] SHA2-256
6,390,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,394,651 UART: [kat] ++
6,394,803 UART: [kat] sha1
6,399,013 UART: [kat] SHA2-256
6,400,951 UART: [kat] SHA2-384
6,403,624 UART: [kat] SHA2-512-ACC
6,405,524 UART: [kat] ECC-384
6,411,195 UART: [kat] HMAC-384Kdf
6,415,827 UART: [kat] LMS
6,984,023 UART: [kat] --
6,985,056 UART: [update-reset] ++
8,321,211 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,322,375 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,472,425 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,934 >>> mbox cmd response: success
2,928,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,648 UART:
2,990,664 UART: Running Caliptra FMC ...
2,991,072 UART:
2,991,215 UART: [state] CFI Enabled
3,001,966 UART: [fht] FMC Alias Private Key: 7
3,109,638 UART: [art] Extend RT PCRs Done
3,110,066 UART: [art] Lock RT PCRs Done
3,111,648 UART: [art] Populate DV Done
3,119,911 UART: [fht] FMC Alias Private Key: 7
3,120,895 UART: [art] Derive CDI
3,121,175 UART: [art] Store in in slot 0x4
3,207,162 UART: [art] Derive Key Pair
3,207,522 UART: [art] Store priv key in slot 0x5
3,221,418 UART: [art] Derive Key Pair - Done
3,235,882 UART: [art] Signing Cert with AUTHO
3,236,362 UART: RITY.KEYID = 7
3,251,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,165 UART: [art] PUB.X = 2366AED2D609116A6601F574B5DDD72C18DE2BD9103875C8FAF5EE74E023983B35DCA9B6B4FE1C8FF0911FD04C48CA23
3,258,943 UART: [art] PUB.Y = 29F6CB8DF34778C9FCDFC0747A101152CBBEA40B9AFD42D3266FF2105AC2928F0322D981DB0A6845431A0C463A351390
3,265,887 UART: [art] SIG.R = CA3D17F46D0526F7796029E440540CBE3113F30E663EED32223E13D4A7390413C294403D1479BE9B3D187C72F4AC0F6B
3,272,640 UART: [art] SIG.S = 3E9BA1D5B35B7EE13FFDCEA5A23E83868927BC611854E3A6154E2C3598CC024BEEAB40B3035D7572DA0829CCAA488BA6
3,296,446 UART: Caliptra RT
3,296,791 UART: [state] CFI Enabled
3,404,912 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,815 >>> mbox cmd response: failed
4,723,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,729,268 UART:
4,729,284 UART: Running Caliptra FMC ...
4,729,692 UART:
4,729,835 UART: [state] CFI Enabled
4,818,648 UART: [art] Extend RT PCRs Done
4,819,076 UART: [art] Lock RT PCRs Done
4,820,299 UART: [art] Populate DV Done
4,828,622 UART: [fht] FMC Alias Private Key: 7
4,829,608 UART: [art] Derive CDI
4,829,888 UART: [art] Store in in slot 0x4
4,915,873 UART: [art] Derive Key Pair
4,916,233 UART: [art] Store priv key in slot 0x5
4,928,827 UART: [art] Derive Key Pair - Done
4,943,553 UART: [art] Signing Cert with AUTHO
4,944,033 UART: RITY.KEYID = 7
4,958,941 UART: [art] Erasing AUTHORITY.KEYID = 7
4,959,706 UART: [art] PUB.X = 2366AED2D609116A6601F574B5DDD72C18DE2BD9103875C8FAF5EE74E023983B35DCA9B6B4FE1C8FF0911FD04C48CA23
4,966,484 UART: [art] PUB.Y = 29F6CB8DF34778C9FCDFC0747A101152CBBEA40B9AFD42D3266FF2105AC2928F0322D981DB0A6845431A0C463A351390
4,973,428 UART: [art] SIG.R = CA3D17F46D0526F7796029E440540CBE3113F30E663EED32223E13D4A7390413C294403D1479BE9B3D187C72F4AC0F6B
4,980,181 UART: [art] SIG.S = 3E9BA1D5B35B7EE13FFDCEA5A23E83868927BC611854E3A6154E2C3598CC024BEEAB40B3035D7572DA0829CCAA488BA6
5,003,991 UART: Caliptra RT
5,004,336 UART: [state] CFI Enabled
5,288,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,051,184 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
917,900 UART: [kat] HMAC-384Kdf
922,382 UART: [kat] LMS
1,170,710 UART: [kat] --
1,171,611 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,768 UART: [idev] ++
1,174,936 UART: [idev] CDI.KEYID = 6
1,175,296 UART: [idev] SUBJECT.KEYID = 7
1,175,720 UART: [idev] UDS.KEYID = 0
1,176,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,794 UART: [idev] Erasing UDS.KEYID = 0
1,200,889 UART: [idev] Sha1 KeyId Algorithm
1,209,297 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,216,985 UART: [ldev] Erasing FE.KEYID = 1
1,243,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,994 >>> mbox cmd response: success
2,775,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,777,174 UART: [afmc] ++
2,777,342 UART: [afmc] CDI.KEYID = 6
2,777,704 UART: [afmc] SUBJECT.KEYID = 7
2,778,129 UART: [afmc] AUTHORITY.KEYID = 5
2,813,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,863 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,575 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,486 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,200 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,904 UART: [afmc] --
2,856,846 UART: [cold-reset] --
2,857,628 UART: [state] Locking Datavault
2,858,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,547 UART: [state] Locking ICCM
2,860,027 UART: [exit] Launching FMC @ 0x40000130
2,865,356 UART:
2,865,372 UART: Running Caliptra FMC ...
2,865,780 UART:
2,865,834 UART: [state] CFI Enabled
2,876,517 UART: [fht] FMC Alias Private Key: 7
2,984,171 UART: [art] Extend RT PCRs Done
2,984,599 UART: [art] Lock RT PCRs Done
2,986,323 UART: [art] Populate DV Done
2,994,588 UART: [fht] FMC Alias Private Key: 7
2,995,600 UART: [art] Derive CDI
2,995,880 UART: [art] Store in in slot 0x4
3,081,513 UART: [art] Derive Key Pair
3,081,873 UART: [art] Store priv key in slot 0x5
3,094,953 UART: [art] Derive Key Pair - Done
3,109,624 UART: [art] Signing Cert with AUTHO
3,110,104 UART: RITY.KEYID = 7
3,125,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,069 UART: [art] PUB.X = A8DEB0FFE030722A2C890DDB9CCBC459EC4E1C37CCB11B20CAB407D45D17AEA396AB75EFFD186063F724DB2C12B66A7D
3,132,861 UART: [art] PUB.Y = 6EB907443D5FB0C5D0F0A151EF285619E5B526C86270CB66976407E811ADA7758A0ABB1DDCDF3F456DA5C428ED2391FA
3,139,814 UART: [art] SIG.R = 43D73F348453D094675C6B8D5A9D4BC90A4C0AF250CEFD1F8FE13221C30F9771479631B16DCD0E8EA5CA5D598F0387FF
3,146,579 UART: [art] SIG.S = 50E3AA862EB495EF7D04E618B048FA80A4FEE56FC6F7C492D1F26C3D9D229645122C2964C2374E0DB19B2290F4C89C4F
3,170,230 UART: Caliptra RT
3,170,483 UART: [state] CFI Enabled
3,278,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,912 UART:
3,279,928 UART: Running Caliptra ROM ...
3,280,336 UART:
3,280,391 UART: [state] CFI Enabled
3,283,317 UART: [state] LifecycleState = Unprovisioned
3,283,972 UART: [state] DebugLocked = No
3,284,456 UART: [state] WD Timer not started. Device not locked for debugging
3,285,786 UART: [kat] SHA2-256
4,091,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,561 UART: [kat] ++
4,095,713 UART: [kat] sha1
4,099,993 UART: [kat] SHA2-256
4,101,933 UART: [kat] SHA2-384
4,104,684 UART: [kat] SHA2-512-ACC
4,106,584 UART: [kat] ECC-384
4,116,587 UART: [kat] HMAC-384Kdf
4,121,015 UART: [kat] LMS
4,369,343 UART: [kat] --
4,370,225 UART: [update-reset] ++
4,387,038 >>> mbox cmd response: failed
4,387,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,387,256 UART: ROM Non-Fatal Error: 0x000B001E
4,388,156 UART: [state] Locking Datavault
4,388,914 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,518 UART: [state] Locking ICCM
4,390,042 UART: [exit] Launching FMC @ 0x40000130
4,395,371 UART:
4,395,387 UART: Running Caliptra FMC ...
4,395,795 UART:
4,395,849 UART: [state] CFI Enabled
4,484,940 UART: [art] Extend RT PCRs Done
4,485,368 UART: [art] Lock RT PCRs Done
4,486,653 UART: [art] Populate DV Done
4,494,802 UART: [fht] FMC Alias Private Key: 7
4,495,776 UART: [art] Derive CDI
4,496,056 UART: [art] Store in in slot 0x4
4,581,683 UART: [art] Derive Key Pair
4,582,043 UART: [art] Store priv key in slot 0x5
4,595,237 UART: [art] Derive Key Pair - Done
4,610,124 UART: [art] Signing Cert with AUTHO
4,610,604 UART: RITY.KEYID = 7
4,625,772 UART: [art] Erasing AUTHORITY.KEYID = 7
4,626,537 UART: [art] PUB.X = A8DEB0FFE030722A2C890DDB9CCBC459EC4E1C37CCB11B20CAB407D45D17AEA396AB75EFFD186063F724DB2C12B66A7D
4,633,329 UART: [art] PUB.Y = 6EB907443D5FB0C5D0F0A151EF285619E5B526C86270CB66976407E811ADA7758A0ABB1DDCDF3F456DA5C428ED2391FA
4,640,282 UART: [art] SIG.R = 43D73F348453D094675C6B8D5A9D4BC90A4C0AF250CEFD1F8FE13221C30F9771479631B16DCD0E8EA5CA5D598F0387FF
4,647,047 UART: [art] SIG.S = 50E3AA862EB495EF7D04E618B048FA80A4FEE56FC6F7C492D1F26C3D9D229645122C2964C2374E0DB19B2290F4C89C4F
4,671,294 UART: Caliptra RT
4,671,547 UART: [state] CFI Enabled
4,950,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,951 UART:
4,951,967 UART: Running Caliptra ROM ...
4,952,375 UART:
4,952,430 UART: [state] CFI Enabled
4,954,672 UART: [state] LifecycleState = Unprovisioned
4,955,327 UART: [state] DebugLocked = No
4,955,811 UART: [state] WD Timer not started. Device not locked for debugging
4,957,043 UART: [kat] SHA2-256
5,762,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,818 UART: [kat] ++
5,766,970 UART: [kat] sha1
5,771,096 UART: [kat] SHA2-256
5,773,036 UART: [kat] SHA2-384
5,775,961 UART: [kat] SHA2-512-ACC
5,777,861 UART: [kat] ECC-384
5,787,964 UART: [kat] HMAC-384Kdf
5,792,620 UART: [kat] LMS
6,040,948 UART: [kat] --
6,041,914 UART: [update-reset] ++
7,355,283 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,356,274 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,506,272 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,113 >>> mbox cmd response: success
2,629,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,691,385 UART:
2,691,401 UART: Running Caliptra FMC ...
2,691,809 UART:
2,691,863 UART: [state] CFI Enabled
2,702,334 UART: [fht] FMC Alias Private Key: 7
2,810,182 UART: [art] Extend RT PCRs Done
2,810,610 UART: [art] Lock RT PCRs Done
2,812,336 UART: [art] Populate DV Done
2,820,459 UART: [fht] FMC Alias Private Key: 7
2,821,483 UART: [art] Derive CDI
2,821,763 UART: [art] Store in in slot 0x4
2,907,138 UART: [art] Derive Key Pair
2,907,498 UART: [art] Store priv key in slot 0x5
2,920,820 UART: [art] Derive Key Pair - Done
2,935,850 UART: [art] Signing Cert with AUTHO
2,936,330 UART: RITY.KEYID = 7
2,951,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,985 UART: [art] PUB.X = FEC328087C47E86094A8A3E10521923E6930B9D4E07CF43A2FAD17B1AD96E9E80B5DD4493AC7616B3EB06ACBFFBF0B58
2,958,759 UART: [art] PUB.Y = 0507E64C45716EE4E5CCBACA78E9DF2E5DEDED2BC152F70DB17A3E4859481EC902AEB7946D6291787A9CB33AFE449781
2,965,713 UART: [art] SIG.R = 5973514F22E9A749402769ABD46FB2F5CF710D3AEFEAC61A85FB5C6B4D287626EAF801729C5226CD571DE12A55E4D352
2,972,485 UART: [art] SIG.S = C2D1812C613E65442719A13BCB512A1AD39DFA1F69238902D89D5C17BA125F0C49B9BAB43F14E344E7A0395C2D0A8B44
2,996,531 UART: Caliptra RT
2,996,784 UART: [state] CFI Enabled
3,104,391 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,771 >>> mbox cmd response: failed
4,098,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,104,608 UART:
4,104,624 UART: Running Caliptra FMC ...
4,105,032 UART:
4,105,086 UART: [state] CFI Enabled
4,194,427 UART: [art] Extend RT PCRs Done
4,194,855 UART: [art] Lock RT PCRs Done
4,196,192 UART: [art] Populate DV Done
4,204,635 UART: [fht] FMC Alias Private Key: 7
4,205,563 UART: [art] Derive CDI
4,205,843 UART: [art] Store in in slot 0x4
4,291,554 UART: [art] Derive Key Pair
4,291,914 UART: [art] Store priv key in slot 0x5
4,304,482 UART: [art] Derive Key Pair - Done
4,319,316 UART: [art] Signing Cert with AUTHO
4,319,796 UART: RITY.KEYID = 7
4,334,854 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,619 UART: [art] PUB.X = FEC328087C47E86094A8A3E10521923E6930B9D4E07CF43A2FAD17B1AD96E9E80B5DD4493AC7616B3EB06ACBFFBF0B58
4,342,393 UART: [art] PUB.Y = 0507E64C45716EE4E5CCBACA78E9DF2E5DEDED2BC152F70DB17A3E4859481EC902AEB7946D6291787A9CB33AFE449781
4,349,347 UART: [art] SIG.R = 5973514F22E9A749402769ABD46FB2F5CF710D3AEFEAC61A85FB5C6B4D287626EAF801729C5226CD571DE12A55E4D352
4,356,119 UART: [art] SIG.S = C2D1812C613E65442719A13BCB512A1AD39DFA1F69238902D89D5C17BA125F0C49B9BAB43F14E344E7A0395C2D0A8B44
4,380,571 UART: Caliptra RT
4,380,824 UART: [state] CFI Enabled
4,664,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,103,992 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,957 UART: [state] LifecycleState = Unprovisioned
86,612 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,433 UART: [kat] SHA2-256
894,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,208 UART: [kat] ++
898,360 UART: [kat] sha1
902,624 UART: [kat] SHA2-256
904,564 UART: [kat] SHA2-384
907,283 UART: [kat] SHA2-512-ACC
909,184 UART: [kat] ECC-384
919,177 UART: [kat] HMAC-384Kdf
923,857 UART: [kat] LMS
1,172,185 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,502 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,051 UART: [idev] Erasing UDS.KEYID = 0
1,202,366 UART: [idev] Sha1 KeyId Algorithm
1,210,900 UART: [idev] --
1,211,776 UART: [ldev] ++
1,211,944 UART: [ldev] CDI.KEYID = 6
1,212,307 UART: [ldev] SUBJECT.KEYID = 5
1,212,733 UART: [ldev] AUTHORITY.KEYID = 7
1,213,196 UART: [ldev] FE.KEYID = 1
1,218,506 UART: [ldev] Erasing FE.KEYID = 1
1,244,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,438 UART: [ldev] --
1,283,723 UART: [fwproc] Wait for Commands...
1,284,333 UART: [fwproc] Recv command 0x46574c44
1,285,061 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,611 >>> mbox cmd response: success
2,776,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,777,851 UART: [afmc] ++
2,778,019 UART: [afmc] CDI.KEYID = 6
2,778,381 UART: [afmc] SUBJECT.KEYID = 7
2,778,806 UART: [afmc] AUTHORITY.KEYID = 5
2,813,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,120 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,832 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,743 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,457 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,211 UART: [afmc] --
2,857,305 UART: [cold-reset] --
2,858,111 UART: [state] Locking Datavault
2,859,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,146 UART: [state] Locking ICCM
2,860,750 UART: [exit] Launching FMC @ 0x40000130
2,866,079 UART:
2,866,095 UART: Running Caliptra FMC ...
2,866,503 UART:
2,866,646 UART: [state] CFI Enabled
2,877,333 UART: [fht] FMC Alias Private Key: 7
2,985,021 UART: [art] Extend RT PCRs Done
2,985,449 UART: [art] Lock RT PCRs Done
2,986,953 UART: [art] Populate DV Done
2,995,140 UART: [fht] FMC Alias Private Key: 7
2,996,108 UART: [art] Derive CDI
2,996,388 UART: [art] Store in in slot 0x4
3,081,669 UART: [art] Derive Key Pair
3,082,029 UART: [art] Store priv key in slot 0x5
3,095,279 UART: [art] Derive Key Pair - Done
3,110,123 UART: [art] Signing Cert with AUTHO
3,110,603 UART: RITY.KEYID = 7
3,125,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,272 UART: [art] PUB.X = DC8221F115FAA482A91B1EE893844C5A11E5681EF3F55F13D2E554D9C21AB794005C89044218135DA4123C42229A1D10
3,133,013 UART: [art] PUB.Y = A0F6030BFEC0398AFC167FE8CC2060EA045F9D934B1ED543480CB8FAF168D820F91F8BADC5AEECB409FAE9AAB4C75A4F
3,139,978 UART: [art] SIG.R = BF35AAAB3C72BAFE11905459A15BC266F036C32D29FDD6E3585FE81A22E33C29F0FA962D9C82F17082FEBC8768132C1E
3,146,762 UART: [art] SIG.S = D4CE41A3D0D85435D8D071B2D2AB4E0A7EFA34891FEEEA520C05AAA8FD7F0751A603AB7EDC3B1D71E9E20AE5C4616526
3,170,709 UART: Caliptra RT
3,171,054 UART: [state] CFI Enabled
3,279,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,090 UART:
3,282,106 UART: Running Caliptra ROM ...
3,282,514 UART:
3,282,656 UART: [state] CFI Enabled
3,285,462 UART: [state] LifecycleState = Unprovisioned
3,286,117 UART: [state] DebugLocked = No
3,286,789 UART: [state] WD Timer not started. Device not locked for debugging
3,287,983 UART: [kat] SHA2-256
4,093,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,758 UART: [kat] ++
4,097,910 UART: [kat] sha1
4,102,238 UART: [kat] SHA2-256
4,104,178 UART: [kat] SHA2-384
4,106,889 UART: [kat] SHA2-512-ACC
4,108,789 UART: [kat] ECC-384
4,118,550 UART: [kat] HMAC-384Kdf
4,123,252 UART: [kat] LMS
4,371,580 UART: [kat] --
4,372,344 UART: [update-reset] ++
4,389,857 >>> mbox cmd response: failed
4,389,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,390,487 UART: ROM Non-Fatal Error: 0x000B001E
4,391,263 UART: [state] Locking Datavault
4,391,959 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,563 UART: [state] Locking ICCM
4,393,119 UART: [exit] Launching FMC @ 0x40000130
4,398,448 UART:
4,398,464 UART: Running Caliptra FMC ...
4,398,872 UART:
4,399,015 UART: [state] CFI Enabled
4,487,954 UART: [art] Extend RT PCRs Done
4,488,382 UART: [art] Lock RT PCRs Done
4,489,721 UART: [art] Populate DV Done
4,498,000 UART: [fht] FMC Alias Private Key: 7
4,499,058 UART: [art] Derive CDI
4,499,338 UART: [art] Store in in slot 0x4
4,584,953 UART: [art] Derive Key Pair
4,585,313 UART: [art] Store priv key in slot 0x5
4,598,239 UART: [art] Derive Key Pair - Done
4,613,111 UART: [art] Signing Cert with AUTHO
4,613,591 UART: RITY.KEYID = 7
4,628,013 UART: [art] Erasing AUTHORITY.KEYID = 7
4,628,778 UART: [art] PUB.X = DC8221F115FAA482A91B1EE893844C5A11E5681EF3F55F13D2E554D9C21AB794005C89044218135DA4123C42229A1D10
4,635,519 UART: [art] PUB.Y = A0F6030BFEC0398AFC167FE8CC2060EA045F9D934B1ED543480CB8FAF168D820F91F8BADC5AEECB409FAE9AAB4C75A4F
4,642,484 UART: [art] SIG.R = BF35AAAB3C72BAFE11905459A15BC266F036C32D29FDD6E3585FE81A22E33C29F0FA962D9C82F17082FEBC8768132C1E
4,649,268 UART: [art] SIG.S = D4CE41A3D0D85435D8D071B2D2AB4E0A7EFA34891FEEEA520C05AAA8FD7F0751A603AB7EDC3B1D71E9E20AE5C4616526
4,672,831 UART: Caliptra RT
4,673,176 UART: [state] CFI Enabled
4,954,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,956,275 UART:
4,956,291 UART: Running Caliptra ROM ...
4,956,699 UART:
4,956,841 UART: [state] CFI Enabled
4,959,713 UART: [state] LifecycleState = Unprovisioned
4,960,368 UART: [state] DebugLocked = No
4,960,980 UART: [state] WD Timer not started. Device not locked for debugging
4,962,314 UART: [kat] SHA2-256
5,767,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,772,089 UART: [kat] ++
5,772,241 UART: [kat] sha1
5,776,459 UART: [kat] SHA2-256
5,778,399 UART: [kat] SHA2-384
5,781,156 UART: [kat] SHA2-512-ACC
5,783,056 UART: [kat] ECC-384
5,792,717 UART: [kat] HMAC-384Kdf
5,797,459 UART: [kat] LMS
6,045,787 UART: [kat] --
6,046,685 UART: [update-reset] ++
7,359,468 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,360,613 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,510,611 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,712 >>> mbox cmd response: success
2,626,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,688,808 UART:
2,688,824 UART: Running Caliptra FMC ...
2,689,232 UART:
2,689,375 UART: [state] CFI Enabled
2,700,026 UART: [fht] FMC Alias Private Key: 7
2,807,912 UART: [art] Extend RT PCRs Done
2,808,340 UART: [art] Lock RT PCRs Done
2,809,784 UART: [art] Populate DV Done
2,817,795 UART: [fht] FMC Alias Private Key: 7
2,818,877 UART: [art] Derive CDI
2,819,157 UART: [art] Store in in slot 0x4
2,905,006 UART: [art] Derive Key Pair
2,905,366 UART: [art] Store priv key in slot 0x5
2,918,634 UART: [art] Derive Key Pair - Done
2,933,462 UART: [art] Signing Cert with AUTHO
2,933,942 UART: RITY.KEYID = 7
2,949,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,205 UART: [art] PUB.X = 59FADD44CE6B2547CB4DFEFA0B39DF4CD0D2B86E829A475576F50B8D0FDCF07A8885EE00C1D4A5E49D069DFD67D053D6
2,956,965 UART: [art] PUB.Y = 8B535589622111B22D7379C5AAB0229B2C09DDCA1EC0A0F53E4028B34C8A1A03288EB34E4BB60E6AC282B47295D4FE8D
2,963,914 UART: [art] SIG.R = BAD07E7BEF7D4BECA7F3AB977C5A2D4381FDF093F4451FABD752702AEAE0EB0937E779734B5C58E02ED309568FE8EC32
2,970,700 UART: [art] SIG.S = 4CAD9F6E17D15E51692D612A04A799097F8C068360D0CC5B9800FE61557FAD8A4FF7753E5FD633A2C30F7DFBAD63E17E
2,994,655 UART: Caliptra RT
2,995,000 UART: [state] CFI Enabled
3,102,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,508 >>> mbox cmd response: failed
4,097,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,103,263 UART:
4,103,279 UART: Running Caliptra FMC ...
4,103,687 UART:
4,103,830 UART: [state] CFI Enabled
4,192,663 UART: [art] Extend RT PCRs Done
4,193,091 UART: [art] Lock RT PCRs Done
4,194,364 UART: [art] Populate DV Done
4,202,707 UART: [fht] FMC Alias Private Key: 7
4,203,869 UART: [art] Derive CDI
4,204,149 UART: [art] Store in in slot 0x4
4,290,186 UART: [art] Derive Key Pair
4,290,546 UART: [art] Store priv key in slot 0x5
4,303,442 UART: [art] Derive Key Pair - Done
4,318,204 UART: [art] Signing Cert with AUTHO
4,318,684 UART: RITY.KEYID = 7
4,334,118 UART: [art] Erasing AUTHORITY.KEYID = 7
4,334,883 UART: [art] PUB.X = 59FADD44CE6B2547CB4DFEFA0B39DF4CD0D2B86E829A475576F50B8D0FDCF07A8885EE00C1D4A5E49D069DFD67D053D6
4,341,643 UART: [art] PUB.Y = 8B535589622111B22D7379C5AAB0229B2C09DDCA1EC0A0F53E4028B34C8A1A03288EB34E4BB60E6AC282B47295D4FE8D
4,348,592 UART: [art] SIG.R = BAD07E7BEF7D4BECA7F3AB977C5A2D4381FDF093F4451FABD752702AEAE0EB0937E779734B5C58E02ED309568FE8EC32
4,355,378 UART: [art] SIG.S = 4CAD9F6E17D15E51692D612A04A799097F8C068360D0CC5B9800FE61557FAD8A4FF7753E5FD633A2C30F7DFBAD63E17E
4,379,007 UART: Caliptra RT
4,379,352 UART: [state] CFI Enabled
4,661,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,103,011 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,173,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,304 UART: [ldev] ++
1,208,472 UART: [ldev] CDI.KEYID = 6
1,208,836 UART: [ldev] SUBJECT.KEYID = 5
1,209,263 UART: [ldev] AUTHORITY.KEYID = 7
1,209,726 UART: [ldev] FE.KEYID = 1
1,215,234 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,529 UART: [fwproc] Recv command 0x46574c44
1,282,262 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,609 >>> mbox cmd response: success
2,774,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,775,816 UART: [afmc] ++
2,775,984 UART: [afmc] CDI.KEYID = 6
2,776,347 UART: [afmc] SUBJECT.KEYID = 7
2,776,773 UART: [afmc] AUTHORITY.KEYID = 5
2,812,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,427 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,140 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,049 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,763 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,642 UART: [afmc] --
2,855,660 UART: [cold-reset] --
2,856,602 UART: [state] Locking Datavault
2,857,825 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,429 UART: [state] Locking ICCM
2,858,859 UART: [exit] Launching FMC @ 0x40000130
2,864,188 UART:
2,864,204 UART: Running Caliptra FMC ...
2,864,612 UART:
2,864,666 UART: [state] CFI Enabled
2,874,993 UART: [fht] FMC Alias Private Key: 7
2,982,627 UART: [art] Extend RT PCRs Done
2,983,055 UART: [art] Lock RT PCRs Done
2,984,717 UART: [art] Populate DV Done
2,992,830 UART: [fht] FMC Alias Private Key: 7
2,993,758 UART: [art] Derive CDI
2,994,038 UART: [art] Store in in slot 0x4
3,079,653 UART: [art] Derive Key Pair
3,080,013 UART: [art] Store priv key in slot 0x5
3,093,183 UART: [art] Derive Key Pair - Done
3,107,654 UART: [art] Signing Cert with AUTHO
3,108,134 UART: RITY.KEYID = 7
3,123,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,481 UART: [art] PUB.X = BBBBA2AE4C2E8302B94A986ECECB3477F6D37989EEB46D4777529B51D9C471D93B0F823CA84F9424DD871ADAB3C1C45B
3,131,263 UART: [art] PUB.Y = 283B2B9E446B1E3E707BB37BAD5AE7EFC0C41054D4228A29CA5DA2BA20729493BDC640E7F1634F3D22CC48BAD2896152
3,138,225 UART: [art] SIG.R = 2A8C5798DB7850EF79E6CBC6FA43A1B3664E880A13B64C6F165140EFDCFBF7B36A054152996A674800FAA4216399EA5D
3,144,975 UART: [art] SIG.S = F16DBBCF01C0F417E3B6C702B4A59ACEFA2E72EC89A8727107A822D0C0EE00236C43D86E1D1024D1F23ECAFD4AA3A9AC
3,168,661 UART: Caliptra RT
3,168,914 UART: [state] CFI Enabled
3,276,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,899 UART:
3,277,915 UART: Running Caliptra ROM ...
3,278,323 UART:
3,278,378 UART: [state] CFI Enabled
3,280,982 UART: [state] LifecycleState = Unprovisioned
3,281,637 UART: [state] DebugLocked = No
3,282,261 UART: [state] WD Timer not started. Device not locked for debugging
3,283,489 UART: [kat] SHA2-256
4,087,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,168 UART: [kat] ++
4,091,320 UART: [kat] sha1
4,095,484 UART: [kat] SHA2-256
4,097,424 UART: [kat] SHA2-384
4,099,977 UART: [kat] SHA2-512-ACC
4,101,877 UART: [kat] ECC-384
4,112,200 UART: [kat] HMAC-384Kdf
4,116,764 UART: [kat] LMS
4,365,076 UART: [kat] --
4,366,200 UART: [update-reset] ++
4,382,880 >>> mbox cmd response: failed
4,382,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,383,232 UART: ROM Non-Fatal Error: 0x000B001E
4,384,168 UART: [state] Locking Datavault
4,384,818 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,422 UART: [state] Locking ICCM
4,385,848 UART: [exit] Launching FMC @ 0x40000130
4,391,177 UART:
4,391,193 UART: Running Caliptra FMC ...
4,391,601 UART:
4,391,655 UART: [state] CFI Enabled
4,480,832 UART: [art] Extend RT PCRs Done
4,481,260 UART: [art] Lock RT PCRs Done
4,482,181 UART: [art] Populate DV Done
4,490,150 UART: [fht] FMC Alias Private Key: 7
4,491,236 UART: [art] Derive CDI
4,491,516 UART: [art] Store in in slot 0x4
4,577,349 UART: [art] Derive Key Pair
4,577,709 UART: [art] Store priv key in slot 0x5
4,590,743 UART: [art] Derive Key Pair - Done
4,605,288 UART: [art] Signing Cert with AUTHO
4,605,768 UART: RITY.KEYID = 7
4,621,066 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,831 UART: [art] PUB.X = BBBBA2AE4C2E8302B94A986ECECB3477F6D37989EEB46D4777529B51D9C471D93B0F823CA84F9424DD871ADAB3C1C45B
4,628,613 UART: [art] PUB.Y = 283B2B9E446B1E3E707BB37BAD5AE7EFC0C41054D4228A29CA5DA2BA20729493BDC640E7F1634F3D22CC48BAD2896152
4,635,575 UART: [art] SIG.R = 2A8C5798DB7850EF79E6CBC6FA43A1B3664E880A13B64C6F165140EFDCFBF7B36A054152996A674800FAA4216399EA5D
4,642,325 UART: [art] SIG.S = F16DBBCF01C0F417E3B6C702B4A59ACEFA2E72EC89A8727107A822D0C0EE00236C43D86E1D1024D1F23ECAFD4AA3A9AC
4,665,847 UART: Caliptra RT
4,666,100 UART: [state] CFI Enabled
4,948,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,950,746 UART:
4,950,762 UART: Running Caliptra ROM ...
4,951,170 UART:
4,951,225 UART: [state] CFI Enabled
4,953,665 UART: [state] LifecycleState = Unprovisioned
4,954,320 UART: [state] DebugLocked = No
4,954,914 UART: [state] WD Timer not started. Device not locked for debugging
4,956,146 UART: [kat] SHA2-256
5,759,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,763,825 UART: [kat] ++
5,763,977 UART: [kat] sha1
5,768,159 UART: [kat] SHA2-256
5,770,099 UART: [kat] SHA2-384
5,772,774 UART: [kat] SHA2-512-ACC
5,774,674 UART: [kat] ECC-384
5,784,073 UART: [kat] HMAC-384Kdf
5,788,623 UART: [kat] LMS
6,036,935 UART: [kat] --
6,038,137 UART: [update-reset] ++
7,351,372 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,352,459 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,502,457 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,791 >>> mbox cmd response: success
2,623,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,791 UART:
2,685,807 UART: Running Caliptra FMC ...
2,686,215 UART:
2,686,269 UART: [state] CFI Enabled
2,696,884 UART: [fht] FMC Alias Private Key: 7
2,804,408 UART: [art] Extend RT PCRs Done
2,804,836 UART: [art] Lock RT PCRs Done
2,806,598 UART: [art] Populate DV Done
2,814,683 UART: [fht] FMC Alias Private Key: 7
2,815,825 UART: [art] Derive CDI
2,816,105 UART: [art] Store in in slot 0x4
2,901,744 UART: [art] Derive Key Pair
2,902,104 UART: [art] Store priv key in slot 0x5
2,915,220 UART: [art] Derive Key Pair - Done
2,929,701 UART: [art] Signing Cert with AUTHO
2,930,181 UART: RITY.KEYID = 7
2,945,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,000 UART: [art] PUB.X = 5C62D9591C288606357EC2CC47CAA1F00EB88398C28C106177A6FBA32D6E21EED88B2DD84166EC7D99BE4ABE5D709A1A
2,952,778 UART: [art] PUB.Y = FBB2E570C1921A2D2FC292EB0B484CC8A216D473811C3FC4AC1A3B7CF88B21D048071BB4A9F42C84ACDFF9C40C630CF3
2,959,736 UART: [art] SIG.R = 99EA83385C3119EA4E0ED5EDACB46F7036E2B4C623BE25F7FEBDE846EC3A5512F00C8D5DBE4B939C390E5A17A6ABB804
2,966,516 UART: [art] SIG.S = 80E3DDF2556140C4D7673BE9AC022858589547446B2914411413060397AB6C8094F0DBE305D4172023322F91CAA47E4C
2,990,801 UART: Caliptra RT
2,991,054 UART: [state] CFI Enabled
3,099,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,303 >>> mbox cmd response: failed
4,090,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,096,102 UART:
4,096,118 UART: Running Caliptra FMC ...
4,096,526 UART:
4,096,580 UART: [state] CFI Enabled
4,185,689 UART: [art] Extend RT PCRs Done
4,186,117 UART: [art] Lock RT PCRs Done
4,187,416 UART: [art] Populate DV Done
4,195,619 UART: [fht] FMC Alias Private Key: 7
4,196,577 UART: [art] Derive CDI
4,196,857 UART: [art] Store in in slot 0x4
4,282,696 UART: [art] Derive Key Pair
4,283,056 UART: [art] Store priv key in slot 0x5
4,296,308 UART: [art] Derive Key Pair - Done
4,311,335 UART: [art] Signing Cert with AUTHO
4,311,815 UART: RITY.KEYID = 7
4,327,555 UART: [art] Erasing AUTHORITY.KEYID = 7
4,328,320 UART: [art] PUB.X = 5C62D9591C288606357EC2CC47CAA1F00EB88398C28C106177A6FBA32D6E21EED88B2DD84166EC7D99BE4ABE5D709A1A
4,335,098 UART: [art] PUB.Y = FBB2E570C1921A2D2FC292EB0B484CC8A216D473811C3FC4AC1A3B7CF88B21D048071BB4A9F42C84ACDFF9C40C630CF3
4,342,056 UART: [art] SIG.R = 99EA83385C3119EA4E0ED5EDACB46F7036E2B4C623BE25F7FEBDE846EC3A5512F00C8D5DBE4B939C390E5A17A6ABB804
4,348,836 UART: [art] SIG.S = 80E3DDF2556140C4D7673BE9AC022858589547446B2914411413060397AB6C8094F0DBE305D4172023322F91CAA47E4C
4,372,283 UART: Caliptra RT
4,372,536 UART: [state] CFI Enabled
4,655,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,090,485 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,469 UART: [kat] LMS
1,169,781 UART: [kat] --
1,170,584 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,304 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,654 UART: [fwproc] Recv command 0x46574c44
1,283,387 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,936 >>> mbox cmd response: success
2,775,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,987 UART: [afmc] ++
2,777,155 UART: [afmc] CDI.KEYID = 6
2,777,518 UART: [afmc] SUBJECT.KEYID = 7
2,777,944 UART: [afmc] AUTHORITY.KEYID = 5
2,813,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,844 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,557 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,466 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,180 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,109 UART: [afmc] --
2,857,131 UART: [cold-reset] --
2,857,973 UART: [state] Locking Datavault
2,859,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,772 UART: [state] Locking ICCM
2,860,288 UART: [exit] Launching FMC @ 0x40000130
2,865,617 UART:
2,865,633 UART: Running Caliptra FMC ...
2,866,041 UART:
2,866,184 UART: [state] CFI Enabled
2,876,637 UART: [fht] FMC Alias Private Key: 7
2,984,609 UART: [art] Extend RT PCRs Done
2,985,037 UART: [art] Lock RT PCRs Done
2,986,261 UART: [art] Populate DV Done
2,994,292 UART: [fht] FMC Alias Private Key: 7
2,995,232 UART: [art] Derive CDI
2,995,512 UART: [art] Store in in slot 0x4
3,081,243 UART: [art] Derive Key Pair
3,081,603 UART: [art] Store priv key in slot 0x5
3,095,137 UART: [art] Derive Key Pair - Done
3,109,789 UART: [art] Signing Cert with AUTHO
3,110,269 UART: RITY.KEYID = 7
3,125,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,556 UART: [art] PUB.X = 4109E3568936317361E8B9F3003E095033C4FCDDA18716B3B7BE881151B7FFC806D13CB45C1AF8D52D6C232F4A031D19
3,133,292 UART: [art] PUB.Y = 8DFD9B83EF8AF1CF0C39B1D490DAD099C8AF436A451F019108430A8F1EA53658CA827BE51D239A261FB67406DBC4CCF9
3,140,243 UART: [art] SIG.R = C0A9F0EDBF7EB0007E87C38289A32536DE05CE934E0EA51738D4CF4F5B5BA81F702440C19915FCFCC4C7018F525969A7
3,146,992 UART: [art] SIG.S = 7D133D775B2984CE35B0FCDBCE7E3CC33AB4806A4C3618EAFD365C05C8A09DE51F36B2E401B3394ED66D30AF0CD5DB65
3,170,934 UART: Caliptra RT
3,171,279 UART: [state] CFI Enabled
3,279,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,772 UART:
3,281,788 UART: Running Caliptra ROM ...
3,282,196 UART:
3,282,338 UART: [state] CFI Enabled
3,285,510 UART: [state] LifecycleState = Unprovisioned
3,286,165 UART: [state] DebugLocked = No
3,286,871 UART: [state] WD Timer not started. Device not locked for debugging
3,288,129 UART: [kat] SHA2-256
4,091,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,095,808 UART: [kat] ++
4,095,960 UART: [kat] sha1
4,100,062 UART: [kat] SHA2-256
4,102,002 UART: [kat] SHA2-384
4,104,707 UART: [kat] SHA2-512-ACC
4,106,607 UART: [kat] ECC-384
4,116,370 UART: [kat] HMAC-384Kdf
4,120,816 UART: [kat] LMS
4,369,128 UART: [kat] --
4,370,012 UART: [update-reset] ++
4,386,770 >>> mbox cmd response: failed
4,386,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,387,216 UART: ROM Non-Fatal Error: 0x000B001E
4,388,058 UART: [state] Locking Datavault
4,388,920 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,524 UART: [state] Locking ICCM
4,390,196 UART: [exit] Launching FMC @ 0x40000130
4,395,525 UART:
4,395,541 UART: Running Caliptra FMC ...
4,395,949 UART:
4,396,092 UART: [state] CFI Enabled
4,485,405 UART: [art] Extend RT PCRs Done
4,485,833 UART: [art] Lock RT PCRs Done
4,487,162 UART: [art] Populate DV Done
4,495,139 UART: [fht] FMC Alias Private Key: 7
4,496,099 UART: [art] Derive CDI
4,496,379 UART: [art] Store in in slot 0x4
4,581,906 UART: [art] Derive Key Pair
4,582,266 UART: [art] Store priv key in slot 0x5
4,595,986 UART: [art] Derive Key Pair - Done
4,610,624 UART: [art] Signing Cert with AUTHO
4,611,104 UART: RITY.KEYID = 7
4,626,278 UART: [art] Erasing AUTHORITY.KEYID = 7
4,627,043 UART: [art] PUB.X = 4109E3568936317361E8B9F3003E095033C4FCDDA18716B3B7BE881151B7FFC806D13CB45C1AF8D52D6C232F4A031D19
4,633,779 UART: [art] PUB.Y = 8DFD9B83EF8AF1CF0C39B1D490DAD099C8AF436A451F019108430A8F1EA53658CA827BE51D239A261FB67406DBC4CCF9
4,640,730 UART: [art] SIG.R = C0A9F0EDBF7EB0007E87C38289A32536DE05CE934E0EA51738D4CF4F5B5BA81F702440C19915FCFCC4C7018F525969A7
4,647,479 UART: [art] SIG.S = 7D133D775B2984CE35B0FCDBCE7E3CC33AB4806A4C3618EAFD365C05C8A09DE51F36B2E401B3394ED66D30AF0CD5DB65
4,671,279 UART: Caliptra RT
4,671,624 UART: [state] CFI Enabled
4,951,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,766 UART:
4,952,782 UART: Running Caliptra ROM ...
4,953,190 UART:
4,953,332 UART: [state] CFI Enabled
4,956,548 UART: [state] LifecycleState = Unprovisioned
4,957,203 UART: [state] DebugLocked = No
4,957,749 UART: [state] WD Timer not started. Device not locked for debugging
4,958,941 UART: [kat] SHA2-256
5,762,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,766,620 UART: [kat] ++
5,766,772 UART: [kat] sha1
5,771,192 UART: [kat] SHA2-256
5,773,132 UART: [kat] SHA2-384
5,775,853 UART: [kat] SHA2-512-ACC
5,777,753 UART: [kat] ECC-384
5,787,172 UART: [kat] HMAC-384Kdf
5,791,768 UART: [kat] LMS
6,040,080 UART: [kat] --
6,041,034 UART: [update-reset] ++
7,354,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,355,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,505,522 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,190 >>> mbox cmd response: success
2,625,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,687,654 UART:
2,687,670 UART: Running Caliptra FMC ...
2,688,078 UART:
2,688,221 UART: [state] CFI Enabled
2,698,982 UART: [fht] FMC Alias Private Key: 7
2,806,612 UART: [art] Extend RT PCRs Done
2,807,040 UART: [art] Lock RT PCRs Done
2,808,534 UART: [art] Populate DV Done
2,816,635 UART: [fht] FMC Alias Private Key: 7
2,817,613 UART: [art] Derive CDI
2,817,893 UART: [art] Store in in slot 0x4
2,903,682 UART: [art] Derive Key Pair
2,904,042 UART: [art] Store priv key in slot 0x5
2,917,794 UART: [art] Derive Key Pair - Done
2,932,761 UART: [art] Signing Cert with AUTHO
2,933,241 UART: RITY.KEYID = 7
2,948,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,102 UART: [art] PUB.X = 61A612A6C5D55F9FEE73A75D67DA487E44BCEC14C26C0EB0A74EB2E0C52CB51C0AD6378AB8CBEA4AF2489709963015D0
2,955,881 UART: [art] PUB.Y = A9D26B5AA0B90F6F558F18925525CB4940965A67F2AFF496912A72D8C253A9C75305DC2D400BEEF8134BA919085B4CAD
2,962,825 UART: [art] SIG.R = E9D45E63D307BCC3F66476240B2DA0DE1EF09D2F5CFCFD7C0848CC976F4C48DEEEF9A910CE3A7812C7DFE34FF8984D92
2,969,610 UART: [art] SIG.S = B7B113EADF1686140C72EA0DA8D223841537DE8328F810E0237FD13AF51DF85F20DCDC8A5A74AFCFDD2E8B4B931D6724
2,993,623 UART: Caliptra RT
2,993,968 UART: [state] CFI Enabled
3,101,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,514 >>> mbox cmd response: failed
4,091,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,097,433 UART:
4,097,449 UART: Running Caliptra FMC ...
4,097,857 UART:
4,098,000 UART: [state] CFI Enabled
4,186,819 UART: [art] Extend RT PCRs Done
4,187,247 UART: [art] Lock RT PCRs Done
4,188,442 UART: [art] Populate DV Done
4,196,771 UART: [fht] FMC Alias Private Key: 7
4,197,839 UART: [art] Derive CDI
4,198,119 UART: [art] Store in in slot 0x4
4,284,062 UART: [art] Derive Key Pair
4,284,422 UART: [art] Store priv key in slot 0x5
4,297,406 UART: [art] Derive Key Pair - Done
4,312,131 UART: [art] Signing Cert with AUTHO
4,312,611 UART: RITY.KEYID = 7
4,327,927 UART: [art] Erasing AUTHORITY.KEYID = 7
4,328,692 UART: [art] PUB.X = 61A612A6C5D55F9FEE73A75D67DA487E44BCEC14C26C0EB0A74EB2E0C52CB51C0AD6378AB8CBEA4AF2489709963015D0
4,335,471 UART: [art] PUB.Y = A9D26B5AA0B90F6F558F18925525CB4940965A67F2AFF496912A72D8C253A9C75305DC2D400BEEF8134BA919085B4CAD
4,342,415 UART: [art] SIG.R = E9D45E63D307BCC3F66476240B2DA0DE1EF09D2F5CFCFD7C0848CC976F4C48DEEEF9A910CE3A7812C7DFE34FF8984D92
4,349,200 UART: [art] SIG.S = B7B113EADF1686140C72EA0DA8D223841537DE8328F810E0237FD13AF51DF85F20DCDC8A5A74AFCFDD2E8B4B931D6724
4,373,001 UART: Caliptra RT
4,373,346 UART: [state] CFI Enabled
4,657,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,274 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,136 UART:
192,508 UART: Running Caliptra ROM ...
193,658 UART:
193,808 UART: [state] CFI Enabled
258,899 UART: [state] LifecycleState = Unprovisioned
260,885 UART: [state] DebugLocked = No
262,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,498 UART: [kat] SHA2-256
437,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,719 UART: [kat] ++
448,195 UART: [kat] sha1
460,584 UART: [kat] SHA2-256
463,280 UART: [kat] SHA2-384
469,149 UART: [kat] SHA2-512-ACC
471,544 UART: [kat] ECC-384
2,763,140 UART: [kat] HMAC-384Kdf
2,794,232 UART: [kat] LMS
3,984,515 UART: [kat] --
3,988,976 UART: [cold-reset] ++
3,989,884 UART: [fht] Storing FHT @ 0x50003400
4,001,937 UART: [idev] ++
4,002,530 UART: [idev] CDI.KEYID = 6
4,003,419 UART: [idev] SUBJECT.KEYID = 7
4,004,693 UART: [idev] UDS.KEYID = 0
4,007,700 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,471 UART: [idev] Erasing UDS.KEYID = 0
7,343,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,876 UART: [idev] --
7,369,360 UART: [ldev] ++
7,369,928 UART: [ldev] CDI.KEYID = 6
7,370,893 UART: [ldev] SUBJECT.KEYID = 5
7,372,107 UART: [ldev] AUTHORITY.KEYID = 7
7,373,338 UART: [ldev] FE.KEYID = 1
7,415,988 UART: [ldev] Erasing FE.KEYID = 1
10,749,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,696 UART: [ldev] --
13,131,069 UART: [fwproc] Waiting for Commands...
13,132,950 UART: [fwproc] Received command 0x46574c44
13,135,184 UART: [fwproc] Received Image of size 114124 bytes
21,686,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,762,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,831,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,149,539 >>> mbox cmd response: success
22,151,664 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,295,297 UART: [afmc] ++
22,295,938 UART: [afmc] CDI.KEYID = 6
22,296,834 UART: [afmc] SUBJECT.KEYID = 7
22,297,938 UART: [afmc] AUTHORITY.KEYID = 5
25,517,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,814,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,816,882 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,831,439 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,846,185 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,860,418 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,881,017 UART: [afmc] --
27,884,129 UART: [cold-reset] --
27,888,470 UART: [state] Locking Datavault
27,894,423 UART: [state] Locking PCR0, PCR1 and PCR31
27,896,125 UART: [state] Locking ICCM
27,897,250 UART: [exit] Launching FMC @ 0x40000130
27,905,647 UART:
27,905,883 UART: Running Caliptra FMC ...
27,906,981 UART:
27,907,140 UART: [state] CFI Enabled
27,967,242 UART: [fht] FMC Alias Private Key: 7
30,304,353 UART: [art] Extend RT PCRs Done
30,305,587 UART: [art] Lock RT PCRs Done
30,307,022 UART: [art] Populate DV Done
30,312,551 UART: [fht] FMC Alias Private Key: 7
30,314,141 UART: [art] Derive CDI
30,314,878 UART: [art] Store in in slot 0x4
30,375,350 UART: [art] Derive Key Pair
30,376,390 UART: [art] Store priv key in slot 0x5
33,669,362 UART: [art] Derive Key Pair - Done
33,681,992 UART: [art] Signing Cert with AUTHO
33,683,303 UART: RITY.KEYID = 7
35,969,753 UART: [art] Erasing AUTHORITY.KEYID = 7
35,971,263 UART: [art] PUB.X = 3B7FA9A28B49C4B6AB31F26066828E6CBEB4E59D4EB3F88B27498B6854888C897C0E6427A69B35A88C283DB477AAA912
35,978,523 UART: [art] PUB.Y = DF8B6317E88FF5287A4FAD232DA4CD1C1C11570045F0857079640886510A226EEDE625BD961FE278BA4C629B073C31BC
35,985,769 UART: [art] SIG.R = E63FCF170388F27AE548707D8AB286CA2785DDD64A3863C0EBF5F7BF08FA4F825B5888B2EBCC3102851CDA59CC9AA74B
35,993,167 UART: [art] SIG.S = 64482F7506458B2F691357365B56F3C14AAEC4B6322161D262BCD7BFCD4BD221BC7B07DED292CD6D88F1C78751041F33
37,298,184 UART: Caliptra RT
37,298,893 UART: [state] CFI Enabled
37,459,020 UART: [rt] RT listening for mailbox commands...
37,461,924 UART:
37,462,088 UART: Running Caliptra ROM ...
37,463,196 UART:
37,463,351 UART: [state] CFI Enabled
37,526,129 UART: [state] LifecycleState = Unprovisioned
37,528,012 UART: [state] DebugLocked = No
37,529,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,533,930 UART: [kat] SHA2-256
37,703,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,714,162 UART: [kat] ++
37,714,618 UART: [kat] sha1
37,725,878 UART: [kat] SHA2-256
37,728,571 UART: [kat] SHA2-384
37,734,358 UART: [kat] SHA2-512-ACC
37,736,761 UART: [kat] ECC-384
40,029,197 UART: [kat] HMAC-384Kdf
40,061,675 UART: [kat] LMS
41,252,054 UART: [kat] --
41,254,603 UART: [update-reset] ++
41,368,433 >>> mbox cmd response: failed
41,370,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,513,617 UART: ROM Non-Fatal Error: 0x000B003D
41,515,059 UART: [state] Locking Datavault
41,516,218 UART: [state] Locking PCR0, PCR1 and PCR31
41,517,764 UART: [state] Locking ICCM
41,518,828 UART: [exit] Launching FMC @ 0x40000130
41,520,258 UART:
41,520,433 UART: Running Caliptra FMC ...
41,521,536 UART:
41,521,711 UART: [state] CFI Enabled
41,522,551 UART: [art] Extend RT PCRs Done
41,523,688 UART: [art] Lock RT PCRs Done
41,524,867 UART: [art] Populate DV Done
41,525,849 UART: [fht] FMC Alias Private Key: 7
41,527,170 UART: [art] Derive CDI
41,527,900 UART: [art] Store in in slot 0x4
41,551,683 UART: [art] Derive Key Pair
41,552,726 UART: [art] Store priv key in slot 0x5
44,845,285 UART: [art] Derive Key Pair - Done
44,857,786 UART: [art] Signing Cert with AUTHO
44,859,092 UART: RITY.KEYID = 7
47,146,579 UART: [art] Erasing AUTHORITY.KEYID = 7
47,148,088 UART: [art] PUB.X = 3B7FA9A28B49C4B6AB31F26066828E6CBEB4E59D4EB3F88B27498B6854888C897C0E6427A69B35A88C283DB477AAA912
47,155,345 UART: [art] PUB.Y = DF8B6317E88FF5287A4FAD232DA4CD1C1C11570045F0857079640886510A226EEDE625BD961FE278BA4C629B073C31BC
47,162,598 UART: [art] SIG.R = E63FCF170388F27AE548707D8AB286CA2785DDD64A3863C0EBF5F7BF08FA4F825B5888B2EBCC3102851CDA59CC9AA74B
47,169,992 UART: [art] SIG.S = 64482F7506458B2F691357365B56F3C14AAEC4B6322161D262BCD7BFCD4BD221BC7B07DED292CD6D88F1C78751041F33
48,475,249 UART: Caliptra RT
48,475,962 UART: [state] CFI Enabled
48,809,926 UART: [rt] RT listening for mailbox commands...
48,812,561 UART:
48,812,808 UART: Running Caliptra ROM ...
48,813,914 UART:
48,814,073 UART: [state] CFI Enabled
48,875,041 UART: [state] LifecycleState = Unprovisioned
48,876,948 UART: [state] DebugLocked = No
48,879,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,885,440 UART: [kat] SHA2-256
49,055,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,065,648 UART: [kat] ++
49,066,138 UART: [kat] sha1
49,077,513 UART: [kat] SHA2-256
49,080,221 UART: [kat] SHA2-384
49,085,832 UART: [kat] SHA2-512-ACC
49,088,180 UART: [kat] ECC-384
51,380,218 UART: [kat] HMAC-384Kdf
51,411,902 UART: [kat] LMS
52,602,202 UART: [kat] --
52,606,146 UART: [update-reset] ++
61,262,144 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,266,728 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,648,996 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,808,638 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,881,688 >>> mbox cmd response: success
21,883,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
27,575,311 UART:
27,575,727 UART: Running Caliptra FMC ...
27,576,838 UART:
27,576,991 UART: [state] CFI Enabled
27,643,454 UART: [fht] FMC Alias Private Key: 7
29,981,746 UART: [art] Extend RT PCRs Done
29,982,970 UART: [art] Lock RT PCRs Done
29,984,625 UART: [art] Populate DV Done
29,990,035 UART: [fht] FMC Alias Private Key: 7
29,991,525 UART: [art] Derive CDI
29,992,288 UART: [art] Store in in slot 0x4
30,051,957 UART: [art] Derive Key Pair
30,052,996 UART: [art] Store priv key in slot 0x5
33,345,681 UART: [art] Derive Key Pair - Done
33,358,470 UART: [art] Signing Cert with AUTHO
33,359,798 UART: RITY.KEYID = 7
35,646,631 UART: [art] Erasing AUTHORITY.KEYID = 7
35,648,142 UART: [art] PUB.X = DA174C67375D767EC3B630FF439DBBA1859D5000EDD9B147E919560B6F3921843FD524236B62A9348AD2B5219B32A64A
35,655,338 UART: [art] PUB.Y = 2FB3D730F8FA7654227AA1CF2EB0962169E3692D5C9C8C6E71D97641FBF0BE5290940DEAE9129FD64B09134C97C80D2F
35,662,594 UART: [art] SIG.R = B21103E2D6F409C7F49CDC3FDF83C1D9ACB85C3E871755A5E42D67F39474CED8832B15E5273FC00152CA6A8E68C30C41
35,669,991 UART: [art] SIG.S = 67E758D8F2C68F32632CBE234D6B5E1CB7BAB7BC77C1ACC7134A8DC66B17C5FB1E53E59007DC2DAC00F292E5C25C4F86
36,975,633 UART: Caliptra RT
36,976,353 UART: [state] CFI Enabled
37,136,920 UART: [rt] RT listening for mailbox commands...
40,864,141 >>> mbox cmd response: failed
40,865,833 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,009,463 UART:
41,009,783 UART: Running Caliptra FMC ...
41,010,833 UART:
41,010,986 UART: [state] CFI Enabled
41,011,919 UART: [art] Extend RT PCRs Done
41,013,087 UART: [art] Lock RT PCRs Done
41,014,107 UART: [art] Populate DV Done
41,015,142 UART: [fht] FMC Alias Private Key: 7
41,016,473 UART: [art] Derive CDI
41,017,209 UART: [art] Store in in slot 0x4
41,056,806 UART: [art] Derive Key Pair
41,057,805 UART: [art] Store priv key in slot 0x5
44,350,633 UART: [art] Derive Key Pair - Done
44,363,256 UART: [art] Signing Cert with AUTHO
44,364,560 UART: RITY.KEYID = 7
46,651,645 UART: [art] Erasing AUTHORITY.KEYID = 7
46,653,172 UART: [art] PUB.X = DA174C67375D767EC3B630FF439DBBA1859D5000EDD9B147E919560B6F3921843FD524236B62A9348AD2B5219B32A64A
46,660,419 UART: [art] PUB.Y = 2FB3D730F8FA7654227AA1CF2EB0962169E3692D5C9C8C6E71D97641FBF0BE5290940DEAE9129FD64B09134C97C80D2F
46,667,650 UART: [art] SIG.R = B21103E2D6F409C7F49CDC3FDF83C1D9ACB85C3E871755A5E42D67F39474CED8832B15E5273FC00152CA6A8E68C30C41
46,675,038 UART: [art] SIG.S = 67E758D8F2C68F32632CBE234D6B5E1CB7BAB7BC77C1ACC7134A8DC66B17C5FB1E53E59007DC2DAC00F292E5C25C4F86
47,979,670 UART: Caliptra RT
47,980,403 UART: [state] CFI Enabled
48,315,611 UART: [rt] RT listening for mailbox commands...
60,878,489 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,565 UART:
192,916 UART: Running Caliptra ROM ...
194,111 UART:
603,849 UART: [state] CFI Enabled
618,546 UART: [state] LifecycleState = Unprovisioned
620,458 UART: [state] DebugLocked = No
622,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,625 UART: [kat] SHA2-256
796,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,934 UART: [kat] ++
807,442 UART: [kat] sha1
818,539 UART: [kat] SHA2-256
821,217 UART: [kat] SHA2-384
828,324 UART: [kat] SHA2-512-ACC
830,715 UART: [kat] ECC-384
3,115,309 UART: [kat] HMAC-384Kdf
3,126,790 UART: [kat] LMS
4,316,913 UART: [kat] --
4,320,765 UART: [cold-reset] ++
4,322,158 UART: [fht] Storing FHT @ 0x50003400
4,333,593 UART: [idev] ++
4,334,155 UART: [idev] CDI.KEYID = 6
4,335,097 UART: [idev] SUBJECT.KEYID = 7
4,336,310 UART: [idev] UDS.KEYID = 0
4,339,253 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,776 UART: [idev] Erasing UDS.KEYID = 0
7,622,887 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,193 UART: [idev] --
7,650,594 UART: [ldev] ++
7,651,218 UART: [ldev] CDI.KEYID = 6
7,652,814 UART: [ldev] SUBJECT.KEYID = 5
7,653,935 UART: [ldev] AUTHORITY.KEYID = 7
7,655,114 UART: [ldev] FE.KEYID = 1
7,666,956 UART: [ldev] Erasing FE.KEYID = 1
10,954,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,267 UART: [ldev] --
13,313,747 UART: [fwproc] Waiting for Commands...
13,316,926 UART: [fwproc] Received command 0x46574c44
13,319,189 UART: [fwproc] Received Image of size 114124 bytes
22,039,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,115,663 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,184,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,502,579 >>> mbox cmd response: success
22,504,656 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,648,001 UART: [afmc] ++
22,648,649 UART: [afmc] CDI.KEYID = 6
22,649,549 UART: [afmc] SUBJECT.KEYID = 7
22,650,599 UART: [afmc] AUTHORITY.KEYID = 5
25,823,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,116,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,118,516 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,133,084 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,147,827 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,162,061 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,182,449 UART: [afmc] --
28,186,425 UART: [cold-reset] --
28,189,742 UART: [state] Locking Datavault
28,195,212 UART: [state] Locking PCR0, PCR1 and PCR31
28,196,965 UART: [state] Locking ICCM
28,199,172 UART: [exit] Launching FMC @ 0x40000130
28,207,518 UART:
28,207,752 UART: Running Caliptra FMC ...
28,208,851 UART:
28,209,013 UART: [state] CFI Enabled
28,217,267 UART: [fht] FMC Alias Private Key: 7
30,547,813 UART: [art] Extend RT PCRs Done
30,549,065 UART: [art] Lock RT PCRs Done
30,550,516 UART: [art] Populate DV Done
30,555,881 UART: [fht] FMC Alias Private Key: 7
30,557,423 UART: [art] Derive CDI
30,558,204 UART: [art] Store in in slot 0x4
30,601,181 UART: [art] Derive Key Pair
30,602,182 UART: [art] Store priv key in slot 0x5
33,844,364 UART: [art] Derive Key Pair - Done
33,857,483 UART: [art] Signing Cert with AUTHO
33,858,787 UART: RITY.KEYID = 7
36,138,461 UART: [art] Erasing AUTHORITY.KEYID = 7
36,139,979 UART: [art] PUB.X = 2B224E7C5E8962CCB26F5D824924596C59FA2D3252D17887C505C76AE86A866BC85C81175AF3CEB34159AAA23BF33CCC
36,147,179 UART: [art] PUB.Y = 3F8A88F7FCB75B2E181A5B9CEA71C73371CC80735AD4CCB7773F9C2B55E7B90708AFE10C0987F194635E34F67F9466B3
36,154,481 UART: [art] SIG.R = 3A2150BB48EEC94D0077C06C8056FE387C0A1F19DB456F13B5E461B8373CBC05F127122129086729529729636AAA482F
36,161,838 UART: [art] SIG.S = 589418E1D3DF4B2BCFC44DCD17393A75F1BB38175C51C49A5AEEF57519ADF22E5C812CBB118E25A2D95ADB0A9B9B5048
37,466,937 UART: Caliptra RT
37,467,650 UART: [state] CFI Enabled
37,585,002 UART: [rt] RT listening for mailbox commands...
37,588,130 UART:
37,588,299 UART: Running Caliptra ROM ...
37,589,364 UART:
37,589,784 UART: [state] CFI Enabled
37,608,485 UART: [state] LifecycleState = Unprovisioned
37,610,428 UART: [state] DebugLocked = No
37,611,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,617,431 UART: [kat] SHA2-256
37,787,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,797,711 UART: [kat] ++
37,798,181 UART: [kat] sha1
37,809,875 UART: [kat] SHA2-256
37,812,558 UART: [kat] SHA2-384
37,817,886 UART: [kat] SHA2-512-ACC
37,820,247 UART: [kat] ECC-384
40,104,056 UART: [kat] HMAC-384Kdf
40,114,751 UART: [kat] LMS
41,304,817 UART: [kat] --
41,308,646 UART: [update-reset] ++
41,419,968 >>> mbox cmd response: failed
41,422,516 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,565,799 UART: ROM Non-Fatal Error: 0x000B003D
41,567,221 UART: [state] Locking Datavault
41,568,295 UART: [state] Locking PCR0, PCR1 and PCR31
41,569,825 UART: [state] Locking ICCM
41,570,698 UART: [exit] Launching FMC @ 0x40000130
41,572,238 UART:
41,572,397 UART: Running Caliptra FMC ...
41,573,511 UART:
41,573,667 UART: [state] CFI Enabled
41,574,500 UART: [art] Extend RT PCRs Done
41,575,552 UART: [art] Lock RT PCRs Done
41,576,620 UART: [art] Populate DV Done
41,577,569 UART: [fht] FMC Alias Private Key: 7
41,578,822 UART: [art] Derive CDI
41,579,550 UART: [art] Store in in slot 0x4
41,580,722 UART: [art] Derive Key Pair
41,581,633 UART: [art] Store priv key in slot 0x5
44,782,811 UART: [art] Derive Key Pair - Done
44,795,697 UART: [art] Signing Cert with AUTHO
44,797,000 UART: RITY.KEYID = 7
47,076,503 UART: [art] Erasing AUTHORITY.KEYID = 7
47,078,018 UART: [art] PUB.X = 2B224E7C5E8962CCB26F5D824924596C59FA2D3252D17887C505C76AE86A866BC85C81175AF3CEB34159AAA23BF33CCC
47,085,238 UART: [art] PUB.Y = 3F8A88F7FCB75B2E181A5B9CEA71C73371CC80735AD4CCB7773F9C2B55E7B90708AFE10C0987F194635E34F67F9466B3
47,092,511 UART: [art] SIG.R = 3A2150BB48EEC94D0077C06C8056FE387C0A1F19DB456F13B5E461B8373CBC05F127122129086729529729636AAA482F
47,099,884 UART: [art] SIG.S = 589418E1D3DF4B2BCFC44DCD17393A75F1BB38175C51C49A5AEEF57519ADF22E5C812CBB118E25A2D95ADB0A9B9B5048
48,404,909 UART: Caliptra RT
48,405,638 UART: [state] CFI Enabled
48,695,373 UART: [rt] RT listening for mailbox commands...
48,698,127 UART:
48,698,398 UART: Running Caliptra ROM ...
48,699,505 UART:
48,699,781 UART: [state] CFI Enabled
48,713,664 UART: [state] LifecycleState = Unprovisioned
48,715,544 UART: [state] DebugLocked = No
48,718,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,723,237 UART: [kat] SHA2-256
48,892,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,903,518 UART: [kat] ++
48,904,056 UART: [kat] sha1
48,915,816 UART: [kat] SHA2-256
48,918,510 UART: [kat] SHA2-384
48,924,657 UART: [kat] SHA2-512-ACC
48,927,003 UART: [kat] ECC-384
51,210,949 UART: [kat] HMAC-384Kdf
51,222,753 UART: [kat] LMS
52,412,807 UART: [kat] --
52,417,035 UART: [update-reset] ++
61,218,608 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,222,660 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,604,930 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,128,279 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,113,686 >>> mbox cmd response: success
22,115,724 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
27,753,591 UART:
27,754,006 UART: Running Caliptra FMC ...
27,755,120 UART:
27,755,274 UART: [state] CFI Enabled
27,763,219 UART: [fht] FMC Alias Private Key: 7
30,093,660 UART: [art] Extend RT PCRs Done
30,094,894 UART: [art] Lock RT PCRs Done
30,096,522 UART: [art] Populate DV Done
30,102,100 UART: [fht] FMC Alias Private Key: 7
30,103,651 UART: [art] Derive CDI
30,104,386 UART: [art] Store in in slot 0x4
30,146,926 UART: [art] Derive Key Pair
30,147,969 UART: [art] Store priv key in slot 0x5
33,390,065 UART: [art] Derive Key Pair - Done
33,403,201 UART: [art] Signing Cert with AUTHO
33,404,512 UART: RITY.KEYID = 7
35,683,749 UART: [art] Erasing AUTHORITY.KEYID = 7
35,685,307 UART: [art] PUB.X = DABD38469C93F566F08AC8092897E9090CE415CB378729852C78BE396139B7C4F83D9B13B2CFD17438950A2CA411EE95
35,692,474 UART: [art] PUB.Y = 7ACC681F2BF8C2EE1629033ECC2F12C88B7DBE000D1FC60425E8FCCD7EB3B50FC2316A493E3E4049D90CD1AA63F49C2D
35,699,737 UART: [art] SIG.R = CAADE609059568D5F5CCD339579E65F281AB31AF462852EA7306372E9BDB1BBD4B03E247E6DDEB2D2038BF4EB0BAF7C2
35,707,144 UART: [art] SIG.S = FE5C1A6767A6A065214EA9E53BCD5C8462417FB8D3EA703FF8452BED3C103B19463B9B110DA0866639876FD21899C0D8
37,013,092 UART: Caliptra RT
37,013,807 UART: [state] CFI Enabled
37,131,066 UART: [rt] RT listening for mailbox commands...
40,778,616 >>> mbox cmd response: failed
40,780,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,923,644 UART:
40,923,952 UART: Running Caliptra FMC ...
40,924,998 UART:
40,925,146 UART: [state] CFI Enabled
40,926,079 UART: [art] Extend RT PCRs Done
40,927,222 UART: [art] Lock RT PCRs Done
40,928,241 UART: [art] Populate DV Done
40,929,286 UART: [fht] FMC Alias Private Key: 7
40,930,609 UART: [art] Derive CDI
40,931,341 UART: [art] Store in in slot 0x4
40,932,430 UART: [art] Derive Key Pair
40,933,420 UART: [art] Store priv key in slot 0x5
44,133,905 UART: [art] Derive Key Pair - Done
44,146,734 UART: [art] Signing Cert with AUTHO
44,148,072 UART: RITY.KEYID = 7
46,427,325 UART: [art] Erasing AUTHORITY.KEYID = 7
46,428,835 UART: [art] PUB.X = DABD38469C93F566F08AC8092897E9090CE415CB378729852C78BE396139B7C4F83D9B13B2CFD17438950A2CA411EE95
46,436,047 UART: [art] PUB.Y = 7ACC681F2BF8C2EE1629033ECC2F12C88B7DBE000D1FC60425E8FCCD7EB3B50FC2316A493E3E4049D90CD1AA63F49C2D
46,443,353 UART: [art] SIG.R = CAADE609059568D5F5CCD339579E65F281AB31AF462852EA7306372E9BDB1BBD4B03E247E6DDEB2D2038BF4EB0BAF7C2
46,450,764 UART: [art] SIG.S = FE5C1A6767A6A065214EA9E53BCD5C8462417FB8D3EA703FF8452BED3C103B19463B9B110DA0866639876FD21899C0D8
47,755,853 UART: Caliptra RT
47,756,550 UART: [state] CFI Enabled
48,046,201 UART: [rt] RT listening for mailbox commands...
60,595,997 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,284 UART:
192,643 UART: Running Caliptra ROM ...
193,814 UART:
193,965 UART: [state] CFI Enabled
263,551 UART: [state] LifecycleState = Unprovisioned
265,452 UART: [state] DebugLocked = No
266,728 UART: [state] WD Timer not started. Device not locked for debugging
270,181 UART: [kat] SHA2-256
449,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,881 UART: [kat] ++
461,418 UART: [kat] sha1
472,463 UART: [kat] SHA2-256
475,471 UART: [kat] SHA2-384
481,875 UART: [kat] SHA2-512-ACC
484,819 UART: [kat] ECC-384
2,946,084 UART: [kat] HMAC-384Kdf
2,965,825 UART: [kat] LMS
3,495,247 UART: [kat] --
3,500,309 UART: [cold-reset] ++
3,501,628 UART: [fht] FHT @ 0x50003400
3,512,725 UART: [idev] ++
3,513,311 UART: [idev] CDI.KEYID = 6
3,514,198 UART: [idev] SUBJECT.KEYID = 7
3,515,414 UART: [idev] UDS.KEYID = 0
3,518,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,770 UART: [idev] Erasing UDS.KEYID = 0
6,021,954 UART: [idev] Sha1 KeyId Algorithm
6,044,109 UART: [idev] --
6,049,726 UART: [ldev] ++
6,050,300 UART: [ldev] CDI.KEYID = 6
6,051,211 UART: [ldev] SUBJECT.KEYID = 5
6,052,428 UART: [ldev] AUTHORITY.KEYID = 7
6,053,660 UART: [ldev] FE.KEYID = 1
6,095,486 UART: [ldev] Erasing FE.KEYID = 1
8,598,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,121 UART: [ldev] --
10,407,281 UART: [fwproc] Wait for Commands...
10,408,944 UART: [fwproc] Recv command 0x46574c44
10,411,039 UART: [fwproc] Recv'd Img size: 114448 bytes
15,006,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,080,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,149,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,468,147 >>> mbox cmd response: success
15,470,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,614,172 UART: [afmc] ++
15,614,815 UART: [afmc] CDI.KEYID = 6
15,615,711 UART: [afmc] SUBJECT.KEYID = 7
15,616,761 UART: [afmc] AUTHORITY.KEYID = 5
18,017,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,741,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,743,131 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,759,077 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,775,022 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,790,784 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,813,258 UART: [afmc] --
19,816,377 UART: [cold-reset] --
19,820,288 UART: [state] Locking Datavault
19,824,300 UART: [state] Locking PCR0, PCR1 and PCR31
19,825,946 UART: [state] Locking ICCM
19,827,748 UART: [exit] Launching FMC @ 0x40000130
19,836,194 UART:
19,836,431 UART: Running Caliptra FMC ...
19,837,534 UART:
19,837,690 UART: [state] CFI Enabled
19,898,293 UART: [fht] FMC Alias Private Key: 7
21,661,928 UART: [art] Extend RT PCRs Done
21,663,159 UART: [art] Lock RT PCRs Done
21,664,813 UART: [art] Populate DV Done
21,670,248 UART: [fht] FMC Alias Private Key: 7
21,671,729 UART: [art] Derive CDI
21,672,492 UART: [art] Store in in slot 0x4
21,730,153 UART: [art] Derive Key Pair
21,731,156 UART: [art] Store priv key in slot 0x5
24,193,905 UART: [art] Derive Key Pair - Done
24,207,013 UART: [art] Signing Cert with AUTHO
24,208,321 UART: RITY.KEYID = 7
25,919,847 UART: [art] Erasing AUTHORITY.KEYID = 7
25,921,354 UART: [art] PUB.X = D854EC9A35A74087F80CA15222D27E09320B0A9E1A058FAFB962718EE398A43324C3BF4D104FC12FC23583A33D28A5E6
25,928,593 UART: [art] PUB.Y = 0CB18AFC8C5BD74286965FFCFF2917CCEE0F5C3DF9086D071996EA2D3893D0AE7304827D2FC0341262388FC472A31C61
25,935,838 UART: [art] SIG.R = 134F53A1143B9C08A294F18E5F8F491F0CF0E8B7DE7240865C05DF5BC80234A2E97C8378F65A76F85EABDF0208AB16BD
25,943,233 UART: [art] SIG.S = A7DFB14A22F995495B8D4767EE3E33080A42A19B9C403DDF1DA34776824EF85E3EE620BD91E48BF28248BA80EAA3BBE3
26,922,902 UART: Caliptra RT
26,923,598 UART: [state] CFI Enabled
27,087,166 UART: [rt] RT listening for mailbox commands...
27,090,395 UART:
27,090,643 UART: Running Caliptra ROM ...
27,091,750 UART:
27,091,912 UART: [state] CFI Enabled
27,151,040 UART: [state] LifecycleState = Unprovisioned
27,152,904 UART: [state] DebugLocked = No
27,155,293 UART: [state] WD Timer not started. Device not locked for debugging
27,159,630 UART: [kat] SHA2-256
27,338,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,350,329 UART: [kat] ++
27,350,783 UART: [kat] sha1
27,361,990 UART: [kat] SHA2-256
27,365,000 UART: [kat] SHA2-384
27,372,469 UART: [kat] SHA2-512-ACC
27,375,466 UART: [kat] ECC-384
29,836,421 UART: [kat] HMAC-384Kdf
29,861,039 UART: [kat] LMS
30,390,506 UART: [kat] --
30,394,926 UART: [update-reset] ++
30,451,030 >>> mbox cmd response: failed
30,452,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,596,921 UART: ROM Non-Fatal Error: 0x000B003D
30,598,354 UART: [state] Locking Datavault
30,599,434 UART: [state] Locking PCR0, PCR1 and PCR31
30,600,973 UART: [state] Locking ICCM
30,601,890 UART: [exit] Launching FMC @ 0x40000130
30,603,313 UART:
30,603,470 UART: Running Caliptra FMC ...
30,604,570 UART:
30,604,746 UART: [state] CFI Enabled
30,605,664 UART: [art] Extend RT PCRs Done
30,606,829 UART: [art] Lock RT PCRs Done
30,607,895 UART: [art] Populate DV Done
30,608,926 UART: [fht] FMC Alias Private Key: 7
30,610,239 UART: [art] Derive CDI
30,610,976 UART: [art] Store in in slot 0x4
30,646,020 UART: [art] Derive Key Pair
30,647,067 UART: [art] Store priv key in slot 0x5
33,109,655 UART: [art] Derive Key Pair - Done
33,122,537 UART: [art] Signing Cert with AUTHO
33,123,844 UART: RITY.KEYID = 7
34,835,559 UART: [art] Erasing AUTHORITY.KEYID = 7
34,837,079 UART: [art] PUB.X = D854EC9A35A74087F80CA15222D27E09320B0A9E1A058FAFB962718EE398A43324C3BF4D104FC12FC23583A33D28A5E6
34,844,302 UART: [art] PUB.Y = 0CB18AFC8C5BD74286965FFCFF2917CCEE0F5C3DF9086D071996EA2D3893D0AE7304827D2FC0341262388FC472A31C61
34,851,585 UART: [art] SIG.R = 134F53A1143B9C08A294F18E5F8F491F0CF0E8B7DE7240865C05DF5BC80234A2E97C8378F65A76F85EABDF0208AB16BD
34,859,029 UART: [art] SIG.S = A7DFB14A22F995495B8D4767EE3E33080A42A19B9C403DDF1DA34776824EF85E3EE620BD91E48BF28248BA80EAA3BBE3
35,838,153 UART: Caliptra RT
35,838,851 UART: [state] CFI Enabled
36,177,909 UART: [rt] RT listening for mailbox commands...
36,180,666 UART:
36,180,924 UART: Running Caliptra ROM ...
36,182,035 UART:
36,182,197 UART: [state] CFI Enabled
36,239,394 UART: [state] LifecycleState = Unprovisioned
36,241,267 UART: [state] DebugLocked = No
36,243,735 UART: [state] WD Timer not started. Device not locked for debugging
36,248,338 UART: [kat] SHA2-256
36,427,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,439,040 UART: [kat] ++
36,439,587 UART: [kat] sha1
36,450,425 UART: [kat] SHA2-256
36,453,456 UART: [kat] SHA2-384
36,460,625 UART: [kat] SHA2-512-ACC
36,463,550 UART: [kat] ECC-384
38,923,056 UART: [kat] HMAC-384Kdf
38,946,130 UART: [kat] LMS
39,475,615 UART: [kat] --
39,479,279 UART: [update-reset] ++
44,093,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,096,825 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,480,128 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,383,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,066,758 >>> mbox cmd response: success
15,069,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,364,581 UART:
19,365,008 UART: Running Caliptra FMC ...
19,366,125 UART:
19,366,285 UART: [state] CFI Enabled
19,432,920 UART: [fht] FMC Alias Private Key: 7
21,197,132 UART: [art] Extend RT PCRs Done
21,198,366 UART: [art] Lock RT PCRs Done
21,199,911 UART: [art] Populate DV Done
21,205,210 UART: [fht] FMC Alias Private Key: 7
21,206,864 UART: [art] Derive CDI
21,207,682 UART: [art] Store in in slot 0x4
21,266,104 UART: [art] Derive Key Pair
21,267,134 UART: [art] Store priv key in slot 0x5
23,729,810 UART: [art] Derive Key Pair - Done
23,742,711 UART: [art] Signing Cert with AUTHO
23,744,045 UART: RITY.KEYID = 7
25,455,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,457,364 UART: [art] PUB.X = 4F129FCA7145C1556262C5EA93488863ADAAFF3FB6A44F5B467D4E3B211D2AB0B912C9C3DB1006A7BB370BE299DDAEC6
25,464,644 UART: [art] PUB.Y = 927C958E033CCE392375BB9871531783206CBE4BE7DC7BF94D3CF2ABAABCE30728C5DC7E1E7A145758C2674FB519B436
25,471,901 UART: [art] SIG.R = 2EEABFCC64E9072EF5CB587CF6876043BDED009BD01BD377B7EA47A3017B5AAF542378DE500E37FCD00FF5080F76379F
25,479,333 UART: [art] SIG.S = E59546D356301CAFE78055C4F9C791D435F861E8C28530B0FDC713C8A9A1B5F0C153C19DF3CECF93E6348D0815173D71
26,458,629 UART: Caliptra RT
26,459,346 UART: [state] CFI Enabled
26,624,239 UART: [rt] RT listening for mailbox commands...
29,826,877 >>> mbox cmd response: failed
29,828,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,972,716 UART:
29,973,038 UART: Running Caliptra FMC ...
29,974,086 UART:
29,974,238 UART: [state] CFI Enabled
29,975,163 UART: [art] Extend RT PCRs Done
29,976,304 UART: [art] Lock RT PCRs Done
29,977,372 UART: [art] Populate DV Done
29,978,466 UART: [fht] FMC Alias Private Key: 7
29,979,794 UART: [art] Derive CDI
29,980,524 UART: [art] Store in in slot 0x4
30,012,719 UART: [art] Derive Key Pair
30,013,738 UART: [art] Store priv key in slot 0x5
32,476,890 UART: [art] Derive Key Pair - Done
32,490,054 UART: [art] Signing Cert with AUTHO
32,491,363 UART: RITY.KEYID = 7
34,202,565 UART: [art] Erasing AUTHORITY.KEYID = 7
34,204,087 UART: [art] PUB.X = 4F129FCA7145C1556262C5EA93488863ADAAFF3FB6A44F5B467D4E3B211D2AB0B912C9C3DB1006A7BB370BE299DDAEC6
34,211,357 UART: [art] PUB.Y = 927C958E033CCE392375BB9871531783206CBE4BE7DC7BF94D3CF2ABAABCE30728C5DC7E1E7A145758C2674FB519B436
34,218,615 UART: [art] SIG.R = 2EEABFCC64E9072EF5CB587CF6876043BDED009BD01BD377B7EA47A3017B5AAF542378DE500E37FCD00FF5080F76379F
34,226,048 UART: [art] SIG.S = E59546D356301CAFE78055C4F9C791D435F861E8C28530B0FDC713C8A9A1B5F0C153C19DF3CECF93E6348D0815173D71
35,204,859 UART: Caliptra RT
35,205,569 UART: [state] CFI Enabled
35,541,755 UART: [rt] RT listening for mailbox commands...
43,525,689 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,631 UART:
193,012 UART: Running Caliptra ROM ...
194,203 UART:
603,542 UART: [state] CFI Enabled
615,092 UART: [state] LifecycleState = Unprovisioned
616,945 UART: [state] DebugLocked = No
618,398 UART: [state] WD Timer not started. Device not locked for debugging
621,317 UART: [kat] SHA2-256
800,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,995 UART: [kat] ++
812,443 UART: [kat] sha1
823,478 UART: [kat] SHA2-256
826,485 UART: [kat] SHA2-384
831,812 UART: [kat] SHA2-512-ACC
834,746 UART: [kat] ECC-384
3,276,261 UART: [kat] HMAC-384Kdf
3,288,023 UART: [kat] LMS
3,817,520 UART: [kat] --
3,820,781 UART: [cold-reset] ++
3,821,774 UART: [fht] FHT @ 0x50003400
3,831,818 UART: [idev] ++
3,832,382 UART: [idev] CDI.KEYID = 6
3,833,321 UART: [idev] SUBJECT.KEYID = 7
3,834,531 UART: [idev] UDS.KEYID = 0
3,837,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,456 UART: [idev] Erasing UDS.KEYID = 0
6,304,649 UART: [idev] Sha1 KeyId Algorithm
6,328,697 UART: [idev] --
6,332,145 UART: [ldev] ++
6,332,709 UART: [ldev] CDI.KEYID = 6
6,333,619 UART: [ldev] SUBJECT.KEYID = 5
6,334,833 UART: [ldev] AUTHORITY.KEYID = 7
6,336,068 UART: [ldev] FE.KEYID = 1
6,345,581 UART: [ldev] Erasing FE.KEYID = 1
8,817,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,535,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,551,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,567,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,583,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,602,382 UART: [ldev] --
10,607,001 UART: [fwproc] Wait for Commands...
10,610,020 UART: [fwproc] Recv command 0x46574c44
10,612,073 UART: [fwproc] Recv'd Img size: 114448 bytes
15,178,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,262,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,330,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,649,864 >>> mbox cmd response: success
15,652,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,795,910 UART: [afmc] ++
15,796,571 UART: [afmc] CDI.KEYID = 6
15,797,486 UART: [afmc] SUBJECT.KEYID = 7
15,798,591 UART: [afmc] AUTHORITY.KEYID = 5
18,158,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,879,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,881,020 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,896,958 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,912,940 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,928,732 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,951,890 UART: [afmc] --
19,956,189 UART: [cold-reset] --
19,959,996 UART: [state] Locking Datavault
19,965,403 UART: [state] Locking PCR0, PCR1 and PCR31
19,967,057 UART: [state] Locking ICCM
19,968,292 UART: [exit] Launching FMC @ 0x40000130
19,976,689 UART:
19,976,945 UART: Running Caliptra FMC ...
19,978,056 UART:
19,978,225 UART: [state] CFI Enabled
19,986,501 UART: [fht] FMC Alias Private Key: 7
21,743,073 UART: [art] Extend RT PCRs Done
21,744,298 UART: [art] Lock RT PCRs Done
21,745,729 UART: [art] Populate DV Done
21,751,140 UART: [fht] FMC Alias Private Key: 7
21,752,730 UART: [art] Derive CDI
21,753,467 UART: [art] Store in in slot 0x4
21,795,894 UART: [art] Derive Key Pair
21,796,903 UART: [art] Store priv key in slot 0x5
24,223,332 UART: [art] Derive Key Pair - Done
24,236,279 UART: [art] Signing Cert with AUTHO
24,237,583 UART: RITY.KEYID = 7
25,943,016 UART: [art] Erasing AUTHORITY.KEYID = 7
25,944,545 UART: [art] PUB.X = 3AF053C69B6A4C25480864065AB05337CCEF319E401AEBBF528AB94F7D5C94E5CF4487C67A36A1A20695029BF9008E6C
25,951,806 UART: [art] PUB.Y = 1F4339BFE9322ECA498E97F6183541575CB1FF8BD9BC49671EC41F69023E74B782BC8B3FB5E20C7E972D070CA7516F4C
25,959,042 UART: [art] SIG.R = D6CB20EA2BB7A1E61A6A5E6D0C14C52199E88D2EE5F6C18F79E8C783FC81845FC818877C278A6463D4E0D915D4E99966
25,966,457 UART: [art] SIG.S = 10ED19A8F044E6CA50741DB7B9BB9A89D848FA3DE20EDF47ED94386C0A00DF248FDF34B9EB6088ADF310E0C273C9C906
26,945,534 UART: Caliptra RT
26,946,247 UART: [state] CFI Enabled
27,063,126 UART: [rt] RT listening for mailbox commands...
27,066,242 UART:
27,066,494 UART: Running Caliptra ROM ...
27,067,601 UART:
27,067,817 UART: [state] CFI Enabled
27,079,805 UART: [state] LifecycleState = Unprovisioned
27,081,646 UART: [state] DebugLocked = No
27,084,106 UART: [state] WD Timer not started. Device not locked for debugging
27,088,705 UART: [kat] SHA2-256
27,267,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,279,440 UART: [kat] ++
27,279,978 UART: [kat] sha1
27,291,085 UART: [kat] SHA2-256
27,294,102 UART: [kat] SHA2-384
27,299,812 UART: [kat] SHA2-512-ACC
27,302,790 UART: [kat] ECC-384
29,743,810 UART: [kat] HMAC-384Kdf
29,756,780 UART: [kat] LMS
30,286,327 UART: [kat] --
30,291,553 UART: [update-reset] ++
30,343,754 >>> mbox cmd response: failed
30,345,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,489,865 UART: ROM Non-Fatal Error: 0x000B003D
30,491,314 UART: [state] Locking Datavault
30,492,474 UART: [state] Locking PCR0, PCR1 and PCR31
30,493,963 UART: [state] Locking ICCM
30,494,860 UART: [exit] Launching FMC @ 0x40000130
30,496,290 UART:
30,496,448 UART: Running Caliptra FMC ...
30,497,551 UART:
30,497,709 UART: [state] CFI Enabled
30,498,627 UART: [art] Extend RT PCRs Done
30,499,765 UART: [art] Lock RT PCRs Done
30,500,830 UART: [art] Populate DV Done
30,501,859 UART: [fht] FMC Alias Private Key: 7
30,503,171 UART: [art] Derive CDI
30,503,908 UART: [art] Store in in slot 0x4
30,505,075 UART: [art] Derive Key Pair
30,506,071 UART: [art] Store priv key in slot 0x5
32,889,741 UART: [art] Derive Key Pair - Done
32,903,010 UART: [art] Signing Cert with AUTHO
32,904,315 UART: RITY.KEYID = 7
34,610,276 UART: [art] Erasing AUTHORITY.KEYID = 7
34,611,798 UART: [art] PUB.X = 3AF053C69B6A4C25480864065AB05337CCEF319E401AEBBF528AB94F7D5C94E5CF4487C67A36A1A20695029BF9008E6C
34,619,041 UART: [art] PUB.Y = 1F4339BFE9322ECA498E97F6183541575CB1FF8BD9BC49671EC41F69023E74B782BC8B3FB5E20C7E972D070CA7516F4C
34,626,316 UART: [art] SIG.R = D6CB20EA2BB7A1E61A6A5E6D0C14C52199E88D2EE5F6C18F79E8C783FC81845FC818877C278A6463D4E0D915D4E99966
34,633,722 UART: [art] SIG.S = 10ED19A8F044E6CA50741DB7B9BB9A89D848FA3DE20EDF47ED94386C0A00DF248FDF34B9EB6088ADF310E0C273C9C906
35,613,440 UART: Caliptra RT
35,614,152 UART: [state] CFI Enabled
35,900,893 UART: [rt] RT listening for mailbox commands...
35,903,460 UART:
35,903,635 UART: Running Caliptra ROM ...
35,904,683 UART:
35,905,053 UART: [state] CFI Enabled
40,322,720 UART: [state] LifecycleState = Unprovisioned
40,324,646 UART: [state] DebugLocked = No
40,326,170 UART: [state] WD Timer not started. Device not locked for debugging
40,330,355 UART: [kat] SHA2-256
40,509,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,521,111 UART: [kat] ++
40,521,569 UART: [kat] sha1
40,532,721 UART: [kat] SHA2-256
40,535,790 UART: [kat] SHA2-384
40,542,635 UART: [kat] SHA2-512-ACC
40,545,615 UART: [kat] ECC-384
42,988,577 UART: [kat] HMAC-384Kdf
43,001,226 UART: [kat] LMS
43,530,714 UART: [kat] --
43,535,317 UART: [update-reset] ++
48,127,256 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,130,838 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
48,514,151 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,703,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,257,349 >>> mbox cmd response: success
15,259,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,502,221 UART:
19,502,631 UART: Running Caliptra FMC ...
19,503,754 UART:
19,503,916 UART: [state] CFI Enabled
19,511,359 UART: [fht] FMC Alias Private Key: 7
21,268,532 UART: [art] Extend RT PCRs Done
21,269,761 UART: [art] Lock RT PCRs Done
21,271,338 UART: [art] Populate DV Done
21,276,527 UART: [fht] FMC Alias Private Key: 7
21,278,012 UART: [art] Derive CDI
21,278,779 UART: [art] Store in in slot 0x4
21,321,806 UART: [art] Derive Key Pair
21,322,828 UART: [art] Store priv key in slot 0x5
23,750,003 UART: [art] Derive Key Pair - Done
23,763,015 UART: [art] Signing Cert with AUTHO
23,764,319 UART: RITY.KEYID = 7
25,469,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,471,115 UART: [art] PUB.X = 0C0B658520017CF4CEDF089125A546A69E396964BCC99612AFCBF7D5E1F5F2F7BC402B4082D41186D728239595B411DD
25,478,372 UART: [art] PUB.Y = 45EA4897B63FFF50D961ED4FF2EBE06103C1D9A02FE427D0FE52B3E418AC6C1A331834D3341B65B3E58F6B923C015A37
25,485,651 UART: [art] SIG.R = 6E1169687B760BFE21D80888A2079E4F40DBD8CAB1D65AB4E21F84F7626AD84508318BC246852D1B40C7D13D4F52C961
25,492,999 UART: [art] SIG.S = 8942A7783F8EC85638E90F791E8C5A2401C7FFF1591F77CB835C4BFE3F99A5749BC2A77E41652BD22DFF925C22A37587
26,471,594 UART: Caliptra RT
26,472,309 UART: [state] CFI Enabled
26,589,700 UART: [rt] RT listening for mailbox commands...
29,726,859 >>> mbox cmd response: failed
29,728,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,872,290 UART:
29,872,610 UART: Running Caliptra FMC ...
29,873,690 UART:
29,873,847 UART: [state] CFI Enabled
29,874,778 UART: [art] Extend RT PCRs Done
29,875,921 UART: [art] Lock RT PCRs Done
29,876,986 UART: [art] Populate DV Done
29,878,081 UART: [fht] FMC Alias Private Key: 7
29,879,408 UART: [art] Derive CDI
29,880,146 UART: [art] Store in in slot 0x4
29,881,316 UART: [art] Derive Key Pair
29,882,310 UART: [art] Store priv key in slot 0x5
32,268,883 UART: [art] Derive Key Pair - Done
32,281,833 UART: [art] Signing Cert with AUTHO
32,283,147 UART: RITY.KEYID = 7
33,988,783 UART: [art] Erasing AUTHORITY.KEYID = 7
33,990,296 UART: [art] PUB.X = 0C0B658520017CF4CEDF089125A546A69E396964BCC99612AFCBF7D5E1F5F2F7BC402B4082D41186D728239595B411DD
33,997,543 UART: [art] PUB.Y = 45EA4897B63FFF50D961ED4FF2EBE06103C1D9A02FE427D0FE52B3E418AC6C1A331834D3341B65B3E58F6B923C015A37
34,004,808 UART: [art] SIG.R = 6E1169687B760BFE21D80888A2079E4F40DBD8CAB1D65AB4E21F84F7626AD84508318BC246852D1B40C7D13D4F52C961
34,012,217 UART: [art] SIG.S = 8942A7783F8EC85638E90F791E8C5A2401C7FFF1591F77CB835C4BFE3F99A5749BC2A77E41652BD22DFF925C22A37587
34,990,747 UART: Caliptra RT
34,991,459 UART: [state] CFI Enabled
35,282,512 UART: [rt] RT listening for mailbox commands...
48,186,481 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,094 UART:
192,455 UART: Running Caliptra ROM ...
193,588 UART:
193,737 UART: [state] CFI Enabled
257,910 UART: [state] LifecycleState = Unprovisioned
260,273 UART: [state] DebugLocked = No
262,185 UART: [state] WD Timer not started. Device not locked for debugging
266,864 UART: [kat] SHA2-256
456,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,495 UART: [kat] ++
467,944 UART: [kat] sha1
480,551 UART: [kat] SHA2-256
483,579 UART: [kat] SHA2-384
490,801 UART: [kat] SHA2-512-ACC
493,414 UART: [kat] ECC-384
2,943,624 UART: [kat] HMAC-384Kdf
2,967,688 UART: [kat] LMS
3,499,438 UART: [kat] --
3,503,330 UART: [cold-reset] ++
3,504,398 UART: [fht] FHT @ 0x50003400
3,514,976 UART: [idev] ++
3,515,700 UART: [idev] CDI.KEYID = 6
3,516,640 UART: [idev] SUBJECT.KEYID = 7
3,517,859 UART: [idev] UDS.KEYID = 0
3,520,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,996 UART: [idev] Erasing UDS.KEYID = 0
6,024,772 UART: [idev] Sha1 KeyId Algorithm
6,047,958 UART: [idev] --
6,052,030 UART: [ldev] ++
6,052,718 UART: [ldev] CDI.KEYID = 6
6,053,607 UART: [ldev] SUBJECT.KEYID = 5
6,054,739 UART: [ldev] AUTHORITY.KEYID = 7
6,056,024 UART: [ldev] FE.KEYID = 1
6,095,243 UART: [ldev] Erasing FE.KEYID = 1
8,601,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,894 UART: [ldev] --
10,409,132 UART: [fwproc] Wait for Commands...
10,411,495 UART: [fwproc] Recv command 0x46574c44
10,413,754 UART: [fwproc] Recv'd Img size: 114448 bytes
15,062,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,144,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,260,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,803,281 >>> mbox cmd response: success
15,805,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,949,414 UART: [afmc] ++
15,950,057 UART: [afmc] CDI.KEYID = 6
15,950,981 UART: [afmc] SUBJECT.KEYID = 7
15,952,089 UART: [afmc] AUTHORITY.KEYID = 5
18,339,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,064,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,066,609 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,081,694 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,096,893 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,111,789 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,134,435 UART: [afmc] --
20,138,245 UART: [cold-reset] --
20,142,289 UART: [state] Locking Datavault
20,148,080 UART: [state] Locking PCR0, PCR1 and PCR31
20,150,275 UART: [state] Locking ICCM
20,151,884 UART: [exit] Launching FMC @ 0x40000130
20,160,552 UART:
20,160,785 UART: Running Caliptra FMC ...
20,161,886 UART:
20,162,047 UART: [state] CFI Enabled
20,221,680 UART: [fht] FMC Alias Private Key: 7
21,985,563 UART: [art] Extend RT PCRs Done
21,986,787 UART: [art] Lock RT PCRs Done
21,988,626 UART: [art] Populate DV Done
21,994,089 UART: [fht] FMC Alias Private Key: 7
21,995,633 UART: [art] Derive CDI
21,996,449 UART: [art] Store in in slot 0x4
22,054,442 UART: [art] Derive Key Pair
22,055,504 UART: [art] Store priv key in slot 0x5
24,518,461 UART: [art] Derive Key Pair - Done
24,531,087 UART: [art] Signing Cert with AUTHO
24,532,397 UART: RITY.KEYID = 7
26,244,530 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,038 UART: [art] PUB.X = 6C53130492721ACF117DC58C4B2C2E460DBD3FDF4DD96E3341AD2834C41CEF66ED1C388D44AD92803085CB5D3112E3B5
26,253,287 UART: [art] PUB.Y = 03A86F89287BD3634EB7B217D7D0543CA9C03F0B504B441DBFD94783022C5B7A4BC3FED41DBACAE4017619C2324452EA
26,260,575 UART: [art] SIG.R = 93C94BC43036D1460164343510895336EA137D50823CCB69ADF97EF3FCE7EC19D7CD6919026146392140226931AEDFC4
26,267,997 UART: [art] SIG.S = 87E3A3CDB65F186F68DA31485A67AF88A9D4A5B14C3D153B85BD3EA5384863173D0B543AD13EED57A669C7689AE3CA79
27,246,583 UART: Caliptra RT
27,247,270 UART: [state] CFI Enabled
27,412,906 UART: [rt] RT listening for mailbox commands...
27,415,911 UART:
27,416,079 UART: Running Caliptra ROM ...
27,417,102 UART:
27,417,250 UART: [state] CFI Enabled
27,480,187 UART: [state] LifecycleState = Unprovisioned
27,482,284 UART: [state] DebugLocked = No
27,484,161 UART: [state] WD Timer not started. Device not locked for debugging
27,489,039 UART: [kat] SHA2-256
27,678,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,689,666 UART: [kat] ++
27,690,204 UART: [kat] sha1
27,702,288 UART: [kat] SHA2-256
27,705,179 UART: [kat] SHA2-384
27,711,712 UART: [kat] SHA2-512-ACC
27,714,332 UART: [kat] ECC-384
30,164,970 UART: [kat] HMAC-384Kdf
30,186,583 UART: [kat] LMS
30,718,152 UART: [kat] --
30,724,412 UART: [update-reset] ++
30,791,365 >>> mbox cmd response: failed
30,793,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,937,129 UART: ROM Non-Fatal Error: 0x000B003D
30,938,567 UART: [state] Locking Datavault
30,939,727 UART: [state] Locking PCR0, PCR1 and PCR31
30,941,264 UART: [state] Locking ICCM
30,942,172 UART: [exit] Launching FMC @ 0x40000130
30,943,595 UART:
30,943,773 UART: Running Caliptra FMC ...
30,944,873 UART:
30,945,032 UART: [state] CFI Enabled
30,945,956 UART: [art] Extend RT PCRs Done
30,947,094 UART: [art] Lock RT PCRs Done
30,948,212 UART: [art] Populate DV Done
30,949,314 UART: [fht] FMC Alias Private Key: 7
30,950,645 UART: [art] Derive CDI
30,951,381 UART: [art] Store in in slot 0x4
30,972,450 UART: [art] Derive Key Pair
30,973,450 UART: [art] Store priv key in slot 0x5
33,436,365 UART: [art] Derive Key Pair - Done
33,449,257 UART: [art] Signing Cert with AUTHO
33,450,563 UART: RITY.KEYID = 7
35,161,563 UART: [art] Erasing AUTHORITY.KEYID = 7
35,163,070 UART: [art] PUB.X = 6C53130492721ACF117DC58C4B2C2E460DBD3FDF4DD96E3341AD2834C41CEF66ED1C388D44AD92803085CB5D3112E3B5
35,170,331 UART: [art] PUB.Y = 03A86F89287BD3634EB7B217D7D0543CA9C03F0B504B441DBFD94783022C5B7A4BC3FED41DBACAE4017619C2324452EA
35,177,622 UART: [art] SIG.R = 93C94BC43036D1460164343510895336EA137D50823CCB69ADF97EF3FCE7EC19D7CD6919026146392140226931AEDFC4
35,184,978 UART: [art] SIG.S = 87E3A3CDB65F186F68DA31485A67AF88A9D4A5B14C3D153B85BD3EA5384863173D0B543AD13EED57A669C7689AE3CA79
36,163,868 UART: Caliptra RT
36,164,563 UART: [state] CFI Enabled
36,503,548 UART: [rt] RT listening for mailbox commands...
36,506,146 UART:
36,506,345 UART: Running Caliptra ROM ...
36,507,454 UART:
36,507,641 UART: [state] CFI Enabled
36,566,034 UART: [state] LifecycleState = Unprovisioned
36,568,028 UART: [state] DebugLocked = No
36,569,404 UART: [state] WD Timer not started. Device not locked for debugging
36,573,900 UART: [kat] SHA2-256
36,763,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,774,493 UART: [kat] ++
36,774,977 UART: [kat] sha1
36,786,406 UART: [kat] SHA2-256
36,789,373 UART: [kat] SHA2-384
36,796,442 UART: [kat] SHA2-512-ACC
36,799,006 UART: [kat] ECC-384
39,252,089 UART: [kat] HMAC-384Kdf
39,275,284 UART: [kat] LMS
39,806,888 UART: [kat] --
39,811,797 UART: [update-reset] ++
44,470,112 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,474,129 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
45,082,366 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,441,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,857,926 >>> mbox cmd response: success
15,859,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,137,810 UART:
20,138,236 UART: Running Caliptra FMC ...
20,139,360 UART:
20,139,512 UART: [state] CFI Enabled
20,204,807 UART: [fht] FMC Alias Private Key: 7
21,968,161 UART: [art] Extend RT PCRs Done
21,969,381 UART: [art] Lock RT PCRs Done
21,971,012 UART: [art] Populate DV Done
21,976,436 UART: [fht] FMC Alias Private Key: 7
21,978,072 UART: [art] Derive CDI
21,978,898 UART: [art] Store in in slot 0x4
22,037,323 UART: [art] Derive Key Pair
22,038,328 UART: [art] Store priv key in slot 0x5
24,502,482 UART: [art] Derive Key Pair - Done
24,515,434 UART: [art] Signing Cert with AUTHO
24,516,739 UART: RITY.KEYID = 7
26,228,383 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,918 UART: [art] PUB.X = 07358E11C4FEB8B2A8C6FD75C3CBA070A1ED11EDE8398AA1745A14841D3163618CB8942758E9BD0CB71352B2CFED36BD
26,237,129 UART: [art] PUB.Y = 887417582A7724E51F0334F3127F78CEF9EBA843DFD3A1BD7F2EF08D86B2D6556F2BCD6D6211CC4AE3C63BA4ADE977ED
26,244,411 UART: [art] SIG.R = 4025D63AFBABECE6B375D0A79CBB30DEC93C3CA3AE37B102DA9B83F05CF5D2EF6CE4A319A46BE831473547F3CD425666
26,251,843 UART: [art] SIG.S = CC18C0F2870259E916621B7C1388FAA2DB2C14E220BB54A760EC36C1B6E41722615B91A8328DC7C5756AF8CF7FE69202
27,230,943 UART: Caliptra RT
27,231,631 UART: [state] CFI Enabled
27,396,174 UART: [rt] RT listening for mailbox commands...
30,681,643 >>> mbox cmd response: failed
30,683,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,827,939 UART:
30,828,274 UART: Running Caliptra FMC ...
30,829,400 UART:
30,829,564 UART: [state] CFI Enabled
30,830,486 UART: [art] Extend RT PCRs Done
30,831,620 UART: [art] Lock RT PCRs Done
30,832,686 UART: [art] Populate DV Done
30,833,803 UART: [fht] FMC Alias Private Key: 7
30,835,126 UART: [art] Derive CDI
30,835,862 UART: [art] Store in in slot 0x4
30,870,758 UART: [art] Derive Key Pair
30,871,799 UART: [art] Store priv key in slot 0x5
33,334,670 UART: [art] Derive Key Pair - Done
33,347,395 UART: [art] Signing Cert with AUTHO
33,348,696 UART: RITY.KEYID = 7
35,060,504 UART: [art] Erasing AUTHORITY.KEYID = 7
35,062,018 UART: [art] PUB.X = 07358E11C4FEB8B2A8C6FD75C3CBA070A1ED11EDE8398AA1745A14841D3163618CB8942758E9BD0CB71352B2CFED36BD
35,069,243 UART: [art] PUB.Y = 887417582A7724E51F0334F3127F78CEF9EBA843DFD3A1BD7F2EF08D86B2D6556F2BCD6D6211CC4AE3C63BA4ADE977ED
35,076,574 UART: [art] SIG.R = 4025D63AFBABECE6B375D0A79CBB30DEC93C3CA3AE37B102DA9B83F05CF5D2EF6CE4A319A46BE831473547F3CD425666
35,083,977 UART: [art] SIG.S = CC18C0F2870259E916621B7C1388FAA2DB2C14E220BB54A760EC36C1B6E41722615B91A8328DC7C5756AF8CF7FE69202
36,063,269 UART: Caliptra RT
36,063,974 UART: [state] CFI Enabled
36,398,657 UART: [rt] RT listening for mailbox commands...
45,208,570 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,461 UART:
192,821 UART: Running Caliptra ROM ...
194,014 UART:
603,619 UART: [state] CFI Enabled
618,480 UART: [state] LifecycleState = Unprovisioned
620,857 UART: [state] DebugLocked = No
623,177 UART: [state] WD Timer not started. Device not locked for debugging
627,308 UART: [kat] SHA2-256
817,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,987 UART: [kat] ++
828,496 UART: [kat] sha1
840,290 UART: [kat] SHA2-256
843,299 UART: [kat] SHA2-384
848,309 UART: [kat] SHA2-512-ACC
850,917 UART: [kat] ECC-384
3,291,999 UART: [kat] HMAC-384Kdf
3,304,280 UART: [kat] LMS
3,836,087 UART: [kat] --
3,839,513 UART: [cold-reset] ++
3,841,502 UART: [fht] FHT @ 0x50003400
3,852,396 UART: [idev] ++
3,853,078 UART: [idev] CDI.KEYID = 6
3,854,019 UART: [idev] SUBJECT.KEYID = 7
3,855,234 UART: [idev] UDS.KEYID = 0
3,858,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,013 UART: [idev] Erasing UDS.KEYID = 0
6,333,161 UART: [idev] Sha1 KeyId Algorithm
6,354,719 UART: [idev] --
6,359,472 UART: [ldev] ++
6,360,154 UART: [ldev] CDI.KEYID = 6
6,361,039 UART: [ldev] SUBJECT.KEYID = 5
6,362,259 UART: [ldev] AUTHORITY.KEYID = 7
6,363,385 UART: [ldev] FE.KEYID = 1
6,375,328 UART: [ldev] Erasing FE.KEYID = 1
8,855,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,005 UART: [ldev] --
10,648,204 UART: [fwproc] Wait for Commands...
10,651,387 UART: [fwproc] Recv command 0x46574c44
10,653,704 UART: [fwproc] Recv'd Img size: 114448 bytes
15,284,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,371,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,487,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,030,465 >>> mbox cmd response: success
16,032,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,176,430 UART: [afmc] ++
16,177,071 UART: [afmc] CDI.KEYID = 6
16,177,995 UART: [afmc] SUBJECT.KEYID = 7
16,179,104 UART: [afmc] AUTHORITY.KEYID = 5
18,542,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,265,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,267,241 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,282,322 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,297,498 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,312,385 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,336,114 UART: [afmc] --
20,339,930 UART: [cold-reset] --
20,342,929 UART: [state] Locking Datavault
20,350,017 UART: [state] Locking PCR0, PCR1 and PCR31
20,352,151 UART: [state] Locking ICCM
20,354,679 UART: [exit] Launching FMC @ 0x40000130
20,363,343 UART:
20,363,577 UART: Running Caliptra FMC ...
20,364,675 UART:
20,364,840 UART: [state] CFI Enabled
20,373,015 UART: [fht] FMC Alias Private Key: 7
22,130,507 UART: [art] Extend RT PCRs Done
22,131,726 UART: [art] Lock RT PCRs Done
22,133,567 UART: [art] Populate DV Done
22,138,982 UART: [fht] FMC Alias Private Key: 7
22,140,639 UART: [art] Derive CDI
22,141,457 UART: [art] Store in in slot 0x4
22,183,906 UART: [art] Derive Key Pair
22,184,943 UART: [art] Store priv key in slot 0x5
24,611,590 UART: [art] Derive Key Pair - Done
24,624,589 UART: [art] Signing Cert with AUTHO
24,626,073 UART: RITY.KEYID = 7
26,331,303 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,812 UART: [art] PUB.X = 6407621C2087B4353F984BA4890797F40AE5E48A314373F8C5643C27644B34A01B34BA4A5EDE4602C65A3D133ACB4A45
26,340,013 UART: [art] PUB.Y = 2B01AF9654E5C608F9B56F610BE0D0AD5C1A326B4842A437BB929C29DAAEE8755C4A766F846C1ADF0EDC189B7A5336D6
26,347,302 UART: [art] SIG.R = B5C539C0A4860AE28533234ACBE716E93B05EB280BB53F0007E9BD6F4331D3DFDE6D1A0254F0E9D9314245D00D2600BF
26,354,643 UART: [art] SIG.S = 8CDC38792FC5E18C64B387583F3BA5C61B7B419763777A1987ACA2F0D770A7ACDE27747FCA0DFA7CE154E73DF7BDDAD2
27,333,939 UART: Caliptra RT
27,334,628 UART: [state] CFI Enabled
27,452,571 UART: [rt] RT listening for mailbox commands...
27,455,845 UART:
27,456,092 UART: Running Caliptra ROM ...
27,457,201 UART:
27,457,465 UART: [state] CFI Enabled
27,472,752 UART: [state] LifecycleState = Unprovisioned
27,474,639 UART: [state] DebugLocked = No
27,477,149 UART: [state] WD Timer not started. Device not locked for debugging
27,482,181 UART: [kat] SHA2-256
27,672,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,682,819 UART: [kat] ++
27,683,418 UART: [kat] sha1
27,695,874 UART: [kat] SHA2-256
27,698,850 UART: [kat] SHA2-384
27,704,672 UART: [kat] SHA2-512-ACC
27,707,222 UART: [kat] ECC-384
30,147,800 UART: [kat] HMAC-384Kdf
30,159,989 UART: [kat] LMS
30,691,594 UART: [kat] --
30,695,760 UART: [update-reset] ++
30,765,153 >>> mbox cmd response: failed
30,766,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,910,666 UART: ROM Non-Fatal Error: 0x000B003D
30,912,096 UART: [state] Locking Datavault
30,913,251 UART: [state] Locking PCR0, PCR1 and PCR31
30,914,789 UART: [state] Locking ICCM
30,915,694 UART: [exit] Launching FMC @ 0x40000130
30,917,119 UART:
30,917,276 UART: Running Caliptra FMC ...
30,918,395 UART:
30,918,553 UART: [state] CFI Enabled
30,919,419 UART: [art] Extend RT PCRs Done
30,920,475 UART: [art] Lock RT PCRs Done
30,921,482 UART: [art] Populate DV Done
30,922,448 UART: [fht] FMC Alias Private Key: 7
30,923,767 UART: [art] Derive CDI
30,924,507 UART: [art] Store in in slot 0x4
30,925,672 UART: [art] Derive Key Pair
30,926,667 UART: [art] Store priv key in slot 0x5
33,312,948 UART: [art] Derive Key Pair - Done
33,325,949 UART: [art] Signing Cert with AUTHO
33,327,259 UART: RITY.KEYID = 7
35,032,907 UART: [art] Erasing AUTHORITY.KEYID = 7
35,034,416 UART: [art] PUB.X = 6407621C2087B4353F984BA4890797F40AE5E48A314373F8C5643C27644B34A01B34BA4A5EDE4602C65A3D133ACB4A45
35,041,675 UART: [art] PUB.Y = 2B01AF9654E5C608F9B56F610BE0D0AD5C1A326B4842A437BB929C29DAAEE8755C4A766F846C1ADF0EDC189B7A5336D6
35,048,934 UART: [art] SIG.R = B5C539C0A4860AE28533234ACBE716E93B05EB280BB53F0007E9BD6F4331D3DFDE6D1A0254F0E9D9314245D00D2600BF
35,056,286 UART: [art] SIG.S = 8CDC38792FC5E18C64B387583F3BA5C61B7B419763777A1987ACA2F0D770A7ACDE27747FCA0DFA7CE154E73DF7BDDAD2
36,035,070 UART: Caliptra RT
36,035,778 UART: [state] CFI Enabled
36,321,180 UART: [rt] RT listening for mailbox commands...
36,324,082 UART:
36,324,248 UART: Running Caliptra ROM ...
36,325,350 UART:
36,325,723 UART: [state] CFI Enabled
40,322,812 UART: [state] LifecycleState = Unprovisioned
40,324,727 UART: [state] DebugLocked = No
40,326,197 UART: [state] WD Timer not started. Device not locked for debugging
40,331,186 UART: [kat] SHA2-256
40,521,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,531,875 UART: [kat] ++
40,532,412 UART: [kat] sha1
40,544,452 UART: [kat] SHA2-256
40,547,435 UART: [kat] SHA2-384
40,554,227 UART: [kat] SHA2-512-ACC
40,556,810 UART: [kat] ECC-384
42,999,782 UART: [kat] HMAC-384Kdf
43,012,497 UART: [kat] LMS
43,544,117 UART: [kat] --
43,546,869 UART: [update-reset] ++
48,191,394 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,194,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
48,803,023 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,755,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,034,663 >>> mbox cmd response: success
16,036,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,288,724 UART:
20,289,108 UART: Running Caliptra FMC ...
20,290,224 UART:
20,290,381 UART: [state] CFI Enabled
20,298,356 UART: [fht] FMC Alias Private Key: 7
22,055,532 UART: [art] Extend RT PCRs Done
22,056,755 UART: [art] Lock RT PCRs Done
22,058,467 UART: [art] Populate DV Done
22,063,653 UART: [fht] FMC Alias Private Key: 7
22,065,356 UART: [art] Derive CDI
22,066,096 UART: [art] Store in in slot 0x4
22,108,595 UART: [art] Derive Key Pair
22,109,637 UART: [art] Store priv key in slot 0x5
24,536,281 UART: [art] Derive Key Pair - Done
24,549,115 UART: [art] Signing Cert with AUTHO
24,550,426 UART: RITY.KEYID = 7
26,256,284 UART: [art] Erasing AUTHORITY.KEYID = 7
26,257,795 UART: [art] PUB.X = 7A93EE3EA99360400D921F489D4236ED38263AAB6D1DF7FE40311C0D0369409A456FF1924DE76F855B5DCABD6C3F14C5
26,265,023 UART: [art] PUB.Y = 4A3151AF3CAC637EB6003ACB558A8EBD28AEF8737B774FA542A4F286DDC7E75ABE588A89599C3694909AE484AB1E20D4
26,272,332 UART: [art] SIG.R = 8A1EBEBDE14006762F9612167FC47E5361EFC5CD432E5B23EE78F3368A16F3C08D5C2763564F7EB9C71E2FB1DF3A6665
26,279,714 UART: [art] SIG.S = EA3B510CC111212E0B6C7F02B577C28F49C98D4F221F1C61C9C6EA21959BC70911717C9041740F36F552A635BF5B3D90
27,258,786 UART: Caliptra RT
27,259,499 UART: [state] CFI Enabled
27,376,907 UART: [rt] RT listening for mailbox commands...
30,580,670 >>> mbox cmd response: failed
30,582,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,726,240 UART:
30,726,536 UART: Running Caliptra FMC ...
30,727,588 UART:
30,727,739 UART: [state] CFI Enabled
30,728,604 UART: [art] Extend RT PCRs Done
30,729,745 UART: [art] Lock RT PCRs Done
30,730,755 UART: [art] Populate DV Done
30,731,861 UART: [fht] FMC Alias Private Key: 7
30,733,105 UART: [art] Derive CDI
30,733,832 UART: [art] Store in in slot 0x4
30,735,006 UART: [art] Derive Key Pair
30,735,925 UART: [art] Store priv key in slot 0x5
33,118,852 UART: [art] Derive Key Pair - Done
33,131,591 UART: [art] Signing Cert with AUTHO
33,132,903 UART: RITY.KEYID = 7
34,838,508 UART: [art] Erasing AUTHORITY.KEYID = 7
34,840,002 UART: [art] PUB.X = 7A93EE3EA99360400D921F489D4236ED38263AAB6D1DF7FE40311C0D0369409A456FF1924DE76F855B5DCABD6C3F14C5
34,847,283 UART: [art] PUB.Y = 4A3151AF3CAC637EB6003ACB558A8EBD28AEF8737B774FA542A4F286DDC7E75ABE588A89599C3694909AE484AB1E20D4
34,854,499 UART: [art] SIG.R = 8A1EBEBDE14006762F9612167FC47E5361EFC5CD432E5B23EE78F3368A16F3C08D5C2763564F7EB9C71E2FB1DF3A6665
34,861,949 UART: [art] SIG.S = EA3B510CC111212E0B6C7F02B577C28F49C98D4F221F1C61C9C6EA21959BC70911717C9041740F36F552A635BF5B3D90
35,840,766 UART: Caliptra RT
35,841,482 UART: [state] CFI Enabled
36,129,499 UART: [rt] RT listening for mailbox commands...
48,966,206 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,599 UART: [kat] SHA2-256
881,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,645 UART: [kat] ++
885,797 UART: [kat] sha1
889,967 UART: [kat] SHA2-256
891,905 UART: [kat] SHA2-384
894,696 UART: [kat] SHA2-512-ACC
896,597 UART: [kat] ECC-384
902,030 UART: [kat] HMAC-384Kdf
906,528 UART: [kat] LMS
1,474,724 UART: [kat] --
1,475,837 UART: [cold-reset] ++
1,476,357 UART: [fht] Storing FHT @ 0x50003400
1,479,238 UART: [idev] ++
1,479,406 UART: [idev] CDI.KEYID = 6
1,479,766 UART: [idev] SUBJECT.KEYID = 7
1,480,190 UART: [idev] UDS.KEYID = 0
1,480,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,504,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,126 UART: [idev] --
1,514,171 UART: [ldev] ++
1,514,339 UART: [ldev] CDI.KEYID = 6
1,514,702 UART: [ldev] SUBJECT.KEYID = 5
1,515,128 UART: [ldev] AUTHORITY.KEYID = 7
1,515,591 UART: [ldev] FE.KEYID = 1
1,520,597 UART: [ldev] Erasing FE.KEYID = 1
1,546,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,586,023 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 114448 bytes
5,199,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,227,537 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,256,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,392,836 >>> mbox cmd response: success
5,392,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,393,888 UART: [afmc] ++
5,394,056 UART: [afmc] CDI.KEYID = 6
5,394,418 UART: [afmc] SUBJECT.KEYID = 7
5,394,843 UART: [afmc] AUTHORITY.KEYID = 5
5,429,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,445,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,446,159 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,451,868 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,457,760 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,463,461 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,471,471 UART: [afmc] --
5,472,509 UART: [cold-reset] --
5,473,599 UART: [state] Locking Datavault
5,474,872 UART: [state] Locking PCR0, PCR1 and PCR31
5,475,476 UART: [state] Locking ICCM
5,476,112 UART: [exit] Launching FMC @ 0x40000130
5,481,441 UART:
5,481,457 UART: Running Caliptra FMC ...
5,481,865 UART:
5,481,919 UART: [state] CFI Enabled
5,492,355 UART: [fht] FMC Alias Private Key: 7
5,599,971 UART: [art] Extend RT PCRs Done
5,600,399 UART: [art] Lock RT PCRs Done
5,601,863 UART: [art] Populate DV Done
5,609,965 UART: [fht] FMC Alias Private Key: 7
5,611,069 UART: [art] Derive CDI
5,611,349 UART: [art] Store in in slot 0x4
5,696,906 UART: [art] Derive Key Pair
5,697,266 UART: [art] Store priv key in slot 0x5
5,710,718 UART: [art] Derive Key Pair - Done
5,725,440 UART: [art] Signing Cert with AUTHO
5,725,920 UART: RITY.KEYID = 7
5,741,544 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,309 UART: [art] PUB.X = 43F27077506C1A69E134DABD12387A88756EF26979ADA2D92AF5FF2B28EB00F246193215821BEFD07B4DAA16F774724E
5,749,061 UART: [art] PUB.Y = 6C5191FAB1F08FCE8479AB29E1409A51D57698A6868991F7DD2F1B936BB6F65FFA668D123CF1D865BB826D8ABE24D3A5
5,756,023 UART: [art] SIG.R = B01A17A6D8CC526753DDCDBEE7E86BA05E36FD6FB59428BCA129A62092908247F7D5901E17063E57588F0951661EAFDD
5,762,795 UART: [art] SIG.S = C510FB187E0DB4062183D19A5D16B7A94066EB2CA7E0ED413AAB7800CA07F22109189CF11A6791ADD1805CA20B3E374B
5,786,345 UART: Caliptra RT
5,786,598 UART: [state] CFI Enabled
5,894,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,896,999 UART:
5,897,015 UART: Running Caliptra ROM ...
5,897,423 UART:
5,897,477 UART: [state] CFI Enabled
5,900,567 UART: [state] LifecycleState = Unprovisioned
5,901,222 UART: [state] DebugLocked = No
5,901,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,903,259 UART: [kat] SHA2-256
6,697,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,701,305 UART: [kat] ++
6,701,457 UART: [kat] sha1
6,705,829 UART: [kat] SHA2-256
6,707,767 UART: [kat] SHA2-384
6,710,404 UART: [kat] SHA2-512-ACC
6,712,304 UART: [kat] ECC-384
6,717,999 UART: [kat] HMAC-384Kdf
6,722,453 UART: [kat] LMS
7,290,649 UART: [kat] --
7,291,462 UART: [update-reset] ++
7,331,557 >>> mbox cmd response: failed
7,331,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,331,847 UART: ROM Non-Fatal Error: 0x000B003D
7,332,611 UART: [state] Locking Datavault
7,333,401 UART: [state] Locking PCR0, PCR1 and PCR31
7,334,005 UART: [state] Locking ICCM
7,334,661 UART: [exit] Launching FMC @ 0x40000130
7,339,990 UART:
7,340,006 UART: Running Caliptra FMC ...
7,340,414 UART:
7,340,468 UART: [state] CFI Enabled
7,429,235 UART: [art] Extend RT PCRs Done
7,429,663 UART: [art] Lock RT PCRs Done
7,430,816 UART: [art] Populate DV Done
7,438,988 UART: [fht] FMC Alias Private Key: 7
7,440,060 UART: [art] Derive CDI
7,440,340 UART: [art] Store in in slot 0x4
7,526,197 UART: [art] Derive Key Pair
7,526,557 UART: [art] Store priv key in slot 0x5
7,539,567 UART: [art] Derive Key Pair - Done
7,554,365 UART: [art] Signing Cert with AUTHO
7,554,845 UART: RITY.KEYID = 7
7,570,325 UART: [art] Erasing AUTHORITY.KEYID = 7
7,571,090 UART: [art] PUB.X = 43F27077506C1A69E134DABD12387A88756EF26979ADA2D92AF5FF2B28EB00F246193215821BEFD07B4DAA16F774724E
7,577,842 UART: [art] PUB.Y = 6C5191FAB1F08FCE8479AB29E1409A51D57698A6868991F7DD2F1B936BB6F65FFA668D123CF1D865BB826D8ABE24D3A5
7,584,804 UART: [art] SIG.R = B01A17A6D8CC526753DDCDBEE7E86BA05E36FD6FB59428BCA129A62092908247F7D5901E17063E57588F0951661EAFDD
7,591,576 UART: [art] SIG.S = C510FB187E0DB4062183D19A5D16B7A94066EB2CA7E0ED413AAB7800CA07F22109189CF11A6791ADD1805CA20B3E374B
7,615,030 UART: Caliptra RT
7,615,283 UART: [state] CFI Enabled
7,898,493 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,900,031 UART:
7,900,047 UART: Running Caliptra ROM ...
7,900,455 UART:
7,900,509 UART: [state] CFI Enabled
7,903,293 UART: [state] LifecycleState = Unprovisioned
7,903,948 UART: [state] DebugLocked = No
7,904,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,906,383 UART: [kat] SHA2-256
8,700,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,704,429 UART: [kat] ++
8,704,581 UART: [kat] sha1
8,708,859 UART: [kat] SHA2-256
8,710,797 UART: [kat] SHA2-384
8,713,612 UART: [kat] SHA2-512-ACC
8,715,512 UART: [kat] ECC-384
8,720,871 UART: [kat] HMAC-384Kdf
8,725,567 UART: [kat] LMS
9,293,763 UART: [kat] --
9,294,716 UART: [update-reset] ++
12,940,516 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,941,606 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,091,656 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,240,364 >>> mbox cmd response: success
5,240,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,301,979 UART:
5,301,995 UART: Running Caliptra FMC ...
5,302,403 UART:
5,302,457 UART: [state] CFI Enabled
5,312,527 UART: [fht] FMC Alias Private Key: 7
5,420,105 UART: [art] Extend RT PCRs Done
5,420,533 UART: [art] Lock RT PCRs Done
5,421,679 UART: [art] Populate DV Done
5,429,619 UART: [fht] FMC Alias Private Key: 7
5,430,757 UART: [art] Derive CDI
5,431,037 UART: [art] Store in in slot 0x4
5,517,184 UART: [art] Derive Key Pair
5,517,544 UART: [art] Store priv key in slot 0x5
5,530,664 UART: [art] Derive Key Pair - Done
5,545,456 UART: [art] Signing Cert with AUTHO
5,545,936 UART: RITY.KEYID = 7
5,561,276 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,041 UART: [art] PUB.X = FC9E2EFDD23F96352E9D396025947B68280B562968CF5295A66AE0115FCDEB9330BFFAAE38B6015DB743F80694BD19F6
5,568,810 UART: [art] PUB.Y = 0EBC631E0BEDBC03761D28BFF45D0469AEE28C8B8A3F8CCDA9889E6DA4B86A5E863F9B82D3A69F3CA74ED4997215B834
5,575,768 UART: [art] SIG.R = 2B54A325C2CFFA62E4448A0C53F581D12CFDD508D608A6CADFCE43DF3F319932483723D811C08E47BF6BD4635460B816
5,582,537 UART: [art] SIG.S = B54922FCCC6390CD20DCEF3E6AD0C0B60BB0B67C5B1AA3454A0FFFAE5FBAA5C2901EEFEC52A1E0668D85785322B988D5
5,606,872 UART: Caliptra RT
5,607,125 UART: [state] CFI Enabled
5,715,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,035,048 >>> mbox cmd response: failed
7,035,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,041,121 UART:
7,041,137 UART: Running Caliptra FMC ...
7,041,545 UART:
7,041,599 UART: [state] CFI Enabled
7,130,602 UART: [art] Extend RT PCRs Done
7,131,030 UART: [art] Lock RT PCRs Done
7,132,169 UART: [art] Populate DV Done
7,140,561 UART: [fht] FMC Alias Private Key: 7
7,141,519 UART: [art] Derive CDI
7,141,799 UART: [art] Store in in slot 0x4
7,227,588 UART: [art] Derive Key Pair
7,227,948 UART: [art] Store priv key in slot 0x5
7,241,484 UART: [art] Derive Key Pair - Done
7,256,248 UART: [art] Signing Cert with AUTHO
7,256,728 UART: RITY.KEYID = 7
7,271,420 UART: [art] Erasing AUTHORITY.KEYID = 7
7,272,185 UART: [art] PUB.X = FC9E2EFDD23F96352E9D396025947B68280B562968CF5295A66AE0115FCDEB9330BFFAAE38B6015DB743F80694BD19F6
7,278,954 UART: [art] PUB.Y = 0EBC631E0BEDBC03761D28BFF45D0469AEE28C8B8A3F8CCDA9889E6DA4B86A5E863F9B82D3A69F3CA74ED4997215B834
7,285,912 UART: [art] SIG.R = 2B54A325C2CFFA62E4448A0C53F581D12CFDD508D608A6CADFCE43DF3F319932483723D811C08E47BF6BD4635460B816
7,292,681 UART: [art] SIG.S = B54922FCCC6390CD20DCEF3E6AD0C0B60BB0B67C5B1AA3454A0FFFAE5FBAA5C2901EEFEC52A1E0668D85785322B988D5
7,316,344 UART: Caliptra RT
7,316,597 UART: [state] CFI Enabled
7,598,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,674,711 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,929 UART: [kat] SHA2-512-ACC
897,830 UART: [kat] ECC-384
903,429 UART: [kat] HMAC-384Kdf
907,993 UART: [kat] LMS
1,476,189 UART: [kat] --
1,477,484 UART: [cold-reset] ++
1,478,024 UART: [fht] Storing FHT @ 0x50003400
1,480,825 UART: [idev] ++
1,480,993 UART: [idev] CDI.KEYID = 6
1,481,353 UART: [idev] SUBJECT.KEYID = 7
1,481,777 UART: [idev] UDS.KEYID = 0
1,482,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,935 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,569 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,442 UART: [ldev] Erasing FE.KEYID = 1
1,547,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,553 UART: [ldev] --
1,586,994 UART: [fwproc] Waiting for Commands...
1,587,777 UART: [fwproc] Received command 0x46574c44
1,588,568 UART: [fwproc] Received Image of size 114448 bytes
5,387,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,414,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,443,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,579,804 >>> mbox cmd response: success
5,579,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,581,026 UART: [afmc] ++
5,581,194 UART: [afmc] CDI.KEYID = 6
5,581,556 UART: [afmc] SUBJECT.KEYID = 7
5,581,981 UART: [afmc] AUTHORITY.KEYID = 5
5,617,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,633,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,634,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,640,352 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,646,244 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,651,945 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,659,635 UART: [afmc] --
5,660,735 UART: [cold-reset] --
5,661,517 UART: [state] Locking Datavault
5,662,778 UART: [state] Locking PCR0, PCR1 and PCR31
5,663,382 UART: [state] Locking ICCM
5,663,848 UART: [exit] Launching FMC @ 0x40000130
5,669,177 UART:
5,669,193 UART: Running Caliptra FMC ...
5,669,601 UART:
5,669,744 UART: [state] CFI Enabled
5,680,344 UART: [fht] FMC Alias Private Key: 7
5,787,896 UART: [art] Extend RT PCRs Done
5,788,324 UART: [art] Lock RT PCRs Done
5,789,778 UART: [art] Populate DV Done
5,797,724 UART: [fht] FMC Alias Private Key: 7
5,798,734 UART: [art] Derive CDI
5,799,014 UART: [art] Store in in slot 0x4
5,884,963 UART: [art] Derive Key Pair
5,885,323 UART: [art] Store priv key in slot 0x5
5,898,483 UART: [art] Derive Key Pair - Done
5,913,222 UART: [art] Signing Cert with AUTHO
5,913,702 UART: RITY.KEYID = 7
5,928,664 UART: [art] Erasing AUTHORITY.KEYID = 7
5,929,429 UART: [art] PUB.X = 37D105014D75D29CD9CC1AE487DFDD4F39987EB01FFADE2DD895934E092F6569B2A7B94C7FF5738F9FD9154529D72F51
5,936,200 UART: [art] PUB.Y = 582E82BDEBDB977F3450B71FE281CE70C1540B299DFD0F62A48AE20F2FF0EF84D209CE377AB4BC7495A5F3CAA4798FF3
5,943,158 UART: [art] SIG.R = 09EB15A1711898B50801B8323E66662252CAF7A7941401F1E1CC0B6113F09ED76019ECEA45F19ABDC74EAB4921EAB706
5,949,914 UART: [art] SIG.S = 91DB5ABA4BD077219A7E6A3E40E5AEF0F2DA2DD9CFEE1C047D1EBF124B31F2C105BC5BAE3AA783E1179CB01C4341927B
5,973,149 UART: Caliptra RT
5,973,494 UART: [state] CFI Enabled
6,080,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,082,990 UART:
6,083,006 UART: Running Caliptra ROM ...
6,083,414 UART:
6,083,555 UART: [state] CFI Enabled
6,086,583 UART: [state] LifecycleState = Unprovisioned
6,087,238 UART: [state] DebugLocked = No
6,087,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,089,357 UART: [kat] SHA2-256
6,883,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,887,403 UART: [kat] ++
6,887,555 UART: [kat] sha1
6,891,835 UART: [kat] SHA2-256
6,893,773 UART: [kat] SHA2-384
6,896,694 UART: [kat] SHA2-512-ACC
6,898,594 UART: [kat] ECC-384
6,904,455 UART: [kat] HMAC-384Kdf
6,909,131 UART: [kat] LMS
7,477,327 UART: [kat] --
7,477,780 UART: [update-reset] ++
7,518,251 >>> mbox cmd response: failed
7,518,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,518,665 UART: ROM Non-Fatal Error: 0x000B003D
7,519,445 UART: [state] Locking Datavault
7,520,269 UART: [state] Locking PCR0, PCR1 and PCR31
7,520,873 UART: [state] Locking ICCM
7,521,455 UART: [exit] Launching FMC @ 0x40000130
7,526,784 UART:
7,526,800 UART: Running Caliptra FMC ...
7,527,208 UART:
7,527,351 UART: [state] CFI Enabled
7,616,274 UART: [art] Extend RT PCRs Done
7,616,702 UART: [art] Lock RT PCRs Done
7,618,131 UART: [art] Populate DV Done
7,626,223 UART: [fht] FMC Alias Private Key: 7
7,627,295 UART: [art] Derive CDI
7,627,575 UART: [art] Store in in slot 0x4
7,713,174 UART: [art] Derive Key Pair
7,713,534 UART: [art] Store priv key in slot 0x5
7,726,628 UART: [art] Derive Key Pair - Done
7,741,255 UART: [art] Signing Cert with AUTHO
7,741,735 UART: RITY.KEYID = 7
7,757,217 UART: [art] Erasing AUTHORITY.KEYID = 7
7,757,982 UART: [art] PUB.X = 37D105014D75D29CD9CC1AE487DFDD4F39987EB01FFADE2DD895934E092F6569B2A7B94C7FF5738F9FD9154529D72F51
7,764,753 UART: [art] PUB.Y = 582E82BDEBDB977F3450B71FE281CE70C1540B299DFD0F62A48AE20F2FF0EF84D209CE377AB4BC7495A5F3CAA4798FF3
7,771,711 UART: [art] SIG.R = 09EB15A1711898B50801B8323E66662252CAF7A7941401F1E1CC0B6113F09ED76019ECEA45F19ABDC74EAB4921EAB706
7,778,467 UART: [art] SIG.S = 91DB5ABA4BD077219A7E6A3E40E5AEF0F2DA2DD9CFEE1C047D1EBF124B31F2C105BC5BAE3AA783E1179CB01C4341927B
7,802,094 UART: Caliptra RT
7,802,439 UART: [state] CFI Enabled
8,086,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,087,844 UART:
8,087,860 UART: Running Caliptra ROM ...
8,088,268 UART:
8,088,409 UART: [state] CFI Enabled
8,090,911 UART: [state] LifecycleState = Unprovisioned
8,091,566 UART: [state] DebugLocked = No
8,092,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,093,689 UART: [kat] SHA2-256
8,887,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,891,735 UART: [kat] ++
8,891,887 UART: [kat] sha1
8,896,233 UART: [kat] SHA2-256
8,898,171 UART: [kat] SHA2-384
8,900,764 UART: [kat] SHA2-512-ACC
8,902,664 UART: [kat] ECC-384
8,908,435 UART: [kat] HMAC-384Kdf
8,912,975 UART: [kat] LMS
9,481,171 UART: [kat] --
9,482,412 UART: [update-reset] ++
13,317,739 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,318,965 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,469,015 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,129,042 >>> mbox cmd response: success
5,129,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,189,967 UART:
5,189,983 UART: Running Caliptra FMC ...
5,190,391 UART:
5,190,534 UART: [state] CFI Enabled
5,201,070 UART: [fht] FMC Alias Private Key: 7
5,309,472 UART: [art] Extend RT PCRs Done
5,309,900 UART: [art] Lock RT PCRs Done
5,311,324 UART: [art] Populate DV Done
5,319,270 UART: [fht] FMC Alias Private Key: 7
5,320,320 UART: [art] Derive CDI
5,320,600 UART: [art] Store in in slot 0x4
5,406,015 UART: [art] Derive Key Pair
5,406,375 UART: [art] Store priv key in slot 0x5
5,419,821 UART: [art] Derive Key Pair - Done
5,434,488 UART: [art] Signing Cert with AUTHO
5,434,968 UART: RITY.KEYID = 7
5,450,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,187 UART: [art] PUB.X = 5EF49EF84DC14C04A8261FF75D000521388DC053E0385C5096517C259788A409AC5198F823CE7EAF3B896A7B24295DF0
5,457,924 UART: [art] PUB.Y = B5D9337C6CDECF0EEBD086486CE45ECE9CD02B98015B98DE19C5374EBC51C2BEC143B038FB25AAFC50FE09F10F58A1DF
5,464,890 UART: [art] SIG.R = 14C2E1E1A186C6DB113358328916AFE9F3A9E07105F9F5EBA7533DF1FB81D7A5AB9227099333A648118A62D96E973968
5,471,652 UART: [art] SIG.S = A889422D7CD83A3DA2C7C36F866C05CE1F17CD3EC72980B093E047E75DF5AC02C7AFAEE67C4C89B61842D28382D259B7
5,495,303 UART: Caliptra RT
5,495,648 UART: [state] CFI Enabled
5,604,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,924,242 >>> mbox cmd response: failed
6,924,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,930,135 UART:
6,930,151 UART: Running Caliptra FMC ...
6,930,559 UART:
6,930,702 UART: [state] CFI Enabled
7,019,857 UART: [art] Extend RT PCRs Done
7,020,285 UART: [art] Lock RT PCRs Done
7,021,452 UART: [art] Populate DV Done
7,029,664 UART: [fht] FMC Alias Private Key: 7
7,030,648 UART: [art] Derive CDI
7,030,928 UART: [art] Store in in slot 0x4
7,116,487 UART: [art] Derive Key Pair
7,116,847 UART: [art] Store priv key in slot 0x5
7,130,141 UART: [art] Derive Key Pair - Done
7,144,608 UART: [art] Signing Cert with AUTHO
7,145,088 UART: RITY.KEYID = 7
7,160,142 UART: [art] Erasing AUTHORITY.KEYID = 7
7,160,907 UART: [art] PUB.X = 5EF49EF84DC14C04A8261FF75D000521388DC053E0385C5096517C259788A409AC5198F823CE7EAF3B896A7B24295DF0
7,167,644 UART: [art] PUB.Y = B5D9337C6CDECF0EEBD086486CE45ECE9CD02B98015B98DE19C5374EBC51C2BEC143B038FB25AAFC50FE09F10F58A1DF
7,174,610 UART: [art] SIG.R = 14C2E1E1A186C6DB113358328916AFE9F3A9E07105F9F5EBA7533DF1FB81D7A5AB9227099333A648118A62D96E973968
7,181,372 UART: [art] SIG.S = A889422D7CD83A3DA2C7C36F866C05CE1F17CD3EC72980B093E047E75DF5AC02C7AFAEE67C4C89B61842D28382D259B7
7,205,171 UART: Caliptra RT
7,205,516 UART: [state] CFI Enabled
7,486,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,448,492 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,670 UART: [state] LifecycleState = Unprovisioned
86,325 UART: [state] DebugLocked = No
86,939 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
893,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,821 UART: [kat] ++
897,973 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,826 UART: [kat] SHA2-512-ACC
908,727 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
923,110 UART: [kat] LMS
1,171,438 UART: [kat] --
1,172,541 UART: [cold-reset] ++
1,172,903 UART: [fht] FHT @ 0x50003400
1,175,514 UART: [idev] ++
1,175,682 UART: [idev] CDI.KEYID = 6
1,176,042 UART: [idev] SUBJECT.KEYID = 7
1,176,466 UART: [idev] UDS.KEYID = 0
1,176,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,413 UART: [idev] --
1,210,501 UART: [ldev] ++
1,210,669 UART: [ldev] CDI.KEYID = 6
1,211,032 UART: [ldev] SUBJECT.KEYID = 5
1,211,458 UART: [ldev] AUTHORITY.KEYID = 7
1,211,921 UART: [ldev] FE.KEYID = 1
1,216,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,721 UART: [ldev] --
1,283,158 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,500 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,756 >>> mbox cmd response: success
3,316,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,317,966 UART: [afmc] ++
3,318,134 UART: [afmc] CDI.KEYID = 6
3,318,496 UART: [afmc] SUBJECT.KEYID = 7
3,318,921 UART: [afmc] AUTHORITY.KEYID = 5
3,354,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,890 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,599 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,491 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,202 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,951 UART: [afmc] --
3,397,831 UART: [cold-reset] --
3,398,945 UART: [state] Locking Datavault
3,400,078 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,682 UART: [state] Locking ICCM
3,401,296 UART: [exit] Launching FMC @ 0x40000130
3,406,625 UART:
3,406,641 UART: Running Caliptra FMC ...
3,407,049 UART:
3,407,103 UART: [state] CFI Enabled
3,417,603 UART: [fht] FMC Alias Private Key: 7
3,525,039 UART: [art] Extend RT PCRs Done
3,525,467 UART: [art] Lock RT PCRs Done
3,527,173 UART: [art] Populate DV Done
3,535,387 UART: [fht] FMC Alias Private Key: 7
3,536,489 UART: [art] Derive CDI
3,536,769 UART: [art] Store in in slot 0x4
3,622,180 UART: [art] Derive Key Pair
3,622,540 UART: [art] Store priv key in slot 0x5
3,636,232 UART: [art] Derive Key Pair - Done
3,650,828 UART: [art] Signing Cert with AUTHO
3,651,308 UART: RITY.KEYID = 7
3,666,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,135 UART: [art] PUB.X = 682E45C7A9723E95F786493F533E920FA4B9687533380BD936EAC310F8135DEC60F1228768D88EE8C6ABABD30469DBF3
3,673,898 UART: [art] PUB.Y = 4451CFC75E07C8F65EDFAADDF4EF094C3DB9D308CCD4BB243E58CC9103BC4C8F632CA3D71A77260AA4D7F943255F895E
3,680,855 UART: [art] SIG.R = B851C84245EC7BD893A865ED56C9E869880936B5820DF9ED39744DAA72220650E1ACD8DE8355E5C2491538B71EF5180A
3,687,613 UART: [art] SIG.S = 5EE98F883D9399D979FC0A38D2B7DCD0F0F8481F523CBC85E2A4E9F32181CA6FBAC60644168EAB5091F854CAAADD3D81
3,711,946 UART: Caliptra RT
3,712,199 UART: [state] CFI Enabled
3,819,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,653 UART:
3,821,669 UART: Running Caliptra ROM ...
3,822,077 UART:
3,822,132 UART: [state] CFI Enabled
3,824,600 UART: [state] LifecycleState = Unprovisioned
3,825,255 UART: [state] DebugLocked = No
3,825,967 UART: [state] WD Timer not started. Device not locked for debugging
3,827,135 UART: [kat] SHA2-256
4,632,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,636,910 UART: [kat] ++
4,637,062 UART: [kat] sha1
4,641,436 UART: [kat] SHA2-256
4,643,376 UART: [kat] SHA2-384
4,646,113 UART: [kat] SHA2-512-ACC
4,648,013 UART: [kat] ECC-384
4,657,880 UART: [kat] HMAC-384Kdf
4,662,360 UART: [kat] LMS
4,910,688 UART: [kat] --
4,911,524 UART: [update-reset] ++
4,929,533 >>> mbox cmd response: failed
4,929,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,930,103 UART: ROM Non-Fatal Error: 0x000B003D
4,930,923 UART: [state] Locking Datavault
4,931,577 UART: [state] Locking PCR0, PCR1 and PCR31
4,932,181 UART: [state] Locking ICCM
4,932,643 UART: [exit] Launching FMC @ 0x40000130
4,937,972 UART:
4,937,988 UART: Running Caliptra FMC ...
4,938,396 UART:
4,938,450 UART: [state] CFI Enabled
5,027,271 UART: [art] Extend RT PCRs Done
5,027,699 UART: [art] Lock RT PCRs Done
5,028,708 UART: [art] Populate DV Done
5,037,100 UART: [fht] FMC Alias Private Key: 7
5,038,074 UART: [art] Derive CDI
5,038,354 UART: [art] Store in in slot 0x4
5,124,035 UART: [art] Derive Key Pair
5,124,395 UART: [art] Store priv key in slot 0x5
5,137,845 UART: [art] Derive Key Pair - Done
5,152,681 UART: [art] Signing Cert with AUTHO
5,153,161 UART: RITY.KEYID = 7
5,167,867 UART: [art] Erasing AUTHORITY.KEYID = 7
5,168,632 UART: [art] PUB.X = 682E45C7A9723E95F786493F533E920FA4B9687533380BD936EAC310F8135DEC60F1228768D88EE8C6ABABD30469DBF3
5,175,395 UART: [art] PUB.Y = 4451CFC75E07C8F65EDFAADDF4EF094C3DB9D308CCD4BB243E58CC9103BC4C8F632CA3D71A77260AA4D7F943255F895E
5,182,352 UART: [art] SIG.R = B851C84245EC7BD893A865ED56C9E869880936B5820DF9ED39744DAA72220650E1ACD8DE8355E5C2491538B71EF5180A
5,189,110 UART: [art] SIG.S = 5EE98F883D9399D979FC0A38D2B7DCD0F0F8481F523CBC85E2A4E9F32181CA6FBAC60644168EAB5091F854CAAADD3D81
5,212,773 UART: Caliptra RT
5,213,026 UART: [state] CFI Enabled
5,496,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,469 UART:
5,498,485 UART: Running Caliptra ROM ...
5,498,893 UART:
5,498,948 UART: [state] CFI Enabled
5,501,660 UART: [state] LifecycleState = Unprovisioned
5,502,315 UART: [state] DebugLocked = No
5,502,983 UART: [state] WD Timer not started. Device not locked for debugging
5,504,321 UART: [kat] SHA2-256
6,309,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,314,096 UART: [kat] ++
6,314,248 UART: [kat] sha1
6,318,602 UART: [kat] SHA2-256
6,320,542 UART: [kat] SHA2-384
6,323,143 UART: [kat] SHA2-512-ACC
6,325,043 UART: [kat] ECC-384
6,334,396 UART: [kat] HMAC-384Kdf
6,338,946 UART: [kat] LMS
6,587,274 UART: [kat] --
6,588,314 UART: [update-reset] ++
8,440,649 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,441,608 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,591,606 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,249 >>> mbox cmd response: success
3,172,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,234,646 UART:
3,234,662 UART: Running Caliptra FMC ...
3,235,070 UART:
3,235,124 UART: [state] CFI Enabled
3,245,486 UART: [fht] FMC Alias Private Key: 7
3,353,578 UART: [art] Extend RT PCRs Done
3,354,006 UART: [art] Lock RT PCRs Done
3,355,504 UART: [art] Populate DV Done
3,363,494 UART: [fht] FMC Alias Private Key: 7
3,364,534 UART: [art] Derive CDI
3,364,814 UART: [art] Store in in slot 0x4
3,450,223 UART: [art] Derive Key Pair
3,450,583 UART: [art] Store priv key in slot 0x5
3,463,435 UART: [art] Derive Key Pair - Done
3,477,825 UART: [art] Signing Cert with AUTHO
3,478,305 UART: RITY.KEYID = 7
3,493,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,182 UART: [art] PUB.X = 6E7434ABD12E843F8048341CF63A46EAA14C0BF016B4F4C5706BAB4E74779C71220E7059E0DE2C5277A399FD686C4B28
3,500,950 UART: [art] PUB.Y = 2BB56D3D61501D9F2E45F01277446CCB84F669FA9C6CB4D049E825FF50A5208CF5670B29F3AB7816669569B4FD1ED69C
3,507,903 UART: [art] SIG.R = 7008F023FA7116083F73D11B5F21C9CE1F41DAFBF72C1DCB39D276658CEA48C9B8CBD793396BA819D2F2311605C9BFCA
3,514,678 UART: [art] SIG.S = DB877D6B5CDB2974394C1DED02394A18930ADFD7926FB9C1F9FEE6BFE1EA99C9FF7ED0F4A34F3511CAA2DF228E38DA97
3,538,331 UART: Caliptra RT
3,538,584 UART: [state] CFI Enabled
3,646,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,512 >>> mbox cmd response: failed
4,641,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,647,557 UART:
4,647,573 UART: Running Caliptra FMC ...
4,647,981 UART:
4,648,035 UART: [state] CFI Enabled
4,737,018 UART: [art] Extend RT PCRs Done
4,737,446 UART: [art] Lock RT PCRs Done
4,738,805 UART: [art] Populate DV Done
4,747,037 UART: [fht] FMC Alias Private Key: 7
4,748,213 UART: [art] Derive CDI
4,748,493 UART: [art] Store in in slot 0x4
4,833,800 UART: [art] Derive Key Pair
4,834,160 UART: [art] Store priv key in slot 0x5
4,847,442 UART: [art] Derive Key Pair - Done
4,862,638 UART: [art] Signing Cert with AUTHO
4,863,118 UART: RITY.KEYID = 7
4,878,344 UART: [art] Erasing AUTHORITY.KEYID = 7
4,879,109 UART: [art] PUB.X = 6E7434ABD12E843F8048341CF63A46EAA14C0BF016B4F4C5706BAB4E74779C71220E7059E0DE2C5277A399FD686C4B28
4,885,877 UART: [art] PUB.Y = 2BB56D3D61501D9F2E45F01277446CCB84F669FA9C6CB4D049E825FF50A5208CF5670B29F3AB7816669569B4FD1ED69C
4,892,830 UART: [art] SIG.R = 7008F023FA7116083F73D11B5F21C9CE1F41DAFBF72C1DCB39D276658CEA48C9B8CBD793396BA819D2F2311605C9BFCA
4,899,605 UART: [art] SIG.S = DB877D6B5CDB2974394C1DED02394A18930ADFD7926FB9C1F9FEE6BFE1EA99C9FF7ED0F4A34F3511CAA2DF228E38DA97
4,923,662 UART: Caliptra RT
4,923,915 UART: [state] CFI Enabled
5,207,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,192,258 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
893,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,466 UART: [kat] ++
897,618 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,210,004 UART: [idev] --
1,211,090 UART: [ldev] ++
1,211,258 UART: [ldev] CDI.KEYID = 6
1,211,621 UART: [ldev] SUBJECT.KEYID = 5
1,212,047 UART: [ldev] AUTHORITY.KEYID = 7
1,212,510 UART: [ldev] FE.KEYID = 1
1,217,720 UART: [ldev] Erasing FE.KEYID = 1
1,244,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,750 UART: [ldev] --
1,284,125 UART: [fwproc] Wait for Commands...
1,284,715 UART: [fwproc] Recv command 0x46574c44
1,285,443 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,367 >>> mbox cmd response: success
3,323,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,324,555 UART: [afmc] ++
3,324,723 UART: [afmc] CDI.KEYID = 6
3,325,085 UART: [afmc] SUBJECT.KEYID = 7
3,325,510 UART: [afmc] AUTHORITY.KEYID = 5
3,361,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,345 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,054 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,946 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,657 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,464 UART: [afmc] --
3,404,414 UART: [cold-reset] --
3,405,314 UART: [state] Locking Datavault
3,406,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,081 UART: [state] Locking ICCM
3,407,601 UART: [exit] Launching FMC @ 0x40000130
3,412,930 UART:
3,412,946 UART: Running Caliptra FMC ...
3,413,354 UART:
3,413,497 UART: [state] CFI Enabled
3,424,287 UART: [fht] FMC Alias Private Key: 7
3,532,117 UART: [art] Extend RT PCRs Done
3,532,545 UART: [art] Lock RT PCRs Done
3,533,997 UART: [art] Populate DV Done
3,542,079 UART: [fht] FMC Alias Private Key: 7
3,543,261 UART: [art] Derive CDI
3,543,541 UART: [art] Store in in slot 0x4
3,629,376 UART: [art] Derive Key Pair
3,629,736 UART: [art] Store priv key in slot 0x5
3,643,222 UART: [art] Derive Key Pair - Done
3,657,846 UART: [art] Signing Cert with AUTHO
3,658,326 UART: RITY.KEYID = 7
3,673,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,483 UART: [art] PUB.X = 794D44BC11DF833478C1C32F3EB1FFB26D0EB59563EEC7D6F56D8DD51774BAAB41F1B3098D2F180913CBF7A4B9B802DA
3,681,259 UART: [art] PUB.Y = 5DE2787F2AC8F0347E8ECFA7CF4DB54F2A2E720747A4D2B4955243053E6786B4B720744CE493A15CD1F732EFFE1C6F07
3,688,210 UART: [art] SIG.R = 9EE8950F79DFA5CC6FB894B0304EDC136F09A55149842F66F860053F3DB99BE207EF0A55F6FE5A1A878CDF50D04C8542
3,694,975 UART: [art] SIG.S = 38E6417450DEAE455508C9BFB6D9438ADECD5BD2B4E5F99261B84CBB29BAF407C7E8C01954DBF7469F65AB67476F5BF8
3,718,908 UART: Caliptra RT
3,719,253 UART: [state] CFI Enabled
3,827,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,909 UART:
3,828,925 UART: Running Caliptra ROM ...
3,829,333 UART:
3,829,475 UART: [state] CFI Enabled
3,832,309 UART: [state] LifecycleState = Unprovisioned
3,832,964 UART: [state] DebugLocked = No
3,833,460 UART: [state] WD Timer not started. Device not locked for debugging
3,834,774 UART: [kat] SHA2-256
4,640,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,644,549 UART: [kat] ++
4,644,701 UART: [kat] sha1
4,648,871 UART: [kat] SHA2-256
4,650,811 UART: [kat] SHA2-384
4,653,578 UART: [kat] SHA2-512-ACC
4,655,478 UART: [kat] ECC-384
4,665,281 UART: [kat] HMAC-384Kdf
4,669,683 UART: [kat] LMS
4,918,011 UART: [kat] --
4,918,943 UART: [update-reset] ++
4,936,014 >>> mbox cmd response: failed
4,936,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,936,468 UART: ROM Non-Fatal Error: 0x000B003D
4,937,332 UART: [state] Locking Datavault
4,937,960 UART: [state] Locking PCR0, PCR1 and PCR31
4,938,564 UART: [state] Locking ICCM
4,939,000 UART: [exit] Launching FMC @ 0x40000130
4,944,329 UART:
4,944,345 UART: Running Caliptra FMC ...
4,944,753 UART:
4,944,896 UART: [state] CFI Enabled
5,034,471 UART: [art] Extend RT PCRs Done
5,034,899 UART: [art] Lock RT PCRs Done
5,036,208 UART: [art] Populate DV Done
5,044,448 UART: [fht] FMC Alias Private Key: 7
5,045,416 UART: [art] Derive CDI
5,045,696 UART: [art] Store in in slot 0x4
5,131,259 UART: [art] Derive Key Pair
5,131,619 UART: [art] Store priv key in slot 0x5
5,144,579 UART: [art] Derive Key Pair - Done
5,159,129 UART: [art] Signing Cert with AUTHO
5,159,609 UART: RITY.KEYID = 7
5,174,665 UART: [art] Erasing AUTHORITY.KEYID = 7
5,175,430 UART: [art] PUB.X = 794D44BC11DF833478C1C32F3EB1FFB26D0EB59563EEC7D6F56D8DD51774BAAB41F1B3098D2F180913CBF7A4B9B802DA
5,182,206 UART: [art] PUB.Y = 5DE2787F2AC8F0347E8ECFA7CF4DB54F2A2E720747A4D2B4955243053E6786B4B720744CE493A15CD1F732EFFE1C6F07
5,189,157 UART: [art] SIG.R = 9EE8950F79DFA5CC6FB894B0304EDC136F09A55149842F66F860053F3DB99BE207EF0A55F6FE5A1A878CDF50D04C8542
5,195,922 UART: [art] SIG.S = 38E6417450DEAE455508C9BFB6D9438ADECD5BD2B4E5F99261B84CBB29BAF407C7E8C01954DBF7469F65AB67476F5BF8
5,219,403 UART: Caliptra RT
5,219,748 UART: [state] CFI Enabled
5,498,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,500,647 UART:
5,500,663 UART: Running Caliptra ROM ...
5,501,071 UART:
5,501,213 UART: [state] CFI Enabled
5,503,965 UART: [state] LifecycleState = Unprovisioned
5,504,620 UART: [state] DebugLocked = No
5,505,280 UART: [state] WD Timer not started. Device not locked for debugging
5,506,534 UART: [kat] SHA2-256
6,312,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,316,309 UART: [kat] ++
6,316,461 UART: [kat] sha1
6,320,689 UART: [kat] SHA2-256
6,322,629 UART: [kat] SHA2-384
6,325,384 UART: [kat] SHA2-512-ACC
6,327,284 UART: [kat] ECC-384
6,337,257 UART: [kat] HMAC-384Kdf
6,341,821 UART: [kat] LMS
6,590,149 UART: [kat] --
6,590,865 UART: [update-reset] ++
8,448,814 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,449,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,599,827 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,850 >>> mbox cmd response: success
3,167,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,230,159 UART:
3,230,175 UART: Running Caliptra FMC ...
3,230,583 UART:
3,230,726 UART: [state] CFI Enabled
3,241,376 UART: [fht] FMC Alias Private Key: 7
3,349,648 UART: [art] Extend RT PCRs Done
3,350,076 UART: [art] Lock RT PCRs Done
3,351,688 UART: [art] Populate DV Done
3,359,960 UART: [fht] FMC Alias Private Key: 7
3,360,990 UART: [art] Derive CDI
3,361,270 UART: [art] Store in in slot 0x4
3,447,243 UART: [art] Derive Key Pair
3,447,603 UART: [art] Store priv key in slot 0x5
3,460,543 UART: [art] Derive Key Pair - Done
3,475,253 UART: [art] Signing Cert with AUTHO
3,475,733 UART: RITY.KEYID = 7
3,491,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,770 UART: [art] PUB.X = F11DB16F205F1A218BC5D3644BECDC6FF8E95EE62691B4B4C9662550284CDF2235A4154388F8AF3049622168A7BEFB08
3,498,543 UART: [art] PUB.Y = 9A591AFDE3A3DA7C1EE93D6A2445F6C020B44920F1AFE7C54998470AD25D93EA310D55F00498B5374B5945CC3CE5C380
3,505,492 UART: [art] SIG.R = 3A4ACC1E353EBAA6AC8A364BE96DF8EA1AF38E4550354C617A95EC9BE4A74CF75FB639C88027587D75F5E774D7CA8986
3,512,278 UART: [art] SIG.S = 2E512D19790B0602DEEC7D1F0DEB0162F1746D337FB52D43A6FDF896A8328CB32EA822628E68CE5FD9220AE111FC9BA4
3,535,337 UART: Caliptra RT
3,535,682 UART: [state] CFI Enabled
3,644,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,098 >>> mbox cmd response: failed
4,641,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,646,807 UART:
4,646,823 UART: Running Caliptra FMC ...
4,647,231 UART:
4,647,374 UART: [state] CFI Enabled
4,736,141 UART: [art] Extend RT PCRs Done
4,736,569 UART: [art] Lock RT PCRs Done
4,737,896 UART: [art] Populate DV Done
4,746,146 UART: [fht] FMC Alias Private Key: 7
4,747,180 UART: [art] Derive CDI
4,747,460 UART: [art] Store in in slot 0x4
4,832,923 UART: [art] Derive Key Pair
4,833,283 UART: [art] Store priv key in slot 0x5
4,846,251 UART: [art] Derive Key Pair - Done
4,861,071 UART: [art] Signing Cert with AUTHO
4,861,551 UART: RITY.KEYID = 7
4,876,607 UART: [art] Erasing AUTHORITY.KEYID = 7
4,877,372 UART: [art] PUB.X = F11DB16F205F1A218BC5D3644BECDC6FF8E95EE62691B4B4C9662550284CDF2235A4154388F8AF3049622168A7BEFB08
4,884,145 UART: [art] PUB.Y = 9A591AFDE3A3DA7C1EE93D6A2445F6C020B44920F1AFE7C54998470AD25D93EA310D55F00498B5374B5945CC3CE5C380
4,891,094 UART: [art] SIG.R = 3A4ACC1E353EBAA6AC8A364BE96DF8EA1AF38E4550354C617A95EC9BE4A74CF75FB639C88027587D75F5E774D7CA8986
4,897,880 UART: [art] SIG.S = 2E512D19790B0602DEEC7D1F0DEB0162F1746D337FB52D43A6FDF896A8328CB32EA822628E68CE5FD9220AE111FC9BA4
4,921,837 UART: Caliptra RT
4,922,182 UART: [state] CFI Enabled
5,208,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,188,749 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,560 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,208,878 UART: [ldev] ++
1,209,046 UART: [ldev] CDI.KEYID = 6
1,209,410 UART: [ldev] SUBJECT.KEYID = 5
1,209,837 UART: [ldev] AUTHORITY.KEYID = 7
1,210,300 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,626 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,753 >>> mbox cmd response: success
3,318,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,320,014 UART: [afmc] ++
3,320,182 UART: [afmc] CDI.KEYID = 6
3,320,545 UART: [afmc] SUBJECT.KEYID = 7
3,320,971 UART: [afmc] AUTHORITY.KEYID = 5
3,356,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,502 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,212 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,102 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,813 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,665 UART: [afmc] --
3,399,661 UART: [cold-reset] --
3,400,605 UART: [state] Locking Datavault
3,401,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,410 UART: [state] Locking ICCM
3,402,846 UART: [exit] Launching FMC @ 0x40000130
3,408,175 UART:
3,408,191 UART: Running Caliptra FMC ...
3,408,599 UART:
3,408,653 UART: [state] CFI Enabled
3,419,423 UART: [fht] FMC Alias Private Key: 7
3,527,143 UART: [art] Extend RT PCRs Done
3,527,571 UART: [art] Lock RT PCRs Done
3,529,081 UART: [art] Populate DV Done
3,537,553 UART: [fht] FMC Alias Private Key: 7
3,538,649 UART: [art] Derive CDI
3,538,929 UART: [art] Store in in slot 0x4
3,624,352 UART: [art] Derive Key Pair
3,624,712 UART: [art] Store priv key in slot 0x5
3,637,614 UART: [art] Derive Key Pair - Done
3,652,474 UART: [art] Signing Cert with AUTHO
3,652,954 UART: RITY.KEYID = 7
3,668,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,033 UART: [art] PUB.X = B1D9A5554E11F565BD87D613052EDB4284DDDB3879C0F198FA1B0160ABB22F2280E21D59FFEA118EA2066594CFB07347
3,675,802 UART: [art] PUB.Y = B21CEB7A6BFCD84D7AA96D8E98A579B2F47178CE530A497C89919EF7BFCFD8BEF8CD6EBCFC04EC6C96F04F5A3DB18534
3,682,776 UART: [art] SIG.R = 17CA2729BF28477BBB4D78F53346D4A007D8C39AB6BCA0AF367190D4430E1ADE3F97D20B78D9235F58498E27D07EEFA7
3,689,547 UART: [art] SIG.S = B2C9285B2AD9855A8D8ED9D57D96E4563380454853B0C81F34BA95EC64F100573F77300AD5422B455523CF7B539E7441
3,713,501 UART: Caliptra RT
3,713,754 UART: [state] CFI Enabled
3,820,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,658 UART:
3,822,674 UART: Running Caliptra ROM ...
3,823,082 UART:
3,823,137 UART: [state] CFI Enabled
3,826,111 UART: [state] LifecycleState = Unprovisioned
3,826,766 UART: [state] DebugLocked = No
3,827,298 UART: [state] WD Timer not started. Device not locked for debugging
3,828,446 UART: [kat] SHA2-256
4,631,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,636,125 UART: [kat] ++
4,636,277 UART: [kat] sha1
4,640,301 UART: [kat] SHA2-256
4,642,241 UART: [kat] SHA2-384
4,645,142 UART: [kat] SHA2-512-ACC
4,647,042 UART: [kat] ECC-384
4,656,977 UART: [kat] HMAC-384Kdf
4,661,477 UART: [kat] LMS
4,909,789 UART: [kat] --
4,910,835 UART: [update-reset] ++
4,929,215 >>> mbox cmd response: failed
4,929,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,929,785 UART: ROM Non-Fatal Error: 0x000B003D
4,930,749 UART: [state] Locking Datavault
4,931,625 UART: [state] Locking PCR0, PCR1 and PCR31
4,932,229 UART: [state] Locking ICCM
4,932,795 UART: [exit] Launching FMC @ 0x40000130
4,938,124 UART:
4,938,140 UART: Running Caliptra FMC ...
4,938,548 UART:
4,938,602 UART: [state] CFI Enabled
5,027,665 UART: [art] Extend RT PCRs Done
5,028,093 UART: [art] Lock RT PCRs Done
5,029,356 UART: [art] Populate DV Done
5,037,768 UART: [fht] FMC Alias Private Key: 7
5,038,734 UART: [art] Derive CDI
5,039,014 UART: [art] Store in in slot 0x4
5,124,637 UART: [art] Derive Key Pair
5,124,997 UART: [art] Store priv key in slot 0x5
5,138,393 UART: [art] Derive Key Pair - Done
5,152,957 UART: [art] Signing Cert with AUTHO
5,153,437 UART: RITY.KEYID = 7
5,168,413 UART: [art] Erasing AUTHORITY.KEYID = 7
5,169,178 UART: [art] PUB.X = B1D9A5554E11F565BD87D613052EDB4284DDDB3879C0F198FA1B0160ABB22F2280E21D59FFEA118EA2066594CFB07347
5,175,947 UART: [art] PUB.Y = B21CEB7A6BFCD84D7AA96D8E98A579B2F47178CE530A497C89919EF7BFCFD8BEF8CD6EBCFC04EC6C96F04F5A3DB18534
5,182,921 UART: [art] SIG.R = 17CA2729BF28477BBB4D78F53346D4A007D8C39AB6BCA0AF367190D4430E1ADE3F97D20B78D9235F58498E27D07EEFA7
5,189,692 UART: [art] SIG.S = B2C9285B2AD9855A8D8ED9D57D96E4563380454853B0C81F34BA95EC64F100573F77300AD5422B455523CF7B539E7441
5,213,508 UART: Caliptra RT
5,213,761 UART: [state] CFI Enabled
5,493,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,494,796 UART:
5,494,812 UART: Running Caliptra ROM ...
5,495,220 UART:
5,495,275 UART: [state] CFI Enabled
5,497,857 UART: [state] LifecycleState = Unprovisioned
5,498,512 UART: [state] DebugLocked = No
5,499,222 UART: [state] WD Timer not started. Device not locked for debugging
5,500,408 UART: [kat] SHA2-256
6,303,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,308,087 UART: [kat] ++
6,308,239 UART: [kat] sha1
6,312,389 UART: [kat] SHA2-256
6,314,329 UART: [kat] SHA2-384
6,317,072 UART: [kat] SHA2-512-ACC
6,318,972 UART: [kat] ECC-384
6,329,151 UART: [kat] HMAC-384Kdf
6,333,767 UART: [kat] LMS
6,582,079 UART: [kat] --
6,583,051 UART: [update-reset] ++
8,441,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,442,760 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,592,758 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,961 >>> mbox cmd response: success
3,168,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,231,084 UART:
3,231,100 UART: Running Caliptra FMC ...
3,231,508 UART:
3,231,562 UART: [state] CFI Enabled
3,241,636 UART: [fht] FMC Alias Private Key: 7
3,349,310 UART: [art] Extend RT PCRs Done
3,349,738 UART: [art] Lock RT PCRs Done
3,351,174 UART: [art] Populate DV Done
3,359,224 UART: [fht] FMC Alias Private Key: 7
3,360,218 UART: [art] Derive CDI
3,360,498 UART: [art] Store in in slot 0x4
3,446,145 UART: [art] Derive Key Pair
3,446,505 UART: [art] Store priv key in slot 0x5
3,459,811 UART: [art] Derive Key Pair - Done
3,474,502 UART: [art] Signing Cert with AUTHO
3,474,982 UART: RITY.KEYID = 7
3,490,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,951 UART: [art] PUB.X = 0D7D2D31893857141B7B6B7CB61386C8CB2F13C118ED59AD72A85976A8B1F428D8C83ACD380730BDC9E9FBB200F389D1
3,497,701 UART: [art] PUB.Y = 44528F38462D1C85D8C928B586D37BCA37086AFCFCEC56EB811AC6610782B78E263587F671881D56FECBB6987DF6BB49
3,504,651 UART: [art] SIG.R = B3B65291A2026CC50745E8075C199E6EA00243764D07757478BC43D79DCE73E21A2FB51DAEA7C408C8F1BC877C27299B
3,511,405 UART: [art] SIG.S = 86EC4FA824E72C3CEA39FB8A0C93CBAA22D57D400459FE0AB031CEEAFCBB345BEA69C5966522EC8C32AAB82327B525D8
3,534,793 UART: Caliptra RT
3,535,046 UART: [state] CFI Enabled
3,643,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,633,790 >>> mbox cmd response: failed
4,633,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,639,185 UART:
4,639,201 UART: Running Caliptra FMC ...
4,639,609 UART:
4,639,663 UART: [state] CFI Enabled
4,728,684 UART: [art] Extend RT PCRs Done
4,729,112 UART: [art] Lock RT PCRs Done
4,730,367 UART: [art] Populate DV Done
4,738,467 UART: [fht] FMC Alias Private Key: 7
4,739,515 UART: [art] Derive CDI
4,739,795 UART: [art] Store in in slot 0x4
4,825,338 UART: [art] Derive Key Pair
4,825,698 UART: [art] Store priv key in slot 0x5
4,838,652 UART: [art] Derive Key Pair - Done
4,853,241 UART: [art] Signing Cert with AUTHO
4,853,721 UART: RITY.KEYID = 7
4,869,133 UART: [art] Erasing AUTHORITY.KEYID = 7
4,869,898 UART: [art] PUB.X = 0D7D2D31893857141B7B6B7CB61386C8CB2F13C118ED59AD72A85976A8B1F428D8C83ACD380730BDC9E9FBB200F389D1
4,876,648 UART: [art] PUB.Y = 44528F38462D1C85D8C928B586D37BCA37086AFCFCEC56EB811AC6610782B78E263587F671881D56FECBB6987DF6BB49
4,883,598 UART: [art] SIG.R = B3B65291A2026CC50745E8075C199E6EA00243764D07757478BC43D79DCE73E21A2FB51DAEA7C408C8F1BC877C27299B
4,890,352 UART: [art] SIG.S = 86EC4FA824E72C3CEA39FB8A0C93CBAA22D57D400459FE0AB031CEEAFCBB345BEA69C5966522EC8C32AAB82327B525D8
4,914,226 UART: Caliptra RT
4,914,479 UART: [state] CFI Enabled
5,194,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,174,294 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,780 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,886 UART: [idev] ++
1,174,054 UART: [idev] CDI.KEYID = 6
1,174,415 UART: [idev] SUBJECT.KEYID = 7
1,174,840 UART: [idev] UDS.KEYID = 0
1,175,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,462 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,946 >>> mbox cmd response: success
3,319,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,321,023 UART: [afmc] ++
3,321,191 UART: [afmc] CDI.KEYID = 6
3,321,554 UART: [afmc] SUBJECT.KEYID = 7
3,321,980 UART: [afmc] AUTHORITY.KEYID = 5
3,357,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,645 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,355 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,245 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,956 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,720 UART: [afmc] --
3,400,674 UART: [cold-reset] --
3,401,628 UART: [state] Locking Datavault
3,402,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,433 UART: [state] Locking ICCM
3,403,971 UART: [exit] Launching FMC @ 0x40000130
3,409,300 UART:
3,409,316 UART: Running Caliptra FMC ...
3,409,724 UART:
3,409,867 UART: [state] CFI Enabled
3,420,465 UART: [fht] FMC Alias Private Key: 7
3,528,083 UART: [art] Extend RT PCRs Done
3,528,511 UART: [art] Lock RT PCRs Done
3,529,943 UART: [art] Populate DV Done
3,538,207 UART: [fht] FMC Alias Private Key: 7
3,539,191 UART: [art] Derive CDI
3,539,471 UART: [art] Store in in slot 0x4
3,625,076 UART: [art] Derive Key Pair
3,625,436 UART: [art] Store priv key in slot 0x5
3,639,026 UART: [art] Derive Key Pair - Done
3,653,678 UART: [art] Signing Cert with AUTHO
3,654,158 UART: RITY.KEYID = 7
3,669,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,497 UART: [art] PUB.X = E93290123F97C24118DBE10D9EB51FF98A748625E69E284FAA261BDCB9917F2B40CB1AFC9458FE1E5A021B2BC80D2802
3,677,265 UART: [art] PUB.Y = C615859FAAA31D1E07DE66699DA1FC7538F4A572C8AFA833E1E57138437DB15ECF0B9E7F6A696A240C31DCD459D0A483
3,684,218 UART: [art] SIG.R = E44ADF880C34E54A339691DF2888A2D01B151E5957538EBB914E521F522BEB5145A73A8FB95661A4CD1447A5EA415DEB
3,690,991 UART: [art] SIG.S = EB01B0A020D5ABD3773B6DEAF1D3CF8B387183D6F777AE26B18FB5E26FCD7B3CA5585F8493BFA1451D0729C4AD4FA462
3,715,064 UART: Caliptra RT
3,715,409 UART: [state] CFI Enabled
3,823,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,146 UART:
3,825,162 UART: Running Caliptra ROM ...
3,825,570 UART:
3,825,712 UART: [state] CFI Enabled
3,828,300 UART: [state] LifecycleState = Unprovisioned
3,828,955 UART: [state] DebugLocked = No
3,829,471 UART: [state] WD Timer not started. Device not locked for debugging
3,830,709 UART: [kat] SHA2-256
4,634,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,638,388 UART: [kat] ++
4,638,540 UART: [kat] sha1
4,642,846 UART: [kat] SHA2-256
4,644,786 UART: [kat] SHA2-384
4,647,427 UART: [kat] SHA2-512-ACC
4,649,327 UART: [kat] ECC-384
4,659,238 UART: [kat] HMAC-384Kdf
4,663,874 UART: [kat] LMS
4,912,186 UART: [kat] --
4,913,232 UART: [update-reset] ++
4,931,188 >>> mbox cmd response: failed
4,931,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,931,420 UART: ROM Non-Fatal Error: 0x000B003D
4,932,212 UART: [state] Locking Datavault
4,932,978 UART: [state] Locking PCR0, PCR1 and PCR31
4,933,582 UART: [state] Locking ICCM
4,934,116 UART: [exit] Launching FMC @ 0x40000130
4,939,445 UART:
4,939,461 UART: Running Caliptra FMC ...
4,939,869 UART:
4,940,012 UART: [state] CFI Enabled
5,029,141 UART: [art] Extend RT PCRs Done
5,029,569 UART: [art] Lock RT PCRs Done
5,030,896 UART: [art] Populate DV Done
5,039,084 UART: [fht] FMC Alias Private Key: 7
5,040,082 UART: [art] Derive CDI
5,040,362 UART: [art] Store in in slot 0x4
5,125,761 UART: [art] Derive Key Pair
5,126,121 UART: [art] Store priv key in slot 0x5
5,139,913 UART: [art] Derive Key Pair - Done
5,154,827 UART: [art] Signing Cert with AUTHO
5,155,307 UART: RITY.KEYID = 7
5,170,619 UART: [art] Erasing AUTHORITY.KEYID = 7
5,171,384 UART: [art] PUB.X = E93290123F97C24118DBE10D9EB51FF98A748625E69E284FAA261BDCB9917F2B40CB1AFC9458FE1E5A021B2BC80D2802
5,178,152 UART: [art] PUB.Y = C615859FAAA31D1E07DE66699DA1FC7538F4A572C8AFA833E1E57138437DB15ECF0B9E7F6A696A240C31DCD459D0A483
5,185,105 UART: [art] SIG.R = E44ADF880C34E54A339691DF2888A2D01B151E5957538EBB914E521F522BEB5145A73A8FB95661A4CD1447A5EA415DEB
5,191,878 UART: [art] SIG.S = EB01B0A020D5ABD3773B6DEAF1D3CF8B387183D6F777AE26B18FB5E26FCD7B3CA5585F8493BFA1451D0729C4AD4FA462
5,215,187 UART: Caliptra RT
5,215,532 UART: [state] CFI Enabled
5,498,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,499,622 UART:
5,499,638 UART: Running Caliptra ROM ...
5,500,046 UART:
5,500,188 UART: [state] CFI Enabled
5,503,086 UART: [state] LifecycleState = Unprovisioned
5,503,741 UART: [state] DebugLocked = No
5,504,323 UART: [state] WD Timer not started. Device not locked for debugging
5,505,439 UART: [kat] SHA2-256
6,308,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,313,118 UART: [kat] ++
6,313,270 UART: [kat] sha1
6,317,564 UART: [kat] SHA2-256
6,319,504 UART: [kat] SHA2-384
6,322,257 UART: [kat] SHA2-512-ACC
6,324,157 UART: [kat] ECC-384
6,333,978 UART: [kat] HMAC-384Kdf
6,338,636 UART: [kat] LMS
6,586,948 UART: [kat] --
6,587,974 UART: [update-reset] ++
8,446,104 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,447,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,597,197 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,921 >>> mbox cmd response: success
3,161,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,223,820 UART:
3,223,836 UART: Running Caliptra FMC ...
3,224,244 UART:
3,224,387 UART: [state] CFI Enabled
3,234,951 UART: [fht] FMC Alias Private Key: 7
3,342,709 UART: [art] Extend RT PCRs Done
3,343,137 UART: [art] Lock RT PCRs Done
3,344,645 UART: [art] Populate DV Done
3,352,919 UART: [fht] FMC Alias Private Key: 7
3,353,885 UART: [art] Derive CDI
3,354,165 UART: [art] Store in in slot 0x4
3,439,646 UART: [art] Derive Key Pair
3,440,006 UART: [art] Store priv key in slot 0x5
3,453,578 UART: [art] Derive Key Pair - Done
3,468,036 UART: [art] Signing Cert with AUTHO
3,468,516 UART: RITY.KEYID = 7
3,483,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,551 UART: [art] PUB.X = FF9B846BEF3AB95BEDF3219B3E6589BFDC7D77BEAC5CCC14D7C5317BF11483320ECEF55FAE404A38B9D67C9EEC9D6546
3,491,346 UART: [art] PUB.Y = C0CA7E24327E7CB985A48CC5BCBB1C9C46A56ADEBF6EF947694C683ACDE687025FD15655217ADAB5D26AC3E0E1C68A67
3,498,315 UART: [art] SIG.R = EA6548DA72B660E4FDD0C07698ECB4215214973F065D9F28CFCB883D0424E4BAB345A395A655225185D5FFA9AFAAF2D2
3,505,091 UART: [art] SIG.S = EED51F0DD49DD0505FD805EE59A50567A5A52BFCADA3F5E227906A5E988DA06384F067FF95E637CA1760D6E9E6ECE72D
3,529,151 UART: Caliptra RT
3,529,496 UART: [state] CFI Enabled
3,636,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,627,887 >>> mbox cmd response: failed
4,627,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,633,534 UART:
4,633,550 UART: Running Caliptra FMC ...
4,633,958 UART:
4,634,101 UART: [state] CFI Enabled
4,723,168 UART: [art] Extend RT PCRs Done
4,723,596 UART: [art] Lock RT PCRs Done
4,724,707 UART: [art] Populate DV Done
4,732,727 UART: [fht] FMC Alias Private Key: 7
4,733,829 UART: [art] Derive CDI
4,734,109 UART: [art] Store in in slot 0x4
4,819,876 UART: [art] Derive Key Pair
4,820,236 UART: [art] Store priv key in slot 0x5
4,833,058 UART: [art] Derive Key Pair - Done
4,847,934 UART: [art] Signing Cert with AUTHO
4,848,414 UART: RITY.KEYID = 7
4,863,504 UART: [art] Erasing AUTHORITY.KEYID = 7
4,864,269 UART: [art] PUB.X = FF9B846BEF3AB95BEDF3219B3E6589BFDC7D77BEAC5CCC14D7C5317BF11483320ECEF55FAE404A38B9D67C9EEC9D6546
4,871,064 UART: [art] PUB.Y = C0CA7E24327E7CB985A48CC5BCBB1C9C46A56ADEBF6EF947694C683ACDE687025FD15655217ADAB5D26AC3E0E1C68A67
4,878,033 UART: [art] SIG.R = EA6548DA72B660E4FDD0C07698ECB4215214973F065D9F28CFCB883D0424E4BAB345A395A655225185D5FFA9AFAAF2D2
4,884,809 UART: [art] SIG.S = EED51F0DD49DD0505FD805EE59A50567A5A52BFCADA3F5E227906A5E988DA06384F067FF95E637CA1760D6E9E6ECE72D
4,909,053 UART: Caliptra RT
4,909,398 UART: [state] CFI Enabled
5,192,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,164,711 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,260 UART:
192,613 UART: Running Caliptra ROM ...
193,803 UART:
193,954 UART: [state] CFI Enabled
261,217 UART: [state] LifecycleState = Unprovisioned
263,192 UART: [state] DebugLocked = No
265,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,707 UART: [kat] SHA2-256
440,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,914 UART: [kat] ++
451,413 UART: [kat] sha1
462,560 UART: [kat] SHA2-256
465,236 UART: [kat] SHA2-384
471,916 UART: [kat] SHA2-512-ACC
474,311 UART: [kat] ECC-384
2,762,114 UART: [kat] HMAC-384Kdf
2,774,207 UART: [kat] LMS
3,964,520 UART: [kat] --
3,968,968 UART: [cold-reset] ++
3,971,397 UART: [fht] Storing FHT @ 0x50003400
3,983,633 UART: [idev] ++
3,984,196 UART: [idev] CDI.KEYID = 6
3,985,130 UART: [idev] SUBJECT.KEYID = 7
3,986,414 UART: [idev] UDS.KEYID = 0
3,988,936 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,666 UART: [idev] Erasing UDS.KEYID = 0
7,319,360 UART: [idev] Using Sha1 for KeyId Algorithm
7,339,836 UART: [idev] --
7,344,152 UART: [ldev] ++
7,344,729 UART: [ldev] CDI.KEYID = 6
7,345,638 UART: [ldev] SUBJECT.KEYID = 5
7,346,854 UART: [ldev] AUTHORITY.KEYID = 7
7,348,142 UART: [ldev] FE.KEYID = 1
7,395,978 UART: [ldev] Erasing FE.KEYID = 1
10,726,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,072 UART: [ldev] --
13,088,583 UART: [fwproc] Waiting for Commands...
13,090,626 UART: [fwproc] Received command 0x46574c44
13,092,813 UART: [fwproc] Received Image of size 114124 bytes
14,487,840 UART: ROM Fatal Error: 0x000B000D
14,491,281 >>> mbox cmd response: failed
14,491,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,129 >>> mbox cmd response: failed
14,492,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,713 >>> mbox cmd response: failed
Initializing fuses
2,061,288 writing to cptra_bootfsm_go
2,250,649 UART:
2,250,987 UART: Running Caliptra ROM ...
2,252,059 UART:
2,252,220 UART: [state] CFI Enabled
2,317,909 UART: [state] LifecycleState = Unprovisioned
2,319,844 UART: [state] DebugLocked = No
2,322,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,504 UART: [kat] SHA2-256
2,497,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,713 UART: [kat] ++
2,508,168 UART: [kat] sha1
2,520,564 UART: [kat] SHA2-256
2,523,266 UART: [kat] SHA2-384
2,529,200 UART: [kat] SHA2-512-ACC
2,531,604 UART: [kat] ECC-384
4,823,170 UART: [kat] HMAC-384Kdf
4,853,765 UART: [kat] LMS
6,044,025 UART: [kat] --
6,046,815 UART: [cold-reset] ++
6,049,187 UART: [fht] Storing FHT @ 0x50003400
6,062,236 UART: [idev] ++
6,062,801 UART: [idev] CDI.KEYID = 6
6,063,736 UART: [idev] SUBJECT.KEYID = 7
6,065,003 UART: [idev] UDS.KEYID = 0
6,068,061 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,211,599 UART: [idev] Erasing UDS.KEYID = 0
9,400,590 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,140 UART: [idev] --
9,426,677 UART: [ldev] ++
9,427,290 UART: [ldev] CDI.KEYID = 6
9,428,208 UART: [ldev] SUBJECT.KEYID = 5
9,429,459 UART: [ldev] AUTHORITY.KEYID = 7
9,430,696 UART: [ldev] FE.KEYID = 1
9,476,235 UART: [ldev] Erasing FE.KEYID = 1
12,809,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,118,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,133,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,166,730 UART: [ldev] --
15,171,458 UART: [fwproc] Waiting for Commands...
15,174,310 UART: [fwproc] Received command 0x46574c44
15,176,548 UART: [fwproc] Received Image of size 114124 bytes
19,229,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,306,291 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,375,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,692,546 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,804,253 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,259,840 >>> mbox cmd response: failed
14,260,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,260,755 >>> mbox cmd response: failed
14,261,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,261,319 >>> mbox cmd response: failed
Initializing fuses
2,055,390 writing to cptra_bootfsm_go
5,859,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,919,177 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,648 UART:
192,998 UART: Running Caliptra ROM ...
194,189 UART:
603,726 UART: [state] CFI Enabled
616,968 UART: [state] LifecycleState = Unprovisioned
618,907 UART: [state] DebugLocked = No
620,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,483 UART: [kat] SHA2-256
795,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,778 UART: [kat] ++
806,231 UART: [kat] sha1
817,542 UART: [kat] SHA2-256
820,290 UART: [kat] SHA2-384
826,216 UART: [kat] SHA2-512-ACC
828,610 UART: [kat] ECC-384
3,112,868 UART: [kat] HMAC-384Kdf
3,124,058 UART: [kat] LMS
4,314,170 UART: [kat] --
4,317,481 UART: [cold-reset] ++
4,318,728 UART: [fht] Storing FHT @ 0x50003400
4,329,832 UART: [idev] ++
4,330,400 UART: [idev] CDI.KEYID = 6
4,331,371 UART: [idev] SUBJECT.KEYID = 7
4,332,587 UART: [idev] UDS.KEYID = 0
4,335,082 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,688 UART: [idev] Erasing UDS.KEYID = 0
7,619,278 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,586 UART: [idev] --
7,646,235 UART: [ldev] ++
7,646,803 UART: [ldev] CDI.KEYID = 6
7,647,747 UART: [ldev] SUBJECT.KEYID = 5
7,649,033 UART: [ldev] AUTHORITY.KEYID = 7
7,650,272 UART: [ldev] FE.KEYID = 1
7,663,926 UART: [ldev] Erasing FE.KEYID = 1
10,954,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,277 UART: [ldev] --
13,315,547 UART: [fwproc] Waiting for Commands...
13,317,813 UART: [fwproc] Received command 0x46574c44
13,319,999 UART: [fwproc] Received Image of size 114124 bytes
14,712,820 UART: ROM Fatal Error: 0x000B000D
14,716,265 >>> mbox cmd response: failed
14,716,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,717,030 >>> mbox cmd response: failed
14,717,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,717,615 >>> mbox cmd response: failed
Initializing fuses
2,061,241 writing to cptra_bootfsm_go
2,250,622 UART:
2,250,971 UART: Running Caliptra ROM ...
2,252,108 UART:
5,734,210 UART: [state] CFI Enabled
5,750,312 UART: [state] LifecycleState = Unprovisioned
5,752,259 UART: [state] DebugLocked = No
5,753,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,758,086 UART: [kat] SHA2-256
5,927,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,938,413 UART: [kat] ++
5,938,970 UART: [kat] sha1
5,948,463 UART: [kat] SHA2-256
5,951,205 UART: [kat] SHA2-384
5,956,757 UART: [kat] SHA2-512-ACC
5,959,117 UART: [kat] ECC-384
8,242,166 UART: [kat] HMAC-384Kdf
8,254,181 UART: [kat] LMS
9,444,280 UART: [kat] --
9,448,348 UART: [cold-reset] ++
9,450,935 UART: [fht] Storing FHT @ 0x50003400
9,463,714 UART: [idev] ++
9,464,285 UART: [idev] CDI.KEYID = 6
9,465,252 UART: [idev] SUBJECT.KEYID = 7
9,466,470 UART: [idev] UDS.KEYID = 0
9,468,709 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,612,154 UART: [idev] Erasing UDS.KEYID = 0
12,758,178 UART: [idev] Using Sha1 for KeyId Algorithm
12,780,584 UART: [idev] --
12,785,231 UART: [ldev] ++
12,785,836 UART: [ldev] CDI.KEYID = 6
12,786,780 UART: [ldev] SUBJECT.KEYID = 5
12,788,022 UART: [ldev] AUTHORITY.KEYID = 7
12,789,262 UART: [ldev] FE.KEYID = 1
12,802,369 UART: [ldev] Erasing FE.KEYID = 1
16,086,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,380,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,394,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,409,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,424,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,443,193 UART: [ldev] --
18,448,290 UART: [fwproc] Waiting for Commands...
18,450,333 UART: [fwproc] Received command 0x46574c44
18,452,537 UART: [fwproc] Received Image of size 114124 bytes
22,506,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,580,838 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,649,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,967,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,127,388 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,450,246 >>> mbox cmd response: failed
14,450,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,152 >>> mbox cmd response: failed
14,451,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,710 >>> mbox cmd response: failed
Initializing fuses
2,055,993 writing to cptra_bootfsm_go
9,517,989 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,449,773 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,374 UART:
192,742 UART: Running Caliptra ROM ...
193,941 UART:
194,095 UART: [state] CFI Enabled
261,949 UART: [state] LifecycleState = Unprovisioned
263,820 UART: [state] DebugLocked = No
266,228 UART: [state] WD Timer not started. Device not locked for debugging
270,652 UART: [kat] SHA2-256
449,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,355 UART: [kat] ++
461,890 UART: [kat] sha1
472,287 UART: [kat] SHA2-256
475,292 UART: [kat] SHA2-384
481,332 UART: [kat] SHA2-512-ACC
484,264 UART: [kat] ECC-384
2,946,255 UART: [kat] HMAC-384Kdf
2,967,436 UART: [kat] LMS
3,496,937 UART: [kat] --
3,501,374 UART: [cold-reset] ++
3,503,422 UART: [fht] FHT @ 0x50003400
3,514,843 UART: [idev] ++
3,515,449 UART: [idev] CDI.KEYID = 6
3,516,374 UART: [idev] SUBJECT.KEYID = 7
3,517,538 UART: [idev] UDS.KEYID = 0
3,520,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,497 UART: [idev] Erasing UDS.KEYID = 0
6,022,588 UART: [idev] Sha1 KeyId Algorithm
6,046,087 UART: [idev] --
6,050,034 UART: [ldev] ++
6,050,613 UART: [ldev] CDI.KEYID = 6
6,051,530 UART: [ldev] SUBJECT.KEYID = 5
6,052,693 UART: [ldev] AUTHORITY.KEYID = 7
6,053,983 UART: [ldev] FE.KEYID = 1
6,096,685 UART: [ldev] Erasing FE.KEYID = 1
8,598,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,180 UART: [ldev] --
10,389,068 UART: [fwproc] Wait for Commands...
10,391,712 UART: [fwproc] Recv command 0x46574c44
10,393,854 UART: [fwproc] Recv'd Img size: 114448 bytes
11,455,715 UART: ROM Fatal Error: 0x000B000D
11,458,833 >>> mbox cmd response: failed
11,459,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,459,568 >>> mbox cmd response: failed
11,459,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,460,123 >>> mbox cmd response: failed
Initializing fuses
2,058,660 writing to cptra_bootfsm_go
2,247,970 UART:
2,248,316 UART: Running Caliptra ROM ...
2,249,451 UART:
2,249,619 UART: [state] CFI Enabled
2,322,340 UART: [state] LifecycleState = Unprovisioned
2,324,227 UART: [state] DebugLocked = No
2,325,621 UART: [state] WD Timer not started. Device not locked for debugging
2,329,478 UART: [kat] SHA2-256
2,508,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,520,160 UART: [kat] ++
2,520,703 UART: [kat] sha1
2,530,894 UART: [kat] SHA2-256
2,533,934 UART: [kat] SHA2-384
2,541,153 UART: [kat] SHA2-512-ACC
2,544,109 UART: [kat] ECC-384
5,007,414 UART: [kat] HMAC-384Kdf
5,030,070 UART: [kat] LMS
5,559,498 UART: [kat] --
5,564,193 UART: [cold-reset] ++
5,566,070 UART: [fht] FHT @ 0x50003400
5,576,517 UART: [idev] ++
5,577,124 UART: [idev] CDI.KEYID = 6
5,578,046 UART: [idev] SUBJECT.KEYID = 7
5,579,211 UART: [idev] UDS.KEYID = 0
5,581,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,725,201 UART: [idev] Erasing UDS.KEYID = 0
8,085,639 UART: [idev] Sha1 KeyId Algorithm
8,109,413 UART: [idev] --
8,112,779 UART: [ldev] ++
8,113,356 UART: [ldev] CDI.KEYID = 6
8,114,268 UART: [ldev] SUBJECT.KEYID = 5
8,115,428 UART: [ldev] AUTHORITY.KEYID = 7
8,116,658 UART: [ldev] FE.KEYID = 1
8,156,741 UART: [ldev] Erasing FE.KEYID = 1
10,659,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,858 UART: [ldev] --
12,472,076 UART: [fwproc] Wait for Commands...
12,474,664 UART: [fwproc] Recv command 0x46574c44
12,476,761 UART: [fwproc] Recv'd Img size: 114448 bytes
15,876,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,949,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,017,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,336,170 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,381,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,287,031 >>> mbox cmd response: failed
11,287,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,287,971 >>> mbox cmd response: failed
11,288,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,288,533 >>> mbox cmd response: failed
Initializing fuses
2,054,859 writing to cptra_bootfsm_go
5,423,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,075,907 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,045 writing to cptra_bootfsm_go
193,260 UART:
193,631 UART: Running Caliptra ROM ...
194,842 UART:
604,305 UART: [state] CFI Enabled
613,643 UART: [state] LifecycleState = Unprovisioned
615,547 UART: [state] DebugLocked = No
616,711 UART: [state] WD Timer not started. Device not locked for debugging
620,924 UART: [kat] SHA2-256
800,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,653 UART: [kat] ++
812,105 UART: [kat] sha1
823,088 UART: [kat] SHA2-256
826,104 UART: [kat] SHA2-384
832,190 UART: [kat] SHA2-512-ACC
835,123 UART: [kat] ECC-384
3,276,119 UART: [kat] HMAC-384Kdf
3,289,483 UART: [kat] LMS
3,818,995 UART: [kat] --
3,824,395 UART: [cold-reset] ++
3,825,732 UART: [fht] FHT @ 0x50003400
3,835,415 UART: [idev] ++
3,835,997 UART: [idev] CDI.KEYID = 6
3,836,912 UART: [idev] SUBJECT.KEYID = 7
3,838,128 UART: [idev] UDS.KEYID = 0
3,840,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,200 UART: [idev] Erasing UDS.KEYID = 0
6,309,064 UART: [idev] Sha1 KeyId Algorithm
6,332,259 UART: [idev] --
6,336,071 UART: [ldev] ++
6,336,658 UART: [ldev] CDI.KEYID = 6
6,337,547 UART: [ldev] SUBJECT.KEYID = 5
6,338,762 UART: [ldev] AUTHORITY.KEYID = 7
6,339,995 UART: [ldev] FE.KEYID = 1
6,350,225 UART: [ldev] Erasing FE.KEYID = 1
8,824,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,067 UART: [ldev] --
10,612,006 UART: [fwproc] Wait for Commands...
10,614,281 UART: [fwproc] Recv command 0x46574c44
10,616,379 UART: [fwproc] Recv'd Img size: 114448 bytes
11,682,885 UART: ROM Fatal Error: 0x000B000D
11,685,886 >>> mbox cmd response: failed
11,686,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,686,639 >>> mbox cmd response: failed
11,686,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,687,197 >>> mbox cmd response: failed
Initializing fuses
2,051,922 writing to cptra_bootfsm_go
2,241,269 UART:
2,241,613 UART: Running Caliptra ROM ...
2,242,759 UART:
8,767,968 UART: [state] CFI Enabled
8,780,975 UART: [state] LifecycleState = Unprovisioned
8,782,846 UART: [state] DebugLocked = No
8,784,398 UART: [state] WD Timer not started. Device not locked for debugging
8,788,418 UART: [kat] SHA2-256
8,967,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,979,076 UART: [kat] ++
8,979,634 UART: [kat] sha1
8,989,025 UART: [kat] SHA2-256
8,992,044 UART: [kat] SHA2-384
8,997,718 UART: [kat] SHA2-512-ACC
9,000,663 UART: [kat] ECC-384
11,445,394 UART: [kat] HMAC-384Kdf
11,457,632 UART: [kat] LMS
11,987,135 UART: [kat] --
11,991,453 UART: [cold-reset] ++
11,993,227 UART: [fht] FHT @ 0x50003400
12,004,262 UART: [idev] ++
12,004,867 UART: [idev] CDI.KEYID = 6
12,005,793 UART: [idev] SUBJECT.KEYID = 7
12,006,960 UART: [idev] UDS.KEYID = 0
12,009,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,152,991 UART: [idev] Erasing UDS.KEYID = 0
14,481,408 UART: [idev] Sha1 KeyId Algorithm
14,504,415 UART: [idev] --
14,507,920 UART: [ldev] ++
14,508,493 UART: [ldev] CDI.KEYID = 6
14,509,377 UART: [ldev] SUBJECT.KEYID = 5
14,510,589 UART: [ldev] AUTHORITY.KEYID = 7
14,511,841 UART: [ldev] FE.KEYID = 1
14,523,967 UART: [ldev] Erasing FE.KEYID = 1
17,002,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,720,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,736,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,752,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,767,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,787,266 UART: [ldev] --
18,792,535 UART: [fwproc] Wait for Commands...
18,794,742 UART: [fwproc] Recv command 0x46574c44
18,796,887 UART: [fwproc] Recv'd Img size: 114448 bytes
22,201,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,274,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,343,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,662,225 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,697,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,466,528 >>> mbox cmd response: failed
11,467,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,467,596 >>> mbox cmd response: failed
11,467,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,468,146 >>> mbox cmd response: failed
Initializing fuses
2,055,811 writing to cptra_bootfsm_go
12,082,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,662,966 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,058 UART:
192,417 UART: Running Caliptra ROM ...
193,539 UART:
193,683 UART: [state] CFI Enabled
264,374 UART: [state] LifecycleState = Unprovisioned
266,797 UART: [state] DebugLocked = No
268,963 UART: [state] WD Timer not started. Device not locked for debugging
273,929 UART: [kat] SHA2-256
463,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,536 UART: [kat] ++
474,983 UART: [kat] sha1
486,401 UART: [kat] SHA2-256
489,406 UART: [kat] SHA2-384
495,436 UART: [kat] SHA2-512-ACC
498,052 UART: [kat] ECC-384
2,943,975 UART: [kat] HMAC-384Kdf
2,967,613 UART: [kat] LMS
3,499,349 UART: [kat] --
3,503,876 UART: [cold-reset] ++
3,505,113 UART: [fht] FHT @ 0x50003400
3,517,291 UART: [idev] ++
3,517,973 UART: [idev] CDI.KEYID = 6
3,518,911 UART: [idev] SUBJECT.KEYID = 7
3,520,121 UART: [idev] UDS.KEYID = 0
3,522,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,999 UART: [idev] Erasing UDS.KEYID = 0
6,025,096 UART: [idev] Sha1 KeyId Algorithm
6,047,749 UART: [idev] --
6,052,609 UART: [ldev] ++
6,053,298 UART: [ldev] CDI.KEYID = 6
6,054,181 UART: [ldev] SUBJECT.KEYID = 5
6,055,399 UART: [ldev] AUTHORITY.KEYID = 7
6,056,635 UART: [ldev] FE.KEYID = 1
6,095,780 UART: [ldev] Erasing FE.KEYID = 1
8,598,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,880 UART: [ldev] --
10,409,307 UART: [fwproc] Wait for Commands...
10,412,209 UART: [fwproc] Recv command 0x46574c44
10,414,478 UART: [fwproc] Recv'd Img size: 114448 bytes
11,510,070 UART: ROM Fatal Error: 0x000B000D
11,513,722 >>> mbox cmd response: failed
11,514,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,514,389 >>> mbox cmd response: failed
11,514,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,514,990 >>> mbox cmd response: failed
Initializing fuses
2,055,961 writing to cptra_bootfsm_go
2,245,274 UART:
2,245,638 UART: Running Caliptra ROM ...
2,246,776 UART:
2,246,937 UART: [state] CFI Enabled
2,306,897 UART: [state] LifecycleState = Unprovisioned
2,309,271 UART: [state] DebugLocked = No
2,311,065 UART: [state] WD Timer not started. Device not locked for debugging
2,316,016 UART: [kat] SHA2-256
2,505,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,632 UART: [kat] ++
2,517,127 UART: [kat] sha1
2,527,267 UART: [kat] SHA2-256
2,530,294 UART: [kat] SHA2-384
2,535,120 UART: [kat] SHA2-512-ACC
2,537,743 UART: [kat] ECC-384
4,991,459 UART: [kat] HMAC-384Kdf
5,017,025 UART: [kat] LMS
5,548,755 UART: [kat] --
5,552,695 UART: [cold-reset] ++
5,554,738 UART: [fht] FHT @ 0x50003400
5,566,149 UART: [idev] ++
5,566,889 UART: [idev] CDI.KEYID = 6
5,567,798 UART: [idev] SUBJECT.KEYID = 7
5,569,012 UART: [idev] UDS.KEYID = 0
5,571,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,334 UART: [idev] Erasing UDS.KEYID = 0
8,076,944 UART: [idev] Sha1 KeyId Algorithm
8,100,453 UART: [idev] --
8,105,959 UART: [ldev] ++
8,106,700 UART: [ldev] CDI.KEYID = 6
8,107,624 UART: [ldev] SUBJECT.KEYID = 5
8,108,732 UART: [ldev] AUTHORITY.KEYID = 7
8,109,910 UART: [ldev] FE.KEYID = 1
8,145,188 UART: [ldev] Erasing FE.KEYID = 1
10,651,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,373 UART: [ldev] --
12,459,013 UART: [fwproc] Wait for Commands...
12,461,114 UART: [fwproc] Recv command 0x46574c44
12,463,425 UART: [fwproc] Recv'd Img size: 114448 bytes
15,914,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,649,350 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,418,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,285,241 >>> mbox cmd response: failed
11,285,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,286,146 >>> mbox cmd response: failed
11,286,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,286,711 >>> mbox cmd response: failed
Initializing fuses
2,061,087 writing to cptra_bootfsm_go
5,484,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,776,377 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
192,938 UART:
193,320 UART: Running Caliptra ROM ...
194,449 UART:
604,276 UART: [state] CFI Enabled
619,660 UART: [state] LifecycleState = Unprovisioned
622,050 UART: [state] DebugLocked = No
624,646 UART: [state] WD Timer not started. Device not locked for debugging
629,228 UART: [kat] SHA2-256
819,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,906 UART: [kat] ++
830,424 UART: [kat] sha1
842,672 UART: [kat] SHA2-256
845,681 UART: [kat] SHA2-384
851,614 UART: [kat] SHA2-512-ACC
854,182 UART: [kat] ECC-384
3,295,316 UART: [kat] HMAC-384Kdf
3,308,408 UART: [kat] LMS
3,840,250 UART: [kat] --
3,845,924 UART: [cold-reset] ++
3,847,156 UART: [fht] FHT @ 0x50003400
3,859,292 UART: [idev] ++
3,860,006 UART: [idev] CDI.KEYID = 6
3,860,926 UART: [idev] SUBJECT.KEYID = 7
3,862,141 UART: [idev] UDS.KEYID = 0
3,864,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,626 UART: [idev] Erasing UDS.KEYID = 0
6,336,698 UART: [idev] Sha1 KeyId Algorithm
6,358,913 UART: [idev] --
6,364,305 UART: [ldev] ++
6,365,042 UART: [ldev] CDI.KEYID = 6
6,365,951 UART: [ldev] SUBJECT.KEYID = 5
6,367,114 UART: [ldev] AUTHORITY.KEYID = 7
6,368,347 UART: [ldev] FE.KEYID = 1
6,377,593 UART: [ldev] Erasing FE.KEYID = 1
8,856,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,449 UART: [ldev] --
10,650,258 UART: [fwproc] Wait for Commands...
10,652,125 UART: [fwproc] Recv command 0x46574c44
10,654,391 UART: [fwproc] Recv'd Img size: 114448 bytes
11,751,035 UART: ROM Fatal Error: 0x000B000D
11,754,700 >>> mbox cmd response: failed
11,755,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,755,422 >>> mbox cmd response: failed
11,755,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,755,982 >>> mbox cmd response: failed
Initializing fuses
2,053,870 writing to cptra_bootfsm_go
2,243,147 UART:
2,243,491 UART: Running Caliptra ROM ...
2,244,628 UART:
8,703,186 UART: [state] CFI Enabled
8,718,081 UART: [state] LifecycleState = Unprovisioned
8,720,483 UART: [state] DebugLocked = No
8,722,209 UART: [state] WD Timer not started. Device not locked for debugging
8,727,151 UART: [kat] SHA2-256
8,917,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,927,784 UART: [kat] ++
8,928,384 UART: [kat] sha1
8,939,604 UART: [kat] SHA2-256
8,942,625 UART: [kat] SHA2-384
8,949,753 UART: [kat] SHA2-512-ACC
8,952,327 UART: [kat] ECC-384
11,391,591 UART: [kat] HMAC-384Kdf
11,405,543 UART: [kat] LMS
11,937,417 UART: [kat] --
11,941,966 UART: [cold-reset] ++
11,943,417 UART: [fht] FHT @ 0x50003400
11,955,102 UART: [idev] ++
11,955,790 UART: [idev] CDI.KEYID = 6
11,956,776 UART: [idev] SUBJECT.KEYID = 7
11,957,937 UART: [idev] UDS.KEYID = 0
11,960,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,104,482 UART: [idev] Erasing UDS.KEYID = 0
14,435,710 UART: [idev] Sha1 KeyId Algorithm
14,457,477 UART: [idev] --
14,462,931 UART: [ldev] ++
14,463,611 UART: [ldev] CDI.KEYID = 6
14,464,520 UART: [ldev] SUBJECT.KEYID = 5
14,465,730 UART: [ldev] AUTHORITY.KEYID = 7
14,466,906 UART: [ldev] FE.KEYID = 1
14,478,088 UART: [ldev] Erasing FE.KEYID = 1
16,953,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,671,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,686,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,701,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,717,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,737,411 UART: [ldev] --
18,743,418 UART: [fwproc] Wait for Commands...
18,746,441 UART: [fwproc] Recv command 0x46574c44
18,748,698 UART: [fwproc] Recv'd Img size: 114448 bytes
22,205,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,287,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,404,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,947,318 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,757,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,529,640 >>> mbox cmd response: failed
11,530,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,530,540 >>> mbox cmd response: failed
11,530,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,531,117 >>> mbox cmd response: failed
Initializing fuses
2,060,229 writing to cptra_bootfsm_go
12,072,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,271,626 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,482 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,589 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,505,380 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,922 UART: [idev] --
1,514,983 UART: [ldev] ++
1,515,151 UART: [ldev] CDI.KEYID = 6
1,515,514 UART: [ldev] SUBJECT.KEYID = 5
1,515,940 UART: [ldev] AUTHORITY.KEYID = 7
1,516,403 UART: [ldev] FE.KEYID = 1
1,521,839 UART: [ldev] Erasing FE.KEYID = 1
1,547,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,182 UART: [ldev] --
1,586,445 UART: [fwproc] Waiting for Commands...
1,587,188 UART: [fwproc] Received command 0x46574c44
1,587,979 UART: [fwproc] Received Image of size 114448 bytes
1,626,202 UART: ROM Fatal Error: 0x000B000D
1,627,361 >>> mbox cmd response: failed
1,627,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,367 >>> mbox cmd response: failed
1,627,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,675 UART: [kat] SHA2-256
881,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,721 UART: [kat] ++
885,873 UART: [kat] sha1
890,283 UART: [kat] SHA2-256
892,221 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
902,104 UART: [kat] HMAC-384Kdf
906,780 UART: [kat] LMS
1,474,976 UART: [kat] --
1,475,929 UART: [cold-reset] ++
1,476,483 UART: [fht] Storing FHT @ 0x50003400
1,479,244 UART: [idev] ++
1,479,412 UART: [idev] CDI.KEYID = 6
1,479,772 UART: [idev] SUBJECT.KEYID = 7
1,480,196 UART: [idev] UDS.KEYID = 0
1,480,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,018 UART: [idev] Erasing UDS.KEYID = 0
1,504,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,994 UART: [idev] --
1,514,025 UART: [ldev] ++
1,514,193 UART: [ldev] CDI.KEYID = 6
1,514,556 UART: [ldev] SUBJECT.KEYID = 5
1,514,982 UART: [ldev] AUTHORITY.KEYID = 7
1,515,445 UART: [ldev] FE.KEYID = 1
1,520,269 UART: [ldev] Erasing FE.KEYID = 1
1,545,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,896 UART: [ldev] --
1,584,391 UART: [fwproc] Waiting for Commands...
1,585,134 UART: [fwproc] Received command 0x46574c44
1,585,925 UART: [fwproc] Received Image of size 114448 bytes
2,883,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,131 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,076,402 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,562 >>> mbox cmd response: failed
1,479,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,568 >>> mbox cmd response: failed
1,479,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,508 UART: [kat] SHA2-256
882,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,554 UART: [kat] ++
886,706 UART: [kat] sha1
891,112 UART: [kat] SHA2-256
893,050 UART: [kat] SHA2-384
895,859 UART: [kat] SHA2-512-ACC
897,760 UART: [kat] ECC-384
903,359 UART: [kat] HMAC-384Kdf
907,955 UART: [kat] LMS
1,476,151 UART: [kat] --
1,476,958 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,257 UART: [idev] ++
1,480,425 UART: [idev] CDI.KEYID = 6
1,480,785 UART: [idev] SUBJECT.KEYID = 7
1,481,209 UART: [idev] UDS.KEYID = 0
1,481,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,827 UART: [idev] Erasing UDS.KEYID = 0
1,506,777 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,335 UART: [idev] --
1,516,346 UART: [ldev] ++
1,516,514 UART: [ldev] CDI.KEYID = 6
1,516,877 UART: [ldev] SUBJECT.KEYID = 5
1,517,303 UART: [ldev] AUTHORITY.KEYID = 7
1,517,766 UART: [ldev] FE.KEYID = 1
1,523,012 UART: [ldev] Erasing FE.KEYID = 1
1,548,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,669 UART: [ldev] --
1,588,138 UART: [fwproc] Waiting for Commands...
1,588,909 UART: [fwproc] Received command 0x46574c44
1,589,700 UART: [fwproc] Received Image of size 114448 bytes
1,627,865 UART: ROM Fatal Error: 0x000B000D
1,629,024 >>> mbox cmd response: failed
1,629,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,030 >>> mbox cmd response: failed
1,629,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,182 UART: [kat] SHA2-256
882,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,228 UART: [kat] ++
886,380 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
903,337 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,477,038 UART: [cold-reset] ++
1,477,472 UART: [fht] Storing FHT @ 0x50003400
1,480,255 UART: [idev] ++
1,480,423 UART: [idev] CDI.KEYID = 6
1,480,783 UART: [idev] SUBJECT.KEYID = 7
1,481,207 UART: [idev] UDS.KEYID = 0
1,481,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,185 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,522,232 UART: [ldev] Erasing FE.KEYID = 1
1,548,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,919 UART: [ldev] --
1,587,350 UART: [fwproc] Waiting for Commands...
1,588,003 UART: [fwproc] Received command 0x46574c44
1,588,794 UART: [fwproc] Received Image of size 114448 bytes
2,887,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,890 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,173 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,903 >>> mbox cmd response: failed
1,479,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,909 >>> mbox cmd response: failed
1,479,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,657 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,190 UART: [kat] SHA2-256
893,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,965 UART: [kat] ++
898,117 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,860 UART: [kat] HMAC-384Kdf
923,454 UART: [kat] LMS
1,171,782 UART: [kat] --
1,172,775 UART: [cold-reset] ++
1,173,343 UART: [fht] FHT @ 0x50003400
1,175,940 UART: [idev] ++
1,176,108 UART: [idev] CDI.KEYID = 6
1,176,468 UART: [idev] SUBJECT.KEYID = 7
1,176,892 UART: [idev] UDS.KEYID = 0
1,177,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,712 UART: [idev] Erasing UDS.KEYID = 0
1,201,461 UART: [idev] Sha1 KeyId Algorithm
1,209,947 UART: [idev] --
1,211,055 UART: [ldev] ++
1,211,223 UART: [ldev] CDI.KEYID = 6
1,211,586 UART: [ldev] SUBJECT.KEYID = 5
1,212,012 UART: [ldev] AUTHORITY.KEYID = 7
1,212,475 UART: [ldev] FE.KEYID = 1
1,217,825 UART: [ldev] Erasing FE.KEYID = 1
1,244,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,507 UART: [ldev] --
1,283,904 UART: [fwproc] Wait for Commands...
1,284,480 UART: [fwproc] Recv command 0x46574c44
1,285,208 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,823 UART: ROM Fatal Error: 0x000B000D
1,324,982 >>> mbox cmd response: failed
1,324,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,988 >>> mbox cmd response: failed
1,324,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
905,960 UART: [kat] SHA2-512-ACC
907,861 UART: [kat] ECC-384
917,328 UART: [kat] HMAC-384Kdf
921,808 UART: [kat] LMS
1,170,136 UART: [kat] --
1,171,073 UART: [cold-reset] ++
1,171,497 UART: [fht] FHT @ 0x50003400
1,174,098 UART: [idev] ++
1,174,266 UART: [idev] CDI.KEYID = 6
1,174,626 UART: [idev] SUBJECT.KEYID = 7
1,175,050 UART: [idev] UDS.KEYID = 0
1,175,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,285 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,865 >>> mbox cmd response: failed
1,176,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,871 >>> mbox cmd response: failed
1,176,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,812 UART: [kat] SHA2-256
903,752 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,218 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,853 UART: [idev] Erasing UDS.KEYID = 0
1,200,634 UART: [idev] Sha1 KeyId Algorithm
1,209,234 UART: [idev] --
1,210,292 UART: [ldev] ++
1,210,460 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,249 UART: [ldev] AUTHORITY.KEYID = 7
1,211,712 UART: [ldev] FE.KEYID = 1
1,216,762 UART: [ldev] Erasing FE.KEYID = 1
1,242,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,802 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,903 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,894 UART: ROM Fatal Error: 0x000B000D
1,323,053 >>> mbox cmd response: failed
1,323,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,059 >>> mbox cmd response: failed
1,323,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,405 UART: [kat] HMAC-384Kdf
923,151 UART: [kat] LMS
1,171,479 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,762 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,565 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,384 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,176 UART: [ldev] Erasing FE.KEYID = 1
1,244,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,052 UART: [ldev] --
1,283,367 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,773 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,988 >>> mbox cmd response: failed
1,179,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,994 >>> mbox cmd response: failed
1,179,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,077 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,305 UART: [kat] SHA2-256
901,245 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,349 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,173,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,206,993 UART: [idev] --
1,208,080 UART: [ldev] ++
1,208,248 UART: [ldev] CDI.KEYID = 6
1,208,612 UART: [ldev] SUBJECT.KEYID = 5
1,209,039 UART: [ldev] AUTHORITY.KEYID = 7
1,209,502 UART: [ldev] FE.KEYID = 1
1,214,774 UART: [ldev] Erasing FE.KEYID = 1
1,241,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,281,034 UART: [fwproc] Wait for Commands...
1,281,731 UART: [fwproc] Recv command 0x46574c44
1,282,464 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,309 UART: ROM Fatal Error: 0x000B000D
1,321,468 >>> mbox cmd response: failed
1,321,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,474 >>> mbox cmd response: failed
1,321,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,225 UART: [kat] SHA2-256
902,165 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,174,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,451 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,233 UART: [idev] --
1,209,256 UART: [ldev] ++
1,209,424 UART: [ldev] CDI.KEYID = 6
1,209,788 UART: [ldev] SUBJECT.KEYID = 5
1,210,215 UART: [ldev] AUTHORITY.KEYID = 7
1,210,678 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,440 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,341 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,163 >>> mbox cmd response: failed
1,173,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,169 >>> mbox cmd response: failed
1,173,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,208,801 UART: [ldev] ++
1,208,969 UART: [ldev] CDI.KEYID = 6
1,209,333 UART: [ldev] SUBJECT.KEYID = 5
1,209,760 UART: [ldev] AUTHORITY.KEYID = 7
1,210,223 UART: [ldev] FE.KEYID = 1
1,215,411 UART: [ldev] Erasing FE.KEYID = 1
1,241,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,869 UART: [ldev] --
1,280,291 UART: [fwproc] Wait for Commands...
1,281,106 UART: [fwproc] Recv command 0x46574c44
1,281,839 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,104 UART: ROM Fatal Error: 0x000B000D
1,321,263 >>> mbox cmd response: failed
1,321,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,269 >>> mbox cmd response: failed
1,321,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,349 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,271 UART: [ldev] --
1,281,677 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,204 >>> mbox cmd response: failed
1,173,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,210 >>> mbox cmd response: failed
1,173,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,704 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,122 UART:
192,643 UART: Running Caliptra ROM ...
193,764 UART:
193,911 UART: [state] CFI Enabled
264,517 UART: [state] LifecycleState = Unprovisioned
266,444 UART: [state] DebugLocked = No
267,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,230 UART: [kat] SHA2-256
442,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,409 UART: [kat] ++
453,884 UART: [kat] sha1
464,762 UART: [kat] SHA2-256
467,449 UART: [kat] SHA2-384
473,158 UART: [kat] SHA2-512-ACC
475,498 UART: [kat] ECC-384
2,766,068 UART: [kat] HMAC-384Kdf
2,798,027 UART: [kat] LMS
3,988,343 UART: [kat] --
3,993,263 UART: [cold-reset] ++
3,994,875 UART: [fht] Storing FHT @ 0x50003400
4,008,085 UART: [idev] ++
4,008,664 UART: [idev] CDI.KEYID = 6
4,009,607 UART: [idev] SUBJECT.KEYID = 7
4,010,879 UART: [idev] UDS.KEYID = 0
4,013,610 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,096 UART: [idev] Erasing UDS.KEYID = 0
7,343,892 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,849 UART: [idev] --
7,369,927 UART: [ldev] ++
7,370,496 UART: [ldev] CDI.KEYID = 6
7,371,517 UART: [ldev] SUBJECT.KEYID = 5
7,372,675 UART: [ldev] AUTHORITY.KEYID = 7
7,373,907 UART: [ldev] FE.KEYID = 1
7,421,120 UART: [ldev] Erasing FE.KEYID = 1
10,755,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,773 UART: [ldev] --
13,134,378 UART: [fwproc] Waiting for Commands...
13,136,532 UART: [fwproc] Received command 0x46574c44
13,138,721 UART: [fwproc] Received Image of size 114124 bytes
13,208,128 UART: ROM Fatal Error: 0x000B0008
13,211,656 >>> mbox cmd response: failed
13,212,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,212,386 >>> mbox cmd response: failed
13,212,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,212,943 >>> mbox cmd response: failed
Initializing fuses
2,057,031 writing to cptra_bootfsm_go
2,246,322 UART:
2,246,670 UART: Running Caliptra ROM ...
2,247,734 UART:
2,247,887 UART: [state] CFI Enabled
2,320,280 UART: [state] LifecycleState = Unprovisioned
2,322,230 UART: [state] DebugLocked = No
2,323,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,872 UART: [kat] SHA2-256
2,497,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,065 UART: [kat] ++
2,508,530 UART: [kat] sha1
2,519,689 UART: [kat] SHA2-256
2,522,386 UART: [kat] SHA2-384
2,528,536 UART: [kat] SHA2-512-ACC
2,530,940 UART: [kat] ECC-384
4,824,060 UART: [kat] HMAC-384Kdf
4,836,286 UART: [kat] LMS
6,026,596 UART: [kat] --
6,033,527 UART: [cold-reset] ++
6,034,543 UART: [fht] Storing FHT @ 0x50003400
6,045,875 UART: [idev] ++
6,046,445 UART: [idev] CDI.KEYID = 6
6,047,463 UART: [idev] SUBJECT.KEYID = 7
6,048,629 UART: [idev] UDS.KEYID = 0
6,051,269 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,195,331 UART: [idev] Erasing UDS.KEYID = 0
9,383,590 UART: [idev] Using Sha1 for KeyId Algorithm
9,406,054 UART: [idev] --
9,411,400 UART: [ldev] ++
9,412,029 UART: [ldev] CDI.KEYID = 6
9,412,913 UART: [ldev] SUBJECT.KEYID = 5
9,414,171 UART: [ldev] AUTHORITY.KEYID = 7
9,415,415 UART: [ldev] FE.KEYID = 1
9,458,003 UART: [ldev] Erasing FE.KEYID = 1
12,792,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,120,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,135,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,666 UART: [ldev] --
15,172,639 UART: [fwproc] Waiting for Commands...
15,175,764 UART: [fwproc] Received command 0x46574c44
15,177,952 UART: [fwproc] Received Image of size 114124 bytes
19,233,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,307,884 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,376,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,694,035 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,787,929 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,911,932 >>> mbox cmd response: failed
12,912,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,906 >>> mbox cmd response: failed
12,913,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,493 >>> mbox cmd response: failed
Initializing fuses
2,046,889 writing to cptra_bootfsm_go
5,848,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,917,726 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,420 UART:
192,791 UART: Running Caliptra ROM ...
193,916 UART:
603,593 UART: [state] CFI Enabled
616,186 UART: [state] LifecycleState = Unprovisioned
618,069 UART: [state] DebugLocked = No
619,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,874 UART: [kat] SHA2-256
794,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,163 UART: [kat] ++
805,613 UART: [kat] sha1
816,923 UART: [kat] SHA2-256
819,606 UART: [kat] SHA2-384
825,418 UART: [kat] SHA2-512-ACC
827,756 UART: [kat] ECC-384
3,112,172 UART: [kat] HMAC-384Kdf
3,124,471 UART: [kat] LMS
4,314,567 UART: [kat] --
4,318,212 UART: [cold-reset] ++
4,319,944 UART: [fht] Storing FHT @ 0x50003400
4,331,164 UART: [idev] ++
4,331,729 UART: [idev] CDI.KEYID = 6
4,332,698 UART: [idev] SUBJECT.KEYID = 7
4,333,916 UART: [idev] UDS.KEYID = 0
4,336,712 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,256 UART: [idev] Erasing UDS.KEYID = 0
7,623,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,393 UART: [idev] --
7,648,318 UART: [ldev] ++
7,648,900 UART: [ldev] CDI.KEYID = 6
7,649,844 UART: [ldev] SUBJECT.KEYID = 5
7,651,080 UART: [ldev] AUTHORITY.KEYID = 7
7,652,319 UART: [ldev] FE.KEYID = 1
7,666,343 UART: [ldev] Erasing FE.KEYID = 1
10,952,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,996 UART: [ldev] --
13,315,527 UART: [fwproc] Waiting for Commands...
13,317,197 UART: [fwproc] Received command 0x46574c44
13,319,386 UART: [fwproc] Received Image of size 114124 bytes
13,388,466 UART: ROM Fatal Error: 0x000B0008
13,392,009 >>> mbox cmd response: failed
13,392,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,767 >>> mbox cmd response: failed
13,393,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,393,356 >>> mbox cmd response: failed
Initializing fuses
2,058,520 writing to cptra_bootfsm_go
2,247,851 UART:
2,248,212 UART: Running Caliptra ROM ...
2,249,265 UART:
7,075,116 UART: [state] CFI Enabled
7,085,837 UART: [state] LifecycleState = Unprovisioned
7,087,756 UART: [state] DebugLocked = No
7,089,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,095,591 UART: [kat] SHA2-256
7,265,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,275,909 UART: [kat] ++
7,276,373 UART: [kat] sha1
7,287,259 UART: [kat] SHA2-256
7,289,945 UART: [kat] SHA2-384
7,296,268 UART: [kat] SHA2-512-ACC
7,298,622 UART: [kat] ECC-384
9,581,286 UART: [kat] HMAC-384Kdf
9,592,760 UART: [kat] LMS
10,782,850 UART: [kat] --
10,789,397 UART: [cold-reset] ++
10,791,330 UART: [fht] Storing FHT @ 0x50003400
10,803,569 UART: [idev] ++
10,804,129 UART: [idev] CDI.KEYID = 6
10,805,090 UART: [idev] SUBJECT.KEYID = 7
10,806,511 UART: [idev] UDS.KEYID = 0
10,809,143 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,952,467 UART: [idev] Erasing UDS.KEYID = 0
14,092,336 UART: [idev] Using Sha1 for KeyId Algorithm
14,115,056 UART: [idev] --
14,119,369 UART: [ldev] ++
14,119,944 UART: [ldev] CDI.KEYID = 6
14,120,904 UART: [ldev] SUBJECT.KEYID = 5
14,122,165 UART: [ldev] AUTHORITY.KEYID = 7
14,123,477 UART: [ldev] FE.KEYID = 1
14,133,278 UART: [ldev] Erasing FE.KEYID = 1
17,422,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,714,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,728,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,743,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,758,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,731 UART: [ldev] --
19,781,845 UART: [fwproc] Waiting for Commands...
19,784,783 UART: [fwproc] Received command 0x46574c44
19,786,976 UART: [fwproc] Received Image of size 114124 bytes
23,841,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,915,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,984,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,301,373 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
4,128,424 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,123,834 >>> mbox cmd response: failed
13,124,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,796 >>> mbox cmd response: failed
13,125,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,339 >>> mbox cmd response: failed
Initializing fuses
2,045,765 writing to cptra_bootfsm_go
10,871,888 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,823,119 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,341 UART:
192,704 UART: Running Caliptra ROM ...
193,890 UART:
194,046 UART: [state] CFI Enabled
261,920 UART: [state] LifecycleState = Unprovisioned
263,800 UART: [state] DebugLocked = No
266,535 UART: [state] WD Timer not started. Device not locked for debugging
269,544 UART: [kat] SHA2-256
448,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,230 UART: [kat] ++
460,773 UART: [kat] sha1
472,812 UART: [kat] SHA2-256
475,872 UART: [kat] SHA2-384
482,162 UART: [kat] SHA2-512-ACC
485,103 UART: [kat] ECC-384
2,945,511 UART: [kat] HMAC-384Kdf
2,971,879 UART: [kat] LMS
3,501,310 UART: [kat] --
3,507,033 UART: [cold-reset] ++
3,508,532 UART: [fht] FHT @ 0x50003400
3,518,054 UART: [idev] ++
3,518,670 UART: [idev] CDI.KEYID = 6
3,519,738 UART: [idev] SUBJECT.KEYID = 7
3,520,846 UART: [idev] UDS.KEYID = 0
3,523,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,511 UART: [idev] Erasing UDS.KEYID = 0
6,028,085 UART: [idev] Sha1 KeyId Algorithm
6,051,549 UART: [idev] --
6,057,219 UART: [ldev] ++
6,057,791 UART: [ldev] CDI.KEYID = 6
6,058,702 UART: [ldev] SUBJECT.KEYID = 5
6,059,920 UART: [ldev] AUTHORITY.KEYID = 7
6,061,157 UART: [ldev] FE.KEYID = 1
6,099,896 UART: [ldev] Erasing FE.KEYID = 1
8,603,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,532 UART: [ldev] --
10,414,266 UART: [fwproc] Wait for Commands...
10,415,984 UART: [fwproc] Recv command 0x46574c44
10,418,032 UART: [fwproc] Recv'd Img size: 114448 bytes
10,487,864 UART: ROM Fatal Error: 0x000B0008
10,491,014 >>> mbox cmd response: failed
10,491,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,767 >>> mbox cmd response: failed
10,492,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,434 >>> mbox cmd response: failed
Initializing fuses
2,049,225 writing to cptra_bootfsm_go
2,238,507 UART:
2,238,864 UART: Running Caliptra ROM ...
2,239,912 UART:
2,240,065 UART: [state] CFI Enabled
2,299,505 UART: [state] LifecycleState = Unprovisioned
2,301,371 UART: [state] DebugLocked = No
2,304,210 UART: [state] WD Timer not started. Device not locked for debugging
2,307,614 UART: [kat] SHA2-256
2,486,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,346 UART: [kat] ++
2,498,806 UART: [kat] sha1
2,510,394 UART: [kat] SHA2-256
2,513,415 UART: [kat] SHA2-384
2,519,188 UART: [kat] SHA2-512-ACC
2,522,130 UART: [kat] ECC-384
4,982,536 UART: [kat] HMAC-384Kdf
5,004,967 UART: [kat] LMS
5,534,385 UART: [kat] --
5,540,637 UART: [cold-reset] ++
5,542,892 UART: [fht] FHT @ 0x50003400
5,555,010 UART: [idev] ++
5,555,596 UART: [idev] CDI.KEYID = 6
5,556,523 UART: [idev] SUBJECT.KEYID = 7
5,557,684 UART: [idev] UDS.KEYID = 0
5,560,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,704,206 UART: [idev] Erasing UDS.KEYID = 0
8,058,789 UART: [idev] Sha1 KeyId Algorithm
8,081,790 UART: [idev] --
8,087,114 UART: [ldev] ++
8,087,695 UART: [ldev] CDI.KEYID = 6
8,088,583 UART: [ldev] SUBJECT.KEYID = 5
8,089,802 UART: [ldev] AUTHORITY.KEYID = 7
8,090,991 UART: [ldev] FE.KEYID = 1
8,133,531 UART: [ldev] Erasing FE.KEYID = 1
10,636,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,553 UART: [ldev] --
12,446,903 UART: [fwproc] Wait for Commands...
12,448,571 UART: [fwproc] Recv command 0x46574c44
12,450,619 UART: [fwproc] Recv'd Img size: 114448 bytes
15,843,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,918,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,987,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,306,357 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,366,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,252,857 >>> mbox cmd response: failed
10,253,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,253,759 >>> mbox cmd response: failed
10,254,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,254,329 >>> mbox cmd response: failed
Initializing fuses
2,046,271 writing to cptra_bootfsm_go
5,422,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,109,761 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
192,626 UART:
192,984 UART: Running Caliptra ROM ...
194,068 UART:
603,949 UART: [state] CFI Enabled
618,794 UART: [state] LifecycleState = Unprovisioned
620,622 UART: [state] DebugLocked = No
622,321 UART: [state] WD Timer not started. Device not locked for debugging
626,078 UART: [kat] SHA2-256
805,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,819 UART: [kat] ++
817,365 UART: [kat] sha1
828,466 UART: [kat] SHA2-256
831,525 UART: [kat] SHA2-384
837,507 UART: [kat] SHA2-512-ACC
840,436 UART: [kat] ECC-384
3,284,153 UART: [kat] HMAC-384Kdf
3,296,014 UART: [kat] LMS
3,825,512 UART: [kat] --
3,830,913 UART: [cold-reset] ++
3,832,907 UART: [fht] FHT @ 0x50003400
3,844,158 UART: [idev] ++
3,844,720 UART: [idev] CDI.KEYID = 6
3,845,655 UART: [idev] SUBJECT.KEYID = 7
3,846,870 UART: [idev] UDS.KEYID = 0
3,849,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,573 UART: [idev] Erasing UDS.KEYID = 0
6,319,373 UART: [idev] Sha1 KeyId Algorithm
6,342,107 UART: [idev] --
6,346,097 UART: [ldev] ++
6,346,672 UART: [ldev] CDI.KEYID = 6
6,347,582 UART: [ldev] SUBJECT.KEYID = 5
6,348,748 UART: [ldev] AUTHORITY.KEYID = 7
6,349,978 UART: [ldev] FE.KEYID = 1
6,360,520 UART: [ldev] Erasing FE.KEYID = 1
8,835,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,822 UART: [ldev] --
10,628,625 UART: [fwproc] Wait for Commands...
10,630,915 UART: [fwproc] Recv command 0x46574c44
10,633,041 UART: [fwproc] Recv'd Img size: 114448 bytes
10,702,760 UART: ROM Fatal Error: 0x000B0008
10,705,865 >>> mbox cmd response: failed
10,706,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,706,636 >>> mbox cmd response: failed
10,706,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,191 >>> mbox cmd response: failed
Initializing fuses
2,057,024 writing to cptra_bootfsm_go
2,246,336 UART:
2,246,673 UART: Running Caliptra ROM ...
2,247,816 UART:
9,752,856 UART: [state] CFI Enabled
9,766,722 UART: [state] LifecycleState = Unprovisioned
9,768,612 UART: [state] DebugLocked = No
9,770,599 UART: [state] WD Timer not started. Device not locked for debugging
9,774,345 UART: [kat] SHA2-256
9,953,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,965,073 UART: [kat] ++
9,965,613 UART: [kat] sha1
9,976,888 UART: [kat] SHA2-256
9,979,905 UART: [kat] SHA2-384
9,987,130 UART: [kat] SHA2-512-ACC
9,990,079 UART: [kat] ECC-384
12,427,448 UART: [kat] HMAC-384Kdf
12,440,326 UART: [kat] LMS
12,969,780 UART: [kat] --
12,974,249 UART: [cold-reset] ++
12,976,660 UART: [fht] FHT @ 0x50003400
12,987,819 UART: [idev] ++
12,988,393 UART: [idev] CDI.KEYID = 6
12,989,304 UART: [idev] SUBJECT.KEYID = 7
12,990,516 UART: [idev] UDS.KEYID = 0
12,993,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,137,090 UART: [idev] Erasing UDS.KEYID = 0
15,463,165 UART: [idev] Sha1 KeyId Algorithm
15,486,292 UART: [idev] --
15,489,097 UART: [ldev] ++
15,489,664 UART: [ldev] CDI.KEYID = 6
15,490,542 UART: [ldev] SUBJECT.KEYID = 5
15,491,671 UART: [ldev] AUTHORITY.KEYID = 7
15,493,003 UART: [ldev] FE.KEYID = 1
15,502,703 UART: [ldev] Erasing FE.KEYID = 1
17,977,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,693,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,709,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,725,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,741,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,762,833 UART: [ldev] --
19,768,298 UART: [fwproc] Wait for Commands...
19,770,618 UART: [fwproc] Recv command 0x46574c44
19,772,714 UART: [fwproc] Recv'd Img size: 114448 bytes
23,181,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,253,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,322,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,640,602 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,698,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,978 >>> mbox cmd response: failed
10,477,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,891 >>> mbox cmd response: failed
10,478,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,478,450 >>> mbox cmd response: failed
Initializing fuses
2,047,947 writing to cptra_bootfsm_go
13,075,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,652,217 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,268 UART:
192,624 UART: Running Caliptra ROM ...
193,816 UART:
193,966 UART: [state] CFI Enabled
263,472 UART: [state] LifecycleState = Unprovisioned
265,883 UART: [state] DebugLocked = No
268,240 UART: [state] WD Timer not started. Device not locked for debugging
273,406 UART: [kat] SHA2-256
463,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,091 UART: [kat] ++
474,548 UART: [kat] sha1
485,754 UART: [kat] SHA2-256
488,780 UART: [kat] SHA2-384
493,844 UART: [kat] SHA2-512-ACC
496,459 UART: [kat] ECC-384
2,946,400 UART: [kat] HMAC-384Kdf
2,969,811 UART: [kat] LMS
3,501,570 UART: [kat] --
3,507,080 UART: [cold-reset] ++
3,508,585 UART: [fht] FHT @ 0x50003400
3,518,507 UART: [idev] ++
3,519,218 UART: [idev] CDI.KEYID = 6
3,520,243 UART: [idev] SUBJECT.KEYID = 7
3,521,352 UART: [idev] UDS.KEYID = 0
3,523,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,403 UART: [idev] Erasing UDS.KEYID = 0
6,027,236 UART: [idev] Sha1 KeyId Algorithm
6,050,517 UART: [idev] --
6,056,792 UART: [ldev] ++
6,057,486 UART: [ldev] CDI.KEYID = 6
6,058,400 UART: [ldev] SUBJECT.KEYID = 5
6,059,563 UART: [ldev] AUTHORITY.KEYID = 7
6,060,798 UART: [ldev] FE.KEYID = 1
6,100,362 UART: [ldev] Erasing FE.KEYID = 1
8,605,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,602 UART: [ldev] --
10,411,935 UART: [fwproc] Wait for Commands...
10,414,036 UART: [fwproc] Recv command 0x46574c44
10,416,297 UART: [fwproc] Recv'd Img size: 114448 bytes
10,516,354 UART: ROM Fatal Error: 0x000B0008
10,520,029 >>> mbox cmd response: failed
10,520,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,784 >>> mbox cmd response: failed
10,521,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,346 >>> mbox cmd response: failed
Initializing fuses
2,059,731 writing to cptra_bootfsm_go
2,249,044 UART:
2,249,393 UART: Running Caliptra ROM ...
2,250,443 UART:
2,250,595 UART: [state] CFI Enabled
2,325,043 UART: [state] LifecycleState = Unprovisioned
2,327,419 UART: [state] DebugLocked = No
2,330,348 UART: [state] WD Timer not started. Device not locked for debugging
2,335,062 UART: [kat] SHA2-256
2,524,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,703 UART: [kat] ++
2,536,161 UART: [kat] sha1
2,546,671 UART: [kat] SHA2-256
2,549,697 UART: [kat] SHA2-384
2,556,123 UART: [kat] SHA2-512-ACC
2,558,714 UART: [kat] ECC-384
5,010,532 UART: [kat] HMAC-384Kdf
5,033,409 UART: [kat] LMS
5,565,191 UART: [kat] --
5,571,607 UART: [cold-reset] ++
5,574,134 UART: [fht] FHT @ 0x50003400
5,586,189 UART: [idev] ++
5,586,860 UART: [idev] CDI.KEYID = 6
5,587,799 UART: [idev] SUBJECT.KEYID = 7
5,589,011 UART: [idev] UDS.KEYID = 0
5,591,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,735,887 UART: [idev] Erasing UDS.KEYID = 0
8,091,571 UART: [idev] Sha1 KeyId Algorithm
8,113,120 UART: [idev] --
8,118,438 UART: [ldev] ++
8,119,127 UART: [ldev] CDI.KEYID = 6
8,120,027 UART: [ldev] SUBJECT.KEYID = 5
8,121,189 UART: [ldev] AUTHORITY.KEYID = 7
8,122,420 UART: [ldev] FE.KEYID = 1
8,162,959 UART: [ldev] Erasing FE.KEYID = 1
10,666,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,203 UART: [ldev] --
12,475,472 UART: [fwproc] Wait for Commands...
12,477,625 UART: [fwproc] Recv command 0x46574c44
12,479,941 UART: [fwproc] Recv'd Img size: 114448 bytes
15,924,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,006,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,122,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,665,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,436,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,314,933 >>> mbox cmd response: failed
10,315,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,315,839 >>> mbox cmd response: failed
10,316,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,316,398 >>> mbox cmd response: failed
Initializing fuses
2,056,212 writing to cptra_bootfsm_go
5,492,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,838,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,619 UART:
192,968 UART: Running Caliptra ROM ...
194,150 UART:
603,905 UART: [state] CFI Enabled
618,691 UART: [state] LifecycleState = Unprovisioned
621,030 UART: [state] DebugLocked = No
623,444 UART: [state] WD Timer not started. Device not locked for debugging
628,206 UART: [kat] SHA2-256
818,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,866 UART: [kat] ++
829,370 UART: [kat] sha1
842,200 UART: [kat] SHA2-256
845,229 UART: [kat] SHA2-384
850,886 UART: [kat] SHA2-512-ACC
853,502 UART: [kat] ECC-384
3,299,305 UART: [kat] HMAC-384Kdf
3,311,835 UART: [kat] LMS
3,843,665 UART: [kat] --
3,846,682 UART: [cold-reset] ++
3,848,345 UART: [fht] FHT @ 0x50003400
3,861,320 UART: [idev] ++
3,861,993 UART: [idev] CDI.KEYID = 6
3,863,007 UART: [idev] SUBJECT.KEYID = 7
3,864,172 UART: [idev] UDS.KEYID = 0
3,867,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,011,073 UART: [idev] Erasing UDS.KEYID = 0
6,337,849 UART: [idev] Sha1 KeyId Algorithm
6,359,348 UART: [idev] --
6,364,218 UART: [ldev] ++
6,364,898 UART: [ldev] CDI.KEYID = 6
6,365,809 UART: [ldev] SUBJECT.KEYID = 5
6,367,025 UART: [ldev] AUTHORITY.KEYID = 7
6,368,203 UART: [ldev] FE.KEYID = 1
6,376,530 UART: [ldev] Erasing FE.KEYID = 1
8,852,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,194 UART: [ldev] --
10,643,741 UART: [fwproc] Wait for Commands...
10,646,896 UART: [fwproc] Recv command 0x46574c44
10,649,161 UART: [fwproc] Recv'd Img size: 114448 bytes
10,750,496 UART: ROM Fatal Error: 0x000B0008
10,754,192 >>> mbox cmd response: failed
10,754,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,869 >>> mbox cmd response: failed
10,755,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,755,422 >>> mbox cmd response: failed
Initializing fuses
2,052,384 writing to cptra_bootfsm_go
2,241,685 UART:
2,242,037 UART: Running Caliptra ROM ...
2,243,180 UART:
9,700,125 UART: [state] CFI Enabled
9,714,686 UART: [state] LifecycleState = Unprovisioned
9,717,069 UART: [state] DebugLocked = No
9,719,298 UART: [state] WD Timer not started. Device not locked for debugging
9,723,696 UART: [kat] SHA2-256
9,913,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,924,366 UART: [kat] ++
9,924,858 UART: [kat] sha1
9,935,481 UART: [kat] SHA2-256
9,938,506 UART: [kat] SHA2-384
9,944,439 UART: [kat] SHA2-512-ACC
9,947,007 UART: [kat] ECC-384
12,389,793 UART: [kat] HMAC-384Kdf
12,402,235 UART: [kat] LMS
12,934,056 UART: [kat] --
12,938,962 UART: [cold-reset] ++
12,941,101 UART: [fht] FHT @ 0x50003400
12,952,399 UART: [idev] ++
12,953,074 UART: [idev] CDI.KEYID = 6
12,954,109 UART: [idev] SUBJECT.KEYID = 7
12,955,211 UART: [idev] UDS.KEYID = 0
12,958,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,102,396 UART: [idev] Erasing UDS.KEYID = 0
15,430,900 UART: [idev] Sha1 KeyId Algorithm
15,453,690 UART: [idev] --
15,457,956 UART: [ldev] ++
15,458,634 UART: [ldev] CDI.KEYID = 6
15,459,557 UART: [ldev] SUBJECT.KEYID = 5
15,460,716 UART: [ldev] AUTHORITY.KEYID = 7
15,461,948 UART: [ldev] FE.KEYID = 1
15,473,892 UART: [ldev] Erasing FE.KEYID = 1
17,952,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,673,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,688,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,704,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,719,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,740,990 UART: [ldev] --
19,746,527 UART: [fwproc] Wait for Commands...
19,748,841 UART: [fwproc] Recv command 0x46574c44
19,751,151 UART: [fwproc] Recv'd Img size: 114448 bytes
23,194,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,269,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,386,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,929,417 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,757,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,536,156 >>> mbox cmd response: failed
10,536,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,537,016 >>> mbox cmd response: failed
10,537,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,537,575 >>> mbox cmd response: failed
Initializing fuses
2,051,026 writing to cptra_bootfsm_go
13,082,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,280,351 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,223 UART: [kat] SHA2-256
882,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,269 UART: [kat] ++
886,421 UART: [kat] sha1
890,601 UART: [kat] SHA2-256
892,539 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,864 UART: [kat] HMAC-384Kdf
907,436 UART: [kat] LMS
1,475,632 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,479,946 UART: [idev] ++
1,480,114 UART: [idev] CDI.KEYID = 6
1,480,474 UART: [idev] SUBJECT.KEYID = 7
1,480,898 UART: [idev] UDS.KEYID = 0
1,481,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,515,009 UART: [ldev] ++
1,515,177 UART: [ldev] CDI.KEYID = 6
1,515,540 UART: [ldev] SUBJECT.KEYID = 5
1,515,966 UART: [ldev] AUTHORITY.KEYID = 7
1,516,429 UART: [ldev] FE.KEYID = 1
1,521,821 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,258 UART: [ldev] --
1,586,751 UART: [fwproc] Waiting for Commands...
1,587,448 UART: [fwproc] Received command 0x46574c44
1,588,239 UART: [fwproc] Received Image of size 114448 bytes
1,613,462 UART: ROM Fatal Error: 0x000B0008
1,614,619 >>> mbox cmd response: failed
1,614,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,625 >>> mbox cmd response: failed
1,614,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,896 UART: [kat] HMAC-384Kdf
907,524 UART: [kat] LMS
1,475,720 UART: [kat] --
1,476,509 UART: [cold-reset] ++
1,477,075 UART: [fht] Storing FHT @ 0x50003400
1,479,958 UART: [idev] ++
1,480,126 UART: [idev] CDI.KEYID = 6
1,480,486 UART: [idev] SUBJECT.KEYID = 7
1,480,910 UART: [idev] UDS.KEYID = 0
1,481,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,164 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,720 UART: [idev] --
1,514,847 UART: [ldev] ++
1,515,015 UART: [ldev] CDI.KEYID = 6
1,515,378 UART: [ldev] SUBJECT.KEYID = 5
1,515,804 UART: [ldev] AUTHORITY.KEYID = 7
1,516,267 UART: [ldev] FE.KEYID = 1
1,521,607 UART: [ldev] Erasing FE.KEYID = 1
1,546,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,786 UART: [ldev] --
1,586,293 UART: [fwproc] Waiting for Commands...
1,586,992 UART: [fwproc] Received command 0x46574c44
1,587,783 UART: [fwproc] Received Image of size 114448 bytes
2,886,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,992 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,530 >>> mbox cmd response: failed
1,466,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,536 >>> mbox cmd response: failed
1,466,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,449 UART: [kat] HMAC-384Kdf
908,115 UART: [kat] LMS
1,476,311 UART: [kat] --
1,477,234 UART: [cold-reset] ++
1,477,724 UART: [fht] Storing FHT @ 0x50003400
1,480,521 UART: [idev] ++
1,480,689 UART: [idev] CDI.KEYID = 6
1,481,049 UART: [idev] SUBJECT.KEYID = 7
1,481,473 UART: [idev] UDS.KEYID = 0
1,481,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,685 UART: [idev] Erasing UDS.KEYID = 0
1,506,859 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,625 UART: [idev] --
1,516,606 UART: [ldev] ++
1,516,774 UART: [ldev] CDI.KEYID = 6
1,517,137 UART: [ldev] SUBJECT.KEYID = 5
1,517,563 UART: [ldev] AUTHORITY.KEYID = 7
1,518,026 UART: [ldev] FE.KEYID = 1
1,523,220 UART: [ldev] Erasing FE.KEYID = 1
1,548,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,385 UART: [ldev] --
1,587,854 UART: [fwproc] Waiting for Commands...
1,588,509 UART: [fwproc] Received command 0x46574c44
1,589,300 UART: [fwproc] Received Image of size 114448 bytes
1,614,359 UART: ROM Fatal Error: 0x000B0008
1,615,516 >>> mbox cmd response: failed
1,615,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,522 >>> mbox cmd response: failed
1,615,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,844 UART: [kat] SHA2-256
882,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,890 UART: [kat] ++
887,042 UART: [kat] sha1
891,184 UART: [kat] SHA2-256
893,122 UART: [kat] SHA2-384
895,961 UART: [kat] SHA2-512-ACC
897,862 UART: [kat] ECC-384
903,551 UART: [kat] HMAC-384Kdf
908,155 UART: [kat] LMS
1,476,351 UART: [kat] --
1,477,122 UART: [cold-reset] ++
1,477,618 UART: [fht] Storing FHT @ 0x50003400
1,480,395 UART: [idev] ++
1,480,563 UART: [idev] CDI.KEYID = 6
1,480,923 UART: [idev] SUBJECT.KEYID = 7
1,481,347 UART: [idev] UDS.KEYID = 0
1,481,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,351 UART: [idev] Erasing UDS.KEYID = 0
1,506,271 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,093 UART: [idev] --
1,516,052 UART: [ldev] ++
1,516,220 UART: [ldev] CDI.KEYID = 6
1,516,583 UART: [ldev] SUBJECT.KEYID = 5
1,517,009 UART: [ldev] AUTHORITY.KEYID = 7
1,517,472 UART: [ldev] FE.KEYID = 1
1,522,714 UART: [ldev] Erasing FE.KEYID = 1
1,547,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,821 UART: [ldev] --
1,587,116 UART: [fwproc] Waiting for Commands...
1,587,743 UART: [fwproc] Received command 0x46574c44
1,588,534 UART: [fwproc] Received Image of size 114448 bytes
2,887,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,787 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,467,259 >>> mbox cmd response: failed
1,467,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,265 >>> mbox cmd response: failed
1,467,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,625 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,749 UART: [kat] SHA2-256
903,689 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,070 UART: [idev] Erasing UDS.KEYID = 0
1,201,231 UART: [idev] Sha1 KeyId Algorithm
1,209,719 UART: [idev] --
1,210,829 UART: [ldev] ++
1,210,997 UART: [ldev] CDI.KEYID = 6
1,211,360 UART: [ldev] SUBJECT.KEYID = 5
1,211,786 UART: [ldev] AUTHORITY.KEYID = 7
1,212,249 UART: [ldev] FE.KEYID = 1
1,217,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,614 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,932 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,927 UART: ROM Fatal Error: 0x000B0008
1,310,084 >>> mbox cmd response: failed
1,310,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,090 >>> mbox cmd response: failed
1,310,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
902,095 UART: [kat] SHA2-256
904,035 UART: [kat] SHA2-384
906,776 UART: [kat] SHA2-512-ACC
908,677 UART: [kat] ECC-384
918,352 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,172,261 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,328 UART: [idev] Erasing UDS.KEYID = 0
1,201,681 UART: [idev] Sha1 KeyId Algorithm
1,210,327 UART: [idev] --
1,211,411 UART: [ldev] ++
1,211,579 UART: [ldev] CDI.KEYID = 6
1,211,942 UART: [ldev] SUBJECT.KEYID = 5
1,212,368 UART: [ldev] AUTHORITY.KEYID = 7
1,212,831 UART: [ldev] FE.KEYID = 1
1,217,949 UART: [ldev] Erasing FE.KEYID = 1
1,244,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,609 UART: [ldev] --
1,284,092 UART: [fwproc] Wait for Commands...
1,284,672 UART: [fwproc] Recv command 0x46574c44
1,285,400 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,991 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,075 >>> mbox cmd response: failed
1,163,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,081 >>> mbox cmd response: failed
1,163,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,664 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
893,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,442 UART: [kat] ++
897,594 UART: [kat] sha1
901,672 UART: [kat] SHA2-256
903,612 UART: [kat] SHA2-384
906,311 UART: [kat] SHA2-512-ACC
908,212 UART: [kat] ECC-384
917,921 UART: [kat] HMAC-384Kdf
922,559 UART: [kat] LMS
1,170,887 UART: [kat] --
1,171,716 UART: [cold-reset] ++
1,172,118 UART: [fht] FHT @ 0x50003400
1,174,873 UART: [idev] ++
1,175,041 UART: [idev] CDI.KEYID = 6
1,175,401 UART: [idev] SUBJECT.KEYID = 7
1,175,825 UART: [idev] UDS.KEYID = 0
1,176,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,316 UART: [idev] Sha1 KeyId Algorithm
1,209,742 UART: [idev] --
1,210,776 UART: [ldev] ++
1,210,944 UART: [ldev] CDI.KEYID = 6
1,211,307 UART: [ldev] SUBJECT.KEYID = 5
1,211,733 UART: [ldev] AUTHORITY.KEYID = 7
1,212,196 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,244,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,330 UART: [ldev] --
1,283,775 UART: [fwproc] Wait for Commands...
1,284,397 UART: [fwproc] Recv command 0x46574c44
1,285,125 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,096 UART: ROM Fatal Error: 0x000B0008
1,311,253 >>> mbox cmd response: failed
1,311,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,259 >>> mbox cmd response: failed
1,311,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,496 UART: [idev] --
1,211,500 UART: [ldev] ++
1,211,668 UART: [ldev] CDI.KEYID = 6
1,212,031 UART: [ldev] SUBJECT.KEYID = 5
1,212,457 UART: [ldev] AUTHORITY.KEYID = 7
1,212,920 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,244,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,176 UART: [ldev] --
1,283,485 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,098 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,000 >>> mbox cmd response: failed
1,164,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,006 >>> mbox cmd response: failed
1,164,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,621 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,525 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,174,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,771 UART: [idev] Erasing UDS.KEYID = 0
1,199,705 UART: [idev] Sha1 KeyId Algorithm
1,208,567 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,314 UART: [ldev] Erasing FE.KEYID = 1
1,243,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,970 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,283,097 UART: [fwproc] Recv command 0x46574c44
1,283,830 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,630 UART: ROM Fatal Error: 0x000B0008
1,310,787 >>> mbox cmd response: failed
1,310,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,793 >>> mbox cmd response: failed
1,310,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,484 UART: [ldev] --
1,279,770 UART: [fwproc] Wait for Commands...
1,280,497 UART: [fwproc] Recv command 0x46574c44
1,281,230 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,481 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,444 >>> mbox cmd response: failed
1,160,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,450 >>> mbox cmd response: failed
1,160,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,549 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,399 UART: [kat] LMS
1,168,711 UART: [kat] --
1,169,528 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,652 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,645 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,147 UART: ROM Fatal Error: 0x000B0008
1,308,304 >>> mbox cmd response: failed
1,308,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,310 >>> mbox cmd response: failed
1,308,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,944 UART: [fht] FHT @ 0x50003400
1,172,532 UART: [idev] ++
1,172,700 UART: [idev] CDI.KEYID = 6
1,173,061 UART: [idev] SUBJECT.KEYID = 7
1,173,486 UART: [idev] UDS.KEYID = 0
1,173,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,272 UART: [idev] Erasing UDS.KEYID = 0
1,198,414 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,151 UART: [ldev] ++
1,208,319 UART: [ldev] CDI.KEYID = 6
1,208,683 UART: [ldev] SUBJECT.KEYID = 5
1,209,110 UART: [ldev] AUTHORITY.KEYID = 7
1,209,573 UART: [ldev] FE.KEYID = 1
1,215,005 UART: [ldev] Erasing FE.KEYID = 1
1,241,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,101 UART: [ldev] --
1,280,433 UART: [fwproc] Wait for Commands...
1,281,156 UART: [fwproc] Recv command 0x46574c44
1,281,889 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,276 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,507 >>> mbox cmd response: failed
1,161,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,513 >>> mbox cmd response: failed
1,161,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,146 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,181 UART:
192,554 UART: Running Caliptra ROM ...
193,743 UART:
193,899 UART: [state] CFI Enabled
260,142 UART: [state] LifecycleState = Unprovisioned
262,112 UART: [state] DebugLocked = No
264,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,736 UART: [kat] SHA2-256
438,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,911 UART: [kat] ++
449,397 UART: [kat] sha1
460,278 UART: [kat] SHA2-256
462,969 UART: [kat] SHA2-384
469,052 UART: [kat] SHA2-512-ACC
471,412 UART: [kat] ECC-384
2,763,938 UART: [kat] HMAC-384Kdf
2,791,463 UART: [kat] LMS
3,981,803 UART: [kat] --
3,986,557 UART: [cold-reset] ++
3,988,163 UART: [fht] Storing FHT @ 0x50003400
4,000,293 UART: [idev] ++
4,000,899 UART: [idev] CDI.KEYID = 6
4,001,832 UART: [idev] SUBJECT.KEYID = 7
4,003,057 UART: [idev] UDS.KEYID = 0
4,005,997 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,149,632 UART: [idev] Erasing UDS.KEYID = 0
7,337,216 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,701 UART: [idev] --
7,362,459 UART: [ldev] ++
7,363,044 UART: [ldev] CDI.KEYID = 6
7,363,985 UART: [ldev] SUBJECT.KEYID = 5
7,365,204 UART: [ldev] AUTHORITY.KEYID = 7
7,366,440 UART: [ldev] FE.KEYID = 1
7,413,156 UART: [ldev] Erasing FE.KEYID = 1
10,744,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,297 UART: [ldev] --
13,105,156 UART: [fwproc] Waiting for Commands...
13,107,098 UART: [fwproc] Received command 0x46574c44
13,109,286 UART: [fwproc] Received Image of size 114124 bytes
13,181,920 UART: ROM Fatal Error: 0x000B0009
13,185,440 >>> mbox cmd response: failed
13,185,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,186,182 >>> mbox cmd response: failed
13,186,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,186,738 >>> mbox cmd response: failed
Initializing fuses
2,048,366 writing to cptra_bootfsm_go
2,237,676 UART:
2,238,059 UART: Running Caliptra ROM ...
2,239,164 UART:
2,239,321 UART: [state] CFI Enabled
2,298,255 UART: [state] LifecycleState = Unprovisioned
2,300,248 UART: [state] DebugLocked = No
2,302,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,307,293 UART: [kat] SHA2-256
2,476,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,487,475 UART: [kat] ++
2,487,961 UART: [kat] sha1
2,499,445 UART: [kat] SHA2-256
2,502,150 UART: [kat] SHA2-384
2,507,654 UART: [kat] SHA2-512-ACC
2,510,061 UART: [kat] ECC-384
4,800,085 UART: [kat] HMAC-384Kdf
4,832,346 UART: [kat] LMS
6,022,665 UART: [kat] --
6,025,653 UART: [cold-reset] ++
6,027,593 UART: [fht] Storing FHT @ 0x50003400
6,038,967 UART: [idev] ++
6,039,537 UART: [idev] CDI.KEYID = 6
6,040,449 UART: [idev] SUBJECT.KEYID = 7
6,041,721 UART: [idev] UDS.KEYID = 0
6,044,197 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,187,861 UART: [idev] Erasing UDS.KEYID = 0
9,380,903 UART: [idev] Using Sha1 for KeyId Algorithm
9,403,585 UART: [idev] --
9,407,418 UART: [ldev] ++
9,407,992 UART: [ldev] CDI.KEYID = 6
9,408,960 UART: [ldev] SUBJECT.KEYID = 5
9,410,235 UART: [ldev] AUTHORITY.KEYID = 7
9,411,362 UART: [ldev] FE.KEYID = 1
9,457,236 UART: [ldev] Erasing FE.KEYID = 1
12,790,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,087,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,102,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,131,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,150,207 UART: [ldev] --
15,155,010 UART: [fwproc] Waiting for Commands...
15,158,412 UART: [fwproc] Received command 0x46574c44
15,160,594 UART: [fwproc] Received Image of size 114124 bytes
19,214,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,062 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,356,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,674,362 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,042 writing to cptra_bootfsm_go
3,786,224 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,912,471 >>> mbox cmd response: failed
12,913,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,391 >>> mbox cmd response: failed
12,913,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,945 >>> mbox cmd response: failed
Initializing fuses
2,045,639 writing to cptra_bootfsm_go
5,825,264 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,888,551 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,543 UART:
192,911 UART: Running Caliptra ROM ...
194,047 UART:
603,949 UART: [state] CFI Enabled
619,359 UART: [state] LifecycleState = Unprovisioned
621,300 UART: [state] DebugLocked = No
622,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,762 UART: [kat] SHA2-256
797,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,051 UART: [kat] ++
808,500 UART: [kat] sha1
818,295 UART: [kat] SHA2-256
821,014 UART: [kat] SHA2-384
826,081 UART: [kat] SHA2-512-ACC
828,420 UART: [kat] ECC-384
3,114,118 UART: [kat] HMAC-384Kdf
3,125,712 UART: [kat] LMS
4,315,854 UART: [kat] --
4,319,545 UART: [cold-reset] ++
4,320,939 UART: [fht] Storing FHT @ 0x50003400
4,332,642 UART: [idev] ++
4,333,259 UART: [idev] CDI.KEYID = 6
4,334,177 UART: [idev] SUBJECT.KEYID = 7
4,335,417 UART: [idev] UDS.KEYID = 0
4,338,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,528 UART: [idev] Erasing UDS.KEYID = 0
7,623,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,885 UART: [idev] --
7,648,040 UART: [ldev] ++
7,648,613 UART: [ldev] CDI.KEYID = 6
7,649,557 UART: [ldev] SUBJECT.KEYID = 5
7,650,768 UART: [ldev] AUTHORITY.KEYID = 7
7,652,055 UART: [ldev] FE.KEYID = 1
7,660,951 UART: [ldev] Erasing FE.KEYID = 1
10,951,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,917 UART: [ldev] --
13,314,282 UART: [fwproc] Waiting for Commands...
13,315,897 UART: [fwproc] Received command 0x46574c44
13,318,087 UART: [fwproc] Received Image of size 114124 bytes
13,393,291 UART: ROM Fatal Error: 0x000B0009
13,396,806 >>> mbox cmd response: failed
13,397,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,448 >>> mbox cmd response: failed
13,397,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,398,004 >>> mbox cmd response: failed
Initializing fuses
2,049,609 writing to cptra_bootfsm_go
2,238,918 UART:
2,239,318 UART: Running Caliptra ROM ...
2,240,365 UART:
7,071,593 UART: [state] CFI Enabled
7,082,431 UART: [state] LifecycleState = Unprovisioned
7,084,357 UART: [state] DebugLocked = No
7,086,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,498 UART: [kat] SHA2-256
7,262,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,772 UART: [kat] ++
7,273,321 UART: [kat] sha1
7,284,326 UART: [kat] SHA2-256
7,287,021 UART: [kat] SHA2-384
7,292,957 UART: [kat] SHA2-512-ACC
7,295,313 UART: [kat] ECC-384
9,579,932 UART: [kat] HMAC-384Kdf
9,592,326 UART: [kat] LMS
10,782,429 UART: [kat] --
10,787,229 UART: [cold-reset] ++
10,788,937 UART: [fht] Storing FHT @ 0x50003400
10,801,223 UART: [idev] ++
10,801,796 UART: [idev] CDI.KEYID = 6
10,802,732 UART: [idev] SUBJECT.KEYID = 7
10,803,998 UART: [idev] UDS.KEYID = 0
10,806,799 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,950,278 UART: [idev] Erasing UDS.KEYID = 0
14,086,255 UART: [idev] Using Sha1 for KeyId Algorithm
14,107,714 UART: [idev] --
14,111,396 UART: [ldev] ++
14,111,964 UART: [ldev] CDI.KEYID = 6
14,112,980 UART: [ldev] SUBJECT.KEYID = 5
14,114,193 UART: [ldev] AUTHORITY.KEYID = 7
14,115,372 UART: [ldev] FE.KEYID = 1
14,127,282 UART: [ldev] Erasing FE.KEYID = 1
17,421,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,711,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,726,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,740,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,755,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,036 UART: [ldev] --
19,778,602 UART: [fwproc] Waiting for Commands...
19,781,079 UART: [fwproc] Received command 0x46574c44
19,783,268 UART: [fwproc] Received Image of size 114124 bytes
23,841,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,919,904 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,988,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,306,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
4,127,609 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,127,668 >>> mbox cmd response: failed
13,128,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,653 >>> mbox cmd response: failed
13,128,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,222 >>> mbox cmd response: failed
Initializing fuses
2,043,728 writing to cptra_bootfsm_go
10,867,269 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,805,438 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,142 UART:
192,519 UART: Running Caliptra ROM ...
193,604 UART:
193,745 UART: [state] CFI Enabled
262,847 UART: [state] LifecycleState = Unprovisioned
264,544 UART: [state] DebugLocked = No
266,707 UART: [state] WD Timer not started. Device not locked for debugging
270,038 UART: [kat] SHA2-256
449,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,752 UART: [kat] ++
461,201 UART: [kat] sha1
471,698 UART: [kat] SHA2-256
474,757 UART: [kat] SHA2-384
480,081 UART: [kat] SHA2-512-ACC
483,073 UART: [kat] ECC-384
2,946,509 UART: [kat] HMAC-384Kdf
2,969,900 UART: [kat] LMS
3,499,331 UART: [kat] --
3,502,150 UART: [cold-reset] ++
3,504,457 UART: [fht] FHT @ 0x50003400
3,515,757 UART: [idev] ++
3,516,319 UART: [idev] CDI.KEYID = 6
3,517,285 UART: [idev] SUBJECT.KEYID = 7
3,518,444 UART: [idev] UDS.KEYID = 0
3,521,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,260 UART: [idev] Erasing UDS.KEYID = 0
6,025,289 UART: [idev] Sha1 KeyId Algorithm
6,047,605 UART: [idev] --
6,050,956 UART: [ldev] ++
6,051,532 UART: [ldev] CDI.KEYID = 6
6,052,446 UART: [ldev] SUBJECT.KEYID = 5
6,053,609 UART: [ldev] AUTHORITY.KEYID = 7
6,054,865 UART: [ldev] FE.KEYID = 1
6,098,838 UART: [ldev] Erasing FE.KEYID = 1
8,598,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,716 UART: [ldev] --
10,391,599 UART: [fwproc] Wait for Commands...
10,393,478 UART: [fwproc] Recv command 0x46574c44
10,395,521 UART: [fwproc] Recv'd Img size: 114448 bytes
10,468,225 UART: ROM Fatal Error: 0x000B0009
10,471,320 >>> mbox cmd response: failed
10,471,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,471,980 >>> mbox cmd response: failed
10,472,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,560 >>> mbox cmd response: failed
Initializing fuses
2,056,862 writing to cptra_bootfsm_go
2,246,151 UART:
2,246,492 UART: Running Caliptra ROM ...
2,247,541 UART:
2,247,693 UART: [state] CFI Enabled
2,312,745 UART: [state] LifecycleState = Unprovisioned
2,314,630 UART: [state] DebugLocked = No
2,317,341 UART: [state] WD Timer not started. Device not locked for debugging
2,321,306 UART: [kat] SHA2-256
2,500,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,975 UART: [kat] ++
2,512,458 UART: [kat] sha1
2,523,293 UART: [kat] SHA2-256
2,526,315 UART: [kat] SHA2-384
2,531,980 UART: [kat] SHA2-512-ACC
2,534,924 UART: [kat] ECC-384
4,996,878 UART: [kat] HMAC-384Kdf
5,018,019 UART: [kat] LMS
5,547,438 UART: [kat] --
5,551,859 UART: [cold-reset] ++
5,553,279 UART: [fht] FHT @ 0x50003400
5,563,891 UART: [idev] ++
5,564,458 UART: [idev] CDI.KEYID = 6
5,565,364 UART: [idev] SUBJECT.KEYID = 7
5,566,578 UART: [idev] UDS.KEYID = 0
5,569,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,432 UART: [idev] Erasing UDS.KEYID = 0
8,073,523 UART: [idev] Sha1 KeyId Algorithm
8,095,628 UART: [idev] --
8,099,309 UART: [ldev] ++
8,099,885 UART: [ldev] CDI.KEYID = 6
8,100,799 UART: [ldev] SUBJECT.KEYID = 5
8,102,021 UART: [ldev] AUTHORITY.KEYID = 7
8,103,259 UART: [ldev] FE.KEYID = 1
8,146,959 UART: [ldev] Erasing FE.KEYID = 1
10,649,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,366,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,382,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,397,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,413,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,433,293 UART: [ldev] --
12,437,945 UART: [fwproc] Wait for Commands...
12,440,428 UART: [fwproc] Recv command 0x46574c44
12,442,490 UART: [fwproc] Recv'd Img size: 114448 bytes
15,846,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,923,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,310,061 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,383,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,284,094 >>> mbox cmd response: failed
10,284,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,285,009 >>> mbox cmd response: failed
10,285,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,285,578 >>> mbox cmd response: failed
Initializing fuses
2,047,742 writing to cptra_bootfsm_go
5,421,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,107,811 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,615 UART:
192,989 UART: Running Caliptra ROM ...
194,126 UART:
603,585 UART: [state] CFI Enabled
616,722 UART: [state] LifecycleState = Unprovisioned
618,561 UART: [state] DebugLocked = No
620,778 UART: [state] WD Timer not started. Device not locked for debugging
624,649 UART: [kat] SHA2-256
803,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,362 UART: [kat] ++
815,810 UART: [kat] sha1
827,116 UART: [kat] SHA2-256
830,125 UART: [kat] SHA2-384
836,539 UART: [kat] SHA2-512-ACC
839,495 UART: [kat] ECC-384
3,282,670 UART: [kat] HMAC-384Kdf
3,295,434 UART: [kat] LMS
3,824,933 UART: [kat] --
3,827,763 UART: [cold-reset] ++
3,828,681 UART: [fht] FHT @ 0x50003400
3,840,254 UART: [idev] ++
3,840,832 UART: [idev] CDI.KEYID = 6
3,841,799 UART: [idev] SUBJECT.KEYID = 7
3,842,961 UART: [idev] UDS.KEYID = 0
3,845,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,654 UART: [idev] Erasing UDS.KEYID = 0
6,313,197 UART: [idev] Sha1 KeyId Algorithm
6,337,717 UART: [idev] --
6,341,116 UART: [ldev] ++
6,341,690 UART: [ldev] CDI.KEYID = 6
6,342,618 UART: [ldev] SUBJECT.KEYID = 5
6,343,781 UART: [ldev] AUTHORITY.KEYID = 7
6,345,071 UART: [ldev] FE.KEYID = 1
6,354,696 UART: [ldev] Erasing FE.KEYID = 1
8,829,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,847 UART: [ldev] --
10,621,772 UART: [fwproc] Wait for Commands...
10,624,035 UART: [fwproc] Recv command 0x46574c44
10,626,080 UART: [fwproc] Recv'd Img size: 114448 bytes
10,699,243 UART: ROM Fatal Error: 0x000B0009
10,702,384 >>> mbox cmd response: failed
10,702,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,703,126 >>> mbox cmd response: failed
10,703,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,703,686 >>> mbox cmd response: failed
Initializing fuses
2,053,906 writing to cptra_bootfsm_go
2,243,230 UART:
2,243,579 UART: Running Caliptra ROM ...
2,244,718 UART:
9,755,541 UART: [state] CFI Enabled
9,772,846 UART: [state] LifecycleState = Unprovisioned
9,774,718 UART: [state] DebugLocked = No
9,777,513 UART: [state] WD Timer not started. Device not locked for debugging
9,780,500 UART: [kat] SHA2-256
9,959,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,971,221 UART: [kat] ++
9,971,760 UART: [kat] sha1
9,982,651 UART: [kat] SHA2-256
9,985,657 UART: [kat] SHA2-384
9,991,111 UART: [kat] SHA2-512-ACC
9,994,056 UART: [kat] ECC-384
12,434,671 UART: [kat] HMAC-384Kdf
12,447,492 UART: [kat] LMS
12,976,984 UART: [kat] --
12,981,502 UART: [cold-reset] ++
12,983,641 UART: [fht] FHT @ 0x50003400
12,994,881 UART: [idev] ++
12,995,452 UART: [idev] CDI.KEYID = 6
12,996,414 UART: [idev] SUBJECT.KEYID = 7
12,997,509 UART: [idev] UDS.KEYID = 0
13,000,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,144,505 UART: [idev] Erasing UDS.KEYID = 0
15,470,382 UART: [idev] Sha1 KeyId Algorithm
15,493,131 UART: [idev] --
15,496,685 UART: [ldev] ++
15,497,288 UART: [ldev] CDI.KEYID = 6
15,498,363 UART: [ldev] SUBJECT.KEYID = 5
15,499,469 UART: [ldev] AUTHORITY.KEYID = 7
15,500,648 UART: [ldev] FE.KEYID = 1
15,512,373 UART: [ldev] Erasing FE.KEYID = 1
17,988,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,706,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,722,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,738,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,754,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,139 UART: [ldev] --
19,778,887 UART: [fwproc] Wait for Commands...
19,781,635 UART: [fwproc] Recv command 0x46574c44
19,783,676 UART: [fwproc] Recv'd Img size: 114448 bytes
23,188,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,262,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,330,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,649,760 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,701,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,153 >>> mbox cmd response: failed
10,480,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,277 >>> mbox cmd response: failed
10,481,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,912 >>> mbox cmd response: failed
Initializing fuses
2,046,124 writing to cptra_bootfsm_go
13,079,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,659,244 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,022 writing to cptra_bootfsm_go
193,195 UART:
193,557 UART: Running Caliptra ROM ...
194,654 UART:
194,793 UART: [state] CFI Enabled
264,611 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
268,694 UART: [state] WD Timer not started. Device not locked for debugging
274,121 UART: [kat] SHA2-256
464,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,779 UART: [kat] ++
475,221 UART: [kat] sha1
487,181 UART: [kat] SHA2-256
490,190 UART: [kat] SHA2-384
496,393 UART: [kat] SHA2-512-ACC
498,970 UART: [kat] ECC-384
2,946,689 UART: [kat] HMAC-384Kdf
2,971,601 UART: [kat] LMS
3,503,407 UART: [kat] --
3,510,174 UART: [cold-reset] ++
3,512,657 UART: [fht] FHT @ 0x50003400
3,523,635 UART: [idev] ++
3,524,350 UART: [idev] CDI.KEYID = 6
3,525,294 UART: [idev] SUBJECT.KEYID = 7
3,526,506 UART: [idev] UDS.KEYID = 0
3,529,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,673,437 UART: [idev] Erasing UDS.KEYID = 0
6,027,287 UART: [idev] Sha1 KeyId Algorithm
6,049,816 UART: [idev] --
6,056,194 UART: [ldev] ++
6,056,874 UART: [ldev] CDI.KEYID = 6
6,057,833 UART: [ldev] SUBJECT.KEYID = 5
6,058,993 UART: [ldev] AUTHORITY.KEYID = 7
6,060,226 UART: [ldev] FE.KEYID = 1
6,099,312 UART: [ldev] Erasing FE.KEYID = 1
8,608,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,790 UART: [ldev] --
10,416,392 UART: [fwproc] Wait for Commands...
10,418,163 UART: [fwproc] Recv command 0x46574c44
10,420,473 UART: [fwproc] Recv'd Img size: 114448 bytes
10,522,996 UART: ROM Fatal Error: 0x000B0009
10,526,674 >>> mbox cmd response: failed
10,527,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,343 >>> mbox cmd response: failed
10,527,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,897 >>> mbox cmd response: failed
Initializing fuses
2,048,241 writing to cptra_bootfsm_go
2,237,532 UART:
2,237,877 UART: Running Caliptra ROM ...
2,239,011 UART:
2,239,186 UART: [state] CFI Enabled
2,295,912 UART: [state] LifecycleState = Unprovisioned
2,298,279 UART: [state] DebugLocked = No
2,299,830 UART: [state] WD Timer not started. Device not locked for debugging
2,303,794 UART: [kat] SHA2-256
2,493,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,504,468 UART: [kat] ++
2,505,010 UART: [kat] sha1
2,516,556 UART: [kat] SHA2-256
2,519,608 UART: [kat] SHA2-384
2,526,088 UART: [kat] SHA2-512-ACC
2,528,668 UART: [kat] ECC-384
4,984,682 UART: [kat] HMAC-384Kdf
5,006,310 UART: [kat] LMS
5,538,050 UART: [kat] --
5,542,221 UART: [cold-reset] ++
5,544,325 UART: [fht] FHT @ 0x50003400
5,555,905 UART: [idev] ++
5,556,618 UART: [idev] CDI.KEYID = 6
5,557,555 UART: [idev] SUBJECT.KEYID = 7
5,558,772 UART: [idev] UDS.KEYID = 0
5,561,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,705,160 UART: [idev] Erasing UDS.KEYID = 0
8,061,862 UART: [idev] Sha1 KeyId Algorithm
8,082,831 UART: [idev] --
8,088,606 UART: [ldev] ++
8,089,290 UART: [ldev] CDI.KEYID = 6
8,090,205 UART: [ldev] SUBJECT.KEYID = 5
8,091,366 UART: [ldev] AUTHORITY.KEYID = 7
8,092,606 UART: [ldev] FE.KEYID = 1
8,126,108 UART: [ldev] Erasing FE.KEYID = 1
10,634,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,385,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,400,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,416,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,437,928 UART: [ldev] --
12,444,060 UART: [fwproc] Wait for Commands...
12,447,205 UART: [fwproc] Recv command 0x46574c44
12,449,468 UART: [fwproc] Recv'd Img size: 114448 bytes
15,896,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,972,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,088,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,631,872 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,437,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,320,607 >>> mbox cmd response: failed
10,321,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,321,540 >>> mbox cmd response: failed
10,321,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,322,103 >>> mbox cmd response: failed
Initializing fuses
2,045,614 writing to cptra_bootfsm_go
5,468,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,764,206 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
192,819 UART:
193,168 UART: Running Caliptra ROM ...
194,366 UART:
604,012 UART: [state] CFI Enabled
615,421 UART: [state] LifecycleState = Unprovisioned
617,741 UART: [state] DebugLocked = No
619,308 UART: [state] WD Timer not started. Device not locked for debugging
624,415 UART: [kat] SHA2-256
814,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,090 UART: [kat] ++
825,598 UART: [kat] sha1
835,578 UART: [kat] SHA2-256
838,591 UART: [kat] SHA2-384
843,819 UART: [kat] SHA2-512-ACC
846,375 UART: [kat] ECC-384
3,288,286 UART: [kat] HMAC-384Kdf
3,301,038 UART: [kat] LMS
3,832,831 UART: [kat] --
3,839,905 UART: [cold-reset] ++
3,841,575 UART: [fht] FHT @ 0x50003400
3,853,257 UART: [idev] ++
3,853,988 UART: [idev] CDI.KEYID = 6
3,854,955 UART: [idev] SUBJECT.KEYID = 7
3,856,115 UART: [idev] UDS.KEYID = 0
3,859,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,965 UART: [idev] Erasing UDS.KEYID = 0
6,333,352 UART: [idev] Sha1 KeyId Algorithm
6,354,604 UART: [idev] --
6,359,950 UART: [ldev] ++
6,360,634 UART: [ldev] CDI.KEYID = 6
6,361,540 UART: [ldev] SUBJECT.KEYID = 5
6,362,701 UART: [ldev] AUTHORITY.KEYID = 7
6,363,933 UART: [ldev] FE.KEYID = 1
6,377,012 UART: [ldev] Erasing FE.KEYID = 1
8,857,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,286 UART: [ldev] --
10,648,886 UART: [fwproc] Wait for Commands...
10,650,400 UART: [fwproc] Recv command 0x46574c44
10,652,722 UART: [fwproc] Recv'd Img size: 114448 bytes
10,754,357 UART: ROM Fatal Error: 0x000B0009
10,757,984 >>> mbox cmd response: failed
10,758,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,710 >>> mbox cmd response: failed
10,758,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,759,213 >>> mbox cmd response: failed
Initializing fuses
2,050,251 writing to cptra_bootfsm_go
2,239,540 UART:
2,239,887 UART: Running Caliptra ROM ...
2,241,032 UART:
9,700,836 UART: [state] CFI Enabled
9,714,618 UART: [state] LifecycleState = Unprovisioned
9,717,024 UART: [state] DebugLocked = No
9,719,887 UART: [state] WD Timer not started. Device not locked for debugging
9,724,612 UART: [kat] SHA2-256
9,914,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,925,300 UART: [kat] ++
9,925,761 UART: [kat] sha1
9,938,542 UART: [kat] SHA2-256
9,941,522 UART: [kat] SHA2-384
9,946,111 UART: [kat] SHA2-512-ACC
9,948,682 UART: [kat] ECC-384
12,389,066 UART: [kat] HMAC-384Kdf
12,402,166 UART: [kat] LMS
12,933,989 UART: [kat] --
12,936,679 UART: [cold-reset] ++
12,939,311 UART: [fht] FHT @ 0x50003400
12,950,501 UART: [idev] ++
12,951,191 UART: [idev] CDI.KEYID = 6
12,952,128 UART: [idev] SUBJECT.KEYID = 7
12,953,337 UART: [idev] UDS.KEYID = 0
12,956,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,099,898 UART: [idev] Erasing UDS.KEYID = 0
15,434,746 UART: [idev] Sha1 KeyId Algorithm
15,455,880 UART: [idev] --
15,461,766 UART: [ldev] ++
15,462,445 UART: [ldev] CDI.KEYID = 6
15,463,333 UART: [ldev] SUBJECT.KEYID = 5
15,464,541 UART: [ldev] AUTHORITY.KEYID = 7
15,465,772 UART: [ldev] FE.KEYID = 1
15,475,639 UART: [ldev] Erasing FE.KEYID = 1
17,950,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,668,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,698,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,714,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,736,364 UART: [ldev] --
19,742,228 UART: [fwproc] Wait for Commands...
19,743,676 UART: [fwproc] Recv command 0x46574c44
19,745,664 UART: [fwproc] Recv'd Img size: 114448 bytes
23,187,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,262,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,378,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,921,213 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,757,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,539,341 >>> mbox cmd response: failed
10,539,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,238 >>> mbox cmd response: failed
10,540,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,800 >>> mbox cmd response: failed
Initializing fuses
2,046,840 writing to cptra_bootfsm_go
13,087,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,302,065 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,021 UART: [kat] SHA2-256
881,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,067 UART: [kat] ++
886,219 UART: [kat] sha1
890,367 UART: [kat] SHA2-256
892,305 UART: [kat] SHA2-384
894,892 UART: [kat] SHA2-512-ACC
896,793 UART: [kat] ECC-384
902,380 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,260 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,485 UART: [ldev] ++
1,514,653 UART: [ldev] CDI.KEYID = 6
1,515,016 UART: [ldev] SUBJECT.KEYID = 5
1,515,442 UART: [ldev] AUTHORITY.KEYID = 7
1,515,905 UART: [ldev] FE.KEYID = 1
1,521,105 UART: [ldev] Erasing FE.KEYID = 1
1,546,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,772 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,766 UART: [fwproc] Received command 0x46574c44
1,586,557 UART: [fwproc] Received Image of size 114448 bytes
1,612,359 UART: ROM Fatal Error: 0x000B0009
1,613,516 >>> mbox cmd response: failed
1,613,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,522 >>> mbox cmd response: failed
1,613,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
890,181 UART: [kat] SHA2-256
892,119 UART: [kat] SHA2-384
894,790 UART: [kat] SHA2-512-ACC
896,691 UART: [kat] ECC-384
902,140 UART: [kat] HMAC-384Kdf
906,598 UART: [kat] LMS
1,474,794 UART: [kat] --
1,475,497 UART: [cold-reset] ++
1,475,841 UART: [fht] Storing FHT @ 0x50003400
1,478,588 UART: [idev] ++
1,478,756 UART: [idev] CDI.KEYID = 6
1,479,116 UART: [idev] SUBJECT.KEYID = 7
1,479,540 UART: [idev] UDS.KEYID = 0
1,479,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,462 UART: [idev] Erasing UDS.KEYID = 0
1,504,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,928 UART: [idev] --
1,513,767 UART: [ldev] ++
1,513,935 UART: [ldev] CDI.KEYID = 6
1,514,298 UART: [ldev] SUBJECT.KEYID = 5
1,514,724 UART: [ldev] AUTHORITY.KEYID = 7
1,515,187 UART: [ldev] FE.KEYID = 1
1,520,061 UART: [ldev] Erasing FE.KEYID = 1
1,545,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,690 UART: [ldev] --
1,585,003 UART: [fwproc] Waiting for Commands...
1,585,758 UART: [fwproc] Received command 0x46574c44
1,586,549 UART: [fwproc] Received Image of size 114448 bytes
2,885,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,151 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,664 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,465,675 >>> mbox cmd response: failed
1,465,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,681 >>> mbox cmd response: failed
1,465,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,356 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,071 UART: [kat] SHA2-512-ACC
896,972 UART: [kat] ECC-384
902,773 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,687 UART: [idev] Erasing UDS.KEYID = 0
1,505,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,844 UART: [ldev] ++
1,515,012 UART: [ldev] CDI.KEYID = 6
1,515,375 UART: [ldev] SUBJECT.KEYID = 5
1,515,801 UART: [ldev] AUTHORITY.KEYID = 7
1,516,264 UART: [ldev] FE.KEYID = 1
1,521,662 UART: [ldev] Erasing FE.KEYID = 1
1,546,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,179 UART: [ldev] --
1,585,544 UART: [fwproc] Waiting for Commands...
1,586,413 UART: [fwproc] Received command 0x46574c44
1,587,204 UART: [fwproc] Received Image of size 114448 bytes
1,612,842 UART: ROM Fatal Error: 0x000B0009
1,613,999 >>> mbox cmd response: failed
1,613,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,005 >>> mbox cmd response: failed
1,614,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,352 UART: [kat] SHA2-256
882,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,398 UART: [kat] ++
886,550 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,717 UART: [kat] SHA2-512-ACC
897,618 UART: [kat] ECC-384
903,525 UART: [kat] HMAC-384Kdf
908,087 UART: [kat] LMS
1,476,283 UART: [kat] --
1,477,348 UART: [cold-reset] ++
1,477,776 UART: [fht] Storing FHT @ 0x50003400
1,480,563 UART: [idev] ++
1,480,731 UART: [idev] CDI.KEYID = 6
1,481,091 UART: [idev] SUBJECT.KEYID = 7
1,481,515 UART: [idev] UDS.KEYID = 0
1,481,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,845 UART: [idev] Erasing UDS.KEYID = 0
1,506,339 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,747 UART: [idev] --
1,515,738 UART: [ldev] ++
1,515,906 UART: [ldev] CDI.KEYID = 6
1,516,269 UART: [ldev] SUBJECT.KEYID = 5
1,516,695 UART: [ldev] AUTHORITY.KEYID = 7
1,517,158 UART: [ldev] FE.KEYID = 1
1,522,534 UART: [ldev] Erasing FE.KEYID = 1
1,548,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,561 UART: [ldev] --
1,587,972 UART: [fwproc] Waiting for Commands...
1,588,637 UART: [fwproc] Received command 0x46574c44
1,589,428 UART: [fwproc] Received Image of size 114448 bytes
2,887,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,213 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,572 >>> mbox cmd response: failed
1,466,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,578 >>> mbox cmd response: failed
1,466,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,807 UART: [kat] SHA2-256
903,747 UART: [kat] SHA2-384
906,526 UART: [kat] SHA2-512-ACC
908,427 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,342 UART: [kat] LMS
1,170,670 UART: [kat] --
1,171,385 UART: [cold-reset] ++
1,171,881 UART: [fht] FHT @ 0x50003400
1,174,656 UART: [idev] ++
1,174,824 UART: [idev] CDI.KEYID = 6
1,175,184 UART: [idev] SUBJECT.KEYID = 7
1,175,608 UART: [idev] UDS.KEYID = 0
1,175,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,539 UART: [idev] Sha1 KeyId Algorithm
1,208,845 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,560 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,098 UART: ROM Fatal Error: 0x000B0009
1,309,255 >>> mbox cmd response: failed
1,309,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,261 >>> mbox cmd response: failed
1,309,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,955 UART: [cold-reset] ++
1,172,463 UART: [fht] FHT @ 0x50003400
1,175,294 UART: [idev] ++
1,175,462 UART: [idev] CDI.KEYID = 6
1,175,822 UART: [idev] SUBJECT.KEYID = 7
1,176,246 UART: [idev] UDS.KEYID = 0
1,176,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,337 UART: [idev] --
1,210,363 UART: [ldev] ++
1,210,531 UART: [ldev] CDI.KEYID = 6
1,210,894 UART: [ldev] SUBJECT.KEYID = 5
1,211,320 UART: [ldev] AUTHORITY.KEYID = 7
1,211,783 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,396 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,873 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,498 >>> mbox cmd response: failed
1,164,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,504 >>> mbox cmd response: failed
1,164,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,420 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,523 UART: [kat] SHA2-512-ACC
908,424 UART: [kat] ECC-384
918,407 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,660 UART: [fht] FHT @ 0x50003400
1,175,201 UART: [idev] ++
1,175,369 UART: [idev] CDI.KEYID = 6
1,175,729 UART: [idev] SUBJECT.KEYID = 7
1,176,153 UART: [idev] UDS.KEYID = 0
1,176,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,257 UART: [idev] Erasing UDS.KEYID = 0
1,201,156 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,494 UART: [ldev] Erasing FE.KEYID = 1
1,244,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,484 UART: [ldev] --
1,283,911 UART: [fwproc] Wait for Commands...
1,284,497 UART: [fwproc] Recv command 0x46574c44
1,285,225 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,107 UART: ROM Fatal Error: 0x000B0009
1,311,264 >>> mbox cmd response: failed
1,311,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,270 >>> mbox cmd response: failed
1,311,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,629 UART: [kat] LMS
1,171,957 UART: [kat] --
1,172,808 UART: [cold-reset] ++
1,173,192 UART: [fht] FHT @ 0x50003400
1,175,875 UART: [idev] ++
1,176,043 UART: [idev] CDI.KEYID = 6
1,176,403 UART: [idev] SUBJECT.KEYID = 7
1,176,827 UART: [idev] UDS.KEYID = 0
1,177,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,201,642 UART: [idev] Sha1 KeyId Algorithm
1,210,178 UART: [idev] --
1,211,238 UART: [ldev] ++
1,211,406 UART: [ldev] CDI.KEYID = 6
1,211,769 UART: [ldev] SUBJECT.KEYID = 5
1,212,195 UART: [ldev] AUTHORITY.KEYID = 7
1,212,658 UART: [ldev] FE.KEYID = 1
1,217,740 UART: [ldev] Erasing FE.KEYID = 1
1,243,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,518 UART: [ldev] --
1,282,983 UART: [fwproc] Wait for Commands...
1,283,717 UART: [fwproc] Recv command 0x46574c44
1,284,445 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,165,797 >>> mbox cmd response: failed
1,165,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,803 >>> mbox cmd response: failed
1,165,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,077 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,320 UART: [kat] LMS
1,168,632 UART: [kat] --
1,169,631 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,174,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,155 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,790 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,740 UART: ROM Fatal Error: 0x000B0009
1,308,897 >>> mbox cmd response: failed
1,308,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,903 >>> mbox cmd response: failed
1,308,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,927 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,078 >>> mbox cmd response: failed
1,161,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,084 >>> mbox cmd response: failed
1,161,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
917,419 UART: [kat] HMAC-384Kdf
921,837 UART: [kat] LMS
1,170,149 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,374 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,175,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,474 UART: [idev] Sha1 KeyId Algorithm
1,209,270 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,103 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,417 UART: ROM Fatal Error: 0x000B0009
1,310,574 >>> mbox cmd response: failed
1,310,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,580 >>> mbox cmd response: failed
1,310,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,429 UART: [kat] SHA2-256
891,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,108 UART: [kat] ++
896,260 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,921 UART: [kat] HMAC-384Kdf
921,553 UART: [kat] LMS
1,169,865 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,174,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,199,800 UART: [idev] Sha1 KeyId Algorithm
1,208,678 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,708 UART: [fwproc] Recv command 0x46574c44
1,284,441 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,519 >>> mbox cmd response: failed
1,161,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,525 >>> mbox cmd response: failed
1,161,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,404 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,363 UART:
192,716 UART: Running Caliptra ROM ...
193,903 UART:
194,059 UART: [state] CFI Enabled
265,168 UART: [state] LifecycleState = Unprovisioned
267,122 UART: [state] DebugLocked = No
269,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,828 UART: [kat] SHA2-256
444,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,044 UART: [kat] ++
455,579 UART: [kat] sha1
466,676 UART: [kat] SHA2-256
469,367 UART: [kat] SHA2-384
475,613 UART: [kat] SHA2-512-ACC
478,006 UART: [kat] ECC-384
2,769,021 UART: [kat] HMAC-384Kdf
2,798,584 UART: [kat] LMS
3,988,924 UART: [kat] --
3,994,269 UART: [cold-reset] ++
3,995,555 UART: [fht] Storing FHT @ 0x50003400
4,006,643 UART: [idev] ++
4,007,234 UART: [idev] CDI.KEYID = 6
4,008,180 UART: [idev] SUBJECT.KEYID = 7
4,009,457 UART: [idev] UDS.KEYID = 0
4,012,201 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,416 UART: [idev] Erasing UDS.KEYID = 0
7,344,928 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,723 UART: [idev] --
7,369,374 UART: [ldev] ++
7,369,953 UART: [ldev] CDI.KEYID = 6
7,370,922 UART: [ldev] SUBJECT.KEYID = 5
7,372,139 UART: [ldev] AUTHORITY.KEYID = 7
7,373,371 UART: [ldev] FE.KEYID = 1
7,400,834 UART: [ldev] Erasing FE.KEYID = 1
10,730,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,745 UART: [ldev] --
13,096,170 UART: [fwproc] Waiting for Commands...
13,099,192 UART: [fwproc] Received command 0x46574c44
13,101,437 UART: [fwproc] Received Image of size 114124 bytes
14,493,711 UART: ROM Fatal Error: 0x000B000C
14,497,198 >>> mbox cmd response: failed
14,497,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,977 >>> mbox cmd response: failed
14,498,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,542 >>> mbox cmd response: failed
Initializing fuses
2,055,265 writing to cptra_bootfsm_go
2,244,629 UART:
2,244,992 UART: Running Caliptra ROM ...
2,246,156 UART:
2,246,331 UART: [state] CFI Enabled
2,314,088 UART: [state] LifecycleState = Unprovisioned
2,316,023 UART: [state] DebugLocked = No
2,318,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,356 UART: [kat] SHA2-256
2,493,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,556 UART: [kat] ++
2,504,104 UART: [kat] sha1
2,515,005 UART: [kat] SHA2-256
2,517,716 UART: [kat] SHA2-384
2,523,599 UART: [kat] SHA2-512-ACC
2,525,951 UART: [kat] ECC-384
4,817,545 UART: [kat] HMAC-384Kdf
4,849,167 UART: [kat] LMS
6,039,431 UART: [kat] --
6,045,390 UART: [cold-reset] ++
6,046,736 UART: [fht] Storing FHT @ 0x50003400
6,059,412 UART: [idev] ++
6,060,015 UART: [idev] CDI.KEYID = 6
6,060,906 UART: [idev] SUBJECT.KEYID = 7
6,062,179 UART: [idev] UDS.KEYID = 0
6,064,627 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,160 UART: [idev] Erasing UDS.KEYID = 0
9,396,530 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,732 UART: [idev] --
9,421,098 UART: [ldev] ++
9,421,672 UART: [ldev] CDI.KEYID = 6
9,422,614 UART: [ldev] SUBJECT.KEYID = 5
9,423,876 UART: [ldev] AUTHORITY.KEYID = 7
9,425,030 UART: [ldev] FE.KEYID = 1
9,465,245 UART: [ldev] Erasing FE.KEYID = 1
12,794,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,985 UART: [ldev] --
15,158,390 UART: [fwproc] Waiting for Commands...
15,160,706 UART: [fwproc] Received command 0x46574c44
15,162,894 UART: [fwproc] Received Image of size 114124 bytes
19,213,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,287,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,356,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,674,103 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,787,244 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,229,872 >>> mbox cmd response: failed
14,230,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,230,805 >>> mbox cmd response: failed
14,231,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,231,388 >>> mbox cmd response: failed
Initializing fuses
2,047,908 writing to cptra_bootfsm_go
5,834,711 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,906,681 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,683 UART:
193,038 UART: Running Caliptra ROM ...
194,144 UART:
603,913 UART: [state] CFI Enabled
615,784 UART: [state] LifecycleState = Unprovisioned
617,714 UART: [state] DebugLocked = No
620,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,213 UART: [kat] SHA2-256
793,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,467 UART: [kat] ++
804,914 UART: [kat] sha1
816,923 UART: [kat] SHA2-256
819,607 UART: [kat] SHA2-384
825,800 UART: [kat] SHA2-512-ACC
828,197 UART: [kat] ECC-384
3,112,607 UART: [kat] HMAC-384Kdf
3,125,169 UART: [kat] LMS
4,315,282 UART: [kat] --
4,319,005 UART: [cold-reset] ++
4,320,038 UART: [fht] Storing FHT @ 0x50003400
4,332,323 UART: [idev] ++
4,332,893 UART: [idev] CDI.KEYID = 6
4,333,837 UART: [idev] SUBJECT.KEYID = 7
4,335,110 UART: [idev] UDS.KEYID = 0
4,338,104 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,667 UART: [idev] Erasing UDS.KEYID = 0
7,620,700 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,720 UART: [idev] --
7,646,526 UART: [ldev] ++
7,647,103 UART: [ldev] CDI.KEYID = 6
7,648,123 UART: [ldev] SUBJECT.KEYID = 5
7,649,282 UART: [ldev] AUTHORITY.KEYID = 7
7,650,514 UART: [ldev] FE.KEYID = 1
7,660,415 UART: [ldev] Erasing FE.KEYID = 1
10,949,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,338 UART: [ldev] --
13,310,144 UART: [fwproc] Waiting for Commands...
13,313,270 UART: [fwproc] Received command 0x46574c44
13,315,458 UART: [fwproc] Received Image of size 114124 bytes
14,705,917 UART: ROM Fatal Error: 0x000B000C
14,709,427 >>> mbox cmd response: failed
14,709,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,710,079 >>> mbox cmd response: failed
14,710,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,710,685 >>> mbox cmd response: failed
Initializing fuses
2,056,999 writing to cptra_bootfsm_go
2,246,278 UART:
2,246,632 UART: Running Caliptra ROM ...
2,247,682 UART:
5,756,906 UART: [state] CFI Enabled
5,772,696 UART: [state] LifecycleState = Unprovisioned
5,774,679 UART: [state] DebugLocked = No
5,776,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,781,136 UART: [kat] SHA2-256
5,950,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,961,411 UART: [kat] ++
5,961,907 UART: [kat] sha1
5,972,745 UART: [kat] SHA2-256
5,975,493 UART: [kat] SHA2-384
5,980,563 UART: [kat] SHA2-512-ACC
5,982,945 UART: [kat] ECC-384
8,266,717 UART: [kat] HMAC-384Kdf
8,277,110 UART: [kat] LMS
9,467,215 UART: [kat] --
9,471,352 UART: [cold-reset] ++
9,473,503 UART: [fht] Storing FHT @ 0x50003400
9,484,664 UART: [idev] ++
9,485,235 UART: [idev] CDI.KEYID = 6
9,486,253 UART: [idev] SUBJECT.KEYID = 7
9,487,417 UART: [idev] UDS.KEYID = 0
9,490,159 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,633,627 UART: [idev] Erasing UDS.KEYID = 0
12,777,454 UART: [idev] Using Sha1 for KeyId Algorithm
12,799,366 UART: [idev] --
12,804,090 UART: [ldev] ++
12,804,671 UART: [ldev] CDI.KEYID = 6
12,805,636 UART: [ldev] SUBJECT.KEYID = 5
12,806,892 UART: [ldev] AUTHORITY.KEYID = 7
12,808,049 UART: [ldev] FE.KEYID = 1
12,820,240 UART: [ldev] Erasing FE.KEYID = 1
16,111,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,403,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,418,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,433,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,447,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,467,747 UART: [ldev] --
18,473,328 UART: [fwproc] Waiting for Commands...
18,475,488 UART: [fwproc] Received command 0x46574c44
18,477,744 UART: [fwproc] Received Image of size 114124 bytes
22,525,414 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,605,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,674,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,992,176 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,134,795 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,454,154 >>> mbox cmd response: failed
14,454,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,455,061 >>> mbox cmd response: failed
14,455,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,455,640 >>> mbox cmd response: failed
Initializing fuses
2,052,659 writing to cptra_bootfsm_go
9,540,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,484,760 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,243 UART:
192,594 UART: Running Caliptra ROM ...
193,776 UART:
193,925 UART: [state] CFI Enabled
263,225 UART: [state] LifecycleState = Unprovisioned
265,152 UART: [state] DebugLocked = No
267,073 UART: [state] WD Timer not started. Device not locked for debugging
270,370 UART: [kat] SHA2-256
449,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,089 UART: [kat] ++
461,626 UART: [kat] sha1
472,668 UART: [kat] SHA2-256
475,669 UART: [kat] SHA2-384
482,192 UART: [kat] SHA2-512-ACC
485,110 UART: [kat] ECC-384
2,946,203 UART: [kat] HMAC-384Kdf
2,971,882 UART: [kat] LMS
3,501,331 UART: [kat] --
3,505,390 UART: [cold-reset] ++
3,506,726 UART: [fht] FHT @ 0x50003400
3,518,571 UART: [idev] ++
3,519,337 UART: [idev] CDI.KEYID = 6
3,520,231 UART: [idev] SUBJECT.KEYID = 7
3,521,354 UART: [idev] UDS.KEYID = 0
3,524,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,054 UART: [idev] Erasing UDS.KEYID = 0
6,029,289 UART: [idev] Sha1 KeyId Algorithm
6,051,857 UART: [idev] --
6,056,561 UART: [ldev] ++
6,057,136 UART: [ldev] CDI.KEYID = 6
6,058,208 UART: [ldev] SUBJECT.KEYID = 5
6,059,322 UART: [ldev] AUTHORITY.KEYID = 7
6,060,501 UART: [ldev] FE.KEYID = 1
6,101,888 UART: [ldev] Erasing FE.KEYID = 1
8,606,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,408 UART: [ldev] --
10,414,172 UART: [fwproc] Wait for Commands...
10,416,227 UART: [fwproc] Recv command 0x46574c44
10,418,325 UART: [fwproc] Recv'd Img size: 114448 bytes
11,476,800 UART: ROM Fatal Error: 0x000B000C
11,479,893 >>> mbox cmd response: failed
11,480,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,480,690 >>> mbox cmd response: failed
11,480,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,258 >>> mbox cmd response: failed
Initializing fuses
2,049,920 writing to cptra_bootfsm_go
2,239,260 UART:
2,239,638 UART: Running Caliptra ROM ...
2,240,775 UART:
2,240,949 UART: [state] CFI Enabled
2,308,794 UART: [state] LifecycleState = Unprovisioned
2,310,710 UART: [state] DebugLocked = No
2,312,050 UART: [state] WD Timer not started. Device not locked for debugging
2,316,505 UART: [kat] SHA2-256
2,495,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,212 UART: [kat] ++
2,507,673 UART: [kat] sha1
2,518,016 UART: [kat] SHA2-256
2,521,027 UART: [kat] SHA2-384
2,526,701 UART: [kat] SHA2-512-ACC
2,529,648 UART: [kat] ECC-384
4,991,086 UART: [kat] HMAC-384Kdf
5,016,319 UART: [kat] LMS
5,545,752 UART: [kat] --
5,551,085 UART: [cold-reset] ++
5,553,178 UART: [fht] FHT @ 0x50003400
5,564,313 UART: [idev] ++
5,564,913 UART: [idev] CDI.KEYID = 6
5,565,828 UART: [idev] SUBJECT.KEYID = 7
5,567,043 UART: [idev] UDS.KEYID = 0
5,569,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,501 UART: [idev] Erasing UDS.KEYID = 0
8,070,261 UART: [idev] Sha1 KeyId Algorithm
8,094,245 UART: [idev] --
8,098,399 UART: [ldev] ++
8,098,980 UART: [ldev] CDI.KEYID = 6
8,099,864 UART: [ldev] SUBJECT.KEYID = 5
8,101,080 UART: [ldev] AUTHORITY.KEYID = 7
8,102,236 UART: [ldev] FE.KEYID = 1
8,144,694 UART: [ldev] Erasing FE.KEYID = 1
10,648,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,284 UART: [ldev] --
12,462,314 UART: [fwproc] Wait for Commands...
12,465,223 UART: [fwproc] Recv command 0x46574c44
12,467,318 UART: [fwproc] Recv'd Img size: 114448 bytes
15,871,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,947,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,016,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,335,581 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,350,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,217,081 >>> mbox cmd response: failed
11,217,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,217,986 >>> mbox cmd response: failed
11,218,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,218,540 >>> mbox cmd response: failed
Initializing fuses
2,046,894 writing to cptra_bootfsm_go
5,424,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,134,762 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,494 UART:
192,858 UART: Running Caliptra ROM ...
193,984 UART:
603,639 UART: [state] CFI Enabled
617,633 UART: [state] LifecycleState = Unprovisioned
619,476 UART: [state] DebugLocked = No
622,260 UART: [state] WD Timer not started. Device not locked for debugging
626,296 UART: [kat] SHA2-256
805,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,995 UART: [kat] ++
817,526 UART: [kat] sha1
829,218 UART: [kat] SHA2-256
832,285 UART: [kat] SHA2-384
838,703 UART: [kat] SHA2-512-ACC
841,639 UART: [kat] ECC-384
3,282,314 UART: [kat] HMAC-384Kdf
3,294,767 UART: [kat] LMS
3,824,217 UART: [kat] --
3,829,611 UART: [cold-reset] ++
3,830,516 UART: [fht] FHT @ 0x50003400
3,842,138 UART: [idev] ++
3,842,702 UART: [idev] CDI.KEYID = 6
3,843,610 UART: [idev] SUBJECT.KEYID = 7
3,844,823 UART: [idev] UDS.KEYID = 0
3,847,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,428 UART: [idev] Erasing UDS.KEYID = 0
6,321,747 UART: [idev] Sha1 KeyId Algorithm
6,345,415 UART: [idev] --
6,349,351 UART: [ldev] ++
6,349,930 UART: [ldev] CDI.KEYID = 6
6,350,817 UART: [ldev] SUBJECT.KEYID = 5
6,351,973 UART: [ldev] AUTHORITY.KEYID = 7
6,353,260 UART: [ldev] FE.KEYID = 1
6,363,477 UART: [ldev] Erasing FE.KEYID = 1
8,834,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,832 UART: [ldev] --
10,624,645 UART: [fwproc] Wait for Commands...
10,626,743 UART: [fwproc] Recv command 0x46574c44
10,628,842 UART: [fwproc] Recv'd Img size: 114448 bytes
11,690,304 UART: ROM Fatal Error: 0x000B000C
11,693,437 >>> mbox cmd response: failed
11,693,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,694,186 >>> mbox cmd response: failed
11,694,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,694,739 >>> mbox cmd response: failed
Initializing fuses
2,056,398 writing to cptra_bootfsm_go
2,245,720 UART:
2,246,067 UART: Running Caliptra ROM ...
2,247,399 UART:
8,762,968 UART: [state] CFI Enabled
8,777,135 UART: [state] LifecycleState = Unprovisioned
8,778,990 UART: [state] DebugLocked = No
8,780,342 UART: [state] WD Timer not started. Device not locked for debugging
8,783,618 UART: [kat] SHA2-256
8,962,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,974,285 UART: [kat] ++
8,974,746 UART: [kat] sha1
8,985,361 UART: [kat] SHA2-256
8,988,378 UART: [kat] SHA2-384
8,995,281 UART: [kat] SHA2-512-ACC
8,998,235 UART: [kat] ECC-384
11,440,498 UART: [kat] HMAC-384Kdf
11,452,761 UART: [kat] LMS
11,982,280 UART: [kat] --
11,986,374 UART: [cold-reset] ++
11,988,189 UART: [fht] FHT @ 0x50003400
11,999,383 UART: [idev] ++
11,999,946 UART: [idev] CDI.KEYID = 6
12,000,843 UART: [idev] SUBJECT.KEYID = 7
12,002,060 UART: [idev] UDS.KEYID = 0
12,004,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,148,604 UART: [idev] Erasing UDS.KEYID = 0
14,472,935 UART: [idev] Sha1 KeyId Algorithm
14,495,838 UART: [idev] --
14,499,104 UART: [ldev] ++
14,499,681 UART: [ldev] CDI.KEYID = 6
14,500,561 UART: [ldev] SUBJECT.KEYID = 5
14,501,774 UART: [ldev] AUTHORITY.KEYID = 7
14,503,007 UART: [ldev] FE.KEYID = 1
14,513,954 UART: [ldev] Erasing FE.KEYID = 1
16,990,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,709,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,725,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,741,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,757,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,777,161 UART: [ldev] --
18,781,395 UART: [fwproc] Wait for Commands...
18,782,896 UART: [fwproc] Recv command 0x46574c44
18,785,004 UART: [fwproc] Recv'd Img size: 114448 bytes
22,187,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,260,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,329,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,647,890 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
3,700,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,474,446 >>> mbox cmd response: failed
11,474,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,475,334 >>> mbox cmd response: failed
11,475,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,475,896 >>> mbox cmd response: failed
Initializing fuses
2,050,412 writing to cptra_bootfsm_go
12,085,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,649,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,061 UART:
192,422 UART: Running Caliptra ROM ...
193,613 UART:
193,771 UART: [state] CFI Enabled
262,831 UART: [state] LifecycleState = Unprovisioned
265,192 UART: [state] DebugLocked = No
266,832 UART: [state] WD Timer not started. Device not locked for debugging
271,836 UART: [kat] SHA2-256
461,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,485 UART: [kat] ++
472,985 UART: [kat] sha1
483,870 UART: [kat] SHA2-256
486,890 UART: [kat] SHA2-384
491,737 UART: [kat] SHA2-512-ACC
494,359 UART: [kat] ECC-384
2,947,433 UART: [kat] HMAC-384Kdf
2,970,758 UART: [kat] LMS
3,502,506 UART: [kat] --
3,505,594 UART: [cold-reset] ++
3,507,431 UART: [fht] FHT @ 0x50003400
3,518,797 UART: [idev] ++
3,519,469 UART: [idev] CDI.KEYID = 6
3,520,403 UART: [idev] SUBJECT.KEYID = 7
3,521,609 UART: [idev] UDS.KEYID = 0
3,524,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,533 UART: [idev] Erasing UDS.KEYID = 0
6,028,335 UART: [idev] Sha1 KeyId Algorithm
6,050,823 UART: [idev] --
6,057,095 UART: [ldev] ++
6,057,783 UART: [ldev] CDI.KEYID = 6
6,058,672 UART: [ldev] SUBJECT.KEYID = 5
6,059,792 UART: [ldev] AUTHORITY.KEYID = 7
6,060,998 UART: [ldev] FE.KEYID = 1
6,099,630 UART: [ldev] Erasing FE.KEYID = 1
8,603,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,891 UART: [ldev] --
10,413,074 UART: [fwproc] Wait for Commands...
10,416,202 UART: [fwproc] Recv command 0x46574c44
10,418,540 UART: [fwproc] Recv'd Img size: 114448 bytes
11,513,069 UART: ROM Fatal Error: 0x000B000C
11,516,738 >>> mbox cmd response: failed
11,517,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,501 >>> mbox cmd response: failed
11,517,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,518,061 >>> mbox cmd response: failed
Initializing fuses
2,052,252 writing to cptra_bootfsm_go
2,241,548 UART:
2,241,879 UART: Running Caliptra ROM ...
2,242,928 UART:
2,243,080 UART: [state] CFI Enabled
2,314,792 UART: [state] LifecycleState = Unprovisioned
2,317,169 UART: [state] DebugLocked = No
2,318,745 UART: [state] WD Timer not started. Device not locked for debugging
2,323,522 UART: [kat] SHA2-256
2,513,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,203 UART: [kat] ++
2,524,663 UART: [kat] sha1
2,536,684 UART: [kat] SHA2-256
2,539,710 UART: [kat] SHA2-384
2,546,037 UART: [kat] SHA2-512-ACC
2,548,665 UART: [kat] ECC-384
4,999,576 UART: [kat] HMAC-384Kdf
5,022,125 UART: [kat] LMS
5,553,935 UART: [kat] --
5,558,263 UART: [cold-reset] ++
5,560,627 UART: [fht] FHT @ 0x50003400
5,572,169 UART: [idev] ++
5,572,851 UART: [idev] CDI.KEYID = 6
5,573,818 UART: [idev] SUBJECT.KEYID = 7
5,575,033 UART: [idev] UDS.KEYID = 0
5,577,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,721,556 UART: [idev] Erasing UDS.KEYID = 0
8,080,958 UART: [idev] Sha1 KeyId Algorithm
8,103,163 UART: [idev] --
8,108,076 UART: [ldev] ++
8,108,763 UART: [ldev] CDI.KEYID = 6
8,109,842 UART: [ldev] SUBJECT.KEYID = 5
8,110,970 UART: [ldev] AUTHORITY.KEYID = 7
8,112,067 UART: [ldev] FE.KEYID = 1
8,149,520 UART: [ldev] Erasing FE.KEYID = 1
10,657,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,810 UART: [ldev] --
12,463,919 UART: [fwproc] Wait for Commands...
12,465,964 UART: [fwproc] Recv command 0x46574c44
12,468,280 UART: [fwproc] Recv'd Img size: 114448 bytes
15,917,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,117,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,659,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,440,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,311,924 >>> mbox cmd response: failed
11,312,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,242 >>> mbox cmd response: failed
11,313,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,803 >>> mbox cmd response: failed
Initializing fuses
2,046,846 writing to cptra_bootfsm_go
5,476,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,769,225 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
192,726 UART:
193,080 UART: Running Caliptra ROM ...
194,281 UART:
603,890 UART: [state] CFI Enabled
619,499 UART: [state] LifecycleState = Unprovisioned
621,854 UART: [state] DebugLocked = No
623,964 UART: [state] WD Timer not started. Device not locked for debugging
627,939 UART: [kat] SHA2-256
817,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,576 UART: [kat] ++
829,085 UART: [kat] sha1
840,940 UART: [kat] SHA2-256
843,949 UART: [kat] SHA2-384
849,062 UART: [kat] SHA2-512-ACC
851,680 UART: [kat] ECC-384
3,294,063 UART: [kat] HMAC-384Kdf
3,308,007 UART: [kat] LMS
3,839,825 UART: [kat] --
3,844,466 UART: [cold-reset] ++
3,845,592 UART: [fht] FHT @ 0x50003400
3,857,442 UART: [idev] ++
3,858,129 UART: [idev] CDI.KEYID = 6
3,859,109 UART: [idev] SUBJECT.KEYID = 7
3,860,268 UART: [idev] UDS.KEYID = 0
3,863,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,120 UART: [idev] Erasing UDS.KEYID = 0
6,335,340 UART: [idev] Sha1 KeyId Algorithm
6,358,629 UART: [idev] --
6,362,948 UART: [ldev] ++
6,363,625 UART: [ldev] CDI.KEYID = 6
6,364,535 UART: [ldev] SUBJECT.KEYID = 5
6,365,751 UART: [ldev] AUTHORITY.KEYID = 7
6,366,927 UART: [ldev] FE.KEYID = 1
6,378,057 UART: [ldev] Erasing FE.KEYID = 1
8,855,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,791 UART: [ldev] --
10,648,930 UART: [fwproc] Wait for Commands...
10,651,048 UART: [fwproc] Recv command 0x46574c44
10,653,366 UART: [fwproc] Recv'd Img size: 114448 bytes
11,744,671 UART: ROM Fatal Error: 0x000B000C
11,748,287 >>> mbox cmd response: failed
11,748,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,748,947 >>> mbox cmd response: failed
11,749,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,749,542 >>> mbox cmd response: failed
Initializing fuses
2,052,389 writing to cptra_bootfsm_go
2,241,688 UART:
2,242,039 UART: Running Caliptra ROM ...
2,243,087 UART:
8,706,413 UART: [state] CFI Enabled
8,720,167 UART: [state] LifecycleState = Unprovisioned
8,722,546 UART: [state] DebugLocked = No
8,724,666 UART: [state] WD Timer not started. Device not locked for debugging
8,729,983 UART: [kat] SHA2-256
8,919,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,930,660 UART: [kat] ++
8,931,173 UART: [kat] sha1
8,941,469 UART: [kat] SHA2-256
8,944,492 UART: [kat] SHA2-384
8,949,477 UART: [kat] SHA2-512-ACC
8,952,086 UART: [kat] ECC-384
11,398,052 UART: [kat] HMAC-384Kdf
11,411,313 UART: [kat] LMS
11,943,155 UART: [kat] --
11,948,863 UART: [cold-reset] ++
11,950,432 UART: [fht] FHT @ 0x50003400
11,962,388 UART: [idev] ++
11,963,121 UART: [idev] CDI.KEYID = 6
11,964,000 UART: [idev] SUBJECT.KEYID = 7
11,965,269 UART: [idev] UDS.KEYID = 0
11,968,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,112,147 UART: [idev] Erasing UDS.KEYID = 0
14,444,847 UART: [idev] Sha1 KeyId Algorithm
14,466,785 UART: [idev] --
14,472,627 UART: [ldev] ++
14,473,344 UART: [ldev] CDI.KEYID = 6
14,474,227 UART: [ldev] SUBJECT.KEYID = 5
14,475,331 UART: [ldev] AUTHORITY.KEYID = 7
14,476,621 UART: [ldev] FE.KEYID = 1
14,488,805 UART: [ldev] Erasing FE.KEYID = 1
16,966,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,684,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,699,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,714,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,729,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,749,078 UART: [ldev] --
18,754,449 UART: [fwproc] Wait for Commands...
18,756,607 UART: [fwproc] Recv command 0x46574c44
18,758,917 UART: [fwproc] Recv'd Img size: 114448 bytes
22,208,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,290,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,406,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,949,749 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,753,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,524,760 >>> mbox cmd response: failed
11,525,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,525,788 >>> mbox cmd response: failed
11,526,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,526,345 >>> mbox cmd response: failed
Initializing fuses
2,055,118 writing to cptra_bootfsm_go
12,092,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,294,273 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,413 UART: [kat] SHA2-256
882,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,459 UART: [kat] ++
886,611 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,528 UART: [kat] SHA2-512-ACC
897,429 UART: [kat] ECC-384
903,034 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,651 UART: [cold-reset] ++
1,477,193 UART: [fht] Storing FHT @ 0x50003400
1,479,912 UART: [idev] ++
1,480,080 UART: [idev] CDI.KEYID = 6
1,480,440 UART: [idev] SUBJECT.KEYID = 7
1,480,864 UART: [idev] UDS.KEYID = 0
1,481,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,618 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,534 UART: [idev] --
1,514,455 UART: [ldev] ++
1,514,623 UART: [ldev] CDI.KEYID = 6
1,514,986 UART: [ldev] SUBJECT.KEYID = 5
1,515,412 UART: [ldev] AUTHORITY.KEYID = 7
1,515,875 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,546,992 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,728 UART: [ldev] --
1,586,119 UART: [fwproc] Waiting for Commands...
1,586,844 UART: [fwproc] Received command 0x46574c44
1,587,635 UART: [fwproc] Received Image of size 114448 bytes
1,626,339 UART: ROM Fatal Error: 0x000B000C
1,627,498 >>> mbox cmd response: failed
1,627,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,504 >>> mbox cmd response: failed
1,627,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,269 UART: [kat] SHA2-256
882,200 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,315 UART: [kat] ++
886,467 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,704 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,640 UART: [idev] ++
1,479,808 UART: [idev] CDI.KEYID = 6
1,480,168 UART: [idev] SUBJECT.KEYID = 7
1,480,592 UART: [idev] UDS.KEYID = 0
1,480,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,542 UART: [idev] Erasing UDS.KEYID = 0
1,504,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,366 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,520,771 UART: [ldev] Erasing FE.KEYID = 1
1,546,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,260 UART: [ldev] --
1,585,637 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 114448 bytes
2,885,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,192 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,023 >>> mbox cmd response: failed
1,477,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,029 >>> mbox cmd response: failed
1,477,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,047 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,286 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,369 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,605 UART: [idev] --
1,515,700 UART: [ldev] ++
1,515,868 UART: [ldev] CDI.KEYID = 6
1,516,231 UART: [ldev] SUBJECT.KEYID = 5
1,516,657 UART: [ldev] AUTHORITY.KEYID = 7
1,517,120 UART: [ldev] FE.KEYID = 1
1,522,190 UART: [ldev] Erasing FE.KEYID = 1
1,548,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,755 UART: [fwproc] Received command 0x46574c44
1,588,546 UART: [fwproc] Received Image of size 114448 bytes
1,626,670 UART: ROM Fatal Error: 0x000B000C
1,627,829 >>> mbox cmd response: failed
1,627,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,835 >>> mbox cmd response: failed
1,627,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,575 UART: [kat] LMS
1,475,771 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,155 UART: [idev] ++
1,480,323 UART: [idev] CDI.KEYID = 6
1,480,683 UART: [idev] SUBJECT.KEYID = 7
1,481,107 UART: [idev] UDS.KEYID = 0
1,481,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,601 UART: [idev] --
1,515,598 UART: [ldev] ++
1,515,766 UART: [ldev] CDI.KEYID = 6
1,516,129 UART: [ldev] SUBJECT.KEYID = 5
1,516,555 UART: [ldev] AUTHORITY.KEYID = 7
1,517,018 UART: [ldev] FE.KEYID = 1
1,522,122 UART: [ldev] Erasing FE.KEYID = 1
1,547,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,529 UART: [ldev] --
1,586,844 UART: [fwproc] Waiting for Commands...
1,587,499 UART: [fwproc] Received command 0x46574c44
1,588,290 UART: [fwproc] Received Image of size 114448 bytes
2,887,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,496 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,995 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,990 >>> mbox cmd response: failed
1,478,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,996 >>> mbox cmd response: failed
1,478,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,242 UART: [idev] ++
1,175,410 UART: [idev] CDI.KEYID = 6
1,175,770 UART: [idev] SUBJECT.KEYID = 7
1,176,194 UART: [idev] UDS.KEYID = 0
1,176,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,785 UART: [idev] Sha1 KeyId Algorithm
1,209,245 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,760 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,435 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x46574c44
1,283,216 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,388 UART: ROM Fatal Error: 0x000B000C
1,322,547 >>> mbox cmd response: failed
1,322,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,553 >>> mbox cmd response: failed
1,322,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,536 UART: [state] LifecycleState = Unprovisioned
85,191 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
892,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,987 UART: [kat] ++
897,139 UART: [kat] sha1
901,359 UART: [kat] SHA2-256
903,299 UART: [kat] SHA2-384
905,976 UART: [kat] SHA2-512-ACC
907,877 UART: [kat] ECC-384
917,604 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,329 UART: [cold-reset] ++
1,171,749 UART: [fht] FHT @ 0x50003400
1,174,544 UART: [idev] ++
1,174,712 UART: [idev] CDI.KEYID = 6
1,175,072 UART: [idev] SUBJECT.KEYID = 7
1,175,496 UART: [idev] UDS.KEYID = 0
1,175,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,451 UART: [idev] Sha1 KeyId Algorithm
1,208,955 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,746 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,217,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,865 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,046 >>> mbox cmd response: failed
1,178,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,052 >>> mbox cmd response: failed
1,178,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,936 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
919,113 UART: [kat] HMAC-384Kdf
923,681 UART: [kat] LMS
1,172,009 UART: [kat] --
1,173,052 UART: [cold-reset] ++
1,173,592 UART: [fht] FHT @ 0x50003400
1,176,319 UART: [idev] ++
1,176,487 UART: [idev] CDI.KEYID = 6
1,176,847 UART: [idev] SUBJECT.KEYID = 7
1,177,271 UART: [idev] UDS.KEYID = 0
1,177,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,451 UART: [idev] Erasing UDS.KEYID = 0
1,202,418 UART: [idev] Sha1 KeyId Algorithm
1,210,826 UART: [idev] --
1,211,750 UART: [ldev] ++
1,211,918 UART: [ldev] CDI.KEYID = 6
1,212,281 UART: [ldev] SUBJECT.KEYID = 5
1,212,707 UART: [ldev] AUTHORITY.KEYID = 7
1,213,170 UART: [ldev] FE.KEYID = 1
1,218,188 UART: [ldev] Erasing FE.KEYID = 1
1,244,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,705 UART: [fwproc] Wait for Commands...
1,284,323 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,505 UART: ROM Fatal Error: 0x000B000C
1,323,664 >>> mbox cmd response: failed
1,323,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,670 >>> mbox cmd response: failed
1,323,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,060 UART: [kat] SHA2-256
904,000 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,572 UART: [cold-reset] ++
1,173,074 UART: [fht] FHT @ 0x50003400
1,175,743 UART: [idev] ++
1,175,911 UART: [idev] CDI.KEYID = 6
1,176,271 UART: [idev] SUBJECT.KEYID = 7
1,176,695 UART: [idev] UDS.KEYID = 0
1,177,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,907 UART: [idev] Erasing UDS.KEYID = 0
1,202,384 UART: [idev] Sha1 KeyId Algorithm
1,210,812 UART: [idev] --
1,211,818 UART: [ldev] ++
1,211,986 UART: [ldev] CDI.KEYID = 6
1,212,349 UART: [ldev] SUBJECT.KEYID = 5
1,212,775 UART: [ldev] AUTHORITY.KEYID = 7
1,213,238 UART: [ldev] FE.KEYID = 1
1,218,676 UART: [ldev] Erasing FE.KEYID = 1
1,245,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,592 UART: [ldev] --
1,284,895 UART: [fwproc] Wait for Commands...
1,285,617 UART: [fwproc] Recv command 0x46574c44
1,286,345 UART: [fwproc] Recv'd Img size: 114448 bytes
2,586,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,834 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,683 >>> mbox cmd response: failed
1,178,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,689 >>> mbox cmd response: failed
1,178,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,573 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,304 UART: [kat] LMS
1,169,616 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,703 UART: [idev] ++
1,173,871 UART: [idev] CDI.KEYID = 6
1,174,232 UART: [idev] SUBJECT.KEYID = 7
1,174,657 UART: [idev] UDS.KEYID = 0
1,175,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,551 UART: [idev] --
1,209,432 UART: [ldev] ++
1,209,600 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,391 UART: [ldev] AUTHORITY.KEYID = 7
1,210,854 UART: [ldev] FE.KEYID = 1
1,216,186 UART: [ldev] Erasing FE.KEYID = 1
1,242,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,470 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,774 UART: ROM Fatal Error: 0x000B000C
1,321,933 >>> mbox cmd response: failed
1,321,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,939 >>> mbox cmd response: failed
1,321,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,174,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,200,021 UART: [idev] Sha1 KeyId Algorithm
1,208,889 UART: [idev] --
1,209,872 UART: [ldev] ++
1,210,040 UART: [ldev] CDI.KEYID = 6
1,210,404 UART: [ldev] SUBJECT.KEYID = 5
1,210,831 UART: [ldev] AUTHORITY.KEYID = 7
1,211,294 UART: [ldev] FE.KEYID = 1
1,216,650 UART: [ldev] Erasing FE.KEYID = 1
1,243,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,796 UART: [ldev] --
1,282,160 UART: [fwproc] Wait for Commands...
1,282,941 UART: [fwproc] Recv command 0x46574c44
1,283,674 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,365 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,172,560 >>> mbox cmd response: failed
1,172,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,566 >>> mbox cmd response: failed
1,172,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,073 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,602 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,174,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,706 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,147 UART: [ldev] SUBJECT.KEYID = 5
1,210,574 UART: [ldev] AUTHORITY.KEYID = 7
1,211,037 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,989 UART: [fwproc] Wait for Commands...
1,283,596 UART: [fwproc] Recv command 0x46574c44
1,284,329 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,163 UART: ROM Fatal Error: 0x000B000C
1,322,322 >>> mbox cmd response: failed
1,322,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,328 >>> mbox cmd response: failed
1,322,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,529 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,171,054 UART: [fht] FHT @ 0x50003400
1,173,928 UART: [idev] ++
1,174,096 UART: [idev] CDI.KEYID = 6
1,174,457 UART: [idev] SUBJECT.KEYID = 7
1,174,882 UART: [idev] UDS.KEYID = 0
1,175,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,922 UART: [idev] Erasing UDS.KEYID = 0
1,200,518 UART: [idev] Sha1 KeyId Algorithm
1,209,372 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,915 UART: [ldev] SUBJECT.KEYID = 5
1,211,342 UART: [ldev] AUTHORITY.KEYID = 7
1,211,805 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,411 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,133 >>> mbox cmd response: failed
1,174,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,139 >>> mbox cmd response: failed
1,174,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,958 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,134 UART:
192,497 UART: Running Caliptra ROM ...
193,616 UART:
193,765 UART: [state] CFI Enabled
263,645 UART: [state] LifecycleState = Unprovisioned
265,624 UART: [state] DebugLocked = No
268,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,909 UART: [kat] SHA2-256
442,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,088 UART: [kat] ++
453,628 UART: [kat] sha1
464,673 UART: [kat] SHA2-256
467,354 UART: [kat] SHA2-384
473,063 UART: [kat] SHA2-512-ACC
475,430 UART: [kat] ECC-384
2,769,248 UART: [kat] HMAC-384Kdf
2,799,094 UART: [kat] LMS
3,989,371 UART: [kat] --
3,996,197 UART: [cold-reset] ++
3,997,657 UART: [fht] Storing FHT @ 0x50003400
4,008,881 UART: [idev] ++
4,009,458 UART: [idev] CDI.KEYID = 6
4,010,427 UART: [idev] SUBJECT.KEYID = 7
4,011,652 UART: [idev] UDS.KEYID = 0
4,014,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,128 UART: [idev] Erasing UDS.KEYID = 0
7,344,676 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,121 UART: [idev] --
7,371,525 UART: [ldev] ++
7,372,153 UART: [ldev] CDI.KEYID = 6
7,373,093 UART: [ldev] SUBJECT.KEYID = 5
7,374,314 UART: [ldev] AUTHORITY.KEYID = 7
7,375,591 UART: [ldev] FE.KEYID = 1
7,423,060 UART: [ldev] Erasing FE.KEYID = 1
10,758,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,196 UART: [ldev] --
13,137,731 UART: [fwproc] Waiting for Commands...
13,140,860 UART: [fwproc] Received command 0x46574c44
13,143,101 UART: [fwproc] Received Image of size 114124 bytes
13,243,076 UART: ROM Fatal Error: 0x000B001C
13,246,542 >>> mbox cmd response: failed
13,246,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,247,326 >>> mbox cmd response: failed
13,247,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,247,889 >>> mbox cmd response: failed
Initializing fuses
2,051,067 writing to cptra_bootfsm_go
2,240,390 UART:
2,240,805 UART: Running Caliptra ROM ...
2,241,892 UART:
2,242,054 UART: [state] CFI Enabled
2,312,122 UART: [state] LifecycleState = Unprovisioned
2,314,018 UART: [state] DebugLocked = No
2,316,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,447 UART: [kat] SHA2-256
2,491,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,656 UART: [kat] ++
2,502,143 UART: [kat] sha1
2,512,118 UART: [kat] SHA2-256
2,514,760 UART: [kat] SHA2-384
2,519,022 UART: [kat] SHA2-512-ACC
2,521,428 UART: [kat] ECC-384
4,815,088 UART: [kat] HMAC-384Kdf
4,847,861 UART: [kat] LMS
6,038,157 UART: [kat] --
6,042,092 UART: [cold-reset] ++
6,043,003 UART: [fht] Storing FHT @ 0x50003400
6,054,114 UART: [idev] ++
6,054,695 UART: [idev] CDI.KEYID = 6
6,055,608 UART: [idev] SUBJECT.KEYID = 7
6,056,880 UART: [idev] UDS.KEYID = 0
6,059,668 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,366 UART: [idev] Erasing UDS.KEYID = 0
9,396,909 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,051 UART: [idev] --
9,422,453 UART: [ldev] ++
9,423,027 UART: [ldev] CDI.KEYID = 6
9,423,993 UART: [ldev] SUBJECT.KEYID = 5
9,425,204 UART: [ldev] AUTHORITY.KEYID = 7
9,426,441 UART: [ldev] FE.KEYID = 1
9,473,318 UART: [ldev] Erasing FE.KEYID = 1
12,805,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,252 UART: [ldev] --
15,167,101 UART: [fwproc] Waiting for Commands...
15,170,331 UART: [fwproc] Received command 0x46574c44
15,172,516 UART: [fwproc] Received Image of size 114124 bytes
19,230,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,306,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,375,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,691,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,787,575 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,963,283 >>> mbox cmd response: failed
12,964,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,964,380 >>> mbox cmd response: failed
12,964,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,964,940 >>> mbox cmd response: failed
Initializing fuses
2,048,612 writing to cptra_bootfsm_go
5,838,856 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,918,422 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,418 UART:
192,815 UART: Running Caliptra ROM ...
193,968 UART:
603,466 UART: [state] CFI Enabled
616,728 UART: [state] LifecycleState = Unprovisioned
618,612 UART: [state] DebugLocked = No
621,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,109 UART: [kat] SHA2-256
795,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,432 UART: [kat] ++
806,932 UART: [kat] sha1
817,057 UART: [kat] SHA2-256
819,755 UART: [kat] SHA2-384
825,794 UART: [kat] SHA2-512-ACC
828,133 UART: [kat] ECC-384
3,112,972 UART: [kat] HMAC-384Kdf
3,124,004 UART: [kat] LMS
4,314,124 UART: [kat] --
4,317,494 UART: [cold-reset] ++
4,318,916 UART: [fht] Storing FHT @ 0x50003400
4,331,983 UART: [idev] ++
4,332,595 UART: [idev] CDI.KEYID = 6
4,333,488 UART: [idev] SUBJECT.KEYID = 7
4,334,705 UART: [idev] UDS.KEYID = 0
4,337,906 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,368 UART: [idev] Erasing UDS.KEYID = 0
7,621,361 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,798 UART: [idev] --
7,646,926 UART: [ldev] ++
7,647,495 UART: [ldev] CDI.KEYID = 6
7,648,437 UART: [ldev] SUBJECT.KEYID = 5
7,649,704 UART: [ldev] AUTHORITY.KEYID = 7
7,650,939 UART: [ldev] FE.KEYID = 1
7,661,430 UART: [ldev] Erasing FE.KEYID = 1
10,948,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,152 UART: [ldev] --
13,309,994 UART: [fwproc] Waiting for Commands...
13,312,046 UART: [fwproc] Received command 0x46574c44
13,314,235 UART: [fwproc] Received Image of size 114124 bytes
13,411,386 UART: ROM Fatal Error: 0x000B001C
13,414,847 >>> mbox cmd response: failed
13,415,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,415,601 >>> mbox cmd response: failed
13,415,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,416,162 >>> mbox cmd response: failed
Initializing fuses
2,053,378 writing to cptra_bootfsm_go
2,242,803 UART:
2,243,160 UART: Running Caliptra ROM ...
2,244,296 UART:
7,041,006 UART: [state] CFI Enabled
7,058,648 UART: [state] LifecycleState = Unprovisioned
7,060,566 UART: [state] DebugLocked = No
7,061,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,067,353 UART: [kat] SHA2-256
7,237,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,247,644 UART: [kat] ++
7,248,138 UART: [kat] sha1
7,259,089 UART: [kat] SHA2-256
7,261,792 UART: [kat] SHA2-384
7,266,941 UART: [kat] SHA2-512-ACC
7,269,292 UART: [kat] ECC-384
9,554,287 UART: [kat] HMAC-384Kdf
9,565,703 UART: [kat] LMS
10,755,792 UART: [kat] --
10,761,105 UART: [cold-reset] ++
10,763,318 UART: [fht] Storing FHT @ 0x50003400
10,775,498 UART: [idev] ++
10,776,070 UART: [idev] CDI.KEYID = 6
10,776,981 UART: [idev] SUBJECT.KEYID = 7
10,778,249 UART: [idev] UDS.KEYID = 0
10,780,878 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,924,328 UART: [idev] Erasing UDS.KEYID = 0
14,068,111 UART: [idev] Using Sha1 for KeyId Algorithm
14,091,169 UART: [idev] --
14,095,874 UART: [ldev] ++
14,096,464 UART: [ldev] CDI.KEYID = 6
14,097,352 UART: [ldev] SUBJECT.KEYID = 5
14,098,620 UART: [ldev] AUTHORITY.KEYID = 7
14,099,864 UART: [ldev] FE.KEYID = 1
14,112,822 UART: [ldev] Erasing FE.KEYID = 1
17,399,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,692,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,707,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,019 UART: [ldev] --
19,758,994 UART: [fwproc] Waiting for Commands...
19,761,961 UART: [fwproc] Received command 0x46574c44
19,764,149 UART: [fwproc] Received Image of size 114124 bytes
23,821,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,898,920 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,967,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,285,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,132,026 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,164,453 >>> mbox cmd response: failed
13,165,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,165,562 >>> mbox cmd response: failed
13,165,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,166,125 >>> mbox cmd response: failed
Initializing fuses
2,050,080 writing to cptra_bootfsm_go
10,840,568 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,782,311 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,254 UART:
192,665 UART: Running Caliptra ROM ...
193,795 UART:
193,945 UART: [state] CFI Enabled
260,874 UART: [state] LifecycleState = Unprovisioned
262,764 UART: [state] DebugLocked = No
264,682 UART: [state] WD Timer not started. Device not locked for debugging
268,293 UART: [kat] SHA2-256
447,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,978 UART: [kat] ++
459,523 UART: [kat] sha1
470,623 UART: [kat] SHA2-256
473,626 UART: [kat] SHA2-384
479,190 UART: [kat] SHA2-512-ACC
482,121 UART: [kat] ECC-384
2,946,350 UART: [kat] HMAC-384Kdf
2,970,910 UART: [kat] LMS
3,500,356 UART: [kat] --
3,504,243 UART: [cold-reset] ++
3,506,064 UART: [fht] FHT @ 0x50003400
3,517,692 UART: [idev] ++
3,518,258 UART: [idev] CDI.KEYID = 6
3,519,322 UART: [idev] SUBJECT.KEYID = 7
3,520,427 UART: [idev] UDS.KEYID = 0
3,523,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,558 UART: [idev] Erasing UDS.KEYID = 0
6,024,439 UART: [idev] Sha1 KeyId Algorithm
6,046,909 UART: [idev] --
6,050,389 UART: [ldev] ++
6,050,999 UART: [ldev] CDI.KEYID = 6
6,051,919 UART: [ldev] SUBJECT.KEYID = 5
6,053,089 UART: [ldev] AUTHORITY.KEYID = 7
6,054,332 UART: [ldev] FE.KEYID = 1
6,099,631 UART: [ldev] Erasing FE.KEYID = 1
8,599,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,853 UART: [ldev] --
10,391,119 UART: [fwproc] Wait for Commands...
10,392,628 UART: [fwproc] Recv command 0x46574c44
10,394,670 UART: [fwproc] Recv'd Img size: 114448 bytes
10,498,094 UART: ROM Fatal Error: 0x000B001C
10,501,231 >>> mbox cmd response: failed
10,501,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,003 >>> mbox cmd response: failed
10,502,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,569 >>> mbox cmd response: failed
Initializing fuses
2,053,806 writing to cptra_bootfsm_go
2,243,110 UART:
2,243,471 UART: Running Caliptra ROM ...
2,244,568 UART:
2,244,733 UART: [state] CFI Enabled
2,301,401 UART: [state] LifecycleState = Unprovisioned
2,303,285 UART: [state] DebugLocked = No
2,305,867 UART: [state] WD Timer not started. Device not locked for debugging
2,309,848 UART: [kat] SHA2-256
2,489,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,540 UART: [kat] ++
2,501,098 UART: [kat] sha1
2,511,401 UART: [kat] SHA2-256
2,514,424 UART: [kat] SHA2-384
2,521,219 UART: [kat] SHA2-512-ACC
2,524,159 UART: [kat] ECC-384
4,988,453 UART: [kat] HMAC-384Kdf
5,010,622 UART: [kat] LMS
5,540,053 UART: [kat] --
5,545,558 UART: [cold-reset] ++
5,546,405 UART: [fht] FHT @ 0x50003400
5,558,088 UART: [idev] ++
5,558,663 UART: [idev] CDI.KEYID = 6
5,559,576 UART: [idev] SUBJECT.KEYID = 7
5,560,753 UART: [idev] UDS.KEYID = 0
5,563,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,403 UART: [idev] Erasing UDS.KEYID = 0
8,065,243 UART: [idev] Sha1 KeyId Algorithm
8,089,332 UART: [idev] --
8,093,146 UART: [ldev] ++
8,093,725 UART: [ldev] CDI.KEYID = 6
8,094,641 UART: [ldev] SUBJECT.KEYID = 5
8,095,862 UART: [ldev] AUTHORITY.KEYID = 7
8,097,095 UART: [ldev] FE.KEYID = 1
8,139,981 UART: [ldev] Erasing FE.KEYID = 1
10,640,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,376,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,803 UART: [ldev] --
12,432,840 UART: [fwproc] Wait for Commands...
12,434,792 UART: [fwproc] Recv command 0x46574c44
12,436,838 UART: [fwproc] Recv'd Img size: 114448 bytes
15,843,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,990,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,309,391 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,363,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,285,638 >>> mbox cmd response: failed
10,286,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,286,640 >>> mbox cmd response: failed
10,286,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,287,230 >>> mbox cmd response: failed
Initializing fuses
2,049,903 writing to cptra_bootfsm_go
5,404,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,081,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,551 UART:
192,903 UART: Running Caliptra ROM ...
193,985 UART:
603,685 UART: [state] CFI Enabled
617,909 UART: [state] LifecycleState = Unprovisioned
619,752 UART: [state] DebugLocked = No
621,965 UART: [state] WD Timer not started. Device not locked for debugging
625,937 UART: [kat] SHA2-256
805,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,643 UART: [kat] ++
817,091 UART: [kat] sha1
828,884 UART: [kat] SHA2-256
831,887 UART: [kat] SHA2-384
837,267 UART: [kat] SHA2-512-ACC
840,251 UART: [kat] ECC-384
3,279,557 UART: [kat] HMAC-384Kdf
3,293,519 UART: [kat] LMS
3,822,981 UART: [kat] --
3,828,595 UART: [cold-reset] ++
3,829,789 UART: [fht] FHT @ 0x50003400
3,841,081 UART: [idev] ++
3,841,681 UART: [idev] CDI.KEYID = 6
3,842,592 UART: [idev] SUBJECT.KEYID = 7
3,843,753 UART: [idev] UDS.KEYID = 0
3,846,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,431 UART: [idev] Erasing UDS.KEYID = 0
6,323,378 UART: [idev] Sha1 KeyId Algorithm
6,345,697 UART: [idev] --
6,348,184 UART: [ldev] ++
6,348,755 UART: [ldev] CDI.KEYID = 6
6,349,664 UART: [ldev] SUBJECT.KEYID = 5
6,350,821 UART: [ldev] AUTHORITY.KEYID = 7
6,352,104 UART: [ldev] FE.KEYID = 1
6,362,480 UART: [ldev] Erasing FE.KEYID = 1
8,833,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,610 UART: [ldev] --
10,625,931 UART: [fwproc] Wait for Commands...
10,627,868 UART: [fwproc] Recv command 0x46574c44
10,629,912 UART: [fwproc] Recv'd Img size: 114448 bytes
10,727,815 UART: ROM Fatal Error: 0x000B001C
10,730,928 >>> mbox cmd response: failed
10,731,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,731,660 >>> mbox cmd response: failed
10,731,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,732,229 >>> mbox cmd response: failed
Initializing fuses
2,060,667 writing to cptra_bootfsm_go
2,249,960 UART:
2,250,316 UART: Running Caliptra ROM ...
2,251,399 UART:
9,722,663 UART: [state] CFI Enabled
9,738,142 UART: [state] LifecycleState = Unprovisioned
9,740,007 UART: [state] DebugLocked = No
9,741,348 UART: [state] WD Timer not started. Device not locked for debugging
9,745,056 UART: [kat] SHA2-256
9,924,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,935,746 UART: [kat] ++
9,936,301 UART: [kat] sha1
9,947,150 UART: [kat] SHA2-256
9,950,162 UART: [kat] SHA2-384
9,957,087 UART: [kat] SHA2-512-ACC
9,960,038 UART: [kat] ECC-384
12,402,257 UART: [kat] HMAC-384Kdf
12,414,848 UART: [kat] LMS
12,944,428 UART: [kat] --
12,950,738 UART: [cold-reset] ++
12,951,642 UART: [fht] FHT @ 0x50003400
12,963,483 UART: [idev] ++
12,964,050 UART: [idev] CDI.KEYID = 6
12,964,962 UART: [idev] SUBJECT.KEYID = 7
12,966,179 UART: [idev] UDS.KEYID = 0
12,969,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,113,162 UART: [idev] Erasing UDS.KEYID = 0
15,437,013 UART: [idev] Sha1 KeyId Algorithm
15,458,672 UART: [idev] --
15,462,823 UART: [ldev] ++
15,463,409 UART: [ldev] CDI.KEYID = 6
15,464,318 UART: [ldev] SUBJECT.KEYID = 5
15,465,476 UART: [ldev] AUTHORITY.KEYID = 7
15,466,762 UART: [ldev] FE.KEYID = 1
15,477,134 UART: [ldev] Erasing FE.KEYID = 1
17,951,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,699,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,715,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,687 UART: [ldev] --
19,741,002 UART: [fwproc] Wait for Commands...
19,742,617 UART: [fwproc] Recv command 0x46574c44
19,744,865 UART: [fwproc] Recv'd Img size: 114448 bytes
23,146,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,219,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,288,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,606,478 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,697,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,506,926 >>> mbox cmd response: failed
10,507,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,812 >>> mbox cmd response: failed
10,508,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,411 >>> mbox cmd response: failed
Initializing fuses
2,055,433 writing to cptra_bootfsm_go
13,058,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,633,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,129 UART:
192,489 UART: Running Caliptra ROM ...
193,645 UART:
193,791 UART: [state] CFI Enabled
263,481 UART: [state] LifecycleState = Unprovisioned
265,887 UART: [state] DebugLocked = No
268,408 UART: [state] WD Timer not started. Device not locked for debugging
272,983 UART: [kat] SHA2-256
462,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,614 UART: [kat] ++
474,106 UART: [kat] sha1
487,203 UART: [kat] SHA2-256
490,215 UART: [kat] SHA2-384
496,538 UART: [kat] SHA2-512-ACC
499,147 UART: [kat] ECC-384
2,946,570 UART: [kat] HMAC-384Kdf
2,967,991 UART: [kat] LMS
3,499,781 UART: [kat] --
3,505,050 UART: [cold-reset] ++
3,506,110 UART: [fht] FHT @ 0x50003400
3,517,855 UART: [idev] ++
3,518,584 UART: [idev] CDI.KEYID = 6
3,519,551 UART: [idev] SUBJECT.KEYID = 7
3,520,706 UART: [idev] UDS.KEYID = 0
3,523,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,545 UART: [idev] Erasing UDS.KEYID = 0
6,028,219 UART: [idev] Sha1 KeyId Algorithm
6,051,078 UART: [idev] --
6,056,864 UART: [ldev] ++
6,057,567 UART: [ldev] CDI.KEYID = 6
6,058,455 UART: [ldev] SUBJECT.KEYID = 5
6,059,612 UART: [ldev] AUTHORITY.KEYID = 7
6,060,841 UART: [ldev] FE.KEYID = 1
6,096,181 UART: [ldev] Erasing FE.KEYID = 1
8,600,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,369 UART: [ldev] --
10,409,240 UART: [fwproc] Wait for Commands...
10,410,961 UART: [fwproc] Recv command 0x46574c44
10,413,277 UART: [fwproc] Recv'd Img size: 114448 bytes
10,540,184 UART: ROM Fatal Error: 0x000B001C
10,543,839 >>> mbox cmd response: failed
10,544,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,584 >>> mbox cmd response: failed
10,544,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,143 >>> mbox cmd response: failed
Initializing fuses
2,051,086 writing to cptra_bootfsm_go
2,240,366 UART:
2,240,705 UART: Running Caliptra ROM ...
2,241,798 UART:
2,241,953 UART: [state] CFI Enabled
2,303,428 UART: [state] LifecycleState = Unprovisioned
2,305,766 UART: [state] DebugLocked = No
2,307,316 UART: [state] WD Timer not started. Device not locked for debugging
2,311,519 UART: [kat] SHA2-256
2,501,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,174 UART: [kat] ++
2,512,638 UART: [kat] sha1
2,523,963 UART: [kat] SHA2-256
2,526,991 UART: [kat] SHA2-384
2,533,197 UART: [kat] SHA2-512-ACC
2,535,763 UART: [kat] ECC-384
4,986,877 UART: [kat] HMAC-384Kdf
5,010,838 UART: [kat] LMS
5,542,627 UART: [kat] --
5,548,200 UART: [cold-reset] ++
5,550,412 UART: [fht] FHT @ 0x50003400
5,561,935 UART: [idev] ++
5,562,612 UART: [idev] CDI.KEYID = 6
5,563,577 UART: [idev] SUBJECT.KEYID = 7
5,564,752 UART: [idev] UDS.KEYID = 0
5,567,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,711,495 UART: [idev] Erasing UDS.KEYID = 0
8,089,139 UART: [idev] Sha1 KeyId Algorithm
8,110,767 UART: [idev] --
8,116,278 UART: [ldev] ++
8,116,957 UART: [ldev] CDI.KEYID = 6
8,117,842 UART: [ldev] SUBJECT.KEYID = 5
8,119,052 UART: [ldev] AUTHORITY.KEYID = 7
8,120,232 UART: [ldev] FE.KEYID = 1
8,160,048 UART: [ldev] Erasing FE.KEYID = 1
10,665,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,001 UART: [ldev] --
12,472,838 UART: [fwproc] Wait for Commands...
12,474,607 UART: [fwproc] Recv command 0x46574c44
12,476,970 UART: [fwproc] Recv'd Img size: 114448 bytes
15,938,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,017,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,133,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,677,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,440,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,343,746 >>> mbox cmd response: failed
10,344,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,344,801 >>> mbox cmd response: failed
10,345,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,345,367 >>> mbox cmd response: failed
Initializing fuses
2,055,673 writing to cptra_bootfsm_go
5,486,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,783,562 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,708 UART:
193,098 UART: Running Caliptra ROM ...
194,260 UART:
603,495 UART: [state] CFI Enabled
617,817 UART: [state] LifecycleState = Unprovisioned
620,184 UART: [state] DebugLocked = No
622,641 UART: [state] WD Timer not started. Device not locked for debugging
627,486 UART: [kat] SHA2-256
817,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,177 UART: [kat] ++
828,686 UART: [kat] sha1
840,234 UART: [kat] SHA2-256
843,281 UART: [kat] SHA2-384
850,452 UART: [kat] SHA2-512-ACC
853,015 UART: [kat] ECC-384
3,297,262 UART: [kat] HMAC-384Kdf
3,309,679 UART: [kat] LMS
3,841,516 UART: [kat] --
3,845,980 UART: [cold-reset] ++
3,847,593 UART: [fht] FHT @ 0x50003400
3,859,165 UART: [idev] ++
3,859,839 UART: [idev] CDI.KEYID = 6
3,860,851 UART: [idev] SUBJECT.KEYID = 7
3,862,012 UART: [idev] UDS.KEYID = 0
3,864,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,887 UART: [idev] Erasing UDS.KEYID = 0
6,339,457 UART: [idev] Sha1 KeyId Algorithm
6,362,948 UART: [idev] --
6,368,051 UART: [ldev] ++
6,368,747 UART: [ldev] CDI.KEYID = 6
6,369,656 UART: [ldev] SUBJECT.KEYID = 5
6,370,872 UART: [ldev] AUTHORITY.KEYID = 7
6,371,972 UART: [ldev] FE.KEYID = 1
6,382,754 UART: [ldev] Erasing FE.KEYID = 1
8,859,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,070 UART: [ldev] --
10,647,874 UART: [fwproc] Wait for Commands...
10,649,812 UART: [fwproc] Recv command 0x46574c44
10,652,075 UART: [fwproc] Recv'd Img size: 114448 bytes
10,779,712 UART: ROM Fatal Error: 0x000B001C
10,783,349 >>> mbox cmd response: failed
10,783,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,784,019 >>> mbox cmd response: failed
10,784,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,784,582 >>> mbox cmd response: failed
Initializing fuses
2,058,840 writing to cptra_bootfsm_go
2,248,144 UART:
2,248,489 UART: Running Caliptra ROM ...
2,249,646 UART:
9,672,594 UART: [state] CFI Enabled
9,687,399 UART: [state] LifecycleState = Unprovisioned
9,689,423 UART: [state] DebugLocked = No
9,691,998 UART: [state] WD Timer not started. Device not locked for debugging
9,696,711 UART: [kat] SHA2-256
9,886,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,897,317 UART: [kat] ++
9,897,919 UART: [kat] sha1
9,909,518 UART: [kat] SHA2-256
9,912,531 UART: [kat] SHA2-384
9,918,674 UART: [kat] SHA2-512-ACC
9,921,239 UART: [kat] ECC-384
12,363,921 UART: [kat] HMAC-384Kdf
12,377,865 UART: [kat] LMS
12,909,709 UART: [kat] --
12,916,006 UART: [cold-reset] ++
12,917,618 UART: [fht] FHT @ 0x50003400
12,928,552 UART: [idev] ++
12,929,276 UART: [idev] CDI.KEYID = 6
12,930,190 UART: [idev] SUBJECT.KEYID = 7
12,931,404 UART: [idev] UDS.KEYID = 0
12,934,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,077,871 UART: [idev] Erasing UDS.KEYID = 0
15,409,875 UART: [idev] Sha1 KeyId Algorithm
15,430,937 UART: [idev] --
15,435,899 UART: [ldev] ++
15,436,577 UART: [ldev] CDI.KEYID = 6
15,437,487 UART: [ldev] SUBJECT.KEYID = 5
15,438,645 UART: [ldev] AUTHORITY.KEYID = 7
15,439,873 UART: [ldev] FE.KEYID = 1
15,451,922 UART: [ldev] Erasing FE.KEYID = 1
17,930,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,647,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,662,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,677,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,693,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,714,600 UART: [ldev] --
19,720,733 UART: [fwproc] Wait for Commands...
19,722,396 UART: [fwproc] Recv command 0x46574c44
19,724,654 UART: [fwproc] Recv'd Img size: 114448 bytes
23,168,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,250,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,366,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,909,665 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,761,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,571,937 >>> mbox cmd response: failed
10,572,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,573,040 >>> mbox cmd response: failed
10,573,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,573,607 >>> mbox cmd response: failed
Initializing fuses
2,050,065 writing to cptra_bootfsm_go
13,044,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,229,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,813 UART: [kat] SHA2-256
881,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,859 UART: [kat] ++
886,011 UART: [kat] sha1
890,223 UART: [kat] SHA2-256
892,161 UART: [kat] SHA2-384
894,940 UART: [kat] SHA2-512-ACC
896,841 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,218 UART: [idev] ++
1,479,386 UART: [idev] CDI.KEYID = 6
1,479,746 UART: [idev] SUBJECT.KEYID = 7
1,480,170 UART: [idev] UDS.KEYID = 0
1,480,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,505,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,697 UART: [ldev] ++
1,514,865 UART: [ldev] CDI.KEYID = 6
1,515,228 UART: [ldev] SUBJECT.KEYID = 5
1,515,654 UART: [ldev] AUTHORITY.KEYID = 7
1,516,117 UART: [ldev] FE.KEYID = 1
1,521,171 UART: [ldev] Erasing FE.KEYID = 1
1,546,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,660 UART: [fwproc] Received command 0x46574c44
1,587,451 UART: [fwproc] Received Image of size 114448 bytes
1,622,787 UART: ROM Fatal Error: 0x000B001C
1,623,946 >>> mbox cmd response: failed
1,623,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,952 >>> mbox cmd response: failed
1,623,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,475,979 UART: [cold-reset] ++
1,476,443 UART: [fht] Storing FHT @ 0x50003400
1,479,064 UART: [idev] ++
1,479,232 UART: [idev] CDI.KEYID = 6
1,479,592 UART: [idev] SUBJECT.KEYID = 7
1,480,016 UART: [idev] UDS.KEYID = 0
1,480,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,298 UART: [idev] Erasing UDS.KEYID = 0
1,504,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,538 UART: [idev] --
1,514,547 UART: [ldev] ++
1,514,715 UART: [ldev] CDI.KEYID = 6
1,515,078 UART: [ldev] SUBJECT.KEYID = 5
1,515,504 UART: [ldev] AUTHORITY.KEYID = 7
1,515,967 UART: [ldev] FE.KEYID = 1
1,521,105 UART: [ldev] Erasing FE.KEYID = 1
1,545,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,928 UART: [ldev] --
1,585,409 UART: [fwproc] Waiting for Commands...
1,586,256 UART: [fwproc] Received command 0x46574c44
1,587,047 UART: [fwproc] Received Image of size 114448 bytes
2,885,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,867 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,342 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,475,677 >>> mbox cmd response: failed
1,475,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,683 >>> mbox cmd response: failed
1,475,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,862 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
891,112 UART: [kat] SHA2-256
893,050 UART: [kat] SHA2-384
895,929 UART: [kat] SHA2-512-ACC
897,830 UART: [kat] ECC-384
903,689 UART: [kat] HMAC-384Kdf
908,225 UART: [kat] LMS
1,476,421 UART: [kat] --
1,477,270 UART: [cold-reset] ++
1,477,692 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,883 UART: [idev] Erasing UDS.KEYID = 0
1,506,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,157 UART: [idev] --
1,516,210 UART: [ldev] ++
1,516,378 UART: [ldev] CDI.KEYID = 6
1,516,741 UART: [ldev] SUBJECT.KEYID = 5
1,517,167 UART: [ldev] AUTHORITY.KEYID = 7
1,517,630 UART: [ldev] FE.KEYID = 1
1,522,898 UART: [ldev] Erasing FE.KEYID = 1
1,548,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,859 UART: [ldev] --
1,588,294 UART: [fwproc] Waiting for Commands...
1,588,935 UART: [fwproc] Received command 0x46574c44
1,589,726 UART: [fwproc] Received Image of size 114448 bytes
1,624,708 UART: ROM Fatal Error: 0x000B001C
1,625,867 >>> mbox cmd response: failed
1,625,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,873 >>> mbox cmd response: failed
1,625,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,425 UART: [kat] SHA2-512-ACC
897,326 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,621 UART: [idev] ++
1,479,789 UART: [idev] CDI.KEYID = 6
1,480,149 UART: [idev] SUBJECT.KEYID = 7
1,480,573 UART: [idev] UDS.KEYID = 0
1,480,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,349 UART: [idev] Erasing UDS.KEYID = 0
1,504,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,685 UART: [idev] --
1,514,622 UART: [ldev] ++
1,514,790 UART: [ldev] CDI.KEYID = 6
1,515,153 UART: [ldev] SUBJECT.KEYID = 5
1,515,579 UART: [ldev] AUTHORITY.KEYID = 7
1,516,042 UART: [ldev] FE.KEYID = 1
1,521,216 UART: [ldev] Erasing FE.KEYID = 1
1,546,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,235 UART: [ldev] --
1,585,514 UART: [fwproc] Waiting for Commands...
1,586,163 UART: [fwproc] Received command 0x46574c44
1,586,954 UART: [fwproc] Received Image of size 114448 bytes
2,885,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,576 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,089 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,622 >>> mbox cmd response: failed
1,478,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,628 >>> mbox cmd response: failed
1,478,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,541 UART: [kat] SHA2-256
903,481 UART: [kat] SHA2-384
906,090 UART: [kat] SHA2-512-ACC
907,991 UART: [kat] ECC-384
917,626 UART: [kat] HMAC-384Kdf
922,212 UART: [kat] LMS
1,170,540 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,172,071 UART: [fht] FHT @ 0x50003400
1,174,680 UART: [idev] ++
1,174,848 UART: [idev] CDI.KEYID = 6
1,175,208 UART: [idev] SUBJECT.KEYID = 7
1,175,632 UART: [idev] UDS.KEYID = 0
1,175,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,951 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,711 UART: [ldev] ++
1,210,879 UART: [ldev] CDI.KEYID = 6
1,211,242 UART: [ldev] SUBJECT.KEYID = 5
1,211,668 UART: [ldev] AUTHORITY.KEYID = 7
1,212,131 UART: [ldev] FE.KEYID = 1
1,217,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,250 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,890 UART: ROM Fatal Error: 0x000B001C
1,321,049 >>> mbox cmd response: failed
1,321,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,055 >>> mbox cmd response: failed
1,321,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,816 UART: [kat] SHA2-512-ACC
908,717 UART: [kat] ECC-384
918,998 UART: [kat] HMAC-384Kdf
923,606 UART: [kat] LMS
1,171,934 UART: [kat] --
1,172,513 UART: [cold-reset] ++
1,173,081 UART: [fht] FHT @ 0x50003400
1,175,830 UART: [idev] ++
1,175,998 UART: [idev] CDI.KEYID = 6
1,176,358 UART: [idev] SUBJECT.KEYID = 7
1,176,782 UART: [idev] UDS.KEYID = 0
1,177,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,596 UART: [idev] Erasing UDS.KEYID = 0
1,201,305 UART: [idev] Sha1 KeyId Algorithm
1,209,783 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,250 UART: [ldev] SUBJECT.KEYID = 5
1,211,676 UART: [ldev] AUTHORITY.KEYID = 7
1,212,139 UART: [ldev] FE.KEYID = 1
1,217,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,737 UART: [ldev] --
1,283,040 UART: [fwproc] Wait for Commands...
1,283,716 UART: [fwproc] Recv command 0x46574c44
1,284,444 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,473 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,008 >>> mbox cmd response: failed
1,175,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,014 >>> mbox cmd response: failed
1,175,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,298 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,560 UART: [kat] SHA2-256
904,500 UART: [kat] SHA2-384
907,433 UART: [kat] SHA2-512-ACC
909,334 UART: [kat] ECC-384
919,367 UART: [kat] HMAC-384Kdf
924,077 UART: [kat] LMS
1,172,405 UART: [kat] --
1,173,258 UART: [cold-reset] ++
1,173,656 UART: [fht] FHT @ 0x50003400
1,176,371 UART: [idev] ++
1,176,539 UART: [idev] CDI.KEYID = 6
1,176,899 UART: [idev] SUBJECT.KEYID = 7
1,177,323 UART: [idev] UDS.KEYID = 0
1,177,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,397 UART: [idev] Erasing UDS.KEYID = 0
1,202,520 UART: [idev] Sha1 KeyId Algorithm
1,210,864 UART: [idev] --
1,211,734 UART: [ldev] ++
1,211,902 UART: [ldev] CDI.KEYID = 6
1,212,265 UART: [ldev] SUBJECT.KEYID = 5
1,212,691 UART: [ldev] AUTHORITY.KEYID = 7
1,213,154 UART: [ldev] FE.KEYID = 1
1,218,396 UART: [ldev] Erasing FE.KEYID = 1
1,244,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,774 UART: [ldev] --
1,284,129 UART: [fwproc] Wait for Commands...
1,284,771 UART: [fwproc] Recv command 0x46574c44
1,285,499 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,437 UART: ROM Fatal Error: 0x000B001C
1,321,596 >>> mbox cmd response: failed
1,321,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,602 >>> mbox cmd response: failed
1,321,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
901,676 UART: [kat] SHA2-256
903,616 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
917,807 UART: [kat] HMAC-384Kdf
922,221 UART: [kat] LMS
1,170,549 UART: [kat] --
1,171,220 UART: [cold-reset] ++
1,171,756 UART: [fht] FHT @ 0x50003400
1,174,313 UART: [idev] ++
1,174,481 UART: [idev] CDI.KEYID = 6
1,174,841 UART: [idev] SUBJECT.KEYID = 7
1,175,265 UART: [idev] UDS.KEYID = 0
1,175,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,081 UART: [idev] Erasing UDS.KEYID = 0
1,200,106 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,590 UART: [ldev] ++
1,209,758 UART: [ldev] CDI.KEYID = 6
1,210,121 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,178 UART: [ldev] --
1,282,643 UART: [fwproc] Wait for Commands...
1,283,283 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,769 >>> mbox cmd response: failed
1,175,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,775 >>> mbox cmd response: failed
1,175,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,771 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,174,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] --
1,208,042 UART: [ldev] ++
1,208,210 UART: [ldev] CDI.KEYID = 6
1,208,574 UART: [ldev] SUBJECT.KEYID = 5
1,209,001 UART: [ldev] AUTHORITY.KEYID = 7
1,209,464 UART: [ldev] FE.KEYID = 1
1,214,730 UART: [ldev] Erasing FE.KEYID = 1
1,240,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,268 UART: [ldev] --
1,279,652 UART: [fwproc] Wait for Commands...
1,280,273 UART: [fwproc] Recv command 0x46574c44
1,281,006 UART: [fwproc] Recv'd Img size: 114448 bytes
1,316,302 UART: ROM Fatal Error: 0x000B001C
1,317,461 >>> mbox cmd response: failed
1,317,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,467 >>> mbox cmd response: failed
1,317,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,199,537 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,734 UART: [ldev] ++
1,209,902 UART: [ldev] CDI.KEYID = 6
1,210,266 UART: [ldev] SUBJECT.KEYID = 5
1,210,693 UART: [ldev] AUTHORITY.KEYID = 7
1,211,156 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,242,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,545 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,691 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,171,032 >>> mbox cmd response: failed
1,171,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,038 >>> mbox cmd response: failed
1,171,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,245 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,050 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,906 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,208,872 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,581 UART: [ldev] SUBJECT.KEYID = 5
1,211,008 UART: [ldev] AUTHORITY.KEYID = 7
1,211,471 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,093 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,495 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,971 UART: ROM Fatal Error: 0x000B001C
1,321,130 >>> mbox cmd response: failed
1,321,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,136 >>> mbox cmd response: failed
1,321,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,312 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,614 UART: [kat] SHA2-256
901,554 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,395 UART: [kat] LMS
1,168,707 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,040 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,173,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,412 UART: [idev] Erasing UDS.KEYID = 0
1,198,534 UART: [idev] Sha1 KeyId Algorithm
1,207,396 UART: [idev] --
1,208,321 UART: [ldev] ++
1,208,489 UART: [ldev] CDI.KEYID = 6
1,208,853 UART: [ldev] SUBJECT.KEYID = 5
1,209,280 UART: [ldev] AUTHORITY.KEYID = 7
1,209,743 UART: [ldev] FE.KEYID = 1
1,215,153 UART: [ldev] Erasing FE.KEYID = 1
1,241,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,011 UART: [ldev] --
1,280,301 UART: [fwproc] Wait for Commands...
1,280,968 UART: [fwproc] Recv command 0x46574c44
1,281,701 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,060 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,097 >>> mbox cmd response: failed
1,173,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,103 >>> mbox cmd response: failed
1,173,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,378 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
4,876,684 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,052,177 >>> mbox cmd response: failed
14,052,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,053,278 >>> mbox cmd response: failed
14,053,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,053,839 >>> mbox cmd response: failed
Initializing fuses
2,063,832 writing to cptra_bootfsm_go
6,920,911 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,495,517 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
4,879,605 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,032,675 >>> mbox cmd response: failed
14,033,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,033,615 >>> mbox cmd response: failed
14,033,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,034,189 >>> mbox cmd response: failed
Initializing fuses
2,057,513 writing to cptra_bootfsm_go
6,928,242 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,499,114 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,188,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,210,295 >>> mbox cmd response: failed
14,210,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,211,226 >>> mbox cmd response: failed
14,211,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,211,783 >>> mbox cmd response: failed
Initializing fuses
2,063,130 writing to cptra_bootfsm_go
10,836,908 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,269,235 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
5,186,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,193,290 >>> mbox cmd response: failed
14,193,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,194,276 >>> mbox cmd response: failed
14,194,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,194,832 >>> mbox cmd response: failed
Initializing fuses
2,057,088 writing to cptra_bootfsm_go
10,861,047 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,299,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,435,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,439,616 >>> mbox cmd response: failed
10,440,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,440,567 >>> mbox cmd response: failed
10,440,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,441,198 >>> mbox cmd response: failed
Initializing fuses
2,059,119 writing to cptra_bootfsm_go
5,519,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,359,378 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,458,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,429,613 >>> mbox cmd response: failed
10,430,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,430,708 >>> mbox cmd response: failed
10,430,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,431,298 >>> mbox cmd response: failed
Initializing fuses
2,054,162 writing to cptra_bootfsm_go
5,484,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,283,824 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,771,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,670,323 >>> mbox cmd response: failed
10,670,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,671,209 >>> mbox cmd response: failed
10,671,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,671,764 >>> mbox cmd response: failed
Initializing fuses
2,053,484 writing to cptra_bootfsm_go
12,967,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,705,859 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,784,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,695,139 >>> mbox cmd response: failed
10,695,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,063 >>> mbox cmd response: failed
10,696,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,621 >>> mbox cmd response: failed
Initializing fuses
2,053,815 writing to cptra_bootfsm_go
12,942,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,679,653 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,440,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,456,422 >>> mbox cmd response: failed
10,457,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,457,554 >>> mbox cmd response: failed
10,457,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,458,116 >>> mbox cmd response: failed
Initializing fuses
2,057,035 writing to cptra_bootfsm_go
5,502,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,325,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,463,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,470,433 >>> mbox cmd response: failed
10,471,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,471,529 >>> mbox cmd response: failed
10,471,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,086 >>> mbox cmd response: failed
Initializing fuses
2,061,066 writing to cptra_bootfsm_go
5,484,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,314,041 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,786,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,681,417 >>> mbox cmd response: failed
10,682,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,474 >>> mbox cmd response: failed
10,682,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,683,029 >>> mbox cmd response: failed
Initializing fuses
2,063,949 writing to cptra_bootfsm_go
12,963,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,697,494 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,775,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,675,284 >>> mbox cmd response: failed
10,676,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,676,436 >>> mbox cmd response: failed
10,676,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,677,021 >>> mbox cmd response: failed
Initializing fuses
2,066,304 writing to cptra_bootfsm_go
12,976,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,696,233 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,605 >>> mbox cmd response: failed
1,195,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,611 >>> mbox cmd response: failed
1,195,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,616 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,664 UART: [idev] ++
1,479,832 UART: [idev] CDI.KEYID = 6
1,480,192 UART: [idev] SUBJECT.KEYID = 7
1,480,616 UART: [idev] UDS.KEYID = 0
1,480,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,508 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,807 UART: [ldev] ++
1,514,975 UART: [ldev] CDI.KEYID = 6
1,515,338 UART: [ldev] SUBJECT.KEYID = 5
1,515,764 UART: [ldev] AUTHORITY.KEYID = 7
1,516,227 UART: [ldev] FE.KEYID = 1
1,521,295 UART: [ldev] Erasing FE.KEYID = 1
1,546,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,314 UART: [ldev] --
1,585,601 UART: [fwproc] Waiting for Commands...
1,586,432 UART: [fwproc] Received command 0x46574c44
1,587,223 UART: [fwproc] Received Image of size 114448 bytes
2,886,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,098 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,015 >>> mbox cmd response: failed
1,194,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,021 >>> mbox cmd response: failed
1,194,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,432 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,072 >>> mbox cmd response: failed
1,195,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,078 >>> mbox cmd response: failed
1,195,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,381 UART: [kat] HMAC-384Kdf
906,923 UART: [kat] LMS
1,475,119 UART: [kat] --
1,475,844 UART: [cold-reset] ++
1,476,286 UART: [fht] Storing FHT @ 0x50003400
1,479,115 UART: [idev] ++
1,479,283 UART: [idev] CDI.KEYID = 6
1,479,643 UART: [idev] SUBJECT.KEYID = 7
1,480,067 UART: [idev] UDS.KEYID = 0
1,480,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,651 UART: [idev] --
1,514,654 UART: [ldev] ++
1,514,822 UART: [ldev] CDI.KEYID = 6
1,515,185 UART: [ldev] SUBJECT.KEYID = 5
1,515,611 UART: [ldev] AUTHORITY.KEYID = 7
1,516,074 UART: [ldev] FE.KEYID = 1
1,521,242 UART: [ldev] Erasing FE.KEYID = 1
1,546,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,487 UART: [ldev] --
1,585,996 UART: [fwproc] Waiting for Commands...
1,586,661 UART: [fwproc] Received command 0x46574c44
1,587,452 UART: [fwproc] Received Image of size 114448 bytes
2,885,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,392 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,763 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,870 >>> mbox cmd response: failed
1,195,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,876 >>> mbox cmd response: failed
1,195,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,999 >>> mbox cmd response: failed
1,194,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,005 >>> mbox cmd response: failed
1,195,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,737 UART: [kat] SHA2-256
903,677 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,304 UART: [kat] LMS
1,170,632 UART: [kat] --
1,171,491 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,789 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,610 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,661 UART: [ldev] Erasing FE.KEYID = 1
1,241,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,266 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,181 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,989 >>> mbox cmd response: failed
1,195,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,995 >>> mbox cmd response: failed
1,195,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,958 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,193,826 >>> mbox cmd response: failed
1,193,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,832 >>> mbox cmd response: failed
1,193,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,309 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,579 UART: [idev] ++
1,175,747 UART: [idev] CDI.KEYID = 6
1,176,107 UART: [idev] SUBJECT.KEYID = 7
1,176,531 UART: [idev] UDS.KEYID = 0
1,176,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,691 UART: [idev] Erasing UDS.KEYID = 0
1,201,000 UART: [idev] Sha1 KeyId Algorithm
1,209,252 UART: [idev] --
1,210,294 UART: [ldev] ++
1,210,462 UART: [ldev] CDI.KEYID = 6
1,210,825 UART: [ldev] SUBJECT.KEYID = 5
1,211,251 UART: [ldev] AUTHORITY.KEYID = 7
1,211,714 UART: [ldev] FE.KEYID = 1
1,217,042 UART: [ldev] Erasing FE.KEYID = 1
1,243,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,283,161 UART: [fwproc] Wait for Commands...
1,283,793 UART: [fwproc] Recv command 0x46574c44
1,284,521 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,472 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,172 >>> mbox cmd response: failed
1,195,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,178 >>> mbox cmd response: failed
1,195,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,865 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,035 >>> mbox cmd response: failed
1,195,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,041 >>> mbox cmd response: failed
1,195,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,137 UART: [kat] SHA2-256
902,077 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,695 UART: [idev] ++
1,173,863 UART: [idev] CDI.KEYID = 6
1,174,224 UART: [idev] SUBJECT.KEYID = 7
1,174,649 UART: [idev] UDS.KEYID = 0
1,174,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,843 UART: [idev] Erasing UDS.KEYID = 0
1,200,527 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,370 UART: [ldev] ++
1,210,538 UART: [ldev] CDI.KEYID = 6
1,210,902 UART: [ldev] SUBJECT.KEYID = 5
1,211,329 UART: [ldev] AUTHORITY.KEYID = 7
1,211,792 UART: [ldev] FE.KEYID = 1
1,217,328 UART: [ldev] Erasing FE.KEYID = 1
1,243,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,472 UART: [ldev] --
1,282,852 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,296 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,261 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,069 >>> mbox cmd response: failed
1,195,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,075 >>> mbox cmd response: failed
1,195,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,155 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,242 >>> mbox cmd response: failed
1,194,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,248 >>> mbox cmd response: failed
1,194,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,129 UART: [kat] SHA2-512-ACC
907,030 UART: [kat] ECC-384
917,065 UART: [kat] HMAC-384Kdf
921,717 UART: [kat] LMS
1,170,029 UART: [kat] --
1,171,116 UART: [cold-reset] ++
1,171,484 UART: [fht] FHT @ 0x50003400
1,174,198 UART: [idev] ++
1,174,366 UART: [idev] CDI.KEYID = 6
1,174,727 UART: [idev] SUBJECT.KEYID = 7
1,175,152 UART: [idev] UDS.KEYID = 0
1,175,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,946 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,937 UART: [ldev] ++
1,210,105 UART: [ldev] CDI.KEYID = 6
1,210,469 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,677 UART: [ldev] --
1,282,945 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,421 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,398 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,236 >>> mbox cmd response: failed
1,196,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,242 >>> mbox cmd response: failed
1,196,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,020 UART:
192,397 UART: Running Caliptra ROM ...
193,508 UART:
193,650 UART: [state] CFI Enabled
265,157 UART: [state] LifecycleState = Unprovisioned
267,080 UART: [state] DebugLocked = No
269,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,292 UART: [kat] SHA2-256
443,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,476 UART: [kat] ++
454,919 UART: [kat] sha1
465,529 UART: [kat] SHA2-256
468,225 UART: [kat] SHA2-384
472,795 UART: [kat] SHA2-512-ACC
475,186 UART: [kat] ECC-384
2,768,994 UART: [kat] HMAC-384Kdf
2,800,519 UART: [kat] LMS
3,990,838 UART: [kat] --
3,995,282 UART: [cold-reset] ++
3,997,860 UART: [fht] Storing FHT @ 0x50003400
4,010,419 UART: [idev] ++
4,010,996 UART: [idev] CDI.KEYID = 6
4,011,934 UART: [idev] SUBJECT.KEYID = 7
4,013,206 UART: [idev] UDS.KEYID = 0
4,015,641 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,324 UART: [idev] Erasing UDS.KEYID = 0
7,347,834 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,756 UART: [idev] --
7,372,863 UART: [ldev] ++
7,373,433 UART: [ldev] CDI.KEYID = 6
7,374,396 UART: [ldev] SUBJECT.KEYID = 5
7,375,617 UART: [ldev] AUTHORITY.KEYID = 7
7,376,855 UART: [ldev] FE.KEYID = 1
7,422,810 UART: [ldev] Erasing FE.KEYID = 1
10,753,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,849 UART: [ldev] --
13,118,173 UART: [fwproc] Waiting for Commands...
13,120,919 UART: [fwproc] Received command 0x46574c44
13,123,103 UART: [fwproc] Received Image of size 114124 bytes
16,655,584 UART: ROM Fatal Error: 0x000B0030
16,658,960 >>> mbox cmd response: failed
16,659,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,659,615 >>> mbox cmd response: failed
16,659,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,660,211 >>> mbox cmd response: failed
Initializing fuses
2,052,078 writing to cptra_bootfsm_go
2,241,376 UART:
2,241,733 UART: Running Caliptra ROM ...
2,242,826 UART:
2,242,985 UART: [state] CFI Enabled
2,311,582 UART: [state] LifecycleState = Unprovisioned
2,313,484 UART: [state] DebugLocked = No
2,316,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,610 UART: [kat] SHA2-256
2,490,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,858 UART: [kat] ++
2,501,332 UART: [kat] sha1
2,512,166 UART: [kat] SHA2-256
2,514,865 UART: [kat] SHA2-384
2,520,478 UART: [kat] SHA2-512-ACC
2,522,830 UART: [kat] ECC-384
4,816,533 UART: [kat] HMAC-384Kdf
4,848,034 UART: [kat] LMS
6,038,331 UART: [kat] --
6,044,030 UART: [cold-reset] ++
6,045,105 UART: [fht] Storing FHT @ 0x50003400
6,056,647 UART: [idev] ++
6,057,222 UART: [idev] CDI.KEYID = 6
6,058,153 UART: [idev] SUBJECT.KEYID = 7
6,059,372 UART: [idev] UDS.KEYID = 0
6,061,729 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,205,382 UART: [idev] Erasing UDS.KEYID = 0
9,392,256 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,581 UART: [idev] --
9,416,499 UART: [ldev] ++
9,417,070 UART: [ldev] CDI.KEYID = 6
9,418,038 UART: [ldev] SUBJECT.KEYID = 5
9,419,247 UART: [ldev] AUTHORITY.KEYID = 7
9,420,485 UART: [ldev] FE.KEYID = 1
9,448,373 UART: [ldev] Erasing FE.KEYID = 1
12,781,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,077,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,092,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,107,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,121,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,140,615 UART: [ldev] --
15,145,720 UART: [fwproc] Waiting for Commands...
15,148,034 UART: [fwproc] Received command 0x46574c44
15,150,224 UART: [fwproc] Received Image of size 114124 bytes
19,195,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,268,510 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,337,422 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,654,748 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,806,931 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,352,387 >>> mbox cmd response: failed
16,352,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,353,281 >>> mbox cmd response: failed
16,353,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,353,837 >>> mbox cmd response: failed
Initializing fuses
2,051,520 writing to cptra_bootfsm_go
5,856,952 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,926,606 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,536 UART:
192,898 UART: Running Caliptra ROM ...
194,031 UART:
603,651 UART: [state] CFI Enabled
617,307 UART: [state] LifecycleState = Unprovisioned
619,238 UART: [state] DebugLocked = No
621,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,816 UART: [kat] SHA2-256
796,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,054 UART: [kat] ++
807,766 UART: [kat] sha1
819,125 UART: [kat] SHA2-256
821,813 UART: [kat] SHA2-384
826,262 UART: [kat] SHA2-512-ACC
828,616 UART: [kat] ECC-384
3,114,858 UART: [kat] HMAC-384Kdf
3,126,499 UART: [kat] LMS
4,316,631 UART: [kat] --
4,323,221 UART: [cold-reset] ++
4,324,344 UART: [fht] Storing FHT @ 0x50003400
4,335,719 UART: [idev] ++
4,336,339 UART: [idev] CDI.KEYID = 6
4,337,248 UART: [idev] SUBJECT.KEYID = 7
4,338,517 UART: [idev] UDS.KEYID = 0
4,341,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,652 UART: [idev] Erasing UDS.KEYID = 0
7,626,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,674 UART: [idev] --
7,653,568 UART: [ldev] ++
7,654,139 UART: [ldev] CDI.KEYID = 6
7,655,114 UART: [ldev] SUBJECT.KEYID = 5
7,656,276 UART: [ldev] AUTHORITY.KEYID = 7
7,657,564 UART: [ldev] FE.KEYID = 1
7,668,104 UART: [ldev] Erasing FE.KEYID = 1
10,958,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,533 UART: [ldev] --
13,315,576 UART: [fwproc] Waiting for Commands...
13,318,076 UART: [fwproc] Received command 0x46574c44
13,320,269 UART: [fwproc] Received Image of size 114124 bytes
17,164,309 UART: ROM Fatal Error: 0x000B0030
17,167,711 >>> mbox cmd response: failed
17,168,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,168,456 >>> mbox cmd response: failed
17,168,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,169,012 >>> mbox cmd response: failed
Initializing fuses
2,052,400 writing to cptra_bootfsm_go
2,241,702 UART:
2,242,057 UART: Running Caliptra ROM ...
2,243,108 UART:
3,299,521 UART: [state] CFI Enabled
3,318,096 UART: [state] LifecycleState = Unprovisioned
3,320,014 UART: [state] DebugLocked = No
3,321,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,326,761 UART: [kat] SHA2-256
3,496,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,507,062 UART: [kat] ++
3,507,527 UART: [kat] sha1
3,519,115 UART: [kat] SHA2-256
3,521,814 UART: [kat] SHA2-384
3,527,105 UART: [kat] SHA2-512-ACC
3,529,457 UART: [kat] ECC-384
5,812,833 UART: [kat] HMAC-384Kdf
5,824,526 UART: [kat] LMS
7,014,607 UART: [kat] --
7,020,301 UART: [cold-reset] ++
7,021,977 UART: [fht] Storing FHT @ 0x50003400
7,033,756 UART: [idev] ++
7,034,325 UART: [idev] CDI.KEYID = 6
7,035,266 UART: [idev] SUBJECT.KEYID = 7
7,036,539 UART: [idev] UDS.KEYID = 0
7,038,710 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,182,153 UART: [idev] Erasing UDS.KEYID = 0
10,320,646 UART: [idev] Using Sha1 for KeyId Algorithm
10,342,478 UART: [idev] --
10,347,396 UART: [ldev] ++
10,347,964 UART: [ldev] CDI.KEYID = 6
10,348,928 UART: [ldev] SUBJECT.KEYID = 5
10,350,120 UART: [ldev] AUTHORITY.KEYID = 7
10,351,411 UART: [ldev] FE.KEYID = 1
10,362,160 UART: [ldev] Erasing FE.KEYID = 1
13,653,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,947,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,962,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,976,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,991,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,010,106 UART: [ldev] --
16,015,699 UART: [fwproc] Waiting for Commands...
16,017,698 UART: [fwproc] Received command 0x46574c44
16,019,889 UART: [fwproc] Received Image of size 114124 bytes
20,075,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,154,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,223,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,540,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,302 writing to cptra_bootfsm_go
4,127,087 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,440,204 >>> mbox cmd response: failed
16,440,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,441,130 >>> mbox cmd response: failed
16,441,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,441,747 >>> mbox cmd response: failed
Initializing fuses
2,051,427 writing to cptra_bootfsm_go
7,551,107 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,499,170 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,355 UART:
192,704 UART: Running Caliptra ROM ...
193,900 UART:
194,050 UART: [state] CFI Enabled
262,334 UART: [state] LifecycleState = Unprovisioned
264,202 UART: [state] DebugLocked = No
265,745 UART: [state] WD Timer not started. Device not locked for debugging
270,066 UART: [kat] SHA2-256
449,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,754 UART: [kat] ++
461,288 UART: [kat] sha1
472,393 UART: [kat] SHA2-256
475,447 UART: [kat] SHA2-384
480,249 UART: [kat] SHA2-512-ACC
483,191 UART: [kat] ECC-384
2,947,111 UART: [kat] HMAC-384Kdf
2,969,315 UART: [kat] LMS
3,498,781 UART: [kat] --
3,503,755 UART: [cold-reset] ++
3,506,117 UART: [fht] FHT @ 0x50003400
3,517,307 UART: [idev] ++
3,517,873 UART: [idev] CDI.KEYID = 6
3,518,759 UART: [idev] SUBJECT.KEYID = 7
3,519,975 UART: [idev] UDS.KEYID = 0
3,522,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,047 UART: [idev] Erasing UDS.KEYID = 0
6,027,500 UART: [idev] Sha1 KeyId Algorithm
6,049,654 UART: [idev] --
6,053,603 UART: [ldev] ++
6,054,198 UART: [ldev] CDI.KEYID = 6
6,055,086 UART: [ldev] SUBJECT.KEYID = 5
6,056,206 UART: [ldev] AUTHORITY.KEYID = 7
6,057,484 UART: [ldev] FE.KEYID = 1
6,099,424 UART: [ldev] Erasing FE.KEYID = 1
8,603,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,496 UART: [ldev] --
10,415,691 UART: [fwproc] Wait for Commands...
10,417,959 UART: [fwproc] Recv command 0x46574c44
10,420,058 UART: [fwproc] Recv'd Img size: 114448 bytes
12,069,344 UART: ROM Fatal Error: 0x000B0030
12,072,404 >>> mbox cmd response: failed
12,072,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,073,185 >>> mbox cmd response: failed
12,073,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,073,798 >>> mbox cmd response: failed
Initializing fuses
2,049,593 writing to cptra_bootfsm_go
2,238,916 UART:
2,239,276 UART: Running Caliptra ROM ...
2,240,415 UART:
2,240,577 UART: [state] CFI Enabled
2,303,863 UART: [state] LifecycleState = Unprovisioned
2,305,747 UART: [state] DebugLocked = No
2,308,245 UART: [state] WD Timer not started. Device not locked for debugging
2,312,851 UART: [kat] SHA2-256
2,491,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,552 UART: [kat] ++
2,504,010 UART: [kat] sha1
2,514,793 UART: [kat] SHA2-256
2,517,809 UART: [kat] SHA2-384
2,524,071 UART: [kat] SHA2-512-ACC
2,527,013 UART: [kat] ECC-384
4,991,064 UART: [kat] HMAC-384Kdf
5,011,717 UART: [kat] LMS
5,541,184 UART: [kat] --
5,548,525 UART: [cold-reset] ++
5,550,558 UART: [fht] FHT @ 0x50003400
5,561,210 UART: [idev] ++
5,561,779 UART: [idev] CDI.KEYID = 6
5,562,717 UART: [idev] SUBJECT.KEYID = 7
5,563,929 UART: [idev] UDS.KEYID = 0
5,566,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,201 UART: [idev] Erasing UDS.KEYID = 0
8,068,455 UART: [idev] Sha1 KeyId Algorithm
8,091,421 UART: [idev] --
8,095,954 UART: [ldev] ++
8,096,522 UART: [ldev] CDI.KEYID = 6
8,097,441 UART: [ldev] SUBJECT.KEYID = 5
8,098,660 UART: [ldev] AUTHORITY.KEYID = 7
8,099,893 UART: [ldev] FE.KEYID = 1
8,140,356 UART: [ldev] Erasing FE.KEYID = 1
10,645,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,315 UART: [ldev] --
12,452,649 UART: [fwproc] Wait for Commands...
12,454,638 UART: [fwproc] Recv command 0x46574c44
12,456,744 UART: [fwproc] Recv'd Img size: 114448 bytes
15,864,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,322,989 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,359,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,683,787 >>> mbox cmd response: failed
11,684,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,684,777 >>> mbox cmd response: failed
11,685,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,685,425 >>> mbox cmd response: failed
Initializing fuses
2,056,545 writing to cptra_bootfsm_go
5,436,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,142,336 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,406 UART:
192,826 UART: Running Caliptra ROM ...
194,036 UART:
603,482 UART: [state] CFI Enabled
617,013 UART: [state] LifecycleState = Unprovisioned
618,910 UART: [state] DebugLocked = No
621,021 UART: [state] WD Timer not started. Device not locked for debugging
624,794 UART: [kat] SHA2-256
803,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,486 UART: [kat] ++
815,931 UART: [kat] sha1
826,694 UART: [kat] SHA2-256
829,747 UART: [kat] SHA2-384
835,231 UART: [kat] SHA2-512-ACC
838,159 UART: [kat] ECC-384
3,279,695 UART: [kat] HMAC-384Kdf
3,292,434 UART: [kat] LMS
3,821,917 UART: [kat] --
3,826,678 UART: [cold-reset] ++
3,828,455 UART: [fht] FHT @ 0x50003400
3,839,322 UART: [idev] ++
3,839,891 UART: [idev] CDI.KEYID = 6
3,840,813 UART: [idev] SUBJECT.KEYID = 7
3,842,031 UART: [idev] UDS.KEYID = 0
3,844,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,729 UART: [idev] Erasing UDS.KEYID = 0
6,315,456 UART: [idev] Sha1 KeyId Algorithm
6,338,425 UART: [idev] --
6,341,293 UART: [ldev] ++
6,341,865 UART: [ldev] CDI.KEYID = 6
6,342,885 UART: [ldev] SUBJECT.KEYID = 5
6,343,989 UART: [ldev] AUTHORITY.KEYID = 7
6,345,219 UART: [ldev] FE.KEYID = 1
6,354,699 UART: [ldev] Erasing FE.KEYID = 1
8,829,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,151 UART: [ldev] --
10,622,639 UART: [fwproc] Wait for Commands...
10,625,111 UART: [fwproc] Recv command 0x46574c44
10,627,207 UART: [fwproc] Recv'd Img size: 114448 bytes
12,281,487 UART: ROM Fatal Error: 0x000B0030
12,284,553 >>> mbox cmd response: failed
12,284,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,224 >>> mbox cmd response: failed
12,285,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,989 >>> mbox cmd response: failed
Initializing fuses
2,050,737 writing to cptra_bootfsm_go
2,240,030 UART:
2,240,385 UART: Running Caliptra ROM ...
2,241,439 UART:
8,187,907 UART: [state] CFI Enabled
8,200,743 UART: [state] LifecycleState = Unprovisioned
8,202,618 UART: [state] DebugLocked = No
8,204,790 UART: [state] WD Timer not started. Device not locked for debugging
8,209,183 UART: [kat] SHA2-256
8,388,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,399,892 UART: [kat] ++
8,400,379 UART: [kat] sha1
8,410,728 UART: [kat] SHA2-256
8,413,724 UART: [kat] SHA2-384
8,420,098 UART: [kat] SHA2-512-ACC
8,423,045 UART: [kat] ECC-384
10,867,023 UART: [kat] HMAC-384Kdf
10,880,104 UART: [kat] LMS
11,409,624 UART: [kat] --
11,415,020 UART: [cold-reset] ++
11,417,601 UART: [fht] FHT @ 0x50003400
11,428,628 UART: [idev] ++
11,429,190 UART: [idev] CDI.KEYID = 6
11,430,067 UART: [idev] SUBJECT.KEYID = 7
11,431,340 UART: [idev] UDS.KEYID = 0
11,433,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,577,694 UART: [idev] Erasing UDS.KEYID = 0
13,904,776 UART: [idev] Sha1 KeyId Algorithm
13,927,863 UART: [idev] --
13,933,093 UART: [ldev] ++
13,933,675 UART: [ldev] CDI.KEYID = 6
13,934,559 UART: [ldev] SUBJECT.KEYID = 5
13,935,772 UART: [ldev] AUTHORITY.KEYID = 7
13,937,002 UART: [ldev] FE.KEYID = 1
13,946,260 UART: [ldev] Erasing FE.KEYID = 1
16,420,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,140,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,156,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,172,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,187,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,208,630 UART: [ldev] --
18,213,457 UART: [fwproc] Wait for Commands...
18,216,686 UART: [fwproc] Recv command 0x46574c44
18,218,782 UART: [fwproc] Recv'd Img size: 114448 bytes
21,621,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,699,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,768,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,086,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,523 writing to cptra_bootfsm_go
3,702,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,968,473 >>> mbox cmd response: failed
11,969,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,969,347 >>> mbox cmd response: failed
11,969,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,969,909 >>> mbox cmd response: failed
Initializing fuses
2,061,030 writing to cptra_bootfsm_go
11,582,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,161,962 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,289 UART:
192,652 UART: Running Caliptra ROM ...
193,757 UART:
193,897 UART: [state] CFI Enabled
267,440 UART: [state] LifecycleState = Unprovisioned
269,788 UART: [state] DebugLocked = No
272,758 UART: [state] WD Timer not started. Device not locked for debugging
277,831 UART: [kat] SHA2-256
467,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,493 UART: [kat] ++
478,938 UART: [kat] sha1
491,969 UART: [kat] SHA2-256
495,013 UART: [kat] SHA2-384
501,117 UART: [kat] SHA2-512-ACC
503,679 UART: [kat] ECC-384
2,949,534 UART: [kat] HMAC-384Kdf
2,972,657 UART: [kat] LMS
3,504,388 UART: [kat] --
3,507,619 UART: [cold-reset] ++
3,510,091 UART: [fht] FHT @ 0x50003400
3,521,123 UART: [idev] ++
3,521,800 UART: [idev] CDI.KEYID = 6
3,522,820 UART: [idev] SUBJECT.KEYID = 7
3,523,982 UART: [idev] UDS.KEYID = 0
3,526,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,826 UART: [idev] Erasing UDS.KEYID = 0
6,029,737 UART: [idev] Sha1 KeyId Algorithm
6,053,023 UART: [idev] --
6,058,155 UART: [ldev] ++
6,058,836 UART: [ldev] CDI.KEYID = 6
6,059,720 UART: [ldev] SUBJECT.KEYID = 5
6,060,957 UART: [ldev] AUTHORITY.KEYID = 7
6,062,141 UART: [ldev] FE.KEYID = 1
6,100,158 UART: [ldev] Erasing FE.KEYID = 1
8,606,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,598 UART: [ldev] --
10,417,496 UART: [fwproc] Wait for Commands...
10,420,679 UART: [fwproc] Recv command 0x46574c44
10,422,940 UART: [fwproc] Recv'd Img size: 114448 bytes
12,092,798 UART: ROM Fatal Error: 0x000B0030
12,096,259 >>> mbox cmd response: failed
12,096,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,096,995 >>> mbox cmd response: failed
12,097,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,097,528 >>> mbox cmd response: failed
Initializing fuses
2,051,256 writing to cptra_bootfsm_go
2,240,593 UART:
2,240,939 UART: Running Caliptra ROM ...
2,242,075 UART:
2,242,246 UART: [state] CFI Enabled
2,310,910 UART: [state] LifecycleState = Unprovisioned
2,313,341 UART: [state] DebugLocked = No
2,315,647 UART: [state] WD Timer not started. Device not locked for debugging
2,321,069 UART: [kat] SHA2-256
2,510,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,721 UART: [kat] ++
2,522,237 UART: [kat] sha1
2,532,698 UART: [kat] SHA2-256
2,535,727 UART: [kat] SHA2-384
2,540,532 UART: [kat] SHA2-512-ACC
2,543,112 UART: [kat] ECC-384
4,995,988 UART: [kat] HMAC-384Kdf
5,019,644 UART: [kat] LMS
5,551,441 UART: [kat] --
5,554,516 UART: [cold-reset] ++
5,555,903 UART: [fht] FHT @ 0x50003400
5,568,455 UART: [idev] ++
5,569,136 UART: [idev] CDI.KEYID = 6
5,570,079 UART: [idev] SUBJECT.KEYID = 7
5,571,292 UART: [idev] UDS.KEYID = 0
5,573,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,717,784 UART: [idev] Erasing UDS.KEYID = 0
8,076,887 UART: [idev] Sha1 KeyId Algorithm
8,099,262 UART: [idev] --
8,103,749 UART: [ldev] ++
8,104,429 UART: [ldev] CDI.KEYID = 6
8,105,444 UART: [ldev] SUBJECT.KEYID = 5
8,106,544 UART: [ldev] AUTHORITY.KEYID = 7
8,107,771 UART: [ldev] FE.KEYID = 1
8,147,320 UART: [ldev] Erasing FE.KEYID = 1
10,654,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,341 UART: [ldev] --
12,462,090 UART: [fwproc] Wait for Commands...
12,464,627 UART: [fwproc] Recv command 0x46574c44
12,466,960 UART: [fwproc] Recv'd Img size: 114448 bytes
15,911,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,646,631 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,441,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,856,405 >>> mbox cmd response: failed
11,857,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,857,496 >>> mbox cmd response: failed
11,857,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,858,086 >>> mbox cmd response: failed
Initializing fuses
2,064,958 writing to cptra_bootfsm_go
5,491,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,781,055 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,590 UART:
192,949 UART: Running Caliptra ROM ...
194,069 UART:
603,856 UART: [state] CFI Enabled
619,772 UART: [state] LifecycleState = Unprovisioned
622,149 UART: [state] DebugLocked = No
623,934 UART: [state] WD Timer not started. Device not locked for debugging
628,563 UART: [kat] SHA2-256
818,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,157 UART: [kat] ++
829,655 UART: [kat] sha1
842,009 UART: [kat] SHA2-256
845,070 UART: [kat] SHA2-384
851,892 UART: [kat] SHA2-512-ACC
854,462 UART: [kat] ECC-384
3,296,157 UART: [kat] HMAC-384Kdf
3,308,171 UART: [kat] LMS
3,839,948 UART: [kat] --
3,845,403 UART: [cold-reset] ++
3,846,848 UART: [fht] FHT @ 0x50003400
3,858,533 UART: [idev] ++
3,859,208 UART: [idev] CDI.KEYID = 6
3,860,169 UART: [idev] SUBJECT.KEYID = 7
3,861,382 UART: [idev] UDS.KEYID = 0
3,864,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,008,023 UART: [idev] Erasing UDS.KEYID = 0
6,335,503 UART: [idev] Sha1 KeyId Algorithm
6,358,274 UART: [idev] --
6,363,572 UART: [ldev] ++
6,364,255 UART: [ldev] CDI.KEYID = 6
6,365,332 UART: [ldev] SUBJECT.KEYID = 5
6,366,461 UART: [ldev] AUTHORITY.KEYID = 7
6,367,644 UART: [ldev] FE.KEYID = 1
6,377,052 UART: [ldev] Erasing FE.KEYID = 1
8,854,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,895 UART: [ldev] --
10,646,533 UART: [fwproc] Wait for Commands...
10,648,464 UART: [fwproc] Recv command 0x46574c44
10,650,723 UART: [fwproc] Recv'd Img size: 114448 bytes
12,355,652 UART: ROM Fatal Error: 0x000B0030
12,359,086 >>> mbox cmd response: failed
12,359,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,359,736 >>> mbox cmd response: failed
12,360,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,360,286 >>> mbox cmd response: failed
Initializing fuses
2,052,106 writing to cptra_bootfsm_go
2,241,412 UART:
2,241,773 UART: Running Caliptra ROM ...
2,242,830 UART:
8,117,265 UART: [state] CFI Enabled
8,131,194 UART: [state] LifecycleState = Unprovisioned
8,133,539 UART: [state] DebugLocked = No
8,134,983 UART: [state] WD Timer not started. Device not locked for debugging
8,138,787 UART: [kat] SHA2-256
8,328,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,339,496 UART: [kat] ++
8,339,956 UART: [kat] sha1
8,351,658 UART: [kat] SHA2-256
8,354,688 UART: [kat] SHA2-384
8,362,084 UART: [kat] SHA2-512-ACC
8,364,655 UART: [kat] ECC-384
10,809,071 UART: [kat] HMAC-384Kdf
10,822,544 UART: [kat] LMS
11,354,418 UART: [kat] --
11,359,117 UART: [cold-reset] ++
11,360,504 UART: [fht] FHT @ 0x50003400
11,371,860 UART: [idev] ++
11,372,579 UART: [idev] CDI.KEYID = 6
11,373,538 UART: [idev] SUBJECT.KEYID = 7
11,374,701 UART: [idev] UDS.KEYID = 0
11,377,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,521,088 UART: [idev] Erasing UDS.KEYID = 0
13,855,228 UART: [idev] Sha1 KeyId Algorithm
13,876,893 UART: [idev] --
13,881,262 UART: [ldev] ++
13,881,942 UART: [ldev] CDI.KEYID = 6
13,882,850 UART: [ldev] SUBJECT.KEYID = 5
13,884,063 UART: [ldev] AUTHORITY.KEYID = 7
13,885,238 UART: [ldev] FE.KEYID = 1
13,895,940 UART: [ldev] Erasing FE.KEYID = 1
16,371,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,093,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,108,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,124,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,139,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,159,746 UART: [ldev] --
18,164,632 UART: [fwproc] Wait for Commands...
18,166,394 UART: [fwproc] Recv command 0x46574c44
18,168,720 UART: [fwproc] Recv'd Img size: 114448 bytes
21,614,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,691,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,807,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,351,308 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,754,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,088,942 >>> mbox cmd response: failed
12,089,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,089,821 >>> mbox cmd response: failed
12,090,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,090,384 >>> mbox cmd response: failed
Initializing fuses
2,056,840 writing to cptra_bootfsm_go
11,532,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,726,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,542 UART: [kat] LMS
1,475,738 UART: [kat] --
1,476,411 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,505,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,014 UART: [idev] --
1,515,021 UART: [ldev] ++
1,515,189 UART: [ldev] CDI.KEYID = 6
1,515,552 UART: [ldev] SUBJECT.KEYID = 5
1,515,978 UART: [ldev] AUTHORITY.KEYID = 7
1,516,441 UART: [ldev] FE.KEYID = 1
1,521,699 UART: [ldev] Erasing FE.KEYID = 1
1,547,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,670 UART: [ldev] --
1,586,077 UART: [fwproc] Waiting for Commands...
1,586,740 UART: [fwproc] Received command 0x46574c44
1,587,531 UART: [fwproc] Received Image of size 114448 bytes
2,875,962 UART: ROM Fatal Error: 0x000B0030
2,877,119 >>> mbox cmd response: failed
2,877,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,877,125 >>> mbox cmd response: failed
2,877,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,877,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,665 UART: [kat] SHA2-256
892,603 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,408 UART: [kat] LMS
1,475,604 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,125 UART: [fht] Storing FHT @ 0x50003400
1,479,820 UART: [idev] ++
1,479,988 UART: [idev] CDI.KEYID = 6
1,480,348 UART: [idev] SUBJECT.KEYID = 7
1,480,772 UART: [idev] UDS.KEYID = 0
1,481,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,212 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,731 UART: [ldev] ++
1,514,899 UART: [ldev] CDI.KEYID = 6
1,515,262 UART: [ldev] SUBJECT.KEYID = 5
1,515,688 UART: [ldev] AUTHORITY.KEYID = 7
1,516,151 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,362 UART: [ldev] --
1,585,757 UART: [fwproc] Waiting for Commands...
1,586,390 UART: [fwproc] Received command 0x46574c44
1,587,181 UART: [fwproc] Received Image of size 114448 bytes
2,885,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,780 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,465,539 >>> mbox cmd response: failed
2,465,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,465,545 >>> mbox cmd response: failed
2,465,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,465,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,984 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,505,211 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,760 UART: [ldev] ++
1,514,928 UART: [ldev] CDI.KEYID = 6
1,515,291 UART: [ldev] SUBJECT.KEYID = 5
1,515,717 UART: [ldev] AUTHORITY.KEYID = 7
1,516,180 UART: [ldev] FE.KEYID = 1
1,521,410 UART: [ldev] Erasing FE.KEYID = 1
1,546,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,145 UART: [ldev] --
1,586,412 UART: [fwproc] Waiting for Commands...
1,587,203 UART: [fwproc] Received command 0x46574c44
1,587,994 UART: [fwproc] Received Image of size 114448 bytes
2,800,331 UART: ROM Fatal Error: 0x000B0030
2,801,488 >>> mbox cmd response: failed
2,801,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,801,494 >>> mbox cmd response: failed
2,801,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,801,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,691 UART: [kat] LMS
1,475,887 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,543 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,243 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,521,882 UART: [ldev] Erasing FE.KEYID = 1
1,546,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,729 UART: [ldev] --
1,586,102 UART: [fwproc] Waiting for Commands...
1,586,897 UART: [fwproc] Received command 0x46574c44
1,587,688 UART: [fwproc] Received Image of size 114448 bytes
2,886,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,923 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,655,141 >>> mbox cmd response: failed
2,655,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,147 >>> mbox cmd response: failed
2,655,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,885 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,802 UART: [kat] HMAC-384Kdf
923,350 UART: [kat] LMS
1,171,678 UART: [kat] --
1,172,543 UART: [cold-reset] ++
1,172,941 UART: [fht] FHT @ 0x50003400
1,175,546 UART: [idev] ++
1,175,714 UART: [idev] CDI.KEYID = 6
1,176,074 UART: [idev] SUBJECT.KEYID = 7
1,176,498 UART: [idev] UDS.KEYID = 0
1,176,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,938 UART: [idev] Erasing UDS.KEYID = 0
1,201,379 UART: [idev] Sha1 KeyId Algorithm
1,209,853 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,234 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 114448 bytes
1,594,781 UART: ROM Fatal Error: 0x000B0030
1,595,938 >>> mbox cmd response: failed
1,595,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,944 >>> mbox cmd response: failed
1,595,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [kat] SHA2-256
893,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,839 UART: [kat] ++
897,991 UART: [kat] sha1
902,337 UART: [kat] SHA2-256
904,277 UART: [kat] SHA2-384
907,038 UART: [kat] SHA2-512-ACC
908,939 UART: [kat] ECC-384
918,928 UART: [kat] HMAC-384Kdf
923,324 UART: [kat] LMS
1,171,652 UART: [kat] --
1,172,243 UART: [cold-reset] ++
1,172,785 UART: [fht] FHT @ 0x50003400
1,175,364 UART: [idev] ++
1,175,532 UART: [idev] CDI.KEYID = 6
1,175,892 UART: [idev] SUBJECT.KEYID = 7
1,176,316 UART: [idev] UDS.KEYID = 0
1,176,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,201,323 UART: [idev] Sha1 KeyId Algorithm
1,209,657 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,366 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,790 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,450,881 >>> mbox cmd response: failed
1,450,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,887 >>> mbox cmd response: failed
1,450,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,732 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
894,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,144 UART: [kat] ++
898,296 UART: [kat] sha1
902,502 UART: [kat] SHA2-256
904,442 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
922,927 UART: [kat] LMS
1,171,255 UART: [kat] --
1,172,052 UART: [cold-reset] ++
1,172,542 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,201,230 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,638 UART: [ldev] ++
1,210,806 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,217,766 UART: [ldev] Erasing FE.KEYID = 1
1,243,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,466 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,439 UART: [fwproc] Recv command 0x46574c44
1,284,167 UART: [fwproc] Recv'd Img size: 114448 bytes
1,599,936 UART: ROM Fatal Error: 0x000B0030
1,601,093 >>> mbox cmd response: failed
1,601,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,099 >>> mbox cmd response: failed
1,601,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,674 UART: [cold-reset] ++
1,173,044 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,791 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,209,980 UART: [idev] --
1,211,010 UART: [ldev] ++
1,211,178 UART: [ldev] CDI.KEYID = 6
1,211,541 UART: [ldev] SUBJECT.KEYID = 5
1,211,967 UART: [ldev] AUTHORITY.KEYID = 7
1,212,430 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,244,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,665 UART: [fwproc] Wait for Commands...
1,284,295 UART: [fwproc] Recv command 0x46574c44
1,285,023 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,464 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,446,180 >>> mbox cmd response: failed
1,446,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,186 >>> mbox cmd response: failed
1,446,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,691 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,319 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x46574c44
1,282,898 UART: [fwproc] Recv'd Img size: 114448 bytes
1,596,486 UART: ROM Fatal Error: 0x000B0030
1,597,643 >>> mbox cmd response: failed
1,597,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,649 >>> mbox cmd response: failed
1,597,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,267 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,576 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,008 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,282,111 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,299 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,445,349 >>> mbox cmd response: failed
1,445,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,355 >>> mbox cmd response: failed
1,445,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,021 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,953 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 114448 bytes
1,585,915 UART: ROM Fatal Error: 0x000B0030
1,587,072 >>> mbox cmd response: failed
1,587,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,078 >>> mbox cmd response: failed
1,587,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,693 UART: [kat] LMS
1,169,005 UART: [kat] --
1,169,764 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,174,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,208,022 UART: [idev] --
1,209,117 UART: [ldev] ++
1,209,285 UART: [ldev] CDI.KEYID = 6
1,209,649 UART: [ldev] SUBJECT.KEYID = 5
1,210,076 UART: [ldev] AUTHORITY.KEYID = 7
1,210,539 UART: [ldev] FE.KEYID = 1
1,215,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,093 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,812 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,448,236 >>> mbox cmd response: failed
1,448,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,242 >>> mbox cmd response: failed
1,448,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,466 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,096 UART:
192,465 UART: Running Caliptra ROM ...
193,561 UART:
193,707 UART: [state] CFI Enabled
265,468 UART: [state] LifecycleState = Unprovisioned
267,465 UART: [state] DebugLocked = No
270,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,035 UART: [kat] SHA2-256
444,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,182 UART: [kat] ++
455,626 UART: [kat] sha1
466,141 UART: [kat] SHA2-256
468,823 UART: [kat] SHA2-384
473,666 UART: [kat] SHA2-512-ACC
476,058 UART: [kat] ECC-384
2,767,190 UART: [kat] HMAC-384Kdf
2,798,050 UART: [kat] LMS
3,988,352 UART: [kat] --
3,993,388 UART: [cold-reset] ++
3,995,977 UART: [fht] Storing FHT @ 0x50003400
4,008,649 UART: [idev] ++
4,009,263 UART: [idev] CDI.KEYID = 6
4,010,193 UART: [idev] SUBJECT.KEYID = 7
4,011,423 UART: [idev] UDS.KEYID = 0
4,014,111 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,720 UART: [idev] Erasing UDS.KEYID = 0
7,344,285 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,268 UART: [idev] --
7,370,046 UART: [ldev] ++
7,370,661 UART: [ldev] CDI.KEYID = 6
7,371,578 UART: [ldev] SUBJECT.KEYID = 5
7,372,796 UART: [ldev] AUTHORITY.KEYID = 7
7,374,083 UART: [ldev] FE.KEYID = 1
7,422,162 UART: [ldev] Erasing FE.KEYID = 1
10,752,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,788 UART: [ldev] --
13,114,353 UART: [fwproc] Waiting for Commands...
13,116,564 UART: [fwproc] Received command 0x46574c44
13,118,752 UART: [fwproc] Received Image of size 114124 bytes
13,197,355 UART: ROM Fatal Error: 0x000B0032
13,200,879 >>> mbox cmd response: failed
13,201,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,626 >>> mbox cmd response: failed
13,201,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,202,182 >>> mbox cmd response: failed
Initializing fuses
2,049,614 writing to cptra_bootfsm_go
2,239,014 UART:
2,239,378 UART: Running Caliptra ROM ...
2,240,518 UART:
2,240,688 UART: [state] CFI Enabled
2,311,406 UART: [state] LifecycleState = Unprovisioned
2,313,364 UART: [state] DebugLocked = No
2,315,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,116 UART: [kat] SHA2-256
2,490,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,320 UART: [kat] ++
2,501,863 UART: [kat] sha1
2,513,243 UART: [kat] SHA2-256
2,515,945 UART: [kat] SHA2-384
2,521,609 UART: [kat] SHA2-512-ACC
2,524,013 UART: [kat] ECC-384
4,815,955 UART: [kat] HMAC-384Kdf
4,847,850 UART: [kat] LMS
6,038,128 UART: [kat] --
6,042,523 UART: [cold-reset] ++
6,043,864 UART: [fht] Storing FHT @ 0x50003400
6,055,614 UART: [idev] ++
6,056,208 UART: [idev] CDI.KEYID = 6
6,057,230 UART: [idev] SUBJECT.KEYID = 7
6,058,393 UART: [idev] UDS.KEYID = 0
6,061,072 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,204,746 UART: [idev] Erasing UDS.KEYID = 0
9,397,013 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,319 UART: [idev] --
9,422,935 UART: [ldev] ++
9,423,506 UART: [ldev] CDI.KEYID = 6
9,424,476 UART: [ldev] SUBJECT.KEYID = 5
9,425,685 UART: [ldev] AUTHORITY.KEYID = 7
9,426,921 UART: [ldev] FE.KEYID = 1
9,470,042 UART: [ldev] Erasing FE.KEYID = 1
12,803,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,077 UART: [ldev] --
15,183,432 UART: [fwproc] Waiting for Commands...
15,186,069 UART: [fwproc] Received command 0x46574c44
15,188,312 UART: [fwproc] Received Image of size 114124 bytes
19,235,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,307,971 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,376,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,694,978 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,786,617 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,923,443 >>> mbox cmd response: failed
12,923,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,322 >>> mbox cmd response: failed
12,924,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,883 >>> mbox cmd response: failed
Initializing fuses
2,051,751 writing to cptra_bootfsm_go
5,819,928 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,870,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,614 UART:
192,977 UART: Running Caliptra ROM ...
194,073 UART:
603,737 UART: [state] CFI Enabled
619,376 UART: [state] LifecycleState = Unprovisioned
621,358 UART: [state] DebugLocked = No
623,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,870 UART: [kat] SHA2-256
798,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,181 UART: [kat] ++
809,673 UART: [kat] sha1
820,930 UART: [kat] SHA2-256
823,615 UART: [kat] SHA2-384
828,513 UART: [kat] SHA2-512-ACC
830,906 UART: [kat] ECC-384
3,112,504 UART: [kat] HMAC-384Kdf
3,124,205 UART: [kat] LMS
4,314,302 UART: [kat] --
4,321,559 UART: [cold-reset] ++
4,322,960 UART: [fht] Storing FHT @ 0x50003400
4,333,742 UART: [idev] ++
4,334,306 UART: [idev] CDI.KEYID = 6
4,335,319 UART: [idev] SUBJECT.KEYID = 7
4,336,479 UART: [idev] UDS.KEYID = 0
4,339,452 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,990 UART: [idev] Erasing UDS.KEYID = 0
7,624,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,417 UART: [idev] --
7,650,900 UART: [ldev] ++
7,651,469 UART: [ldev] CDI.KEYID = 6
7,652,412 UART: [ldev] SUBJECT.KEYID = 5
7,653,627 UART: [ldev] AUTHORITY.KEYID = 7
7,654,921 UART: [ldev] FE.KEYID = 1
7,666,437 UART: [ldev] Erasing FE.KEYID = 1
10,958,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,419 UART: [ldev] --
13,321,432 UART: [fwproc] Waiting for Commands...
13,323,321 UART: [fwproc] Received command 0x46574c44
13,325,513 UART: [fwproc] Received Image of size 114124 bytes
13,405,258 UART: ROM Fatal Error: 0x000B0032
13,408,777 >>> mbox cmd response: failed
13,409,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,409,454 >>> mbox cmd response: failed
13,409,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,410,020 >>> mbox cmd response: failed
Initializing fuses
2,048,702 writing to cptra_bootfsm_go
2,238,021 UART:
2,238,380 UART: Running Caliptra ROM ...
2,239,452 UART:
7,061,373 UART: [state] CFI Enabled
7,078,437 UART: [state] LifecycleState = Unprovisioned
7,080,359 UART: [state] DebugLocked = No
7,082,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,086,881 UART: [kat] SHA2-256
7,256,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,267,200 UART: [kat] ++
7,267,670 UART: [kat] sha1
7,278,013 UART: [kat] SHA2-256
7,280,715 UART: [kat] SHA2-384
7,287,088 UART: [kat] SHA2-512-ACC
7,289,482 UART: [kat] ECC-384
9,573,531 UART: [kat] HMAC-384Kdf
9,585,990 UART: [kat] LMS
10,776,110 UART: [kat] --
10,780,067 UART: [cold-reset] ++
10,781,080 UART: [fht] Storing FHT @ 0x50003400
10,792,891 UART: [idev] ++
10,793,455 UART: [idev] CDI.KEYID = 6
10,794,421 UART: [idev] SUBJECT.KEYID = 7
10,795,630 UART: [idev] UDS.KEYID = 0
10,798,448 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,941,910 UART: [idev] Erasing UDS.KEYID = 0
14,080,149 UART: [idev] Using Sha1 for KeyId Algorithm
14,102,469 UART: [idev] --
14,105,591 UART: [ldev] ++
14,106,223 UART: [ldev] CDI.KEYID = 6
14,107,133 UART: [ldev] SUBJECT.KEYID = 5
14,108,377 UART: [ldev] AUTHORITY.KEYID = 7
14,109,612 UART: [ldev] FE.KEYID = 1
14,121,424 UART: [ldev] Erasing FE.KEYID = 1
17,406,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,698,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,713,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,761,154 UART: [ldev] --
19,766,423 UART: [fwproc] Waiting for Commands...
19,768,945 UART: [fwproc] Received command 0x46574c44
19,771,149 UART: [fwproc] Received Image of size 114124 bytes
23,820,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,901,963 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,970,830 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,288,579 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,127,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,121,551 >>> mbox cmd response: failed
13,122,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,122,453 >>> mbox cmd response: failed
13,122,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,123,004 >>> mbox cmd response: failed
Initializing fuses
2,044,229 writing to cptra_bootfsm_go
10,875,662 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,822,282 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,286 UART:
192,662 UART: Running Caliptra ROM ...
193,856 UART:
194,010 UART: [state] CFI Enabled
263,191 UART: [state] LifecycleState = Unprovisioned
265,164 UART: [state] DebugLocked = No
266,673 UART: [state] WD Timer not started. Device not locked for debugging
271,197 UART: [kat] SHA2-256
450,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,857 UART: [kat] ++
462,305 UART: [kat] sha1
473,610 UART: [kat] SHA2-256
476,672 UART: [kat] SHA2-384
482,482 UART: [kat] SHA2-512-ACC
485,468 UART: [kat] ECC-384
2,945,133 UART: [kat] HMAC-384Kdf
2,970,278 UART: [kat] LMS
3,499,715 UART: [kat] --
3,506,706 UART: [cold-reset] ++
3,509,351 UART: [fht] FHT @ 0x50003400
3,521,246 UART: [idev] ++
3,521,829 UART: [idev] CDI.KEYID = 6
3,522,711 UART: [idev] SUBJECT.KEYID = 7
3,523,926 UART: [idev] UDS.KEYID = 0
3,526,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,769 UART: [idev] Erasing UDS.KEYID = 0
6,024,991 UART: [idev] Sha1 KeyId Algorithm
6,048,387 UART: [idev] --
6,052,440 UART: [ldev] ++
6,053,024 UART: [ldev] CDI.KEYID = 6
6,053,941 UART: [ldev] SUBJECT.KEYID = 5
6,055,106 UART: [ldev] AUTHORITY.KEYID = 7
6,056,343 UART: [ldev] FE.KEYID = 1
6,100,295 UART: [ldev] Erasing FE.KEYID = 1
8,605,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,700 UART: [ldev] --
10,413,916 UART: [fwproc] Wait for Commands...
10,416,077 UART: [fwproc] Recv command 0x46574c44
10,418,120 UART: [fwproc] Recv'd Img size: 114448 bytes
10,495,835 UART: ROM Fatal Error: 0x000B0032
10,498,979 >>> mbox cmd response: failed
10,499,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,723 >>> mbox cmd response: failed
10,499,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,500,588 >>> mbox cmd response: failed
Initializing fuses
2,046,724 writing to cptra_bootfsm_go
2,236,023 UART:
2,236,372 UART: Running Caliptra ROM ...
2,237,512 UART:
2,237,686 UART: [state] CFI Enabled
2,291,932 UART: [state] LifecycleState = Unprovisioned
2,293,815 UART: [state] DebugLocked = No
2,295,799 UART: [state] WD Timer not started. Device not locked for debugging
2,298,846 UART: [kat] SHA2-256
2,477,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,489,527 UART: [kat] ++
2,490,090 UART: [kat] sha1
2,501,099 UART: [kat] SHA2-256
2,504,118 UART: [kat] SHA2-384
2,510,053 UART: [kat] SHA2-512-ACC
2,513,002 UART: [kat] ECC-384
4,960,487 UART: [kat] HMAC-384Kdf
4,982,827 UART: [kat] LMS
5,512,270 UART: [kat] --
5,516,766 UART: [cold-reset] ++
5,517,840 UART: [fht] FHT @ 0x50003400
5,527,788 UART: [idev] ++
5,528,381 UART: [idev] CDI.KEYID = 6
5,529,268 UART: [idev] SUBJECT.KEYID = 7
5,530,486 UART: [idev] UDS.KEYID = 0
5,533,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,677,054 UART: [idev] Erasing UDS.KEYID = 0
8,040,173 UART: [idev] Sha1 KeyId Algorithm
8,062,494 UART: [idev] --
8,067,250 UART: [ldev] ++
8,067,825 UART: [ldev] CDI.KEYID = 6
8,068,713 UART: [ldev] SUBJECT.KEYID = 5
8,069,948 UART: [ldev] AUTHORITY.KEYID = 7
8,071,187 UART: [ldev] FE.KEYID = 1
8,113,599 UART: [ldev] Erasing FE.KEYID = 1
10,615,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,333,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,349,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,365,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,381,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,402,249 UART: [ldev] --
12,406,265 UART: [fwproc] Wait for Commands...
12,408,695 UART: [fwproc] Recv command 0x46574c44
12,410,802 UART: [fwproc] Recv'd Img size: 114448 bytes
15,816,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,892,484 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,961,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,280,124 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,384,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,305,528 >>> mbox cmd response: failed
10,306,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,306,442 >>> mbox cmd response: failed
10,306,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,307,001 >>> mbox cmd response: failed
Initializing fuses
2,048,076 writing to cptra_bootfsm_go
5,432,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,112,951 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,572 UART:
192,949 UART: Running Caliptra ROM ...
194,100 UART:
603,491 UART: [state] CFI Enabled
616,422 UART: [state] LifecycleState = Unprovisioned
618,277 UART: [state] DebugLocked = No
620,137 UART: [state] WD Timer not started. Device not locked for debugging
623,150 UART: [kat] SHA2-256
802,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,840 UART: [kat] ++
814,372 UART: [kat] sha1
826,605 UART: [kat] SHA2-256
829,608 UART: [kat] SHA2-384
835,256 UART: [kat] SHA2-512-ACC
838,244 UART: [kat] ECC-384
3,281,025 UART: [kat] HMAC-384Kdf
3,293,894 UART: [kat] LMS
3,823,350 UART: [kat] --
3,826,982 UART: [cold-reset] ++
3,828,874 UART: [fht] FHT @ 0x50003400
3,839,694 UART: [idev] ++
3,840,258 UART: [idev] CDI.KEYID = 6
3,841,240 UART: [idev] SUBJECT.KEYID = 7
3,842,340 UART: [idev] UDS.KEYID = 0
3,845,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,415 UART: [idev] Erasing UDS.KEYID = 0
6,315,945 UART: [idev] Sha1 KeyId Algorithm
6,337,868 UART: [idev] --
6,341,137 UART: [ldev] ++
6,341,719 UART: [ldev] CDI.KEYID = 6
6,342,603 UART: [ldev] SUBJECT.KEYID = 5
6,343,781 UART: [ldev] AUTHORITY.KEYID = 7
6,345,072 UART: [ldev] FE.KEYID = 1
6,356,022 UART: [ldev] Erasing FE.KEYID = 1
8,833,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,434 UART: [ldev] --
10,624,856 UART: [fwproc] Wait for Commands...
10,628,038 UART: [fwproc] Recv command 0x46574c44
10,630,085 UART: [fwproc] Recv'd Img size: 114448 bytes
10,705,634 UART: ROM Fatal Error: 0x000B0032
10,708,724 >>> mbox cmd response: failed
10,709,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,503 >>> mbox cmd response: failed
10,709,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,710,058 >>> mbox cmd response: failed
Initializing fuses
2,052,477 writing to cptra_bootfsm_go
2,241,761 UART:
2,242,113 UART: Running Caliptra ROM ...
2,243,256 UART:
9,747,563 UART: [state] CFI Enabled
9,759,454 UART: [state] LifecycleState = Unprovisioned
9,761,308 UART: [state] DebugLocked = No
9,762,747 UART: [state] WD Timer not started. Device not locked for debugging
9,767,353 UART: [kat] SHA2-256
9,946,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,958,042 UART: [kat] ++
9,958,583 UART: [kat] sha1
9,970,233 UART: [kat] SHA2-256
9,973,211 UART: [kat] SHA2-384
9,980,173 UART: [kat] SHA2-512-ACC
9,983,125 UART: [kat] ECC-384
12,423,941 UART: [kat] HMAC-384Kdf
12,435,791 UART: [kat] LMS
12,965,293 UART: [kat] --
12,968,904 UART: [cold-reset] ++
12,970,672 UART: [fht] FHT @ 0x50003400
12,980,782 UART: [idev] ++
12,981,389 UART: [idev] CDI.KEYID = 6
12,982,279 UART: [idev] SUBJECT.KEYID = 7
12,983,491 UART: [idev] UDS.KEYID = 0
12,986,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,130,221 UART: [idev] Erasing UDS.KEYID = 0
15,456,825 UART: [idev] Sha1 KeyId Algorithm
15,479,471 UART: [idev] --
15,484,086 UART: [ldev] ++
15,484,662 UART: [ldev] CDI.KEYID = 6
15,485,570 UART: [ldev] SUBJECT.KEYID = 5
15,486,728 UART: [ldev] AUTHORITY.KEYID = 7
15,488,009 UART: [ldev] FE.KEYID = 1
15,497,523 UART: [ldev] Erasing FE.KEYID = 1
17,970,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,690,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,737,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,757,831 UART: [ldev] --
19,762,174 UART: [fwproc] Wait for Commands...
19,765,079 UART: [fwproc] Recv command 0x46574c44
19,767,180 UART: [fwproc] Recv'd Img size: 114448 bytes
23,168,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,240,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,308,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,626,705 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,700,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,481,429 >>> mbox cmd response: failed
10,482,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,482,376 >>> mbox cmd response: failed
10,482,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,482,933 >>> mbox cmd response: failed
Initializing fuses
2,045,891 writing to cptra_bootfsm_go
13,083,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,663,841 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,189 UART:
192,562 UART: Running Caliptra ROM ...
193,752 UART:
193,901 UART: [state] CFI Enabled
263,386 UART: [state] LifecycleState = Unprovisioned
265,779 UART: [state] DebugLocked = No
268,023 UART: [state] WD Timer not started. Device not locked for debugging
272,820 UART: [kat] SHA2-256
462,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,478 UART: [kat] ++
473,932 UART: [kat] sha1
485,460 UART: [kat] SHA2-256
488,466 UART: [kat] SHA2-384
493,367 UART: [kat] SHA2-512-ACC
495,978 UART: [kat] ECC-384
2,946,760 UART: [kat] HMAC-384Kdf
2,971,067 UART: [kat] LMS
3,502,827 UART: [kat] --
3,509,194 UART: [cold-reset] ++
3,510,165 UART: [fht] FHT @ 0x50003400
3,522,394 UART: [idev] ++
3,523,083 UART: [idev] CDI.KEYID = 6
3,524,106 UART: [idev] SUBJECT.KEYID = 7
3,525,210 UART: [idev] UDS.KEYID = 0
3,528,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,307 UART: [idev] Erasing UDS.KEYID = 0
6,030,636 UART: [idev] Sha1 KeyId Algorithm
6,054,306 UART: [idev] --
6,060,464 UART: [ldev] ++
6,061,162 UART: [ldev] CDI.KEYID = 6
6,062,054 UART: [ldev] SUBJECT.KEYID = 5
6,063,162 UART: [ldev] AUTHORITY.KEYID = 7
6,064,399 UART: [ldev] FE.KEYID = 1
6,101,931 UART: [ldev] Erasing FE.KEYID = 1
8,607,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,903 UART: [ldev] --
10,416,393 UART: [fwproc] Wait for Commands...
10,418,989 UART: [fwproc] Recv command 0x46574c44
10,421,299 UART: [fwproc] Recv'd Img size: 114448 bytes
10,528,936 UART: ROM Fatal Error: 0x000B0032
10,532,563 >>> mbox cmd response: failed
10,533,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,535 >>> mbox cmd response: failed
10,533,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,534,100 >>> mbox cmd response: failed
Initializing fuses
2,064,889 writing to cptra_bootfsm_go
2,254,210 UART:
2,254,563 UART: Running Caliptra ROM ...
2,255,700 UART:
2,255,865 UART: [state] CFI Enabled
2,316,695 UART: [state] LifecycleState = Unprovisioned
2,319,174 UART: [state] DebugLocked = No
2,321,540 UART: [state] WD Timer not started. Device not locked for debugging
2,325,937 UART: [kat] SHA2-256
2,515,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,606 UART: [kat] ++
2,527,150 UART: [kat] sha1
2,539,520 UART: [kat] SHA2-256
2,542,538 UART: [kat] SHA2-384
2,548,521 UART: [kat] SHA2-512-ACC
2,551,095 UART: [kat] ECC-384
5,000,382 UART: [kat] HMAC-384Kdf
5,024,344 UART: [kat] LMS
5,556,094 UART: [kat] --
5,561,054 UART: [cold-reset] ++
5,563,096 UART: [fht] FHT @ 0x50003400
5,573,108 UART: [idev] ++
5,573,784 UART: [idev] CDI.KEYID = 6
5,574,761 UART: [idev] SUBJECT.KEYID = 7
5,575,976 UART: [idev] UDS.KEYID = 0
5,578,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,723,237 UART: [idev] Erasing UDS.KEYID = 0
8,081,497 UART: [idev] Sha1 KeyId Algorithm
8,102,483 UART: [idev] --
8,107,029 UART: [ldev] ++
8,107,716 UART: [ldev] CDI.KEYID = 6
8,108,627 UART: [ldev] SUBJECT.KEYID = 5
8,109,787 UART: [ldev] AUTHORITY.KEYID = 7
8,111,017 UART: [ldev] FE.KEYID = 1
8,151,801 UART: [ldev] Erasing FE.KEYID = 1
10,658,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,691 UART: [ldev] --
12,463,686 UART: [fwproc] Wait for Commands...
12,466,762 UART: [fwproc] Recv command 0x46574c44
12,469,073 UART: [fwproc] Recv'd Img size: 114448 bytes
15,913,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,102,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,645,983 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,440,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,325,697 >>> mbox cmd response: failed
10,326,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,587 >>> mbox cmd response: failed
10,326,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,327,193 >>> mbox cmd response: failed
Initializing fuses
2,046,464 writing to cptra_bootfsm_go
5,483,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,776,382 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,377 UART:
192,745 UART: Running Caliptra ROM ...
193,841 UART:
603,662 UART: [state] CFI Enabled
617,860 UART: [state] LifecycleState = Unprovisioned
620,230 UART: [state] DebugLocked = No
622,581 UART: [state] WD Timer not started. Device not locked for debugging
627,205 UART: [kat] SHA2-256
817,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,906 UART: [kat] ++
828,492 UART: [kat] sha1
839,540 UART: [kat] SHA2-256
842,539 UART: [kat] SHA2-384
848,096 UART: [kat] SHA2-512-ACC
850,716 UART: [kat] ECC-384
3,290,708 UART: [kat] HMAC-384Kdf
3,304,312 UART: [kat] LMS
3,836,122 UART: [kat] --
3,841,592 UART: [cold-reset] ++
3,842,848 UART: [fht] FHT @ 0x50003400
3,855,558 UART: [idev] ++
3,856,232 UART: [idev] CDI.KEYID = 6
3,857,245 UART: [idev] SUBJECT.KEYID = 7
3,858,405 UART: [idev] UDS.KEYID = 0
3,861,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,005,112 UART: [idev] Erasing UDS.KEYID = 0
6,333,347 UART: [idev] Sha1 KeyId Algorithm
6,355,736 UART: [idev] --
6,360,086 UART: [ldev] ++
6,360,799 UART: [ldev] CDI.KEYID = 6
6,361,728 UART: [ldev] SUBJECT.KEYID = 5
6,362,773 UART: [ldev] AUTHORITY.KEYID = 7
6,364,062 UART: [ldev] FE.KEYID = 1
6,376,390 UART: [ldev] Erasing FE.KEYID = 1
8,855,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,919 UART: [ldev] --
10,648,938 UART: [fwproc] Wait for Commands...
10,650,978 UART: [fwproc] Recv command 0x46574c44
10,653,302 UART: [fwproc] Recv'd Img size: 114448 bytes
10,762,946 UART: ROM Fatal Error: 0x000B0032
10,766,634 >>> mbox cmd response: failed
10,767,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,767,394 >>> mbox cmd response: failed
10,767,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,767,949 >>> mbox cmd response: failed
Initializing fuses
2,050,478 writing to cptra_bootfsm_go
2,239,785 UART:
2,240,142 UART: Running Caliptra ROM ...
2,241,188 UART:
9,690,205 UART: [state] CFI Enabled
9,704,700 UART: [state] LifecycleState = Unprovisioned
9,707,052 UART: [state] DebugLocked = No
9,709,713 UART: [state] WD Timer not started. Device not locked for debugging
9,714,655 UART: [kat] SHA2-256
9,904,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,915,357 UART: [kat] ++
9,915,958 UART: [kat] sha1
9,926,257 UART: [kat] SHA2-256
9,929,274 UART: [kat] SHA2-384
9,933,883 UART: [kat] SHA2-512-ACC
9,936,508 UART: [kat] ECC-384
12,379,595 UART: [kat] HMAC-384Kdf
12,392,313 UART: [kat] LMS
12,924,117 UART: [kat] --
12,928,064 UART: [cold-reset] ++
12,928,923 UART: [fht] FHT @ 0x50003400
12,941,822 UART: [idev] ++
12,942,579 UART: [idev] CDI.KEYID = 6
12,943,466 UART: [idev] SUBJECT.KEYID = 7
12,944,680 UART: [idev] UDS.KEYID = 0
12,947,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,090,988 UART: [idev] Erasing UDS.KEYID = 0
15,420,327 UART: [idev] Sha1 KeyId Algorithm
15,443,271 UART: [idev] --
15,446,684 UART: [ldev] ++
15,447,382 UART: [ldev] CDI.KEYID = 6
15,448,274 UART: [ldev] SUBJECT.KEYID = 5
15,449,484 UART: [ldev] AUTHORITY.KEYID = 7
15,450,715 UART: [ldev] FE.KEYID = 1
15,463,444 UART: [ldev] Erasing FE.KEYID = 1
17,943,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,664,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,679,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,694,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,709,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,729,908 UART: [ldev] --
19,735,225 UART: [fwproc] Wait for Commands...
19,737,211 UART: [fwproc] Recv command 0x46574c44
19,739,525 UART: [fwproc] Recv'd Img size: 114448 bytes
23,189,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,266,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,383,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,925,353 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,757,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,543,531 >>> mbox cmd response: failed
10,544,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,405 >>> mbox cmd response: failed
10,544,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,965 >>> mbox cmd response: failed
Initializing fuses
2,044,987 writing to cptra_bootfsm_go
13,077,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,295,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,313 UART: [kat] SHA2-256
882,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,359 UART: [kat] ++
886,511 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,270 UART: [kat] LMS
1,475,466 UART: [kat] --
1,476,519 UART: [cold-reset] ++
1,476,931 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,978 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,914 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,771 UART: [ldev] Erasing FE.KEYID = 1
1,546,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,110 UART: [ldev] --
1,586,621 UART: [fwproc] Waiting for Commands...
1,587,434 UART: [fwproc] Received command 0x46574c44
1,588,225 UART: [fwproc] Received Image of size 114448 bytes
1,614,411 UART: ROM Fatal Error: 0x000B0032
1,615,568 >>> mbox cmd response: failed
1,615,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,574 >>> mbox cmd response: failed
1,615,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,872 UART: [kat] HMAC-384Kdf
907,540 UART: [kat] LMS
1,475,736 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,477,005 UART: [fht] Storing FHT @ 0x50003400
1,479,920 UART: [idev] ++
1,480,088 UART: [idev] CDI.KEYID = 6
1,480,448 UART: [idev] SUBJECT.KEYID = 7
1,480,872 UART: [idev] UDS.KEYID = 0
1,481,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,706 UART: [idev] Erasing UDS.KEYID = 0
1,505,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,746 UART: [idev] --
1,514,879 UART: [ldev] ++
1,515,047 UART: [ldev] CDI.KEYID = 6
1,515,410 UART: [ldev] SUBJECT.KEYID = 5
1,515,836 UART: [ldev] AUTHORITY.KEYID = 7
1,516,299 UART: [ldev] FE.KEYID = 1
1,521,587 UART: [ldev] Erasing FE.KEYID = 1
1,546,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,244 UART: [ldev] --
1,585,739 UART: [fwproc] Waiting for Commands...
1,586,528 UART: [fwproc] Received command 0x46574c44
1,587,319 UART: [fwproc] Received Image of size 114448 bytes
2,886,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,504 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,881 >>> mbox cmd response: failed
1,466,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,887 >>> mbox cmd response: failed
1,466,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,427 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,395 UART: [idev] ++
1,480,563 UART: [idev] CDI.KEYID = 6
1,480,923 UART: [idev] SUBJECT.KEYID = 7
1,481,347 UART: [idev] UDS.KEYID = 0
1,481,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,801 UART: [idev] --
1,516,064 UART: [ldev] ++
1,516,232 UART: [ldev] CDI.KEYID = 6
1,516,595 UART: [ldev] SUBJECT.KEYID = 5
1,517,021 UART: [ldev] AUTHORITY.KEYID = 7
1,517,484 UART: [ldev] FE.KEYID = 1
1,522,600 UART: [ldev] Erasing FE.KEYID = 1
1,548,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,419 UART: [ldev] --
1,587,836 UART: [fwproc] Waiting for Commands...
1,588,601 UART: [fwproc] Received command 0x46574c44
1,589,392 UART: [fwproc] Received Image of size 114448 bytes
1,615,042 UART: ROM Fatal Error: 0x000B0032
1,616,199 >>> mbox cmd response: failed
1,616,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,205 >>> mbox cmd response: failed
1,616,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,956 UART: [kat] SHA2-256
881,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,002 UART: [kat] ++
886,154 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
895,015 UART: [kat] SHA2-512-ACC
896,916 UART: [kat] ECC-384
902,609 UART: [kat] HMAC-384Kdf
907,239 UART: [kat] LMS
1,475,435 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,628 UART: [fht] Storing FHT @ 0x50003400
1,479,405 UART: [idev] ++
1,479,573 UART: [idev] CDI.KEYID = 6
1,479,933 UART: [idev] SUBJECT.KEYID = 7
1,480,357 UART: [idev] UDS.KEYID = 0
1,480,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,201 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,403 UART: [idev] --
1,514,494 UART: [ldev] ++
1,514,662 UART: [ldev] CDI.KEYID = 6
1,515,025 UART: [ldev] SUBJECT.KEYID = 5
1,515,451 UART: [ldev] AUTHORITY.KEYID = 7
1,515,914 UART: [ldev] FE.KEYID = 1
1,521,054 UART: [ldev] Erasing FE.KEYID = 1
1,546,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,347 UART: [ldev] --
1,585,768 UART: [fwproc] Waiting for Commands...
1,586,457 UART: [fwproc] Received command 0x46574c44
1,587,248 UART: [fwproc] Received Image of size 114448 bytes
2,886,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,267 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,468,254 >>> mbox cmd response: failed
1,468,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,260 >>> mbox cmd response: failed
1,468,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,203 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,892 UART: [kat] HMAC-384Kdf
922,334 UART: [kat] LMS
1,170,662 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,171,987 UART: [fht] FHT @ 0x50003400
1,174,708 UART: [idev] ++
1,174,876 UART: [idev] CDI.KEYID = 6
1,175,236 UART: [idev] SUBJECT.KEYID = 7
1,175,660 UART: [idev] UDS.KEYID = 0
1,176,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,817 UART: [idev] Sha1 KeyId Algorithm
1,209,327 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,972 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,306 UART: [fwproc] Wait for Commands...
1,282,934 UART: [fwproc] Recv command 0x46574c44
1,283,662 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,806 UART: ROM Fatal Error: 0x000B0032
1,310,963 >>> mbox cmd response: failed
1,310,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,969 >>> mbox cmd response: failed
1,310,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,434 UART: [kat] LMS
1,170,762 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,174,944 UART: [idev] ++
1,175,112 UART: [idev] CDI.KEYID = 6
1,175,472 UART: [idev] SUBJECT.KEYID = 7
1,175,896 UART: [idev] UDS.KEYID = 0
1,176,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,155 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,921 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,236 UART: [fwproc] Recv command 0x46574c44
1,283,964 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,397 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,165,706 >>> mbox cmd response: failed
1,165,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,712 >>> mbox cmd response: failed
1,165,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,064 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,555 UART: [idev] ++
1,175,723 UART: [idev] CDI.KEYID = 6
1,176,083 UART: [idev] SUBJECT.KEYID = 7
1,176,507 UART: [idev] UDS.KEYID = 0
1,176,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,663 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,210,202 UART: [idev] --
1,211,370 UART: [ldev] ++
1,211,538 UART: [ldev] CDI.KEYID = 6
1,211,901 UART: [ldev] SUBJECT.KEYID = 5
1,212,327 UART: [ldev] AUTHORITY.KEYID = 7
1,212,790 UART: [ldev] FE.KEYID = 1
1,218,062 UART: [ldev] Erasing FE.KEYID = 1
1,244,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,612 UART: [ldev] --
1,283,887 UART: [fwproc] Wait for Commands...
1,284,555 UART: [fwproc] Recv command 0x46574c44
1,285,283 UART: [fwproc] Recv'd Img size: 114448 bytes
1,311,429 UART: ROM Fatal Error: 0x000B0032
1,312,586 >>> mbox cmd response: failed
1,312,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,592 >>> mbox cmd response: failed
1,312,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
893,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,234 UART: [kat] ++
897,386 UART: [kat] sha1
901,644 UART: [kat] SHA2-256
903,584 UART: [kat] SHA2-384
906,277 UART: [kat] SHA2-512-ACC
908,178 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,645 UART: [kat] LMS
1,170,973 UART: [kat] --
1,171,898 UART: [cold-reset] ++
1,172,466 UART: [fht] FHT @ 0x50003400
1,175,069 UART: [idev] ++
1,175,237 UART: [idev] CDI.KEYID = 6
1,175,597 UART: [idev] SUBJECT.KEYID = 7
1,176,021 UART: [idev] UDS.KEYID = 0
1,176,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,861 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,310 UART: [ldev] Erasing FE.KEYID = 1
1,244,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,804 UART: [ldev] --
1,283,087 UART: [fwproc] Wait for Commands...
1,283,805 UART: [fwproc] Recv command 0x46574c44
1,284,533 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,784 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,166,599 >>> mbox cmd response: failed
1,166,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,605 >>> mbox cmd response: failed
1,166,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,687 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,174,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,230 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,876 UART: [ldev] --
1,280,294 UART: [fwproc] Wait for Commands...
1,280,993 UART: [fwproc] Recv command 0x46574c44
1,281,726 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,672 UART: ROM Fatal Error: 0x000B0032
1,308,829 >>> mbox cmd response: failed
1,308,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,835 >>> mbox cmd response: failed
1,308,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,423 UART: [cold-reset] ++
1,169,895 UART: [fht] FHT @ 0x50003400
1,172,623 UART: [idev] ++
1,172,791 UART: [idev] CDI.KEYID = 6
1,173,152 UART: [idev] SUBJECT.KEYID = 7
1,173,577 UART: [idev] UDS.KEYID = 0
1,173,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,207,997 UART: [idev] --
1,209,122 UART: [ldev] ++
1,209,290 UART: [ldev] CDI.KEYID = 6
1,209,654 UART: [ldev] SUBJECT.KEYID = 5
1,210,081 UART: [ldev] AUTHORITY.KEYID = 7
1,210,544 UART: [ldev] FE.KEYID = 1
1,216,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,849 UART: [fwproc] Recv command 0x46574c44
1,282,582 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,727 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,826 >>> mbox cmd response: failed
1,160,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,832 >>> mbox cmd response: failed
1,160,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,111 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,464 UART: [kat] SHA2-256
901,404 UART: [kat] SHA2-384
904,071 UART: [kat] SHA2-512-ACC
905,972 UART: [kat] ECC-384
915,793 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,174,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,198,734 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,827 UART: [ldev] ++
1,208,995 UART: [ldev] CDI.KEYID = 6
1,209,359 UART: [ldev] SUBJECT.KEYID = 5
1,209,786 UART: [ldev] AUTHORITY.KEYID = 7
1,210,249 UART: [ldev] FE.KEYID = 1
1,215,407 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,779 UART: ROM Fatal Error: 0x000B0032
1,309,936 >>> mbox cmd response: failed
1,309,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,942 >>> mbox cmd response: failed
1,309,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,174,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,198,850 UART: [idev] Sha1 KeyId Algorithm
1,207,928 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,567 UART: [ldev] --
1,280,843 UART: [fwproc] Wait for Commands...
1,281,460 UART: [fwproc] Recv command 0x46574c44
1,282,193 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,863 >>> mbox cmd response: failed
1,161,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,869 >>> mbox cmd response: failed
1,161,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,130 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,416 UART:
192,796 UART: Running Caliptra ROM ...
193,990 UART:
194,142 UART: [state] CFI Enabled
260,943 UART: [state] LifecycleState = Unprovisioned
262,909 UART: [state] DebugLocked = No
264,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,103 UART: [kat] SHA2-256
438,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,334 UART: [kat] ++
449,835 UART: [kat] sha1
461,309 UART: [kat] SHA2-256
463,948 UART: [kat] SHA2-384
469,408 UART: [kat] SHA2-512-ACC
471,799 UART: [kat] ECC-384
2,763,081 UART: [kat] HMAC-384Kdf
2,776,402 UART: [kat] LMS
3,966,697 UART: [kat] --
3,972,224 UART: [cold-reset] ++
3,974,050 UART: [fht] Storing FHT @ 0x50003400
3,986,072 UART: [idev] ++
3,986,653 UART: [idev] CDI.KEYID = 6
3,987,673 UART: [idev] SUBJECT.KEYID = 7
3,988,832 UART: [idev] UDS.KEYID = 0
3,991,810 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,561 UART: [idev] Erasing UDS.KEYID = 0
7,328,004 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,415 UART: [idev] --
7,352,408 UART: [ldev] ++
7,352,994 UART: [ldev] CDI.KEYID = 6
7,353,937 UART: [ldev] SUBJECT.KEYID = 5
7,355,152 UART: [ldev] AUTHORITY.KEYID = 7
7,356,441 UART: [ldev] FE.KEYID = 1
7,400,283 UART: [ldev] Erasing FE.KEYID = 1
10,732,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,812 UART: [ldev] --
13,092,852 UART: [fwproc] Waiting for Commands...
13,095,009 UART: [fwproc] Received command 0x46574c44
13,097,200 UART: [fwproc] Received Image of size 114124 bytes
13,174,632 UART: ROM Fatal Error: 0x00B0003A
13,178,077 >>> mbox cmd response: failed
13,178,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,178,849 >>> mbox cmd response: failed
13,179,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,179,412 >>> mbox cmd response: failed
Initializing fuses
2,052,295 writing to cptra_bootfsm_go
2,241,682 UART:
2,242,027 UART: Running Caliptra ROM ...
2,243,165 UART:
2,243,340 UART: [state] CFI Enabled
2,308,661 UART: [state] LifecycleState = Unprovisioned
2,310,593 UART: [state] DebugLocked = No
2,312,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,015 UART: [kat] SHA2-256
2,486,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,261 UART: [kat] ++
2,497,795 UART: [kat] sha1
2,508,905 UART: [kat] SHA2-256
2,511,596 UART: [kat] SHA2-384
2,516,774 UART: [kat] SHA2-512-ACC
2,519,176 UART: [kat] ECC-384
4,814,444 UART: [kat] HMAC-384Kdf
4,826,679 UART: [kat] LMS
6,016,981 UART: [kat] --
6,021,688 UART: [cold-reset] ++
6,024,161 UART: [fht] Storing FHT @ 0x50003400
6,034,404 UART: [idev] ++
6,034,970 UART: [idev] CDI.KEYID = 6
6,035,939 UART: [idev] SUBJECT.KEYID = 7
6,037,175 UART: [idev] UDS.KEYID = 0
6,039,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,183,438 UART: [idev] Erasing UDS.KEYID = 0
9,376,210 UART: [idev] Using Sha1 for KeyId Algorithm
9,396,892 UART: [idev] --
9,401,154 UART: [ldev] ++
9,401,725 UART: [ldev] CDI.KEYID = 6
9,402,690 UART: [ldev] SUBJECT.KEYID = 5
9,403,888 UART: [ldev] AUTHORITY.KEYID = 7
9,405,184 UART: [ldev] FE.KEYID = 1
9,449,270 UART: [ldev] Erasing FE.KEYID = 1
12,785,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,075,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,089,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,119,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,553 UART: [ldev] --
15,144,091 UART: [fwproc] Waiting for Commands...
15,145,865 UART: [fwproc] Received command 0x46574c44
15,148,054 UART: [fwproc] Received Image of size 114124 bytes
19,200,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,271,561 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,340,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,658,370 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,807,189 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,943,522 >>> mbox cmd response: failed
12,944,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,944,420 >>> mbox cmd response: failed
12,944,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,944,932 >>> mbox cmd response: failed
Initializing fuses
2,047,744 writing to cptra_bootfsm_go
5,815,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,888,366 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,487 UART:
192,864 UART: Running Caliptra ROM ...
193,988 UART:
603,519 UART: [state] CFI Enabled
616,500 UART: [state] LifecycleState = Unprovisioned
618,502 UART: [state] DebugLocked = No
621,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,403 UART: [kat] SHA2-256
795,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,673 UART: [kat] ++
806,156 UART: [kat] sha1
817,787 UART: [kat] SHA2-256
820,511 UART: [kat] SHA2-384
826,282 UART: [kat] SHA2-512-ACC
828,685 UART: [kat] ECC-384
3,113,480 UART: [kat] HMAC-384Kdf
3,125,112 UART: [kat] LMS
4,315,255 UART: [kat] --
4,319,488 UART: [cold-reset] ++
4,322,076 UART: [fht] Storing FHT @ 0x50003400
4,333,618 UART: [idev] ++
4,334,194 UART: [idev] CDI.KEYID = 6
4,335,273 UART: [idev] SUBJECT.KEYID = 7
4,336,404 UART: [idev] UDS.KEYID = 0
4,339,340 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,747 UART: [idev] Erasing UDS.KEYID = 0
7,623,829 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,201 UART: [idev] --
7,649,230 UART: [ldev] ++
7,649,856 UART: [ldev] CDI.KEYID = 6
7,650,826 UART: [ldev] SUBJECT.KEYID = 5
7,651,984 UART: [ldev] AUTHORITY.KEYID = 7
7,653,278 UART: [ldev] FE.KEYID = 1
7,663,621 UART: [ldev] Erasing FE.KEYID = 1
10,952,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,365 UART: [ldev] --
13,313,695 UART: [fwproc] Waiting for Commands...
13,315,744 UART: [fwproc] Received command 0x46574c44
13,317,935 UART: [fwproc] Received Image of size 114124 bytes
13,396,985 UART: ROM Fatal Error: 0x00B0003A
13,400,445 >>> mbox cmd response: failed
13,400,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,401,188 >>> mbox cmd response: failed
13,401,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,401,745 >>> mbox cmd response: failed
Initializing fuses
2,053,478 writing to cptra_bootfsm_go
2,242,845 UART:
2,243,191 UART: Running Caliptra ROM ...
2,244,324 UART:
7,055,822 UART: [state] CFI Enabled
7,072,379 UART: [state] LifecycleState = Unprovisioned
7,074,319 UART: [state] DebugLocked = No
7,076,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,080,218 UART: [kat] SHA2-256
7,250,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,260,526 UART: [kat] ++
7,260,993 UART: [kat] sha1
7,270,390 UART: [kat] SHA2-256
7,273,094 UART: [kat] SHA2-384
7,279,307 UART: [kat] SHA2-512-ACC
7,281,656 UART: [kat] ECC-384
9,565,909 UART: [kat] HMAC-384Kdf
9,577,344 UART: [kat] LMS
10,767,487 UART: [kat] --
10,773,370 UART: [cold-reset] ++
10,775,467 UART: [fht] Storing FHT @ 0x50003400
10,787,932 UART: [idev] ++
10,788,509 UART: [idev] CDI.KEYID = 6
10,789,476 UART: [idev] SUBJECT.KEYID = 7
10,790,692 UART: [idev] UDS.KEYID = 0
10,793,852 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,937,752 UART: [idev] Erasing UDS.KEYID = 0
14,077,800 UART: [idev] Using Sha1 for KeyId Algorithm
14,099,584 UART: [idev] --
14,103,999 UART: [ldev] ++
14,104,578 UART: [ldev] CDI.KEYID = 6
14,105,541 UART: [ldev] SUBJECT.KEYID = 5
14,106,818 UART: [ldev] AUTHORITY.KEYID = 7
14,108,003 UART: [ldev] FE.KEYID = 1
14,117,577 UART: [ldev] Erasing FE.KEYID = 1
17,405,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,696,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,710,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,725,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,740,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,759,198 UART: [ldev] --
19,763,334 UART: [fwproc] Waiting for Commands...
19,765,702 UART: [fwproc] Received command 0x46574c44
19,767,888 UART: [fwproc] Received Image of size 114124 bytes
23,825,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,904,475 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,973,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,291,348 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,133,177 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,136,676 >>> mbox cmd response: failed
13,137,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,137,639 >>> mbox cmd response: failed
13,137,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,203 >>> mbox cmd response: failed
Initializing fuses
2,052,366 writing to cptra_bootfsm_go
10,858,508 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,787,307 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,418 UART:
192,774 UART: Running Caliptra ROM ...
193,946 UART:
194,104 UART: [state] CFI Enabled
261,399 UART: [state] LifecycleState = Unprovisioned
263,271 UART: [state] DebugLocked = No
266,004 UART: [state] WD Timer not started. Device not locked for debugging
270,648 UART: [kat] SHA2-256
449,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,293 UART: [kat] ++
461,795 UART: [kat] sha1
473,646 UART: [kat] SHA2-256
476,650 UART: [kat] SHA2-384
481,777 UART: [kat] SHA2-512-ACC
484,771 UART: [kat] ECC-384
2,947,736 UART: [kat] HMAC-384Kdf
2,970,220 UART: [kat] LMS
3,499,658 UART: [kat] --
3,505,432 UART: [cold-reset] ++
3,506,566 UART: [fht] FHT @ 0x50003400
3,518,094 UART: [idev] ++
3,518,699 UART: [idev] CDI.KEYID = 6
3,519,620 UART: [idev] SUBJECT.KEYID = 7
3,520,784 UART: [idev] UDS.KEYID = 0
3,523,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,573 UART: [idev] Erasing UDS.KEYID = 0
6,023,943 UART: [idev] Sha1 KeyId Algorithm
6,046,988 UART: [idev] --
6,049,684 UART: [ldev] ++
6,050,255 UART: [ldev] CDI.KEYID = 6
6,051,145 UART: [ldev] SUBJECT.KEYID = 5
6,052,283 UART: [ldev] AUTHORITY.KEYID = 7
6,053,628 UART: [ldev] FE.KEYID = 1
6,097,637 UART: [ldev] Erasing FE.KEYID = 1
8,601,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,236 UART: [ldev] --
10,411,507 UART: [fwproc] Wait for Commands...
10,414,582 UART: [fwproc] Recv command 0x46574c44
10,416,681 UART: [fwproc] Recv'd Img size: 114448 bytes
10,496,684 UART: ROM Fatal Error: 0x00B0003A
10,499,787 >>> mbox cmd response: failed
10,500,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,500,567 >>> mbox cmd response: failed
10,500,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,501,125 >>> mbox cmd response: failed
Initializing fuses
2,059,346 writing to cptra_bootfsm_go
2,248,619 UART:
2,248,982 UART: Running Caliptra ROM ...
2,250,049 UART:
2,250,211 UART: [state] CFI Enabled
2,305,123 UART: [state] LifecycleState = Unprovisioned
2,307,007 UART: [state] DebugLocked = No
2,309,509 UART: [state] WD Timer not started. Device not locked for debugging
2,313,904 UART: [kat] SHA2-256
2,493,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,582 UART: [kat] ++
2,505,045 UART: [kat] sha1
2,516,259 UART: [kat] SHA2-256
2,519,275 UART: [kat] SHA2-384
2,525,430 UART: [kat] SHA2-512-ACC
2,528,381 UART: [kat] ECC-384
4,992,332 UART: [kat] HMAC-384Kdf
5,014,182 UART: [kat] LMS
5,543,619 UART: [kat] --
5,548,491 UART: [cold-reset] ++
5,550,208 UART: [fht] FHT @ 0x50003400
5,561,080 UART: [idev] ++
5,561,650 UART: [idev] CDI.KEYID = 6
5,562,621 UART: [idev] SUBJECT.KEYID = 7
5,563,777 UART: [idev] UDS.KEYID = 0
5,566,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,431 UART: [idev] Erasing UDS.KEYID = 0
8,071,968 UART: [idev] Sha1 KeyId Algorithm
8,095,469 UART: [idev] --
8,098,820 UART: [ldev] ++
8,099,398 UART: [ldev] CDI.KEYID = 6
8,100,291 UART: [ldev] SUBJECT.KEYID = 5
8,101,509 UART: [ldev] AUTHORITY.KEYID = 7
8,102,742 UART: [ldev] FE.KEYID = 1
8,143,565 UART: [ldev] Erasing FE.KEYID = 1
10,649,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,697 UART: [ldev] --
12,455,321 UART: [fwproc] Wait for Commands...
12,458,489 UART: [fwproc] Recv command 0x46574c44
12,460,544 UART: [fwproc] Recv'd Img size: 114448 bytes
15,861,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,324,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,362,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,281,969 >>> mbox cmd response: failed
10,282,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,282,839 >>> mbox cmd response: failed
10,283,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,283,397 >>> mbox cmd response: failed
Initializing fuses
2,056,189 writing to cptra_bootfsm_go
5,407,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,089,649 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,563 UART:
192,919 UART: Running Caliptra ROM ...
194,042 UART:
603,528 UART: [state] CFI Enabled
616,774 UART: [state] LifecycleState = Unprovisioned
618,622 UART: [state] DebugLocked = No
620,278 UART: [state] WD Timer not started. Device not locked for debugging
624,693 UART: [kat] SHA2-256
803,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,419 UART: [kat] ++
815,867 UART: [kat] sha1
826,202 UART: [kat] SHA2-256
829,269 UART: [kat] SHA2-384
834,704 UART: [kat] SHA2-512-ACC
837,687 UART: [kat] ECC-384
3,280,394 UART: [kat] HMAC-384Kdf
3,293,982 UART: [kat] LMS
3,823,437 UART: [kat] --
3,828,399 UART: [cold-reset] ++
3,829,973 UART: [fht] FHT @ 0x50003400
3,840,864 UART: [idev] ++
3,841,437 UART: [idev] CDI.KEYID = 6
3,842,324 UART: [idev] SUBJECT.KEYID = 7
3,843,542 UART: [idev] UDS.KEYID = 0
3,846,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,492 UART: [idev] Erasing UDS.KEYID = 0
6,316,879 UART: [idev] Sha1 KeyId Algorithm
6,339,042 UART: [idev] --
6,344,339 UART: [ldev] ++
6,344,909 UART: [ldev] CDI.KEYID = 6
6,345,797 UART: [ldev] SUBJECT.KEYID = 5
6,347,030 UART: [ldev] AUTHORITY.KEYID = 7
6,348,268 UART: [ldev] FE.KEYID = 1
6,359,757 UART: [ldev] Erasing FE.KEYID = 1
8,835,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,863 UART: [ldev] --
10,626,480 UART: [fwproc] Wait for Commands...
10,628,788 UART: [fwproc] Recv command 0x46574c44
10,630,927 UART: [fwproc] Recv'd Img size: 114448 bytes
10,708,131 UART: ROM Fatal Error: 0x00B0003A
10,711,206 >>> mbox cmd response: failed
10,711,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,711,863 >>> mbox cmd response: failed
10,712,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,712,439 >>> mbox cmd response: failed
Initializing fuses
2,065,107 writing to cptra_bootfsm_go
2,254,393 UART:
2,254,745 UART: Running Caliptra ROM ...
2,255,887 UART:
9,742,763 UART: [state] CFI Enabled
9,755,795 UART: [state] LifecycleState = Unprovisioned
9,757,680 UART: [state] DebugLocked = No
9,760,392 UART: [state] WD Timer not started. Device not locked for debugging
9,763,818 UART: [kat] SHA2-256
9,942,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,954,491 UART: [kat] ++
9,954,949 UART: [kat] sha1
9,965,078 UART: [kat] SHA2-256
9,968,148 UART: [kat] SHA2-384
9,975,540 UART: [kat] SHA2-512-ACC
9,978,480 UART: [kat] ECC-384
12,421,660 UART: [kat] HMAC-384Kdf
12,433,734 UART: [kat] LMS
12,963,254 UART: [kat] --
12,969,023 UART: [cold-reset] ++
12,970,197 UART: [fht] FHT @ 0x50003400
12,980,017 UART: [idev] ++
12,980,573 UART: [idev] CDI.KEYID = 6
12,981,513 UART: [idev] SUBJECT.KEYID = 7
12,982,722 UART: [idev] UDS.KEYID = 0
12,985,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,129,304 UART: [idev] Erasing UDS.KEYID = 0
15,451,195 UART: [idev] Sha1 KeyId Algorithm
15,473,451 UART: [idev] --
15,477,504 UART: [ldev] ++
15,478,075 UART: [ldev] CDI.KEYID = 6
15,478,996 UART: [ldev] SUBJECT.KEYID = 5
15,480,155 UART: [ldev] AUTHORITY.KEYID = 7
15,481,385 UART: [ldev] FE.KEYID = 1
15,492,003 UART: [ldev] Erasing FE.KEYID = 1
17,968,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,686,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,702,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,717,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,733,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,753,400 UART: [ldev] --
19,757,747 UART: [fwproc] Wait for Commands...
19,760,331 UART: [fwproc] Recv command 0x46574c44
19,762,440 UART: [fwproc] Recv'd Img size: 114448 bytes
23,158,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,232,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,301,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,620,101 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,696,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,292 >>> mbox cmd response: failed
10,482,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,226 >>> mbox cmd response: failed
10,483,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,787 >>> mbox cmd response: failed
Initializing fuses
2,049,922 writing to cptra_bootfsm_go
13,080,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,646,418 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,201 UART:
192,581 UART: Running Caliptra ROM ...
193,725 UART:
193,870 UART: [state] CFI Enabled
263,331 UART: [state] LifecycleState = Unprovisioned
265,751 UART: [state] DebugLocked = No
267,084 UART: [state] WD Timer not started. Device not locked for debugging
272,584 UART: [kat] SHA2-256
462,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,214 UART: [kat] ++
473,694 UART: [kat] sha1
485,928 UART: [kat] SHA2-256
488,951 UART: [kat] SHA2-384
493,982 UART: [kat] SHA2-512-ACC
496,595 UART: [kat] ECC-384
2,945,898 UART: [kat] HMAC-384Kdf
2,970,079 UART: [kat] LMS
3,501,875 UART: [kat] --
3,504,488 UART: [cold-reset] ++
3,506,268 UART: [fht] FHT @ 0x50003400
3,517,144 UART: [idev] ++
3,517,821 UART: [idev] CDI.KEYID = 6
3,518,789 UART: [idev] SUBJECT.KEYID = 7
3,519,998 UART: [idev] UDS.KEYID = 0
3,522,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,737 UART: [idev] Erasing UDS.KEYID = 0
6,028,231 UART: [idev] Sha1 KeyId Algorithm
6,050,786 UART: [idev] --
6,056,328 UART: [ldev] ++
6,057,044 UART: [ldev] CDI.KEYID = 6
6,057,936 UART: [ldev] SUBJECT.KEYID = 5
6,059,096 UART: [ldev] AUTHORITY.KEYID = 7
6,060,286 UART: [ldev] FE.KEYID = 1
6,097,754 UART: [ldev] Erasing FE.KEYID = 1
8,606,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,319 UART: [ldev] --
10,413,080 UART: [fwproc] Wait for Commands...
10,414,749 UART: [fwproc] Recv command 0x46574c44
10,417,011 UART: [fwproc] Recv'd Img size: 114448 bytes
10,527,076 UART: ROM Fatal Error: 0x00B0003A
10,530,741 >>> mbox cmd response: failed
10,531,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,510 >>> mbox cmd response: failed
10,531,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,072 >>> mbox cmd response: failed
Initializing fuses
2,059,781 writing to cptra_bootfsm_go
2,249,051 UART:
2,249,395 UART: Running Caliptra ROM ...
2,250,440 UART:
2,250,593 UART: [state] CFI Enabled
2,318,993 UART: [state] LifecycleState = Unprovisioned
2,321,378 UART: [state] DebugLocked = No
2,323,338 UART: [state] WD Timer not started. Device not locked for debugging
2,327,171 UART: [kat] SHA2-256
2,517,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,839 UART: [kat] ++
2,528,296 UART: [kat] sha1
2,539,615 UART: [kat] SHA2-256
2,542,642 UART: [kat] SHA2-384
2,549,505 UART: [kat] SHA2-512-ACC
2,552,076 UART: [kat] ECC-384
5,001,970 UART: [kat] HMAC-384Kdf
5,024,791 UART: [kat] LMS
5,556,527 UART: [kat] --
5,559,887 UART: [cold-reset] ++
5,560,740 UART: [fht] FHT @ 0x50003400
5,573,261 UART: [idev] ++
5,573,936 UART: [idev] CDI.KEYID = 6
5,575,068 UART: [idev] SUBJECT.KEYID = 7
5,576,203 UART: [idev] UDS.KEYID = 0
5,578,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,722,714 UART: [idev] Erasing UDS.KEYID = 0
8,080,342 UART: [idev] Sha1 KeyId Algorithm
8,103,533 UART: [idev] --
8,108,718 UART: [ldev] ++
8,109,405 UART: [ldev] CDI.KEYID = 6
8,110,322 UART: [ldev] SUBJECT.KEYID = 5
8,111,484 UART: [ldev] AUTHORITY.KEYID = 7
8,112,712 UART: [ldev] FE.KEYID = 1
8,152,964 UART: [ldev] Erasing FE.KEYID = 1
10,657,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,109 UART: [ldev] --
12,465,895 UART: [fwproc] Wait for Commands...
12,467,665 UART: [fwproc] Recv command 0x46574c44
12,469,929 UART: [fwproc] Recv'd Img size: 114448 bytes
15,920,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,121,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,664,703 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,444,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,331,629 >>> mbox cmd response: failed
10,332,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,332,715 >>> mbox cmd response: failed
10,332,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,333,301 >>> mbox cmd response: failed
Initializing fuses
2,048,280 writing to cptra_bootfsm_go
5,481,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,771,236 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,587 UART:
192,953 UART: Running Caliptra ROM ...
194,142 UART:
603,871 UART: [state] CFI Enabled
617,102 UART: [state] LifecycleState = Unprovisioned
619,427 UART: [state] DebugLocked = No
621,821 UART: [state] WD Timer not started. Device not locked for debugging
625,631 UART: [kat] SHA2-256
815,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,316 UART: [kat] ++
826,820 UART: [kat] sha1
837,430 UART: [kat] SHA2-256
840,470 UART: [kat] SHA2-384
846,830 UART: [kat] SHA2-512-ACC
849,397 UART: [kat] ECC-384
3,293,446 UART: [kat] HMAC-384Kdf
3,306,601 UART: [kat] LMS
3,838,429 UART: [kat] --
3,844,708 UART: [cold-reset] ++
3,846,917 UART: [fht] FHT @ 0x50003400
3,858,441 UART: [idev] ++
3,859,117 UART: [idev] CDI.KEYID = 6
3,860,118 UART: [idev] SUBJECT.KEYID = 7
3,861,282 UART: [idev] UDS.KEYID = 0
3,863,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,869 UART: [idev] Erasing UDS.KEYID = 0
6,334,846 UART: [idev] Sha1 KeyId Algorithm
6,357,926 UART: [idev] --
6,363,300 UART: [ldev] ++
6,363,996 UART: [ldev] CDI.KEYID = 6
6,364,918 UART: [ldev] SUBJECT.KEYID = 5
6,366,078 UART: [ldev] AUTHORITY.KEYID = 7
6,367,260 UART: [ldev] FE.KEYID = 1
6,379,263 UART: [ldev] Erasing FE.KEYID = 1
8,853,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,993 UART: [ldev] --
10,647,126 UART: [fwproc] Wait for Commands...
10,649,925 UART: [fwproc] Recv command 0x46574c44
10,652,237 UART: [fwproc] Recv'd Img size: 114448 bytes
10,762,479 UART: ROM Fatal Error: 0x00B0003A
10,766,115 >>> mbox cmd response: failed
10,766,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,791 >>> mbox cmd response: failed
10,767,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,767,352 >>> mbox cmd response: failed
Initializing fuses
2,052,575 writing to cptra_bootfsm_go
2,241,845 UART:
2,242,189 UART: Running Caliptra ROM ...
2,243,331 UART:
9,684,984 UART: [state] CFI Enabled
9,699,591 UART: [state] LifecycleState = Unprovisioned
9,701,932 UART: [state] DebugLocked = No
9,704,019 UART: [state] WD Timer not started. Device not locked for debugging
9,707,768 UART: [kat] SHA2-256
9,897,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,908,397 UART: [kat] ++
9,908,889 UART: [kat] sha1
9,918,972 UART: [kat] SHA2-256
9,922,007 UART: [kat] SHA2-384
9,929,030 UART: [kat] SHA2-512-ACC
9,931,604 UART: [kat] ECC-384
12,376,314 UART: [kat] HMAC-384Kdf
12,389,474 UART: [kat] LMS
12,921,267 UART: [kat] --
12,925,951 UART: [cold-reset] ++
12,927,719 UART: [fht] FHT @ 0x50003400
12,939,289 UART: [idev] ++
12,939,969 UART: [idev] CDI.KEYID = 6
12,940,935 UART: [idev] SUBJECT.KEYID = 7
12,942,146 UART: [idev] UDS.KEYID = 0
12,945,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,088,945 UART: [idev] Erasing UDS.KEYID = 0
15,417,203 UART: [idev] Sha1 KeyId Algorithm
15,440,136 UART: [idev] --
15,443,748 UART: [ldev] ++
15,444,439 UART: [ldev] CDI.KEYID = 6
15,445,327 UART: [ldev] SUBJECT.KEYID = 5
15,446,537 UART: [ldev] AUTHORITY.KEYID = 7
15,447,785 UART: [ldev] FE.KEYID = 1
15,457,707 UART: [ldev] Erasing FE.KEYID = 1
17,935,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,655,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,670,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,686,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,701,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,722,703 UART: [ldev] --
19,729,049 UART: [fwproc] Wait for Commands...
19,732,121 UART: [fwproc] Recv command 0x46574c44
19,734,441 UART: [fwproc] Recv'd Img size: 114448 bytes
23,168,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,245,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,362,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,905,257 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,761,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,554,984 >>> mbox cmd response: failed
10,555,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,555,865 >>> mbox cmd response: failed
10,556,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,427 >>> mbox cmd response: failed
Initializing fuses
2,053,142 writing to cptra_bootfsm_go
13,069,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,273,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,556 UART: [idev] Erasing UDS.KEYID = 0
1,504,800 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,470 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,520,911 UART: [ldev] Erasing FE.KEYID = 1
1,546,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,170 UART: [ldev] --
1,585,637 UART: [fwproc] Waiting for Commands...
1,586,426 UART: [fwproc] Received command 0x46574c44
1,587,217 UART: [fwproc] Received Image of size 114448 bytes
1,614,178 UART: ROM Fatal Error: 0x00B0003A
1,615,339 >>> mbox cmd response: failed
1,615,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,345 >>> mbox cmd response: failed
1,615,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,127 UART: [kat] SHA2-256
892,065 UART: [kat] SHA2-384
894,870 UART: [kat] SHA2-512-ACC
896,771 UART: [kat] ECC-384
902,448 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,476,541 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,768 UART: [idev] ++
1,479,936 UART: [idev] CDI.KEYID = 6
1,480,296 UART: [idev] SUBJECT.KEYID = 7
1,480,720 UART: [idev] UDS.KEYID = 0
1,481,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,717 UART: [ldev] ++
1,514,885 UART: [ldev] CDI.KEYID = 6
1,515,248 UART: [ldev] SUBJECT.KEYID = 5
1,515,674 UART: [ldev] AUTHORITY.KEYID = 7
1,516,137 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,546,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,060 UART: [ldev] --
1,586,523 UART: [fwproc] Waiting for Commands...
1,587,170 UART: [fwproc] Received command 0x46574c44
1,587,961 UART: [fwproc] Received Image of size 114448 bytes
2,887,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,517 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,878 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,467,464 >>> mbox cmd response: failed
1,467,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,470 >>> mbox cmd response: failed
1,467,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,032 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,001 UART: [state] LifecycleState = Unprovisioned
86,656 UART: [state] DebugLocked = No
87,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,710 UART: [kat] SHA2-256
882,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,756 UART: [kat] ++
886,908 UART: [kat] sha1
891,090 UART: [kat] SHA2-256
893,028 UART: [kat] SHA2-384
896,017 UART: [kat] SHA2-512-ACC
897,918 UART: [kat] ECC-384
903,557 UART: [kat] HMAC-384Kdf
908,373 UART: [kat] LMS
1,476,569 UART: [kat] --
1,477,418 UART: [cold-reset] ++
1,477,968 UART: [fht] Storing FHT @ 0x50003400
1,480,539 UART: [idev] ++
1,480,707 UART: [idev] CDI.KEYID = 6
1,481,067 UART: [idev] SUBJECT.KEYID = 7
1,481,491 UART: [idev] UDS.KEYID = 0
1,481,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,595 UART: [idev] Erasing UDS.KEYID = 0
1,506,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,691 UART: [idev] --
1,515,874 UART: [ldev] ++
1,516,042 UART: [ldev] CDI.KEYID = 6
1,516,405 UART: [ldev] SUBJECT.KEYID = 5
1,516,831 UART: [ldev] AUTHORITY.KEYID = 7
1,517,294 UART: [ldev] FE.KEYID = 1
1,522,400 UART: [ldev] Erasing FE.KEYID = 1
1,548,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,265 UART: [ldev] --
1,587,698 UART: [fwproc] Waiting for Commands...
1,588,393 UART: [fwproc] Received command 0x46574c44
1,589,184 UART: [fwproc] Received Image of size 114448 bytes
1,615,389 UART: ROM Fatal Error: 0x00B0003A
1,616,550 >>> mbox cmd response: failed
1,616,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,556 >>> mbox cmd response: failed
1,616,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,937 UART: [state] LifecycleState = Unprovisioned
85,592 UART: [state] DebugLocked = No
86,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,734 UART: [kat] SHA2-256
881,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,780 UART: [kat] ++
885,932 UART: [kat] sha1
890,002 UART: [kat] SHA2-256
891,940 UART: [kat] SHA2-384
894,589 UART: [kat] SHA2-512-ACC
896,490 UART: [kat] ECC-384
902,019 UART: [kat] HMAC-384Kdf
906,871 UART: [kat] LMS
1,475,067 UART: [kat] --
1,475,856 UART: [cold-reset] ++
1,476,238 UART: [fht] Storing FHT @ 0x50003400
1,479,079 UART: [idev] ++
1,479,247 UART: [idev] CDI.KEYID = 6
1,479,607 UART: [idev] SUBJECT.KEYID = 7
1,480,031 UART: [idev] UDS.KEYID = 0
1,480,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,971 UART: [idev] Erasing UDS.KEYID = 0
1,504,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,305 UART: [idev] --
1,514,228 UART: [ldev] ++
1,514,396 UART: [ldev] CDI.KEYID = 6
1,514,759 UART: [ldev] SUBJECT.KEYID = 5
1,515,185 UART: [ldev] AUTHORITY.KEYID = 7
1,515,648 UART: [ldev] FE.KEYID = 1
1,521,006 UART: [ldev] Erasing FE.KEYID = 1
1,546,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,577 UART: [ldev] --
1,585,912 UART: [fwproc] Waiting for Commands...
1,586,759 UART: [fwproc] Received command 0x46574c44
1,587,550 UART: [fwproc] Received Image of size 114448 bytes
2,886,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,909 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,795 >>> mbox cmd response: failed
1,466,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,801 >>> mbox cmd response: failed
1,466,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,533 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [kat] SHA2-256
893,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,837 UART: [kat] ++
897,989 UART: [kat] sha1
902,237 UART: [kat] SHA2-256
904,177 UART: [kat] SHA2-384
906,756 UART: [kat] SHA2-512-ACC
908,657 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,564 UART: [kat] LMS
1,170,892 UART: [kat] --
1,171,695 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,705 UART: [idev] Sha1 KeyId Algorithm
1,209,245 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,808 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,190 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,672 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,273 UART: ROM Fatal Error: 0x00B0003A
1,311,434 >>> mbox cmd response: failed
1,311,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,440 >>> mbox cmd response: failed
1,311,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,484 UART: [kat] HMAC-384Kdf
922,188 UART: [kat] LMS
1,170,516 UART: [kat] --
1,171,421 UART: [cold-reset] ++
1,171,787 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,912 UART: [idev] SUBJECT.KEYID = 7
1,175,336 UART: [idev] UDS.KEYID = 0
1,175,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,579 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,764 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,144 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,709 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,397 >>> mbox cmd response: failed
1,164,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,403 >>> mbox cmd response: failed
1,164,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,674 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
893,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,376 UART: [kat] ++
897,528 UART: [kat] sha1
901,780 UART: [kat] SHA2-256
903,720 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,039 UART: [kat] HMAC-384Kdf
922,655 UART: [kat] LMS
1,170,983 UART: [kat] --
1,171,734 UART: [cold-reset] ++
1,172,142 UART: [fht] FHT @ 0x50003400
1,174,801 UART: [idev] ++
1,174,969 UART: [idev] CDI.KEYID = 6
1,175,329 UART: [idev] SUBJECT.KEYID = 7
1,175,753 UART: [idev] UDS.KEYID = 0
1,176,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,218 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,211,088 UART: [ldev] ++
1,211,256 UART: [ldev] CDI.KEYID = 6
1,211,619 UART: [ldev] SUBJECT.KEYID = 5
1,212,045 UART: [ldev] AUTHORITY.KEYID = 7
1,212,508 UART: [ldev] FE.KEYID = 1
1,217,798 UART: [ldev] Erasing FE.KEYID = 1
1,244,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,530 UART: [ldev] --
1,283,957 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114448 bytes
1,311,884 UART: ROM Fatal Error: 0x00B0003A
1,313,045 >>> mbox cmd response: failed
1,313,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,051 >>> mbox cmd response: failed
1,313,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
893,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,308 UART: [kat] ++
897,460 UART: [kat] sha1
901,470 UART: [kat] SHA2-256
903,410 UART: [kat] SHA2-384
906,261 UART: [kat] SHA2-512-ACC
908,162 UART: [kat] ECC-384
917,443 UART: [kat] HMAC-384Kdf
922,085 UART: [kat] LMS
1,170,413 UART: [kat] --
1,171,554 UART: [cold-reset] ++
1,172,104 UART: [fht] FHT @ 0x50003400
1,174,693 UART: [idev] ++
1,174,861 UART: [idev] CDI.KEYID = 6
1,175,221 UART: [idev] SUBJECT.KEYID = 7
1,175,645 UART: [idev] UDS.KEYID = 0
1,175,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,791 UART: [idev] Erasing UDS.KEYID = 0
1,200,484 UART: [idev] Sha1 KeyId Algorithm
1,209,116 UART: [idev] --
1,210,052 UART: [ldev] ++
1,210,220 UART: [ldev] CDI.KEYID = 6
1,210,583 UART: [ldev] SUBJECT.KEYID = 5
1,211,009 UART: [ldev] AUTHORITY.KEYID = 7
1,211,472 UART: [ldev] FE.KEYID = 1
1,216,418 UART: [ldev] Erasing FE.KEYID = 1
1,243,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,826 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,797 UART: [fwproc] Recv command 0x46574c44
1,283,525 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,244 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,167,290 >>> mbox cmd response: failed
1,167,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,296 >>> mbox cmd response: failed
1,167,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,539 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,353 UART: [idev] --
1,209,340 UART: [ldev] ++
1,209,508 UART: [ldev] CDI.KEYID = 6
1,209,872 UART: [ldev] SUBJECT.KEYID = 5
1,210,299 UART: [ldev] AUTHORITY.KEYID = 7
1,210,762 UART: [ldev] FE.KEYID = 1
1,215,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,452 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,269 UART: ROM Fatal Error: 0x00B0003A
1,310,430 >>> mbox cmd response: failed
1,310,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,436 >>> mbox cmd response: failed
1,310,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,324 UART: [ldev] ++
1,208,492 UART: [ldev] CDI.KEYID = 6
1,208,856 UART: [ldev] SUBJECT.KEYID = 5
1,209,283 UART: [ldev] AUTHORITY.KEYID = 7
1,209,746 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,241,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,892 UART: [fwproc] Wait for Commands...
1,281,555 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,385 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,483 >>> mbox cmd response: failed
1,162,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,489 >>> mbox cmd response: failed
1,162,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,087 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,461 UART: [kat] SHA2-256
891,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,140 UART: [kat] ++
895,292 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,179 UART: [kat] SHA2-512-ACC
906,080 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,169,940 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,174,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,904 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,241,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,280,861 UART: [fwproc] Wait for Commands...
1,281,490 UART: [fwproc] Recv command 0x46574c44
1,282,223 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,486 UART: ROM Fatal Error: 0x00B0003A
1,308,647 >>> mbox cmd response: failed
1,308,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,653 >>> mbox cmd response: failed
1,308,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,174,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,633 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,498 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,094 >>> mbox cmd response: failed
1,164,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,100 >>> mbox cmd response: failed
1,164,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,096 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,172 UART:
192,529 UART: Running Caliptra ROM ...
193,615 UART:
193,757 UART: [state] CFI Enabled
265,302 UART: [state] LifecycleState = Unprovisioned
267,279 UART: [state] DebugLocked = No
269,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,518 UART: [kat] SHA2-256
444,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,753 UART: [kat] ++
455,201 UART: [kat] sha1
466,243 UART: [kat] SHA2-256
468,936 UART: [kat] SHA2-384
475,827 UART: [kat] SHA2-512-ACC
478,209 UART: [kat] ECC-384
2,764,182 UART: [kat] HMAC-384Kdf
2,774,783 UART: [kat] LMS
3,965,062 UART: [kat] --
3,971,301 UART: [cold-reset] ++
3,972,318 UART: [fht] Storing FHT @ 0x50003400
3,983,474 UART: [idev] ++
3,984,040 UART: [idev] CDI.KEYID = 6
3,985,059 UART: [idev] SUBJECT.KEYID = 7
3,986,223 UART: [idev] UDS.KEYID = 0
3,989,167 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,691 UART: [idev] Erasing UDS.KEYID = 0
7,324,359 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,898 UART: [idev] --
7,348,481 UART: [ldev] ++
7,349,112 UART: [ldev] CDI.KEYID = 6
7,350,027 UART: [ldev] SUBJECT.KEYID = 5
7,351,244 UART: [ldev] AUTHORITY.KEYID = 7
7,352,531 UART: [ldev] FE.KEYID = 1
7,399,267 UART: [ldev] Erasing FE.KEYID = 1
10,731,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,463 UART: [ldev] --
13,092,240 UART: [fwproc] Waiting for Commands...
13,094,018 UART: [fwproc] Received command 0x46574c44
13,096,215 UART: [fwproc] Received Image of size 114124 bytes
16,945,139 UART: ROM Fatal Error: 0x000B0033
16,948,546 >>> mbox cmd response: failed
16,948,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,949,271 >>> mbox cmd response: failed
16,949,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,949,824 >>> mbox cmd response: failed
Initializing fuses
2,054,681 writing to cptra_bootfsm_go
2,243,958 UART:
2,244,308 UART: Running Caliptra ROM ...
2,245,350 UART:
2,245,502 UART: [state] CFI Enabled
2,319,572 UART: [state] LifecycleState = Unprovisioned
2,321,484 UART: [state] DebugLocked = No
2,323,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,066 UART: [kat] SHA2-256
2,497,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,324 UART: [kat] ++
2,508,866 UART: [kat] sha1
2,520,084 UART: [kat] SHA2-256
2,522,774 UART: [kat] SHA2-384
2,527,952 UART: [kat] SHA2-512-ACC
2,530,300 UART: [kat] ECC-384
4,820,702 UART: [kat] HMAC-384Kdf
4,853,788 UART: [kat] LMS
6,044,096 UART: [kat] --
6,049,036 UART: [cold-reset] ++
6,051,305 UART: [fht] Storing FHT @ 0x50003400
6,061,932 UART: [idev] ++
6,062,501 UART: [idev] CDI.KEYID = 6
6,063,460 UART: [idev] SUBJECT.KEYID = 7
6,064,676 UART: [idev] UDS.KEYID = 0
6,067,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,211,017 UART: [idev] Erasing UDS.KEYID = 0
9,397,877 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,575 UART: [idev] --
9,423,939 UART: [ldev] ++
9,424,507 UART: [ldev] CDI.KEYID = 6
9,425,524 UART: [ldev] SUBJECT.KEYID = 5
9,426,728 UART: [ldev] AUTHORITY.KEYID = 7
9,427,912 UART: [ldev] FE.KEYID = 1
9,474,811 UART: [ldev] Erasing FE.KEYID = 1
12,808,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,118,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,133,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,167,690 UART: [ldev] --
15,172,042 UART: [fwproc] Waiting for Commands...
15,175,388 UART: [fwproc] Received command 0x46574c44
15,177,576 UART: [fwproc] Received Image of size 114124 bytes
19,230,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,308,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,377,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,694,418 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,806,385 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,261,414 >>> mbox cmd response: failed
16,262,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,262,351 >>> mbox cmd response: failed
16,262,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,262,898 >>> mbox cmd response: failed
Initializing fuses
2,052,688 writing to cptra_bootfsm_go
5,826,869 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,911,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,473 UART:
192,831 UART: Running Caliptra ROM ...
194,028 UART:
603,547 UART: [state] CFI Enabled
620,528 UART: [state] LifecycleState = Unprovisioned
622,463 UART: [state] DebugLocked = No
625,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,231 UART: [kat] SHA2-256
798,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,380 UART: [kat] ++
809,889 UART: [kat] sha1
820,225 UART: [kat] SHA2-256
822,918 UART: [kat] SHA2-384
828,412 UART: [kat] SHA2-512-ACC
830,770 UART: [kat] ECC-384
3,113,884 UART: [kat] HMAC-384Kdf
3,125,032 UART: [kat] LMS
4,315,172 UART: [kat] --
4,317,695 UART: [cold-reset] ++
4,319,958 UART: [fht] Storing FHT @ 0x50003400
4,331,985 UART: [idev] ++
4,332,607 UART: [idev] CDI.KEYID = 6
4,333,528 UART: [idev] SUBJECT.KEYID = 7
4,334,743 UART: [idev] UDS.KEYID = 0
4,337,649 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,222 UART: [idev] Erasing UDS.KEYID = 0
7,625,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,513 UART: [idev] --
7,652,244 UART: [ldev] ++
7,652,810 UART: [ldev] CDI.KEYID = 6
7,653,772 UART: [ldev] SUBJECT.KEYID = 5
7,654,998 UART: [ldev] AUTHORITY.KEYID = 7
7,656,233 UART: [ldev] FE.KEYID = 1
7,667,992 UART: [ldev] Erasing FE.KEYID = 1
10,953,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,226 UART: [ldev] --
13,313,734 UART: [fwproc] Waiting for Commands...
13,316,857 UART: [fwproc] Received command 0x46574c44
13,319,049 UART: [fwproc] Received Image of size 114124 bytes
17,080,009 UART: ROM Fatal Error: 0x000B0033
17,083,415 >>> mbox cmd response: failed
17,083,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,084,227 >>> mbox cmd response: failed
17,084,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,084,797 >>> mbox cmd response: failed
Initializing fuses
2,055,656 writing to cptra_bootfsm_go
2,245,047 UART:
2,245,405 UART: Running Caliptra ROM ...
2,246,545 UART:
3,388,837 UART: [state] CFI Enabled
3,402,069 UART: [state] LifecycleState = Unprovisioned
3,403,981 UART: [state] DebugLocked = No
3,405,344 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,410,299 UART: [kat] SHA2-256
3,580,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,590,571 UART: [kat] ++
3,591,029 UART: [kat] sha1
3,601,815 UART: [kat] SHA2-256
3,604,514 UART: [kat] SHA2-384
3,609,643 UART: [kat] SHA2-512-ACC
3,611,992 UART: [kat] ECC-384
5,894,985 UART: [kat] HMAC-384Kdf
5,906,611 UART: [kat] LMS
7,096,731 UART: [kat] --
7,100,640 UART: [cold-reset] ++
7,102,848 UART: [fht] Storing FHT @ 0x50003400
7,114,279 UART: [idev] ++
7,114,841 UART: [idev] CDI.KEYID = 6
7,115,774 UART: [idev] SUBJECT.KEYID = 7
7,117,044 UART: [idev] UDS.KEYID = 0
7,119,652 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,263,137 UART: [idev] Erasing UDS.KEYID = 0
10,406,513 UART: [idev] Using Sha1 for KeyId Algorithm
10,426,811 UART: [idev] --
10,431,207 UART: [ldev] ++
10,431,791 UART: [ldev] CDI.KEYID = 6
10,432,756 UART: [ldev] SUBJECT.KEYID = 5
10,433,951 UART: [ldev] AUTHORITY.KEYID = 7
10,435,187 UART: [ldev] FE.KEYID = 1
10,447,833 UART: [ldev] Erasing FE.KEYID = 1
13,739,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,033,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,048,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,062,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,077,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,095,463 UART: [ldev] --
16,099,887 UART: [fwproc] Waiting for Commands...
16,101,503 UART: [fwproc] Received command 0x46574c44
16,103,692 UART: [fwproc] Received Image of size 114124 bytes
20,160,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,230,033 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,298,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,616,472 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
4,128,804 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,301,433 >>> mbox cmd response: failed
16,302,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,302,402 >>> mbox cmd response: failed
16,302,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,302,975 >>> mbox cmd response: failed
Initializing fuses
2,045,086 writing to cptra_bootfsm_go
7,693,902 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,633,533 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,971 writing to cptra_bootfsm_go
193,196 UART:
193,576 UART: Running Caliptra ROM ...
194,748 UART:
194,902 UART: [state] CFI Enabled
259,991 UART: [state] LifecycleState = Unprovisioned
261,874 UART: [state] DebugLocked = No
264,230 UART: [state] WD Timer not started. Device not locked for debugging
268,802 UART: [kat] SHA2-256
447,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,479 UART: [kat] ++
460,019 UART: [kat] sha1
470,584 UART: [kat] SHA2-256
473,648 UART: [kat] SHA2-384
479,784 UART: [kat] SHA2-512-ACC
482,762 UART: [kat] ECC-384
2,948,001 UART: [kat] HMAC-384Kdf
2,971,057 UART: [kat] LMS
3,500,558 UART: [kat] --
3,505,085 UART: [cold-reset] ++
3,506,043 UART: [fht] FHT @ 0x50003400
3,517,669 UART: [idev] ++
3,518,232 UART: [idev] CDI.KEYID = 6
3,519,141 UART: [idev] SUBJECT.KEYID = 7
3,520,513 UART: [idev] UDS.KEYID = 0
3,523,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,913 UART: [idev] Erasing UDS.KEYID = 0
6,027,222 UART: [idev] Sha1 KeyId Algorithm
6,050,597 UART: [idev] --
6,054,009 UART: [ldev] ++
6,054,587 UART: [ldev] CDI.KEYID = 6
6,055,475 UART: [ldev] SUBJECT.KEYID = 5
6,056,637 UART: [ldev] AUTHORITY.KEYID = 7
6,057,852 UART: [ldev] FE.KEYID = 1
6,101,539 UART: [ldev] Erasing FE.KEYID = 1
8,609,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,737 UART: [ldev] --
10,412,505 UART: [fwproc] Wait for Commands...
10,414,926 UART: [fwproc] Recv command 0x46574c44
10,417,024 UART: [fwproc] Recv'd Img size: 114448 bytes
12,042,630 UART: ROM Fatal Error: 0x000B0033
12,045,729 >>> mbox cmd response: failed
12,046,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,046,516 >>> mbox cmd response: failed
12,046,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,047,075 >>> mbox cmd response: failed
Initializing fuses
2,049,004 writing to cptra_bootfsm_go
2,238,270 UART:
2,238,624 UART: Running Caliptra ROM ...
2,239,668 UART:
2,239,822 UART: [state] CFI Enabled
2,311,953 UART: [state] LifecycleState = Unprovisioned
2,313,840 UART: [state] DebugLocked = No
2,315,309 UART: [state] WD Timer not started. Device not locked for debugging
2,318,675 UART: [kat] SHA2-256
2,497,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,394 UART: [kat] ++
2,509,855 UART: [kat] sha1
2,520,612 UART: [kat] SHA2-256
2,523,627 UART: [kat] SHA2-384
2,531,353 UART: [kat] SHA2-512-ACC
2,534,299 UART: [kat] ECC-384
4,994,417 UART: [kat] HMAC-384Kdf
5,017,826 UART: [kat] LMS
5,547,253 UART: [kat] --
5,552,269 UART: [cold-reset] ++
5,554,438 UART: [fht] FHT @ 0x50003400
5,565,614 UART: [idev] ++
5,566,190 UART: [idev] CDI.KEYID = 6
5,567,098 UART: [idev] SUBJECT.KEYID = 7
5,568,313 UART: [idev] UDS.KEYID = 0
5,570,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,185 UART: [idev] Erasing UDS.KEYID = 0
8,072,908 UART: [idev] Sha1 KeyId Algorithm
8,096,058 UART: [idev] --
8,099,900 UART: [ldev] ++
8,100,479 UART: [ldev] CDI.KEYID = 6
8,101,368 UART: [ldev] SUBJECT.KEYID = 5
8,102,448 UART: [ldev] AUTHORITY.KEYID = 7
8,103,784 UART: [ldev] FE.KEYID = 1
8,147,943 UART: [ldev] Erasing FE.KEYID = 1
10,651,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,385 UART: [ldev] --
12,462,894 UART: [fwproc] Wait for Commands...
12,465,800 UART: [fwproc] Recv command 0x46574c44
12,467,897 UART: [fwproc] Recv'd Img size: 114448 bytes
15,866,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,322,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,363,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,757,250 >>> mbox cmd response: failed
11,757,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,758,131 >>> mbox cmd response: failed
11,758,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,758,691 >>> mbox cmd response: failed
Initializing fuses
2,044,427 writing to cptra_bootfsm_go
5,403,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,077,098 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,579 UART:
192,954 UART: Running Caliptra ROM ...
194,145 UART:
603,837 UART: [state] CFI Enabled
621,231 UART: [state] LifecycleState = Unprovisioned
623,082 UART: [state] DebugLocked = No
625,003 UART: [state] WD Timer not started. Device not locked for debugging
628,022 UART: [kat] SHA2-256
807,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,733 UART: [kat] ++
819,262 UART: [kat] sha1
831,171 UART: [kat] SHA2-256
834,171 UART: [kat] SHA2-384
839,873 UART: [kat] SHA2-512-ACC
842,865 UART: [kat] ECC-384
3,284,092 UART: [kat] HMAC-384Kdf
3,297,725 UART: [kat] LMS
3,827,208 UART: [kat] --
3,831,464 UART: [cold-reset] ++
3,832,960 UART: [fht] FHT @ 0x50003400
3,843,179 UART: [idev] ++
3,843,785 UART: [idev] CDI.KEYID = 6
3,844,704 UART: [idev] SUBJECT.KEYID = 7
3,845,865 UART: [idev] UDS.KEYID = 0
3,848,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,029 UART: [idev] Erasing UDS.KEYID = 0
6,318,891 UART: [idev] Sha1 KeyId Algorithm
6,342,685 UART: [idev] --
6,346,688 UART: [ldev] ++
6,347,262 UART: [ldev] CDI.KEYID = 6
6,348,167 UART: [ldev] SUBJECT.KEYID = 5
6,349,381 UART: [ldev] AUTHORITY.KEYID = 7
6,350,615 UART: [ldev] FE.KEYID = 1
6,359,396 UART: [ldev] Erasing FE.KEYID = 1
8,835,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,915 UART: [ldev] --
10,628,748 UART: [fwproc] Wait for Commands...
10,631,604 UART: [fwproc] Recv command 0x46574c44
10,633,710 UART: [fwproc] Recv'd Img size: 114448 bytes
12,277,438 UART: ROM Fatal Error: 0x000B0033
12,280,554 >>> mbox cmd response: failed
12,280,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,326 >>> mbox cmd response: failed
12,281,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,925 >>> mbox cmd response: failed
Initializing fuses
2,051,935 writing to cptra_bootfsm_go
2,241,272 UART:
2,241,621 UART: Running Caliptra ROM ...
2,242,765 UART:
8,168,741 UART: [state] CFI Enabled
8,181,274 UART: [state] LifecycleState = Unprovisioned
8,183,130 UART: [state] DebugLocked = No
8,185,268 UART: [state] WD Timer not started. Device not locked for debugging
8,189,447 UART: [kat] SHA2-256
8,368,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,380,165 UART: [kat] ++
8,380,709 UART: [kat] sha1
8,391,949 UART: [kat] SHA2-256
8,394,971 UART: [kat] SHA2-384
8,400,698 UART: [kat] SHA2-512-ACC
8,403,647 UART: [kat] ECC-384
10,843,491 UART: [kat] HMAC-384Kdf
10,856,054 UART: [kat] LMS
11,385,581 UART: [kat] --
11,391,566 UART: [cold-reset] ++
11,393,169 UART: [fht] FHT @ 0x50003400
11,404,587 UART: [idev] ++
11,405,192 UART: [idev] CDI.KEYID = 6
11,406,107 UART: [idev] SUBJECT.KEYID = 7
11,407,325 UART: [idev] UDS.KEYID = 0
11,410,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,553,716 UART: [idev] Erasing UDS.KEYID = 0
13,874,714 UART: [idev] Sha1 KeyId Algorithm
13,896,529 UART: [idev] --
13,899,365 UART: [ldev] ++
13,899,862 UART: [ldev] CDI.KEYID = 6
13,900,939 UART: [ldev] SUBJECT.KEYID = 5
13,902,160 UART: [ldev] AUTHORITY.KEYID = 7
13,903,340 UART: [ldev] FE.KEYID = 1
13,914,938 UART: [ldev] Erasing FE.KEYID = 1
16,389,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,106,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,123,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,138,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,154,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,174,867 UART: [ldev] --
18,180,237 UART: [fwproc] Wait for Commands...
18,183,360 UART: [fwproc] Recv command 0x46574c44
18,185,406 UART: [fwproc] Recv'd Img size: 114448 bytes
21,588,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,662,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,731,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,050,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,700,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,962,904 >>> mbox cmd response: failed
11,963,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,963,830 >>> mbox cmd response: failed
11,964,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,964,401 >>> mbox cmd response: failed
Initializing fuses
2,054,892 writing to cptra_bootfsm_go
11,596,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,168,219 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,049 UART:
192,414 UART: Running Caliptra ROM ...
193,514 UART:
193,654 UART: [state] CFI Enabled
261,800 UART: [state] LifecycleState = Unprovisioned
264,210 UART: [state] DebugLocked = No
266,030 UART: [state] WD Timer not started. Device not locked for debugging
270,653 UART: [kat] SHA2-256
460,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,315 UART: [kat] ++
471,793 UART: [kat] sha1
483,534 UART: [kat] SHA2-256
486,545 UART: [kat] SHA2-384
492,470 UART: [kat] SHA2-512-ACC
495,043 UART: [kat] ECC-384
2,947,341 UART: [kat] HMAC-384Kdf
2,961,739 UART: [kat] LMS
3,493,490 UART: [kat] --
3,496,856 UART: [cold-reset] ++
3,498,253 UART: [fht] FHT @ 0x50003400
3,510,486 UART: [idev] ++
3,511,162 UART: [idev] CDI.KEYID = 6
3,512,181 UART: [idev] SUBJECT.KEYID = 7
3,513,288 UART: [idev] UDS.KEYID = 0
3,516,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,660,195 UART: [idev] Erasing UDS.KEYID = 0
6,018,534 UART: [idev] Sha1 KeyId Algorithm
6,040,566 UART: [idev] --
6,046,406 UART: [ldev] ++
6,047,093 UART: [ldev] CDI.KEYID = 6
6,048,029 UART: [ldev] SUBJECT.KEYID = 5
6,049,143 UART: [ldev] AUTHORITY.KEYID = 7
6,050,378 UART: [ldev] FE.KEYID = 1
6,091,115 UART: [ldev] Erasing FE.KEYID = 1
8,597,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,297 UART: [ldev] --
10,406,211 UART: [fwproc] Wait for Commands...
10,408,036 UART: [fwproc] Recv command 0x46574c44
10,410,305 UART: [fwproc] Recv'd Img size: 114448 bytes
12,103,365 UART: ROM Fatal Error: 0x000B0033
12,106,759 >>> mbox cmd response: failed
12,107,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,107,548 >>> mbox cmd response: failed
12,107,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,108,109 >>> mbox cmd response: failed
Initializing fuses
2,048,727 writing to cptra_bootfsm_go
2,238,026 UART:
2,238,376 UART: Running Caliptra ROM ...
2,239,424 UART:
2,239,584 UART: [state] CFI Enabled
2,294,270 UART: [state] LifecycleState = Unprovisioned
2,296,658 UART: [state] DebugLocked = No
2,298,557 UART: [state] WD Timer not started. Device not locked for debugging
2,303,493 UART: [kat] SHA2-256
2,493,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,504,153 UART: [kat] ++
2,504,614 UART: [kat] sha1
2,515,614 UART: [kat] SHA2-256
2,518,636 UART: [kat] SHA2-384
2,524,956 UART: [kat] SHA2-512-ACC
2,527,576 UART: [kat] ECC-384
4,979,009 UART: [kat] HMAC-384Kdf
5,001,574 UART: [kat] LMS
5,533,343 UART: [kat] --
5,537,177 UART: [cold-reset] ++
5,538,464 UART: [fht] FHT @ 0x50003400
5,550,044 UART: [idev] ++
5,550,728 UART: [idev] CDI.KEYID = 6
5,551,746 UART: [idev] SUBJECT.KEYID = 7
5,552,906 UART: [idev] UDS.KEYID = 0
5,555,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,699,672 UART: [idev] Erasing UDS.KEYID = 0
8,056,819 UART: [idev] Sha1 KeyId Algorithm
8,080,439 UART: [idev] --
8,084,740 UART: [ldev] ++
8,085,434 UART: [ldev] CDI.KEYID = 6
8,086,321 UART: [ldev] SUBJECT.KEYID = 5
8,087,533 UART: [ldev] AUTHORITY.KEYID = 7
8,088,773 UART: [ldev] FE.KEYID = 1
8,128,945 UART: [ldev] Erasing FE.KEYID = 1
10,635,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,739 UART: [ldev] --
12,445,703 UART: [fwproc] Wait for Commands...
12,447,749 UART: [fwproc] Recv command 0x46574c44
12,450,011 UART: [fwproc] Recv'd Img size: 114448 bytes
15,901,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,645,019 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,440,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,873,009 >>> mbox cmd response: failed
11,873,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,874,107 >>> mbox cmd response: failed
11,874,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,874,670 >>> mbox cmd response: failed
Initializing fuses
2,044,526 writing to cptra_bootfsm_go
5,466,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,738,287 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,575 UART:
192,929 UART: Running Caliptra ROM ...
194,118 UART:
603,592 UART: [state] CFI Enabled
617,807 UART: [state] LifecycleState = Unprovisioned
620,198 UART: [state] DebugLocked = No
621,576 UART: [state] WD Timer not started. Device not locked for debugging
626,040 UART: [kat] SHA2-256
815,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,702 UART: [kat] ++
827,295 UART: [kat] sha1
839,694 UART: [kat] SHA2-256
842,760 UART: [kat] SHA2-384
848,959 UART: [kat] SHA2-512-ACC
851,548 UART: [kat] ECC-384
3,293,337 UART: [kat] HMAC-384Kdf
3,306,627 UART: [kat] LMS
3,838,471 UART: [kat] --
3,845,052 UART: [cold-reset] ++
3,846,987 UART: [fht] FHT @ 0x50003400
3,859,638 UART: [idev] ++
3,860,317 UART: [idev] CDI.KEYID = 6
3,861,335 UART: [idev] SUBJECT.KEYID = 7
3,862,492 UART: [idev] UDS.KEYID = 0
3,865,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,009,518 UART: [idev] Erasing UDS.KEYID = 0
6,338,049 UART: [idev] Sha1 KeyId Algorithm
6,361,077 UART: [idev] --
6,365,184 UART: [ldev] ++
6,365,902 UART: [ldev] CDI.KEYID = 6
6,366,823 UART: [ldev] SUBJECT.KEYID = 5
6,367,987 UART: [ldev] AUTHORITY.KEYID = 7
6,369,181 UART: [ldev] FE.KEYID = 1
6,379,136 UART: [ldev] Erasing FE.KEYID = 1
8,858,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,706 UART: [ldev] --
10,645,993 UART: [fwproc] Wait for Commands...
10,648,305 UART: [fwproc] Recv command 0x46574c44
10,650,561 UART: [fwproc] Recv'd Img size: 114448 bytes
12,323,862 UART: ROM Fatal Error: 0x000B0033
12,327,334 >>> mbox cmd response: failed
12,327,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,328,063 >>> mbox cmd response: failed
12,328,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,328,643 >>> mbox cmd response: failed
Initializing fuses
2,060,016 writing to cptra_bootfsm_go
2,249,333 UART:
2,249,700 UART: Running Caliptra ROM ...
2,250,749 UART:
8,126,210 UART: [state] CFI Enabled
8,139,882 UART: [state] LifecycleState = Unprovisioned
8,142,236 UART: [state] DebugLocked = No
8,144,543 UART: [state] WD Timer not started. Device not locked for debugging
8,148,671 UART: [kat] SHA2-256
8,338,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,349,309 UART: [kat] ++
8,349,876 UART: [kat] sha1
8,360,945 UART: [kat] SHA2-256
8,363,978 UART: [kat] SHA2-384
8,368,790 UART: [kat] SHA2-512-ACC
8,371,370 UART: [kat] ECC-384
10,813,296 UART: [kat] HMAC-384Kdf
10,827,415 UART: [kat] LMS
11,359,216 UART: [kat] --
11,364,176 UART: [cold-reset] ++
11,365,565 UART: [fht] FHT @ 0x50003400
11,376,972 UART: [idev] ++
11,377,645 UART: [idev] CDI.KEYID = 6
11,378,660 UART: [idev] SUBJECT.KEYID = 7
11,379,814 UART: [idev] UDS.KEYID = 0
11,382,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,526,587 UART: [idev] Erasing UDS.KEYID = 0
13,858,863 UART: [idev] Sha1 KeyId Algorithm
13,881,181 UART: [idev] --
13,886,177 UART: [ldev] ++
13,886,870 UART: [ldev] CDI.KEYID = 6
13,887,751 UART: [ldev] SUBJECT.KEYID = 5
13,888,963 UART: [ldev] AUTHORITY.KEYID = 7
13,890,190 UART: [ldev] FE.KEYID = 1
13,901,708 UART: [ldev] Erasing FE.KEYID = 1
16,380,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,098,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,114,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,129,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,144,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,166,628 UART: [ldev] --
18,172,327 UART: [fwproc] Wait for Commands...
18,175,230 UART: [fwproc] Recv command 0x46574c44
18,177,562 UART: [fwproc] Recv'd Img size: 114448 bytes
21,627,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,697,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,813,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,356,430 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,754,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,087,994 >>> mbox cmd response: failed
12,088,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,088,870 >>> mbox cmd response: failed
12,089,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,089,437 >>> mbox cmd response: failed
Initializing fuses
2,045,040 writing to cptra_bootfsm_go
11,537,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,732,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
894,876 UART: [kat] SHA2-512-ACC
896,777 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
907,158 UART: [kat] LMS
1,475,354 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,761 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,942 UART: [idev] Erasing UDS.KEYID = 0
1,504,474 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,974 UART: [idev] --
1,514,131 UART: [ldev] ++
1,514,299 UART: [ldev] CDI.KEYID = 6
1,514,662 UART: [ldev] SUBJECT.KEYID = 5
1,515,088 UART: [ldev] AUTHORITY.KEYID = 7
1,515,551 UART: [ldev] FE.KEYID = 1
1,520,297 UART: [ldev] Erasing FE.KEYID = 1
1,545,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,744 UART: [ldev] --
1,585,219 UART: [fwproc] Waiting for Commands...
1,585,908 UART: [fwproc] Received command 0x46574c44
1,586,699 UART: [fwproc] Received Image of size 114448 bytes
2,837,160 UART: ROM Fatal Error: 0x000B0033
2,838,317 >>> mbox cmd response: failed
2,838,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,838,323 >>> mbox cmd response: failed
2,838,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,838,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,001 UART: [kat] SHA2-256
891,939 UART: [kat] SHA2-384
894,724 UART: [kat] SHA2-512-ACC
896,625 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,732 UART: [kat] LMS
1,474,928 UART: [kat] --
1,475,775 UART: [cold-reset] ++
1,476,299 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,952 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,152 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,520,787 UART: [ldev] Erasing FE.KEYID = 1
1,545,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,622 UART: [ldev] --
1,584,931 UART: [fwproc] Waiting for Commands...
1,585,678 UART: [fwproc] Received command 0x46574c44
1,586,469 UART: [fwproc] Received Image of size 114448 bytes
2,886,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,212 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,766,034 >>> mbox cmd response: failed
2,766,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,040 >>> mbox cmd response: failed
2,766,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,651 UART: [kat] LMS
1,475,847 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,095 UART: [idev] Erasing UDS.KEYID = 0
1,505,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,547 UART: [idev] --
1,515,642 UART: [ldev] ++
1,515,810 UART: [ldev] CDI.KEYID = 6
1,516,173 UART: [ldev] SUBJECT.KEYID = 5
1,516,599 UART: [ldev] AUTHORITY.KEYID = 7
1,517,062 UART: [ldev] FE.KEYID = 1
1,522,606 UART: [ldev] Erasing FE.KEYID = 1
1,547,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,342 UART: [fwproc] Waiting for Commands...
1,588,089 UART: [fwproc] Received command 0x46574c44
1,588,880 UART: [fwproc] Received Image of size 114448 bytes
2,537,581 UART: ROM Fatal Error: 0x000B0033
2,538,738 >>> mbox cmd response: failed
2,538,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,538,744 >>> mbox cmd response: failed
2,538,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,538,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,684 UART: [kat] SHA2-256
882,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,730 UART: [kat] ++
886,882 UART: [kat] sha1
890,982 UART: [kat] SHA2-256
892,920 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,777 UART: [kat] LMS
1,475,973 UART: [kat] --
1,476,510 UART: [cold-reset] ++
1,476,926 UART: [fht] Storing FHT @ 0x50003400
1,479,757 UART: [idev] ++
1,479,925 UART: [idev] CDI.KEYID = 6
1,480,285 UART: [idev] SUBJECT.KEYID = 7
1,480,709 UART: [idev] UDS.KEYID = 0
1,481,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,021 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,253 UART: [idev] --
1,515,164 UART: [ldev] ++
1,515,332 UART: [ldev] CDI.KEYID = 6
1,515,695 UART: [ldev] SUBJECT.KEYID = 5
1,516,121 UART: [ldev] AUTHORITY.KEYID = 7
1,516,584 UART: [ldev] FE.KEYID = 1
1,521,896 UART: [ldev] Erasing FE.KEYID = 1
1,547,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,258 UART: [fwproc] Waiting for Commands...
1,588,121 UART: [fwproc] Received command 0x46574c44
1,588,912 UART: [fwproc] Received Image of size 114448 bytes
2,888,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,602 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,707 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,541,429 >>> mbox cmd response: failed
2,541,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,541,435 >>> mbox cmd response: failed
2,541,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,541,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,084 UART: [idev] ++
1,175,252 UART: [idev] CDI.KEYID = 6
1,175,612 UART: [idev] SUBJECT.KEYID = 7
1,176,036 UART: [idev] UDS.KEYID = 0
1,176,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,118 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,357 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,880 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,071 UART: [ldev] --
1,282,582 UART: [fwproc] Wait for Commands...
1,283,398 UART: [fwproc] Recv command 0x46574c44
1,284,126 UART: [fwproc] Recv'd Img size: 114448 bytes
1,597,197 UART: ROM Fatal Error: 0x000B0033
1,598,354 >>> mbox cmd response: failed
1,598,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,360 >>> mbox cmd response: failed
1,598,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
918,344 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,996 UART: [idev] Erasing UDS.KEYID = 0
1,201,123 UART: [idev] Sha1 KeyId Algorithm
1,209,539 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,957 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,282,972 UART: [fwproc] Recv command 0x46574c44
1,283,700 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,445 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,450,922 >>> mbox cmd response: failed
1,450,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,928 >>> mbox cmd response: failed
1,450,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,350 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,060 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,217 UART: [idev] ++
1,175,385 UART: [idev] CDI.KEYID = 6
1,175,745 UART: [idev] SUBJECT.KEYID = 7
1,176,169 UART: [idev] UDS.KEYID = 0
1,176,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,201,272 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] --
1,210,942 UART: [ldev] ++
1,211,110 UART: [ldev] CDI.KEYID = 6
1,211,473 UART: [ldev] SUBJECT.KEYID = 5
1,211,899 UART: [ldev] AUTHORITY.KEYID = 7
1,212,362 UART: [ldev] FE.KEYID = 1
1,217,504 UART: [ldev] Erasing FE.KEYID = 1
1,243,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,176 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,289 UART: [fwproc] Recv command 0x46574c44
1,284,017 UART: [fwproc] Recv'd Img size: 114448 bytes
1,588,016 UART: ROM Fatal Error: 0x000B0033
1,589,173 >>> mbox cmd response: failed
1,589,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,179 >>> mbox cmd response: failed
1,589,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,372 UART: [kat] SHA2-256
904,312 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
918,831 UART: [kat] HMAC-384Kdf
923,451 UART: [kat] LMS
1,171,779 UART: [kat] --
1,172,748 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,637 UART: [idev] ++
1,175,805 UART: [idev] CDI.KEYID = 6
1,176,165 UART: [idev] SUBJECT.KEYID = 7
1,176,589 UART: [idev] UDS.KEYID = 0
1,176,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,699 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,246 UART: [idev] --
1,211,388 UART: [ldev] ++
1,211,556 UART: [ldev] CDI.KEYID = 6
1,211,919 UART: [ldev] SUBJECT.KEYID = 5
1,212,345 UART: [ldev] AUTHORITY.KEYID = 7
1,212,808 UART: [ldev] FE.KEYID = 1
1,218,098 UART: [ldev] Erasing FE.KEYID = 1
1,244,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,242 UART: [ldev] --
1,283,741 UART: [fwproc] Wait for Commands...
1,284,431 UART: [fwproc] Recv command 0x46574c44
1,285,159 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,892 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,450,047 >>> mbox cmd response: failed
1,450,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,053 >>> mbox cmd response: failed
1,450,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,253 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,242 UART: [ldev] ++
1,209,410 UART: [ldev] CDI.KEYID = 6
1,209,774 UART: [ldev] SUBJECT.KEYID = 5
1,210,201 UART: [ldev] AUTHORITY.KEYID = 7
1,210,664 UART: [ldev] FE.KEYID = 1
1,215,920 UART: [ldev] Erasing FE.KEYID = 1
1,242,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,512 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,573 UART: [fwproc] Recv command 0x46574c44
1,283,306 UART: [fwproc] Recv'd Img size: 114448 bytes
1,593,930 UART: ROM Fatal Error: 0x000B0033
1,595,087 >>> mbox cmd response: failed
1,595,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,093 >>> mbox cmd response: failed
1,595,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,211 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,365 UART: [idev] ++
1,173,533 UART: [idev] CDI.KEYID = 6
1,173,894 UART: [idev] SUBJECT.KEYID = 7
1,174,319 UART: [idev] UDS.KEYID = 0
1,174,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,209,168 UART: [ldev] ++
1,209,336 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,127 UART: [ldev] AUTHORITY.KEYID = 7
1,210,590 UART: [ldev] FE.KEYID = 1
1,215,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,785 UART: [fwproc] Recv command 0x46574c44
1,282,518 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,227 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,447,541 >>> mbox cmd response: failed
1,447,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,547 >>> mbox cmd response: failed
1,447,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,851 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,187 UART: [kat] LMS
1,169,499 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,174,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,794 UART: [idev] Erasing UDS.KEYID = 0
1,200,452 UART: [idev] Sha1 KeyId Algorithm
1,209,362 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,969 UART: [ldev] SUBJECT.KEYID = 5
1,211,396 UART: [ldev] AUTHORITY.KEYID = 7
1,211,859 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,244,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,161 UART: [ldev] --
1,283,631 UART: [fwproc] Wait for Commands...
1,284,440 UART: [fwproc] Recv command 0x46574c44
1,285,173 UART: [fwproc] Recv'd Img size: 114448 bytes
1,595,653 UART: ROM Fatal Error: 0x000B0033
1,596,810 >>> mbox cmd response: failed
1,596,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,816 >>> mbox cmd response: failed
1,596,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,174,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,617 UART: [ldev] SUBJECT.KEYID = 5
1,210,044 UART: [ldev] AUTHORITY.KEYID = 7
1,210,507 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,089 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,872 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,438,708 >>> mbox cmd response: failed
1,438,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,438,714 >>> mbox cmd response: failed
1,438,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,438,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
4,879,363 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,329,836 >>> mbox cmd response: failed
15,330,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,330,973 >>> mbox cmd response: failed
15,331,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,331,622 >>> mbox cmd response: failed
Initializing fuses
2,053,084 writing to cptra_bootfsm_go
6,914,205 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,468,256 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
4,882,447 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,330,159 >>> mbox cmd response: failed
15,330,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,331,131 >>> mbox cmd response: failed
15,331,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,331,740 >>> mbox cmd response: failed
Initializing fuses
2,063,599 writing to cptra_bootfsm_go
6,931,431 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,490,603 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
5,185,264 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,493,415 >>> mbox cmd response: failed
15,493,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,494,559 >>> mbox cmd response: failed
15,494,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,495,141 >>> mbox cmd response: failed
Initializing fuses
2,056,392 writing to cptra_bootfsm_go
9,558,091 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,994,860 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
5,186,836 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,496,343 >>> mbox cmd response: failed
15,496,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,497,328 >>> mbox cmd response: failed
15,497,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,497,888 >>> mbox cmd response: failed
Initializing fuses
2,059,495 writing to cptra_bootfsm_go
9,557,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,991,486 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,084 writing to cptra_bootfsm_go
3,463,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,455,575 >>> mbox cmd response: failed
11,456,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,456,534 >>> mbox cmd response: failed
11,456,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,457,102 >>> mbox cmd response: failed
Initializing fuses
2,048,020 writing to cptra_bootfsm_go
5,487,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,341,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,478,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,407,261 >>> mbox cmd response: failed
11,407,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,408,142 >>> mbox cmd response: failed
11,408,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,408,707 >>> mbox cmd response: failed
Initializing fuses
2,047,196 writing to cptra_bootfsm_go
5,475,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,286,868 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,786,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,652,102 >>> mbox cmd response: failed
11,652,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,653,341 >>> mbox cmd response: failed
11,653,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,653,895 >>> mbox cmd response: failed
Initializing fuses
2,049,561 writing to cptra_bootfsm_go
11,971,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,689,897 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,785,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,641,191 >>> mbox cmd response: failed
11,641,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,642,301 >>> mbox cmd response: failed
11,642,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,642,865 >>> mbox cmd response: failed
Initializing fuses
2,048,187 writing to cptra_bootfsm_go
12,014,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,750,871 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,437,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,392,533 >>> mbox cmd response: failed
11,393,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,393,731 >>> mbox cmd response: failed
11,394,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,394,326 >>> mbox cmd response: failed
Initializing fuses
2,057,995 writing to cptra_bootfsm_go
5,522,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,381,363 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,443,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,414,958 >>> mbox cmd response: failed
11,415,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,415,968 >>> mbox cmd response: failed
11,416,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,416,520 >>> mbox cmd response: failed
Initializing fuses
2,056,100 writing to cptra_bootfsm_go
5,478,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,362,644 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,791,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,639,788 >>> mbox cmd response: failed
11,640,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,641,027 >>> mbox cmd response: failed
11,641,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,641,599 >>> mbox cmd response: failed
Initializing fuses
2,058,057 writing to cptra_bootfsm_go
12,007,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,734,814 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,496 writing to cptra_bootfsm_go
3,788,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,650,317 >>> mbox cmd response: failed
11,650,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,651,231 >>> mbox cmd response: failed
11,651,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,651,784 >>> mbox cmd response: failed
Initializing fuses
2,056,460 writing to cptra_bootfsm_go
11,999,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,733,870 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,043 >>> mbox cmd response: failed
1,197,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,049 >>> mbox cmd response: failed
1,197,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
85,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,505 UART: [kat] SHA2-256
881,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,551 UART: [kat] ++
885,703 UART: [kat] sha1
889,925 UART: [kat] SHA2-256
891,863 UART: [kat] SHA2-384
894,546 UART: [kat] SHA2-512-ACC
896,447 UART: [kat] ECC-384
902,064 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,573 UART: [cold-reset] ++
1,475,935 UART: [fht] Storing FHT @ 0x50003400
1,478,770 UART: [idev] ++
1,478,938 UART: [idev] CDI.KEYID = 6
1,479,298 UART: [idev] SUBJECT.KEYID = 7
1,479,722 UART: [idev] UDS.KEYID = 0
1,480,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,666 UART: [idev] Erasing UDS.KEYID = 0
1,504,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,502 UART: [idev] --
1,513,609 UART: [ldev] ++
1,513,777 UART: [ldev] CDI.KEYID = 6
1,514,140 UART: [ldev] SUBJECT.KEYID = 5
1,514,566 UART: [ldev] AUTHORITY.KEYID = 7
1,515,029 UART: [ldev] FE.KEYID = 1
1,520,129 UART: [ldev] Erasing FE.KEYID = 1
1,545,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,002 UART: [ldev] --
1,584,347 UART: [fwproc] Waiting for Commands...
1,585,130 UART: [fwproc] Received command 0x46574c44
1,585,921 UART: [fwproc] Received Image of size 114448 bytes
2,886,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,572 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,271 >>> mbox cmd response: failed
1,197,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,277 >>> mbox cmd response: failed
1,197,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,006 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,532 >>> mbox cmd response: failed
1,199,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,538 >>> mbox cmd response: failed
1,199,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,649 UART: [kat] SHA2-512-ACC
897,550 UART: [kat] ECC-384
903,389 UART: [kat] HMAC-384Kdf
907,937 UART: [kat] LMS
1,476,133 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,667 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,141 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,521,658 UART: [ldev] Erasing FE.KEYID = 1
1,547,075 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,037 UART: [ldev] --
1,586,504 UART: [fwproc] Waiting for Commands...
1,587,127 UART: [fwproc] Received command 0x46574c44
1,587,918 UART: [fwproc] Received Image of size 114448 bytes
2,886,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,405 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,564 >>> mbox cmd response: failed
1,196,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,570 >>> mbox cmd response: failed
1,196,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,501 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,185 >>> mbox cmd response: failed
1,197,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,191 >>> mbox cmd response: failed
1,197,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,449 UART: [cold-reset] ++
1,171,779 UART: [fht] FHT @ 0x50003400
1,174,368 UART: [idev] ++
1,174,536 UART: [idev] CDI.KEYID = 6
1,174,896 UART: [idev] SUBJECT.KEYID = 7
1,175,320 UART: [idev] UDS.KEYID = 0
1,175,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,152 UART: [idev] Erasing UDS.KEYID = 0
1,200,637 UART: [idev] Sha1 KeyId Algorithm
1,209,255 UART: [idev] --
1,210,211 UART: [ldev] ++
1,210,379 UART: [ldev] CDI.KEYID = 6
1,210,742 UART: [ldev] SUBJECT.KEYID = 5
1,211,168 UART: [ldev] AUTHORITY.KEYID = 7
1,211,631 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,116 UART: [fwproc] Wait for Commands...
1,282,706 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,485 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,081 >>> mbox cmd response: failed
1,198,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,087 >>> mbox cmd response: failed
1,198,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,224 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,170 >>> mbox cmd response: failed
1,197,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,176 >>> mbox cmd response: failed
1,197,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
919,255 UART: [kat] HMAC-384Kdf
923,923 UART: [kat] LMS
1,172,251 UART: [kat] --
1,173,078 UART: [cold-reset] ++
1,173,552 UART: [fht] FHT @ 0x50003400
1,176,181 UART: [idev] ++
1,176,349 UART: [idev] CDI.KEYID = 6
1,176,709 UART: [idev] SUBJECT.KEYID = 7
1,177,133 UART: [idev] UDS.KEYID = 0
1,177,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,309 UART: [idev] Erasing UDS.KEYID = 0
1,202,546 UART: [idev] Sha1 KeyId Algorithm
1,210,878 UART: [idev] --
1,211,960 UART: [ldev] ++
1,212,128 UART: [ldev] CDI.KEYID = 6
1,212,491 UART: [ldev] SUBJECT.KEYID = 5
1,212,917 UART: [ldev] AUTHORITY.KEYID = 7
1,213,380 UART: [ldev] FE.KEYID = 1
1,218,456 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,600 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,541 UART: [fwproc] Recv command 0x46574c44
1,285,269 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,604 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,664 >>> mbox cmd response: failed
1,197,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,670 >>> mbox cmd response: failed
1,197,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,285 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,383 >>> mbox cmd response: failed
1,197,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,389 >>> mbox cmd response: failed
1,197,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,352 UART: [kat] HMAC-384Kdf
919,938 UART: [kat] LMS
1,168,250 UART: [kat] --
1,169,073 UART: [cold-reset] ++
1,169,405 UART: [fht] FHT @ 0x50003400
1,172,131 UART: [idev] ++
1,172,299 UART: [idev] CDI.KEYID = 6
1,172,660 UART: [idev] SUBJECT.KEYID = 7
1,173,085 UART: [idev] UDS.KEYID = 0
1,173,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,035 UART: [idev] Erasing UDS.KEYID = 0
1,197,479 UART: [idev] Sha1 KeyId Algorithm
1,206,347 UART: [idev] --
1,207,346 UART: [ldev] ++
1,207,514 UART: [ldev] CDI.KEYID = 6
1,207,878 UART: [ldev] SUBJECT.KEYID = 5
1,208,305 UART: [ldev] AUTHORITY.KEYID = 7
1,208,768 UART: [ldev] FE.KEYID = 1
1,213,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,002 UART: [ldev] --
1,279,388 UART: [fwproc] Wait for Commands...
1,280,133 UART: [fwproc] Recv command 0x46574c44
1,280,866 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,661 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,143 >>> mbox cmd response: failed
1,196,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,149 >>> mbox cmd response: failed
1,196,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,083 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,298 >>> mbox cmd response: failed
1,197,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,304 >>> mbox cmd response: failed
1,197,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,169,990 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,990 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,821 UART: [ldev] ++
1,208,989 UART: [ldev] CDI.KEYID = 6
1,209,353 UART: [ldev] SUBJECT.KEYID = 5
1,209,780 UART: [ldev] AUTHORITY.KEYID = 7
1,210,243 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,423 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,963 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,034 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,848 >>> mbox cmd response: failed
1,198,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,854 >>> mbox cmd response: failed
1,198,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,216 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
4,883,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,998,848 >>> mbox cmd response: failed
13,999,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,999,814 >>> mbox cmd response: failed
14,000,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,000,388 >>> mbox cmd response: failed
Initializing fuses
2,060,364 writing to cptra_bootfsm_go
6,917,605 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,544,190 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
4,883,542 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,001,809 >>> mbox cmd response: failed
14,002,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,002,776 >>> mbox cmd response: failed
14,003,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,003,381 >>> mbox cmd response: failed
Initializing fuses
2,059,346 writing to cptra_bootfsm_go
6,935,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,554,549 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
5,183,010 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,165,415 >>> mbox cmd response: failed
14,166,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,166,574 >>> mbox cmd response: failed
14,166,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,167,140 >>> mbox cmd response: failed
Initializing fuses
2,052,268 writing to cptra_bootfsm_go
10,892,227 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,364,583 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
5,187,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,175,989 >>> mbox cmd response: failed
14,176,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,176,958 >>> mbox cmd response: failed
14,177,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,177,534 >>> mbox cmd response: failed
Initializing fuses
2,051,723 writing to cptra_bootfsm_go
10,870,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,346,641 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,438,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,374,353 >>> mbox cmd response: failed
10,374,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,300 >>> mbox cmd response: failed
10,375,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,864 >>> mbox cmd response: failed
Initializing fuses
2,052,019 writing to cptra_bootfsm_go
5,502,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,368,192 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,438,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,377,730 >>> mbox cmd response: failed
10,378,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,378,846 >>> mbox cmd response: failed
10,379,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,379,402 >>> mbox cmd response: failed
Initializing fuses
2,050,334 writing to cptra_bootfsm_go
5,477,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,348,051 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,782,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,623,609 >>> mbox cmd response: failed
10,624,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,848 >>> mbox cmd response: failed
10,625,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,413 >>> mbox cmd response: failed
Initializing fuses
2,050,498 writing to cptra_bootfsm_go
13,013,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,764,410 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,781,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,629,602 >>> mbox cmd response: failed
10,630,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,630,630 >>> mbox cmd response: failed
10,630,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,254 >>> mbox cmd response: failed
Initializing fuses
2,050,750 writing to cptra_bootfsm_go
13,020,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,775,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,445,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,397,110 >>> mbox cmd response: failed
10,397,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,219 >>> mbox cmd response: failed
10,398,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,780 >>> mbox cmd response: failed
Initializing fuses
2,051,850 writing to cptra_bootfsm_go
5,498,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,332,748 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,467,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,450,361 >>> mbox cmd response: failed
10,451,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,451,372 >>> mbox cmd response: failed
10,451,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,451,944 >>> mbox cmd response: failed
Initializing fuses
2,052,148 writing to cptra_bootfsm_go
5,477,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,361,404 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,788,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,630,635 >>> mbox cmd response: failed
10,631,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,575 >>> mbox cmd response: failed
10,631,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,632,141 >>> mbox cmd response: failed
Initializing fuses
2,054,657 writing to cptra_bootfsm_go
13,021,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,790,878 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,794,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,644,874 >>> mbox cmd response: failed
10,645,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,645,911 >>> mbox cmd response: failed
10,646,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,646,472 >>> mbox cmd response: failed
Initializing fuses
2,054,323 writing to cptra_bootfsm_go
13,005,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,787,841 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,719 >>> mbox cmd response: failed
1,178,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,725 >>> mbox cmd response: failed
1,178,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,290 UART: [kat] SHA2-512-ACC
897,191 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,482 UART: [idev] ++
1,479,650 UART: [idev] CDI.KEYID = 6
1,480,010 UART: [idev] SUBJECT.KEYID = 7
1,480,434 UART: [idev] UDS.KEYID = 0
1,480,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,505,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,852 UART: [idev] --
1,514,943 UART: [ldev] ++
1,515,111 UART: [ldev] CDI.KEYID = 6
1,515,474 UART: [ldev] SUBJECT.KEYID = 5
1,515,900 UART: [ldev] AUTHORITY.KEYID = 7
1,516,363 UART: [ldev] FE.KEYID = 1
1,521,335 UART: [ldev] Erasing FE.KEYID = 1
1,546,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,112 UART: [ldev] --
1,585,487 UART: [fwproc] Waiting for Commands...
1,586,240 UART: [fwproc] Received command 0x46574c44
1,587,031 UART: [fwproc] Received Image of size 114448 bytes
2,885,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,612 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,661 >>> mbox cmd response: failed
1,180,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,667 >>> mbox cmd response: failed
1,180,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,194 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,282 >>> mbox cmd response: failed
1,179,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,288 >>> mbox cmd response: failed
1,179,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,768 UART: [kat] SHA2-256
882,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,814 UART: [kat] ++
886,966 UART: [kat] sha1
891,356 UART: [kat] SHA2-256
893,294 UART: [kat] SHA2-384
896,123 UART: [kat] SHA2-512-ACC
898,024 UART: [kat] ECC-384
903,677 UART: [kat] HMAC-384Kdf
908,109 UART: [kat] LMS
1,476,305 UART: [kat] --
1,477,004 UART: [cold-reset] ++
1,477,426 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,979 UART: [idev] Erasing UDS.KEYID = 0
1,505,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,410 UART: [ldev] ++
1,515,578 UART: [ldev] CDI.KEYID = 6
1,515,941 UART: [ldev] SUBJECT.KEYID = 5
1,516,367 UART: [ldev] AUTHORITY.KEYID = 7
1,516,830 UART: [ldev] FE.KEYID = 1
1,522,164 UART: [ldev] Erasing FE.KEYID = 1
1,547,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,501 UART: [ldev] --
1,586,930 UART: [fwproc] Waiting for Commands...
1,587,797 UART: [fwproc] Received command 0x46574c44
1,588,588 UART: [fwproc] Received Image of size 114448 bytes
2,887,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,060 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,290 >>> mbox cmd response: failed
1,179,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,296 >>> mbox cmd response: failed
1,179,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,031 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,605 >>> mbox cmd response: failed
1,180,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,611 >>> mbox cmd response: failed
1,180,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,845 UART: [kat] SHA2-256
903,785 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,381 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,176,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,478 UART: [idev] Erasing UDS.KEYID = 0
1,201,503 UART: [idev] Sha1 KeyId Algorithm
1,210,031 UART: [idev] --
1,211,133 UART: [ldev] ++
1,211,301 UART: [ldev] CDI.KEYID = 6
1,211,664 UART: [ldev] SUBJECT.KEYID = 5
1,212,090 UART: [ldev] AUTHORITY.KEYID = 7
1,212,553 UART: [ldev] FE.KEYID = 1
1,217,577 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,628 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0x46574c44
1,284,034 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,205 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,109 >>> mbox cmd response: failed
1,179,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,115 >>> mbox cmd response: failed
1,179,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,140 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,810 >>> mbox cmd response: failed
1,181,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,816 >>> mbox cmd response: failed
1,181,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,155 UART: [kat] HMAC-384Kdf
922,671 UART: [kat] LMS
1,170,999 UART: [kat] --
1,171,948 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,175,013 UART: [idev] ++
1,175,181 UART: [idev] CDI.KEYID = 6
1,175,541 UART: [idev] SUBJECT.KEYID = 7
1,175,965 UART: [idev] UDS.KEYID = 0
1,176,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,210,094 UART: [idev] --
1,211,138 UART: [ldev] ++
1,211,306 UART: [ldev] CDI.KEYID = 6
1,211,669 UART: [ldev] SUBJECT.KEYID = 5
1,212,095 UART: [ldev] AUTHORITY.KEYID = 7
1,212,558 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,234 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,345 UART: [fwproc] Recv command 0x46574c44
1,285,073 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,626 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,706 >>> mbox cmd response: failed
1,180,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,712 >>> mbox cmd response: failed
1,180,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,557 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,441 >>> mbox cmd response: failed
1,179,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,447 >>> mbox cmd response: failed
1,179,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,103 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,941 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,601 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,285 >>> mbox cmd response: failed
1,179,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,291 >>> mbox cmd response: failed
1,179,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,451 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,930 >>> mbox cmd response: failed
1,179,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,936 >>> mbox cmd response: failed
1,179,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,080 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,631 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,645 UART: [ldev] --
1,281,079 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,912 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,376 >>> mbox cmd response: failed
1,180,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,382 >>> mbox cmd response: failed
1,180,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,474 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,025 UART:
192,398 UART: Running Caliptra ROM ...
193,490 UART:
193,631 UART: [state] CFI Enabled
263,967 UART: [state] LifecycleState = Manufacturing
265,945 UART: [state] DebugLocked = No
268,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,473 UART: [kat] SHA2-256
443,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,685 UART: [kat] ++
454,133 UART: [kat] sha1
465,333 UART: [kat] SHA2-256
468,026 UART: [kat] SHA2-384
475,360 UART: [kat] SHA2-512-ACC
477,755 UART: [kat] ECC-384
2,766,959 UART: [kat] HMAC-384Kdf
2,780,944 UART: [kat] LMS
3,971,233 UART: [kat] --
3,977,298 UART: [cold-reset] ++
3,979,715 UART: [fht] Storing FHT @ 0x50003400
3,991,252 UART: [idev] ++
3,991,815 UART: [idev] CDI.KEYID = 6
3,992,752 UART: [idev] SUBJECT.KEYID = 7
3,993,988 UART: [idev] UDS.KEYID = 0
3,999,601 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,143,377 UART: [idev] Erasing UDS.KEYID = 0
7,320,680 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,857 UART: [idev] --
7,347,158 UART: [ldev] ++
7,347,785 UART: [ldev] CDI.KEYID = 6
7,348,700 UART: [ldev] SUBJECT.KEYID = 5
7,349,921 UART: [ldev] AUTHORITY.KEYID = 7
7,351,211 UART: [ldev] FE.KEYID = 1
7,395,891 UART: [ldev] Erasing FE.KEYID = 1
10,730,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,378 UART: [ldev] --
13,111,459 UART: [fwproc] Waiting for Commands...
13,114,471 UART: [fwproc] Received command 0x46574c44
13,116,711 UART: [fwproc] Received Image of size 114124 bytes
13,178,062 UART: ROM Fatal Error: 0x000B0003
13,181,580 >>> mbox cmd response: failed
13,181,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,328 >>> mbox cmd response: failed
13,182,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,888 >>> mbox cmd response: failed
Initializing fuses
2,056,252 writing to cptra_bootfsm_go
2,245,571 UART:
2,245,928 UART: Running Caliptra ROM ...
2,246,977 UART:
2,247,138 UART: [state] CFI Enabled
2,308,030 UART: [state] LifecycleState = Manufacturing
2,310,031 UART: [state] DebugLocked = No
2,312,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,146 UART: [kat] SHA2-256
2,486,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,340 UART: [kat] ++
2,497,852 UART: [kat] sha1
2,508,203 UART: [kat] SHA2-256
2,510,869 UART: [kat] SHA2-384
2,516,535 UART: [kat] SHA2-512-ACC
2,518,883 UART: [kat] ECC-384
4,810,435 UART: [kat] HMAC-384Kdf
4,844,261 UART: [kat] LMS
6,034,529 UART: [kat] --
6,040,889 UART: [cold-reset] ++
6,042,099 UART: [fht] Storing FHT @ 0x50003400
6,053,225 UART: [idev] ++
6,053,794 UART: [idev] CDI.KEYID = 6
6,054,733 UART: [idev] SUBJECT.KEYID = 7
6,056,003 UART: [idev] UDS.KEYID = 0
6,058,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,202,314 UART: [idev] Erasing UDS.KEYID = 0
9,388,661 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,617 UART: [idev] --
9,415,366 UART: [ldev] ++
9,416,000 UART: [ldev] CDI.KEYID = 6
9,416,919 UART: [ldev] SUBJECT.KEYID = 5
9,418,190 UART: [ldev] AUTHORITY.KEYID = 7
9,419,430 UART: [ldev] FE.KEYID = 1
9,466,542 UART: [ldev] Erasing FE.KEYID = 1
12,797,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,089,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,467 UART: [ldev] --
15,158,513 UART: [fwproc] Waiting for Commands...
15,160,592 UART: [fwproc] Received command 0x46574c44
15,162,795 UART: [fwproc] Received Image of size 114124 bytes
19,246,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,322,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,391,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,708,644 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,792,754 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,898,457 >>> mbox cmd response: failed
12,899,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,418 >>> mbox cmd response: failed
12,899,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,978 >>> mbox cmd response: failed
Initializing fuses
2,056,722 writing to cptra_bootfsm_go
5,840,977 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,961,407 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,461 UART:
192,825 UART: Running Caliptra ROM ...
193,975 UART:
603,798 UART: [state] CFI Enabled
618,356 UART: [state] LifecycleState = Manufacturing
620,296 UART: [state] DebugLocked = No
623,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,824 UART: [kat] SHA2-256
798,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,157 UART: [kat] ++
809,625 UART: [kat] sha1
821,694 UART: [kat] SHA2-256
824,389 UART: [kat] SHA2-384
829,294 UART: [kat] SHA2-512-ACC
831,633 UART: [kat] ECC-384
3,116,457 UART: [kat] HMAC-384Kdf
3,127,896 UART: [kat] LMS
4,318,057 UART: [kat] --
4,321,917 UART: [cold-reset] ++
4,323,261 UART: [fht] Storing FHT @ 0x50003400
4,335,993 UART: [idev] ++
4,336,567 UART: [idev] CDI.KEYID = 6
4,337,591 UART: [idev] SUBJECT.KEYID = 7
4,338,751 UART: [idev] UDS.KEYID = 0
4,344,257 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,875 UART: [idev] Erasing UDS.KEYID = 0
7,627,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,376 UART: [idev] --
7,652,844 UART: [ldev] ++
7,653,429 UART: [ldev] CDI.KEYID = 6
7,654,357 UART: [ldev] SUBJECT.KEYID = 5
7,655,574 UART: [ldev] AUTHORITY.KEYID = 7
7,656,810 UART: [ldev] FE.KEYID = 1
7,668,489 UART: [ldev] Erasing FE.KEYID = 1
10,957,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,282 UART: [ldev] --
13,316,767 UART: [fwproc] Waiting for Commands...
13,319,751 UART: [fwproc] Received command 0x46574c44
13,321,940 UART: [fwproc] Received Image of size 114124 bytes
13,383,505 UART: ROM Fatal Error: 0x000B0003
13,387,026 >>> mbox cmd response: failed
13,387,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,387,807 >>> mbox cmd response: failed
13,388,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,388,375 >>> mbox cmd response: failed
Initializing fuses
2,053,371 writing to cptra_bootfsm_go
2,242,692 UART:
2,243,035 UART: Running Caliptra ROM ...
2,244,174 UART:
7,081,880 UART: [state] CFI Enabled
7,096,830 UART: [state] LifecycleState = Manufacturing
7,098,757 UART: [state] DebugLocked = No
7,100,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,104,790 UART: [kat] SHA2-256
7,274,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,285,070 UART: [kat] ++
7,285,564 UART: [kat] sha1
7,298,179 UART: [kat] SHA2-256
7,300,860 UART: [kat] SHA2-384
7,307,401 UART: [kat] SHA2-512-ACC
7,309,770 UART: [kat] ECC-384
9,592,524 UART: [kat] HMAC-384Kdf
9,604,764 UART: [kat] LMS
10,794,924 UART: [kat] --
10,800,113 UART: [cold-reset] ++
10,801,455 UART: [fht] Storing FHT @ 0x50003400
10,812,074 UART: [idev] ++
10,812,704 UART: [idev] CDI.KEYID = 6
10,813,613 UART: [idev] SUBJECT.KEYID = 7
10,814,878 UART: [idev] UDS.KEYID = 0
10,817,757 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,961,473 UART: [idev] Erasing UDS.KEYID = 0
14,101,073 UART: [idev] Using Sha1 for KeyId Algorithm
14,123,134 UART: [idev] --
14,127,832 UART: [ldev] ++
14,128,403 UART: [ldev] CDI.KEYID = 6
14,129,421 UART: [ldev] SUBJECT.KEYID = 5
14,130,642 UART: [ldev] AUTHORITY.KEYID = 7
14,131,825 UART: [ldev] FE.KEYID = 1
14,144,037 UART: [ldev] Erasing FE.KEYID = 1
17,433,543 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,729,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,744,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,759,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,773,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,791,590 UART: [ldev] --
19,795,896 UART: [fwproc] Waiting for Commands...
19,798,809 UART: [fwproc] Received command 0x46574c44
19,800,995 UART: [fwproc] Received Image of size 114124 bytes
23,883,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,956,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,025,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,342,597 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,134,787 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,124,703 >>> mbox cmd response: failed
13,125,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,683 >>> mbox cmd response: failed
13,125,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,255 >>> mbox cmd response: failed
Initializing fuses
2,049,648 writing to cptra_bootfsm_go
10,860,779 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,839,150 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,232 writing to cptra_bootfsm_go
193,488 UART:
193,849 UART: Running Caliptra ROM ...
194,940 UART:
195,079 UART: [state] CFI Enabled
267,826 UART: [state] LifecycleState = Manufacturing
269,743 UART: [state] DebugLocked = No
272,284 UART: [state] WD Timer not started. Device not locked for debugging
275,296 UART: [kat] SHA2-256
454,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,989 UART: [kat] ++
466,526 UART: [kat] sha1
476,871 UART: [kat] SHA2-256
479,924 UART: [kat] SHA2-384
486,679 UART: [kat] SHA2-512-ACC
489,657 UART: [kat] ECC-384
2,949,362 UART: [kat] HMAC-384Kdf
2,973,523 UART: [kat] LMS
3,502,945 UART: [kat] --
3,507,551 UART: [cold-reset] ++
3,508,945 UART: [fht] FHT @ 0x50003400
3,519,294 UART: [idev] ++
3,519,862 UART: [idev] CDI.KEYID = 6
3,520,771 UART: [idev] SUBJECT.KEYID = 7
3,522,023 UART: [idev] UDS.KEYID = 0
3,525,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,098 UART: [idev] Erasing UDS.KEYID = 0
6,028,553 UART: [idev] Sha1 KeyId Algorithm
6,049,951 UART: [idev] --
6,054,008 UART: [ldev] ++
6,054,608 UART: [ldev] CDI.KEYID = 6
6,055,520 UART: [ldev] SUBJECT.KEYID = 5
6,056,682 UART: [ldev] AUTHORITY.KEYID = 7
6,057,919 UART: [ldev] FE.KEYID = 1
6,101,741 UART: [ldev] Erasing FE.KEYID = 1
8,604,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,105 UART: [ldev] --
10,415,731 UART: [fwproc] Wait for Commands...
10,418,098 UART: [fwproc] Recv command 0x46574c44
10,420,206 UART: [fwproc] Recv'd Img size: 114448 bytes
10,480,676 UART: ROM Fatal Error: 0x000B0003
10,483,755 >>> mbox cmd response: failed
10,484,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,615 >>> mbox cmd response: failed
10,484,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,259 >>> mbox cmd response: failed
Initializing fuses
2,048,516 writing to cptra_bootfsm_go
2,237,817 UART:
2,238,177 UART: Running Caliptra ROM ...
2,239,245 UART:
2,239,399 UART: [state] CFI Enabled
2,303,152 UART: [state] LifecycleState = Manufacturing
2,305,052 UART: [state] DebugLocked = No
2,306,376 UART: [state] WD Timer not started. Device not locked for debugging
2,309,532 UART: [kat] SHA2-256
2,488,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,208 UART: [kat] ++
2,500,674 UART: [kat] sha1
2,511,401 UART: [kat] SHA2-256
2,514,432 UART: [kat] SHA2-384
2,519,896 UART: [kat] SHA2-512-ACC
2,522,844 UART: [kat] ECC-384
4,988,214 UART: [kat] HMAC-384Kdf
5,011,040 UART: [kat] LMS
5,540,484 UART: [kat] --
5,546,823 UART: [cold-reset] ++
5,547,789 UART: [fht] FHT @ 0x50003400
5,558,176 UART: [idev] ++
5,558,750 UART: [idev] CDI.KEYID = 6
5,559,680 UART: [idev] SUBJECT.KEYID = 7
5,560,898 UART: [idev] UDS.KEYID = 0
5,563,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,982 UART: [idev] Erasing UDS.KEYID = 0
8,069,982 UART: [idev] Sha1 KeyId Algorithm
8,092,880 UART: [idev] --
8,097,018 UART: [ldev] ++
8,097,605 UART: [ldev] CDI.KEYID = 6
8,098,521 UART: [ldev] SUBJECT.KEYID = 5
8,099,684 UART: [ldev] AUTHORITY.KEYID = 7
8,100,920 UART: [ldev] FE.KEYID = 1
8,139,655 UART: [ldev] Erasing FE.KEYID = 1
10,641,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,365 UART: [ldev] --
12,450,683 UART: [fwproc] Wait for Commands...
12,453,855 UART: [fwproc] Recv command 0x46574c44
12,455,960 UART: [fwproc] Recv'd Img size: 114448 bytes
15,889,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,965,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,034,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,352,113 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,360,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,244,413 >>> mbox cmd response: failed
10,244,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,245,290 >>> mbox cmd response: failed
10,245,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,245,888 >>> mbox cmd response: failed
Initializing fuses
2,047,788 writing to cptra_bootfsm_go
5,402,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,116,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,533 UART:
192,901 UART: Running Caliptra ROM ...
194,025 UART:
603,624 UART: [state] CFI Enabled
619,679 UART: [state] LifecycleState = Manufacturing
621,595 UART: [state] DebugLocked = No
624,431 UART: [state] WD Timer not started. Device not locked for debugging
628,035 UART: [kat] SHA2-256
807,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,755 UART: [kat] ++
819,290 UART: [kat] sha1
830,412 UART: [kat] SHA2-256
833,416 UART: [kat] SHA2-384
840,421 UART: [kat] SHA2-512-ACC
843,411 UART: [kat] ECC-384
3,285,051 UART: [kat] HMAC-384Kdf
3,298,715 UART: [kat] LMS
3,828,175 UART: [kat] --
3,833,019 UART: [cold-reset] ++
3,835,529 UART: [fht] FHT @ 0x50003400
3,845,274 UART: [idev] ++
3,845,836 UART: [idev] CDI.KEYID = 6
3,846,720 UART: [idev] SUBJECT.KEYID = 7
3,847,936 UART: [idev] UDS.KEYID = 0
3,850,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,995,336 UART: [idev] Erasing UDS.KEYID = 0
6,316,641 UART: [idev] Sha1 KeyId Algorithm
6,338,432 UART: [idev] --
6,342,590 UART: [ldev] ++
6,343,163 UART: [ldev] CDI.KEYID = 6
6,344,047 UART: [ldev] SUBJECT.KEYID = 5
6,345,263 UART: [ldev] AUTHORITY.KEYID = 7
6,346,496 UART: [ldev] FE.KEYID = 1
6,358,139 UART: [ldev] Erasing FE.KEYID = 1
8,834,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,167 UART: [ldev] --
10,622,975 UART: [fwproc] Wait for Commands...
10,624,639 UART: [fwproc] Recv command 0x46574c44
10,626,685 UART: [fwproc] Recv'd Img size: 114448 bytes
10,687,804 UART: ROM Fatal Error: 0x000B0003
10,690,891 >>> mbox cmd response: failed
10,691,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,691,522 >>> mbox cmd response: failed
10,691,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,692,081 >>> mbox cmd response: failed
Initializing fuses
2,056,653 writing to cptra_bootfsm_go
2,245,957 UART:
2,246,294 UART: Running Caliptra ROM ...
2,247,339 UART:
9,774,848 UART: [state] CFI Enabled
9,787,367 UART: [state] LifecycleState = Manufacturing
9,789,263 UART: [state] DebugLocked = No
9,791,545 UART: [state] WD Timer not started. Device not locked for debugging
9,794,861 UART: [kat] SHA2-256
9,973,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,985,555 UART: [kat] ++
9,986,018 UART: [kat] sha1
9,997,662 UART: [kat] SHA2-256
10,000,678 UART: [kat] SHA2-384
10,006,611 UART: [kat] SHA2-512-ACC
10,009,609 UART: [kat] ECC-384
12,451,508 UART: [kat] HMAC-384Kdf
12,464,333 UART: [kat] LMS
12,993,825 UART: [kat] --
13,000,248 UART: [cold-reset] ++
13,002,458 UART: [fht] FHT @ 0x50003400
13,014,376 UART: [idev] ++
13,014,947 UART: [idev] CDI.KEYID = 6
13,015,961 UART: [idev] SUBJECT.KEYID = 7
13,017,063 UART: [idev] UDS.KEYID = 0
13,019,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,163,838 UART: [idev] Erasing UDS.KEYID = 0
15,493,894 UART: [idev] Sha1 KeyId Algorithm
15,517,002 UART: [idev] --
15,520,352 UART: [ldev] ++
15,520,917 UART: [ldev] CDI.KEYID = 6
15,521,840 UART: [ldev] SUBJECT.KEYID = 5
15,522,998 UART: [ldev] AUTHORITY.KEYID = 7
15,524,283 UART: [ldev] FE.KEYID = 1
15,535,572 UART: [ldev] Erasing FE.KEYID = 1
18,010,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,726,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,742,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,758,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,774,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,795,634 UART: [ldev] --
19,799,563 UART: [fwproc] Wait for Commands...
19,802,688 UART: [fwproc] Recv command 0x46574c44
19,804,786 UART: [fwproc] Recv'd Img size: 114448 bytes
23,234,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,309,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,378,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,695,984 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,700,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,470,590 >>> mbox cmd response: failed
10,471,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,471,421 >>> mbox cmd response: failed
10,471,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,000 >>> mbox cmd response: failed
Initializing fuses
2,048,595 writing to cptra_bootfsm_go
13,100,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,722,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,062 UART:
192,441 UART: Running Caliptra ROM ...
193,648 UART:
193,808 UART: [state] CFI Enabled
269,641 UART: [state] LifecycleState = Manufacturing
272,033 UART: [state] DebugLocked = No
273,481 UART: [state] WD Timer not started. Device not locked for debugging
278,031 UART: [kat] SHA2-256
467,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,679 UART: [kat] ++
479,213 UART: [kat] sha1
490,809 UART: [kat] SHA2-256
493,879 UART: [kat] SHA2-384
499,910 UART: [kat] SHA2-512-ACC
502,477 UART: [kat] ECC-384
2,953,008 UART: [kat] HMAC-384Kdf
2,975,314 UART: [kat] LMS
3,507,097 UART: [kat] --
3,513,164 UART: [cold-reset] ++
3,514,618 UART: [fht] FHT @ 0x50003400
3,526,311 UART: [idev] ++
3,526,990 UART: [idev] CDI.KEYID = 6
3,527,924 UART: [idev] SUBJECT.KEYID = 7
3,529,133 UART: [idev] UDS.KEYID = 0
3,534,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,678,824 UART: [idev] Erasing UDS.KEYID = 0
6,030,414 UART: [idev] Sha1 KeyId Algorithm
6,054,096 UART: [idev] --
6,058,323 UART: [ldev] ++
6,059,011 UART: [ldev] CDI.KEYID = 6
6,059,948 UART: [ldev] SUBJECT.KEYID = 5
6,061,113 UART: [ldev] AUTHORITY.KEYID = 7
6,062,349 UART: [ldev] FE.KEYID = 1
6,103,600 UART: [ldev] Erasing FE.KEYID = 1
8,605,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,613 UART: [ldev] --
10,415,823 UART: [fwproc] Wait for Commands...
10,418,575 UART: [fwproc] Recv command 0x46574c44
10,420,890 UART: [fwproc] Recv'd Img size: 114448 bytes
10,507,809 UART: ROM Fatal Error: 0x000B0003
10,511,495 >>> mbox cmd response: failed
10,511,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,512,323 >>> mbox cmd response: failed
10,512,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,512,889 >>> mbox cmd response: failed
Initializing fuses
2,053,382 writing to cptra_bootfsm_go
2,242,660 UART:
2,243,021 UART: Running Caliptra ROM ...
2,244,164 UART:
2,244,334 UART: [state] CFI Enabled
2,316,938 UART: [state] LifecycleState = Manufacturing
2,319,308 UART: [state] DebugLocked = No
2,320,702 UART: [state] WD Timer not started. Device not locked for debugging
2,325,718 UART: [kat] SHA2-256
2,515,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,400 UART: [kat] ++
2,526,908 UART: [kat] sha1
2,538,447 UART: [kat] SHA2-256
2,541,473 UART: [kat] SHA2-384
2,548,222 UART: [kat] SHA2-512-ACC
2,550,823 UART: [kat] ECC-384
5,000,611 UART: [kat] HMAC-384Kdf
5,025,172 UART: [kat] LMS
5,556,972 UART: [kat] --
5,562,261 UART: [cold-reset] ++
5,564,791 UART: [fht] FHT @ 0x50003400
5,575,510 UART: [idev] ++
5,576,186 UART: [idev] CDI.KEYID = 6
5,577,121 UART: [idev] SUBJECT.KEYID = 7
5,578,353 UART: [idev] UDS.KEYID = 0
5,581,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,725,212 UART: [idev] Erasing UDS.KEYID = 0
8,083,886 UART: [idev] Sha1 KeyId Algorithm
8,106,969 UART: [idev] --
8,111,938 UART: [ldev] ++
8,112,620 UART: [ldev] CDI.KEYID = 6
8,113,504 UART: [ldev] SUBJECT.KEYID = 5
8,114,676 UART: [ldev] AUTHORITY.KEYID = 7
8,115,900 UART: [ldev] FE.KEYID = 1
8,153,483 UART: [ldev] Erasing FE.KEYID = 1
10,661,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,119 UART: [ldev] --
12,468,978 UART: [fwproc] Wait for Commands...
12,472,141 UART: [fwproc] Recv command 0x46574c44
12,474,407 UART: [fwproc] Recv'd Img size: 114448 bytes
15,950,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,029,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,145,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,687,948 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,421,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,304,508 >>> mbox cmd response: failed
10,305,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,305,456 >>> mbox cmd response: failed
10,305,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,306,018 >>> mbox cmd response: failed
Initializing fuses
2,050,931 writing to cptra_bootfsm_go
5,484,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,799,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,573 UART:
192,926 UART: Running Caliptra ROM ...
194,103 UART:
603,921 UART: [state] CFI Enabled
617,272 UART: [state] LifecycleState = Manufacturing
619,616 UART: [state] DebugLocked = No
621,213 UART: [state] WD Timer not started. Device not locked for debugging
625,696 UART: [kat] SHA2-256
815,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,353 UART: [kat] ++
826,939 UART: [kat] sha1
839,283 UART: [kat] SHA2-256
842,348 UART: [kat] SHA2-384
847,190 UART: [kat] SHA2-512-ACC
849,767 UART: [kat] ECC-384
3,289,716 UART: [kat] HMAC-384Kdf
3,303,361 UART: [kat] LMS
3,835,189 UART: [kat] --
3,841,122 UART: [cold-reset] ++
3,843,214 UART: [fht] FHT @ 0x50003400
3,855,055 UART: [idev] ++
3,855,738 UART: [idev] CDI.KEYID = 6
3,856,678 UART: [idev] SUBJECT.KEYID = 7
3,857,885 UART: [idev] UDS.KEYID = 0
3,863,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,657 UART: [idev] Erasing UDS.KEYID = 0
6,335,212 UART: [idev] Sha1 KeyId Algorithm
6,358,698 UART: [idev] --
6,362,585 UART: [ldev] ++
6,363,336 UART: [ldev] CDI.KEYID = 6
6,364,268 UART: [ldev] SUBJECT.KEYID = 5
6,365,316 UART: [ldev] AUTHORITY.KEYID = 7
6,366,601 UART: [ldev] FE.KEYID = 1
6,377,679 UART: [ldev] Erasing FE.KEYID = 1
8,854,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,091 UART: [ldev] --
10,647,367 UART: [fwproc] Wait for Commands...
10,648,828 UART: [fwproc] Recv command 0x46574c44
10,650,820 UART: [fwproc] Recv'd Img size: 114448 bytes
10,746,777 UART: ROM Fatal Error: 0x000B0003
10,750,454 >>> mbox cmd response: failed
10,750,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,751,283 >>> mbox cmd response: failed
10,751,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,751,851 >>> mbox cmd response: failed
Initializing fuses
2,053,539 writing to cptra_bootfsm_go
2,242,807 UART:
2,243,153 UART: Running Caliptra ROM ...
2,244,294 UART:
9,709,735 UART: [state] CFI Enabled
9,724,500 UART: [state] LifecycleState = Manufacturing
9,726,898 UART: [state] DebugLocked = No
9,729,343 UART: [state] WD Timer not started. Device not locked for debugging
9,733,415 UART: [kat] SHA2-256
9,923,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,934,058 UART: [kat] ++
9,934,583 UART: [kat] sha1
9,946,933 UART: [kat] SHA2-256
9,949,967 UART: [kat] SHA2-384
9,954,701 UART: [kat] SHA2-512-ACC
9,957,272 UART: [kat] ECC-384
12,398,482 UART: [kat] HMAC-384Kdf
12,411,681 UART: [kat] LMS
12,943,536 UART: [kat] --
12,947,898 UART: [cold-reset] ++
12,950,219 UART: [fht] FHT @ 0x50003400
12,962,979 UART: [idev] ++
12,963,661 UART: [idev] CDI.KEYID = 6
12,964,673 UART: [idev] SUBJECT.KEYID = 7
12,965,830 UART: [idev] UDS.KEYID = 0
12,968,555 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,112,420 UART: [idev] Erasing UDS.KEYID = 0
15,441,416 UART: [idev] Sha1 KeyId Algorithm
15,463,355 UART: [idev] --
15,469,722 UART: [ldev] ++
15,470,434 UART: [ldev] CDI.KEYID = 6
15,471,346 UART: [ldev] SUBJECT.KEYID = 5
15,472,502 UART: [ldev] AUTHORITY.KEYID = 7
15,473,731 UART: [ldev] FE.KEYID = 1
15,483,886 UART: [ldev] Erasing FE.KEYID = 1
17,964,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,683,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,713,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,728,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,749,489 UART: [ldev] --
19,754,270 UART: [fwproc] Wait for Commands...
19,756,971 UART: [fwproc] Recv command 0x46574c44
19,759,229 UART: [fwproc] Recv'd Img size: 114448 bytes
23,232,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,310,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,427,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,970,043 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,765,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,523,776 >>> mbox cmd response: failed
10,524,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,899 >>> mbox cmd response: failed
10,525,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,475 >>> mbox cmd response: failed
Initializing fuses
2,057,652 writing to cptra_bootfsm_go
13,094,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,327,767 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Manufacturing
85,333 UART: [state] DebugLocked = No
85,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,383 UART: [kat] SHA2-256
881,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,429 UART: [kat] ++
885,581 UART: [kat] sha1
889,823 UART: [kat] SHA2-256
891,761 UART: [kat] SHA2-384
894,488 UART: [kat] SHA2-512-ACC
896,389 UART: [kat] ECC-384
901,930 UART: [kat] HMAC-384Kdf
906,496 UART: [kat] LMS
1,474,692 UART: [kat] --
1,475,829 UART: [cold-reset] ++
1,476,203 UART: [fht] Storing FHT @ 0x50003400
1,478,818 UART: [idev] ++
1,478,986 UART: [idev] CDI.KEYID = 6
1,479,346 UART: [idev] SUBJECT.KEYID = 7
1,479,770 UART: [idev] UDS.KEYID = 0
1,480,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,778 UART: [idev] Erasing UDS.KEYID = 0
1,504,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,632 UART: [idev] --
1,513,865 UART: [ldev] ++
1,514,033 UART: [ldev] CDI.KEYID = 6
1,514,396 UART: [ldev] SUBJECT.KEYID = 5
1,514,822 UART: [ldev] AUTHORITY.KEYID = 7
1,515,285 UART: [ldev] FE.KEYID = 1
1,520,289 UART: [ldev] Erasing FE.KEYID = 1
1,545,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,054 UART: [ldev] --
1,585,497 UART: [fwproc] Waiting for Commands...
1,586,330 UART: [fwproc] Received command 0x46574c44
1,587,121 UART: [fwproc] Received Image of size 114448 bytes
1,607,461 UART: ROM Fatal Error: 0x000B0003
1,608,618 >>> mbox cmd response: failed
1,608,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,624 >>> mbox cmd response: failed
1,608,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,694 UART: [state] LifecycleState = Unprovisioned
86,349 UART: [state] DebugLocked = No
86,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,465 UART: [kat] SHA2-256
882,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,511 UART: [kat] ++
886,663 UART: [kat] sha1
890,885 UART: [kat] SHA2-256
892,823 UART: [kat] SHA2-384
895,586 UART: [kat] SHA2-512-ACC
897,487 UART: [kat] ECC-384
903,168 UART: [kat] HMAC-384Kdf
907,892 UART: [kat] LMS
1,476,088 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,201 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,714 UART: [idev] Erasing UDS.KEYID = 0
1,505,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,116 UART: [idev] --
1,515,019 UART: [ldev] ++
1,515,187 UART: [ldev] CDI.KEYID = 6
1,515,550 UART: [ldev] SUBJECT.KEYID = 5
1,515,976 UART: [ldev] AUTHORITY.KEYID = 7
1,516,439 UART: [ldev] FE.KEYID = 1
1,521,915 UART: [ldev] Erasing FE.KEYID = 1
1,547,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,966 UART: [ldev] --
1,586,463 UART: [fwproc] Waiting for Commands...
1,587,078 UART: [fwproc] Received command 0x46574c44
1,587,869 UART: [fwproc] Received Image of size 114448 bytes
2,886,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,168 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,461,065 >>> mbox cmd response: failed
1,461,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,071 >>> mbox cmd response: failed
1,461,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,038 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Manufacturing
85,838 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,906 UART: [kat] SHA2-256
881,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,952 UART: [kat] ++
886,104 UART: [kat] sha1
890,228 UART: [kat] SHA2-256
892,166 UART: [kat] SHA2-384
894,767 UART: [kat] SHA2-512-ACC
896,668 UART: [kat] ECC-384
902,341 UART: [kat] HMAC-384Kdf
907,071 UART: [kat] LMS
1,475,267 UART: [kat] --
1,476,450 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,433 UART: [idev] ++
1,479,601 UART: [idev] CDI.KEYID = 6
1,479,961 UART: [idev] SUBJECT.KEYID = 7
1,480,385 UART: [idev] UDS.KEYID = 0
1,480,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,357 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,553 UART: [idev] --
1,514,630 UART: [ldev] ++
1,514,798 UART: [ldev] CDI.KEYID = 6
1,515,161 UART: [ldev] SUBJECT.KEYID = 5
1,515,587 UART: [ldev] AUTHORITY.KEYID = 7
1,516,050 UART: [ldev] FE.KEYID = 1
1,520,992 UART: [ldev] Erasing FE.KEYID = 1
1,546,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,995 UART: [ldev] --
1,586,260 UART: [fwproc] Waiting for Commands...
1,586,909 UART: [fwproc] Received command 0x46574c44
1,587,700 UART: [fwproc] Received Image of size 114448 bytes
1,608,666 UART: ROM Fatal Error: 0x000B0003
1,609,823 >>> mbox cmd response: failed
1,609,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,829 >>> mbox cmd response: failed
1,609,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
891,192 UART: [kat] SHA2-256
893,130 UART: [kat] SHA2-384
895,993 UART: [kat] SHA2-512-ACC
897,894 UART: [kat] ECC-384
903,653 UART: [kat] HMAC-384Kdf
908,419 UART: [kat] LMS
1,476,615 UART: [kat] --
1,477,630 UART: [cold-reset] ++
1,478,118 UART: [fht] Storing FHT @ 0x50003400
1,480,885 UART: [idev] ++
1,481,053 UART: [idev] CDI.KEYID = 6
1,481,413 UART: [idev] SUBJECT.KEYID = 7
1,481,837 UART: [idev] UDS.KEYID = 0
1,482,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,719 UART: [idev] Erasing UDS.KEYID = 0
1,506,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,181 UART: [idev] --
1,516,088 UART: [ldev] ++
1,516,256 UART: [ldev] CDI.KEYID = 6
1,516,619 UART: [ldev] SUBJECT.KEYID = 5
1,517,045 UART: [ldev] AUTHORITY.KEYID = 7
1,517,508 UART: [ldev] FE.KEYID = 1
1,522,748 UART: [ldev] Erasing FE.KEYID = 1
1,548,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,473 UART: [ldev] --
1,587,822 UART: [fwproc] Waiting for Commands...
1,588,497 UART: [fwproc] Received command 0x46574c44
1,589,288 UART: [fwproc] Received Image of size 114448 bytes
2,886,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,684 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,461,448 >>> mbox cmd response: failed
1,461,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,454 >>> mbox cmd response: failed
1,461,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Manufacturing
85,677 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,252 UART: [kat] SHA2-512-ACC
908,153 UART: [kat] ECC-384
917,614 UART: [kat] HMAC-384Kdf
922,044 UART: [kat] LMS
1,170,372 UART: [kat] --
1,171,181 UART: [cold-reset] ++
1,171,681 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,816 UART: [idev] SUBJECT.KEYID = 7
1,175,240 UART: [idev] UDS.KEYID = 0
1,175,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,296 UART: [idev] Erasing UDS.KEYID = 0
1,200,557 UART: [idev] Sha1 KeyId Algorithm
1,209,169 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,826 UART: [fwproc] Recv command 0x46574c44
1,283,554 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,266 UART: ROM Fatal Error: 0x000B0003
1,305,423 >>> mbox cmd response: failed
1,305,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,429 >>> mbox cmd response: failed
1,305,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,514 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,195 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,746 >>> mbox cmd response: failed
1,160,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,752 >>> mbox cmd response: failed
1,160,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Manufacturing
85,482 UART: [state] DebugLocked = No
86,118 UART: [state] WD Timer not started. Device not locked for debugging
87,453 UART: [kat] SHA2-256
893,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,228 UART: [kat] ++
897,380 UART: [kat] sha1
901,548 UART: [kat] SHA2-256
903,488 UART: [kat] SHA2-384
906,149 UART: [kat] SHA2-512-ACC
908,050 UART: [kat] ECC-384
918,005 UART: [kat] HMAC-384Kdf
922,645 UART: [kat] LMS
1,170,973 UART: [kat] --
1,171,834 UART: [cold-reset] ++
1,172,270 UART: [fht] FHT @ 0x50003400
1,174,801 UART: [idev] ++
1,174,969 UART: [idev] CDI.KEYID = 6
1,175,329 UART: [idev] SUBJECT.KEYID = 7
1,175,753 UART: [idev] UDS.KEYID = 0
1,176,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,797 UART: [idev] Erasing UDS.KEYID = 0
1,200,860 UART: [idev] Sha1 KeyId Algorithm
1,209,458 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,328 UART: [ldev] Erasing FE.KEYID = 1
1,243,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,266 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,459 UART: [fwproc] Recv command 0x46574c44
1,285,187 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,887 UART: ROM Fatal Error: 0x000B0003
1,307,044 >>> mbox cmd response: failed
1,307,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,050 >>> mbox cmd response: failed
1,307,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,379 UART: [kat] HMAC-384Kdf
923,247 UART: [kat] LMS
1,171,575 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,201,736 UART: [idev] Sha1 KeyId Algorithm
1,210,128 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,098 UART: [ldev] --
1,283,385 UART: [fwproc] Wait for Commands...
1,284,121 UART: [fwproc] Recv command 0x46574c44
1,284,849 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,933 >>> mbox cmd response: failed
1,160,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,939 >>> mbox cmd response: failed
1,160,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,191 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Manufacturing
85,643 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,583 UART: ROM Fatal Error: 0x000B0003
1,303,740 >>> mbox cmd response: failed
1,303,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,746 >>> mbox cmd response: failed
1,303,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,323 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,207,740 UART: [ldev] ++
1,207,908 UART: [ldev] CDI.KEYID = 6
1,208,272 UART: [ldev] SUBJECT.KEYID = 5
1,208,699 UART: [ldev] AUTHORITY.KEYID = 7
1,209,162 UART: [ldev] FE.KEYID = 1
1,214,486 UART: [ldev] Erasing FE.KEYID = 1
1,240,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,374 UART: [ldev] --
1,279,824 UART: [fwproc] Wait for Commands...
1,280,609 UART: [fwproc] Recv command 0x46574c44
1,281,342 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,255 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,151 >>> mbox cmd response: failed
1,156,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,157 >>> mbox cmd response: failed
1,156,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,001 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Manufacturing
86,220 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,906 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,173,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,198,842 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,477 UART: [ldev] --
1,281,865 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,938 UART: ROM Fatal Error: 0x000B0003
1,305,095 >>> mbox cmd response: failed
1,305,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,101 >>> mbox cmd response: failed
1,305,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,415 UART: [kat] LMS
1,169,727 UART: [kat] --
1,170,794 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,174,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,758 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,065 UART: [ldev] --
1,283,577 UART: [fwproc] Wait for Commands...
1,284,218 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,544 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,442 >>> mbox cmd response: failed
1,158,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,448 >>> mbox cmd response: failed
1,158,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,514 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,262 UART:
192,699 UART: Running Caliptra ROM ...
193,808 UART:
193,951 UART: [state] CFI Enabled
261,370 UART: [state] LifecycleState = Unprovisioned
263,356 UART: [state] DebugLocked = No
266,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,488 UART: [kat] SHA2-256
440,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,698 UART: [kat] ++
451,144 UART: [kat] sha1
462,077 UART: [kat] SHA2-256
464,768 UART: [kat] SHA2-384
470,485 UART: [kat] SHA2-512-ACC
472,871 UART: [kat] ECC-384
2,766,884 UART: [kat] HMAC-384Kdf
2,778,414 UART: [kat] LMS
3,968,685 UART: [kat] --
3,974,551 UART: [cold-reset] ++
3,977,033 UART: [fht] Storing FHT @ 0x50003400
3,988,251 UART: [idev] ++
3,988,830 UART: [idev] CDI.KEYID = 6
3,989,740 UART: [idev] SUBJECT.KEYID = 7
3,991,014 UART: [idev] UDS.KEYID = 0
3,994,170 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,789 UART: [idev] Erasing UDS.KEYID = 0
7,327,450 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,314 UART: [idev] --
7,353,644 UART: [ldev] ++
7,354,254 UART: [ldev] CDI.KEYID = 6
7,355,230 UART: [ldev] SUBJECT.KEYID = 5
7,356,451 UART: [ldev] AUTHORITY.KEYID = 7
7,357,703 UART: [ldev] FE.KEYID = 1
7,402,540 UART: [ldev] Erasing FE.KEYID = 1
10,733,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,795 UART: [ldev] --
13,096,640 UART: [fwproc] Waiting for Commands...
13,098,362 UART: [fwproc] Received command 0x46574c44
13,100,550 UART: [fwproc] Received Image of size 114124 bytes
13,197,138 UART: ROM Fatal Error: 0x000B001B
13,200,611 >>> mbox cmd response: failed
13,201,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,357 >>> mbox cmd response: failed
13,201,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,936 >>> mbox cmd response: failed
Initializing fuses
2,052,684 writing to cptra_bootfsm_go
2,242,058 UART:
2,242,416 UART: Running Caliptra ROM ...
2,243,552 UART:
2,243,735 UART: [state] CFI Enabled
2,320,119 UART: [state] LifecycleState = Unprovisioned
2,322,067 UART: [state] DebugLocked = No
2,324,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,515 UART: [kat] SHA2-256
2,499,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,689 UART: [kat] ++
2,510,166 UART: [kat] sha1
2,522,295 UART: [kat] SHA2-256
2,524,988 UART: [kat] SHA2-384
2,530,328 UART: [kat] SHA2-512-ACC
2,532,687 UART: [kat] ECC-384
4,820,644 UART: [kat] HMAC-384Kdf
4,852,155 UART: [kat] LMS
6,042,432 UART: [kat] --
6,045,823 UART: [cold-reset] ++
6,048,184 UART: [fht] Storing FHT @ 0x50003400
6,060,155 UART: [idev] ++
6,060,722 UART: [idev] CDI.KEYID = 6
6,061,636 UART: [idev] SUBJECT.KEYID = 7
6,062,907 UART: [idev] UDS.KEYID = 0
6,065,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,209,076 UART: [idev] Erasing UDS.KEYID = 0
9,400,266 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,649 UART: [idev] --
9,427,052 UART: [ldev] ++
9,427,630 UART: [ldev] CDI.KEYID = 6
9,428,542 UART: [ldev] SUBJECT.KEYID = 5
9,429,864 UART: [ldev] AUTHORITY.KEYID = 7
9,431,003 UART: [ldev] FE.KEYID = 1
9,475,982 UART: [ldev] Erasing FE.KEYID = 1
12,807,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,102,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,146,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,108 UART: [ldev] --
15,169,185 UART: [fwproc] Waiting for Commands...
15,171,553 UART: [fwproc] Received command 0x46574c44
15,173,759 UART: [fwproc] Received Image of size 114124 bytes
19,228,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,582 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,667 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,786,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,920,219 >>> mbox cmd response: failed
12,920,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,153 >>> mbox cmd response: failed
12,921,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,714 >>> mbox cmd response: failed
Initializing fuses
2,055,899 writing to cptra_bootfsm_go
5,862,244 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,926,762 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,447 UART:
192,819 UART: Running Caliptra ROM ...
194,010 UART:
603,579 UART: [state] CFI Enabled
618,776 UART: [state] LifecycleState = Unprovisioned
620,680 UART: [state] DebugLocked = No
623,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,720 UART: [kat] SHA2-256
798,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,039 UART: [kat] ++
809,498 UART: [kat] sha1
820,871 UART: [kat] SHA2-256
823,560 UART: [kat] SHA2-384
829,593 UART: [kat] SHA2-512-ACC
831,930 UART: [kat] ECC-384
3,116,520 UART: [kat] HMAC-384Kdf
3,129,187 UART: [kat] LMS
4,319,299 UART: [kat] --
4,322,918 UART: [cold-reset] ++
4,325,013 UART: [fht] Storing FHT @ 0x50003400
4,337,364 UART: [idev] ++
4,337,930 UART: [idev] CDI.KEYID = 6
4,338,912 UART: [idev] SUBJECT.KEYID = 7
4,340,147 UART: [idev] UDS.KEYID = 0
4,343,159 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,741 UART: [idev] Erasing UDS.KEYID = 0
7,630,371 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,839 UART: [idev] --
7,655,846 UART: [ldev] ++
7,656,428 UART: [ldev] CDI.KEYID = 6
7,657,407 UART: [ldev] SUBJECT.KEYID = 5
7,658,627 UART: [ldev] AUTHORITY.KEYID = 7
7,659,860 UART: [ldev] FE.KEYID = 1
7,669,427 UART: [ldev] Erasing FE.KEYID = 1
10,957,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,542 UART: [ldev] --
13,317,674 UART: [fwproc] Waiting for Commands...
13,320,692 UART: [fwproc] Received command 0x46574c44
13,322,877 UART: [fwproc] Received Image of size 114124 bytes
13,425,629 UART: ROM Fatal Error: 0x000B001B
13,429,161 >>> mbox cmd response: failed
13,429,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,429,843 >>> mbox cmd response: failed
13,430,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,430,404 >>> mbox cmd response: failed
Initializing fuses
2,057,751 writing to cptra_bootfsm_go
2,247,065 UART:
2,247,447 UART: Running Caliptra ROM ...
2,248,500 UART:
7,036,030 UART: [state] CFI Enabled
7,050,883 UART: [state] LifecycleState = Unprovisioned
7,052,806 UART: [state] DebugLocked = No
7,054,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,058,996 UART: [kat] SHA2-256
7,228,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,239,294 UART: [kat] ++
7,239,803 UART: [kat] sha1
7,249,943 UART: [kat] SHA2-256
7,252,689 UART: [kat] SHA2-384
7,257,635 UART: [kat] SHA2-512-ACC
7,259,966 UART: [kat] ECC-384
9,545,771 UART: [kat] HMAC-384Kdf
9,556,760 UART: [kat] LMS
10,746,925 UART: [kat] --
10,750,883 UART: [cold-reset] ++
10,752,062 UART: [fht] Storing FHT @ 0x50003400
10,763,280 UART: [idev] ++
10,763,895 UART: [idev] CDI.KEYID = 6
10,764,780 UART: [idev] SUBJECT.KEYID = 7
10,765,989 UART: [idev] UDS.KEYID = 0
10,768,943 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,912,432 UART: [idev] Erasing UDS.KEYID = 0
14,052,139 UART: [idev] Using Sha1 for KeyId Algorithm
14,075,060 UART: [idev] --
14,079,710 UART: [ldev] ++
14,080,334 UART: [ldev] CDI.KEYID = 6
14,081,224 UART: [ldev] SUBJECT.KEYID = 5
14,082,484 UART: [ldev] AUTHORITY.KEYID = 7
14,083,725 UART: [ldev] FE.KEYID = 1
14,093,483 UART: [ldev] Erasing FE.KEYID = 1
17,381,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,672,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,686,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,701,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,716,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,768 UART: [ldev] --
19,740,693 UART: [fwproc] Waiting for Commands...
19,742,477 UART: [fwproc] Received command 0x46574c44
19,744,677 UART: [fwproc] Received Image of size 114124 bytes
23,799,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,876,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,945,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,263,647 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,132,948 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,154,034 >>> mbox cmd response: failed
13,154,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,154,934 >>> mbox cmd response: failed
13,155,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,155,497 >>> mbox cmd response: failed
Initializing fuses
2,062,513 writing to cptra_bootfsm_go
10,834,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,776,081 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,292 UART:
192,645 UART: Running Caliptra ROM ...
193,817 UART:
193,969 UART: [state] CFI Enabled
262,282 UART: [state] LifecycleState = Unprovisioned
264,163 UART: [state] DebugLocked = No
266,734 UART: [state] WD Timer not started. Device not locked for debugging
271,053 UART: [kat] SHA2-256
450,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,777 UART: [kat] ++
462,310 UART: [kat] sha1
473,465 UART: [kat] SHA2-256
476,528 UART: [kat] SHA2-384
482,776 UART: [kat] SHA2-512-ACC
485,771 UART: [kat] ECC-384
2,945,235 UART: [kat] HMAC-384Kdf
2,969,995 UART: [kat] LMS
3,499,449 UART: [kat] --
3,503,697 UART: [cold-reset] ++
3,505,903 UART: [fht] FHT @ 0x50003400
3,516,431 UART: [idev] ++
3,516,998 UART: [idev] CDI.KEYID = 6
3,517,964 UART: [idev] SUBJECT.KEYID = 7
3,519,123 UART: [idev] UDS.KEYID = 0
3,522,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,255 UART: [idev] Erasing UDS.KEYID = 0
6,027,367 UART: [idev] Sha1 KeyId Algorithm
6,049,953 UART: [idev] --
6,053,521 UART: [ldev] ++
6,054,093 UART: [ldev] CDI.KEYID = 6
6,055,014 UART: [ldev] SUBJECT.KEYID = 5
6,056,178 UART: [ldev] AUTHORITY.KEYID = 7
6,057,420 UART: [ldev] FE.KEYID = 1
6,098,462 UART: [ldev] Erasing FE.KEYID = 1
8,598,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,935 UART: [ldev] --
10,388,971 UART: [fwproc] Wait for Commands...
10,391,018 UART: [fwproc] Recv command 0x46574c44
10,393,065 UART: [fwproc] Recv'd Img size: 114448 bytes
10,491,387 UART: ROM Fatal Error: 0x000B001B
10,494,494 >>> mbox cmd response: failed
10,494,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,495,236 >>> mbox cmd response: failed
10,495,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,495,914 >>> mbox cmd response: failed
Initializing fuses
2,055,699 writing to cptra_bootfsm_go
2,245,004 UART:
2,245,358 UART: Running Caliptra ROM ...
2,246,492 UART:
2,246,660 UART: [state] CFI Enabled
2,312,027 UART: [state] LifecycleState = Unprovisioned
2,313,912 UART: [state] DebugLocked = No
2,316,215 UART: [state] WD Timer not started. Device not locked for debugging
2,319,847 UART: [kat] SHA2-256
2,498,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,550 UART: [kat] ++
2,511,092 UART: [kat] sha1
2,521,342 UART: [kat] SHA2-256
2,524,365 UART: [kat] SHA2-384
2,529,526 UART: [kat] SHA2-512-ACC
2,532,497 UART: [kat] ECC-384
5,011,035 UART: [kat] HMAC-384Kdf
5,034,096 UART: [kat] LMS
5,563,545 UART: [kat] --
5,569,622 UART: [cold-reset] ++
5,570,494 UART: [fht] FHT @ 0x50003400
5,581,103 UART: [idev] ++
5,581,672 UART: [idev] CDI.KEYID = 6
5,582,586 UART: [idev] SUBJECT.KEYID = 7
5,583,800 UART: [idev] UDS.KEYID = 0
5,586,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,730,670 UART: [idev] Erasing UDS.KEYID = 0
8,089,808 UART: [idev] Sha1 KeyId Algorithm
8,112,770 UART: [idev] --
8,116,500 UART: [ldev] ++
8,117,071 UART: [ldev] CDI.KEYID = 6
8,118,011 UART: [ldev] SUBJECT.KEYID = 5
8,119,173 UART: [ldev] AUTHORITY.KEYID = 7
8,120,407 UART: [ldev] FE.KEYID = 1
8,160,971 UART: [ldev] Erasing FE.KEYID = 1
10,663,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,323 UART: [ldev] --
12,474,454 UART: [fwproc] Wait for Commands...
12,476,818 UART: [fwproc] Recv command 0x46574c44
12,478,915 UART: [fwproc] Recv'd Img size: 114448 bytes
15,880,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,948,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,017,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,336,645 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,365,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,271 >>> mbox cmd response: failed
10,278,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,279,168 >>> mbox cmd response: failed
10,279,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,279,738 >>> mbox cmd response: failed
Initializing fuses
2,056,100 writing to cptra_bootfsm_go
5,431,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,145,001 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
192,649 UART:
193,032 UART: Running Caliptra ROM ...
194,160 UART:
603,790 UART: [state] CFI Enabled
618,392 UART: [state] LifecycleState = Unprovisioned
620,240 UART: [state] DebugLocked = No
622,862 UART: [state] WD Timer not started. Device not locked for debugging
627,185 UART: [kat] SHA2-256
806,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,906 UART: [kat] ++
818,443 UART: [kat] sha1
829,918 UART: [kat] SHA2-256
832,931 UART: [kat] SHA2-384
837,775 UART: [kat] SHA2-512-ACC
840,709 UART: [kat] ECC-384
3,278,577 UART: [kat] HMAC-384Kdf
3,290,650 UART: [kat] LMS
3,820,101 UART: [kat] --
3,824,636 UART: [cold-reset] ++
3,827,055 UART: [fht] FHT @ 0x50003400
3,838,037 UART: [idev] ++
3,838,608 UART: [idev] CDI.KEYID = 6
3,839,526 UART: [idev] SUBJECT.KEYID = 7
3,840,763 UART: [idev] UDS.KEYID = 0
3,843,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,172 UART: [idev] Erasing UDS.KEYID = 0
6,312,969 UART: [idev] Sha1 KeyId Algorithm
6,336,039 UART: [idev] --
6,339,420 UART: [ldev] ++
6,340,001 UART: [ldev] CDI.KEYID = 6
6,340,919 UART: [ldev] SUBJECT.KEYID = 5
6,342,080 UART: [ldev] AUTHORITY.KEYID = 7
6,343,320 UART: [ldev] FE.KEYID = 1
6,354,077 UART: [ldev] Erasing FE.KEYID = 1
8,825,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,327 UART: [ldev] --
10,618,483 UART: [fwproc] Wait for Commands...
10,621,122 UART: [fwproc] Recv command 0x46574c44
10,623,169 UART: [fwproc] Recv'd Img size: 114448 bytes
10,721,301 UART: ROM Fatal Error: 0x000B001B
10,724,422 >>> mbox cmd response: failed
10,724,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,725,158 >>> mbox cmd response: failed
10,725,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,725,717 >>> mbox cmd response: failed
Initializing fuses
2,052,174 writing to cptra_bootfsm_go
2,241,473 UART:
2,243,339 UART: Running Caliptra ROM ...
2,244,528 UART:
9,733,246 UART: [state] CFI Enabled
9,745,081 UART: [state] LifecycleState = Unprovisioned
9,746,951 UART: [state] DebugLocked = No
9,749,581 UART: [state] WD Timer not started. Device not locked for debugging
9,753,705 UART: [kat] SHA2-256
9,932,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,944,408 UART: [kat] ++
9,944,955 UART: [kat] sha1
9,955,310 UART: [kat] SHA2-256
9,958,331 UART: [kat] SHA2-384
9,964,323 UART: [kat] SHA2-512-ACC
9,967,268 UART: [kat] ECC-384
12,409,498 UART: [kat] HMAC-384Kdf
12,422,969 UART: [kat] LMS
12,952,446 UART: [kat] --
12,955,465 UART: [cold-reset] ++
12,957,612 UART: [fht] FHT @ 0x50003400
12,968,097 UART: [idev] ++
12,968,704 UART: [idev] CDI.KEYID = 6
12,969,619 UART: [idev] SUBJECT.KEYID = 7
12,970,781 UART: [idev] UDS.KEYID = 0
12,973,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,117,277 UART: [idev] Erasing UDS.KEYID = 0
15,446,737 UART: [idev] Sha1 KeyId Algorithm
15,470,504 UART: [idev] --
15,472,932 UART: [ldev] ++
15,473,506 UART: [ldev] CDI.KEYID = 6
15,474,387 UART: [ldev] SUBJECT.KEYID = 5
15,475,602 UART: [ldev] AUTHORITY.KEYID = 7
15,476,758 UART: [ldev] FE.KEYID = 1
15,486,905 UART: [ldev] Erasing FE.KEYID = 1
17,955,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,675,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,691,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,706,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,722,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,742,431 UART: [ldev] --
19,746,347 UART: [fwproc] Wait for Commands...
19,748,336 UART: [fwproc] Recv command 0x46574c44
19,750,432 UART: [fwproc] Recv'd Img size: 114448 bytes
23,152,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,229,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,297,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,615,713 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,700,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,510,418 >>> mbox cmd response: failed
10,511,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,511,370 >>> mbox cmd response: failed
10,511,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,511,954 >>> mbox cmd response: failed
Initializing fuses
2,049,575 writing to cptra_bootfsm_go
13,043,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,625,764 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,212 UART:
192,557 UART: Running Caliptra ROM ...
193,736 UART:
193,883 UART: [state] CFI Enabled
258,717 UART: [state] LifecycleState = Unprovisioned
261,123 UART: [state] DebugLocked = No
262,286 UART: [state] WD Timer not started. Device not locked for debugging
265,770 UART: [kat] SHA2-256
455,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,407 UART: [kat] ++
466,888 UART: [kat] sha1
478,800 UART: [kat] SHA2-256
481,851 UART: [kat] SHA2-384
487,531 UART: [kat] SHA2-512-ACC
490,143 UART: [kat] ECC-384
2,947,101 UART: [kat] HMAC-384Kdf
2,968,191 UART: [kat] LMS
3,499,976 UART: [kat] --
3,505,975 UART: [cold-reset] ++
3,507,155 UART: [fht] FHT @ 0x50003400
3,518,574 UART: [idev] ++
3,519,288 UART: [idev] CDI.KEYID = 6
3,520,206 UART: [idev] SUBJECT.KEYID = 7
3,521,425 UART: [idev] UDS.KEYID = 0
3,524,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,438 UART: [idev] Erasing UDS.KEYID = 0
6,027,195 UART: [idev] Sha1 KeyId Algorithm
6,049,582 UART: [idev] --
6,055,422 UART: [ldev] ++
6,056,125 UART: [ldev] CDI.KEYID = 6
6,057,049 UART: [ldev] SUBJECT.KEYID = 5
6,058,216 UART: [ldev] AUTHORITY.KEYID = 7
6,059,449 UART: [ldev] FE.KEYID = 1
6,097,083 UART: [ldev] Erasing FE.KEYID = 1
8,607,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,431 UART: [ldev] --
10,414,085 UART: [fwproc] Wait for Commands...
10,416,514 UART: [fwproc] Recv command 0x46574c44
10,418,775 UART: [fwproc] Recv'd Img size: 114448 bytes
10,551,876 UART: ROM Fatal Error: 0x000B001B
10,555,564 >>> mbox cmd response: failed
10,556,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,309 >>> mbox cmd response: failed
10,556,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,874 >>> mbox cmd response: failed
Initializing fuses
2,062,503 writing to cptra_bootfsm_go
2,251,784 UART:
2,252,143 UART: Running Caliptra ROM ...
2,253,191 UART:
2,253,343 UART: [state] CFI Enabled
2,313,261 UART: [state] LifecycleState = Unprovisioned
2,315,653 UART: [state] DebugLocked = No
2,318,059 UART: [state] WD Timer not started. Device not locked for debugging
2,322,223 UART: [kat] SHA2-256
2,512,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,885 UART: [kat] ++
2,523,344 UART: [kat] sha1
2,533,698 UART: [kat] SHA2-256
2,536,719 UART: [kat] SHA2-384
2,544,005 UART: [kat] SHA2-512-ACC
2,546,579 UART: [kat] ECC-384
4,996,887 UART: [kat] HMAC-384Kdf
5,020,147 UART: [kat] LMS
5,551,948 UART: [kat] --
5,553,834 UART: [cold-reset] ++
5,555,117 UART: [fht] FHT @ 0x50003400
5,567,390 UART: [idev] ++
5,568,067 UART: [idev] CDI.KEYID = 6
5,569,087 UART: [idev] SUBJECT.KEYID = 7
5,570,214 UART: [idev] UDS.KEYID = 0
5,572,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,716,954 UART: [idev] Erasing UDS.KEYID = 0
8,076,532 UART: [idev] Sha1 KeyId Algorithm
8,099,169 UART: [idev] --
8,104,438 UART: [ldev] ++
8,105,126 UART: [ldev] CDI.KEYID = 6
8,106,248 UART: [ldev] SUBJECT.KEYID = 5
8,107,352 UART: [ldev] AUTHORITY.KEYID = 7
8,108,528 UART: [ldev] FE.KEYID = 1
8,146,833 UART: [ldev] Erasing FE.KEYID = 1
10,656,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,595 UART: [ldev] --
12,461,705 UART: [fwproc] Wait for Commands...
12,464,232 UART: [fwproc] Recv command 0x46574c44
12,466,544 UART: [fwproc] Recv'd Img size: 114448 bytes
15,911,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,105,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,649,033 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,442,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,348,593 >>> mbox cmd response: failed
10,349,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,502 >>> mbox cmd response: failed
10,349,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,350,085 >>> mbox cmd response: failed
Initializing fuses
2,058,307 writing to cptra_bootfsm_go
5,483,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,775,897 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,438 UART:
192,796 UART: Running Caliptra ROM ...
193,900 UART:
603,786 UART: [state] CFI Enabled
616,856 UART: [state] LifecycleState = Unprovisioned
619,224 UART: [state] DebugLocked = No
621,654 UART: [state] WD Timer not started. Device not locked for debugging
626,383 UART: [kat] SHA2-256
816,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,027 UART: [kat] ++
827,561 UART: [kat] sha1
838,550 UART: [kat] SHA2-256
841,564 UART: [kat] SHA2-384
846,249 UART: [kat] SHA2-512-ACC
848,801 UART: [kat] ECC-384
3,287,489 UART: [kat] HMAC-384Kdf
3,301,608 UART: [kat] LMS
3,833,462 UART: [kat] --
3,837,395 UART: [cold-reset] ++
3,839,920 UART: [fht] FHT @ 0x50003400
3,852,139 UART: [idev] ++
3,852,824 UART: [idev] CDI.KEYID = 6
3,853,785 UART: [idev] SUBJECT.KEYID = 7
3,854,998 UART: [idev] UDS.KEYID = 0
3,857,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,758 UART: [idev] Erasing UDS.KEYID = 0
6,328,480 UART: [idev] Sha1 KeyId Algorithm
6,352,561 UART: [idev] --
6,356,911 UART: [ldev] ++
6,357,605 UART: [ldev] CDI.KEYID = 6
6,358,493 UART: [ldev] SUBJECT.KEYID = 5
6,359,603 UART: [ldev] AUTHORITY.KEYID = 7
6,360,807 UART: [ldev] FE.KEYID = 1
6,372,209 UART: [ldev] Erasing FE.KEYID = 1
8,851,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,232 UART: [ldev] --
10,643,440 UART: [fwproc] Wait for Commands...
10,645,645 UART: [fwproc] Recv command 0x46574c44
10,647,985 UART: [fwproc] Recv'd Img size: 114448 bytes
10,777,139 UART: ROM Fatal Error: 0x000B001B
10,780,780 >>> mbox cmd response: failed
10,781,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,781,448 >>> mbox cmd response: failed
10,781,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,782,001 >>> mbox cmd response: failed
Initializing fuses
2,056,592 writing to cptra_bootfsm_go
2,245,859 UART:
2,246,218 UART: Running Caliptra ROM ...
2,247,360 UART:
9,676,624 UART: [state] CFI Enabled
9,689,745 UART: [state] LifecycleState = Unprovisioned
9,692,161 UART: [state] DebugLocked = No
9,693,876 UART: [state] WD Timer not started. Device not locked for debugging
9,699,350 UART: [kat] SHA2-256
9,889,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,900,039 UART: [kat] ++
9,900,537 UART: [kat] sha1
9,912,459 UART: [kat] SHA2-256
9,915,480 UART: [kat] SHA2-384
9,922,173 UART: [kat] SHA2-512-ACC
9,924,795 UART: [kat] ECC-384
12,368,968 UART: [kat] HMAC-384Kdf
12,382,727 UART: [kat] LMS
12,914,576 UART: [kat] --
12,917,987 UART: [cold-reset] ++
12,920,310 UART: [fht] FHT @ 0x50003400
12,932,064 UART: [idev] ++
12,932,751 UART: [idev] CDI.KEYID = 6
12,933,714 UART: [idev] SUBJECT.KEYID = 7
12,934,925 UART: [idev] UDS.KEYID = 0
12,937,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,081,610 UART: [idev] Erasing UDS.KEYID = 0
15,413,828 UART: [idev] Sha1 KeyId Algorithm
15,436,091 UART: [idev] --
15,439,333 UART: [ldev] ++
15,440,015 UART: [ldev] CDI.KEYID = 6
15,441,069 UART: [ldev] SUBJECT.KEYID = 5
15,442,175 UART: [ldev] AUTHORITY.KEYID = 7
15,443,347 UART: [ldev] FE.KEYID = 1
15,454,470 UART: [ldev] Erasing FE.KEYID = 1
17,930,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,648,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,663,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,678,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,693,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,713,425 UART: [ldev] --
19,719,348 UART: [fwproc] Wait for Commands...
19,722,568 UART: [fwproc] Recv command 0x46574c44
19,724,833 UART: [fwproc] Recv'd Img size: 114448 bytes
23,169,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,247,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,363,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,906,384 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,755,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,563,882 >>> mbox cmd response: failed
10,564,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,564,768 >>> mbox cmd response: failed
10,565,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,328 >>> mbox cmd response: failed
Initializing fuses
2,047,917 writing to cptra_bootfsm_go
13,058,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,242,006 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,733 UART: [kat] SHA2-256
881,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,779 UART: [kat] ++
885,931 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,800 UART: [kat] SHA2-512-ACC
896,701 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,246 UART: [idev] ++
1,479,414 UART: [idev] CDI.KEYID = 6
1,479,774 UART: [idev] SUBJECT.KEYID = 7
1,480,198 UART: [idev] UDS.KEYID = 0
1,480,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,576 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,355 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,685 UART: [fwproc] Waiting for Commands...
1,586,458 UART: [fwproc] Received command 0x46574c44
1,587,249 UART: [fwproc] Received Image of size 114448 bytes
1,622,782 UART: ROM Fatal Error: 0x000B001B
1,623,941 >>> mbox cmd response: failed
1,623,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,947 >>> mbox cmd response: failed
1,623,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,504 UART: [kat] LMS
1,475,700 UART: [kat] --
1,476,493 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,818 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,515 UART: [ldev] Erasing FE.KEYID = 1
1,546,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,476 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,736 UART: [fwproc] Received command 0x46574c44
1,587,527 UART: [fwproc] Received Image of size 114448 bytes
2,886,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,179 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,320 >>> mbox cmd response: failed
1,477,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,326 >>> mbox cmd response: failed
1,477,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,883 UART: [kat] SHA2-512-ACC
897,784 UART: [kat] ECC-384
903,383 UART: [kat] HMAC-384Kdf
908,195 UART: [kat] LMS
1,476,391 UART: [kat] --
1,477,192 UART: [cold-reset] ++
1,477,668 UART: [fht] Storing FHT @ 0x50003400
1,480,435 UART: [idev] ++
1,480,603 UART: [idev] CDI.KEYID = 6
1,480,963 UART: [idev] SUBJECT.KEYID = 7
1,481,387 UART: [idev] UDS.KEYID = 0
1,481,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,389 UART: [idev] Erasing UDS.KEYID = 0
1,506,701 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,331 UART: [idev] --
1,516,476 UART: [ldev] ++
1,516,644 UART: [ldev] CDI.KEYID = 6
1,517,007 UART: [ldev] SUBJECT.KEYID = 5
1,517,433 UART: [ldev] AUTHORITY.KEYID = 7
1,517,896 UART: [ldev] FE.KEYID = 1
1,523,196 UART: [ldev] Erasing FE.KEYID = 1
1,548,703 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,851 UART: [ldev] --
1,588,348 UART: [fwproc] Waiting for Commands...
1,588,971 UART: [fwproc] Received command 0x46574c44
1,589,762 UART: [fwproc] Received Image of size 114448 bytes
1,624,243 UART: ROM Fatal Error: 0x000B001B
1,625,402 >>> mbox cmd response: failed
1,625,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,408 >>> mbox cmd response: failed
1,625,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
908,015 UART: [kat] LMS
1,476,211 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,554 UART: [fht] Storing FHT @ 0x50003400
1,480,301 UART: [idev] ++
1,480,469 UART: [idev] CDI.KEYID = 6
1,480,829 UART: [idev] SUBJECT.KEYID = 7
1,481,253 UART: [idev] UDS.KEYID = 0
1,481,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,506,105 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,649 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,200 UART: [ldev] Erasing FE.KEYID = 1
1,548,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,167 UART: [ldev] --
1,587,626 UART: [fwproc] Waiting for Commands...
1,588,325 UART: [fwproc] Received command 0x46574c44
1,589,116 UART: [fwproc] Received Image of size 114448 bytes
2,888,510 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,271 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,655 >>> mbox cmd response: failed
1,477,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,661 >>> mbox cmd response: failed
1,477,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,615 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,750 UART: [kat] HMAC-384Kdf
923,340 UART: [kat] LMS
1,171,668 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,999 UART: [fht] FHT @ 0x50003400
1,175,718 UART: [idev] ++
1,175,886 UART: [idev] CDI.KEYID = 6
1,176,246 UART: [idev] SUBJECT.KEYID = 7
1,176,670 UART: [idev] UDS.KEYID = 0
1,177,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,558 UART: [idev] Erasing UDS.KEYID = 0
1,201,941 UART: [idev] Sha1 KeyId Algorithm
1,210,575 UART: [idev] --
1,211,651 UART: [ldev] ++
1,211,819 UART: [ldev] CDI.KEYID = 6
1,212,182 UART: [ldev] SUBJECT.KEYID = 5
1,212,608 UART: [ldev] AUTHORITY.KEYID = 7
1,213,071 UART: [ldev] FE.KEYID = 1
1,218,065 UART: [ldev] Erasing FE.KEYID = 1
1,244,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,977 UART: [ldev] --
1,283,402 UART: [fwproc] Wait for Commands...
1,284,132 UART: [fwproc] Recv command 0x46574c44
1,284,860 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,365 UART: ROM Fatal Error: 0x000B001B
1,321,524 >>> mbox cmd response: failed
1,321,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,530 >>> mbox cmd response: failed
1,321,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Unprovisioned
86,429 UART: [state] DebugLocked = No
87,149 UART: [state] WD Timer not started. Device not locked for debugging
88,378 UART: [kat] SHA2-256
894,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,153 UART: [kat] ++
898,305 UART: [kat] sha1
902,647 UART: [kat] SHA2-256
904,587 UART: [kat] SHA2-384
907,502 UART: [kat] SHA2-512-ACC
909,403 UART: [kat] ECC-384
919,272 UART: [kat] HMAC-384Kdf
923,982 UART: [kat] LMS
1,172,310 UART: [kat] --
1,173,601 UART: [cold-reset] ++
1,173,981 UART: [fht] FHT @ 0x50003400
1,176,694 UART: [idev] ++
1,176,862 UART: [idev] CDI.KEYID = 6
1,177,222 UART: [idev] SUBJECT.KEYID = 7
1,177,646 UART: [idev] UDS.KEYID = 0
1,177,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,558 UART: [idev] Erasing UDS.KEYID = 0
1,202,475 UART: [idev] Sha1 KeyId Algorithm
1,211,093 UART: [idev] --
1,212,127 UART: [ldev] ++
1,212,295 UART: [ldev] CDI.KEYID = 6
1,212,658 UART: [ldev] SUBJECT.KEYID = 5
1,213,084 UART: [ldev] AUTHORITY.KEYID = 7
1,213,547 UART: [ldev] FE.KEYID = 1
1,218,661 UART: [ldev] Erasing FE.KEYID = 1
1,245,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,051 UART: [ldev] --
1,284,404 UART: [fwproc] Wait for Commands...
1,285,128 UART: [fwproc] Recv command 0x46574c44
1,285,856 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,665 >>> mbox cmd response: failed
1,173,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,671 >>> mbox cmd response: failed
1,173,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
893,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,334 UART: [kat] ++
897,486 UART: [kat] sha1
901,716 UART: [kat] SHA2-256
903,656 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
917,725 UART: [kat] HMAC-384Kdf
922,429 UART: [kat] LMS
1,170,757 UART: [kat] --
1,171,422 UART: [cold-reset] ++
1,171,982 UART: [fht] FHT @ 0x50003400
1,174,683 UART: [idev] ++
1,174,851 UART: [idev] CDI.KEYID = 6
1,175,211 UART: [idev] SUBJECT.KEYID = 7
1,175,635 UART: [idev] UDS.KEYID = 0
1,175,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,200,496 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,209,884 UART: [ldev] ++
1,210,052 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,841 UART: [ldev] AUTHORITY.KEYID = 7
1,211,304 UART: [ldev] FE.KEYID = 1
1,216,496 UART: [ldev] Erasing FE.KEYID = 1
1,242,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,363 UART: [fwproc] Recv command 0x46574c44
1,283,091 UART: [fwproc] Recv'd Img size: 114448 bytes
1,317,800 UART: ROM Fatal Error: 0x000B001B
1,318,959 >>> mbox cmd response: failed
1,318,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,965 >>> mbox cmd response: failed
1,318,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,406 UART: [kat] SHA2-256
904,346 UART: [kat] SHA2-384
907,157 UART: [kat] SHA2-512-ACC
909,058 UART: [kat] ECC-384
919,497 UART: [kat] HMAC-384Kdf
924,155 UART: [kat] LMS
1,172,483 UART: [kat] --
1,173,196 UART: [cold-reset] ++
1,173,690 UART: [fht] FHT @ 0x50003400
1,176,287 UART: [idev] ++
1,176,455 UART: [idev] CDI.KEYID = 6
1,176,815 UART: [idev] SUBJECT.KEYID = 7
1,177,239 UART: [idev] UDS.KEYID = 0
1,177,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,515 UART: [idev] Erasing UDS.KEYID = 0
1,203,060 UART: [idev] Sha1 KeyId Algorithm
1,211,626 UART: [idev] --
1,212,690 UART: [ldev] ++
1,212,858 UART: [ldev] CDI.KEYID = 6
1,213,221 UART: [ldev] SUBJECT.KEYID = 5
1,213,647 UART: [ldev] AUTHORITY.KEYID = 7
1,214,110 UART: [ldev] FE.KEYID = 1
1,219,428 UART: [ldev] Erasing FE.KEYID = 1
1,245,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,702 UART: [ldev] --
1,285,097 UART: [fwproc] Wait for Commands...
1,285,829 UART: [fwproc] Recv command 0x46574c44
1,286,557 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,840 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,654 >>> mbox cmd response: failed
1,175,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,660 >>> mbox cmd response: failed
1,175,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,261 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
890,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,476 UART: [kat] HMAC-384Kdf
919,894 UART: [kat] LMS
1,168,206 UART: [kat] --
1,169,153 UART: [cold-reset] ++
1,169,485 UART: [fht] FHT @ 0x50003400
1,172,219 UART: [idev] ++
1,172,387 UART: [idev] CDI.KEYID = 6
1,172,748 UART: [idev] SUBJECT.KEYID = 7
1,173,173 UART: [idev] UDS.KEYID = 0
1,173,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,237 UART: [idev] Erasing UDS.KEYID = 0
1,198,349 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,182 UART: [ldev] ++
1,208,350 UART: [ldev] CDI.KEYID = 6
1,208,714 UART: [ldev] SUBJECT.KEYID = 5
1,209,141 UART: [ldev] AUTHORITY.KEYID = 7
1,209,604 UART: [ldev] FE.KEYID = 1
1,214,872 UART: [ldev] Erasing FE.KEYID = 1
1,240,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,870 UART: [ldev] --
1,280,244 UART: [fwproc] Wait for Commands...
1,280,867 UART: [fwproc] Recv command 0x46574c44
1,281,600 UART: [fwproc] Recv'd Img size: 114448 bytes
1,315,955 UART: ROM Fatal Error: 0x000B001B
1,317,114 >>> mbox cmd response: failed
1,317,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,120 >>> mbox cmd response: failed
1,317,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,626 UART: [state] LifecycleState = Unprovisioned
85,281 UART: [state] DebugLocked = No
85,951 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
890,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,949 UART: [kat] ++
895,101 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,404 UART: [kat] HMAC-384Kdf
920,062 UART: [kat] LMS
1,168,374 UART: [kat] --
1,169,301 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,421 UART: [idev] ++
1,172,589 UART: [idev] CDI.KEYID = 6
1,172,950 UART: [idev] SUBJECT.KEYID = 7
1,173,375 UART: [idev] UDS.KEYID = 0
1,173,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,429 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,386 UART: [ldev] --
1,281,788 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,729 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,170,989 >>> mbox cmd response: failed
1,170,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,995 >>> mbox cmd response: failed
1,170,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,524 UART: [idev] ++
1,173,692 UART: [idev] CDI.KEYID = 6
1,174,053 UART: [idev] SUBJECT.KEYID = 7
1,174,478 UART: [idev] UDS.KEYID = 0
1,174,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,466 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,531 UART: [ldev] ++
1,210,699 UART: [ldev] CDI.KEYID = 6
1,211,063 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,217,357 UART: [ldev] Erasing FE.KEYID = 1
1,244,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,919 UART: [ldev] --
1,284,413 UART: [fwproc] Wait for Commands...
1,285,006 UART: [fwproc] Recv command 0x46574c44
1,285,739 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,152 UART: ROM Fatal Error: 0x000B001B
1,321,311 >>> mbox cmd response: failed
1,321,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,317 >>> mbox cmd response: failed
1,321,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,303 UART: [kat] SHA2-256
890,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,982 UART: [kat] ++
895,134 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,548 UART: [idev] ++
1,172,716 UART: [idev] CDI.KEYID = 6
1,173,077 UART: [idev] SUBJECT.KEYID = 7
1,173,502 UART: [idev] UDS.KEYID = 0
1,173,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,344 UART: [idev] Erasing UDS.KEYID = 0
1,198,782 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,693 UART: [ldev] ++
1,208,861 UART: [ldev] CDI.KEYID = 6
1,209,225 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,281 UART: [ldev] Erasing FE.KEYID = 1
1,241,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,937 UART: [ldev] --
1,281,273 UART: [fwproc] Wait for Commands...
1,281,870 UART: [fwproc] Recv command 0x46574c44
1,282,603 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,940 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,172,896 >>> mbox cmd response: failed
1,172,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,902 >>> mbox cmd response: failed
1,172,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,846 writing to cptra_bootfsm_go
193,088 UART:
193,451 UART: Running Caliptra ROM ...
194,655 UART:
194,808 UART: [state] CFI Enabled
262,732 UART: [state] LifecycleState = Manufacturing
264,654 UART: [state] DebugLocked = No
267,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,493 UART: [kat] SHA2-256
441,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,736 UART: [kat] ++
452,270 UART: [kat] sha1
461,693 UART: [kat] SHA2-256
464,375 UART: [kat] SHA2-384
470,296 UART: [kat] SHA2-512-ACC
472,633 UART: [kat] ECC-384
2,768,513 UART: [kat] HMAC-384Kdf
2,799,386 UART: [kat] LMS
3,989,700 UART: [kat] --
3,993,893 UART: [cold-reset] ++
3,996,533 UART: [fht] Storing FHT @ 0x50003400
4,008,390 UART: [idev] ++
4,009,006 UART: [idev] CDI.KEYID = 6
4,009,905 UART: [idev] SUBJECT.KEYID = 7
4,011,127 UART: [idev] UDS.KEYID = 0
4,016,650 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,289 UART: [idev] Erasing UDS.KEYID = 0
7,349,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,888 UART: [idev] --
7,376,128 UART: [ldev] ++
7,376,761 UART: [ldev] CDI.KEYID = 6
7,377,678 UART: [ldev] SUBJECT.KEYID = 5
7,378,892 UART: [ldev] AUTHORITY.KEYID = 7
7,380,179 UART: [ldev] FE.KEYID = 1
7,423,632 UART: [ldev] Erasing FE.KEYID = 1
10,757,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,645 UART: [ldev] --
13,120,072 UART: [fwproc] Waiting for Commands...
13,123,314 UART: [fwproc] Received command 0x46574c44
13,125,542 UART: [fwproc] Received Image of size 114124 bytes
13,219,917 UART: ROM Fatal Error: 0x000B0005
13,223,434 >>> mbox cmd response: failed
13,223,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,224,176 >>> mbox cmd response: failed
13,224,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,224,733 >>> mbox cmd response: failed
Initializing fuses
2,059,765 writing to cptra_bootfsm_go
2,249,089 UART:
2,249,438 UART: Running Caliptra ROM ...
2,250,516 UART:
2,250,677 UART: [state] CFI Enabled
2,313,613 UART: [state] LifecycleState = Manufacturing
2,315,556 UART: [state] DebugLocked = No
2,318,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,105 UART: [kat] SHA2-256
2,492,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,288 UART: [kat] ++
2,503,830 UART: [kat] sha1
2,514,995 UART: [kat] SHA2-256
2,517,682 UART: [kat] SHA2-384
2,523,236 UART: [kat] SHA2-512-ACC
2,525,592 UART: [kat] ECC-384
4,818,414 UART: [kat] HMAC-384Kdf
4,850,410 UART: [kat] LMS
6,040,722 UART: [kat] --
6,045,361 UART: [cold-reset] ++
6,047,083 UART: [fht] Storing FHT @ 0x50003400
6,057,818 UART: [idev] ++
6,058,423 UART: [idev] CDI.KEYID = 6
6,059,342 UART: [idev] SUBJECT.KEYID = 7
6,060,575 UART: [idev] UDS.KEYID = 0
6,063,178 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,206,689 UART: [idev] Erasing UDS.KEYID = 0
9,398,413 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,164 UART: [idev] --
9,423,811 UART: [ldev] ++
9,424,395 UART: [ldev] CDI.KEYID = 6
9,425,367 UART: [ldev] SUBJECT.KEYID = 5
9,426,620 UART: [ldev] AUTHORITY.KEYID = 7
9,427,861 UART: [ldev] FE.KEYID = 1
9,473,296 UART: [ldev] Erasing FE.KEYID = 1
12,807,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,120,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,164,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,907 UART: [ldev] --
15,187,968 UART: [fwproc] Waiting for Commands...
15,190,932 UART: [fwproc] Received command 0x46574c44
15,193,122 UART: [fwproc] Received Image of size 114124 bytes
19,270,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,347,205 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,416,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,733,146 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,789,959 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,961,375 >>> mbox cmd response: failed
12,962,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,962,693 >>> mbox cmd response: failed
12,962,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,963,259 >>> mbox cmd response: failed
Initializing fuses
2,060,782 writing to cptra_bootfsm_go
5,863,134 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,992,578 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,513 UART:
192,873 UART: Running Caliptra ROM ...
194,020 UART:
603,824 UART: [state] CFI Enabled
619,000 UART: [state] LifecycleState = Manufacturing
620,890 UART: [state] DebugLocked = No
622,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,845 UART: [kat] SHA2-256
797,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,076 UART: [kat] ++
808,528 UART: [kat] sha1
819,860 UART: [kat] SHA2-256
822,598 UART: [kat] SHA2-384
829,655 UART: [kat] SHA2-512-ACC
831,996 UART: [kat] ECC-384
3,117,109 UART: [kat] HMAC-384Kdf
3,129,404 UART: [kat] LMS
4,319,556 UART: [kat] --
4,325,297 UART: [cold-reset] ++
4,327,887 UART: [fht] Storing FHT @ 0x50003400
4,338,956 UART: [idev] ++
4,339,533 UART: [idev] CDI.KEYID = 6
4,340,478 UART: [idev] SUBJECT.KEYID = 7
4,341,691 UART: [idev] UDS.KEYID = 0
4,347,407 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,491,016 UART: [idev] Erasing UDS.KEYID = 0
7,633,256 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,102 UART: [idev] --
7,657,922 UART: [ldev] ++
7,658,500 UART: [ldev] CDI.KEYID = 6
7,659,467 UART: [ldev] SUBJECT.KEYID = 5
7,660,680 UART: [ldev] AUTHORITY.KEYID = 7
7,661,914 UART: [ldev] FE.KEYID = 1
7,674,278 UART: [ldev] Erasing FE.KEYID = 1
10,962,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,804 UART: [ldev] --
13,322,204 UART: [fwproc] Waiting for Commands...
13,325,492 UART: [fwproc] Received command 0x46574c44
13,327,712 UART: [fwproc] Received Image of size 114124 bytes
13,416,204 UART: ROM Fatal Error: 0x000B0005
13,419,670 >>> mbox cmd response: failed
13,420,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,420,428 >>> mbox cmd response: failed
13,420,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,420,995 >>> mbox cmd response: failed
Initializing fuses
2,051,615 writing to cptra_bootfsm_go
2,240,951 UART:
2,241,308 UART: Running Caliptra ROM ...
2,242,448 UART:
7,048,898 UART: [state] CFI Enabled
7,064,874 UART: [state] LifecycleState = Manufacturing
7,066,800 UART: [state] DebugLocked = No
7,069,005 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,074,187 UART: [kat] SHA2-256
7,243,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,254,533 UART: [kat] ++
7,255,077 UART: [kat] sha1
7,264,580 UART: [kat] SHA2-256
7,267,275 UART: [kat] SHA2-384
7,272,350 UART: [kat] SHA2-512-ACC
7,274,696 UART: [kat] ECC-384
9,558,297 UART: [kat] HMAC-384Kdf
9,568,981 UART: [kat] LMS
10,759,059 UART: [kat] --
10,763,278 UART: [cold-reset] ++
10,765,210 UART: [fht] Storing FHT @ 0x50003400
10,777,067 UART: [idev] ++
10,777,636 UART: [idev] CDI.KEYID = 6
10,778,596 UART: [idev] SUBJECT.KEYID = 7
10,779,861 UART: [idev] UDS.KEYID = 0
10,782,554 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,926,366 UART: [idev] Erasing UDS.KEYID = 0
14,069,103 UART: [idev] Using Sha1 for KeyId Algorithm
14,089,905 UART: [idev] --
14,093,397 UART: [ldev] ++
14,093,977 UART: [ldev] CDI.KEYID = 6
14,094,884 UART: [ldev] SUBJECT.KEYID = 5
14,096,147 UART: [ldev] AUTHORITY.KEYID = 7
14,097,406 UART: [ldev] FE.KEYID = 1
14,108,279 UART: [ldev] Erasing FE.KEYID = 1
17,400,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,692,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,707,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,722,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,566 UART: [ldev] --
19,761,101 UART: [fwproc] Waiting for Commands...
19,764,118 UART: [fwproc] Received command 0x46574c44
19,766,313 UART: [fwproc] Received Image of size 114124 bytes
23,845,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,915,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,984,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,301,474 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,304 writing to cptra_bootfsm_go
4,134,229 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,151,198 >>> mbox cmd response: failed
13,152,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,451 >>> mbox cmd response: failed
13,152,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,153,014 >>> mbox cmd response: failed
Initializing fuses
2,052,903 writing to cptra_bootfsm_go
10,843,454 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,813,654 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,100 UART:
192,454 UART: Running Caliptra ROM ...
193,643 UART:
193,797 UART: [state] CFI Enabled
264,053 UART: [state] LifecycleState = Manufacturing
265,922 UART: [state] DebugLocked = No
268,093 UART: [state] WD Timer not started. Device not locked for debugging
272,641 UART: [kat] SHA2-256
451,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,314 UART: [kat] ++
463,762 UART: [kat] sha1
474,041 UART: [kat] SHA2-256
477,107 UART: [kat] SHA2-384
483,025 UART: [kat] SHA2-512-ACC
485,961 UART: [kat] ECC-384
2,947,090 UART: [kat] HMAC-384Kdf
2,970,269 UART: [kat] LMS
3,499,756 UART: [kat] --
3,505,048 UART: [cold-reset] ++
3,506,765 UART: [fht] FHT @ 0x50003400
3,517,799 UART: [idev] ++
3,518,373 UART: [idev] CDI.KEYID = 6
3,519,292 UART: [idev] SUBJECT.KEYID = 7
3,520,509 UART: [idev] UDS.KEYID = 0
3,523,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,563 UART: [idev] Erasing UDS.KEYID = 0
6,026,384 UART: [idev] Sha1 KeyId Algorithm
6,047,871 UART: [idev] --
6,052,141 UART: [ldev] ++
6,052,712 UART: [ldev] CDI.KEYID = 6
6,053,628 UART: [ldev] SUBJECT.KEYID = 5
6,054,795 UART: [ldev] AUTHORITY.KEYID = 7
6,056,046 UART: [ldev] FE.KEYID = 1
6,100,019 UART: [ldev] Erasing FE.KEYID = 1
8,603,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,378 UART: [ldev] --
10,412,723 UART: [fwproc] Wait for Commands...
10,414,394 UART: [fwproc] Recv command 0x46574c44
10,416,488 UART: [fwproc] Recv'd Img size: 114448 bytes
10,504,139 UART: ROM Fatal Error: 0x000B0005
10,507,286 >>> mbox cmd response: failed
10,507,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,075 >>> mbox cmd response: failed
10,508,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,657 >>> mbox cmd response: failed
Initializing fuses
2,051,894 writing to cptra_bootfsm_go
2,241,241 UART:
2,241,585 UART: Running Caliptra ROM ...
2,242,723 UART:
2,242,889 UART: [state] CFI Enabled
2,303,718 UART: [state] LifecycleState = Manufacturing
2,305,556 UART: [state] DebugLocked = No
2,307,238 UART: [state] WD Timer not started. Device not locked for debugging
2,310,812 UART: [kat] SHA2-256
2,489,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,486 UART: [kat] ++
2,501,954 UART: [kat] sha1
2,513,216 UART: [kat] SHA2-256
2,516,234 UART: [kat] SHA2-384
2,523,139 UART: [kat] SHA2-512-ACC
2,526,094 UART: [kat] ECC-384
4,984,049 UART: [kat] HMAC-384Kdf
5,005,844 UART: [kat] LMS
5,535,301 UART: [kat] --
5,538,268 UART: [cold-reset] ++
5,540,360 UART: [fht] FHT @ 0x50003400
5,551,498 UART: [idev] ++
5,552,069 UART: [idev] CDI.KEYID = 6
5,552,997 UART: [idev] SUBJECT.KEYID = 7
5,554,154 UART: [idev] UDS.KEYID = 0
5,556,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,700,885 UART: [idev] Erasing UDS.KEYID = 0
8,059,240 UART: [idev] Sha1 KeyId Algorithm
8,082,259 UART: [idev] --
8,086,505 UART: [ldev] ++
8,087,089 UART: [ldev] CDI.KEYID = 6
8,088,005 UART: [ldev] SUBJECT.KEYID = 5
8,089,175 UART: [ldev] AUTHORITY.KEYID = 7
8,090,412 UART: [ldev] FE.KEYID = 1
8,132,765 UART: [ldev] Erasing FE.KEYID = 1
10,638,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,373,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,421,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,580 UART: [ldev] --
12,445,705 UART: [fwproc] Wait for Commands...
12,448,034 UART: [fwproc] Recv command 0x46574c44
12,450,085 UART: [fwproc] Recv'd Img size: 114448 bytes
15,886,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,957,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,026,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,344,055 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,383,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,309,914 >>> mbox cmd response: failed
10,310,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,310,886 >>> mbox cmd response: failed
10,311,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,311,398 >>> mbox cmd response: failed
Initializing fuses
2,049,406 writing to cptra_bootfsm_go
5,416,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,139,495 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
192,705 UART:
193,076 UART: Running Caliptra ROM ...
194,166 UART:
603,859 UART: [state] CFI Enabled
618,617 UART: [state] LifecycleState = Manufacturing
620,500 UART: [state] DebugLocked = No
622,147 UART: [state] WD Timer not started. Device not locked for debugging
626,439 UART: [kat] SHA2-256
805,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,127 UART: [kat] ++
817,593 UART: [kat] sha1
827,876 UART: [kat] SHA2-256
830,940 UART: [kat] SHA2-384
836,059 UART: [kat] SHA2-512-ACC
838,999 UART: [kat] ECC-384
3,283,298 UART: [kat] HMAC-384Kdf
3,295,580 UART: [kat] LMS
3,825,085 UART: [kat] --
3,830,428 UART: [cold-reset] ++
3,831,283 UART: [fht] FHT @ 0x50003400
3,842,753 UART: [idev] ++
3,843,319 UART: [idev] CDI.KEYID = 6
3,844,254 UART: [idev] SUBJECT.KEYID = 7
3,845,467 UART: [idev] UDS.KEYID = 0
3,848,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,148 UART: [idev] Erasing UDS.KEYID = 0
6,316,749 UART: [idev] Sha1 KeyId Algorithm
6,340,905 UART: [idev] --
6,343,718 UART: [ldev] ++
6,344,290 UART: [ldev] CDI.KEYID = 6
6,345,203 UART: [ldev] SUBJECT.KEYID = 5
6,346,416 UART: [ldev] AUTHORITY.KEYID = 7
6,347,648 UART: [ldev] FE.KEYID = 1
6,359,537 UART: [ldev] Erasing FE.KEYID = 1
8,830,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,329 UART: [ldev] --
10,618,402 UART: [fwproc] Wait for Commands...
10,620,447 UART: [fwproc] Recv command 0x46574c44
10,622,564 UART: [fwproc] Recv'd Img size: 114448 bytes
10,712,960 UART: ROM Fatal Error: 0x000B0005
10,716,061 >>> mbox cmd response: failed
10,716,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,716,856 >>> mbox cmd response: failed
10,717,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,717,425 >>> mbox cmd response: failed
Initializing fuses
2,051,383 writing to cptra_bootfsm_go
2,240,666 UART:
2,241,009 UART: Running Caliptra ROM ...
2,242,059 UART:
9,740,465 UART: [state] CFI Enabled
9,755,642 UART: [state] LifecycleState = Manufacturing
9,757,527 UART: [state] DebugLocked = No
9,760,460 UART: [state] WD Timer not started. Device not locked for debugging
9,764,374 UART: [kat] SHA2-256
9,943,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,955,054 UART: [kat] ++
9,955,513 UART: [kat] sha1
9,967,369 UART: [kat] SHA2-256
9,970,381 UART: [kat] SHA2-384
9,976,584 UART: [kat] SHA2-512-ACC
9,979,529 UART: [kat] ECC-384
12,418,833 UART: [kat] HMAC-384Kdf
12,431,927 UART: [kat] LMS
12,961,427 UART: [kat] --
12,966,382 UART: [cold-reset] ++
12,968,813 UART: [fht] FHT @ 0x50003400
12,979,951 UART: [idev] ++
12,980,514 UART: [idev] CDI.KEYID = 6
12,981,449 UART: [idev] SUBJECT.KEYID = 7
12,982,659 UART: [idev] UDS.KEYID = 0
12,985,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,129,259 UART: [idev] Erasing UDS.KEYID = 0
15,452,884 UART: [idev] Sha1 KeyId Algorithm
15,475,083 UART: [idev] --
15,480,648 UART: [ldev] ++
15,481,218 UART: [ldev] CDI.KEYID = 6
15,482,093 UART: [ldev] SUBJECT.KEYID = 5
15,483,308 UART: [ldev] AUTHORITY.KEYID = 7
15,484,543 UART: [ldev] FE.KEYID = 1
15,495,646 UART: [ldev] Erasing FE.KEYID = 1
17,969,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,687,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,703,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,719,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,734,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,754,732 UART: [ldev] --
19,758,980 UART: [fwproc] Wait for Commands...
19,761,348 UART: [fwproc] Recv command 0x46574c44
19,763,445 UART: [fwproc] Recv'd Img size: 114448 bytes
23,204,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,272,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,341,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,659,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,699,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,506,034 >>> mbox cmd response: failed
10,506,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,042 >>> mbox cmd response: failed
10,507,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,667 >>> mbox cmd response: failed
Initializing fuses
2,051,090 writing to cptra_bootfsm_go
13,059,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,671,093 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,176 UART:
192,547 UART: Running Caliptra ROM ...
193,647 UART:
193,790 UART: [state] CFI Enabled
260,904 UART: [state] LifecycleState = Manufacturing
263,289 UART: [state] DebugLocked = No
264,478 UART: [state] WD Timer not started. Device not locked for debugging
268,969 UART: [kat] SHA2-256
458,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,570 UART: [kat] ++
470,019 UART: [kat] sha1
482,524 UART: [kat] SHA2-256
485,537 UART: [kat] SHA2-384
491,302 UART: [kat] SHA2-512-ACC
493,858 UART: [kat] ECC-384
2,948,024 UART: [kat] HMAC-384Kdf
2,970,205 UART: [kat] LMS
3,501,917 UART: [kat] --
3,508,584 UART: [cold-reset] ++
3,510,900 UART: [fht] FHT @ 0x50003400
3,522,688 UART: [idev] ++
3,523,364 UART: [idev] CDI.KEYID = 6
3,524,334 UART: [idev] SUBJECT.KEYID = 7
3,525,542 UART: [idev] UDS.KEYID = 0
3,531,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,675,366 UART: [idev] Erasing UDS.KEYID = 0
6,029,308 UART: [idev] Sha1 KeyId Algorithm
6,051,443 UART: [idev] --
6,055,543 UART: [ldev] ++
6,056,242 UART: [ldev] CDI.KEYID = 6
6,057,190 UART: [ldev] SUBJECT.KEYID = 5
6,058,299 UART: [ldev] AUTHORITY.KEYID = 7
6,059,538 UART: [ldev] FE.KEYID = 1
6,098,057 UART: [ldev] Erasing FE.KEYID = 1
8,606,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,443 UART: [ldev] --
10,411,191 UART: [fwproc] Wait for Commands...
10,413,456 UART: [fwproc] Recv command 0x46574c44
10,415,716 UART: [fwproc] Recv'd Img size: 114448 bytes
10,538,124 UART: ROM Fatal Error: 0x000B0005
10,541,757 >>> mbox cmd response: failed
10,542,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,565 >>> mbox cmd response: failed
10,542,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,130 >>> mbox cmd response: failed
Initializing fuses
2,056,434 writing to cptra_bootfsm_go
2,245,743 UART:
2,246,088 UART: Running Caliptra ROM ...
2,247,232 UART:
2,247,400 UART: [state] CFI Enabled
2,302,701 UART: [state] LifecycleState = Manufacturing
2,305,073 UART: [state] DebugLocked = No
2,306,900 UART: [state] WD Timer not started. Device not locked for debugging
2,311,779 UART: [kat] SHA2-256
2,501,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,427 UART: [kat] ++
2,512,925 UART: [kat] sha1
2,524,334 UART: [kat] SHA2-256
2,527,357 UART: [kat] SHA2-384
2,533,671 UART: [kat] SHA2-512-ACC
2,536,295 UART: [kat] ECC-384
4,989,361 UART: [kat] HMAC-384Kdf
5,013,261 UART: [kat] LMS
5,545,049 UART: [kat] --
5,551,687 UART: [cold-reset] ++
5,553,461 UART: [fht] FHT @ 0x50003400
5,565,326 UART: [idev] ++
5,566,002 UART: [idev] CDI.KEYID = 6
5,567,027 UART: [idev] SUBJECT.KEYID = 7
5,568,191 UART: [idev] UDS.KEYID = 0
5,570,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,777 UART: [idev] Erasing UDS.KEYID = 0
8,071,268 UART: [idev] Sha1 KeyId Algorithm
8,092,782 UART: [idev] --
8,097,707 UART: [ldev] ++
8,098,393 UART: [ldev] CDI.KEYID = 6
8,099,303 UART: [ldev] SUBJECT.KEYID = 5
8,100,468 UART: [ldev] AUTHORITY.KEYID = 7
8,101,706 UART: [ldev] FE.KEYID = 1
8,142,209 UART: [ldev] Erasing FE.KEYID = 1
10,650,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,068 UART: [ldev] --
12,455,226 UART: [fwproc] Wait for Commands...
12,457,707 UART: [fwproc] Recv command 0x46574c44
12,460,018 UART: [fwproc] Recv'd Img size: 114448 bytes
15,936,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,018,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,134,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,677,688 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,457,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,359,707 >>> mbox cmd response: failed
10,360,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,360,608 >>> mbox cmd response: failed
10,360,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,361,203 >>> mbox cmd response: failed
Initializing fuses
2,051,636 writing to cptra_bootfsm_go
5,488,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,836,750 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,266 writing to cptra_bootfsm_go
193,645 UART:
194,007 UART: Running Caliptra ROM ...
195,112 UART:
604,689 UART: [state] CFI Enabled
615,381 UART: [state] LifecycleState = Manufacturing
617,736 UART: [state] DebugLocked = No
619,978 UART: [state] WD Timer not started. Device not locked for debugging
625,288 UART: [kat] SHA2-256
815,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,921 UART: [kat] ++
826,459 UART: [kat] sha1
838,313 UART: [kat] SHA2-256
841,324 UART: [kat] SHA2-384
848,002 UART: [kat] SHA2-512-ACC
850,569 UART: [kat] ECC-384
3,291,964 UART: [kat] HMAC-384Kdf
3,304,361 UART: [kat] LMS
3,836,158 UART: [kat] --
3,840,774 UART: [cold-reset] ++
3,843,226 UART: [fht] FHT @ 0x50003400
3,855,080 UART: [idev] ++
3,855,815 UART: [idev] CDI.KEYID = 6
3,856,723 UART: [idev] SUBJECT.KEYID = 7
3,857,953 UART: [idev] UDS.KEYID = 0
3,863,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,007,344 UART: [idev] Erasing UDS.KEYID = 0
6,330,045 UART: [idev] Sha1 KeyId Algorithm
6,351,401 UART: [idev] --
6,356,320 UART: [ldev] ++
6,357,006 UART: [ldev] CDI.KEYID = 6
6,357,923 UART: [ldev] SUBJECT.KEYID = 5
6,359,137 UART: [ldev] AUTHORITY.KEYID = 7
6,360,319 UART: [ldev] FE.KEYID = 1
6,370,857 UART: [ldev] Erasing FE.KEYID = 1
8,853,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,880 UART: [ldev] --
10,644,644 UART: [fwproc] Wait for Commands...
10,646,563 UART: [fwproc] Recv command 0x46574c44
10,648,830 UART: [fwproc] Recv'd Img size: 114448 bytes
10,772,210 UART: ROM Fatal Error: 0x000B0005
10,775,884 >>> mbox cmd response: failed
10,776,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,776,526 >>> mbox cmd response: failed
10,776,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,777,092 >>> mbox cmd response: failed
Initializing fuses
2,054,616 writing to cptra_bootfsm_go
2,243,942 UART:
2,244,275 UART: Running Caliptra ROM ...
2,245,412 UART:
9,691,633 UART: [state] CFI Enabled
9,706,884 UART: [state] LifecycleState = Manufacturing
9,709,268 UART: [state] DebugLocked = No
9,712,147 UART: [state] WD Timer not started. Device not locked for debugging
9,717,082 UART: [kat] SHA2-256
9,906,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,917,772 UART: [kat] ++
9,918,287 UART: [kat] sha1
9,929,873 UART: [kat] SHA2-256
9,932,857 UART: [kat] SHA2-384
9,938,741 UART: [kat] SHA2-512-ACC
9,941,363 UART: [kat] ECC-384
12,382,921 UART: [kat] HMAC-384Kdf
12,395,903 UART: [kat] LMS
12,927,727 UART: [kat] --
12,931,043 UART: [cold-reset] ++
12,933,304 UART: [fht] FHT @ 0x50003400
12,945,091 UART: [idev] ++
12,945,771 UART: [idev] CDI.KEYID = 6
12,946,782 UART: [idev] SUBJECT.KEYID = 7
12,947,883 UART: [idev] UDS.KEYID = 0
12,950,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,094,540 UART: [idev] Erasing UDS.KEYID = 0
15,423,992 UART: [idev] Sha1 KeyId Algorithm
15,446,431 UART: [idev] --
15,450,987 UART: [ldev] ++
15,451,667 UART: [ldev] CDI.KEYID = 6
15,452,684 UART: [ldev] SUBJECT.KEYID = 5
15,453,786 UART: [ldev] AUTHORITY.KEYID = 7
15,455,014 UART: [ldev] FE.KEYID = 1
15,468,422 UART: [ldev] Erasing FE.KEYID = 1
17,948,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,666,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,682,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,697,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,712,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,733,837 UART: [ldev] --
19,739,377 UART: [fwproc] Wait for Commands...
19,741,039 UART: [fwproc] Recv command 0x46574c44
19,743,306 UART: [fwproc] Recv'd Img size: 114448 bytes
23,229,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,311,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,427,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,970,171 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,762,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,566,093 >>> mbox cmd response: failed
10,566,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,063 >>> mbox cmd response: failed
10,567,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,626 >>> mbox cmd response: failed
Initializing fuses
2,059,056 writing to cptra_bootfsm_go
13,061,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,311,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Manufacturing
85,849 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,382 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,907 UART: [fht] Storing FHT @ 0x50003400
1,479,548 UART: [idev] ++
1,479,716 UART: [idev] CDI.KEYID = 6
1,480,076 UART: [idev] SUBJECT.KEYID = 7
1,480,500 UART: [idev] UDS.KEYID = 0
1,480,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,477 UART: [ldev] ++
1,514,645 UART: [ldev] CDI.KEYID = 6
1,515,008 UART: [ldev] SUBJECT.KEYID = 5
1,515,434 UART: [ldev] AUTHORITY.KEYID = 7
1,515,897 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,682 UART: [ldev] --
1,586,189 UART: [fwproc] Waiting for Commands...
1,586,864 UART: [fwproc] Received command 0x46574c44
1,587,655 UART: [fwproc] Received Image of size 114448 bytes
1,632,088 UART: ROM Fatal Error: 0x000B0005
1,633,245 >>> mbox cmd response: failed
1,633,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,251 >>> mbox cmd response: failed
1,633,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,342 UART: [kat] LMS
1,475,538 UART: [kat] --
1,476,491 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,100 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,496 UART: [idev] --
1,515,667 UART: [ldev] ++
1,515,835 UART: [ldev] CDI.KEYID = 6
1,516,198 UART: [ldev] SUBJECT.KEYID = 5
1,516,624 UART: [ldev] AUTHORITY.KEYID = 7
1,517,087 UART: [ldev] FE.KEYID = 1
1,522,535 UART: [ldev] Erasing FE.KEYID = 1
1,547,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,976 UART: [ldev] --
1,587,265 UART: [fwproc] Waiting for Commands...
1,587,964 UART: [fwproc] Received command 0x46574c44
1,588,755 UART: [fwproc] Received Image of size 114448 bytes
2,887,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,222 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,824 >>> mbox cmd response: failed
1,485,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,830 >>> mbox cmd response: failed
1,485,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,778 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,053 UART: [state] LifecycleState = Manufacturing
86,708 UART: [state] DebugLocked = No
87,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,762 UART: [kat] SHA2-256
882,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,808 UART: [kat] ++
886,960 UART: [kat] sha1
891,200 UART: [kat] SHA2-256
893,138 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
908,017 UART: [kat] LMS
1,476,213 UART: [kat] --
1,477,056 UART: [cold-reset] ++
1,477,566 UART: [fht] Storing FHT @ 0x50003400
1,480,257 UART: [idev] ++
1,480,425 UART: [idev] CDI.KEYID = 6
1,480,785 UART: [idev] SUBJECT.KEYID = 7
1,481,209 UART: [idev] UDS.KEYID = 0
1,481,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,387 UART: [idev] Erasing UDS.KEYID = 0
1,506,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,735 UART: [idev] --
1,515,804 UART: [ldev] ++
1,515,972 UART: [ldev] CDI.KEYID = 6
1,516,335 UART: [ldev] SUBJECT.KEYID = 5
1,516,761 UART: [ldev] AUTHORITY.KEYID = 7
1,517,224 UART: [ldev] FE.KEYID = 1
1,522,514 UART: [ldev] Erasing FE.KEYID = 1
1,548,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,529 UART: [ldev] --
1,588,002 UART: [fwproc] Waiting for Commands...
1,588,773 UART: [fwproc] Received command 0x46574c44
1,589,564 UART: [fwproc] Received Image of size 114448 bytes
1,635,303 UART: ROM Fatal Error: 0x000B0005
1,636,460 >>> mbox cmd response: failed
1,636,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,466 >>> mbox cmd response: failed
1,636,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,753 UART: [idev] Erasing UDS.KEYID = 0
1,505,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,605 UART: [idev] --
1,515,746 UART: [ldev] ++
1,515,914 UART: [ldev] CDI.KEYID = 6
1,516,277 UART: [ldev] SUBJECT.KEYID = 5
1,516,703 UART: [ldev] AUTHORITY.KEYID = 7
1,517,166 UART: [ldev] FE.KEYID = 1
1,522,470 UART: [ldev] Erasing FE.KEYID = 1
1,547,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,017 UART: [ldev] --
1,587,280 UART: [fwproc] Waiting for Commands...
1,587,899 UART: [fwproc] Received command 0x46574c44
1,588,690 UART: [fwproc] Received Image of size 114448 bytes
2,888,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,029 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,687 >>> mbox cmd response: failed
1,486,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,693 >>> mbox cmd response: failed
1,486,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,961 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Manufacturing
85,849 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,827 UART: [kat] SHA2-256
903,767 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,318 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,599 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,592 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,657 UART: [ldev] --
1,283,130 UART: [fwproc] Wait for Commands...
1,283,832 UART: [fwproc] Recv command 0x46574c44
1,284,560 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,749 UART: ROM Fatal Error: 0x000B0005
1,330,906 >>> mbox cmd response: failed
1,330,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,912 >>> mbox cmd response: failed
1,330,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,654 UART: [kat] HMAC-384Kdf
923,154 UART: [kat] LMS
1,171,482 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,777 UART: [fht] FHT @ 0x50003400
1,175,274 UART: [idev] ++
1,175,442 UART: [idev] CDI.KEYID = 6
1,175,802 UART: [idev] SUBJECT.KEYID = 7
1,176,226 UART: [idev] UDS.KEYID = 0
1,176,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,230 UART: [idev] Erasing UDS.KEYID = 0
1,200,963 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,589 UART: [ldev] ++
1,210,757 UART: [ldev] CDI.KEYID = 6
1,211,120 UART: [ldev] SUBJECT.KEYID = 5
1,211,546 UART: [ldev] AUTHORITY.KEYID = 7
1,212,009 UART: [ldev] FE.KEYID = 1
1,217,209 UART: [ldev] Erasing FE.KEYID = 1
1,244,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,073 UART: [ldev] --
1,283,576 UART: [fwproc] Wait for Commands...
1,284,170 UART: [fwproc] Recv command 0x46574c44
1,284,898 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,475 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,685 >>> mbox cmd response: failed
1,184,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,691 >>> mbox cmd response: failed
1,184,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,826 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Manufacturing
86,314 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
893,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,878 UART: [kat] ++
898,030 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
907,157 UART: [kat] SHA2-512-ACC
909,058 UART: [kat] ECC-384
918,921 UART: [kat] HMAC-384Kdf
923,417 UART: [kat] LMS
1,171,745 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,076 UART: [fht] FHT @ 0x50003400
1,175,683 UART: [idev] ++
1,175,851 UART: [idev] CDI.KEYID = 6
1,176,211 UART: [idev] SUBJECT.KEYID = 7
1,176,635 UART: [idev] UDS.KEYID = 0
1,176,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,930 UART: [idev] Sha1 KeyId Algorithm
1,210,326 UART: [idev] --
1,211,250 UART: [ldev] ++
1,211,418 UART: [ldev] CDI.KEYID = 6
1,211,781 UART: [ldev] SUBJECT.KEYID = 5
1,212,207 UART: [ldev] AUTHORITY.KEYID = 7
1,212,670 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,244,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,101 UART: [fwproc] Wait for Commands...
1,283,791 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,964 UART: ROM Fatal Error: 0x000B0005
1,330,121 >>> mbox cmd response: failed
1,330,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,127 >>> mbox cmd response: failed
1,330,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
893,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,772 UART: [kat] ++
897,924 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,547 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,455 UART: [idev] ++
1,175,623 UART: [idev] CDI.KEYID = 6
1,175,983 UART: [idev] SUBJECT.KEYID = 7
1,176,407 UART: [idev] UDS.KEYID = 0
1,176,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,211,078 UART: [idev] --
1,211,990 UART: [ldev] ++
1,212,158 UART: [ldev] CDI.KEYID = 6
1,212,521 UART: [ldev] SUBJECT.KEYID = 5
1,212,947 UART: [ldev] AUTHORITY.KEYID = 7
1,213,410 UART: [ldev] FE.KEYID = 1
1,218,746 UART: [ldev] Erasing FE.KEYID = 1
1,245,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,210 UART: [ldev] --
1,284,625 UART: [fwproc] Wait for Commands...
1,285,359 UART: [fwproc] Recv command 0x46574c44
1,286,087 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,160 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,278 >>> mbox cmd response: failed
1,185,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,284 >>> mbox cmd response: failed
1,185,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,125 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Manufacturing
85,793 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,174,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,166 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,079 UART: ROM Fatal Error: 0x000B0005
1,328,236 >>> mbox cmd response: failed
1,328,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,242 >>> mbox cmd response: failed
1,328,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,908 UART: [ldev] Erasing FE.KEYID = 1
1,242,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,100 UART: [ldev] --
1,281,536 UART: [fwproc] Wait for Commands...
1,282,269 UART: [fwproc] Recv command 0x46574c44
1,283,002 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,319 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,661 >>> mbox cmd response: failed
1,179,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,667 >>> mbox cmd response: failed
1,179,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Manufacturing
85,984 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,198,598 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,559 UART: [ldev] ++
1,208,727 UART: [ldev] CDI.KEYID = 6
1,209,091 UART: [ldev] SUBJECT.KEYID = 5
1,209,518 UART: [ldev] AUTHORITY.KEYID = 7
1,209,981 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,516 UART: [fwproc] Recv command 0x46574c44
1,283,249 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,554 UART: ROM Fatal Error: 0x000B0005
1,328,711 >>> mbox cmd response: failed
1,328,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,717 >>> mbox cmd response: failed
1,328,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,356 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,174,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,534 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,378 >>> mbox cmd response: failed
1,181,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,384 >>> mbox cmd response: failed
1,181,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,274 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,543 UART:
191,930 UART: Running Caliptra ROM ...
193,084 UART:
193,241 UART: [state] CFI Enabled
264,794 UART: [state] LifecycleState = Unprovisioned
266,753 UART: [state] DebugLocked = Yes
269,252 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,213 UART: [kat] SHA2-256
443,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,435 UART: [kat] ++
454,983 UART: [kat] sha1
467,324 UART: [kat] SHA2-256
470,006 UART: [kat] SHA2-384
476,860 UART: [kat] SHA2-512-ACC
479,249 UART: [kat] ECC-384
2,763,906 UART: [kat] HMAC-384Kdf
2,795,477 UART: [kat] LMS
3,985,779 UART: [kat] --
3,990,732 UART: [cold-reset] ++
3,992,563 UART: [fht] Storing FHT @ 0x50003400
4,004,374 UART: [idev] ++
4,004,972 UART: [idev] CDI.KEYID = 6
4,005,867 UART: [idev] SUBJECT.KEYID = 7
4,007,143 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,288 UART:
192,977 UART: Running Caliptra ROM ...
194,147 UART:
194,291 UART: [state] CFI Enabled
271,249 UART: [state] LifecycleState = Manufacturing
273,211 UART: [state] DebugLocked = Yes
275,770 UART: [state] Starting the Watchdog Timer 40000000 cycles
280,842 UART: [kat] SHA2-256
450,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
461,038 UART: [kat] ++
461,563 UART: [kat] sha1
472,603 UART: [kat] SHA2-256
475,291 UART: [kat] SHA2-384
481,392 UART: [kat] SHA2-512-ACC
483,787 UART: [kat] ECC-384
2,773,569 UART: [kat] HMAC-384Kdf
2,805,015 UART: [kat] LMS
3,995,316 UART: [kat] --
4,000,408 UART: [cold-reset] ++
4,001,543 UART: [fht] Storing FHT @ 0x50003400
4,013,738 UART: [idev] ++
4,014,326 UART: [idev] CDI.KEYID = 6
4,015,239 UART: [idev] SUBJECT.KEYID = 7
4,016,455 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
191,592 UART:
191,959 UART: Running Caliptra ROM ...
193,132 UART:
193,282 UART: [state] CFI Enabled
259,398 UART: [state] LifecycleState = Unknown
261,071 UART: [state] DebugLocked = Yes
262,815 UART: [state] Starting the Watchdog Timer 40000000 cycles
268,901 UART: [kat] SHA2-256
438,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,165 UART: [kat] ++
449,634 UART: [kat] sha1
459,981 UART: [kat] SHA2-256
462,675 UART: [kat] SHA2-384
469,935 UART: [kat] SHA2-512-ACC
472,281 UART: [kat] ECC-384
2,766,332 UART: [kat] HMAC-384Kdf
2,799,004 UART: [kat] LMS
3,989,335 UART: [kat] --
3,994,640 UART: [cold-reset] ++
3,995,605 UART: [fht] Storing FHT @ 0x50003400
4,007,195 UART: [idev] ++
4,007,774 UART: [idev] CDI.KEYID = 6
4,008,744 UART: [idev] SUBJECT.KEYID = 7
4,009,963 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
191,699 UART:
192,558 UART: Running Caliptra ROM ...
193,749 UART:
193,894 UART: [state] CFI Enabled
265,988 UART: [state] LifecycleState = Production
267,809 UART: [state] DebugLocked = Yes
270,804 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,291 UART: [kat] SHA2-256
444,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,487 UART: [kat] ++
456,004 UART: [kat] sha1
467,607 UART: [kat] SHA2-256
470,300 UART: [kat] SHA2-384
476,223 UART: [kat] SHA2-512-ACC
478,619 UART: [kat] ECC-384
2,771,381 UART: [kat] HMAC-384Kdf
2,802,960 UART: [kat] LMS
3,993,280 UART: [kat] --
3,995,966 UART: [cold-reset] ++
3,997,044 UART: [fht] Storing FHT @ 0x50003400
4,008,957 UART: [idev] ++
4,009,529 UART: [idev] CDI.KEYID = 6
4,010,499 UART: [idev] SUBJECT.KEYID = 7
4,011,715 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,149 UART:
193,047 UART: Running Caliptra ROM ...
194,236 UART:
194,384 UART: [state] CFI Enabled
266,654 UART: [state] LifecycleState = Unprovisioned
268,612 UART: [state] DebugLocked = No
271,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,711 UART: [kat] SHA2-256
446,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,923 UART: [kat] ++
457,403 UART: [kat] sha1
467,959 UART: [kat] SHA2-256
470,639 UART: [kat] SHA2-384
476,723 UART: [kat] SHA2-512-ACC
479,120 UART: [kat] ECC-384
2,771,196 UART: [kat] HMAC-384Kdf
2,801,568 UART: [kat] LMS
3,991,845 UART: [kat] --
3,995,875 UART: [cold-reset] ++
3,998,138 UART: [fht] Storing FHT @ 0x50003400
4,010,650 UART: [idev] ++
4,011,228 UART: [idev] CDI.KEYID = 6
4,012,147 UART: [idev] SUBJECT.KEYID = 7
4,013,367 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,293 UART:
192,665 UART: Running Caliptra ROM ...
193,865 UART:
194,041 UART: [state] CFI Enabled
259,116 UART: [state] LifecycleState = Manufacturing
261,023 UART: [state] DebugLocked = No
262,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,725 UART: [kat] SHA2-256
436,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,926 UART: [kat] ++
447,516 UART: [kat] sha1
458,506 UART: [kat] SHA2-256
461,192 UART: [kat] SHA2-384
467,535 UART: [kat] SHA2-512-ACC
469,899 UART: [kat] ECC-384
2,765,483 UART: [kat] HMAC-384Kdf
2,795,756 UART: [kat] LMS
3,986,036 UART: [kat] --
3,991,482 UART: [cold-reset] ++
3,993,729 UART: [fht] Storing FHT @ 0x50003400
4,005,002 UART: [idev] ++
4,005,588 UART: [idev] CDI.KEYID = 6
4,006,564 UART: [idev] SUBJECT.KEYID = 7
4,007,724 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
192,300 UART:
192,664 UART: Running Caliptra ROM ...
193,855 UART:
194,009 UART: [state] CFI Enabled
258,624 UART: [state] LifecycleState = Unknown
260,309 UART: [state] DebugLocked = No
262,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,009 UART: [kat] SHA2-256
437,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,224 UART: [kat] ++
448,691 UART: [kat] sha1
458,757 UART: [kat] SHA2-256
461,448 UART: [kat] SHA2-384
467,264 UART: [kat] SHA2-512-ACC
469,601 UART: [kat] ECC-384
2,765,668 UART: [kat] HMAC-384Kdf
2,798,337 UART: [kat] LMS
3,988,636 UART: [kat] --
3,993,330 UART: [cold-reset] ++
3,994,344 UART: [fht] Storing FHT @ 0x50003400
4,004,856 UART: [idev] ++
4,005,464 UART: [idev] CDI.KEYID = 6
4,006,391 UART: [idev] SUBJECT.KEYID = 7
4,007,667 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,150 UART:
192,524 UART: Running Caliptra ROM ...
193,715 UART:
193,866 UART: [state] CFI Enabled
265,076 UART: [state] LifecycleState = Production
266,935 UART: [state] DebugLocked = No
269,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,035 UART: [kat] SHA2-256
443,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,263 UART: [kat] ++
454,739 UART: [kat] sha1
464,046 UART: [kat] SHA2-256
466,731 UART: [kat] SHA2-384
471,463 UART: [kat] SHA2-512-ACC
473,854 UART: [kat] ECC-384
2,765,128 UART: [kat] HMAC-384Kdf
2,798,570 UART: [kat] LMS
3,988,898 UART: [kat] --
3,993,753 UART: [cold-reset] ++
3,995,521 UART: [fht] Storing FHT @ 0x50003400
4,006,843 UART: [idev] ++
4,007,412 UART: [idev] CDI.KEYID = 6
4,008,356 UART: [idev] SUBJECT.KEYID = 7
4,009,569 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
191,896 UART:
192,259 UART: Running Caliptra ROM ...
193,369 UART:
603,165 UART: [state] CFI Enabled
616,278 UART: [state] LifecycleState = Unprovisioned
618,210 UART: [state] DebugLocked = Yes
621,188 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,140 UART: [kat] SHA2-256
795,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,503 UART: [kat] ++
806,998 UART: [kat] sha1
817,881 UART: [kat] SHA2-256
820,622 UART: [kat] SHA2-384
826,651 UART: [kat] SHA2-512-ACC
829,051 UART: [kat] ECC-384
3,111,661 UART: [kat] HMAC-384Kdf
3,124,111 UART: [kat] LMS
4,314,237 UART: [kat] --
4,319,256 UART: [cold-reset] ++
4,321,785 UART: [fht] Storing FHT @ 0x50003400
4,332,513 UART: [idev] ++
4,333,105 UART: [idev] CDI.KEYID = 6
4,333,991 UART: [idev] SUBJECT.KEYID = 7
4,335,258 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,609 UART:
193,467 UART: Running Caliptra ROM ...
194,617 UART:
603,931 UART: [state] CFI Enabled
617,868 UART: [state] LifecycleState = Manufacturing
619,783 UART: [state] DebugLocked = Yes
621,847 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,136 UART: [kat] SHA2-256
796,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,466 UART: [kat] ++
807,957 UART: [kat] sha1
818,459 UART: [kat] SHA2-256
821,151 UART: [kat] SHA2-384
827,244 UART: [kat] SHA2-512-ACC
829,617 UART: [kat] ECC-384
3,113,481 UART: [kat] HMAC-384Kdf
3,125,345 UART: [kat] LMS
4,315,501 UART: [kat] --
4,318,275 UART: [cold-reset] ++
4,320,772 UART: [fht] Storing FHT @ 0x50003400
4,332,371 UART: [idev] ++
4,332,937 UART: [idev] CDI.KEYID = 6
4,333,904 UART: [idev] SUBJECT.KEYID = 7
4,335,120 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
191,917 UART:
192,285 UART: Running Caliptra ROM ...
193,418 UART:
603,114 UART: [state] CFI Enabled
615,085 UART: [state] LifecycleState = Unknown
616,773 UART: [state] DebugLocked = Yes
618,409 UART: [state] Starting the Watchdog Timer 40000000 cycles
623,636 UART: [kat] SHA2-256
793,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,926 UART: [kat] ++
804,440 UART: [kat] sha1
816,027 UART: [kat] SHA2-256
818,773 UART: [kat] SHA2-384
824,910 UART: [kat] SHA2-512-ACC
827,248 UART: [kat] ECC-384
3,113,885 UART: [kat] HMAC-384Kdf
3,125,152 UART: [kat] LMS
4,315,317 UART: [kat] --
4,321,307 UART: [cold-reset] ++
4,322,493 UART: [fht] Storing FHT @ 0x50003400
4,333,976 UART: [idev] ++
4,334,540 UART: [idev] CDI.KEYID = 6
4,335,478 UART: [idev] SUBJECT.KEYID = 7
4,336,634 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
58,321 writing to cptra_bootfsm_go
246,917 UART:
247,719 UART: Running Caliptra ROM ...
248,864 UART:
658,274 UART: [state] CFI Enabled
672,504 UART: [state] LifecycleState = Production
674,533 UART: [state] DebugLocked = Yes
677,138 UART: [state] Starting the Watchdog Timer 40000000 cycles
682,232 UART: [kat] SHA2-256
852,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
862,600 UART: [kat] ++
863,163 UART: [kat] sha1
874,098 UART: [kat] SHA2-256
876,838 UART: [kat] SHA2-384
882,166 UART: [kat] SHA2-512-ACC
884,505 UART: [kat] ECC-384
3,169,768 UART: [kat] HMAC-384Kdf
3,182,388 UART: [kat] LMS
4,372,489 UART: [kat] --
4,375,224 UART: [cold-reset] ++
4,377,488 UART: [fht] Storing FHT @ 0x50003400
4,388,859 UART: [idev] ++
4,389,433 UART: [idev] CDI.KEYID = 6
4,390,363 UART: [idev] SUBJECT.KEYID = 7
4,391,579 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,460 writing to cptra_bootfsm_go
194,733 UART:
195,679 UART: Running Caliptra ROM ...
196,820 UART:
605,812 UART: [state] CFI Enabled
621,483 UART: [state] LifecycleState = Unprovisioned
623,412 UART: [state] DebugLocked = No
625,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,574 UART: [kat] SHA2-256
801,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,878 UART: [kat] ++
812,376 UART: [kat] sha1
823,334 UART: [kat] SHA2-256
826,031 UART: [kat] SHA2-384
831,858 UART: [kat] SHA2-512-ACC
834,261 UART: [kat] ECC-384
3,118,787 UART: [kat] HMAC-384Kdf
3,130,817 UART: [kat] LMS
4,320,940 UART: [kat] --
4,324,466 UART: [cold-reset] ++
4,325,815 UART: [fht] Storing FHT @ 0x50003400
4,336,649 UART: [idev] ++
4,337,213 UART: [idev] CDI.KEYID = 6
4,338,153 UART: [idev] SUBJECT.KEYID = 7
4,339,418 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,360 writing to cptra_bootfsm_go
193,672 UART:
194,031 UART: Running Caliptra ROM ...
195,250 UART:
605,008 UART: [state] CFI Enabled
618,576 UART: [state] LifecycleState = Manufacturing
620,499 UART: [state] DebugLocked = No
622,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,196 UART: [kat] SHA2-256
797,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,448 UART: [kat] ++
808,897 UART: [kat] sha1
818,770 UART: [kat] SHA2-256
821,461 UART: [kat] SHA2-384
828,138 UART: [kat] SHA2-512-ACC
830,476 UART: [kat] ECC-384
3,114,437 UART: [kat] HMAC-384Kdf
3,126,617 UART: [kat] LMS
4,316,707 UART: [kat] --
4,322,118 UART: [cold-reset] ++
4,323,706 UART: [fht] Storing FHT @ 0x50003400
4,335,520 UART: [idev] ++
4,336,091 UART: [idev] CDI.KEYID = 6
4,337,037 UART: [idev] SUBJECT.KEYID = 7
4,338,252 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
192,628 UART:
192,990 UART: Running Caliptra ROM ...
194,200 UART:
604,013 UART: [state] CFI Enabled
619,013 UART: [state] LifecycleState = Unknown
620,720 UART: [state] DebugLocked = No
623,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,672 UART: [kat] SHA2-256
797,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,922 UART: [kat] ++
808,472 UART: [kat] sha1
820,221 UART: [kat] SHA2-256
822,911 UART: [kat] SHA2-384
830,132 UART: [kat] SHA2-512-ACC
832,524 UART: [kat] ECC-384
3,115,267 UART: [kat] HMAC-384Kdf
3,125,827 UART: [kat] LMS
4,315,956 UART: [kat] --
4,320,647 UART: [cold-reset] ++
4,322,577 UART: [fht] Storing FHT @ 0x50003400
4,332,820 UART: [idev] ++
4,333,384 UART: [idev] CDI.KEYID = 6
4,334,349 UART: [idev] SUBJECT.KEYID = 7
4,335,617 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
194,245 UART:
194,646 UART: Running Caliptra ROM ...
195,856 UART:
605,421 UART: [state] CFI Enabled
616,823 UART: [state] LifecycleState = Production
618,622 UART: [state] DebugLocked = No
619,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,716 UART: [kat] SHA2-256
794,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,965 UART: [kat] ++
805,465 UART: [kat] sha1
817,097 UART: [kat] SHA2-256
819,845 UART: [kat] SHA2-384
825,981 UART: [kat] SHA2-512-ACC
828,315 UART: [kat] ECC-384
3,115,854 UART: [kat] HMAC-384Kdf
3,128,596 UART: [kat] LMS
4,318,730 UART: [kat] --
4,324,775 UART: [cold-reset] ++
4,326,056 UART: [fht] Storing FHT @ 0x50003400
4,336,299 UART: [idev] ++
4,336,868 UART: [idev] CDI.KEYID = 6
4,337,833 UART: [idev] SUBJECT.KEYID = 7
4,339,044 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
191,836 UART:
192,186 UART: Running Caliptra ROM ...
193,359 UART:
193,510 UART: [state] CFI Enabled
262,855 UART: [state] LifecycleState = Unprovisioned
264,691 UART: [state] DebugLocked = Yes
265,997 UART: [state] Starting the WD Timer 40000000 cycles
270,585 UART: [kat] SHA2-256
449,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,324 UART: [kat] ++
461,891 UART: [kat] sha1
472,418 UART: [kat] SHA2-256
475,487 UART: [kat] SHA2-384
482,111 UART: [kat] SHA2-512-ACC
485,065 UART: [kat] ECC-384
2,944,504 UART: [kat] HMAC-384Kdf
2,969,873 UART: [kat] LMS
3,499,361 UART: [kat] --
3,503,176 UART: [cold-reset] ++
3,505,120 UART: [fht] FHT @ 0x50003400
3,515,395 UART: [idev] ++
3,515,998 UART: [idev] CDI.KEYID = 6
3,516,916 UART: [idev] SUBJECT.KEYID = 7
3,518,020 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,728 UART:
193,576 UART: Running Caliptra ROM ...
194,753 UART:
194,898 UART: [state] CFI Enabled
257,215 UART: [state] LifecycleState = Manufacturing
259,153 UART: [state] DebugLocked = Yes
261,335 UART: [state] Starting the WD Timer 40000000 cycles
266,362 UART: [kat] SHA2-256
445,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,123 UART: [kat] ++
457,693 UART: [kat] sha1
468,628 UART: [kat] SHA2-256
471,637 UART: [kat] SHA2-384
477,722 UART: [kat] SHA2-512-ACC
480,663 UART: [kat] ECC-384
2,939,242 UART: [kat] HMAC-384Kdf
2,963,317 UART: [kat] LMS
3,492,839 UART: [kat] --
3,497,994 UART: [cold-reset] ++
3,499,396 UART: [fht] FHT @ 0x50003400
3,510,381 UART: [idev] ++
3,510,950 UART: [idev] CDI.KEYID = 6
3,511,864 UART: [idev] SUBJECT.KEYID = 7
3,513,084 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
7,030 writing to cptra_bootfsm_go
195,657 UART:
196,379 UART: Running Caliptra ROM ...
197,551 UART:
197,696 UART: [state] CFI Enabled
266,921 UART: [state] LifecycleState = Unknown
268,515 UART: [state] DebugLocked = Yes
271,325 UART: [state] Starting the WD Timer 40000000 cycles
277,067 UART: [kat] SHA2-256
456,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,743 UART: [kat] ++
468,278 UART: [kat] sha1
479,997 UART: [kat] SHA2-256
483,020 UART: [kat] SHA2-384
489,764 UART: [kat] SHA2-512-ACC
492,699 UART: [kat] ECC-384
2,951,243 UART: [kat] HMAC-384Kdf
2,973,986 UART: [kat] LMS
3,503,458 UART: [kat] --
3,508,799 UART: [cold-reset] ++
3,509,757 UART: [fht] FHT @ 0x50003400
3,520,281 UART: [idev] ++
3,520,848 UART: [idev] CDI.KEYID = 6
3,521,733 UART: [idev] SUBJECT.KEYID = 7
3,522,863 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
192,422 UART:
193,175 UART: Running Caliptra ROM ...
194,291 UART:
194,433 UART: [state] CFI Enabled
247,556 UART: [state] LifecycleState = Production
249,323 UART: [state] DebugLocked = Yes
250,914 UART: [state] Starting the WD Timer 40000000 cycles
256,313 UART: [kat] SHA2-256
435,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,035 UART: [kat] ++
447,583 UART: [kat] sha1
458,329 UART: [kat] SHA2-256
461,388 UART: [kat] SHA2-384
467,579 UART: [kat] SHA2-512-ACC
470,532 UART: [kat] ECC-384
2,935,181 UART: [kat] HMAC-384Kdf
2,956,491 UART: [kat] LMS
3,485,952 UART: [kat] --
3,490,643 UART: [cold-reset] ++
3,492,306 UART: [fht] FHT @ 0x50003400
3,502,903 UART: [idev] ++
3,503,468 UART: [idev] CDI.KEYID = 6
3,504,534 UART: [idev] SUBJECT.KEYID = 7
3,505,644 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
193,101 UART:
193,775 UART: Running Caliptra ROM ...
195,082 UART:
195,245 UART: [state] CFI Enabled
259,778 UART: [state] LifecycleState = Unprovisioned
261,651 UART: [state] DebugLocked = No
263,520 UART: [state] WD Timer not started. Device not locked for debugging
267,445 UART: [kat] SHA2-256
446,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,127 UART: [kat] ++
458,670 UART: [kat] sha1
470,688 UART: [kat] SHA2-256
473,748 UART: [kat] SHA2-384
479,836 UART: [kat] SHA2-512-ACC
482,769 UART: [kat] ECC-384
2,941,431 UART: [kat] HMAC-384Kdf
2,965,617 UART: [kat] LMS
3,495,060 UART: [kat] --
3,499,606 UART: [cold-reset] ++
3,501,970 UART: [fht] FHT @ 0x50003400
3,512,406 UART: [idev] ++
3,512,972 UART: [idev] CDI.KEYID = 6
3,513,883 UART: [idev] SUBJECT.KEYID = 7
3,515,098 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,196 UART:
192,574 UART: Running Caliptra ROM ...
193,727 UART:
193,879 UART: [state] CFI Enabled
260,696 UART: [state] LifecycleState = Manufacturing
262,565 UART: [state] DebugLocked = No
264,914 UART: [state] WD Timer not started. Device not locked for debugging
268,574 UART: [kat] SHA2-256
447,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,257 UART: [kat] ++
459,795 UART: [kat] sha1
469,655 UART: [kat] SHA2-256
472,669 UART: [kat] SHA2-384
479,641 UART: [kat] SHA2-512-ACC
482,581 UART: [kat] ECC-384
2,942,913 UART: [kat] HMAC-384Kdf
2,967,306 UART: [kat] LMS
3,496,752 UART: [kat] --
3,503,465 UART: [cold-reset] ++
3,504,755 UART: [fht] FHT @ 0x50003400
3,515,438 UART: [idev] ++
3,516,009 UART: [idev] CDI.KEYID = 6
3,516,927 UART: [idev] SUBJECT.KEYID = 7
3,518,143 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,333 UART:
192,686 UART: Running Caliptra ROM ...
193,771 UART:
193,914 UART: [state] CFI Enabled
261,257 UART: [state] LifecycleState = Unknown
262,928 UART: [state] DebugLocked = No
265,143 UART: [state] WD Timer not started. Device not locked for debugging
268,753 UART: [kat] SHA2-256
447,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,464 UART: [kat] ++
459,912 UART: [kat] sha1
470,570 UART: [kat] SHA2-256
473,562 UART: [kat] SHA2-384
480,273 UART: [kat] SHA2-512-ACC
483,238 UART: [kat] ECC-384
2,941,945 UART: [kat] HMAC-384Kdf
2,966,056 UART: [kat] LMS
3,495,491 UART: [kat] --
3,501,102 UART: [cold-reset] ++
3,502,930 UART: [fht] FHT @ 0x50003400
3,514,174 UART: [idev] ++
3,514,795 UART: [idev] CDI.KEYID = 6
3,515,716 UART: [idev] SUBJECT.KEYID = 7
3,516,883 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,049 UART:
192,431 UART: Running Caliptra ROM ...
193,581 UART:
193,726 UART: [state] CFI Enabled
259,296 UART: [state] LifecycleState = Production
261,002 UART: [state] DebugLocked = No
262,920 UART: [state] WD Timer not started. Device not locked for debugging
266,913 UART: [kat] SHA2-256
446,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,608 UART: [kat] ++
458,145 UART: [kat] sha1
468,641 UART: [kat] SHA2-256
471,667 UART: [kat] SHA2-384
478,132 UART: [kat] SHA2-512-ACC
481,060 UART: [kat] ECC-384
2,947,175 UART: [kat] HMAC-384Kdf
2,969,557 UART: [kat] LMS
3,498,970 UART: [kat] --
3,503,550 UART: [cold-reset] ++
3,505,813 UART: [fht] FHT @ 0x50003400
3,516,414 UART: [idev] ++
3,516,986 UART: [idev] CDI.KEYID = 6
3,517,965 UART: [idev] SUBJECT.KEYID = 7
3,519,128 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
7,301 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
6,217 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
11,632 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
191,899 UART:
192,273 UART: Running Caliptra ROM ...
193,450 UART:
603,055 UART: [state] CFI Enabled
617,636 UART: [state] LifecycleState = Unprovisioned
619,456 UART: [state] DebugLocked = Yes
621,573 UART: [state] Starting the WD Timer 40000000 cycles
625,566 UART: [kat] SHA2-256
804,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,312 UART: [kat] ++
817,082 UART: [kat] sha1
828,087 UART: [kat] SHA2-256
831,093 UART: [kat] SHA2-384
836,045 UART: [kat] SHA2-512-ACC
839,038 UART: [kat] ECC-384
3,282,163 UART: [kat] HMAC-384Kdf
3,294,409 UART: [kat] LMS
3,823,881 UART: [kat] --
3,826,794 UART: [cold-reset] ++
3,828,181 UART: [fht] FHT @ 0x50003400
3,840,081 UART: [idev] ++
3,840,657 UART: [idev] CDI.KEYID = 6
3,841,540 UART: [idev] SUBJECT.KEYID = 7
3,842,801 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
23,008 writing to cptra_bootfsm_go
213,956 UART:
214,752 UART: Running Caliptra ROM ...
215,912 UART:
624,896 UART: [state] CFI Enabled
638,319 UART: [state] LifecycleState = Manufacturing
640,200 UART: [state] DebugLocked = Yes
642,990 UART: [state] Starting the WD Timer 40000000 cycles
647,413 UART: [kat] SHA2-256
826,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
838,106 UART: [kat] ++
838,665 UART: [kat] sha1
849,059 UART: [kat] SHA2-256
852,133 UART: [kat] SHA2-384
857,631 UART: [kat] SHA2-512-ACC
860,605 UART: [kat] ECC-384
3,299,481 UART: [kat] HMAC-384Kdf
3,310,532 UART: [kat] LMS
3,840,062 UART: [kat] --
3,846,158 UART: [cold-reset] ++
3,847,494 UART: [fht] FHT @ 0x50003400
3,857,934 UART: [idev] ++
3,858,498 UART: [idev] CDI.KEYID = 6
3,859,484 UART: [idev] SUBJECT.KEYID = 7
3,860,642 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
17,332 writing to cptra_bootfsm_go
205,937 UART:
206,677 UART: Running Caliptra ROM ...
207,865 UART:
617,087 UART: [state] CFI Enabled
633,328 UART: [state] LifecycleState = Unknown
634,930 UART: [state] DebugLocked = Yes
636,290 UART: [state] Starting the WD Timer 40000000 cycles
640,337 UART: [kat] SHA2-256
819,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
831,038 UART: [kat] ++
831,576 UART: [kat] sha1
842,192 UART: [kat] SHA2-256
845,216 UART: [kat] SHA2-384
850,773 UART: [kat] SHA2-512-ACC
853,763 UART: [kat] ECC-384
3,296,683 UART: [kat] HMAC-384Kdf
3,308,918 UART: [kat] LMS
3,838,429 UART: [kat] --
3,843,223 UART: [cold-reset] ++
3,844,835 UART: [fht] FHT @ 0x50003400
3,856,785 UART: [idev] ++
3,857,348 UART: [idev] CDI.KEYID = 6
3,858,413 UART: [idev] SUBJECT.KEYID = 7
3,859,520 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,838 writing to cptra_bootfsm_go
192,443 UART:
193,227 UART: Running Caliptra ROM ...
194,339 UART:
603,572 UART: [state] CFI Enabled
616,904 UART: [state] LifecycleState = Production
618,681 UART: [state] DebugLocked = Yes
621,447 UART: [state] Starting the WD Timer 40000000 cycles
626,108 UART: [kat] SHA2-256
805,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,796 UART: [kat] ++
817,330 UART: [kat] sha1
829,371 UART: [kat] SHA2-256
832,388 UART: [kat] SHA2-384
839,499 UART: [kat] SHA2-512-ACC
842,489 UART: [kat] ECC-384
3,285,824 UART: [kat] HMAC-384Kdf
3,298,507 UART: [kat] LMS
3,828,049 UART: [kat] --
3,834,046 UART: [cold-reset] ++
3,836,627 UART: [fht] FHT @ 0x50003400
3,848,524 UART: [idev] ++
3,849,097 UART: [idev] CDI.KEYID = 6
3,850,011 UART: [idev] SUBJECT.KEYID = 7
3,851,198 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,219 writing to cptra_bootfsm_go
193,393 UART:
194,066 UART: Running Caliptra ROM ...
195,212 UART:
604,663 UART: [state] CFI Enabled
622,079 UART: [state] LifecycleState = Unprovisioned
624,001 UART: [state] DebugLocked = No
625,716 UART: [state] WD Timer not started. Device not locked for debugging
629,693 UART: [kat] SHA2-256
808,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,386 UART: [kat] ++
820,919 UART: [kat] sha1
833,206 UART: [kat] SHA2-256
836,213 UART: [kat] SHA2-384
841,589 UART: [kat] SHA2-512-ACC
844,519 UART: [kat] ECC-384
3,284,328 UART: [kat] HMAC-384Kdf
3,296,474 UART: [kat] LMS
3,825,970 UART: [kat] --
3,829,322 UART: [cold-reset] ++
3,830,496 UART: [fht] FHT @ 0x50003400
3,841,664 UART: [idev] ++
3,842,224 UART: [idev] CDI.KEYID = 6
3,843,165 UART: [idev] SUBJECT.KEYID = 7
3,844,375 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,524 UART:
192,883 UART: Running Caliptra ROM ...
193,983 UART:
603,753 UART: [state] CFI Enabled
616,756 UART: [state] LifecycleState = Manufacturing
618,579 UART: [state] DebugLocked = No
620,360 UART: [state] WD Timer not started. Device not locked for debugging
624,799 UART: [kat] SHA2-256
803,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,547 UART: [kat] ++
815,992 UART: [kat] sha1
828,323 UART: [kat] SHA2-256
831,326 UART: [kat] SHA2-384
836,229 UART: [kat] SHA2-512-ACC
839,161 UART: [kat] ECC-384
3,282,620 UART: [kat] HMAC-384Kdf
3,295,397 UART: [kat] LMS
3,824,902 UART: [kat] --
3,828,809 UART: [cold-reset] ++
3,831,287 UART: [fht] FHT @ 0x50003400
3,841,674 UART: [idev] ++
3,842,288 UART: [idev] CDI.KEYID = 6
3,843,178 UART: [idev] SUBJECT.KEYID = 7
3,844,347 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,522 writing to cptra_bootfsm_go
192,802 UART:
193,162 UART: Running Caliptra ROM ...
194,353 UART:
604,026 UART: [state] CFI Enabled
619,028 UART: [state] LifecycleState = Unknown
620,696 UART: [state] DebugLocked = No
623,397 UART: [state] WD Timer not started. Device not locked for debugging
628,005 UART: [kat] SHA2-256
807,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,664 UART: [kat] ++
819,111 UART: [kat] sha1
829,927 UART: [kat] SHA2-256
832,985 UART: [kat] SHA2-384
838,904 UART: [kat] SHA2-512-ACC
841,892 UART: [kat] ECC-384
3,282,591 UART: [kat] HMAC-384Kdf
3,295,684 UART: [kat] LMS
3,825,175 UART: [kat] --
3,829,391 UART: [cold-reset] ++
3,831,156 UART: [fht] FHT @ 0x50003400
3,841,106 UART: [idev] ++
3,841,667 UART: [idev] CDI.KEYID = 6
3,842,578 UART: [idev] SUBJECT.KEYID = 7
3,843,812 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
194,278 UART:
194,691 UART: Running Caliptra ROM ...
195,891 UART:
605,459 UART: [state] CFI Enabled
623,794 UART: [state] LifecycleState = Production
625,523 UART: [state] DebugLocked = No
626,740 UART: [state] WD Timer not started. Device not locked for debugging
630,259 UART: [kat] SHA2-256
809,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,961 UART: [kat] ++
821,493 UART: [kat] sha1
833,348 UART: [kat] SHA2-256
836,346 UART: [kat] SHA2-384
843,292 UART: [kat] SHA2-512-ACC
846,227 UART: [kat] ECC-384
3,286,040 UART: [kat] HMAC-384Kdf
3,298,165 UART: [kat] LMS
3,827,673 UART: [kat] --
3,831,977 UART: [cold-reset] ++
3,833,534 UART: [fht] FHT @ 0x50003400
3,843,597 UART: [idev] ++
3,844,214 UART: [idev] CDI.KEYID = 6
3,845,133 UART: [idev] SUBJECT.KEYID = 7
3,846,298 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
56,769 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
33,271 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,234 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
19,282 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,515 UART:
191,863 UART: Running Caliptra ROM ...
192,978 UART:
193,122 UART: [state] CFI Enabled
261,044 UART: [state] LifecycleState = Unprovisioned
263,481 UART: [state] DebugLocked = Yes
266,377 UART: [state] Starting the WD Timer 40000000 cycles
272,308 UART: [kat] SHA2-256
462,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,934 UART: [kat] ++
473,537 UART: [kat] sha1
485,070 UART: [kat] SHA2-256
488,075 UART: [kat] SHA2-384
493,194 UART: [kat] SHA2-512-ACC
495,748 UART: [kat] ECC-384
2,946,081 UART: [kat] HMAC-384Kdf
2,969,185 UART: [kat] LMS
3,500,965 UART: [kat] --
3,506,468 UART: [cold-reset] ++
3,508,194 UART: [fht] FHT @ 0x50003400
3,520,575 UART: [idev] ++
3,521,305 UART: [idev] CDI.KEYID = 6
3,522,341 UART: [idev] SUBJECT.KEYID = 7
3,523,449 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,433 UART:
193,287 UART: Running Caliptra ROM ...
194,451 UART:
194,602 UART: [state] CFI Enabled
265,029 UART: [state] LifecycleState = Manufacturing
267,437 UART: [state] DebugLocked = Yes
269,293 UART: [state] Starting the WD Timer 40000000 cycles
275,117 UART: [kat] SHA2-256
465,035 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,776 UART: [kat] ++
476,403 UART: [kat] sha1
487,454 UART: [kat] SHA2-256
490,457 UART: [kat] SHA2-384
496,241 UART: [kat] SHA2-512-ACC
498,853 UART: [kat] ECC-384
2,950,704 UART: [kat] HMAC-384Kdf
2,973,007 UART: [kat] LMS
3,504,770 UART: [kat] --
3,508,945 UART: [cold-reset] ++
3,510,988 UART: [fht] FHT @ 0x50003400
3,522,401 UART: [idev] ++
3,523,095 UART: [idev] CDI.KEYID = 6
3,524,038 UART: [idev] SUBJECT.KEYID = 7
3,525,252 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
191,693 UART:
192,561 UART: Running Caliptra ROM ...
193,667 UART:
193,806 UART: [state] CFI Enabled
253,729 UART: [state] LifecycleState = Unknown
255,821 UART: [state] DebugLocked = Yes
258,184 UART: [state] Starting the WD Timer 40000000 cycles
264,021 UART: [kat] SHA2-256
453,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,661 UART: [kat] ++
465,196 UART: [kat] sha1
477,172 UART: [kat] SHA2-256
480,205 UART: [kat] SHA2-384
485,482 UART: [kat] SHA2-512-ACC
488,047 UART: [kat] ECC-384
2,935,900 UART: [kat] HMAC-384Kdf
2,959,486 UART: [kat] LMS
3,491,238 UART: [kat] --
3,493,767 UART: [cold-reset] ++
3,494,725 UART: [fht] FHT @ 0x50003400
3,506,135 UART: [idev] ++
3,506,873 UART: [idev] CDI.KEYID = 6
3,507,782 UART: [idev] SUBJECT.KEYID = 7
3,508,999 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
28,042 writing to cptra_bootfsm_go
216,675 UART:
217,474 UART: Running Caliptra ROM ...
218,647 UART:
218,793 UART: [state] CFI Enabled
294,404 UART: [state] LifecycleState = Production
296,698 UART: [state] DebugLocked = Yes
299,372 UART: [state] Starting the WD Timer 40000000 cycles
303,812 UART: [kat] SHA2-256
493,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
504,249 UART: [kat] ++
504,810 UART: [kat] sha1
515,571 UART: [kat] SHA2-256
518,589 UART: [kat] SHA2-384
524,895 UART: [kat] SHA2-512-ACC
527,519 UART: [kat] ECC-384
2,978,157 UART: [kat] HMAC-384Kdf
3,002,232 UART: [kat] LMS
3,533,994 UART: [kat] --
3,540,193 UART: [cold-reset] ++
3,541,992 UART: [fht] FHT @ 0x50003400
3,551,960 UART: [idev] ++
3,552,636 UART: [idev] CDI.KEYID = 6
3,553,599 UART: [idev] SUBJECT.KEYID = 7
3,554,759 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
193,741 UART:
194,544 UART: Running Caliptra ROM ...
195,699 UART:
195,934 UART: [state] CFI Enabled
260,761 UART: [state] LifecycleState = Unprovisioned
263,177 UART: [state] DebugLocked = No
265,496 UART: [state] WD Timer not started. Device not locked for debugging
269,745 UART: [kat] SHA2-256
459,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,401 UART: [kat] ++
470,882 UART: [kat] sha1
481,767 UART: [kat] SHA2-256
484,772 UART: [kat] SHA2-384
489,700 UART: [kat] SHA2-512-ACC
492,320 UART: [kat] ECC-384
2,944,500 UART: [kat] HMAC-384Kdf
2,968,613 UART: [kat] LMS
3,500,418 UART: [kat] --
3,505,483 UART: [cold-reset] ++
3,507,249 UART: [fht] FHT @ 0x50003400
3,518,397 UART: [idev] ++
3,519,109 UART: [idev] CDI.KEYID = 6
3,520,134 UART: [idev] SUBJECT.KEYID = 7
3,521,237 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,177 UART:
192,552 UART: Running Caliptra ROM ...
193,668 UART:
193,810 UART: [state] CFI Enabled
266,571 UART: [state] LifecycleState = Manufacturing
268,993 UART: [state] DebugLocked = No
270,299 UART: [state] WD Timer not started. Device not locked for debugging
275,039 UART: [kat] SHA2-256
464,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,666 UART: [kat] ++
476,112 UART: [kat] sha1
488,825 UART: [kat] SHA2-256
491,831 UART: [kat] SHA2-384
498,622 UART: [kat] SHA2-512-ACC
501,212 UART: [kat] ECC-384
2,951,061 UART: [kat] HMAC-384Kdf
2,973,404 UART: [kat] LMS
3,505,180 UART: [kat] --
3,509,011 UART: [cold-reset] ++
3,510,627 UART: [fht] FHT @ 0x50003400
3,521,821 UART: [idev] ++
3,522,503 UART: [idev] CDI.KEYID = 6
3,523,413 UART: [idev] SUBJECT.KEYID = 7
3,524,630 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,977 UART:
193,327 UART: Running Caliptra ROM ...
194,522 UART:
194,674 UART: [state] CFI Enabled
258,713 UART: [state] LifecycleState = Unknown
260,809 UART: [state] DebugLocked = No
262,623 UART: [state] WD Timer not started. Device not locked for debugging
266,710 UART: [kat] SHA2-256
456,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,351 UART: [kat] ++
467,887 UART: [kat] sha1
479,203 UART: [kat] SHA2-256
482,213 UART: [kat] SHA2-384
489,010 UART: [kat] SHA2-512-ACC
491,563 UART: [kat] ECC-384
2,944,428 UART: [kat] HMAC-384Kdf
2,967,627 UART: [kat] LMS
3,499,357 UART: [kat] --
3,505,564 UART: [cold-reset] ++
3,506,792 UART: [fht] FHT @ 0x50003400
3,518,204 UART: [idev] ++
3,518,877 UART: [idev] CDI.KEYID = 6
3,519,843 UART: [idev] SUBJECT.KEYID = 7
3,521,054 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,258 UART:
192,627 UART: Running Caliptra ROM ...
193,739 UART:
193,882 UART: [state] CFI Enabled
263,302 UART: [state] LifecycleState = Production
265,539 UART: [state] DebugLocked = No
268,403 UART: [state] WD Timer not started. Device not locked for debugging
272,600 UART: [kat] SHA2-256
462,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,250 UART: [kat] ++
473,694 UART: [kat] sha1
485,331 UART: [kat] SHA2-256
488,348 UART: [kat] SHA2-384
495,030 UART: [kat] SHA2-512-ACC
497,642 UART: [kat] ECC-384
2,940,832 UART: [kat] HMAC-384Kdf
2,966,465 UART: [kat] LMS
3,498,213 UART: [kat] --
3,502,962 UART: [cold-reset] ++
3,505,379 UART: [fht] FHT @ 0x50003400
3,516,254 UART: [idev] ++
3,516,938 UART: [idev] CDI.KEYID = 6
3,517,914 UART: [idev] SUBJECT.KEYID = 7
3,519,073 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
191,889 UART:
192,250 UART: Running Caliptra ROM ...
193,413 UART:
603,057 UART: [state] CFI Enabled
615,979 UART: [state] LifecycleState = Unprovisioned
618,378 UART: [state] DebugLocked = Yes
620,866 UART: [state] Starting the WD Timer 40000000 cycles
625,922 UART: [kat] SHA2-256
815,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,628 UART: [kat] ++
827,192 UART: [kat] sha1
839,588 UART: [kat] SHA2-256
842,603 UART: [kat] SHA2-384
848,474 UART: [kat] SHA2-512-ACC
851,029 UART: [kat] ECC-384
3,292,139 UART: [kat] HMAC-384Kdf
3,305,104 UART: [kat] LMS
3,836,926 UART: [kat] --
3,840,051 UART: [cold-reset] ++
3,841,018 UART: [fht] FHT @ 0x50003400
3,852,537 UART: [idev] ++
3,853,219 UART: [idev] CDI.KEYID = 6
3,854,184 UART: [idev] SUBJECT.KEYID = 7
3,855,395 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,494 UART:
193,241 UART: Running Caliptra ROM ...
194,412 UART:
603,663 UART: [state] CFI Enabled
617,875 UART: [state] LifecycleState = Manufacturing
620,225 UART: [state] DebugLocked = Yes
622,446 UART: [state] Starting the WD Timer 40000000 cycles
627,832 UART: [kat] SHA2-256
817,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,570 UART: [kat] ++
829,118 UART: [kat] sha1
840,546 UART: [kat] SHA2-256
843,555 UART: [kat] SHA2-384
850,740 UART: [kat] SHA2-512-ACC
853,302 UART: [kat] ECC-384
3,295,427 UART: [kat] HMAC-384Kdf
3,308,380 UART: [kat] LMS
3,840,213 UART: [kat] --
3,843,445 UART: [cold-reset] ++
3,844,668 UART: [fht] FHT @ 0x50003400
3,856,085 UART: [idev] ++
3,856,803 UART: [idev] CDI.KEYID = 6
3,857,747 UART: [idev] SUBJECT.KEYID = 7
3,858,960 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,035 UART:
192,945 UART: Running Caliptra ROM ...
194,067 UART:
603,192 UART: [state] CFI Enabled
616,464 UART: [state] LifecycleState = Unknown
618,544 UART: [state] DebugLocked = Yes
620,065 UART: [state] Starting the WD Timer 40000000 cycles
625,677 UART: [kat] SHA2-256
815,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,375 UART: [kat] ++
826,963 UART: [kat] sha1
838,407 UART: [kat] SHA2-256
841,413 UART: [kat] SHA2-384
847,068 UART: [kat] SHA2-512-ACC
849,679 UART: [kat] ECC-384
3,291,672 UART: [kat] HMAC-384Kdf
3,304,721 UART: [kat] LMS
3,836,519 UART: [kat] --
3,840,453 UART: [cold-reset] ++
3,841,411 UART: [fht] FHT @ 0x50003400
3,853,230 UART: [idev] ++
3,853,940 UART: [idev] CDI.KEYID = 6
3,854,827 UART: [idev] SUBJECT.KEYID = 7
3,855,987 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
191,829 UART:
192,700 UART: Running Caliptra ROM ...
193,893 UART:
603,148 UART: [state] CFI Enabled
619,506 UART: [state] LifecycleState = Production
621,711 UART: [state] DebugLocked = Yes
623,149 UART: [state] Starting the WD Timer 40000000 cycles
628,817 UART: [kat] SHA2-256
818,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,505 UART: [kat] ++
830,095 UART: [kat] sha1
842,413 UART: [kat] SHA2-256
845,474 UART: [kat] SHA2-384
850,477 UART: [kat] SHA2-512-ACC
853,084 UART: [kat] ECC-384
3,293,517 UART: [kat] HMAC-384Kdf
3,305,272 UART: [kat] LMS
3,837,061 UART: [kat] --
3,840,519 UART: [cold-reset] ++
3,841,966 UART: [fht] FHT @ 0x50003400
3,852,677 UART: [idev] ++
3,853,359 UART: [idev] CDI.KEYID = 6
3,854,347 UART: [idev] SUBJECT.KEYID = 7
3,855,511 UART: [idev] UDS.KEYID = 0
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,524 UART:
193,372 UART: Running Caliptra ROM ...
194,542 UART:
603,557 UART: [state] CFI Enabled
618,432 UART: [state] LifecycleState = Unprovisioned
620,796 UART: [state] DebugLocked = No
622,719 UART: [state] WD Timer not started. Device not locked for debugging
627,727 UART: [kat] SHA2-256
817,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,395 UART: [kat] ++
828,911 UART: [kat] sha1
840,310 UART: [kat] SHA2-256
843,329 UART: [kat] SHA2-384
848,172 UART: [kat] SHA2-512-ACC
850,782 UART: [kat] ECC-384
3,290,216 UART: [kat] HMAC-384Kdf
3,303,606 UART: [kat] LMS
3,835,416 UART: [kat] --
3,841,633 UART: [cold-reset] ++
3,844,169 UART: [fht] FHT @ 0x50003400
3,855,366 UART: [idev] ++
3,856,043 UART: [idev] CDI.KEYID = 6
3,857,063 UART: [idev] SUBJECT.KEYID = 7
3,858,225 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,278 writing to cptra_bootfsm_go
193,634 UART:
193,995 UART: Running Caliptra ROM ...
195,209 UART:
604,804 UART: [state] CFI Enabled
620,419 UART: [state] LifecycleState = Manufacturing
622,783 UART: [state] DebugLocked = No
625,781 UART: [state] WD Timer not started. Device not locked for debugging
629,966 UART: [kat] SHA2-256
819,842 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,596 UART: [kat] ++
831,190 UART: [kat] sha1
841,279 UART: [kat] SHA2-256
844,324 UART: [kat] SHA2-384
850,418 UART: [kat] SHA2-512-ACC
852,978 UART: [kat] ECC-384
3,295,915 UART: [kat] HMAC-384Kdf
3,309,233 UART: [kat] LMS
3,841,092 UART: [kat] --
3,843,381 UART: [cold-reset] ++
3,845,427 UART: [fht] FHT @ 0x50003400
3,855,918 UART: [idev] ++
3,856,594 UART: [idev] CDI.KEYID = 6
3,857,560 UART: [idev] SUBJECT.KEYID = 7
3,858,770 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,624 UART:
192,994 UART: Running Caliptra ROM ...
194,195 UART:
603,643 UART: [state] CFI Enabled
614,635 UART: [state] LifecycleState = Unknown
616,681 UART: [state] DebugLocked = No
619,139 UART: [state] WD Timer not started. Device not locked for debugging
624,404 UART: [kat] SHA2-256
814,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,043 UART: [kat] ++
825,547 UART: [kat] sha1
836,748 UART: [kat] SHA2-256
839,770 UART: [kat] SHA2-384
845,045 UART: [kat] SHA2-512-ACC
847,663 UART: [kat] ECC-384
3,287,269 UART: [kat] HMAC-384Kdf
3,299,525 UART: [kat] LMS
3,831,355 UART: [kat] --
3,837,001 UART: [cold-reset] ++
3,838,426 UART: [fht] FHT @ 0x50003400
3,849,145 UART: [idev] ++
3,849,828 UART: [idev] CDI.KEYID = 6
3,850,767 UART: [idev] SUBJECT.KEYID = 7
3,851,984 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,485 UART:
192,862 UART: Running Caliptra ROM ...
193,977 UART:
603,755 UART: [state] CFI Enabled
621,661 UART: [state] LifecycleState = Production
623,867 UART: [state] DebugLocked = No
625,243 UART: [state] WD Timer not started. Device not locked for debugging
629,433 UART: [kat] SHA2-256
819,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,111 UART: [kat] ++
830,609 UART: [kat] sha1
840,975 UART: [kat] SHA2-256
843,959 UART: [kat] SHA2-384
850,158 UART: [kat] SHA2-512-ACC
852,721 UART: [kat] ECC-384
3,294,145 UART: [kat] HMAC-384Kdf
3,306,982 UART: [kat] LMS
3,838,840 UART: [kat] --
3,843,265 UART: [cold-reset] ++
3,844,656 UART: [fht] FHT @ 0x50003400
3,856,776 UART: [idev] ++
3,857,449 UART: [idev] CDI.KEYID = 6
3,858,574 UART: [idev] SUBJECT.KEYID = 7
3,859,684 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
35,607 writing to cptra_bootfsm_go
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
31,775 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
4,878,180 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,494,963 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
4,874,704 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,493,800 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
5,183,154 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,665,163 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
5,186,230 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,676,141 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,476,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,410,628 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,438,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,143 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,776,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,532,083 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,781,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,561,427 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,462,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,348,214 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,462,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,385,230 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,788,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,561,405 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,779,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,552,456 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,237 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,673,442 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,863 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,033 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,779 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,068 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,673,943 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,019 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,675,471 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,673,306 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,675,374 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,259 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
191,483 UART:
191,841 UART: Running Caliptra ROM ...
192,932 UART:
193,078 UART: [state] CFI Enabled
266,622 UART: [state] LifecycleState = Production
268,501 UART: [state] DebugLocked = Yes
270,353 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,772 UART: [kat] SHA2-256
444,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,967 UART: [kat] ++
455,471 UART: [kat] sha1
466,783 UART: [kat] SHA2-256
469,478 UART: [kat] SHA2-384
474,753 UART: [kat] SHA2-512-ACC
477,092 UART: [kat] ECC-384
2,766,457 UART: [kat] HMAC-384Kdf
2,779,517 UART: [kat] LMS
3,969,784 UART: [kat] --
3,975,584 UART: [cold-reset] ++
3,977,689 UART: [fht] Storing FHT @ 0x50003400
3,989,124 UART: [idev] ++
3,989,716 UART: [idev] CDI.KEYID = 6
3,990,638 UART: [idev] SUBJECT.KEYID = 7
3,991,914 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
191,840 UART:
192,241 UART: Running Caliptra ROM ...
193,434 UART:
603,213 UART: [state] CFI Enabled
618,381 UART: [state] LifecycleState = Production
620,190 UART: [state] DebugLocked = Yes
622,519 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,421 UART: [kat] SHA2-256
797,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,763 UART: [kat] ++
808,498 UART: [kat] sha1
819,019 UART: [kat] SHA2-256
821,773 UART: [kat] SHA2-384
828,729 UART: [kat] SHA2-512-ACC
831,094 UART: [kat] ECC-384
3,114,420 UART: [kat] HMAC-384Kdf
3,125,080 UART: [kat] LMS
4,315,223 UART: [kat] --
4,321,003 UART: [cold-reset] ++
4,322,734 UART: [fht] Storing FHT @ 0x50003400
4,334,119 UART: [idev] ++
4,334,727 UART: [idev] CDI.KEYID = 6
4,335,646 UART: [idev] SUBJECT.KEYID = 7
4,336,868 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
191,694 UART:
192,073 UART: Running Caliptra ROM ...
193,263 UART:
193,415 UART: [state] CFI Enabled
262,617 UART: [state] LifecycleState = Production
264,404 UART: [state] DebugLocked = Yes
265,924 UART: [state] Starting the WD Timer 40000000 cycles
271,640 UART: [kat] SHA2-256
450,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,376 UART: [kat] ++
462,916 UART: [kat] sha1
473,786 UART: [kat] SHA2-256
476,857 UART: [kat] SHA2-384
482,290 UART: [kat] SHA2-512-ACC
485,219 UART: [kat] ECC-384
2,948,990 UART: [kat] HMAC-384Kdf
2,973,267 UART: [kat] LMS
3,502,712 UART: [kat] --
3,508,157 UART: [cold-reset] ++
3,509,981 UART: [fht] FHT @ 0x50003400
3,520,848 UART: [idev] ++
3,521,422 UART: [idev] CDI.KEYID = 6
3,522,385 UART: [idev] SUBJECT.KEYID = 7
3,523,548 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,245 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
14,836 writing to cptra_bootfsm_go
192,015 UART:
192,371 UART: Running Caliptra ROM ...
193,560 UART:
603,098 UART: [state] CFI Enabled
613,352 UART: [state] LifecycleState = Production
615,108 UART: [state] DebugLocked = Yes
616,846 UART: [state] Starting the WD Timer 40000000 cycles
621,917 UART: [kat] SHA2-256
801,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,649 UART: [kat] ++
813,105 UART: [kat] sha1
824,224 UART: [kat] SHA2-256
827,240 UART: [kat] SHA2-384
833,758 UART: [kat] SHA2-512-ACC
836,709 UART: [kat] ECC-384
3,276,853 UART: [kat] HMAC-384Kdf
3,289,138 UART: [kat] LMS
3,818,635 UART: [kat] --
3,825,657 UART: [cold-reset] ++
3,826,669 UART: [fht] FHT @ 0x50003400
3,836,945 UART: [idev] ++
3,837,509 UART: [idev] CDI.KEYID = 6
3,838,420 UART: [idev] SUBJECT.KEYID = 7
3,839,635 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,869 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,532 UART:
191,897 UART: Running Caliptra ROM ...
193,076 UART:
193,230 UART: [state] CFI Enabled
261,090 UART: [state] LifecycleState = Production
263,310 UART: [state] DebugLocked = Yes
266,184 UART: [state] Starting the WD Timer 40000000 cycles
270,926 UART: [kat] SHA2-256
460,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,549 UART: [kat] ++
472,091 UART: [kat] sha1
484,014 UART: [kat] SHA2-256
487,027 UART: [kat] SHA2-384
493,503 UART: [kat] SHA2-512-ACC
496,117 UART: [kat] ECC-384
2,945,272 UART: [kat] HMAC-384Kdf
2,970,764 UART: [kat] LMS
3,502,492 UART: [kat] --
3,507,326 UART: [cold-reset] ++
3,508,402 UART: [fht] FHT @ 0x50003400
3,520,076 UART: [idev] ++
3,520,757 UART: [idev] CDI.KEYID = 6
3,521,694 UART: [idev] SUBJECT.KEYID = 7
3,522,905 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,775 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
191,742 UART:
192,127 UART: Running Caliptra ROM ...
193,254 UART:
602,984 UART: [state] CFI Enabled
619,091 UART: [state] LifecycleState = Production
621,340 UART: [state] DebugLocked = Yes
622,778 UART: [state] Starting the WD Timer 40000000 cycles
627,695 UART: [kat] SHA2-256
817,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,375 UART: [kat] ++
828,881 UART: [kat] sha1
839,667 UART: [kat] SHA2-256
842,678 UART: [kat] SHA2-384
850,279 UART: [kat] SHA2-512-ACC
852,893 UART: [kat] ECC-384
3,294,932 UART: [kat] HMAC-384Kdf
3,307,416 UART: [kat] LMS
3,839,266 UART: [kat] --
3,842,501 UART: [cold-reset] ++
3,843,516 UART: [fht] FHT @ 0x50003400
3,854,818 UART: [idev] ++
3,855,499 UART: [idev] CDI.KEYID = 6
3,856,491 UART: [idev] SUBJECT.KEYID = 7
3,858,209 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,791 UART: [state] LifecycleState = Production
85,399 UART: [state] DebugLocked = Yes
86,061 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,855 UART: [kat] SHA2-256
881,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,901 UART: [kat] ++
886,053 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,393 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Production
85,928 UART: [state] DebugLocked = Yes
86,598 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,537 UART: [kat] SHA2-512-ACC
897,438 UART: [kat] ECC-384
902,915 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,479 UART: [fht] Storing FHT @ 0x50003400
1,480,228 UART: [idev] ++
1,480,396 UART: [idev] CDI.KEYID = 6
1,480,756 UART: [idev] SUBJECT.KEYID = 7
1,481,180 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Production
85,643 UART: [state] DebugLocked = Yes
86,155 UART: [state] Starting the WD Timer 40000000 cycles
87,828 UART: [kat] SHA2-256
893,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,603 UART: [kat] ++
897,755 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,322 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,279 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Production
86,132 UART: [state] DebugLocked = Yes
86,824 UART: [state] Starting the WD Timer 40000000 cycles
88,457 UART: [kat] SHA2-256
894,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,232 UART: [kat] ++
898,384 UART: [kat] sha1
902,690 UART: [kat] SHA2-256
904,630 UART: [kat] SHA2-384
907,441 UART: [kat] SHA2-512-ACC
909,342 UART: [kat] ECC-384
918,897 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,594 UART: [cold-reset] ++
1,173,077 UART: [fht] FHT @ 0x50003400
1,175,702 UART: [idev] ++
1,175,870 UART: [idev] CDI.KEYID = 6
1,176,230 UART: [idev] SUBJECT.KEYID = 7
1,176,654 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Production
85,733 UART: [state] DebugLocked = Yes
86,405 UART: [state] Starting the WD Timer 40000000 cycles
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Production
85,888 UART: [state] DebugLocked = Yes
86,550 UART: [state] Starting the WD Timer 40000000 cycles
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,356 UART: [kat] SHA2-256
902,296 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,533 UART:
191,905 UART: Running Caliptra ROM ...
193,009 UART:
193,184 UART: [state] CFI Enabled
266,857 UART: [state] LifecycleState = Production
268,678 UART: [state] DebugLocked = Yes
271,656 UART: [state] Starting the Watchdog Timer 40000000 cycles
277,660 UART: [kat] SHA2-256
447,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,894 UART: [kat] ++
458,409 UART: [kat] sha1
469,353 UART: [kat] SHA2-256
472,080 UART: [kat] SHA2-384
478,786 UART: [kat] SHA2-512-ACC
481,159 UART: [kat] ECC-384
2,766,444 UART: [kat] HMAC-384Kdf
2,798,642 UART: [kat] LMS
3,988,968 UART: [kat] --
3,994,243 UART: [cold-reset] ++
3,996,768 UART: [fht] Storing FHT @ 0x50003400
4,006,843 UART: [idev] ++
4,007,451 UART: [idev] CDI.KEYID = 6
4,008,343 UART: [idev] SUBJECT.KEYID = 7
4,009,666 UART: [idev] UDS.KEYID = 0
4,010,577 ready_for_fw is high
4,010,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,177 UART: [idev] Erasing UDS.KEYID = 0
7,345,177 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,924 UART: [idev] --
7,370,884 UART: [ldev] ++
7,371,470 UART: [ldev] CDI.KEYID = 6
7,372,492 UART: [ldev] SUBJECT.KEYID = 5
7,373,651 UART: [ldev] AUTHORITY.KEYID = 7
7,374,882 UART: [ldev] FE.KEYID = 1
7,421,800 UART: [ldev] Erasing FE.KEYID = 1
10,753,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,960 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,059,464 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,074,161 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,088,491 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,105,839 UART: [ldev] --
13,110,077 UART: [fwproc] Waiting for Commands...
13,111,961 UART: [fwproc] Received command 0x46574c44
13,114,147 UART: [fwproc] Received Image of size 114124 bytes
17,202,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,768 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,351,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,668,681 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,804,077 ready_for_fw is high
3,804,496 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,933,726 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
191,880 UART:
192,242 UART: Running Caliptra ROM ...
193,332 UART:
603,103 UART: [state] CFI Enabled
618,416 UART: [state] LifecycleState = Production
620,195 UART: [state] DebugLocked = Yes
623,177 UART: [state] Starting the Watchdog Timer 40000000 cycles
629,191 UART: [kat] SHA2-256
798,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,520 UART: [kat] ++
810,021 UART: [kat] sha1
820,756 UART: [kat] SHA2-256
823,488 UART: [kat] SHA2-384
829,054 UART: [kat] SHA2-512-ACC
831,436 UART: [kat] ECC-384
3,114,136 UART: [kat] HMAC-384Kdf
3,126,370 UART: [kat] LMS
4,316,500 UART: [kat] --
4,320,786 UART: [cold-reset] ++
4,323,002 UART: [fht] Storing FHT @ 0x50003400
4,334,420 UART: [idev] ++
4,335,067 UART: [idev] CDI.KEYID = 6
4,335,981 UART: [idev] SUBJECT.KEYID = 7
4,337,230 UART: [idev] UDS.KEYID = 0
4,338,157 ready_for_fw is high
4,338,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,858 UART: [idev] Erasing UDS.KEYID = 0
7,620,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,749 UART: [idev] --
7,644,973 UART: [ldev] ++
7,645,557 UART: [ldev] CDI.KEYID = 6
7,646,451 UART: [ldev] SUBJECT.KEYID = 5
7,647,723 UART: [ldev] AUTHORITY.KEYID = 7
7,648,883 UART: [ldev] FE.KEYID = 1
7,660,895 UART: [ldev] Erasing FE.KEYID = 1
10,950,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,324 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,256,848 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,271,509 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,285,888 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,305,338 UART: [ldev] --
13,309,810 UART: [fwproc] Waiting for Commands...
13,311,542 UART: [fwproc] Received command 0x46574c44
13,313,732 UART: [fwproc] Received Image of size 114124 bytes
17,390,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,476,551 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,545,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,862,873 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,125,711 ready_for_fw is high
4,126,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,103,719 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
191,685 UART:
192,070 UART: Running Caliptra ROM ...
193,189 UART:
193,330 UART: [state] CFI Enabled
267,170 UART: [state] LifecycleState = Production
268,903 UART: [state] DebugLocked = Yes
270,785 UART: [state] Starting the WD Timer 40000000 cycles
275,602 UART: [kat] SHA2-256
454,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,347 UART: [kat] ++
466,801 UART: [kat] sha1
478,553 UART: [kat] SHA2-256
481,578 UART: [kat] SHA2-384
488,568 UART: [kat] SHA2-512-ACC
491,584 UART: [kat] ECC-384
2,949,162 UART: [kat] HMAC-384Kdf
2,973,404 UART: [kat] LMS
3,502,928 UART: [kat] --
3,507,563 UART: [cold-reset] ++
3,508,433 UART: [fht] FHT @ 0x50003400
3,519,766 UART: [idev] ++
3,520,346 UART: [idev] CDI.KEYID = 6
3,521,251 UART: [idev] SUBJECT.KEYID = 7
3,522,434 UART: [idev] UDS.KEYID = 0
3,523,340 ready_for_fw is high
3,523,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,546 UART: [idev] Erasing UDS.KEYID = 0
6,029,838 UART: [idev] Sha1 KeyId Algorithm
6,053,482 UART: [idev] --
6,058,189 UART: [ldev] ++
6,058,770 UART: [ldev] CDI.KEYID = 6
6,059,684 UART: [ldev] SUBJECT.KEYID = 5
6,060,847 UART: [ldev] AUTHORITY.KEYID = 7
6,062,141 UART: [ldev] FE.KEYID = 1
6,102,834 UART: [ldev] Erasing FE.KEYID = 1
8,608,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,596 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,589 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,404 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,342 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,412,638 UART: [ldev] --
10,417,945 UART: [fwproc] Wait for Commands...
10,420,222 UART: [fwproc] Recv command 0x46574c44
10,422,328 UART: [fwproc] Recv'd Img size: 114448 bytes
13,861,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,006,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,325,383 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,383,882 ready_for_fw is high
3,384,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,111,193 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,040 UART:
192,406 UART: Running Caliptra ROM ...
193,618 UART:
603,161 UART: [state] CFI Enabled
616,551 UART: [state] LifecycleState = Production
618,322 UART: [state] DebugLocked = Yes
619,816 UART: [state] Starting the WD Timer 40000000 cycles
624,625 UART: [kat] SHA2-256
803,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,359 UART: [kat] ++
815,900 UART: [kat] sha1
826,832 UART: [kat] SHA2-256
829,843 UART: [kat] SHA2-384
836,261 UART: [kat] SHA2-512-ACC
839,198 UART: [kat] ECC-384
3,280,080 UART: [kat] HMAC-384Kdf
3,292,521 UART: [kat] LMS
3,822,085 UART: [kat] --
3,827,862 UART: [cold-reset] ++
3,829,514 UART: [fht] FHT @ 0x50003400
3,840,732 UART: [idev] ++
3,841,343 UART: [idev] CDI.KEYID = 6
3,842,264 UART: [idev] SUBJECT.KEYID = 7
3,843,441 UART: [idev] UDS.KEYID = 0
3,844,372 ready_for_fw is high
3,844,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,327 UART: [idev] Erasing UDS.KEYID = 0
6,312,007 UART: [idev] Sha1 KeyId Algorithm
6,334,747 UART: [idev] --
6,337,854 UART: [ldev] ++
6,338,435 UART: [ldev] CDI.KEYID = 6
6,339,322 UART: [ldev] SUBJECT.KEYID = 5
6,340,538 UART: [ldev] AUTHORITY.KEYID = 7
6,341,775 UART: [ldev] FE.KEYID = 1
6,351,423 UART: [ldev] Erasing FE.KEYID = 1
8,822,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,046 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,557,037 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,572,886 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,588,812 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,608,686 UART: [ldev] --
10,613,136 UART: [fwproc] Wait for Commands...
10,615,825 UART: [fwproc] Recv command 0x46574c44
10,617,935 UART: [fwproc] Recv'd Img size: 114448 bytes
14,054,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,125,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,194,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,512,714 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,700,527 ready_for_fw is high
3,701,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,311,914 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
191,621 UART:
191,977 UART: Running Caliptra ROM ...
193,165 UART:
193,322 UART: [state] CFI Enabled
262,460 UART: [state] LifecycleState = Production
264,659 UART: [state] DebugLocked = Yes
266,043 UART: [state] Starting the WD Timer 40000000 cycles
271,083 UART: [kat] SHA2-256
461,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,761 UART: [kat] ++
472,288 UART: [kat] sha1
484,574 UART: [kat] SHA2-256
487,587 UART: [kat] SHA2-384
493,012 UART: [kat] SHA2-512-ACC
495,611 UART: [kat] ECC-384
2,948,424 UART: [kat] HMAC-384Kdf
2,974,846 UART: [kat] LMS
3,506,566 UART: [kat] --
3,511,220 UART: [cold-reset] ++
3,512,317 UART: [fht] FHT @ 0x50003400
3,523,804 UART: [idev] ++
3,524,370 UART: [idev] CDI.KEYID = 6
3,525,301 UART: [idev] SUBJECT.KEYID = 7
3,526,485 UART: [idev] UDS.KEYID = 0
3,527,414 ready_for_fw is high
3,527,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,710 UART: [idev] Erasing UDS.KEYID = 0
6,033,900 UART: [idev] Sha1 KeyId Algorithm
6,056,342 UART: [idev] --
6,061,847 UART: [ldev] ++
6,062,532 UART: [ldev] CDI.KEYID = 6
6,063,603 UART: [ldev] SUBJECT.KEYID = 5
6,064,712 UART: [ldev] AUTHORITY.KEYID = 7
6,065,887 UART: [ldev] FE.KEYID = 1
6,101,382 UART: [ldev] Erasing FE.KEYID = 1
8,608,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,977 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,171 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,277 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,354 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,835 UART: [ldev] --
10,414,998 UART: [fwproc] Wait for Commands...
10,417,527 UART: [fwproc] Recv command 0x46574c44
10,419,516 UART: [fwproc] Recv'd Img size: 114448 bytes
13,900,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,097,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,641,507 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,438,280 ready_for_fw is high
3,438,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,777,059 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
191,778 UART:
192,137 UART: Running Caliptra ROM ...
193,267 UART:
603,060 UART: [state] CFI Enabled
615,955 UART: [state] LifecycleState = Production
618,202 UART: [state] DebugLocked = Yes
619,910 UART: [state] Starting the WD Timer 40000000 cycles
624,732 UART: [kat] SHA2-256
814,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,450 UART: [kat] ++
825,970 UART: [kat] sha1
837,862 UART: [kat] SHA2-256
840,875 UART: [kat] SHA2-384
848,315 UART: [kat] SHA2-512-ACC
850,872 UART: [kat] ECC-384
3,292,974 UART: [kat] HMAC-384Kdf
3,306,203 UART: [kat] LMS
3,838,030 UART: [kat] --
3,841,348 UART: [cold-reset] ++
3,842,366 UART: [fht] FHT @ 0x50003400
3,853,210 UART: [idev] ++
3,853,993 UART: [idev] CDI.KEYID = 6
3,854,886 UART: [idev] SUBJECT.KEYID = 7
3,856,106 UART: [idev] UDS.KEYID = 0
3,857,017 ready_for_fw is high
3,857,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,001,106 UART: [idev] Erasing UDS.KEYID = 0
6,334,179 UART: [idev] Sha1 KeyId Algorithm
6,356,971 UART: [idev] --
6,362,101 UART: [ldev] ++
6,362,789 UART: [ldev] CDI.KEYID = 6
6,363,719 UART: [ldev] SUBJECT.KEYID = 5
6,364,878 UART: [ldev] AUTHORITY.KEYID = 7
6,366,112 UART: [ldev] FE.KEYID = 1
6,377,934 UART: [ldev] Erasing FE.KEYID = 1
8,854,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,622 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,590,843 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,605,935 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,620,908 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,641,709 UART: [ldev] --
10,647,137 UART: [fwproc] Wait for Commands...
10,649,230 UART: [fwproc] Recv command 0x46574c44
10,651,216 UART: [fwproc] Recv'd Img size: 114448 bytes
14,126,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,205,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,321,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,864,791 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,753,897 ready_for_fw is high
3,754,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,000,672 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Production
85,635 UART: [state] DebugLocked = Yes
86,303 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,537 UART: [idev] ++
1,479,705 UART: [idev] CDI.KEYID = 6
1,480,065 UART: [idev] SUBJECT.KEYID = 7
1,480,489 UART: [idev] UDS.KEYID = 0
1,480,834 ready_for_fw is high
1,480,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,370 UART: [idev] Erasing UDS.KEYID = 0
1,505,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,191 UART: [ldev] ++
1,515,359 UART: [ldev] CDI.KEYID = 6
1,515,722 UART: [ldev] SUBJECT.KEYID = 5
1,516,148 UART: [ldev] AUTHORITY.KEYID = 7
1,516,611 UART: [ldev] FE.KEYID = 1
1,521,933 UART: [ldev] Erasing FE.KEYID = 1
1,547,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,021 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,715 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,587 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,349 UART: [ldev] --
1,586,622 UART: [fwproc] Waiting for Commands...
1,587,293 UART: [fwproc] Received command 0x46574c44
1,588,084 UART: [fwproc] Received Image of size 114448 bytes
2,912,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,547 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,104,907 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,602 ready_for_fw is high
1,361,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,953,181 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Production
86,142 UART: [state] DebugLocked = Yes
86,674 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,425 UART: [kat] SHA2-512-ACC
897,326 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,083 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 ready_for_fw is high
1,481,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,505,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,619 UART: [idev] --
1,515,728 UART: [ldev] ++
1,515,896 UART: [ldev] CDI.KEYID = 6
1,516,259 UART: [ldev] SUBJECT.KEYID = 5
1,516,685 UART: [ldev] AUTHORITY.KEYID = 7
1,517,148 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,485 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,958 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,652 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,524 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,579,230 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,268 UART: [ldev] --
1,587,613 UART: [fwproc] Waiting for Commands...
1,588,454 UART: [fwproc] Received command 0x46574c44
1,589,245 UART: [fwproc] Received Image of size 114448 bytes
2,914,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,941,490 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,970,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,106,760 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,747 ready_for_fw is high
1,363,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,955,844 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Production
86,171 UART: [state] DebugLocked = Yes
86,915 UART: [state] Starting the WD Timer 40000000 cycles
88,516 UART: [kat] SHA2-256
894,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,291 UART: [kat] ++
898,443 UART: [kat] sha1
902,489 UART: [kat] SHA2-256
904,429 UART: [kat] SHA2-384
907,094 UART: [kat] SHA2-512-ACC
908,995 UART: [kat] ECC-384
918,888 UART: [kat] HMAC-384Kdf
923,420 UART: [kat] LMS
1,171,748 UART: [kat] --
1,172,675 UART: [cold-reset] ++
1,173,198 UART: [fht] FHT @ 0x50003400
1,175,869 UART: [idev] ++
1,176,037 UART: [idev] CDI.KEYID = 6
1,176,397 UART: [idev] SUBJECT.KEYID = 7
1,176,821 UART: [idev] UDS.KEYID = 0
1,177,166 ready_for_fw is high
1,177,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,948 UART: [idev] Erasing UDS.KEYID = 0
1,202,024 UART: [idev] Sha1 KeyId Algorithm
1,210,547 UART: [idev] --
1,211,579 UART: [ldev] ++
1,211,747 UART: [ldev] CDI.KEYID = 6
1,212,110 UART: [ldev] SUBJECT.KEYID = 5
1,212,536 UART: [ldev] AUTHORITY.KEYID = 7
1,212,999 UART: [ldev] FE.KEYID = 1
1,218,135 UART: [ldev] Erasing FE.KEYID = 1
1,244,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,469 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,163 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,035 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,741 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,670 UART: [ldev] --
1,283,967 UART: [fwproc] Wait for Commands...
1,284,763 UART: [fwproc] Recv command 0x46574c44
1,285,491 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,637,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,666,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,802,446 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,628 ready_for_fw is high
1,060,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,652,887 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Production
85,914 UART: [state] DebugLocked = Yes
86,458 UART: [state] Starting the WD Timer 40000000 cycles
88,103 UART: [kat] SHA2-256
893,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,878 UART: [kat] ++
898,030 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
919,035 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,173,100 UART: [cold-reset] ++
1,173,427 UART: [fht] FHT @ 0x50003400
1,176,136 UART: [idev] ++
1,176,304 UART: [idev] CDI.KEYID = 6
1,176,664 UART: [idev] SUBJECT.KEYID = 7
1,177,088 UART: [idev] UDS.KEYID = 0
1,177,433 ready_for_fw is high
1,177,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,141 UART: [idev] Erasing UDS.KEYID = 0
1,203,027 UART: [idev] Sha1 KeyId Algorithm
1,211,300 UART: [idev] --
1,212,242 UART: [ldev] ++
1,212,410 UART: [ldev] CDI.KEYID = 6
1,212,773 UART: [ldev] SUBJECT.KEYID = 5
1,213,199 UART: [ldev] AUTHORITY.KEYID = 7
1,213,662 UART: [ldev] FE.KEYID = 1
1,219,100 UART: [ldev] Erasing FE.KEYID = 1
1,246,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,252 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,946 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,818 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,524 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,513 UART: [ldev] --
1,284,880 UART: [fwproc] Wait for Commands...
1,285,472 UART: [fwproc] Recv command 0x46574c44
1,286,200 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,637,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,666,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,802,515 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,303 ready_for_fw is high
1,060,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,652,464 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Production
85,915 UART: [state] DebugLocked = Yes
86,557 UART: [state] Starting the WD Timer 40000000 cycles
88,230 UART: [kat] SHA2-256
891,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,909 UART: [kat] ++
896,061 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,510 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,541 UART: [idev] --
1,209,500 UART: [ldev] ++
1,209,668 UART: [ldev] CDI.KEYID = 6
1,210,032 UART: [ldev] SUBJECT.KEYID = 5
1,210,459 UART: [ldev] AUTHORITY.KEYID = 7
1,210,922 UART: [ldev] FE.KEYID = 1
1,216,158 UART: [ldev] Erasing FE.KEYID = 1
1,242,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,941 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,811 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,517 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,513 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,359 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,000 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 ready_for_fw is high
1,056,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,756 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Production
85,884 UART: [state] DebugLocked = Yes
86,448 UART: [state] Starting the WD Timer 40000000 cycles
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,909 UART: [kat] HMAC-384Kdf
921,661 UART: [kat] LMS
1,169,973 UART: [kat] --
1,170,904 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,174,151 UART: [idev] ++
1,174,319 UART: [idev] CDI.KEYID = 6
1,174,680 UART: [idev] SUBJECT.KEYID = 7
1,175,105 UART: [idev] UDS.KEYID = 0
1,175,451 ready_for_fw is high
1,175,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,316 UART: [idev] Erasing UDS.KEYID = 0
1,200,769 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,463 UART: [ldev] ++
1,210,631 UART: [ldev] CDI.KEYID = 6
1,210,995 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,143 UART: [ldev] Erasing FE.KEYID = 1
1,243,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,144 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,838 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,708 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,414 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,496 UART: [ldev] --
1,282,812 UART: [fwproc] Wait for Commands...
1,283,625 UART: [fwproc] Recv command 0x46574c44
1,284,358 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,375 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,698 ready_for_fw is high
1,056,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,987 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,987 writing to cptra_bootfsm_go
7,090,498 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
7,081,287 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
7,404,780 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
7,397,788 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
5,645,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
5,665,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
5,990,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
5,996,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,906 writing to cptra_bootfsm_go
5,641,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
5,657,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,002,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
5,999,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,386 UART:
192,766 UART: Running Caliptra ROM ...
193,934 UART:
194,090 UART: [state] CFI Enabled
264,557 UART: [state] LifecycleState = Unprovisioned
266,931 UART: [state] DebugLocked = No
268,524 UART: [state] WD Timer not started. Device not locked for debugging
272,980 UART: [kat] SHA2-256
454,895 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,365 UART: ROM integrity test failed
467,549 UART: ROM Fatal Error: 0x90080001
2,717,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,861,540 >>> mbox cmd response: failed
2,862,115 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,005,449 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,657 writing to cptra_bootfsm_go
192,787 UART:
193,160 UART: Running Caliptra ROM ...
194,314 UART:
194,466 UART: [state] CFI Enabled
260,200 UART: [state] LifecycleState = Unprovisioned
262,571 UART: [state] DebugLocked = No
265,135 UART: [state] WD Timer not started. Device not locked for debugging
269,834 UART: [kat] SHA2-256
451,735 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,931 UART: ROM integrity test failed
464,190 UART: ROM Fatal Error: 0x90080001
2,724,251 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,868,315 >>> mbox cmd response: failed
2,868,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,012,201 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,511 UART:
192,876 UART: Running Caliptra ROM ...
194,140 UART:
603,501 UART: [state] CFI Enabled
617,268 UART: [state] LifecycleState = Unprovisioned
619,630 UART: [state] DebugLocked = No
621,491 UART: [state] WD Timer not started. Device not locked for debugging
625,633 UART: [kat] SHA2-256
807,611 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,809 UART: ROM integrity test failed
820,076 UART: ROM Fatal Error: 0x90080001
3,070,870 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,215,074 >>> mbox cmd response: failed
3,215,660 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,358,845 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,404 UART:
192,764 UART: Running Caliptra ROM ...
193,833 UART:
603,537 UART: [state] CFI Enabled
618,005 UART: [state] LifecycleState = Unprovisioned
620,426 UART: [state] DebugLocked = No
622,376 UART: [state] WD Timer not started. Device not locked for debugging
627,064 UART: [kat] SHA2-256
809,085 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,267 UART: ROM integrity test failed
821,519 UART: ROM Fatal Error: 0x90080001
3,073,500 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,217,746 >>> mbox cmd response: failed
3,218,336 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,361,659 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,396 UART:
192,749 UART: Running Caliptra ROM ...
193,922 UART:
194,071 UART: [state] CFI Enabled
262,053 UART: [state] LifecycleState = Unprovisioned
263,950 UART: [state] DebugLocked = No
266,790 UART: [state] WD Timer not started. Device not locked for debugging
271,193 UART: [kat] SHA2-256
450,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,340 UART: ROM integrity test failed
462,601 UART: ROM Fatal Error: 0x90080001
2,706,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,850,491 >>> mbox cmd response: failed
2,851,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,994,892 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,257 UART:
192,666 UART: Running Caliptra ROM ...
193,773 UART:
193,922 UART: [state] CFI Enabled
263,431 UART: [state] LifecycleState = Unprovisioned
265,321 UART: [state] DebugLocked = No
267,084 UART: [state] WD Timer not started. Device not locked for debugging
269,926 UART: [kat] SHA2-256
449,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,100 UART: ROM integrity test failed
461,301 UART: ROM Fatal Error: 0x90080001
2,706,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,851,130 >>> mbox cmd response: failed
2,851,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,995,914 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,036 writing to cptra_bootfsm_go
194,193 UART:
194,561 UART: Running Caliptra ROM ...
195,746 UART:
605,140 UART: [state] CFI Enabled
618,055 UART: [state] LifecycleState = Unprovisioned
619,923 UART: [state] DebugLocked = No
621,160 UART: [state] WD Timer not started. Device not locked for debugging
624,756 UART: [kat] SHA2-256
803,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,888 UART: ROM integrity test failed
816,116 UART: ROM Fatal Error: 0x90080001
3,065,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,209,763 >>> mbox cmd response: failed
3,210,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,353,919 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,621 UART:
193,019 UART: Running Caliptra ROM ...
194,193 UART:
603,784 UART: [state] CFI Enabled
617,918 UART: [state] LifecycleState = Unprovisioned
619,771 UART: [state] DebugLocked = No
622,605 UART: [state] WD Timer not started. Device not locked for debugging
626,570 UART: [kat] SHA2-256
805,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,735 UART: ROM integrity test failed
817,949 UART: ROM Fatal Error: 0x90080001
3,060,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,204,927 >>> mbox cmd response: failed
3,205,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,349,092 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,374 UART:
192,749 UART: Running Caliptra ROM ...
193,917 UART:
194,071 UART: [state] CFI Enabled
262,868 UART: [state] LifecycleState = Unprovisioned
264,756 UART: [state] DebugLocked = No
267,376 UART: [state] WD Timer not started. Device not locked for debugging
271,930 UART: [kat] SHA2-256
451,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,090 UART: ROM integrity test failed
463,292 UART: ROM Fatal Error: 0x90080001
2,715,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,860,006 >>> mbox cmd response: failed
2,860,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,004,377 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,159 UART:
192,538 UART: Running Caliptra ROM ...
193,694 UART:
193,847 UART: [state] CFI Enabled
263,108 UART: [state] LifecycleState = Unprovisioned
264,989 UART: [state] DebugLocked = No
266,803 UART: [state] WD Timer not started. Device not locked for debugging
271,035 UART: [kat] SHA2-256
450,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,202 UART: ROM integrity test failed
462,406 UART: ROM Fatal Error: 0x90080001
2,712,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,857,602 >>> mbox cmd response: failed
2,858,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,001,929 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,610 UART:
192,966 UART: Running Caliptra ROM ...
194,130 UART:
603,919 UART: [state] CFI Enabled
618,164 UART: [state] LifecycleState = Unprovisioned
620,020 UART: [state] DebugLocked = No
622,537 UART: [state] WD Timer not started. Device not locked for debugging
626,443 UART: [kat] SHA2-256
805,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,633 UART: ROM integrity test failed
817,831 UART: ROM Fatal Error: 0x90080001
3,072,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,217,322 >>> mbox cmd response: failed
3,217,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,361,730 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,511 UART:
192,921 UART: Running Caliptra ROM ...
194,028 UART:
603,787 UART: [state] CFI Enabled
619,714 UART: [state] LifecycleState = Unprovisioned
621,570 UART: [state] DebugLocked = No
623,536 UART: [state] WD Timer not started. Device not locked for debugging
627,665 UART: [kat] SHA2-256
806,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,828 UART: ROM integrity test failed
818,998 UART: ROM Fatal Error: 0x90080001
3,069,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,213,896 >>> mbox cmd response: failed
3,214,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,358,675 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,778 UART: [state] LifecycleState = Unprovisioned
86,433 UART: [state] DebugLocked = No
87,089 UART: [state] WD Timer not started. Device not locked for debugging
88,208 UART: [kat] SHA2-256
891,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,729 UART: ROM integrity test failed
896,176 UART: ROM Fatal Error: 0x90080001
897,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,797 >>> mbox cmd response: failed
897,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,803 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: ROM integrity test failed
895,856 UART: ROM Fatal Error: 0x90080001
897,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,477 >>> mbox cmd response: failed
897,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,483 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: ROM integrity test failed
896,009 UART: ROM Fatal Error: 0x90080001
897,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,630 >>> mbox cmd response: failed
897,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,636 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: ROM integrity test failed
895,759 UART: ROM Fatal Error: 0x90080001
897,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,380 >>> mbox cmd response: failed
897,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,386 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: ROM integrity test failed
895,394 UART: ROM Fatal Error: 0x90080001
897,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,015 >>> mbox cmd response: failed
897,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,021 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: ROM integrity test failed
895,444 UART: ROM Fatal Error: 0x90080001
897,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,065 >>> mbox cmd response: failed
897,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,071 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
891,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: ROM integrity test failed
895,693 UART: ROM Fatal Error: 0x90080001
897,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,314 >>> mbox cmd response: failed
897,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,320 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,381 UART: [kat] SHA2-256
890,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,902 UART: ROM integrity test failed
895,349 UART: ROM Fatal Error: 0x90080001
896,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
896,970 >>> mbox cmd response: failed
896,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
896,976 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: ROM integrity test failed
895,844 UART: ROM Fatal Error: 0x90080001
897,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,465 >>> mbox cmd response: failed
897,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,471 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: ROM integrity test failed
895,796 UART: ROM Fatal Error: 0x90080001
897,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,417 >>> mbox cmd response: failed
897,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,423 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,136 UART: ROM integrity test failed
895,583 UART: ROM Fatal Error: 0x90080001
897,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,204 >>> mbox cmd response: failed
897,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,210 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,122 UART: ROM integrity test failed
895,569 UART: ROM Fatal Error: 0x90080001
897,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,190 >>> mbox cmd response: failed
897,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,196 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,688,616 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,833,964 >>> mbox cmd response: failed
2,834,554 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,977,905 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,861,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,441,180 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,696,889 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,841,359 >>> mbox cmd response: failed
2,841,930 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,985,518 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,867,754 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,453,176 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,046,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,191,361 >>> mbox cmd response: failed
3,191,949 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,335,182 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,579,266 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,026,841 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,048,547 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,192,719 >>> mbox cmd response: failed
3,193,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,336,667 >>> mbox cmd response: failed
Initializing fuses
986 writing to cptra_bootfsm_go
21,572,788 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,013,203 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,708,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,852,986 >>> mbox cmd response: failed
2,853,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,997,166 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,431,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,542 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,705,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,849,794 >>> mbox cmd response: failed
2,850,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,994,100 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,428,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,240,739 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,077,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,222,176 >>> mbox cmd response: failed
3,222,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,366,466 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,165,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,869,517 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,068,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,212,878 >>> mbox cmd response: failed
3,213,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,357,171 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,174,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,925,609 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,714,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,859,326 >>> mbox cmd response: failed
2,859,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,003,666 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,479,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,321,460 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,719,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,864,090 >>> mbox cmd response: failed
2,864,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,008,407 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,464,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,299,105 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,074,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,218,921 >>> mbox cmd response: failed
3,219,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,363,206 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,177,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,902,725 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,067,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,211,555 >>> mbox cmd response: failed
3,212,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,356,067 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,180,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,886,274 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,764 >>> mbox cmd response: failed
814,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,824 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,384 >>> mbox cmd response: failed
814,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,664 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,561 >>> mbox cmd response: failed
814,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,603 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,529 >>> mbox cmd response: failed
814,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,359 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,454 >>> mbox cmd response: failed
814,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,738 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,450 >>> mbox cmd response: failed
814,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,948 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,943 >>> mbox cmd response: failed
814,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,375 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,121 >>> mbox cmd response: failed
815,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,401 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,720 >>> mbox cmd response: failed
814,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,634 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,236 >>> mbox cmd response: failed
814,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,060 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,543 >>> mbox cmd response: failed
815,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,105 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,877 >>> mbox cmd response: failed
814,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,293 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,245 UART:
192,611 UART: Running Caliptra ROM ...
193,750 UART:
193,899 UART: [state] CFI Enabled
263,057 UART: [state] LifecycleState = Unprovisioned
265,056 UART: [state] DebugLocked = No
267,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,086 UART: [kat] SHA2-256
442,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,276 UART: [kat] ++
453,720 UART: [kat] sha1
464,544 UART: [kat] SHA2-256
467,258 UART: [kat] SHA2-384
472,473 UART: [kat] SHA2-512-ACC
474,843 UART: [kat] ECC-384
2,768,051 UART: [kat] HMAC-384Kdf
2,800,063 UART: [kat] LMS
3,990,353 UART: [kat] --
3,995,557 UART: [cold-reset] ++
3,996,424 UART: [fht] Storing FHT @ 0x50003400
4,007,976 UART: [idev] ++
4,008,549 UART: [idev] CDI.KEYID = 6
4,009,538 UART: [idev] SUBJECT.KEYID = 7
4,010,724 UART: [idev] UDS.KEYID = 0
4,011,802 ready_for_fw is high
4,012,011 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,156,636 UART: [idev] Erasing UDS.KEYID = 0
7,345,835 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,272 UART: [idev] --
7,373,562 UART: [ldev] ++
7,374,131 UART: [ldev] CDI.KEYID = 6
7,375,131 UART: [ldev] SUBJECT.KEYID = 5
7,376,300 UART: [ldev] AUTHORITY.KEYID = 7
7,377,594 UART: [ldev] FE.KEYID = 1
7,422,013 UART: [ldev] Erasing FE.KEYID = 1
10,752,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,056 UART: [ldev] --
13,128,685 UART: [fwproc] Waiting for Commands...
13,130,727 UART: [fwproc] Received command 0x46574c44
13,132,916 UART: [fwproc] Received Image of size 114996 bytes
17,203,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,348,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,669,694 >>> mbox cmd response: success
17,673,795 UART: [afmc] ++
17,674,393 UART: [afmc] CDI.KEYID = 6
17,675,361 UART: [afmc] SUBJECT.KEYID = 7
17,676,572 UART: [afmc] AUTHORITY.KEYID = 5
21,039,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,341,315 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,343,609 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,357,989 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,372,835 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,387,250 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,407,854 UART: [afmc] --
23,411,337 UART: [cold-reset] --
23,414,332 UART: [state] Locking Datavault
23,421,743 UART: [state] Locking PCR0, PCR1 and PCR31
23,423,486 UART: [state] Locking ICCM
23,425,555 UART: [exit] Launching FMC @ 0x40000130
23,433,901 UART:
23,434,139 UART: Running Caliptra FMC ...
23,435,167 UART:
23,435,315 UART: [state] CFI Enabled
23,499,735 UART: [fht] FMC Alias Private Key: 7
25,837,456 UART: [art] Extend RT PCRs Done
25,838,671 UART: [art] Lock RT PCRs Done
25,840,321 UART: [art] Populate DV Done
25,845,948 UART: [fht] FMC Alias Private Key: 7
25,847,536 UART: [art] Derive CDI
25,848,298 UART: [art] Store in in slot 0x4
25,906,855 UART: [art] Derive Key Pair
25,907,888 UART: [art] Store priv key in slot 0x5
29,200,511 UART: [art] Derive Key Pair - Done
29,213,719 UART: [art] Signing Cert with AUTHO
29,215,046 UART: RITY.KEYID = 7
31,501,792 UART: [art] Erasing AUTHORITY.KEYID = 7
31,503,315 UART: [art] PUB.X = F589FDB2F5587838A6AA74E1CCBE03DB7EA2F37B70573B06243C10304804E2773610A2F3430FF3FEB43222FE8C315105
31,510,521 UART: [art] PUB.Y = 02D274CAF616348AE0A292FCE9FD2C0116FC81014E609622B716C4D44C50248CCF52F531C89000E5598964F33589C18C
31,517,780 UART: [art] SIG.R = 7F0AB44685ACCAC0679846DF738027052ED5B7069FD767D979945A3C9C429C10A251FC3BADD768F91122E30603D70BE0
31,525,129 UART: [art] SIG.S = A537EC246973DC7287777A2F63DC646C80E026BE4D5FB34B0E4D8E93F1CBD503C4F837B3F6C282237CE0A00564C77D6A
32,829,969 UART: Caliptra RT
32,830,686 UART: [state] CFI Enabled
32,990,227 UART: [rt] RT listening for mailbox commands...
32,992,086 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,021,666 UART: [rt]cmd =0x46504c54, len=4
33,023,278 >>> mbox cmd response data (8 bytes)
33,024,296 UART: [rt] FIPS self test
33,025,244 UART: [kat] ++
33,025,700 UART: [kat] sha1
33,030,196 UART: [kat] SHA2-256
33,032,152 UART: [kat] SHA2-384
33,035,113 UART: [kat] SHA2-512-ACC
33,037,406 UART: [kat] ECC-384
33,039,034 UART: Fatal Error: 0x90040004
33,074,247 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,218,651 >>> mbox cmd response: failed
33,219,299 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,363,700 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
190,068 UART:
190,360 UART: Running Caliptra ROM ...
191,386 UART:
191,524 UART: [state] CFI Enabled
244,666 UART: [state] LifecycleState = Unprovisioned
246,637 UART: [state] DebugLocked = No
248,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
253,326 UART: [kat] SHA2-256
423,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
433,536 UART: [kat] ++
434,041 UART: [kat] sha1
445,838 UART: [kat] SHA2-256
448,522 UART: [kat] SHA2-384
453,631 UART: [kat] SHA2-512-ACC
455,952 UART: [kat] ECC-384
2,751,647 UART: [kat] HMAC-384Kdf
2,783,312 UART: [kat] LMS
3,973,739 UART: [kat] --
3,977,492 UART: [cold-reset] ++
3,978,728 UART: [fht] Storing FHT @ 0x50003400
3,989,833 UART: [idev] ++
3,990,404 UART: [idev] CDI.KEYID = 6
3,991,333 UART: [idev] SUBJECT.KEYID = 7
3,992,549 UART: [idev] UDS.KEYID = 0
3,994,116 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,138,674 UART: [idev] Erasing UDS.KEYID = 0
7,326,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,212 UART: [idev] --
7,352,662 UART: [ldev] ++
7,353,241 UART: [ldev] CDI.KEYID = 6
7,354,207 UART: [ldev] SUBJECT.KEYID = 5
7,355,420 UART: [ldev] AUTHORITY.KEYID = 7
7,356,654 UART: [ldev] FE.KEYID = 1
7,383,074 UART: [ldev] Erasing FE.KEYID = 1
10,715,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,049 UART: [ldev] --
13,098,234 UART: [fwproc] Waiting for Commands...
13,101,070 UART: [fwproc] Received command 0x46574c44
13,103,321 UART: [fwproc] Received Image of size 114996 bytes
17,160,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,419 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,628,396 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,806,448 ready_for_fw is high
3,806,870 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,901,178 >>> mbox cmd response: success
23,599,673 UART:
23,600,091 UART: Running Caliptra FMC ...
23,601,210 UART:
23,601,363 UART: [state] CFI Enabled
23,651,316 UART: [fht] FMC Alias Private Key: 7
25,989,705 UART: [art] Extend RT PCRs Done
25,990,937 UART: [art] Lock RT PCRs Done
25,992,462 UART: [art] Populate DV Done
25,998,097 UART: [fht] FMC Alias Private Key: 7
25,999,748 UART: [art] Derive CDI
26,000,486 UART: [art] Store in in slot 0x4
26,060,453 UART: [art] Derive Key Pair
26,061,500 UART: [art] Store priv key in slot 0x5
29,354,040 UART: [art] Derive Key Pair - Done
29,367,373 UART: [art] Signing Cert with AUTHO
29,368,676 UART: RITY.KEYID = 7
31,656,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,078 UART: [art] PUB.X = D0F1D3C367929936382EAF200EF5E402E85C9BF74336F304654D8967B0447EF38B4839221A8D33DB51D7F2AF483172C2
31,665,356 UART: [art] PUB.Y = 7D95EF6A1C0BF603956BC79FD425E81F1EDC8F07BD5B6848E988FDB8A8F08764B69835202DA93C79103E1216C77A18FA
31,672,573 UART: [art] SIG.R = 8F4E358892374881F2035EA719D9DA1AA0AE8BC9DA53E9E61C825EBA73CC4F10129D448B050558BD50106ACF29748F98
31,679,915 UART: [art] SIG.S = 770205F112AE4FB0B2A9697A58170125A879B0159656A4289CCDA4EED0FC0B3050F98259160CEC3103AA8FD66CF00A33
32,985,033 UART: Caliptra RT
32,985,751 UART: [state] CFI Enabled
33,147,285 UART: [rt] RT listening for mailbox commands...
33,149,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,178,928 UART: [rt]cmd =0x46504c54, len=4
33,180,437 >>> mbox cmd response data (8 bytes)
33,181,553 UART: [rt] FIPS self test
33,182,498 UART: [kat] ++
33,182,968 UART: [kat] sha1
33,187,416 UART: [kat] SHA2-256
33,189,348 UART: [kat] SHA2-384
33,192,198 UART: [kat] SHA2-512-ACC
33,194,452 UART: [kat] ECC-384
33,196,403 UART: Fatal Error: 0x90040004
33,231,616 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,376,032 >>> mbox cmd response: failed
33,376,666 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,521,064 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,786,595 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,845,245 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,530 UART:
192,875 UART: Running Caliptra ROM ...
194,060 UART:
603,665 UART: [state] CFI Enabled
617,287 UART: [state] LifecycleState = Unprovisioned
619,240 UART: [state] DebugLocked = No
621,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,215 UART: [kat] SHA2-256
794,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,475 UART: [kat] ++
805,997 UART: [kat] sha1
817,510 UART: [kat] SHA2-256
820,238 UART: [kat] SHA2-384
827,229 UART: [kat] SHA2-512-ACC
829,600 UART: [kat] ECC-384
3,111,562 UART: [kat] HMAC-384Kdf
3,123,446 UART: [kat] LMS
4,313,585 UART: [kat] --
4,318,460 UART: [cold-reset] ++
4,320,050 UART: [fht] Storing FHT @ 0x50003400
4,331,138 UART: [idev] ++
4,331,714 UART: [idev] CDI.KEYID = 6
4,332,626 UART: [idev] SUBJECT.KEYID = 7
4,333,872 UART: [idev] UDS.KEYID = 0
4,334,826 ready_for_fw is high
4,335,023 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,479,471 UART: [idev] Erasing UDS.KEYID = 0
7,622,777 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,249 UART: [idev] --
7,648,461 UART: [ldev] ++
7,649,028 UART: [ldev] CDI.KEYID = 6
7,649,999 UART: [ldev] SUBJECT.KEYID = 5
7,651,217 UART: [ldev] AUTHORITY.KEYID = 7
7,652,504 UART: [ldev] FE.KEYID = 1
7,663,532 UART: [ldev] Erasing FE.KEYID = 1
10,951,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,570 UART: [ldev] --
13,313,029 UART: [fwproc] Waiting for Commands...
13,315,828 UART: [fwproc] Received command 0x46574c44
13,318,014 UART: [fwproc] Received Image of size 114996 bytes
17,373,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,840,546 >>> mbox cmd response: success
17,844,716 UART: [afmc] ++
17,845,359 UART: [afmc] CDI.KEYID = 6
17,846,267 UART: [afmc] SUBJECT.KEYID = 7
17,847,482 UART: [afmc] AUTHORITY.KEYID = 5
21,159,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,030 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,425 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,230 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,663 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,688 UART: [afmc] --
23,524,998 UART: [cold-reset] --
23,529,563 UART: [state] Locking Datavault
23,535,781 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,480 UART: [state] Locking ICCM
23,539,412 UART: [exit] Launching FMC @ 0x40000130
23,547,806 UART:
23,548,040 UART: Running Caliptra FMC ...
23,549,141 UART:
23,549,307 UART: [state] CFI Enabled
23,557,213 UART: [fht] FMC Alias Private Key: 7
25,888,975 UART: [art] Extend RT PCRs Done
25,890,206 UART: [art] Lock RT PCRs Done
25,891,884 UART: [art] Populate DV Done
25,897,188 UART: [fht] FMC Alias Private Key: 7
25,898,724 UART: [art] Derive CDI
25,899,485 UART: [art] Store in in slot 0x4
25,942,137 UART: [art] Derive Key Pair
25,943,175 UART: [art] Store priv key in slot 0x5
29,184,867 UART: [art] Derive Key Pair - Done
29,198,045 UART: [art] Signing Cert with AUTHO
29,199,350 UART: RITY.KEYID = 7
31,478,292 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,805 UART: [art] PUB.X = 49614E36283B95ABB24044C538939B17E6BE99C7F45D2867C77566E42B294F85868A46B5557769880FA764109CB08985
31,487,008 UART: [art] PUB.Y = A8A2B515FE360E808C40BF8C9EA444765E77437BFDC3482F1CAD7752E58EE9BAE7E161F90D3459D549C298CACFF9C92B
31,494,263 UART: [art] SIG.R = EAF668871848478A49A84C8DB4239A597E41A83DBDC5436D82221FF8A2AF1A886F3962BA7629A1F9E1AEA6C9DFDE1C94
31,501,773 UART: [art] SIG.S = 90149A6A3F0E61D64D947C6601B845D886A8683649317CA8BCCE98FA205BF739F47CBDDE24F6962C6DD6FECACFFCABDB
32,806,730 UART: Caliptra RT
32,807,433 UART: [state] CFI Enabled
32,924,826 UART: [rt] RT listening for mailbox commands...
32,926,670 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,956,557 UART: [rt]cmd =0x46504c54, len=4
32,958,116 >>> mbox cmd response data (8 bytes)
32,959,288 UART: [rt] FIPS self test
32,960,233 UART: [kat] ++
32,960,680 UART: [kat] sha1
32,965,080 UART: [kat] SHA2-256
32,967,011 UART: [kat] SHA2-384
32,970,057 UART: [kat] SHA2-512-ACC
32,972,342 UART: [kat] ECC-384
32,974,184 UART: Fatal Error: 0x90040004
33,009,387 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,154,179 >>> mbox cmd response: failed
33,154,820 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,299,167 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,022 UART:
190,311 UART: Running Caliptra ROM ...
191,336 UART:
7,229,171 UART: [state] CFI Enabled
7,243,058 UART: [state] LifecycleState = Unprovisioned
7,245,002 UART: [state] DebugLocked = No
7,247,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,253,286 UART: [kat] SHA2-256
7,423,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,433,558 UART: [kat] ++
7,434,101 UART: [kat] sha1
7,443,825 UART: [kat] SHA2-256
7,446,524 UART: [kat] SHA2-384
7,451,699 UART: [kat] SHA2-512-ACC
7,454,049 UART: [kat] ECC-384
9,737,767 UART: [kat] HMAC-384Kdf
9,750,109 UART: [kat] LMS
10,940,226 UART: [kat] --
10,943,423 UART: [cold-reset] ++
10,944,810 UART: [fht] Storing FHT @ 0x50003400
10,956,781 UART: [idev] ++
10,957,339 UART: [idev] CDI.KEYID = 6
10,958,278 UART: [idev] SUBJECT.KEYID = 7
10,959,540 UART: [idev] UDS.KEYID = 0
10,961,121 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,105,489 UART: [idev] Erasing UDS.KEYID = 0
14,248,380 UART: [idev] Using Sha1 for KeyId Algorithm
14,270,467 UART: [idev] --
14,275,375 UART: [ldev] ++
14,275,953 UART: [ldev] CDI.KEYID = 6
14,276,917 UART: [ldev] SUBJECT.KEYID = 5
14,278,129 UART: [ldev] AUTHORITY.KEYID = 7
14,279,360 UART: [ldev] FE.KEYID = 1
14,291,796 UART: [ldev] Erasing FE.KEYID = 1
17,581,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,874,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,889,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,918,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,937,135 UART: [ldev] --
19,942,135 UART: [fwproc] Waiting for Commands...
19,944,125 UART: [fwproc] Received command 0x46574c44
19,946,310 UART: [fwproc] Received Image of size 114996 bytes
24,012,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,088,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,157,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,478,874 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,121,893 ready_for_fw is high
4,122,541 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,083,341 >>> mbox cmd response: success
23,723,078 UART:
23,723,515 UART: Running Caliptra FMC ...
23,724,671 UART:
23,724,846 UART: [state] CFI Enabled
23,732,695 UART: [fht] FMC Alias Private Key: 7
26,062,979 UART: [art] Extend RT PCRs Done
26,064,215 UART: [art] Lock RT PCRs Done
26,066,010 UART: [art] Populate DV Done
26,071,221 UART: [fht] FMC Alias Private Key: 7
26,072,765 UART: [art] Derive CDI
26,073,530 UART: [art] Store in in slot 0x4
26,116,308 UART: [art] Derive Key Pair
26,117,308 UART: [art] Store priv key in slot 0x5
29,359,198 UART: [art] Derive Key Pair - Done
29,372,140 UART: [art] Signing Cert with AUTHO
29,373,507 UART: RITY.KEYID = 7
31,653,005 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,523 UART: [art] PUB.X = FAAFB0D6E0F6164AABEE8F0879FE862635D1AC61417264143998A0C890ED02C40BAF9A69AF1A58EC2CEF9D6C94990314
31,661,787 UART: [art] PUB.Y = 1D1639B9629885321FE7F8AB6A312375CB6CE37F88AF6025762E660ED720A7EA058DC196F8CAD4FD3E909320865F5DD3
31,669,038 UART: [art] SIG.R = CD460754952C3104F58807F9D650488ADDCF59AFE999B778B1B3E6FCA3F1D7428E8A33EF2347239EC36001D4BEF4E16C
31,676,378 UART: [art] SIG.S = 4565106F8100797EA2AB8022CA8B2401109DEFDDA22E208DB31A17BECAA05166218080973DA47A298F970580E373FC97
32,981,533 UART: Caliptra RT
32,982,277 UART: [state] CFI Enabled
33,099,473 UART: [rt] RT listening for mailbox commands...
33,101,329 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,130,743 UART: [rt]cmd =0x46504c54, len=4
33,132,265 >>> mbox cmd response data (8 bytes)
33,133,661 UART: [rt] FIPS self test
33,134,607 UART: [kat] ++
33,135,057 UART: [kat] sha1
33,139,406 UART: [kat] SHA2-256
33,141,333 UART: [kat] SHA2-384
33,144,507 UART: [kat] SHA2-512-ACC
33,146,804 UART: [kat] ECC-384
33,148,703 UART: Fatal Error: 0x90040004
33,184,083 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,328,599 >>> mbox cmd response: failed
33,329,244 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,473,450 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
10,581,188 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,546,039 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,237 UART:
192,628 UART: Running Caliptra ROM ...
193,751 UART:
193,891 UART: [state] CFI Enabled
271,115 UART: [state] LifecycleState = Unprovisioned
273,033 UART: [state] DebugLocked = No
275,273 UART: [state] WD Timer not started. Device not locked for debugging
279,946 UART: [kat] SHA2-256
459,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
470,636 UART: [kat] ++
471,091 UART: [kat] sha1
481,968 UART: [kat] SHA2-256
485,001 UART: [kat] SHA2-384
490,937 UART: [kat] SHA2-512-ACC
493,949 UART: [kat] ECC-384
2,951,729 UART: [kat] HMAC-384Kdf
2,975,169 UART: [kat] LMS
3,504,583 UART: [kat] --
3,508,444 UART: [cold-reset] ++
3,510,236 UART: [fht] FHT @ 0x50003400
3,520,083 UART: [idev] ++
3,520,651 UART: [idev] CDI.KEYID = 6
3,521,647 UART: [idev] SUBJECT.KEYID = 7
3,522,828 UART: [idev] UDS.KEYID = 0
3,523,753 ready_for_fw is high
3,523,982 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,431 UART: [idev] Erasing UDS.KEYID = 0
6,029,318 UART: [idev] Sha1 KeyId Algorithm
6,051,985 UART: [idev] --
6,056,887 UART: [ldev] ++
6,057,481 UART: [ldev] CDI.KEYID = 6
6,058,403 UART: [ldev] SUBJECT.KEYID = 5
6,059,514 UART: [ldev] AUTHORITY.KEYID = 7
6,060,807 UART: [ldev] FE.KEYID = 1
6,088,077 UART: [ldev] Erasing FE.KEYID = 1
8,590,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,668 UART: [ldev] --
10,404,098 UART: [fwproc] Wait for Commands...
10,406,788 UART: [fwproc] Recv command 0x46574c44
10,408,828 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,202 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,287,158 >>> mbox cmd response: success
14,291,993 UART: [afmc] ++
14,292,589 UART: [afmc] CDI.KEYID = 6
14,293,473 UART: [afmc] SUBJECT.KEYID = 7
14,294,684 UART: [afmc] AUTHORITY.KEYID = 5
16,835,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,561,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,563,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,579,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,595,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,610,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,633,449 UART: [afmc] --
18,637,634 UART: [cold-reset] --
18,642,046 UART: [state] Locking Datavault
18,647,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,648,880 UART: [state] Locking ICCM
18,650,683 UART: [exit] Launching FMC @ 0x40000130
18,659,131 UART:
18,659,362 UART: Running Caliptra FMC ...
18,660,386 UART:
18,660,531 UART: [state] CFI Enabled
18,720,623 UART: [fht] FMC Alias Private Key: 7
20,484,941 UART: [art] Extend RT PCRs Done
20,486,166 UART: [art] Lock RT PCRs Done
20,487,927 UART: [art] Populate DV Done
20,493,500 UART: [fht] FMC Alias Private Key: 7
20,495,143 UART: [art] Derive CDI
20,495,960 UART: [art] Store in in slot 0x4
20,554,009 UART: [art] Derive Key Pair
20,555,075 UART: [art] Store priv key in slot 0x5
23,017,832 UART: [art] Derive Key Pair - Done
23,030,937 UART: [art] Signing Cert with AUTHO
23,032,248 UART: RITY.KEYID = 7
24,743,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,745,371 UART: [art] PUB.X = 2CABF45822FF9860B30973E48F33D47C8A574B5BCA700A47C5FEFF192E14FC81CF9967903455DB18995774149FAA07B0
24,752,574 UART: [art] PUB.Y = 5F942DAB8287A829844A6065916BC27E619DA1C5426564FBFF50F539846E25A3A75A9A59082617E0DB80379B12A8D428
24,759,874 UART: [art] SIG.R = B3F32A9D63526B46EDD7939D9D1A8E7527AE4C009886C65DC835EC0E0951C3BEA91724204AC907C677961E15E0DC76CA
24,767,266 UART: [art] SIG.S = 03A81DDDD67417DC53D686E89E49E5990C499C88E798F5C7E8F4603F87849EEE4DCCDF24AB83291352F57D40FFE09715
25,746,097 UART: Caliptra RT
25,746,804 UART: [state] CFI Enabled
25,912,192 UART: [rt] RT listening for mailbox commands...
25,914,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,943,556 UART: [rt]cmd =0x46504c54, len=4
25,944,968 >>> mbox cmd response data (8 bytes)
25,945,932 UART: [rt] FIPS self test
25,946,833 UART: [kat] ++
25,947,323 UART: [kat] sha1
25,951,940 UART: [kat] SHA2-256
25,953,874 UART: [kat] SHA2-384
25,956,808 UART: [kat] SHA2-512-ACC
25,959,093 UART: [kat] ECC-384
25,961,048 UART: Fatal Error: 0x90040004
25,996,426 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,141,316 >>> mbox cmd response: failed
26,141,964 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,286,703 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,039 UART:
190,330 UART: Running Caliptra ROM ...
191,356 UART:
191,516 UART: [state] CFI Enabled
247,829 UART: [state] LifecycleState = Unprovisioned
249,709 UART: [state] DebugLocked = No
252,498 UART: [state] WD Timer not started. Device not locked for debugging
256,823 UART: [kat] SHA2-256
435,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,507 UART: [kat] ++
448,040 UART: [kat] sha1
458,874 UART: [kat] SHA2-256
461,881 UART: [kat] SHA2-384
468,720 UART: [kat] SHA2-512-ACC
471,716 UART: [kat] ECC-384
2,930,974 UART: [kat] HMAC-384Kdf
2,954,062 UART: [kat] LMS
3,483,511 UART: [kat] --
3,488,317 UART: [cold-reset] ++
3,489,462 UART: [fht] FHT @ 0x50003400
3,499,256 UART: [idev] ++
3,499,825 UART: [idev] CDI.KEYID = 6
3,500,739 UART: [idev] SUBJECT.KEYID = 7
3,501,903 UART: [idev] UDS.KEYID = 0
3,503,460 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,648,520 UART: [idev] Erasing UDS.KEYID = 0
6,010,112 UART: [idev] Sha1 KeyId Algorithm
6,034,158 UART: [idev] --
6,038,811 UART: [ldev] ++
6,039,389 UART: [ldev] CDI.KEYID = 6
6,040,275 UART: [ldev] SUBJECT.KEYID = 5
6,041,492 UART: [ldev] AUTHORITY.KEYID = 7
6,042,727 UART: [ldev] FE.KEYID = 1
6,084,753 UART: [ldev] Erasing FE.KEYID = 1
8,587,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,415 UART: [ldev] --
10,396,545 UART: [fwproc] Wait for Commands...
10,399,402 UART: [fwproc] Recv command 0x46574c44
10,401,540 UART: [fwproc] Recv'd Img size: 115304 bytes
13,811,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,180 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,272,310 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,385,467 ready_for_fw is high
3,385,951 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,099,910 >>> mbox cmd response: success
18,391,529 UART:
18,391,944 UART: Running Caliptra FMC ...
18,393,068 UART:
18,393,224 UART: [state] CFI Enabled
18,462,633 UART: [fht] FMC Alias Private Key: 7
20,226,593 UART: [art] Extend RT PCRs Done
20,227,823 UART: [art] Lock RT PCRs Done
20,229,696 UART: [art] Populate DV Done
20,235,147 UART: [fht] FMC Alias Private Key: 7
20,236,855 UART: [art] Derive CDI
20,237,593 UART: [art] Store in in slot 0x4
20,295,125 UART: [art] Derive Key Pair
20,296,173 UART: [art] Store priv key in slot 0x5
22,759,064 UART: [art] Derive Key Pair - Done
22,772,014 UART: [art] Signing Cert with AUTHO
22,773,350 UART: RITY.KEYID = 7
24,484,730 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,252 UART: [art] PUB.X = CC56710A73A219643E58CBA4550957197773737648292E128DAE03D9787651879459D870F9B25B6446481E53A992F6A0
24,493,458 UART: [art] PUB.Y = CFDB4E6C39505DA5E4C22E50243210C84BA8F77C1D4495A67E5C80D032A2A0CA4DF2D305AA459AC05BC521C2DF6689C0
24,500,734 UART: [art] SIG.R = 89F3E190F310683AEBC98BD7C6D6D863492B5C01D21E9CE6F476A11506090B73AB8988C309C97AF9F3E67100BB25CFA1
24,508,095 UART: [art] SIG.S = EE3B9B471B838026B5B1244502BF45273E8D078F6E67DACBCFDA9E50A12C89C9036C6D574AB9F2DCFE7528F258DD46BB
25,486,815 UART: Caliptra RT
25,487,511 UART: [state] CFI Enabled
25,653,285 UART: [rt] RT listening for mailbox commands...
25,655,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,684,944 UART: [rt]cmd =0x46504c54, len=4
25,686,526 >>> mbox cmd response data (8 bytes)
25,687,543 UART: [rt] FIPS self test
25,688,482 UART: [kat] ++
25,688,933 UART: [kat] sha1
25,693,496 UART: [kat] SHA2-256
25,695,448 UART: [kat] SHA2-384
25,698,303 UART: [kat] SHA2-512-ACC
25,700,573 UART: [kat] ECC-384
25,702,523 UART: Fatal Error: 0x90040004
25,737,919 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,882,752 >>> mbox cmd response: failed
25,883,425 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,028,013 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,346,103 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,026,274 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,520 UART:
192,903 UART: Running Caliptra ROM ...
194,098 UART:
603,822 UART: [state] CFI Enabled
616,309 UART: [state] LifecycleState = Unprovisioned
618,189 UART: [state] DebugLocked = No
620,425 UART: [state] WD Timer not started. Device not locked for debugging
624,312 UART: [kat] SHA2-256
803,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,056 UART: [kat] ++
815,597 UART: [kat] sha1
826,907 UART: [kat] SHA2-256
829,948 UART: [kat] SHA2-384
836,759 UART: [kat] SHA2-512-ACC
839,706 UART: [kat] ECC-384
3,283,248 UART: [kat] HMAC-384Kdf
3,295,992 UART: [kat] LMS
3,825,464 UART: [kat] --
3,830,801 UART: [cold-reset] ++
3,833,302 UART: [fht] FHT @ 0x50003400
3,846,014 UART: [idev] ++
3,846,585 UART: [idev] CDI.KEYID = 6
3,847,491 UART: [idev] SUBJECT.KEYID = 7
3,848,667 UART: [idev] UDS.KEYID = 0
3,849,595 ready_for_fw is high
3,849,795 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,994,630 UART: [idev] Erasing UDS.KEYID = 0
6,325,513 UART: [idev] Sha1 KeyId Algorithm
6,349,176 UART: [idev] --
6,353,368 UART: [ldev] ++
6,353,948 UART: [ldev] CDI.KEYID = 6
6,354,862 UART: [ldev] SUBJECT.KEYID = 5
6,356,077 UART: [ldev] AUTHORITY.KEYID = 7
6,357,310 UART: [ldev] FE.KEYID = 1
6,368,208 UART: [ldev] Erasing FE.KEYID = 1
8,839,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,097 UART: [ldev] --
10,628,017 UART: [fwproc] Wait for Commands...
10,630,391 UART: [fwproc] Recv command 0x46574c44
10,632,489 UART: [fwproc] Recv'd Img size: 115304 bytes
14,045,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,119,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,188,417 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,510,514 >>> mbox cmd response: success
14,514,934 UART: [afmc] ++
14,515,520 UART: [afmc] CDI.KEYID = 6
14,516,431 UART: [afmc] SUBJECT.KEYID = 7
14,517,649 UART: [afmc] AUTHORITY.KEYID = 5
17,018,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,755,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,771,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,787,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,810,078 UART: [afmc] --
18,812,979 UART: [cold-reset] --
18,816,027 UART: [state] Locking Datavault
18,819,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,821,033 UART: [state] Locking ICCM
18,823,779 UART: [exit] Launching FMC @ 0x40000130
18,832,180 UART:
18,832,457 UART: Running Caliptra FMC ...
18,833,568 UART:
18,833,731 UART: [state] CFI Enabled
18,842,070 UART: [fht] FMC Alias Private Key: 7
20,599,702 UART: [art] Extend RT PCRs Done
20,600,927 UART: [art] Lock RT PCRs Done
20,602,550 UART: [art] Populate DV Done
20,608,068 UART: [fht] FMC Alias Private Key: 7
20,609,662 UART: [art] Derive CDI
20,610,478 UART: [art] Store in in slot 0x4
20,652,966 UART: [art] Derive Key Pair
20,653,966 UART: [art] Store priv key in slot 0x5
23,080,746 UART: [art] Derive Key Pair - Done
23,093,885 UART: [art] Signing Cert with AUTHO
23,095,214 UART: RITY.KEYID = 7
24,800,727 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,228 UART: [art] PUB.X = 5B8185CB73A92720DAD55EC49085D368FFB2ABBD325DD81603958FA4FA2EDFE07E0B4D5E9F1413C3DDEF994F6B4D030F
24,809,543 UART: [art] PUB.Y = D93B617AEC5770B5FE3FE5EC2AAB7ABA9702D89E5C46CF3E53CB4DF4132BAC9BEF27DABDD694BD5742E11FF8985F4663
24,816,833 UART: [art] SIG.R = 02606618DFA79F5179BD7489E2E9A04C2DE2AFB49A1818828EBEBA94B5B0934127501C145D2E7021CB56532A654B74B2
24,824,255 UART: [art] SIG.S = 24B19DCA2D9FFED10BD2F0F21641438F8F76AA6A2390CB6FF10286875D0B86C2552A82AA3EDAED3BD7BAA60E764897C8
25,802,565 UART: Caliptra RT
25,803,273 UART: [state] CFI Enabled
25,920,906 UART: [rt] RT listening for mailbox commands...
25,922,751 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,952,604 UART: [rt]cmd =0x46504c54, len=4
25,954,169 >>> mbox cmd response data (8 bytes)
25,955,296 UART: [rt] FIPS self test
25,956,245 UART: [kat] ++
25,956,734 UART: [kat] sha1
25,961,082 UART: [kat] SHA2-256
25,962,970 UART: [kat] SHA2-384
25,965,773 UART: [kat] SHA2-512-ACC
25,968,012 UART: [kat] ECC-384
25,970,019 UART: Fatal Error: 0x90040004
26,005,230 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,150,044 >>> mbox cmd response: failed
26,150,700 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,295,455 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,134 UART:
190,420 UART: Running Caliptra ROM ...
191,531 UART:
14,228,166 UART: [state] CFI Enabled
14,238,398 UART: [state] LifecycleState = Unprovisioned
14,240,259 UART: [state] DebugLocked = No
14,241,859 UART: [state] WD Timer not started. Device not locked for debugging
14,246,085 UART: [kat] SHA2-256
14,425,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,436,780 UART: [kat] ++
14,437,318 UART: [kat] sha1
14,447,526 UART: [kat] SHA2-256
14,450,550 UART: [kat] SHA2-384
14,456,911 UART: [kat] SHA2-512-ACC
14,459,895 UART: [kat] ECC-384
16,902,607 UART: [kat] HMAC-384Kdf
16,915,315 UART: [kat] LMS
17,444,766 UART: [kat] --
17,448,808 UART: [cold-reset] ++
17,451,171 UART: [fht] FHT @ 0x50003400
17,462,093 UART: [idev] ++
17,462,655 UART: [idev] CDI.KEYID = 6
17,463,557 UART: [idev] SUBJECT.KEYID = 7
17,464,769 UART: [idev] UDS.KEYID = 0
17,466,278 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,611,040 UART: [idev] Erasing UDS.KEYID = 0
19,936,344 UART: [idev] Sha1 KeyId Algorithm
19,959,052 UART: [idev] --
19,962,614 UART: [ldev] ++
19,963,188 UART: [ldev] CDI.KEYID = 6
19,964,091 UART: [ldev] SUBJECT.KEYID = 5
19,965,254 UART: [ldev] AUTHORITY.KEYID = 7
19,966,483 UART: [ldev] FE.KEYID = 1
19,974,359 UART: [ldev] Erasing FE.KEYID = 1
22,446,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,164,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,180,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,196,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,212,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,233,142 UART: [ldev] --
24,238,144 UART: [fwproc] Wait for Commands...
24,239,863 UART: [fwproc] Recv command 0x46574c44
24,241,967 UART: [fwproc] Recv'd Img size: 115304 bytes
27,659,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,728,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,797,568 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,118,101 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,695,463 ready_for_fw is high
3,696,017 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,296,391 >>> mbox cmd response: success
18,546,371 UART:
18,546,815 UART: Running Caliptra FMC ...
18,547,936 UART:
18,548,096 UART: [state] CFI Enabled
18,555,979 UART: [fht] FMC Alias Private Key: 7
20,313,197 UART: [art] Extend RT PCRs Done
20,314,414 UART: [art] Lock RT PCRs Done
20,315,984 UART: [art] Populate DV Done
20,321,270 UART: [fht] FMC Alias Private Key: 7
20,322,862 UART: [art] Derive CDI
20,323,603 UART: [art] Store in in slot 0x4
20,366,263 UART: [art] Derive Key Pair
20,367,327 UART: [art] Store priv key in slot 0x5
22,794,621 UART: [art] Derive Key Pair - Done
22,807,368 UART: [art] Signing Cert with AUTHO
22,808,682 UART: RITY.KEYID = 7
24,513,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,515,233 UART: [art] PUB.X = DFBE435C08CFD1E7CB581BBFB4BB2DCC1C5CAC355B12C51728A129C3E3539F82A9B01D4E70C3CDF2139EEF9940C11722
24,522,515 UART: [art] PUB.Y = 989996DD670FBB7B53A0F2974B2106C3FFCF6CF9AC2892C85537505118B77D6102E98DA7DA1F527D7A81B2E0E5787364
24,529,729 UART: [art] SIG.R = 0504C05DB501956015C768301A767D91226C31833D5C9FFC99532676B22E404E18CD24BAB65E7BD676C787479B95355E
24,537,135 UART: [art] SIG.S = 8634A9004C54D937086FAE7413AEAE48AC30986F694CC4AB8DADAB0660830F4F6B017FA1B7E745D51D6E2C78C00ACFA0
25,516,153 UART: Caliptra RT
25,516,861 UART: [state] CFI Enabled
25,634,086 UART: [rt] RT listening for mailbox commands...
25,635,944 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,665,533 UART: [rt]cmd =0x46504c54, len=4
25,667,164 >>> mbox cmd response data (8 bytes)
25,668,267 UART: [rt] FIPS self test
25,669,208 UART: [kat] ++
25,669,663 UART: [kat] sha1
25,674,011 UART: [kat] SHA2-256
25,675,956 UART: [kat] SHA2-384
25,678,967 UART: [kat] SHA2-512-ACC
25,681,234 UART: [kat] ECC-384
25,683,343 UART: Fatal Error: 0x90040004
25,718,720 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,863,543 >>> mbox cmd response: failed
25,864,198 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,008,837 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,611,540 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,190,371 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,259 UART:
192,624 UART: Running Caliptra ROM ...
193,814 UART:
193,971 UART: [state] CFI Enabled
261,077 UART: [state] LifecycleState = Unprovisioned
263,439 UART: [state] DebugLocked = No
265,553 UART: [state] WD Timer not started. Device not locked for debugging
270,102 UART: [kat] SHA2-256
459,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,707 UART: [kat] ++
471,216 UART: [kat] sha1
483,827 UART: [kat] SHA2-256
486,833 UART: [kat] SHA2-384
492,550 UART: [kat] SHA2-512-ACC
495,136 UART: [kat] ECC-384
2,961,459 UART: [kat] HMAC-384Kdf
2,986,843 UART: [kat] LMS
3,518,555 UART: [kat] --
3,523,006 UART: [cold-reset] ++
3,525,092 UART: [fht] FHT @ 0x50003400
3,537,633 UART: [idev] ++
3,538,340 UART: [idev] CDI.KEYID = 6
3,539,327 UART: [idev] SUBJECT.KEYID = 7
3,540,505 UART: [idev] UDS.KEYID = 0
3,541,433 ready_for_fw is high
3,541,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,686,869 UART: [idev] Erasing UDS.KEYID = 0
6,049,532 UART: [idev] Sha1 KeyId Algorithm
6,073,582 UART: [idev] --
6,078,981 UART: [ldev] ++
6,079,708 UART: [ldev] CDI.KEYID = 6
6,080,626 UART: [ldev] SUBJECT.KEYID = 5
6,081,734 UART: [ldev] AUTHORITY.KEYID = 7
6,082,970 UART: [ldev] FE.KEYID = 1
6,115,173 UART: [ldev] Erasing FE.KEYID = 1
8,622,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,394 UART: [ldev] --
10,429,390 UART: [fwproc] Wait for Commands...
10,432,528 UART: [fwproc] Recv command 0x46574c44
10,434,843 UART: [fwproc] Recv'd Img size: 115304 bytes
13,896,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,970,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,086,707 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,635,443 >>> mbox cmd response: success
14,639,459 UART: [afmc] ++
14,640,163 UART: [afmc] CDI.KEYID = 6
14,641,350 UART: [afmc] SUBJECT.KEYID = 7
14,642,839 UART: [afmc] AUTHORITY.KEYID = 5
17,188,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,911,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,912,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,928,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,943,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,958,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,982,536 UART: [afmc] --
18,986,347 UART: [cold-reset] --
18,990,478 UART: [state] Locking Datavault
18,995,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,998,127 UART: [state] Locking ICCM
19,000,815 UART: [exit] Launching FMC @ 0x40000130
19,009,485 UART:
19,009,724 UART: Running Caliptra FMC ...
19,010,830 UART:
19,010,992 UART: [state] CFI Enabled
19,066,329 UART: [fht] FMC Alias Private Key: 7
20,829,904 UART: [art] Extend RT PCRs Done
20,831,103 UART: [art] Lock RT PCRs Done
20,833,038 UART: [art] Populate DV Done
20,838,771 UART: [fht] FMC Alias Private Key: 7
20,840,469 UART: [art] Derive CDI
20,841,223 UART: [art] Store in in slot 0x4
20,898,051 UART: [art] Derive Key Pair
20,899,118 UART: [art] Store priv key in slot 0x5
23,361,977 UART: [art] Derive Key Pair - Done
23,375,240 UART: [art] Signing Cert with AUTHO
23,376,538 UART: RITY.KEYID = 7
25,087,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,088,929 UART: [art] PUB.X = DD31AB50192738D993998789C03553078CCBDD170FFD60D1CC79E47FF9B5ED26FBEBF943A8E7D518682ED4E682806E59
25,096,243 UART: [art] PUB.Y = 7068E6C7FE73C7A1A49DA9447A5A7CF5B49AAA11F829D8D76D3A6196358F07F70A641AD9CD697207BB9AF6841613E3D9
25,103,493 UART: [art] SIG.R = 1F29BFE9FB146136B6AE60AE9D078771A0068BDBCA8DD60BB250C19009B035DDC7E69FC9949C611015DEA38A224316A1
25,110,839 UART: [art] SIG.S = 32E9848317981B112A226BB6C964AB4541485EE5F59DED891B7224E1DC65DC124D1BAF22F0143BA428FE5E526ADDE331
26,089,340 UART: Caliptra RT
26,090,031 UART: [state] CFI Enabled
26,254,577 UART: [rt] RT listening for mailbox commands...
26,256,421 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,286,157 UART: [rt]cmd =0x46504c54, len=4
26,287,912 >>> mbox cmd response data (8 bytes)
26,288,984 UART: [rt] FIPS self test
26,289,924 UART: [kat] ++
26,290,373 UART: [kat] sha1
26,294,716 UART: [kat] SHA2-256
26,296,648 UART: [kat] SHA2-384
26,299,528 UART: [kat] SHA2-512-ACC
26,301,757 UART: [kat] ECC-384
26,303,817 UART: Fatal Error: 0x90040004
26,339,189 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,484,483 >>> mbox cmd response: failed
26,485,154 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,629,759 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,016 UART:
190,337 UART: Running Caliptra ROM ...
191,364 UART:
191,502 UART: [state] CFI Enabled
269,326 UART: [state] LifecycleState = Unprovisioned
271,729 UART: [state] DebugLocked = No
272,968 UART: [state] WD Timer not started. Device not locked for debugging
277,129 UART: [kat] SHA2-256
466,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,778 UART: [kat] ++
478,224 UART: [kat] sha1
490,535 UART: [kat] SHA2-256
493,553 UART: [kat] SHA2-384
500,248 UART: [kat] SHA2-512-ACC
502,859 UART: [kat] ECC-384
2,953,698 UART: [kat] HMAC-384Kdf
2,974,266 UART: [kat] LMS
3,506,052 UART: [kat] --
3,510,488 UART: [cold-reset] ++
3,511,880 UART: [fht] FHT @ 0x50003400
3,523,784 UART: [idev] ++
3,524,657 UART: [idev] CDI.KEYID = 6
3,525,577 UART: [idev] SUBJECT.KEYID = 7
3,526,683 UART: [idev] UDS.KEYID = 0
3,528,191 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,673,015 UART: [idev] Erasing UDS.KEYID = 0
6,030,322 UART: [idev] Sha1 KeyId Algorithm
6,052,544 UART: [idev] --
6,057,788 UART: [ldev] ++
6,058,482 UART: [ldev] CDI.KEYID = 6
6,059,394 UART: [ldev] SUBJECT.KEYID = 5
6,060,610 UART: [ldev] AUTHORITY.KEYID = 7
6,061,794 UART: [ldev] FE.KEYID = 1
6,103,630 UART: [ldev] Erasing FE.KEYID = 1
8,608,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,599 UART: [ldev] --
10,418,330 UART: [fwproc] Wait for Commands...
10,420,537 UART: [fwproc] Recv command 0x46574c44
10,422,808 UART: [fwproc] Recv'd Img size: 115304 bytes
13,883,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,079,276 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,627,382 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,416,129 ready_for_fw is high
3,416,595 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,705,520 >>> mbox cmd response: success
19,002,755 UART:
19,003,212 UART: Running Caliptra FMC ...
19,004,346 UART:
19,004,513 UART: [state] CFI Enabled
19,071,749 UART: [fht] FMC Alias Private Key: 7
20,836,052 UART: [art] Extend RT PCRs Done
20,837,421 UART: [art] Lock RT PCRs Done
20,838,779 UART: [art] Populate DV Done
20,844,043 UART: [fht] FMC Alias Private Key: 7
20,845,755 UART: [art] Derive CDI
20,846,574 UART: [art] Store in in slot 0x4
20,904,329 UART: [art] Derive Key Pair
20,905,329 UART: [art] Store priv key in slot 0x5
23,368,395 UART: [art] Derive Key Pair - Done
23,381,125 UART: [art] Signing Cert with AUTHO
23,382,460 UART: RITY.KEYID = 7
25,094,298 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,813 UART: [art] PUB.X = B80A53101D5EF4FEB647C0D913B705DE644FD9C3CBFDDC45A72A5275F38E3B8850F4F5C12D2BD87AA7A88FA49FCC216B
25,103,126 UART: [art] PUB.Y = 4E0E879872EB3F6921C53B6CCC72BE561F2D7275477DABE8B47F6142CADE71CD3FF8DD02BE0F5D830A3E0DA36DA48CCB
25,110,368 UART: [art] SIG.R = D9E5A74AFA4D1AD898673F2CD0ADF03AE4B97C0666877B4AFE28676BA128B589EF7817AB92B4741D642FA60A348E720E
25,117,776 UART: [art] SIG.S = 96FF74F96C8C44007E80C2F32807299C0D2CDD51EE5B1416DA83BE545DF6CDDA9D516E9BFF124E651DEC0ED6F749F331
26,096,771 UART: Caliptra RT
26,097,498 UART: [state] CFI Enabled
26,262,268 UART: [rt] RT listening for mailbox commands...
26,264,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,293,795 UART: [rt]cmd =0x46504c54, len=4
26,295,522 >>> mbox cmd response data (8 bytes)
26,296,802 UART: [rt] FIPS self test
26,297,749 UART: [kat] ++
26,298,203 UART: [kat] sha1
26,302,477 UART: [kat] SHA2-256
26,304,431 UART: [kat] SHA2-384
26,307,499 UART: [kat] SHA2-512-ACC
26,309,718 UART: [kat] ECC-384
26,311,779 UART: Fatal Error: 0x90040004
26,346,995 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,491,821 >>> mbox cmd response: failed
26,492,480 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,637,225 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,422,302 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,739,159 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,510 UART:
192,870 UART: Running Caliptra ROM ...
193,970 UART:
603,556 UART: [state] CFI Enabled
618,223 UART: [state] LifecycleState = Unprovisioned
620,599 UART: [state] DebugLocked = No
621,911 UART: [state] WD Timer not started. Device not locked for debugging
626,306 UART: [kat] SHA2-256
816,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,946 UART: [kat] ++
827,557 UART: [kat] sha1
839,579 UART: [kat] SHA2-256
842,588 UART: [kat] SHA2-384
849,222 UART: [kat] SHA2-512-ACC
851,814 UART: [kat] ECC-384
3,294,273 UART: [kat] HMAC-384Kdf
3,306,891 UART: [kat] LMS
3,838,681 UART: [kat] --
3,842,489 UART: [cold-reset] ++
3,844,149 UART: [fht] FHT @ 0x50003400
3,856,342 UART: [idev] ++
3,857,048 UART: [idev] CDI.KEYID = 6
3,857,931 UART: [idev] SUBJECT.KEYID = 7
3,859,178 UART: [idev] UDS.KEYID = 0
3,860,099 ready_for_fw is high
3,860,305 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,005,139 UART: [idev] Erasing UDS.KEYID = 0
6,336,532 UART: [idev] Sha1 KeyId Algorithm
6,358,001 UART: [idev] --
6,362,434 UART: [ldev] ++
6,363,116 UART: [ldev] CDI.KEYID = 6
6,363,997 UART: [ldev] SUBJECT.KEYID = 5
6,365,171 UART: [ldev] AUTHORITY.KEYID = 7
6,366,407 UART: [ldev] FE.KEYID = 1
6,378,810 UART: [ldev] Erasing FE.KEYID = 1
8,854,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,762 UART: [ldev] --
10,646,902 UART: [fwproc] Wait for Commands...
10,649,330 UART: [fwproc] Recv command 0x46574c44
10,651,644 UART: [fwproc] Recv'd Img size: 115304 bytes
14,111,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,112 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,849,498 >>> mbox cmd response: success
14,853,121 UART: [afmc] ++
14,853,816 UART: [afmc] CDI.KEYID = 6
14,854,925 UART: [afmc] SUBJECT.KEYID = 7
14,856,455 UART: [afmc] AUTHORITY.KEYID = 5
17,359,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,341 UART: [afmc] --
19,154,474 UART: [cold-reset] --
19,159,036 UART: [state] Locking Datavault
19,166,608 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,792 UART: [state] Locking ICCM
19,171,261 UART: [exit] Launching FMC @ 0x40000130
19,179,891 UART:
19,180,137 UART: Running Caliptra FMC ...
19,181,239 UART:
19,181,397 UART: [state] CFI Enabled
19,189,549 UART: [fht] FMC Alias Private Key: 7
20,946,568 UART: [art] Extend RT PCRs Done
20,947,784 UART: [art] Lock RT PCRs Done
20,949,066 UART: [art] Populate DV Done
20,954,322 UART: [fht] FMC Alias Private Key: 7
20,955,951 UART: [art] Derive CDI
20,956,778 UART: [art] Store in in slot 0x4
20,999,426 UART: [art] Derive Key Pair
21,000,429 UART: [art] Store priv key in slot 0x5
23,427,530 UART: [art] Derive Key Pair - Done
23,440,304 UART: [art] Signing Cert with AUTHO
23,441,643 UART: RITY.KEYID = 7
25,147,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,722 UART: [art] PUB.X = DFF94777D4DD2271F83517DD584C72E36B2E98D1A093D8EFEE2997853692DFE3FD65279EFAD3F360183AECB80DDA42EB
25,156,033 UART: [art] PUB.Y = 3D9FD9B1CFB7C58C3A308465A3DB7F86340467DE2BAC8D6867E010D49E0DD04284BB7AC569661C1971A0DEC0081120AB
25,163,272 UART: [art] SIG.R = 9921DCF4121D2477882135BFE5EC785504F67DF909927ED050E63ECA1B2A173A6654731AB062BD19279C0C78C386856F
25,170,665 UART: [art] SIG.S = 9B8868724EFFDDE36588F149610C4DB8591A635D5F9EAF655DE143A228D331A267F16C180DCB0D65EDD8B09DA6CBF9CE
26,150,140 UART: Caliptra RT
26,150,827 UART: [state] CFI Enabled
26,267,905 UART: [rt] RT listening for mailbox commands...
26,269,758 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,299,594 UART: [rt]cmd =0x46504c54, len=4
26,301,111 >>> mbox cmd response data (8 bytes)
26,302,054 UART: [rt] FIPS self test
26,302,997 UART: [kat] ++
26,303,449 UART: [kat] sha1
26,307,902 UART: [kat] SHA2-256
26,309,835 UART: [kat] SHA2-384
26,312,922 UART: [kat] SHA2-512-ACC
26,315,163 UART: [kat] ECC-384
26,317,023 UART: Fatal Error: 0x90040004
26,352,183 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,496,980 >>> mbox cmd response: failed
26,497,632 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,642,413 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,110 UART:
190,398 UART: Running Caliptra ROM ...
191,419 UART:
13,886,251 UART: [state] CFI Enabled
13,897,021 UART: [state] LifecycleState = Unprovisioned
13,899,417 UART: [state] DebugLocked = No
13,901,315 UART: [state] WD Timer not started. Device not locked for debugging
13,905,887 UART: [kat] SHA2-256
14,095,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,106,527 UART: [kat] ++
14,107,123 UART: [kat] sha1
14,118,825 UART: [kat] SHA2-256
14,121,842 UART: [kat] SHA2-384
14,128,472 UART: [kat] SHA2-512-ACC
14,131,089 UART: [kat] ECC-384
16,570,693 UART: [kat] HMAC-384Kdf
16,585,193 UART: [kat] LMS
17,117,007 UART: [kat] --
17,120,733 UART: [cold-reset] ++
17,121,851 UART: [fht] FHT @ 0x50003400
17,133,345 UART: [idev] ++
17,134,066 UART: [idev] CDI.KEYID = 6
17,135,002 UART: [idev] SUBJECT.KEYID = 7
17,136,237 UART: [idev] UDS.KEYID = 0
17,137,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,282,499 UART: [idev] Erasing UDS.KEYID = 0
19,614,210 UART: [idev] Sha1 KeyId Algorithm
19,636,355 UART: [idev] --
19,642,561 UART: [ldev] ++
19,643,239 UART: [ldev] CDI.KEYID = 6
19,644,121 UART: [ldev] SUBJECT.KEYID = 5
19,645,330 UART: [ldev] AUTHORITY.KEYID = 7
19,646,557 UART: [ldev] FE.KEYID = 1
19,657,192 UART: [ldev] Erasing FE.KEYID = 1
22,133,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,853,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,868,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,884,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,899,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,920,668 UART: [ldev] --
23,926,161 UART: [fwproc] Wait for Commands...
23,929,016 UART: [fwproc] Recv command 0x46574c44
23,931,284 UART: [fwproc] Recv'd Img size: 115304 bytes
27,386,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,469,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,585,411 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,133,685 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,754,260 ready_for_fw is high
3,754,672 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,978,975 >>> mbox cmd response: success
19,227,260 UART:
19,227,663 UART: Running Caliptra FMC ...
19,228,770 UART:
19,228,930 UART: [state] CFI Enabled
19,236,991 UART: [fht] FMC Alias Private Key: 7
20,994,135 UART: [art] Extend RT PCRs Done
20,995,360 UART: [art] Lock RT PCRs Done
20,997,044 UART: [art] Populate DV Done
21,002,623 UART: [fht] FMC Alias Private Key: 7
21,004,224 UART: [art] Derive CDI
21,005,048 UART: [art] Store in in slot 0x4
21,047,554 UART: [art] Derive Key Pair
21,048,622 UART: [art] Store priv key in slot 0x5
23,475,359 UART: [art] Derive Key Pair - Done
23,488,144 UART: [art] Signing Cert with AUTHO
23,489,480 UART: RITY.KEYID = 7
25,194,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,333 UART: [art] PUB.X = C8592AE8E462B294F81409E542CBB20D66BF71E1FDBA1CC8C326CF801967E6DB2B70559BB3F52FE1EE47DDB45D71B850
25,203,646 UART: [art] PUB.Y = 3CD2BFE0FE439E595DDB100B4C4A531A8AA25A44A401E9B8A8F4642CB30CEE27913ED55E609A7E56400C74368D1FE36F
25,210,861 UART: [art] SIG.R = 3C7314D18CDDE78226329C3CE33447320BFB0F5854BC1F42C4777DC6CB25AD7C594F83CE78DFE6679382A1D6A19E5D98
25,218,266 UART: [art] SIG.S = 6F8CCF9FBDC8384E4FA7F1D6286DBF482EE4B930EACF38FFB58B2DF8467156C8CB2FD96A75387681AEE8E9F8E887358B
26,197,167 UART: Caliptra RT
26,197,890 UART: [state] CFI Enabled
26,314,977 UART: [rt] RT listening for mailbox commands...
26,316,834 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,525 UART: [rt]cmd =0x46504c54, len=4
26,348,103 >>> mbox cmd response data (8 bytes)
26,348,940 UART: [rt] FIPS self test
26,349,902 UART: [kat] ++
26,350,354 UART: [kat] sha1
26,354,810 UART: [kat] SHA2-256
26,356,740 UART: [kat] SHA2-384
26,359,542 UART: [kat] SHA2-512-ACC
26,361,812 UART: [kat] ECC-384
26,363,652 UART: Fatal Error: 0x90040004
26,399,046 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,543,919 >>> mbox cmd response: failed
26,544,531 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,689,264 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
16,993,400 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,205,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,301 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 ready_for_fw is high
1,481,041 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,964 UART: [idev] Erasing UDS.KEYID = 0
1,505,272 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,102 UART: [idev] --
1,515,377 UART: [ldev] ++
1,515,545 UART: [ldev] CDI.KEYID = 6
1,515,908 UART: [ldev] SUBJECT.KEYID = 5
1,516,334 UART: [ldev] AUTHORITY.KEYID = 7
1,516,797 UART: [ldev] FE.KEYID = 1
1,522,271 UART: [ldev] Erasing FE.KEYID = 1
1,547,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,418 UART: [ldev] --
1,586,719 UART: [fwproc] Waiting for Commands...
1,587,442 UART: [fwproc] Received command 0x46574c44
1,588,233 UART: [fwproc] Received Image of size 115304 bytes
2,898,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,097 >>> mbox cmd response: success
3,093,281 UART: [afmc] ++
3,093,449 UART: [afmc] CDI.KEYID = 6
3,093,811 UART: [afmc] SUBJECT.KEYID = 7
3,094,236 UART: [afmc] AUTHORITY.KEYID = 5
3,128,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,615 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,500 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,190 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,061 UART: [afmc] --
3,172,017 UART: [cold-reset] --
3,172,783 UART: [state] Locking Datavault
3,173,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,206 UART: [state] Locking ICCM
3,174,860 UART: [exit] Launching FMC @ 0x40000130
3,180,189 UART:
3,180,205 UART: Running Caliptra FMC ...
3,180,613 UART:
3,180,667 UART: [state] CFI Enabled
3,191,212 UART: [fht] FMC Alias Private Key: 7
3,299,073 UART: [art] Extend RT PCRs Done
3,299,501 UART: [art] Lock RT PCRs Done
3,301,143 UART: [art] Populate DV Done
3,309,264 UART: [fht] FMC Alias Private Key: 7
3,310,312 UART: [art] Derive CDI
3,310,592 UART: [art] Store in in slot 0x4
3,395,731 UART: [art] Derive Key Pair
3,396,091 UART: [art] Store priv key in slot 0x5
3,409,271 UART: [art] Derive Key Pair - Done
3,424,180 UART: [art] Signing Cert with AUTHO
3,424,660 UART: RITY.KEYID = 7
3,439,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,719 UART: [art] PUB.X = 3ED528EDF3155B26646796FEA114735100768D97338B6C9DA54C8874F7B877BB0704154676695CA2D83F762060972A58
3,447,447 UART: [art] PUB.Y = 9E4EE160867A2BA9F22F05ECD6E530C93E19CBFDB55031EB720BA1DADBDA9B1055C5F625F6134C00050FDABB3F092216
3,454,378 UART: [art] SIG.R = BA2CB428725E6E64E6E5683931F8DA4D8F75D4CDD84A223747BE2AAC4F9F67658817FE3170DAD5C484BB980F5722AE68
3,461,155 UART: [art] SIG.S = 4A7141BE7C9D1961FA55B1E453A42EFE1234E327D5C54C9082375A5D24D6EFC38B1DB331A6295DAD238EDF7653760197
3,484,933 UART: Caliptra RT
3,485,186 UART: [state] CFI Enabled
3,593,669 UART: [rt] RT listening for mailbox commands...
3,594,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,235 UART: [rt]cmd =0x46504c54, len=4
3,625,286 >>> mbox cmd response data (8 bytes)
3,625,513 UART: [rt] FIPS self test
3,625,841 UART: [kat] ++
3,625,993 UART: [kat] sha1
3,630,143 UART: [kat] SHA2-256
3,632,165 UART: [kat] SHA2-384
3,634,828 UART: [kat] SHA2-512-ACC
3,636,755 UART: [kat] ECC-384
3,638,288 UART: Fatal Error: 0x90040004
3,639,838 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,843 >>> mbox cmd response: failed
3,639,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,199 UART: [kat] SHA2-256
892,137 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,505,348 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,138 UART: [idev] --
1,515,117 UART: [ldev] ++
1,515,285 UART: [ldev] CDI.KEYID = 6
1,515,648 UART: [ldev] SUBJECT.KEYID = 5
1,516,074 UART: [ldev] AUTHORITY.KEYID = 7
1,516,537 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,546,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,888 UART: [ldev] --
1,586,153 UART: [fwproc] Waiting for Commands...
1,586,912 UART: [fwproc] Received command 0x46574c44
1,587,703 UART: [fwproc] Received Image of size 115304 bytes
2,897,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,029 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,455 ready_for_fw is high
1,362,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,201 >>> mbox cmd response: success
3,001,955 UART:
3,001,971 UART: Running Caliptra FMC ...
3,002,379 UART:
3,002,433 UART: [state] CFI Enabled
3,012,882 UART: [fht] FMC Alias Private Key: 7
3,120,743 UART: [art] Extend RT PCRs Done
3,121,171 UART: [art] Lock RT PCRs Done
3,122,667 UART: [art] Populate DV Done
3,130,942 UART: [fht] FMC Alias Private Key: 7
3,132,070 UART: [art] Derive CDI
3,132,350 UART: [art] Store in in slot 0x4
3,218,265 UART: [art] Derive Key Pair
3,218,625 UART: [art] Store priv key in slot 0x5
3,231,349 UART: [art] Derive Key Pair - Done
3,246,173 UART: [art] Signing Cert with AUTHO
3,246,653 UART: RITY.KEYID = 7
3,262,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,792 UART: [art] PUB.X = A780957FB31689629C6D37BE7078C47FEC5997893E5E02A69CA550D979487485178EAAA23EA0558F340DCACB1C7ADC0C
3,269,559 UART: [art] PUB.Y = 5AF72739F6E7B3AD7956BD1748B811E3A92B1B60D0F3E077051D14A2CBD20989FEDF41E12360B7B37C40647A65950BF1
3,276,504 UART: [art] SIG.R = BF1600EC13DEF93B33A2F9C866961B72F7C18E703C3BC00228D8541BE7A97B521491D2496D817EA06C4F635F91E98AC8
3,283,253 UART: [art] SIG.S = 792A54169C351C33A770E6B516C1076014026CDB5DD23F76E2C34E9E218922E0FCDE554B161D3B7ECE024B1273D4FE77
3,307,201 UART: Caliptra RT
3,307,454 UART: [state] CFI Enabled
3,415,719 UART: [rt] RT listening for mailbox commands...
3,416,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,415 UART: [rt]cmd =0x46504c54, len=4
3,447,516 >>> mbox cmd response data (8 bytes)
3,447,739 UART: [rt] FIPS self test
3,448,067 UART: [kat] ++
3,448,219 UART: [kat] sha1
3,452,507 UART: [kat] SHA2-256
3,454,529 UART: [kat] SHA2-384
3,457,452 UART: [kat] SHA2-512-ACC
3,459,379 UART: [kat] ECC-384
3,461,066 UART: Fatal Error: 0x90040004
3,462,616 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,621 >>> mbox cmd response: failed
3,462,621 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,225 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,838 UART: [kat] SHA2-256
881,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,884 UART: [kat] ++
886,036 UART: [kat] sha1
890,174 UART: [kat] SHA2-256
892,112 UART: [kat] SHA2-384
894,799 UART: [kat] SHA2-512-ACC
896,700 UART: [kat] ECC-384
902,373 UART: [kat] HMAC-384Kdf
906,931 UART: [kat] LMS
1,475,127 UART: [kat] --
1,476,272 UART: [cold-reset] ++
1,476,834 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,707 UART: [idev] Erasing UDS.KEYID = 0
1,505,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,953 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,279 UART: [ldev] --
1,586,702 UART: [fwproc] Waiting for Commands...
1,587,565 UART: [fwproc] Received command 0x46574c44
1,588,356 UART: [fwproc] Received Image of size 115304 bytes
2,899,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,003 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,626 >>> mbox cmd response: success
3,093,670 UART: [afmc] ++
3,093,838 UART: [afmc] CDI.KEYID = 6
3,094,200 UART: [afmc] SUBJECT.KEYID = 7
3,094,625 UART: [afmc] AUTHORITY.KEYID = 5
3,129,816 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,705 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,395 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,262 UART: [afmc] --
3,173,358 UART: [cold-reset] --
3,174,130 UART: [state] Locking Datavault
3,175,179 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,783 UART: [state] Locking ICCM
3,176,403 UART: [exit] Launching FMC @ 0x40000130
3,181,732 UART:
3,181,748 UART: Running Caliptra FMC ...
3,182,156 UART:
3,182,299 UART: [state] CFI Enabled
3,192,624 UART: [fht] FMC Alias Private Key: 7
3,300,239 UART: [art] Extend RT PCRs Done
3,300,667 UART: [art] Lock RT PCRs Done
3,302,039 UART: [art] Populate DV Done
3,310,532 UART: [fht] FMC Alias Private Key: 7
3,311,624 UART: [art] Derive CDI
3,311,904 UART: [art] Store in in slot 0x4
3,397,799 UART: [art] Derive Key Pair
3,398,159 UART: [art] Store priv key in slot 0x5
3,411,301 UART: [art] Derive Key Pair - Done
3,426,087 UART: [art] Signing Cert with AUTHO
3,426,567 UART: RITY.KEYID = 7
3,441,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,496 UART: [art] PUB.X = 2E442C3DFAD08B3B64472378A34EFDBCA1D84A710686FD357DDCDFF8AA65745416ED4F7A97D7AAE01D738C5DFE2571CC
3,449,285 UART: [art] PUB.Y = 72BCB597052EEF28E8EF9D7B92909450E0268232632DD43974C71B3E73D0C25C89AC227BAED0AEE3C111B404546C0328
3,456,228 UART: [art] SIG.R = D565FF2317968CA9606F8BDF89A028689DAADA403BE70278B68C4F42C08B0460FBEAC18B8D4958E07DE739C802F96C86
3,462,997 UART: [art] SIG.S = B9C522133787FA8DD3DCC70DEDB3D2D7B451A5A74FFDFE191A00DFFBB5D17A01E62ABA22A3F4D711ACA0D136B60F6279
3,486,985 UART: Caliptra RT
3,487,330 UART: [state] CFI Enabled
3,595,636 UART: [rt] RT listening for mailbox commands...
3,596,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,386 UART: [rt]cmd =0x46504c54, len=4
3,627,423 >>> mbox cmd response data (8 bytes)
3,627,706 UART: [rt] FIPS self test
3,628,034 UART: [kat] ++
3,628,186 UART: [kat] sha1
3,632,398 UART: [kat] SHA2-256
3,634,420 UART: [kat] SHA2-384
3,637,217 UART: [kat] SHA2-512-ACC
3,639,144 UART: [kat] ECC-384
3,640,999 UART: Fatal Error: 0x90040004
3,642,549 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,554 >>> mbox cmd response: failed
3,642,554 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,802 UART: [kat] SHA2-256
892,740 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,115 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,944 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,177 UART: [idev] ++
1,480,345 UART: [idev] CDI.KEYID = 6
1,480,705 UART: [idev] SUBJECT.KEYID = 7
1,481,129 UART: [idev] UDS.KEYID = 0
1,481,474 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,661 UART: [idev] --
1,515,904 UART: [ldev] ++
1,516,072 UART: [ldev] CDI.KEYID = 6
1,516,435 UART: [ldev] SUBJECT.KEYID = 5
1,516,861 UART: [ldev] AUTHORITY.KEYID = 7
1,517,324 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,347 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,473 UART: [fwproc] Received command 0x46574c44
1,588,264 UART: [fwproc] Received Image of size 115304 bytes
2,899,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,754 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,262 ready_for_fw is high
1,363,262 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,726 >>> mbox cmd response: success
3,003,494 UART:
3,003,510 UART: Running Caliptra FMC ...
3,003,918 UART:
3,004,061 UART: [state] CFI Enabled
3,014,908 UART: [fht] FMC Alias Private Key: 7
3,122,407 UART: [art] Extend RT PCRs Done
3,122,835 UART: [art] Lock RT PCRs Done
3,124,451 UART: [art] Populate DV Done
3,132,816 UART: [fht] FMC Alias Private Key: 7
3,133,784 UART: [art] Derive CDI
3,134,064 UART: [art] Store in in slot 0x4
3,219,657 UART: [art] Derive Key Pair
3,220,017 UART: [art] Store priv key in slot 0x5
3,233,733 UART: [art] Derive Key Pair - Done
3,248,619 UART: [art] Signing Cert with AUTHO
3,249,099 UART: RITY.KEYID = 7
3,264,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,104 UART: [art] PUB.X = 91F7FFCB177113EB3006C50B26304D86E6F5B3DF839A82811DA6F0FA9CB1CE433911D4951D2A0C1E9E9121A41B5151AA
3,271,873 UART: [art] PUB.Y = 93B718AF8E0598FDBCDCF9DBB3704E0C4B4AF773448ED07314DC66FE14F8EAEEEE5A9DE89380C2DF989875C602130F1D
3,278,831 UART: [art] SIG.R = 123DDB4C8CBD952274CC3E6FE7DAD86C464817BD2544306CCA6A3088797E9566446EB8627CDF74818FA494F3BBC630E7
3,285,609 UART: [art] SIG.S = 7D76FAAFDDAA60654ADE94037CC11FAB00A3FF070F65C85DA8B5E23B11E6B9B823AB76E2981848F1A17A4484B381122D
3,309,863 UART: Caliptra RT
3,310,208 UART: [state] CFI Enabled
3,418,674 UART: [rt] RT listening for mailbox commands...
3,419,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,074 UART: [rt]cmd =0x46504c54, len=4
3,450,325 >>> mbox cmd response data (8 bytes)
3,450,456 UART: [rt] FIPS self test
3,450,784 UART: [kat] ++
3,450,936 UART: [kat] sha1
3,455,348 UART: [kat] SHA2-256
3,457,370 UART: [kat] SHA2-384
3,460,065 UART: [kat] SHA2-512-ACC
3,461,992 UART: [kat] ECC-384
3,463,459 UART: Fatal Error: 0x90040004
3,465,009 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,465,014 >>> mbox cmd response: failed
3,465,014 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,465,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,812 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,801 UART: [kat] SHA2-256
903,741 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,708 UART: [kat] LMS
1,171,036 UART: [kat] --
1,172,149 UART: [cold-reset] ++
1,172,607 UART: [fht] FHT @ 0x50003400
1,175,152 UART: [idev] ++
1,175,320 UART: [idev] CDI.KEYID = 6
1,175,680 UART: [idev] SUBJECT.KEYID = 7
1,176,104 UART: [idev] UDS.KEYID = 0
1,176,449 ready_for_fw is high
1,176,449 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,877 UART: [idev] Sha1 KeyId Algorithm
1,209,357 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,892 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,203 UART: [ldev] --
1,282,588 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,029 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,190 >>> mbox cmd response: success
2,789,442 UART: [afmc] ++
2,789,610 UART: [afmc] CDI.KEYID = 6
2,789,972 UART: [afmc] SUBJECT.KEYID = 7
2,790,397 UART: [afmc] AUTHORITY.KEYID = 5
2,825,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,851 UART: [afmc] --
2,868,907 UART: [cold-reset] --
2,869,733 UART: [state] Locking Datavault
2,871,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,760 UART: [state] Locking ICCM
2,872,412 UART: [exit] Launching FMC @ 0x40000130
2,877,741 UART:
2,877,757 UART: Running Caliptra FMC ...
2,878,165 UART:
2,878,219 UART: [state] CFI Enabled
2,888,890 UART: [fht] FMC Alias Private Key: 7
2,997,427 UART: [art] Extend RT PCRs Done
2,997,855 UART: [art] Lock RT PCRs Done
2,999,533 UART: [art] Populate DV Done
3,007,504 UART: [fht] FMC Alias Private Key: 7
3,008,528 UART: [art] Derive CDI
3,008,808 UART: [art] Store in in slot 0x4
3,094,375 UART: [art] Derive Key Pair
3,094,735 UART: [art] Store priv key in slot 0x5
3,108,207 UART: [art] Derive Key Pair - Done
3,123,060 UART: [art] Signing Cert with AUTHO
3,123,540 UART: RITY.KEYID = 7
3,139,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,907 UART: [art] PUB.X = 4A6DCB53D36FF9AD241649B53E44676594373C18A73D6CB5BC25B9F9AEE5F1A9B36121689B70337B4728D01362E26452
3,146,675 UART: [art] PUB.Y = 21E677168B12B57FC5BD2B3CBD8776DDA02DC937C52E4A441E7403D1C68E797E82648D0A57009E9F9E2976AB2C94CDFC
3,153,607 UART: [art] SIG.R = 84F6E498B7A768A3A311103BBD9F7057CFFC00CDFA5631F2A2C0B86B3DC62D85D380499E243BABAC43C14D351D747702
3,160,362 UART: [art] SIG.S = A7BFCD658885323A5C0FB64A025BDE9ECDC24B6E67DEEE1723787F97748D0F6AE4C034BDC03123268E432A1C398E3437
3,184,672 UART: Caliptra RT
3,184,925 UART: [state] CFI Enabled
3,293,033 UART: [rt] RT listening for mailbox commands...
3,293,696 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,487 UART: [rt]cmd =0x46504c54, len=4
3,324,732 >>> mbox cmd response data (8 bytes)
3,325,013 UART: [rt] FIPS self test
3,325,341 UART: [kat] ++
3,325,493 UART: [kat] sha1
3,329,549 UART: [kat] SHA2-256
3,331,571 UART: [kat] SHA2-384
3,334,524 UART: [kat] SHA2-512-ACC
3,336,451 UART: [kat] ECC-384
3,338,132 UART: Fatal Error: 0x90040004
3,339,682 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,687 >>> mbox cmd response: failed
3,339,687 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,662 UART: [kat] SHA2-512-ACC
908,563 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,171,787 UART: [cold-reset] ++
1,172,361 UART: [fht] FHT @ 0x50003400
1,174,864 UART: [idev] ++
1,175,032 UART: [idev] CDI.KEYID = 6
1,175,392 UART: [idev] SUBJECT.KEYID = 7
1,175,816 UART: [idev] UDS.KEYID = 0
1,176,161 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,201,285 UART: [idev] Sha1 KeyId Algorithm
1,209,789 UART: [idev] --
1,210,903 UART: [ldev] ++
1,211,071 UART: [ldev] CDI.KEYID = 6
1,211,434 UART: [ldev] SUBJECT.KEYID = 5
1,211,860 UART: [ldev] AUTHORITY.KEYID = 7
1,212,323 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,743 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,283,924 UART: [fwproc] Recv command 0x46574c44
1,284,652 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,621 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,902 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,657 >>> mbox cmd response: success
2,701,425 UART:
2,701,441 UART: Running Caliptra FMC ...
2,701,849 UART:
2,701,903 UART: [state] CFI Enabled
2,712,604 UART: [fht] FMC Alias Private Key: 7
2,820,307 UART: [art] Extend RT PCRs Done
2,820,735 UART: [art] Lock RT PCRs Done
2,822,005 UART: [art] Populate DV Done
2,830,238 UART: [fht] FMC Alias Private Key: 7
2,831,316 UART: [art] Derive CDI
2,831,596 UART: [art] Store in in slot 0x4
2,917,013 UART: [art] Derive Key Pair
2,917,373 UART: [art] Store priv key in slot 0x5
2,929,671 UART: [art] Derive Key Pair - Done
2,944,382 UART: [art] Signing Cert with AUTHO
2,944,862 UART: RITY.KEYID = 7
2,960,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,829 UART: [art] PUB.X = 5AB4EF890C6D3275027B2BA2460FD28591B67D658CD0D6D50B503346FC356147D53B00728DC53BD535CA382E187E601B
2,967,565 UART: [art] PUB.Y = 698542D45A3D91EFF94C2ECC2A14A0028851C0C67E059088B679AF787C08A42EDEBB26C427BAA61DB0F057B8A06C1305
2,974,511 UART: [art] SIG.R = B0CE967F6409EA72114FF406D1E55B8EDBE87EA4E72C4AE705AFB96BC5463918B750F8FE28CBC5E7554FE9FD5916C488
2,981,288 UART: [art] SIG.S = A011827C4B9A2CD7EA4EF816C19B9B8D0276C9BA999CCD2D79A3A3D22606171216DEE7BD8D30EE2061E139171D30340C
3,005,172 UART: Caliptra RT
3,005,425 UART: [state] CFI Enabled
3,113,883 UART: [rt] RT listening for mailbox commands...
3,114,546 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,567 UART: [rt]cmd =0x46504c54, len=4
3,145,784 >>> mbox cmd response data (8 bytes)
3,146,025 UART: [rt] FIPS self test
3,146,353 UART: [kat] ++
3,146,505 UART: [kat] sha1
3,150,673 UART: [kat] SHA2-256
3,152,695 UART: [kat] SHA2-384
3,155,564 UART: [kat] SHA2-512-ACC
3,157,491 UART: [kat] ECC-384
3,159,308 UART: Fatal Error: 0x90040004
3,160,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,863 >>> mbox cmd response: failed
3,160,863 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,499 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,049 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,172,132 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
1,176,584 ready_for_fw is high
1,176,584 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,435 UART: [idev] Erasing UDS.KEYID = 0
1,202,016 UART: [idev] Sha1 KeyId Algorithm
1,210,352 UART: [idev] --
1,211,206 UART: [ldev] ++
1,211,374 UART: [ldev] CDI.KEYID = 6
1,211,737 UART: [ldev] SUBJECT.KEYID = 5
1,212,163 UART: [ldev] AUTHORITY.KEYID = 7
1,212,626 UART: [ldev] FE.KEYID = 1
1,217,926 UART: [ldev] Erasing FE.KEYID = 1
1,244,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,628 UART: [ldev] --
1,283,971 UART: [fwproc] Wait for Commands...
1,284,745 UART: [fwproc] Recv command 0x46574c44
1,285,473 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,360 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,559 >>> mbox cmd response: success
2,790,641 UART: [afmc] ++
2,790,809 UART: [afmc] CDI.KEYID = 6
2,791,171 UART: [afmc] SUBJECT.KEYID = 7
2,791,596 UART: [afmc] AUTHORITY.KEYID = 5
2,826,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,672 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,590 UART: [afmc] --
2,870,574 UART: [cold-reset] --
2,871,274 UART: [state] Locking Datavault
2,872,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,251 UART: [state] Locking ICCM
2,873,677 UART: [exit] Launching FMC @ 0x40000130
2,879,006 UART:
2,879,022 UART: Running Caliptra FMC ...
2,879,430 UART:
2,879,573 UART: [state] CFI Enabled
2,890,360 UART: [fht] FMC Alias Private Key: 7
2,998,773 UART: [art] Extend RT PCRs Done
2,999,201 UART: [art] Lock RT PCRs Done
3,000,545 UART: [art] Populate DV Done
3,008,886 UART: [fht] FMC Alias Private Key: 7
3,009,858 UART: [art] Derive CDI
3,010,138 UART: [art] Store in in slot 0x4
3,095,729 UART: [art] Derive Key Pair
3,096,089 UART: [art] Store priv key in slot 0x5
3,109,313 UART: [art] Derive Key Pair - Done
3,124,268 UART: [art] Signing Cert with AUTHO
3,124,748 UART: RITY.KEYID = 7
3,139,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,111 UART: [art] PUB.X = 661FCB71C16823B4B9FEB95F5CB3EE1601D3BBA86BA1876C7A51C27AE2CC92E3B141DE1E656A5C5B01D5D123BDA9CD38
3,146,897 UART: [art] PUB.Y = B6367401C8BA68FAB7A55297F683F0D93FDAE244E4BCB79EF8E1DC725BDFA4B442391B458CE11D324E8B2557CE33BAF4
3,153,862 UART: [art] SIG.R = F05CC67D088EBB479313B62A5CD5F17C6A7CB3711FCA572CB2ABD4311864AFA4F2078EA704E6AF553ABC5F0E3194BACF
3,160,642 UART: [art] SIG.S = F94C39C1565F58767A5E9F94952882A986F374A69A97BB85B8816690BD0937723378175217D8A2CC0D8803DE1AE05C87
3,185,092 UART: Caliptra RT
3,185,437 UART: [state] CFI Enabled
3,292,841 UART: [rt] RT listening for mailbox commands...
3,293,504 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,307 UART: [rt]cmd =0x46504c54, len=4
3,324,612 >>> mbox cmd response data (8 bytes)
3,324,797 UART: [rt] FIPS self test
3,325,125 UART: [kat] ++
3,325,277 UART: [kat] sha1
3,329,375 UART: [kat] SHA2-256
3,331,397 UART: [kat] SHA2-384
3,334,218 UART: [kat] SHA2-512-ACC
3,336,145 UART: [kat] ECC-384
3,337,448 UART: Fatal Error: 0x90040004
3,338,998 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,003 >>> mbox cmd response: failed
3,339,003 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,667 UART: [state] LifecycleState = Unprovisioned
85,322 UART: [state] DebugLocked = No
85,878 UART: [state] WD Timer not started. Device not locked for debugging
87,065 UART: [kat] SHA2-256
892,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,840 UART: [kat] ++
896,992 UART: [kat] sha1
901,246 UART: [kat] SHA2-256
903,186 UART: [kat] SHA2-384
905,839 UART: [kat] SHA2-512-ACC
907,740 UART: [kat] ECC-384
917,439 UART: [kat] HMAC-384Kdf
921,881 UART: [kat] LMS
1,170,209 UART: [kat] --
1,171,058 UART: [cold-reset] ++
1,171,522 UART: [fht] FHT @ 0x50003400
1,174,303 UART: [idev] ++
1,174,471 UART: [idev] CDI.KEYID = 6
1,174,831 UART: [idev] SUBJECT.KEYID = 7
1,175,255 UART: [idev] UDS.KEYID = 0
1,175,600 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,493 UART: [idev] Erasing UDS.KEYID = 0
1,200,946 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,096 UART: [ldev] Erasing FE.KEYID = 1
1,243,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,902 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,795 UART: [fwproc] Recv command 0x46574c44
1,284,523 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,638 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,835 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,056 ready_for_fw is high
1,061,056 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,828 >>> mbox cmd response: success
2,701,880 UART:
2,701,896 UART: Running Caliptra FMC ...
2,702,304 UART:
2,702,447 UART: [state] CFI Enabled
2,713,082 UART: [fht] FMC Alias Private Key: 7
2,821,417 UART: [art] Extend RT PCRs Done
2,821,845 UART: [art] Lock RT PCRs Done
2,823,553 UART: [art] Populate DV Done
2,831,968 UART: [fht] FMC Alias Private Key: 7
2,833,038 UART: [art] Derive CDI
2,833,318 UART: [art] Store in in slot 0x4
2,919,007 UART: [art] Derive Key Pair
2,919,367 UART: [art] Store priv key in slot 0x5
2,932,541 UART: [art] Derive Key Pair - Done
2,947,204 UART: [art] Signing Cert with AUTHO
2,947,684 UART: RITY.KEYID = 7
2,962,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,561 UART: [art] PUB.X = 63E0C5DEE4AAD5177CD125AD1AD9035EFA626BA46558845D306C6B6B2A87D8F1CE2F64B15FEAD57F7CFDF25CBF637354
2,970,350 UART: [art] PUB.Y = 02BE4F8F3C00101F409B3365A3707D694515A09EC08F35377CAC0A60481AD9EA8F4DE8928B5D335D70082AAE1E0D67EE
2,977,272 UART: [art] SIG.R = F55AFDDA3663C730CEE16A66C5A70C720276B2AAFB6EDE2DFA6049F2D3CDC572E472C57D5DEB6D7344859B0EFE236115
2,984,053 UART: [art] SIG.S = DF1BABF9FAAD38E969B2B8E7FEE37A4C5769CA92332F25366A673B380D25DB0AFA4B0328C9D6CD665677D3D5D071937C
3,008,135 UART: Caliptra RT
3,008,480 UART: [state] CFI Enabled
3,116,734 UART: [rt] RT listening for mailbox commands...
3,117,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,528 UART: [rt]cmd =0x46504c54, len=4
3,148,729 >>> mbox cmd response data (8 bytes)
3,148,846 UART: [rt] FIPS self test
3,149,174 UART: [kat] ++
3,149,326 UART: [kat] sha1
3,153,408 UART: [kat] SHA2-256
3,155,430 UART: [kat] SHA2-384
3,158,343 UART: [kat] SHA2-512-ACC
3,160,270 UART: [kat] ECC-384
3,161,841 UART: Fatal Error: 0x90040004
3,163,391 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,396 >>> mbox cmd response: failed
3,163,396 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,112 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,277 UART: [cold-reset] ++
1,170,655 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 ready_for_fw is high
1,174,515 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,091 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,242,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,356 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,928 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,326 >>> mbox cmd response: success
2,787,583 UART: [afmc] ++
2,787,751 UART: [afmc] CDI.KEYID = 6
2,788,114 UART: [afmc] SUBJECT.KEYID = 7
2,788,540 UART: [afmc] AUTHORITY.KEYID = 5
2,823,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,507 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,852 UART: [afmc] --
2,866,812 UART: [cold-reset] --
2,867,848 UART: [state] Locking Datavault
2,869,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,655 UART: [state] Locking ICCM
2,870,203 UART: [exit] Launching FMC @ 0x40000130
2,875,532 UART:
2,875,548 UART: Running Caliptra FMC ...
2,875,956 UART:
2,876,010 UART: [state] CFI Enabled
2,886,281 UART: [fht] FMC Alias Private Key: 7
2,994,066 UART: [art] Extend RT PCRs Done
2,994,494 UART: [art] Lock RT PCRs Done
2,995,846 UART: [art] Populate DV Done
3,004,107 UART: [fht] FMC Alias Private Key: 7
3,005,117 UART: [art] Derive CDI
3,005,397 UART: [art] Store in in slot 0x4
3,091,588 UART: [art] Derive Key Pair
3,091,948 UART: [art] Store priv key in slot 0x5
3,105,080 UART: [art] Derive Key Pair - Done
3,119,834 UART: [art] Signing Cert with AUTHO
3,120,314 UART: RITY.KEYID = 7
3,135,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,227 UART: [art] PUB.X = 52BD7F9EC414A0BB466F7EC1367F879E479B0696C732ACA3E15909D3D49F39E1E48C36BE96FC99DA7F1AFBDEB84B5B80
3,143,009 UART: [art] PUB.Y = F4BA001676239ABFCD936226282EA7D1B7E42F6977BC44F37F8DB654D10FFEF22D2D6BA37519270A20D1FB5B4A9A5647
3,149,941 UART: [art] SIG.R = D49913323B551BC441A11068F942A49D5A3AFC5E57340F9022EC03CEF7D464A73DEDEC6A709A7069C17A73FB8E8CFC3B
3,156,717 UART: [art] SIG.S = 2759C489A7761F3037679A91429A2371942F54A3D5BE098220081F219EC58657AF56716CFA742675F906B892C30DA67A
3,179,974 UART: Caliptra RT
3,180,227 UART: [state] CFI Enabled
3,287,974 UART: [rt] RT listening for mailbox commands...
3,288,637 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,414 UART: [rt]cmd =0x46504c54, len=4
3,319,547 >>> mbox cmd response data (8 bytes)
3,319,662 UART: [rt] FIPS self test
3,319,990 UART: [kat] ++
3,320,142 UART: [kat] sha1
3,324,288 UART: [kat] SHA2-256
3,326,310 UART: [kat] SHA2-384
3,329,047 UART: [kat] SHA2-512-ACC
3,330,974 UART: [kat] ECC-384
3,332,509 UART: Fatal Error: 0x90040004
3,334,059 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,064 >>> mbox cmd response: failed
3,334,064 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,174,225 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,079 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,902 UART: [ldev] ++
1,209,070 UART: [ldev] CDI.KEYID = 6
1,209,434 UART: [ldev] SUBJECT.KEYID = 5
1,209,861 UART: [ldev] AUTHORITY.KEYID = 7
1,210,324 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,682 UART: [ldev] --
1,280,990 UART: [fwproc] Wait for Commands...
1,281,583 UART: [fwproc] Recv command 0x46574c44
1,282,316 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,446 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,798 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,650 ready_for_fw is high
1,056,650 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,944 >>> mbox cmd response: success
2,697,084 UART:
2,697,100 UART: Running Caliptra FMC ...
2,697,508 UART:
2,697,562 UART: [state] CFI Enabled
2,707,657 UART: [fht] FMC Alias Private Key: 7
2,815,758 UART: [art] Extend RT PCRs Done
2,816,186 UART: [art] Lock RT PCRs Done
2,817,910 UART: [art] Populate DV Done
2,825,945 UART: [fht] FMC Alias Private Key: 7
2,827,021 UART: [art] Derive CDI
2,827,301 UART: [art] Store in in slot 0x4
2,913,110 UART: [art] Derive Key Pair
2,913,470 UART: [art] Store priv key in slot 0x5
2,926,674 UART: [art] Derive Key Pair - Done
2,941,497 UART: [art] Signing Cert with AUTHO
2,941,977 UART: RITY.KEYID = 7
2,957,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,960 UART: [art] PUB.X = 8A848AAFF003C53194F01388FEA120E2ECC0A71A0876CE72722CA85DDA09C80B03CCA9ABE3C895313F0CC350AAEA1D0E
2,964,729 UART: [art] PUB.Y = DD0441BFB761226FE8CA38E5218BC62DD92D7A32A92584F01CD7676AFDC95D92C6FB30E3ECD10BCA46F568CCC61EA365
2,971,693 UART: [art] SIG.R = D0CF5150113229189540BF622DA5525C64508173E327539FFAB7A03EE2100B88C122BC6FA8C1247975F1CB0F13F6A978
2,978,453 UART: [art] SIG.S = 721AED2512AE4C354D6057684D9B80AA1A85DAB717493E1F0804C038F0B98EABF5E7D7FBEFC230635A627A62D61B5399
3,002,096 UART: Caliptra RT
3,002,349 UART: [state] CFI Enabled
3,110,044 UART: [rt] RT listening for mailbox commands...
3,110,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,628 UART: [rt]cmd =0x46504c54, len=4
3,141,729 >>> mbox cmd response data (8 bytes)
3,142,010 UART: [rt] FIPS self test
3,142,338 UART: [kat] ++
3,142,490 UART: [kat] sha1
3,146,884 UART: [kat] SHA2-256
3,148,906 UART: [kat] SHA2-384
3,151,851 UART: [kat] SHA2-512-ACC
3,153,778 UART: [kat] ECC-384
3,155,267 UART: Fatal Error: 0x90040004
3,156,817 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,822 >>> mbox cmd response: failed
3,156,822 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,970 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 ready_for_fw is high
1,174,434 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,198,936 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,241,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,375 UART: [ldev] --
1,280,687 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,215 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,953 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,187 >>> mbox cmd response: success
2,787,220 UART: [afmc] ++
2,787,388 UART: [afmc] CDI.KEYID = 6
2,787,751 UART: [afmc] SUBJECT.KEYID = 7
2,788,177 UART: [afmc] AUTHORITY.KEYID = 5
2,823,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,383 UART: [afmc] --
2,867,355 UART: [cold-reset] --
2,868,261 UART: [state] Locking Datavault
2,869,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,952 UART: [state] Locking ICCM
2,870,470 UART: [exit] Launching FMC @ 0x40000130
2,875,799 UART:
2,875,815 UART: Running Caliptra FMC ...
2,876,223 UART:
2,876,366 UART: [state] CFI Enabled
2,886,793 UART: [fht] FMC Alias Private Key: 7
2,994,360 UART: [art] Extend RT PCRs Done
2,994,788 UART: [art] Lock RT PCRs Done
2,996,548 UART: [art] Populate DV Done
3,005,025 UART: [fht] FMC Alias Private Key: 7
3,006,139 UART: [art] Derive CDI
3,006,419 UART: [art] Store in in slot 0x4
3,092,276 UART: [art] Derive Key Pair
3,092,636 UART: [art] Store priv key in slot 0x5
3,105,804 UART: [art] Derive Key Pair - Done
3,120,859 UART: [art] Signing Cert with AUTHO
3,121,339 UART: RITY.KEYID = 7
3,136,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,230 UART: [art] PUB.X = 0FA23D07F169D6E03717825763C3C696F6B1BAC9C27F0D3E4E2AD6EDC12171428606A6B80A0ACFE28564F8F990F3F28A
3,143,990 UART: [art] PUB.Y = D11CDA3E94D9C8CB659D68D5F1B3C94EAEC6A820CC5F6B363C2E7709976F12247C78B9C6D9528C997F26FDFF78120862
3,150,944 UART: [art] SIG.R = 936566ECAC7D7EE8D600C79A6526996F1B6DFA91EEF551100BA0D69D78E09C0D041C183CA8422BA8EB7ACA4AA66B1D37
3,157,699 UART: [art] SIG.S = CC89076BAF82D6182FC1FBB1E4FA8F89C6493C9E57696EA272E999751A9B90C2562039ABE73F907AED04778407E765F9
3,181,391 UART: Caliptra RT
3,181,736 UART: [state] CFI Enabled
3,289,852 UART: [rt] RT listening for mailbox commands...
3,290,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,242 UART: [rt]cmd =0x46504c54, len=4
3,321,395 >>> mbox cmd response data (8 bytes)
3,321,748 UART: [rt] FIPS self test
3,322,076 UART: [kat] ++
3,322,228 UART: [kat] sha1
3,326,416 UART: [kat] SHA2-256
3,328,438 UART: [kat] SHA2-384
3,331,393 UART: [kat] SHA2-512-ACC
3,333,320 UART: [kat] ECC-384
3,334,911 UART: Fatal Error: 0x90040004
3,336,461 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,336,466 >>> mbox cmd response: failed
3,336,466 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,336,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,485 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,869 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,377 ready_for_fw is high
1,056,377 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,411 >>> mbox cmd response: success
2,697,893 UART:
2,697,909 UART: Running Caliptra FMC ...
2,698,317 UART:
2,698,460 UART: [state] CFI Enabled
2,709,321 UART: [fht] FMC Alias Private Key: 7
2,816,966 UART: [art] Extend RT PCRs Done
2,817,394 UART: [art] Lock RT PCRs Done
2,818,958 UART: [art] Populate DV Done
2,827,409 UART: [fht] FMC Alias Private Key: 7
2,828,559 UART: [art] Derive CDI
2,828,839 UART: [art] Store in in slot 0x4
2,914,478 UART: [art] Derive Key Pair
2,914,838 UART: [art] Store priv key in slot 0x5
2,928,394 UART: [art] Derive Key Pair - Done
2,943,084 UART: [art] Signing Cert with AUTHO
2,943,564 UART: RITY.KEYID = 7
2,958,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,467 UART: [art] PUB.X = 7B9CA57ACE3811F07729968DC923128D4F6547A105165231B438063C408DFA09C0ED5A47729D4C780C7F77EA5BFEC531
2,966,225 UART: [art] PUB.Y = C6DB7563B8BAAD95EAE8169F43ECE7FFAFE27FA8FFA5C888CEBCB7DD74CBD55C0F22EDD6F64F8B93123537428D9DE9EB
2,973,208 UART: [art] SIG.R = D322704E9FA657B578254B6266A6B4CB251D9080E3181A5D700C11B826BF09F2E8BE3EBAA568DD1637D2A0BB2C756117
2,979,976 UART: [art] SIG.S = BE45D22326B3549BBF7D230F200CD2D60A486170EADAC5B7680C2016E22EA0C5BD6C6FFA4EA496645B4FDFB0BE68FEDC
3,003,555 UART: Caliptra RT
3,003,900 UART: [state] CFI Enabled
3,112,222 UART: [rt] RT listening for mailbox commands...
3,112,885 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,934 UART: [rt]cmd =0x46504c54, len=4
3,144,269 >>> mbox cmd response data (8 bytes)
3,144,484 UART: [rt] FIPS self test
3,144,812 UART: [kat] ++
3,144,964 UART: [kat] sha1
3,149,262 UART: [kat] SHA2-256
3,151,284 UART: [kat] SHA2-384
3,154,201 UART: [kat] SHA2-512-ACC
3,156,128 UART: [kat] ECC-384
3,157,883 UART: Fatal Error: 0x90040004
3,159,433 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,438 >>> mbox cmd response: failed
3,159,438 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,225 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,293 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
5,970,532 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,114,737 >>> mbox cmd response: failed
6,115,287 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,258,634 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
4,867,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,443,517 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
5,971,132 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,115,353 >>> mbox cmd response: failed
6,115,921 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,259,130 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
4,861,458 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,440,156 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
6,287,558 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,431,759 >>> mbox cmd response: failed
6,432,333 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,575,502 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
18,471,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,906,659 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
6,298,198 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,443,108 >>> mbox cmd response: failed
6,443,710 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,587,079 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
18,469,278 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,901,888 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
5,193,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,338,574 >>> mbox cmd response: failed
5,339,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,482,728 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,460,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,430 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
5,191,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,335,719 >>> mbox cmd response: failed
5,336,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,480,047 >>> mbox cmd response: failed
Initializing fuses
992 writing to cptra_bootfsm_go
3,461,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,549 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
5,489,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,633,844 >>> mbox cmd response: failed
5,634,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,778,206 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
17,886,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,604,883 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
5,510,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,654,897 >>> mbox cmd response: failed
5,655,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,799,220 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,859,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,597,234 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
5,165,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,310,199 >>> mbox cmd response: failed
5,310,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,455,124 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,424,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,217,377 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,776 writing to cptra_bootfsm_go
5,153,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,298,022 >>> mbox cmd response: failed
5,298,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,442,341 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,456,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,134 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
5,502,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,647,186 >>> mbox cmd response: failed
5,647,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,791,488 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,847,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,594,480 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
5,508,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,653,167 >>> mbox cmd response: failed
5,653,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,797,497 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
17,850,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,579,472 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,928 >>> mbox cmd response: failed
822,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,164 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,080 >>> mbox cmd response: failed
822,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,714 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,715 >>> mbox cmd response: failed
822,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,797 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,369 >>> mbox cmd response: failed
822,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,651 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,412 >>> mbox cmd response: failed
821,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,232 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,132 >>> mbox cmd response: failed
822,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,962 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,197 >>> mbox cmd response: failed
822,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,195 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,205 >>> mbox cmd response: failed
823,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,185 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,872 >>> mbox cmd response: failed
821,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,572 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,754 >>> mbox cmd response: failed
821,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,432 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,571 >>> mbox cmd response: failed
822,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,393 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,693 >>> mbox cmd response: failed
822,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,423 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,182 UART:
192,555 UART: Running Caliptra ROM ...
193,853 UART:
194,007 UART: [state] CFI Enabled
263,808 UART: [state] LifecycleState = Unprovisioned
265,804 UART: [state] DebugLocked = No
267,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,136 UART: [kat] SHA2-256
442,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,331 UART: [kat] ++
453,812 UART: [kat] sha1
464,832 UART: [kat] SHA2-256
467,486 UART: [kat] SHA2-384
473,264 UART: [kat] SHA2-512-ACC
475,658 UART: [kat] ECC-384
2,767,264 UART: [kat] HMAC-384Kdf
2,778,523 UART: [kat] LMS
3,968,843 UART: [kat] --
3,974,038 UART: [cold-reset] ++
3,976,256 UART: [fht] Storing FHT @ 0x50003400
3,987,603 UART: [idev] ++
3,988,238 UART: [idev] CDI.KEYID = 6
3,989,120 UART: [idev] SUBJECT.KEYID = 7
3,990,364 UART: [idev] UDS.KEYID = 0
3,991,361 ready_for_fw is high
3,991,564 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,136,569 UART: [idev] Erasing UDS.KEYID = 0
7,326,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,888 UART: [idev] --
7,352,665 UART: [ldev] ++
7,353,312 UART: [ldev] CDI.KEYID = 6
7,354,197 UART: [ldev] SUBJECT.KEYID = 5
7,355,465 UART: [ldev] AUTHORITY.KEYID = 7
7,356,698 UART: [ldev] FE.KEYID = 1
7,402,317 UART: [ldev] Erasing FE.KEYID = 1
10,734,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,116 UART: [ldev] --
13,094,993 UART: [fwproc] Waiting for Commands...
13,098,235 UART: [fwproc] Received command 0x46574c44
13,100,424 UART: [fwproc] Received Image of size 114996 bytes
17,163,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,331 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,627,410 >>> mbox cmd response: success
17,631,305 UART: [afmc] ++
17,631,903 UART: [afmc] CDI.KEYID = 6
17,632,793 UART: [afmc] SUBJECT.KEYID = 7
17,634,066 UART: [afmc] AUTHORITY.KEYID = 5
20,986,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,290,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,280 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,658 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,514 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,976 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,426 UART: [afmc] --
23,359,868 UART: [cold-reset] --
23,364,437 UART: [state] Locking Datavault
23,369,522 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,297 UART: [state] Locking ICCM
23,373,663 UART: [exit] Launching FMC @ 0x40000130
23,382,055 UART:
23,382,293 UART: Running Caliptra FMC ...
23,383,394 UART:
23,383,550 UART: [state] CFI Enabled
23,448,408 UART: [fht] FMC Alias Private Key: 7
25,786,599 UART: [art] Extend RT PCRs Done
25,787,822 UART: [art] Lock RT PCRs Done
25,789,260 UART: [art] Populate DV Done
25,794,619 UART: [fht] FMC Alias Private Key: 7
25,796,210 UART: [art] Derive CDI
25,797,028 UART: [art] Store in in slot 0x4
25,857,750 UART: [art] Derive Key Pair
25,858,791 UART: [art] Store priv key in slot 0x5
29,151,521 UART: [art] Derive Key Pair - Done
29,164,487 UART: [art] Signing Cert with AUTHO
29,165,798 UART: RITY.KEYID = 7
31,453,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,463 UART: [art] PUB.X = 122E427E7ADA4EBA28FCDF4F5BDD4784949F0ED16B1FB5A6B850C61148ECC4C6AD4EE6209A73C81FCC7E2D1A030BCE0E
31,462,720 UART: [art] PUB.Y = 98599B53E58EB235BBC31A8FBB502B6D60E0737A41CCB1795C9F47BD6C7379A43AF2FCF375840C108ABEB62A0F1D3901
31,469,959 UART: [art] SIG.R = 873399ED358ED3AEA76A9BA69B8DB7EA9C4AA9149AD6F66BE449C3BBFB9AA604C309A57ABBB2C096CA2838E4B95B04DD
31,477,360 UART: [art] SIG.S = 617DAEFEFD6810F8BEFA27F1981051A15848D062D4EBEF462534617B270828AE3B2099EDBCDE3F72684DBC03A24FF745
32,781,995 UART: Caliptra RT
32,782,698 UART: [state] CFI Enabled
32,945,027 UART: [rt] RT listening for mailbox commands...
32,946,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,976,626 UART: [rt]cmd =0x46504c54, len=4
32,978,203 >>> mbox cmd response data (8 bytes)
32,979,488 UART: [rt] FIPS self test
32,980,430 UART: [kat] ++
32,980,884 UART: [kat] sha1
32,985,338 UART: [kat] SHA2-256
32,987,275 UART: [kat] SHA2-384
32,990,288 UART: [kat] SHA2-512-ACC
32,992,527 UART: [kat] ECC-384
36,255,747 UART: Fatal Error: 0x90040005
36,291,158 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,435,507 >>> mbox cmd response: failed
36,436,147 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,580,553 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,095 UART:
190,391 UART: Running Caliptra ROM ...
191,421 UART:
191,561 UART: [state] CFI Enabled
268,027 UART: [state] LifecycleState = Unprovisioned
269,960 UART: [state] DebugLocked = No
272,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,551 UART: [kat] SHA2-256
447,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,775 UART: [kat] ++
458,220 UART: [kat] sha1
469,311 UART: [kat] SHA2-256
471,996 UART: [kat] SHA2-384
478,616 UART: [kat] SHA2-512-ACC
481,002 UART: [kat] ECC-384
2,771,740 UART: [kat] HMAC-384Kdf
2,802,823 UART: [kat] LMS
3,993,165 UART: [kat] --
3,998,476 UART: [cold-reset] ++
4,000,141 UART: [fht] Storing FHT @ 0x50003400
4,011,848 UART: [idev] ++
4,012,435 UART: [idev] CDI.KEYID = 6
4,013,379 UART: [idev] SUBJECT.KEYID = 7
4,014,590 UART: [idev] UDS.KEYID = 0
4,016,144 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,160,791 UART: [idev] Erasing UDS.KEYID = 0
7,349,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,346 UART: [idev] --
7,375,150 UART: [ldev] ++
7,375,718 UART: [ldev] CDI.KEYID = 6
7,376,654 UART: [ldev] SUBJECT.KEYID = 5
7,377,866 UART: [ldev] AUTHORITY.KEYID = 7
7,379,156 UART: [ldev] FE.KEYID = 1
7,425,034 UART: [ldev] Erasing FE.KEYID = 1
10,754,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,728 UART: [ldev] --
13,118,759 UART: [fwproc] Waiting for Commands...
13,120,857 UART: [fwproc] Received command 0x46574c44
13,123,039 UART: [fwproc] Received Image of size 114996 bytes
17,187,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,650,580 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,913 writing to cptra_bootfsm_go
3,784,529 ready_for_fw is high
3,784,921 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,863,747 >>> mbox cmd response: success
23,549,287 UART:
23,549,799 UART: Running Caliptra FMC ...
23,550,912 UART:
23,551,080 UART: [state] CFI Enabled
23,616,874 UART: [fht] FMC Alias Private Key: 7
25,955,627 UART: [art] Extend RT PCRs Done
25,956,867 UART: [art] Lock RT PCRs Done
25,958,552 UART: [art] Populate DV Done
25,964,035 UART: [fht] FMC Alias Private Key: 7
25,965,526 UART: [art] Derive CDI
25,966,289 UART: [art] Store in in slot 0x4
26,025,393 UART: [art] Derive Key Pair
26,026,439 UART: [art] Store priv key in slot 0x5
29,319,385 UART: [art] Derive Key Pair - Done
29,332,707 UART: [art] Signing Cert with AUTHO
29,334,006 UART: RITY.KEYID = 7
31,620,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,955 UART: [art] PUB.X = 87D7ACE0964D4EC63FF87C08542CE01F39C0AA41043B3058C025ADE6D8A6B49010890A3650A38CE1EEC312DE13CDF2D1
31,629,168 UART: [art] PUB.Y = 41274C33F0E686D32ED0B8CB1C5BDBDFE65D6A481C676CD24781F3773FBDB37E6B6FA300A37360D15DB462A485D54C26
31,636,401 UART: [art] SIG.R = 4B4257291BD2203FD76864B0F8661078F33B54AE9ED103EDFC842540C4ADE3540EC1E9F821A153975245F649F526CC5B
31,643,822 UART: [art] SIG.S = ABDB25BCA9EA4264341C6436FAE66CF9FB1B70275E110BB04370362FB74ACD0C8BB6B2214A3F9D86AAD82006BBA964D7
32,948,519 UART: Caliptra RT
32,949,224 UART: [state] CFI Enabled
33,110,008 UART: [rt] RT listening for mailbox commands...
33,111,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,141,536 UART: [rt]cmd =0x46504c54, len=4
33,143,209 >>> mbox cmd response data (8 bytes)
33,144,163 UART: [rt] FIPS self test
33,145,110 UART: [kat] ++
33,145,565 UART: [kat] sha1
33,149,909 UART: [kat] SHA2-256
33,151,837 UART: [kat] SHA2-384
33,154,748 UART: [kat] SHA2-512-ACC
33,157,000 UART: [kat] ECC-384
36,421,571 UART: Fatal Error: 0x90040005
36,456,889 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,601,379 >>> mbox cmd response: failed
36,602,050 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,746,470 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,789,041 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,894,420 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,520 UART:
192,885 UART: Running Caliptra ROM ...
194,021 UART:
603,696 UART: [state] CFI Enabled
615,909 UART: [state] LifecycleState = Unprovisioned
617,824 UART: [state] DebugLocked = No
620,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,659 UART: [kat] SHA2-256
794,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,984 UART: [kat] ++
805,432 UART: [kat] sha1
816,113 UART: [kat] SHA2-256
818,852 UART: [kat] SHA2-384
824,143 UART: [kat] SHA2-512-ACC
826,520 UART: [kat] ECC-384
3,112,230 UART: [kat] HMAC-384Kdf
3,122,856 UART: [kat] LMS
4,312,967 UART: [kat] --
4,316,685 UART: [cold-reset] ++
4,318,625 UART: [fht] Storing FHT @ 0x50003400
4,329,965 UART: [idev] ++
4,330,534 UART: [idev] CDI.KEYID = 6
4,331,567 UART: [idev] SUBJECT.KEYID = 7
4,332,743 UART: [idev] UDS.KEYID = 0
4,333,696 ready_for_fw is high
4,333,899 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,478,362 UART: [idev] Erasing UDS.KEYID = 0
7,619,284 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,955 UART: [idev] --
7,645,280 UART: [ldev] ++
7,645,903 UART: [ldev] CDI.KEYID = 6
7,646,842 UART: [ldev] SUBJECT.KEYID = 5
7,648,055 UART: [ldev] AUTHORITY.KEYID = 7
7,649,296 UART: [ldev] FE.KEYID = 1
7,661,952 UART: [ldev] Erasing FE.KEYID = 1
10,950,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,812 UART: [ldev] --
13,312,700 UART: [fwproc] Waiting for Commands...
13,316,041 UART: [fwproc] Received command 0x46574c44
13,318,267 UART: [fwproc] Received Image of size 114996 bytes
17,393,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,470,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,538,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,859,273 >>> mbox cmd response: success
17,862,592 UART: [afmc] ++
17,863,180 UART: [afmc] CDI.KEYID = 6
17,864,120 UART: [afmc] SUBJECT.KEYID = 7
17,865,394 UART: [afmc] AUTHORITY.KEYID = 5
21,181,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,476,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,478,370 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,492,754 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,507,578 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,522,021 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,542,121 UART: [afmc] --
23,546,059 UART: [cold-reset] --
23,549,169 UART: [state] Locking Datavault
23,556,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,558,555 UART: [state] Locking ICCM
23,560,919 UART: [exit] Launching FMC @ 0x40000130
23,569,314 UART:
23,569,550 UART: Running Caliptra FMC ...
23,570,653 UART:
23,570,816 UART: [state] CFI Enabled
23,578,754 UART: [fht] FMC Alias Private Key: 7
25,909,704 UART: [art] Extend RT PCRs Done
25,910,929 UART: [art] Lock RT PCRs Done
25,912,567 UART: [art] Populate DV Done
25,917,760 UART: [fht] FMC Alias Private Key: 7
25,919,242 UART: [art] Derive CDI
25,920,004 UART: [art] Store in in slot 0x4
25,962,837 UART: [art] Derive Key Pair
25,963,838 UART: [art] Store priv key in slot 0x5
29,205,940 UART: [art] Derive Key Pair - Done
29,219,316 UART: [art] Signing Cert with AUTHO
29,220,623 UART: RITY.KEYID = 7
31,500,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,864 UART: [art] PUB.X = 61C7F9AC062C4D8490FF042FF5BBDCB9120B712603AE9BE7B881001183188F430F08F50534C27FEE4616A130D854F9D9
31,509,025 UART: [art] PUB.Y = 21C18614E6AEB67E26E0123D92FBF44E18E88C0991F37D955B06C328ACD50E16EF898298E800830AD11FDDF47E15725D
31,516,274 UART: [art] SIG.R = BF639C0C3A65679FF210BCA9C002CCAC07268F8ACA9CB55753C617F465B7BB574F0DA77E3FB80C6B619566F6ACE17882
31,523,681 UART: [art] SIG.S = 9A33BBF98E231CD8927793BCAE35945AE243F65F34987D411545F4FA7F3745A20D6BABDB78E511AA85B2C0BFB2068B95
32,828,519 UART: Caliptra RT
32,829,240 UART: [state] CFI Enabled
32,946,596 UART: [rt] RT listening for mailbox commands...
32,948,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,978,188 UART: [rt]cmd =0x46504c54, len=4
32,979,984 >>> mbox cmd response data (8 bytes)
32,981,225 UART: [rt] FIPS self test
32,982,165 UART: [kat] ++
32,982,617 UART: [kat] sha1
32,987,290 UART: [kat] SHA2-256
32,989,278 UART: [kat] SHA2-384
32,992,191 UART: [kat] SHA2-512-ACC
32,994,429 UART: [kat] ECC-384
36,233,097 UART: Fatal Error: 0x90040005
36,268,413 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,412,885 >>> mbox cmd response: failed
36,413,494 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,557,838 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
190,115 UART:
190,415 UART: Running Caliptra ROM ...
191,491 UART:
3,976,573 UART: [state] CFI Enabled
3,990,020 UART: [state] LifecycleState = Unprovisioned
3,991,942 UART: [state] DebugLocked = No
3,994,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,999,950 UART: [kat] SHA2-256
4,169,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,180,224 UART: [kat] ++
4,180,687 UART: [kat] sha1
4,191,571 UART: [kat] SHA2-256
4,194,319 UART: [kat] SHA2-384
4,199,333 UART: [kat] SHA2-512-ACC
4,201,680 UART: [kat] ECC-384
6,485,684 UART: [kat] HMAC-384Kdf
6,498,286 UART: [kat] LMS
7,688,410 UART: [kat] --
7,693,404 UART: [cold-reset] ++
7,694,544 UART: [fht] Storing FHT @ 0x50003400
7,706,622 UART: [idev] ++
7,707,189 UART: [idev] CDI.KEYID = 6
7,708,133 UART: [idev] SUBJECT.KEYID = 7
7,709,400 UART: [idev] UDS.KEYID = 0
7,710,902 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,855,248 UART: [idev] Erasing UDS.KEYID = 0
10,995,036 UART: [idev] Using Sha1 for KeyId Algorithm
11,016,025 UART: [idev] --
11,019,239 UART: [ldev] ++
11,019,817 UART: [ldev] CDI.KEYID = 6
11,020,726 UART: [ldev] SUBJECT.KEYID = 5
11,021,940 UART: [ldev] AUTHORITY.KEYID = 7
11,023,225 UART: [ldev] FE.KEYID = 1
11,033,980 UART: [ldev] Erasing FE.KEYID = 1
14,321,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,614,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,629,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,643,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,658,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,677,358 UART: [ldev] --
16,682,728 UART: [fwproc] Waiting for Commands...
16,685,098 UART: [fwproc] Received command 0x46574c44
16,687,289 UART: [fwproc] Received Image of size 114996 bytes
20,750,693 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,829,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,898,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,217,941 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,124,941 ready_for_fw is high
4,125,594 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,072,749 >>> mbox cmd response: success
23,714,436 UART:
23,714,844 UART: Running Caliptra FMC ...
23,715,989 UART:
23,716,157 UART: [state] CFI Enabled
23,724,301 UART: [fht] FMC Alias Private Key: 7
26,055,141 UART: [art] Extend RT PCRs Done
26,056,385 UART: [art] Lock RT PCRs Done
26,058,126 UART: [art] Populate DV Done
26,063,725 UART: [fht] FMC Alias Private Key: 7
26,065,429 UART: [art] Derive CDI
26,066,246 UART: [art] Store in in slot 0x4
26,108,464 UART: [art] Derive Key Pair
26,109,461 UART: [art] Store priv key in slot 0x5
29,351,708 UART: [art] Derive Key Pair - Done
29,364,610 UART: [art] Signing Cert with AUTHO
29,365,915 UART: RITY.KEYID = 7
31,645,903 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,552 UART: [art] PUB.X = 1EFFAAB0CAD4B836233AD8B91CBC2CFAD69A781A45B32906FE22DF3C8899FFC150AF227B6011DA921F6B78412CB213F0
31,654,707 UART: [art] PUB.Y = 7C71C698984DC6C79710174C3084B59D863B7843B005D7AB1D4150F4E06DDD10B238B5BC15E0D1DECC639EE2AFF7C44B
31,661,905 UART: [art] SIG.R = 3A69E90239BBC764F0970A787B33530159C885356831020640CBA64B2E14F1D4196ADDB569941AD2695DE4296FC43267
31,669,294 UART: [art] SIG.S = 6830AF7D07282D4316743159088E8FE0D89CA29E41CE9C3A740A3795F06EA05CFF1DE0E155FB987179684CA4D5C83745
32,973,992 UART: Caliptra RT
32,974,755 UART: [state] CFI Enabled
33,092,143 UART: [rt] RT listening for mailbox commands...
33,094,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,684 UART: [rt]cmd =0x46504c54, len=4
33,125,264 >>> mbox cmd response data (8 bytes)
33,126,223 UART: [rt] FIPS self test
33,127,163 UART: [kat] ++
33,127,636 UART: [kat] sha1
33,132,254 UART: [kat] SHA2-256
33,134,185 UART: [kat] SHA2-384
33,137,144 UART: [kat] SHA2-512-ACC
33,139,401 UART: [kat] ECC-384
36,379,115 UART: Fatal Error: 0x90040005
36,414,375 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,558,822 >>> mbox cmd response: failed
36,559,492 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,703,864 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
7,349,986 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,311,157 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,332 UART:
192,691 UART: Running Caliptra ROM ...
193,901 UART:
194,056 UART: [state] CFI Enabled
266,514 UART: [state] LifecycleState = Unprovisioned
268,440 UART: [state] DebugLocked = No
271,049 UART: [state] WD Timer not started. Device not locked for debugging
274,659 UART: [kat] SHA2-256
453,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,356 UART: [kat] ++
465,892 UART: [kat] sha1
477,410 UART: [kat] SHA2-256
480,421 UART: [kat] SHA2-384
486,511 UART: [kat] SHA2-512-ACC
489,525 UART: [kat] ECC-384
2,949,104 UART: [kat] HMAC-384Kdf
2,973,421 UART: [kat] LMS
3,502,880 UART: [kat] --
3,505,410 UART: [cold-reset] ++
3,507,354 UART: [fht] FHT @ 0x50003400
3,518,342 UART: [idev] ++
3,518,907 UART: [idev] CDI.KEYID = 6
3,519,860 UART: [idev] SUBJECT.KEYID = 7
3,521,031 UART: [idev] UDS.KEYID = 0
3,522,012 ready_for_fw is high
3,522,222 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,242 UART: [idev] Erasing UDS.KEYID = 0
6,028,279 UART: [idev] Sha1 KeyId Algorithm
6,051,635 UART: [idev] --
6,055,086 UART: [ldev] ++
6,055,676 UART: [ldev] CDI.KEYID = 6
6,056,570 UART: [ldev] SUBJECT.KEYID = 5
6,057,784 UART: [ldev] AUTHORITY.KEYID = 7
6,059,019 UART: [ldev] FE.KEYID = 1
6,101,438 UART: [ldev] Erasing FE.KEYID = 1
8,606,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,433 UART: [ldev] --
10,417,913 UART: [fwproc] Wait for Commands...
10,420,122 UART: [fwproc] Recv command 0x46574c44
10,422,226 UART: [fwproc] Recv'd Img size: 115304 bytes
13,840,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,984,925 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,305,982 >>> mbox cmd response: success
14,310,829 UART: [afmc] ++
14,311,418 UART: [afmc] CDI.KEYID = 6
14,312,307 UART: [afmc] SUBJECT.KEYID = 7
14,313,523 UART: [afmc] AUTHORITY.KEYID = 5
16,849,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,593,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,609,591 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,625,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,648,308 UART: [afmc] --
18,651,737 UART: [cold-reset] --
18,655,810 UART: [state] Locking Datavault
18,661,505 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,162 UART: [state] Locking ICCM
18,664,988 UART: [exit] Launching FMC @ 0x40000130
18,673,383 UART:
18,673,620 UART: Running Caliptra FMC ...
18,674,720 UART:
18,674,875 UART: [state] CFI Enabled
18,734,913 UART: [fht] FMC Alias Private Key: 7
20,499,529 UART: [art] Extend RT PCRs Done
20,500,759 UART: [art] Lock RT PCRs Done
20,502,681 UART: [art] Populate DV Done
20,508,201 UART: [fht] FMC Alias Private Key: 7
20,509,689 UART: [art] Derive CDI
20,510,426 UART: [art] Store in in slot 0x4
20,568,270 UART: [art] Derive Key Pair
20,569,312 UART: [art] Store priv key in slot 0x5
23,032,332 UART: [art] Derive Key Pair - Done
23,045,243 UART: [art] Signing Cert with AUTHO
23,046,554 UART: RITY.KEYID = 7
24,757,762 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,268 UART: [art] PUB.X = C9044292513874BE4ED4C762F84550C037DF1BFF3478AEA6B0193DD11DD8E6C2DB0EF4ED58DF3C08D840D3ABB55D81E2
24,766,585 UART: [art] PUB.Y = 286CB682E1137F80ECDE37904B239B664CA22194E344C8C8090AA339DF21D297E06A6A861DD6796D1402DED2226B2479
24,773,806 UART: [art] SIG.R = 1DDD80CA5E25FF70600DE419C6F9F0C81629D8F09F01EEE7B73F0170B461C7D95AE48879E5E06A83B90FDF1F53364394
24,781,217 UART: [art] SIG.S = 12325B1397DDDA3DD1F4442B384429C6DBB95D2E8FD2008645F2E343124F1C06B718F472A907FB3EC69A47B1EDA5B2B6
25,760,121 UART: Caliptra RT
25,760,823 UART: [state] CFI Enabled
25,924,969 UART: [rt] RT listening for mailbox commands...
25,926,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,956,699 UART: [rt]cmd =0x46504c54, len=4
25,958,449 >>> mbox cmd response data (8 bytes)
25,959,681 UART: [rt] FIPS self test
25,960,617 UART: [kat] ++
25,961,081 UART: [kat] sha1
25,965,377 UART: [kat] SHA2-256
25,967,309 UART: [kat] SHA2-384
25,970,230 UART: [kat] SHA2-512-ACC
25,972,473 UART: [kat] ECC-384
28,406,284 UART: Fatal Error: 0x90040005
28,441,580 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,586,408 >>> mbox cmd response: failed
28,587,092 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,731,899 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,003 UART:
190,306 UART: Running Caliptra ROM ...
191,332 UART:
191,470 UART: [state] CFI Enabled
264,288 UART: [state] LifecycleState = Unprovisioned
266,150 UART: [state] DebugLocked = No
269,065 UART: [state] WD Timer not started. Device not locked for debugging
271,942 UART: [kat] SHA2-256
451,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,629 UART: [kat] ++
463,076 UART: [kat] sha1
473,469 UART: [kat] SHA2-256
476,474 UART: [kat] SHA2-384
483,369 UART: [kat] SHA2-512-ACC
486,312 UART: [kat] ECC-384
2,950,173 UART: [kat] HMAC-384Kdf
2,973,580 UART: [kat] LMS
3,503,024 UART: [kat] --
3,506,983 UART: [cold-reset] ++
3,508,704 UART: [fht] FHT @ 0x50003400
3,519,648 UART: [idev] ++
3,520,220 UART: [idev] CDI.KEYID = 6
3,521,104 UART: [idev] SUBJECT.KEYID = 7
3,522,318 UART: [idev] UDS.KEYID = 0
3,523,856 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,987 UART: [idev] Erasing UDS.KEYID = 0
6,028,465 UART: [idev] Sha1 KeyId Algorithm
6,051,257 UART: [idev] --
6,056,098 UART: [ldev] ++
6,056,680 UART: [ldev] CDI.KEYID = 6
6,057,567 UART: [ldev] SUBJECT.KEYID = 5
6,058,784 UART: [ldev] AUTHORITY.KEYID = 7
6,060,024 UART: [ldev] FE.KEYID = 1
6,100,567 UART: [ldev] Erasing FE.KEYID = 1
8,601,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,062 UART: [ldev] --
10,391,033 UART: [fwproc] Wait for Commands...
10,393,834 UART: [fwproc] Recv command 0x46574c44
10,395,927 UART: [fwproc] Recv'd Img size: 115304 bytes
13,818,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,212 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,283,907 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,384,424 ready_for_fw is high
3,384,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,089,864 >>> mbox cmd response: success
18,369,731 UART:
18,370,204 UART: Running Caliptra FMC ...
18,371,328 UART:
18,371,508 UART: [state] CFI Enabled
18,436,102 UART: [fht] FMC Alias Private Key: 7
20,200,804 UART: [art] Extend RT PCRs Done
20,202,033 UART: [art] Lock RT PCRs Done
20,203,719 UART: [art] Populate DV Done
20,209,491 UART: [fht] FMC Alias Private Key: 7
20,210,978 UART: [art] Derive CDI
20,211,743 UART: [art] Store in in slot 0x4
20,269,545 UART: [art] Derive Key Pair
20,270,593 UART: [art] Store priv key in slot 0x5
22,733,595 UART: [art] Derive Key Pair - Done
22,746,256 UART: [art] Signing Cert with AUTHO
22,747,588 UART: RITY.KEYID = 7
24,460,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,629 UART: [art] PUB.X = B81DF38AF90AD0367E4508788CE02E0F681017E363E583002CB174AB709C7A40841581582944B304D42811487316ADD3
24,468,791 UART: [art] PUB.Y = 9A19B7539D44A64B5AB131F978CBE721F3D8C41E9A8241D531A9E8CC88445FD3A10F2440C07070DE554384CCA4D3F368
24,476,030 UART: [art] SIG.R = 20370CF1B88C5710918C010A32B711064345EDE64B308B2DA9CEB306FD1E5412DC1B0EB34971E509EC6867B4AB2F5587
24,483,392 UART: [art] SIG.S = 1A2F567040E4644A3C0315597FF5CFB4C806DFCD8BEE30851E0785725ABED2F655E714C67CA82DCD6441253998B3BB27
25,461,659 UART: Caliptra RT
25,462,368 UART: [state] CFI Enabled
25,629,229 UART: [rt] RT listening for mailbox commands...
25,631,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,660,887 UART: [rt]cmd =0x46504c54, len=4
25,662,473 >>> mbox cmd response data (8 bytes)
25,663,539 UART: [rt] FIPS self test
25,664,476 UART: [kat] ++
25,664,927 UART: [kat] sha1
25,669,434 UART: [kat] SHA2-256
25,671,365 UART: [kat] SHA2-384
25,674,162 UART: [kat] SHA2-512-ACC
25,676,441 UART: [kat] ECC-384
28,110,371 UART: Fatal Error: 0x90040005
28,145,681 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,290,580 >>> mbox cmd response: failed
28,291,287 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,436,092 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,363,650 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,051,498 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,681 UART:
193,040 UART: Running Caliptra ROM ...
194,257 UART:
603,806 UART: [state] CFI Enabled
620,542 UART: [state] LifecycleState = Unprovisioned
622,441 UART: [state] DebugLocked = No
623,902 UART: [state] WD Timer not started. Device not locked for debugging
627,064 UART: [kat] SHA2-256
806,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,813 UART: [kat] ++
818,345 UART: [kat] sha1
830,434 UART: [kat] SHA2-256
833,454 UART: [kat] SHA2-384
839,801 UART: [kat] SHA2-512-ACC
842,743 UART: [kat] ECC-384
3,286,429 UART: [kat] HMAC-384Kdf
3,297,996 UART: [kat] LMS
3,827,451 UART: [kat] --
3,831,804 UART: [cold-reset] ++
3,833,242 UART: [fht] FHT @ 0x50003400
3,844,225 UART: [idev] ++
3,844,792 UART: [idev] CDI.KEYID = 6
3,845,831 UART: [idev] SUBJECT.KEYID = 7
3,846,933 UART: [idev] UDS.KEYID = 0
3,847,867 ready_for_fw is high
3,848,086 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,992,940 UART: [idev] Erasing UDS.KEYID = 0
6,316,698 UART: [idev] Sha1 KeyId Algorithm
6,339,412 UART: [idev] --
6,343,196 UART: [ldev] ++
6,343,775 UART: [ldev] CDI.KEYID = 6
6,344,689 UART: [ldev] SUBJECT.KEYID = 5
6,345,872 UART: [ldev] AUTHORITY.KEYID = 7
6,347,114 UART: [ldev] FE.KEYID = 1
6,357,540 UART: [ldev] Erasing FE.KEYID = 1
8,830,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,423 UART: [ldev] --
10,622,793 UART: [fwproc] Wait for Commands...
10,624,408 UART: [fwproc] Recv command 0x46574c44
10,627,000 UART: [fwproc] Recv'd Img size: 115304 bytes
14,043,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,187,523 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,509,356 >>> mbox cmd response: success
14,512,804 UART: [afmc] ++
14,513,395 UART: [afmc] CDI.KEYID = 6
14,514,305 UART: [afmc] SUBJECT.KEYID = 7
14,515,521 UART: [afmc] AUTHORITY.KEYID = 5
17,013,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,685 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,920 UART: [afmc] --
18,809,844 UART: [cold-reset] --
18,814,354 UART: [state] Locking Datavault
18,818,844 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,486 UART: [state] Locking ICCM
18,823,201 UART: [exit] Launching FMC @ 0x40000130
18,831,611 UART:
18,831,851 UART: Running Caliptra FMC ...
18,832,955 UART:
18,833,111 UART: [state] CFI Enabled
18,841,482 UART: [fht] FMC Alias Private Key: 7
20,598,115 UART: [art] Extend RT PCRs Done
20,599,339 UART: [art] Lock RT PCRs Done
20,600,886 UART: [art] Populate DV Done
20,606,137 UART: [fht] FMC Alias Private Key: 7
20,607,677 UART: [art] Derive CDI
20,608,411 UART: [art] Store in in slot 0x4
20,651,434 UART: [art] Derive Key Pair
20,652,480 UART: [art] Store priv key in slot 0x5
23,079,330 UART: [art] Derive Key Pair - Done
23,092,492 UART: [art] Signing Cert with AUTHO
23,093,791 UART: RITY.KEYID = 7
24,798,937 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,448 UART: [art] PUB.X = 74A0229C4F56F54A2803139A2719A4880AA404E9446429EB7A50C87E45ED445A3240C9ED5818879FF6ACF3D1DA801CAC
24,807,698 UART: [art] PUB.Y = F6AECD2A488749ACF401688A065AB51767F8301010297851609E472E4AA87758167D1F436757511C5FBECDAC8355C816
24,814,935 UART: [art] SIG.R = 63FCCF424BAB798FC88C170D941AADFE43378393D52ED76E21C3D838D88F2F4CED23F942F976B8B34B6D051F18FE8A08
24,822,334 UART: [art] SIG.S = FECABF4C52B055DD304B8B10F0DD1823ACAAEC3C503D2ABCD0D05EE82F9F863319CB46AF130CC3411A12150534D60E96
25,800,648 UART: Caliptra RT
25,801,366 UART: [state] CFI Enabled
25,918,206 UART: [rt] RT listening for mailbox commands...
25,920,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,949,782 UART: [rt]cmd =0x46504c54, len=4
25,951,252 >>> mbox cmd response data (8 bytes)
25,952,194 UART: [rt] FIPS self test
25,953,134 UART: [kat] ++
25,953,582 UART: [kat] sha1
25,957,849 UART: [kat] SHA2-256
25,959,777 UART: [kat] SHA2-384
25,962,701 UART: [kat] SHA2-512-ACC
25,964,991 UART: [kat] ECC-384
28,388,668 UART: Fatal Error: 0x90040005
28,423,900 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,568,695 >>> mbox cmd response: failed
28,569,336 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,714,123 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
190,051 UART:
190,347 UART: Running Caliptra ROM ...
191,403 UART:
11,811,139 UART: [state] CFI Enabled
11,823,738 UART: [state] LifecycleState = Unprovisioned
11,825,598 UART: [state] DebugLocked = No
11,827,576 UART: [state] WD Timer not started. Device not locked for debugging
11,831,388 UART: [kat] SHA2-256
12,010,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,022,099 UART: [kat] ++
12,022,641 UART: [kat] sha1
12,033,102 UART: [kat] SHA2-256
12,036,110 UART: [kat] SHA2-384
12,043,497 UART: [kat] SHA2-512-ACC
12,046,449 UART: [kat] ECC-384
14,485,640 UART: [kat] HMAC-384Kdf
14,499,103 UART: [kat] LMS
15,028,552 UART: [kat] --
15,034,474 UART: [cold-reset] ++
15,035,676 UART: [fht] FHT @ 0x50003400
15,046,555 UART: [idev] ++
15,047,133 UART: [idev] CDI.KEYID = 6
15,048,101 UART: [idev] SUBJECT.KEYID = 7
15,049,281 UART: [idev] UDS.KEYID = 0
15,050,813 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,195,907 UART: [idev] Erasing UDS.KEYID = 0
17,518,048 UART: [idev] Sha1 KeyId Algorithm
17,541,279 UART: [idev] --
17,545,543 UART: [ldev] ++
17,546,113 UART: [ldev] CDI.KEYID = 6
17,547,019 UART: [ldev] SUBJECT.KEYID = 5
17,548,179 UART: [ldev] AUTHORITY.KEYID = 7
17,549,465 UART: [ldev] FE.KEYID = 1
17,558,649 UART: [ldev] Erasing FE.KEYID = 1
20,028,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,746,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,762,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,778,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,794,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,815,952 UART: [ldev] --
21,819,769 UART: [fwproc] Wait for Commands...
21,822,513 UART: [fwproc] Recv command 0x46574c44
21,824,608 UART: [fwproc] Recv'd Img size: 115304 bytes
25,240,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,314,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,383,300 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,704,365 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,696,217 ready_for_fw is high
3,696,654 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,289,671 >>> mbox cmd response: success
18,540,236 UART:
18,540,644 UART: Running Caliptra FMC ...
18,541,771 UART:
18,541,933 UART: [state] CFI Enabled
18,549,599 UART: [fht] FMC Alias Private Key: 7
20,307,294 UART: [art] Extend RT PCRs Done
20,308,525 UART: [art] Lock RT PCRs Done
20,310,211 UART: [art] Populate DV Done
20,315,561 UART: [fht] FMC Alias Private Key: 7
20,317,273 UART: [art] Derive CDI
20,318,100 UART: [art] Store in in slot 0x4
20,360,663 UART: [art] Derive Key Pair
20,361,707 UART: [art] Store priv key in slot 0x5
22,788,214 UART: [art] Derive Key Pair - Done
22,801,219 UART: [art] Signing Cert with AUTHO
22,802,532 UART: RITY.KEYID = 7
24,507,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,456 UART: [art] PUB.X = 21200CC62CB291BDD5BBBCABC2CAFB57531F2D8A728505902F578604F9A5722E78B1844C935B29F52C14EE28A936E561
24,516,669 UART: [art] PUB.Y = 9DD46806619526C07147DAF3E46AABBBE925868E1C62CC9CF5022D8B626EC4CA9E53F47B3A60D6EC23F4CA894474A4DF
24,523,940 UART: [art] SIG.R = 040FE7B6DDCD61181A1B0195F572DD9BB941C78E6391EC8E51E3E2F6699EE15CC73416081F963B20A09079C6AEF5904D
24,531,315 UART: [art] SIG.S = 0FD7874E150FB8598C85DA306E822F9BAAF982179313079D9C8733F4CF965CF3D202E72C31A3DA8A5A5FBC5FA8CDFE04
25,510,222 UART: Caliptra RT
25,510,939 UART: [state] CFI Enabled
25,628,452 UART: [rt] RT listening for mailbox commands...
25,630,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,660,337 UART: [rt]cmd =0x46504c54, len=4
25,661,974 >>> mbox cmd response data (8 bytes)
25,663,524 UART: [rt] FIPS self test
25,664,463 UART: [kat] ++
25,664,917 UART: [kat] sha1
25,669,428 UART: [kat] SHA2-256
25,671,356 UART: [kat] SHA2-384
25,674,317 UART: [kat] SHA2-512-ACC
25,676,605 UART: [kat] ECC-384
28,100,294 UART: Fatal Error: 0x90040005
28,135,600 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,280,469 >>> mbox cmd response: failed
28,281,152 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,425,936 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
15,209,418 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,795,377 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,197 UART:
192,564 UART: Running Caliptra ROM ...
193,755 UART:
193,911 UART: [state] CFI Enabled
268,634 UART: [state] LifecycleState = Unprovisioned
271,052 UART: [state] DebugLocked = No
272,454 UART: [state] WD Timer not started. Device not locked for debugging
277,294 UART: [kat] SHA2-256
467,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,967 UART: [kat] ++
478,461 UART: [kat] sha1
488,561 UART: [kat] SHA2-256
491,577 UART: [kat] SHA2-384
498,708 UART: [kat] SHA2-512-ACC
501,290 UART: [kat] ECC-384
2,950,976 UART: [kat] HMAC-384Kdf
2,963,864 UART: [kat] LMS
3,495,640 UART: [kat] --
3,499,000 UART: [cold-reset] ++
3,500,376 UART: [fht] FHT @ 0x50003400
3,511,999 UART: [idev] ++
3,512,707 UART: [idev] CDI.KEYID = 6
3,513,618 UART: [idev] SUBJECT.KEYID = 7
3,514,889 UART: [idev] UDS.KEYID = 0
3,515,874 ready_for_fw is high
3,516,084 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,661,115 UART: [idev] Erasing UDS.KEYID = 0
6,023,511 UART: [idev] Sha1 KeyId Algorithm
6,045,888 UART: [idev] --
6,050,654 UART: [ldev] ++
6,051,373 UART: [ldev] CDI.KEYID = 6
6,052,262 UART: [ldev] SUBJECT.KEYID = 5
6,053,479 UART: [ldev] AUTHORITY.KEYID = 7
6,054,660 UART: [ldev] FE.KEYID = 1
6,092,793 UART: [ldev] Erasing FE.KEYID = 1
8,595,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,842 UART: [ldev] --
10,384,090 UART: [fwproc] Wait for Commands...
10,387,002 UART: [fwproc] Recv command 0x46574c44
10,389,322 UART: [fwproc] Recv'd Img size: 115304 bytes
13,854,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,408 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,602,099 >>> mbox cmd response: success
14,605,407 UART: [afmc] ++
14,606,113 UART: [afmc] CDI.KEYID = 6
14,607,352 UART: [afmc] SUBJECT.KEYID = 7
14,608,779 UART: [afmc] AUTHORITY.KEYID = 5
17,140,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,863,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,865,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,896,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,911,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,934,789 UART: [afmc] --
18,938,196 UART: [cold-reset] --
18,941,741 UART: [state] Locking Datavault
18,947,687 UART: [state] Locking PCR0, PCR1 and PCR31
18,949,880 UART: [state] Locking ICCM
18,951,923 UART: [exit] Launching FMC @ 0x40000130
18,960,586 UART:
18,960,820 UART: Running Caliptra FMC ...
18,961,919 UART:
18,962,081 UART: [state] CFI Enabled
19,023,099 UART: [fht] FMC Alias Private Key: 7
20,787,049 UART: [art] Extend RT PCRs Done
20,788,276 UART: [art] Lock RT PCRs Done
20,790,026 UART: [art] Populate DV Done
20,795,826 UART: [fht] FMC Alias Private Key: 7
20,797,322 UART: [art] Derive CDI
20,798,084 UART: [art] Store in in slot 0x4
20,855,175 UART: [art] Derive Key Pair
20,856,212 UART: [art] Store priv key in slot 0x5
23,319,407 UART: [art] Derive Key Pair - Done
23,332,511 UART: [art] Signing Cert with AUTHO
23,333,847 UART: RITY.KEYID = 7
25,044,752 UART: [art] Erasing AUTHORITY.KEYID = 7
25,046,258 UART: [art] PUB.X = 96FA8C7A0DAAE50E31411CC2B07D348714DA96414E28574CEF1A5950E882EF9D729A76BE406A5246F18D05F4393A70D0
25,053,522 UART: [art] PUB.Y = 21ED71947183B11A98389834F40CCCB095F4F6D63A83096D1D52BF2BE6A01A6C2FCD4BDCB374BF5B62011872CD39BA66
25,060,817 UART: [art] SIG.R = CDD6CBB9A846400016BF175832B663E1D42EA765877CF7D2D2DD47F43919752A0487D44B46E7E49895F5CB4268D3A7EE
25,068,162 UART: [art] SIG.S = 667C99349B8BAAAE7DCDA80FBCD2B9657D37F4E859C0D522A910A30CDE276BECFF98B563ABE22192ACAA75BCD06366EC
26,047,623 UART: Caliptra RT
26,048,324 UART: [state] CFI Enabled
26,214,060 UART: [rt] RT listening for mailbox commands...
26,215,921 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,245,600 UART: [rt]cmd =0x46504c54, len=4
26,247,124 >>> mbox cmd response data (8 bytes)
26,248,195 UART: [rt] FIPS self test
26,249,139 UART: [kat] ++
26,249,588 UART: [kat] sha1
26,254,041 UART: [kat] SHA2-256
26,255,916 UART: [kat] SHA2-384
26,258,744 UART: [kat] SHA2-512-ACC
26,261,027 UART: [kat] ECC-384
28,696,218 UART: Fatal Error: 0x90040005
28,731,515 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,876,780 >>> mbox cmd response: failed
28,877,480 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,022,279 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,095 UART:
190,383 UART: Running Caliptra ROM ...
191,491 UART:
191,639 UART: [state] CFI Enabled
263,245 UART: [state] LifecycleState = Unprovisioned
265,600 UART: [state] DebugLocked = No
268,381 UART: [state] WD Timer not started. Device not locked for debugging
272,974 UART: [kat] SHA2-256
462,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,591 UART: [kat] ++
474,066 UART: [kat] sha1
486,733 UART: [kat] SHA2-256
489,791 UART: [kat] SHA2-384
495,988 UART: [kat] SHA2-512-ACC
498,577 UART: [kat] ECC-384
2,948,953 UART: [kat] HMAC-384Kdf
2,973,761 UART: [kat] LMS
3,505,550 UART: [kat] --
3,509,483 UART: [cold-reset] ++
3,510,416 UART: [fht] FHT @ 0x50003400
3,521,918 UART: [idev] ++
3,522,601 UART: [idev] CDI.KEYID = 6
3,523,543 UART: [idev] SUBJECT.KEYID = 7
3,524,757 UART: [idev] UDS.KEYID = 0
3,526,264 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,215 UART: [idev] Erasing UDS.KEYID = 0
6,029,428 UART: [idev] Sha1 KeyId Algorithm
6,051,306 UART: [idev] --
6,056,863 UART: [ldev] ++
6,057,546 UART: [ldev] CDI.KEYID = 6
6,058,485 UART: [ldev] SUBJECT.KEYID = 5
6,059,650 UART: [ldev] AUTHORITY.KEYID = 7
6,060,827 UART: [ldev] FE.KEYID = 1
6,101,976 UART: [ldev] Erasing FE.KEYID = 1
8,605,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,276 UART: [ldev] --
10,414,511 UART: [fwproc] Wait for Commands...
10,416,238 UART: [fwproc] Recv command 0x46574c44
10,418,554 UART: [fwproc] Recv'd Img size: 115304 bytes
13,878,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,178 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,611,747 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,439,767 ready_for_fw is high
3,440,216 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,756,970 >>> mbox cmd response: success
19,048,873 UART:
19,049,299 UART: Running Caliptra FMC ...
19,050,425 UART:
19,050,580 UART: [state] CFI Enabled
19,116,961 UART: [fht] FMC Alias Private Key: 7
20,879,715 UART: [art] Extend RT PCRs Done
20,880,942 UART: [art] Lock RT PCRs Done
20,882,652 UART: [art] Populate DV Done
20,887,770 UART: [fht] FMC Alias Private Key: 7
20,889,460 UART: [art] Derive CDI
20,890,288 UART: [art] Store in in slot 0x4
20,950,197 UART: [art] Derive Key Pair
20,951,199 UART: [art] Store priv key in slot 0x5
23,413,745 UART: [art] Derive Key Pair - Done
23,426,432 UART: [art] Signing Cert with AUTHO
23,427,737 UART: RITY.KEYID = 7
25,139,481 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,996 UART: [art] PUB.X = 0CBE532859E8B921D0EBF8C8BDEFA297836F9AA9595B49A2B59A756B078497EEA31D14E7A68F02C6BADCB067E7534805
25,148,211 UART: [art] PUB.Y = 9A1E220F891BF0216B3EDBD0E01330642171AD3D13784CD0C2FE382976E632264B4A6D7122CF6B3003893B5140DF39A4
25,155,466 UART: [art] SIG.R = 20D8BCE2AC28A03755EC66AAA34A3CACEF80A3EA8012CEEDBF2E05CDCDFB5AD7523E7CFEA5A4F8B33211A5BA4CB25C01
25,162,930 UART: [art] SIG.S = FE38E5E1BCD2A65B73D1E52C47DAC3E983DE93B301140ABA0119BE85F2ED8923C8FED9FCCD30D9F1579E9BDD361979E0
26,141,403 UART: Caliptra RT
26,142,125 UART: [state] CFI Enabled
26,308,217 UART: [rt] RT listening for mailbox commands...
26,310,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,857 UART: [rt]cmd =0x46504c54, len=4
26,341,315 >>> mbox cmd response data (8 bytes)
26,342,483 UART: [rt] FIPS self test
26,343,428 UART: [kat] ++
26,343,877 UART: [kat] sha1
26,348,278 UART: [kat] SHA2-256
26,350,153 UART: [kat] SHA2-384
26,353,217 UART: [kat] SHA2-512-ACC
26,355,434 UART: [kat] ECC-384
28,790,365 UART: Fatal Error: 0x90040005
28,825,825 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,970,651 >>> mbox cmd response: failed
28,971,319 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,115,914 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,420,099 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,739,290 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,423 UART:
192,809 UART: Running Caliptra ROM ...
194,016 UART:
603,537 UART: [state] CFI Enabled
615,087 UART: [state] LifecycleState = Unprovisioned
617,479 UART: [state] DebugLocked = No
619,939 UART: [state] WD Timer not started. Device not locked for debugging
624,484 UART: [kat] SHA2-256
814,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,118 UART: [kat] ++
825,668 UART: [kat] sha1
836,616 UART: [kat] SHA2-256
839,636 UART: [kat] SHA2-384
847,076 UART: [kat] SHA2-512-ACC
849,705 UART: [kat] ECC-384
3,289,534 UART: [kat] HMAC-384Kdf
3,301,201 UART: [kat] LMS
3,833,020 UART: [kat] --
3,836,240 UART: [cold-reset] ++
3,837,610 UART: [fht] FHT @ 0x50003400
3,850,089 UART: [idev] ++
3,850,812 UART: [idev] CDI.KEYID = 6
3,851,720 UART: [idev] SUBJECT.KEYID = 7
3,852,973 UART: [idev] UDS.KEYID = 0
3,853,900 ready_for_fw is high
3,854,122 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,998,944 UART: [idev] Erasing UDS.KEYID = 0
6,328,340 UART: [idev] Sha1 KeyId Algorithm
6,350,460 UART: [idev] --
6,356,990 UART: [ldev] ++
6,357,667 UART: [ldev] CDI.KEYID = 6
6,358,552 UART: [ldev] SUBJECT.KEYID = 5
6,359,766 UART: [ldev] AUTHORITY.KEYID = 7
6,360,942 UART: [ldev] FE.KEYID = 1
6,374,000 UART: [ldev] Erasing FE.KEYID = 1
8,855,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,844 UART: [ldev] --
10,648,287 UART: [fwproc] Wait for Commands...
10,650,338 UART: [fwproc] Recv command 0x46574c44
10,652,655 UART: [fwproc] Recv'd Img size: 115304 bytes
14,107,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,853,296 >>> mbox cmd response: success
14,857,125 UART: [afmc] ++
14,857,829 UART: [afmc] CDI.KEYID = 6
14,858,991 UART: [afmc] SUBJECT.KEYID = 7
14,860,530 UART: [afmc] AUTHORITY.KEYID = 5
17,360,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,432 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,156,242 UART: [afmc] --
19,159,618 UART: [cold-reset] --
19,162,029 UART: [state] Locking Datavault
19,166,688 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,884 UART: [state] Locking ICCM
19,170,723 UART: [exit] Launching FMC @ 0x40000130
19,179,399 UART:
19,179,640 UART: Running Caliptra FMC ...
19,180,741 UART:
19,180,895 UART: [state] CFI Enabled
19,188,944 UART: [fht] FMC Alias Private Key: 7
20,945,731 UART: [art] Extend RT PCRs Done
20,946,936 UART: [art] Lock RT PCRs Done
20,948,652 UART: [art] Populate DV Done
20,953,950 UART: [fht] FMC Alias Private Key: 7
20,955,558 UART: [art] Derive CDI
20,956,301 UART: [art] Store in in slot 0x4
20,998,900 UART: [art] Derive Key Pair
20,999,906 UART: [art] Store priv key in slot 0x5
23,426,903 UART: [art] Derive Key Pair - Done
23,439,956 UART: [art] Signing Cert with AUTHO
23,441,270 UART: RITY.KEYID = 7
25,146,311 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,823 UART: [art] PUB.X = C9769BFE274DEBDBC8AEB06C7C2617756C4FA7B9B151BFA74C683753F394CCDA5EFC589C0ADE3C5B52AD03F598609D69
25,155,072 UART: [art] PUB.Y = F0774D48BE659FCF0F9FDF603BD7F02E7E13F31D25BF056642D9171B1405657637141EF95C84528F4953DDE90599EC1E
25,162,373 UART: [art] SIG.R = E2C28CBA8AB8D7701D2EEB218A5662261D897E239A4F5AD2D26ED7FF03B84F187D08D69F45CCC2C9AB7F17E099638F4B
25,169,813 UART: [art] SIG.S = FE5E75F1E235A8FC2D410D27E74C80A51515003E6FA23D362975FBAF53307D59035439C2BA1252AE28F86A62D5E48F70
26,148,858 UART: Caliptra RT
26,149,569 UART: [state] CFI Enabled
26,267,225 UART: [rt] RT listening for mailbox commands...
26,269,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,298,660 UART: [rt]cmd =0x46504c54, len=4
26,300,052 >>> mbox cmd response data (8 bytes)
26,301,247 UART: [rt] FIPS self test
26,302,193 UART: [kat] ++
26,302,638 UART: [kat] sha1
26,306,985 UART: [kat] SHA2-256
26,308,915 UART: [kat] SHA2-384
26,311,715 UART: [kat] SHA2-512-ACC
26,313,958 UART: [kat] ECC-384
28,737,288 UART: Fatal Error: 0x90040005
28,772,737 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,917,428 >>> mbox cmd response: failed
28,918,084 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,062,813 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,032 UART:
190,322 UART: Running Caliptra ROM ...
191,346 UART:
11,466,144 UART: [state] CFI Enabled
11,479,067 UART: [state] LifecycleState = Unprovisioned
11,481,415 UART: [state] DebugLocked = No
11,482,718 UART: [state] WD Timer not started. Device not locked for debugging
11,488,019 UART: [kat] SHA2-256
11,677,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,688,690 UART: [kat] ++
11,689,143 UART: [kat] sha1
11,701,002 UART: [kat] SHA2-256
11,704,009 UART: [kat] SHA2-384
11,709,303 UART: [kat] SHA2-512-ACC
11,711,874 UART: [kat] ECC-384
14,150,944 UART: [kat] HMAC-384Kdf
14,164,268 UART: [kat] LMS
14,696,138 UART: [kat] --
14,701,263 UART: [cold-reset] ++
14,702,868 UART: [fht] FHT @ 0x50003400
14,715,584 UART: [idev] ++
14,716,261 UART: [idev] CDI.KEYID = 6
14,717,223 UART: [idev] SUBJECT.KEYID = 7
14,718,433 UART: [idev] UDS.KEYID = 0
14,719,947 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,864,687 UART: [idev] Erasing UDS.KEYID = 0
17,196,550 UART: [idev] Sha1 KeyId Algorithm
17,220,207 UART: [idev] --
17,225,616 UART: [ldev] ++
17,226,335 UART: [ldev] CDI.KEYID = 6
17,227,254 UART: [ldev] SUBJECT.KEYID = 5
17,228,363 UART: [ldev] AUTHORITY.KEYID = 7
17,229,619 UART: [ldev] FE.KEYID = 1
17,241,617 UART: [ldev] Erasing FE.KEYID = 1
19,719,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,438,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,453,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,469,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,484,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,503,987 UART: [ldev] --
21,509,849 UART: [fwproc] Wait for Commands...
21,511,298 UART: [fwproc] Recv command 0x46574c44
21,513,611 UART: [fwproc] Recv'd Img size: 115304 bytes
24,972,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,051,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,167,697 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,715,785 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,751,722 ready_for_fw is high
3,752,164 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,975,040 >>> mbox cmd response: success
19,231,226 UART:
19,231,645 UART: Running Caliptra FMC ...
19,232,772 UART:
19,232,935 UART: [state] CFI Enabled
19,241,098 UART: [fht] FMC Alias Private Key: 7
20,997,451 UART: [art] Extend RT PCRs Done
20,998,673 UART: [art] Lock RT PCRs Done
21,000,247 UART: [art] Populate DV Done
21,005,828 UART: [fht] FMC Alias Private Key: 7
21,007,443 UART: [art] Derive CDI
21,008,269 UART: [art] Store in in slot 0x4
21,050,823 UART: [art] Derive Key Pair
21,051,895 UART: [art] Store priv key in slot 0x5
23,478,731 UART: [art] Derive Key Pair - Done
23,491,432 UART: [art] Signing Cert with AUTHO
23,492,738 UART: RITY.KEYID = 7
25,198,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,155 UART: [art] PUB.X = 31C0729D55A4379D5B583713D34C9E5F6D5022E716F7F8772D74DA8B4F757A3A26D61E1840668E15504F5AA77DA6F7D3
25,207,402 UART: [art] PUB.Y = C7BDE6FA583986CA3F2DDC1668DD893C423850FA90FAE141402C4AF9C6FAC72270EAAE4D2CDC1BDE793CCA21F08D7790
25,214,661 UART: [art] SIG.R = 125767A19FE798906EF8E0CAEC72A49FB1C4EDF934371F2C96207477CABD2582C5ADC510D47E2E794D01298E0E629B56
25,222,115 UART: [art] SIG.S = F8B8ED53AD2AE1F356BD3D0487DBAEFEA89BAD11F6F0D16F941B5960D0A3095488DDF9AF45123FCC9FD706FC7EFF21C3
26,200,994 UART: Caliptra RT
26,201,685 UART: [state] CFI Enabled
26,318,963 UART: [rt] RT listening for mailbox commands...
26,320,809 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,350,717 UART: [rt]cmd =0x46504c54, len=4
26,352,324 >>> mbox cmd response data (8 bytes)
26,353,428 UART: [rt] FIPS self test
26,354,409 UART: [kat] ++
26,354,869 UART: [kat] sha1
26,359,293 UART: [kat] SHA2-256
26,361,227 UART: [kat] SHA2-384
26,364,295 UART: [kat] SHA2-512-ACC
26,366,516 UART: [kat] ECC-384
28,790,439 UART: Fatal Error: 0x90040005
28,825,892 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,970,720 >>> mbox cmd response: failed
28,971,380 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,115,962 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
14,574,525 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,792,334 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,114 UART: [kat] SHA2-512-ACC
897,015 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,476,091 UART: [cold-reset] ++
1,476,437 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 ready_for_fw is high
1,480,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,504,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,376 UART: [idev] --
1,514,587 UART: [ldev] ++
1,514,755 UART: [ldev] CDI.KEYID = 6
1,515,118 UART: [ldev] SUBJECT.KEYID = 5
1,515,544 UART: [ldev] AUTHORITY.KEYID = 7
1,516,007 UART: [ldev] FE.KEYID = 1
1,521,353 UART: [ldev] Erasing FE.KEYID = 1
1,547,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,176 UART: [ldev] --
1,586,497 UART: [fwproc] Waiting for Commands...
1,587,172 UART: [fwproc] Received command 0x46574c44
1,587,963 UART: [fwproc] Received Image of size 115304 bytes
2,898,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,222 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,917 >>> mbox cmd response: success
3,093,989 UART: [afmc] ++
3,094,157 UART: [afmc] CDI.KEYID = 6
3,094,519 UART: [afmc] SUBJECT.KEYID = 7
3,094,944 UART: [afmc] AUTHORITY.KEYID = 5
3,130,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,021 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,906 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,596 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,595 UART: [afmc] --
3,173,603 UART: [cold-reset] --
3,174,391 UART: [state] Locking Datavault
3,175,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,272 UART: [state] Locking ICCM
3,176,882 UART: [exit] Launching FMC @ 0x40000130
3,182,211 UART:
3,182,227 UART: Running Caliptra FMC ...
3,182,635 UART:
3,182,689 UART: [state] CFI Enabled
3,193,250 UART: [fht] FMC Alias Private Key: 7
3,300,851 UART: [art] Extend RT PCRs Done
3,301,279 UART: [art] Lock RT PCRs Done
3,302,435 UART: [art] Populate DV Done
3,310,408 UART: [fht] FMC Alias Private Key: 7
3,311,486 UART: [art] Derive CDI
3,311,766 UART: [art] Store in in slot 0x4
3,397,273 UART: [art] Derive Key Pair
3,397,633 UART: [art] Store priv key in slot 0x5
3,410,805 UART: [art] Derive Key Pair - Done
3,425,399 UART: [art] Signing Cert with AUTHO
3,425,879 UART: RITY.KEYID = 7
3,440,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,446 UART: [art] PUB.X = 969FFF69BE6FA69E3137F3ECF3C2C299F86B4123C2C17B105EBACCDBE1E777CE3A9C36FDBEEEDDB0C6EC9A3878B9B82A
3,448,250 UART: [art] PUB.Y = B2721B22A12211168C1A32565E069A643C1FFC39B4F2A737AEDF4A264887148B1AC090FD150256C4A430D6D027261F24
3,455,190 UART: [art] SIG.R = EF1166D0B6695BC454A1577AA15070F79AD9CB7C9E155C45F0F9A91DBD169AE875ABAB5E13212A4B67210BFDCCD2FFDE
3,461,979 UART: [art] SIG.S = EA8CA1EFEF0589A4F7DBF3C32FCE892A73152BA53917ED97C8DD53B2E3AB72FD9283A2D65C9BC575A8FD07EA03ED4CC0
3,485,711 UART: Caliptra RT
3,485,964 UART: [state] CFI Enabled
3,594,328 UART: [rt] RT listening for mailbox commands...
3,594,991 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,838 UART: [rt]cmd =0x46504c54, len=4
3,626,013 >>> mbox cmd response data (8 bytes)
3,626,350 UART: [rt] FIPS self test
3,626,678 UART: [kat] ++
3,626,830 UART: [kat] sha1
3,630,980 UART: [kat] SHA2-256
3,633,002 UART: [kat] SHA2-384
3,635,967 UART: [kat] SHA2-512-ACC
3,637,894 UART: [kat] ECC-384
3,646,669 UART: Fatal Error: 0x90040005
3,648,219 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,648,224 >>> mbox cmd response: failed
3,648,224 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,648,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,316 UART: [kat] SHA2-512-ACC
897,217 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,479,904 UART: [idev] ++
1,480,072 UART: [idev] CDI.KEYID = 6
1,480,432 UART: [idev] SUBJECT.KEYID = 7
1,480,856 UART: [idev] UDS.KEYID = 0
1,481,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,030 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,554 UART: [idev] --
1,514,583 UART: [ldev] ++
1,514,751 UART: [ldev] CDI.KEYID = 6
1,515,114 UART: [ldev] SUBJECT.KEYID = 5
1,515,540 UART: [ldev] AUTHORITY.KEYID = 7
1,516,003 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,488 UART: [ldev] --
1,585,849 UART: [fwproc] Waiting for Commands...
1,586,484 UART: [fwproc] Received command 0x46574c44
1,587,275 UART: [fwproc] Received Image of size 115304 bytes
2,896,646 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,113 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 ready_for_fw is high
1,362,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,001 >>> mbox cmd response: success
3,003,849 UART:
3,003,865 UART: Running Caliptra FMC ...
3,004,273 UART:
3,004,327 UART: [state] CFI Enabled
3,014,762 UART: [fht] FMC Alias Private Key: 7
3,122,843 UART: [art] Extend RT PCRs Done
3,123,271 UART: [art] Lock RT PCRs Done
3,124,643 UART: [art] Populate DV Done
3,132,658 UART: [fht] FMC Alias Private Key: 7
3,133,678 UART: [art] Derive CDI
3,133,958 UART: [art] Store in in slot 0x4
3,219,415 UART: [art] Derive Key Pair
3,219,775 UART: [art] Store priv key in slot 0x5
3,232,843 UART: [art] Derive Key Pair - Done
3,247,597 UART: [art] Signing Cert with AUTHO
3,248,077 UART: RITY.KEYID = 7
3,263,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,030 UART: [art] PUB.X = F8B7B07EE7059025516030F952AED4B88119CEC3E28AF207942F0A8300F6B275A99BDEDE8909ACD8F3E2B8039DDECA52
3,270,775 UART: [art] PUB.Y = DE836F0A784ED16B1DD41BD59332121BC5FF9EB477EF0156D5E5FBFF3261A4BBDDEE8497114525CAA133A966D6B62CB5
3,277,737 UART: [art] SIG.R = CFCC06847B014C5FE0F0F098D7D33B260643321B96AE0C40D580A35972A994B3858AE5704DB57FE230E9A30808D57188
3,284,487 UART: [art] SIG.S = 48D040EBB7A5F4AD5BC6E3B24BA779C19D7687F8F1B3D5EBF3197405E9C6CA05D0519B9FAFAC90CA47504C0C05A13A4A
3,308,144 UART: Caliptra RT
3,308,397 UART: [state] CFI Enabled
3,416,654 UART: [rt] RT listening for mailbox commands...
3,417,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,026 UART: [rt]cmd =0x46504c54, len=4
3,448,327 >>> mbox cmd response data (8 bytes)
3,448,518 UART: [rt] FIPS self test
3,448,846 UART: [kat] ++
3,448,998 UART: [kat] sha1
3,453,258 UART: [kat] SHA2-256
3,455,280 UART: [kat] SHA2-384
3,458,269 UART: [kat] SHA2-512-ACC
3,460,196 UART: [kat] ECC-384
3,468,583 UART: Fatal Error: 0x90040005
3,470,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,470,138 >>> mbox cmd response: failed
3,470,138 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,470,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,185 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,197 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,351 UART: [kat] SHA2-512-ACC
897,252 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,078 UART: [fht] Storing FHT @ 0x50003400
1,480,011 UART: [idev] ++
1,480,179 UART: [idev] CDI.KEYID = 6
1,480,539 UART: [idev] SUBJECT.KEYID = 7
1,480,963 UART: [idev] UDS.KEYID = 0
1,481,308 ready_for_fw is high
1,481,308 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,075 UART: [idev] --
1,515,184 UART: [ldev] ++
1,515,352 UART: [ldev] CDI.KEYID = 6
1,515,715 UART: [ldev] SUBJECT.KEYID = 5
1,516,141 UART: [ldev] AUTHORITY.KEYID = 7
1,516,604 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,546,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,287 UART: [ldev] --
1,586,684 UART: [fwproc] Waiting for Commands...
1,587,313 UART: [fwproc] Received command 0x46574c44
1,588,104 UART: [fwproc] Received Image of size 115304 bytes
2,899,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,265 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,044 >>> mbox cmd response: success
3,094,066 UART: [afmc] ++
3,094,234 UART: [afmc] CDI.KEYID = 6
3,094,596 UART: [afmc] SUBJECT.KEYID = 7
3,095,021 UART: [afmc] AUTHORITY.KEYID = 5
3,129,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,005 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,695 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,642 UART: [afmc] --
3,172,522 UART: [cold-reset] --
3,173,482 UART: [state] Locking Datavault
3,174,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,929 UART: [state] Locking ICCM
3,175,457 UART: [exit] Launching FMC @ 0x40000130
3,180,786 UART:
3,180,802 UART: Running Caliptra FMC ...
3,181,210 UART:
3,181,353 UART: [state] CFI Enabled
3,192,056 UART: [fht] FMC Alias Private Key: 7
3,300,261 UART: [art] Extend RT PCRs Done
3,300,689 UART: [art] Lock RT PCRs Done
3,302,079 UART: [art] Populate DV Done
3,310,166 UART: [fht] FMC Alias Private Key: 7
3,311,232 UART: [art] Derive CDI
3,311,512 UART: [art] Store in in slot 0x4
3,397,513 UART: [art] Derive Key Pair
3,397,873 UART: [art] Store priv key in slot 0x5
3,411,267 UART: [art] Derive Key Pair - Done
3,426,100 UART: [art] Signing Cert with AUTHO
3,426,580 UART: RITY.KEYID = 7
3,441,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,387 UART: [art] PUB.X = A9788B9B20B28754608CBD41F0A12F8F134F36B60216515F2ED38434E47203508A1953EFB79788CD1BD74149641A4834
3,449,141 UART: [art] PUB.Y = 73BD3B190B47A16CE75B019D7A8A2E8AFB0A8CADE4073D4D101702E1FDC441A673665E576D114C6906A846CB648ADB7A
3,456,085 UART: [art] SIG.R = 847BA1F4CCC9C26C894CEDB66D4445A03ACDC5B42229BD4D23AFD8409333BB937BE407B697936022B9C9422D9F9E5FBD
3,462,866 UART: [art] SIG.S = F7184A4B4DD0BBC59A730CDBF3FDFA05263E27E64CBCAF58AB56E8C7ED7764F922E8C882E13CF08E3CD0EDD5264DF143
3,486,775 UART: Caliptra RT
3,487,120 UART: [state] CFI Enabled
3,596,118 UART: [rt] RT listening for mailbox commands...
3,596,781 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,556 UART: [rt]cmd =0x46504c54, len=4
3,627,701 >>> mbox cmd response data (8 bytes)
3,627,990 UART: [rt] FIPS self test
3,628,318 UART: [kat] ++
3,628,470 UART: [kat] sha1
3,632,728 UART: [kat] SHA2-256
3,634,750 UART: [kat] SHA2-384
3,637,607 UART: [kat] SHA2-512-ACC
3,639,534 UART: [kat] ECC-384
3,648,383 UART: Fatal Error: 0x90040005
3,649,933 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,649,938 >>> mbox cmd response: failed
3,649,938 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,649,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,198 UART: [kat] SHA2-256
892,136 UART: [kat] SHA2-384
895,061 UART: [kat] SHA2-512-ACC
896,962 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,521 UART: [kat] LMS
1,475,717 UART: [kat] --
1,476,472 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,227 UART: [idev] Erasing UDS.KEYID = 0
1,506,091 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,568 UART: [ldev] ++
1,515,736 UART: [ldev] CDI.KEYID = 6
1,516,099 UART: [ldev] SUBJECT.KEYID = 5
1,516,525 UART: [ldev] AUTHORITY.KEYID = 7
1,516,988 UART: [ldev] FE.KEYID = 1
1,522,372 UART: [ldev] Erasing FE.KEYID = 1
1,547,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,837 UART: [ldev] --
1,587,240 UART: [fwproc] Waiting for Commands...
1,587,887 UART: [fwproc] Received command 0x46574c44
1,588,678 UART: [fwproc] Received Image of size 115304 bytes
2,897,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,606 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 ready_for_fw is high
1,362,460 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,996 >>> mbox cmd response: success
3,003,976 UART:
3,003,992 UART: Running Caliptra FMC ...
3,004,400 UART:
3,004,543 UART: [state] CFI Enabled
3,014,888 UART: [fht] FMC Alias Private Key: 7
3,122,621 UART: [art] Extend RT PCRs Done
3,123,049 UART: [art] Lock RT PCRs Done
3,124,489 UART: [art] Populate DV Done
3,132,602 UART: [fht] FMC Alias Private Key: 7
3,133,566 UART: [art] Derive CDI
3,133,846 UART: [art] Store in in slot 0x4
3,219,751 UART: [art] Derive Key Pair
3,220,111 UART: [art] Store priv key in slot 0x5
3,233,209 UART: [art] Derive Key Pair - Done
3,247,872 UART: [art] Signing Cert with AUTHO
3,248,352 UART: RITY.KEYID = 7
3,263,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,333 UART: [art] PUB.X = C7BC92AFB16DD9CED280180AEA2E5ADEE08275FFB22FB456725378CF8A2C8DD22694BF29D58574D59F9A584FC5E8F186
3,271,118 UART: [art] PUB.Y = 8AC4FE14767EBC1FF8A7B926AFA643587E59B9E717636C9BE92E26D936BF781483B7DE61FD4E56C4D07D845D4C4B9DE1
3,278,082 UART: [art] SIG.R = DB5565441ECD9DDA3393502F654B74D2D37DF940A296A4E6BCFC4A8F8DADF7C2D1DDB3A801E7446B6F6E1D8413D153AB
3,284,869 UART: [art] SIG.S = 9D6B2DD33D06E027B937F664D1A1BA5B799A38CE119D0C63E2E333E76D469D03B56A46EB9407B2F1E828506BBEF802FC
3,308,569 UART: Caliptra RT
3,308,914 UART: [state] CFI Enabled
3,417,862 UART: [rt] RT listening for mailbox commands...
3,418,525 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,602 UART: [rt]cmd =0x46504c54, len=4
3,449,843 >>> mbox cmd response data (8 bytes)
3,450,078 UART: [rt] FIPS self test
3,450,406 UART: [kat] ++
3,450,558 UART: [kat] sha1
3,454,794 UART: [kat] SHA2-256
3,456,816 UART: [kat] SHA2-384
3,459,585 UART: [kat] SHA2-512-ACC
3,461,512 UART: [kat] ECC-384
3,470,337 UART: Fatal Error: 0x90040005
3,471,887 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,471,892 >>> mbox cmd response: failed
3,471,892 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,471,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,110 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,558 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,056 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,201,115 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,687 UART: [ldev] ++
1,210,855 UART: [ldev] CDI.KEYID = 6
1,211,218 UART: [ldev] SUBJECT.KEYID = 5
1,211,644 UART: [ldev] AUTHORITY.KEYID = 7
1,212,107 UART: [ldev] FE.KEYID = 1
1,217,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,282,924 UART: [fwproc] Wait for Commands...
1,283,734 UART: [fwproc] Recv command 0x46574c44
1,284,462 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,951 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,222 >>> mbox cmd response: success
2,788,332 UART: [afmc] ++
2,788,500 UART: [afmc] CDI.KEYID = 6
2,788,862 UART: [afmc] SUBJECT.KEYID = 7
2,789,287 UART: [afmc] AUTHORITY.KEYID = 5
2,824,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,833 UART: [afmc] --
2,867,839 UART: [cold-reset] --
2,868,899 UART: [state] Locking Datavault
2,869,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,524 UART: [state] Locking ICCM
2,871,086 UART: [exit] Launching FMC @ 0x40000130
2,876,415 UART:
2,876,431 UART: Running Caliptra FMC ...
2,876,839 UART:
2,876,893 UART: [state] CFI Enabled
2,887,490 UART: [fht] FMC Alias Private Key: 7
2,995,325 UART: [art] Extend RT PCRs Done
2,995,753 UART: [art] Lock RT PCRs Done
2,997,377 UART: [art] Populate DV Done
3,005,568 UART: [fht] FMC Alias Private Key: 7
3,006,528 UART: [art] Derive CDI
3,006,808 UART: [art] Store in in slot 0x4
3,092,047 UART: [art] Derive Key Pair
3,092,407 UART: [art] Store priv key in slot 0x5
3,105,803 UART: [art] Derive Key Pair - Done
3,120,838 UART: [art] Signing Cert with AUTHO
3,121,318 UART: RITY.KEYID = 7
3,136,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,229 UART: [art] PUB.X = 10371BF387D176774E467EFB4C52809656431038FC8F628326726F1244C319BAE075C15C1D94F39549A2E7C7A0B2A7EF
3,143,993 UART: [art] PUB.Y = AD23DC1EFAC9D5617467BA8E9FDD2CF93ABEAE90567EB704C1B643BFA1FC85CE4D3D77DCD28EBC5A0965BD1933807435
3,150,963 UART: [art] SIG.R = AC7ABE07B97031A55B304AA9707A4523AAC850E913926D2DF90E21569323BB2E0CF015705A51F4AA95AE661A9B32BCA2
3,157,732 UART: [art] SIG.S = 0BFB2D74EC62F3352AE85949D8A8F83488CDEA3275D51619C562BA3D54D003E077B479F3BDAB250D245AAE9F7CCA139D
3,180,894 UART: Caliptra RT
3,181,147 UART: [state] CFI Enabled
3,289,382 UART: [rt] RT listening for mailbox commands...
3,290,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,092 UART: [rt]cmd =0x46504c54, len=4
3,321,237 >>> mbox cmd response data (8 bytes)
3,321,518 UART: [rt] FIPS self test
3,321,846 UART: [kat] ++
3,321,998 UART: [kat] sha1
3,326,110 UART: [kat] SHA2-256
3,328,132 UART: [kat] SHA2-384
3,331,173 UART: [kat] SHA2-512-ACC
3,333,100 UART: [kat] ECC-384
3,342,277 UART: Fatal Error: 0x90040005
3,343,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,832 >>> mbox cmd response: failed
3,343,832 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,181 UART: [kat] SHA2-256
904,121 UART: [kat] SHA2-384
906,896 UART: [kat] SHA2-512-ACC
908,797 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,032 UART: [kat] LMS
1,171,360 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,751 UART: [fht] FHT @ 0x50003400
1,175,296 UART: [idev] ++
1,175,464 UART: [idev] CDI.KEYID = 6
1,175,824 UART: [idev] SUBJECT.KEYID = 7
1,176,248 UART: [idev] UDS.KEYID = 0
1,176,593 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,550 UART: [idev] Erasing UDS.KEYID = 0
1,201,487 UART: [idev] Sha1 KeyId Algorithm
1,210,033 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,217,827 UART: [ldev] Erasing FE.KEYID = 1
1,243,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,575 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,556 UART: [fwproc] Recv command 0x46574c44
1,284,284 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,547 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,830 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 ready_for_fw is high
1,060,513 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,843 >>> mbox cmd response: success
2,701,715 UART:
2,701,731 UART: Running Caliptra FMC ...
2,702,139 UART:
2,702,193 UART: [state] CFI Enabled
2,712,400 UART: [fht] FMC Alias Private Key: 7
2,820,299 UART: [art] Extend RT PCRs Done
2,820,727 UART: [art] Lock RT PCRs Done
2,822,093 UART: [art] Populate DV Done
2,830,306 UART: [fht] FMC Alias Private Key: 7
2,831,380 UART: [art] Derive CDI
2,831,660 UART: [art] Store in in slot 0x4
2,917,385 UART: [art] Derive Key Pair
2,917,745 UART: [art] Store priv key in slot 0x5
2,931,049 UART: [art] Derive Key Pair - Done
2,945,794 UART: [art] Signing Cert with AUTHO
2,946,274 UART: RITY.KEYID = 7
2,961,764 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,529 UART: [art] PUB.X = B7D7D191F8884156BA8AC52CC13B8A091E92B6E95EB487D0515EFC38009121495C3D899BBD0DE49F6EE501692F30BBA2
2,969,276 UART: [art] PUB.Y = 8D3BBD12C4CFB81A0D82D63A8086EBB6C93CFC236C9317CC408BDC19C14F19CF74F359DDFFD624969F40A36E8C7158BD
2,976,243 UART: [art] SIG.R = FC6F167E45641ABFA04246B0099DE0E275A17567915EE0882F9C7D25C2D41D26D763EECCACC3FAD3D6DC261000D43156
2,982,998 UART: [art] SIG.S = 45A0632FFF0C0F2074C0245E90D5355C5AC70A645784055DB43375C4BCF7BB02DAED3AD2516A83FFAB1AA577B5A341DB
3,007,116 UART: Caliptra RT
3,007,369 UART: [state] CFI Enabled
3,115,016 UART: [rt] RT listening for mailbox commands...
3,115,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,668 UART: [rt]cmd =0x46504c54, len=4
3,146,911 >>> mbox cmd response data (8 bytes)
3,147,182 UART: [rt] FIPS self test
3,147,510 UART: [kat] ++
3,147,662 UART: [kat] sha1
3,151,912 UART: [kat] SHA2-256
3,153,934 UART: [kat] SHA2-384
3,156,769 UART: [kat] SHA2-512-ACC
3,158,696 UART: [kat] ECC-384
3,167,593 UART: Fatal Error: 0x90040005
3,169,143 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,148 >>> mbox cmd response: failed
3,169,148 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,647 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
893,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,274 UART: [kat] ++
897,426 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,367 UART: [kat] SHA2-512-ACC
908,268 UART: [kat] ECC-384
918,273 UART: [kat] HMAC-384Kdf
923,003 UART: [kat] LMS
1,171,331 UART: [kat] --
1,172,056 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,117 UART: [idev] ++
1,175,285 UART: [idev] CDI.KEYID = 6
1,175,645 UART: [idev] SUBJECT.KEYID = 7
1,176,069 UART: [idev] UDS.KEYID = 0
1,176,414 ready_for_fw is high
1,176,414 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,583 UART: [idev] Erasing UDS.KEYID = 0
1,201,250 UART: [idev] Sha1 KeyId Algorithm
1,209,858 UART: [idev] --
1,210,798 UART: [ldev] ++
1,210,966 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,755 UART: [ldev] AUTHORITY.KEYID = 7
1,212,218 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,413 UART: [fwproc] Wait for Commands...
1,284,167 UART: [fwproc] Recv command 0x46574c44
1,284,895 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,912 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,291 >>> mbox cmd response: success
2,789,427 UART: [afmc] ++
2,789,595 UART: [afmc] CDI.KEYID = 6
2,789,957 UART: [afmc] SUBJECT.KEYID = 7
2,790,382 UART: [afmc] AUTHORITY.KEYID = 5
2,825,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,434 UART: [afmc] --
2,869,492 UART: [cold-reset] --
2,870,246 UART: [state] Locking Datavault
2,871,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,891 UART: [state] Locking ICCM
2,872,531 UART: [exit] Launching FMC @ 0x40000130
2,877,860 UART:
2,877,876 UART: Running Caliptra FMC ...
2,878,284 UART:
2,878,427 UART: [state] CFI Enabled
2,889,144 UART: [fht] FMC Alias Private Key: 7
2,997,815 UART: [art] Extend RT PCRs Done
2,998,243 UART: [art] Lock RT PCRs Done
3,000,029 UART: [art] Populate DV Done
3,008,306 UART: [fht] FMC Alias Private Key: 7
3,009,286 UART: [art] Derive CDI
3,009,566 UART: [art] Store in in slot 0x4
3,095,299 UART: [art] Derive Key Pair
3,095,659 UART: [art] Store priv key in slot 0x5
3,109,229 UART: [art] Derive Key Pair - Done
3,123,764 UART: [art] Signing Cert with AUTHO
3,124,244 UART: RITY.KEYID = 7
3,139,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,151 UART: [art] PUB.X = CFF860E4281896D83FD13C2B4A7B10308D32ABB81C85B4DF248863CFE230DECC5D7833CD748A88FE228E5A671D66B449
3,146,931 UART: [art] PUB.Y = E2E5E0F323CECF005FA08258B6436FFA1AEE81DA9001E477FC6C8F946F56D237FB83509270281AAA55CEA7D881C1C2C8
3,153,870 UART: [art] SIG.R = 6F7A63EC064EA71B29B0B10F85F7AD2DC6460FFCF2AF8E2A24BBF6553C28D7BEECE3547FB597AB7D27A4DAE23772C40D
3,160,654 UART: [art] SIG.S = F328B343BC284C586A160A1C1623DE9E148BD49156C365127450466A52CE27D0F0F258C15DF873D9F454D298DFDFD0E3
3,184,280 UART: Caliptra RT
3,184,625 UART: [state] CFI Enabled
3,292,482 UART: [rt] RT listening for mailbox commands...
3,293,145 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,024 UART: [rt]cmd =0x46504c54, len=4
3,324,073 >>> mbox cmd response data (8 bytes)
3,324,188 UART: [rt] FIPS self test
3,324,516 UART: [kat] ++
3,324,668 UART: [kat] sha1
3,328,984 UART: [kat] SHA2-256
3,331,006 UART: [kat] SHA2-384
3,333,923 UART: [kat] SHA2-512-ACC
3,335,850 UART: [kat] ECC-384
3,344,639 UART: Fatal Error: 0x90040005
3,346,189 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,194 >>> mbox cmd response: failed
3,346,194 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Unprovisioned
85,556 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,848 UART: [kat] SHA2-256
903,788 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,564 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,200,556 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,210,120 UART: [ldev] ++
1,210,288 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,077 UART: [ldev] AUTHORITY.KEYID = 7
1,211,540 UART: [ldev] FE.KEYID = 1
1,216,728 UART: [ldev] Erasing FE.KEYID = 1
1,243,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,896 UART: [ldev] --
1,283,185 UART: [fwproc] Wait for Commands...
1,283,807 UART: [fwproc] Recv command 0x46574c44
1,284,535 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,236 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,549 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 ready_for_fw is high
1,060,296 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,070 >>> mbox cmd response: success
2,701,496 UART:
2,701,512 UART: Running Caliptra FMC ...
2,701,920 UART:
2,702,063 UART: [state] CFI Enabled
2,712,590 UART: [fht] FMC Alias Private Key: 7
2,821,475 UART: [art] Extend RT PCRs Done
2,821,903 UART: [art] Lock RT PCRs Done
2,823,251 UART: [art] Populate DV Done
2,831,450 UART: [fht] FMC Alias Private Key: 7
2,832,498 UART: [art] Derive CDI
2,832,778 UART: [art] Store in in slot 0x4
2,918,415 UART: [art] Derive Key Pair
2,918,775 UART: [art] Store priv key in slot 0x5
2,932,519 UART: [art] Derive Key Pair - Done
2,947,404 UART: [art] Signing Cert with AUTHO
2,947,884 UART: RITY.KEYID = 7
2,963,136 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,901 UART: [art] PUB.X = 11CE6A85A2B38831C157BFD1D674D7A3C7BBFBFEFA59551E1B3E54B82F6173523748AA50AB1B3CC14D0F76BFA5F17120
2,970,684 UART: [art] PUB.Y = 80EF4E42072F2137B5AEBCC883E27026177CDC7E51356DC7A0B7D7C2110F4EA2F539BDAE1EBAA6F55F202DAD5D40D5CB
2,977,650 UART: [art] SIG.R = 2474DD98B3AF71D0CCF26890ED8A31A82BA523FDEF2DF747C9BCE20E320CD9EC6D79888077B45DE85370A58341960D3E
2,984,423 UART: [art] SIG.S = 83681C550CEB5F8676785DC97E539E14A0394BE87D002EA5D99FF53C903E388DBFB73DDB8D136773E79CCCD874ADB064
3,008,475 UART: Caliptra RT
3,008,820 UART: [state] CFI Enabled
3,117,595 UART: [rt] RT listening for mailbox commands...
3,118,258 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,183 UART: [rt]cmd =0x46504c54, len=4
3,149,412 >>> mbox cmd response data (8 bytes)
3,149,585 UART: [rt] FIPS self test
3,149,913 UART: [kat] ++
3,150,065 UART: [kat] sha1
3,154,345 UART: [kat] SHA2-256
3,156,367 UART: [kat] SHA2-384
3,159,290 UART: [kat] SHA2-512-ACC
3,161,217 UART: [kat] ECC-384
3,169,714 UART: Fatal Error: 0x90040005
3,171,264 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,269 >>> mbox cmd response: failed
3,171,269 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,082 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,888 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,369 UART: [idev] ++
1,173,537 UART: [idev] CDI.KEYID = 6
1,173,898 UART: [idev] SUBJECT.KEYID = 7
1,174,323 UART: [idev] UDS.KEYID = 0
1,174,669 ready_for_fw is high
1,174,669 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,968 UART: [fwproc] Wait for Commands...
1,281,597 UART: [fwproc] Recv command 0x46574c44
1,282,330 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,198 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,390 >>> mbox cmd response: success
2,786,439 UART: [afmc] ++
2,786,607 UART: [afmc] CDI.KEYID = 6
2,786,970 UART: [afmc] SUBJECT.KEYID = 7
2,787,396 UART: [afmc] AUTHORITY.KEYID = 5
2,823,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,818 UART: [afmc] --
2,866,780 UART: [cold-reset] --
2,867,494 UART: [state] Locking Datavault
2,868,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,363 UART: [state] Locking ICCM
2,869,939 UART: [exit] Launching FMC @ 0x40000130
2,875,268 UART:
2,875,284 UART: Running Caliptra FMC ...
2,875,692 UART:
2,875,746 UART: [state] CFI Enabled
2,886,525 UART: [fht] FMC Alias Private Key: 7
2,995,034 UART: [art] Extend RT PCRs Done
2,995,462 UART: [art] Lock RT PCRs Done
2,996,808 UART: [art] Populate DV Done
3,005,469 UART: [fht] FMC Alias Private Key: 7
3,006,509 UART: [art] Derive CDI
3,006,789 UART: [art] Store in in slot 0x4
3,092,098 UART: [art] Derive Key Pair
3,092,458 UART: [art] Store priv key in slot 0x5
3,106,160 UART: [art] Derive Key Pair - Done
3,120,712 UART: [art] Signing Cert with AUTHO
3,121,192 UART: RITY.KEYID = 7
3,136,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,901 UART: [art] PUB.X = 45B4F4C6B9FD724A179833424DF93C0FCAC25C19D4FDBAA316101B169A48B162E79CA9DD068DEEE88A7E84B4D66CFCE4
3,143,685 UART: [art] PUB.Y = AEA149CF9CA697504078B9377E7322331DA4B607C2F9A1D9B7D8E2F022392790AADF1A2FBAFC13ACCA6CBBF4DA4B9883
3,150,652 UART: [art] SIG.R = 1C99FEC15AEF96963FD3EE5C11E1EECD24FF876ABC11CB863C46911548DC3236080FB186DC717E922E3D77A9FD403E8C
3,157,432 UART: [art] SIG.S = 19CB208A74DA1EA7099262012D3DED5C31B6C6D6490E3725FA9532A210D256B61915552EEAAD134AC17831670F299BD7
3,181,453 UART: Caliptra RT
3,181,706 UART: [state] CFI Enabled
3,289,327 UART: [rt] RT listening for mailbox commands...
3,289,990 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,047 UART: [rt]cmd =0x46504c54, len=4
3,321,148 >>> mbox cmd response data (8 bytes)
3,321,281 UART: [rt] FIPS self test
3,321,609 UART: [kat] ++
3,321,761 UART: [kat] sha1
3,326,117 UART: [kat] SHA2-256
3,328,139 UART: [kat] SHA2-384
3,331,212 UART: [kat] SHA2-512-ACC
3,333,139 UART: [kat] ECC-384
3,341,988 UART: Fatal Error: 0x90040005
3,343,538 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,543 >>> mbox cmd response: failed
3,343,543 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,173,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,905 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,240,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,288 UART: [ldev] --
1,279,776 UART: [fwproc] Wait for Commands...
1,280,407 UART: [fwproc] Recv command 0x46574c44
1,281,140 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,230 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,464 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,714 ready_for_fw is high
1,055,714 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,146 >>> mbox cmd response: success
2,697,290 UART:
2,697,306 UART: Running Caliptra FMC ...
2,697,714 UART:
2,697,768 UART: [state] CFI Enabled
2,707,805 UART: [fht] FMC Alias Private Key: 7
2,815,666 UART: [art] Extend RT PCRs Done
2,816,094 UART: [art] Lock RT PCRs Done
2,817,814 UART: [art] Populate DV Done
2,825,857 UART: [fht] FMC Alias Private Key: 7
2,826,981 UART: [art] Derive CDI
2,827,261 UART: [art] Store in in slot 0x4
2,912,878 UART: [art] Derive Key Pair
2,913,238 UART: [art] Store priv key in slot 0x5
2,926,794 UART: [art] Derive Key Pair - Done
2,941,553 UART: [art] Signing Cert with AUTHO
2,942,033 UART: RITY.KEYID = 7
2,957,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,816 UART: [art] PUB.X = D6F605909017968C1B0476DBCE67032B37020B74F766C876A88F8DC7380AFCB547D1D2DF89D918B2254AAAD16EA76E7E
2,964,574 UART: [art] PUB.Y = 87BA9C2B4FCE1C7379B38CDB77D1CD4D1FED9F8F19AE656DB4F2CDB1CDF18D15A758495F158D0355BC020F7C40FFE156
2,971,539 UART: [art] SIG.R = A72CEE3A9C6D39EF470B4C7FDD5C930EDF608284B81542372FA89A6D13330DD0E6AD0DF07CFE8E7590FC92FEDBEF5A79
2,978,321 UART: [art] SIG.S = 523752408F6DEC57EE54D1167832621AFCD9F8666D7E1F2BC2A8C306F34BE6EA9FDB97CC0DB152869F25FC90C7A8B895
3,002,290 UART: Caliptra RT
3,002,543 UART: [state] CFI Enabled
3,111,194 UART: [rt] RT listening for mailbox commands...
3,111,857 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,084 UART: [rt]cmd =0x46504c54, len=4
3,143,235 >>> mbox cmd response data (8 bytes)
3,143,548 UART: [rt] FIPS self test
3,143,876 UART: [kat] ++
3,144,028 UART: [kat] sha1
3,148,368 UART: [kat] SHA2-256
3,150,390 UART: [kat] SHA2-384
3,153,205 UART: [kat] SHA2-512-ACC
3,155,132 UART: [kat] ECC-384
3,163,599 UART: Fatal Error: 0x90040005
3,165,149 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,154 >>> mbox cmd response: failed
3,165,154 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,522 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,440 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
1,169,863 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,174,952 ready_for_fw is high
1,174,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,901 UART: [fwproc] Wait for Commands...
1,283,506 UART: [fwproc] Recv command 0x46574c44
1,284,239 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,781 >>> mbox cmd response: success
2,789,860 UART: [afmc] ++
2,790,028 UART: [afmc] CDI.KEYID = 6
2,790,391 UART: [afmc] SUBJECT.KEYID = 7
2,790,817 UART: [afmc] AUTHORITY.KEYID = 5
2,826,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,015 UART: [afmc] --
2,869,059 UART: [cold-reset] --
2,869,635 UART: [state] Locking Datavault
2,870,932 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,536 UART: [state] Locking ICCM
2,872,184 UART: [exit] Launching FMC @ 0x40000130
2,877,513 UART:
2,877,529 UART: Running Caliptra FMC ...
2,877,937 UART:
2,878,080 UART: [state] CFI Enabled
2,888,441 UART: [fht] FMC Alias Private Key: 7
2,997,164 UART: [art] Extend RT PCRs Done
2,997,592 UART: [art] Lock RT PCRs Done
2,999,396 UART: [art] Populate DV Done
3,007,577 UART: [fht] FMC Alias Private Key: 7
3,008,561 UART: [art] Derive CDI
3,008,841 UART: [art] Store in in slot 0x4
3,094,298 UART: [art] Derive Key Pair
3,094,658 UART: [art] Store priv key in slot 0x5
3,108,202 UART: [art] Derive Key Pair - Done
3,123,109 UART: [art] Signing Cert with AUTHO
3,123,589 UART: RITY.KEYID = 7
3,138,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,658 UART: [art] PUB.X = 02CD8C2E04A93C957309D44788CEB54173D18A37570DD24774C81DE621C45EA608FA917759647F2A02165AAC5770513D
3,146,404 UART: [art] PUB.Y = 0A538A5676871768FF686D36D2D6033C119513A71D64B3D5E089F8760EFFD9B41A7D9FC36057C30C76EC3AC4DD7ACED8
3,153,350 UART: [art] SIG.R = 63871884586B71B38E06D4E65217414F690BF47AADE55C19023A472355DE463C32CA9EDA40224797F9D5EB687BDDBCFC
3,160,115 UART: [art] SIG.S = C693C740000300B5A8C9BACA55A69E0F6494CA7E27D9F429FABFC9AE13D50BD1F770FED1FC76C90C8CE8B97FD5D6A5D6
3,183,754 UART: Caliptra RT
3,184,099 UART: [state] CFI Enabled
3,291,608 UART: [rt] RT listening for mailbox commands...
3,292,271 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,090 UART: [rt]cmd =0x46504c54, len=4
3,323,209 >>> mbox cmd response data (8 bytes)
3,323,356 UART: [rt] FIPS self test
3,323,684 UART: [kat] ++
3,323,836 UART: [kat] sha1
3,328,016 UART: [kat] SHA2-256
3,330,038 UART: [kat] SHA2-384
3,333,077 UART: [kat] SHA2-512-ACC
3,335,004 UART: [kat] ECC-384
3,344,075 UART: Fatal Error: 0x90040005
3,345,625 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,630 >>> mbox cmd response: failed
3,345,630 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,174,300 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,198,304 UART: [idev] Sha1 KeyId Algorithm
1,207,290 UART: [idev] --
1,208,311 UART: [ldev] ++
1,208,479 UART: [ldev] CDI.KEYID = 6
1,208,843 UART: [ldev] SUBJECT.KEYID = 5
1,209,270 UART: [ldev] AUTHORITY.KEYID = 7
1,209,733 UART: [ldev] FE.KEYID = 1
1,215,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,447 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,723 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,679 ready_for_fw is high
1,056,679 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,891 >>> mbox cmd response: success
2,698,731 UART:
2,698,747 UART: Running Caliptra FMC ...
2,699,155 UART:
2,699,298 UART: [state] CFI Enabled
2,709,985 UART: [fht] FMC Alias Private Key: 7
2,817,566 UART: [art] Extend RT PCRs Done
2,817,994 UART: [art] Lock RT PCRs Done
2,819,568 UART: [art] Populate DV Done
2,827,667 UART: [fht] FMC Alias Private Key: 7
2,828,645 UART: [art] Derive CDI
2,828,925 UART: [art] Store in in slot 0x4
2,914,386 UART: [art] Derive Key Pair
2,914,746 UART: [art] Store priv key in slot 0x5
2,927,348 UART: [art] Derive Key Pair - Done
2,942,218 UART: [art] Signing Cert with AUTHO
2,942,698 UART: RITY.KEYID = 7
2,958,046 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,811 UART: [art] PUB.X = C6801503B2EC09F4EB0D33CA62BF9FB06382DBA7BD51CAC3942FCAB816919BBF80497C711E077C91DD1173AF65C49287
2,965,581 UART: [art] PUB.Y = 41DBDA5155735BF82C07E8B9E158A8B135E07634160E8AC5C38E75A199ABA7C5CA269A455913581A1CA782FF637CCF31
2,972,531 UART: [art] SIG.R = 7763EDE7AC68A5B6FE6E814A5DF7E5FCE34CB4B7A947FB5C8B1207EFABE84DD0A5606CEC4E46AB09EA2934B9CAC7CB67
2,979,327 UART: [art] SIG.S = 5BCF4E55C655305984A8B7BEA9E52497FADD409B1ABB50F150D740A1B0A336B086D1746161B0E623E6EE5D863E8692AD
3,002,992 UART: Caliptra RT
3,003,337 UART: [state] CFI Enabled
3,111,552 UART: [rt] RT listening for mailbox commands...
3,112,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,276 UART: [rt]cmd =0x46504c54, len=4
3,143,243 >>> mbox cmd response data (8 bytes)
3,143,520 UART: [rt] FIPS self test
3,143,848 UART: [kat] ++
3,144,000 UART: [kat] sha1
3,148,372 UART: [kat] SHA2-256
3,150,394 UART: [kat] SHA2-384
3,153,151 UART: [kat] SHA2-512-ACC
3,155,078 UART: [kat] ECC-384
3,163,947 UART: Fatal Error: 0x90040005
3,165,497 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,502 >>> mbox cmd response: failed
3,165,502 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,233 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,685 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,675,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,819,771 >>> mbox cmd response: failed
3,820,321 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,963,501 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,856,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,434,683 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,670,857 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,815,323 >>> mbox cmd response: failed
3,815,890 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,959,307 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
4,859,550 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,446,027 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,020,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,164,769 >>> mbox cmd response: failed
4,165,340 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,308,659 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,748,691 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,191,939 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,010,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,515 >>> mbox cmd response: failed
4,155,087 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,298,406 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,758,882 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,203,961 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,462,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,607,170 >>> mbox cmd response: failed
3,607,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,753,065 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,458,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,780 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,431,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,576,719 >>> mbox cmd response: failed
3,577,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,720,912 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,475,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,106 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
3,784,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,928,685 >>> mbox cmd response: failed
3,929,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,073,000 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
19,578,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,314,045 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
3,783,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,927,964 >>> mbox cmd response: failed
3,928,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,072,306 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
19,573,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,314,716 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,436,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,581,211 >>> mbox cmd response: failed
3,581,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,725,517 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,448,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,656 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,431,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,575,684 >>> mbox cmd response: failed
3,576,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,720,009 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,472,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,304,715 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,786,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,932,137 >>> mbox cmd response: failed
3,932,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,076,465 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
19,572,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,305,228 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,792,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,936,796 >>> mbox cmd response: failed
3,937,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,081,100 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
19,560,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,296,760 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,519 >>> mbox cmd response: failed
816,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,072 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,961 >>> mbox cmd response: failed
816,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,998 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,118 >>> mbox cmd response: failed
817,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,143 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,038 >>> mbox cmd response: failed
817,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,193 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,735 >>> mbox cmd response: failed
816,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,446 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,721 >>> mbox cmd response: failed
816,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,602 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,246 >>> mbox cmd response: failed
817,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,161 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,942 >>> mbox cmd response: failed
816,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,171 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,405 >>> mbox cmd response: failed
817,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,828 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,925 >>> mbox cmd response: failed
816,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,806 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,212 >>> mbox cmd response: failed
817,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,633 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,624 >>> mbox cmd response: failed
817,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,839 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,052 UART:
192,438 UART: Running Caliptra ROM ...
193,532 UART:
193,674 UART: [state] CFI Enabled
265,290 UART: [state] LifecycleState = Unprovisioned
267,283 UART: [state] DebugLocked = No
269,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,758 UART: [kat] SHA2-256
444,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,965 UART: [kat] ++
455,411 UART: [kat] sha1
465,435 UART: [kat] SHA2-256
468,113 UART: [kat] SHA2-384
473,897 UART: [kat] SHA2-512-ACC
476,268 UART: [kat] ECC-384
2,767,748 UART: [kat] HMAC-384Kdf
2,800,587 UART: [kat] LMS
3,990,895 UART: [kat] --
3,995,245 UART: [cold-reset] ++
3,996,614 UART: [fht] Storing FHT @ 0x50003400
4,009,099 UART: [idev] ++
4,009,707 UART: [idev] CDI.KEYID = 6
4,010,634 UART: [idev] SUBJECT.KEYID = 7
4,011,819 UART: [idev] UDS.KEYID = 0
4,012,825 ready_for_fw is high
4,013,041 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,157,557 UART: [idev] Erasing UDS.KEYID = 0
7,345,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,678 UART: [idev] --
7,372,523 UART: [ldev] ++
7,373,101 UART: [ldev] CDI.KEYID = 6
7,374,073 UART: [ldev] SUBJECT.KEYID = 5
7,375,242 UART: [ldev] AUTHORITY.KEYID = 7
7,376,532 UART: [ldev] FE.KEYID = 1
7,422,917 UART: [ldev] Erasing FE.KEYID = 1
10,756,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,454 UART: [ldev] --
13,137,703 UART: [fwproc] Waiting for Commands...
13,140,882 UART: [fwproc] Received command 0x46574c44
13,143,061 UART: [fwproc] Received Image of size 114996 bytes
17,213,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,645 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,354,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,674,567 >>> mbox cmd response: success
17,679,341 UART: [afmc] ++
17,679,936 UART: [afmc] CDI.KEYID = 6
17,680,854 UART: [afmc] SUBJECT.KEYID = 7
17,682,067 UART: [afmc] AUTHORITY.KEYID = 5
21,049,560 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,177 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,364,558 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,379,426 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,393,883 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,415,595 UART: [afmc] --
23,418,753 UART: [cold-reset] --
23,423,332 UART: [state] Locking Datavault
23,429,121 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,874 UART: [state] Locking ICCM
23,433,024 UART: [exit] Launching FMC @ 0x40000130
23,441,419 UART:
23,441,654 UART: Running Caliptra FMC ...
23,442,752 UART:
23,442,911 UART: [state] CFI Enabled
23,507,239 UART: [fht] FMC Alias Private Key: 7
25,846,038 UART: [art] Extend RT PCRs Done
25,847,383 UART: [art] Lock RT PCRs Done
25,849,168 UART: [art] Populate DV Done
25,854,475 UART: [fht] FMC Alias Private Key: 7
25,855,954 UART: [art] Derive CDI
25,856,715 UART: [art] Store in in slot 0x4
25,915,380 UART: [art] Derive Key Pair
25,916,398 UART: [art] Store priv key in slot 0x5
29,208,420 UART: [art] Derive Key Pair - Done
29,221,318 UART: [art] Signing Cert with AUTHO
29,222,624 UART: RITY.KEYID = 7
31,511,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,621 UART: [art] PUB.X = 1CF1DEB28ED38148383B05A5E092741B931B058A72BBBF0FC7AAB71343FA03B918226F26C4F256E42894760104144D06
31,519,819 UART: [art] PUB.Y = C468E787130D4FFF06D61DC616B5A3B12E8DF1F2F819BBB810848950566367B9250EF7B9E37D41F7E631579C4B085CA7
31,527,091 UART: [art] SIG.R = 9C69A57C0F2136BB5D33B82E49BACC8FD1E2308E41ACD3AFEE169C1AE5F1870C49EBAEBCEE714C728FCF73F4FC0AAFCA
31,534,502 UART: [art] SIG.S = 221A33BA8DF7DE33C039FF262C3DDF5EFB32E06449B9A78BE90164430AF62E3EA554DA730EF68D270A3359997D4A644C
32,839,751 UART: Caliptra RT
32,840,462 UART: [state] CFI Enabled
33,002,365 UART: [rt] RT listening for mailbox commands...
33,004,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,033,847 UART: [rt]cmd =0x46504c54, len=4
33,035,425 >>> mbox cmd response data (8 bytes)
33,036,418 UART: [rt] FIPS self test
33,037,389 UART: [kat] ++
33,037,844 UART: [kat] sha1
33,042,304 UART: [kat] SHA2-256
33,044,291 UART: [kat] SHA2-384
33,047,271 UART: [kat] SHA2-512-ACC
33,049,555 UART: [kat] ECC-384
34,018,328 UART: Fatal Error: 0x90040004
34,053,562 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,198,058 >>> mbox cmd response: failed
34,198,638 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,342,990 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
190,102 UART:
190,383 UART: Running Caliptra ROM ...
191,486 UART:
191,650 UART: [state] CFI Enabled
261,311 UART: [state] LifecycleState = Unprovisioned
263,225 UART: [state] DebugLocked = No
265,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,724 UART: [kat] SHA2-256
440,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,928 UART: [kat] ++
451,563 UART: [kat] sha1
461,860 UART: [kat] SHA2-256
464,540 UART: [kat] SHA2-384
469,799 UART: [kat] SHA2-512-ACC
472,148 UART: [kat] ECC-384
2,764,918 UART: [kat] HMAC-384Kdf
2,798,263 UART: [kat] LMS
3,988,568 UART: [kat] --
3,993,494 UART: [cold-reset] ++
3,994,480 UART: [fht] Storing FHT @ 0x50003400
4,007,050 UART: [idev] ++
4,007,625 UART: [idev] CDI.KEYID = 6
4,008,538 UART: [idev] SUBJECT.KEYID = 7
4,009,812 UART: [idev] UDS.KEYID = 0
4,011,335 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,155,899 UART: [idev] Erasing UDS.KEYID = 0
7,345,612 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,827 UART: [idev] --
7,370,704 UART: [ldev] ++
7,371,330 UART: [ldev] CDI.KEYID = 6
7,372,216 UART: [ldev] SUBJECT.KEYID = 5
7,373,480 UART: [ldev] AUTHORITY.KEYID = 7
7,374,714 UART: [ldev] FE.KEYID = 1
7,419,847 UART: [ldev] Erasing FE.KEYID = 1
10,753,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,982 UART: [ldev] --
13,112,966 UART: [fwproc] Waiting for Commands...
13,115,929 UART: [fwproc] Received command 0x46574c44
13,118,167 UART: [fwproc] Received Image of size 114996 bytes
17,175,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,638,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,783,475 ready_for_fw is high
3,783,882 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,875,029 >>> mbox cmd response: success
23,565,655 UART:
23,566,043 UART: Running Caliptra FMC ...
23,567,214 UART:
23,567,376 UART: [state] CFI Enabled
23,635,821 UART: [fht] FMC Alias Private Key: 7
25,974,003 UART: [art] Extend RT PCRs Done
25,975,233 UART: [art] Lock RT PCRs Done
25,976,862 UART: [art] Populate DV Done
25,982,397 UART: [fht] FMC Alias Private Key: 7
25,984,108 UART: [art] Derive CDI
25,984,853 UART: [art] Store in in slot 0x4
26,036,069 UART: [art] Derive Key Pair
26,037,148 UART: [art] Store priv key in slot 0x5
29,329,360 UART: [art] Derive Key Pair - Done
29,342,739 UART: [art] Signing Cert with AUTHO
29,344,047 UART: RITY.KEYID = 7
31,632,535 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,040 UART: [art] PUB.X = 58C105BFB97DD8A233E32A89A8DD5A4994088CC0D0D5819DD1C28213E9A04FD613AA1C9901E1160700287771BE915427
31,641,330 UART: [art] PUB.Y = C360B424408102B12FDC1BEB0DD654225ED1A13F79175C7568671D31E4D357633C0F3F1165FE56C90E82310A6900E256
31,648,450 UART: [art] SIG.R = 5C20D8A612B42ECFC8800DF1ED0644B6BB604AF977D64074E2A206AEA84823530B13A660E7F6160DBE50EFD73080F51C
31,655,870 UART: [art] SIG.S = 3DF9656A5115E980B8DD3667F069CCE811744AF417C06C74CF3AFAE6AB5673651E8B658C950F78EB82963EF8D9034DFD
32,960,687 UART: Caliptra RT
32,961,399 UART: [state] CFI Enabled
33,134,517 UART: [rt] RT listening for mailbox commands...
33,136,365 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,166,090 UART: [rt]cmd =0x46504c54, len=4
33,167,780 >>> mbox cmd response data (8 bytes)
33,168,907 UART: [rt] FIPS self test
33,169,855 UART: [kat] ++
33,170,307 UART: [kat] sha1
33,174,798 UART: [kat] SHA2-256
33,176,744 UART: [kat] SHA2-384
33,179,816 UART: [kat] SHA2-512-ACC
33,182,118 UART: [kat] ECC-384
34,151,805 UART: Fatal Error: 0x90040004
34,187,072 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,331,495 >>> mbox cmd response: failed
34,332,096 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,476,825 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
3,801,015 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,890,582 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,471 UART:
192,832 UART: Running Caliptra ROM ...
193,955 UART:
603,589 UART: [state] CFI Enabled
619,101 UART: [state] LifecycleState = Unprovisioned
621,105 UART: [state] DebugLocked = No
623,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,658 UART: [kat] SHA2-256
798,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,939 UART: [kat] ++
809,491 UART: [kat] sha1
820,942 UART: [kat] SHA2-256
823,601 UART: [kat] SHA2-384
830,019 UART: [kat] SHA2-512-ACC
832,395 UART: [kat] ECC-384
3,114,883 UART: [kat] HMAC-384Kdf
3,126,650 UART: [kat] LMS
4,316,778 UART: [kat] --
4,320,707 UART: [cold-reset] ++
4,323,026 UART: [fht] Storing FHT @ 0x50003400
4,335,798 UART: [idev] ++
4,336,367 UART: [idev] CDI.KEYID = 6
4,337,331 UART: [idev] SUBJECT.KEYID = 7
4,338,579 UART: [idev] UDS.KEYID = 0
4,339,497 ready_for_fw is high
4,339,720 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,484,237 UART: [idev] Erasing UDS.KEYID = 0
7,624,932 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,875 UART: [idev] --
7,650,885 UART: [ldev] ++
7,651,456 UART: [ldev] CDI.KEYID = 6
7,652,545 UART: [ldev] SUBJECT.KEYID = 5
7,653,666 UART: [ldev] AUTHORITY.KEYID = 7
7,654,906 UART: [ldev] FE.KEYID = 1
7,667,508 UART: [ldev] Erasing FE.KEYID = 1
10,954,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,900 UART: [ldev] --
13,317,517 UART: [fwproc] Waiting for Commands...
13,320,163 UART: [fwproc] Received command 0x46574c44
13,322,352 UART: [fwproc] Received Image of size 114996 bytes
17,385,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,465,031 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,533,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,854,225 >>> mbox cmd response: success
17,858,989 UART: [afmc] ++
17,859,588 UART: [afmc] CDI.KEYID = 6
17,860,502 UART: [afmc] SUBJECT.KEYID = 7
17,861,736 UART: [afmc] AUTHORITY.KEYID = 5
21,182,416 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,478,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,481,193 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,495,569 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,510,381 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,524,855 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,545,418 UART: [afmc] --
23,549,548 UART: [cold-reset] --
23,553,407 UART: [state] Locking Datavault
23,556,814 UART: [state] Locking PCR0, PCR1 and PCR31
23,558,567 UART: [state] Locking ICCM
23,560,659 UART: [exit] Launching FMC @ 0x40000130
23,569,050 UART:
23,569,288 UART: Running Caliptra FMC ...
23,570,390 UART:
23,570,576 UART: [state] CFI Enabled
23,578,855 UART: [fht] FMC Alias Private Key: 7
25,909,705 UART: [art] Extend RT PCRs Done
25,910,928 UART: [art] Lock RT PCRs Done
25,912,280 UART: [art] Populate DV Done
25,917,533 UART: [fht] FMC Alias Private Key: 7
25,919,230 UART: [art] Derive CDI
25,920,044 UART: [art] Store in in slot 0x4
25,962,585 UART: [art] Derive Key Pair
25,963,583 UART: [art] Store priv key in slot 0x5
29,205,424 UART: [art] Derive Key Pair - Done
29,218,103 UART: [art] Signing Cert with AUTHO
29,219,416 UART: RITY.KEYID = 7
31,498,649 UART: [art] Erasing AUTHORITY.KEYID = 7
31,500,174 UART: [art] PUB.X = 35FAEFC753873F0648516B8FFF3AC3E3A5797083F35B916A490176B39524B846F343B99564AB7BD0DD55B37AA5683E73
31,507,387 UART: [art] PUB.Y = 5D3D7CBF6065723B7CD33F0B4F95B4AB5D2586B73C52BF3A60A8E288B6B1A72BA834A0B0764EDF2F29DE76F5B91D022E
31,514,656 UART: [art] SIG.R = 81432CA003DDF38824A9FCAC61B6A1628423B91D69DFE619B16DBCC304D5D6FA58A1CE92A36D5E99B7A97B2268E1124C
31,522,014 UART: [art] SIG.S = BB1F703FEA6230CCFD8A2E5542EA8A1198E027EE0C121EE72DBB8A68DFED531F9C0A27AE803D4B7CDD29643103CAFFC8
32,826,921 UART: Caliptra RT
32,827,638 UART: [state] CFI Enabled
32,945,312 UART: [rt] RT listening for mailbox commands...
32,947,179 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,977,030 UART: [rt]cmd =0x46504c54, len=4
32,978,776 >>> mbox cmd response data (8 bytes)
32,979,957 UART: [rt] FIPS self test
32,980,898 UART: [kat] ++
32,981,348 UART: [kat] sha1
32,985,751 UART: [kat] SHA2-256
32,987,679 UART: [kat] SHA2-384
32,990,756 UART: [kat] SHA2-512-ACC
32,992,995 UART: [kat] ECC-384
33,956,946 UART: Fatal Error: 0x90040004
33,992,384 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,136,818 >>> mbox cmd response: failed
34,137,478 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,281,665 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,130 UART:
190,437 UART: Running Caliptra ROM ...
191,472 UART:
6,250,503 UART: [state] CFI Enabled
6,266,166 UART: [state] LifecycleState = Unprovisioned
6,268,091 UART: [state] DebugLocked = No
6,270,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,275,548 UART: [kat] SHA2-256
6,445,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,455,849 UART: [kat] ++
6,456,324 UART: [kat] sha1
6,467,916 UART: [kat] SHA2-256
6,470,613 UART: [kat] SHA2-384
6,476,549 UART: [kat] SHA2-512-ACC
6,478,899 UART: [kat] ECC-384
8,762,753 UART: [kat] HMAC-384Kdf
8,773,846 UART: [kat] LMS
9,963,934 UART: [kat] --
9,969,922 UART: [cold-reset] ++
9,972,234 UART: [fht] Storing FHT @ 0x50003400
9,982,959 UART: [idev] ++
9,983,525 UART: [idev] CDI.KEYID = 6
9,984,492 UART: [idev] SUBJECT.KEYID = 7
9,985,708 UART: [idev] UDS.KEYID = 0
9,987,330 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
10,131,704 UART: [idev] Erasing UDS.KEYID = 0
13,273,678 UART: [idev] Using Sha1 for KeyId Algorithm
13,295,654 UART: [idev] --
13,299,414 UART: [ldev] ++
13,299,990 UART: [ldev] CDI.KEYID = 6
13,300,929 UART: [ldev] SUBJECT.KEYID = 5
13,302,143 UART: [ldev] AUTHORITY.KEYID = 7
13,303,375 UART: [ldev] FE.KEYID = 1
13,312,837 UART: [ldev] Erasing FE.KEYID = 1
16,600,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,895,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,910,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,924,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,939,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,959,595 UART: [ldev] --
18,963,889 UART: [fwproc] Waiting for Commands...
18,967,182 UART: [fwproc] Received command 0x46574c44
18,969,446 UART: [fwproc] Received Image of size 114996 bytes
23,038,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,110,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,179,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
23,499,361 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
4,127,915 ready_for_fw is high
4,128,583 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,102,781 >>> mbox cmd response: success
23,741,923 UART:
23,742,322 UART: Running Caliptra FMC ...
23,743,636 UART:
23,743,813 UART: [state] CFI Enabled
23,751,454 UART: [fht] FMC Alias Private Key: 7
26,082,877 UART: [art] Extend RT PCRs Done
26,084,120 UART: [art] Lock RT PCRs Done
26,085,516 UART: [art] Populate DV Done
26,091,001 UART: [fht] FMC Alias Private Key: 7
26,092,605 UART: [art] Derive CDI
26,093,424 UART: [art] Store in in slot 0x4
26,135,975 UART: [art] Derive Key Pair
26,137,021 UART: [art] Store priv key in slot 0x5
29,378,968 UART: [art] Derive Key Pair - Done
29,391,868 UART: [art] Signing Cert with AUTHO
29,393,177 UART: RITY.KEYID = 7
31,672,371 UART: [art] Erasing AUTHORITY.KEYID = 7
31,673,889 UART: [art] PUB.X = 6F4829CA3ACB5F0D49F479A6C241DCF5C2FC605659035F467F2C8842A99E44AE0252E00FF0E6FE777189E3A823132921
31,681,148 UART: [art] PUB.Y = 51C359D3DCD828174590932908BFB0F7F73F9D669FD7CEB30938166D1CCCF2331D1A32E9FE29BFBFA10DFD91A91BAF73
31,688,406 UART: [art] SIG.R = 9A583EE725CA664F5BB786EB991694F6F2B3FAC1C6B68407792B48D267643A7EE364FC0CC844554C56CD36B5FA25AE0E
31,695,763 UART: [art] SIG.S = B0BA8B1EABB277A3D1C7020E7690F1E7904D10E97121AF40752FADED293F5A55FF5624F91555895E888185858F2DF3C0
33,001,147 UART: Caliptra RT
33,001,874 UART: [state] CFI Enabled
33,119,783 UART: [rt] RT listening for mailbox commands...
33,121,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,151,432 UART: [rt]cmd =0x46504c54, len=4
33,152,957 >>> mbox cmd response data (8 bytes)
33,154,223 UART: [rt] FIPS self test
33,155,168 UART: [kat] ++
33,155,620 UART: [kat] sha1
33,159,913 UART: [kat] SHA2-256
33,161,840 UART: [kat] SHA2-384
33,164,814 UART: [kat] SHA2-512-ACC
33,167,051 UART: [kat] ECC-384
34,130,664 UART: Fatal Error: 0x90040004
34,165,954 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,310,754 >>> mbox cmd response: failed
34,311,427 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,455,778 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
9,576,508 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
23,530,402 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,436 UART:
192,799 UART: Running Caliptra ROM ...
194,014 UART:
194,168 UART: [state] CFI Enabled
265,868 UART: [state] LifecycleState = Unprovisioned
267,718 UART: [state] DebugLocked = No
270,325 UART: [state] WD Timer not started. Device not locked for debugging
273,585 UART: [kat] SHA2-256
452,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,255 UART: [kat] ++
464,783 UART: [kat] sha1
475,134 UART: [kat] SHA2-256
478,131 UART: [kat] SHA2-384
483,847 UART: [kat] SHA2-512-ACC
486,787 UART: [kat] ECC-384
2,947,988 UART: [kat] HMAC-384Kdf
2,973,240 UART: [kat] LMS
3,502,684 UART: [kat] --
3,506,583 UART: [cold-reset] ++
3,507,458 UART: [fht] FHT @ 0x50003400
3,518,939 UART: [idev] ++
3,519,527 UART: [idev] CDI.KEYID = 6
3,520,418 UART: [idev] SUBJECT.KEYID = 7
3,521,616 UART: [idev] UDS.KEYID = 0
3,522,548 ready_for_fw is high
3,522,777 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,716 UART: [idev] Erasing UDS.KEYID = 0
6,028,514 UART: [idev] Sha1 KeyId Algorithm
6,051,237 UART: [idev] --
6,055,353 UART: [ldev] ++
6,055,934 UART: [ldev] CDI.KEYID = 6
6,056,822 UART: [ldev] SUBJECT.KEYID = 5
6,058,045 UART: [ldev] AUTHORITY.KEYID = 7
6,059,203 UART: [ldev] FE.KEYID = 1
6,103,474 UART: [ldev] Erasing FE.KEYID = 1
8,604,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,164 UART: [ldev] --
10,397,632 UART: [fwproc] Wait for Commands...
10,399,252 UART: [fwproc] Recv command 0x46574c44
10,401,352 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,721 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,291,544 >>> mbox cmd response: success
14,296,434 UART: [afmc] ++
14,297,025 UART: [afmc] CDI.KEYID = 6
14,297,939 UART: [afmc] SUBJECT.KEYID = 7
14,299,103 UART: [afmc] AUTHORITY.KEYID = 5
16,835,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,561,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,563,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,578,931 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,594,983 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,610,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,632,621 UART: [afmc] --
18,636,639 UART: [cold-reset] --
18,642,073 UART: [state] Locking Datavault
18,647,649 UART: [state] Locking PCR0, PCR1 and PCR31
18,649,294 UART: [state] Locking ICCM
18,651,336 UART: [exit] Launching FMC @ 0x40000130
18,659,730 UART:
18,659,966 UART: Running Caliptra FMC ...
18,661,066 UART:
18,661,232 UART: [state] CFI Enabled
18,716,024 UART: [fht] FMC Alias Private Key: 7
20,480,454 UART: [art] Extend RT PCRs Done
20,481,669 UART: [art] Lock RT PCRs Done
20,483,478 UART: [art] Populate DV Done
20,488,785 UART: [fht] FMC Alias Private Key: 7
20,490,377 UART: [art] Derive CDI
20,491,137 UART: [art] Store in in slot 0x4
20,549,148 UART: [art] Derive Key Pair
20,550,185 UART: [art] Store priv key in slot 0x5
23,013,085 UART: [art] Derive Key Pair - Done
23,026,033 UART: [art] Signing Cert with AUTHO
23,027,335 UART: RITY.KEYID = 7
24,739,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,655 UART: [art] PUB.X = 0A5D06D7EF174B2BBA104EC10029C3F92A1DE8952201DCAFA7B6C488BD834CBEBD07F169B2B8F1E2C67E03EADF4F2ED9
24,747,973 UART: [art] PUB.Y = F1AE954778C8D2082D3F3D7CA783C2A4A3E95FC29C9C7B8201CB3F19DCF77C769A542FA1842D3B6F2F30377FE926991E
24,755,221 UART: [art] SIG.R = 092617D0B85E7D2D9F5211E67141B3B38332F051CDF0075B5E0A0ACF996B044C69A7A058A7E552F278D309F249906655
24,762,564 UART: [art] SIG.S = E7D68F9D31A1FF97D5BA3B2F20FC22A51B816A54A405103904CE85A6E265200E5225D1CC53232A54725DC1FA1A20D7A4
25,742,137 UART: Caliptra RT
25,742,843 UART: [state] CFI Enabled
25,907,543 UART: [rt] RT listening for mailbox commands...
25,909,530 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,939,259 UART: [rt]cmd =0x46504c54, len=4
25,940,945 >>> mbox cmd response data (8 bytes)
25,941,928 UART: [rt] FIPS self test
25,942,874 UART: [kat] ++
25,943,321 UART: [kat] sha1
25,947,666 UART: [kat] SHA2-256
25,949,592 UART: [kat] SHA2-384
25,952,498 UART: [kat] SHA2-512-ACC
25,954,733 UART: [kat] ECC-384
26,684,702 UART: Fatal Error: 0x90040004
26,720,147 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,864,845 >>> mbox cmd response: failed
26,865,444 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,010,234 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
189,993 UART:
190,283 UART: Running Caliptra ROM ...
191,308 UART:
191,448 UART: [state] CFI Enabled
264,365 UART: [state] LifecycleState = Unprovisioned
266,287 UART: [state] DebugLocked = No
268,388 UART: [state] WD Timer not started. Device not locked for debugging
271,467 UART: [kat] SHA2-256
450,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,156 UART: [kat] ++
462,603 UART: [kat] sha1
474,452 UART: [kat] SHA2-256
477,457 UART: [kat] SHA2-384
483,220 UART: [kat] SHA2-512-ACC
486,171 UART: [kat] ECC-384
2,947,924 UART: [kat] HMAC-384Kdf
2,973,387 UART: [kat] LMS
3,502,824 UART: [kat] --
3,507,422 UART: [cold-reset] ++
3,508,385 UART: [fht] FHT @ 0x50003400
3,519,530 UART: [idev] ++
3,520,092 UART: [idev] CDI.KEYID = 6
3,521,110 UART: [idev] SUBJECT.KEYID = 7
3,522,212 UART: [idev] UDS.KEYID = 0
3,523,825 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,809 UART: [idev] Erasing UDS.KEYID = 0
6,030,269 UART: [idev] Sha1 KeyId Algorithm
6,053,824 UART: [idev] --
6,057,498 UART: [ldev] ++
6,058,074 UART: [ldev] CDI.KEYID = 6
6,059,009 UART: [ldev] SUBJECT.KEYID = 5
6,060,179 UART: [ldev] AUTHORITY.KEYID = 7
6,061,413 UART: [ldev] FE.KEYID = 1
6,101,722 UART: [ldev] Erasing FE.KEYID = 1
8,604,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,023 UART: [ldev] --
10,398,458 UART: [fwproc] Wait for Commands...
10,400,721 UART: [fwproc] Recv command 0x46574c44
10,402,821 UART: [fwproc] Recv'd Img size: 115304 bytes
13,816,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,563 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,275,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,383,795 ready_for_fw is high
3,384,319 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,107,340 >>> mbox cmd response: success
18,388,890 UART:
18,389,294 UART: Running Caliptra FMC ...
18,390,450 UART:
18,390,611 UART: [state] CFI Enabled
18,455,621 UART: [fht] FMC Alias Private Key: 7
20,219,288 UART: [art] Extend RT PCRs Done
20,220,510 UART: [art] Lock RT PCRs Done
20,221,969 UART: [art] Populate DV Done
20,227,412 UART: [fht] FMC Alias Private Key: 7
20,229,120 UART: [art] Derive CDI
20,229,935 UART: [art] Store in in slot 0x4
20,288,538 UART: [art] Derive Key Pair
20,289,538 UART: [art] Store priv key in slot 0x5
22,752,405 UART: [art] Derive Key Pair - Done
22,765,508 UART: [art] Signing Cert with AUTHO
22,766,813 UART: RITY.KEYID = 7
24,478,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,203 UART: [art] PUB.X = 530C5C1522A052F2DCE486A94D9A530AC9B489BE498CF34FE6B502A8A69FFF7261A3D16147F92EB1BA0E428255809174
24,487,469 UART: [art] PUB.Y = 089372E9325219EF0A952324E28C83B1EB47A0B4CCA54176E07FC05C43122A196150F6D07A4E608126782AD3E028CCF1
24,494,677 UART: [art] SIG.R = 8FDD4353620C9058636B9159299D0FEDEDCB49600CD8924E401C31995D57915ABFED76A014E871FB374532B32DBB4BBB
24,502,089 UART: [art] SIG.S = 4AC097B19F416339165C330515CF66CB2221AECB5D6DE7C3E9646D68673DF7FC58CD420948A53FE1861FA340B1493CF2
25,480,966 UART: Caliptra RT
25,481,676 UART: [state] CFI Enabled
25,647,227 UART: [rt] RT listening for mailbox commands...
25,649,074 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,678,551 UART: [rt]cmd =0x46504c54, len=4
25,680,235 >>> mbox cmd response data (8 bytes)
25,680,967 UART: [rt] FIPS self test
25,681,906 UART: [kat] ++
25,682,352 UART: [kat] sha1
25,687,074 UART: [kat] SHA2-256
25,688,950 UART: [kat] SHA2-384
25,691,829 UART: [kat] SHA2-512-ACC
25,694,087 UART: [kat] ECC-384
26,422,828 UART: Fatal Error: 0x90040004
26,458,040 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,602,864 >>> mbox cmd response: failed
26,603,482 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,748,215 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,341,710 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,051,884 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,635 UART:
192,998 UART: Running Caliptra ROM ...
194,199 UART:
603,837 UART: [state] CFI Enabled
617,442 UART: [state] LifecycleState = Unprovisioned
619,346 UART: [state] DebugLocked = No
621,169 UART: [state] WD Timer not started. Device not locked for debugging
624,936 UART: [kat] SHA2-256
804,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,584 UART: [kat] ++
816,037 UART: [kat] sha1
827,304 UART: [kat] SHA2-256
830,320 UART: [kat] SHA2-384
836,741 UART: [kat] SHA2-512-ACC
839,683 UART: [kat] ECC-384
3,282,199 UART: [kat] HMAC-384Kdf
3,294,089 UART: [kat] LMS
3,823,562 UART: [kat] --
3,827,560 UART: [cold-reset] ++
3,829,423 UART: [fht] FHT @ 0x50003400
3,841,323 UART: [idev] ++
3,841,914 UART: [idev] CDI.KEYID = 6
3,842,800 UART: [idev] SUBJECT.KEYID = 7
3,844,046 UART: [idev] UDS.KEYID = 0
3,844,952 ready_for_fw is high
3,845,173 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,041 UART: [idev] Erasing UDS.KEYID = 0
6,317,223 UART: [idev] Sha1 KeyId Algorithm
6,340,993 UART: [idev] --
6,345,370 UART: [ldev] ++
6,345,940 UART: [ldev] CDI.KEYID = 6
6,346,853 UART: [ldev] SUBJECT.KEYID = 5
6,348,073 UART: [ldev] AUTHORITY.KEYID = 7
6,349,308 UART: [ldev] FE.KEYID = 1
6,360,523 UART: [ldev] Erasing FE.KEYID = 1
8,834,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,848 UART: [ldev] --
10,623,308 UART: [fwproc] Wait for Commands...
10,625,498 UART: [fwproc] Recv command 0x46574c44
10,627,607 UART: [fwproc] Recv'd Img size: 115304 bytes
14,036,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,040 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,501,011 >>> mbox cmd response: success
14,504,873 UART: [afmc] ++
14,505,456 UART: [afmc] CDI.KEYID = 6
14,506,524 UART: [afmc] SUBJECT.KEYID = 7
14,507,631 UART: [afmc] AUTHORITY.KEYID = 5
17,005,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,567 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,309 UART: [afmc] --
18,804,076 UART: [cold-reset] --
18,807,674 UART: [state] Locking Datavault
18,811,356 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,005 UART: [state] Locking ICCM
18,814,784 UART: [exit] Launching FMC @ 0x40000130
18,823,187 UART:
18,823,425 UART: Running Caliptra FMC ...
18,824,532 UART:
18,824,693 UART: [state] CFI Enabled
18,833,009 UART: [fht] FMC Alias Private Key: 7
20,589,410 UART: [art] Extend RT PCRs Done
20,590,631 UART: [art] Lock RT PCRs Done
20,592,229 UART: [art] Populate DV Done
20,597,581 UART: [fht] FMC Alias Private Key: 7
20,599,233 UART: [art] Derive CDI
20,599,967 UART: [art] Store in in slot 0x4
20,642,124 UART: [art] Derive Key Pair
20,643,163 UART: [art] Store priv key in slot 0x5
23,070,082 UART: [art] Derive Key Pair - Done
23,083,298 UART: [art] Signing Cert with AUTHO
23,084,602 UART: RITY.KEYID = 7
24,790,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,607 UART: [art] PUB.X = 51F4247B1F8F83EA5D8A50FA73A9A070ACD2AAC924CEA82BC4BA01E859B3DE6BBA685218E23FE72CD1340828C681C0F4
24,798,859 UART: [art] PUB.Y = D7210679103CDB77069CE43DC764F196466B7861B3D29685555FCC108369FF2AFF6570632F21171E7A37CAD73A340AB6
24,806,099 UART: [art] SIG.R = 4946897B645F9A6116C132B5957378CD582A31D4D3596204E69D884E150AFDE25665E6D14A1666E22166A8D8BC1ADB03
24,813,507 UART: [art] SIG.S = 96F6048F1921B58B2065146C3E8391821D95361C33F7DE08499B2E2A68FC0F32E47641B94DD46491A560748E87BFDF5A
25,792,280 UART: Caliptra RT
25,793,022 UART: [state] CFI Enabled
25,910,268 UART: [rt] RT listening for mailbox commands...
25,912,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,941,742 UART: [rt]cmd =0x46504c54, len=4
25,943,484 >>> mbox cmd response data (8 bytes)
25,944,377 UART: [rt] FIPS self test
25,945,332 UART: [kat] ++
25,945,781 UART: [kat] sha1
25,950,429 UART: [kat] SHA2-256
25,952,360 UART: [kat] SHA2-384
25,955,374 UART: [kat] SHA2-512-ACC
25,957,662 UART: [kat] ECC-384
26,680,088 UART: Fatal Error: 0x90040004
26,715,451 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,860,186 >>> mbox cmd response: failed
26,860,803 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,005,555 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,087 UART:
190,379 UART: Running Caliptra ROM ...
191,402 UART:
13,526,131 UART: [state] CFI Enabled
13,541,120 UART: [state] LifecycleState = Unprovisioned
13,543,011 UART: [state] DebugLocked = No
13,545,669 UART: [state] WD Timer not started. Device not locked for debugging
13,549,462 UART: [kat] SHA2-256
13,728,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
13,740,192 UART: [kat] ++
13,740,648 UART: [kat] sha1
13,751,207 UART: [kat] SHA2-256
13,754,247 UART: [kat] SHA2-384
13,759,806 UART: [kat] SHA2-512-ACC
13,762,750 UART: [kat] ECC-384
16,203,877 UART: [kat] HMAC-384Kdf
16,217,347 UART: [kat] LMS
16,746,807 UART: [kat] --
16,751,604 UART: [cold-reset] ++
16,754,121 UART: [fht] FHT @ 0x50003400
16,764,022 UART: [idev] ++
16,764,584 UART: [idev] CDI.KEYID = 6
16,765,601 UART: [idev] SUBJECT.KEYID = 7
16,766,705 UART: [idev] UDS.KEYID = 0
16,768,215 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
16,912,983 UART: [idev] Erasing UDS.KEYID = 0
19,240,539 UART: [idev] Sha1 KeyId Algorithm
19,264,965 UART: [idev] --
19,268,163 UART: [ldev] ++
19,268,734 UART: [ldev] CDI.KEYID = 6
19,269,641 UART: [ldev] SUBJECT.KEYID = 5
19,270,797 UART: [ldev] AUTHORITY.KEYID = 7
19,272,083 UART: [ldev] FE.KEYID = 1
19,284,245 UART: [ldev] Erasing FE.KEYID = 1
21,754,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,470,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,486,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,502,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,518,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,537,894 UART: [ldev] --
23,542,840 UART: [fwproc] Wait for Commands...
23,545,707 UART: [fwproc] Recv command 0x46574c44
23,547,809 UART: [fwproc] Recv'd Img size: 115304 bytes
26,960,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,034,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,102,927 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
27,424,068 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,569 writing to cptra_bootfsm_go
3,693,559 ready_for_fw is high
3,694,120 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,289,351 >>> mbox cmd response: success
18,540,150 UART:
18,540,534 UART: Running Caliptra FMC ...
18,541,689 UART:
18,541,849 UART: [state] CFI Enabled
18,549,868 UART: [fht] FMC Alias Private Key: 7
20,306,060 UART: [art] Extend RT PCRs Done
20,307,290 UART: [art] Lock RT PCRs Done
20,308,648 UART: [art] Populate DV Done
20,314,100 UART: [fht] FMC Alias Private Key: 7
20,315,696 UART: [art] Derive CDI
20,316,438 UART: [art] Store in in slot 0x4
20,359,087 UART: [art] Derive Key Pair
20,360,088 UART: [art] Store priv key in slot 0x5
22,786,711 UART: [art] Derive Key Pair - Done
22,799,331 UART: [art] Signing Cert with AUTHO
22,800,627 UART: RITY.KEYID = 7
24,506,276 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,782 UART: [art] PUB.X = 57EBD6AEB00213F4928D0A0B909256458A843B2816ED5709A784A4B1B9F68098E198C36C81739F4DB4CAED83EF716C5C
24,515,049 UART: [art] PUB.Y = 1E2B5824628AA74D1270B84987FA285729A45FFCE0744F9EF2A82518F54B5A13C35763BBF7B924C79308436F4F16B0B7
24,522,324 UART: [art] SIG.R = BB71D652553D9C22A373AA81BA0D7E448A616423ADF761A82CD496967946769196D43F2662638F42276518933CE82956
24,529,689 UART: [art] SIG.S = B246D28113838FC15B85A8AB3AD942DF330FB6CED877F1BBF8EE56944E2CC0C89A6F4B07217FE0B71C3E1D25F0C57E33
25,509,109 UART: Caliptra RT
25,509,805 UART: [state] CFI Enabled
25,627,194 UART: [rt] RT listening for mailbox commands...
25,629,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,658,779 UART: [rt]cmd =0x46504c54, len=4
25,660,412 >>> mbox cmd response data (8 bytes)
25,661,894 UART: [rt] FIPS self test
25,662,830 UART: [kat] ++
25,663,276 UART: [kat] sha1
25,667,799 UART: [kat] SHA2-256
25,669,712 UART: [kat] SHA2-384
25,672,546 UART: [kat] SHA2-512-ACC
25,674,765 UART: [kat] ECC-384
26,397,252 UART: Fatal Error: 0x90040004
26,432,485 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,577,373 >>> mbox cmd response: failed
26,578,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,722,737 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
16,903,435 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,489,866 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,160 UART:
192,546 UART: Running Caliptra ROM ...
193,747 UART:
193,898 UART: [state] CFI Enabled
267,151 UART: [state] LifecycleState = Unprovisioned
269,519 UART: [state] DebugLocked = No
270,840 UART: [state] WD Timer not started. Device not locked for debugging
275,209 UART: [kat] SHA2-256
465,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,900 UART: [kat] ++
476,346 UART: [kat] sha1
487,510 UART: [kat] SHA2-256
490,588 UART: [kat] SHA2-384
497,074 UART: [kat] SHA2-512-ACC
499,659 UART: [kat] ECC-384
2,947,081 UART: [kat] HMAC-384Kdf
2,973,733 UART: [kat] LMS
3,505,525 UART: [kat] --
3,509,668 UART: [cold-reset] ++
3,510,821 UART: [fht] FHT @ 0x50003400
3,521,029 UART: [idev] ++
3,521,744 UART: [idev] CDI.KEYID = 6
3,522,669 UART: [idev] SUBJECT.KEYID = 7
3,523,935 UART: [idev] UDS.KEYID = 0
3,524,868 ready_for_fw is high
3,525,096 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,226 UART: [idev] Erasing UDS.KEYID = 0
6,029,670 UART: [idev] Sha1 KeyId Algorithm
6,053,208 UART: [idev] --
6,059,195 UART: [ldev] ++
6,059,889 UART: [ldev] CDI.KEYID = 6
6,060,804 UART: [ldev] SUBJECT.KEYID = 5
6,061,970 UART: [ldev] AUTHORITY.KEYID = 7
6,063,205 UART: [ldev] FE.KEYID = 1
6,101,889 UART: [ldev] Erasing FE.KEYID = 1
8,608,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,053 UART: [ldev] --
10,415,643 UART: [fwproc] Wait for Commands...
10,418,495 UART: [fwproc] Recv command 0x46574c44
10,420,749 UART: [fwproc] Recv'd Img size: 115304 bytes
13,884,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,079,179 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,627,277 >>> mbox cmd response: success
14,632,070 UART: [afmc] ++
14,632,777 UART: [afmc] CDI.KEYID = 6
14,633,884 UART: [afmc] SUBJECT.KEYID = 7
14,635,423 UART: [afmc] AUTHORITY.KEYID = 5
17,172,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,379 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,456 UART: [afmc] --
18,968,204 UART: [cold-reset] --
18,973,905 UART: [state] Locking Datavault
18,978,341 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,526 UART: [state] Locking ICCM
18,981,839 UART: [exit] Launching FMC @ 0x40000130
18,990,504 UART:
18,990,744 UART: Running Caliptra FMC ...
18,991,965 UART:
18,992,127 UART: [state] CFI Enabled
19,054,222 UART: [fht] FMC Alias Private Key: 7
20,817,913 UART: [art] Extend RT PCRs Done
20,819,136 UART: [art] Lock RT PCRs Done
20,820,705 UART: [art] Populate DV Done
20,826,120 UART: [fht] FMC Alias Private Key: 7
20,827,766 UART: [art] Derive CDI
20,828,584 UART: [art] Store in in slot 0x4
20,886,629 UART: [art] Derive Key Pair
20,887,668 UART: [art] Store priv key in slot 0x5
23,350,409 UART: [art] Derive Key Pair - Done
23,363,139 UART: [art] Signing Cert with AUTHO
23,364,442 UART: RITY.KEYID = 7
25,076,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,775 UART: [art] PUB.X = 081932F2103FA48BBE547EDA182F77C856F065EB961702180579D3AA4E141E685DCBD941D958175B4F57D533D265437E
25,085,036 UART: [art] PUB.Y = 7770305311F71905830E505600BACF5391B7460DAA388CCD7CCDF7A456779AD3E37EA3E2592FFDB091A9D05684339011
25,092,235 UART: [art] SIG.R = 9A2C9E618E3BB0D79FF953D57A98BF8C97415745B14E8996BA6C6EBF02BC5613399507F5F9D84762F35E4DAE21D81918
25,099,636 UART: [art] SIG.S = E8BEDF498F25D93B8FB33BABE55294BFD034B5A1130E5DFEB70447181CC1EB47E9FF313F68CB78A76228AAE683326965
26,079,530 UART: Caliptra RT
26,080,228 UART: [state] CFI Enabled
26,243,962 UART: [rt] RT listening for mailbox commands...
26,245,813 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,275,376 UART: [rt]cmd =0x46504c54, len=4
26,276,930 >>> mbox cmd response data (8 bytes)
26,278,055 UART: [rt] FIPS self test
26,279,004 UART: [kat] ++
26,279,457 UART: [kat] sha1
26,283,782 UART: [kat] SHA2-256
26,285,661 UART: [kat] SHA2-384
26,288,618 UART: [kat] SHA2-512-ACC
26,290,854 UART: [kat] ECC-384
27,020,010 UART: Fatal Error: 0x90040004
27,055,298 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,200,115 >>> mbox cmd response: failed
27,200,734 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,345,522 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,099 UART:
190,403 UART: Running Caliptra ROM ...
191,436 UART:
191,577 UART: [state] CFI Enabled
265,583 UART: [state] LifecycleState = Unprovisioned
267,937 UART: [state] DebugLocked = No
269,988 UART: [state] WD Timer not started. Device not locked for debugging
274,744 UART: [kat] SHA2-256
464,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,360 UART: [kat] ++
475,816 UART: [kat] sha1
486,697 UART: [kat] SHA2-256
489,706 UART: [kat] SHA2-384
495,736 UART: [kat] SHA2-512-ACC
498,312 UART: [kat] ECC-384
2,942,624 UART: [kat] HMAC-384Kdf
2,967,234 UART: [kat] LMS
3,498,990 UART: [kat] --
3,503,522 UART: [cold-reset] ++
3,506,102 UART: [fht] FHT @ 0x50003400
3,517,838 UART: [idev] ++
3,518,520 UART: [idev] CDI.KEYID = 6
3,519,432 UART: [idev] SUBJECT.KEYID = 7
3,520,644 UART: [idev] UDS.KEYID = 0
3,522,151 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,513 UART: [idev] Erasing UDS.KEYID = 0
6,023,738 UART: [idev] Sha1 KeyId Algorithm
6,046,331 UART: [idev] --
6,051,773 UART: [ldev] ++
6,052,473 UART: [ldev] CDI.KEYID = 6
6,053,409 UART: [ldev] SUBJECT.KEYID = 5
6,054,573 UART: [ldev] AUTHORITY.KEYID = 7
6,055,807 UART: [ldev] FE.KEYID = 1
6,096,375 UART: [ldev] Erasing FE.KEYID = 1
8,601,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,866 UART: [ldev] --
10,409,073 UART: [fwproc] Wait for Commands...
10,411,330 UART: [fwproc] Recv command 0x46574c44
10,413,642 UART: [fwproc] Recv'd Img size: 115304 bytes
13,877,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,840 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,614,016 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,439,399 ready_for_fw is high
3,439,974 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,758,850 >>> mbox cmd response: success
19,048,601 UART:
19,048,986 UART: Running Caliptra FMC ...
19,050,145 UART:
19,050,327 UART: [state] CFI Enabled
19,117,956 UART: [fht] FMC Alias Private Key: 7
20,881,677 UART: [art] Extend RT PCRs Done
20,882,916 UART: [art] Lock RT PCRs Done
20,884,411 UART: [art] Populate DV Done
20,889,510 UART: [fht] FMC Alias Private Key: 7
20,891,161 UART: [art] Derive CDI
20,891,901 UART: [art] Store in in slot 0x4
20,950,178 UART: [art] Derive Key Pair
20,951,183 UART: [art] Store priv key in slot 0x5
23,414,374 UART: [art] Derive Key Pair - Done
23,427,539 UART: [art] Signing Cert with AUTHO
23,428,844 UART: RITY.KEYID = 7
25,139,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,132 UART: [art] PUB.X = AA74F360C70953EFB19B2944AF8F7BB17D59F226748FB7420153391C3991802DFDD1989E69787DCE11CB1FF48F5A705E
25,148,343 UART: [art] PUB.Y = 4D6CBAA059986705EA888B8F41166F65C5333F7A8136E20A199A3DDAF5DF5F0F6EBEFB70BE9C037E46FD2F22CC2542A5
25,155,621 UART: [art] SIG.R = 2C7A5A3E2EEAE3D437B52D5DE10ED3B4618155248E3286C400DE72F83C183DB4EFE36BA82A4F7D2E30DE1276F9F4F804
25,163,028 UART: [art] SIG.S = C1D575E11E85585816D765878A59E939586E6DD456859DA3515EAE3A4A7578EA0451D9E68267D936510620B0ADECE0CB
26,141,638 UART: Caliptra RT
26,142,332 UART: [state] CFI Enabled
26,305,973 UART: [rt] RT listening for mailbox commands...
26,307,825 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,439 UART: [rt]cmd =0x46504c54, len=4
26,338,997 >>> mbox cmd response data (8 bytes)
26,340,178 UART: [rt] FIPS self test
26,341,122 UART: [kat] ++
26,341,578 UART: [kat] sha1
26,345,978 UART: [kat] SHA2-256
26,347,911 UART: [kat] SHA2-384
26,350,813 UART: [kat] SHA2-512-ACC
26,353,078 UART: [kat] ECC-384
27,082,684 UART: Fatal Error: 0x90040004
27,118,149 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,262,851 >>> mbox cmd response: failed
27,263,461 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,408,348 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,419,696 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,738,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,477 UART:
192,874 UART: Running Caliptra ROM ...
194,011 UART:
603,691 UART: [state] CFI Enabled
616,489 UART: [state] LifecycleState = Unprovisioned
618,872 UART: [state] DebugLocked = No
620,980 UART: [state] WD Timer not started. Device not locked for debugging
625,737 UART: [kat] SHA2-256
815,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,375 UART: [kat] ++
826,921 UART: [kat] sha1
837,325 UART: [kat] SHA2-256
840,299 UART: [kat] SHA2-384
846,170 UART: [kat] SHA2-512-ACC
848,760 UART: [kat] ECC-384
3,290,862 UART: [kat] HMAC-384Kdf
3,303,729 UART: [kat] LMS
3,835,531 UART: [kat] --
3,839,560 UART: [cold-reset] ++
3,840,434 UART: [fht] FHT @ 0x50003400
3,852,477 UART: [idev] ++
3,853,191 UART: [idev] CDI.KEYID = 6
3,854,077 UART: [idev] SUBJECT.KEYID = 7
3,855,332 UART: [idev] UDS.KEYID = 0
3,856,261 ready_for_fw is high
3,856,482 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,001,821 UART: [idev] Erasing UDS.KEYID = 0
6,330,856 UART: [idev] Sha1 KeyId Algorithm
6,352,734 UART: [idev] --
6,358,378 UART: [ldev] ++
6,359,066 UART: [ldev] CDI.KEYID = 6
6,359,982 UART: [ldev] SUBJECT.KEYID = 5
6,361,163 UART: [ldev] AUTHORITY.KEYID = 7
6,362,335 UART: [ldev] FE.KEYID = 1
6,373,309 UART: [ldev] Erasing FE.KEYID = 1
8,850,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,761 UART: [ldev] --
10,641,491 UART: [fwproc] Wait for Commands...
10,644,244 UART: [fwproc] Recv command 0x46574c44
10,646,504 UART: [fwproc] Recv'd Img size: 115304 bytes
14,109,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,855 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,848,015 >>> mbox cmd response: success
14,851,923 UART: [afmc] ++
14,852,632 UART: [afmc] CDI.KEYID = 6
14,853,818 UART: [afmc] SUBJECT.KEYID = 7
14,855,306 UART: [afmc] AUTHORITY.KEYID = 5
17,360,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,726 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,389 UART: [afmc] --
19,156,344 UART: [cold-reset] --
19,158,925 UART: [state] Locking Datavault
19,163,904 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,088 UART: [state] Locking ICCM
19,168,679 UART: [exit] Launching FMC @ 0x40000130
19,177,367 UART:
19,177,604 UART: Running Caliptra FMC ...
19,178,710 UART:
19,178,874 UART: [state] CFI Enabled
19,187,300 UART: [fht] FMC Alias Private Key: 7
20,944,512 UART: [art] Extend RT PCRs Done
20,945,734 UART: [art] Lock RT PCRs Done
20,947,365 UART: [art] Populate DV Done
20,952,938 UART: [fht] FMC Alias Private Key: 7
20,954,634 UART: [art] Derive CDI
20,955,448 UART: [art] Store in in slot 0x4
20,997,662 UART: [art] Derive Key Pair
20,998,708 UART: [art] Store priv key in slot 0x5
23,424,903 UART: [art] Derive Key Pair - Done
23,437,903 UART: [art] Signing Cert with AUTHO
23,439,211 UART: RITY.KEYID = 7
25,144,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,118 UART: [art] PUB.X = 000BAC0F19B26B7882F44EA6D0DF9948A79A29B5A84BBD421D263E585AE321D0A89B70989A159F87786E925617740AB9
25,153,393 UART: [art] PUB.Y = 5497ADDF209F2FA4FA9909F5FD16C91D5489627ADB2B340A39D3A778608667570D1680F56CD920DDCA46DAEE8E809157
25,160,642 UART: [art] SIG.R = DE98C67DFF13E94DFEBA68C3D041CE2870D69F6AEBF358E54BB97814C6B912AA6C075C4D72992294C16292EF2BCD13A4
25,168,037 UART: [art] SIG.S = 861F8A90409DEB29FEAD7EE6421278C1D24B989DFDEB299332135E2E011C4631D345D6450664A342AD60650B6BB05B11
26,146,823 UART: Caliptra RT
26,147,550 UART: [state] CFI Enabled
26,264,667 UART: [rt] RT listening for mailbox commands...
26,266,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,029 UART: [rt]cmd =0x46504c54, len=4
26,297,427 >>> mbox cmd response data (8 bytes)
26,298,405 UART: [rt] FIPS self test
26,299,293 UART: [kat] ++
26,299,740 UART: [kat] sha1
26,304,379 UART: [kat] SHA2-256
26,306,259 UART: [kat] SHA2-384
26,309,375 UART: [kat] SHA2-512-ACC
26,311,615 UART: [kat] ECC-384
27,033,831 UART: Fatal Error: 0x90040004
27,069,062 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,213,935 >>> mbox cmd response: failed
27,214,587 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,359,368 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,035 UART:
190,337 UART: Running Caliptra ROM ...
191,391 UART:
13,169,416 UART: [state] CFI Enabled
13,183,964 UART: [state] LifecycleState = Unprovisioned
13,186,302 UART: [state] DebugLocked = No
13,188,442 UART: [state] WD Timer not started. Device not locked for debugging
13,193,665 UART: [kat] SHA2-256
13,383,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,394,365 UART: [kat] ++
13,394,906 UART: [kat] sha1
13,406,885 UART: [kat] SHA2-256
13,409,896 UART: [kat] SHA2-384
13,415,503 UART: [kat] SHA2-512-ACC
13,418,064 UART: [kat] ECC-384
15,862,368 UART: [kat] HMAC-384Kdf
15,875,874 UART: [kat] LMS
16,407,721 UART: [kat] --
16,412,269 UART: [cold-reset] ++
16,414,691 UART: [fht] FHT @ 0x50003400
16,426,861 UART: [idev] ++
16,427,539 UART: [idev] CDI.KEYID = 6
16,428,556 UART: [idev] SUBJECT.KEYID = 7
16,429,677 UART: [idev] UDS.KEYID = 0
16,431,199 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
16,575,984 UART: [idev] Erasing UDS.KEYID = 0
18,906,793 UART: [idev] Sha1 KeyId Algorithm
18,928,718 UART: [idev] --
18,933,064 UART: [ldev] ++
18,933,755 UART: [ldev] CDI.KEYID = 6
18,934,662 UART: [ldev] SUBJECT.KEYID = 5
18,935,873 UART: [ldev] AUTHORITY.KEYID = 7
18,937,100 UART: [ldev] FE.KEYID = 1
18,949,526 UART: [ldev] Erasing FE.KEYID = 1
21,424,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,142,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,157,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,172,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,187,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,209,134 UART: [ldev] --
23,213,914 UART: [fwproc] Wait for Commands...
23,216,396 UART: [fwproc] Recv command 0x46574c44
23,218,714 UART: [fwproc] Recv'd Img size: 115304 bytes
26,679,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,764,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
26,880,291 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
27,429,030 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,754,500 ready_for_fw is high
3,755,023 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,991,834 >>> mbox cmd response: success
19,245,536 UART:
19,245,923 UART: Running Caliptra FMC ...
19,247,096 UART:
19,247,259 UART: [state] CFI Enabled
19,255,277 UART: [fht] FMC Alias Private Key: 7
21,012,552 UART: [art] Extend RT PCRs Done
21,013,790 UART: [art] Lock RT PCRs Done
21,015,264 UART: [art] Populate DV Done
21,020,354 UART: [fht] FMC Alias Private Key: 7
21,021,953 UART: [art] Derive CDI
21,022,773 UART: [art] Store in in slot 0x4
21,065,592 UART: [art] Derive Key Pair
21,066,598 UART: [art] Store priv key in slot 0x5
23,493,384 UART: [art] Derive Key Pair - Done
23,506,494 UART: [art] Signing Cert with AUTHO
23,507,803 UART: RITY.KEYID = 7
25,213,379 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,893 UART: [art] PUB.X = F1EE9BCB652AF489B5E54FBB526969CDA48559309AE82CF91D672DB016844F12F9BF95C61CA536C79210CAC6161C2B90
25,222,179 UART: [art] PUB.Y = 083E8DD0E845B611FA9A909ABB9BA0A8E812FD5F310470165BDAED946B559F58F3097978A7F78C27E71D4B885160E5A6
25,229,437 UART: [art] SIG.R = 8CD6E8DB38B71462E000F74A07640C8BD29C69B33B0D0035D8C5CF366DB1022ED0490AAA8F1040C9E9DC32EDC4C58A61
25,236,815 UART: [art] SIG.S = 6007416633339068432608DE17EF8380477F57EC37C8353B7928319B89526038E9EA1B3FB0A75EFDFBC397EA6CD16A93
26,215,659 UART: Caliptra RT
26,216,350 UART: [state] CFI Enabled
26,333,644 UART: [rt] RT listening for mailbox commands...
26,335,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,365,224 UART: [rt]cmd =0x46504c54, len=4
26,367,000 >>> mbox cmd response data (8 bytes)
26,368,485 UART: [rt] FIPS self test
26,369,428 UART: [kat] ++
26,369,879 UART: [kat] sha1
26,374,367 UART: [kat] SHA2-256
26,376,299 UART: [kat] SHA2-384
26,379,104 UART: [kat] SHA2-512-ACC
26,381,379 UART: [kat] ECC-384
27,103,756 UART: Fatal Error: 0x90040004
27,139,018 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,283,819 >>> mbox cmd response: failed
27,284,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,429,331 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
16,248,393 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,477,757 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,166 UART: [kat] SHA2-512-ACC
897,067 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,477,047 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 ready_for_fw is high
1,480,927 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,492 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,583 UART: [ldev] ++
1,514,751 UART: [ldev] CDI.KEYID = 6
1,515,114 UART: [ldev] SUBJECT.KEYID = 5
1,515,540 UART: [ldev] AUTHORITY.KEYID = 7
1,516,003 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,228 UART: [ldev] --
1,585,567 UART: [fwproc] Waiting for Commands...
1,586,208 UART: [fwproc] Received command 0x46574c44
1,586,999 UART: [fwproc] Received Image of size 115304 bytes
2,896,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,811 >>> mbox cmd response: success
3,092,011 UART: [afmc] ++
3,092,179 UART: [afmc] CDI.KEYID = 6
3,092,541 UART: [afmc] SUBJECT.KEYID = 7
3,092,966 UART: [afmc] AUTHORITY.KEYID = 5
3,128,323 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,176 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,866 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,827 UART: [afmc] --
3,171,809 UART: [cold-reset] --
3,172,657 UART: [state] Locking Datavault
3,173,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,586 UART: [state] Locking ICCM
3,175,158 UART: [exit] Launching FMC @ 0x40000130
3,180,487 UART:
3,180,503 UART: Running Caliptra FMC ...
3,180,911 UART:
3,180,965 UART: [state] CFI Enabled
3,191,496 UART: [fht] FMC Alias Private Key: 7
3,299,087 UART: [art] Extend RT PCRs Done
3,299,515 UART: [art] Lock RT PCRs Done
3,301,297 UART: [art] Populate DV Done
3,309,534 UART: [fht] FMC Alias Private Key: 7
3,310,532 UART: [art] Derive CDI
3,310,812 UART: [art] Store in in slot 0x4
3,396,535 UART: [art] Derive Key Pair
3,396,895 UART: [art] Store priv key in slot 0x5
3,410,199 UART: [art] Derive Key Pair - Done
3,425,119 UART: [art] Signing Cert with AUTHO
3,425,599 UART: RITY.KEYID = 7
3,440,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,502 UART: [art] PUB.X = A8A3935466B36172ED1E41D1A8CB9B93CC0EDD138E01930DDEAF34D6B5746DA43220BBC591524AD8F07278A6EC586620
3,448,271 UART: [art] PUB.Y = C3A1A0A9F9FCDC5B9BCE88A87E3E3D3407FB24C70C604963A7EC20C42FCE7F36C9E63000CF451E869A110243D19B77E8
3,455,204 UART: [art] SIG.R = 0F5C39BD7DEAF5F0DC29742507208474B5534CFED7BB5F32448AD408DE5C65BAB051AEDC631DC7136CBF2D2CF67D5CAE
3,461,989 UART: [art] SIG.S = 94164EF38CBDEA108E91C9C95A2E1FB534425886A18D67D6ED4D43ADBF8B24D1B04B7AA5E9CF9E86B0AB04501D5C4992
3,485,755 UART: Caliptra RT
3,486,008 UART: [state] CFI Enabled
3,595,125 UART: [rt] RT listening for mailbox commands...
3,595,788 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,657 UART: [rt]cmd =0x46504c54, len=4
3,626,924 >>> mbox cmd response data (8 bytes)
3,627,159 UART: [rt] FIPS self test
3,627,487 UART: [kat] ++
3,627,639 UART: [kat] sha1
3,631,739 UART: [kat] SHA2-256
3,633,761 UART: [kat] SHA2-384
3,636,602 UART: [kat] SHA2-512-ACC
3,638,529 UART: [kat] ECC-384
3,642,353 UART: Fatal Error: 0x90040004
3,643,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,643,908 >>> mbox cmd response: failed
3,643,908 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,643,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,949 UART: [kat] SHA2-256
892,887 UART: [kat] SHA2-384
895,626 UART: [kat] SHA2-512-ACC
897,527 UART: [kat] ECC-384
903,156 UART: [kat] HMAC-384Kdf
907,636 UART: [kat] LMS
1,475,832 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,185 UART: [fht] Storing FHT @ 0x50003400
1,480,042 UART: [idev] ++
1,480,210 UART: [idev] CDI.KEYID = 6
1,480,570 UART: [idev] SUBJECT.KEYID = 7
1,480,994 UART: [idev] UDS.KEYID = 0
1,481,339 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,882 UART: [idev] Erasing UDS.KEYID = 0
1,505,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,227 UART: [ldev] ++
1,515,395 UART: [ldev] CDI.KEYID = 6
1,515,758 UART: [ldev] SUBJECT.KEYID = 5
1,516,184 UART: [ldev] AUTHORITY.KEYID = 7
1,516,647 UART: [ldev] FE.KEYID = 1
1,521,911 UART: [ldev] Erasing FE.KEYID = 1
1,547,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,090 UART: [ldev] --
1,586,567 UART: [fwproc] Waiting for Commands...
1,587,190 UART: [fwproc] Received command 0x46574c44
1,587,981 UART: [fwproc] Received Image of size 115304 bytes
2,897,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,796 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,477 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,717 ready_for_fw is high
1,361,717 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,245 >>> mbox cmd response: success
3,000,557 UART:
3,000,573 UART: Running Caliptra FMC ...
3,000,981 UART:
3,001,035 UART: [state] CFI Enabled
3,011,466 UART: [fht] FMC Alias Private Key: 7
3,119,817 UART: [art] Extend RT PCRs Done
3,120,245 UART: [art] Lock RT PCRs Done
3,121,931 UART: [art] Populate DV Done
3,129,990 UART: [fht] FMC Alias Private Key: 7
3,130,998 UART: [art] Derive CDI
3,131,278 UART: [art] Store in in slot 0x4
3,217,413 UART: [art] Derive Key Pair
3,217,773 UART: [art] Store priv key in slot 0x5
3,230,815 UART: [art] Derive Key Pair - Done
3,245,344 UART: [art] Signing Cert with AUTHO
3,245,824 UART: RITY.KEYID = 7
3,260,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,497 UART: [art] PUB.X = 5E44D2DA717542C6B5B763EE33B8F53B2C83D74DDDD9F146D71C9EF9C1529AE78443C025D97198F4A1D61848AB6B14D9
3,268,275 UART: [art] PUB.Y = ECCC83FDAC3FBA33120A25BE97968373C0E4D817F52F88A6D21BE073088CA17FBE651D6F0C5190F8510A38BC6BEFD38C
3,275,231 UART: [art] SIG.R = 62A1D8BE9C477B06E83E3F909DD9C1556AEBA7764B7835ED9FA33D72DE29E9A8B14ED1558EED0121881324BB75DB552C
3,282,007 UART: [art] SIG.S = 1C833AA2ECBA7473D598CA252F119B0814BC52FC84CA367BAC4C63504D56799F8A05310F304B45BB0E0C25060533F86D
3,305,701 UART: Caliptra RT
3,305,954 UART: [state] CFI Enabled
3,414,700 UART: [rt] RT listening for mailbox commands...
3,415,363 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,156 UART: [rt]cmd =0x46504c54, len=4
3,446,469 >>> mbox cmd response data (8 bytes)
3,446,766 UART: [rt] FIPS self test
3,447,094 UART: [kat] ++
3,447,246 UART: [kat] sha1
3,451,486 UART: [kat] SHA2-256
3,453,508 UART: [kat] SHA2-384
3,456,509 UART: [kat] SHA2-512-ACC
3,458,436 UART: [kat] ECC-384
3,462,270 UART: Fatal Error: 0x90040004
3,463,820 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,825 >>> mbox cmd response: failed
3,463,825 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,401 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,300 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,796 UART: [kat] SHA2-256
881,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,842 UART: [kat] ++
885,994 UART: [kat] sha1
890,168 UART: [kat] SHA2-256
892,106 UART: [kat] SHA2-384
894,661 UART: [kat] SHA2-512-ACC
896,562 UART: [kat] ECC-384
902,177 UART: [kat] HMAC-384Kdf
906,843 UART: [kat] LMS
1,475,039 UART: [kat] --
1,475,770 UART: [cold-reset] ++
1,476,248 UART: [fht] Storing FHT @ 0x50003400
1,478,981 UART: [idev] ++
1,479,149 UART: [idev] CDI.KEYID = 6
1,479,509 UART: [idev] SUBJECT.KEYID = 7
1,479,933 UART: [idev] UDS.KEYID = 0
1,480,278 ready_for_fw is high
1,480,278 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,821 UART: [idev] --
1,515,038 UART: [ldev] ++
1,515,206 UART: [ldev] CDI.KEYID = 6
1,515,569 UART: [ldev] SUBJECT.KEYID = 5
1,515,995 UART: [ldev] AUTHORITY.KEYID = 7
1,516,458 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,546,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46574c44
1,588,208 UART: [fwproc] Received Image of size 115304 bytes
2,899,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,672 >>> mbox cmd response: success
3,093,816 UART: [afmc] ++
3,093,984 UART: [afmc] CDI.KEYID = 6
3,094,346 UART: [afmc] SUBJECT.KEYID = 7
3,094,771 UART: [afmc] AUTHORITY.KEYID = 5
3,129,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,435 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,125 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,152 UART: [afmc] --
3,173,108 UART: [cold-reset] --
3,174,104 UART: [state] Locking Datavault
3,175,035 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,639 UART: [state] Locking ICCM
3,176,065 UART: [exit] Launching FMC @ 0x40000130
3,181,394 UART:
3,181,410 UART: Running Caliptra FMC ...
3,181,818 UART:
3,181,961 UART: [state] CFI Enabled
3,192,800 UART: [fht] FMC Alias Private Key: 7
3,300,327 UART: [art] Extend RT PCRs Done
3,300,755 UART: [art] Lock RT PCRs Done
3,302,797 UART: [art] Populate DV Done
3,310,888 UART: [fht] FMC Alias Private Key: 7
3,311,902 UART: [art] Derive CDI
3,312,182 UART: [art] Store in in slot 0x4
3,398,241 UART: [art] Derive Key Pair
3,398,601 UART: [art] Store priv key in slot 0x5
3,411,699 UART: [art] Derive Key Pair - Done
3,426,630 UART: [art] Signing Cert with AUTHO
3,427,110 UART: RITY.KEYID = 7
3,442,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,143 UART: [art] PUB.X = 90560FE3B5DE88446AFF48CDA7EA05EB0D50D0B40775C693E90908CD9CE569EF2913895E65A72FD1E857AC4075725F2C
3,449,903 UART: [art] PUB.Y = 9333E4972C84A20F9F3BC9DC13098ECF94437021FD6A19C765E07BE92D3E6AF77996039EB815D42109DB6EB7F84F0278
3,456,840 UART: [art] SIG.R = 43821E031E4A9F01C99387E6C7A96663E3212062382AF86C60CC5AE0052F5C5BCADF45349619AE46E51E09D8C725F04E
3,463,598 UART: [art] SIG.S = 8DB28DA3CA6D528E21608BC2A016EA2D2728B6D974EAF2C1118BA1B8D2546FA655DDEBC9FF66DA772D73C2A43DD8BE02
3,487,392 UART: Caliptra RT
3,487,737 UART: [state] CFI Enabled
3,595,974 UART: [rt] RT listening for mailbox commands...
3,596,637 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,384 UART: [rt]cmd =0x46504c54, len=4
3,627,451 >>> mbox cmd response data (8 bytes)
3,627,694 UART: [rt] FIPS self test
3,628,022 UART: [kat] ++
3,628,174 UART: [kat] sha1
3,632,396 UART: [kat] SHA2-256
3,634,418 UART: [kat] SHA2-384
3,637,245 UART: [kat] SHA2-512-ACC
3,639,172 UART: [kat] ECC-384
3,642,816 UART: Fatal Error: 0x90040004
3,644,366 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,371 >>> mbox cmd response: failed
3,644,371 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
891,142 UART: [kat] SHA2-256
893,080 UART: [kat] SHA2-384
895,831 UART: [kat] SHA2-512-ACC
897,732 UART: [kat] ECC-384
903,363 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,646 UART: [fht] Storing FHT @ 0x50003400
1,480,327 UART: [idev] ++
1,480,495 UART: [idev] CDI.KEYID = 6
1,480,855 UART: [idev] SUBJECT.KEYID = 7
1,481,279 UART: [idev] UDS.KEYID = 0
1,481,624 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,506,275 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,873 UART: [idev] --
1,515,892 UART: [ldev] ++
1,516,060 UART: [ldev] CDI.KEYID = 6
1,516,423 UART: [ldev] SUBJECT.KEYID = 5
1,516,849 UART: [ldev] AUTHORITY.KEYID = 7
1,517,312 UART: [ldev] FE.KEYID = 1
1,522,334 UART: [ldev] Erasing FE.KEYID = 1
1,547,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,699 UART: [ldev] --
1,587,050 UART: [fwproc] Waiting for Commands...
1,587,703 UART: [fwproc] Received command 0x46574c44
1,588,494 UART: [fwproc] Received Image of size 115304 bytes
2,897,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,076 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 ready_for_fw is high
1,362,784 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,356 >>> mbox cmd response: success
3,004,786 UART:
3,004,802 UART: Running Caliptra FMC ...
3,005,210 UART:
3,005,353 UART: [state] CFI Enabled
3,016,138 UART: [fht] FMC Alias Private Key: 7
3,123,953 UART: [art] Extend RT PCRs Done
3,124,381 UART: [art] Lock RT PCRs Done
3,125,923 UART: [art] Populate DV Done
3,134,258 UART: [fht] FMC Alias Private Key: 7
3,135,284 UART: [art] Derive CDI
3,135,564 UART: [art] Store in in slot 0x4
3,221,185 UART: [art] Derive Key Pair
3,221,545 UART: [art] Store priv key in slot 0x5
3,234,935 UART: [art] Derive Key Pair - Done
3,249,821 UART: [art] Signing Cert with AUTHO
3,250,301 UART: RITY.KEYID = 7
3,265,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,078 UART: [art] PUB.X = 4308A5F0DE0CDBE3264629022D64B92D2C8C249360D4AC2840FF91919BEA75A8AE45415768D215FA5572D04202E25776
3,272,832 UART: [art] PUB.Y = D8B0A6DB56B6444C7A6A357EFFEF8DA72ABC37BBB12ABA62771DDD460EA03177EF8BDE1AFEDF46D7B1BCCED9E8415D7D
3,279,817 UART: [art] SIG.R = 1C3A1DCEDDC67737D298783855124C1625B129BBEAE6E8179D89139009A0520B6F2F5EEDCA157CACBF9B5E820160A985
3,286,586 UART: [art] SIG.S = 08EF64F444085A28D68E8E73D2C4FBA9D4BDABCAEDFC0F36D27D45D45B891C6E83C106FC075FB5F32DA195E98B2F5734
3,310,670 UART: Caliptra RT
3,311,015 UART: [state] CFI Enabled
3,418,487 UART: [rt] RT listening for mailbox commands...
3,419,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,975 UART: [rt]cmd =0x46504c54, len=4
3,450,186 >>> mbox cmd response data (8 bytes)
3,450,525 UART: [rt] FIPS self test
3,450,853 UART: [kat] ++
3,451,005 UART: [kat] sha1
3,455,449 UART: [kat] SHA2-256
3,457,471 UART: [kat] SHA2-384
3,460,268 UART: [kat] SHA2-512-ACC
3,462,195 UART: [kat] ECC-384
3,466,127 UART: Fatal Error: 0x90040004
3,467,677 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,467,682 >>> mbox cmd response: failed
3,467,682 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,467,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,576 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,678 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
901,989 UART: [kat] SHA2-256
903,929 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,706 UART: [kat] HMAC-384Kdf
923,366 UART: [kat] LMS
1,171,694 UART: [kat] --
1,172,681 UART: [cold-reset] ++
1,173,121 UART: [fht] FHT @ 0x50003400
1,175,684 UART: [idev] ++
1,175,852 UART: [idev] CDI.KEYID = 6
1,176,212 UART: [idev] SUBJECT.KEYID = 7
1,176,636 UART: [idev] UDS.KEYID = 0
1,176,981 ready_for_fw is high
1,176,981 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,662 UART: [idev] Erasing UDS.KEYID = 0
1,201,855 UART: [idev] Sha1 KeyId Algorithm
1,210,287 UART: [idev] --
1,211,297 UART: [ldev] ++
1,211,465 UART: [ldev] CDI.KEYID = 6
1,211,828 UART: [ldev] SUBJECT.KEYID = 5
1,212,254 UART: [ldev] AUTHORITY.KEYID = 7
1,212,717 UART: [ldev] FE.KEYID = 1
1,217,777 UART: [ldev] Erasing FE.KEYID = 1
1,243,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,226 UART: [fwproc] Wait for Commands...
1,283,978 UART: [fwproc] Recv command 0x46574c44
1,284,706 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,619 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,844 >>> mbox cmd response: success
2,789,900 UART: [afmc] ++
2,790,068 UART: [afmc] CDI.KEYID = 6
2,790,430 UART: [afmc] SUBJECT.KEYID = 7
2,790,855 UART: [afmc] AUTHORITY.KEYID = 5
2,826,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,835 UART: [afmc] --
2,869,945 UART: [cold-reset] --
2,870,837 UART: [state] Locking Datavault
2,872,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,646 UART: [state] Locking ICCM
2,873,304 UART: [exit] Launching FMC @ 0x40000130
2,878,633 UART:
2,878,649 UART: Running Caliptra FMC ...
2,879,057 UART:
2,879,111 UART: [state] CFI Enabled
2,889,544 UART: [fht] FMC Alias Private Key: 7
2,997,829 UART: [art] Extend RT PCRs Done
2,998,257 UART: [art] Lock RT PCRs Done
2,999,509 UART: [art] Populate DV Done
3,007,856 UART: [fht] FMC Alias Private Key: 7
3,008,824 UART: [art] Derive CDI
3,009,104 UART: [art] Store in in slot 0x4
3,094,907 UART: [art] Derive Key Pair
3,095,267 UART: [art] Store priv key in slot 0x5
3,108,193 UART: [art] Derive Key Pair - Done
3,123,018 UART: [art] Signing Cert with AUTHO
3,123,498 UART: RITY.KEYID = 7
3,138,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,719 UART: [art] PUB.X = 71A48A49824E4381D47C292512A745880D432AA5C3449BF88407ADA10E2429CD8332E05412CB642781F146B134552E69
3,146,466 UART: [art] PUB.Y = 4F41126B55B6EFCD2D9F5FA427F1331727277EA4E41574AD0A4BD34BEEB876E424741972A63B8EFBCD433FAFCF9AB0B5
3,153,431 UART: [art] SIG.R = 81A6DC49F8AD18DF9E19BF66376858C990EA452358DD5B98A1F5A660FFD7BB9CA0C10ABC7E012C811830431F6403F974
3,160,200 UART: [art] SIG.S = 2052647DD33E1890EC4F9394132A69CDFADEA3780EB75D50A28ED05111726E4354998DBA0A75803CF285F96E705EDB6A
3,184,229 UART: Caliptra RT
3,184,482 UART: [state] CFI Enabled
3,291,779 UART: [rt] RT listening for mailbox commands...
3,292,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,077 UART: [rt]cmd =0x46504c54, len=4
3,323,076 >>> mbox cmd response data (8 bytes)
3,323,359 UART: [rt] FIPS self test
3,323,687 UART: [kat] ++
3,323,839 UART: [kat] sha1
3,328,033 UART: [kat] SHA2-256
3,330,055 UART: [kat] SHA2-384
3,332,968 UART: [kat] SHA2-512-ACC
3,334,895 UART: [kat] ECC-384
3,338,783 UART: Fatal Error: 0x90040004
3,340,333 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,340,338 >>> mbox cmd response: failed
3,340,338 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,340,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,412 UART: [kat] SHA2-512-ACC
908,313 UART: [kat] ECC-384
918,018 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,721 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,241 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,673 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,935 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,312 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,537 >>> mbox cmd response: success
2,701,191 UART:
2,701,207 UART: Running Caliptra FMC ...
2,701,615 UART:
2,701,669 UART: [state] CFI Enabled
2,712,258 UART: [fht] FMC Alias Private Key: 7
2,820,029 UART: [art] Extend RT PCRs Done
2,820,457 UART: [art] Lock RT PCRs Done
2,821,979 UART: [art] Populate DV Done
2,830,412 UART: [fht] FMC Alias Private Key: 7
2,831,342 UART: [art] Derive CDI
2,831,622 UART: [art] Store in in slot 0x4
2,917,195 UART: [art] Derive Key Pair
2,917,555 UART: [art] Store priv key in slot 0x5
2,930,471 UART: [art] Derive Key Pair - Done
2,945,263 UART: [art] Signing Cert with AUTHO
2,945,743 UART: RITY.KEYID = 7
2,961,191 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,956 UART: [art] PUB.X = 756986E9635F1E7A76F0F32349C05B04A44D9CAE78D4EEE9493894CD0ED5BD31A44A2429C12B061AC31F033E435B2207
2,968,713 UART: [art] PUB.Y = 9C7DB60DA7C37CE77711090396F6D8F9E8C33319456D8537387142D27E7B47183F2D88C1411C762737CD6CF5639CECF5
2,975,650 UART: [art] SIG.R = C71D1923D49720E8707ED9730B844276E05D63AA137E6FFB1E6555BF96468E844B1E9CCA246A6258B72561EB8BC47B01
2,982,414 UART: [art] SIG.S = 7B120B3D137E4F978C63197B0400D627372459E82692C94E07B8D8E21406AA5A4D809F63AE4543C6B209E1760CC45A89
3,005,731 UART: Caliptra RT
3,005,984 UART: [state] CFI Enabled
3,114,011 UART: [rt] RT listening for mailbox commands...
3,114,674 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,601 UART: [rt]cmd =0x46504c54, len=4
3,145,926 >>> mbox cmd response data (8 bytes)
3,146,161 UART: [rt] FIPS self test
3,146,489 UART: [kat] ++
3,146,641 UART: [kat] sha1
3,150,861 UART: [kat] SHA2-256
3,152,883 UART: [kat] SHA2-384
3,155,698 UART: [kat] SHA2-512-ACC
3,157,625 UART: [kat] ECC-384
3,161,303 UART: Fatal Error: 0x90040004
3,162,853 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,858 >>> mbox cmd response: failed
3,162,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,941 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,923 UART: [kat] SHA2-512-ACC
908,824 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,443 UART: [kat] LMS
1,171,771 UART: [kat] --
1,172,886 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,137 UART: [idev] ++
1,176,305 UART: [idev] CDI.KEYID = 6
1,176,665 UART: [idev] SUBJECT.KEYID = 7
1,177,089 UART: [idev] UDS.KEYID = 0
1,177,434 ready_for_fw is high
1,177,434 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,241 UART: [idev] Erasing UDS.KEYID = 0
1,202,268 UART: [idev] Sha1 KeyId Algorithm
1,210,894 UART: [idev] --
1,211,842 UART: [ldev] ++
1,212,010 UART: [ldev] CDI.KEYID = 6
1,212,373 UART: [ldev] SUBJECT.KEYID = 5
1,212,799 UART: [ldev] AUTHORITY.KEYID = 7
1,213,262 UART: [ldev] FE.KEYID = 1
1,218,478 UART: [ldev] Erasing FE.KEYID = 1
1,244,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,862 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,841 UART: [fwproc] Recv command 0x46574c44
1,285,569 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,414 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,733 >>> mbox cmd response: success
2,790,843 UART: [afmc] ++
2,791,011 UART: [afmc] CDI.KEYID = 6
2,791,373 UART: [afmc] SUBJECT.KEYID = 7
2,791,798 UART: [afmc] AUTHORITY.KEYID = 5
2,827,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,348 UART: [afmc] --
2,870,330 UART: [cold-reset] --
2,871,506 UART: [state] Locking Datavault
2,872,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,565 UART: [state] Locking ICCM
2,874,191 UART: [exit] Launching FMC @ 0x40000130
2,879,520 UART:
2,879,536 UART: Running Caliptra FMC ...
2,879,944 UART:
2,880,087 UART: [state] CFI Enabled
2,890,842 UART: [fht] FMC Alias Private Key: 7
2,998,689 UART: [art] Extend RT PCRs Done
2,999,117 UART: [art] Lock RT PCRs Done
3,000,667 UART: [art] Populate DV Done
3,008,896 UART: [fht] FMC Alias Private Key: 7
3,009,890 UART: [art] Derive CDI
3,010,170 UART: [art] Store in in slot 0x4
3,095,653 UART: [art] Derive Key Pair
3,096,013 UART: [art] Store priv key in slot 0x5
3,109,125 UART: [art] Derive Key Pair - Done
3,123,486 UART: [art] Signing Cert with AUTHO
3,123,966 UART: RITY.KEYID = 7
3,138,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,467 UART: [art] PUB.X = DA0296BFD11D6E1D6BDBE8A12261D7E6A76B5569C2A16DD3F3EC5AADD1925B889CA5CE6846C6E562564AC2EE14946C58
3,146,252 UART: [art] PUB.Y = C91D5E24BAC72EAF27ACB1797634C2635C4B20071868F1D3B001ACEF8B02580AFF2F6EB5AD454A3860DF42C2018968A8
3,153,197 UART: [art] SIG.R = 1D662D3719ED287906EAF1DC2631B18A973B42DDD43F76279321843ED5AAFF148DCEE89BD962378A0B662BD923DEFCEF
3,159,975 UART: [art] SIG.S = 1CB01A09E1C663A9FCBC940558FC969FBDCBC27F3B27C67B410B2C164A1C465F6D57FE2959ACBC0CEBC9598EA558A25C
3,184,170 UART: Caliptra RT
3,184,515 UART: [state] CFI Enabled
3,292,408 UART: [rt] RT listening for mailbox commands...
3,293,071 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,724 UART: [rt]cmd =0x46504c54, len=4
3,323,951 >>> mbox cmd response data (8 bytes)
3,324,282 UART: [rt] FIPS self test
3,324,610 UART: [kat] ++
3,324,762 UART: [kat] sha1
3,329,088 UART: [kat] SHA2-256
3,331,110 UART: [kat] SHA2-384
3,333,843 UART: [kat] SHA2-512-ACC
3,335,770 UART: [kat] ECC-384
3,339,654 UART: Fatal Error: 0x90040004
3,341,204 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,209 >>> mbox cmd response: failed
3,341,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,113 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,171,934 UART: [cold-reset] ++
1,172,386 UART: [fht] FHT @ 0x50003400
1,175,093 UART: [idev] ++
1,175,261 UART: [idev] CDI.KEYID = 6
1,175,621 UART: [idev] SUBJECT.KEYID = 7
1,176,045 UART: [idev] UDS.KEYID = 0
1,176,390 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,200,950 UART: [idev] Sha1 KeyId Algorithm
1,209,492 UART: [idev] --
1,210,388 UART: [ldev] ++
1,210,556 UART: [ldev] CDI.KEYID = 6
1,210,919 UART: [ldev] SUBJECT.KEYID = 5
1,211,345 UART: [ldev] AUTHORITY.KEYID = 7
1,211,808 UART: [ldev] FE.KEYID = 1
1,217,156 UART: [ldev] Erasing FE.KEYID = 1
1,243,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,055 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,908 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,197 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,954 ready_for_fw is high
1,060,954 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,470 >>> mbox cmd response: success
2,703,780 UART:
2,703,796 UART: Running Caliptra FMC ...
2,704,204 UART:
2,704,347 UART: [state] CFI Enabled
2,715,052 UART: [fht] FMC Alias Private Key: 7
2,822,979 UART: [art] Extend RT PCRs Done
2,823,407 UART: [art] Lock RT PCRs Done
2,824,799 UART: [art] Populate DV Done
2,832,694 UART: [fht] FMC Alias Private Key: 7
2,833,770 UART: [art] Derive CDI
2,834,050 UART: [art] Store in in slot 0x4
2,920,125 UART: [art] Derive Key Pair
2,920,485 UART: [art] Store priv key in slot 0x5
2,933,973 UART: [art] Derive Key Pair - Done
2,949,242 UART: [art] Signing Cert with AUTHO
2,949,722 UART: RITY.KEYID = 7
2,964,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,597 UART: [art] PUB.X = 08517F99ADF77D0E93DBE624A81C0A8BE4DDA1B62F6BE282D9D83E6A919A7B42696D42BBBE82DB45EB7E3F578FA750B6
2,972,378 UART: [art] PUB.Y = EC1C72E08F7A0603F94CDB419CC42711325C2D92F2D4D68C6FC5464F8E0DC306285B98663AA845CAEECFDD3F3AC56B4F
2,979,334 UART: [art] SIG.R = 6DACD33BDCFE8D037AFD2133AF6D634F70A0617F43DE9B78FF3A1D41E7A2F2A30DC9B4000823F8781BA918A14579D7D2
2,986,089 UART: [art] SIG.S = E3A68DFF07498CAF961D3C98EA2B8476A52579B6AF406617B74C9C6D6EB2DA48400D3F89D9A864A24412C400C48A3446
3,010,004 UART: Caliptra RT
3,010,349 UART: [state] CFI Enabled
3,119,172 UART: [rt] RT listening for mailbox commands...
3,119,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,758 UART: [rt]cmd =0x46504c54, len=4
3,150,749 >>> mbox cmd response data (8 bytes)
3,151,078 UART: [rt] FIPS self test
3,151,406 UART: [kat] ++
3,151,558 UART: [kat] sha1
3,155,674 UART: [kat] SHA2-256
3,157,696 UART: [kat] SHA2-384
3,160,355 UART: [kat] SHA2-512-ACC
3,162,282 UART: [kat] ECC-384
3,166,180 UART: Fatal Error: 0x90040004
3,167,730 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,735 >>> mbox cmd response: failed
3,167,735 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,702 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [kat] SHA2-256
891,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,783 UART: [kat] ++
895,935 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 ready_for_fw is high
1,174,711 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,507 UART: [idev] Erasing UDS.KEYID = 0
1,200,127 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,209,946 UART: [ldev] ++
1,210,114 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,905 UART: [ldev] AUTHORITY.KEYID = 7
1,211,368 UART: [ldev] FE.KEYID = 1
1,216,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,392 UART: [ldev] --
1,281,858 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,606 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,922 >>> mbox cmd response: success
2,787,189 UART: [afmc] ++
2,787,357 UART: [afmc] CDI.KEYID = 6
2,787,720 UART: [afmc] SUBJECT.KEYID = 7
2,788,146 UART: [afmc] AUTHORITY.KEYID = 5
2,823,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,043 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,358 UART: [afmc] --
2,866,362 UART: [cold-reset] --
2,867,020 UART: [state] Locking Datavault
2,868,253 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,857 UART: [state] Locking ICCM
2,869,307 UART: [exit] Launching FMC @ 0x40000130
2,874,636 UART:
2,874,652 UART: Running Caliptra FMC ...
2,875,060 UART:
2,875,114 UART: [state] CFI Enabled
2,885,571 UART: [fht] FMC Alias Private Key: 7
2,994,386 UART: [art] Extend RT PCRs Done
2,994,814 UART: [art] Lock RT PCRs Done
2,996,498 UART: [art] Populate DV Done
3,004,535 UART: [fht] FMC Alias Private Key: 7
3,005,519 UART: [art] Derive CDI
3,005,799 UART: [art] Store in in slot 0x4
3,091,334 UART: [art] Derive Key Pair
3,091,694 UART: [art] Store priv key in slot 0x5
3,105,020 UART: [art] Derive Key Pair - Done
3,119,536 UART: [art] Signing Cert with AUTHO
3,120,016 UART: RITY.KEYID = 7
3,135,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,211 UART: [art] PUB.X = E548BF1CBD5975C0DA96D805E979F2C61336DCDDE9D8774AD2C2F91B756D32BCF846E28F502C0D4A121CF8E81A756334
3,142,987 UART: [art] PUB.Y = 14DBE81F6D088B35199CF539D1A08BB4236631280518F704034A3211367CC11A0A86D4CF2ADC2D167F46FA02AFFE21D9
3,149,923 UART: [art] SIG.R = 86F4261F2C19F3717B0A2853C5174844F892614BE495E54F706C2CC119BF1B98BD91854BC165FDC26814F50BE3848C6C
3,156,685 UART: [art] SIG.S = D97CB0C132312D96F0ABF3D74510A4A95CF30901DFAFFE51213AB47C65EADB60DE7CA2CA6C732D9AFD7CF537423629EA
3,181,004 UART: Caliptra RT
3,181,257 UART: [state] CFI Enabled
3,288,155 UART: [rt] RT listening for mailbox commands...
3,288,818 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,543 UART: [rt]cmd =0x46504c54, len=4
3,319,852 >>> mbox cmd response data (8 bytes)
3,320,199 UART: [rt] FIPS self test
3,320,527 UART: [kat] ++
3,320,679 UART: [kat] sha1
3,324,899 UART: [kat] SHA2-256
3,326,921 UART: [kat] SHA2-384
3,329,708 UART: [kat] SHA2-512-ACC
3,331,635 UART: [kat] ECC-384
3,335,795 UART: Fatal Error: 0x90040004
3,337,345 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,350 >>> mbox cmd response: failed
3,337,350 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,916 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,718 ready_for_fw is high
1,056,718 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,546 >>> mbox cmd response: success
2,697,876 UART:
2,697,892 UART: Running Caliptra FMC ...
2,698,300 UART:
2,698,354 UART: [state] CFI Enabled
2,708,959 UART: [fht] FMC Alias Private Key: 7
2,817,000 UART: [art] Extend RT PCRs Done
2,817,428 UART: [art] Lock RT PCRs Done
2,819,016 UART: [art] Populate DV Done
2,827,359 UART: [fht] FMC Alias Private Key: 7
2,828,451 UART: [art] Derive CDI
2,828,731 UART: [art] Store in in slot 0x4
2,914,384 UART: [art] Derive Key Pair
2,914,744 UART: [art] Store priv key in slot 0x5
2,928,022 UART: [art] Derive Key Pair - Done
2,942,604 UART: [art] Signing Cert with AUTHO
2,943,084 UART: RITY.KEYID = 7
2,958,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,425 UART: [art] PUB.X = 9DD1DE9B1B5D95AA562FC78727340D9868AC15BA538750C3D02DDB4B7FB1C0C8C0BE8B84EC7DE89B42DFC0B8F56DEF9E
2,966,218 UART: [art] PUB.Y = 4311EC8115A4F3BA10584CB6C5FFF29295361D505CB6712D1222FED0E2F03DC71229B545663F359FFD1B97C288DDCCCA
2,973,178 UART: [art] SIG.R = AE8AE5F22ED5EB2BC28AEF9064DD207DEEAE734EC516BA23970717216B516A6C51CD82EA15D12AAF7B608E5B15570921
2,979,958 UART: [art] SIG.S = 9389E2F09B96663661AFC7B28BDAA5BA74FB95E7F9A51B36EB11A4E15CC947D86713F63844E7D3FC57B75ED9DC3C2942
3,003,625 UART: Caliptra RT
3,003,878 UART: [state] CFI Enabled
3,111,786 UART: [rt] RT listening for mailbox commands...
3,112,449 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,168 UART: [rt]cmd =0x46504c54, len=4
3,143,315 >>> mbox cmd response data (8 bytes)
3,143,530 UART: [rt] FIPS self test
3,143,858 UART: [kat] ++
3,144,010 UART: [kat] sha1
3,148,194 UART: [kat] SHA2-256
3,150,216 UART: [kat] SHA2-384
3,153,313 UART: [kat] SHA2-512-ACC
3,155,240 UART: [kat] ECC-384
3,159,104 UART: Fatal Error: 0x90040004
3,160,654 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,659 >>> mbox cmd response: failed
3,160,659 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,324 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,230 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,529 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,174,658 ready_for_fw is high
1,174,658 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,655 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,481 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,649 >>> mbox cmd response: success
2,786,904 UART: [afmc] ++
2,787,072 UART: [afmc] CDI.KEYID = 6
2,787,435 UART: [afmc] SUBJECT.KEYID = 7
2,787,861 UART: [afmc] AUTHORITY.KEYID = 5
2,823,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,207 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,926 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,951 UART: [afmc] --
2,867,079 UART: [cold-reset] --
2,868,121 UART: [state] Locking Datavault
2,869,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,058 UART: [state] Locking ICCM
2,870,684 UART: [exit] Launching FMC @ 0x40000130
2,876,013 UART:
2,876,029 UART: Running Caliptra FMC ...
2,876,437 UART:
2,876,580 UART: [state] CFI Enabled
2,887,147 UART: [fht] FMC Alias Private Key: 7
2,994,898 UART: [art] Extend RT PCRs Done
2,995,326 UART: [art] Lock RT PCRs Done
2,997,246 UART: [art] Populate DV Done
3,005,205 UART: [fht] FMC Alias Private Key: 7
3,006,361 UART: [art] Derive CDI
3,006,641 UART: [art] Store in in slot 0x4
3,092,004 UART: [art] Derive Key Pair
3,092,364 UART: [art] Store priv key in slot 0x5
3,105,740 UART: [art] Derive Key Pair - Done
3,120,599 UART: [art] Signing Cert with AUTHO
3,121,079 UART: RITY.KEYID = 7
3,136,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,398 UART: [art] PUB.X = 7248F82E587FF616417EF66F4493A0EF754406408E1F51C7732F8C796690B10D4C165DADCC10985B3D6AA6F6F87B5027
3,144,160 UART: [art] PUB.Y = 95AFED69BDA785F40AE9C16C79E89831F66BE596AC1074CB155704D9EB33CB72714CB67DBD3D7831DCE31F2785A437AE
3,151,118 UART: [art] SIG.R = D11FDD34B49A23DE91F634319D1BDF969DEE25FE25BA815E560CFBE92EA19EE128520D3661092745C5AAC42B8D357E1D
3,157,893 UART: [art] SIG.S = C49C5FF4A6A070FBA0A79771960150BD39A0BCE8E7EA2838ED6C1BD45E5DB8BD77D602D09349A850A02866A5AB2AE3B6
3,181,788 UART: Caliptra RT
3,182,133 UART: [state] CFI Enabled
3,289,721 UART: [rt] RT listening for mailbox commands...
3,290,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,079 UART: [rt]cmd =0x46504c54, len=4
3,321,364 >>> mbox cmd response data (8 bytes)
3,321,669 UART: [rt] FIPS self test
3,321,997 UART: [kat] ++
3,322,149 UART: [kat] sha1
3,326,371 UART: [kat] SHA2-256
3,328,393 UART: [kat] SHA2-384
3,331,240 UART: [kat] SHA2-512-ACC
3,333,167 UART: [kat] ECC-384
3,337,195 UART: Fatal Error: 0x90040004
3,338,745 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,750 >>> mbox cmd response: failed
3,338,750 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,186 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
917,431 UART: [kat] HMAC-384Kdf
922,063 UART: [kat] LMS
1,170,375 UART: [kat] --
1,171,232 UART: [cold-reset] ++
1,171,574 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,817 UART: [idev] SUBJECT.KEYID = 7
1,175,242 UART: [idev] UDS.KEYID = 0
1,175,588 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,236 UART: [idev] Erasing UDS.KEYID = 0
1,200,188 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,733 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,217,183 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,855 UART: [ldev] --
1,283,163 UART: [fwproc] Wait for Commands...
1,283,928 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,823 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,983 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 ready_for_fw is high
1,056,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,433 >>> mbox cmd response: success
2,695,663 UART:
2,695,679 UART: Running Caliptra FMC ...
2,696,087 UART:
2,696,230 UART: [state] CFI Enabled
2,707,191 UART: [fht] FMC Alias Private Key: 7
2,815,318 UART: [art] Extend RT PCRs Done
2,815,746 UART: [art] Lock RT PCRs Done
2,817,598 UART: [art] Populate DV Done
2,825,847 UART: [fht] FMC Alias Private Key: 7
2,826,925 UART: [art] Derive CDI
2,827,205 UART: [art] Store in in slot 0x4
2,913,112 UART: [art] Derive Key Pair
2,913,472 UART: [art] Store priv key in slot 0x5
2,927,110 UART: [art] Derive Key Pair - Done
2,941,869 UART: [art] Signing Cert with AUTHO
2,942,349 UART: RITY.KEYID = 7
2,957,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,572 UART: [art] PUB.X = 9B2C89E4D2F9DCE422A24FE99AF2177FCC024D3C6FBBF17CBCB2A82D4B35736BB6CF716445E851D5C2C1EB6FC7BB544D
2,965,365 UART: [art] PUB.Y = 430351F460695E624DD7B96115D1674E2B2996FCDBC61F6993F59F87CABEE1EC891419B0C75C1A6A3F7E56C17978DD0F
2,972,315 UART: [art] SIG.R = 2CCA4510F8AA0FE0E0B2CE8AFA74650D673E27F6ACFBE8346CCE4FBD09F196EA0D74E1D003F77BE5D2E1BC0DAAE72F58
2,979,099 UART: [art] SIG.S = CA5E4C0DD18C40F1D5EBDFB4FE289D64DCB6A68FD0B3FA0ED8B1068CE7669B0936A65955E2C0EED67E3F1578697B910E
3,002,791 UART: Caliptra RT
3,003,136 UART: [state] CFI Enabled
3,112,099 UART: [rt] RT listening for mailbox commands...
3,112,762 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,595 UART: [rt]cmd =0x46504c54, len=4
3,143,778 >>> mbox cmd response data (8 bytes)
3,144,025 UART: [rt] FIPS self test
3,144,353 UART: [kat] ++
3,144,505 UART: [kat] sha1
3,148,865 UART: [kat] SHA2-256
3,150,887 UART: [kat] SHA2-384
3,153,678 UART: [kat] SHA2-512-ACC
3,155,605 UART: [kat] ECC-384
3,159,543 UART: Fatal Error: 0x90040004
3,161,093 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,098 >>> mbox cmd response: failed
3,161,098 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,823 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,831 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,985,078 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,129,282 >>> mbox cmd response: failed
6,129,852 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,273,181 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,870,606 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,456,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
5,981,789 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,125,899 >>> mbox cmd response: failed
6,126,680 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,270,071 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,876,741 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,458,134 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
6,291,878 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,436,289 >>> mbox cmd response: failed
6,436,851 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,580,220 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
18,471,517 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,917,619 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
6,294,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,438,264 >>> mbox cmd response: failed
6,438,817 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,581,990 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
18,467,420 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,896,936 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
5,174,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,319,456 >>> mbox cmd response: failed
5,320,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,463,782 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,458,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,307,542 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
5,187,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,333,139 >>> mbox cmd response: failed
5,333,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,477,468 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,468,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,335 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
5,508,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,653,318 >>> mbox cmd response: failed
5,653,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,797,516 >>> mbox cmd response: failed
Initializing fuses
1,009 writing to cptra_bootfsm_go
17,850,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,582,149 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
5,516,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,661,122 >>> mbox cmd response: failed
5,661,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,805,434 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,832,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,553,903 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
5,171,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,315,956 >>> mbox cmd response: failed
5,316,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,460,742 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,459,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,322,753 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,148,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,293,113 >>> mbox cmd response: failed
5,293,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,437,423 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,452,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,299,918 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
5,499,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,644,426 >>> mbox cmd response: failed
5,644,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,788,553 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
17,866,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,596,499 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
5,503,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,647,694 >>> mbox cmd response: failed
5,648,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,791,976 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,861,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,593,293 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,329 >>> mbox cmd response: failed
822,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,558 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,099 >>> mbox cmd response: failed
823,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,206 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,848 >>> mbox cmd response: failed
822,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,869 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,124 >>> mbox cmd response: failed
823,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,079 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,781 >>> mbox cmd response: failed
822,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,132 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,165 >>> mbox cmd response: failed
823,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,633 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,378 >>> mbox cmd response: failed
823,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,435 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,184 >>> mbox cmd response: failed
823,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,875 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,831 >>> mbox cmd response: failed
821,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,042 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,463 >>> mbox cmd response: failed
822,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,758 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,652 >>> mbox cmd response: failed
822,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,223 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,402 >>> mbox cmd response: failed
823,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,183 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,234 UART:
192,601 UART: Running Caliptra ROM ...
193,800 UART:
193,951 UART: [state] CFI Enabled
263,664 UART: [state] LifecycleState = Unprovisioned
265,661 UART: [state] DebugLocked = No
268,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,213 UART: [kat] SHA2-256
442,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,353 UART: [kat] ++
453,902 UART: [kat] sha1
465,319 UART: [kat] SHA2-256
467,988 UART: [kat] SHA2-384
473,768 UART: [kat] SHA2-512-ACC
476,137 UART: [kat] ECC-384
2,766,938 UART: [kat] HMAC-384Kdf
2,778,549 UART: [kat] LMS
3,968,800 UART: [kat] --
3,973,027 UART: [cold-reset] ++
3,975,470 UART: [fht] Storing FHT @ 0x50003400
3,986,905 UART: [idev] ++
3,987,474 UART: [idev] CDI.KEYID = 6
3,988,385 UART: [idev] SUBJECT.KEYID = 7
3,989,634 UART: [idev] UDS.KEYID = 0
3,990,641 ready_for_fw is high
3,990,864 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,135,533 UART: [idev] Erasing UDS.KEYID = 0
7,328,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,254 UART: [idev] --
7,352,767 UART: [ldev] ++
7,353,337 UART: [ldev] CDI.KEYID = 6
7,354,355 UART: [ldev] SUBJECT.KEYID = 5
7,355,513 UART: [ldev] AUTHORITY.KEYID = 7
7,356,744 UART: [ldev] FE.KEYID = 1
7,400,833 UART: [ldev] Erasing FE.KEYID = 1
10,737,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,446 UART: [ldev] --
13,120,549 UART: [fwproc] Waiting for Commands...
13,123,670 UART: [fwproc] Received command 0x46574c44
13,125,855 UART: [fwproc] Received Image of size 114996 bytes
17,190,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,653,971 >>> mbox cmd response: success
17,657,971 UART: [afmc] ++
17,658,565 UART: [afmc] CDI.KEYID = 6
17,659,481 UART: [afmc] SUBJECT.KEYID = 7
17,660,695 UART: [afmc] AUTHORITY.KEYID = 5
21,028,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,228 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,483 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,881 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,742 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,166 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,411 UART: [afmc] --
23,397,586 UART: [cold-reset] --
23,401,756 UART: [state] Locking Datavault
23,408,358 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,064 UART: [state] Locking ICCM
23,411,408 UART: [exit] Launching FMC @ 0x40000130
23,419,805 UART:
23,420,049 UART: Running Caliptra FMC ...
23,421,105 UART:
23,421,258 UART: [state] CFI Enabled
23,487,367 UART: [fht] FMC Alias Private Key: 7
25,825,574 UART: [art] Extend RT PCRs Done
25,826,791 UART: [art] Lock RT PCRs Done
25,828,366 UART: [art] Populate DV Done
25,833,457 UART: [fht] FMC Alias Private Key: 7
25,835,211 UART: [art] Derive CDI
25,836,022 UART: [art] Store in in slot 0x4
25,895,449 UART: [art] Derive Key Pair
25,896,486 UART: [art] Store priv key in slot 0x5
29,189,263 UART: [art] Derive Key Pair - Done
29,201,825 UART: [art] Signing Cert with AUTHO
29,203,128 UART: RITY.KEYID = 7
31,491,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,800 UART: [art] PUB.X = E79D3C43ECBE27260829EE85AF6A911C0F96E5B8FC151457BC8F65F00390367DA82506C130A91721BEF783B3C675F21A
31,499,997 UART: [art] PUB.Y = 83CFD81EE4B03B829A3BD064996DB00F65AA8C97D42FA451FE59A21B708F96DB3AEA4298A7F8EBF9A498319A58E2EA5F
31,507,242 UART: [art] SIG.R = F5C812A25A51E844D7232D4081B07723DECF7121FCF0708EA4ACE664E151813E1CE6A71943437DBDC90CBA0450EF1265
31,514,657 UART: [art] SIG.S = 46C44EE3C4C04DD9EE6913FA5B227AA0E06F0BFE89373E42E00D80E237989594EAA73DE4E8D4423B37CCDB8788F1B63B
32,820,182 UART: Caliptra RT
32,820,881 UART: [state] CFI Enabled
32,981,597 UART: [rt] RT listening for mailbox commands...
32,983,445 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,013,177 UART: [rt]cmd =0x46504c54, len=4
33,014,788 >>> mbox cmd response data (8 bytes)
33,015,719 UART: [rt] FIPS self test
33,016,673 UART: [kat] ++
33,017,125 UART: [kat] sha1
33,021,684 UART: [kat] SHA2-256
33,023,611 UART: [kat] SHA2-384
33,026,791 UART: [kat] SHA2-512-ACC
33,029,081 UART: [kat] ECC-384
36,294,297 UART: Fatal Error: 0x90040003
36,329,587 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,474,048 >>> mbox cmd response: failed
36,474,715 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,619,069 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
189,992 UART:
190,285 UART: Running Caliptra ROM ...
191,311 UART:
191,449 UART: [state] CFI Enabled
263,978 UART: [state] LifecycleState = Unprovisioned
265,953 UART: [state] DebugLocked = No
267,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,209 UART: [kat] SHA2-256
442,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,379 UART: [kat] ++
453,823 UART: [kat] sha1
465,042 UART: [kat] SHA2-256
467,767 UART: [kat] SHA2-384
473,101 UART: [kat] SHA2-512-ACC
475,495 UART: [kat] ECC-384
2,770,848 UART: [kat] HMAC-384Kdf
2,803,442 UART: [kat] LMS
3,993,689 UART: [kat] --
3,999,790 UART: [cold-reset] ++
4,001,884 UART: [fht] Storing FHT @ 0x50003400
4,012,398 UART: [idev] ++
4,012,968 UART: [idev] CDI.KEYID = 6
4,013,879 UART: [idev] SUBJECT.KEYID = 7
4,015,149 UART: [idev] UDS.KEYID = 0
4,016,676 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,161,218 UART: [idev] Erasing UDS.KEYID = 0
7,349,523 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,656 UART: [idev] --
7,376,276 UART: [ldev] ++
7,376,844 UART: [ldev] CDI.KEYID = 6
7,377,808 UART: [ldev] SUBJECT.KEYID = 5
7,379,023 UART: [ldev] AUTHORITY.KEYID = 7
7,380,316 UART: [ldev] FE.KEYID = 1
7,426,343 UART: [ldev] Erasing FE.KEYID = 1
10,758,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,734 UART: [ldev] --
13,121,693 UART: [fwproc] Waiting for Commands...
13,123,955 UART: [fwproc] Received command 0x46574c44
13,126,140 UART: [fwproc] Received Image of size 114996 bytes
17,193,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,855 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,660,715 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,785,909 ready_for_fw is high
3,786,319 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,901,148 >>> mbox cmd response: success
23,591,365 UART:
23,591,765 UART: Running Caliptra FMC ...
23,592,916 UART:
23,593,077 UART: [state] CFI Enabled
23,663,418 UART: [fht] FMC Alias Private Key: 7
26,001,052 UART: [art] Extend RT PCRs Done
26,002,297 UART: [art] Lock RT PCRs Done
26,004,148 UART: [art] Populate DV Done
26,009,584 UART: [fht] FMC Alias Private Key: 7
26,011,072 UART: [art] Derive CDI
26,011,848 UART: [art] Store in in slot 0x4
26,072,194 UART: [art] Derive Key Pair
26,073,201 UART: [art] Store priv key in slot 0x5
29,366,207 UART: [art] Derive Key Pair - Done
29,379,036 UART: [art] Signing Cert with AUTHO
29,380,371 UART: RITY.KEYID = 7
31,667,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,669,309 UART: [art] PUB.X = 04A3880233299ED31D08DBD4A29EEB8BF9F861915EE219749743408326B5423BF788CC4CB7A9D54150CA6CC72D8DEAF5
31,676,572 UART: [art] PUB.Y = AAE9AAC11893B2ACA156AE306EDEF8693876DE3DCE4D49BC2BA434E384DF2A8ACFD6399071708685921C43F3EC3D12BE
31,683,834 UART: [art] SIG.R = 300F8B4D5D3EE76A87A5D268B4178282F3D52C857F91E6196D52BD88AA54B579D2520AD6A74B36C2D0A385CA13F302CD
31,691,220 UART: [art] SIG.S = B0A52ED0CC72FECA761CE95E7E48D17CFA38720F46FDB5DA796A6F9705F18911B34690BB71401D1991BAA55BE5E4FB5A
32,996,792 UART: Caliptra RT
32,997,506 UART: [state] CFI Enabled
33,177,656 UART: [rt] RT listening for mailbox commands...
33,179,505 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,209,031 UART: [rt]cmd =0x46504c54, len=4
33,210,479 >>> mbox cmd response data (8 bytes)
33,211,549 UART: [rt] FIPS self test
33,212,493 UART: [kat] ++
33,212,970 UART: [kat] sha1
33,217,458 UART: [kat] SHA2-256
33,219,395 UART: [kat] SHA2-384
33,222,356 UART: [kat] SHA2-512-ACC
33,224,614 UART: [kat] ECC-384
36,491,550 UART: Fatal Error: 0x90040003
36,526,843 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,671,275 >>> mbox cmd response: failed
36,671,904 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,816,236 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,766,788 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,872,968 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,522 UART:
192,888 UART: Running Caliptra ROM ...
194,022 UART:
603,773 UART: [state] CFI Enabled
616,990 UART: [state] LifecycleState = Unprovisioned
618,969 UART: [state] DebugLocked = No
621,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,385 UART: [kat] SHA2-256
797,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,687 UART: [kat] ++
808,132 UART: [kat] sha1
818,696 UART: [kat] SHA2-256
821,422 UART: [kat] SHA2-384
826,774 UART: [kat] SHA2-512-ACC
829,145 UART: [kat] ECC-384
3,113,238 UART: [kat] HMAC-384Kdf
3,125,043 UART: [kat] LMS
4,315,211 UART: [kat] --
4,319,801 UART: [cold-reset] ++
4,321,248 UART: [fht] Storing FHT @ 0x50003400
4,333,935 UART: [idev] ++
4,334,527 UART: [idev] CDI.KEYID = 6
4,335,565 UART: [idev] SUBJECT.KEYID = 7
4,336,740 UART: [idev] UDS.KEYID = 0
4,337,711 ready_for_fw is high
4,337,952 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,482,443 UART: [idev] Erasing UDS.KEYID = 0
7,625,275 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,634 UART: [idev] --
7,652,361 UART: [ldev] ++
7,652,941 UART: [ldev] CDI.KEYID = 6
7,653,907 UART: [ldev] SUBJECT.KEYID = 5
7,655,070 UART: [ldev] AUTHORITY.KEYID = 7
7,656,388 UART: [ldev] FE.KEYID = 1
7,664,475 UART: [ldev] Erasing FE.KEYID = 1
10,953,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,052 UART: [ldev] --
13,314,056 UART: [fwproc] Waiting for Commands...
13,317,394 UART: [fwproc] Received command 0x46574c44
13,319,633 UART: [fwproc] Received Image of size 114996 bytes
17,381,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,492 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,846,230 >>> mbox cmd response: success
17,849,877 UART: [afmc] ++
17,850,464 UART: [afmc] CDI.KEYID = 6
17,851,425 UART: [afmc] SUBJECT.KEYID = 7
17,852,639 UART: [afmc] AUTHORITY.KEYID = 5
21,167,330 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,017 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,465,286 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,671 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,494,517 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,947 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,978 UART: [afmc] --
23,532,298 UART: [cold-reset] --
23,535,778 UART: [state] Locking Datavault
23,540,325 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,029 UART: [state] Locking ICCM
23,544,321 UART: [exit] Launching FMC @ 0x40000130
23,552,711 UART:
23,552,951 UART: Running Caliptra FMC ...
23,554,053 UART:
23,554,213 UART: [state] CFI Enabled
23,562,153 UART: [fht] FMC Alias Private Key: 7
25,892,883 UART: [art] Extend RT PCRs Done
25,894,109 UART: [art] Lock RT PCRs Done
25,895,653 UART: [art] Populate DV Done
25,901,175 UART: [fht] FMC Alias Private Key: 7
25,902,716 UART: [art] Derive CDI
25,903,480 UART: [art] Store in in slot 0x4
25,945,857 UART: [art] Derive Key Pair
25,946,858 UART: [art] Store priv key in slot 0x5
29,188,240 UART: [art] Derive Key Pair - Done
29,201,090 UART: [art] Signing Cert with AUTHO
29,202,399 UART: RITY.KEYID = 7
31,481,437 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,957 UART: [art] PUB.X = DED20E54D6C3896EE2018641349F664329EB53649AC98C914B5251261A4E582DC049AEBEECF54B1EBF44253A8AF6A49F
31,490,256 UART: [art] PUB.Y = FBD8A4C16453302B2D820560E145A639385F047158B7828947694E7B9B8908F962B91143B770DF72566A619EA027418E
31,497,398 UART: [art] SIG.R = F858205776CC71524201D62E4C36B0FA4CB89DF6503DAC1A95CD0C9683C0C5418A43C80FA57B596762BD94103215E62C
31,504,748 UART: [art] SIG.S = 2CE7AFE82F238BDEAF92F93AB59EA77B2CF17E664034DF89837EDA8E01600D4F407CCEA1038F121A5173D47E55A43797
32,809,797 UART: Caliptra RT
32,810,502 UART: [state] CFI Enabled
32,928,337 UART: [rt] RT listening for mailbox commands...
32,930,194 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,959,871 UART: [rt]cmd =0x46504c54, len=4
32,961,393 >>> mbox cmd response data (8 bytes)
32,962,339 UART: [rt] FIPS self test
32,963,289 UART: [kat] ++
32,963,743 UART: [kat] sha1
32,968,144 UART: [kat] SHA2-256
32,970,070 UART: [kat] SHA2-384
32,972,872 UART: [kat] SHA2-512-ACC
32,975,111 UART: [kat] ECC-384
36,216,137 UART: Fatal Error: 0x90040003
36,251,439 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,395,925 >>> mbox cmd response: failed
36,396,533 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,540,887 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,109 UART:
190,408 UART: Running Caliptra ROM ...
191,466 UART:
3,988,781 UART: [state] CFI Enabled
4,003,322 UART: [state] LifecycleState = Unprovisioned
4,005,238 UART: [state] DebugLocked = No
4,007,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,012,346 UART: [kat] SHA2-256
4,182,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,192,628 UART: [kat] ++
4,193,117 UART: [kat] sha1
4,204,171 UART: [kat] SHA2-256
4,206,890 UART: [kat] SHA2-384
4,212,881 UART: [kat] SHA2-512-ACC
4,215,230 UART: [kat] ECC-384
6,500,168 UART: [kat] HMAC-384Kdf
6,511,263 UART: [kat] LMS
7,701,380 UART: [kat] --
7,706,797 UART: [cold-reset] ++
7,709,270 UART: [fht] Storing FHT @ 0x50003400
7,719,618 UART: [idev] ++
7,720,183 UART: [idev] CDI.KEYID = 6
7,721,125 UART: [idev] SUBJECT.KEYID = 7
7,722,339 UART: [idev] UDS.KEYID = 0
7,723,895 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,868,272 UART: [idev] Erasing UDS.KEYID = 0
11,012,021 UART: [idev] Using Sha1 for KeyId Algorithm
11,033,721 UART: [idev] --
11,038,740 UART: [ldev] ++
11,039,377 UART: [ldev] CDI.KEYID = 6
11,040,266 UART: [ldev] SUBJECT.KEYID = 5
11,041,535 UART: [ldev] AUTHORITY.KEYID = 7
11,042,770 UART: [ldev] FE.KEYID = 1
11,053,830 UART: [ldev] Erasing FE.KEYID = 1
14,340,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,636,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,651,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,666,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,680,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,698,790 UART: [ldev] --
16,704,333 UART: [fwproc] Waiting for Commands...
16,706,257 UART: [fwproc] Received command 0x46574c44
16,708,450 UART: [fwproc] Received Image of size 114996 bytes
20,772,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,855,113 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,924,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,245,258 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,970 writing to cptra_bootfsm_go
4,128,039 ready_for_fw is high
4,128,478 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,080,183 >>> mbox cmd response: success
23,720,684 UART:
23,721,086 UART: Running Caliptra FMC ...
23,722,214 UART:
23,722,369 UART: [state] CFI Enabled
23,730,107 UART: [fht] FMC Alias Private Key: 7
26,061,330 UART: [art] Extend RT PCRs Done
26,062,558 UART: [art] Lock RT PCRs Done
26,064,322 UART: [art] Populate DV Done
26,069,799 UART: [fht] FMC Alias Private Key: 7
26,071,422 UART: [art] Derive CDI
26,072,248 UART: [art] Store in in slot 0x4
26,114,743 UART: [art] Derive Key Pair
26,115,791 UART: [art] Store priv key in slot 0x5
29,357,694 UART: [art] Derive Key Pair - Done
29,370,915 UART: [art] Signing Cert with AUTHO
29,372,250 UART: RITY.KEYID = 7
31,651,151 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,664 UART: [art] PUB.X = 6FAC62A26EA15F82F9B7A46E778AD7C14638C4A8DB9748F526A9E62A1610BA8CA548C0F945B841927952C51A4D4B31F5
31,659,916 UART: [art] PUB.Y = 06B03293CD0348B173B1670BD7ACD16E614DC2DD07D8AEA712776384A83388A942C0A4ACBB0F34539A3F0378B860E1ED
31,667,171 UART: [art] SIG.R = 95EF57F2DEB80116F3C7DB566D4DAA855D9F17BDE2D108751498358F5C717FF66710BA105921E6A075E30374EBA92245
31,674,565 UART: [art] SIG.S = CEF9EDA78BCEB542A43C787E46A693EAF12542EC6376147E02CB10023FC2FF91ACE382DCF499B5C186B5A70C18331504
32,979,909 UART: Caliptra RT
32,980,614 UART: [state] CFI Enabled
33,098,433 UART: [rt] RT listening for mailbox commands...
33,100,304 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,129,637 UART: [rt]cmd =0x46504c54, len=4
33,131,140 >>> mbox cmd response data (8 bytes)
33,132,193 UART: [rt] FIPS self test
33,133,151 UART: [kat] ++
33,133,605 UART: [kat] sha1
33,137,896 UART: [kat] SHA2-256
33,139,878 UART: [kat] SHA2-384
33,142,848 UART: [kat] SHA2-512-ACC
33,145,085 UART: [kat] ECC-384
36,385,952 UART: Fatal Error: 0x90040003
36,421,443 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,565,906 >>> mbox cmd response: failed
36,566,572 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,710,822 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
7,335,531 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,298,761 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,307 UART:
192,697 UART: Running Caliptra ROM ...
193,820 UART:
193,962 UART: [state] CFI Enabled
262,500 UART: [state] LifecycleState = Unprovisioned
264,351 UART: [state] DebugLocked = No
266,515 UART: [state] WD Timer not started. Device not locked for debugging
271,116 UART: [kat] SHA2-256
450,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,825 UART: [kat] ++
462,359 UART: [kat] sha1
474,191 UART: [kat] SHA2-256
477,166 UART: [kat] SHA2-384
482,322 UART: [kat] SHA2-512-ACC
485,264 UART: [kat] ECC-384
2,951,155 UART: [kat] HMAC-384Kdf
2,972,276 UART: [kat] LMS
3,501,743 UART: [kat] --
3,506,423 UART: [cold-reset] ++
3,508,324 UART: [fht] FHT @ 0x50003400
3,520,308 UART: [idev] ++
3,520,885 UART: [idev] CDI.KEYID = 6
3,521,803 UART: [idev] SUBJECT.KEYID = 7
3,523,052 UART: [idev] UDS.KEYID = 0
3,523,984 ready_for_fw is high
3,524,184 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,213 UART: [idev] Erasing UDS.KEYID = 0
6,028,083 UART: [idev] Sha1 KeyId Algorithm
6,050,185 UART: [idev] --
6,054,022 UART: [ldev] ++
6,054,606 UART: [ldev] CDI.KEYID = 6
6,055,489 UART: [ldev] SUBJECT.KEYID = 5
6,056,709 UART: [ldev] AUTHORITY.KEYID = 7
6,057,967 UART: [ldev] FE.KEYID = 1
6,100,628 UART: [ldev] Erasing FE.KEYID = 1
8,602,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,250 UART: [ldev] --
10,414,403 UART: [fwproc] Wait for Commands...
10,416,931 UART: [fwproc] Recv command 0x46574c44
10,418,972 UART: [fwproc] Recv'd Img size: 115304 bytes
13,837,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,981,987 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,303,598 >>> mbox cmd response: success
14,307,330 UART: [afmc] ++
14,307,934 UART: [afmc] CDI.KEYID = 6
14,308,849 UART: [afmc] SUBJECT.KEYID = 7
14,309,953 UART: [afmc] AUTHORITY.KEYID = 5
16,847,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,592,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,609,005 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,624,879 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,647,440 UART: [afmc] --
18,650,544 UART: [cold-reset] --
18,654,514 UART: [state] Locking Datavault
18,659,976 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,675 UART: [state] Locking ICCM
18,662,848 UART: [exit] Launching FMC @ 0x40000130
18,671,246 UART:
18,671,500 UART: Running Caliptra FMC ...
18,672,606 UART:
18,672,769 UART: [state] CFI Enabled
18,732,754 UART: [fht] FMC Alias Private Key: 7
20,496,900 UART: [art] Extend RT PCRs Done
20,498,127 UART: [art] Lock RT PCRs Done
20,499,918 UART: [art] Populate DV Done
20,505,221 UART: [fht] FMC Alias Private Key: 7
20,506,879 UART: [art] Derive CDI
20,507,697 UART: [art] Store in in slot 0x4
20,565,442 UART: [art] Derive Key Pair
20,566,478 UART: [art] Store priv key in slot 0x5
23,029,702 UART: [art] Derive Key Pair - Done
23,042,592 UART: [art] Signing Cert with AUTHO
23,043,904 UART: RITY.KEYID = 7
24,755,710 UART: [art] Erasing AUTHORITY.KEYID = 7
24,757,226 UART: [art] PUB.X = CF27510BB52FCB3C83A2AE1B84C379A93FB2B6D3F15FBF0C24577EF4F77C46B208C1928F71BEFAEFCC0F587B1175D47E
24,764,495 UART: [art] PUB.Y = D8260F8ABBCBC8964A0FACA1F065C9FFC0D0C72E2B68D294E5C41F21DE4F5284511CBF43263D523B87E4FF46120EF216
24,771,735 UART: [art] SIG.R = C9E753D44A88AE5FCDEB6688467BD4C2724E678AE38E6DB577E0AC3576AA1AAD27F7CC1B5537FC8CC46776799C3E2DFF
24,779,186 UART: [art] SIG.S = E4DC9C82556C948666FEC3A6EDCF114C7F776C78A084D00D7FD255C218DB2FBB6044780E5F7B4ED00DA94657D0985051
25,758,417 UART: Caliptra RT
25,759,120 UART: [state] CFI Enabled
25,925,316 UART: [rt] RT listening for mailbox commands...
25,927,155 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,956,670 UART: [rt]cmd =0x46504c54, len=4
25,958,244 >>> mbox cmd response data (8 bytes)
25,959,218 UART: [rt] FIPS self test
25,960,164 UART: [kat] ++
25,960,611 UART: [kat] sha1
25,965,067 UART: [kat] SHA2-256
25,966,941 UART: [kat] SHA2-384
25,969,909 UART: [kat] SHA2-512-ACC
25,972,164 UART: [kat] ECC-384
28,408,006 UART: Fatal Error: 0x90040003
28,443,296 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,588,153 >>> mbox cmd response: failed
28,588,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,733,562 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,101 UART:
190,401 UART: Running Caliptra ROM ...
191,521 UART:
191,673 UART: [state] CFI Enabled
257,770 UART: [state] LifecycleState = Unprovisioned
259,638 UART: [state] DebugLocked = No
262,367 UART: [state] WD Timer not started. Device not locked for debugging
265,943 UART: [kat] SHA2-256
445,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,660 UART: [kat] ++
457,194 UART: [kat] sha1
469,214 UART: [kat] SHA2-256
472,212 UART: [kat] SHA2-384
479,059 UART: [kat] SHA2-512-ACC
481,998 UART: [kat] ECC-384
2,938,956 UART: [kat] HMAC-384Kdf
2,961,396 UART: [kat] LMS
3,490,858 UART: [kat] --
3,495,548 UART: [cold-reset] ++
3,497,811 UART: [fht] FHT @ 0x50003400
3,508,625 UART: [idev] ++
3,509,189 UART: [idev] CDI.KEYID = 6
3,510,128 UART: [idev] SUBJECT.KEYID = 7
3,511,341 UART: [idev] UDS.KEYID = 0
3,512,851 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,886 UART: [idev] Erasing UDS.KEYID = 0
6,015,370 UART: [idev] Sha1 KeyId Algorithm
6,038,330 UART: [idev] --
6,041,787 UART: [ldev] ++
6,042,362 UART: [ldev] CDI.KEYID = 6
6,043,283 UART: [ldev] SUBJECT.KEYID = 5
6,044,446 UART: [ldev] AUTHORITY.KEYID = 7
6,045,631 UART: [ldev] FE.KEYID = 1
6,090,466 UART: [ldev] Erasing FE.KEYID = 1
8,595,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,194 UART: [ldev] --
10,405,559 UART: [fwproc] Wait for Commands...
10,408,146 UART: [fwproc] Recv command 0x46574c44
10,410,191 UART: [fwproc] Recv'd Img size: 115304 bytes
13,823,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,092 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,280,615 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,382,495 ready_for_fw is high
3,382,975 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,099,788 >>> mbox cmd response: success
18,387,532 UART:
18,387,925 UART: Running Caliptra FMC ...
18,389,080 UART:
18,389,242 UART: [state] CFI Enabled
18,453,757 UART: [fht] FMC Alias Private Key: 7
20,217,854 UART: [art] Extend RT PCRs Done
20,219,066 UART: [art] Lock RT PCRs Done
20,220,694 UART: [art] Populate DV Done
20,225,980 UART: [fht] FMC Alias Private Key: 7
20,227,623 UART: [art] Derive CDI
20,228,439 UART: [art] Store in in slot 0x4
20,286,295 UART: [art] Derive Key Pair
20,287,339 UART: [art] Store priv key in slot 0x5
22,750,608 UART: [art] Derive Key Pair - Done
22,763,232 UART: [art] Signing Cert with AUTHO
22,764,538 UART: RITY.KEYID = 7
24,476,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,822 UART: [art] PUB.X = 0D5B0A8676563CFCDDA6CF04F70F9F3F11193E65B6D6CEA9EA43547E53688B05E304E16AF04548B2B8AA367E367B903A
24,485,128 UART: [art] PUB.Y = 00A6F838363A9EF92DF55425997A0647133352DAD08BAEA3193F7F9E2B705C6EEC0897D8624A96C2CC143F3519430CEC
24,492,349 UART: [art] SIG.R = 8CD5CC0992DA86137997CF4BD85688035204B3FEE0C254FAFE2E82161423E0A20C488245654B5403BD50E8A0325EA557
24,500,233 UART: [art] SIG.S = 7015A99BEBDEDC0AB6D6E123FD7D8D11C65034C2870766F315D33B6A84D172597CF08690BECA2B0AC6EC797DF1FC33B8
25,478,763 UART: Caliptra RT
25,479,469 UART: [state] CFI Enabled
25,644,747 UART: [rt] RT listening for mailbox commands...
25,646,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,676,106 UART: [rt]cmd =0x46504c54, len=4
25,677,688 >>> mbox cmd response data (8 bytes)
25,678,740 UART: [rt] FIPS self test
25,679,679 UART: [kat] ++
25,680,149 UART: [kat] sha1
25,684,713 UART: [kat] SHA2-256
25,686,643 UART: [kat] SHA2-384
25,689,611 UART: [kat] SHA2-512-ACC
25,691,885 UART: [kat] ECC-384
28,128,506 UART: Fatal Error: 0x90040003
28,163,803 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,308,660 >>> mbox cmd response: failed
28,309,341 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,454,131 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,385,062 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,103,260 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,839 UART:
193,194 UART: Running Caliptra ROM ...
194,317 UART:
604,057 UART: [state] CFI Enabled
617,894 UART: [state] LifecycleState = Unprovisioned
619,777 UART: [state] DebugLocked = No
621,935 UART: [state] WD Timer not started. Device not locked for debugging
625,105 UART: [kat] SHA2-256
804,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,800 UART: [kat] ++
816,251 UART: [kat] sha1
827,909 UART: [kat] SHA2-256
831,001 UART: [kat] SHA2-384
836,076 UART: [kat] SHA2-512-ACC
839,019 UART: [kat] ECC-384
3,280,450 UART: [kat] HMAC-384Kdf
3,291,700 UART: [kat] LMS
3,821,188 UART: [kat] --
3,827,815 UART: [cold-reset] ++
3,828,827 UART: [fht] FHT @ 0x50003400
3,840,544 UART: [idev] ++
3,841,149 UART: [idev] CDI.KEYID = 6
3,842,073 UART: [idev] SUBJECT.KEYID = 7
3,843,259 UART: [idev] UDS.KEYID = 0
3,844,206 ready_for_fw is high
3,844,405 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,989,103 UART: [idev] Erasing UDS.KEYID = 0
6,315,225 UART: [idev] Sha1 KeyId Algorithm
6,339,323 UART: [idev] --
6,342,831 UART: [ldev] ++
6,343,401 UART: [ldev] CDI.KEYID = 6
6,344,282 UART: [ldev] SUBJECT.KEYID = 5
6,345,497 UART: [ldev] AUTHORITY.KEYID = 7
6,346,790 UART: [ldev] FE.KEYID = 1
6,358,325 UART: [ldev] Erasing FE.KEYID = 1
8,832,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,921 UART: [ldev] --
10,624,542 UART: [fwproc] Wait for Commands...
10,626,640 UART: [fwproc] Recv command 0x46574c44
10,628,741 UART: [fwproc] Recv'd Img size: 115304 bytes
14,046,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,020 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,510,699 >>> mbox cmd response: success
14,514,942 UART: [afmc] ++
14,515,533 UART: [afmc] CDI.KEYID = 6
14,516,447 UART: [afmc] SUBJECT.KEYID = 7
14,517,604 UART: [afmc] AUTHORITY.KEYID = 5
17,018,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,740,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,742,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,758,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,774,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,790,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,812,741 UART: [afmc] --
18,817,101 UART: [cold-reset] --
18,820,744 UART: [state] Locking Datavault
18,825,190 UART: [state] Locking PCR0, PCR1 and PCR31
18,826,884 UART: [state] Locking ICCM
18,829,463 UART: [exit] Launching FMC @ 0x40000130
18,837,911 UART:
18,838,144 UART: Running Caliptra FMC ...
18,839,246 UART:
18,839,404 UART: [state] CFI Enabled
18,847,560 UART: [fht] FMC Alias Private Key: 7
20,604,222 UART: [art] Extend RT PCRs Done
20,605,442 UART: [art] Lock RT PCRs Done
20,607,064 UART: [art] Populate DV Done
20,612,496 UART: [fht] FMC Alias Private Key: 7
20,614,091 UART: [art] Derive CDI
20,614,909 UART: [art] Store in in slot 0x4
20,657,447 UART: [art] Derive Key Pair
20,658,486 UART: [art] Store priv key in slot 0x5
23,085,447 UART: [art] Derive Key Pair - Done
23,098,554 UART: [art] Signing Cert with AUTHO
23,099,867 UART: RITY.KEYID = 7
24,804,984 UART: [art] Erasing AUTHORITY.KEYID = 7
24,806,491 UART: [art] PUB.X = F881313B8E98752A0314836C1181357E6C98A8796BF2A88509BCD6C3633C95A3A5670595AA700A9EFE63E461DBA171E2
24,813,691 UART: [art] PUB.Y = 269669C707F273504C48E99FBC1F7422FA5293BFAC05DE3FF08BBB419DE0D4774B026263F30B52C164D1CD8446F20E6A
24,820,991 UART: [art] SIG.R = 83DF8DF7A5FE37971AA951DCC1D805B59FB79DAEE8C1C17F94F15E207D7196AC5E04A05537F53AF051BFB7035A2F5711
24,828,387 UART: [art] SIG.S = A7AE233768F6AE0C3E3C93F0E47C985334228EEF5C90E5C17FD5158C83DA82820CBAA33686B5E260A19411E8133C26BD
25,807,331 UART: Caliptra RT
25,808,058 UART: [state] CFI Enabled
25,924,985 UART: [rt] RT listening for mailbox commands...
25,926,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,956,643 UART: [rt]cmd =0x46504c54, len=4
25,958,278 >>> mbox cmd response data (8 bytes)
25,959,444 UART: [rt] FIPS self test
25,960,382 UART: [kat] ++
25,960,839 UART: [kat] sha1
25,965,187 UART: [kat] SHA2-256
25,967,116 UART: [kat] SHA2-384
25,970,077 UART: [kat] SHA2-512-ACC
25,972,371 UART: [kat] ECC-384
28,398,164 UART: Fatal Error: 0x90040003
28,433,393 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,578,257 >>> mbox cmd response: failed
28,578,883 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,723,606 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,009 UART:
190,309 UART: Running Caliptra ROM ...
191,424 UART:
11,805,954 UART: [state] CFI Enabled
11,822,765 UART: [state] LifecycleState = Unprovisioned
11,824,624 UART: [state] DebugLocked = No
11,826,928 UART: [state] WD Timer not started. Device not locked for debugging
11,830,275 UART: [kat] SHA2-256
12,009,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,020,969 UART: [kat] ++
12,021,634 UART: [kat] sha1
12,033,324 UART: [kat] SHA2-256
12,036,354 UART: [kat] SHA2-384
12,043,152 UART: [kat] SHA2-512-ACC
12,046,091 UART: [kat] ECC-384
14,489,462 UART: [kat] HMAC-384Kdf
14,500,449 UART: [kat] LMS
15,029,948 UART: [kat] --
15,032,315 UART: [cold-reset] ++
15,033,921 UART: [fht] FHT @ 0x50003400
15,045,120 UART: [idev] ++
15,045,687 UART: [idev] CDI.KEYID = 6
15,046,598 UART: [idev] SUBJECT.KEYID = 7
15,047,813 UART: [idev] UDS.KEYID = 0
15,049,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,194,166 UART: [idev] Erasing UDS.KEYID = 0
17,520,157 UART: [idev] Sha1 KeyId Algorithm
17,544,306 UART: [idev] --
17,549,376 UART: [ldev] ++
17,549,946 UART: [ldev] CDI.KEYID = 6
17,550,853 UART: [ldev] SUBJECT.KEYID = 5
17,552,032 UART: [ldev] AUTHORITY.KEYID = 7
17,553,264 UART: [ldev] FE.KEYID = 1
17,564,664 UART: [ldev] Erasing FE.KEYID = 1
20,034,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,752,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,768,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,784,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,800,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,821,483 UART: [ldev] --
21,825,395 UART: [fwproc] Wait for Commands...
21,827,234 UART: [fwproc] Recv command 0x46574c44
21,829,371 UART: [fwproc] Recv'd Img size: 115304 bytes
25,237,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,307,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,376,696 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,698,621 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
3,698,800 ready_for_fw is high
3,699,459 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,287,432 >>> mbox cmd response: success
18,541,442 UART:
18,541,839 UART: Running Caliptra FMC ...
18,542,960 UART:
18,543,113 UART: [state] CFI Enabled
18,550,990 UART: [fht] FMC Alias Private Key: 7
20,307,699 UART: [art] Extend RT PCRs Done
20,308,938 UART: [art] Lock RT PCRs Done
20,310,627 UART: [art] Populate DV Done
20,316,097 UART: [fht] FMC Alias Private Key: 7
20,317,684 UART: [art] Derive CDI
20,318,512 UART: [art] Store in in slot 0x4
20,361,172 UART: [art] Derive Key Pair
20,362,180 UART: [art] Store priv key in slot 0x5
22,788,490 UART: [art] Derive Key Pair - Done
22,801,753 UART: [art] Signing Cert with AUTHO
22,803,090 UART: RITY.KEYID = 7
24,508,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,680 UART: [art] PUB.X = E1B5FB9E06ADB1CED43FBA573C24AB8E032371B2854974E1377D244401E41D925C40DCDCA3AF3FCE0B63FD7969BF91AE
24,516,999 UART: [art] PUB.Y = 15208967F51ECF8C548EC270175EF7643D7A6BC3F18D0B600DD97C7134CFEA00586C1A88EE6A077869E9E916F651F656
24,524,271 UART: [art] SIG.R = B4C3123A08E92F5E62962E814417A86D6CA27CDAD8516D3C4D739060D4BF54FCAAED2F7D701E4B4A919D500320B314BB
24,531,672 UART: [art] SIG.S = 3E039CD5127F0CCFCDC87425B50C2E6FBABD2F84ED86DEB69636B93737C8D22E0DC58AA779D8EA02C48B7E9F65E68A8F
25,510,600 UART: Caliptra RT
25,511,302 UART: [state] CFI Enabled
25,629,458 UART: [rt] RT listening for mailbox commands...
25,631,310 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,660,933 UART: [rt]cmd =0x46504c54, len=4
25,662,560 >>> mbox cmd response data (8 bytes)
25,663,391 UART: [rt] FIPS self test
25,664,338 UART: [kat] ++
25,664,789 UART: [kat] sha1
25,669,137 UART: [kat] SHA2-256
25,671,066 UART: [kat] SHA2-384
25,674,089 UART: [kat] SHA2-512-ACC
25,676,319 UART: [kat] ECC-384
28,102,487 UART: Fatal Error: 0x90040003
28,137,775 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,282,961 >>> mbox cmd response: failed
28,283,608 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,428,354 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
15,195,195 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,799,798 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,847 writing to cptra_bootfsm_go
193,018 UART:
193,429 UART: Running Caliptra ROM ...
194,752 UART:
194,913 UART: [state] CFI Enabled
262,921 UART: [state] LifecycleState = Unprovisioned
265,341 UART: [state] DebugLocked = No
267,671 UART: [state] WD Timer not started. Device not locked for debugging
272,284 UART: [kat] SHA2-256
462,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,925 UART: [kat] ++
473,372 UART: [kat] sha1
484,715 UART: [kat] SHA2-256
487,733 UART: [kat] SHA2-384
493,392 UART: [kat] SHA2-512-ACC
495,984 UART: [kat] ECC-384
2,948,277 UART: [kat] HMAC-384Kdf
2,972,253 UART: [kat] LMS
3,504,010 UART: [kat] --
3,508,791 UART: [cold-reset] ++
3,510,653 UART: [fht] FHT @ 0x50003400
3,522,224 UART: [idev] ++
3,522,899 UART: [idev] CDI.KEYID = 6
3,523,819 UART: [idev] SUBJECT.KEYID = 7
3,525,073 UART: [idev] UDS.KEYID = 0
3,525,999 ready_for_fw is high
3,526,204 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,117 UART: [idev] Erasing UDS.KEYID = 0
6,028,191 UART: [idev] Sha1 KeyId Algorithm
6,050,912 UART: [idev] --
6,055,563 UART: [ldev] ++
6,056,249 UART: [ldev] CDI.KEYID = 6
6,057,161 UART: [ldev] SUBJECT.KEYID = 5
6,058,377 UART: [ldev] AUTHORITY.KEYID = 7
6,059,558 UART: [ldev] FE.KEYID = 1
6,100,947 UART: [ldev] Erasing FE.KEYID = 1
8,608,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,813 UART: [ldev] --
10,415,572 UART: [fwproc] Wait for Commands...
10,418,373 UART: [fwproc] Recv command 0x46574c44
10,420,690 UART: [fwproc] Recv'd Img size: 115304 bytes
13,881,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,526 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,627,450 >>> mbox cmd response: success
14,632,392 UART: [afmc] ++
14,633,097 UART: [afmc] CDI.KEYID = 6
14,634,340 UART: [afmc] SUBJECT.KEYID = 7
14,635,770 UART: [afmc] AUTHORITY.KEYID = 5
17,175,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,917,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,919,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,934,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,949,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,964,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,988,492 UART: [afmc] --
18,992,194 UART: [cold-reset] --
18,996,611 UART: [state] Locking Datavault
19,002,344 UART: [state] Locking PCR0, PCR1 and PCR31
19,004,531 UART: [state] Locking ICCM
19,007,223 UART: [exit] Launching FMC @ 0x40000130
19,015,891 UART:
19,016,127 UART: Running Caliptra FMC ...
19,017,233 UART:
19,017,394 UART: [state] CFI Enabled
19,074,834 UART: [fht] FMC Alias Private Key: 7
20,839,402 UART: [art] Extend RT PCRs Done
20,840,638 UART: [art] Lock RT PCRs Done
20,842,234 UART: [art] Populate DV Done
20,847,535 UART: [fht] FMC Alias Private Key: 7
20,849,127 UART: [art] Derive CDI
20,849,942 UART: [art] Store in in slot 0x4
20,907,089 UART: [art] Derive Key Pair
20,908,153 UART: [art] Store priv key in slot 0x5
23,370,991 UART: [art] Derive Key Pair - Done
23,384,100 UART: [art] Signing Cert with AUTHO
23,385,411 UART: RITY.KEYID = 7
25,096,775 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,280 UART: [art] PUB.X = A9D5C45E5EF189B62EE99A4D35B0E7108EE171BA239FE8428C5F18B4E726B163296ECF07AA9F8B56B164762398224700
25,105,491 UART: [art] PUB.Y = 5FFDB72F3ACC7B2656F7B3E865EF6B0EDA2ACAEFC7FD3D71F30AFAC3518D6941F13CA936B96BAA18AEE2C63E14C247F6
25,112,841 UART: [art] SIG.R = 7461186BA97B36E67539CBCF8D79AC49991778F55AB6D13CFBAD4D40730EF49BE91BF2C3D4040CACD71FA30868F7C65A
25,120,244 UART: [art] SIG.S = 79E996BC50F9368E8F618765FDC683EC58EB85C906AE7372196BE77817CED5DAB0AB8C1AC1E677347E63930C50FF6BD2
26,099,097 UART: Caliptra RT
26,099,793 UART: [state] CFI Enabled
26,263,877 UART: [rt] RT listening for mailbox commands...
26,265,725 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,295,351 UART: [rt]cmd =0x46504c54, len=4
26,297,034 >>> mbox cmd response data (8 bytes)
26,298,379 UART: [rt] FIPS self test
26,299,341 UART: [kat] ++
26,299,797 UART: [kat] sha1
26,304,254 UART: [kat] SHA2-256
26,306,184 UART: [kat] SHA2-384
26,309,196 UART: [kat] SHA2-512-ACC
26,311,488 UART: [kat] ECC-384
28,748,296 UART: Fatal Error: 0x90040003
28,783,598 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,928,407 >>> mbox cmd response: failed
28,929,032 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,073,828 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,002 UART:
190,301 UART: Running Caliptra ROM ...
191,327 UART:
191,483 UART: [state] CFI Enabled
264,642 UART: [state] LifecycleState = Unprovisioned
266,988 UART: [state] DebugLocked = No
268,765 UART: [state] WD Timer not started. Device not locked for debugging
272,823 UART: [kat] SHA2-256
462,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,463 UART: [kat] ++
473,908 UART: [kat] sha1
486,141 UART: [kat] SHA2-256
489,147 UART: [kat] SHA2-384
495,401 UART: [kat] SHA2-512-ACC
498,018 UART: [kat] ECC-384
2,947,197 UART: [kat] HMAC-384Kdf
2,970,872 UART: [kat] LMS
3,502,618 UART: [kat] --
3,508,128 UART: [cold-reset] ++
3,510,458 UART: [fht] FHT @ 0x50003400
3,523,275 UART: [idev] ++
3,523,951 UART: [idev] CDI.KEYID = 6
3,524,919 UART: [idev] SUBJECT.KEYID = 7
3,526,135 UART: [idev] UDS.KEYID = 0
3,527,636 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,672,784 UART: [idev] Erasing UDS.KEYID = 0
6,048,178 UART: [idev] Sha1 KeyId Algorithm
6,071,366 UART: [idev] --
6,076,716 UART: [ldev] ++
6,077,398 UART: [ldev] CDI.KEYID = 6
6,078,311 UART: [ldev] SUBJECT.KEYID = 5
6,079,475 UART: [ldev] AUTHORITY.KEYID = 7
6,080,711 UART: [ldev] FE.KEYID = 1
6,121,384 UART: [ldev] Erasing FE.KEYID = 1
8,626,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,360,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,375,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,405,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,972 UART: [ldev] --
10,432,451 UART: [fwproc] Wait for Commands...
10,434,547 UART: [fwproc] Recv command 0x46574c44
10,436,866 UART: [fwproc] Recv'd Img size: 115304 bytes
13,902,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,098,326 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,646,002 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,440,783 ready_for_fw is high
3,441,195 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,757,276 >>> mbox cmd response: success
19,051,053 UART:
19,051,471 UART: Running Caliptra FMC ...
19,052,632 UART:
19,052,819 UART: [state] CFI Enabled
19,119,592 UART: [fht] FMC Alias Private Key: 7
20,883,157 UART: [art] Extend RT PCRs Done
20,884,388 UART: [art] Lock RT PCRs Done
20,885,805 UART: [art] Populate DV Done
20,891,272 UART: [fht] FMC Alias Private Key: 7
20,892,984 UART: [art] Derive CDI
20,893,808 UART: [art] Store in in slot 0x4
20,952,272 UART: [art] Derive Key Pair
20,953,317 UART: [art] Store priv key in slot 0x5
23,416,105 UART: [art] Derive Key Pair - Done
23,429,108 UART: [art] Signing Cert with AUTHO
23,430,425 UART: RITY.KEYID = 7
25,142,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,717 UART: [art] PUB.X = 5B4B93175AA62CA35C2781A7D880C0B97ABFAA74AFA256802A773E894EA56EAF053EB445EED38A7F0E70A9C6D1B3BC6D
25,150,987 UART: [art] PUB.Y = 52ED891DE262CEFD99BA74BB5C5F1D5D8D39A73C2A9BB0E96144A59AB3A904AC689BF05B269E490202DB1A8280E0E23F
25,158,270 UART: [art] SIG.R = A444A1FA70E68BC1D1DED71A8DBBA9B2CD84840B52937C7EB0653262128E015608F727497555E1C081EFEA7E5D176949
25,165,724 UART: [art] SIG.S = 0DED80B6D4C83622B8238D61744037ABB480111DCE978493236D419DCDA45CFDB829B06E599FE528A7FA4FC2CC8455EF
26,144,389 UART: Caliptra RT
26,145,088 UART: [state] CFI Enabled
26,311,505 UART: [rt] RT listening for mailbox commands...
26,313,361 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,343,048 UART: [rt]cmd =0x46504c54, len=4
26,344,528 >>> mbox cmd response data (8 bytes)
26,345,740 UART: [rt] FIPS self test
26,346,679 UART: [kat] ++
26,347,131 UART: [kat] sha1
26,351,640 UART: [kat] SHA2-256
26,353,571 UART: [kat] SHA2-384
26,356,421 UART: [kat] SHA2-512-ACC
26,358,689 UART: [kat] ECC-384
28,794,688 UART: Fatal Error: 0x90040003
28,829,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,974,773 >>> mbox cmd response: failed
28,975,435 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,120,613 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,440,184 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,754,615 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,333 UART:
192,689 UART: Running Caliptra ROM ...
193,820 UART:
603,343 UART: [state] CFI Enabled
617,439 UART: [state] LifecycleState = Unprovisioned
619,775 UART: [state] DebugLocked = No
621,949 UART: [state] WD Timer not started. Device not locked for debugging
625,928 UART: [kat] SHA2-256
815,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,602 UART: [kat] ++
827,093 UART: [kat] sha1
837,622 UART: [kat] SHA2-256
840,635 UART: [kat] SHA2-384
847,550 UART: [kat] SHA2-512-ACC
850,094 UART: [kat] ECC-384
3,290,367 UART: [kat] HMAC-384Kdf
3,302,489 UART: [kat] LMS
3,834,287 UART: [kat] --
3,839,347 UART: [cold-reset] ++
3,841,211 UART: [fht] FHT @ 0x50003400
3,852,970 UART: [idev] ++
3,853,676 UART: [idev] CDI.KEYID = 6
3,854,634 UART: [idev] SUBJECT.KEYID = 7
3,855,812 UART: [idev] UDS.KEYID = 0
3,856,715 ready_for_fw is high
3,856,929 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,002,189 UART: [idev] Erasing UDS.KEYID = 0
6,328,350 UART: [idev] Sha1 KeyId Algorithm
6,351,412 UART: [idev] --
6,356,028 UART: [ldev] ++
6,356,739 UART: [ldev] CDI.KEYID = 6
6,357,652 UART: [ldev] SUBJECT.KEYID = 5
6,358,809 UART: [ldev] AUTHORITY.KEYID = 7
6,360,040 UART: [ldev] FE.KEYID = 1
6,370,367 UART: [ldev] Erasing FE.KEYID = 1
8,849,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,162 UART: [ldev] --
10,637,829 UART: [fwproc] Wait for Commands...
10,639,276 UART: [fwproc] Recv command 0x46574c44
10,641,262 UART: [fwproc] Recv'd Img size: 115304 bytes
14,098,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,633 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,841,621 >>> mbox cmd response: success
14,845,666 UART: [afmc] ++
14,846,375 UART: [afmc] CDI.KEYID = 6
14,847,611 UART: [afmc] SUBJECT.KEYID = 7
14,849,042 UART: [afmc] AUTHORITY.KEYID = 5
17,349,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,858 UART: [afmc] --
19,142,518 UART: [cold-reset] --
19,147,850 UART: [state] Locking Datavault
19,154,823 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,034 UART: [state] Locking ICCM
19,158,572 UART: [exit] Launching FMC @ 0x40000130
19,167,235 UART:
19,167,471 UART: Running Caliptra FMC ...
19,168,506 UART:
19,168,652 UART: [state] CFI Enabled
19,176,701 UART: [fht] FMC Alias Private Key: 7
20,933,791 UART: [art] Extend RT PCRs Done
20,935,031 UART: [art] Lock RT PCRs Done
20,936,306 UART: [art] Populate DV Done
20,941,932 UART: [fht] FMC Alias Private Key: 7
20,943,521 UART: [art] Derive CDI
20,944,338 UART: [art] Store in in slot 0x4
20,986,898 UART: [art] Derive Key Pair
20,987,934 UART: [art] Store priv key in slot 0x5
23,414,644 UART: [art] Derive Key Pair - Done
23,427,497 UART: [art] Signing Cert with AUTHO
23,428,804 UART: RITY.KEYID = 7
25,134,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,728 UART: [art] PUB.X = D02124708646D6770762EBC5DCC5F4D20A40DFCC5ECDCB7478E1CF3ACE14FFE684ADE995FC59B36CA8937DB0E6115A50
25,143,008 UART: [art] PUB.Y = 5A753F35B7A3CB01AE93D5E7333EB85DD06C81CD81D4778E8F520DFABA70A944850827E35B5A8C8F4042ED48F022CFBC
25,150,257 UART: [art] SIG.R = 99CA2C918BE91B1355FFC96A05A06F85C8B67A3F414D96B8762C859BCE6689D3E199711E1E04B2EC36EDFB4591964D72
25,157,653 UART: [art] SIG.S = BF080FAC3DD367FA5F98FDCBFF578565F73091E3DA257B316D069A7C4D21D66AC4E416F091E780386DC1BEDED56116CD
26,136,999 UART: Caliptra RT
26,137,682 UART: [state] CFI Enabled
26,255,602 UART: [rt] RT listening for mailbox commands...
26,257,438 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,287,162 UART: [rt]cmd =0x46504c54, len=4
26,288,658 >>> mbox cmd response data (8 bytes)
26,289,888 UART: [rt] FIPS self test
26,290,831 UART: [kat] ++
26,291,280 UART: [kat] sha1
26,295,643 UART: [kat] SHA2-256
26,297,572 UART: [kat] SHA2-384
26,300,747 UART: [kat] SHA2-512-ACC
26,302,980 UART: [kat] ECC-384
28,729,164 UART: Fatal Error: 0x90040003
28,764,556 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,909,792 >>> mbox cmd response: failed
28,910,373 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,054,960 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,096 UART:
190,389 UART: Running Caliptra ROM ...
191,416 UART:
11,474,291 UART: [state] CFI Enabled
11,489,435 UART: [state] LifecycleState = Unprovisioned
11,491,804 UART: [state] DebugLocked = No
11,494,239 UART: [state] WD Timer not started. Device not locked for debugging
11,498,139 UART: [kat] SHA2-256
11,688,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,698,803 UART: [kat] ++
11,699,314 UART: [kat] sha1
11,712,147 UART: [kat] SHA2-256
11,715,217 UART: [kat] SHA2-384
11,719,640 UART: [kat] SHA2-512-ACC
11,722,210 UART: [kat] ECC-384
14,164,961 UART: [kat] HMAC-384Kdf
14,179,238 UART: [kat] LMS
14,711,059 UART: [kat] --
14,716,039 UART: [cold-reset] ++
14,717,436 UART: [fht] FHT @ 0x50003400
14,729,450 UART: [idev] ++
14,730,181 UART: [idev] CDI.KEYID = 6
14,731,094 UART: [idev] SUBJECT.KEYID = 7
14,732,309 UART: [idev] UDS.KEYID = 0
14,733,829 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,878,440 UART: [idev] Erasing UDS.KEYID = 0
17,207,357 UART: [idev] Sha1 KeyId Algorithm
17,230,149 UART: [idev] --
17,234,087 UART: [ldev] ++
17,234,814 UART: [ldev] CDI.KEYID = 6
17,235,702 UART: [ldev] SUBJECT.KEYID = 5
17,236,857 UART: [ldev] AUTHORITY.KEYID = 7
17,238,113 UART: [ldev] FE.KEYID = 1
17,248,251 UART: [ldev] Erasing FE.KEYID = 1
19,722,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,442,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,457,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,473,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,488,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,508,933 UART: [ldev] --
21,513,545 UART: [fwproc] Wait for Commands...
21,516,074 UART: [fwproc] Recv command 0x46574c44
21,518,391 UART: [fwproc] Recv'd Img size: 115304 bytes
24,983,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,062,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,179,124 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,726,526 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,760,566 ready_for_fw is high
3,761,210 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,992,939 >>> mbox cmd response: success
19,245,661 UART:
19,246,047 UART: Running Caliptra FMC ...
19,247,196 UART:
19,247,355 UART: [state] CFI Enabled
19,255,364 UART: [fht] FMC Alias Private Key: 7
21,011,999 UART: [art] Extend RT PCRs Done
21,013,227 UART: [art] Lock RT PCRs Done
21,015,044 UART: [art] Populate DV Done
21,020,465 UART: [fht] FMC Alias Private Key: 7
21,022,171 UART: [art] Derive CDI
21,022,992 UART: [art] Store in in slot 0x4
21,065,930 UART: [art] Derive Key Pair
21,066,939 UART: [art] Store priv key in slot 0x5
23,493,691 UART: [art] Derive Key Pair - Done
23,506,972 UART: [art] Signing Cert with AUTHO
23,508,288 UART: RITY.KEYID = 7
25,213,955 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,465 UART: [art] PUB.X = AD1F9562AC7AE9792C5F21F09A792CE22815D790D393FB120EBCCC763E5BCA9E5023B5C5447B3785F9A59B39D4574E30
25,222,733 UART: [art] PUB.Y = 9D06309A934CD3FF3D4B49FA2EE58038E8D4C5F24B6565BEED7D0ADFFA94F3EA99090D582649BB925FBA72F7B3489C38
25,229,982 UART: [art] SIG.R = C5313DA3CE9375DFE5796CD04AF5D9DD7C47EFA894141EF5386F978338985669167C4DF68B699CD273BC3982FC494EE5
25,237,377 UART: [art] SIG.S = 1A627EC01135CDEF35E5442F8717287C7B38CB8FDADAFE76B0106438B7225ABD425165447D9F6541F751905FC16AB081
26,216,585 UART: Caliptra RT
26,217,276 UART: [state] CFI Enabled
26,334,497 UART: [rt] RT listening for mailbox commands...
26,336,341 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,365,963 UART: [rt]cmd =0x46504c54, len=4
26,367,646 >>> mbox cmd response data (8 bytes)
26,368,900 UART: [rt] FIPS self test
26,370,046 UART: [kat] ++
26,370,504 UART: [kat] sha1
26,374,849 UART: [kat] SHA2-256
26,376,729 UART: [kat] SHA2-384
26,379,721 UART: [kat] SHA2-512-ACC
26,381,989 UART: [kat] ECC-384
28,807,646 UART: Fatal Error: 0x90040003
28,842,941 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,988,173 >>> mbox cmd response: failed
28,988,802 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,133,890 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
14,559,177 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,789,765 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,656 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,481,123 ready_for_fw is high
1,481,123 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,790 UART: [idev] --
1,514,925 UART: [ldev] ++
1,515,093 UART: [ldev] CDI.KEYID = 6
1,515,456 UART: [ldev] SUBJECT.KEYID = 5
1,515,882 UART: [ldev] AUTHORITY.KEYID = 7
1,516,345 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,547,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,544 UART: [ldev] --
1,586,941 UART: [fwproc] Waiting for Commands...
1,587,610 UART: [fwproc] Received command 0x46574c44
1,588,401 UART: [fwproc] Received Image of size 115304 bytes
2,897,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,954 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,731 >>> mbox cmd response: success
3,092,821 UART: [afmc] ++
3,092,989 UART: [afmc] CDI.KEYID = 6
3,093,351 UART: [afmc] SUBJECT.KEYID = 7
3,093,776 UART: [afmc] AUTHORITY.KEYID = 5
3,128,983 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,736 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,426 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,461 UART: [afmc] --
3,172,523 UART: [cold-reset] --
3,173,329 UART: [state] Locking Datavault
3,174,234 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,838 UART: [state] Locking ICCM
3,175,308 UART: [exit] Launching FMC @ 0x40000130
3,180,637 UART:
3,180,653 UART: Running Caliptra FMC ...
3,181,061 UART:
3,181,115 UART: [state] CFI Enabled
3,191,558 UART: [fht] FMC Alias Private Key: 7
3,298,767 UART: [art] Extend RT PCRs Done
3,299,195 UART: [art] Lock RT PCRs Done
3,300,853 UART: [art] Populate DV Done
3,309,144 UART: [fht] FMC Alias Private Key: 7
3,310,138 UART: [art] Derive CDI
3,310,418 UART: [art] Store in in slot 0x4
3,395,845 UART: [art] Derive Key Pair
3,396,205 UART: [art] Store priv key in slot 0x5
3,409,061 UART: [art] Derive Key Pair - Done
3,423,810 UART: [art] Signing Cert with AUTHO
3,424,290 UART: RITY.KEYID = 7
3,439,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,429 UART: [art] PUB.X = E8A1E982DD2FFD0E03112CF61A5F9639D130C7BAC75B458ABD39746CB4B903E3A3B5E0931EABE014EC46BB93FB01E1B0
3,447,207 UART: [art] PUB.Y = F844470A9EA3C43369E5ACD95224BD2889AF1CC548B45124916710CA9114096CABB90E081BD702E601C621B31A8F610E
3,454,136 UART: [art] SIG.R = 77A1BFE7866B284F530CB7E33CBD0D708D307B4EB013009D8BF7613B480EC9248428D85F97A0EA51486830EB51A9D9F5
3,460,879 UART: [art] SIG.S = 2E3AE76A3E54009FBCFFE000E5E771E9B0ADBB6D78BADFD178F7FF9232F200975DE422D088B00ECF1C4AC6248C598105
3,484,634 UART: Caliptra RT
3,484,887 UART: [state] CFI Enabled
3,593,377 UART: [rt] RT listening for mailbox commands...
3,594,040 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,095 UART: [rt]cmd =0x46504c54, len=4
3,625,384 >>> mbox cmd response data (8 bytes)
3,625,601 UART: [rt] FIPS self test
3,625,929 UART: [kat] ++
3,626,081 UART: [kat] sha1
3,630,241 UART: [kat] SHA2-256
3,632,263 UART: [kat] SHA2-384
3,635,158 UART: [kat] SHA2-512-ACC
3,637,085 UART: [kat] ECC-384
3,646,775 UART: Fatal Error: 0x90040003
3,648,325 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,648,330 >>> mbox cmd response: failed
3,648,330 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,648,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,623 UART: [kat] SHA2-256
892,561 UART: [kat] SHA2-384
895,376 UART: [kat] SHA2-512-ACC
897,277 UART: [kat] ECC-384
903,058 UART: [kat] HMAC-384Kdf
907,810 UART: [kat] LMS
1,476,006 UART: [kat] --
1,476,755 UART: [cold-reset] ++
1,477,261 UART: [fht] Storing FHT @ 0x50003400
1,479,894 UART: [idev] ++
1,480,062 UART: [idev] CDI.KEYID = 6
1,480,422 UART: [idev] SUBJECT.KEYID = 7
1,480,846 UART: [idev] UDS.KEYID = 0
1,481,191 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,122 UART: [idev] Erasing UDS.KEYID = 0
1,505,630 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,328 UART: [idev] --
1,515,391 UART: [ldev] ++
1,515,559 UART: [ldev] CDI.KEYID = 6
1,515,922 UART: [ldev] SUBJECT.KEYID = 5
1,516,348 UART: [ldev] AUTHORITY.KEYID = 7
1,516,811 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,998 UART: [ldev] --
1,586,495 UART: [fwproc] Waiting for Commands...
1,587,314 UART: [fwproc] Received command 0x46574c44
1,588,105 UART: [fwproc] Received Image of size 115304 bytes
2,898,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,318 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,999 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 ready_for_fw is high
1,362,547 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,527 >>> mbox cmd response: success
3,003,781 UART:
3,003,797 UART: Running Caliptra FMC ...
3,004,205 UART:
3,004,259 UART: [state] CFI Enabled
3,014,628 UART: [fht] FMC Alias Private Key: 7
3,122,289 UART: [art] Extend RT PCRs Done
3,122,717 UART: [art] Lock RT PCRs Done
3,124,313 UART: [art] Populate DV Done
3,132,470 UART: [fht] FMC Alias Private Key: 7
3,133,452 UART: [art] Derive CDI
3,133,732 UART: [art] Store in in slot 0x4
3,219,401 UART: [art] Derive Key Pair
3,219,761 UART: [art] Store priv key in slot 0x5
3,233,221 UART: [art] Derive Key Pair - Done
3,247,872 UART: [art] Signing Cert with AUTHO
3,248,352 UART: RITY.KEYID = 7
3,264,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,803 UART: [art] PUB.X = F696250DAF5DF1EEE08958D0433DF11466CB6A690051D79CB0FE14B50589879420A2E0E23CBF16E6AABD86069BAC8CD2
3,271,554 UART: [art] PUB.Y = 5D40F588F4D5EA512484AE3D7DE97A0F50121414C52598DD0609397678A59B3DE4B4D7CD79F72FFB8FB763252B21B9B7
3,278,499 UART: [art] SIG.R = CB3EFF8E0EC2B1439D5E76C1677D422DEF576BDFF540DE178E0E337CEDC10EB9482ABD986619F686B5912EE141DD83B5
3,285,278 UART: [art] SIG.S = E9D0D1B11C7C1EC67C72138E2D0229671DD427A9EE7B7A940E151C03C518811AC4F416660644E79ACC2658E82A0EA7B9
3,308,918 UART: Caliptra RT
3,309,171 UART: [state] CFI Enabled
3,416,253 UART: [rt] RT listening for mailbox commands...
3,416,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,103 UART: [rt]cmd =0x46504c54, len=4
3,448,128 >>> mbox cmd response data (8 bytes)
3,448,491 UART: [rt] FIPS self test
3,448,819 UART: [kat] ++
3,448,971 UART: [kat] sha1
3,453,179 UART: [kat] SHA2-256
3,455,201 UART: [kat] SHA2-384
3,457,910 UART: [kat] SHA2-512-ACC
3,459,837 UART: [kat] ECC-384
3,469,415 UART: Fatal Error: 0x90040003
3,470,965 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,470,970 >>> mbox cmd response: failed
3,470,970 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,470,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,839 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,629 UART: [kat] HMAC-384Kdf
907,107 UART: [kat] LMS
1,475,303 UART: [kat] --
1,476,108 UART: [cold-reset] ++
1,476,626 UART: [fht] Storing FHT @ 0x50003400
1,479,367 UART: [idev] ++
1,479,535 UART: [idev] CDI.KEYID = 6
1,479,895 UART: [idev] SUBJECT.KEYID = 7
1,480,319 UART: [idev] UDS.KEYID = 0
1,480,664 ready_for_fw is high
1,480,664 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,429 UART: [idev] Erasing UDS.KEYID = 0
1,505,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,685 UART: [idev] --
1,514,736 UART: [ldev] ++
1,514,904 UART: [ldev] CDI.KEYID = 6
1,515,267 UART: [ldev] SUBJECT.KEYID = 5
1,515,693 UART: [ldev] AUTHORITY.KEYID = 7
1,516,156 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,547,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,819 UART: [ldev] --
1,586,288 UART: [fwproc] Waiting for Commands...
1,586,961 UART: [fwproc] Received command 0x46574c44
1,587,752 UART: [fwproc] Received Image of size 115304 bytes
2,897,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,935 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,287 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,608 >>> mbox cmd response: success
3,092,742 UART: [afmc] ++
3,092,910 UART: [afmc] CDI.KEYID = 6
3,093,272 UART: [afmc] SUBJECT.KEYID = 7
3,093,697 UART: [afmc] AUTHORITY.KEYID = 5
3,129,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,626 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,019 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,709 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,564 UART: [afmc] --
3,172,684 UART: [cold-reset] --
3,173,740 UART: [state] Locking Datavault
3,174,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,285 UART: [state] Locking ICCM
3,175,923 UART: [exit] Launching FMC @ 0x40000130
3,181,252 UART:
3,181,268 UART: Running Caliptra FMC ...
3,181,676 UART:
3,181,819 UART: [state] CFI Enabled
3,192,494 UART: [fht] FMC Alias Private Key: 7
3,300,443 UART: [art] Extend RT PCRs Done
3,300,871 UART: [art] Lock RT PCRs Done
3,302,019 UART: [art] Populate DV Done
3,310,030 UART: [fht] FMC Alias Private Key: 7
3,311,014 UART: [art] Derive CDI
3,311,294 UART: [art] Store in in slot 0x4
3,396,919 UART: [art] Derive Key Pair
3,397,279 UART: [art] Store priv key in slot 0x5
3,410,699 UART: [art] Derive Key Pair - Done
3,425,365 UART: [art] Signing Cert with AUTHO
3,425,845 UART: RITY.KEYID = 7
3,441,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,842 UART: [art] PUB.X = E1102B467AEF97644D3F751C26F3B63F590B59AD697638EC6A4711155B6B38CA8DE9BC4F80CFBD4FFC60EB1F56482D5C
3,448,623 UART: [art] PUB.Y = 96DE9CB33B010BBC5C85581C1412DECD9908DBF3973CBFCB80FA35D52D288AE18271D6A7A8D3A50CC344ABD61AE65156
3,455,579 UART: [art] SIG.R = FA56EEC2C4F8F327B12B88B4D0B9618F7F26BED34CBE7B2E5353441B3C35A58307629FBCC1940E97FF2F0C04832A07F0
3,462,346 UART: [art] SIG.S = 4769B7B27DE0220E8349C8A0757AAA7CD4C7DD820441D3007766C25B5AE037764972E292EC3D7341901D85405263D66D
3,486,219 UART: Caliptra RT
3,486,564 UART: [state] CFI Enabled
3,595,131 UART: [rt] RT listening for mailbox commands...
3,595,794 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,599 UART: [rt]cmd =0x46504c54, len=4
3,626,882 >>> mbox cmd response data (8 bytes)
3,627,183 UART: [rt] FIPS self test
3,627,511 UART: [kat] ++
3,627,663 UART: [kat] sha1
3,632,113 UART: [kat] SHA2-256
3,634,135 UART: [kat] SHA2-384
3,636,996 UART: [kat] SHA2-512-ACC
3,638,923 UART: [kat] ECC-384
3,647,997 UART: Fatal Error: 0x90040003
3,649,547 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,649,552 >>> mbox cmd response: failed
3,649,552 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,649,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,945 UART: [idev] Erasing UDS.KEYID = 0
1,505,657 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,271 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,522,050 UART: [ldev] Erasing FE.KEYID = 1
1,546,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,133 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 115304 bytes
2,898,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,642 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 ready_for_fw is high
1,362,826 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,502 >>> mbox cmd response: success
3,003,734 UART:
3,003,750 UART: Running Caliptra FMC ...
3,004,158 UART:
3,004,301 UART: [state] CFI Enabled
3,014,858 UART: [fht] FMC Alias Private Key: 7
3,123,845 UART: [art] Extend RT PCRs Done
3,124,273 UART: [art] Lock RT PCRs Done
3,125,739 UART: [art] Populate DV Done
3,133,596 UART: [fht] FMC Alias Private Key: 7
3,134,592 UART: [art] Derive CDI
3,134,872 UART: [art] Store in in slot 0x4
3,220,943 UART: [art] Derive Key Pair
3,221,303 UART: [art] Store priv key in slot 0x5
3,234,319 UART: [art] Derive Key Pair - Done
3,249,251 UART: [art] Signing Cert with AUTHO
3,249,731 UART: RITY.KEYID = 7
3,264,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,740 UART: [art] PUB.X = 16FE6AA5D589D6A7FF8A8DB9325F47F9D490E1A16A965986B747600326872C0F899370781AA15B42A24FAF2D96FAD593
3,272,506 UART: [art] PUB.Y = 49B3FA90855D7A89ADCDD5F537CB4742E4277F47B1441C90E5885BEE12691CDE373FB013A00C0EED5D8E30D08E4293F9
3,279,460 UART: [art] SIG.R = 4D660073C4083B683ADC5FAA8AE6A27ECD442157CBFBF0FAE6A763088D5A742A1528B2BD57BEF55331C1ADE8542E5A1F
3,286,220 UART: [art] SIG.S = 2B483A285936E3FED28C53E468E9FCD2C4033BE19496BD9F2D76C0F47A018E99DBF8D7AC8780E72A43A130906A8D55F1
3,309,709 UART: Caliptra RT
3,310,054 UART: [state] CFI Enabled
3,418,148 UART: [rt] RT listening for mailbox commands...
3,418,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,694 UART: [rt]cmd =0x46504c54, len=4
3,449,775 >>> mbox cmd response data (8 bytes)
3,449,940 UART: [rt] FIPS self test
3,450,268 UART: [kat] ++
3,450,420 UART: [kat] sha1
3,454,650 UART: [kat] SHA2-256
3,456,672 UART: [kat] SHA2-384
3,459,599 UART: [kat] SHA2-512-ACC
3,461,526 UART: [kat] ECC-384
3,470,648 UART: Fatal Error: 0x90040003
3,472,198 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,472,203 >>> mbox cmd response: failed
3,472,203 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,472,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,834 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,175,136 UART: [idev] ++
1,175,304 UART: [idev] CDI.KEYID = 6
1,175,664 UART: [idev] SUBJECT.KEYID = 7
1,176,088 UART: [idev] UDS.KEYID = 0
1,176,433 ready_for_fw is high
1,176,433 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,970 UART: [idev] Erasing UDS.KEYID = 0
1,201,381 UART: [idev] Sha1 KeyId Algorithm
1,209,899 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,621 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,718 UART: [fwproc] Recv command 0x46574c44
1,284,446 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,105 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,258 >>> mbox cmd response: success
2,789,358 UART: [afmc] ++
2,789,526 UART: [afmc] CDI.KEYID = 6
2,789,888 UART: [afmc] SUBJECT.KEYID = 7
2,790,313 UART: [afmc] AUTHORITY.KEYID = 5
2,825,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,375 UART: [afmc] --
2,869,337 UART: [cold-reset] --
2,870,319 UART: [state] Locking Datavault
2,871,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,128 UART: [state] Locking ICCM
2,872,614 UART: [exit] Launching FMC @ 0x40000130
2,877,943 UART:
2,877,959 UART: Running Caliptra FMC ...
2,878,367 UART:
2,878,421 UART: [state] CFI Enabled
2,888,906 UART: [fht] FMC Alias Private Key: 7
2,996,587 UART: [art] Extend RT PCRs Done
2,997,015 UART: [art] Lock RT PCRs Done
2,998,531 UART: [art] Populate DV Done
3,006,928 UART: [fht] FMC Alias Private Key: 7
3,007,904 UART: [art] Derive CDI
3,008,184 UART: [art] Store in in slot 0x4
3,093,657 UART: [art] Derive Key Pair
3,094,017 UART: [art] Store priv key in slot 0x5
3,106,633 UART: [art] Derive Key Pair - Done
3,121,114 UART: [art] Signing Cert with AUTHO
3,121,594 UART: RITY.KEYID = 7
3,136,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,543 UART: [art] PUB.X = E7D69180934E4CFEF35EF85A618565C8E1DD672133043FF9B54E12CB116E3485268CDA65D36CB74DE9E7845BF86A6F2C
3,144,318 UART: [art] PUB.Y = 664FDB475E42B84F7947E56B0F98AE7BAF75767DD6CF3A7B704CA2D623697683A2B4B2794ADC2E49DFB64D565DB482E1
3,151,277 UART: [art] SIG.R = DF5A146848B89CF8678599622A4A2593A8C57B5BEDB2829919B5176487E1979C34E729CD5E17B31784B9C33EA138B221
3,158,041 UART: [art] SIG.S = 15FA5A372144F9CA5440F28B7DDD6EEFB83E6E38E7E417B898732837CE3BCDFE413CE74043CA48F46D03B22DAC03084D
3,181,755 UART: Caliptra RT
3,182,008 UART: [state] CFI Enabled
3,289,735 UART: [rt] RT listening for mailbox commands...
3,290,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,401 UART: [rt]cmd =0x46504c54, len=4
3,321,428 >>> mbox cmd response data (8 bytes)
3,321,633 UART: [rt] FIPS self test
3,321,961 UART: [kat] ++
3,322,113 UART: [kat] sha1
3,326,303 UART: [kat] SHA2-256
3,328,325 UART: [kat] SHA2-384
3,331,288 UART: [kat] SHA2-512-ACC
3,333,215 UART: [kat] ECC-384
3,342,453 UART: Fatal Error: 0x90040003
3,344,003 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,008 >>> mbox cmd response: failed
3,344,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
902,085 UART: [kat] SHA2-256
904,025 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
923,150 UART: [kat] LMS
1,171,478 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,667 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,480 UART: [idev] Erasing UDS.KEYID = 0
1,201,507 UART: [idev] Sha1 KeyId Algorithm
1,209,913 UART: [idev] --
1,211,105 UART: [ldev] ++
1,211,273 UART: [ldev] CDI.KEYID = 6
1,211,636 UART: [ldev] SUBJECT.KEYID = 5
1,212,062 UART: [ldev] AUTHORITY.KEYID = 7
1,212,525 UART: [ldev] FE.KEYID = 1
1,217,713 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,653 UART: [ldev] --
1,282,936 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,179 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,488 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,103 ready_for_fw is high
1,060,103 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,405 >>> mbox cmd response: success
2,702,563 UART:
2,702,579 UART: Running Caliptra FMC ...
2,702,987 UART:
2,703,041 UART: [state] CFI Enabled
2,713,938 UART: [fht] FMC Alias Private Key: 7
2,821,951 UART: [art] Extend RT PCRs Done
2,822,379 UART: [art] Lock RT PCRs Done
2,823,981 UART: [art] Populate DV Done
2,832,268 UART: [fht] FMC Alias Private Key: 7
2,833,414 UART: [art] Derive CDI
2,833,694 UART: [art] Store in in slot 0x4
2,919,143 UART: [art] Derive Key Pair
2,919,503 UART: [art] Store priv key in slot 0x5
2,932,785 UART: [art] Derive Key Pair - Done
2,947,705 UART: [art] Signing Cert with AUTHO
2,948,185 UART: RITY.KEYID = 7
2,962,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,568 UART: [art] PUB.X = B168E94CB0B773434B01940A80C4F2CFED166BBB428A4C2425198EA773D5666FBAE09D233A27C96D1EB56524B53BC523
2,970,338 UART: [art] PUB.Y = 21274DE551CFC0F2D402FA696F34FDE62171A73849A302C22984561968AD34717EB7B7C864857770E82A313700CCABA7
2,977,256 UART: [art] SIG.R = 898DDA67A040E845CA1AD7202FA2C03B22B33C2E670F067EF15EDD4714145D6CF862CED4D14A539CDC4162FA5D04EEE7
2,984,033 UART: [art] SIG.S = 50FE7A115F266844B45C836DC3F18E3D8579DF284FE195FE6AFF59F2184350CD3854E37E27952D92BAC579D0C48690B5
3,008,348 UART: Caliptra RT
3,008,601 UART: [state] CFI Enabled
3,116,116 UART: [rt] RT listening for mailbox commands...
3,116,779 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,468 UART: [rt]cmd =0x46504c54, len=4
3,147,585 >>> mbox cmd response data (8 bytes)
3,147,918 UART: [rt] FIPS self test
3,148,246 UART: [kat] ++
3,148,398 UART: [kat] sha1
3,152,672 UART: [kat] SHA2-256
3,154,694 UART: [kat] SHA2-384
3,157,423 UART: [kat] SHA2-512-ACC
3,159,350 UART: [kat] ECC-384
3,168,676 UART: Fatal Error: 0x90040003
3,170,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,231 >>> mbox cmd response: failed
3,170,231 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,727 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,477 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Unprovisioned
85,636 UART: [state] DebugLocked = No
86,120 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
893,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,248 UART: [kat] ++
897,400 UART: [kat] sha1
901,542 UART: [kat] SHA2-256
903,482 UART: [kat] SHA2-384
906,303 UART: [kat] SHA2-512-ACC
908,204 UART: [kat] ECC-384
917,981 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,174,843 UART: [idev] ++
1,175,011 UART: [idev] CDI.KEYID = 6
1,175,371 UART: [idev] SUBJECT.KEYID = 7
1,175,795 UART: [idev] UDS.KEYID = 0
1,176,140 ready_for_fw is high
1,176,140 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,539 UART: [idev] Erasing UDS.KEYID = 0
1,200,320 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,666 UART: [ldev] ++
1,209,834 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,623 UART: [ldev] AUTHORITY.KEYID = 7
1,211,086 UART: [ldev] FE.KEYID = 1
1,216,294 UART: [ldev] Erasing FE.KEYID = 1
1,242,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,886 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,452 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,735 >>> mbox cmd response: success
2,788,799 UART: [afmc] ++
2,788,967 UART: [afmc] CDI.KEYID = 6
2,789,329 UART: [afmc] SUBJECT.KEYID = 7
2,789,754 UART: [afmc] AUTHORITY.KEYID = 5
2,825,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,359 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,846 UART: [afmc] --
2,868,876 UART: [cold-reset] --
2,869,760 UART: [state] Locking Datavault
2,870,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,537 UART: [state] Locking ICCM
2,872,045 UART: [exit] Launching FMC @ 0x40000130
2,877,374 UART:
2,877,390 UART: Running Caliptra FMC ...
2,877,798 UART:
2,877,941 UART: [state] CFI Enabled
2,888,480 UART: [fht] FMC Alias Private Key: 7
2,996,487 UART: [art] Extend RT PCRs Done
2,996,915 UART: [art] Lock RT PCRs Done
2,998,443 UART: [art] Populate DV Done
3,006,594 UART: [fht] FMC Alias Private Key: 7
3,007,530 UART: [art] Derive CDI
3,007,810 UART: [art] Store in in slot 0x4
3,093,641 UART: [art] Derive Key Pair
3,094,001 UART: [art] Store priv key in slot 0x5
3,107,051 UART: [art] Derive Key Pair - Done
3,122,365 UART: [art] Signing Cert with AUTHO
3,122,845 UART: RITY.KEYID = 7
3,138,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,116 UART: [art] PUB.X = 0327BE6E2AC11D0230CC86B58ACFE72B629FC13AE8A1DCA85A635E1EDE61DED5797E7816B6AB8B722E98595B07463732
3,145,889 UART: [art] PUB.Y = B270F26AC7FB8FB69FA341C6F46B240617C7338329379632757B11F18513F6ED027BC83994CCEEED059F732A3599DAE0
3,152,832 UART: [art] SIG.R = 79576C26C7038C2BD98A023968403A18839CB46D26FAF54B6934E8EE91ADB93F983CD5009EBCC4B12327B76193D049F2
3,159,574 UART: [art] SIG.S = 5E7F0E842B1A1336E22147F059C70E17C77EF2BAA5622C8EC70408A1105B1B14445EEE88938A1BCAF1AF541B0C598294
3,183,998 UART: Caliptra RT
3,184,343 UART: [state] CFI Enabled
3,291,852 UART: [rt] RT listening for mailbox commands...
3,292,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,514 UART: [rt]cmd =0x46504c54, len=4
3,323,747 >>> mbox cmd response data (8 bytes)
3,324,016 UART: [rt] FIPS self test
3,324,344 UART: [kat] ++
3,324,496 UART: [kat] sha1
3,328,784 UART: [kat] SHA2-256
3,330,806 UART: [kat] SHA2-384
3,333,759 UART: [kat] SHA2-512-ACC
3,335,686 UART: [kat] ECC-384
3,345,450 UART: Fatal Error: 0x90040003
3,347,000 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,005 >>> mbox cmd response: failed
3,347,005 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
901,970 UART: [kat] SHA2-256
903,910 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,793 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,838 UART: [cold-reset] ++
1,173,180 UART: [fht] FHT @ 0x50003400
1,175,781 UART: [idev] ++
1,175,949 UART: [idev] CDI.KEYID = 6
1,176,309 UART: [idev] SUBJECT.KEYID = 7
1,176,733 UART: [idev] UDS.KEYID = 0
1,177,078 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,181 UART: [idev] Erasing UDS.KEYID = 0
1,202,390 UART: [idev] Sha1 KeyId Algorithm
1,210,750 UART: [idev] --
1,211,820 UART: [ldev] ++
1,211,988 UART: [ldev] CDI.KEYID = 6
1,212,351 UART: [ldev] SUBJECT.KEYID = 5
1,212,777 UART: [ldev] AUTHORITY.KEYID = 7
1,213,240 UART: [ldev] FE.KEYID = 1
1,218,762 UART: [ldev] Erasing FE.KEYID = 1
1,244,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,484 UART: [ldev] --
1,283,841 UART: [fwproc] Wait for Commands...
1,284,641 UART: [fwproc] Recv command 0x46574c44
1,285,369 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,844 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,209 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,192 ready_for_fw is high
1,061,192 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,892 >>> mbox cmd response: success
2,702,988 UART:
2,703,004 UART: Running Caliptra FMC ...
2,703,412 UART:
2,703,555 UART: [state] CFI Enabled
2,714,536 UART: [fht] FMC Alias Private Key: 7
2,822,339 UART: [art] Extend RT PCRs Done
2,822,767 UART: [art] Lock RT PCRs Done
2,824,305 UART: [art] Populate DV Done
2,832,646 UART: [fht] FMC Alias Private Key: 7
2,833,712 UART: [art] Derive CDI
2,833,992 UART: [art] Store in in slot 0x4
2,919,353 UART: [art] Derive Key Pair
2,919,713 UART: [art] Store priv key in slot 0x5
2,933,739 UART: [art] Derive Key Pair - Done
2,948,344 UART: [art] Signing Cert with AUTHO
2,948,824 UART: RITY.KEYID = 7
2,963,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,761 UART: [art] PUB.X = FEF7929162C72E02EE27AE52E757E977CB692E83A58869687477CF6BE6C516E8B60622B37D4290D274FD8C9CE508E32A
2,971,524 UART: [art] PUB.Y = 5C253DD103C5B1AF429B85923F625114EDC6995C5CD1323108722DFA207E9B15AD0942E2C128A83EA2BB19030670820A
2,978,454 UART: [art] SIG.R = 6CC591EBCE6540CB325F8C2A4B92AFFD23006FA64E6D8EC939BEE2329670093C13D0ED651E90B54F26935B655CC9F8B3
2,985,211 UART: [art] SIG.S = AB4F1A51C64FE9F38DFFB06FEE07C2CE3477B42B941A84ADE2E50FB47C27BC142383B240FE216DFB05C67B80AB3E8123
3,008,977 UART: Caliptra RT
3,009,322 UART: [state] CFI Enabled
3,117,463 UART: [rt] RT listening for mailbox commands...
3,118,126 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,247 UART: [rt]cmd =0x46504c54, len=4
3,149,304 >>> mbox cmd response data (8 bytes)
3,149,493 UART: [rt] FIPS self test
3,149,821 UART: [kat] ++
3,149,973 UART: [kat] sha1
3,154,135 UART: [kat] SHA2-256
3,156,157 UART: [kat] SHA2-384
3,158,982 UART: [kat] SHA2-512-ACC
3,160,909 UART: [kat] ECC-384
3,170,675 UART: Fatal Error: 0x90040003
3,172,225 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,230 >>> mbox cmd response: failed
3,172,230 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,538 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,246 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,893 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 ready_for_fw is high
1,174,027 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,830 UART: [ldev] Erasing FE.KEYID = 1
1,240,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,520 UART: [ldev] --
1,279,998 UART: [fwproc] Wait for Commands...
1,280,745 UART: [fwproc] Recv command 0x46574c44
1,281,478 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,070 >>> mbox cmd response: success
2,785,311 UART: [afmc] ++
2,785,479 UART: [afmc] CDI.KEYID = 6
2,785,842 UART: [afmc] SUBJECT.KEYID = 7
2,786,268 UART: [afmc] AUTHORITY.KEYID = 5
2,821,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,232 UART: [afmc] --
2,865,172 UART: [cold-reset] --
2,866,050 UART: [state] Locking Datavault
2,867,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,625 UART: [state] Locking ICCM
2,868,045 UART: [exit] Launching FMC @ 0x40000130
2,873,374 UART:
2,873,390 UART: Running Caliptra FMC ...
2,873,798 UART:
2,873,852 UART: [state] CFI Enabled
2,884,533 UART: [fht] FMC Alias Private Key: 7
2,992,674 UART: [art] Extend RT PCRs Done
2,993,102 UART: [art] Lock RT PCRs Done
2,994,562 UART: [art] Populate DV Done
3,002,575 UART: [fht] FMC Alias Private Key: 7
3,003,603 UART: [art] Derive CDI
3,003,883 UART: [art] Store in in slot 0x4
3,089,702 UART: [art] Derive Key Pair
3,090,062 UART: [art] Store priv key in slot 0x5
3,103,254 UART: [art] Derive Key Pair - Done
3,118,403 UART: [art] Signing Cert with AUTHO
3,118,883 UART: RITY.KEYID = 7
3,134,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,838 UART: [art] PUB.X = 5A749F4778CF0FAF6FE973300DBAA1EE6C594B15331F2F863AC2BE5E899D4BF6ACDCA97BC19BC368B9EE7DA82E865DE5
3,141,628 UART: [art] PUB.Y = 7FCF98C3228CAF60940AD6928F70B64A37D4AD77F161C6710BD7BD78240359E6D63CCEA40D4E51E59E9A09793376B4F1
3,148,569 UART: [art] SIG.R = 9CE2DC0B821152C15715A0A4D8475189C03293347EE3724899B891CB8D4CFFEE2E423A310BD580D37CD56A49980EFF09
3,155,329 UART: [art] SIG.S = D70DCDDABE08BF2790A9AF1D8ED61554CAE1E771A66670641486F96F67511EF056A2CFA8AB3D6F08BE47F5286C181557
3,178,959 UART: Caliptra RT
3,179,212 UART: [state] CFI Enabled
3,287,556 UART: [rt] RT listening for mailbox commands...
3,288,219 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,776 UART: [rt]cmd =0x46504c54, len=4
3,319,155 >>> mbox cmd response data (8 bytes)
3,319,300 UART: [rt] FIPS self test
3,319,628 UART: [kat] ++
3,319,780 UART: [kat] sha1
3,324,000 UART: [kat] SHA2-256
3,326,022 UART: [kat] SHA2-384
3,328,945 UART: [kat] SHA2-512-ACC
3,330,872 UART: [kat] ECC-384
3,340,624 UART: Fatal Error: 0x90040003
3,342,174 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,179 >>> mbox cmd response: failed
3,342,179 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,173 UART: [idev] Sha1 KeyId Algorithm
1,207,183 UART: [idev] --
1,208,074 UART: [ldev] ++
1,208,242 UART: [ldev] CDI.KEYID = 6
1,208,606 UART: [ldev] SUBJECT.KEYID = 5
1,209,033 UART: [ldev] AUTHORITY.KEYID = 7
1,209,496 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,240,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,241 UART: [fwproc] Recv command 0x46574c44
1,281,974 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,876 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,030 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,106 ready_for_fw is high
1,056,106 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,402 >>> mbox cmd response: success
2,697,436 UART:
2,697,452 UART: Running Caliptra FMC ...
2,697,860 UART:
2,697,914 UART: [state] CFI Enabled
2,708,323 UART: [fht] FMC Alias Private Key: 7
2,816,340 UART: [art] Extend RT PCRs Done
2,816,768 UART: [art] Lock RT PCRs Done
2,818,598 UART: [art] Populate DV Done
2,826,969 UART: [fht] FMC Alias Private Key: 7
2,828,143 UART: [art] Derive CDI
2,828,423 UART: [art] Store in in slot 0x4
2,913,776 UART: [art] Derive Key Pair
2,914,136 UART: [art] Store priv key in slot 0x5
2,927,572 UART: [art] Derive Key Pair - Done
2,942,373 UART: [art] Signing Cert with AUTHO
2,942,853 UART: RITY.KEYID = 7
2,957,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,610 UART: [art] PUB.X = C1A8AF0976050D6848C31AF8E15B3FF9846B984B410982DB613C7E3062F8DD330A42CE4DACBD36DAC1B08992C4D68817
2,965,373 UART: [art] PUB.Y = 811644F64EAC5344BAB912054EFC9894ACE4BB5B132827F865E92BADE166EC0348DD0607256BA367EBFD105BE1B934B1
2,972,321 UART: [art] SIG.R = FEE1E3F35DEC599B2137BEBA2FF06C6E07EAD60F7F5C7C79CBA12D3425ED072ECA8AE2E3B8B113C82388E6BB6F28568D
2,979,108 UART: [art] SIG.S = 4CB233CC2AA2738D389FCB4ED4EDD966EF1590538A2FE96C6D09B56EE58C8AE425AE14A0A691C3B5E193E70AB4EA4725
3,002,819 UART: Caliptra RT
3,003,072 UART: [state] CFI Enabled
3,110,441 UART: [rt] RT listening for mailbox commands...
3,111,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,575 UART: [rt]cmd =0x46504c54, len=4
3,141,864 >>> mbox cmd response data (8 bytes)
3,142,063 UART: [rt] FIPS self test
3,142,391 UART: [kat] ++
3,142,543 UART: [kat] sha1
3,146,921 UART: [kat] SHA2-256
3,148,943 UART: [kat] SHA2-384
3,151,836 UART: [kat] SHA2-512-ACC
3,153,763 UART: [kat] ECC-384
3,163,677 UART: Fatal Error: 0x90040003
3,165,227 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,232 >>> mbox cmd response: failed
3,165,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,970 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,174,794 ready_for_fw is high
1,174,794 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,225 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46574c44
1,283,587 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,911 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,191 >>> mbox cmd response: success
2,787,436 UART: [afmc] ++
2,787,604 UART: [afmc] CDI.KEYID = 6
2,787,967 UART: [afmc] SUBJECT.KEYID = 7
2,788,393 UART: [afmc] AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,489 UART: [afmc] --
2,867,429 UART: [cold-reset] --
2,868,231 UART: [state] Locking Datavault
2,869,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,110 UART: [state] Locking ICCM
2,870,728 UART: [exit] Launching FMC @ 0x40000130
2,876,057 UART:
2,876,073 UART: Running Caliptra FMC ...
2,876,481 UART:
2,876,624 UART: [state] CFI Enabled
2,887,219 UART: [fht] FMC Alias Private Key: 7
2,994,598 UART: [art] Extend RT PCRs Done
2,995,026 UART: [art] Lock RT PCRs Done
2,996,904 UART: [art] Populate DV Done
3,005,075 UART: [fht] FMC Alias Private Key: 7
3,006,219 UART: [art] Derive CDI
3,006,499 UART: [art] Store in in slot 0x4
3,092,304 UART: [art] Derive Key Pair
3,092,664 UART: [art] Store priv key in slot 0x5
3,105,962 UART: [art] Derive Key Pair - Done
3,120,765 UART: [art] Signing Cert with AUTHO
3,121,245 UART: RITY.KEYID = 7
3,136,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,506 UART: [art] PUB.X = 971D73C54FDAEC81F7E7B20A3D984A03B38E8396DA97CED2E62A6139677DD906BB0BED6D6662150E5455A033BF13C65D
3,144,271 UART: [art] PUB.Y = F8AF2D65C88177B51B4A4277B5AB97B5D6A4C7294D5487EFA027193F785E30A8BA1454F4C8383774C2C4A64FC626C509
3,151,220 UART: [art] SIG.R = C4435846E3B18EA3F0976E108699F3E56D3459A8E7E4FFE89AF06AADBB2F9E4FF760E6922218BE9647FA377B40786874
3,157,994 UART: [art] SIG.S = B4879356CE947BD2E825C5B8B19EED88F9C1DB93EF742EA25653CE58EB9FE36AFFE3410DF5D3E45A901A0FAE4036EB37
3,181,241 UART: Caliptra RT
3,181,586 UART: [state] CFI Enabled
3,288,972 UART: [rt] RT listening for mailbox commands...
3,289,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,420 UART: [rt]cmd =0x46504c54, len=4
3,320,561 >>> mbox cmd response data (8 bytes)
3,320,792 UART: [rt] FIPS self test
3,321,120 UART: [kat] ++
3,321,272 UART: [kat] sha1
3,325,658 UART: [kat] SHA2-256
3,327,680 UART: [kat] SHA2-384
3,330,405 UART: [kat] SHA2-512-ACC
3,332,332 UART: [kat] ECC-384
3,342,348 UART: Fatal Error: 0x90040003
3,343,898 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,903 >>> mbox cmd response: failed
3,343,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,747 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,281,868 UART: [fwproc] Recv command 0x46574c44
1,282,601 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,377 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,783 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,495 ready_for_fw is high
1,056,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,665 >>> mbox cmd response: success
2,698,377 UART:
2,698,393 UART: Running Caliptra FMC ...
2,698,801 UART:
2,698,944 UART: [state] CFI Enabled
2,709,509 UART: [fht] FMC Alias Private Key: 7
2,817,596 UART: [art] Extend RT PCRs Done
2,818,024 UART: [art] Lock RT PCRs Done
2,819,752 UART: [art] Populate DV Done
2,828,097 UART: [fht] FMC Alias Private Key: 7
2,829,267 UART: [art] Derive CDI
2,829,547 UART: [art] Store in in slot 0x4
2,915,400 UART: [art] Derive Key Pair
2,915,760 UART: [art] Store priv key in slot 0x5
2,928,948 UART: [art] Derive Key Pair - Done
2,943,872 UART: [art] Signing Cert with AUTHO
2,944,352 UART: RITY.KEYID = 7
2,959,904 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,669 UART: [art] PUB.X = 7B743DA49ADA265F5E6F5328D77E47BB36E314E64D23794A48BC1CC9DED0E47AC4D24E55B9F460D6300FF071C0E7371D
2,967,448 UART: [art] PUB.Y = 3C8539DAA53EDB57538511BCEDE5E880143724F8B166A03954973ABA4C85E796AA20C9F50CF7B6D5E4832927AE42FCC3
2,974,403 UART: [art] SIG.R = D64F7AF95BBAF2A592EFAF4107DE9F6E1D6B649E39231CC19048074F50D8E2EDD77C981F3A5DDDEBCA2144718D3CA19E
2,981,189 UART: [art] SIG.S = 8957D48AED4AEAD2BD8E8D5AED67DDAE14D4045E549484D7EAEFE96A99C9E4AEA4B02D55CD0A008B706149EE614CDFBB
3,005,008 UART: Caliptra RT
3,005,353 UART: [state] CFI Enabled
3,113,805 UART: [rt] RT listening for mailbox commands...
3,114,468 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,233 UART: [rt]cmd =0x46504c54, len=4
3,145,368 >>> mbox cmd response data (8 bytes)
3,145,709 UART: [rt] FIPS self test
3,146,037 UART: [kat] ++
3,146,189 UART: [kat] sha1
3,150,435 UART: [kat] SHA2-256
3,152,457 UART: [kat] SHA2-384
3,155,374 UART: [kat] SHA2-512-ACC
3,157,301 UART: [kat] ECC-384
3,167,519 UART: Fatal Error: 0x90040003
3,169,069 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,074 >>> mbox cmd response: failed
3,169,074 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,525 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,441 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
277,757 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
277,164 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
653,715 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
653,035 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
311,180 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
277,186 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,480 writing to cptra_bootfsm_go
652,426 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
653,475 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
311,048 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
310,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
653,929 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
653,584 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
5,986,323 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,130,565 >>> mbox cmd response: failed
6,131,131 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,274,466 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,869,009 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,427,793 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
5,980,402 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,124,598 >>> mbox cmd response: failed
6,125,155 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,269,012 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,858,188 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,433,560 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
6,305,172 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,449,270 >>> mbox cmd response: failed
6,449,827 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,593,195 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
18,450,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,893,821 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,300,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,444,987 >>> mbox cmd response: failed
6,445,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,589,634 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
18,451,129 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,894,586 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
5,178,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,323,685 >>> mbox cmd response: failed
5,324,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,467,953 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,453,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,016 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
5,171,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,315,895 >>> mbox cmd response: failed
5,316,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,460,735 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,463,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,250,167 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,288 writing to cptra_bootfsm_go
5,503,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,648,570 >>> mbox cmd response: failed
5,649,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,792,896 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,856,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,592,093 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
5,513,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,658,531 >>> mbox cmd response: failed
5,659,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,802,881 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,865,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,587,597 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
5,156,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,301,467 >>> mbox cmd response: failed
5,302,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,445,831 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,432,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,247,122 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
5,163,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,308,058 >>> mbox cmd response: failed
5,308,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,452,219 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,470,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,330,789 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
5,504,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,649,117 >>> mbox cmd response: failed
5,649,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,793,412 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,855,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,570,532 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
5,505,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,649,885 >>> mbox cmd response: failed
5,650,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,794,185 >>> mbox cmd response: failed
Initializing fuses
996 writing to cptra_bootfsm_go
17,867,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,581,697 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,043 >>> mbox cmd response: failed
823,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,104 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,107 >>> mbox cmd response: failed
824,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,368 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,024 >>> mbox cmd response: failed
824,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,127 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,622 >>> mbox cmd response: failed
824,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,953 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,159 >>> mbox cmd response: failed
823,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,306 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,141 >>> mbox cmd response: failed
824,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,196 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,140 >>> mbox cmd response: failed
824,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,615 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,434 >>> mbox cmd response: failed
824,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,005 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,759 >>> mbox cmd response: failed
823,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,244 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,671 >>> mbox cmd response: failed
823,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,360 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,654 >>> mbox cmd response: failed
823,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,374 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,946 >>> mbox cmd response: failed
823,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,169 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,114 UART:
192,479 UART: Running Caliptra ROM ...
193,576 UART:
193,721 UART: [state] CFI Enabled
264,470 UART: [state] LifecycleState = Unprovisioned
266,467 UART: [state] DebugLocked = No
269,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,925 UART: [kat] SHA2-256
443,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,118 UART: [kat] ++
454,573 UART: [kat] sha1
466,965 UART: [kat] SHA2-256
469,665 UART: [kat] SHA2-384
475,460 UART: [kat] SHA2-512-ACC
477,770 UART: [kat] ECC-384
2,768,261 UART: [kat] HMAC-384Kdf
2,801,846 UART: [kat] LMS
3,992,202 UART: [kat] --
3,995,659 UART: [cold-reset] ++
3,998,236 UART: [fht] Storing FHT @ 0x50003400
4,010,003 UART: [idev] ++
4,010,575 UART: [idev] CDI.KEYID = 6
4,011,466 UART: [idev] SUBJECT.KEYID = 7
4,012,714 UART: [idev] UDS.KEYID = 0
4,013,681 ready_for_fw is high
4,013,913 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,672 UART: [idev] Erasing UDS.KEYID = 0
7,353,258 UART: [idev] Using Sha1 for KeyId Algorithm
7,375,729 UART: [idev] --
7,380,592 UART: [ldev] ++
7,381,164 UART: [ldev] CDI.KEYID = 6
7,382,180 UART: [ldev] SUBJECT.KEYID = 5
7,383,339 UART: [ldev] AUTHORITY.KEYID = 7
7,384,566 UART: [ldev] FE.KEYID = 1
7,424,681 UART: [ldev] Erasing FE.KEYID = 1
10,760,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,558 UART: [ldev] --
13,139,710 UART: [fwproc] Waiting for Commands...
13,142,344 UART: [fwproc] Received command 0x46574c44
13,144,552 UART: [fwproc] Received Image of size 114996 bytes
17,208,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,352,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,673,438 >>> mbox cmd response: success
17,677,691 UART: [afmc] ++
17,678,284 UART: [afmc] CDI.KEYID = 6
17,679,194 UART: [afmc] SUBJECT.KEYID = 7
17,680,462 UART: [afmc] AUTHORITY.KEYID = 5
21,054,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,317 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,577 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,367,950 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,382,803 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,397,271 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,420,091 UART: [afmc] --
23,424,553 UART: [cold-reset] --
23,428,480 UART: [state] Locking Datavault
23,433,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,484 UART: [state] Locking ICCM
23,437,446 UART: [exit] Launching FMC @ 0x40000130
23,445,843 UART:
23,446,082 UART: Running Caliptra FMC ...
23,447,187 UART:
23,447,341 UART: [state] CFI Enabled
23,510,137 UART: [fht] FMC Alias Private Key: 7
25,848,012 UART: [art] Extend RT PCRs Done
25,849,236 UART: [art] Lock RT PCRs Done
25,850,992 UART: [art] Populate DV Done
25,856,299 UART: [fht] FMC Alias Private Key: 7
25,857,892 UART: [art] Derive CDI
25,858,707 UART: [art] Store in in slot 0x4
25,918,351 UART: [art] Derive Key Pair
25,919,412 UART: [art] Store priv key in slot 0x5
29,212,501 UART: [art] Derive Key Pair - Done
29,225,331 UART: [art] Signing Cert with AUTHO
29,226,624 UART: RITY.KEYID = 7
31,513,806 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,598 UART: [art] PUB.X = 1AB767B2CC4A82730D4BEA0F3274C1C0002DECF26199F6FFCBCF1E2AF9559EF1D25A10B1A6251CB9497B8B6387EA61E0
31,522,540 UART: [art] PUB.Y = 16E33909F3354D6408875A61B05FE00BFBDE2198DB442B7E6A53FC1250E4029B8674F4DBE9D1545F9EFB0785D2E574FE
31,529,836 UART: [art] SIG.R = 96B7F86FD686151C7F01C1BAA8653A1D0C017F041CE134136D606891CEA6B2B389C29CBC990701326713FD47D71B5F07
31,537,240 UART: [art] SIG.S = 780FBEE755FA9DA247289C112F910DCB8D84394FB82F25C147D52345DDE7D84B2467ABE6FA351E4B6D684B5C2D8A1270
32,842,209 UART: Caliptra RT
32,842,944 UART: [state] CFI Enabled
33,004,707 UART: [rt] RT listening for mailbox commands...
33,006,892 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,036,713 UART: [rt]cmd =0x46504c54, len=4
33,038,171 >>> mbox cmd response data (8 bytes)
33,039,359 UART: [rt] FIPS self test
33,040,318 UART: [kat] ++
33,040,773 UART: [kat] sha1
33,045,233 UART: [kat] SHA2-256
33,047,123 UART: [kat] SHA2-384
33,049,875 UART: [kat] SHA2-512-ACC
33,052,119 UART: [kat] ECC-384
36,320,895 UART: [kat] HMAC-384Kdf
36,322,076 UART: Fatal Error: 0x90030001
36,357,223 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,501,736 >>> mbox cmd response: failed
36,502,407 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,646,764 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
189,998 UART:
190,306 UART: Running Caliptra ROM ...
191,419 UART:
191,570 UART: [state] CFI Enabled
261,440 UART: [state] LifecycleState = Unprovisioned
263,354 UART: [state] DebugLocked = No
264,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,577 UART: [kat] SHA2-256
439,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,762 UART: [kat] ++
450,277 UART: [kat] sha1
461,417 UART: [kat] SHA2-256
464,082 UART: [kat] SHA2-384
469,753 UART: [kat] SHA2-512-ACC
472,149 UART: [kat] ECC-384
2,767,904 UART: [kat] HMAC-384Kdf
2,799,518 UART: [kat] LMS
3,989,844 UART: [kat] --
3,992,449 UART: [cold-reset] ++
3,994,493 UART: [fht] Storing FHT @ 0x50003400
4,005,112 UART: [idev] ++
4,005,681 UART: [idev] CDI.KEYID = 6
4,006,709 UART: [idev] SUBJECT.KEYID = 7
4,007,873 UART: [idev] UDS.KEYID = 0
4,009,533 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,154,112 UART: [idev] Erasing UDS.KEYID = 0
7,347,278 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,010 UART: [idev] --
7,372,919 UART: [ldev] ++
7,373,547 UART: [ldev] CDI.KEYID = 6
7,374,473 UART: [ldev] SUBJECT.KEYID = 5
7,375,686 UART: [ldev] AUTHORITY.KEYID = 7
7,376,977 UART: [ldev] FE.KEYID = 1
7,422,599 UART: [ldev] Erasing FE.KEYID = 1
10,753,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,907 UART: [ldev] --
13,119,422 UART: [fwproc] Waiting for Commands...
13,121,358 UART: [fwproc] Received command 0x46574c44
13,123,546 UART: [fwproc] Received Image of size 114996 bytes
17,179,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,643,065 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,784,487 ready_for_fw is high
3,785,076 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,892,117 >>> mbox cmd response: success
23,589,965 UART:
23,590,364 UART: Running Caliptra FMC ...
23,591,481 UART:
23,591,641 UART: [state] CFI Enabled
23,659,257 UART: [fht] FMC Alias Private Key: 7
25,997,495 UART: [art] Extend RT PCRs Done
25,998,725 UART: [art] Lock RT PCRs Done
26,000,199 UART: [art] Populate DV Done
26,005,413 UART: [fht] FMC Alias Private Key: 7
26,007,019 UART: [art] Derive CDI
26,007,845 UART: [art] Store in in slot 0x4
26,068,275 UART: [art] Derive Key Pair
26,069,329 UART: [art] Store priv key in slot 0x5
29,362,235 UART: [art] Derive Key Pair - Done
29,375,447 UART: [art] Signing Cert with AUTHO
29,376,760 UART: RITY.KEYID = 7
31,664,245 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,756 UART: [art] PUB.X = C7162700432AD4A4170A146FC6BCA1F519A017685682971B52AF8858528A3A79C293E17F1010A0111E1F0D7D493D9A67
31,672,952 UART: [art] PUB.Y = C46823BCDD10995C0685EA936CC4F60C580D75CE1C52682543E8D222030DC3034AFD87254D13EF571377ED11D960AD78
31,680,187 UART: [art] SIG.R = 47B42DD0889E83AAD84C5FEBDEAC42DE92928316D8374022F990A99868392D609E39BAA0854B255077784922B129EA83
31,687,553 UART: [art] SIG.S = 14268230789328C60083097D7A9207681DA383E5AD9EA30E234BCBBF41AADD9579BE3CE9DEB0B6697B1164620F5917A1
32,992,902 UART: Caliptra RT
32,993,618 UART: [state] CFI Enabled
33,162,188 UART: [rt] RT listening for mailbox commands...
33,164,047 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,193,838 UART: [rt]cmd =0x46504c54, len=4
33,195,448 >>> mbox cmd response data (8 bytes)
33,196,532 UART: [rt] FIPS self test
33,197,485 UART: [kat] ++
33,197,931 UART: [kat] sha1
33,202,546 UART: [kat] SHA2-256
33,204,474 UART: [kat] SHA2-384
33,207,383 UART: [kat] SHA2-512-ACC
33,209,639 UART: [kat] ECC-384
36,477,180 UART: [kat] HMAC-384Kdf
36,478,499 UART: Fatal Error: 0x90030001
36,513,645 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,658,052 >>> mbox cmd response: failed
36,658,690 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,803,074 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,805,208 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,874,272 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,316 UART:
192,692 UART: Running Caliptra ROM ...
193,874 UART:
603,453 UART: [state] CFI Enabled
617,824 UART: [state] LifecycleState = Unprovisioned
619,723 UART: [state] DebugLocked = No
622,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,346 UART: [kat] SHA2-256
798,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,628 UART: [kat] ++
809,081 UART: [kat] sha1
820,035 UART: [kat] SHA2-256
822,760 UART: [kat] SHA2-384
828,963 UART: [kat] SHA2-512-ACC
831,332 UART: [kat] ECC-384
3,115,375 UART: [kat] HMAC-384Kdf
3,127,270 UART: [kat] LMS
4,317,388 UART: [kat] --
4,321,065 UART: [cold-reset] ++
4,322,793 UART: [fht] Storing FHT @ 0x50003400
4,334,801 UART: [idev] ++
4,335,431 UART: [idev] CDI.KEYID = 6
4,336,354 UART: [idev] SUBJECT.KEYID = 7
4,337,606 UART: [idev] UDS.KEYID = 0
4,338,557 ready_for_fw is high
4,338,771 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,073 UART: [idev] Erasing UDS.KEYID = 0
7,620,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,629 UART: [idev] --
7,647,558 UART: [ldev] ++
7,648,130 UART: [ldev] CDI.KEYID = 6
7,649,110 UART: [ldev] SUBJECT.KEYID = 5
7,650,274 UART: [ldev] AUTHORITY.KEYID = 7
7,651,563 UART: [ldev] FE.KEYID = 1
7,662,812 UART: [ldev] Erasing FE.KEYID = 1
10,950,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,080 UART: [ldev] --
13,309,833 UART: [fwproc] Waiting for Commands...
13,311,993 UART: [fwproc] Received command 0x46574c44
13,314,184 UART: [fwproc] Received Image of size 114996 bytes
17,378,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,840,757 >>> mbox cmd response: success
17,844,654 UART: [afmc] ++
17,845,243 UART: [afmc] CDI.KEYID = 6
17,846,159 UART: [afmc] SUBJECT.KEYID = 7
17,847,374 UART: [afmc] AUTHORITY.KEYID = 5
21,159,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,458 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,716 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,092 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,956 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,370 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,945 UART: [afmc] --
23,524,003 UART: [cold-reset] --
23,528,366 UART: [state] Locking Datavault
23,535,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,525 UART: [state] Locking ICCM
23,540,104 UART: [exit] Launching FMC @ 0x40000130
23,548,509 UART:
23,548,745 UART: Running Caliptra FMC ...
23,549,851 UART:
23,550,014 UART: [state] CFI Enabled
23,557,741 UART: [fht] FMC Alias Private Key: 7
25,888,413 UART: [art] Extend RT PCRs Done
25,889,640 UART: [art] Lock RT PCRs Done
25,891,104 UART: [art] Populate DV Done
25,896,568 UART: [fht] FMC Alias Private Key: 7
25,898,157 UART: [art] Derive CDI
25,898,971 UART: [art] Store in in slot 0x4
25,941,465 UART: [art] Derive Key Pair
25,942,506 UART: [art] Store priv key in slot 0x5
29,184,725 UART: [art] Derive Key Pair - Done
29,197,962 UART: [art] Signing Cert with AUTHO
29,199,273 UART: RITY.KEYID = 7
31,478,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,224 UART: [art] PUB.X = 5086CCA1EFA16E5F13B34C325D36FA6D85C874675C65214DFDE045E9628108CA1BD62985E2DDE0EF18BE799D33D4579D
31,487,496 UART: [art] PUB.Y = 933E0F72D67B38E9482450FE9452ABDEE915F00275AD32BB814F4BDB1E28C65A2602161710CDBD65297B52F535836D01
31,494,739 UART: [art] SIG.R = D9EC307FDDB88C15DDC918A71E8A835CC5DE0B33835682647C4CCAA8C10CFC953ADA25ACB7A520071377C0405D89FA8B
31,502,138 UART: [art] SIG.S = 5E6D3FC3DB9271B3C33D2E8E50E860C7175310845033C6621EE62580CF510553D439752CA1B5367ECAF52090E4C921F3
32,806,663 UART: Caliptra RT
32,807,374 UART: [state] CFI Enabled
32,925,966 UART: [rt] RT listening for mailbox commands...
32,927,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,607 UART: [rt]cmd =0x46504c54, len=4
32,959,186 >>> mbox cmd response data (8 bytes)
32,959,985 UART: [rt] FIPS self test
32,960,867 UART: [kat] ++
32,961,315 UART: [kat] sha1
32,965,870 UART: [kat] SHA2-256
32,967,819 UART: [kat] SHA2-384
32,971,002 UART: [kat] SHA2-512-ACC
32,973,258 UART: [kat] ECC-384
36,215,783 UART: [kat] HMAC-384Kdf
36,217,047 UART: Fatal Error: 0x90030001
36,252,357 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,396,675 >>> mbox cmd response: failed
36,397,273 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,541,611 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,125 UART:
190,432 UART: Running Caliptra ROM ...
191,460 UART:
3,997,744 UART: [state] CFI Enabled
4,013,028 UART: [state] LifecycleState = Unprovisioned
4,014,998 UART: [state] DebugLocked = No
4,017,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,021,751 UART: [kat] SHA2-256
4,191,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,202,030 UART: [kat] ++
4,202,495 UART: [kat] sha1
4,213,078 UART: [kat] SHA2-256
4,215,781 UART: [kat] SHA2-384
4,221,773 UART: [kat] SHA2-512-ACC
4,224,125 UART: [kat] ECC-384
6,510,276 UART: [kat] HMAC-384Kdf
6,522,239 UART: [kat] LMS
7,712,307 UART: [kat] --
7,717,504 UART: [cold-reset] ++
7,719,762 UART: [fht] Storing FHT @ 0x50003400
7,731,079 UART: [idev] ++
7,731,648 UART: [idev] CDI.KEYID = 6
7,732,534 UART: [idev] SUBJECT.KEYID = 7
7,733,799 UART: [idev] UDS.KEYID = 0
7,735,365 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,879,818 UART: [idev] Erasing UDS.KEYID = 0
11,020,777 UART: [idev] Using Sha1 for KeyId Algorithm
11,043,515 UART: [idev] --
11,047,737 UART: [ldev] ++
11,048,304 UART: [ldev] CDI.KEYID = 6
11,049,248 UART: [ldev] SUBJECT.KEYID = 5
11,050,462 UART: [ldev] AUTHORITY.KEYID = 7
11,051,675 UART: [ldev] FE.KEYID = 1
11,063,696 UART: [ldev] Erasing FE.KEYID = 1
14,347,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,642,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,656,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,671,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,686,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,705,255 UART: [ldev] --
16,709,767 UART: [fwproc] Waiting for Commands...
16,712,134 UART: [fwproc] Received command 0x46574c44
16,714,318 UART: [fwproc] Received Image of size 114996 bytes
20,779,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,854,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,923,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,244,741 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,127,152 ready_for_fw is high
4,127,792 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,090,405 >>> mbox cmd response: success
23,725,952 UART:
23,726,415 UART: Running Caliptra FMC ...
23,727,535 UART:
23,727,688 UART: [state] CFI Enabled
23,735,469 UART: [fht] FMC Alias Private Key: 7
26,065,829 UART: [art] Extend RT PCRs Done
26,067,061 UART: [art] Lock RT PCRs Done
26,068,259 UART: [art] Populate DV Done
26,073,691 UART: [fht] FMC Alias Private Key: 7
26,075,192 UART: [art] Derive CDI
26,075,958 UART: [art] Store in in slot 0x4
26,118,669 UART: [art] Derive Key Pair
26,119,672 UART: [art] Store priv key in slot 0x5
29,361,753 UART: [art] Derive Key Pair - Done
29,374,541 UART: [art] Signing Cert with AUTHO
29,375,853 UART: RITY.KEYID = 7
31,655,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,747 UART: [art] PUB.X = 1F78E67C90C500C1AFB65865A3C6A5B2581EFE5A44F506FB5508B4A94AAF3D98B791E7259D2D1FF344396DB250E480BB
31,664,009 UART: [art] PUB.Y = 65BA478D9ECFBC91985C3EEF7B144D828194F4723EA84FEC67B6F491E796BF42717794C0B75A3DD7A4149C95395CA483
31,671,212 UART: [art] SIG.R = 21A8829B1DC46FC475B7E9976481B0C7581290F579D6E3B037D01626DFE57328EBBB710CBFB561DC869F8757C94B1AB1
31,678,617 UART: [art] SIG.S = 2AD1372CBBBF907F5C8FF25C63C0198E58696BE487192475837FC8F64EEB8129387111D1D238AB669A83AC9B20E5C746
32,983,616 UART: Caliptra RT
32,984,327 UART: [state] CFI Enabled
33,100,494 UART: [rt] RT listening for mailbox commands...
33,102,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,131,924 UART: [rt]cmd =0x46504c54, len=4
33,133,503 >>> mbox cmd response data (8 bytes)
33,134,726 UART: [rt] FIPS self test
33,135,669 UART: [kat] ++
33,136,121 UART: [kat] sha1
33,140,416 UART: [kat] SHA2-256
33,142,397 UART: [kat] SHA2-384
33,145,304 UART: [kat] SHA2-512-ACC
33,147,519 UART: [kat] ECC-384
36,390,209 UART: [kat] HMAC-384Kdf
36,391,803 UART: Fatal Error: 0x90030001
36,427,034 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,571,508 >>> mbox cmd response: failed
36,572,206 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,716,623 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
7,339,911 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,295,781 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,356 UART:
192,719 UART: Running Caliptra ROM ...
193,829 UART:
193,971 UART: [state] CFI Enabled
263,026 UART: [state] LifecycleState = Unprovisioned
264,959 UART: [state] DebugLocked = No
266,200 UART: [state] WD Timer not started. Device not locked for debugging
269,372 UART: [kat] SHA2-256
448,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,062 UART: [kat] ++
460,519 UART: [kat] sha1
470,899 UART: [kat] SHA2-256
473,908 UART: [kat] SHA2-384
480,754 UART: [kat] SHA2-512-ACC
483,705 UART: [kat] ECC-384
2,947,826 UART: [kat] HMAC-384Kdf
2,969,594 UART: [kat] LMS
3,499,074 UART: [kat] --
3,502,795 UART: [cold-reset] ++
3,504,943 UART: [fht] FHT @ 0x50003400
3,515,287 UART: [idev] ++
3,515,875 UART: [idev] CDI.KEYID = 6
3,516,805 UART: [idev] SUBJECT.KEYID = 7
3,517,990 UART: [idev] UDS.KEYID = 0
3,518,915 ready_for_fw is high
3,519,106 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,664,164 UART: [idev] Erasing UDS.KEYID = 0
6,023,250 UART: [idev] Sha1 KeyId Algorithm
6,047,083 UART: [idev] --
6,051,573 UART: [ldev] ++
6,052,150 UART: [ldev] CDI.KEYID = 6
6,053,034 UART: [ldev] SUBJECT.KEYID = 5
6,054,252 UART: [ldev] AUTHORITY.KEYID = 7
6,055,485 UART: [ldev] FE.KEYID = 1
6,100,274 UART: [ldev] Erasing FE.KEYID = 1
8,601,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,430 UART: [ldev] --
10,412,153 UART: [fwproc] Wait for Commands...
10,415,058 UART: [fwproc] Recv command 0x46574c44
10,417,162 UART: [fwproc] Recv'd Img size: 115304 bytes
13,834,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,191 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,296,898 >>> mbox cmd response: success
14,300,848 UART: [afmc] ++
14,301,474 UART: [afmc] CDI.KEYID = 6
14,302,391 UART: [afmc] SUBJECT.KEYID = 7
14,303,556 UART: [afmc] AUTHORITY.KEYID = 5
16,826,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,153 UART: [afmc] --
18,626,309 UART: [cold-reset] --
18,631,043 UART: [state] Locking Datavault
18,637,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,132 UART: [state] Locking ICCM
18,640,792 UART: [exit] Launching FMC @ 0x40000130
18,649,201 UART:
18,649,438 UART: Running Caliptra FMC ...
18,650,542 UART:
18,650,705 UART: [state] CFI Enabled
18,709,142 UART: [fht] FMC Alias Private Key: 7
20,472,959 UART: [art] Extend RT PCRs Done
20,474,184 UART: [art] Lock RT PCRs Done
20,476,132 UART: [art] Populate DV Done
20,481,542 UART: [fht] FMC Alias Private Key: 7
20,483,028 UART: [art] Derive CDI
20,483,794 UART: [art] Store in in slot 0x4
20,541,109 UART: [art] Derive Key Pair
20,542,147 UART: [art] Store priv key in slot 0x5
23,004,722 UART: [art] Derive Key Pair - Done
23,017,996 UART: [art] Signing Cert with AUTHO
23,019,487 UART: RITY.KEYID = 7
24,730,501 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,004 UART: [art] PUB.X = 1EE4B87A048D3F4D9346D6C2170C753D09B20F120B286DFFD0B5A5E87EF8239E655E301930C729875FD1110FAE04AAE6
24,739,267 UART: [art] PUB.Y = FBE24BC4810C0FED70343D945AB93810695210062C1A343E216133ED28396ECD242F4E852BCA80F8B40911943698E5F8
24,746,519 UART: [art] SIG.R = ECF23518A1ABD5A71FB45E646D0BECD4F92E716C4874AF600E29AB9D54B32918DBB9A0D7A03A638A5139492AA2E8CD71
24,753,926 UART: [art] SIG.S = 7181494964082F21EB8B33685D6DB21E919E7357C29CF01C008BCA3CE54EC99890B781A56B8B06831E2E0907069D4842
25,733,384 UART: Caliptra RT
25,734,089 UART: [state] CFI Enabled
25,897,692 UART: [rt] RT listening for mailbox commands...
25,899,675 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,929,190 UART: [rt]cmd =0x46504c54, len=4
25,930,827 >>> mbox cmd response data (8 bytes)
25,931,891 UART: [rt] FIPS self test
25,932,834 UART: [kat] ++
25,933,287 UART: [kat] sha1
25,937,739 UART: [kat] SHA2-256
25,939,670 UART: [kat] SHA2-384
25,942,625 UART: [kat] SHA2-512-ACC
25,944,866 UART: [kat] ECC-384
28,383,133 UART: [kat] HMAC-384Kdf
28,384,287 UART: Fatal Error: 0x90030001
28,419,518 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,564,421 >>> mbox cmd response: failed
28,565,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,710,161 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,123 UART:
190,434 UART: Running Caliptra ROM ...
191,548 UART:
191,695 UART: [state] CFI Enabled
263,804 UART: [state] LifecycleState = Unprovisioned
265,661 UART: [state] DebugLocked = No
268,362 UART: [state] WD Timer not started. Device not locked for debugging
272,260 UART: [kat] SHA2-256
451,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,978 UART: [kat] ++
463,424 UART: [kat] sha1
474,693 UART: [kat] SHA2-256
477,736 UART: [kat] SHA2-384
482,746 UART: [kat] SHA2-512-ACC
485,693 UART: [kat] ECC-384
2,947,657 UART: [kat] HMAC-384Kdf
2,970,795 UART: [kat] LMS
3,500,249 UART: [kat] --
3,503,323 UART: [cold-reset] ++
3,504,878 UART: [fht] FHT @ 0x50003400
3,516,400 UART: [idev] ++
3,517,007 UART: [idev] CDI.KEYID = 6
3,517,926 UART: [idev] SUBJECT.KEYID = 7
3,519,093 UART: [idev] UDS.KEYID = 0
3,520,604 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,665,408 UART: [idev] Erasing UDS.KEYID = 0
6,027,411 UART: [idev] Sha1 KeyId Algorithm
6,050,399 UART: [idev] --
6,055,003 UART: [ldev] ++
6,055,583 UART: [ldev] CDI.KEYID = 6
6,056,494 UART: [ldev] SUBJECT.KEYID = 5
6,057,660 UART: [ldev] AUTHORITY.KEYID = 7
6,058,893 UART: [ldev] FE.KEYID = 1
6,099,310 UART: [ldev] Erasing FE.KEYID = 1
8,603,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,719 UART: [ldev] --
10,413,232 UART: [fwproc] Wait for Commands...
10,416,033 UART: [fwproc] Recv command 0x46574c44
10,418,079 UART: [fwproc] Recv'd Img size: 115304 bytes
13,828,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,929 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,688 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,363,679 ready_for_fw is high
3,364,100 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,094,491 >>> mbox cmd response: success
18,392,354 UART:
18,392,746 UART: Running Caliptra FMC ...
18,394,091 UART:
18,394,263 UART: [state] CFI Enabled
18,457,212 UART: [fht] FMC Alias Private Key: 7
20,221,337 UART: [art] Extend RT PCRs Done
20,222,560 UART: [art] Lock RT PCRs Done
20,224,179 UART: [art] Populate DV Done
20,229,785 UART: [fht] FMC Alias Private Key: 7
20,231,377 UART: [art] Derive CDI
20,232,194 UART: [art] Store in in slot 0x4
20,282,189 UART: [art] Derive Key Pair
20,283,208 UART: [art] Store priv key in slot 0x5
22,746,165 UART: [art] Derive Key Pair - Done
22,759,120 UART: [art] Signing Cert with AUTHO
22,760,434 UART: RITY.KEYID = 7
24,471,901 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,533 UART: [art] PUB.X = 805144879776FF6643531A7497D2CB62616C5898903A5D428EE0F53AC63599E5D9F755A542FAC36C4BAC070221CEC821
24,480,686 UART: [art] PUB.Y = 703B60FE71ED0607B1029AF2B99A55E03BC05EC78CFE270E8EEDAE41DE741E1AC78930A2D92D5BF6F5228368D788283A
24,487,944 UART: [art] SIG.R = F5BC6058B9CD0BF791C1B65AE17789B7D015CE49E929386A9A977E0753BDBEFE27BB992462A1FBCC2262E703090CA45D
24,495,346 UART: [art] SIG.S = B68097593EC242ED419873075B3828448EDDBB48C8335B54A1122972756D3FE96A58F69AFED416D11F109D28F6E46BDE
25,474,589 UART: Caliptra RT
25,475,302 UART: [state] CFI Enabled
25,640,809 UART: [rt] RT listening for mailbox commands...
25,642,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,672,288 UART: [rt]cmd =0x46504c54, len=4
25,673,795 >>> mbox cmd response data (8 bytes)
25,675,026 UART: [rt] FIPS self test
25,675,972 UART: [kat] ++
25,676,423 UART: [kat] sha1
25,680,931 UART: [kat] SHA2-256
25,682,805 UART: [kat] SHA2-384
25,685,870 UART: [kat] SHA2-512-ACC
25,688,133 UART: [kat] ECC-384
28,125,974 UART: [kat] HMAC-384Kdf
28,127,681 UART: Fatal Error: 0x90030001
28,162,984 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,307,673 >>> mbox cmd response: failed
28,308,286 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,453,079 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,381,285 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,100,984 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,530 UART:
192,918 UART: Running Caliptra ROM ...
194,079 UART:
603,581 UART: [state] CFI Enabled
618,105 UART: [state] LifecycleState = Unprovisioned
619,921 UART: [state] DebugLocked = No
621,673 UART: [state] WD Timer not started. Device not locked for debugging
625,134 UART: [kat] SHA2-256
804,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,819 UART: [kat] ++
816,293 UART: [kat] sha1
826,060 UART: [kat] SHA2-256
829,080 UART: [kat] SHA2-384
833,945 UART: [kat] SHA2-512-ACC
836,880 UART: [kat] ECC-384
3,276,411 UART: [kat] HMAC-384Kdf
3,288,626 UART: [kat] LMS
3,818,128 UART: [kat] --
3,822,771 UART: [cold-reset] ++
3,824,715 UART: [fht] FHT @ 0x50003400
3,836,339 UART: [idev] ++
3,836,908 UART: [idev] CDI.KEYID = 6
3,837,791 UART: [idev] SUBJECT.KEYID = 7
3,839,035 UART: [idev] UDS.KEYID = 0
3,839,945 ready_for_fw is high
3,840,176 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,985,148 UART: [idev] Erasing UDS.KEYID = 0
6,308,404 UART: [idev] Sha1 KeyId Algorithm
6,330,613 UART: [idev] --
6,334,065 UART: [ldev] ++
6,334,644 UART: [ldev] CDI.KEYID = 6
6,335,711 UART: [ldev] SUBJECT.KEYID = 5
6,336,843 UART: [ldev] AUTHORITY.KEYID = 7
6,337,943 UART: [ldev] FE.KEYID = 1
6,347,802 UART: [ldev] Erasing FE.KEYID = 1
8,821,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,200 UART: [ldev] --
10,612,087 UART: [fwproc] Wait for Commands...
10,614,355 UART: [fwproc] Recv command 0x46574c44
10,616,452 UART: [fwproc] Recv'd Img size: 115304 bytes
14,032,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,794 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,500,373 >>> mbox cmd response: success
14,505,419 UART: [afmc] ++
14,506,005 UART: [afmc] CDI.KEYID = 6
14,506,923 UART: [afmc] SUBJECT.KEYID = 7
14,508,103 UART: [afmc] AUTHORITY.KEYID = 5
17,007,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,760 UART: [afmc] --
18,802,921 UART: [cold-reset] --
18,806,405 UART: [state] Locking Datavault
18,811,326 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,031 UART: [state] Locking ICCM
18,814,833 UART: [exit] Launching FMC @ 0x40000130
18,823,271 UART:
18,823,517 UART: Running Caliptra FMC ...
18,824,547 UART:
18,824,713 UART: [state] CFI Enabled
18,832,929 UART: [fht] FMC Alias Private Key: 7
20,589,490 UART: [art] Extend RT PCRs Done
20,590,702 UART: [art] Lock RT PCRs Done
20,592,164 UART: [art] Populate DV Done
20,597,524 UART: [fht] FMC Alias Private Key: 7
20,599,172 UART: [art] Derive CDI
20,599,988 UART: [art] Store in in slot 0x4
20,642,534 UART: [art] Derive Key Pair
20,643,530 UART: [art] Store priv key in slot 0x5
23,070,389 UART: [art] Derive Key Pair - Done
23,083,561 UART: [art] Signing Cert with AUTHO
23,084,872 UART: RITY.KEYID = 7
24,790,243 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,746 UART: [art] PUB.X = 63B34CCA160C318F84A7C3462D826A3660F0E2F29EB9D0850ED253BBED993B93C31884C77970CAE35603612B57EE45B8
24,799,002 UART: [art] PUB.Y = BD992A0EE26146305CBBDA3BDB9B936FC80AF336E154D6BFB21DB8F763866DCDF5263F5A15BD7394C3386CD9058ADDAB
24,806,316 UART: [art] SIG.R = 59E0EFFDA5A8B81C4D9745123E4ECE6FBF7812671DEFFA94F412E98241C8C16BAAA83C7973C88C054C760ADC757074AD
24,813,724 UART: [art] SIG.S = 168969DD34A981826E160D8532CA7A28380034225B17F0DD16467F02022706E721F23FF4052F1CFFF789598E99B8DA5C
25,792,628 UART: Caliptra RT
25,793,320 UART: [state] CFI Enabled
25,911,299 UART: [rt] RT listening for mailbox commands...
25,913,171 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,942,807 UART: [rt]cmd =0x46504c54, len=4
25,944,421 >>> mbox cmd response data (8 bytes)
25,945,544 UART: [rt] FIPS self test
25,946,496 UART: [kat] ++
25,946,948 UART: [kat] sha1
25,951,488 UART: [kat] SHA2-256
25,953,422 UART: [kat] SHA2-384
25,956,382 UART: [kat] SHA2-512-ACC
25,958,618 UART: [kat] ECC-384
28,386,006 UART: [kat] HMAC-384Kdf
28,387,683 UART: Fatal Error: 0x90030001
28,423,078 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,567,767 >>> mbox cmd response: failed
28,568,399 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,713,116 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,090 UART:
190,385 UART: Running Caliptra ROM ...
191,498 UART:
11,820,707 UART: [state] CFI Enabled
11,833,633 UART: [state] LifecycleState = Unprovisioned
11,835,494 UART: [state] DebugLocked = No
11,836,781 UART: [state] WD Timer not started. Device not locked for debugging
11,840,470 UART: [kat] SHA2-256
12,019,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,031,203 UART: [kat] ++
12,031,762 UART: [kat] sha1
12,043,149 UART: [kat] SHA2-256
12,046,167 UART: [kat] SHA2-384
12,052,315 UART: [kat] SHA2-512-ACC
12,055,313 UART: [kat] ECC-384
14,493,911 UART: [kat] HMAC-384Kdf
14,505,118 UART: [kat] LMS
15,034,628 UART: [kat] --
15,038,451 UART: [cold-reset] ++
15,040,764 UART: [fht] FHT @ 0x50003400
15,051,097 UART: [idev] ++
15,051,663 UART: [idev] CDI.KEYID = 6
15,052,578 UART: [idev] SUBJECT.KEYID = 7
15,053,793 UART: [idev] UDS.KEYID = 0
15,055,360 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,200,166 UART: [idev] Erasing UDS.KEYID = 0
17,525,325 UART: [idev] Sha1 KeyId Algorithm
17,548,502 UART: [idev] --
17,551,876 UART: [ldev] ++
17,552,449 UART: [ldev] CDI.KEYID = 6
17,553,331 UART: [ldev] SUBJECT.KEYID = 5
17,554,542 UART: [ldev] AUTHORITY.KEYID = 7
17,555,828 UART: [ldev] FE.KEYID = 1
17,565,985 UART: [ldev] Erasing FE.KEYID = 1
20,036,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,753,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,769,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,785,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,801,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,822,340 UART: [ldev] --
21,826,522 UART: [fwproc] Wait for Commands...
21,828,854 UART: [fwproc] Recv command 0x46574c44
21,830,952 UART: [fwproc] Recv'd Img size: 115304 bytes
25,248,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,316,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,385,577 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,706,383 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
3,694,238 ready_for_fw is high
3,694,647 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,289,494 >>> mbox cmd response: success
18,544,345 UART:
18,544,760 UART: Running Caliptra FMC ...
18,545,879 UART:
18,546,059 UART: [state] CFI Enabled
18,554,164 UART: [fht] FMC Alias Private Key: 7
20,310,851 UART: [art] Extend RT PCRs Done
20,312,076 UART: [art] Lock RT PCRs Done
20,313,509 UART: [art] Populate DV Done
20,318,745 UART: [fht] FMC Alias Private Key: 7
20,320,287 UART: [art] Derive CDI
20,321,059 UART: [art] Store in in slot 0x4
20,364,467 UART: [art] Derive Key Pair
20,365,475 UART: [art] Store priv key in slot 0x5
22,791,854 UART: [art] Derive Key Pair - Done
22,804,854 UART: [art] Signing Cert with AUTHO
22,806,162 UART: RITY.KEYID = 7
24,511,573 UART: [art] Erasing AUTHORITY.KEYID = 7
24,513,091 UART: [art] PUB.X = 095A24D39EED58B5E387DD649A2CD3FDB8CC2F50B6DF59853247EEBEC15A239AEEFF409E00E2E733EC55EAB625CB9B7B
24,520,359 UART: [art] PUB.Y = 3AABF3F3291FB07C640C297B64092F20FF4CF6761908A8C795D2844FD4A1FEADC35B364BEA97F6AA0C4FA98EC3C30369
24,527,643 UART: [art] SIG.R = CF96F9086C05A29DFE64488E43F7112B14C3257A7D762BCB01DDDCB9383C97CEB797238E6199A3CF1A1ED05B046F3F8F
24,535,208 UART: [art] SIG.S = A6005FF0BA8D908E2EB159891C1E8E538CCE9110789B77B5DBC23D7666CCAE98985A974B76D3CD774B4DD7BFE0C2A03A
25,513,852 UART: Caliptra RT
25,514,564 UART: [state] CFI Enabled
25,631,256 UART: [rt] RT listening for mailbox commands...
25,633,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,662,837 UART: [rt]cmd =0x46504c54, len=4
25,664,500 >>> mbox cmd response data (8 bytes)
25,665,548 UART: [rt] FIPS self test
25,666,494 UART: [kat] ++
25,666,941 UART: [kat] sha1
25,671,390 UART: [kat] SHA2-256
25,673,262 UART: [kat] SHA2-384
25,676,301 UART: [kat] SHA2-512-ACC
25,678,515 UART: [kat] ECC-384
28,105,898 UART: [kat] HMAC-384Kdf
28,107,236 UART: Fatal Error: 0x90030001
28,142,635 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,287,318 >>> mbox cmd response: failed
28,287,968 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,432,749 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
15,191,373 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,790,318 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,204 UART:
192,567 UART: Running Caliptra ROM ...
193,755 UART:
193,935 UART: [state] CFI Enabled
266,661 UART: [state] LifecycleState = Unprovisioned
269,089 UART: [state] DebugLocked = No
271,836 UART: [state] WD Timer not started. Device not locked for debugging
275,875 UART: [kat] SHA2-256
465,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,551 UART: [kat] ++
477,003 UART: [kat] sha1
489,383 UART: [kat] SHA2-256
492,397 UART: [kat] SHA2-384
498,320 UART: [kat] SHA2-512-ACC
500,906 UART: [kat] ECC-384
2,951,057 UART: [kat] HMAC-384Kdf
2,970,764 UART: [kat] LMS
3,502,546 UART: [kat] --
3,508,197 UART: [cold-reset] ++
3,510,588 UART: [fht] FHT @ 0x50003400
3,521,579 UART: [idev] ++
3,522,218 UART: [idev] CDI.KEYID = 6
3,523,253 UART: [idev] SUBJECT.KEYID = 7
3,524,437 UART: [idev] UDS.KEYID = 0
3,525,389 ready_for_fw is high
3,525,589 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,622 UART: [idev] Erasing UDS.KEYID = 0
6,029,513 UART: [idev] Sha1 KeyId Algorithm
6,051,511 UART: [idev] --
6,055,510 UART: [ldev] ++
6,056,196 UART: [ldev] CDI.KEYID = 6
6,057,271 UART: [ldev] SUBJECT.KEYID = 5
6,058,380 UART: [ldev] AUTHORITY.KEYID = 7
6,059,558 UART: [ldev] FE.KEYID = 1
6,100,836 UART: [ldev] Erasing FE.KEYID = 1
8,610,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,984 UART: [ldev] --
10,415,985 UART: [fwproc] Wait for Commands...
10,417,544 UART: [fwproc] Recv command 0x46574c44
10,419,811 UART: [fwproc] Recv'd Img size: 115304 bytes
13,875,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,715 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,612,352 >>> mbox cmd response: success
14,617,075 UART: [afmc] ++
14,617,782 UART: [afmc] CDI.KEYID = 6
14,619,022 UART: [afmc] SUBJECT.KEYID = 7
14,620,492 UART: [afmc] AUTHORITY.KEYID = 5
17,149,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,644 UART: [afmc] --
18,948,361 UART: [cold-reset] --
18,953,100 UART: [state] Locking Datavault
18,957,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,460 UART: [state] Locking ICCM
18,961,231 UART: [exit] Launching FMC @ 0x40000130
18,969,899 UART:
18,970,136 UART: Running Caliptra FMC ...
18,971,239 UART:
18,971,416 UART: [state] CFI Enabled
19,030,429 UART: [fht] FMC Alias Private Key: 7
20,793,839 UART: [art] Extend RT PCRs Done
20,795,060 UART: [art] Lock RT PCRs Done
20,796,988 UART: [art] Populate DV Done
20,802,671 UART: [fht] FMC Alias Private Key: 7
20,804,372 UART: [art] Derive CDI
20,805,109 UART: [art] Store in in slot 0x4
20,862,537 UART: [art] Derive Key Pair
20,863,574 UART: [art] Store priv key in slot 0x5
23,326,365 UART: [art] Derive Key Pair - Done
23,339,369 UART: [art] Signing Cert with AUTHO
23,340,675 UART: RITY.KEYID = 7
25,051,386 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,906 UART: [art] PUB.X = 6F9898C7F484F2BB46B687D708B70CEECC79184C2F1E6B1D3CD5190BC314828EDB9B859CFC4DC05AEB0F12F0FC32650C
25,060,174 UART: [art] PUB.Y = 0972A63EB6A1AF7C3927737C87E6982BC079EF908000C7A97FACFD6633185A4DA8FDE20FADB62A0ECF5E4CEC57336D32
25,067,449 UART: [art] SIG.R = 3E9986DC6372FA0931B7FCB0ACF1EB253317183F109E53E14DBA7729B54C811B8E895F9A456CA5F64B2FFCE6F1C90EA7
25,074,853 UART: [art] SIG.S = 5AB3A8191B5BB3DA628A16526F661498D232BDF738B100261435AE06B48D9E17E52D91C460FF11FD074B3550873034EB
26,053,543 UART: Caliptra RT
26,054,263 UART: [state] CFI Enabled
26,220,299 UART: [rt] RT listening for mailbox commands...
26,222,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,252,006 UART: [rt]cmd =0x46504c54, len=4
26,253,488 >>> mbox cmd response data (8 bytes)
26,254,618 UART: [rt] FIPS self test
26,255,561 UART: [kat] ++
26,256,012 UART: [kat] sha1
26,260,342 UART: [kat] SHA2-256
26,262,230 UART: [kat] SHA2-384
26,265,191 UART: [kat] SHA2-512-ACC
26,267,431 UART: [kat] ECC-384
28,705,053 UART: [kat] HMAC-384Kdf
28,706,557 UART: Fatal Error: 0x90030001
28,741,792 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,886,608 >>> mbox cmd response: failed
28,887,328 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,032,051 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,136 UART:
190,417 UART: Running Caliptra ROM ...
191,531 UART:
191,683 UART: [state] CFI Enabled
263,513 UART: [state] LifecycleState = Unprovisioned
265,915 UART: [state] DebugLocked = No
268,206 UART: [state] WD Timer not started. Device not locked for debugging
273,293 UART: [kat] SHA2-256
463,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,967 UART: [kat] ++
474,445 UART: [kat] sha1
484,738 UART: [kat] SHA2-256
487,758 UART: [kat] SHA2-384
494,493 UART: [kat] SHA2-512-ACC
497,045 UART: [kat] ECC-384
2,948,484 UART: [kat] HMAC-384Kdf
2,970,868 UART: [kat] LMS
3,502,652 UART: [kat] --
3,508,177 UART: [cold-reset] ++
3,510,356 UART: [fht] FHT @ 0x50003400
3,523,020 UART: [idev] ++
3,523,709 UART: [idev] CDI.KEYID = 6
3,524,727 UART: [idev] SUBJECT.KEYID = 7
3,525,832 UART: [idev] UDS.KEYID = 0
3,527,340 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,672,316 UART: [idev] Erasing UDS.KEYID = 0
6,030,648 UART: [idev] Sha1 KeyId Algorithm
6,052,857 UART: [idev] --
6,058,047 UART: [ldev] ++
6,058,740 UART: [ldev] CDI.KEYID = 6
6,059,651 UART: [ldev] SUBJECT.KEYID = 5
6,060,819 UART: [ldev] AUTHORITY.KEYID = 7
6,061,922 UART: [ldev] FE.KEYID = 1
6,099,498 UART: [ldev] Erasing FE.KEYID = 1
8,607,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,126 UART: [ldev] --
10,412,865 UART: [fwproc] Wait for Commands...
10,415,691 UART: [fwproc] Recv command 0x46574c44
10,418,018 UART: [fwproc] Recv'd Img size: 115304 bytes
13,871,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,653 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,614,281 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,438,615 ready_for_fw is high
3,439,125 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,768,821 >>> mbox cmd response: success
19,065,728 UART:
19,066,138 UART: Running Caliptra FMC ...
19,067,272 UART:
19,067,425 UART: [state] CFI Enabled
19,132,579 UART: [fht] FMC Alias Private Key: 7
20,897,265 UART: [art] Extend RT PCRs Done
20,898,496 UART: [art] Lock RT PCRs Done
20,900,105 UART: [art] Populate DV Done
20,905,413 UART: [fht] FMC Alias Private Key: 7
20,907,009 UART: [art] Derive CDI
20,907,759 UART: [art] Store in in slot 0x4
20,965,662 UART: [art] Derive Key Pair
20,966,707 UART: [art] Store priv key in slot 0x5
23,429,696 UART: [art] Derive Key Pair - Done
23,442,482 UART: [art] Signing Cert with AUTHO
23,443,797 UART: RITY.KEYID = 7
25,155,514 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,025 UART: [art] PUB.X = 61C034F8D2937A4CCC7106BC645C6D51909223C76845650494FB344D388942D2801666588F9640728B1EAF42F35B8687
25,164,241 UART: [art] PUB.Y = E21418A5A91833841AFC54B3D4130CDFF3AC630A5DFE94CC0A92F3A8BC55F559937F101AEA2841C50CB1B4673AADA096
25,171,543 UART: [art] SIG.R = B0788751D58C151CA96AF80EA3359F3AC7AF41312705A53230AF9D2DE2431485958495962585190CB90563E6099C1DE1
25,178,863 UART: [art] SIG.S = 42FBE0346514762506337BCF856F338091A1278EDB73B1DCD79930552D7E109C4A2D01B40413FBE6E3C6AE5B108C872C
26,157,621 UART: Caliptra RT
26,158,332 UART: [state] CFI Enabled
26,324,176 UART: [rt] RT listening for mailbox commands...
26,326,028 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,031 UART: [rt]cmd =0x46504c54, len=4
26,357,502 >>> mbox cmd response data (8 bytes)
26,358,668 UART: [rt] FIPS self test
26,359,614 UART: [kat] ++
26,360,082 UART: [kat] sha1
26,364,485 UART: [kat] SHA2-256
26,366,410 UART: [kat] SHA2-384
26,369,278 UART: [kat] SHA2-512-ACC
26,371,536 UART: [kat] ECC-384
28,809,963 UART: [kat] HMAC-384Kdf
28,811,273 UART: Fatal Error: 0x90030001
28,846,464 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,991,347 >>> mbox cmd response: failed
28,992,020 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,136,791 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,415,852 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,739,078 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,521 UART:
192,880 UART: Running Caliptra ROM ...
194,087 UART:
603,714 UART: [state] CFI Enabled
614,463 UART: [state] LifecycleState = Unprovisioned
616,690 UART: [state] DebugLocked = No
617,929 UART: [state] WD Timer not started. Device not locked for debugging
622,181 UART: [kat] SHA2-256
812,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,854 UART: [kat] ++
823,372 UART: [kat] sha1
836,092 UART: [kat] SHA2-256
839,109 UART: [kat] SHA2-384
845,105 UART: [kat] SHA2-512-ACC
847,696 UART: [kat] ECC-384
3,288,015 UART: [kat] HMAC-384Kdf
3,302,093 UART: [kat] LMS
3,833,928 UART: [kat] --
3,837,687 UART: [cold-reset] ++
3,839,199 UART: [fht] FHT @ 0x50003400
3,851,400 UART: [idev] ++
3,852,118 UART: [idev] CDI.KEYID = 6
3,853,193 UART: [idev] SUBJECT.KEYID = 7
3,854,302 UART: [idev] UDS.KEYID = 0
3,855,234 ready_for_fw is high
3,855,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,000,348 UART: [idev] Erasing UDS.KEYID = 0
6,332,042 UART: [idev] Sha1 KeyId Algorithm
6,353,711 UART: [idev] --
6,357,655 UART: [ldev] ++
6,358,393 UART: [ldev] CDI.KEYID = 6
6,359,299 UART: [ldev] SUBJECT.KEYID = 5
6,360,462 UART: [ldev] AUTHORITY.KEYID = 7
6,361,693 UART: [ldev] FE.KEYID = 1
6,371,873 UART: [ldev] Erasing FE.KEYID = 1
8,845,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,516 UART: [ldev] --
10,636,466 UART: [fwproc] Wait for Commands...
10,638,680 UART: [fwproc] Recv command 0x46574c44
10,641,000 UART: [fwproc] Recv'd Img size: 115304 bytes
14,099,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,905 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,842,828 >>> mbox cmd response: success
14,846,020 UART: [afmc] ++
14,846,727 UART: [afmc] CDI.KEYID = 6
14,847,990 UART: [afmc] SUBJECT.KEYID = 7
14,849,426 UART: [afmc] AUTHORITY.KEYID = 5
17,349,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,062 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,871 UART: [afmc] --
19,145,816 UART: [cold-reset] --
19,150,116 UART: [state] Locking Datavault
19,154,720 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,907 UART: [state] Locking ICCM
19,159,492 UART: [exit] Launching FMC @ 0x40000130
19,168,159 UART:
19,168,393 UART: Running Caliptra FMC ...
19,169,513 UART:
19,169,677 UART: [state] CFI Enabled
19,177,569 UART: [fht] FMC Alias Private Key: 7
20,933,973 UART: [art] Extend RT PCRs Done
20,935,192 UART: [art] Lock RT PCRs Done
20,936,940 UART: [art] Populate DV Done
20,942,383 UART: [fht] FMC Alias Private Key: 7
20,944,032 UART: [art] Derive CDI
20,944,772 UART: [art] Store in in slot 0x4
20,987,581 UART: [art] Derive Key Pair
20,988,579 UART: [art] Store priv key in slot 0x5
23,415,663 UART: [art] Derive Key Pair - Done
23,428,849 UART: [art] Signing Cert with AUTHO
23,430,152 UART: RITY.KEYID = 7
25,135,474 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,981 UART: [art] PUB.X = 6D863FCFBF68616745C92ABEADFA88A9964FF4CD9D1FE84EE2E65A9E1FBE54F00E2D5DB98FD75D9327964D17A05F4B23
25,144,255 UART: [art] PUB.Y = ADDA90A611275C9CEA851DD7EAD3381BC73EA2688A03DBC85B40F1DEAAD3DD559CF9149CF4B506CF4F01EB4EB5800C42
25,151,559 UART: [art] SIG.R = 16F2E6C8257AC88CB69FD3EDADF60FC65519A0CE98FB7490E6A3853D216DF56A882342E64CED97E9C5D08AE380698376
25,158,958 UART: [art] SIG.S = EAEBB34CE60EFD20AFD2A314CB3F0CC24EC72DF1DB6780D2A9D8948970136276746F90851CDC64E279326656180ADAE9
26,137,269 UART: Caliptra RT
26,137,979 UART: [state] CFI Enabled
26,255,636 UART: [rt] RT listening for mailbox commands...
26,257,497 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,286,868 UART: [rt]cmd =0x46504c54, len=4
26,288,336 >>> mbox cmd response data (8 bytes)
26,289,519 UART: [rt] FIPS self test
26,290,462 UART: [kat] ++
26,290,914 UART: [kat] sha1
26,295,424 UART: [kat] SHA2-256
26,297,345 UART: [kat] SHA2-384
26,300,343 UART: [kat] SHA2-512-ACC
26,302,589 UART: [kat] ECC-384
28,729,915 UART: [kat] HMAC-384Kdf
28,731,173 UART: Fatal Error: 0x90030001
28,766,262 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,911,233 >>> mbox cmd response: failed
28,911,890 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,056,618 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
189,996 UART:
190,280 UART: Running Caliptra ROM ...
191,306 UART:
11,483,738 UART: [state] CFI Enabled
11,496,092 UART: [state] LifecycleState = Unprovisioned
11,498,439 UART: [state] DebugLocked = No
11,500,686 UART: [state] WD Timer not started. Device not locked for debugging
11,504,649 UART: [kat] SHA2-256
11,694,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,705,289 UART: [kat] ++
11,705,807 UART: [kat] sha1
11,717,394 UART: [kat] SHA2-256
11,720,420 UART: [kat] SHA2-384
11,725,314 UART: [kat] SHA2-512-ACC
11,727,938 UART: [kat] ECC-384
14,171,002 UART: [kat] HMAC-384Kdf
14,183,660 UART: [kat] LMS
14,715,484 UART: [kat] --
14,720,604 UART: [cold-reset] ++
14,722,587 UART: [fht] FHT @ 0x50003400
14,735,217 UART: [idev] ++
14,735,897 UART: [idev] CDI.KEYID = 6
14,736,861 UART: [idev] SUBJECT.KEYID = 7
14,738,074 UART: [idev] UDS.KEYID = 0
14,739,611 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,884,361 UART: [idev] Erasing UDS.KEYID = 0
17,216,122 UART: [idev] Sha1 KeyId Algorithm
17,238,706 UART: [idev] --
17,243,058 UART: [ldev] ++
17,243,773 UART: [ldev] CDI.KEYID = 6
17,244,687 UART: [ldev] SUBJECT.KEYID = 5
17,245,846 UART: [ldev] AUTHORITY.KEYID = 7
17,247,069 UART: [ldev] FE.KEYID = 1
17,256,798 UART: [ldev] Erasing FE.KEYID = 1
19,740,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,459,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,474,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,489,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,504,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,524,863 UART: [ldev] --
21,530,094 UART: [fwproc] Wait for Commands...
21,531,607 UART: [fwproc] Recv command 0x46574c44
21,533,541 UART: [fwproc] Recv'd Img size: 115304 bytes
24,991,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,067,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,184,048 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,731,807 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,751,969 ready_for_fw is high
3,752,382 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,976,955 >>> mbox cmd response: success
19,237,312 UART:
19,237,736 UART: Running Caliptra FMC ...
19,238,886 UART:
19,239,049 UART: [state] CFI Enabled
19,247,485 UART: [fht] FMC Alias Private Key: 7
21,003,724 UART: [art] Extend RT PCRs Done
21,004,940 UART: [art] Lock RT PCRs Done
21,006,630 UART: [art] Populate DV Done
21,011,831 UART: [fht] FMC Alias Private Key: 7
21,013,319 UART: [art] Derive CDI
21,014,085 UART: [art] Store in in slot 0x4
21,056,959 UART: [art] Derive Key Pair
21,058,023 UART: [art] Store priv key in slot 0x5
23,484,831 UART: [art] Derive Key Pair - Done
23,497,781 UART: [art] Signing Cert with AUTHO
23,499,283 UART: RITY.KEYID = 7
25,204,413 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,903 UART: [art] PUB.X = 50CDD5097AEDC1E692BEBC8A01407D95E58443E397EA2A1E78CACA9561182C8FB17222BDB0E2DA09A1C780D08EFF1CCD
25,213,215 UART: [art] PUB.Y = F9DB6C15E065FAE90AF913ED07EA835C177A8B1EC69BB0096A230CB4FCDBFDB10D99257B9479E4307C87B3B50AD91DB7
25,220,523 UART: [art] SIG.R = E19E846C91681CE868D058CDABFE82A1A23977D6606FD7D9CC2904ED21F2E6C03F40708FC8F41E87B436F0026C55A9B2
25,227,870 UART: [art] SIG.S = 4B1544B24D7524BD09BF709A4BF19BC968DA54F5DB9AC4CFB0DF709F9F822DFEEF17E7351A3FB6851EF4C0F95754644A
26,206,523 UART: Caliptra RT
26,207,262 UART: [state] CFI Enabled
26,323,953 UART: [rt] RT listening for mailbox commands...
26,325,814 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,414 UART: [rt]cmd =0x46504c54, len=4
26,356,878 >>> mbox cmd response data (8 bytes)
26,358,267 UART: [rt] FIPS self test
26,359,233 UART: [kat] ++
26,359,679 UART: [kat] sha1
26,364,129 UART: [kat] SHA2-256
26,366,053 UART: [kat] SHA2-384
26,369,043 UART: [kat] SHA2-512-ACC
26,371,276 UART: [kat] ECC-384
28,798,414 UART: [kat] HMAC-384Kdf
28,799,783 UART: Fatal Error: 0x90030001
28,834,927 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,979,690 >>> mbox cmd response: failed
28,980,364 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,125,144 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
14,549,200 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,771,357 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
902,394 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,395 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,640 UART: [idev] ++
1,479,808 UART: [idev] CDI.KEYID = 6
1,480,168 UART: [idev] SUBJECT.KEYID = 7
1,480,592 UART: [idev] UDS.KEYID = 0
1,480,937 ready_for_fw is high
1,480,937 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,042 UART: [idev] Erasing UDS.KEYID = 0
1,505,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,328 UART: [idev] --
1,515,371 UART: [ldev] ++
1,515,539 UART: [ldev] CDI.KEYID = 6
1,515,902 UART: [ldev] SUBJECT.KEYID = 5
1,516,328 UART: [ldev] AUTHORITY.KEYID = 7
1,516,791 UART: [ldev] FE.KEYID = 1
1,522,071 UART: [ldev] Erasing FE.KEYID = 1
1,547,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,880 UART: [ldev] --
1,587,201 UART: [fwproc] Waiting for Commands...
1,587,960 UART: [fwproc] Received command 0x46574c44
1,588,751 UART: [fwproc] Received Image of size 115304 bytes
2,897,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,967 >>> mbox cmd response: success
3,092,017 UART: [afmc] ++
3,092,185 UART: [afmc] CDI.KEYID = 6
3,092,547 UART: [afmc] SUBJECT.KEYID = 7
3,092,972 UART: [afmc] AUTHORITY.KEYID = 5
3,127,901 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,798 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,488 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,363 UART: [afmc] --
3,171,449 UART: [cold-reset] --
3,172,311 UART: [state] Locking Datavault
3,173,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,906 UART: [state] Locking ICCM
3,174,576 UART: [exit] Launching FMC @ 0x40000130
3,179,905 UART:
3,179,921 UART: Running Caliptra FMC ...
3,180,329 UART:
3,180,383 UART: [state] CFI Enabled
3,190,972 UART: [fht] FMC Alias Private Key: 7
3,298,581 UART: [art] Extend RT PCRs Done
3,299,009 UART: [art] Lock RT PCRs Done
3,300,517 UART: [art] Populate DV Done
3,308,548 UART: [fht] FMC Alias Private Key: 7
3,309,630 UART: [art] Derive CDI
3,309,910 UART: [art] Store in in slot 0x4
3,395,709 UART: [art] Derive Key Pair
3,396,069 UART: [art] Store priv key in slot 0x5
3,409,717 UART: [art] Derive Key Pair - Done
3,424,482 UART: [art] Signing Cert with AUTHO
3,424,962 UART: RITY.KEYID = 7
3,440,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,947 UART: [art] PUB.X = 42CF29BA83254667D4B2946BCFE0754DAAFE11B2A1CA77DB915DE4CD30E60205C0153AA63C7F047FFCF0D2F90F18CF07
3,447,720 UART: [art] PUB.Y = 6570263D455624E6B16E15D6940B3E60DB8F5CD58ED43B7F2008B9CBE0CD10CE169E6B051250EB726734CF730E5ECF83
3,454,664 UART: [art] SIG.R = ED9F2C663F772F0A849FE8CC611B58D985FAAE916CEA065ACCA9C35EEEF6E99A31D4CAA29BF677BC35CCF4C13654C4EC
3,461,458 UART: [art] SIG.S = 0DB855305176C248CB7D40FACE6B357A2E1063AE7BC7C90E1AF7D4E1F76E6E554613E8D5D874CB2A68DF60C49E6F3F66
3,485,751 UART: Caliptra RT
3,486,004 UART: [state] CFI Enabled
3,595,263 UART: [rt] RT listening for mailbox commands...
3,595,926 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,735 UART: [rt]cmd =0x46504c54, len=4
3,626,848 >>> mbox cmd response data (8 bytes)
3,627,183 UART: [rt] FIPS self test
3,627,511 UART: [kat] ++
3,627,663 UART: [kat] sha1
3,631,927 UART: [kat] SHA2-256
3,633,949 UART: [kat] SHA2-384
3,636,830 UART: [kat] SHA2-512-ACC
3,638,757 UART: [kat] ECC-384
3,648,451 UART: [kat] HMAC-384Kdf
3,649,385 UART: Fatal Error: 0x90030001
3,650,935 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,650,940 >>> mbox cmd response: failed
3,650,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,650,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,320 UART: [kat] SHA2-512-ACC
897,221 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,701 UART: [fht] Storing FHT @ 0x50003400
1,479,606 UART: [idev] ++
1,479,774 UART: [idev] CDI.KEYID = 6
1,480,134 UART: [idev] SUBJECT.KEYID = 7
1,480,558 UART: [idev] UDS.KEYID = 0
1,480,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,720 UART: [idev] Erasing UDS.KEYID = 0
1,505,188 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,870 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,277 UART: [fwproc] Waiting for Commands...
1,587,134 UART: [fwproc] Received command 0x46574c44
1,587,925 UART: [fwproc] Received Image of size 115304 bytes
2,897,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,820 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,397 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 ready_for_fw is high
1,362,593 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,487 >>> mbox cmd response: success
3,001,137 UART:
3,001,153 UART: Running Caliptra FMC ...
3,001,561 UART:
3,001,615 UART: [state] CFI Enabled
3,012,194 UART: [fht] FMC Alias Private Key: 7
3,120,021 UART: [art] Extend RT PCRs Done
3,120,449 UART: [art] Lock RT PCRs Done
3,122,387 UART: [art] Populate DV Done
3,130,992 UART: [fht] FMC Alias Private Key: 7
3,132,038 UART: [art] Derive CDI
3,132,318 UART: [art] Store in in slot 0x4
3,218,021 UART: [art] Derive Key Pair
3,218,381 UART: [art] Store priv key in slot 0x5
3,231,481 UART: [art] Derive Key Pair - Done
3,246,209 UART: [art] Signing Cert with AUTHO
3,246,689 UART: RITY.KEYID = 7
3,261,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,416 UART: [art] PUB.X = FDAF9F887404ACD5BE50109EDA131984509352FA49DE4BFBA1D1FA49164AB18AD8409C396325370A8A321BEA096329FA
3,269,187 UART: [art] PUB.Y = E1D7430B3F1DA30B79F4FDF34C6756C398AD25C803A112FA1CAE24D0F454E97FBB5BD20754A57B255D44BDF2B061417F
3,276,139 UART: [art] SIG.R = 846A60A0BF5B96151958A41DB7577EF6E0067223E93B673FCF209CA037D97D68BBD5E97B492BEF32C570FCBAEE4390B5
3,282,916 UART: [art] SIG.S = B6D89406B7183893C4A1B25F0B89DA2F46842F67DBC797734CD2C060EF276843265F42A7A34644E87175842B3407FB72
3,306,770 UART: Caliptra RT
3,307,023 UART: [state] CFI Enabled
3,415,569 UART: [rt] RT listening for mailbox commands...
3,416,232 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,037 UART: [rt]cmd =0x46504c54, len=4
3,447,040 >>> mbox cmd response data (8 bytes)
3,447,181 UART: [rt] FIPS self test
3,447,509 UART: [kat] ++
3,447,661 UART: [kat] sha1
3,452,055 UART: [kat] SHA2-256
3,454,077 UART: [kat] SHA2-384
3,457,086 UART: [kat] SHA2-512-ACC
3,459,013 UART: [kat] ECC-384
3,469,545 UART: [kat] HMAC-384Kdf
3,470,303 UART: Fatal Error: 0x90030001
3,471,853 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,471,858 >>> mbox cmd response: failed
3,471,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,471,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,183 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,392 UART: [kat] SHA2-256
892,330 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,479,951 UART: [idev] ++
1,480,119 UART: [idev] CDI.KEYID = 6
1,480,479 UART: [idev] SUBJECT.KEYID = 7
1,480,903 UART: [idev] UDS.KEYID = 0
1,481,248 ready_for_fw is high
1,481,248 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,505,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,385 UART: [idev] --
1,515,480 UART: [ldev] ++
1,515,648 UART: [ldev] CDI.KEYID = 6
1,516,011 UART: [ldev] SUBJECT.KEYID = 5
1,516,437 UART: [ldev] AUTHORITY.KEYID = 7
1,516,900 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,770 UART: [fwproc] Waiting for Commands...
1,587,637 UART: [fwproc] Received command 0x46574c44
1,588,428 UART: [fwproc] Received Image of size 115304 bytes
2,898,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,675 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,432 >>> mbox cmd response: success
3,093,608 UART: [afmc] ++
3,093,776 UART: [afmc] CDI.KEYID = 6
3,094,138 UART: [afmc] SUBJECT.KEYID = 7
3,094,563 UART: [afmc] AUTHORITY.KEYID = 5
3,129,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,183 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,873 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,874 UART: [afmc] --
3,172,954 UART: [cold-reset] --
3,173,888 UART: [state] Locking Datavault
3,175,209 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,813 UART: [state] Locking ICCM
3,176,337 UART: [exit] Launching FMC @ 0x40000130
3,181,666 UART:
3,181,682 UART: Running Caliptra FMC ...
3,182,090 UART:
3,182,233 UART: [state] CFI Enabled
3,192,966 UART: [fht] FMC Alias Private Key: 7
3,300,479 UART: [art] Extend RT PCRs Done
3,300,907 UART: [art] Lock RT PCRs Done
3,302,433 UART: [art] Populate DV Done
3,310,724 UART: [fht] FMC Alias Private Key: 7
3,311,820 UART: [art] Derive CDI
3,312,100 UART: [art] Store in in slot 0x4
3,397,497 UART: [art] Derive Key Pair
3,397,857 UART: [art] Store priv key in slot 0x5
3,411,329 UART: [art] Derive Key Pair - Done
3,426,292 UART: [art] Signing Cert with AUTHO
3,426,772 UART: RITY.KEYID = 7
3,441,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,683 UART: [art] PUB.X = 7D9382AA1181D630866690C4B920EE1E5B4B7B3E311DA7AE6D9DC2F026AFC7FCEFF47B568D9FC0F3B1C2C5C5A7C50111
3,449,468 UART: [art] PUB.Y = 1B620A89E3F70DB973A745405CCFAF08232A8F27D5DB27AEC4EC8C67305F5E3342D58B80BE35AF36307208109F553E62
3,456,410 UART: [art] SIG.R = 7A400BF0AB5857CAF9E8EB0541F648D1D0F7D4536261171C17679C770224DDAEE692D7BE4A378B0D427A9404204098F9
3,463,165 UART: [art] SIG.S = BA262B95EF534067DD888396A208948B5C61C730036EF2C8CD896ADF3F6072AD3027606598C57A9EE5743F1B55FDAB8D
3,486,864 UART: Caliptra RT
3,487,209 UART: [state] CFI Enabled
3,594,634 UART: [rt] RT listening for mailbox commands...
3,595,297 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,174 UART: [rt]cmd =0x46504c54, len=4
3,626,375 >>> mbox cmd response data (8 bytes)
3,626,718 UART: [rt] FIPS self test
3,627,046 UART: [kat] ++
3,627,198 UART: [kat] sha1
3,631,418 UART: [kat] SHA2-256
3,633,440 UART: [kat] SHA2-384
3,636,303 UART: [kat] SHA2-512-ACC
3,638,230 UART: [kat] ECC-384
3,648,356 UART: [kat] HMAC-384Kdf
3,649,294 UART: Fatal Error: 0x90030001
3,650,844 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,650,849 >>> mbox cmd response: failed
3,650,849 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,650,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
908,043 UART: [kat] LMS
1,476,239 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,502 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,061 UART: [idev] --
1,515,060 UART: [ldev] ++
1,515,228 UART: [ldev] CDI.KEYID = 6
1,515,591 UART: [ldev] SUBJECT.KEYID = 5
1,516,017 UART: [ldev] AUTHORITY.KEYID = 7
1,516,480 UART: [ldev] FE.KEYID = 1
1,521,738 UART: [ldev] Erasing FE.KEYID = 1
1,547,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,783 UART: [ldev] --
1,586,242 UART: [fwproc] Waiting for Commands...
1,586,983 UART: [fwproc] Received command 0x46574c44
1,587,774 UART: [fwproc] Received Image of size 115304 bytes
2,897,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,156 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,390 ready_for_fw is high
1,363,390 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,412 >>> mbox cmd response: success
3,003,238 UART:
3,003,254 UART: Running Caliptra FMC ...
3,003,662 UART:
3,003,805 UART: [state] CFI Enabled
3,014,406 UART: [fht] FMC Alias Private Key: 7
3,122,799 UART: [art] Extend RT PCRs Done
3,123,227 UART: [art] Lock RT PCRs Done
3,124,513 UART: [art] Populate DV Done
3,132,722 UART: [fht] FMC Alias Private Key: 7
3,133,886 UART: [art] Derive CDI
3,134,166 UART: [art] Store in in slot 0x4
3,220,061 UART: [art] Derive Key Pair
3,220,421 UART: [art] Store priv key in slot 0x5
3,233,251 UART: [art] Derive Key Pair - Done
3,248,089 UART: [art] Signing Cert with AUTHO
3,248,569 UART: RITY.KEYID = 7
3,263,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,240 UART: [art] PUB.X = 28CFAE353CFACFFE75BEF3AEB161E7867D0C8FAF9CFE1CF8CEFC493935A93C2ACCF8DE3BEEFB2CB71A457B44D49FDF9C
3,271,053 UART: [art] PUB.Y = 9E2E1AE2876C8400CD70114058E6A36684AC22C3F44D4E6C92F11B92E9E601AB4E40F12D28DE85D1D5F773D8AA9AEB50
3,277,988 UART: [art] SIG.R = 94E47C0868C76621D24A2054ADE52D6012DEA2E929BD743D00D69C150E23A30B28712B0AF0F996B6657F02EBF83B930D
3,284,720 UART: [art] SIG.S = E43C35D662C722DCFFF9DCCDEFCF1E943B11B88F3CF915F010A9171817F7A4F0D6536D4ACB148FC9E310A0A3641A07E3
3,308,650 UART: Caliptra RT
3,308,995 UART: [state] CFI Enabled
3,417,159 UART: [rt] RT listening for mailbox commands...
3,417,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,659 UART: [rt]cmd =0x46504c54, len=4
3,448,808 >>> mbox cmd response data (8 bytes)
3,449,069 UART: [rt] FIPS self test
3,449,397 UART: [kat] ++
3,449,549 UART: [kat] sha1
3,453,933 UART: [kat] SHA2-256
3,455,955 UART: [kat] SHA2-384
3,458,804 UART: [kat] SHA2-512-ACC
3,460,731 UART: [kat] ECC-384
3,470,955 UART: [kat] HMAC-384Kdf
3,471,917 UART: Fatal Error: 0x90030001
3,473,467 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,473,472 >>> mbox cmd response: failed
3,473,472 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,473,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,616 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,984 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
902,039 UART: [kat] SHA2-256
903,979 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 ready_for_fw is high
1,176,469 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,956 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,415 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,749 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,283,844 UART: [fwproc] Recv command 0x46574c44
1,284,572 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,719 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,064 >>> mbox cmd response: success
2,789,074 UART: [afmc] ++
2,789,242 UART: [afmc] CDI.KEYID = 6
2,789,604 UART: [afmc] SUBJECT.KEYID = 7
2,790,029 UART: [afmc] AUTHORITY.KEYID = 5
2,825,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,369 UART: [afmc] --
2,868,353 UART: [cold-reset] --
2,869,073 UART: [state] Locking Datavault
2,870,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,878 UART: [state] Locking ICCM
2,871,438 UART: [exit] Launching FMC @ 0x40000130
2,876,767 UART:
2,876,783 UART: Running Caliptra FMC ...
2,877,191 UART:
2,877,245 UART: [state] CFI Enabled
2,887,948 UART: [fht] FMC Alias Private Key: 7
2,996,489 UART: [art] Extend RT PCRs Done
2,996,917 UART: [art] Lock RT PCRs Done
2,998,561 UART: [art] Populate DV Done
3,006,800 UART: [fht] FMC Alias Private Key: 7
3,007,766 UART: [art] Derive CDI
3,008,046 UART: [art] Store in in slot 0x4
3,093,453 UART: [art] Derive Key Pair
3,093,813 UART: [art] Store priv key in slot 0x5
3,106,917 UART: [art] Derive Key Pair - Done
3,121,556 UART: [art] Signing Cert with AUTHO
3,122,036 UART: RITY.KEYID = 7
3,137,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,785 UART: [art] PUB.X = 25C1E786DE622EF3017996A25B3C18ABDEA6C59D0AC1698C0A67C00168E95F737DA8D51E84EF5932FC2D6FFD17880296
3,144,548 UART: [art] PUB.Y = D74340349254415CB61EEF0BBCCA10FB87FE0E499D32BA5316CDA168E476B5B70942DD2EC6DA46B7A1C2A264A9A7A3D4
3,151,505 UART: [art] SIG.R = A7C27E16D4ABAB440F15FBD8B8F42183F048094AA39E7180CC73668157EE11CDEA46355F6C0718CF84834C9BBBF8A548
3,158,276 UART: [art] SIG.S = 6C7A1F51CD3FA3DBEC278885C264467840B9C816A1947383BFB69E6BA7ED58586D879A6BAB945D5EC3AB76BDC7A34E0B
3,182,818 UART: Caliptra RT
3,183,071 UART: [state] CFI Enabled
3,290,036 UART: [rt] RT listening for mailbox commands...
3,290,699 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,628 UART: [rt]cmd =0x46504c54, len=4
3,321,675 >>> mbox cmd response data (8 bytes)
3,321,982 UART: [rt] FIPS self test
3,322,310 UART: [kat] ++
3,322,462 UART: [kat] sha1
3,326,714 UART: [kat] SHA2-256
3,328,736 UART: [kat] SHA2-384
3,331,817 UART: [kat] SHA2-512-ACC
3,333,744 UART: [kat] ECC-384
3,343,890 UART: [kat] HMAC-384Kdf
3,345,066 UART: Fatal Error: 0x90030001
3,346,616 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,621 >>> mbox cmd response: failed
3,346,621 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,370 UART: [kat] SHA2-512-ACC
908,271 UART: [kat] ECC-384
917,724 UART: [kat] HMAC-384Kdf
922,438 UART: [kat] LMS
1,170,766 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,172,013 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,269 UART: [idev] --
1,210,533 UART: [ldev] ++
1,210,701 UART: [ldev] CDI.KEYID = 6
1,211,064 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,501 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,422 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,643 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,822 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,763 ready_for_fw is high
1,059,763 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,279 >>> mbox cmd response: success
2,700,355 UART:
2,700,371 UART: Running Caliptra FMC ...
2,700,779 UART:
2,700,833 UART: [state] CFI Enabled
2,711,828 UART: [fht] FMC Alias Private Key: 7
2,819,969 UART: [art] Extend RT PCRs Done
2,820,397 UART: [art] Lock RT PCRs Done
2,822,015 UART: [art] Populate DV Done
2,830,304 UART: [fht] FMC Alias Private Key: 7
2,831,274 UART: [art] Derive CDI
2,831,554 UART: [art] Store in in slot 0x4
2,916,821 UART: [art] Derive Key Pair
2,917,181 UART: [art] Store priv key in slot 0x5
2,930,535 UART: [art] Derive Key Pair - Done
2,944,990 UART: [art] Signing Cert with AUTHO
2,945,470 UART: RITY.KEYID = 7
2,960,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,117 UART: [art] PUB.X = ABC9F0ECD2238FB0C63B38E04C7B42298A6C457BBBCCD9C9535A8AE1C6054F96C7C446F4543F4D0A480DFC1BE3BCBC16
2,967,902 UART: [art] PUB.Y = 09FE020CFCF77EEDC7B6A25039A2C0EAE62A75F167DC246A441414CD42FCB867B484FC13B8C2654D14C0B046D1EA7AF5
2,974,861 UART: [art] SIG.R = B2A66C3EF17B637876989254CD902C2A3287EBA8C166F55879C81531E13458AC51A4810348B551C707CB0FD4F9E875B5
2,981,618 UART: [art] SIG.S = 53F086D5B0F4F20D8A78C62883E3610F42AF5B205F50C8771439F855A82A42DB8D4BD5CF2F3660D9C0F0C75F24AE1489
3,005,585 UART: Caliptra RT
3,005,838 UART: [state] CFI Enabled
3,113,185 UART: [rt] RT listening for mailbox commands...
3,113,848 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,557 UART: [rt]cmd =0x46504c54, len=4
3,144,732 >>> mbox cmd response data (8 bytes)
3,145,067 UART: [rt] FIPS self test
3,145,395 UART: [kat] ++
3,145,547 UART: [kat] sha1
3,149,845 UART: [kat] SHA2-256
3,151,867 UART: [kat] SHA2-384
3,154,790 UART: [kat] SHA2-512-ACC
3,156,717 UART: [kat] ECC-384
3,166,617 UART: [kat] HMAC-384Kdf
3,167,641 UART: Fatal Error: 0x90030001
3,169,191 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,196 >>> mbox cmd response: failed
3,169,196 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,155 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,182 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,159 UART: [kat] SHA2-512-ACC
909,060 UART: [kat] ECC-384
918,813 UART: [kat] HMAC-384Kdf
923,339 UART: [kat] LMS
1,171,667 UART: [kat] --
1,172,480 UART: [cold-reset] ++
1,173,036 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,974 UART: [idev] Sha1 KeyId Algorithm
1,210,640 UART: [idev] --
1,211,714 UART: [ldev] ++
1,211,882 UART: [ldev] CDI.KEYID = 6
1,212,245 UART: [ldev] SUBJECT.KEYID = 5
1,212,671 UART: [ldev] AUTHORITY.KEYID = 7
1,213,134 UART: [ldev] FE.KEYID = 1
1,218,654 UART: [ldev] Erasing FE.KEYID = 1
1,244,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,308 UART: [ldev] --
1,284,685 UART: [fwproc] Wait for Commands...
1,285,503 UART: [fwproc] Recv command 0x46574c44
1,286,231 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,980 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,135 >>> mbox cmd response: success
2,790,233 UART: [afmc] ++
2,790,401 UART: [afmc] CDI.KEYID = 6
2,790,763 UART: [afmc] SUBJECT.KEYID = 7
2,791,188 UART: [afmc] AUTHORITY.KEYID = 5
2,826,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,527 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,246 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,936 UART: [afmc] --
2,869,898 UART: [cold-reset] --
2,870,452 UART: [state] Locking Datavault
2,871,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,187 UART: [state] Locking ICCM
2,872,693 UART: [exit] Launching FMC @ 0x40000130
2,878,022 UART:
2,878,038 UART: Running Caliptra FMC ...
2,878,446 UART:
2,878,589 UART: [state] CFI Enabled
2,889,306 UART: [fht] FMC Alias Private Key: 7
2,997,239 UART: [art] Extend RT PCRs Done
2,997,667 UART: [art] Lock RT PCRs Done
2,999,535 UART: [art] Populate DV Done
3,007,578 UART: [fht] FMC Alias Private Key: 7
3,008,604 UART: [art] Derive CDI
3,008,884 UART: [art] Store in in slot 0x4
3,094,257 UART: [art] Derive Key Pair
3,094,617 UART: [art] Store priv key in slot 0x5
3,108,341 UART: [art] Derive Key Pair - Done
3,123,297 UART: [art] Signing Cert with AUTHO
3,123,777 UART: RITY.KEYID = 7
3,139,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,808 UART: [art] PUB.X = F963F717A4370DE65F01E63A2D8A34F549FAB794C8B95249DE9A4339FA96149E066186F9A187833396CE716E7AD7D94E
3,146,569 UART: [art] PUB.Y = 539D807018D6CC07B16356D4F0998D50CE7B4DA45170A21F4B90B8289BA362032B3EE608AA63F567C2502C5A9D531104
3,153,503 UART: [art] SIG.R = 22E8B05A5984A3A8CD28EB4255F2DF959D60E879558A1A116585F3A9825E1C0A65349AE25449D8483796F38DBE2B3C95
3,160,268 UART: [art] SIG.S = 4EBC1DC3FDF18BF56427C8005AE42A00AF06F286666CE22ED15A643DCC991190D3FA20DDA3E8D28DD38A29084BD7C551
3,184,099 UART: Caliptra RT
3,184,444 UART: [state] CFI Enabled
3,291,617 UART: [rt] RT listening for mailbox commands...
3,292,280 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,127 UART: [rt]cmd =0x46504c54, len=4
3,323,158 >>> mbox cmd response data (8 bytes)
3,323,357 UART: [rt] FIPS self test
3,323,685 UART: [kat] ++
3,323,837 UART: [kat] sha1
3,328,087 UART: [kat] SHA2-256
3,330,109 UART: [kat] SHA2-384
3,332,940 UART: [kat] SHA2-512-ACC
3,334,867 UART: [kat] ECC-384
3,344,713 UART: [kat] HMAC-384Kdf
3,345,619 UART: Fatal Error: 0x90030001
3,347,169 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,174 >>> mbox cmd response: failed
3,347,174 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,202 UART: [cold-reset] ++
1,172,668 UART: [fht] FHT @ 0x50003400
1,175,539 UART: [idev] ++
1,175,707 UART: [idev] CDI.KEYID = 6
1,176,067 UART: [idev] SUBJECT.KEYID = 7
1,176,491 UART: [idev] UDS.KEYID = 0
1,176,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,673 UART: [idev] Erasing UDS.KEYID = 0
1,200,696 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,208 UART: [ldev] ++
1,210,376 UART: [ldev] CDI.KEYID = 6
1,210,739 UART: [ldev] SUBJECT.KEYID = 5
1,211,165 UART: [ldev] AUTHORITY.KEYID = 7
1,211,628 UART: [ldev] FE.KEYID = 1
1,216,750 UART: [ldev] Erasing FE.KEYID = 1
1,243,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,726 UART: [ldev] --
1,283,011 UART: [fwproc] Wait for Commands...
1,283,777 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,104 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,297 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 ready_for_fw is high
1,061,064 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,500 >>> mbox cmd response: success
2,703,610 UART:
2,703,626 UART: Running Caliptra FMC ...
2,704,034 UART:
2,704,177 UART: [state] CFI Enabled
2,714,538 UART: [fht] FMC Alias Private Key: 7
2,822,373 UART: [art] Extend RT PCRs Done
2,822,801 UART: [art] Lock RT PCRs Done
2,823,981 UART: [art] Populate DV Done
2,832,008 UART: [fht] FMC Alias Private Key: 7
2,833,132 UART: [art] Derive CDI
2,833,412 UART: [art] Store in in slot 0x4
2,919,375 UART: [art] Derive Key Pair
2,919,735 UART: [art] Store priv key in slot 0x5
2,933,253 UART: [art] Derive Key Pair - Done
2,948,022 UART: [art] Signing Cert with AUTHO
2,948,502 UART: RITY.KEYID = 7
2,963,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,623 UART: [art] PUB.X = 1C714A1F7C282078B73C0B34A00A6A4E375E4A35E1879C392AACAA6F018750A90F2F9CAA7039BF8521C26AFD9847F389
2,971,387 UART: [art] PUB.Y = 25FFF9D1E7C5F1FC0874DF958C36BB14BF9D00A5D5CCD2DF03AF9DA04F5A3D42F62C4AA128B70C768AA0406205FBF9A8
2,978,327 UART: [art] SIG.R = 3926DE425DC695C2DB440F8ED1283B7C0AEB0211C66D5AC512E9B8C2F9060C3CCDB84293C49D22FFA7A268DA313A5A0C
2,985,095 UART: [art] SIG.S = 4129AF57E19F9F944948D8FF3EC0983A3985FD227AAB3B0740E7F91FCC8320B19DF4BEFC0DBA4BFE337B685E010DEE1D
3,008,362 UART: Caliptra RT
3,008,707 UART: [state] CFI Enabled
3,116,584 UART: [rt] RT listening for mailbox commands...
3,117,247 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,210 UART: [rt]cmd =0x46504c54, len=4
3,148,273 >>> mbox cmd response data (8 bytes)
3,148,420 UART: [rt] FIPS self test
3,148,748 UART: [kat] ++
3,148,900 UART: [kat] sha1
3,153,182 UART: [kat] SHA2-256
3,155,204 UART: [kat] SHA2-384
3,158,049 UART: [kat] SHA2-512-ACC
3,159,976 UART: [kat] ECC-384
3,170,042 UART: [kat] HMAC-384Kdf
3,171,088 UART: Fatal Error: 0x90030001
3,172,638 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,643 >>> mbox cmd response: failed
3,172,643 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,356 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,264 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 ready_for_fw is high
1,174,229 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,674 UART: [ldev] ++
1,209,842 UART: [ldev] CDI.KEYID = 6
1,210,206 UART: [ldev] SUBJECT.KEYID = 5
1,210,633 UART: [ldev] AUTHORITY.KEYID = 7
1,211,096 UART: [ldev] FE.KEYID = 1
1,216,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,371 UART: [fwproc] Recv command 0x46574c44
1,283,104 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,008 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,306 >>> mbox cmd response: success
2,787,543 UART: [afmc] ++
2,787,711 UART: [afmc] CDI.KEYID = 6
2,788,074 UART: [afmc] SUBJECT.KEYID = 7
2,788,500 UART: [afmc] AUTHORITY.KEYID = 5
2,824,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,066 UART: [afmc] --
2,867,152 UART: [cold-reset] --
2,868,058 UART: [state] Locking Datavault
2,869,199 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,803 UART: [state] Locking ICCM
2,870,257 UART: [exit] Launching FMC @ 0x40000130
2,875,586 UART:
2,875,602 UART: Running Caliptra FMC ...
2,876,010 UART:
2,876,064 UART: [state] CFI Enabled
2,886,305 UART: [fht] FMC Alias Private Key: 7
2,994,170 UART: [art] Extend RT PCRs Done
2,994,598 UART: [art] Lock RT PCRs Done
2,996,162 UART: [art] Populate DV Done
3,004,585 UART: [fht] FMC Alias Private Key: 7
3,005,575 UART: [art] Derive CDI
3,005,855 UART: [art] Store in in slot 0x4
3,091,520 UART: [art] Derive Key Pair
3,091,880 UART: [art] Store priv key in slot 0x5
3,104,866 UART: [art] Derive Key Pair - Done
3,119,626 UART: [art] Signing Cert with AUTHO
3,120,106 UART: RITY.KEYID = 7
3,135,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,929 UART: [art] PUB.X = C0DC3FC7151EA72A03802A0EAE60606A709B96ED51C05379363E2A9FB803D7E027F6A43BD54E9E8D5F2C21EE15A3B022
3,142,700 UART: [art] PUB.Y = A40F252527A410EB85344BB5E2A8C7A2A245AD57EF4E6BA1B33D78990240E440748ECC836A69AC5B5CA8E8A5FB411052
3,149,652 UART: [art] SIG.R = 0C46010CCE2E9AA370CA8FC5C3C0787AFE5A862781C489FA766E7FDFA15CE7EEE117CC729A4C8D0898BF20E28696B647
3,156,426 UART: [art] SIG.S = A158AA8D9879E7F6F136CE5EBF5BCD0CE98EFE0D0EDFB218845998191519D702AE6B4750951BB414E3352E330410D02D
3,180,230 UART: Caliptra RT
3,180,483 UART: [state] CFI Enabled
3,287,512 UART: [rt] RT listening for mailbox commands...
3,288,175 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,890 UART: [rt]cmd =0x46504c54, len=4
3,318,943 >>> mbox cmd response data (8 bytes)
3,319,128 UART: [rt] FIPS self test
3,319,456 UART: [kat] ++
3,319,608 UART: [kat] sha1
3,323,942 UART: [kat] SHA2-256
3,325,964 UART: [kat] SHA2-384
3,328,867 UART: [kat] SHA2-512-ACC
3,330,794 UART: [kat] ECC-384
3,340,654 UART: [kat] HMAC-384Kdf
3,341,496 UART: Fatal Error: 0x90030001
3,343,046 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,051 >>> mbox cmd response: failed
3,343,051 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,343,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,411 UART: [fwproc] Recv command 0x46574c44
1,282,144 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,352 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,746 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,364 ready_for_fw is high
1,056,364 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,554 >>> mbox cmd response: success
2,700,378 UART:
2,700,394 UART: Running Caliptra FMC ...
2,700,802 UART:
2,700,856 UART: [state] CFI Enabled
2,711,627 UART: [fht] FMC Alias Private Key: 7
2,820,196 UART: [art] Extend RT PCRs Done
2,820,624 UART: [art] Lock RT PCRs Done
2,822,466 UART: [art] Populate DV Done
2,830,777 UART: [fht] FMC Alias Private Key: 7
2,831,755 UART: [art] Derive CDI
2,832,035 UART: [art] Store in in slot 0x4
2,917,258 UART: [art] Derive Key Pair
2,917,618 UART: [art] Store priv key in slot 0x5
2,930,682 UART: [art] Derive Key Pair - Done
2,945,456 UART: [art] Signing Cert with AUTHO
2,945,936 UART: RITY.KEYID = 7
2,961,022 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,787 UART: [art] PUB.X = 6C0ED7E0451D558CE4B1096505DFCBC8C84838669F7073CF8043B674301AA4A1B763037C1B25842004BAC662A96DFA14
2,968,542 UART: [art] PUB.Y = 9E9EBD553559520D15A07ED3321653BB5BFF9839B49DFC345DD78253514D2A213D62D337CB8120B1D1CFF762E73A518D
2,975,493 UART: [art] SIG.R = ED918E73B52FB75326ADDCD447DF234139EAE793D4C32A0F29686E3983BCEE69EA4FADF1CEF58F1AE02341528B31C07B
2,982,278 UART: [art] SIG.S = 86BBB06160BAFBE2D37D610D9C51C39D8918B7B083D850237DD561260CA68846FB240B7E70D775AE570D3169CB1FF3B4
3,006,215 UART: Caliptra RT
3,006,468 UART: [state] CFI Enabled
3,113,584 UART: [rt] RT listening for mailbox commands...
3,114,247 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,000 UART: [rt]cmd =0x46504c54, len=4
3,145,351 >>> mbox cmd response data (8 bytes)
3,145,564 UART: [rt] FIPS self test
3,145,892 UART: [kat] ++
3,146,044 UART: [kat] sha1
3,150,084 UART: [kat] SHA2-256
3,152,106 UART: [kat] SHA2-384
3,155,005 UART: [kat] SHA2-512-ACC
3,156,932 UART: [kat] ECC-384
3,166,746 UART: [kat] HMAC-384Kdf
3,167,578 UART: Fatal Error: 0x90030001
3,169,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,133 >>> mbox cmd response: failed
3,169,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,592 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,876 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,174,890 ready_for_fw is high
1,174,890 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,380 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,387 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,729 >>> mbox cmd response: success
2,787,766 UART: [afmc] ++
2,787,934 UART: [afmc] CDI.KEYID = 6
2,788,297 UART: [afmc] SUBJECT.KEYID = 7
2,788,723 UART: [afmc] AUTHORITY.KEYID = 5
2,824,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,499 UART: [afmc] --
2,868,449 UART: [cold-reset] --
2,869,149 UART: [state] Locking Datavault
2,870,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,120 UART: [state] Locking ICCM
2,871,724 UART: [exit] Launching FMC @ 0x40000130
2,877,053 UART:
2,877,069 UART: Running Caliptra FMC ...
2,877,477 UART:
2,877,620 UART: [state] CFI Enabled
2,888,483 UART: [fht] FMC Alias Private Key: 7
2,995,900 UART: [art] Extend RT PCRs Done
2,996,328 UART: [art] Lock RT PCRs Done
2,998,160 UART: [art] Populate DV Done
3,006,517 UART: [fht] FMC Alias Private Key: 7
3,007,519 UART: [art] Derive CDI
3,007,799 UART: [art] Store in in slot 0x4
3,093,632 UART: [art] Derive Key Pair
3,093,992 UART: [art] Store priv key in slot 0x5
3,106,764 UART: [art] Derive Key Pair - Done
3,121,164 UART: [art] Signing Cert with AUTHO
3,121,644 UART: RITY.KEYID = 7
3,136,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,271 UART: [art] PUB.X = 6F43604DFD99966913F682274C5834C0023A3FE2A1684BAA6EC9D93C022E633A10679E9A1CE9F3D51C93F2BAC5FF80AE
3,144,043 UART: [art] PUB.Y = AD5BB022F8290A7077D4062E13B6B336EB79475836B7A738A5CFE539FACAA84E12AEFD56A8C515B859061A6E289DD6A2
3,150,994 UART: [art] SIG.R = 89BD316F5ED5D5EAC9E87FB232246EBA28DE2E4E689FB2B7226B9EA101D42BCDBE4F6B4F58171BAB7C1673471ABC9791
3,157,781 UART: [art] SIG.S = 736F731A4CF5C887AF612589B841D44D9FD02B2A0479538694C777305272B631B365E98ECB7D918FD0C787C8F81DC32C
3,181,681 UART: Caliptra RT
3,182,026 UART: [state] CFI Enabled
3,289,111 UART: [rt] RT listening for mailbox commands...
3,289,774 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,879 UART: [rt]cmd =0x46504c54, len=4
3,321,064 >>> mbox cmd response data (8 bytes)
3,321,283 UART: [rt] FIPS self test
3,321,611 UART: [kat] ++
3,321,763 UART: [kat] sha1
3,325,931 UART: [kat] SHA2-256
3,327,953 UART: [kat] SHA2-384
3,330,628 UART: [kat] SHA2-512-ACC
3,332,555 UART: [kat] ECC-384
3,342,635 UART: [kat] HMAC-384Kdf
3,343,543 UART: Fatal Error: 0x90030001
3,345,093 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,098 >>> mbox cmd response: failed
3,345,098 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,815 UART: [kat] HMAC-384Kdf
921,607 UART: [kat] LMS
1,169,919 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,174,956 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,200,528 UART: [idev] Sha1 KeyId Algorithm
1,209,494 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,265 UART: [ldev] SUBJECT.KEYID = 5
1,211,692 UART: [ldev] AUTHORITY.KEYID = 7
1,212,155 UART: [ldev] FE.KEYID = 1
1,217,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,989 UART: [fwproc] Wait for Commands...
1,283,592 UART: [fwproc] Recv command 0x46574c44
1,284,325 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,049 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,407 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,289 ready_for_fw is high
1,057,289 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,913 >>> mbox cmd response: success
2,700,075 UART:
2,700,091 UART: Running Caliptra FMC ...
2,700,499 UART:
2,700,642 UART: [state] CFI Enabled
2,710,975 UART: [fht] FMC Alias Private Key: 7
2,818,670 UART: [art] Extend RT PCRs Done
2,819,098 UART: [art] Lock RT PCRs Done
2,820,568 UART: [art] Populate DV Done
2,828,861 UART: [fht] FMC Alias Private Key: 7
2,829,945 UART: [art] Derive CDI
2,830,225 UART: [art] Store in in slot 0x4
2,915,748 UART: [art] Derive Key Pair
2,916,108 UART: [art] Store priv key in slot 0x5
2,929,230 UART: [art] Derive Key Pair - Done
2,944,063 UART: [art] Signing Cert with AUTHO
2,944,543 UART: RITY.KEYID = 7
2,959,779 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,544 UART: [art] PUB.X = B6D362CE42746DB104D6475E999203F2E8C80F0B024F3B722FE02CE48CA9C4708768694173F5686C58B503042F6106D6
2,967,282 UART: [art] PUB.Y = 6A54EE260F867AE165BE95088055E8C838431CA6E9B01B572702099D38846E6B2687AF48B95A6AEC67A28777F8CB12F6
2,974,218 UART: [art] SIG.R = 0B68E34B3A7317C4E8A30C1DE4959ED3D0747BC0F17A83F9C291B9EFEC83E76578EDB8D83F6035648CD7A288F1272C8C
2,980,992 UART: [art] SIG.S = 1585ACF7261959B68FDC05E8E83C5E8A8C24EB7E1806A189056A6AEBCE7772D06929EA4AF1B547BC9FA0748794AB38C9
3,004,882 UART: Caliptra RT
3,005,227 UART: [state] CFI Enabled
3,113,838 UART: [rt] RT listening for mailbox commands...
3,114,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,512 UART: [rt]cmd =0x46504c54, len=4
3,145,633 >>> mbox cmd response data (8 bytes)
3,145,816 UART: [rt] FIPS self test
3,146,144 UART: [kat] ++
3,146,296 UART: [kat] sha1
3,150,466 UART: [kat] SHA2-256
3,152,488 UART: [kat] SHA2-384
3,155,399 UART: [kat] SHA2-512-ACC
3,157,326 UART: [kat] ECC-384
3,167,474 UART: [kat] HMAC-384Kdf
3,168,542 UART: Fatal Error: 0x90030001
3,170,092 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,097 >>> mbox cmd response: failed
3,170,097 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,781 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,623 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
6,012,553 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,156,773 >>> mbox cmd response: failed
6,157,339 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,300,520 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
4,864,421 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,441,037 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,104 writing to cptra_bootfsm_go
6,005,241 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,149,291 >>> mbox cmd response: failed
6,149,857 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,293,214 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,869,396 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,462,037 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
6,315,178 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,459,435 >>> mbox cmd response: failed
6,459,992 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,603,307 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
18,443,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,888,208 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
6,316,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,461,034 >>> mbox cmd response: failed
6,461,597 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,604,924 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
18,447,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,888,141 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
5,191,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,337,439 >>> mbox cmd response: failed
5,338,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,481,800 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,452,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,290,984 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
5,185,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,329,837 >>> mbox cmd response: failed
5,330,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,474,155 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,468,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,326,436 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
5,522,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,667,295 >>> mbox cmd response: failed
5,667,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,811,586 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
17,851,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,558,566 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
5,515,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,659,727 >>> mbox cmd response: failed
5,660,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,804,021 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
17,831,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,560,940 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
5,194,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,339,333 >>> mbox cmd response: failed
5,339,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,483,620 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,431,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,216 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
5,196,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,340,784 >>> mbox cmd response: failed
5,341,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,485,100 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,438,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,098 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
5,520,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,665,471 >>> mbox cmd response: failed
5,666,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,809,823 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,840,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,570,110 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,524,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,669,643 >>> mbox cmd response: failed
5,670,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,814,502 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
17,827,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,568,715 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
826,662 >>> mbox cmd response: failed
826,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
826,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,634 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,310 >>> mbox cmd response: failed
827,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,808 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,303 >>> mbox cmd response: failed
828,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,417 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,577 >>> mbox cmd response: failed
827,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,851 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,994 >>> mbox cmd response: failed
827,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,790 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,890 >>> mbox cmd response: failed
827,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,592 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,287 >>> mbox cmd response: failed
828,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,089 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,871 >>> mbox cmd response: failed
827,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,795 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,504 >>> mbox cmd response: failed
827,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,920 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,646 >>> mbox cmd response: failed
827,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,740 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,885 >>> mbox cmd response: failed
827,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,171 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,681 >>> mbox cmd response: failed
828,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,803 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,131 UART:
192,499 UART: Running Caliptra ROM ...
193,680 UART:
193,835 UART: [state] CFI Enabled
263,714 UART: [state] LifecycleState = Unprovisioned
265,632 UART: [state] DebugLocked = No
267,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,923 UART: [kat] SHA2-256
442,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,092 UART: [kat] ++
453,589 UART: [kat] sha1
465,292 UART: [kat] SHA2-256
468,021 UART: [kat] SHA2-384
473,590 UART: [kat] SHA2-512-ACC
475,967 UART: [kat] ECC-384
2,768,329 UART: [kat] HMAC-384Kdf
2,800,843 UART: [kat] LMS
3,991,158 UART: [kat] --
3,997,378 UART: [cold-reset] ++
3,998,556 UART: [fht] Storing FHT @ 0x50003400
4,010,290 UART: [idev] ++
4,010,870 UART: [idev] CDI.KEYID = 6
4,011,880 UART: [idev] SUBJECT.KEYID = 7
4,013,064 UART: [idev] UDS.KEYID = 0
4,014,025 ready_for_fw is high
4,014,246 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,913 UART: [idev] Erasing UDS.KEYID = 0
7,345,487 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,700 UART: [idev] --
7,370,269 UART: [ldev] ++
7,370,843 UART: [ldev] CDI.KEYID = 6
7,371,782 UART: [ldev] SUBJECT.KEYID = 5
7,373,047 UART: [ldev] AUTHORITY.KEYID = 7
7,374,229 UART: [ldev] FE.KEYID = 1
7,421,649 UART: [ldev] Erasing FE.KEYID = 1
10,754,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,274 UART: [ldev] --
13,116,645 UART: [fwproc] Waiting for Commands...
13,119,575 UART: [fwproc] Received command 0x46574c44
13,121,779 UART: [fwproc] Received Image of size 114996 bytes
17,185,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,146 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,329,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,649,065 >>> mbox cmd response: success
17,652,790 UART: [afmc] ++
17,653,377 UART: [afmc] CDI.KEYID = 6
17,654,397 UART: [afmc] SUBJECT.KEYID = 7
17,655,561 UART: [afmc] AUTHORITY.KEYID = 5
21,029,055 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,485 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,941 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,745 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,207 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,665 UART: [afmc] --
23,397,202 UART: [cold-reset] --
23,400,419 UART: [state] Locking Datavault
23,406,640 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,336 UART: [state] Locking ICCM
23,410,001 UART: [exit] Launching FMC @ 0x40000130
23,418,399 UART:
23,418,647 UART: Running Caliptra FMC ...
23,419,749 UART:
23,419,909 UART: [state] CFI Enabled
23,485,355 UART: [fht] FMC Alias Private Key: 7
25,822,950 UART: [art] Extend RT PCRs Done
25,824,194 UART: [art] Lock RT PCRs Done
25,826,255 UART: [art] Populate DV Done
25,831,832 UART: [fht] FMC Alias Private Key: 7
25,833,528 UART: [art] Derive CDI
25,834,343 UART: [art] Store in in slot 0x4
25,893,220 UART: [art] Derive Key Pair
25,894,260 UART: [art] Store priv key in slot 0x5
29,186,864 UART: [art] Derive Key Pair - Done
29,199,538 UART: [art] Signing Cert with AUTHO
29,200,870 UART: RITY.KEYID = 7
31,488,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,915 UART: [art] PUB.X = 5E3C701B18B09315AA269EFC9F331BBD056DEA21396998FBB098643146BE0F50CD067F7792F3FEFBFED79DBC9F94B949
31,497,160 UART: [art] PUB.Y = 9B6C0D8EA268CE70C3F59F4BC31BED0A52866C58CE6426E4390A5518D31148ED35AE4A2B7204826FAE98E8FA4968F462
31,504,400 UART: [art] SIG.R = 9C473E236531D1807F8D1A2406BBCACC0B7F4A50BE75E07B78722F6AA93FEF7A3F9F33DACAF9E7F5AAC7ED08D19F6166
31,511,803 UART: [art] SIG.S = DCFEEB43D108D80A2545824E7F2BE4338802FFF3ECA79B4D1B4CACBB29183C84280E360A331887697FB22E05E222A430
32,816,411 UART: Caliptra RT
32,817,144 UART: [state] CFI Enabled
32,980,026 UART: [rt] RT listening for mailbox commands...
32,981,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,011,421 UART: [rt]cmd =0x46504c54, len=4
33,012,893 >>> mbox cmd response data (8 bytes)
33,013,972 UART: [rt] FIPS self test
33,014,917 UART: [kat] ++
33,015,369 UART: [kat] sha1
33,019,855 UART: [kat] SHA2-256
33,021,788 UART: [kat] SHA2-384
33,024,802 UART: [kat] SHA2-512-ACC
33,027,043 UART: [kat] ECC-384
36,295,212 UART: [kat] HMAC-384Kdf
36,301,663 UART: Fatal Error: 0x90030002
36,337,042 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,481,559 >>> mbox cmd response: failed
36,482,231 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,626,440 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
189,994 UART:
190,284 UART: Running Caliptra ROM ...
191,311 UART:
191,450 UART: [state] CFI Enabled
260,360 UART: [state] LifecycleState = Unprovisioned
262,331 UART: [state] DebugLocked = No
265,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,164 UART: [kat] SHA2-256
438,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,381 UART: [kat] ++
449,909 UART: [kat] sha1
460,306 UART: [kat] SHA2-256
463,005 UART: [kat] SHA2-384
469,756 UART: [kat] SHA2-512-ACC
472,152 UART: [kat] ECC-384
2,765,530 UART: [kat] HMAC-384Kdf
2,795,750 UART: [kat] LMS
3,986,051 UART: [kat] --
3,991,314 UART: [cold-reset] ++
3,992,877 UART: [fht] Storing FHT @ 0x50003400
4,004,087 UART: [idev] ++
4,004,660 UART: [idev] CDI.KEYID = 6
4,005,684 UART: [idev] SUBJECT.KEYID = 7
4,006,859 UART: [idev] UDS.KEYID = 0
4,008,441 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,153,027 UART: [idev] Erasing UDS.KEYID = 0
7,342,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,575 UART: [idev] --
7,368,131 UART: [ldev] ++
7,368,708 UART: [ldev] CDI.KEYID = 6
7,369,683 UART: [ldev] SUBJECT.KEYID = 5
7,370,901 UART: [ldev] AUTHORITY.KEYID = 7
7,372,225 UART: [ldev] FE.KEYID = 1
7,419,369 UART: [ldev] Erasing FE.KEYID = 1
10,752,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,924 UART: [ldev] --
13,131,895 UART: [fwproc] Waiting for Commands...
13,135,062 UART: [fwproc] Received command 0x46574c44
13,137,259 UART: [fwproc] Received Image of size 114996 bytes
17,200,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,664,203 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,783,412 ready_for_fw is high
3,783,855 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,880,572 >>> mbox cmd response: success
23,564,542 UART:
23,564,918 UART: Running Caliptra FMC ...
23,566,024 UART:
23,566,180 UART: [state] CFI Enabled
23,635,721 UART: [fht] FMC Alias Private Key: 7
25,974,089 UART: [art] Extend RT PCRs Done
25,975,325 UART: [art] Lock RT PCRs Done
25,976,873 UART: [art] Populate DV Done
25,982,188 UART: [fht] FMC Alias Private Key: 7
25,983,732 UART: [art] Derive CDI
25,984,546 UART: [art] Store in in slot 0x4
26,043,547 UART: [art] Derive Key Pair
26,044,596 UART: [art] Store priv key in slot 0x5
29,337,593 UART: [art] Derive Key Pair - Done
29,350,215 UART: [art] Signing Cert with AUTHO
29,351,519 UART: RITY.KEYID = 7
31,638,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,660 UART: [art] PUB.X = E29941E0CC2D4A81B11B4CF837F958522266A2572990D36A8F23F0F887AC165A8D8BCAECA65105652CA655542D1FA8E5
31,646,870 UART: [art] PUB.Y = 36D1618F15045E548A6AE174F829276DC0A3E8216392F63ADE03968D97AFC7244B7231209525252EF0B87B73A9F65825
31,654,100 UART: [art] SIG.R = 96BC91F0703F1F8F417977E86D651E4B2DB76BE7626AE06650B3BF0CB67023BABFAD364DB7C6EF53B2D4FB480DECA372
31,661,527 UART: [art] SIG.S = D23C201748950CFDF61E1AF1B1130715C265807EB5BF15956697E8AAC29AA6472DF6BFFD6063DDBB63CD3BF63BEA19FB
32,966,497 UART: Caliptra RT
32,967,204 UART: [state] CFI Enabled
33,126,771 UART: [rt] RT listening for mailbox commands...
33,128,624 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,158,295 UART: [rt]cmd =0x46504c54, len=4
33,160,035 >>> mbox cmd response data (8 bytes)
33,161,306 UART: [rt] FIPS self test
33,162,248 UART: [kat] ++
33,162,699 UART: [kat] sha1
33,167,104 UART: [kat] SHA2-256
33,169,034 UART: [kat] SHA2-384
33,172,001 UART: [kat] SHA2-512-ACC
33,174,246 UART: [kat] ECC-384
36,441,876 UART: [kat] HMAC-384Kdf
36,449,409 UART: Fatal Error: 0x90030002
36,484,817 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,629,181 >>> mbox cmd response: failed
36,629,753 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,774,087 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,800,087 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,857,957 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,557 UART:
192,917 UART: Running Caliptra ROM ...
194,114 UART:
603,710 UART: [state] CFI Enabled
617,865 UART: [state] LifecycleState = Unprovisioned
619,737 UART: [state] DebugLocked = No
621,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,286 UART: [kat] SHA2-256
795,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,543 UART: [kat] ++
806,032 UART: [kat] sha1
817,002 UART: [kat] SHA2-256
819,665 UART: [kat] SHA2-384
825,161 UART: [kat] SHA2-512-ACC
827,542 UART: [kat] ECC-384
3,112,073 UART: [kat] HMAC-384Kdf
3,123,611 UART: [kat] LMS
4,313,750 UART: [kat] --
4,319,198 UART: [cold-reset] ++
4,321,497 UART: [fht] Storing FHT @ 0x50003400
4,332,765 UART: [idev] ++
4,333,341 UART: [idev] CDI.KEYID = 6
4,334,252 UART: [idev] SUBJECT.KEYID = 7
4,335,504 UART: [idev] UDS.KEYID = 0
4,336,586 ready_for_fw is high
4,336,803 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,481,230 UART: [idev] Erasing UDS.KEYID = 0
7,624,920 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,629 UART: [idev] --
7,651,167 UART: [ldev] ++
7,651,739 UART: [ldev] CDI.KEYID = 6
7,652,679 UART: [ldev] SUBJECT.KEYID = 5
7,653,946 UART: [ldev] AUTHORITY.KEYID = 7
7,655,179 UART: [ldev] FE.KEYID = 1
7,663,992 UART: [ldev] Erasing FE.KEYID = 1
10,951,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,867 UART: [ldev] --
13,313,051 UART: [fwproc] Waiting for Commands...
13,315,533 UART: [fwproc] Received command 0x46574c44
13,317,743 UART: [fwproc] Received Image of size 114996 bytes
17,381,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,039 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,846,309 >>> mbox cmd response: success
17,849,844 UART: [afmc] ++
17,850,491 UART: [afmc] CDI.KEYID = 6
17,851,404 UART: [afmc] SUBJECT.KEYID = 7
17,852,614 UART: [afmc] AUTHORITY.KEYID = 5
21,164,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,902 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,273 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,072 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,537 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,463 UART: [afmc] --
23,528,815 UART: [cold-reset] --
23,531,062 UART: [state] Locking Datavault
23,535,446 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,199 UART: [state] Locking ICCM
23,538,970 UART: [exit] Launching FMC @ 0x40000130
23,547,366 UART:
23,547,603 UART: Running Caliptra FMC ...
23,548,707 UART:
23,548,869 UART: [state] CFI Enabled
23,556,862 UART: [fht] FMC Alias Private Key: 7
25,887,691 UART: [art] Extend RT PCRs Done
25,888,925 UART: [art] Lock RT PCRs Done
25,890,585 UART: [art] Populate DV Done
25,895,891 UART: [fht] FMC Alias Private Key: 7
25,897,538 UART: [art] Derive CDI
25,898,277 UART: [art] Store in in slot 0x4
25,940,731 UART: [art] Derive Key Pair
25,941,774 UART: [art] Store priv key in slot 0x5
29,184,089 UART: [art] Derive Key Pair - Done
29,197,381 UART: [art] Signing Cert with AUTHO
29,198,724 UART: RITY.KEYID = 7
31,477,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,441 UART: [art] PUB.X = 3949E70AF83756346B0BCE0B72FC5BE8420A159D6CCC6BAC2CB54D97F2A6F4CFA6A535192E59CC9BCB5CC9CC9952DC25
31,486,717 UART: [art] PUB.Y = 929B3584911B4F2AB04A33C803044EE2BDADCFAD38E8BEF6C9624A588240916863C1A7E5D1EBE4BC854E047694E27653
31,493,964 UART: [art] SIG.R = F3F59D9184AAB1E37476654A9F2C958F6C44B94C137667E5B9668E41991D24EFC8CFD831960D99BCC16B482C634C53F4
31,501,313 UART: [art] SIG.S = 866CE3B2DD52B9B44905E8CCBA255A08789F87FD59E88B816595A5BCB8FF9012AE25E6F71D105B6A6D4A5BF07C2315F4
32,806,252 UART: Caliptra RT
32,806,972 UART: [state] CFI Enabled
32,924,362 UART: [rt] RT listening for mailbox commands...
32,926,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,955,834 UART: [rt]cmd =0x46504c54, len=4
32,957,327 >>> mbox cmd response data (8 bytes)
32,958,192 UART: [rt] FIPS self test
32,959,138 UART: [kat] ++
32,959,590 UART: [kat] sha1
32,964,102 UART: [kat] SHA2-256
32,966,033 UART: [kat] SHA2-384
32,968,832 UART: [kat] SHA2-512-ACC
32,971,070 UART: [kat] ECC-384
36,213,600 UART: [kat] HMAC-384Kdf
36,219,185 UART: Fatal Error: 0x90030002
36,254,571 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,399,068 >>> mbox cmd response: failed
36,399,662 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,544,294 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,122 UART:
190,434 UART: Running Caliptra ROM ...
191,464 UART:
3,982,901 UART: [state] CFI Enabled
3,995,810 UART: [state] LifecycleState = Unprovisioned
3,997,722 UART: [state] DebugLocked = No
3,999,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,004,271 UART: [kat] SHA2-256
4,174,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,184,527 UART: [kat] ++
4,184,991 UART: [kat] sha1
4,196,626 UART: [kat] SHA2-256
4,199,335 UART: [kat] SHA2-384
4,204,729 UART: [kat] SHA2-512-ACC
4,207,080 UART: [kat] ECC-384
6,491,445 UART: [kat] HMAC-384Kdf
6,502,324 UART: [kat] LMS
7,692,416 UART: [kat] --
7,696,656 UART: [cold-reset] ++
7,698,322 UART: [fht] Storing FHT @ 0x50003400
7,708,455 UART: [idev] ++
7,709,020 UART: [idev] CDI.KEYID = 6
7,709,908 UART: [idev] SUBJECT.KEYID = 7
7,711,178 UART: [idev] UDS.KEYID = 0
7,712,725 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,857,166 UART: [idev] Erasing UDS.KEYID = 0
10,990,807 UART: [idev] Using Sha1 for KeyId Algorithm
11,011,596 UART: [idev] --
11,014,088 UART: [ldev] ++
11,014,661 UART: [ldev] CDI.KEYID = 6
11,015,630 UART: [ldev] SUBJECT.KEYID = 5
11,016,849 UART: [ldev] AUTHORITY.KEYID = 7
11,018,082 UART: [ldev] FE.KEYID = 1
11,029,609 UART: [ldev] Erasing FE.KEYID = 1
14,320,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,613,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,628,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,643,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,657,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,675,496 UART: [ldev] --
16,680,914 UART: [fwproc] Waiting for Commands...
16,684,264 UART: [fwproc] Received command 0x46574c44
16,686,465 UART: [fwproc] Received Image of size 114996 bytes
20,755,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,829,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,898,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,218,643 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
4,128,170 ready_for_fw is high
4,128,820 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,085,652 >>> mbox cmd response: success
23,724,874 UART:
23,725,330 UART: Running Caliptra FMC ...
23,726,453 UART:
23,726,614 UART: [state] CFI Enabled
23,735,074 UART: [fht] FMC Alias Private Key: 7
26,065,087 UART: [art] Extend RT PCRs Done
26,066,333 UART: [art] Lock RT PCRs Done
26,068,260 UART: [art] Populate DV Done
26,073,744 UART: [fht] FMC Alias Private Key: 7
26,075,298 UART: [art] Derive CDI
26,076,066 UART: [art] Store in in slot 0x4
26,118,664 UART: [art] Derive Key Pair
26,119,670 UART: [art] Store priv key in slot 0x5
29,362,391 UART: [art] Derive Key Pair - Done
29,375,184 UART: [art] Signing Cert with AUTHO
29,376,485 UART: RITY.KEYID = 7
31,656,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,581 UART: [art] PUB.X = 7EE45C71DC7915FF9F5073030A68FCE26D6C3F2BB16DD7049A1548ECC93E329E251A762C50613A5EA40C4E63304E9041
31,664,780 UART: [art] PUB.Y = 9F25BBEBF6D07D1D9FD4875894C10BC7BEC39C1C9E4FEF21BC04C28378965E632AA654DC5850BD67E63F866969B80055
31,671,997 UART: [art] SIG.R = 61EFE8FFAF99F3E1E487FC1301CE420761C53926F4126D22A2BAFA252898D603FE3C13349C47BBB9430A52DBA4491115
31,679,389 UART: [art] SIG.S = DC94BF7CC35DF30EA4645E8A70C11CD926E0DCACC81F6D165A01CF4E619629AA78ED13AA470DEE2CE8339AA60A510A83
32,984,896 UART: Caliptra RT
32,985,613 UART: [state] CFI Enabled
33,103,413 UART: [rt] RT listening for mailbox commands...
33,105,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,134,740 UART: [rt]cmd =0x46504c54, len=4
33,136,216 >>> mbox cmd response data (8 bytes)
33,137,388 UART: [rt] FIPS self test
33,138,325 UART: [kat] ++
33,138,778 UART: [kat] sha1
33,143,340 UART: [kat] SHA2-256
33,145,269 UART: [kat] SHA2-384
33,148,211 UART: [kat] SHA2-512-ACC
33,150,467 UART: [kat] ECC-384
36,393,249 UART: [kat] HMAC-384Kdf
36,398,839 UART: Fatal Error: 0x90030002
36,434,072 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,578,540 >>> mbox cmd response: failed
36,579,194 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,723,608 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
7,329,891 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,297,568 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,203 UART:
192,591 UART: Running Caliptra ROM ...
193,796 UART:
193,951 UART: [state] CFI Enabled
265,450 UART: [state] LifecycleState = Unprovisioned
267,290 UART: [state] DebugLocked = No
268,761 UART: [state] WD Timer not started. Device not locked for debugging
273,284 UART: [kat] SHA2-256
452,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,956 UART: [kat] ++
464,502 UART: [kat] sha1
475,244 UART: [kat] SHA2-256
478,252 UART: [kat] SHA2-384
482,962 UART: [kat] SHA2-512-ACC
485,900 UART: [kat] ECC-384
2,947,775 UART: [kat] HMAC-384Kdf
2,971,738 UART: [kat] LMS
3,501,200 UART: [kat] --
3,505,063 UART: [cold-reset] ++
3,507,356 UART: [fht] FHT @ 0x50003400
3,517,842 UART: [idev] ++
3,518,413 UART: [idev] CDI.KEYID = 6
3,519,337 UART: [idev] SUBJECT.KEYID = 7
3,520,513 UART: [idev] UDS.KEYID = 0
3,521,443 ready_for_fw is high
3,521,679 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,806 UART: [idev] Erasing UDS.KEYID = 0
6,028,031 UART: [idev] Sha1 KeyId Algorithm
6,049,878 UART: [idev] --
6,053,387 UART: [ldev] ++
6,053,963 UART: [ldev] CDI.KEYID = 6
6,054,854 UART: [ldev] SUBJECT.KEYID = 5
6,056,069 UART: [ldev] AUTHORITY.KEYID = 7
6,057,327 UART: [ldev] FE.KEYID = 1
6,100,394 UART: [ldev] Erasing FE.KEYID = 1
8,599,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,219 UART: [ldev] --
10,388,673 UART: [fwproc] Wait for Commands...
10,390,288 UART: [fwproc] Recv command 0x46574c44
10,392,385 UART: [fwproc] Recv'd Img size: 115304 bytes
13,802,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,813 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,262,124 >>> mbox cmd response: success
14,267,225 UART: [afmc] ++
14,267,835 UART: [afmc] CDI.KEYID = 6
14,268,898 UART: [afmc] SUBJECT.KEYID = 7
14,270,006 UART: [afmc] AUTHORITY.KEYID = 5
16,805,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,725 UART: [afmc] --
18,604,679 UART: [cold-reset] --
18,608,970 UART: [state] Locking Datavault
18,614,486 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,194 UART: [state] Locking ICCM
18,617,318 UART: [exit] Launching FMC @ 0x40000130
18,625,707 UART:
18,625,961 UART: Running Caliptra FMC ...
18,627,061 UART:
18,627,225 UART: [state] CFI Enabled
18,687,376 UART: [fht] FMC Alias Private Key: 7
20,450,937 UART: [art] Extend RT PCRs Done
20,452,161 UART: [art] Lock RT PCRs Done
20,453,895 UART: [art] Populate DV Done
20,459,527 UART: [fht] FMC Alias Private Key: 7
20,461,180 UART: [art] Derive CDI
20,461,995 UART: [art] Store in in slot 0x4
20,519,747 UART: [art] Derive Key Pair
20,520,781 UART: [art] Store priv key in slot 0x5
22,983,758 UART: [art] Derive Key Pair - Done
22,996,703 UART: [art] Signing Cert with AUTHO
22,998,010 UART: RITY.KEYID = 7
24,709,062 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,601 UART: [art] PUB.X = A19556540D46FBA7C541C300BC49850C2BCBC9AFA6A9DA776B152CA37740DF8C36A7BDE714DDFDFADC180E7DC447B898
24,717,814 UART: [art] PUB.Y = DD885D19F784C39AAACA2DDEF770DDD698AA0B61F88A496F3BEB6F70D0E91E512C560BF3C872114A1BF62BFCC2D6A402
24,725,113 UART: [art] SIG.R = DB97962691342B5C3D25943BCAAAD0F5C524FB47812491845A711825FD27F1F963D4751993B87F870DF9ACF2D3732886
24,732,458 UART: [art] SIG.S = 73321BF951E7345F166DE3B485A5D95ECB117A88C338F2649FFD8E8E8879B21005E8BAAB6FA8255856E5964D355048F7
25,711,733 UART: Caliptra RT
25,712,449 UART: [state] CFI Enabled
25,876,213 UART: [rt] RT listening for mailbox commands...
25,878,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,907,902 UART: [rt]cmd =0x46504c54, len=4
25,909,538 >>> mbox cmd response data (8 bytes)
25,910,763 UART: [rt] FIPS self test
25,911,708 UART: [kat] ++
25,912,160 UART: [kat] sha1
25,916,667 UART: [kat] SHA2-256
25,918,595 UART: [kat] SHA2-384
25,921,554 UART: [kat] SHA2-512-ACC
25,923,810 UART: [kat] ECC-384
28,361,345 UART: [kat] HMAC-384Kdf
28,387,384 UART: Fatal Error: 0x90030002
28,422,777 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,567,481 >>> mbox cmd response: failed
28,568,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,712,877 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,130 UART:
190,422 UART: Running Caliptra ROM ...
191,532 UART:
191,696 UART: [state] CFI Enabled
258,718 UART: [state] LifecycleState = Unprovisioned
260,600 UART: [state] DebugLocked = No
263,378 UART: [state] WD Timer not started. Device not locked for debugging
266,913 UART: [kat] SHA2-256
446,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,608 UART: [kat] ++
458,138 UART: [kat] sha1
468,968 UART: [kat] SHA2-256
472,026 UART: [kat] SHA2-384
478,004 UART: [kat] SHA2-512-ACC
480,943 UART: [kat] ECC-384
2,942,105 UART: [kat] HMAC-384Kdf
2,963,681 UART: [kat] LMS
3,493,120 UART: [kat] --
3,497,818 UART: [cold-reset] ++
3,498,992 UART: [fht] FHT @ 0x50003400
3,509,731 UART: [idev] ++
3,510,299 UART: [idev] CDI.KEYID = 6
3,511,240 UART: [idev] SUBJECT.KEYID = 7
3,512,472 UART: [idev] UDS.KEYID = 0
3,514,151 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,233 UART: [idev] Erasing UDS.KEYID = 0
6,019,798 UART: [idev] Sha1 KeyId Algorithm
6,041,595 UART: [idev] --
6,044,755 UART: [ldev] ++
6,045,338 UART: [ldev] CDI.KEYID = 6
6,046,249 UART: [ldev] SUBJECT.KEYID = 5
6,047,469 UART: [ldev] AUTHORITY.KEYID = 7
6,048,713 UART: [ldev] FE.KEYID = 1
6,092,900 UART: [ldev] Erasing FE.KEYID = 1
8,596,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,892 UART: [ldev] --
10,409,157 UART: [fwproc] Wait for Commands...
10,410,876 UART: [fwproc] Recv command 0x46574c44
10,412,971 UART: [fwproc] Recv'd Img size: 115304 bytes
13,827,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,330 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,293 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,358,995 ready_for_fw is high
3,359,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,083,063 >>> mbox cmd response: success
18,364,501 UART:
18,364,925 UART: Running Caliptra FMC ...
18,366,060 UART:
18,366,229 UART: [state] CFI Enabled
18,433,010 UART: [fht] FMC Alias Private Key: 7
20,197,092 UART: [art] Extend RT PCRs Done
20,198,312 UART: [art] Lock RT PCRs Done
20,199,934 UART: [art] Populate DV Done
20,205,124 UART: [fht] FMC Alias Private Key: 7
20,206,663 UART: [art] Derive CDI
20,207,574 UART: [art] Store in in slot 0x4
20,265,741 UART: [art] Derive Key Pair
20,266,777 UART: [art] Store priv key in slot 0x5
22,730,121 UART: [art] Derive Key Pair - Done
22,743,067 UART: [art] Signing Cert with AUTHO
22,744,373 UART: RITY.KEYID = 7
24,456,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,631 UART: [art] PUB.X = 01E7647F2D5E0DB56F54757DE81AAA0FA8A50BC076AF77188B396A39DB1CD44F7E03405C4C0E07BDE4ACE90EA56D12EA
24,464,943 UART: [art] PUB.Y = 26D962D68DC9B0E735CA9E38708941F59A303D1528F7A92E70BB826955DD90BA59C2274C6F12FC1BC79206B6C3F0F366
24,472,172 UART: [art] SIG.R = 950F6CDFEE10F695459798AB29EBA6410B8BE4887BCB9480D598D7FC3EEB0C2A48B80DD3520752A32196F5408AA10C8D
24,479,915 UART: [art] SIG.S = 43E30C9003882ACBB28CAD10A78B145ACE9BCF8AC94E659CCE71D085B64C78E640EE98018D145F40C8BF7FEFD2B16115
25,458,201 UART: Caliptra RT
25,458,905 UART: [state] CFI Enabled
25,625,539 UART: [rt] RT listening for mailbox commands...
25,627,388 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,076 UART: [rt]cmd =0x46504c54, len=4
25,658,528 >>> mbox cmd response data (8 bytes)
25,659,421 UART: [rt] FIPS self test
25,660,365 UART: [kat] ++
25,660,819 UART: [kat] sha1
25,665,491 UART: [kat] SHA2-256
25,667,382 UART: [kat] SHA2-384
25,670,238 UART: [kat] SHA2-512-ACC
25,672,529 UART: [kat] ECC-384
28,110,174 UART: [kat] HMAC-384Kdf
28,116,743 UART: Fatal Error: 0x90030002
28,151,979 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,296,786 >>> mbox cmd response: failed
28,297,447 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,442,237 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,356,248 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,049,203 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,751 UART:
193,189 UART: Running Caliptra ROM ...
194,366 UART:
603,807 UART: [state] CFI Enabled
615,497 UART: [state] LifecycleState = Unprovisioned
617,406 UART: [state] DebugLocked = No
618,657 UART: [state] WD Timer not started. Device not locked for debugging
623,204 UART: [kat] SHA2-256
802,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,899 UART: [kat] ++
814,347 UART: [kat] sha1
825,857 UART: [kat] SHA2-256
828,863 UART: [kat] SHA2-384
835,221 UART: [kat] SHA2-512-ACC
838,229 UART: [kat] ECC-384
3,281,221 UART: [kat] HMAC-384Kdf
3,294,535 UART: [kat] LMS
3,824,020 UART: [kat] --
3,828,591 UART: [cold-reset] ++
3,830,462 UART: [fht] FHT @ 0x50003400
3,841,517 UART: [idev] ++
3,842,087 UART: [idev] CDI.KEYID = 6
3,843,132 UART: [idev] SUBJECT.KEYID = 7
3,844,262 UART: [idev] UDS.KEYID = 0
3,845,199 ready_for_fw is high
3,845,419 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,261 UART: [idev] Erasing UDS.KEYID = 0
6,318,706 UART: [idev] Sha1 KeyId Algorithm
6,341,346 UART: [idev] --
6,345,612 UART: [ldev] ++
6,346,188 UART: [ldev] CDI.KEYID = 6
6,347,098 UART: [ldev] SUBJECT.KEYID = 5
6,348,263 UART: [ldev] AUTHORITY.KEYID = 7
6,349,498 UART: [ldev] FE.KEYID = 1
6,360,956 UART: [ldev] Erasing FE.KEYID = 1
8,830,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,414 UART: [ldev] --
10,622,719 UART: [fwproc] Wait for Commands...
10,625,527 UART: [fwproc] Recv command 0x46574c44
10,627,567 UART: [fwproc] Recv'd Img size: 115304 bytes
14,038,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,607 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,492,164 >>> mbox cmd response: success
14,496,404 UART: [afmc] ++
14,496,994 UART: [afmc] CDI.KEYID = 6
14,497,903 UART: [afmc] SUBJECT.KEYID = 7
14,499,066 UART: [afmc] AUTHORITY.KEYID = 5
16,999,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,520 UART: [afmc] --
18,796,226 UART: [cold-reset] --
18,800,141 UART: [state] Locking Datavault
18,805,063 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,766 UART: [state] Locking ICCM
18,809,107 UART: [exit] Launching FMC @ 0x40000130
18,817,556 UART:
18,817,794 UART: Running Caliptra FMC ...
18,818,899 UART:
18,819,061 UART: [state] CFI Enabled
18,827,382 UART: [fht] FMC Alias Private Key: 7
20,585,336 UART: [art] Extend RT PCRs Done
20,586,569 UART: [art] Lock RT PCRs Done
20,588,489 UART: [art] Populate DV Done
20,593,740 UART: [fht] FMC Alias Private Key: 7
20,595,282 UART: [art] Derive CDI
20,596,097 UART: [art] Store in in slot 0x4
20,638,713 UART: [art] Derive Key Pair
20,639,755 UART: [art] Store priv key in slot 0x5
23,066,787 UART: [art] Derive Key Pair - Done
23,080,164 UART: [art] Signing Cert with AUTHO
23,081,478 UART: RITY.KEYID = 7
24,787,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,607 UART: [art] PUB.X = 77657705391ED9C84992DE0B6ABC553E554E29E99E44BAEC19875B24CE1CF085914E57F0C66FACA1F9331A700446576F
24,795,859 UART: [art] PUB.Y = 7F375C9298E1B20768DED29DA17DE8019A599F97EBD7DBB970D73BCBD037608496165518BC9612A7D23AAA4CC321C8DB
24,803,155 UART: [art] SIG.R = A73F4260E856801A2FEC3B5DDD4C1108896462E1A1F220D8ED67453CC98E2EC71B670AF6039B040B2D6DFCD7367A5B56
24,810,548 UART: [art] SIG.S = 0E50DB761A5F900746ED3822728EBDB0020633C1A66A3EBCF83D94BA003272EAD900A3B1C5CC8E6E896AE21104709DBF
25,789,021 UART: Caliptra RT
25,789,726 UART: [state] CFI Enabled
25,906,234 UART: [rt] RT listening for mailbox commands...
25,908,085 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,937,816 UART: [rt]cmd =0x46504c54, len=4
25,939,283 >>> mbox cmd response data (8 bytes)
25,940,604 UART: [rt] FIPS self test
25,941,544 UART: [kat] ++
25,941,998 UART: [kat] sha1
25,946,615 UART: [kat] SHA2-256
25,948,492 UART: [kat] SHA2-384
25,951,452 UART: [kat] SHA2-512-ACC
25,953,688 UART: [kat] ECC-384
28,380,876 UART: [kat] HMAC-384Kdf
28,386,356 UART: Fatal Error: 0x90030002
28,421,591 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,566,458 >>> mbox cmd response: failed
28,567,090 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,711,839 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,100 UART:
190,391 UART: Running Caliptra ROM ...
191,504 UART:
11,818,231 UART: [state] CFI Enabled
11,830,820 UART: [state] LifecycleState = Unprovisioned
11,832,682 UART: [state] DebugLocked = No
11,834,062 UART: [state] WD Timer not started. Device not locked for debugging
11,838,352 UART: [kat] SHA2-256
12,017,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,029,042 UART: [kat] ++
12,029,598 UART: [kat] sha1
12,040,174 UART: [kat] SHA2-256
12,043,189 UART: [kat] SHA2-384
12,049,089 UART: [kat] SHA2-512-ACC
12,052,044 UART: [kat] ECC-384
14,495,748 UART: [kat] HMAC-384Kdf
14,507,438 UART: [kat] LMS
15,036,978 UART: [kat] --
15,042,427 UART: [cold-reset] ++
15,044,041 UART: [fht] FHT @ 0x50003400
15,054,757 UART: [idev] ++
15,055,325 UART: [idev] CDI.KEYID = 6
15,056,235 UART: [idev] SUBJECT.KEYID = 7
15,057,397 UART: [idev] UDS.KEYID = 0
15,059,039 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,203,828 UART: [idev] Erasing UDS.KEYID = 0
17,530,096 UART: [idev] Sha1 KeyId Algorithm
17,553,109 UART: [idev] --
17,556,882 UART: [ldev] ++
17,557,466 UART: [ldev] CDI.KEYID = 6
17,558,373 UART: [ldev] SUBJECT.KEYID = 5
17,559,530 UART: [ldev] AUTHORITY.KEYID = 7
17,560,815 UART: [ldev] FE.KEYID = 1
17,570,531 UART: [ldev] Erasing FE.KEYID = 1
20,045,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,761,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,777,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,793,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,808,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,828,870 UART: [ldev] --
21,833,393 UART: [fwproc] Wait for Commands...
21,835,058 UART: [fwproc] Recv command 0x46574c44
21,837,160 UART: [fwproc] Recv'd Img size: 115304 bytes
25,254,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,329,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,398,135 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,719,806 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,696,666 ready_for_fw is high
3,697,064 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,287,617 >>> mbox cmd response: success
18,535,691 UART:
18,536,088 UART: Running Caliptra FMC ...
18,537,245 UART:
18,537,403 UART: [state] CFI Enabled
18,544,852 UART: [fht] FMC Alias Private Key: 7
20,301,956 UART: [art] Extend RT PCRs Done
20,303,183 UART: [art] Lock RT PCRs Done
20,304,602 UART: [art] Populate DV Done
20,310,002 UART: [fht] FMC Alias Private Key: 7
20,311,505 UART: [art] Derive CDI
20,312,244 UART: [art] Store in in slot 0x4
20,354,564 UART: [art] Derive Key Pair
20,355,584 UART: [art] Store priv key in slot 0x5
22,783,255 UART: [art] Derive Key Pair - Done
22,796,144 UART: [art] Signing Cert with AUTHO
22,797,446 UART: RITY.KEYID = 7
24,503,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,504,594 UART: [art] PUB.X = 8C6FEDD01B88B8B5A043BA820D0FA60E9E0AC66624ED4AE30444E91234C0ABAA00BD8EEFD7364E4D3387B9C2567DC552
24,511,852 UART: [art] PUB.Y = 701B71EB21CDA1E1196E06FC1A0E94F9E7FB3E8634C67721AEECEBB96257F4C812771CD9B73DEDFFE3A3B3389542C719
24,519,126 UART: [art] SIG.R = 3791FEB82E5FF2622B274E9AB3617B797C93FC31DB7634492A9772CB6027DB9D3D0E27E1F90847B258160A30D12B0109
24,526,541 UART: [art] SIG.S = 5861493401B655133048476D1372CD48F84154B5CBE85B0E61D3E9F27D044EEDFA1CF062A742D32D8BBA813CB7DD98AE
25,505,954 UART: Caliptra RT
25,506,665 UART: [state] CFI Enabled
25,623,726 UART: [rt] RT listening for mailbox commands...
25,625,580 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,050 UART: [rt]cmd =0x46504c54, len=4
25,656,682 >>> mbox cmd response data (8 bytes)
25,657,843 UART: [rt] FIPS self test
25,658,799 UART: [kat] ++
25,659,259 UART: [kat] sha1
25,663,571 UART: [kat] SHA2-256
25,665,490 UART: [kat] SHA2-384
25,668,455 UART: [kat] SHA2-512-ACC
25,670,730 UART: [kat] ECC-384
28,097,944 UART: [kat] HMAC-384Kdf
28,103,529 UART: Fatal Error: 0x90030002
28,138,757 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,283,529 >>> mbox cmd response: failed
28,284,181 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,428,971 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
15,194,064 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,788,999 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,182 UART:
192,553 UART: Running Caliptra ROM ...
193,657 UART:
193,798 UART: [state] CFI Enabled
265,282 UART: [state] LifecycleState = Unprovisioned
267,626 UART: [state] DebugLocked = No
270,004 UART: [state] WD Timer not started. Device not locked for debugging
275,050 UART: [kat] SHA2-256
464,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,681 UART: [kat] ++
476,125 UART: [kat] sha1
487,360 UART: [kat] SHA2-256
490,378 UART: [kat] SHA2-384
495,306 UART: [kat] SHA2-512-ACC
497,891 UART: [kat] ECC-384
2,949,657 UART: [kat] HMAC-384Kdf
2,973,103 UART: [kat] LMS
3,504,926 UART: [kat] --
3,510,516 UART: [cold-reset] ++
3,511,677 UART: [fht] FHT @ 0x50003400
3,522,166 UART: [idev] ++
3,522,813 UART: [idev] CDI.KEYID = 6
3,523,800 UART: [idev] SUBJECT.KEYID = 7
3,524,976 UART: [idev] UDS.KEYID = 0
3,525,903 ready_for_fw is high
3,526,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,234 UART: [idev] Erasing UDS.KEYID = 0
6,031,415 UART: [idev] Sha1 KeyId Algorithm
6,053,508 UART: [idev] --
6,058,746 UART: [ldev] ++
6,059,432 UART: [ldev] CDI.KEYID = 6
6,060,341 UART: [ldev] SUBJECT.KEYID = 5
6,061,583 UART: [ldev] AUTHORITY.KEYID = 7
6,062,763 UART: [ldev] FE.KEYID = 1
6,101,175 UART: [ldev] Erasing FE.KEYID = 1
8,609,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,276 UART: [ldev] --
10,416,111 UART: [fwproc] Wait for Commands...
10,418,753 UART: [fwproc] Recv command 0x46574c44
10,420,898 UART: [fwproc] Recv'd Img size: 115304 bytes
13,881,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,622 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,624,864 >>> mbox cmd response: success
14,629,343 UART: [afmc] ++
14,630,045 UART: [afmc] CDI.KEYID = 6
14,631,202 UART: [afmc] SUBJECT.KEYID = 7
14,632,737 UART: [afmc] AUTHORITY.KEYID = 5
17,175,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,900,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,902,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,917,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,971,587 UART: [afmc] --
18,975,068 UART: [cold-reset] --
18,979,102 UART: [state] Locking Datavault
18,984,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,987,133 UART: [state] Locking ICCM
18,989,123 UART: [exit] Launching FMC @ 0x40000130
18,997,814 UART:
18,998,055 UART: Running Caliptra FMC ...
18,999,162 UART:
18,999,320 UART: [state] CFI Enabled
19,055,569 UART: [fht] FMC Alias Private Key: 7
20,820,353 UART: [art] Extend RT PCRs Done
20,821,600 UART: [art] Lock RT PCRs Done
20,823,472 UART: [art] Populate DV Done
20,828,936 UART: [fht] FMC Alias Private Key: 7
20,830,632 UART: [art] Derive CDI
20,831,371 UART: [art] Store in in slot 0x4
20,888,467 UART: [art] Derive Key Pair
20,889,469 UART: [art] Store priv key in slot 0x5
23,353,054 UART: [art] Derive Key Pair - Done
23,365,948 UART: [art] Signing Cert with AUTHO
23,367,255 UART: RITY.KEYID = 7
25,078,519 UART: [art] Erasing AUTHORITY.KEYID = 7
25,080,030 UART: [art] PUB.X = E2945DEB3FE2BEFCF2F26FD7D759E8F52EDB9FD64B2FFE0CB1C99998DB3D34ECF631244D33B54407D69A125846384FB0
25,087,354 UART: [art] PUB.Y = 3F92C1D855CFDAB6CA48169D703D115427663F68113B061D9B6F49325CBE588D95AE72208048B2CD6BBE0C5487BC5529
25,094,592 UART: [art] SIG.R = 2282F1781CAA629C695E64B75F1E55BAAA9EDF7377B044DD91AB2D9C7C26698EB2F7FF9AAB90D474AE9F98EE434F97FD
25,102,001 UART: [art] SIG.S = E5E57EB3E72FB9DE9B54860AAB3729B0CF7945DD3B1EFDECC867C224BE171978186994ABDA5BE6CB99FFE323FF84DA02
26,081,250 UART: Caliptra RT
26,081,961 UART: [state] CFI Enabled
26,246,851 UART: [rt] RT listening for mailbox commands...
26,248,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,278,511 UART: [rt]cmd =0x46504c54, len=4
26,279,963 >>> mbox cmd response data (8 bytes)
26,281,313 UART: [rt] FIPS self test
26,282,259 UART: [kat] ++
26,282,709 UART: [kat] sha1
26,287,164 UART: [kat] SHA2-256
26,289,095 UART: [kat] SHA2-384
26,291,968 UART: [kat] SHA2-512-ACC
26,294,208 UART: [kat] ECC-384
28,731,374 UART: [kat] HMAC-384Kdf
28,757,609 UART: Fatal Error: 0x90030002
28,792,875 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,937,699 >>> mbox cmd response: failed
28,938,364 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,083,092 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,092 UART:
190,376 UART: Running Caliptra ROM ...
191,481 UART:
191,627 UART: [state] CFI Enabled
256,160 UART: [state] LifecycleState = Unprovisioned
258,562 UART: [state] DebugLocked = No
261,198 UART: [state] WD Timer not started. Device not locked for debugging
266,611 UART: [kat] SHA2-256
456,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,266 UART: [kat] ++
467,711 UART: [kat] sha1
478,862 UART: [kat] SHA2-256
481,867 UART: [kat] SHA2-384
488,334 UART: [kat] SHA2-512-ACC
490,891 UART: [kat] ECC-384
2,946,245 UART: [kat] HMAC-384Kdf
2,967,987 UART: [kat] LMS
3,499,719 UART: [kat] --
3,503,782 UART: [cold-reset] ++
3,505,942 UART: [fht] FHT @ 0x50003400
3,516,429 UART: [idev] ++
3,517,106 UART: [idev] CDI.KEYID = 6
3,518,091 UART: [idev] SUBJECT.KEYID = 7
3,519,257 UART: [idev] UDS.KEYID = 0
3,520,764 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,665,707 UART: [idev] Erasing UDS.KEYID = 0
6,024,267 UART: [idev] Sha1 KeyId Algorithm
6,046,602 UART: [idev] --
6,051,893 UART: [ldev] ++
6,052,580 UART: [ldev] CDI.KEYID = 6
6,053,491 UART: [ldev] SUBJECT.KEYID = 5
6,054,653 UART: [ldev] AUTHORITY.KEYID = 7
6,055,973 UART: [ldev] FE.KEYID = 1
6,094,788 UART: [ldev] Erasing FE.KEYID = 1
8,601,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,519 UART: [ldev] --
10,407,196 UART: [fwproc] Wait for Commands...
10,409,885 UART: [fwproc] Recv command 0x46574c44
10,412,197 UART: [fwproc] Recv'd Img size: 115304 bytes
13,871,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,560 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,619,327 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,437,726 ready_for_fw is high
3,438,116 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,757,105 >>> mbox cmd response: success
19,063,417 UART:
19,063,872 UART: Running Caliptra FMC ...
19,064,995 UART:
19,065,149 UART: [state] CFI Enabled
19,134,994 UART: [fht] FMC Alias Private Key: 7
20,899,048 UART: [art] Extend RT PCRs Done
20,900,280 UART: [art] Lock RT PCRs Done
20,901,601 UART: [art] Populate DV Done
20,906,963 UART: [fht] FMC Alias Private Key: 7
20,908,583 UART: [art] Derive CDI
20,909,402 UART: [art] Store in in slot 0x4
20,967,635 UART: [art] Derive Key Pair
20,968,679 UART: [art] Store priv key in slot 0x5
23,431,218 UART: [art] Derive Key Pair - Done
23,443,893 UART: [art] Signing Cert with AUTHO
23,445,197 UART: RITY.KEYID = 7
25,156,663 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,172 UART: [art] PUB.X = 6CA6087A5B4335E1AB60536ABCB8CC619F8EEDFA454D977A0D70DA6BE0D516F526841622EA5E2999AD171FDA93DC5025
25,165,487 UART: [art] PUB.Y = AA6357E23FF92C7A00D72B1C7CFBAE282CCBB6D4469CADEDAE37CD28A3C306A88E13FD0A5FE483F05830CF9E0A66B136
25,172,741 UART: [art] SIG.R = C38EF89930E5ABE72D1CCEA010667E89223319336031A86C02F3BDD65BA4F450026318EC93EF68468981EA2C521D68C9
25,180,131 UART: [art] SIG.S = 7CC3F61E9A7E585F93D4FA0A9D6954A69265622E132B37DA413C80F85E2EF7FCC96E31E7FF6E38CF18A0597D185182DB
26,159,240 UART: Caliptra RT
26,159,930 UART: [state] CFI Enabled
26,322,511 UART: [rt] RT listening for mailbox commands...
26,324,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,163 UART: [rt]cmd =0x46504c54, len=4
26,355,799 >>> mbox cmd response data (8 bytes)
26,356,743 UART: [rt] FIPS self test
26,357,680 UART: [kat] ++
26,358,132 UART: [kat] sha1
26,362,372 UART: [kat] SHA2-256
26,364,307 UART: [kat] SHA2-384
26,367,215 UART: [kat] SHA2-512-ACC
26,369,480 UART: [kat] ECC-384
28,808,320 UART: [kat] HMAC-384Kdf
28,834,256 UART: Fatal Error: 0x90030002
28,869,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,014,352 >>> mbox cmd response: failed
29,014,927 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,159,724 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,432,293 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,738,780 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,427 UART:
192,790 UART: Running Caliptra ROM ...
193,980 UART:
603,725 UART: [state] CFI Enabled
616,529 UART: [state] LifecycleState = Unprovisioned
618,924 UART: [state] DebugLocked = No
621,733 UART: [state] WD Timer not started. Device not locked for debugging
626,919 UART: [kat] SHA2-256
816,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,621 UART: [kat] ++
828,223 UART: [kat] sha1
840,188 UART: [kat] SHA2-256
843,175 UART: [kat] SHA2-384
850,329 UART: [kat] SHA2-512-ACC
852,916 UART: [kat] ECC-384
3,296,103 UART: [kat] HMAC-384Kdf
3,309,594 UART: [kat] LMS
3,841,428 UART: [kat] --
3,844,155 UART: [cold-reset] ++
3,845,949 UART: [fht] FHT @ 0x50003400
3,857,144 UART: [idev] ++
3,857,789 UART: [idev] CDI.KEYID = 6
3,858,781 UART: [idev] SUBJECT.KEYID = 7
3,859,900 UART: [idev] UDS.KEYID = 0
3,860,889 ready_for_fw is high
3,861,101 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,006,373 UART: [idev] Erasing UDS.KEYID = 0
6,340,819 UART: [idev] Sha1 KeyId Algorithm
6,364,155 UART: [idev] --
6,369,276 UART: [ldev] ++
6,369,974 UART: [ldev] CDI.KEYID = 6
6,370,860 UART: [ldev] SUBJECT.KEYID = 5
6,371,962 UART: [ldev] AUTHORITY.KEYID = 7
6,373,248 UART: [ldev] FE.KEYID = 1
6,385,026 UART: [ldev] Erasing FE.KEYID = 1
8,859,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,472 UART: [ldev] --
10,650,301 UART: [fwproc] Wait for Commands...
10,652,179 UART: [fwproc] Recv command 0x46574c44
10,654,494 UART: [fwproc] Recv'd Img size: 115304 bytes
14,114,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,198,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,314,424 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,862,142 >>> mbox cmd response: success
14,865,346 UART: [afmc] ++
14,866,046 UART: [afmc] CDI.KEYID = 6
14,867,287 UART: [afmc] SUBJECT.KEYID = 7
14,868,721 UART: [afmc] AUTHORITY.KEYID = 5
17,375,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,098,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,099,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,115,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,130,305 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,145,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,169,639 UART: [afmc] --
19,173,242 UART: [cold-reset] --
19,176,026 UART: [state] Locking Datavault
19,181,727 UART: [state] Locking PCR0, PCR1 and PCR31
19,183,923 UART: [state] Locking ICCM
19,185,536 UART: [exit] Launching FMC @ 0x40000130
19,194,204 UART:
19,194,440 UART: Running Caliptra FMC ...
19,195,542 UART:
19,195,699 UART: [state] CFI Enabled
19,203,854 UART: [fht] FMC Alias Private Key: 7
20,960,340 UART: [art] Extend RT PCRs Done
20,961,558 UART: [art] Lock RT PCRs Done
20,963,255 UART: [art] Populate DV Done
20,968,671 UART: [fht] FMC Alias Private Key: 7
20,970,318 UART: [art] Derive CDI
20,971,132 UART: [art] Store in in slot 0x4
21,013,617 UART: [art] Derive Key Pair
21,014,655 UART: [art] Store priv key in slot 0x5
23,442,035 UART: [art] Derive Key Pair - Done
23,454,808 UART: [art] Signing Cert with AUTHO
23,456,108 UART: RITY.KEYID = 7
25,161,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,882 UART: [art] PUB.X = BF7A0BE95B0C50F15CB4569D33C75B5017817E121CB3A09CF9B13362BC27D53A994498CA10F205FBEC3669CE64DA65A3
25,170,139 UART: [art] PUB.Y = F0C2772AECF0DF11D47C6CB08A858C3D891667707257D8159F71BF27219C190740E19179B25866A92F397C2CE25DF7A9
25,177,375 UART: [art] SIG.R = 8034C75C8496E1D8633877362C63D80E65D2A4141AB96B60F71E6A2628136F33CE7F969DC0E85BFBBA3F7422F850169B
25,184,778 UART: [art] SIG.S = 016DC6E6FA12B7BF11333FFF8A88B840633114BE17B6D0F258C6D0F71FE37FBBDAC188794B7236BB7128C2B06BEA67DF
26,163,327 UART: Caliptra RT
26,164,016 UART: [state] CFI Enabled
26,281,035 UART: [rt] RT listening for mailbox commands...
26,282,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,312,712 UART: [rt]cmd =0x46504c54, len=4
26,314,343 >>> mbox cmd response data (8 bytes)
26,315,180 UART: [rt] FIPS self test
26,316,122 UART: [kat] ++
26,316,594 UART: [kat] sha1
26,320,999 UART: [kat] SHA2-256
26,322,923 UART: [kat] SHA2-384
26,325,939 UART: [kat] SHA2-512-ACC
26,328,226 UART: [kat] ECC-384
28,755,719 UART: [kat] HMAC-384Kdf
28,761,452 UART: Fatal Error: 0x90030002
28,796,676 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,941,839 >>> mbox cmd response: failed
28,942,453 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,087,187 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,100 UART:
190,390 UART: Running Caliptra ROM ...
191,420 UART:
11,426,809 UART: [state] CFI Enabled
11,440,682 UART: [state] LifecycleState = Unprovisioned
11,443,023 UART: [state] DebugLocked = No
11,445,085 UART: [state] WD Timer not started. Device not locked for debugging
11,448,878 UART: [kat] SHA2-256
11,638,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,649,304 UART: [kat] ++
11,649,820 UART: [kat] sha1
11,661,190 UART: [kat] SHA2-256
11,664,212 UART: [kat] SHA2-384
11,669,766 UART: [kat] SHA2-512-ACC
11,672,369 UART: [kat] ECC-384
14,114,665 UART: [kat] HMAC-384Kdf
14,127,223 UART: [kat] LMS
14,659,032 UART: [kat] --
14,664,392 UART: [cold-reset] ++
14,666,239 UART: [fht] FHT @ 0x50003400
14,676,949 UART: [idev] ++
14,677,630 UART: [idev] CDI.KEYID = 6
14,678,646 UART: [idev] SUBJECT.KEYID = 7
14,679,748 UART: [idev] UDS.KEYID = 0
14,681,264 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,825,999 UART: [idev] Erasing UDS.KEYID = 0
17,158,467 UART: [idev] Sha1 KeyId Algorithm
17,180,877 UART: [idev] --
17,186,378 UART: [ldev] ++
17,187,057 UART: [ldev] CDI.KEYID = 6
17,188,114 UART: [ldev] SUBJECT.KEYID = 5
17,189,166 UART: [ldev] AUTHORITY.KEYID = 7
17,190,279 UART: [ldev] FE.KEYID = 1
17,201,528 UART: [ldev] Erasing FE.KEYID = 1
19,680,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,399,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,414,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,429,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,444,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,465,792 UART: [ldev] --
21,472,133 UART: [fwproc] Wait for Commands...
21,474,776 UART: [fwproc] Recv command 0x46574c44
21,477,089 UART: [fwproc] Recv'd Img size: 115304 bytes
24,932,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,008,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,124,419 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,673,480 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,754,837 ready_for_fw is high
3,755,493 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,981,374 >>> mbox cmd response: success
19,228,911 UART:
19,229,290 UART: Running Caliptra FMC ...
19,230,393 UART:
19,230,565 UART: [state] CFI Enabled
19,238,581 UART: [fht] FMC Alias Private Key: 7
20,995,278 UART: [art] Extend RT PCRs Done
20,996,504 UART: [art] Lock RT PCRs Done
20,998,337 UART: [art] Populate DV Done
21,003,484 UART: [fht] FMC Alias Private Key: 7
21,004,978 UART: [art] Derive CDI
21,005,721 UART: [art] Store in in slot 0x4
21,048,317 UART: [art] Derive Key Pair
21,049,362 UART: [art] Store priv key in slot 0x5
23,475,995 UART: [art] Derive Key Pair - Done
23,489,119 UART: [art] Signing Cert with AUTHO
23,490,429 UART: RITY.KEYID = 7
25,195,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,448 UART: [art] PUB.X = 3355642543DDE77016D923DBB99BDB90C05E4FF9AE436B7BA6E50B7059E79B0F255BBC3682DED6871095D69933A0A656
25,204,706 UART: [art] PUB.Y = 6FC54A2B1B0C7D571FF3EA26E29C8D296E36F4FE4AA6753CD77B3D650A14129C1D8877F47389CF4C03CB6DD6A073E2A0
25,212,018 UART: [art] SIG.R = A221483877CBBC4EE702D19F3DBC23A470D11B1CA7D30C8AA3D9CB9F95A740CEA4E4EAEA8D1AA31522BF5C2992CA7406
25,219,433 UART: [art] SIG.S = 9056D32DC7176E4F3694DCEB9FC5EF9D5CED0DFC1C1567B8BF73A0AD30604A032D3BFC3BBE5CAF2A7B8FE1ACE6D720A8
26,198,340 UART: Caliptra RT
26,199,025 UART: [state] CFI Enabled
26,316,733 UART: [rt] RT listening for mailbox commands...
26,318,577 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,348,269 UART: [rt]cmd =0x46504c54, len=4
26,349,982 >>> mbox cmd response data (8 bytes)
26,351,312 UART: [rt] FIPS self test
26,352,248 UART: [kat] ++
26,352,695 UART: [kat] sha1
26,357,040 UART: [kat] SHA2-256
26,358,969 UART: [kat] SHA2-384
26,361,816 UART: [kat] SHA2-512-ACC
26,364,087 UART: [kat] ECC-384
28,791,954 UART: [kat] HMAC-384Kdf
28,797,447 UART: Fatal Error: 0x90030002
28,833,156 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,978,051 >>> mbox cmd response: failed
28,978,686 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,123,272 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
14,563,968 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,785,965 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,058 UART: [kat] SHA2-512-ACC
896,959 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,303 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,674 UART: [idev] ++
1,479,842 UART: [idev] CDI.KEYID = 6
1,480,202 UART: [idev] SUBJECT.KEYID = 7
1,480,626 UART: [idev] UDS.KEYID = 0
1,480,971 ready_for_fw is high
1,480,971 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,542 UART: [idev] Erasing UDS.KEYID = 0
1,504,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,430 UART: [idev] --
1,514,259 UART: [ldev] ++
1,514,427 UART: [ldev] CDI.KEYID = 6
1,514,790 UART: [ldev] SUBJECT.KEYID = 5
1,515,216 UART: [ldev] AUTHORITY.KEYID = 7
1,515,679 UART: [ldev] FE.KEYID = 1
1,520,859 UART: [ldev] Erasing FE.KEYID = 1
1,546,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,910 UART: [ldev] --
1,585,207 UART: [fwproc] Waiting for Commands...
1,585,988 UART: [fwproc] Received command 0x46574c44
1,586,779 UART: [fwproc] Received Image of size 115304 bytes
2,896,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,911 >>> mbox cmd response: success
3,090,965 UART: [afmc] ++
3,091,133 UART: [afmc] CDI.KEYID = 6
3,091,495 UART: [afmc] SUBJECT.KEYID = 7
3,091,920 UART: [afmc] AUTHORITY.KEYID = 5
3,127,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,746 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,436 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,281 UART: [afmc] --
3,170,333 UART: [cold-reset] --
3,171,307 UART: [state] Locking Datavault
3,172,190 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,794 UART: [state] Locking ICCM
3,173,344 UART: [exit] Launching FMC @ 0x40000130
3,178,673 UART:
3,178,689 UART: Running Caliptra FMC ...
3,179,097 UART:
3,179,151 UART: [state] CFI Enabled
3,189,306 UART: [fht] FMC Alias Private Key: 7
3,297,177 UART: [art] Extend RT PCRs Done
3,297,605 UART: [art] Lock RT PCRs Done
3,298,957 UART: [art] Populate DV Done
3,307,412 UART: [fht] FMC Alias Private Key: 7
3,308,566 UART: [art] Derive CDI
3,308,846 UART: [art] Store in in slot 0x4
3,394,655 UART: [art] Derive Key Pair
3,395,015 UART: [art] Store priv key in slot 0x5
3,407,951 UART: [art] Derive Key Pair - Done
3,422,787 UART: [art] Signing Cert with AUTHO
3,423,267 UART: RITY.KEYID = 7
3,438,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,334 UART: [art] PUB.X = 23A76D6F9A6EEE822CBBF2E6E138822CD0F6DCAA9E9AE96935AFB6914160B8CE5543FC6514C90DF4CC76226F7070502D
3,446,115 UART: [art] PUB.Y = 68F7FE88FAAFED1D244E88F0C9722467E82961B23602F476E6A7B7BB2F0D3F8CC4C1E4C816801CDD583FAC5D11BE0E83
3,453,072 UART: [art] SIG.R = AA84C270665B7541BEE2B0D68F90EBB7B823CAF0F352DD8130F17586537C06DEBF903801470D47DDE698BCF93885957D
3,459,839 UART: [art] SIG.S = 0652F7035DB64C2B91BEAD579ADD959E3E7F1F5AE42E716028EDA34F1E275642ACEABF71148325EAD3BDEF0D2EE0D54F
3,483,651 UART: Caliptra RT
3,483,904 UART: [state] CFI Enabled
3,591,807 UART: [rt] RT listening for mailbox commands...
3,592,470 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,393 UART: [rt]cmd =0x46504c54, len=4
3,623,614 >>> mbox cmd response data (8 bytes)
3,623,807 UART: [rt] FIPS self test
3,624,135 UART: [kat] ++
3,624,287 UART: [kat] sha1
3,628,365 UART: [kat] SHA2-256
3,630,387 UART: [kat] SHA2-384
3,633,196 UART: [kat] SHA2-512-ACC
3,635,123 UART: [kat] ECC-384
3,645,273 UART: [kat] HMAC-384Kdf
3,649,853 UART: Fatal Error: 0x90030002
3,651,403 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,651,408 >>> mbox cmd response: failed
3,651,408 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,651,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,722 UART: [state] LifecycleState = Unprovisioned
86,377 UART: [state] DebugLocked = No
87,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,741 UART: [kat] SHA2-256
882,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,787 UART: [kat] ++
886,939 UART: [kat] sha1
891,227 UART: [kat] SHA2-256
893,165 UART: [kat] SHA2-384
895,992 UART: [kat] SHA2-512-ACC
897,893 UART: [kat] ECC-384
903,492 UART: [kat] HMAC-384Kdf
908,136 UART: [kat] LMS
1,476,332 UART: [kat] --
1,477,343 UART: [cold-reset] ++
1,477,777 UART: [fht] Storing FHT @ 0x50003400
1,480,540 UART: [idev] ++
1,480,708 UART: [idev] CDI.KEYID = 6
1,481,068 UART: [idev] SUBJECT.KEYID = 7
1,481,492 UART: [idev] UDS.KEYID = 0
1,481,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,370 UART: [idev] Erasing UDS.KEYID = 0
1,505,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,574 UART: [idev] --
1,515,637 UART: [ldev] ++
1,515,805 UART: [ldev] CDI.KEYID = 6
1,516,168 UART: [ldev] SUBJECT.KEYID = 5
1,516,594 UART: [ldev] AUTHORITY.KEYID = 7
1,517,057 UART: [ldev] FE.KEYID = 1
1,522,355 UART: [ldev] Erasing FE.KEYID = 1
1,547,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,721 UART: [fwproc] Waiting for Commands...
1,587,512 UART: [fwproc] Received command 0x46574c44
1,588,303 UART: [fwproc] Received Image of size 115304 bytes
2,899,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,812 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,523 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,851 ready_for_fw is high
1,362,851 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,651 >>> mbox cmd response: success
3,001,665 UART:
3,001,681 UART: Running Caliptra FMC ...
3,002,089 UART:
3,002,143 UART: [state] CFI Enabled
3,012,616 UART: [fht] FMC Alias Private Key: 7
3,120,239 UART: [art] Extend RT PCRs Done
3,120,667 UART: [art] Lock RT PCRs Done
3,122,265 UART: [art] Populate DV Done
3,130,494 UART: [fht] FMC Alias Private Key: 7
3,131,662 UART: [art] Derive CDI
3,131,942 UART: [art] Store in in slot 0x4
3,217,803 UART: [art] Derive Key Pair
3,218,163 UART: [art] Store priv key in slot 0x5
3,231,289 UART: [art] Derive Key Pair - Done
3,245,817 UART: [art] Signing Cert with AUTHO
3,246,297 UART: RITY.KEYID = 7
3,261,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,384 UART: [art] PUB.X = 67DE6835DF80FC8CFDDEAC85C7CA055A6FAD737F8B74D5CD19CF237C86C9128C366B35055C384F7226861116F70B1B3C
3,269,157 UART: [art] PUB.Y = F4B5873AE5519392CE2A4839F3A30BF5DBC2B8886187C7EA16C8AB160CCB6C52B109EED85A0F799FE95649037E4D75AF
3,276,104 UART: [art] SIG.R = C0605E5A20306ADE5C3716D03738D78050EECF470AB955AA2DB6DC67505CDD34E455D7CA9EF1938E21EF5427D65EF2F9
3,282,883 UART: [art] SIG.S = EEA44E90778B274EB31906B03E4E67E2816E31DEFCB4E06F2C79D8BD2E915DC46C35C6449AAFD3448BE9A92171CF11A7
3,306,301 UART: Caliptra RT
3,306,554 UART: [state] CFI Enabled
3,414,870 UART: [rt] RT listening for mailbox commands...
3,415,533 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,298 UART: [rt]cmd =0x46504c54, len=4
3,446,465 >>> mbox cmd response data (8 bytes)
3,446,650 UART: [rt] FIPS self test
3,446,978 UART: [kat] ++
3,447,130 UART: [kat] sha1
3,451,450 UART: [kat] SHA2-256
3,453,472 UART: [kat] SHA2-384
3,456,225 UART: [kat] SHA2-512-ACC
3,458,152 UART: [kat] ECC-384
3,467,948 UART: [kat] HMAC-384Kdf
3,472,658 UART: Fatal Error: 0x90030002
3,474,208 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,213 >>> mbox cmd response: failed
3,474,213 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,277 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,105 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,794 UART: [cold-reset] ++
1,477,158 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 ready_for_fw is high
1,481,032 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,115 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,805 UART: [idev] --
1,514,702 UART: [ldev] ++
1,514,870 UART: [ldev] CDI.KEYID = 6
1,515,233 UART: [ldev] SUBJECT.KEYID = 5
1,515,659 UART: [ldev] AUTHORITY.KEYID = 7
1,516,122 UART: [ldev] FE.KEYID = 1
1,521,402 UART: [ldev] Erasing FE.KEYID = 1
1,546,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,037 UART: [ldev] --
1,586,322 UART: [fwproc] Waiting for Commands...
1,586,981 UART: [fwproc] Received command 0x46574c44
1,587,772 UART: [fwproc] Received Image of size 115304 bytes
2,897,733 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,430 >>> mbox cmd response: success
3,092,654 UART: [afmc] ++
3,092,822 UART: [afmc] CDI.KEYID = 6
3,093,184 UART: [afmc] SUBJECT.KEYID = 7
3,093,609 UART: [afmc] AUTHORITY.KEYID = 5
3,128,744 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,150 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,035 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,725 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,690 UART: [afmc] --
3,171,592 UART: [cold-reset] --
3,172,510 UART: [state] Locking Datavault
3,173,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,215 UART: [state] Locking ICCM
3,174,795 UART: [exit] Launching FMC @ 0x40000130
3,180,124 UART:
3,180,140 UART: Running Caliptra FMC ...
3,180,548 UART:
3,180,691 UART: [state] CFI Enabled
3,190,760 UART: [fht] FMC Alias Private Key: 7
3,298,593 UART: [art] Extend RT PCRs Done
3,299,021 UART: [art] Lock RT PCRs Done
3,300,403 UART: [art] Populate DV Done
3,308,640 UART: [fht] FMC Alias Private Key: 7
3,309,698 UART: [art] Derive CDI
3,309,978 UART: [art] Store in in slot 0x4
3,395,785 UART: [art] Derive Key Pair
3,396,145 UART: [art] Store priv key in slot 0x5
3,410,139 UART: [art] Derive Key Pair - Done
3,424,898 UART: [art] Signing Cert with AUTHO
3,425,378 UART: RITY.KEYID = 7
3,440,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,047 UART: [art] PUB.X = 2DA91EFA3E129F560F07A1145DF7D4E237368229AB55C74AA25249D8740BCA59B3168DC95F05FC97443847EBE33C7093
3,447,807 UART: [art] PUB.Y = D1C45A8D9A64500AE248B4DE9A5145BE26C16173E0F9F98B6AB02C5F1E686A9AEFC07C912BC35519B0B66B14C38C1FE9
3,454,768 UART: [art] SIG.R = EB54338DF45536B3E8AD028DC8392CBA085778A8BDCFD0D7FAD94F0168F54FFF70E02551600006FAE5B9D4D576F1CDF7
3,461,520 UART: [art] SIG.S = 0E8E73D518B254C04D5DA5CCD7F98DC813A24620843E6FEF235E0FA6732356359B2F56D1CA7DA5F0542B743E38663EA7
3,485,491 UART: Caliptra RT
3,485,836 UART: [state] CFI Enabled
3,594,517 UART: [rt] RT listening for mailbox commands...
3,595,180 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,117 UART: [rt]cmd =0x46504c54, len=4
3,626,148 >>> mbox cmd response data (8 bytes)
3,626,481 UART: [rt] FIPS self test
3,626,809 UART: [kat] ++
3,626,961 UART: [kat] sha1
3,631,351 UART: [kat] SHA2-256
3,633,373 UART: [kat] SHA2-384
3,636,238 UART: [kat] SHA2-512-ACC
3,638,165 UART: [kat] ECC-384
3,647,911 UART: [kat] HMAC-384Kdf
3,652,403 UART: Fatal Error: 0x90030002
3,653,953 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,653,958 >>> mbox cmd response: failed
3,653,958 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,653,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,634 UART: [kat] SHA2-256
892,572 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
903,229 UART: [kat] HMAC-384Kdf
907,959 UART: [kat] LMS
1,476,155 UART: [kat] --
1,477,228 UART: [cold-reset] ++
1,477,734 UART: [fht] Storing FHT @ 0x50003400
1,480,523 UART: [idev] ++
1,480,691 UART: [idev] CDI.KEYID = 6
1,481,051 UART: [idev] SUBJECT.KEYID = 7
1,481,475 UART: [idev] UDS.KEYID = 0
1,481,820 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,581 UART: [idev] Erasing UDS.KEYID = 0
1,506,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,267 UART: [idev] --
1,516,400 UART: [ldev] ++
1,516,568 UART: [ldev] CDI.KEYID = 6
1,516,931 UART: [ldev] SUBJECT.KEYID = 5
1,517,357 UART: [ldev] AUTHORITY.KEYID = 7
1,517,820 UART: [ldev] FE.KEYID = 1
1,523,128 UART: [ldev] Erasing FE.KEYID = 1
1,548,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,651 UART: [ldev] --
1,588,066 UART: [fwproc] Waiting for Commands...
1,588,899 UART: [fwproc] Received command 0x46574c44
1,589,690 UART: [fwproc] Received Image of size 115304 bytes
2,900,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,928,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,957,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,095,170 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,798 ready_for_fw is high
1,362,798 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,984 >>> mbox cmd response: success
3,003,234 UART:
3,003,250 UART: Running Caliptra FMC ...
3,003,658 UART:
3,003,801 UART: [state] CFI Enabled
3,014,248 UART: [fht] FMC Alias Private Key: 7
3,121,817 UART: [art] Extend RT PCRs Done
3,122,245 UART: [art] Lock RT PCRs Done
3,123,901 UART: [art] Populate DV Done
3,132,352 UART: [fht] FMC Alias Private Key: 7
3,133,356 UART: [art] Derive CDI
3,133,636 UART: [art] Store in in slot 0x4
3,219,089 UART: [art] Derive Key Pair
3,219,449 UART: [art] Store priv key in slot 0x5
3,233,055 UART: [art] Derive Key Pair - Done
3,248,014 UART: [art] Signing Cert with AUTHO
3,248,494 UART: RITY.KEYID = 7
3,263,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,589 UART: [art] PUB.X = 5C58B26B3DBCA826DEA09EBBB61B9561EF1ABB60CC08374E24D9103DD5A13797BF9D98CCDBA11075E15007E34CEE8539
3,271,371 UART: [art] PUB.Y = 810D03EDCC176BDAC0A22D59AE2A87C1F37FF1E04144437FD32D5B7CA03F0DC988C03D3C95B1D1C37F2605A8AFC3674D
3,278,327 UART: [art] SIG.R = 3229D288EAEF288B870D26977A96DB491A326325577ADBDBA6DD9D3839C6C9B8D35716B3E5249F3DDEC087CD98EC4E05
3,285,101 UART: [art] SIG.S = 5852B454EB910B5E78DD02F10DEAD5C9939FB3FA412DD4ABA7FB9C196153E5D9C26B4B2F596A312D30A0AB4DDD41E387
3,309,453 UART: Caliptra RT
3,309,798 UART: [state] CFI Enabled
3,418,246 UART: [rt] RT listening for mailbox commands...
3,418,909 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,754 UART: [rt]cmd =0x46504c54, len=4
3,449,815 >>> mbox cmd response data (8 bytes)
3,450,046 UART: [rt] FIPS self test
3,450,374 UART: [kat] ++
3,450,526 UART: [kat] sha1
3,454,714 UART: [kat] SHA2-256
3,456,736 UART: [kat] SHA2-384
3,459,679 UART: [kat] SHA2-512-ACC
3,461,606 UART: [kat] ECC-384
3,471,484 UART: [kat] HMAC-384Kdf
3,476,022 UART: Fatal Error: 0x90030002
3,477,572 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,477,577 >>> mbox cmd response: failed
3,477,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,477,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,300 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,297 UART: [fht] FHT @ 0x50003400
1,174,996 UART: [idev] ++
1,175,164 UART: [idev] CDI.KEYID = 6
1,175,524 UART: [idev] SUBJECT.KEYID = 7
1,175,948 UART: [idev] UDS.KEYID = 0
1,176,293 ready_for_fw is high
1,176,293 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,588 UART: [idev] Erasing UDS.KEYID = 0
1,200,155 UART: [idev] Sha1 KeyId Algorithm
1,208,605 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,532 UART: [ldev] AUTHORITY.KEYID = 7
1,210,995 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,536 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,299 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,472 >>> mbox cmd response: success
2,787,718 UART: [afmc] ++
2,787,886 UART: [afmc] CDI.KEYID = 6
2,788,248 UART: [afmc] SUBJECT.KEYID = 7
2,788,673 UART: [afmc] AUTHORITY.KEYID = 5
2,824,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,099 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,981 UART: [afmc] --
2,868,091 UART: [cold-reset] --
2,868,941 UART: [state] Locking Datavault
2,870,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,846 UART: [state] Locking ICCM
2,871,440 UART: [exit] Launching FMC @ 0x40000130
2,876,769 UART:
2,876,785 UART: Running Caliptra FMC ...
2,877,193 UART:
2,877,247 UART: [state] CFI Enabled
2,887,872 UART: [fht] FMC Alias Private Key: 7
2,995,089 UART: [art] Extend RT PCRs Done
2,995,517 UART: [art] Lock RT PCRs Done
2,997,001 UART: [art] Populate DV Done
3,005,190 UART: [fht] FMC Alias Private Key: 7
3,006,284 UART: [art] Derive CDI
3,006,564 UART: [art] Store in in slot 0x4
3,092,445 UART: [art] Derive Key Pair
3,092,805 UART: [art] Store priv key in slot 0x5
3,105,995 UART: [art] Derive Key Pair - Done
3,120,757 UART: [art] Signing Cert with AUTHO
3,121,237 UART: RITY.KEYID = 7
3,136,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,218 UART: [art] PUB.X = 07DAFADAC9A4EB5524936D5B41A969C703C8D765DAE555EC5655B5BC37A6DBC1757D93EB9F4BD8682661242A7F31A2BF
3,143,998 UART: [art] PUB.Y = CE48C1CE681D34DC817BA00025A5F4E8B2508303710CFFB5A0716B63C8AE57E7C5D288383CA33578E22189BBD860D63F
3,150,926 UART: [art] SIG.R = 96EFC4D09C44CE1F3539BE4982C8836733678AB6C5A6425D54C871DA7A9FB81C26AC538470C4411C8E69DA1B81CD2BE2
3,157,704 UART: [art] SIG.S = 29E55F021063F8513C209B48AD87E60F4CB50B47C39695F4AA6DAB760C4CF9AC0C78EA87382B2214CEE37C16B5DDA867
3,181,158 UART: Caliptra RT
3,181,411 UART: [state] CFI Enabled
3,290,336 UART: [rt] RT listening for mailbox commands...
3,290,999 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,000 UART: [rt]cmd =0x46504c54, len=4
3,322,095 >>> mbox cmd response data (8 bytes)
3,322,450 UART: [rt] FIPS self test
3,322,778 UART: [kat] ++
3,322,930 UART: [kat] sha1
3,327,148 UART: [kat] SHA2-256
3,329,170 UART: [kat] SHA2-384
3,331,917 UART: [kat] SHA2-512-ACC
3,333,844 UART: [kat] ECC-384
3,343,086 UART: [kat] HMAC-384Kdf
3,347,694 UART: Fatal Error: 0x90030002
3,349,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,349,249 >>> mbox cmd response: failed
3,349,249 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,349,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
85,929 UART: [state] WD Timer not started. Device not locked for debugging
87,176 UART: [kat] SHA2-256
892,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,951 UART: [kat] ++
897,103 UART: [kat] sha1
901,461 UART: [kat] SHA2-256
903,401 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,922 UART: [kat] HMAC-384Kdf
922,370 UART: [kat] LMS
1,170,698 UART: [kat] --
1,171,871 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,175,158 UART: [idev] ++
1,175,326 UART: [idev] CDI.KEYID = 6
1,175,686 UART: [idev] SUBJECT.KEYID = 7
1,176,110 UART: [idev] UDS.KEYID = 0
1,176,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,705 UART: [idev] Sha1 KeyId Algorithm
1,209,095 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,608 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,924 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,397 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,770 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 ready_for_fw is high
1,060,487 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,415 >>> mbox cmd response: success
2,702,157 UART:
2,702,173 UART: Running Caliptra FMC ...
2,702,581 UART:
2,702,635 UART: [state] CFI Enabled
2,713,220 UART: [fht] FMC Alias Private Key: 7
2,821,075 UART: [art] Extend RT PCRs Done
2,821,503 UART: [art] Lock RT PCRs Done
2,822,987 UART: [art] Populate DV Done
2,831,076 UART: [fht] FMC Alias Private Key: 7
2,832,094 UART: [art] Derive CDI
2,832,374 UART: [art] Store in in slot 0x4
2,917,565 UART: [art] Derive Key Pair
2,917,925 UART: [art] Store priv key in slot 0x5
2,930,499 UART: [art] Derive Key Pair - Done
2,945,131 UART: [art] Signing Cert with AUTHO
2,945,611 UART: RITY.KEYID = 7
2,960,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,394 UART: [art] PUB.X = A1A1B162F6FA1B70DD42D94A75519D5DF6A69BF2C299F15DB7038028868662651687EDCE717487DEBF49FBD11A13ECD8
2,968,171 UART: [art] PUB.Y = 92DBD4B5D3E2EC2312607E6DF2151278BD66D6226CF371B6B235654F46938A8B62554B5A632E4CD726E5401365CE097E
2,975,116 UART: [art] SIG.R = 282165364F1B064A796883DE66490367E8F416A7899C750FF0C3A13E150DFEFA8897CE9E5EBC7A3664C18BDAAD2E8E2B
2,981,882 UART: [art] SIG.S = 98E36778CE1E4283AFBCC1D14ABB31A0463924AE6750FA17F340540F7121BC8CF02637C8656C09ABE64155AB6AFE03FE
3,005,670 UART: Caliptra RT
3,005,923 UART: [state] CFI Enabled
3,113,586 UART: [rt] RT listening for mailbox commands...
3,114,249 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,092 UART: [rt]cmd =0x46504c54, len=4
3,145,229 >>> mbox cmd response data (8 bytes)
3,145,412 UART: [rt] FIPS self test
3,145,740 UART: [kat] ++
3,145,892 UART: [kat] sha1
3,149,968 UART: [kat] SHA2-256
3,151,990 UART: [kat] SHA2-384
3,154,841 UART: [kat] SHA2-512-ACC
3,156,768 UART: [kat] ECC-384
3,166,748 UART: [kat] HMAC-384Kdf
3,171,340 UART: Fatal Error: 0x90030002
3,172,890 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,895 >>> mbox cmd response: failed
3,172,895 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,172,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,531 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,379 UART: [kat] SHA2-256
894,029 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,154 UART: [kat] ++
898,306 UART: [kat] sha1
902,578 UART: [kat] SHA2-256
904,518 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
919,139 UART: [kat] HMAC-384Kdf
923,793 UART: [kat] LMS
1,172,121 UART: [kat] --
1,173,016 UART: [cold-reset] ++
1,173,412 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 ready_for_fw is high
1,177,366 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,143 UART: [idev] Erasing UDS.KEYID = 0
1,201,992 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,962 UART: [ldev] ++
1,212,130 UART: [ldev] CDI.KEYID = 6
1,212,493 UART: [ldev] SUBJECT.KEYID = 5
1,212,919 UART: [ldev] AUTHORITY.KEYID = 7
1,213,382 UART: [ldev] FE.KEYID = 1
1,218,668 UART: [ldev] Erasing FE.KEYID = 1
1,245,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,314 UART: [ldev] --
1,284,755 UART: [fwproc] Wait for Commands...
1,285,397 UART: [fwproc] Recv command 0x46574c44
1,286,125 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,212 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,547 >>> mbox cmd response: success
2,790,607 UART: [afmc] ++
2,790,775 UART: [afmc] CDI.KEYID = 6
2,791,137 UART: [afmc] SUBJECT.KEYID = 7
2,791,562 UART: [afmc] AUTHORITY.KEYID = 5
2,826,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,677 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,396 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,056 UART: [afmc] --
2,869,988 UART: [cold-reset] --
2,870,794 UART: [state] Locking Datavault
2,872,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,817 UART: [state] Locking ICCM
2,873,255 UART: [exit] Launching FMC @ 0x40000130
2,878,584 UART:
2,878,600 UART: Running Caliptra FMC ...
2,879,008 UART:
2,879,151 UART: [state] CFI Enabled
2,889,916 UART: [fht] FMC Alias Private Key: 7
2,997,667 UART: [art] Extend RT PCRs Done
2,998,095 UART: [art] Lock RT PCRs Done
2,999,579 UART: [art] Populate DV Done
3,008,076 UART: [fht] FMC Alias Private Key: 7
3,009,172 UART: [art] Derive CDI
3,009,452 UART: [art] Store in in slot 0x4
3,095,477 UART: [art] Derive Key Pair
3,095,837 UART: [art] Store priv key in slot 0x5
3,109,241 UART: [art] Derive Key Pair - Done
3,123,992 UART: [art] Signing Cert with AUTHO
3,124,472 UART: RITY.KEYID = 7
3,140,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,825 UART: [art] PUB.X = 9C68A6FE4059E9B201E366855C4301DB7C52497B0FE224008DFB04B46A6505CCA14BDD7739B257658863404C1197D197
3,147,552 UART: [art] PUB.Y = 958427EC0C1C12A9D2D04DE8DFF602DBBC7ABAE8C2A1B8527F5189F057ED4160CFE4DFBE490F66863ED87681AFFDB9AB
3,154,519 UART: [art] SIG.R = 8EA25C7AFA1FC9B24B4ECC3D62608A47E2DA2A79D4240568F6DC0DAD517DDFABC3F7D78AFC904630BF28919AD699BAA8
3,161,309 UART: [art] SIG.S = F952C9FB43164774040E2CA1921969A4A2B65A3C5A55A36053B9BD463FCD687FB0C5279187C0F147F98DCE8C99C371E1
3,184,822 UART: Caliptra RT
3,185,167 UART: [state] CFI Enabled
3,292,971 UART: [rt] RT listening for mailbox commands...
3,293,634 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,407 UART: [rt]cmd =0x46504c54, len=4
3,324,714 >>> mbox cmd response data (8 bytes)
3,324,945 UART: [rt] FIPS self test
3,325,273 UART: [kat] ++
3,325,425 UART: [kat] sha1
3,329,651 UART: [kat] SHA2-256
3,331,673 UART: [kat] SHA2-384
3,334,514 UART: [kat] SHA2-512-ACC
3,336,441 UART: [kat] ECC-384
3,346,299 UART: [kat] HMAC-384Kdf
3,350,945 UART: Fatal Error: 0x90030002
3,352,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,352,500 >>> mbox cmd response: failed
3,352,500 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,352,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,822 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,903 UART: [idev] Erasing UDS.KEYID = 0
1,202,002 UART: [idev] Sha1 KeyId Algorithm
1,210,470 UART: [idev] --
1,211,370 UART: [ldev] ++
1,211,538 UART: [ldev] CDI.KEYID = 6
1,211,901 UART: [ldev] SUBJECT.KEYID = 5
1,212,327 UART: [ldev] AUTHORITY.KEYID = 7
1,212,790 UART: [ldev] FE.KEYID = 1
1,217,866 UART: [ldev] Erasing FE.KEYID = 1
1,244,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,404 UART: [ldev] --
1,283,781 UART: [fwproc] Wait for Commands...
1,284,425 UART: [fwproc] Recv command 0x46574c44
1,285,153 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,194 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,427 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,450 ready_for_fw is high
1,060,450 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,936 >>> mbox cmd response: success
2,702,340 UART:
2,702,356 UART: Running Caliptra FMC ...
2,702,764 UART:
2,702,907 UART: [state] CFI Enabled
2,713,514 UART: [fht] FMC Alias Private Key: 7
2,821,991 UART: [art] Extend RT PCRs Done
2,822,419 UART: [art] Lock RT PCRs Done
2,824,005 UART: [art] Populate DV Done
2,832,324 UART: [fht] FMC Alias Private Key: 7
2,833,444 UART: [art] Derive CDI
2,833,724 UART: [art] Store in in slot 0x4
2,919,219 UART: [art] Derive Key Pair
2,919,579 UART: [art] Store priv key in slot 0x5
2,932,961 UART: [art] Derive Key Pair - Done
2,948,007 UART: [art] Signing Cert with AUTHO
2,948,487 UART: RITY.KEYID = 7
2,963,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,934 UART: [art] PUB.X = 58F026E2DCBA6C940422B03E40351DEA99304397A4ED239B8680CF8C33279000C43F7D46FB0973AE424AB3DFE425B300
2,970,656 UART: [art] PUB.Y = CD2494A8D6BFF5E1354AE0914284D35F179BA78FEF7AD438CEE4A7A6F4B238B583295349E752A9923AA328448CCAD30F
2,977,613 UART: [art] SIG.R = 44F1173BED56F38D713920CDFD738CCC62F72D4EA0A265122D8E51F98E62E8510C172C4D11AFA820D5A23E9C1B313E8D
2,984,390 UART: [art] SIG.S = 353D0372586173A0B2401BD301146500C0A0AE99A772F0A5F8382C650B715413F9449684D4D903981B7BC4E4EF5F01C5
3,008,194 UART: Caliptra RT
3,008,539 UART: [state] CFI Enabled
3,116,680 UART: [rt] RT listening for mailbox commands...
3,117,343 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,126 UART: [rt]cmd =0x46504c54, len=4
3,148,273 >>> mbox cmd response data (8 bytes)
3,148,536 UART: [rt] FIPS self test
3,148,864 UART: [kat] ++
3,149,016 UART: [kat] sha1
3,153,174 UART: [kat] SHA2-256
3,155,196 UART: [kat] SHA2-384
3,158,097 UART: [kat] SHA2-512-ACC
3,160,024 UART: [kat] ECC-384
3,170,048 UART: [kat] HMAC-384Kdf
3,174,820 UART: Fatal Error: 0x90030002
3,176,370 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,176,375 >>> mbox cmd response: failed
3,176,375 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,176,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,472 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,202 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,845 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,813 UART: [kat] ++
894,965 UART: [kat] sha1
899,211 UART: [kat] SHA2-256
901,151 UART: [kat] SHA2-384
903,896 UART: [kat] SHA2-512-ACC
905,797 UART: [kat] ECC-384
915,028 UART: [kat] HMAC-384Kdf
919,744 UART: [kat] LMS
1,168,056 UART: [kat] --
1,168,905 UART: [cold-reset] ++
1,169,453 UART: [fht] FHT @ 0x50003400
1,172,283 UART: [idev] ++
1,172,451 UART: [idev] CDI.KEYID = 6
1,172,812 UART: [idev] SUBJECT.KEYID = 7
1,173,237 UART: [idev] UDS.KEYID = 0
1,173,583 ready_for_fw is high
1,173,583 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,197,949 UART: [idev] Sha1 KeyId Algorithm
1,206,617 UART: [idev] --
1,207,536 UART: [ldev] ++
1,207,704 UART: [ldev] CDI.KEYID = 6
1,208,068 UART: [ldev] SUBJECT.KEYID = 5
1,208,495 UART: [ldev] AUTHORITY.KEYID = 7
1,208,958 UART: [ldev] FE.KEYID = 1
1,214,006 UART: [ldev] Erasing FE.KEYID = 1
1,239,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,624 UART: [ldev] --
1,279,102 UART: [fwproc] Wait for Commands...
1,279,833 UART: [fwproc] Recv command 0x46574c44
1,280,566 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,162 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,783,416 >>> mbox cmd response: success
2,784,683 UART: [afmc] ++
2,784,851 UART: [afmc] CDI.KEYID = 6
2,785,214 UART: [afmc] SUBJECT.KEYID = 7
2,785,640 UART: [afmc] AUTHORITY.KEYID = 5
2,821,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,690 UART: [afmc] --
2,864,610 UART: [cold-reset] --
2,865,364 UART: [state] Locking Datavault
2,866,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,781 UART: [state] Locking ICCM
2,867,213 UART: [exit] Launching FMC @ 0x40000130
2,872,542 UART:
2,872,558 UART: Running Caliptra FMC ...
2,872,966 UART:
2,873,020 UART: [state] CFI Enabled
2,883,269 UART: [fht] FMC Alias Private Key: 7
2,991,472 UART: [art] Extend RT PCRs Done
2,991,900 UART: [art] Lock RT PCRs Done
2,993,524 UART: [art] Populate DV Done
3,001,529 UART: [fht] FMC Alias Private Key: 7
3,002,603 UART: [art] Derive CDI
3,002,883 UART: [art] Store in in slot 0x4
3,088,212 UART: [art] Derive Key Pair
3,088,572 UART: [art] Store priv key in slot 0x5
3,101,956 UART: [art] Derive Key Pair - Done
3,116,663 UART: [art] Signing Cert with AUTHO
3,117,143 UART: RITY.KEYID = 7
3,132,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,944 UART: [art] PUB.X = D6152E91214E75B906CF12DE2021ABD2203C35FD1026C118EA5C9E730AD8740D0A947A853D17589B7974D0A67B5ADB9E
3,139,706 UART: [art] PUB.Y = 13F6B06AEDE8BB2AA45A0C345062802E320238D3165BE1A8034424A9DDB597E52E7108D619FDFA79752A7B1DE82E048F
3,146,647 UART: [art] SIG.R = FD62502F25EBD3E431A414E55C3FE9061460B84D55492204662DD88B78175DE251F4C4544E9DE4F6AE7398CA2BFFCD0E
3,153,416 UART: [art] SIG.S = 5510CBE9482E7B5632FB8DD6E3D2BAA5D4179086C3B4D67E643939DC3EA8B9F36AF3A903374180A39E2D92B95C29D87E
3,176,888 UART: Caliptra RT
3,177,141 UART: [state] CFI Enabled
3,285,120 UART: [rt] RT listening for mailbox commands...
3,285,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,486 UART: [rt]cmd =0x46504c54, len=4
3,316,617 >>> mbox cmd response data (8 bytes)
3,316,966 UART: [rt] FIPS self test
3,317,294 UART: [kat] ++
3,317,446 UART: [kat] sha1
3,321,868 UART: [kat] SHA2-256
3,323,890 UART: [kat] SHA2-384
3,326,817 UART: [kat] SHA2-512-ACC
3,328,744 UART: [kat] ECC-384
3,338,374 UART: [kat] HMAC-384Kdf
3,342,898 UART: Fatal Error: 0x90030002
3,344,448 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,453 >>> mbox cmd response: failed
3,344,453 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,160 UART: [kat] SHA2-256
891,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,161 UART: [kat] SHA2-256
902,101 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,247 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,517 UART: [idev] Erasing UDS.KEYID = 0
1,200,233 UART: [idev] Sha1 KeyId Algorithm
1,209,121 UART: [idev] --
1,210,250 UART: [ldev] ++
1,210,418 UART: [ldev] CDI.KEYID = 6
1,210,782 UART: [ldev] SUBJECT.KEYID = 5
1,211,209 UART: [ldev] AUTHORITY.KEYID = 7
1,211,672 UART: [ldev] FE.KEYID = 1
1,216,990 UART: [ldev] Erasing FE.KEYID = 1
1,243,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,834 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,282,899 UART: [fwproc] Recv command 0x46574c44
1,283,632 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,384 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,764 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,278 ready_for_fw is high
1,056,278 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,106 >>> mbox cmd response: success
2,697,396 UART:
2,697,412 UART: Running Caliptra FMC ...
2,697,820 UART:
2,697,874 UART: [state] CFI Enabled
2,708,233 UART: [fht] FMC Alias Private Key: 7
2,816,198 UART: [art] Extend RT PCRs Done
2,816,626 UART: [art] Lock RT PCRs Done
2,817,922 UART: [art] Populate DV Done
2,826,043 UART: [fht] FMC Alias Private Key: 7
2,827,223 UART: [art] Derive CDI
2,827,503 UART: [art] Store in in slot 0x4
2,913,124 UART: [art] Derive Key Pair
2,913,484 UART: [art] Store priv key in slot 0x5
2,926,900 UART: [art] Derive Key Pair - Done
2,941,685 UART: [art] Signing Cert with AUTHO
2,942,165 UART: RITY.KEYID = 7
2,957,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,130 UART: [art] PUB.X = F17665DAF7CEF68838754AD922648B45336998D0A218F72E78F6298F0525D6614DECCE62E090BD431E24E91E07C23BCB
2,964,896 UART: [art] PUB.Y = 4EE30A476DAE803DA8857E5AD66F2FB0E030BC4B89F387298CE47F94A7D66FF7E978F567C397D04ED0EDDED4A2C916A5
2,971,861 UART: [art] SIG.R = 8D927BB4EC86A76A9D421B40D7FCDE85A0F5DC6772561B43C0264D14CCAC7E3F03459E20BF4CDBBFD3E05B3196655E33
2,978,644 UART: [art] SIG.S = 2A2BE306E1366DE6B8B473582A185E42E314763B15E2CA8BCBA6CC3FE8E66D160E8E620190D92B63A4EC5F4C321C848C
3,002,184 UART: Caliptra RT
3,002,437 UART: [state] CFI Enabled
3,110,222 UART: [rt] RT listening for mailbox commands...
3,110,885 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,486 UART: [rt]cmd =0x46504c54, len=4
3,141,403 >>> mbox cmd response data (8 bytes)
3,141,664 UART: [rt] FIPS self test
3,141,992 UART: [kat] ++
3,142,144 UART: [kat] sha1
3,146,510 UART: [kat] SHA2-256
3,148,532 UART: [kat] SHA2-384
3,151,395 UART: [kat] SHA2-512-ACC
3,153,322 UART: [kat] ECC-384
3,163,476 UART: [kat] HMAC-384Kdf
3,168,030 UART: Fatal Error: 0x90030002
3,169,580 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,585 >>> mbox cmd response: failed
3,169,585 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,452 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,286 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,333 UART: [fwproc] Wait for Commands...
1,281,958 UART: [fwproc] Recv command 0x46574c44
1,282,691 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,381 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,787 >>> mbox cmd response: success
2,786,918 UART: [afmc] ++
2,787,086 UART: [afmc] CDI.KEYID = 6
2,787,449 UART: [afmc] SUBJECT.KEYID = 7
2,787,875 UART: [afmc] AUTHORITY.KEYID = 5
2,823,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,427 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,181 UART: [afmc] --
2,867,101 UART: [cold-reset] --
2,868,181 UART: [state] Locking Datavault
2,869,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,788 UART: [state] Locking ICCM
2,870,382 UART: [exit] Launching FMC @ 0x40000130
2,875,711 UART:
2,875,727 UART: Running Caliptra FMC ...
2,876,135 UART:
2,876,278 UART: [state] CFI Enabled
2,886,951 UART: [fht] FMC Alias Private Key: 7
2,994,782 UART: [art] Extend RT PCRs Done
2,995,210 UART: [art] Lock RT PCRs Done
2,997,010 UART: [art] Populate DV Done
3,005,153 UART: [fht] FMC Alias Private Key: 7
3,006,225 UART: [art] Derive CDI
3,006,505 UART: [art] Store in in slot 0x4
3,092,262 UART: [art] Derive Key Pair
3,092,622 UART: [art] Store priv key in slot 0x5
3,105,900 UART: [art] Derive Key Pair - Done
3,120,241 UART: [art] Signing Cert with AUTHO
3,120,721 UART: RITY.KEYID = 7
3,136,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,806 UART: [art] PUB.X = 8FBC124F53379D039245CC3C8E8AE64964D7086690B69E2A8DEFD6EE2C0BF4027B4847766C6C963EECAF723D5769360F
3,143,567 UART: [art] PUB.Y = 5A7305DCEA473BE5CE2FCDA5BE23064D0C5F7392759AC512F09A7B3BF4BBEC3899892C172105B9D3A0E66A0E4E299D92
3,150,516 UART: [art] SIG.R = FDBC3C3F37CC2A2F2169C346227D476D6FC77A11E8DA910BCCB2907C80D0ABDE60B6C98E2E2365B5B099D52F0B35C3DD
3,157,300 UART: [art] SIG.S = 38FBDAFBB52CDEEDB879541D07C854F058318A8264C9B37ECACC8AD2E3D1711895893C64D847AA4184A3259E67E9D883
3,181,506 UART: Caliptra RT
3,181,851 UART: [state] CFI Enabled
3,289,882 UART: [rt] RT listening for mailbox commands...
3,290,545 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,352 UART: [rt]cmd =0x46504c54, len=4
3,321,349 >>> mbox cmd response data (8 bytes)
3,321,610 UART: [rt] FIPS self test
3,321,938 UART: [kat] ++
3,322,090 UART: [kat] sha1
3,326,440 UART: [kat] SHA2-256
3,328,462 UART: [kat] SHA2-384
3,331,401 UART: [kat] SHA2-512-ACC
3,333,328 UART: [kat] ECC-384
3,343,564 UART: [kat] HMAC-384Kdf
3,348,128 UART: Fatal Error: 0x90030002
3,349,678 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,349,683 >>> mbox cmd response: failed
3,349,683 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,349,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,706 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,282,069 UART: [fwproc] Wait for Commands...
1,282,892 UART: [fwproc] Recv command 0x46574c44
1,283,625 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,079 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,435 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,887 ready_for_fw is high
1,055,887 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,953 >>> mbox cmd response: success
2,697,607 UART:
2,697,623 UART: Running Caliptra FMC ...
2,698,031 UART:
2,698,174 UART: [state] CFI Enabled
2,709,043 UART: [fht] FMC Alias Private Key: 7
2,817,482 UART: [art] Extend RT PCRs Done
2,817,910 UART: [art] Lock RT PCRs Done
2,819,428 UART: [art] Populate DV Done
2,827,539 UART: [fht] FMC Alias Private Key: 7
2,828,557 UART: [art] Derive CDI
2,828,837 UART: [art] Store in in slot 0x4
2,913,922 UART: [art] Derive Key Pair
2,914,282 UART: [art] Store priv key in slot 0x5
2,927,376 UART: [art] Derive Key Pair - Done
2,941,828 UART: [art] Signing Cert with AUTHO
2,942,308 UART: RITY.KEYID = 7
2,957,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,267 UART: [art] PUB.X = 524B3E19455DEEE7A75ADA9ACC1FE69FD76C42312022A06D37086F489E1D1B273BE32777E03767972DF3834F1102AE9C
2,965,035 UART: [art] PUB.Y = 40707530F6CB9D3AA403B0322BC05819AD0401DD6815EE10527E2D66285D90843BA5B2D9443EBB7FAD3C7E9CD143B2D1
2,971,982 UART: [art] SIG.R = 0C9A5E8C8DBB4BA6D2519D5730D2DCC0F135EC17FE0C2526F4505FA5DA4E0F8FBFE39D6917A6EB047457CA6DAE48C500
2,978,740 UART: [art] SIG.S = FA0FA3208BC5D83BC172CFFC45E4DE3B3DB0F560BD35C1BC710F31C495636BDC89A779689484BB5958043F798E4207D5
3,002,255 UART: Caliptra RT
3,002,600 UART: [state] CFI Enabled
3,110,523 UART: [rt] RT listening for mailbox commands...
3,111,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,023 UART: [rt]cmd =0x46504c54, len=4
3,142,336 >>> mbox cmd response data (8 bytes)
3,142,585 UART: [rt] FIPS self test
3,142,913 UART: [kat] ++
3,143,065 UART: [kat] sha1
3,147,341 UART: [kat] SHA2-256
3,149,363 UART: [kat] SHA2-384
3,152,280 UART: [kat] SHA2-512-ACC
3,154,207 UART: [kat] ECC-384
3,164,501 UART: [kat] HMAC-384Kdf
3,169,027 UART: Fatal Error: 0x90030002
3,170,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,582 >>> mbox cmd response: failed
3,170,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,525 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,649 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
8,199,057 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,343,219 >>> mbox cmd response: failed
8,343,786 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,486,972 >>> mbox cmd response: failed
Initializing fuses
2,366 writing to cptra_bootfsm_go
4,879,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,458,580 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
8,185,907 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,330,160 >>> mbox cmd response: failed
8,330,728 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,474,056 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,869,355 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,472,137 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
8,502,644 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,646,913 >>> mbox cmd response: failed
8,647,476 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,790,818 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
16,257,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
29,706,188 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
8,494,950 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,638,990 >>> mbox cmd response: failed
8,639,539 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,782,866 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
16,276,918 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
29,710,455 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
5,711,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,856,456 >>> mbox cmd response: failed
5,857,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,000,821 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,454,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,511 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
5,755,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,900,449 >>> mbox cmd response: failed
5,901,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,044,784 >>> mbox cmd response: failed
Initializing fuses
993 writing to cptra_bootfsm_go
3,449,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,291,668 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
6,066,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,210,916 >>> mbox cmd response: failed
6,211,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,355,181 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,293,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,029,277 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
6,057,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,202,910 >>> mbox cmd response: failed
6,203,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,347,112 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,300,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,018,704 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
5,741,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,886,481 >>> mbox cmd response: failed
5,887,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,030,774 >>> mbox cmd response: failed
Initializing fuses
997 writing to cptra_bootfsm_go
3,451,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,285,676 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
5,759,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,903,739 >>> mbox cmd response: failed
5,904,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,048,024 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,472,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,323,164 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
6,056,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,201,122 >>> mbox cmd response: failed
6,201,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,345,583 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,302,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,015,496 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
6,067,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,212,257 >>> mbox cmd response: failed
6,212,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,356,402 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,287,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,009,352 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,148 >>> mbox cmd response: failed
1,098,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,022 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,558 >>> mbox cmd response: failed
1,097,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,142 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,355 >>> mbox cmd response: failed
1,098,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,329 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,663 >>> mbox cmd response: failed
1,098,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,605 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,778 >>> mbox cmd response: failed
1,097,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,946 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,594 >>> mbox cmd response: failed
1,097,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,780 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,841 >>> mbox cmd response: failed
1,097,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,597 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,885 >>> mbox cmd response: failed
1,097,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,999 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,178 >>> mbox cmd response: failed
1,097,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,948 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,884 >>> mbox cmd response: failed
1,097,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,280 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,257 >>> mbox cmd response: failed
1,098,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,099 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,227 >>> mbox cmd response: failed
1,098,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,813 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,183 UART:
192,548 UART: Running Caliptra ROM ...
193,638 UART:
193,779 UART: [state] CFI Enabled
263,865 UART: [state] LifecycleState = Unprovisioned
265,792 UART: [state] DebugLocked = No
267,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,846 UART: [kat] SHA2-256
442,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,210 UART: [kat] ++
453,684 UART: [kat] sha1
464,558 UART: [kat] SHA2-256
467,216 UART: [kat] SHA2-384
473,849 UART: [kat] SHA2-512-ACC
476,225 UART: [kat] ECC-384
2,767,574 UART: [kat] HMAC-384Kdf
2,780,040 UART: [kat] LMS
3,970,285 UART: [kat] --
3,974,406 UART: [cold-reset] ++
3,976,113 UART: [fht] Storing FHT @ 0x50003400
3,987,399 UART: [idev] ++
3,987,969 UART: [idev] CDI.KEYID = 6
3,988,899 UART: [idev] SUBJECT.KEYID = 7
3,990,153 UART: [idev] UDS.KEYID = 0
3,991,097 ready_for_fw is high
3,991,312 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,135,938 UART: [idev] Erasing UDS.KEYID = 0
7,323,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,313 UART: [idev] --
7,349,984 UART: [ldev] ++
7,350,571 UART: [ldev] CDI.KEYID = 6
7,351,495 UART: [ldev] SUBJECT.KEYID = 5
7,352,710 UART: [ldev] AUTHORITY.KEYID = 7
7,353,996 UART: [ldev] FE.KEYID = 1
7,381,271 UART: [ldev] Erasing FE.KEYID = 1
10,710,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,007,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,021,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,036,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,069,611 UART: [ldev] --
13,075,090 UART: [fwproc] Waiting for Commands...
13,078,058 UART: [fwproc] Received command 0x46574c44
13,080,245 UART: [fwproc] Received Image of size 114996 bytes
17,145,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,151 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,613,250 >>> mbox cmd response: success
17,617,846 UART: [afmc] ++
17,618,434 UART: [afmc] CDI.KEYID = 6
17,619,375 UART: [afmc] SUBJECT.KEYID = 7
17,620,588 UART: [afmc] AUTHORITY.KEYID = 5
20,988,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,130 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,556 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,360 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,877 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,016 UART: [afmc] --
23,359,029 UART: [cold-reset] --
23,363,000 UART: [state] Locking Datavault
23,368,845 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,595 UART: [state] Locking ICCM
23,372,606 UART: [exit] Launching FMC @ 0x40000130
23,380,996 UART:
23,381,230 UART: Running Caliptra FMC ...
23,382,254 UART:
23,382,401 UART: [state] CFI Enabled
23,447,426 UART: [fht] FMC Alias Private Key: 7
25,785,892 UART: [art] Extend RT PCRs Done
25,787,133 UART: [art] Lock RT PCRs Done
25,788,894 UART: [art] Populate DV Done
25,794,303 UART: [fht] FMC Alias Private Key: 7
25,796,001 UART: [art] Derive CDI
25,796,743 UART: [art] Store in in slot 0x4
25,856,327 UART: [art] Derive Key Pair
25,857,369 UART: [art] Store priv key in slot 0x5
29,151,096 UART: [art] Derive Key Pair - Done
29,163,616 UART: [art] Signing Cert with AUTHO
29,164,927 UART: RITY.KEYID = 7
31,452,068 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,578 UART: [art] PUB.X = 624865E59606FFAB597CD71BC90FCA84B35FE6047C9F3167CCC6F6DAD1DCBC64A2D3D9E4B9F97E3A4E4786C47518DFBE
31,460,835 UART: [art] PUB.Y = 94A808D571616AD35BED39B38BB0ACD69E8D34257A74B9C718413603CC129459157B4230BA158B0D14A3BE64686D0E2D
31,468,093 UART: [art] SIG.R = ADB13F3FB732B7DBAAEB2CEAC66817C16177FA740305EAD7C484F6762851FCEEDFF0D174788C5D322349BE10EBCFB778
31,475,492 UART: [art] SIG.S = F2EEDD4953EFB8D9727CCDB88E3FE26D8EDCD5AFA2300492F645E711ED868692F7823A4FDDB0B088032542A82C218AB5
32,780,570 UART: Caliptra RT
32,781,288 UART: [state] CFI Enabled
32,943,166 UART: [rt] RT listening for mailbox commands...
32,945,020 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,974,716 UART: [rt]cmd =0x46504c54, len=4
32,976,298 >>> mbox cmd response data (8 bytes)
32,977,591 UART: [rt] FIPS self test
32,978,539 UART: [kat] ++
32,978,993 UART: [kat] sha1
32,983,452 UART: [kat] SHA2-256
32,985,379 UART: [kat] SHA2-384
32,988,550 UART: [kat] SHA2-512-ACC
32,990,790 UART: [kat] ECC-384
36,256,917 UART: [kat] HMAC-384Kdf
36,274,479 UART: [kat] LMS
37,047,425 UART: Fatal Error: 0x90070002
37,082,722 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,227,199 >>> mbox cmd response: failed
37,227,862 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,372,741 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,090 UART:
190,379 UART: Running Caliptra ROM ...
191,441 UART:
191,586 UART: [state] CFI Enabled
254,233 UART: [state] LifecycleState = Unprovisioned
256,145 UART: [state] DebugLocked = No
258,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,494 UART: [kat] SHA2-256
433,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,704 UART: [kat] ++
444,153 UART: [kat] sha1
454,351 UART: [kat] SHA2-256
457,036 UART: [kat] SHA2-384
462,802 UART: [kat] SHA2-512-ACC
465,136 UART: [kat] ECC-384
2,756,399 UART: [kat] HMAC-384Kdf
2,787,702 UART: [kat] LMS
3,978,014 UART: [kat] --
3,982,976 UART: [cold-reset] ++
3,984,637 UART: [fht] Storing FHT @ 0x50003400
3,995,416 UART: [idev] ++
3,995,988 UART: [idev] CDI.KEYID = 6
3,997,005 UART: [idev] SUBJECT.KEYID = 7
3,998,170 UART: [idev] UDS.KEYID = 0
3,999,799 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,144,752 UART: [idev] Erasing UDS.KEYID = 0
7,335,855 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,175 UART: [idev] --
7,359,525 UART: [ldev] ++
7,360,095 UART: [ldev] CDI.KEYID = 6
7,361,065 UART: [ldev] SUBJECT.KEYID = 5
7,362,275 UART: [ldev] AUTHORITY.KEYID = 7
7,363,510 UART: [ldev] FE.KEYID = 1
7,408,301 UART: [ldev] Erasing FE.KEYID = 1
10,741,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,702 UART: [ldev] --
13,102,188 UART: [fwproc] Waiting for Commands...
13,104,983 UART: [fwproc] Received command 0x46574c44
13,107,168 UART: [fwproc] Received Image of size 114996 bytes
17,169,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,634,475 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,780,361 ready_for_fw is high
3,780,764 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,853,314 >>> mbox cmd response: success
23,550,340 UART:
23,550,742 UART: Running Caliptra FMC ...
23,551,871 UART:
23,552,026 UART: [state] CFI Enabled
23,617,711 UART: [fht] FMC Alias Private Key: 7
25,955,923 UART: [art] Extend RT PCRs Done
25,957,145 UART: [art] Lock RT PCRs Done
25,958,796 UART: [art] Populate DV Done
25,964,502 UART: [fht] FMC Alias Private Key: 7
25,966,154 UART: [art] Derive CDI
25,966,971 UART: [art] Store in in slot 0x4
26,017,856 UART: [art] Derive Key Pair
26,018,874 UART: [art] Store priv key in slot 0x5
29,313,067 UART: [art] Derive Key Pair - Done
29,326,129 UART: [art] Signing Cert with AUTHO
29,327,434 UART: RITY.KEYID = 7
31,614,336 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,849 UART: [art] PUB.X = 236EA8CE384C78A3F0B4A576A7346B9D0D0DD5BF9D4623353E8CFD4242096D02A1D8058AA351FC590BA6E799AF74080A
31,623,113 UART: [art] PUB.Y = C50C604EAC942EA7DA832B1F18DFAF7ECFAE8FFD3F5B50C41C26D0AB84FEE3330A2D7BE7387C6FA9815B0849959E47D8
31,630,374 UART: [art] SIG.R = 98DB7AA2C0932A1BFC752FCE992C35084073F039D7B0DC323423022B3C9881A1CF223C05D43A08635FC1BC2E699FB021
31,637,767 UART: [art] SIG.S = 44DD035FBDD1BADF5348A56CB681AFC5745AA8594B04B89311B8CCCE65C5479D757DEF393AB2132884DD86074A6E1121
32,942,727 UART: Caliptra RT
32,943,433 UART: [state] CFI Enabled
33,103,790 UART: [rt] RT listening for mailbox commands...
33,105,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,135,343 UART: [rt]cmd =0x46504c54, len=4
33,136,978 >>> mbox cmd response data (8 bytes)
33,137,739 UART: [rt] FIPS self test
33,138,689 UART: [kat] ++
33,139,139 UART: [kat] sha1
33,143,734 UART: [kat] SHA2-256
33,145,718 UART: [kat] SHA2-384
33,148,728 UART: [kat] SHA2-512-ACC
33,150,980 UART: [kat] ECC-384
36,418,888 UART: [kat] HMAC-384Kdf
36,426,467 UART: [kat] LMS
37,199,554 UART: Fatal Error: 0x90070002
37,234,838 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,379,269 >>> mbox cmd response: failed
37,379,922 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,524,387 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,795,135 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,872,688 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,682 UART:
193,068 UART: Running Caliptra ROM ...
194,218 UART:
603,689 UART: [state] CFI Enabled
618,223 UART: [state] LifecycleState = Unprovisioned
620,107 UART: [state] DebugLocked = No
622,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,999 UART: [kat] SHA2-256
796,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,274 UART: [kat] ++
807,906 UART: [kat] sha1
819,354 UART: [kat] SHA2-256
822,088 UART: [kat] SHA2-384
827,732 UART: [kat] SHA2-512-ACC
830,105 UART: [kat] ECC-384
3,111,945 UART: [kat] HMAC-384Kdf
3,122,829 UART: [kat] LMS
4,312,976 UART: [kat] --
4,318,066 UART: [cold-reset] ++
4,319,083 UART: [fht] Storing FHT @ 0x50003400
4,331,963 UART: [idev] ++
4,332,569 UART: [idev] CDI.KEYID = 6
4,333,460 UART: [idev] SUBJECT.KEYID = 7
4,334,710 UART: [idev] UDS.KEYID = 0
4,335,790 ready_for_fw is high
4,335,999 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,292 UART: [idev] Erasing UDS.KEYID = 0
7,622,129 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,409 UART: [idev] --
7,647,844 UART: [ldev] ++
7,648,416 UART: [ldev] CDI.KEYID = 6
7,649,403 UART: [ldev] SUBJECT.KEYID = 5
7,650,571 UART: [ldev] AUTHORITY.KEYID = 7
7,651,867 UART: [ldev] FE.KEYID = 1
7,662,679 UART: [ldev] Erasing FE.KEYID = 1
10,949,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,969 UART: [ldev] --
13,310,868 UART: [fwproc] Waiting for Commands...
13,313,833 UART: [fwproc] Received command 0x46574c44
13,316,022 UART: [fwproc] Received Image of size 114996 bytes
17,377,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,842,725 >>> mbox cmd response: success
17,846,213 UART: [afmc] ++
17,846,806 UART: [afmc] CDI.KEYID = 6
17,847,913 UART: [afmc] SUBJECT.KEYID = 7
17,848,945 UART: [afmc] AUTHORITY.KEYID = 5
21,161,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,840 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,177 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,031 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,452 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,130 UART: [afmc] --
23,528,804 UART: [cold-reset] --
23,532,647 UART: [state] Locking Datavault
23,539,359 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,061 UART: [state] Locking ICCM
23,542,510 UART: [exit] Launching FMC @ 0x40000130
23,550,904 UART:
23,551,140 UART: Running Caliptra FMC ...
23,552,167 UART:
23,552,314 UART: [state] CFI Enabled
23,560,633 UART: [fht] FMC Alias Private Key: 7
25,891,556 UART: [art] Extend RT PCRs Done
25,892,784 UART: [art] Lock RT PCRs Done
25,894,601 UART: [art] Populate DV Done
25,900,178 UART: [fht] FMC Alias Private Key: 7
25,901,933 UART: [art] Derive CDI
25,902,753 UART: [art] Store in in slot 0x4
25,945,301 UART: [art] Derive Key Pair
25,946,347 UART: [art] Store priv key in slot 0x5
29,188,586 UART: [art] Derive Key Pair - Done
29,201,710 UART: [art] Signing Cert with AUTHO
29,203,047 UART: RITY.KEYID = 7
31,482,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,103 UART: [art] PUB.X = 7F53448B20149DC4D81DBB466930854C3DA89C7AA1A6AEA5EBE233D0B8CC7DD306F5B91346F2F172AD313F5A1662C6CC
31,491,306 UART: [art] PUB.Y = 2498F62AE949A33D73CD3E03DC4FCA1E043818039263035CAFAF892D4187386529EEC80B754B12514DF474F655364CD3
31,498,551 UART: [art] SIG.R = 1849BCD2DE2A6FAC69A840704A78E339FB2FD84363C685E4BC26C61A2D6189E61AB5AB4AA411185E26F7D30F0A3B8A44
31,505,960 UART: [art] SIG.S = 7A56F07E1EC9AADA742BE144DD353721FA1F6D11B65D102DF60AAE52C2450B1DB5568FB4E4F609494986CCA436D54D50
32,810,690 UART: Caliptra RT
32,811,406 UART: [state] CFI Enabled
32,929,007 UART: [rt] RT listening for mailbox commands...
32,930,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,483 UART: [rt]cmd =0x46504c54, len=4
32,962,057 >>> mbox cmd response data (8 bytes)
32,963,024 UART: [rt] FIPS self test
32,963,966 UART: [kat] ++
32,964,414 UART: [kat] sha1
32,968,777 UART: [kat] SHA2-256
32,970,713 UART: [kat] SHA2-384
32,973,872 UART: [kat] SHA2-512-ACC
32,976,108 UART: [kat] ECC-384
36,219,033 UART: [kat] HMAC-384Kdf
36,224,961 UART: [kat] LMS
36,998,075 UART: Fatal Error: 0x90070002
37,033,293 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,177,708 >>> mbox cmd response: failed
37,178,341 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,322,855 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
189,993 UART:
190,281 UART: Running Caliptra ROM ...
191,309 UART:
3,203,859 UART: [state] CFI Enabled
3,219,701 UART: [state] LifecycleState = Unprovisioned
3,221,622 UART: [state] DebugLocked = No
3,224,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,229,156 UART: [kat] SHA2-256
3,398,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,409,454 UART: [kat] ++
3,409,946 UART: [kat] sha1
3,421,976 UART: [kat] SHA2-256
3,424,666 UART: [kat] SHA2-384
3,429,254 UART: [kat] SHA2-512-ACC
3,431,613 UART: [kat] ECC-384
5,717,934 UART: [kat] HMAC-384Kdf
5,729,901 UART: [kat] LMS
6,919,990 UART: [kat] --
6,925,843 UART: [cold-reset] ++
6,927,165 UART: [fht] Storing FHT @ 0x50003400
6,940,040 UART: [idev] ++
6,940,612 UART: [idev] CDI.KEYID = 6
6,941,556 UART: [idev] SUBJECT.KEYID = 7
6,942,832 UART: [idev] UDS.KEYID = 0
6,944,330 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,088,672 UART: [idev] Erasing UDS.KEYID = 0
10,232,643 UART: [idev] Using Sha1 for KeyId Algorithm
10,254,947 UART: [idev] --
10,258,946 UART: [ldev] ++
10,259,519 UART: [ldev] CDI.KEYID = 6
10,260,487 UART: [ldev] SUBJECT.KEYID = 5
10,261,702 UART: [ldev] AUTHORITY.KEYID = 7
10,262,991 UART: [ldev] FE.KEYID = 1
10,274,556 UART: [ldev] Erasing FE.KEYID = 1
13,564,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,857,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,872,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,886,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,901,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,920,261 UART: [ldev] --
15,925,314 UART: [fwproc] Waiting for Commands...
15,928,283 UART: [fwproc] Received command 0x46574c44
15,930,472 UART: [fwproc] Received Image of size 114996 bytes
19,989,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,065,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,134,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
20,455,339 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
4,132,992 ready_for_fw is high
4,133,650 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,107,711 >>> mbox cmd response: success
23,750,572 UART:
23,751,077 UART: Running Caliptra FMC ...
23,752,205 UART:
23,752,363 UART: [state] CFI Enabled
23,760,428 UART: [fht] FMC Alias Private Key: 7
26,091,099 UART: [art] Extend RT PCRs Done
26,092,332 UART: [art] Lock RT PCRs Done
26,094,339 UART: [art] Populate DV Done
26,099,598 UART: [fht] FMC Alias Private Key: 7
26,101,144 UART: [art] Derive CDI
26,101,959 UART: [art] Store in in slot 0x4
26,144,587 UART: [art] Derive Key Pair
26,145,625 UART: [art] Store priv key in slot 0x5
29,387,000 UART: [art] Derive Key Pair - Done
29,400,113 UART: [art] Signing Cert with AUTHO
29,401,446 UART: RITY.KEYID = 7
31,681,078 UART: [art] Erasing AUTHORITY.KEYID = 7
31,682,596 UART: [art] PUB.X = EE3E4A0031FBA2B59B4EC6BC8C4264BDFA5C73290C2C5EB31C1741DA827A8AA52E91C1DC5A9B0399C543CDA26C3CB100
31,689,847 UART: [art] PUB.Y = 9B8E333AE14BACF28CB686F7187B6C05526B7362A63D27C16C97AA4C04DFBB75482FCBAE5635EC420D4FED95CE6F5892
31,697,093 UART: [art] SIG.R = 5FD5F493EB9626E643E3DF24934EDBD82630194943D68869E12EF090A4802E362E576E2097DA15B4574BE76E126DD2AA
31,704,484 UART: [art] SIG.S = 39635067E70EE6E531E5B4FD7E6179600E497DEB803419CD262309BE656384D711A8E86C2B19254684E4D81197EA6248
33,010,271 UART: Caliptra RT
33,010,973 UART: [state] CFI Enabled
33,129,604 UART: [rt] RT listening for mailbox commands...
33,131,443 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,161,128 UART: [rt]cmd =0x46504c54, len=4
33,162,710 >>> mbox cmd response data (8 bytes)
33,164,162 UART: [rt] FIPS self test
33,165,111 UART: [kat] ++
33,165,558 UART: [kat] sha1
33,170,067 UART: [kat] SHA2-256
33,171,995 UART: [kat] SHA2-384
33,174,961 UART: [kat] SHA2-512-ACC
33,177,256 UART: [kat] ECC-384
36,419,714 UART: [kat] HMAC-384Kdf
36,425,676 UART: [kat] LMS
37,198,826 UART: Fatal Error: 0x90070002
37,234,106 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,378,861 >>> mbox cmd response: failed
37,379,541 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,523,998 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
6,538,961 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
20,510,646 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,280 UART:
192,639 UART: Running Caliptra ROM ...
193,850 UART:
193,999 UART: [state] CFI Enabled
264,927 UART: [state] LifecycleState = Unprovisioned
266,782 UART: [state] DebugLocked = No
268,817 UART: [state] WD Timer not started. Device not locked for debugging
272,497 UART: [kat] SHA2-256
451,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,184 UART: [kat] ++
463,724 UART: [kat] sha1
474,797 UART: [kat] SHA2-256
477,878 UART: [kat] SHA2-384
483,511 UART: [kat] SHA2-512-ACC
486,459 UART: [kat] ECC-384
2,948,780 UART: [kat] HMAC-384Kdf
2,971,463 UART: [kat] LMS
3,500,902 UART: [kat] --
3,505,895 UART: [cold-reset] ++
3,507,329 UART: [fht] FHT @ 0x50003400
3,518,615 UART: [idev] ++
3,519,180 UART: [idev] CDI.KEYID = 6
3,520,137 UART: [idev] SUBJECT.KEYID = 7
3,521,318 UART: [idev] UDS.KEYID = 0
3,522,404 ready_for_fw is high
3,522,626 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,645 UART: [idev] Erasing UDS.KEYID = 0
6,024,664 UART: [idev] Sha1 KeyId Algorithm
6,047,860 UART: [idev] --
6,052,514 UART: [ldev] ++
6,053,127 UART: [ldev] CDI.KEYID = 6
6,054,064 UART: [ldev] SUBJECT.KEYID = 5
6,055,094 UART: [ldev] AUTHORITY.KEYID = 7
6,056,446 UART: [ldev] FE.KEYID = 1
6,100,069 UART: [ldev] Erasing FE.KEYID = 1
8,602,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,672 UART: [ldev] --
10,415,831 UART: [fwproc] Wait for Commands...
10,418,682 UART: [fwproc] Recv command 0x46574c44
10,420,724 UART: [fwproc] Recv'd Img size: 115304 bytes
13,835,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,979,509 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,300,512 >>> mbox cmd response: success
14,305,532 UART: [afmc] ++
14,306,118 UART: [afmc] CDI.KEYID = 6
14,307,032 UART: [afmc] SUBJECT.KEYID = 7
14,308,253 UART: [afmc] AUTHORITY.KEYID = 5
16,847,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,591,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,607,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,623,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,646,059 UART: [afmc] --
18,649,997 UART: [cold-reset] --
18,655,157 UART: [state] Locking Datavault
18,660,295 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,939 UART: [state] Locking ICCM
18,663,276 UART: [exit] Launching FMC @ 0x40000130
18,671,669 UART:
18,671,906 UART: Running Caliptra FMC ...
18,672,956 UART:
18,673,110 UART: [state] CFI Enabled
18,730,983 UART: [fht] FMC Alias Private Key: 7
20,494,685 UART: [art] Extend RT PCRs Done
20,495,911 UART: [art] Lock RT PCRs Done
20,497,474 UART: [art] Populate DV Done
20,502,722 UART: [fht] FMC Alias Private Key: 7
20,504,423 UART: [art] Derive CDI
20,505,241 UART: [art] Store in in slot 0x4
20,563,537 UART: [art] Derive Key Pair
20,564,583 UART: [art] Store priv key in slot 0x5
23,027,406 UART: [art] Derive Key Pair - Done
23,040,515 UART: [art] Signing Cert with AUTHO
23,041,822 UART: RITY.KEYID = 7
24,754,701 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,210 UART: [art] PUB.X = 8492D037EFB12B249A94BBCE72392CF82052106D5FF8AD1C7DB42E0D44F4178C1FB710A7DAF484ADAED5CD928676C344
24,763,467 UART: [art] PUB.Y = F896F3E84538B9021AEC29C95E6181E429182D7EF16E3E9D7C25177BA2A0EAE6F836870B4ECB0DF986CA348567E168EA
24,770,770 UART: [art] SIG.R = 4B3E669E7CA911C8D3EBEDB4F7DA4670D366C11E75C0A214DCBD1ED416F3C3C561CD73A6DC901F6E782428690AC46AAD
24,778,224 UART: [art] SIG.S = 12D2B9A0DD0220C49F1FAD461FDDD8FDEC7BF497239DBD1B48CA61B7AB53C903863BADB7F6012D613DF9D029F2ACAC17
25,757,667 UART: Caliptra RT
25,758,380 UART: [state] CFI Enabled
25,923,402 UART: [rt] RT listening for mailbox commands...
25,925,262 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,955,008 UART: [rt]cmd =0x46504c54, len=4
25,956,376 >>> mbox cmd response data (8 bytes)
25,957,399 UART: [rt] FIPS self test
25,958,345 UART: [kat] ++
25,958,796 UART: [kat] sha1
25,963,086 UART: [kat] SHA2-256
25,965,023 UART: [kat] SHA2-384
25,968,098 UART: [kat] SHA2-512-ACC
25,970,340 UART: [kat] ECC-384
28,408,714 UART: [kat] HMAC-384Kdf
28,435,717 UART: [kat] LMS
28,660,460 UART: Fatal Error: 0x90070002
28,695,821 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,840,544 >>> mbox cmd response: failed
28,841,218 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,986,008 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,068 UART:
190,391 UART: Running Caliptra ROM ...
191,454 UART:
191,598 UART: [state] CFI Enabled
267,803 UART: [state] LifecycleState = Unprovisioned
269,669 UART: [state] DebugLocked = No
271,913 UART: [state] WD Timer not started. Device not locked for debugging
274,941 UART: [kat] SHA2-256
454,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,630 UART: [kat] ++
466,163 UART: [kat] sha1
475,911 UART: [kat] SHA2-256
478,922 UART: [kat] SHA2-384
485,493 UART: [kat] SHA2-512-ACC
488,477 UART: [kat] ECC-384
2,952,598 UART: [kat] HMAC-384Kdf
2,975,637 UART: [kat] LMS
3,505,072 UART: [kat] --
3,508,699 UART: [cold-reset] ++
3,509,771 UART: [fht] FHT @ 0x50003400
3,521,075 UART: [idev] ++
3,521,647 UART: [idev] CDI.KEYID = 6
3,522,556 UART: [idev] SUBJECT.KEYID = 7
3,523,774 UART: [idev] UDS.KEYID = 0
3,525,293 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,285 UART: [idev] Erasing UDS.KEYID = 0
6,029,608 UART: [idev] Sha1 KeyId Algorithm
6,052,996 UART: [idev] --
6,056,996 UART: [ldev] ++
6,057,569 UART: [ldev] CDI.KEYID = 6
6,058,456 UART: [ldev] SUBJECT.KEYID = 5
6,059,672 UART: [ldev] AUTHORITY.KEYID = 7
6,060,906 UART: [ldev] FE.KEYID = 1
6,103,582 UART: [ldev] Erasing FE.KEYID = 1
8,605,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,392 UART: [ldev] --
10,418,494 UART: [fwproc] Wait for Commands...
10,420,021 UART: [fwproc] Recv command 0x46574c44
10,422,124 UART: [fwproc] Recv'd Img size: 115304 bytes
13,839,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,911,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,980,732 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,302,113 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,358,284 ready_for_fw is high
3,358,757 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,079,236 >>> mbox cmd response: success
18,361,304 UART:
18,361,713 UART: Running Caliptra FMC ...
18,362,874 UART:
18,363,033 UART: [state] CFI Enabled
18,428,218 UART: [fht] FMC Alias Private Key: 7
20,192,290 UART: [art] Extend RT PCRs Done
20,193,517 UART: [art] Lock RT PCRs Done
20,195,194 UART: [art] Populate DV Done
20,200,427 UART: [fht] FMC Alias Private Key: 7
20,202,032 UART: [art] Derive CDI
20,202,854 UART: [art] Store in in slot 0x4
20,260,878 UART: [art] Derive Key Pair
20,261,924 UART: [art] Store priv key in slot 0x5
22,725,662 UART: [art] Derive Key Pair - Done
22,738,660 UART: [art] Signing Cert with AUTHO
22,740,002 UART: RITY.KEYID = 7
24,451,286 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,803 UART: [art] PUB.X = 4161E9A81D4D19F0339A7A970F8C4130877229E147A3015C5CE06CA9644AFF360C4F46118E34428F7820A4F53E4E23F3
24,460,067 UART: [art] PUB.Y = 338B1047C0EE1218F3D59D3DF4C2C569CC6640D316EB5043A4C9BB6A22DEE5B3F804F5ECED4983328694E81C1351FA8A
24,467,286 UART: [art] SIG.R = 4BFF432F3076FA8D36B53AF058BF8B5CF50029DA31A71C804E4EA2FFBD3E5B5B424ADCF715C19AA3292845B03C0D4D56
24,474,736 UART: [art] SIG.S = 394421840038455653BD44CE11D5C30631122469FB1A588CA6251832D6768078D0BE8C42684C20D3B920A9B94C9AB911
25,452,897 UART: Caliptra RT
25,453,615 UART: [state] CFI Enabled
25,619,339 UART: [rt] RT listening for mailbox commands...
25,621,189 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,650,712 UART: [rt]cmd =0x46504c54, len=4
25,652,346 >>> mbox cmd response data (8 bytes)
25,653,411 UART: [rt] FIPS self test
25,654,355 UART: [kat] ++
25,654,851 UART: [kat] sha1
25,659,306 UART: [kat] SHA2-256
25,661,236 UART: [kat] SHA2-384
25,664,268 UART: [kat] SHA2-512-ACC
25,666,536 UART: [kat] ECC-384
28,105,353 UART: [kat] HMAC-384Kdf
28,131,697 UART: [kat] LMS
28,356,431 UART: Fatal Error: 0x90070002
28,391,703 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,536,533 >>> mbox cmd response: failed
28,537,229 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,681,993 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,343,515 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,065,812 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,524 UART:
192,906 UART: Running Caliptra ROM ...
194,120 UART:
603,690 UART: [state] CFI Enabled
620,083 UART: [state] LifecycleState = Unprovisioned
621,905 UART: [state] DebugLocked = No
623,203 UART: [state] WD Timer not started. Device not locked for debugging
626,099 UART: [kat] SHA2-256
805,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,744 UART: [kat] ++
817,280 UART: [kat] sha1
829,440 UART: [kat] SHA2-256
832,524 UART: [kat] SHA2-384
837,408 UART: [kat] SHA2-512-ACC
840,389 UART: [kat] ECC-384
3,281,513 UART: [kat] HMAC-384Kdf
3,293,397 UART: [kat] LMS
3,822,883 UART: [kat] --
3,826,879 UART: [cold-reset] ++
3,828,387 UART: [fht] FHT @ 0x50003400
3,839,721 UART: [idev] ++
3,840,291 UART: [idev] CDI.KEYID = 6
3,841,222 UART: [idev] SUBJECT.KEYID = 7
3,842,401 UART: [idev] UDS.KEYID = 0
3,843,328 ready_for_fw is high
3,843,528 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,988,375 UART: [idev] Erasing UDS.KEYID = 0
6,316,893 UART: [idev] Sha1 KeyId Algorithm
6,339,647 UART: [idev] --
6,343,582 UART: [ldev] ++
6,344,150 UART: [ldev] CDI.KEYID = 6
6,345,034 UART: [ldev] SUBJECT.KEYID = 5
6,346,250 UART: [ldev] AUTHORITY.KEYID = 7
6,347,485 UART: [ldev] FE.KEYID = 1
6,358,249 UART: [ldev] Erasing FE.KEYID = 1
8,834,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,766 UART: [ldev] --
10,625,435 UART: [fwproc] Wait for Commands...
10,627,798 UART: [fwproc] Recv command 0x46574c44
10,629,891 UART: [fwproc] Recv'd Img size: 115304 bytes
14,041,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,122 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,498,713 >>> mbox cmd response: success
14,503,266 UART: [afmc] ++
14,503,855 UART: [afmc] CDI.KEYID = 6
14,504,768 UART: [afmc] SUBJECT.KEYID = 7
14,505,931 UART: [afmc] AUTHORITY.KEYID = 5
17,001,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,773 UART: [afmc] --
18,798,477 UART: [cold-reset] --
18,802,555 UART: [state] Locking Datavault
18,806,723 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,376 UART: [state] Locking ICCM
18,810,204 UART: [exit] Launching FMC @ 0x40000130
18,818,657 UART:
18,818,893 UART: Running Caliptra FMC ...
18,819,995 UART:
18,820,152 UART: [state] CFI Enabled
18,828,309 UART: [fht] FMC Alias Private Key: 7
20,584,778 UART: [art] Extend RT PCRs Done
20,586,020 UART: [art] Lock RT PCRs Done
20,587,595 UART: [art] Populate DV Done
20,592,902 UART: [fht] FMC Alias Private Key: 7
20,594,452 UART: [art] Derive CDI
20,595,273 UART: [art] Store in in slot 0x4
20,638,143 UART: [art] Derive Key Pair
20,639,188 UART: [art] Store priv key in slot 0x5
23,065,720 UART: [art] Derive Key Pair - Done
23,078,551 UART: [art] Signing Cert with AUTHO
23,079,886 UART: RITY.KEYID = 7
24,785,530 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,034 UART: [art] PUB.X = 491B5AF1FDEBED467C9E57FE5DB628970F65707231C899B8067931167DD590425ACA4690D70D2615D5D9F6475B64B96F
24,794,232 UART: [art] PUB.Y = 67907640A5E1D390D069F581C0AA82A786A7FE4A3D4343DBBDC87A0DB0429A7CD3B21ABC361E7EF12A7F07883E24C495
24,801,519 UART: [art] SIG.R = 099C1872BDCC384E282F06BF01CDCB947E1B561E45001096958A4CCC1F21896BE8B9901FACEF0987635FE0290D8D8C8F
24,808,919 UART: [art] SIG.S = 6227D84F86BC2E622EE08E6C5081B99857C2646B650C518C71CB1CE5BD7E86BF486CE8742F0A08B1716049AB033398A7
25,787,914 UART: Caliptra RT
25,788,657 UART: [state] CFI Enabled
25,906,718 UART: [rt] RT listening for mailbox commands...
25,908,576 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,411 UART: [rt]cmd =0x46504c54, len=4
25,939,994 >>> mbox cmd response data (8 bytes)
25,941,054 UART: [rt] FIPS self test
25,941,999 UART: [kat] ++
25,942,487 UART: [kat] sha1
25,946,948 UART: [kat] SHA2-256
25,948,885 UART: [kat] SHA2-384
25,951,952 UART: [kat] SHA2-512-ACC
25,954,193 UART: [kat] ECC-384
28,381,823 UART: [kat] HMAC-384Kdf
28,387,788 UART: [kat] LMS
28,612,440 UART: Fatal Error: 0x90070002
28,647,702 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,792,530 >>> mbox cmd response: failed
28,793,119 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,937,902 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
189,986 UART:
190,275 UART: Running Caliptra ROM ...
191,302 UART:
11,596,831 UART: [state] CFI Enabled
11,607,105 UART: [state] LifecycleState = Unprovisioned
11,608,957 UART: [state] DebugLocked = No
11,610,446 UART: [state] WD Timer not started. Device not locked for debugging
11,614,623 UART: [kat] SHA2-256
11,793,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
11,805,314 UART: [kat] ++
11,805,861 UART: [kat] sha1
11,817,207 UART: [kat] SHA2-256
11,820,225 UART: [kat] SHA2-384
11,825,922 UART: [kat] SHA2-512-ACC
11,828,880 UART: [kat] ECC-384
14,269,317 UART: [kat] HMAC-384Kdf
14,282,189 UART: [kat] LMS
14,811,687 UART: [kat] --
14,816,266 UART: [cold-reset] ++
14,817,927 UART: [fht] FHT @ 0x50003400
14,829,341 UART: [idev] ++
14,829,910 UART: [idev] CDI.KEYID = 6
14,830,789 UART: [idev] SUBJECT.KEYID = 7
14,832,060 UART: [idev] UDS.KEYID = 0
14,833,562 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,978,327 UART: [idev] Erasing UDS.KEYID = 0
17,301,763 UART: [idev] Sha1 KeyId Algorithm
17,324,850 UART: [idev] --
17,328,739 UART: [ldev] ++
17,329,304 UART: [ldev] CDI.KEYID = 6
17,330,208 UART: [ldev] SUBJECT.KEYID = 5
17,331,425 UART: [ldev] AUTHORITY.KEYID = 7
17,332,650 UART: [ldev] FE.KEYID = 1
17,342,602 UART: [ldev] Erasing FE.KEYID = 1
19,818,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,539,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,555,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,570,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,586,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,607,767 UART: [ldev] --
21,613,247 UART: [fwproc] Wait for Commands...
21,614,969 UART: [fwproc] Recv command 0x46574c44
21,617,018 UART: [fwproc] Recv'd Img size: 115304 bytes
25,037,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,106,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,175,045 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,496,856 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
3,695,918 ready_for_fw is high
3,696,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,285,516 >>> mbox cmd response: success
18,534,057 UART:
18,534,439 UART: Running Caliptra FMC ...
18,535,560 UART:
18,535,717 UART: [state] CFI Enabled
18,543,689 UART: [fht] FMC Alias Private Key: 7
20,301,391 UART: [art] Extend RT PCRs Done
20,302,633 UART: [art] Lock RT PCRs Done
20,304,003 UART: [art] Populate DV Done
20,309,313 UART: [fht] FMC Alias Private Key: 7
20,310,970 UART: [art] Derive CDI
20,311,710 UART: [art] Store in in slot 0x4
20,354,215 UART: [art] Derive Key Pair
20,355,223 UART: [art] Store priv key in slot 0x5
22,781,940 UART: [art] Derive Key Pair - Done
22,794,833 UART: [art] Signing Cert with AUTHO
22,796,146 UART: RITY.KEYID = 7
24,501,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,229 UART: [art] PUB.X = EC132E9CEFACDF559F01084EEE1498E03EC336449481FC9A7863C706FF67A5D83D05AB18FD0F6CB87D21010C11173F74
24,510,497 UART: [art] PUB.Y = 0FC2866866EEB6B51E0E4E40B2C8DA9927B207FC430B2F6DBC02B64810C3EEE5D6CA1D9F2344BAB52F02394CF384D213
24,517,767 UART: [art] SIG.R = A1B058BA81FAC5C41C2A5375F9416B81DA46013CDB127CE815DF3E5A3EAA6BE1736D92152E050A2236976FD9FAB375E6
24,525,164 UART: [art] SIG.S = 296421FA633CB62CBEBB3265887FE06FB4ACE982C20B430E3A998823C9E6ED750FBFD260EA2D584FC4FC260D88217277
25,504,734 UART: Caliptra RT
25,505,447 UART: [state] CFI Enabled
25,622,953 UART: [rt] RT listening for mailbox commands...
25,624,807 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,544 UART: [rt]cmd =0x46504c54, len=4
25,656,177 >>> mbox cmd response data (8 bytes)
25,657,678 UART: [rt] FIPS self test
25,658,809 UART: [kat] ++
25,659,280 UART: [kat] sha1
25,663,419 UART: [kat] SHA2-256
25,665,360 UART: [kat] SHA2-384
25,668,267 UART: [kat] SHA2-512-ACC
25,670,540 UART: [kat] ECC-384
28,097,869 UART: [kat] HMAC-384Kdf
28,103,776 UART: [kat] LMS
28,328,489 UART: Fatal Error: 0x90070002
28,363,749 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,508,529 >>> mbox cmd response: failed
28,509,183 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,653,897 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
14,980,348 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,572,152 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,072 UART:
192,461 UART: Running Caliptra ROM ...
193,552 UART:
193,693 UART: [state] CFI Enabled
264,830 UART: [state] LifecycleState = Unprovisioned
267,195 UART: [state] DebugLocked = No
268,514 UART: [state] WD Timer not started. Device not locked for debugging
272,848 UART: [kat] SHA2-256
462,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,515 UART: [kat] ++
474,002 UART: [kat] sha1
486,309 UART: [kat] SHA2-256
489,326 UART: [kat] SHA2-384
495,252 UART: [kat] SHA2-512-ACC
497,836 UART: [kat] ECC-384
2,949,329 UART: [kat] HMAC-384Kdf
2,971,943 UART: [kat] LMS
3,503,714 UART: [kat] --
3,508,941 UART: [cold-reset] ++
3,510,597 UART: [fht] FHT @ 0x50003400
3,522,850 UART: [idev] ++
3,523,499 UART: [idev] CDI.KEYID = 6
3,524,480 UART: [idev] SUBJECT.KEYID = 7
3,525,657 UART: [idev] UDS.KEYID = 0
3,526,584 ready_for_fw is high
3,526,814 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,853 UART: [idev] Erasing UDS.KEYID = 0
6,031,516 UART: [idev] Sha1 KeyId Algorithm
6,053,150 UART: [idev] --
6,056,769 UART: [ldev] ++
6,057,515 UART: [ldev] CDI.KEYID = 6
6,058,592 UART: [ldev] SUBJECT.KEYID = 5
6,059,656 UART: [ldev] AUTHORITY.KEYID = 7
6,060,832 UART: [ldev] FE.KEYID = 1
6,100,910 UART: [ldev] Erasing FE.KEYID = 1
8,605,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,793 UART: [ldev] --
10,414,963 UART: [fwproc] Wait for Commands...
10,417,331 UART: [fwproc] Recv command 0x46574c44
10,419,654 UART: [fwproc] Recv'd Img size: 115304 bytes
13,878,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,825 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,617,717 >>> mbox cmd response: success
14,621,432 UART: [afmc] ++
14,622,132 UART: [afmc] CDI.KEYID = 6
14,623,318 UART: [afmc] SUBJECT.KEYID = 7
14,624,798 UART: [afmc] AUTHORITY.KEYID = 5
17,168,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,624 UART: [afmc] --
18,967,227 UART: [cold-reset] --
18,971,203 UART: [state] Locking Datavault
18,976,236 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,369 UART: [state] Locking ICCM
18,979,763 UART: [exit] Launching FMC @ 0x40000130
18,988,431 UART:
18,988,664 UART: Running Caliptra FMC ...
18,989,767 UART:
18,989,927 UART: [state] CFI Enabled
19,049,592 UART: [fht] FMC Alias Private Key: 7
20,813,930 UART: [art] Extend RT PCRs Done
20,815,151 UART: [art] Lock RT PCRs Done
20,816,884 UART: [art] Populate DV Done
20,822,076 UART: [fht] FMC Alias Private Key: 7
20,823,750 UART: [art] Derive CDI
20,824,522 UART: [art] Store in in slot 0x4
20,881,291 UART: [art] Derive Key Pair
20,882,333 UART: [art] Store priv key in slot 0x5
23,345,196 UART: [art] Derive Key Pair - Done
23,358,463 UART: [art] Signing Cert with AUTHO
23,359,768 UART: RITY.KEYID = 7
25,070,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,380 UART: [art] PUB.X = A81AC6D1E381AF34628F561643E04ACBA5720ABD4D09586B912EA7C13A79E0807BC11798356A1CC93FFAE665AE7A0D9C
25,079,538 UART: [art] PUB.Y = 62ABC154272EC0D4EC771EFC3408840ACFE26209D0402FB73ED732B29CBB0F6B9C55257A698699E53CE76DB858447BB1
25,086,779 UART: [art] SIG.R = 2867D534F5FE468700671110AC38DEAE5F6F34DF4F347B1610F21AA7242B1C07148813B98380E532DE9A20912A59A8BA
25,094,176 UART: [art] SIG.S = F0F92CDF1EC0803D50516184AE948A2970BC832BC8C9CB72625A93E47DC0701F4E5A11F96BCA71DA85A4B24FFACEC7D2
26,073,345 UART: Caliptra RT
26,074,059 UART: [state] CFI Enabled
26,238,083 UART: [rt] RT listening for mailbox commands...
26,239,938 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,269,367 UART: [rt]cmd =0x46504c54, len=4
26,271,160 >>> mbox cmd response data (8 bytes)
26,271,968 UART: [rt] FIPS self test
26,272,881 UART: [kat] ++
26,273,329 UART: [kat] sha1
26,277,756 UART: [kat] SHA2-256
26,279,642 UART: [kat] SHA2-384
26,282,523 UART: [kat] SHA2-512-ACC
26,284,756 UART: [kat] ECC-384
28,722,818 UART: [kat] HMAC-384Kdf
28,748,794 UART: [kat] LMS
28,973,421 UART: Fatal Error: 0x90070002
29,008,876 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,153,763 >>> mbox cmd response: failed
29,154,409 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,299,003 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,016 UART:
190,311 UART: Running Caliptra ROM ...
191,338 UART:
191,476 UART: [state] CFI Enabled
266,916 UART: [state] LifecycleState = Unprovisioned
269,327 UART: [state] DebugLocked = No
270,676 UART: [state] WD Timer not started. Device not locked for debugging
275,327 UART: [kat] SHA2-256
465,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,975 UART: [kat] ++
476,418 UART: [kat] sha1
489,029 UART: [kat] SHA2-256
492,090 UART: [kat] SHA2-384
498,861 UART: [kat] SHA2-512-ACC
501,450 UART: [kat] ECC-384
2,949,627 UART: [kat] HMAC-384Kdf
2,975,407 UART: [kat] LMS
3,507,188 UART: [kat] --
3,511,673 UART: [cold-reset] ++
3,513,068 UART: [fht] FHT @ 0x50003400
3,523,782 UART: [idev] ++
3,524,523 UART: [idev] CDI.KEYID = 6
3,525,430 UART: [idev] SUBJECT.KEYID = 7
3,526,642 UART: [idev] UDS.KEYID = 0
3,528,150 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,673,095 UART: [idev] Erasing UDS.KEYID = 0
6,030,656 UART: [idev] Sha1 KeyId Algorithm
6,053,954 UART: [idev] --
6,058,491 UART: [ldev] ++
6,059,170 UART: [ldev] CDI.KEYID = 6
6,060,157 UART: [ldev] SUBJECT.KEYID = 5
6,061,318 UART: [ldev] AUTHORITY.KEYID = 7
6,062,495 UART: [ldev] FE.KEYID = 1
6,103,011 UART: [ldev] Erasing FE.KEYID = 1
8,606,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,730 UART: [ldev] --
10,415,567 UART: [fwproc] Wait for Commands...
10,418,305 UART: [fwproc] Recv command 0x46574c44
10,420,622 UART: [fwproc] Recv'd Img size: 115304 bytes
13,883,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,564 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,629,987 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,439,565 ready_for_fw is high
3,440,238 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,766,247 >>> mbox cmd response: success
19,047,564 UART:
19,047,941 UART: Running Caliptra FMC ...
19,049,095 UART:
19,049,261 UART: [state] CFI Enabled
19,115,378 UART: [fht] FMC Alias Private Key: 7
20,879,198 UART: [art] Extend RT PCRs Done
20,880,425 UART: [art] Lock RT PCRs Done
20,882,137 UART: [art] Populate DV Done
20,887,382 UART: [fht] FMC Alias Private Key: 7
20,889,083 UART: [art] Derive CDI
20,889,825 UART: [art] Store in in slot 0x4
20,949,041 UART: [art] Derive Key Pair
20,950,091 UART: [art] Store priv key in slot 0x5
23,412,833 UART: [art] Derive Key Pair - Done
23,425,666 UART: [art] Signing Cert with AUTHO
23,426,972 UART: RITY.KEYID = 7
25,138,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,245 UART: [art] PUB.X = 93784CFBE905F3CED5410930BEF2FF01097A8FBAC48A07EA7B81DCCDFF83535EBB608814A05D3929233FD423C7EEDB3C
25,147,569 UART: [art] PUB.Y = C8778043269E17D5AD5270F785F474642386E25917BBD88B73AE3E69FFEA28AE383EAAF917204B15D75857D0BD7BD5E2
25,154,829 UART: [art] SIG.R = 90E7DCD29D7EBEE5219FEB165E06A25E855D29F3330BF700869FAEBD9AD0797549564A03E7DE2E8FB01C7CF801AF9BF6
25,162,243 UART: [art] SIG.S = F8EDBA925E26722AC21CE7BD2B514A2067336C3F430CD30D5323186036269BEFEA34F0EB66323CDD40A5E4CD136707D7
26,141,252 UART: Caliptra RT
26,141,944 UART: [state] CFI Enabled
26,306,683 UART: [rt] RT listening for mailbox commands...
26,308,541 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,318 UART: [rt]cmd =0x46504c54, len=4
26,339,897 >>> mbox cmd response data (8 bytes)
26,341,011 UART: [rt] FIPS self test
26,341,957 UART: [kat] ++
26,342,406 UART: [kat] sha1
26,346,861 UART: [kat] SHA2-256
26,348,790 UART: [kat] SHA2-384
26,351,606 UART: [kat] SHA2-512-ACC
26,353,875 UART: [kat] ECC-384
28,793,480 UART: [kat] HMAC-384Kdf
28,820,220 UART: [kat] LMS
29,044,941 UART: Fatal Error: 0x90070002
29,080,211 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,225,432 >>> mbox cmd response: failed
29,226,065 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,370,868 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,418,745 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,742,655 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,645 UART:
192,996 UART: Running Caliptra ROM ...
194,195 UART:
603,934 UART: [state] CFI Enabled
616,811 UART: [state] LifecycleState = Unprovisioned
619,186 UART: [state] DebugLocked = No
622,131 UART: [state] WD Timer not started. Device not locked for debugging
625,968 UART: [kat] SHA2-256
815,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,614 UART: [kat] ++
827,134 UART: [kat] sha1
838,931 UART: [kat] SHA2-256
841,946 UART: [kat] SHA2-384
848,722 UART: [kat] SHA2-512-ACC
851,246 UART: [kat] ECC-384
3,291,829 UART: [kat] HMAC-384Kdf
3,305,055 UART: [kat] LMS
3,836,890 UART: [kat] --
3,840,886 UART: [cold-reset] ++
3,842,540 UART: [fht] FHT @ 0x50003400
3,854,452 UART: [idev] ++
3,855,163 UART: [idev] CDI.KEYID = 6
3,856,074 UART: [idev] SUBJECT.KEYID = 7
3,857,328 UART: [idev] UDS.KEYID = 0
3,858,273 ready_for_fw is high
3,858,467 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,003,278 UART: [idev] Erasing UDS.KEYID = 0
6,338,828 UART: [idev] Sha1 KeyId Algorithm
6,362,551 UART: [idev] --
6,367,034 UART: [ldev] ++
6,367,718 UART: [ldev] CDI.KEYID = 6
6,368,625 UART: [ldev] SUBJECT.KEYID = 5
6,369,839 UART: [ldev] AUTHORITY.KEYID = 7
6,371,013 UART: [ldev] FE.KEYID = 1
6,382,476 UART: [ldev] Erasing FE.KEYID = 1
8,863,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,710 UART: [ldev] --
10,652,976 UART: [fwproc] Wait for Commands...
10,655,394 UART: [fwproc] Recv command 0x46574c44
10,657,709 UART: [fwproc] Recv'd Img size: 115304 bytes
14,120,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,196,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,312,894 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,861,616 >>> mbox cmd response: success
14,866,247 UART: [afmc] ++
14,866,955 UART: [afmc] CDI.KEYID = 6
14,868,140 UART: [afmc] SUBJECT.KEYID = 7
14,869,571 UART: [afmc] AUTHORITY.KEYID = 5
17,371,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,091,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,093,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,108,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,123,464 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,138,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,162,685 UART: [afmc] --
19,165,466 UART: [cold-reset] --
19,167,818 UART: [state] Locking Datavault
19,171,496 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,681 UART: [state] Locking ICCM
19,176,051 UART: [exit] Launching FMC @ 0x40000130
19,184,737 UART:
19,185,009 UART: Running Caliptra FMC ...
19,186,047 UART:
19,186,198 UART: [state] CFI Enabled
19,194,626 UART: [fht] FMC Alias Private Key: 7
20,951,424 UART: [art] Extend RT PCRs Done
20,952,649 UART: [art] Lock RT PCRs Done
20,954,302 UART: [art] Populate DV Done
20,959,789 UART: [fht] FMC Alias Private Key: 7
20,961,341 UART: [art] Derive CDI
20,962,159 UART: [art] Store in in slot 0x4
21,004,702 UART: [art] Derive Key Pair
21,005,710 UART: [art] Store priv key in slot 0x5
23,432,238 UART: [art] Derive Key Pair - Done
23,445,045 UART: [art] Signing Cert with AUTHO
23,446,354 UART: RITY.KEYID = 7
25,151,709 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,216 UART: [art] PUB.X = 5203D0E72A6DE0BE0AB03A679C142BA2624B978595210A17FA40E6D5B87D0B7E1DD5C30FFA8C491F86C4CF6C44B7F85B
25,160,479 UART: [art] PUB.Y = C2AB80A7BEDD4A6F3AEBBECB167055AD8D8A59CD9A4F320001F8353751DB87773C9952B732CEB283E914139B481AF741
25,167,716 UART: [art] SIG.R = 968DBC64F51E4C7E63DA6D35D5B70EC59C181E155559EB8BF4549867FAF5F26C75E14DEEC264D54C34EF457CD3D6A6D7
25,175,172 UART: [art] SIG.S = 0FB375351EB162FFA331CB1F8A13BF5316C68A4FAF0E4C55546F8D014A6F362871D7B6CE9FA47343327BF21590EBE331
26,154,821 UART: Caliptra RT
26,155,511 UART: [state] CFI Enabled
26,273,162 UART: [rt] RT listening for mailbox commands...
26,275,024 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,304,715 UART: [rt]cmd =0x46504c54, len=4
26,306,536 >>> mbox cmd response data (8 bytes)
26,307,611 UART: [rt] FIPS self test
26,308,557 UART: [kat] ++
26,309,007 UART: [kat] sha1
26,313,572 UART: [kat] SHA2-256
26,315,497 UART: [kat] SHA2-384
26,318,378 UART: [kat] SHA2-512-ACC
26,320,610 UART: [kat] ECC-384
28,747,927 UART: [kat] HMAC-384Kdf
28,753,831 UART: [kat] LMS
28,978,544 UART: Fatal Error: 0x90070002
29,013,810 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,158,967 >>> mbox cmd response: failed
29,159,644 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,304,388 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
190,118 UART:
190,404 UART: Running Caliptra ROM ...
191,517 UART:
11,234,167 UART: [state] CFI Enabled
11,247,330 UART: [state] LifecycleState = Unprovisioned
11,249,737 UART: [state] DebugLocked = No
11,251,180 UART: [state] WD Timer not started. Device not locked for debugging
11,255,247 UART: [kat] SHA2-256
11,445,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,455,906 UART: [kat] ++
11,456,503 UART: [kat] sha1
11,467,503 UART: [kat] SHA2-256
11,470,515 UART: [kat] SHA2-384
11,477,446 UART: [kat] SHA2-512-ACC
11,480,002 UART: [kat] ECC-384
13,923,513 UART: [kat] HMAC-384Kdf
13,936,981 UART: [kat] LMS
14,468,790 UART: [kat] --
14,472,903 UART: [cold-reset] ++
14,475,213 UART: [fht] FHT @ 0x50003400
14,486,298 UART: [idev] ++
14,486,969 UART: [idev] CDI.KEYID = 6
14,487,934 UART: [idev] SUBJECT.KEYID = 7
14,489,145 UART: [idev] UDS.KEYID = 0
14,490,666 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,635,396 UART: [idev] Erasing UDS.KEYID = 0
16,964,216 UART: [idev] Sha1 KeyId Algorithm
16,985,988 UART: [idev] --
16,991,167 UART: [ldev] ++
16,991,867 UART: [ldev] CDI.KEYID = 6
16,992,778 UART: [ldev] SUBJECT.KEYID = 5
16,993,931 UART: [ldev] AUTHORITY.KEYID = 7
16,995,329 UART: [ldev] FE.KEYID = 1
17,006,310 UART: [ldev] Erasing FE.KEYID = 1
19,483,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,203,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,219,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,234,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,249,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,271,000 UART: [ldev] --
21,276,222 UART: [fwproc] Wait for Commands...
21,277,943 UART: [fwproc] Recv command 0x46574c44
21,280,255 UART: [fwproc] Recv'd Img size: 115304 bytes
24,737,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,809,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
24,926,122 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,474,667 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,755,666 ready_for_fw is high
3,756,243 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,986,609 >>> mbox cmd response: success
19,240,323 UART:
19,240,713 UART: Running Caliptra FMC ...
19,242,054 UART:
19,242,224 UART: [state] CFI Enabled
19,249,906 UART: [fht] FMC Alias Private Key: 7
21,006,943 UART: [art] Extend RT PCRs Done
21,008,192 UART: [art] Lock RT PCRs Done
21,009,827 UART: [art] Populate DV Done
21,015,243 UART: [fht] FMC Alias Private Key: 7
21,016,851 UART: [art] Derive CDI
21,017,766 UART: [art] Store in in slot 0x4
21,060,529 UART: [art] Derive Key Pair
21,061,531 UART: [art] Store priv key in slot 0x5
23,488,012 UART: [art] Derive Key Pair - Done
23,500,797 UART: [art] Signing Cert with AUTHO
23,502,102 UART: RITY.KEYID = 7
25,206,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,497 UART: [art] PUB.X = 695B50801EB3E8D82B1755115B22BE881B0867BE27DC6EEA15AE88DFC70F660681259FE9790DE385731A9D1753067825
25,215,750 UART: [art] PUB.Y = 88CA6EA931EB1585B7DC861E5199C3F19C2EB96DD34F3A41D6A1F66295B939D947A991AF7E8C9B4A5EAD4F98C7E13223
25,222,999 UART: [art] SIG.R = AFF1A6039304DF2477514ECAF8BE163A13F7045B887E932C2124B9C4B37CF53F8440797886998E5FF9C3699444F7CD99
25,230,406 UART: [art] SIG.S = A0A460534B2988F6CD56133DC09C823F34A59CC1980408CCB19380A87C29A9F893F71C3FCBAAE54667DD444F2CC130B2
26,208,922 UART: Caliptra RT
26,209,649 UART: [state] CFI Enabled
26,327,552 UART: [rt] RT listening for mailbox commands...
26,329,399 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,359,079 UART: [rt]cmd =0x46504c54, len=4
26,360,983 >>> mbox cmd response data (8 bytes)
26,362,556 UART: [rt] FIPS self test
26,363,513 UART: [kat] ++
26,363,969 UART: [kat] sha1
26,368,341 UART: [kat] SHA2-256
26,370,219 UART: [kat] SHA2-384
26,373,231 UART: [kat] SHA2-512-ACC
26,375,503 UART: [kat] ECC-384
28,803,349 UART: [kat] HMAC-384Kdf
28,809,154 UART: [kat] LMS
29,033,923 UART: Fatal Error: 0x90070002
29,069,193 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,214,008 >>> mbox cmd response: failed
29,214,660 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,359,385 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
14,335,539 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,561,450 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,684 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,477,021 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 ready_for_fw is high
1,480,965 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,504,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,218 UART: [idev] --
1,514,157 UART: [ldev] ++
1,514,325 UART: [ldev] CDI.KEYID = 6
1,514,688 UART: [ldev] SUBJECT.KEYID = 5
1,515,114 UART: [ldev] AUTHORITY.KEYID = 7
1,515,577 UART: [ldev] FE.KEYID = 1
1,520,603 UART: [ldev] Erasing FE.KEYID = 1
1,545,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,750 UART: [ldev] --
1,585,029 UART: [fwproc] Waiting for Commands...
1,585,790 UART: [fwproc] Received command 0x46574c44
1,586,581 UART: [fwproc] Received Image of size 115304 bytes
2,897,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,777 >>> mbox cmd response: success
3,092,843 UART: [afmc] ++
3,093,011 UART: [afmc] CDI.KEYID = 6
3,093,373 UART: [afmc] SUBJECT.KEYID = 7
3,093,798 UART: [afmc] AUTHORITY.KEYID = 5
3,129,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,636 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,326 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,131 UART: [afmc] --
3,172,071 UART: [cold-reset] --
3,172,877 UART: [state] Locking Datavault
3,174,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,620 UART: [state] Locking ICCM
3,175,134 UART: [exit] Launching FMC @ 0x40000130
3,180,463 UART:
3,180,479 UART: Running Caliptra FMC ...
3,180,887 UART:
3,180,941 UART: [state] CFI Enabled
3,191,208 UART: [fht] FMC Alias Private Key: 7
3,300,259 UART: [art] Extend RT PCRs Done
3,300,687 UART: [art] Lock RT PCRs Done
3,301,963 UART: [art] Populate DV Done
3,310,316 UART: [fht] FMC Alias Private Key: 7
3,311,466 UART: [art] Derive CDI
3,311,746 UART: [art] Store in in slot 0x4
3,397,415 UART: [art] Derive Key Pair
3,397,775 UART: [art] Store priv key in slot 0x5
3,410,727 UART: [art] Derive Key Pair - Done
3,425,612 UART: [art] Signing Cert with AUTHO
3,426,092 UART: RITY.KEYID = 7
3,441,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,805 UART: [art] PUB.X = 984D946B14323C2943F10FF1F60B85C31ACF63FDA21ACD31FE2F15115B587045154679189DE265EF952849F09D2FB254
3,448,567 UART: [art] PUB.Y = EB0D1BA637EAE8D691BCA3F3FDFC506D22C79533E41789FA960ECFC874EECB4CE5C5541C72D3A639FBA804EB75834069
3,455,528 UART: [art] SIG.R = C9A4714068FC06988870D564B2C7F50E1930A254C0080EB0A5C5710FA71C6FDE41C496272085AFBB952DA0E269064C58
3,462,278 UART: [art] SIG.S = B8E78A081C256FC793990339601CB38CA36E6A96242C6DED2B87EAF9153185AC4C5D395E9A5F8FE9588F4FE547065FF0
3,485,856 UART: Caliptra RT
3,486,109 UART: [state] CFI Enabled
3,593,929 UART: [rt] RT listening for mailbox commands...
3,594,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,387 UART: [rt]cmd =0x46504c54, len=4
3,625,510 >>> mbox cmd response data (8 bytes)
3,625,767 UART: [rt] FIPS self test
3,626,095 UART: [kat] ++
3,626,247 UART: [kat] sha1
3,630,579 UART: [kat] SHA2-256
3,632,601 UART: [kat] SHA2-384
3,635,304 UART: [kat] SHA2-512-ACC
3,637,231 UART: [kat] ECC-384
3,646,843 UART: [kat] HMAC-384Kdf
3,651,327 UART: [kat] LMS
3,922,348 UART: Fatal Error: 0x90070002
3,923,898 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,923,903 >>> mbox cmd response: failed
3,923,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,923,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,346 UART: [kat] LMS
1,475,542 UART: [kat] --
1,476,453 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,578 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,824 UART: [idev] --
1,514,665 UART: [ldev] ++
1,514,833 UART: [ldev] CDI.KEYID = 6
1,515,196 UART: [ldev] SUBJECT.KEYID = 5
1,515,622 UART: [ldev] AUTHORITY.KEYID = 7
1,516,085 UART: [ldev] FE.KEYID = 1
1,521,347 UART: [ldev] Erasing FE.KEYID = 1
1,546,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,076 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 115304 bytes
2,896,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,090 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,641 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,281 >>> mbox cmd response: success
3,001,305 UART:
3,001,321 UART: Running Caliptra FMC ...
3,001,729 UART:
3,001,783 UART: [state] CFI Enabled
3,012,104 UART: [fht] FMC Alias Private Key: 7
3,119,729 UART: [art] Extend RT PCRs Done
3,120,157 UART: [art] Lock RT PCRs Done
3,121,863 UART: [art] Populate DV Done
3,130,234 UART: [fht] FMC Alias Private Key: 7
3,131,180 UART: [art] Derive CDI
3,131,460 UART: [art] Store in in slot 0x4
3,217,079 UART: [art] Derive Key Pair
3,217,439 UART: [art] Store priv key in slot 0x5
3,231,077 UART: [art] Derive Key Pair - Done
3,245,627 UART: [art] Signing Cert with AUTHO
3,246,107 UART: RITY.KEYID = 7
3,261,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,080 UART: [art] PUB.X = 4D9DD0424C5A8F811098E7AA390B20E1C0CE36C95C36E8DB6FA019D7B6AC7A5DA003E1E327A45471BD832FA6CF193587
3,268,856 UART: [art] PUB.Y = D14E7257B33B97D549D468E8726644392B5DDCCF67B30852C91A130ED398767DEF47930E1F5A1B385280AA5E65A6DA34
3,275,797 UART: [art] SIG.R = D60A8FBC9DF69566283B940B46FF36F4AE5A4C1382ECED3A45B541C7EEC821D56598F878AC0DEB82C63091C9DDFF21C1
3,282,576 UART: [art] SIG.S = 623E68F982FEE7BC4DA41969DC3620ADD09CA1BBB0F63E60D3BBFBA892F7D69A8E609E7F6999353DF8555DAB5FC306BC
3,306,184 UART: Caliptra RT
3,306,437 UART: [state] CFI Enabled
3,414,448 UART: [rt] RT listening for mailbox commands...
3,415,111 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,062 UART: [rt]cmd =0x46504c54, len=4
3,446,343 >>> mbox cmd response data (8 bytes)
3,446,456 UART: [rt] FIPS self test
3,446,784 UART: [kat] ++
3,446,936 UART: [kat] sha1
3,451,288 UART: [kat] SHA2-256
3,453,310 UART: [kat] SHA2-384
3,456,255 UART: [kat] SHA2-512-ACC
3,458,182 UART: [kat] ECC-384
3,468,330 UART: [kat] HMAC-384Kdf
3,472,902 UART: [kat] LMS
3,744,021 UART: Fatal Error: 0x90070002
3,745,571 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,745,576 >>> mbox cmd response: failed
3,745,576 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,745,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,095 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,861 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,185 UART: [kat] LMS
1,475,381 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,704 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 ready_for_fw is high
1,480,796 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,351 UART: [idev] Erasing UDS.KEYID = 0
1,505,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,735 UART: [idev] --
1,514,960 UART: [ldev] ++
1,515,128 UART: [ldev] CDI.KEYID = 6
1,515,491 UART: [ldev] SUBJECT.KEYID = 5
1,515,917 UART: [ldev] AUTHORITY.KEYID = 7
1,516,380 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,547,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,349 UART: [ldev] --
1,586,716 UART: [fwproc] Waiting for Commands...
1,587,377 UART: [fwproc] Received command 0x46574c44
1,588,168 UART: [fwproc] Received Image of size 115304 bytes
2,896,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,874 >>> mbox cmd response: success
3,091,970 UART: [afmc] ++
3,092,138 UART: [afmc] CDI.KEYID = 6
3,092,500 UART: [afmc] SUBJECT.KEYID = 7
3,092,925 UART: [afmc] AUTHORITY.KEYID = 5
3,128,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,211 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,901 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,862 UART: [afmc] --
3,171,882 UART: [cold-reset] --
3,172,488 UART: [state] Locking Datavault
3,173,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,081 UART: [state] Locking ICCM
3,174,573 UART: [exit] Launching FMC @ 0x40000130
3,179,902 UART:
3,179,918 UART: Running Caliptra FMC ...
3,180,326 UART:
3,180,469 UART: [state] CFI Enabled
3,191,032 UART: [fht] FMC Alias Private Key: 7
3,299,073 UART: [art] Extend RT PCRs Done
3,299,501 UART: [art] Lock RT PCRs Done
3,301,051 UART: [art] Populate DV Done
3,309,034 UART: [fht] FMC Alias Private Key: 7
3,310,134 UART: [art] Derive CDI
3,310,414 UART: [art] Store in in slot 0x4
3,396,445 UART: [art] Derive Key Pair
3,396,805 UART: [art] Store priv key in slot 0x5
3,410,119 UART: [art] Derive Key Pair - Done
3,425,147 UART: [art] Signing Cert with AUTHO
3,425,627 UART: RITY.KEYID = 7
3,440,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,408 UART: [art] PUB.X = D74E3184AC4BBF6E6F612A130B094CDCFC75EDE753BD9A0218E037071B8B2030D6A87F9B3A98EB2AEAE732B75B60D7A0
3,448,184 UART: [art] PUB.Y = C4E1859923F161D4DB6A2ECCB1E31E2A0784DF2720AFF1069F23C004A66563FAFB40572C4BF05FCB8D8EB9FC50EE24C9
3,455,143 UART: [art] SIG.R = C3B264F84B1C9E9721F758D661F8CE35468E9C3622C255FD2DFFCC2D3D2BD208C43C2FF07F76A4E37AC64E9DA156E9B1
3,461,926 UART: [art] SIG.S = D2AFA6B8AD1ADF612CAE1DDB711973743B4014ED86B4EA53404623027E27C18148D91F807DD857D04A67EF18CFAE4850
3,485,782 UART: Caliptra RT
3,486,127 UART: [state] CFI Enabled
3,593,717 UART: [rt] RT listening for mailbox commands...
3,594,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,359 UART: [rt]cmd =0x46504c54, len=4
3,625,636 >>> mbox cmd response data (8 bytes)
3,625,849 UART: [rt] FIPS self test
3,626,177 UART: [kat] ++
3,626,329 UART: [kat] sha1
3,630,463 UART: [kat] SHA2-256
3,632,485 UART: [kat] SHA2-384
3,635,222 UART: [kat] SHA2-512-ACC
3,637,149 UART: [kat] ECC-384
3,646,931 UART: [kat] HMAC-384Kdf
3,651,535 UART: [kat] LMS
3,922,638 UART: Fatal Error: 0x90070002
3,924,188 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,924,193 >>> mbox cmd response: failed
3,924,193 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,924,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,955 UART: [kat] HMAC-384Kdf
907,441 UART: [kat] LMS
1,475,637 UART: [kat] --
1,476,464 UART: [cold-reset] ++
1,476,902 UART: [fht] Storing FHT @ 0x50003400
1,479,489 UART: [idev] ++
1,479,657 UART: [idev] CDI.KEYID = 6
1,480,017 UART: [idev] SUBJECT.KEYID = 7
1,480,441 UART: [idev] UDS.KEYID = 0
1,480,786 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,803 UART: [idev] Erasing UDS.KEYID = 0
1,504,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,635 UART: [idev] --
1,514,840 UART: [ldev] ++
1,515,008 UART: [ldev] CDI.KEYID = 6
1,515,371 UART: [ldev] SUBJECT.KEYID = 5
1,515,797 UART: [ldev] AUTHORITY.KEYID = 7
1,516,260 UART: [ldev] FE.KEYID = 1
1,521,826 UART: [ldev] Erasing FE.KEYID = 1
1,547,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,695 UART: [ldev] --
1,587,184 UART: [fwproc] Waiting for Commands...
1,587,843 UART: [fwproc] Received command 0x46574c44
1,588,634 UART: [fwproc] Received Image of size 115304 bytes
2,898,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,408 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 ready_for_fw is high
1,362,468 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,444 >>> mbox cmd response: success
3,003,584 UART:
3,003,600 UART: Running Caliptra FMC ...
3,004,008 UART:
3,004,151 UART: [state] CFI Enabled
3,014,374 UART: [fht] FMC Alias Private Key: 7
3,121,891 UART: [art] Extend RT PCRs Done
3,122,319 UART: [art] Lock RT PCRs Done
3,123,817 UART: [art] Populate DV Done
3,131,750 UART: [fht] FMC Alias Private Key: 7
3,132,692 UART: [art] Derive CDI
3,132,972 UART: [art] Store in in slot 0x4
3,218,411 UART: [art] Derive Key Pair
3,218,771 UART: [art] Store priv key in slot 0x5
3,232,067 UART: [art] Derive Key Pair - Done
3,246,603 UART: [art] Signing Cert with AUTHO
3,247,083 UART: RITY.KEYID = 7
3,262,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,694 UART: [art] PUB.X = 71D8D3D589280F31746C272E371E97ECCAE9CE910A61AEC89E44ED6DEBDCB44E4F008AE1B1E5194AA58A5C27D493A5CC
3,270,456 UART: [art] PUB.Y = 2752424B29201F99ADFA8D051D9C0529AA52FFB5E79AC50460FD4C9FDD9BB7791AEF6F0E2C4A6FC7A2799AE749E42C41
3,277,410 UART: [art] SIG.R = F09911BFA7D2C91FB376DB5633B54BDB8DC8084741B63108C02686E4E3CC15F8F4207E81A576AE2B29E98C4670C59C8E
3,284,180 UART: [art] SIG.S = 3C447AE8BBA3CCE7A3E31DA125EB6AF5562A477A2113455982B625E4BB64A4F078E10201785554D580E5A851A714147B
3,308,503 UART: Caliptra RT
3,308,848 UART: [state] CFI Enabled
3,417,373 UART: [rt] RT listening for mailbox commands...
3,418,036 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,017 UART: [rt]cmd =0x46504c54, len=4
3,449,218 >>> mbox cmd response data (8 bytes)
3,449,339 UART: [rt] FIPS self test
3,449,667 UART: [kat] ++
3,449,819 UART: [kat] sha1
3,453,887 UART: [kat] SHA2-256
3,455,909 UART: [kat] SHA2-384
3,458,678 UART: [kat] SHA2-512-ACC
3,460,605 UART: [kat] ECC-384
3,470,803 UART: [kat] HMAC-384Kdf
3,475,633 UART: [kat] LMS
3,746,572 UART: Fatal Error: 0x90070002
3,748,122 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,748,127 >>> mbox cmd response: failed
3,748,127 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,748,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,194 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,000 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,607 UART: [kat] SHA2-256
903,547 UART: [kat] SHA2-384
906,090 UART: [kat] SHA2-512-ACC
907,991 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,334 UART: [kat] LMS
1,170,662 UART: [kat] --
1,171,433 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,506 UART: [idev] ++
1,174,674 UART: [idev] CDI.KEYID = 6
1,175,034 UART: [idev] SUBJECT.KEYID = 7
1,175,458 UART: [idev] UDS.KEYID = 0
1,175,803 ready_for_fw is high
1,175,803 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,486 UART: [idev] Erasing UDS.KEYID = 0
1,200,073 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,922 UART: [fwproc] Wait for Commands...
1,281,616 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,941 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,238 >>> mbox cmd response: success
2,787,460 UART: [afmc] ++
2,787,628 UART: [afmc] CDI.KEYID = 6
2,787,990 UART: [afmc] SUBJECT.KEYID = 7
2,788,415 UART: [afmc] AUTHORITY.KEYID = 5
2,824,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,969 UART: [afmc] --
2,866,889 UART: [cold-reset] --
2,867,439 UART: [state] Locking Datavault
2,868,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,878 UART: [state] Locking ICCM
2,869,320 UART: [exit] Launching FMC @ 0x40000130
2,874,649 UART:
2,874,665 UART: Running Caliptra FMC ...
2,875,073 UART:
2,875,127 UART: [state] CFI Enabled
2,886,022 UART: [fht] FMC Alias Private Key: 7
2,993,697 UART: [art] Extend RT PCRs Done
2,994,125 UART: [art] Lock RT PCRs Done
2,995,779 UART: [art] Populate DV Done
3,003,906 UART: [fht] FMC Alias Private Key: 7
3,004,876 UART: [art] Derive CDI
3,005,156 UART: [art] Store in in slot 0x4
3,090,765 UART: [art] Derive Key Pair
3,091,125 UART: [art] Store priv key in slot 0x5
3,104,555 UART: [art] Derive Key Pair - Done
3,119,290 UART: [art] Signing Cert with AUTHO
3,119,770 UART: RITY.KEYID = 7
3,134,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,575 UART: [art] PUB.X = EB81C5FBFAF119D23E11E1D20D90F2BC3DB79294848F6FEA1328F632C32BAEAD8D8F341434905E0D4AFA1FC8FB55CC03
3,142,358 UART: [art] PUB.Y = 3980420A3D48735347628F4395282BFE381FBBEA8151E627C764BBDDAD2397887CBC0DC4CFCFB368678600293C18A6AF
3,149,284 UART: [art] SIG.R = 60F12E7425737C80501BB7754903FA313B7F2FCC64360EF16C39756DE3ABFAF33917FBCD385534BEA3FC9D05ACE497B7
3,156,055 UART: [art] SIG.S = C419551C65749069E764E149B555D55F8C62D3AB90927FFA1AD1CBD3EA37F04DC08A2415A295EBA530DD275233DE779C
3,179,636 UART: Caliptra RT
3,179,889 UART: [state] CFI Enabled
3,287,762 UART: [rt] RT listening for mailbox commands...
3,288,425 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,064 UART: [rt]cmd =0x46504c54, len=4
3,319,329 >>> mbox cmd response data (8 bytes)
3,319,460 UART: [rt] FIPS self test
3,319,788 UART: [kat] ++
3,319,940 UART: [kat] sha1
3,324,174 UART: [kat] SHA2-256
3,326,196 UART: [kat] SHA2-384
3,329,023 UART: [kat] SHA2-512-ACC
3,330,950 UART: [kat] ECC-384
3,341,120 UART: [kat] HMAC-384Kdf
3,345,610 UART: [kat] LMS
3,616,581 UART: Fatal Error: 0x90070002
3,618,131 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,618,136 >>> mbox cmd response: failed
3,618,136 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,618,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
893,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,293 UART: [kat] ++
897,445 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,370 UART: [kat] HMAC-384Kdf
922,746 UART: [kat] LMS
1,171,074 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,571 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,045 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,208 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,107 UART: [ldev] --
1,283,520 UART: [fwproc] Wait for Commands...
1,284,210 UART: [fwproc] Recv command 0x46574c44
1,284,938 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,717 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,948 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,857 ready_for_fw is high
1,059,857 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,205 >>> mbox cmd response: success
2,701,485 UART:
2,701,501 UART: Running Caliptra FMC ...
2,701,909 UART:
2,701,963 UART: [state] CFI Enabled
2,712,592 UART: [fht] FMC Alias Private Key: 7
2,820,775 UART: [art] Extend RT PCRs Done
2,821,203 UART: [art] Lock RT PCRs Done
2,822,593 UART: [art] Populate DV Done
2,831,104 UART: [fht] FMC Alias Private Key: 7
2,832,238 UART: [art] Derive CDI
2,832,518 UART: [art] Store in in slot 0x4
2,918,051 UART: [art] Derive Key Pair
2,918,411 UART: [art] Store priv key in slot 0x5
2,932,011 UART: [art] Derive Key Pair - Done
2,946,645 UART: [art] Signing Cert with AUTHO
2,947,125 UART: RITY.KEYID = 7
2,962,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,994 UART: [art] PUB.X = 4AD35BF7D8DF49EB173B1853B01C3F2408202560ED6051F5A6B4A8C0B15C5D1C164F097CD7C39B253F088DC8DADA5F27
2,969,767 UART: [art] PUB.Y = 87D32AA4073EB179BE5196EB4E53EB8672CCEA9833742BF7D044291319C4EFCCBAB05C724DCF107490E77973DCD4A73E
2,976,726 UART: [art] SIG.R = 68529EE1676C799FC53145F5B29259A43893C161353CFEDCE618D7F6E7BB1A50FD70B458B8D9AC448B4BA10B9ED92EFA
2,983,505 UART: [art] SIG.S = 0B017F3EE5DA7C22C0BC4C88E46B1458B8EF432B658453994C6CA260686E4A91678D9B2A00CC1E7DAA93CD811119168B
3,007,638 UART: Caliptra RT
3,007,891 UART: [state] CFI Enabled
3,116,838 UART: [rt] RT listening for mailbox commands...
3,117,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,632 UART: [rt]cmd =0x46504c54, len=4
3,148,691 >>> mbox cmd response data (8 bytes)
3,148,812 UART: [rt] FIPS self test
3,149,140 UART: [kat] ++
3,149,292 UART: [kat] sha1
3,153,392 UART: [kat] SHA2-256
3,155,414 UART: [kat] SHA2-384
3,158,491 UART: [kat] SHA2-512-ACC
3,160,418 UART: [kat] ECC-384
3,170,088 UART: [kat] HMAC-384Kdf
3,174,686 UART: [kat] LMS
3,445,753 UART: Fatal Error: 0x90070002
3,447,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,447,308 >>> mbox cmd response: failed
3,447,308 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,447,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,915 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,613 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
893,205 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,330 UART: [kat] ++
897,482 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,595 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,313 UART: [idev] ++
1,175,481 UART: [idev] CDI.KEYID = 6
1,175,841 UART: [idev] SUBJECT.KEYID = 7
1,176,265 UART: [idev] UDS.KEYID = 0
1,176,610 ready_for_fw is high
1,176,610 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,367 UART: [idev] Erasing UDS.KEYID = 0
1,201,550 UART: [idev] Sha1 KeyId Algorithm
1,209,826 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,356 UART: [ldev] Erasing FE.KEYID = 1
1,244,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,729 UART: [fwproc] Wait for Commands...
1,284,513 UART: [fwproc] Recv command 0x46574c44
1,285,241 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,096 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,297 >>> mbox cmd response: success
2,790,467 UART: [afmc] ++
2,790,635 UART: [afmc] CDI.KEYID = 6
2,790,997 UART: [afmc] SUBJECT.KEYID = 7
2,791,422 UART: [afmc] AUTHORITY.KEYID = 5
2,826,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,024 UART: [afmc] --
2,870,062 UART: [cold-reset] --
2,870,788 UART: [state] Locking Datavault
2,871,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,387 UART: [state] Locking ICCM
2,872,815 UART: [exit] Launching FMC @ 0x40000130
2,878,144 UART:
2,878,160 UART: Running Caliptra FMC ...
2,878,568 UART:
2,878,711 UART: [state] CFI Enabled
2,889,238 UART: [fht] FMC Alias Private Key: 7
2,997,403 UART: [art] Extend RT PCRs Done
2,997,831 UART: [art] Lock RT PCRs Done
2,999,429 UART: [art] Populate DV Done
3,007,528 UART: [fht] FMC Alias Private Key: 7
3,008,534 UART: [art] Derive CDI
3,008,814 UART: [art] Store in in slot 0x4
3,094,917 UART: [art] Derive Key Pair
3,095,277 UART: [art] Store priv key in slot 0x5
3,108,559 UART: [art] Derive Key Pair - Done
3,123,347 UART: [art] Signing Cert with AUTHO
3,123,827 UART: RITY.KEYID = 7
3,139,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,040 UART: [art] PUB.X = 1A4E15B0B1507351C335B01F3A9AF1B238370FAAAFFEFA33B7B7B4A1C2A5538274D1210BD8129437B0FB6EAFA4991CCA
3,146,820 UART: [art] PUB.Y = EF7B1B94DF985DB67DF1D61E0E9B88021A235BF0E0FAD4B5F061CDAEC1BC0278DFC25C5D174479D294990944577E191D
3,153,772 UART: [art] SIG.R = CDC22093B0F9A7D1515625138C70EA0D7C88A7327220408B1AD95FE2158F38B32730AEB2B0E1D8EC64B3A2F3613E835A
3,160,543 UART: [art] SIG.S = CA270101D4657B7AD3DE5674E49A6432EE785282F6E67C0EFA8203EE7BA0EC5E099C0174CF27F35D91D5BCF91C757D3B
3,184,452 UART: Caliptra RT
3,184,797 UART: [state] CFI Enabled
3,292,809 UART: [rt] RT listening for mailbox commands...
3,293,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,499 UART: [rt]cmd =0x46504c54, len=4
3,324,740 >>> mbox cmd response data (8 bytes)
3,324,861 UART: [rt] FIPS self test
3,325,189 UART: [kat] ++
3,325,341 UART: [kat] sha1
3,329,741 UART: [kat] SHA2-256
3,331,763 UART: [kat] SHA2-384
3,334,550 UART: [kat] SHA2-512-ACC
3,336,477 UART: [kat] ECC-384
3,346,623 UART: [kat] HMAC-384Kdf
3,351,269 UART: [kat] LMS
3,622,444 UART: Fatal Error: 0x90070002
3,623,994 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,623,999 >>> mbox cmd response: failed
3,623,999 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,624,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,841 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,173,062 UART: [fht] FHT @ 0x50003400
1,175,805 UART: [idev] ++
1,175,973 UART: [idev] CDI.KEYID = 6
1,176,333 UART: [idev] SUBJECT.KEYID = 7
1,176,757 UART: [idev] UDS.KEYID = 0
1,177,102 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,665 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,084 UART: [idev] --
1,211,202 UART: [ldev] ++
1,211,370 UART: [ldev] CDI.KEYID = 6
1,211,733 UART: [ldev] SUBJECT.KEYID = 5
1,212,159 UART: [ldev] AUTHORITY.KEYID = 7
1,212,622 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,374 UART: [ldev] --
1,283,759 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,808 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,181 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,746 ready_for_fw is high
1,060,746 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,166 >>> mbox cmd response: success
2,702,608 UART:
2,702,624 UART: Running Caliptra FMC ...
2,703,032 UART:
2,703,175 UART: [state] CFI Enabled
2,713,884 UART: [fht] FMC Alias Private Key: 7
2,822,345 UART: [art] Extend RT PCRs Done
2,822,773 UART: [art] Lock RT PCRs Done
2,824,235 UART: [art] Populate DV Done
2,832,596 UART: [fht] FMC Alias Private Key: 7
2,833,526 UART: [art] Derive CDI
2,833,806 UART: [art] Store in in slot 0x4
2,919,567 UART: [art] Derive Key Pair
2,919,927 UART: [art] Store priv key in slot 0x5
2,932,947 UART: [art] Derive Key Pair - Done
2,947,482 UART: [art] Signing Cert with AUTHO
2,947,962 UART: RITY.KEYID = 7
2,963,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,975 UART: [art] PUB.X = CAF5836EFCBB63131ABE49FE994613AE8168F724757F7BC81036C24D827ABE8FCFA2AA35DDD5FC6BE4740F82DEC6F7F3
2,970,766 UART: [art] PUB.Y = 627EDFC3AD36EB82E578B5B807AA8557F0EC66FCBE4CD949864E03E7F10AD2DCD247687E9F316B664B5C6B105C7C51A4
2,977,723 UART: [art] SIG.R = D7D986EEEB5A933750D27CF5E620441EA4BB9ADB2BB2BF3458F437BA8D80C7EBDEDE3F7DE286FFA7208C1545ADCCA77A
2,984,523 UART: [art] SIG.S = CB3085661AFCB0A630BB2682A9DE111AAB8AB650BE01F182EDFFD8F9549CECE8E76D9F68CCFBA3954FCE37ED21DA24C8
3,008,461 UART: Caliptra RT
3,008,806 UART: [state] CFI Enabled
3,117,078 UART: [rt] RT listening for mailbox commands...
3,117,741 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,666 UART: [rt]cmd =0x46504c54, len=4
3,148,785 >>> mbox cmd response data (8 bytes)
3,149,012 UART: [rt] FIPS self test
3,149,340 UART: [kat] ++
3,149,492 UART: [kat] sha1
3,153,878 UART: [kat] SHA2-256
3,155,900 UART: [kat] SHA2-384
3,158,887 UART: [kat] SHA2-512-ACC
3,160,814 UART: [kat] ECC-384
3,170,936 UART: [kat] HMAC-384Kdf
3,175,518 UART: [kat] LMS
3,446,617 UART: Fatal Error: 0x90070002
3,448,167 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,448,172 >>> mbox cmd response: failed
3,448,172 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,448,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,518 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,518 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
903,976 UART: [kat] SHA2-512-ACC
905,877 UART: [kat] ECC-384
915,276 UART: [kat] HMAC-384Kdf
919,870 UART: [kat] LMS
1,168,182 UART: [kat] --
1,169,263 UART: [cold-reset] ++
1,169,655 UART: [fht] FHT @ 0x50003400
1,172,075 UART: [idev] ++
1,172,243 UART: [idev] CDI.KEYID = 6
1,172,604 UART: [idev] SUBJECT.KEYID = 7
1,173,029 UART: [idev] UDS.KEYID = 0
1,173,375 ready_for_fw is high
1,173,375 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,259 UART: [idev] Sha1 KeyId Algorithm
1,207,157 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,930 UART: [ldev] --
1,280,246 UART: [fwproc] Wait for Commands...
1,280,995 UART: [fwproc] Recv command 0x46574c44
1,281,728 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,108 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,382 >>> mbox cmd response: success
2,785,399 UART: [afmc] ++
2,785,567 UART: [afmc] CDI.KEYID = 6
2,785,930 UART: [afmc] SUBJECT.KEYID = 7
2,786,356 UART: [afmc] AUTHORITY.KEYID = 5
2,821,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,952 UART: [afmc] --
2,864,972 UART: [cold-reset] --
2,865,746 UART: [state] Locking Datavault
2,866,823 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,427 UART: [state] Locking ICCM
2,867,915 UART: [exit] Launching FMC @ 0x40000130
2,873,244 UART:
2,873,260 UART: Running Caliptra FMC ...
2,873,668 UART:
2,873,722 UART: [state] CFI Enabled
2,884,317 UART: [fht] FMC Alias Private Key: 7
2,992,446 UART: [art] Extend RT PCRs Done
2,992,874 UART: [art] Lock RT PCRs Done
2,994,432 UART: [art] Populate DV Done
3,002,629 UART: [fht] FMC Alias Private Key: 7
3,003,565 UART: [art] Derive CDI
3,003,845 UART: [art] Store in in slot 0x4
3,089,754 UART: [art] Derive Key Pair
3,090,114 UART: [art] Store priv key in slot 0x5
3,103,362 UART: [art] Derive Key Pair - Done
3,118,325 UART: [art] Signing Cert with AUTHO
3,118,805 UART: RITY.KEYID = 7
3,134,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,772 UART: [art] PUB.X = 6EBEB81299E1F7AE51EBCC2AEEAFA6056FA6D10C018D8EA6C2701B95D0445A86514F5D14B92DCAD30735A8BFC8A78B3A
3,141,554 UART: [art] PUB.Y = D606E2E30FCB53630E486CC8C7FAFE18D79AA2B6FEB35E8DDEB48CC84FA8F0F388DA4D7D4E7205B08A4DB241E02F5C47
3,148,518 UART: [art] SIG.R = 06DA17426FCF48A005F4F9BAA7E052B0C551567EEA9486323BCD49DDD4E9D3B5ABA3D99EEC1FA707F3F976DC22FEBA1F
3,155,305 UART: [art] SIG.S = C831C9A9C90A363F93B15668F77A8B1624DF82F2EBDBEAEB319D1BC59880CC123C51D7EEDC7FF106BD5614395BF2A3F8
3,178,228 UART: Caliptra RT
3,178,481 UART: [state] CFI Enabled
3,286,530 UART: [rt] RT listening for mailbox commands...
3,287,193 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,142 UART: [rt]cmd =0x46504c54, len=4
3,318,295 >>> mbox cmd response data (8 bytes)
3,318,436 UART: [rt] FIPS self test
3,318,764 UART: [kat] ++
3,318,916 UART: [kat] sha1
3,323,244 UART: [kat] SHA2-256
3,325,266 UART: [kat] SHA2-384
3,328,113 UART: [kat] SHA2-512-ACC
3,330,040 UART: [kat] ECC-384
3,340,286 UART: [kat] HMAC-384Kdf
3,344,890 UART: [kat] LMS
3,615,845 UART: Fatal Error: 0x90070002
3,617,395 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,617,400 >>> mbox cmd response: failed
3,617,400 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,617,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,172 UART: [kat] LMS
1,168,484 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,173,755 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,197,397 UART: [idev] Sha1 KeyId Algorithm
1,206,163 UART: [idev] --
1,207,286 UART: [ldev] ++
1,207,454 UART: [ldev] CDI.KEYID = 6
1,207,818 UART: [ldev] SUBJECT.KEYID = 5
1,208,245 UART: [ldev] AUTHORITY.KEYID = 7
1,208,708 UART: [ldev] FE.KEYID = 1
1,213,722 UART: [ldev] Erasing FE.KEYID = 1
1,239,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,710 UART: [ldev] --
1,279,086 UART: [fwproc] Wait for Commands...
1,279,815 UART: [fwproc] Recv command 0x46574c44
1,280,548 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,954 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,783,218 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,428 ready_for_fw is high
1,055,428 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,832 >>> mbox cmd response: success
2,698,054 UART:
2,698,070 UART: Running Caliptra FMC ...
2,698,478 UART:
2,698,532 UART: [state] CFI Enabled
2,709,139 UART: [fht] FMC Alias Private Key: 7
2,817,162 UART: [art] Extend RT PCRs Done
2,817,590 UART: [art] Lock RT PCRs Done
2,819,168 UART: [art] Populate DV Done
2,827,289 UART: [fht] FMC Alias Private Key: 7
2,828,363 UART: [art] Derive CDI
2,828,643 UART: [art] Store in in slot 0x4
2,914,378 UART: [art] Derive Key Pair
2,914,738 UART: [art] Store priv key in slot 0x5
2,927,940 UART: [art] Derive Key Pair - Done
2,942,816 UART: [art] Signing Cert with AUTHO
2,943,296 UART: RITY.KEYID = 7
2,958,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,297 UART: [art] PUB.X = DF8E13F63C69DDA8935C8842491A6671DFAF34400EDB262350653510BC4FA54423F3CD1E9B1FE725A5127C6FDF5BD0F4
2,966,074 UART: [art] PUB.Y = 38C13DC02F9DD7C5E8F68BDBA0EE137675B4172AA1922BBF62A6CA498879621D5FA31420260A3AF970BF04449B30ADBE
2,973,030 UART: [art] SIG.R = 1F2A80A40DC91532EFF036E873522E119668D911C541A3A865A849B65513A3D96CBCA9847FFA61A5E0D68BBB95CEF3E8
2,979,805 UART: [art] SIG.S = EA8CDCF7997E0C0052C1FFF7FB7C44B4787B907BEDAC220C4B50E570BB89DBFEBFD722A43F83397FC6918CE3917BAC1F
3,003,718 UART: Caliptra RT
3,003,971 UART: [state] CFI Enabled
3,111,348 UART: [rt] RT listening for mailbox commands...
3,112,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,652 UART: [rt]cmd =0x46504c54, len=4
3,142,765 >>> mbox cmd response data (8 bytes)
3,142,956 UART: [rt] FIPS self test
3,143,284 UART: [kat] ++
3,143,436 UART: [kat] sha1
3,147,558 UART: [kat] SHA2-256
3,149,580 UART: [kat] SHA2-384
3,152,341 UART: [kat] SHA2-512-ACC
3,154,268 UART: [kat] ECC-384
3,164,192 UART: [kat] HMAC-384Kdf
3,168,720 UART: [kat] LMS
3,439,763 UART: Fatal Error: 0x90070002
3,441,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,441,318 >>> mbox cmd response: failed
3,441,318 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,441,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,964 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,126 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,957 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,174,710 ready_for_fw is high
1,174,710 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,277 UART: [ldev] ++
1,209,445 UART: [ldev] CDI.KEYID = 6
1,209,809 UART: [ldev] SUBJECT.KEYID = 5
1,210,236 UART: [ldev] AUTHORITY.KEYID = 7
1,210,699 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,910 UART: [fwproc] Recv command 0x46574c44
1,282,643 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,151 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,487 >>> mbox cmd response: success
2,787,612 UART: [afmc] ++
2,787,780 UART: [afmc] CDI.KEYID = 6
2,788,143 UART: [afmc] SUBJECT.KEYID = 7
2,788,569 UART: [afmc] AUTHORITY.KEYID = 5
2,823,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,429 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,760 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,713 UART: [afmc] --
2,867,639 UART: [cold-reset] --
2,868,375 UART: [state] Locking Datavault
2,869,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,994 UART: [state] Locking ICCM
2,870,420 UART: [exit] Launching FMC @ 0x40000130
2,875,749 UART:
2,875,765 UART: Running Caliptra FMC ...
2,876,173 UART:
2,876,316 UART: [state] CFI Enabled
2,886,779 UART: [fht] FMC Alias Private Key: 7
2,994,662 UART: [art] Extend RT PCRs Done
2,995,090 UART: [art] Lock RT PCRs Done
2,996,732 UART: [art] Populate DV Done
3,005,111 UART: [fht] FMC Alias Private Key: 7
3,006,265 UART: [art] Derive CDI
3,006,545 UART: [art] Store in in slot 0x4
3,092,008 UART: [art] Derive Key Pair
3,092,368 UART: [art] Store priv key in slot 0x5
3,105,628 UART: [art] Derive Key Pair - Done
3,120,322 UART: [art] Signing Cert with AUTHO
3,120,802 UART: RITY.KEYID = 7
3,135,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,087 UART: [art] PUB.X = 9264E437D10BD0E05744A74BB7CFBEF12C9A1B6A64460FEA23CB0A2AD36CABFEBE9D1DBDCDE5107139210B9EAFF99B2C
3,142,875 UART: [art] PUB.Y = CD2F5DD03656DF6E2DCD0779AB656A96C1D803414889ABAFC189C09EEEBD57CA30D6192017BB7E31435CCA185813A6CC
3,149,835 UART: [art] SIG.R = AC030A5F8F1831D9BDBAB74CF6BA89DB0E194B7CFDD5E85FB97C95C8D9157195398859D58E775DC8D562E3CBAE21D588
3,156,614 UART: [art] SIG.S = AEF7CA2F999B547419700BF57EFC4D3A1C81DE9FCA5DDA25B6B64F564145A13A3B547BBE65E18F2D74E267A7C73BAE44
3,180,122 UART: Caliptra RT
3,180,467 UART: [state] CFI Enabled
3,288,229 UART: [rt] RT listening for mailbox commands...
3,288,892 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,631 UART: [rt]cmd =0x46504c54, len=4
3,319,876 >>> mbox cmd response data (8 bytes)
3,320,109 UART: [rt] FIPS self test
3,320,437 UART: [kat] ++
3,320,589 UART: [kat] sha1
3,324,811 UART: [kat] SHA2-256
3,326,833 UART: [kat] SHA2-384
3,329,554 UART: [kat] SHA2-512-ACC
3,331,481 UART: [kat] ECC-384
3,341,827 UART: [kat] HMAC-384Kdf
3,346,491 UART: [kat] LMS
3,617,472 UART: Fatal Error: 0x90070002
3,619,022 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,619,027 >>> mbox cmd response: failed
3,619,027 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,619,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,174,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,759 UART: [ldev] --
1,281,129 UART: [fwproc] Wait for Commands...
1,281,820 UART: [fwproc] Recv command 0x46574c44
1,282,553 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,813 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,211 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,361 ready_for_fw is high
1,056,361 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,885 >>> mbox cmd response: success
2,698,029 UART:
2,698,045 UART: Running Caliptra FMC ...
2,698,453 UART:
2,698,596 UART: [state] CFI Enabled
2,709,525 UART: [fht] FMC Alias Private Key: 7
2,817,750 UART: [art] Extend RT PCRs Done
2,818,178 UART: [art] Lock RT PCRs Done
2,819,652 UART: [art] Populate DV Done
2,827,977 UART: [fht] FMC Alias Private Key: 7
2,828,965 UART: [art] Derive CDI
2,829,245 UART: [art] Store in in slot 0x4
2,914,892 UART: [art] Derive Key Pair
2,915,252 UART: [art] Store priv key in slot 0x5
2,929,124 UART: [art] Derive Key Pair - Done
2,944,269 UART: [art] Signing Cert with AUTHO
2,944,749 UART: RITY.KEYID = 7
2,960,093 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,858 UART: [art] PUB.X = 7D830E44EDA88B076DE4D0F91647C8383E4CA1329379B3618D61A0573C5E8F6BC57E6BE12FA0268BAD82D89A4FCBA423
2,967,632 UART: [art] PUB.Y = F88678661C3CBA53BB83B0468B6EDC7C7F2388A59857C7EE31938CE934208786D7BC539CF78DB607A95099B70FDCE3F5
2,974,582 UART: [art] SIG.R = FB21149C8D753EE7BAE9E31CDC25EF8B80DAB7916EA75B682C6591F840F3F119A21ECA4988F454582BF5A95AC191C1CD
2,981,368 UART: [art] SIG.S = A79DB31DE8FF48222C3FFCB6FA53130B93C76E1E600381A631544C29BA190BC229B5D225959FC6B1F10945EEB052D90D
3,005,426 UART: Caliptra RT
3,005,771 UART: [state] CFI Enabled
3,114,091 UART: [rt] RT listening for mailbox commands...
3,114,754 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,569 UART: [rt]cmd =0x46504c54, len=4
3,145,728 >>> mbox cmd response data (8 bytes)
3,145,939 UART: [rt] FIPS self test
3,146,267 UART: [kat] ++
3,146,419 UART: [kat] sha1
3,150,615 UART: [kat] SHA2-256
3,152,637 UART: [kat] SHA2-384
3,155,454 UART: [kat] SHA2-512-ACC
3,157,381 UART: [kat] ECC-384
3,167,343 UART: [kat] HMAC-384Kdf
3,172,025 UART: [kat] LMS
3,443,112 UART: Fatal Error: 0x90070002
3,444,662 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,444,667 >>> mbox cmd response: failed
3,444,667 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,444,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,155 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,901 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,671,966 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,816,189 >>> mbox cmd response: failed
2,816,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,960,052 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,877,797 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,462,043 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,669,525 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,813,939 >>> mbox cmd response: failed
2,814,519 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,957,871 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,860,623 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,431,127 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,024,130 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,168,385 >>> mbox cmd response: failed
3,168,948 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,312,122 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,586,040 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,023,346 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,104 writing to cptra_bootfsm_go
3,018,817 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,163,047 >>> mbox cmd response: failed
3,163,611 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,306,933 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
21,585,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,031,806 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,678,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,823,387 >>> mbox cmd response: failed
2,823,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,967,710 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,429,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,773 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,676,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,973 >>> mbox cmd response: failed
2,821,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,965,635 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,461,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,165 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,037,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,181,956 >>> mbox cmd response: failed
3,182,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,326,297 >>> mbox cmd response: failed
Initializing fuses
1,013 writing to cptra_bootfsm_go
20,179,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,927,247 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,040,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,184,703 >>> mbox cmd response: failed
3,185,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,329,022 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,182,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,918,017 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,694,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,839,284 >>> mbox cmd response: failed
2,839,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,983,604 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
3,457,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,299,257 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,682,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,827,558 >>> mbox cmd response: failed
2,828,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,971,896 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,453,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,606 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,517 writing to cptra_bootfsm_go
3,036,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,181,234 >>> mbox cmd response: failed
3,181,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,325,672 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,178,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,916,109 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,035,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,180,134 >>> mbox cmd response: failed
3,180,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,324,458 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,173,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,901,774 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,048 >>> mbox cmd response: failed
804,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,944 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,698 >>> mbox cmd response: failed
803,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,964 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,353 >>> mbox cmd response: failed
804,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,359 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,283 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,663 >>> mbox cmd response: failed
803,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,005 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,928 >>> mbox cmd response: failed
803,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,424 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,976 >>> mbox cmd response: failed
803,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,774 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,373 >>> mbox cmd response: failed
804,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,593 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,769 >>> mbox cmd response: failed
803,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,641 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,148 >>> mbox cmd response: failed
804,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,546 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,114 >>> mbox cmd response: failed
803,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,596 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,825 >>> mbox cmd response: failed
803,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,657 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,407 >>> mbox cmd response: failed
803,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,839 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,138 UART:
192,500 UART: Running Caliptra ROM ...
193,688 UART:
193,840 UART: [state] CFI Enabled
261,779 UART: [state] LifecycleState = Unprovisioned
263,701 UART: [state] DebugLocked = No
266,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,030 UART: [kat] SHA2-256
441,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,259 UART: [kat] ++
452,772 UART: [kat] sha1
464,786 UART: [kat] SHA2-256
467,514 UART: [kat] SHA2-384
473,656 UART: [kat] SHA2-512-ACC
476,025 UART: [kat] ECC-384
2,768,524 UART: [kat] HMAC-384Kdf
2,800,519 UART: [kat] LMS
3,990,825 UART: [kat] --
3,996,765 UART: [cold-reset] ++
3,998,776 UART: [fht] Storing FHT @ 0x50003400
4,010,976 UART: [idev] ++
4,011,624 UART: [idev] CDI.KEYID = 6
4,012,535 UART: [idev] SUBJECT.KEYID = 7
4,013,787 UART: [idev] UDS.KEYID = 0
4,014,738 ready_for_fw is high
4,014,956 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,159,602 UART: [idev] Erasing UDS.KEYID = 0
7,349,099 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,012 UART: [idev] --
7,375,446 UART: [ldev] ++
7,376,015 UART: [ldev] CDI.KEYID = 6
7,376,993 UART: [ldev] SUBJECT.KEYID = 5
7,378,209 UART: [ldev] AUTHORITY.KEYID = 7
7,379,443 UART: [ldev] FE.KEYID = 1
7,422,936 UART: [ldev] Erasing FE.KEYID = 1
10,755,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,639 UART: [ldev] --
13,135,952 UART: [fwproc] Waiting for Commands...
13,138,113 UART: [fwproc] Received command 0x46574c44
13,140,302 UART: [fwproc] Received Image of size 114996 bytes
17,211,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,352,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,673,675 >>> mbox cmd response: success
17,678,385 UART: [afmc] ++
17,679,028 UART: [afmc] CDI.KEYID = 6
17,679,939 UART: [afmc] SUBJECT.KEYID = 7
17,681,156 UART: [afmc] AUTHORITY.KEYID = 5
21,049,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,462 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,364,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,379,718 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,394,162 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,415,782 UART: [afmc] --
23,419,640 UART: [cold-reset] --
23,424,594 UART: [state] Locking Datavault
23,429,466 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,169 UART: [state] Locking ICCM
23,433,047 UART: [exit] Launching FMC @ 0x40000130
23,441,445 UART:
23,441,685 UART: Running Caliptra FMC ...
23,442,788 UART:
23,442,953 UART: [state] CFI Enabled
23,508,547 UART: [fht] FMC Alias Private Key: 7
25,846,583 UART: [art] Extend RT PCRs Done
25,847,798 UART: [art] Lock RT PCRs Done
25,849,507 UART: [art] Populate DV Done
25,854,813 UART: [fht] FMC Alias Private Key: 7
25,856,478 UART: [art] Derive CDI
25,857,213 UART: [art] Store in in slot 0x4
25,916,417 UART: [art] Derive Key Pair
25,917,459 UART: [art] Store priv key in slot 0x5
29,209,860 UART: [art] Derive Key Pair - Done
29,222,768 UART: [art] Signing Cert with AUTHO
29,224,079 UART: RITY.KEYID = 7
31,510,853 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,367 UART: [art] PUB.X = D1E775AB66E87D407DA653A6619FBAB17CA5D93EE82E9F0FE2238BA8B7BC52775EE384D9E1E70A8CE122184EFF9FEC82
31,519,614 UART: [art] PUB.Y = 276FD1F982A99769565D4E0B6D9DC0CDA3F32663E4ADCBA0883CB8D9E9F15678C245BA640277FF1466222A3C2CB03E6F
31,526,856 UART: [art] SIG.R = 706B5748CB59E9C4A18C36C0E96CA0C2DDC86B32ED4A58C8EF0E6A5658E730D608256994AAA135FE9A2558A012760934
31,534,202 UART: [art] SIG.S = B2594B8F5808B8A8B31D26F5C8168F5284AB9C1628E0A1F60B2E748380765BCA9187DBF35854457E808D10D8076F88A7
32,839,214 UART: Caliptra RT
32,839,930 UART: [state] CFI Enabled
32,999,034 UART: [rt] RT listening for mailbox commands...
33,000,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,030,873 UART: [rt]cmd =0x46504c54, len=4
33,032,487 >>> mbox cmd response data (8 bytes)
33,033,674 UART: [rt] FIPS self test
33,034,624 UART: [kat] ++
33,035,075 UART: [kat] sha1
33,035,643 UART: Fatal Error: 0x90060001
33,070,767 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,215,191 >>> mbox cmd response: failed
33,215,847 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,360,192 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,021 UART:
190,308 UART: Running Caliptra ROM ...
191,419 UART:
191,568 UART: [state] CFI Enabled
261,034 UART: [state] LifecycleState = Unprovisioned
262,954 UART: [state] DebugLocked = No
265,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,348 UART: [kat] SHA2-256
440,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,546 UART: [kat] ++
451,200 UART: [kat] sha1
462,298 UART: [kat] SHA2-256
465,031 UART: [kat] SHA2-384
470,523 UART: [kat] SHA2-512-ACC
472,860 UART: [kat] ECC-384
2,765,359 UART: [kat] HMAC-384Kdf
2,798,918 UART: [kat] LMS
3,989,207 UART: [kat] --
3,995,534 UART: [cold-reset] ++
3,997,912 UART: [fht] Storing FHT @ 0x50003400
4,009,359 UART: [idev] ++
4,009,931 UART: [idev] CDI.KEYID = 6
4,010,900 UART: [idev] SUBJECT.KEYID = 7
4,012,111 UART: [idev] UDS.KEYID = 0
4,013,740 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,417 UART: [idev] Erasing UDS.KEYID = 0
7,343,413 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,113 UART: [idev] --
7,369,852 UART: [ldev] ++
7,370,473 UART: [ldev] CDI.KEYID = 6
7,371,379 UART: [ldev] SUBJECT.KEYID = 5
7,372,592 UART: [ldev] AUTHORITY.KEYID = 7
7,373,879 UART: [ldev] FE.KEYID = 1
7,400,140 UART: [ldev] Erasing FE.KEYID = 1
10,734,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,701 UART: [ldev] --
13,116,291 UART: [fwproc] Waiting for Commands...
13,118,612 UART: [fwproc] Received command 0x46574c44
13,120,797 UART: [fwproc] Received Image of size 114996 bytes
17,190,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,331 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,654,260 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,805,656 ready_for_fw is high
3,806,063 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,903,199 >>> mbox cmd response: success
23,590,834 UART:
23,591,315 UART: Running Caliptra FMC ...
23,592,443 UART:
23,592,604 UART: [state] CFI Enabled
23,658,130 UART: [fht] FMC Alias Private Key: 7
25,996,531 UART: [art] Extend RT PCRs Done
25,997,765 UART: [art] Lock RT PCRs Done
25,999,419 UART: [art] Populate DV Done
26,004,852 UART: [fht] FMC Alias Private Key: 7
26,006,348 UART: [art] Derive CDI
26,007,174 UART: [art] Store in in slot 0x4
26,066,829 UART: [art] Derive Key Pair
26,067,874 UART: [art] Store priv key in slot 0x5
29,361,301 UART: [art] Derive Key Pair - Done
29,374,198 UART: [art] Signing Cert with AUTHO
29,375,513 UART: RITY.KEYID = 7
31,661,934 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,438 UART: [art] PUB.X = D7910CEE6D453FAF0018CBFE13759C24FDB33FBC67A276D094AB7840724C2DCA84F5CC0985DF03266D1AB56903209E22
31,670,709 UART: [art] PUB.Y = 42B73D05A44EAA3507CBE9C8F438BFDD7F2AE8F1819764FD1DEE0DCB1AB4209111A2C185DB43F1641E6DEBEEF5D391C5
31,677,976 UART: [art] SIG.R = 7743E863249955BD6FAA2629AFE3FDF64C5522A9FB4D1E9A3F5DB7EC4009D059BE8775499F1892626C55E05ACC1AEAE2
31,685,380 UART: [art] SIG.S = 452D8857D22319FFD333007704898E7BF2CE9C3DE9B9E02FE1BE25AA8449000F560A0512BD9948FBAB4A0E73025D262B
32,990,553 UART: Caliptra RT
32,991,266 UART: [state] CFI Enabled
33,152,589 UART: [rt] RT listening for mailbox commands...
33,154,449 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,184,351 UART: [rt]cmd =0x46504c54, len=4
33,185,771 >>> mbox cmd response data (8 bytes)
33,186,832 UART: [rt] FIPS self test
33,187,774 UART: [kat] ++
33,188,226 UART: [kat] sha1
33,189,119 UART: Fatal Error: 0x90060001
33,224,478 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,368,839 >>> mbox cmd response: failed
33,369,501 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,513,845 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,779,800 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,891,423 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,470 UART:
192,841 UART: Running Caliptra ROM ...
194,022 UART:
603,658 UART: [state] CFI Enabled
618,155 UART: [state] LifecycleState = Unprovisioned
620,029 UART: [state] DebugLocked = No
621,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,576 UART: [kat] SHA2-256
796,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,844 UART: [kat] ++
807,335 UART: [kat] sha1
818,918 UART: [kat] SHA2-256
821,647 UART: [kat] SHA2-384
828,136 UART: [kat] SHA2-512-ACC
830,505 UART: [kat] ECC-384
3,116,238 UART: [kat] HMAC-384Kdf
3,128,692 UART: [kat] LMS
4,318,853 UART: [kat] --
4,323,424 UART: [cold-reset] ++
4,326,001 UART: [fht] Storing FHT @ 0x50003400
4,337,280 UART: [idev] ++
4,337,845 UART: [idev] CDI.KEYID = 6
4,338,827 UART: [idev] SUBJECT.KEYID = 7
4,340,075 UART: [idev] UDS.KEYID = 0
4,341,026 ready_for_fw is high
4,341,231 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,485,655 UART: [idev] Erasing UDS.KEYID = 0
7,625,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,916 UART: [idev] --
7,650,622 UART: [ldev] ++
7,651,194 UART: [ldev] CDI.KEYID = 6
7,652,211 UART: [ldev] SUBJECT.KEYID = 5
7,653,367 UART: [ldev] AUTHORITY.KEYID = 7
7,654,672 UART: [ldev] FE.KEYID = 1
7,663,168 UART: [ldev] Erasing FE.KEYID = 1
10,955,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,372 UART: [ldev] --
13,313,584 UART: [fwproc] Waiting for Commands...
13,316,221 UART: [fwproc] Received command 0x46574c44
13,318,468 UART: [fwproc] Received Image of size 114996 bytes
17,385,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,464,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,533,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,853,415 >>> mbox cmd response: success
17,857,219 UART: [afmc] ++
17,857,833 UART: [afmc] CDI.KEYID = 6
17,858,746 UART: [afmc] SUBJECT.KEYID = 7
17,859,962 UART: [afmc] AUTHORITY.KEYID = 5
21,175,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,470,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,472,883 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,487,246 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,502,099 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,516,560 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,538,312 UART: [afmc] --
23,541,961 UART: [cold-reset] --
23,545,552 UART: [state] Locking Datavault
23,551,172 UART: [state] Locking PCR0, PCR1 and PCR31
23,552,933 UART: [state] Locking ICCM
23,554,054 UART: [exit] Launching FMC @ 0x40000130
23,562,399 UART:
23,562,713 UART: Running Caliptra FMC ...
23,563,772 UART:
23,563,928 UART: [state] CFI Enabled
23,571,702 UART: [fht] FMC Alias Private Key: 7
25,902,638 UART: [art] Extend RT PCRs Done
25,903,875 UART: [art] Lock RT PCRs Done
25,905,368 UART: [art] Populate DV Done
25,910,405 UART: [fht] FMC Alias Private Key: 7
25,912,053 UART: [art] Derive CDI
25,913,022 UART: [art] Store in in slot 0x4
25,955,440 UART: [art] Derive Key Pair
25,956,452 UART: [art] Store priv key in slot 0x5
29,198,249 UART: [art] Derive Key Pair - Done
29,211,425 UART: [art] Signing Cert with AUTHO
29,212,730 UART: RITY.KEYID = 7
31,492,074 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,628 UART: [art] PUB.X = 4C395D1E9E95B2D1902168BC5750BA5ABE82617165B193700AFCA655945C8F88A1E1442CD0514DF7C89D947EF11AFAC9
31,500,792 UART: [art] PUB.Y = FDF273BBC718EF8B243C57BC48866F249D75AF3F997DF709F41AD5F4AAFA9F7CA7C654FE8528033ADA9D7666C61490DC
31,508,087 UART: [art] SIG.R = 116F2D3810EE3450ADECC656CCA74A53573D3EB70030CD3F8890108F417E59D672711A54A11455BBF9E21979C5FDA54F
31,515,495 UART: [art] SIG.S = D7ABB5C6F83071767432528136BD572B43C22C14AECCCE3CA486099ABFE50089E92792E21997B0470EE7A1480CD55E3B
32,821,061 UART: Caliptra RT
32,821,797 UART: [state] CFI Enabled
32,940,703 UART: [rt] RT listening for mailbox commands...
32,942,549 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,972,386 UART: [rt]cmd =0x46504c54, len=4
32,974,161 >>> mbox cmd response data (8 bytes)
32,975,655 UART: [rt] FIPS self test
32,976,598 UART: [kat] ++
32,977,046 UART: [kat] sha1
32,977,830 UART: Fatal Error: 0x90060001
33,013,037 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,157,453 >>> mbox cmd response: failed
33,158,061 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,302,471 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
189,965 UART:
190,259 UART: Running Caliptra ROM ...
191,285 UART:
7,233,093 UART: [state] CFI Enabled
7,247,081 UART: [state] LifecycleState = Unprovisioned
7,249,010 UART: [state] DebugLocked = No
7,251,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,257,042 UART: [kat] SHA2-256
7,426,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,437,362 UART: [kat] ++
7,437,904 UART: [kat] sha1
7,448,857 UART: [kat] SHA2-256
7,451,576 UART: [kat] SHA2-384
7,457,243 UART: [kat] SHA2-512-ACC
7,459,645 UART: [kat] ECC-384
9,743,907 UART: [kat] HMAC-384Kdf
9,754,517 UART: [kat] LMS
10,944,635 UART: [kat] --
10,948,252 UART: [cold-reset] ++
10,949,536 UART: [fht] Storing FHT @ 0x50003400
10,960,098 UART: [idev] ++
10,960,662 UART: [idev] CDI.KEYID = 6
10,961,623 UART: [idev] SUBJECT.KEYID = 7
10,962,838 UART: [idev] UDS.KEYID = 0
10,964,462 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,108,859 UART: [idev] Erasing UDS.KEYID = 0
14,248,580 UART: [idev] Using Sha1 for KeyId Algorithm
14,271,665 UART: [idev] --
14,276,548 UART: [ldev] ++
14,277,118 UART: [ldev] CDI.KEYID = 6
14,278,136 UART: [ldev] SUBJECT.KEYID = 5
14,279,289 UART: [ldev] AUTHORITY.KEYID = 7
14,280,570 UART: [ldev] FE.KEYID = 1
14,292,244 UART: [ldev] Erasing FE.KEYID = 1
17,581,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,873,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,935,497 UART: [ldev] --
19,940,814 UART: [fwproc] Waiting for Commands...
19,943,396 UART: [fwproc] Received command 0x46574c44
19,945,588 UART: [fwproc] Received Image of size 114996 bytes
24,010,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,087,076 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,155,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,475,458 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,126,668 ready_for_fw is high
4,127,328 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,082,148 >>> mbox cmd response: success
23,717,056 UART:
23,717,479 UART: Running Caliptra FMC ...
23,718,606 UART:
23,718,768 UART: [state] CFI Enabled
23,726,677 UART: [fht] FMC Alias Private Key: 7
26,057,807 UART: [art] Extend RT PCRs Done
26,059,044 UART: [art] Lock RT PCRs Done
26,060,704 UART: [art] Populate DV Done
26,066,240 UART: [fht] FMC Alias Private Key: 7
26,067,808 UART: [art] Derive CDI
26,068,553 UART: [art] Store in in slot 0x4
26,111,157 UART: [art] Derive Key Pair
26,112,196 UART: [art] Store priv key in slot 0x5
29,354,556 UART: [art] Derive Key Pair - Done
29,367,456 UART: [art] Signing Cert with AUTHO
29,368,765 UART: RITY.KEYID = 7
31,647,848 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,383 UART: [art] PUB.X = ADDE97A939F6582AFD00A67B537EC38E320DFE25EE27A925772CAF1D30C38BE7732D37DACF3AEC3574BCBF3E003BFAE8
31,656,636 UART: [art] PUB.Y = 61D7023AB45D8126B84834B4AEBE84460A8170A05536B694F1D048B8ECB3DBD1774E4E3C6B1FAA0BC6DD7CF5AE8B3887
31,663,885 UART: [art] SIG.R = CBE9722188C3A9A2ABC1F32F7761C10962592F8633F4D1FC80EB043E061BDD99D2D52424E5564D068A1B0414F7D02BD3
31,671,285 UART: [art] SIG.S = 444E65A42FE9FBAD5D6380599450261E5F8AB1F3AEE459DAE9BBEE01AF6BE3C0724E5C0A0EA053F3B76E36A8766ABF74
32,976,708 UART: Caliptra RT
32,977,423 UART: [state] CFI Enabled
33,095,457 UART: [rt] RT listening for mailbox commands...
33,097,310 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,069 UART: [rt]cmd =0x46504c54, len=4
33,128,655 >>> mbox cmd response data (8 bytes)
33,129,606 UART: [rt] FIPS self test
33,130,550 UART: [kat] ++
33,131,004 UART: [kat] sha1
33,131,579 UART: Fatal Error: 0x90060001
33,166,960 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,311,394 >>> mbox cmd response: failed
33,312,046 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,456,826 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,611,179 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,569,101 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,246 UART:
192,631 UART: Running Caliptra ROM ...
193,861 UART:
194,015 UART: [state] CFI Enabled
266,392 UART: [state] LifecycleState = Unprovisioned
268,315 UART: [state] DebugLocked = No
269,574 UART: [state] WD Timer not started. Device not locked for debugging
273,175 UART: [kat] SHA2-256
452,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,922 UART: [kat] ++
464,371 UART: [kat] sha1
475,813 UART: [kat] SHA2-256
478,829 UART: [kat] SHA2-384
485,184 UART: [kat] SHA2-512-ACC
488,126 UART: [kat] ECC-384
2,948,979 UART: [kat] HMAC-384Kdf
2,973,487 UART: [kat] LMS
3,502,991 UART: [kat] --
3,506,724 UART: [cold-reset] ++
3,508,095 UART: [fht] FHT @ 0x50003400
3,518,803 UART: [idev] ++
3,519,378 UART: [idev] CDI.KEYID = 6
3,520,288 UART: [idev] SUBJECT.KEYID = 7
3,521,467 UART: [idev] UDS.KEYID = 0
3,522,395 ready_for_fw is high
3,522,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,758 UART: [idev] Erasing UDS.KEYID = 0
6,028,505 UART: [idev] Sha1 KeyId Algorithm
6,050,124 UART: [idev] --
6,053,938 UART: [ldev] ++
6,054,522 UART: [ldev] CDI.KEYID = 6
6,055,428 UART: [ldev] SUBJECT.KEYID = 5
6,056,651 UART: [ldev] AUTHORITY.KEYID = 7
6,057,838 UART: [ldev] FE.KEYID = 1
6,103,133 UART: [ldev] Erasing FE.KEYID = 1
8,604,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,680 UART: [ldev] --
10,393,865 UART: [fwproc] Wait for Commands...
10,396,131 UART: [fwproc] Recv command 0x46574c44
10,398,227 UART: [fwproc] Recv'd Img size: 115304 bytes
13,811,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,547 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,277,080 >>> mbox cmd response: success
14,282,187 UART: [afmc] ++
14,282,802 UART: [afmc] CDI.KEYID = 6
14,283,723 UART: [afmc] SUBJECT.KEYID = 7
14,284,890 UART: [afmc] AUTHORITY.KEYID = 5
16,814,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,886 UART: [afmc] --
18,632,752 UART: [cold-reset] --
18,636,081 UART: [state] Locking Datavault
18,641,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,241 UART: [state] Locking ICCM
18,645,975 UART: [exit] Launching FMC @ 0x40000130
18,654,426 UART:
18,654,669 UART: Running Caliptra FMC ...
18,655,769 UART:
18,655,930 UART: [state] CFI Enabled
18,713,054 UART: [fht] FMC Alias Private Key: 7
20,476,990 UART: [art] Extend RT PCRs Done
20,478,207 UART: [art] Lock RT PCRs Done
20,480,104 UART: [art] Populate DV Done
20,485,352 UART: [fht] FMC Alias Private Key: 7
20,487,001 UART: [art] Derive CDI
20,487,828 UART: [art] Store in in slot 0x4
20,545,689 UART: [art] Derive Key Pair
20,546,731 UART: [art] Store priv key in slot 0x5
23,009,299 UART: [art] Derive Key Pair - Done
23,022,362 UART: [art] Signing Cert with AUTHO
23,023,697 UART: RITY.KEYID = 7
24,743,967 UART: [art] Erasing AUTHORITY.KEYID = 7
24,745,476 UART: [art] PUB.X = 8C334C78174736CF468E08B6934256C40B09C5020085E7C135C4AE99FFF0FAE8EF41E2169C4E8AB573F47E148E712751
24,752,689 UART: [art] PUB.Y = 437C210AC9C74218285192DA4803B320EDB499296220E99CAACD02C028A32292ED4780860292EA9C23469D4C1E311A08
24,759,970 UART: [art] SIG.R = F036CE7A844EDBD4F65BF72157D2229F32406E5DEDD2A47615AABDEE3DDA32A2D5600332294001100D2BDD678C08CC66
24,767,324 UART: [art] SIG.S = 7830A37E12C0C4B7A8FB6821F1D487D5E58BAEB35F67E0DA9CE2A36EBC00631F30B258AC3EA77EE04305487BC8F590E5
25,746,931 UART: Caliptra RT
25,747,632 UART: [state] CFI Enabled
25,910,697 UART: [rt] RT listening for mailbox commands...
25,912,549 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,942,118 UART: [rt]cmd =0x46504c54, len=4
25,943,750 >>> mbox cmd response data (8 bytes)
25,944,705 UART: [rt] FIPS self test
25,945,644 UART: [kat] ++
25,946,096 UART: [kat] sha1
25,946,694 UART: Fatal Error: 0x90060001
25,982,088 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,126,934 >>> mbox cmd response: failed
26,127,518 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,272,110 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,092 UART:
190,412 UART: Running Caliptra ROM ...
191,473 UART:
191,615 UART: [state] CFI Enabled
259,181 UART: [state] LifecycleState = Unprovisioned
261,049 UART: [state] DebugLocked = No
263,299 UART: [state] WD Timer not started. Device not locked for debugging
266,605 UART: [kat] SHA2-256
445,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,327 UART: [kat] ++
457,795 UART: [kat] sha1
469,700 UART: [kat] SHA2-256
472,709 UART: [kat] SHA2-384
478,476 UART: [kat] SHA2-512-ACC
481,418 UART: [kat] ECC-384
2,943,841 UART: [kat] HMAC-384Kdf
2,965,517 UART: [kat] LMS
3,495,006 UART: [kat] --
3,498,780 UART: [cold-reset] ++
3,500,761 UART: [fht] FHT @ 0x50003400
3,511,303 UART: [idev] ++
3,511,870 UART: [idev] CDI.KEYID = 6
3,512,774 UART: [idev] SUBJECT.KEYID = 7
3,513,986 UART: [idev] UDS.KEYID = 0
3,515,497 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,660,539 UART: [idev] Erasing UDS.KEYID = 0
6,021,393 UART: [idev] Sha1 KeyId Algorithm
6,044,627 UART: [idev] --
6,048,679 UART: [ldev] ++
6,049,251 UART: [ldev] CDI.KEYID = 6
6,050,164 UART: [ldev] SUBJECT.KEYID = 5
6,051,382 UART: [ldev] AUTHORITY.KEYID = 7
6,052,618 UART: [ldev] FE.KEYID = 1
6,095,666 UART: [ldev] Erasing FE.KEYID = 1
8,597,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,720 UART: [ldev] --
10,407,797 UART: [fwproc] Wait for Commands...
10,410,148 UART: [fwproc] Recv command 0x46574c44
10,412,274 UART: [fwproc] Recv'd Img size: 115304 bytes
13,824,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,205 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,281,858 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,394,383 ready_for_fw is high
3,394,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,102,238 >>> mbox cmd response: success
18,380,358 UART:
18,380,749 UART: Running Caliptra FMC ...
18,381,900 UART:
18,382,054 UART: [state] CFI Enabled
18,447,800 UART: [fht] FMC Alias Private Key: 7
20,211,744 UART: [art] Extend RT PCRs Done
20,212,965 UART: [art] Lock RT PCRs Done
20,214,938 UART: [art] Populate DV Done
20,220,167 UART: [fht] FMC Alias Private Key: 7
20,221,921 UART: [art] Derive CDI
20,222,857 UART: [art] Store in in slot 0x4
20,280,400 UART: [art] Derive Key Pair
20,281,407 UART: [art] Store priv key in slot 0x5
22,744,256 UART: [art] Derive Key Pair - Done
22,756,721 UART: [art] Signing Cert with AUTHO
22,758,021 UART: RITY.KEYID = 7
24,469,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,471,203 UART: [art] PUB.X = 4D155564F93E38D42556CCAD5B8E54D1684DC77E24D8642D4F2A250FDE89CEF06C1138A7362C2B2595EFE9166DA90CD5
24,478,459 UART: [art] PUB.Y = C2345405A6F34E3D60F4A04FE53A87CA84C94453EF17C022D45487F2C559CFAD2FA187176BC21AF4B435AF0D00436DD9
24,485,740 UART: [art] SIG.R = 791AB475D6F681C1AD2EF39DE7C2EE427243A21ABCE0AA971F0009BD68688AA08016C4086D0FF10012BA773F0D3D2C64
24,493,086 UART: [art] SIG.S = 150672D849F384B93A1DA79DC5289E59880B8F355DE57CF2710C529E909186D1F0424ABC5F0DCBE623E16782CAFAD5CE
25,471,850 UART: Caliptra RT
25,472,569 UART: [state] CFI Enabled
25,637,789 UART: [rt] RT listening for mailbox commands...
25,639,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,669,500 UART: [rt]cmd =0x46504c54, len=4
25,671,221 >>> mbox cmd response data (8 bytes)
25,672,180 UART: [rt] FIPS self test
25,673,120 UART: [kat] ++
25,673,573 UART: [kat] sha1
25,674,358 UART: Fatal Error: 0x90060001
25,709,559 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,854,374 >>> mbox cmd response: failed
25,854,995 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,999,727 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,378,181 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,080,041 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,638 UART:
193,031 UART: Running Caliptra ROM ...
194,160 UART:
603,875 UART: [state] CFI Enabled
615,495 UART: [state] LifecycleState = Unprovisioned
617,390 UART: [state] DebugLocked = No
620,130 UART: [state] WD Timer not started. Device not locked for debugging
624,158 UART: [kat] SHA2-256
803,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,878 UART: [kat] ++
815,415 UART: [kat] sha1
825,731 UART: [kat] SHA2-256
828,737 UART: [kat] SHA2-384
835,082 UART: [kat] SHA2-512-ACC
838,107 UART: [kat] ECC-384
3,281,443 UART: [kat] HMAC-384Kdf
3,293,689 UART: [kat] LMS
3,823,124 UART: [kat] --
3,827,399 UART: [cold-reset] ++
3,830,046 UART: [fht] FHT @ 0x50003400
3,841,820 UART: [idev] ++
3,842,392 UART: [idev] CDI.KEYID = 6
3,843,352 UART: [idev] SUBJECT.KEYID = 7
3,844,534 UART: [idev] UDS.KEYID = 0
3,845,617 ready_for_fw is high
3,845,859 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,937 UART: [idev] Erasing UDS.KEYID = 0
6,314,785 UART: [idev] Sha1 KeyId Algorithm
6,336,237 UART: [idev] --
6,339,567 UART: [ldev] ++
6,340,147 UART: [ldev] CDI.KEYID = 6
6,341,082 UART: [ldev] SUBJECT.KEYID = 5
6,342,247 UART: [ldev] AUTHORITY.KEYID = 7
6,343,482 UART: [ldev] FE.KEYID = 1
6,354,290 UART: [ldev] Erasing FE.KEYID = 1
8,822,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,231 UART: [ldev] --
10,613,288 UART: [fwproc] Wait for Commands...
10,615,064 UART: [fwproc] Recv command 0x46574c44
10,617,166 UART: [fwproc] Recv'd Img size: 115304 bytes
14,031,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,244 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,492,809 >>> mbox cmd response: success
14,497,360 UART: [afmc] ++
14,497,952 UART: [afmc] CDI.KEYID = 6
14,498,862 UART: [afmc] SUBJECT.KEYID = 7
14,500,026 UART: [afmc] AUTHORITY.KEYID = 5
17,000,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,677 UART: [afmc] --
18,797,007 UART: [cold-reset] --
18,801,249 UART: [state] Locking Datavault
18,804,445 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,250 UART: [state] Locking ICCM
18,808,810 UART: [exit] Launching FMC @ 0x40000130
18,817,213 UART:
18,817,456 UART: Running Caliptra FMC ...
18,818,561 UART:
18,818,721 UART: [state] CFI Enabled
18,826,985 UART: [fht] FMC Alias Private Key: 7
20,584,345 UART: [art] Extend RT PCRs Done
20,585,566 UART: [art] Lock RT PCRs Done
20,587,326 UART: [art] Populate DV Done
20,592,737 UART: [fht] FMC Alias Private Key: 7
20,594,277 UART: [art] Derive CDI
20,595,011 UART: [art] Store in in slot 0x4
20,637,981 UART: [art] Derive Key Pair
20,638,985 UART: [art] Store priv key in slot 0x5
23,065,540 UART: [art] Derive Key Pair - Done
23,078,391 UART: [art] Signing Cert with AUTHO
23,079,718 UART: RITY.KEYID = 7
24,785,047 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,553 UART: [art] PUB.X = 06B2E0A2866EA1B48E8375C6DB4D8E7F23EB81FD64AC94D95DB3C2836E64FA3F4E7701EC1ECABF98CB17682A0FE5AA78
24,793,873 UART: [art] PUB.Y = A680BF6767F1DFF6C12C6A354B03B1DB442B1B242BDD8E83F653F0B4C121863293B5B8FF91DAD82E554C6DF2E11F5785
24,801,164 UART: [art] SIG.R = 9AE602C8DCC3266384880E27DF64EDF088A1AD4188605EA1AA70F184821FCAA87EF7FC3C0DAF9EAA047C0569657B0B45
24,808,574 UART: [art] SIG.S = 9780FEEA95E863C5C3935F5A5CC44910F3A86FED03D56E3E06ED93E942B38480FACDCCDBD4A680A0B7D9EF7B31FFBBC0
25,787,493 UART: Caliptra RT
25,788,194 UART: [state] CFI Enabled
25,905,632 UART: [rt] RT listening for mailbox commands...
25,907,473 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,937,153 UART: [rt]cmd =0x46504c54, len=4
25,938,600 >>> mbox cmd response data (8 bytes)
25,939,455 UART: [rt] FIPS self test
25,940,403 UART: [kat] ++
25,940,855 UART: [kat] sha1
25,941,479 UART: Fatal Error: 0x90060001
25,976,702 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,121,531 >>> mbox cmd response: failed
26,122,195 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,266,912 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,131 UART:
190,418 UART: Running Caliptra ROM ...
191,478 UART:
14,270,014 UART: [state] CFI Enabled
14,281,694 UART: [state] LifecycleState = Unprovisioned
14,283,556 UART: [state] DebugLocked = No
14,285,807 UART: [state] WD Timer not started. Device not locked for debugging
14,288,965 UART: [kat] SHA2-256
14,468,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,479,698 UART: [kat] ++
14,480,182 UART: [kat] sha1
14,492,688 UART: [kat] SHA2-256
14,495,705 UART: [kat] SHA2-384
14,503,095 UART: [kat] SHA2-512-ACC
14,506,094 UART: [kat] ECC-384
16,947,912 UART: [kat] HMAC-384Kdf
16,960,141 UART: [kat] LMS
17,489,582 UART: [kat] --
17,491,702 UART: [cold-reset] ++
17,492,777 UART: [fht] FHT @ 0x50003400
17,502,946 UART: [idev] ++
17,503,556 UART: [idev] CDI.KEYID = 6
17,504,468 UART: [idev] SUBJECT.KEYID = 7
17,505,628 UART: [idev] UDS.KEYID = 0
17,507,150 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,651,759 UART: [idev] Erasing UDS.KEYID = 0
19,976,690 UART: [idev] Sha1 KeyId Algorithm
20,000,888 UART: [idev] --
20,004,863 UART: [ldev] ++
20,005,450 UART: [ldev] CDI.KEYID = 6
20,006,360 UART: [ldev] SUBJECT.KEYID = 5
20,007,523 UART: [ldev] AUTHORITY.KEYID = 7
20,008,815 UART: [ldev] FE.KEYID = 1
20,019,521 UART: [ldev] Erasing FE.KEYID = 1
22,492,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,207,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,223,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,239,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,254,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,275,229 UART: [ldev] --
24,280,118 UART: [fwproc] Wait for Commands...
24,281,837 UART: [fwproc] Recv command 0x46574c44
24,283,957 UART: [fwproc] Recv'd Img size: 115304 bytes
27,692,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,761,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,830,059 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,151,311 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,687,950 ready_for_fw is high
3,688,556 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,282,725 >>> mbox cmd response: success
18,534,352 UART:
18,534,755 UART: Running Caliptra FMC ...
18,535,933 UART:
18,536,092 UART: [state] CFI Enabled
18,544,141 UART: [fht] FMC Alias Private Key: 7
20,300,562 UART: [art] Extend RT PCRs Done
20,301,793 UART: [art] Lock RT PCRs Done
20,303,291 UART: [art] Populate DV Done
20,308,743 UART: [fht] FMC Alias Private Key: 7
20,310,343 UART: [art] Derive CDI
20,311,168 UART: [art] Store in in slot 0x4
20,353,274 UART: [art] Derive Key Pair
20,354,320 UART: [art] Store priv key in slot 0x5
22,781,403 UART: [art] Derive Key Pair - Done
22,794,289 UART: [art] Signing Cert with AUTHO
22,795,590 UART: RITY.KEYID = 7
24,500,959 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,461 UART: [art] PUB.X = A07573D6AAB000165BC1896065CDFD98490963D8B280D581DFF0B69703A2FBA279BFE19790A079D2900A3A308AF0ACDA
24,509,747 UART: [art] PUB.Y = 7268EC459825E43E724CF60E9B6685ED8DBF4B9A1D15A1EE0EF600173F9767825AC00A0C41B525463E571A39893C8009
24,516,933 UART: [art] SIG.R = 5F04847E71F9F173ED735EEF41D28695C58E4B72F2B104918204CBE4C8CE30B8B249A1D3E9AE3443DBD2D68504039AE6
24,524,285 UART: [art] SIG.S = B903754D8294F90300E3C5334D946C511B276F7CB069869FB3D668679DCE6E34380BB8B93F2E868435F9BEA2F56B5E74
25,503,389 UART: Caliptra RT
25,504,092 UART: [state] CFI Enabled
25,621,478 UART: [rt] RT listening for mailbox commands...
25,623,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,653,226 UART: [rt]cmd =0x46504c54, len=4
25,654,941 >>> mbox cmd response data (8 bytes)
25,656,217 UART: [rt] FIPS self test
25,657,164 UART: [kat] ++
25,657,610 UART: [kat] sha1
25,658,119 UART: Fatal Error: 0x90060001
25,693,182 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,837,966 >>> mbox cmd response: failed
25,838,629 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,983,351 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,633,422 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,243,717 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
192,225 UART:
192,583 UART: Running Caliptra ROM ...
193,682 UART:
193,846 UART: [state] CFI Enabled
262,643 UART: [state] LifecycleState = Unprovisioned
265,020 UART: [state] DebugLocked = No
267,608 UART: [state] WD Timer not started. Device not locked for debugging
273,004 UART: [kat] SHA2-256
462,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,665 UART: [kat] ++
474,108 UART: [kat] sha1
486,759 UART: [kat] SHA2-256
489,769 UART: [kat] SHA2-384
495,902 UART: [kat] SHA2-512-ACC
498,494 UART: [kat] ECC-384
2,948,039 UART: [kat] HMAC-384Kdf
2,971,307 UART: [kat] LMS
3,503,061 UART: [kat] --
3,506,282 UART: [cold-reset] ++
3,508,018 UART: [fht] FHT @ 0x50003400
3,519,290 UART: [idev] ++
3,519,998 UART: [idev] CDI.KEYID = 6
3,520,955 UART: [idev] SUBJECT.KEYID = 7
3,522,126 UART: [idev] UDS.KEYID = 0
3,523,029 ready_for_fw is high
3,523,238 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,265 UART: [idev] Erasing UDS.KEYID = 0
6,027,768 UART: [idev] Sha1 KeyId Algorithm
6,050,666 UART: [idev] --
6,055,424 UART: [ldev] ++
6,056,167 UART: [ldev] CDI.KEYID = 6
6,057,096 UART: [ldev] SUBJECT.KEYID = 5
6,058,259 UART: [ldev] AUTHORITY.KEYID = 7
6,059,436 UART: [ldev] FE.KEYID = 1
6,097,952 UART: [ldev] Erasing FE.KEYID = 1
8,604,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,587 UART: [ldev] --
10,410,904 UART: [fwproc] Wait for Commands...
10,412,356 UART: [fwproc] Recv command 0x46574c44
10,414,343 UART: [fwproc] Recv'd Img size: 115304 bytes
13,878,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,624 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,624,040 >>> mbox cmd response: success
14,628,701 UART: [afmc] ++
14,629,400 UART: [afmc] CDI.KEYID = 6
14,630,634 UART: [afmc] SUBJECT.KEYID = 7
14,632,136 UART: [afmc] AUTHORITY.KEYID = 5
17,169,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,913,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,915,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,930,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,945,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,960,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,984,883 UART: [afmc] --
18,988,637 UART: [cold-reset] --
18,993,299 UART: [state] Locking Datavault
18,999,372 UART: [state] Locking PCR0, PCR1 and PCR31
19,001,557 UART: [state] Locking ICCM
19,004,195 UART: [exit] Launching FMC @ 0x40000130
19,012,865 UART:
19,013,109 UART: Running Caliptra FMC ...
19,014,212 UART:
19,014,391 UART: [state] CFI Enabled
19,071,723 UART: [fht] FMC Alias Private Key: 7
20,835,087 UART: [art] Extend RT PCRs Done
20,836,307 UART: [art] Lock RT PCRs Done
20,837,683 UART: [art] Populate DV Done
20,843,093 UART: [fht] FMC Alias Private Key: 7
20,844,628 UART: [art] Derive CDI
20,845,361 UART: [art] Store in in slot 0x4
20,903,963 UART: [art] Derive Key Pair
20,904,962 UART: [art] Store priv key in slot 0x5
23,369,208 UART: [art] Derive Key Pair - Done
23,381,817 UART: [art] Signing Cert with AUTHO
23,383,113 UART: RITY.KEYID = 7
25,094,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,208 UART: [art] PUB.X = 8268EEA23B48E0C984FD9A2355A401FC7E74186A0A89A1B42108A20E8E5367713BE2E215C652D70FBCC9089F49059EDE
25,103,465 UART: [art] PUB.Y = C014256AF59C954C91628A506AD0F80BCD48379168A5FD1F47FE94392E569064FCD2DE2A951D556E4717FE249A5DF3FF
25,110,776 UART: [art] SIG.R = 062480D197D350D298D6416D37B89D03312A1A65C257976AE493F50B4AF9BC2A8B569454B173309BB2D4464F215092E9
25,118,130 UART: [art] SIG.S = 517DFBAA16B1CA890C826A21783C87D894F8CD68A6A21DA1BA02EF3A37EC18526DDEDBFE8EC311AD2968C24224F16E39
26,097,407 UART: Caliptra RT
26,098,132 UART: [state] CFI Enabled
26,263,242 UART: [rt] RT listening for mailbox commands...
26,265,090 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,294,926 UART: [rt]cmd =0x46504c54, len=4
26,296,535 >>> mbox cmd response data (8 bytes)
26,297,658 UART: [rt] FIPS self test
26,298,607 UART: [kat] ++
26,299,059 UART: [kat] sha1
26,299,571 UART: Fatal Error: 0x90060001
26,334,716 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,479,503 >>> mbox cmd response: failed
26,480,110 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,624,867 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,111 UART:
190,423 UART: Running Caliptra ROM ...
191,537 UART:
191,685 UART: [state] CFI Enabled
258,666 UART: [state] LifecycleState = Unprovisioned
261,018 UART: [state] DebugLocked = No
262,989 UART: [state] WD Timer not started. Device not locked for debugging
267,261 UART: [kat] SHA2-256
457,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,913 UART: [kat] ++
468,440 UART: [kat] sha1
478,888 UART: [kat] SHA2-256
481,898 UART: [kat] SHA2-384
486,580 UART: [kat] SHA2-512-ACC
489,203 UART: [kat] ECC-384
2,947,481 UART: [kat] HMAC-384Kdf
2,970,019 UART: [kat] LMS
3,501,792 UART: [kat] --
3,506,021 UART: [cold-reset] ++
3,507,689 UART: [fht] FHT @ 0x50003400
3,520,401 UART: [idev] ++
3,521,139 UART: [idev] CDI.KEYID = 6
3,522,052 UART: [idev] SUBJECT.KEYID = 7
3,523,271 UART: [idev] UDS.KEYID = 0
3,524,782 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,701 UART: [idev] Erasing UDS.KEYID = 0
6,026,425 UART: [idev] Sha1 KeyId Algorithm
6,049,705 UART: [idev] --
6,053,733 UART: [ldev] ++
6,054,424 UART: [ldev] CDI.KEYID = 6
6,055,355 UART: [ldev] SUBJECT.KEYID = 5
6,056,519 UART: [ldev] AUTHORITY.KEYID = 7
6,057,763 UART: [ldev] FE.KEYID = 1
6,097,198 UART: [ldev] Erasing FE.KEYID = 1
8,601,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,800 UART: [ldev] --
10,413,388 UART: [fwproc] Wait for Commands...
10,415,323 UART: [fwproc] Recv command 0x46574c44
10,417,581 UART: [fwproc] Recv'd Img size: 115304 bytes
13,872,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,616,065 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,434,848 ready_for_fw is high
3,435,256 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,760,436 >>> mbox cmd response: success
19,048,540 UART:
19,048,956 UART: Running Caliptra FMC ...
19,050,277 UART:
19,050,453 UART: [state] CFI Enabled
19,116,141 UART: [fht] FMC Alias Private Key: 7
20,880,199 UART: [art] Extend RT PCRs Done
20,881,408 UART: [art] Lock RT PCRs Done
20,883,249 UART: [art] Populate DV Done
20,888,662 UART: [fht] FMC Alias Private Key: 7
20,890,366 UART: [art] Derive CDI
20,891,199 UART: [art] Store in in slot 0x4
20,949,114 UART: [art] Derive Key Pair
20,950,176 UART: [art] Store priv key in slot 0x5
23,412,838 UART: [art] Derive Key Pair - Done
23,425,732 UART: [art] Signing Cert with AUTHO
23,427,066 UART: RITY.KEYID = 7
25,138,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,045 UART: [art] PUB.X = 19671752FDA98843D40EE7E90AD8480F7FCE04C73B0CD8115F4C8BDC77BD0119E8F5A0C68AA33B4AADB208C7154882E9
25,147,306 UART: [art] PUB.Y = B0C4DBF9D7F08476D336AD24BBB99544F1B7CDA27CE19D5C1B94F392C780A04BBAE199352ED8EDB0EBD21D32E2B59912
25,154,606 UART: [art] SIG.R = F15DC81ADA0C2C63B7B90968F1E18817BDDF4ACB2F247E86594D53BCB6646C52BEF988146D811E24A58CAD47BDC5F6AF
25,162,006 UART: [art] SIG.S = E1AB1FAE362004F3D650BCD85D77873F648FAB7F9FCA7BA8D03EEC3D2F099D709CD3996C8C70C4E1E81046DC6DC783A9
26,141,006 UART: Caliptra RT
26,141,703 UART: [state] CFI Enabled
26,305,469 UART: [rt] RT listening for mailbox commands...
26,307,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,962 UART: [rt]cmd =0x46504c54, len=4
26,338,666 >>> mbox cmd response data (8 bytes)
26,339,450 UART: [rt] FIPS self test
26,340,393 UART: [kat] ++
26,340,842 UART: [kat] sha1
26,341,352 UART: Fatal Error: 0x90060001
26,376,466 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,521,288 >>> mbox cmd response: failed
26,521,935 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,666,667 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,435,491 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,750,410 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,644 UART:
193,016 UART: Running Caliptra ROM ...
194,139 UART:
603,714 UART: [state] CFI Enabled
620,559 UART: [state] LifecycleState = Unprovisioned
622,934 UART: [state] DebugLocked = No
625,163 UART: [state] WD Timer not started. Device not locked for debugging
629,768 UART: [kat] SHA2-256
819,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,435 UART: [kat] ++
830,988 UART: [kat] sha1
842,365 UART: [kat] SHA2-256
845,391 UART: [kat] SHA2-384
852,663 UART: [kat] SHA2-512-ACC
855,250 UART: [kat] ECC-384
3,295,122 UART: [kat] HMAC-384Kdf
3,306,886 UART: [kat] LMS
3,838,655 UART: [kat] --
3,843,732 UART: [cold-reset] ++
3,846,091 UART: [fht] FHT @ 0x50003400
3,857,073 UART: [idev] ++
3,857,724 UART: [idev] CDI.KEYID = 6
3,858,682 UART: [idev] SUBJECT.KEYID = 7
3,859,928 UART: [idev] UDS.KEYID = 0
3,860,824 ready_for_fw is high
3,861,029 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,005,837 UART: [idev] Erasing UDS.KEYID = 0
6,338,049 UART: [idev] Sha1 KeyId Algorithm
6,360,736 UART: [idev] --
6,365,730 UART: [ldev] ++
6,366,420 UART: [ldev] CDI.KEYID = 6
6,367,302 UART: [ldev] SUBJECT.KEYID = 5
6,368,522 UART: [ldev] AUTHORITY.KEYID = 7
6,369,646 UART: [ldev] FE.KEYID = 1
6,380,503 UART: [ldev] Erasing FE.KEYID = 1
8,854,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,091 UART: [ldev] --
10,645,686 UART: [fwproc] Wait for Commands...
10,647,563 UART: [fwproc] Recv command 0x46574c44
10,649,830 UART: [fwproc] Recv'd Img size: 115304 bytes
14,117,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,192,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,585 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,856,586 >>> mbox cmd response: success
14,860,681 UART: [afmc] ++
14,861,385 UART: [afmc] CDI.KEYID = 6
14,862,644 UART: [afmc] SUBJECT.KEYID = 7
14,864,081 UART: [afmc] AUTHORITY.KEYID = 5
17,366,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,092,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,094,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,109,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,124,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,139,644 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,164,423 UART: [afmc] --
19,168,085 UART: [cold-reset] --
19,172,114 UART: [state] Locking Datavault
19,177,359 UART: [state] Locking PCR0, PCR1 and PCR31
19,179,549 UART: [state] Locking ICCM
19,182,074 UART: [exit] Launching FMC @ 0x40000130
19,190,744 UART:
19,190,979 UART: Running Caliptra FMC ...
19,192,099 UART:
19,192,270 UART: [state] CFI Enabled
19,200,482 UART: [fht] FMC Alias Private Key: 7
20,957,545 UART: [art] Extend RT PCRs Done
20,958,772 UART: [art] Lock RT PCRs Done
20,960,805 UART: [art] Populate DV Done
20,966,324 UART: [fht] FMC Alias Private Key: 7
20,967,813 UART: [art] Derive CDI
20,968,549 UART: [art] Store in in slot 0x4
21,010,981 UART: [art] Derive Key Pair
21,012,023 UART: [art] Store priv key in slot 0x5
23,438,949 UART: [art] Derive Key Pair - Done
23,452,157 UART: [art] Signing Cert with AUTHO
23,453,454 UART: RITY.KEYID = 7
25,159,013 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,527 UART: [art] PUB.X = C977B31A9FEEAD54F201A92EC24C6DD1EF46D081C74C2219C48BE2FD8EB46B40DFE28E67998FA50222E216BD17923B96
25,167,799 UART: [art] PUB.Y = 3020A82ECDF0E97706052EB45853A1B72B3D46D16EDB96097882FF16573FCDE0741C8EF76892155532104DD5D8A15F1D
25,175,089 UART: [art] SIG.R = CF1A5FC0D19E1C075B02216161E76A4237469F3BC067875998AD6284371CE3CD80AAD3D1626AAA86041BCBBD3C1BE8F9
25,182,482 UART: [art] SIG.S = E74C29CD3AA6471C45DF4AAD1135240B062CC541F384E083DCA23AD3D05DD3449F8653B3B48A3D4F86D01E0D7736AFF2
26,161,220 UART: Caliptra RT
26,161,930 UART: [state] CFI Enabled
26,278,845 UART: [rt] RT listening for mailbox commands...
26,280,694 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,310,206 UART: [rt]cmd =0x46504c54, len=4
26,311,831 >>> mbox cmd response data (8 bytes)
26,313,010 UART: [rt] FIPS self test
26,313,957 UART: [kat] ++
26,314,452 UART: [kat] sha1
26,314,964 UART: Fatal Error: 0x90060001
26,350,289 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,494,998 >>> mbox cmd response: failed
26,495,587 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,640,389 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,101 UART:
190,386 UART: Running Caliptra ROM ...
191,438 UART:
13,894,786 UART: [state] CFI Enabled
13,906,994 UART: [state] LifecycleState = Unprovisioned
13,909,337 UART: [state] DebugLocked = No
13,912,297 UART: [state] WD Timer not started. Device not locked for debugging
13,917,451 UART: [kat] SHA2-256
14,107,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,118,088 UART: [kat] ++
14,118,690 UART: [kat] sha1
14,130,340 UART: [kat] SHA2-256
14,133,357 UART: [kat] SHA2-384
14,140,227 UART: [kat] SHA2-512-ACC
14,142,795 UART: [kat] ECC-384
16,584,525 UART: [kat] HMAC-384Kdf
16,597,909 UART: [kat] LMS
17,129,699 UART: [kat] --
17,135,792 UART: [cold-reset] ++
17,137,722 UART: [fht] FHT @ 0x50003400
17,149,185 UART: [idev] ++
17,149,903 UART: [idev] CDI.KEYID = 6
17,150,870 UART: [idev] SUBJECT.KEYID = 7
17,152,032 UART: [idev] UDS.KEYID = 0
17,153,711 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,298,333 UART: [idev] Erasing UDS.KEYID = 0
19,623,606 UART: [idev] Sha1 KeyId Algorithm
19,646,556 UART: [idev] --
19,651,432 UART: [ldev] ++
19,652,144 UART: [ldev] CDI.KEYID = 6
19,653,062 UART: [ldev] SUBJECT.KEYID = 5
19,654,220 UART: [ldev] AUTHORITY.KEYID = 7
19,655,446 UART: [ldev] FE.KEYID = 1
19,666,201 UART: [ldev] Erasing FE.KEYID = 1
22,143,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,863,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,878,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,893,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,908,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,930,589 UART: [ldev] --
23,935,959 UART: [fwproc] Wait for Commands...
23,939,134 UART: [fwproc] Recv command 0x46574c44
23,941,454 UART: [fwproc] Recv'd Img size: 115304 bytes
27,403,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,478,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,595,128 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,142,822 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,757,521 ready_for_fw is high
3,757,947 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,982,412 >>> mbox cmd response: success
19,237,679 UART:
19,238,083 UART: Running Caliptra FMC ...
19,239,245 UART:
19,239,406 UART: [state] CFI Enabled
19,246,896 UART: [fht] FMC Alias Private Key: 7
21,003,954 UART: [art] Extend RT PCRs Done
21,005,322 UART: [art] Lock RT PCRs Done
21,007,011 UART: [art] Populate DV Done
21,012,330 UART: [fht] FMC Alias Private Key: 7
21,013,932 UART: [art] Derive CDI
21,014,916 UART: [art] Store in in slot 0x4
21,057,815 UART: [art] Derive Key Pair
21,058,830 UART: [art] Store priv key in slot 0x5
23,486,175 UART: [art] Derive Key Pair - Done
23,499,516 UART: [art] Signing Cert with AUTHO
23,500,827 UART: RITY.KEYID = 7
25,206,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,156 UART: [art] PUB.X = 63103490890CF93B2B55156DA348B9CD30C90C05485AA6993CC7648E22D9E5141534F892B20B9BDA94387380EAE74453
25,215,411 UART: [art] PUB.Y = E0B5BF75A7C41577314230D79D7F4C3BB593AB5DD16B8941FD15B74A0380B2FB1ADB6417333668E020C0D1D84B1887AF
25,222,668 UART: [art] SIG.R = 2D457DC14F7C50257F0E7AC93EB605EBBA1395865BABC10B71709D2D27752CEFECCACFC05660A87A2C60B9B1FD8539F9
25,230,066 UART: [art] SIG.S = 7C2699691F10D3E2D1A2F41E5B6201E2279E7B94CF3CD81E1DF7A4DC942BFDC5966BD0EB1955C16FE67E909F7CA941A7
26,208,865 UART: Caliptra RT
26,209,574 UART: [state] CFI Enabled
26,326,690 UART: [rt] RT listening for mailbox commands...
26,328,537 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,358,384 UART: [rt]cmd =0x46504c54, len=4
26,359,905 >>> mbox cmd response data (8 bytes)
26,360,837 UART: [rt] FIPS self test
26,361,782 UART: [kat] ++
26,362,231 UART: [kat] sha1
26,362,763 UART: Fatal Error: 0x90060001
26,398,081 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,542,985 >>> mbox cmd response: failed
26,543,599 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,688,370 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
16,976,228 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,204,689 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,801 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 ready_for_fw is high
1,480,731 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,452 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,520,999 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,564 UART: [ldev] --
1,585,919 UART: [fwproc] Waiting for Commands...
1,586,594 UART: [fwproc] Received command 0x46574c44
1,587,385 UART: [fwproc] Received Image of size 115304 bytes
2,898,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,755 >>> mbox cmd response: success
3,092,999 UART: [afmc] ++
3,093,167 UART: [afmc] CDI.KEYID = 6
3,093,529 UART: [afmc] SUBJECT.KEYID = 7
3,093,954 UART: [afmc] AUTHORITY.KEYID = 5
3,128,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,018 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,708 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,583 UART: [afmc] --
3,171,639 UART: [cold-reset] --
3,172,375 UART: [state] Locking Datavault
3,173,610 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,214 UART: [state] Locking ICCM
3,174,710 UART: [exit] Launching FMC @ 0x40000130
3,180,039 UART:
3,180,055 UART: Running Caliptra FMC ...
3,180,463 UART:
3,180,517 UART: [state] CFI Enabled
3,191,120 UART: [fht] FMC Alias Private Key: 7
3,298,997 UART: [art] Extend RT PCRs Done
3,299,425 UART: [art] Lock RT PCRs Done
3,301,293 UART: [art] Populate DV Done
3,309,662 UART: [fht] FMC Alias Private Key: 7
3,310,690 UART: [art] Derive CDI
3,310,970 UART: [art] Store in in slot 0x4
3,396,841 UART: [art] Derive Key Pair
3,397,201 UART: [art] Store priv key in slot 0x5
3,409,495 UART: [art] Derive Key Pair - Done
3,424,417 UART: [art] Signing Cert with AUTHO
3,424,897 UART: RITY.KEYID = 7
3,440,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,880 UART: [art] PUB.X = 906C7B556BA6D16B5A143934DCE26C7BDBF06AA25D2B2375232FBA13A3AF10565B86311812EE5564BCFED627E8383516
3,447,656 UART: [art] PUB.Y = B31EF7552BE3F6E450FA512905D79077574A09BFE2A1AE3C025F19EDA7B68CC1DD8A9B71FA88733A65A9933DC08B6D7D
3,454,611 UART: [art] SIG.R = D61D7F1A79876009522F0BFC86C99C26DAD0070414A4D1814651F84027B75781BA5C8EECD4E63FC65E27215304219CEA
3,461,366 UART: [art] SIG.S = DEDED0B53F5D968DE2AFB1B730CB4CE1703086A0364E1721300D480765BF2C432BBBFC3659ED1E4592B94AFA5F8530DB
3,485,011 UART: Caliptra RT
3,485,264 UART: [state] CFI Enabled
3,593,454 UART: [rt] RT listening for mailbox commands...
3,594,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,896 UART: [rt]cmd =0x46504c54, len=4
3,625,091 >>> mbox cmd response data (8 bytes)
3,625,300 UART: [rt] FIPS self test
3,625,628 UART: [kat] ++
3,625,780 UART: [kat] sha1
3,626,444 UART: Fatal Error: 0x90060001
3,627,994 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,627,999 >>> mbox cmd response: failed
3,627,999 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,628,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,075 UART: [kat] SHA2-256
882,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,121 UART: [kat] ++
886,273 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,930 UART: [kat] HMAC-384Kdf
907,418 UART: [kat] LMS
1,475,614 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,758 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,537 UART: [ldev] ++
1,514,705 UART: [ldev] CDI.KEYID = 6
1,515,068 UART: [ldev] SUBJECT.KEYID = 5
1,515,494 UART: [ldev] AUTHORITY.KEYID = 7
1,515,957 UART: [ldev] FE.KEYID = 1
1,521,311 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,612 UART: [ldev] --
1,585,891 UART: [fwproc] Waiting for Commands...
1,586,642 UART: [fwproc] Received command 0x46574c44
1,587,433 UART: [fwproc] Received Image of size 115304 bytes
2,896,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,338 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,947 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,833 >>> mbox cmd response: success
3,002,737 UART:
3,002,753 UART: Running Caliptra FMC ...
3,003,161 UART:
3,003,215 UART: [state] CFI Enabled
3,013,494 UART: [fht] FMC Alias Private Key: 7
3,121,219 UART: [art] Extend RT PCRs Done
3,121,647 UART: [art] Lock RT PCRs Done
3,123,423 UART: [art] Populate DV Done
3,131,514 UART: [fht] FMC Alias Private Key: 7
3,132,664 UART: [art] Derive CDI
3,132,944 UART: [art] Store in in slot 0x4
3,219,027 UART: [art] Derive Key Pair
3,219,387 UART: [art] Store priv key in slot 0x5
3,233,039 UART: [art] Derive Key Pair - Done
3,247,936 UART: [art] Signing Cert with AUTHO
3,248,416 UART: RITY.KEYID = 7
3,263,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,937 UART: [art] PUB.X = 4B8D08DBC5CB73A110872E4D331DBD82ADF697817A9F8EBE65413D23E2058D472973EB907C00B470ECC1B7F8FA9267D4
3,270,689 UART: [art] PUB.Y = FDED33652444AB663C45ACC291C5F2950DA33A4781CF584B8D084F4BE553834FDB15365EDF9A3115450F1BF9779E3418
3,277,634 UART: [art] SIG.R = 824DCF9157C1442030C430FFC90598C11B5FA8EB1B4D41F8F0D753FF1A1B7D3BFFE0A9E288578F60E8B57FF36DDC6240
3,284,415 UART: [art] SIG.S = 07DD5B945162410D1AC5E4B7ACC61A689A4DF0336592F825A641E69929BD1A205B176793BE118289C16A589A8C605CFF
3,307,766 UART: Caliptra RT
3,308,019 UART: [state] CFI Enabled
3,415,874 UART: [rt] RT listening for mailbox commands...
3,416,537 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,652 UART: [rt]cmd =0x46504c54, len=4
3,447,827 >>> mbox cmd response data (8 bytes)
3,447,958 UART: [rt] FIPS self test
3,448,286 UART: [kat] ++
3,448,438 UART: [kat] sha1
3,449,266 UART: Fatal Error: 0x90060001
3,450,816 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,450,821 >>> mbox cmd response: failed
3,450,821 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,450,826 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,187 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,875 UART: [state] LifecycleState = Unprovisioned
85,530 UART: [state] DebugLocked = No
86,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,834 UART: [kat] SHA2-256
881,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,880 UART: [kat] ++
886,032 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
894,899 UART: [kat] SHA2-512-ACC
896,800 UART: [kat] ECC-384
902,169 UART: [kat] HMAC-384Kdf
906,823 UART: [kat] LMS
1,475,019 UART: [kat] --
1,475,846 UART: [cold-reset] ++
1,476,172 UART: [fht] Storing FHT @ 0x50003400
1,478,905 UART: [idev] ++
1,479,073 UART: [idev] CDI.KEYID = 6
1,479,433 UART: [idev] SUBJECT.KEYID = 7
1,479,857 UART: [idev] UDS.KEYID = 0
1,480,202 ready_for_fw is high
1,480,202 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,921 UART: [idev] Erasing UDS.KEYID = 0
1,505,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,535 UART: [idev] --
1,514,656 UART: [ldev] ++
1,514,824 UART: [ldev] CDI.KEYID = 6
1,515,187 UART: [ldev] SUBJECT.KEYID = 5
1,515,613 UART: [ldev] AUTHORITY.KEYID = 7
1,516,076 UART: [ldev] FE.KEYID = 1
1,521,290 UART: [ldev] Erasing FE.KEYID = 1
1,546,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,479 UART: [ldev] --
1,585,824 UART: [fwproc] Waiting for Commands...
1,586,511 UART: [fwproc] Received command 0x46574c44
1,587,302 UART: [fwproc] Received Image of size 115304 bytes
2,896,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,463 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,028 >>> mbox cmd response: success
3,092,120 UART: [afmc] ++
3,092,288 UART: [afmc] CDI.KEYID = 6
3,092,650 UART: [afmc] SUBJECT.KEYID = 7
3,093,075 UART: [afmc] AUTHORITY.KEYID = 5
3,128,120 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,575 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,265 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,364 UART: [afmc] --
3,171,346 UART: [cold-reset] --
3,172,102 UART: [state] Locking Datavault
3,173,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,029 UART: [state] Locking ICCM
3,174,677 UART: [exit] Launching FMC @ 0x40000130
3,180,006 UART:
3,180,022 UART: Running Caliptra FMC ...
3,180,430 UART:
3,180,573 UART: [state] CFI Enabled
3,191,016 UART: [fht] FMC Alias Private Key: 7
3,299,249 UART: [art] Extend RT PCRs Done
3,299,677 UART: [art] Lock RT PCRs Done
3,301,439 UART: [art] Populate DV Done
3,309,496 UART: [fht] FMC Alias Private Key: 7
3,310,632 UART: [art] Derive CDI
3,310,912 UART: [art] Store in in slot 0x4
3,396,541 UART: [art] Derive Key Pair
3,396,901 UART: [art] Store priv key in slot 0x5
3,410,077 UART: [art] Derive Key Pair - Done
3,424,862 UART: [art] Signing Cert with AUTHO
3,425,342 UART: RITY.KEYID = 7
3,440,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,509 UART: [art] PUB.X = CDAB72914EF4C9F1CA0D73CFF29A8BAB3ACEC762338F846C0193D70E8A8778D8A88A5B8B36983C6BAEBC1054A03A860C
3,448,287 UART: [art] PUB.Y = 0B604AB1997E19986B197E4B9B0CBAFCE432A391B3B88EA2B4CE5E7CC0C205A4B2AD947BB20ECED03D3E241F1F3A260C
3,455,244 UART: [art] SIG.R = 0059A0E850BF95D00AEBD3453727C64516925B15761C0E31D965EE9DBA1C47BE5A5D19E60C5F4332252ADF7DA871A17F
3,461,989 UART: [art] SIG.S = 895F90E18C789888405B022CA973BBF2D71290C6CF08C475F78D11D27056040147337E9A2EE750887702B0F482D5EFAA
3,485,693 UART: Caliptra RT
3,486,038 UART: [state] CFI Enabled
3,594,167 UART: [rt] RT listening for mailbox commands...
3,594,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,867 UART: [rt]cmd =0x46504c54, len=4
3,626,078 >>> mbox cmd response data (8 bytes)
3,626,297 UART: [rt] FIPS self test
3,626,625 UART: [kat] ++
3,626,777 UART: [kat] sha1
3,627,481 UART: Fatal Error: 0x90060001
3,629,031 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,629,036 >>> mbox cmd response: failed
3,629,036 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,629,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,497 UART: [kat] LMS
1,475,693 UART: [kat] --
1,476,626 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,400 UART: [ldev] ++
1,515,568 UART: [ldev] CDI.KEYID = 6
1,515,931 UART: [ldev] SUBJECT.KEYID = 5
1,516,357 UART: [ldev] AUTHORITY.KEYID = 7
1,516,820 UART: [ldev] FE.KEYID = 1
1,522,036 UART: [ldev] Erasing FE.KEYID = 1
1,547,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,950 UART: [fwproc] Waiting for Commands...
1,587,643 UART: [fwproc] Received command 0x46574c44
1,588,434 UART: [fwproc] Received Image of size 115304 bytes
2,898,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,647 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,999 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,328 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,634 ready_for_fw is high
1,362,634 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,426 >>> mbox cmd response: success
3,003,304 UART:
3,003,320 UART: Running Caliptra FMC ...
3,003,728 UART:
3,003,871 UART: [state] CFI Enabled
3,014,222 UART: [fht] FMC Alias Private Key: 7
3,122,597 UART: [art] Extend RT PCRs Done
3,123,025 UART: [art] Lock RT PCRs Done
3,124,523 UART: [art] Populate DV Done
3,133,018 UART: [fht] FMC Alias Private Key: 7
3,134,112 UART: [art] Derive CDI
3,134,392 UART: [art] Store in in slot 0x4
3,219,957 UART: [art] Derive Key Pair
3,220,317 UART: [art] Store priv key in slot 0x5
3,233,585 UART: [art] Derive Key Pair - Done
3,248,473 UART: [art] Signing Cert with AUTHO
3,248,953 UART: RITY.KEYID = 7
3,263,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,306 UART: [art] PUB.X = 71CC9E05A9CE1E5876AC58E65037FC71F48F28A140AB63A322A1451D80510EE322D5E61946E22ECD717CCC8327BE9436
3,271,074 UART: [art] PUB.Y = B3FB5183F3E0DD453F8C9386AA279D6E811AF83BE42BE517B9A2F71A44985CE934C7B980A1E3E1B96D30A7D2F4D00EB6
3,278,035 UART: [art] SIG.R = 7D3FDA1EAEA4FE909949413D4FD32C0D796D8B405B52BC3703CFBEFE8382739E12DCCDBF69C31B596EA540390897D712
3,284,810 UART: [art] SIG.S = D0C710BAFA4CEF853F269282650665A8FAD26C9C784BAC86E1368001B2B081A412943AED2F19EEDDD5D3C4D278DDE744
3,308,985 UART: Caliptra RT
3,309,330 UART: [state] CFI Enabled
3,418,019 UART: [rt] RT listening for mailbox commands...
3,418,682 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,469 UART: [rt]cmd =0x46504c54, len=4
3,449,734 >>> mbox cmd response data (8 bytes)
3,449,907 UART: [rt] FIPS self test
3,450,235 UART: [kat] ++
3,450,387 UART: [kat] sha1
3,451,015 UART: Fatal Error: 0x90060001
3,452,565 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,452,570 >>> mbox cmd response: failed
3,452,570 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,452,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,522 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
892,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,939 UART: [kat] ++
897,091 UART: [kat] sha1
901,373 UART: [kat] SHA2-256
903,313 UART: [kat] SHA2-384
906,128 UART: [kat] SHA2-512-ACC
908,029 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,439 UART: [cold-reset] ++
1,171,873 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,372 UART: [idev] UDS.KEYID = 0
1,175,717 ready_for_fw is high
1,175,717 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,925 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,998 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,283,128 UART: [fwproc] Recv command 0x46574c44
1,283,856 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,739 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,992 >>> mbox cmd response: success
2,787,122 UART: [afmc] ++
2,787,290 UART: [afmc] CDI.KEYID = 6
2,787,652 UART: [afmc] SUBJECT.KEYID = 7
2,788,077 UART: [afmc] AUTHORITY.KEYID = 5
2,822,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,875 UART: [afmc] --
2,866,843 UART: [cold-reset] --
2,867,857 UART: [state] Locking Datavault
2,868,868 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,472 UART: [state] Locking ICCM
2,869,892 UART: [exit] Launching FMC @ 0x40000130
2,875,221 UART:
2,875,237 UART: Running Caliptra FMC ...
2,875,645 UART:
2,875,699 UART: [state] CFI Enabled
2,886,182 UART: [fht] FMC Alias Private Key: 7
2,994,207 UART: [art] Extend RT PCRs Done
2,994,635 UART: [art] Lock RT PCRs Done
2,996,223 UART: [art] Populate DV Done
3,004,312 UART: [fht] FMC Alias Private Key: 7
3,005,424 UART: [art] Derive CDI
3,005,704 UART: [art] Store in in slot 0x4
3,091,615 UART: [art] Derive Key Pair
3,091,975 UART: [art] Store priv key in slot 0x5
3,104,991 UART: [art] Derive Key Pair - Done
3,120,207 UART: [art] Signing Cert with AUTHO
3,120,687 UART: RITY.KEYID = 7
3,136,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,772 UART: [art] PUB.X = 620E69C6A969D9915F0FCC50A669EF338816EDB7D8652E761E0DBB4CBA3FDE9936E1765BC341C3B0E189869B109E2258
3,143,539 UART: [art] PUB.Y = 0406C84D7B81320F11E5BB3F406CC51B82E6B9FCCD8D47CEFCD514057D81A4F061CD5691ED67C575CBE3B7DAEF90DE9B
3,150,499 UART: [art] SIG.R = EE8D9168EE8B88E45D465142EE9C7C4577CD008DD72B562D0153A540F4EE44696C44D4694B549867B1069A2D56921420
3,157,235 UART: [art] SIG.S = 63798D225BF16ACC9A18FB8FD46512CBDC44078339FDE8332DD5FA07E9F447CB8651FC9DBF465F64648C3F8DF2E1FAB0
3,180,624 UART: Caliptra RT
3,180,877 UART: [state] CFI Enabled
3,288,922 UART: [rt] RT listening for mailbox commands...
3,289,585 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,532 UART: [rt]cmd =0x46504c54, len=4
3,320,813 >>> mbox cmd response data (8 bytes)
3,321,002 UART: [rt] FIPS self test
3,321,330 UART: [kat] ++
3,321,482 UART: [kat] sha1
3,322,356 UART: Fatal Error: 0x90060001
3,323,906 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,323,911 >>> mbox cmd response: failed
3,323,911 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,323,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
893,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,829 UART: [kat] ++
897,981 UART: [kat] sha1
902,251 UART: [kat] SHA2-256
904,191 UART: [kat] SHA2-384
907,050 UART: [kat] SHA2-512-ACC
908,951 UART: [kat] ECC-384
918,704 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,371 UART: [cold-reset] ++
1,172,851 UART: [fht] FHT @ 0x50003400
1,175,562 UART: [idev] ++
1,175,730 UART: [idev] CDI.KEYID = 6
1,176,090 UART: [idev] SUBJECT.KEYID = 7
1,176,514 UART: [idev] UDS.KEYID = 0
1,176,859 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,814 UART: [idev] Erasing UDS.KEYID = 0
1,202,103 UART: [idev] Sha1 KeyId Algorithm
1,210,533 UART: [idev] --
1,211,465 UART: [ldev] ++
1,211,633 UART: [ldev] CDI.KEYID = 6
1,211,996 UART: [ldev] SUBJECT.KEYID = 5
1,212,422 UART: [ldev] AUTHORITY.KEYID = 7
1,212,885 UART: [ldev] FE.KEYID = 1
1,218,017 UART: [ldev] Erasing FE.KEYID = 1
1,244,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,537 UART: [ldev] --
1,283,932 UART: [fwproc] Wait for Commands...
1,284,588 UART: [fwproc] Recv command 0x46574c44
1,285,316 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,561 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,804 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,919 >>> mbox cmd response: success
2,700,067 UART:
2,700,083 UART: Running Caliptra FMC ...
2,700,491 UART:
2,700,545 UART: [state] CFI Enabled
2,711,190 UART: [fht] FMC Alias Private Key: 7
2,818,969 UART: [art] Extend RT PCRs Done
2,819,397 UART: [art] Lock RT PCRs Done
2,821,063 UART: [art] Populate DV Done
2,829,426 UART: [fht] FMC Alias Private Key: 7
2,830,380 UART: [art] Derive CDI
2,830,660 UART: [art] Store in in slot 0x4
2,916,531 UART: [art] Derive Key Pair
2,916,891 UART: [art] Store priv key in slot 0x5
2,929,863 UART: [art] Derive Key Pair - Done
2,944,694 UART: [art] Signing Cert with AUTHO
2,945,174 UART: RITY.KEYID = 7
2,960,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,021 UART: [art] PUB.X = C992A6B6FBAF5EF25E2B451B9EC9C889B840376BA782783DCC3E2A6EAC0905228E9ADE1DFB54DD209DBA52383AD26DF4
2,967,807 UART: [art] PUB.Y = B1D5FAB2FDB5ED939D130E23590F6E7773BEA90B88812653B77DAC0B066B11AD50AFED575EB1881053DAB0D300EF5DFD
2,974,740 UART: [art] SIG.R = 940AA73833E48653E07403D113171769354D6B3B7097DCCAF33C960D7201A063BE7EA1C634C545373F5FB8952481C27A
2,981,490 UART: [art] SIG.S = D8BEAC64F4920998CF2595B8BB41A1850EA1796467B8885A92DF51D7FB2E86D80E30863D1A52995B263EE9A23E162389
3,005,730 UART: Caliptra RT
3,005,983 UART: [state] CFI Enabled
3,114,939 UART: [rt] RT listening for mailbox commands...
3,115,602 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,333 UART: [rt]cmd =0x46504c54, len=4
3,146,532 >>> mbox cmd response data (8 bytes)
3,146,761 UART: [rt] FIPS self test
3,147,089 UART: [kat] ++
3,147,241 UART: [kat] sha1
3,147,863 UART: Fatal Error: 0x90060001
3,149,413 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,418 >>> mbox cmd response: failed
3,149,418 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,361 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
893,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,914 UART: [kat] ++
898,066 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,602 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 ready_for_fw is high
1,176,574 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,384 UART: [idev] Sha1 KeyId Algorithm
1,209,920 UART: [idev] --
1,210,928 UART: [ldev] ++
1,211,096 UART: [ldev] CDI.KEYID = 6
1,211,459 UART: [ldev] SUBJECT.KEYID = 5
1,211,885 UART: [ldev] AUTHORITY.KEYID = 7
1,212,348 UART: [ldev] FE.KEYID = 1
1,217,766 UART: [ldev] Erasing FE.KEYID = 1
1,244,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,366 UART: [ldev] --
1,283,821 UART: [fwproc] Wait for Commands...
1,284,645 UART: [fwproc] Recv command 0x46574c44
1,285,373 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,653,254 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,481 >>> mbox cmd response: success
2,791,601 UART: [afmc] ++
2,791,769 UART: [afmc] CDI.KEYID = 6
2,792,131 UART: [afmc] SUBJECT.KEYID = 7
2,792,556 UART: [afmc] AUTHORITY.KEYID = 5
2,827,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,844,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,845,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,856,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,862,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,870,074 UART: [afmc] --
2,871,092 UART: [cold-reset] --
2,871,884 UART: [state] Locking Datavault
2,872,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,559 UART: [state] Locking ICCM
2,874,175 UART: [exit] Launching FMC @ 0x40000130
2,879,504 UART:
2,879,520 UART: Running Caliptra FMC ...
2,879,928 UART:
2,880,071 UART: [state] CFI Enabled
2,890,606 UART: [fht] FMC Alias Private Key: 7
2,999,535 UART: [art] Extend RT PCRs Done
2,999,963 UART: [art] Lock RT PCRs Done
3,001,559 UART: [art] Populate DV Done
3,009,896 UART: [fht] FMC Alias Private Key: 7
3,010,824 UART: [art] Derive CDI
3,011,104 UART: [art] Store in in slot 0x4
3,097,087 UART: [art] Derive Key Pair
3,097,447 UART: [art] Store priv key in slot 0x5
3,110,901 UART: [art] Derive Key Pair - Done
3,125,983 UART: [art] Signing Cert with AUTHO
3,126,463 UART: RITY.KEYID = 7
3,141,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,142,362 UART: [art] PUB.X = 3AEFA2372549F4AA61BE6676314A059568DD8C61B98CAF4C926EEC57788D65ABB966D8C6B8342D7165A84F6EF8C23293
3,149,135 UART: [art] PUB.Y = 286C177A54A242787072A8DA3529216D8C833231C9FE79FEEF714DC6ECBEC0E412E63F5A6D16C7EB40E94DE0CD950D16
3,156,092 UART: [art] SIG.R = 59A20ACC8B1F344C6FD59BB966B392DC7EFDC2987DF850A53CD5E6DF0E8377F51444FDF7935C178A187ABCFB7C5DB8B8
3,162,878 UART: [art] SIG.S = F029AE87403AC10BA41488FE1A66E3DDCB9208550C16E990FF8FFDAECCBA7D01298B5215FBEC3346108766AC7BD43504
3,186,568 UART: Caliptra RT
3,186,913 UART: [state] CFI Enabled
3,294,782 UART: [rt] RT listening for mailbox commands...
3,295,445 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,228 UART: [rt]cmd =0x46504c54, len=4
3,326,287 >>> mbox cmd response data (8 bytes)
3,326,404 UART: [rt] FIPS self test
3,326,732 UART: [kat] ++
3,326,884 UART: [kat] sha1
3,327,554 UART: Fatal Error: 0x90060001
3,329,104 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,109 >>> mbox cmd response: failed
3,329,109 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,316 UART: [kat] SHA2-256
904,256 UART: [kat] SHA2-384
907,061 UART: [kat] SHA2-512-ACC
908,962 UART: [kat] ECC-384
918,773 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,770 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,175,999 UART: [idev] ++
1,176,167 UART: [idev] CDI.KEYID = 6
1,176,527 UART: [idev] SUBJECT.KEYID = 7
1,176,951 UART: [idev] UDS.KEYID = 0
1,177,296 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,039 UART: [idev] Erasing UDS.KEYID = 0
1,202,256 UART: [idev] Sha1 KeyId Algorithm
1,210,708 UART: [idev] --
1,211,586 UART: [ldev] ++
1,211,754 UART: [ldev] CDI.KEYID = 6
1,212,117 UART: [ldev] SUBJECT.KEYID = 5
1,212,543 UART: [ldev] AUTHORITY.KEYID = 7
1,213,006 UART: [ldev] FE.KEYID = 1
1,218,302 UART: [ldev] Erasing FE.KEYID = 1
1,244,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,998 UART: [ldev] --
1,284,459 UART: [fwproc] Wait for Commands...
1,285,203 UART: [fwproc] Recv command 0x46574c44
1,285,931 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,246 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,461 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,994 ready_for_fw is high
1,059,994 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,666 >>> mbox cmd response: success
2,702,028 UART:
2,702,044 UART: Running Caliptra FMC ...
2,702,452 UART:
2,702,595 UART: [state] CFI Enabled
2,713,268 UART: [fht] FMC Alias Private Key: 7
2,821,581 UART: [art] Extend RT PCRs Done
2,822,009 UART: [art] Lock RT PCRs Done
2,823,613 UART: [art] Populate DV Done
2,831,616 UART: [fht] FMC Alias Private Key: 7
2,832,798 UART: [art] Derive CDI
2,833,078 UART: [art] Store in in slot 0x4
2,918,847 UART: [art] Derive Key Pair
2,919,207 UART: [art] Store priv key in slot 0x5
2,932,435 UART: [art] Derive Key Pair - Done
2,947,260 UART: [art] Signing Cert with AUTHO
2,947,740 UART: RITY.KEYID = 7
2,963,010 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,775 UART: [art] PUB.X = 01DBF35DEAED6E5C5D97359D8916DFCF3E8B28C79DFC21DD049B1CEDFD846C4E420A09E135B07CB3DC52FFB61EA2ECEA
2,970,567 UART: [art] PUB.Y = 85C56887BE6915806F25AF34F340E02D789D3E0E864373B6509836767F1EE64173470DA48FD84732784BF3B29B6A1D22
2,977,501 UART: [art] SIG.R = 42063ABCEA5F6F4172D9FF459AD9A782167E92FC86BED9A96B380B15D521BFA6D9DFA8BB5A9F3A1635D324B7DDEC4C9E
2,984,289 UART: [art] SIG.S = 66A9BF9BB2973C51173609C2966907A28910A80BF5387B00CB740EA0A184B4488D4F00B1A0FCD75D63F2B4990C0D1AD0
3,007,834 UART: Caliptra RT
3,008,179 UART: [state] CFI Enabled
3,116,264 UART: [rt] RT listening for mailbox commands...
3,116,927 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,468 UART: [rt]cmd =0x46504c54, len=4
3,147,797 >>> mbox cmd response data (8 bytes)
3,148,082 UART: [rt] FIPS self test
3,148,410 UART: [kat] ++
3,148,562 UART: [kat] sha1
3,149,174 UART: Fatal Error: 0x90060001
3,150,724 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,729 >>> mbox cmd response: failed
3,150,729 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,888 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,171 UART: [idev] Sha1 KeyId Algorithm
1,207,121 UART: [idev] --
1,208,098 UART: [ldev] ++
1,208,266 UART: [ldev] CDI.KEYID = 6
1,208,630 UART: [ldev] SUBJECT.KEYID = 5
1,209,057 UART: [ldev] AUTHORITY.KEYID = 7
1,209,520 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,240,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,216 UART: [fwproc] Wait for Commands...
1,280,847 UART: [fwproc] Recv command 0x46574c44
1,281,580 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,418 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,800 >>> mbox cmd response: success
2,787,057 UART: [afmc] ++
2,787,225 UART: [afmc] CDI.KEYID = 6
2,787,588 UART: [afmc] SUBJECT.KEYID = 7
2,788,014 UART: [afmc] AUTHORITY.KEYID = 5
2,823,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,508 UART: [afmc] --
2,866,564 UART: [cold-reset] --
2,867,484 UART: [state] Locking Datavault
2,868,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,325 UART: [state] Locking ICCM
2,869,813 UART: [exit] Launching FMC @ 0x40000130
2,875,142 UART:
2,875,158 UART: Running Caliptra FMC ...
2,875,566 UART:
2,875,620 UART: [state] CFI Enabled
2,885,865 UART: [fht] FMC Alias Private Key: 7
2,994,294 UART: [art] Extend RT PCRs Done
2,994,722 UART: [art] Lock RT PCRs Done
2,996,444 UART: [art] Populate DV Done
3,004,707 UART: [fht] FMC Alias Private Key: 7
3,005,773 UART: [art] Derive CDI
3,006,053 UART: [art] Store in in slot 0x4
3,091,380 UART: [art] Derive Key Pair
3,091,740 UART: [art] Store priv key in slot 0x5
3,105,294 UART: [art] Derive Key Pair - Done
3,119,921 UART: [art] Signing Cert with AUTHO
3,120,401 UART: RITY.KEYID = 7
3,135,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,042 UART: [art] PUB.X = 9DB6DDB018A2A732B8EF7A2767D295FC46B23DC70FA8CDB66B95BC97954344DA745E6CBD59189AF7D6D711405B3E02ED
3,142,822 UART: [art] PUB.Y = 05667AD7A01F9C169D1502FB4E62FA8DA7FA31C413781DB8829863E43361BDC9141E210BCCB1D5166E94576A508DF981
3,149,765 UART: [art] SIG.R = 1B083C22AC8F433EB68B023A33546E71B75815210BFF344709ABEC813DF488AAB13DEFD5CAE3C31FD697E923B3C59B69
3,156,535 UART: [art] SIG.S = F05A520D6DF68E68928E9A045CCB98730B89570795828B99930F853C2AF1A0BB481E9887EAFF343BA0B724233CB6F60B
3,180,282 UART: Caliptra RT
3,180,535 UART: [state] CFI Enabled
3,287,918 UART: [rt] RT listening for mailbox commands...
3,288,581 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,432 UART: [rt]cmd =0x46504c54, len=4
3,319,497 >>> mbox cmd response data (8 bytes)
3,319,734 UART: [rt] FIPS self test
3,320,062 UART: [kat] ++
3,320,214 UART: [kat] sha1
3,321,146 UART: Fatal Error: 0x90060001
3,322,696 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,322,701 >>> mbox cmd response: failed
3,322,701 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,322,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,541 UART: [idev] ++
1,173,709 UART: [idev] CDI.KEYID = 6
1,174,070 UART: [idev] SUBJECT.KEYID = 7
1,174,495 UART: [idev] UDS.KEYID = 0
1,174,841 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,903 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,468 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,637 UART: [fwproc] Recv command 0x46574c44
1,283,370 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,752 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,082 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,666 ready_for_fw is high
1,056,666 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,728 >>> mbox cmd response: success
2,697,702 UART:
2,697,718 UART: Running Caliptra FMC ...
2,698,126 UART:
2,698,180 UART: [state] CFI Enabled
2,708,529 UART: [fht] FMC Alias Private Key: 7
2,816,988 UART: [art] Extend RT PCRs Done
2,817,416 UART: [art] Lock RT PCRs Done
2,818,656 UART: [art] Populate DV Done
2,826,947 UART: [fht] FMC Alias Private Key: 7
2,828,073 UART: [art] Derive CDI
2,828,353 UART: [art] Store in in slot 0x4
2,913,948 UART: [art] Derive Key Pair
2,914,308 UART: [art] Store priv key in slot 0x5
2,927,778 UART: [art] Derive Key Pair - Done
2,942,384 UART: [art] Signing Cert with AUTHO
2,942,864 UART: RITY.KEYID = 7
2,958,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,971 UART: [art] PUB.X = 69EC42C7DADE8DBB5FBB256C80DB29E4F435A08438DCD40285F75A5B771D550236AFE75213DABFFA88FAA1EE0C8C65B2
2,965,756 UART: [art] PUB.Y = 5C7D5D09218B41F02C14302C8807D5CCB7CC8F5A1C73EB5DDA37E3C0A32096BDECECEB35D1952B2F0BCAA351A102D133
2,972,714 UART: [art] SIG.R = 4952076179B901884DDF6605B53BDE12269C332CC6F18F7241492C5CC77023D0BEF0C79295CD514964D0BC87D6F73702
2,979,466 UART: [art] SIG.S = AF23F26CF32D931126FDFF03FF02E7395FD03FA2230654BA6F567742D32BA9E3B758DF78D417C02CF844F8D464FBD6F3
3,002,308 UART: Caliptra RT
3,002,561 UART: [state] CFI Enabled
3,110,112 UART: [rt] RT listening for mailbox commands...
3,110,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,726 UART: [rt]cmd =0x46504c54, len=4
3,142,055 >>> mbox cmd response data (8 bytes)
3,142,298 UART: [rt] FIPS self test
3,142,626 UART: [kat] ++
3,142,778 UART: [kat] sha1
3,143,622 UART: Fatal Error: 0x90060001
3,145,172 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,145,177 >>> mbox cmd response: failed
3,145,177 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,145,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,160 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,594 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 ready_for_fw is high
1,174,526 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,483 UART: [fwproc] Wait for Commands...
1,282,308 UART: [fwproc] Recv command 0x46574c44
1,283,041 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,109 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,507 >>> mbox cmd response: success
2,788,706 UART: [afmc] ++
2,788,874 UART: [afmc] CDI.KEYID = 6
2,789,237 UART: [afmc] SUBJECT.KEYID = 7
2,789,663 UART: [afmc] AUTHORITY.KEYID = 5
2,825,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,138 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,021 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,521 UART: [afmc] --
2,868,545 UART: [cold-reset] --
2,869,459 UART: [state] Locking Datavault
2,870,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,298 UART: [state] Locking ICCM
2,871,850 UART: [exit] Launching FMC @ 0x40000130
2,877,179 UART:
2,877,195 UART: Running Caliptra FMC ...
2,877,603 UART:
2,877,746 UART: [state] CFI Enabled
2,888,373 UART: [fht] FMC Alias Private Key: 7
2,996,068 UART: [art] Extend RT PCRs Done
2,996,496 UART: [art] Lock RT PCRs Done
2,998,190 UART: [art] Populate DV Done
3,006,425 UART: [fht] FMC Alias Private Key: 7
3,007,573 UART: [art] Derive CDI
3,007,853 UART: [art] Store in in slot 0x4
3,093,284 UART: [art] Derive Key Pair
3,093,644 UART: [art] Store priv key in slot 0x5
3,106,828 UART: [art] Derive Key Pair - Done
3,121,641 UART: [art] Signing Cert with AUTHO
3,122,121 UART: RITY.KEYID = 7
3,137,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,526 UART: [art] PUB.X = EE2F1135DF8C427C17B5674C38C8BD423EE12F6ADF5AC35F28ED3AE3540C0F225FCA0744419850D15F71B597ECA8CDEA
3,145,305 UART: [art] PUB.Y = 45BAB4E1C71106DD670F173D6EB87E65C10335BE840F3711E98C83CB5E68FE92DB79AA9E9734D509AC5D8D997E4143F3
3,152,248 UART: [art] SIG.R = 775069884BB599BEEF23245F915DBA81E099FFE16638368109E9BEFF0BCCACECD0EE17B309D24B4A3170ECCF2010502C
3,159,023 UART: [art] SIG.S = 7605BE1A22942949D00F3E0285C99E4D3E4EA8B13D1676ED23FFD6B498A276293937F82183B88004039FBE621C18A811
3,183,031 UART: Caliptra RT
3,183,376 UART: [state] CFI Enabled
3,290,563 UART: [rt] RT listening for mailbox commands...
3,291,226 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,313 UART: [rt]cmd =0x46504c54, len=4
3,322,634 >>> mbox cmd response data (8 bytes)
3,322,789 UART: [rt] FIPS self test
3,323,117 UART: [kat] ++
3,323,269 UART: [kat] sha1
3,323,979 UART: Fatal Error: 0x90060001
3,325,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,534 >>> mbox cmd response: failed
3,325,534 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,693 UART: [kat] LMS
1,169,005 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,198,438 UART: [idev] Sha1 KeyId Algorithm
1,207,168 UART: [idev] --
1,208,205 UART: [ldev] ++
1,208,373 UART: [ldev] CDI.KEYID = 6
1,208,737 UART: [ldev] SUBJECT.KEYID = 5
1,209,164 UART: [ldev] AUTHORITY.KEYID = 7
1,209,627 UART: [ldev] FE.KEYID = 1
1,214,841 UART: [ldev] Erasing FE.KEYID = 1
1,241,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,015 UART: [ldev] --
1,280,463 UART: [fwproc] Wait for Commands...
1,281,204 UART: [fwproc] Recv command 0x46574c44
1,281,937 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,613 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,833 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,125 ready_for_fw is high
1,056,125 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,535 >>> mbox cmd response: success
2,699,083 UART:
2,699,099 UART: Running Caliptra FMC ...
2,699,507 UART:
2,699,650 UART: [state] CFI Enabled
2,710,329 UART: [fht] FMC Alias Private Key: 7
2,818,444 UART: [art] Extend RT PCRs Done
2,818,872 UART: [art] Lock RT PCRs Done
2,820,704 UART: [art] Populate DV Done
2,828,881 UART: [fht] FMC Alias Private Key: 7
2,829,967 UART: [art] Derive CDI
2,830,247 UART: [art] Store in in slot 0x4
2,916,180 UART: [art] Derive Key Pair
2,916,540 UART: [art] Store priv key in slot 0x5
2,930,508 UART: [art] Derive Key Pair - Done
2,945,239 UART: [art] Signing Cert with AUTHO
2,945,719 UART: RITY.KEYID = 7
2,960,889 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,654 UART: [art] PUB.X = 326079B3090E6D47228951E28862A48035A2BE24FCDB39B957EECAC6DA0DED727C80167CA5E9BC5730B77000AD997880
2,968,395 UART: [art] PUB.Y = FBF63809CDD4AC944C767FDABF74D2CD25468DD05856247F7519B055D8DDFD829508193AF0F02500A078284672CBA153
2,975,321 UART: [art] SIG.R = AE11118A6C1CA4651AC406922C7F31F4163FBEE995E13FCD71C8A653C36D16205E5EE02C6FFE94869A9600384204D4D8
2,982,067 UART: [art] SIG.S = 1F764312DA3ED5CA7E3F13B966D6F3283862CE9C335DC45C216544F9648C59DB9F1426F348453ED95AC66558B1670E77
3,005,517 UART: Caliptra RT
3,005,862 UART: [state] CFI Enabled
3,113,703 UART: [rt] RT listening for mailbox commands...
3,114,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,953 UART: [rt]cmd =0x46504c54, len=4
3,145,086 >>> mbox cmd response data (8 bytes)
3,145,233 UART: [rt] FIPS self test
3,145,561 UART: [kat] ++
3,145,713 UART: [kat] sha1
3,146,559 UART: Fatal Error: 0x90060001
3,148,109 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,148,114 >>> mbox cmd response: failed
3,148,114 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,148,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,809 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,557 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,675,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,820,228 >>> mbox cmd response: failed
2,820,781 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,964,115 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
4,872,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,456,970 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,688,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,832,616 >>> mbox cmd response: failed
2,833,196 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,976,525 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
4,863,868 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,445,523 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,403 writing to cptra_bootfsm_go
3,031,281 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,175,469 >>> mbox cmd response: failed
3,176,034 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,319,226 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
21,582,329 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,012,201 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,039,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,183,627 >>> mbox cmd response: failed
3,184,209 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,327,414 >>> mbox cmd response: failed
Initializing fuses
1,152 writing to cptra_bootfsm_go
21,582,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,016,037 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,690,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,834,728 >>> mbox cmd response: failed
2,835,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,979,008 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,444,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,300,105 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,686,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,831,548 >>> mbox cmd response: failed
2,832,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,975,916 >>> mbox cmd response: failed
Initializing fuses
1,010 writing to cptra_bootfsm_go
3,435,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,254,223 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,045,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,189,905 >>> mbox cmd response: failed
3,190,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,334,208 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,184,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,908,138 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,494 writing to cptra_bootfsm_go
3,047,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,192,234 >>> mbox cmd response: failed
3,192,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,336,650 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
20,181,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,911,741 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,685,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,830,009 >>> mbox cmd response: failed
2,830,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,974,320 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,465,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,307,165 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,688,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,833,405 >>> mbox cmd response: failed
2,833,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,977,738 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,442,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,302,993 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,573 writing to cptra_bootfsm_go
3,050,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,004 >>> mbox cmd response: failed
3,195,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,339,305 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,174,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,891,787 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,049,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,193,807 >>> mbox cmd response: failed
3,194,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,603 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
20,191,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,911,909 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,923 >>> mbox cmd response: failed
806,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,620 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,447 >>> mbox cmd response: failed
807,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,118 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,804 >>> mbox cmd response: failed
807,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,651,201 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,492 >>> mbox cmd response: failed
807,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,427 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,983 >>> mbox cmd response: failed
806,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,662 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,735 >>> mbox cmd response: failed
807,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,594 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,780 >>> mbox cmd response: failed
807,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,329 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,410 >>> mbox cmd response: failed
807,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,469 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,377 >>> mbox cmd response: failed
807,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,274 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,425 >>> mbox cmd response: failed
807,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,420 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
808,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,056 >>> mbox cmd response: failed
808,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,981 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,440 >>> mbox cmd response: failed
807,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,761 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,182 UART:
192,551 UART: Running Caliptra ROM ...
193,745 UART:
193,899 UART: [state] CFI Enabled
264,685 UART: [state] LifecycleState = Unprovisioned
266,680 UART: [state] DebugLocked = No
268,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,542 UART: [kat] SHA2-256
442,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,776 UART: [kat] ++
453,222 UART: [kat] sha1
464,735 UART: [kat] SHA2-256
467,470 UART: [kat] SHA2-384
473,960 UART: [kat] SHA2-512-ACC
476,331 UART: [kat] ECC-384
2,768,724 UART: [kat] HMAC-384Kdf
2,779,777 UART: [kat] LMS
3,970,016 UART: [kat] --
3,976,473 UART: [cold-reset] ++
3,978,702 UART: [fht] Storing FHT @ 0x50003400
3,991,329 UART: [idev] ++
3,991,900 UART: [idev] CDI.KEYID = 6
3,992,830 UART: [idev] SUBJECT.KEYID = 7
3,994,076 UART: [idev] UDS.KEYID = 0
3,995,072 ready_for_fw is high
3,995,304 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,140,026 UART: [idev] Erasing UDS.KEYID = 0
7,327,789 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,109 UART: [idev] --
7,351,753 UART: [ldev] ++
7,352,379 UART: [ldev] CDI.KEYID = 6
7,353,289 UART: [ldev] SUBJECT.KEYID = 5
7,354,505 UART: [ldev] AUTHORITY.KEYID = 7
7,355,790 UART: [ldev] FE.KEYID = 1
7,402,772 UART: [ldev] Erasing FE.KEYID = 1
10,731,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,771 UART: [ldev] --
13,094,663 UART: [fwproc] Waiting for Commands...
13,097,411 UART: [fwproc] Received command 0x46574c44
13,099,598 UART: [fwproc] Received Image of size 114996 bytes
17,163,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,627,403 >>> mbox cmd response: success
17,632,102 UART: [afmc] ++
17,632,754 UART: [afmc] CDI.KEYID = 6
17,633,667 UART: [afmc] SUBJECT.KEYID = 7
17,634,824 UART: [afmc] AUTHORITY.KEYID = 5
21,003,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,956 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,349 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,175 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,653 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,646 UART: [afmc] --
23,376,295 UART: [cold-reset] --
23,379,559 UART: [state] Locking Datavault
23,383,460 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,197 UART: [state] Locking ICCM
23,387,974 UART: [exit] Launching FMC @ 0x40000130
23,396,365 UART:
23,396,602 UART: Running Caliptra FMC ...
23,397,705 UART:
23,397,860 UART: [state] CFI Enabled
23,464,114 UART: [fht] FMC Alias Private Key: 7
25,802,537 UART: [art] Extend RT PCRs Done
25,803,767 UART: [art] Lock RT PCRs Done
25,805,206 UART: [art] Populate DV Done
25,810,370 UART: [fht] FMC Alias Private Key: 7
25,811,867 UART: [art] Derive CDI
25,812,629 UART: [art] Store in in slot 0x4
25,874,388 UART: [art] Derive Key Pair
25,875,432 UART: [art] Store priv key in slot 0x5
29,167,928 UART: [art] Derive Key Pair - Done
29,181,027 UART: [art] Signing Cert with AUTHO
29,182,328 UART: RITY.KEYID = 7
31,470,336 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,876 UART: [art] PUB.X = 1FCA443457FA9ED0FF13E557950D54A796347270E0CD0173180DC03CAAFE068C657868CFFEE8F6C38673429C1A9D2A46
31,479,072 UART: [art] PUB.Y = 45FB0052A5152AE36A0D653BA4EA25C460B03376CCBD8565792EF7155DB9BAF79E81A8E36EC847CA38A2FE2ED57266FC
31,486,366 UART: [art] SIG.R = 996209D4135B0EC853CE263516823087C8D8379BD75CB724687010DFA8DEF04F804C8F5A76F66562DA8A600E6354959D
31,493,717 UART: [art] SIG.S = 9A49EF4473B690E539508F25CDD8F20BFDB38632B4C554BAC9D8A539BC80F9F0F9972EB8B1FD71829C0554EE645060ED
32,798,302 UART: Caliptra RT
32,799,014 UART: [state] CFI Enabled
32,962,441 UART: [rt] RT listening for mailbox commands...
32,964,316 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,993,899 UART: [rt]cmd =0x46504c54, len=4
32,995,571 >>> mbox cmd response data (8 bytes)
32,996,506 UART: [rt] FIPS self test
32,997,450 UART: [kat] ++
32,997,903 UART: [kat] sha1
33,002,176 UART: Fatal Error: 0x90060002
33,037,395 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,181,820 >>> mbox cmd response: failed
33,182,471 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,326,832 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,105 UART:
190,392 UART: Running Caliptra ROM ...
191,440 UART:
191,602 UART: [state] CFI Enabled
254,616 UART: [state] LifecycleState = Unprovisioned
256,532 UART: [state] DebugLocked = No
259,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,731 UART: [kat] SHA2-256
433,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,910 UART: [kat] ++
444,413 UART: [kat] sha1
455,665 UART: [kat] SHA2-256
458,317 UART: [kat] SHA2-384
465,382 UART: [kat] SHA2-512-ACC
467,721 UART: [kat] ECC-384
2,758,105 UART: [kat] HMAC-384Kdf
2,771,474 UART: [kat] LMS
3,961,731 UART: [kat] --
3,967,246 UART: [cold-reset] ++
3,968,391 UART: [fht] Storing FHT @ 0x50003400
3,980,145 UART: [idev] ++
3,980,750 UART: [idev] CDI.KEYID = 6
3,981,668 UART: [idev] SUBJECT.KEYID = 7
3,982,938 UART: [idev] UDS.KEYID = 0
3,984,429 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,129,016 UART: [idev] Erasing UDS.KEYID = 0
7,318,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,654 UART: [idev] --
7,344,360 UART: [ldev] ++
7,345,000 UART: [ldev] CDI.KEYID = 6
7,345,918 UART: [ldev] SUBJECT.KEYID = 5
7,347,138 UART: [ldev] AUTHORITY.KEYID = 7
7,348,376 UART: [ldev] FE.KEYID = 1
7,394,187 UART: [ldev] Erasing FE.KEYID = 1
10,724,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,971 UART: [ldev] --
13,109,436 UART: [fwproc] Waiting for Commands...
13,111,425 UART: [fwproc] Received command 0x46574c44
13,113,612 UART: [fwproc] Received Image of size 114996 bytes
17,181,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,735 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,640,941 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,785,458 ready_for_fw is high
3,785,925 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,891,931 >>> mbox cmd response: success
23,586,368 UART:
23,586,769 UART: Running Caliptra FMC ...
23,587,984 UART:
23,588,155 UART: [state] CFI Enabled
23,655,610 UART: [fht] FMC Alias Private Key: 7
25,993,559 UART: [art] Extend RT PCRs Done
25,994,828 UART: [art] Lock RT PCRs Done
25,996,161 UART: [art] Populate DV Done
26,001,430 UART: [fht] FMC Alias Private Key: 7
26,003,088 UART: [art] Derive CDI
26,003,832 UART: [art] Store in in slot 0x4
26,064,304 UART: [art] Derive Key Pair
26,065,350 UART: [art] Store priv key in slot 0x5
29,357,892 UART: [art] Derive Key Pair - Done
29,370,945 UART: [art] Signing Cert with AUTHO
29,372,285 UART: RITY.KEYID = 7
31,660,399 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,926 UART: [art] PUB.X = B6A7314227FDFDBFCE7C2050BC31185D73E02F500B62682442FB6657ADE07BA769688D293D29D6D3228137666B4F9F02
31,669,146 UART: [art] PUB.Y = 545682D77E2BFACFF8CCA827BF179FD40D6312F0BDBB1B56FBDD96909534E46994CB4093F4774949FDB0188CA819B3A6
31,676,363 UART: [art] SIG.R = F391A183890B0A777B637A29E061311BC03915F0B7303E12FA9C5D94A5EBAF6C789A01AE827EA934C9C55A0377FA3407
31,683,770 UART: [art] SIG.S = F4A19946B0E095FA2DEF7E492AD89B6257B1E60D4C03CE33C606A3B76B280208109C23D4FAF345596099FBBC3F06288B
32,989,149 UART: Caliptra RT
32,989,865 UART: [state] CFI Enabled
33,151,564 UART: [rt] RT listening for mailbox commands...
33,153,418 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,182,931 UART: [rt]cmd =0x46504c54, len=4
33,184,568 >>> mbox cmd response data (8 bytes)
33,185,567 UART: [rt] FIPS self test
33,186,518 UART: [kat] ++
33,186,968 UART: [kat] sha1
33,191,212 UART: Fatal Error: 0x90060002
33,226,601 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,371,108 >>> mbox cmd response: failed
33,371,722 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,515,983 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,778,921 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,900,342 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,644 UART:
193,002 UART: Running Caliptra ROM ...
194,192 UART:
603,760 UART: [state] CFI Enabled
614,272 UART: [state] LifecycleState = Unprovisioned
616,247 UART: [state] DebugLocked = No
618,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,313 UART: [kat] SHA2-256
793,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,562 UART: [kat] ++
804,162 UART: [kat] sha1
814,972 UART: [kat] SHA2-256
817,705 UART: [kat] SHA2-384
823,061 UART: [kat] SHA2-512-ACC
825,455 UART: [kat] ECC-384
3,111,814 UART: [kat] HMAC-384Kdf
3,124,388 UART: [kat] LMS
4,314,438 UART: [kat] --
4,319,170 UART: [cold-reset] ++
4,320,541 UART: [fht] Storing FHT @ 0x50003400
4,332,169 UART: [idev] ++
4,332,736 UART: [idev] CDI.KEYID = 6
4,333,694 UART: [idev] SUBJECT.KEYID = 7
4,334,944 UART: [idev] UDS.KEYID = 0
4,335,869 ready_for_fw is high
4,336,083 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,645 UART: [idev] Erasing UDS.KEYID = 0
7,622,051 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,780 UART: [idev] --
7,647,134 UART: [ldev] ++
7,647,729 UART: [ldev] CDI.KEYID = 6
7,648,645 UART: [ldev] SUBJECT.KEYID = 5
7,649,861 UART: [ldev] AUTHORITY.KEYID = 7
7,651,095 UART: [ldev] FE.KEYID = 1
7,664,660 UART: [ldev] Erasing FE.KEYID = 1
10,956,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,245 UART: [ldev] --
13,314,460 UART: [fwproc] Waiting for Commands...
13,316,288 UART: [fwproc] Received command 0x46574c44
13,318,474 UART: [fwproc] Received Image of size 114996 bytes
17,385,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,849,022 >>> mbox cmd response: success
17,853,170 UART: [afmc] ++
17,853,764 UART: [afmc] CDI.KEYID = 6
17,854,728 UART: [afmc] SUBJECT.KEYID = 7
17,855,942 UART: [afmc] AUTHORITY.KEYID = 5
21,171,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,899 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,228 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,089 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,513 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,535,277 UART: [afmc] --
23,540,011 UART: [cold-reset] --
23,543,388 UART: [state] Locking Datavault
23,546,748 UART: [state] Locking PCR0, PCR1 and PCR31
23,548,468 UART: [state] Locking ICCM
23,549,632 UART: [exit] Launching FMC @ 0x40000130
23,558,025 UART:
23,558,261 UART: Running Caliptra FMC ...
23,559,291 UART:
23,559,435 UART: [state] CFI Enabled
23,567,862 UART: [fht] FMC Alias Private Key: 7
25,899,204 UART: [art] Extend RT PCRs Done
25,900,433 UART: [art] Lock RT PCRs Done
25,902,087 UART: [art] Populate DV Done
25,907,508 UART: [fht] FMC Alias Private Key: 7
25,909,044 UART: [art] Derive CDI
25,909,783 UART: [art] Store in in slot 0x4
25,952,863 UART: [art] Derive Key Pair
25,953,901 UART: [art] Store priv key in slot 0x5
29,195,891 UART: [art] Derive Key Pair - Done
29,208,809 UART: [art] Signing Cert with AUTHO
29,210,125 UART: RITY.KEYID = 7
31,489,502 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,028 UART: [art] PUB.X = E55AFE6B0058496B7B151BDB45D560BF7C29416C6963B8F80CAD716EF87908BB72537D1013FCD61583EB83BB7D7E770A
31,498,242 UART: [art] PUB.Y = CF6B73BA079DF0CC1B6AA7DB06CA9EA4018C3FF62DE9B7005C0AE779E746898C54C7C414E74C3178612E864F61D3F7C8
31,505,485 UART: [art] SIG.R = FA44456326964D53FD04C5D2A5AFDD64EB53F13E9A29F54F6CFB5EC412A0D20AA51B4ACC27E0F593EEF7573CDA01D62D
31,512,886 UART: [art] SIG.S = DFA9741EDD2F6A02BE3EDFFB7AD01E374B026D1F94D6477CC7B230C123BFDB16A7D0B5D2B643835E1947DF649596944A
32,817,717 UART: Caliptra RT
32,818,421 UART: [state] CFI Enabled
32,935,914 UART: [rt] RT listening for mailbox commands...
32,937,757 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,659 UART: [rt]cmd =0x46504c54, len=4
32,969,266 >>> mbox cmd response data (8 bytes)
32,970,282 UART: [rt] FIPS self test
32,971,223 UART: [kat] ++
32,971,677 UART: [kat] sha1
32,975,800 UART: Fatal Error: 0x90060002
33,011,003 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,155,826 >>> mbox cmd response: failed
33,156,497 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,300,842 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,127 UART:
190,420 UART: Running Caliptra ROM ...
191,531 UART:
7,223,197 UART: [state] CFI Enabled
7,239,675 UART: [state] LifecycleState = Unprovisioned
7,241,590 UART: [state] DebugLocked = No
7,244,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,248,421 UART: [kat] SHA2-256
7,418,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,428,731 UART: [kat] ++
7,429,279 UART: [kat] sha1
7,440,934 UART: [kat] SHA2-256
7,443,634 UART: [kat] SHA2-384
7,449,677 UART: [kat] SHA2-512-ACC
7,452,026 UART: [kat] ECC-384
9,735,145 UART: [kat] HMAC-384Kdf
9,745,808 UART: [kat] LMS
10,935,880 UART: [kat] --
10,939,728 UART: [cold-reset] ++
10,941,557 UART: [fht] Storing FHT @ 0x50003400
10,953,849 UART: [idev] ++
10,954,416 UART: [idev] CDI.KEYID = 6
10,955,356 UART: [idev] SUBJECT.KEYID = 7
10,956,621 UART: [idev] UDS.KEYID = 0
10,958,169 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,102,530 UART: [idev] Erasing UDS.KEYID = 0
14,243,392 UART: [idev] Using Sha1 for KeyId Algorithm
14,263,862 UART: [idev] --
14,266,997 UART: [ldev] ++
14,267,565 UART: [ldev] CDI.KEYID = 6
14,268,498 UART: [ldev] SUBJECT.KEYID = 5
14,269,710 UART: [ldev] AUTHORITY.KEYID = 7
14,270,997 UART: [ldev] FE.KEYID = 1
14,283,348 UART: [ldev] Erasing FE.KEYID = 1
17,571,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,864,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,879,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,893,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,908,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,926,725 UART: [ldev] --
19,931,936 UART: [fwproc] Waiting for Commands...
19,933,568 UART: [fwproc] Received command 0x46574c44
19,935,761 UART: [fwproc] Received Image of size 114996 bytes
23,998,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,075,278 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,144,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,465,107 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,126,982 ready_for_fw is high
4,127,557 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,078,065 >>> mbox cmd response: success
23,719,947 UART:
23,720,355 UART: Running Caliptra FMC ...
23,721,470 UART:
23,721,630 UART: [state] CFI Enabled
23,729,461 UART: [fht] FMC Alias Private Key: 7
26,060,007 UART: [art] Extend RT PCRs Done
26,061,263 UART: [art] Lock RT PCRs Done
26,063,002 UART: [art] Populate DV Done
26,068,265 UART: [fht] FMC Alias Private Key: 7
26,069,762 UART: [art] Derive CDI
26,070,533 UART: [art] Store in in slot 0x4
26,112,918 UART: [art] Derive Key Pair
26,113,924 UART: [art] Store priv key in slot 0x5
29,355,735 UART: [art] Derive Key Pair - Done
29,368,794 UART: [art] Signing Cert with AUTHO
29,370,102 UART: RITY.KEYID = 7
31,649,804 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,318 UART: [art] PUB.X = DD89E0C31A69A9E801F3DA8CBEDCDF05D029DFF497FEDA225E0E1E971FC18D0758B1E876A5771AC21ECAC250DAEDC9E6
31,658,565 UART: [art] PUB.Y = E0C2876216DAFE4C96AE2B4F815DA202E7F2933873F765840E1C1794D11946D9337B947EB47A8F836EC959E039D0EFA8
31,665,802 UART: [art] SIG.R = B159E6C537BB5BCA85F66C61CBF6E7AE376865144B24CCDEBFDC395B1CBB6D6DE59814FBAB75277805D1DA30849E77DA
31,673,203 UART: [art] SIG.S = F0816BA98CE58CBAC306E60809B850CA03B2F7F356E61E1AFAF0F1DCB9B28E089ED10B80BE2249B73011E55946439F69
32,978,631 UART: Caliptra RT
32,979,348 UART: [state] CFI Enabled
33,096,920 UART: [rt] RT listening for mailbox commands...
33,098,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,128,348 UART: [rt]cmd =0x46504c54, len=4
33,129,909 >>> mbox cmd response data (8 bytes)
33,131,291 UART: [rt] FIPS self test
33,132,236 UART: [kat] ++
33,132,685 UART: [kat] sha1
33,136,846 UART: Fatal Error: 0x90060002
33,172,050 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,316,476 >>> mbox cmd response: failed
33,317,125 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,461,499 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
10,593,483 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,547,362 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,409 UART:
192,763 UART: Running Caliptra ROM ...
193,964 UART:
194,120 UART: [state] CFI Enabled
264,406 UART: [state] LifecycleState = Unprovisioned
266,248 UART: [state] DebugLocked = No
268,213 UART: [state] WD Timer not started. Device not locked for debugging
271,391 UART: [kat] SHA2-256
450,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,032 UART: [kat] ++
462,491 UART: [kat] sha1
473,084 UART: [kat] SHA2-256
476,086 UART: [kat] SHA2-384
481,736 UART: [kat] SHA2-512-ACC
484,679 UART: [kat] ECC-384
2,947,017 UART: [kat] HMAC-384Kdf
2,972,644 UART: [kat] LMS
3,502,118 UART: [kat] --
3,507,251 UART: [cold-reset] ++
3,509,751 UART: [fht] FHT @ 0x50003400
3,519,767 UART: [idev] ++
3,520,373 UART: [idev] CDI.KEYID = 6
3,521,288 UART: [idev] SUBJECT.KEYID = 7
3,522,468 UART: [idev] UDS.KEYID = 0
3,523,398 ready_for_fw is high
3,523,623 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,576 UART: [idev] Erasing UDS.KEYID = 0
6,031,091 UART: [idev] Sha1 KeyId Algorithm
6,054,610 UART: [idev] --
6,058,123 UART: [ldev] ++
6,058,702 UART: [ldev] CDI.KEYID = 6
6,059,619 UART: [ldev] SUBJECT.KEYID = 5
6,060,856 UART: [ldev] AUTHORITY.KEYID = 7
6,062,037 UART: [ldev] FE.KEYID = 1
6,101,593 UART: [ldev] Erasing FE.KEYID = 1
8,607,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,369 UART: [ldev] --
10,417,383 UART: [fwproc] Wait for Commands...
10,419,108 UART: [fwproc] Recv command 0x46574c44
10,421,186 UART: [fwproc] Recv'd Img size: 115304 bytes
13,823,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,819 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,286,596 >>> mbox cmd response: success
14,290,526 UART: [afmc] ++
14,291,114 UART: [afmc] CDI.KEYID = 6
14,292,005 UART: [afmc] SUBJECT.KEYID = 7
14,293,222 UART: [afmc] AUTHORITY.KEYID = 5
16,828,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,524 UART: [afmc] --
18,627,035 UART: [cold-reset] --
18,631,227 UART: [state] Locking Datavault
18,636,756 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,500 UART: [state] Locking ICCM
18,640,875 UART: [exit] Launching FMC @ 0x40000130
18,649,296 UART:
18,649,539 UART: Running Caliptra FMC ...
18,650,643 UART:
18,650,801 UART: [state] CFI Enabled
18,709,533 UART: [fht] FMC Alias Private Key: 7
20,473,507 UART: [art] Extend RT PCRs Done
20,474,733 UART: [art] Lock RT PCRs Done
20,476,199 UART: [art] Populate DV Done
20,481,664 UART: [fht] FMC Alias Private Key: 7
20,483,256 UART: [art] Derive CDI
20,484,073 UART: [art] Store in in slot 0x4
20,542,465 UART: [art] Derive Key Pair
20,543,468 UART: [art] Store priv key in slot 0x5
23,006,134 UART: [art] Derive Key Pair - Done
23,018,982 UART: [art] Signing Cert with AUTHO
23,020,289 UART: RITY.KEYID = 7
24,732,763 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,265 UART: [art] PUB.X = B1E00EE51FFDB320D83A3E42460E0E00FFAEB33E141FB4488D41E32EF8974E83E9F0DDB23BB2C23DC9F6418E1E27236C
24,741,521 UART: [art] PUB.Y = 38E18FC2C171396F7C3477039E3C82DFDAB3565F423B634193E0641B526D7053C206D9CD024B82B26178DFF3B2B296DE
24,748,760 UART: [art] SIG.R = BA788E7F7150C31B06E4921DFD47372043A3E2F42B1A407BDFB76D7648E09B5A19211672691D5B06B66BF16C049F877E
24,756,162 UART: [art] SIG.S = 7C86C04D3A0C48E8100C40DDE040C6590E7C540AF7E7AAF8F05AAB8B6CA6E4EBB77E4B13092BC39A21EC46F6991ED7EC
25,734,616 UART: Caliptra RT
25,735,316 UART: [state] CFI Enabled
25,899,310 UART: [rt] RT listening for mailbox commands...
25,901,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,930,924 UART: [rt]cmd =0x46504c54, len=4
25,932,588 >>> mbox cmd response data (8 bytes)
25,933,449 UART: [rt] FIPS self test
25,934,396 UART: [kat] ++
25,934,850 UART: [kat] sha1
25,939,089 UART: Fatal Error: 0x90060002
25,974,297 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,119,181 >>> mbox cmd response: failed
26,119,838 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,264,630 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
189,995 UART:
190,287 UART: Running Caliptra ROM ...
191,313 UART:
191,454 UART: [state] CFI Enabled
256,807 UART: [state] LifecycleState = Unprovisioned
258,671 UART: [state] DebugLocked = No
260,671 UART: [state] WD Timer not started. Device not locked for debugging
265,052 UART: [kat] SHA2-256
444,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,745 UART: [kat] ++
456,194 UART: [kat] sha1
468,600 UART: [kat] SHA2-256
471,613 UART: [kat] SHA2-384
478,942 UART: [kat] SHA2-512-ACC
481,875 UART: [kat] ECC-384
2,942,988 UART: [kat] HMAC-384Kdf
2,964,453 UART: [kat] LMS
3,493,947 UART: [kat] --
3,499,614 UART: [cold-reset] ++
3,501,169 UART: [fht] FHT @ 0x50003400
3,511,552 UART: [idev] ++
3,512,120 UART: [idev] CDI.KEYID = 6
3,513,030 UART: [idev] SUBJECT.KEYID = 7
3,514,247 UART: [idev] UDS.KEYID = 0
3,515,756 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,661,047 UART: [idev] Erasing UDS.KEYID = 0
6,025,341 UART: [idev] Sha1 KeyId Algorithm
6,048,703 UART: [idev] --
6,053,594 UART: [ldev] ++
6,054,167 UART: [ldev] CDI.KEYID = 6
6,055,052 UART: [ldev] SUBJECT.KEYID = 5
6,056,271 UART: [ldev] AUTHORITY.KEYID = 7
6,057,506 UART: [ldev] FE.KEYID = 1
6,092,495 UART: [ldev] Erasing FE.KEYID = 1
8,596,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,363 UART: [ldev] --
10,404,499 UART: [fwproc] Wait for Commands...
10,406,652 UART: [fwproc] Recv command 0x46574c44
10,408,748 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,273 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,737 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,359,223 ready_for_fw is high
3,359,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,062,091 >>> mbox cmd response: success
18,343,951 UART:
18,344,383 UART: Running Caliptra FMC ...
18,345,521 UART:
18,345,678 UART: [state] CFI Enabled
18,411,745 UART: [fht] FMC Alias Private Key: 7
20,175,921 UART: [art] Extend RT PCRs Done
20,177,137 UART: [art] Lock RT PCRs Done
20,179,035 UART: [art] Populate DV Done
20,184,267 UART: [fht] FMC Alias Private Key: 7
20,185,913 UART: [art] Derive CDI
20,186,731 UART: [art] Store in in slot 0x4
20,244,537 UART: [art] Derive Key Pair
20,245,573 UART: [art] Store priv key in slot 0x5
22,708,927 UART: [art] Derive Key Pair - Done
22,722,213 UART: [art] Signing Cert with AUTHO
22,723,520 UART: RITY.KEYID = 7
24,434,859 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,369 UART: [art] PUB.X = 05B5D524F241A4EA37B6EAF359D5D98A2A7548A27C1BE04E7DFCF118681731887A071DB2154DC7C42F3962E1DC9B67CB
24,443,619 UART: [art] PUB.Y = 2A3E887ECE6EEA6C29179836E5AE473D4A9DDC93DFA7798F1BBBF498017F21800D506D7CBA5E9DE03C9C7DE2CF05AAD7
24,450,897 UART: [art] SIG.R = 90F5C457D67FA6CC52A9D4609C31677286E87ABD7F3EDE8BC566630D27FF2565142E275BB846407FFAEA349C55FB3D6A
24,458,293 UART: [art] SIG.S = 905E4F3A623D453EF011761F68232C98ABE2816756B4F8AB892ADFB39148361189542A68FEA52AD98657948A34E18025
25,436,943 UART: Caliptra RT
25,437,709 UART: [state] CFI Enabled
25,602,349 UART: [rt] RT listening for mailbox commands...
25,604,208 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,633,891 UART: [rt]cmd =0x46504c54, len=4
25,635,521 >>> mbox cmd response data (8 bytes)
25,636,743 UART: [rt] FIPS self test
25,637,682 UART: [kat] ++
25,638,137 UART: [kat] sha1
25,642,452 UART: Fatal Error: 0x90060002
25,677,832 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,822,579 >>> mbox cmd response: failed
25,823,218 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,967,934 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,370,867 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,077,008 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,632 UART:
192,997 UART: Running Caliptra ROM ...
194,205 UART:
603,913 UART: [state] CFI Enabled
616,455 UART: [state] LifecycleState = Unprovisioned
618,335 UART: [state] DebugLocked = No
620,025 UART: [state] WD Timer not started. Device not locked for debugging
624,481 UART: [kat] SHA2-256
803,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,178 UART: [kat] ++
815,705 UART: [kat] sha1
826,698 UART: [kat] SHA2-256
829,699 UART: [kat] SHA2-384
837,469 UART: [kat] SHA2-512-ACC
840,483 UART: [kat] ECC-384
3,282,529 UART: [kat] HMAC-384Kdf
3,295,156 UART: [kat] LMS
3,824,651 UART: [kat] --
3,829,727 UART: [cold-reset] ++
3,831,304 UART: [fht] FHT @ 0x50003400
3,842,406 UART: [idev] ++
3,843,010 UART: [idev] CDI.KEYID = 6
3,843,955 UART: [idev] SUBJECT.KEYID = 7
3,845,134 UART: [idev] UDS.KEYID = 0
3,846,039 ready_for_fw is high
3,846,250 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,939 UART: [idev] Erasing UDS.KEYID = 0
6,319,051 UART: [idev] Sha1 KeyId Algorithm
6,342,721 UART: [idev] --
6,346,709 UART: [ldev] ++
6,347,277 UART: [ldev] CDI.KEYID = 6
6,348,190 UART: [ldev] SUBJECT.KEYID = 5
6,349,411 UART: [ldev] AUTHORITY.KEYID = 7
6,350,644 UART: [ldev] FE.KEYID = 1
6,361,340 UART: [ldev] Erasing FE.KEYID = 1
8,833,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,110 UART: [ldev] --
10,622,998 UART: [fwproc] Wait for Commands...
10,624,612 UART: [fwproc] Recv command 0x46574c44
10,626,707 UART: [fwproc] Recv'd Img size: 115304 bytes
14,046,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,122,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,191,480 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,513,471 >>> mbox cmd response: success
14,518,006 UART: [afmc] ++
14,518,600 UART: [afmc] CDI.KEYID = 6
14,519,514 UART: [afmc] SUBJECT.KEYID = 7
14,520,675 UART: [afmc] AUTHORITY.KEYID = 5
17,022,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,742,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,744,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,760,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,776,628 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,792,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,815,775 UART: [afmc] --
18,819,218 UART: [cold-reset] --
18,823,724 UART: [state] Locking Datavault
18,828,375 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,081 UART: [state] Locking ICCM
18,832,180 UART: [exit] Launching FMC @ 0x40000130
18,840,574 UART:
18,840,811 UART: Running Caliptra FMC ...
18,841,913 UART:
18,842,077 UART: [state] CFI Enabled
18,850,018 UART: [fht] FMC Alias Private Key: 7
20,606,371 UART: [art] Extend RT PCRs Done
20,607,606 UART: [art] Lock RT PCRs Done
20,609,173 UART: [art] Populate DV Done
20,614,593 UART: [fht] FMC Alias Private Key: 7
20,616,185 UART: [art] Derive CDI
20,616,999 UART: [art] Store in in slot 0x4
20,659,553 UART: [art] Derive Key Pair
20,660,588 UART: [art] Store priv key in slot 0x5
23,087,061 UART: [art] Derive Key Pair - Done
23,100,116 UART: [art] Signing Cert with AUTHO
23,101,420 UART: RITY.KEYID = 7
24,807,393 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,899 UART: [art] PUB.X = 87269D28D605539A4138ABA1E4C75DBD3E2AD424FF48A73B7AFA54DBFB10CA4C5C8B51F7A7572EC808D8D20F1A10FC5B
24,816,157 UART: [art] PUB.Y = 133DEF345C5FD1C2FF69D234701724169F044749B544D90D4C9E9410FDA529C20E5D7F06DC1EDCFBF254A759D3386E75
24,823,449 UART: [art] SIG.R = 97F0C6B07F6D9623B02FD006C564D1159CA824281589B5FC44023A8EE6A4D1FB19D587EF9C9C4664B75EEAEFBCD0814A
24,830,851 UART: [art] SIG.S = FF04B59F0C71BAD4224A98198683F6EC133108FCCB485926DD4A6D85CB1AE1162A032E0AF895DD2DD91B4B1A6D7E4F11
25,809,984 UART: Caliptra RT
25,810,699 UART: [state] CFI Enabled
25,926,908 UART: [rt] RT listening for mailbox commands...
25,928,753 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,545 UART: [rt]cmd =0x46504c54, len=4
25,959,956 >>> mbox cmd response data (8 bytes)
25,961,285 UART: [rt] FIPS self test
25,962,229 UART: [kat] ++
25,962,680 UART: [kat] sha1
25,967,079 UART: Fatal Error: 0x90060002
26,002,449 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,147,131 >>> mbox cmd response: failed
26,147,763 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,292,537 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,103 UART:
190,416 UART: Running Caliptra ROM ...
191,448 UART:
14,229,591 UART: [state] CFI Enabled
14,243,996 UART: [state] LifecycleState = Unprovisioned
14,245,858 UART: [state] DebugLocked = No
14,247,970 UART: [state] WD Timer not started. Device not locked for debugging
14,252,193 UART: [kat] SHA2-256
14,431,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,442,895 UART: [kat] ++
14,443,352 UART: [kat] sha1
14,454,129 UART: [kat] SHA2-256
14,457,150 UART: [kat] SHA2-384
14,463,085 UART: [kat] SHA2-512-ACC
14,466,034 UART: [kat] ECC-384
16,906,350 UART: [kat] HMAC-384Kdf
16,919,068 UART: [kat] LMS
17,448,584 UART: [kat] --
17,453,460 UART: [cold-reset] ++
17,455,177 UART: [fht] FHT @ 0x50003400
17,466,914 UART: [idev] ++
17,467,513 UART: [idev] CDI.KEYID = 6
17,468,427 UART: [idev] SUBJECT.KEYID = 7
17,469,589 UART: [idev] UDS.KEYID = 0
17,471,224 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,615,857 UART: [idev] Erasing UDS.KEYID = 0
19,937,613 UART: [idev] Sha1 KeyId Algorithm
19,959,973 UART: [idev] --
19,963,946 UART: [ldev] ++
19,964,524 UART: [ldev] CDI.KEYID = 6
19,965,433 UART: [ldev] SUBJECT.KEYID = 5
19,966,591 UART: [ldev] AUTHORITY.KEYID = 7
19,967,880 UART: [ldev] FE.KEYID = 1
19,976,273 UART: [ldev] Erasing FE.KEYID = 1
22,453,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,171,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,187,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,202,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,218,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,238,974 UART: [ldev] --
24,243,806 UART: [fwproc] Wait for Commands...
24,246,342 UART: [fwproc] Recv command 0x46574c44
24,248,388 UART: [fwproc] Recv'd Img size: 115304 bytes
27,656,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,728,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,797,516 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,118,649 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,705,037 ready_for_fw is high
3,705,448 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,302,317 >>> mbox cmd response: success
18,556,163 UART:
18,556,763 UART: Running Caliptra FMC ...
18,557,887 UART:
18,558,047 UART: [state] CFI Enabled
18,565,734 UART: [fht] FMC Alias Private Key: 7
20,323,186 UART: [art] Extend RT PCRs Done
20,324,426 UART: [art] Lock RT PCRs Done
20,326,004 UART: [art] Populate DV Done
20,331,483 UART: [fht] FMC Alias Private Key: 7
20,333,134 UART: [art] Derive CDI
20,333,950 UART: [art] Store in in slot 0x4
20,376,433 UART: [art] Derive Key Pair
20,377,440 UART: [art] Store priv key in slot 0x5
22,804,616 UART: [art] Derive Key Pair - Done
22,817,616 UART: [art] Signing Cert with AUTHO
22,818,933 UART: RITY.KEYID = 7
24,524,079 UART: [art] Erasing AUTHORITY.KEYID = 7
24,525,596 UART: [art] PUB.X = 47F54C2AB89C5676203DECE609708E781AF8AFE80013A4752B3C8D32C6BCEDEA5AB41CA4902483B223FD25489F7FEDD9
24,532,862 UART: [art] PUB.Y = 0C83075F87DE15CDEF41B3A2FE45909CF4B3616BDF508C5748A39B7BDD587FAF15F2C4B4523929D99D62135FAED0EE00
24,540,136 UART: [art] SIG.R = 2D5270DE643A08627FE8D301FBBB77591C630ED78DCE69F3448F10CB3C4A3B76D6F85F93D1F878CA9A264F7AF7DF7398
24,547,530 UART: [art] SIG.S = 27EC0CB4EA4AB554E704808F6E4C6B2BA7AABDA311BB6290D5AFBC6C69C8FD11BCA4F34219DB3900342A32AED1F8773B
25,526,860 UART: Caliptra RT
25,527,563 UART: [state] CFI Enabled
25,644,849 UART: [rt] RT listening for mailbox commands...
25,646,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,676,432 UART: [rt]cmd =0x46504c54, len=4
25,677,940 >>> mbox cmd response data (8 bytes)
25,678,886 UART: [rt] FIPS self test
25,679,835 UART: [kat] ++
25,680,294 UART: [kat] sha1
25,684,695 UART: Fatal Error: 0x90060002
25,719,899 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,864,688 >>> mbox cmd response: failed
25,865,362 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,010,142 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
17,610,070 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,204,078 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,887 writing to cptra_bootfsm_go
193,269 UART:
193,727 UART: Running Caliptra ROM ...
194,861 UART:
195,012 UART: [state] CFI Enabled
255,570 UART: [state] LifecycleState = Unprovisioned
257,960 UART: [state] DebugLocked = No
260,500 UART: [state] WD Timer not started. Device not locked for debugging
265,405 UART: [kat] SHA2-256
455,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,083 UART: [kat] ++
466,566 UART: [kat] sha1
477,868 UART: [kat] SHA2-256
480,880 UART: [kat] SHA2-384
486,308 UART: [kat] SHA2-512-ACC
488,960 UART: [kat] ECC-384
2,939,828 UART: [kat] HMAC-384Kdf
2,963,937 UART: [kat] LMS
3,495,723 UART: [kat] --
3,500,789 UART: [cold-reset] ++
3,503,437 UART: [fht] FHT @ 0x50003400
3,516,358 UART: [idev] ++
3,517,009 UART: [idev] CDI.KEYID = 6
3,518,048 UART: [idev] SUBJECT.KEYID = 7
3,519,155 UART: [idev] UDS.KEYID = 0
3,520,084 ready_for_fw is high
3,520,327 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,262 UART: [idev] Erasing UDS.KEYID = 0
6,023,533 UART: [idev] Sha1 KeyId Algorithm
6,045,862 UART: [idev] --
6,051,536 UART: [ldev] ++
6,052,218 UART: [ldev] CDI.KEYID = 6
6,053,124 UART: [ldev] SUBJECT.KEYID = 5
6,054,281 UART: [ldev] AUTHORITY.KEYID = 7
6,055,515 UART: [ldev] FE.KEYID = 1
6,092,199 UART: [ldev] Erasing FE.KEYID = 1
8,601,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,401 UART: [ldev] --
10,404,072 UART: [fwproc] Wait for Commands...
10,405,682 UART: [fwproc] Recv command 0x46574c44
10,407,948 UART: [fwproc] Recv'd Img size: 115304 bytes
13,872,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,754 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,611,328 >>> mbox cmd response: success
14,615,864 UART: [afmc] ++
14,616,570 UART: [afmc] CDI.KEYID = 6
14,617,805 UART: [afmc] SUBJECT.KEYID = 7
14,619,237 UART: [afmc] AUTHORITY.KEYID = 5
17,164,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,906,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,908,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,923,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,938,562 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,953,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,976,597 UART: [afmc] --
18,980,062 UART: [cold-reset] --
18,984,585 UART: [state] Locking Datavault
18,989,786 UART: [state] Locking PCR0, PCR1 and PCR31
18,991,920 UART: [state] Locking ICCM
18,993,310 UART: [exit] Launching FMC @ 0x40000130
19,001,977 UART:
19,002,221 UART: Running Caliptra FMC ...
19,003,324 UART:
19,003,487 UART: [state] CFI Enabled
19,062,947 UART: [fht] FMC Alias Private Key: 7
20,827,634 UART: [art] Extend RT PCRs Done
20,828,848 UART: [art] Lock RT PCRs Done
20,830,422 UART: [art] Populate DV Done
20,835,940 UART: [fht] FMC Alias Private Key: 7
20,837,477 UART: [art] Derive CDI
20,838,214 UART: [art] Store in in slot 0x4
20,895,239 UART: [art] Derive Key Pair
20,896,237 UART: [art] Store priv key in slot 0x5
23,359,381 UART: [art] Derive Key Pair - Done
23,372,703 UART: [art] Signing Cert with AUTHO
23,374,007 UART: RITY.KEYID = 7
25,084,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,086,097 UART: [art] PUB.X = 04A232131FD0975ED4B33D146C3A1CCBC4465D24D2E91B53982CDF7A17352F1D72A9BB708C8B98FBA032FCFB4B612760
25,093,364 UART: [art] PUB.Y = 0C3BF2247A3B63AD1F72A986EC762DA430528FD9F3153A0D1F7936853C7A4747333DCCC522198BAF1DCAF9389AE2C81E
25,100,607 UART: [art] SIG.R = 3C631F501DCE49FA6EDE99E001694377A689CFA6E0709576CC6F80A3513CDD719B0F3B7FC097926125395B731112BFF7
25,108,023 UART: [art] SIG.S = 5EDB8334AE7AE08B84492997DF500D7D5587DD685980399BC2284EDF309DE6BDB24A2EECD26A8DE91DDF05A8422C5693
26,086,441 UART: Caliptra RT
26,087,139 UART: [state] CFI Enabled
26,252,033 UART: [rt] RT listening for mailbox commands...
26,253,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,283,349 UART: [rt]cmd =0x46504c54, len=4
26,285,234 >>> mbox cmd response data (8 bytes)
26,286,097 UART: [rt] FIPS self test
26,287,052 UART: [kat] ++
26,287,506 UART: [kat] sha1
26,291,529 UART: Fatal Error: 0x90060002
26,326,732 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,471,602 >>> mbox cmd response: failed
26,472,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,617,306 >>> mbox cmd response: failed
Initializing fuses
1,022 writing to cptra_bootfsm_go
190,117 UART:
190,411 UART: Running Caliptra ROM ...
191,479 UART:
191,627 UART: [state] CFI Enabled
256,809 UART: [state] LifecycleState = Unprovisioned
259,220 UART: [state] DebugLocked = No
260,491 UART: [state] WD Timer not started. Device not locked for debugging
265,252 UART: [kat] SHA2-256
455,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,906 UART: [kat] ++
466,377 UART: [kat] sha1
478,610 UART: [kat] SHA2-256
481,617 UART: [kat] SHA2-384
487,758 UART: [kat] SHA2-512-ACC
490,317 UART: [kat] ECC-384
2,938,012 UART: [kat] HMAC-384Kdf
2,962,136 UART: [kat] LMS
3,493,886 UART: [kat] --
3,497,130 UART: [cold-reset] ++
3,498,357 UART: [fht] FHT @ 0x50003400
3,508,588 UART: [idev] ++
3,509,271 UART: [idev] CDI.KEYID = 6
3,510,233 UART: [idev] SUBJECT.KEYID = 7
3,511,446 UART: [idev] UDS.KEYID = 0
3,512,959 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,930 UART: [idev] Erasing UDS.KEYID = 0
6,019,452 UART: [idev] Sha1 KeyId Algorithm
6,041,370 UART: [idev] --
6,047,337 UART: [ldev] ++
6,048,026 UART: [ldev] CDI.KEYID = 6
6,048,939 UART: [ldev] SUBJECT.KEYID = 5
6,050,120 UART: [ldev] AUTHORITY.KEYID = 7
6,051,299 UART: [ldev] FE.KEYID = 1
6,089,443 UART: [ldev] Erasing FE.KEYID = 1
8,597,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,427 UART: [ldev] --
10,405,392 UART: [fwproc] Wait for Commands...
10,407,494 UART: [fwproc] Recv command 0x46574c44
10,409,754 UART: [fwproc] Recv'd Img size: 115304 bytes
13,876,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,844 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,618,169 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,440,631 ready_for_fw is high
3,441,126 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,755,340 >>> mbox cmd response: success
19,033,045 UART:
19,033,450 UART: Running Caliptra FMC ...
19,034,594 UART:
19,034,756 UART: [state] CFI Enabled
19,102,543 UART: [fht] FMC Alias Private Key: 7
20,866,517 UART: [art] Extend RT PCRs Done
20,867,739 UART: [art] Lock RT PCRs Done
20,869,550 UART: [art] Populate DV Done
20,874,915 UART: [fht] FMC Alias Private Key: 7
20,876,562 UART: [art] Derive CDI
20,877,298 UART: [art] Store in in slot 0x4
20,934,612 UART: [art] Derive Key Pair
20,935,651 UART: [art] Store priv key in slot 0x5
23,398,574 UART: [art] Derive Key Pair - Done
23,411,730 UART: [art] Signing Cert with AUTHO
23,413,032 UART: RITY.KEYID = 7
25,123,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,460 UART: [art] PUB.X = 4BE30892A5CBF351F4AD53D867226099E02EC82894486A0CD4AE44ACE3A821C63D727A9D1947B82120ED12E8081B6A83
25,132,689 UART: [art] PUB.Y = FFF24E186DE2B22F0DB215000A0B5E5D4BB491B94E9BF6FFA1BDB6EDBB33503E4E724A936C192FE5BF4E71193063ECCD
25,139,955 UART: [art] SIG.R = 9E6A84B8F775F5A68EEF64456BABEEF49DFD6CDD4B11FF2C984B420B384B0C6E7B677CCFE1101B282B2D547DB629CF98
25,147,361 UART: [art] SIG.S = 8707D94906E0E9ADBCCA7D08D7CEE5E1089B1431655320A6ED1EE7DEB0AD8114F59965C6D566187CBB05E0999ACB3980
26,126,020 UART: Caliptra RT
26,126,717 UART: [state] CFI Enabled
26,292,264 UART: [rt] RT listening for mailbox commands...
26,294,119 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,323,854 UART: [rt]cmd =0x46504c54, len=4
26,325,539 >>> mbox cmd response data (8 bytes)
26,326,966 UART: [rt] FIPS self test
26,327,910 UART: [kat] ++
26,328,357 UART: [kat] sha1
26,332,543 UART: Fatal Error: 0x90060002
26,367,915 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,512,811 >>> mbox cmd response: failed
26,513,458 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,658,520 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,430,814 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,772,779 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,592 UART:
192,947 UART: Running Caliptra ROM ...
194,140 UART:
603,596 UART: [state] CFI Enabled
618,602 UART: [state] LifecycleState = Unprovisioned
620,913 UART: [state] DebugLocked = No
623,781 UART: [state] WD Timer not started. Device not locked for debugging
627,672 UART: [kat] SHA2-256
817,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,341 UART: [kat] ++
828,869 UART: [kat] sha1
841,803 UART: [kat] SHA2-256
844,816 UART: [kat] SHA2-384
850,535 UART: [kat] SHA2-512-ACC
853,118 UART: [kat] ECC-384
3,296,158 UART: [kat] HMAC-384Kdf
3,308,601 UART: [kat] LMS
3,840,428 UART: [kat] --
3,845,073 UART: [cold-reset] ++
3,846,236 UART: [fht] FHT @ 0x50003400
3,858,428 UART: [idev] ++
3,859,067 UART: [idev] CDI.KEYID = 6
3,860,101 UART: [idev] SUBJECT.KEYID = 7
3,861,205 UART: [idev] UDS.KEYID = 0
3,862,108 ready_for_fw is high
3,862,329 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,007,150 UART: [idev] Erasing UDS.KEYID = 0
6,340,245 UART: [idev] Sha1 KeyId Algorithm
6,361,501 UART: [idev] --
6,366,574 UART: [ldev] ++
6,367,253 UART: [ldev] CDI.KEYID = 6
6,368,178 UART: [ldev] SUBJECT.KEYID = 5
6,369,338 UART: [ldev] AUTHORITY.KEYID = 7
6,370,566 UART: [ldev] FE.KEYID = 1
6,381,048 UART: [ldev] Erasing FE.KEYID = 1
8,861,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,484 UART: [ldev] --
10,652,937 UART: [fwproc] Wait for Commands...
10,654,552 UART: [fwproc] Recv command 0x46574c44
10,656,867 UART: [fwproc] Recv'd Img size: 115304 bytes
14,117,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,199,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,315,492 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,864,449 >>> mbox cmd response: success
14,867,833 UART: [afmc] ++
14,868,585 UART: [afmc] CDI.KEYID = 6
14,869,765 UART: [afmc] SUBJECT.KEYID = 7
14,871,251 UART: [afmc] AUTHORITY.KEYID = 5
17,372,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,093,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,095,725 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,110,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,126,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,141,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,163,825 UART: [afmc] --
19,168,121 UART: [cold-reset] --
19,171,064 UART: [state] Locking Datavault
19,174,853 UART: [state] Locking PCR0, PCR1 and PCR31
19,177,044 UART: [state] Locking ICCM
19,178,711 UART: [exit] Launching FMC @ 0x40000130
19,187,378 UART:
19,187,609 UART: Running Caliptra FMC ...
19,188,638 UART:
19,188,782 UART: [state] CFI Enabled
19,196,998 UART: [fht] FMC Alias Private Key: 7
20,954,098 UART: [art] Extend RT PCRs Done
20,955,313 UART: [art] Lock RT PCRs Done
20,957,182 UART: [art] Populate DV Done
20,962,755 UART: [fht] FMC Alias Private Key: 7
20,964,477 UART: [art] Derive CDI
20,965,295 UART: [art] Store in in slot 0x4
21,007,890 UART: [art] Derive Key Pair
21,008,901 UART: [art] Store priv key in slot 0x5
23,435,459 UART: [art] Derive Key Pair - Done
23,448,560 UART: [art] Signing Cert with AUTHO
23,449,858 UART: RITY.KEYID = 7
25,155,189 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,693 UART: [art] PUB.X = BD172681906C9B22110917EA9C0273F6B8711FEE4FF3D964B0AFBAB94A26C91EC8355489B3F4D907A41D90F81B28EFE4
25,163,947 UART: [art] PUB.Y = 75B3F4B3FC2129E715D31CC1BB7DB92CD033A0164EB066A7B381B910DDE1ACD15D3AF2DABBD2AA43C25597C1A553D9D7
25,171,238 UART: [art] SIG.R = C1F7C8623B218F4DC2931322B618244D35157AA9EDD9D5D925A5F10B2603684FDAC010C89B8F938623AEFAAD12A7FCA8
25,178,638 UART: [art] SIG.S = CEBD9921C33A6F5E2F130357D55EC8053ABC21B2D87493AD8F474A9BDB1E1B948D06036D3B30551F13F026447BF29591
26,157,656 UART: Caliptra RT
26,158,343 UART: [state] CFI Enabled
26,275,561 UART: [rt] RT listening for mailbox commands...
26,277,401 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,306,876 UART: [rt]cmd =0x46504c54, len=4
26,308,506 >>> mbox cmd response data (8 bytes)
26,309,394 UART: [rt] FIPS self test
26,310,273 UART: [kat] ++
26,310,718 UART: [kat] sha1
26,314,962 UART: Fatal Error: 0x90060002
26,350,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,495,040 >>> mbox cmd response: failed
26,495,705 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,641,005 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,102 UART:
190,393 UART: Running Caliptra ROM ...
191,502 UART:
13,880,834 UART: [state] CFI Enabled
13,893,935 UART: [state] LifecycleState = Unprovisioned
13,896,275 UART: [state] DebugLocked = No
13,899,143 UART: [state] WD Timer not started. Device not locked for debugging
13,903,163 UART: [kat] SHA2-256
14,093,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,103,824 UART: [kat] ++
14,104,337 UART: [kat] sha1
14,116,520 UART: [kat] SHA2-256
14,119,544 UART: [kat] SHA2-384
14,126,664 UART: [kat] SHA2-512-ACC
14,129,228 UART: [kat] ECC-384
16,569,797 UART: [kat] HMAC-384Kdf
16,581,858 UART: [kat] LMS
17,113,675 UART: [kat] --
17,118,959 UART: [cold-reset] ++
17,121,052 UART: [fht] FHT @ 0x50003400
17,132,861 UART: [idev] ++
17,133,546 UART: [idev] CDI.KEYID = 6
17,134,512 UART: [idev] SUBJECT.KEYID = 7
17,135,723 UART: [idev] UDS.KEYID = 0
17,137,238 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,281,945 UART: [idev] Erasing UDS.KEYID = 0
19,616,821 UART: [idev] Sha1 KeyId Algorithm
19,640,219 UART: [idev] --
19,644,962 UART: [ldev] ++
19,645,642 UART: [ldev] CDI.KEYID = 6
19,646,606 UART: [ldev] SUBJECT.KEYID = 5
19,647,761 UART: [ldev] AUTHORITY.KEYID = 7
19,649,004 UART: [ldev] FE.KEYID = 1
19,660,628 UART: [ldev] Erasing FE.KEYID = 1
22,140,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,858,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,873,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,889,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,904,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,924,147 UART: [ldev] --
23,930,392 UART: [fwproc] Wait for Commands...
23,932,065 UART: [fwproc] Recv command 0x46574c44
23,934,382 UART: [fwproc] Recv'd Img size: 115304 bytes
27,394,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,470,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,586,936 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,134,390 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,753,193 ready_for_fw is high
3,753,569 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,961,382 >>> mbox cmd response: success
19,220,308 UART:
19,220,712 UART: Running Caliptra FMC ...
19,221,836 UART:
19,221,989 UART: [state] CFI Enabled
19,229,783 UART: [fht] FMC Alias Private Key: 7
20,986,387 UART: [art] Extend RT PCRs Done
20,987,605 UART: [art] Lock RT PCRs Done
20,989,418 UART: [art] Populate DV Done
20,995,104 UART: [fht] FMC Alias Private Key: 7
20,996,539 UART: [art] Derive CDI
20,997,276 UART: [art] Store in in slot 0x4
21,040,355 UART: [art] Derive Key Pair
21,041,402 UART: [art] Store priv key in slot 0x5
23,468,311 UART: [art] Derive Key Pair - Done
23,481,045 UART: [art] Signing Cert with AUTHO
23,482,374 UART: RITY.KEYID = 7
25,188,373 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,884 UART: [art] PUB.X = C61448E08483BA41E5C26019BB2C615207D566226EFF4F033AFD617F1A9358B905F2892DD55A555EF9073C0AD94A6300
25,197,143 UART: [art] PUB.Y = 753B17A4335A5C24A8BF7CF537F621CAE1AF35C18A49BA3D55F472DD15DF514F190583E5EDE40DB62609AABCD0BDA51C
25,204,397 UART: [art] SIG.R = E7E650E7C208E0E1E7A0CB0E113B82CB733C17706B5C9169E5FA3FE8D993C58252FF6BECFD749764BAC1D299A9377002
25,211,844 UART: [art] SIG.S = C277BA049946E847356D708D619B1AFCEE5F6675FCD3B0771915723566402801E13E3D4F39712B62FEB6EEF42716C7D0
26,191,255 UART: Caliptra RT
26,191,973 UART: [state] CFI Enabled
26,309,107 UART: [rt] RT listening for mailbox commands...
26,310,960 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,340,435 UART: [rt]cmd =0x46504c54, len=4
26,342,174 >>> mbox cmd response data (8 bytes)
26,343,103 UART: [rt] FIPS self test
26,344,042 UART: [kat] ++
26,344,498 UART: [kat] sha1
26,348,955 UART: Fatal Error: 0x90060002
26,384,342 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,529,017 >>> mbox cmd response: failed
26,529,660 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,674,433 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,008,126 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,234,723 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,155 UART: [kat] SHA2-256
892,093 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,692 UART: [kat] LMS
1,474,888 UART: [kat] --
1,475,731 UART: [cold-reset] ++
1,476,221 UART: [fht] Storing FHT @ 0x50003400
1,478,960 UART: [idev] ++
1,479,128 UART: [idev] CDI.KEYID = 6
1,479,488 UART: [idev] SUBJECT.KEYID = 7
1,479,912 UART: [idev] UDS.KEYID = 0
1,480,257 ready_for_fw is high
1,480,257 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,426 UART: [idev] --
1,514,563 UART: [ldev] ++
1,514,731 UART: [ldev] CDI.KEYID = 6
1,515,094 UART: [ldev] SUBJECT.KEYID = 5
1,515,520 UART: [ldev] AUTHORITY.KEYID = 7
1,515,983 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,547,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,920 UART: [ldev] --
1,586,417 UART: [fwproc] Waiting for Commands...
1,587,278 UART: [fwproc] Received command 0x46574c44
1,588,069 UART: [fwproc] Received Image of size 115304 bytes
2,897,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,190 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,757 >>> mbox cmd response: success
3,092,989 UART: [afmc] ++
3,093,157 UART: [afmc] CDI.KEYID = 6
3,093,519 UART: [afmc] SUBJECT.KEYID = 7
3,093,944 UART: [afmc] AUTHORITY.KEYID = 5
3,129,243 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,016 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,706 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,583 UART: [afmc] --
3,172,461 UART: [cold-reset] --
3,173,173 UART: [state] Locking Datavault
3,174,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,834 UART: [state] Locking ICCM
3,175,440 UART: [exit] Launching FMC @ 0x40000130
3,180,769 UART:
3,180,785 UART: Running Caliptra FMC ...
3,181,193 UART:
3,181,247 UART: [state] CFI Enabled
3,191,956 UART: [fht] FMC Alias Private Key: 7
3,300,513 UART: [art] Extend RT PCRs Done
3,300,941 UART: [art] Lock RT PCRs Done
3,302,583 UART: [art] Populate DV Done
3,310,756 UART: [fht] FMC Alias Private Key: 7
3,311,768 UART: [art] Derive CDI
3,312,048 UART: [art] Store in in slot 0x4
3,397,631 UART: [art] Derive Key Pair
3,397,991 UART: [art] Store priv key in slot 0x5
3,411,421 UART: [art] Derive Key Pair - Done
3,426,559 UART: [art] Signing Cert with AUTHO
3,427,039 UART: RITY.KEYID = 7
3,442,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,294 UART: [art] PUB.X = A027BED0D0F6DD72591D210AF8A79FBE29B2EDFDE09543EDE29621FC21456AA387DCB1BB52696B272933935B452500B9
3,450,049 UART: [art] PUB.Y = 032CBF8AC478C3E4470F552300A7F8D93E2AF067AAD206F6CDDA739B2449F207444AEA48163DE17ADFBAC44DCDB57888
3,456,981 UART: [art] SIG.R = 24A51C71BC0F216B83FA0FF5C5D60B33DD9DE530EAB21BBEC6D3C11B7AACF1C71EE9A8ED770DB6C31D1EE148DCBC0BEB
3,463,774 UART: [art] SIG.S = 6A6EF431DF8336281AE901080D1D6983F039D11FAB78721175C25A735CFCE9AE88FF1142BC732849CF3E04CAD7E765E1
3,487,697 UART: Caliptra RT
3,487,950 UART: [state] CFI Enabled
3,596,494 UART: [rt] RT listening for mailbox commands...
3,597,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,338 UART: [rt]cmd =0x46504c54, len=4
3,628,571 >>> mbox cmd response data (8 bytes)
3,628,754 UART: [rt] FIPS self test
3,629,082 UART: [kat] ++
3,629,234 UART: [kat] sha1
3,633,365 UART: Fatal Error: 0x90060002
3,634,915 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,920 >>> mbox cmd response: failed
3,634,920 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,505 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,724 UART: [idev] ++
1,479,892 UART: [idev] CDI.KEYID = 6
1,480,252 UART: [idev] SUBJECT.KEYID = 7
1,480,676 UART: [idev] UDS.KEYID = 0
1,481,021 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,834 UART: [idev] Erasing UDS.KEYID = 0
1,505,774 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,408 UART: [idev] --
1,515,423 UART: [ldev] ++
1,515,591 UART: [ldev] CDI.KEYID = 6
1,515,954 UART: [ldev] SUBJECT.KEYID = 5
1,516,380 UART: [ldev] AUTHORITY.KEYID = 7
1,516,843 UART: [ldev] FE.KEYID = 1
1,522,283 UART: [ldev] Erasing FE.KEYID = 1
1,547,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,508 UART: [ldev] --
1,586,983 UART: [fwproc] Waiting for Commands...
1,587,788 UART: [fwproc] Received command 0x46574c44
1,588,579 UART: [fwproc] Received Image of size 115304 bytes
2,898,380 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,650 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,002 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,351 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,961 ready_for_fw is high
1,361,961 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,951 >>> mbox cmd response: success
3,001,783 UART:
3,001,799 UART: Running Caliptra FMC ...
3,002,207 UART:
3,002,261 UART: [state] CFI Enabled
3,012,680 UART: [fht] FMC Alias Private Key: 7
3,120,779 UART: [art] Extend RT PCRs Done
3,121,207 UART: [art] Lock RT PCRs Done
3,122,771 UART: [art] Populate DV Done
3,130,886 UART: [fht] FMC Alias Private Key: 7
3,131,946 UART: [art] Derive CDI
3,132,226 UART: [art] Store in in slot 0x4
3,218,119 UART: [art] Derive Key Pair
3,218,479 UART: [art] Store priv key in slot 0x5
3,231,749 UART: [art] Derive Key Pair - Done
3,246,353 UART: [art] Signing Cert with AUTHO
3,246,833 UART: RITY.KEYID = 7
3,261,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,136 UART: [art] PUB.X = 098EF2C842FCAE7D13BE23B6CD614784E3C81BE7B3DDC9F85E4BF8A1A708156CDA8236B7DD7FEF42B3422050017CC1FC
3,268,917 UART: [art] PUB.Y = F1B3BBCF694EDF9D9B1E66D5BB9109ECB40E215432071F260B8B22CAE61E26174D23F8CB44BE2B51F63EBF96365F9D4E
3,275,873 UART: [art] SIG.R = 36DC0E92EC697913461B6E1F9DC9F550AAED9988DA83AD5997BB5B6073CDE8032C0CE0F1FEF1A394FAB87100FFACB6A1
3,282,634 UART: [art] SIG.S = 03250D78AF97C56A8A84DD6C3554AD365040EA1305B5AE5A5BFA078D74E0EC7C0FCC61CE9430CF56F71959E94AD89E95
3,306,608 UART: Caliptra RT
3,306,861 UART: [state] CFI Enabled
3,414,793 UART: [rt] RT listening for mailbox commands...
3,415,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,491 UART: [rt]cmd =0x46504c54, len=4
3,446,656 >>> mbox cmd response data (8 bytes)
3,446,865 UART: [rt] FIPS self test
3,447,193 UART: [kat] ++
3,447,345 UART: [kat] sha1
3,451,846 UART: Fatal Error: 0x90060002
3,453,396 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,453,401 >>> mbox cmd response: failed
3,453,401 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,453,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,001 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,985 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,680 UART: [kat] SHA2-256
882,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,726 UART: [kat] ++
886,878 UART: [kat] sha1
891,134 UART: [kat] SHA2-256
893,072 UART: [kat] SHA2-384
895,827 UART: [kat] SHA2-512-ACC
897,728 UART: [kat] ECC-384
903,423 UART: [kat] HMAC-384Kdf
908,003 UART: [kat] LMS
1,476,199 UART: [kat] --
1,477,160 UART: [cold-reset] ++
1,477,620 UART: [fht] Storing FHT @ 0x50003400
1,480,465 UART: [idev] ++
1,480,633 UART: [idev] CDI.KEYID = 6
1,480,993 UART: [idev] SUBJECT.KEYID = 7
1,481,417 UART: [idev] UDS.KEYID = 0
1,481,762 ready_for_fw is high
1,481,762 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,887 UART: [idev] Erasing UDS.KEYID = 0
1,505,931 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,475 UART: [idev] --
1,515,384 UART: [ldev] ++
1,515,552 UART: [ldev] CDI.KEYID = 6
1,515,915 UART: [ldev] SUBJECT.KEYID = 5
1,516,341 UART: [ldev] AUTHORITY.KEYID = 7
1,516,804 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,546,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,959 UART: [ldev] --
1,586,454 UART: [fwproc] Waiting for Commands...
1,587,155 UART: [fwproc] Received command 0x46574c44
1,587,946 UART: [fwproc] Received Image of size 115304 bytes
2,897,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,999 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,800 >>> mbox cmd response: success
3,092,904 UART: [afmc] ++
3,093,072 UART: [afmc] CDI.KEYID = 6
3,093,434 UART: [afmc] SUBJECT.KEYID = 7
3,093,859 UART: [afmc] AUTHORITY.KEYID = 5
3,129,408 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,242 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,635 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,325 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,318 UART: [afmc] --
3,172,256 UART: [cold-reset] --
3,173,174 UART: [state] Locking Datavault
3,174,289 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,893 UART: [state] Locking ICCM
3,175,503 UART: [exit] Launching FMC @ 0x40000130
3,180,832 UART:
3,180,848 UART: Running Caliptra FMC ...
3,181,256 UART:
3,181,399 UART: [state] CFI Enabled
3,191,928 UART: [fht] FMC Alias Private Key: 7
3,299,591 UART: [art] Extend RT PCRs Done
3,300,019 UART: [art] Lock RT PCRs Done
3,301,437 UART: [art] Populate DV Done
3,309,692 UART: [fht] FMC Alias Private Key: 7
3,310,626 UART: [art] Derive CDI
3,310,906 UART: [art] Store in in slot 0x4
3,396,421 UART: [art] Derive Key Pair
3,396,781 UART: [art] Store priv key in slot 0x5
3,409,763 UART: [art] Derive Key Pair - Done
3,424,519 UART: [art] Signing Cert with AUTHO
3,424,999 UART: RITY.KEYID = 7
3,440,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,864 UART: [art] PUB.X = A15BF58261128146C1105F915160109BDD45CF2DAED88DDD87EDA859822E8D6F6D82191F2C6F0C27C649F4A67566E0DD
3,447,637 UART: [art] PUB.Y = 646D21ACDB9DF87BA3BD714F4EB8091C1B8C3EAB1251C4225AD28F6E8AA3FB5139B5C36F038E6428585CE326FCD432EA
3,454,599 UART: [art] SIG.R = 2A839064D4BE9A158CFC099A3B94D9680035F63739987E37DDA78AF7A57A92FD6A6C85739CCA89A6B06A905043694C50
3,461,344 UART: [art] SIG.S = 7504EAD04A7949E517315C4006ADD3A8B85D21D706F0A12E14DD51C679BE19E81E03008B9867EB2DF3F00D90393B4865
3,485,564 UART: Caliptra RT
3,485,909 UART: [state] CFI Enabled
3,594,297 UART: [rt] RT listening for mailbox commands...
3,594,960 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,665 UART: [rt]cmd =0x46504c54, len=4
3,625,886 >>> mbox cmd response data (8 bytes)
3,626,143 UART: [rt] FIPS self test
3,626,471 UART: [kat] ++
3,626,623 UART: [kat] sha1
3,630,946 UART: Fatal Error: 0x90060002
3,632,496 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,501 >>> mbox cmd response: failed
3,632,501 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,390 UART: [kat] SHA2-256
892,328 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,463 UART: [kat] HMAC-384Kdf
907,117 UART: [kat] LMS
1,475,313 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,923 UART: [idev] Erasing UDS.KEYID = 0
1,506,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,081 UART: [idev] --
1,516,214 UART: [ldev] ++
1,516,382 UART: [ldev] CDI.KEYID = 6
1,516,745 UART: [ldev] SUBJECT.KEYID = 5
1,517,171 UART: [ldev] AUTHORITY.KEYID = 7
1,517,634 UART: [ldev] FE.KEYID = 1
1,523,208 UART: [ldev] Erasing FE.KEYID = 1
1,548,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,653 UART: [ldev] --
1,588,146 UART: [fwproc] Waiting for Commands...
1,588,921 UART: [fwproc] Received command 0x46574c44
1,589,712 UART: [fwproc] Received Image of size 115304 bytes
2,899,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,261 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,990 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,944,260 >>> mbox cmd response: success
3,006,702 UART:
3,006,718 UART: Running Caliptra FMC ...
3,007,126 UART:
3,007,269 UART: [state] CFI Enabled
3,017,768 UART: [fht] FMC Alias Private Key: 7
3,125,863 UART: [art] Extend RT PCRs Done
3,126,291 UART: [art] Lock RT PCRs Done
3,127,707 UART: [art] Populate DV Done
3,136,054 UART: [fht] FMC Alias Private Key: 7
3,137,162 UART: [art] Derive CDI
3,137,442 UART: [art] Store in in slot 0x4
3,223,239 UART: [art] Derive Key Pair
3,223,599 UART: [art] Store priv key in slot 0x5
3,237,011 UART: [art] Derive Key Pair - Done
3,251,660 UART: [art] Signing Cert with AUTHO
3,252,140 UART: RITY.KEYID = 7
3,267,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,267,869 UART: [art] PUB.X = 1638F9C9340E0DE3B2DBF4331BB874E3F0ADCE87A518A59FBAE066FD8717A34EE561B65989C6C7FC0B73FCB9AABC61F0
3,274,652 UART: [art] PUB.Y = 7250B35607B8F8C2B1DBFB09CC924241451675687AEEB5FC6ED4DA4DACF921C874C32E1E87ED4E528F7684E23B657774
3,281,604 UART: [art] SIG.R = 7E2C7DA7FD576298D745DD79B6F1E7A3CA7EF512B2227D79831D43D58CCB8B96C4EA1C8359579885CCC474F9C9F6AA32
3,288,386 UART: [art] SIG.S = 4F9678629EE45F2D6A44F884318D47703D72CE63198B1F6BB9074A9B620B7DE1402FABBE42F19007F8EA556C6FBE329D
3,312,292 UART: Caliptra RT
3,312,637 UART: [state] CFI Enabled
3,420,339 UART: [rt] RT listening for mailbox commands...
3,421,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,635 UART: [rt]cmd =0x46504c54, len=4
3,451,750 >>> mbox cmd response data (8 bytes)
3,452,077 UART: [rt] FIPS self test
3,452,405 UART: [kat] ++
3,452,557 UART: [kat] sha1
3,456,908 UART: Fatal Error: 0x90060002
3,458,458 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,463 >>> mbox cmd response: failed
3,458,463 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,488 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,200 UART: [kat] SHA2-256
893,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,975 UART: [kat] ++
898,127 UART: [kat] sha1
902,417 UART: [kat] SHA2-256
904,357 UART: [kat] SHA2-384
907,140 UART: [kat] SHA2-512-ACC
909,041 UART: [kat] ECC-384
918,584 UART: [kat] HMAC-384Kdf
923,300 UART: [kat] LMS
1,171,628 UART: [kat] --
1,172,433 UART: [cold-reset] ++
1,172,989 UART: [fht] FHT @ 0x50003400
1,175,566 UART: [idev] ++
1,175,734 UART: [idev] CDI.KEYID = 6
1,176,094 UART: [idev] SUBJECT.KEYID = 7
1,176,518 UART: [idev] UDS.KEYID = 0
1,176,863 ready_for_fw is high
1,176,863 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,734 UART: [idev] Erasing UDS.KEYID = 0
1,201,343 UART: [idev] Sha1 KeyId Algorithm
1,209,931 UART: [idev] --
1,210,885 UART: [ldev] ++
1,211,053 UART: [ldev] CDI.KEYID = 6
1,211,416 UART: [ldev] SUBJECT.KEYID = 5
1,211,842 UART: [ldev] AUTHORITY.KEYID = 7
1,212,305 UART: [ldev] FE.KEYID = 1
1,217,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,283,002 UART: [fwproc] Wait for Commands...
1,283,620 UART: [fwproc] Recv command 0x46574c44
1,284,348 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,579 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,938 >>> mbox cmd response: success
2,788,992 UART: [afmc] ++
2,789,160 UART: [afmc] CDI.KEYID = 6
2,789,522 UART: [afmc] SUBJECT.KEYID = 7
2,789,947 UART: [afmc] AUTHORITY.KEYID = 5
2,825,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,001 UART: [afmc] --
2,868,967 UART: [cold-reset] --
2,869,811 UART: [state] Locking Datavault
2,870,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,428 UART: [state] Locking ICCM
2,872,058 UART: [exit] Launching FMC @ 0x40000130
2,877,387 UART:
2,877,403 UART: Running Caliptra FMC ...
2,877,811 UART:
2,877,865 UART: [state] CFI Enabled
2,888,192 UART: [fht] FMC Alias Private Key: 7
2,995,751 UART: [art] Extend RT PCRs Done
2,996,179 UART: [art] Lock RT PCRs Done
2,997,963 UART: [art] Populate DV Done
3,006,080 UART: [fht] FMC Alias Private Key: 7
3,007,248 UART: [art] Derive CDI
3,007,528 UART: [art] Store in in slot 0x4
3,092,561 UART: [art] Derive Key Pair
3,092,921 UART: [art] Store priv key in slot 0x5
3,106,553 UART: [art] Derive Key Pair - Done
3,121,335 UART: [art] Signing Cert with AUTHO
3,121,815 UART: RITY.KEYID = 7
3,137,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,936 UART: [art] PUB.X = 9256838879CB764CAFC1F13C9D1736AA163A35BB9128EDCF53F2BF2BAE791B637EC3313C1EF46B8BD1AE821D04AD2BCF
3,144,723 UART: [art] PUB.Y = 40122A82E482DA4D07DEB739DECAF53327C5A06572A1DC4B35BC2872F638AD6AB5E95EBA010307543346FDE77079066C
3,151,664 UART: [art] SIG.R = E7E02F52F908D31C0B1692487200AF22F3A98F6CCCC48A0CB57297D49BEFE0CA498329BB58FD17E1CC4F3A62523E8626
3,158,413 UART: [art] SIG.S = E0176EE47B984F2B16087D32F0AFCB9A2A2392954AFE445A5252865B6DDF5AD9F3699C116AB9C2DAEAA23E31F0C1E029
3,181,571 UART: Caliptra RT
3,181,824 UART: [state] CFI Enabled
3,289,678 UART: [rt] RT listening for mailbox commands...
3,290,341 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,112 UART: [rt]cmd =0x46504c54, len=4
3,321,501 >>> mbox cmd response data (8 bytes)
3,321,676 UART: [rt] FIPS self test
3,322,004 UART: [kat] ++
3,322,156 UART: [kat] sha1
3,326,393 UART: Fatal Error: 0x90060002
3,327,943 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,948 >>> mbox cmd response: failed
3,327,948 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
893,770 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,895 UART: [kat] ++
898,047 UART: [kat] sha1
902,333 UART: [kat] SHA2-256
904,273 UART: [kat] SHA2-384
907,028 UART: [kat] SHA2-512-ACC
908,929 UART: [kat] ECC-384
918,628 UART: [kat] HMAC-384Kdf
923,282 UART: [kat] LMS
1,171,610 UART: [kat] --
1,172,231 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,422 UART: [idev] ++
1,175,590 UART: [idev] CDI.KEYID = 6
1,175,950 UART: [idev] SUBJECT.KEYID = 7
1,176,374 UART: [idev] UDS.KEYID = 0
1,176,719 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,771 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,255 UART: [ldev] ++
1,211,423 UART: [ldev] CDI.KEYID = 6
1,211,786 UART: [ldev] SUBJECT.KEYID = 5
1,212,212 UART: [ldev] AUTHORITY.KEYID = 7
1,212,675 UART: [ldev] FE.KEYID = 1
1,217,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,061 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,192 UART: [fwproc] Recv command 0x46574c44
1,283,920 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,971 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,162 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,939 ready_for_fw is high
1,059,939 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,165 >>> mbox cmd response: success
2,701,295 UART:
2,701,311 UART: Running Caliptra FMC ...
2,701,719 UART:
2,701,773 UART: [state] CFI Enabled
2,712,104 UART: [fht] FMC Alias Private Key: 7
2,820,127 UART: [art] Extend RT PCRs Done
2,820,555 UART: [art] Lock RT PCRs Done
2,822,379 UART: [art] Populate DV Done
2,830,622 UART: [fht] FMC Alias Private Key: 7
2,831,640 UART: [art] Derive CDI
2,831,920 UART: [art] Store in in slot 0x4
2,917,457 UART: [art] Derive Key Pair
2,917,817 UART: [art] Store priv key in slot 0x5
2,931,413 UART: [art] Derive Key Pair - Done
2,946,254 UART: [art] Signing Cert with AUTHO
2,946,734 UART: RITY.KEYID = 7
2,962,108 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,873 UART: [art] PUB.X = C34D0FA691437F87237DF9E8B4AD444B28C899DD09B7EF9142DB1581D293E49C3EF701DC9CDC081B763ADD23805B96E7
2,969,641 UART: [art] PUB.Y = 0B576B650C0C504018BF1B7D393BC2CB1E1855D245BBC8ADAA160840E1322DF46470F1AC989E3AE393E692F2348465E8
2,976,583 UART: [art] SIG.R = 06256CD8F33AEE992D9C361BDD529EAE0BAB3AEBE0EF0AD8C123674A0D203430020B51EE204F557BC29164D373491A3E
2,983,347 UART: [art] SIG.S = 0F6FBFAD9CE19208F48D4A5A30614A0455B88F1E61F726C662B817CEBD6CD31E63A8875E8EABEFD6987B62EC9EF44C62
3,007,771 UART: Caliptra RT
3,008,024 UART: [state] CFI Enabled
3,115,633 UART: [rt] RT listening for mailbox commands...
3,116,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,033 UART: [rt]cmd =0x46504c54, len=4
3,147,214 >>> mbox cmd response data (8 bytes)
3,147,415 UART: [rt] FIPS self test
3,147,743 UART: [kat] ++
3,147,895 UART: [kat] sha1
3,152,154 UART: Fatal Error: 0x90060002
3,153,704 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,709 >>> mbox cmd response: failed
3,153,709 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,681 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
893,683 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,808 UART: [kat] ++
897,960 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
919,065 UART: [kat] HMAC-384Kdf
923,685 UART: [kat] LMS
1,172,013 UART: [kat] --
1,172,854 UART: [cold-reset] ++
1,173,400 UART: [fht] FHT @ 0x50003400
1,175,941 UART: [idev] ++
1,176,109 UART: [idev] CDI.KEYID = 6
1,176,469 UART: [idev] SUBJECT.KEYID = 7
1,176,893 UART: [idev] UDS.KEYID = 0
1,177,238 ready_for_fw is high
1,177,238 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,324 UART: [idev] Sha1 KeyId Algorithm
1,210,670 UART: [idev] --
1,211,504 UART: [ldev] ++
1,211,672 UART: [ldev] CDI.KEYID = 6
1,212,035 UART: [ldev] SUBJECT.KEYID = 5
1,212,461 UART: [ldev] AUTHORITY.KEYID = 7
1,212,924 UART: [ldev] FE.KEYID = 1
1,218,380 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,322 UART: [ldev] --
1,283,721 UART: [fwproc] Wait for Commands...
1,284,517 UART: [fwproc] Recv command 0x46574c44
1,285,245 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,600 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,779 >>> mbox cmd response: success
2,789,847 UART: [afmc] ++
2,790,015 UART: [afmc] CDI.KEYID = 6
2,790,377 UART: [afmc] SUBJECT.KEYID = 7
2,790,802 UART: [afmc] AUTHORITY.KEYID = 5
2,826,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,726 UART: [afmc] --
2,869,786 UART: [cold-reset] --
2,870,798 UART: [state] Locking Datavault
2,871,985 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,589 UART: [state] Locking ICCM
2,873,105 UART: [exit] Launching FMC @ 0x40000130
2,878,434 UART:
2,878,450 UART: Running Caliptra FMC ...
2,878,858 UART:
2,879,001 UART: [state] CFI Enabled
2,889,530 UART: [fht] FMC Alias Private Key: 7
2,997,647 UART: [art] Extend RT PCRs Done
2,998,075 UART: [art] Lock RT PCRs Done
2,999,619 UART: [art] Populate DV Done
3,008,148 UART: [fht] FMC Alias Private Key: 7
3,009,146 UART: [art] Derive CDI
3,009,426 UART: [art] Store in in slot 0x4
3,095,415 UART: [art] Derive Key Pair
3,095,775 UART: [art] Store priv key in slot 0x5
3,109,027 UART: [art] Derive Key Pair - Done
3,123,752 UART: [art] Signing Cert with AUTHO
3,124,232 UART: RITY.KEYID = 7
3,139,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,447 UART: [art] PUB.X = FD410D42D232C32BC721607FDC1240E2B7924D15876C4F45DC02254710B5BE08FE144A2916252D18FEE1F81104A4895D
3,147,203 UART: [art] PUB.Y = BC69DDC3B40FCCB9FE852452EFDCDD2A440E6BA1A9ECDECAAA05A89E57F906F36B57DCFFD73BF7704BA60BEAB0047CEA
3,154,177 UART: [art] SIG.R = 7AA7F23C2D2B7A18395C8946A35998FF5BC003F6510BCF7A1ACD1A7E080FDD845630147319DA15FD25105A4BDF5970D1
3,160,943 UART: [art] SIG.S = CCA22F13B9E6713ACBDEA61EFF71AC5A47B2196518B08B8B556569C81994389D260FD5E3B770F693DE23AF8CB6695250
3,184,415 UART: Caliptra RT
3,184,760 UART: [state] CFI Enabled
3,293,539 UART: [rt] RT listening for mailbox commands...
3,294,202 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,887 UART: [rt]cmd =0x46504c54, len=4
3,324,988 >>> mbox cmd response data (8 bytes)
3,325,261 UART: [rt] FIPS self test
3,325,589 UART: [kat] ++
3,325,741 UART: [kat] sha1
3,330,216 UART: Fatal Error: 0x90060002
3,331,766 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,771 >>> mbox cmd response: failed
3,331,771 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
893,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,692 UART: [kat] ++
897,844 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,387 UART: [kat] LMS
1,171,715 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,130 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,201,898 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,305 UART: [fwproc] Wait for Commands...
1,283,909 UART: [fwproc] Recv command 0x46574c44
1,284,637 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,006 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,375 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,502 ready_for_fw is high
1,060,502 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,202 >>> mbox cmd response: success
2,702,974 UART:
2,702,990 UART: Running Caliptra FMC ...
2,703,398 UART:
2,703,541 UART: [state] CFI Enabled
2,714,108 UART: [fht] FMC Alias Private Key: 7
2,823,069 UART: [art] Extend RT PCRs Done
2,823,497 UART: [art] Lock RT PCRs Done
2,825,383 UART: [art] Populate DV Done
2,833,620 UART: [fht] FMC Alias Private Key: 7
2,834,620 UART: [art] Derive CDI
2,834,900 UART: [art] Store in in slot 0x4
2,920,579 UART: [art] Derive Key Pair
2,920,939 UART: [art] Store priv key in slot 0x5
2,933,937 UART: [art] Derive Key Pair - Done
2,948,682 UART: [art] Signing Cert with AUTHO
2,949,162 UART: RITY.KEYID = 7
2,964,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,203 UART: [art] PUB.X = 17B541EFFB8C2F3DB381D593A8694E2973750C0E6D5569AAAECBA9CFE3CE47E5712BCA6DAD9077C65FD4279A69856D51
2,971,983 UART: [art] PUB.Y = FF6EF871F0DEFBD2085AEAF4CE0AA52F9323B3003464898E6D152B487422CF5EDEE19E915D6CFCE7E7EA765737B823A9
2,978,923 UART: [art] SIG.R = 48C720EE21F38E78C9A40200A9D2D013536AEFDDAB8D1A89A020E5DDB39BD762EB2C1DE934288130AED93E7B3F90385E
2,985,682 UART: [art] SIG.S = 33653C872A383290184220159A059914EB72D6C55D3BF093D2190D75714A67417F7CC85F6762BF7C01D4A3DB2F8F9671
3,009,368 UART: Caliptra RT
3,009,713 UART: [state] CFI Enabled
3,117,062 UART: [rt] RT listening for mailbox commands...
3,117,725 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,626 UART: [rt]cmd =0x46504c54, len=4
3,148,845 >>> mbox cmd response data (8 bytes)
3,149,006 UART: [rt] FIPS self test
3,149,334 UART: [kat] ++
3,149,486 UART: [kat] sha1
3,153,665 UART: Fatal Error: 0x90060002
3,155,215 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,220 >>> mbox cmd response: failed
3,155,220 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,656 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,866 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,174,209 ready_for_fw is high
1,174,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,264 UART: [ldev] ++
1,209,432 UART: [ldev] CDI.KEYID = 6
1,209,796 UART: [ldev] SUBJECT.KEYID = 5
1,210,223 UART: [ldev] AUTHORITY.KEYID = 7
1,210,686 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,084 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,127 UART: [fwproc] Recv command 0x46574c44
1,282,860 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,970 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,370 >>> mbox cmd response: success
2,786,481 UART: [afmc] ++
2,786,649 UART: [afmc] CDI.KEYID = 6
2,787,012 UART: [afmc] SUBJECT.KEYID = 7
2,787,438 UART: [afmc] AUTHORITY.KEYID = 5
2,822,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,556 UART: [afmc] --
2,866,544 UART: [cold-reset] --
2,867,354 UART: [state] Locking Datavault
2,868,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,133 UART: [state] Locking ICCM
2,869,725 UART: [exit] Launching FMC @ 0x40000130
2,875,054 UART:
2,875,070 UART: Running Caliptra FMC ...
2,875,478 UART:
2,875,532 UART: [state] CFI Enabled
2,886,237 UART: [fht] FMC Alias Private Key: 7
2,994,034 UART: [art] Extend RT PCRs Done
2,994,462 UART: [art] Lock RT PCRs Done
2,996,040 UART: [art] Populate DV Done
3,004,213 UART: [fht] FMC Alias Private Key: 7
3,005,167 UART: [art] Derive CDI
3,005,447 UART: [art] Store in in slot 0x4
3,091,726 UART: [art] Derive Key Pair
3,092,086 UART: [art] Store priv key in slot 0x5
3,105,024 UART: [art] Derive Key Pair - Done
3,119,839 UART: [art] Signing Cert with AUTHO
3,120,319 UART: RITY.KEYID = 7
3,135,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,974 UART: [art] PUB.X = 5ECE73E94E4AFBF3453CD77E41B14CD0946C234E4093E195473A258DF61492C7A00666E8F5191C4574AC8AACF2255CAA
3,142,749 UART: [art] PUB.Y = 4E51FA594844F297C58E319318FDD28ABEBC41A4BFE66BFF9540879F5EED95A9EBB30C2750ACE1F14B51085821F32D5D
3,149,707 UART: [art] SIG.R = 4F887E8AEED530EF7A296B8BA95161AD959C29967C36280B2F47C1837CD29B80110AA37EDD4A596ACE0C3B251B7B4C08
3,156,475 UART: [art] SIG.S = EBB6FD20499ECB13643DB7BED131CDC9ABB7841EE46308E40540707331DAD9CDDDF9F3C3F79A7D93D1ACFF329E38163D
3,180,472 UART: Caliptra RT
3,180,725 UART: [state] CFI Enabled
3,288,614 UART: [rt] RT listening for mailbox commands...
3,289,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,292 UART: [rt]cmd =0x46504c54, len=4
3,320,561 >>> mbox cmd response data (8 bytes)
3,320,868 UART: [rt] FIPS self test
3,321,196 UART: [kat] ++
3,321,348 UART: [kat] sha1
3,325,605 UART: Fatal Error: 0x90060002
3,327,155 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,160 >>> mbox cmd response: failed
3,327,160 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,273 UART: [kat] SHA2-256
901,213 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,173,865 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,401 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,904 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,698 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,060 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 ready_for_fw is high
1,055,610 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,936 >>> mbox cmd response: success
2,697,670 UART:
2,697,686 UART: Running Caliptra FMC ...
2,698,094 UART:
2,698,148 UART: [state] CFI Enabled
2,709,007 UART: [fht] FMC Alias Private Key: 7
2,817,252 UART: [art] Extend RT PCRs Done
2,817,680 UART: [art] Lock RT PCRs Done
2,819,440 UART: [art] Populate DV Done
2,827,761 UART: [fht] FMC Alias Private Key: 7
2,828,855 UART: [art] Derive CDI
2,829,135 UART: [art] Store in in slot 0x4
2,915,136 UART: [art] Derive Key Pair
2,915,496 UART: [art] Store priv key in slot 0x5
2,928,588 UART: [art] Derive Key Pair - Done
2,943,236 UART: [art] Signing Cert with AUTHO
2,943,716 UART: RITY.KEYID = 7
2,958,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,315 UART: [art] PUB.X = 694F9E83D926705CE6B75B33F8F40132BC45F30F21FC44640BD1075D912DA2236BC7F1C3386BF5929D2F999210C8BC86
2,966,073 UART: [art] PUB.Y = 8325C7FEF2F2FF50844E50A1FBE845AD330367D660FEAFDA09931A29B0776C651E77B8BC1AE82AB2B044ECF7DE9146C5
2,973,033 UART: [art] SIG.R = 54E846B665805563C1702ABF9BF11D06960C87A62B859295774A7D12B397DA46CE24ACEC3C5373EDD3CFE888285BFCF6
2,979,803 UART: [art] SIG.S = CD264453B9B284FCA1F1D66EE7B4EB2755F9C2746C163AE7AE539D5A5666160A87355475E47028549E06784245E7740E
3,003,627 UART: Caliptra RT
3,003,880 UART: [state] CFI Enabled
3,111,159 UART: [rt] RT listening for mailbox commands...
3,111,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,641 UART: [rt]cmd =0x46504c54, len=4
3,142,592 >>> mbox cmd response data (8 bytes)
3,142,939 UART: [rt] FIPS self test
3,143,267 UART: [kat] ++
3,143,419 UART: [kat] sha1
3,147,696 UART: Fatal Error: 0x90060002
3,149,246 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,251 >>> mbox cmd response: failed
3,149,251 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,268 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,482 UART: [kat] SHA2-256
902,422 UART: [kat] SHA2-384
905,371 UART: [kat] SHA2-512-ACC
907,272 UART: [kat] ECC-384
916,887 UART: [kat] HMAC-384Kdf
921,503 UART: [kat] LMS
1,169,815 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,175,024 ready_for_fw is high
1,175,024 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,777 UART: [ldev] ++
1,209,945 UART: [ldev] CDI.KEYID = 6
1,210,309 UART: [ldev] SUBJECT.KEYID = 5
1,210,736 UART: [ldev] AUTHORITY.KEYID = 7
1,211,199 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,281 UART: [ldev] --
1,282,751 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,135 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,113 >>> mbox cmd response: success
2,789,322 UART: [afmc] ++
2,789,490 UART: [afmc] CDI.KEYID = 6
2,789,853 UART: [afmc] SUBJECT.KEYID = 7
2,790,279 UART: [afmc] AUTHORITY.KEYID = 5
2,825,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,123 UART: [afmc] --
2,869,029 UART: [cold-reset] --
2,869,887 UART: [state] Locking Datavault
2,871,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,758 UART: [state] Locking ICCM
2,872,280 UART: [exit] Launching FMC @ 0x40000130
2,877,609 UART:
2,877,625 UART: Running Caliptra FMC ...
2,878,033 UART:
2,878,176 UART: [state] CFI Enabled
2,889,073 UART: [fht] FMC Alias Private Key: 7
2,997,110 UART: [art] Extend RT PCRs Done
2,997,538 UART: [art] Lock RT PCRs Done
2,998,892 UART: [art] Populate DV Done
3,007,447 UART: [fht] FMC Alias Private Key: 7
3,008,599 UART: [art] Derive CDI
3,008,879 UART: [art] Store in in slot 0x4
3,095,072 UART: [art] Derive Key Pair
3,095,432 UART: [art] Store priv key in slot 0x5
3,109,060 UART: [art] Derive Key Pair - Done
3,123,454 UART: [art] Signing Cert with AUTHO
3,123,934 UART: RITY.KEYID = 7
3,139,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,779 UART: [art] PUB.X = 655BB5B881C1EF0649E4CFBA98E42882ECFB1AC54F05D61ECE3FA7AE4CE262C6DC7E2744476A370B23DF1EB4A2639364
3,146,558 UART: [art] PUB.Y = 658439EA8361A1DBDE2DB107E9942A187CD42F6141DF53C38F5207D8D79FDAF18F2EFB46103BEF3E082C3E659662970F
3,153,504 UART: [art] SIG.R = EC559351F43D7659533EDA8B20C9A96BA95178ECBF2041372FCA2A8E92A854A4684C59BE997690183EB0DEBD0D46084B
3,160,274 UART: [art] SIG.S = 1EAB95026C6EB975CA48852A778CBF976AC50BD841FAE919BEBDE81B7F6C23A8C1EBF9131BD47D2C702326F3FEDF04FD
3,184,330 UART: Caliptra RT
3,184,675 UART: [state] CFI Enabled
3,292,458 UART: [rt] RT listening for mailbox commands...
3,293,121 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,846 UART: [rt]cmd =0x46504c54, len=4
3,323,937 >>> mbox cmd response data (8 bytes)
3,324,214 UART: [rt] FIPS self test
3,324,542 UART: [kat] ++
3,324,694 UART: [kat] sha1
3,328,943 UART: Fatal Error: 0x90060002
3,330,493 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,498 >>> mbox cmd response: failed
3,330,498 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,198,688 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,497 UART: [ldev] ++
1,208,665 UART: [ldev] CDI.KEYID = 6
1,209,029 UART: [ldev] SUBJECT.KEYID = 5
1,209,456 UART: [ldev] AUTHORITY.KEYID = 7
1,209,919 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,281,121 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,651 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,829 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 ready_for_fw is high
1,056,547 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,943 >>> mbox cmd response: success
2,700,275 UART:
2,700,291 UART: Running Caliptra FMC ...
2,700,699 UART:
2,700,842 UART: [state] CFI Enabled
2,711,541 UART: [fht] FMC Alias Private Key: 7
2,819,980 UART: [art] Extend RT PCRs Done
2,820,408 UART: [art] Lock RT PCRs Done
2,821,986 UART: [art] Populate DV Done
2,830,175 UART: [fht] FMC Alias Private Key: 7
2,831,173 UART: [art] Derive CDI
2,831,453 UART: [art] Store in in slot 0x4
2,917,070 UART: [art] Derive Key Pair
2,917,430 UART: [art] Store priv key in slot 0x5
2,930,466 UART: [art] Derive Key Pair - Done
2,945,360 UART: [art] Signing Cert with AUTHO
2,945,840 UART: RITY.KEYID = 7
2,960,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,603 UART: [art] PUB.X = 521D390749488BCC11F55AA5597CC2BADE58A44354DCC0861D3A4063DAB42B6D2E079806B24D3211A3553F8B78485893
2,968,362 UART: [art] PUB.Y = 33A5A9216F6BA3C4378E771A1EA6EDCA1DFA544E777C618D4F3D0BB83A101FA2F9DE14C8F734ADE58056B74AE1E203AF
2,975,326 UART: [art] SIG.R = 4FA1E6DCA72BEE9EC310AFB46BF54012861247C54275681D092F60533F9F7C94B0E625604B478116AF404A0D92F2DA42
2,982,092 UART: [art] SIG.S = D48E98A19CA5ED2026D5C16AB00A16A4452447FB56DA7937FCBF3CF768EB52363FD73ED1D61BA65C06D8D8A88810FEF8
3,005,669 UART: Caliptra RT
3,006,014 UART: [state] CFI Enabled
3,113,505 UART: [rt] RT listening for mailbox commands...
3,114,168 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,215 UART: [rt]cmd =0x46504c54, len=4
3,145,314 >>> mbox cmd response data (8 bytes)
3,145,517 UART: [rt] FIPS self test
3,145,845 UART: [kat] ++
3,145,997 UART: [kat] sha1
3,150,128 UART: Fatal Error: 0x90060002
3,151,678 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,683 >>> mbox cmd response: failed
3,151,683 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,813 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,199 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,508,640 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,652,812 >>> mbox cmd response: failed
2,653,364 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,796,547 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,874,309 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,421,721 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,520,155 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,664,593 >>> mbox cmd response: failed
2,665,150 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,808,340 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
4,860,434 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,409,857 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
2,865,209 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,009,237 >>> mbox cmd response: failed
3,009,801 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,153,132 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,577,981 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,021,429 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,869,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,013,906 >>> mbox cmd response: failed
3,014,486 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,157,666 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
21,582,844 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,030,986 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,527,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,672,166 >>> mbox cmd response: failed
2,672,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,816,544 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,433,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,175 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,525,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,670,674 >>> mbox cmd response: failed
2,671,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,815,009 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,456,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,128 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,880,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,025,310 >>> mbox cmd response: failed
3,025,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,691 >>> mbox cmd response: failed
Initializing fuses
986 writing to cptra_bootfsm_go
20,182,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,927,643 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,881,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,025,752 >>> mbox cmd response: failed
3,026,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,064 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,192,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,920,994 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,513,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,658,546 >>> mbox cmd response: failed
2,659,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,802,845 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,452,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,349,428 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,523,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,668,705 >>> mbox cmd response: failed
2,669,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,813,117 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,421,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,233,291 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,593 writing to cptra_bootfsm_go
2,874,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,018,635 >>> mbox cmd response: failed
3,019,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,943 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,170,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,891,064 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,877,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,022,284 >>> mbox cmd response: failed
3,022,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,662 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,176,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,892,861 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,240 >>> mbox cmd response: failed
86,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,158 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,088 >>> mbox cmd response: failed
86,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,780 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,275 >>> mbox cmd response: failed
86,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,353 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,967 >>> mbox cmd response: failed
85,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,037 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,162 >>> mbox cmd response: failed
86,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,938 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,712 >>> mbox cmd response: failed
85,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,060 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,969 >>> mbox cmd response: failed
85,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,205 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,691 >>> mbox cmd response: failed
85,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,513 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,036 >>> mbox cmd response: failed
86,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,768 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,848 >>> mbox cmd response: failed
85,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,322 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,091 >>> mbox cmd response: failed
86,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,899 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,863 >>> mbox cmd response: failed
85,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,983 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,227 UART:
192,583 UART: Running Caliptra ROM ...
193,711 UART:
193,860 UART: [state] CFI Enabled
266,343 UART: [state] LifecycleState = Unprovisioned
268,337 UART: [state] DebugLocked = No
271,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,312 UART: [kat] SHA2-256
445,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,500 UART: [kat] ++
456,026 UART: [kat] sha1
466,902 UART: [kat] SHA2-256
469,625 UART: [kat] SHA2-384
477,103 UART: [kat] SHA2-512-ACC
479,472 UART: [kat] ECC-384
2,771,106 UART: [kat] HMAC-384Kdf
2,802,247 UART: [kat] LMS
3,992,524 UART: [kat] --
3,997,957 UART: [cold-reset] ++
3,999,746 UART: [fht] Storing FHT @ 0x50003400
4,011,748 UART: [idev] ++
4,012,360 UART: [idev] CDI.KEYID = 6
4,013,289 UART: [idev] SUBJECT.KEYID = 7
4,014,474 UART: [idev] UDS.KEYID = 0
4,015,462 ready_for_fw is high
4,015,682 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,160,225 UART: [idev] Erasing UDS.KEYID = 0
7,352,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,374,623 UART: [idev] --
7,378,704 UART: [ldev] ++
7,379,284 UART: [ldev] CDI.KEYID = 6
7,380,171 UART: [ldev] SUBJECT.KEYID = 5
7,381,442 UART: [ldev] AUTHORITY.KEYID = 7
7,382,676 UART: [ldev] FE.KEYID = 1
7,425,752 UART: [ldev] Erasing FE.KEYID = 1
10,759,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,946 UART: [ldev] --
13,120,110 UART: [fwproc] Waiting for Commands...
13,122,974 UART: [fwproc] Received command 0x46574c44
13,125,159 UART: [fwproc] Received Image of size 114996 bytes
17,192,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,661,449 >>> mbox cmd response: success
17,665,398 UART: [afmc] ++
17,665,992 UART: [afmc] CDI.KEYID = 6
17,666,932 UART: [afmc] SUBJECT.KEYID = 7
17,668,198 UART: [afmc] AUTHORITY.KEYID = 5
21,038,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,338,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,340,562 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,355,003 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,369,827 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,384,266 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,406,587 UART: [afmc] --
23,410,613 UART: [cold-reset] --
23,414,854 UART: [state] Locking Datavault
23,419,940 UART: [state] Locking PCR0, PCR1 and PCR31
23,421,692 UART: [state] Locking ICCM
23,424,031 UART: [exit] Launching FMC @ 0x40000130
23,432,434 UART:
23,432,682 UART: Running Caliptra FMC ...
23,433,787 UART:
23,433,947 UART: [state] CFI Enabled
23,496,322 UART: [fht] FMC Alias Private Key: 7
25,834,104 UART: [art] Extend RT PCRs Done
25,835,326 UART: [art] Lock RT PCRs Done
25,836,867 UART: [art] Populate DV Done
25,842,411 UART: [fht] FMC Alias Private Key: 7
25,843,959 UART: [art] Derive CDI
25,844,722 UART: [art] Store in in slot 0x4
25,904,629 UART: [art] Derive Key Pair
25,905,676 UART: [art] Store priv key in slot 0x5
29,198,702 UART: [art] Derive Key Pair - Done
29,211,373 UART: [art] Signing Cert with AUTHO
29,212,702 UART: RITY.KEYID = 7
31,500,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,930 UART: [art] PUB.X = EFAC6E0207FC9E6EEA4E311A2F02272D3AA1E5BE50B4D6B9C288E6757BF2E17F3FADE764A5E10CF1692836EFB83D0318
31,509,238 UART: [art] PUB.Y = 34BB5AD594A21C7EA4DD845496CBD79A67ABBD6C8D10FBBD07BFCF6899E69A9287EC5F43E0450FFF5A06AD881C555813
31,516,520 UART: [art] SIG.R = ED925F9E96DE5E610619B0726FDBDFABFFE97F8C8FF53A52DC1B709809C6998412BDDE98243467E3A5B6F5E20C29964B
31,523,860 UART: [art] SIG.S = 829B46E117C92D4E95CBC523F215BEAF48CF4A47010C8DEC5423CFC84452662DD0E7924FA6B8EBD216758E881FD1D7F6
32,829,115 UART: Caliptra RT
32,829,830 UART: [state] CFI Enabled
33,002,930 UART: [rt] RT listening for mailbox commands...
33,004,809 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,034,777 UART: [rt]cmd =0x46504c54, len=4
33,036,250 >>> mbox cmd response data (8 bytes)
33,037,661 UART: [rt] FIPS self test
33,038,609 UART: [kat] ++
33,039,059 UART: [kat] sha1
33,043,575 UART: [kat] SHA2-256
33,044,316 UART: Fatal Error: 0x90010001
33,079,555 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,223,999 >>> mbox cmd response: failed
33,224,617 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,368,818 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,015 UART:
190,311 UART: Running Caliptra ROM ...
191,361 UART:
191,501 UART: [state] CFI Enabled
255,996 UART: [state] LifecycleState = Unprovisioned
257,967 UART: [state] DebugLocked = No
259,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,188 UART: [kat] SHA2-256
433,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,408 UART: [kat] ++
444,855 UART: [kat] sha1
456,977 UART: [kat] SHA2-256
459,709 UART: [kat] SHA2-384
464,282 UART: [kat] SHA2-512-ACC
466,626 UART: [kat] ECC-384
2,758,415 UART: [kat] HMAC-384Kdf
2,790,748 UART: [kat] LMS
3,981,069 UART: [kat] --
3,986,296 UART: [cold-reset] ++
3,988,933 UART: [fht] Storing FHT @ 0x50003400
4,001,766 UART: [idev] ++
4,002,372 UART: [idev] CDI.KEYID = 6
4,003,268 UART: [idev] SUBJECT.KEYID = 7
4,004,332 UART: [idev] UDS.KEYID = 0
4,005,927 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,150,445 UART: [idev] Erasing UDS.KEYID = 0
7,339,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,629 UART: [idev] --
7,365,868 UART: [ldev] ++
7,366,480 UART: [ldev] CDI.KEYID = 6
7,367,366 UART: [ldev] SUBJECT.KEYID = 5
7,368,586 UART: [ldev] AUTHORITY.KEYID = 7
7,369,881 UART: [ldev] FE.KEYID = 1
7,412,636 UART: [ldev] Erasing FE.KEYID = 1
10,743,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,193 UART: [ldev] --
13,105,405 UART: [fwproc] Waiting for Commands...
13,107,013 UART: [fwproc] Received command 0x46574c44
13,109,200 UART: [fwproc] Received Image of size 114996 bytes
17,170,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,638,516 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,784,130 ready_for_fw is high
3,784,544 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,906,529 >>> mbox cmd response: success
23,592,958 UART:
23,593,387 UART: Running Caliptra FMC ...
23,594,528 UART:
23,594,690 UART: [state] CFI Enabled
23,663,473 UART: [fht] FMC Alias Private Key: 7
26,001,510 UART: [art] Extend RT PCRs Done
26,002,741 UART: [art] Lock RT PCRs Done
26,004,079 UART: [art] Populate DV Done
26,009,346 UART: [fht] FMC Alias Private Key: 7
26,010,901 UART: [art] Derive CDI
26,011,671 UART: [art] Store in in slot 0x4
26,072,784 UART: [art] Derive Key Pair
26,073,832 UART: [art] Store priv key in slot 0x5
29,366,198 UART: [art] Derive Key Pair - Done
29,379,088 UART: [art] Signing Cert with AUTHO
29,380,396 UART: RITY.KEYID = 7
31,668,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,224 UART: [art] PUB.X = 99D8951592BB6D873A5BD10B0EF97C32CEEA943EC9951CB581E56A124D1B530C6274AFD880FCD804F4767F38658C16AA
31,677,487 UART: [art] PUB.Y = 22B126D69FC1ABEB23F457A6A315E826DFC8C671A8839F7A0E2DB4813117D3C62045F663A8B42303BF84F7A69B0BDAFA
31,684,752 UART: [art] SIG.R = D2CAF2F0944B3ACD62A7868489736D0C8D120AFB336603EF43042A88326B8DB93A52ED06F7F73519CD3BB27DBDDAD772
31,692,124 UART: [art] SIG.S = 3A0014EC6BC5D5E1FA3CA23FF9B1F4AB11B6A283CDD6305B08803F95A7486EFDDB43B3C60657A92E940301E41FF8C50E
32,997,531 UART: Caliptra RT
32,998,246 UART: [state] CFI Enabled
33,160,145 UART: [rt] RT listening for mailbox commands...
33,162,141 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,191,946 UART: [rt]cmd =0x46504c54, len=4
33,193,455 >>> mbox cmd response data (8 bytes)
33,194,801 UART: [rt] FIPS self test
33,195,756 UART: [kat] ++
33,196,206 UART: [kat] sha1
33,200,613 UART: [kat] SHA2-256
33,201,365 UART: Fatal Error: 0x90010001
33,236,593 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,381,083 >>> mbox cmd response: failed
33,381,745 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,526,106 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,795,119 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,876,082 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,384 UART:
192,761 UART: Running Caliptra ROM ...
193,865 UART:
603,641 UART: [state] CFI Enabled
621,034 UART: [state] LifecycleState = Unprovisioned
622,958 UART: [state] DebugLocked = No
624,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,380 UART: [kat] SHA2-256
799,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,644 UART: [kat] ++
810,272 UART: [kat] sha1
821,512 UART: [kat] SHA2-256
824,234 UART: [kat] SHA2-384
829,585 UART: [kat] SHA2-512-ACC
831,955 UART: [kat] ECC-384
3,116,191 UART: [kat] HMAC-384Kdf
3,127,729 UART: [kat] LMS
4,317,832 UART: [kat] --
4,322,058 UART: [cold-reset] ++
4,323,225 UART: [fht] Storing FHT @ 0x50003400
4,334,561 UART: [idev] ++
4,335,203 UART: [idev] CDI.KEYID = 6
4,336,089 UART: [idev] SUBJECT.KEYID = 7
4,337,341 UART: [idev] UDS.KEYID = 0
4,338,314 ready_for_fw is high
4,338,550 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,123 UART: [idev] Erasing UDS.KEYID = 0
7,624,268 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,279 UART: [idev] --
7,650,943 UART: [ldev] ++
7,651,549 UART: [ldev] CDI.KEYID = 6
7,652,499 UART: [ldev] SUBJECT.KEYID = 5
7,653,715 UART: [ldev] AUTHORITY.KEYID = 7
7,654,950 UART: [ldev] FE.KEYID = 1
7,666,201 UART: [ldev] Erasing FE.KEYID = 1
10,951,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,954 UART: [ldev] --
13,311,684 UART: [fwproc] Waiting for Commands...
13,314,511 UART: [fwproc] Received command 0x46574c44
13,316,760 UART: [fwproc] Received Image of size 114996 bytes
17,372,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,839,898 >>> mbox cmd response: success
17,844,436 UART: [afmc] ++
17,845,030 UART: [afmc] CDI.KEYID = 6
17,845,949 UART: [afmc] SUBJECT.KEYID = 7
17,847,222 UART: [afmc] AUTHORITY.KEYID = 5
21,163,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,883 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,205 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,059 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,511 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,962 UART: [afmc] --
23,528,724 UART: [cold-reset] --
23,533,667 UART: [state] Locking Datavault
23,538,050 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,804 UART: [state] Locking ICCM
23,541,093 UART: [exit] Launching FMC @ 0x40000130
23,549,488 UART:
23,549,735 UART: Running Caliptra FMC ...
23,550,839 UART:
23,551,010 UART: [state] CFI Enabled
23,559,012 UART: [fht] FMC Alias Private Key: 7
25,889,927 UART: [art] Extend RT PCRs Done
25,891,157 UART: [art] Lock RT PCRs Done
25,892,541 UART: [art] Populate DV Done
25,897,631 UART: [fht] FMC Alias Private Key: 7
25,899,280 UART: [art] Derive CDI
25,900,117 UART: [art] Store in in slot 0x4
25,942,819 UART: [art] Derive Key Pair
25,943,820 UART: [art] Store priv key in slot 0x5
29,185,937 UART: [art] Derive Key Pair - Done
29,198,945 UART: [art] Signing Cert with AUTHO
29,200,246 UART: RITY.KEYID = 7
31,479,561 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,088 UART: [art] PUB.X = 014080C9F1D1D1CC58762414BD0F4175D0C29C67681297576CDAEAADB88E81557673C88A0A96314171AF77E1236D3419
31,488,303 UART: [art] PUB.Y = 5C4E575B6EF5F900B1081180BC04B0489673BAE83DFF8FCE305C087296459980660F5582118D36FE480E3C6C8FBA878D
31,495,535 UART: [art] SIG.R = ED21DDFE7F0F58201B3ABF7B3104B2804A40A73B2E814E1BB5AEB98DC8C5877926709F18A952E5D3B3477337760F7BC9
31,502,892 UART: [art] SIG.S = 4DB2319ADAD99639F21BF43551885C3420DF04F6864C399C09344DF6921152854A2F0C0B4A8FF0D74B05CDCE7A45A3F2
32,807,572 UART: Caliptra RT
32,808,289 UART: [state] CFI Enabled
32,926,108 UART: [rt] RT listening for mailbox commands...
32,927,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,597 UART: [rt]cmd =0x46504c54, len=4
32,959,175 >>> mbox cmd response data (8 bytes)
32,960,042 UART: [rt] FIPS self test
32,960,997 UART: [kat] ++
32,961,450 UART: [kat] sha1
32,965,801 UART: [kat] SHA2-256
32,966,596 UART: Fatal Error: 0x90010001
33,001,802 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,146,232 >>> mbox cmd response: failed
33,146,899 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,291,221 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,043 UART:
190,335 UART: Running Caliptra ROM ...
191,368 UART:
7,229,882 UART: [state] CFI Enabled
7,243,732 UART: [state] LifecycleState = Unprovisioned
7,245,693 UART: [state] DebugLocked = No
7,246,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,251,241 UART: [kat] SHA2-256
7,420,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,431,517 UART: [kat] ++
7,432,003 UART: [kat] sha1
7,442,359 UART: [kat] SHA2-256
7,445,049 UART: [kat] SHA2-384
7,450,609 UART: [kat] SHA2-512-ACC
7,452,966 UART: [kat] ECC-384
9,739,569 UART: [kat] HMAC-384Kdf
9,750,721 UART: [kat] LMS
10,940,820 UART: [kat] --
10,946,328 UART: [cold-reset] ++
10,948,535 UART: [fht] Storing FHT @ 0x50003400
10,959,874 UART: [idev] ++
10,960,451 UART: [idev] CDI.KEYID = 6
10,961,471 UART: [idev] SUBJECT.KEYID = 7
10,962,628 UART: [idev] UDS.KEYID = 0
10,964,207 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,108,588 UART: [idev] Erasing UDS.KEYID = 0
14,248,042 UART: [idev] Using Sha1 for KeyId Algorithm
14,270,248 UART: [idev] --
14,273,485 UART: [ldev] ++
14,274,054 UART: [ldev] CDI.KEYID = 6
14,275,020 UART: [ldev] SUBJECT.KEYID = 5
14,276,234 UART: [ldev] AUTHORITY.KEYID = 7
14,277,619 UART: [ldev] FE.KEYID = 1
14,287,015 UART: [ldev] Erasing FE.KEYID = 1
17,577,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,872,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,886,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,901,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,916,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,935,733 UART: [ldev] --
19,939,645 UART: [fwproc] Waiting for Commands...
19,941,258 UART: [fwproc] Received command 0x46574c44
19,943,446 UART: [fwproc] Received Image of size 114996 bytes
24,013,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,088,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,157,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,478,739 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,133,415 ready_for_fw is high
4,133,976 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,099,961 >>> mbox cmd response: success
23,745,584 UART:
23,745,995 UART: Running Caliptra FMC ...
23,747,143 UART:
23,747,308 UART: [state] CFI Enabled
23,754,980 UART: [fht] FMC Alias Private Key: 7
26,086,133 UART: [art] Extend RT PCRs Done
26,087,367 UART: [art] Lock RT PCRs Done
26,088,949 UART: [art] Populate DV Done
26,094,481 UART: [fht] FMC Alias Private Key: 7
26,096,190 UART: [art] Derive CDI
26,097,009 UART: [art] Store in in slot 0x4
26,139,368 UART: [art] Derive Key Pair
26,140,413 UART: [art] Store priv key in slot 0x5
29,383,015 UART: [art] Derive Key Pair - Done
29,396,124 UART: [art] Signing Cert with AUTHO
29,397,430 UART: RITY.KEYID = 7
31,676,871 UART: [art] Erasing AUTHORITY.KEYID = 7
31,678,382 UART: [art] PUB.X = 0DCFFC7315BF8760CE90F5E0B08B34E64BF4A04EB644B18BEA6318E4B7C7824DAEBBC6D6B257C6D87FFCC8D9A1358E19
31,685,633 UART: [art] PUB.Y = 99984B7A86A4437027BB20E81A0524D87640461F8D3DA0E54524B02A1A5DEB98816C7B008D08BF22F34AFDDF2D73C593
31,692,840 UART: [art] SIG.R = EAF0A06D04AB16112B770C2A01E5FC5CA24A80FCAA03170FB8566EF8956F2716AC1B6D2ECEA4298FEB0A7B32C599A270
31,700,242 UART: [art] SIG.S = 280B09B8CD98E7518F45EE2AFF5AA4B6FD3E752EDDAAE95E12D9F8D933E954E082304E628CB76A2E2C22F5BFBAE8E09A
33,004,959 UART: Caliptra RT
33,005,680 UART: [state] CFI Enabled
33,123,202 UART: [rt] RT listening for mailbox commands...
33,125,066 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,154,853 UART: [rt]cmd =0x46504c54, len=4
33,156,332 >>> mbox cmd response data (8 bytes)
33,157,255 UART: [rt] FIPS self test
33,158,139 UART: [kat] ++
33,158,585 UART: [kat] sha1
33,163,285 UART: [kat] SHA2-256
33,164,033 UART: Fatal Error: 0x90010001
33,199,401 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,343,904 >>> mbox cmd response: failed
33,344,530 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,488,726 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
10,577,414 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,524,565 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,292 UART:
192,660 UART: Running Caliptra ROM ...
193,877 UART:
194,032 UART: [state] CFI Enabled
262,172 UART: [state] LifecycleState = Unprovisioned
264,079 UART: [state] DebugLocked = No
266,329 UART: [state] WD Timer not started. Device not locked for debugging
269,505 UART: [kat] SHA2-256
448,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,171 UART: [kat] ++
460,710 UART: [kat] sha1
472,325 UART: [kat] SHA2-256
475,384 UART: [kat] SHA2-384
482,373 UART: [kat] SHA2-512-ACC
485,311 UART: [kat] ECC-384
2,946,392 UART: [kat] HMAC-384Kdf
2,970,570 UART: [kat] LMS
3,500,062 UART: [kat] --
3,504,063 UART: [cold-reset] ++
3,505,076 UART: [fht] FHT @ 0x50003400
3,517,341 UART: [idev] ++
3,517,913 UART: [idev] CDI.KEYID = 6
3,518,947 UART: [idev] SUBJECT.KEYID = 7
3,520,052 UART: [idev] UDS.KEYID = 0
3,520,987 ready_for_fw is high
3,521,197 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,250 UART: [idev] Erasing UDS.KEYID = 0
6,027,008 UART: [idev] Sha1 KeyId Algorithm
6,050,457 UART: [idev] --
6,053,945 UART: [ldev] ++
6,054,528 UART: [ldev] CDI.KEYID = 6
6,055,445 UART: [ldev] SUBJECT.KEYID = 5
6,056,607 UART: [ldev] AUTHORITY.KEYID = 7
6,057,841 UART: [ldev] FE.KEYID = 1
6,101,812 UART: [ldev] Erasing FE.KEYID = 1
8,607,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,508 UART: [ldev] --
10,414,777 UART: [fwproc] Wait for Commands...
10,417,199 UART: [fwproc] Recv command 0x46574c44
10,419,319 UART: [fwproc] Recv'd Img size: 115304 bytes
13,843,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,911,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,980,449 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,302,506 >>> mbox cmd response: success
14,307,590 UART: [afmc] ++
14,308,174 UART: [afmc] CDI.KEYID = 6
14,309,084 UART: [afmc] SUBJECT.KEYID = 7
14,310,247 UART: [afmc] AUTHORITY.KEYID = 5
16,851,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,593,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,609,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,624,975 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,649,181 UART: [afmc] --
18,653,334 UART: [cold-reset] --
18,657,634 UART: [state] Locking Datavault
18,661,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,337 UART: [state] Locking ICCM
18,664,677 UART: [exit] Launching FMC @ 0x40000130
18,673,069 UART:
18,673,314 UART: Running Caliptra FMC ...
18,674,345 UART:
18,674,493 UART: [state] CFI Enabled
18,736,913 UART: [fht] FMC Alias Private Key: 7
20,501,273 UART: [art] Extend RT PCRs Done
20,502,486 UART: [art] Lock RT PCRs Done
20,504,432 UART: [art] Populate DV Done
20,509,845 UART: [fht] FMC Alias Private Key: 7
20,511,328 UART: [art] Derive CDI
20,512,087 UART: [art] Store in in slot 0x4
20,569,466 UART: [art] Derive Key Pair
20,570,499 UART: [art] Store priv key in slot 0x5
23,033,952 UART: [art] Derive Key Pair - Done
23,047,280 UART: [art] Signing Cert with AUTHO
23,048,588 UART: RITY.KEYID = 7
24,759,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,942 UART: [art] PUB.X = D63F6F1E1EF3C4C2A74A56C95BADA27C82F81999630938548145171BAE38248D3B174B8A4068BF10D4D7D4815B97CF4D
24,767,985 UART: [art] PUB.Y = 293A2C90D0A5A32B3728655BEF55F92D9C22653284169C82F7B023F7441D7C3EAB08946DC75B24F51B93C70133000CD0
24,775,168 UART: [art] SIG.R = E1344098A574755177DEDB68AA170F2097DA4694F55A0CF94D482B3FED909A5B945F7FC8529B2753F51983C8D8A24844
24,782,570 UART: [art] SIG.S = 111D9C4B42BECFF2DC87893687F5606A3D2CC25BEB9AB7F83F236B661617D6877519D4ED7F09310A3275C1462E000F2D
25,761,554 UART: Caliptra RT
25,762,268 UART: [state] CFI Enabled
25,927,406 UART: [rt] RT listening for mailbox commands...
25,929,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,763 UART: [rt]cmd =0x46504c54, len=4
25,960,323 >>> mbox cmd response data (8 bytes)
25,961,524 UART: [rt] FIPS self test
25,962,475 UART: [kat] ++
25,962,930 UART: [kat] sha1
25,967,490 UART: [kat] SHA2-256
25,968,388 UART: Fatal Error: 0x90010001
26,003,465 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,148,271 >>> mbox cmd response: failed
26,148,861 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,293,650 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,019 UART:
190,307 UART: Running Caliptra ROM ...
191,334 UART:
191,474 UART: [state] CFI Enabled
253,148 UART: [state] LifecycleState = Unprovisioned
255,085 UART: [state] DebugLocked = No
257,462 UART: [state] WD Timer not started. Device not locked for debugging
261,407 UART: [kat] SHA2-256
440,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,063 UART: [kat] ++
452,517 UART: [kat] sha1
464,254 UART: [kat] SHA2-256
467,316 UART: [kat] SHA2-384
472,675 UART: [kat] SHA2-512-ACC
475,669 UART: [kat] ECC-384
2,938,221 UART: [kat] HMAC-384Kdf
2,962,543 UART: [kat] LMS
3,491,969 UART: [kat] --
3,494,255 UART: [cold-reset] ++
3,495,653 UART: [fht] FHT @ 0x50003400
3,507,342 UART: [idev] ++
3,508,014 UART: [idev] CDI.KEYID = 6
3,508,916 UART: [idev] SUBJECT.KEYID = 7
3,510,026 UART: [idev] UDS.KEYID = 0
3,511,547 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,656,374 UART: [idev] Erasing UDS.KEYID = 0
6,015,008 UART: [idev] Sha1 KeyId Algorithm
6,037,871 UART: [idev] --
6,041,928 UART: [ldev] ++
6,042,500 UART: [ldev] CDI.KEYID = 6
6,043,393 UART: [ldev] SUBJECT.KEYID = 5
6,044,554 UART: [ldev] AUTHORITY.KEYID = 7
6,045,846 UART: [ldev] FE.KEYID = 1
6,090,668 UART: [ldev] Erasing FE.KEYID = 1
8,595,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,470 UART: [ldev] --
10,405,368 UART: [fwproc] Wait for Commands...
10,406,982 UART: [fwproc] Recv command 0x46574c44
10,409,078 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,185 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,291,368 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,383,891 ready_for_fw is high
3,384,545 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,081,372 >>> mbox cmd response: success
18,367,052 UART:
18,367,474 UART: Running Caliptra FMC ...
18,368,591 UART:
18,368,743 UART: [state] CFI Enabled
18,433,490 UART: [fht] FMC Alias Private Key: 7
20,197,043 UART: [art] Extend RT PCRs Done
20,198,275 UART: [art] Lock RT PCRs Done
20,200,094 UART: [art] Populate DV Done
20,205,276 UART: [fht] FMC Alias Private Key: 7
20,206,990 UART: [art] Derive CDI
20,207,731 UART: [art] Store in in slot 0x4
20,265,915 UART: [art] Derive Key Pair
20,266,958 UART: [art] Store priv key in slot 0x5
22,730,026 UART: [art] Derive Key Pair - Done
22,742,927 UART: [art] Signing Cert with AUTHO
22,744,303 UART: RITY.KEYID = 7
24,455,109 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,642 UART: [art] PUB.X = 5D1D9FADDB29B1CA0A3D2BAE5FF7CFBD23647C27039A9C0B6E524F3C6D127C42BFC5DF1C818B139E634BAF6F695EFC40
24,463,903 UART: [art] PUB.Y = 89B53E8E8F7AB4F15ED1AA7A1B392D7BECDBBCFA233FAAE609915DE7DA01686C00FA5657FAD1CE35648F583A9930EE8D
24,471,169 UART: [art] SIG.R = 382E95A5A25B6D71B25B34215D0030CA57AB514FBD277FABD854B09BEEAA45439725CEB415871175A33F674B1CF02789
24,478,567 UART: [art] SIG.S = 0081030DCA930C3157B96CFA8E72D7DD483EBACABEDF0490E5691E64442DAD70CC8E26D6E0160F176D6F145FD0B68D15
25,457,028 UART: Caliptra RT
25,457,738 UART: [state] CFI Enabled
25,622,641 UART: [rt] RT listening for mailbox commands...
25,624,505 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,356 UART: [rt]cmd =0x46504c54, len=4
25,655,933 >>> mbox cmd response data (8 bytes)
25,656,996 UART: [rt] FIPS self test
25,657,931 UART: [kat] ++
25,658,383 UART: [kat] sha1
25,662,839 UART: [kat] SHA2-256
25,663,633 UART: Fatal Error: 0x90010001
25,699,047 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,843,770 >>> mbox cmd response: failed
25,844,404 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,989,123 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,373,277 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,091,475 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,467 UART:
192,836 UART: Running Caliptra ROM ...
194,081 UART:
603,563 UART: [state] CFI Enabled
618,234 UART: [state] LifecycleState = Unprovisioned
620,112 UART: [state] DebugLocked = No
622,433 UART: [state] WD Timer not started. Device not locked for debugging
627,030 UART: [kat] SHA2-256
806,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,727 UART: [kat] ++
818,179 UART: [kat] sha1
828,414 UART: [kat] SHA2-256
831,425 UART: [kat] SHA2-384
838,344 UART: [kat] SHA2-512-ACC
841,283 UART: [kat] ECC-384
3,282,812 UART: [kat] HMAC-384Kdf
3,295,677 UART: [kat] LMS
3,825,168 UART: [kat] --
3,830,544 UART: [cold-reset] ++
3,831,621 UART: [fht] FHT @ 0x50003400
3,842,122 UART: [idev] ++
3,842,692 UART: [idev] CDI.KEYID = 6
3,843,731 UART: [idev] SUBJECT.KEYID = 7
3,844,833 UART: [idev] UDS.KEYID = 0
3,845,761 ready_for_fw is high
3,845,992 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,904 UART: [idev] Erasing UDS.KEYID = 0
6,315,694 UART: [idev] Sha1 KeyId Algorithm
6,338,537 UART: [idev] --
6,342,472 UART: [ldev] ++
6,343,045 UART: [ldev] CDI.KEYID = 6
6,343,960 UART: [ldev] SUBJECT.KEYID = 5
6,345,173 UART: [ldev] AUTHORITY.KEYID = 7
6,346,419 UART: [ldev] FE.KEYID = 1
6,356,683 UART: [ldev] Erasing FE.KEYID = 1
8,829,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,569 UART: [ldev] --
10,622,725 UART: [fwproc] Wait for Commands...
10,624,550 UART: [fwproc] Recv command 0x46574c44
10,626,645 UART: [fwproc] Recv'd Img size: 115304 bytes
14,049,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,121,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,190,750 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,512,137 >>> mbox cmd response: success
14,516,064 UART: [afmc] ++
14,516,656 UART: [afmc] CDI.KEYID = 6
14,517,585 UART: [afmc] SUBJECT.KEYID = 7
14,518,747 UART: [afmc] AUTHORITY.KEYID = 5
17,020,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,738,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,740,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,756,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,772,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,788,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,811,478 UART: [afmc] --
18,815,938 UART: [cold-reset] --
18,820,771 UART: [state] Locking Datavault
18,825,155 UART: [state] Locking PCR0, PCR1 and PCR31
18,826,809 UART: [state] Locking ICCM
18,828,449 UART: [exit] Launching FMC @ 0x40000130
18,836,851 UART:
18,837,087 UART: Running Caliptra FMC ...
18,838,215 UART:
18,838,372 UART: [state] CFI Enabled
18,846,419 UART: [fht] FMC Alias Private Key: 7
20,603,762 UART: [art] Extend RT PCRs Done
20,604,985 UART: [art] Lock RT PCRs Done
20,606,747 UART: [art] Populate DV Done
20,612,160 UART: [fht] FMC Alias Private Key: 7
20,613,700 UART: [art] Derive CDI
20,614,463 UART: [art] Store in in slot 0x4
20,657,107 UART: [art] Derive Key Pair
20,658,149 UART: [art] Store priv key in slot 0x5
23,085,288 UART: [art] Derive Key Pair - Done
23,098,074 UART: [art] Signing Cert with AUTHO
23,099,374 UART: RITY.KEYID = 7
24,804,896 UART: [art] Erasing AUTHORITY.KEYID = 7
24,806,413 UART: [art] PUB.X = B3DA2723EA825DD3D6A3D1836FDBACBB61D50B96EFFA579A9E20E315B29D6A5AD1CA88CB232A38680A5D03E279C1D41B
24,813,747 UART: [art] PUB.Y = 024A903E3A07385BEFF0869DBCEB9D0D03B43F20D38773D11D795278F474BED1AFA9C208BED81715792D8BD1FFAC20BD
24,820,988 UART: [art] SIG.R = 84DEFF8D0C09130EA8594CE28E919CBD897A24A25E5C1BE79CBD62F3F7A46237807399E7B7ED84CE6927F59238705752
24,828,334 UART: [art] SIG.S = C1DE67831A09176B712DFC01086B65EC09CD69195E7DDC2E72CC98396025665F51D0EB75B02F754B86CCD3AB34F7EEF5
25,807,158 UART: Caliptra RT
25,807,867 UART: [state] CFI Enabled
25,924,628 UART: [rt] RT listening for mailbox commands...
25,926,479 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,956,322 UART: [rt]cmd =0x46504c54, len=4
25,958,060 >>> mbox cmd response data (8 bytes)
25,958,977 UART: [rt] FIPS self test
25,959,926 UART: [kat] ++
25,960,380 UART: [kat] sha1
25,964,621 UART: [kat] SHA2-256
25,965,361 UART: Fatal Error: 0x90010001
26,000,680 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,145,415 >>> mbox cmd response: failed
26,146,055 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,290,777 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,095 UART:
190,391 UART: Running Caliptra ROM ...
191,416 UART:
14,245,856 UART: [state] CFI Enabled
14,262,291 UART: [state] LifecycleState = Unprovisioned
14,264,185 UART: [state] DebugLocked = No
14,266,339 UART: [state] WD Timer not started. Device not locked for debugging
14,269,381 UART: [kat] SHA2-256
14,448,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,460,085 UART: [kat] ++
14,460,633 UART: [kat] sha1
14,470,555 UART: [kat] SHA2-256
14,473,597 UART: [kat] SHA2-384
14,478,991 UART: [kat] SHA2-512-ACC
14,481,931 UART: [kat] ECC-384
16,922,584 UART: [kat] HMAC-384Kdf
16,935,025 UART: [kat] LMS
17,464,521 UART: [kat] --
17,468,101 UART: [cold-reset] ++
17,470,527 UART: [fht] FHT @ 0x50003400
17,481,991 UART: [idev] ++
17,482,557 UART: [idev] CDI.KEYID = 6
17,483,464 UART: [idev] SUBJECT.KEYID = 7
17,484,678 UART: [idev] UDS.KEYID = 0
17,486,198 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,630,922 UART: [idev] Erasing UDS.KEYID = 0
19,955,449 UART: [idev] Sha1 KeyId Algorithm
19,978,190 UART: [idev] --
19,982,249 UART: [ldev] ++
19,982,817 UART: [ldev] CDI.KEYID = 6
19,983,752 UART: [ldev] SUBJECT.KEYID = 5
19,984,963 UART: [ldev] AUTHORITY.KEYID = 7
19,986,194 UART: [ldev] FE.KEYID = 1
19,998,503 UART: [ldev] Erasing FE.KEYID = 1
22,476,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,196,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,212,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,227,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,243,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,265,594 UART: [ldev] --
24,270,764 UART: [fwproc] Wait for Commands...
24,272,755 UART: [fwproc] Recv command 0x46574c44
24,274,849 UART: [fwproc] Recv'd Img size: 115304 bytes
27,693,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,766,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,835,474 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,156,273 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,695,755 ready_for_fw is high
3,696,235 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,280,289 >>> mbox cmd response: success
18,534,625 UART:
18,535,016 UART: Running Caliptra FMC ...
18,536,157 UART:
18,536,323 UART: [state] CFI Enabled
18,543,961 UART: [fht] FMC Alias Private Key: 7
20,301,103 UART: [art] Extend RT PCRs Done
20,302,367 UART: [art] Lock RT PCRs Done
20,303,963 UART: [art] Populate DV Done
20,309,362 UART: [fht] FMC Alias Private Key: 7
20,311,007 UART: [art] Derive CDI
20,311,849 UART: [art] Store in in slot 0x4
20,354,562 UART: [art] Derive Key Pair
20,355,602 UART: [art] Store priv key in slot 0x5
22,782,454 UART: [art] Derive Key Pair - Done
22,795,506 UART: [art] Signing Cert with AUTHO
22,796,806 UART: RITY.KEYID = 7
24,502,097 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,602 UART: [art] PUB.X = 3C4E9159D802DCA302C6B3938A08B22EB34797F2FA68A798A6EFB92617319F353D63CAF9C4F001FC9EF19A02B5A75D5C
24,510,896 UART: [art] PUB.Y = 48A8424C44FE59E5FD9964006B60DB5863162565A7D92DE7BA72970F3B5817C7F429F7B45B5AE5F66B4C0B054B66216A
24,518,120 UART: [art] SIG.R = F0176BABCC5A7C9B40D43915E0168FA15732F8A3F04C5BDC8F9B0000472014DC10C561F770AD604489131A11BA5A6F6D
24,525,418 UART: [art] SIG.S = 95A445AF6BA1092E6AA65C344AF88A4578820E08C699A5E86E60C926BD9921DE8913B243ADDA7B7F2FD00F40C2611CA8
25,504,808 UART: Caliptra RT
25,505,505 UART: [state] CFI Enabled
25,622,838 UART: [rt] RT listening for mailbox commands...
25,624,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,534 UART: [rt]cmd =0x46504c54, len=4
25,656,105 >>> mbox cmd response data (8 bytes)
25,657,268 UART: [rt] FIPS self test
25,658,208 UART: [kat] ++
25,658,661 UART: [kat] sha1
25,663,280 UART: [kat] SHA2-256
25,664,020 UART: Fatal Error: 0x90010001
25,699,261 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,844,068 >>> mbox cmd response: failed
25,844,681 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,989,401 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
17,630,818 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,211,516 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,307 UART:
192,666 UART: Running Caliptra ROM ...
193,848 UART:
193,996 UART: [state] CFI Enabled
262,732 UART: [state] LifecycleState = Unprovisioned
265,155 UART: [state] DebugLocked = No
267,544 UART: [state] WD Timer not started. Device not locked for debugging
272,361 UART: [kat] SHA2-256
462,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,040 UART: [kat] ++
473,500 UART: [kat] sha1
483,911 UART: [kat] SHA2-256
486,928 UART: [kat] SHA2-384
494,125 UART: [kat] SHA2-512-ACC
496,704 UART: [kat] ECC-384
2,946,288 UART: [kat] HMAC-384Kdf
2,962,837 UART: [kat] LMS
3,494,565 UART: [kat] --
3,498,350 UART: [cold-reset] ++
3,500,421 UART: [fht] FHT @ 0x50003400
3,510,355 UART: [idev] ++
3,511,037 UART: [idev] CDI.KEYID = 6
3,511,929 UART: [idev] SUBJECT.KEYID = 7
3,513,180 UART: [idev] UDS.KEYID = 0
3,514,086 ready_for_fw is high
3,514,290 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,183 UART: [idev] Erasing UDS.KEYID = 0
6,017,932 UART: [idev] Sha1 KeyId Algorithm
6,039,229 UART: [idev] --
6,043,936 UART: [ldev] ++
6,044,625 UART: [ldev] CDI.KEYID = 6
6,045,540 UART: [ldev] SUBJECT.KEYID = 5
6,046,665 UART: [ldev] AUTHORITY.KEYID = 7
6,047,956 UART: [ldev] FE.KEYID = 1
6,092,104 UART: [ldev] Erasing FE.KEYID = 1
8,598,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,156 UART: [ldev] --
10,404,220 UART: [fwproc] Wait for Commands...
10,406,487 UART: [fwproc] Recv command 0x46574c44
10,408,808 UART: [fwproc] Recv'd Img size: 115304 bytes
13,869,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,532 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,603,534 >>> mbox cmd response: success
14,606,865 UART: [afmc] ++
14,607,567 UART: [afmc] CDI.KEYID = 6
14,608,732 UART: [afmc] SUBJECT.KEYID = 7
14,610,265 UART: [afmc] AUTHORITY.KEYID = 5
17,140,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,896,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,911,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,897 UART: [afmc] --
18,939,111 UART: [cold-reset] --
18,942,699 UART: [state] Locking Datavault
18,944,921 UART: [state] Locking PCR0, PCR1 and PCR31
18,947,108 UART: [state] Locking ICCM
18,948,983 UART: [exit] Launching FMC @ 0x40000130
18,957,659 UART:
18,957,907 UART: Running Caliptra FMC ...
18,958,935 UART:
18,959,080 UART: [state] CFI Enabled
19,020,094 UART: [fht] FMC Alias Private Key: 7
20,784,319 UART: [art] Extend RT PCRs Done
20,785,545 UART: [art] Lock RT PCRs Done
20,787,089 UART: [art] Populate DV Done
20,792,533 UART: [fht] FMC Alias Private Key: 7
20,794,169 UART: [art] Derive CDI
20,794,913 UART: [art] Store in in slot 0x4
20,852,490 UART: [art] Derive Key Pair
20,853,495 UART: [art] Store priv key in slot 0x5
23,316,329 UART: [art] Derive Key Pair - Done
23,329,116 UART: [art] Signing Cert with AUTHO
23,330,426 UART: RITY.KEYID = 7
25,042,065 UART: [art] Erasing AUTHORITY.KEYID = 7
25,043,581 UART: [art] PUB.X = A4DF87D55CAA1FE5DBB1B2F6D5FE49F727866E30F289D0F99A7DC80CC844A9851ADE89F99780A8A39110676E7A76C5A9
25,050,841 UART: [art] PUB.Y = E8BAD2B2475A8E7404D1E00767535DED7A254B3A2773D0D21B6922D47F5367413560037ED252919B8B1363AA331A0D8A
25,058,093 UART: [art] SIG.R = FAF35E748F48A1A10C0510F0153A5A5F7401519920FAADCA0F1A35A66B3B252560D75AE53DED204E5B930763278DC5A1
25,065,509 UART: [art] SIG.S = A7CED508F2287385A9DE91B6B8C69DAB3A7D2E06FC27645283528EB72FD406F70315E5C30F0CBCAB0B5B491552F214B4
26,044,578 UART: Caliptra RT
26,045,272 UART: [state] CFI Enabled
26,209,392 UART: [rt] RT listening for mailbox commands...
26,211,244 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,241,154 UART: [rt]cmd =0x46504c54, len=4
26,242,706 >>> mbox cmd response data (8 bytes)
26,243,738 UART: [rt] FIPS self test
26,244,682 UART: [kat] ++
26,245,131 UART: [kat] sha1
26,249,836 UART: [kat] SHA2-256
26,250,582 UART: Fatal Error: 0x90010001
26,285,748 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,430,613 >>> mbox cmd response: failed
26,431,269 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,576,420 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,031 UART:
190,335 UART: Running Caliptra ROM ...
191,399 UART:
191,545 UART: [state] CFI Enabled
256,466 UART: [state] LifecycleState = Unprovisioned
258,872 UART: [state] DebugLocked = No
261,329 UART: [state] WD Timer not started. Device not locked for debugging
266,683 UART: [kat] SHA2-256
456,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,335 UART: [kat] ++
467,832 UART: [kat] sha1
480,495 UART: [kat] SHA2-256
483,511 UART: [kat] SHA2-384
488,894 UART: [kat] SHA2-512-ACC
491,504 UART: [kat] ECC-384
2,938,476 UART: [kat] HMAC-384Kdf
2,962,204 UART: [kat] LMS
3,493,975 UART: [kat] --
3,498,569 UART: [cold-reset] ++
3,499,487 UART: [fht] FHT @ 0x50003400
3,510,517 UART: [idev] ++
3,511,194 UART: [idev] CDI.KEYID = 6
3,512,208 UART: [idev] SUBJECT.KEYID = 7
3,513,366 UART: [idev] UDS.KEYID = 0
3,514,877 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,819 UART: [idev] Erasing UDS.KEYID = 0
6,019,457 UART: [idev] Sha1 KeyId Algorithm
6,041,727 UART: [idev] --
6,048,260 UART: [ldev] ++
6,048,946 UART: [ldev] CDI.KEYID = 6
6,049,864 UART: [ldev] SUBJECT.KEYID = 5
6,051,027 UART: [ldev] AUTHORITY.KEYID = 7
6,052,265 UART: [ldev] FE.KEYID = 1
6,090,217 UART: [ldev] Erasing FE.KEYID = 1
8,598,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,606 UART: [ldev] --
10,402,331 UART: [fwproc] Wait for Commands...
10,405,235 UART: [fwproc] Recv command 0x46574c44
10,407,565 UART: [fwproc] Recv'd Img size: 115304 bytes
13,863,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,916 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,605,526 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,417,424 ready_for_fw is high
3,418,107 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,726,907 >>> mbox cmd response: success
19,030,279 UART:
19,030,674 UART: Running Caliptra FMC ...
19,031,822 UART:
19,031,981 UART: [state] CFI Enabled
19,096,089 UART: [fht] FMC Alias Private Key: 7
20,860,047 UART: [art] Extend RT PCRs Done
20,861,286 UART: [art] Lock RT PCRs Done
20,862,758 UART: [art] Populate DV Done
20,868,285 UART: [fht] FMC Alias Private Key: 7
20,869,990 UART: [art] Derive CDI
20,870,808 UART: [art] Store in in slot 0x4
20,928,792 UART: [art] Derive Key Pair
20,929,832 UART: [art] Store priv key in slot 0x5
23,392,354 UART: [art] Derive Key Pair - Done
23,405,209 UART: [art] Signing Cert with AUTHO
23,406,549 UART: RITY.KEYID = 7
25,117,836 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,345 UART: [art] PUB.X = 2615676A5B8FF5DC20E4E6F1D6755B3051D725A844A55E2F35D829D84992B99A52CAEAC07AA6DBA67515F5C2BD294EAA
25,126,616 UART: [art] PUB.Y = 59E390FDE07C0ABB960DC99860AC6F68C4D553D1C04441C377B632243A3A98E38594E4CA1A5D296456F28A45C734F961
25,133,874 UART: [art] SIG.R = E5036F5D522FFE7B1509041431A27AA7F7DC3D6CB3808249657ABFA3D47CDA0F42AFD2541EDF36C3D28D28710DF04450
25,141,289 UART: [art] SIG.S = 17EE1428D26A20236FC95610ACF1EA2889B967C69F40EFC7D1D0282E6293D65F289C3848B00C15FE8BEC88A1FC915DF6
26,120,968 UART: Caliptra RT
26,121,668 UART: [state] CFI Enabled
26,284,397 UART: [rt] RT listening for mailbox commands...
26,286,247 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,315,937 UART: [rt]cmd =0x46504c54, len=4
26,317,464 >>> mbox cmd response data (8 bytes)
26,318,366 UART: [rt] FIPS self test
26,319,310 UART: [kat] ++
26,319,761 UART: [kat] sha1
26,324,234 UART: [kat] SHA2-256
26,325,031 UART: Fatal Error: 0x90010001
26,360,276 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,505,145 >>> mbox cmd response: failed
26,505,808 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,650,544 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,429,132 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,762,651 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,561 UART:
192,910 UART: Running Caliptra ROM ...
194,012 UART:
603,992 UART: [state] CFI Enabled
620,225 UART: [state] LifecycleState = Unprovisioned
622,639 UART: [state] DebugLocked = No
624,836 UART: [state] WD Timer not started. Device not locked for debugging
629,527 UART: [kat] SHA2-256
819,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,213 UART: [kat] ++
830,702 UART: [kat] sha1
841,156 UART: [kat] SHA2-256
844,164 UART: [kat] SHA2-384
848,664 UART: [kat] SHA2-512-ACC
851,247 UART: [kat] ECC-384
3,292,636 UART: [kat] HMAC-384Kdf
3,306,444 UART: [kat] LMS
3,838,297 UART: [kat] --
3,844,422 UART: [cold-reset] ++
3,845,794 UART: [fht] FHT @ 0x50003400
3,858,129 UART: [idev] ++
3,858,839 UART: [idev] CDI.KEYID = 6
3,859,744 UART: [idev] SUBJECT.KEYID = 7
3,860,992 UART: [idev] UDS.KEYID = 0
3,861,895 ready_for_fw is high
3,862,118 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,006,996 UART: [idev] Erasing UDS.KEYID = 0
6,338,932 UART: [idev] Sha1 KeyId Algorithm
6,360,124 UART: [idev] --
6,364,607 UART: [ldev] ++
6,365,294 UART: [ldev] CDI.KEYID = 6
6,366,203 UART: [ldev] SUBJECT.KEYID = 5
6,367,362 UART: [ldev] AUTHORITY.KEYID = 7
6,368,593 UART: [ldev] FE.KEYID = 1
6,379,525 UART: [ldev] Erasing FE.KEYID = 1
8,857,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,893 UART: [ldev] --
10,645,895 UART: [fwproc] Wait for Commands...
10,648,368 UART: [fwproc] Recv command 0x46574c44
10,650,681 UART: [fwproc] Recv'd Img size: 115304 bytes
14,116,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,062 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,855,126 >>> mbox cmd response: success
14,858,672 UART: [afmc] ++
14,859,403 UART: [afmc] CDI.KEYID = 6
14,860,603 UART: [afmc] SUBJECT.KEYID = 7
14,862,045 UART: [afmc] AUTHORITY.KEYID = 5
17,365,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,105,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,120,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,135,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,274 UART: [afmc] --
19,162,659 UART: [cold-reset] --
19,167,062 UART: [state] Locking Datavault
19,170,474 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,606 UART: [state] Locking ICCM
19,174,271 UART: [exit] Launching FMC @ 0x40000130
19,182,948 UART:
19,183,224 UART: Running Caliptra FMC ...
19,184,336 UART:
19,184,501 UART: [state] CFI Enabled
19,192,767 UART: [fht] FMC Alias Private Key: 7
20,949,484 UART: [art] Extend RT PCRs Done
20,950,724 UART: [art] Lock RT PCRs Done
20,952,282 UART: [art] Populate DV Done
20,957,754 UART: [fht] FMC Alias Private Key: 7
20,959,411 UART: [art] Derive CDI
20,960,147 UART: [art] Store in in slot 0x4
21,002,467 UART: [art] Derive Key Pair
21,003,471 UART: [art] Store priv key in slot 0x5
23,430,200 UART: [art] Derive Key Pair - Done
23,443,192 UART: [art] Signing Cert with AUTHO
23,444,497 UART: RITY.KEYID = 7
25,150,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,557 UART: [art] PUB.X = 6E100520CDF815A663F1C1D18BEE8F8CD98B1CB863449D9BEFDA2E79AB4D35D9A3314E7F890DE98A37C285FF35B4220E
25,158,865 UART: [art] PUB.Y = DC13D8A4DB71C060BB2EE09DF68CDD4BF2176FEF1BF4F8BD1DF428BB2981C48E6FB4B4817E58BB881182918FE7AE2DD6
25,166,149 UART: [art] SIG.R = 1D93BE56E4887B141474CAFA0ADEEBA4ADA1840925F7A8D42F25DB9FCA0CFB557F7F276B269C7AF2500815022F612DE3
25,173,560 UART: [art] SIG.S = 45C3DEF08A555D91DD0548AA79075D17BDD4FA4D361F2B86C106ED1FA56BBF0937987E3B0E621222521A6F9A922211E1
26,152,351 UART: Caliptra RT
26,153,050 UART: [state] CFI Enabled
26,270,516 UART: [rt] RT listening for mailbox commands...
26,272,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,301,986 UART: [rt]cmd =0x46504c54, len=4
26,303,747 >>> mbox cmd response data (8 bytes)
26,304,923 UART: [rt] FIPS self test
26,305,863 UART: [kat] ++
26,306,313 UART: [kat] sha1
26,310,689 UART: [kat] SHA2-256
26,311,542 UART: Fatal Error: 0x90010001
26,346,748 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,491,594 >>> mbox cmd response: failed
26,492,230 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,637,004 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
190,135 UART:
190,424 UART: Running Caliptra ROM ...
191,536 UART:
13,891,613 UART: [state] CFI Enabled
13,904,159 UART: [state] LifecycleState = Unprovisioned
13,906,526 UART: [state] DebugLocked = No
13,909,185 UART: [state] WD Timer not started. Device not locked for debugging
13,913,358 UART: [kat] SHA2-256
14,103,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,114,063 UART: [kat] ++
14,114,520 UART: [kat] sha1
14,126,541 UART: [kat] SHA2-256
14,129,560 UART: [kat] SHA2-384
14,135,764 UART: [kat] SHA2-512-ACC
14,138,326 UART: [kat] ECC-384
16,578,694 UART: [kat] HMAC-384Kdf
16,592,016 UART: [kat] LMS
17,123,845 UART: [kat] --
17,126,931 UART: [cold-reset] ++
17,129,566 UART: [fht] FHT @ 0x50003400
17,140,109 UART: [idev] ++
17,140,788 UART: [idev] CDI.KEYID = 6
17,141,752 UART: [idev] SUBJECT.KEYID = 7
17,142,907 UART: [idev] UDS.KEYID = 0
17,144,426 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,289,152 UART: [idev] Erasing UDS.KEYID = 0
19,621,093 UART: [idev] Sha1 KeyId Algorithm
19,643,619 UART: [idev] --
19,648,311 UART: [ldev] ++
19,648,878 UART: [ldev] CDI.KEYID = 6
19,649,812 UART: [ldev] SUBJECT.KEYID = 5
19,650,963 UART: [ldev] AUTHORITY.KEYID = 7
19,652,215 UART: [ldev] FE.KEYID = 1
19,664,813 UART: [ldev] Erasing FE.KEYID = 1
22,146,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,865,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,880,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,895,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,910,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,929,929 UART: [ldev] --
23,935,137 UART: [fwproc] Wait for Commands...
23,937,769 UART: [fwproc] Recv command 0x46574c44
23,940,082 UART: [fwproc] Recv'd Img size: 115304 bytes
27,397,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,480,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,596,707 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,144,285 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,757,603 ready_for_fw is high
3,758,186 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,983,557 >>> mbox cmd response: success
19,238,747 UART:
19,239,140 UART: Running Caliptra FMC ...
19,240,259 UART:
19,240,409 UART: [state] CFI Enabled
19,248,591 UART: [fht] FMC Alias Private Key: 7
21,005,581 UART: [art] Extend RT PCRs Done
21,006,815 UART: [art] Lock RT PCRs Done
21,008,637 UART: [art] Populate DV Done
21,014,380 UART: [fht] FMC Alias Private Key: 7
21,015,929 UART: [art] Derive CDI
21,016,746 UART: [art] Store in in slot 0x4
21,059,733 UART: [art] Derive Key Pair
21,060,783 UART: [art] Store priv key in slot 0x5
23,487,549 UART: [art] Derive Key Pair - Done
23,500,391 UART: [art] Signing Cert with AUTHO
23,501,704 UART: RITY.KEYID = 7
25,207,059 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,571 UART: [art] PUB.X = C049E08894FF025787A8CB8D89981107951ED6C1FAE24001178C7659CB6F391C40A87727F8F7E8477F6C82DC76A23EC3
25,215,840 UART: [art] PUB.Y = A44A88484719E335109C0AA0372D1A8AB0A3E2152FF334511471ACFA6E9ABD2551C504FCF3F4A1718937B22D45EF49C9
25,223,090 UART: [art] SIG.R = D4AD1FA2C415BFA2A9494EE71E3EB498880971496E889C4F5E211724EB3EEEADC9F6D832650C599B8422F98B93095034
25,230,518 UART: [art] SIG.S = CFFEEB9D1031A223B7740DCAD47E9AFC2FFE9C4E99058F13C2070551230E1E382AD7EDF66FBFB27D058A7557F46BF786
26,209,187 UART: Caliptra RT
26,209,880 UART: [state] CFI Enabled
26,327,524 UART: [rt] RT listening for mailbox commands...
26,329,379 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,359,024 UART: [rt]cmd =0x46504c54, len=4
26,360,440 >>> mbox cmd response data (8 bytes)
26,361,493 UART: [rt] FIPS self test
26,362,436 UART: [kat] ++
26,362,891 UART: [kat] sha1
26,367,131 UART: [kat] SHA2-256
26,367,980 UART: Fatal Error: 0x90010001
26,403,400 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,548,144 >>> mbox cmd response: failed
26,548,747 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,693,471 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
16,971,901 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,185,825 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,596 UART: [idev] ++
1,479,764 UART: [idev] CDI.KEYID = 6
1,480,124 UART: [idev] SUBJECT.KEYID = 7
1,480,548 UART: [idev] UDS.KEYID = 0
1,480,893 ready_for_fw is high
1,480,893 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,224 UART: [idev] --
1,515,245 UART: [ldev] ++
1,515,413 UART: [ldev] CDI.KEYID = 6
1,515,776 UART: [ldev] SUBJECT.KEYID = 5
1,516,202 UART: [ldev] AUTHORITY.KEYID = 7
1,516,665 UART: [ldev] FE.KEYID = 1
1,521,639 UART: [ldev] Erasing FE.KEYID = 1
1,546,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,006 UART: [ldev] --
1,585,487 UART: [fwproc] Waiting for Commands...
1,586,252 UART: [fwproc] Received command 0x46574c44
1,587,043 UART: [fwproc] Received Image of size 115304 bytes
2,897,072 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,929 >>> mbox cmd response: success
3,092,951 UART: [afmc] ++
3,093,119 UART: [afmc] CDI.KEYID = 6
3,093,481 UART: [afmc] SUBJECT.KEYID = 7
3,093,906 UART: [afmc] AUTHORITY.KEYID = 5
3,128,355 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,122 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,812 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,725 UART: [afmc] --
3,171,729 UART: [cold-reset] --
3,172,811 UART: [state] Locking Datavault
3,173,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,590 UART: [state] Locking ICCM
3,175,052 UART: [exit] Launching FMC @ 0x40000130
3,180,381 UART:
3,180,397 UART: Running Caliptra FMC ...
3,180,805 UART:
3,180,859 UART: [state] CFI Enabled
3,191,520 UART: [fht] FMC Alias Private Key: 7
3,299,215 UART: [art] Extend RT PCRs Done
3,299,643 UART: [art] Lock RT PCRs Done
3,301,293 UART: [art] Populate DV Done
3,309,718 UART: [fht] FMC Alias Private Key: 7
3,310,660 UART: [art] Derive CDI
3,310,940 UART: [art] Store in in slot 0x4
3,396,383 UART: [art] Derive Key Pair
3,396,743 UART: [art] Store priv key in slot 0x5
3,410,027 UART: [art] Derive Key Pair - Done
3,424,312 UART: [art] Signing Cert with AUTHO
3,424,792 UART: RITY.KEYID = 7
3,440,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,831 UART: [art] PUB.X = E1C0E19B3EA7365890256375F6D5907FDF6B6680F8566374DEB55A255977710B8F6C57A7BB425B5A07907E65DB28731F
3,447,591 UART: [art] PUB.Y = 6CBA73327A7102F5350EF0F91F21C92F01E46C7CE5BD1ABF78F4B307F6A9BA2F3CDE02DF59FA59B29C1249B092025F47
3,454,537 UART: [art] SIG.R = 86974153A927947657446361A55B83C7A67DCABEDF07891AA6B69DC0FF93E93ED2D37AF3C959C604EDD0776CA96D49EE
3,461,309 UART: [art] SIG.S = F5F0CE86680F932BE01CF07233C561E943437E7AC09E7E5080F5CABA1117AC38891B0F904377E940D3B0F51B695B4A14
3,485,366 UART: Caliptra RT
3,485,619 UART: [state] CFI Enabled
3,595,427 UART: [rt] RT listening for mailbox commands...
3,596,090 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,041 UART: [rt]cmd =0x46504c54, len=4
3,627,284 >>> mbox cmd response data (8 bytes)
3,627,517 UART: [rt] FIPS self test
3,627,845 UART: [kat] ++
3,627,997 UART: [kat] sha1
3,632,229 UART: [kat] SHA2-256
3,632,781 UART: Fatal Error: 0x90010001
3,634,331 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,336 >>> mbox cmd response: failed
3,634,336 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,688 UART: [state] LifecycleState = Unprovisioned
86,343 UART: [state] DebugLocked = No
86,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,657 UART: [kat] SHA2-256
882,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,703 UART: [kat] ++
886,855 UART: [kat] sha1
891,007 UART: [kat] SHA2-256
892,945 UART: [kat] SHA2-384
895,526 UART: [kat] SHA2-512-ACC
897,427 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,566 UART: [kat] LMS
1,475,762 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,480,098 UART: [idev] ++
1,480,266 UART: [idev] CDI.KEYID = 6
1,480,626 UART: [idev] SUBJECT.KEYID = 7
1,481,050 UART: [idev] UDS.KEYID = 0
1,481,395 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,920 UART: [idev] Erasing UDS.KEYID = 0
1,505,212 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,972 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,869 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,450 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,678 UART: [fwproc] Received command 0x46574c44
1,587,469 UART: [fwproc] Received Image of size 115304 bytes
2,897,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,270 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,047 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 ready_for_fw is high
1,362,711 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,661 >>> mbox cmd response: success
3,003,015 UART:
3,003,031 UART: Running Caliptra FMC ...
3,003,439 UART:
3,003,493 UART: [state] CFI Enabled
3,014,052 UART: [fht] FMC Alias Private Key: 7
3,122,283 UART: [art] Extend RT PCRs Done
3,122,711 UART: [art] Lock RT PCRs Done
3,124,325 UART: [art] Populate DV Done
3,132,734 UART: [fht] FMC Alias Private Key: 7
3,133,818 UART: [art] Derive CDI
3,134,098 UART: [art] Store in in slot 0x4
3,219,853 UART: [art] Derive Key Pair
3,220,213 UART: [art] Store priv key in slot 0x5
3,233,877 UART: [art] Derive Key Pair - Done
3,248,533 UART: [art] Signing Cert with AUTHO
3,249,013 UART: RITY.KEYID = 7
3,264,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,922 UART: [art] PUB.X = 20DED9DEF55D04FDE3F262AC2AA090070112E9FD6234F3331C68E36E90278D03E9823C148FEA8AC01535E789E5C3A036
3,271,686 UART: [art] PUB.Y = B08B915DAC9302C5EC5B122F29E4974B878DABBB55C2C009A0C5FCF84BDFED0CC04AC40B26AFEB53E79F6AA455F49D4A
3,278,652 UART: [art] SIG.R = 42C61DB7F904DBDFC0637D9D49501262A909BC0047EA23A222A1F9DF01B3EF3AFACE60FA36CA0F64EC413C2DAD95346C
3,285,408 UART: [art] SIG.S = 2E27136349C4A676CFCD8EA2F675768D417F41AE1365BE91CA68889B02A8ED85DF5C375FDA6DEB4B0934DBD511AF6CE4
3,309,541 UART: Caliptra RT
3,309,794 UART: [state] CFI Enabled
3,418,034 UART: [rt] RT listening for mailbox commands...
3,418,697 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,624 UART: [rt]cmd =0x46504c54, len=4
3,449,885 >>> mbox cmd response data (8 bytes)
3,450,174 UART: [rt] FIPS self test
3,450,502 UART: [kat] ++
3,450,654 UART: [kat] sha1
3,455,072 UART: [kat] SHA2-256
3,455,682 UART: Fatal Error: 0x90010001
3,457,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,237 >>> mbox cmd response: failed
3,457,237 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,747 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,523 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,402 UART: [cold-reset] ++
1,476,754 UART: [fht] Storing FHT @ 0x50003400
1,479,635 UART: [idev] ++
1,479,803 UART: [idev] CDI.KEYID = 6
1,480,163 UART: [idev] SUBJECT.KEYID = 7
1,480,587 UART: [idev] UDS.KEYID = 0
1,480,932 ready_for_fw is high
1,480,932 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,649 UART: [idev] Erasing UDS.KEYID = 0
1,504,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,451 UART: [idev] --
1,514,444 UART: [ldev] ++
1,514,612 UART: [ldev] CDI.KEYID = 6
1,514,975 UART: [ldev] SUBJECT.KEYID = 5
1,515,401 UART: [ldev] AUTHORITY.KEYID = 7
1,515,864 UART: [ldev] FE.KEYID = 1
1,520,996 UART: [ldev] Erasing FE.KEYID = 1
1,546,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,517 UART: [ldev] --
1,585,812 UART: [fwproc] Waiting for Commands...
1,586,501 UART: [fwproc] Received command 0x46574c44
1,587,292 UART: [fwproc] Received Image of size 115304 bytes
2,896,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,003 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,578 >>> mbox cmd response: success
3,091,656 UART: [afmc] ++
3,091,824 UART: [afmc] CDI.KEYID = 6
3,092,186 UART: [afmc] SUBJECT.KEYID = 7
3,092,611 UART: [afmc] AUTHORITY.KEYID = 5
3,127,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,401 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,091 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,954 UART: [afmc] --
3,171,062 UART: [cold-reset] --
3,171,894 UART: [state] Locking Datavault
3,172,941 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,545 UART: [state] Locking ICCM
3,173,979 UART: [exit] Launching FMC @ 0x40000130
3,179,308 UART:
3,179,324 UART: Running Caliptra FMC ...
3,179,732 UART:
3,179,875 UART: [state] CFI Enabled
3,190,244 UART: [fht] FMC Alias Private Key: 7
3,298,609 UART: [art] Extend RT PCRs Done
3,299,037 UART: [art] Lock RT PCRs Done
3,300,795 UART: [art] Populate DV Done
3,308,874 UART: [fht] FMC Alias Private Key: 7
3,309,986 UART: [art] Derive CDI
3,310,266 UART: [art] Store in in slot 0x4
3,395,905 UART: [art] Derive Key Pair
3,396,265 UART: [art] Store priv key in slot 0x5
3,409,513 UART: [art] Derive Key Pair - Done
3,424,498 UART: [art] Signing Cert with AUTHO
3,424,978 UART: RITY.KEYID = 7
3,440,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,293 UART: [art] PUB.X = 2A0696FECBFD3DD5D0FFA9F71049F860A5AC1C2FEBE64ADA8CB12428C05338E52427C1B747C0B8CCFCEDCD4E7C05B6DA
3,448,089 UART: [art] PUB.Y = 12AC2AA2D42B5D889691FEEAE7C8353DA0B2FF1E801BC29B960760DF6E4D2BA186A80FBF53CB5E930D186A760450A8E7
3,455,043 UART: [art] SIG.R = E795600B53AC8AD6EC245034838748D8C665BBE32F8A98D1B38A9685AAC9BEBEDD0A36419F46DC38841A63339DB6BF95
3,461,817 UART: [art] SIG.S = 0FF7532AD98AA087D9D20C30F9CD643727C265483A0414A66A47837A82AC15FC2968EAB44F272722D6454C5823E3267E
3,485,961 UART: Caliptra RT
3,486,306 UART: [state] CFI Enabled
3,594,075 UART: [rt] RT listening for mailbox commands...
3,594,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,379 UART: [rt]cmd =0x46504c54, len=4
3,625,678 >>> mbox cmd response data (8 bytes)
3,625,937 UART: [rt] FIPS self test
3,626,265 UART: [kat] ++
3,626,417 UART: [kat] sha1
3,630,617 UART: [kat] SHA2-256
3,631,069 UART: Fatal Error: 0x90010001
3,632,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,624 >>> mbox cmd response: failed
3,632,624 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,566 UART: [kat] SHA2-256
882,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,612 UART: [kat] ++
886,764 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,079 UART: [kat] HMAC-384Kdf
907,795 UART: [kat] LMS
1,475,991 UART: [kat] --
1,476,570 UART: [cold-reset] ++
1,477,050 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,645 UART: [idev] Erasing UDS.KEYID = 0
1,505,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,885 UART: [idev] --
1,515,030 UART: [ldev] ++
1,515,198 UART: [ldev] CDI.KEYID = 6
1,515,561 UART: [ldev] SUBJECT.KEYID = 5
1,515,987 UART: [ldev] AUTHORITY.KEYID = 7
1,516,450 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,547,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,571 UART: [ldev] --
1,586,984 UART: [fwproc] Waiting for Commands...
1,587,701 UART: [fwproc] Received command 0x46574c44
1,588,492 UART: [fwproc] Received Image of size 115304 bytes
2,898,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,270 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,462 >>> mbox cmd response: success
3,001,950 UART:
3,001,966 UART: Running Caliptra FMC ...
3,002,374 UART:
3,002,517 UART: [state] CFI Enabled
3,013,244 UART: [fht] FMC Alias Private Key: 7
3,121,141 UART: [art] Extend RT PCRs Done
3,121,569 UART: [art] Lock RT PCRs Done
3,123,377 UART: [art] Populate DV Done
3,131,720 UART: [fht] FMC Alias Private Key: 7
3,132,674 UART: [art] Derive CDI
3,132,954 UART: [art] Store in in slot 0x4
3,218,371 UART: [art] Derive Key Pair
3,218,731 UART: [art] Store priv key in slot 0x5
3,232,445 UART: [art] Derive Key Pair - Done
3,247,440 UART: [art] Signing Cert with AUTHO
3,247,920 UART: RITY.KEYID = 7
3,263,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,975 UART: [art] PUB.X = 86BF0210964D67C57EF61AEF337F563B8342F6D935DD9CAE537073FAD51671AE43CFD081F6D233FC53D2D32F455C2B9C
3,270,752 UART: [art] PUB.Y = B0D9EBF775F685785B9B185E9AC9059D23420DAAC7CB153375D7FC758A4AAA834A813CF61DA6A10BABC0EF7D7DA9C728
3,277,713 UART: [art] SIG.R = 1C4AD9B74CAB82A0BF629BC41BFA3B9819344DAED30645D6201EE146AFC4964AAC1E487ABE92A56236678037E9D45C43
3,284,492 UART: [art] SIG.S = 9FDE3A6B5286B19A5BFEFBA9E982551E23ED57EF79AF25C0967B70BF9E9AC86BCB691850D31C8DFD06A3394BCD1E7A42
3,308,660 UART: Caliptra RT
3,309,005 UART: [state] CFI Enabled
3,417,034 UART: [rt] RT listening for mailbox commands...
3,417,697 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,708 UART: [rt]cmd =0x46504c54, len=4
3,448,823 >>> mbox cmd response data (8 bytes)
3,449,038 UART: [rt] FIPS self test
3,449,366 UART: [kat] ++
3,449,518 UART: [kat] sha1
3,453,848 UART: [kat] SHA2-256
3,454,434 UART: Fatal Error: 0x90010001
3,455,984 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,455,989 >>> mbox cmd response: failed
3,455,989 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,455,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,216 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
893,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,447 UART: [kat] ++
897,599 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
917,628 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,219 UART: [cold-reset] ++
1,171,549 UART: [fht] FHT @ 0x50003400
1,174,258 UART: [idev] ++
1,174,426 UART: [idev] CDI.KEYID = 6
1,174,786 UART: [idev] SUBJECT.KEYID = 7
1,175,210 UART: [idev] UDS.KEYID = 0
1,175,555 ready_for_fw is high
1,175,555 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,208,879 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,382 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,862 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,629 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,944 >>> mbox cmd response: success
2,788,026 UART: [afmc] ++
2,788,194 UART: [afmc] CDI.KEYID = 6
2,788,556 UART: [afmc] SUBJECT.KEYID = 7
2,788,981 UART: [afmc] AUTHORITY.KEYID = 5
2,824,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,747 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,633 UART: [afmc] --
2,867,515 UART: [cold-reset] --
2,868,409 UART: [state] Locking Datavault
2,869,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,296 UART: [state] Locking ICCM
2,870,774 UART: [exit] Launching FMC @ 0x40000130
2,876,103 UART:
2,876,119 UART: Running Caliptra FMC ...
2,876,527 UART:
2,876,581 UART: [state] CFI Enabled
2,887,136 UART: [fht] FMC Alias Private Key: 7
2,995,823 UART: [art] Extend RT PCRs Done
2,996,251 UART: [art] Lock RT PCRs Done
2,997,797 UART: [art] Populate DV Done
3,005,970 UART: [fht] FMC Alias Private Key: 7
3,007,040 UART: [art] Derive CDI
3,007,320 UART: [art] Store in in slot 0x4
3,092,869 UART: [art] Derive Key Pair
3,093,229 UART: [art] Store priv key in slot 0x5
3,106,513 UART: [art] Derive Key Pair - Done
3,121,516 UART: [art] Signing Cert with AUTHO
3,121,996 UART: RITY.KEYID = 7
3,137,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,895 UART: [art] PUB.X = DFAB774C101CF08A77921100B37049C2F76FE5D14CC927F9CA6C15EABB805ADF5590AB5C63BE32C45643AAACF9A1A445
3,144,661 UART: [art] PUB.Y = D3F7AB1582BB4CECB5B1980B213DCC0E5F218F6647DB737942813DBD24F54D77886117F6B3911EDCD5B9488B3EB0EC70
3,151,617 UART: [art] SIG.R = D00332BDB37215D0D7E74EC67BFF037368D49F262F1C7B4FB974A303266CF8675BA0A23C7048E573D344AB1BCA4A7670
3,158,384 UART: [art] SIG.S = 3A1E6E5B26FCB907B13F3D41528D10C73D5C105680AD0F323D3D63BE2C4E1536B9849EFDC50044333BE645A572CE4F8B
3,181,903 UART: Caliptra RT
3,182,156 UART: [state] CFI Enabled
3,288,503 UART: [rt] RT listening for mailbox commands...
3,289,166 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,525 UART: [rt]cmd =0x46504c54, len=4
3,319,842 >>> mbox cmd response data (8 bytes)
3,320,023 UART: [rt] FIPS self test
3,320,351 UART: [kat] ++
3,320,503 UART: [kat] sha1
3,324,799 UART: [kat] SHA2-256
3,325,369 UART: Fatal Error: 0x90010001
3,326,919 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,924 >>> mbox cmd response: failed
3,326,924 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,323 UART: [kat] SHA2-256
903,263 UART: [kat] SHA2-384
905,954 UART: [kat] SHA2-512-ACC
907,855 UART: [kat] ECC-384
917,382 UART: [kat] HMAC-384Kdf
921,912 UART: [kat] LMS
1,170,240 UART: [kat] --
1,171,013 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,144 UART: [idev] ++
1,174,312 UART: [idev] CDI.KEYID = 6
1,174,672 UART: [idev] SUBJECT.KEYID = 7
1,175,096 UART: [idev] UDS.KEYID = 0
1,175,441 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,867 UART: [idev] Sha1 KeyId Algorithm
1,208,201 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,883 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,180 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,735 ready_for_fw is high
1,059,735 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,305 >>> mbox cmd response: success
2,699,663 UART:
2,699,679 UART: Running Caliptra FMC ...
2,700,087 UART:
2,700,141 UART: [state] CFI Enabled
2,710,724 UART: [fht] FMC Alias Private Key: 7
2,818,857 UART: [art] Extend RT PCRs Done
2,819,285 UART: [art] Lock RT PCRs Done
2,820,819 UART: [art] Populate DV Done
2,828,732 UART: [fht] FMC Alias Private Key: 7
2,829,694 UART: [art] Derive CDI
2,829,974 UART: [art] Store in in slot 0x4
2,915,781 UART: [art] Derive Key Pair
2,916,141 UART: [art] Store priv key in slot 0x5
2,929,363 UART: [art] Derive Key Pair - Done
2,944,183 UART: [art] Signing Cert with AUTHO
2,944,663 UART: RITY.KEYID = 7
2,959,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,444 UART: [art] PUB.X = 9BC5EB3BDEA08F8BD5CDBFA0D0E107B834F81A46AF44A00A8BB1924D86BC12CC5FA4D736EBCEBA94B0B48EAD0DEFB1BA
2,967,247 UART: [art] PUB.Y = C0EE406710949B3C4A603E2D55CED93B4700EBA9C34F77CE274D61712D24AEC5280EE2273E8FF220EAC93152C87A5D5D
2,974,182 UART: [art] SIG.R = 45EBC8C7694EE575A3E0E2CC67C55608E24D57A18A4EC2C040BAFD1249BDE0D821BAE9562AC0DDD18C7B0AD2F753CF64
2,980,968 UART: [art] SIG.S = 399F24522B53BAF886889BCB6FDF1471653C875B90B42F1AD7207D0B61FAF1629483E328347A3D1AB384277BB8F6242C
3,004,604 UART: Caliptra RT
3,004,857 UART: [state] CFI Enabled
3,112,256 UART: [rt] RT listening for mailbox commands...
3,112,919 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,728 UART: [rt]cmd =0x46504c54, len=4
3,143,743 >>> mbox cmd response data (8 bytes)
3,143,986 UART: [rt] FIPS self test
3,144,314 UART: [kat] ++
3,144,466 UART: [kat] sha1
3,148,724 UART: [kat] SHA2-256
3,149,300 UART: Fatal Error: 0x90010001
3,150,850 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,855 >>> mbox cmd response: failed
3,150,855 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,075 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
893,299 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,424 UART: [kat] ++
897,576 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,316 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,151 UART: [idev] ++
1,175,319 UART: [idev] CDI.KEYID = 6
1,175,679 UART: [idev] SUBJECT.KEYID = 7
1,176,103 UART: [idev] UDS.KEYID = 0
1,176,448 ready_for_fw is high
1,176,448 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,135 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,448 UART: [ldev] ++
1,211,616 UART: [ldev] CDI.KEYID = 6
1,211,979 UART: [ldev] SUBJECT.KEYID = 5
1,212,405 UART: [ldev] AUTHORITY.KEYID = 7
1,212,868 UART: [ldev] FE.KEYID = 1
1,218,160 UART: [ldev] Erasing FE.KEYID = 1
1,245,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,092 UART: [ldev] --
1,284,501 UART: [fwproc] Wait for Commands...
1,285,241 UART: [fwproc] Recv command 0x46574c44
1,285,969 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,777 >>> mbox cmd response: success
2,790,923 UART: [afmc] ++
2,791,091 UART: [afmc] CDI.KEYID = 6
2,791,453 UART: [afmc] SUBJECT.KEYID = 7
2,791,878 UART: [afmc] AUTHORITY.KEYID = 5
2,827,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,844,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,845,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,856,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,862,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,870,190 UART: [afmc] --
2,871,200 UART: [cold-reset] --
2,872,062 UART: [state] Locking Datavault
2,873,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,969 UART: [state] Locking ICCM
2,874,577 UART: [exit] Launching FMC @ 0x40000130
2,879,906 UART:
2,879,922 UART: Running Caliptra FMC ...
2,880,330 UART:
2,880,473 UART: [state] CFI Enabled
2,890,898 UART: [fht] FMC Alias Private Key: 7
2,998,781 UART: [art] Extend RT PCRs Done
2,999,209 UART: [art] Lock RT PCRs Done
3,000,853 UART: [art] Populate DV Done
3,008,964 UART: [fht] FMC Alias Private Key: 7
3,010,016 UART: [art] Derive CDI
3,010,296 UART: [art] Store in in slot 0x4
3,095,937 UART: [art] Derive Key Pair
3,096,297 UART: [art] Store priv key in slot 0x5
3,109,835 UART: [art] Derive Key Pair - Done
3,124,812 UART: [art] Signing Cert with AUTHO
3,125,292 UART: RITY.KEYID = 7
3,140,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,021 UART: [art] PUB.X = BA5DFD3D106BC081938B4FE3B1FEF41E91E8176D4DC64DC186F980868D65E64887C7DB848C869F5212078BA53872DCE9
3,147,796 UART: [art] PUB.Y = 3C912D23BB0268DB7194695D5B74CE2509CCE0F5B34D9AEF2ABFD4DE4FA21ADC12FE9D78C99EB64C1849F8DA84CB449D
3,154,764 UART: [art] SIG.R = 2C49E68D6B90D1D77377B48996E986D4729D5264EDA987E2662DA5C395D39D150A81E0EFE2A18B9A0C3F9B8009ED4A00
3,161,507 UART: [art] SIG.S = 6C8499638C585D7FC1512E6922785E279146159718CDB2E8498D269A52890F4AB856EB8E08B176CDCD48157E4582C5C1
3,185,470 UART: Caliptra RT
3,185,815 UART: [state] CFI Enabled
3,293,654 UART: [rt] RT listening for mailbox commands...
3,294,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,000 UART: [rt]cmd =0x46504c54, len=4
3,325,011 >>> mbox cmd response data (8 bytes)
3,325,222 UART: [rt] FIPS self test
3,325,550 UART: [kat] ++
3,325,702 UART: [kat] sha1
3,329,878 UART: [kat] SHA2-256
3,330,442 UART: Fatal Error: 0x90010001
3,331,992 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,997 >>> mbox cmd response: failed
3,331,997 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
907,133 UART: [kat] SHA2-512-ACC
909,034 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,391 UART: [kat] LMS
1,171,719 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,060 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,151 UART: [idev] Erasing UDS.KEYID = 0
1,201,668 UART: [idev] Sha1 KeyId Algorithm
1,209,972 UART: [idev] --
1,210,870 UART: [ldev] ++
1,211,038 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,827 UART: [ldev] AUTHORITY.KEYID = 7
1,212,290 UART: [ldev] FE.KEYID = 1
1,217,268 UART: [ldev] Erasing FE.KEYID = 1
1,243,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,739 UART: [fwproc] Recv command 0x46574c44
1,284,467 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,702 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,875 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 ready_for_fw is high
1,060,730 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,910 >>> mbox cmd response: success
2,703,466 UART:
2,703,482 UART: Running Caliptra FMC ...
2,703,890 UART:
2,704,033 UART: [state] CFI Enabled
2,714,778 UART: [fht] FMC Alias Private Key: 7
2,822,671 UART: [art] Extend RT PCRs Done
2,823,099 UART: [art] Lock RT PCRs Done
2,824,743 UART: [art] Populate DV Done
2,832,808 UART: [fht] FMC Alias Private Key: 7
2,833,886 UART: [art] Derive CDI
2,834,166 UART: [art] Store in in slot 0x4
2,919,849 UART: [art] Derive Key Pair
2,920,209 UART: [art] Store priv key in slot 0x5
2,933,567 UART: [art] Derive Key Pair - Done
2,948,255 UART: [art] Signing Cert with AUTHO
2,948,735 UART: RITY.KEYID = 7
2,963,421 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,186 UART: [art] PUB.X = B71455C69A4A9E6FCC03853150DD9A8C191A6F4FCBF178A47F46656759A4BA9888A95C92E5375A9929C85F9CD4B0FD4C
2,970,961 UART: [art] PUB.Y = A73BBCEFDA3EC50F5AC2D438DCEBDA8D88CD2E317667802D017F28B732F7EF9575D4084544539504BE237992DF86B91E
2,977,911 UART: [art] SIG.R = 1556351AFAF95AD594DF497AFC59614181693FF0882FFDD1D9070BDBAEABD6A672CD1540BD44E094D0DD780CB0D349B2
2,984,688 UART: [art] SIG.S = A6E7C4EC444CE6FF6EC774C4CAE21D77AF4E7B7064834943A46CC942BF78EA5033C585A88FD19B1F9C744FC14826F468
3,007,785 UART: Caliptra RT
3,008,130 UART: [state] CFI Enabled
3,116,719 UART: [rt] RT listening for mailbox commands...
3,117,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,379 UART: [rt]cmd =0x46504c54, len=4
3,148,528 >>> mbox cmd response data (8 bytes)
3,148,823 UART: [rt] FIPS self test
3,149,151 UART: [kat] ++
3,149,303 UART: [kat] sha1
3,153,735 UART: [kat] SHA2-256
3,154,281 UART: Fatal Error: 0x90010001
3,155,831 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,836 >>> mbox cmd response: failed
3,155,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,996 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,024 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,290 UART: [kat] LMS
1,168,602 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,069 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 ready_for_fw is high
1,173,939 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,202 UART: [fwproc] Wait for Commands...
1,281,773 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,806 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,958 >>> mbox cmd response: success
2,786,061 UART: [afmc] ++
2,786,229 UART: [afmc] CDI.KEYID = 6
2,786,592 UART: [afmc] SUBJECT.KEYID = 7
2,787,018 UART: [afmc] AUTHORITY.KEYID = 5
2,822,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,278 UART: [afmc] --
2,866,382 UART: [cold-reset] --
2,866,914 UART: [state] Locking Datavault
2,868,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,917 UART: [state] Locking ICCM
2,869,577 UART: [exit] Launching FMC @ 0x40000130
2,874,906 UART:
2,874,922 UART: Running Caliptra FMC ...
2,875,330 UART:
2,875,384 UART: [state] CFI Enabled
2,885,901 UART: [fht] FMC Alias Private Key: 7
2,993,928 UART: [art] Extend RT PCRs Done
2,994,356 UART: [art] Lock RT PCRs Done
2,995,822 UART: [art] Populate DV Done
3,004,185 UART: [fht] FMC Alias Private Key: 7
3,005,313 UART: [art] Derive CDI
3,005,593 UART: [art] Store in in slot 0x4
3,091,116 UART: [art] Derive Key Pair
3,091,476 UART: [art] Store priv key in slot 0x5
3,104,402 UART: [art] Derive Key Pair - Done
3,119,396 UART: [art] Signing Cert with AUTHO
3,119,876 UART: RITY.KEYID = 7
3,134,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,677 UART: [art] PUB.X = 8BF2AA1376EEABDC2E819DBBDFDE99EB3328C26B5C3FD68369757DF147011B232F5140ECBF0BBF25E26ECF626F5F2CA8
3,142,467 UART: [art] PUB.Y = 451BB640A763A96355DA17973BA7572EEE677638E6A6B2A566C84B2B20249F524DD5FF4341FDBFBBBC6B4C59E8AA972F
3,149,429 UART: [art] SIG.R = 08BBBCDB01282DCDD6344A785EB133C3279B257C6CEA226DD446B2F8E20F8932B33A2123F48F26BE6DE20F8AF6C37CAD
3,156,205 UART: [art] SIG.S = 54D58B372C054EA2058EBACA4DB8A1610F907DE7A18CF3BAE224CF78EAB709BC1BC39A980EF022221A535C57E32CE144
3,180,227 UART: Caliptra RT
3,180,480 UART: [state] CFI Enabled
3,288,777 UART: [rt] RT listening for mailbox commands...
3,289,440 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,213 UART: [rt]cmd =0x46504c54, len=4
3,320,198 >>> mbox cmd response data (8 bytes)
3,320,313 UART: [rt] FIPS self test
3,320,641 UART: [kat] ++
3,320,793 UART: [kat] sha1
3,324,925 UART: [kat] SHA2-256
3,325,337 UART: Fatal Error: 0x90010001
3,326,887 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,892 >>> mbox cmd response: failed
3,326,892 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,174,185 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,369 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,215,046 UART: [ldev] Erasing FE.KEYID = 1
1,241,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,016 UART: [ldev] --
1,280,442 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,508 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,864 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,164 ready_for_fw is high
1,056,164 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,702 >>> mbox cmd response: success
2,696,564 UART:
2,696,580 UART: Running Caliptra FMC ...
2,696,988 UART:
2,697,042 UART: [state] CFI Enabled
2,707,143 UART: [fht] FMC Alias Private Key: 7
2,815,252 UART: [art] Extend RT PCRs Done
2,815,680 UART: [art] Lock RT PCRs Done
2,817,338 UART: [art] Populate DV Done
2,825,565 UART: [fht] FMC Alias Private Key: 7
2,826,549 UART: [art] Derive CDI
2,826,829 UART: [art] Store in in slot 0x4
2,912,524 UART: [art] Derive Key Pair
2,912,884 UART: [art] Store priv key in slot 0x5
2,926,024 UART: [art] Derive Key Pair - Done
2,940,983 UART: [art] Signing Cert with AUTHO
2,941,463 UART: RITY.KEYID = 7
2,956,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,346 UART: [art] PUB.X = FAB8C7F9CB6FD2D867DFE1BBD0344E390E2C404EC50054492CE303C8F773D8EABDE0976A72388548AFCE4098C5A6AFC5
2,964,108 UART: [art] PUB.Y = FFCD84B234BD5C3D472E984DAFD4A4AC06490B7EBE0C475CA07520CF4EE2DCAE4864A453C4C7212B4DFC8DDC479FAAFB
2,971,081 UART: [art] SIG.R = 78365F29E5AF870E6F3459C19F194830F18CB0F434C0CDEF6F96D4F2400AC0013A464EDACB15DA59B28C359D778D3E31
2,977,850 UART: [art] SIG.S = 954A3FF6461C866EC197AEE1AC089D1AEE688FE8CC6782241FF9E46C843B717E6F602638E302BC3AD22DFCD2BB19EACB
3,001,131 UART: Caliptra RT
3,001,384 UART: [state] CFI Enabled
3,108,229 UART: [rt] RT listening for mailbox commands...
3,108,892 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,771 UART: [rt]cmd =0x46504c54, len=4
3,139,858 >>> mbox cmd response data (8 bytes)
3,140,189 UART: [rt] FIPS self test
3,140,517 UART: [kat] ++
3,140,669 UART: [kat] sha1
3,144,893 UART: [kat] SHA2-256
3,145,503 UART: Fatal Error: 0x90010001
3,147,053 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,147,058 >>> mbox cmd response: failed
3,147,058 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,147,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,694 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,138 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 ready_for_fw is high
1,174,680 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,699 UART: [ldev] --
1,281,187 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,351 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,725 >>> mbox cmd response: success
2,787,838 UART: [afmc] ++
2,788,006 UART: [afmc] CDI.KEYID = 6
2,788,369 UART: [afmc] SUBJECT.KEYID = 7
2,788,795 UART: [afmc] AUTHORITY.KEYID = 5
2,824,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,699 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,418 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,259 UART: [afmc] --
2,868,343 UART: [cold-reset] --
2,869,035 UART: [state] Locking Datavault
2,870,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,786 UART: [state] Locking ICCM
2,871,206 UART: [exit] Launching FMC @ 0x40000130
2,876,535 UART:
2,876,551 UART: Running Caliptra FMC ...
2,876,959 UART:
2,877,102 UART: [state] CFI Enabled
2,887,795 UART: [fht] FMC Alias Private Key: 7
2,996,302 UART: [art] Extend RT PCRs Done
2,996,730 UART: [art] Lock RT PCRs Done
2,998,684 UART: [art] Populate DV Done
3,006,865 UART: [fht] FMC Alias Private Key: 7
3,007,973 UART: [art] Derive CDI
3,008,253 UART: [art] Store in in slot 0x4
3,093,892 UART: [art] Derive Key Pair
3,094,252 UART: [art] Store priv key in slot 0x5
3,107,890 UART: [art] Derive Key Pair - Done
3,123,090 UART: [art] Signing Cert with AUTHO
3,123,570 UART: RITY.KEYID = 7
3,138,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,579 UART: [art] PUB.X = FD553DF205C2C581E71DFB6D4D701A9CF9F324B057EB79C5845662ABEB5057C42DBE18E46AF5F0FD0619E9DCC8EFDD10
3,146,365 UART: [art] PUB.Y = 8CEFD034474490E26A8F74D194FABF4BE9599FB0213853BB17F324D9C8446D444B8A0C3F8839DFA35118F8C1330D05B6
3,153,310 UART: [art] SIG.R = 872551ADD52FA3DCA73EC1D3918E4DF6BDE678F9C0E024ECE11254C48402B888D960CB279B471953A2CC1A0FBE454CE3
3,160,088 UART: [art] SIG.S = 69E45882EEA148F8E0B3D42B9381497BE5B5A8BC47A79A54FBC7E9BDF7CE3BC782B35330743B656C0AE2DE68E3E1877F
3,184,316 UART: Caliptra RT
3,184,661 UART: [state] CFI Enabled
3,291,766 UART: [rt] RT listening for mailbox commands...
3,292,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,112 UART: [rt]cmd =0x46504c54, len=4
3,323,367 >>> mbox cmd response data (8 bytes)
3,323,604 UART: [rt] FIPS self test
3,323,932 UART: [kat] ++
3,324,084 UART: [kat] sha1
3,328,362 UART: [kat] SHA2-256
3,328,896 UART: Fatal Error: 0x90010001
3,330,446 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,451 >>> mbox cmd response: failed
3,330,451 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,493 UART: [kat] SHA2-256
892,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,172 UART: [kat] ++
896,324 UART: [kat] sha1
900,528 UART: [kat] SHA2-256
902,468 UART: [kat] SHA2-384
905,177 UART: [kat] SHA2-512-ACC
907,078 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,634 UART: [idev] ++
1,173,802 UART: [idev] CDI.KEYID = 6
1,174,163 UART: [idev] SUBJECT.KEYID = 7
1,174,588 UART: [idev] UDS.KEYID = 0
1,174,934 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,380 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,331 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,711 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,517 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,729 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,159 ready_for_fw is high
1,057,159 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,507 >>> mbox cmd response: success
2,700,041 UART:
2,700,057 UART: Running Caliptra FMC ...
2,700,465 UART:
2,700,608 UART: [state] CFI Enabled
2,711,159 UART: [fht] FMC Alias Private Key: 7
2,819,442 UART: [art] Extend RT PCRs Done
2,819,870 UART: [art] Lock RT PCRs Done
2,821,410 UART: [art] Populate DV Done
2,829,477 UART: [fht] FMC Alias Private Key: 7
2,830,635 UART: [art] Derive CDI
2,830,915 UART: [art] Store in in slot 0x4
2,916,774 UART: [art] Derive Key Pair
2,917,134 UART: [art] Store priv key in slot 0x5
2,930,332 UART: [art] Derive Key Pair - Done
2,945,093 UART: [art] Signing Cert with AUTHO
2,945,573 UART: RITY.KEYID = 7
2,960,703 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,468 UART: [art] PUB.X = F9FD0553A4A48DDE5C8623018BD51D239D81BDE713219029506E91FD8928CC22641E627BC4D6033F64BCE610608194D8
2,968,227 UART: [art] PUB.Y = 3034A2FD6782464F88893967A963ED5064417B391765C6701DBD955B3FEF172A02028D19EF171947F89342C1D1E401C1
2,975,156 UART: [art] SIG.R = 799A9EC0FADAE59F9BFC80DEA1BE7CFB7A7829860F28B2ED4AAA3B4E22460BF661512CDFAA2C6754278C7DCA64F281DD
2,981,948 UART: [art] SIG.S = 6DA8470E95B74695F3A7273EA67D72C4B7BD08CBBA07D2A2A52CEE76FCE7F26F4EFE507DABF9504AB8F92F6BA1910991
3,005,901 UART: Caliptra RT
3,006,246 UART: [state] CFI Enabled
3,114,161 UART: [rt] RT listening for mailbox commands...
3,114,824 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,675 UART: [rt]cmd =0x46504c54, len=4
3,145,936 >>> mbox cmd response data (8 bytes)
3,146,107 UART: [rt] FIPS self test
3,146,435 UART: [kat] ++
3,146,587 UART: [kat] sha1
3,150,743 UART: [kat] SHA2-256
3,151,211 UART: Fatal Error: 0x90010001
3,152,761 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,766 >>> mbox cmd response: failed
3,152,766 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,247 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,515,463 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,659,660 >>> mbox cmd response: failed
2,660,210 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,803,594 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
4,864,191 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,411,803 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,514,735 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,659,691 >>> mbox cmd response: failed
2,660,276 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,803,718 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,865,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,455,283 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
2,860,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,005,099 >>> mbox cmd response: failed
3,005,735 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,149,067 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
21,581,992 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,027,695 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,857,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,001,866 >>> mbox cmd response: failed
3,002,428 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,145,604 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
21,594,669 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,039,796 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,518,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,662,756 >>> mbox cmd response: failed
2,663,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,807,041 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,425,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,254,944 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,517,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,662,357 >>> mbox cmd response: failed
2,662,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,806,647 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,426,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,235,253 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
2,878,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,022,910 >>> mbox cmd response: failed
3,023,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,212 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,181,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,907,096 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
2,863,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,008,597 >>> mbox cmd response: failed
3,009,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,152,941 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,169,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,896,300 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,520,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,664,927 >>> mbox cmd response: failed
2,665,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,809,242 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,445,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,284,897 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,519,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,663,960 >>> mbox cmd response: failed
2,664,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,808,390 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,444,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,293,800 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
2,876,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,022,277 >>> mbox cmd response: failed
3,022,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,990 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
20,181,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,914,112 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,884,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,029,720 >>> mbox cmd response: failed
3,030,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,091 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,189,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,912,796 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,316 >>> mbox cmd response: failed
87,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,874 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,520 >>> mbox cmd response: failed
87,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,066 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,769 >>> mbox cmd response: failed
87,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,763 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,891 >>> mbox cmd response: failed
87,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,167 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,792 >>> mbox cmd response: failed
87,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,078 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,192 >>> mbox cmd response: failed
87,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,800 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,547 >>> mbox cmd response: failed
87,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,757 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,567 >>> mbox cmd response: failed
87,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,701 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,376 >>> mbox cmd response: failed
87,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,244 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,900 >>> mbox cmd response: failed
87,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,173 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,351 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,619 >>> mbox cmd response: failed
87,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,555 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,581 >>> mbox cmd response: failed
87,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,913 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,195 UART:
192,550 UART: Running Caliptra ROM ...
193,691 UART:
193,838 UART: [state] CFI Enabled
262,340 UART: [state] LifecycleState = Unprovisioned
264,354 UART: [state] DebugLocked = No
265,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,923 UART: [kat] SHA2-256
439,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,078 UART: [kat] ++
450,563 UART: [kat] sha1
461,792 UART: [kat] SHA2-256
464,521 UART: [kat] SHA2-384
469,609 UART: [kat] SHA2-512-ACC
471,993 UART: [kat] ECC-384
2,767,463 UART: [kat] HMAC-384Kdf
2,800,252 UART: [kat] LMS
3,990,598 UART: [kat] --
3,996,513 UART: [cold-reset] ++
3,998,018 UART: [fht] Storing FHT @ 0x50003400
4,009,149 UART: [idev] ++
4,009,716 UART: [idev] CDI.KEYID = 6
4,010,672 UART: [idev] SUBJECT.KEYID = 7
4,011,916 UART: [idev] UDS.KEYID = 0
4,012,897 ready_for_fw is high
4,013,109 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,157,839 UART: [idev] Erasing UDS.KEYID = 0
7,346,561 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,723 UART: [idev] --
7,373,720 UART: [ldev] ++
7,374,289 UART: [ldev] CDI.KEYID = 6
7,375,252 UART: [ldev] SUBJECT.KEYID = 5
7,376,466 UART: [ldev] AUTHORITY.KEYID = 7
7,377,755 UART: [ldev] FE.KEYID = 1
7,423,755 UART: [ldev] Erasing FE.KEYID = 1
10,750,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,189 UART: [ldev] --
13,117,664 UART: [fwproc] Waiting for Commands...
13,120,624 UART: [fwproc] Received command 0x46574c44
13,122,808 UART: [fwproc] Received Image of size 114996 bytes
17,180,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,642,632 >>> mbox cmd response: success
17,646,987 UART: [afmc] ++
17,647,578 UART: [afmc] CDI.KEYID = 6
17,648,461 UART: [afmc] SUBJECT.KEYID = 7
17,649,731 UART: [afmc] AUTHORITY.KEYID = 5
21,008,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,138 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,522 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,337 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,850 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,682 UART: [afmc] --
23,381,196 UART: [cold-reset] --
23,385,327 UART: [state] Locking Datavault
23,391,545 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,309 UART: [state] Locking ICCM
23,395,512 UART: [exit] Launching FMC @ 0x40000130
23,403,906 UART:
23,404,146 UART: Running Caliptra FMC ...
23,405,247 UART:
23,405,406 UART: [state] CFI Enabled
23,466,148 UART: [fht] FMC Alias Private Key: 7
25,803,960 UART: [art] Extend RT PCRs Done
25,805,179 UART: [art] Lock RT PCRs Done
25,806,993 UART: [art] Populate DV Done
25,812,585 UART: [fht] FMC Alias Private Key: 7
25,814,290 UART: [art] Derive CDI
25,815,105 UART: [art] Store in in slot 0x4
25,874,361 UART: [art] Derive Key Pair
25,875,404 UART: [art] Store priv key in slot 0x5
29,167,861 UART: [art] Derive Key Pair - Done
29,181,122 UART: [art] Signing Cert with AUTHO
29,182,430 UART: RITY.KEYID = 7
31,469,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,888 UART: [art] PUB.X = 4B015F8F6B613B04C8FCE2E4EE0CF816B4F5DF5A396681D7A2D02835DF66E5CB889A4CC11741135FC65E4C7B8D1B150C
31,478,141 UART: [art] PUB.Y = 6D1F7F9C39CAF7D4DCDEBB9A809AF5FA668F4655AF438FF7294EADEEF27234329DBA8CF8A69E6FC3AD95F7A00E0BBDFA
31,485,440 UART: [art] SIG.R = DD9FA4EBF2D99ACC8EB18FCA21576AA99A6CB84FA13E8A748692C717BC7185B532B5983835F165C35E374894C2421077
31,492,836 UART: [art] SIG.S = 2550A3048A4CDA75B7CAE72114635FFF72F85FDB11960585B3178A1261D048D290496805CD06642B896EE37DA99A5706
32,797,966 UART: Caliptra RT
32,798,667 UART: [state] CFI Enabled
32,958,800 UART: [rt] RT listening for mailbox commands...
32,960,675 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,990,513 UART: [rt]cmd =0x46504c54, len=4
32,992,197 >>> mbox cmd response data (8 bytes)
32,993,273 UART: [rt] FIPS self test
32,994,213 UART: [kat] ++
32,994,661 UART: [kat] sha1
32,999,330 UART: [kat] SHA2-256
33,000,723 UART: Fatal Error: 0x90010002
33,036,033 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,180,392 >>> mbox cmd response: failed
33,180,997 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,325,833 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
189,960 UART:
190,267 UART: Running Caliptra ROM ...
191,348 UART:
191,496 UART: [state] CFI Enabled
253,648 UART: [state] LifecycleState = Unprovisioned
255,592 UART: [state] DebugLocked = No
257,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,763 UART: [kat] SHA2-256
432,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,995 UART: [kat] ++
443,471 UART: [kat] sha1
453,809 UART: [kat] SHA2-256
456,491 UART: [kat] SHA2-384
463,276 UART: [kat] SHA2-512-ACC
465,620 UART: [kat] ECC-384
2,759,592 UART: [kat] HMAC-384Kdf
2,792,023 UART: [kat] LMS
3,982,352 UART: [kat] --
3,988,043 UART: [cold-reset] ++
3,989,122 UART: [fht] Storing FHT @ 0x50003400
4,000,336 UART: [idev] ++
4,000,907 UART: [idev] CDI.KEYID = 6
4,001,927 UART: [idev] SUBJECT.KEYID = 7
4,003,091 UART: [idev] UDS.KEYID = 0
4,004,713 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,149,277 UART: [idev] Erasing UDS.KEYID = 0
7,337,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,415 UART: [idev] --
7,362,714 UART: [ldev] ++
7,363,284 UART: [ldev] CDI.KEYID = 6
7,364,305 UART: [ldev] SUBJECT.KEYID = 5
7,365,467 UART: [ldev] AUTHORITY.KEYID = 7
7,366,700 UART: [ldev] FE.KEYID = 1
7,414,892 UART: [ldev] Erasing FE.KEYID = 1
10,745,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,677 UART: [ldev] --
13,108,103 UART: [fwproc] Waiting for Commands...
13,110,471 UART: [fwproc] Received command 0x46574c44
13,112,656 UART: [fwproc] Received Image of size 114996 bytes
17,173,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,641,428 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,805,155 ready_for_fw is high
3,805,552 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,874,077 >>> mbox cmd response: success
23,572,027 UART:
23,572,450 UART: Running Caliptra FMC ...
23,573,598 UART:
23,573,760 UART: [state] CFI Enabled
23,640,022 UART: [fht] FMC Alias Private Key: 7
25,978,160 UART: [art] Extend RT PCRs Done
25,979,390 UART: [art] Lock RT PCRs Done
25,980,990 UART: [art] Populate DV Done
25,986,359 UART: [fht] FMC Alias Private Key: 7
25,987,848 UART: [art] Derive CDI
25,988,610 UART: [art] Store in in slot 0x4
26,049,940 UART: [art] Derive Key Pair
26,050,990 UART: [art] Store priv key in slot 0x5
29,343,497 UART: [art] Derive Key Pair - Done
29,356,459 UART: [art] Signing Cert with AUTHO
29,357,765 UART: RITY.KEYID = 7
31,646,050 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,581 UART: [art] PUB.X = E520948C23AA6EA1E0A0822E066AD8A4AE97B9A959907E8A32A88154A7B12994178BE3145FA246ACAED7573064EE1CCD
31,654,800 UART: [art] PUB.Y = 214EBD990BDAD3F8A716955D03C0FF2CABEDDCE6D0A400A4548220E688C720346B967BE258E731274F41604AC78A35FD
31,662,020 UART: [art] SIG.R = 29AA16F8B6D91B71080C3F59249165466A903051EED57FBB9794EF6C482ED8C9F386CFCACEFBA23A2790EE7DBC565EB2
31,669,436 UART: [art] SIG.S = FA335B6E699533C72549D792A885A2AFBC71C2C2D08980028A40DF689DD9DD35403F97C7C9607A4988D6F4122A318B26
32,974,130 UART: Caliptra RT
32,974,846 UART: [state] CFI Enabled
33,136,889 UART: [rt] RT listening for mailbox commands...
33,138,744 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,168,522 UART: [rt]cmd =0x46504c54, len=4
33,170,299 >>> mbox cmd response data (8 bytes)
33,171,520 UART: [rt] FIPS self test
33,172,469 UART: [kat] ++
33,172,920 UART: [kat] sha1
33,177,540 UART: [kat] SHA2-256
33,179,149 UART: Fatal Error: 0x90010002
33,214,423 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,358,906 >>> mbox cmd response: failed
33,359,524 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,503,929 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,795,521 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,876,964 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,438 UART:
192,806 UART: Running Caliptra ROM ...
193,997 UART:
603,578 UART: [state] CFI Enabled
616,829 UART: [state] LifecycleState = Unprovisioned
618,730 UART: [state] DebugLocked = No
621,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,342 UART: [kat] SHA2-256
795,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,662 UART: [kat] ++
806,113 UART: [kat] sha1
817,557 UART: [kat] SHA2-256
820,211 UART: [kat] SHA2-384
826,066 UART: [kat] SHA2-512-ACC
828,459 UART: [kat] ECC-384
3,112,824 UART: [kat] HMAC-384Kdf
3,124,276 UART: [kat] LMS
4,314,362 UART: [kat] --
4,316,821 UART: [cold-reset] ++
4,318,619 UART: [fht] Storing FHT @ 0x50003400
4,331,313 UART: [idev] ++
4,331,879 UART: [idev] CDI.KEYID = 6
4,332,877 UART: [idev] SUBJECT.KEYID = 7
4,333,997 UART: [idev] UDS.KEYID = 0
4,335,021 ready_for_fw is high
4,335,254 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,479,729 UART: [idev] Erasing UDS.KEYID = 0
7,621,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,156 UART: [idev] --
7,649,102 UART: [ldev] ++
7,649,695 UART: [ldev] CDI.KEYID = 6
7,650,662 UART: [ldev] SUBJECT.KEYID = 5
7,651,823 UART: [ldev] AUTHORITY.KEYID = 7
7,653,108 UART: [ldev] FE.KEYID = 1
7,665,916 UART: [ldev] Erasing FE.KEYID = 1
10,955,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,538 UART: [ldev] --
13,315,667 UART: [fwproc] Waiting for Commands...
13,318,900 UART: [fwproc] Received command 0x46574c44
13,321,092 UART: [fwproc] Received Image of size 114996 bytes
17,389,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,469,966 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,538,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,859,053 >>> mbox cmd response: success
17,862,344 UART: [afmc] ++
17,862,936 UART: [afmc] CDI.KEYID = 6
17,863,910 UART: [afmc] SUBJECT.KEYID = 7
17,865,127 UART: [afmc] AUTHORITY.KEYID = 5
21,177,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,469,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,472,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,486,608 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,501,459 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,515,902 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,537,354 UART: [afmc] --
23,542,033 UART: [cold-reset] --
23,545,464 UART: [state] Locking Datavault
23,550,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,552,697 UART: [state] Locking ICCM
23,554,739 UART: [exit] Launching FMC @ 0x40000130
23,563,084 UART:
23,563,324 UART: Running Caliptra FMC ...
23,564,541 UART:
23,564,705 UART: [state] CFI Enabled
23,572,699 UART: [fht] FMC Alias Private Key: 7
25,903,575 UART: [art] Extend RT PCRs Done
25,904,801 UART: [art] Lock RT PCRs Done
25,906,451 UART: [art] Populate DV Done
25,912,132 UART: [fht] FMC Alias Private Key: 7
25,913,726 UART: [art] Derive CDI
25,914,539 UART: [art] Store in in slot 0x4
25,957,025 UART: [art] Derive Key Pair
25,958,027 UART: [art] Store priv key in slot 0x5
29,199,849 UART: [art] Derive Key Pair - Done
29,212,767 UART: [art] Signing Cert with AUTHO
29,214,075 UART: RITY.KEYID = 7
31,494,219 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,863 UART: [art] PUB.X = 7952F92C83ADA425F9D3A949F329DF3D830C47E7139A88429437E910F7890CC58C7EAD21346338E025979BBC86D32C4D
31,502,966 UART: [art] PUB.Y = 053159F4CDC9DA20B3C105956963E4345F4A4E1B382CC311AEA5C2D2566F2C8B9B7603BA4BB8C585D92B0B4E076E7259
31,510,216 UART: [art] SIG.R = 99E7EC61F92337C0669EABD98092E670FC7C2C4673A2F2908C6C3C27B290E8CE3B80D4BE9A19E451DF7F5E829F174AE8
31,517,560 UART: [art] SIG.S = 71C54149C03C3F0114E46CF7C729896429EF5CECAA3773708D4BB2B58379567E188106779EB51F532AAA63D55F3D5B0F
32,822,452 UART: Caliptra RT
32,823,172 UART: [state] CFI Enabled
32,941,449 UART: [rt] RT listening for mailbox commands...
32,943,305 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,973,158 UART: [rt]cmd =0x46504c54, len=4
32,974,681 >>> mbox cmd response data (8 bytes)
32,975,704 UART: [rt] FIPS self test
32,976,647 UART: [kat] ++
32,977,097 UART: [kat] sha1
32,981,555 UART: [kat] SHA2-256
32,983,057 UART: Fatal Error: 0x90010002
33,018,435 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,162,786 >>> mbox cmd response: failed
33,163,396 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,307,699 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,999 UART:
190,292 UART: Running Caliptra ROM ...
191,311 UART:
7,223,333 UART: [state] CFI Enabled
7,238,151 UART: [state] LifecycleState = Unprovisioned
7,240,100 UART: [state] DebugLocked = No
7,242,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,247,484 UART: [kat] SHA2-256
7,417,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,427,781 UART: [kat] ++
7,428,322 UART: [kat] sha1
7,439,436 UART: [kat] SHA2-256
7,442,124 UART: [kat] SHA2-384
7,447,359 UART: [kat] SHA2-512-ACC
7,449,706 UART: [kat] ECC-384
9,734,212 UART: [kat] HMAC-384Kdf
9,744,823 UART: [kat] LMS
10,934,939 UART: [kat] --
10,941,093 UART: [cold-reset] ++
10,943,022 UART: [fht] Storing FHT @ 0x50003400
10,955,098 UART: [idev] ++
10,955,661 UART: [idev] CDI.KEYID = 6
10,956,598 UART: [idev] SUBJECT.KEYID = 7
10,957,861 UART: [idev] UDS.KEYID = 0
10,959,368 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,103,706 UART: [idev] Erasing UDS.KEYID = 0
14,243,890 UART: [idev] Using Sha1 for KeyId Algorithm
14,264,997 UART: [idev] --
14,268,916 UART: [ldev] ++
14,269,517 UART: [ldev] CDI.KEYID = 6
14,270,491 UART: [ldev] SUBJECT.KEYID = 5
14,271,705 UART: [ldev] AUTHORITY.KEYID = 7
14,272,934 UART: [ldev] FE.KEYID = 1
14,284,926 UART: [ldev] Erasing FE.KEYID = 1
17,571,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,864,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,878,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,893,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,908,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,928,104 UART: [ldev] --
19,932,146 UART: [fwproc] Waiting for Commands...
19,933,869 UART: [fwproc] Received command 0x46574c44
19,936,056 UART: [fwproc] Received Image of size 114996 bytes
23,994,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,067,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,136,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,457,204 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,134,768 ready_for_fw is high
4,135,425 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,101,463 >>> mbox cmd response: success
23,737,191 UART:
23,737,595 UART: Running Caliptra FMC ...
23,738,763 UART:
23,738,932 UART: [state] CFI Enabled
23,746,339 UART: [fht] FMC Alias Private Key: 7
26,077,088 UART: [art] Extend RT PCRs Done
26,078,357 UART: [art] Lock RT PCRs Done
26,080,019 UART: [art] Populate DV Done
26,085,391 UART: [fht] FMC Alias Private Key: 7
26,086,879 UART: [art] Derive CDI
26,087,648 UART: [art] Store in in slot 0x4
26,130,135 UART: [art] Derive Key Pair
26,131,135 UART: [art] Store priv key in slot 0x5
29,373,289 UART: [art] Derive Key Pair - Done
29,386,185 UART: [art] Signing Cert with AUTHO
29,387,487 UART: RITY.KEYID = 7
31,667,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,636 UART: [art] PUB.X = 887BF8C8DD28291154A0E0CAD1FDE5F82C4D989B3B7DF2F143F0C8289D7115A4ED0C6046C5FF36F654FEFA6854C72797
31,675,902 UART: [art] PUB.Y = 74A978B380296E8D10E2E11502845088D10ED736CCCC19989A99B95CC74609CD797C197D1D814D2BD8B4B8E48C5AD291
31,683,109 UART: [art] SIG.R = 06FCF7C6676AD03BADAB61061724C0BF24F7EF263989BED625FF587D1754B85B0BEB5D59CA07829CB794C1F81491C1A5
31,690,505 UART: [art] SIG.S = DAFFF93EB6497E278DCD6EF6352ECA95E9579EB8CE16B49D8CCA84176AF0E290F264EAD58E1D4265403AA05C81480A3B
32,995,715 UART: Caliptra RT
32,996,418 UART: [state] CFI Enabled
33,113,384 UART: [rt] RT listening for mailbox commands...
33,115,236 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,144,805 UART: [rt]cmd =0x46504c54, len=4
33,146,435 >>> mbox cmd response data (8 bytes)
33,147,919 UART: [rt] FIPS self test
33,148,856 UART: [kat] ++
33,149,306 UART: [kat] sha1
33,153,868 UART: [kat] SHA2-256
33,155,470 UART: Fatal Error: 0x90010002
33,190,904 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,335,747 >>> mbox cmd response: failed
33,336,456 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,480,663 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
10,582,925 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,547,683 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,256 UART:
192,632 UART: Running Caliptra ROM ...
193,860 UART:
194,017 UART: [state] CFI Enabled
262,570 UART: [state] LifecycleState = Unprovisioned
264,470 UART: [state] DebugLocked = No
265,864 UART: [state] WD Timer not started. Device not locked for debugging
269,108 UART: [kat] SHA2-256
448,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,844 UART: [kat] ++
460,378 UART: [kat] sha1
470,553 UART: [kat] SHA2-256
473,567 UART: [kat] SHA2-384
478,494 UART: [kat] SHA2-512-ACC
481,435 UART: [kat] ECC-384
2,927,335 UART: [kat] HMAC-384Kdf
2,949,888 UART: [kat] LMS
3,479,322 UART: [kat] --
3,482,410 UART: [cold-reset] ++
3,484,914 UART: [fht] FHT @ 0x50003400
3,494,831 UART: [idev] ++
3,495,406 UART: [idev] CDI.KEYID = 6
3,496,338 UART: [idev] SUBJECT.KEYID = 7
3,497,521 UART: [idev] UDS.KEYID = 0
3,498,449 ready_for_fw is high
3,498,681 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,643,759 UART: [idev] Erasing UDS.KEYID = 0
6,005,528 UART: [idev] Sha1 KeyId Algorithm
6,028,432 UART: [idev] --
6,032,349 UART: [ldev] ++
6,032,933 UART: [ldev] CDI.KEYID = 6
6,033,848 UART: [ldev] SUBJECT.KEYID = 5
6,035,090 UART: [ldev] AUTHORITY.KEYID = 7
6,036,275 UART: [ldev] FE.KEYID = 1
6,078,519 UART: [ldev] Erasing FE.KEYID = 1
8,580,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,124 UART: [ldev] --
10,370,147 UART: [fwproc] Wait for Commands...
10,372,947 UART: [fwproc] Recv command 0x46574c44
10,374,999 UART: [fwproc] Recv'd Img size: 115304 bytes
13,795,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,931,025 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,252,643 >>> mbox cmd response: success
14,256,366 UART: [afmc] ++
14,256,957 UART: [afmc] CDI.KEYID = 6
14,257,841 UART: [afmc] SUBJECT.KEYID = 7
14,259,052 UART: [afmc] AUTHORITY.KEYID = 5
16,790,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,210 UART: [afmc] --
18,606,698 UART: [cold-reset] --
18,609,154 UART: [state] Locking Datavault
18,612,452 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,099 UART: [state] Locking ICCM
18,616,139 UART: [exit] Launching FMC @ 0x40000130
18,624,553 UART:
18,624,792 UART: Running Caliptra FMC ...
18,625,897 UART:
18,626,059 UART: [state] CFI Enabled
18,690,535 UART: [fht] FMC Alias Private Key: 7
20,455,037 UART: [art] Extend RT PCRs Done
20,456,259 UART: [art] Lock RT PCRs Done
20,458,073 UART: [art] Populate DV Done
20,463,431 UART: [fht] FMC Alias Private Key: 7
20,465,034 UART: [art] Derive CDI
20,465,852 UART: [art] Store in in slot 0x4
20,524,138 UART: [art] Derive Key Pair
20,525,177 UART: [art] Store priv key in slot 0x5
22,987,949 UART: [art] Derive Key Pair - Done
23,000,675 UART: [art] Signing Cert with AUTHO
23,001,988 UART: RITY.KEYID = 7
24,713,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,453 UART: [art] PUB.X = 41BC3D2518E809AAFF3CF9AF359BFE75C346677473683A67C434C7161E1A668560D7B2D1BA31CA87C40237A2287125CA
24,722,762 UART: [art] PUB.Y = 04A149A67880D0600CEC73E91FD6DE39D2F37CF2DD6F3A0E7CB0213AF0E1E7F52CD396694AC57ED7E28ECE5D3D2BB94D
24,729,999 UART: [art] SIG.R = 72A9182B87B9DB02F387943877CDB24469918F567A9F0347F673EA921C0287AAE1AC67F52F913F6633DFDFCC14F98CC2
24,737,432 UART: [art] SIG.S = CD71FB3D10F16C30773F6CB0DF3FB2D26DA862E4EDD7B39438C0FB49C260E17D5A261D878600F96BC625B29675E66FF3
25,716,322 UART: Caliptra RT
25,717,035 UART: [state] CFI Enabled
25,884,273 UART: [rt] RT listening for mailbox commands...
25,886,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,915,759 UART: [rt]cmd =0x46504c54, len=4
25,917,499 >>> mbox cmd response data (8 bytes)
25,918,582 UART: [rt] FIPS self test
25,919,527 UART: [kat] ++
25,919,975 UART: [kat] sha1
25,924,377 UART: [kat] SHA2-256
25,925,766 UART: Fatal Error: 0x90010002
25,961,081 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,105,980 >>> mbox cmd response: failed
26,106,584 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,251,227 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,039 UART:
190,338 UART: Running Caliptra ROM ...
191,396 UART:
191,539 UART: [state] CFI Enabled
253,546 UART: [state] LifecycleState = Unprovisioned
255,472 UART: [state] DebugLocked = No
256,906 UART: [state] WD Timer not started. Device not locked for debugging
260,369 UART: [kat] SHA2-256
439,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,041 UART: [kat] ++
451,592 UART: [kat] sha1
461,724 UART: [kat] SHA2-256
464,732 UART: [kat] SHA2-384
471,575 UART: [kat] SHA2-512-ACC
474,508 UART: [kat] ECC-384
2,939,893 UART: [kat] HMAC-384Kdf
2,960,624 UART: [kat] LMS
3,490,058 UART: [kat] --
3,495,834 UART: [cold-reset] ++
3,497,120 UART: [fht] FHT @ 0x50003400
3,507,862 UART: [idev] ++
3,508,427 UART: [idev] CDI.KEYID = 6
3,509,338 UART: [idev] SUBJECT.KEYID = 7
3,510,501 UART: [idev] UDS.KEYID = 0
3,512,127 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,269 UART: [idev] Erasing UDS.KEYID = 0
6,013,797 UART: [idev] Sha1 KeyId Algorithm
6,037,536 UART: [idev] --
6,041,482 UART: [ldev] ++
6,042,055 UART: [ldev] CDI.KEYID = 6
6,042,967 UART: [ldev] SUBJECT.KEYID = 5
6,044,132 UART: [ldev] AUTHORITY.KEYID = 7
6,045,421 UART: [ldev] FE.KEYID = 1
6,089,563 UART: [ldev] Erasing FE.KEYID = 1
8,592,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,650 UART: [ldev] --
10,403,082 UART: [fwproc] Wait for Commands...
10,406,303 UART: [fwproc] Recv command 0x46574c44
10,408,426 UART: [fwproc] Recv'd Img size: 115304 bytes
13,827,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,843 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,012 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,358,188 ready_for_fw is high
3,358,848 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,065,452 >>> mbox cmd response: success
18,357,851 UART:
18,358,286 UART: Running Caliptra FMC ...
18,359,412 UART:
18,359,576 UART: [state] CFI Enabled
18,422,802 UART: [fht] FMC Alias Private Key: 7
20,187,183 UART: [art] Extend RT PCRs Done
20,188,413 UART: [art] Lock RT PCRs Done
20,189,880 UART: [art] Populate DV Done
20,195,342 UART: [fht] FMC Alias Private Key: 7
20,196,880 UART: [art] Derive CDI
20,197,650 UART: [art] Store in in slot 0x4
20,255,729 UART: [art] Derive Key Pair
20,256,734 UART: [art] Store priv key in slot 0x5
22,719,106 UART: [art] Derive Key Pair - Done
22,732,062 UART: [art] Signing Cert with AUTHO
22,733,375 UART: RITY.KEYID = 7
24,445,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,447,417 UART: [art] PUB.X = 6502AAAE271634AF24DD2C308C3599AB83E1F1D078F6F8583E109305688DB83E66961A16D95C3D3293037CE12085AEDC
24,454,637 UART: [art] PUB.Y = A202817963BD6EDEB15636B91C185B2A4A00EA2BAC3F904E9271097FE2588FC8A07FF8152C0BADCFD43FFDBCBA4A1AA2
24,461,915 UART: [art] SIG.R = 7D2648FBAE61744981C687BA2CB55F5FD65315A11BFEFABC6944DB7F88EBFAA08E4D0474603A67FC47FC2DA42238E2F9
24,469,312 UART: [art] SIG.S = 3F8C376E1543ABD9AE3400F81DB5FF9471C6F25D85201954A76208D4481B3F7A500AC7FF49A4D2CE67AD1710F5C3A9C0
25,447,893 UART: Caliptra RT
25,448,595 UART: [state] CFI Enabled
25,613,925 UART: [rt] RT listening for mailbox commands...
25,615,779 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,645,405 UART: [rt]cmd =0x46504c54, len=4
25,646,878 >>> mbox cmd response data (8 bytes)
25,647,895 UART: [rt] FIPS self test
25,648,850 UART: [kat] ++
25,649,306 UART: [kat] sha1
25,653,678 UART: [kat] SHA2-256
25,655,232 UART: Fatal Error: 0x90010002
25,690,474 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,835,295 >>> mbox cmd response: failed
25,835,971 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,980,768 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,350,789 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,029,931 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,587 UART:
192,969 UART: Running Caliptra ROM ...
194,503 UART:
603,929 UART: [state] CFI Enabled
616,963 UART: [state] LifecycleState = Unprovisioned
618,850 UART: [state] DebugLocked = No
620,102 UART: [state] WD Timer not started. Device not locked for debugging
623,704 UART: [kat] SHA2-256
802,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,368 UART: [kat] ++
814,904 UART: [kat] sha1
824,895 UART: [kat] SHA2-256
827,921 UART: [kat] SHA2-384
833,984 UART: [kat] SHA2-512-ACC
836,906 UART: [kat] ECC-384
3,278,840 UART: [kat] HMAC-384Kdf
3,291,197 UART: [kat] LMS
3,820,712 UART: [kat] --
3,824,231 UART: [cold-reset] ++
3,825,401 UART: [fht] FHT @ 0x50003400
3,835,531 UART: [idev] ++
3,836,097 UART: [idev] CDI.KEYID = 6
3,837,135 UART: [idev] SUBJECT.KEYID = 7
3,838,189 UART: [idev] UDS.KEYID = 0
3,839,160 ready_for_fw is high
3,839,395 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,984,302 UART: [idev] Erasing UDS.KEYID = 0
6,315,681 UART: [idev] Sha1 KeyId Algorithm
6,339,883 UART: [idev] --
6,342,091 UART: [ldev] ++
6,342,663 UART: [ldev] CDI.KEYID = 6
6,343,570 UART: [ldev] SUBJECT.KEYID = 5
6,344,726 UART: [ldev] AUTHORITY.KEYID = 7
6,346,009 UART: [ldev] FE.KEYID = 1
6,356,392 UART: [ldev] Erasing FE.KEYID = 1
8,830,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,462 UART: [ldev] --
10,620,703 UART: [fwproc] Wait for Commands...
10,622,693 UART: [fwproc] Recv command 0x46574c44
10,624,790 UART: [fwproc] Recv'd Img size: 115304 bytes
14,044,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,490 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,505,659 >>> mbox cmd response: success
14,510,227 UART: [afmc] ++
14,510,817 UART: [afmc] CDI.KEYID = 6
14,511,730 UART: [afmc] SUBJECT.KEYID = 7
14,512,960 UART: [afmc] AUTHORITY.KEYID = 5
17,010,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,842 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,737 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,286 UART: [afmc] --
18,805,229 UART: [cold-reset] --
18,808,494 UART: [state] Locking Datavault
18,813,685 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,337 UART: [state] Locking ICCM
18,816,948 UART: [exit] Launching FMC @ 0x40000130
18,825,341 UART:
18,825,574 UART: Running Caliptra FMC ...
18,826,678 UART:
18,826,858 UART: [state] CFI Enabled
18,835,290 UART: [fht] FMC Alias Private Key: 7
20,592,931 UART: [art] Extend RT PCRs Done
20,594,160 UART: [art] Lock RT PCRs Done
20,596,096 UART: [art] Populate DV Done
20,601,263 UART: [fht] FMC Alias Private Key: 7
20,602,857 UART: [art] Derive CDI
20,603,599 UART: [art] Store in in slot 0x4
20,645,975 UART: [art] Derive Key Pair
20,646,974 UART: [art] Store priv key in slot 0x5
23,073,377 UART: [art] Derive Key Pair - Done
23,086,615 UART: [art] Signing Cert with AUTHO
23,087,923 UART: RITY.KEYID = 7
24,793,003 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,510 UART: [art] PUB.X = 0342FAC59C51A3466F7AA4EC2CAF081C5142B4F40C34996C0004C2F4234C4D5578A5547CC1C110FEDD921AD3E28AD005
24,801,768 UART: [art] PUB.Y = 380A6CF6883FDF7F477E91A5DB51E22DADD0C586731E743BB920CDDA0D6AD736F21DF08C2167BA546760FE31E86B5B73
24,809,023 UART: [art] SIG.R = 14C829D45D231EDD9753D4F3C2B3DAF21FE67B4CE9539E1FB9519FB7B8DE252212813D842154AF12C890F127EA503BE6
24,816,430 UART: [art] SIG.S = 05E55FE48CC974E4E75DCB35F2EFEDE6B96C7517D00CBFBD1E8ADDC81D32F7809B8B45A8EC59A544B1A3801549EE0B57
25,795,910 UART: Caliptra RT
25,796,607 UART: [state] CFI Enabled
25,915,016 UART: [rt] RT listening for mailbox commands...
25,916,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,946,475 UART: [rt]cmd =0x46504c54, len=4
25,948,052 >>> mbox cmd response data (8 bytes)
25,948,905 UART: [rt] FIPS self test
25,949,847 UART: [kat] ++
25,950,299 UART: [kat] sha1
25,954,600 UART: [kat] SHA2-256
25,955,975 UART: Fatal Error: 0x90010002
25,991,112 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,135,893 >>> mbox cmd response: failed
26,136,490 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,281,231 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,025 UART:
190,320 UART: Running Caliptra ROM ...
191,343 UART:
14,251,338 UART: [state] CFI Enabled
14,262,830 UART: [state] LifecycleState = Unprovisioned
14,264,698 UART: [state] DebugLocked = No
14,267,464 UART: [state] WD Timer not started. Device not locked for debugging
14,271,256 UART: [kat] SHA2-256
14,450,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,461,979 UART: [kat] ++
14,462,440 UART: [kat] sha1
14,472,887 UART: [kat] SHA2-256
14,475,837 UART: [kat] SHA2-384
14,481,475 UART: [kat] SHA2-512-ACC
14,484,420 UART: [kat] ECC-384
16,925,415 UART: [kat] HMAC-384Kdf
16,936,453 UART: [kat] LMS
17,465,967 UART: [kat] --
17,470,821 UART: [cold-reset] ++
17,472,692 UART: [fht] FHT @ 0x50003400
17,483,668 UART: [idev] ++
17,484,230 UART: [idev] CDI.KEYID = 6
17,485,246 UART: [idev] SUBJECT.KEYID = 7
17,486,349 UART: [idev] UDS.KEYID = 0
17,487,978 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,632,757 UART: [idev] Erasing UDS.KEYID = 0
19,961,300 UART: [idev] Sha1 KeyId Algorithm
19,985,503 UART: [idev] --
19,989,705 UART: [ldev] ++
19,990,286 UART: [ldev] CDI.KEYID = 6
19,991,168 UART: [ldev] SUBJECT.KEYID = 5
19,992,380 UART: [ldev] AUTHORITY.KEYID = 7
19,993,772 UART: [ldev] FE.KEYID = 1
20,004,403 UART: [ldev] Erasing FE.KEYID = 1
22,475,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,191,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,207,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,223,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,239,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,257,860 UART: [ldev] --
24,262,911 UART: [fwproc] Wait for Commands...
24,265,501 UART: [fwproc] Recv command 0x46574c44
24,267,598 UART: [fwproc] Recv'd Img size: 115304 bytes
27,687,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,757,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,826,099 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,147,104 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
3,696,163 ready_for_fw is high
3,696,581 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,299,852 >>> mbox cmd response: success
18,550,004 UART:
18,550,414 UART: Running Caliptra FMC ...
18,551,545 UART:
18,551,696 UART: [state] CFI Enabled
18,559,410 UART: [fht] FMC Alias Private Key: 7
20,316,031 UART: [art] Extend RT PCRs Done
20,317,245 UART: [art] Lock RT PCRs Done
20,318,678 UART: [art] Populate DV Done
20,323,912 UART: [fht] FMC Alias Private Key: 7
20,325,417 UART: [art] Derive CDI
20,326,155 UART: [art] Store in in slot 0x4
20,368,802 UART: [art] Derive Key Pair
20,369,813 UART: [art] Store priv key in slot 0x5
22,796,754 UART: [art] Derive Key Pair - Done
22,809,707 UART: [art] Signing Cert with AUTHO
22,811,027 UART: RITY.KEYID = 7
24,516,450 UART: [art] Erasing AUTHORITY.KEYID = 7
24,517,935 UART: [art] PUB.X = 114C5AE5EACF41AD35B81239ABD752E80077C56E01BF619CFFF29AC4C4C571708F3A10749F38BBA636A7C3450E63E7D2
24,525,195 UART: [art] PUB.Y = 410AA61FE07964A72792EB153B6FD962B0BC56566C4775823C3E46C3C44A5567889AB18F2D5A8F7B7FF65639227B1819
24,532,427 UART: [art] SIG.R = BC1912BB60D7A4F2020343F635B84C7616AE1E54C0F08330255D68E2E9D92445548EC0E5C3544BB13E3F2CDC2E68C539
24,539,835 UART: [art] SIG.S = A12F78E06EB4C6D71049AB907F47B91746FDB95973799C455A68175E3BC7C46BFBD66226E849A12F97AE8DEA2D4F3FE4
25,518,830 UART: Caliptra RT
25,519,548 UART: [state] CFI Enabled
25,636,828 UART: [rt] RT listening for mailbox commands...
25,638,676 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,668,588 UART: [rt]cmd =0x46504c54, len=4
25,670,086 >>> mbox cmd response data (8 bytes)
25,671,041 UART: [rt] FIPS self test
25,671,932 UART: [kat] ++
25,672,383 UART: [kat] sha1
25,676,787 UART: [kat] SHA2-256
25,678,304 UART: Fatal Error: 0x90010002
25,713,462 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,858,264 >>> mbox cmd response: failed
25,858,933 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,003,716 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
17,609,154 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,204,136 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,167 UART:
192,529 UART: Running Caliptra ROM ...
193,719 UART:
193,875 UART: [state] CFI Enabled
263,496 UART: [state] LifecycleState = Unprovisioned
265,928 UART: [state] DebugLocked = No
268,531 UART: [state] WD Timer not started. Device not locked for debugging
272,426 UART: [kat] SHA2-256
462,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,039 UART: [kat] ++
473,521 UART: [kat] sha1
484,897 UART: [kat] SHA2-256
487,923 UART: [kat] SHA2-384
493,916 UART: [kat] SHA2-512-ACC
496,502 UART: [kat] ECC-384
2,948,637 UART: [kat] HMAC-384Kdf
2,972,635 UART: [kat] LMS
3,504,405 UART: [kat] --
3,510,251 UART: [cold-reset] ++
3,511,973 UART: [fht] FHT @ 0x50003400
3,523,525 UART: [idev] ++
3,524,241 UART: [idev] CDI.KEYID = 6
3,525,197 UART: [idev] SUBJECT.KEYID = 7
3,526,371 UART: [idev] UDS.KEYID = 0
3,527,466 ready_for_fw is high
3,527,677 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,672,704 UART: [idev] Erasing UDS.KEYID = 0
6,029,869 UART: [idev] Sha1 KeyId Algorithm
6,052,580 UART: [idev] --
6,056,490 UART: [ldev] ++
6,057,179 UART: [ldev] CDI.KEYID = 6
6,058,106 UART: [ldev] SUBJECT.KEYID = 5
6,059,288 UART: [ldev] AUTHORITY.KEYID = 7
6,060,468 UART: [ldev] FE.KEYID = 1
6,099,901 UART: [ldev] Erasing FE.KEYID = 1
8,604,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,211 UART: [ldev] --
10,413,347 UART: [fwproc] Wait for Commands...
10,415,822 UART: [fwproc] Recv command 0x46574c44
10,418,138 UART: [fwproc] Recv'd Img size: 115304 bytes
13,880,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,077,301 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,626,291 >>> mbox cmd response: success
14,631,220 UART: [afmc] ++
14,631,922 UART: [afmc] CDI.KEYID = 6
14,633,161 UART: [afmc] SUBJECT.KEYID = 7
14,634,629 UART: [afmc] AUTHORITY.KEYID = 5
17,179,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,918,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,709 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,972,305 UART: [afmc] --
18,976,757 UART: [cold-reset] --
18,981,108 UART: [state] Locking Datavault
18,987,930 UART: [state] Locking PCR0, PCR1 and PCR31
18,990,116 UART: [state] Locking ICCM
18,992,751 UART: [exit] Launching FMC @ 0x40000130
19,001,434 UART:
19,001,683 UART: Running Caliptra FMC ...
19,002,791 UART:
19,002,953 UART: [state] CFI Enabled
19,057,849 UART: [fht] FMC Alias Private Key: 7
20,821,158 UART: [art] Extend RT PCRs Done
20,822,386 UART: [art] Lock RT PCRs Done
20,824,070 UART: [art] Populate DV Done
20,829,323 UART: [fht] FMC Alias Private Key: 7
20,830,916 UART: [art] Derive CDI
20,831,730 UART: [art] Store in in slot 0x4
20,891,477 UART: [art] Derive Key Pair
20,892,519 UART: [art] Store priv key in slot 0x5
23,355,606 UART: [art] Derive Key Pair - Done
23,368,121 UART: [art] Signing Cert with AUTHO
23,369,425 UART: RITY.KEYID = 7
25,081,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,082,643 UART: [art] PUB.X = EDC52F2837FC8949F2B323CE9A1B1B351C43FAD5820B707997C74CB7D8493ECF58E5A8B182A6D1DB539912EAB4527640
25,089,937 UART: [art] PUB.Y = 4675031BB58A62E3A6A888042990B6C27D16AF67F85C6EA0C79E2D96E3CA141AD387100CF5F5313705A50545719B53BB
25,097,197 UART: [art] SIG.R = A8A5073262B86519CF2DA8B4FF4D92C06ACC7C60847B7C19342BAC36CAE369451B615C3C83FEB211066E113220206DA6
25,104,554 UART: [art] SIG.S = D00742851C799BBD17219D5B686DFB694AF6FCBBDD66E513409395C846A0B8ECC38B4E5DD494E5B24D13B91E375C76A7
26,083,599 UART: Caliptra RT
26,084,313 UART: [state] CFI Enabled
26,249,433 UART: [rt] RT listening for mailbox commands...
26,251,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,280,967 UART: [rt]cmd =0x46504c54, len=4
26,282,544 >>> mbox cmd response data (8 bytes)
26,283,515 UART: [rt] FIPS self test
26,284,461 UART: [kat] ++
26,284,914 UART: [kat] sha1
26,289,381 UART: [kat] SHA2-256
26,290,866 UART: Fatal Error: 0x90010002
26,326,105 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,470,910 >>> mbox cmd response: failed
26,471,513 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,616,248 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,104 UART:
190,393 UART: Running Caliptra ROM ...
191,446 UART:
191,586 UART: [state] CFI Enabled
254,387 UART: [state] LifecycleState = Unprovisioned
256,733 UART: [state] DebugLocked = No
258,381 UART: [state] WD Timer not started. Device not locked for debugging
263,787 UART: [kat] SHA2-256
453,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,427 UART: [kat] ++
465,084 UART: [kat] sha1
476,454 UART: [kat] SHA2-256
479,495 UART: [kat] SHA2-384
485,377 UART: [kat] SHA2-512-ACC
487,938 UART: [kat] ECC-384
2,941,797 UART: [kat] HMAC-384Kdf
2,964,599 UART: [kat] LMS
3,496,377 UART: [kat] --
3,500,009 UART: [cold-reset] ++
3,501,140 UART: [fht] FHT @ 0x50003400
3,513,797 UART: [idev] ++
3,514,512 UART: [idev] CDI.KEYID = 6
3,515,402 UART: [idev] SUBJECT.KEYID = 7
3,516,622 UART: [idev] UDS.KEYID = 0
3,518,135 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,663,023 UART: [idev] Erasing UDS.KEYID = 0
6,018,044 UART: [idev] Sha1 KeyId Algorithm
6,040,251 UART: [idev] --
6,044,138 UART: [ldev] ++
6,044,877 UART: [ldev] CDI.KEYID = 6
6,045,761 UART: [ldev] SUBJECT.KEYID = 5
6,046,866 UART: [ldev] AUTHORITY.KEYID = 7
6,048,156 UART: [ldev] FE.KEYID = 1
6,092,051 UART: [ldev] Erasing FE.KEYID = 1
8,592,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,270 UART: [ldev] --
10,404,710 UART: [fwproc] Wait for Commands...
10,407,893 UART: [fwproc] Recv command 0x46574c44
10,410,230 UART: [fwproc] Recv'd Img size: 115304 bytes
13,871,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,328 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,621,467 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,438,719 ready_for_fw is high
3,439,404 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,751,480 >>> mbox cmd response: success
19,047,694 UART:
19,048,084 UART: Running Caliptra FMC ...
19,049,215 UART:
19,049,369 UART: [state] CFI Enabled
19,116,078 UART: [fht] FMC Alias Private Key: 7
20,879,941 UART: [art] Extend RT PCRs Done
20,881,163 UART: [art] Lock RT PCRs Done
20,882,818 UART: [art] Populate DV Done
20,888,232 UART: [fht] FMC Alias Private Key: 7
20,889,720 UART: [art] Derive CDI
20,890,452 UART: [art] Store in in slot 0x4
20,948,609 UART: [art] Derive Key Pair
20,949,668 UART: [art] Store priv key in slot 0x5
23,413,032 UART: [art] Derive Key Pair - Done
23,425,930 UART: [art] Signing Cert with AUTHO
23,427,241 UART: RITY.KEYID = 7
25,138,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,226 UART: [art] PUB.X = 4DE5E3F5A71A7DBD176518E665EDAE392887175EC9C456141DD244B72590BB7B920E045C075DF4F051C6866FFFA85DAF
25,147,491 UART: [art] PUB.Y = E7A368C854084944531BCFE78A39C5BFC23C3CB638293338A6AB8D24BF6C0B7440699BE5939D60FB070C1F597495DC69
25,154,732 UART: [art] SIG.R = EAEADD53F3707987828760C5698E60BBF6132060C52CA23DC8DF431FDB192B7BB71868331081C82B5AE1A060F3F3EA0A
25,162,191 UART: [art] SIG.S = 5594DF0D0682932A851907C05C2A20B4DDC82FB1B196E2B83D8A34109ECD7DACB212DF4E70AAE77CE63AED0964194A90
26,140,191 UART: Caliptra RT
26,140,915 UART: [state] CFI Enabled
26,307,927 UART: [rt] RT listening for mailbox commands...
26,309,805 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,374 UART: [rt]cmd =0x46504c54, len=4
26,340,848 >>> mbox cmd response data (8 bytes)
26,342,057 UART: [rt] FIPS self test
26,343,008 UART: [kat] ++
26,343,465 UART: [kat] sha1
26,348,008 UART: [kat] SHA2-256
26,349,514 UART: Fatal Error: 0x90010002
26,384,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,529,872 >>> mbox cmd response: failed
26,530,491 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,675,169 >>> mbox cmd response: failed
Initializing fuses
1,096 writing to cptra_bootfsm_go
3,429,803 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,742,314 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,464 UART:
192,832 UART: Running Caliptra ROM ...
193,974 UART:
603,717 UART: [state] CFI Enabled
620,015 UART: [state] LifecycleState = Unprovisioned
622,339 UART: [state] DebugLocked = No
624,588 UART: [state] WD Timer not started. Device not locked for debugging
629,640 UART: [kat] SHA2-256
819,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,309 UART: [kat] ++
830,915 UART: [kat] sha1
841,158 UART: [kat] SHA2-256
844,176 UART: [kat] SHA2-384
849,812 UART: [kat] SHA2-512-ACC
852,396 UART: [kat] ECC-384
3,295,215 UART: [kat] HMAC-384Kdf
3,307,865 UART: [kat] LMS
3,839,707 UART: [kat] --
3,843,846 UART: [cold-reset] ++
3,845,563 UART: [fht] FHT @ 0x50003400
3,856,797 UART: [idev] ++
3,857,550 UART: [idev] CDI.KEYID = 6
3,858,443 UART: [idev] SUBJECT.KEYID = 7
3,859,697 UART: [idev] UDS.KEYID = 0
3,860,608 ready_for_fw is high
3,860,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,005,584 UART: [idev] Erasing UDS.KEYID = 0
6,337,027 UART: [idev] Sha1 KeyId Algorithm
6,358,919 UART: [idev] --
6,364,756 UART: [ldev] ++
6,365,490 UART: [ldev] CDI.KEYID = 6
6,366,373 UART: [ldev] SUBJECT.KEYID = 5
6,367,484 UART: [ldev] AUTHORITY.KEYID = 7
6,368,773 UART: [ldev] FE.KEYID = 1
6,378,580 UART: [ldev] Erasing FE.KEYID = 1
8,850,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,246 UART: [ldev] --
10,643,023 UART: [fwproc] Wait for Commands...
10,644,745 UART: [fwproc] Recv command 0x46574c44
10,647,005 UART: [fwproc] Recv'd Img size: 115304 bytes
14,105,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,291 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,852,719 >>> mbox cmd response: success
14,856,801 UART: [afmc] ++
14,857,506 UART: [afmc] CDI.KEYID = 6
14,858,666 UART: [afmc] SUBJECT.KEYID = 7
14,860,198 UART: [afmc] AUTHORITY.KEYID = 5
17,365,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,514 UART: [afmc] --
19,159,065 UART: [cold-reset] --
19,163,199 UART: [state] Locking Datavault
19,169,203 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,394 UART: [state] Locking ICCM
19,173,169 UART: [exit] Launching FMC @ 0x40000130
19,181,840 UART:
19,182,077 UART: Running Caliptra FMC ...
19,183,180 UART:
19,183,340 UART: [state] CFI Enabled
19,191,459 UART: [fht] FMC Alias Private Key: 7
20,948,479 UART: [art] Extend RT PCRs Done
20,949,702 UART: [art] Lock RT PCRs Done
20,951,194 UART: [art] Populate DV Done
20,956,442 UART: [fht] FMC Alias Private Key: 7
20,958,039 UART: [art] Derive CDI
20,958,856 UART: [art] Store in in slot 0x4
21,001,453 UART: [art] Derive Key Pair
21,002,502 UART: [art] Store priv key in slot 0x5
23,429,238 UART: [art] Derive Key Pair - Done
23,442,277 UART: [art] Signing Cert with AUTHO
23,443,573 UART: RITY.KEYID = 7
25,149,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,633 UART: [art] PUB.X = A938A0431326E063ED546BD8013F4E9ED86CFA1EFADC7A06BDE5E2EA629BC6D0C4E94E962FFB4151F6D3D9144A9A7E68
25,157,886 UART: [art] PUB.Y = DB79F268FFECAA3A9C7A326D3A276BF93E75303C1CDAB105E53965C890008ED64EF78D14296E47C7723ED2C51A597E84
25,165,132 UART: [art] SIG.R = EB4DB2052D8BD7D2E99D4B4FDFD27262C507EE8A558922FDE25F34145443AD1ED8687B863007A8958FBFD07A64074D75
25,172,539 UART: [art] SIG.S = 284BCF1C136200462949FAA75482987BFDBDD1EB613C08511558132E2A223ECF3BEE1F2AA09E08C6CE863AA697234ADB
26,151,652 UART: Caliptra RT
26,152,371 UART: [state] CFI Enabled
26,270,047 UART: [rt] RT listening for mailbox commands...
26,271,912 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,301,589 UART: [rt]cmd =0x46504c54, len=4
26,303,002 >>> mbox cmd response data (8 bytes)
26,304,179 UART: [rt] FIPS self test
26,305,124 UART: [kat] ++
26,305,577 UART: [kat] sha1
26,309,814 UART: [kat] SHA2-256
26,311,367 UART: Fatal Error: 0x90010002
26,346,745 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,491,432 >>> mbox cmd response: failed
26,492,044 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,636,773 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,104 UART:
190,392 UART: Running Caliptra ROM ...
191,418 UART:
13,894,367 UART: [state] CFI Enabled
13,908,292 UART: [state] LifecycleState = Unprovisioned
13,910,645 UART: [state] DebugLocked = No
13,913,164 UART: [state] WD Timer not started. Device not locked for debugging
13,917,008 UART: [kat] SHA2-256
14,106,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,117,661 UART: [kat] ++
14,118,255 UART: [kat] sha1
14,130,981 UART: [kat] SHA2-256
14,134,007 UART: [kat] SHA2-384
14,139,726 UART: [kat] SHA2-512-ACC
14,142,306 UART: [kat] ECC-384
16,585,120 UART: [kat] HMAC-384Kdf
16,597,505 UART: [kat] LMS
17,129,321 UART: [kat] --
17,133,055 UART: [cold-reset] ++
17,134,181 UART: [fht] FHT @ 0x50003400
17,145,005 UART: [idev] ++
17,145,722 UART: [idev] CDI.KEYID = 6
17,146,611 UART: [idev] SUBJECT.KEYID = 7
17,147,828 UART: [idev] UDS.KEYID = 0
17,149,401 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,294,030 UART: [idev] Erasing UDS.KEYID = 0
19,626,087 UART: [idev] Sha1 KeyId Algorithm
19,648,618 UART: [idev] --
19,653,642 UART: [ldev] ++
19,654,323 UART: [ldev] CDI.KEYID = 6
19,655,250 UART: [ldev] SUBJECT.KEYID = 5
19,656,416 UART: [ldev] AUTHORITY.KEYID = 7
19,657,597 UART: [ldev] FE.KEYID = 1
19,668,356 UART: [ldev] Erasing FE.KEYID = 1
22,146,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,865,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,880,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,896,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,911,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,930,978 UART: [ldev] --
23,937,320 UART: [fwproc] Wait for Commands...
23,939,082 UART: [fwproc] Recv command 0x46574c44
23,941,411 UART: [fwproc] Recv'd Img size: 115304 bytes
27,402,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,482,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,599,025 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,147,201 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,759,182 ready_for_fw is high
3,759,834 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,974,377 >>> mbox cmd response: success
19,222,746 UART:
19,223,143 UART: Running Caliptra FMC ...
19,224,295 UART:
19,224,454 UART: [state] CFI Enabled
19,232,373 UART: [fht] FMC Alias Private Key: 7
20,989,175 UART: [art] Extend RT PCRs Done
20,990,407 UART: [art] Lock RT PCRs Done
20,992,144 UART: [art] Populate DV Done
20,997,454 UART: [fht] FMC Alias Private Key: 7
20,998,996 UART: [art] Derive CDI
20,999,758 UART: [art] Store in in slot 0x4
21,042,844 UART: [art] Derive Key Pair
21,043,897 UART: [art] Store priv key in slot 0x5
23,471,007 UART: [art] Derive Key Pair - Done
23,484,134 UART: [art] Signing Cert with AUTHO
23,485,444 UART: RITY.KEYID = 7
25,190,865 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,379 UART: [art] PUB.X = ADCEE5879FD1D320955BA5FDC569D06A4426D92CFD290A7553B860DBE00CADDF78D66AA8069014C5B0992DDB87E3A018
25,199,724 UART: [art] PUB.Y = D90C14C65F8BC44B4CB8C16BE857E46DC54C4BDE955749FC28AB12677BA5D359399235849F5099923EF583544DFFDA5A
25,206,946 UART: [art] SIG.R = 3E185045B8A7403D85CFB59EF02B2EA9414D0118216B4C2F74A39D111A9186B30593C6618A4BCEF6FC5212DDE6A1277D
25,214,363 UART: [art] SIG.S = 8011A3D286C364E3E15FF270ABC3CE5B74E08BA8665D0B775C96A96FEE6FBD6959B7151619D713478E3EFD5260D00079
26,194,038 UART: Caliptra RT
26,194,732 UART: [state] CFI Enabled
26,311,519 UART: [rt] RT listening for mailbox commands...
26,313,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,342,808 UART: [rt]cmd =0x46504c54, len=4
26,344,364 >>> mbox cmd response data (8 bytes)
26,345,316 UART: [rt] FIPS self test
26,346,267 UART: [kat] ++
26,346,720 UART: [kat] sha1
26,351,067 UART: [kat] SHA2-256
26,352,511 UART: Fatal Error: 0x90010002
26,387,751 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,532,977 >>> mbox cmd response: failed
26,533,621 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,678,352 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,003,682 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,227,225 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,733 UART: [kat] SHA2-256
881,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,779 UART: [kat] ++
885,931 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,847 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 ready_for_fw is high
1,480,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,896 UART: [idev] Erasing UDS.KEYID = 0
1,504,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,708 UART: [idev] --
1,513,545 UART: [ldev] ++
1,513,713 UART: [ldev] CDI.KEYID = 6
1,514,076 UART: [ldev] SUBJECT.KEYID = 5
1,514,502 UART: [ldev] AUTHORITY.KEYID = 7
1,514,965 UART: [ldev] FE.KEYID = 1
1,519,733 UART: [ldev] Erasing FE.KEYID = 1
1,545,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,326 UART: [ldev] --
1,584,805 UART: [fwproc] Waiting for Commands...
1,585,528 UART: [fwproc] Received command 0x46574c44
1,586,319 UART: [fwproc] Received Image of size 115304 bytes
2,895,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,560 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,345 >>> mbox cmd response: success
3,090,563 UART: [afmc] ++
3,090,731 UART: [afmc] CDI.KEYID = 6
3,091,093 UART: [afmc] SUBJECT.KEYID = 7
3,091,518 UART: [afmc] AUTHORITY.KEYID = 5
3,126,417 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,004 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,694 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,455 UART: [afmc] --
3,169,571 UART: [cold-reset] --
3,170,471 UART: [state] Locking Datavault
3,171,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,242 UART: [state] Locking ICCM
3,172,882 UART: [exit] Launching FMC @ 0x40000130
3,178,211 UART:
3,178,227 UART: Running Caliptra FMC ...
3,178,635 UART:
3,178,689 UART: [state] CFI Enabled
3,189,306 UART: [fht] FMC Alias Private Key: 7
3,297,777 UART: [art] Extend RT PCRs Done
3,298,205 UART: [art] Lock RT PCRs Done
3,299,501 UART: [art] Populate DV Done
3,307,868 UART: [fht] FMC Alias Private Key: 7
3,309,046 UART: [art] Derive CDI
3,309,326 UART: [art] Store in in slot 0x4
3,395,111 UART: [art] Derive Key Pair
3,395,471 UART: [art] Store priv key in slot 0x5
3,408,359 UART: [art] Derive Key Pair - Done
3,423,017 UART: [art] Signing Cert with AUTHO
3,423,497 UART: RITY.KEYID = 7
3,438,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,304 UART: [art] PUB.X = CBD58C728A95E83EC1BC717DE4906B5709674ECA13E95116C14E8B35DB3D18F9049E819A87E5A0E33F7564E8317F0AFF
3,446,073 UART: [art] PUB.Y = AC616246BA940B73E23200260B1E847487D47EE5A9393EB02147A6A83BD98B9A95B5331793A7B7BB3C5E41EB2EA34C22
3,452,997 UART: [art] SIG.R = 2B5F17B74A680ABE02BE5BDC8C1FE6EAED76E9029A59CD9850508846FD90B1B080E3ED4940A2893AAD673F76F1713D1A
3,459,772 UART: [art] SIG.S = 36DE5E794CC5769FE24C35DFDD21E5A11BDB7B03601BC2E2E41CD5FCD27F94D40BC865AB5C1B00E7A6FDF1A4FBDD118D
3,483,623 UART: Caliptra RT
3,483,876 UART: [state] CFI Enabled
3,591,714 UART: [rt] RT listening for mailbox commands...
3,592,377 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,288 UART: [rt]cmd =0x46504c54, len=4
3,623,359 >>> mbox cmd response data (8 bytes)
3,623,726 UART: [rt] FIPS self test
3,624,054 UART: [kat] ++
3,624,206 UART: [kat] sha1
3,628,368 UART: [kat] SHA2-256
3,630,364 UART: Fatal Error: 0x90010002
3,631,914 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,631,919 >>> mbox cmd response: failed
3,631,919 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,631,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,458 UART: [kat] LMS
1,475,654 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,644 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,658 UART: [idev] --
1,514,531 UART: [ldev] ++
1,514,699 UART: [ldev] CDI.KEYID = 6
1,515,062 UART: [ldev] SUBJECT.KEYID = 5
1,515,488 UART: [ldev] AUTHORITY.KEYID = 7
1,515,951 UART: [ldev] FE.KEYID = 1
1,521,269 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,784 UART: [ldev] --
1,586,081 UART: [fwproc] Waiting for Commands...
1,586,716 UART: [fwproc] Received command 0x46574c44
1,587,507 UART: [fwproc] Received Image of size 115304 bytes
2,896,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,295 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 ready_for_fw is high
1,362,589 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,907 >>> mbox cmd response: success
3,002,021 UART:
3,002,037 UART: Running Caliptra FMC ...
3,002,445 UART:
3,002,499 UART: [state] CFI Enabled
3,013,128 UART: [fht] FMC Alias Private Key: 7
3,120,943 UART: [art] Extend RT PCRs Done
3,121,371 UART: [art] Lock RT PCRs Done
3,122,747 UART: [art] Populate DV Done
3,130,752 UART: [fht] FMC Alias Private Key: 7
3,131,934 UART: [art] Derive CDI
3,132,214 UART: [art] Store in in slot 0x4
3,217,679 UART: [art] Derive Key Pair
3,218,039 UART: [art] Store priv key in slot 0x5
3,230,869 UART: [art] Derive Key Pair - Done
3,245,832 UART: [art] Signing Cert with AUTHO
3,246,312 UART: RITY.KEYID = 7
3,261,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,375 UART: [art] PUB.X = 98D100495035992BC358EFD97606B57A1144BEF83F76A2BC31224CF0641477C292169E8FE24910FC676AAA0215AADC14
3,269,115 UART: [art] PUB.Y = 23FC6322C52C752E89153D40E950925B30C65BAFC8D074A50438DCA4CA763D7173C59FBF00FCBAF950A5BE8F32183BED
3,276,052 UART: [art] SIG.R = C1587EC3330D0C720513FA48047D67222F3731541FBE455544760EE79E849B58A74E6CC85ADDB93F969C0FD086099684
3,282,795 UART: [art] SIG.S = AD4A616435A094F5DAF3D19111297DBB2060F36F7D0ABA09166105B71F19FB384A4CB4B972B6721F4B2FD9F20E2B4BFB
3,306,302 UART: Caliptra RT
3,306,555 UART: [state] CFI Enabled
3,414,189 UART: [rt] RT listening for mailbox commands...
3,414,852 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,739 UART: [rt]cmd =0x46504c54, len=4
3,445,922 >>> mbox cmd response data (8 bytes)
3,446,097 UART: [rt] FIPS self test
3,446,425 UART: [kat] ++
3,446,577 UART: [kat] sha1
3,450,761 UART: [kat] SHA2-256
3,452,677 UART: Fatal Error: 0x90010002
3,454,227 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,232 >>> mbox cmd response: failed
3,454,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,075 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
891,248 UART: [kat] SHA2-256
893,186 UART: [kat] SHA2-384
895,919 UART: [kat] SHA2-512-ACC
897,820 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,061 UART: [kat] LMS
1,476,257 UART: [kat] --
1,476,992 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 ready_for_fw is high
1,481,388 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,199 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,085 UART: [idev] --
1,514,984 UART: [ldev] ++
1,515,152 UART: [ldev] CDI.KEYID = 6
1,515,515 UART: [ldev] SUBJECT.KEYID = 5
1,515,941 UART: [ldev] AUTHORITY.KEYID = 7
1,516,404 UART: [ldev] FE.KEYID = 1
1,521,982 UART: [ldev] Erasing FE.KEYID = 1
1,547,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,103 UART: [ldev] --
1,587,550 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 115304 bytes
2,899,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,335 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,687 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,884 >>> mbox cmd response: success
3,094,992 UART: [afmc] ++
3,095,160 UART: [afmc] CDI.KEYID = 6
3,095,522 UART: [afmc] SUBJECT.KEYID = 7
3,095,947 UART: [afmc] AUTHORITY.KEYID = 5
3,131,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,159,255 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,945 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,772 UART: [afmc] --
3,173,820 UART: [cold-reset] --
3,174,612 UART: [state] Locking Datavault
3,175,729 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,333 UART: [state] Locking ICCM
3,176,925 UART: [exit] Launching FMC @ 0x40000130
3,182,254 UART:
3,182,270 UART: Running Caliptra FMC ...
3,182,678 UART:
3,182,821 UART: [state] CFI Enabled
3,193,440 UART: [fht] FMC Alias Private Key: 7
3,300,923 UART: [art] Extend RT PCRs Done
3,301,351 UART: [art] Lock RT PCRs Done
3,302,777 UART: [art] Populate DV Done
3,310,758 UART: [fht] FMC Alias Private Key: 7
3,311,786 UART: [art] Derive CDI
3,312,066 UART: [art] Store in in slot 0x4
3,397,619 UART: [art] Derive Key Pair
3,397,979 UART: [art] Store priv key in slot 0x5
3,410,955 UART: [art] Derive Key Pair - Done
3,425,742 UART: [art] Signing Cert with AUTHO
3,426,222 UART: RITY.KEYID = 7
3,441,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,217 UART: [art] PUB.X = 31A786C96E6E4934289DDC94164843C101FE2EBAE67822A618AE35CFA74EBAE49ADDED30EEB17CD4AE366445285CF928
3,448,998 UART: [art] PUB.Y = 555AE84C1302B0C38C7535F3C70A8784EEA4434FAD665D03B2BD11F6FE88A459C03A615F86EA2DECDC649BAA8C444F96
3,455,953 UART: [art] SIG.R = 9F6287C1B458B9E8279F4E2734C82BAD942FCB92BC1B7EAE5E336B11B596054C4ED255C6BC5B70A5FF72A74CA17CD858
3,462,734 UART: [art] SIG.S = FE5B1FE29ED7C68C8AFE90201ACB62611273B8408734EECDA935AF3C4AB39B55B7A39344F71571210C7D5A2BB980914A
3,486,950 UART: Caliptra RT
3,487,295 UART: [state] CFI Enabled
3,595,585 UART: [rt] RT listening for mailbox commands...
3,596,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,027 UART: [rt]cmd =0x46504c54, len=4
3,627,192 >>> mbox cmd response data (8 bytes)
3,627,457 UART: [rt] FIPS self test
3,627,785 UART: [kat] ++
3,627,937 UART: [kat] sha1
3,632,271 UART: [kat] SHA2-256
3,634,365 UART: Fatal Error: 0x90010002
3,635,915 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,920 >>> mbox cmd response: failed
3,635,920 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
895,189 UART: [kat] SHA2-512-ACC
897,090 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,406 UART: [cold-reset] ++
1,476,850 UART: [fht] Storing FHT @ 0x50003400
1,479,425 UART: [idev] ++
1,479,593 UART: [idev] CDI.KEYID = 6
1,479,953 UART: [idev] SUBJECT.KEYID = 7
1,480,377 UART: [idev] UDS.KEYID = 0
1,480,722 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,433 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,909 UART: [idev] --
1,515,008 UART: [ldev] ++
1,515,176 UART: [ldev] CDI.KEYID = 6
1,515,539 UART: [ldev] SUBJECT.KEYID = 5
1,515,965 UART: [ldev] AUTHORITY.KEYID = 7
1,516,428 UART: [ldev] FE.KEYID = 1
1,521,552 UART: [ldev] Erasing FE.KEYID = 1
1,547,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,147 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,279 UART: [fwproc] Received command 0x46574c44
1,588,070 UART: [fwproc] Received Image of size 115304 bytes
2,897,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,860 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 ready_for_fw is high
1,362,926 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,762 >>> mbox cmd response: success
3,003,566 UART:
3,003,582 UART: Running Caliptra FMC ...
3,003,990 UART:
3,004,133 UART: [state] CFI Enabled
3,014,706 UART: [fht] FMC Alias Private Key: 7
3,123,021 UART: [art] Extend RT PCRs Done
3,123,449 UART: [art] Lock RT PCRs Done
3,125,045 UART: [art] Populate DV Done
3,133,222 UART: [fht] FMC Alias Private Key: 7
3,134,232 UART: [art] Derive CDI
3,134,512 UART: [art] Store in in slot 0x4
3,220,061 UART: [art] Derive Key Pair
3,220,421 UART: [art] Store priv key in slot 0x5
3,233,713 UART: [art] Derive Key Pair - Done
3,248,514 UART: [art] Signing Cert with AUTHO
3,248,994 UART: RITY.KEYID = 7
3,263,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,649 UART: [art] PUB.X = 94E6DF688D94F97E885CD5F656DF8A6D0E8F6B2E4C000D27192B9BB6FB9AB81C9AE5C2F8EE2FB8CBAE59B3871D53B35D
3,271,415 UART: [art] PUB.Y = E9878A70438A784950D6C95A4C511FDB36748762C60CE4CABEBA184A0079A350ABC3C39BE7B055081BE9766E1982A0B6
3,278,341 UART: [art] SIG.R = FAC6AB602A85CC9259F64B7EC2C2BAEB3E9E827EF8D750846750046B3D6761832432D3D2572B2F89F0E8500C9194D837
3,285,107 UART: [art] SIG.S = CA258A6E9AD727C10F43486F6F423E9EE507C3D0EC2CF654FD004E8005E319611BD3B95B42E87D1EBC4A6C9BF16FA414
3,308,289 UART: Caliptra RT
3,308,634 UART: [state] CFI Enabled
3,418,582 UART: [rt] RT listening for mailbox commands...
3,419,245 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,154 UART: [rt]cmd =0x46504c54, len=4
3,450,157 >>> mbox cmd response data (8 bytes)
3,450,392 UART: [rt] FIPS self test
3,450,720 UART: [kat] ++
3,450,872 UART: [kat] sha1
3,455,160 UART: [kat] SHA2-256
3,457,082 UART: Fatal Error: 0x90010002
3,458,632 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,637 >>> mbox cmd response: failed
3,458,637 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,132 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,982 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,903 UART: [kat] SHA2-256
903,843 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 ready_for_fw is high
1,176,431 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,040 UART: [idev] Erasing UDS.KEYID = 0
1,200,627 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,462 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,401 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,676 >>> mbox cmd response: success
2,787,866 UART: [afmc] ++
2,788,034 UART: [afmc] CDI.KEYID = 6
2,788,396 UART: [afmc] SUBJECT.KEYID = 7
2,788,821 UART: [afmc] AUTHORITY.KEYID = 5
2,823,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,838 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,373 UART: [afmc] --
2,867,439 UART: [cold-reset] --
2,868,195 UART: [state] Locking Datavault
2,869,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,754 UART: [state] Locking ICCM
2,870,174 UART: [exit] Launching FMC @ 0x40000130
2,875,503 UART:
2,875,519 UART: Running Caliptra FMC ...
2,875,927 UART:
2,875,981 UART: [state] CFI Enabled
2,886,654 UART: [fht] FMC Alias Private Key: 7
2,994,317 UART: [art] Extend RT PCRs Done
2,994,745 UART: [art] Lock RT PCRs Done
2,996,123 UART: [art] Populate DV Done
3,004,258 UART: [fht] FMC Alias Private Key: 7
3,005,358 UART: [art] Derive CDI
3,005,638 UART: [art] Store in in slot 0x4
3,091,237 UART: [art] Derive Key Pair
3,091,597 UART: [art] Store priv key in slot 0x5
3,104,495 UART: [art] Derive Key Pair - Done
3,119,283 UART: [art] Signing Cert with AUTHO
3,119,763 UART: RITY.KEYID = 7
3,134,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,544 UART: [art] PUB.X = 381AD9506BD32DFB7997AEB4B198C27A6801335953404D0C239AE15F6D97F1FFD2F741FB1FA35D83894917B2E7238144
3,142,308 UART: [art] PUB.Y = CC00FC218CC7CC0BBA1F2DB2F4B9B3A067E795F15D5FAE94D9F6C0AA77BC1625EB40FB061F72FAE7F3FC01D0E7B4A989
3,149,257 UART: [art] SIG.R = CC92BAB0EA8DEAF27F6505875D266C7BFCB8058F53394C116E1F0080A32E1CD8A1677ECDE81DD71E7F386CED10304CCE
3,156,019 UART: [art] SIG.S = 6922A2BB9B2CC26DED13FB89C67E23BA9B4D41FA66B78C0E17C2FF36D54EF7666AA25780B898EEFA6AA0776575FCF374
3,180,465 UART: Caliptra RT
3,180,718 UART: [state] CFI Enabled
3,288,699 UART: [rt] RT listening for mailbox commands...
3,289,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,209 UART: [rt]cmd =0x46504c54, len=4
3,320,280 >>> mbox cmd response data (8 bytes)
3,320,537 UART: [rt] FIPS self test
3,320,865 UART: [kat] ++
3,321,017 UART: [kat] sha1
3,325,081 UART: [kat] SHA2-256
3,327,027 UART: Fatal Error: 0x90010002
3,328,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,582 >>> mbox cmd response: failed
3,328,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,486 UART: [kat] SHA2-512-ACC
908,387 UART: [kat] ECC-384
917,788 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,521 UART: [cold-reset] ++
1,172,001 UART: [fht] FHT @ 0x50003400
1,174,590 UART: [idev] ++
1,174,758 UART: [idev] CDI.KEYID = 6
1,175,118 UART: [idev] SUBJECT.KEYID = 7
1,175,542 UART: [idev] UDS.KEYID = 0
1,175,887 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,814 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,179 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,760 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,728 UART: [fwproc] Recv command 0x46574c44
1,283,456 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,727 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,026 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 ready_for_fw is high
1,060,467 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,225 >>> mbox cmd response: success
2,702,539 UART:
2,702,555 UART: Running Caliptra FMC ...
2,702,963 UART:
2,703,017 UART: [state] CFI Enabled
2,713,656 UART: [fht] FMC Alias Private Key: 7
2,822,003 UART: [art] Extend RT PCRs Done
2,822,431 UART: [art] Lock RT PCRs Done
2,823,875 UART: [art] Populate DV Done
2,831,828 UART: [fht] FMC Alias Private Key: 7
2,832,772 UART: [art] Derive CDI
2,833,052 UART: [art] Store in in slot 0x4
2,918,347 UART: [art] Derive Key Pair
2,918,707 UART: [art] Store priv key in slot 0x5
2,931,677 UART: [art] Derive Key Pair - Done
2,946,314 UART: [art] Signing Cert with AUTHO
2,946,794 UART: RITY.KEYID = 7
2,962,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,853 UART: [art] PUB.X = 47C27212ACE00DB9612A91991917CF5BE0DDC978F4DAEC560CC37B55326D2ED0EC49CFC453C30D96A343C8D61F5A0FBF
2,969,629 UART: [art] PUB.Y = 82C724E014265C5B0819AEB37839765E9022651AD035E8293FCD4E0DA0CD94FC6FE58CFF71939BDA2F3D166C4BB13926
2,976,579 UART: [art] SIG.R = 93F3797A679E847C68EDD6F6013C65E359560999B8E217E4776C972567483B75D28D415B975B77BFB57584102786B3E1
2,983,329 UART: [art] SIG.S = 4F6232565F4BABCAEC7E65C7E2AB8756CE8AA0B0AE41A2F350CFDE5A9E9D38019AE5D3ACA2D4C10A321146B2E5D7458C
3,006,356 UART: Caliptra RT
3,006,609 UART: [state] CFI Enabled
3,113,794 UART: [rt] RT listening for mailbox commands...
3,114,457 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,052 UART: [rt]cmd =0x46504c54, len=4
3,145,179 >>> mbox cmd response data (8 bytes)
3,145,530 UART: [rt] FIPS self test
3,145,858 UART: [kat] ++
3,146,010 UART: [kat] sha1
3,150,082 UART: [kat] SHA2-256
3,152,062 UART: Fatal Error: 0x90010002
3,153,612 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,617 >>> mbox cmd response: failed
3,153,617 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,065 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,785 UART: [kat] SHA2-512-ACC
908,686 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,411 UART: [idev] ++
1,175,579 UART: [idev] CDI.KEYID = 6
1,175,939 UART: [idev] SUBJECT.KEYID = 7
1,176,363 UART: [idev] UDS.KEYID = 0
1,176,708 ready_for_fw is high
1,176,708 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,417 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,342 UART: [idev] --
1,211,308 UART: [ldev] ++
1,211,476 UART: [ldev] CDI.KEYID = 6
1,211,839 UART: [ldev] SUBJECT.KEYID = 5
1,212,265 UART: [ldev] AUTHORITY.KEYID = 7
1,212,728 UART: [ldev] FE.KEYID = 1
1,218,190 UART: [ldev] Erasing FE.KEYID = 1
1,244,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,622 UART: [ldev] --
1,283,937 UART: [fwproc] Wait for Commands...
1,284,537 UART: [fwproc] Recv command 0x46574c44
1,285,265 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,010 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,223 >>> mbox cmd response: success
2,790,409 UART: [afmc] ++
2,790,577 UART: [afmc] CDI.KEYID = 6
2,790,939 UART: [afmc] SUBJECT.KEYID = 7
2,791,364 UART: [afmc] AUTHORITY.KEYID = 5
2,826,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,524 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,964 UART: [afmc] --
2,869,848 UART: [cold-reset] --
2,870,792 UART: [state] Locking Datavault
2,871,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,569 UART: [state] Locking ICCM
2,873,003 UART: [exit] Launching FMC @ 0x40000130
2,878,332 UART:
2,878,348 UART: Running Caliptra FMC ...
2,878,756 UART:
2,878,899 UART: [state] CFI Enabled
2,889,742 UART: [fht] FMC Alias Private Key: 7
2,998,919 UART: [art] Extend RT PCRs Done
2,999,347 UART: [art] Lock RT PCRs Done
3,000,833 UART: [art] Populate DV Done
3,008,918 UART: [fht] FMC Alias Private Key: 7
3,010,012 UART: [art] Derive CDI
3,010,292 UART: [art] Store in in slot 0x4
3,096,299 UART: [art] Derive Key Pair
3,096,659 UART: [art] Store priv key in slot 0x5
3,109,787 UART: [art] Derive Key Pair - Done
3,124,905 UART: [art] Signing Cert with AUTHO
3,125,385 UART: RITY.KEYID = 7
3,140,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,608 UART: [art] PUB.X = FD0E4A9D8309F098D26DA7375686996F3DA7CE6D9AA951BC398A900988FFCB3F4AF95B78958F2F287CE4E81D2D359E53
3,148,379 UART: [art] PUB.Y = 3A58A5A1710D271566EDEEB0435F761ABFCE503BFCA1B2D7FF7E68927FF83582E9C9CB9735D49A11E6549463F9849CE3
3,155,336 UART: [art] SIG.R = 7492BED3BFCEC9B2A914272E67D8005E1321A67C0A56B433CF81B8ADD71C85E7D4B51134D6624021E5792DB38100FBF9
3,162,065 UART: [art] SIG.S = EB2C48CEC3BFD25E8DACE07FCB9BBF958B4E8FC0E09855ADD19154383E3E4EF23C69C63F86C6A2FB5D6DACAB1D100697
3,185,969 UART: Caliptra RT
3,186,314 UART: [state] CFI Enabled
3,293,807 UART: [rt] RT listening for mailbox commands...
3,294,470 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,585 UART: [rt]cmd =0x46504c54, len=4
3,325,764 >>> mbox cmd response data (8 bytes)
3,326,091 UART: [rt] FIPS self test
3,326,419 UART: [kat] ++
3,326,571 UART: [kat] sha1
3,330,823 UART: [kat] SHA2-256
3,332,813 UART: Fatal Error: 0x90010002
3,334,363 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,368 >>> mbox cmd response: failed
3,334,368 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,630 UART: [kat] SHA2-256
904,570 UART: [kat] SHA2-384
907,431 UART: [kat] SHA2-512-ACC
909,332 UART: [kat] ECC-384
919,221 UART: [kat] HMAC-384Kdf
923,911 UART: [kat] LMS
1,172,239 UART: [kat] --
1,173,034 UART: [cold-reset] ++
1,173,496 UART: [fht] FHT @ 0x50003400
1,176,241 UART: [idev] ++
1,176,409 UART: [idev] CDI.KEYID = 6
1,176,769 UART: [idev] SUBJECT.KEYID = 7
1,177,193 UART: [idev] UDS.KEYID = 0
1,177,538 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,517 UART: [idev] Erasing UDS.KEYID = 0
1,202,868 UART: [idev] Sha1 KeyId Algorithm
1,211,380 UART: [idev] --
1,212,640 UART: [ldev] ++
1,212,808 UART: [ldev] CDI.KEYID = 6
1,213,171 UART: [ldev] SUBJECT.KEYID = 5
1,213,597 UART: [ldev] AUTHORITY.KEYID = 7
1,214,060 UART: [ldev] FE.KEYID = 1
1,219,050 UART: [ldev] Erasing FE.KEYID = 1
1,245,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,100 UART: [ldev] --
1,285,607 UART: [fwproc] Wait for Commands...
1,286,427 UART: [fwproc] Recv command 0x46574c44
1,287,155 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,512 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,761 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,426 ready_for_fw is high
1,061,426 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,166 >>> mbox cmd response: success
2,703,926 UART:
2,703,942 UART: Running Caliptra FMC ...
2,704,350 UART:
2,704,493 UART: [state] CFI Enabled
2,715,256 UART: [fht] FMC Alias Private Key: 7
2,824,015 UART: [art] Extend RT PCRs Done
2,824,443 UART: [art] Lock RT PCRs Done
2,825,881 UART: [art] Populate DV Done
2,834,124 UART: [fht] FMC Alias Private Key: 7
2,835,218 UART: [art] Derive CDI
2,835,498 UART: [art] Store in in slot 0x4
2,921,161 UART: [art] Derive Key Pair
2,921,521 UART: [art] Store priv key in slot 0x5
2,934,843 UART: [art] Derive Key Pair - Done
2,949,402 UART: [art] Signing Cert with AUTHO
2,949,882 UART: RITY.KEYID = 7
2,965,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,815 UART: [art] PUB.X = 2FB899CE40754D73627848137E04AE3518B42395A1D5A2BA6AC1A64205DCABA343725938ED778E586B6DC28332B74CBE
2,972,581 UART: [art] PUB.Y = CC8527AEDFBB14D88B98909D11E67E8C0392A9741FE915E1867E5C24DF1BF253BAC7F4FB75BEABBD5A3E71AC8E25D62C
2,979,552 UART: [art] SIG.R = F34419C7043457D3C142715B0EAEFFA1A8D298DC644B228BDCEC08578B9EC807D8538B4A54FB540ADA7A82C952ABF964
2,986,319 UART: [art] SIG.S = D1D96C2A2791EAF8DF4954810643F936C41BC99B48224C7E4CBA3375151830EAE5F79155C4F8241E4B10A7581795DA1A
3,010,117 UART: Caliptra RT
3,010,462 UART: [state] CFI Enabled
3,118,542 UART: [rt] RT listening for mailbox commands...
3,119,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,888 UART: [rt]cmd =0x46504c54, len=4
3,150,103 >>> mbox cmd response data (8 bytes)
3,150,364 UART: [rt] FIPS self test
3,150,692 UART: [kat] ++
3,150,844 UART: [kat] sha1
3,155,006 UART: [kat] SHA2-256
3,157,096 UART: Fatal Error: 0x90010002
3,158,646 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,651 >>> mbox cmd response: failed
3,158,651 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,044 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,722 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,312 UART: [kat] HMAC-384Kdf
919,962 UART: [kat] LMS
1,168,274 UART: [kat] --
1,169,171 UART: [cold-reset] ++
1,169,575 UART: [fht] FHT @ 0x50003400
1,172,099 UART: [idev] ++
1,172,267 UART: [idev] CDI.KEYID = 6
1,172,628 UART: [idev] SUBJECT.KEYID = 7
1,173,053 UART: [idev] UDS.KEYID = 0
1,173,399 ready_for_fw is high
1,173,399 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,180,879 UART: [idev] Erasing UDS.KEYID = 0
1,197,367 UART: [idev] Sha1 KeyId Algorithm
1,206,139 UART: [idev] --
1,207,284 UART: [ldev] ++
1,207,452 UART: [ldev] CDI.KEYID = 6
1,207,816 UART: [ldev] SUBJECT.KEYID = 5
1,208,243 UART: [ldev] AUTHORITY.KEYID = 7
1,208,706 UART: [ldev] FE.KEYID = 1
1,213,874 UART: [ldev] Erasing FE.KEYID = 1
1,240,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,954 UART: [ldev] --
1,279,224 UART: [fwproc] Wait for Commands...
1,279,835 UART: [fwproc] Recv command 0x46574c44
1,280,568 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,678 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,926 >>> mbox cmd response: success
2,785,945 UART: [afmc] ++
2,786,113 UART: [afmc] CDI.KEYID = 6
2,786,476 UART: [afmc] SUBJECT.KEYID = 7
2,786,902 UART: [afmc] AUTHORITY.KEYID = 5
2,822,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,656 UART: [afmc] --
2,865,570 UART: [cold-reset] --
2,866,422 UART: [state] Locking Datavault
2,867,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,173 UART: [state] Locking ICCM
2,868,747 UART: [exit] Launching FMC @ 0x40000130
2,874,076 UART:
2,874,092 UART: Running Caliptra FMC ...
2,874,500 UART:
2,874,554 UART: [state] CFI Enabled
2,884,927 UART: [fht] FMC Alias Private Key: 7
2,993,270 UART: [art] Extend RT PCRs Done
2,993,698 UART: [art] Lock RT PCRs Done
2,994,870 UART: [art] Populate DV Done
3,003,265 UART: [fht] FMC Alias Private Key: 7
3,004,253 UART: [art] Derive CDI
3,004,533 UART: [art] Store in in slot 0x4
3,090,192 UART: [art] Derive Key Pair
3,090,552 UART: [art] Store priv key in slot 0x5
3,103,708 UART: [art] Derive Key Pair - Done
3,118,550 UART: [art] Signing Cert with AUTHO
3,119,030 UART: RITY.KEYID = 7
3,134,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,139 UART: [art] PUB.X = DE6271073A69D7680F146BB2287437DFCDA7A59D2939F55B4F5B15BE4146A63797342EDD7E3B58D6B75B4282508AD3A2
3,141,905 UART: [art] PUB.Y = 3C2F11D7316D014B3AE657301DFA52BB25F88EC1DBBED41455BA4313D9BA8E295BA31346094E10A195B7E7A807FB6418
3,148,854 UART: [art] SIG.R = F2AC5C94F590C57D49381A69AFEFC9B5D8BAF225549A2CFDB80BB1B8ABE6F13E31CF7AF5A6D98B5F575E83F3ED205B33
3,155,647 UART: [art] SIG.S = 8044D99AF1AB5B8A5D72F55C5B233EA85990A401CBD64828C972527B868C671A01DC4A356E745850306BABDE28C9256F
3,179,604 UART: Caliptra RT
3,179,857 UART: [state] CFI Enabled
3,288,325 UART: [rt] RT listening for mailbox commands...
3,288,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,637 UART: [rt]cmd =0x46504c54, len=4
3,320,008 >>> mbox cmd response data (8 bytes)
3,320,291 UART: [rt] FIPS self test
3,320,619 UART: [kat] ++
3,320,771 UART: [kat] sha1
3,324,923 UART: [kat] SHA2-256
3,327,041 UART: Fatal Error: 0x90010002
3,328,591 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,596 >>> mbox cmd response: failed
3,328,596 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
900,017 UART: [kat] SHA2-256
901,957 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,471 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,434 UART: [ldev] ++
1,209,602 UART: [ldev] CDI.KEYID = 6
1,209,966 UART: [ldev] SUBJECT.KEYID = 5
1,210,393 UART: [ldev] AUTHORITY.KEYID = 7
1,210,856 UART: [ldev] FE.KEYID = 1
1,215,856 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,294 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,501 UART: [fwproc] Recv command 0x46574c44
1,283,234 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,538 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,878 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,736 ready_for_fw is high
1,056,736 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,484 >>> mbox cmd response: success
2,698,792 UART:
2,698,808 UART: Running Caliptra FMC ...
2,699,216 UART:
2,699,270 UART: [state] CFI Enabled
2,709,979 UART: [fht] FMC Alias Private Key: 7
2,817,382 UART: [art] Extend RT PCRs Done
2,817,810 UART: [art] Lock RT PCRs Done
2,819,410 UART: [art] Populate DV Done
2,827,301 UART: [fht] FMC Alias Private Key: 7
2,828,361 UART: [art] Derive CDI
2,828,641 UART: [art] Store in in slot 0x4
2,914,500 UART: [art] Derive Key Pair
2,914,860 UART: [art] Store priv key in slot 0x5
2,928,074 UART: [art] Derive Key Pair - Done
2,942,771 UART: [art] Signing Cert with AUTHO
2,943,251 UART: RITY.KEYID = 7
2,958,305 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,070 UART: [art] PUB.X = D42060D03C8EA84F8A1F31D7007FDD43EBC9AFF98DDB74814FCD638D5ABE71854E1B00DB45805372BFAB24D8E799A577
2,965,812 UART: [art] PUB.Y = 2583B5D48B4047F0F358DE055627B18B109AA778BBD7EF53ED21E805CC867EC670BD3D0772138A2BDCFDB7DED93F4195
2,972,765 UART: [art] SIG.R = 1304DE9385693B63E9487E0C30B4DC0A0BB956B03421E1CD23BDF16D30E4D9598F7A47DE7AB71D9524D1661DF6F6ED55
2,979,531 UART: [art] SIG.S = DC853604372C835D431F073E7D905130C59BA6EF88B4DE8A35872CF5E89D54A27BB46DDE3BD0D35AD0B751D0FD37A084
3,003,338 UART: Caliptra RT
3,003,591 UART: [state] CFI Enabled
3,111,814 UART: [rt] RT listening for mailbox commands...
3,112,477 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,420 UART: [rt]cmd =0x46504c54, len=4
3,143,707 >>> mbox cmd response data (8 bytes)
3,143,926 UART: [rt] FIPS self test
3,144,254 UART: [kat] ++
3,144,406 UART: [kat] sha1
3,148,676 UART: [kat] SHA2-256
3,150,632 UART: Fatal Error: 0x90010002
3,152,182 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,187 >>> mbox cmd response: failed
3,152,187 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,010 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,169,982 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,643 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,933 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,525 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,775 >>> mbox cmd response: success
2,786,816 UART: [afmc] ++
2,786,984 UART: [afmc] CDI.KEYID = 6
2,787,347 UART: [afmc] SUBJECT.KEYID = 7
2,787,773 UART: [afmc] AUTHORITY.KEYID = 5
2,823,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,858 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,213 UART: [afmc] --
2,867,319 UART: [cold-reset] --
2,868,087 UART: [state] Locking Datavault
2,869,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,870 UART: [state] Locking ICCM
2,870,386 UART: [exit] Launching FMC @ 0x40000130
2,875,715 UART:
2,875,731 UART: Running Caliptra FMC ...
2,876,139 UART:
2,876,282 UART: [state] CFI Enabled
2,886,543 UART: [fht] FMC Alias Private Key: 7
2,994,654 UART: [art] Extend RT PCRs Done
2,995,082 UART: [art] Lock RT PCRs Done
2,997,004 UART: [art] Populate DV Done
3,005,493 UART: [fht] FMC Alias Private Key: 7
3,006,429 UART: [art] Derive CDI
3,006,709 UART: [art] Store in in slot 0x4
3,092,344 UART: [art] Derive Key Pair
3,092,704 UART: [art] Store priv key in slot 0x5
3,105,852 UART: [art] Derive Key Pair - Done
3,120,719 UART: [art] Signing Cert with AUTHO
3,121,199 UART: RITY.KEYID = 7
3,136,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,300 UART: [art] PUB.X = 67D894FF35B21867C1AAC289133BE2219B3A47ED671593DD3650EECA53552DD2F5E8F446DE8CFBABBCF0AF3E807C0CB3
3,144,087 UART: [art] PUB.Y = 154A5DCFC206BE161DB19028443908AABD68B48682B3E2CB761E9B10C5E6E76A7630D37AEFB82BBACE4629C38BBF2159
3,151,045 UART: [art] SIG.R = E7185F540C8E5E3210CA295597328846FFBB8509A38B13E44DC041D1B014693E3892C92D54FE81AC125B2098EB8BE670
3,157,807 UART: [art] SIG.S = C4AE0C446C8582CE0A02149158D6E68140CF763C3582E906041EBCCD656F724F9657A1C1393E63D623385B6F8F12638C
3,181,401 UART: Caliptra RT
3,181,746 UART: [state] CFI Enabled
3,290,412 UART: [rt] RT listening for mailbox commands...
3,291,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,956 UART: [rt]cmd =0x46504c54, len=4
3,321,927 >>> mbox cmd response data (8 bytes)
3,322,074 UART: [rt] FIPS self test
3,322,402 UART: [kat] ++
3,322,554 UART: [kat] sha1
3,326,898 UART: [kat] SHA2-256
3,328,884 UART: Fatal Error: 0x90010002
3,330,434 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,439 >>> mbox cmd response: failed
3,330,439 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,174,242 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,638 UART: [idev] Erasing UDS.KEYID = 0
1,198,314 UART: [idev] Sha1 KeyId Algorithm
1,207,026 UART: [idev] --
1,207,971 UART: [ldev] ++
1,208,139 UART: [ldev] CDI.KEYID = 6
1,208,503 UART: [ldev] SUBJECT.KEYID = 5
1,208,930 UART: [ldev] AUTHORITY.KEYID = 7
1,209,393 UART: [ldev] FE.KEYID = 1
1,214,479 UART: [ldev] Erasing FE.KEYID = 1
1,240,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,731 UART: [ldev] --
1,280,247 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,459 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,615 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,905 ready_for_fw is high
1,056,905 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,639 >>> mbox cmd response: success
2,698,765 UART:
2,698,781 UART: Running Caliptra FMC ...
2,699,189 UART:
2,699,332 UART: [state] CFI Enabled
2,709,933 UART: [fht] FMC Alias Private Key: 7
2,818,250 UART: [art] Extend RT PCRs Done
2,818,678 UART: [art] Lock RT PCRs Done
2,820,162 UART: [art] Populate DV Done
2,828,153 UART: [fht] FMC Alias Private Key: 7
2,829,107 UART: [art] Derive CDI
2,829,387 UART: [art] Store in in slot 0x4
2,915,400 UART: [art] Derive Key Pair
2,915,760 UART: [art] Store priv key in slot 0x5
2,929,022 UART: [art] Derive Key Pair - Done
2,943,916 UART: [art] Signing Cert with AUTHO
2,944,396 UART: RITY.KEYID = 7
2,960,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,785 UART: [art] PUB.X = D64F4A95C4E3878D0927409E244550C7A1A8B0220865006BAFECB28680165529B25E6E5364230E8A3A1EE71905F6B410
2,967,513 UART: [art] PUB.Y = B858F6C7C0BDC051C727EE0A4DF06B64C376E366CED324FB24A37CAA77DC381959BCE779AD8148BBE0336AF66B4F9A4F
2,974,480 UART: [art] SIG.R = 2B0C4B6DD1FEB644528F039468F75154EB600F91B7981F8A9CE8DDBC6563C34D78C7FE5D2AF7CE73CEFE8C218714A9CF
2,981,259 UART: [art] SIG.S = C6F1592005F9F69F7F7AF0F69F72F09E603BF3F1D83FEA0BA55BD40A704523D2496A818F5A8D67C8257DBBEE9FF2ECE0
3,005,251 UART: Caliptra RT
3,005,596 UART: [state] CFI Enabled
3,113,409 UART: [rt] RT listening for mailbox commands...
3,114,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,949 UART: [rt]cmd =0x46504c54, len=4
3,145,050 >>> mbox cmd response data (8 bytes)
3,145,285 UART: [rt] FIPS self test
3,145,613 UART: [kat] ++
3,145,765 UART: [kat] sha1
3,149,959 UART: [kat] SHA2-256
3,151,893 UART: Fatal Error: 0x90010002
3,153,443 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,448 >>> mbox cmd response: failed
3,153,448 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,583 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,685,869 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,830,100 >>> mbox cmd response: failed
2,830,662 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,974,030 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
4,865,722 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,446,193 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,691,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,835,233 >>> mbox cmd response: failed
2,835,806 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,979,139 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,859,458 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,466,694 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,047,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,191,923 >>> mbox cmd response: failed
3,192,504 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,335,840 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,584,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,021,797 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,042,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,186,972 >>> mbox cmd response: failed
3,187,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,330,855 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,586,782 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,030,183 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,701,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,804 >>> mbox cmd response: failed
2,847,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,024 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,476,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,329,907 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,701,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,147 >>> mbox cmd response: failed
2,846,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,428 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,460,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,177 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,055,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,199,887 >>> mbox cmd response: failed
3,200,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,344,182 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,179,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,920,988 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,056,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,200,779 >>> mbox cmd response: failed
3,201,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,345,107 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,181,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,905,962 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,698,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,842,913 >>> mbox cmd response: failed
2,843,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,987,214 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,460,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,299,793 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,702,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,332 >>> mbox cmd response: failed
2,847,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,489 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,482,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,313,746 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,052,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,197,511 >>> mbox cmd response: failed
3,198,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,341,841 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,176,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,923,634 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,052,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,197,077 >>> mbox cmd response: failed
3,197,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,341,415 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,185,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,926,183 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,766 >>> mbox cmd response: failed
812,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,710 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,050 >>> mbox cmd response: failed
812,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,166 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,437 >>> mbox cmd response: failed
812,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,325 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,141 >>> mbox cmd response: failed
812,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,837 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,746 >>> mbox cmd response: failed
811,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,860 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,976 >>> mbox cmd response: failed
811,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,110 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,909 >>> mbox cmd response: failed
811,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,259 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,765 >>> mbox cmd response: failed
812,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,875 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,172 >>> mbox cmd response: failed
812,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,112 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,176 >>> mbox cmd response: failed
812,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,692 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,761 >>> mbox cmd response: failed
811,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,517 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,521 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,529 >>> mbox cmd response: failed
812,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,985 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,095 UART:
192,464 UART: Running Caliptra ROM ...
193,650 UART:
193,802 UART: [state] CFI Enabled
265,250 UART: [state] LifecycleState = Unprovisioned
267,157 UART: [state] DebugLocked = No
269,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,272 UART: [kat] SHA2-256
443,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,434 UART: [kat] ++
455,048 UART: [kat] sha1
466,647 UART: [kat] SHA2-256
469,298 UART: [kat] SHA2-384
476,371 UART: [kat] SHA2-512-ACC
478,748 UART: [kat] ECC-384
2,768,736 UART: [kat] HMAC-384Kdf
2,799,231 UART: [kat] LMS
3,989,530 UART: [kat] --
3,994,523 UART: [cold-reset] ++
3,996,173 UART: [fht] Storing FHT @ 0x50003400
4,007,874 UART: [idev] ++
4,008,448 UART: [idev] CDI.KEYID = 6
4,009,485 UART: [idev] SUBJECT.KEYID = 7
4,010,672 UART: [idev] UDS.KEYID = 0
4,011,638 ready_for_fw is high
4,011,835 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,156,864 UART: [idev] Erasing UDS.KEYID = 0
7,345,274 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,280 UART: [idev] --
7,370,400 UART: [ldev] ++
7,370,972 UART: [ldev] CDI.KEYID = 6
7,371,913 UART: [ldev] SUBJECT.KEYID = 5
7,373,127 UART: [ldev] AUTHORITY.KEYID = 7
7,374,360 UART: [ldev] FE.KEYID = 1
7,400,812 UART: [ldev] Erasing FE.KEYID = 1
10,736,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,035 UART: [ldev] --
13,116,814 UART: [fwproc] Waiting for Commands...
13,119,175 UART: [fwproc] Received command 0x46574c44
13,121,357 UART: [fwproc] Received Image of size 114996 bytes
17,184,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,654,134 >>> mbox cmd response: success
17,658,152 UART: [afmc] ++
17,658,741 UART: [afmc] CDI.KEYID = 6
17,659,631 UART: [afmc] SUBJECT.KEYID = 7
17,660,898 UART: [afmc] AUTHORITY.KEYID = 5
21,030,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,109 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,493 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,355 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,776 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,721 UART: [afmc] --
23,403,276 UART: [cold-reset] --
23,408,053 UART: [state] Locking Datavault
23,411,863 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,612 UART: [state] Locking ICCM
23,416,353 UART: [exit] Launching FMC @ 0x40000130
23,424,753 UART:
23,424,989 UART: Running Caliptra FMC ...
23,426,090 UART:
23,426,251 UART: [state] CFI Enabled
23,488,146 UART: [fht] FMC Alias Private Key: 7
25,825,914 UART: [art] Extend RT PCRs Done
25,827,137 UART: [art] Lock RT PCRs Done
25,828,955 UART: [art] Populate DV Done
25,834,530 UART: [fht] FMC Alias Private Key: 7
25,836,228 UART: [art] Derive CDI
25,836,963 UART: [art] Store in in slot 0x4
25,896,813 UART: [art] Derive Key Pair
25,897,853 UART: [art] Store priv key in slot 0x5
29,190,222 UART: [art] Derive Key Pair - Done
29,202,916 UART: [art] Signing Cert with AUTHO
29,204,213 UART: RITY.KEYID = 7
31,491,908 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,416 UART: [art] PUB.X = E3301C2B60727C4138DAC6FA21DE1C0F9467E52AA9197A10A19DD360600E6C88AC75B08E9890054F1726B014F4C44541
31,500,673 UART: [art] PUB.Y = FBA43153D160F55D2925D396112BA37CF11EF87195335942A7B35B96E2B8AA983EF6A5BFCA5EFAC7E6433559E00F8D37
31,507,912 UART: [art] SIG.R = C4554FF5FC0169E8FBB6F535541CEC5DF220B1F7CE7B7D1E480054EB55BE122E32EB66F796BC555D054EA581DEF2B143
31,515,316 UART: [art] SIG.S = 5F9D50400BE61B49D45A414511E0533ADAFE244DEC1FE5E04D1E6637710E62B8009B60EE011838ECD347A756D369A8D5
32,820,199 UART: Caliptra RT
32,820,899 UART: [state] CFI Enabled
32,981,355 UART: [rt] RT listening for mailbox commands...
32,983,214 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,012,689 UART: [rt]cmd =0x46504c54, len=4
33,014,374 >>> mbox cmd response data (8 bytes)
33,015,410 UART: [rt] FIPS self test
33,016,361 UART: [kat] ++
33,016,835 UART: [kat] sha1
33,021,294 UART: [kat] SHA2-256
33,023,236 UART: [kat] SHA2-384
33,026,175 UART: [kat] SHA2-512-ACC
33,027,063 UART: Droping operation
33,027,839 UART: Fatal Error: 0x90050002
33,063,161 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,207,860 >>> mbox cmd response: failed
33,208,528 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,352,900 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,079 UART:
190,374 UART: Running Caliptra ROM ...
191,485 UART:
191,631 UART: [state] CFI Enabled
248,688 UART: [state] LifecycleState = Unprovisioned
250,621 UART: [state] DebugLocked = No
253,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
257,739 UART: [kat] SHA2-256
427,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,955 UART: [kat] ++
438,429 UART: [kat] sha1
449,955 UART: [kat] SHA2-256
452,640 UART: [kat] SHA2-384
458,237 UART: [kat] SHA2-512-ACC
460,628 UART: [kat] ECC-384
2,753,086 UART: [kat] HMAC-384Kdf
2,765,968 UART: [kat] LMS
3,956,280 UART: [kat] --
3,959,369 UART: [cold-reset] ++
3,961,195 UART: [fht] Storing FHT @ 0x50003400
3,973,722 UART: [idev] ++
3,974,350 UART: [idev] CDI.KEYID = 6
3,975,234 UART: [idev] SUBJECT.KEYID = 7
3,976,443 UART: [idev] UDS.KEYID = 0
3,978,070 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,122,769 UART: [idev] Erasing UDS.KEYID = 0
7,311,804 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,273 UART: [idev] --
7,338,056 UART: [ldev] ++
7,338,630 UART: [ldev] CDI.KEYID = 6
7,339,592 UART: [ldev] SUBJECT.KEYID = 5
7,340,807 UART: [ldev] AUTHORITY.KEYID = 7
7,342,093 UART: [ldev] FE.KEYID = 1
7,388,823 UART: [ldev] Erasing FE.KEYID = 1
10,724,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,952 UART: [ldev] --
13,101,032 UART: [fwproc] Waiting for Commands...
13,103,345 UART: [fwproc] Received command 0x46574c44
13,105,581 UART: [fwproc] Received Image of size 114996 bytes
17,172,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,636,639 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,781,587 ready_for_fw is high
3,782,230 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,863,284 >>> mbox cmd response: success
23,564,984 UART:
23,565,379 UART: Running Caliptra FMC ...
23,566,491 UART:
23,566,645 UART: [state] CFI Enabled
23,632,815 UART: [fht] FMC Alias Private Key: 7
25,970,756 UART: [art] Extend RT PCRs Done
25,971,980 UART: [art] Lock RT PCRs Done
25,973,956 UART: [art] Populate DV Done
25,979,408 UART: [fht] FMC Alias Private Key: 7
25,981,064 UART: [art] Derive CDI
25,981,883 UART: [art] Store in in slot 0x4
26,041,464 UART: [art] Derive Key Pair
26,042,470 UART: [art] Store priv key in slot 0x5
29,334,880 UART: [art] Derive Key Pair - Done
29,347,891 UART: [art] Signing Cert with AUTHO
29,349,202 UART: RITY.KEYID = 7
31,635,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,181 UART: [art] PUB.X = 6840884852F77DEBA5891B6CD5FEF455C2302D32FE2EC1B51C21CEFB056B668039D8F8FAB7336603282EF643F01D6C86
31,644,391 UART: [art] PUB.Y = AEFA127252E3A2F65767FB7D5AA20F85371C58A3D77407107D4D0310FAB877B3F3D28F8BDC9240113EC8B30DD8BDC66C
31,651,631 UART: [art] SIG.R = F5F9B64B1DE8B23A8622C5751E67163AD767C9048B19E69160601D612A9727D856019934B6C8B7A7F4D3DA701B5A0179
31,659,005 UART: [art] SIG.S = 9081DCE3A9854C1FAC18EDB948A5839B66D1E7ABECD9CF8A3BCDB0E23E0D5BE1AC0E3754C940930B49185E01047D94F6
32,963,864 UART: Caliptra RT
32,964,579 UART: [state] CFI Enabled
33,126,347 UART: [rt] RT listening for mailbox commands...
33,128,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,157,846 UART: [rt]cmd =0x46504c54, len=4
33,159,318 >>> mbox cmd response data (8 bytes)
33,160,259 UART: [rt] FIPS self test
33,161,140 UART: [kat] ++
33,161,585 UART: [kat] sha1
33,166,120 UART: [kat] SHA2-256
33,168,064 UART: [kat] SHA2-384
33,171,072 UART: [kat] SHA2-512-ACC
33,172,072 UART: Droping operation
33,172,854 UART: Fatal Error: 0x90050002
33,207,925 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,352,403 >>> mbox cmd response: failed
33,353,028 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,497,418 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,794,084 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,868,586 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,501 UART:
193,173 UART: Running Caliptra ROM ...
194,318 UART:
603,795 UART: [state] CFI Enabled
616,891 UART: [state] LifecycleState = Unprovisioned
618,839 UART: [state] DebugLocked = No
620,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,526 UART: [kat] SHA2-256
795,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,773 UART: [kat] ++
806,245 UART: [kat] sha1
817,902 UART: [kat] SHA2-256
820,630 UART: [kat] SHA2-384
825,765 UART: [kat] SHA2-512-ACC
828,136 UART: [kat] ECC-384
3,111,307 UART: [kat] HMAC-384Kdf
3,124,751 UART: [kat] LMS
4,314,851 UART: [kat] --
4,319,573 UART: [cold-reset] ++
4,322,221 UART: [fht] Storing FHT @ 0x50003400
4,333,214 UART: [idev] ++
4,333,777 UART: [idev] CDI.KEYID = 6
4,334,664 UART: [idev] SUBJECT.KEYID = 7
4,335,980 UART: [idev] UDS.KEYID = 0
4,336,921 ready_for_fw is high
4,337,140 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,482,033 UART: [idev] Erasing UDS.KEYID = 0
7,626,834 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,093 UART: [idev] --
7,650,946 UART: [ldev] ++
7,651,526 UART: [ldev] CDI.KEYID = 6
7,652,466 UART: [ldev] SUBJECT.KEYID = 5
7,653,682 UART: [ldev] AUTHORITY.KEYID = 7
7,654,996 UART: [ldev] FE.KEYID = 1
7,667,125 UART: [ldev] Erasing FE.KEYID = 1
10,957,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,532 UART: [ldev] --
13,318,011 UART: [fwproc] Waiting for Commands...
13,319,964 UART: [fwproc] Received command 0x46574c44
13,322,155 UART: [fwproc] Received Image of size 114996 bytes
17,383,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,846,019 >>> mbox cmd response: success
17,850,006 UART: [afmc] ++
17,850,621 UART: [afmc] CDI.KEYID = 6
17,851,510 UART: [afmc] SUBJECT.KEYID = 7
17,852,774 UART: [afmc] AUTHORITY.KEYID = 5
21,166,146 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,228 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,498 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,847 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,703 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,134 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,212 UART: [afmc] --
23,532,969 UART: [cold-reset] --
23,535,802 UART: [state] Locking Datavault
23,542,404 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,153 UART: [state] Locking ICCM
23,546,441 UART: [exit] Launching FMC @ 0x40000130
23,554,843 UART:
23,555,141 UART: Running Caliptra FMC ...
23,556,177 UART:
23,556,327 UART: [state] CFI Enabled
23,564,274 UART: [fht] FMC Alias Private Key: 7
25,894,999 UART: [art] Extend RT PCRs Done
25,896,222 UART: [art] Lock RT PCRs Done
25,897,711 UART: [art] Populate DV Done
25,903,122 UART: [fht] FMC Alias Private Key: 7
25,904,712 UART: [art] Derive CDI
25,905,475 UART: [art] Store in in slot 0x4
25,948,449 UART: [art] Derive Key Pair
25,949,445 UART: [art] Store priv key in slot 0x5
29,191,196 UART: [art] Derive Key Pair - Done
29,204,308 UART: [art] Signing Cert with AUTHO
29,205,604 UART: RITY.KEYID = 7
31,485,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,793 UART: [art] PUB.X = 2DCF5770C1462B030019B2D2119E248B5AC910E1796FCEDDC6E26BD8986A3885CD05B3D3511125C216614FD269A88788
31,494,004 UART: [art] PUB.Y = AA435CA5F30DBEB3B87C069C671A57B78DEA7943767D204F238C459DD122868A8F2368D444D199EE78623096BF3E52CA
31,501,258 UART: [art] SIG.R = A0A82435560717D80A1891EADF03F1F6BDBD0FE5D93ABD2260C40CE6143E41E032D73AB202F3ECE1D81B35FFC0D0D20C
31,508,603 UART: [art] SIG.S = 87EE7F168695C2B8E2244C52F4C4089DDC8CBB5EA4B7C38CDBEA6C531AA4FF307C0D714856F94D400EC7CC545CD20D77
32,813,788 UART: Caliptra RT
32,814,488 UART: [state] CFI Enabled
32,931,642 UART: [rt] RT listening for mailbox commands...
32,933,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,963,181 UART: [rt]cmd =0x46504c54, len=4
32,964,546 >>> mbox cmd response data (8 bytes)
32,965,608 UART: [rt] FIPS self test
32,966,547 UART: [kat] ++
32,967,000 UART: [kat] sha1
32,971,569 UART: [kat] SHA2-256
32,973,496 UART: [kat] SHA2-384
32,976,670 UART: [kat] SHA2-512-ACC
32,977,575 UART: Droping operation
32,978,435 UART: Fatal Error: 0x90050002
33,013,822 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,158,317 >>> mbox cmd response: failed
33,158,914 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,303,108 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,102 UART:
190,393 UART: Running Caliptra ROM ...
191,509 UART:
7,234,960 UART: [state] CFI Enabled
7,249,346 UART: [state] LifecycleState = Unprovisioned
7,251,267 UART: [state] DebugLocked = No
7,253,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,257,962 UART: [kat] SHA2-256
7,427,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,438,240 UART: [kat] ++
7,438,698 UART: [kat] sha1
7,448,826 UART: [kat] SHA2-256
7,451,491 UART: [kat] SHA2-384
7,457,761 UART: [kat] SHA2-512-ACC
7,460,119 UART: [kat] ECC-384
9,744,159 UART: [kat] HMAC-384Kdf
9,755,899 UART: [kat] LMS
10,946,058 UART: [kat] --
10,949,806 UART: [cold-reset] ++
10,951,152 UART: [fht] Storing FHT @ 0x50003400
10,963,174 UART: [idev] ++
10,963,746 UART: [idev] CDI.KEYID = 6
10,964,709 UART: [idev] SUBJECT.KEYID = 7
10,965,918 UART: [idev] UDS.KEYID = 0
10,967,523 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,111,847 UART: [idev] Erasing UDS.KEYID = 0
14,251,015 UART: [idev] Using Sha1 for KeyId Algorithm
14,274,185 UART: [idev] --
14,278,447 UART: [ldev] ++
14,279,071 UART: [ldev] CDI.KEYID = 6
14,279,956 UART: [ldev] SUBJECT.KEYID = 5
14,281,220 UART: [ldev] AUTHORITY.KEYID = 7
14,282,446 UART: [ldev] FE.KEYID = 1
14,292,499 UART: [ldev] Erasing FE.KEYID = 1
17,582,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,874,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,936,132 UART: [ldev] --
19,940,296 UART: [fwproc] Waiting for Commands...
19,941,912 UART: [fwproc] Received command 0x46574c44
19,944,157 UART: [fwproc] Received Image of size 114996 bytes
24,017,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,091,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,160,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,480,631 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,123,823 ready_for_fw is high
4,124,222 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,092,274 >>> mbox cmd response: success
23,730,431 UART:
23,730,831 UART: Running Caliptra FMC ...
23,731,982 UART:
23,732,153 UART: [state] CFI Enabled
23,739,889 UART: [fht] FMC Alias Private Key: 7
26,070,370 UART: [art] Extend RT PCRs Done
26,071,620 UART: [art] Lock RT PCRs Done
26,073,490 UART: [art] Populate DV Done
26,078,907 UART: [fht] FMC Alias Private Key: 7
26,080,603 UART: [art] Derive CDI
26,081,456 UART: [art] Store in in slot 0x4
26,123,850 UART: [art] Derive Key Pair
26,124,857 UART: [art] Store priv key in slot 0x5
29,366,851 UART: [art] Derive Key Pair - Done
29,379,488 UART: [art] Signing Cert with AUTHO
29,380,796 UART: RITY.KEYID = 7
31,660,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,778 UART: [art] PUB.X = 6FE345ABA23F757F5E40DBDDAD3E8BBBE6925609055B5E23C029BDC4B6FCD143C70BB9D138FBAB1CFD51D864A6A168CB
31,669,092 UART: [art] PUB.Y = AF62E2A78A4E5525BE37D962791A1E0B2651D230535E7B7C2457C571A6845C998A439439BF6E2EFD271D40F2ED3D5418
31,676,291 UART: [art] SIG.R = C84A3A6D8FE7A8EEA3B396E8DC63F48C80A9E0694910F71C1EE0F7AEE5610C6A48B3197074A2EF7C4C9448136580F214
31,683,708 UART: [art] SIG.S = A0C5A264838B8FCCAB3A5C48F5F9B93AA782D334DAFA87FA045D41AA8D5873D52DA5C589EEF60D5DAF62B1983C334342
32,989,038 UART: Caliptra RT
32,989,756 UART: [state] CFI Enabled
33,107,469 UART: [rt] RT listening for mailbox commands...
33,109,325 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,139,251 UART: [rt]cmd =0x46504c54, len=4
33,140,938 >>> mbox cmd response data (8 bytes)
33,142,146 UART: [rt] FIPS self test
33,143,090 UART: [kat] ++
33,143,543 UART: [kat] sha1
33,148,110 UART: [kat] SHA2-256
33,150,039 UART: [kat] SHA2-384
33,152,948 UART: [kat] SHA2-512-ACC
33,153,912 UART: Droping operation
33,154,685 UART: Fatal Error: 0x90050002
33,189,838 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,334,240 >>> mbox cmd response: failed
33,334,925 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,479,323 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
10,575,617 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,528,645 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,578 writing to cptra_bootfsm_go
192,736 UART:
193,498 UART: Running Caliptra ROM ...
194,681 UART:
194,826 UART: [state] CFI Enabled
264,532 UART: [state] LifecycleState = Unprovisioned
266,753 UART: [state] DebugLocked = No
268,098 UART: [state] WD Timer not started. Device not locked for debugging
271,169 UART: [kat] SHA2-256
450,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,850 UART: [kat] ++
462,337 UART: [kat] sha1
472,773 UART: [kat] SHA2-256
475,809 UART: [kat] SHA2-384
481,955 UART: [kat] SHA2-512-ACC
484,913 UART: [kat] ECC-384
2,950,798 UART: [kat] HMAC-384Kdf
2,974,127 UART: [kat] LMS
3,503,549 UART: [kat] --
3,508,128 UART: [cold-reset] ++
3,509,145 UART: [fht] FHT @ 0x50003400
3,520,609 UART: [idev] ++
3,521,212 UART: [idev] CDI.KEYID = 6
3,522,128 UART: [idev] SUBJECT.KEYID = 7
3,523,232 UART: [idev] UDS.KEYID = 0
3,524,289 ready_for_fw is high
3,524,533 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,084 UART: [idev] Erasing UDS.KEYID = 0
6,029,175 UART: [idev] Sha1 KeyId Algorithm
6,050,944 UART: [idev] --
6,053,861 UART: [ldev] ++
6,054,430 UART: [ldev] CDI.KEYID = 6
6,055,312 UART: [ldev] SUBJECT.KEYID = 5
6,056,444 UART: [ldev] AUTHORITY.KEYID = 7
6,057,728 UART: [ldev] FE.KEYID = 1
6,103,294 UART: [ldev] Erasing FE.KEYID = 1
8,609,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,341 UART: [ldev] --
10,417,200 UART: [fwproc] Wait for Commands...
10,419,408 UART: [fwproc] Recv command 0x46574c44
10,421,506 UART: [fwproc] Recv'd Img size: 115304 bytes
13,839,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,911,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,980,665 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,302,486 >>> mbox cmd response: success
14,307,181 UART: [afmc] ++
14,307,774 UART: [afmc] CDI.KEYID = 6
14,308,685 UART: [afmc] SUBJECT.KEYID = 7
14,309,993 UART: [afmc] AUTHORITY.KEYID = 5
16,837,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,559,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,576,675 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,592,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,608,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,804 UART: [afmc] --
18,634,163 UART: [cold-reset] --
18,638,568 UART: [state] Locking Datavault
18,644,847 UART: [state] Locking PCR0, PCR1 and PCR31
18,646,489 UART: [state] Locking ICCM
18,648,636 UART: [exit] Launching FMC @ 0x40000130
18,657,029 UART:
18,657,265 UART: Running Caliptra FMC ...
18,658,365 UART:
18,658,519 UART: [state] CFI Enabled
18,717,909 UART: [fht] FMC Alias Private Key: 7
20,483,090 UART: [art] Extend RT PCRs Done
20,484,309 UART: [art] Lock RT PCRs Done
20,485,771 UART: [art] Populate DV Done
20,491,182 UART: [fht] FMC Alias Private Key: 7
20,492,720 UART: [art] Derive CDI
20,493,483 UART: [art] Store in in slot 0x4
20,551,871 UART: [art] Derive Key Pair
20,552,914 UART: [art] Store priv key in slot 0x5
23,015,493 UART: [art] Derive Key Pair - Done
23,028,498 UART: [art] Signing Cert with AUTHO
23,029,996 UART: RITY.KEYID = 7
24,741,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,742,592 UART: [art] PUB.X = CBAD8C161BC1030326769052C322553BFBA3C737374636EC841BD5DE95F974D9A63CFBA014799E910544BB543AA74DC8
24,749,846 UART: [art] PUB.Y = 990B20F76610716568C087089CAB0E5061860B36320A691B708710824A1666712D6EC4463E7AD3A4209A4CEA3DB58845
24,757,090 UART: [art] SIG.R = 7BD75BD3F2CC4D3892A6139ABEF212754097087CCBFB5E2F617BA3184DD52A6EE51EDC4EADCFC93CA6AFADE176408943
24,764,497 UART: [art] SIG.S = 8DF79BF2F6F1598F9BF2E487CB8AE8EFDA5172EE79FF3DC7ABC34DA9D7EE0FCA96158E1C76DC7C38B1274F1C818F12C7
25,743,964 UART: Caliptra RT
25,744,659 UART: [state] CFI Enabled
25,908,324 UART: [rt] RT listening for mailbox commands...
25,910,315 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,940,270 UART: [rt]cmd =0x46504c54, len=4
25,941,793 >>> mbox cmd response data (8 bytes)
25,942,755 UART: [rt] FIPS self test
25,943,696 UART: [kat] ++
25,944,152 UART: [kat] sha1
25,948,662 UART: [kat] SHA2-256
25,950,538 UART: [kat] SHA2-384
25,953,553 UART: [kat] SHA2-512-ACC
25,954,439 UART: Droping operation
25,955,212 UART: Fatal Error: 0x90050002
25,990,531 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,135,281 >>> mbox cmd response: failed
26,135,889 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,280,645 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,124 UART:
190,435 UART: Running Caliptra ROM ...
191,548 UART:
191,696 UART: [state] CFI Enabled
251,440 UART: [state] LifecycleState = Unprovisioned
253,317 UART: [state] DebugLocked = No
255,009 UART: [state] WD Timer not started. Device not locked for debugging
259,500 UART: [kat] SHA2-256
438,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,187 UART: [kat] ++
450,721 UART: [kat] sha1
461,601 UART: [kat] SHA2-256
464,631 UART: [kat] SHA2-384
470,612 UART: [kat] SHA2-512-ACC
473,544 UART: [kat] ECC-384
2,933,572 UART: [kat] HMAC-384Kdf
2,955,844 UART: [kat] LMS
3,485,309 UART: [kat] --
3,490,433 UART: [cold-reset] ++
3,491,390 UART: [fht] FHT @ 0x50003400
3,502,774 UART: [idev] ++
3,503,340 UART: [idev] CDI.KEYID = 6
3,504,219 UART: [idev] SUBJECT.KEYID = 7
3,505,430 UART: [idev] UDS.KEYID = 0
3,507,094 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,645 UART: [idev] Erasing UDS.KEYID = 0
6,013,711 UART: [idev] Sha1 KeyId Algorithm
6,036,065 UART: [idev] --
6,039,628 UART: [ldev] ++
6,040,211 UART: [ldev] CDI.KEYID = 6
6,041,123 UART: [ldev] SUBJECT.KEYID = 5
6,042,286 UART: [ldev] AUTHORITY.KEYID = 7
6,043,518 UART: [ldev] FE.KEYID = 1
6,084,037 UART: [ldev] Erasing FE.KEYID = 1
8,586,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,512 UART: [ldev] --
10,376,240 UART: [fwproc] Wait for Commands...
10,378,713 UART: [fwproc] Recv command 0x46574c44
10,380,758 UART: [fwproc] Recv'd Img size: 115304 bytes
13,796,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,954 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,251,505 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,360,584 ready_for_fw is high
3,361,197 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,060,973 >>> mbox cmd response: success
18,348,907 UART:
18,349,321 UART: Running Caliptra FMC ...
18,350,452 UART:
18,350,607 UART: [state] CFI Enabled
18,415,173 UART: [fht] FMC Alias Private Key: 7
20,178,859 UART: [art] Extend RT PCRs Done
20,180,086 UART: [art] Lock RT PCRs Done
20,181,885 UART: [art] Populate DV Done
20,187,223 UART: [fht] FMC Alias Private Key: 7
20,188,827 UART: [art] Derive CDI
20,189,642 UART: [art] Store in in slot 0x4
20,247,925 UART: [art] Derive Key Pair
20,248,962 UART: [art] Store priv key in slot 0x5
22,711,746 UART: [art] Derive Key Pair - Done
22,724,470 UART: [art] Signing Cert with AUTHO
22,725,800 UART: RITY.KEYID = 7
24,437,253 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,767 UART: [art] PUB.X = 814F75E6A803AED7CAB724BA05178DDCF08FD93BE5406B25375D3B08CA7E653406A906DE72792C24FEDA44A63459DD72
24,446,032 UART: [art] PUB.Y = DB3375ED4472D11DAFBA6F27B370251D320B720B2C745A96F68D4F176065A65344D7B024EBACEC21A4C92EEF817A0383
24,453,305 UART: [art] SIG.R = FB6C5AC7CADF7C2DA8A7CB2226B74ABD374DD3BA87F873E7B106E683CABC889879B35417B9D9FE466C53F35AEBA4CF04
24,460,703 UART: [art] SIG.S = 5E6147421484A108F12CF6B0D3E6088BA2E7D045D76BFD5C950626C51012F3BFA21D3919CD2277C1BF49216BDEDF28D4
25,439,766 UART: Caliptra RT
25,440,478 UART: [state] CFI Enabled
25,603,127 UART: [rt] RT listening for mailbox commands...
25,605,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,634,726 UART: [rt]cmd =0x46504c54, len=4
25,636,305 >>> mbox cmd response data (8 bytes)
25,637,795 UART: [rt] FIPS self test
25,638,733 UART: [kat] ++
25,639,179 UART: [kat] sha1
25,643,579 UART: [kat] SHA2-256
25,645,473 UART: [kat] SHA2-384
25,648,520 UART: [kat] SHA2-512-ACC
25,649,436 UART: Droping operation
25,650,208 UART: Fatal Error: 0x90050002
25,685,530 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,830,226 >>> mbox cmd response: failed
25,830,853 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,975,648 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,366,421 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,085,078 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,550 UART:
192,953 UART: Running Caliptra ROM ...
194,112 UART:
603,547 UART: [state] CFI Enabled
618,596 UART: [state] LifecycleState = Unprovisioned
620,415 UART: [state] DebugLocked = No
622,804 UART: [state] WD Timer not started. Device not locked for debugging
627,329 UART: [kat] SHA2-256
806,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,042 UART: [kat] ++
818,589 UART: [kat] sha1
830,321 UART: [kat] SHA2-256
833,406 UART: [kat] SHA2-384
840,888 UART: [kat] SHA2-512-ACC
843,827 UART: [kat] ECC-384
3,284,481 UART: [kat] HMAC-384Kdf
3,296,802 UART: [kat] LMS
3,826,257 UART: [kat] --
3,831,747 UART: [cold-reset] ++
3,834,177 UART: [fht] FHT @ 0x50003400
3,846,455 UART: [idev] ++
3,847,032 UART: [idev] CDI.KEYID = 6
3,848,111 UART: [idev] SUBJECT.KEYID = 7
3,849,236 UART: [idev] UDS.KEYID = 0
3,850,170 ready_for_fw is high
3,850,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,995,117 UART: [idev] Erasing UDS.KEYID = 0
6,315,228 UART: [idev] Sha1 KeyId Algorithm
6,338,684 UART: [idev] --
6,341,578 UART: [ldev] ++
6,342,161 UART: [ldev] CDI.KEYID = 6
6,343,043 UART: [ldev] SUBJECT.KEYID = 5
6,344,206 UART: [ldev] AUTHORITY.KEYID = 7
6,345,497 UART: [ldev] FE.KEYID = 1
6,356,172 UART: [ldev] Erasing FE.KEYID = 1
8,825,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,311 UART: [ldev] --
10,617,545 UART: [fwproc] Wait for Commands...
10,619,422 UART: [fwproc] Recv command 0x46574c44
10,621,522 UART: [fwproc] Recv'd Img size: 115304 bytes
14,038,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,621 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,505,164 >>> mbox cmd response: success
14,509,124 UART: [afmc] ++
14,509,711 UART: [afmc] CDI.KEYID = 6
14,510,623 UART: [afmc] SUBJECT.KEYID = 7
14,511,784 UART: [afmc] AUTHORITY.KEYID = 5
17,009,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,477 UART: [afmc] --
18,806,880 UART: [cold-reset] --
18,811,435 UART: [state] Locking Datavault
18,815,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,212 UART: [state] Locking ICCM
18,819,364 UART: [exit] Launching FMC @ 0x40000130
18,827,771 UART:
18,828,010 UART: Running Caliptra FMC ...
18,829,120 UART:
18,829,277 UART: [state] CFI Enabled
18,837,454 UART: [fht] FMC Alias Private Key: 7
20,594,635 UART: [art] Extend RT PCRs Done
20,595,865 UART: [art] Lock RT PCRs Done
20,597,241 UART: [art] Populate DV Done
20,602,603 UART: [fht] FMC Alias Private Key: 7
20,604,201 UART: [art] Derive CDI
20,604,938 UART: [art] Store in in slot 0x4
20,647,480 UART: [art] Derive Key Pair
20,648,678 UART: [art] Store priv key in slot 0x5
23,075,268 UART: [art] Derive Key Pair - Done
23,088,117 UART: [art] Signing Cert with AUTHO
23,089,428 UART: RITY.KEYID = 7
24,795,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,664 UART: [art] PUB.X = 17221B536263282FFC8E46CD3F567D91219670549CD65DAE7BDD3CA5237F968251464DC1BADCAB0FEAF7124F94D810CF
24,803,919 UART: [art] PUB.Y = 1187FF32E54E9C55BD93FC15EDE5498F267F1146863AE2EA79B45490C1F3492067DBD32CCE3F2DA93D77D37FD3A44FF6
24,811,191 UART: [art] SIG.R = A0A49FE1E36C56CCDDE23324AB176438255970462B3DC847297BFAAB9CB771DBBEFBDDFC98E1AE8F0CDC1862BCDEFE3C
24,818,679 UART: [art] SIG.S = 6D6629273FB778990E36F5120B771397941FF8E391B1D81B3A1555CB14D9F2FAD7E782F6FA2784E01FE29E3352F383B0
25,797,974 UART: Caliptra RT
25,798,681 UART: [state] CFI Enabled
25,915,202 UART: [rt] RT listening for mailbox commands...
25,917,048 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,946,559 UART: [rt]cmd =0x46504c54, len=4
25,948,272 >>> mbox cmd response data (8 bytes)
25,949,492 UART: [rt] FIPS self test
25,950,441 UART: [kat] ++
25,950,937 UART: [kat] sha1
25,955,288 UART: [kat] SHA2-256
25,957,168 UART: [kat] SHA2-384
25,960,125 UART: [kat] SHA2-512-ACC
25,961,015 UART: Droping operation
25,961,788 UART: Fatal Error: 0x90050002
25,996,930 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,141,802 >>> mbox cmd response: failed
26,142,395 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,287,152 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,119 UART:
190,411 UART: Running Caliptra ROM ...
191,644 UART:
14,240,249 UART: [state] CFI Enabled
14,251,925 UART: [state] LifecycleState = Unprovisioned
14,253,775 UART: [state] DebugLocked = No
14,255,675 UART: [state] WD Timer not started. Device not locked for debugging
14,259,470 UART: [kat] SHA2-256
14,438,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,450,151 UART: [kat] ++
14,450,611 UART: [kat] sha1
14,461,352 UART: [kat] SHA2-256
14,464,363 UART: [kat] SHA2-384
14,470,563 UART: [kat] SHA2-512-ACC
14,473,508 UART: [kat] ECC-384
16,916,153 UART: [kat] HMAC-384Kdf
16,928,906 UART: [kat] LMS
17,458,373 UART: [kat] --
17,464,484 UART: [cold-reset] ++
17,465,773 UART: [fht] FHT @ 0x50003400
17,477,732 UART: [idev] ++
17,478,299 UART: [idev] CDI.KEYID = 6
17,479,206 UART: [idev] SUBJECT.KEYID = 7
17,480,583 UART: [idev] UDS.KEYID = 0
17,482,112 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,626,704 UART: [idev] Erasing UDS.KEYID = 0
19,953,249 UART: [idev] Sha1 KeyId Algorithm
19,974,927 UART: [idev] --
19,979,435 UART: [ldev] ++
19,980,011 UART: [ldev] CDI.KEYID = 6
19,980,926 UART: [ldev] SUBJECT.KEYID = 5
19,982,144 UART: [ldev] AUTHORITY.KEYID = 7
19,983,380 UART: [ldev] FE.KEYID = 1
19,991,648 UART: [ldev] Erasing FE.KEYID = 1
22,468,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,184,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,200,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,216,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,232,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,253,886 UART: [ldev] --
24,258,937 UART: [fwproc] Wait for Commands...
24,260,492 UART: [fwproc] Recv command 0x46574c44
24,262,598 UART: [fwproc] Recv'd Img size: 115304 bytes
27,676,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,756,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,825,498 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,146,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,691,227 ready_for_fw is high
3,691,645 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,287,160 >>> mbox cmd response: success
18,536,245 UART:
18,536,651 UART: Running Caliptra FMC ...
18,537,805 UART:
18,537,967 UART: [state] CFI Enabled
18,546,019 UART: [fht] FMC Alias Private Key: 7
20,302,315 UART: [art] Extend RT PCRs Done
20,303,545 UART: [art] Lock RT PCRs Done
20,305,171 UART: [art] Populate DV Done
20,310,512 UART: [fht] FMC Alias Private Key: 7
20,312,007 UART: [art] Derive CDI
20,312,774 UART: [art] Store in in slot 0x4
20,355,367 UART: [art] Derive Key Pair
20,356,370 UART: [art] Store priv key in slot 0x5
22,784,088 UART: [art] Derive Key Pair - Done
22,797,169 UART: [art] Signing Cert with AUTHO
22,798,473 UART: RITY.KEYID = 7
24,504,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,564 UART: [art] PUB.X = D9B19CD9B5B8B43CC98CF680268976A43D122DB7E8FA231E3DD8D064D5F264B40A886B02B31A743036E0D3A2B13B0F3D
24,512,826 UART: [art] PUB.Y = 15F8FF96967AD93EC196294F5F10B86F4A2879453AEDEB0A4091956A0BB2E43271BCFE52EA03997B04C8978421130D1B
24,520,091 UART: [art] SIG.R = 2B36DAA5A48196D67E1DC3AD7CF29F23780C34E14D553662957DBFCAFBE9EBA3AC547E86EA4B7E45F34D8B3B35164823
24,527,503 UART: [art] SIG.S = 70F7E3C367537DC5A53CD278FCB1DC07791D39CBE85C7442B44F9D13D02BC53D41E84834B74C5966912E997B914598FE
25,506,097 UART: Caliptra RT
25,506,802 UART: [state] CFI Enabled
25,624,515 UART: [rt] RT listening for mailbox commands...
25,626,376 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,747 UART: [rt]cmd =0x46504c54, len=4
25,657,318 >>> mbox cmd response data (8 bytes)
25,658,153 UART: [rt] FIPS self test
25,659,106 UART: [kat] ++
25,659,560 UART: [kat] sha1
25,664,063 UART: [kat] SHA2-256
25,665,947 UART: [kat] SHA2-384
25,669,017 UART: [kat] SHA2-512-ACC
25,669,938 UART: Droping operation
25,670,713 UART: Fatal Error: 0x90050002
25,705,857 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,850,688 >>> mbox cmd response: failed
25,851,368 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,996,091 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
17,631,805 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,232,383 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,125 UART:
192,490 UART: Running Caliptra ROM ...
193,593 UART:
193,736 UART: [state] CFI Enabled
263,208 UART: [state] LifecycleState = Unprovisioned
265,623 UART: [state] DebugLocked = No
267,078 UART: [state] WD Timer not started. Device not locked for debugging
271,696 UART: [kat] SHA2-256
461,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,335 UART: [kat] ++
472,784 UART: [kat] sha1
484,161 UART: [kat] SHA2-256
487,225 UART: [kat] SHA2-384
494,002 UART: [kat] SHA2-512-ACC
496,624 UART: [kat] ECC-384
2,949,651 UART: [kat] HMAC-384Kdf
2,971,226 UART: [kat] LMS
3,502,971 UART: [kat] --
3,506,689 UART: [cold-reset] ++
3,508,053 UART: [fht] FHT @ 0x50003400
3,520,877 UART: [idev] ++
3,521,594 UART: [idev] CDI.KEYID = 6
3,522,575 UART: [idev] SUBJECT.KEYID = 7
3,523,693 UART: [idev] UDS.KEYID = 0
3,524,663 ready_for_fw is high
3,524,865 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,871 UART: [idev] Erasing UDS.KEYID = 0
6,031,087 UART: [idev] Sha1 KeyId Algorithm
6,053,631 UART: [idev] --
6,059,312 UART: [ldev] ++
6,060,000 UART: [ldev] CDI.KEYID = 6
6,060,890 UART: [ldev] SUBJECT.KEYID = 5
6,062,126 UART: [ldev] AUTHORITY.KEYID = 7
6,063,306 UART: [ldev] FE.KEYID = 1
6,100,776 UART: [ldev] Erasing FE.KEYID = 1
8,603,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,931 UART: [ldev] --
10,414,831 UART: [fwproc] Wait for Commands...
10,417,379 UART: [fwproc] Recv command 0x46574c44
10,419,697 UART: [fwproc] Recv'd Img size: 115304 bytes
13,871,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,774 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,613,875 >>> mbox cmd response: success
14,618,531 UART: [afmc] ++
14,619,285 UART: [afmc] CDI.KEYID = 6
14,620,387 UART: [afmc] SUBJECT.KEYID = 7
14,621,919 UART: [afmc] AUTHORITY.KEYID = 5
17,150,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,777 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,764 UART: [afmc] --
18,947,058 UART: [cold-reset] --
18,951,680 UART: [state] Locking Datavault
18,956,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,841 UART: [state] Locking ICCM
18,961,562 UART: [exit] Launching FMC @ 0x40000130
18,970,197 UART:
18,970,481 UART: Running Caliptra FMC ...
18,971,594 UART:
18,971,753 UART: [state] CFI Enabled
19,028,549 UART: [fht] FMC Alias Private Key: 7
20,792,500 UART: [art] Extend RT PCRs Done
20,793,737 UART: [art] Lock RT PCRs Done
20,795,226 UART: [art] Populate DV Done
20,800,636 UART: [fht] FMC Alias Private Key: 7
20,802,334 UART: [art] Derive CDI
20,803,071 UART: [art] Store in in slot 0x4
20,861,255 UART: [art] Derive Key Pair
20,862,299 UART: [art] Store priv key in slot 0x5
23,325,785 UART: [art] Derive Key Pair - Done
23,338,684 UART: [art] Signing Cert with AUTHO
23,339,993 UART: RITY.KEYID = 7
25,051,378 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,894 UART: [art] PUB.X = A2BDAC4E732D40EB4EFA855EDF4FF388B520F570CE12A4E8C774AA1A6CD05C7876666E93EE5A420FECD37477A9672205
25,060,150 UART: [art] PUB.Y = F1C8E119BAB8797107DCA1FCAE38F1E9AAF6E4C71B7C7C99B978B64778C2C42ED9C98AA0452BB80AE9ED79903DE206D8
25,067,445 UART: [art] SIG.R = 5C3E1632DE5F78945042FB343421EFE536057BC794B1912D3F5FDBDF7AABD5701CCA1540EE43F951758E6E620277B196
25,074,792 UART: [art] SIG.S = 06060D39ECF4D6A9DA50645DEAA24FA774E3040F8D52F870B5A44D2672FFCE25A256A61F292685680F9919AB1B18C41C
26,053,550 UART: Caliptra RT
26,054,269 UART: [state] CFI Enabled
26,221,913 UART: [rt] RT listening for mailbox commands...
26,223,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,615 UART: [rt]cmd =0x46504c54, len=4
26,255,276 >>> mbox cmd response data (8 bytes)
26,256,137 UART: [rt] FIPS self test
26,257,079 UART: [kat] ++
26,257,580 UART: [kat] sha1
26,261,927 UART: [kat] SHA2-256
26,263,803 UART: [kat] SHA2-384
26,266,887 UART: [kat] SHA2-512-ACC
26,267,791 UART: Droping operation
26,268,566 UART: Fatal Error: 0x90050002
26,303,707 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,448,508 >>> mbox cmd response: failed
26,449,169 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,593,955 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,987 UART:
190,275 UART: Running Caliptra ROM ...
191,303 UART:
191,441 UART: [state] CFI Enabled
249,335 UART: [state] LifecycleState = Unprovisioned
251,741 UART: [state] DebugLocked = No
253,201 UART: [state] WD Timer not started. Device not locked for debugging
257,384 UART: [kat] SHA2-256
447,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,032 UART: [kat] ++
458,483 UART: [kat] sha1
469,900 UART: [kat] SHA2-256
472,909 UART: [kat] SHA2-384
478,832 UART: [kat] SHA2-512-ACC
481,442 UART: [kat] ECC-384
2,935,978 UART: [kat] HMAC-384Kdf
2,957,928 UART: [kat] LMS
3,489,694 UART: [kat] --
3,493,608 UART: [cold-reset] ++
3,495,087 UART: [fht] FHT @ 0x50003400
3,507,863 UART: [idev] ++
3,508,542 UART: [idev] CDI.KEYID = 6
3,509,671 UART: [idev] SUBJECT.KEYID = 7
3,510,795 UART: [idev] UDS.KEYID = 0
3,512,305 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,217 UART: [idev] Erasing UDS.KEYID = 0
6,035,452 UART: [idev] Sha1 KeyId Algorithm
6,057,707 UART: [idev] --
6,062,007 UART: [ldev] ++
6,062,702 UART: [ldev] CDI.KEYID = 6
6,063,617 UART: [ldev] SUBJECT.KEYID = 5
6,064,784 UART: [ldev] AUTHORITY.KEYID = 7
6,066,018 UART: [ldev] FE.KEYID = 1
6,107,613 UART: [ldev] Erasing FE.KEYID = 1
8,612,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,946 UART: [ldev] --
10,422,725 UART: [fwproc] Wait for Commands...
10,424,927 UART: [fwproc] Recv command 0x46574c44
10,427,189 UART: [fwproc] Recv'd Img size: 115304 bytes
13,892,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,967,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,083,753 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,632,301 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,437,233 ready_for_fw is high
3,437,635 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,742,513 >>> mbox cmd response: success
19,048,970 UART:
19,049,376 UART: Running Caliptra FMC ...
19,050,501 UART:
19,050,680 UART: [state] CFI Enabled
19,115,875 UART: [fht] FMC Alias Private Key: 7
20,880,421 UART: [art] Extend RT PCRs Done
20,881,648 UART: [art] Lock RT PCRs Done
20,883,138 UART: [art] Populate DV Done
20,888,281 UART: [fht] FMC Alias Private Key: 7
20,889,825 UART: [art] Derive CDI
20,890,591 UART: [art] Store in in slot 0x4
20,948,709 UART: [art] Derive Key Pair
20,949,743 UART: [art] Store priv key in slot 0x5
23,412,131 UART: [art] Derive Key Pair - Done
23,424,916 UART: [art] Signing Cert with AUTHO
23,426,253 UART: RITY.KEYID = 7
25,138,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,190 UART: [art] PUB.X = BD3D198CECF48B181E36F8DDC52959E230EF7E443ED8C3CEDB7954222546976F445F2F97A45EBF8F295F00673DA2A450
25,147,420 UART: [art] PUB.Y = 008C40027248BDF50D3CB44BB3938E60CDD0E29B677D9A004ED51020FF960EE46363F5A3EC52A65AF45D9A6F80476B1B
25,154,631 UART: [art] SIG.R = 9048510BB18015DE6BB62AD7A333A3BC88E2BCE63DEFB9E29C6FDF969785263DC5EBE4F7CC066F4A80858D6F0DC9B058
25,162,034 UART: [art] SIG.S = 656D3C8F1413FE928D179FF14D41334AFC55BADAA93246FB44D829A9C937ADCA4DFD7ADC102E92EA3F399BAA9DDB133D
26,140,810 UART: Caliptra RT
26,141,508 UART: [state] CFI Enabled
26,308,690 UART: [rt] RT listening for mailbox commands...
26,310,543 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,340,269 UART: [rt]cmd =0x46504c54, len=4
26,341,900 >>> mbox cmd response data (8 bytes)
26,342,960 UART: [rt] FIPS self test
26,343,907 UART: [kat] ++
26,344,355 UART: [kat] sha1
26,348,968 UART: [kat] SHA2-256
26,350,896 UART: [kat] SHA2-384
26,353,757 UART: [kat] SHA2-512-ACC
26,354,666 UART: Droping operation
26,355,439 UART: Fatal Error: 0x90050002
26,390,699 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,535,429 >>> mbox cmd response: failed
26,536,028 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,680,824 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,421,092 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,743,492 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,505 UART:
192,872 UART: Running Caliptra ROM ...
194,071 UART:
603,593 UART: [state] CFI Enabled
617,781 UART: [state] LifecycleState = Unprovisioned
620,169 UART: [state] DebugLocked = No
622,999 UART: [state] WD Timer not started. Device not locked for debugging
628,318 UART: [kat] SHA2-256
818,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,942 UART: [kat] ++
829,547 UART: [kat] sha1
841,802 UART: [kat] SHA2-256
844,779 UART: [kat] SHA2-384
851,211 UART: [kat] SHA2-512-ACC
853,731 UART: [kat] ECC-384
3,297,471 UART: [kat] HMAC-384Kdf
3,310,204 UART: [kat] LMS
3,841,987 UART: [kat] --
3,848,043 UART: [cold-reset] ++
3,850,410 UART: [fht] FHT @ 0x50003400
3,862,106 UART: [idev] ++
3,862,748 UART: [idev] CDI.KEYID = 6
3,863,753 UART: [idev] SUBJECT.KEYID = 7
3,864,934 UART: [idev] UDS.KEYID = 0
3,865,863 ready_for_fw is high
3,866,067 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,010,887 UART: [idev] Erasing UDS.KEYID = 0
6,345,963 UART: [idev] Sha1 KeyId Algorithm
6,368,175 UART: [idev] --
6,371,389 UART: [ldev] ++
6,372,077 UART: [ldev] CDI.KEYID = 6
6,372,991 UART: [ldev] SUBJECT.KEYID = 5
6,374,205 UART: [ldev] AUTHORITY.KEYID = 7
6,375,385 UART: [ldev] FE.KEYID = 1
6,386,466 UART: [ldev] Erasing FE.KEYID = 1
8,864,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,874 UART: [ldev] --
10,657,003 UART: [fwproc] Wait for Commands...
10,658,671 UART: [fwproc] Recv command 0x46574c44
10,660,992 UART: [fwproc] Recv'd Img size: 115304 bytes
14,119,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,989 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,858,876 >>> mbox cmd response: success
14,862,272 UART: [afmc] ++
14,862,972 UART: [afmc] CDI.KEYID = 6
14,864,219 UART: [afmc] SUBJECT.KEYID = 7
14,865,656 UART: [afmc] AUTHORITY.KEYID = 5
17,370,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,091,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,093,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,108,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,124,064 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,139,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,163,156 UART: [afmc] --
19,165,809 UART: [cold-reset] --
19,169,949 UART: [state] Locking Datavault
19,176,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,178,364 UART: [state] Locking ICCM
19,180,838 UART: [exit] Launching FMC @ 0x40000130
19,189,503 UART:
19,189,736 UART: Running Caliptra FMC ...
19,190,837 UART:
19,190,998 UART: [state] CFI Enabled
19,198,824 UART: [fht] FMC Alias Private Key: 7
20,955,583 UART: [art] Extend RT PCRs Done
20,956,807 UART: [art] Lock RT PCRs Done
20,958,780 UART: [art] Populate DV Done
20,964,081 UART: [fht] FMC Alias Private Key: 7
20,965,674 UART: [art] Derive CDI
20,966,412 UART: [art] Store in in slot 0x4
21,008,999 UART: [art] Derive Key Pair
21,010,040 UART: [art] Store priv key in slot 0x5
23,436,166 UART: [art] Derive Key Pair - Done
23,449,056 UART: [art] Signing Cert with AUTHO
23,450,361 UART: RITY.KEYID = 7
25,155,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,435 UART: [art] PUB.X = DAE0EDC1345AF9F5DEF1A48E3E0F2C1D50F07B55BAC0ED02E30526D9D1A7E4D66707F1E7F9A8E45EE5E662762BB1A216
25,164,759 UART: [art] PUB.Y = 40A3E22195E01A2BF3B51E6B869C46526CB2A6025F360ADBE02B04B2808357319A8B3D3FA5267A97961E400609B937C4
25,172,001 UART: [art] SIG.R = A089C0DF60DF78894A3F841BBF205329FAD0B152A495BF296AC7F395631DD4BE666D46E8A197AB1D23F35D3BD2401648
25,179,401 UART: [art] SIG.S = 12B467FD0711C612E92091C0A1A8D94AE24CF4633E552C53FC53CAEB74E24997EE08F9F3C50CFC87FCBB43E33EBE22BC
26,158,819 UART: Caliptra RT
26,159,550 UART: [state] CFI Enabled
26,276,717 UART: [rt] RT listening for mailbox commands...
26,278,696 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,308,637 UART: [rt]cmd =0x46504c54, len=4
26,310,053 >>> mbox cmd response data (8 bytes)
26,311,434 UART: [rt] FIPS self test
26,312,420 UART: [kat] ++
26,312,875 UART: [kat] sha1
26,317,382 UART: [kat] SHA2-256
26,319,310 UART: [kat] SHA2-384
26,322,298 UART: [kat] SHA2-512-ACC
26,323,177 UART: Droping operation
26,323,949 UART: Fatal Error: 0x90050002
26,359,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,503,971 >>> mbox cmd response: failed
26,504,586 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,649,367 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
189,984 UART:
190,268 UART: Running Caliptra ROM ...
191,293 UART:
13,883,329 UART: [state] CFI Enabled
13,898,067 UART: [state] LifecycleState = Unprovisioned
13,900,422 UART: [state] DebugLocked = No
13,903,156 UART: [state] WD Timer not started. Device not locked for debugging
13,907,655 UART: [kat] SHA2-256
14,097,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,108,316 UART: [kat] ++
14,108,855 UART: [kat] sha1
14,120,124 UART: [kat] SHA2-256
14,123,142 UART: [kat] SHA2-384
14,128,228 UART: [kat] SHA2-512-ACC
14,130,804 UART: [kat] ECC-384
16,568,769 UART: [kat] HMAC-384Kdf
16,581,991 UART: [kat] LMS
17,113,799 UART: [kat] --
17,119,895 UART: [cold-reset] ++
17,121,606 UART: [fht] FHT @ 0x50003400
17,133,663 UART: [idev] ++
17,134,345 UART: [idev] CDI.KEYID = 6
17,135,357 UART: [idev] SUBJECT.KEYID = 7
17,136,514 UART: [idev] UDS.KEYID = 0
17,138,053 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,282,810 UART: [idev] Erasing UDS.KEYID = 0
19,616,699 UART: [idev] Sha1 KeyId Algorithm
19,638,515 UART: [idev] --
19,644,535 UART: [ldev] ++
19,645,243 UART: [ldev] CDI.KEYID = 6
19,646,123 UART: [ldev] SUBJECT.KEYID = 5
19,647,332 UART: [ldev] AUTHORITY.KEYID = 7
19,648,562 UART: [ldev] FE.KEYID = 1
19,659,936 UART: [ldev] Erasing FE.KEYID = 1
22,140,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,862,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,877,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,893,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,908,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,928,390 UART: [ldev] --
23,933,977 UART: [fwproc] Wait for Commands...
23,935,641 UART: [fwproc] Recv command 0x46574c44
23,937,950 UART: [fwproc] Recv'd Img size: 115304 bytes
27,401,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,480,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,596,678 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,144,630 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,753,222 ready_for_fw is high
3,753,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,965,919 >>> mbox cmd response: success
19,217,146 UART:
19,217,522 UART: Running Caliptra FMC ...
19,218,657 UART:
19,218,818 UART: [state] CFI Enabled
19,226,861 UART: [fht] FMC Alias Private Key: 7
20,984,058 UART: [art] Extend RT PCRs Done
20,985,279 UART: [art] Lock RT PCRs Done
20,986,771 UART: [art] Populate DV Done
20,992,084 UART: [fht] FMC Alias Private Key: 7
20,993,687 UART: [art] Derive CDI
20,994,512 UART: [art] Store in in slot 0x4
21,036,910 UART: [art] Derive Key Pair
21,037,959 UART: [art] Store priv key in slot 0x5
23,464,500 UART: [art] Derive Key Pair - Done
23,477,386 UART: [art] Signing Cert with AUTHO
23,478,713 UART: RITY.KEYID = 7
25,184,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,604 UART: [art] PUB.X = AC769022FB1AEC8CCC87DA87AE69468637417F89CDFB856A42620EE56B5810790C99EB7B53660BF1B29F8308383993E5
25,192,859 UART: [art] PUB.Y = 7FC405802CD06A4DFB11EADDB5BC4ABD306E39A5BC8DABCA0B23D177C9CF834CD6DA33A9622F61179FFBC4942773CA89
25,200,106 UART: [art] SIG.R = 5F036F560AE467008138141CCE82B7D650BB919C2F8C0CE5E1A62B626CF29F65B576571C40731EB9EC04A3C45251FA0B
25,207,523 UART: [art] SIG.S = CF8429B063D3B5EE0BDE354D375973283E5484ACD0EE3C2B5C88CC9D83BAB5CDEDB5F036ACD278CADC2586E9E85D087F
26,186,724 UART: Caliptra RT
26,187,419 UART: [state] CFI Enabled
26,304,655 UART: [rt] RT listening for mailbox commands...
26,306,504 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,187 UART: [rt]cmd =0x46504c54, len=4
26,337,602 >>> mbox cmd response data (8 bytes)
26,338,865 UART: [rt] FIPS self test
26,339,807 UART: [kat] ++
26,340,260 UART: [kat] sha1
26,344,826 UART: [kat] SHA2-256
26,346,721 UART: [kat] SHA2-384
26,349,519 UART: [kat] SHA2-512-ACC
26,350,434 UART: Droping operation
26,351,208 UART: Fatal Error: 0x90050002
26,386,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,531,461 >>> mbox cmd response: failed
26,532,083 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,677,187 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,011,487 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,229,921 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,973 UART: [kat] SHA2-256
881,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,019 UART: [kat] ++
886,171 UART: [kat] sha1
890,263 UART: [kat] SHA2-256
892,201 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,649 UART: [fht] Storing FHT @ 0x50003400
1,479,642 UART: [idev] ++
1,479,810 UART: [idev] CDI.KEYID = 6
1,480,170 UART: [idev] SUBJECT.KEYID = 7
1,480,594 UART: [idev] UDS.KEYID = 0
1,480,939 ready_for_fw is high
1,480,939 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,505,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,625 UART: [ldev] ++
1,514,793 UART: [ldev] CDI.KEYID = 6
1,515,156 UART: [ldev] SUBJECT.KEYID = 5
1,515,582 UART: [ldev] AUTHORITY.KEYID = 7
1,516,045 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,547,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,304 UART: [ldev] --
1,586,691 UART: [fwproc] Waiting for Commands...
1,587,496 UART: [fwproc] Received command 0x46574c44
1,588,287 UART: [fwproc] Received Image of size 115304 bytes
2,898,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,678 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,261 >>> mbox cmd response: success
3,093,383 UART: [afmc] ++
3,093,551 UART: [afmc] CDI.KEYID = 6
3,093,913 UART: [afmc] SUBJECT.KEYID = 7
3,094,338 UART: [afmc] AUTHORITY.KEYID = 5
3,129,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,063 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,456 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,146 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,099 UART: [afmc] --
3,173,181 UART: [cold-reset] --
3,173,765 UART: [state] Locking Datavault
3,174,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,440 UART: [state] Locking ICCM
3,175,958 UART: [exit] Launching FMC @ 0x40000130
3,181,287 UART:
3,181,303 UART: Running Caliptra FMC ...
3,181,711 UART:
3,181,765 UART: [state] CFI Enabled
3,191,934 UART: [fht] FMC Alias Private Key: 7
3,299,289 UART: [art] Extend RT PCRs Done
3,299,717 UART: [art] Lock RT PCRs Done
3,301,095 UART: [art] Populate DV Done
3,309,606 UART: [fht] FMC Alias Private Key: 7
3,310,782 UART: [art] Derive CDI
3,311,062 UART: [art] Store in in slot 0x4
3,396,541 UART: [art] Derive Key Pair
3,396,901 UART: [art] Store priv key in slot 0x5
3,410,053 UART: [art] Derive Key Pair - Done
3,424,866 UART: [art] Signing Cert with AUTHO
3,425,346 UART: RITY.KEYID = 7
3,440,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,199 UART: [art] PUB.X = F0FC8707B757875F09D92D1CB1606635D90189E0C710527AF6CC79C05128CBE2DB507FA201CD454CBA905AB7839C0F93
3,447,958 UART: [art] PUB.Y = DA0F514BB7F01E0D0010861FB62F691E11C738CB5E2D67AAFE02073CB0E93A7DE5CE81FBDE1E32594A6C54184A9D2DD6
3,454,892 UART: [art] SIG.R = DFE5D0FD75B124B57CCCD496F9B9174466300751FF2C07D81C425CA29C47EA99C72ACC5039F687A208AB912AF22B9889
3,461,661 UART: [art] SIG.S = 9C0B62EFEEC957DE8C56C10E6EF28E7D0666CD91FE995DFA6E7F642730DD7ABEE9A751F9A1DCFEA358BAFB2D60FB869F
3,485,061 UART: Caliptra RT
3,485,314 UART: [state] CFI Enabled
3,593,012 UART: [rt] RT listening for mailbox commands...
3,593,675 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,796 UART: [rt]cmd =0x46504c54, len=4
3,625,153 >>> mbox cmd response data (8 bytes)
3,625,414 UART: [rt] FIPS self test
3,625,742 UART: [kat] ++
3,625,894 UART: [kat] sha1
3,630,086 UART: [kat] SHA2-256
3,632,108 UART: [kat] SHA2-384
3,635,175 UART: [kat] SHA2-512-ACC
3,635,580 UART: Droping operation
3,636,069 UART: Fatal Error: 0x90050002
3,637,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,637,624 >>> mbox cmd response: failed
3,637,624 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,637,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,753 UART: [kat] SHA2-256
881,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,799 UART: [kat] ++
885,951 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
894,734 UART: [kat] SHA2-512-ACC
896,635 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,476,115 UART: [cold-reset] ++
1,476,527 UART: [fht] Storing FHT @ 0x50003400
1,479,430 UART: [idev] ++
1,479,598 UART: [idev] CDI.KEYID = 6
1,479,958 UART: [idev] SUBJECT.KEYID = 7
1,480,382 UART: [idev] UDS.KEYID = 0
1,480,727 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,504,878 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,599 UART: [ldev] ++
1,514,767 UART: [ldev] CDI.KEYID = 6
1,515,130 UART: [ldev] SUBJECT.KEYID = 5
1,515,556 UART: [ldev] AUTHORITY.KEYID = 7
1,516,019 UART: [ldev] FE.KEYID = 1
1,521,031 UART: [ldev] Erasing FE.KEYID = 1
1,545,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,828 UART: [ldev] --
1,585,107 UART: [fwproc] Waiting for Commands...
1,585,832 UART: [fwproc] Received command 0x46574c44
1,586,623 UART: [fwproc] Received Image of size 115304 bytes
2,897,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,447 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,811 ready_for_fw is high
1,362,811 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,323 >>> mbox cmd response: success
3,002,301 UART:
3,002,317 UART: Running Caliptra FMC ...
3,002,725 UART:
3,002,779 UART: [state] CFI Enabled
3,013,438 UART: [fht] FMC Alias Private Key: 7
3,121,673 UART: [art] Extend RT PCRs Done
3,122,101 UART: [art] Lock RT PCRs Done
3,123,531 UART: [art] Populate DV Done
3,131,784 UART: [fht] FMC Alias Private Key: 7
3,132,958 UART: [art] Derive CDI
3,133,238 UART: [art] Store in in slot 0x4
3,218,775 UART: [art] Derive Key Pair
3,219,135 UART: [art] Store priv key in slot 0x5
3,233,015 UART: [art] Derive Key Pair - Done
3,247,633 UART: [art] Signing Cert with AUTHO
3,248,113 UART: RITY.KEYID = 7
3,263,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,990 UART: [art] PUB.X = 84ED5BBC999FA2CEED795B2CBC064E908363014DE8FD2811204E59B70AB4A538E6C90F6E7124092C028B0EC1DAD56233
3,270,749 UART: [art] PUB.Y = 1DC62B0C20E83A3B7FA17AA2949E9D64E983A9EF666189DB81624323E181EB7CA8C8D4BD8171D611827217248D585193
3,277,694 UART: [art] SIG.R = DAF7820535DA86B921D5F96CA8312BE741C6D3AC2F1CE843FCAA36557B536F03C71DCA1E869B1DA750E974B4DF26387E
3,284,472 UART: [art] SIG.S = EAAD2186F5AE0ECF54615BB249C576BD00F9A4A5E150EAEC91E528931DFFE0938B51ED049863D610339CDDFBF7F61262
3,307,629 UART: Caliptra RT
3,307,882 UART: [state] CFI Enabled
3,416,980 UART: [rt] RT listening for mailbox commands...
3,417,643 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,470 UART: [rt]cmd =0x46504c54, len=4
3,448,609 >>> mbox cmd response data (8 bytes)
3,448,938 UART: [rt] FIPS self test
3,449,266 UART: [kat] ++
3,449,418 UART: [kat] sha1
3,453,460 UART: [kat] SHA2-256
3,455,482 UART: [kat] SHA2-384
3,458,329 UART: [kat] SHA2-512-ACC
3,458,734 UART: Droping operation
3,459,171 UART: Fatal Error: 0x90050002
3,460,721 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,726 >>> mbox cmd response: failed
3,460,726 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,387 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,753 UART: [kat] SHA2-512-ACC
897,654 UART: [kat] ECC-384
903,577 UART: [kat] HMAC-384Kdf
908,301 UART: [kat] LMS
1,476,497 UART: [kat] --
1,477,648 UART: [cold-reset] ++
1,478,056 UART: [fht] Storing FHT @ 0x50003400
1,480,719 UART: [idev] ++
1,480,887 UART: [idev] CDI.KEYID = 6
1,481,247 UART: [idev] SUBJECT.KEYID = 7
1,481,671 UART: [idev] UDS.KEYID = 0
1,482,016 ready_for_fw is high
1,482,016 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,885 UART: [idev] Erasing UDS.KEYID = 0
1,506,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,995 UART: [idev] --
1,515,970 UART: [ldev] ++
1,516,138 UART: [ldev] CDI.KEYID = 6
1,516,501 UART: [ldev] SUBJECT.KEYID = 5
1,516,927 UART: [ldev] AUTHORITY.KEYID = 7
1,517,390 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,548,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,735 UART: [ldev] --
1,588,156 UART: [fwproc] Waiting for Commands...
1,588,817 UART: [fwproc] Received command 0x46574c44
1,589,608 UART: [fwproc] Received Image of size 115304 bytes
2,899,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,610 >>> mbox cmd response: success
3,094,692 UART: [afmc] ++
3,094,860 UART: [afmc] CDI.KEYID = 6
3,095,222 UART: [afmc] SUBJECT.KEYID = 7
3,095,647 UART: [afmc] AUTHORITY.KEYID = 5
3,131,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,147,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,148,082 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,159,695 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,165,385 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,173,372 UART: [afmc] --
3,174,350 UART: [cold-reset] --
3,175,384 UART: [state] Locking Datavault
3,176,727 UART: [state] Locking PCR0, PCR1 and PCR31
3,177,331 UART: [state] Locking ICCM
3,177,817 UART: [exit] Launching FMC @ 0x40000130
3,183,146 UART:
3,183,162 UART: Running Caliptra FMC ...
3,183,570 UART:
3,183,713 UART: [state] CFI Enabled
3,194,296 UART: [fht] FMC Alias Private Key: 7
3,302,165 UART: [art] Extend RT PCRs Done
3,302,593 UART: [art] Lock RT PCRs Done
3,303,601 UART: [art] Populate DV Done
3,311,900 UART: [fht] FMC Alias Private Key: 7
3,312,902 UART: [art] Derive CDI
3,313,182 UART: [art] Store in in slot 0x4
3,399,141 UART: [art] Derive Key Pair
3,399,501 UART: [art] Store priv key in slot 0x5
3,412,981 UART: [art] Derive Key Pair - Done
3,427,520 UART: [art] Signing Cert with AUTHO
3,428,000 UART: RITY.KEYID = 7
3,443,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,444,551 UART: [art] PUB.X = 7FB59825E739B6FA57B1F5E1162FCB6B08DEF067D8F173D3034AF3A7C1C32EA3E04456C1D666FECE0BC887DBD8424E39
3,451,328 UART: [art] PUB.Y = 29DBBF66A944348B1F3DF6DCD21772CB2A18E1F744FC334D8B84955BB1C41177D291EF4DD69A9D39150E174875992311
3,458,277 UART: [art] SIG.R = 90850094B477BE1DA6F3F3980D650A152D5582C1574B630974D6A4E84BA5168BB9ED894D50D874FBCEBF69884A866CA5
3,465,018 UART: [art] SIG.S = E7E3AC88E0A8CA258BFB2F417A402D200D1E1AFB2DE5FCCDE03F3DE7507E1EE7ED2DBD780605D6B448755C6C3FEFF77B
3,488,798 UART: Caliptra RT
3,489,143 UART: [state] CFI Enabled
3,597,831 UART: [rt] RT listening for mailbox commands...
3,598,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,101 UART: [rt]cmd =0x46504c54, len=4
3,629,256 >>> mbox cmd response data (8 bytes)
3,629,613 UART: [rt] FIPS self test
3,629,941 UART: [kat] ++
3,630,093 UART: [kat] sha1
3,634,281 UART: [kat] SHA2-256
3,636,303 UART: [kat] SHA2-384
3,639,100 UART: [kat] SHA2-512-ACC
3,639,505 UART: Droping operation
3,639,908 UART: Fatal Error: 0x90050002
3,641,458 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,641,463 >>> mbox cmd response: failed
3,641,463 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,641,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,148 UART: [kat] SHA2-256
882,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,194 UART: [kat] ++
886,346 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,393 UART: [kat] LMS
1,475,589 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,812 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
1,480,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,249 UART: [idev] --
1,515,470 UART: [ldev] ++
1,515,638 UART: [ldev] CDI.KEYID = 6
1,516,001 UART: [ldev] SUBJECT.KEYID = 5
1,516,427 UART: [ldev] AUTHORITY.KEYID = 7
1,516,890 UART: [ldev] FE.KEYID = 1
1,522,296 UART: [ldev] Erasing FE.KEYID = 1
1,547,733 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,129 UART: [ldev] --
1,587,462 UART: [fwproc] Waiting for Commands...
1,588,101 UART: [fwproc] Received command 0x46574c44
1,588,892 UART: [fwproc] Received Image of size 115304 bytes
2,899,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,094,062 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,386 ready_for_fw is high
1,362,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,262 >>> mbox cmd response: success
3,002,728 UART:
3,002,744 UART: Running Caliptra FMC ...
3,003,152 UART:
3,003,295 UART: [state] CFI Enabled
3,014,062 UART: [fht] FMC Alias Private Key: 7
3,122,085 UART: [art] Extend RT PCRs Done
3,122,513 UART: [art] Lock RT PCRs Done
3,124,229 UART: [art] Populate DV Done
3,132,560 UART: [fht] FMC Alias Private Key: 7
3,133,560 UART: [art] Derive CDI
3,133,840 UART: [art] Store in in slot 0x4
3,219,109 UART: [art] Derive Key Pair
3,219,469 UART: [art] Store priv key in slot 0x5
3,232,227 UART: [art] Derive Key Pair - Done
3,247,033 UART: [art] Signing Cert with AUTHO
3,247,513 UART: RITY.KEYID = 7
3,262,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,244 UART: [art] PUB.X = 1C81723131525B7FED874F47EFFF9B5D4DEF78FD9E587B849BB59490E1686501C64974A674F155FC371E06F410AF8156
3,270,008 UART: [art] PUB.Y = 515960C548FC0EAA7547E9FF80C40078CCFE45F20BA3EDDF2740FD2F593950A49F0884AB551DB1B3E8442EA9172DE099
3,276,937 UART: [art] SIG.R = B16CFC7D35FE7D22F36AC1990F2EA711F3B503A359FA2CE1302BCBE48C827065DC439578DC0FE118AE35DE96C217E0D6
3,283,714 UART: [art] SIG.S = D50BB31144156D0D705AA34362DDDCB806C0674D357995B2EB7970FFC57A7DF2B81A2D39AFA56A90C0CA5EEBBDC68E91
3,307,592 UART: Caliptra RT
3,307,937 UART: [state] CFI Enabled
3,417,047 UART: [rt] RT listening for mailbox commands...
3,417,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,707 UART: [rt]cmd =0x46504c54, len=4
3,448,944 >>> mbox cmd response data (8 bytes)
3,449,309 UART: [rt] FIPS self test
3,449,637 UART: [kat] ++
3,449,789 UART: [kat] sha1
3,453,971 UART: [kat] SHA2-256
3,455,993 UART: [kat] SHA2-384
3,458,932 UART: [kat] SHA2-512-ACC
3,459,337 UART: Droping operation
3,459,742 UART: Fatal Error: 0x90050002
3,461,292 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,297 >>> mbox cmd response: failed
3,461,297 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,714 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
893,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,601 UART: [kat] ++
897,753 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,866 UART: [idev] ++
1,175,034 UART: [idev] CDI.KEYID = 6
1,175,394 UART: [idev] SUBJECT.KEYID = 7
1,175,818 UART: [idev] UDS.KEYID = 0
1,176,163 ready_for_fw is high
1,176,163 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,201,689 UART: [idev] Sha1 KeyId Algorithm
1,210,247 UART: [idev] --
1,211,207 UART: [ldev] ++
1,211,375 UART: [ldev] CDI.KEYID = 6
1,211,738 UART: [ldev] SUBJECT.KEYID = 5
1,212,164 UART: [ldev] AUTHORITY.KEYID = 7
1,212,627 UART: [ldev] FE.KEYID = 1
1,217,849 UART: [ldev] Erasing FE.KEYID = 1
1,244,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,557 UART: [ldev] --
1,284,038 UART: [fwproc] Wait for Commands...
1,284,624 UART: [fwproc] Recv command 0x46574c44
1,285,352 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,191 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,368 >>> mbox cmd response: success
2,788,468 UART: [afmc] ++
2,788,636 UART: [afmc] CDI.KEYID = 6
2,788,998 UART: [afmc] SUBJECT.KEYID = 7
2,789,423 UART: [afmc] AUTHORITY.KEYID = 5
2,825,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,769 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,159 UART: [afmc] --
2,869,103 UART: [cold-reset] --
2,869,937 UART: [state] Locking Datavault
2,871,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,848 UART: [state] Locking ICCM
2,872,486 UART: [exit] Launching FMC @ 0x40000130
2,877,815 UART:
2,877,831 UART: Running Caliptra FMC ...
2,878,239 UART:
2,878,293 UART: [state] CFI Enabled
2,888,850 UART: [fht] FMC Alias Private Key: 7
2,997,067 UART: [art] Extend RT PCRs Done
2,997,495 UART: [art] Lock RT PCRs Done
2,998,985 UART: [art] Populate DV Done
3,007,140 UART: [fht] FMC Alias Private Key: 7
3,008,278 UART: [art] Derive CDI
3,008,558 UART: [art] Store in in slot 0x4
3,093,907 UART: [art] Derive Key Pair
3,094,267 UART: [art] Store priv key in slot 0x5
3,107,519 UART: [art] Derive Key Pair - Done
3,122,531 UART: [art] Signing Cert with AUTHO
3,123,011 UART: RITY.KEYID = 7
3,138,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,080 UART: [art] PUB.X = 33EB1AFD6911EB9ED278F0F7AC40FFCA3865860DD67735D81FF53E2D58D862B4385E3A7F6667C7DBEECDFA0638A0A2D5
3,145,864 UART: [art] PUB.Y = 4CF657A041E991C8496738839B1DC87E8E8AB4EB68CCD2C0B6DD08904F5A1480A4093EF0CD6C7FD9CD976A02D565EEFF
3,152,821 UART: [art] SIG.R = B5C6C150DBD12656788BE9BD6EAAFE71E9D07BEFB9DF25D2BE5C26DE16BC3C0F7A9F57E6313770C86CF8BAC53E2A49F7
3,159,616 UART: [art] SIG.S = D0E84AC115548F52324E1DBA34849026AB33BC50D188554BA7E4F65FB7E4DE0DCCA4BBC6B63011C17B3DCCEFD7F166A2
3,183,844 UART: Caliptra RT
3,184,097 UART: [state] CFI Enabled
3,290,799 UART: [rt] RT listening for mailbox commands...
3,291,462 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,357 UART: [rt]cmd =0x46504c54, len=4
3,322,570 >>> mbox cmd response data (8 bytes)
3,322,777 UART: [rt] FIPS self test
3,323,105 UART: [kat] ++
3,323,257 UART: [kat] sha1
3,327,563 UART: [kat] SHA2-256
3,329,585 UART: [kat] SHA2-384
3,332,496 UART: [kat] SHA2-512-ACC
3,332,901 UART: Droping operation
3,333,458 UART: Fatal Error: 0x90050002
3,335,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,013 >>> mbox cmd response: failed
3,335,013 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
892,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,111 UART: [kat] ++
897,263 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,377 UART: [cold-reset] ++
1,171,853 UART: [fht] FHT @ 0x50003400
1,174,492 UART: [idev] ++
1,174,660 UART: [idev] CDI.KEYID = 6
1,175,020 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,175,789 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,393 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,604 UART: [ldev] SUBJECT.KEYID = 5
1,211,030 UART: [ldev] AUTHORITY.KEYID = 7
1,211,493 UART: [ldev] FE.KEYID = 1
1,216,749 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,012 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,348 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,173 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,502 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,057 ready_for_fw is high
1,060,057 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,947 >>> mbox cmd response: success
2,703,091 UART:
2,703,107 UART: Running Caliptra FMC ...
2,703,515 UART:
2,703,569 UART: [state] CFI Enabled
2,713,616 UART: [fht] FMC Alias Private Key: 7
2,821,741 UART: [art] Extend RT PCRs Done
2,822,169 UART: [art] Lock RT PCRs Done
2,823,827 UART: [art] Populate DV Done
2,831,934 UART: [fht] FMC Alias Private Key: 7
2,832,880 UART: [art] Derive CDI
2,833,160 UART: [art] Store in in slot 0x4
2,918,953 UART: [art] Derive Key Pair
2,919,313 UART: [art] Store priv key in slot 0x5
2,932,391 UART: [art] Derive Key Pair - Done
2,947,221 UART: [art] Signing Cert with AUTHO
2,947,701 UART: RITY.KEYID = 7
2,962,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,198 UART: [art] PUB.X = DF14693660647A594090928674A847B725AEF0F10F8E4477B1A4CD63C35705F6E5EE11D3B02BCB4DA2F25DBE37217163
2,969,962 UART: [art] PUB.Y = 8AFD16BB669E624F40A27A432CDA103BF04A5EFF37912DFB3A8638612BCC71E2511F6EA8803CD247EE754C201FFA47EC
2,976,928 UART: [art] SIG.R = 74CA55E0834EF42045F7B139D8A1183C23994860CD7FF9D63C029891CC7CD09C3F5C31AB62609E3733998FAC8E9F0AAC
2,983,698 UART: [art] SIG.S = 3B35FCF66A27BB01423044E9E1D8BBD249B2B847F69625A82886A3452E22B46DBCB3F172651C6E90766BE2B7D9BB23A4
3,007,766 UART: Caliptra RT
3,008,019 UART: [state] CFI Enabled
3,115,994 UART: [rt] RT listening for mailbox commands...
3,116,657 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,270 UART: [rt]cmd =0x46504c54, len=4
3,147,423 >>> mbox cmd response data (8 bytes)
3,147,750 UART: [rt] FIPS self test
3,148,078 UART: [kat] ++
3,148,230 UART: [kat] sha1
3,152,480 UART: [kat] SHA2-256
3,154,502 UART: [kat] SHA2-384
3,157,341 UART: [kat] SHA2-512-ACC
3,157,746 UART: Droping operation
3,158,185 UART: Fatal Error: 0x90050002
3,159,735 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,740 >>> mbox cmd response: failed
3,159,740 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,039 UART: [kat] HMAC-384Kdf
922,691 UART: [kat] LMS
1,171,019 UART: [kat] --
1,171,808 UART: [cold-reset] ++
1,172,218 UART: [fht] FHT @ 0x50003400
1,174,925 UART: [idev] ++
1,175,093 UART: [idev] CDI.KEYID = 6
1,175,453 UART: [idev] SUBJECT.KEYID = 7
1,175,877 UART: [idev] UDS.KEYID = 0
1,176,222 ready_for_fw is high
1,176,222 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,663 UART: [idev] Erasing UDS.KEYID = 0
1,200,878 UART: [idev] Sha1 KeyId Algorithm
1,209,274 UART: [idev] --
1,210,212 UART: [ldev] ++
1,210,380 UART: [ldev] CDI.KEYID = 6
1,210,743 UART: [ldev] SUBJECT.KEYID = 5
1,211,169 UART: [ldev] AUTHORITY.KEYID = 7
1,211,632 UART: [ldev] FE.KEYID = 1
1,217,174 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,164 UART: [ldev] --
1,282,489 UART: [fwproc] Wait for Commands...
1,283,293 UART: [fwproc] Recv command 0x46574c44
1,284,021 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,112 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,427 >>> mbox cmd response: success
2,788,487 UART: [afmc] ++
2,788,655 UART: [afmc] CDI.KEYID = 6
2,789,017 UART: [afmc] SUBJECT.KEYID = 7
2,789,442 UART: [afmc] AUTHORITY.KEYID = 5
2,825,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,596 UART: [afmc] --
2,868,488 UART: [cold-reset] --
2,869,358 UART: [state] Locking Datavault
2,870,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,201 UART: [state] Locking ICCM
2,871,695 UART: [exit] Launching FMC @ 0x40000130
2,877,024 UART:
2,877,040 UART: Running Caliptra FMC ...
2,877,448 UART:
2,877,591 UART: [state] CFI Enabled
2,888,266 UART: [fht] FMC Alias Private Key: 7
2,996,135 UART: [art] Extend RT PCRs Done
2,996,563 UART: [art] Lock RT PCRs Done
2,998,237 UART: [art] Populate DV Done
3,006,356 UART: [fht] FMC Alias Private Key: 7
3,007,480 UART: [art] Derive CDI
3,007,760 UART: [art] Store in in slot 0x4
3,093,137 UART: [art] Derive Key Pair
3,093,497 UART: [art] Store priv key in slot 0x5
3,106,975 UART: [art] Derive Key Pair - Done
3,121,977 UART: [art] Signing Cert with AUTHO
3,122,457 UART: RITY.KEYID = 7
3,137,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,394 UART: [art] PUB.X = FA3FE1E00C335BFF122127B5E45CFE9976EFD992162F3BF06C6A5254B96125D57A1D79CDA846869E2BA6FA40B3A98A0A
3,145,172 UART: [art] PUB.Y = 00D70C7E4957673A16351C1DD482E02E92CDACE404E904E1722C73C39870C7E9E6C53D2363F8B098B95F8B5D2BCF179F
3,152,095 UART: [art] SIG.R = 93A87F29980163928E7CB9A4B2E514B7F3371389EE2C0D4B40DF990ABA9B0B2B6E9792E65A7E61233320DDE6976554B3
3,158,853 UART: [art] SIG.S = 628323B81DD0F569AFCB041580B373A79347DCDC93554C498BE7A5125F60EB45355438044DEA560DD836D57D5943DA2A
3,182,849 UART: Caliptra RT
3,183,194 UART: [state] CFI Enabled
3,290,109 UART: [rt] RT listening for mailbox commands...
3,290,772 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,519 UART: [rt]cmd =0x46504c54, len=4
3,321,816 >>> mbox cmd response data (8 bytes)
3,321,969 UART: [rt] FIPS self test
3,322,297 UART: [kat] ++
3,322,449 UART: [kat] sha1
3,326,663 UART: [kat] SHA2-256
3,328,685 UART: [kat] SHA2-384
3,331,520 UART: [kat] SHA2-512-ACC
3,331,925 UART: Droping operation
3,332,380 UART: Fatal Error: 0x90050002
3,333,930 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,935 >>> mbox cmd response: failed
3,333,935 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,035 UART: [kat] LMS
1,171,363 UART: [kat] --
1,172,268 UART: [cold-reset] ++
1,172,620 UART: [fht] FHT @ 0x50003400
1,175,225 UART: [idev] ++
1,175,393 UART: [idev] CDI.KEYID = 6
1,175,753 UART: [idev] SUBJECT.KEYID = 7
1,176,177 UART: [idev] UDS.KEYID = 0
1,176,522 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,201,566 UART: [idev] Sha1 KeyId Algorithm
1,209,960 UART: [idev] --
1,211,110 UART: [ldev] ++
1,211,278 UART: [ldev] CDI.KEYID = 6
1,211,641 UART: [ldev] SUBJECT.KEYID = 5
1,212,067 UART: [ldev] AUTHORITY.KEYID = 7
1,212,530 UART: [ldev] FE.KEYID = 1
1,217,956 UART: [ldev] Erasing FE.KEYID = 1
1,244,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,608 UART: [ldev] --
1,283,869 UART: [fwproc] Wait for Commands...
1,284,535 UART: [fwproc] Recv command 0x46574c44
1,285,263 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,618 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,791 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,108 ready_for_fw is high
1,061,108 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,270 >>> mbox cmd response: success
2,703,210 UART:
2,703,226 UART: Running Caliptra FMC ...
2,703,634 UART:
2,703,777 UART: [state] CFI Enabled
2,714,018 UART: [fht] FMC Alias Private Key: 7
2,821,449 UART: [art] Extend RT PCRs Done
2,821,877 UART: [art] Lock RT PCRs Done
2,823,311 UART: [art] Populate DV Done
2,831,840 UART: [fht] FMC Alias Private Key: 7
2,832,806 UART: [art] Derive CDI
2,833,086 UART: [art] Store in in slot 0x4
2,918,711 UART: [art] Derive Key Pair
2,919,071 UART: [art] Store priv key in slot 0x5
2,932,307 UART: [art] Derive Key Pair - Done
2,947,122 UART: [art] Signing Cert with AUTHO
2,947,602 UART: RITY.KEYID = 7
2,963,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,037 UART: [art] PUB.X = DC310322D92A1408A351BC486CB096DA56909D285D63FE5CAB7E274CE74637D689D2421579886C5F64BB8DFA5F779CC5
2,970,805 UART: [art] PUB.Y = D2E597B504AE5B86907C1A3088D8F9D65DFB00548B835908A03D7F0B370663E6C10A61AC72C62023F37F6461C665A8E4
2,977,716 UART: [art] SIG.R = 12F95FED810770258EBB13C20EBAF2352FEF5B8DBBEA15CBB24CB070C1B734DD97A3DA42E19C374D6535FCB368321E14
2,984,498 UART: [art] SIG.S = D97727A4BBFAC5AFBDDAF20FF2E9C6BCD6C057E2F0633EB2A0B36C86E33836B102BF449CE6A5728796ECB1C6D28727B4
3,008,819 UART: Caliptra RT
3,009,164 UART: [state] CFI Enabled
3,117,271 UART: [rt] RT listening for mailbox commands...
3,117,934 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,625 UART: [rt]cmd =0x46504c54, len=4
3,148,746 >>> mbox cmd response data (8 bytes)
3,149,037 UART: [rt] FIPS self test
3,149,365 UART: [kat] ++
3,149,517 UART: [kat] sha1
3,153,903 UART: [kat] SHA2-256
3,155,925 UART: [kat] SHA2-384
3,158,636 UART: [kat] SHA2-512-ACC
3,159,041 UART: Droping operation
3,159,602 UART: Fatal Error: 0x90050002
3,161,152 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,157 >>> mbox cmd response: failed
3,161,157 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,760 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,530 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,174,009 ready_for_fw is high
1,174,009 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,050 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,981 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,151 >>> mbox cmd response: success
2,786,358 UART: [afmc] ++
2,786,526 UART: [afmc] CDI.KEYID = 6
2,786,889 UART: [afmc] SUBJECT.KEYID = 7
2,787,315 UART: [afmc] AUTHORITY.KEYID = 5
2,822,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,951 UART: [afmc] --
2,865,889 UART: [cold-reset] --
2,866,735 UART: [state] Locking Datavault
2,868,068 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,672 UART: [state] Locking ICCM
2,869,326 UART: [exit] Launching FMC @ 0x40000130
2,874,655 UART:
2,874,671 UART: Running Caliptra FMC ...
2,875,079 UART:
2,875,133 UART: [state] CFI Enabled
2,885,452 UART: [fht] FMC Alias Private Key: 7
2,993,643 UART: [art] Extend RT PCRs Done
2,994,071 UART: [art] Lock RT PCRs Done
2,995,725 UART: [art] Populate DV Done
3,004,112 UART: [fht] FMC Alias Private Key: 7
3,005,076 UART: [art] Derive CDI
3,005,356 UART: [art] Store in in slot 0x4
3,090,779 UART: [art] Derive Key Pair
3,091,139 UART: [art] Store priv key in slot 0x5
3,104,349 UART: [art] Derive Key Pair - Done
3,118,794 UART: [art] Signing Cert with AUTHO
3,119,274 UART: RITY.KEYID = 7
3,134,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,515 UART: [art] PUB.X = E4F53DF95C66CD143F49926E27110EFDCE328A6E9B65C091499CC78E2421EACE68884C856375A92CD0B4DB5B20E06A68
3,142,290 UART: [art] PUB.Y = 69DFC6B1DD5A883EF07600E9FA4DA81069A46B6CF1DEACEE275C6457ED5DED82EB230437E6269C443EE1ECBBE1E157DB
3,149,241 UART: [art] SIG.R = DD8C4D9A1761777540F86DF63932F97880471B8745A053F2BA5B5132C8EF777075F42F3B33D410A84503F632179D2107
3,155,993 UART: [art] SIG.S = 4E97BB58289146AD68FBABC26AAD769CA92105EFD2E976FD139D296FCE5DE9A32A9A7C1671D308110C174008A0C73010
3,179,716 UART: Caliptra RT
3,179,969 UART: [state] CFI Enabled
3,287,936 UART: [rt] RT listening for mailbox commands...
3,288,599 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,410 UART: [rt]cmd =0x46504c54, len=4
3,319,449 >>> mbox cmd response data (8 bytes)
3,319,588 UART: [rt] FIPS self test
3,319,916 UART: [kat] ++
3,320,068 UART: [kat] sha1
3,324,222 UART: [kat] SHA2-256
3,326,244 UART: [kat] SHA2-384
3,329,007 UART: [kat] SHA2-512-ACC
3,329,412 UART: Droping operation
3,330,003 UART: Fatal Error: 0x90050002
3,331,553 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,558 >>> mbox cmd response: failed
3,331,558 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,169,993 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,174,015 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,067 UART: [idev] Erasing UDS.KEYID = 0
1,199,005 UART: [idev] Sha1 KeyId Algorithm
1,207,875 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,842 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,281,973 UART: [fwproc] Recv command 0x46574c44
1,282,706 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,791 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,039 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,952 ready_for_fw is high
1,055,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,348 >>> mbox cmd response: success
2,697,226 UART:
2,697,242 UART: Running Caliptra FMC ...
2,697,650 UART:
2,697,704 UART: [state] CFI Enabled
2,708,405 UART: [fht] FMC Alias Private Key: 7
2,816,300 UART: [art] Extend RT PCRs Done
2,816,728 UART: [art] Lock RT PCRs Done
2,818,324 UART: [art] Populate DV Done
2,826,217 UART: [fht] FMC Alias Private Key: 7
2,827,255 UART: [art] Derive CDI
2,827,535 UART: [art] Store in in slot 0x4
2,912,912 UART: [art] Derive Key Pair
2,913,272 UART: [art] Store priv key in slot 0x5
2,926,594 UART: [art] Derive Key Pair - Done
2,941,467 UART: [art] Signing Cert with AUTHO
2,941,947 UART: RITY.KEYID = 7
2,957,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,104 UART: [art] PUB.X = 62D54F37E2CBD4EB48E6D1789F32C701472F32A7BFA4AD3D1F6DDEDD3CEE3DB12562A8EE7DED88780F76DAB1896EF8FE
2,964,896 UART: [art] PUB.Y = CDF176D55DC9EBB1D126E10744583A411DB259467283FBAD8C445E54C52E15DDB918ADE7E3C4AFD008340E094855FFBE
2,971,848 UART: [art] SIG.R = 02899DCF2A91CC9CD6892A2A1FAB89DD27C4FBEF889CE2642A326C90AB9FD031756D19665943FDB8F1F1BEE4F5003C34
2,978,609 UART: [art] SIG.S = A3A67DF015408D3246940B3A4021D0EF27CCD6D62E610A51101AE99BC1F319FA796FFD6A85E3831A726B0A090C73BF8D
3,002,453 UART: Caliptra RT
3,002,706 UART: [state] CFI Enabled
3,110,763 UART: [rt] RT listening for mailbox commands...
3,111,426 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,067 UART: [rt]cmd =0x46504c54, len=4
3,142,302 >>> mbox cmd response data (8 bytes)
3,142,561 UART: [rt] FIPS self test
3,142,889 UART: [kat] ++
3,143,041 UART: [kat] sha1
3,147,243 UART: [kat] SHA2-256
3,149,265 UART: [kat] SHA2-384
3,152,160 UART: [kat] SHA2-512-ACC
3,152,565 UART: Droping operation
3,153,056 UART: Fatal Error: 0x90050002
3,154,606 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,611 >>> mbox cmd response: failed
3,154,611 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,268 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,539 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,801 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,207 >>> mbox cmd response: success
2,787,422 UART: [afmc] ++
2,787,590 UART: [afmc] CDI.KEYID = 6
2,787,953 UART: [afmc] SUBJECT.KEYID = 7
2,788,379 UART: [afmc] AUTHORITY.KEYID = 5
2,823,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,227 UART: [afmc] --
2,867,239 UART: [cold-reset] --
2,868,119 UART: [state] Locking Datavault
2,869,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,860 UART: [state] Locking ICCM
2,870,492 UART: [exit] Launching FMC @ 0x40000130
2,875,821 UART:
2,875,837 UART: Running Caliptra FMC ...
2,876,245 UART:
2,876,388 UART: [state] CFI Enabled
2,886,931 UART: [fht] FMC Alias Private Key: 7
2,994,938 UART: [art] Extend RT PCRs Done
2,995,366 UART: [art] Lock RT PCRs Done
2,996,596 UART: [art] Populate DV Done
3,004,853 UART: [fht] FMC Alias Private Key: 7
3,005,797 UART: [art] Derive CDI
3,006,077 UART: [art] Store in in slot 0x4
3,091,796 UART: [art] Derive Key Pair
3,092,156 UART: [art] Store priv key in slot 0x5
3,105,764 UART: [art] Derive Key Pair - Done
3,120,292 UART: [art] Signing Cert with AUTHO
3,120,772 UART: RITY.KEYID = 7
3,136,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,043 UART: [art] PUB.X = 37041FA64AC5AFE4C04FC38301956BC5C7B6B550269D46CED97476FED030E60F449865DAF8447011570208802470031E
3,143,789 UART: [art] PUB.Y = E9AF54B78B947F894119EFF6631C0545D309FB962709958DC1522AC4CDD2D69C4B2137C6FE1F66389CB55DB6C01B226E
3,150,736 UART: [art] SIG.R = E001E28DCA63DF29018C668EE4C5E12F73886DB36664CAF929A940063254F9BA38398D238B25EDBE84DFC20D462F181F
3,157,500 UART: [art] SIG.S = 73DBC9B24C077DEBEE16A7251B9A6D9FD5B143D89707784C553074B325ED6298C85FE79A5446A3F7A3C092ACFEA6DEAD
3,181,235 UART: Caliptra RT
3,181,580 UART: [state] CFI Enabled
3,288,909 UART: [rt] RT listening for mailbox commands...
3,289,572 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,335 UART: [rt]cmd =0x46504c54, len=4
3,320,464 >>> mbox cmd response data (8 bytes)
3,320,611 UART: [rt] FIPS self test
3,320,939 UART: [kat] ++
3,321,091 UART: [kat] sha1
3,325,329 UART: [kat] SHA2-256
3,327,351 UART: [kat] SHA2-384
3,330,244 UART: [kat] SHA2-512-ACC
3,330,649 UART: Droping operation
3,331,072 UART: Fatal Error: 0x90050002
3,332,622 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,627 >>> mbox cmd response: failed
3,332,627 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,616 UART: [kat] SHA2-256
902,556 UART: [kat] SHA2-384
905,077 UART: [kat] SHA2-512-ACC
906,978 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,244 UART: [idev] Sha1 KeyId Algorithm
1,209,104 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,713 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,147 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,053 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,405 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,953 ready_for_fw is high
1,055,953 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,659 >>> mbox cmd response: success
2,697,159 UART:
2,697,175 UART: Running Caliptra FMC ...
2,697,583 UART:
2,697,726 UART: [state] CFI Enabled
2,708,049 UART: [fht] FMC Alias Private Key: 7
2,815,438 UART: [art] Extend RT PCRs Done
2,815,866 UART: [art] Lock RT PCRs Done
2,817,412 UART: [art] Populate DV Done
2,825,563 UART: [fht] FMC Alias Private Key: 7
2,826,545 UART: [art] Derive CDI
2,826,825 UART: [art] Store in in slot 0x4
2,912,396 UART: [art] Derive Key Pair
2,912,756 UART: [art] Store priv key in slot 0x5
2,925,850 UART: [art] Derive Key Pair - Done
2,940,754 UART: [art] Signing Cert with AUTHO
2,941,234 UART: RITY.KEYID = 7
2,956,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,987 UART: [art] PUB.X = 97F1D718AC5621F9645B750E499401D2DCBA2B20F22071AB68645B3A3CD492A5ECDBA1AEBF76859511D1F9A323D750FF
2,963,761 UART: [art] PUB.Y = E801FEF2A63853C3B3B41B2E66A944AA8301A60040D83928DE4C694365748B466D136D0E540AB10B4756D68A14B1AAC1
2,970,674 UART: [art] SIG.R = C20BCDCF9894FBB2A547DB017BCB18DAC366D26D67C259A14C588C466D2C942549E8BB24F9801377BE7D00FDE0FD7C82
2,977,432 UART: [art] SIG.S = 88BE3F9B5A10EF4661D2448B90611091F9E937FBB9B1A4FFFB1F8D015A59B432A784210496FE4F43F3E6E6C3993804C4
3,000,968 UART: Caliptra RT
3,001,313 UART: [state] CFI Enabled
3,109,057 UART: [rt] RT listening for mailbox commands...
3,109,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,273 UART: [rt]cmd =0x46504c54, len=4
3,140,604 >>> mbox cmd response data (8 bytes)
3,140,741 UART: [rt] FIPS self test
3,141,069 UART: [kat] ++
3,141,221 UART: [kat] sha1
3,145,601 UART: [kat] SHA2-256
3,147,623 UART: [kat] SHA2-384
3,150,412 UART: [kat] SHA2-512-ACC
3,150,817 UART: Droping operation
3,151,454 UART: Fatal Error: 0x90050002
3,153,004 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,009 >>> mbox cmd response: failed
3,153,009 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,587 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,831 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
2,683,257 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,827,492 >>> mbox cmd response: failed
2,828,066 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,971,957 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,866,190 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,466,590 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,691,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,836,165 >>> mbox cmd response: failed
2,836,740 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,979,949 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,859,777 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,446,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,043,724 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,187,990 >>> mbox cmd response: failed
3,188,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,331,725 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
21,584,985 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,032,288 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
3,044,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,188,901 >>> mbox cmd response: failed
3,189,468 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,332,660 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
21,572,119 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,004,193 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,701,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,983 >>> mbox cmd response: failed
2,846,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,319 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,454,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,287,198 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,699,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,843,918 >>> mbox cmd response: failed
2,844,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,988,051 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,462,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,301,973 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
3,064,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,209,136 >>> mbox cmd response: failed
3,209,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,353,418 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,175,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,922,009 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,049,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,194,273 >>> mbox cmd response: failed
3,194,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,596 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,168,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,879,887 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,703,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,014 >>> mbox cmd response: failed
2,848,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,992,175 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,449,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,511 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,698,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,843,248 >>> mbox cmd response: failed
2,843,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,987,563 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,483,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,333,378 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,050,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,272 >>> mbox cmd response: failed
3,195,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,340,293 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
20,184,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,922,838 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,051,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,653 >>> mbox cmd response: failed
3,196,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,339,922 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
20,170,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,912,354 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,092 >>> mbox cmd response: failed
813,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,228 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,310 >>> mbox cmd response: failed
813,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,178 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,399 >>> mbox cmd response: failed
813,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,627 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,375 >>> mbox cmd response: failed
813,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,009 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,208 >>> mbox cmd response: failed
813,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,264 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,348 >>> mbox cmd response: failed
813,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,050 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,361 >>> mbox cmd response: failed
813,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,363 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,281 >>> mbox cmd response: failed
813,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,079 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,508 >>> mbox cmd response: failed
813,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,550 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,058 >>> mbox cmd response: failed
813,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,773 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,193 >>> mbox cmd response: failed
813,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,326 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,281 >>> mbox cmd response: failed
813,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,651,021 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,125 UART:
192,492 UART: Running Caliptra ROM ...
193,705 UART:
193,861 UART: [state] CFI Enabled
265,701 UART: [state] LifecycleState = Unprovisioned
267,689 UART: [state] DebugLocked = No
269,941 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,962 UART: [kat] SHA2-256
444,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,191 UART: [kat] ++
455,640 UART: [kat] sha1
466,727 UART: [kat] SHA2-256
469,381 UART: [kat] SHA2-384
475,659 UART: [kat] SHA2-512-ACC
478,031 UART: [kat] ECC-384
2,769,283 UART: [kat] HMAC-384Kdf
2,780,612 UART: [kat] LMS
3,970,876 UART: [kat] --
3,975,558 UART: [cold-reset] ++
3,978,206 UART: [fht] Storing FHT @ 0x50003400
3,989,546 UART: [idev] ++
3,990,109 UART: [idev] CDI.KEYID = 6
3,990,988 UART: [idev] SUBJECT.KEYID = 7
3,992,305 UART: [idev] UDS.KEYID = 0
3,993,240 ready_for_fw is high
3,993,451 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,138,113 UART: [idev] Erasing UDS.KEYID = 0
7,329,007 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,342 UART: [idev] --
7,354,177 UART: [ldev] ++
7,354,800 UART: [ldev] CDI.KEYID = 6
7,355,814 UART: [ldev] SUBJECT.KEYID = 5
7,356,973 UART: [ldev] AUTHORITY.KEYID = 7
7,358,204 UART: [ldev] FE.KEYID = 1
7,404,531 UART: [ldev] Erasing FE.KEYID = 1
10,737,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,492 UART: [ldev] --
13,116,321 UART: [fwproc] Waiting for Commands...
13,118,316 UART: [fwproc] Received command 0x46574c44
13,120,504 UART: [fwproc] Received Image of size 114996 bytes
17,183,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,648,958 >>> mbox cmd response: success
17,653,176 UART: [afmc] ++
17,653,769 UART: [afmc] CDI.KEYID = 6
17,654,697 UART: [afmc] SUBJECT.KEYID = 7
17,655,969 UART: [afmc] AUTHORITY.KEYID = 5
21,012,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,549 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,781 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,205 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,379,659 UART: [afmc] --
23,384,157 UART: [cold-reset] --
23,388,300 UART: [state] Locking Datavault
23,392,897 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,654 UART: [state] Locking ICCM
23,396,510 UART: [exit] Launching FMC @ 0x40000130
23,404,906 UART:
23,405,141 UART: Running Caliptra FMC ...
23,406,263 UART:
23,406,430 UART: [state] CFI Enabled
23,471,715 UART: [fht] FMC Alias Private Key: 7
25,809,778 UART: [art] Extend RT PCRs Done
25,811,007 UART: [art] Lock RT PCRs Done
25,812,664 UART: [art] Populate DV Done
25,818,298 UART: [fht] FMC Alias Private Key: 7
25,820,003 UART: [art] Derive CDI
25,820,824 UART: [art] Store in in slot 0x4
25,880,253 UART: [art] Derive Key Pair
25,881,295 UART: [art] Store priv key in slot 0x5
29,173,967 UART: [art] Derive Key Pair - Done
29,186,690 UART: [art] Signing Cert with AUTHO
29,188,001 UART: RITY.KEYID = 7
31,475,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,870 UART: [art] PUB.X = 0082D1216AE659EE02A56292E075DF90056CD72739494C87584DA1A324DFA9B178ABFC213F5E8B2898E466B374285651
31,484,143 UART: [art] PUB.Y = 5AC63F3EB36EDDF33652EBEFDA15DF9E5D88F9FDF5D0DFB5B10FA701DC53622A2F9F16725E22681EDC0F7C8E25EC5CC0
31,491,377 UART: [art] SIG.R = DD37F66D55E7772755AA8488CB1B2B200B13CA210D17AB3EE48AC9D32D8E7F11D84E09EB57543F2755A5A84F303D3155
31,498,772 UART: [art] SIG.S = 90175A888ED03911BB9B52CE05BC45FB57969B3F89AC53DE3058AD7906400AE1650A433F76217C5FABBA4B72E2C651F7
32,803,803 UART: Caliptra RT
32,804,519 UART: [state] CFI Enabled
32,966,117 UART: [rt] RT listening for mailbox commands...
32,967,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,997,864 UART: [rt]cmd =0x46504c54, len=4
32,999,581 >>> mbox cmd response data (8 bytes)
33,000,648 UART: [rt] FIPS self test
33,001,601 UART: [kat] ++
33,002,052 UART: [kat] sha1
33,006,380 UART: [kat] SHA2-256
33,008,301 UART: [kat] SHA2-384
33,011,490 UART: [kat] SHA2-512-ACC
33,012,487 UART: Droping operation
33,013,309 UART: Fatal Error: 0x90050003
33,048,469 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,192,869 >>> mbox cmd response: failed
33,193,482 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,337,828 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
190,073 UART:
190,367 UART: Running Caliptra ROM ...
191,477 UART:
191,625 UART: [state] CFI Enabled
245,521 UART: [state] LifecycleState = Unprovisioned
247,435 UART: [state] DebugLocked = No
250,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
254,778 UART: [kat] SHA2-256
424,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
434,991 UART: [kat] ++
435,441 UART: [kat] sha1
445,344 UART: [kat] SHA2-256
448,059 UART: [kat] SHA2-384
453,341 UART: [kat] SHA2-512-ACC
455,739 UART: [kat] ECC-384
2,753,176 UART: [kat] HMAC-384Kdf
2,785,616 UART: [kat] LMS
3,975,895 UART: [kat] --
3,980,286 UART: [cold-reset] ++
3,982,329 UART: [fht] Storing FHT @ 0x50003400
3,994,617 UART: [idev] ++
3,995,235 UART: [idev] CDI.KEYID = 6
3,996,116 UART: [idev] SUBJECT.KEYID = 7
3,997,382 UART: [idev] UDS.KEYID = 0
3,998,929 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,143,637 UART: [idev] Erasing UDS.KEYID = 0
7,333,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,281 UART: [idev] --
7,362,006 UART: [ldev] ++
7,362,581 UART: [ldev] CDI.KEYID = 6
7,363,520 UART: [ldev] SUBJECT.KEYID = 5
7,364,730 UART: [ldev] AUTHORITY.KEYID = 7
7,366,012 UART: [ldev] FE.KEYID = 1
7,406,710 UART: [ldev] Erasing FE.KEYID = 1
10,738,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,998 UART: [ldev] --
13,102,324 UART: [fwproc] Waiting for Commands...
13,103,957 UART: [fwproc] Received command 0x46574c44
13,106,146 UART: [fwproc] Received Image of size 114996 bytes
17,159,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,624,771 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,783,878 ready_for_fw is high
3,784,307 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,845,930 >>> mbox cmd response: success
23,551,020 UART:
23,551,426 UART: Running Caliptra FMC ...
23,552,579 UART:
23,552,748 UART: [state] CFI Enabled
23,617,673 UART: [fht] FMC Alias Private Key: 7
25,955,656 UART: [art] Extend RT PCRs Done
25,956,885 UART: [art] Lock RT PCRs Done
25,958,417 UART: [art] Populate DV Done
25,963,626 UART: [fht] FMC Alias Private Key: 7
25,965,227 UART: [art] Derive CDI
25,965,971 UART: [art] Store in in slot 0x4
26,026,697 UART: [art] Derive Key Pair
26,027,748 UART: [art] Store priv key in slot 0x5
29,320,697 UART: [art] Derive Key Pair - Done
29,333,456 UART: [art] Signing Cert with AUTHO
29,334,765 UART: RITY.KEYID = 7
31,622,843 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,347 UART: [art] PUB.X = BDAD7D2A7B9F8C50FB7036B15E59E263440D5FAFD9CA0E3EEE046008D51B08B7CA823B68F82CA2F9A93D84CBE0F008D0
31,631,623 UART: [art] PUB.Y = A22F8B8377BC151FB77E836F4D0E4933BE012701B6DA3EE472C8A1251E2C80BDD36398C4B640C1F80507B924E3470696
31,638,841 UART: [art] SIG.R = 026E06E26CB1C9FC330170B988185A5179B2801F30CEB678DF055313D2826562BA070EB736F0941841F919B16B185F33
31,646,195 UART: [art] SIG.S = FA4F1187E45B50BFE59C4ED10F70764224B004B7BD4F185BFF4204743B39898AF66A6CCD98E8FCC09FA5482798413208
32,951,282 UART: Caliptra RT
32,951,999 UART: [state] CFI Enabled
33,114,160 UART: [rt] RT listening for mailbox commands...
33,116,016 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,145,762 UART: [rt]cmd =0x46504c54, len=4
33,147,431 >>> mbox cmd response data (8 bytes)
33,148,397 UART: [rt] FIPS self test
33,149,356 UART: [kat] ++
33,149,809 UART: [kat] sha1
33,154,289 UART: [kat] SHA2-256
33,156,223 UART: [kat] SHA2-384
33,159,142 UART: [kat] SHA2-512-ACC
33,160,151 UART: Droping operation
33,160,953 UART: Fatal Error: 0x90050003
33,196,052 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,340,485 >>> mbox cmd response: failed
33,341,153 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,485,493 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,793,444 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,904,200 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,695 UART:
193,042 UART: Running Caliptra ROM ...
194,172 UART:
603,893 UART: [state] CFI Enabled
616,701 UART: [state] LifecycleState = Unprovisioned
618,671 UART: [state] DebugLocked = No
620,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,283 UART: [kat] SHA2-256
795,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,635 UART: [kat] ++
806,168 UART: [kat] sha1
818,538 UART: [kat] SHA2-256
821,228 UART: [kat] SHA2-384
826,589 UART: [kat] SHA2-512-ACC
828,962 UART: [kat] ECC-384
3,114,115 UART: [kat] HMAC-384Kdf
3,126,427 UART: [kat] LMS
4,316,520 UART: [kat] --
4,322,320 UART: [cold-reset] ++
4,323,560 UART: [fht] Storing FHT @ 0x50003400
4,335,311 UART: [idev] ++
4,335,902 UART: [idev] CDI.KEYID = 6
4,336,795 UART: [idev] SUBJECT.KEYID = 7
4,338,046 UART: [idev] UDS.KEYID = 0
4,338,991 ready_for_fw is high
4,339,221 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,736 UART: [idev] Erasing UDS.KEYID = 0
7,631,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,170 UART: [idev] --
7,659,097 UART: [ldev] ++
7,659,679 UART: [ldev] CDI.KEYID = 6
7,660,640 UART: [ldev] SUBJECT.KEYID = 5
7,661,853 UART: [ldev] AUTHORITY.KEYID = 7
7,663,084 UART: [ldev] FE.KEYID = 1
7,674,279 UART: [ldev] Erasing FE.KEYID = 1
10,960,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,863 UART: [ldev] --
13,319,480 UART: [fwproc] Waiting for Commands...
13,322,773 UART: [fwproc] Received command 0x46574c44
13,324,962 UART: [fwproc] Received Image of size 114996 bytes
17,391,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,469,515 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,538,428 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,858,878 >>> mbox cmd response: success
17,863,220 UART: [afmc] ++
17,863,816 UART: [afmc] CDI.KEYID = 6
17,864,733 UART: [afmc] SUBJECT.KEYID = 7
17,865,949 UART: [afmc] AUTHORITY.KEYID = 5
21,174,532 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,469,671 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,471,926 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,486,306 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,501,159 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,515,612 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,537,770 UART: [afmc] --
23,540,943 UART: [cold-reset] --
23,544,265 UART: [state] Locking Datavault
23,548,433 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,180 UART: [state] Locking ICCM
23,552,218 UART: [exit] Launching FMC @ 0x40000130
23,560,619 UART:
23,560,858 UART: Running Caliptra FMC ...
23,561,961 UART:
23,562,124 UART: [state] CFI Enabled
23,570,171 UART: [fht] FMC Alias Private Key: 7
25,900,637 UART: [art] Extend RT PCRs Done
25,901,857 UART: [art] Lock RT PCRs Done
25,903,676 UART: [art] Populate DV Done
25,909,151 UART: [fht] FMC Alias Private Key: 7
25,910,693 UART: [art] Derive CDI
25,911,467 UART: [art] Store in in slot 0x4
25,953,578 UART: [art] Derive Key Pair
25,954,581 UART: [art] Store priv key in slot 0x5
29,196,699 UART: [art] Derive Key Pair - Done
29,209,746 UART: [art] Signing Cert with AUTHO
29,211,051 UART: RITY.KEYID = 7
31,489,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,494 UART: [art] PUB.X = E1732A257CCEA7D5684C8FEE0B328A872C4C4014112A20540B7E824B51EF9A2808EB1CD2DAFED9A13F4CF3C061F3F241
31,498,753 UART: [art] PUB.Y = 2990982009170876B25FBB1E0C6DA8C52451D38889D42CC77C545C94BB846C632016414BE68F0F3CCA1362926A1096F8
31,505,944 UART: [art] SIG.R = 72171C78C54B5F1568FF09EAB1099F36BC4F4BDC16EFC2D810172BCB4A14557C649B845B01A77425802DE1F42F710321
31,513,336 UART: [art] SIG.S = B0F2FC0B34017BBC73D37A79292F28ECBC2D2C42EDB11D144465FE36E7B5129089B2D3619DA190FC4ADD97B51305CF4F
32,818,204 UART: Caliptra RT
32,818,911 UART: [state] CFI Enabled
32,936,944 UART: [rt] RT listening for mailbox commands...
32,938,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,968,198 UART: [rt]cmd =0x46504c54, len=4
32,969,696 >>> mbox cmd response data (8 bytes)
32,970,932 UART: [rt] FIPS self test
32,971,868 UART: [kat] ++
32,972,317 UART: [kat] sha1
32,976,774 UART: [kat] SHA2-256
32,978,696 UART: [kat] SHA2-384
32,981,555 UART: [kat] SHA2-512-ACC
32,982,550 UART: Droping operation
32,983,376 UART: Fatal Error: 0x90050003
33,018,520 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,162,941 >>> mbox cmd response: failed
33,163,598 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,307,992 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,038 UART:
190,335 UART: Running Caliptra ROM ...
191,444 UART:
7,217,768 UART: [state] CFI Enabled
7,231,206 UART: [state] LifecycleState = Unprovisioned
7,233,126 UART: [state] DebugLocked = No
7,235,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,239,536 UART: [kat] SHA2-256
7,409,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,419,825 UART: [kat] ++
7,420,289 UART: [kat] sha1
7,431,558 UART: [kat] SHA2-256
7,434,265 UART: [kat] SHA2-384
7,440,794 UART: [kat] SHA2-512-ACC
7,443,154 UART: [kat] ECC-384
9,725,644 UART: [kat] HMAC-384Kdf
9,735,872 UART: [kat] LMS
10,925,939 UART: [kat] --
10,931,434 UART: [cold-reset] ++
10,933,311 UART: [fht] Storing FHT @ 0x50003400
10,945,821 UART: [idev] ++
10,946,391 UART: [idev] CDI.KEYID = 6
10,947,328 UART: [idev] SUBJECT.KEYID = 7
10,948,592 UART: [idev] UDS.KEYID = 0
10,950,143 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,094,496 UART: [idev] Erasing UDS.KEYID = 0
14,232,812 UART: [idev] Using Sha1 for KeyId Algorithm
14,254,736 UART: [idev] --
14,258,902 UART: [ldev] ++
14,259,483 UART: [ldev] CDI.KEYID = 6
14,260,444 UART: [ldev] SUBJECT.KEYID = 5
14,261,655 UART: [ldev] AUTHORITY.KEYID = 7
14,262,888 UART: [ldev] FE.KEYID = 1
14,273,907 UART: [ldev] Erasing FE.KEYID = 1
17,560,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,853,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,868,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,883,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,897,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,916,814 UART: [ldev] --
19,920,783 UART: [fwproc] Waiting for Commands...
19,923,918 UART: [fwproc] Received command 0x46574c44
19,926,114 UART: [fwproc] Received Image of size 114996 bytes
23,994,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,077,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,145,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,466,776 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,129,744 ready_for_fw is high
4,130,171 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,086,735 >>> mbox cmd response: success
23,732,615 UART:
23,733,039 UART: Running Caliptra FMC ...
23,734,159 UART:
23,734,325 UART: [state] CFI Enabled
23,741,909 UART: [fht] FMC Alias Private Key: 7
26,072,360 UART: [art] Extend RT PCRs Done
26,073,612 UART: [art] Lock RT PCRs Done
26,075,001 UART: [art] Populate DV Done
26,080,494 UART: [fht] FMC Alias Private Key: 7
26,081,988 UART: [art] Derive CDI
26,082,760 UART: [art] Store in in slot 0x4
26,125,098 UART: [art] Derive Key Pair
26,126,139 UART: [art] Store priv key in slot 0x5
29,368,333 UART: [art] Derive Key Pair - Done
29,381,137 UART: [art] Signing Cert with AUTHO
29,382,631 UART: RITY.KEYID = 7
31,662,057 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,571 UART: [art] PUB.X = 182B6D6BCACF6720E2AF7BB93E1EB4A64992B123AED2A2CE585DBBB4A55201DEBEAC136B2AE2C7887D95EEE9D0FAEBF1
31,670,820 UART: [art] PUB.Y = AFB7F7015DA82A5BE5F323106B38A51AEA5D68D25943355AB6383CD8310E192B117F9CCFAA7DD96134A9C9369172205D
31,678,077 UART: [art] SIG.R = 594D2F3D5AD552AC5A8174DDA16EE7F78B0ED1EC9F771BB451AE35BF7ECC5FDB1D78217B3E0EDA063C244FBEDBB4F9D1
31,685,473 UART: [art] SIG.S = F834788592F970E48C3893898777BC812A84FCE0ECB57729F7314558092D059DB33924675AF783621E02ED1A245097AC
32,991,236 UART: Caliptra RT
32,991,953 UART: [state] CFI Enabled
33,109,638 UART: [rt] RT listening for mailbox commands...
33,111,511 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,141,310 UART: [rt]cmd =0x46504c54, len=4
33,143,099 >>> mbox cmd response data (8 bytes)
33,144,161 UART: [rt] FIPS self test
33,145,110 UART: [kat] ++
33,145,561 UART: [kat] sha1
33,150,120 UART: [kat] SHA2-256
33,152,050 UART: [kat] SHA2-384
33,155,018 UART: [kat] SHA2-512-ACC
33,156,069 UART: Droping operation
33,156,898 UART: Fatal Error: 0x90050003
33,192,049 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,336,474 >>> mbox cmd response: failed
33,337,151 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,481,539 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
10,581,048 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,538,109 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,223 UART:
192,616 UART: Running Caliptra ROM ...
193,716 UART:
193,855 UART: [state] CFI Enabled
265,483 UART: [state] LifecycleState = Unprovisioned
267,333 UART: [state] DebugLocked = No
269,077 UART: [state] WD Timer not started. Device not locked for debugging
273,182 UART: [kat] SHA2-256
452,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,848 UART: [kat] ++
464,298 UART: [kat] sha1
475,671 UART: [kat] SHA2-256
478,698 UART: [kat] SHA2-384
484,200 UART: [kat] SHA2-512-ACC
487,215 UART: [kat] ECC-384
2,949,504 UART: [kat] HMAC-384Kdf
2,971,120 UART: [kat] LMS
3,500,568 UART: [kat] --
3,505,160 UART: [cold-reset] ++
3,506,390 UART: [fht] FHT @ 0x50003400
3,517,802 UART: [idev] ++
3,518,375 UART: [idev] CDI.KEYID = 6
3,519,287 UART: [idev] SUBJECT.KEYID = 7
3,520,467 UART: [idev] UDS.KEYID = 0
3,521,391 ready_for_fw is high
3,521,595 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,609 UART: [idev] Erasing UDS.KEYID = 0
6,027,692 UART: [idev] Sha1 KeyId Algorithm
6,050,564 UART: [idev] --
6,056,048 UART: [ldev] ++
6,056,643 UART: [ldev] CDI.KEYID = 6
6,057,560 UART: [ldev] SUBJECT.KEYID = 5
6,058,720 UART: [ldev] AUTHORITY.KEYID = 7
6,059,957 UART: [ldev] FE.KEYID = 1
6,100,309 UART: [ldev] Erasing FE.KEYID = 1
8,603,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,867 UART: [ldev] --
10,411,945 UART: [fwproc] Wait for Commands...
10,415,117 UART: [fwproc] Recv command 0x46574c44
10,417,213 UART: [fwproc] Recv'd Img size: 115304 bytes
13,829,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,323 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,294,628 >>> mbox cmd response: success
14,298,867 UART: [afmc] ++
14,299,465 UART: [afmc] CDI.KEYID = 6
14,300,377 UART: [afmc] SUBJECT.KEYID = 7
14,301,536 UART: [afmc] AUTHORITY.KEYID = 5
16,828,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,950 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,117 UART: [afmc] --
18,631,526 UART: [cold-reset] --
18,634,054 UART: [state] Locking Datavault
18,638,928 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,582 UART: [state] Locking ICCM
18,643,327 UART: [exit] Launching FMC @ 0x40000130
18,651,724 UART:
18,651,960 UART: Running Caliptra FMC ...
18,653,062 UART:
18,653,227 UART: [state] CFI Enabled
18,711,743 UART: [fht] FMC Alias Private Key: 7
20,475,483 UART: [art] Extend RT PCRs Done
20,476,720 UART: [art] Lock RT PCRs Done
20,478,314 UART: [art] Populate DV Done
20,483,519 UART: [fht] FMC Alias Private Key: 7
20,485,017 UART: [art] Derive CDI
20,485,783 UART: [art] Store in in slot 0x4
20,545,471 UART: [art] Derive Key Pair
20,546,529 UART: [art] Store priv key in slot 0x5
23,009,354 UART: [art] Derive Key Pair - Done
23,022,572 UART: [art] Signing Cert with AUTHO
23,023,887 UART: RITY.KEYID = 7
24,734,834 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,337 UART: [art] PUB.X = 468DC681F54E675E499AA6CDC5A520DE33DBC15F8184D806E08692E084B9DEAC70885F9F0D1BB896577982B3672C2A09
24,743,599 UART: [art] PUB.Y = 849A24496036B1D9E0EBECC4AD7C65E5A87FE5BA06C1ED417C68BFAD0D39A55CD7AE5B981E3882BF83788B714F139FA0
24,750,906 UART: [art] SIG.R = FC1142FDABBBCF748951D78B38621B1A934FF270F68244922266B07507EB18A65122A49B14FE0807AF82E8611DAAEC8D
24,758,254 UART: [art] SIG.S = C889E928E9C6B60E18442A41218A4D71BF0D44B7738827B565020205AF5ED7C11DE53D9F7FF7EC0DAC3769338A76ADE1
25,737,326 UART: Caliptra RT
25,738,028 UART: [state] CFI Enabled
25,903,261 UART: [rt] RT listening for mailbox commands...
25,905,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,921 UART: [rt]cmd =0x46504c54, len=4
25,936,555 >>> mbox cmd response data (8 bytes)
25,937,846 UART: [rt] FIPS self test
25,938,805 UART: [kat] ++
25,939,268 UART: [kat] sha1
25,943,671 UART: [kat] SHA2-256
25,945,599 UART: [kat] SHA2-384
25,948,560 UART: [kat] SHA2-512-ACC
25,949,559 UART: Droping operation
25,950,412 UART: Fatal Error: 0x90050003
25,985,791 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,130,683 >>> mbox cmd response: failed
26,131,347 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,275,937 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,013 UART:
190,306 UART: Running Caliptra ROM ...
191,337 UART:
191,494 UART: [state] CFI Enabled
248,803 UART: [state] LifecycleState = Unprovisioned
250,685 UART: [state] DebugLocked = No
253,442 UART: [state] WD Timer not started. Device not locked for debugging
257,206 UART: [kat] SHA2-256
436,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,947 UART: [kat] ++
448,395 UART: [kat] sha1
459,970 UART: [kat] SHA2-256
463,032 UART: [kat] SHA2-384
469,120 UART: [kat] SHA2-512-ACC
472,048 UART: [kat] ECC-384
2,931,762 UART: [kat] HMAC-384Kdf
2,955,782 UART: [kat] LMS
3,485,246 UART: [kat] --
3,489,941 UART: [cold-reset] ++
3,491,025 UART: [fht] FHT @ 0x50003400
3,502,764 UART: [idev] ++
3,503,338 UART: [idev] CDI.KEYID = 6
3,504,244 UART: [idev] SUBJECT.KEYID = 7
3,505,458 UART: [idev] UDS.KEYID = 0
3,506,972 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,020 UART: [idev] Erasing UDS.KEYID = 0
6,008,908 UART: [idev] Sha1 KeyId Algorithm
6,031,331 UART: [idev] --
6,034,401 UART: [ldev] ++
6,034,989 UART: [ldev] CDI.KEYID = 6
6,035,906 UART: [ldev] SUBJECT.KEYID = 5
6,037,072 UART: [ldev] AUTHORITY.KEYID = 7
6,038,312 UART: [ldev] FE.KEYID = 1
6,084,477 UART: [ldev] Erasing FE.KEYID = 1
8,589,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,168 UART: [ldev] --
10,399,942 UART: [fwproc] Wait for Commands...
10,402,196 UART: [fwproc] Recv command 0x46574c44
10,404,290 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,371 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,293,406 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,384,264 ready_for_fw is high
3,384,938 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,099,793 >>> mbox cmd response: success
18,388,320 UART:
18,388,711 UART: Running Caliptra FMC ...
18,389,852 UART:
18,390,008 UART: [state] CFI Enabled
18,457,953 UART: [fht] FMC Alias Private Key: 7
20,222,009 UART: [art] Extend RT PCRs Done
20,223,224 UART: [art] Lock RT PCRs Done
20,224,978 UART: [art] Populate DV Done
20,230,313 UART: [fht] FMC Alias Private Key: 7
20,231,959 UART: [art] Derive CDI
20,232,695 UART: [art] Store in in slot 0x4
20,290,229 UART: [art] Derive Key Pair
20,291,268 UART: [art] Store priv key in slot 0x5
22,753,889 UART: [art] Derive Key Pair - Done
22,767,104 UART: [art] Signing Cert with AUTHO
22,768,442 UART: RITY.KEYID = 7
24,480,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,025 UART: [art] PUB.X = 79738EACAA393E405E517B0B4B92D9EB0176040D07330CE0C714FD2205A8FCCA4F552E3C664DAFF17E1411DD858F9620
24,489,352 UART: [art] PUB.Y = 99AAAA99090B49F20279320C7640C29FE964F7949D3C2AFD2DE76144C515AD53405DDC663C65F33D5C861B7FBF28AEDC
24,496,622 UART: [art] SIG.R = 48FD2FF49E78B5404F5063E15539B8999B958EA80343E944C83D7FB7CAB3F34EF51064BB96B245C4B591752FCE0465CE
24,503,971 UART: [art] SIG.S = 6C3D2372926052C5806A60C75B33C916FF5D9AAB6A29D247350DE2C18EC5157E4D149691DA00D7A1007C052DA02B5EE1
25,483,149 UART: Caliptra RT
25,483,865 UART: [state] CFI Enabled
25,647,624 UART: [rt] RT listening for mailbox commands...
25,649,473 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,679,093 UART: [rt]cmd =0x46504c54, len=4
25,680,727 >>> mbox cmd response data (8 bytes)
25,681,930 UART: [rt] FIPS self test
25,682,874 UART: [kat] ++
25,683,326 UART: [kat] sha1
25,687,734 UART: [kat] SHA2-256
25,689,672 UART: [kat] SHA2-384
25,692,684 UART: [kat] SHA2-512-ACC
25,693,714 UART: Droping operation
25,694,537 UART: Fatal Error: 0x90050003
25,729,867 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,874,561 >>> mbox cmd response: failed
25,875,231 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,019,997 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,367,533 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,066,109 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,545 UART:
192,926 UART: Running Caliptra ROM ...
194,165 UART:
603,709 UART: [state] CFI Enabled
615,045 UART: [state] LifecycleState = Unprovisioned
616,861 UART: [state] DebugLocked = No
619,529 UART: [state] WD Timer not started. Device not locked for debugging
623,191 UART: [kat] SHA2-256
802,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,898 UART: [kat] ++
814,428 UART: [kat] sha1
824,600 UART: [kat] SHA2-256
827,609 UART: [kat] SHA2-384
834,168 UART: [kat] SHA2-512-ACC
837,176 UART: [kat] ECC-384
3,279,676 UART: [kat] HMAC-384Kdf
3,292,337 UART: [kat] LMS
3,821,798 UART: [kat] --
3,826,165 UART: [cold-reset] ++
3,827,960 UART: [fht] FHT @ 0x50003400
3,839,722 UART: [idev] ++
3,840,291 UART: [idev] CDI.KEYID = 6
3,841,325 UART: [idev] SUBJECT.KEYID = 7
3,842,425 UART: [idev] UDS.KEYID = 0
3,843,360 ready_for_fw is high
3,843,566 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,988,421 UART: [idev] Erasing UDS.KEYID = 0
6,310,822 UART: [idev] Sha1 KeyId Algorithm
6,333,407 UART: [idev] --
6,337,614 UART: [ldev] ++
6,338,188 UART: [ldev] CDI.KEYID = 6
6,339,102 UART: [ldev] SUBJECT.KEYID = 5
6,340,319 UART: [ldev] AUTHORITY.KEYID = 7
6,341,552 UART: [ldev] FE.KEYID = 1
6,355,718 UART: [ldev] Erasing FE.KEYID = 1
8,831,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,373 UART: [ldev] --
10,623,015 UART: [fwproc] Wait for Commands...
10,625,613 UART: [fwproc] Recv command 0x46574c44
10,627,654 UART: [fwproc] Recv'd Img size: 115304 bytes
14,047,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,638 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,506,647 >>> mbox cmd response: success
14,510,780 UART: [afmc] ++
14,511,370 UART: [afmc] CDI.KEYID = 6
14,512,301 UART: [afmc] SUBJECT.KEYID = 7
14,513,467 UART: [afmc] AUTHORITY.KEYID = 5
17,014,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,753,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,769,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,785,621 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,809,168 UART: [afmc] --
18,812,438 UART: [cold-reset] --
18,816,082 UART: [state] Locking Datavault
18,821,982 UART: [state] Locking PCR0, PCR1 and PCR31
18,823,638 UART: [state] Locking ICCM
18,824,656 UART: [exit] Launching FMC @ 0x40000130
18,833,105 UART:
18,833,339 UART: Running Caliptra FMC ...
18,834,462 UART:
18,834,626 UART: [state] CFI Enabled
18,842,793 UART: [fht] FMC Alias Private Key: 7
20,599,562 UART: [art] Extend RT PCRs Done
20,600,771 UART: [art] Lock RT PCRs Done
20,602,173 UART: [art] Populate DV Done
20,607,421 UART: [fht] FMC Alias Private Key: 7
20,609,131 UART: [art] Derive CDI
20,609,946 UART: [art] Store in in slot 0x4
20,652,650 UART: [art] Derive Key Pair
20,653,650 UART: [art] Store priv key in slot 0x5
23,080,730 UART: [art] Derive Key Pair - Done
23,093,514 UART: [art] Signing Cert with AUTHO
23,094,815 UART: RITY.KEYID = 7
24,800,419 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,900 UART: [art] PUB.X = B3BE5A047E566247CCD71E14FC5A75FEC3B7F404E98448A411D1D9F1B0724A765D2F1B666FFD1BDA6121C84160717CB2
24,809,173 UART: [art] PUB.Y = 0268995C225B2C467C0984BF1DC7CB56CE3E7E2C10DD11FC74F4A4FF32FFF5684D19F96A8238808D31A14B21B4EBB86C
24,816,415 UART: [art] SIG.R = 16184E92E3BAECAD165919900E19CE7E8850669C1264FFFE8E0BE345C16A726D1F10F030F8A11A0E92A2D498273E44B0
24,823,820 UART: [art] SIG.S = 55D98FF19BC41ECBE70A64D0BC062323B82CEA8000036B332A776C283C9AAEFC2118624DAFF124EA9086E7D294907C07
25,803,289 UART: Caliptra RT
25,804,004 UART: [state] CFI Enabled
25,921,582 UART: [rt] RT listening for mailbox commands...
25,923,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,953,053 UART: [rt]cmd =0x46504c54, len=4
25,954,633 >>> mbox cmd response data (8 bytes)
25,955,746 UART: [rt] FIPS self test
25,956,693 UART: [kat] ++
25,957,177 UART: [kat] sha1
25,961,729 UART: [kat] SHA2-256
25,963,647 UART: [kat] SHA2-384
25,966,699 UART: [kat] SHA2-512-ACC
25,967,691 UART: Droping operation
25,968,619 UART: Fatal Error: 0x90050003
26,003,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,148,686 >>> mbox cmd response: failed
26,149,325 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,294,095 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,133 UART:
190,419 UART: Running Caliptra ROM ...
191,531 UART:
14,233,491 UART: [state] CFI Enabled
14,246,142 UART: [state] LifecycleState = Unprovisioned
14,247,953 UART: [state] DebugLocked = No
14,249,661 UART: [state] WD Timer not started. Device not locked for debugging
14,253,678 UART: [kat] SHA2-256
14,432,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,444,378 UART: [kat] ++
14,444,836 UART: [kat] sha1
14,455,832 UART: [kat] SHA2-256
14,458,841 UART: [kat] SHA2-384
14,465,524 UART: [kat] SHA2-512-ACC
14,468,453 UART: [kat] ECC-384
16,911,355 UART: [kat] HMAC-384Kdf
16,924,227 UART: [kat] LMS
17,453,720 UART: [kat] --
17,458,961 UART: [cold-reset] ++
17,460,672 UART: [fht] FHT @ 0x50003400
17,471,702 UART: [idev] ++
17,472,266 UART: [idev] CDI.KEYID = 6
17,473,280 UART: [idev] SUBJECT.KEYID = 7
17,474,433 UART: [idev] UDS.KEYID = 0
17,475,951 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,620,690 UART: [idev] Erasing UDS.KEYID = 0
19,943,216 UART: [idev] Sha1 KeyId Algorithm
19,966,923 UART: [idev] --
19,971,451 UART: [ldev] ++
19,972,015 UART: [ldev] CDI.KEYID = 6
19,972,922 UART: [ldev] SUBJECT.KEYID = 5
19,974,077 UART: [ldev] AUTHORITY.KEYID = 7
19,975,366 UART: [ldev] FE.KEYID = 1
19,986,443 UART: [ldev] Erasing FE.KEYID = 1
22,461,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,179,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,196,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,211,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,227,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,247,944 UART: [ldev] --
24,251,773 UART: [fwproc] Wait for Commands...
24,254,440 UART: [fwproc] Recv command 0x46574c44
24,256,537 UART: [fwproc] Recv'd Img size: 115304 bytes
27,667,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,740,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,809,345 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,130,787 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,690,894 ready_for_fw is high
3,691,551 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,281,118 >>> mbox cmd response: success
18,529,493 UART:
18,530,038 UART: Running Caliptra FMC ...
18,531,276 UART:
18,531,449 UART: [state] CFI Enabled
18,539,271 UART: [fht] FMC Alias Private Key: 7
20,296,167 UART: [art] Extend RT PCRs Done
20,297,396 UART: [art] Lock RT PCRs Done
20,299,033 UART: [art] Populate DV Done
20,304,432 UART: [fht] FMC Alias Private Key: 7
20,306,139 UART: [art] Derive CDI
20,306,958 UART: [art] Store in in slot 0x4
20,349,285 UART: [art] Derive Key Pair
20,350,285 UART: [art] Store priv key in slot 0x5
22,776,655 UART: [art] Derive Key Pair - Done
22,789,650 UART: [art] Signing Cert with AUTHO
22,790,981 UART: RITY.KEYID = 7
24,496,633 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,135 UART: [art] PUB.X = 0A99B9EE25643E485B18497EDC10830A5E50ECB397CECA0BE20F98212F22FA92E401ACEAB6776C81EB910CD4483359D4
24,505,454 UART: [art] PUB.Y = 395CC3C2FE4B2DEF48672019B0409E568FD6437D704A95F50D1A2CFDCB1C9278A6184AA541561AB533A45DB2EE35B058
24,512,712 UART: [art] SIG.R = 84694825237A2E9B6577C1C821BBFAF45399B06621B52BBDA903A19BBE7C6DCF367373F9E5554101B30250A8EA1D21C5
24,520,056 UART: [art] SIG.S = B6C97984FCC6E19332613CF31AEBAA36300B4C0053BE84FDFC092427F72B3E69577304725A423CBF863B0179F6D9A5E5
25,499,265 UART: Caliptra RT
25,499,967 UART: [state] CFI Enabled
25,617,244 UART: [rt] RT listening for mailbox commands...
25,619,103 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,648,830 UART: [rt]cmd =0x46504c54, len=4
25,650,600 >>> mbox cmd response data (8 bytes)
25,651,823 UART: [rt] FIPS self test
25,652,769 UART: [kat] ++
25,653,222 UART: [kat] sha1
25,657,837 UART: [kat] SHA2-256
25,659,786 UART: [kat] SHA2-384
25,662,637 UART: [kat] SHA2-512-ACC
25,663,654 UART: Droping operation
25,664,490 UART: Fatal Error: 0x90050003
25,699,637 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,844,818 >>> mbox cmd response: failed
25,845,484 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,990,264 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,640,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,216,759 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,187 UART:
192,566 UART: Running Caliptra ROM ...
193,713 UART:
193,859 UART: [state] CFI Enabled
265,567 UART: [state] LifecycleState = Unprovisioned
268,031 UART: [state] DebugLocked = No
270,376 UART: [state] WD Timer not started. Device not locked for debugging
274,149 UART: [kat] SHA2-256
464,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,830 UART: [kat] ++
475,307 UART: [kat] sha1
486,546 UART: [kat] SHA2-256
489,555 UART: [kat] SHA2-384
496,402 UART: [kat] SHA2-512-ACC
498,995 UART: [kat] ECC-384
2,949,565 UART: [kat] HMAC-384Kdf
2,972,978 UART: [kat] LMS
3,504,725 UART: [kat] --
3,508,225 UART: [cold-reset] ++
3,510,580 UART: [fht] FHT @ 0x50003400
3,521,209 UART: [idev] ++
3,521,851 UART: [idev] CDI.KEYID = 6
3,522,811 UART: [idev] SUBJECT.KEYID = 7
3,523,985 UART: [idev] UDS.KEYID = 0
3,525,011 ready_for_fw is high
3,525,245 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,761 UART: [idev] Erasing UDS.KEYID = 0
6,029,273 UART: [idev] Sha1 KeyId Algorithm
6,053,168 UART: [idev] --
6,058,787 UART: [ldev] ++
6,059,469 UART: [ldev] CDI.KEYID = 6
6,060,545 UART: [ldev] SUBJECT.KEYID = 5
6,061,655 UART: [ldev] AUTHORITY.KEYID = 7
6,062,830 UART: [ldev] FE.KEYID = 1
6,101,948 UART: [ldev] Erasing FE.KEYID = 1
8,611,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,322 UART: [ldev] --
10,416,695 UART: [fwproc] Wait for Commands...
10,419,663 UART: [fwproc] Recv command 0x46574c44
10,422,014 UART: [fwproc] Recv'd Img size: 115304 bytes
13,884,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,292 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,624,300 >>> mbox cmd response: success
14,627,720 UART: [afmc] ++
14,628,421 UART: [afmc] CDI.KEYID = 6
14,629,604 UART: [afmc] SUBJECT.KEYID = 7
14,631,090 UART: [afmc] AUTHORITY.KEYID = 5
17,176,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,920,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,922,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,937,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,952,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,967,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,990,843 UART: [afmc] --
18,993,584 UART: [cold-reset] --
18,998,971 UART: [state] Locking Datavault
19,006,328 UART: [state] Locking PCR0, PCR1 and PCR31
19,008,519 UART: [state] Locking ICCM
19,010,779 UART: [exit] Launching FMC @ 0x40000130
19,019,454 UART:
19,019,696 UART: Running Caliptra FMC ...
19,020,801 UART:
19,020,961 UART: [state] CFI Enabled
19,079,155 UART: [fht] FMC Alias Private Key: 7
20,843,444 UART: [art] Extend RT PCRs Done
20,844,655 UART: [art] Lock RT PCRs Done
20,846,440 UART: [art] Populate DV Done
20,851,978 UART: [fht] FMC Alias Private Key: 7
20,853,569 UART: [art] Derive CDI
20,854,387 UART: [art] Store in in slot 0x4
20,913,203 UART: [art] Derive Key Pair
20,914,233 UART: [art] Store priv key in slot 0x5
23,391,089 UART: [art] Derive Key Pair - Done
23,403,973 UART: [art] Signing Cert with AUTHO
23,405,282 UART: RITY.KEYID = 7
25,118,372 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,875 UART: [art] PUB.X = 8D3823D3B07DD1A981C7E2BF63D976EDDAB1C61ED3F30926695F1D8A2F60CB98B6251B1FAAFB5010432ACB088CB2D37C
25,127,185 UART: [art] PUB.Y = B4BD0F7015A574917F3B68D0313D379AAD3784301BDA146613A1C8A4FE9645D5B7F2D065F6A65E3516CF331FA95562CA
25,134,420 UART: [art] SIG.R = 29AEB666BF8A24353CDBB3280BB477870CDF4F3287EA2A01A817F5FB0C3A0004EC5FABF9681699706E82DCFE74116AFD
25,141,897 UART: [art] SIG.S = C5A9E8E9EA82AB8142F00A3DD2143CF02429E3DE05FEFD003C0C249F8240E17A4CC4F7E003E7BA5945CCA903CB2094B6
26,121,538 UART: Caliptra RT
26,122,224 UART: [state] CFI Enabled
26,287,324 UART: [rt] RT listening for mailbox commands...
26,289,185 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,131 UART: [rt]cmd =0x46504c54, len=4
26,320,854 >>> mbox cmd response data (8 bytes)
26,321,926 UART: [rt] FIPS self test
26,322,871 UART: [kat] ++
26,323,320 UART: [kat] sha1
26,327,665 UART: [kat] SHA2-256
26,329,535 UART: [kat] SHA2-384
26,332,529 UART: [kat] SHA2-512-ACC
26,333,514 UART: Droping operation
26,334,280 UART: Fatal Error: 0x90050003
26,369,777 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,514,970 >>> mbox cmd response: failed
26,515,616 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,660,227 >>> mbox cmd response: failed
Initializing fuses
1,145 writing to cptra_bootfsm_go
190,264 UART:
190,555 UART: Running Caliptra ROM ...
191,667 UART:
191,820 UART: [state] CFI Enabled
248,695 UART: [state] LifecycleState = Unprovisioned
251,042 UART: [state] DebugLocked = No
253,335 UART: [state] WD Timer not started. Device not locked for debugging
257,177 UART: [kat] SHA2-256
447,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,804 UART: [kat] ++
458,276 UART: [kat] sha1
470,289 UART: [kat] SHA2-256
473,306 UART: [kat] SHA2-384
479,072 UART: [kat] SHA2-512-ACC
481,633 UART: [kat] ECC-384
2,930,309 UART: [kat] HMAC-384Kdf
2,956,603 UART: [kat] LMS
3,488,357 UART: [kat] --
3,492,576 UART: [cold-reset] ++
3,494,682 UART: [fht] FHT @ 0x50003400
3,505,341 UART: [idev] ++
3,506,019 UART: [idev] CDI.KEYID = 6
3,506,986 UART: [idev] SUBJECT.KEYID = 7
3,508,146 UART: [idev] UDS.KEYID = 0
3,509,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,654,589 UART: [idev] Erasing UDS.KEYID = 0
6,014,556 UART: [idev] Sha1 KeyId Algorithm
6,037,896 UART: [idev] --
6,042,868 UART: [ldev] ++
6,043,553 UART: [ldev] CDI.KEYID = 6
6,044,462 UART: [ldev] SUBJECT.KEYID = 5
6,045,646 UART: [ldev] AUTHORITY.KEYID = 7
6,046,883 UART: [ldev] FE.KEYID = 1
6,086,178 UART: [ldev] Erasing FE.KEYID = 1
8,591,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,100 UART: [ldev] --
10,398,231 UART: [fwproc] Wait for Commands...
10,400,710 UART: [fwproc] Recv command 0x46574c44
10,402,903 UART: [fwproc] Recv'd Img size: 115304 bytes
13,859,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,394 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,604,964 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,418,122 ready_for_fw is high
3,418,597 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,738,483 >>> mbox cmd response: success
19,045,597 UART:
19,046,015 UART: Running Caliptra FMC ...
19,047,221 UART:
19,047,392 UART: [state] CFI Enabled
19,112,316 UART: [fht] FMC Alias Private Key: 7
20,875,933 UART: [art] Extend RT PCRs Done
20,877,161 UART: [art] Lock RT PCRs Done
20,878,733 UART: [art] Populate DV Done
20,884,146 UART: [fht] FMC Alias Private Key: 7
20,885,686 UART: [art] Derive CDI
20,886,504 UART: [art] Store in in slot 0x4
20,944,989 UART: [art] Derive Key Pair
20,946,030 UART: [art] Store priv key in slot 0x5
23,409,116 UART: [art] Derive Key Pair - Done
23,422,069 UART: [art] Signing Cert with AUTHO
23,423,381 UART: RITY.KEYID = 7
25,135,280 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,799 UART: [art] PUB.X = C2F3406C1DAC6C63308ED6566AB2DDE712D2A5A245F1EFF8B1D68952DA98F5E2CCA70D153E865A3CDB8A6155BBCD8D47
25,144,071 UART: [art] PUB.Y = 1A7D70FB025CB0E252CDD0E84F38202666FF5485FFBB8B8F306F07E0DB6BC8BE70BF0132AB4B9E7E296BE3AA887E5131
25,151,317 UART: [art] SIG.R = 104DEC5D39835F8F853D621ACBD3CA76CCE7E966D11DA32AF265CC4663B00769D0F66535844BACD6C446B6E73AE49B41
25,158,730 UART: [art] SIG.S = EED688C32702133C57A2DA94DBE3E9BE95C6C4A3ACF154CFB45C20B9E9B8302CDCF9C18352F060C7BD15DD3D87ED3105
26,138,067 UART: Caliptra RT
26,138,783 UART: [state] CFI Enabled
26,303,367 UART: [rt] RT listening for mailbox commands...
26,305,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,334,824 UART: [rt]cmd =0x46504c54, len=4
26,336,511 >>> mbox cmd response data (8 bytes)
26,337,713 UART: [rt] FIPS self test
26,338,653 UART: [kat] ++
26,339,101 UART: [kat] sha1
26,343,499 UART: [kat] SHA2-256
26,345,374 UART: [kat] SHA2-384
26,348,416 UART: [kat] SHA2-512-ACC
26,349,452 UART: Droping operation
26,350,387 UART: Fatal Error: 0x90050003
26,385,769 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,530,665 >>> mbox cmd response: failed
26,531,246 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,675,887 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,423,852 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,770,252 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,387 UART:
192,740 UART: Running Caliptra ROM ...
193,863 UART:
603,639 UART: [state] CFI Enabled
616,603 UART: [state] LifecycleState = Unprovisioned
618,943 UART: [state] DebugLocked = No
621,909 UART: [state] WD Timer not started. Device not locked for debugging
627,294 UART: [kat] SHA2-256
817,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,959 UART: [kat] ++
828,496 UART: [kat] sha1
841,007 UART: [kat] SHA2-256
844,023 UART: [kat] SHA2-384
850,048 UART: [kat] SHA2-512-ACC
852,660 UART: [kat] ECC-384
3,295,484 UART: [kat] HMAC-384Kdf
3,308,885 UART: [kat] LMS
3,840,777 UART: [kat] --
3,844,503 UART: [cold-reset] ++
3,845,448 UART: [fht] FHT @ 0x50003400
3,856,778 UART: [idev] ++
3,857,482 UART: [idev] CDI.KEYID = 6
3,858,360 UART: [idev] SUBJECT.KEYID = 7
3,859,608 UART: [idev] UDS.KEYID = 0
3,860,535 ready_for_fw is high
3,860,739 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,005,575 UART: [idev] Erasing UDS.KEYID = 0
6,337,925 UART: [idev] Sha1 KeyId Algorithm
6,360,075 UART: [idev] --
6,365,113 UART: [ldev] ++
6,365,796 UART: [ldev] CDI.KEYID = 6
6,366,763 UART: [ldev] SUBJECT.KEYID = 5
6,367,922 UART: [ldev] AUTHORITY.KEYID = 7
6,369,102 UART: [ldev] FE.KEYID = 1
6,379,594 UART: [ldev] Erasing FE.KEYID = 1
8,855,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,559 UART: [ldev] --
10,645,353 UART: [fwproc] Wait for Commands...
10,647,612 UART: [fwproc] Recv command 0x46574c44
10,649,869 UART: [fwproc] Recv'd Img size: 115304 bytes
14,112,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,195,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,624 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,859,729 >>> mbox cmd response: success
14,864,074 UART: [afmc] ++
14,864,781 UART: [afmc] CDI.KEYID = 6
14,865,948 UART: [afmc] SUBJECT.KEYID = 7
14,867,437 UART: [afmc] AUTHORITY.KEYID = 5
17,378,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,101,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,103,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,118,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,133,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,148,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,173,379 UART: [afmc] --
19,176,747 UART: [cold-reset] --
19,181,167 UART: [state] Locking Datavault
19,188,328 UART: [state] Locking PCR0, PCR1 and PCR31
19,190,464 UART: [state] Locking ICCM
19,192,779 UART: [exit] Launching FMC @ 0x40000130
19,201,455 UART:
19,201,694 UART: Running Caliptra FMC ...
19,202,796 UART:
19,202,955 UART: [state] CFI Enabled
19,211,057 UART: [fht] FMC Alias Private Key: 7
20,967,821 UART: [art] Extend RT PCRs Done
20,969,049 UART: [art] Lock RT PCRs Done
20,970,571 UART: [art] Populate DV Done
20,975,771 UART: [fht] FMC Alias Private Key: 7
20,977,418 UART: [art] Derive CDI
20,978,241 UART: [art] Store in in slot 0x4
21,021,063 UART: [art] Derive Key Pair
21,022,105 UART: [art] Store priv key in slot 0x5
23,448,487 UART: [art] Derive Key Pair - Done
23,461,548 UART: [art] Signing Cert with AUTHO
23,462,860 UART: RITY.KEYID = 7
25,168,411 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,920 UART: [art] PUB.X = 8CD14659C9E215446CA50EB3DDD7A4CEBC1EB854FDE4F010E4176C1FB1E454759A111FB26F4AF8C52B575FF3B6DFA41C
25,177,267 UART: [art] PUB.Y = 8D604470018E1B4F305F33AECAD4BB02881E738D848D3ABE9C1FA6B4655C6CA6DBFA918FDA0A97BA82C3A9FFBC5A5024
25,184,518 UART: [art] SIG.R = C9E7F2B110B08DCBD5A29A577AFB4D81CA9FAF3E1FF02F4168B1A94EA7AD59F93500F6308219B9AB2EE6C12C9918463F
25,191,918 UART: [art] SIG.S = D32619B0AF8C320E5B8DD9397FF9A13B3901AFD939136F0EFAE8B54B37724361B532BBC5EF43DEA674F2B8D50603627C
26,170,946 UART: Caliptra RT
26,171,659 UART: [state] CFI Enabled
26,288,137 UART: [rt] RT listening for mailbox commands...
26,289,989 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,561 UART: [rt]cmd =0x46504c54, len=4
26,321,120 >>> mbox cmd response data (8 bytes)
26,322,033 UART: [rt] FIPS self test
26,322,979 UART: [kat] ++
26,323,454 UART: [kat] sha1
26,327,891 UART: [kat] SHA2-256
26,329,787 UART: [kat] SHA2-384
26,332,535 UART: [kat] SHA2-512-ACC
26,333,532 UART: Droping operation
26,334,491 UART: Fatal Error: 0x90050003
26,369,694 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,514,492 >>> mbox cmd response: failed
26,515,189 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,659,972 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,097 UART:
190,391 UART: Running Caliptra ROM ...
191,444 UART:
13,875,909 UART: [state] CFI Enabled
13,891,609 UART: [state] LifecycleState = Unprovisioned
13,893,963 UART: [state] DebugLocked = No
13,896,826 UART: [state] WD Timer not started. Device not locked for debugging
13,900,618 UART: [kat] SHA2-256
14,090,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,101,284 UART: [kat] ++
14,101,740 UART: [kat] sha1
14,114,623 UART: [kat] SHA2-256
14,117,622 UART: [kat] SHA2-384
14,124,694 UART: [kat] SHA2-512-ACC
14,127,258 UART: [kat] ECC-384
16,568,696 UART: [kat] HMAC-384Kdf
16,582,867 UART: [kat] LMS
17,114,699 UART: [kat] --
17,118,909 UART: [cold-reset] ++
17,119,978 UART: [fht] FHT @ 0x50003400
17,131,242 UART: [idev] ++
17,131,973 UART: [idev] CDI.KEYID = 6
17,132,879 UART: [idev] SUBJECT.KEYID = 7
17,134,093 UART: [idev] UDS.KEYID = 0
17,135,610 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,280,345 UART: [idev] Erasing UDS.KEYID = 0
19,609,870 UART: [idev] Sha1 KeyId Algorithm
19,632,773 UART: [idev] --
19,637,392 UART: [ldev] ++
19,638,081 UART: [ldev] CDI.KEYID = 6
19,638,995 UART: [ldev] SUBJECT.KEYID = 5
19,640,155 UART: [ldev] AUTHORITY.KEYID = 7
19,641,389 UART: [ldev] FE.KEYID = 1
19,653,534 UART: [ldev] Erasing FE.KEYID = 1
22,133,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,854,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,869,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,884,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,899,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,919,323 UART: [ldev] --
23,925,073 UART: [fwproc] Wait for Commands...
23,926,849 UART: [fwproc] Recv command 0x46574c44
23,929,119 UART: [fwproc] Recv'd Img size: 115304 bytes
27,386,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,461,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,577,467 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,126,642 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,754,291 ready_for_fw is high
3,754,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,984,593 >>> mbox cmd response: success
19,237,153 UART:
19,237,573 UART: Running Caliptra FMC ...
19,238,693 UART:
19,238,844 UART: [state] CFI Enabled
19,246,729 UART: [fht] FMC Alias Private Key: 7
21,003,815 UART: [art] Extend RT PCRs Done
21,005,035 UART: [art] Lock RT PCRs Done
21,006,692 UART: [art] Populate DV Done
21,012,352 UART: [fht] FMC Alias Private Key: 7
21,013,954 UART: [art] Derive CDI
21,014,698 UART: [art] Store in in slot 0x4
21,057,293 UART: [art] Derive Key Pair
21,058,296 UART: [art] Store priv key in slot 0x5
23,485,634 UART: [art] Derive Key Pair - Done
23,498,853 UART: [art] Signing Cert with AUTHO
23,500,163 UART: RITY.KEYID = 7
25,205,761 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,271 UART: [art] PUB.X = F27C592A0D9C9761A5CF81B4F7267A363ABC907D02F0CEB887BC1BFC22D62426BC1248E295782523A85BE7D52411E81C
25,214,522 UART: [art] PUB.Y = D7E9D56D23746BA9FC2CA50C56E782AA4FAABDD24E7324A0584F7F011D7D35011B93A6F753BE01461E72A2536BA2A727
25,221,775 UART: [art] SIG.R = 3EFD01C41754F49D90F599A85D44934FD2ABED1AD121460C8B594ABFEE1A902E28460A17E996F7DC0CBA56F8D379BF11
25,229,568 UART: [art] SIG.S = C00FE74B87C5F79D0F5D929560C6ABC50B1D81F2C65DC52DC9CF97E6776E7ABBF146985311977E02F1B773F4275421A6
26,207,554 UART: Caliptra RT
26,208,251 UART: [state] CFI Enabled
26,325,634 UART: [rt] RT listening for mailbox commands...
26,327,497 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,445 UART: [rt]cmd =0x46504c54, len=4
26,359,106 >>> mbox cmd response data (8 bytes)
26,360,377 UART: [rt] FIPS self test
26,361,315 UART: [kat] ++
26,361,761 UART: [kat] sha1
26,366,269 UART: [kat] SHA2-256
26,368,197 UART: [kat] SHA2-384
26,371,113 UART: [kat] SHA2-512-ACC
26,372,138 UART: Droping operation
26,372,908 UART: Fatal Error: 0x90050003
26,407,975 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,552,743 >>> mbox cmd response: failed
26,553,389 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,698,204 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
16,981,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,210,380 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,729 UART: [kat] SHA2-256
892,667 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,036 UART: [kat] HMAC-384Kdf
907,742 UART: [kat] LMS
1,475,938 UART: [kat] --
1,476,757 UART: [cold-reset] ++
1,477,093 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,666 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,254 UART: [idev] --
1,515,261 UART: [ldev] ++
1,515,429 UART: [ldev] CDI.KEYID = 6
1,515,792 UART: [ldev] SUBJECT.KEYID = 5
1,516,218 UART: [ldev] AUTHORITY.KEYID = 7
1,516,681 UART: [ldev] FE.KEYID = 1
1,521,765 UART: [ldev] Erasing FE.KEYID = 1
1,547,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,010 UART: [ldev] --
1,586,327 UART: [fwproc] Waiting for Commands...
1,586,952 UART: [fwproc] Received command 0x46574c44
1,587,743 UART: [fwproc] Received Image of size 115304 bytes
2,897,768 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,005 >>> mbox cmd response: success
3,093,205 UART: [afmc] ++
3,093,373 UART: [afmc] CDI.KEYID = 6
3,093,735 UART: [afmc] SUBJECT.KEYID = 7
3,094,160 UART: [afmc] AUTHORITY.KEYID = 5
3,129,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,398 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,088 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,067 UART: [afmc] --
3,172,987 UART: [cold-reset] --
3,173,779 UART: [state] Locking Datavault
3,174,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,468 UART: [state] Locking ICCM
3,175,964 UART: [exit] Launching FMC @ 0x40000130
3,181,293 UART:
3,181,309 UART: Running Caliptra FMC ...
3,181,717 UART:
3,181,771 UART: [state] CFI Enabled
3,191,864 UART: [fht] FMC Alias Private Key: 7
3,299,365 UART: [art] Extend RT PCRs Done
3,299,793 UART: [art] Lock RT PCRs Done
3,301,273 UART: [art] Populate DV Done
3,309,692 UART: [fht] FMC Alias Private Key: 7
3,310,804 UART: [art] Derive CDI
3,311,084 UART: [art] Store in in slot 0x4
3,396,867 UART: [art] Derive Key Pair
3,397,227 UART: [art] Store priv key in slot 0x5
3,410,813 UART: [art] Derive Key Pair - Done
3,425,543 UART: [art] Signing Cert with AUTHO
3,426,023 UART: RITY.KEYID = 7
3,441,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,956 UART: [art] PUB.X = 6AD50D1A339CEB3E307FF132391D4FD3541938213C4246AFDFDF2B064557919FDFCFEA68B93A575995AE4EB42C2C6DD6
3,448,734 UART: [art] PUB.Y = 02277621CDA4F0F3DCAA940A9D5AF51D4FBCF6336B5D75CF51E88EA1D02D7C807255BD2C2FE33216917698F895C738FB
3,455,690 UART: [art] SIG.R = 30102331409D9EE72859CC66F6C21566217D844F6305602B02E9DD61D1AF3B25792D378F577B2DC2CCC8A2BBBD2ED825
3,462,456 UART: [art] SIG.S = 9EF7C467B7DCC1EB27E3E3E4C66750C6B5D1B827A136661CA7CD3CDFD4B218286041E1ED950893BBF29E54CF7EA31F2E
3,486,238 UART: Caliptra RT
3,486,491 UART: [state] CFI Enabled
3,594,514 UART: [rt] RT listening for mailbox commands...
3,595,177 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,982 UART: [rt]cmd =0x46504c54, len=4
3,626,019 >>> mbox cmd response data (8 bytes)
3,626,158 UART: [rt] FIPS self test
3,626,486 UART: [kat] ++
3,626,638 UART: [kat] sha1
3,630,912 UART: [kat] SHA2-256
3,632,934 UART: [kat] SHA2-384
3,635,659 UART: [kat] SHA2-512-ACC
3,637,142 UART: Droping operation
3,637,639 UART: Fatal Error: 0x90050003
3,639,189 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,194 >>> mbox cmd response: failed
3,639,194 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,597 UART: [kat] SHA2-256
881,528 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,643 UART: [kat] ++
885,795 UART: [kat] sha1
889,995 UART: [kat] SHA2-256
891,933 UART: [kat] SHA2-384
894,726 UART: [kat] SHA2-512-ACC
896,627 UART: [kat] ECC-384
902,034 UART: [kat] HMAC-384Kdf
906,724 UART: [kat] LMS
1,474,920 UART: [kat] --
1,475,769 UART: [cold-reset] ++
1,476,341 UART: [fht] Storing FHT @ 0x50003400
1,479,226 UART: [idev] ++
1,479,394 UART: [idev] CDI.KEYID = 6
1,479,754 UART: [idev] SUBJECT.KEYID = 7
1,480,178 UART: [idev] UDS.KEYID = 0
1,480,523 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,637 UART: [ldev] ++
1,514,805 UART: [ldev] CDI.KEYID = 6
1,515,168 UART: [ldev] SUBJECT.KEYID = 5
1,515,594 UART: [ldev] AUTHORITY.KEYID = 7
1,516,057 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,480 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 115304 bytes
2,897,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,311 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,207 >>> mbox cmd response: success
3,004,299 UART:
3,004,315 UART: Running Caliptra FMC ...
3,004,723 UART:
3,004,777 UART: [state] CFI Enabled
3,015,294 UART: [fht] FMC Alias Private Key: 7
3,123,159 UART: [art] Extend RT PCRs Done
3,123,587 UART: [art] Lock RT PCRs Done
3,125,027 UART: [art] Populate DV Done
3,133,240 UART: [fht] FMC Alias Private Key: 7
3,134,332 UART: [art] Derive CDI
3,134,612 UART: [art] Store in in slot 0x4
3,220,287 UART: [art] Derive Key Pair
3,220,647 UART: [art] Store priv key in slot 0x5
3,233,665 UART: [art] Derive Key Pair - Done
3,248,531 UART: [art] Signing Cert with AUTHO
3,249,011 UART: RITY.KEYID = 7
3,263,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,716 UART: [art] PUB.X = C9696D6275983DA335AB81A6A4545CCA5150DCF3E9F4107A1A635ABA9EE208D2E91D89B6139F3B393B0441CC1D5BB66B
3,271,490 UART: [art] PUB.Y = 48D2AB3B52C41A5AD5311EC14FB2BFFA3517D356734DE38A761BEE58F56DBDE6C48D2E776C0A07A65F1D12E751D7435E
3,278,450 UART: [art] SIG.R = 4740C2C8A245B6D995726B9BF35E83B4A4646E5490A15B4BD1F07DA18C8122E571F5AD9E756AD315550582DAF0C337C7
3,285,219 UART: [art] SIG.S = 6FB2A0B62E31FD6AD163E72BF5BE119B743DABEFDEC287683B2746DFD7ECFF92C6279DC1DAC5E1E0A5AFB6ACBC8F8DE0
3,309,024 UART: Caliptra RT
3,309,277 UART: [state] CFI Enabled
3,418,085 UART: [rt] RT listening for mailbox commands...
3,418,748 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,821 UART: [rt]cmd =0x46504c54, len=4
3,450,048 >>> mbox cmd response data (8 bytes)
3,450,395 UART: [rt] FIPS self test
3,450,723 UART: [kat] ++
3,450,875 UART: [kat] sha1
3,454,923 UART: [kat] SHA2-256
3,456,945 UART: [kat] SHA2-384
3,459,786 UART: [kat] SHA2-512-ACC
3,461,269 UART: Droping operation
3,461,730 UART: Fatal Error: 0x90050003
3,463,280 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,285 >>> mbox cmd response: failed
3,463,285 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,371 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,219 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,571 UART: [kat] SHA2-512-ACC
897,472 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,479,959 UART: [idev] ++
1,480,127 UART: [idev] CDI.KEYID = 6
1,480,487 UART: [idev] SUBJECT.KEYID = 7
1,480,911 UART: [idev] UDS.KEYID = 0
1,481,256 ready_for_fw is high
1,481,256 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,506,015 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,613 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,258 UART: [ldev] Erasing FE.KEYID = 1
1,547,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,587,160 UART: [fwproc] Waiting for Commands...
1,587,835 UART: [fwproc] Received command 0x46574c44
1,588,626 UART: [fwproc] Received Image of size 115304 bytes
2,898,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,233 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,814 >>> mbox cmd response: success
3,093,000 UART: [afmc] ++
3,093,168 UART: [afmc] CDI.KEYID = 6
3,093,530 UART: [afmc] SUBJECT.KEYID = 7
3,093,955 UART: [afmc] AUTHORITY.KEYID = 5
3,128,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,795 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,485 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,342 UART: [afmc] --
3,172,232 UART: [cold-reset] --
3,173,160 UART: [state] Locking Datavault
3,174,179 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,783 UART: [state] Locking ICCM
3,175,451 UART: [exit] Launching FMC @ 0x40000130
3,180,780 UART:
3,180,796 UART: Running Caliptra FMC ...
3,181,204 UART:
3,181,347 UART: [state] CFI Enabled
3,191,824 UART: [fht] FMC Alias Private Key: 7
3,299,993 UART: [art] Extend RT PCRs Done
3,300,421 UART: [art] Lock RT PCRs Done
3,302,023 UART: [art] Populate DV Done
3,310,072 UART: [fht] FMC Alias Private Key: 7
3,311,094 UART: [art] Derive CDI
3,311,374 UART: [art] Store in in slot 0x4
3,397,301 UART: [art] Derive Key Pair
3,397,661 UART: [art] Store priv key in slot 0x5
3,410,911 UART: [art] Derive Key Pair - Done
3,425,464 UART: [art] Signing Cert with AUTHO
3,425,944 UART: RITY.KEYID = 7
3,441,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,993 UART: [art] PUB.X = 826207BDBEB85D838FE7F7785D218E87E3DC24511E33C4356B7B8DFA08D2889189D164EEF95B4CAECEBAEA7533ABFC6B
3,448,777 UART: [art] PUB.Y = C084435C2B1399DC28135C832E4C20382F5D41F8B9F393BD4A0F3813E08AA994D892BDAEC93FBA7CD4E883BAE9696867
3,455,732 UART: [art] SIG.R = D3F3F8F6EB5B59D57143328059B06B0BAA596CB973AD2719A43C910299B7B3DC259AE3FBD38985652BC8F1F371625457
3,462,498 UART: [art] SIG.S = D6A4D312AF81CDA58B61B0707C1F4252521B32EDCC452D7FD36FC5DF576A64E2771C946FD3C015407FEBE9F383A9C1B9
3,486,395 UART: Caliptra RT
3,486,740 UART: [state] CFI Enabled
3,595,072 UART: [rt] RT listening for mailbox commands...
3,595,735 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,330 UART: [rt]cmd =0x46504c54, len=4
3,626,377 >>> mbox cmd response data (8 bytes)
3,626,492 UART: [rt] FIPS self test
3,626,820 UART: [kat] ++
3,626,972 UART: [kat] sha1
3,631,380 UART: [kat] SHA2-256
3,633,402 UART: [kat] SHA2-384
3,636,201 UART: [kat] SHA2-512-ACC
3,637,684 UART: Droping operation
3,638,099 UART: Fatal Error: 0x90050003
3,639,649 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,654 >>> mbox cmd response: failed
3,639,654 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,331 UART: [kat] SHA2-512-ACC
897,232 UART: [kat] ECC-384
903,073 UART: [kat] HMAC-384Kdf
907,617 UART: [kat] LMS
1,475,813 UART: [kat] --
1,476,700 UART: [cold-reset] ++
1,477,102 UART: [fht] Storing FHT @ 0x50003400
1,479,843 UART: [idev] ++
1,480,011 UART: [idev] CDI.KEYID = 6
1,480,371 UART: [idev] SUBJECT.KEYID = 7
1,480,795 UART: [idev] UDS.KEYID = 0
1,481,140 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,527 UART: [idev] Erasing UDS.KEYID = 0
1,504,887 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,569 UART: [idev] --
1,514,672 UART: [ldev] ++
1,514,840 UART: [ldev] CDI.KEYID = 6
1,515,203 UART: [ldev] SUBJECT.KEYID = 5
1,515,629 UART: [ldev] AUTHORITY.KEYID = 7
1,516,092 UART: [ldev] FE.KEYID = 1
1,521,158 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,349 UART: [ldev] --
1,586,618 UART: [fwproc] Waiting for Commands...
1,587,233 UART: [fwproc] Received command 0x46574c44
1,588,024 UART: [fwproc] Received Image of size 115304 bytes
2,897,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,797 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,550 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 ready_for_fw is high
1,362,860 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,744 >>> mbox cmd response: success
3,001,828 UART:
3,001,844 UART: Running Caliptra FMC ...
3,002,252 UART:
3,002,395 UART: [state] CFI Enabled
3,012,808 UART: [fht] FMC Alias Private Key: 7
3,121,225 UART: [art] Extend RT PCRs Done
3,121,653 UART: [art] Lock RT PCRs Done
3,123,253 UART: [art] Populate DV Done
3,131,490 UART: [fht] FMC Alias Private Key: 7
3,132,470 UART: [art] Derive CDI
3,132,750 UART: [art] Store in in slot 0x4
3,218,553 UART: [art] Derive Key Pair
3,218,913 UART: [art] Store priv key in slot 0x5
3,232,045 UART: [art] Derive Key Pair - Done
3,246,899 UART: [art] Signing Cert with AUTHO
3,247,379 UART: RITY.KEYID = 7
3,262,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,270 UART: [art] PUB.X = ECCD2BF3F65C3A8A484C2B771FA877C3E173E7EA84D0709F2A0C64EF33BB11508DF706664C169BE85B0C63F16C8C2232
3,270,043 UART: [art] PUB.Y = B0338B596184B6EFEB7485844614B5089EAC57B04F0A82105AAEFD77BE03146808059215F1213E39F0906BB863B88354
3,276,970 UART: [art] SIG.R = 276A93361699B8B92B03F30806C762241D13AC5F6D47577620F083340AC002458738B38DEA39202A495DE6C4BAD00827
3,283,710 UART: [art] SIG.S = 7727D25DD0807D49B40C812FBBDD37634DBD14CF01F83FB922DD8C456BAFED0380F922B697A9748D418DACA7850935DC
3,307,923 UART: Caliptra RT
3,308,268 UART: [state] CFI Enabled
3,416,252 UART: [rt] RT listening for mailbox commands...
3,416,915 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,716 UART: [rt]cmd =0x46504c54, len=4
3,447,641 >>> mbox cmd response data (8 bytes)
3,447,970 UART: [rt] FIPS self test
3,448,298 UART: [kat] ++
3,448,450 UART: [kat] sha1
3,452,600 UART: [kat] SHA2-256
3,454,622 UART: [kat] SHA2-384
3,457,507 UART: [kat] SHA2-512-ACC
3,458,990 UART: Droping operation
3,459,525 UART: Fatal Error: 0x90050003
3,461,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,080 >>> mbox cmd response: failed
3,461,080 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,914 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,118 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,378 UART: [kat] LMS
1,170,706 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 ready_for_fw is high
1,175,991 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,250 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,208,757 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,250 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,191 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,339 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,732 >>> mbox cmd response: success
2,787,866 UART: [afmc] ++
2,788,034 UART: [afmc] CDI.KEYID = 6
2,788,396 UART: [afmc] SUBJECT.KEYID = 7
2,788,821 UART: [afmc] AUTHORITY.KEYID = 5
2,824,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,909 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,667 UART: [afmc] --
2,867,741 UART: [cold-reset] --
2,868,535 UART: [state] Locking Datavault
2,869,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,468 UART: [state] Locking ICCM
2,870,998 UART: [exit] Launching FMC @ 0x40000130
2,876,327 UART:
2,876,343 UART: Running Caliptra FMC ...
2,876,751 UART:
2,876,805 UART: [state] CFI Enabled
2,886,934 UART: [fht] FMC Alias Private Key: 7
2,994,759 UART: [art] Extend RT PCRs Done
2,995,187 UART: [art] Lock RT PCRs Done
2,996,423 UART: [art] Populate DV Done
3,004,660 UART: [fht] FMC Alias Private Key: 7
3,005,692 UART: [art] Derive CDI
3,005,972 UART: [art] Store in in slot 0x4
3,091,791 UART: [art] Derive Key Pair
3,092,151 UART: [art] Store priv key in slot 0x5
3,105,241 UART: [art] Derive Key Pair - Done
3,120,097 UART: [art] Signing Cert with AUTHO
3,120,577 UART: RITY.KEYID = 7
3,136,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,806 UART: [art] PUB.X = 23BDA595809E5476794E074C32A54251F4174019AB5384DEF4CB04BE74FF2F2E9C45723BF74156FCC7250875845AE77A
3,143,565 UART: [art] PUB.Y = 3F525F9D2E11CFAD66F3663F8AF69B729F43B0522F9BDEE49FEBE2F99D7E3CF71412FC12FF11CC6B809DB31DA89BB3F4
3,150,539 UART: [art] SIG.R = A64295427A39EFB4C079A020BFC2B70382B8FA1CA528358BDCE407F6F39FFF420FBAFA795068B62AB4D6B0676D245FB4
3,157,314 UART: [art] SIG.S = 3ABA50527DC1136D4C1E9DFA2CAAA42914102628D37A513BB073E55B52B74E869FD015755A89D3B9851FBCAFE41A40B1
3,180,661 UART: Caliptra RT
3,180,914 UART: [state] CFI Enabled
3,288,787 UART: [rt] RT listening for mailbox commands...
3,289,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,375 UART: [rt]cmd =0x46504c54, len=4
3,320,704 >>> mbox cmd response data (8 bytes)
3,320,925 UART: [rt] FIPS self test
3,321,253 UART: [kat] ++
3,321,405 UART: [kat] sha1
3,325,401 UART: [kat] SHA2-256
3,327,423 UART: [kat] SHA2-384
3,330,090 UART: [kat] SHA2-512-ACC
3,331,573 UART: Droping operation
3,332,116 UART: Fatal Error: 0x90050003
3,333,666 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,671 >>> mbox cmd response: failed
3,333,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,554 UART: [state] LifecycleState = Unprovisioned
85,209 UART: [state] DebugLocked = No
85,735 UART: [state] WD Timer not started. Device not locked for debugging
87,046 UART: [kat] SHA2-256
892,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,821 UART: [kat] ++
896,973 UART: [kat] sha1
901,173 UART: [kat] SHA2-256
903,113 UART: [kat] SHA2-384
906,014 UART: [kat] SHA2-512-ACC
907,915 UART: [kat] ECC-384
917,618 UART: [kat] HMAC-384Kdf
922,384 UART: [kat] LMS
1,170,712 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,223 UART: [fht] FHT @ 0x50003400
1,174,960 UART: [idev] ++
1,175,128 UART: [idev] CDI.KEYID = 6
1,175,488 UART: [idev] SUBJECT.KEYID = 7
1,175,912 UART: [idev] UDS.KEYID = 0
1,176,257 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,551 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,878 UART: [fwproc] Wait for Commands...
1,283,670 UART: [fwproc] Recv command 0x46574c44
1,284,398 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,033 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,350 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,671 ready_for_fw is high
1,060,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,301 >>> mbox cmd response: success
2,702,743 UART:
2,702,759 UART: Running Caliptra FMC ...
2,703,167 UART:
2,703,221 UART: [state] CFI Enabled
2,713,760 UART: [fht] FMC Alias Private Key: 7
2,821,765 UART: [art] Extend RT PCRs Done
2,822,193 UART: [art] Lock RT PCRs Done
2,824,017 UART: [art] Populate DV Done
2,832,296 UART: [fht] FMC Alias Private Key: 7
2,833,306 UART: [art] Derive CDI
2,833,586 UART: [art] Store in in slot 0x4
2,918,779 UART: [art] Derive Key Pair
2,919,139 UART: [art] Store priv key in slot 0x5
2,932,309 UART: [art] Derive Key Pair - Done
2,946,947 UART: [art] Signing Cert with AUTHO
2,947,427 UART: RITY.KEYID = 7
2,962,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,494 UART: [art] PUB.X = 05BB6F3ADB3CC6E964125801CFBB4FFAC597F0875B090260F164C07CA72A5E07322CE37A236181828D50D19B96BBFE11
2,970,257 UART: [art] PUB.Y = 7548EF84C24756DEF0EEF21336E6AF3F2E5303DACE2E57144C7AE09DD2AD32A6292932352DAE461C108F19C6CC86E3E0
2,977,216 UART: [art] SIG.R = FE86E0A38F3CC528107B7648C87B4E079EA5DFEFF51EF979D08B58D04666E46981541D9DE48605E96AC8C3AFFB89220B
2,983,987 UART: [art] SIG.S = A52AB098878D13B19618909D5D1375E49EADD6DF6AD7E385CBFE2A7BF392B24F98DCDA2C5C71097DD50E538A9183DBE2
3,007,358 UART: Caliptra RT
3,007,611 UART: [state] CFI Enabled
3,114,905 UART: [rt] RT listening for mailbox commands...
3,115,568 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,141 UART: [rt]cmd =0x46504c54, len=4
3,146,502 >>> mbox cmd response data (8 bytes)
3,146,777 UART: [rt] FIPS self test
3,147,105 UART: [kat] ++
3,147,257 UART: [kat] sha1
3,151,537 UART: [kat] SHA2-256
3,153,559 UART: [kat] SHA2-384
3,156,612 UART: [kat] SHA2-512-ACC
3,158,095 UART: Droping operation
3,158,666 UART: Fatal Error: 0x90050003
3,160,216 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,221 >>> mbox cmd response: failed
3,160,221 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,069 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,554 UART: [kat] SHA2-256
904,494 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
919,013 UART: [kat] HMAC-384Kdf
923,593 UART: [kat] LMS
1,171,921 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,122 UART: [fht] FHT @ 0x50003400
1,175,827 UART: [idev] ++
1,175,995 UART: [idev] CDI.KEYID = 6
1,176,355 UART: [idev] SUBJECT.KEYID = 7
1,176,779 UART: [idev] UDS.KEYID = 0
1,177,124 ready_for_fw is high
1,177,124 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,528 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,944 UART: [ldev] Erasing FE.KEYID = 1
1,244,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,350 UART: [ldev] --
1,283,693 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46574c44
1,285,013 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,198 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,557 >>> mbox cmd response: success
2,788,723 UART: [afmc] ++
2,788,891 UART: [afmc] CDI.KEYID = 6
2,789,253 UART: [afmc] SUBJECT.KEYID = 7
2,789,678 UART: [afmc] AUTHORITY.KEYID = 5
2,825,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,594 UART: [afmc] --
2,868,684 UART: [cold-reset] --
2,869,670 UART: [state] Locking Datavault
2,870,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,499 UART: [state] Locking ICCM
2,872,041 UART: [exit] Launching FMC @ 0x40000130
2,877,370 UART:
2,877,386 UART: Running Caliptra FMC ...
2,877,794 UART:
2,877,937 UART: [state] CFI Enabled
2,888,884 UART: [fht] FMC Alias Private Key: 7
2,996,879 UART: [art] Extend RT PCRs Done
2,997,307 UART: [art] Lock RT PCRs Done
2,999,117 UART: [art] Populate DV Done
3,007,594 UART: [fht] FMC Alias Private Key: 7
3,008,626 UART: [art] Derive CDI
3,008,906 UART: [art] Store in in slot 0x4
3,094,923 UART: [art] Derive Key Pair
3,095,283 UART: [art] Store priv key in slot 0x5
3,108,083 UART: [art] Derive Key Pair - Done
3,122,883 UART: [art] Signing Cert with AUTHO
3,123,363 UART: RITY.KEYID = 7
3,138,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,080 UART: [art] PUB.X = 7FFEE80E43601E155D9DC6B31F381472F4374F67A46FF33E39EF7B96CF520786C0C3885F281DDC8D2255597023E74571
3,145,842 UART: [art] PUB.Y = BE09291862DB8C2E623038908898C7610279014426F42855931013F474226D36EE44A9DBCCB31D87DBC7CE9674BBA61F
3,152,777 UART: [art] SIG.R = 696D66BE1F0791F17E7193CBC6FB4BE5D33929FB1096A8CEC05081B02076E57971B94B0E08A3B1903E8276BF897F71A7
3,159,540 UART: [art] SIG.S = 4DCC18143415F64CD4434A24A37B69990581FFF1EB441CD41D7B8DFB633315F7725A6BCBC077BAB301CB576FB22F7963
3,183,829 UART: Caliptra RT
3,184,174 UART: [state] CFI Enabled
3,292,681 UART: [rt] RT listening for mailbox commands...
3,293,344 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,929 UART: [rt]cmd =0x46504c54, len=4
3,324,102 >>> mbox cmd response data (8 bytes)
3,324,261 UART: [rt] FIPS self test
3,324,589 UART: [kat] ++
3,324,741 UART: [kat] sha1
3,329,015 UART: [kat] SHA2-256
3,331,037 UART: [kat] SHA2-384
3,333,898 UART: [kat] SHA2-512-ACC
3,335,381 UART: Droping operation
3,335,970 UART: Fatal Error: 0x90050003
3,337,520 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,525 >>> mbox cmd response: failed
3,337,525 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,186 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
894,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,162 UART: [kat] ++
898,314 UART: [kat] sha1
902,570 UART: [kat] SHA2-256
904,510 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
919,167 UART: [kat] HMAC-384Kdf
923,625 UART: [kat] LMS
1,171,953 UART: [kat] --
1,172,988 UART: [cold-reset] ++
1,173,562 UART: [fht] FHT @ 0x50003400
1,176,199 UART: [idev] ++
1,176,367 UART: [idev] CDI.KEYID = 6
1,176,727 UART: [idev] SUBJECT.KEYID = 7
1,177,151 UART: [idev] UDS.KEYID = 0
1,177,496 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,379 UART: [idev] Erasing UDS.KEYID = 0
1,202,656 UART: [idev] Sha1 KeyId Algorithm
1,211,334 UART: [idev] --
1,212,462 UART: [ldev] ++
1,212,630 UART: [ldev] CDI.KEYID = 6
1,212,993 UART: [ldev] SUBJECT.KEYID = 5
1,213,419 UART: [ldev] AUTHORITY.KEYID = 7
1,213,882 UART: [ldev] FE.KEYID = 1
1,219,216 UART: [ldev] Erasing FE.KEYID = 1
1,245,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,580 UART: [ldev] --
1,284,921 UART: [fwproc] Wait for Commands...
1,285,611 UART: [fwproc] Recv command 0x46574c44
1,286,339 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,320 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,501 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,358 ready_for_fw is high
1,060,358 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,086 >>> mbox cmd response: success
2,701,992 UART:
2,702,008 UART: Running Caliptra FMC ...
2,702,416 UART:
2,702,559 UART: [state] CFI Enabled
2,713,234 UART: [fht] FMC Alias Private Key: 7
2,821,123 UART: [art] Extend RT PCRs Done
2,821,551 UART: [art] Lock RT PCRs Done
2,822,983 UART: [art] Populate DV Done
2,831,398 UART: [fht] FMC Alias Private Key: 7
2,832,334 UART: [art] Derive CDI
2,832,614 UART: [art] Store in in slot 0x4
2,918,185 UART: [art] Derive Key Pair
2,918,545 UART: [art] Store priv key in slot 0x5
2,931,747 UART: [art] Derive Key Pair - Done
2,946,570 UART: [art] Signing Cert with AUTHO
2,947,050 UART: RITY.KEYID = 7
2,962,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,909 UART: [art] PUB.X = 8422F358DF9670D633F0606E1E6E555E0C620E9D9FA3A903D9BAF9E892C03BED29AD057A2AF3F6B68622F1C602817794
2,969,668 UART: [art] PUB.Y = 5ADDC691873ADC62E21D5D44BB3CD7C08B56E8692AFD00A399F3247ACE1D1A885A12397E5D7E3BA0954FA19F206B08A5
2,976,607 UART: [art] SIG.R = 960BDFE89E07E440E36C5FAE259AE9A965FC7802C130E56554852CF7E4433F6DDDB0404B7D56B3C658A6E2D77A097B27
2,983,373 UART: [art] SIG.S = 1DFB82484650FF44F9AEF0CD47CBAD1ECB1CDD12764379D80B4A21411AEAC4C6A537E8F28BEDA8F60551D3CD2D0C4AFE
3,006,841 UART: Caliptra RT
3,007,186 UART: [state] CFI Enabled
3,115,455 UART: [rt] RT listening for mailbox commands...
3,116,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,873 UART: [rt]cmd =0x46504c54, len=4
3,147,202 >>> mbox cmd response data (8 bytes)
3,147,315 UART: [rt] FIPS self test
3,147,643 UART: [kat] ++
3,147,795 UART: [kat] sha1
3,152,025 UART: [kat] SHA2-256
3,154,047 UART: [kat] SHA2-384
3,156,724 UART: [kat] SHA2-512-ACC
3,158,207 UART: Droping operation
3,158,712 UART: Fatal Error: 0x90050003
3,160,262 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,267 >>> mbox cmd response: failed
3,160,267 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,338 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,378 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,184 UART: [kat] SHA2-256
891,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,863 UART: [kat] ++
896,015 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,982 UART: [kat] SHA2-512-ACC
906,883 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,358 UART: [kat] LMS
1,169,670 UART: [kat] --
1,170,651 UART: [cold-reset] ++
1,171,119 UART: [fht] FHT @ 0x50003400
1,173,599 UART: [idev] ++
1,173,767 UART: [idev] CDI.KEYID = 6
1,174,128 UART: [idev] SUBJECT.KEYID = 7
1,174,553 UART: [idev] UDS.KEYID = 0
1,174,899 ready_for_fw is high
1,174,899 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,729 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,212 UART: [ldev] SUBJECT.KEYID = 5
1,210,639 UART: [ldev] AUTHORITY.KEYID = 7
1,211,102 UART: [ldev] FE.KEYID = 1
1,216,234 UART: [ldev] Erasing FE.KEYID = 1
1,242,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,426 UART: [ldev] --
1,281,900 UART: [fwproc] Wait for Commands...
1,282,521 UART: [fwproc] Recv command 0x46574c44
1,283,254 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,220 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,578 >>> mbox cmd response: success
2,788,773 UART: [afmc] ++
2,788,941 UART: [afmc] CDI.KEYID = 6
2,789,304 UART: [afmc] SUBJECT.KEYID = 7
2,789,730 UART: [afmc] AUTHORITY.KEYID = 5
2,825,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,030 UART: [afmc] --
2,869,138 UART: [cold-reset] --
2,869,990 UART: [state] Locking Datavault
2,871,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,827 UART: [state] Locking ICCM
2,872,469 UART: [exit] Launching FMC @ 0x40000130
2,877,798 UART:
2,877,814 UART: Running Caliptra FMC ...
2,878,222 UART:
2,878,276 UART: [state] CFI Enabled
2,888,455 UART: [fht] FMC Alias Private Key: 7
2,996,666 UART: [art] Extend RT PCRs Done
2,997,094 UART: [art] Lock RT PCRs Done
2,998,334 UART: [art] Populate DV Done
3,006,529 UART: [fht] FMC Alias Private Key: 7
3,007,651 UART: [art] Derive CDI
3,007,931 UART: [art] Store in in slot 0x4
3,093,474 UART: [art] Derive Key Pair
3,093,834 UART: [art] Store priv key in slot 0x5
3,106,286 UART: [art] Derive Key Pair - Done
3,120,845 UART: [art] Signing Cert with AUTHO
3,121,325 UART: RITY.KEYID = 7
3,136,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,274 UART: [art] PUB.X = CC5C0A3371C2025917A238BE2B5A666145543EB24B847A0CFC33390570D0370CBEEB5AFA34AA566F0605472F9EF73CB3
3,144,029 UART: [art] PUB.Y = A904C2BB653AD8BA18F4500FD90A9559990895DEFE5E7757F27F38A1A27F5586465050B59BFAE39650A229BAA22EA53D
3,150,973 UART: [art] SIG.R = 455F60CB2BD747173C1D711360B44E243A34651EB6948EDA79C7FD5722C3CC7B09F5D45A28DB05625114DBAF23B5F12A
3,157,743 UART: [art] SIG.S = CDA423983327814CCBB6A6D1AAE7322B39866A5210FA0886E0422DDB91664FF69F59D7B44E92CB91A78258375FBFB3D5
3,181,991 UART: Caliptra RT
3,182,244 UART: [state] CFI Enabled
3,289,721 UART: [rt] RT listening for mailbox commands...
3,290,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,103 UART: [rt]cmd =0x46504c54, len=4
3,321,154 >>> mbox cmd response data (8 bytes)
3,321,513 UART: [rt] FIPS self test
3,321,841 UART: [kat] ++
3,321,993 UART: [kat] sha1
3,326,261 UART: [kat] SHA2-256
3,328,283 UART: [kat] SHA2-384
3,331,174 UART: [kat] SHA2-512-ACC
3,332,657 UART: Droping operation
3,333,198 UART: Fatal Error: 0x90050003
3,334,748 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,753 >>> mbox cmd response: failed
3,334,753 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,828 UART: [state] LifecycleState = Unprovisioned
86,483 UART: [state] DebugLocked = No
86,983 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,819 UART: [kat] ++
895,971 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,174,787 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,903 UART: [idev] Sha1 KeyId Algorithm
1,208,827 UART: [idev] --
1,209,722 UART: [ldev] ++
1,209,890 UART: [ldev] CDI.KEYID = 6
1,210,254 UART: [ldev] SUBJECT.KEYID = 5
1,210,681 UART: [ldev] AUTHORITY.KEYID = 7
1,211,144 UART: [ldev] FE.KEYID = 1
1,216,178 UART: [ldev] Erasing FE.KEYID = 1
1,242,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,390 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,642 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,934 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,964 >>> mbox cmd response: success
2,698,484 UART:
2,698,500 UART: Running Caliptra FMC ...
2,698,908 UART:
2,698,962 UART: [state] CFI Enabled
2,709,209 UART: [fht] FMC Alias Private Key: 7
2,817,366 UART: [art] Extend RT PCRs Done
2,817,794 UART: [art] Lock RT PCRs Done
2,819,378 UART: [art] Populate DV Done
2,827,529 UART: [fht] FMC Alias Private Key: 7
2,828,673 UART: [art] Derive CDI
2,828,953 UART: [art] Store in in slot 0x4
2,914,734 UART: [art] Derive Key Pair
2,915,094 UART: [art] Store priv key in slot 0x5
2,927,680 UART: [art] Derive Key Pair - Done
2,942,512 UART: [art] Signing Cert with AUTHO
2,942,992 UART: RITY.KEYID = 7
2,958,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,077 UART: [art] PUB.X = 40DA60AEE347A38A3890F1143ED0212E70CD196AB5D33042C016852D6D457D670AC25A52618356017DA73B4C2C054EC6
2,965,836 UART: [art] PUB.Y = B1B90BC235F79739BF2D5044289FDB2F27CF213D9235E8DF45131C2BC208FEF307773E6353A133339E44B228B0554B9E
2,972,777 UART: [art] SIG.R = AE2AB1DD3C6576130379789809BAD424F20AAD95D98A2B0A94365DD72D44B5B6A594977747B167315808249EAF4AF4FF
2,979,534 UART: [art] SIG.S = 31A50B05E58D1D4AA8FB9E7656C3692D887C9E0748CBCD270E174CAE9CB84F2939741EFAE8910BB4715CDD8C6EF48D2B
3,003,716 UART: Caliptra RT
3,003,969 UART: [state] CFI Enabled
3,112,044 UART: [rt] RT listening for mailbox commands...
3,112,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,566 UART: [rt]cmd =0x46504c54, len=4
3,143,737 >>> mbox cmd response data (8 bytes)
3,143,988 UART: [rt] FIPS self test
3,144,316 UART: [kat] ++
3,144,468 UART: [kat] sha1
3,148,766 UART: [kat] SHA2-256
3,150,788 UART: [kat] SHA2-384
3,153,497 UART: [kat] SHA2-512-ACC
3,154,980 UART: Droping operation
3,155,397 UART: Fatal Error: 0x90050003
3,156,947 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,952 >>> mbox cmd response: failed
3,156,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,138 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,632,610 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,525 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,174,668 ready_for_fw is high
1,174,668 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,336 UART: [idev] Erasing UDS.KEYID = 0
1,198,768 UART: [idev] Sha1 KeyId Algorithm
1,207,552 UART: [idev] --
1,208,457 UART: [ldev] ++
1,208,625 UART: [ldev] CDI.KEYID = 6
1,208,989 UART: [ldev] SUBJECT.KEYID = 5
1,209,416 UART: [ldev] AUTHORITY.KEYID = 7
1,209,879 UART: [ldev] FE.KEYID = 1
1,215,047 UART: [ldev] Erasing FE.KEYID = 1
1,241,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,997 UART: [ldev] --
1,280,365 UART: [fwproc] Wait for Commands...
1,281,046 UART: [fwproc] Recv command 0x46574c44
1,281,779 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,825 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,119 >>> mbox cmd response: success
2,786,266 UART: [afmc] ++
2,786,434 UART: [afmc] CDI.KEYID = 6
2,786,797 UART: [afmc] SUBJECT.KEYID = 7
2,787,223 UART: [afmc] AUTHORITY.KEYID = 5
2,822,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,183 UART: [afmc] --
2,866,063 UART: [cold-reset] --
2,867,199 UART: [state] Locking Datavault
2,868,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,108 UART: [state] Locking ICCM
2,869,752 UART: [exit] Launching FMC @ 0x40000130
2,875,081 UART:
2,875,097 UART: Running Caliptra FMC ...
2,875,505 UART:
2,875,648 UART: [state] CFI Enabled
2,885,793 UART: [fht] FMC Alias Private Key: 7
2,993,564 UART: [art] Extend RT PCRs Done
2,993,992 UART: [art] Lock RT PCRs Done
2,995,744 UART: [art] Populate DV Done
3,003,625 UART: [fht] FMC Alias Private Key: 7
3,004,557 UART: [art] Derive CDI
3,004,837 UART: [art] Store in in slot 0x4
3,090,080 UART: [art] Derive Key Pair
3,090,440 UART: [art] Store priv key in slot 0x5
3,104,012 UART: [art] Derive Key Pair - Done
3,118,968 UART: [art] Signing Cert with AUTHO
3,119,448 UART: RITY.KEYID = 7
3,134,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,247 UART: [art] PUB.X = 9D7BC2B09832F6F06F2B318A2DEC2EFD3BBE9415C84B6BDE162AB8B937BD8A5C5984BB8EB225C128CEE1F852C1E9F8F5
3,142,041 UART: [art] PUB.Y = 1C0C5E1B728B3AF93DD6494BB55C40887FB5C66BEDBF8B693F1F2CE1E40E083795561D87B4C2101717CE2D699B3CAE9B
3,148,996 UART: [art] SIG.R = 501049BB629D1A3CA97CEC875D0CFDDD1BC206D08B111AE79D632CEDB9B7DB3CE91E63C0BD8EFB1EBBD08375E7D5E9A7
3,155,790 UART: [art] SIG.S = 8DEADA690F38C2E1071020AEB9FF141008795855118CE568666261E0BA06525B5E77CBC01111C0DD69527BD9303616EB
3,179,657 UART: Caliptra RT
3,180,002 UART: [state] CFI Enabled
3,288,273 UART: [rt] RT listening for mailbox commands...
3,288,936 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,015 UART: [rt]cmd =0x46504c54, len=4
3,320,268 >>> mbox cmd response data (8 bytes)
3,320,563 UART: [rt] FIPS self test
3,320,891 UART: [kat] ++
3,321,043 UART: [kat] sha1
3,325,099 UART: [kat] SHA2-256
3,327,121 UART: [kat] SHA2-384
3,330,142 UART: [kat] SHA2-512-ACC
3,331,625 UART: Droping operation
3,332,102 UART: Fatal Error: 0x90050003
3,333,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,657 >>> mbox cmd response: failed
3,333,657 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
891,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,691 UART: [kat] HMAC-384Kdf
920,273 UART: [kat] LMS
1,168,585 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,416 UART: [idev] Erasing UDS.KEYID = 0
1,198,296 UART: [idev] Sha1 KeyId Algorithm
1,207,268 UART: [idev] --
1,208,465 UART: [ldev] ++
1,208,633 UART: [ldev] CDI.KEYID = 6
1,208,997 UART: [ldev] SUBJECT.KEYID = 5
1,209,424 UART: [ldev] AUTHORITY.KEYID = 7
1,209,887 UART: [ldev] FE.KEYID = 1
1,215,127 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,334 UART: [fwproc] Recv command 0x46574c44
1,283,067 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,339 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,731 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 ready_for_fw is high
1,056,081 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,445 >>> mbox cmd response: success
2,699,673 UART:
2,699,689 UART: Running Caliptra FMC ...
2,700,097 UART:
2,700,240 UART: [state] CFI Enabled
2,710,543 UART: [fht] FMC Alias Private Key: 7
2,818,642 UART: [art] Extend RT PCRs Done
2,819,070 UART: [art] Lock RT PCRs Done
2,820,442 UART: [art] Populate DV Done
2,828,805 UART: [fht] FMC Alias Private Key: 7
2,829,909 UART: [art] Derive CDI
2,830,189 UART: [art] Store in in slot 0x4
2,916,192 UART: [art] Derive Key Pair
2,916,552 UART: [art] Store priv key in slot 0x5
2,930,256 UART: [art] Derive Key Pair - Done
2,944,917 UART: [art] Signing Cert with AUTHO
2,945,397 UART: RITY.KEYID = 7
2,960,837 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,602 UART: [art] PUB.X = 4F24FA5F84B6412E10A297C185052797504017550920FED5C6EC6098E04CDDBA29F576510A7AE1848920AC5C16C7CF91
2,968,361 UART: [art] PUB.Y = 1C2ED023DBACD3FE4DE8B8E60E9EE23AE54B9575684FC332782355568042A4A150E185A69D0C51864744C0E1FC70116B
2,975,309 UART: [art] SIG.R = B7633C4E35A2C0F1D3452B686E0E495DFFE684C185FA8C1D36B210C57FAD2BEAEE3FA49615E29B951B74E17935E4A87A
2,982,090 UART: [art] SIG.S = 075DC0659CD77A8B74AFF0A6F665A5DBC33410B0E5370300498A7295B1BE4F896DCEF258F6E9365D8CF7BAEDC3C095AD
3,005,415 UART: Caliptra RT
3,005,760 UART: [state] CFI Enabled
3,113,687 UART: [rt] RT listening for mailbox commands...
3,114,350 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,315 UART: [rt]cmd =0x46504c54, len=4
3,145,530 >>> mbox cmd response data (8 bytes)
3,145,857 UART: [rt] FIPS self test
3,146,185 UART: [kat] ++
3,146,337 UART: [kat] sha1
3,150,441 UART: [kat] SHA2-256
3,152,463 UART: [kat] SHA2-384
3,155,346 UART: [kat] SHA2-512-ACC
3,156,829 UART: Droping operation
3,157,300 UART: Fatal Error: 0x90050003
3,158,850 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,855 >>> mbox cmd response: failed
3,158,855 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,437 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,083 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,686,325 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,830,524 >>> mbox cmd response: failed
2,831,084 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,974,412 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,861,667 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,448,211 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,698,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,843,162 >>> mbox cmd response: failed
2,843,734 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,986,916 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,865,188 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,451,886 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,038,508 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,182,777 >>> mbox cmd response: failed
3,183,361 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,326,687 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
21,580,465 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,021,256 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
3,039,718 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,184,489 >>> mbox cmd response: failed
3,185,082 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,328,266 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,581,089 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,032,590 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,692,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,837,401 >>> mbox cmd response: failed
2,837,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,981,754 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,452,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,333,556 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,707,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,852,145 >>> mbox cmd response: failed
2,852,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,996,474 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,471,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,310,696 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,048,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,193,709 >>> mbox cmd response: failed
3,194,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,016 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
20,174,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,897,168 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,045,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,190,447 >>> mbox cmd response: failed
3,191,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,334,823 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,186,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,921,532 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,701,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,745 >>> mbox cmd response: failed
2,846,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,037 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,439,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,289,189 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,702,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,023 >>> mbox cmd response: failed
2,847,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,827 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
3,476,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,303,205 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,043,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,188,092 >>> mbox cmd response: failed
3,188,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,332,378 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,183,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,906,673 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,052,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,197,780 >>> mbox cmd response: failed
3,198,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,341,925 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,175,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,893,415 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,352 >>> mbox cmd response: failed
812,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,006 >>> mbox cmd response: failed
812,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,996 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,641 >>> mbox cmd response: failed
812,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,463 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,187 >>> mbox cmd response: failed
812,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,866 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,147 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,854 >>> mbox cmd response: failed
811,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,852 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,934 >>> mbox cmd response: failed
811,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,184 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,687 >>> mbox cmd response: failed
811,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,065 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,165 >>> mbox cmd response: failed
812,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,839 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,870 >>> mbox cmd response: failed
811,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,792 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,890 >>> mbox cmd response: failed
811,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,690 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,063 >>> mbox cmd response: failed
812,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,965 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,987 >>> mbox cmd response: failed
811,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,795 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,155 UART:
192,508 UART: Running Caliptra ROM ...
193,693 UART:
193,845 UART: [state] CFI Enabled
264,684 UART: [state] LifecycleState = Unprovisioned
266,616 UART: [state] DebugLocked = No
269,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,737 UART: [kat] SHA2-256
444,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,939 UART: [kat] ++
455,428 UART: [kat] sha1
466,814 UART: [kat] SHA2-256
469,544 UART: [kat] SHA2-384
475,616 UART: [kat] SHA2-512-ACC
477,991 UART: [kat] ECC-384
2,767,635 UART: [kat] HMAC-384Kdf
2,780,383 UART: [kat] LMS
3,970,700 UART: [kat] --
3,975,149 UART: [cold-reset] ++
3,976,594 UART: [fht] Storing FHT @ 0x50003400
3,988,313 UART: [idev] ++
3,988,879 UART: [idev] CDI.KEYID = 6
3,989,917 UART: [idev] SUBJECT.KEYID = 7
3,991,097 UART: [idev] UDS.KEYID = 0
3,992,115 ready_for_fw is high
3,992,325 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,137,079 UART: [idev] Erasing UDS.KEYID = 0
7,320,915 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,812 UART: [idev] --
7,347,120 UART: [ldev] ++
7,347,706 UART: [ldev] CDI.KEYID = 6
7,348,733 UART: [ldev] SUBJECT.KEYID = 5
7,349,897 UART: [ldev] AUTHORITY.KEYID = 7
7,351,134 UART: [ldev] FE.KEYID = 1
7,398,134 UART: [ldev] Erasing FE.KEYID = 1
10,734,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,739 UART: [ldev] --
13,112,309 UART: [fwproc] Waiting for Commands...
13,114,622 UART: [fwproc] Received command 0x46574c44
13,116,813 UART: [fwproc] Received Image of size 114996 bytes
17,179,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,646,810 >>> mbox cmd response: success
17,650,222 UART: [afmc] ++
17,650,852 UART: [afmc] CDI.KEYID = 6
17,651,774 UART: [afmc] SUBJECT.KEYID = 7
17,652,991 UART: [afmc] AUTHORITY.KEYID = 5
21,027,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,528 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,954 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,771 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,201 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,535 UART: [afmc] --
23,399,158 UART: [cold-reset] --
23,405,398 UART: [state] Locking Datavault
23,410,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,343 UART: [state] Locking ICCM
23,414,878 UART: [exit] Launching FMC @ 0x40000130
23,423,221 UART:
23,423,459 UART: Running Caliptra FMC ...
23,424,565 UART:
23,424,731 UART: [state] CFI Enabled
23,486,519 UART: [fht] FMC Alias Private Key: 7
25,824,528 UART: [art] Extend RT PCRs Done
25,825,761 UART: [art] Lock RT PCRs Done
25,827,358 UART: [art] Populate DV Done
25,832,769 UART: [fht] FMC Alias Private Key: 7
25,834,469 UART: [art] Derive CDI
25,835,283 UART: [art] Store in in slot 0x4
25,881,185 UART: [art] Derive Key Pair
25,882,241 UART: [art] Store priv key in slot 0x5
29,175,197 UART: [art] Derive Key Pair - Done
29,188,324 UART: [art] Signing Cert with AUTHO
29,189,628 UART: RITY.KEYID = 7
31,477,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,620 UART: [art] PUB.X = 7E899497127428CC9254D60F86860715F93839B1F86FD125060BB82B3022CD6E974C3C5E1FA4D64E2A87A57C763A5B0A
31,485,874 UART: [art] PUB.Y = 5B26265E97142EAA805E6BF439FD8BDE6FF98E89519576E80CD866553E4673DF2183A926AAC71D1BC92DD7412FDD6043
31,493,093 UART: [art] SIG.R = 4436A31FE823BCAD06E62D0C0497CB47D92A3197D16BCF84CDB6F721E70A96F5D186231634B760C4D90B655852976274
31,500,518 UART: [art] SIG.S = DFE8B799FA12318551938A6D47ED255AE5C7E1E455C04C225BE40F2B3E27334F39D5C9DD424B8723FFBDB3AC682A255A
32,805,097 UART: Caliptra RT
32,805,817 UART: [state] CFI Enabled
32,966,759 UART: [rt] RT listening for mailbox commands...
32,968,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,998,374 UART: [rt]cmd =0x46504c54, len=4
33,000,006 >>> mbox cmd response data (8 bytes)
33,001,233 UART: [rt] FIPS self test
33,002,183 UART: [kat] ++
33,002,647 UART: [kat] sha1
33,007,107 UART: [kat] SHA2-256
33,009,054 UART: [kat] SHA2-384
33,012,010 UART: [kat] SHA2-512-ACC
33,012,910 UART: Fatal Error: 0x90050001
33,048,122 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,192,614 >>> mbox cmd response: failed
33,193,312 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,337,740 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,113 UART:
190,406 UART: Running Caliptra ROM ...
191,453 UART:
191,598 UART: [state] CFI Enabled
250,731 UART: [state] LifecycleState = Unprovisioned
252,649 UART: [state] DebugLocked = No
254,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,403 UART: [kat] SHA2-256
429,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,592 UART: [kat] ++
440,063 UART: [kat] sha1
452,187 UART: [kat] SHA2-256
454,884 UART: [kat] SHA2-384
462,108 UART: [kat] SHA2-512-ACC
464,446 UART: [kat] ECC-384
2,752,200 UART: [kat] HMAC-384Kdf
2,763,410 UART: [kat] LMS
3,953,708 UART: [kat] --
3,958,907 UART: [cold-reset] ++
3,960,095 UART: [fht] Storing FHT @ 0x50003400
3,972,341 UART: [idev] ++
3,972,908 UART: [idev] CDI.KEYID = 6
3,973,924 UART: [idev] SUBJECT.KEYID = 7
3,975,081 UART: [idev] UDS.KEYID = 0
3,976,714 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,121,402 UART: [idev] Erasing UDS.KEYID = 0
7,310,960 UART: [idev] Using Sha1 for KeyId Algorithm
7,333,528 UART: [idev] --
7,338,889 UART: [ldev] ++
7,339,461 UART: [ldev] CDI.KEYID = 6
7,340,431 UART: [ldev] SUBJECT.KEYID = 5
7,341,651 UART: [ldev] AUTHORITY.KEYID = 7
7,342,936 UART: [ldev] FE.KEYID = 1
7,386,442 UART: [ldev] Erasing FE.KEYID = 1
10,720,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,061 UART: [ldev] --
13,100,845 UART: [fwproc] Waiting for Commands...
13,104,188 UART: [fwproc] Received command 0x46574c44
13,106,377 UART: [fwproc] Received Image of size 114996 bytes
17,167,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,020 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,632,565 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,806,813 ready_for_fw is high
3,807,421 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,898,004 >>> mbox cmd response: success
23,599,882 UART:
23,600,282 UART: Running Caliptra FMC ...
23,601,398 UART:
23,601,553 UART: [state] CFI Enabled
23,670,585 UART: [fht] FMC Alias Private Key: 7
26,007,462 UART: [art] Extend RT PCRs Done
26,008,686 UART: [art] Lock RT PCRs Done
26,010,522 UART: [art] Populate DV Done
26,016,058 UART: [fht] FMC Alias Private Key: 7
26,017,665 UART: [art] Derive CDI
26,018,428 UART: [art] Store in in slot 0x4
26,078,176 UART: [art] Derive Key Pair
26,079,179 UART: [art] Store priv key in slot 0x5
29,372,247 UART: [art] Derive Key Pair - Done
29,385,365 UART: [art] Signing Cert with AUTHO
29,386,667 UART: RITY.KEYID = 7
31,673,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,674,890 UART: [art] PUB.X = 073D5D58E16F0B34FB3B742E992447F11FB82F76557890DA5D8DFF5798A13034FA2B47922145D9D18CFDF3EC6DFA5F75
31,682,110 UART: [art] PUB.Y = 6A6B4F30AE2CF265A70C363DB7C6820304EE0C90F7E5237D142307B4CB115D95FB16C98B0FB79166525F19A989FEADAD
31,689,376 UART: [art] SIG.R = C1BB7559B19896710CD68BEF3320840B71FE8838072640B5A7CD7E751059A1DECA7CA5920E22CBEF533D9AE4E8BD2E44
31,696,738 UART: [art] SIG.S = 4911D2E7B3828CD7B3B1529ED8F51098748317BCFF8C8FE9237C8216B2E67171AE7709B38196C329681015A4DC36F9DC
33,001,651 UART: Caliptra RT
33,002,369 UART: [state] CFI Enabled
33,163,786 UART: [rt] RT listening for mailbox commands...
33,165,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,195,263 UART: [rt]cmd =0x46504c54, len=4
33,196,801 >>> mbox cmd response data (8 bytes)
33,197,741 UART: [rt] FIPS self test
33,198,691 UART: [kat] ++
33,199,143 UART: [kat] sha1
33,203,546 UART: [kat] SHA2-256
33,205,472 UART: [kat] SHA2-384
33,208,339 UART: [kat] SHA2-512-ACC
33,209,335 UART: Fatal Error: 0x90050001
33,244,481 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,388,900 >>> mbox cmd response: failed
33,389,536 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,533,877 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,792,683 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,870,568 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,286 UART:
192,664 UART: Running Caliptra ROM ...
193,814 UART:
603,390 UART: [state] CFI Enabled
618,939 UART: [state] LifecycleState = Unprovisioned
620,856 UART: [state] DebugLocked = No
622,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,838 UART: [kat] SHA2-256
797,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,108 UART: [kat] ++
808,554 UART: [kat] sha1
818,721 UART: [kat] SHA2-256
821,453 UART: [kat] SHA2-384
827,163 UART: [kat] SHA2-512-ACC
829,534 UART: [kat] ECC-384
3,116,672 UART: [kat] HMAC-384Kdf
3,128,050 UART: [kat] LMS
4,318,153 UART: [kat] --
4,324,155 UART: [cold-reset] ++
4,326,167 UART: [fht] Storing FHT @ 0x50003400
4,337,581 UART: [idev] ++
4,338,150 UART: [idev] CDI.KEYID = 6
4,339,034 UART: [idev] SUBJECT.KEYID = 7
4,340,286 UART: [idev] UDS.KEYID = 0
4,341,316 ready_for_fw is high
4,341,549 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,486,008 UART: [idev] Erasing UDS.KEYID = 0
7,630,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,692 UART: [idev] --
7,657,275 UART: [ldev] ++
7,657,851 UART: [ldev] CDI.KEYID = 6
7,658,816 UART: [ldev] SUBJECT.KEYID = 5
7,660,030 UART: [ldev] AUTHORITY.KEYID = 7
7,661,264 UART: [ldev] FE.KEYID = 1
7,673,184 UART: [ldev] Erasing FE.KEYID = 1
10,963,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,537 UART: [ldev] --
13,323,172 UART: [fwproc] Waiting for Commands...
13,324,842 UART: [fwproc] Received command 0x46574c44
13,327,083 UART: [fwproc] Received Image of size 114996 bytes
17,393,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,849,030 >>> mbox cmd response: success
17,852,443 UART: [afmc] ++
17,853,037 UART: [afmc] CDI.KEYID = 6
17,853,950 UART: [afmc] SUBJECT.KEYID = 7
17,855,219 UART: [afmc] AUTHORITY.KEYID = 5
21,170,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,902 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,169 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,555 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,369 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,859 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,473 UART: [afmc] --
23,538,609 UART: [cold-reset] --
23,542,743 UART: [state] Locking Datavault
23,546,584 UART: [state] Locking PCR0, PCR1 and PCR31
23,548,342 UART: [state] Locking ICCM
23,550,434 UART: [exit] Launching FMC @ 0x40000130
23,558,826 UART:
23,559,059 UART: Running Caliptra FMC ...
23,560,162 UART:
23,560,325 UART: [state] CFI Enabled
23,568,105 UART: [fht] FMC Alias Private Key: 7
25,898,465 UART: [art] Extend RT PCRs Done
25,899,684 UART: [art] Lock RT PCRs Done
25,901,422 UART: [art] Populate DV Done
25,906,947 UART: [fht] FMC Alias Private Key: 7
25,908,504 UART: [art] Derive CDI
25,909,322 UART: [art] Store in in slot 0x4
25,951,911 UART: [art] Derive Key Pair
25,952,913 UART: [art] Store priv key in slot 0x5
29,195,145 UART: [art] Derive Key Pair - Done
29,208,260 UART: [art] Signing Cert with AUTHO
29,209,568 UART: RITY.KEYID = 7
31,489,052 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,571 UART: [art] PUB.X = BEAB74816596270BC5F3E526A9293ADCA1D26FBC8BDC28A4E97FF2E39421D50A4408EA842378654E5CD787C356A8DF23
31,497,785 UART: [art] PUB.Y = 4DE22E056F505846755EF98FB69B5CD9076C6BDACEAD30FEF05A0493875C575003E74FAFB5B3B2E6DE63EEBDBFBC7010
31,505,032 UART: [art] SIG.R = C95F7D59016D5D2CDB1688AD4DF1DB56CEA3BEA39F2B497C989C7DAB1E74AD4C42E04046808688407FDE0BCCD2ED0C94
31,512,437 UART: [art] SIG.S = 75F3E5ACBABE17AAA270483E609A20E799CC3F39F336DE8CEC74528F21BFCCF2407059DA47ECA8F5300B5FE9FA36907D
32,817,512 UART: Caliptra RT
32,818,212 UART: [state] CFI Enabled
32,935,720 UART: [rt] RT listening for mailbox commands...
32,937,570 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,431 UART: [rt]cmd =0x46504c54, len=4
32,969,010 >>> mbox cmd response data (8 bytes)
32,970,560 UART: [rt] FIPS self test
32,971,499 UART: [kat] ++
32,971,947 UART: [kat] sha1
32,976,454 UART: [kat] SHA2-256
32,978,380 UART: [kat] SHA2-384
32,981,293 UART: [kat] SHA2-512-ACC
32,982,230 UART: Fatal Error: 0x90050001
33,017,512 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,161,831 >>> mbox cmd response: failed
33,162,466 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,306,868 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,018 UART:
190,353 UART: Running Caliptra ROM ...
191,385 UART:
7,223,964 UART: [state] CFI Enabled
7,238,076 UART: [state] LifecycleState = Unprovisioned
7,239,997 UART: [state] DebugLocked = No
7,241,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,247,151 UART: [kat] SHA2-256
7,416,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,427,433 UART: [kat] ++
7,427,893 UART: [kat] sha1
7,438,753 UART: [kat] SHA2-256
7,441,459 UART: [kat] SHA2-384
7,447,664 UART: [kat] SHA2-512-ACC
7,450,013 UART: [kat] ECC-384
9,733,600 UART: [kat] HMAC-384Kdf
9,746,156 UART: [kat] LMS
10,936,244 UART: [kat] --
10,940,464 UART: [cold-reset] ++
10,942,559 UART: [fht] Storing FHT @ 0x50003400
10,954,524 UART: [idev] ++
10,955,085 UART: [idev] CDI.KEYID = 6
10,956,028 UART: [idev] SUBJECT.KEYID = 7
10,957,238 UART: [idev] UDS.KEYID = 0
10,958,792 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,103,235 UART: [idev] Erasing UDS.KEYID = 0
14,240,577 UART: [idev] Using Sha1 for KeyId Algorithm
14,263,195 UART: [idev] --
14,267,325 UART: [ldev] ++
14,267,903 UART: [ldev] CDI.KEYID = 6
14,268,867 UART: [ldev] SUBJECT.KEYID = 5
14,270,077 UART: [ldev] AUTHORITY.KEYID = 7
14,271,318 UART: [ldev] FE.KEYID = 1
14,282,199 UART: [ldev] Erasing FE.KEYID = 1
17,570,704 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,861,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,876,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,891,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,905,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,925,098 UART: [ldev] --
19,929,769 UART: [fwproc] Waiting for Commands...
19,932,780 UART: [fwproc] Received command 0x46574c44
19,934,971 UART: [fwproc] Received Image of size 114996 bytes
24,000,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,070,095 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,138,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,459,079 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
4,130,746 ready_for_fw is high
4,131,138 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,087,050 >>> mbox cmd response: success
23,719,650 UART:
23,720,052 UART: Running Caliptra FMC ...
23,721,202 UART:
23,721,395 UART: [state] CFI Enabled
23,729,340 UART: [fht] FMC Alias Private Key: 7
26,060,402 UART: [art] Extend RT PCRs Done
26,061,643 UART: [art] Lock RT PCRs Done
26,062,923 UART: [art] Populate DV Done
26,068,550 UART: [fht] FMC Alias Private Key: 7
26,070,095 UART: [art] Derive CDI
26,070,917 UART: [art] Store in in slot 0x4
26,113,494 UART: [art] Derive Key Pair
26,114,519 UART: [art] Store priv key in slot 0x5
29,356,442 UART: [art] Derive Key Pair - Done
29,369,559 UART: [art] Signing Cert with AUTHO
29,370,865 UART: RITY.KEYID = 7
31,650,331 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,843 UART: [art] PUB.X = 611DBFE41598A449E66991478AF8BB2304EBF5B35C1CFF9CB084B2CC412F8578A48B7FE73651816A86DD27C633421BF3
31,659,046 UART: [art] PUB.Y = 8ED8CA6F846B8EB0E5BE9E85F554B75632441803C328825D4B0FA59A66358D184417C9339B401968436A69F8EF054AF0
31,666,302 UART: [art] SIG.R = E946C90C4639E59B920B11640EF8918E8C857895C3056E4BB27E012D7BBA5FE3A414D2BAFF6F004FA93706B2A44E3337
31,673,651 UART: [art] SIG.S = 02684C83ECD8570307B9AB810873CC1847EA1C3358F4B644E7BC274DD3207D189B26DD523DE8F788C7AFFBE4929668D0
32,978,721 UART: Caliptra RT
32,979,457 UART: [state] CFI Enabled
33,096,965 UART: [rt] RT listening for mailbox commands...
33,098,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,128,359 UART: [rt]cmd =0x46504c54, len=4
33,130,192 >>> mbox cmd response data (8 bytes)
33,131,052 UART: [rt] FIPS self test
33,131,996 UART: [kat] ++
33,132,489 UART: [kat] sha1
33,137,106 UART: [kat] SHA2-256
33,139,039 UART: [kat] SHA2-384
33,141,945 UART: [kat] SHA2-512-ACC
33,142,905 UART: Fatal Error: 0x90050001
33,178,056 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,322,496 >>> mbox cmd response: failed
33,323,149 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,467,476 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
10,589,476 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,544,960 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,198 UART:
192,568 UART: Running Caliptra ROM ...
193,784 UART:
193,957 UART: [state] CFI Enabled
262,085 UART: [state] LifecycleState = Unprovisioned
263,934 UART: [state] DebugLocked = No
265,900 UART: [state] WD Timer not started. Device not locked for debugging
269,646 UART: [kat] SHA2-256
448,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,366 UART: [kat] ++
460,896 UART: [kat] sha1
472,702 UART: [kat] SHA2-256
475,792 UART: [kat] SHA2-384
481,426 UART: [kat] SHA2-512-ACC
484,363 UART: [kat] ECC-384
2,948,621 UART: [kat] HMAC-384Kdf
2,972,586 UART: [kat] LMS
3,502,041 UART: [kat] --
3,508,321 UART: [cold-reset] ++
3,510,059 UART: [fht] FHT @ 0x50003400
3,522,182 UART: [idev] ++
3,522,747 UART: [idev] CDI.KEYID = 6
3,523,662 UART: [idev] SUBJECT.KEYID = 7
3,524,842 UART: [idev] UDS.KEYID = 0
3,525,846 ready_for_fw is high
3,526,058 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,085 UART: [idev] Erasing UDS.KEYID = 0
6,028,359 UART: [idev] Sha1 KeyId Algorithm
6,051,051 UART: [idev] --
6,054,172 UART: [ldev] ++
6,054,802 UART: [ldev] CDI.KEYID = 6
6,055,697 UART: [ldev] SUBJECT.KEYID = 5
6,056,832 UART: [ldev] AUTHORITY.KEYID = 7
6,058,145 UART: [ldev] FE.KEYID = 1
6,100,403 UART: [ldev] Erasing FE.KEYID = 1
8,607,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,731 UART: [ldev] --
10,413,023 UART: [fwproc] Wait for Commands...
10,414,959 UART: [fwproc] Recv command 0x46574c44
10,417,055 UART: [fwproc] Recv'd Img size: 115304 bytes
13,826,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,500 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,288,405 >>> mbox cmd response: success
14,292,127 UART: [afmc] ++
14,292,713 UART: [afmc] CDI.KEYID = 6
14,293,601 UART: [afmc] SUBJECT.KEYID = 7
14,294,830 UART: [afmc] AUTHORITY.KEYID = 5
16,830,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,649 UART: [afmc] --
18,629,135 UART: [cold-reset] --
18,633,317 UART: [state] Locking Datavault
18,637,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,290 UART: [state] Locking ICCM
18,641,007 UART: [exit] Launching FMC @ 0x40000130
18,649,462 UART:
18,649,698 UART: Running Caliptra FMC ...
18,650,803 UART:
18,650,985 UART: [state] CFI Enabled
18,711,690 UART: [fht] FMC Alias Private Key: 7
20,476,287 UART: [art] Extend RT PCRs Done
20,477,507 UART: [art] Lock RT PCRs Done
20,479,074 UART: [art] Populate DV Done
20,484,377 UART: [fht] FMC Alias Private Key: 7
20,485,966 UART: [art] Derive CDI
20,486,781 UART: [art] Store in in slot 0x4
20,544,958 UART: [art] Derive Key Pair
20,545,992 UART: [art] Store priv key in slot 0x5
23,008,543 UART: [art] Derive Key Pair - Done
23,021,497 UART: [art] Signing Cert with AUTHO
23,022,808 UART: RITY.KEYID = 7
24,734,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,048 UART: [art] PUB.X = 53195C558E1BF3686FF9AB1795E49DCA79B68373AD53CDD6355BE05AC1AACB357883E869058E335550CC4093588F3189
24,743,300 UART: [art] PUB.Y = 78A902CA6E7D2BC5C1F51C9346D2EE0580539E5E02FA5904B5490C620F02E7A72EA56A18578DB07897962722C09B0DFA
24,750,555 UART: [art] SIG.R = E7F4A5CEFDCB0186E70987153A2FF7977194807D17BD4BA964684A511A7E8CF541268AA9D553DD52B273464EBF5D274E
24,757,992 UART: [art] SIG.S = FF28BB3E51887E46FB132E607996B5FFC1B099367F1E2F98A833EA3C06737A01E978482AE70604FAE665E59481BA197E
25,736,590 UART: Caliptra RT
25,737,303 UART: [state] CFI Enabled
25,902,908 UART: [rt] RT listening for mailbox commands...
25,904,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,463 UART: [rt]cmd =0x46504c54, len=4
25,935,989 >>> mbox cmd response data (8 bytes)
25,937,129 UART: [rt] FIPS self test
25,938,077 UART: [kat] ++
25,938,525 UART: [kat] sha1
25,942,813 UART: [kat] SHA2-256
25,944,738 UART: [kat] SHA2-384
25,947,862 UART: [kat] SHA2-512-ACC
25,948,903 UART: Fatal Error: 0x90050001
25,984,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,129,110 >>> mbox cmd response: failed
26,129,793 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,274,377 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,024 UART:
190,319 UART: Running Caliptra ROM ...
191,344 UART:
191,482 UART: [state] CFI Enabled
249,930 UART: [state] LifecycleState = Unprovisioned
251,790 UART: [state] DebugLocked = No
253,301 UART: [state] WD Timer not started. Device not locked for debugging
256,814 UART: [kat] SHA2-256
435,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,521 UART: [kat] ++
447,966 UART: [kat] sha1
458,482 UART: [kat] SHA2-256
461,547 UART: [kat] SHA2-384
468,384 UART: [kat] SHA2-512-ACC
471,315 UART: [kat] ECC-384
2,913,075 UART: [kat] HMAC-384Kdf
2,937,191 UART: [kat] LMS
3,466,649 UART: [kat] --
3,469,146 UART: [cold-reset] ++
3,470,269 UART: [fht] FHT @ 0x50003400
3,480,143 UART: [idev] ++
3,480,700 UART: [idev] CDI.KEYID = 6
3,481,636 UART: [idev] SUBJECT.KEYID = 7
3,482,848 UART: [idev] UDS.KEYID = 0
3,484,335 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,629,410 UART: [idev] Erasing UDS.KEYID = 0
5,993,005 UART: [idev] Sha1 KeyId Algorithm
6,014,466 UART: [idev] --
6,018,172 UART: [ldev] ++
6,018,755 UART: [ldev] CDI.KEYID = 6
6,019,640 UART: [ldev] SUBJECT.KEYID = 5
6,020,862 UART: [ldev] AUTHORITY.KEYID = 7
6,022,099 UART: [ldev] FE.KEYID = 1
6,066,383 UART: [ldev] Erasing FE.KEYID = 1
8,566,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,286,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,302,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,318,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,334,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,355,712 UART: [ldev] --
10,360,704 UART: [fwproc] Wait for Commands...
10,363,718 UART: [fwproc] Recv command 0x46574c44
10,365,762 UART: [fwproc] Recv'd Img size: 115304 bytes
13,779,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,850,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,919,353 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,240,923 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,381,222 ready_for_fw is high
3,381,873 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,066,842 >>> mbox cmd response: success
18,359,505 UART:
18,359,892 UART: Running Caliptra FMC ...
18,361,010 UART:
18,361,168 UART: [state] CFI Enabled
18,425,994 UART: [fht] FMC Alias Private Key: 7
20,189,660 UART: [art] Extend RT PCRs Done
20,190,890 UART: [art] Lock RT PCRs Done
20,192,221 UART: [art] Populate DV Done
20,197,562 UART: [fht] FMC Alias Private Key: 7
20,199,264 UART: [art] Derive CDI
20,200,082 UART: [art] Store in in slot 0x4
20,258,645 UART: [art] Derive Key Pair
20,259,691 UART: [art] Store priv key in slot 0x5
22,722,480 UART: [art] Derive Key Pair - Done
22,735,656 UART: [art] Signing Cert with AUTHO
22,736,961 UART: RITY.KEYID = 7
24,448,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,450,463 UART: [art] PUB.X = D143C668B6860C8D66D6342F61E665B7EA6B42FFEC5691442410AEE96EF73C5976E73587008E52CB47F9C5D53E635ED1
24,457,663 UART: [art] PUB.Y = B55567D32BDFEB25508D2591704016A44E93D545594F7BA50973D176CE3DA6A5C592C825EE24A4800C6A3EA8CCBA11E5
24,464,978 UART: [art] SIG.R = 927CFC23B246D1521582E46E2815FE502E7E068B5A82B060200F2D675F932D228C4388BDA468ADA6B8657B60FA12EB5A
24,472,393 UART: [art] SIG.S = 319DC806859944496E5A217FA37D48D220B289ABFE4FF708AFD0A2520E6773A5BFE9EBC5D46AF6CE23D718D11B466B2D
25,451,386 UART: Caliptra RT
25,452,096 UART: [state] CFI Enabled
25,616,552 UART: [rt] RT listening for mailbox commands...
25,618,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,648,083 UART: [rt]cmd =0x46504c54, len=4
25,649,476 >>> mbox cmd response data (8 bytes)
25,650,638 UART: [rt] FIPS self test
25,651,586 UART: [kat] ++
25,652,041 UART: [kat] sha1
25,656,605 UART: [kat] SHA2-256
25,658,489 UART: [kat] SHA2-384
25,661,667 UART: [kat] SHA2-512-ACC
25,662,581 UART: Fatal Error: 0x90050001
25,697,731 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,843,011 >>> mbox cmd response: failed
25,843,674 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,988,425 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,369,574 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,072,764 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,727 UART:
193,091 UART: Running Caliptra ROM ...
194,207 UART:
603,710 UART: [state] CFI Enabled
616,517 UART: [state] LifecycleState = Unprovisioned
618,376 UART: [state] DebugLocked = No
619,917 UART: [state] WD Timer not started. Device not locked for debugging
623,451 UART: [kat] SHA2-256
802,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,104 UART: [kat] ++
814,638 UART: [kat] sha1
826,303 UART: [kat] SHA2-256
829,387 UART: [kat] SHA2-384
835,449 UART: [kat] SHA2-512-ACC
838,461 UART: [kat] ECC-384
3,279,416 UART: [kat] HMAC-384Kdf
3,292,296 UART: [kat] LMS
3,821,756 UART: [kat] --
3,825,609 UART: [cold-reset] ++
3,827,406 UART: [fht] FHT @ 0x50003400
3,837,271 UART: [idev] ++
3,837,835 UART: [idev] CDI.KEYID = 6
3,838,791 UART: [idev] SUBJECT.KEYID = 7
3,839,963 UART: [idev] UDS.KEYID = 0
3,840,868 ready_for_fw is high
3,841,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,986,389 UART: [idev] Erasing UDS.KEYID = 0
6,310,908 UART: [idev] Sha1 KeyId Algorithm
6,335,229 UART: [idev] --
6,340,411 UART: [ldev] ++
6,340,982 UART: [ldev] CDI.KEYID = 6
6,341,999 UART: [ldev] SUBJECT.KEYID = 5
6,343,104 UART: [ldev] AUTHORITY.KEYID = 7
6,344,336 UART: [ldev] FE.KEYID = 1
6,354,013 UART: [ldev] Erasing FE.KEYID = 1
8,827,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,705 UART: [ldev] --
10,617,976 UART: [fwproc] Wait for Commands...
10,620,508 UART: [fwproc] Recv command 0x46574c44
10,622,612 UART: [fwproc] Recv'd Img size: 115304 bytes
14,039,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,567 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,503,190 >>> mbox cmd response: success
14,507,465 UART: [afmc] ++
14,508,058 UART: [afmc] CDI.KEYID = 6
14,508,972 UART: [afmc] SUBJECT.KEYID = 7
14,510,132 UART: [afmc] AUTHORITY.KEYID = 5
17,010,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,712 UART: [afmc] --
18,805,311 UART: [cold-reset] --
18,808,900 UART: [state] Locking Datavault
18,812,255 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,900 UART: [state] Locking ICCM
18,815,021 UART: [exit] Launching FMC @ 0x40000130
18,823,419 UART:
18,823,659 UART: Running Caliptra FMC ...
18,824,759 UART:
18,824,920 UART: [state] CFI Enabled
18,833,038 UART: [fht] FMC Alias Private Key: 7
20,589,899 UART: [art] Extend RT PCRs Done
20,591,133 UART: [art] Lock RT PCRs Done
20,592,757 UART: [art] Populate DV Done
20,598,011 UART: [fht] FMC Alias Private Key: 7
20,599,658 UART: [art] Derive CDI
20,600,469 UART: [art] Store in in slot 0x4
20,643,074 UART: [art] Derive Key Pair
20,644,119 UART: [art] Store priv key in slot 0x5
23,070,062 UART: [art] Derive Key Pair - Done
23,083,011 UART: [art] Signing Cert with AUTHO
23,084,323 UART: RITY.KEYID = 7
24,789,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,018 UART: [art] PUB.X = ACC0CA4C74E617C9E252F7E0740B2F3F36F96BB96D417F159BE42254E2E5539FC81449FD1501D9DE570EC7C75952F3AA
24,798,285 UART: [art] PUB.Y = CA095AC7C746CF4237E62523E4FD076E8B28263C557F6FF68EF5ED9E9DC43F5154514F1061A9EDC4D487C65683492530
24,805,577 UART: [art] SIG.R = 907F2B8CCC0C816FB3E216B612B2F5F837D8AA1E6AE0C0FC1A6ED9106ABA0C936E9E77F8BA2983032C3BD36C60A3D057
24,812,994 UART: [art] SIG.S = DC9164AFCC05C180B90DE8CB53B6564FDE7AA99AE8688603B4104D9D995F4676BDE395F71136C99E776AB09B856B5E00
25,791,510 UART: Caliptra RT
25,792,213 UART: [state] CFI Enabled
25,909,723 UART: [rt] RT listening for mailbox commands...
25,911,580 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,941,269 UART: [rt]cmd =0x46504c54, len=4
25,942,897 >>> mbox cmd response data (8 bytes)
25,944,080 UART: [rt] FIPS self test
25,945,017 UART: [kat] ++
25,945,472 UART: [kat] sha1
25,950,069 UART: [kat] SHA2-256
25,951,950 UART: [kat] SHA2-384
25,954,748 UART: [kat] SHA2-512-ACC
25,955,634 UART: Fatal Error: 0x90050001
25,991,002 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,135,832 >>> mbox cmd response: failed
26,136,524 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,281,100 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
190,127 UART:
190,417 UART: Running Caliptra ROM ...
191,438 UART:
14,244,920 UART: [state] CFI Enabled
14,257,510 UART: [state] LifecycleState = Unprovisioned
14,259,367 UART: [state] DebugLocked = No
14,261,076 UART: [state] WD Timer not started. Device not locked for debugging
14,264,171 UART: [kat] SHA2-256
14,443,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,454,884 UART: [kat] ++
14,455,421 UART: [kat] sha1
14,465,883 UART: [kat] SHA2-256
14,468,911 UART: [kat] SHA2-384
14,474,786 UART: [kat] SHA2-512-ACC
14,477,736 UART: [kat] ECC-384
16,920,011 UART: [kat] HMAC-384Kdf
16,931,806 UART: [kat] LMS
17,461,298 UART: [kat] --
17,465,582 UART: [cold-reset] ++
17,467,456 UART: [fht] FHT @ 0x50003400
17,478,699 UART: [idev] ++
17,479,268 UART: [idev] CDI.KEYID = 6
17,480,175 UART: [idev] SUBJECT.KEYID = 7
17,481,386 UART: [idev] UDS.KEYID = 0
17,482,919 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,627,753 UART: [idev] Erasing UDS.KEYID = 0
19,953,179 UART: [idev] Sha1 KeyId Algorithm
19,976,297 UART: [idev] --
19,979,603 UART: [ldev] ++
19,980,171 UART: [ldev] CDI.KEYID = 6
19,981,055 UART: [ldev] SUBJECT.KEYID = 5
19,982,271 UART: [ldev] AUTHORITY.KEYID = 7
19,983,427 UART: [ldev] FE.KEYID = 1
19,996,527 UART: [ldev] Erasing FE.KEYID = 1
22,466,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,183,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,199,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,214,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,230,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,251,359 UART: [ldev] --
24,255,279 UART: [fwproc] Wait for Commands...
24,257,054 UART: [fwproc] Recv command 0x46574c44
24,259,099 UART: [fwproc] Recv'd Img size: 115304 bytes
27,673,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,745,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,814,271 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,135,166 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,697,835 ready_for_fw is high
3,698,547 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,290,451 >>> mbox cmd response: success
18,544,142 UART:
18,544,532 UART: Running Caliptra FMC ...
18,545,738 UART:
18,545,904 UART: [state] CFI Enabled
18,553,994 UART: [fht] FMC Alias Private Key: 7
20,310,297 UART: [art] Extend RT PCRs Done
20,311,524 UART: [art] Lock RT PCRs Done
20,313,156 UART: [art] Populate DV Done
20,318,677 UART: [fht] FMC Alias Private Key: 7
20,320,382 UART: [art] Derive CDI
20,321,203 UART: [art] Store in in slot 0x4
20,364,082 UART: [art] Derive Key Pair
20,365,123 UART: [art] Store priv key in slot 0x5
22,791,756 UART: [art] Derive Key Pair - Done
22,804,716 UART: [art] Signing Cert with AUTHO
22,806,022 UART: RITY.KEYID = 7
24,511,617 UART: [art] Erasing AUTHORITY.KEYID = 7
24,513,127 UART: [art] PUB.X = 424D6002A987ED8EC7BDE3E5DBD53EED9D5B03B0F51FA53EE8F94ED7FB52C71D8AA9F00406E6BEDE585BC2906BC3B462
24,520,467 UART: [art] PUB.Y = E9608B1E24755D34089AB7BA7631E032831FBCA73327945025FFFD7CD16843D3BCD6193453C58040356592F7409CB184
24,527,647 UART: [art] SIG.R = 17AF62253CC5F52FA64CA1CDFE951F6983769E3610CC4265BEF20D681F37E38F93A95EA07E2F37C63FAE6D5BBEB21319
24,535,064 UART: [art] SIG.S = 317803DE84DF1BEC5D53190DAB4C113FD312914B8671D21A0130F7D61BAB60B7A06E795B4A03A221E7A99E81CF7087F1
25,514,099 UART: Caliptra RT
25,514,816 UART: [state] CFI Enabled
25,631,772 UART: [rt] RT listening for mailbox commands...
25,633,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,663,420 UART: [rt]cmd =0x46504c54, len=4
25,665,084 >>> mbox cmd response data (8 bytes)
25,666,034 UART: [rt] FIPS self test
25,666,992 UART: [kat] ++
25,667,484 UART: [kat] sha1
25,671,887 UART: [kat] SHA2-256
25,673,817 UART: [kat] SHA2-384
25,676,834 UART: [kat] SHA2-512-ACC
25,677,756 UART: Fatal Error: 0x90050001
25,712,907 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,857,684 >>> mbox cmd response: failed
25,858,323 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,003,104 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
17,623,243 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,224,607 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,193 UART:
192,552 UART: Running Caliptra ROM ...
193,736 UART:
193,887 UART: [state] CFI Enabled
265,381 UART: [state] LifecycleState = Unprovisioned
267,801 UART: [state] DebugLocked = No
269,483 UART: [state] WD Timer not started. Device not locked for debugging
274,376 UART: [kat] SHA2-256
464,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,023 UART: [kat] ++
475,535 UART: [kat] sha1
486,841 UART: [kat] SHA2-256
489,856 UART: [kat] SHA2-384
494,432 UART: [kat] SHA2-512-ACC
497,019 UART: [kat] ECC-384
2,945,505 UART: [kat] HMAC-384Kdf
2,971,214 UART: [kat] LMS
3,502,979 UART: [kat] --
3,507,827 UART: [cold-reset] ++
3,510,333 UART: [fht] FHT @ 0x50003400
3,521,247 UART: [idev] ++
3,521,882 UART: [idev] CDI.KEYID = 6
3,522,914 UART: [idev] SUBJECT.KEYID = 7
3,524,095 UART: [idev] UDS.KEYID = 0
3,525,027 ready_for_fw is high
3,525,252 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,763 UART: [idev] Erasing UDS.KEYID = 0
6,023,891 UART: [idev] Sha1 KeyId Algorithm
6,044,974 UART: [idev] --
6,048,755 UART: [ldev] ++
6,049,442 UART: [ldev] CDI.KEYID = 6
6,050,353 UART: [ldev] SUBJECT.KEYID = 5
6,051,568 UART: [ldev] AUTHORITY.KEYID = 7
6,052,748 UART: [ldev] FE.KEYID = 1
6,100,082 UART: [ldev] Erasing FE.KEYID = 1
8,603,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,781 UART: [ldev] --
10,412,646 UART: [fwproc] Wait for Commands...
10,415,736 UART: [fwproc] Recv command 0x46574c44
10,417,994 UART: [fwproc] Recv'd Img size: 115304 bytes
13,879,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,330 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,621,199 >>> mbox cmd response: success
14,626,086 UART: [afmc] ++
14,626,787 UART: [afmc] CDI.KEYID = 6
14,628,028 UART: [afmc] SUBJECT.KEYID = 7
14,629,468 UART: [afmc] AUTHORITY.KEYID = 5
17,171,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,923,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,938,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,015 UART: [afmc] --
18,965,795 UART: [cold-reset] --
18,968,469 UART: [state] Locking Datavault
18,972,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,553 UART: [state] Locking ICCM
18,977,079 UART: [exit] Launching FMC @ 0x40000130
18,985,752 UART:
18,985,990 UART: Running Caliptra FMC ...
18,987,090 UART:
18,987,251 UART: [state] CFI Enabled
19,049,342 UART: [fht] FMC Alias Private Key: 7
20,813,844 UART: [art] Extend RT PCRs Done
20,815,059 UART: [art] Lock RT PCRs Done
20,816,872 UART: [art] Populate DV Done
20,822,227 UART: [fht] FMC Alias Private Key: 7
20,823,866 UART: [art] Derive CDI
20,824,619 UART: [art] Store in in slot 0x4
20,882,466 UART: [art] Derive Key Pair
20,883,500 UART: [art] Store priv key in slot 0x5
23,346,420 UART: [art] Derive Key Pair - Done
23,359,555 UART: [art] Signing Cert with AUTHO
23,360,859 UART: RITY.KEYID = 7
25,072,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,398 UART: [art] PUB.X = 16706DA0226542CE9BBD14AF92C4F061C86F9D1D03D2F0A07A7D7DF95901A4F01276710DDA13F38ABAF8419CA642A03C
25,081,652 UART: [art] PUB.Y = 40535CA59032358B98DB8D56BAD2A5801D42CDD1C0BFD1D2F1CA2AE2582F2B8F0E6A847F91AD03D00FCDFD79556A7A6C
25,088,960 UART: [art] SIG.R = 9FB0986B209AD5EEE42D0DD4862E0722284D8A793D0CE33715323B970F316B800D33FFE1807C2859D574FD2A40FBEED7
25,096,363 UART: [art] SIG.S = EB391176106116E97E4816BDB6DCE131127C8508E26E6834095D78A00D075B78FD275FD76F867E0CE5F15C8505BD9DB4
26,075,985 UART: Caliptra RT
26,076,678 UART: [state] CFI Enabled
26,240,341 UART: [rt] RT listening for mailbox commands...
26,242,194 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,271,994 UART: [rt]cmd =0x46504c54, len=4
26,273,595 >>> mbox cmd response data (8 bytes)
26,274,837 UART: [rt] FIPS self test
26,275,778 UART: [kat] ++
26,276,225 UART: [kat] sha1
26,280,720 UART: [kat] SHA2-256
26,282,657 UART: [kat] SHA2-384
26,285,780 UART: [kat] SHA2-512-ACC
26,286,666 UART: Fatal Error: 0x90050001
26,322,047 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,467,277 >>> mbox cmd response: failed
26,467,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,612,546 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,115 UART:
190,412 UART: Running Caliptra ROM ...
191,460 UART:
191,600 UART: [state] CFI Enabled
247,444 UART: [state] LifecycleState = Unprovisioned
249,849 UART: [state] DebugLocked = No
252,386 UART: [state] WD Timer not started. Device not locked for debugging
257,692 UART: [kat] SHA2-256
447,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,329 UART: [kat] ++
458,773 UART: [kat] sha1
471,918 UART: [kat] SHA2-256
474,984 UART: [kat] SHA2-384
482,038 UART: [kat] SHA2-512-ACC
484,596 UART: [kat] ECC-384
2,933,463 UART: [kat] HMAC-384Kdf
2,956,436 UART: [kat] LMS
3,488,233 UART: [kat] --
3,492,678 UART: [cold-reset] ++
3,494,558 UART: [fht] FHT @ 0x50003400
3,506,394 UART: [idev] ++
3,507,077 UART: [idev] CDI.KEYID = 6
3,508,016 UART: [idev] SUBJECT.KEYID = 7
3,509,228 UART: [idev] UDS.KEYID = 0
3,510,712 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,655,682 UART: [idev] Erasing UDS.KEYID = 0
6,012,112 UART: [idev] Sha1 KeyId Algorithm
6,035,029 UART: [idev] --
6,040,271 UART: [ldev] ++
6,040,951 UART: [ldev] CDI.KEYID = 6
6,041,835 UART: [ldev] SUBJECT.KEYID = 5
6,043,053 UART: [ldev] AUTHORITY.KEYID = 7
6,044,238 UART: [ldev] FE.KEYID = 1
6,083,813 UART: [ldev] Erasing FE.KEYID = 1
8,589,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,500 UART: [ldev] --
10,395,767 UART: [fwproc] Wait for Commands...
10,398,512 UART: [fwproc] Recv command 0x46574c44
10,400,826 UART: [fwproc] Recv'd Img size: 115304 bytes
13,856,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,816 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,599,374 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,435,719 ready_for_fw is high
3,436,130 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,752,528 >>> mbox cmd response: success
19,047,171 UART:
19,047,659 UART: Running Caliptra FMC ...
19,048,793 UART:
19,048,947 UART: [state] CFI Enabled
19,113,525 UART: [fht] FMC Alias Private Key: 7
20,877,910 UART: [art] Extend RT PCRs Done
20,879,141 UART: [art] Lock RT PCRs Done
20,880,684 UART: [art] Populate DV Done
20,885,989 UART: [fht] FMC Alias Private Key: 7
20,887,475 UART: [art] Derive CDI
20,888,240 UART: [art] Store in in slot 0x4
20,945,504 UART: [art] Derive Key Pair
20,946,565 UART: [art] Store priv key in slot 0x5
23,409,518 UART: [art] Derive Key Pair - Done
23,422,521 UART: [art] Signing Cert with AUTHO
23,423,831 UART: RITY.KEYID = 7
25,134,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,372 UART: [art] PUB.X = 71C4B0B1C8954239B9E2EE947EB709ADAA1E9056DA157BD4624E4913EC14A75170E869436888D0FCD261A781D3E69E09
25,143,590 UART: [art] PUB.Y = 6800D191CDC14B2AADE857E541ECF4F667EC3238816FB2C70D7726C6707FC5838E226319198B83A71A884C0A819A2BEE
25,150,837 UART: [art] SIG.R = 926DC568D3B502C04BCE07CC5962874469652BDE09EB316603D6232599262758C84666C0211B795122C38CF8D8165FFE
25,158,245 UART: [art] SIG.S = 4D9F7FA51DA11A511F820186FECEF18A71FCCB39E386D26B45C72B33231BB3C7949AC2BFE17625D96911B9B532F61545
26,136,823 UART: Caliptra RT
26,137,541 UART: [state] CFI Enabled
26,301,067 UART: [rt] RT listening for mailbox commands...
26,302,934 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,332,693 UART: [rt]cmd =0x46504c54, len=4
26,334,161 >>> mbox cmd response data (8 bytes)
26,335,118 UART: [rt] FIPS self test
26,336,082 UART: [kat] ++
26,336,541 UART: [kat] sha1
26,340,879 UART: [kat] SHA2-256
26,342,813 UART: [kat] SHA2-384
26,345,770 UART: [kat] SHA2-512-ACC
26,346,686 UART: Fatal Error: 0x90050001
26,382,076 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,526,949 >>> mbox cmd response: failed
26,527,596 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,672,240 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,425,503 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,733,393 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,451 UART:
192,812 UART: Running Caliptra ROM ...
193,999 UART:
603,651 UART: [state] CFI Enabled
618,594 UART: [state] LifecycleState = Unprovisioned
620,965 UART: [state] DebugLocked = No
622,924 UART: [state] WD Timer not started. Device not locked for debugging
627,893 UART: [kat] SHA2-256
817,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,583 UART: [kat] ++
829,185 UART: [kat] sha1
839,858 UART: [kat] SHA2-256
842,878 UART: [kat] SHA2-384
848,445 UART: [kat] SHA2-512-ACC
851,026 UART: [kat] ECC-384
3,291,325 UART: [kat] HMAC-384Kdf
3,304,220 UART: [kat] LMS
3,836,070 UART: [kat] --
3,840,932 UART: [cold-reset] ++
3,841,968 UART: [fht] FHT @ 0x50003400
3,852,313 UART: [idev] ++
3,853,028 UART: [idev] CDI.KEYID = 6
3,853,944 UART: [idev] SUBJECT.KEYID = 7
3,855,193 UART: [idev] UDS.KEYID = 0
3,856,116 ready_for_fw is high
3,856,310 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,001,127 UART: [idev] Erasing UDS.KEYID = 0
6,331,682 UART: [idev] Sha1 KeyId Algorithm
6,353,903 UART: [idev] --
6,358,757 UART: [ldev] ++
6,359,439 UART: [ldev] CDI.KEYID = 6
6,360,359 UART: [ldev] SUBJECT.KEYID = 5
6,361,592 UART: [ldev] AUTHORITY.KEYID = 7
6,362,766 UART: [ldev] FE.KEYID = 1
6,374,706 UART: [ldev] Erasing FE.KEYID = 1
8,853,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,357 UART: [ldev] --
10,645,576 UART: [fwproc] Wait for Commands...
10,648,545 UART: [fwproc] Recv command 0x46574c44
10,650,932 UART: [fwproc] Recv'd Img size: 115304 bytes
14,112,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,627 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,857,206 >>> mbox cmd response: success
14,860,496 UART: [afmc] ++
14,861,253 UART: [afmc] CDI.KEYID = 6
14,862,360 UART: [afmc] SUBJECT.KEYID = 7
14,863,896 UART: [afmc] AUTHORITY.KEYID = 5
17,368,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,090,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,092,407 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,107,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,122,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,137,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,160,577 UART: [afmc] --
19,163,846 UART: [cold-reset] --
19,167,597 UART: [state] Locking Datavault
19,174,352 UART: [state] Locking PCR0, PCR1 and PCR31
19,176,537 UART: [state] Locking ICCM
19,178,040 UART: [exit] Launching FMC @ 0x40000130
19,186,729 UART:
19,186,976 UART: Running Caliptra FMC ...
19,188,081 UART:
19,188,241 UART: [state] CFI Enabled
19,196,237 UART: [fht] FMC Alias Private Key: 7
20,953,394 UART: [art] Extend RT PCRs Done
20,954,613 UART: [art] Lock RT PCRs Done
20,956,051 UART: [art] Populate DV Done
20,961,542 UART: [fht] FMC Alias Private Key: 7
20,963,153 UART: [art] Derive CDI
20,963,892 UART: [art] Store in in slot 0x4
21,006,645 UART: [art] Derive Key Pair
21,007,652 UART: [art] Store priv key in slot 0x5
23,434,202 UART: [art] Derive Key Pair - Done
23,447,284 UART: [art] Signing Cert with AUTHO
23,448,640 UART: RITY.KEYID = 7
25,154,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,519 UART: [art] PUB.X = 2F9BDD20DC767735F66E1BF399F9EB6AFBFBB4D2A8A037E96DA981C51CFC864333714C73952D7B7A144ED2D9EF7E4748
25,162,778 UART: [art] PUB.Y = 6744ED90B76A40638F035AE1B3F2884809473193D3DA5618CF386BF6FA6DCF81BDCF700E53BED6863F8DB5D5C5844C77
25,170,067 UART: [art] SIG.R = 6D0B8C4DFBB9517281CA10CD4B88C7CFBAEDD04DFF9003A88E68B9590BCD1D89C4052352F821D44EAB221480CA328388
25,177,467 UART: [art] SIG.S = 300FADD27A0F6D8F9B4563DFDBB10E87495F176E038A5FC3C217C52F2D155C5E1D3CBF27C40C65790B91E3871D9A3A47
26,156,869 UART: Caliptra RT
26,157,691 UART: [state] CFI Enabled
26,274,600 UART: [rt] RT listening for mailbox commands...
26,276,443 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,306,058 UART: [rt]cmd =0x46504c54, len=4
26,307,742 >>> mbox cmd response data (8 bytes)
26,308,783 UART: [rt] FIPS self test
26,309,720 UART: [kat] ++
26,310,171 UART: [kat] sha1
26,314,680 UART: [kat] SHA2-256
26,316,615 UART: [kat] SHA2-384
26,319,581 UART: [kat] SHA2-512-ACC
26,320,482 UART: Fatal Error: 0x90050001
26,355,690 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,500,457 >>> mbox cmd response: failed
26,501,104 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,645,885 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,007 UART:
190,295 UART: Running Caliptra ROM ...
191,319 UART:
13,875,234 UART: [state] CFI Enabled
13,892,558 UART: [state] LifecycleState = Unprovisioned
13,894,906 UART: [state] DebugLocked = No
13,897,317 UART: [state] WD Timer not started. Device not locked for debugging
13,901,277 UART: [kat] SHA2-256
14,091,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,101,944 UART: [kat] ++
14,102,461 UART: [kat] sha1
14,114,373 UART: [kat] SHA2-256
14,117,386 UART: [kat] SHA2-384
14,123,220 UART: [kat] SHA2-512-ACC
14,125,783 UART: [kat] ECC-384
16,565,349 UART: [kat] HMAC-384Kdf
16,577,901 UART: [kat] LMS
17,109,721 UART: [kat] --
17,113,864 UART: [cold-reset] ++
17,115,825 UART: [fht] FHT @ 0x50003400
17,127,402 UART: [idev] ++
17,128,131 UART: [idev] CDI.KEYID = 6
17,129,088 UART: [idev] SUBJECT.KEYID = 7
17,130,248 UART: [idev] UDS.KEYID = 0
17,131,966 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,276,738 UART: [idev] Erasing UDS.KEYID = 0
19,614,087 UART: [idev] Sha1 KeyId Algorithm
19,636,017 UART: [idev] --
19,640,823 UART: [ldev] ++
19,641,557 UART: [ldev] CDI.KEYID = 6
19,642,436 UART: [ldev] SUBJECT.KEYID = 5
19,643,650 UART: [ldev] AUTHORITY.KEYID = 7
19,644,824 UART: [ldev] FE.KEYID = 1
19,654,906 UART: [ldev] Erasing FE.KEYID = 1
22,133,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,852,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,868,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,883,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,898,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,918,053 UART: [ldev] --
23,923,999 UART: [fwproc] Wait for Commands...
23,925,941 UART: [fwproc] Recv command 0x46574c44
23,928,250 UART: [fwproc] Recv'd Img size: 115304 bytes
27,390,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,469,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,585,162 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,133,845 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,750,547 ready_for_fw is high
3,751,006 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,979,891 >>> mbox cmd response: success
19,233,256 UART:
19,233,649 UART: Running Caliptra FMC ...
19,234,791 UART:
19,234,954 UART: [state] CFI Enabled
19,243,020 UART: [fht] FMC Alias Private Key: 7
20,999,761 UART: [art] Extend RT PCRs Done
21,001,004 UART: [art] Lock RT PCRs Done
21,002,699 UART: [art] Populate DV Done
21,008,013 UART: [fht] FMC Alias Private Key: 7
21,009,724 UART: [art] Derive CDI
21,010,544 UART: [art] Store in in slot 0x4
21,052,870 UART: [art] Derive Key Pair
21,053,875 UART: [art] Store priv key in slot 0x5
23,480,635 UART: [art] Derive Key Pair - Done
23,493,736 UART: [art] Signing Cert with AUTHO
23,495,054 UART: RITY.KEYID = 7
25,200,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,914 UART: [art] PUB.X = A7A941A556EB8B799D72FE3016E6E96D67DFF1ABDA7D37DB045B057E7566EEA5A16B7EDAABF5554BD8B85D2425FF1B23
25,209,241 UART: [art] PUB.Y = A2D35FB27F0D40890254F4AA0A8A0F8DF72817FC60D0B08A37F9237102CB0235A727969AFCAF3775028A42943DC5596A
25,216,499 UART: [art] SIG.R = 6ADCDFC65FC18F93C4AE49B94AC50C93ED4AA2422093DFCAA0D1E4A0BFDEC79516492726EABEDB53D47F991BDC92D32E
25,223,955 UART: [art] SIG.S = C13D91A2C29215C2B785D397E855459A45223D143C7880834F3A52D9DC81EC11E3834D48428C9CB69F905738A57AF42D
26,202,201 UART: Caliptra RT
26,202,911 UART: [state] CFI Enabled
26,319,708 UART: [rt] RT listening for mailbox commands...
26,321,581 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,177 UART: [rt]cmd =0x46504c54, len=4
26,352,730 >>> mbox cmd response data (8 bytes)
26,353,955 UART: [rt] FIPS self test
26,354,899 UART: [kat] ++
26,355,354 UART: [kat] sha1
26,359,809 UART: [kat] SHA2-256
26,361,693 UART: [kat] SHA2-384
26,364,657 UART: [kat] SHA2-512-ACC
26,365,582 UART: Fatal Error: 0x90050001
26,400,734 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,545,531 >>> mbox cmd response: failed
26,546,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,690,929 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
16,994,625 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,223,879 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,471 UART: [kat] SHA2-256
892,409 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,324 UART: [kat] HMAC-384Kdf
906,798 UART: [kat] LMS
1,474,994 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,325 UART: [fht] Storing FHT @ 0x50003400
1,479,078 UART: [idev] ++
1,479,246 UART: [idev] CDI.KEYID = 6
1,479,606 UART: [idev] SUBJECT.KEYID = 7
1,480,030 UART: [idev] UDS.KEYID = 0
1,480,375 ready_for_fw is high
1,480,375 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,726 UART: [idev] Erasing UDS.KEYID = 0
1,504,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,120 UART: [idev] --
1,513,997 UART: [ldev] ++
1,514,165 UART: [ldev] CDI.KEYID = 6
1,514,528 UART: [ldev] SUBJECT.KEYID = 5
1,514,954 UART: [ldev] AUTHORITY.KEYID = 7
1,515,417 UART: [ldev] FE.KEYID = 1
1,520,631 UART: [ldev] Erasing FE.KEYID = 1
1,547,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,574 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,812 UART: [fwproc] Received command 0x46574c44
1,587,603 UART: [fwproc] Received Image of size 115304 bytes
2,897,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,977 >>> mbox cmd response: success
3,092,081 UART: [afmc] ++
3,092,249 UART: [afmc] CDI.KEYID = 6
3,092,611 UART: [afmc] SUBJECT.KEYID = 7
3,093,036 UART: [afmc] AUTHORITY.KEYID = 5
3,127,967 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,373 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,766 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,456 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,327 UART: [afmc] --
3,171,313 UART: [cold-reset] --
3,172,061 UART: [state] Locking Datavault
3,173,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,960 UART: [state] Locking ICCM
3,174,556 UART: [exit] Launching FMC @ 0x40000130
3,179,885 UART:
3,179,901 UART: Running Caliptra FMC ...
3,180,309 UART:
3,180,363 UART: [state] CFI Enabled
3,191,068 UART: [fht] FMC Alias Private Key: 7
3,299,005 UART: [art] Extend RT PCRs Done
3,299,433 UART: [art] Lock RT PCRs Done
3,300,847 UART: [art] Populate DV Done
3,308,862 UART: [fht] FMC Alias Private Key: 7
3,310,042 UART: [art] Derive CDI
3,310,322 UART: [art] Store in in slot 0x4
3,395,825 UART: [art] Derive Key Pair
3,396,185 UART: [art] Store priv key in slot 0x5
3,409,251 UART: [art] Derive Key Pair - Done
3,423,531 UART: [art] Signing Cert with AUTHO
3,424,011 UART: RITY.KEYID = 7
3,439,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,046 UART: [art] PUB.X = F684C50A7973A39322951CD8325C8B430F2EEFEE182543D559D2E6F94A6B85C320B84C0DD3A0CA4AFEEA74612C818811
3,446,813 UART: [art] PUB.Y = BB90CAE3FC84C9D96D52442875B26E5384DCB366C32B66A6CD4344291DBA6646CBB2B28B80E2F11BA13ED59364E68C19
3,453,773 UART: [art] SIG.R = 29D01FC78435AA4C5F208879AF3E316B114367E21E13F7632044F09B4E3E58C592EBB750BD16B56A801175393D29DB1A
3,460,541 UART: [art] SIG.S = 3CDDEE19FA14E1BFDDF46646CBF5D335B44E19A086046C3F62A3339670E93084AC785D118D5340FF6A7B137B16CCCAFE
3,483,899 UART: Caliptra RT
3,484,152 UART: [state] CFI Enabled
3,593,228 UART: [rt] RT listening for mailbox commands...
3,593,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,860 UART: [rt]cmd =0x46504c54, len=4
3,624,955 >>> mbox cmd response data (8 bytes)
3,625,190 UART: [rt] FIPS self test
3,625,518 UART: [kat] ++
3,625,670 UART: [kat] sha1
3,629,836 UART: [kat] SHA2-256
3,631,858 UART: [kat] SHA2-384
3,634,583 UART: [kat] SHA2-512-ACC
3,635,075 UART: Fatal Error: 0x90050001
3,636,625 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,630 >>> mbox cmd response: failed
3,636,630 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,647 UART: [kat] SHA2-256
881,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,693 UART: [kat] ++
885,845 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,540 UART: [idev] ++
1,479,708 UART: [idev] CDI.KEYID = 6
1,480,068 UART: [idev] SUBJECT.KEYID = 7
1,480,492 UART: [idev] UDS.KEYID = 0
1,480,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,478 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,196 UART: [idev] --
1,515,253 UART: [ldev] ++
1,515,421 UART: [ldev] CDI.KEYID = 6
1,515,784 UART: [ldev] SUBJECT.KEYID = 5
1,516,210 UART: [ldev] AUTHORITY.KEYID = 7
1,516,673 UART: [ldev] FE.KEYID = 1
1,521,751 UART: [ldev] Erasing FE.KEYID = 1
1,546,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,632 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,894 UART: [fwproc] Received command 0x46574c44
1,587,685 UART: [fwproc] Received Image of size 115304 bytes
2,897,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,124 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,697 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,743 ready_for_fw is high
1,361,743 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,623 >>> mbox cmd response: success
3,003,315 UART:
3,003,331 UART: Running Caliptra FMC ...
3,003,739 UART:
3,003,793 UART: [state] CFI Enabled
3,014,170 UART: [fht] FMC Alias Private Key: 7
3,122,325 UART: [art] Extend RT PCRs Done
3,122,753 UART: [art] Lock RT PCRs Done
3,124,595 UART: [art] Populate DV Done
3,132,700 UART: [fht] FMC Alias Private Key: 7
3,133,630 UART: [art] Derive CDI
3,133,910 UART: [art] Store in in slot 0x4
3,219,361 UART: [art] Derive Key Pair
3,219,721 UART: [art] Store priv key in slot 0x5
3,232,933 UART: [art] Derive Key Pair - Done
3,247,732 UART: [art] Signing Cert with AUTHO
3,248,212 UART: RITY.KEYID = 7
3,263,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,097 UART: [art] PUB.X = 3161851F955A16F97213CB860C236C75FBBA5F22D1FB8CA1984F1F0B83F5D4EE379F8A022DD618E19C2FA28EB5E55F69
3,270,868 UART: [art] PUB.Y = 486612BD1527CC86295095C77F45470DCE6A9745D098195745CCF15618EE6E763B9E28B1E3A6375F95458F3089947AAE
3,277,807 UART: [art] SIG.R = 19809C258B192A30DC7BBFEAD480F1AEFE41C736ED0E4727BBA04662AA5586463815DD3C4EE91D3828BABD8F34778790
3,284,584 UART: [art] SIG.S = 6B730A4EFD2061020FC97A26AC25B98DC8E5041D06B262E5BA1EEAE801FABCCFC88D2D314EE500578B728D7F85FFA66F
3,308,755 UART: Caliptra RT
3,309,008 UART: [state] CFI Enabled
3,417,144 UART: [rt] RT listening for mailbox commands...
3,417,807 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,788 UART: [rt]cmd =0x46504c54, len=4
3,448,923 >>> mbox cmd response data (8 bytes)
3,449,130 UART: [rt] FIPS self test
3,449,458 UART: [kat] ++
3,449,610 UART: [kat] sha1
3,453,948 UART: [kat] SHA2-256
3,455,970 UART: [kat] SHA2-384
3,458,651 UART: [kat] SHA2-512-ACC
3,459,223 UART: Fatal Error: 0x90050001
3,460,773 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,778 >>> mbox cmd response: failed
3,460,778 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,131 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,123 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,662 UART: [kat] SHA2-256
882,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,708 UART: [kat] ++
886,860 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,835 UART: [kat] SHA2-512-ACC
897,736 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
908,001 UART: [kat] LMS
1,476,197 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,444 UART: [fht] Storing FHT @ 0x50003400
1,480,243 UART: [idev] ++
1,480,411 UART: [idev] CDI.KEYID = 6
1,480,771 UART: [idev] SUBJECT.KEYID = 7
1,481,195 UART: [idev] UDS.KEYID = 0
1,481,540 ready_for_fw is high
1,481,540 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,047 UART: [idev] Erasing UDS.KEYID = 0
1,505,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,007 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,816 UART: [ldev] Erasing FE.KEYID = 1
1,547,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,761 UART: [ldev] --
1,587,230 UART: [fwproc] Waiting for Commands...
1,588,059 UART: [fwproc] Received command 0x46574c44
1,588,850 UART: [fwproc] Received Image of size 115304 bytes
2,898,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,162 >>> mbox cmd response: success
3,093,316 UART: [afmc] ++
3,093,484 UART: [afmc] CDI.KEYID = 6
3,093,846 UART: [afmc] SUBJECT.KEYID = 7
3,094,271 UART: [afmc] AUTHORITY.KEYID = 5
3,129,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,385 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,075 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,068 UART: [afmc] --
3,173,168 UART: [cold-reset] --
3,174,052 UART: [state] Locking Datavault
3,175,315 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,919 UART: [state] Locking ICCM
3,176,571 UART: [exit] Launching FMC @ 0x40000130
3,181,900 UART:
3,181,916 UART: Running Caliptra FMC ...
3,182,324 UART:
3,182,467 UART: [state] CFI Enabled
3,193,440 UART: [fht] FMC Alias Private Key: 7
3,301,189 UART: [art] Extend RT PCRs Done
3,301,617 UART: [art] Lock RT PCRs Done
3,303,563 UART: [art] Populate DV Done
3,311,600 UART: [fht] FMC Alias Private Key: 7
3,312,712 UART: [art] Derive CDI
3,312,992 UART: [art] Store in in slot 0x4
3,398,263 UART: [art] Derive Key Pair
3,398,623 UART: [art] Store priv key in slot 0x5
3,411,963 UART: [art] Derive Key Pair - Done
3,426,537 UART: [art] Signing Cert with AUTHO
3,427,017 UART: RITY.KEYID = 7
3,441,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,630 UART: [art] PUB.X = 6CC88030619683F4D095544A2A34976BCD223735EB7EF9248519D5F5B4C21C720813E8242FE87C1206EAFC97A62A185B
3,449,390 UART: [art] PUB.Y = EA6364BE71E6707E5E36D8BE5ED87B9E0519E652CBB8D99AE827F11E1482ECBF50C3A821E5B5481884C8AEB24F3544E3
3,456,349 UART: [art] SIG.R = E30E963D08076BFB6AC3A12D3AE931EA9D2ACAF8738EAB09C13A4DC0B872D3039FC7DFDF14ED8E68CE5DA34DD2834B88
3,463,130 UART: [art] SIG.S = B33ED254CD235E644607ECBDD5256F6BACC52804D74A68C1C8E1CD7145B9588757D8E9BCF4690BFDDF3838E0CB3D1636
3,487,148 UART: Caliptra RT
3,487,493 UART: [state] CFI Enabled
3,595,451 UART: [rt] RT listening for mailbox commands...
3,596,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,217 UART: [rt]cmd =0x46504c54, len=4
3,627,326 >>> mbox cmd response data (8 bytes)
3,627,637 UART: [rt] FIPS self test
3,627,965 UART: [kat] ++
3,628,117 UART: [kat] sha1
3,632,203 UART: [kat] SHA2-256
3,634,225 UART: [kat] SHA2-384
3,637,080 UART: [kat] SHA2-512-ACC
3,637,678 UART: Fatal Error: 0x90050001
3,639,228 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,233 >>> mbox cmd response: failed
3,639,233 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,928 UART: [kat] SHA2-256
881,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,974 UART: [kat] ++
886,126 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,021 UART: [kat] SHA2-512-ACC
896,922 UART: [kat] ECC-384
902,475 UART: [kat] HMAC-384Kdf
906,959 UART: [kat] LMS
1,475,155 UART: [kat] --
1,476,016 UART: [cold-reset] ++
1,476,394 UART: [fht] Storing FHT @ 0x50003400
1,479,009 UART: [idev] ++
1,479,177 UART: [idev] CDI.KEYID = 6
1,479,537 UART: [idev] SUBJECT.KEYID = 7
1,479,961 UART: [idev] UDS.KEYID = 0
1,480,306 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,069 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,727 UART: [idev] --
1,514,678 UART: [ldev] ++
1,514,846 UART: [ldev] CDI.KEYID = 6
1,515,209 UART: [ldev] SUBJECT.KEYID = 5
1,515,635 UART: [ldev] AUTHORITY.KEYID = 7
1,516,098 UART: [ldev] FE.KEYID = 1
1,521,214 UART: [ldev] Erasing FE.KEYID = 1
1,546,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,721 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,586,851 UART: [fwproc] Received command 0x46574c44
1,587,642 UART: [fwproc] Received Image of size 115304 bytes
2,897,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,989 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,634 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 ready_for_fw is high
1,363,038 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,242 >>> mbox cmd response: success
3,003,932 UART:
3,003,948 UART: Running Caliptra FMC ...
3,004,356 UART:
3,004,499 UART: [state] CFI Enabled
3,015,092 UART: [fht] FMC Alias Private Key: 7
3,123,463 UART: [art] Extend RT PCRs Done
3,123,891 UART: [art] Lock RT PCRs Done
3,125,621 UART: [art] Populate DV Done
3,133,984 UART: [fht] FMC Alias Private Key: 7
3,135,052 UART: [art] Derive CDI
3,135,332 UART: [art] Store in in slot 0x4
3,221,129 UART: [art] Derive Key Pair
3,221,489 UART: [art] Store priv key in slot 0x5
3,235,023 UART: [art] Derive Key Pair - Done
3,249,899 UART: [art] Signing Cert with AUTHO
3,250,379 UART: RITY.KEYID = 7
3,265,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,098 UART: [art] PUB.X = 6BA107A1A156C1232EA4CE5C5E5B1FC9132E2BBCD130E3F5867D288C6B2672E7A344F890E7DE780D6432FD9DE8250AB6
3,272,871 UART: [art] PUB.Y = 4F948B9C102284088900CEB3950E82948673401604D16ED75537943C88896176FEDFEE01DACC8D83E2B6F3EB73FC9ABC
3,279,789 UART: [art] SIG.R = 5677122502E4466A2E8F87D4FB6EF2015352DAD7237D2879DC1E35DE44766D058E45D82D1D48AE72DC1BA59FEF27A8EE
3,286,558 UART: [art] SIG.S = 7A84A6D6D5C95569A9386AAFB17B34BC9D458F01ECC8590B19B275009210E4925EB18364F092FEFA6664EE37BB40FF4F
3,310,523 UART: Caliptra RT
3,310,868 UART: [state] CFI Enabled
3,418,950 UART: [rt] RT listening for mailbox commands...
3,419,613 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,454 UART: [rt]cmd =0x46504c54, len=4
3,450,711 >>> mbox cmd response data (8 bytes)
3,450,864 UART: [rt] FIPS self test
3,451,192 UART: [kat] ++
3,451,344 UART: [kat] sha1
3,455,536 UART: [kat] SHA2-256
3,457,558 UART: [kat] SHA2-384
3,460,339 UART: [kat] SHA2-512-ACC
3,460,937 UART: Fatal Error: 0x90050001
3,462,487 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,492 >>> mbox cmd response: failed
3,462,492 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,610 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,498 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,650 UART: [kat] HMAC-384Kdf
922,210 UART: [kat] LMS
1,170,538 UART: [kat] --
1,171,721 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,086 UART: [idev] Erasing UDS.KEYID = 0
1,201,407 UART: [idev] Sha1 KeyId Algorithm
1,209,825 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,487 UART: [ldev] Erasing FE.KEYID = 1
1,243,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,586 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,821 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,162 >>> mbox cmd response: success
2,789,350 UART: [afmc] ++
2,789,518 UART: [afmc] CDI.KEYID = 6
2,789,880 UART: [afmc] SUBJECT.KEYID = 7
2,790,305 UART: [afmc] AUTHORITY.KEYID = 5
2,825,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,394 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,113 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,167 UART: [afmc] --
2,869,181 UART: [cold-reset] --
2,870,095 UART: [state] Locking Datavault
2,871,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,804 UART: [state] Locking ICCM
2,872,226 UART: [exit] Launching FMC @ 0x40000130
2,877,555 UART:
2,877,571 UART: Running Caliptra FMC ...
2,877,979 UART:
2,878,033 UART: [state] CFI Enabled
2,888,768 UART: [fht] FMC Alias Private Key: 7
2,996,685 UART: [art] Extend RT PCRs Done
2,997,113 UART: [art] Lock RT PCRs Done
2,998,727 UART: [art] Populate DV Done
3,007,094 UART: [fht] FMC Alias Private Key: 7
3,008,078 UART: [art] Derive CDI
3,008,358 UART: [art] Store in in slot 0x4
3,093,941 UART: [art] Derive Key Pair
3,094,301 UART: [art] Store priv key in slot 0x5
3,107,995 UART: [art] Derive Key Pair - Done
3,122,552 UART: [art] Signing Cert with AUTHO
3,123,032 UART: RITY.KEYID = 7
3,138,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,143 UART: [art] PUB.X = 03CACF27495DE50792BE93048CE2C6DDAC2C311CF3E8712C12FB00BC0665ECDC047E5B2997AA47861AADAA942E5A6CD1
3,145,896 UART: [art] PUB.Y = 3BF1320B60ED0A45B05339876C0444FF1DBEA1DE23948FF5DB7AF043CA1C9177E18F4264964565453295E497FF20DD7D
3,152,841 UART: [art] SIG.R = D3739D756B21C6CC22CE04DD0AC2C313D74C2B8CF95DC421FBF6B67D2211F66E3AC319F4509F4A508CD7047E248EF81A
3,159,616 UART: [art] SIG.S = D741D2D8690B4A0274C6EBE46441DE85F72C2D1FD376B579A1D42CE7964DE1C8AF013DE147B8EDE55468E926A5ECB521
3,183,306 UART: Caliptra RT
3,183,559 UART: [state] CFI Enabled
3,291,275 UART: [rt] RT listening for mailbox commands...
3,291,938 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,837 UART: [rt]cmd =0x46504c54, len=4
3,322,906 >>> mbox cmd response data (8 bytes)
3,323,257 UART: [rt] FIPS self test
3,323,585 UART: [kat] ++
3,323,737 UART: [kat] sha1
3,327,885 UART: [kat] SHA2-256
3,329,907 UART: [kat] SHA2-384
3,332,770 UART: [kat] SHA2-512-ACC
3,333,308 UART: Fatal Error: 0x90050001
3,334,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,863 >>> mbox cmd response: failed
3,334,863 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
918,472 UART: [kat] HMAC-384Kdf
923,038 UART: [kat] LMS
1,171,366 UART: [kat] --
1,172,369 UART: [cold-reset] ++
1,172,695 UART: [fht] FHT @ 0x50003400
1,175,464 UART: [idev] ++
1,175,632 UART: [idev] CDI.KEYID = 6
1,175,992 UART: [idev] SUBJECT.KEYID = 7
1,176,416 UART: [idev] UDS.KEYID = 0
1,176,761 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,254 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,795 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,831 UART: [ldev] --
1,283,172 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,875 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,138 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,709 ready_for_fw is high
1,059,709 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,289 >>> mbox cmd response: success
2,701,103 UART:
2,701,119 UART: Running Caliptra FMC ...
2,701,527 UART:
2,701,581 UART: [state] CFI Enabled
2,712,142 UART: [fht] FMC Alias Private Key: 7
2,820,373 UART: [art] Extend RT PCRs Done
2,820,801 UART: [art] Lock RT PCRs Done
2,822,593 UART: [art] Populate DV Done
2,830,714 UART: [fht] FMC Alias Private Key: 7
2,831,658 UART: [art] Derive CDI
2,831,938 UART: [art] Store in in slot 0x4
2,917,687 UART: [art] Derive Key Pair
2,918,047 UART: [art] Store priv key in slot 0x5
2,931,081 UART: [art] Derive Key Pair - Done
2,945,933 UART: [art] Signing Cert with AUTHO
2,946,413 UART: RITY.KEYID = 7
2,962,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,800 UART: [art] PUB.X = E0422B896C2412CA2FD515391F51276CADA210A5A49DB19098B5E8C0CC34BA02AC507C3F4678D062F45AADD6313DB63D
2,969,577 UART: [art] PUB.Y = 3B35AF64F9B2893C11634DB0D854807E58BF2A6FAF93438FB86DBCD48CFA929C8C4233AFEFD0501E7A9FF08AE33BC054
2,976,545 UART: [art] SIG.R = 70914A8FB8EF38FB1BEA3AD946956A4C02FC978322E38FAE62B25BDEB3E6655041FE78DE2B5C2AADA1512EF81483174B
2,983,328 UART: [art] SIG.S = F8F37A3A793487B809B70AC5E6D67CA11299E83CE19752BBDA3685D3CCDFC24EB05FBDF6426D8056CC9CAE5EF68D128C
3,007,391 UART: Caliptra RT
3,007,644 UART: [state] CFI Enabled
3,116,227 UART: [rt] RT listening for mailbox commands...
3,116,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,737 UART: [rt]cmd =0x46504c54, len=4
3,148,048 >>> mbox cmd response data (8 bytes)
3,148,189 UART: [rt] FIPS self test
3,148,517 UART: [kat] ++
3,148,669 UART: [kat] sha1
3,152,873 UART: [kat] SHA2-256
3,154,895 UART: [kat] SHA2-384
3,157,586 UART: [kat] SHA2-512-ACC
3,158,166 UART: Fatal Error: 0x90050001
3,159,716 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,721 >>> mbox cmd response: failed
3,159,721 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,337 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,088 UART: [kat] SHA2-256
904,028 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,573 UART: [kat] LMS
1,171,901 UART: [kat] --
1,172,820 UART: [cold-reset] ++
1,173,148 UART: [fht] FHT @ 0x50003400
1,175,877 UART: [idev] ++
1,176,045 UART: [idev] CDI.KEYID = 6
1,176,405 UART: [idev] SUBJECT.KEYID = 7
1,176,829 UART: [idev] UDS.KEYID = 0
1,177,174 ready_for_fw is high
1,177,174 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,853 UART: [idev] Erasing UDS.KEYID = 0
1,202,162 UART: [idev] Sha1 KeyId Algorithm
1,210,796 UART: [idev] --
1,211,820 UART: [ldev] ++
1,211,988 UART: [ldev] CDI.KEYID = 6
1,212,351 UART: [ldev] SUBJECT.KEYID = 5
1,212,777 UART: [ldev] AUTHORITY.KEYID = 7
1,213,240 UART: [ldev] FE.KEYID = 1
1,218,692 UART: [ldev] Erasing FE.KEYID = 1
1,245,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,952 UART: [ldev] --
1,284,295 UART: [fwproc] Wait for Commands...
1,285,029 UART: [fwproc] Recv command 0x46574c44
1,285,757 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,376 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,547 >>> mbox cmd response: success
2,790,663 UART: [afmc] ++
2,790,831 UART: [afmc] CDI.KEYID = 6
2,791,193 UART: [afmc] SUBJECT.KEYID = 7
2,791,618 UART: [afmc] AUTHORITY.KEYID = 5
2,827,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,844,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,845,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,856,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,862,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,870,352 UART: [afmc] --
2,871,250 UART: [cold-reset] --
2,872,160 UART: [state] Locking Datavault
2,873,473 UART: [state] Locking PCR0, PCR1 and PCR31
2,874,077 UART: [state] Locking ICCM
2,874,719 UART: [exit] Launching FMC @ 0x40000130
2,880,048 UART:
2,880,064 UART: Running Caliptra FMC ...
2,880,472 UART:
2,880,615 UART: [state] CFI Enabled
2,891,128 UART: [fht] FMC Alias Private Key: 7
2,999,669 UART: [art] Extend RT PCRs Done
3,000,097 UART: [art] Lock RT PCRs Done
3,002,099 UART: [art] Populate DV Done
3,010,276 UART: [fht] FMC Alias Private Key: 7
3,011,268 UART: [art] Derive CDI
3,011,548 UART: [art] Store in in slot 0x4
3,096,907 UART: [art] Derive Key Pair
3,097,267 UART: [art] Store priv key in slot 0x5
3,110,251 UART: [art] Derive Key Pair - Done
3,125,290 UART: [art] Signing Cert with AUTHO
3,125,770 UART: RITY.KEYID = 7
3,140,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,505 UART: [art] PUB.X = 1AD5E67CB3D2DD0FF6EDF57DA23F130F5A3F6202D2ECE67DB25E595731CA873B002814B81597D1F5EBA1B72EAA891109
3,148,257 UART: [art] PUB.Y = 8BB5E46A1955EFCD15AB73CF35A6B5EB6F223A1E3ED76567AA53DFE3C5D235CA10FD5F4FD8E07C1CF6EF2C928C1DAFEE
3,155,241 UART: [art] SIG.R = 109C0258230C3A28FD90302925B500292E4ACFFC755B5763260752F6B509A3C8221C66851DBDAD857185A721ABF62302
3,161,966 UART: [art] SIG.S = 136AFDA8455A2369761C8BBE11AA7EE695D0D36A53B2A8BB2076084F3C4E8617250EF8E34BDDB9CED828AC62B8E6C274
3,185,469 UART: Caliptra RT
3,185,814 UART: [state] CFI Enabled
3,293,235 UART: [rt] RT listening for mailbox commands...
3,293,898 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,459 UART: [rt]cmd =0x46504c54, len=4
3,324,416 >>> mbox cmd response data (8 bytes)
3,324,779 UART: [rt] FIPS self test
3,325,107 UART: [kat] ++
3,325,259 UART: [kat] sha1
3,329,509 UART: [kat] SHA2-256
3,331,531 UART: [kat] SHA2-384
3,334,236 UART: [kat] SHA2-512-ACC
3,334,768 UART: Fatal Error: 0x90050001
3,336,318 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,336,323 >>> mbox cmd response: failed
3,336,323 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,336,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,936 UART: [kat] SHA2-256
903,876 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,075 UART: [kat] LMS
1,171,403 UART: [kat] --
1,172,414 UART: [cold-reset] ++
1,172,944 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,812 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,492 UART: [ldev] ++
1,211,660 UART: [ldev] CDI.KEYID = 6
1,212,023 UART: [ldev] SUBJECT.KEYID = 5
1,212,449 UART: [ldev] AUTHORITY.KEYID = 7
1,212,912 UART: [ldev] FE.KEYID = 1
1,218,112 UART: [ldev] Erasing FE.KEYID = 1
1,244,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,278 UART: [ldev] --
1,283,709 UART: [fwproc] Wait for Commands...
1,284,327 UART: [fwproc] Recv command 0x46574c44
1,285,055 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,092 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,277 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,830 ready_for_fw is high
1,060,830 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,980 >>> mbox cmd response: success
2,702,114 UART:
2,702,130 UART: Running Caliptra FMC ...
2,702,538 UART:
2,702,681 UART: [state] CFI Enabled
2,713,036 UART: [fht] FMC Alias Private Key: 7
2,820,895 UART: [art] Extend RT PCRs Done
2,821,323 UART: [art] Lock RT PCRs Done
2,822,909 UART: [art] Populate DV Done
2,830,994 UART: [fht] FMC Alias Private Key: 7
2,832,010 UART: [art] Derive CDI
2,832,290 UART: [art] Store in in slot 0x4
2,918,059 UART: [art] Derive Key Pair
2,918,419 UART: [art] Store priv key in slot 0x5
2,932,249 UART: [art] Derive Key Pair - Done
2,946,977 UART: [art] Signing Cert with AUTHO
2,947,457 UART: RITY.KEYID = 7
2,963,343 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,108 UART: [art] PUB.X = C543A74CF72B64FEDA70BA66035877DFA1451001B242166BE6BA97F418AF0FE4C3AF200B0EF5D7BBD0C45F4372F03D11
2,970,877 UART: [art] PUB.Y = 98A088E06C6BDEABDB5DFE98FFD5366F7D6997CEF018CFC8318988EF6D25D9D642E4A94982C2A6ACFFB9B920A24387D2
2,977,847 UART: [art] SIG.R = E1DA511882B2DFF2F345664BD23441A54A0B1D9EDCCDA40AECD129F4F2DA09AC729EAFC9ED0E7E6380199F0BAF1468AC
2,984,628 UART: [art] SIG.S = 4D541F8922DE5A45F54E9B9F46DD804E9EF30CE54A8D3C7E7E66E4A8DCC25DDDCB0B94E79F3B18DB29A82DA23FB01FD0
3,008,445 UART: Caliptra RT
3,008,790 UART: [state] CFI Enabled
3,116,149 UART: [rt] RT listening for mailbox commands...
3,116,812 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,543 UART: [rt]cmd =0x46504c54, len=4
3,147,700 >>> mbox cmd response data (8 bytes)
3,147,949 UART: [rt] FIPS self test
3,148,277 UART: [kat] ++
3,148,429 UART: [kat] sha1
3,152,637 UART: [kat] SHA2-256
3,154,659 UART: [kat] SHA2-384
3,157,500 UART: [kat] SHA2-512-ACC
3,158,026 UART: Fatal Error: 0x90050001
3,159,576 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,581 >>> mbox cmd response: failed
3,159,581 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,314 UART: [kat] LMS
1,169,626 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,170,969 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,174,911 ready_for_fw is high
1,174,911 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,825 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,689 UART: [idev] --
1,209,758 UART: [ldev] ++
1,209,926 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,717 UART: [ldev] AUTHORITY.KEYID = 7
1,211,180 UART: [ldev] FE.KEYID = 1
1,216,612 UART: [ldev] Erasing FE.KEYID = 1
1,242,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,980 UART: [ldev] --
1,282,324 UART: [fwproc] Wait for Commands...
1,282,907 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,526 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,746 >>> mbox cmd response: success
2,787,943 UART: [afmc] ++
2,788,111 UART: [afmc] CDI.KEYID = 6
2,788,474 UART: [afmc] SUBJECT.KEYID = 7
2,788,900 UART: [afmc] AUTHORITY.KEYID = 5
2,824,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,700 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,419 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,220 UART: [afmc] --
2,867,110 UART: [cold-reset] --
2,867,956 UART: [state] Locking Datavault
2,869,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,703 UART: [state] Locking ICCM
2,870,171 UART: [exit] Launching FMC @ 0x40000130
2,875,500 UART:
2,875,516 UART: Running Caliptra FMC ...
2,875,924 UART:
2,875,978 UART: [state] CFI Enabled
2,886,199 UART: [fht] FMC Alias Private Key: 7
2,993,722 UART: [art] Extend RT PCRs Done
2,994,150 UART: [art] Lock RT PCRs Done
2,995,446 UART: [art] Populate DV Done
3,003,831 UART: [fht] FMC Alias Private Key: 7
3,004,835 UART: [art] Derive CDI
3,005,115 UART: [art] Store in in slot 0x4
3,090,626 UART: [art] Derive Key Pair
3,090,986 UART: [art] Store priv key in slot 0x5
3,104,468 UART: [art] Derive Key Pair - Done
3,119,151 UART: [art] Signing Cert with AUTHO
3,119,631 UART: RITY.KEYID = 7
3,134,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,522 UART: [art] PUB.X = 302B2A8CF9EE8E00FC2158255DE2E592226E2D02174465D065289774086088B9D9330B89F6F263F5BA608091DDE0CE79
3,142,255 UART: [art] PUB.Y = 27E59A46D28D8A3B3FFFF2CB59C225433F6126BDDFDF899E5C3E0CC6E63A5A989D0A08E614A8E281B41DF95C94195298
3,149,208 UART: [art] SIG.R = D11BAE619E52D403167257052B89E1ECB8FA85EE208BDD3BB934FBF8F811234EA7A22B2524915BA132EF2B6A9602EBF4
3,155,981 UART: [art] SIG.S = 216BC4FE9B496BE842D43C1357FD261C76CDA98427BFFE139275A2ADD9A0DA457F55A324797930B99E85092B234DF28D
3,179,783 UART: Caliptra RT
3,180,036 UART: [state] CFI Enabled
3,287,405 UART: [rt] RT listening for mailbox commands...
3,288,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,797 UART: [rt]cmd =0x46504c54, len=4
3,318,764 >>> mbox cmd response data (8 bytes)
3,319,087 UART: [rt] FIPS self test
3,319,415 UART: [kat] ++
3,319,567 UART: [kat] sha1
3,323,873 UART: [kat] SHA2-256
3,325,895 UART: [kat] SHA2-384
3,328,712 UART: [kat] SHA2-512-ACC
3,329,338 UART: Fatal Error: 0x90050001
3,330,888 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,893 >>> mbox cmd response: failed
3,330,893 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
920,038 UART: [kat] LMS
1,168,350 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,625 UART: [fht] FHT @ 0x50003400
1,172,285 UART: [idev] ++
1,172,453 UART: [idev] CDI.KEYID = 6
1,172,814 UART: [idev] SUBJECT.KEYID = 7
1,173,239 UART: [idev] UDS.KEYID = 0
1,173,585 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,267 UART: [idev] --
1,208,416 UART: [ldev] ++
1,208,584 UART: [ldev] CDI.KEYID = 6
1,208,948 UART: [ldev] SUBJECT.KEYID = 5
1,209,375 UART: [ldev] AUTHORITY.KEYID = 7
1,209,838 UART: [ldev] FE.KEYID = 1
1,214,882 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,238 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,572 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,210 ready_for_fw is high
1,055,210 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,342 >>> mbox cmd response: success
2,697,444 UART:
2,697,460 UART: Running Caliptra FMC ...
2,697,868 UART:
2,697,922 UART: [state] CFI Enabled
2,708,233 UART: [fht] FMC Alias Private Key: 7
2,815,854 UART: [art] Extend RT PCRs Done
2,816,282 UART: [art] Lock RT PCRs Done
2,817,548 UART: [art] Populate DV Done
2,825,851 UART: [fht] FMC Alias Private Key: 7
2,827,027 UART: [art] Derive CDI
2,827,307 UART: [art] Store in in slot 0x4
2,913,030 UART: [art] Derive Key Pair
2,913,390 UART: [art] Store priv key in slot 0x5
2,926,344 UART: [art] Derive Key Pair - Done
2,941,157 UART: [art] Signing Cert with AUTHO
2,941,637 UART: RITY.KEYID = 7
2,956,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,736 UART: [art] PUB.X = B95C5976381C12AC611DC8E3BA01C3AF0523D7832B3E3458C20831A42E4020A966F4BCDDA13E34289732BF8D856407C4
2,964,494 UART: [art] PUB.Y = 6298A87D2038A02835B0A01D289410306E3FBF447E00A2F87059EA5C04C72ED2DCE3A364B1DFD88DE9F6700A5E019143
2,971,415 UART: [art] SIG.R = F7ED36F9D7FD297A98B4C2144F4B902B345BA88650410546CC34E1485F143845C13D28E2BB011F708F355BA713A208A8
2,978,174 UART: [art] SIG.S = 69C4C477F7CE50A09DDD21B6BFE232012FCA27DC76AE27895D93DC7D406746994342DD4B0DB0F1EB0F866003DA87B3F1
3,002,039 UART: Caliptra RT
3,002,292 UART: [state] CFI Enabled
3,109,683 UART: [rt] RT listening for mailbox commands...
3,110,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,195 UART: [rt]cmd =0x46504c54, len=4
3,141,268 >>> mbox cmd response data (8 bytes)
3,141,381 UART: [rt] FIPS self test
3,141,709 UART: [kat] ++
3,141,861 UART: [kat] sha1
3,146,053 UART: [kat] SHA2-256
3,148,075 UART: [kat] SHA2-384
3,150,856 UART: [kat] SHA2-512-ACC
3,151,334 UART: Fatal Error: 0x90050001
3,152,884 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,889 >>> mbox cmd response: failed
3,152,889 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,598 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,241,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,869 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,986 UART: [fwproc] Recv command 0x46574c44
1,282,719 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,449 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,831 >>> mbox cmd response: success
2,787,016 UART: [afmc] ++
2,787,184 UART: [afmc] CDI.KEYID = 6
2,787,547 UART: [afmc] SUBJECT.KEYID = 7
2,787,973 UART: [afmc] AUTHORITY.KEYID = 5
2,824,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,917 UART: [afmc] --
2,867,917 UART: [cold-reset] --
2,868,571 UART: [state] Locking Datavault
2,869,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,448 UART: [state] Locking ICCM
2,871,108 UART: [exit] Launching FMC @ 0x40000130
2,876,437 UART:
2,876,453 UART: Running Caliptra FMC ...
2,876,861 UART:
2,877,004 UART: [state] CFI Enabled
2,887,947 UART: [fht] FMC Alias Private Key: 7
2,995,660 UART: [art] Extend RT PCRs Done
2,996,088 UART: [art] Lock RT PCRs Done
2,997,700 UART: [art] Populate DV Done
3,006,129 UART: [fht] FMC Alias Private Key: 7
3,007,123 UART: [art] Derive CDI
3,007,403 UART: [art] Store in in slot 0x4
3,093,186 UART: [art] Derive Key Pair
3,093,546 UART: [art] Store priv key in slot 0x5
3,106,146 UART: [art] Derive Key Pair - Done
3,120,731 UART: [art] Signing Cert with AUTHO
3,121,211 UART: RITY.KEYID = 7
3,136,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,200 UART: [art] PUB.X = 9971B09A7B80651C1066551642D929FE0088DE8CEC6B3E1A057CD6B9E55E81DB346310F9864255E9EB4A60AFD0B1AB06
3,143,946 UART: [art] PUB.Y = 3ED7A18CAC8DA980102AFEC0D5B2FFB048A4867AC8A91266E4F2122A5EC0509803D9938F61AF9ED6C3871029EBBE75BB
3,150,909 UART: [art] SIG.R = 4E6114B15F7C9D9A200C692808A2B3D05B5DC2CA19DC25A4591ECC4395285CD975A44A0043AB6F6A8C8D4B7BA3A28027
3,157,659 UART: [art] SIG.S = 186135AF1E8250A7C44393387B440B4BBB2209E7D7D590503EB1CD8B693515192982545432F1AA30C131234E21C7AEA3
3,181,852 UART: Caliptra RT
3,182,197 UART: [state] CFI Enabled
3,290,544 UART: [rt] RT listening for mailbox commands...
3,291,207 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,272 UART: [rt]cmd =0x46504c54, len=4
3,322,451 >>> mbox cmd response data (8 bytes)
3,322,604 UART: [rt] FIPS self test
3,322,932 UART: [kat] ++
3,323,084 UART: [kat] sha1
3,327,214 UART: [kat] SHA2-256
3,329,236 UART: [kat] SHA2-384
3,332,205 UART: [kat] SHA2-512-ACC
3,332,833 UART: Fatal Error: 0x90050001
3,334,383 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,388 >>> mbox cmd response: failed
3,334,388 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,539 UART: [kat] LMS
1,168,851 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,173,908 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,274 UART: [idev] Erasing UDS.KEYID = 0
1,198,644 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,525 UART: [ldev] ++
1,208,693 UART: [ldev] CDI.KEYID = 6
1,209,057 UART: [ldev] SUBJECT.KEYID = 5
1,209,484 UART: [ldev] AUTHORITY.KEYID = 7
1,209,947 UART: [ldev] FE.KEYID = 1
1,215,113 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,435 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,821 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,089 ready_for_fw is high
1,056,089 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,563 >>> mbox cmd response: success
2,698,687 UART:
2,698,703 UART: Running Caliptra FMC ...
2,699,111 UART:
2,699,254 UART: [state] CFI Enabled
2,709,767 UART: [fht] FMC Alias Private Key: 7
2,817,360 UART: [art] Extend RT PCRs Done
2,817,788 UART: [art] Lock RT PCRs Done
2,819,060 UART: [art] Populate DV Done
2,827,319 UART: [fht] FMC Alias Private Key: 7
2,828,273 UART: [art] Derive CDI
2,828,553 UART: [art] Store in in slot 0x4
2,913,606 UART: [art] Derive Key Pair
2,913,966 UART: [art] Store priv key in slot 0x5
2,926,784 UART: [art] Derive Key Pair - Done
2,941,607 UART: [art] Signing Cert with AUTHO
2,942,087 UART: RITY.KEYID = 7
2,957,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,564 UART: [art] PUB.X = 97DF43F92C7478D10913884FFF420EA393044C515AB7DEF35454449708D96A74D224D130AA40F8419F0AE8250AA56093
2,965,310 UART: [art] PUB.Y = 80752AC5923B1EE6B7435A6698E20C40E1827ECDC4CFBD9C1E9EBDDCAD590F675539FE195830194F9BDF5F3C1EA9AAD6
2,972,274 UART: [art] SIG.R = F65A3875CC446EAAF3E4A057B37525A1241FBC7B86A3BBDE747C1090A99CD8453BA369B5DC44B0CD7959C41A426CE86B
2,979,058 UART: [art] SIG.S = 901E42BD3910B75A663C31CAE7EF298AEC91664E10BB509586CBACA54737B6D67B2D93E07E58DAFF2E5E33C68FFC91DC
3,003,361 UART: Caliptra RT
3,003,706 UART: [state] CFI Enabled
3,111,728 UART: [rt] RT listening for mailbox commands...
3,112,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,226 UART: [rt]cmd =0x46504c54, len=4
3,143,439 >>> mbox cmd response data (8 bytes)
3,143,688 UART: [rt] FIPS self test
3,144,016 UART: [kat] ++
3,144,168 UART: [kat] sha1
3,148,510 UART: [kat] SHA2-256
3,150,532 UART: [kat] SHA2-384
3,153,399 UART: [kat] SHA2-512-ACC
3,153,901 UART: Fatal Error: 0x90050001
3,155,451 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,456 >>> mbox cmd response: failed
3,155,456 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,795 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,565 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,690,239 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,834,563 >>> mbox cmd response: failed
2,835,116 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,978,453 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,866,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,436,146 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,685,615 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,829,839 >>> mbox cmd response: failed
2,830,392 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,973,583 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,868,500 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,441,407 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,040,385 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,184,608 >>> mbox cmd response: failed
3,185,189 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,328,542 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,581,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,015,104 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,041,500 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,185,912 >>> mbox cmd response: failed
3,186,475 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,329,832 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,582,019 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,016,031 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,700,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,238 >>> mbox cmd response: failed
2,845,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,064 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
3,440,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,251,599 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,700,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,409 >>> mbox cmd response: failed
2,845,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,215 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,454,122 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,185 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,075,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,219,658 >>> mbox cmd response: failed
3,220,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,363,956 >>> mbox cmd response: failed
Initializing fuses
986 writing to cptra_bootfsm_go
20,185,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,907,934 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
3,052,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,197,256 >>> mbox cmd response: failed
3,197,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,341,389 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,193,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,928,010 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,709,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,853,967 >>> mbox cmd response: failed
2,854,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,998,237 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,425,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,228,770 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,697,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,842,353 >>> mbox cmd response: failed
2,842,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,987,117 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,454,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,255,670 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,046,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,191,020 >>> mbox cmd response: failed
3,191,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,335,305 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,172,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,881,276 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,043,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,187,686 >>> mbox cmd response: failed
3,188,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,331,841 >>> mbox cmd response: failed
Initializing fuses
1,006 writing to cptra_bootfsm_go
20,178,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,915,361 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,806 >>> mbox cmd response: failed
809,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,050 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,794 >>> mbox cmd response: failed
809,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,800 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,824 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,761 >>> mbox cmd response: failed
809,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,903 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,097 >>> mbox cmd response: failed
810,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,727 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,314 >>> mbox cmd response: failed
809,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,672 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,760 >>> mbox cmd response: failed
809,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,804 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,275 >>> mbox cmd response: failed
810,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,571 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,895 >>> mbox cmd response: failed
809,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,901 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,337 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,182 >>> mbox cmd response: failed
810,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,586 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,870 >>> mbox cmd response: failed
809,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,546 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,965 >>> mbox cmd response: failed
809,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,367 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,805 >>> mbox cmd response: failed
810,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,495 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,512 UART:
192,898 UART: Running Caliptra ROM ...
194,092 UART:
194,253 UART: [state] CFI Enabled
259,388 UART: [state] LifecycleState = Unprovisioned
261,380 UART: [state] DebugLocked = No
263,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,857 UART: [kat] SHA2-256
438,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,021 UART: [kat] ++
449,507 UART: [kat] sha1
460,385 UART: [kat] SHA2-256
463,107 UART: [kat] SHA2-384
467,392 UART: [kat] SHA2-512-ACC
469,700 UART: [kat] ECC-384
2,768,996 UART: [kat] HMAC-384Kdf
2,800,662 UART: [kat] LMS
3,990,936 UART: [kat] --
3,995,812 UART: [cold-reset] ++
3,998,205 UART: [fht] Storing FHT @ 0x50003400
4,008,848 UART: [idev] ++
4,009,422 UART: [idev] CDI.KEYID = 6
4,010,462 UART: [idev] SUBJECT.KEYID = 7
4,011,648 UART: [idev] UDS.KEYID = 0
4,012,663 ready_for_fw is high
4,012,876 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,157,528 UART: [idev] Erasing UDS.KEYID = 0
7,347,371 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,613 UART: [idev] --
7,373,852 UART: [ldev] ++
7,374,431 UART: [ldev] CDI.KEYID = 6
7,375,405 UART: [ldev] SUBJECT.KEYID = 5
7,376,641 UART: [ldev] AUTHORITY.KEYID = 7
7,377,884 UART: [ldev] FE.KEYID = 1
7,422,803 UART: [ldev] Erasing FE.KEYID = 1
10,753,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,277 UART: [ldev] --
13,117,456 UART: [fwproc] Waiting for Commands...
13,120,425 UART: [fwproc] Received command 0x46574c44
13,122,610 UART: [fwproc] Received Image of size 114996 bytes
17,188,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,657,523 >>> mbox cmd response: success
17,661,178 UART: [afmc] ++
17,661,774 UART: [afmc] CDI.KEYID = 6
17,662,691 UART: [afmc] SUBJECT.KEYID = 7
17,663,969 UART: [afmc] AUTHORITY.KEYID = 5
21,028,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,883 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,273 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,111 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,449 UART: [afmc] --
23,401,609 UART: [cold-reset] --
23,405,253 UART: [state] Locking Datavault
23,410,066 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,829 UART: [state] Locking ICCM
23,413,438 UART: [exit] Launching FMC @ 0x40000130
23,421,798 UART:
23,422,035 UART: Running Caliptra FMC ...
23,423,139 UART:
23,423,296 UART: [state] CFI Enabled
23,488,964 UART: [fht] FMC Alias Private Key: 7
25,827,697 UART: [art] Extend RT PCRs Done
25,828,918 UART: [art] Lock RT PCRs Done
25,830,329 UART: [art] Populate DV Done
25,835,752 UART: [fht] FMC Alias Private Key: 7
25,837,332 UART: [art] Derive CDI
25,838,154 UART: [art] Store in in slot 0x4
25,897,360 UART: [art] Derive Key Pair
25,898,354 UART: [art] Store priv key in slot 0x5
29,191,385 UART: [art] Derive Key Pair - Done
29,204,357 UART: [art] Signing Cert with AUTHO
29,205,683 UART: RITY.KEYID = 7
31,493,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,203 UART: [art] PUB.X = 01217E350F989E516B5BBE39E953A92082AA1D59585FAEFC35C36FEB0A6B2DF1CC71CD83EDE02CC45DA5016661D0B57B
31,502,511 UART: [art] PUB.Y = EC4D228637294414AED3C567C6BEE5F630B78ADAF96B05B3DC801734B5064B364A7387CF4BFFFAC186E7FC810789CC52
31,509,708 UART: [art] SIG.R = 33431A53ED6B833B550CF7379D6F456216586EF00A191DB11FC1CFFFE1F025797B10949B1B1112363A186A9D85ADAF14
31,517,097 UART: [art] SIG.S = 7B536FFDB10AB802835EC09F2B03FFDB10829B857D195014549601306E016E3AEE3FC201D4C9279FAC9F453E953BA67D
32,822,061 UART: Caliptra RT
32,822,796 UART: [state] CFI Enabled
32,983,435 UART: [rt] RT listening for mailbox commands...
32,985,303 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,014,956 UART: [rt]cmd =0x46504c54, len=4
33,016,375 >>> mbox cmd response data (8 bytes)
33,017,263 UART: [rt] FIPS self test
33,018,218 UART: [kat] ++
33,018,674 UART: [kat] sha1
33,023,187 UART: [kat] SHA2-256
33,025,174 UART: [kat] SHA2-384
33,026,427 UART: Fatal Error: 0x90020001
33,061,820 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,206,312 >>> mbox cmd response: failed
33,206,960 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,351,214 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,020 UART:
190,313 UART: Running Caliptra ROM ...
191,338 UART:
191,477 UART: [state] CFI Enabled
256,877 UART: [state] LifecycleState = Unprovisioned
258,799 UART: [state] DebugLocked = No
261,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,411 UART: [kat] SHA2-256
437,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,654 UART: [kat] ++
448,130 UART: [kat] sha1
458,735 UART: [kat] SHA2-256
461,412 UART: [kat] SHA2-384
467,067 UART: [kat] SHA2-512-ACC
469,411 UART: [kat] ECC-384
2,757,193 UART: [kat] HMAC-384Kdf
2,788,648 UART: [kat] LMS
3,978,958 UART: [kat] --
3,983,618 UART: [cold-reset] ++
3,985,667 UART: [fht] Storing FHT @ 0x50003400
3,996,828 UART: [idev] ++
3,997,446 UART: [idev] CDI.KEYID = 6
3,998,327 UART: [idev] SUBJECT.KEYID = 7
3,999,592 UART: [idev] UDS.KEYID = 0
4,001,128 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,145,995 UART: [idev] Erasing UDS.KEYID = 0
7,339,705 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,450 UART: [idev] --
7,365,149 UART: [ldev] ++
7,365,779 UART: [ldev] CDI.KEYID = 6
7,366,664 UART: [ldev] SUBJECT.KEYID = 5
7,367,932 UART: [ldev] AUTHORITY.KEYID = 7
7,369,163 UART: [ldev] FE.KEYID = 1
7,411,926 UART: [ldev] Erasing FE.KEYID = 1
10,741,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,097,166 UART: [ldev] --
13,101,355 UART: [fwproc] Waiting for Commands...
13,104,012 UART: [fwproc] Received command 0x46574c44
13,106,214 UART: [fwproc] Received Image of size 114996 bytes
17,172,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,636,468 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,809,263 ready_for_fw is high
3,809,662 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,900,140 >>> mbox cmd response: success
23,593,896 UART:
23,594,292 UART: Running Caliptra FMC ...
23,595,405 UART:
23,595,563 UART: [state] CFI Enabled
23,661,292 UART: [fht] FMC Alias Private Key: 7
25,998,797 UART: [art] Extend RT PCRs Done
26,000,025 UART: [art] Lock RT PCRs Done
26,001,581 UART: [art] Populate DV Done
26,006,737 UART: [fht] FMC Alias Private Key: 7
26,008,407 UART: [art] Derive CDI
26,009,152 UART: [art] Store in in slot 0x4
26,069,563 UART: [art] Derive Key Pair
26,070,606 UART: [art] Store priv key in slot 0x5
29,363,251 UART: [art] Derive Key Pair - Done
29,376,192 UART: [art] Signing Cert with AUTHO
29,377,525 UART: RITY.KEYID = 7
31,663,970 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,490 UART: [art] PUB.X = 491E0BE395E17020AB9BF3F77747F62076380337212D2635B8B5312B131823721B7D1510DCB17AE9EB14CA1B0FC2CADB
31,672,753 UART: [art] PUB.Y = AE977C619DD9321D2424BEB0BB49556534CD151B8D278B6D81437CBD4DCBC63678B5C9B0CDEFFDA936DB26DCEE69CEAE
31,679,971 UART: [art] SIG.R = 2161AD49D6D543C9660FCC88BACF07B4E7A97D8EA96747B260CBE0A2A8BFC216AFE65EB72602572217F3B9C3543E4092
31,687,378 UART: [art] SIG.S = 6CA02B193F826A0C1374FFB0CBCED9C0FEAD0870003A2201821C9A6A68D945293018C166A5F86A1F919AD55623B44AFF
32,993,164 UART: Caliptra RT
32,993,879 UART: [state] CFI Enabled
33,155,051 UART: [rt] RT listening for mailbox commands...
33,156,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,186,452 UART: [rt]cmd =0x46504c54, len=4
33,188,085 >>> mbox cmd response data (8 bytes)
33,189,301 UART: [rt] FIPS self test
33,190,249 UART: [kat] ++
33,190,704 UART: [kat] sha1
33,195,104 UART: [kat] SHA2-256
33,197,035 UART: [kat] SHA2-384
33,198,597 UART: Fatal Error: 0x90020001
33,233,992 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,378,440 >>> mbox cmd response: failed
33,379,076 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,523,281 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,773,117 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,878,326 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
192,797 UART:
193,156 UART: Running Caliptra ROM ...
194,259 UART:
604,006 UART: [state] CFI Enabled
618,494 UART: [state] LifecycleState = Unprovisioned
620,470 UART: [state] DebugLocked = No
621,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,462 UART: [kat] SHA2-256
797,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,728 UART: [kat] ++
808,172 UART: [kat] sha1
819,614 UART: [kat] SHA2-256
822,335 UART: [kat] SHA2-384
828,465 UART: [kat] SHA2-512-ACC
830,841 UART: [kat] ECC-384
3,115,713 UART: [kat] HMAC-384Kdf
3,126,388 UART: [kat] LMS
4,316,498 UART: [kat] --
4,319,638 UART: [cold-reset] ++
4,321,499 UART: [fht] Storing FHT @ 0x50003400
4,332,906 UART: [idev] ++
4,333,476 UART: [idev] CDI.KEYID = 6
4,334,511 UART: [idev] SUBJECT.KEYID = 7
4,335,683 UART: [idev] UDS.KEYID = 0
4,336,653 ready_for_fw is high
4,336,843 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,481,273 UART: [idev] Erasing UDS.KEYID = 0
7,618,584 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,270 UART: [idev] --
7,644,015 UART: [ldev] ++
7,644,590 UART: [ldev] CDI.KEYID = 6
7,645,554 UART: [ldev] SUBJECT.KEYID = 5
7,646,770 UART: [ldev] AUTHORITY.KEYID = 7
7,648,022 UART: [ldev] FE.KEYID = 1
7,659,047 UART: [ldev] Erasing FE.KEYID = 1
10,941,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,177 UART: [ldev] --
13,302,573 UART: [fwproc] Waiting for Commands...
13,305,534 UART: [fwproc] Received command 0x46574c44
13,307,729 UART: [fwproc] Received Image of size 114996 bytes
17,378,072 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,805 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,843,670 >>> mbox cmd response: success
17,848,162 UART: [afmc] ++
17,848,772 UART: [afmc] CDI.KEYID = 6
17,849,669 UART: [afmc] SUBJECT.KEYID = 7
17,850,886 UART: [afmc] AUTHORITY.KEYID = 5
21,162,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,821 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,081 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,283 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,764 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,103 UART: [afmc] --
23,526,384 UART: [cold-reset] --
23,530,621 UART: [state] Locking Datavault
23,536,785 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,540 UART: [state] Locking ICCM
23,540,798 UART: [exit] Launching FMC @ 0x40000130
23,549,204 UART:
23,549,461 UART: Running Caliptra FMC ...
23,550,570 UART:
23,550,735 UART: [state] CFI Enabled
23,558,675 UART: [fht] FMC Alias Private Key: 7
25,889,413 UART: [art] Extend RT PCRs Done
25,890,645 UART: [art] Lock RT PCRs Done
25,892,270 UART: [art] Populate DV Done
25,897,660 UART: [fht] FMC Alias Private Key: 7
25,899,320 UART: [art] Derive CDI
25,900,139 UART: [art] Store in in slot 0x4
25,943,005 UART: [art] Derive Key Pair
25,944,010 UART: [art] Store priv key in slot 0x5
29,186,282 UART: [art] Derive Key Pair - Done
29,199,604 UART: [art] Signing Cert with AUTHO
29,200,906 UART: RITY.KEYID = 7
31,480,381 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,913 UART: [art] PUB.X = 64987BA5B62BF7F7D97E5AED9D180B0685E4FF50E99A1BDAFB5BDDB56314D50C85CDD66596B723E44CFAD8149D903D4A
31,489,166 UART: [art] PUB.Y = D68FC1AF89A204DEF33E176023AA1B076BA25294E746DF2E9FF9D9D9358838C63CBE78A81DC6AFFED0102A12B71C5437
31,496,421 UART: [art] SIG.R = 6774F20E58FBEA55DA980EB0C44C40D2ABBBBC3EF54E26F3EFF732D9F1D4FE0B4DD7EBC065D69CA3D845CBF981D28976
31,503,829 UART: [art] SIG.S = 8641E4323733856D6A31E921EFF808C7557EA994C8E79C250AA99468C63D10698DCE0EDFD6E57DDF26CB269356752BF2
32,808,922 UART: Caliptra RT
32,809,642 UART: [state] CFI Enabled
32,928,130 UART: [rt] RT listening for mailbox commands...
32,929,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,959,513 UART: [rt]cmd =0x46504c54, len=4
32,961,026 >>> mbox cmd response data (8 bytes)
32,962,474 UART: [rt] FIPS self test
32,963,418 UART: [kat] ++
32,963,872 UART: [kat] sha1
32,968,384 UART: [kat] SHA2-256
32,970,312 UART: [kat] SHA2-384
32,971,601 UART: Fatal Error: 0x90020001
33,006,832 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,151,254 >>> mbox cmd response: failed
33,151,920 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,296,310 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,027 UART:
190,322 UART: Running Caliptra ROM ...
191,432 UART:
7,216,739 UART: [state] CFI Enabled
7,231,624 UART: [state] LifecycleState = Unprovisioned
7,233,544 UART: [state] DebugLocked = No
7,234,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,240,242 UART: [kat] SHA2-256
7,409,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,420,515 UART: [kat] ++
7,421,081 UART: [kat] sha1
7,432,792 UART: [kat] SHA2-256
7,435,479 UART: [kat] SHA2-384
7,440,385 UART: [kat] SHA2-512-ACC
7,442,742 UART: [kat] ECC-384
9,727,451 UART: [kat] HMAC-384Kdf
9,739,250 UART: [kat] LMS
10,929,364 UART: [kat] --
10,934,444 UART: [cold-reset] ++
10,935,513 UART: [fht] Storing FHT @ 0x50003400
10,947,482 UART: [idev] ++
10,948,048 UART: [idev] CDI.KEYID = 6
10,949,011 UART: [idev] SUBJECT.KEYID = 7
10,950,226 UART: [idev] UDS.KEYID = 0
10,951,805 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,096,173 UART: [idev] Erasing UDS.KEYID = 0
14,239,065 UART: [idev] Using Sha1 for KeyId Algorithm
14,259,374 UART: [idev] --
14,263,963 UART: [ldev] ++
14,264,532 UART: [ldev] CDI.KEYID = 6
14,265,492 UART: [ldev] SUBJECT.KEYID = 5
14,266,706 UART: [ldev] AUTHORITY.KEYID = 7
14,267,941 UART: [ldev] FE.KEYID = 1
14,277,188 UART: [ldev] Erasing FE.KEYID = 1
17,566,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,859,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,873,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,888,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,903,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,921,041 UART: [ldev] --
19,926,366 UART: [fwproc] Waiting for Commands...
19,929,113 UART: [fwproc] Received command 0x46574c44
19,931,319 UART: [fwproc] Received Image of size 114996 bytes
23,999,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,075,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,144,511 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,465,274 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
4,130,065 ready_for_fw is high
4,130,493 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,102,453 >>> mbox cmd response: success
23,745,074 UART:
23,745,493 UART: Running Caliptra FMC ...
23,746,660 UART:
23,746,820 UART: [state] CFI Enabled
23,754,555 UART: [fht] FMC Alias Private Key: 7
26,085,080 UART: [art] Extend RT PCRs Done
26,086,305 UART: [art] Lock RT PCRs Done
26,087,720 UART: [art] Populate DV Done
26,093,088 UART: [fht] FMC Alias Private Key: 7
26,094,751 UART: [art] Derive CDI
26,095,574 UART: [art] Store in in slot 0x4
26,138,360 UART: [art] Derive Key Pair
26,139,426 UART: [art] Store priv key in slot 0x5
29,381,666 UART: [art] Derive Key Pair - Done
29,394,577 UART: [art] Signing Cert with AUTHO
29,395,880 UART: RITY.KEYID = 7
31,675,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,676,688 UART: [art] PUB.X = 41885C3333C211F813346759A98E792CE7CFE1CC6187CECE4FAE4FFD6573E1369DC9519C0CDF37818F653FC5F4A04BC6
31,683,955 UART: [art] PUB.Y = A3BD59CF7A463AFE5D66B8434BB1FE053B72E25E820BF811034741BEF6904E7C2C9A2AB31627A82E9ECC0CA22D3CC06A
31,691,210 UART: [art] SIG.R = 3542975A52CEF089964808B2C01347CEC7B660A95DA69011786DEE9B11E549B8A41751B889E1CD08E0F1886F9500DE6C
31,698,546 UART: [art] SIG.S = 721334CE9D27B89D89C5422CB6B8E2EF31024EA09571F71C3025E56D2B5B3CFABCDFD87B2115E17252979B182FC0BE29
33,003,826 UART: Caliptra RT
33,004,546 UART: [state] CFI Enabled
33,122,767 UART: [rt] RT listening for mailbox commands...
33,124,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,154,362 UART: [rt]cmd =0x46504c54, len=4
33,155,991 >>> mbox cmd response data (8 bytes)
33,157,175 UART: [rt] FIPS self test
33,158,116 UART: [kat] ++
33,158,565 UART: [kat] sha1
33,163,239 UART: [kat] SHA2-256
33,165,165 UART: [kat] SHA2-384
33,166,618 UART: Fatal Error: 0x90020001
33,202,023 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,346,545 >>> mbox cmd response: failed
33,347,199 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,491,394 >>> mbox cmd response: failed
Initializing fuses
1,526 writing to cptra_bootfsm_go
10,566,861 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,531,493 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,282 UART:
192,656 UART: Running Caliptra ROM ...
193,869 UART:
194,022 UART: [state] CFI Enabled
265,344 UART: [state] LifecycleState = Unprovisioned
267,268 UART: [state] DebugLocked = No
268,879 UART: [state] WD Timer not started. Device not locked for debugging
272,550 UART: [kat] SHA2-256
451,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,236 UART: [kat] ++
463,708 UART: [kat] sha1
473,591 UART: [kat] SHA2-256
476,597 UART: [kat] SHA2-384
482,943 UART: [kat] SHA2-512-ACC
485,889 UART: [kat] ECC-384
2,950,717 UART: [kat] HMAC-384Kdf
2,974,262 UART: [kat] LMS
3,503,741 UART: [kat] --
3,510,292 UART: [cold-reset] ++
3,512,083 UART: [fht] FHT @ 0x50003400
3,524,063 UART: [idev] ++
3,524,635 UART: [idev] CDI.KEYID = 6
3,525,670 UART: [idev] SUBJECT.KEYID = 7
3,526,771 UART: [idev] UDS.KEYID = 0
3,527,697 ready_for_fw is high
3,527,907 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,672,947 UART: [idev] Erasing UDS.KEYID = 0
6,027,925 UART: [idev] Sha1 KeyId Algorithm
6,049,335 UART: [idev] --
6,052,353 UART: [ldev] ++
6,052,988 UART: [ldev] CDI.KEYID = 6
6,053,914 UART: [ldev] SUBJECT.KEYID = 5
6,054,964 UART: [ldev] AUTHORITY.KEYID = 7
6,056,311 UART: [ldev] FE.KEYID = 1
6,102,230 UART: [ldev] Erasing FE.KEYID = 1
8,606,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,141 UART: [ldev] --
10,418,298 UART: [fwproc] Wait for Commands...
10,420,410 UART: [fwproc] Recv command 0x46574c44
10,422,510 UART: [fwproc] Recv'd Img size: 115304 bytes
13,838,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,258 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,304,271 >>> mbox cmd response: success
14,309,172 UART: [afmc] ++
14,309,764 UART: [afmc] CDI.KEYID = 6
14,310,677 UART: [afmc] SUBJECT.KEYID = 7
14,311,839 UART: [afmc] AUTHORITY.KEYID = 5
16,853,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,594,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,610,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,626,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,648,411 UART: [afmc] --
18,652,067 UART: [cold-reset] --
18,655,499 UART: [state] Locking Datavault
18,661,014 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,661 UART: [state] Locking ICCM
18,664,863 UART: [exit] Launching FMC @ 0x40000130
18,673,261 UART:
18,673,497 UART: Running Caliptra FMC ...
18,674,598 UART:
18,674,760 UART: [state] CFI Enabled
18,735,497 UART: [fht] FMC Alias Private Key: 7
20,499,272 UART: [art] Extend RT PCRs Done
20,500,477 UART: [art] Lock RT PCRs Done
20,502,236 UART: [art] Populate DV Done
20,507,543 UART: [fht] FMC Alias Private Key: 7
20,509,081 UART: [art] Derive CDI
20,509,863 UART: [art] Store in in slot 0x4
20,568,250 UART: [art] Derive Key Pair
20,569,289 UART: [art] Store priv key in slot 0x5
23,031,790 UART: [art] Derive Key Pair - Done
23,045,004 UART: [art] Signing Cert with AUTHO
23,046,317 UART: RITY.KEYID = 7
24,758,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,105 UART: [art] PUB.X = 625FF7B50DFE9B428708C54570118AD3E71EB80E2B4D92D871C738166A7B72B728450932112A4E4C3657CF5EE6E510B3
24,767,414 UART: [art] PUB.Y = D5699305907AC932EAD4311D29FC58CA467C64B8322227FE781A778BDDFF432F5CE394BA99DAA5703AD1DB28803DAE32
24,774,687 UART: [art] SIG.R = A65A507F3E1596E23CABCDEF65D89EF76AAFF70FDB01F8DD94A646A1E0E13A160BE3B3E0FC27CA66B239ED0C80145672
24,782,101 UART: [art] SIG.S = C0D1367763C0CC0C066D0C1D9F7757BCE78D14E8D313A76F76E50BB5ECB73EF645B8F3119E9D5548ADCBD7C3159A60F2
25,760,880 UART: Caliptra RT
25,761,580 UART: [state] CFI Enabled
25,926,801 UART: [rt] RT listening for mailbox commands...
25,928,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,377 UART: [rt]cmd =0x46504c54, len=4
25,959,915 >>> mbox cmd response data (8 bytes)
25,960,882 UART: [rt] FIPS self test
25,961,824 UART: [kat] ++
25,962,278 UART: [kat] sha1
25,966,840 UART: [kat] SHA2-256
25,968,767 UART: [kat] SHA2-384
25,969,944 UART: Fatal Error: 0x90020001
26,005,311 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,150,132 >>> mbox cmd response: failed
26,150,774 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,295,512 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,048 UART:
190,334 UART: Running Caliptra ROM ...
191,362 UART:
191,522 UART: [state] CFI Enabled
252,648 UART: [state] LifecycleState = Unprovisioned
254,563 UART: [state] DebugLocked = No
255,832 UART: [state] WD Timer not started. Device not locked for debugging
259,616 UART: [kat] SHA2-256
438,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,322 UART: [kat] ++
450,848 UART: [kat] sha1
461,728 UART: [kat] SHA2-256
464,778 UART: [kat] SHA2-384
470,541 UART: [kat] SHA2-512-ACC
473,477 UART: [kat] ECC-384
2,936,831 UART: [kat] HMAC-384Kdf
2,959,321 UART: [kat] LMS
3,488,750 UART: [kat] --
3,493,015 UART: [cold-reset] ++
3,495,616 UART: [fht] FHT @ 0x50003400
3,506,595 UART: [idev] ++
3,507,165 UART: [idev] CDI.KEYID = 6
3,508,047 UART: [idev] SUBJECT.KEYID = 7
3,509,260 UART: [idev] UDS.KEYID = 0
3,510,819 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,655,861 UART: [idev] Erasing UDS.KEYID = 0
6,014,336 UART: [idev] Sha1 KeyId Algorithm
6,037,248 UART: [idev] --
6,042,007 UART: [ldev] ++
6,042,596 UART: [ldev] CDI.KEYID = 6
6,043,481 UART: [ldev] SUBJECT.KEYID = 5
6,044,701 UART: [ldev] AUTHORITY.KEYID = 7
6,045,942 UART: [ldev] FE.KEYID = 1
6,088,526 UART: [ldev] Erasing FE.KEYID = 1
8,591,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,335 UART: [ldev] --
10,403,881 UART: [fwproc] Wait for Commands...
10,405,617 UART: [fwproc] Recv command 0x46574c44
10,407,719 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,406 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,287,493 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,380,301 ready_for_fw is high
3,380,949 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,085,007 >>> mbox cmd response: success
18,364,648 UART:
18,365,055 UART: Running Caliptra FMC ...
18,366,209 UART:
18,366,372 UART: [state] CFI Enabled
18,433,050 UART: [fht] FMC Alias Private Key: 7
20,197,232 UART: [art] Extend RT PCRs Done
20,198,465 UART: [art] Lock RT PCRs Done
20,200,116 UART: [art] Populate DV Done
20,205,423 UART: [fht] FMC Alias Private Key: 7
20,206,964 UART: [art] Derive CDI
20,207,782 UART: [art] Store in in slot 0x4
20,266,131 UART: [art] Derive Key Pair
20,267,137 UART: [art] Store priv key in slot 0x5
22,730,286 UART: [art] Derive Key Pair - Done
22,742,768 UART: [art] Signing Cert with AUTHO
22,744,074 UART: RITY.KEYID = 7
24,456,071 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,581 UART: [art] PUB.X = A9B181918D4E562531AB292EB406681BD8AC73DFF3776F96D63004A534AAAED64ED7937E5730ED8CE50718454BC3576E
24,464,843 UART: [art] PUB.Y = F821791F03D38307C15EF085D2C6377CB901A9AD7929738B156CB12A44C75B5DEB2879FA0086ED9F247F42F46DED0A3F
24,472,058 UART: [art] SIG.R = A88A6C454F07710E8EF7C34A1B14E90A1B42F019BA8EAD4F067E37760FDC25A9CF6115CA4105901650AB79C7746A20C0
24,479,470 UART: [art] SIG.S = CE54ED63090023AEB26E2BDAE53AE19E8F8FCCC8BB2244E62037E308C6CE86C78B36C9D12EAF0358100425468B75ADD7
25,457,755 UART: Caliptra RT
25,458,459 UART: [state] CFI Enabled
25,623,386 UART: [rt] RT listening for mailbox commands...
25,625,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,919 UART: [rt]cmd =0x46504c54, len=4
25,656,526 >>> mbox cmd response data (8 bytes)
25,657,646 UART: [rt] FIPS self test
25,658,590 UART: [kat] ++
25,659,086 UART: [kat] sha1
25,663,546 UART: [kat] SHA2-256
25,665,486 UART: [kat] SHA2-384
25,666,931 UART: Fatal Error: 0x90020001
25,702,114 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,846,987 >>> mbox cmd response: failed
25,847,608 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,992,396 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,349,319 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,078,045 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,424 UART:
192,798 UART: Running Caliptra ROM ...
193,915 UART:
603,416 UART: [state] CFI Enabled
615,833 UART: [state] LifecycleState = Unprovisioned
617,712 UART: [state] DebugLocked = No
620,652 UART: [state] WD Timer not started. Device not locked for debugging
624,034 UART: [kat] SHA2-256
803,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,740 UART: [kat] ++
815,186 UART: [kat] sha1
827,283 UART: [kat] SHA2-256
830,254 UART: [kat] SHA2-384
835,541 UART: [kat] SHA2-512-ACC
838,484 UART: [kat] ECC-384
3,279,915 UART: [kat] HMAC-384Kdf
3,292,857 UART: [kat] LMS
3,822,316 UART: [kat] --
3,827,183 UART: [cold-reset] ++
3,829,404 UART: [fht] FHT @ 0x50003400
3,840,337 UART: [idev] ++
3,840,911 UART: [idev] CDI.KEYID = 6
3,841,947 UART: [idev] SUBJECT.KEYID = 7
3,843,051 UART: [idev] UDS.KEYID = 0
3,843,982 ready_for_fw is high
3,844,188 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,988,985 UART: [idev] Erasing UDS.KEYID = 0
6,313,590 UART: [idev] Sha1 KeyId Algorithm
6,336,744 UART: [idev] --
6,339,067 UART: [ldev] ++
6,339,644 UART: [ldev] CDI.KEYID = 6
6,340,525 UART: [ldev] SUBJECT.KEYID = 5
6,341,651 UART: [ldev] AUTHORITY.KEYID = 7
6,342,984 UART: [ldev] FE.KEYID = 1
6,351,428 UART: [ldev] Erasing FE.KEYID = 1
8,822,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,030 UART: [ldev] --
10,612,293 UART: [fwproc] Wait for Commands...
10,614,117 UART: [fwproc] Recv command 0x46574c44
10,616,210 UART: [fwproc] Recv'd Img size: 115304 bytes
14,037,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,225 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,500,422 >>> mbox cmd response: success
14,504,621 UART: [afmc] ++
14,505,232 UART: [afmc] CDI.KEYID = 6
14,506,123 UART: [afmc] SUBJECT.KEYID = 7
14,507,230 UART: [afmc] AUTHORITY.KEYID = 5
17,011,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,061 UART: [afmc] --
18,807,435 UART: [cold-reset] --
18,809,296 UART: [state] Locking Datavault
18,815,027 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,669 UART: [state] Locking ICCM
18,819,086 UART: [exit] Launching FMC @ 0x40000130
18,827,485 UART:
18,827,758 UART: Running Caliptra FMC ...
18,828,870 UART:
18,829,027 UART: [state] CFI Enabled
18,837,097 UART: [fht] FMC Alias Private Key: 7
20,594,368 UART: [art] Extend RT PCRs Done
20,595,586 UART: [art] Lock RT PCRs Done
20,597,453 UART: [art] Populate DV Done
20,602,764 UART: [fht] FMC Alias Private Key: 7
20,604,303 UART: [art] Derive CDI
20,605,065 UART: [art] Store in in slot 0x4
20,647,984 UART: [art] Derive Key Pair
20,648,987 UART: [art] Store priv key in slot 0x5
23,075,242 UART: [art] Derive Key Pair - Done
23,088,177 UART: [art] Signing Cert with AUTHO
23,089,489 UART: RITY.KEYID = 7
24,794,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,429 UART: [art] PUB.X = CD51348EFCD210D3E36D76081C893A0BE9D46A011BFB0FFC040D24AF6D93934FD9182B20BA3D70719E845F639D330C3B
24,803,740 UART: [art] PUB.Y = 7F54F5613F242FEF757C2633BA3D0517926F82E271935297BC2D68217421F160AD430A3165A2E9EC867CC71B58F52B42
24,810,934 UART: [art] SIG.R = 555EC0457BB97A7289D59CA22D7BFC5569DF2E302E99E7B4179E2D386E52F5028B52E421044701500ACF46DD6F747D52
24,818,351 UART: [art] SIG.S = 3DEA7FC25C34EBB37DA07FD65FFB28F5418EEBD9DD5917D21CA265D46890E5C4F10BD0F35C71C966A23556B98576F661
25,797,382 UART: Caliptra RT
25,798,084 UART: [state] CFI Enabled
25,915,685 UART: [rt] RT listening for mailbox commands...
25,917,532 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,947,422 UART: [rt]cmd =0x46504c54, len=4
25,948,809 >>> mbox cmd response data (8 bytes)
25,949,910 UART: [rt] FIPS self test
25,950,856 UART: [kat] ++
25,951,306 UART: [kat] sha1
25,955,848 UART: [kat] SHA2-256
25,957,775 UART: [kat] SHA2-384
25,958,897 UART: Fatal Error: 0x90020001
25,994,098 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,138,889 >>> mbox cmd response: failed
26,139,566 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,284,372 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,035 UART:
190,330 UART: Running Caliptra ROM ...
191,351 UART:
14,240,922 UART: [state] CFI Enabled
14,254,987 UART: [state] LifecycleState = Unprovisioned
14,256,849 UART: [state] DebugLocked = No
14,258,744 UART: [state] WD Timer not started. Device not locked for debugging
14,263,020 UART: [kat] SHA2-256
14,442,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,453,694 UART: [kat] ++
14,454,148 UART: [kat] sha1
14,467,022 UART: [kat] SHA2-256
14,470,022 UART: [kat] SHA2-384
14,477,171 UART: [kat] SHA2-512-ACC
14,480,166 UART: [kat] ECC-384
16,921,297 UART: [kat] HMAC-384Kdf
16,934,276 UART: [kat] LMS
17,463,768 UART: [kat] --
17,468,856 UART: [cold-reset] ++
17,470,036 UART: [fht] FHT @ 0x50003400
17,480,934 UART: [idev] ++
17,481,499 UART: [idev] CDI.KEYID = 6
17,482,435 UART: [idev] SUBJECT.KEYID = 7
17,483,647 UART: [idev] UDS.KEYID = 0
17,485,141 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,629,899 UART: [idev] Erasing UDS.KEYID = 0
19,958,641 UART: [idev] Sha1 KeyId Algorithm
19,981,108 UART: [idev] --
19,983,993 UART: [ldev] ++
19,984,588 UART: [ldev] CDI.KEYID = 6
19,985,469 UART: [ldev] SUBJECT.KEYID = 5
19,986,626 UART: [ldev] AUTHORITY.KEYID = 7
19,987,913 UART: [ldev] FE.KEYID = 1
19,999,883 UART: [ldev] Erasing FE.KEYID = 1
22,473,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,192,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,208,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,224,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,239,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,259,246 UART: [ldev] --
24,263,859 UART: [fwproc] Wait for Commands...
24,265,466 UART: [fwproc] Recv command 0x46574c44
24,267,566 UART: [fwproc] Recv'd Img size: 115304 bytes
27,686,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,754,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,823,624 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,145,299 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,691,538 ready_for_fw is high
3,692,115 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,281,025 >>> mbox cmd response: success
18,530,554 UART:
18,530,946 UART: Running Caliptra FMC ...
18,532,102 UART:
18,532,273 UART: [state] CFI Enabled
18,540,204 UART: [fht] FMC Alias Private Key: 7
20,296,651 UART: [art] Extend RT PCRs Done
20,297,883 UART: [art] Lock RT PCRs Done
20,299,567 UART: [art] Populate DV Done
20,305,090 UART: [fht] FMC Alias Private Key: 7
20,306,672 UART: [art] Derive CDI
20,307,430 UART: [art] Store in in slot 0x4
20,350,197 UART: [art] Derive Key Pair
20,351,201 UART: [art] Store priv key in slot 0x5
22,778,374 UART: [art] Derive Key Pair - Done
22,791,099 UART: [art] Signing Cert with AUTHO
22,792,437 UART: RITY.KEYID = 7
24,498,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,665 UART: [art] PUB.X = AC6C59F64F7AC94D6E9A778531D5DC6DF650BD50BD8420BF1A636E0222959BC85AC685BEE523198FB95408A163D8088D
24,506,927 UART: [art] PUB.Y = 54365DD909E417C5BCCB06FAB96C8A2AEAF804F83CE170D4ED78827CC7C0C341A4B5308442DFDB1F12D2BCAD301DA139
24,514,200 UART: [art] SIG.R = 8EAEE0D04277D16FBC6840FAE7ADF8F5D60EDF61F4F797889841C73C6F7C9A3E75062CAB037C01B70DDEE916025D5B06
24,521,599 UART: [art] SIG.S = 33DCE36156FE6BF47527419A332D5E3CF210BB865D41E2AC414E7BB3EFC6ACF45D1DA036CD5E91159FA484B44380BDE8
25,500,649 UART: Caliptra RT
25,501,366 UART: [state] CFI Enabled
25,617,583 UART: [rt] RT listening for mailbox commands...
25,619,434 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,649,264 UART: [rt]cmd =0x46504c54, len=4
25,650,918 >>> mbox cmd response data (8 bytes)
25,651,964 UART: [rt] FIPS self test
25,652,911 UART: [kat] ++
25,653,359 UART: [kat] sha1
25,657,920 UART: [kat] SHA2-256
25,659,845 UART: [kat] SHA2-384
25,661,184 UART: Fatal Error: 0x90020001
25,696,537 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,841,414 >>> mbox cmd response: failed
25,842,047 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,986,833 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,634,772 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,219,306 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,147 UART:
192,511 UART: Running Caliptra ROM ...
193,619 UART:
193,759 UART: [state] CFI Enabled
265,594 UART: [state] LifecycleState = Unprovisioned
268,005 UART: [state] DebugLocked = No
270,673 UART: [state] WD Timer not started. Device not locked for debugging
275,210 UART: [kat] SHA2-256
465,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,874 UART: [kat] ++
476,328 UART: [kat] sha1
489,003 UART: [kat] SHA2-256
492,030 UART: [kat] SHA2-384
497,601 UART: [kat] SHA2-512-ACC
500,191 UART: [kat] ECC-384
2,949,728 UART: [kat] HMAC-384Kdf
2,970,982 UART: [kat] LMS
3,502,745 UART: [kat] --
3,509,293 UART: [cold-reset] ++
3,510,581 UART: [fht] FHT @ 0x50003400
3,522,205 UART: [idev] ++
3,522,919 UART: [idev] CDI.KEYID = 6
3,523,800 UART: [idev] SUBJECT.KEYID = 7
3,525,048 UART: [idev] UDS.KEYID = 0
3,525,955 ready_for_fw is high
3,526,162 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,671,215 UART: [idev] Erasing UDS.KEYID = 0
6,029,121 UART: [idev] Sha1 KeyId Algorithm
6,050,760 UART: [idev] --
6,055,326 UART: [ldev] ++
6,056,016 UART: [ldev] CDI.KEYID = 6
6,056,943 UART: [ldev] SUBJECT.KEYID = 5
6,058,105 UART: [ldev] AUTHORITY.KEYID = 7
6,059,342 UART: [ldev] FE.KEYID = 1
6,099,482 UART: [ldev] Erasing FE.KEYID = 1
8,603,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,075 UART: [ldev] --
10,411,936 UART: [fwproc] Wait for Commands...
10,414,950 UART: [fwproc] Recv command 0x46574c44
10,417,232 UART: [fwproc] Recv'd Img size: 115304 bytes
13,882,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,959,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,109 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,624,509 >>> mbox cmd response: success
14,628,275 UART: [afmc] ++
14,628,977 UART: [afmc] CDI.KEYID = 6
14,630,083 UART: [afmc] SUBJECT.KEYID = 7
14,631,621 UART: [afmc] AUTHORITY.KEYID = 5
17,168,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,741 UART: [afmc] --
18,967,945 UART: [cold-reset] --
18,973,378 UART: [state] Locking Datavault
18,980,676 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,869 UART: [state] Locking ICCM
18,984,154 UART: [exit] Launching FMC @ 0x40000130
18,992,825 UART:
18,993,057 UART: Running Caliptra FMC ...
18,994,161 UART:
18,994,319 UART: [state] CFI Enabled
19,051,213 UART: [fht] FMC Alias Private Key: 7
20,815,959 UART: [art] Extend RT PCRs Done
20,817,189 UART: [art] Lock RT PCRs Done
20,818,950 UART: [art] Populate DV Done
20,824,522 UART: [fht] FMC Alias Private Key: 7
20,826,055 UART: [art] Derive CDI
20,826,792 UART: [art] Store in in slot 0x4
20,883,357 UART: [art] Derive Key Pair
20,884,460 UART: [art] Store priv key in slot 0x5
23,347,373 UART: [art] Derive Key Pair - Done
23,360,650 UART: [art] Signing Cert with AUTHO
23,361,959 UART: RITY.KEYID = 7
25,072,782 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,280 UART: [art] PUB.X = 533701E1D0C0B8931EE4C3FDB130E2ABF733DDB725C6EF60774EEC28BFB25504F9FFADCB595934C44F3704C2D842C237
25,081,542 UART: [art] PUB.Y = C8DDC7AECC1CA78FE6BF6378098EF5E8C87A05F0CDC30A17CAE5E12CF19E4EFEA42949AADF15628E9E87D3DE8B9ABBD2
25,088,867 UART: [art] SIG.R = C8118335880D88CCAA93EAE7C87E2C711D565AF7E051546AE69367E02B0020E7F04D700A3CC7A974EC7C182F31BF0F9B
25,096,227 UART: [art] SIG.S = CFB2EB14F2E349256A1061949FA812F58235355064F86C26B8A8459FFF5A53520ACD891566C88BC6EA657A4F8B7BB64F
26,074,798 UART: Caliptra RT
26,075,524 UART: [state] CFI Enabled
26,239,785 UART: [rt] RT listening for mailbox commands...
26,241,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,271,426 UART: [rt]cmd =0x46504c54, len=4
26,272,842 >>> mbox cmd response data (8 bytes)
26,273,761 UART: [rt] FIPS self test
26,274,711 UART: [kat] ++
26,275,163 UART: [kat] sha1
26,279,701 UART: [kat] SHA2-256
26,281,633 UART: [kat] SHA2-384
26,282,811 UART: Fatal Error: 0x90020001
26,318,196 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,463,066 >>> mbox cmd response: failed
26,463,678 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,608,408 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,032 UART:
190,321 UART: Running Caliptra ROM ...
191,341 UART:
191,479 UART: [state] CFI Enabled
253,541 UART: [state] LifecycleState = Unprovisioned
255,894 UART: [state] DebugLocked = No
258,751 UART: [state] WD Timer not started. Device not locked for debugging
262,917 UART: [kat] SHA2-256
452,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,565 UART: [kat] ++
464,010 UART: [kat] sha1
474,893 UART: [kat] SHA2-256
477,897 UART: [kat] SHA2-384
482,998 UART: [kat] SHA2-512-ACC
485,573 UART: [kat] ECC-384
2,936,109 UART: [kat] HMAC-384Kdf
2,962,120 UART: [kat] LMS
3,493,938 UART: [kat] --
3,498,912 UART: [cold-reset] ++
3,499,930 UART: [fht] FHT @ 0x50003400
3,511,257 UART: [idev] ++
3,511,944 UART: [idev] CDI.KEYID = 6
3,512,967 UART: [idev] SUBJECT.KEYID = 7
3,514,124 UART: [idev] UDS.KEYID = 0
3,515,629 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,660,574 UART: [idev] Erasing UDS.KEYID = 0
6,019,030 UART: [idev] Sha1 KeyId Algorithm
6,040,757 UART: [idev] --
6,045,568 UART: [ldev] ++
6,046,250 UART: [ldev] CDI.KEYID = 6
6,047,160 UART: [ldev] SUBJECT.KEYID = 5
6,048,321 UART: [ldev] AUTHORITY.KEYID = 7
6,049,556 UART: [ldev] FE.KEYID = 1
6,089,050 UART: [ldev] Erasing FE.KEYID = 1
8,593,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,099 UART: [ldev] --
10,402,179 UART: [fwproc] Wait for Commands...
10,404,437 UART: [fwproc] Recv command 0x46574c44
10,406,709 UART: [fwproc] Recv'd Img size: 115304 bytes
13,867,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,430 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,604,540 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,439,319 ready_for_fw is high
3,439,726 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,747,778 >>> mbox cmd response: success
19,048,890 UART:
19,049,302 UART: Running Caliptra FMC ...
19,050,460 UART:
19,050,645 UART: [state] CFI Enabled
19,120,707 UART: [fht] FMC Alias Private Key: 7
20,884,379 UART: [art] Extend RT PCRs Done
20,885,611 UART: [art] Lock RT PCRs Done
20,887,352 UART: [art] Populate DV Done
20,892,887 UART: [fht] FMC Alias Private Key: 7
20,894,603 UART: [art] Derive CDI
20,895,427 UART: [art] Store in in slot 0x4
20,954,267 UART: [art] Derive Key Pair
20,955,305 UART: [art] Store priv key in slot 0x5
23,417,795 UART: [art] Derive Key Pair - Done
23,430,682 UART: [art] Signing Cert with AUTHO
23,432,023 UART: RITY.KEYID = 7
25,144,701 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,207 UART: [art] PUB.X = 61FF16066FAD8AC7ABBA33D8C1F7FC471DBEA8B74ACB484B21BE31DCCAEE17385BB5B6E0F7C92398C125DD9BBD3DF404
25,153,528 UART: [art] PUB.Y = 71785F70C5C247D37AEAF83AA8C74D30A4CEFA7D3BE1C640D5E0F5F56B6EA332A3CFD98306E2AABB3D3C958F6A6BEB24
25,160,755 UART: [art] SIG.R = 022EDE7C4E91BEA43BA5B0E90DDA60E2754582826376E9F02252062B3C376BFA73539A9FAE63372EB90D4FF2A319046B
25,168,155 UART: [art] SIG.S = C026574C126C42537294AF33A06ABDB81CAD19A68B8504856A1F50E08741AEC203C546253610AB0A4ED6FFBF0E8CB463
26,146,888 UART: Caliptra RT
26,147,735 UART: [state] CFI Enabled
26,313,139 UART: [rt] RT listening for mailbox commands...
26,314,990 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,344,625 UART: [rt]cmd =0x46504c54, len=4
26,346,203 >>> mbox cmd response data (8 bytes)
26,347,261 UART: [rt] FIPS self test
26,348,198 UART: [kat] ++
26,348,646 UART: [kat] sha1
26,353,075 UART: [kat] SHA2-256
26,355,008 UART: [kat] SHA2-384
26,356,137 UART: Fatal Error: 0x90020001
26,391,502 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,536,243 >>> mbox cmd response: failed
26,536,927 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,681,659 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,427,697 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,755,169 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,731 UART:
193,108 UART: Running Caliptra ROM ...
194,215 UART:
604,070 UART: [state] CFI Enabled
616,743 UART: [state] LifecycleState = Unprovisioned
619,060 UART: [state] DebugLocked = No
621,793 UART: [state] WD Timer not started. Device not locked for debugging
626,044 UART: [kat] SHA2-256
815,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,734 UART: [kat] ++
827,223 UART: [kat] sha1
838,534 UART: [kat] SHA2-256
841,565 UART: [kat] SHA2-384
848,413 UART: [kat] SHA2-512-ACC
851,003 UART: [kat] ECC-384
3,292,915 UART: [kat] HMAC-384Kdf
3,305,646 UART: [kat] LMS
3,837,445 UART: [kat] --
3,841,366 UART: [cold-reset] ++
3,842,803 UART: [fht] FHT @ 0x50003400
3,855,923 UART: [idev] ++
3,856,635 UART: [idev] CDI.KEYID = 6
3,857,548 UART: [idev] SUBJECT.KEYID = 7
3,858,797 UART: [idev] UDS.KEYID = 0
3,859,723 ready_for_fw is high
3,859,955 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,004,826 UART: [idev] Erasing UDS.KEYID = 0
6,331,412 UART: [idev] Sha1 KeyId Algorithm
6,354,026 UART: [idev] --
6,358,993 UART: [ldev] ++
6,359,672 UART: [ldev] CDI.KEYID = 6
6,360,610 UART: [ldev] SUBJECT.KEYID = 5
6,361,769 UART: [ldev] AUTHORITY.KEYID = 7
6,363,002 UART: [ldev] FE.KEYID = 1
6,373,465 UART: [ldev] Erasing FE.KEYID = 1
8,851,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,603 UART: [ldev] --
10,642,552 UART: [fwproc] Wait for Commands...
10,644,271 UART: [fwproc] Recv command 0x46574c44
10,646,532 UART: [fwproc] Recv'd Img size: 115304 bytes
14,109,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,896 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,856,116 >>> mbox cmd response: success
14,860,647 UART: [afmc] ++
14,861,353 UART: [afmc] CDI.KEYID = 6
14,862,599 UART: [afmc] SUBJECT.KEYID = 7
14,864,039 UART: [afmc] AUTHORITY.KEYID = 5
17,362,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,156,268 UART: [afmc] --
19,160,248 UART: [cold-reset] --
19,164,022 UART: [state] Locking Datavault
19,168,409 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,539 UART: [state] Locking ICCM
19,173,013 UART: [exit] Launching FMC @ 0x40000130
19,181,695 UART:
19,181,929 UART: Running Caliptra FMC ...
19,183,029 UART:
19,183,189 UART: [state] CFI Enabled
19,191,460 UART: [fht] FMC Alias Private Key: 7
20,948,082 UART: [art] Extend RT PCRs Done
20,949,308 UART: [art] Lock RT PCRs Done
20,950,772 UART: [art] Populate DV Done
20,956,248 UART: [fht] FMC Alias Private Key: 7
20,957,902 UART: [art] Derive CDI
20,958,640 UART: [art] Store in in slot 0x4
21,001,342 UART: [art] Derive Key Pair
21,002,368 UART: [art] Store priv key in slot 0x5
23,429,751 UART: [art] Derive Key Pair - Done
23,442,585 UART: [art] Signing Cert with AUTHO
23,443,887 UART: RITY.KEYID = 7
25,149,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,067 UART: [art] PUB.X = 372415A9E14F6BEA24CBC3747B7555CE76575F7FCB4DA1496121F80FCD0775FB26BC1B72EC10E59BCE63543D61A3F3FE
25,158,326 UART: [art] PUB.Y = EC5C871E079BDC263BAC875A567A87284073316338356BA6F14A9FAF7CEAB7BBF26A0C40D61E82B833A6B3EC517FD338
25,165,618 UART: [art] SIG.R = 3C7844062C7E90B96D0463C6166719AEE8E921DA2FF7BCDA69FE5BE87866445A07B37E38D7C886CEDD1B192656CB7BB8
25,173,023 UART: [art] SIG.S = 5AB0C2FBFBE9998C2F4B1BEBEB5F1719F8C041E603646DD98BF7884413D1AB0708E20859FE9E415361C5CFB200083525
26,151,888 UART: Caliptra RT
26,152,574 UART: [state] CFI Enabled
26,270,282 UART: [rt] RT listening for mailbox commands...
26,272,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,301,967 UART: [rt]cmd =0x46504c54, len=4
26,303,702 >>> mbox cmd response data (8 bytes)
26,304,866 UART: [rt] FIPS self test
26,305,835 UART: [kat] ++
26,306,288 UART: [kat] sha1
26,310,623 UART: [kat] SHA2-256
26,312,516 UART: [kat] SHA2-384
26,313,697 UART: Fatal Error: 0x90020001
26,348,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,493,706 >>> mbox cmd response: failed
26,494,339 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,639,074 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,087 UART:
190,372 UART: Running Caliptra ROM ...
191,478 UART:
13,898,087 UART: [state] CFI Enabled
13,911,809 UART: [state] LifecycleState = Unprovisioned
13,914,201 UART: [state] DebugLocked = No
13,916,052 UART: [state] WD Timer not started. Device not locked for debugging
13,921,143 UART: [kat] SHA2-256
14,111,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,121,813 UART: [kat] ++
14,122,334 UART: [kat] sha1
14,133,543 UART: [kat] SHA2-256
14,136,557 UART: [kat] SHA2-384
14,142,867 UART: [kat] SHA2-512-ACC
14,145,432 UART: [kat] ECC-384
16,588,082 UART: [kat] HMAC-384Kdf
16,599,984 UART: [kat] LMS
17,131,810 UART: [kat] --
17,136,664 UART: [cold-reset] ++
17,138,871 UART: [fht] FHT @ 0x50003400
17,150,766 UART: [idev] ++
17,151,454 UART: [idev] CDI.KEYID = 6
17,152,358 UART: [idev] SUBJECT.KEYID = 7
17,153,568 UART: [idev] UDS.KEYID = 0
17,155,086 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,300,200 UART: [idev] Erasing UDS.KEYID = 0
19,630,745 UART: [idev] Sha1 KeyId Algorithm
19,652,898 UART: [idev] --
19,658,187 UART: [ldev] ++
19,658,919 UART: [ldev] CDI.KEYID = 6
19,659,824 UART: [ldev] SUBJECT.KEYID = 5
19,660,984 UART: [ldev] AUTHORITY.KEYID = 7
19,662,214 UART: [ldev] FE.KEYID = 1
19,673,238 UART: [ldev] Erasing FE.KEYID = 1
22,153,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,870,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,885,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,900,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,916,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,937,342 UART: [ldev] --
23,943,635 UART: [fwproc] Wait for Commands...
23,945,510 UART: [fwproc] Recv command 0x46574c44
23,947,820 UART: [fwproc] Recv'd Img size: 115304 bytes
27,406,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,484,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,600,494 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,149,522 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,755,411 ready_for_fw is high
3,756,058 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,973,217 >>> mbox cmd response: success
19,223,855 UART:
19,224,244 UART: Running Caliptra FMC ...
19,225,403 UART:
19,225,563 UART: [state] CFI Enabled
19,233,361 UART: [fht] FMC Alias Private Key: 7
20,990,519 UART: [art] Extend RT PCRs Done
20,991,747 UART: [art] Lock RT PCRs Done
20,993,342 UART: [art] Populate DV Done
20,999,084 UART: [fht] FMC Alias Private Key: 7
21,000,633 UART: [art] Derive CDI
21,001,426 UART: [art] Store in in slot 0x4
21,044,468 UART: [art] Derive Key Pair
21,045,471 UART: [art] Store priv key in slot 0x5
23,472,646 UART: [art] Derive Key Pair - Done
23,485,642 UART: [art] Signing Cert with AUTHO
23,486,949 UART: RITY.KEYID = 7
25,192,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,323 UART: [art] PUB.X = 499E9F19B67F2D48D39F7378A906A7B65E023497A702FE28B53D4B0372826AC98175CDDBD8D44DA356AB9C7CE2E1972A
25,201,577 UART: [art] PUB.Y = 2E49E9AD645FB4BDC95A6FECBB70732A423304A5C06A46E1BB59B5E06A1E2E3DAB19CEDD72C19A1F7DDEF3F89683A588
25,208,889 UART: [art] SIG.R = 6093668A7E700145289EEB02FFD9D35CDCD6D7D9E3080876FFF153405902BDBACDB30DC86542A88522956E17F87B57E8
25,216,290 UART: [art] SIG.S = 4CE1D074BDD0EEBF9E4BF165A8F88A573ADA0A884B8DB946E46FD487E01FC5BE2FAC6D82631168179CA06884FD00223A
26,194,932 UART: Caliptra RT
26,195,639 UART: [state] CFI Enabled
26,313,006 UART: [rt] RT listening for mailbox commands...
26,314,853 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,344,696 UART: [rt]cmd =0x46504c54, len=4
26,346,277 >>> mbox cmd response data (8 bytes)
26,347,374 UART: [rt] FIPS self test
26,348,331 UART: [kat] ++
26,348,788 UART: [kat] sha1
26,353,299 UART: [kat] SHA2-256
26,355,234 UART: [kat] SHA2-384
26,356,413 UART: Fatal Error: 0x90020001
26,391,605 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,536,466 >>> mbox cmd response: failed
26,537,084 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,681,819 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,002,705 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,211,288 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,306 UART: [kat] LMS
1,475,502 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,753 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 ready_for_fw is high
1,480,625 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,118 UART: [idev] --
1,513,929 UART: [ldev] ++
1,514,097 UART: [ldev] CDI.KEYID = 6
1,514,460 UART: [ldev] SUBJECT.KEYID = 5
1,514,886 UART: [ldev] AUTHORITY.KEYID = 7
1,515,349 UART: [ldev] FE.KEYID = 1
1,520,607 UART: [ldev] Erasing FE.KEYID = 1
1,546,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,384 UART: [ldev] --
1,585,769 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 115304 bytes
2,897,366 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,157 >>> mbox cmd response: success
3,093,325 UART: [afmc] ++
3,093,493 UART: [afmc] CDI.KEYID = 6
3,093,855 UART: [afmc] SUBJECT.KEYID = 7
3,094,280 UART: [afmc] AUTHORITY.KEYID = 5
3,129,399 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,894 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,584 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,303 UART: [afmc] --
3,172,427 UART: [cold-reset] --
3,173,089 UART: [state] Locking Datavault
3,174,082 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,686 UART: [state] Locking ICCM
3,175,256 UART: [exit] Launching FMC @ 0x40000130
3,180,585 UART:
3,180,601 UART: Running Caliptra FMC ...
3,181,009 UART:
3,181,063 UART: [state] CFI Enabled
3,191,284 UART: [fht] FMC Alias Private Key: 7
3,299,767 UART: [art] Extend RT PCRs Done
3,300,195 UART: [art] Lock RT PCRs Done
3,301,691 UART: [art] Populate DV Done
3,309,700 UART: [fht] FMC Alias Private Key: 7
3,310,734 UART: [art] Derive CDI
3,311,014 UART: [art] Store in in slot 0x4
3,396,771 UART: [art] Derive Key Pair
3,397,131 UART: [art] Store priv key in slot 0x5
3,409,899 UART: [art] Derive Key Pair - Done
3,424,499 UART: [art] Signing Cert with AUTHO
3,424,979 UART: RITY.KEYID = 7
3,440,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,846 UART: [art] PUB.X = 129B70C61434761E520C61D22D6451C8B69DF52BB9FCB4111630AA3A44338A892D207C223E110A16AF89B7D8A3B6FC92
3,447,610 UART: [art] PUB.Y = E207FE14B2D1EDB7DEDC4D3AA64C2AC9F6184E937D0DB593B72C0E610C1F0DB77EECB06A94E129F712D3ECCC8EC6C0AD
3,454,577 UART: [art] SIG.R = 485038292FB861F4021EB104167392CA488A9A957D22E4DD94D90D0852B2679A5D3D39F84CE5A3D62AEF2B6C49935397
3,461,331 UART: [art] SIG.S = 041AB6227EF10492120063279323D7DBA4B9F1C480AC1E34A3DAA64DEA86757B4DB4FF4ACFECB8E9EC2E929D65F2BF98
3,485,016 UART: Caliptra RT
3,485,269 UART: [state] CFI Enabled
3,594,295 UART: [rt] RT listening for mailbox commands...
3,594,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,629 UART: [rt]cmd =0x46504c54, len=4
3,625,746 >>> mbox cmd response data (8 bytes)
3,625,953 UART: [rt] FIPS self test
3,626,281 UART: [kat] ++
3,626,433 UART: [kat] sha1
3,630,567 UART: [kat] SHA2-256
3,632,589 UART: [kat] SHA2-384
3,633,327 UART: Fatal Error: 0x90020001
3,634,877 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,882 >>> mbox cmd response: failed
3,634,882 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
894,942 UART: [kat] SHA2-512-ACC
896,843 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
907,062 UART: [kat] LMS
1,475,258 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,072 UART: [idev] Erasing UDS.KEYID = 0
1,504,734 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,172 UART: [idev] --
1,514,235 UART: [ldev] ++
1,514,403 UART: [ldev] CDI.KEYID = 6
1,514,766 UART: [ldev] SUBJECT.KEYID = 5
1,515,192 UART: [ldev] AUTHORITY.KEYID = 7
1,515,655 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,586,005 UART: [fwproc] Waiting for Commands...
1,586,802 UART: [fwproc] Received command 0x46574c44
1,587,593 UART: [fwproc] Received Image of size 115304 bytes
2,897,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,631 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 ready_for_fw is high
1,362,399 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,521 >>> mbox cmd response: success
3,003,191 UART:
3,003,207 UART: Running Caliptra FMC ...
3,003,615 UART:
3,003,669 UART: [state] CFI Enabled
3,013,922 UART: [fht] FMC Alias Private Key: 7
3,122,297 UART: [art] Extend RT PCRs Done
3,122,725 UART: [art] Lock RT PCRs Done
3,124,215 UART: [art] Populate DV Done
3,132,310 UART: [fht] FMC Alias Private Key: 7
3,133,342 UART: [art] Derive CDI
3,133,622 UART: [art] Store in in slot 0x4
3,219,041 UART: [art] Derive Key Pair
3,219,401 UART: [art] Store priv key in slot 0x5
3,232,687 UART: [art] Derive Key Pair - Done
3,247,562 UART: [art] Signing Cert with AUTHO
3,248,042 UART: RITY.KEYID = 7
3,263,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,315 UART: [art] PUB.X = 4237E356007F137675FCA2CFD99801260AFF7D52AA042C4AA98E941A651987433558EB4662589640DAB1820859859706
3,271,034 UART: [art] PUB.Y = C260EB6EA3CD540334A5D3476D28E666E6BE8CCBC9161EFF29142398F2A3E4BB9DABD95EA39ED9952BB090AE509A21BF
3,278,001 UART: [art] SIG.R = 317E34204C5B1D9E9DA2D634D6D52BDF23EFFCC9EE0455EDA0E105E8C9BDCC14F13142420AE483757A2BCC9610DCBC4E
3,284,784 UART: [art] SIG.S = CBAE83B9B59A2D2098AAFF064E626F16B20247809F1A3630CC83E634F9923D4CBA2A9BBDBDFE194FED294AB694A00089
3,308,791 UART: Caliptra RT
3,309,044 UART: [state] CFI Enabled
3,416,513 UART: [rt] RT listening for mailbox commands...
3,417,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,963 UART: [rt]cmd =0x46504c54, len=4
3,448,038 >>> mbox cmd response data (8 bytes)
3,448,339 UART: [rt] FIPS self test
3,448,667 UART: [kat] ++
3,448,819 UART: [kat] sha1
3,452,953 UART: [kat] SHA2-256
3,454,975 UART: [kat] SHA2-384
3,456,003 UART: Fatal Error: 0x90020001
3,457,553 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,558 >>> mbox cmd response: failed
3,457,558 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,151 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,197 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,208 UART: [kat] SHA2-256
882,139 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,254 UART: [kat] ++
886,406 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,419 UART: [kat] SHA2-512-ACC
897,320 UART: [kat] ECC-384
903,073 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 ready_for_fw is high
1,481,228 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,332 UART: [ldev] ++
1,515,500 UART: [ldev] CDI.KEYID = 6
1,515,863 UART: [ldev] SUBJECT.KEYID = 5
1,516,289 UART: [ldev] AUTHORITY.KEYID = 7
1,516,752 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,547,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,525 UART: [ldev] --
1,586,862 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 115304 bytes
2,898,211 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,880 >>> mbox cmd response: success
3,092,962 UART: [afmc] ++
3,093,130 UART: [afmc] CDI.KEYID = 6
3,093,492 UART: [afmc] SUBJECT.KEYID = 7
3,093,917 UART: [afmc] AUTHORITY.KEYID = 5
3,129,408 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,209 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,899 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,912 UART: [afmc] --
3,173,002 UART: [cold-reset] --
3,173,770 UART: [state] Locking Datavault
3,174,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,451 UART: [state] Locking ICCM
3,175,947 UART: [exit] Launching FMC @ 0x40000130
3,181,276 UART:
3,181,292 UART: Running Caliptra FMC ...
3,181,700 UART:
3,181,843 UART: [state] CFI Enabled
3,192,564 UART: [fht] FMC Alias Private Key: 7
3,300,637 UART: [art] Extend RT PCRs Done
3,301,065 UART: [art] Lock RT PCRs Done
3,302,433 UART: [art] Populate DV Done
3,310,636 UART: [fht] FMC Alias Private Key: 7
3,311,584 UART: [art] Derive CDI
3,311,864 UART: [art] Store in in slot 0x4
3,397,349 UART: [art] Derive Key Pair
3,397,709 UART: [art] Store priv key in slot 0x5
3,411,141 UART: [art] Derive Key Pair - Done
3,425,988 UART: [art] Signing Cert with AUTHO
3,426,468 UART: RITY.KEYID = 7
3,441,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,399 UART: [art] PUB.X = 3C7D5BA2E7318AFE2CD7C997A3EB3FAF6778A81790A3BA4BC037A3E6727E1A951A215817DC2E513174B6D9C0C44BE4E6
3,449,183 UART: [art] PUB.Y = 10970EDDACC6C7DB61F337211EE8FB2AD32DB28E520A132591C8D2EB509669A6811A5A6E126A22A60172358018F3DD69
3,456,128 UART: [art] SIG.R = 0F514F3DE38B55A47CABE2881381FA2C5CD999E2A38086F7041AECEDEB0F59D27DA4175576CC3D57A2BD217415516822
3,462,897 UART: [art] SIG.S = 6EE3775B1F8EED32E9C80300E6729E87C0BCACB84D6C1C0D05B4326F86AD68B037A6D2FF77784A61ED80042F4DCDBAAE
3,486,374 UART: Caliptra RT
3,486,719 UART: [state] CFI Enabled
3,595,577 UART: [rt] RT listening for mailbox commands...
3,596,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,993 UART: [rt]cmd =0x46504c54, len=4
3,627,134 >>> mbox cmd response data (8 bytes)
3,627,421 UART: [rt] FIPS self test
3,627,749 UART: [kat] ++
3,627,901 UART: [kat] sha1
3,632,067 UART: [kat] SHA2-256
3,634,089 UART: [kat] SHA2-384
3,634,811 UART: Fatal Error: 0x90020001
3,636,361 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,366 >>> mbox cmd response: failed
3,636,366 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,117 UART: [kat] HMAC-384Kdf
907,601 UART: [kat] LMS
1,475,797 UART: [kat] --
1,476,832 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,479,943 UART: [idev] ++
1,480,111 UART: [idev] CDI.KEYID = 6
1,480,471 UART: [idev] SUBJECT.KEYID = 7
1,480,895 UART: [idev] UDS.KEYID = 0
1,481,240 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,861 UART: [idev] Erasing UDS.KEYID = 0
1,505,673 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,413 UART: [idev] --
1,515,304 UART: [ldev] ++
1,515,472 UART: [ldev] CDI.KEYID = 6
1,515,835 UART: [ldev] SUBJECT.KEYID = 5
1,516,261 UART: [ldev] AUTHORITY.KEYID = 7
1,516,724 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,782 UART: [fwproc] Waiting for Commands...
1,587,483 UART: [fwproc] Received command 0x46574c44
1,588,274 UART: [fwproc] Received Image of size 115304 bytes
2,897,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,022 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,550 ready_for_fw is high
1,363,550 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,608 >>> mbox cmd response: success
3,004,662 UART:
3,004,678 UART: Running Caliptra FMC ...
3,005,086 UART:
3,005,229 UART: [state] CFI Enabled
3,015,718 UART: [fht] FMC Alias Private Key: 7
3,124,117 UART: [art] Extend RT PCRs Done
3,124,545 UART: [art] Lock RT PCRs Done
3,126,285 UART: [art] Populate DV Done
3,134,632 UART: [fht] FMC Alias Private Key: 7
3,135,652 UART: [art] Derive CDI
3,135,932 UART: [art] Store in in slot 0x4
3,221,721 UART: [art] Derive Key Pair
3,222,081 UART: [art] Store priv key in slot 0x5
3,235,697 UART: [art] Derive Key Pair - Done
3,250,586 UART: [art] Signing Cert with AUTHO
3,251,066 UART: RITY.KEYID = 7
3,266,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,267,037 UART: [art] PUB.X = 75DE298C31B60271CEB397C5E7B00AEC8DEC00D6F9F5E00E01D4A9576C7D311084C55FC5A3148CF3220BB2AE361804F4
3,273,777 UART: [art] PUB.Y = B67F5DEAF90AD2AE82544A2DA6BC7A9B74A9A2D758C97F797D6A680E54FC50D8BE18FDA2CB30D0F51E73F58D32E54CC7
3,280,745 UART: [art] SIG.R = 70A19A1B0F52A841F64F38E17A1474EC04C2FDE408271B7BB5A90DFBF3E35EA60B54B1651FDDE335F40BA90711B7FA01
3,287,505 UART: [art] SIG.S = 0FBBF78D9E4671D0721CAE8A527F344F25F7BDBCA5570E91A33E0B456488712BE2A4A037BCEC47CC472C54914B30421E
3,311,149 UART: Caliptra RT
3,311,494 UART: [state] CFI Enabled
3,420,434 UART: [rt] RT listening for mailbox commands...
3,421,097 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,142 UART: [rt]cmd =0x46504c54, len=4
3,452,415 >>> mbox cmd response data (8 bytes)
3,452,566 UART: [rt] FIPS self test
3,452,894 UART: [kat] ++
3,453,046 UART: [kat] sha1
3,457,094 UART: [kat] SHA2-256
3,459,116 UART: [kat] SHA2-384
3,459,936 UART: Fatal Error: 0x90020001
3,461,486 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,491 >>> mbox cmd response: failed
3,461,491 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,294 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,673 UART: [kat] SHA2-256
903,613 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
917,716 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,719 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 ready_for_fw is high
1,176,277 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,201,135 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,579 UART: [ldev] ++
1,210,747 UART: [ldev] CDI.KEYID = 6
1,211,110 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,136 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,269 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,586 >>> mbox cmd response: success
2,786,650 UART: [afmc] ++
2,786,818 UART: [afmc] CDI.KEYID = 6
2,787,180 UART: [afmc] SUBJECT.KEYID = 7
2,787,605 UART: [afmc] AUTHORITY.KEYID = 5
2,822,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,617 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,193 UART: [afmc] --
2,866,293 UART: [cold-reset] --
2,867,033 UART: [state] Locking Datavault
2,868,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,948 UART: [state] Locking ICCM
2,869,610 UART: [exit] Launching FMC @ 0x40000130
2,874,939 UART:
2,874,955 UART: Running Caliptra FMC ...
2,875,363 UART:
2,875,417 UART: [state] CFI Enabled
2,886,226 UART: [fht] FMC Alias Private Key: 7
2,993,379 UART: [art] Extend RT PCRs Done
2,993,807 UART: [art] Lock RT PCRs Done
2,995,747 UART: [art] Populate DV Done
3,003,892 UART: [fht] FMC Alias Private Key: 7
3,004,852 UART: [art] Derive CDI
3,005,132 UART: [art] Store in in slot 0x4
3,090,437 UART: [art] Derive Key Pair
3,090,797 UART: [art] Store priv key in slot 0x5
3,104,183 UART: [art] Derive Key Pair - Done
3,118,779 UART: [art] Signing Cert with AUTHO
3,119,259 UART: RITY.KEYID = 7
3,134,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,250 UART: [art] PUB.X = 0D9AC44FBE52962201FA6032953A59A13F66DD58B6279791BC2CF670F7B3190730D440CCFF7A5F78D89417BEDE2A2EEE
3,142,021 UART: [art] PUB.Y = D846655B8CE61BCB4C82914DBFD58186D54EEB7D78BC77B82514A99921C994178C5D87F86ADFDED815077254FE0C23AC
3,148,975 UART: [art] SIG.R = 492901D5A57630761F9D70AD91DFA81F9E2E57E1C6E976F953FFC7953B33864EF2C2DEB703FE5891C6C608452B1592E5
3,155,738 UART: [art] SIG.S = 53DCEA677934D88D89EFE6EB8AFF9EC3962D2A874CA5DD140C7509C6FC720CB03E5DCE478DFEC941679023574C55C2A5
3,179,290 UART: Caliptra RT
3,179,543 UART: [state] CFI Enabled
3,287,046 UART: [rt] RT listening for mailbox commands...
3,287,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,476 UART: [rt]cmd =0x46504c54, len=4
3,318,603 >>> mbox cmd response data (8 bytes)
3,318,910 UART: [rt] FIPS self test
3,319,238 UART: [kat] ++
3,319,390 UART: [kat] sha1
3,323,662 UART: [kat] SHA2-256
3,325,684 UART: [kat] SHA2-384
3,326,862 UART: Fatal Error: 0x90020001
3,328,412 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,417 >>> mbox cmd response: failed
3,328,417 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,825 UART: [kat] SHA2-256
903,765 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
923,024 UART: [kat] LMS
1,171,352 UART: [kat] --
1,172,549 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,782 UART: [idev] ++
1,175,950 UART: [idev] CDI.KEYID = 6
1,176,310 UART: [idev] SUBJECT.KEYID = 7
1,176,734 UART: [idev] UDS.KEYID = 0
1,177,079 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,164 UART: [idev] Erasing UDS.KEYID = 0
1,201,971 UART: [idev] Sha1 KeyId Algorithm
1,210,425 UART: [idev] --
1,211,421 UART: [ldev] ++
1,211,589 UART: [ldev] CDI.KEYID = 6
1,211,952 UART: [ldev] SUBJECT.KEYID = 5
1,212,378 UART: [ldev] AUTHORITY.KEYID = 7
1,212,841 UART: [ldev] FE.KEYID = 1
1,218,127 UART: [ldev] Erasing FE.KEYID = 1
1,244,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,899 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,285,008 UART: [fwproc] Recv command 0x46574c44
1,285,736 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,653,263 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,426 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 ready_for_fw is high
1,060,281 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,037 >>> mbox cmd response: success
2,702,367 UART:
2,702,383 UART: Running Caliptra FMC ...
2,702,791 UART:
2,702,845 UART: [state] CFI Enabled
2,712,990 UART: [fht] FMC Alias Private Key: 7
2,821,015 UART: [art] Extend RT PCRs Done
2,821,443 UART: [art] Lock RT PCRs Done
2,823,139 UART: [art] Populate DV Done
2,830,934 UART: [fht] FMC Alias Private Key: 7
2,832,056 UART: [art] Derive CDI
2,832,336 UART: [art] Store in in slot 0x4
2,918,033 UART: [art] Derive Key Pair
2,918,393 UART: [art] Store priv key in slot 0x5
2,931,941 UART: [art] Derive Key Pair - Done
2,946,621 UART: [art] Signing Cert with AUTHO
2,947,101 UART: RITY.KEYID = 7
2,962,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,078 UART: [art] PUB.X = 4A20BBF5592217C54F08F2E1D12E20FDCDF6A2E5F9434CF0F7A560E7903CD3016B0E372C95CC62DBAF812DF787626531
2,969,849 UART: [art] PUB.Y = DCE55CAE4FC204EB0F1BAEDB3BBF7306BDEBC7FD59156EEB6268D990452BBA2728B40B44CD331333AF42364B5ABA06EA
2,976,812 UART: [art] SIG.R = 59D9D8938E1BA4FCE88D1D6209F231C0291CCF331A1DF939FEC1010468DBF1900117B243323A33042874ED96243141DE
2,983,565 UART: [art] SIG.S = 0E5A639CD171849172F84A601B8C1943A9EFD1C76B3C437EF45FFA0306C9D91953020CF25583B27C6CC5370BA54A1FA1
3,006,942 UART: Caliptra RT
3,007,195 UART: [state] CFI Enabled
3,114,294 UART: [rt] RT listening for mailbox commands...
3,114,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,686 UART: [rt]cmd =0x46504c54, len=4
3,145,667 >>> mbox cmd response data (8 bytes)
3,145,914 UART: [rt] FIPS self test
3,146,242 UART: [kat] ++
3,146,394 UART: [kat] sha1
3,150,804 UART: [kat] SHA2-256
3,152,826 UART: [kat] SHA2-384
3,153,604 UART: Fatal Error: 0x90020001
3,155,154 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,159 >>> mbox cmd response: failed
3,155,159 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,371 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,547 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,396 UART: [cold-reset] ++
1,172,762 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,199 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,209,740 UART: [idev] --
1,210,828 UART: [ldev] ++
1,210,996 UART: [ldev] CDI.KEYID = 6
1,211,359 UART: [ldev] SUBJECT.KEYID = 5
1,211,785 UART: [ldev] AUTHORITY.KEYID = 7
1,212,248 UART: [ldev] FE.KEYID = 1
1,217,790 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,892 UART: [ldev] --
1,283,371 UART: [fwproc] Wait for Commands...
1,283,979 UART: [fwproc] Recv command 0x46574c44
1,284,707 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,548 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,847 >>> mbox cmd response: success
2,789,989 UART: [afmc] ++
2,790,157 UART: [afmc] CDI.KEYID = 6
2,790,519 UART: [afmc] SUBJECT.KEYID = 7
2,790,944 UART: [afmc] AUTHORITY.KEYID = 5
2,826,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,760 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,376 UART: [afmc] --
2,869,486 UART: [cold-reset] --
2,870,152 UART: [state] Locking Datavault
2,871,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,821 UART: [state] Locking ICCM
2,872,417 UART: [exit] Launching FMC @ 0x40000130
2,877,746 UART:
2,877,762 UART: Running Caliptra FMC ...
2,878,170 UART:
2,878,313 UART: [state] CFI Enabled
2,888,970 UART: [fht] FMC Alias Private Key: 7
2,996,733 UART: [art] Extend RT PCRs Done
2,997,161 UART: [art] Lock RT PCRs Done
2,999,007 UART: [art] Populate DV Done
3,007,256 UART: [fht] FMC Alias Private Key: 7
3,008,268 UART: [art] Derive CDI
3,008,548 UART: [art] Store in in slot 0x4
3,093,839 UART: [art] Derive Key Pair
3,094,199 UART: [art] Store priv key in slot 0x5
3,107,795 UART: [art] Derive Key Pair - Done
3,122,768 UART: [art] Signing Cert with AUTHO
3,123,248 UART: RITY.KEYID = 7
3,138,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,147 UART: [art] PUB.X = D2DED3E8739C56D5BA149F6E33F553F06461210FBE8B863EFD142E92B05557AA9915376B5EF314153BA8815BA75CB624
3,145,918 UART: [art] PUB.Y = EF96D113000D687ED4C2531A4DAA895D58C8BB236EF1650D7BCE27EF8D163F9FDF3A52DBA9A9377B9D17D1EF90A4E5B8
3,152,860 UART: [art] SIG.R = F3278D166BFA93AF28CA3739309F777F29DD4E8471B73D5186751BC69DC50D7866EBA356308B6CCB93DC8DBA403F13AE
3,159,637 UART: [art] SIG.S = 5EBFF7A2834B67B33E099F49EC0E811E371C70F9248E42A61189CC65D4EC45F102041071403453E697B5987F50B01513
3,183,498 UART: Caliptra RT
3,183,843 UART: [state] CFI Enabled
3,290,634 UART: [rt] RT listening for mailbox commands...
3,291,297 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,174 UART: [rt]cmd =0x46504c54, len=4
3,322,341 >>> mbox cmd response data (8 bytes)
3,322,492 UART: [rt] FIPS self test
3,322,820 UART: [kat] ++
3,322,972 UART: [kat] sha1
3,327,232 UART: [kat] SHA2-256
3,329,254 UART: [kat] SHA2-384
3,330,178 UART: Fatal Error: 0x90020001
3,331,728 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,733 >>> mbox cmd response: failed
3,331,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
893,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,760 UART: [kat] ++
897,912 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,393 UART: [kat] LMS
1,171,721 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,172,938 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,346 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,211,010 UART: [ldev] ++
1,211,178 UART: [ldev] CDI.KEYID = 6
1,211,541 UART: [ldev] SUBJECT.KEYID = 5
1,211,967 UART: [ldev] AUTHORITY.KEYID = 7
1,212,430 UART: [ldev] FE.KEYID = 1
1,217,820 UART: [ldev] Erasing FE.KEYID = 1
1,244,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,910 UART: [ldev] --
1,284,313 UART: [fwproc] Wait for Commands...
1,284,921 UART: [fwproc] Recv command 0x46574c44
1,285,649 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,792 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,105 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,706 ready_for_fw is high
1,060,706 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,430 >>> mbox cmd response: success
2,701,486 UART:
2,701,502 UART: Running Caliptra FMC ...
2,701,910 UART:
2,702,053 UART: [state] CFI Enabled
2,712,566 UART: [fht] FMC Alias Private Key: 7
2,821,031 UART: [art] Extend RT PCRs Done
2,821,459 UART: [art] Lock RT PCRs Done
2,822,931 UART: [art] Populate DV Done
2,831,380 UART: [fht] FMC Alias Private Key: 7
2,832,384 UART: [art] Derive CDI
2,832,664 UART: [art] Store in in slot 0x4
2,918,181 UART: [art] Derive Key Pair
2,918,541 UART: [art] Store priv key in slot 0x5
2,931,877 UART: [art] Derive Key Pair - Done
2,946,870 UART: [art] Signing Cert with AUTHO
2,947,350 UART: RITY.KEYID = 7
2,962,604 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,369 UART: [art] PUB.X = 4E4D4B1578DAA296F9EA013EF201228F0363A7C4B13F2399F806FCE292381091FCCC00016C59AD9629766868E9BE7B3B
2,970,104 UART: [art] PUB.Y = 847094B94BA21C400FC3C0BA00645C203C28138381AB72469C6A4108B4D1456950FECBD400D22004C75A798FC11FB7D0
2,976,999 UART: [art] SIG.R = 5E7C9AB1DC93221985E20A0168DF41BBF6C02B09663FF793FBCB20F7E9BB4B8357B8FBD33064367E11C349D92226DA8A
2,983,770 UART: [art] SIG.S = 8CEB1DC4DDD0207D6F8542138C631B3979F00FA10FE6069D3D3B5C220A698A0D4F4BE1DEFC01009566F848CE757C1A3B
3,007,893 UART: Caliptra RT
3,008,238 UART: [state] CFI Enabled
3,116,053 UART: [rt] RT listening for mailbox commands...
3,116,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,429 UART: [rt]cmd =0x46504c54, len=4
3,147,650 >>> mbox cmd response data (8 bytes)
3,147,853 UART: [rt] FIPS self test
3,148,181 UART: [kat] ++
3,148,333 UART: [kat] sha1
3,152,685 UART: [kat] SHA2-256
3,154,707 UART: [kat] SHA2-384
3,155,659 UART: Fatal Error: 0x90020001
3,157,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,157,214 >>> mbox cmd response: failed
3,157,214 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,157,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,936 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
891,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,715 UART: [kat] ++
895,867 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 ready_for_fw is high
1,174,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,199,491 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,215,996 UART: [ldev] Erasing FE.KEYID = 1
1,243,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,208 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,109 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,602 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,874 >>> mbox cmd response: success
2,787,895 UART: [afmc] ++
2,788,063 UART: [afmc] CDI.KEYID = 6
2,788,426 UART: [afmc] SUBJECT.KEYID = 7
2,788,852 UART: [afmc] AUTHORITY.KEYID = 5
2,823,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,200 UART: [afmc] --
2,867,170 UART: [cold-reset] --
2,868,036 UART: [state] Locking Datavault
2,869,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,949 UART: [state] Locking ICCM
2,870,509 UART: [exit] Launching FMC @ 0x40000130
2,875,838 UART:
2,875,854 UART: Running Caliptra FMC ...
2,876,262 UART:
2,876,316 UART: [state] CFI Enabled
2,887,233 UART: [fht] FMC Alias Private Key: 7
2,995,794 UART: [art] Extend RT PCRs Done
2,996,222 UART: [art] Lock RT PCRs Done
2,997,708 UART: [art] Populate DV Done
3,005,953 UART: [fht] FMC Alias Private Key: 7
3,006,985 UART: [art] Derive CDI
3,007,265 UART: [art] Store in in slot 0x4
3,092,802 UART: [art] Derive Key Pair
3,093,162 UART: [art] Store priv key in slot 0x5
3,107,286 UART: [art] Derive Key Pair - Done
3,122,254 UART: [art] Signing Cert with AUTHO
3,122,734 UART: RITY.KEYID = 7
3,138,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,823 UART: [art] PUB.X = D4F1B68C46D6808501E34DB4A28CEF2A25D7F5B007CCDD9E15BDF0B59EA9444AFDC929E8B765FB3FBAA51676B5279695
3,145,605 UART: [art] PUB.Y = 6B3E0D947D1C5D9D7D4240B40923609A06BE7CEA152F741299EF310C8E13C64BDE6351C9ABB6ACEE8BE1AF7632D2CA2D
3,152,561 UART: [art] SIG.R = 9F7CA6EB73C8A856B56FD3B0452B3DD3674646B9222CF6C41E7E3466914407812570764249450747FABA6480679E0370
3,159,310 UART: [art] SIG.S = 6B19791BACD98D60DB48DCCC6AD6F0A48BE6399F5213D7F044C78F7638EFBB6004DE080DB04FE6B4E1F9CD506E89BB06
3,183,635 UART: Caliptra RT
3,183,888 UART: [state] CFI Enabled
3,291,957 UART: [rt] RT listening for mailbox commands...
3,292,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,669 UART: [rt]cmd =0x46504c54, len=4
3,323,812 >>> mbox cmd response data (8 bytes)
3,323,963 UART: [rt] FIPS self test
3,324,291 UART: [kat] ++
3,324,443 UART: [kat] sha1
3,328,715 UART: [kat] SHA2-256
3,330,737 UART: [kat] SHA2-384
3,331,731 UART: Fatal Error: 0x90020001
3,333,281 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,286 >>> mbox cmd response: failed
3,333,286 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,361 UART: [idev] ++
1,172,529 UART: [idev] CDI.KEYID = 6
1,172,890 UART: [idev] SUBJECT.KEYID = 7
1,173,315 UART: [idev] UDS.KEYID = 0
1,173,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,267 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,492 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,590 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,908 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 ready_for_fw is high
1,055,654 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,538 >>> mbox cmd response: success
2,697,382 UART:
2,697,398 UART: Running Caliptra FMC ...
2,697,806 UART:
2,697,860 UART: [state] CFI Enabled
2,708,931 UART: [fht] FMC Alias Private Key: 7
2,817,198 UART: [art] Extend RT PCRs Done
2,817,626 UART: [art] Lock RT PCRs Done
2,819,128 UART: [art] Populate DV Done
2,827,387 UART: [fht] FMC Alias Private Key: 7
2,828,547 UART: [art] Derive CDI
2,828,827 UART: [art] Store in in slot 0x4
2,914,336 UART: [art] Derive Key Pair
2,914,696 UART: [art] Store priv key in slot 0x5
2,928,472 UART: [art] Derive Key Pair - Done
2,943,533 UART: [art] Signing Cert with AUTHO
2,944,013 UART: RITY.KEYID = 7
2,959,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,830 UART: [art] PUB.X = 08941264C98AC0F0CA87D64D5A1F3422A4620D21F483359BAC1E9D62CC33266B0342EA8AEAE4238269A785F19227B946
2,966,589 UART: [art] PUB.Y = 381343473617EB90C871C45E561031E1FD7EDB9BF1EF108CCF161DEA44B7CDFA7E05E302F75F26BA9ACD85B7C897AC20
2,973,549 UART: [art] SIG.R = 16709513F010661A266CB86B499D3A34DF905BF5D7247459DBD5879AEC03B1A0A774E07CA8354C5B37FF7AE62ABABCA7
2,980,326 UART: [art] SIG.S = 6BA08CF39ADE62C6CEAB6CC7058B932C5B6FCEFBCA2AB9A79C256A138F92BAC9BF3DD9078B068C66B8879FFC79CB38ED
3,004,076 UART: Caliptra RT
3,004,329 UART: [state] CFI Enabled
3,112,450 UART: [rt] RT listening for mailbox commands...
3,113,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,040 UART: [rt]cmd =0x46504c54, len=4
3,144,203 >>> mbox cmd response data (8 bytes)
3,144,418 UART: [rt] FIPS self test
3,144,746 UART: [kat] ++
3,144,898 UART: [kat] sha1
3,149,244 UART: [kat] SHA2-256
3,151,266 UART: [kat] SHA2-384
3,152,158 UART: Fatal Error: 0x90020001
3,153,708 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,713 >>> mbox cmd response: failed
3,153,713 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,864 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,443 UART: [ldev] Erasing FE.KEYID = 1
1,241,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,799 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,846 UART: [fwproc] Recv command 0x46574c44
1,282,579 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,511 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,693 >>> mbox cmd response: success
2,785,918 UART: [afmc] ++
2,786,086 UART: [afmc] CDI.KEYID = 6
2,786,449 UART: [afmc] SUBJECT.KEYID = 7
2,786,875 UART: [afmc] AUTHORITY.KEYID = 5
2,822,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,569 UART: [afmc] --
2,866,607 UART: [cold-reset] --
2,867,209 UART: [state] Locking Datavault
2,868,080 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,684 UART: [state] Locking ICCM
2,869,120 UART: [exit] Launching FMC @ 0x40000130
2,874,449 UART:
2,874,465 UART: Running Caliptra FMC ...
2,874,873 UART:
2,875,016 UART: [state] CFI Enabled
2,885,497 UART: [fht] FMC Alias Private Key: 7
2,993,434 UART: [art] Extend RT PCRs Done
2,993,862 UART: [art] Lock RT PCRs Done
2,995,842 UART: [art] Populate DV Done
3,004,049 UART: [fht] FMC Alias Private Key: 7
3,005,099 UART: [art] Derive CDI
3,005,379 UART: [art] Store in in slot 0x4
3,091,204 UART: [art] Derive Key Pair
3,091,564 UART: [art] Store priv key in slot 0x5
3,105,076 UART: [art] Derive Key Pair - Done
3,119,828 UART: [art] Signing Cert with AUTHO
3,120,308 UART: RITY.KEYID = 7
3,135,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,423 UART: [art] PUB.X = 8C732300A7BF2443B2E7C4120C462E152ED5BC25CA0A94A3EDA4F1A8D28C83E5CDEA4538B75E73B501781C46113B63A1
3,143,170 UART: [art] PUB.Y = E429BD92BB7DA5A3FC74B64085B9A6A603DEBC735F86D907760EEC5AFC33EE06AF7812F516753678BC81D84ED0B82928
3,150,120 UART: [art] SIG.R = 0DCCEFB4F704F4E846B611E0C6BA04F637E0593457AA769D53A9A519B6CDE5AC64BF06A589DE76D102E8DF7807EAD9DB
3,156,892 UART: [art] SIG.S = 07B6909C9A240E2CD0A61F84FEB29CAD5CFA612D44E8955D279789DE96D204BEA2312C958AEB08EDE623F7E456DC582F
3,181,081 UART: Caliptra RT
3,181,426 UART: [state] CFI Enabled
3,290,221 UART: [rt] RT listening for mailbox commands...
3,290,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,359 UART: [rt]cmd =0x46504c54, len=4
3,321,456 >>> mbox cmd response data (8 bytes)
3,321,707 UART: [rt] FIPS self test
3,322,035 UART: [kat] ++
3,322,187 UART: [kat] sha1
3,326,231 UART: [kat] SHA2-256
3,328,253 UART: [kat] SHA2-384
3,329,225 UART: Fatal Error: 0x90020001
3,330,775 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,780 >>> mbox cmd response: failed
3,330,780 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,409 UART: [kat] LMS
1,169,721 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,175,030 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] --
1,209,877 UART: [ldev] ++
1,210,045 UART: [ldev] CDI.KEYID = 6
1,210,409 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,535 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,353 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,663 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 ready_for_fw is high
1,056,337 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,405 >>> mbox cmd response: success
2,696,933 UART:
2,696,949 UART: Running Caliptra FMC ...
2,697,357 UART:
2,697,500 UART: [state] CFI Enabled
2,708,345 UART: [fht] FMC Alias Private Key: 7
2,816,694 UART: [art] Extend RT PCRs Done
2,817,122 UART: [art] Lock RT PCRs Done
2,818,350 UART: [art] Populate DV Done
2,826,709 UART: [fht] FMC Alias Private Key: 7
2,827,761 UART: [art] Derive CDI
2,828,041 UART: [art] Store in in slot 0x4
2,913,614 UART: [art] Derive Key Pair
2,913,974 UART: [art] Store priv key in slot 0x5
2,927,068 UART: [art] Derive Key Pair - Done
2,941,531 UART: [art] Signing Cert with AUTHO
2,942,011 UART: RITY.KEYID = 7
2,957,361 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,126 UART: [art] PUB.X = D65021C405ED229F407A5BB5A46AB034C72B6306D7CF867AF7F225004F62DA34687A03F413830D3A139BC660B46B99FC
2,964,864 UART: [art] PUB.Y = 7677BF8957A3CD5D04524ACC4C860AD5B37A432128EA46D1210137FC34FFB1EF8210E77E863EA2B3AF538F2D84440FFB
2,971,812 UART: [art] SIG.R = 1F7A6B00F5B345144288742EA913E90BDB41474090F6E349E50BEA3E9F3E7E398757D752BA5060FC73C49DCB1790A4EE
2,978,558 UART: [art] SIG.S = 373E78FFD45018E11ABE64C79F104EEB6B2A4919BD559AC5F7214AA13889B1A11CA6011D69148AEBE745DD0A04E8D554
3,002,594 UART: Caliptra RT
3,002,939 UART: [state] CFI Enabled
3,111,378 UART: [rt] RT listening for mailbox commands...
3,112,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,928 UART: [rt]cmd =0x46504c54, len=4
3,143,147 >>> mbox cmd response data (8 bytes)
3,143,326 UART: [rt] FIPS self test
3,143,654 UART: [kat] ++
3,143,806 UART: [kat] sha1
3,147,944 UART: [kat] SHA2-256
3,149,966 UART: [kat] SHA2-384
3,150,944 UART: Fatal Error: 0x90020001
3,152,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,499 >>> mbox cmd response: failed
3,152,499 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,431 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,591 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,686,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,830,668 >>> mbox cmd response: failed
2,831,234 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,974,414 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,868,469 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,468,266 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,693,691 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,837,744 >>> mbox cmd response: failed
2,838,295 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,981,676 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
4,857,545 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,424,967 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,041,207 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,185,442 >>> mbox cmd response: failed
3,186,025 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,329,363 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
21,577,002 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,022,073 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,038,686 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,182,865 >>> mbox cmd response: failed
3,183,424 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,326,748 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
21,586,477 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,036,800 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,697,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,841,617 >>> mbox cmd response: failed
2,842,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,985,960 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,465,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,290,801 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,699,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,844,262 >>> mbox cmd response: failed
2,844,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,988,618 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
3,441,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,429 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,046,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,192,200 >>> mbox cmd response: failed
3,192,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,336,602 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,181,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,911,499 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,049,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,194,284 >>> mbox cmd response: failed
3,194,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,577 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,185,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,904,843 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,833 writing to cptra_bootfsm_go
2,705,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,850,032 >>> mbox cmd response: failed
2,850,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,994,486 >>> mbox cmd response: failed
Initializing fuses
993 writing to cptra_bootfsm_go
3,454,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,246 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,703,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,738 >>> mbox cmd response: failed
2,848,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,992,220 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,479,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,312,054 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
3,049,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,194,605 >>> mbox cmd response: failed
3,195,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,773 >>> mbox cmd response: failed
Initializing fuses
1,145 writing to cptra_bootfsm_go
20,190,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,911,918 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,050,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,494 >>> mbox cmd response: failed
3,196,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,339,655 >>> mbox cmd response: failed
Initializing fuses
1,099 writing to cptra_bootfsm_go
20,177,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,888,968 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,473 >>> mbox cmd response: failed
811,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,532 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,431 >>> mbox cmd response: failed
811,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,126 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,028 >>> mbox cmd response: failed
812,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,019 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,492 >>> mbox cmd response: failed
812,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,743 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,711 >>> mbox cmd response: failed
811,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,290 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,293 >>> mbox cmd response: failed
811,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,118 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,894 >>> mbox cmd response: failed
811,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,787 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,174 >>> mbox cmd response: failed
812,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,593 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,317 >>> mbox cmd response: failed
811,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,895 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,321 >>> mbox cmd response: failed
811,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,058 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,320 >>> mbox cmd response: failed
812,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,089 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,254 >>> mbox cmd response: failed
812,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,067 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,286 UART:
192,658 UART: Running Caliptra ROM ...
193,863 UART:
194,028 UART: [state] CFI Enabled
260,731 UART: [state] LifecycleState = Unprovisioned
262,641 UART: [state] DebugLocked = No
265,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,767 UART: [kat] SHA2-256
440,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,990 UART: [kat] ++
451,441 UART: [kat] sha1
462,457 UART: [kat] SHA2-256
465,114 UART: [kat] SHA2-384
469,394 UART: [kat] SHA2-512-ACC
471,739 UART: [kat] ECC-384
2,769,259 UART: [kat] HMAC-384Kdf
2,800,134 UART: [kat] LMS
3,990,430 UART: [kat] --
3,993,320 UART: [cold-reset] ++
3,995,477 UART: [fht] Storing FHT @ 0x50003400
4,006,320 UART: [idev] ++
4,006,900 UART: [idev] CDI.KEYID = 6
4,007,791 UART: [idev] SUBJECT.KEYID = 7
4,009,047 UART: [idev] UDS.KEYID = 0
4,010,091 ready_for_fw is high
4,010,329 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,155,323 UART: [idev] Erasing UDS.KEYID = 0
7,348,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,531 UART: [idev] --
7,373,040 UART: [ldev] ++
7,373,612 UART: [ldev] CDI.KEYID = 6
7,374,586 UART: [ldev] SUBJECT.KEYID = 5
7,375,805 UART: [ldev] AUTHORITY.KEYID = 7
7,377,039 UART: [ldev] FE.KEYID = 1
7,423,469 UART: [ldev] Erasing FE.KEYID = 1
10,754,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,356 UART: [ldev] --
13,118,742 UART: [fwproc] Waiting for Commands...
13,120,900 UART: [fwproc] Received command 0x46574c44
13,123,122 UART: [fwproc] Received Image of size 114996 bytes
17,190,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,881 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,659,071 >>> mbox cmd response: success
17,664,063 UART: [afmc] ++
17,664,661 UART: [afmc] CDI.KEYID = 6
17,665,594 UART: [afmc] SUBJECT.KEYID = 7
17,666,812 UART: [afmc] AUTHORITY.KEYID = 5
21,029,356 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,646 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,102 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,916 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,329 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,861 UART: [afmc] --
23,402,732 UART: [cold-reset] --
23,406,865 UART: [state] Locking Datavault
23,412,547 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,299 UART: [state] Locking ICCM
23,415,345 UART: [exit] Launching FMC @ 0x40000130
23,423,735 UART:
23,423,983 UART: Running Caliptra FMC ...
23,425,109 UART:
23,425,270 UART: [state] CFI Enabled
23,489,424 UART: [fht] FMC Alias Private Key: 7
25,826,796 UART: [art] Extend RT PCRs Done
25,828,168 UART: [art] Lock RT PCRs Done
25,829,990 UART: [art] Populate DV Done
25,835,301 UART: [fht] FMC Alias Private Key: 7
25,836,838 UART: [art] Derive CDI
25,837,577 UART: [art] Store in in slot 0x4
25,897,859 UART: [art] Derive Key Pair
25,898,858 UART: [art] Store priv key in slot 0x5
29,191,526 UART: [art] Derive Key Pair - Done
29,204,312 UART: [art] Signing Cert with AUTHO
29,205,612 UART: RITY.KEYID = 7
31,493,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,059 UART: [art] PUB.X = 1000148464FF1536C71BC9F9041B9F884070C9F69997F969B79A8846802AB3BE8D041949A298B95DE431E6FAC9394389
31,502,286 UART: [art] PUB.Y = 9AD2CC302B3C5BFBD01776004E39C379CF2DC0EBC80F717FF47108AA1B6AFA2989584FDCFD31A1D11EE8DD2770B4807A
31,509,560 UART: [art] SIG.R = 8A67E6E183BDC9F3B6B34F4994526332D19689A8E7BDD09E06000182B9BCC05AD2C40FD84276A4263674F3B1D6D2DD8F
31,516,918 UART: [art] SIG.S = 696C44DFE14B71C5FCDA6E7E5969B6EADE3065FA521619D49C324184943E6C1D94BD71AFA2C1DA779F35A39E9A7917EE
32,822,889 UART: Caliptra RT
32,823,607 UART: [state] CFI Enabled
32,986,015 UART: [rt] RT listening for mailbox commands...
32,987,873 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,017,724 UART: [rt]cmd =0x46504c54, len=4
33,019,251 >>> mbox cmd response data (8 bytes)
33,020,181 UART: [rt] FIPS self test
33,021,129 UART: [kat] ++
33,021,583 UART: [kat] sha1
33,025,831 UART: [kat] SHA2-256
33,027,777 UART: [kat] SHA2-384
33,030,242 UART: Fatal Error: 0x90020002
33,065,469 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,210,408 >>> mbox cmd response: failed
33,211,091 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,355,484 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,072 UART:
190,362 UART: Running Caliptra ROM ...
191,465 UART:
191,612 UART: [state] CFI Enabled
250,467 UART: [state] LifecycleState = Unprovisioned
252,435 UART: [state] DebugLocked = No
254,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,672 UART: [kat] SHA2-256
429,388 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,872 UART: [kat] ++
440,403 UART: [kat] sha1
450,277 UART: [kat] SHA2-256
452,966 UART: [kat] SHA2-384
458,715 UART: [kat] SHA2-512-ACC
461,065 UART: [kat] ECC-384
2,755,550 UART: [kat] HMAC-384Kdf
2,788,530 UART: [kat] LMS
3,978,842 UART: [kat] --
3,984,210 UART: [cold-reset] ++
3,985,119 UART: [fht] Storing FHT @ 0x50003400
3,996,913 UART: [idev] ++
3,997,528 UART: [idev] CDI.KEYID = 6
3,998,447 UART: [idev] SUBJECT.KEYID = 7
3,999,669 UART: [idev] UDS.KEYID = 0
4,001,302 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,145,725 UART: [idev] Erasing UDS.KEYID = 0
7,335,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,590 UART: [idev] --
7,360,695 UART: [ldev] ++
7,361,272 UART: [ldev] CDI.KEYID = 6
7,362,212 UART: [ldev] SUBJECT.KEYID = 5
7,363,483 UART: [ldev] AUTHORITY.KEYID = 7
7,364,718 UART: [ldev] FE.KEYID = 1
7,410,827 UART: [ldev] Erasing FE.KEYID = 1
10,741,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,099,165 UART: [ldev] --
13,103,674 UART: [fwproc] Waiting for Commands...
13,105,498 UART: [fwproc] Received command 0x46574c44
13,107,685 UART: [fwproc] Received Image of size 114996 bytes
17,176,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,643,133 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,783,874 ready_for_fw is high
3,784,297 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,899,873 >>> mbox cmd response: success
23,581,968 UART:
23,582,416 UART: Running Caliptra FMC ...
23,583,531 UART:
23,583,683 UART: [state] CFI Enabled
23,653,789 UART: [fht] FMC Alias Private Key: 7
25,992,032 UART: [art] Extend RT PCRs Done
25,993,266 UART: [art] Lock RT PCRs Done
25,995,190 UART: [art] Populate DV Done
26,000,445 UART: [fht] FMC Alias Private Key: 7
26,002,045 UART: [art] Derive CDI
26,002,791 UART: [art] Store in in slot 0x4
26,061,999 UART: [art] Derive Key Pair
26,063,046 UART: [art] Store priv key in slot 0x5
29,355,431 UART: [art] Derive Key Pair - Done
29,368,543 UART: [art] Signing Cert with AUTHO
29,369,851 UART: RITY.KEYID = 7
31,656,797 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,315 UART: [art] PUB.X = 1E24D64A38BA5BE5261B25A2C1F75AD8D70D86E878DB33FAFBC1AD565A309416C895B162A1ED212491F2A5F860FBB661
31,665,537 UART: [art] PUB.Y = 634BCB9349C5B28C1363958CBFC4659E8F22FEC2BB7C0D340E50A9380A746CCCD84EF46471AFD55E4184BD84D27F6D3D
31,672,800 UART: [art] SIG.R = F647EE16A965B4075C4DBA6879B4D9E1B928E42691E57380F27BEFA914C6664B050CC2239829A7107BA98A547211E856
31,680,145 UART: [art] SIG.S = 26B5DDDE0A5BB0A9490B92ED9C722FA73B921345C9662BBB25C7EE100BC11F1156F1B2DD38EC8FAA98864E244EB2338B
32,985,219 UART: Caliptra RT
32,985,921 UART: [state] CFI Enabled
33,145,556 UART: [rt] RT listening for mailbox commands...
33,147,413 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,177,093 UART: [rt]cmd =0x46504c54, len=4
33,178,764 >>> mbox cmd response data (8 bytes)
33,179,985 UART: [rt] FIPS self test
33,180,929 UART: [kat] ++
33,181,376 UART: [kat] sha1
33,185,834 UART: [kat] SHA2-256
33,187,761 UART: [kat] SHA2-384
33,190,123 UART: Fatal Error: 0x90020002
33,225,412 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,370,203 >>> mbox cmd response: failed
33,370,856 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,515,223 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,791,749 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,873,165 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,619 UART:
192,992 UART: Running Caliptra ROM ...
194,187 UART:
603,702 UART: [state] CFI Enabled
616,009 UART: [state] LifecycleState = Unprovisioned
617,963 UART: [state] DebugLocked = No
620,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,498 UART: [kat] SHA2-256
796,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,758 UART: [kat] ++
807,389 UART: [kat] sha1
817,796 UART: [kat] SHA2-256
820,532 UART: [kat] SHA2-384
826,591 UART: [kat] SHA2-512-ACC
828,948 UART: [kat] ECC-384
3,112,601 UART: [kat] HMAC-384Kdf
3,123,562 UART: [kat] LMS
4,313,715 UART: [kat] --
4,318,657 UART: [cold-reset] ++
4,320,459 UART: [fht] Storing FHT @ 0x50003400
4,332,365 UART: [idev] ++
4,332,925 UART: [idev] CDI.KEYID = 6
4,333,882 UART: [idev] SUBJECT.KEYID = 7
4,335,128 UART: [idev] UDS.KEYID = 0
4,336,048 ready_for_fw is high
4,336,247 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,682 UART: [idev] Erasing UDS.KEYID = 0
7,623,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,290 UART: [idev] --
7,647,238 UART: [ldev] ++
7,647,811 UART: [ldev] CDI.KEYID = 6
7,648,794 UART: [ldev] SUBJECT.KEYID = 5
7,649,956 UART: [ldev] AUTHORITY.KEYID = 7
7,651,243 UART: [ldev] FE.KEYID = 1
7,663,295 UART: [ldev] Erasing FE.KEYID = 1
10,947,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,901 UART: [ldev] --
13,308,223 UART: [fwproc] Waiting for Commands...
13,310,576 UART: [fwproc] Received command 0x46574c44
13,312,801 UART: [fwproc] Received Image of size 114996 bytes
17,375,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,842,595 >>> mbox cmd response: success
17,846,036 UART: [afmc] ++
17,846,626 UART: [afmc] CDI.KEYID = 6
17,847,538 UART: [afmc] SUBJECT.KEYID = 7
17,848,804 UART: [afmc] AUTHORITY.KEYID = 5
21,158,272 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,027 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,296 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,690 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,531 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,968 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,035 UART: [afmc] --
23,520,677 UART: [cold-reset] --
23,524,217 UART: [state] Locking Datavault
23,530,220 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,928 UART: [state] Locking ICCM
23,533,324 UART: [exit] Launching FMC @ 0x40000130
23,541,719 UART:
23,541,953 UART: Running Caliptra FMC ...
23,543,057 UART:
23,543,224 UART: [state] CFI Enabled
23,551,487 UART: [fht] FMC Alias Private Key: 7
25,882,921 UART: [art] Extend RT PCRs Done
25,884,143 UART: [art] Lock RT PCRs Done
25,885,741 UART: [art] Populate DV Done
25,891,100 UART: [fht] FMC Alias Private Key: 7
25,892,641 UART: [art] Derive CDI
25,893,456 UART: [art] Store in in slot 0x4
25,936,230 UART: [art] Derive Key Pair
25,937,235 UART: [art] Store priv key in slot 0x5
29,179,561 UART: [art] Derive Key Pair - Done
29,192,703 UART: [art] Signing Cert with AUTHO
29,194,014 UART: RITY.KEYID = 7
31,473,290 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,807 UART: [art] PUB.X = 265B6FF6AF0AF80AA1F219C5AD6580C0908EA94972953B38A9741CDA5835C3AA0664AB9491F2D1B1C826DC4C9469D4DC
31,482,025 UART: [art] PUB.Y = 84C771D0ADBFAB56571CB8816024306ECA18E4FC2451E69EA7C408B50728071DA83412800F58508AF33D4455579163C7
31,489,264 UART: [art] SIG.R = 7191738616E8CCE199BB41E7A9F4E58B8EB4715DD9A6AD87DBB340027B00AB2073BF84D7B9B65ADE7608A84B8A3D9295
31,496,618 UART: [art] SIG.S = C0E4F05400C3A1427CF4B2590D6BA92992D3DA30472C8C20656A4101F62FC3F3FC17BFA78622FE464B3A88230927D6C6
32,801,729 UART: Caliptra RT
32,802,445 UART: [state] CFI Enabled
32,921,041 UART: [rt] RT listening for mailbox commands...
32,922,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,952,654 UART: [rt]cmd =0x46504c54, len=4
32,954,395 >>> mbox cmd response data (8 bytes)
32,955,375 UART: [rt] FIPS self test
32,956,321 UART: [kat] ++
32,956,774 UART: [kat] sha1
32,961,365 UART: [kat] SHA2-256
32,963,347 UART: [kat] SHA2-384
32,965,438 UART: Fatal Error: 0x90020002
33,000,810 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,145,162 >>> mbox cmd response: failed
33,145,797 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,290,171 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,111 UART:
190,400 UART: Running Caliptra ROM ...
191,512 UART:
7,233,784 UART: [state] CFI Enabled
7,247,150 UART: [state] LifecycleState = Unprovisioned
7,249,078 UART: [state] DebugLocked = No
7,251,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,256,720 UART: [kat] SHA2-256
7,426,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,437,013 UART: [kat] ++
7,437,559 UART: [kat] sha1
7,447,969 UART: [kat] SHA2-256
7,450,657 UART: [kat] SHA2-384
7,455,722 UART: [kat] SHA2-512-ACC
7,458,122 UART: [kat] ECC-384
9,740,240 UART: [kat] HMAC-384Kdf
9,750,742 UART: [kat] LMS
10,940,862 UART: [kat] --
10,946,329 UART: [cold-reset] ++
10,947,834 UART: [fht] Storing FHT @ 0x50003400
10,958,253 UART: [idev] ++
10,958,825 UART: [idev] CDI.KEYID = 6
10,959,792 UART: [idev] SUBJECT.KEYID = 7
10,961,005 UART: [idev] UDS.KEYID = 0
10,962,591 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,106,975 UART: [idev] Erasing UDS.KEYID = 0
14,251,027 UART: [idev] Using Sha1 for KeyId Algorithm
14,272,736 UART: [idev] --
14,277,248 UART: [ldev] ++
14,277,828 UART: [ldev] CDI.KEYID = 6
14,278,849 UART: [ldev] SUBJECT.KEYID = 5
14,280,004 UART: [ldev] AUTHORITY.KEYID = 7
14,281,236 UART: [ldev] FE.KEYID = 1
14,292,586 UART: [ldev] Erasing FE.KEYID = 1
17,580,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,870,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,885,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,900,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,914,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,934,198 UART: [ldev] --
19,938,605 UART: [fwproc] Waiting for Commands...
19,940,204 UART: [fwproc] Received command 0x46574c44
19,942,405 UART: [fwproc] Received Image of size 114996 bytes
24,008,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,083,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,152,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,472,767 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,128,185 ready_for_fw is high
4,128,634 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,079,647 >>> mbox cmd response: success
23,724,825 UART:
23,725,236 UART: Running Caliptra FMC ...
23,726,372 UART:
23,726,528 UART: [state] CFI Enabled
23,734,155 UART: [fht] FMC Alias Private Key: 7
26,064,574 UART: [art] Extend RT PCRs Done
26,065,805 UART: [art] Lock RT PCRs Done
26,067,519 UART: [art] Populate DV Done
26,072,726 UART: [fht] FMC Alias Private Key: 7
26,074,324 UART: [art] Derive CDI
26,075,063 UART: [art] Store in in slot 0x4
26,117,993 UART: [art] Derive Key Pair
26,119,035 UART: [art] Store priv key in slot 0x5
29,361,570 UART: [art] Derive Key Pair - Done
29,374,157 UART: [art] Signing Cert with AUTHO
29,375,464 UART: RITY.KEYID = 7
31,654,819 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,325 UART: [art] PUB.X = 1C3ECF6FD3B02D2BD44E885B7B496220B3EB3FA40BCE74E7D1E67FC469F1AF8C843796F8A9701DD0C20FEA5E3B509FEA
31,663,588 UART: [art] PUB.Y = 5EC99324F3F87BB741381C79AD7CF3CEB89ADDCEF8D3111D11A4B9EE59AADA84129CB09FEA7322B0C7B615DFABC29285
31,670,898 UART: [art] SIG.R = 9C40226E911AEFC9574A2BC8A6A4856993E5D6DFB42B2EC2939E42DF9DE3EA97C52763DC7398DEFAAF3F11333B56948C
31,678,301 UART: [art] SIG.S = 99BDB548580D071B94A641F7367BC842DFB5D1E246313B759632D595BA725C9287BE7A6B42DC680C660306ACA7E73D76
32,983,215 UART: Caliptra RT
32,983,935 UART: [state] CFI Enabled
33,102,305 UART: [rt] RT listening for mailbox commands...
33,104,154 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,134,051 UART: [rt]cmd =0x46504c54, len=4
33,135,518 >>> mbox cmd response data (8 bytes)
33,136,820 UART: [rt] FIPS self test
33,137,779 UART: [kat] ++
33,138,233 UART: [kat] sha1
33,142,795 UART: [kat] SHA2-256
33,144,776 UART: [kat] SHA2-384
33,147,094 UART: Fatal Error: 0x90020002
33,182,307 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,326,806 >>> mbox cmd response: failed
33,327,465 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,471,813 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
10,592,037 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,549,080 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,303 UART:
192,662 UART: Running Caliptra ROM ...
193,781 UART:
193,925 UART: [state] CFI Enabled
265,125 UART: [state] LifecycleState = Unprovisioned
267,043 UART: [state] DebugLocked = No
269,927 UART: [state] WD Timer not started. Device not locked for debugging
273,032 UART: [kat] SHA2-256
452,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,774 UART: [kat] ++
464,224 UART: [kat] sha1
474,247 UART: [kat] SHA2-256
477,253 UART: [kat] SHA2-384
483,955 UART: [kat] SHA2-512-ACC
486,924 UART: [kat] ECC-384
2,949,619 UART: [kat] HMAC-384Kdf
2,973,590 UART: [kat] LMS
3,503,050 UART: [kat] --
3,507,829 UART: [cold-reset] ++
3,508,979 UART: [fht] FHT @ 0x50003400
3,520,175 UART: [idev] ++
3,520,739 UART: [idev] CDI.KEYID = 6
3,521,660 UART: [idev] SUBJECT.KEYID = 7
3,522,835 UART: [idev] UDS.KEYID = 0
3,523,759 ready_for_fw is high
3,523,968 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,982 UART: [idev] Erasing UDS.KEYID = 0
6,031,196 UART: [idev] Sha1 KeyId Algorithm
6,055,120 UART: [idev] --
6,059,911 UART: [ldev] ++
6,060,511 UART: [ldev] CDI.KEYID = 6
6,061,449 UART: [ldev] SUBJECT.KEYID = 5
6,062,561 UART: [ldev] AUTHORITY.KEYID = 7
6,063,796 UART: [ldev] FE.KEYID = 1
6,103,939 UART: [ldev] Erasing FE.KEYID = 1
8,606,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,002 UART: [ldev] --
10,416,464 UART: [fwproc] Wait for Commands...
10,419,056 UART: [fwproc] Recv command 0x46574c44
10,421,100 UART: [fwproc] Recv'd Img size: 115304 bytes
13,841,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,984,986 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,305,735 >>> mbox cmd response: success
14,310,611 UART: [afmc] ++
14,311,200 UART: [afmc] CDI.KEYID = 6
14,312,089 UART: [afmc] SUBJECT.KEYID = 7
14,313,247 UART: [afmc] AUTHORITY.KEYID = 5
16,857,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,594,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,610,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,626,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,648,398 UART: [afmc] --
18,653,021 UART: [cold-reset] --
18,657,044 UART: [state] Locking Datavault
18,662,239 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,901 UART: [state] Locking ICCM
18,665,116 UART: [exit] Launching FMC @ 0x40000130
18,673,518 UART:
18,673,758 UART: Running Caliptra FMC ...
18,674,860 UART:
18,675,017 UART: [state] CFI Enabled
18,735,978 UART: [fht] FMC Alias Private Key: 7
20,499,600 UART: [art] Extend RT PCRs Done
20,500,831 UART: [art] Lock RT PCRs Done
20,502,406 UART: [art] Populate DV Done
20,508,041 UART: [fht] FMC Alias Private Key: 7
20,509,639 UART: [art] Derive CDI
20,510,454 UART: [art] Store in in slot 0x4
20,569,626 UART: [art] Derive Key Pair
20,570,666 UART: [art] Store priv key in slot 0x5
23,033,235 UART: [art] Derive Key Pair - Done
23,046,255 UART: [art] Signing Cert with AUTHO
23,047,561 UART: RITY.KEYID = 7
24,759,040 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,549 UART: [art] PUB.X = A706A8819841E4891EC6423C451AF498096175C2F6A1EE3FD75E81A5B525ADC28E72E3D9209090DFE884E4561ECAED2F
24,767,809 UART: [art] PUB.Y = FB724521D2D17CB6C0CC177FFCC434D888865D8A21C2A48E4DF14A5382235369788BB2F6B0129D909D6775CD6CA92D3C
24,775,090 UART: [art] SIG.R = 84BD6379C4CD18148C5E2AADD0BA144A08C281BF4FC0AF39C943B8EDA88DC98C87AFA38ED0AD0C14E9740C48155EE33D
24,782,510 UART: [art] SIG.S = 7B4B8585B5AAD39581A8E436B12FD4D52293640981A31A0B67D9BDEFA1B061DDE524180E79A532FEF98CA30D1247EFF8
25,761,196 UART: Caliptra RT
25,761,889 UART: [state] CFI Enabled
25,926,554 UART: [rt] RT listening for mailbox commands...
25,928,400 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,236 UART: [rt]cmd =0x46504c54, len=4
25,959,918 >>> mbox cmd response data (8 bytes)
25,960,996 UART: [rt] FIPS self test
25,961,937 UART: [kat] ++
25,962,384 UART: [kat] sha1
25,966,749 UART: [kat] SHA2-256
25,968,689 UART: [kat] SHA2-384
25,970,822 UART: Fatal Error: 0x90020002
26,006,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,150,867 >>> mbox cmd response: failed
26,151,511 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,296,768 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,109 UART:
190,401 UART: Running Caliptra ROM ...
191,515 UART:
191,667 UART: [state] CFI Enabled
248,318 UART: [state] LifecycleState = Unprovisioned
250,289 UART: [state] DebugLocked = No
252,123 UART: [state] WD Timer not started. Device not locked for debugging
255,540 UART: [kat] SHA2-256
434,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
446,270 UART: [kat] ++
446,809 UART: [kat] sha1
458,283 UART: [kat] SHA2-256
461,342 UART: [kat] SHA2-384
468,020 UART: [kat] SHA2-512-ACC
470,975 UART: [kat] ECC-384
2,934,859 UART: [kat] HMAC-384Kdf
2,957,823 UART: [kat] LMS
3,487,242 UART: [kat] --
3,491,779 UART: [cold-reset] ++
3,493,170 UART: [fht] FHT @ 0x50003400
3,504,798 UART: [idev] ++
3,505,367 UART: [idev] CDI.KEYID = 6
3,506,279 UART: [idev] SUBJECT.KEYID = 7
3,507,513 UART: [idev] UDS.KEYID = 0
3,509,030 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,654,000 UART: [idev] Erasing UDS.KEYID = 0
6,016,940 UART: [idev] Sha1 KeyId Algorithm
6,040,008 UART: [idev] --
6,044,764 UART: [ldev] ++
6,045,338 UART: [ldev] CDI.KEYID = 6
6,046,248 UART: [ldev] SUBJECT.KEYID = 5
6,047,409 UART: [ldev] AUTHORITY.KEYID = 7
6,048,646 UART: [ldev] FE.KEYID = 1
6,086,470 UART: [ldev] Erasing FE.KEYID = 1
8,586,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,307,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,339,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,375,156 UART: [ldev] --
10,380,257 UART: [fwproc] Wait for Commands...
10,382,513 UART: [fwproc] Recv command 0x46574c44
10,384,564 UART: [fwproc] Recv'd Img size: 115304 bytes
13,798,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,991 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,257,822 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,381,399 ready_for_fw is high
3,382,080 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,096,322 >>> mbox cmd response: success
18,390,928 UART:
18,391,312 UART: Running Caliptra FMC ...
18,392,424 UART:
18,392,578 UART: [state] CFI Enabled
18,457,460 UART: [fht] FMC Alias Private Key: 7
20,221,704 UART: [art] Extend RT PCRs Done
20,222,929 UART: [art] Lock RT PCRs Done
20,224,855 UART: [art] Populate DV Done
20,230,143 UART: [fht] FMC Alias Private Key: 7
20,231,684 UART: [art] Derive CDI
20,232,421 UART: [art] Store in in slot 0x4
20,290,663 UART: [art] Derive Key Pair
20,291,706 UART: [art] Store priv key in slot 0x5
22,755,453 UART: [art] Derive Key Pair - Done
22,768,367 UART: [art] Signing Cert with AUTHO
22,769,680 UART: RITY.KEYID = 7
24,480,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,098 UART: [art] PUB.X = 0DD7468C638A989F7AF65266F44AE881BD12EB204545B3461B9A5F0A79E957516C02977BA7A7988E63D5FBA3637322B8
24,489,387 UART: [art] PUB.Y = 69AF670C68037E9F9E3CD14E9D9F754975761A8C13BAAB6298896435A62938E9B0C9705258F34DC6F5BD9F944E395423
24,496,609 UART: [art] SIG.R = E2F49884869790E4748E95A4DBF93841E5CDA386B297466FC22E63485452B341E4C1A55504426E16F6AB406917AD7D34
24,503,972 UART: [art] SIG.S = 22D7D012C48F2EC6CF163B1CA57680E85490BB69335F3CFB108C0A51BDF5529F58DAF7D31D7FA1D44AC2DC2441702AB6
25,483,021 UART: Caliptra RT
25,483,731 UART: [state] CFI Enabled
25,648,681 UART: [rt] RT listening for mailbox commands...
25,650,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,680,464 UART: [rt]cmd =0x46504c54, len=4
25,682,042 >>> mbox cmd response data (8 bytes)
25,682,832 UART: [rt] FIPS self test
25,683,774 UART: [kat] ++
25,684,227 UART: [kat] sha1
25,688,553 UART: [kat] SHA2-256
25,690,420 UART: [kat] SHA2-384
25,692,961 UART: Fatal Error: 0x90020002
25,728,203 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,873,077 >>> mbox cmd response: failed
25,873,685 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,018,478 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,348,901 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,068,170 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,233 writing to cptra_bootfsm_go
193,493 UART:
193,867 UART: Running Caliptra ROM ...
194,981 UART:
604,665 UART: [state] CFI Enabled
616,346 UART: [state] LifecycleState = Unprovisioned
618,232 UART: [state] DebugLocked = No
620,322 UART: [state] WD Timer not started. Device not locked for debugging
623,988 UART: [kat] SHA2-256
803,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,722 UART: [kat] ++
815,171 UART: [kat] sha1
825,337 UART: [kat] SHA2-256
828,353 UART: [kat] SHA2-384
834,560 UART: [kat] SHA2-512-ACC
837,578 UART: [kat] ECC-384
3,279,328 UART: [kat] HMAC-384Kdf
3,291,855 UART: [kat] LMS
3,821,413 UART: [kat] --
3,826,044 UART: [cold-reset] ++
3,827,215 UART: [fht] FHT @ 0x50003400
3,838,343 UART: [idev] ++
3,838,910 UART: [idev] CDI.KEYID = 6
3,839,822 UART: [idev] SUBJECT.KEYID = 7
3,840,939 UART: [idev] UDS.KEYID = 0
3,842,041 ready_for_fw is high
3,842,277 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,987,426 UART: [idev] Erasing UDS.KEYID = 0
6,311,568 UART: [idev] Sha1 KeyId Algorithm
6,333,023 UART: [idev] --
6,336,782 UART: [ldev] ++
6,337,365 UART: [ldev] CDI.KEYID = 6
6,338,277 UART: [ldev] SUBJECT.KEYID = 5
6,339,441 UART: [ldev] AUTHORITY.KEYID = 7
6,340,731 UART: [ldev] FE.KEYID = 1
6,350,030 UART: [ldev] Erasing FE.KEYID = 1
8,821,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,465 UART: [ldev] --
10,611,215 UART: [fwproc] Wait for Commands...
10,614,448 UART: [fwproc] Recv command 0x46574c44
10,616,542 UART: [fwproc] Recv'd Img size: 115304 bytes
14,035,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,393 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,503,756 >>> mbox cmd response: success
14,507,308 UART: [afmc] ++
14,507,901 UART: [afmc] CDI.KEYID = 6
14,508,790 UART: [afmc] SUBJECT.KEYID = 7
14,510,025 UART: [afmc] AUTHORITY.KEYID = 5
17,012,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,734,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,130 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,804 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,484 UART: [afmc] --
18,810,221 UART: [cold-reset] --
18,813,440 UART: [state] Locking Datavault
18,818,576 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,281 UART: [state] Locking ICCM
18,822,158 UART: [exit] Launching FMC @ 0x40000130
18,830,554 UART:
18,830,790 UART: Running Caliptra FMC ...
18,831,892 UART:
18,832,067 UART: [state] CFI Enabled
18,840,172 UART: [fht] FMC Alias Private Key: 7
20,597,301 UART: [art] Extend RT PCRs Done
20,598,520 UART: [art] Lock RT PCRs Done
20,600,253 UART: [art] Populate DV Done
20,605,774 UART: [fht] FMC Alias Private Key: 7
20,607,419 UART: [art] Derive CDI
20,608,154 UART: [art] Store in in slot 0x4
20,650,704 UART: [art] Derive Key Pair
20,651,747 UART: [art] Store priv key in slot 0x5
23,077,973 UART: [art] Derive Key Pair - Done
23,091,031 UART: [art] Signing Cert with AUTHO
23,092,341 UART: RITY.KEYID = 7
24,797,812 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,330 UART: [art] PUB.X = 57927FCDD7DF46F6A4F6849A0835E10D02CE5E69B50EF84A2B4E3C3182E400A6BA09E254B14B65FA88EA5F2511556B18
24,806,628 UART: [art] PUB.Y = 36A6B6810DF7EBCB64740A53D3CCE1FCACDBB5A4DDA365E0EC73D0504CBEDB828EE9279C9B647E15B6F81E3DD411B6AF
24,813,901 UART: [art] SIG.R = 530211AD370222974AC604728D06520DA514743985EBC594295E5B4C18A470261426FFE307EF0D3811E46DA695799D32
24,821,252 UART: [art] SIG.S = 6CE2EB0AA02D4BF9A60D8C95C2320AFB9085A4903F9D84B0584ECAC52B7F419A0A9FE3B529D017B0DFC41FC08FD645C9
25,800,394 UART: Caliptra RT
25,801,098 UART: [state] CFI Enabled
25,919,139 UART: [rt] RT listening for mailbox commands...
25,920,985 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,928 UART: [rt]cmd =0x46504c54, len=4
25,952,486 >>> mbox cmd response data (8 bytes)
25,953,712 UART: [rt] FIPS self test
25,954,660 UART: [kat] ++
25,955,113 UART: [kat] sha1
25,959,551 UART: [kat] SHA2-256
25,961,432 UART: [kat] SHA2-384
25,963,797 UART: Fatal Error: 0x90020002
25,999,001 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,143,811 >>> mbox cmd response: failed
26,144,424 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,289,147 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,132 UART:
190,426 UART: Running Caliptra ROM ...
191,449 UART:
14,240,166 UART: [state] CFI Enabled
14,254,729 UART: [state] LifecycleState = Unprovisioned
14,256,607 UART: [state] DebugLocked = No
14,259,344 UART: [state] WD Timer not started. Device not locked for debugging
14,263,846 UART: [kat] SHA2-256
14,442,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,454,559 UART: [kat] ++
14,455,102 UART: [kat] sha1
14,467,615 UART: [kat] SHA2-256
14,470,648 UART: [kat] SHA2-384
14,476,037 UART: [kat] SHA2-512-ACC
14,478,984 UART: [kat] ECC-384
16,921,737 UART: [kat] HMAC-384Kdf
16,934,140 UART: [kat] LMS
17,463,637 UART: [kat] --
17,468,512 UART: [cold-reset] ++
17,469,587 UART: [fht] FHT @ 0x50003400
17,481,702 UART: [idev] ++
17,482,309 UART: [idev] CDI.KEYID = 6
17,483,228 UART: [idev] SUBJECT.KEYID = 7
17,484,391 UART: [idev] UDS.KEYID = 0
17,485,951 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,630,613 UART: [idev] Erasing UDS.KEYID = 0
19,951,856 UART: [idev] Sha1 KeyId Algorithm
19,974,285 UART: [idev] --
19,976,524 UART: [ldev] ++
19,977,102 UART: [ldev] CDI.KEYID = 6
19,978,012 UART: [ldev] SUBJECT.KEYID = 5
19,979,170 UART: [ldev] AUTHORITY.KEYID = 7
19,980,451 UART: [ldev] FE.KEYID = 1
19,990,453 UART: [ldev] Erasing FE.KEYID = 1
22,470,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,188,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,204,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,220,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,235,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,257,578 UART: [ldev] --
24,261,443 UART: [fwproc] Wait for Commands...
24,264,565 UART: [fwproc] Recv command 0x46574c44
24,266,604 UART: [fwproc] Recv'd Img size: 115304 bytes
27,691,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,764,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,833,147 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,154,872 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,693,628 ready_for_fw is high
3,694,092 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,293,571 >>> mbox cmd response: success
18,539,255 UART:
18,539,683 UART: Running Caliptra FMC ...
18,540,805 UART:
18,540,957 UART: [state] CFI Enabled
18,548,931 UART: [fht] FMC Alias Private Key: 7
20,306,040 UART: [art] Extend RT PCRs Done
20,307,271 UART: [art] Lock RT PCRs Done
20,309,262 UART: [art] Populate DV Done
20,314,724 UART: [fht] FMC Alias Private Key: 7
20,316,383 UART: [art] Derive CDI
20,317,120 UART: [art] Store in in slot 0x4
20,359,777 UART: [art] Derive Key Pair
20,360,824 UART: [art] Store priv key in slot 0x5
22,787,617 UART: [art] Derive Key Pair - Done
22,800,345 UART: [art] Signing Cert with AUTHO
22,801,653 UART: RITY.KEYID = 7
24,507,049 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,561 UART: [art] PUB.X = 550EFDD667653D3207A58326C5DCE6FB9E583115383C1BF1774ECA9D9302E41EB7F8528D53405D98E5EED3CFA9B31678
24,515,797 UART: [art] PUB.Y = C0C8B2A26D5102A709CAAC913CC2E01D1A7DD942A2998035EF4A94B1574CDC57827BB3DDC3C0618D86A60FD0903B60AB
24,523,079 UART: [art] SIG.R = 611074FBFE2C11293D64369D30E0815A3FE473B8A23344C4E518F79FC55E3887D57D8D19B5322D0E510BDD9FA3DBDA8F
24,530,444 UART: [art] SIG.S = 4D202B6E9AD3061A360F064E9863CA91D40B94B66EA9ECA19235D417E62AEDDAEBEC1BFFE83FB5996F7950B8922D12DB
25,509,856 UART: Caliptra RT
25,510,576 UART: [state] CFI Enabled
25,626,906 UART: [rt] RT listening for mailbox commands...
25,628,761 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,658,386 UART: [rt]cmd =0x46504c54, len=4
25,659,942 >>> mbox cmd response data (8 bytes)
25,661,204 UART: [rt] FIPS self test
25,662,152 UART: [kat] ++
25,662,608 UART: [kat] sha1
25,667,174 UART: [kat] SHA2-256
25,669,102 UART: [kat] SHA2-384
25,671,250 UART: Fatal Error: 0x90020002
25,706,433 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,851,241 >>> mbox cmd response: failed
25,851,875 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,996,607 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
17,631,642 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,231,041 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,088 UART:
192,467 UART: Running Caliptra ROM ...
193,649 UART:
193,811 UART: [state] CFI Enabled
264,754 UART: [state] LifecycleState = Unprovisioned
267,161 UART: [state] DebugLocked = No
268,489 UART: [state] WD Timer not started. Device not locked for debugging
272,750 UART: [kat] SHA2-256
462,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,472 UART: [kat] ++
473,921 UART: [kat] sha1
484,657 UART: [kat] SHA2-256
487,669 UART: [kat] SHA2-384
493,234 UART: [kat] SHA2-512-ACC
495,814 UART: [kat] ECC-384
2,946,781 UART: [kat] HMAC-384Kdf
2,970,388 UART: [kat] LMS
3,502,153 UART: [kat] --
3,507,009 UART: [cold-reset] ++
3,508,241 UART: [fht] FHT @ 0x50003400
3,520,763 UART: [idev] ++
3,521,400 UART: [idev] CDI.KEYID = 6
3,522,357 UART: [idev] SUBJECT.KEYID = 7
3,523,609 UART: [idev] UDS.KEYID = 0
3,524,512 ready_for_fw is high
3,524,713 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,775 UART: [idev] Erasing UDS.KEYID = 0
6,030,828 UART: [idev] Sha1 KeyId Algorithm
6,053,161 UART: [idev] --
6,057,358 UART: [ldev] ++
6,058,053 UART: [ldev] CDI.KEYID = 6
6,058,973 UART: [ldev] SUBJECT.KEYID = 5
6,060,132 UART: [ldev] AUTHORITY.KEYID = 7
6,061,362 UART: [ldev] FE.KEYID = 1
6,100,692 UART: [ldev] Erasing FE.KEYID = 1
8,605,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,194 UART: [ldev] --
10,414,978 UART: [fwproc] Wait for Commands...
10,417,938 UART: [fwproc] Recv command 0x46574c44
10,420,251 UART: [fwproc] Recv'd Img size: 115304 bytes
13,873,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,292 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,616,071 >>> mbox cmd response: success
14,620,053 UART: [afmc] ++
14,620,759 UART: [afmc] CDI.KEYID = 6
14,621,944 UART: [afmc] SUBJECT.KEYID = 7
14,623,432 UART: [afmc] AUTHORITY.KEYID = 5
17,149,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,066 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,845 UART: [afmc] --
18,947,449 UART: [cold-reset] --
18,951,421 UART: [state] Locking Datavault
18,957,371 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,558 UART: [state] Locking ICCM
18,961,596 UART: [exit] Launching FMC @ 0x40000130
18,970,257 UART:
18,970,496 UART: Running Caliptra FMC ...
18,971,598 UART:
18,971,765 UART: [state] CFI Enabled
19,030,534 UART: [fht] FMC Alias Private Key: 7
20,794,212 UART: [art] Extend RT PCRs Done
20,795,443 UART: [art] Lock RT PCRs Done
20,797,337 UART: [art] Populate DV Done
20,802,908 UART: [fht] FMC Alias Private Key: 7
20,804,505 UART: [art] Derive CDI
20,805,319 UART: [art] Store in in slot 0x4
20,863,445 UART: [art] Derive Key Pair
20,864,485 UART: [art] Store priv key in slot 0x5
23,327,466 UART: [art] Derive Key Pair - Done
23,340,690 UART: [art] Signing Cert with AUTHO
23,341,995 UART: RITY.KEYID = 7
25,053,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,098 UART: [art] PUB.X = 34FA64D8F3CDBC77D908D750F69DFBED3AE6059EDFE816D720DB33FFEDC547A291B7E00F7B94B1AECA197F2538CE63D3
25,062,411 UART: [art] PUB.Y = 814E7F039D2A249777FBB239D6319D0253FF26690A92734B2D7AA6035736E808AB4C0BDF82FC21B45BAB9BC9EC230737
25,069,652 UART: [art] SIG.R = 8AFEECDD18514BD271AEB7188933C37E691B0211E9163C66637D74234996F7FCA3CB6D210021222FB55BE947586A2917
25,077,073 UART: [art] SIG.S = 69B864A1573B5B1E3E69F9023A24C57EE3980FB3A58ED439E28A870A4082CDAF2F7496837FF6FD13EC01F64F04069A43
26,056,217 UART: Caliptra RT
26,056,932 UART: [state] CFI Enabled
26,221,892 UART: [rt] RT listening for mailbox commands...
26,223,752 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,300 UART: [rt]cmd =0x46504c54, len=4
26,254,880 >>> mbox cmd response data (8 bytes)
26,256,023 UART: [rt] FIPS self test
26,256,976 UART: [kat] ++
26,257,427 UART: [kat] sha1
26,261,773 UART: [kat] SHA2-256
26,263,644 UART: [kat] SHA2-384
26,265,962 UART: Fatal Error: 0x90020002
26,301,352 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,446,043 >>> mbox cmd response: failed
26,446,720 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,591,539 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,106 UART:
190,393 UART: Running Caliptra ROM ...
191,446 UART:
191,590 UART: [state] CFI Enabled
249,040 UART: [state] LifecycleState = Unprovisioned
251,413 UART: [state] DebugLocked = No
254,352 UART: [state] WD Timer not started. Device not locked for debugging
259,152 UART: [kat] SHA2-256
449,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,817 UART: [kat] ++
460,290 UART: [kat] sha1
472,680 UART: [kat] SHA2-256
475,692 UART: [kat] SHA2-384
481,689 UART: [kat] SHA2-512-ACC
484,302 UART: [kat] ECC-384
2,935,613 UART: [kat] HMAC-384Kdf
2,959,402 UART: [kat] LMS
3,491,158 UART: [kat] --
3,495,389 UART: [cold-reset] ++
3,496,354 UART: [fht] FHT @ 0x50003400
3,506,688 UART: [idev] ++
3,507,367 UART: [idev] CDI.KEYID = 6
3,508,329 UART: [idev] SUBJECT.KEYID = 7
3,509,544 UART: [idev] UDS.KEYID = 0
3,511,058 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,656,218 UART: [idev] Erasing UDS.KEYID = 0
6,015,592 UART: [idev] Sha1 KeyId Algorithm
6,037,318 UART: [idev] --
6,043,423 UART: [ldev] ++
6,044,128 UART: [ldev] CDI.KEYID = 6
6,045,044 UART: [ldev] SUBJECT.KEYID = 5
6,046,207 UART: [ldev] AUTHORITY.KEYID = 7
6,047,452 UART: [ldev] FE.KEYID = 1
6,087,541 UART: [ldev] Erasing FE.KEYID = 1
8,594,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,216 UART: [ldev] --
10,400,152 UART: [fwproc] Wait for Commands...
10,403,161 UART: [fwproc] Recv command 0x46574c44
10,405,472 UART: [fwproc] Recv'd Img size: 115304 bytes
13,860,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,960 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,601,455 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,437,903 ready_for_fw is high
3,438,497 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,762,049 >>> mbox cmd response: success
19,049,535 UART:
19,049,943 UART: Running Caliptra FMC ...
19,051,101 UART:
19,051,263 UART: [state] CFI Enabled
19,118,408 UART: [fht] FMC Alias Private Key: 7
20,882,451 UART: [art] Extend RT PCRs Done
20,883,682 UART: [art] Lock RT PCRs Done
20,885,201 UART: [art] Populate DV Done
20,890,727 UART: [fht] FMC Alias Private Key: 7
20,892,331 UART: [art] Derive CDI
20,893,152 UART: [art] Store in in slot 0x4
20,950,792 UART: [art] Derive Key Pair
20,951,838 UART: [art] Store priv key in slot 0x5
23,415,293 UART: [art] Derive Key Pair - Done
23,428,448 UART: [art] Signing Cert with AUTHO
23,429,788 UART: RITY.KEYID = 7
25,141,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,598 UART: [art] PUB.X = 2FB70E4199D568D4AC78E03107E83CAC694928521F2E7AF9270CC49EFF40FAC2509A2227ACEA3572DEE30DC02F8476AE
25,149,874 UART: [art] PUB.Y = 6D044905A659C95845A942DF6B538654707667631BBE758B566DAED0E4F47BF03B9CBF8B043053D28EB430B5D2AFD5AC
25,157,138 UART: [art] SIG.R = 0AE0B1165CF43705869939AADFAF30E07A7137D3CC3FBA2EFD613D7D8656FFB2F2E2E16CD12350ACC9CEA9A72FE370F5
25,164,540 UART: [art] SIG.S = CBCAA3AB06EC96163076E8FB53860E4A1374A5AA3F639941B27AFAC3DE6F3D639FF5FA996C6CE6EC124774718276D658
26,143,329 UART: Caliptra RT
26,144,056 UART: [state] CFI Enabled
26,310,077 UART: [rt] RT listening for mailbox commands...
26,311,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,341,536 UART: [rt]cmd =0x46504c54, len=4
26,343,228 >>> mbox cmd response data (8 bytes)
26,344,287 UART: [rt] FIPS self test
26,345,232 UART: [kat] ++
26,345,705 UART: [kat] sha1
26,350,193 UART: [kat] SHA2-256
26,352,126 UART: [kat] SHA2-384
26,354,387 UART: Fatal Error: 0x90020002
26,389,814 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,534,512 >>> mbox cmd response: failed
26,535,155 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,679,899 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,427,012 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,772,191 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,406 UART:
192,770 UART: Running Caliptra ROM ...
193,906 UART:
603,624 UART: [state] CFI Enabled
616,008 UART: [state] LifecycleState = Unprovisioned
618,404 UART: [state] DebugLocked = No
620,215 UART: [state] WD Timer not started. Device not locked for debugging
623,914 UART: [kat] SHA2-256
813,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,349 UART: [kat] ++
824,868 UART: [kat] sha1
836,457 UART: [kat] SHA2-256
839,471 UART: [kat] SHA2-384
847,027 UART: [kat] SHA2-512-ACC
849,611 UART: [kat] ECC-384
3,291,533 UART: [kat] HMAC-384Kdf
3,305,803 UART: [kat] LMS
3,837,621 UART: [kat] --
3,841,850 UART: [cold-reset] ++
3,843,785 UART: [fht] FHT @ 0x50003400
3,854,287 UART: [idev] ++
3,854,973 UART: [idev] CDI.KEYID = 6
3,855,899 UART: [idev] SUBJECT.KEYID = 7
3,857,106 UART: [idev] UDS.KEYID = 0
3,858,035 ready_for_fw is high
3,858,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,003,000 UART: [idev] Erasing UDS.KEYID = 0
6,333,065 UART: [idev] Sha1 KeyId Algorithm
6,356,208 UART: [idev] --
6,360,852 UART: [ldev] ++
6,361,532 UART: [ldev] CDI.KEYID = 6
6,362,443 UART: [ldev] SUBJECT.KEYID = 5
6,363,603 UART: [ldev] AUTHORITY.KEYID = 7
6,364,837 UART: [ldev] FE.KEYID = 1
6,375,592 UART: [ldev] Erasing FE.KEYID = 1
8,855,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,892 UART: [ldev] --
10,648,007 UART: [fwproc] Wait for Commands...
10,651,158 UART: [fwproc] Recv command 0x46574c44
10,653,468 UART: [fwproc] Recv'd Img size: 115304 bytes
14,115,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,318 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,858,342 >>> mbox cmd response: success
14,862,078 UART: [afmc] ++
14,862,780 UART: [afmc] CDI.KEYID = 6
14,863,966 UART: [afmc] SUBJECT.KEYID = 7
14,865,449 UART: [afmc] AUTHORITY.KEYID = 5
17,364,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,156,514 UART: [afmc] --
19,160,493 UART: [cold-reset] --
19,164,519 UART: [state] Locking Datavault
19,170,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,771 UART: [state] Locking ICCM
19,175,462 UART: [exit] Launching FMC @ 0x40000130
19,184,130 UART:
19,184,375 UART: Running Caliptra FMC ...
19,185,479 UART:
19,185,643 UART: [state] CFI Enabled
19,193,638 UART: [fht] FMC Alias Private Key: 7
20,950,244 UART: [art] Extend RT PCRs Done
20,951,533 UART: [art] Lock RT PCRs Done
20,953,426 UART: [art] Populate DV Done
20,958,521 UART: [fht] FMC Alias Private Key: 7
20,960,061 UART: [art] Derive CDI
20,960,879 UART: [art] Store in in slot 0x4
21,003,421 UART: [art] Derive Key Pair
21,004,466 UART: [art] Store priv key in slot 0x5
23,431,031 UART: [art] Derive Key Pair - Done
23,444,345 UART: [art] Signing Cert with AUTHO
23,445,651 UART: RITY.KEYID = 7
25,150,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,414 UART: [art] PUB.X = 8719C809A5286F82402FB2C9921DA800752A71143EC1FFE606C999C1F225A4180C87F4A6EE5C0F2AEC343F9DD937A078
25,159,620 UART: [art] PUB.Y = 0D555949CD4C7706C1C15634A7408513222C192C5334550D76541A43797E5F1ACE39151F94BB2D97A7EA0D1D91EA1390
25,166,865 UART: [art] SIG.R = BC7A8B2FCA4CEB8725E26007A653C4D42523A213C8B3879916DD7CE4915EA127BE1B09CB239891626036C96BE9492D6A
25,174,264 UART: [art] SIG.S = 2DD677947726676915B1761DF6B168E5F800D0988A290DDA91727E753BD3976CF7026EA8B38B604A1507D68A88A0F319
26,153,140 UART: Caliptra RT
26,153,830 UART: [state] CFI Enabled
26,271,301 UART: [rt] RT listening for mailbox commands...
26,273,159 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,302,801 UART: [rt]cmd =0x46504c54, len=4
26,304,218 >>> mbox cmd response data (8 bytes)
26,304,970 UART: [rt] FIPS self test
26,305,910 UART: [kat] ++
26,306,363 UART: [kat] sha1
26,310,764 UART: [kat] SHA2-256
26,312,692 UART: [kat] SHA2-384
26,314,840 UART: Fatal Error: 0x90020002
26,350,213 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,495,408 >>> mbox cmd response: failed
26,496,084 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,640,668 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,016 UART:
190,312 UART: Running Caliptra ROM ...
191,336 UART:
13,882,409 UART: [state] CFI Enabled
13,894,635 UART: [state] LifecycleState = Unprovisioned
13,897,043 UART: [state] DebugLocked = No
13,898,296 UART: [state] WD Timer not started. Device not locked for debugging
13,902,737 UART: [kat] SHA2-256
14,092,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,103,457 UART: [kat] ++
14,103,917 UART: [kat] sha1
14,116,316 UART: [kat] SHA2-256
14,119,330 UART: [kat] SHA2-384
14,125,425 UART: [kat] SHA2-512-ACC
14,128,001 UART: [kat] ECC-384
16,569,604 UART: [kat] HMAC-384Kdf
16,582,472 UART: [kat] LMS
17,114,347 UART: [kat] --
17,118,497 UART: [cold-reset] ++
17,120,266 UART: [fht] FHT @ 0x50003400
17,130,446 UART: [idev] ++
17,131,189 UART: [idev] CDI.KEYID = 6
17,132,080 UART: [idev] SUBJECT.KEYID = 7
17,133,296 UART: [idev] UDS.KEYID = 0
17,134,817 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,279,408 UART: [idev] Erasing UDS.KEYID = 0
19,607,938 UART: [idev] Sha1 KeyId Algorithm
19,630,815 UART: [idev] --
19,635,311 UART: [ldev] ++
19,635,991 UART: [ldev] CDI.KEYID = 6
19,636,951 UART: [ldev] SUBJECT.KEYID = 5
19,638,108 UART: [ldev] AUTHORITY.KEYID = 7
19,639,306 UART: [ldev] FE.KEYID = 1
19,650,434 UART: [ldev] Erasing FE.KEYID = 1
22,132,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,850,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,865,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,880,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,895,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,917,042 UART: [ldev] --
23,922,371 UART: [fwproc] Wait for Commands...
23,925,549 UART: [fwproc] Recv command 0x46574c44
23,927,866 UART: [fwproc] Recv'd Img size: 115304 bytes
27,392,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,473,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,589,832 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,138,448 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,757,194 ready_for_fw is high
3,757,860 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,977,914 >>> mbox cmd response: success
19,225,554 UART:
19,225,941 UART: Running Caliptra FMC ...
19,227,145 UART:
19,227,316 UART: [state] CFI Enabled
19,234,963 UART: [fht] FMC Alias Private Key: 7
20,991,910 UART: [art] Extend RT PCRs Done
20,993,142 UART: [art] Lock RT PCRs Done
20,994,682 UART: [art] Populate DV Done
20,999,845 UART: [fht] FMC Alias Private Key: 7
21,001,450 UART: [art] Derive CDI
21,002,297 UART: [art] Store in in slot 0x4
21,044,791 UART: [art] Derive Key Pair
21,045,824 UART: [art] Store priv key in slot 0x5
23,472,743 UART: [art] Derive Key Pair - Done
23,485,754 UART: [art] Signing Cert with AUTHO
23,487,088 UART: RITY.KEYID = 7
25,192,682 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,172 UART: [art] PUB.X = 341FFC5E321468776F2694412F9C9BECE4750C94AA82D4D79E749FF1088ED051B36A6E46817BF215042CB39C1CB060DF
25,201,478 UART: [art] PUB.Y = 2E42DA23C6587BF55C7DF5664A1D2A52A2384C58169BA99E0CB098088A14EBD94C7D2A36B73371F58AF43C08FEFEB144
25,208,727 UART: [art] SIG.R = C3FF52DB0AB9FD173E7432EB76DDE7617FF630A128E058E90A4D7BF795322B98538C5884070BF06BDFFD30CCEA1D5F02
25,216,137 UART: [art] SIG.S = F6FC1FFB1EF1F254B8C37F389C6C921860864F15A5697CE40014A2B2328645A4ACD5E5283D4951BD31DD8E63A546367F
26,195,158 UART: Caliptra RT
26,195,870 UART: [state] CFI Enabled
26,312,777 UART: [rt] RT listening for mailbox commands...
26,314,632 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,344,306 UART: [rt]cmd =0x46504c54, len=4
26,345,986 >>> mbox cmd response data (8 bytes)
26,347,344 UART: [rt] FIPS self test
26,348,303 UART: [kat] ++
26,348,753 UART: [kat] sha1
26,353,154 UART: [kat] SHA2-256
26,355,028 UART: [kat] SHA2-384
26,357,448 UART: Fatal Error: 0x90020002
26,392,801 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,537,630 >>> mbox cmd response: failed
26,538,235 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,683,029 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
17,001,952 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,223,290 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,593 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 ready_for_fw is high
1,480,595 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,880 UART: [idev] Erasing UDS.KEYID = 0
1,504,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,318 UART: [idev] --
1,514,435 UART: [ldev] ++
1,514,603 UART: [ldev] CDI.KEYID = 6
1,514,966 UART: [ldev] SUBJECT.KEYID = 5
1,515,392 UART: [ldev] AUTHORITY.KEYID = 7
1,515,855 UART: [ldev] FE.KEYID = 1
1,520,965 UART: [ldev] Erasing FE.KEYID = 1
1,546,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,818 UART: [ldev] --
1,585,123 UART: [fwproc] Waiting for Commands...
1,585,844 UART: [fwproc] Received command 0x46574c44
1,586,635 UART: [fwproc] Received Image of size 115304 bytes
2,896,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,917 >>> mbox cmd response: success
3,092,075 UART: [afmc] ++
3,092,243 UART: [afmc] CDI.KEYID = 6
3,092,605 UART: [afmc] SUBJECT.KEYID = 7
3,093,030 UART: [afmc] AUTHORITY.KEYID = 5
3,126,995 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,380 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,070 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,865 UART: [afmc] --
3,169,835 UART: [cold-reset] --
3,170,555 UART: [state] Locking Datavault
3,171,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,384 UART: [state] Locking ICCM
3,173,018 UART: [exit] Launching FMC @ 0x40000130
3,178,347 UART:
3,178,363 UART: Running Caliptra FMC ...
3,178,771 UART:
3,178,825 UART: [state] CFI Enabled
3,189,672 UART: [fht] FMC Alias Private Key: 7
3,297,691 UART: [art] Extend RT PCRs Done
3,298,119 UART: [art] Lock RT PCRs Done
3,299,869 UART: [art] Populate DV Done
3,307,836 UART: [fht] FMC Alias Private Key: 7
3,308,804 UART: [art] Derive CDI
3,309,084 UART: [art] Store in in slot 0x4
3,394,561 UART: [art] Derive Key Pair
3,394,921 UART: [art] Store priv key in slot 0x5
3,408,667 UART: [art] Derive Key Pair - Done
3,423,353 UART: [art] Signing Cert with AUTHO
3,423,833 UART: RITY.KEYID = 7
3,439,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,104 UART: [art] PUB.X = 8CCC859B16188DB71D7504ECDD7750B1A56F619FFC8150A0AAAB5360E426A38C71032F6A9414A2790E60A834DDB45B4E
3,446,873 UART: [art] PUB.Y = A5CB9600B6D3A0E9AF143FE8B84148089C34B6B8DEAAEFD34C72DBB41676C6C88DAA8978FBCD5F76BA844CF310F14DB6
3,453,822 UART: [art] SIG.R = 0C9409FEE86803F6AA8D47434981465DF442B763B8DDFE7B8182D0A0039867B8E75E09D7B9D22915FA7B0D3EA9EAAD8A
3,460,584 UART: [art] SIG.S = 3BE794DB3DC9FF34504A9B532410DC2C08FC6D9B79A6FB7B1DA7B71B258AC4DCF9C4CB577215752F4E7556A5B4C4FE7D
3,484,730 UART: Caliptra RT
3,484,983 UART: [state] CFI Enabled
3,592,701 UART: [rt] RT listening for mailbox commands...
3,593,364 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,029 UART: [rt]cmd =0x46504c54, len=4
3,624,290 >>> mbox cmd response data (8 bytes)
3,624,527 UART: [rt] FIPS self test
3,624,855 UART: [kat] ++
3,625,007 UART: [kat] sha1
3,629,369 UART: [kat] SHA2-256
3,631,391 UART: [kat] SHA2-384
3,634,400 UART: Fatal Error: 0x90020002
3,635,950 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,955 >>> mbox cmd response: failed
3,635,955 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,960 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,722 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,249 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,660 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,589 UART: [ldev] ++
1,514,757 UART: [ldev] CDI.KEYID = 6
1,515,120 UART: [ldev] SUBJECT.KEYID = 5
1,515,546 UART: [ldev] AUTHORITY.KEYID = 7
1,516,009 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,192 UART: [ldev] --
1,585,649 UART: [fwproc] Waiting for Commands...
1,586,456 UART: [fwproc] Received command 0x46574c44
1,587,247 UART: [fwproc] Received Image of size 115304 bytes
2,897,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,596 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,389 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,973 ready_for_fw is high
1,362,973 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,665 >>> mbox cmd response: success
3,003,343 UART:
3,003,359 UART: Running Caliptra FMC ...
3,003,767 UART:
3,003,821 UART: [state] CFI Enabled
3,014,150 UART: [fht] FMC Alias Private Key: 7
3,121,895 UART: [art] Extend RT PCRs Done
3,122,323 UART: [art] Lock RT PCRs Done
3,123,919 UART: [art] Populate DV Done
3,132,080 UART: [fht] FMC Alias Private Key: 7
3,133,226 UART: [art] Derive CDI
3,133,506 UART: [art] Store in in slot 0x4
3,219,259 UART: [art] Derive Key Pair
3,219,619 UART: [art] Store priv key in slot 0x5
3,232,959 UART: [art] Derive Key Pair - Done
3,247,386 UART: [art] Signing Cert with AUTHO
3,247,866 UART: RITY.KEYID = 7
3,262,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,693 UART: [art] PUB.X = 317B41BED029CE98E495988A455889556BCEEA8A0EBE125266AC64933533E9E447ADFB350418BB4DAF69C75C35E3844B
3,270,463 UART: [art] PUB.Y = 190F665A63747FAA2AF963E7C05DFBCD408AC2745EF20E0EA6082C759DF65780CD3C14FABEC0C84C7799EEEC1B598EB5
3,277,421 UART: [art] SIG.R = CF25F4CBA8CB1A8ACFE1466765810BEB9438A6864AE0C72C83A6EBA4FDFE88F91693FF369CDFD713024E99352F6DB2FC
3,284,207 UART: [art] SIG.S = 2A7AB1DE7315ED3FC025A911DE9A7E3E8E2928FD67ED37D724BED85E73CC1528700A94BA72643D098AA3B36DD496FA96
3,308,680 UART: Caliptra RT
3,308,933 UART: [state] CFI Enabled
3,417,074 UART: [rt] RT listening for mailbox commands...
3,417,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,784 UART: [rt]cmd =0x46504c54, len=4
3,448,693 >>> mbox cmd response data (8 bytes)
3,448,822 UART: [rt] FIPS self test
3,449,150 UART: [kat] ++
3,449,302 UART: [kat] sha1
3,453,584 UART: [kat] SHA2-256
3,455,606 UART: [kat] SHA2-384
3,458,375 UART: Fatal Error: 0x90020002
3,459,925 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,459,930 >>> mbox cmd response: failed
3,459,930 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,459,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,849 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,235 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,796 UART: [kat] SHA2-256
882,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,842 UART: [kat] ++
886,994 UART: [kat] sha1
891,192 UART: [kat] SHA2-256
893,130 UART: [kat] SHA2-384
896,047 UART: [kat] SHA2-512-ACC
897,948 UART: [kat] ECC-384
903,411 UART: [kat] HMAC-384Kdf
908,097 UART: [kat] LMS
1,476,293 UART: [kat] --
1,477,234 UART: [cold-reset] ++
1,477,804 UART: [fht] Storing FHT @ 0x50003400
1,480,633 UART: [idev] ++
1,480,801 UART: [idev] CDI.KEYID = 6
1,481,161 UART: [idev] SUBJECT.KEYID = 7
1,481,585 UART: [idev] UDS.KEYID = 0
1,481,930 ready_for_fw is high
1,481,930 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,591 UART: [idev] Erasing UDS.KEYID = 0
1,506,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,679 UART: [idev] --
1,516,968 UART: [ldev] ++
1,517,136 UART: [ldev] CDI.KEYID = 6
1,517,499 UART: [ldev] SUBJECT.KEYID = 5
1,517,925 UART: [ldev] AUTHORITY.KEYID = 7
1,518,388 UART: [ldev] FE.KEYID = 1
1,523,884 UART: [ldev] Erasing FE.KEYID = 1
1,549,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,425 UART: [ldev] --
1,588,802 UART: [fwproc] Waiting for Commands...
1,589,531 UART: [fwproc] Received command 0x46574c44
1,590,322 UART: [fwproc] Received Image of size 115304 bytes
2,902,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,928,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,958,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,095,536 >>> mbox cmd response: success
3,096,740 UART: [afmc] ++
3,096,908 UART: [afmc] CDI.KEYID = 6
3,097,270 UART: [afmc] SUBJECT.KEYID = 7
3,097,695 UART: [afmc] AUTHORITY.KEYID = 5
3,132,964 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,149,428 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,150,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,155,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,161,821 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,167,511 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,175,308 UART: [afmc] --
3,176,194 UART: [cold-reset] --
3,177,128 UART: [state] Locking Datavault
3,178,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,179,183 UART: [state] Locking ICCM
3,179,773 UART: [exit] Launching FMC @ 0x40000130
3,185,102 UART:
3,185,118 UART: Running Caliptra FMC ...
3,185,526 UART:
3,185,669 UART: [state] CFI Enabled
3,196,536 UART: [fht] FMC Alias Private Key: 7
3,304,685 UART: [art] Extend RT PCRs Done
3,305,113 UART: [art] Lock RT PCRs Done
3,306,395 UART: [art] Populate DV Done
3,314,810 UART: [fht] FMC Alias Private Key: 7
3,315,780 UART: [art] Derive CDI
3,316,060 UART: [art] Store in in slot 0x4
3,401,519 UART: [art] Derive Key Pair
3,401,879 UART: [art] Store priv key in slot 0x5
3,415,037 UART: [art] Derive Key Pair - Done
3,429,818 UART: [art] Signing Cert with AUTHO
3,430,298 UART: RITY.KEYID = 7
3,445,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,446,459 UART: [art] PUB.X = 88A24C10FF6A1687DBC065413E8ECF6F4FA096DD6AB6789B202E6E9FFF13D2A10ED06E08DE3DB9EAF026328E2D92F31E
3,453,243 UART: [art] PUB.Y = 367F08F37F1D9C8BE6ECC9E69418C73464FFE7630675DCDB1A63CCF4037634C61E50975B5EC44318E8DD699C41193A7E
3,460,190 UART: [art] SIG.R = 172BDF5F964F71A7D9AD924B690924BA7EC33A76CE0400B08B8D09371C0DD5D46C7868DDBDC15236312C219AB00BEC95
3,466,933 UART: [art] SIG.S = BEA542A691068696A479529EB026393ACDDBC4BC8E6BBFDF8C9BE41BCB5E01F6EC06267F875826A4BCD771AD0ABA5F3D
3,491,056 UART: Caliptra RT
3,491,401 UART: [state] CFI Enabled
3,599,480 UART: [rt] RT listening for mailbox commands...
3,600,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,874 UART: [rt]cmd =0x46504c54, len=4
3,630,939 >>> mbox cmd response data (8 bytes)
3,631,290 UART: [rt] FIPS self test
3,631,618 UART: [kat] ++
3,631,770 UART: [kat] sha1
3,635,894 UART: [kat] SHA2-256
3,637,916 UART: [kat] SHA2-384
3,640,807 UART: Fatal Error: 0x90020002
3,642,357 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,362 >>> mbox cmd response: failed
3,642,362 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,420 UART: [kat] SHA2-256
892,358 UART: [kat] SHA2-384
894,975 UART: [kat] SHA2-512-ACC
896,876 UART: [kat] ECC-384
902,141 UART: [kat] HMAC-384Kdf
906,657 UART: [kat] LMS
1,474,853 UART: [kat] --
1,475,706 UART: [cold-reset] ++
1,476,150 UART: [fht] Storing FHT @ 0x50003400
1,478,881 UART: [idev] ++
1,479,049 UART: [idev] CDI.KEYID = 6
1,479,409 UART: [idev] SUBJECT.KEYID = 7
1,479,833 UART: [idev] UDS.KEYID = 0
1,480,178 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,841 UART: [idev] Erasing UDS.KEYID = 0
1,504,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,619 UART: [idev] --
1,513,618 UART: [ldev] ++
1,513,786 UART: [ldev] CDI.KEYID = 6
1,514,149 UART: [ldev] SUBJECT.KEYID = 5
1,514,575 UART: [ldev] AUTHORITY.KEYID = 7
1,515,038 UART: [ldev] FE.KEYID = 1
1,520,504 UART: [ldev] Erasing FE.KEYID = 1
1,545,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,541 UART: [ldev] --
1,585,040 UART: [fwproc] Waiting for Commands...
1,585,771 UART: [fwproc] Received command 0x46574c44
1,586,562 UART: [fwproc] Received Image of size 115304 bytes
2,896,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,828 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 ready_for_fw is high
1,362,758 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,720 >>> mbox cmd response: success
3,004,372 UART:
3,004,388 UART: Running Caliptra FMC ...
3,004,796 UART:
3,004,939 UART: [state] CFI Enabled
3,015,884 UART: [fht] FMC Alias Private Key: 7
3,124,013 UART: [art] Extend RT PCRs Done
3,124,441 UART: [art] Lock RT PCRs Done
3,126,317 UART: [art] Populate DV Done
3,134,440 UART: [fht] FMC Alias Private Key: 7
3,135,414 UART: [art] Derive CDI
3,135,694 UART: [art] Store in in slot 0x4
3,221,843 UART: [art] Derive Key Pair
3,222,203 UART: [art] Store priv key in slot 0x5
3,235,659 UART: [art] Derive Key Pair - Done
3,250,135 UART: [art] Signing Cert with AUTHO
3,250,615 UART: RITY.KEYID = 7
3,265,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,520 UART: [art] PUB.X = D4342E76A195958A5D2A5C10D50FA78F3ECEF5D9F6A6C8C4CBE1B67264458F32CCB621147500C744326DD9DBA686B49E
3,273,275 UART: [art] PUB.Y = 9D0CD38AEBC7B7D270AEE6D2271EC14932524DA0E6CFACE669420477EC4B5B7E79643673E6BAEFB4BF40589E81161319
3,280,231 UART: [art] SIG.R = 630F6D332E08FB3252851CFDED379959A29779EFE691836229146EF75F43E49F990CC37BF024F62B700A928808195F70
3,286,978 UART: [art] SIG.S = 683C0AF85F34104E1EF5C57603A01BC94F3FBDE5954F86D43C1387ED67ABA7C050F28F68AB078E700580834AA3296663
3,310,595 UART: Caliptra RT
3,310,940 UART: [state] CFI Enabled
3,419,646 UART: [rt] RT listening for mailbox commands...
3,420,309 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,966 UART: [rt]cmd =0x46504c54, len=4
3,451,081 >>> mbox cmd response data (8 bytes)
3,451,264 UART: [rt] FIPS self test
3,451,592 UART: [kat] ++
3,451,744 UART: [kat] sha1
3,456,142 UART: [kat] SHA2-256
3,458,164 UART: [kat] SHA2-384
3,461,001 UART: Fatal Error: 0x90020002
3,462,551 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,556 >>> mbox cmd response: failed
3,462,556 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,308 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,782 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,563 UART: [kat] SHA2-256
903,503 UART: [kat] SHA2-384
906,060 UART: [kat] SHA2-512-ACC
907,961 UART: [kat] ECC-384
917,682 UART: [kat] HMAC-384Kdf
922,346 UART: [kat] LMS
1,170,674 UART: [kat] --
1,171,621 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,790 UART: [idev] ++
1,174,958 UART: [idev] CDI.KEYID = 6
1,175,318 UART: [idev] SUBJECT.KEYID = 7
1,175,742 UART: [idev] UDS.KEYID = 0
1,176,087 ready_for_fw is high
1,176,087 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,938 UART: [idev] Erasing UDS.KEYID = 0
1,201,289 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,761 UART: [ldev] ++
1,210,929 UART: [ldev] CDI.KEYID = 6
1,211,292 UART: [ldev] SUBJECT.KEYID = 5
1,211,718 UART: [ldev] AUTHORITY.KEYID = 7
1,212,181 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,871 UART: [ldev] --
1,283,384 UART: [fwproc] Wait for Commands...
1,284,040 UART: [fwproc] Recv command 0x46574c44
1,284,768 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,527 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,892 >>> mbox cmd response: success
2,789,136 UART: [afmc] ++
2,789,304 UART: [afmc] CDI.KEYID = 6
2,789,666 UART: [afmc] SUBJECT.KEYID = 7
2,790,091 UART: [afmc] AUTHORITY.KEYID = 5
2,825,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,461 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,285 UART: [afmc] --
2,868,221 UART: [cold-reset] --
2,868,971 UART: [state] Locking Datavault
2,870,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,880 UART: [state] Locking ICCM
2,871,414 UART: [exit] Launching FMC @ 0x40000130
2,876,743 UART:
2,876,759 UART: Running Caliptra FMC ...
2,877,167 UART:
2,877,221 UART: [state] CFI Enabled
2,887,856 UART: [fht] FMC Alias Private Key: 7
2,995,735 UART: [art] Extend RT PCRs Done
2,996,163 UART: [art] Lock RT PCRs Done
2,997,879 UART: [art] Populate DV Done
3,006,120 UART: [fht] FMC Alias Private Key: 7
3,007,256 UART: [art] Derive CDI
3,007,536 UART: [art] Store in in slot 0x4
3,093,373 UART: [art] Derive Key Pair
3,093,733 UART: [art] Store priv key in slot 0x5
3,106,343 UART: [art] Derive Key Pair - Done
3,121,060 UART: [art] Signing Cert with AUTHO
3,121,540 UART: RITY.KEYID = 7
3,136,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,651 UART: [art] PUB.X = 6CCC5F601DED4FB81509951D7EF75090DC0D599952B947E833E4639376247BB1FDF1A87AFC696B7C10927779D142C05F
3,144,417 UART: [art] PUB.Y = 83449352AEC40480FB0345E65EFC778D029080E3BD162F0B380EBE34DC853C8BCA7B359C875BDD2A2BF05CA742742DCB
3,151,364 UART: [art] SIG.R = 934B6E91E3D8049E7C322048EA2072884DAB775F07603C553EB894EC19EE8B9F8A6FFAD71B6271690FFF26DD933012E4
3,158,129 UART: [art] SIG.S = C6CD83B083E40279B4C45C0657884B8171153B19C7625B70A044EC6FB430BC30480420A67D21893AC836EA1829D19C5C
3,182,093 UART: Caliptra RT
3,182,346 UART: [state] CFI Enabled
3,290,570 UART: [rt] RT listening for mailbox commands...
3,291,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,992 UART: [rt]cmd =0x46504c54, len=4
3,322,169 >>> mbox cmd response data (8 bytes)
3,322,284 UART: [rt] FIPS self test
3,322,612 UART: [kat] ++
3,322,764 UART: [kat] sha1
3,327,046 UART: [kat] SHA2-256
3,329,068 UART: [kat] SHA2-384
3,331,705 UART: Fatal Error: 0x90020002
3,333,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,260 >>> mbox cmd response: failed
3,333,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
893,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,235 UART: [kat] ++
897,387 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,298 UART: [kat] SHA2-512-ACC
908,199 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,172,067 UART: [cold-reset] ++
1,172,587 UART: [fht] FHT @ 0x50003400
1,175,338 UART: [idev] ++
1,175,506 UART: [idev] CDI.KEYID = 6
1,175,866 UART: [idev] SUBJECT.KEYID = 7
1,176,290 UART: [idev] UDS.KEYID = 0
1,176,635 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,548 UART: [idev] Erasing UDS.KEYID = 0
1,201,995 UART: [idev] Sha1 KeyId Algorithm
1,210,291 UART: [idev] --
1,211,271 UART: [ldev] ++
1,211,439 UART: [ldev] CDI.KEYID = 6
1,211,802 UART: [ldev] SUBJECT.KEYID = 5
1,212,228 UART: [ldev] AUTHORITY.KEYID = 7
1,212,691 UART: [ldev] FE.KEYID = 1
1,218,023 UART: [ldev] Erasing FE.KEYID = 1
1,244,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,264 UART: [fwproc] Wait for Commands...
1,283,874 UART: [fwproc] Recv command 0x46574c44
1,284,602 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,769 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,924 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 ready_for_fw is high
1,059,847 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,403 >>> mbox cmd response: success
2,704,183 UART:
2,704,199 UART: Running Caliptra FMC ...
2,704,607 UART:
2,704,661 UART: [state] CFI Enabled
2,715,320 UART: [fht] FMC Alias Private Key: 7
2,823,517 UART: [art] Extend RT PCRs Done
2,823,945 UART: [art] Lock RT PCRs Done
2,825,665 UART: [art] Populate DV Done
2,833,902 UART: [fht] FMC Alias Private Key: 7
2,835,082 UART: [art] Derive CDI
2,835,362 UART: [art] Store in in slot 0x4
2,920,609 UART: [art] Derive Key Pair
2,920,969 UART: [art] Store priv key in slot 0x5
2,934,317 UART: [art] Derive Key Pair - Done
2,949,579 UART: [art] Signing Cert with AUTHO
2,950,059 UART: RITY.KEYID = 7
2,965,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,116 UART: [art] PUB.X = 6DC88CF21D27301EBEFC56E74EB663DA2DB5BAE95556DB8B67B419C5467151A1C0BA36D4807D77B3284191DF0131EE4D
2,972,895 UART: [art] PUB.Y = 932FF46F7338CBE5EAEBF7EB440CE35D6225B998441C9B47D829C0CA06EA04BFF21F205AB58E29F80910FAEDEF87221A
2,979,851 UART: [art] SIG.R = 4D5B7813CDC79A240AEAAF93965415AF161F19AA3A3944A8B4F502E3A820B77FAFFBE548E643C461AC4F47507CE35028
2,986,625 UART: [art] SIG.S = 655E93C181104B7DEF342CD160A303AE1E250E0DB4890427380EE2820637635EA5F279138F91FFF533F3295EC123AA99
3,010,932 UART: Caliptra RT
3,011,185 UART: [state] CFI Enabled
3,120,470 UART: [rt] RT listening for mailbox commands...
3,121,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,804 UART: [rt]cmd =0x46504c54, len=4
3,151,913 >>> mbox cmd response data (8 bytes)
3,152,060 UART: [rt] FIPS self test
3,152,388 UART: [kat] ++
3,152,540 UART: [kat] sha1
3,156,646 UART: [kat] SHA2-256
3,158,668 UART: [kat] SHA2-384
3,161,573 UART: Fatal Error: 0x90020002
3,163,123 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,128 >>> mbox cmd response: failed
3,163,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,531 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,383 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
893,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,428 UART: [kat] ++
897,580 UART: [kat] sha1
901,786 UART: [kat] SHA2-256
903,726 UART: [kat] SHA2-384
906,435 UART: [kat] SHA2-512-ACC
908,336 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,172,038 UART: [cold-reset] ++
1,172,532 UART: [fht] FHT @ 0x50003400
1,175,043 UART: [idev] ++
1,175,211 UART: [idev] CDI.KEYID = 6
1,175,571 UART: [idev] SUBJECT.KEYID = 7
1,175,995 UART: [idev] UDS.KEYID = 0
1,176,340 ready_for_fw is high
1,176,340 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,210,146 UART: [idev] --
1,211,112 UART: [ldev] ++
1,211,280 UART: [ldev] CDI.KEYID = 6
1,211,643 UART: [ldev] SUBJECT.KEYID = 5
1,212,069 UART: [ldev] AUTHORITY.KEYID = 7
1,212,532 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,243,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,283,027 UART: [fwproc] Wait for Commands...
1,283,711 UART: [fwproc] Recv command 0x46574c44
1,284,439 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,096 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,313 >>> mbox cmd response: success
2,788,339 UART: [afmc] ++
2,788,507 UART: [afmc] CDI.KEYID = 6
2,788,869 UART: [afmc] SUBJECT.KEYID = 7
2,789,294 UART: [afmc] AUTHORITY.KEYID = 5
2,824,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,172 UART: [afmc] --
2,868,242 UART: [cold-reset] --
2,869,128 UART: [state] Locking Datavault
2,870,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,169 UART: [state] Locking ICCM
2,871,839 UART: [exit] Launching FMC @ 0x40000130
2,877,168 UART:
2,877,184 UART: Running Caliptra FMC ...
2,877,592 UART:
2,877,735 UART: [state] CFI Enabled
2,888,248 UART: [fht] FMC Alias Private Key: 7
2,995,813 UART: [art] Extend RT PCRs Done
2,996,241 UART: [art] Lock RT PCRs Done
2,997,893 UART: [art] Populate DV Done
3,006,090 UART: [fht] FMC Alias Private Key: 7
3,007,250 UART: [art] Derive CDI
3,007,530 UART: [art] Store in in slot 0x4
3,093,121 UART: [art] Derive Key Pair
3,093,481 UART: [art] Store priv key in slot 0x5
3,107,223 UART: [art] Derive Key Pair - Done
3,122,160 UART: [art] Signing Cert with AUTHO
3,122,640 UART: RITY.KEYID = 7
3,137,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,277 UART: [art] PUB.X = 8E44AFC1A8D7DC96DB794833683A2EDD057AABB7ED512A66473DF7EAD2281ED9EAB8E46397F407A7250BDE6DCCB87C43
3,145,060 UART: [art] PUB.Y = 74009D47507FD976E4518F477233F4B81B341BF813274DC8D608A9967F3A64DC83BE2ADC31701E72E2B48B7E433BF424
3,151,983 UART: [art] SIG.R = F463BC2B7E4D08BC8D9A4355C64978D113F61CF45FAF66C9DA82455092A7084BFF7220202116D539AC2CBB9A6D35D6A7
3,158,755 UART: [art] SIG.S = 17F8A3324079BE138D195797805DAB686D4FAB52E4BD58CA3D75CCC53B08DE53872AA63B2949430289FCB1DEED9A907F
3,181,748 UART: Caliptra RT
3,182,093 UART: [state] CFI Enabled
3,290,582 UART: [rt] RT listening for mailbox commands...
3,291,245 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,820 UART: [rt]cmd =0x46504c54, len=4
3,321,913 >>> mbox cmd response data (8 bytes)
3,322,254 UART: [rt] FIPS self test
3,322,582 UART: [kat] ++
3,322,734 UART: [kat] sha1
3,327,096 UART: [kat] SHA2-256
3,329,118 UART: [kat] SHA2-384
3,331,857 UART: Fatal Error: 0x90020002
3,333,407 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,412 >>> mbox cmd response: failed
3,333,412 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,823 UART: [state] LifecycleState = Unprovisioned
85,478 UART: [state] DebugLocked = No
86,006 UART: [state] WD Timer not started. Device not locked for debugging
87,357 UART: [kat] SHA2-256
893,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,132 UART: [kat] ++
897,284 UART: [kat] sha1
901,730 UART: [kat] SHA2-256
903,670 UART: [kat] SHA2-384
906,313 UART: [kat] SHA2-512-ACC
908,214 UART: [kat] ECC-384
918,195 UART: [kat] HMAC-384Kdf
922,801 UART: [kat] LMS
1,171,129 UART: [kat] --
1,171,852 UART: [cold-reset] ++
1,172,194 UART: [fht] FHT @ 0x50003400
1,174,669 UART: [idev] ++
1,174,837 UART: [idev] CDI.KEYID = 6
1,175,197 UART: [idev] SUBJECT.KEYID = 7
1,175,621 UART: [idev] UDS.KEYID = 0
1,175,966 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,627 UART: [idev] Erasing UDS.KEYID = 0
1,200,740 UART: [idev] Sha1 KeyId Algorithm
1,209,056 UART: [idev] --
1,210,118 UART: [ldev] ++
1,210,286 UART: [ldev] CDI.KEYID = 6
1,210,649 UART: [ldev] SUBJECT.KEYID = 5
1,211,075 UART: [ldev] AUTHORITY.KEYID = 7
1,211,538 UART: [ldev] FE.KEYID = 1
1,216,778 UART: [ldev] Erasing FE.KEYID = 1
1,243,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,244 UART: [ldev] --
1,282,651 UART: [fwproc] Wait for Commands...
1,283,323 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,196 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,487 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 ready_for_fw is high
1,060,488 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,882 >>> mbox cmd response: success
2,703,056 UART:
2,703,072 UART: Running Caliptra FMC ...
2,703,480 UART:
2,703,623 UART: [state] CFI Enabled
2,713,992 UART: [fht] FMC Alias Private Key: 7
2,821,761 UART: [art] Extend RT PCRs Done
2,822,189 UART: [art] Lock RT PCRs Done
2,823,617 UART: [art] Populate DV Done
2,831,614 UART: [fht] FMC Alias Private Key: 7
2,832,732 UART: [art] Derive CDI
2,833,012 UART: [art] Store in in slot 0x4
2,918,573 UART: [art] Derive Key Pair
2,918,933 UART: [art] Store priv key in slot 0x5
2,932,157 UART: [art] Derive Key Pair - Done
2,946,786 UART: [art] Signing Cert with AUTHO
2,947,266 UART: RITY.KEYID = 7
2,962,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,235 UART: [art] PUB.X = 91F205DF13A62ED2EA290F9D190FE9F5F68A1370D1D573B2737527F5B49E56CDE8AA44A735CA96BF96EA612DE84329CC
2,970,008 UART: [art] PUB.Y = 10C6CD3B69C7EBD38F4D6282954EE6061646FEDB5B5C05AEF1C689B19CC79FE8936BEAB29224C32B6A56600D288CD059
2,976,961 UART: [art] SIG.R = 7ABD2C147C6C124F255D8458E38015B258FAE2976A12C46B0EB379FEE1DEB0D73637978CBCE2F2FAACCC09641CE81768
2,983,739 UART: [art] SIG.S = 0388BB2FB76138BC9A7B0A9D93B5D2A7BC323A16FEB5929292B4E7489D350B28C5A59D0C942509F424A86DC906E35571
3,007,808 UART: Caliptra RT
3,008,153 UART: [state] CFI Enabled
3,116,402 UART: [rt] RT listening for mailbox commands...
3,117,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,976 UART: [rt]cmd =0x46504c54, len=4
3,147,937 >>> mbox cmd response data (8 bytes)
3,148,220 UART: [rt] FIPS self test
3,148,548 UART: [kat] ++
3,148,700 UART: [kat] sha1
3,152,834 UART: [kat] SHA2-256
3,154,856 UART: [kat] SHA2-384
3,157,541 UART: Fatal Error: 0x90020002
3,159,091 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,096 >>> mbox cmd response: failed
3,159,096 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,000 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,026 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,280 UART: [kat] LMS
1,168,592 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,174,033 ready_for_fw is high
1,174,033 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,240,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,456 UART: [fwproc] Wait for Commands...
1,281,253 UART: [fwproc] Recv command 0x46574c44
1,281,986 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,586 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,786 >>> mbox cmd response: success
2,785,879 UART: [afmc] ++
2,786,047 UART: [afmc] CDI.KEYID = 6
2,786,410 UART: [afmc] SUBJECT.KEYID = 7
2,786,836 UART: [afmc] AUTHORITY.KEYID = 5
2,822,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,706 UART: [afmc] --
2,865,630 UART: [cold-reset] --
2,866,590 UART: [state] Locking Datavault
2,867,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,251 UART: [state] Locking ICCM
2,868,873 UART: [exit] Launching FMC @ 0x40000130
2,874,202 UART:
2,874,218 UART: Running Caliptra FMC ...
2,874,626 UART:
2,874,680 UART: [state] CFI Enabled
2,885,289 UART: [fht] FMC Alias Private Key: 7
2,993,832 UART: [art] Extend RT PCRs Done
2,994,260 UART: [art] Lock RT PCRs Done
2,995,928 UART: [art] Populate DV Done
3,004,085 UART: [fht] FMC Alias Private Key: 7
3,005,265 UART: [art] Derive CDI
3,005,545 UART: [art] Store in in slot 0x4
3,091,434 UART: [art] Derive Key Pair
3,091,794 UART: [art] Store priv key in slot 0x5
3,104,784 UART: [art] Derive Key Pair - Done
3,119,672 UART: [art] Signing Cert with AUTHO
3,120,152 UART: RITY.KEYID = 7
3,134,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,417 UART: [art] PUB.X = E11AFC45ABBE840CC2A251B6D2AE40689776BFCC6706992420DF6BE52831DE2CA28E50253E9DF049D9AC184181A2FC87
3,142,193 UART: [art] PUB.Y = CA5D91F2DB660B5F52F0A9B2F378929598120847799ACC2B70BAF6F40779C13BCFC93FB975DA94F8A11D54CCA28EF1EA
3,149,150 UART: [art] SIG.R = B648168600C75A7FD0A44C8BC1DE9AC0EA47F71E29ACD2C3FEA7DFBA5DBCC1581148703F67675F782BA9D96BD790AA91
3,155,918 UART: [art] SIG.S = 5373817A8A957F7E44ECDC95F312635897D925544BF60727EA11897EE8AAA3C3C67AC03CEC06C35E3D883383A8135E10
3,179,587 UART: Caliptra RT
3,179,840 UART: [state] CFI Enabled
3,287,855 UART: [rt] RT listening for mailbox commands...
3,288,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,333 UART: [rt]cmd =0x46504c54, len=4
3,319,436 >>> mbox cmd response data (8 bytes)
3,319,587 UART: [rt] FIPS self test
3,319,915 UART: [kat] ++
3,320,067 UART: [kat] sha1
3,324,373 UART: [kat] SHA2-256
3,326,395 UART: [kat] SHA2-384
3,329,012 UART: Fatal Error: 0x90020002
3,330,562 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,567 >>> mbox cmd response: failed
3,330,567 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,330,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,388 UART: [kat] HMAC-384Kdf
919,878 UART: [kat] LMS
1,168,190 UART: [kat] --
1,169,267 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,289 UART: [idev] ++
1,172,457 UART: [idev] CDI.KEYID = 6
1,172,818 UART: [idev] SUBJECT.KEYID = 7
1,173,243 UART: [idev] UDS.KEYID = 0
1,173,589 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,658 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,859 UART: [fwproc] Recv command 0x46574c44
1,282,592 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,792 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,152 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,534 ready_for_fw is high
1,056,534 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,664 >>> mbox cmd response: success
2,699,816 UART:
2,699,832 UART: Running Caliptra FMC ...
2,700,240 UART:
2,700,294 UART: [state] CFI Enabled
2,710,597 UART: [fht] FMC Alias Private Key: 7
2,818,474 UART: [art] Extend RT PCRs Done
2,818,902 UART: [art] Lock RT PCRs Done
2,820,948 UART: [art] Populate DV Done
2,829,297 UART: [fht] FMC Alias Private Key: 7
2,830,305 UART: [art] Derive CDI
2,830,585 UART: [art] Store in in slot 0x4
2,916,254 UART: [art] Derive Key Pair
2,916,614 UART: [art] Store priv key in slot 0x5
2,929,716 UART: [art] Derive Key Pair - Done
2,944,447 UART: [art] Signing Cert with AUTHO
2,944,927 UART: RITY.KEYID = 7
2,960,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,828 UART: [art] PUB.X = 3DEA7BE61BACB5A9B4A24076285E28F6AE88F5E7B36FA21F692391763D112AA2ECD5E2DC1BDA5A945D65AD4AEA3236F4
2,967,620 UART: [art] PUB.Y = B6983A2652550213E2E378D7B03B3B992A25C73DF64AFF8C849FBA99BCA3FB62E03C0B7AE3F491E00285DCC4D6627AAD
2,974,575 UART: [art] SIG.R = 308C7B6913191DEB8E42F461BABB2962D99029DA7CD7DC79A32437BA45CF06015738B8A82389A5C5D3542F1BB607575B
2,981,338 UART: [art] SIG.S = EBBBBE127A3B48136EC96681F493133BC5129607530F0A5E0FAE79E7B951944DABF5448468EB6B4ECA1761AE8F96DEA6
3,005,425 UART: Caliptra RT
3,005,678 UART: [state] CFI Enabled
3,112,755 UART: [rt] RT listening for mailbox commands...
3,113,418 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,385 UART: [rt]cmd =0x46504c54, len=4
3,144,434 >>> mbox cmd response data (8 bytes)
3,144,727 UART: [rt] FIPS self test
3,145,055 UART: [kat] ++
3,145,207 UART: [kat] sha1
3,149,315 UART: [kat] SHA2-256
3,151,337 UART: [kat] SHA2-384
3,154,288 UART: Fatal Error: 0x90020002
3,155,838 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,843 >>> mbox cmd response: failed
3,155,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,718 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,746 UART: [cold-reset] ++
1,171,220 UART: [fht] FHT @ 0x50003400
1,173,962 UART: [idev] ++
1,174,130 UART: [idev] CDI.KEYID = 6
1,174,491 UART: [idev] SUBJECT.KEYID = 7
1,174,916 UART: [idev] UDS.KEYID = 0
1,175,262 ready_for_fw is high
1,175,262 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,742 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,809 UART: [ldev] ++
1,210,977 UART: [ldev] CDI.KEYID = 6
1,211,341 UART: [ldev] SUBJECT.KEYID = 5
1,211,768 UART: [ldev] AUTHORITY.KEYID = 7
1,212,231 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,189 UART: [fwproc] Wait for Commands...
1,283,842 UART: [fwproc] Recv command 0x46574c44
1,284,575 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,235 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,523 >>> mbox cmd response: success
2,788,790 UART: [afmc] ++
2,788,958 UART: [afmc] CDI.KEYID = 6
2,789,321 UART: [afmc] SUBJECT.KEYID = 7
2,789,747 UART: [afmc] AUTHORITY.KEYID = 5
2,825,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,761 UART: [afmc] --
2,868,879 UART: [cold-reset] --
2,869,847 UART: [state] Locking Datavault
2,870,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,520 UART: [state] Locking ICCM
2,872,090 UART: [exit] Launching FMC @ 0x40000130
2,877,419 UART:
2,877,435 UART: Running Caliptra FMC ...
2,877,843 UART:
2,877,986 UART: [state] CFI Enabled
2,888,449 UART: [fht] FMC Alias Private Key: 7
2,996,608 UART: [art] Extend RT PCRs Done
2,997,036 UART: [art] Lock RT PCRs Done
2,998,632 UART: [art] Populate DV Done
3,006,799 UART: [fht] FMC Alias Private Key: 7
3,007,877 UART: [art] Derive CDI
3,008,157 UART: [art] Store in in slot 0x4
3,094,146 UART: [art] Derive Key Pair
3,094,506 UART: [art] Store priv key in slot 0x5
3,107,720 UART: [art] Derive Key Pair - Done
3,122,760 UART: [art] Signing Cert with AUTHO
3,123,240 UART: RITY.KEYID = 7
3,138,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,987 UART: [art] PUB.X = 805F3D547E7CDF795C7556E5A8473A1DB596030071938DB25ADA2FCDD86F6AD90FA2F7063002315F6C206A3F9A9BCBC3
3,145,733 UART: [art] PUB.Y = 333B5A5EE4BAF7AE67203BAA71A7256A3259B35AC23E31BC5B0573F44C48E7034C0BB4B1C98C946EFFD999EF443D303A
3,152,688 UART: [art] SIG.R = F9DCE672841C97A98E61213CD7DE555F88751C047216E590D6EF7544075523C339809A9358933261F59A91940D940F8B
3,159,432 UART: [art] SIG.S = A595C5CB0A179BD2851B79913B913451CF2DC6B60B893EE56792489215AE4783BCB602F1F8E31E8B466E010B68462999
3,182,876 UART: Caliptra RT
3,183,221 UART: [state] CFI Enabled
3,291,803 UART: [rt] RT listening for mailbox commands...
3,292,466 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,281 UART: [rt]cmd =0x46504c54, len=4
3,323,594 >>> mbox cmd response data (8 bytes)
3,323,769 UART: [rt] FIPS self test
3,324,097 UART: [kat] ++
3,324,249 UART: [kat] sha1
3,328,419 UART: [kat] SHA2-256
3,330,441 UART: [kat] SHA2-384
3,333,176 UART: Fatal Error: 0x90020002
3,334,726 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,731 >>> mbox cmd response: failed
3,334,731 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,661 UART: [kat] LMS
1,169,973 UART: [kat] --
1,171,058 UART: [cold-reset] ++
1,171,402 UART: [fht] FHT @ 0x50003400
1,174,030 UART: [idev] ++
1,174,198 UART: [idev] CDI.KEYID = 6
1,174,559 UART: [idev] SUBJECT.KEYID = 7
1,174,984 UART: [idev] UDS.KEYID = 0
1,175,330 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,580 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,565 UART: [ldev] ++
1,210,733 UART: [ldev] CDI.KEYID = 6
1,211,097 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,217,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,851 UART: [fwproc] Wait for Commands...
1,283,596 UART: [fwproc] Recv command 0x46574c44
1,284,329 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,699 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,919 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,811 ready_for_fw is high
1,056,811 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,519 >>> mbox cmd response: success
2,698,309 UART:
2,698,325 UART: Running Caliptra FMC ...
2,698,733 UART:
2,698,876 UART: [state] CFI Enabled
2,709,791 UART: [fht] FMC Alias Private Key: 7
2,817,582 UART: [art] Extend RT PCRs Done
2,818,010 UART: [art] Lock RT PCRs Done
2,819,482 UART: [art] Populate DV Done
2,827,709 UART: [fht] FMC Alias Private Key: 7
2,828,731 UART: [art] Derive CDI
2,829,011 UART: [art] Store in in slot 0x4
2,914,632 UART: [art] Derive Key Pair
2,914,992 UART: [art] Store priv key in slot 0x5
2,928,198 UART: [art] Derive Key Pair - Done
2,942,943 UART: [art] Signing Cert with AUTHO
2,943,423 UART: RITY.KEYID = 7
2,958,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,408 UART: [art] PUB.X = D5D9669A33CD18647FAB83ACCE99D0D6920AC20A9125CDF65B2D9E431BB3C3BF4C4F6C4D6FFA4967BA20C24AE2ADD84E
2,966,198 UART: [art] PUB.Y = D3E02CDDE28AC4C7A9729151F53DDB4C8D28C1B3AE6D600FA5735872C8417686A62020A0E7DF452FA2FE1C0C014C5E61
2,973,151 UART: [art] SIG.R = D71222E7DA6AC4FBC917A38BAB6B54099487EEC7B95F41E8D2C3E35D83D6AA7C441B543ECA98AE10B18F7ED46FD1CF00
2,979,918 UART: [art] SIG.S = D6ADB3FD4FD10AEF8A15215AE56893612CABCE67083A3A5BF08E3C08FB9ABDA9CA83CF43DD25095B6B7B2E043457C413
3,004,084 UART: Caliptra RT
3,004,429 UART: [state] CFI Enabled
3,111,685 UART: [rt] RT listening for mailbox commands...
3,112,348 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,079 UART: [rt]cmd =0x46504c54, len=4
3,143,044 >>> mbox cmd response data (8 bytes)
3,143,227 UART: [rt] FIPS self test
3,143,555 UART: [kat] ++
3,143,707 UART: [kat] sha1
3,147,863 UART: [kat] SHA2-256
3,149,885 UART: [kat] SHA2-384
3,152,548 UART: Fatal Error: 0x90020002
3,154,098 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,103 >>> mbox cmd response: failed
3,154,103 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,431 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,217 UART:
192,581 UART: Running Caliptra ROM ...
193,740 UART:
193,912 UART: [state] CFI Enabled
264,658 UART: [state] LifecycleState = Unprovisioned
266,589 UART: [state] DebugLocked = No
268,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,168 UART: [kat] SHA2-256
441,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,396 UART: [kat] ++
452,871 UART: [kat] sha1
464,012 UART: [kat] SHA2-256
466,703 UART: [kat] SHA2-384
472,421 UART: [kat] SHA2-512-ACC
474,759 UART: [kat] ECC-384
2,763,792 UART: [kat] HMAC-384Kdf
2,776,841 UART: [kat] LMS
3,967,169 UART: [kat] --
3,973,019 UART: [cold-reset] ++
3,974,058 UART: [fht] Storing FHT @ 0x50003400
3,984,415 UART: [idev] ++
3,985,020 UART: [idev] CDI.KEYID = 6
3,986,105 UART: [idev] SUBJECT.KEYID = 7
3,987,219 UART: [idev] UDS.KEYID = 0
3,988,292 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,011,123 UART: [idev] Erasing UDS.KEYID = 0
7,321,934 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,888 UART: [idev] --
7,347,475 UART: [ldev] ++
7,348,064 UART: [ldev] CDI.KEYID = 6
7,348,986 UART: [ldev] SUBJECT.KEYID = 5
7,350,203 UART: [ldev] AUTHORITY.KEYID = 7
7,351,435 UART: [ldev] FE.KEYID = 1
7,377,582 UART: [ldev] Erasing FE.KEYID = 1
10,712,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,240 UART: [ldev] --
13,094,450 UART: [fwproc] Waiting for Commands...
13,097,583 UART: [fwproc] Received command 0x46505652
13,100,025 UART: [rt] FIPS Version
13,101,651 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,785,649 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,855,966 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,501 UART:
192,873 UART: Running Caliptra ROM ...
193,987 UART:
603,890 UART: [state] CFI Enabled
619,830 UART: [state] LifecycleState = Unprovisioned
621,766 UART: [state] DebugLocked = No
623,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,295 UART: [kat] SHA2-256
799,061 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,611 UART: [kat] ++
810,089 UART: [kat] sha1
821,837 UART: [kat] SHA2-256
824,521 UART: [kat] SHA2-384
829,687 UART: [kat] SHA2-512-ACC
832,077 UART: [kat] ECC-384
3,113,828 UART: [kat] HMAC-384Kdf
3,125,473 UART: [kat] LMS
4,315,580 UART: [kat] --
4,320,244 UART: [cold-reset] ++
4,322,019 UART: [fht] Storing FHT @ 0x50003400
4,333,829 UART: [idev] ++
4,334,404 UART: [idev] CDI.KEYID = 6
4,335,346 UART: [idev] SUBJECT.KEYID = 7
4,336,558 UART: [idev] UDS.KEYID = 0
4,337,627 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,354,336 UART: [idev] Erasing UDS.KEYID = 0
7,623,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,963 UART: [idev] --
7,651,556 UART: [ldev] ++
7,652,169 UART: [ldev] CDI.KEYID = 6
7,653,081 UART: [ldev] SUBJECT.KEYID = 5
7,654,301 UART: [ldev] AUTHORITY.KEYID = 7
7,655,568 UART: [ldev] FE.KEYID = 1
7,666,737 UART: [ldev] Erasing FE.KEYID = 1
10,958,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,941 UART: [ldev] --
13,322,545 UART: [fwproc] Waiting for Commands...
13,324,213 UART: [fwproc] Received command 0x46505652
13,326,568 UART: [rt] FIPS Version
13,328,221 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
4,130,357 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,052,057 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,078 UART:
192,469 UART: Running Caliptra ROM ...
193,656 UART:
193,815 UART: [state] CFI Enabled
260,032 UART: [state] LifecycleState = Unprovisioned
261,872 UART: [state] DebugLocked = No
264,355 UART: [state] WD Timer not started. Device not locked for debugging
268,543 UART: [kat] SHA2-256
447,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,216 UART: [kat] ++
459,753 UART: [kat] sha1
472,258 UART: [kat] SHA2-256
475,313 UART: [kat] SHA2-384
480,798 UART: [kat] SHA2-512-ACC
483,785 UART: [kat] ECC-384
2,948,516 UART: [kat] HMAC-384Kdf
2,969,411 UART: [kat] LMS
3,498,870 UART: [kat] --
3,503,496 UART: [cold-reset] ++
3,505,701 UART: [fht] FHT @ 0x50003400
3,517,602 UART: [idev] ++
3,518,175 UART: [idev] CDI.KEYID = 6
3,519,114 UART: [idev] SUBJECT.KEYID = 7
3,520,278 UART: [idev] UDS.KEYID = 0
3,521,281 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,254 UART: [idev] Erasing UDS.KEYID = 0
6,025,742 UART: [idev] Sha1 KeyId Algorithm
6,047,689 UART: [idev] --
6,050,501 UART: [ldev] ++
6,051,074 UART: [ldev] CDI.KEYID = 6
6,051,996 UART: [ldev] SUBJECT.KEYID = 5
6,053,161 UART: [ldev] AUTHORITY.KEYID = 7
6,054,397 UART: [ldev] FE.KEYID = 1
6,096,944 UART: [ldev] Erasing FE.KEYID = 1
8,600,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,314 UART: [ldev] --
10,389,422 UART: [fwproc] Wait for Commands...
10,390,871 UART: [fwproc] Recv command 0x46505652
10,393,245 UART: [rt] FIPS Version
10,394,753 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,394 writing to cptra_bootfsm_go
3,361,157 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,199,546 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,158 writing to cptra_bootfsm_go
193,551 UART:
193,918 UART: Running Caliptra ROM ...
195,085 UART:
604,864 UART: [state] CFI Enabled
621,673 UART: [state] LifecycleState = Unprovisioned
623,482 UART: [state] DebugLocked = No
625,509 UART: [state] WD Timer not started. Device not locked for debugging
628,507 UART: [kat] SHA2-256
807,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,241 UART: [kat] ++
819,777 UART: [kat] sha1
831,794 UART: [kat] SHA2-256
834,799 UART: [kat] SHA2-384
842,290 UART: [kat] SHA2-512-ACC
845,220 UART: [kat] ECC-384
3,288,284 UART: [kat] HMAC-384Kdf
3,300,951 UART: [kat] LMS
3,830,487 UART: [kat] --
3,835,395 UART: [cold-reset] ++
3,837,647 UART: [fht] FHT @ 0x50003400
3,847,653 UART: [idev] ++
3,848,260 UART: [idev] CDI.KEYID = 6
3,849,179 UART: [idev] SUBJECT.KEYID = 7
3,850,340 UART: [idev] UDS.KEYID = 0
3,851,337 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,866,052 UART: [idev] Erasing UDS.KEYID = 0
6,321,871 UART: [idev] Sha1 KeyId Algorithm
6,344,563 UART: [idev] --
6,347,422 UART: [ldev] ++
6,347,990 UART: [ldev] CDI.KEYID = 6
6,348,897 UART: [ldev] SUBJECT.KEYID = 5
6,350,055 UART: [ldev] AUTHORITY.KEYID = 7
6,351,349 UART: [ldev] FE.KEYID = 1
6,360,660 UART: [ldev] Erasing FE.KEYID = 1
8,831,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,306 UART: [ldev] --
10,620,618 UART: [fwproc] Wait for Commands...
10,623,156 UART: [fwproc] Recv command 0x46505652
10,625,472 UART: [rt] FIPS Version
10,626,977 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,746 writing to cptra_bootfsm_go
3,698,584 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,408,247 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,177 UART:
192,543 UART: Running Caliptra ROM ...
193,704 UART:
193,854 UART: [state] CFI Enabled
260,496 UART: [state] LifecycleState = Unprovisioned
262,891 UART: [state] DebugLocked = No
265,087 UART: [state] WD Timer not started. Device not locked for debugging
269,347 UART: [kat] SHA2-256
459,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,946 UART: [kat] ++
470,407 UART: [kat] sha1
480,691 UART: [kat] SHA2-256
483,709 UART: [kat] SHA2-384
489,643 UART: [kat] SHA2-512-ACC
492,253 UART: [kat] ECC-384
2,945,762 UART: [kat] HMAC-384Kdf
2,968,242 UART: [kat] LMS
3,500,019 UART: [kat] --
3,503,667 UART: [cold-reset] ++
3,504,631 UART: [fht] FHT @ 0x50003400
3,514,972 UART: [idev] ++
3,515,694 UART: [idev] CDI.KEYID = 6
3,516,615 UART: [idev] SUBJECT.KEYID = 7
3,517,781 UART: [idev] UDS.KEYID = 0
3,518,774 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,402 UART: [idev] Erasing UDS.KEYID = 0
6,023,425 UART: [idev] Sha1 KeyId Algorithm
6,047,468 UART: [idev] --
6,053,303 UART: [ldev] ++
6,053,988 UART: [ldev] CDI.KEYID = 6
6,054,900 UART: [ldev] SUBJECT.KEYID = 5
6,056,064 UART: [ldev] AUTHORITY.KEYID = 7
6,057,301 UART: [ldev] FE.KEYID = 1
6,098,093 UART: [ldev] Erasing FE.KEYID = 1
8,598,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,151 UART: [ldev] --
10,390,015 UART: [fwproc] Wait for Commands...
10,392,159 UART: [fwproc] Recv command 0x46505652
10,394,698 UART: [rt] FIPS Version
10,396,383 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,449,899 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,237,084 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,543 UART:
192,880 UART: Running Caliptra ROM ...
194,040 UART:
603,645 UART: [state] CFI Enabled
617,146 UART: [state] LifecycleState = Unprovisioned
619,525 UART: [state] DebugLocked = No
621,387 UART: [state] WD Timer not started. Device not locked for debugging
625,156 UART: [kat] SHA2-256
814,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,813 UART: [kat] ++
826,346 UART: [kat] sha1
838,470 UART: [kat] SHA2-256
841,459 UART: [kat] SHA2-384
847,710 UART: [kat] SHA2-512-ACC
850,263 UART: [kat] ECC-384
3,293,971 UART: [kat] HMAC-384Kdf
3,305,661 UART: [kat] LMS
3,837,496 UART: [kat] --
3,840,670 UART: [cold-reset] ++
3,843,195 UART: [fht] FHT @ 0x50003400
3,853,684 UART: [idev] ++
3,854,363 UART: [idev] CDI.KEYID = 6
3,855,294 UART: [idev] SUBJECT.KEYID = 7
3,856,558 UART: [idev] UDS.KEYID = 0
3,857,733 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,873,511 UART: [idev] Erasing UDS.KEYID = 0
6,336,136 UART: [idev] Sha1 KeyId Algorithm
6,357,919 UART: [idev] --
6,362,100 UART: [ldev] ++
6,362,676 UART: [ldev] CDI.KEYID = 6
6,363,560 UART: [ldev] SUBJECT.KEYID = 5
6,364,726 UART: [ldev] AUTHORITY.KEYID = 7
6,366,017 UART: [ldev] FE.KEYID = 1
6,380,748 UART: [ldev] Erasing FE.KEYID = 1
8,856,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,991 UART: [ldev] --
10,651,232 UART: [fwproc] Wait for Commands...
10,653,339 UART: [fwproc] Recv command 0x46505652
10,655,873 UART: [rt] FIPS Version
10,657,599 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,757,543 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,469,723 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
894,976 UART: [kat] SHA2-512-ACC
896,877 UART: [kat] ECC-384
902,342 UART: [kat] HMAC-384Kdf
906,960 UART: [kat] LMS
1,475,156 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,409 UART: [fht] Storing FHT @ 0x50003400
1,479,246 UART: [idev] ++
1,479,414 UART: [idev] CDI.KEYID = 6
1,479,774 UART: [idev] SUBJECT.KEYID = 7
1,480,198 UART: [idev] UDS.KEYID = 0
1,480,543 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,504,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,314 UART: [idev] --
1,514,489 UART: [ldev] ++
1,514,657 UART: [ldev] CDI.KEYID = 6
1,515,020 UART: [ldev] SUBJECT.KEYID = 5
1,515,446 UART: [ldev] AUTHORITY.KEYID = 7
1,515,909 UART: [ldev] FE.KEYID = 1
1,521,255 UART: [ldev] Erasing FE.KEYID = 1
1,546,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,122 UART: [ldev] --
1,585,427 UART: [fwproc] Waiting for Commands...
1,586,098 UART: [fwproc] Received command 0x46505652
1,586,980 UART: [rt] FIPS Version
1,587,533 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,925 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,304 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,759 UART: [kat] SHA2-512-ACC
897,660 UART: [kat] ECC-384
903,363 UART: [kat] HMAC-384Kdf
908,017 UART: [kat] LMS
1,476,213 UART: [kat] --
1,477,218 UART: [cold-reset] ++
1,477,732 UART: [fht] Storing FHT @ 0x50003400
1,480,615 UART: [idev] ++
1,480,783 UART: [idev] CDI.KEYID = 6
1,481,143 UART: [idev] SUBJECT.KEYID = 7
1,481,567 UART: [idev] UDS.KEYID = 0
1,481,912 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,475 UART: [idev] Erasing UDS.KEYID = 0
1,506,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,813 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,480 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,211 UART: [ldev] --
1,586,676 UART: [fwproc] Waiting for Commands...
1,587,541 UART: [fwproc] Received command 0x46505652
1,588,423 UART: [rt] FIPS Version
1,588,976 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,630 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,444,223 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
918,410 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,171,959 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,060 UART: [idev] ++
1,175,228 UART: [idev] CDI.KEYID = 6
1,175,588 UART: [idev] SUBJECT.KEYID = 7
1,176,012 UART: [idev] UDS.KEYID = 0
1,176,357 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,633 UART: [ldev] ++
1,210,801 UART: [ldev] CDI.KEYID = 6
1,211,164 UART: [ldev] SUBJECT.KEYID = 5
1,211,590 UART: [ldev] AUTHORITY.KEYID = 7
1,212,053 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,546 UART: [fwproc] Recv command 0x46505652
1,284,367 UART: [rt] FIPS Version
1,284,921 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,029 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,369 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
893,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,548 UART: [kat] ++
897,700 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,691 UART: [kat] SHA2-512-ACC
908,592 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
922,803 UART: [kat] LMS
1,171,131 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,815 UART: [idev] Erasing UDS.KEYID = 0
1,202,592 UART: [idev] Sha1 KeyId Algorithm
1,211,208 UART: [idev] --
1,212,082 UART: [ldev] ++
1,212,250 UART: [ldev] CDI.KEYID = 6
1,212,613 UART: [ldev] SUBJECT.KEYID = 5
1,213,039 UART: [ldev] AUTHORITY.KEYID = 7
1,213,502 UART: [ldev] FE.KEYID = 1
1,218,704 UART: [ldev] Erasing FE.KEYID = 1
1,244,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,096 UART: [ldev] --
1,284,499 UART: [fwproc] Wait for Commands...
1,285,083 UART: [fwproc] Recv command 0x46505652
1,285,904 UART: [rt] FIPS Version
1,286,458 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,666 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,078 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
891,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,384 UART: [ldev] --
1,279,828 UART: [fwproc] Wait for Commands...
1,280,615 UART: [fwproc] Recv command 0x46505652
1,281,442 UART: [rt] FIPS Version
1,282,003 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,634 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,802 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
87,138 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,472 UART: [kat] SHA2-256
902,412 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,357 UART: [kat] LMS
1,169,669 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,174,536 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,198,856 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,645 UART: [ldev] ++
1,208,813 UART: [ldev] CDI.KEYID = 6
1,209,177 UART: [ldev] SUBJECT.KEYID = 5
1,209,604 UART: [ldev] AUTHORITY.KEYID = 7
1,210,067 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,241,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,557 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46505652
1,282,349 UART: [rt] FIPS Version
1,282,910 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,463 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,437 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,120 UART:
192,508 UART: Running Caliptra ROM ...
193,599 UART:
193,741 UART: [state] CFI Enabled
263,631 UART: [state] LifecycleState = Unprovisioned
265,606 UART: [state] DebugLocked = No
268,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,786 UART: [kat] SHA2-256
443,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,026 UART: [kat] ++
454,487 UART: [kat] sha1
466,591 UART: [kat] SHA2-256
469,334 UART: [kat] SHA2-384
475,045 UART: [kat] SHA2-512-ACC
477,421 UART: [kat] ECC-384
2,767,633 UART: [kat] HMAC-384Kdf
2,779,360 UART: [kat] LMS
3,969,617 UART: [kat] --
3,974,265 UART: [cold-reset] ++
3,976,059 UART: [fht] Storing FHT @ 0x50003400
3,987,687 UART: [idev] ++
3,988,252 UART: [idev] CDI.KEYID = 6
3,989,246 UART: [idev] SUBJECT.KEYID = 7
3,990,424 UART: [idev] UDS.KEYID = 0
3,991,472 ready_for_fw is high
3,991,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,219 UART: [idev] Erasing UDS.KEYID = 0
7,328,035 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,610 UART: [idev] --
7,352,872 UART: [ldev] ++
7,353,441 UART: [ldev] CDI.KEYID = 6
7,354,417 UART: [ldev] SUBJECT.KEYID = 5
7,355,635 UART: [ldev] AUTHORITY.KEYID = 7
7,356,866 UART: [ldev] FE.KEYID = 1
7,405,129 UART: [ldev] Erasing FE.KEYID = 1
10,736,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,036 UART: [ldev] --
13,096,339 UART: [fwproc] Waiting for Commands...
13,098,126 UART: [fwproc] Received command 0x46574c44
13,100,338 UART: [fwproc] Received Image of size 114124 bytes
17,153,688 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,310 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,616,662 >>> mbox cmd response: success
17,617,316 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,620,863 UART: [afmc] ++
17,621,455 UART: [afmc] CDI.KEYID = 6
17,622,343 UART: [afmc] SUBJECT.KEYID = 7
17,623,530 UART: [afmc] AUTHORITY.KEYID = 5
20,990,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,694 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,070 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,907 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,364 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,800 UART: [afmc] --
23,359,393 UART: [cold-reset] --
23,362,607 UART: [state] Locking Datavault
23,367,857 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,610 UART: [state] Locking ICCM
23,372,219 UART: [exit] Launching FMC @ 0x40000130
23,380,608 UART:
23,380,841 UART: Running Caliptra FMC ...
23,381,943 UART:
23,382,098 UART: [state] CFI Enabled
23,448,290 UART: [fht] FMC Alias Private Key: 7
25,786,278 UART: [art] Extend RT PCRs Done
25,787,512 UART: [art] Lock RT PCRs Done
25,789,343 UART: [art] Populate DV Done
25,794,754 UART: [fht] FMC Alias Private Key: 7
25,796,345 UART: [art] Derive CDI
25,797,183 UART: [art] Store in in slot 0x4
25,856,797 UART: [art] Derive Key Pair
25,857,841 UART: [art] Store priv key in slot 0x5
29,150,716 UART: [art] Derive Key Pair - Done
29,163,686 UART: [art] Signing Cert with AUTHO
29,165,004 UART: RITY.KEYID = 7
31,452,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,832 UART: [art] PUB.X = 38F55BF0E16FBC4559EBC843D7B96174B0E03481FB9C006FA1D30CC1A337484DA3E4E639103A5866D5E71358F294A373
31,461,752 UART: [art] PUB.Y = 926C76686755BF30DF712C0C52B3CDCF37C3397C4902E968B690D920486CA347D94E13479A5CEBBC2AE07F421CC5BBE1
31,468,985 UART: [art] SIG.R = 42374E7D3A3C6FB3F209EB4552B5564B3FF802996A0A8A7A08D9FC2034E74F2F2C2C74C1119003C4AE80EC6399937F9B
31,476,360 UART: [art] SIG.S = 39114C9ED135EF09A966C38E5B8319CB0517DC683DB1174CA43222254084FFBE0CBEB7436C6107FDFB96FD39BBCB2EAC
32,781,478 UART: Caliptra RT
32,782,198 UART: [state] CFI Enabled
32,950,057 UART: [rt] RT listening for mailbox commands...
32,981,589 UART: [rt]cmd =0x46505652, len=4
32,982,833 UART: [rt] FIPS Version
32,984,130 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,789,042 ready_for_fw is high
3,789,699 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,849,158 >>> mbox cmd response: success
17,849,860 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,544,874 UART:
23,545,254 UART: Running Caliptra FMC ...
23,546,411 UART:
23,546,570 UART: [state] CFI Enabled
23,615,133 UART: [fht] FMC Alias Private Key: 7
25,953,388 UART: [art] Extend RT PCRs Done
25,954,612 UART: [art] Lock RT PCRs Done
25,956,587 UART: [art] Populate DV Done
25,962,389 UART: [fht] FMC Alias Private Key: 7
25,964,133 UART: [art] Derive CDI
25,964,959 UART: [art] Store in in slot 0x4
26,023,440 UART: [art] Derive Key Pair
26,024,447 UART: [art] Store priv key in slot 0x5
29,316,783 UART: [art] Derive Key Pair - Done
29,330,037 UART: [art] Signing Cert with AUTHO
29,331,385 UART: RITY.KEYID = 7
31,618,966 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,477 UART: [art] PUB.X = F62D9F1E51C189A160036A71B861A501EC2A51CD71A7A1661520F6316C345286D279424AD66B2617C263D50A757120D3
31,627,697 UART: [art] PUB.Y = B090C3236103D205B94F3504503994D2C12000EE88FF8538CF7DCFEEB8986677E7520F7C471070FB09C6D6FACD48DF1B
31,634,940 UART: [art] SIG.R = E449E3598AD8D0D746D99DB95C1FC3FB415CE0312CC67530C0CC874730698759FD3521AA40A5F50E7788C6FD5AAB0AE3
31,642,336 UART: [art] SIG.S = 29A5DE91D5878BCF52EDA43AB66ACDC5378A95926A04A2028812D478FB797151F472460AEADCDAB2E563F9D0D6AD07AA
32,948,037 UART: Caliptra RT
32,948,974 UART: [state] CFI Enabled
33,122,490 UART: [rt] RT listening for mailbox commands...
33,154,073 UART: [rt]cmd =0x46505652, len=4
33,155,380 UART: [rt] FIPS Version
33,156,597 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,505 UART:
192,875 UART: Running Caliptra ROM ...
194,063 UART:
603,861 UART: [state] CFI Enabled
616,903 UART: [state] LifecycleState = Unprovisioned
618,819 UART: [state] DebugLocked = No
621,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,952 UART: [kat] SHA2-256
796,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,263 UART: [kat] ++
807,742 UART: [kat] sha1
818,904 UART: [kat] SHA2-256
821,560 UART: [kat] SHA2-384
826,139 UART: [kat] SHA2-512-ACC
828,510 UART: [kat] ECC-384
3,113,140 UART: [kat] HMAC-384Kdf
3,126,512 UART: [kat] LMS
4,316,611 UART: [kat] --
4,321,992 UART: [cold-reset] ++
4,324,504 UART: [fht] Storing FHT @ 0x50003400
4,336,843 UART: [idev] ++
4,337,416 UART: [idev] CDI.KEYID = 6
4,338,327 UART: [idev] SUBJECT.KEYID = 7
4,339,599 UART: [idev] UDS.KEYID = 0
4,340,664 ready_for_fw is high
4,340,899 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,331 UART: [idev] Erasing UDS.KEYID = 0
7,626,755 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,089 UART: [idev] --
7,651,891 UART: [ldev] ++
7,652,502 UART: [ldev] CDI.KEYID = 6
7,653,421 UART: [ldev] SUBJECT.KEYID = 5
7,654,638 UART: [ldev] AUTHORITY.KEYID = 7
7,655,869 UART: [ldev] FE.KEYID = 1
7,668,621 UART: [ldev] Erasing FE.KEYID = 1
10,956,453 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,418 UART: [ldev] --
13,314,360 UART: [fwproc] Waiting for Commands...
13,316,082 UART: [fwproc] Received command 0x46574c44
13,318,277 UART: [fwproc] Received Image of size 114124 bytes
17,368,264 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,672 >>> mbox cmd response: success
17,830,229 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,834,366 UART: [afmc] ++
17,835,005 UART: [afmc] CDI.KEYID = 6
17,835,921 UART: [afmc] SUBJECT.KEYID = 7
17,837,132 UART: [afmc] AUTHORITY.KEYID = 5
21,153,120 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,717 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,946 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,345 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,204 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,653 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,800 UART: [afmc] --
23,517,183 UART: [cold-reset] --
23,520,342 UART: [state] Locking Datavault
23,525,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,244 UART: [state] Locking ICCM
23,529,450 UART: [exit] Launching FMC @ 0x40000130
23,537,846 UART:
23,538,084 UART: Running Caliptra FMC ...
23,539,189 UART:
23,539,349 UART: [state] CFI Enabled
23,547,501 UART: [fht] FMC Alias Private Key: 7
25,878,609 UART: [art] Extend RT PCRs Done
25,879,862 UART: [art] Lock RT PCRs Done
25,881,194 UART: [art] Populate DV Done
25,886,823 UART: [fht] FMC Alias Private Key: 7
25,888,358 UART: [art] Derive CDI
25,889,328 UART: [art] Store in in slot 0x4
25,931,724 UART: [art] Derive Key Pair
25,932,731 UART: [art] Store priv key in slot 0x5
29,174,591 UART: [art] Derive Key Pair - Done
29,187,308 UART: [art] Signing Cert with AUTHO
29,188,619 UART: RITY.KEYID = 7
31,468,502 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,010 UART: [art] PUB.X = 2AEF6AC456A4050E550ABE2A410A192D1A80E45CA1382124E8802C7765C8561496C2D95E903C81C4D58BA6A051F89F65
31,477,267 UART: [art] PUB.Y = 238982469F537599096C42CED5B9B9A7852D6541C8D88A023839E6885061A796F96CEBC34C983619CB074E66BD780B9B
31,484,513 UART: [art] SIG.R = 6E0BB60903AB839AEDFA78AC26B3877B74083DB7C292906899EE3C4460CC4AC9A3ED52B11E6265C9F9EFB161086FAE64
31,491,900 UART: [art] SIG.S = AFE2AAD2EC95A5AC6E736A55E663F6DDC41739AC3273412CA60FBE17B2C3BF8F1FC1E109F989362095F643625F8041FB
32,796,554 UART: Caliptra RT
32,797,278 UART: [state] CFI Enabled
32,915,196 UART: [rt] RT listening for mailbox commands...
32,946,551 UART: [rt]cmd =0x46505652, len=4
32,947,828 UART: [rt] FIPS Version
32,948,834 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,131,555 ready_for_fw is high
4,132,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,764 >>> mbox cmd response: success
18,076,517 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,710,586 UART:
23,711,044 UART: Running Caliptra FMC ...
23,712,203 UART:
23,712,358 UART: [state] CFI Enabled
23,719,908 UART: [fht] FMC Alias Private Key: 7
26,050,271 UART: [art] Extend RT PCRs Done
26,051,504 UART: [art] Lock RT PCRs Done
26,053,464 UART: [art] Populate DV Done
26,059,062 UART: [fht] FMC Alias Private Key: 7
26,060,672 UART: [art] Derive CDI
26,061,493 UART: [art] Store in in slot 0x4
26,104,205 UART: [art] Derive Key Pair
26,105,205 UART: [art] Store priv key in slot 0x5
29,347,568 UART: [art] Derive Key Pair - Done
29,360,422 UART: [art] Signing Cert with AUTHO
29,361,740 UART: RITY.KEYID = 7
31,640,965 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,501 UART: [art] PUB.X = 37EFED8B2C56C6259999989C9903DFE35BF571FBF6F47BD7DC81FF10A23924E01806DF35A41014549B52B8F429792A3A
31,649,724 UART: [art] PUB.Y = 40D694FD18B8DEC4181904448879ED6851C9DC63FE952002599D263FE7372D4523D11B2669F6B072D6038DC5D42279DF
31,656,919 UART: [art] SIG.R = E6774FD40DBA8161CE6CB68A175DA248DF03B50EC0CD35FA884F78C0267CB1E6AF788CA48B87ACC7D6A477246162C0B1
31,664,326 UART: [art] SIG.S = C2F368607A2BB782584C5C897B0F01E3C790985B7B7014219CF102F547F702960B9CC4A3139356596CBC5EC91E7249CB
32,969,352 UART: Caliptra RT
32,970,068 UART: [state] CFI Enabled
33,088,114 UART: [rt] RT listening for mailbox commands...
33,119,836 UART: [rt]cmd =0x46505652, len=4
33,121,090 UART: [rt] FIPS Version
33,122,361 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,202 UART:
192,580 UART: Running Caliptra ROM ...
193,690 UART:
193,835 UART: [state] CFI Enabled
262,067 UART: [state] LifecycleState = Unprovisioned
263,983 UART: [state] DebugLocked = No
265,364 UART: [state] WD Timer not started. Device not locked for debugging
269,115 UART: [kat] SHA2-256
448,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,789 UART: [kat] ++
460,240 UART: [kat] sha1
472,609 UART: [kat] SHA2-256
475,704 UART: [kat] SHA2-384
481,915 UART: [kat] SHA2-512-ACC
484,855 UART: [kat] ECC-384
2,947,035 UART: [kat] HMAC-384Kdf
2,972,239 UART: [kat] LMS
3,501,662 UART: [kat] --
3,503,390 UART: [cold-reset] ++
3,505,270 UART: [fht] FHT @ 0x50003400
3,515,401 UART: [idev] ++
3,515,976 UART: [idev] CDI.KEYID = 6
3,516,889 UART: [idev] SUBJECT.KEYID = 7
3,518,068 UART: [idev] UDS.KEYID = 0
3,518,997 ready_for_fw is high
3,519,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,261 UART: [idev] Erasing UDS.KEYID = 0
6,025,056 UART: [idev] Sha1 KeyId Algorithm
6,048,516 UART: [idev] --
6,052,927 UART: [ldev] ++
6,053,508 UART: [ldev] CDI.KEYID = 6
6,054,417 UART: [ldev] SUBJECT.KEYID = 5
6,055,653 UART: [ldev] AUTHORITY.KEYID = 7
6,056,890 UART: [ldev] FE.KEYID = 1
6,099,670 UART: [ldev] Erasing FE.KEYID = 1
8,604,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,459 UART: [ldev] --
10,413,808 UART: [fwproc] Wait for Commands...
10,415,525 UART: [fwproc] Recv command 0x46574c44
10,417,570 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,843 >>> mbox cmd response: success
14,278,434 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,283,019 UART: [afmc] ++
14,283,611 UART: [afmc] CDI.KEYID = 6
14,284,495 UART: [afmc] SUBJECT.KEYID = 7
14,285,595 UART: [afmc] AUTHORITY.KEYID = 5
16,825,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,797 UART: [afmc] --
18,627,012 UART: [cold-reset] --
18,630,873 UART: [state] Locking Datavault
18,636,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,146 UART: [state] Locking ICCM
18,640,183 UART: [exit] Launching FMC @ 0x40000130
18,648,637 UART:
18,648,872 UART: Running Caliptra FMC ...
18,649,972 UART:
18,650,136 UART: [state] CFI Enabled
18,709,332 UART: [fht] FMC Alias Private Key: 7
20,473,033 UART: [art] Extend RT PCRs Done
20,474,258 UART: [art] Lock RT PCRs Done
20,476,045 UART: [art] Populate DV Done
20,481,618 UART: [fht] FMC Alias Private Key: 7
20,483,262 UART: [art] Derive CDI
20,484,078 UART: [art] Store in in slot 0x4
20,541,194 UART: [art] Derive Key Pair
20,542,328 UART: [art] Store priv key in slot 0x5
23,005,496 UART: [art] Derive Key Pair - Done
23,018,494 UART: [art] Signing Cert with AUTHO
23,019,823 UART: RITY.KEYID = 7
24,730,608 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,105 UART: [art] PUB.X = 0C3A199B37BFEB65929C3381E6C8A8B2B632B2AA02B182F551933A62DCD85CC6DC2A88D75C4D1CF1EA2AE28A2D600108
24,739,381 UART: [art] PUB.Y = 4B818AAFEF4BC105E881C3C20A4A526E693C9810748878B8A0FBCF9ACB717BAFFCBE6D67FA0D1BA2B0E81FCDAFE3D496
24,746,690 UART: [art] SIG.R = AFE29867CFA02F007086B8F8640B308E12D77479CB7CCFC0D8A3615303204AAABC430610A335D7D1EF3F878927829374
24,754,069 UART: [art] SIG.S = 14FB5A5C2D5C7CB82D34E6025D1F89957C305AC6A1AA9E6414E0498246C9235A8A34AC16F9E1FCDBAD3E4C48EC9169F3
25,732,728 UART: Caliptra RT
25,733,429 UART: [state] CFI Enabled
25,897,921 UART: [rt] RT listening for mailbox commands...
25,929,222 UART: [rt]cmd =0x46505652, len=4
25,930,518 UART: [rt] FIPS Version
25,931,784 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,361,503 ready_for_fw is high
3,362,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,212 >>> mbox cmd response: success
14,050,065 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,345,184 UART:
18,345,561 UART: Running Caliptra FMC ...
18,346,821 UART:
18,346,990 UART: [state] CFI Enabled
18,413,676 UART: [fht] FMC Alias Private Key: 7
20,177,888 UART: [art] Extend RT PCRs Done
20,179,118 UART: [art] Lock RT PCRs Done
20,180,824 UART: [art] Populate DV Done
20,186,349 UART: [fht] FMC Alias Private Key: 7
20,187,891 UART: [art] Derive CDI
20,188,663 UART: [art] Store in in slot 0x4
20,246,191 UART: [art] Derive Key Pair
20,247,241 UART: [art] Store priv key in slot 0x5
22,710,069 UART: [art] Derive Key Pair - Done
22,722,864 UART: [art] Signing Cert with AUTHO
22,724,180 UART: RITY.KEYID = 7
24,434,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,484 UART: [art] PUB.X = 480775223E4374F49FA9C091E6513C37803E48B6FF14F208B576A036894E7459971C7126A1D201FACDAD9C0932530EB7
24,443,664 UART: [art] PUB.Y = 86619943815D79C95B61766A9CC9A98B6EEDE65459AC86B269C6A345E9BDF1382CA315FD98C9C5BD957D544EEEFE444E
24,450,960 UART: [art] SIG.R = 511F728F2DE302068AA495320878396C4952E3B60BA97CA2C8EACE4D571F4161642BC69925E8ED2414F151AFAE5C19FB
24,458,348 UART: [art] SIG.S = 99619563347EB5FB34DD6ECA421789C3FEF76EE5DFAF6D232AC96FE2C6A17252000E6FDEFA8DAFEDDA15DBE2D2BF2BF8
25,437,888 UART: Caliptra RT
25,438,603 UART: [state] CFI Enabled
25,602,752 UART: [rt] RT listening for mailbox commands...
25,634,436 UART: [rt]cmd =0x46505652, len=4
25,635,810 UART: [rt] FIPS Version
25,636,930 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,642 UART:
193,009 UART: Running Caliptra ROM ...
194,158 UART:
603,622 UART: [state] CFI Enabled
613,779 UART: [state] LifecycleState = Unprovisioned
615,670 UART: [state] DebugLocked = No
617,917 UART: [state] WD Timer not started. Device not locked for debugging
621,954 UART: [kat] SHA2-256
801,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,640 UART: [kat] ++
813,167 UART: [kat] sha1
825,001 UART: [kat] SHA2-256
827,990 UART: [kat] SHA2-384
834,489 UART: [kat] SHA2-512-ACC
837,434 UART: [kat] ECC-384
3,277,561 UART: [kat] HMAC-384Kdf
3,289,079 UART: [kat] LMS
3,818,555 UART: [kat] --
3,821,778 UART: [cold-reset] ++
3,822,935 UART: [fht] FHT @ 0x50003400
3,833,725 UART: [idev] ++
3,834,292 UART: [idev] CDI.KEYID = 6
3,835,204 UART: [idev] SUBJECT.KEYID = 7
3,836,454 UART: [idev] UDS.KEYID = 0
3,837,385 ready_for_fw is high
3,837,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,341 UART: [idev] Erasing UDS.KEYID = 0
6,310,537 UART: [idev] Sha1 KeyId Algorithm
6,334,098 UART: [idev] --
6,337,671 UART: [ldev] ++
6,338,247 UART: [ldev] CDI.KEYID = 6
6,339,163 UART: [ldev] SUBJECT.KEYID = 5
6,340,379 UART: [ldev] AUTHORITY.KEYID = 7
6,341,610 UART: [ldev] FE.KEYID = 1
6,353,254 UART: [ldev] Erasing FE.KEYID = 1
8,826,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,157 UART: [ldev] --
10,617,931 UART: [fwproc] Wait for Commands...
10,620,136 UART: [fwproc] Recv command 0x46574c44
10,622,234 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,660 >>> mbox cmd response: success
14,492,228 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,495,451 UART: [afmc] ++
14,496,041 UART: [afmc] CDI.KEYID = 6
14,496,925 UART: [afmc] SUBJECT.KEYID = 7
14,498,156 UART: [afmc] AUTHORITY.KEYID = 5
16,999,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,641 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,428 UART: [afmc] --
18,799,079 UART: [cold-reset] --
18,801,586 UART: [state] Locking Datavault
18,806,291 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,990 UART: [state] Locking ICCM
18,809,975 UART: [exit] Launching FMC @ 0x40000130
18,818,376 UART:
18,818,619 UART: Running Caliptra FMC ...
18,819,719 UART:
18,819,894 UART: [state] CFI Enabled
18,827,949 UART: [fht] FMC Alias Private Key: 7
20,584,313 UART: [art] Extend RT PCRs Done
20,585,529 UART: [art] Lock RT PCRs Done
20,587,024 UART: [art] Populate DV Done
20,592,169 UART: [fht] FMC Alias Private Key: 7
20,593,812 UART: [art] Derive CDI
20,594,547 UART: [art] Store in in slot 0x4
20,636,919 UART: [art] Derive Key Pair
20,637,920 UART: [art] Store priv key in slot 0x5
23,064,754 UART: [art] Derive Key Pair - Done
23,077,695 UART: [art] Signing Cert with AUTHO
23,079,004 UART: RITY.KEYID = 7
24,784,377 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,879 UART: [art] PUB.X = 504A5B9934E0B72DB409068573A85756E1D417ECA990C07FCDFCF3F76141DB60B2DE95B5B077974DA7CD989A2E416478
24,793,166 UART: [art] PUB.Y = 55A7BA0365386AC2382D074DEEE5A87581739EF7CA9B21AB1C290CCC98F990EC120CB9416FAA4708B2DE383BB2241C9E
24,800,407 UART: [art] SIG.R = A5EB1D63DFD944A81BF2D36F450252BEE7B4C1DEA005419255CC527B04BBCDD1EA35925228BA22B0A742109D2AE9D08B
24,807,790 UART: [art] SIG.S = 9C74CD62DC5FF5267D1A40E1821525197812EA00A517ED490D3C2DEAA88FAEC7EED3B4AD0AF79A977F49199A3940B367
25,786,925 UART: Caliptra RT
25,787,640 UART: [state] CFI Enabled
25,904,649 UART: [rt] RT listening for mailbox commands...
25,935,740 UART: [rt]cmd =0x46505652, len=4
25,936,992 UART: [rt] FIPS Version
25,938,205 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,689,828 ready_for_fw is high
3,690,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,302 >>> mbox cmd response: success
14,280,983 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,526,828 UART:
18,527,214 UART: Running Caliptra FMC ...
18,528,414 UART:
18,528,571 UART: [state] CFI Enabled
18,536,394 UART: [fht] FMC Alias Private Key: 7
20,293,201 UART: [art] Extend RT PCRs Done
20,294,424 UART: [art] Lock RT PCRs Done
20,295,890 UART: [art] Populate DV Done
20,301,378 UART: [fht] FMC Alias Private Key: 7
20,302,926 UART: [art] Derive CDI
20,303,664 UART: [art] Store in in slot 0x4
20,346,579 UART: [art] Derive Key Pair
20,347,581 UART: [art] Store priv key in slot 0x5
22,774,111 UART: [art] Derive Key Pair - Done
22,786,888 UART: [art] Signing Cert with AUTHO
22,788,194 UART: RITY.KEYID = 7
24,493,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,235 UART: [art] PUB.X = 21364C6D23E4A799641B69BAC64AC5EBB9DFEA83A360A51FB20835DE5ED72DBD25F4BD850175377FD49ED5F41FFAC605
24,502,560 UART: [art] PUB.Y = 3850DC3361AF0D2A88A961173801D65283B4E842B4802A6B2F43D1CEA2E25E868982136727DA186749A179B01F57BE25
24,509,794 UART: [art] SIG.R = 4F41CE1C90C2AAE9364675FA7A4EEDC8E55401D3AF09B5A32A63BC436793FAF1989AD7F1554FEA93A29073220A041935
24,517,181 UART: [art] SIG.S = 8D36AEA05D11E1A9AAC489FC7D4B17D4C73D96428E2490AEE6F6ED8A4E756AE33F82E39A700165DB375350C026E706A2
25,496,132 UART: Caliptra RT
25,496,850 UART: [state] CFI Enabled
25,613,913 UART: [rt] RT listening for mailbox commands...
25,645,098 UART: [rt]cmd =0x46505652, len=4
25,646,434 UART: [rt] FIPS Version
25,647,650 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,031 UART:
192,410 UART: Running Caliptra ROM ...
193,565 UART:
193,717 UART: [state] CFI Enabled
265,542 UART: [state] LifecycleState = Unprovisioned
267,922 UART: [state] DebugLocked = No
270,021 UART: [state] WD Timer not started. Device not locked for debugging
275,408 UART: [kat] SHA2-256
465,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,084 UART: [kat] ++
476,626 UART: [kat] sha1
487,791 UART: [kat] SHA2-256
490,804 UART: [kat] SHA2-384
497,222 UART: [kat] SHA2-512-ACC
499,809 UART: [kat] ECC-384
2,950,399 UART: [kat] HMAC-384Kdf
2,972,446 UART: [kat] LMS
3,504,234 UART: [kat] --
3,509,424 UART: [cold-reset] ++
3,511,150 UART: [fht] FHT @ 0x50003400
3,523,126 UART: [idev] ++
3,523,831 UART: [idev] CDI.KEYID = 6
3,524,714 UART: [idev] SUBJECT.KEYID = 7
3,525,961 UART: [idev] UDS.KEYID = 0
3,527,045 ready_for_fw is high
3,527,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,325 UART: [idev] Erasing UDS.KEYID = 0
6,027,656 UART: [idev] Sha1 KeyId Algorithm
6,049,649 UART: [idev] --
6,055,296 UART: [ldev] ++
6,055,992 UART: [ldev] CDI.KEYID = 6
6,056,879 UART: [ldev] SUBJECT.KEYID = 5
6,058,091 UART: [ldev] AUTHORITY.KEYID = 7
6,059,331 UART: [ldev] FE.KEYID = 1
6,100,493 UART: [ldev] Erasing FE.KEYID = 1
8,606,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,065 UART: [ldev] --
10,415,005 UART: [fwproc] Wait for Commands...
10,418,234 UART: [fwproc] Recv command 0x46574c44
10,420,490 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,611,577 >>> mbox cmd response: success
14,612,115 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,615,014 UART: [afmc] ++
14,615,729 UART: [afmc] CDI.KEYID = 6
14,616,834 UART: [afmc] SUBJECT.KEYID = 7
14,618,371 UART: [afmc] AUTHORITY.KEYID = 5
17,149,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,497 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,486 UART: [afmc] --
18,949,302 UART: [cold-reset] --
18,953,550 UART: [state] Locking Datavault
18,957,013 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,148 UART: [state] Locking ICCM
18,962,111 UART: [exit] Launching FMC @ 0x40000130
18,970,785 UART:
18,971,042 UART: Running Caliptra FMC ...
18,972,070 UART:
18,972,221 UART: [state] CFI Enabled
19,031,204 UART: [fht] FMC Alias Private Key: 7
20,795,811 UART: [art] Extend RT PCRs Done
20,797,029 UART: [art] Lock RT PCRs Done
20,798,735 UART: [art] Populate DV Done
20,804,476 UART: [fht] FMC Alias Private Key: 7
20,805,961 UART: [art] Derive CDI
20,806,730 UART: [art] Store in in slot 0x4
20,864,178 UART: [art] Derive Key Pair
20,865,220 UART: [art] Store priv key in slot 0x5
23,327,897 UART: [art] Derive Key Pair - Done
23,341,114 UART: [art] Signing Cert with AUTHO
23,342,412 UART: RITY.KEYID = 7
25,052,958 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,482 UART: [art] PUB.X = A6180586B6CB1FEEB4222670643AAF5B39C5E7E5F2BD752FA435CB84FBA993FCD82B82DB1B0B5660B07ED78E5F05774F
25,061,782 UART: [art] PUB.Y = 5E6574CED936545BABA93EB73A5C38B70DE3D5BFE1174B1B22C44666D0E6613108B973E0905B3A31A96AAC7217625477
25,069,048 UART: [art] SIG.R = 2080490428753AF306EA0D0655DEFB791F9679BB40083FF2E56E704EE5CE058E5E8E32BB0EA09711CBE817CDA2ED2AE5
25,076,433 UART: [art] SIG.S = 63AFA961DB477162E391582CAB948A676C26989C6EFA5A89642B79ED502C11B208C5C5F49C7287922D7402A1902548F5
26,055,303 UART: Caliptra RT
26,056,015 UART: [state] CFI Enabled
26,219,759 UART: [rt] RT listening for mailbox commands...
26,251,394 UART: [rt]cmd =0x46505652, len=4
26,252,646 UART: [rt] FIPS Version
26,253,857 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,436,973 ready_for_fw is high
3,437,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,715,932 >>> mbox cmd response: success
14,716,640 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,002,930 UART:
19,003,339 UART: Running Caliptra FMC ...
19,004,515 UART:
19,004,683 UART: [state] CFI Enabled
19,072,845 UART: [fht] FMC Alias Private Key: 7
20,836,321 UART: [art] Extend RT PCRs Done
20,837,535 UART: [art] Lock RT PCRs Done
20,838,996 UART: [art] Populate DV Done
20,844,464 UART: [fht] FMC Alias Private Key: 7
20,846,177 UART: [art] Derive CDI
20,847,168 UART: [art] Store in in slot 0x4
20,905,438 UART: [art] Derive Key Pair
20,906,461 UART: [art] Store priv key in slot 0x5
23,369,372 UART: [art] Derive Key Pair - Done
23,382,272 UART: [art] Signing Cert with AUTHO
23,383,580 UART: RITY.KEYID = 7
25,095,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,132 UART: [art] PUB.X = 1155452DAF81CC4A94956E5588546E83203F5A8AA70B4A437AEE3F945B65673F029D28173DA3F4ACB8C12F9BA3265799
25,104,366 UART: [art] PUB.Y = A75726CFA3E765055617E62A4CBA84787F4A1AD1F03C07D7434C5E2C367042DCB552D6C336B929B23DA0C9A0C0F87B73
25,111,627 UART: [art] SIG.R = 98F4D7D169149A6DF991FE85F9C76CD61E465F99B66D042DDDEA164D0CF44577A408C1B02E363D3DF316E12B13C9E686
25,119,056 UART: [art] SIG.S = AA09CA20025A7A75A8B505D6AB37510C6BC9E9B32525415FD8F4FFEB794740ED1C5A1AF2B0876380D6B79CA5FE408D47
26,097,816 UART: Caliptra RT
26,098,536 UART: [state] CFI Enabled
26,264,020 UART: [rt] RT listening for mailbox commands...
26,295,540 UART: [rt]cmd =0x46505652, len=4
26,296,818 UART: [rt] FIPS Version
26,297,873 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,522 UART:
192,893 UART: Running Caliptra ROM ...
194,084 UART:
603,801 UART: [state] CFI Enabled
614,052 UART: [state] LifecycleState = Unprovisioned
616,437 UART: [state] DebugLocked = No
618,048 UART: [state] WD Timer not started. Device not locked for debugging
623,309 UART: [kat] SHA2-256
813,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,997 UART: [kat] ++
824,541 UART: [kat] sha1
834,923 UART: [kat] SHA2-256
837,944 UART: [kat] SHA2-384
842,519 UART: [kat] SHA2-512-ACC
845,105 UART: [kat] ECC-384
3,290,077 UART: [kat] HMAC-384Kdf
3,302,344 UART: [kat] LMS
3,834,226 UART: [kat] --
3,838,291 UART: [cold-reset] ++
3,840,655 UART: [fht] FHT @ 0x50003400
3,852,278 UART: [idev] ++
3,852,924 UART: [idev] CDI.KEYID = 6
3,853,960 UART: [idev] SUBJECT.KEYID = 7
3,855,134 UART: [idev] UDS.KEYID = 0
3,856,067 ready_for_fw is high
3,856,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,000,196 UART: [idev] Erasing UDS.KEYID = 0
6,334,378 UART: [idev] Sha1 KeyId Algorithm
6,355,726 UART: [idev] --
6,360,560 UART: [ldev] ++
6,361,255 UART: [ldev] CDI.KEYID = 6
6,362,164 UART: [ldev] SUBJECT.KEYID = 5
6,363,377 UART: [ldev] AUTHORITY.KEYID = 7
6,364,553 UART: [ldev] FE.KEYID = 1
6,375,792 UART: [ldev] Erasing FE.KEYID = 1
8,849,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,744 UART: [ldev] --
10,642,282 UART: [fwproc] Wait for Commands...
10,644,781 UART: [fwproc] Recv command 0x46574c44
10,647,100 UART: [fwproc] Recv'd Img size: 114448 bytes
14,092,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,176 >>> mbox cmd response: success
14,828,728 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,831,450 UART: [afmc] ++
14,832,148 UART: [afmc] CDI.KEYID = 6
14,833,333 UART: [afmc] SUBJECT.KEYID = 7
14,834,813 UART: [afmc] AUTHORITY.KEYID = 5
17,337,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,128,556 UART: [afmc] --
19,132,685 UART: [cold-reset] --
19,138,006 UART: [state] Locking Datavault
19,145,299 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,494 UART: [state] Locking ICCM
19,149,213 UART: [exit] Launching FMC @ 0x40000130
19,157,878 UART:
19,158,115 UART: Running Caliptra FMC ...
19,159,215 UART:
19,159,374 UART: [state] CFI Enabled
19,167,310 UART: [fht] FMC Alias Private Key: 7
20,924,729 UART: [art] Extend RT PCRs Done
20,925,956 UART: [art] Lock RT PCRs Done
20,927,392 UART: [art] Populate DV Done
20,933,180 UART: [fht] FMC Alias Private Key: 7
20,934,681 UART: [art] Derive CDI
20,935,443 UART: [art] Store in in slot 0x4
20,978,308 UART: [art] Derive Key Pair
20,979,343 UART: [art] Store priv key in slot 0x5
23,406,068 UART: [art] Derive Key Pair - Done
23,419,271 UART: [art] Signing Cert with AUTHO
23,420,578 UART: RITY.KEYID = 7
25,125,922 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,436 UART: [art] PUB.X = CD7A1CAC258642B3E9128A453141E7448041873393205B76B6FE57AE1266DC1C558FC17B2E95E21C9DA995DB31184D79
25,134,731 UART: [art] PUB.Y = ED4A3EA94BB70EF81D73EB8BDCC51DB94F0A290B93D695BC2FD88D1C913100B1C5ACF2C0921B300AE7DDE6E84724DF8D
25,141,991 UART: [art] SIG.R = 10B31A41DEA10D3A3FAD02EAF9FA67C1EFCD60426ABC12555450BD7CEF1509BD296F97D0CD61437677A205AD86F06B8F
25,149,392 UART: [art] SIG.S = E75D2FC90F77779BE709B56095D2974FCD439CFCD142E8A0014DAD943A12F3772B335DDE85B6F270C88CE0901EF3935D
26,128,084 UART: Caliptra RT
26,128,798 UART: [state] CFI Enabled
26,246,235 UART: [rt] RT listening for mailbox commands...
26,277,739 UART: [rt]cmd =0x46505652, len=4
26,279,035 UART: [rt] FIPS Version
26,280,147 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,756,788 ready_for_fw is high
3,757,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,378 >>> mbox cmd response: success
14,961,076 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,222,765 UART:
19,223,146 UART: Running Caliptra FMC ...
19,224,374 UART:
19,224,540 UART: [state] CFI Enabled
19,232,627 UART: [fht] FMC Alias Private Key: 7
20,990,089 UART: [art] Extend RT PCRs Done
20,991,308 UART: [art] Lock RT PCRs Done
20,992,634 UART: [art] Populate DV Done
20,998,054 UART: [fht] FMC Alias Private Key: 7
20,999,773 UART: [art] Derive CDI
21,000,592 UART: [art] Store in in slot 0x4
21,043,354 UART: [art] Derive Key Pair
21,044,362 UART: [art] Store priv key in slot 0x5
23,471,644 UART: [art] Derive Key Pair - Done
23,484,264 UART: [art] Signing Cert with AUTHO
23,485,565 UART: RITY.KEYID = 7
25,191,244 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,751 UART: [art] PUB.X = 24104F88FED38683A999F1350334558EEC0A3A087228896DA9A8FB76B9E5AF6F932D96FB93939F78A3496E33D4087A83
25,199,979 UART: [art] PUB.Y = 4D98307FD7139263089F175C96A2A4E246BE354D8FE97AFD30336C8A0F884D094824F26D6D7CE8E05BCD95B1FFF47527
25,207,277 UART: [art] SIG.R = C298F5FB88D72A1ADD523D8D866F5DE60B137078A5DD97651C37DAF15B3DAFE55D62293B458613F5BCCF0158D0B54D44
25,214,711 UART: [art] SIG.S = 328F1E36738825EF53747AB135337A352303020610DFB67C63413707A756B977420DDF75B483832672D3D16B84AC64D2
26,193,127 UART: Caliptra RT
26,193,847 UART: [state] CFI Enabled
26,311,586 UART: [rt] RT listening for mailbox commands...
26,342,778 UART: [rt]cmd =0x46505652, len=4
26,344,115 UART: [rt] FIPS Version
26,345,438 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,396 UART: [idev] ++
1,479,564 UART: [idev] CDI.KEYID = 6
1,479,924 UART: [idev] SUBJECT.KEYID = 7
1,480,348 UART: [idev] UDS.KEYID = 0
1,480,693 ready_for_fw is high
1,480,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,330 UART: [idev] --
1,514,383 UART: [ldev] ++
1,514,551 UART: [ldev] CDI.KEYID = 6
1,514,914 UART: [ldev] SUBJECT.KEYID = 5
1,515,340 UART: [ldev] AUTHORITY.KEYID = 7
1,515,803 UART: [ldev] FE.KEYID = 1
1,521,057 UART: [ldev] Erasing FE.KEYID = 1
1,546,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,254 UART: [ldev] --
1,585,533 UART: [fwproc] Waiting for Commands...
1,586,218 UART: [fwproc] Received command 0x46574c44
1,587,009 UART: [fwproc] Received Image of size 114448 bytes
2,888,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,486 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,985 >>> mbox cmd response: success
3,080,985 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,082,047 UART: [afmc] ++
3,082,215 UART: [afmc] CDI.KEYID = 6
3,082,577 UART: [afmc] SUBJECT.KEYID = 7
3,083,002 UART: [afmc] AUTHORITY.KEYID = 5
3,118,075 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,438 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,128 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,973 UART: [afmc] --
3,161,077 UART: [cold-reset] --
3,161,903 UART: [state] Locking Datavault
3,162,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,500 UART: [state] Locking ICCM
3,163,976 UART: [exit] Launching FMC @ 0x40000130
3,169,305 UART:
3,169,321 UART: Running Caliptra FMC ...
3,169,729 UART:
3,169,783 UART: [state] CFI Enabled
3,180,686 UART: [fht] FMC Alias Private Key: 7
3,288,921 UART: [art] Extend RT PCRs Done
3,289,349 UART: [art] Lock RT PCRs Done
3,291,047 UART: [art] Populate DV Done
3,298,936 UART: [fht] FMC Alias Private Key: 7
3,299,950 UART: [art] Derive CDI
3,300,230 UART: [art] Store in in slot 0x4
3,385,425 UART: [art] Derive Key Pair
3,385,785 UART: [art] Store priv key in slot 0x5
3,399,597 UART: [art] Derive Key Pair - Done
3,414,245 UART: [art] Signing Cert with AUTHO
3,414,725 UART: RITY.KEYID = 7
3,430,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,032 UART: [art] PUB.X = 36CD5BB09F9A444D8A590C965520864A1448F570786EF8801EBAA5EA3698DBD8922C86EE453B4721B9BC681DF9B02F97
3,437,803 UART: [art] PUB.Y = E3B097ABDD626E66376FD5AD98467B2B567B5DB14BFF6F60330432E5A80B204F64643F1FE70BF7D6308F2536CA9EEA2F
3,444,756 UART: [art] SIG.R = 6D4BADAA017CF6F5A6A1BB4B9CB7AF0F1863C9AD8AFC21A01298C62EAA6D74FA49A8361443DDFAE6779ADB06819D60A0
3,451,543 UART: [art] SIG.S = ACD560D5E5EFA5992AF0B5B330E5D186624CA9646B38874B2E89E2724A78C1CA5E61B4B8FD3D3F628C7DA1B0B0C8C317
3,475,286 UART: Caliptra RT
3,475,539 UART: [state] CFI Enabled
3,583,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,006 UART: [rt]cmd =0x46505652, len=4
3,614,677 UART: [rt] FIPS Version
3,615,868 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 ready_for_fw is high
1,362,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,651 >>> mbox cmd response: success
2,929,651 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,919 UART:
2,990,935 UART: Running Caliptra FMC ...
2,991,343 UART:
2,991,397 UART: [state] CFI Enabled
3,002,008 UART: [fht] FMC Alias Private Key: 7
3,109,727 UART: [art] Extend RT PCRs Done
3,110,155 UART: [art] Lock RT PCRs Done
3,111,593 UART: [art] Populate DV Done
3,119,856 UART: [fht] FMC Alias Private Key: 7
3,120,922 UART: [art] Derive CDI
3,121,202 UART: [art] Store in in slot 0x4
3,206,655 UART: [art] Derive Key Pair
3,207,015 UART: [art] Store priv key in slot 0x5
3,219,821 UART: [art] Derive Key Pair - Done
3,234,421 UART: [art] Signing Cert with AUTHO
3,234,901 UART: RITY.KEYID = 7
3,250,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,878 UART: [art] PUB.X = DF8EC1FC877FFE08A615671C29D722A34A247420BD13B6DB15ED7E91CAAD90FC9FF21107CE66F425EF21557AC13F6BE8
3,257,660 UART: [art] PUB.Y = A8B9D565D75074D7D77CDE794075A9CFC225D9BB555A46CB87A1D2892B4A0152A137EBBE98674C1264F3112DE4CAE8E7
3,264,617 UART: [art] SIG.R = 2058589857AC3D088ADD9812922D34870AED05FDC14103FE048167CC3908CC5059B7B22790715F231F2B360F2B4A0EA9
3,271,359 UART: [art] SIG.S = EC3CF545B8619DF76E427D65559337A2EF485FF870560EA2CB74823376B49F3ED6B54C88F918261C51CE3AE2977317B5
3,295,523 UART: Caliptra RT
3,295,776 UART: [state] CFI Enabled
3,403,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,757 UART: [rt]cmd =0x46505652, len=4
3,434,428 UART: [rt] FIPS Version
3,435,555 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,846 UART: [cold-reset] ++
1,477,276 UART: [fht] Storing FHT @ 0x50003400
1,480,115 UART: [idev] ++
1,480,283 UART: [idev] CDI.KEYID = 6
1,480,643 UART: [idev] SUBJECT.KEYID = 7
1,481,067 UART: [idev] UDS.KEYID = 0
1,481,412 ready_for_fw is high
1,481,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,931 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,416 UART: [ldev] Erasing FE.KEYID = 1
1,547,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,742 UART: [fwproc] Waiting for Commands...
1,587,463 UART: [fwproc] Received command 0x46574c44
1,588,254 UART: [fwproc] Received Image of size 114448 bytes
2,888,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,511 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,644 >>> mbox cmd response: success
3,081,644 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,082,672 UART: [afmc] ++
3,082,840 UART: [afmc] CDI.KEYID = 6
3,083,202 UART: [afmc] SUBJECT.KEYID = 7
3,083,627 UART: [afmc] AUTHORITY.KEYID = 5
3,119,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,381 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,071 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,002 UART: [afmc] --
3,163,052 UART: [cold-reset] --
3,163,846 UART: [state] Locking Datavault
3,165,261 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,865 UART: [state] Locking ICCM
3,166,519 UART: [exit] Launching FMC @ 0x40000130
3,171,848 UART:
3,171,864 UART: Running Caliptra FMC ...
3,172,272 UART:
3,172,415 UART: [state] CFI Enabled
3,182,920 UART: [fht] FMC Alias Private Key: 7
3,290,985 UART: [art] Extend RT PCRs Done
3,291,413 UART: [art] Lock RT PCRs Done
3,292,861 UART: [art] Populate DV Done
3,301,196 UART: [fht] FMC Alias Private Key: 7
3,302,144 UART: [art] Derive CDI
3,302,424 UART: [art] Store in in slot 0x4
3,388,119 UART: [art] Derive Key Pair
3,388,479 UART: [art] Store priv key in slot 0x5
3,401,733 UART: [art] Derive Key Pair - Done
3,416,141 UART: [art] Signing Cert with AUTHO
3,416,621 UART: RITY.KEYID = 7
3,432,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,992 UART: [art] PUB.X = 66AB9DB061CFD07C43ED22D866B22697D6F972052608B1C904406C857A946AF0613497A8D38E0085AB07092A2D1C831A
3,439,721 UART: [art] PUB.Y = 3C695A965EFE4C56A0D5807EC05160B01A2936B569A4AF7863CDCAE4553331E1728F4BF8ADC582DFF44DE60F4D2748E3
3,446,678 UART: [art] SIG.R = FACB034C738EAFFF54484EE8352B0B28288375C2E7562EAACB7EAE564428F50CAE51B6CAC4201313EAAE3DE8F81C0D13
3,453,456 UART: [art] SIG.S = 1ACAD6488CC35A4F39DCD7D9764E6F9DCB25D3285F8C2811C3538C7B312A60B3F4B267ADD4CAE0C101B7FD4246CCE4B3
3,477,230 UART: Caliptra RT
3,477,575 UART: [state] CFI Enabled
3,585,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,472 UART: [rt]cmd =0x46505652, len=4
3,617,143 UART: [rt] FIPS Version
3,617,996 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,934 ready_for_fw is high
1,361,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,152 >>> mbox cmd response: success
2,927,152 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,982 UART:
2,988,998 UART: Running Caliptra FMC ...
2,989,406 UART:
2,989,549 UART: [state] CFI Enabled
2,999,972 UART: [fht] FMC Alias Private Key: 7
3,108,245 UART: [art] Extend RT PCRs Done
3,108,673 UART: [art] Lock RT PCRs Done
3,110,195 UART: [art] Populate DV Done
3,118,416 UART: [fht] FMC Alias Private Key: 7
3,119,464 UART: [art] Derive CDI
3,119,744 UART: [art] Store in in slot 0x4
3,205,397 UART: [art] Derive Key Pair
3,205,757 UART: [art] Store priv key in slot 0x5
3,218,995 UART: [art] Derive Key Pair - Done
3,233,766 UART: [art] Signing Cert with AUTHO
3,234,246 UART: RITY.KEYID = 7
3,249,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,985 UART: [art] PUB.X = 45AF34D48E5A9E9B4C9D70767CCFDFB9BBBE08F98950616D723A7E1022168F6C2A09D6706A507E7099DD7C54F9ACD0B4
3,256,761 UART: [art] PUB.Y = D38F8CF7E4BFAB3D79CD5DDB79377A8237A154B58CEB3C89BEAD0A5787EC955DA294DBBF86BCD41F4E314AB0BE4C28A4
3,263,738 UART: [art] SIG.R = AA36B73D9B77ABF24E7AB74BA1C641F03F782C0204378F44A8CDE21A3DE8C8502A9417C05BFCB5D59C77FA372A759B79
3,270,516 UART: [art] SIG.S = 9C3FB47F55E495CF09888B192542B30511942E1EC37C4552A94A14DC8FF1656B65BF2BEADD630B848E965B48C1B8CE4B
3,294,238 UART: Caliptra RT
3,294,583 UART: [state] CFI Enabled
3,403,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,719 UART: [rt]cmd =0x46505652, len=4
3,434,390 UART: [rt] FIPS Version
3,435,405 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
918,134 UART: [kat] HMAC-384Kdf
922,552 UART: [kat] LMS
1,170,880 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,560 UART: [idev] Erasing UDS.KEYID = 0
1,200,035 UART: [idev] Sha1 KeyId Algorithm
1,208,547 UART: [idev] --
1,209,573 UART: [ldev] ++
1,209,741 UART: [ldev] CDI.KEYID = 6
1,210,104 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,474 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,350 >>> mbox cmd response: success
2,776,350 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,414 UART: [afmc] ++
2,777,582 UART: [afmc] CDI.KEYID = 6
2,777,944 UART: [afmc] SUBJECT.KEYID = 7
2,778,369 UART: [afmc] AUTHORITY.KEYID = 5
2,813,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,196 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,709 UART: [afmc] --
2,856,677 UART: [cold-reset] --
2,857,573 UART: [state] Locking Datavault
2,858,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,040 UART: [state] Locking ICCM
2,859,692 UART: [exit] Launching FMC @ 0x40000130
2,865,021 UART:
2,865,037 UART: Running Caliptra FMC ...
2,865,445 UART:
2,865,499 UART: [state] CFI Enabled
2,875,808 UART: [fht] FMC Alias Private Key: 7
2,984,001 UART: [art] Extend RT PCRs Done
2,984,429 UART: [art] Lock RT PCRs Done
2,986,255 UART: [art] Populate DV Done
2,994,644 UART: [fht] FMC Alias Private Key: 7
2,995,720 UART: [art] Derive CDI
2,996,000 UART: [art] Store in in slot 0x4
3,081,237 UART: [art] Derive Key Pair
3,081,597 UART: [art] Store priv key in slot 0x5
3,095,051 UART: [art] Derive Key Pair - Done
3,109,988 UART: [art] Signing Cert with AUTHO
3,110,468 UART: RITY.KEYID = 7
3,125,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,553 UART: [art] PUB.X = DD2685D708C1B7322129D2C9C197917FC23824CF24721F6EBCC48DF3861B0B42ED5E5E2778D1DA4E911A9C718D5620A5
3,133,321 UART: [art] PUB.Y = 434112B4976FC4038784B5097DFD09AF5AB9E21289F7668B6B2686ED424B65BFD2546A1FD9ED7AAA4D821FBA7C6B7904
3,140,267 UART: [art] SIG.R = 5201650B42636B8E49F86C27CA6C8C9AF7B6A2D756E03B3B8547DD5D595C6A7C284C17CD2EDB1265CAE8E090F6E68078
3,147,039 UART: [art] SIG.S = 2D1E45B2FB8EB26D94816D7A0FF202080DFA1EAA4B09F07B45FDB7481F821FB4A1DD70C1717D2BF40BB60E80CF1A0065
3,171,217 UART: Caliptra RT
3,171,470 UART: [state] CFI Enabled
3,279,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,187 UART: [rt]cmd =0x46505652, len=4
3,310,858 UART: [rt] FIPS Version
3,311,797 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,915 ready_for_fw is high
1,059,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,797 >>> mbox cmd response: success
2,627,797 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,827 UART:
2,689,843 UART: Running Caliptra FMC ...
2,690,251 UART:
2,690,305 UART: [state] CFI Enabled
2,700,626 UART: [fht] FMC Alias Private Key: 7
2,808,421 UART: [art] Extend RT PCRs Done
2,808,849 UART: [art] Lock RT PCRs Done
2,810,605 UART: [art] Populate DV Done
2,818,776 UART: [fht] FMC Alias Private Key: 7
2,819,812 UART: [art] Derive CDI
2,820,092 UART: [art] Store in in slot 0x4
2,906,205 UART: [art] Derive Key Pair
2,906,565 UART: [art] Store priv key in slot 0x5
2,919,559 UART: [art] Derive Key Pair - Done
2,934,765 UART: [art] Signing Cert with AUTHO
2,935,245 UART: RITY.KEYID = 7
2,950,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,706 UART: [art] PUB.X = 61C3A3BF19F76AF42F03DCBFE6F0B6156E825112B03A8EA5974B26242516B0AF7A84DECA88095E242096E53C08642F5B
2,958,473 UART: [art] PUB.Y = 2175D31B6869FC93D89CFDFEE01C9DF0168D252F748D6DEAB0AA78FAB64FF2D0364145C708519EF7EC1879E9235F9E53
2,965,432 UART: [art] SIG.R = 71B632D98A703E82C1F0ABF60DC93F48F8F1B703BC449993F74E04FC2EA0DDAAFF141511D0DE6773236BF72DB4C16270
2,972,205 UART: [art] SIG.S = 6BB1F3E8860DB7235CEED430510B0354E9EE728351D1F9AD32C39E1BF9FAB30D348352CB79D03B85BD61C138BB4A47A6
2,995,854 UART: Caliptra RT
2,996,107 UART: [state] CFI Enabled
3,104,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,720 UART: [rt]cmd =0x46505652, len=4
3,135,391 UART: [rt] FIPS Version
3,136,312 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,746 UART: [kat] SHA2-256
903,686 UART: [kat] SHA2-384
906,295 UART: [kat] SHA2-512-ACC
908,196 UART: [kat] ECC-384
918,223 UART: [kat] HMAC-384Kdf
922,811 UART: [kat] LMS
1,171,139 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,564 UART: [fht] FHT @ 0x50003400
1,175,209 UART: [idev] ++
1,175,377 UART: [idev] CDI.KEYID = 6
1,175,737 UART: [idev] SUBJECT.KEYID = 7
1,176,161 UART: [idev] UDS.KEYID = 0
1,176,506 ready_for_fw is high
1,176,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,169 UART: [idev] Erasing UDS.KEYID = 0
1,200,824 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,330 UART: [ldev] ++
1,210,498 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,287 UART: [ldev] AUTHORITY.KEYID = 7
1,211,750 UART: [ldev] FE.KEYID = 1
1,216,884 UART: [ldev] Erasing FE.KEYID = 1
1,243,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,652 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,327 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,175 >>> mbox cmd response: success
2,775,175 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,335 UART: [afmc] ++
2,776,503 UART: [afmc] CDI.KEYID = 6
2,776,865 UART: [afmc] SUBJECT.KEYID = 7
2,777,290 UART: [afmc] AUTHORITY.KEYID = 5
2,812,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,118 UART: [afmc] --
2,856,118 UART: [cold-reset] --
2,857,138 UART: [state] Locking Datavault
2,858,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,843 UART: [state] Locking ICCM
2,859,401 UART: [exit] Launching FMC @ 0x40000130
2,864,730 UART:
2,864,746 UART: Running Caliptra FMC ...
2,865,154 UART:
2,865,297 UART: [state] CFI Enabled
2,876,038 UART: [fht] FMC Alias Private Key: 7
2,984,073 UART: [art] Extend RT PCRs Done
2,984,501 UART: [art] Lock RT PCRs Done
2,985,903 UART: [art] Populate DV Done
2,994,032 UART: [fht] FMC Alias Private Key: 7
2,995,016 UART: [art] Derive CDI
2,995,296 UART: [art] Store in in slot 0x4
3,080,993 UART: [art] Derive Key Pair
3,081,353 UART: [art] Store priv key in slot 0x5
3,094,265 UART: [art] Derive Key Pair - Done
3,109,214 UART: [art] Signing Cert with AUTHO
3,109,694 UART: RITY.KEYID = 7
3,124,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,411 UART: [art] PUB.X = BD1311572A6B755B0395E1F724681487BD0BE349C8F4F2BFEFD14F0FB9BD67FFBB662EB6A2EA59D88871711948C92C70
3,132,182 UART: [art] PUB.Y = A91924FCEDBA06D6762FE8F2E1796408C243417F23F8B7282A93549B7FB195EE433E2C79D6ADF8D5D667D40249CC2709
3,139,124 UART: [art] SIG.R = 3C4EFE244AB6CA0DC3D15A4EB119359A243969C579AF7D6BC7298C52B34B21B915EB3A96CEBA3166A99E032D7BEDD825
3,145,904 UART: [art] SIG.S = 67ADAAB29EE042AE71AC8C7710C6F3250CAD9B9E3FA026F2B490552D1AB772EB8FA5035CCCA0A440BDAD61D74E42837F
3,169,845 UART: Caliptra RT
3,170,190 UART: [state] CFI Enabled
3,278,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,345 UART: [rt]cmd =0x46505652, len=4
3,309,016 UART: [rt] FIPS Version
3,310,135 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 ready_for_fw is high
1,060,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,240 >>> mbox cmd response: success
2,629,240 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,691,706 UART:
2,691,722 UART: Running Caliptra FMC ...
2,692,130 UART:
2,692,273 UART: [state] CFI Enabled
2,702,662 UART: [fht] FMC Alias Private Key: 7
2,810,585 UART: [art] Extend RT PCRs Done
2,811,013 UART: [art] Lock RT PCRs Done
2,812,641 UART: [art] Populate DV Done
2,820,856 UART: [fht] FMC Alias Private Key: 7
2,821,988 UART: [art] Derive CDI
2,822,268 UART: [art] Store in in slot 0x4
2,907,879 UART: [art] Derive Key Pair
2,908,239 UART: [art] Store priv key in slot 0x5
2,921,231 UART: [art] Derive Key Pair - Done
2,936,246 UART: [art] Signing Cert with AUTHO
2,936,726 UART: RITY.KEYID = 7
2,951,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,751 UART: [art] PUB.X = 82479B711E9CFFFAC975FF3E40E97D00EEF6FD5D6A0239105D9887BBBD786BB25785A2B93575DBAC66D42EFD75E8CA90
2,959,514 UART: [art] PUB.Y = 7A9EBB5B809A368DF4855EB53337404EFF9DBB0C97F8145A05076BA41734C3A93D3710302C2EE538FC413D198BED2DA1
2,966,463 UART: [art] SIG.R = 1E6CBE3DD41FB76960FCEC456F37788A010DADFEF97B8A2726AB9EA2B5A43EFD04BCE99ECFA2CF01F37640C2D65B5DDB
2,973,253 UART: [art] SIG.S = 2AAC11837EB818288FDE0B2D66E917CE3612634B94D42154D04878A549C3D1E2F5C59B36CD513EF975332F97D93D9733
2,996,513 UART: Caliptra RT
2,996,858 UART: [state] CFI Enabled
3,104,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,949 UART: [rt]cmd =0x46505652, len=4
3,135,620 UART: [rt] FIPS Version
3,136,829 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
919,936 UART: [kat] LMS
1,168,248 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,605 UART: [fht] FHT @ 0x50003400
1,172,235 UART: [idev] ++
1,172,403 UART: [idev] CDI.KEYID = 6
1,172,764 UART: [idev] SUBJECT.KEYID = 7
1,173,189 UART: [idev] UDS.KEYID = 0
1,173,535 ready_for_fw is high
1,173,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,985 UART: [idev] --
1,208,070 UART: [ldev] ++
1,208,238 UART: [ldev] CDI.KEYID = 6
1,208,602 UART: [ldev] SUBJECT.KEYID = 5
1,209,029 UART: [ldev] AUTHORITY.KEYID = 7
1,209,492 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,586 UART: [ldev] --
1,280,084 UART: [fwproc] Wait for Commands...
1,280,655 UART: [fwproc] Recv command 0x46574c44
1,281,388 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,030 >>> mbox cmd response: success
2,773,030 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,067 UART: [afmc] ++
2,774,235 UART: [afmc] CDI.KEYID = 6
2,774,598 UART: [afmc] SUBJECT.KEYID = 7
2,775,024 UART: [afmc] AUTHORITY.KEYID = 5
2,810,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,406 UART: [afmc] --
2,854,330 UART: [cold-reset] --
2,855,060 UART: [state] Locking Datavault
2,856,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,843 UART: [state] Locking ICCM
2,857,479 UART: [exit] Launching FMC @ 0x40000130
2,862,808 UART:
2,862,824 UART: Running Caliptra FMC ...
2,863,232 UART:
2,863,286 UART: [state] CFI Enabled
2,873,519 UART: [fht] FMC Alias Private Key: 7
2,981,222 UART: [art] Extend RT PCRs Done
2,981,650 UART: [art] Lock RT PCRs Done
2,983,112 UART: [art] Populate DV Done
2,991,343 UART: [fht] FMC Alias Private Key: 7
2,992,349 UART: [art] Derive CDI
2,992,629 UART: [art] Store in in slot 0x4
3,078,048 UART: [art] Derive Key Pair
3,078,408 UART: [art] Store priv key in slot 0x5
3,091,384 UART: [art] Derive Key Pair - Done
3,106,394 UART: [art] Signing Cert with AUTHO
3,106,874 UART: RITY.KEYID = 7
3,122,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,959 UART: [art] PUB.X = D8A7B5C510AE3724927E8EF99959AF64E610A6BDBBEEC8965F2917AED7CCAB29FB604C0D9C9D92D74206B4369E755CD3
3,129,739 UART: [art] PUB.Y = 0FBA5F283CC1B33B2397B2D158C562E74DE576A4E20DB0A2B34B7652E854C10578A09B182DF06F75310FF117CA1EBD3D
3,136,687 UART: [art] SIG.R = 3E1F550D916193C235F29A64D1174BB3ABDAB6D7F32489CFCB945B5BCB1969DE15C954AEF4AF1A76E330AC5885EC3AA2
3,143,472 UART: [art] SIG.S = 1C5929278468B9047E8CE354AF3DFB910517CA2D62F7C02A2F2FA4C21F01097DD3F35EF6BA9E6FD7C8013D7E06A9C285
3,167,503 UART: Caliptra RT
3,167,756 UART: [state] CFI Enabled
3,275,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,487 UART: [rt]cmd =0x46505652, len=4
3,307,158 UART: [rt] FIPS Version
3,308,429 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,550 ready_for_fw is high
1,056,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,376 >>> mbox cmd response: success
2,623,376 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,908 UART:
2,684,924 UART: Running Caliptra FMC ...
2,685,332 UART:
2,685,386 UART: [state] CFI Enabled
2,695,627 UART: [fht] FMC Alias Private Key: 7
2,803,908 UART: [art] Extend RT PCRs Done
2,804,336 UART: [art] Lock RT PCRs Done
2,805,728 UART: [art] Populate DV Done
2,813,983 UART: [fht] FMC Alias Private Key: 7
2,815,151 UART: [art] Derive CDI
2,815,431 UART: [art] Store in in slot 0x4
2,901,008 UART: [art] Derive Key Pair
2,901,368 UART: [art] Store priv key in slot 0x5
2,914,708 UART: [art] Derive Key Pair - Done
2,929,352 UART: [art] Signing Cert with AUTHO
2,929,832 UART: RITY.KEYID = 7
2,945,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,985 UART: [art] PUB.X = E5110B0C998639C92399372DB81110558188DEC565042C1AB2D9D175DB72F02F0A4694DEF0571D0DB969E64DE6757FC6
2,952,738 UART: [art] PUB.Y = BC32134736434159D4EE3ED1AFF1F111656DCDD8F4024F47B113E0A5B1C213B3FA7168DABA17B33A0B61AAEF855EC9B9
2,959,698 UART: [art] SIG.R = FBB332C6122F61CD3A37BFDD0C56FF753B97A0B3EA9A870D0C39748831B1B81AD2E4EEF05A8C43D9FB00800BDC53E199
2,966,452 UART: [art] SIG.S = 1967AEC02FCB9AAFCA6CD25E6B85ADC786A6FEF198DC48F8B041710BB2C1A84CCFA6A9AC36C1D3B42341ABB9C608A355
2,990,825 UART: Caliptra RT
2,991,078 UART: [state] CFI Enabled
3,098,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,043 UART: [rt]cmd =0x46505652, len=4
3,129,714 UART: [rt] FIPS Version
3,130,601 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,827 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,280 UART: [fht] FHT @ 0x50003400
1,173,752 UART: [idev] ++
1,173,920 UART: [idev] CDI.KEYID = 6
1,174,281 UART: [idev] SUBJECT.KEYID = 7
1,174,706 UART: [idev] UDS.KEYID = 0
1,175,052 ready_for_fw is high
1,175,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,264 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,433 UART: [ldev] ++
1,210,601 UART: [ldev] CDI.KEYID = 6
1,210,965 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,216,925 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,809 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,639 >>> mbox cmd response: success
2,775,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,676 UART: [afmc] ++
2,776,844 UART: [afmc] CDI.KEYID = 6
2,777,207 UART: [afmc] SUBJECT.KEYID = 7
2,777,633 UART: [afmc] AUTHORITY.KEYID = 5
2,813,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,635 UART: [afmc] --
2,856,513 UART: [cold-reset] --
2,857,147 UART: [state] Locking Datavault
2,858,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,778 UART: [state] Locking ICCM
2,859,274 UART: [exit] Launching FMC @ 0x40000130
2,864,603 UART:
2,864,619 UART: Running Caliptra FMC ...
2,865,027 UART:
2,865,170 UART: [state] CFI Enabled
2,875,751 UART: [fht] FMC Alias Private Key: 7
2,983,874 UART: [art] Extend RT PCRs Done
2,984,302 UART: [art] Lock RT PCRs Done
2,985,722 UART: [art] Populate DV Done
2,994,021 UART: [fht] FMC Alias Private Key: 7
2,995,181 UART: [art] Derive CDI
2,995,461 UART: [art] Store in in slot 0x4
3,081,070 UART: [art] Derive Key Pair
3,081,430 UART: [art] Store priv key in slot 0x5
3,094,358 UART: [art] Derive Key Pair - Done
3,108,832 UART: [art] Signing Cert with AUTHO
3,109,312 UART: RITY.KEYID = 7
3,124,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,215 UART: [art] PUB.X = DF3F5BAC6A5D3FDB0702F990F789DD7B7427BDD57B0F3A35D6AC11EAD5996E0784EFB616BB727C853D053ADC155801C2
3,131,985 UART: [art] PUB.Y = 4F8DFA1F94652D5EE231FB9516DE404F0826F745706656ABB8DEEBAD88E7FD395711CEE84D53FD5C9C66C29482ADC795
3,138,946 UART: [art] SIG.R = 9D922F7CF0528E8DA82904FB7AFDA15DA5F56BE43E27EF46320BF49CF1E980AFBF9480ED9B7A897101016C4BF720D750
3,145,718 UART: [art] SIG.S = C25C4DCF373C114E4DE89E60C272366B7767DFF930937F94D26B0765846E7A2F638201D42E225D5CD18F80D7BCC3F80D
3,168,948 UART: Caliptra RT
3,169,293 UART: [state] CFI Enabled
3,276,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,281 UART: [rt]cmd =0x46505652, len=4
3,307,952 UART: [rt] FIPS Version
3,309,203 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,939 ready_for_fw is high
1,056,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,343 >>> mbox cmd response: success
2,625,343 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,507 UART:
2,687,523 UART: Running Caliptra FMC ...
2,687,931 UART:
2,688,074 UART: [state] CFI Enabled
2,698,267 UART: [fht] FMC Alias Private Key: 7
2,807,090 UART: [art] Extend RT PCRs Done
2,807,518 UART: [art] Lock RT PCRs Done
2,809,166 UART: [art] Populate DV Done
2,817,207 UART: [fht] FMC Alias Private Key: 7
2,818,361 UART: [art] Derive CDI
2,818,641 UART: [art] Store in in slot 0x4
2,904,244 UART: [art] Derive Key Pair
2,904,604 UART: [art] Store priv key in slot 0x5
2,917,576 UART: [art] Derive Key Pair - Done
2,932,121 UART: [art] Signing Cert with AUTHO
2,932,601 UART: RITY.KEYID = 7
2,947,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,280 UART: [art] PUB.X = A4F0F072CFBC7A0FC33542AD20A22238D3B687073443F611E8D01022C671213F1CF77D1B1CE4EF6C032F7D0104086003
2,955,029 UART: [art] PUB.Y = B0BAF7D8D03C2199FE9BE7112A8DC48EE675FB8F4321458116F3D3F1433EE00D836E91CE25274B0E465AC175FEE03A84
2,961,983 UART: [art] SIG.R = 73164E95E03925306C57B462EB856CDDB9815F1B9CAA3FE484A9A4F669E682820743FF46685DF4B6C6D6C802708C2811
2,968,745 UART: [art] SIG.S = 36E1C62F72D355E0A5C0DE7795EBBC8E8D545C2F66CAE79393D45FCD9EF6A747C9104CF4B471CA7E47D9B160A883A0BC
2,992,442 UART: Caliptra RT
2,992,787 UART: [state] CFI Enabled
3,101,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,450 UART: [rt]cmd =0x46505652, len=4
3,133,121 UART: [rt] FIPS Version
3,134,194 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,099 UART:
192,481 UART: Running Caliptra ROM ...
193,728 UART:
193,882 UART: [state] CFI Enabled
265,195 UART: [state] LifecycleState = Unprovisioned
267,100 UART: [state] DebugLocked = No
269,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,710 UART: [kat] SHA2-256
443,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,958 UART: [kat] ++
454,438 UART: [kat] sha1
464,562 UART: [kat] SHA2-256
467,246 UART: [kat] SHA2-384
472,631 UART: [kat] SHA2-512-ACC
474,988 UART: [kat] ECC-384
2,765,878 UART: [kat] HMAC-384Kdf
2,777,058 UART: [kat] LMS
3,967,336 UART: [kat] --
3,971,987 UART: [cold-reset] ++
3,973,493 UART: [fht] Storing FHT @ 0x50003400
3,984,163 UART: [idev] ++
3,984,735 UART: [idev] CDI.KEYID = 6
3,985,644 UART: [idev] SUBJECT.KEYID = 7
3,986,915 UART: [idev] UDS.KEYID = 0
4,073,394 UART: [idev] Erasing UDS.KEYID = 0
4,075,580 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,323,327 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,341 UART: [idev] --
7,349,405 UART: [ldev] ++
7,349,984 UART: [ldev] CDI.KEYID = 6
7,350,926 UART: [ldev] SUBJECT.KEYID = 5
7,352,140 UART: [ldev] AUTHORITY.KEYID = 7
7,353,430 UART: [ldev] FE.KEYID = 1
7,398,656 UART: [ldev] Erasing FE.KEYID = 1
10,731,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,162 UART: [ldev] --
13,092,525 UART: [fwproc] Waiting for Commands...
13,095,167 UART: [fwproc] Received command 0x46505652
13,097,572 UART: [rt] FIPS Version
13,099,217 >>> mbox cmd response data (36 bytes)
13,100,071 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,100,653 UART: [fwproc] Received command 0x46504c54
13,103,180 UART: [kat] SHA2-256
13,272,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,283,218 UART: [kat] ++
13,283,673 UART: [kat] sha1
13,295,097 UART: [kat] SHA2-256
13,297,847 UART: [kat] SHA2-384
13,302,967 UART: [kat] SHA2-512-ACC
13,305,368 UART: [kat] ECC-384
15,606,748 UART: [kat] HMAC-384Kdf
15,618,193 UART: [kat] LMS
16,807,674 UART: [kat] --
16,808,401 >>> mbox cmd response data (8 bytes)
16,808,826 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,810,510 UART: [fwproc] Received command 0x46504c67
16,813,214 >>> mbox cmd response data (8 bytes)
16,813,533 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,814,170 UART: [fwproc] Received command 0x43415053
16,817,179 >>> mbox cmd response data (24 bytes)
16,817,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,818,352 UART: [fwproc] Received command 0x4d454153
16,827,367 >>> mbox cmd response data (12 bytes)
16,827,785 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,829,026 UART: [fwproc] Received command 0x46505344
16,831,820 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,885,452 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,830,075 >>> mbox cmd response data (36 bytes)
12,831,504 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,361,359 >>> mbox cmd response data (8 bytes)
16,361,871 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,363,358 >>> mbox cmd response data (8 bytes)
16,363,770 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,366,041 >>> mbox cmd response data (24 bytes)
16,366,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,374,673 >>> mbox cmd response data (12 bytes)
16,375,092 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,376,015 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,380 writing to cptra_bootfsm_go
194,529 UART:
194,910 UART: Running Caliptra ROM ...
196,015 UART:
605,819 UART: [state] CFI Enabled
618,788 UART: [state] LifecycleState = Unprovisioned
620,706 UART: [state] DebugLocked = No
623,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,446 UART: [kat] SHA2-256
798,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,725 UART: [kat] ++
809,203 UART: [kat] sha1
821,111 UART: [kat] SHA2-256
823,792 UART: [kat] SHA2-384
828,049 UART: [kat] SHA2-512-ACC
830,449 UART: [kat] ECC-384
3,114,134 UART: [kat] HMAC-384Kdf
3,125,174 UART: [kat] LMS
4,315,294 UART: [kat] --
4,319,398 UART: [cold-reset] ++
4,321,376 UART: [fht] Storing FHT @ 0x50003400
4,333,331 UART: [idev] ++
4,333,914 UART: [idev] CDI.KEYID = 6
4,334,882 UART: [idev] SUBJECT.KEYID = 7
4,336,098 UART: [idev] UDS.KEYID = 0
4,421,271 UART: [idev] Erasing UDS.KEYID = 0
4,423,431 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,622,888 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,807 UART: [idev] --
7,647,847 UART: [ldev] ++
7,648,421 UART: [ldev] CDI.KEYID = 6
7,649,366 UART: [ldev] SUBJECT.KEYID = 5
7,650,580 UART: [ldev] AUTHORITY.KEYID = 7
7,651,872 UART: [ldev] FE.KEYID = 1
7,665,358 UART: [ldev] Erasing FE.KEYID = 1
10,950,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,086 UART: [ldev] --
13,312,356 UART: [fwproc] Waiting for Commands...
13,314,509 UART: [fwproc] Received command 0x46505652
13,316,911 UART: [rt] FIPS Version
13,318,557 >>> mbox cmd response data (36 bytes)
13,319,373 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,321,338 UART: [fwproc] Received command 0x46504c54
13,323,822 UART: [kat] SHA2-256
13,493,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,503,871 UART: [kat] ++
13,504,347 UART: [kat] sha1
13,515,557 UART: [kat] SHA2-256
13,518,255 UART: [kat] SHA2-384
13,524,564 UART: [kat] SHA2-512-ACC
13,526,948 UART: [kat] ECC-384
15,811,184 UART: [kat] HMAC-384Kdf
15,823,900 UART: [kat] LMS
17,013,337 UART: [kat] --
17,014,055 >>> mbox cmd response data (8 bytes)
17,014,403 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,015,967 UART: [fwproc] Received command 0x46504c67
17,018,609 >>> mbox cmd response data (8 bytes)
17,018,934 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,019,850 UART: [fwproc] Received command 0x43415053
17,022,862 >>> mbox cmd response data (24 bytes)
17,023,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,025,461 UART: [fwproc] Received command 0x4d454153
17,034,484 >>> mbox cmd response data (12 bytes)
17,034,914 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,036,268 UART: [fwproc] Received command 0x46505344
17,039,067 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,214,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,049,823 >>> mbox cmd response data (36 bytes)
13,051,331 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,547,671 >>> mbox cmd response data (8 bytes)
16,548,715 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,550,029 >>> mbox cmd response data (8 bytes)
16,550,388 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,552,175 >>> mbox cmd response data (24 bytes)
16,552,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,562,183 >>> mbox cmd response data (12 bytes)
16,562,608 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,564,125 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,510 UART:
192,885 UART: Running Caliptra ROM ...
194,067 UART:
194,227 UART: [state] CFI Enabled
262,713 UART: [state] LifecycleState = Unprovisioned
264,613 UART: [state] DebugLocked = No
267,502 UART: [state] WD Timer not started. Device not locked for debugging
272,073 UART: [kat] SHA2-256
451,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,794 UART: [kat] ++
463,336 UART: [kat] sha1
474,724 UART: [kat] SHA2-256
477,773 UART: [kat] SHA2-384
485,269 UART: [kat] SHA2-512-ACC
488,204 UART: [kat] ECC-384
2,944,919 UART: [kat] HMAC-384Kdf
2,971,027 UART: [kat] LMS
3,500,478 UART: [kat] --
3,505,366 UART: [cold-reset] ++
3,506,956 UART: [fht] FHT @ 0x50003400
3,516,537 UART: [idev] ++
3,517,105 UART: [idev] CDI.KEYID = 6
3,518,075 UART: [idev] SUBJECT.KEYID = 7
3,519,236 UART: [idev] UDS.KEYID = 0
3,601,071 UART: [idev] Erasing UDS.KEYID = 0
3,603,293 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,026,808 UART: [idev] Sha1 KeyId Algorithm
6,049,152 UART: [idev] --
6,054,457 UART: [ldev] ++
6,055,032 UART: [ldev] CDI.KEYID = 6
6,055,924 UART: [ldev] SUBJECT.KEYID = 5
6,057,146 UART: [ldev] AUTHORITY.KEYID = 7
6,058,388 UART: [ldev] FE.KEYID = 1
6,099,252 UART: [ldev] Erasing FE.KEYID = 1
8,605,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,099 UART: [ldev] --
10,413,447 UART: [fwproc] Wait for Commands...
10,415,380 UART: [fwproc] Recv command 0x46505652
10,417,696 UART: [rt] FIPS Version
10,419,196 >>> mbox cmd response data (36 bytes)
10,419,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,420,794 UART: [fwproc] Recv command 0x46504c54
10,423,130 UART: [kat] SHA2-256
10,602,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,613,980 UART: [kat] ++
10,614,517 UART: [kat] sha1
10,626,883 UART: [kat] SHA2-256
10,629,934 UART: [kat] SHA2-384
10,637,167 UART: [kat] SHA2-512-ACC
10,640,119 UART: [kat] ECC-384
13,103,512 UART: [kat] HMAC-384Kdf
13,127,230 UART: [kat] LMS
13,656,792 UART: [kat] --
13,657,431 >>> mbox cmd response data (8 bytes)
13,657,793 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,658,500 UART: [fwproc] Recv command 0x46504c67
13,661,051 >>> mbox cmd response data (8 bytes)
13,661,370 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,662,768 UART: [fwproc] Recv command 0x43415053
13,665,484 >>> mbox cmd response data (24 bytes)
13,665,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,667,139 UART: [fwproc] Recv command 0x4d454153
13,675,711 >>> mbox cmd response data (12 bytes)
13,676,140 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,677,545 UART: [fwproc] Recv command 0x46505344
13,680,034 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,232 writing to cptra_bootfsm_go
3,461,720 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,222,480 >>> mbox cmd response data (36 bytes)
10,223,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,304,502 >>> mbox cmd response data (8 bytes)
13,305,004 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,306,918 >>> mbox cmd response data (8 bytes)
13,307,331 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,308,470 >>> mbox cmd response data (24 bytes)
13,309,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,316,230 >>> mbox cmd response data (12 bytes)
13,316,645 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,318,215 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,669 UART:
193,027 UART: Running Caliptra ROM ...
194,223 UART:
603,753 UART: [state] CFI Enabled
615,684 UART: [state] LifecycleState = Unprovisioned
617,586 UART: [state] DebugLocked = No
619,192 UART: [state] WD Timer not started. Device not locked for debugging
623,707 UART: [kat] SHA2-256
802,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,393 UART: [kat] ++
814,841 UART: [kat] sha1
824,729 UART: [kat] SHA2-256
827,785 UART: [kat] SHA2-384
833,826 UART: [kat] SHA2-512-ACC
836,761 UART: [kat] ECC-384
3,277,195 UART: [kat] HMAC-384Kdf
3,290,289 UART: [kat] LMS
3,819,785 UART: [kat] --
3,823,070 UART: [cold-reset] ++
3,823,974 UART: [fht] FHT @ 0x50003400
3,833,877 UART: [idev] ++
3,834,445 UART: [idev] CDI.KEYID = 6
3,835,351 UART: [idev] SUBJECT.KEYID = 7
3,836,566 UART: [idev] UDS.KEYID = 0
3,917,576 UART: [idev] Erasing UDS.KEYID = 0
3,919,842 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,305,830 UART: [idev] Sha1 KeyId Algorithm
6,329,839 UART: [idev] --
6,333,734 UART: [ldev] ++
6,334,307 UART: [ldev] CDI.KEYID = 6
6,335,230 UART: [ldev] SUBJECT.KEYID = 5
6,336,414 UART: [ldev] AUTHORITY.KEYID = 7
6,337,653 UART: [ldev] FE.KEYID = 1
6,348,136 UART: [ldev] Erasing FE.KEYID = 1
8,819,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,205 UART: [ldev] --
10,610,551 UART: [fwproc] Wait for Commands...
10,613,629 UART: [fwproc] Recv command 0x46505652
10,615,947 UART: [rt] FIPS Version
10,617,415 >>> mbox cmd response data (36 bytes)
10,618,400 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,619,031 UART: [fwproc] Recv command 0x46504c54
10,621,366 UART: [kat] SHA2-256
10,800,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,812,176 UART: [kat] ++
10,812,636 UART: [kat] sha1
10,824,923 UART: [kat] SHA2-256
10,827,996 UART: [kat] SHA2-384
10,833,765 UART: [kat] SHA2-512-ACC
10,836,706 UART: [kat] ECC-384
13,277,242 UART: [kat] HMAC-384Kdf
13,288,717 UART: [kat] LMS
13,818,382 UART: [kat] --
13,819,021 >>> mbox cmd response data (8 bytes)
13,819,360 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,821,147 UART: [fwproc] Recv command 0x46504c67
13,823,754 >>> mbox cmd response data (8 bytes)
13,824,072 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,824,559 UART: [fwproc] Recv command 0x43415053
13,827,285 >>> mbox cmd response data (24 bytes)
13,827,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,829,578 UART: [fwproc] Recv command 0x4d454153
13,838,070 >>> mbox cmd response data (12 bytes)
13,838,484 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,839,993 UART: [fwproc] Recv command 0x46505344
13,842,530 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,893 writing to cptra_bootfsm_go
3,777,084 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,409,867 >>> mbox cmd response data (36 bytes)
10,411,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,475,021 >>> mbox cmd response data (8 bytes)
13,475,518 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,477,482 >>> mbox cmd response data (8 bytes)
13,477,891 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,479,674 >>> mbox cmd response data (24 bytes)
13,480,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,487,962 >>> mbox cmd response data (12 bytes)
13,488,393 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,489,369 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,175 UART:
192,550 UART: Running Caliptra ROM ...
193,717 UART:
193,870 UART: [state] CFI Enabled
264,421 UART: [state] LifecycleState = Unprovisioned
266,802 UART: [state] DebugLocked = No
268,889 UART: [state] WD Timer not started. Device not locked for debugging
273,185 UART: [kat] SHA2-256
463,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,883 UART: [kat] ++
474,384 UART: [kat] sha1
485,801 UART: [kat] SHA2-256
488,813 UART: [kat] SHA2-384
494,958 UART: [kat] SHA2-512-ACC
497,578 UART: [kat] ECC-384
2,945,658 UART: [kat] HMAC-384Kdf
2,969,740 UART: [kat] LMS
3,501,512 UART: [kat] --
3,506,647 UART: [cold-reset] ++
3,507,936 UART: [fht] FHT @ 0x50003400
3,519,677 UART: [idev] ++
3,520,365 UART: [idev] CDI.KEYID = 6
3,521,250 UART: [idev] SUBJECT.KEYID = 7
3,522,519 UART: [idev] UDS.KEYID = 0
3,608,370 UART: [idev] Erasing UDS.KEYID = 0
3,610,611 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,027,023 UART: [idev] Sha1 KeyId Algorithm
6,049,648 UART: [idev] --
6,055,458 UART: [ldev] ++
6,056,217 UART: [ldev] CDI.KEYID = 6
6,057,149 UART: [ldev] SUBJECT.KEYID = 5
6,058,264 UART: [ldev] AUTHORITY.KEYID = 7
6,059,447 UART: [ldev] FE.KEYID = 1
6,098,399 UART: [ldev] Erasing FE.KEYID = 1
8,603,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,548 UART: [ldev] --
10,409,167 UART: [fwproc] Wait for Commands...
10,412,022 UART: [fwproc] Recv command 0x46505652
10,414,554 UART: [rt] FIPS Version
10,416,278 >>> mbox cmd response data (36 bytes)
10,417,083 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,418,521 UART: [fwproc] Recv command 0x46504c54
10,420,748 UART: [kat] SHA2-256
10,610,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,621,262 UART: [kat] ++
10,621,860 UART: [kat] sha1
10,632,482 UART: [kat] SHA2-256
10,635,505 UART: [kat] SHA2-384
10,640,686 UART: [kat] SHA2-512-ACC
10,643,253 UART: [kat] ECC-384
13,101,063 UART: [kat] HMAC-384Kdf
13,123,510 UART: [kat] LMS
13,655,348 UART: [kat] --
13,656,019 >>> mbox cmd response data (8 bytes)
13,656,378 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,657,142 UART: [fwproc] Recv command 0x46504c67
13,659,663 >>> mbox cmd response data (8 bytes)
13,659,985 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,661,543 UART: [fwproc] Recv command 0x43415053
13,664,522 >>> mbox cmd response data (24 bytes)
13,665,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,666,196 UART: [fwproc] Recv command 0x4d454153
13,675,876 >>> mbox cmd response data (12 bytes)
13,676,292 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,676,888 UART: [fwproc] Recv command 0x46505344
13,679,592 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,524,450 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,244,336 >>> mbox cmd response data (36 bytes)
10,245,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,404,663 >>> mbox cmd response data (8 bytes)
13,405,183 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,406,238 >>> mbox cmd response data (8 bytes)
13,406,554 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,408,390 >>> mbox cmd response data (24 bytes)
13,408,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,417,423 >>> mbox cmd response data (12 bytes)
13,417,841 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,420,169 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,404 UART:
192,806 UART: Running Caliptra ROM ...
193,981 UART:
603,697 UART: [state] CFI Enabled
620,671 UART: [state] LifecycleState = Unprovisioned
623,063 UART: [state] DebugLocked = No
624,874 UART: [state] WD Timer not started. Device not locked for debugging
629,649 UART: [kat] SHA2-256
819,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,349 UART: [kat] ++
830,883 UART: [kat] sha1
842,790 UART: [kat] SHA2-256
845,772 UART: [kat] SHA2-384
850,944 UART: [kat] SHA2-512-ACC
853,554 UART: [kat] ECC-384
3,295,065 UART: [kat] HMAC-384Kdf
3,307,142 UART: [kat] LMS
3,838,957 UART: [kat] --
3,843,224 UART: [cold-reset] ++
3,844,618 UART: [fht] FHT @ 0x50003400
3,856,194 UART: [idev] ++
3,856,915 UART: [idev] CDI.KEYID = 6
3,857,828 UART: [idev] SUBJECT.KEYID = 7
3,859,043 UART: [idev] UDS.KEYID = 0
3,944,612 UART: [idev] Erasing UDS.KEYID = 0
3,946,824 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,339,163 UART: [idev] Sha1 KeyId Algorithm
6,362,134 UART: [idev] --
6,366,508 UART: [ldev] ++
6,367,191 UART: [ldev] CDI.KEYID = 6
6,368,113 UART: [ldev] SUBJECT.KEYID = 5
6,369,300 UART: [ldev] AUTHORITY.KEYID = 7
6,370,534 UART: [ldev] FE.KEYID = 1
6,378,544 UART: [ldev] Erasing FE.KEYID = 1
8,850,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,554 UART: [ldev] --
10,639,579 UART: [fwproc] Wait for Commands...
10,642,489 UART: [fwproc] Recv command 0x46505652
10,645,019 UART: [rt] FIPS Version
10,646,747 >>> mbox cmd response data (36 bytes)
10,647,508 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,648,020 UART: [fwproc] Recv command 0x46504c54
10,650,289 UART: [kat] SHA2-256
10,840,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,850,817 UART: [kat] ++
10,851,335 UART: [kat] sha1
10,862,440 UART: [kat] SHA2-256
10,865,517 UART: [kat] SHA2-384
10,871,721 UART: [kat] SHA2-512-ACC
10,874,339 UART: [kat] ECC-384
13,317,618 UART: [kat] HMAC-384Kdf
13,331,622 UART: [kat] LMS
13,863,489 UART: [kat] --
13,864,181 >>> mbox cmd response data (8 bytes)
13,864,521 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,865,667 UART: [fwproc] Recv command 0x46504c67
13,868,219 >>> mbox cmd response data (8 bytes)
13,868,539 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,869,198 UART: [fwproc] Recv command 0x43415053
13,871,903 >>> mbox cmd response data (24 bytes)
13,872,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,873,450 UART: [fwproc] Recv command 0x4d454153
13,883,125 >>> mbox cmd response data (12 bytes)
13,883,548 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,884,736 UART: [fwproc] Recv command 0x46505344
13,887,441 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,844,766 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,471,575 >>> mbox cmd response data (36 bytes)
10,472,827 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,598,568 >>> mbox cmd response data (8 bytes)
13,599,080 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,600,838 >>> mbox cmd response data (8 bytes)
13,601,253 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,603,311 >>> mbox cmd response data (24 bytes)
13,603,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,612,238 >>> mbox cmd response data (12 bytes)
13,612,656 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,614,012 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Unprovisioned
86,225 UART: [state] DebugLocked = No
86,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,477 UART: [kat] SHA2-256
882,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,523 UART: [kat] ++
886,675 UART: [kat] sha1
890,923 UART: [kat] SHA2-256
892,861 UART: [kat] SHA2-384
895,710 UART: [kat] SHA2-512-ACC
897,611 UART: [kat] ECC-384
903,300 UART: [kat] HMAC-384Kdf
907,920 UART: [kat] LMS
1,476,116 UART: [kat] --
1,476,787 UART: [cold-reset] ++
1,477,205 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,713 UART: [ldev] ++
1,514,881 UART: [ldev] CDI.KEYID = 6
1,515,244 UART: [ldev] SUBJECT.KEYID = 5
1,515,670 UART: [ldev] AUTHORITY.KEYID = 7
1,516,133 UART: [ldev] FE.KEYID = 1
1,521,315 UART: [ldev] Erasing FE.KEYID = 1
1,546,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,646 UART: [ldev] --
1,585,019 UART: [fwproc] Waiting for Commands...
1,585,826 UART: [fwproc] Received command 0x46505652
1,586,708 UART: [rt] FIPS Version
1,587,261 >>> mbox cmd response data (36 bytes)
1,587,262 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,587,336 UART: [fwproc] Received command 0x46504c54
1,588,243 UART: [kat] SHA2-256
2,382,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,289 UART: [kat] ++
2,386,441 UART: [kat] sha1
2,390,647 UART: [kat] SHA2-256
2,392,585 UART: [kat] SHA2-384
2,395,252 UART: [kat] SHA2-512-ACC
2,397,152 UART: [kat] ECC-384
2,402,725 UART: [kat] HMAC-384Kdf
2,407,313 UART: [kat] LMS
2,975,509 UART: [kat] --
2,975,747 >>> mbox cmd response data (8 bytes)
2,975,748 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,850 UART: [fwproc] Received command 0x46504c67
2,976,804 >>> mbox cmd response data (8 bytes)
2,976,805 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,976,881 UART: [fwproc] Received command 0x43415053
2,977,929 >>> mbox cmd response data (24 bytes)
2,977,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,978,074 UART: [fwproc] Received command 0x4d454153
2,982,138 >>> mbox cmd response data (12 bytes)
2,982,139 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,982,449 UART: [fwproc] Received command 0x46505344
2,983,397 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,417 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,082 >>> mbox cmd response data (36 bytes)
1,441,083 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,354 >>> mbox cmd response data (8 bytes)
2,716,355 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,617 >>> mbox cmd response data (8 bytes)
2,716,618 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,164 >>> mbox cmd response data (24 bytes)
2,717,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,720,649 >>> mbox cmd response data (12 bytes)
2,720,650 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,039 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
891,010 UART: [kat] SHA2-256
892,948 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
903,775 UART: [kat] HMAC-384Kdf
908,439 UART: [kat] LMS
1,476,635 UART: [kat] --
1,477,486 UART: [cold-reset] ++
1,477,936 UART: [fht] Storing FHT @ 0x50003400
1,480,681 UART: [idev] ++
1,480,849 UART: [idev] CDI.KEYID = 6
1,481,209 UART: [idev] SUBJECT.KEYID = 7
1,481,633 UART: [idev] UDS.KEYID = 0
1,481,978 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,331 UART: [idev] Erasing UDS.KEYID = 0
1,506,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,897 UART: [idev] --
1,515,980 UART: [ldev] ++
1,516,148 UART: [ldev] CDI.KEYID = 6
1,516,511 UART: [ldev] SUBJECT.KEYID = 5
1,516,937 UART: [ldev] AUTHORITY.KEYID = 7
1,517,400 UART: [ldev] FE.KEYID = 1
1,522,612 UART: [ldev] Erasing FE.KEYID = 1
1,548,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,207 UART: [ldev] --
1,587,596 UART: [fwproc] Waiting for Commands...
1,588,309 UART: [fwproc] Received command 0x46505652
1,589,191 UART: [rt] FIPS Version
1,589,744 >>> mbox cmd response data (36 bytes)
1,589,745 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,887 UART: [fwproc] Received command 0x46504c54
1,590,794 UART: [kat] SHA2-256
2,384,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,840 UART: [kat] ++
2,388,992 UART: [kat] sha1
2,393,156 UART: [kat] SHA2-256
2,395,094 UART: [kat] SHA2-384
2,397,853 UART: [kat] SHA2-512-ACC
2,399,753 UART: [kat] ECC-384
2,405,040 UART: [kat] HMAC-384Kdf
2,409,628 UART: [kat] LMS
2,977,824 UART: [kat] --
2,978,062 >>> mbox cmd response data (8 bytes)
2,978,063 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,978,167 UART: [fwproc] Received command 0x46504c67
2,979,121 >>> mbox cmd response data (8 bytes)
2,979,122 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,979,326 UART: [fwproc] Received command 0x43415053
2,980,374 >>> mbox cmd response data (24 bytes)
2,980,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,980,643 UART: [fwproc] Received command 0x4d454153
2,984,707 >>> mbox cmd response data (12 bytes)
2,984,708 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,798 UART: [fwproc] Received command 0x46505344
2,985,746 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,364 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,641 >>> mbox cmd response data (36 bytes)
1,442,642 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,881 >>> mbox cmd response data (8 bytes)
2,717,882 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,324 >>> mbox cmd response data (8 bytes)
2,718,325 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,873 >>> mbox cmd response data (24 bytes)
2,718,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,722,406 >>> mbox cmd response data (12 bytes)
2,722,407 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,852 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,469 UART: [kat] SHA2-256
903,409 UART: [kat] SHA2-384
906,160 UART: [kat] SHA2-512-ACC
908,061 UART: [kat] ECC-384
917,516 UART: [kat] HMAC-384Kdf
922,006 UART: [kat] LMS
1,170,334 UART: [kat] --
1,171,225 UART: [cold-reset] ++
1,171,613 UART: [fht] FHT @ 0x50003400
1,174,130 UART: [idev] ++
1,174,298 UART: [idev] CDI.KEYID = 6
1,174,658 UART: [idev] SUBJECT.KEYID = 7
1,175,082 UART: [idev] UDS.KEYID = 0
1,175,427 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,902 UART: [fwproc] Recv command 0x46505652
1,282,723 UART: [rt] FIPS Version
1,283,277 >>> mbox cmd response data (36 bytes)
1,283,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,400 UART: [fwproc] Recv command 0x46504c54
1,284,246 UART: [kat] SHA2-256
2,089,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,021 UART: [kat] ++
2,094,173 UART: [kat] sha1
2,098,391 UART: [kat] SHA2-256
2,100,331 UART: [kat] SHA2-384
2,103,192 UART: [kat] SHA2-512-ACC
2,105,092 UART: [kat] ECC-384
2,114,525 UART: [kat] HMAC-384Kdf
2,119,151 UART: [kat] LMS
2,367,479 UART: [kat] --
2,367,717 >>> mbox cmd response data (8 bytes)
2,367,718 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,875 UART: [fwproc] Recv command 0x46504c67
2,368,768 >>> mbox cmd response data (8 bytes)
2,368,769 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,369,034 UART: [fwproc] Recv command 0x43415053
2,370,017 >>> mbox cmd response data (24 bytes)
2,370,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,370,227 UART: [fwproc] Recv command 0x4d454153
2,374,236 >>> mbox cmd response data (12 bytes)
2,374,237 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,374,448 UART: [fwproc] Recv command 0x46505344
2,375,335 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,999 >>> mbox cmd response data (36 bytes)
1,141,000 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,146 >>> mbox cmd response data (8 bytes)
2,114,147 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,551 >>> mbox cmd response data (8 bytes)
2,114,552 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,114,990 >>> mbox cmd response data (24 bytes)
2,114,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,118,377 >>> mbox cmd response data (12 bytes)
2,118,378 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,118,686 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,833 UART: [kat] LMS
1,171,161 UART: [kat] --
1,171,908 UART: [cold-reset] ++
1,172,264 UART: [fht] FHT @ 0x50003400
1,175,017 UART: [idev] ++
1,175,185 UART: [idev] CDI.KEYID = 6
1,175,545 UART: [idev] SUBJECT.KEYID = 7
1,175,969 UART: [idev] UDS.KEYID = 0
1,176,314 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,014 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,696 UART: [ldev] ++
1,210,864 UART: [ldev] CDI.KEYID = 6
1,211,227 UART: [ldev] SUBJECT.KEYID = 5
1,211,653 UART: [ldev] AUTHORITY.KEYID = 7
1,212,116 UART: [ldev] FE.KEYID = 1
1,217,440 UART: [ldev] Erasing FE.KEYID = 1
1,244,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,840 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,833 UART: [fwproc] Recv command 0x46505652
1,284,654 UART: [rt] FIPS Version
1,285,208 >>> mbox cmd response data (36 bytes)
1,285,209 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,325 UART: [fwproc] Recv command 0x46504c54
1,286,171 UART: [kat] SHA2-256
2,091,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,946 UART: [kat] ++
2,096,098 UART: [kat] sha1
2,100,254 UART: [kat] SHA2-256
2,102,194 UART: [kat] SHA2-384
2,105,009 UART: [kat] SHA2-512-ACC
2,106,909 UART: [kat] ECC-384
2,116,968 UART: [kat] HMAC-384Kdf
2,121,700 UART: [kat] LMS
2,370,028 UART: [kat] --
2,370,266 >>> mbox cmd response data (8 bytes)
2,370,267 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,558 UART: [fwproc] Recv command 0x46504c67
2,371,451 >>> mbox cmd response data (8 bytes)
2,371,452 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,767 UART: [fwproc] Recv command 0x43415053
2,372,750 >>> mbox cmd response data (24 bytes)
2,372,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,894 UART: [fwproc] Recv command 0x4d454153
2,376,903 >>> mbox cmd response data (12 bytes)
2,376,904 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,969 UART: [fwproc] Recv command 0x46505344
2,377,856 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,810 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,562 >>> mbox cmd response data (36 bytes)
1,141,563 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,799 >>> mbox cmd response data (8 bytes)
2,114,800 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,115,070 >>> mbox cmd response data (8 bytes)
2,115,071 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,115,403 >>> mbox cmd response data (24 bytes)
2,115,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,118,950 >>> mbox cmd response data (12 bytes)
2,118,951 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,119,345 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
915,238 UART: [kat] HMAC-384Kdf
919,862 UART: [kat] LMS
1,168,174 UART: [kat] --
1,169,091 UART: [cold-reset] ++
1,169,671 UART: [fht] FHT @ 0x50003400
1,172,339 UART: [idev] ++
1,172,507 UART: [idev] CDI.KEYID = 6
1,172,868 UART: [idev] SUBJECT.KEYID = 7
1,173,293 UART: [idev] UDS.KEYID = 0
1,173,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,180,979 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,023 UART: [idev] --
1,208,012 UART: [ldev] ++
1,208,180 UART: [ldev] CDI.KEYID = 6
1,208,544 UART: [ldev] SUBJECT.KEYID = 5
1,208,971 UART: [ldev] AUTHORITY.KEYID = 7
1,209,434 UART: [ldev] FE.KEYID = 1
1,214,480 UART: [ldev] Erasing FE.KEYID = 1
1,240,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,852 UART: [ldev] --
1,279,150 UART: [fwproc] Wait for Commands...
1,279,783 UART: [fwproc] Recv command 0x46505652
1,280,610 UART: [rt] FIPS Version
1,281,171 >>> mbox cmd response data (36 bytes)
1,281,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,281,401 UART: [fwproc] Recv command 0x46504c54
1,282,255 UART: [kat] SHA2-256
2,085,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,934 UART: [kat] ++
2,090,086 UART: [kat] sha1
2,094,168 UART: [kat] SHA2-256
2,096,108 UART: [kat] SHA2-384
2,099,019 UART: [kat] SHA2-512-ACC
2,100,919 UART: [kat] ECC-384
2,111,094 UART: [kat] HMAC-384Kdf
2,115,782 UART: [kat] LMS
2,364,094 UART: [kat] --
2,364,335 >>> mbox cmd response data (8 bytes)
2,364,336 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,492 UART: [fwproc] Recv command 0x46504c67
2,365,396 >>> mbox cmd response data (8 bytes)
2,365,397 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,365,573 UART: [fwproc] Recv command 0x43415053
2,366,568 >>> mbox cmd response data (24 bytes)
2,366,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,366,720 UART: [fwproc] Recv command 0x4d454153
2,370,747 >>> mbox cmd response data (12 bytes)
2,370,748 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,370,859 UART: [fwproc] Recv command 0x46505344
2,371,762 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,462 >>> mbox cmd response data (36 bytes)
1,136,463 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,106,095 >>> mbox cmd response data (8 bytes)
2,106,096 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,490 >>> mbox cmd response data (8 bytes)
2,106,491 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,968 >>> mbox cmd response data (24 bytes)
2,106,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,369 >>> mbox cmd response data (12 bytes)
2,110,370 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,744 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,174,254 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46505652
1,282,775 UART: [rt] FIPS Version
1,283,336 >>> mbox cmd response data (36 bytes)
1,283,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,442 UART: [fwproc] Recv command 0x46504c54
1,284,296 UART: [kat] SHA2-256
2,087,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,091,975 UART: [kat] ++
2,092,127 UART: [kat] sha1
2,096,345 UART: [kat] SHA2-256
2,098,285 UART: [kat] SHA2-384
2,100,884 UART: [kat] SHA2-512-ACC
2,102,784 UART: [kat] ECC-384
2,112,441 UART: [kat] HMAC-384Kdf
2,117,225 UART: [kat] LMS
2,365,537 UART: [kat] --
2,365,778 >>> mbox cmd response data (8 bytes)
2,365,779 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,985 UART: [fwproc] Recv command 0x46504c67
2,366,889 >>> mbox cmd response data (8 bytes)
2,366,890 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,052 UART: [fwproc] Recv command 0x43415053
2,368,047 >>> mbox cmd response data (24 bytes)
2,368,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,227 UART: [fwproc] Recv command 0x4d454153
2,372,254 >>> mbox cmd response data (12 bytes)
2,372,255 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,356 UART: [fwproc] Recv command 0x46505344
2,373,259 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,201 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,611 >>> mbox cmd response data (36 bytes)
1,137,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,106,126 >>> mbox cmd response data (8 bytes)
2,106,127 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,493 >>> mbox cmd response data (8 bytes)
2,106,494 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,937 >>> mbox cmd response data (24 bytes)
2,106,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,538 >>> mbox cmd response data (12 bytes)
2,110,539 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,887 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,123 UART:
192,497 UART: Running Caliptra ROM ...
193,686 UART:
193,838 UART: [state] CFI Enabled
262,458 UART: [state] LifecycleState = Unprovisioned
264,450 UART: [state] DebugLocked = No
266,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,726 UART: [kat] SHA2-256
440,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,916 UART: [kat] ++
451,521 UART: [kat] sha1
461,265 UART: [kat] SHA2-256
463,982 UART: [kat] SHA2-384
470,263 UART: [kat] SHA2-512-ACC
472,632 UART: [kat] ECC-384
2,769,506 UART: [kat] HMAC-384Kdf
2,801,489 UART: [kat] LMS
3,991,762 UART: [kat] --
3,997,548 UART: [cold-reset] ++
3,999,846 UART: [fht] Storing FHT @ 0x50003400
4,010,907 UART: [idev] ++
4,011,481 UART: [idev] CDI.KEYID = 6
4,012,519 UART: [idev] SUBJECT.KEYID = 7
4,013,699 UART: [idev] UDS.KEYID = 0
4,014,759 ready_for_fw is high
4,015,011 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,664 UART: [idev] Erasing UDS.KEYID = 0
7,351,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,680 UART: [idev] --
7,377,463 UART: [ldev] ++
7,378,037 UART: [ldev] CDI.KEYID = 6
7,379,026 UART: [ldev] SUBJECT.KEYID = 5
7,380,247 UART: [ldev] AUTHORITY.KEYID = 7
7,381,634 UART: [ldev] FE.KEYID = 1
7,424,163 UART: [ldev] Erasing FE.KEYID = 1
10,759,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,386 UART: [ldev] --
13,137,751 UART: [fwproc] Waiting for Commands...
13,140,830 UART: [fwproc] Received command 0x46574c44
13,143,064 UART: [fwproc] Received Image of size 114124 bytes
17,196,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,658,213 >>> mbox cmd response: success
17,661,171 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,662,425 UART: [afmc] ++
17,663,017 UART: [afmc] CDI.KEYID = 6
17,663,934 UART: [afmc] SUBJECT.KEYID = 7
17,665,204 UART: [afmc] AUTHORITY.KEYID = 5
21,034,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,333,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,335,555 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,350,002 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,364,823 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,379,249 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,401,617 UART: [afmc] --
23,406,086 UART: [cold-reset] --
23,409,476 UART: [state] Locking Datavault
23,413,000 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,704 UART: [state] Locking ICCM
23,417,445 UART: [exit] Launching FMC @ 0x40000130
23,425,836 UART:
23,426,072 UART: Running Caliptra FMC ...
23,427,175 UART:
23,427,334 UART: [state] CFI Enabled
23,491,338 UART: [fht] FMC Alias Private Key: 7
25,828,651 UART: [art] Extend RT PCRs Done
25,829,873 UART: [art] Lock RT PCRs Done
25,831,767 UART: [art] Populate DV Done
25,837,198 UART: [fht] FMC Alias Private Key: 7
25,838,845 UART: [art] Derive CDI
25,839,660 UART: [art] Store in in slot 0x4
25,900,683 UART: [art] Derive Key Pair
25,901,725 UART: [art] Store priv key in slot 0x5
29,194,482 UART: [art] Derive Key Pair - Done
29,207,532 UART: [art] Signing Cert with AUTHO
29,208,830 UART: RITY.KEYID = 7
31,496,284 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,793 UART: [art] PUB.X = DD9F77F686932E419BA1647CF10443BADC438F8E2FA7E4783D0E3BBBCB5BDFF3C7C1F60560D8897B8C1E177F208940D2
31,505,087 UART: [art] PUB.Y = 74AD1BA32391B5D2DD12B2200E6C1FE1E61B851F4C1D4E9069A036B8CC622210744BAA939E82DC706024C0541B8C2E25
31,512,310 UART: [art] SIG.R = 67D52A7B714FE741B51806149A8DFEC8E918F68673F9FC5F8D7B90C8252B9EF32EA82BE9AC7D367A45C72F3972814AC4
31,519,690 UART: [art] SIG.S = B0AAB7B6CDB512D593CC2EE3F2F1F6C94262FC4D37B015A665953B5934D94ACE5F4CBDBF755A96ED1DD4302E56E704AE
32,824,790 UART: Caliptra RT
32,825,515 UART: [state] CFI Enabled
32,988,014 UART: [rt] RT listening for mailbox commands...
33,019,343 UART: [rt]cmd =0x46505652, len=4
33,020,593 UART: [rt] FIPS Version
33,021,862 >>> mbox cmd response data (36 bytes)
33,022,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,052,351 UART: [rt]cmd =0x46504c54, len=4
33,053,835 >>> mbox cmd response data (8 bytes)
33,054,186 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,084,556 UART: [rt]cmd =0x46504c67, len=4
33,085,877 >>> mbox cmd response: failed
33,087,253 UART: [rt] FIPS self test
33,088,185 UART: [kat] ++
33,088,639 UART: [kat] sha1
33,093,169 UART: [kat] SHA2-256
33,094,975 UART: [kat] SHA2-384
33,097,966 UART: [kat] SHA2-512-ACC
33,100,184 UART: [kat] ECC-384
36,366,780 UART: [kat] HMAC-384Kdf
36,374,666 UART: [kat] LMS
36,784,952 UART: [kat] --
36,937,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,771,204 UART: [rt] Verify complete
40,932,630 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,962,365 UART: [rt]cmd =0x46504c67, len=4
40,963,840 >>> mbox cmd response data (8 bytes)
40,964,218 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,994,035 UART: [rt]cmd =0x49444543, len=4
41,001,155 >>> mbox cmd response data (37 bytes)
41,001,773 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,031,493 UART: [rt]cmd =0x49444549, len=4
41,034,372 >>> mbox cmd response data (104 bytes)
41,035,263 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,065,039 UART: [rt]cmd =0x49444550, len=4
41,075,532 >>> mbox cmd response data (8 bytes)
41,075,946 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,105,815 UART: [rt]cmd =0x4c444556, len=4
41,116,845 >>> mbox cmd response data (687 bytes)
41,120,361 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,150,167 UART: [rt]cmd =0x43455246, len=4
41,163,226 >>> mbox cmd response data (920 bytes)
41,167,773 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,197,733 UART: [rt]cmd =0x43455252, len=4
41,209,084 >>> mbox cmd response data (783 bytes)
41,213,795 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,245,306 UART: [rt]cmd =0x53494756, len=196
42,536,787 >>> mbox cmd response data (8 bytes)
42,537,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,568,041 UART: [rt]cmd =0x4d454153, len=108
42,586,711 >>> mbox cmd response data (12 bytes)
42,587,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,616,742 UART: [rt]cmd =0x494e464f, len=4
42,620,703 >>> mbox cmd response data (264 bytes)
42,623,018 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,652,717 UART: [rt]cmd =0x54514754, len=24
42,655,303 >>> mbox cmd response data (8 bytes)
42,655,711 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,685,444 UART: [rt]cmd =0x47544744, len=8
42,688,459 >>> mbox cmd response data (104 bytes)
42,689,320 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,718,979 UART: [rt]cmd =0x50435252, len=8
42,720,982 >>> mbox cmd response data (8 bytes)
42,721,334 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,751,248 UART: [rt]cmd =0x50435251, len=36
43,922,655 >>> mbox cmd response data (1848 bytes)
43,931,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,961,993 UART: [rt]cmd =0x50435245, len=56
43,965,267 >>> mbox cmd response data (8 bytes)
43,965,717 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,995,451 UART: [rt]cmd =0x44504543, len=20
44,015,638 >>> mbox cmd response data (44 bytes)
44,016,330 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,046,087 UART: [rt]cmd =0x44504543, len=24
44,091,494 >>> mbox cmd response data (40 bytes)
44,092,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,122,547 UART: [rt]cmd =0x44504543, len=96
44,162,433 >>> mbox cmd response data (56 bytes)
44,163,177 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,193,766 UART: [rt]cmd =0x44504543, len=92
52,254,847 >>> mbox cmd response data (6284 bytes)
52,284,107 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,314,940 UART: [rt]cmd =0x44504543, len=136
57,951,770 >>> mbox cmd response data (136 bytes)
57,952,984 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,983,410 UART: [rt]cmd =0x44504543, len=40
58,022,005 >>> mbox cmd response data (40 bytes)
58,022,737 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,052,701 UART: [rt]cmd =0x44504543, len=28
58,094,887 >>> mbox cmd response data (2076 bytes)
58,104,975 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,135,015 UART: [rt]cmd =0x44504543, len=36
58,164,501 >>> mbox cmd response data (24 bytes)
58,165,068 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,194,740 UART: [rt]cmd =0x4453424c, len=4
61,494,918 >>> mbox cmd response data (8 bytes)
61,495,414 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,525,139 UART: [rt]cmd =0x46505344, len=4
61,635,058 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,784,505 ready_for_fw is high
3,784,941 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,472 >>> mbox cmd response: success
17,876,606 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,564,616 UART:
23,565,021 UART: Running Caliptra FMC ...
23,566,190 UART:
23,566,353 UART: [state] CFI Enabled
23,636,019 UART: [fht] FMC Alias Private Key: 7
25,973,321 UART: [art] Extend RT PCRs Done
25,974,554 UART: [art] Lock RT PCRs Done
25,976,158 UART: [art] Populate DV Done
25,981,578 UART: [fht] FMC Alias Private Key: 7
25,983,072 UART: [art] Derive CDI
25,983,841 UART: [art] Store in in slot 0x4
26,043,403 UART: [art] Derive Key Pair
26,044,447 UART: [art] Store priv key in slot 0x5
29,337,032 UART: [art] Derive Key Pair - Done
29,350,080 UART: [art] Signing Cert with AUTHO
29,351,419 UART: RITY.KEYID = 7
31,638,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,586 UART: [art] PUB.X = 174B1A194102B0F306207FECD01D6D3B81C3230370911FC6E27BE45868B6AC3752A5024AE9723F4BC9A593A7203D1D40
31,646,813 UART: [art] PUB.Y = 7D1C74863A8CD0C7754680737FE507E89DC39D2F8717533C60295A9D1C04B1A021CFAA43545F0681525F2690B13FAF47
31,654,058 UART: [art] SIG.R = 9619217EC3C65E007705FB24DC41BF8E437B4B482BA68AEE1B2AFCE88512EBE5EC1526B3E43FE7CDD7000E262D026D9E
31,661,403 UART: [art] SIG.S = 581BF098D4D1B83424A65A419BC84472E7EBE9F4D8E74F8CCF6562DBD45F541BE7A99373320221A87B1C9E69358D5F95
32,966,327 UART: Caliptra RT
32,967,034 UART: [state] CFI Enabled
33,127,346 UART: [rt] RT listening for mailbox commands...
33,158,711 UART: [rt]cmd =0x46505652, len=4
33,160,018 UART: [rt] FIPS Version
33,161,127 >>> mbox cmd response data (36 bytes)
33,161,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,191,773 UART: [rt]cmd =0x46504c54, len=4
33,193,491 >>> mbox cmd response data (8 bytes)
33,193,835 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,223,916 UART: [rt]cmd =0x46504c67, len=4
33,225,225 >>> mbox cmd response: failed
33,226,217 UART: [rt] FIPS self test
33,227,205 UART: [kat] ++
33,227,661 UART: [kat] sha1
33,231,811 UART: [kat] SHA2-256
33,233,638 UART: [kat] SHA2-384
33,236,554 UART: [kat] SHA2-512-ACC
33,238,771 UART: [kat] ECC-384
36,506,170 UART: [kat] HMAC-384Kdf
36,513,883 UART: [kat] LMS
36,924,128 UART: [kat] --
37,055,957 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,889,751 UART: [rt] Verify complete
41,070,212 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,099,793 UART: [rt]cmd =0x46504c67, len=4
41,101,434 >>> mbox cmd response data (8 bytes)
41,101,813 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,131,634 UART: [rt]cmd =0x49444543, len=4
41,138,544 >>> mbox cmd response data (37 bytes)
41,139,136 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,168,735 UART: [rt]cmd =0x49444549, len=4
41,171,502 >>> mbox cmd response data (104 bytes)
41,172,381 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,201,994 UART: [rt]cmd =0x49444550, len=4
41,212,841 >>> mbox cmd response data (8 bytes)
41,213,264 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,242,860 UART: [rt]cmd =0x4c444556, len=4
41,254,104 >>> mbox cmd response data (687 bytes)
41,257,613 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,287,401 UART: [rt]cmd =0x43455246, len=4
41,300,628 >>> mbox cmd response data (920 bytes)
41,305,176 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,334,775 UART: [rt]cmd =0x43455252, len=4
41,346,019 >>> mbox cmd response data (783 bytes)
41,350,910 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,382,383 UART: [rt]cmd =0x53494756, len=196
42,674,167 >>> mbox cmd response data (8 bytes)
42,674,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,705,482 UART: [rt]cmd =0x4d454153, len=108
42,723,541 >>> mbox cmd response data (12 bytes)
42,723,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,753,958 UART: [rt]cmd =0x494e464f, len=4
42,757,916 >>> mbox cmd response data (264 bytes)
42,760,201 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,790,268 UART: [rt]cmd =0x54514754, len=24
42,793,009 >>> mbox cmd response data (8 bytes)
42,793,442 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,823,103 UART: [rt]cmd =0x47544744, len=8
42,826,219 >>> mbox cmd response data (104 bytes)
42,827,079 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,856,791 UART: [rt]cmd =0x50435252, len=8
42,858,748 >>> mbox cmd response data (8 bytes)
42,859,101 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,889,190 UART: [rt]cmd =0x50435251, len=36
44,061,705 >>> mbox cmd response data (1848 bytes)
44,070,775 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,101,326 UART: [rt]cmd =0x50435245, len=56
44,104,300 >>> mbox cmd response data (8 bytes)
44,104,751 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,134,646 UART: [rt]cmd =0x44504543, len=20
44,154,745 >>> mbox cmd response data (44 bytes)
44,155,499 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,185,290 UART: [rt]cmd =0x44504543, len=24
44,229,795 >>> mbox cmd response data (40 bytes)
44,230,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,261,211 UART: [rt]cmd =0x44504543, len=96
44,300,570 >>> mbox cmd response data (56 bytes)
44,301,297 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,331,995 UART: [rt]cmd =0x44504543, len=92
52,371,999 >>> mbox cmd response data (6284 bytes)
52,401,289 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,432,238 UART: [rt]cmd =0x44504543, len=136
58,067,925 >>> mbox cmd response data (136 bytes)
58,069,122 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,099,311 UART: [rt]cmd =0x44504543, len=40
58,137,719 >>> mbox cmd response data (40 bytes)
58,138,382 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,168,201 UART: [rt]cmd =0x44504543, len=28
58,211,015 >>> mbox cmd response data (2076 bytes)
58,220,913 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,251,131 UART: [rt]cmd =0x44504543, len=36
58,280,867 >>> mbox cmd response data (24 bytes)
58,281,441 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,311,445 UART: [rt]cmd =0x4453424c, len=4
61,601,062 >>> mbox cmd response data (8 bytes)
61,601,575 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,631,357 UART: [rt]cmd =0x46505344, len=4
61,741,212 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,486 UART:
192,852 UART: Running Caliptra ROM ...
193,950 UART:
603,544 UART: [state] CFI Enabled
615,791 UART: [state] LifecycleState = Unprovisioned
617,741 UART: [state] DebugLocked = No
620,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,924 UART: [kat] SHA2-256
795,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,253 UART: [kat] ++
806,732 UART: [kat] sha1
816,970 UART: [kat] SHA2-256
819,638 UART: [kat] SHA2-384
825,918 UART: [kat] SHA2-512-ACC
828,298 UART: [kat] ECC-384
3,109,557 UART: [kat] HMAC-384Kdf
3,121,470 UART: [kat] LMS
4,311,580 UART: [kat] --
4,315,321 UART: [cold-reset] ++
4,317,835 UART: [fht] Storing FHT @ 0x50003400
4,329,251 UART: [idev] ++
4,329,828 UART: [idev] CDI.KEYID = 6
4,330,790 UART: [idev] SUBJECT.KEYID = 7
4,332,037 UART: [idev] UDS.KEYID = 0
4,332,996 ready_for_fw is high
4,333,203 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,560 UART: [idev] Erasing UDS.KEYID = 0
7,619,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,378 UART: [idev] --
7,645,062 UART: [ldev] ++
7,645,647 UART: [ldev] CDI.KEYID = 6
7,646,559 UART: [ldev] SUBJECT.KEYID = 5
7,647,775 UART: [ldev] AUTHORITY.KEYID = 7
7,649,063 UART: [ldev] FE.KEYID = 1
7,659,933 UART: [ldev] Erasing FE.KEYID = 1
10,946,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,399 UART: [ldev] --
13,304,390 UART: [fwproc] Waiting for Commands...
13,306,605 UART: [fwproc] Received command 0x46574c44
13,308,796 UART: [fwproc] Received Image of size 114124 bytes
17,361,225 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,648 >>> mbox cmd response: success
17,826,594 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,827,635 UART: [afmc] ++
17,828,148 UART: [afmc] CDI.KEYID = 6
17,829,227 UART: [afmc] SUBJECT.KEYID = 7
17,830,386 UART: [afmc] AUTHORITY.KEYID = 5
21,145,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,822 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,189 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,022 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,463 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,760 UART: [afmc] --
23,511,432 UART: [cold-reset] --
23,514,753 UART: [state] Locking Datavault
23,519,736 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,439 UART: [state] Locking ICCM
23,522,781 UART: [exit] Launching FMC @ 0x40000130
23,531,123 UART:
23,531,355 UART: Running Caliptra FMC ...
23,532,457 UART:
23,532,619 UART: [state] CFI Enabled
23,540,588 UART: [fht] FMC Alias Private Key: 7
25,871,221 UART: [art] Extend RT PCRs Done
25,872,450 UART: [art] Lock RT PCRs Done
25,873,833 UART: [art] Populate DV Done
25,879,192 UART: [fht] FMC Alias Private Key: 7
25,880,885 UART: [art] Derive CDI
25,881,621 UART: [art] Store in in slot 0x4
25,923,910 UART: [art] Derive Key Pair
25,924,910 UART: [art] Store priv key in slot 0x5
29,167,646 UART: [art] Derive Key Pair - Done
29,180,733 UART: [art] Signing Cert with AUTHO
29,182,050 UART: RITY.KEYID = 7
31,461,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,940 UART: [art] PUB.X = AB1B90CD0547EFFB24977B2E596293052A879D2DCEB8C12CC6EDD1EDF717765B91DA39277F9C8D8E1353FDD598D3D333
31,470,189 UART: [art] PUB.Y = 921A3264DF7B1D5CAAE7432E3C0DACE9B6B5A86B747C3A656F4B28D0BC9F8B3E66DD791F69523112DE3FEA5B0533F8A3
31,477,429 UART: [art] SIG.R = EBAE56CF9F2122686F2511AA394F1968F7930D7AE911467062DE8E5FB286C89E4BEEE956AEFA9D95A5FAA72AD0BAE4D0
31,484,849 UART: [art] SIG.S = 76181FBA326652E592AE723781C62E97B503F6721FB3EED618B2BC5A6C029D176628E0FAD426CB888AEC196247DA03F3
32,789,957 UART: Caliptra RT
32,791,115 UART: [state] CFI Enabled
32,907,176 UART: [rt] RT listening for mailbox commands...
32,938,454 UART: [rt]cmd =0x46505652, len=4
32,939,796 UART: [rt] FIPS Version
32,940,972 >>> mbox cmd response data (36 bytes)
32,941,855 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,971,668 UART: [rt]cmd =0x46504c54, len=4
32,973,203 >>> mbox cmd response data (8 bytes)
32,973,539 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,003,816 UART: [rt]cmd =0x46504c67, len=4
33,005,203 >>> mbox cmd response: failed
33,006,246 UART: [rt] FIPS self test
33,007,186 UART: [kat] ++
33,007,643 UART: [kat] sha1
33,012,051 UART: [kat] SHA2-256
33,013,859 UART: [kat] SHA2-384
33,016,915 UART: [kat] SHA2-512-ACC
33,019,165 UART: [kat] ECC-384
36,261,331 UART: [kat] HMAC-384Kdf
36,267,004 UART: [kat] LMS
36,677,263 UART: [kat] --
36,829,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,661,986 UART: [rt] Verify complete
40,852,212 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,881,790 UART: [rt]cmd =0x46504c67, len=4
40,883,215 >>> mbox cmd response data (8 bytes)
40,883,604 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,913,149 UART: [rt]cmd =0x49444543, len=4
40,920,058 >>> mbox cmd response data (37 bytes)
40,920,661 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,950,422 UART: [rt]cmd =0x49444549, len=4
40,953,183 >>> mbox cmd response data (104 bytes)
40,953,984 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,983,821 UART: [rt]cmd =0x49444550, len=4
40,994,266 >>> mbox cmd response data (8 bytes)
40,994,727 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,024,386 UART: [rt]cmd =0x4c444556, len=4
41,035,392 >>> mbox cmd response data (687 bytes)
41,038,914 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,068,763 UART: [rt]cmd =0x43455246, len=4
41,081,706 >>> mbox cmd response data (920 bytes)
41,086,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,115,929 UART: [rt]cmd =0x43455252, len=4
41,127,234 >>> mbox cmd response data (783 bytes)
41,131,952 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,163,472 UART: [rt]cmd =0x53494756, len=196
42,455,248 >>> mbox cmd response data (8 bytes)
42,455,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,486,325 UART: [rt]cmd =0x4d454153, len=108
42,504,881 >>> mbox cmd response data (12 bytes)
42,505,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,535,185 UART: [rt]cmd =0x494e464f, len=4
42,539,173 >>> mbox cmd response data (264 bytes)
42,541,554 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,571,686 UART: [rt]cmd =0x54514754, len=24
42,574,223 >>> mbox cmd response data (8 bytes)
42,574,554 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,604,440 UART: [rt]cmd =0x47544744, len=8
42,607,409 >>> mbox cmd response data (104 bytes)
42,608,391 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,638,155 UART: [rt]cmd =0x50435252, len=8
42,640,219 >>> mbox cmd response data (8 bytes)
42,640,630 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,670,586 UART: [rt]cmd =0x50435251, len=36
43,826,195 >>> mbox cmd response data (1848 bytes)
43,835,110 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,865,368 UART: [rt]cmd =0x50435245, len=56
43,868,444 >>> mbox cmd response data (8 bytes)
43,868,836 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,898,707 UART: [rt]cmd =0x44504543, len=20
43,919,100 >>> mbox cmd response data (44 bytes)
43,919,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,949,612 UART: [rt]cmd =0x44504543, len=24
43,975,729 >>> mbox cmd response data (40 bytes)
43,976,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,006,823 UART: [rt]cmd =0x44504543, len=96
44,043,775 >>> mbox cmd response data (56 bytes)
44,044,559 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,075,193 UART: [rt]cmd =0x44504543, len=92
52,056,363 >>> mbox cmd response data (6284 bytes)
52,085,514 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,116,522 UART: [rt]cmd =0x44504543, len=136
57,677,505 >>> mbox cmd response data (136 bytes)
57,678,728 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,708,885 UART: [rt]cmd =0x44504543, len=40
57,735,086 >>> mbox cmd response data (40 bytes)
57,735,819 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,765,687 UART: [rt]cmd =0x44504543, len=28
57,808,589 >>> mbox cmd response data (2076 bytes)
57,818,526 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,848,869 UART: [rt]cmd =0x44504543, len=36
57,878,198 >>> mbox cmd response data (24 bytes)
57,878,803 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
57,908,407 UART: [rt]cmd =0x4453424c, len=4
61,151,745 >>> mbox cmd response data (8 bytes)
61,152,238 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,181,736 UART: [rt]cmd =0x46505344, len=4
61,291,334 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
4,126,525 ready_for_fw is high
4,127,192 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,074 >>> mbox cmd response: success
18,072,202 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,708,936 UART:
23,709,323 UART: Running Caliptra FMC ...
23,710,454 UART:
23,710,609 UART: [state] CFI Enabled
23,718,112 UART: [fht] FMC Alias Private Key: 7
26,049,529 UART: [art] Extend RT PCRs Done
26,050,763 UART: [art] Lock RT PCRs Done
26,052,411 UART: [art] Populate DV Done
26,057,581 UART: [fht] FMC Alias Private Key: 7
26,059,293 UART: [art] Derive CDI
26,060,113 UART: [art] Store in in slot 0x4
26,102,773 UART: [art] Derive Key Pair
26,103,819 UART: [art] Store priv key in slot 0x5
29,346,337 UART: [art] Derive Key Pair - Done
29,359,234 UART: [art] Signing Cert with AUTHO
29,360,540 UART: RITY.KEYID = 7
31,640,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,609 UART: [art] PUB.X = 2125F196C5DBDCF7A866A25D68E81C4E251BA68276F6D3A8D7230AED1661E51057AFDAFF6ED3288BAF3B0CC80A97BDDF
31,648,862 UART: [art] PUB.Y = 3A550AD77D6160F4944C05A8381D8071AB8E4B9274FA9C705304B2CD2D1953B992050D46F69480B841E40DF3B78593B2
31,656,108 UART: [art] SIG.R = 868BB364B063E9B354EA64326C38B3A228887130A8D03A64BF48C02A12C84103210FC2B4BBD47494028F44099C8E9E93
31,663,476 UART: [art] SIG.S = D70588D13A7BB672476F95E9E8961F1186C54A5EB65AB8F71F67BA11546586C222114C8D6691847176EFF1985BEE07FB
32,968,693 UART: Caliptra RT
32,969,402 UART: [state] CFI Enabled
33,086,679 UART: [rt] RT listening for mailbox commands...
33,117,898 UART: [rt]cmd =0x46505652, len=4
33,119,194 UART: [rt] FIPS Version
33,120,404 >>> mbox cmd response data (36 bytes)
33,121,124 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,150,863 UART: [rt]cmd =0x46504c54, len=4
33,152,318 >>> mbox cmd response data (8 bytes)
33,152,663 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,182,742 UART: [rt]cmd =0x46504c67, len=4
33,184,140 >>> mbox cmd response: failed
33,185,168 UART: [rt] FIPS self test
33,186,147 UART: [kat] ++
33,186,595 UART: [kat] sha1
33,190,983 UART: [kat] SHA2-256
33,192,785 UART: [kat] SHA2-384
33,195,670 UART: [kat] SHA2-512-ACC
33,197,916 UART: [kat] ECC-384
36,440,297 UART: [kat] HMAC-384Kdf
36,446,177 UART: [kat] LMS
36,856,427 UART: [kat] --
36,987,579 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,819,814 UART: [rt] Verify complete
41,031,474 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,061,373 UART: [rt]cmd =0x46504c67, len=4
41,062,996 >>> mbox cmd response data (8 bytes)
41,063,368 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,093,015 UART: [rt]cmd =0x49444543, len=4
41,100,224 >>> mbox cmd response data (37 bytes)
41,100,810 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,130,540 UART: [rt]cmd =0x49444549, len=4
41,133,447 >>> mbox cmd response data (104 bytes)
41,134,251 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,163,939 UART: [rt]cmd =0x49444550, len=4
41,174,494 >>> mbox cmd response data (8 bytes)
41,174,897 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,204,489 UART: [rt]cmd =0x4c444556, len=4
41,215,536 >>> mbox cmd response data (687 bytes)
41,219,077 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,248,934 UART: [rt]cmd =0x43455246, len=4
41,261,908 >>> mbox cmd response data (920 bytes)
41,266,440 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,296,148 UART: [rt]cmd =0x43455252, len=4
41,307,424 >>> mbox cmd response data (784 bytes)
41,312,146 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,343,707 UART: [rt]cmd =0x53494756, len=196
42,635,269 >>> mbox cmd response data (8 bytes)
42,635,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,666,533 UART: [rt]cmd =0x4d454153, len=108
42,684,588 >>> mbox cmd response data (12 bytes)
42,685,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,714,554 UART: [rt]cmd =0x494e464f, len=4
42,718,670 >>> mbox cmd response data (264 bytes)
42,720,655 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,750,424 UART: [rt]cmd =0x54514754, len=24
42,753,157 >>> mbox cmd response data (8 bytes)
42,753,580 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,783,562 UART: [rt]cmd =0x47544744, len=8
42,786,595 >>> mbox cmd response data (104 bytes)
42,787,442 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,817,255 UART: [rt]cmd =0x50435252, len=8
42,819,249 >>> mbox cmd response data (8 bytes)
42,819,617 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,849,408 UART: [rt]cmd =0x50435251, len=36
44,004,878 >>> mbox cmd response data (1848 bytes)
44,013,979 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,044,292 UART: [rt]cmd =0x50435245, len=56
44,047,271 >>> mbox cmd response data (8 bytes)
44,047,726 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,077,459 UART: [rt]cmd =0x44504543, len=20
44,097,723 >>> mbox cmd response data (44 bytes)
44,098,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,128,320 UART: [rt]cmd =0x44504543, len=24
44,154,517 >>> mbox cmd response data (40 bytes)
44,155,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,185,567 UART: [rt]cmd =0x44504543, len=96
44,223,079 >>> mbox cmd response data (56 bytes)
44,223,870 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,254,415 UART: [rt]cmd =0x44504543, len=92
52,235,617 >>> mbox cmd response data (6284 bytes)
52,264,929 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,296,035 UART: [rt]cmd =0x44504543, len=136
57,858,030 >>> mbox cmd response data (136 bytes)
57,859,274 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,889,099 UART: [rt]cmd =0x44504543, len=40
57,915,042 >>> mbox cmd response data (40 bytes)
57,915,709 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,945,973 UART: [rt]cmd =0x44504543, len=28
57,988,623 >>> mbox cmd response data (2076 bytes)
57,998,526 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,028,498 UART: [rt]cmd =0x44504543, len=36
58,057,906 >>> mbox cmd response data (24 bytes)
58,058,477 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,088,063 UART: [rt]cmd =0x4453424c, len=4
61,331,434 >>> mbox cmd response data (8 bytes)
61,331,936 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,361,765 UART: [rt]cmd =0x46505344, len=4
61,471,393 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,121 UART:
192,560 UART: Running Caliptra ROM ...
193,711 UART:
193,862 UART: [state] CFI Enabled
262,960 UART: [state] LifecycleState = Unprovisioned
264,886 UART: [state] DebugLocked = No
266,104 UART: [state] WD Timer not started. Device not locked for debugging
269,781 UART: [kat] SHA2-256
448,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,471 UART: [kat] ++
461,025 UART: [kat] sha1
473,673 UART: [kat] SHA2-256
476,703 UART: [kat] SHA2-384
482,910 UART: [kat] SHA2-512-ACC
485,853 UART: [kat] ECC-384
2,946,727 UART: [kat] HMAC-384Kdf
2,971,543 UART: [kat] LMS
3,500,977 UART: [kat] --
3,505,124 UART: [cold-reset] ++
3,506,068 UART: [fht] FHT @ 0x50003400
3,517,979 UART: [idev] ++
3,518,545 UART: [idev] CDI.KEYID = 6
3,519,453 UART: [idev] SUBJECT.KEYID = 7
3,520,700 UART: [idev] UDS.KEYID = 0
3,521,624 ready_for_fw is high
3,521,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,905 UART: [idev] Erasing UDS.KEYID = 0
6,023,223 UART: [idev] Sha1 KeyId Algorithm
6,045,795 UART: [idev] --
6,049,231 UART: [ldev] ++
6,049,810 UART: [ldev] CDI.KEYID = 6
6,050,696 UART: [ldev] SUBJECT.KEYID = 5
6,051,914 UART: [ldev] AUTHORITY.KEYID = 7
6,053,152 UART: [ldev] FE.KEYID = 1
6,100,013 UART: [ldev] Erasing FE.KEYID = 1
8,606,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,266 UART: [ldev] --
10,412,939 UART: [fwproc] Wait for Commands...
10,415,864 UART: [fwproc] Recv command 0x46574c44
10,417,966 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,202 >>> mbox cmd response: success
14,290,097 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,290,990 UART: [afmc] ++
14,291,495 UART: [afmc] CDI.KEYID = 6
14,292,456 UART: [afmc] SUBJECT.KEYID = 7
14,293,582 UART: [afmc] AUTHORITY.KEYID = 5
16,827,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,219 UART: [afmc] --
18,628,048 UART: [cold-reset] --
18,633,374 UART: [state] Locking Datavault
18,637,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,454 UART: [state] Locking ICCM
18,641,983 UART: [exit] Launching FMC @ 0x40000130
18,650,389 UART:
18,650,626 UART: Running Caliptra FMC ...
18,651,725 UART:
18,651,881 UART: [state] CFI Enabled
18,709,889 UART: [fht] FMC Alias Private Key: 7
20,474,312 UART: [art] Extend RT PCRs Done
20,475,534 UART: [art] Lock RT PCRs Done
20,477,560 UART: [art] Populate DV Done
20,483,076 UART: [fht] FMC Alias Private Key: 7
20,484,688 UART: [art] Derive CDI
20,485,509 UART: [art] Store in in slot 0x4
20,542,146 UART: [art] Derive Key Pair
20,543,189 UART: [art] Store priv key in slot 0x5
23,005,791 UART: [art] Derive Key Pair - Done
23,019,060 UART: [art] Signing Cert with AUTHO
23,020,371 UART: RITY.KEYID = 7
24,732,248 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,756 UART: [art] PUB.X = B0CBB88F062799DBC2B0E9C197BA08E929A9CD59AE0699445D685D233C94FFF5E4727A460D7E75F123072C963010154F
24,741,013 UART: [art] PUB.Y = 1D1EF99443BDA9AB5E73E64AA7E877E5B40D2FBE22E308EADDD94391D0D7A25B79DC08128094DF3EEA1DBAB6D6B66BEC
24,748,314 UART: [art] SIG.R = 9F6F428759F69BFEA91A6D13E2BE0CD1925AC3A6511EE8BA69310B03085F7F5D1FF5E69F286A087333F0EE4718EE852F
24,755,715 UART: [art] SIG.S = E5CC594F2FF1440CBC51CF5B4922638E083CA6D649122876A945873C24BEC2D488839B9781823227A4D56EBE9455E1E2
25,734,306 UART: Caliptra RT
25,735,020 UART: [state] CFI Enabled
25,911,191 UART: [rt] RT listening for mailbox commands...
25,942,662 UART: [rt]cmd =0x46505652, len=4
25,943,926 UART: [rt] FIPS Version
25,944,974 >>> mbox cmd response data (36 bytes)
25,945,616 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,975,547 UART: [rt]cmd =0x46504c54, len=4
25,977,274 >>> mbox cmd response data (8 bytes)
25,977,620 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,008,342 UART: [rt]cmd =0x46504c67, len=4
26,009,642 >>> mbox cmd response: failed
26,010,710 UART: [rt] FIPS self test
26,011,587 UART: [kat] ++
26,012,035 UART: [kat] sha1
26,016,554 UART: [kat] SHA2-256
26,018,355 UART: [kat] SHA2-384
26,021,233 UART: [kat] SHA2-512-ACC
26,023,442 UART: [kat] ECC-384
28,461,274 UART: [kat] HMAC-384Kdf
28,467,649 UART: [kat] LMS
28,665,594 UART: [kat] --
28,819,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,002,653 UART: [rt] Verify complete
32,152,010 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,181,807 UART: [rt]cmd =0x46504c67, len=4
32,183,289 >>> mbox cmd response data (8 bytes)
32,183,631 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,213,394 UART: [rt]cmd =0x49444543, len=4
32,220,570 >>> mbox cmd response data (37 bytes)
32,221,155 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,250,917 UART: [rt]cmd =0x49444549, len=4
32,253,842 >>> mbox cmd response data (104 bytes)
32,254,637 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,284,320 UART: [rt]cmd =0x49444550, len=4
32,294,871 >>> mbox cmd response data (8 bytes)
32,295,334 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,324,935 UART: [rt]cmd =0x4c444556, len=4
32,335,911 >>> mbox cmd response data (687 bytes)
32,339,416 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,369,432 UART: [rt]cmd =0x43455246, len=4
32,382,126 >>> mbox cmd response data (887 bytes)
32,386,536 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,416,331 UART: [rt]cmd =0x43455252, len=4
32,427,575 >>> mbox cmd response data (784 bytes)
32,432,265 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,463,735 UART: [rt]cmd =0x53494756, len=196
33,429,421 >>> mbox cmd response data (8 bytes)
33,429,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,460,655 UART: [rt]cmd =0x4d454153, len=108
33,479,104 >>> mbox cmd response data (12 bytes)
33,479,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,509,138 UART: [rt]cmd =0x494e464f, len=4
33,513,255 >>> mbox cmd response data (264 bytes)
33,515,471 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,545,500 UART: [rt]cmd =0x54514754, len=24
33,548,095 >>> mbox cmd response data (8 bytes)
33,548,435 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,578,383 UART: [rt]cmd =0x47544744, len=8
33,581,185 >>> mbox cmd response data (104 bytes)
33,581,971 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,611,715 UART: [rt]cmd =0x50435252, len=8
33,613,678 >>> mbox cmd response data (8 bytes)
33,614,206 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,644,165 UART: [rt]cmd =0x50435251, len=36
34,562,723 >>> mbox cmd response data (1848 bytes)
34,571,648 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,602,030 UART: [rt]cmd =0x50435245, len=56
34,605,026 >>> mbox cmd response data (8 bytes)
34,605,472 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,635,111 UART: [rt]cmd =0x44504543, len=20
34,655,560 >>> mbox cmd response data (44 bytes)
34,656,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,686,249 UART: [rt]cmd =0x44504543, len=24
34,722,730 >>> mbox cmd response data (40 bytes)
34,723,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,753,881 UART: [rt]cmd =0x44504543, len=96
34,794,614 >>> mbox cmd response data (56 bytes)
34,795,403 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,826,038 UART: [rt]cmd =0x44504543, len=92
40,925,512 >>> mbox cmd response data (6284 bytes)
40,954,757 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,985,802 UART: [rt]cmd =0x44504543, len=136
45,213,389 >>> mbox cmd response data (136 bytes)
45,214,609 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,244,874 UART: [rt]cmd =0x44504543, len=40
45,281,435 >>> mbox cmd response data (40 bytes)
45,282,103 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,312,066 UART: [rt]cmd =0x44504543, len=28
45,354,777 >>> mbox cmd response data (2076 bytes)
45,364,698 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,394,714 UART: [rt]cmd =0x44504543, len=36
45,423,716 >>> mbox cmd response data (24 bytes)
45,424,319 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,454,251 UART: [rt]cmd =0x4453424c, len=4
47,924,446 >>> mbox cmd response data (8 bytes)
47,924,932 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,954,704 UART: [rt]cmd =0x46505344, len=4
48,064,752 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,398,884 ready_for_fw is high
3,399,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,087,553 >>> mbox cmd response: success
14,090,852 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,376,983 UART:
18,377,377 UART: Running Caliptra FMC ...
18,378,539 UART:
18,378,695 UART: [state] CFI Enabled
18,447,511 UART: [fht] FMC Alias Private Key: 7
20,211,745 UART: [art] Extend RT PCRs Done
20,212,958 UART: [art] Lock RT PCRs Done
20,214,880 UART: [art] Populate DV Done
20,220,228 UART: [fht] FMC Alias Private Key: 7
20,221,927 UART: [art] Derive CDI
20,222,686 UART: [art] Store in in slot 0x4
20,280,263 UART: [art] Derive Key Pair
20,281,332 UART: [art] Store priv key in slot 0x5
22,744,044 UART: [art] Derive Key Pair - Done
22,757,261 UART: [art] Signing Cert with AUTHO
22,758,560 UART: RITY.KEYID = 7
24,469,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,471,016 UART: [art] PUB.X = 473AC58E295B000EA8EF6525F2D4E4C18EA6ADD045E76983B778A545C5A0C05ABCD02CE330C8047FB99EA2F56C548BE4
24,478,300 UART: [art] PUB.Y = A7B12989FD89A3503732024E11E35C2FC678FEBB885DD4DEEA172CA98364AE92ECBECBA43D7AF3EA0122629F5FBE00B5
24,485,544 UART: [art] SIG.R = AC5C88C062B9C0B5571251377811AEBD04CAEE4A5EDAD8C1A2B8B036E73F6E4C8FDD1AAB0BF699E355D386357BFA82A2
24,492,938 UART: [art] SIG.S = D3B01178F6FC1650CEBD6D2518C76C4A500DB6796BF8437FA40E3D6C60E3AB3E67EDD74A823364A4799008F5523661FA
25,471,655 UART: Caliptra RT
25,472,366 UART: [state] CFI Enabled
25,637,160 UART: [rt] RT listening for mailbox commands...
25,668,658 UART: [rt]cmd =0x46505652, len=4
25,669,968 UART: [rt] FIPS Version
25,671,196 >>> mbox cmd response data (36 bytes)
25,671,832 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,701,829 UART: [rt]cmd =0x46504c54, len=4
25,703,346 >>> mbox cmd response data (8 bytes)
25,703,691 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,733,606 UART: [rt]cmd =0x46504c67, len=4
25,735,001 >>> mbox cmd response: failed
25,736,036 UART: [rt] FIPS self test
25,737,020 UART: [kat] ++
25,737,470 UART: [kat] sha1
25,741,824 UART: [kat] SHA2-256
25,743,653 UART: [kat] SHA2-384
25,746,539 UART: [kat] SHA2-512-ACC
25,748,783 UART: [kat] ECC-384
28,186,411 UART: [kat] HMAC-384Kdf
28,213,280 UART: [kat] LMS
28,411,226 UART: [kat] --
28,544,353 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,726,910 UART: [rt] Verify complete
31,876,897 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,906,902 UART: [rt]cmd =0x46504c67, len=4
31,908,382 >>> mbox cmd response data (8 bytes)
31,908,724 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,938,325 UART: [rt]cmd =0x49444543, len=4
31,945,226 >>> mbox cmd response data (37 bytes)
31,945,810 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,975,628 UART: [rt]cmd =0x49444549, len=4
31,978,337 >>> mbox cmd response data (104 bytes)
31,979,122 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,008,713 UART: [rt]cmd =0x49444550, len=4
32,019,161 >>> mbox cmd response data (8 bytes)
32,019,604 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,049,491 UART: [rt]cmd =0x4c444556, len=4
32,060,687 >>> mbox cmd response data (687 bytes)
32,064,196 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,093,899 UART: [rt]cmd =0x43455246, len=4
32,106,637 >>> mbox cmd response data (887 bytes)
32,111,045 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,140,843 UART: [rt]cmd =0x43455252, len=4
32,151,928 >>> mbox cmd response data (784 bytes)
32,156,623 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,188,095 UART: [rt]cmd =0x53494756, len=196
33,153,608 >>> mbox cmd response data (8 bytes)
33,154,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,184,658 UART: [rt]cmd =0x4d454153, len=108
33,202,027 >>> mbox cmd response data (12 bytes)
33,202,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,232,126 UART: [rt]cmd =0x494e464f, len=4
33,236,239 >>> mbox cmd response data (264 bytes)
33,238,540 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,268,458 UART: [rt]cmd =0x54514754, len=24
33,270,948 >>> mbox cmd response data (8 bytes)
33,271,361 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,300,927 UART: [rt]cmd =0x47544744, len=8
33,303,943 >>> mbox cmd response data (104 bytes)
33,304,814 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,334,779 UART: [rt]cmd =0x50435252, len=8
33,336,954 >>> mbox cmd response data (8 bytes)
33,337,367 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,367,435 UART: [rt]cmd =0x50435251, len=36
34,295,102 >>> mbox cmd response data (1848 bytes)
34,304,008 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,334,236 UART: [rt]cmd =0x50435245, len=56
34,337,505 >>> mbox cmd response data (8 bytes)
34,337,990 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,367,777 UART: [rt]cmd =0x44504543, len=20
34,388,346 >>> mbox cmd response data (44 bytes)
34,389,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,419,113 UART: [rt]cmd =0x44504543, len=24
34,455,055 >>> mbox cmd response data (40 bytes)
34,455,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,486,424 UART: [rt]cmd =0x44504543, len=96
34,525,478 >>> mbox cmd response data (56 bytes)
34,526,251 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,556,671 UART: [rt]cmd =0x44504543, len=92
40,655,900 >>> mbox cmd response data (6284 bytes)
40,684,980 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,716,186 UART: [rt]cmd =0x44504543, len=136
44,943,898 >>> mbox cmd response data (136 bytes)
44,945,114 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,975,360 UART: [rt]cmd =0x44504543, len=40
45,011,964 >>> mbox cmd response data (40 bytes)
45,012,641 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,042,603 UART: [rt]cmd =0x44504543, len=28
45,085,450 >>> mbox cmd response data (2076 bytes)
45,095,386 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,125,521 UART: [rt]cmd =0x44504543, len=36
45,154,467 >>> mbox cmd response data (24 bytes)
45,155,063 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,184,727 UART: [rt]cmd =0x4453424c, len=4
47,654,718 >>> mbox cmd response data (8 bytes)
47,655,213 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,685,040 UART: [rt]cmd =0x46505344, len=4
47,794,979 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,605 UART:
192,988 UART: Running Caliptra ROM ...
194,134 UART:
603,865 UART: [state] CFI Enabled
616,316 UART: [state] LifecycleState = Unprovisioned
618,194 UART: [state] DebugLocked = No
619,872 UART: [state] WD Timer not started. Device not locked for debugging
624,045 UART: [kat] SHA2-256
803,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,730 UART: [kat] ++
815,328 UART: [kat] sha1
826,567 UART: [kat] SHA2-256
829,580 UART: [kat] SHA2-384
835,730 UART: [kat] SHA2-512-ACC
838,672 UART: [kat] ECC-384
3,281,289 UART: [kat] HMAC-384Kdf
3,294,188 UART: [kat] LMS
3,823,667 UART: [kat] --
3,828,593 UART: [cold-reset] ++
3,830,881 UART: [fht] FHT @ 0x50003400
3,842,499 UART: [idev] ++
3,843,066 UART: [idev] CDI.KEYID = 6
3,844,102 UART: [idev] SUBJECT.KEYID = 7
3,845,209 UART: [idev] UDS.KEYID = 0
3,846,138 ready_for_fw is high
3,846,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,203 UART: [idev] Erasing UDS.KEYID = 0
6,315,992 UART: [idev] Sha1 KeyId Algorithm
6,339,451 UART: [idev] --
6,342,269 UART: [ldev] ++
6,342,840 UART: [ldev] CDI.KEYID = 6
6,343,752 UART: [ldev] SUBJECT.KEYID = 5
6,344,971 UART: [ldev] AUTHORITY.KEYID = 7
6,346,202 UART: [ldev] FE.KEYID = 1
6,356,526 UART: [ldev] Erasing FE.KEYID = 1
8,823,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,343 UART: [ldev] --
10,613,592 UART: [fwproc] Wait for Commands...
10,615,424 UART: [fwproc] Recv command 0x46574c44
10,617,519 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,292 >>> mbox cmd response: success
14,485,317 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,486,622 UART: [afmc] ++
14,487,211 UART: [afmc] CDI.KEYID = 6
14,488,123 UART: [afmc] SUBJECT.KEYID = 7
14,489,279 UART: [afmc] AUTHORITY.KEYID = 5
16,988,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,134 UART: [afmc] --
18,784,743 UART: [cold-reset] --
18,788,245 UART: [state] Locking Datavault
18,792,147 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,788 UART: [state] Locking ICCM
18,795,449 UART: [exit] Launching FMC @ 0x40000130
18,803,898 UART:
18,804,133 UART: Running Caliptra FMC ...
18,805,235 UART:
18,805,397 UART: [state] CFI Enabled
18,813,388 UART: [fht] FMC Alias Private Key: 7
20,569,934 UART: [art] Extend RT PCRs Done
20,571,154 UART: [art] Lock RT PCRs Done
20,572,965 UART: [art] Populate DV Done
20,578,426 UART: [fht] FMC Alias Private Key: 7
20,580,126 UART: [art] Derive CDI
20,580,942 UART: [art] Store in in slot 0x4
20,623,593 UART: [art] Derive Key Pair
20,624,651 UART: [art] Store priv key in slot 0x5
23,051,284 UART: [art] Derive Key Pair - Done
23,064,132 UART: [art] Signing Cert with AUTHO
23,065,439 UART: RITY.KEYID = 7
24,771,286 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,800 UART: [art] PUB.X = 9E9082C609EB89926085A19A3DC1520137B6A415EBE89D6A37E634B227693DECA5CE1821803B66DF31D992B828F330AE
24,780,067 UART: [art] PUB.Y = 781A4578E5CB168B0055646CA0ECC6163C973C5A46C917C5AAD4D1DD07C6FAE0257B908ADA0992A5E06608083C204445
24,787,313 UART: [art] SIG.R = 42000B396185E466B393E1197C59F7E9723155019616E906779C3762F322DCD8682C9F009E613EE28982C6EA043F0E48
24,794,606 UART: [art] SIG.S = 08FEE2F9847336A24B291639C69140BFDBE1C3478745F3B5DB51B2A9AFD8075F8656B5EA94CDC43CAE7C06B40778B3B0
25,773,643 UART: Caliptra RT
25,774,342 UART: [state] CFI Enabled
25,892,647 UART: [rt] RT listening for mailbox commands...
25,923,820 UART: [rt]cmd =0x46505652, len=4
25,925,121 UART: [rt] FIPS Version
25,926,546 >>> mbox cmd response data (36 bytes)
25,927,210 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,956,837 UART: [rt]cmd =0x46504c54, len=4
25,958,593 >>> mbox cmd response data (8 bytes)
25,958,921 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,988,854 UART: [rt]cmd =0x46504c67, len=4
25,990,347 >>> mbox cmd response: failed
25,991,474 UART: [rt] FIPS self test
25,992,414 UART: [kat] ++
25,992,868 UART: [kat] sha1
25,997,398 UART: [kat] SHA2-256
25,999,226 UART: [kat] SHA2-384
26,001,945 UART: [kat] SHA2-512-ACC
26,004,165 UART: [kat] ECC-384
28,431,327 UART: [kat] HMAC-384Kdf
28,437,159 UART: [kat] LMS
28,635,097 UART: [kat] --
28,788,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,970,493 UART: [rt] Verify complete
32,131,937 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,162,012 UART: [rt]cmd =0x46504c67, len=4
32,163,437 >>> mbox cmd response data (8 bytes)
32,163,777 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,193,533 UART: [rt]cmd =0x49444543, len=4
32,200,617 >>> mbox cmd response data (37 bytes)
32,201,200 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,230,975 UART: [rt]cmd =0x49444549, len=4
32,233,560 >>> mbox cmd response data (104 bytes)
32,234,440 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,264,039 UART: [rt]cmd =0x49444550, len=4
32,274,582 >>> mbox cmd response data (8 bytes)
32,274,972 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,304,569 UART: [rt]cmd =0x4c444556, len=4
32,315,469 >>> mbox cmd response data (687 bytes)
32,319,006 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,348,859 UART: [rt]cmd =0x43455246, len=4
32,361,779 >>> mbox cmd response data (887 bytes)
32,366,225 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,395,814 UART: [rt]cmd =0x43455252, len=4
32,407,112 >>> mbox cmd response data (782 bytes)
32,411,791 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,443,423 UART: [rt]cmd =0x53494756, len=196
33,408,831 >>> mbox cmd response data (8 bytes)
33,409,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,439,947 UART: [rt]cmd =0x4d454153, len=108
33,458,880 >>> mbox cmd response data (12 bytes)
33,459,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,488,855 UART: [rt]cmd =0x494e464f, len=4
33,492,784 >>> mbox cmd response data (264 bytes)
33,494,847 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,524,885 UART: [rt]cmd =0x54514754, len=24
33,527,325 >>> mbox cmd response data (8 bytes)
33,527,738 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,557,499 UART: [rt]cmd =0x47544744, len=8
33,560,149 >>> mbox cmd response data (104 bytes)
33,560,993 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,590,813 UART: [rt]cmd =0x50435252, len=8
33,592,911 >>> mbox cmd response data (8 bytes)
33,593,339 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,623,298 UART: [rt]cmd =0x50435251, len=36
34,530,937 >>> mbox cmd response data (1848 bytes)
34,539,855 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,569,895 UART: [rt]cmd =0x50435245, len=56
34,573,074 >>> mbox cmd response data (8 bytes)
34,573,522 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,603,356 UART: [rt]cmd =0x44504543, len=20
34,623,544 >>> mbox cmd response data (44 bytes)
34,624,238 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,654,081 UART: [rt]cmd =0x44504543, len=24
34,680,211 >>> mbox cmd response data (40 bytes)
34,680,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,711,311 UART: [rt]cmd =0x44504543, len=96
34,747,685 >>> mbox cmd response data (56 bytes)
34,748,426 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,778,971 UART: [rt]cmd =0x44504543, len=92
40,796,239 >>> mbox cmd response data (6284 bytes)
40,825,313 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,856,250 UART: [rt]cmd =0x44504543, len=136
45,027,299 >>> mbox cmd response data (136 bytes)
45,028,515 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,058,703 UART: [rt]cmd =0x44504543, len=40
45,084,602 >>> mbox cmd response data (40 bytes)
45,085,325 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,115,506 UART: [rt]cmd =0x44504543, len=28
45,158,390 >>> mbox cmd response data (2076 bytes)
45,168,456 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,198,496 UART: [rt]cmd =0x44504543, len=36
45,227,980 >>> mbox cmd response data (24 bytes)
45,228,535 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,258,414 UART: [rt]cmd =0x4453424c, len=4
47,685,217 >>> mbox cmd response data (8 bytes)
47,685,706 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,715,418 UART: [rt]cmd =0x46505344, len=4
47,825,179 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
3,700,895 ready_for_fw is high
3,701,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,583 >>> mbox cmd response: success
14,279,550 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,525,317 UART:
18,525,713 UART: Running Caliptra FMC ...
18,526,900 UART:
18,527,068 UART: [state] CFI Enabled
18,535,008 UART: [fht] FMC Alias Private Key: 7
20,292,458 UART: [art] Extend RT PCRs Done
20,293,687 UART: [art] Lock RT PCRs Done
20,295,292 UART: [art] Populate DV Done
20,300,552 UART: [fht] FMC Alias Private Key: 7
20,302,095 UART: [art] Derive CDI
20,302,886 UART: [art] Store in in slot 0x4
20,345,585 UART: [art] Derive Key Pair
20,346,624 UART: [art] Store priv key in slot 0x5
22,772,955 UART: [art] Derive Key Pair - Done
22,786,114 UART: [art] Signing Cert with AUTHO
22,787,425 UART: RITY.KEYID = 7
24,492,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,315 UART: [art] PUB.X = 47D664686071E6C2BF40EEF760C40DF64DCE9EC7F46503AC2ABD3ED896ABD2973A9775CC05B67F0C596A11CCFEA5BE58
24,501,578 UART: [art] PUB.Y = 86B06A9C889FE9BB42739D91FE1CD91E836348B040E4EC900DAE6DAFE02DC40973F512BF4C943D5895BC6DFCBFE55780
24,508,879 UART: [art] SIG.R = 035C5DEB7AECA1F1DA2FB512940B29DCC737B2375008FECC47810DE956605B88FC3E1F58C7ACF33FEE1D5C9847DA66BD
24,516,323 UART: [art] SIG.S = CB9AB381ECDE646C49AEAE13891C9B55A2CECC916EDB85E9EA5F8C51CD305BDE8158EAF3AC4D03CEB0F24748EB0DF782
25,495,139 UART: Caliptra RT
25,495,853 UART: [state] CFI Enabled
25,612,508 UART: [rt] RT listening for mailbox commands...
25,643,975 UART: [rt]cmd =0x46505652, len=4
25,645,224 UART: [rt] FIPS Version
25,646,616 >>> mbox cmd response data (36 bytes)
25,647,259 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,677,157 UART: [rt]cmd =0x46504c54, len=4
25,678,682 >>> mbox cmd response data (8 bytes)
25,679,022 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,709,373 UART: [rt]cmd =0x46504c67, len=4
25,710,767 >>> mbox cmd response: failed
25,711,865 UART: [rt] FIPS self test
25,712,847 UART: [kat] ++
25,713,300 UART: [kat] sha1
25,717,605 UART: [kat] SHA2-256
25,719,408 UART: [kat] SHA2-384
25,722,256 UART: [kat] SHA2-512-ACC
25,724,468 UART: [kat] ECC-384
28,151,431 UART: [kat] HMAC-384Kdf
28,157,246 UART: [kat] LMS
28,355,184 UART: [kat] --
28,488,498 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,671,810 UART: [rt] Verify complete
31,852,192 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,882,089 UART: [rt]cmd =0x46504c67, len=4
31,883,675 >>> mbox cmd response data (8 bytes)
31,884,063 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,913,771 UART: [rt]cmd =0x49444543, len=4
31,920,702 >>> mbox cmd response data (37 bytes)
31,921,354 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,950,962 UART: [rt]cmd =0x49444549, len=4
31,953,626 >>> mbox cmd response data (104 bytes)
31,954,493 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,984,091 UART: [rt]cmd =0x49444550, len=4
31,994,742 >>> mbox cmd response data (8 bytes)
31,995,135 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,025,099 UART: [rt]cmd =0x4c444556, len=4
32,036,165 >>> mbox cmd response data (687 bytes)
32,039,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,069,487 UART: [rt]cmd =0x43455246, len=4
32,082,199 >>> mbox cmd response data (887 bytes)
32,086,633 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,116,215 UART: [rt]cmd =0x43455252, len=4
32,127,722 >>> mbox cmd response data (783 bytes)
32,132,406 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,163,979 UART: [rt]cmd =0x53494756, len=196
33,129,420 >>> mbox cmd response data (8 bytes)
33,129,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,160,446 UART: [rt]cmd =0x4d454153, len=108
33,179,111 >>> mbox cmd response data (12 bytes)
33,179,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,209,199 UART: [rt]cmd =0x494e464f, len=4
33,213,039 >>> mbox cmd response data (264 bytes)
33,215,040 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,244,958 UART: [rt]cmd =0x54514754, len=24
33,247,284 >>> mbox cmd response data (8 bytes)
33,247,698 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,277,390 UART: [rt]cmd =0x47544744, len=8
33,280,137 >>> mbox cmd response data (104 bytes)
33,281,003 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,311,022 UART: [rt]cmd =0x50435252, len=8
33,313,196 >>> mbox cmd response data (8 bytes)
33,313,615 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,343,678 UART: [rt]cmd =0x50435251, len=36
34,251,115 >>> mbox cmd response data (1848 bytes)
34,260,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,290,521 UART: [rt]cmd =0x50435245, len=56
34,293,705 >>> mbox cmd response data (8 bytes)
34,294,158 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,324,058 UART: [rt]cmd =0x44504543, len=20
34,344,182 >>> mbox cmd response data (44 bytes)
34,344,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,374,834 UART: [rt]cmd =0x44504543, len=24
34,400,602 >>> mbox cmd response data (40 bytes)
34,401,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,431,837 UART: [rt]cmd =0x44504543, len=96
34,468,235 >>> mbox cmd response data (56 bytes)
34,468,974 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,499,649 UART: [rt]cmd =0x44504543, len=92
40,517,991 >>> mbox cmd response data (6284 bytes)
40,547,076 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,578,239 UART: [rt]cmd =0x44504543, len=136
44,750,213 >>> mbox cmd response data (136 bytes)
44,751,417 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,781,686 UART: [rt]cmd =0x44504543, len=40
44,807,731 >>> mbox cmd response data (40 bytes)
44,808,426 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
44,838,336 UART: [rt]cmd =0x44504543, len=28
44,880,911 >>> mbox cmd response data (2076 bytes)
44,890,827 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
44,921,109 UART: [rt]cmd =0x44504543, len=36
44,950,424 >>> mbox cmd response data (24 bytes)
44,950,982 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,980,549 UART: [rt]cmd =0x4453424c, len=4
47,408,450 >>> mbox cmd response data (8 bytes)
47,408,931 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,438,663 UART: [rt]cmd =0x46505344, len=4
47,548,866 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,109 UART:
192,540 UART: Running Caliptra ROM ...
193,662 UART:
193,811 UART: [state] CFI Enabled
262,608 UART: [state] LifecycleState = Unprovisioned
265,040 UART: [state] DebugLocked = No
266,614 UART: [state] WD Timer not started. Device not locked for debugging
270,521 UART: [kat] SHA2-256
460,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,111 UART: [kat] ++
471,561 UART: [kat] sha1
481,801 UART: [kat] SHA2-256
484,815 UART: [kat] SHA2-384
490,632 UART: [kat] SHA2-512-ACC
493,187 UART: [kat] ECC-384
2,946,096 UART: [kat] HMAC-384Kdf
2,970,967 UART: [kat] LMS
3,502,775 UART: [kat] --
3,507,212 UART: [cold-reset] ++
3,508,309 UART: [fht] FHT @ 0x50003400
3,520,428 UART: [idev] ++
3,521,142 UART: [idev] CDI.KEYID = 6
3,522,137 UART: [idev] SUBJECT.KEYID = 7
3,523,316 UART: [idev] UDS.KEYID = 0
3,524,243 ready_for_fw is high
3,524,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,571 UART: [idev] Erasing UDS.KEYID = 0
6,026,939 UART: [idev] Sha1 KeyId Algorithm
6,050,768 UART: [idev] --
6,056,603 UART: [ldev] ++
6,057,290 UART: [ldev] CDI.KEYID = 6
6,058,201 UART: [ldev] SUBJECT.KEYID = 5
6,059,364 UART: [ldev] AUTHORITY.KEYID = 7
6,060,596 UART: [ldev] FE.KEYID = 1
6,101,442 UART: [ldev] Erasing FE.KEYID = 1
8,611,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,862 UART: [ldev] --
10,415,457 UART: [fwproc] Wait for Commands...
10,417,397 UART: [fwproc] Recv command 0x46574c44
10,419,718 UART: [fwproc] Recv'd Img size: 114448 bytes
13,871,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,613,153 >>> mbox cmd response: success
14,616,127 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,617,157 UART: [afmc] ++
14,617,860 UART: [afmc] CDI.KEYID = 6
14,619,020 UART: [afmc] SUBJECT.KEYID = 7
14,620,564 UART: [afmc] AUTHORITY.KEYID = 5
17,154,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,950,276 UART: [afmc] --
18,954,296 UART: [cold-reset] --
18,957,670 UART: [state] Locking Datavault
18,961,997 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,141 UART: [state] Locking ICCM
18,965,966 UART: [exit] Launching FMC @ 0x40000130
18,974,624 UART:
18,974,869 UART: Running Caliptra FMC ...
18,975,970 UART:
18,976,131 UART: [state] CFI Enabled
19,033,805 UART: [fht] FMC Alias Private Key: 7
20,797,400 UART: [art] Extend RT PCRs Done
20,798,631 UART: [art] Lock RT PCRs Done
20,800,336 UART: [art] Populate DV Done
20,805,657 UART: [fht] FMC Alias Private Key: 7
20,807,205 UART: [art] Derive CDI
20,808,140 UART: [art] Store in in slot 0x4
20,865,818 UART: [art] Derive Key Pair
20,866,824 UART: [art] Store priv key in slot 0x5
23,329,638 UART: [art] Derive Key Pair - Done
23,342,740 UART: [art] Signing Cert with AUTHO
23,344,044 UART: RITY.KEYID = 7
25,054,756 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,265 UART: [art] PUB.X = 17986B85391CCFA5CBD8321103EECB15C2625BFAD718BF43129A9E32C23E7245192552F125249FF7B917C2134205C36B
25,063,559 UART: [art] PUB.Y = 59CF5244645E71D7410523A7DC6195DF40F069848C47F7E8C3FBDC387AA8D5431CBF891E026ECFBE43CA25FB9CB3F9F6
25,070,825 UART: [art] SIG.R = 718FEEF28F79988B069C0B0BA2C32DCD2E266FF8385406BBFB2FB3B776014BCB6297D3DE587BCD91C30C202425464DD7
25,078,207 UART: [art] SIG.S = 26B6BAB87F7A0A9002164A2B529D536E7938B23AB5C6D046012B571A649D17CB444B98D67697B0DD7315A6F9DF3F8653
26,057,227 UART: Caliptra RT
26,057,925 UART: [state] CFI Enabled
26,223,332 UART: [rt] RT listening for mailbox commands...
26,254,682 UART: [rt]cmd =0x46505652, len=4
26,256,017 UART: [rt] FIPS Version
26,257,452 >>> mbox cmd response data (36 bytes)
26,258,134 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,287,966 UART: [rt]cmd =0x46504c54, len=4
26,289,558 >>> mbox cmd response data (8 bytes)
26,289,905 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,319,767 UART: [rt]cmd =0x46504c67, len=4
26,321,102 >>> mbox cmd response: failed
26,322,335 UART: [rt] FIPS self test
26,323,268 UART: [kat] ++
26,323,712 UART: [kat] sha1
26,327,973 UART: [kat] SHA2-256
26,329,776 UART: [kat] SHA2-384
26,332,705 UART: [kat] SHA2-512-ACC
26,334,954 UART: [kat] ECC-384
28,771,981 UART: [kat] HMAC-384Kdf
28,798,474 UART: [kat] LMS
28,996,407 UART: [kat] --
29,150,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,334,141 UART: [rt] Verify complete
32,463,722 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,493,620 UART: [rt]cmd =0x46504c67, len=4
32,495,188 >>> mbox cmd response data (8 bytes)
32,495,564 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,525,269 UART: [rt]cmd =0x49444543, len=4
32,532,462 >>> mbox cmd response data (37 bytes)
32,533,055 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,562,817 UART: [rt]cmd =0x49444549, len=4
32,565,582 >>> mbox cmd response data (104 bytes)
32,566,459 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,596,181 UART: [rt]cmd =0x49444550, len=4
32,606,726 >>> mbox cmd response data (8 bytes)
32,607,138 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,636,732 UART: [rt]cmd =0x4c444556, len=4
32,647,929 >>> mbox cmd response data (687 bytes)
32,651,478 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,681,221 UART: [rt]cmd =0x43455246, len=4
32,693,926 >>> mbox cmd response data (887 bytes)
32,698,326 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,728,148 UART: [rt]cmd =0x43455252, len=4
32,739,321 >>> mbox cmd response data (782 bytes)
32,744,036 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,775,433 UART: [rt]cmd =0x53494756, len=196
33,740,983 >>> mbox cmd response data (8 bytes)
33,741,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,772,104 UART: [rt]cmd =0x4d454153, len=108
33,790,530 >>> mbox cmd response data (12 bytes)
33,790,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,820,624 UART: [rt]cmd =0x494e464f, len=4
33,824,735 >>> mbox cmd response data (264 bytes)
33,827,044 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,856,936 UART: [rt]cmd =0x54514754, len=24
33,859,669 >>> mbox cmd response data (8 bytes)
33,860,014 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,889,829 UART: [rt]cmd =0x47544744, len=8
33,892,757 >>> mbox cmd response data (104 bytes)
33,893,564 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,923,191 UART: [rt]cmd =0x50435252, len=8
33,925,356 >>> mbox cmd response data (8 bytes)
33,925,684 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,955,674 UART: [rt]cmd =0x50435251, len=36
34,880,338 >>> mbox cmd response data (1848 bytes)
34,889,428 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,919,732 UART: [rt]cmd =0x50435245, len=56
34,922,870 >>> mbox cmd response data (8 bytes)
34,923,314 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,953,094 UART: [rt]cmd =0x44504543, len=20
34,973,458 >>> mbox cmd response data (44 bytes)
34,974,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,004,367 UART: [rt]cmd =0x44504543, len=24
35,040,282 >>> mbox cmd response data (40 bytes)
35,040,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,071,603 UART: [rt]cmd =0x44504543, len=96
35,110,951 >>> mbox cmd response data (56 bytes)
35,111,702 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,142,235 UART: [rt]cmd =0x44504543, len=92
41,241,576 >>> mbox cmd response data (6284 bytes)
41,270,662 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,301,925 UART: [rt]cmd =0x44504543, len=136
45,529,032 >>> mbox cmd response data (136 bytes)
45,530,225 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,560,211 UART: [rt]cmd =0x44504543, len=40
45,597,485 >>> mbox cmd response data (40 bytes)
45,598,145 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,628,072 UART: [rt]cmd =0x44504543, len=28
45,670,724 >>> mbox cmd response data (2076 bytes)
45,680,619 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,710,543 UART: [rt]cmd =0x44504543, len=36
45,739,730 >>> mbox cmd response data (24 bytes)
45,740,304 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,770,026 UART: [rt]cmd =0x4453424c, len=4
48,239,126 >>> mbox cmd response data (8 bytes)
48,239,616 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,269,227 UART: [rt]cmd =0x46505344, len=4
48,378,954 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,439,716 ready_for_fw is high
3,440,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,245 >>> mbox cmd response: success
14,741,618 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,026,374 UART:
19,026,781 UART: Running Caliptra FMC ...
19,027,960 UART:
19,028,122 UART: [state] CFI Enabled
19,096,148 UART: [fht] FMC Alias Private Key: 7
20,860,126 UART: [art] Extend RT PCRs Done
20,861,351 UART: [art] Lock RT PCRs Done
20,862,826 UART: [art] Populate DV Done
20,868,132 UART: [fht] FMC Alias Private Key: 7
20,869,831 UART: [art] Derive CDI
20,870,664 UART: [art] Store in in slot 0x4
20,928,513 UART: [art] Derive Key Pair
20,929,556 UART: [art] Store priv key in slot 0x5
23,392,236 UART: [art] Derive Key Pair - Done
23,405,335 UART: [art] Signing Cert with AUTHO
23,406,666 UART: RITY.KEYID = 7
25,118,044 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,560 UART: [art] PUB.X = 23E51F2D534F18057F67CD6D448D1C0F9F29DB787C314F70E8751AF78064AFF7CB607FB3F5D0890AA6B2B3CE3485AE5D
25,126,803 UART: [art] PUB.Y = F1080790FAA95C2F4843E3DB9D10DEC9B5CB399F661F3B8A1187FB2DF9A4B726FFB65A64CC747973AE8ACD2DA1A3E2D7
25,134,102 UART: [art] SIG.R = EA6E0F828D987B87A019F69CE5A213D721E13C856259EF93889F48AB3DF24EF600D9DBD25E2D75CCAE391328F1DE6FA1
25,141,470 UART: [art] SIG.S = B6AF67B0B3587FC38163AA089EC9D91775051CE48881A3685321C40A030275458C15B09621CD37D6B2F996BBD47FB04F
26,120,651 UART: Caliptra RT
26,121,365 UART: [state] CFI Enabled
26,291,090 UART: [rt] RT listening for mailbox commands...
26,322,562 UART: [rt]cmd =0x46505652, len=4
26,323,813 UART: [rt] FIPS Version
26,325,198 >>> mbox cmd response data (36 bytes)
26,325,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,675 UART: [rt]cmd =0x46504c54, len=4
26,357,262 >>> mbox cmd response data (8 bytes)
26,357,592 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,387,730 UART: [rt]cmd =0x46504c67, len=4
26,389,112 >>> mbox cmd response: failed
26,390,014 UART: [rt] FIPS self test
26,390,940 UART: [kat] ++
26,391,385 UART: [kat] sha1
26,395,566 UART: [kat] SHA2-256
26,397,405 UART: [kat] SHA2-384
26,400,213 UART: [kat] SHA2-512-ACC
26,402,422 UART: [kat] ECC-384
28,839,336 UART: [kat] HMAC-384Kdf
28,866,147 UART: [kat] LMS
29,064,059 UART: [kat] --
29,198,060 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,380,234 UART: [rt] Verify complete
32,531,390 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,561,289 UART: [rt]cmd =0x46504c67, len=4
32,562,817 >>> mbox cmd response data (8 bytes)
32,563,175 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,592,874 UART: [rt]cmd =0x49444543, len=4
32,599,859 >>> mbox cmd response data (37 bytes)
32,600,450 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,630,010 UART: [rt]cmd =0x49444549, len=4
32,632,870 >>> mbox cmd response data (104 bytes)
32,633,672 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,663,510 UART: [rt]cmd =0x49444550, len=4
32,674,162 >>> mbox cmd response data (8 bytes)
32,674,556 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,704,226 UART: [rt]cmd =0x4c444556, len=4
32,715,506 >>> mbox cmd response data (687 bytes)
32,719,019 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,749,033 UART: [rt]cmd =0x43455246, len=4
32,761,858 >>> mbox cmd response data (887 bytes)
32,766,320 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,796,171 UART: [rt]cmd =0x43455252, len=4
32,807,369 >>> mbox cmd response data (784 bytes)
32,812,053 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,843,521 UART: [rt]cmd =0x53494756, len=196
33,808,908 >>> mbox cmd response data (8 bytes)
33,809,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,840,084 UART: [rt]cmd =0x4d454153, len=108
33,857,994 >>> mbox cmd response data (12 bytes)
33,858,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,888,344 UART: [rt]cmd =0x494e464f, len=4
33,892,230 >>> mbox cmd response data (264 bytes)
33,894,547 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,924,410 UART: [rt]cmd =0x54514754, len=24
33,926,897 >>> mbox cmd response data (8 bytes)
33,927,311 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,956,754 UART: [rt]cmd =0x47544744, len=8
33,959,408 >>> mbox cmd response data (104 bytes)
33,960,261 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,989,997 UART: [rt]cmd =0x50435252, len=8
33,991,771 >>> mbox cmd response data (8 bytes)
33,992,109 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,022,065 UART: [rt]cmd =0x50435251, len=36
34,948,705 >>> mbox cmd response data (1848 bytes)
34,957,684 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,987,959 UART: [rt]cmd =0x50435245, len=56
34,991,030 >>> mbox cmd response data (8 bytes)
34,991,505 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,021,316 UART: [rt]cmd =0x44504543, len=20
35,041,652 >>> mbox cmd response data (44 bytes)
35,042,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,072,486 UART: [rt]cmd =0x44504543, len=24
35,108,783 >>> mbox cmd response data (40 bytes)
35,109,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,139,848 UART: [rt]cmd =0x44504543, len=96
35,178,794 >>> mbox cmd response data (56 bytes)
35,179,564 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,209,983 UART: [rt]cmd =0x44504543, len=92
41,314,370 >>> mbox cmd response data (6284 bytes)
41,343,613 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,374,726 UART: [rt]cmd =0x44504543, len=136
45,603,205 >>> mbox cmd response data (136 bytes)
45,604,479 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,634,628 UART: [rt]cmd =0x44504543, len=40
45,672,142 >>> mbox cmd response data (40 bytes)
45,672,838 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,702,965 UART: [rt]cmd =0x44504543, len=28
45,745,650 >>> mbox cmd response data (2076 bytes)
45,755,579 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,785,656 UART: [rt]cmd =0x44504543, len=36
45,815,145 >>> mbox cmd response data (24 bytes)
45,815,751 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,845,415 UART: [rt]cmd =0x4453424c, len=4
48,316,058 >>> mbox cmd response data (8 bytes)
48,316,549 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,346,372 UART: [rt]cmd =0x46505344, len=4
48,456,293 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,514 writing to cptra_bootfsm_go
192,907 UART:
193,263 UART: Running Caliptra ROM ...
194,423 UART:
604,023 UART: [state] CFI Enabled
617,894 UART: [state] LifecycleState = Unprovisioned
620,283 UART: [state] DebugLocked = No
622,329 UART: [state] WD Timer not started. Device not locked for debugging
626,432 UART: [kat] SHA2-256
816,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,081 UART: [kat] ++
827,607 UART: [kat] sha1
839,123 UART: [kat] SHA2-256
842,141 UART: [kat] SHA2-384
846,999 UART: [kat] SHA2-512-ACC
849,584 UART: [kat] ECC-384
3,292,022 UART: [kat] HMAC-384Kdf
3,303,971 UART: [kat] LMS
3,835,771 UART: [kat] --
3,841,772 UART: [cold-reset] ++
3,844,208 UART: [fht] FHT @ 0x50003400
3,854,336 UART: [idev] ++
3,855,063 UART: [idev] CDI.KEYID = 6
3,855,979 UART: [idev] SUBJECT.KEYID = 7
3,857,228 UART: [idev] UDS.KEYID = 0
3,858,156 ready_for_fw is high
3,858,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,002,091 UART: [idev] Erasing UDS.KEYID = 0
6,334,428 UART: [idev] Sha1 KeyId Algorithm
6,357,496 UART: [idev] --
6,363,279 UART: [ldev] ++
6,363,963 UART: [ldev] CDI.KEYID = 6
6,364,873 UART: [ldev] SUBJECT.KEYID = 5
6,366,032 UART: [ldev] AUTHORITY.KEYID = 7
6,367,268 UART: [ldev] FE.KEYID = 1
6,378,342 UART: [ldev] Erasing FE.KEYID = 1
8,851,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,354 UART: [ldev] --
10,643,037 UART: [fwproc] Wait for Commands...
10,645,518 UART: [fwproc] Recv command 0x46574c44
10,647,837 UART: [fwproc] Recv'd Img size: 114448 bytes
14,093,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,828,444 >>> mbox cmd response: success
14,831,292 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,832,532 UART: [afmc] ++
14,833,239 UART: [afmc] CDI.KEYID = 6
14,834,423 UART: [afmc] SUBJECT.KEYID = 7
14,835,916 UART: [afmc] AUTHORITY.KEYID = 5
17,341,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,013 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,351 UART: [afmc] --
19,140,624 UART: [cold-reset] --
19,145,461 UART: [state] Locking Datavault
19,150,605 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,736 UART: [state] Locking ICCM
19,155,697 UART: [exit] Launching FMC @ 0x40000130
19,164,364 UART:
19,164,606 UART: Running Caliptra FMC ...
19,165,712 UART:
19,165,871 UART: [state] CFI Enabled
19,174,097 UART: [fht] FMC Alias Private Key: 7
20,931,474 UART: [art] Extend RT PCRs Done
20,932,692 UART: [art] Lock RT PCRs Done
20,934,557 UART: [art] Populate DV Done
20,940,076 UART: [fht] FMC Alias Private Key: 7
20,941,616 UART: [art] Derive CDI
20,942,375 UART: [art] Store in in slot 0x4
20,985,452 UART: [art] Derive Key Pair
20,986,492 UART: [art] Store priv key in slot 0x5
23,413,186 UART: [art] Derive Key Pair - Done
23,426,344 UART: [art] Signing Cert with AUTHO
23,427,681 UART: RITY.KEYID = 7
25,133,369 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,872 UART: [art] PUB.X = 6CD010A58F58F5DA2EF80ACE9BD4B6A161C1E59C9B86294AE6DDDDF901496B6CA3EE306B219EEA01F5672B82505D34E9
25,142,125 UART: [art] PUB.Y = 62FFD35AD6FF9E93B75CD3F74CFEFEB1137109DFF48F70865471DFDD5D1B46BB040A7AEBE8963544E08A64A4FCB389AA
25,149,409 UART: [art] SIG.R = 117EBD15941FF7E920AF822978EB675FED540811BD39B611AF53F78E1DF3518B2F6E059C434161E3851174F1BCF45173
25,156,816 UART: [art] SIG.S = D683AF16219A6121AF4C112C3D7991A313B904EC99AD384029E428F22B0661CC6C504D154FC75E4A0A65763EAC09F787
26,135,770 UART: Caliptra RT
26,136,458 UART: [state] CFI Enabled
26,253,686 UART: [rt] RT listening for mailbox commands...
26,284,795 UART: [rt]cmd =0x46505652, len=4
26,286,098 UART: [rt] FIPS Version
26,287,473 >>> mbox cmd response data (36 bytes)
26,288,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,317,711 UART: [rt]cmd =0x46504c54, len=4
26,319,441 >>> mbox cmd response data (8 bytes)
26,319,780 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,349,528 UART: [rt]cmd =0x46504c67, len=4
26,350,817 >>> mbox cmd response: failed
26,351,849 UART: [rt] FIPS self test
26,352,717 UART: [kat] ++
26,353,157 UART: [kat] sha1
26,357,529 UART: [kat] SHA2-256
26,359,336 UART: [kat] SHA2-384
26,362,418 UART: [kat] SHA2-512-ACC
26,364,624 UART: [kat] ECC-384
28,791,891 UART: [kat] HMAC-384Kdf
28,797,894 UART: [kat] LMS
28,995,789 UART: [kat] --
29,149,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,332,558 UART: [rt] Verify complete
32,492,195 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,522,207 UART: [rt]cmd =0x46504c67, len=4
32,523,952 >>> mbox cmd response data (8 bytes)
32,524,293 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,554,057 UART: [rt]cmd =0x49444543, len=4
32,561,018 >>> mbox cmd response data (37 bytes)
32,561,607 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,591,227 UART: [rt]cmd =0x49444549, len=4
32,594,206 >>> mbox cmd response data (104 bytes)
32,594,998 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,624,623 UART: [rt]cmd =0x49444550, len=4
32,635,368 >>> mbox cmd response data (8 bytes)
32,635,787 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,665,275 UART: [rt]cmd =0x4c444556, len=4
32,676,189 >>> mbox cmd response data (687 bytes)
32,679,693 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,709,449 UART: [rt]cmd =0x43455246, len=4
32,722,234 >>> mbox cmd response data (887 bytes)
32,726,657 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,756,507 UART: [rt]cmd =0x43455252, len=4
32,767,969 >>> mbox cmd response data (783 bytes)
32,772,650 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,804,327 UART: [rt]cmd =0x53494756, len=196
33,769,727 >>> mbox cmd response data (8 bytes)
33,770,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,800,819 UART: [rt]cmd =0x4d454153, len=108
33,819,157 >>> mbox cmd response data (12 bytes)
33,819,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,849,188 UART: [rt]cmd =0x494e464f, len=4
33,853,230 >>> mbox cmd response data (264 bytes)
33,855,460 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,885,432 UART: [rt]cmd =0x54514754, len=24
33,888,294 >>> mbox cmd response data (8 bytes)
33,888,626 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,918,296 UART: [rt]cmd =0x47544744, len=8
33,921,474 >>> mbox cmd response data (104 bytes)
33,922,343 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,951,946 UART: [rt]cmd =0x50435252, len=8
33,954,218 >>> mbox cmd response data (8 bytes)
33,954,564 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,984,678 UART: [rt]cmd =0x50435251, len=36
34,892,499 >>> mbox cmd response data (1848 bytes)
34,901,432 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,931,752 UART: [rt]cmd =0x50435245, len=56
34,935,043 >>> mbox cmd response data (8 bytes)
34,935,496 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,965,248 UART: [rt]cmd =0x44504543, len=20
34,985,639 >>> mbox cmd response data (44 bytes)
34,986,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,016,336 UART: [rt]cmd =0x44504543, len=24
35,042,860 >>> mbox cmd response data (40 bytes)
35,043,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,074,043 UART: [rt]cmd =0x44504543, len=96
35,110,295 >>> mbox cmd response data (56 bytes)
35,111,061 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,141,824 UART: [rt]cmd =0x44504543, len=92
41,160,079 >>> mbox cmd response data (6284 bytes)
41,189,325 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,220,426 UART: [rt]cmd =0x44504543, len=136
45,391,817 >>> mbox cmd response data (136 bytes)
45,393,036 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,423,022 UART: [rt]cmd =0x44504543, len=40
45,449,238 >>> mbox cmd response data (40 bytes)
45,449,930 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,479,941 UART: [rt]cmd =0x44504543, len=28
45,522,566 >>> mbox cmd response data (2076 bytes)
45,532,492 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,562,778 UART: [rt]cmd =0x44504543, len=36
45,592,209 >>> mbox cmd response data (24 bytes)
45,592,805 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,622,517 UART: [rt]cmd =0x4453424c, len=4
48,049,930 >>> mbox cmd response data (8 bytes)
48,050,439 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,080,390 UART: [rt]cmd =0x46505344, len=4
48,189,948 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,758,632 ready_for_fw is high
3,759,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,959,816 >>> mbox cmd response: success
14,962,851 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,216,988 UART:
19,217,370 UART: Running Caliptra FMC ...
19,218,598 UART:
19,218,764 UART: [state] CFI Enabled
19,227,011 UART: [fht] FMC Alias Private Key: 7
20,983,934 UART: [art] Extend RT PCRs Done
20,985,182 UART: [art] Lock RT PCRs Done
20,986,885 UART: [art] Populate DV Done
20,992,357 UART: [fht] FMC Alias Private Key: 7
20,993,904 UART: [art] Derive CDI
20,994,641 UART: [art] Store in in slot 0x4
21,036,865 UART: [art] Derive Key Pair
21,037,906 UART: [art] Store priv key in slot 0x5
23,464,860 UART: [art] Derive Key Pair - Done
23,477,856 UART: [art] Signing Cert with AUTHO
23,479,852 UART: RITY.KEYID = 7
25,184,630 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,148 UART: [art] PUB.X = 4089E18E45C8B520BFEB2D9C698F15EE3AF4697C2F033881297DEF1A9A8A72555FD3DF5A7DF30B590359461B52EAF9F9
25,193,400 UART: [art] PUB.Y = 55C0510110406DA4198B284A1FB9667A19D8E3C9252861E412C6A8EB465E8BC61664C05353C7C4CA8CF8E91CC9E51955
25,200,639 UART: [art] SIG.R = 87AA00BF3D88568815588E872C0B7B32F289CFD11A504E338B73F2A304F0E7F6525B4923460ADCB94E61F107F0424DE0
25,207,991 UART: [art] SIG.S = 01B00B7A85260A6621AE9212647A2555B51FEC1BD89107E99687909E6538D365DC2F5F183A2ED5D11F025AACC908BBE0
26,187,188 UART: Caliptra RT
26,187,900 UART: [state] CFI Enabled
26,306,255 UART: [rt] RT listening for mailbox commands...
26,337,616 UART: [rt]cmd =0x46505652, len=4
26,338,921 UART: [rt] FIPS Version
26,340,075 >>> mbox cmd response data (36 bytes)
26,340,780 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,370,592 UART: [rt]cmd =0x46504c54, len=4
26,372,042 >>> mbox cmd response data (8 bytes)
26,372,385 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,401,811 UART: [rt]cmd =0x46504c67, len=4
26,403,214 >>> mbox cmd response: failed
26,404,653 UART: [rt] FIPS self test
26,405,641 UART: [kat] ++
26,406,096 UART: [kat] sha1
26,410,271 UART: [kat] SHA2-256
26,412,103 UART: [kat] SHA2-384
26,414,836 UART: [kat] SHA2-512-ACC
26,417,086 UART: [kat] ECC-384
28,844,566 UART: [kat] HMAC-384Kdf
28,850,471 UART: [kat] LMS
29,048,407 UART: [kat] --
29,182,368 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,365,913 UART: [rt] Verify complete
32,545,498 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,575,136 UART: [rt]cmd =0x46504c67, len=4
32,576,721 >>> mbox cmd response data (8 bytes)
32,577,080 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,606,801 UART: [rt]cmd =0x49444543, len=4
32,613,926 >>> mbox cmd response data (37 bytes)
32,614,542 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,644,253 UART: [rt]cmd =0x49444549, len=4
32,647,076 >>> mbox cmd response data (104 bytes)
32,647,976 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,677,769 UART: [rt]cmd =0x49444550, len=4
32,688,194 >>> mbox cmd response data (8 bytes)
32,688,601 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,718,410 UART: [rt]cmd =0x4c444556, len=4
32,729,704 >>> mbox cmd response data (687 bytes)
32,733,203 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,762,788 UART: [rt]cmd =0x43455246, len=4
32,775,603 >>> mbox cmd response data (887 bytes)
32,780,013 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,809,990 UART: [rt]cmd =0x43455252, len=4
32,821,346 >>> mbox cmd response data (783 bytes)
32,826,050 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,857,639 UART: [rt]cmd =0x53494756, len=196
33,823,074 >>> mbox cmd response data (8 bytes)
33,823,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,854,057 UART: [rt]cmd =0x4d454153, len=108
33,872,883 >>> mbox cmd response data (12 bytes)
33,873,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,902,913 UART: [rt]cmd =0x494e464f, len=4
33,906,788 >>> mbox cmd response data (264 bytes)
33,908,834 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,938,961 UART: [rt]cmd =0x54514754, len=24
33,941,554 >>> mbox cmd response data (8 bytes)
33,941,971 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,971,922 UART: [rt]cmd =0x47544744, len=8
33,974,993 >>> mbox cmd response data (104 bytes)
33,975,857 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,005,677 UART: [rt]cmd =0x50435252, len=8
34,007,961 >>> mbox cmd response data (8 bytes)
34,008,376 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,038,339 UART: [rt]cmd =0x50435251, len=36
34,946,239 >>> mbox cmd response data (1848 bytes)
34,955,159 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,985,475 UART: [rt]cmd =0x50435245, len=56
34,988,658 >>> mbox cmd response data (8 bytes)
34,989,097 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,018,956 UART: [rt]cmd =0x44504543, len=20
35,039,398 >>> mbox cmd response data (44 bytes)
35,040,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,069,831 UART: [rt]cmd =0x44504543, len=24
35,096,249 >>> mbox cmd response data (40 bytes)
35,096,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,127,167 UART: [rt]cmd =0x44504543, len=96
35,164,439 >>> mbox cmd response data (56 bytes)
35,165,217 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,196,013 UART: [rt]cmd =0x44504543, len=92
41,214,150 >>> mbox cmd response data (6284 bytes)
41,243,440 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,274,442 UART: [rt]cmd =0x44504543, len=136
45,446,606 >>> mbox cmd response data (136 bytes)
45,447,796 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,477,705 UART: [rt]cmd =0x44504543, len=40
45,504,118 >>> mbox cmd response data (40 bytes)
45,504,796 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,534,536 UART: [rt]cmd =0x44504543, len=28
45,577,540 >>> mbox cmd response data (2076 bytes)
45,587,472 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,617,592 UART: [rt]cmd =0x44504543, len=36
45,647,244 >>> mbox cmd response data (24 bytes)
45,647,850 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,677,400 UART: [rt]cmd =0x4453424c, len=4
48,105,308 >>> mbox cmd response data (8 bytes)
48,105,805 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,135,640 UART: [rt]cmd =0x46505344, len=4
48,245,413 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,087 UART: [kat] SHA2-256
892,025 UART: [kat] SHA2-384
894,718 UART: [kat] SHA2-512-ACC
896,619 UART: [kat] ECC-384
901,956 UART: [kat] HMAC-384Kdf
906,656 UART: [kat] LMS
1,474,852 UART: [kat] --
1,475,757 UART: [cold-reset] ++
1,476,217 UART: [fht] Storing FHT @ 0x50003400
1,478,930 UART: [idev] ++
1,479,098 UART: [idev] CDI.KEYID = 6
1,479,458 UART: [idev] SUBJECT.KEYID = 7
1,479,882 UART: [idev] UDS.KEYID = 0
1,480,227 ready_for_fw is high
1,480,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,700 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,403 UART: [ldev] ++
1,514,571 UART: [ldev] CDI.KEYID = 6
1,514,934 UART: [ldev] SUBJECT.KEYID = 5
1,515,360 UART: [ldev] AUTHORITY.KEYID = 7
1,515,823 UART: [ldev] FE.KEYID = 1
1,520,785 UART: [ldev] Erasing FE.KEYID = 1
1,546,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,740 UART: [ldev] --
1,585,081 UART: [fwproc] Waiting for Commands...
1,585,944 UART: [fwproc] Received command 0x46574c44
1,586,735 UART: [fwproc] Received Image of size 114448 bytes
2,885,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,319 >>> mbox cmd response: success
3,077,319 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,445 UART: [afmc] ++
3,078,613 UART: [afmc] CDI.KEYID = 6
3,078,975 UART: [afmc] SUBJECT.KEYID = 7
3,079,400 UART: [afmc] AUTHORITY.KEYID = 5
3,114,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,960 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,650 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,529 UART: [afmc] --
3,157,549 UART: [cold-reset] --
3,158,399 UART: [state] Locking Datavault
3,159,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,110 UART: [state] Locking ICCM
3,160,648 UART: [exit] Launching FMC @ 0x40000130
3,165,977 UART:
3,165,993 UART: Running Caliptra FMC ...
3,166,401 UART:
3,166,455 UART: [state] CFI Enabled
3,176,746 UART: [fht] FMC Alias Private Key: 7
3,284,029 UART: [art] Extend RT PCRs Done
3,284,457 UART: [art] Lock RT PCRs Done
3,286,001 UART: [art] Populate DV Done
3,294,146 UART: [fht] FMC Alias Private Key: 7
3,295,278 UART: [art] Derive CDI
3,295,558 UART: [art] Store in in slot 0x4
3,381,257 UART: [art] Derive Key Pair
3,381,617 UART: [art] Store priv key in slot 0x5
3,395,261 UART: [art] Derive Key Pair - Done
3,410,205 UART: [art] Signing Cert with AUTHO
3,410,685 UART: RITY.KEYID = 7
3,425,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,626 UART: [art] PUB.X = 87B05EE3D692F3B187D8820B411B65192826084D4566682846830A15607A7FE2BBF811A465A9B90FAB852781A9ED020C
3,433,370 UART: [art] PUB.Y = 79CC92E6327BFC2FEA0195EF09E4CA9A900AB74FB5D8353EEEC1F0C7E7A98609AE6245AE22F9B98645D1F715BE7AF79B
3,440,328 UART: [art] SIG.R = 68B051D546B550CCB21437687BF9380E27843793F7E7C869B1CEA899DB4303D902174DEDDCBB0910F20060221122991C
3,447,058 UART: [art] SIG.S = 7A2F99918DFF46F5090D55FC1909884B1B2C24A136FC1E19445FB6DC6A0CF3BDF59B4B209C9766BD1D50583E77432D45
3,471,123 UART: Caliptra RT
3,471,376 UART: [state] CFI Enabled
3,579,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,404 UART: [rt]cmd =0x46505652, len=4
3,611,075 UART: [rt] FIPS Version
3,612,114 >>> mbox cmd response data (36 bytes)
3,612,115 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,660 UART: [rt]cmd =0x46504c54, len=4
3,642,769 >>> mbox cmd response data (8 bytes)
3,642,770 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,672,451 UART: [rt]cmd =0x46504c67, len=4
3,673,314 >>> mbox cmd response: failed
3,673,512 UART: [rt] FIPS self test
3,673,843 UART: [kat] ++
3,673,995 UART: [kat] sha1
3,678,174 UART: [kat] SHA2-256
3,680,104 UART: [kat] SHA2-384
3,682,869 UART: [kat] SHA2-512-ACC
3,684,764 UART: [kat] ECC-384
3,694,235 UART: [kat] HMAC-384Kdf
3,698,784 UART: [kat] LMS
3,947,675 UART: [kat] --
4,742,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,171,421 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,064 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,426 UART: [rt]cmd =0x46504c67, len=4
6,203,674 >>> mbox cmd response data (8 bytes)
6,203,675 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,233,002 UART: [rt]cmd =0x49444543, len=4
6,239,407 >>> mbox cmd response data (37 bytes)
6,239,408 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,731 UART: [rt]cmd =0x49444549, len=4
6,270,903 >>> mbox cmd response data (104 bytes)
6,270,904 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,275 UART: [rt]cmd =0x49444550, len=4
6,310,686 >>> mbox cmd response data (8 bytes)
6,310,687 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,118 UART: [rt]cmd =0x4c444556, len=4
6,350,502 >>> mbox cmd response data (687 bytes)
6,350,503 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,816 UART: [rt]cmd =0x43455246, len=4
6,392,270 >>> mbox cmd response data (920 bytes)
6,392,271 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,421,526 UART: [rt]cmd =0x43455252, len=4
6,432,407 >>> mbox cmd response data (782 bytes)
6,432,408 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,221 UART: [rt]cmd =0x53494756, len=196
6,468,550 >>> mbox cmd response data (8 bytes)
6,468,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,620 UART: [rt]cmd =0x4d454153, len=108
6,518,968 >>> mbox cmd response data (12 bytes)
6,518,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,548,500 UART: [rt]cmd =0x494e464f, len=4
6,551,675 >>> mbox cmd response data (264 bytes)
6,551,676 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,007 UART: [rt]cmd =0x54514754, len=24
6,582,928 >>> mbox cmd response data (8 bytes)
6,582,929 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,292 UART: [rt]cmd =0x47544744, len=8
6,614,657 >>> mbox cmd response data (104 bytes)
6,614,658 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,643,795 UART: [rt]cmd =0x50435252, len=8
6,645,126 >>> mbox cmd response data (8 bytes)
6,645,127 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,674,600 UART: [rt]cmd =0x50435251, len=36
6,841,750 >>> mbox cmd response data (1848 bytes)
6,841,751 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,871,472 UART: [rt]cmd =0x50435245, len=56
6,874,935 >>> mbox cmd response data (8 bytes)
6,874,936 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,904,663 UART: [rt]cmd =0x44504543, len=20
6,925,669 >>> mbox cmd response data (44 bytes)
6,925,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,955,309 UART: [rt]cmd =0x44504543, len=24
6,981,302 >>> mbox cmd response data (40 bytes)
6,981,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,011,236 UART: [rt]cmd =0x44504543, len=96
7,048,367 >>> mbox cmd response data (56 bytes)
7,048,368 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,241 UART: [rt]cmd =0x44504543, len=92
7,306,302 >>> mbox cmd response data (6284 bytes)
7,306,303 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,336,636 UART: [rt]cmd =0x44504543, len=136
7,403,256 >>> mbox cmd response data (136 bytes)
7,403,257 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,433,030 UART: [rt]cmd =0x44504543, len=40
7,458,932 >>> mbox cmd response data (40 bytes)
7,458,933 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,488,380 UART: [rt]cmd =0x44504543, len=28
7,531,514 >>> mbox cmd response data (2076 bytes)
7,531,515 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,561,178 UART: [rt]cmd =0x44504543, len=36
7,590,940 >>> mbox cmd response data (24 bytes)
7,590,941 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,620,256 UART: [rt]cmd =0x4453424c, len=4
7,633,598 >>> mbox cmd response data (8 bytes)
7,633,599 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,662,822 UART: [rt]cmd =0x46505344, len=4
7,771,394 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 ready_for_fw is high
1,362,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,105 >>> mbox cmd response: success
2,929,105 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,627 UART:
2,990,643 UART: Running Caliptra FMC ...
2,991,051 UART:
2,991,105 UART: [state] CFI Enabled
3,001,860 UART: [fht] FMC Alias Private Key: 7
3,109,965 UART: [art] Extend RT PCRs Done
3,110,393 UART: [art] Lock RT PCRs Done
3,111,991 UART: [art] Populate DV Done
3,120,096 UART: [fht] FMC Alias Private Key: 7
3,121,234 UART: [art] Derive CDI
3,121,514 UART: [art] Store in in slot 0x4
3,206,995 UART: [art] Derive Key Pair
3,207,355 UART: [art] Store priv key in slot 0x5
3,219,941 UART: [art] Derive Key Pair - Done
3,234,808 UART: [art] Signing Cert with AUTHO
3,235,288 UART: RITY.KEYID = 7
3,250,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,113 UART: [art] PUB.X = D9FFBA20D5CBF64704EC6A59845AD2BDBBEDCF5D2F9AE8FF3D0D064BDC5430C4DBB16FCF5B16D1FEF3E7285A40AE3F25
3,257,912 UART: [art] PUB.Y = 15D2CE29AD8DB712038CF12DF74C1F1BA2D9B39E4B166859D86FBBBD20D3C0D4473F968181ADA96507E9A0695B32B547
3,264,866 UART: [art] SIG.R = D049EB16E65FBEC9A36C34B0C62FBE788391407A98A9A78BC125DFE4FA23815D343A54B95A0A8580BB5F5F9C32CD1B40
3,271,647 UART: [art] SIG.S = 204F0653888FD639D477D25054B3871A5E5D1F8E82F8EB85DFFD3C24AC57FF07BF49DB0AD0E9CC814E06AF0D3A9AE169
3,295,877 UART: Caliptra RT
3,296,130 UART: [state] CFI Enabled
3,404,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,105 UART: [rt]cmd =0x46505652, len=4
3,435,776 UART: [rt] FIPS Version
3,436,851 >>> mbox cmd response data (36 bytes)
3,436,852 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,221 UART: [rt]cmd =0x46504c54, len=4
3,467,482 >>> mbox cmd response data (8 bytes)
3,467,483 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,497,036 UART: [rt]cmd =0x46504c67, len=4
3,498,099 >>> mbox cmd response: failed
3,498,281 UART: [rt] FIPS self test
3,498,612 UART: [kat] ++
3,498,764 UART: [kat] sha1
3,503,005 UART: [kat] SHA2-256
3,504,935 UART: [kat] SHA2-384
3,507,654 UART: [kat] SHA2-512-ACC
3,509,549 UART: [kat] ECC-384
3,519,014 UART: [kat] HMAC-384Kdf
3,523,525 UART: [kat] LMS
3,772,416 UART: [kat] --
4,459,961 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,889,803 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,897,859 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,927,357 UART: [rt]cmd =0x46504c67, len=4
5,928,625 >>> mbox cmd response data (8 bytes)
5,928,626 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,958,067 UART: [rt]cmd =0x49444543, len=4
5,964,510 >>> mbox cmd response data (37 bytes)
5,964,511 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,954 UART: [rt]cmd =0x49444549, len=4
5,996,322 >>> mbox cmd response data (104 bytes)
5,996,323 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,552 UART: [rt]cmd =0x49444550, len=4
6,035,826 >>> mbox cmd response data (8 bytes)
6,035,827 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,065,214 UART: [rt]cmd =0x4c444556, len=4
6,075,630 >>> mbox cmd response data (687 bytes)
6,075,631 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,105,054 UART: [rt]cmd =0x43455246, len=4
6,117,532 >>> mbox cmd response data (920 bytes)
6,117,533 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,147,026 UART: [rt]cmd =0x43455252, len=4
6,157,841 >>> mbox cmd response data (783 bytes)
6,157,842 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,587 UART: [rt]cmd =0x53494756, len=196
6,193,950 >>> mbox cmd response data (8 bytes)
6,193,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,224,012 UART: [rt]cmd =0x4d454153, len=108
6,244,810 >>> mbox cmd response data (12 bytes)
6,244,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,274,252 UART: [rt]cmd =0x494e464f, len=4
6,277,597 >>> mbox cmd response data (264 bytes)
6,277,598 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,307,141 UART: [rt]cmd =0x54514754, len=24
6,309,454 >>> mbox cmd response data (8 bytes)
6,309,455 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,338,702 UART: [rt]cmd =0x47544744, len=8
6,341,193 >>> mbox cmd response data (104 bytes)
6,341,194 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,370,475 UART: [rt]cmd =0x50435252, len=8
6,372,330 >>> mbox cmd response data (8 bytes)
6,372,331 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,401,838 UART: [rt]cmd =0x50435251, len=36
6,569,316 >>> mbox cmd response data (1848 bytes)
6,569,317 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,598,920 UART: [rt]cmd =0x50435245, len=56
6,602,339 >>> mbox cmd response data (8 bytes)
6,602,340 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,631,767 UART: [rt]cmd =0x44504543, len=20
6,652,219 >>> mbox cmd response data (44 bytes)
6,652,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,681,565 UART: [rt]cmd =0x44504543, len=24
6,707,746 >>> mbox cmd response data (40 bytes)
6,707,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,737,600 UART: [rt]cmd =0x44504543, len=96
6,774,953 >>> mbox cmd response data (56 bytes)
6,774,954 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,805,017 UART: [rt]cmd =0x44504543, len=92
7,033,762 >>> mbox cmd response data (6284 bytes)
7,033,763 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,063,736 UART: [rt]cmd =0x44504543, len=136
7,131,264 >>> mbox cmd response data (136 bytes)
7,131,265 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,160,668 UART: [rt]cmd =0x44504543, len=40
7,186,382 >>> mbox cmd response data (40 bytes)
7,186,383 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,215,794 UART: [rt]cmd =0x44504543, len=28
7,259,144 >>> mbox cmd response data (2076 bytes)
7,259,145 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,288,602 UART: [rt]cmd =0x44504543, len=36
7,318,852 >>> mbox cmd response data (24 bytes)
7,318,853 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,348,476 UART: [rt]cmd =0x4453424c, len=4
7,362,358 >>> mbox cmd response data (8 bytes)
7,362,359 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,391,786 UART: [rt]cmd =0x46505344, len=4
7,500,112 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,790 UART: [kat] SHA2-256
881,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,836 UART: [kat] ++
885,988 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
894,891 UART: [kat] SHA2-512-ACC
896,792 UART: [kat] ECC-384
902,341 UART: [kat] HMAC-384Kdf
906,967 UART: [kat] LMS
1,475,163 UART: [kat] --
1,476,154 UART: [cold-reset] ++
1,476,584 UART: [fht] Storing FHT @ 0x50003400
1,479,387 UART: [idev] ++
1,479,555 UART: [idev] CDI.KEYID = 6
1,479,915 UART: [idev] SUBJECT.KEYID = 7
1,480,339 UART: [idev] UDS.KEYID = 0
1,480,684 ready_for_fw is high
1,480,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,105 UART: [idev] Erasing UDS.KEYID = 0
1,504,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,009 UART: [idev] --
1,513,914 UART: [ldev] ++
1,514,082 UART: [ldev] CDI.KEYID = 6
1,514,445 UART: [ldev] SUBJECT.KEYID = 5
1,514,871 UART: [ldev] AUTHORITY.KEYID = 7
1,515,334 UART: [ldev] FE.KEYID = 1
1,520,652 UART: [ldev] Erasing FE.KEYID = 1
1,546,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,815 UART: [ldev] --
1,586,202 UART: [fwproc] Waiting for Commands...
1,587,047 UART: [fwproc] Received command 0x46574c44
1,587,838 UART: [fwproc] Received Image of size 114448 bytes
2,886,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,131 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,494 >>> mbox cmd response: success
3,079,494 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,644 UART: [afmc] ++
3,080,812 UART: [afmc] CDI.KEYID = 6
3,081,174 UART: [afmc] SUBJECT.KEYID = 7
3,081,599 UART: [afmc] AUTHORITY.KEYID = 5
3,117,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,375 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,065 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,060 UART: [afmc] --
3,160,034 UART: [cold-reset] --
3,160,796 UART: [state] Locking Datavault
3,162,153 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,757 UART: [state] Locking ICCM
3,163,367 UART: [exit] Launching FMC @ 0x40000130
3,168,696 UART:
3,168,712 UART: Running Caliptra FMC ...
3,169,120 UART:
3,169,263 UART: [state] CFI Enabled
3,179,668 UART: [fht] FMC Alias Private Key: 7
3,287,355 UART: [art] Extend RT PCRs Done
3,287,783 UART: [art] Lock RT PCRs Done
3,289,273 UART: [art] Populate DV Done
3,297,486 UART: [fht] FMC Alias Private Key: 7
3,298,500 UART: [art] Derive CDI
3,298,780 UART: [art] Store in in slot 0x4
3,384,309 UART: [art] Derive Key Pair
3,384,669 UART: [art] Store priv key in slot 0x5
3,397,489 UART: [art] Derive Key Pair - Done
3,412,275 UART: [art] Signing Cert with AUTHO
3,412,755 UART: RITY.KEYID = 7
3,427,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,762 UART: [art] PUB.X = 93F10C2602E57CF94DC49ACF272F1021BA672B269B20436E33B4E2D302B1ACD281AFFF88CC77E084F40FE4DE80096581
3,435,525 UART: [art] PUB.Y = AF01BECA292AE4455465C3197A5DA92804D6A436422F3DCD4CC04C966CC5BA4E8249E93E053DE1CEE427E662AC74EA26
3,442,480 UART: [art] SIG.R = 13399077C302C2CF38A6F2CBEA38D1110A91BB3054628C2D0BAF74A105BDAED2386F782809E1F06E8E2144E35444B271
3,449,237 UART: [art] SIG.S = 9D655E156AA43E24C4F7C99C6A6C89B2A686907F9FE78505D13102E2CED752B48DC2F95DBE9562B077415AC0B37D4E09
3,473,287 UART: Caliptra RT
3,473,632 UART: [state] CFI Enabled
3,582,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,761 UART: [rt]cmd =0x46505652, len=4
3,613,432 UART: [rt] FIPS Version
3,614,463 >>> mbox cmd response data (36 bytes)
3,614,464 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,943 UART: [rt]cmd =0x46504c54, len=4
3,644,906 >>> mbox cmd response data (8 bytes)
3,644,907 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,674,840 UART: [rt]cmd =0x46504c67, len=4
3,675,737 >>> mbox cmd response: failed
3,675,939 UART: [rt] FIPS self test
3,676,270 UART: [kat] ++
3,676,422 UART: [kat] sha1
3,680,527 UART: [kat] SHA2-256
3,682,457 UART: [kat] SHA2-384
3,685,346 UART: [kat] SHA2-512-ACC
3,687,241 UART: [kat] ECC-384
3,697,182 UART: [kat] HMAC-384Kdf
3,701,851 UART: [kat] LMS
3,950,742 UART: [kat] --
4,745,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,174,578 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,175,487 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,861 UART: [rt]cmd =0x46504c67, len=4
6,206,147 >>> mbox cmd response data (8 bytes)
6,206,148 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,235,313 UART: [rt]cmd =0x49444543, len=4
6,241,756 >>> mbox cmd response data (37 bytes)
6,241,757 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,270,932 UART: [rt]cmd =0x49444549, len=4
6,273,268 >>> mbox cmd response data (104 bytes)
6,273,269 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,302,650 UART: [rt]cmd =0x49444550, len=4
6,312,878 >>> mbox cmd response data (8 bytes)
6,312,879 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,460 UART: [rt]cmd =0x4c444556, len=4
6,352,898 >>> mbox cmd response data (687 bytes)
6,352,899 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,372 UART: [rt]cmd =0x43455246, len=4
6,394,704 >>> mbox cmd response data (920 bytes)
6,394,705 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,424,170 UART: [rt]cmd =0x43455252, len=4
6,435,049 >>> mbox cmd response data (783 bytes)
6,435,050 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,553 UART: [rt]cmd =0x53494756, len=196
6,470,744 >>> mbox cmd response data (8 bytes)
6,470,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,501,014 UART: [rt]cmd =0x4d454153, len=108
6,521,926 >>> mbox cmd response data (12 bytes)
6,521,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,551,254 UART: [rt]cmd =0x494e464f, len=4
6,554,631 >>> mbox cmd response data (264 bytes)
6,554,632 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,584,051 UART: [rt]cmd =0x54514754, len=24
6,586,312 >>> mbox cmd response data (8 bytes)
6,586,313 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,615,796 UART: [rt]cmd =0x47544744, len=8
6,618,505 >>> mbox cmd response data (104 bytes)
6,618,506 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,943 UART: [rt]cmd =0x50435252, len=8
6,649,522 >>> mbox cmd response data (8 bytes)
6,649,523 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,679,000 UART: [rt]cmd =0x50435251, len=36
6,846,448 >>> mbox cmd response data (1848 bytes)
6,846,449 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,876,074 UART: [rt]cmd =0x50435245, len=56
6,879,421 >>> mbox cmd response data (8 bytes)
6,879,422 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,909 UART: [rt]cmd =0x44504543, len=20
6,930,009 >>> mbox cmd response data (44 bytes)
6,930,010 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,959,329 UART: [rt]cmd =0x44504543, len=24
6,985,434 >>> mbox cmd response data (40 bytes)
6,985,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,015,490 UART: [rt]cmd =0x44504543, len=96
7,053,037 >>> mbox cmd response data (56 bytes)
7,053,038 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,903 UART: [rt]cmd =0x44504543, len=92
7,311,304 >>> mbox cmd response data (6284 bytes)
7,311,305 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,341,286 UART: [rt]cmd =0x44504543, len=136
7,406,898 >>> mbox cmd response data (136 bytes)
7,406,899 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,436,372 UART: [rt]cmd =0x44504543, len=40
7,462,552 >>> mbox cmd response data (40 bytes)
7,462,553 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,491,904 UART: [rt]cmd =0x44504543, len=28
7,535,034 >>> mbox cmd response data (2076 bytes)
7,535,035 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,564,910 UART: [rt]cmd =0x44504543, len=36
7,594,742 >>> mbox cmd response data (24 bytes)
7,594,743 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,623,880 UART: [rt]cmd =0x4453424c, len=4
7,637,962 >>> mbox cmd response data (8 bytes)
7,637,963 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,667,290 UART: [rt]cmd =0x46505344, len=4
7,776,040 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,100 ready_for_fw is high
1,363,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,038 >>> mbox cmd response: success
2,931,038 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,992,798 UART:
2,992,814 UART: Running Caliptra FMC ...
2,993,222 UART:
2,993,365 UART: [state] CFI Enabled
3,003,996 UART: [fht] FMC Alias Private Key: 7
3,112,079 UART: [art] Extend RT PCRs Done
3,112,507 UART: [art] Lock RT PCRs Done
3,114,229 UART: [art] Populate DV Done
3,122,586 UART: [fht] FMC Alias Private Key: 7
3,123,684 UART: [art] Derive CDI
3,123,964 UART: [art] Store in in slot 0x4
3,209,753 UART: [art] Derive Key Pair
3,210,113 UART: [art] Store priv key in slot 0x5
3,223,987 UART: [art] Derive Key Pair - Done
3,238,531 UART: [art] Signing Cert with AUTHO
3,239,011 UART: RITY.KEYID = 7
3,253,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,650 UART: [art] PUB.X = 25FF1355B47E9DF853D4BD9422E3EEB614F260828977836E7E208422DBD51CC33B73DA08898AB4DA0460FD226993E8D5
3,261,416 UART: [art] PUB.Y = E6EE85D8B0345DE71F126D3165C3714875F6F296589BB68E75DB4A8A656A83E83141AE67EEA6518FAE35B17319BB9DE6
3,268,372 UART: [art] SIG.R = 5C12223C4A11DD979E9F6B3B5448E599F0DB5CEFA9C33C7C116553F40DAE97A2FD0EEBCD7001B9B220EA83AC648F6B6D
3,275,153 UART: [art] SIG.S = 57A0D1E832ABC498C0BDFFF498BA8BC76C7607E9BFB1E512202A5674994397C5D4B33C4F959DC0C8D6DD226526660476
3,298,706 UART: Caliptra RT
3,299,051 UART: [state] CFI Enabled
3,407,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,167 UART: [rt]cmd =0x46505652, len=4
3,438,838 UART: [rt] FIPS Version
3,439,955 >>> mbox cmd response data (36 bytes)
3,439,956 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,243 UART: [rt]cmd =0x46504c54, len=4
3,470,306 >>> mbox cmd response data (8 bytes)
3,470,307 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,499,886 UART: [rt]cmd =0x46504c67, len=4
3,500,797 >>> mbox cmd response: failed
3,501,063 UART: [rt] FIPS self test
3,501,394 UART: [kat] ++
3,501,546 UART: [kat] sha1
3,505,791 UART: [kat] SHA2-256
3,507,721 UART: [kat] SHA2-384
3,510,520 UART: [kat] SHA2-512-ACC
3,512,415 UART: [kat] ECC-384
3,522,252 UART: [kat] HMAC-384Kdf
3,526,823 UART: [kat] LMS
3,775,714 UART: [kat] --
4,463,123 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,892,971 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,557 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,930,081 UART: [rt]cmd =0x46504c67, len=4
5,931,049 >>> mbox cmd response data (8 bytes)
5,931,050 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,960,495 UART: [rt]cmd =0x49444543, len=4
5,966,808 >>> mbox cmd response data (37 bytes)
5,966,809 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,258 UART: [rt]cmd =0x49444549, len=4
5,998,660 >>> mbox cmd response data (104 bytes)
5,998,661 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,028,022 UART: [rt]cmd =0x49444550, len=4
6,037,993 >>> mbox cmd response data (8 bytes)
6,037,994 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,331 UART: [rt]cmd =0x4c444556, len=4
6,077,759 >>> mbox cmd response data (687 bytes)
6,077,760 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,107,131 UART: [rt]cmd =0x43455246, len=4
6,119,501 >>> mbox cmd response data (920 bytes)
6,119,502 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,148,811 UART: [rt]cmd =0x43455252, len=4
6,159,554 >>> mbox cmd response data (782 bytes)
6,159,555 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,189,994 UART: [rt]cmd =0x53494756, len=196
6,195,473 >>> mbox cmd response data (8 bytes)
6,195,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,225,357 UART: [rt]cmd =0x4d454153, len=108
6,245,351 >>> mbox cmd response data (12 bytes)
6,245,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,274,733 UART: [rt]cmd =0x494e464f, len=4
6,278,176 >>> mbox cmd response data (264 bytes)
6,278,177 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,307,650 UART: [rt]cmd =0x54514754, len=24
6,309,993 >>> mbox cmd response data (8 bytes)
6,309,994 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,479 UART: [rt]cmd =0x47544744, len=8
6,342,170 >>> mbox cmd response data (104 bytes)
6,342,171 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,371,696 UART: [rt]cmd =0x50435252, len=8
6,373,007 >>> mbox cmd response data (8 bytes)
6,373,008 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,402,563 UART: [rt]cmd =0x50435251, len=36
6,569,909 >>> mbox cmd response data (1848 bytes)
6,569,910 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,599,757 UART: [rt]cmd =0x50435245, len=56
6,603,390 >>> mbox cmd response data (8 bytes)
6,603,391 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,632,842 UART: [rt]cmd =0x44504543, len=20
6,653,720 >>> mbox cmd response data (44 bytes)
6,653,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,683,100 UART: [rt]cmd =0x44504543, len=24
6,709,439 >>> mbox cmd response data (40 bytes)
6,709,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,739,337 UART: [rt]cmd =0x44504543, len=96
6,776,256 >>> mbox cmd response data (56 bytes)
6,776,257 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,806,226 UART: [rt]cmd =0x44504543, len=92
7,033,743 >>> mbox cmd response data (6284 bytes)
7,033,744 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,063,853 UART: [rt]cmd =0x44504543, len=136
7,130,275 >>> mbox cmd response data (136 bytes)
7,130,276 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,159,913 UART: [rt]cmd =0x44504543, len=40
7,186,511 >>> mbox cmd response data (40 bytes)
7,186,512 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,215,785 UART: [rt]cmd =0x44504543, len=28
7,258,707 >>> mbox cmd response data (2076 bytes)
7,258,708 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,288,385 UART: [rt]cmd =0x44504543, len=36
7,318,627 >>> mbox cmd response data (24 bytes)
7,318,628 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,347,991 UART: [rt]cmd =0x4453424c, len=4
7,361,161 >>> mbox cmd response data (8 bytes)
7,361,162 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,390,611 UART: [rt]cmd =0x46505344, len=4
7,498,891 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,365 UART: [kat] SHA2-256
904,305 UART: [kat] SHA2-384
907,080 UART: [kat] SHA2-512-ACC
908,981 UART: [kat] ECC-384
918,746 UART: [kat] HMAC-384Kdf
923,422 UART: [kat] LMS
1,171,750 UART: [kat] --
1,172,609 UART: [cold-reset] ++
1,172,987 UART: [fht] FHT @ 0x50003400
1,175,728 UART: [idev] ++
1,175,896 UART: [idev] CDI.KEYID = 6
1,176,256 UART: [idev] SUBJECT.KEYID = 7
1,176,680 UART: [idev] UDS.KEYID = 0
1,177,025 ready_for_fw is high
1,177,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,382 UART: [idev] Erasing UDS.KEYID = 0
1,201,095 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,924 >>> mbox cmd response: success
2,775,924 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,978 UART: [afmc] ++
2,777,146 UART: [afmc] CDI.KEYID = 6
2,777,508 UART: [afmc] SUBJECT.KEYID = 7
2,777,933 UART: [afmc] AUTHORITY.KEYID = 5
2,813,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,753 UART: [afmc] --
2,856,649 UART: [cold-reset] --
2,857,537 UART: [state] Locking Datavault
2,858,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,244 UART: [state] Locking ICCM
2,859,744 UART: [exit] Launching FMC @ 0x40000130
2,865,073 UART:
2,865,089 UART: Running Caliptra FMC ...
2,865,497 UART:
2,865,551 UART: [state] CFI Enabled
2,876,202 UART: [fht] FMC Alias Private Key: 7
2,984,433 UART: [art] Extend RT PCRs Done
2,984,861 UART: [art] Lock RT PCRs Done
2,986,099 UART: [art] Populate DV Done
2,994,396 UART: [fht] FMC Alias Private Key: 7
2,995,414 UART: [art] Derive CDI
2,995,694 UART: [art] Store in in slot 0x4
3,081,543 UART: [art] Derive Key Pair
3,081,903 UART: [art] Store priv key in slot 0x5
3,094,967 UART: [art] Derive Key Pair - Done
3,109,795 UART: [art] Signing Cert with AUTHO
3,110,275 UART: RITY.KEYID = 7
3,125,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,152 UART: [art] PUB.X = BF7915AFB83FBD581D4EEC02DAA0450AF27AF475AC4C0B9674BEE58CB5CA29F77A40C004940E1331CFBFB58B3887EB1E
3,132,931 UART: [art] PUB.Y = 19B409CC3491CFE4521025A1008358E339EC2659E4A73DB4EF5D06F078ED63568F616BD96540B944E54A9BB9FBDA8345
3,139,855 UART: [art] SIG.R = 6EBFE2291EA1E9F9F905209410CDAC7E379791CA2967C6680F5A8F1059F16E72D45405F997E49756F21B14C84B075A0D
3,146,610 UART: [art] SIG.S = 39D2A705C4820E4305208B7452279AE3CAFAA1046B90677930D380F27525EA7C4A74F1946527C98C15B89814C6554AB5
3,170,065 UART: Caliptra RT
3,170,318 UART: [state] CFI Enabled
3,277,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,147 UART: [rt]cmd =0x46505652, len=4
3,308,818 UART: [rt] FIPS Version
3,310,051 >>> mbox cmd response data (36 bytes)
3,310,052 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,593 UART: [rt]cmd =0x46504c54, len=4
3,340,816 >>> mbox cmd response data (8 bytes)
3,340,817 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,370,572 UART: [rt]cmd =0x46504c67, len=4
3,371,525 >>> mbox cmd response: failed
3,371,683 UART: [rt] FIPS self test
3,372,014 UART: [kat] ++
3,372,166 UART: [kat] sha1
3,376,269 UART: [kat] SHA2-256
3,378,199 UART: [kat] SHA2-384
3,381,054 UART: [kat] SHA2-512-ACC
3,382,949 UART: [kat] ECC-384
3,393,116 UART: [kat] HMAC-384Kdf
3,397,603 UART: [kat] LMS
3,646,494 UART: [kat] --
4,450,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,879,662 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,274 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,732 UART: [rt]cmd =0x46504c67, len=4
5,911,906 >>> mbox cmd response data (8 bytes)
5,911,907 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,282 UART: [rt]cmd =0x49444543, len=4
5,947,635 >>> mbox cmd response data (37 bytes)
5,947,636 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,935 UART: [rt]cmd =0x49444549, len=4
5,979,245 >>> mbox cmd response data (104 bytes)
5,979,246 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,599 UART: [rt]cmd =0x49444550, len=4
6,018,708 >>> mbox cmd response data (8 bytes)
6,018,709 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,804 UART: [rt]cmd =0x4c444556, len=4
6,058,222 >>> mbox cmd response data (687 bytes)
6,058,223 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,558 UART: [rt]cmd =0x43455246, len=4
6,099,756 >>> mbox cmd response data (887 bytes)
6,099,757 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,174 UART: [rt]cmd =0x43455252, len=4
6,139,895 >>> mbox cmd response data (782 bytes)
6,139,896 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,805 UART: [rt]cmd =0x53494756, len=196
6,176,288 >>> mbox cmd response data (8 bytes)
6,176,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,434 UART: [rt]cmd =0x4d454153, len=108
6,227,148 >>> mbox cmd response data (12 bytes)
6,227,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,256,530 UART: [rt]cmd =0x494e464f, len=4
6,259,973 >>> mbox cmd response data (264 bytes)
6,259,974 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,429 UART: [rt]cmd =0x54514754, len=24
6,291,676 >>> mbox cmd response data (8 bytes)
6,291,677 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,166 UART: [rt]cmd =0x47544744, len=8
6,323,783 >>> mbox cmd response data (104 bytes)
6,323,784 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,353,157 UART: [rt]cmd =0x50435252, len=8
6,354,626 >>> mbox cmd response data (8 bytes)
6,354,627 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,300 UART: [rt]cmd =0x50435251, len=36
6,551,648 >>> mbox cmd response data (1848 bytes)
6,551,649 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,368 UART: [rt]cmd =0x50435245, len=56
6,584,853 >>> mbox cmd response data (8 bytes)
6,584,854 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,213 UART: [rt]cmd =0x44504543, len=20
6,635,141 >>> mbox cmd response data (44 bytes)
6,635,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,795 UART: [rt]cmd =0x44504543, len=24
6,691,268 >>> mbox cmd response data (40 bytes)
6,691,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,721,278 UART: [rt]cmd =0x44504543, len=96
6,759,027 >>> mbox cmd response data (56 bytes)
6,759,028 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,799 UART: [rt]cmd =0x44504543, len=92
7,017,105 >>> mbox cmd response data (6284 bytes)
7,017,106 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,047,213 UART: [rt]cmd =0x44504543, len=136
7,114,035 >>> mbox cmd response data (136 bytes)
7,114,036 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,143,559 UART: [rt]cmd =0x44504543, len=40
7,169,935 >>> mbox cmd response data (40 bytes)
7,169,936 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,199,291 UART: [rt]cmd =0x44504543, len=28
7,242,477 >>> mbox cmd response data (2076 bytes)
7,242,478 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,272,145 UART: [rt]cmd =0x44504543, len=36
7,302,519 >>> mbox cmd response data (24 bytes)
7,302,520 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,331,913 UART: [rt]cmd =0x4453424c, len=4
7,345,365 >>> mbox cmd response data (8 bytes)
7,345,366 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,374,707 UART: [rt]cmd =0x46505344, len=4
7,483,179 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,591 ready_for_fw is high
1,060,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,294 >>> mbox cmd response: success
2,627,294 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,394 UART:
2,689,410 UART: Running Caliptra FMC ...
2,689,818 UART:
2,689,872 UART: [state] CFI Enabled
2,700,529 UART: [fht] FMC Alias Private Key: 7
2,809,016 UART: [art] Extend RT PCRs Done
2,809,444 UART: [art] Lock RT PCRs Done
2,810,812 UART: [art] Populate DV Done
2,819,317 UART: [fht] FMC Alias Private Key: 7
2,820,481 UART: [art] Derive CDI
2,820,761 UART: [art] Store in in slot 0x4
2,906,506 UART: [art] Derive Key Pair
2,906,866 UART: [art] Store priv key in slot 0x5
2,920,030 UART: [art] Derive Key Pair - Done
2,934,558 UART: [art] Signing Cert with AUTHO
2,935,038 UART: RITY.KEYID = 7
2,950,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,781 UART: [art] PUB.X = 578054A6CC6FA3AA09E07D0EFA0971BEA31E2549C0C4DA9D33536AE1F5DE09FA29ED7778E70050C12F8D7660DF14B1ED
2,957,533 UART: [art] PUB.Y = B8AF73B6A993E9E21330EF861B33F3821DF743915AB60C935FF71F882131AAC8818AE803FA756F7B0641112169DA1B7C
2,964,476 UART: [art] SIG.R = 6FE2655D9053F6271554E33C761BD01EC2CD1A7EEFACAB9CFF7FE29742A91A3818B3E687B174664055A0FE6C80A9802A
2,971,256 UART: [art] SIG.S = 293684C5B4F0E213556C829F8A5D81CB6028B170501FCF7204163CBA183F1ACBE5FCCB37A405A8BD9EECD9FB59A20EE5
2,995,194 UART: Caliptra RT
2,995,447 UART: [state] CFI Enabled
3,102,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,056 UART: [rt]cmd =0x46505652, len=4
3,133,727 UART: [rt] FIPS Version
3,134,716 >>> mbox cmd response data (36 bytes)
3,134,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,194 UART: [rt]cmd =0x46504c54, len=4
3,165,347 >>> mbox cmd response data (8 bytes)
3,165,348 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,194,741 UART: [rt]cmd =0x46504c67, len=4
3,195,708 >>> mbox cmd response: failed
3,195,878 UART: [rt] FIPS self test
3,196,209 UART: [kat] ++
3,196,361 UART: [kat] sha1
3,200,644 UART: [kat] SHA2-256
3,202,574 UART: [kat] SHA2-384
3,205,517 UART: [kat] SHA2-512-ACC
3,207,412 UART: [kat] ECC-384
3,217,073 UART: [kat] HMAC-384Kdf
3,221,778 UART: [kat] LMS
3,470,669 UART: [kat] --
4,169,720 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,599,502 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,605,467 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,634,773 UART: [rt]cmd =0x46504c67, len=4
5,635,943 >>> mbox cmd response data (8 bytes)
5,635,944 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,665,433 UART: [rt]cmd =0x49444543, len=4
5,671,878 >>> mbox cmd response data (37 bytes)
5,671,879 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,701,232 UART: [rt]cmd =0x49444549, len=4
5,703,538 >>> mbox cmd response data (104 bytes)
5,703,539 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,974 UART: [rt]cmd =0x49444550, len=4
5,742,977 >>> mbox cmd response data (8 bytes)
5,742,978 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,251 UART: [rt]cmd =0x4c444556, len=4
5,782,637 >>> mbox cmd response data (687 bytes)
5,782,638 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,973 UART: [rt]cmd =0x43455246, len=4
5,824,081 >>> mbox cmd response data (887 bytes)
5,824,082 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,293 UART: [rt]cmd =0x43455252, len=4
5,864,094 >>> mbox cmd response data (782 bytes)
5,864,095 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,800 UART: [rt]cmd =0x53494756, len=196
5,900,241 >>> mbox cmd response data (8 bytes)
5,900,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,930,053 UART: [rt]cmd =0x4d454153, len=108
5,950,719 >>> mbox cmd response data (12 bytes)
5,950,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,323 UART: [rt]cmd =0x494e464f, len=4
5,983,636 >>> mbox cmd response data (264 bytes)
5,983,637 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,150 UART: [rt]cmd =0x54514754, len=24
6,015,341 >>> mbox cmd response data (8 bytes)
6,015,342 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,743 UART: [rt]cmd =0x47544744, len=8
6,047,532 >>> mbox cmd response data (104 bytes)
6,047,533 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,077,030 UART: [rt]cmd =0x50435252, len=8
6,078,505 >>> mbox cmd response data (8 bytes)
6,078,506 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,107,889 UART: [rt]cmd =0x50435251, len=36
6,275,279 >>> mbox cmd response data (1848 bytes)
6,275,280 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,304,835 UART: [rt]cmd =0x50435245, len=56
6,308,482 >>> mbox cmd response data (8 bytes)
6,308,483 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,722 UART: [rt]cmd =0x44504543, len=20
6,358,430 >>> mbox cmd response data (44 bytes)
6,358,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,388,014 UART: [rt]cmd =0x44504543, len=24
6,414,153 >>> mbox cmd response data (40 bytes)
6,414,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,444,383 UART: [rt]cmd =0x44504543, len=96
6,481,520 >>> mbox cmd response data (56 bytes)
6,481,521 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,511,250 UART: [rt]cmd =0x44504543, len=92
6,738,971 >>> mbox cmd response data (6284 bytes)
6,738,972 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,769,351 UART: [rt]cmd =0x44504543, len=136
6,836,601 >>> mbox cmd response data (136 bytes)
6,836,602 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,866,235 UART: [rt]cmd =0x44504543, len=40
6,892,173 >>> mbox cmd response data (40 bytes)
6,892,174 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,467 UART: [rt]cmd =0x44504543, len=28
6,964,605 >>> mbox cmd response data (2076 bytes)
6,964,606 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,994,395 UART: [rt]cmd =0x44504543, len=36
7,024,559 >>> mbox cmd response data (24 bytes)
7,024,560 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,053,899 UART: [rt]cmd =0x4453424c, len=4
7,067,819 >>> mbox cmd response data (8 bytes)
7,067,820 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,069 UART: [rt]cmd =0x46505344, len=4
7,205,505 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,051 UART: [kat] HMAC-384Kdf
922,601 UART: [kat] LMS
1,170,929 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,284 UART: [fht] FHT @ 0x50003400
1,174,917 UART: [idev] ++
1,175,085 UART: [idev] CDI.KEYID = 6
1,175,445 UART: [idev] SUBJECT.KEYID = 7
1,175,869 UART: [idev] UDS.KEYID = 0
1,176,214 ready_for_fw is high
1,176,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,599 UART: [idev] Erasing UDS.KEYID = 0
1,200,522 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,854 UART: [ldev] ++
1,210,022 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,811 UART: [ldev] AUTHORITY.KEYID = 7
1,211,274 UART: [ldev] FE.KEYID = 1
1,216,356 UART: [ldev] Erasing FE.KEYID = 1
1,242,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,597 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,947 >>> mbox cmd response: success
2,774,947 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,167 UART: [afmc] ++
2,776,335 UART: [afmc] CDI.KEYID = 6
2,776,697 UART: [afmc] SUBJECT.KEYID = 7
2,777,122 UART: [afmc] AUTHORITY.KEYID = 5
2,813,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,670 UART: [afmc] --
2,856,550 UART: [cold-reset] --
2,857,194 UART: [state] Locking Datavault
2,858,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,815 UART: [state] Locking ICCM
2,859,305 UART: [exit] Launching FMC @ 0x40000130
2,864,634 UART:
2,864,650 UART: Running Caliptra FMC ...
2,865,058 UART:
2,865,201 UART: [state] CFI Enabled
2,876,052 UART: [fht] FMC Alias Private Key: 7
2,983,659 UART: [art] Extend RT PCRs Done
2,984,087 UART: [art] Lock RT PCRs Done
2,985,471 UART: [art] Populate DV Done
2,993,598 UART: [fht] FMC Alias Private Key: 7
2,994,534 UART: [art] Derive CDI
2,994,814 UART: [art] Store in in slot 0x4
3,080,887 UART: [art] Derive Key Pair
3,081,247 UART: [art] Store priv key in slot 0x5
3,094,865 UART: [art] Derive Key Pair - Done
3,109,552 UART: [art] Signing Cert with AUTHO
3,110,032 UART: RITY.KEYID = 7
3,125,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,205 UART: [art] PUB.X = 81F7CEAF47D655CF60585681826A7FC6E0A80048B1D81B601CA8263B146260ACF2FDF0F36B399558B399A957BC02413E
3,132,952 UART: [art] PUB.Y = 2D5E1E659B025F5CE7AFF8F2C421155DE8432F14D766626265CD096AC611CD546D4405659F3A5C89CC8E0D48F24588DD
3,139,894 UART: [art] SIG.R = D7D1DE2C9E1F94B5E5377EE86D69CE727C26B9F375FB7DD05469775D2B33F582AB56756C04A6C45EBB69A238D973B560
3,146,669 UART: [art] SIG.S = DFBF62B1C53834891447BA6ADDBAA9BB04FC38536686FDBC0BFBCB8D219D162FEB3A2B55539457C42A66DB6294DF7535
3,171,008 UART: Caliptra RT
3,171,353 UART: [state] CFI Enabled
3,278,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,829 UART: [rt]cmd =0x46505652, len=4
3,309,500 UART: [rt] FIPS Version
3,310,459 >>> mbox cmd response data (36 bytes)
3,310,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,767 UART: [rt]cmd =0x46504c54, len=4
3,340,928 >>> mbox cmd response data (8 bytes)
3,340,929 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,370,642 UART: [rt]cmd =0x46504c67, len=4
3,371,635 >>> mbox cmd response: failed
3,371,979 UART: [rt] FIPS self test
3,372,310 UART: [kat] ++
3,372,462 UART: [kat] sha1
3,376,487 UART: [kat] SHA2-256
3,378,417 UART: [kat] SHA2-384
3,381,246 UART: [kat] SHA2-512-ACC
3,383,141 UART: [kat] ECC-384
3,393,106 UART: [kat] HMAC-384Kdf
3,397,663 UART: [kat] LMS
3,646,554 UART: [kat] --
4,450,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,880,412 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,384 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
5,910,571 UART: [rt]cmd =0x46504c67, len=4
5,911,877 >>> mbox cmd response data (8 bytes)
5,911,878 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,041 UART: [rt]cmd =0x49444543, len=4
5,947,526 >>> mbox cmd response data (37 bytes)
5,947,527 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,936 UART: [rt]cmd =0x49444549, len=4
5,979,248 >>> mbox cmd response data (104 bytes)
5,979,249 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,482 UART: [rt]cmd =0x49444550, len=4
6,018,626 >>> mbox cmd response data (8 bytes)
6,018,627 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,868 UART: [rt]cmd =0x4c444556, len=4
6,058,506 >>> mbox cmd response data (687 bytes)
6,058,507 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,788 UART: [rt]cmd =0x43455246, len=4
6,099,986 >>> mbox cmd response data (887 bytes)
6,099,987 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,314 UART: [rt]cmd =0x43455252, len=4
6,140,180 >>> mbox cmd response data (784 bytes)
6,140,181 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,716 UART: [rt]cmd =0x53494756, len=196
6,176,059 >>> mbox cmd response data (8 bytes)
6,176,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,133 UART: [rt]cmd =0x4d454153, len=108
6,227,059 >>> mbox cmd response data (12 bytes)
6,227,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,256,335 UART: [rt]cmd =0x494e464f, len=4
6,259,694 >>> mbox cmd response data (264 bytes)
6,259,695 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,170 UART: [rt]cmd =0x54514754, len=24
6,291,355 >>> mbox cmd response data (8 bytes)
6,291,356 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,907 UART: [rt]cmd =0x47544744, len=8
6,323,564 >>> mbox cmd response data (104 bytes)
6,323,565 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,944 UART: [rt]cmd =0x50435252, len=8
6,354,515 >>> mbox cmd response data (8 bytes)
6,354,516 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,067 UART: [rt]cmd =0x50435251, len=36
6,551,587 >>> mbox cmd response data (1848 bytes)
6,551,588 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,437 UART: [rt]cmd =0x50435245, len=56
6,584,934 >>> mbox cmd response data (8 bytes)
6,584,935 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,362 UART: [rt]cmd =0x44504543, len=20
6,635,222 >>> mbox cmd response data (44 bytes)
6,635,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,718 UART: [rt]cmd =0x44504543, len=24
6,691,287 >>> mbox cmd response data (40 bytes)
6,691,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,721,217 UART: [rt]cmd =0x44504543, len=96
6,758,814 >>> mbox cmd response data (56 bytes)
6,758,815 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,890 UART: [rt]cmd =0x44504543, len=92
7,017,539 >>> mbox cmd response data (6284 bytes)
7,017,540 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,047,681 UART: [rt]cmd =0x44504543, len=136
7,114,459 >>> mbox cmd response data (136 bytes)
7,114,460 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,144,155 UART: [rt]cmd =0x44504543, len=40
7,170,445 >>> mbox cmd response data (40 bytes)
7,170,446 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,200,061 UART: [rt]cmd =0x44504543, len=28
7,243,481 >>> mbox cmd response data (2076 bytes)
7,243,482 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,273,087 UART: [rt]cmd =0x44504543, len=36
7,302,891 >>> mbox cmd response data (24 bytes)
7,302,892 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,332,333 UART: [rt]cmd =0x4453424c, len=4
7,345,931 >>> mbox cmd response data (8 bytes)
7,345,932 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,375,309 UART: [rt]cmd =0x46505344, len=4
7,483,865 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,164 ready_for_fw is high
1,061,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,642 >>> mbox cmd response: success
2,627,642 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,576 UART:
2,689,592 UART: Running Caliptra FMC ...
2,690,000 UART:
2,690,143 UART: [state] CFI Enabled
2,700,922 UART: [fht] FMC Alias Private Key: 7
2,809,269 UART: [art] Extend RT PCRs Done
2,809,697 UART: [art] Lock RT PCRs Done
2,811,485 UART: [art] Populate DV Done
2,819,962 UART: [fht] FMC Alias Private Key: 7
2,820,966 UART: [art] Derive CDI
2,821,246 UART: [art] Store in in slot 0x4
2,907,251 UART: [art] Derive Key Pair
2,907,611 UART: [art] Store priv key in slot 0x5
2,920,203 UART: [art] Derive Key Pair - Done
2,934,835 UART: [art] Signing Cert with AUTHO
2,935,315 UART: RITY.KEYID = 7
2,950,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,416 UART: [art] PUB.X = B5C39B4BB87A862094DE53A5A1B4112554EEFB69830811DE2A959ECB699072BAAACF77BACC5B2D6B9CCC492B3D676AAB
2,958,205 UART: [art] PUB.Y = B973CE06679F581F81D8DFA4B9616E9EEF6C9CD494C8D29824882BB0C803025E771796CCFCEE17369898CC4B1AA31A13
2,965,154 UART: [art] SIG.R = E07191A2A21CE062AEBF66A9B3CE66F52E429F05FBDE12CFDEE57991B703EF745A57B3BFB5369BFEBA01437A690018D8
2,971,911 UART: [art] SIG.S = 9A90E54FAF7EB8DCCAEA71C7933D927EA0F36F406088DE60E66AD838B53286E4806B845E0ADA9D277CAF55A7CB32B68D
2,995,483 UART: Caliptra RT
2,995,828 UART: [state] CFI Enabled
3,102,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,906 UART: [rt]cmd =0x46505652, len=4
3,133,577 UART: [rt] FIPS Version
3,134,654 >>> mbox cmd response data (36 bytes)
3,134,655 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,912 UART: [rt]cmd =0x46504c54, len=4
3,165,205 >>> mbox cmd response data (8 bytes)
3,165,206 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,194,719 UART: [rt]cmd =0x46504c67, len=4
3,195,544 >>> mbox cmd response: failed
3,195,878 UART: [rt] FIPS self test
3,196,209 UART: [kat] ++
3,196,361 UART: [kat] sha1
3,200,670 UART: [kat] SHA2-256
3,202,600 UART: [kat] SHA2-384
3,205,343 UART: [kat] SHA2-512-ACC
3,207,238 UART: [kat] ECC-384
3,216,721 UART: [kat] HMAC-384Kdf
3,221,174 UART: [kat] LMS
3,470,065 UART: [kat] --
4,169,102 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,599,045 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,605,303 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,634,647 UART: [rt]cmd =0x46504c67, len=4
5,635,973 >>> mbox cmd response data (8 bytes)
5,635,974 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,665,443 UART: [rt]cmd =0x49444543, len=4
5,671,778 >>> mbox cmd response data (37 bytes)
5,671,779 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,701,056 UART: [rt]cmd =0x49444549, len=4
5,703,530 >>> mbox cmd response data (104 bytes)
5,703,531 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,880 UART: [rt]cmd =0x49444550, len=4
5,742,936 >>> mbox cmd response data (8 bytes)
5,742,937 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,464 UART: [rt]cmd =0x4c444556, len=4
5,783,132 >>> mbox cmd response data (687 bytes)
5,783,133 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,812,674 UART: [rt]cmd =0x43455246, len=4
5,824,670 >>> mbox cmd response data (887 bytes)
5,824,671 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,068 UART: [rt]cmd =0x43455252, len=4
5,864,926 >>> mbox cmd response data (784 bytes)
5,864,927 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,728 UART: [rt]cmd =0x53494756, len=196
5,901,289 >>> mbox cmd response data (8 bytes)
5,901,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,931,005 UART: [rt]cmd =0x4d454153, len=108
5,951,903 >>> mbox cmd response data (12 bytes)
5,951,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,283 UART: [rt]cmd =0x494e464f, len=4
5,984,474 >>> mbox cmd response data (264 bytes)
5,984,475 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,002 UART: [rt]cmd =0x54514754, len=24
6,015,959 >>> mbox cmd response data (8 bytes)
6,015,960 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,407 UART: [rt]cmd =0x47544744, len=8
6,048,040 >>> mbox cmd response data (104 bytes)
6,048,041 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,077,158 UART: [rt]cmd =0x50435252, len=8
6,079,099 >>> mbox cmd response data (8 bytes)
6,079,100 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,108,685 UART: [rt]cmd =0x50435251, len=36
6,276,111 >>> mbox cmd response data (1848 bytes)
6,276,112 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,305,851 UART: [rt]cmd =0x50435245, len=56
6,309,170 >>> mbox cmd response data (8 bytes)
6,309,171 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,338,402 UART: [rt]cmd =0x44504543, len=20
6,359,174 >>> mbox cmd response data (44 bytes)
6,359,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,388,640 UART: [rt]cmd =0x44504543, len=24
6,414,993 >>> mbox cmd response data (40 bytes)
6,414,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,444,697 UART: [rt]cmd =0x44504543, len=96
6,481,850 >>> mbox cmd response data (56 bytes)
6,481,851 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,511,894 UART: [rt]cmd =0x44504543, len=92
6,740,253 >>> mbox cmd response data (6284 bytes)
6,740,254 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,770,503 UART: [rt]cmd =0x44504543, len=136
6,837,235 >>> mbox cmd response data (136 bytes)
6,837,236 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,866,881 UART: [rt]cmd =0x44504543, len=40
6,893,115 >>> mbox cmd response data (40 bytes)
6,893,116 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,922,691 UART: [rt]cmd =0x44504543, len=28
6,965,957 >>> mbox cmd response data (2076 bytes)
6,965,958 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,995,457 UART: [rt]cmd =0x44504543, len=36
7,025,199 >>> mbox cmd response data (24 bytes)
7,025,200 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,054,585 UART: [rt]cmd =0x4453424c, len=4
7,068,513 >>> mbox cmd response data (8 bytes)
7,068,514 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,945 UART: [rt]cmd =0x46505344, len=4
7,206,393 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,447 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,681 UART: [idev] ++
1,173,849 UART: [idev] CDI.KEYID = 6
1,174,210 UART: [idev] SUBJECT.KEYID = 7
1,174,635 UART: [idev] UDS.KEYID = 0
1,174,981 ready_for_fw is high
1,174,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,577 UART: [idev] Erasing UDS.KEYID = 0
1,199,841 UART: [idev] Sha1 KeyId Algorithm
1,208,747 UART: [idev] --
1,209,986 UART: [ldev] ++
1,210,154 UART: [ldev] CDI.KEYID = 6
1,210,518 UART: [ldev] SUBJECT.KEYID = 5
1,210,945 UART: [ldev] AUTHORITY.KEYID = 7
1,211,408 UART: [ldev] FE.KEYID = 1
1,216,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,586 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,772 >>> mbox cmd response: success
2,774,772 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,801 UART: [afmc] ++
2,775,969 UART: [afmc] CDI.KEYID = 6
2,776,332 UART: [afmc] SUBJECT.KEYID = 7
2,776,758 UART: [afmc] AUTHORITY.KEYID = 5
2,811,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,340 UART: [afmc] --
2,855,280 UART: [cold-reset] --
2,856,292 UART: [state] Locking Datavault
2,857,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,227 UART: [state] Locking ICCM
2,858,701 UART: [exit] Launching FMC @ 0x40000130
2,864,030 UART:
2,864,046 UART: Running Caliptra FMC ...
2,864,454 UART:
2,864,508 UART: [state] CFI Enabled
2,875,001 UART: [fht] FMC Alias Private Key: 7
2,982,716 UART: [art] Extend RT PCRs Done
2,983,144 UART: [art] Lock RT PCRs Done
2,984,686 UART: [art] Populate DV Done
2,993,053 UART: [fht] FMC Alias Private Key: 7
2,994,221 UART: [art] Derive CDI
2,994,501 UART: [art] Store in in slot 0x4
3,080,392 UART: [art] Derive Key Pair
3,080,752 UART: [art] Store priv key in slot 0x5
3,093,746 UART: [art] Derive Key Pair - Done
3,108,592 UART: [art] Signing Cert with AUTHO
3,109,072 UART: RITY.KEYID = 7
3,124,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,861 UART: [art] PUB.X = 0B79A932499FF564CEAD88C72C7D82B4E94D3F9B049EB7DE79354CFCE61D1059C1C72777486AD32334E0A52DC156DD44
3,131,633 UART: [art] PUB.Y = 5A4D8C395ABC7A013F73DA39D5F4ECAAE2544D258018904FAF9FAF2204D10EE8EE05B2CFE96AFB2B7EE2CADB2DE7D6CC
3,138,605 UART: [art] SIG.R = 98AD3019313709C5F95BAF0F46EB54ED3A7003196A4E52C3211D19F090EFF2C8116A91BD2D403C11EA6CFBC927D755E5
3,145,374 UART: [art] SIG.S = BCB517DF52D57A0572B7639F505EC5C89C7BE440E15C71267D2AF7AFEDD9EDBD1CE3C8DF7A3144F1EA56299A464C4301
3,168,545 UART: Caliptra RT
3,168,798 UART: [state] CFI Enabled
3,277,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,532 UART: [rt]cmd =0x46505652, len=4
3,308,203 UART: [rt] FIPS Version
3,309,140 >>> mbox cmd response data (36 bytes)
3,309,141 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,642 UART: [rt]cmd =0x46504c54, len=4
3,339,735 >>> mbox cmd response data (8 bytes)
3,339,736 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,369,437 UART: [rt]cmd =0x46504c67, len=4
3,370,536 >>> mbox cmd response: failed
3,370,900 UART: [rt] FIPS self test
3,371,231 UART: [kat] ++
3,371,383 UART: [kat] sha1
3,375,764 UART: [kat] SHA2-256
3,377,694 UART: [kat] SHA2-384
3,380,495 UART: [kat] SHA2-512-ACC
3,382,390 UART: [kat] ECC-384
3,392,355 UART: [kat] HMAC-384Kdf
3,396,844 UART: [kat] LMS
3,645,735 UART: [kat] --
4,447,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,876,225 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,285 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,909,423 UART: [rt]cmd =0x46504c67, len=4
5,910,547 >>> mbox cmd response data (8 bytes)
5,910,548 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,073 UART: [rt]cmd =0x49444543, len=4
5,946,540 >>> mbox cmd response data (37 bytes)
5,946,541 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,858 UART: [rt]cmd =0x49444549, len=4
5,978,186 >>> mbox cmd response data (104 bytes)
5,978,187 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,548 UART: [rt]cmd =0x49444550, len=4
6,017,650 >>> mbox cmd response data (8 bytes)
6,017,651 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,848 UART: [rt]cmd =0x4c444556, len=4
6,057,516 >>> mbox cmd response data (687 bytes)
6,057,517 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,016 UART: [rt]cmd =0x43455246, len=4
6,099,056 >>> mbox cmd response data (887 bytes)
6,099,057 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,428 UART: [rt]cmd =0x43455252, len=4
6,139,208 >>> mbox cmd response data (784 bytes)
6,139,209 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,868 UART: [rt]cmd =0x53494756, len=196
6,175,423 >>> mbox cmd response data (8 bytes)
6,175,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,489 UART: [rt]cmd =0x4d454153, len=108
6,225,801 >>> mbox cmd response data (12 bytes)
6,225,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,255,045 UART: [rt]cmd =0x494e464f, len=4
6,258,440 >>> mbox cmd response data (264 bytes)
6,258,441 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,850 UART: [rt]cmd =0x54514754, len=24
6,290,261 >>> mbox cmd response data (8 bytes)
6,290,262 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,615 UART: [rt]cmd =0x47544744, len=8
6,321,866 >>> mbox cmd response data (104 bytes)
6,321,867 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,254 UART: [rt]cmd =0x50435252, len=8
6,352,801 >>> mbox cmd response data (8 bytes)
6,352,802 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,373 UART: [rt]cmd =0x50435251, len=36
6,549,837 >>> mbox cmd response data (1848 bytes)
6,549,838 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,579,365 UART: [rt]cmd =0x50435245, len=56
6,583,020 >>> mbox cmd response data (8 bytes)
6,583,021 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,432 UART: [rt]cmd =0x44504543, len=20
6,633,154 >>> mbox cmd response data (44 bytes)
6,633,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,360 UART: [rt]cmd =0x44504543, len=24
6,688,289 >>> mbox cmd response data (40 bytes)
6,688,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,718,421 UART: [rt]cmd =0x44504543, len=96
6,755,820 >>> mbox cmd response data (56 bytes)
6,755,821 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,786,004 UART: [rt]cmd =0x44504543, len=92
7,013,824 >>> mbox cmd response data (6284 bytes)
7,013,825 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,832 UART: [rt]cmd =0x44504543, len=136
7,110,102 >>> mbox cmd response data (136 bytes)
7,110,103 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,139,594 UART: [rt]cmd =0x44504543, len=40
7,165,828 >>> mbox cmd response data (40 bytes)
7,165,829 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,564 UART: [rt]cmd =0x44504543, len=28
7,239,296 >>> mbox cmd response data (2076 bytes)
7,239,297 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,268,770 UART: [rt]cmd =0x44504543, len=36
7,298,882 >>> mbox cmd response data (24 bytes)
7,298,883 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,328,262 UART: [rt]cmd =0x4453424c, len=4
7,341,832 >>> mbox cmd response data (8 bytes)
7,341,833 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,172 UART: [rt]cmd =0x46505344, len=4
7,479,470 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,136 ready_for_fw is high
1,056,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
2,623,658 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,554 UART:
2,685,570 UART: Running Caliptra FMC ...
2,685,978 UART:
2,686,032 UART: [state] CFI Enabled
2,696,715 UART: [fht] FMC Alias Private Key: 7
2,804,660 UART: [art] Extend RT PCRs Done
2,805,088 UART: [art] Lock RT PCRs Done
2,806,806 UART: [art] Populate DV Done
2,815,053 UART: [fht] FMC Alias Private Key: 7
2,816,001 UART: [art] Derive CDI
2,816,281 UART: [art] Store in in slot 0x4
2,902,102 UART: [art] Derive Key Pair
2,902,462 UART: [art] Store priv key in slot 0x5
2,915,570 UART: [art] Derive Key Pair - Done
2,930,218 UART: [art] Signing Cert with AUTHO
2,930,698 UART: RITY.KEYID = 7
2,946,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,871 UART: [art] PUB.X = DEA407C504ACF7A3150E42A39F79511AB18FF3A838A1C9EEAF5D1C90C5920EFE22F904362EF637924DDED038F31B3A8D
2,953,642 UART: [art] PUB.Y = 09F1025F42C099399B3B8A7970899BA3027B954F31CA6DE499819A24E16FE17118AAF9C70BCD3E8F3B6729D6A2BAD661
2,960,584 UART: [art] SIG.R = AE58B2FBC2D7C37088E13AACDC50ED0D640332CD274586CCF8EB338ABB32CCD85CDE0421AB6494E70CB2EF7F36067641
2,967,359 UART: [art] SIG.S = 114B7D734FE3644479285AAE1ACBEF1C9AF40B5B5486C332D66CAA6A780B3024F7C2675F1A8A42C6B036C8AE9A6183EF
2,990,582 UART: Caliptra RT
2,990,835 UART: [state] CFI Enabled
3,098,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,094 UART: [rt]cmd =0x46505652, len=4
3,129,765 UART: [rt] FIPS Version
3,130,816 >>> mbox cmd response data (36 bytes)
3,130,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,238 UART: [rt]cmd =0x46504c54, len=4
3,161,247 >>> mbox cmd response data (8 bytes)
3,161,248 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,190,779 UART: [rt]cmd =0x46504c67, len=4
3,191,724 >>> mbox cmd response: failed
3,191,912 UART: [rt] FIPS self test
3,192,243 UART: [kat] ++
3,192,395 UART: [kat] sha1
3,196,610 UART: [kat] SHA2-256
3,198,540 UART: [kat] SHA2-384
3,201,381 UART: [kat] SHA2-512-ACC
3,203,276 UART: [kat] ECC-384
3,212,995 UART: [kat] HMAC-384Kdf
3,217,502 UART: [kat] LMS
3,466,393 UART: [kat] --
4,161,284 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,590,739 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,591,484 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
5,620,776 UART: [rt]cmd =0x46504c67, len=4
5,622,020 >>> mbox cmd response data (8 bytes)
5,622,021 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,651,730 UART: [rt]cmd =0x49444543, len=4
5,658,137 >>> mbox cmd response data (37 bytes)
5,658,138 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,687,721 UART: [rt]cmd =0x49444549, len=4
5,690,133 >>> mbox cmd response data (104 bytes)
5,690,134 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,719,415 UART: [rt]cmd =0x49444550, len=4
5,729,510 >>> mbox cmd response data (8 bytes)
5,729,511 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,858 UART: [rt]cmd =0x4c444556, len=4
5,769,410 >>> mbox cmd response data (687 bytes)
5,769,411 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,734 UART: [rt]cmd =0x43455246, len=4
5,810,626 >>> mbox cmd response data (887 bytes)
5,810,627 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,718 UART: [rt]cmd =0x43455252, len=4
5,850,447 >>> mbox cmd response data (783 bytes)
5,850,448 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,827 UART: [rt]cmd =0x53494756, len=196
5,886,344 >>> mbox cmd response data (8 bytes)
5,886,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,358 UART: [rt]cmd =0x4d454153, len=108
5,936,934 >>> mbox cmd response data (12 bytes)
5,936,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,966,400 UART: [rt]cmd =0x494e464f, len=4
5,969,895 >>> mbox cmd response data (264 bytes)
5,969,896 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,611 UART: [rt]cmd =0x54514754, len=24
6,001,398 >>> mbox cmd response data (8 bytes)
6,001,399 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,030,924 UART: [rt]cmd =0x47544744, len=8
6,033,319 >>> mbox cmd response data (104 bytes)
6,033,320 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,827 UART: [rt]cmd =0x50435252, len=8
6,064,364 >>> mbox cmd response data (8 bytes)
6,064,365 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,094,100 UART: [rt]cmd =0x50435251, len=36
6,261,570 >>> mbox cmd response data (1848 bytes)
6,261,571 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,291,544 UART: [rt]cmd =0x50435245, len=56
6,295,089 >>> mbox cmd response data (8 bytes)
6,295,090 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,324,603 UART: [rt]cmd =0x44504543, len=20
6,345,801 >>> mbox cmd response data (44 bytes)
6,345,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,375,299 UART: [rt]cmd =0x44504543, len=24
6,401,382 >>> mbox cmd response data (40 bytes)
6,401,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,431,254 UART: [rt]cmd =0x44504543, len=96
6,468,201 >>> mbox cmd response data (56 bytes)
6,468,202 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,117 UART: [rt]cmd =0x44504543, len=92
6,726,570 >>> mbox cmd response data (6284 bytes)
6,726,571 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,760 UART: [rt]cmd =0x44504543, len=136
6,822,046 >>> mbox cmd response data (136 bytes)
6,822,047 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,851,564 UART: [rt]cmd =0x44504543, len=40
6,877,614 >>> mbox cmd response data (40 bytes)
6,877,615 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,934 UART: [rt]cmd =0x44504543, len=28
6,950,340 >>> mbox cmd response data (2076 bytes)
6,950,341 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,979,946 UART: [rt]cmd =0x44504543, len=36
7,009,740 >>> mbox cmd response data (24 bytes)
7,009,741 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,039,136 UART: [rt]cmd =0x4453424c, len=4
7,053,014 >>> mbox cmd response data (8 bytes)
7,053,015 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,432 UART: [rt]cmd =0x46505344, len=4
7,190,808 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,174,514 ready_for_fw is high
1,174,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,127 UART: [fwproc] Wait for Commands...
1,282,726 UART: [fwproc] Recv command 0x46574c44
1,283,459 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,081 >>> mbox cmd response: success
2,774,081 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,306 UART: [afmc] ++
2,775,474 UART: [afmc] CDI.KEYID = 6
2,775,837 UART: [afmc] SUBJECT.KEYID = 7
2,776,263 UART: [afmc] AUTHORITY.KEYID = 5
2,811,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,555 UART: [afmc] --
2,854,619 UART: [cold-reset] --
2,855,381 UART: [state] Locking Datavault
2,856,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,070 UART: [state] Locking ICCM
2,857,650 UART: [exit] Launching FMC @ 0x40000130
2,862,979 UART:
2,862,995 UART: Running Caliptra FMC ...
2,863,403 UART:
2,863,546 UART: [state] CFI Enabled
2,874,231 UART: [fht] FMC Alias Private Key: 7
2,981,622 UART: [art] Extend RT PCRs Done
2,982,050 UART: [art] Lock RT PCRs Done
2,983,516 UART: [art] Populate DV Done
2,991,785 UART: [fht] FMC Alias Private Key: 7
2,992,911 UART: [art] Derive CDI
2,993,191 UART: [art] Store in in slot 0x4
3,078,746 UART: [art] Derive Key Pair
3,079,106 UART: [art] Store priv key in slot 0x5
3,092,608 UART: [art] Derive Key Pair - Done
3,107,471 UART: [art] Signing Cert with AUTHO
3,107,951 UART: RITY.KEYID = 7
3,123,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,782 UART: [art] PUB.X = 4DBBBB7796C0B8D146C5B46C8D376E47F8C764B968AC96E4E48A67BE2CAF773BD7BA63101097A7CCEE36B154FACCFD01
3,130,571 UART: [art] PUB.Y = 59098E52A9551B4DA8739F96875C657B698F7E6191D586579FFE3BC040F61D239B192D11C913B8055B21492CA85309A9
3,137,502 UART: [art] SIG.R = 752DDB81752E1BBFE5658A90C40516BE08B448938029810EC496199CB6E19F29F5A12AA8E75DDF9AE44C5D8803AD5A72
3,144,266 UART: [art] SIG.S = 95E4303CC300ECE91B0176387BF2483575394A9DB5798D3C45E086DA833733298904AE213C0B26E88838EE454692C840
3,167,870 UART: Caliptra RT
3,168,215 UART: [state] CFI Enabled
3,274,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,260 UART: [rt]cmd =0x46505652, len=4
3,305,931 UART: [rt] FIPS Version
3,306,948 >>> mbox cmd response data (36 bytes)
3,306,949 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,384 UART: [rt]cmd =0x46504c54, len=4
3,337,501 >>> mbox cmd response data (8 bytes)
3,337,502 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,111 UART: [rt]cmd =0x46504c67, len=4
3,368,048 >>> mbox cmd response: failed
3,368,396 UART: [rt] FIPS self test
3,368,727 UART: [kat] ++
3,368,879 UART: [kat] sha1
3,373,118 UART: [kat] SHA2-256
3,375,048 UART: [kat] SHA2-384
3,377,915 UART: [kat] SHA2-512-ACC
3,379,810 UART: [kat] ECC-384
3,389,547 UART: [kat] HMAC-384Kdf
3,394,118 UART: [kat] LMS
3,643,009 UART: [kat] --
4,444,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,874,295 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,797 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,907,201 UART: [rt]cmd =0x46504c67, len=4
5,908,561 >>> mbox cmd response data (8 bytes)
5,908,562 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,937,921 UART: [rt]cmd =0x49444543, len=4
5,944,340 >>> mbox cmd response data (37 bytes)
5,944,341 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,820 UART: [rt]cmd =0x49444549, len=4
5,976,180 >>> mbox cmd response data (104 bytes)
5,976,181 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,690 UART: [rt]cmd =0x49444550, len=4
6,015,739 >>> mbox cmd response data (8 bytes)
6,015,740 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,039 UART: [rt]cmd =0x4c444556, len=4
6,055,617 >>> mbox cmd response data (687 bytes)
6,055,618 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,085,091 UART: [rt]cmd =0x43455246, len=4
6,097,167 >>> mbox cmd response data (887 bytes)
6,097,168 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,455 UART: [rt]cmd =0x43455252, len=4
6,137,362 >>> mbox cmd response data (783 bytes)
6,137,363 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,958 UART: [rt]cmd =0x53494756, len=196
6,173,169 >>> mbox cmd response data (8 bytes)
6,173,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,101 UART: [rt]cmd =0x4d454153, len=108
6,223,957 >>> mbox cmd response data (12 bytes)
6,223,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,229 UART: [rt]cmd =0x494e464f, len=4
6,256,564 >>> mbox cmd response data (264 bytes)
6,256,565 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,038 UART: [rt]cmd =0x54514754, len=24
6,288,101 >>> mbox cmd response data (8 bytes)
6,288,102 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,317,513 UART: [rt]cmd =0x47544744, len=8
6,320,250 >>> mbox cmd response data (104 bytes)
6,320,251 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,476 UART: [rt]cmd =0x50435252, len=8
6,350,925 >>> mbox cmd response data (8 bytes)
6,350,926 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,455 UART: [rt]cmd =0x50435251, len=36
6,547,823 >>> mbox cmd response data (1848 bytes)
6,547,824 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,577,579 UART: [rt]cmd =0x50435245, len=56
6,581,136 >>> mbox cmd response data (8 bytes)
6,581,137 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,508 UART: [rt]cmd =0x44504543, len=20
6,631,360 >>> mbox cmd response data (44 bytes)
6,631,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,660,650 UART: [rt]cmd =0x44504543, len=24
6,686,873 >>> mbox cmd response data (40 bytes)
6,686,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,716,701 UART: [rt]cmd =0x44504543, len=96
6,753,360 >>> mbox cmd response data (56 bytes)
6,753,361 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,783,430 UART: [rt]cmd =0x44504543, len=92
7,012,191 >>> mbox cmd response data (6284 bytes)
7,012,192 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,465 UART: [rt]cmd =0x44504543, len=136
7,109,159 >>> mbox cmd response data (136 bytes)
7,109,160 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,735 UART: [rt]cmd =0x44504543, len=40
7,164,637 >>> mbox cmd response data (40 bytes)
7,164,638 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,163 UART: [rt]cmd =0x44504543, len=28
7,237,399 >>> mbox cmd response data (2076 bytes)
7,237,400 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,267,063 UART: [rt]cmd =0x44504543, len=36
7,297,099 >>> mbox cmd response data (24 bytes)
7,297,100 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,326,587 UART: [rt]cmd =0x4453424c, len=4
7,340,495 >>> mbox cmd response data (8 bytes)
7,340,496 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,369,709 UART: [rt]cmd =0x46505344, len=4
7,478,237 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,793 ready_for_fw is high
1,055,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,411 >>> mbox cmd response: success
2,624,411 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,257 UART:
2,686,273 UART: Running Caliptra FMC ...
2,686,681 UART:
2,686,824 UART: [state] CFI Enabled
2,697,649 UART: [fht] FMC Alias Private Key: 7
2,805,692 UART: [art] Extend RT PCRs Done
2,806,120 UART: [art] Lock RT PCRs Done
2,807,896 UART: [art] Populate DV Done
2,815,839 UART: [fht] FMC Alias Private Key: 7
2,816,777 UART: [art] Derive CDI
2,817,057 UART: [art] Store in in slot 0x4
2,902,118 UART: [art] Derive Key Pair
2,902,478 UART: [art] Store priv key in slot 0x5
2,915,538 UART: [art] Derive Key Pair - Done
2,930,391 UART: [art] Signing Cert with AUTHO
2,930,871 UART: RITY.KEYID = 7
2,946,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,904 UART: [art] PUB.X = 8E8ADCE60ADA316017AB8F2B3018DAA564302241DBDD9D82F48A7CFB14E0EE478B2DAEB50D9C55C1D908310C492E7781
2,953,678 UART: [art] PUB.Y = 54874A09617744ABEC31A3E0A9C96D24E944F65DDFEF5FB35660077B1A382E73833E32A38038B48449D56E215A21FDB7
2,960,622 UART: [art] SIG.R = ADE40E1C3195734DFBE167CA234D503E829C4DC25A98D97C81AA4FBA31671E1BD10EF4E54AA1A6B745F48CE9E252358E
2,967,402 UART: [art] SIG.S = 0C04421B1B68342713A3B9B0F77CE162C553416582F729AC550F50D96EE48864D46A1AA34BEC0EF71018D2B5A56C0EEB
2,991,150 UART: Caliptra RT
2,991,495 UART: [state] CFI Enabled
3,098,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,360 UART: [rt]cmd =0x46505652, len=4
3,130,031 UART: [rt] FIPS Version
3,131,178 >>> mbox cmd response data (36 bytes)
3,131,179 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,296 UART: [rt]cmd =0x46504c54, len=4
3,161,615 >>> mbox cmd response data (8 bytes)
3,161,616 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,191,089 UART: [rt]cmd =0x46504c67, len=4
3,192,050 >>> mbox cmd response: failed
3,192,414 UART: [rt] FIPS self test
3,192,745 UART: [kat] ++
3,192,897 UART: [kat] sha1
3,196,950 UART: [kat] SHA2-256
3,198,880 UART: [kat] SHA2-384
3,201,579 UART: [kat] SHA2-512-ACC
3,203,474 UART: [kat] ECC-384
3,213,473 UART: [kat] HMAC-384Kdf
3,218,102 UART: [kat] LMS
3,466,993 UART: [kat] --
4,161,956 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,592,125 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,601,809 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,631,069 UART: [rt]cmd =0x46504c67, len=4
5,632,071 >>> mbox cmd response data (8 bytes)
5,632,072 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,661,451 UART: [rt]cmd =0x49444543, len=4
5,668,068 >>> mbox cmd response data (37 bytes)
5,668,069 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,697,624 UART: [rt]cmd =0x49444549, len=4
5,699,998 >>> mbox cmd response data (104 bytes)
5,699,999 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,460 UART: [rt]cmd =0x49444550, len=4
5,739,475 >>> mbox cmd response data (8 bytes)
5,739,476 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,768,871 UART: [rt]cmd =0x4c444556, len=4
5,779,459 >>> mbox cmd response data (687 bytes)
5,779,460 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,808,863 UART: [rt]cmd =0x43455246, len=4
5,820,885 >>> mbox cmd response data (887 bytes)
5,820,886 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,175 UART: [rt]cmd =0x43455252, len=4
5,861,068 >>> mbox cmd response data (783 bytes)
5,861,069 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,526 UART: [rt]cmd =0x53494756, len=196
5,896,755 >>> mbox cmd response data (8 bytes)
5,896,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,931 UART: [rt]cmd =0x4d454153, len=108
5,947,595 >>> mbox cmd response data (12 bytes)
5,947,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,961 UART: [rt]cmd =0x494e464f, len=4
5,980,484 >>> mbox cmd response data (264 bytes)
5,980,485 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,850 UART: [rt]cmd =0x54514754, len=24
6,011,951 >>> mbox cmd response data (8 bytes)
6,011,952 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,041,313 UART: [rt]cmd =0x47544744, len=8
6,043,926 >>> mbox cmd response data (104 bytes)
6,043,927 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,073,052 UART: [rt]cmd =0x50435252, len=8
6,074,379 >>> mbox cmd response data (8 bytes)
6,074,380 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,103,937 UART: [rt]cmd =0x50435251, len=36
6,271,373 >>> mbox cmd response data (1848 bytes)
6,271,374 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,301,203 UART: [rt]cmd =0x50435245, len=56
6,304,790 >>> mbox cmd response data (8 bytes)
6,304,791 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,334,356 UART: [rt]cmd =0x44504543, len=20
6,354,914 >>> mbox cmd response data (44 bytes)
6,354,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,520 UART: [rt]cmd =0x44504543, len=24
6,410,553 >>> mbox cmd response data (40 bytes)
6,410,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,440,435 UART: [rt]cmd =0x44504543, len=96
6,477,772 >>> mbox cmd response data (56 bytes)
6,477,773 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,507,510 UART: [rt]cmd =0x44504543, len=92
6,735,595 >>> mbox cmd response data (6284 bytes)
6,735,596 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,765,779 UART: [rt]cmd =0x44504543, len=136
6,831,847 >>> mbox cmd response data (136 bytes)
6,831,848 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,861,501 UART: [rt]cmd =0x44504543, len=40
6,887,671 >>> mbox cmd response data (40 bytes)
6,887,672 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,916,983 UART: [rt]cmd =0x44504543, len=28
6,960,161 >>> mbox cmd response data (2076 bytes)
6,960,162 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,989,733 UART: [rt]cmd =0x44504543, len=36
7,019,667 >>> mbox cmd response data (24 bytes)
7,019,668 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,049,017 UART: [rt]cmd =0x4453424c, len=4
7,062,761 >>> mbox cmd response data (8 bytes)
7,062,762 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,963 UART: [rt]cmd =0x46505344, len=4
7,200,203 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
192,876 UART:
193,222 UART: Running Caliptra ROM ...
194,378 UART:
194,531 UART: [state] CFI Enabled
262,677 UART: [state] LifecycleState = Unprovisioned
264,605 UART: [state] DebugLocked = No
266,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,641 UART: [kat] SHA2-256
441,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,823 UART: [kat] ++
452,311 UART: [kat] sha1
464,171 UART: [kat] SHA2-256
466,862 UART: [kat] SHA2-384
472,837 UART: [kat] SHA2-512-ACC
475,193 UART: [kat] ECC-384
2,766,550 UART: [kat] HMAC-384Kdf
2,779,540 UART: [kat] LMS
3,969,879 UART: [kat] --
3,974,927 UART: [cold-reset] ++
3,977,514 UART: [fht] Storing FHT @ 0x50003400
3,989,919 UART: [idev] ++
3,990,485 UART: [idev] CDI.KEYID = 6
3,991,499 UART: [idev] SUBJECT.KEYID = 7
3,992,655 UART: [idev] UDS.KEYID = 0
3,993,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,013,391 UART: [idev] Erasing UDS.KEYID = 0
7,322,896 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,463 UART: [idev] --
7,350,425 UART: [ldev] ++
7,350,992 UART: [ldev] CDI.KEYID = 6
7,351,989 UART: [ldev] SUBJECT.KEYID = 5
7,353,153 UART: [ldev] AUTHORITY.KEYID = 7
7,354,382 UART: [ldev] FE.KEYID = 1
7,399,828 UART: [ldev] Erasing FE.KEYID = 1
10,737,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,827 UART: [ldev] --
13,116,463 UART: [fwproc] Waiting for Commands...
13,119,746 UART: [fwproc] Received command 0x46504c54
13,122,259 UART: [kat] SHA2-256
13,291,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,302,261 UART: [kat] ++
13,302,716 UART: [kat] sha1
13,315,079 UART: [kat] SHA2-256
13,317,777 UART: [kat] SHA2-384
13,324,352 UART: [kat] SHA2-512-ACC
13,326,698 UART: [kat] ECC-384
15,611,405 UART: [kat] HMAC-384Kdf
15,643,055 UART: [kat] LMS
16,832,545 UART: [kat] --
16,833,263 >>> mbox cmd response data (8 bytes)
16,833,741 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,834,916 UART: [fwproc] Received command 0x46504c67
16,837,556 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,780,435 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,314,212 >>> mbox cmd response data (8 bytes)
16,315,100 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,316,886 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,435 UART:
192,830 UART: Running Caliptra ROM ...
193,993 UART:
603,705 UART: [state] CFI Enabled
616,760 UART: [state] LifecycleState = Unprovisioned
618,668 UART: [state] DebugLocked = No
621,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,047 UART: [kat] SHA2-256
795,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,350 UART: [kat] ++
806,882 UART: [kat] sha1
817,389 UART: [kat] SHA2-256
820,070 UART: [kat] SHA2-384
825,455 UART: [kat] SHA2-512-ACC
827,790 UART: [kat] ECC-384
3,112,872 UART: [kat] HMAC-384Kdf
3,123,561 UART: [kat] LMS
4,313,664 UART: [kat] --
4,318,924 UART: [cold-reset] ++
4,320,753 UART: [fht] Storing FHT @ 0x50003400
4,333,588 UART: [idev] ++
4,334,150 UART: [idev] CDI.KEYID = 6
4,335,122 UART: [idev] SUBJECT.KEYID = 7
4,336,341 UART: [idev] UDS.KEYID = 0
4,337,464 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,352,094 UART: [idev] Erasing UDS.KEYID = 0
7,621,693 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,948 UART: [idev] --
7,645,910 UART: [ldev] ++
7,646,548 UART: [ldev] CDI.KEYID = 6
7,647,460 UART: [ldev] SUBJECT.KEYID = 5
7,648,677 UART: [ldev] AUTHORITY.KEYID = 7
7,649,985 UART: [ldev] FE.KEYID = 1
7,662,228 UART: [ldev] Erasing FE.KEYID = 1
10,949,744 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,300 UART: [ldev] --
13,310,864 UART: [fwproc] Waiting for Commands...
13,313,511 UART: [fwproc] Received command 0x46504c54
13,316,024 UART: [kat] SHA2-256
13,485,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,496,033 UART: [kat] ++
13,496,498 UART: [kat] sha1
13,507,272 UART: [kat] SHA2-256
13,509,964 UART: [kat] SHA2-384
13,515,432 UART: [kat] SHA2-512-ACC
13,517,832 UART: [kat] ECC-384
15,801,397 UART: [kat] HMAC-384Kdf
15,814,599 UART: [kat] LMS
17,004,065 UART: [kat] --
17,004,792 >>> mbox cmd response data (8 bytes)
17,005,261 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,007,431 UART: [fwproc] Received command 0x46504c67
17,010,081 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,559 writing to cptra_bootfsm_go
4,123,746 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,529,024 >>> mbox cmd response data (8 bytes)
16,529,836 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,531,499 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,301 UART:
192,685 UART: Running Caliptra ROM ...
193,795 UART:
193,941 UART: [state] CFI Enabled
263,519 UART: [state] LifecycleState = Unprovisioned
265,376 UART: [state] DebugLocked = No
268,050 UART: [state] WD Timer not started. Device not locked for debugging
272,073 UART: [kat] SHA2-256
451,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,744 UART: [kat] ++
463,282 UART: [kat] sha1
474,242 UART: [kat] SHA2-256
477,256 UART: [kat] SHA2-384
483,991 UART: [kat] SHA2-512-ACC
486,923 UART: [kat] ECC-384
2,948,470 UART: [kat] HMAC-384Kdf
2,981,418 UART: [kat] LMS
3,510,888 UART: [kat] --
3,515,580 UART: [cold-reset] ++
3,517,031 UART: [fht] FHT @ 0x50003400
3,529,153 UART: [idev] ++
3,529,712 UART: [idev] CDI.KEYID = 6
3,530,591 UART: [idev] SUBJECT.KEYID = 7
3,531,802 UART: [idev] UDS.KEYID = 0
3,532,847 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,553,020 UART: [idev] Erasing UDS.KEYID = 0
6,036,835 UART: [idev] Sha1 KeyId Algorithm
6,060,310 UART: [idev] --
6,064,478 UART: [ldev] ++
6,065,053 UART: [ldev] CDI.KEYID = 6
6,065,962 UART: [ldev] SUBJECT.KEYID = 5
6,067,178 UART: [ldev] AUTHORITY.KEYID = 7
6,068,415 UART: [ldev] FE.KEYID = 1
6,108,604 UART: [ldev] Erasing FE.KEYID = 1
8,614,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,481 UART: [ldev] --
10,423,526 UART: [fwproc] Wait for Commands...
10,425,947 UART: [fwproc] Recv command 0x46504c54
10,428,317 UART: [kat] SHA2-256
10,607,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,619,151 UART: [kat] ++
10,619,697 UART: [kat] sha1
10,631,507 UART: [kat] SHA2-256
10,634,585 UART: [kat] SHA2-384
10,639,864 UART: [kat] SHA2-512-ACC
10,642,805 UART: [kat] ECC-384
13,094,674 UART: [kat] HMAC-384Kdf
13,115,644 UART: [kat] LMS
13,645,169 UART: [kat] --
13,645,873 >>> mbox cmd response data (8 bytes)
13,646,339 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,648,036 UART: [fwproc] Recv command 0x46504c67
13,650,593 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,256 writing to cptra_bootfsm_go
3,359,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,246,703 >>> mbox cmd response data (8 bytes)
13,247,503 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,248,854 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,524 UART:
192,906 UART: Running Caliptra ROM ...
194,096 UART:
603,467 UART: [state] CFI Enabled
614,913 UART: [state] LifecycleState = Unprovisioned
616,777 UART: [state] DebugLocked = No
619,123 UART: [state] WD Timer not started. Device not locked for debugging
623,095 UART: [kat] SHA2-256
802,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,810 UART: [kat] ++
814,342 UART: [kat] sha1
826,529 UART: [kat] SHA2-256
829,549 UART: [kat] SHA2-384
836,885 UART: [kat] SHA2-512-ACC
839,873 UART: [kat] ECC-384
3,283,047 UART: [kat] HMAC-384Kdf
3,295,792 UART: [kat] LMS
3,825,332 UART: [kat] --
3,829,378 UART: [cold-reset] ++
3,830,561 UART: [fht] FHT @ 0x50003400
3,841,751 UART: [idev] ++
3,842,314 UART: [idev] CDI.KEYID = 6
3,843,229 UART: [idev] SUBJECT.KEYID = 7
3,844,441 UART: [idev] UDS.KEYID = 0
3,845,436 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,857,997 UART: [idev] Erasing UDS.KEYID = 0
6,313,831 UART: [idev] Sha1 KeyId Algorithm
6,337,787 UART: [idev] --
6,341,785 UART: [ldev] ++
6,342,359 UART: [ldev] CDI.KEYID = 6
6,343,273 UART: [ldev] SUBJECT.KEYID = 5
6,344,432 UART: [ldev] AUTHORITY.KEYID = 7
6,345,819 UART: [ldev] FE.KEYID = 1
6,357,397 UART: [ldev] Erasing FE.KEYID = 1
8,828,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,038 UART: [ldev] --
10,620,876 UART: [fwproc] Wait for Commands...
10,623,966 UART: [fwproc] Recv command 0x46504c54
10,626,390 UART: [kat] SHA2-256
10,805,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,817,205 UART: [kat] ++
10,817,744 UART: [kat] sha1
10,829,531 UART: [kat] SHA2-256
10,832,528 UART: [kat] SHA2-384
10,838,628 UART: [kat] SHA2-512-ACC
10,841,568 UART: [kat] ECC-384
13,283,899 UART: [kat] HMAC-384Kdf
13,295,848 UART: [kat] LMS
13,825,431 UART: [kat] --
13,826,159 >>> mbox cmd response data (8 bytes)
13,826,611 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,828,568 UART: [fwproc] Recv command 0x46504c67
13,831,121 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,946 writing to cptra_bootfsm_go
3,693,915 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,475,015 >>> mbox cmd response data (8 bytes)
13,475,726 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,478,037 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,188 UART:
192,574 UART: Running Caliptra ROM ...
193,732 UART:
193,886 UART: [state] CFI Enabled
264,652 UART: [state] LifecycleState = Unprovisioned
267,027 UART: [state] DebugLocked = No
268,782 UART: [state] WD Timer not started. Device not locked for debugging
274,038 UART: [kat] SHA2-256
463,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,669 UART: [kat] ++
475,148 UART: [kat] sha1
486,569 UART: [kat] SHA2-256
489,576 UART: [kat] SHA2-384
495,395 UART: [kat] SHA2-512-ACC
497,949 UART: [kat] ECC-384
2,947,577 UART: [kat] HMAC-384Kdf
2,969,801 UART: [kat] LMS
3,501,552 UART: [kat] --
3,506,603 UART: [cold-reset] ++
3,509,028 UART: [fht] FHT @ 0x50003400
3,518,984 UART: [idev] ++
3,519,713 UART: [idev] CDI.KEYID = 6
3,520,651 UART: [idev] SUBJECT.KEYID = 7
3,521,860 UART: [idev] UDS.KEYID = 0
3,522,825 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,542,173 UART: [idev] Erasing UDS.KEYID = 0
6,028,666 UART: [idev] Sha1 KeyId Algorithm
6,051,888 UART: [idev] --
6,057,213 UART: [ldev] ++
6,057,959 UART: [ldev] CDI.KEYID = 6
6,058,840 UART: [ldev] SUBJECT.KEYID = 5
6,059,955 UART: [ldev] AUTHORITY.KEYID = 7
6,061,275 UART: [ldev] FE.KEYID = 1
6,098,584 UART: [ldev] Erasing FE.KEYID = 1
8,604,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,331 UART: [ldev] --
10,410,925 UART: [fwproc] Wait for Commands...
10,412,590 UART: [fwproc] Recv command 0x46504c54
10,415,174 UART: [kat] SHA2-256
10,604,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,615,725 UART: [kat] ++
10,616,181 UART: [kat] sha1
10,628,204 UART: [kat] SHA2-256
10,631,277 UART: [kat] SHA2-384
10,636,418 UART: [kat] SHA2-512-ACC
10,639,040 UART: [kat] ECC-384
13,101,028 UART: [kat] HMAC-384Kdf
13,124,221 UART: [kat] LMS
13,656,061 UART: [kat] --
13,656,766 >>> mbox cmd response data (8 bytes)
13,657,195 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,658,501 UART: [fwproc] Recv command 0x46504c67
13,660,998 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,438,633 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,383,778 >>> mbox cmd response data (8 bytes)
13,384,586 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,385,933 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,460 UART:
192,862 UART: Running Caliptra ROM ...
193,981 UART:
603,717 UART: [state] CFI Enabled
617,474 UART: [state] LifecycleState = Unprovisioned
619,874 UART: [state] DebugLocked = No
621,798 UART: [state] WD Timer not started. Device not locked for debugging
626,384 UART: [kat] SHA2-256
816,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,019 UART: [kat] ++
827,611 UART: [kat] sha1
838,172 UART: [kat] SHA2-256
841,179 UART: [kat] SHA2-384
846,722 UART: [kat] SHA2-512-ACC
849,329 UART: [kat] ECC-384
3,291,632 UART: [kat] HMAC-384Kdf
3,305,096 UART: [kat] LMS
3,836,882 UART: [kat] --
3,841,496 UART: [cold-reset] ++
3,842,948 UART: [fht] FHT @ 0x50003400
3,854,859 UART: [idev] ++
3,855,545 UART: [idev] CDI.KEYID = 6
3,856,425 UART: [idev] SUBJECT.KEYID = 7
3,857,712 UART: [idev] UDS.KEYID = 0
3,858,684 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,875,244 UART: [idev] Erasing UDS.KEYID = 0
6,334,454 UART: [idev] Sha1 KeyId Algorithm
6,357,429 UART: [idev] --
6,361,916 UART: [ldev] ++
6,362,601 UART: [ldev] CDI.KEYID = 6
6,363,521 UART: [ldev] SUBJECT.KEYID = 5
6,364,681 UART: [ldev] AUTHORITY.KEYID = 7
6,365,912 UART: [ldev] FE.KEYID = 1
6,376,840 UART: [ldev] Erasing FE.KEYID = 1
8,853,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,828 UART: [ldev] --
10,645,069 UART: [fwproc] Wait for Commands...
10,647,609 UART: [fwproc] Recv command 0x46504c54
10,650,250 UART: [kat] SHA2-256
10,839,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,850,738 UART: [kat] ++
10,851,254 UART: [kat] sha1
10,863,257 UART: [kat] SHA2-256
10,866,301 UART: [kat] SHA2-384
10,872,295 UART: [kat] SHA2-512-ACC
10,874,863 UART: [kat] ECC-384
13,317,485 UART: [kat] HMAC-384Kdf
13,329,341 UART: [kat] LMS
13,861,243 UART: [kat] --
13,861,937 >>> mbox cmd response data (8 bytes)
13,862,376 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,863,482 UART: [fwproc] Recv command 0x46504c67
13,865,978 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,752,115 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,590,463 >>> mbox cmd response data (8 bytes)
13,591,132 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,592,355 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,563 UART: [kat] SHA2-256
881,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,609 UART: [kat] ++
885,761 UART: [kat] sha1
889,959 UART: [kat] SHA2-256
891,897 UART: [kat] SHA2-384
894,704 UART: [kat] SHA2-512-ACC
896,605 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
906,920 UART: [kat] LMS
1,475,116 UART: [kat] --
1,476,069 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,230 UART: [idev] ++
1,479,398 UART: [idev] CDI.KEYID = 6
1,479,758 UART: [idev] SUBJECT.KEYID = 7
1,480,182 UART: [idev] UDS.KEYID = 0
1,480,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,570 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,565 UART: [ldev] Erasing FE.KEYID = 1
1,545,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,806 UART: [ldev] --
1,585,155 UART: [fwproc] Waiting for Commands...
1,585,786 UART: [fwproc] Received command 0x46504c54
1,586,693 UART: [kat] SHA2-256
2,380,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,384,739 UART: [kat] ++
2,384,891 UART: [kat] sha1
2,389,121 UART: [kat] SHA2-256
2,391,059 UART: [kat] SHA2-384
2,393,596 UART: [kat] SHA2-512-ACC
2,395,496 UART: [kat] ECC-384
2,400,953 UART: [kat] HMAC-384Kdf
2,405,535 UART: [kat] LMS
2,973,731 UART: [kat] --
2,973,969 >>> mbox cmd response data (8 bytes)
2,973,970 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,974,090 UART: [fwproc] Received command 0x46504c67
2,975,044 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,563 >>> mbox cmd response data (8 bytes)
2,715,564 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,715,802 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,661 UART: [kat] LMS
1,475,857 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,048 UART: [fht] Storing FHT @ 0x50003400
1,479,725 UART: [idev] ++
1,479,893 UART: [idev] CDI.KEYID = 6
1,480,253 UART: [idev] SUBJECT.KEYID = 7
1,480,677 UART: [idev] UDS.KEYID = 0
1,481,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,241 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,877 UART: [idev] --
1,514,976 UART: [ldev] ++
1,515,144 UART: [ldev] CDI.KEYID = 6
1,515,507 UART: [ldev] SUBJECT.KEYID = 5
1,515,933 UART: [ldev] AUTHORITY.KEYID = 7
1,516,396 UART: [ldev] FE.KEYID = 1
1,521,546 UART: [ldev] Erasing FE.KEYID = 1
1,547,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,207 UART: [ldev] --
1,586,586 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46504c54
1,588,324 UART: [kat] SHA2-256
2,382,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,370 UART: [kat] ++
2,386,522 UART: [kat] sha1
2,390,810 UART: [kat] SHA2-256
2,392,748 UART: [kat] SHA2-384
2,395,411 UART: [kat] SHA2-512-ACC
2,397,311 UART: [kat] ECC-384
2,402,954 UART: [kat] HMAC-384Kdf
2,407,580 UART: [kat] LMS
2,975,776 UART: [kat] --
2,976,014 >>> mbox cmd response data (8 bytes)
2,976,015 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,217 UART: [fwproc] Received command 0x46504c67
2,977,171 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,944 >>> mbox cmd response data (8 bytes)
2,717,945 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,345 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
893,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,775 UART: [kat] ++
897,927 UART: [kat] sha1
902,087 UART: [kat] SHA2-256
904,027 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,226 UART: [kat] HMAC-384Kdf
922,630 UART: [kat] LMS
1,170,958 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,002 UART: [idev] Erasing UDS.KEYID = 0
1,201,009 UART: [idev] Sha1 KeyId Algorithm
1,209,529 UART: [idev] --
1,210,553 UART: [ldev] ++
1,210,721 UART: [ldev] CDI.KEYID = 6
1,211,084 UART: [ldev] SUBJECT.KEYID = 5
1,211,510 UART: [ldev] AUTHORITY.KEYID = 7
1,211,973 UART: [ldev] FE.KEYID = 1
1,217,253 UART: [ldev] Erasing FE.KEYID = 1
1,243,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,391 UART: [ldev] --
1,282,756 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46504c54
1,284,386 UART: [kat] SHA2-256
2,090,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,161 UART: [kat] ++
2,094,313 UART: [kat] sha1
2,098,539 UART: [kat] SHA2-256
2,100,479 UART: [kat] SHA2-384
2,103,274 UART: [kat] SHA2-512-ACC
2,105,174 UART: [kat] ECC-384
2,114,553 UART: [kat] HMAC-384Kdf
2,118,999 UART: [kat] LMS
2,367,327 UART: [kat] --
2,367,565 >>> mbox cmd response data (8 bytes)
2,367,566 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,843 UART: [fwproc] Recv command 0x46504c67
2,368,736 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,643 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,070 >>> mbox cmd response data (8 bytes)
2,111,071 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,445 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,790 UART: [kat] SHA2-256
903,730 UART: [kat] SHA2-384
906,425 UART: [kat] SHA2-512-ACC
908,326 UART: [kat] ECC-384
918,645 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,909 UART: [idev] Erasing UDS.KEYID = 0
1,200,944 UART: [idev] Sha1 KeyId Algorithm
1,209,408 UART: [idev] --
1,210,472 UART: [ldev] ++
1,210,640 UART: [ldev] CDI.KEYID = 6
1,211,003 UART: [ldev] SUBJECT.KEYID = 5
1,211,429 UART: [ldev] AUTHORITY.KEYID = 7
1,211,892 UART: [ldev] FE.KEYID = 1
1,217,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,238 UART: [ldev] --
1,282,529 UART: [fwproc] Wait for Commands...
1,283,243 UART: [fwproc] Recv command 0x46504c54
1,284,089 UART: [kat] SHA2-256
2,089,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,864 UART: [kat] ++
2,094,016 UART: [kat] sha1
2,098,296 UART: [kat] SHA2-256
2,100,236 UART: [kat] SHA2-384
2,103,161 UART: [kat] SHA2-512-ACC
2,105,061 UART: [kat] ECC-384
2,114,264 UART: [kat] HMAC-384Kdf
2,119,044 UART: [kat] LMS
2,367,372 UART: [kat] --
2,367,610 >>> mbox cmd response data (8 bytes)
2,367,611 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,860 UART: [fwproc] Recv command 0x46504c67
2,368,753 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,208 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,115 >>> mbox cmd response data (8 bytes)
2,114,116 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,572 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,545 UART: [idev] ++
1,172,713 UART: [idev] CDI.KEYID = 6
1,173,074 UART: [idev] SUBJECT.KEYID = 7
1,173,499 UART: [idev] UDS.KEYID = 0
1,173,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,214,938 UART: [ldev] Erasing FE.KEYID = 1
1,240,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,770 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,280,959 UART: [fwproc] Recv command 0x46504c54
1,281,813 UART: [kat] SHA2-256
2,085,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,492 UART: [kat] ++
2,089,644 UART: [kat] sha1
2,093,952 UART: [kat] SHA2-256
2,095,892 UART: [kat] SHA2-384
2,098,437 UART: [kat] SHA2-512-ACC
2,100,337 UART: [kat] ECC-384
2,109,904 UART: [kat] HMAC-384Kdf
2,114,508 UART: [kat] LMS
2,362,820 UART: [kat] --
2,363,061 >>> mbox cmd response data (8 bytes)
2,363,062 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,363,378 UART: [fwproc] Recv command 0x46504c67
2,364,282 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,103,807 >>> mbox cmd response data (8 bytes)
2,103,808 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,242 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,174,286 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,241,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46504c54
1,282,794 UART: [kat] SHA2-256
2,086,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,090,473 UART: [kat] ++
2,090,625 UART: [kat] sha1
2,094,881 UART: [kat] SHA2-256
2,096,821 UART: [kat] SHA2-384
2,099,618 UART: [kat] SHA2-512-ACC
2,101,518 UART: [kat] ECC-384
2,111,337 UART: [kat] HMAC-384Kdf
2,115,899 UART: [kat] LMS
2,364,211 UART: [kat] --
2,364,452 >>> mbox cmd response data (8 bytes)
2,364,453 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,681 UART: [fwproc] Recv command 0x46504c67
2,365,585 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,655 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,536 >>> mbox cmd response data (8 bytes)
2,105,537 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,811 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
192,082 UART:
192,484 UART: Running Caliptra ROM ...
193,622 UART:
193,777 UART: [state] CFI Enabled
267,223 UART: [state] LifecycleState = Unprovisioned
269,210 UART: [state] DebugLocked = No
271,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,487 UART: [kat] SHA2-256
446,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,670 UART: [kat] ++
457,273 UART: [kat] sha1
468,511 UART: [kat] SHA2-256
471,236 UART: [kat] SHA2-384
477,013 UART: [kat] SHA2-512-ACC
479,389 UART: [kat] ECC-384
2,769,145 UART: [kat] HMAC-384Kdf
2,801,598 UART: [kat] LMS
3,991,904 UART: [kat] --
3,995,485 UART: [cold-reset] ++
3,997,707 UART: [fht] Storing FHT @ 0x50003400
4,008,620 UART: [idev] ++
4,009,266 UART: [idev] CDI.KEYID = 6
4,010,213 UART: [idev] SUBJECT.KEYID = 7
4,011,400 UART: [idev] UDS.KEYID = 0
4,012,405 ready_for_fw is high
4,012,631 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,133 UART: [idev] Erasing UDS.KEYID = 0
7,348,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,959 UART: [idev] --
7,373,040 UART: [ldev] ++
7,373,627 UART: [ldev] CDI.KEYID = 6
7,374,540 UART: [ldev] SUBJECT.KEYID = 5
7,375,757 UART: [ldev] AUTHORITY.KEYID = 7
7,377,066 UART: [ldev] FE.KEYID = 1
7,403,925 UART: [ldev] Erasing FE.KEYID = 1
10,738,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,819 UART: [ldev] --
13,099,088 UART: [fwproc] Waiting for Commands...
13,102,001 UART: [fwproc] Received command 0x46574c44
13,104,193 UART: [fwproc] Received Image of size 114124 bytes
17,154,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,131 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,116 >>> mbox cmd response: success
17,619,544 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,623,479 UART: [afmc] ++
17,624,119 UART: [afmc] CDI.KEYID = 6
17,625,033 UART: [afmc] SUBJECT.KEYID = 7
17,626,254 UART: [afmc] AUTHORITY.KEYID = 5
20,983,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,337 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,773 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,565 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,042 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,260 UART: [afmc] --
23,355,553 UART: [cold-reset] --
23,359,198 UART: [state] Locking Datavault
23,364,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,523 UART: [state] Locking ICCM
23,369,003 UART: [exit] Launching FMC @ 0x40000130
23,377,369 UART:
23,377,607 UART: Running Caliptra FMC ...
23,378,709 UART:
23,378,867 UART: [state] CFI Enabled
23,444,969 UART: [fht] FMC Alias Private Key: 7
25,783,447 UART: [art] Extend RT PCRs Done
25,784,662 UART: [art] Lock RT PCRs Done
25,786,175 UART: [art] Populate DV Done
25,791,590 UART: [fht] FMC Alias Private Key: 7
25,793,139 UART: [art] Derive CDI
25,793,903 UART: [art] Store in in slot 0x4
25,853,401 UART: [art] Derive Key Pair
25,854,435 UART: [art] Store priv key in slot 0x5
29,147,489 UART: [art] Derive Key Pair - Done
29,160,061 UART: [art] Signing Cert with AUTHO
29,161,364 UART: RITY.KEYID = 7
31,449,026 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,537 UART: [art] PUB.X = C7A725A3B24FC6AABD7A408523D107A20CE2E3F71ADC39912D5CE929D76D91FEEFECBD268D64EF7E15CC33E95BA9F0CC
31,457,819 UART: [art] PUB.Y = DBB660B3ADE7E17CECA5353EE935146908CAD11C75F7776F4E612BD1BA31C5A6812969FBA693529B5934E8A2561F7207
31,465,036 UART: [art] SIG.R = 99011CF8438284115EFEE08443CCF50B9C7FC8E60334C5DFE20D365ED4C78C1D90B2DF0668F06E804AE286316A3494E6
31,472,415 UART: [art] SIG.S = 9236638FE8822DA17A557F8F80C4553E7E2388287B857B7A4E54BD19A9AAD8BB84CC6CD0BC4567EF9D4F2B4E17C52624
32,777,583 UART: Caliptra RT
32,778,296 UART: [state] CFI Enabled
32,938,751 UART: [rt] RT listening for mailbox commands...
32,970,047 UART: [rt]cmd =0x46504c54, len=4
32,971,547 >>> mbox cmd response data (8 bytes)
32,971,976 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,002,061 UART: [rt]cmd =0x46504c67, len=4
33,003,357 >>> mbox cmd response: failed
33,004,390 UART: [rt] FIPS self test
33,005,329 UART: [kat] ++
33,005,785 UART: [kat] sha1
33,010,199 UART: [kat] SHA2-256
33,012,000 UART: [kat] SHA2-384
33,014,799 UART: [kat] SHA2-512-ACC
33,017,011 UART: [kat] ECC-384
36,296,426 UART: [kat] HMAC-384Kdf
36,304,441 UART: [kat] LMS
36,714,695 UART: [kat] --
36,866,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,699,424 UART: [rt] Verify complete
40,849,141 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,878,984 UART: [rt]cmd =0x46504c67, len=4
40,880,461 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,803,947 ready_for_fw is high
3,804,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,870,870 >>> mbox cmd response: success
17,871,493 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,563,113 UART:
23,563,512 UART: Running Caliptra FMC ...
23,564,645 UART:
23,564,798 UART: [state] CFI Enabled
23,633,286 UART: [fht] FMC Alias Private Key: 7
25,971,066 UART: [art] Extend RT PCRs Done
25,972,293 UART: [art] Lock RT PCRs Done
25,973,548 UART: [art] Populate DV Done
25,979,031 UART: [fht] FMC Alias Private Key: 7
25,980,581 UART: [art] Derive CDI
25,981,562 UART: [art] Store in in slot 0x4
26,041,788 UART: [art] Derive Key Pair
26,042,796 UART: [art] Store priv key in slot 0x5
29,335,836 UART: [art] Derive Key Pair - Done
29,348,782 UART: [art] Signing Cert with AUTHO
29,350,124 UART: RITY.KEYID = 7
31,637,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,501 UART: [art] PUB.X = 8C13AB5C89323D76E846FF5DB8BC844C0604EE1518F52364B18EE575F51553BA49FE9C3CDEB700ADFEC0CD8B17F78117
31,646,761 UART: [art] PUB.Y = 72559D5613AC8EBBEC3D45B42CE1274656047F804A4E87BB4BE04E809A9BFF34F12D5753EE7B96F3288A3CFD1B12F1AB
31,654,062 UART: [art] SIG.R = FFA05A0C21C3D01404A6704CEC69C7A47853566C57B3BBC27C75C882DF00CEEBD86D690A9FA440593CDB51942C70565F
31,661,566 UART: [art] SIG.S = 729BBD516BDCB721714ECBA8818A776080AA9887EA7D34A02730843CB03F400B36C4BBE602F8630C1B1E4C0F31191E46
32,966,735 UART: Caliptra RT
32,967,452 UART: [state] CFI Enabled
33,126,298 UART: [rt] RT listening for mailbox commands...
33,157,611 UART: [rt]cmd =0x46504c54, len=4
33,159,033 >>> mbox cmd response data (8 bytes)
33,159,460 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,189,784 UART: [rt]cmd =0x46504c67, len=4
33,191,267 >>> mbox cmd response: failed
33,192,555 UART: [rt] FIPS self test
33,193,494 UART: [kat] ++
33,193,945 UART: [kat] sha1
33,198,266 UART: [kat] SHA2-256
33,200,104 UART: [kat] SHA2-384
33,202,859 UART: [kat] SHA2-512-ACC
33,205,106 UART: [kat] ECC-384
36,485,191 UART: [kat] HMAC-384Kdf
36,492,421 UART: [kat] LMS
36,902,706 UART: [kat] --
37,033,859 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,865,856 UART: [rt] Verify complete
41,036,599 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,066,562 UART: [rt]cmd =0x46504c67, len=4
41,068,152 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,525 UART:
192,888 UART: Running Caliptra ROM ...
193,989 UART:
603,650 UART: [state] CFI Enabled
618,543 UART: [state] LifecycleState = Unprovisioned
620,458 UART: [state] DebugLocked = No
622,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,878 UART: [kat] SHA2-256
797,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,164 UART: [kat] ++
808,662 UART: [kat] sha1
819,823 UART: [kat] SHA2-256
822,484 UART: [kat] SHA2-384
829,826 UART: [kat] SHA2-512-ACC
832,208 UART: [kat] ECC-384
3,116,388 UART: [kat] HMAC-384Kdf
3,127,494 UART: [kat] LMS
4,317,658 UART: [kat] --
4,321,178 UART: [cold-reset] ++
4,322,614 UART: [fht] Storing FHT @ 0x50003400
4,334,881 UART: [idev] ++
4,335,450 UART: [idev] CDI.KEYID = 6
4,336,439 UART: [idev] SUBJECT.KEYID = 7
4,337,617 UART: [idev] UDS.KEYID = 0
4,338,601 ready_for_fw is high
4,338,817 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,194 UART: [idev] Erasing UDS.KEYID = 0
7,626,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,730 UART: [idev] --
7,654,010 UART: [ldev] ++
7,654,600 UART: [ldev] CDI.KEYID = 6
7,655,565 UART: [ldev] SUBJECT.KEYID = 5
7,656,822 UART: [ldev] AUTHORITY.KEYID = 7
7,657,984 UART: [ldev] FE.KEYID = 1
7,669,306 UART: [ldev] Erasing FE.KEYID = 1
10,959,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,899 UART: [ldev] --
13,317,189 UART: [fwproc] Waiting for Commands...
13,320,549 UART: [fwproc] Received command 0x46574c44
13,322,736 UART: [fwproc] Received Image of size 114124 bytes
17,373,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,669 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,259 >>> mbox cmd response: success
17,838,668 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,842,800 UART: [afmc] ++
17,843,383 UART: [afmc] CDI.KEYID = 6
17,844,291 UART: [afmc] SUBJECT.KEYID = 7
17,845,559 UART: [afmc] AUTHORITY.KEYID = 5
21,158,539 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,235 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,497 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,860 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,689 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,192 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,373 UART: [afmc] --
23,523,783 UART: [cold-reset] --
23,526,189 UART: [state] Locking Datavault
23,529,222 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,978 UART: [state] Locking ICCM
23,533,665 UART: [exit] Launching FMC @ 0x40000130
23,542,062 UART:
23,542,307 UART: Running Caliptra FMC ...
23,543,406 UART:
23,543,571 UART: [state] CFI Enabled
23,552,268 UART: [fht] FMC Alias Private Key: 7
25,883,068 UART: [art] Extend RT PCRs Done
25,884,292 UART: [art] Lock RT PCRs Done
25,886,028 UART: [art] Populate DV Done
25,891,340 UART: [fht] FMC Alias Private Key: 7
25,892,938 UART: [art] Derive CDI
25,893,866 UART: [art] Store in in slot 0x4
25,936,193 UART: [art] Derive Key Pair
25,937,192 UART: [art] Store priv key in slot 0x5
29,179,090 UART: [art] Derive Key Pair - Done
29,192,111 UART: [art] Signing Cert with AUTHO
29,193,415 UART: RITY.KEYID = 7
31,472,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,079 UART: [art] PUB.X = F0B26C30B750C418F6AC9658878F3D7AE91DBEE7F3109A9686D0B0567B92D58139D5FB4AC8D6A0270948399700281271
31,481,264 UART: [art] PUB.Y = 507DBDA2DF6C1A4617FC6D42EFD4B04D482817628297792AE3F518F3C49F35D56AE6790333A18FB103704767CBE08B60
31,488,533 UART: [art] SIG.R = 11317F4F9E414BCE92970AA2605ED9B9B3108CFA3C103B86E94E99B5B0775FFC621E7B06DD54D7106B00352B5A4D0249
31,495,930 UART: [art] SIG.S = DE3D4E40A56D7ABD6167BF73CDFF97996A3B37A15A4EA3D204DD083A86F2C91FB9E75DA9DBE99708635276603E080A9E
32,801,089 UART: Caliptra RT
32,801,824 UART: [state] CFI Enabled
32,918,133 UART: [rt] RT listening for mailbox commands...
32,949,540 UART: [rt]cmd =0x46504c54, len=4
32,951,114 >>> mbox cmd response data (8 bytes)
32,951,580 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,981,839 UART: [rt]cmd =0x46504c67, len=4
32,983,139 >>> mbox cmd response: failed
32,984,134 UART: [rt] FIPS self test
32,985,063 UART: [kat] ++
32,985,523 UART: [kat] sha1
32,989,945 UART: [kat] SHA2-256
32,991,775 UART: [kat] SHA2-384
32,994,667 UART: [kat] SHA2-512-ACC
32,996,889 UART: [kat] ECC-384
36,239,553 UART: [kat] HMAC-384Kdf
36,245,224 UART: [kat] LMS
36,655,482 UART: [kat] --
36,806,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,639,271 UART: [rt] Verify complete
40,829,176 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,859,016 UART: [rt]cmd =0x46504c67, len=4
40,860,584 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,128,957 ready_for_fw is high
4,129,383 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,060,262 >>> mbox cmd response: success
18,060,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,699,611 UART:
23,700,032 UART: Running Caliptra FMC ...
23,701,170 UART:
23,701,362 UART: [state] CFI Enabled
23,708,923 UART: [fht] FMC Alias Private Key: 7
26,039,758 UART: [art] Extend RT PCRs Done
26,040,983 UART: [art] Lock RT PCRs Done
26,042,719 UART: [art] Populate DV Done
26,048,095 UART: [fht] FMC Alias Private Key: 7
26,049,644 UART: [art] Derive CDI
26,050,464 UART: [art] Store in in slot 0x4
26,093,373 UART: [art] Derive Key Pair
26,094,408 UART: [art] Store priv key in slot 0x5
29,336,554 UART: [art] Derive Key Pair - Done
29,349,351 UART: [art] Signing Cert with AUTHO
29,350,661 UART: RITY.KEYID = 7
31,629,841 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,354 UART: [art] PUB.X = 3296A9BF0AACB4EA2CA142FB5A9C2EC83FDC87E136C1CABE8C8879892196B3FC486BABCD9D866A120686C9B9DB06D728
31,638,625 UART: [art] PUB.Y = 5A7F5DBDB28ED2D7536AB6BC1197AC8DA9D8AD9B6A4A774408551847A8A65429EAFD646442644E079E5B55712B15597A
31,645,841 UART: [art] SIG.R = 46C35B232FC3BA28204D6B99AD64B6A1CC398142F1A13FAF1B52E007FAE13120669B3F95DD12CE4AC515F6834E2B60B4
31,653,261 UART: [art] SIG.S = 81112D29921A3B3559BCCF0A2BB920C851B6235E70C2965EADF9C9809BAD30E06399C34420B4058C69EDAED36A043C7F
32,958,244 UART: Caliptra RT
32,958,950 UART: [state] CFI Enabled
33,077,040 UART: [rt] RT listening for mailbox commands...
33,108,403 UART: [rt]cmd =0x46504c54, len=4
33,110,041 >>> mbox cmd response data (8 bytes)
33,110,464 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,140,563 UART: [rt]cmd =0x46504c67, len=4
33,141,895 >>> mbox cmd response: failed
33,143,162 UART: [rt] FIPS self test
33,144,091 UART: [kat] ++
33,144,544 UART: [kat] sha1
33,148,965 UART: [kat] SHA2-256
33,150,746 UART: [kat] SHA2-384
33,153,602 UART: [kat] SHA2-512-ACC
33,155,836 UART: [kat] ECC-384
36,397,878 UART: [kat] HMAC-384Kdf
36,403,653 UART: [kat] LMS
36,813,911 UART: [kat] --
36,945,105 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,777,742 UART: [rt] Verify complete
40,989,063 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,018,922 UART: [rt]cmd =0x46504c67, len=4
41,020,299 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,544 UART:
192,909 UART: Running Caliptra ROM ...
194,097 UART:
194,252 UART: [state] CFI Enabled
262,610 UART: [state] LifecycleState = Unprovisioned
264,443 UART: [state] DebugLocked = No
266,192 UART: [state] WD Timer not started. Device not locked for debugging
269,023 UART: [kat] SHA2-256
448,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,724 UART: [kat] ++
460,258 UART: [kat] sha1
471,269 UART: [kat] SHA2-256
474,304 UART: [kat] SHA2-384
481,028 UART: [kat] SHA2-512-ACC
483,980 UART: [kat] ECC-384
2,947,594 UART: [kat] HMAC-384Kdf
2,971,105 UART: [kat] LMS
3,500,570 UART: [kat] --
3,506,704 UART: [cold-reset] ++
3,508,288 UART: [fht] FHT @ 0x50003400
3,519,069 UART: [idev] ++
3,519,654 UART: [idev] CDI.KEYID = 6
3,520,546 UART: [idev] SUBJECT.KEYID = 7
3,521,795 UART: [idev] UDS.KEYID = 0
3,522,697 ready_for_fw is high
3,522,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,805 UART: [idev] Erasing UDS.KEYID = 0
6,028,548 UART: [idev] Sha1 KeyId Algorithm
6,050,139 UART: [idev] --
6,054,367 UART: [ldev] ++
6,054,943 UART: [ldev] CDI.KEYID = 6
6,055,855 UART: [ldev] SUBJECT.KEYID = 5
6,057,017 UART: [ldev] AUTHORITY.KEYID = 7
6,058,252 UART: [ldev] FE.KEYID = 1
6,099,381 UART: [ldev] Erasing FE.KEYID = 1
8,604,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,702 UART: [ldev] --
10,412,930 UART: [fwproc] Wait for Commands...
10,414,926 UART: [fwproc] Recv command 0x46574c44
10,416,965 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,790 >>> mbox cmd response: success
14,287,206 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,291,722 UART: [afmc] ++
14,292,304 UART: [afmc] CDI.KEYID = 6
14,293,220 UART: [afmc] SUBJECT.KEYID = 7
14,294,442 UART: [afmc] AUTHORITY.KEYID = 5
16,831,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,603 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,277 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,905 UART: [afmc] --
18,627,431 UART: [cold-reset] --
18,629,699 UART: [state] Locking Datavault
18,634,668 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,380 UART: [state] Locking ICCM
18,638,533 UART: [exit] Launching FMC @ 0x40000130
18,646,986 UART:
18,647,232 UART: Running Caliptra FMC ...
18,648,338 UART:
18,648,499 UART: [state] CFI Enabled
18,711,816 UART: [fht] FMC Alias Private Key: 7
20,475,685 UART: [art] Extend RT PCRs Done
20,476,988 UART: [art] Lock RT PCRs Done
20,478,529 UART: [art] Populate DV Done
20,484,218 UART: [fht] FMC Alias Private Key: 7
20,485,814 UART: [art] Derive CDI
20,486,633 UART: [art] Store in in slot 0x4
20,543,831 UART: [art] Derive Key Pair
20,544,836 UART: [art] Store priv key in slot 0x5
23,007,981 UART: [art] Derive Key Pair - Done
23,021,097 UART: [art] Signing Cert with AUTHO
23,022,403 UART: RITY.KEYID = 7
24,732,958 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,470 UART: [art] PUB.X = F8697F982F23F1ABAED7A08E13FE798EE51E4E5C9228CB963F0F44CB465DEBB8E9DE0529FE6D40297ADD69D80DD3D579
24,741,776 UART: [art] PUB.Y = DE7A69B0DEA2BBCFD527F17730E23053A5F536AC28B5612564033E29E7DA6D74E34AE90DE4476D0BAF751DB85A65714B
24,749,037 UART: [art] SIG.R = A88FB316521C7188967015515345B1D296DBBFA055DF3DDE8C9396CF16FC2EAEC9397813754E7FFC5FD58CE60D8D7DDC
24,756,474 UART: [art] SIG.S = CC63284CCFC73448D4337399DF76ABB0743C435A4FD85894BF2A1CCB085824BFECCA24D9708D6494322B128344933268
25,735,563 UART: Caliptra RT
25,736,285 UART: [state] CFI Enabled
25,899,166 UART: [rt] RT listening for mailbox commands...
25,930,529 UART: [rt]cmd =0x46504c54, len=4
25,932,033 >>> mbox cmd response data (8 bytes)
25,932,521 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,962,480 UART: [rt]cmd =0x46504c67, len=4
25,963,886 >>> mbox cmd response: failed
25,965,021 UART: [rt] FIPS self test
25,965,956 UART: [kat] ++
25,966,406 UART: [kat] sha1
25,970,768 UART: [kat] SHA2-256
25,972,576 UART: [kat] SHA2-384
25,975,531 UART: [kat] SHA2-512-ACC
25,977,778 UART: [kat] ECC-384
28,427,116 UART: [kat] HMAC-384Kdf
28,453,387 UART: [kat] LMS
28,651,312 UART: [kat] --
28,804,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,987,986 UART: [rt] Verify complete
32,105,917 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,135,874 UART: [rt]cmd =0x46504c67, len=4
32,137,536 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,381,658 ready_for_fw is high
3,382,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,090,351 >>> mbox cmd response: success
14,090,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,386,697 UART:
18,387,077 UART: Running Caliptra FMC ...
18,388,268 UART:
18,388,426 UART: [state] CFI Enabled
18,456,095 UART: [fht] FMC Alias Private Key: 7
20,220,768 UART: [art] Extend RT PCRs Done
20,221,993 UART: [art] Lock RT PCRs Done
20,223,916 UART: [art] Populate DV Done
20,229,265 UART: [fht] FMC Alias Private Key: 7
20,230,966 UART: [art] Derive CDI
20,231,701 UART: [art] Store in in slot 0x4
20,289,099 UART: [art] Derive Key Pair
20,290,147 UART: [art] Store priv key in slot 0x5
22,752,729 UART: [art] Derive Key Pair - Done
22,765,635 UART: [art] Signing Cert with AUTHO
22,766,945 UART: RITY.KEYID = 7
24,478,717 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,206 UART: [art] PUB.X = E83B43BE981D3225C1ED9782547EFE6DDCF552517F8D288FF8552CDF0A36AECEB616E6A7B6947FA7B651D7F0122FCFB6
24,487,491 UART: [art] PUB.Y = DEE03A913EC91594797633B5D7E74E319F7F7F2308BB4B86D47EA471F4D1FFD29F71B881C7AC76A4E5FB60FCB2CF2B4A
24,494,813 UART: [art] SIG.R = A7A394116A5E7C5AA065870B087A683E43F54AD74178A2D3598264FDD931F231D151B5960DD12BD8172B2D50B276145C
24,502,184 UART: [art] SIG.S = 280A0DFA8A466B8AF23E2A760322E9640721219D715DD34157E66E81F9C545776B807F4F8BFE20AD74F2FC429AE530F3
25,480,817 UART: Caliptra RT
25,481,538 UART: [state] CFI Enabled
25,646,731 UART: [rt] RT listening for mailbox commands...
25,677,988 UART: [rt]cmd =0x46504c54, len=4
25,679,644 >>> mbox cmd response data (8 bytes)
25,680,062 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,710,526 UART: [rt]cmd =0x46504c67, len=4
25,711,872 >>> mbox cmd response: failed
25,712,987 UART: [rt] FIPS self test
25,713,917 UART: [kat] ++
25,714,370 UART: [kat] sha1
25,718,823 UART: [kat] SHA2-256
25,720,643 UART: [kat] SHA2-384
25,723,603 UART: [kat] SHA2-512-ACC
25,725,815 UART: [kat] ECC-384
28,166,019 UART: [kat] HMAC-384Kdf
28,192,904 UART: [kat] LMS
28,390,882 UART: [kat] --
28,524,063 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,706,110 UART: [rt] Verify complete
31,853,827 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,883,836 UART: [rt]cmd =0x46504c67, len=4
31,885,424 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
192,663 UART:
193,040 UART: Running Caliptra ROM ...
194,185 UART:
603,736 UART: [state] CFI Enabled
615,067 UART: [state] LifecycleState = Unprovisioned
616,957 UART: [state] DebugLocked = No
619,715 UART: [state] WD Timer not started. Device not locked for debugging
623,114 UART: [kat] SHA2-256
802,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,810 UART: [kat] ++
814,340 UART: [kat] sha1
824,369 UART: [kat] SHA2-256
827,386 UART: [kat] SHA2-384
832,741 UART: [kat] SHA2-512-ACC
835,696 UART: [kat] ECC-384
3,278,273 UART: [kat] HMAC-384Kdf
3,291,214 UART: [kat] LMS
3,820,749 UART: [kat] --
3,824,541 UART: [cold-reset] ++
3,825,907 UART: [fht] FHT @ 0x50003400
3,836,823 UART: [idev] ++
3,837,391 UART: [idev] CDI.KEYID = 6
3,838,301 UART: [idev] SUBJECT.KEYID = 7
3,839,479 UART: [idev] UDS.KEYID = 0
3,840,402 ready_for_fw is high
3,840,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,367 UART: [idev] Erasing UDS.KEYID = 0
6,312,094 UART: [idev] Sha1 KeyId Algorithm
6,335,114 UART: [idev] --
6,338,023 UART: [ldev] ++
6,338,624 UART: [ldev] CDI.KEYID = 6
6,339,535 UART: [ldev] SUBJECT.KEYID = 5
6,340,634 UART: [ldev] AUTHORITY.KEYID = 7
6,341,919 UART: [ldev] FE.KEYID = 1
6,352,019 UART: [ldev] Erasing FE.KEYID = 1
8,826,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,808 UART: [ldev] --
10,618,842 UART: [fwproc] Wait for Commands...
10,620,672 UART: [fwproc] Recv command 0x46574c44
10,622,718 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,275 >>> mbox cmd response: success
14,486,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,490,051 UART: [afmc] ++
14,490,630 UART: [afmc] CDI.KEYID = 6
14,491,539 UART: [afmc] SUBJECT.KEYID = 7
14,492,754 UART: [afmc] AUTHORITY.KEYID = 5
16,997,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,110 UART: [afmc] --
18,796,593 UART: [cold-reset] --
18,800,079 UART: [state] Locking Datavault
18,805,395 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,057 UART: [state] Locking ICCM
18,808,782 UART: [exit] Launching FMC @ 0x40000130
18,817,182 UART:
18,817,425 UART: Running Caliptra FMC ...
18,818,529 UART:
18,818,686 UART: [state] CFI Enabled
18,826,837 UART: [fht] FMC Alias Private Key: 7
20,583,222 UART: [art] Extend RT PCRs Done
20,584,476 UART: [art] Lock RT PCRs Done
20,585,805 UART: [art] Populate DV Done
20,591,162 UART: [fht] FMC Alias Private Key: 7
20,592,702 UART: [art] Derive CDI
20,593,444 UART: [art] Store in in slot 0x4
20,636,335 UART: [art] Derive Key Pair
20,637,378 UART: [art] Store priv key in slot 0x5
23,063,624 UART: [art] Derive Key Pair - Done
23,076,264 UART: [art] Signing Cert with AUTHO
23,077,576 UART: RITY.KEYID = 7
24,783,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,623 UART: [art] PUB.X = 0FCDE6B8BBAF8801367134AAF1D3CE17132C0D0759D1AB80D9345B2B557B128F4C821731A23D8D7D9CE4DCE800E45BC6
24,791,877 UART: [art] PUB.Y = FC3DB52D98ED381C202EC9967AFC6EFB14D60592A3B866574B63F0B8E2BC608BC6BF1D4EDD0437A9493F4ADD0CF354B1
24,799,167 UART: [art] SIG.R = 0FCEB8E5FBE38950653F00B880E94112234532B8011A80904BC9BB00D29BBE6DABA686CAB4BAC8EE7690EF5FB3CFB3D9
24,806,517 UART: [art] SIG.S = 386B2A372773DF2FF1F960AF48C1F7CCE43088778B104B2A0503A0B1F8D8F3E024D1D54F555738C047F15C1435237445
25,785,168 UART: Caliptra RT
25,785,881 UART: [state] CFI Enabled
25,902,799 UART: [rt] RT listening for mailbox commands...
25,933,951 UART: [rt]cmd =0x46504c54, len=4
25,935,695 >>> mbox cmd response data (8 bytes)
25,936,162 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,966,646 UART: [rt]cmd =0x46504c67, len=4
25,968,021 >>> mbox cmd response: failed
25,969,153 UART: [rt] FIPS self test
25,970,089 UART: [kat] ++
25,970,538 UART: [kat] sha1
25,974,978 UART: [kat] SHA2-256
25,976,807 UART: [kat] SHA2-384
25,979,451 UART: [kat] SHA2-512-ACC
25,981,662 UART: [kat] ECC-384
28,408,582 UART: [kat] HMAC-384Kdf
28,414,415 UART: [kat] LMS
28,612,356 UART: [kat] --
28,765,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,947,976 UART: [rt] Verify complete
32,109,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,139,375 UART: [rt]cmd =0x46504c67, len=4
32,140,772 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,692,704 ready_for_fw is high
3,693,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,933 >>> mbox cmd response: success
14,266,658 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,523,294 UART:
18,523,680 UART: Running Caliptra FMC ...
18,524,949 UART:
18,525,116 UART: [state] CFI Enabled
18,532,907 UART: [fht] FMC Alias Private Key: 7
20,289,707 UART: [art] Extend RT PCRs Done
20,290,927 UART: [art] Lock RT PCRs Done
20,292,661 UART: [art] Populate DV Done
20,298,010 UART: [fht] FMC Alias Private Key: 7
20,299,444 UART: [art] Derive CDI
20,300,211 UART: [art] Store in in slot 0x4
20,343,191 UART: [art] Derive Key Pair
20,344,230 UART: [art] Store priv key in slot 0x5
22,770,768 UART: [art] Derive Key Pair - Done
22,783,883 UART: [art] Signing Cert with AUTHO
22,785,191 UART: RITY.KEYID = 7
24,490,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,943 UART: [art] PUB.X = 2853612829F5192691E382BE464B82953CF9715C32BA1FE459E742B9EE2010A9DE9001204AF7DB41DB00AF5DDBA8F1CA
24,499,218 UART: [art] PUB.Y = 4652196EF5CD47D4CC917C1B9E0D267A078BBEB887BD4078A290152BE78A651FC2394439AE5C9C4AB780952C6141D1DD
24,506,470 UART: [art] SIG.R = FDD65BF1357C3680E2D1578A89DEE28E0A0522642045053D63EF5735FA82A92CC5952805A39AAB7E72E4EFA4A2E84AF8
24,513,838 UART: [art] SIG.S = F544BED0FBD0411BD370EE93718F428FE919939868A1708A7763721B1AF84CC26155C2078BD3A738588378B4B1160A76
25,493,067 UART: Caliptra RT
25,493,781 UART: [state] CFI Enabled
25,610,808 UART: [rt] RT listening for mailbox commands...
25,642,171 UART: [rt]cmd =0x46504c54, len=4
25,643,855 >>> mbox cmd response data (8 bytes)
25,644,258 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,674,617 UART: [rt]cmd =0x46504c67, len=4
25,675,947 >>> mbox cmd response: failed
25,676,946 UART: [rt] FIPS self test
25,677,875 UART: [kat] ++
25,678,324 UART: [kat] sha1
25,682,814 UART: [kat] SHA2-256
25,684,631 UART: [kat] SHA2-384
25,687,486 UART: [kat] SHA2-512-ACC
25,689,701 UART: [kat] ECC-384
28,116,557 UART: [kat] HMAC-384Kdf
28,122,455 UART: [kat] LMS
28,320,413 UART: [kat] --
28,453,736 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,637,137 UART: [rt] Verify complete
31,817,185 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,847,234 UART: [rt]cmd =0x46504c67, len=4
31,848,684 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,171 UART:
192,538 UART: Running Caliptra ROM ...
193,644 UART:
193,810 UART: [state] CFI Enabled
264,235 UART: [state] LifecycleState = Unprovisioned
266,285 UART: [state] DebugLocked = No
268,094 UART: [state] WD Timer not started. Device not locked for debugging
272,919 UART: [kat] SHA2-256
462,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,506 UART: [kat] ++
473,954 UART: [kat] sha1
485,542 UART: [kat] SHA2-256
488,544 UART: [kat] SHA2-384
495,014 UART: [kat] SHA2-512-ACC
497,620 UART: [kat] ECC-384
2,949,875 UART: [kat] HMAC-384Kdf
2,971,069 UART: [kat] LMS
3,502,775 UART: [kat] --
3,506,433 UART: [cold-reset] ++
3,507,395 UART: [fht] FHT @ 0x50003400
3,517,885 UART: [idev] ++
3,518,526 UART: [idev] CDI.KEYID = 6
3,519,523 UART: [idev] SUBJECT.KEYID = 7
3,520,697 UART: [idev] UDS.KEYID = 0
3,521,626 ready_for_fw is high
3,521,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,802 UART: [idev] Erasing UDS.KEYID = 0
6,030,004 UART: [idev] Sha1 KeyId Algorithm
6,052,907 UART: [idev] --
6,058,291 UART: [ldev] ++
6,058,985 UART: [ldev] CDI.KEYID = 6
6,059,903 UART: [ldev] SUBJECT.KEYID = 5
6,061,063 UART: [ldev] AUTHORITY.KEYID = 7
6,062,189 UART: [ldev] FE.KEYID = 1
6,100,488 UART: [ldev] Erasing FE.KEYID = 1
8,607,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,363 UART: [ldev] --
10,415,790 UART: [fwproc] Wait for Commands...
10,418,754 UART: [fwproc] Recv command 0x46574c44
10,421,012 UART: [fwproc] Recv'd Img size: 114448 bytes
13,861,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,600,029 >>> mbox cmd response: success
14,600,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,604,704 UART: [afmc] ++
14,605,594 UART: [afmc] CDI.KEYID = 6
14,606,700 UART: [afmc] SUBJECT.KEYID = 7
14,608,082 UART: [afmc] AUTHORITY.KEYID = 5
17,152,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,269 UART: [afmc] --
18,970,505 UART: [cold-reset] --
18,975,182 UART: [state] Locking Datavault
18,980,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,152 UART: [state] Locking ICCM
18,984,972 UART: [exit] Launching FMC @ 0x40000130
18,993,637 UART:
18,993,876 UART: Running Caliptra FMC ...
18,994,999 UART:
18,995,162 UART: [state] CFI Enabled
19,052,419 UART: [fht] FMC Alias Private Key: 7
20,816,452 UART: [art] Extend RT PCRs Done
20,817,673 UART: [art] Lock RT PCRs Done
20,819,141 UART: [art] Populate DV Done
20,824,498 UART: [fht] FMC Alias Private Key: 7
20,826,141 UART: [art] Derive CDI
20,826,955 UART: [art] Store in in slot 0x4
20,884,990 UART: [art] Derive Key Pair
20,886,025 UART: [art] Store priv key in slot 0x5
23,348,567 UART: [art] Derive Key Pair - Done
23,361,709 UART: [art] Signing Cert with AUTHO
23,363,007 UART: RITY.KEYID = 7
25,074,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,180 UART: [art] PUB.X = 93BE070DE0B2AB1DE735779B592FD9918C4E02807A4BFDDC5E0DECC41D47115381DC4BAB565E4053DC6B733AF6AA7E9E
25,083,481 UART: [art] PUB.Y = 7BB5DAD4A412B92A85FD7AB6CBB36F6E8566FEF9FB884293AF2D24789DA4B8A58DB81E7E5157A120925E5C719C52A9CC
25,090,786 UART: [art] SIG.R = 01A8957E08A0EFC0A1D4A9A02E6E9759FAF1955E7A26903716381A7348C0A9546F8F0A3E72465C6C60B470FE3E421D1E
25,098,154 UART: [art] SIG.S = C6879683D6133624F9B1403C5B0859224DA265114E942B52773DD3BFE243AAAEE18F5AB582ED2FF8DA8F21AD7E6EFF94
26,077,122 UART: Caliptra RT
26,077,828 UART: [state] CFI Enabled
26,241,747 UART: [rt] RT listening for mailbox commands...
26,273,168 UART: [rt]cmd =0x46504c54, len=4
26,274,803 >>> mbox cmd response data (8 bytes)
26,275,221 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,305,045 UART: [rt]cmd =0x46504c67, len=4
26,306,366 >>> mbox cmd response: failed
26,307,740 UART: [rt] FIPS self test
26,308,678 UART: [kat] ++
26,309,124 UART: [kat] sha1
26,313,507 UART: [kat] SHA2-256
26,315,334 UART: [kat] SHA2-384
26,318,228 UART: [kat] SHA2-512-ACC
26,320,439 UART: [kat] ECC-384
28,771,289 UART: [kat] HMAC-384Kdf
28,798,030 UART: [kat] LMS
28,995,945 UART: [kat] --
29,149,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,332,867 UART: [rt] Verify complete
32,448,532 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,478,535 UART: [rt]cmd =0x46504c67, len=4
32,480,072 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,440,554 ready_for_fw is high
3,441,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,714,764 >>> mbox cmd response: success
14,715,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,006,851 UART:
19,007,266 UART: Running Caliptra FMC ...
19,008,407 UART:
19,008,569 UART: [state] CFI Enabled
19,073,978 UART: [fht] FMC Alias Private Key: 7
20,837,235 UART: [art] Extend RT PCRs Done
20,838,492 UART: [art] Lock RT PCRs Done
20,840,392 UART: [art] Populate DV Done
20,845,553 UART: [fht] FMC Alias Private Key: 7
20,847,040 UART: [art] Derive CDI
20,847,811 UART: [art] Store in in slot 0x4
20,906,605 UART: [art] Derive Key Pair
20,907,608 UART: [art] Store priv key in slot 0x5
23,370,865 UART: [art] Derive Key Pair - Done
23,383,867 UART: [art] Signing Cert with AUTHO
23,385,174 UART: RITY.KEYID = 7
25,095,997 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,511 UART: [art] PUB.X = E924D87E45A74344CF39398F4E65D3960AB3689E1123D2B12D2E7010EA978EB5D51F67FFE528A620FED1BF42CCA06FC1
25,104,777 UART: [art] PUB.Y = FDA02DF0FAB32FDAB1DCBAD4AC2468DC148E8B400D568F3B4696CECCFD1B11F98915F7969F4F8102F3ED29A8447E30A0
25,112,029 UART: [art] SIG.R = B906ABD90F5488127915F7DA03F5A110846FB55E8BC66EB57F4B0FEAD6FB5E3371AB2E07EC2B1915CE751330BF240BEC
25,119,458 UART: [art] SIG.S = A14EC0CD0FB0FCB9585A6CDE7C846FC2F25533FAE4F3BF4B7E1792C97E33788210BD4DFB63F8D133856C8FAD48A3F605
26,098,617 UART: Caliptra RT
26,099,349 UART: [state] CFI Enabled
26,262,502 UART: [rt] RT listening for mailbox commands...
26,293,648 UART: [rt]cmd =0x46504c54, len=4
26,295,098 >>> mbox cmd response data (8 bytes)
26,295,540 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,325,633 UART: [rt]cmd =0x46504c67, len=4
26,326,928 >>> mbox cmd response: failed
26,327,687 UART: [rt] FIPS self test
26,328,615 UART: [kat] ++
26,329,064 UART: [kat] sha1
26,333,317 UART: [kat] SHA2-256
26,335,125 UART: [kat] SHA2-384
26,338,083 UART: [kat] SHA2-512-ACC
26,340,296 UART: [kat] ECC-384
28,791,259 UART: [kat] HMAC-384Kdf
28,817,637 UART: [kat] LMS
29,015,621 UART: [kat] --
29,149,639 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,330,814 UART: [rt] Verify complete
32,469,513 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,499,361 UART: [rt]cmd =0x46504c67, len=4
32,500,948 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,560 UART:
192,942 UART: Running Caliptra ROM ...
194,058 UART:
603,777 UART: [state] CFI Enabled
614,805 UART: [state] LifecycleState = Unprovisioned
617,177 UART: [state] DebugLocked = No
619,480 UART: [state] WD Timer not started. Device not locked for debugging
623,673 UART: [kat] SHA2-256
813,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,306 UART: [kat] ++
824,823 UART: [kat] sha1
835,559 UART: [kat] SHA2-256
838,577 UART: [kat] SHA2-384
844,640 UART: [kat] SHA2-512-ACC
847,227 UART: [kat] ECC-384
3,290,858 UART: [kat] HMAC-384Kdf
3,302,524 UART: [kat] LMS
3,834,378 UART: [kat] --
3,837,878 UART: [cold-reset] ++
3,839,530 UART: [fht] FHT @ 0x50003400
3,850,442 UART: [idev] ++
3,851,148 UART: [idev] CDI.KEYID = 6
3,852,179 UART: [idev] SUBJECT.KEYID = 7
3,853,284 UART: [idev] UDS.KEYID = 0
3,854,222 ready_for_fw is high
3,854,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,998,184 UART: [idev] Erasing UDS.KEYID = 0
6,330,435 UART: [idev] Sha1 KeyId Algorithm
6,353,344 UART: [idev] --
6,357,174 UART: [ldev] ++
6,357,854 UART: [ldev] CDI.KEYID = 6
6,358,825 UART: [ldev] SUBJECT.KEYID = 5
6,359,983 UART: [ldev] AUTHORITY.KEYID = 7
6,361,231 UART: [ldev] FE.KEYID = 1
6,372,311 UART: [ldev] Erasing FE.KEYID = 1
8,852,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,318 UART: [ldev] --
10,646,624 UART: [fwproc] Wait for Commands...
10,648,130 UART: [fwproc] Recv command 0x46574c44
10,650,441 UART: [fwproc] Recv'd Img size: 114448 bytes
14,099,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,837,166 >>> mbox cmd response: success
14,837,602 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,840,573 UART: [afmc] ++
14,841,319 UART: [afmc] CDI.KEYID = 6
14,842,500 UART: [afmc] SUBJECT.KEYID = 7
14,843,980 UART: [afmc] AUTHORITY.KEYID = 5
17,350,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,694 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,641 UART: [afmc] --
19,144,542 UART: [cold-reset] --
19,150,188 UART: [state] Locking Datavault
19,154,782 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,969 UART: [state] Locking ICCM
19,158,467 UART: [exit] Launching FMC @ 0x40000130
19,167,098 UART:
19,167,336 UART: Running Caliptra FMC ...
19,168,439 UART:
19,168,594 UART: [state] CFI Enabled
19,176,636 UART: [fht] FMC Alias Private Key: 7
20,934,024 UART: [art] Extend RT PCRs Done
20,935,245 UART: [art] Lock RT PCRs Done
20,936,754 UART: [art] Populate DV Done
20,942,222 UART: [fht] FMC Alias Private Key: 7
20,943,866 UART: [art] Derive CDI
20,944,680 UART: [art] Store in in slot 0x4
20,987,115 UART: [art] Derive Key Pair
20,988,155 UART: [art] Store priv key in slot 0x5
23,415,050 UART: [art] Derive Key Pair - Done
23,427,941 UART: [art] Signing Cert with AUTHO
23,429,253 UART: RITY.KEYID = 7
25,134,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,153 UART: [art] PUB.X = 0E4BC884D6835C22DB090E503B70E1DFD78F71F3F8EA196DF674D0649908BE0180F288DE2C58A2EEA156019A7E7B9DC8
25,143,435 UART: [art] PUB.Y = 36A46C28F1B6BF920F53A278D489850D2EA9D90033C5E291D188AC21D5A2065E901B6571A4FDD01493454CCAA04648EA
25,150,708 UART: [art] SIG.R = A2037192156F485C9585CA11C60BE9F0B062A5AFD45AB13CD4D13530EA7A7DF75B23423AE4F41BE366876397A28B61BF
25,158,061 UART: [art] SIG.S = A7B6AFD0028800DEBC5022BBD25FD9BB938E7605159E8F5DFD76B7CACBB4E21D6196368914422808663F604ADC340E75
26,137,907 UART: Caliptra RT
26,138,615 UART: [state] CFI Enabled
26,256,067 UART: [rt] RT listening for mailbox commands...
26,287,325 UART: [rt]cmd =0x46504c54, len=4
26,288,846 >>> mbox cmd response data (8 bytes)
26,289,257 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,319,614 UART: [rt]cmd =0x46504c67, len=4
26,320,938 >>> mbox cmd response: failed
26,322,244 UART: [rt] FIPS self test
26,323,178 UART: [kat] ++
26,323,627 UART: [kat] sha1
26,328,033 UART: [kat] SHA2-256
26,329,829 UART: [kat] SHA2-384
26,332,852 UART: [kat] SHA2-512-ACC
26,335,063 UART: [kat] ECC-384
28,762,187 UART: [kat] HMAC-384Kdf
28,767,930 UART: [kat] LMS
28,965,874 UART: [kat] --
29,119,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,302,608 UART: [rt] Verify complete
32,462,868 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,492,665 UART: [rt]cmd =0x46504c67, len=4
32,494,169 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,749,323 ready_for_fw is high
3,749,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,652 >>> mbox cmd response: success
14,951,446 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,199,064 UART:
19,199,451 UART: Running Caliptra FMC ...
19,200,589 UART:
19,200,752 UART: [state] CFI Enabled
19,208,631 UART: [fht] FMC Alias Private Key: 7
20,965,243 UART: [art] Extend RT PCRs Done
20,966,464 UART: [art] Lock RT PCRs Done
20,967,986 UART: [art] Populate DV Done
20,973,379 UART: [fht] FMC Alias Private Key: 7
20,975,087 UART: [art] Derive CDI
20,975,910 UART: [art] Store in in slot 0x4
21,018,037 UART: [art] Derive Key Pair
21,019,092 UART: [art] Store priv key in slot 0x5
23,446,289 UART: [art] Derive Key Pair - Done
23,459,513 UART: [art] Signing Cert with AUTHO
23,460,824 UART: RITY.KEYID = 7
25,166,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,977 UART: [art] PUB.X = 4589EB325967F10BE79587ACEA45067FA99DD2B590F75BC3AC1C9B15151705A38E6855E6D36989FDE1D46B2A5E854BFB
25,175,237 UART: [art] PUB.Y = 19C782F52ED844065BEEB184C614E8789F3AA30FC25C499F0C8BD996323619F5F6C12943BDFEB367522D983EDF32C1AE
25,182,534 UART: [art] SIG.R = A26EE454367AC308532D7CA1B0C0E74C2707064651476027EC0B2483D8B224C72F7232F5E297239623206EAE15F328ED
25,189,883 UART: [art] SIG.S = 736094FAED1B6B0E3AACB9C641138861AA3066C9813F56B9F4B0449B01A4CF7A63626B3B7B164FD9BE29516BA6204B2B
26,168,541 UART: Caliptra RT
26,169,231 UART: [state] CFI Enabled
26,287,955 UART: [rt] RT listening for mailbox commands...
26,319,295 UART: [rt]cmd =0x46504c54, len=4
26,320,818 >>> mbox cmd response data (8 bytes)
26,321,243 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,351,385 UART: [rt]cmd =0x46504c67, len=4
26,352,672 >>> mbox cmd response: failed
26,353,806 UART: [rt] FIPS self test
26,354,726 UART: [kat] ++
26,355,177 UART: [kat] sha1
26,359,431 UART: [kat] SHA2-256
26,361,271 UART: [kat] SHA2-384
26,364,201 UART: [kat] SHA2-512-ACC
26,366,558 UART: [kat] ECC-384
28,793,672 UART: [kat] HMAC-384Kdf
28,799,505 UART: [kat] LMS
28,997,403 UART: [kat] --
29,131,433 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,314,705 UART: [rt] Verify complete
32,494,319 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,524,169 UART: [rt]cmd =0x46504c67, len=4
32,525,867 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,213 UART: [kat] SHA2-256
892,151 UART: [kat] SHA2-384
894,908 UART: [kat] SHA2-512-ACC
896,809 UART: [kat] ECC-384
902,142 UART: [kat] HMAC-384Kdf
906,634 UART: [kat] LMS
1,474,830 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,185 UART: [fht] Storing FHT @ 0x50003400
1,479,092 UART: [idev] ++
1,479,260 UART: [idev] CDI.KEYID = 6
1,479,620 UART: [idev] SUBJECT.KEYID = 7
1,480,044 UART: [idev] UDS.KEYID = 0
1,480,389 ready_for_fw is high
1,480,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,504,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,196 UART: [idev] --
1,514,321 UART: [ldev] ++
1,514,489 UART: [ldev] CDI.KEYID = 6
1,514,852 UART: [ldev] SUBJECT.KEYID = 5
1,515,278 UART: [ldev] AUTHORITY.KEYID = 7
1,515,741 UART: [ldev] FE.KEYID = 1
1,521,069 UART: [ldev] Erasing FE.KEYID = 1
1,546,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,158 UART: [ldev] --
1,585,515 UART: [fwproc] Waiting for Commands...
1,586,376 UART: [fwproc] Received command 0x46574c44
1,587,167 UART: [fwproc] Received Image of size 114448 bytes
2,886,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,043 >>> mbox cmd response: success
3,079,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,080,269 UART: [afmc] ++
3,080,437 UART: [afmc] CDI.KEYID = 6
3,080,799 UART: [afmc] SUBJECT.KEYID = 7
3,081,224 UART: [afmc] AUTHORITY.KEYID = 5
3,116,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,016 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,706 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,603 UART: [afmc] --
3,159,499 UART: [cold-reset] --
3,160,207 UART: [state] Locking Datavault
3,161,308 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,912 UART: [state] Locking ICCM
3,162,344 UART: [exit] Launching FMC @ 0x40000130
3,167,673 UART:
3,167,689 UART: Running Caliptra FMC ...
3,168,097 UART:
3,168,151 UART: [state] CFI Enabled
3,178,322 UART: [fht] FMC Alias Private Key: 7
3,285,737 UART: [art] Extend RT PCRs Done
3,286,165 UART: [art] Lock RT PCRs Done
3,287,757 UART: [art] Populate DV Done
3,296,366 UART: [fht] FMC Alias Private Key: 7
3,297,408 UART: [art] Derive CDI
3,297,688 UART: [art] Store in in slot 0x4
3,383,241 UART: [art] Derive Key Pair
3,383,601 UART: [art] Store priv key in slot 0x5
3,396,251 UART: [art] Derive Key Pair - Done
3,411,366 UART: [art] Signing Cert with AUTHO
3,411,846 UART: RITY.KEYID = 7
3,427,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,053 UART: [art] PUB.X = 999AF347CBBD4F2B42750B5AC44C9BACDAD9D72370A067FBD6A3BDF44790E5C911C0B55CB77943443888D22928981ED6
3,434,830 UART: [art] PUB.Y = 8EF6E505B671B41583770D52C6B3B6B80DA8D02D877A031C25D523183663F610B0BD24162DFF22821D22CA2FE62BA0EF
3,441,772 UART: [art] SIG.R = 970C8092A362C177BB5C6455FB4BF41965CAA2EFA6A31FAF5A0FFFDD4655A58151D6FBE45D8C1D907B91B66B1F321DCD
3,448,556 UART: [art] SIG.S = A0B671F6B5846B856E9D8C7B57F0384E93D4016B8BAC85A0263D2C32EDA979314D054BC4490F55EA7DD8B6705EA2C8DC
3,472,510 UART: Caliptra RT
3,472,763 UART: [state] CFI Enabled
3,579,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,043 UART: [rt]cmd =0x46504c54, len=4
3,611,088 >>> mbox cmd response data (8 bytes)
3,611,089 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,640,590 UART: [rt]cmd =0x46504c67, len=4
3,641,617 >>> mbox cmd response: failed
3,641,901 UART: [rt] FIPS self test
3,642,232 UART: [kat] ++
3,642,384 UART: [kat] sha1
3,646,507 UART: [kat] SHA2-256
3,648,437 UART: [kat] SHA2-384
3,651,158 UART: [kat] SHA2-512-ACC
3,653,053 UART: [kat] ECC-384
3,662,386 UART: [kat] HMAC-384Kdf
3,667,039 UART: [kat] LMS
3,915,930 UART: [kat] --
4,710,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,140,332 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,141,367 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
6,170,537 UART: [rt]cmd =0x46504c67, len=4
6,171,685 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,755 ready_for_fw is high
1,361,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,891 >>> mbox cmd response: success
2,928,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,989,765 UART:
2,989,781 UART: Running Caliptra FMC ...
2,990,189 UART:
2,990,243 UART: [state] CFI Enabled
3,001,040 UART: [fht] FMC Alias Private Key: 7
3,109,427 UART: [art] Extend RT PCRs Done
3,109,855 UART: [art] Lock RT PCRs Done
3,111,503 UART: [art] Populate DV Done
3,119,818 UART: [fht] FMC Alias Private Key: 7
3,120,772 UART: [art] Derive CDI
3,121,052 UART: [art] Store in in slot 0x4
3,206,941 UART: [art] Derive Key Pair
3,207,301 UART: [art] Store priv key in slot 0x5
3,219,657 UART: [art] Derive Key Pair - Done
3,234,352 UART: [art] Signing Cert with AUTHO
3,234,832 UART: RITY.KEYID = 7
3,249,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,265 UART: [art] PUB.X = 8771CF6ED350AE43A3B2F8D38315D8B3788F48DCBAB9A9B5EA819B5C324A1E946253E957202099F553E96E2477AC1AEE
3,257,043 UART: [art] PUB.Y = FD12390816ACC8A006FA1BFBE2683464BDC4705900D7214BC309AE7A4079C69600D0436A0CF65D0B3F6526F11CF6BC0C
3,263,939 UART: [art] SIG.R = 5497D3C855F11B91B8E81A1D5FF0035DACCBE153F541256A2C6A348200BB92171DB4AD0926D238B798E85A75C8DF7402
3,270,682 UART: [art] SIG.S = D155F55302957F87A6D51A4E4B23DB793BFEE4A92CFB877DE59C68DF250749D1C03071FA280338EC5758719A4E739647
3,293,924 UART: Caliptra RT
3,294,177 UART: [state] CFI Enabled
3,402,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,654 UART: [rt]cmd =0x46504c54, len=4
3,433,609 >>> mbox cmd response data (8 bytes)
3,433,610 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,463,435 UART: [rt]cmd =0x46504c67, len=4
3,464,198 >>> mbox cmd response: failed
3,464,446 UART: [rt] FIPS self test
3,464,777 UART: [kat] ++
3,464,929 UART: [kat] sha1
3,469,040 UART: [kat] SHA2-256
3,470,970 UART: [kat] SHA2-384
3,473,651 UART: [kat] SHA2-512-ACC
3,475,546 UART: [kat] ECC-384
3,485,403 UART: [kat] HMAC-384Kdf
3,489,886 UART: [kat] LMS
3,738,777 UART: [kat] --
4,426,268 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,856,052 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,958 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,893,232 UART: [rt]cmd =0x46504c67, len=4
5,894,374 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
891,128 UART: [kat] SHA2-256
893,066 UART: [kat] SHA2-384
895,967 UART: [kat] SHA2-512-ACC
897,868 UART: [kat] ECC-384
903,649 UART: [kat] HMAC-384Kdf
908,331 UART: [kat] LMS
1,476,527 UART: [kat] --
1,477,396 UART: [cold-reset] ++
1,477,954 UART: [fht] Storing FHT @ 0x50003400
1,480,833 UART: [idev] ++
1,481,001 UART: [idev] CDI.KEYID = 6
1,481,361 UART: [idev] SUBJECT.KEYID = 7
1,481,785 UART: [idev] UDS.KEYID = 0
1,482,130 ready_for_fw is high
1,482,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,827 UART: [idev] Erasing UDS.KEYID = 0
1,506,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,055 UART: [idev] --
1,515,990 UART: [ldev] ++
1,516,158 UART: [ldev] CDI.KEYID = 6
1,516,521 UART: [ldev] SUBJECT.KEYID = 5
1,516,947 UART: [ldev] AUTHORITY.KEYID = 7
1,517,410 UART: [ldev] FE.KEYID = 1
1,522,540 UART: [ldev] Erasing FE.KEYID = 1
1,547,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,845 UART: [ldev] --
1,587,264 UART: [fwproc] Waiting for Commands...
1,587,901 UART: [fwproc] Received command 0x46574c44
1,588,692 UART: [fwproc] Received Image of size 114448 bytes
2,888,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,932 >>> mbox cmd response: success
3,080,932 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,082,136 UART: [afmc] ++
3,082,304 UART: [afmc] CDI.KEYID = 6
3,082,666 UART: [afmc] SUBJECT.KEYID = 7
3,083,091 UART: [afmc] AUTHORITY.KEYID = 5
3,118,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,043 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,733 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,532 UART: [afmc] --
3,161,516 UART: [cold-reset] --
3,162,336 UART: [state] Locking Datavault
3,163,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,823 UART: [state] Locking ICCM
3,164,373 UART: [exit] Launching FMC @ 0x40000130
3,169,702 UART:
3,169,718 UART: Running Caliptra FMC ...
3,170,126 UART:
3,170,269 UART: [state] CFI Enabled
3,181,338 UART: [fht] FMC Alias Private Key: 7
3,289,291 UART: [art] Extend RT PCRs Done
3,289,719 UART: [art] Lock RT PCRs Done
3,290,877 UART: [art] Populate DV Done
3,298,848 UART: [fht] FMC Alias Private Key: 7
3,299,904 UART: [art] Derive CDI
3,300,184 UART: [art] Store in in slot 0x4
3,386,105 UART: [art] Derive Key Pair
3,386,465 UART: [art] Store priv key in slot 0x5
3,399,445 UART: [art] Derive Key Pair - Done
3,414,229 UART: [art] Signing Cert with AUTHO
3,414,709 UART: RITY.KEYID = 7
3,430,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,952 UART: [art] PUB.X = 5BE554550C00C693E80EED320D79C6AFAAA3B0568856062C8C46D150ADE7E7B31B01200A14E7AC78EED3BBBBA86C2FF3
3,437,700 UART: [art] PUB.Y = 65912B73B3EFD92F5CBBD553001E733D63C0B1898CBE3BFDC90261DD6BEA4C5428372817172345A42905894229A9B77E
3,444,622 UART: [art] SIG.R = 474338D1F5813E7AB73927D4B4672737C201E7DBF41A50627CE7E5CD51112EE43147E6C68AD5919211B7E6EB5C895D9F
3,451,389 UART: [art] SIG.S = 7FD37083DB2297503100225DA158C99FFCD949B353362A51388DDA740F0D8AF71BBF82483A58E1073EFF8A0CCC037D84
3,475,125 UART: Caliptra RT
3,475,470 UART: [state] CFI Enabled
3,583,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,172 UART: [rt]cmd =0x46504c54, len=4
3,615,387 >>> mbox cmd response data (8 bytes)
3,615,388 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,645,011 UART: [rt]cmd =0x46504c67, len=4
3,645,800 >>> mbox cmd response: failed
3,646,066 UART: [rt] FIPS self test
3,646,397 UART: [kat] ++
3,646,549 UART: [kat] sha1
3,650,830 UART: [kat] SHA2-256
3,652,760 UART: [kat] SHA2-384
3,655,651 UART: [kat] SHA2-512-ACC
3,657,546 UART: [kat] ECC-384
3,667,447 UART: [kat] HMAC-384Kdf
3,671,862 UART: [kat] LMS
3,920,753 UART: [kat] --
4,715,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,145,741 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,155,549 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,184,835 UART: [rt]cmd =0x46504c67, len=4
6,185,985 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,698 ready_for_fw is high
1,362,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,884 >>> mbox cmd response: success
2,930,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,992,926 UART:
2,992,942 UART: Running Caliptra FMC ...
2,993,350 UART:
2,993,493 UART: [state] CFI Enabled
3,004,252 UART: [fht] FMC Alias Private Key: 7
3,112,157 UART: [art] Extend RT PCRs Done
3,112,585 UART: [art] Lock RT PCRs Done
3,114,147 UART: [art] Populate DV Done
3,122,410 UART: [fht] FMC Alias Private Key: 7
3,123,456 UART: [art] Derive CDI
3,123,736 UART: [art] Store in in slot 0x4
3,209,535 UART: [art] Derive Key Pair
3,209,895 UART: [art] Store priv key in slot 0x5
3,223,077 UART: [art] Derive Key Pair - Done
3,237,923 UART: [art] Signing Cert with AUTHO
3,238,403 UART: RITY.KEYID = 7
3,254,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,126 UART: [art] PUB.X = 8FCB280CB57D02857F7F877F3DB47F122B73EEB26C16C58EB09F8D597A88A7EB959D4BBD7F79D752F01064CEB2F90880
3,261,899 UART: [art] PUB.Y = BF8B45C43A33AB27C85CDFD116835B41A3CF7D29DDE19F5A222BA8E806545D56F07ABF8821E54FA9F89D6FDA97293C9F
3,268,864 UART: [art] SIG.R = AF1BDB8D166D987F67A911AD4F69D774FBC20B2698B8F9CED23A9996CE6C5DCB96063B7AF918968EE8C9B357C51F3205
3,275,639 UART: [art] SIG.S = 559C7852551B7BABD83B177460A19656E6D779FD6ED718ECA4A37F60C58E500CD0ACC9F334E2278C9E3382D0850BDA0B
3,299,615 UART: Caliptra RT
3,299,960 UART: [state] CFI Enabled
3,408,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,691 UART: [rt]cmd =0x46504c54, len=4
3,439,848 >>> mbox cmd response data (8 bytes)
3,439,849 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,469,402 UART: [rt]cmd =0x46504c67, len=4
3,470,369 >>> mbox cmd response: failed
3,470,693 UART: [rt] FIPS self test
3,471,024 UART: [kat] ++
3,471,176 UART: [kat] sha1
3,475,209 UART: [kat] SHA2-256
3,477,139 UART: [kat] SHA2-384
3,479,774 UART: [kat] SHA2-512-ACC
3,481,669 UART: [kat] ECC-384
3,491,584 UART: [kat] HMAC-384Kdf
3,496,143 UART: [kat] LMS
3,745,034 UART: [kat] --
4,432,665 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,862,861 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,870,129 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,563 UART: [rt]cmd =0x46504c67, len=4
5,900,805 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
893,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,371 UART: [kat] ++
897,523 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,610 UART: [kat] LMS
1,170,938 UART: [kat] --
1,171,787 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,666 UART: [idev] ++
1,174,834 UART: [idev] CDI.KEYID = 6
1,175,194 UART: [idev] SUBJECT.KEYID = 7
1,175,618 UART: [idev] UDS.KEYID = 0
1,175,963 ready_for_fw is high
1,175,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,490 UART: [idev] Erasing UDS.KEYID = 0
1,200,201 UART: [idev] Sha1 KeyId Algorithm
1,208,483 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,706 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,784 >>> mbox cmd response: success
2,774,784 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,775,934 UART: [afmc] ++
2,776,102 UART: [afmc] CDI.KEYID = 6
2,776,464 UART: [afmc] SUBJECT.KEYID = 7
2,776,889 UART: [afmc] AUTHORITY.KEYID = 5
2,812,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,591 UART: [afmc] --
2,855,717 UART: [cold-reset] --
2,856,573 UART: [state] Locking Datavault
2,857,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,460 UART: [state] Locking ICCM
2,859,036 UART: [exit] Launching FMC @ 0x40000130
2,864,365 UART:
2,864,381 UART: Running Caliptra FMC ...
2,864,789 UART:
2,864,843 UART: [state] CFI Enabled
2,875,254 UART: [fht] FMC Alias Private Key: 7
2,983,737 UART: [art] Extend RT PCRs Done
2,984,165 UART: [art] Lock RT PCRs Done
2,985,757 UART: [art] Populate DV Done
2,994,196 UART: [fht] FMC Alias Private Key: 7
2,995,180 UART: [art] Derive CDI
2,995,460 UART: [art] Store in in slot 0x4
3,080,975 UART: [art] Derive Key Pair
3,081,335 UART: [art] Store priv key in slot 0x5
3,094,751 UART: [art] Derive Key Pair - Done
3,109,436 UART: [art] Signing Cert with AUTHO
3,109,916 UART: RITY.KEYID = 7
3,125,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,117 UART: [art] PUB.X = D6BA81830A92BA990D50E9E5E2AC5AB278E786BDB473AEDD627E15FCCEF2C32769F624DC339A1CBCAD6EE78821501398
3,132,899 UART: [art] PUB.Y = 595BF12D74119341B66879179840FFEC8D56E9E877876F288135C6EFA143C5AA92DA003832DFA5C2DAB0128514E4093F
3,139,822 UART: [art] SIG.R = 505F70594B5AF3E079D83F8695FB0D2E692BAE27F479A3659EB32AA8C67C4E5AFCAF71508CBC9F10B1E179E516D55987
3,146,599 UART: [art] SIG.S = ACBBB368229FEBCC1061A942F2D8A87B71AEC8A4D6E3D5A95D3A688EC15B1550060981BEA5ADBEDE81D4BAA83C269D02
3,170,201 UART: Caliptra RT
3,170,454 UART: [state] CFI Enabled
3,277,029 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,717 UART: [rt]cmd =0x46504c54, len=4
3,308,962 >>> mbox cmd response data (8 bytes)
3,308,963 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,966 UART: [rt]cmd =0x46504c67, len=4
3,340,037 >>> mbox cmd response: failed
3,340,225 UART: [rt] FIPS self test
3,340,556 UART: [kat] ++
3,340,708 UART: [kat] sha1
3,344,943 UART: [kat] SHA2-256
3,346,873 UART: [kat] SHA2-384
3,349,732 UART: [kat] SHA2-512-ACC
3,351,627 UART: [kat] ECC-384
3,361,310 UART: [kat] HMAC-384Kdf
3,366,007 UART: [kat] LMS
3,614,898 UART: [kat] --
4,418,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,848,444 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,786 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,988 UART: [rt]cmd =0x46504c67, len=4
5,880,034 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 ready_for_fw is high
1,060,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,065 >>> mbox cmd response: success
2,629,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,691,451 UART:
2,691,467 UART: Running Caliptra FMC ...
2,691,875 UART:
2,691,929 UART: [state] CFI Enabled
2,702,436 UART: [fht] FMC Alias Private Key: 7
2,810,063 UART: [art] Extend RT PCRs Done
2,810,491 UART: [art] Lock RT PCRs Done
2,812,183 UART: [art] Populate DV Done
2,820,282 UART: [fht] FMC Alias Private Key: 7
2,821,364 UART: [art] Derive CDI
2,821,644 UART: [art] Store in in slot 0x4
2,907,219 UART: [art] Derive Key Pair
2,907,579 UART: [art] Store priv key in slot 0x5
2,920,313 UART: [art] Derive Key Pair - Done
2,934,884 UART: [art] Signing Cert with AUTHO
2,935,364 UART: RITY.KEYID = 7
2,951,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,927 UART: [art] PUB.X = 1183BA2AC93353A4AAF3FEF4CF79CD2E0F36718CE469AB256A38F4CC9495E73E766A010EE8F5E1DDA3DDCC318B1268FF
2,958,710 UART: [art] PUB.Y = 79FC4D86B3CA2B0BE07BFD7B6929EAB89729AEABA7F757E521DAB59EDB979D3487ED0B94B180F4020D187F103A058A3E
2,965,663 UART: [art] SIG.R = A097F566268B9996CDD2E8ACA3EF05F39269B793AB0BCD6A1E044D324324271CD4078A179D9E715C7591122290DC0B28
2,972,418 UART: [art] SIG.S = D0AAC0DC6FB7B76C14812D4DF9B04225DA9D08D7F01F9A4EB5C4E1C35989676DECCAED6E6E8F401EEE3D4DE50A26357D
2,995,587 UART: Caliptra RT
2,995,840 UART: [state] CFI Enabled
3,104,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,740 UART: [rt]cmd =0x46504c54, len=4
3,135,943 >>> mbox cmd response data (8 bytes)
3,135,944 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,165,767 UART: [rt]cmd =0x46504c67, len=4
3,166,846 >>> mbox cmd response: failed
3,166,974 UART: [rt] FIPS self test
3,167,305 UART: [kat] ++
3,167,457 UART: [kat] sha1
3,171,446 UART: [kat] SHA2-256
3,173,376 UART: [kat] SHA2-384
3,176,191 UART: [kat] SHA2-512-ACC
3,178,086 UART: [kat] ECC-384
3,187,605 UART: [kat] HMAC-384Kdf
3,191,968 UART: [kat] LMS
3,440,859 UART: [kat] --
4,139,918 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,570,445 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,605 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,606,027 UART: [rt]cmd =0x46504c67, len=4
5,607,343 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
893,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,328 UART: [kat] ++
897,480 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,521 UART: [kat] SHA2-512-ACC
908,422 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
922,921 UART: [kat] LMS
1,171,249 UART: [kat] --
1,171,924 UART: [cold-reset] ++
1,172,252 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 ready_for_fw is high
1,176,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,923 UART: [idev] Erasing UDS.KEYID = 0
1,200,880 UART: [idev] Sha1 KeyId Algorithm
1,209,408 UART: [idev] --
1,210,428 UART: [ldev] ++
1,210,596 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,385 UART: [ldev] AUTHORITY.KEYID = 7
1,211,848 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,243,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,416 UART: [ldev] --
1,282,755 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,055 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,951 >>> mbox cmd response: success
2,775,951 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,777,079 UART: [afmc] ++
2,777,247 UART: [afmc] CDI.KEYID = 6
2,777,609 UART: [afmc] SUBJECT.KEYID = 7
2,778,034 UART: [afmc] AUTHORITY.KEYID = 5
2,813,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,682 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,124 UART: [afmc] --
2,857,094 UART: [cold-reset] --
2,858,046 UART: [state] Locking Datavault
2,859,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,957 UART: [state] Locking ICCM
2,860,511 UART: [exit] Launching FMC @ 0x40000130
2,865,840 UART:
2,865,856 UART: Running Caliptra FMC ...
2,866,264 UART:
2,866,407 UART: [state] CFI Enabled
2,877,042 UART: [fht] FMC Alias Private Key: 7
2,985,133 UART: [art] Extend RT PCRs Done
2,985,561 UART: [art] Lock RT PCRs Done
2,987,257 UART: [art] Populate DV Done
2,995,294 UART: [fht] FMC Alias Private Key: 7
2,996,416 UART: [art] Derive CDI
2,996,696 UART: [art] Store in in slot 0x4
3,082,511 UART: [art] Derive Key Pair
3,082,871 UART: [art] Store priv key in slot 0x5
3,096,145 UART: [art] Derive Key Pair - Done
3,110,934 UART: [art] Signing Cert with AUTHO
3,111,414 UART: RITY.KEYID = 7
3,126,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,601 UART: [art] PUB.X = DEBFA23A6B0087A38534EFA9BBBFF7B6E5948989333FE4602ABE916C6D3F82B80E0C641483FE594F87DA4C6ECDD85CE4
3,134,363 UART: [art] PUB.Y = BDADD5EE6FC78557A241B50EBC04BE7F4B11DA259E7E04A2654ED47BBA0F288C5DAF11CE518E33B8A017A2E2C371B5FC
3,141,327 UART: [art] SIG.R = 99E08BDA2098E05CB9A1FCEEFE1DD8F1CDD9E870401B36B77DFBD89847924E3DD253711BAFBE2A8FABA2AD9EAB7BEAF8
3,148,133 UART: [art] SIG.S = 8C76F3DB6CFAA6F7A45617663133442615EAB6A5080F4B06D3D0B927C6AFCFFDAF4214A734C14087BE824AFAFEDB574A
3,172,357 UART: Caliptra RT
3,172,702 UART: [state] CFI Enabled
3,281,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,992 UART: [rt]cmd =0x46504c54, len=4
3,313,253 >>> mbox cmd response data (8 bytes)
3,313,254 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,343,111 UART: [rt]cmd =0x46504c67, len=4
3,343,944 >>> mbox cmd response: failed
3,344,270 UART: [rt] FIPS self test
3,344,601 UART: [kat] ++
3,344,753 UART: [kat] sha1
3,348,852 UART: [kat] SHA2-256
3,350,782 UART: [kat] SHA2-384
3,353,567 UART: [kat] SHA2-512-ACC
3,355,462 UART: [kat] ECC-384
3,365,085 UART: [kat] HMAC-384Kdf
3,369,808 UART: [kat] LMS
3,618,699 UART: [kat] --
4,422,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,853,221 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,692 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,892,970 UART: [rt]cmd =0x46504c67, len=4
5,893,934 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,170 ready_for_fw is high
1,061,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,631,064 >>> mbox cmd response: success
2,631,064 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,693,772 UART:
2,693,788 UART: Running Caliptra FMC ...
2,694,196 UART:
2,694,339 UART: [state] CFI Enabled
2,704,898 UART: [fht] FMC Alias Private Key: 7
2,812,619 UART: [art] Extend RT PCRs Done
2,813,047 UART: [art] Lock RT PCRs Done
2,814,533 UART: [art] Populate DV Done
2,822,544 UART: [fht] FMC Alias Private Key: 7
2,823,712 UART: [art] Derive CDI
2,823,992 UART: [art] Store in in slot 0x4
2,909,461 UART: [art] Derive Key Pair
2,909,821 UART: [art] Store priv key in slot 0x5
2,922,987 UART: [art] Derive Key Pair - Done
2,937,707 UART: [art] Signing Cert with AUTHO
2,938,187 UART: RITY.KEYID = 7
2,953,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,298 UART: [art] PUB.X = 9366CE315E829DE80943BDC49386CAD5592CE60DF33C2B625364A3DD0651741E847CC863A4A6DBA98C5D83886B2C44A5
2,961,063 UART: [art] PUB.Y = A82E42A80725171E5BBDB5F5142FD4FFB4E37EF55081740964CBD718F97B40F124B96EC7CD4D70E2A07443D7AD060CAB
2,968,013 UART: [art] SIG.R = 9F8EA905E09436B1D4CF92A2BA649170DFABBAC6A3C963A44B65184A134A6B09C6E5EE763A138828D6DBBAC49AE87C2C
2,974,795 UART: [art] SIG.S = 2C1486CB6F484ECB2D3D8487CD9E7DC876E611D93762BE28B372B091528904FF227DD0EB814A1515A1FF5EEC4602252E
2,998,944 UART: Caliptra RT
2,999,289 UART: [state] CFI Enabled
3,107,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,664 UART: [rt]cmd =0x46504c54, len=4
3,139,001 >>> mbox cmd response data (8 bytes)
3,139,002 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,168,777 UART: [rt]cmd =0x46504c67, len=4
3,169,826 >>> mbox cmd response: failed
3,170,002 UART: [rt] FIPS self test
3,170,333 UART: [kat] ++
3,170,485 UART: [kat] sha1
3,174,564 UART: [kat] SHA2-256
3,176,494 UART: [kat] SHA2-384
3,179,235 UART: [kat] SHA2-512-ACC
3,181,130 UART: [kat] ECC-384
3,190,661 UART: [kat] HMAC-384Kdf
3,195,208 UART: [kat] LMS
3,444,099 UART: [kat] --
4,143,208 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,572,537 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,579,585 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,608,959 UART: [rt]cmd =0x46504c67, len=4
5,610,049 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,763 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,174,705 ready_for_fw is high
1,174,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,820 UART: [ldev] ++
1,209,988 UART: [ldev] CDI.KEYID = 6
1,210,352 UART: [ldev] SUBJECT.KEYID = 5
1,210,779 UART: [ldev] AUTHORITY.KEYID = 7
1,211,242 UART: [ldev] FE.KEYID = 1
1,216,624 UART: [ldev] Erasing FE.KEYID = 1
1,242,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,604 UART: [ldev] --
1,282,008 UART: [fwproc] Wait for Commands...
1,282,763 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,996 >>> mbox cmd response: success
2,773,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,775,217 UART: [afmc] ++
2,775,385 UART: [afmc] CDI.KEYID = 6
2,775,748 UART: [afmc] SUBJECT.KEYID = 7
2,776,174 UART: [afmc] AUTHORITY.KEYID = 5
2,811,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,048 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,500 UART: [afmc] --
2,854,568 UART: [cold-reset] --
2,855,162 UART: [state] Locking Datavault
2,856,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,945 UART: [state] Locking ICCM
2,857,615 UART: [exit] Launching FMC @ 0x40000130
2,862,944 UART:
2,862,960 UART: Running Caliptra FMC ...
2,863,368 UART:
2,863,422 UART: [state] CFI Enabled
2,873,841 UART: [fht] FMC Alias Private Key: 7
2,981,330 UART: [art] Extend RT PCRs Done
2,981,758 UART: [art] Lock RT PCRs Done
2,983,282 UART: [art] Populate DV Done
2,991,601 UART: [fht] FMC Alias Private Key: 7
2,992,563 UART: [art] Derive CDI
2,992,843 UART: [art] Store in in slot 0x4
3,078,154 UART: [art] Derive Key Pair
3,078,514 UART: [art] Store priv key in slot 0x5
3,091,556 UART: [art] Derive Key Pair - Done
3,106,116 UART: [art] Signing Cert with AUTHO
3,106,596 UART: RITY.KEYID = 7
3,121,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,403 UART: [art] PUB.X = 4BAEAAEA6D0C72954993A80A30D55707CE5559C8EC661BA4B68DF1693549167F5DAD9AFF515BEDF79F7FC8D5196C53F4
3,129,180 UART: [art] PUB.Y = 3109A74FB3F23FAC96FA952E68006DC311A2F8EC7E92B5BAC3CA4755CC6086217FB2BE1F969D104D88EDC3D3ECBCC0D8
3,136,127 UART: [art] SIG.R = B3FB4908332B8A66D1EB810F24E0D76E78BB409728BEA60A02FF35FF04B8EF90A9D94EC7C05744B42366255932310B39
3,142,881 UART: [art] SIG.S = 983C81D11C18C9A44E46089B5C1A985E2153BCF23D0BF3CFD697802B02EB46DC3D9A245B4BE0CB797E93CB7533271EDC
3,167,269 UART: Caliptra RT
3,167,522 UART: [state] CFI Enabled
3,275,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,452 UART: [rt]cmd =0x46504c54, len=4
3,306,403 >>> mbox cmd response data (8 bytes)
3,306,404 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,336,129 UART: [rt]cmd =0x46504c67, len=4
3,336,978 >>> mbox cmd response: failed
3,337,332 UART: [rt] FIPS self test
3,337,663 UART: [kat] ++
3,337,815 UART: [kat] sha1
3,342,070 UART: [kat] SHA2-256
3,344,000 UART: [kat] SHA2-384
3,346,779 UART: [kat] SHA2-512-ACC
3,348,674 UART: [kat] ECC-384
3,358,145 UART: [kat] HMAC-384Kdf
3,362,526 UART: [kat] LMS
3,611,417 UART: [kat] --
4,413,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,843,559 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,846,727 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,876,093 UART: [rt]cmd =0x46504c67, len=4
5,877,217 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,434 ready_for_fw is high
1,056,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,908 >>> mbox cmd response: success
2,624,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,686,682 UART:
2,686,698 UART: Running Caliptra FMC ...
2,687,106 UART:
2,687,160 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,805,748 UART: [art] Extend RT PCRs Done
2,806,176 UART: [art] Lock RT PCRs Done
2,807,552 UART: [art] Populate DV Done
2,815,593 UART: [fht] FMC Alias Private Key: 7
2,816,595 UART: [art] Derive CDI
2,816,875 UART: [art] Store in in slot 0x4
2,902,634 UART: [art] Derive Key Pair
2,902,994 UART: [art] Store priv key in slot 0x5
2,916,330 UART: [art] Derive Key Pair - Done
2,931,008 UART: [art] Signing Cert with AUTHO
2,931,488 UART: RITY.KEYID = 7
2,946,404 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,169 UART: [art] PUB.X = 2F0C8406E2FB6EF7201822CAF5896E45A34F82CA11D60053F5BEE54876CE8375D6AB193FFC9C78E21221884B4055CCFD
2,953,919 UART: [art] PUB.Y = 580C682041B7D5445EA92ED6F1E7803503432DDE3790E3DFEBEF31564A897780A8D82B40D59C4FA7D69BF0992EC31885
2,960,865 UART: [art] SIG.R = 7ED75C11806EE90843A5FC2F7A046E78F85DC0885AB1B13F680EB46C327425CC7BA8FD630684136B7827769FEF6D88D8
2,967,627 UART: [art] SIG.S = 97C6138679E9890870257FA021F37C08756D772FE8CACD88574A936FE1511176AC3F52D561DE029D94DB1059D830C5A0
2,991,767 UART: Caliptra RT
2,992,020 UART: [state] CFI Enabled
3,099,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,475 UART: [rt]cmd =0x46504c54, len=4
3,130,416 >>> mbox cmd response data (8 bytes)
3,130,417 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,160,140 UART: [rt]cmd =0x46504c67, len=4
3,161,219 >>> mbox cmd response: failed
3,161,409 UART: [rt] FIPS self test
3,161,740 UART: [kat] ++
3,161,892 UART: [kat] sha1
3,166,209 UART: [kat] SHA2-256
3,168,139 UART: [kat] SHA2-384
3,170,946 UART: [kat] SHA2-512-ACC
3,172,841 UART: [kat] ECC-384
3,182,346 UART: [kat] HMAC-384Kdf
3,186,749 UART: [kat] LMS
3,435,640 UART: [kat] --
4,130,407 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,560,032 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,979 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
5,590,169 UART: [rt]cmd =0x46504c67, len=4
5,591,403 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 ready_for_fw is high
1,174,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,341 UART: [ldev] ++
1,209,509 UART: [ldev] CDI.KEYID = 6
1,209,873 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,605 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,551 >>> mbox cmd response: success
2,773,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,648 UART: [afmc] ++
2,774,816 UART: [afmc] CDI.KEYID = 6
2,775,179 UART: [afmc] SUBJECT.KEYID = 7
2,775,605 UART: [afmc] AUTHORITY.KEYID = 5
2,811,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,545 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,049 UART: [afmc] --
2,855,061 UART: [cold-reset] --
2,855,679 UART: [state] Locking Datavault
2,856,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,370 UART: [state] Locking ICCM
2,857,914 UART: [exit] Launching FMC @ 0x40000130
2,863,243 UART:
2,863,259 UART: Running Caliptra FMC ...
2,863,667 UART:
2,863,810 UART: [state] CFI Enabled
2,874,453 UART: [fht] FMC Alias Private Key: 7
2,982,586 UART: [art] Extend RT PCRs Done
2,983,014 UART: [art] Lock RT PCRs Done
2,984,426 UART: [art] Populate DV Done
2,992,465 UART: [fht] FMC Alias Private Key: 7
2,993,633 UART: [art] Derive CDI
2,993,913 UART: [art] Store in in slot 0x4
3,079,966 UART: [art] Derive Key Pair
3,080,326 UART: [art] Store priv key in slot 0x5
3,093,640 UART: [art] Derive Key Pair - Done
3,108,397 UART: [art] Signing Cert with AUTHO
3,108,877 UART: RITY.KEYID = 7
3,124,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,842 UART: [art] PUB.X = 716B9059D7BEFF098BE5CBE1356496BAAB3841B63450A316348134EA9ABDC8DDE5A2393ECDB2294CDE581AE349B84A0C
3,131,622 UART: [art] PUB.Y = 1AE4AF3CF58A5F1347E6080F34332C39B1FE4CE50792AAEE7AD0B8C2442676E1E597598BE94055196D1DF2EA9C045F8E
3,138,570 UART: [art] SIG.R = A269673DB939E94A1670F6FC242281863BFFEE83AD6628987D4888F72493404B507E2E21DAA7098218AAA0C78326FC78
3,145,333 UART: [art] SIG.S = 9E243B4582AE0C9676672BA7DD7D55042D7850A34281DEF24BA436ACCABF5307609379F432A87770B70949ED2807FDBD
3,169,365 UART: Caliptra RT
3,169,710 UART: [state] CFI Enabled
3,277,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,504 UART: [rt]cmd =0x46504c54, len=4
3,308,583 >>> mbox cmd response data (8 bytes)
3,308,584 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,055 UART: [rt]cmd =0x46504c67, len=4
3,339,032 >>> mbox cmd response: failed
3,339,366 UART: [rt] FIPS self test
3,339,697 UART: [kat] ++
3,339,849 UART: [kat] sha1
3,343,914 UART: [kat] SHA2-256
3,345,844 UART: [kat] SHA2-384
3,348,521 UART: [kat] SHA2-512-ACC
3,350,416 UART: [kat] ECC-384
3,359,975 UART: [kat] HMAC-384Kdf
3,364,486 UART: [kat] LMS
3,613,377 UART: [kat] --
4,415,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,846,147 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,848,781 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,293 UART: [rt]cmd =0x46504c67, len=4
5,879,445 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,447 ready_for_fw is high
1,056,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,397 >>> mbox cmd response: success
2,625,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,135 UART:
2,688,151 UART: Running Caliptra FMC ...
2,688,559 UART:
2,688,702 UART: [state] CFI Enabled
2,698,959 UART: [fht] FMC Alias Private Key: 7
2,806,522 UART: [art] Extend RT PCRs Done
2,806,950 UART: [art] Lock RT PCRs Done
2,808,590 UART: [art] Populate DV Done
2,816,805 UART: [fht] FMC Alias Private Key: 7
2,817,971 UART: [art] Derive CDI
2,818,251 UART: [art] Store in in slot 0x4
2,904,572 UART: [art] Derive Key Pair
2,904,932 UART: [art] Store priv key in slot 0x5
2,918,090 UART: [art] Derive Key Pair - Done
2,932,998 UART: [art] Signing Cert with AUTHO
2,933,478 UART: RITY.KEYID = 7
2,948,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,561 UART: [art] PUB.X = 03EDCC3E7CB6B45DB6A75211568D40569F4D42E5F96A757B388AAB04DA206E9ED31B4332B624E62193A9F45B080CE8BC
2,956,329 UART: [art] PUB.Y = D5AF4F9DDC1E85B8C3E13A50D48E6098F28B21FF1B53CEDBF22ECD9D6F7D7CFFE6F1F5A93CFBF0F5B52C143B1CF7BBD6
2,963,317 UART: [art] SIG.R = 175DB75B93928D859A3B1DCFFC48F3899856626FD5DD64CD7B26FA5AAB479840FEED0CC0BBA27797DA002F9506588516
2,970,069 UART: [art] SIG.S = 55E4B851BF2EE83E50BC31CC18F3CBF2406B8833FCACA2B49149480FA5E5212EDC67F2550F8B61D324D3C8EA97096365
2,993,313 UART: Caliptra RT
2,993,658 UART: [state] CFI Enabled
3,101,085 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,581 UART: [rt]cmd =0x46504c54, len=4
3,132,588 >>> mbox cmd response data (8 bytes)
3,132,589 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,161,936 UART: [rt]cmd =0x46504c67, len=4
3,162,889 >>> mbox cmd response: failed
3,163,197 UART: [rt] FIPS self test
3,163,528 UART: [kat] ++
3,163,680 UART: [kat] sha1
3,167,881 UART: [kat] SHA2-256
3,169,811 UART: [kat] SHA2-384
3,172,722 UART: [kat] SHA2-512-ACC
3,174,617 UART: [kat] ECC-384
3,184,050 UART: [kat] HMAC-384Kdf
3,188,779 UART: [kat] LMS
3,437,670 UART: [kat] --
4,132,599 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,562,228 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,648 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,601,930 UART: [rt]cmd =0x46504c67, len=4
5,603,050 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
192,063 UART:
192,476 UART: Running Caliptra ROM ...
193,585 UART:
193,732 UART: [state] CFI Enabled
262,731 UART: [state] LifecycleState = Unprovisioned
264,634 UART: [state] DebugLocked = No
267,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,426 UART: [kat] SHA2-256
442,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,607 UART: [kat] ++
453,081 UART: [kat] sha1
463,744 UART: [kat] SHA2-256
466,433 UART: [kat] SHA2-384
473,273 UART: [kat] SHA2-512-ACC
475,610 UART: [kat] ECC-384
2,765,239 UART: [kat] HMAC-384Kdf
2,777,414 UART: [kat] LMS
3,967,741 UART: [kat] --
3,971,921 UART: [cold-reset] ++
3,972,946 UART: [fht] Storing FHT @ 0x50003400
3,985,100 UART: [idev] ++
3,985,677 UART: [idev] CDI.KEYID = 6
3,986,646 UART: [idev] SUBJECT.KEYID = 7
3,987,866 UART: [idev] UDS.KEYID = 0
3,989,032 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,010,658 UART: [idev] Erasing UDS.KEYID = 0
7,324,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,331 UART: [idev] --
7,349,624 UART: [ldev] ++
7,350,193 UART: [ldev] CDI.KEYID = 6
7,351,210 UART: [ldev] SUBJECT.KEYID = 5
7,352,369 UART: [ldev] AUTHORITY.KEYID = 7
7,353,604 UART: [ldev] FE.KEYID = 1
7,399,891 UART: [ldev] Erasing FE.KEYID = 1
10,730,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,560 UART: [ldev] --
13,097,164 UART: [fwproc] Waiting for Commands...
13,098,999 UART: [fwproc] Received command 0x46505652
13,101,407 UART: [rt] FIPS Version
13,103,021 >>> mbox cmd response data (36 bytes)
15,332,455 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,477,556 UART: [fwproc] Received command 0x46574c44
15,479,895 UART: [fwproc] Received Image of size 114124 bytes
19,525,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,600,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,669,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,987,389 >>> mbox cmd response: success
19,987,758 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,992,143 UART: [afmc] ++
19,992,726 UART: [afmc] CDI.KEYID = 6
19,993,642 UART: [afmc] SUBJECT.KEYID = 7
19,994,914 UART: [afmc] AUTHORITY.KEYID = 5
23,353,375 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,654,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,656,629 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,671,065 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,685,874 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,700,308 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,721,687 UART: [afmc] --
25,725,130 UART: [cold-reset] --
25,728,793 UART: [state] Locking Datavault
25,735,067 UART: [state] Locking PCR0, PCR1 and PCR31
25,736,823 UART: [state] Locking ICCM
25,738,350 UART: [exit] Launching FMC @ 0x40000130
25,746,741 UART:
25,746,978 UART: Running Caliptra FMC ...
25,748,002 UART:
25,748,155 UART: [state] CFI Enabled
25,815,683 UART: [fht] FMC Alias Private Key: 7
28,153,904 UART: [art] Extend RT PCRs Done
28,155,124 UART: [art] Lock RT PCRs Done
28,156,451 UART: [art] Populate DV Done
28,161,700 UART: [fht] FMC Alias Private Key: 7
28,163,196 UART: [art] Derive CDI
28,163,932 UART: [art] Store in in slot 0x4
28,225,101 UART: [art] Derive Key Pair
28,226,161 UART: [art] Store priv key in slot 0x5
31,519,585 UART: [art] Derive Key Pair - Done
31,532,416 UART: [art] Signing Cert with AUTHO
31,533,716 UART: RITY.KEYID = 7
33,821,201 UART: [art] Erasing AUTHORITY.KEYID = 7
33,822,718 UART: [art] PUB.X = 68138A4F4E5C8458E75CE908EF16BE0574F957408B0973DAADD4C49AEF684C8AFEADAEF26C92E6B06D1AD2C89E814CA5
33,830,013 UART: [art] PUB.Y = 1D80682DC59945432F1C700716966584F078B8034B725187CE725FCF887D4D50150B43F2D6D96BFC1FFBA5CEE768A2C8
33,837,212 UART: [art] SIG.R = 4819242AF45E311A9C20893241D951315267067C9F245EBA6E54A3369A1D8AD2E7EC96924F3FE75FCFC2C6DB7788895D
33,844,543 UART: [art] SIG.S = 2386CF918D6916D1A2967E9A235BB9A54002B7E269BAED63FA82DFDD477569541981F359E683C97E255DCA798B1DB2A0
35,149,512 UART: Caliptra RT
35,150,235 UART: [state] CFI Enabled
35,310,594 UART: [rt] RT listening for mailbox commands...
35,341,985 UART: [rt]cmd =0x46505652, len=4
35,343,289 UART: [rt] FIPS Version
35,344,553 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,781,732 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,822,668 >>> mbox cmd response data (36 bytes)
15,047,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,222,607 >>> mbox cmd response: success
20,223,167 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,909,746 UART:
25,910,140 UART: Running Caliptra FMC ...
25,911,275 UART:
25,911,437 UART: [state] CFI Enabled
25,981,499 UART: [fht] FMC Alias Private Key: 7
28,319,223 UART: [art] Extend RT PCRs Done
28,320,448 UART: [art] Lock RT PCRs Done
28,322,210 UART: [art] Populate DV Done
28,327,940 UART: [fht] FMC Alias Private Key: 7
28,329,642 UART: [art] Derive CDI
28,330,457 UART: [art] Store in in slot 0x4
28,390,611 UART: [art] Derive Key Pair
28,391,644 UART: [art] Store priv key in slot 0x5
31,684,589 UART: [art] Derive Key Pair - Done
31,697,802 UART: [art] Signing Cert with AUTHO
31,699,113 UART: RITY.KEYID = 7
33,986,205 UART: [art] Erasing AUTHORITY.KEYID = 7
33,987,716 UART: [art] PUB.X = 27AD2019FF8C2D7978A2E011CF98935F56E124F30A70098BD6D6A82B063C162ED14BB8DF3C465A60607162D94E1DF93A
33,994,967 UART: [art] PUB.Y = 10734BEECD87B37BD0624DF6AF5C679B1CFC9DC36454FAAD0EDE41E5F6AC16C86E36E677A725A69EF1D3C6005019DDC3
34,002,174 UART: [art] SIG.R = 90124B1131BB0CD52E99D14ECF4AD1FEC7DDA9627F6912B47AA86AFC77CABBDE6342C9DDC21E1CC53D93896B5930336E
34,009,612 UART: [art] SIG.S = 6B303B0E85EB74EE739A9BCD259A085781957EE1E84140E3BD5A7AB19E6A27ECF6C5C1B9B5A753D644CE665DFE21611C
35,314,738 UART: Caliptra RT
35,315,455 UART: [state] CFI Enabled
35,476,759 UART: [rt] RT listening for mailbox commands...
35,508,491 UART: [rt]cmd =0x46505652, len=4
35,509,822 UART: [rt] FIPS Version
35,510,824 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,422 UART:
192,800 UART: Running Caliptra ROM ...
193,964 UART:
603,715 UART: [state] CFI Enabled
617,852 UART: [state] LifecycleState = Unprovisioned
619,761 UART: [state] DebugLocked = No
622,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,423 UART: [kat] SHA2-256
796,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,700 UART: [kat] ++
807,233 UART: [kat] sha1
819,140 UART: [kat] SHA2-256
821,824 UART: [kat] SHA2-384
827,041 UART: [kat] SHA2-512-ACC
829,383 UART: [kat] ECC-384
3,113,337 UART: [kat] HMAC-384Kdf
3,125,570 UART: [kat] LMS
4,315,639 UART: [kat] --
4,322,137 UART: [cold-reset] ++
4,323,314 UART: [fht] Storing FHT @ 0x50003400
4,335,596 UART: [idev] ++
4,336,179 UART: [idev] CDI.KEYID = 6
4,337,250 UART: [idev] SUBJECT.KEYID = 7
4,338,355 UART: [idev] UDS.KEYID = 0
4,339,455 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,356,399 UART: [idev] Erasing UDS.KEYID = 0
7,627,517 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,038 UART: [idev] --
7,653,349 UART: [ldev] ++
7,653,922 UART: [ldev] CDI.KEYID = 6
7,654,865 UART: [ldev] SUBJECT.KEYID = 5
7,656,155 UART: [ldev] AUTHORITY.KEYID = 7
7,657,388 UART: [ldev] FE.KEYID = 1
7,667,148 UART: [ldev] Erasing FE.KEYID = 1
10,959,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,411 UART: [ldev] --
13,321,030 UART: [fwproc] Waiting for Commands...
13,323,452 UART: [fwproc] Received command 0x46505652
13,325,857 UART: [rt] FIPS Version
13,327,496 >>> mbox cmd response data (36 bytes)
15,545,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,691,181 UART: [fwproc] Received command 0x46574c44
15,693,507 UART: [fwproc] Received Image of size 114124 bytes
19,742,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,812,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,881,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,198,516 >>> mbox cmd response: success
20,198,901 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,202,600 UART: [afmc] ++
20,203,177 UART: [afmc] CDI.KEYID = 6
20,204,058 UART: [afmc] SUBJECT.KEYID = 7
20,205,330 UART: [afmc] AUTHORITY.KEYID = 5
23,512,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,805,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,807,701 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,822,110 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,836,913 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,851,413 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,872,224 UART: [afmc] --
25,876,575 UART: [cold-reset] --
25,881,405 UART: [state] Locking Datavault
25,886,653 UART: [state] Locking PCR0, PCR1 and PCR31
25,888,411 UART: [state] Locking ICCM
25,889,680 UART: [exit] Launching FMC @ 0x40000130
25,898,071 UART:
25,898,328 UART: Running Caliptra FMC ...
25,899,385 UART:
25,899,535 UART: [state] CFI Enabled
25,907,308 UART: [fht] FMC Alias Private Key: 7
28,238,108 UART: [art] Extend RT PCRs Done
28,239,349 UART: [art] Lock RT PCRs Done
28,241,347 UART: [art] Populate DV Done
28,246,830 UART: [fht] FMC Alias Private Key: 7
28,248,465 UART: [art] Derive CDI
28,249,292 UART: [art] Store in in slot 0x4
28,291,246 UART: [art] Derive Key Pair
28,292,250 UART: [art] Store priv key in slot 0x5
31,535,122 UART: [art] Derive Key Pair - Done
31,548,291 UART: [art] Signing Cert with AUTHO
31,549,592 UART: RITY.KEYID = 7
33,829,241 UART: [art] Erasing AUTHORITY.KEYID = 7
33,830,752 UART: [art] PUB.X = E33A4E7AA175ABE4AD78995FBAA37AF86CCB3194BD5EE7976F6CCC3324AF9B9C8D0A6ED88BC3C6944ADED525CDDB2397
33,838,061 UART: [art] PUB.Y = 137E5E7C7DCBED90DCA2633EA4D17016035A7F185842044C862115E323F0822A0D8FA262BADB3962BBA3CF8F27B29B8C
33,845,293 UART: [art] SIG.R = 1BE32FB2B35F0014F68A78A74F08360AF7E9F80C78CA1B607B1808033252FE80E7BD6B3F98ACF5C3CDDBB43E9FB8A918
33,852,684 UART: [art] SIG.S = B979789C4751D89EC35A2760279002479C2A00A598A9E1403749ADE97F029A46B2AD142BCCB54F9D82DA4D2E70DBCB5F
35,157,781 UART: Caliptra RT
35,158,498 UART: [state] CFI Enabled
35,275,420 UART: [rt] RT listening for mailbox commands...
35,306,774 UART: [rt]cmd =0x46505652, len=4
35,308,056 UART: [rt] FIPS Version
35,309,439 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
4,130,021 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,045,261 >>> mbox cmd response data (36 bytes)
15,269,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,444,755 >>> mbox cmd response: success
20,445,288 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,079,841 UART:
26,080,236 UART: Running Caliptra FMC ...
26,081,371 UART:
26,081,531 UART: [state] CFI Enabled
26,089,212 UART: [fht] FMC Alias Private Key: 7
28,419,644 UART: [art] Extend RT PCRs Done
28,420,933 UART: [art] Lock RT PCRs Done
28,422,270 UART: [art] Populate DV Done
28,427,480 UART: [fht] FMC Alias Private Key: 7
28,429,133 UART: [art] Derive CDI
28,429,949 UART: [art] Store in in slot 0x4
28,472,131 UART: [art] Derive Key Pair
28,473,195 UART: [art] Store priv key in slot 0x5
31,714,917 UART: [art] Derive Key Pair - Done
31,727,748 UART: [art] Signing Cert with AUTHO
31,729,096 UART: RITY.KEYID = 7
34,008,772 UART: [art] Erasing AUTHORITY.KEYID = 7
34,010,286 UART: [art] PUB.X = 9622480EEDF2C4723140A215474523BD37C285B201869EE4CCDCF1997298BCC080493D598EBEDC12F4BA5FAEA537C187
34,017,508 UART: [art] PUB.Y = 9EA219312D425D6A679E7FF75BC765A92C13DDE29A375D57B267C01F9E0BCE0654554DC81FCF3552C8B06A4A29482FC2
34,024,768 UART: [art] SIG.R = AE0774AA499555ADFAA2B13203FC0B9531DD0FE8BEB9D5CD318DB85724F4E85B6DE3DAA4FFFA2603F8975DE8279F091A
34,032,139 UART: [art] SIG.S = ECFC4BC95AF45B55298F4E97ABF54FB5083F9D28E46460BA06384D0D945BF2BB9737C265313AAC5BCD5BED964314E537
35,337,030 UART: Caliptra RT
35,337,755 UART: [state] CFI Enabled
35,455,587 UART: [rt] RT listening for mailbox commands...
35,487,104 UART: [rt]cmd =0x46505652, len=4
35,488,438 UART: [rt] FIPS Version
35,489,657 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,384 UART:
192,836 UART: Running Caliptra ROM ...
193,934 UART:
194,084 UART: [state] CFI Enabled
263,351 UART: [state] LifecycleState = Unprovisioned
265,254 UART: [state] DebugLocked = No
267,935 UART: [state] WD Timer not started. Device not locked for debugging
270,848 UART: [kat] SHA2-256
449,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,552 UART: [kat] ++
462,096 UART: [kat] sha1
473,042 UART: [kat] SHA2-256
476,047 UART: [kat] SHA2-384
482,245 UART: [kat] SHA2-512-ACC
485,239 UART: [kat] ECC-384
2,950,812 UART: [kat] HMAC-384Kdf
2,973,000 UART: [kat] LMS
3,502,456 UART: [kat] --
3,505,283 UART: [cold-reset] ++
3,506,894 UART: [fht] FHT @ 0x50003400
3,517,009 UART: [idev] ++
3,517,578 UART: [idev] CDI.KEYID = 6
3,518,489 UART: [idev] SUBJECT.KEYID = 7
3,519,720 UART: [idev] UDS.KEYID = 0
3,520,841 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,545,191 UART: [idev] Erasing UDS.KEYID = 0
6,026,574 UART: [idev] Sha1 KeyId Algorithm
6,050,069 UART: [idev] --
6,054,398 UART: [ldev] ++
6,054,968 UART: [ldev] CDI.KEYID = 6
6,055,854 UART: [ldev] SUBJECT.KEYID = 5
6,057,096 UART: [ldev] AUTHORITY.KEYID = 7
6,058,304 UART: [ldev] FE.KEYID = 1
6,102,100 UART: [ldev] Erasing FE.KEYID = 1
8,603,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,119 UART: [ldev] --
10,416,584 UART: [fwproc] Wait for Commands...
10,419,765 UART: [fwproc] Recv command 0x46505652
10,422,089 UART: [rt] FIPS Version
10,423,601 >>> mbox cmd response data (36 bytes)
12,642,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,787,556 UART: [fwproc] Recv command 0x46574c44
12,789,761 UART: [fwproc] Recv'd Img size: 114448 bytes
16,196,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,270,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,339,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,657,017 >>> mbox cmd response: success
16,657,376 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,662,098 UART: [afmc] ++
16,662,675 UART: [afmc] CDI.KEYID = 6
16,663,579 UART: [afmc] SUBJECT.KEYID = 7
16,664,741 UART: [afmc] AUTHORITY.KEYID = 5
19,210,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,931,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,933,477 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,949,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,965,223 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,981,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,004,642 UART: [afmc] --
21,008,512 UART: [cold-reset] --
21,011,941 UART: [state] Locking Datavault
21,018,717 UART: [state] Locking PCR0, PCR1 and PCR31
21,020,405 UART: [state] Locking ICCM
21,022,240 UART: [exit] Launching FMC @ 0x40000130
21,030,692 UART:
21,030,931 UART: Running Caliptra FMC ...
21,032,054 UART:
21,032,219 UART: [state] CFI Enabled
21,094,500 UART: [fht] FMC Alias Private Key: 7
22,858,509 UART: [art] Extend RT PCRs Done
22,859,730 UART: [art] Lock RT PCRs Done
22,861,193 UART: [art] Populate DV Done
22,866,767 UART: [fht] FMC Alias Private Key: 7
22,868,412 UART: [art] Derive CDI
22,869,224 UART: [art] Store in in slot 0x4
22,927,049 UART: [art] Derive Key Pair
22,928,047 UART: [art] Store priv key in slot 0x5
25,391,354 UART: [art] Derive Key Pair - Done
25,404,558 UART: [art] Signing Cert with AUTHO
25,405,862 UART: RITY.KEYID = 7
27,118,385 UART: [art] Erasing AUTHORITY.KEYID = 7
27,119,915 UART: [art] PUB.X = 09792A3C9257CC607EDFE2C516603637597E761835699CEC6E0149FF816C4F986B81FCD756B43C8E5A495538FAA89E71
27,127,194 UART: [art] PUB.Y = B89B71C2CEF0DE7D6F11E9400A7EC903DE92F288D910BFE25B66C60FCC88EB36393ED346B6871D20A7550D4A08F814B3
27,134,472 UART: [art] SIG.R = 766C69E985E33EE2B6C2C332E9B7FA9EE1648B0731AA2ADD9C2BE37F8C2927DB6CAC58C5F705EFA98A071545568D3166
27,141,855 UART: [art] SIG.S = 06ECF55BEB2E2D8E7FEB5876CCBD29E106523313E522F5E3D17EF189E4C9F9B1A92C5BD8388254C52A45D6F07E03FAB4
28,120,924 UART: Caliptra RT
28,121,621 UART: [state] CFI Enabled
28,286,410 UART: [rt] RT listening for mailbox commands...
28,317,904 UART: [rt]cmd =0x46505652, len=4
28,319,241 UART: [rt] FIPS Version
28,320,514 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,102 writing to cptra_bootfsm_go
3,359,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,179,299 >>> mbox cmd response data (36 bytes)
12,400,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,408,515 >>> mbox cmd response: success
16,409,001 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,690,326 UART:
20,690,793 UART: Running Caliptra FMC ...
20,691,887 UART:
20,692,038 UART: [state] CFI Enabled
20,760,582 UART: [fht] FMC Alias Private Key: 7
22,524,534 UART: [art] Extend RT PCRs Done
22,525,780 UART: [art] Lock RT PCRs Done
22,527,543 UART: [art] Populate DV Done
22,532,629 UART: [fht] FMC Alias Private Key: 7
22,534,122 UART: [art] Derive CDI
22,534,888 UART: [art] Store in in slot 0x4
22,592,992 UART: [art] Derive Key Pair
22,594,039 UART: [art] Store priv key in slot 0x5
25,056,813 UART: [art] Derive Key Pair - Done
25,069,849 UART: [art] Signing Cert with AUTHO
25,071,155 UART: RITY.KEYID = 7
26,782,908 UART: [art] Erasing AUTHORITY.KEYID = 7
26,784,416 UART: [art] PUB.X = BA290E6873F6605DC678FE8B873D5A98EE379AE24FDBDFA0FAABEE66CE862A2B5AF6FBE67C44B2E3DEB1FFE5504483ED
26,791,733 UART: [art] PUB.Y = 2F51BF16B13ACDB7A5AFF351D9EDB5AD6A70261A9E94860850189B7E6E9378D08A842B4905DC931722B5167718333E71
26,798,936 UART: [art] SIG.R = E0F5BB78E3D6A1996387038CF1E30AF5079D7AFC744511A3ACBF2D676C0F369CFCFC0A9E3BB3FAD2CECDF9F598EDA969
26,806,384 UART: [art] SIG.S = 1600DE2146B770E90FE1D699752C2DCDAB50FB756A2E5FBE64E787BF1485FF464D9BD2452C3229A499F63AAAE2B778FA
27,785,873 UART: Caliptra RT
27,786,613 UART: [state] CFI Enabled
27,951,003 UART: [rt] RT listening for mailbox commands...
27,982,640 UART: [rt]cmd =0x46505652, len=4
27,983,892 UART: [rt] FIPS Version
27,985,103 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,483 UART:
192,885 UART: Running Caliptra ROM ...
194,034 UART:
603,416 UART: [state] CFI Enabled
615,280 UART: [state] LifecycleState = Unprovisioned
617,140 UART: [state] DebugLocked = No
619,559 UART: [state] WD Timer not started. Device not locked for debugging
623,593 UART: [kat] SHA2-256
802,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,292 UART: [kat] ++
814,827 UART: [kat] sha1
825,064 UART: [kat] SHA2-256
828,064 UART: [kat] SHA2-384
832,745 UART: [kat] SHA2-512-ACC
835,679 UART: [kat] ECC-384
3,279,519 UART: [kat] HMAC-384Kdf
3,293,098 UART: [kat] LMS
3,822,638 UART: [kat] --
3,826,702 UART: [cold-reset] ++
3,827,879 UART: [fht] FHT @ 0x50003400
3,838,368 UART: [idev] ++
3,838,929 UART: [idev] CDI.KEYID = 6
3,839,913 UART: [idev] SUBJECT.KEYID = 7
3,841,075 UART: [idev] UDS.KEYID = 0
3,842,184 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,857,899 UART: [idev] Erasing UDS.KEYID = 0
6,316,500 UART: [idev] Sha1 KeyId Algorithm
6,339,646 UART: [idev] --
6,343,640 UART: [ldev] ++
6,344,211 UART: [ldev] CDI.KEYID = 6
6,345,101 UART: [ldev] SUBJECT.KEYID = 5
6,346,313 UART: [ldev] AUTHORITY.KEYID = 7
6,347,602 UART: [ldev] FE.KEYID = 1
6,357,199 UART: [ldev] Erasing FE.KEYID = 1
8,827,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,952 UART: [ldev] --
10,618,629 UART: [fwproc] Wait for Commands...
10,621,048 UART: [fwproc] Recv command 0x46505652
10,623,422 UART: [rt] FIPS Version
10,624,925 >>> mbox cmd response data (36 bytes)
12,843,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,988,910 UART: [fwproc] Recv command 0x46574c44
12,991,102 UART: [fwproc] Recv'd Img size: 114448 bytes
16,393,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,471,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,539,793 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,857,865 >>> mbox cmd response: success
16,858,238 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,862,142 UART: [afmc] ++
16,862,735 UART: [afmc] CDI.KEYID = 6
16,863,616 UART: [afmc] SUBJECT.KEYID = 7
16,864,832 UART: [afmc] AUTHORITY.KEYID = 5
19,364,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,085,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,087,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,103,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,119,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,135,425 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,158,269 UART: [afmc] --
21,162,193 UART: [cold-reset] --
21,164,531 UART: [state] Locking Datavault
21,171,405 UART: [state] Locking PCR0, PCR1 and PCR31
21,173,062 UART: [state] Locking ICCM
21,174,676 UART: [exit] Launching FMC @ 0x40000130
21,183,072 UART:
21,183,332 UART: Running Caliptra FMC ...
21,184,436 UART:
21,184,594 UART: [state] CFI Enabled
21,192,857 UART: [fht] FMC Alias Private Key: 7
22,949,385 UART: [art] Extend RT PCRs Done
22,950,607 UART: [art] Lock RT PCRs Done
22,952,583 UART: [art] Populate DV Done
22,957,883 UART: [fht] FMC Alias Private Key: 7
22,959,421 UART: [art] Derive CDI
22,960,156 UART: [art] Store in in slot 0x4
23,002,638 UART: [art] Derive Key Pair
23,003,680 UART: [art] Store priv key in slot 0x5
25,430,315 UART: [art] Derive Key Pair - Done
25,443,373 UART: [art] Signing Cert with AUTHO
25,444,678 UART: RITY.KEYID = 7
27,150,169 UART: [art] Erasing AUTHORITY.KEYID = 7
27,151,703 UART: [art] PUB.X = 1107E4097087DC32631DCB3B35301F5DFFE444AB918C28EF174DA5CA34675DEE7D647534C5E89667D584AD01128D0FAE
27,158,991 UART: [art] PUB.Y = 5F4A3C01833E3FFBA5D9B04044C01E3632AA952A2C9F4AE136D7A013895D8976FA5A5485469992A531733BB694026B0E
27,166,209 UART: [art] SIG.R = 9497523CD542F69671725F2B84ED811D331CD1C2EC7963E16325966EDAC91515C8D0301BF19FADCC13F0ED3AB39F2CEB
27,173,626 UART: [art] SIG.S = 8CC50CFF5849C947AC5BACDCFC390CE493F118A918C48420CA72F495134E8E5D7D563CFC17279D60D604E430C0991156
28,152,815 UART: Caliptra RT
28,153,532 UART: [state] CFI Enabled
28,269,643 UART: [rt] RT listening for mailbox commands...
28,300,781 UART: [rt]cmd =0x46505652, len=4
28,302,113 UART: [rt] FIPS Version
28,303,438 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,776 writing to cptra_bootfsm_go
3,707,480 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,412,910 >>> mbox cmd response data (36 bytes)
12,631,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,640,908 >>> mbox cmd response: success
16,641,362 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,888,732 UART:
20,889,121 UART: Running Caliptra FMC ...
20,890,239 UART:
20,890,396 UART: [state] CFI Enabled
20,898,455 UART: [fht] FMC Alias Private Key: 7
22,655,868 UART: [art] Extend RT PCRs Done
22,657,184 UART: [art] Lock RT PCRs Done
22,658,836 UART: [art] Populate DV Done
22,664,358 UART: [fht] FMC Alias Private Key: 7
22,665,900 UART: [art] Derive CDI
22,666,667 UART: [art] Store in in slot 0x4
22,709,484 UART: [art] Derive Key Pair
22,710,525 UART: [art] Store priv key in slot 0x5
25,137,509 UART: [art] Derive Key Pair - Done
25,150,401 UART: [art] Signing Cert with AUTHO
25,151,705 UART: RITY.KEYID = 7
26,857,464 UART: [art] Erasing AUTHORITY.KEYID = 7
26,858,975 UART: [art] PUB.X = 78B55DC72A421A145288E87C6B8626853969851B3B27322606C56687F49245A87679A6764533CBEC54EE1F074482BD48
26,866,189 UART: [art] PUB.Y = 1DD57E0D70F838402F9BB7F5A9DA5C44DBAB2AE9351EF4C33BEBA9C620296DD2192EFCF9F0426540AA56FFC20E2617F8
26,873,451 UART: [art] SIG.R = 16A1C873FA5CECDB722F038BF6E43565505CDD8D675C5E5D34052DEC6E38089E76DAB18AE8328664AB0535D7736EB7CB
26,880,860 UART: [art] SIG.S = 73584E7FBCFFB9277203F1A1EF1EE9B4DEA1DD81D881FA13F08EB929C389647FF685D45D30FA8D319C1B2E13546B3F64
27,859,555 UART: Caliptra RT
27,860,258 UART: [state] CFI Enabled
27,976,278 UART: [rt] RT listening for mailbox commands...
28,007,716 UART: [rt]cmd =0x46505652, len=4
28,008,980 UART: [rt] FIPS Version
28,009,983 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,220 UART:
192,593 UART: Running Caliptra ROM ...
193,753 UART:
193,906 UART: [state] CFI Enabled
264,761 UART: [state] LifecycleState = Unprovisioned
267,214 UART: [state] DebugLocked = No
269,783 UART: [state] WD Timer not started. Device not locked for debugging
273,539 UART: [kat] SHA2-256
463,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,944 UART: [kat] ++
474,592 UART: [kat] sha1
486,881 UART: [kat] SHA2-256
489,901 UART: [kat] SHA2-384
495,941 UART: [kat] SHA2-512-ACC
498,551 UART: [kat] ECC-384
2,946,565 UART: [kat] HMAC-384Kdf
2,971,006 UART: [kat] LMS
3,502,807 UART: [kat] --
3,507,557 UART: [cold-reset] ++
3,508,952 UART: [fht] FHT @ 0x50003400
3,520,149 UART: [idev] ++
3,520,884 UART: [idev] CDI.KEYID = 6
3,521,777 UART: [idev] SUBJECT.KEYID = 7
3,522,996 UART: [idev] UDS.KEYID = 0
3,524,104 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,825 UART: [idev] Erasing UDS.KEYID = 0
6,028,654 UART: [idev] Sha1 KeyId Algorithm
6,050,560 UART: [idev] --
6,054,774 UART: [ldev] ++
6,055,457 UART: [ldev] CDI.KEYID = 6
6,056,342 UART: [ldev] SUBJECT.KEYID = 5
6,057,558 UART: [ldev] AUTHORITY.KEYID = 7
6,058,715 UART: [ldev] FE.KEYID = 1
6,098,430 UART: [ldev] Erasing FE.KEYID = 1
8,607,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,134 UART: [ldev] --
10,412,388 UART: [fwproc] Wait for Commands...
10,415,244 UART: [fwproc] Recv command 0x46505652
10,417,832 UART: [rt] FIPS Version
10,419,503 >>> mbox cmd response data (36 bytes)
12,645,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,790,939 UART: [fwproc] Recv command 0x46574c44
12,792,945 UART: [fwproc] Recv'd Img size: 114448 bytes
16,253,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,336,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,452,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,995,819 >>> mbox cmd response: success
16,996,172 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,999,161 UART: [afmc] ++
16,999,854 UART: [afmc] CDI.KEYID = 6
17,001,037 UART: [afmc] SUBJECT.KEYID = 7
17,002,530 UART: [afmc] AUTHORITY.KEYID = 5
19,535,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,258,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,260,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,275,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,290,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,305,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,327,828 UART: [afmc] --
21,331,151 UART: [cold-reset] --
21,334,910 UART: [state] Locking Datavault
21,340,823 UART: [state] Locking PCR0, PCR1 and PCR31
21,343,013 UART: [state] Locking ICCM
21,344,843 UART: [exit] Launching FMC @ 0x40000130
21,353,513 UART:
21,353,754 UART: Running Caliptra FMC ...
21,355,067 UART:
21,355,240 UART: [state] CFI Enabled
21,415,624 UART: [fht] FMC Alias Private Key: 7
23,179,479 UART: [art] Extend RT PCRs Done
23,180,708 UART: [art] Lock RT PCRs Done
23,182,466 UART: [art] Populate DV Done
23,187,768 UART: [fht] FMC Alias Private Key: 7
23,189,252 UART: [art] Derive CDI
23,190,015 UART: [art] Store in in slot 0x4
23,248,216 UART: [art] Derive Key Pair
23,249,260 UART: [art] Store priv key in slot 0x5
25,711,695 UART: [art] Derive Key Pair - Done
25,724,648 UART: [art] Signing Cert with AUTHO
25,725,953 UART: RITY.KEYID = 7
27,438,561 UART: [art] Erasing AUTHORITY.KEYID = 7
27,440,069 UART: [art] PUB.X = 105AFEDB0E2C22351ACA524B7F9ADA44C4BA5C9531A2B7B9CBF333680B93ED5F0F41A32E10B6DE6F6D6BAA517C8C4C6B
27,447,354 UART: [art] PUB.Y = AF4006EF20A60053F0B65D46DE8B820F6E3E0D3B828CF8B4E58A790D4E0C724629631DE13570472DEBE419865016F5C9
27,454,595 UART: [art] SIG.R = F8742A1E673360A7697B94526C4EF352314F988F3F845FABB357E4265B07AFB312B109090ED65A02C6E6EE027EDC9FFA
27,461,979 UART: [art] SIG.S = FFD578A844CD3D85724439996CA83108DC230A348580A37551CB6CA4AE67C24945B1D41C430FD4563C95411FB05413F2
28,440,905 UART: Caliptra RT
28,441,603 UART: [state] CFI Enabled
28,607,023 UART: [rt] RT listening for mailbox commands...
28,638,410 UART: [rt]cmd =0x46505652, len=4
28,639,689 UART: [rt] FIPS Version
28,640,857 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
3,435,870 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,244,930 >>> mbox cmd response data (36 bytes)
12,469,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
17,102,180 >>> mbox cmd response: success
17,102,719 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,381,560 UART:
21,381,977 UART: Running Caliptra FMC ...
21,383,076 UART:
21,383,232 UART: [state] CFI Enabled
21,450,268 UART: [fht] FMC Alias Private Key: 7
23,214,605 UART: [art] Extend RT PCRs Done
23,215,827 UART: [art] Lock RT PCRs Done
23,217,696 UART: [art] Populate DV Done
23,222,991 UART: [fht] FMC Alias Private Key: 7
23,224,495 UART: [art] Derive CDI
23,225,233 UART: [art] Store in in slot 0x4
23,283,011 UART: [art] Derive Key Pair
23,284,060 UART: [art] Store priv key in slot 0x5
25,747,638 UART: [art] Derive Key Pair - Done
25,760,371 UART: [art] Signing Cert with AUTHO
25,761,671 UART: RITY.KEYID = 7
27,473,253 UART: [art] Erasing AUTHORITY.KEYID = 7
27,474,768 UART: [art] PUB.X = DBE11F27601EE8C46A9A6ADC3E8563CBE11009857620C08BCEECD423700DB7FB55573A921F87ADAEA95FBE6A675CA28D
27,482,030 UART: [art] PUB.Y = A84CFD84C7BFE70E32197F0A91282A4CD43D3FEA285D891104D81A9CCE6B14DBFBB4C4437B68115E73829A5BD8ABF205
27,489,287 UART: [art] SIG.R = 0A2FACA425C9D364101756033E861335E780C5135BB3E963708791E0C840A99C4921A4DA44E7D0D31744A69D56AA2A44
27,496,682 UART: [art] SIG.S = B8663D1C7754AE456F376FD222538A60CECC4B5888C696F65CEBF71C957601BA34A860566424D868B70FC3B55DA52A4E
28,476,044 UART: Caliptra RT
28,476,738 UART: [state] CFI Enabled
28,641,065 UART: [rt] RT listening for mailbox commands...
28,672,375 UART: [rt]cmd =0x46505652, len=4
28,673,691 UART: [rt] FIPS Version
28,674,849 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,371 UART:
192,732 UART: Running Caliptra ROM ...
193,890 UART:
603,355 UART: [state] CFI Enabled
615,583 UART: [state] LifecycleState = Unprovisioned
617,982 UART: [state] DebugLocked = No
619,297 UART: [state] WD Timer not started. Device not locked for debugging
623,913 UART: [kat] SHA2-256
813,748 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,556 UART: [kat] ++
825,085 UART: [kat] sha1
836,296 UART: [kat] SHA2-256
839,305 UART: [kat] SHA2-384
843,826 UART: [kat] SHA2-512-ACC
846,429 UART: [kat] ECC-384
3,289,150 UART: [kat] HMAC-384Kdf
3,302,836 UART: [kat] LMS
3,834,669 UART: [kat] --
3,839,488 UART: [cold-reset] ++
3,841,579 UART: [fht] FHT @ 0x50003400
3,854,018 UART: [idev] ++
3,854,692 UART: [idev] CDI.KEYID = 6
3,855,632 UART: [idev] SUBJECT.KEYID = 7
3,856,843 UART: [idev] UDS.KEYID = 0
3,857,925 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,874,787 UART: [idev] Erasing UDS.KEYID = 0
6,338,654 UART: [idev] Sha1 KeyId Algorithm
6,361,172 UART: [idev] --
6,365,814 UART: [ldev] ++
6,366,492 UART: [ldev] CDI.KEYID = 6
6,367,374 UART: [ldev] SUBJECT.KEYID = 5
6,368,586 UART: [ldev] AUTHORITY.KEYID = 7
6,369,836 UART: [ldev] FE.KEYID = 1
6,380,776 UART: [ldev] Erasing FE.KEYID = 1
8,862,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,027 UART: [ldev] --
10,654,110 UART: [fwproc] Wait for Commands...
10,656,919 UART: [fwproc] Recv command 0x46505652
10,659,505 UART: [rt] FIPS Version
10,661,206 >>> mbox cmd response data (36 bytes)
12,884,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,029,105 UART: [fwproc] Recv command 0x46574c44
13,031,444 UART: [fwproc] Recv'd Img size: 114448 bytes
16,475,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,554,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,670,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
17,214,003 >>> mbox cmd response: success
17,214,369 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,218,218 UART: [afmc] ++
17,218,913 UART: [afmc] CDI.KEYID = 6
17,220,012 UART: [afmc] SUBJECT.KEYID = 7
17,221,548 UART: [afmc] AUTHORITY.KEYID = 5
19,722,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,445,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,447,813 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,463,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,478,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,493,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,516,440 UART: [afmc] --
21,520,829 UART: [cold-reset] --
21,524,971 UART: [state] Locking Datavault
21,530,544 UART: [state] Locking PCR0, PCR1 and PCR31
21,532,673 UART: [state] Locking ICCM
21,534,715 UART: [exit] Launching FMC @ 0x40000130
21,543,389 UART:
21,543,626 UART: Running Caliptra FMC ...
21,544,731 UART:
21,544,888 UART: [state] CFI Enabled
21,553,098 UART: [fht] FMC Alias Private Key: 7
23,310,207 UART: [art] Extend RT PCRs Done
23,311,436 UART: [art] Lock RT PCRs Done
23,313,198 UART: [art] Populate DV Done
23,318,517 UART: [fht] FMC Alias Private Key: 7
23,320,228 UART: [art] Derive CDI
23,320,966 UART: [art] Store in in slot 0x4
23,363,613 UART: [art] Derive Key Pair
23,364,648 UART: [art] Store priv key in slot 0x5
25,791,528 UART: [art] Derive Key Pair - Done
25,804,358 UART: [art] Signing Cert with AUTHO
25,805,658 UART: RITY.KEYID = 7
27,511,237 UART: [art] Erasing AUTHORITY.KEYID = 7
27,512,874 UART: [art] PUB.X = 6DAF1FF405D8965463A4C2889CFC42B035DA7194FC39A0B88F15C251DFAA0C67626C0769F6236AB8BC883ABE8CCE4CDC
27,520,024 UART: [art] PUB.Y = DEEED0DBF4CC20F358233682585332089E3F68DDE6FB2D850079EC7866338B21D517BEBA8FEF48E7422F3FE18830ACD7
27,527,265 UART: [art] SIG.R = D14E8FD52716F8DB09C23914F58D1E56FDA2E29F2791ECEEEBB02EAA9EF046EFECA59928E69992CC13760F1490F2C3E4
27,534,671 UART: [art] SIG.S = 435C7883221865FA3C7FEEA4704DFCE48904E3E2993ADEBECAE60D7F89DFED96A9B16B64A97142E5175D424524E0AF0E
28,513,626 UART: Caliptra RT
28,514,341 UART: [state] CFI Enabled
28,631,456 UART: [rt] RT listening for mailbox commands...
28,662,862 UART: [rt]cmd =0x46505652, len=4
28,664,172 UART: [rt] FIPS Version
28,665,543 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,758,077 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,471,233 >>> mbox cmd response data (36 bytes)
12,693,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
17,332,154 >>> mbox cmd response: success
17,332,704 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,583,678 UART:
21,584,064 UART: Running Caliptra FMC ...
21,585,159 UART:
21,585,315 UART: [state] CFI Enabled
21,593,091 UART: [fht] FMC Alias Private Key: 7
23,349,934 UART: [art] Extend RT PCRs Done
23,351,159 UART: [art] Lock RT PCRs Done
23,352,922 UART: [art] Populate DV Done
23,358,005 UART: [fht] FMC Alias Private Key: 7
23,359,561 UART: [art] Derive CDI
23,360,324 UART: [art] Store in in slot 0x4
23,403,034 UART: [art] Derive Key Pair
23,404,082 UART: [art] Store priv key in slot 0x5
25,830,701 UART: [art] Derive Key Pair - Done
25,843,924 UART: [art] Signing Cert with AUTHO
25,845,230 UART: RITY.KEYID = 7
27,550,730 UART: [art] Erasing AUTHORITY.KEYID = 7
27,552,239 UART: [art] PUB.X = D26F06059C9D4D390DC666FBD38396DFD75B2F0E4F6E71E71A30E1A97732906AEEBEFB634B71BC199200FE7230AECD1A
27,559,512 UART: [art] PUB.Y = DF6C2CD8DCEB16A827525B51BB9B535FEF6487E4FED146A2271FB113587E8C426163961B7FF99A4F8012FD9E4792DFBB
27,566,788 UART: [art] SIG.R = D8FEAE18D01012392C5B3CBEF5508B8B7A6038EF086E67359997D6DAF756F7D7687154650CBDB6D3169B554431B7E496
27,574,139 UART: [art] SIG.S = 513820210F48B6D9441955D6E8DA614807DE3351FA217A66C22BD175902483B0548149BFD075A4CEE6A764B8DE8ABB4F
28,552,596 UART: Caliptra RT
28,553,290 UART: [state] CFI Enabled
28,671,038 UART: [rt] RT listening for mailbox commands...
28,702,615 UART: [rt]cmd =0x46505652, len=4
28,703,924 UART: [rt] FIPS Version
28,704,919 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,331 UART: [cold-reset] ++
1,476,749 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,896 UART: [idev] --
1,515,061 UART: [ldev] ++
1,515,229 UART: [ldev] CDI.KEYID = 6
1,515,592 UART: [ldev] SUBJECT.KEYID = 5
1,516,018 UART: [ldev] AUTHORITY.KEYID = 7
1,516,481 UART: [ldev] FE.KEYID = 1
1,521,581 UART: [ldev] Erasing FE.KEYID = 1
1,547,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,352 UART: [ldev] --
1,586,861 UART: [fwproc] Waiting for Commands...
1,587,504 UART: [fwproc] Received command 0x46505652
1,588,386 UART: [rt] FIPS Version
1,588,939 >>> mbox cmd response data (36 bytes)
1,588,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,589,212 UART: [fwproc] Received command 0x46574c44
1,590,003 UART: [fwproc] Received Image of size 114448 bytes
2,888,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,591 >>> mbox cmd response: success
3,079,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,753 UART: [afmc] ++
3,080,921 UART: [afmc] CDI.KEYID = 6
3,081,283 UART: [afmc] SUBJECT.KEYID = 7
3,081,708 UART: [afmc] AUTHORITY.KEYID = 5
3,117,005 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,179 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,572 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,262 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,123 UART: [afmc] --
3,160,209 UART: [cold-reset] --
3,161,009 UART: [state] Locking Datavault
3,162,206 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,810 UART: [state] Locking ICCM
3,163,426 UART: [exit] Launching FMC @ 0x40000130
3,168,755 UART:
3,168,771 UART: Running Caliptra FMC ...
3,169,179 UART:
3,169,233 UART: [state] CFI Enabled
3,179,820 UART: [fht] FMC Alias Private Key: 7
3,288,181 UART: [art] Extend RT PCRs Done
3,288,609 UART: [art] Lock RT PCRs Done
3,290,307 UART: [art] Populate DV Done
3,298,322 UART: [fht] FMC Alias Private Key: 7
3,299,486 UART: [art] Derive CDI
3,299,766 UART: [art] Store in in slot 0x4
3,385,439 UART: [art] Derive Key Pair
3,385,799 UART: [art] Store priv key in slot 0x5
3,399,195 UART: [art] Derive Key Pair - Done
3,413,892 UART: [art] Signing Cert with AUTHO
3,414,372 UART: RITY.KEYID = 7
3,429,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,213 UART: [art] PUB.X = DE5F53781980E1B9622710ECA37897931B9E792FB2B15FAAF2EEFB09D1A08E3D67B6A47864766FAE0E5A735126C37C71
3,436,983 UART: [art] PUB.Y = A9AB72F34877C293C8FEA93D7F0CF1CDF9F22BFE994025A4DF0B5FDB0EF7F1853A16E6E23C9E471BD48F1B0619B1FF89
3,443,943 UART: [art] SIG.R = 85659B48E11DBA6B98A65199DF8BBBA5B2F94F17EE85BAA9A53F6634C557ABFA34E801D5C6C63AE4FC2884B650778DC3
3,450,726 UART: [art] SIG.S = 5EC8ADC376A9915D3BBA152DEA3397B4D2DE7FF42191A81887E046F057490736A8A8662B29AB3DE50B8D9D498912ABE5
3,474,165 UART: Caliptra RT
3,474,418 UART: [state] CFI Enabled
3,582,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,043 UART: [rt]cmd =0x46505652, len=4
3,613,714 UART: [rt] FIPS Version
3,614,669 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,596 >>> mbox cmd response data (36 bytes)
1,441,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,544 >>> mbox cmd response: success
2,928,544 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,560 UART:
2,989,576 UART: Running Caliptra FMC ...
2,989,984 UART:
2,990,038 UART: [state] CFI Enabled
3,000,479 UART: [fht] FMC Alias Private Key: 7
3,108,362 UART: [art] Extend RT PCRs Done
3,108,790 UART: [art] Lock RT PCRs Done
3,110,492 UART: [art] Populate DV Done
3,118,533 UART: [fht] FMC Alias Private Key: 7
3,119,487 UART: [art] Derive CDI
3,119,767 UART: [art] Store in in slot 0x4
3,205,346 UART: [art] Derive Key Pair
3,205,706 UART: [art] Store priv key in slot 0x5
3,218,692 UART: [art] Derive Key Pair - Done
3,233,495 UART: [art] Signing Cert with AUTHO
3,233,975 UART: RITY.KEYID = 7
3,249,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,974 UART: [art] PUB.X = 9207B18534E24C3E40B0ACECE288ADD8BAF65C1D50A46A36BAAA66C6DD504EBD4C8D2A832402143768212FCC37472BF3
3,256,752 UART: [art] PUB.Y = 30A1643B6BA73951ADBEF6AB4F8BB681637BCCAB4E4B22E70121E2A5D797992A2D7900618A74AEED15B5DE3D1670151B
3,263,689 UART: [art] SIG.R = 5AEB858E7BEE60E24EC98CDD369A8DA50E2B8642786DF7261D50FD675E38AE53E8C815A6CDA0CB99BFD4332DB9D89B69
3,270,476 UART: [art] SIG.S = E002A56E6EB469790CA2A66463970AB00BCF7548E5F8C42DAADA110320884BF385DDE0033DE289C1B6B7830334B409A0
3,294,199 UART: Caliptra RT
3,294,452 UART: [state] CFI Enabled
3,402,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,315 UART: [rt]cmd =0x46505652, len=4
3,433,986 UART: [rt] FIPS Version
3,434,839 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,776 UART: [kat] SHA2-256
892,714 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,987 UART: [idev] Erasing UDS.KEYID = 0
1,505,859 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,641 UART: [idev] --
1,515,720 UART: [ldev] ++
1,515,888 UART: [ldev] CDI.KEYID = 6
1,516,251 UART: [ldev] SUBJECT.KEYID = 5
1,516,677 UART: [ldev] AUTHORITY.KEYID = 7
1,517,140 UART: [ldev] FE.KEYID = 1
1,522,232 UART: [ldev] Erasing FE.KEYID = 1
1,547,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,891 UART: [ldev] --
1,587,232 UART: [fwproc] Waiting for Commands...
1,587,997 UART: [fwproc] Received command 0x46505652
1,588,879 UART: [rt] FIPS Version
1,589,432 >>> mbox cmd response data (36 bytes)
1,589,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,589,695 UART: [fwproc] Received command 0x46574c44
1,590,486 UART: [fwproc] Received Image of size 114448 bytes
2,890,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,864 >>> mbox cmd response: success
3,082,864 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,083,976 UART: [afmc] ++
3,084,144 UART: [afmc] CDI.KEYID = 6
3,084,506 UART: [afmc] SUBJECT.KEYID = 7
3,084,931 UART: [afmc] AUTHORITY.KEYID = 5
3,120,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,371 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,155,061 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,163,064 UART: [afmc] --
3,164,176 UART: [cold-reset] --
3,165,074 UART: [state] Locking Datavault
3,166,489 UART: [state] Locking PCR0, PCR1 and PCR31
3,167,093 UART: [state] Locking ICCM
3,167,661 UART: [exit] Launching FMC @ 0x40000130
3,172,990 UART:
3,173,006 UART: Running Caliptra FMC ...
3,173,414 UART:
3,173,557 UART: [state] CFI Enabled
3,184,120 UART: [fht] FMC Alias Private Key: 7
3,292,897 UART: [art] Extend RT PCRs Done
3,293,325 UART: [art] Lock RT PCRs Done
3,294,815 UART: [art] Populate DV Done
3,302,936 UART: [fht] FMC Alias Private Key: 7
3,303,906 UART: [art] Derive CDI
3,304,186 UART: [art] Store in in slot 0x4
3,389,987 UART: [art] Derive Key Pair
3,390,347 UART: [art] Store priv key in slot 0x5
3,403,455 UART: [art] Derive Key Pair - Done
3,418,270 UART: [art] Signing Cert with AUTHO
3,418,750 UART: RITY.KEYID = 7
3,433,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,607 UART: [art] PUB.X = 4E4F8A8BDA35EF5E1D3A67724631143C0038D2821ABADD05C326B2CA1A3557AACD8115B7B4AB94F03408F53E4BFA2D8D
3,441,365 UART: [art] PUB.Y = E2F6FE426EC23855DD02F93209C7F42DF308B7B08E03FF6D61F5F8C139FB7A0AC97277B3A8122A62A9E4DA949478016B
3,448,305 UART: [art] SIG.R = 93D18D4DE51DE49ACF4B81E3BBEF6802408834C30AD2592D2B2DF57DDDB3EE581132378E40F5A75D2844897EAEC027FF
3,455,083 UART: [art] SIG.S = FEC5C96ED7099C576F1E59FDDC3241A708B535F8F7049EFC09CE9C42D3A4CFC86357C8FB52E428C2059AD65021631A63
3,478,571 UART: Caliptra RT
3,478,916 UART: [state] CFI Enabled
3,587,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,638 UART: [rt]cmd =0x46505652, len=4
3,619,309 UART: [rt] FIPS Version
3,620,342 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,471 >>> mbox cmd response data (36 bytes)
1,442,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,501 >>> mbox cmd response: success
2,931,501 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,992,783 UART:
2,992,799 UART: Running Caliptra FMC ...
2,993,207 UART:
2,993,350 UART: [state] CFI Enabled
3,004,099 UART: [fht] FMC Alias Private Key: 7
3,111,804 UART: [art] Extend RT PCRs Done
3,112,232 UART: [art] Lock RT PCRs Done
3,113,294 UART: [art] Populate DV Done
3,121,579 UART: [fht] FMC Alias Private Key: 7
3,122,747 UART: [art] Derive CDI
3,123,027 UART: [art] Store in in slot 0x4
3,208,752 UART: [art] Derive Key Pair
3,209,112 UART: [art] Store priv key in slot 0x5
3,223,092 UART: [art] Derive Key Pair - Done
3,237,443 UART: [art] Signing Cert with AUTHO
3,237,923 UART: RITY.KEYID = 7
3,252,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,636 UART: [art] PUB.X = CF48C6E24F8306245C09D26F789180BA3CA995E50C7C4418F93CBA8E87F985D5707318DF4803205B23D36460CE8B8DC3
3,260,394 UART: [art] PUB.Y = B3AE0B35DEA69F3D78F3192B037FA29055DB1EE24469D693B15AAA87732D6D17B10BB070C230A23EC99817F0ECA39D87
3,267,345 UART: [art] SIG.R = 92706947DC702E05AEC454ADA3D072E76AE2D28D9D0778E44F908278CDA8468B43ECFE5C3CCBF2A8574E2108A99E2D35
3,274,116 UART: [art] SIG.S = 1A29CA712FDEE15FD510B98672564EDBE9717B3C99B1D2ED76E35F302BA53EFE0CAE288A0D523230C90BDDBD17EE417C
3,297,692 UART: Caliptra RT
3,298,037 UART: [state] CFI Enabled
3,405,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,640 UART: [rt]cmd =0x46505652, len=4
3,437,311 UART: [rt] FIPS Version
3,438,400 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Unprovisioned
86,327 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
893,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,933 UART: [kat] ++
898,085 UART: [kat] sha1
902,273 UART: [kat] SHA2-256
904,213 UART: [kat] SHA2-384
907,042 UART: [kat] SHA2-512-ACC
908,943 UART: [kat] ECC-384
918,952 UART: [kat] HMAC-384Kdf
923,448 UART: [kat] LMS
1,171,776 UART: [kat] --
1,172,947 UART: [cold-reset] ++
1,173,387 UART: [fht] FHT @ 0x50003400
1,176,006 UART: [idev] ++
1,176,174 UART: [idev] CDI.KEYID = 6
1,176,534 UART: [idev] SUBJECT.KEYID = 7
1,176,958 UART: [idev] UDS.KEYID = 0
1,177,303 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,002 UART: [idev] Erasing UDS.KEYID = 0
1,201,541 UART: [idev] Sha1 KeyId Algorithm
1,210,203 UART: [idev] --
1,211,253 UART: [ldev] ++
1,211,421 UART: [ldev] CDI.KEYID = 6
1,211,784 UART: [ldev] SUBJECT.KEYID = 5
1,212,210 UART: [ldev] AUTHORITY.KEYID = 7
1,212,673 UART: [ldev] FE.KEYID = 1
1,217,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,740 UART: [fwproc] Recv command 0x46505652
1,284,561 UART: [rt] FIPS Version
1,285,115 >>> mbox cmd response data (36 bytes)
1,285,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,285,216 UART: [fwproc] Recv command 0x46574c44
1,285,944 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,756 >>> mbox cmd response: success
2,777,756 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,778,910 UART: [afmc] ++
2,779,078 UART: [afmc] CDI.KEYID = 6
2,779,440 UART: [afmc] SUBJECT.KEYID = 7
2,779,865 UART: [afmc] AUTHORITY.KEYID = 5
2,814,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,835 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,815 UART: [afmc] --
2,858,879 UART: [cold-reset] --
2,859,757 UART: [state] Locking Datavault
2,860,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,432 UART: [state] Locking ICCM
2,862,106 UART: [exit] Launching FMC @ 0x40000130
2,867,435 UART:
2,867,451 UART: Running Caliptra FMC ...
2,867,859 UART:
2,867,913 UART: [state] CFI Enabled
2,878,506 UART: [fht] FMC Alias Private Key: 7
2,986,473 UART: [art] Extend RT PCRs Done
2,986,901 UART: [art] Lock RT PCRs Done
2,988,515 UART: [art] Populate DV Done
2,996,504 UART: [fht] FMC Alias Private Key: 7
2,997,600 UART: [art] Derive CDI
2,997,880 UART: [art] Store in in slot 0x4
3,083,231 UART: [art] Derive Key Pair
3,083,591 UART: [art] Store priv key in slot 0x5
3,097,043 UART: [art] Derive Key Pair - Done
3,111,923 UART: [art] Signing Cert with AUTHO
3,112,403 UART: RITY.KEYID = 7
3,127,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,302 UART: [art] PUB.X = 48CEF7BAC97E3CC03CF59D90A5964EE6EB10A9F3AD2E1116C330626A93C579782906790D50BD0278689D5D33072EDAA5
3,135,066 UART: [art] PUB.Y = 2129BA0BD55B54AB9C5B400A9717E398EC3F6169A20DEF681966E3BBC693C04EFE70B3256831E7ACB2F398E07AB7E14F
3,142,019 UART: [art] SIG.R = 9C5806D58A49A062C9ADB87446F2CC768227E6A86F71428941904E5EB3FD297E8A5C07713DC4B29401CE049F0FBB0CA0
3,148,775 UART: [art] SIG.S = 3DE6A4999818C0F447F0E4BD53DD3A81509FE67B8173C898AF90C914E7F6C8C6B2BE8F700F951B8ABC73A0BD298B9C05
3,172,820 UART: Caliptra RT
3,173,073 UART: [state] CFI Enabled
3,280,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,532 UART: [rt]cmd =0x46505652, len=4
3,311,203 UART: [rt] FIPS Version
3,312,302 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,731 >>> mbox cmd response data (36 bytes)
1,139,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,913 >>> mbox cmd response: success
2,628,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,543 UART:
2,690,559 UART: Running Caliptra FMC ...
2,690,967 UART:
2,691,021 UART: [state] CFI Enabled
2,701,026 UART: [fht] FMC Alias Private Key: 7
2,809,299 UART: [art] Extend RT PCRs Done
2,809,727 UART: [art] Lock RT PCRs Done
2,811,169 UART: [art] Populate DV Done
2,819,300 UART: [fht] FMC Alias Private Key: 7
2,820,412 UART: [art] Derive CDI
2,820,692 UART: [art] Store in in slot 0x4
2,906,205 UART: [art] Derive Key Pair
2,906,565 UART: [art] Store priv key in slot 0x5
2,920,065 UART: [art] Derive Key Pair - Done
2,934,581 UART: [art] Signing Cert with AUTHO
2,935,061 UART: RITY.KEYID = 7
2,950,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,934 UART: [art] PUB.X = 33F97D25C3271F161A18C83074EC95622EC0CC86C1DF44CFEF87321FFE1A76ADD4E0231C0AD9F2553FFF0A60FFC070CC
2,957,716 UART: [art] PUB.Y = 26554DE21E51E9CA2CD5837FD6D5E86ECCD122681106F62171ADF6361824ECFC1F87C7307EB36F6C85FDF417C5C10A47
2,964,670 UART: [art] SIG.R = AE24E6DB9FB24AC546885F7E6CDA5A725EF230864A802DE611CEF015E2B1D839F1B728BA185DA10A9DD3F0B9752EC924
2,971,453 UART: [art] SIG.S = 60E5CCB105C537AAC5DA2CA40F0F49B66A6D46D9319CEEDE8A54CEA929978E8978A08B9706445AAD9BD5ECF02285E62D
2,994,894 UART: Caliptra RT
2,995,147 UART: [state] CFI Enabled
3,103,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,350 UART: [rt]cmd =0x46505652, len=4
3,135,021 UART: [rt] FIPS Version
3,136,152 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,466 UART: [kat] SHA2-256
904,406 UART: [kat] SHA2-384
907,175 UART: [kat] SHA2-512-ACC
909,076 UART: [kat] ECC-384
918,535 UART: [kat] HMAC-384Kdf
923,091 UART: [kat] LMS
1,171,419 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,856 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,383 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,926 UART: [idev] --
1,210,992 UART: [ldev] ++
1,211,160 UART: [ldev] CDI.KEYID = 6
1,211,523 UART: [ldev] SUBJECT.KEYID = 5
1,211,949 UART: [ldev] AUTHORITY.KEYID = 7
1,212,412 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,114 UART: [ldev] --
1,283,475 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46505652
1,285,018 UART: [rt] FIPS Version
1,285,572 >>> mbox cmd response data (36 bytes)
1,285,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,285,857 UART: [fwproc] Recv command 0x46574c44
1,286,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,005 >>> mbox cmd response: success
2,778,005 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,261 UART: [afmc] ++
2,779,429 UART: [afmc] CDI.KEYID = 6
2,779,791 UART: [afmc] SUBJECT.KEYID = 7
2,780,216 UART: [afmc] AUTHORITY.KEYID = 5
2,816,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,081 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,686 UART: [afmc] --
2,859,660 UART: [cold-reset] --
2,860,512 UART: [state] Locking Datavault
2,861,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,407 UART: [state] Locking ICCM
2,862,941 UART: [exit] Launching FMC @ 0x40000130
2,868,270 UART:
2,868,286 UART: Running Caliptra FMC ...
2,868,694 UART:
2,868,837 UART: [state] CFI Enabled
2,879,532 UART: [fht] FMC Alias Private Key: 7
2,988,141 UART: [art] Extend RT PCRs Done
2,988,569 UART: [art] Lock RT PCRs Done
2,990,293 UART: [art] Populate DV Done
2,998,712 UART: [fht] FMC Alias Private Key: 7
2,999,822 UART: [art] Derive CDI
3,000,102 UART: [art] Store in in slot 0x4
3,085,731 UART: [art] Derive Key Pair
3,086,091 UART: [art] Store priv key in slot 0x5
3,099,499 UART: [art] Derive Key Pair - Done
3,114,167 UART: [art] Signing Cert with AUTHO
3,114,647 UART: RITY.KEYID = 7
3,129,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,518 UART: [art] PUB.X = 885339FA0E768F07619A526D6AC18971D8E5BCA4A75EB2EB7B6DCBDDBFC51A2226FAEDDD730BB5DDC340767B5F0E8469
3,137,298 UART: [art] PUB.Y = 6968193DACA4EB3D45C4EA0CCA11CBAB62809EAC79D426CA3738E71AE95E2721B048B064BF6A5DCDB73F4A629CB0820E
3,144,262 UART: [art] SIG.R = C8A9C4EE3544E67AFAB26766DDE278D358FA6EF3CE3781BA5F0D9A7EFCCD306BF5A6EFA9510BA047B3E37DF03A0689E9
3,151,049 UART: [art] SIG.S = 607022CD34BB4631E2B26F60C271836AD2F5EC67FB887B6C0E9550DFFED0CB7024AD5003B65E8AC3E6CD8761EAEBCD11
3,174,374 UART: Caliptra RT
3,174,719 UART: [state] CFI Enabled
3,281,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,956 UART: [rt]cmd =0x46505652, len=4
3,312,627 UART: [rt] FIPS Version
3,313,682 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,078 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,622 >>> mbox cmd response data (36 bytes)
1,140,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,700 >>> mbox cmd response: success
2,628,700 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,980 UART:
2,689,996 UART: Running Caliptra FMC ...
2,690,404 UART:
2,690,547 UART: [state] CFI Enabled
2,701,352 UART: [fht] FMC Alias Private Key: 7
2,809,359 UART: [art] Extend RT PCRs Done
2,809,787 UART: [art] Lock RT PCRs Done
2,811,291 UART: [art] Populate DV Done
2,819,756 UART: [fht] FMC Alias Private Key: 7
2,820,720 UART: [art] Derive CDI
2,821,000 UART: [art] Store in in slot 0x4
2,906,451 UART: [art] Derive Key Pair
2,906,811 UART: [art] Store priv key in slot 0x5
2,920,447 UART: [art] Derive Key Pair - Done
2,935,382 UART: [art] Signing Cert with AUTHO
2,935,862 UART: RITY.KEYID = 7
2,951,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,917 UART: [art] PUB.X = 5EF5A85E88511F79902DC79D16843F98F820A244D08D682A1C7C2B786C45A726E3A88DB54485D137FAF0B913F96B3D6D
2,958,689 UART: [art] PUB.Y = 303E9B9CED52F306F9640687D35BCA8330FBF6E39EE29957C6454BD032798F99C81ECDF18A88A2FE6F01E4DCDFF4B772
2,965,644 UART: [art] SIG.R = DA6F4938FEF95F0394FC87818FB4919FF4D0DAD928A3E893660B9B3FF12376A5A3325940E16186B884E66DAD8CAC66E9
2,972,416 UART: [art] SIG.S = 7A7BB5F335815AA2C7DABB452957310E873E1E5D97A9209D13939DB62129BAEA63F21C85554C104622456D696EB53A29
2,996,712 UART: Caliptra RT
2,997,057 UART: [state] CFI Enabled
3,104,976 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,518 UART: [rt]cmd =0x46505652, len=4
3,136,189 UART: [rt] FIPS Version
3,137,250 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,199,447 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,458 UART: [ldev] ++
1,209,626 UART: [ldev] CDI.KEYID = 6
1,209,990 UART: [ldev] SUBJECT.KEYID = 5
1,210,417 UART: [ldev] AUTHORITY.KEYID = 7
1,210,880 UART: [ldev] FE.KEYID = 1
1,216,306 UART: [ldev] Erasing FE.KEYID = 1
1,242,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46505652
1,283,170 UART: [rt] FIPS Version
1,283,731 >>> mbox cmd response data (36 bytes)
1,283,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,283,855 UART: [fwproc] Recv command 0x46574c44
1,284,588 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,280 >>> mbox cmd response: success
2,775,280 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,451 UART: [afmc] ++
2,776,619 UART: [afmc] CDI.KEYID = 6
2,776,982 UART: [afmc] SUBJECT.KEYID = 7
2,777,408 UART: [afmc] AUTHORITY.KEYID = 5
2,813,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,103 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,986 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,500 UART: [afmc] --
2,856,554 UART: [cold-reset] --
2,857,428 UART: [state] Locking Datavault
2,858,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,217 UART: [state] Locking ICCM
2,859,737 UART: [exit] Launching FMC @ 0x40000130
2,865,066 UART:
2,865,082 UART: Running Caliptra FMC ...
2,865,490 UART:
2,865,544 UART: [state] CFI Enabled
2,876,027 UART: [fht] FMC Alias Private Key: 7
2,983,782 UART: [art] Extend RT PCRs Done
2,984,210 UART: [art] Lock RT PCRs Done
2,986,028 UART: [art] Populate DV Done
2,994,341 UART: [fht] FMC Alias Private Key: 7
2,995,503 UART: [art] Derive CDI
2,995,783 UART: [art] Store in in slot 0x4
3,081,392 UART: [art] Derive Key Pair
3,081,752 UART: [art] Store priv key in slot 0x5
3,094,118 UART: [art] Derive Key Pair - Done
3,108,983 UART: [art] Signing Cert with AUTHO
3,109,463 UART: RITY.KEYID = 7
3,124,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,064 UART: [art] PUB.X = 82B240FA820FB3A61D6EB19AA8960DA40AAAC9A462B31D24349898CBC0B2A516F0F2AE54A3FC284845D87864BC575C6F
3,131,837 UART: [art] PUB.Y = E8A36A0C130944382784F226FEA5005A2615C83D583D2F01FCC74F28FD574558D80DACA1A779D846D6EF05D0DA605C3E
3,138,756 UART: [art] SIG.R = 08DA277D40723A495F5EB97316226B8D4FD15B88192E804294DE41E7F17C23CCAF04C418AB2D0665338EF1F07CC8B260
3,145,519 UART: [art] SIG.S = 69D5D6713395B45B97934BF95E808B59A1934ACBC364EA949C2EF5F37DB746F8D81D82FB80580EC007B40CCF00BA7F58
3,168,383 UART: Caliptra RT
3,168,636 UART: [state] CFI Enabled
3,276,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,507 UART: [rt]cmd =0x46505652, len=4
3,308,178 UART: [rt] FIPS Version
3,309,333 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,352 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,382 >>> mbox cmd response data (36 bytes)
1,137,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,820 >>> mbox cmd response: success
2,623,820 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,744 UART:
2,685,760 UART: Running Caliptra FMC ...
2,686,168 UART:
2,686,222 UART: [state] CFI Enabled
2,696,423 UART: [fht] FMC Alias Private Key: 7
2,804,486 UART: [art] Extend RT PCRs Done
2,804,914 UART: [art] Lock RT PCRs Done
2,806,384 UART: [art] Populate DV Done
2,814,683 UART: [fht] FMC Alias Private Key: 7
2,815,629 UART: [art] Derive CDI
2,815,909 UART: [art] Store in in slot 0x4
2,901,694 UART: [art] Derive Key Pair
2,902,054 UART: [art] Store priv key in slot 0x5
2,915,292 UART: [art] Derive Key Pair - Done
2,930,240 UART: [art] Signing Cert with AUTHO
2,930,720 UART: RITY.KEYID = 7
2,946,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,089 UART: [art] PUB.X = 46B2674A8B3A9A6399FFD087146EA0F28C726E288A288FCA0734B44B65761DB164AD93AC6FD42CEF9292CE6EE40F6812
2,953,861 UART: [art] PUB.Y = 0E2217BBB0A53CC622A31917C15B29CB95F3D8F55FDBBD01BFF218158216B737A6F6A07FCFF85AB228554A44A549E282
2,960,815 UART: [art] SIG.R = 6EF26CBBD04BF94EE7289573269E0899982BD4F074EE53F982EAAB43E63746D06AB78BA3206111883D06EE0A6EDED8DA
2,967,588 UART: [art] SIG.S = ACD686CFCCFE6C3C788E5DD23E5B7C0E0CD9F7D453B4F2F017674ED52BF05DD3EDE7BDE02787273211BD4A63CBFAE7C0
2,991,367 UART: Caliptra RT
2,991,620 UART: [state] CFI Enabled
3,099,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,569 UART: [rt]cmd =0x46505652, len=4
3,131,240 UART: [rt] FIPS Version
3,132,329 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,174,378 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,330 UART: [idev] --
1,209,281 UART: [ldev] ++
1,209,449 UART: [ldev] CDI.KEYID = 6
1,209,813 UART: [ldev] SUBJECT.KEYID = 5
1,210,240 UART: [ldev] AUTHORITY.KEYID = 7
1,210,703 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,993 UART: [fwproc] Wait for Commands...
1,282,592 UART: [fwproc] Recv command 0x46505652
1,283,419 UART: [rt] FIPS Version
1,283,980 >>> mbox cmd response data (36 bytes)
1,283,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,132 UART: [fwproc] Recv command 0x46574c44
1,284,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,273 >>> mbox cmd response: success
2,777,273 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,778,440 UART: [afmc] ++
2,778,608 UART: [afmc] CDI.KEYID = 6
2,778,971 UART: [afmc] SUBJECT.KEYID = 7
2,779,397 UART: [afmc] AUTHORITY.KEYID = 5
2,814,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,317 UART: [afmc] --
2,858,239 UART: [cold-reset] --
2,859,107 UART: [state] Locking Datavault
2,860,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,738 UART: [state] Locking ICCM
2,861,410 UART: [exit] Launching FMC @ 0x40000130
2,866,739 UART:
2,866,755 UART: Running Caliptra FMC ...
2,867,163 UART:
2,867,306 UART: [state] CFI Enabled
2,877,841 UART: [fht] FMC Alias Private Key: 7
2,985,500 UART: [art] Extend RT PCRs Done
2,985,928 UART: [art] Lock RT PCRs Done
2,987,374 UART: [art] Populate DV Done
2,995,531 UART: [fht] FMC Alias Private Key: 7
2,996,551 UART: [art] Derive CDI
2,996,831 UART: [art] Store in in slot 0x4
3,082,200 UART: [art] Derive Key Pair
3,082,560 UART: [art] Store priv key in slot 0x5
3,096,278 UART: [art] Derive Key Pair - Done
3,110,978 UART: [art] Signing Cert with AUTHO
3,111,458 UART: RITY.KEYID = 7
3,126,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,643 UART: [art] PUB.X = 5EE11C34ABC8A82CF1A031DADD0FB6A40EF143F014465EBE06B3AF1CE84C03B7CB26A992432AE7AF9A2AB14D0F299F31
3,134,422 UART: [art] PUB.Y = E9EBCB58DC5E6B2D1E7D5CDE43139508F3A9C18C77495BFE1AD1E4E1D766FCA634ACECDB6EFB95C9460907EF410E1589
3,141,384 UART: [art] SIG.R = EB88E6A4AED603F71239A6D6CAEBCC959581BC363BFD861BCA3B7A9B3B4D8D18E2EA6C018864D35152A6907A07280C36
3,148,156 UART: [art] SIG.S = 806CDD971FD0B678AC5DBB0D7192A02E4C75C3AA284486C4F0C8EFE67988ED3C8CBF261E954B92315DC8D4C33502AD67
3,171,991 UART: Caliptra RT
3,172,336 UART: [state] CFI Enabled
3,279,432 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,918 UART: [rt]cmd =0x46505652, len=4
3,310,589 UART: [rt] FIPS Version
3,311,718 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,605 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,633 >>> mbox cmd response data (36 bytes)
1,137,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,597 >>> mbox cmd response: success
2,625,597 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,965 UART:
2,686,981 UART: Running Caliptra FMC ...
2,687,389 UART:
2,687,532 UART: [state] CFI Enabled
2,698,185 UART: [fht] FMC Alias Private Key: 7
2,806,490 UART: [art] Extend RT PCRs Done
2,806,918 UART: [art] Lock RT PCRs Done
2,808,580 UART: [art] Populate DV Done
2,816,831 UART: [fht] FMC Alias Private Key: 7
2,817,967 UART: [art] Derive CDI
2,818,247 UART: [art] Store in in slot 0x4
2,903,596 UART: [art] Derive Key Pair
2,903,956 UART: [art] Store priv key in slot 0x5
2,917,694 UART: [art] Derive Key Pair - Done
2,932,604 UART: [art] Signing Cert with AUTHO
2,933,084 UART: RITY.KEYID = 7
2,948,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,899 UART: [art] PUB.X = 69A1DC066C28E4B73F0306F625F7424CBE7DC809DC225048D67421729CC5F7DFA6F51C564816A3B6D9641218537CA4E5
2,955,657 UART: [art] PUB.Y = DBB312BCA35CA277E28F8D7431C6711E0D145D2F73DC6EBF4C462F6DF90E980726D48A433A1AF85534E1FA25923CA7C4
2,962,610 UART: [art] SIG.R = EB4B30F4AD71150D3BD9CE7BE5204B0BC77285687D657EA666E619EBCDB66C0E8E31811F811E4BECF0E7BC027DE8966E
2,969,386 UART: [art] SIG.S = 768FF83EE522A70A69EE1217C9A8C47172D2E8746AF49A206CA81C7A123B7F52126DEF10D5B0319A63C0711CC66677F3
2,993,496 UART: Caliptra RT
2,993,841 UART: [state] CFI Enabled
3,100,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,554 UART: [rt]cmd =0x46505652, len=4
3,132,225 UART: [rt] FIPS Version
3,133,196 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,328 UART:
192,688 UART: Running Caliptra ROM ...
193,874 UART:
194,027 UART: [state] CFI Enabled
265,462 UART: [state] LifecycleState = Unprovisioned
267,364 UART: [state] DebugLocked = No
269,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,473 UART: [kat] SHA2-256
445,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,684 UART: [kat] ++
456,174 UART: [kat] sha1
466,910 UART: [kat] SHA2-256
469,573 UART: [kat] SHA2-384
474,885 UART: [kat] SHA2-512-ACC
477,228 UART: [kat] ECC-384
2,764,934 UART: [kat] HMAC-384Kdf
2,797,678 UART: [kat] LMS
3,988,018 UART: [kat] --
3,992,403 UART: [cold-reset] ++
3,994,032 UART: [fht] Storing FHT @ 0x50003400
4,006,521 UART: [idev] ++
4,007,100 UART: [idev] CDI.KEYID = 6
4,008,140 UART: [idev] SUBJECT.KEYID = 7
4,009,320 UART: [idev] UDS.KEYID = 0
4,010,406 ready_for_fw is high
4,010,642 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,155,346 UART: [idev] Erasing UDS.KEYID = 0
7,343,581 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,636 UART: [idev] --
7,368,747 UART: [ldev] ++
7,369,328 UART: [ldev] CDI.KEYID = 6
7,370,267 UART: [ldev] SUBJECT.KEYID = 5
7,371,505 UART: [ldev] AUTHORITY.KEYID = 7
7,372,744 UART: [ldev] FE.KEYID = 1
7,419,926 UART: [ldev] Erasing FE.KEYID = 1
10,752,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,014 UART: [ldev] --
13,113,204 UART: [fwproc] Waiting for Commands...
13,115,992 UART: [fwproc] Received command 0x46574c44
13,118,189 UART: [fwproc] Received Image of size 114996 bytes
17,177,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,646,198 >>> mbox cmd response: success
17,646,636 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,649,963 UART: [afmc] ++
17,650,580 UART: [afmc] CDI.KEYID = 6
17,651,495 UART: [afmc] SUBJECT.KEYID = 7
17,652,740 UART: [afmc] AUTHORITY.KEYID = 5
21,020,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,319,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,321,536 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,335,924 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,350,761 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,238 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,388,006 UART: [afmc] --
23,391,129 UART: [cold-reset] --
23,394,648 UART: [state] Locking Datavault
23,398,471 UART: [state] Locking PCR0, PCR1 and PCR31
23,400,216 UART: [state] Locking ICCM
23,402,160 UART: [exit] Launching FMC @ 0x40000130
23,410,561 UART:
23,410,796 UART: Running Caliptra FMC ...
23,411,898 UART:
23,412,058 UART: [state] CFI Enabled
23,481,073 UART: [fht] FMC Alias Private Key: 7
25,818,926 UART: [art] Extend RT PCRs Done
25,820,137 UART: [art] Lock RT PCRs Done
25,822,150 UART: [art] Populate DV Done
25,827,571 UART: [fht] FMC Alias Private Key: 7
25,829,263 UART: [art] Derive CDI
25,830,078 UART: [art] Store in in slot 0x4
25,889,264 UART: [art] Derive Key Pair
25,890,321 UART: [art] Store priv key in slot 0x5
29,183,043 UART: [art] Derive Key Pair - Done
29,196,154 UART: [art] Signing Cert with AUTHO
29,197,501 UART: RITY.KEYID = 7
31,486,013 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,541 UART: [art] PUB.X = 433D46D0442B05A2A1E4F9B1FBBFB5718CA387A4778FC52163980FE7DA548ED6C4255F47E410D2FF743EFED159AED618
31,494,803 UART: [art] PUB.Y = 0DF18FF0A820BE230430C450F9C6159874BEAC4AFBA5950B07ECBD3D8D21454B4B4A7196ABE313DC32A45FD27B8F6D0F
31,502,040 UART: [art] SIG.R = 93C81E36CEECBE3DA54CEA45B049DE0C18C10591BC4D4D1DFABEB02156B60601F715DFD5C4B52D0A58BE616D94982541
31,509,443 UART: [art] SIG.S = E6CCCC5E95D9F117775F6E86A969ABC566E8397527730F129BB4F8B35CA0922A8817F39B5A86F57829006024427D4C06
32,815,050 UART: Caliptra RT
32,815,770 UART: [state] CFI Enabled
32,976,550 UART: [rt] RT listening for mailbox commands...
33,007,787 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,804,880 ready_for_fw is high
3,805,329 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,917,531 >>> mbox cmd response: success
17,917,994 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,609,993 UART:
23,610,388 UART: Running Caliptra FMC ...
23,611,547 UART:
23,611,710 UART: [state] CFI Enabled
23,680,427 UART: [fht] FMC Alias Private Key: 7
26,018,258 UART: [art] Extend RT PCRs Done
26,019,486 UART: [art] Lock RT PCRs Done
26,021,039 UART: [art] Populate DV Done
26,026,432 UART: [fht] FMC Alias Private Key: 7
26,027,998 UART: [art] Derive CDI
26,028,819 UART: [art] Store in in slot 0x4
26,089,152 UART: [art] Derive Key Pair
26,090,198 UART: [art] Store priv key in slot 0x5
29,383,208 UART: [art] Derive Key Pair - Done
29,396,100 UART: [art] Signing Cert with AUTHO
29,397,402 UART: RITY.KEYID = 7
31,685,573 UART: [art] Erasing AUTHORITY.KEYID = 7
31,687,083 UART: [art] PUB.X = BAEBB65495CFF65A0B83DA79AFE8D0D41E9001276F045D0C2ED37E54326EDC13BD4A52C1F4A3BC9E0C9355EEEBE129C1
31,694,336 UART: [art] PUB.Y = 0948B05E3FE7C516E9EF532F44A562A32FD8DF8879C67F8E6102CEF8E990B019CAE144C97514F3EDC4C83D82203EACF4
31,701,586 UART: [art] SIG.R = D2DB42FB4BAD580CF5EC27CC455F43666E093D0F9BB3D9D6A9A37A3CD8D3BC981AC77D211E244F7A711ED0A4BEF631C9
31,708,998 UART: [art] SIG.S = A92C626CD87642D0A4AB3265E88F7C342D25E24929E222909777C7338999231C2A29E4AE16D1C65550AE71F49D233F68
33,013,561 UART: Caliptra RT
33,014,282 UART: [state] CFI Enabled
33,176,566 UART: [rt] RT listening for mailbox commands...
33,207,834 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,450 UART:
192,820 UART: Running Caliptra ROM ...
194,021 UART:
603,682 UART: [state] CFI Enabled
621,675 UART: [state] LifecycleState = Unprovisioned
623,623 UART: [state] DebugLocked = No
625,228 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,235 UART: [kat] SHA2-256
799,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,543 UART: [kat] ++
811,029 UART: [kat] sha1
823,119 UART: [kat] SHA2-256
825,844 UART: [kat] SHA2-384
832,475 UART: [kat] SHA2-512-ACC
834,856 UART: [kat] ECC-384
3,118,697 UART: [kat] HMAC-384Kdf
3,130,031 UART: [kat] LMS
4,320,115 UART: [kat] --
4,326,869 UART: [cold-reset] ++
4,328,207 UART: [fht] Storing FHT @ 0x50003400
4,340,487 UART: [idev] ++
4,341,064 UART: [idev] CDI.KEYID = 6
4,341,977 UART: [idev] SUBJECT.KEYID = 7
4,343,228 UART: [idev] UDS.KEYID = 0
4,344,266 ready_for_fw is high
4,344,487 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,488,949 UART: [idev] Erasing UDS.KEYID = 0
7,629,327 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,060 UART: [idev] --
7,653,411 UART: [ldev] ++
7,653,988 UART: [ldev] CDI.KEYID = 6
7,654,959 UART: [ldev] SUBJECT.KEYID = 5
7,656,174 UART: [ldev] AUTHORITY.KEYID = 7
7,657,415 UART: [ldev] FE.KEYID = 1
7,667,898 UART: [ldev] Erasing FE.KEYID = 1
10,956,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,662 UART: [ldev] --
13,318,497 UART: [fwproc] Waiting for Commands...
13,320,810 UART: [fwproc] Received command 0x46574c44
13,323,000 UART: [fwproc] Received Image of size 114996 bytes
17,385,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,463,261 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,532,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,852,772 >>> mbox cmd response: success
17,853,155 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,856,852 UART: [afmc] ++
17,857,449 UART: [afmc] CDI.KEYID = 6
17,858,400 UART: [afmc] SUBJECT.KEYID = 7
17,859,615 UART: [afmc] AUTHORITY.KEYID = 5
21,172,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,469,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,471,395 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,485,784 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,500,599 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,515,039 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,536,409 UART: [afmc] --
23,539,842 UART: [cold-reset] --
23,542,294 UART: [state] Locking Datavault
23,548,679 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,421 UART: [state] Locking ICCM
23,552,519 UART: [exit] Launching FMC @ 0x40000130
23,560,915 UART:
23,561,171 UART: Running Caliptra FMC ...
23,562,275 UART:
23,562,442 UART: [state] CFI Enabled
23,570,445 UART: [fht] FMC Alias Private Key: 7
25,901,275 UART: [art] Extend RT PCRs Done
25,902,513 UART: [art] Lock RT PCRs Done
25,904,134 UART: [art] Populate DV Done
25,909,560 UART: [fht] FMC Alias Private Key: 7
25,911,088 UART: [art] Derive CDI
25,911,853 UART: [art] Store in in slot 0x4
25,954,424 UART: [art] Derive Key Pair
25,955,464 UART: [art] Store priv key in slot 0x5
29,197,550 UART: [art] Derive Key Pair - Done
29,210,696 UART: [art] Signing Cert with AUTHO
29,212,038 UART: RITY.KEYID = 7
31,491,468 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,022 UART: [art] PUB.X = 7A3825EE95189E4084DE5BF13970DC245E90DF5ED9220824EBEBA4BCD0A4F86F406081DE642936B1C3F6D6669913B3AC
31,500,216 UART: [art] PUB.Y = FFAE7291AC38E70FDE09AFAAFC3727A1A580C95EB69430135A10A33E2701D66BC9D71B58728C9AE187B97B51F5F01C6A
31,507,451 UART: [art] SIG.R = 04ABE9B1FD5EC5815D97FF8925BEC6C1CDA8DA1F2674AEBF56E6118CF5E6A55EB1B6623FB8A25816B7A83410458DF4C3
31,514,859 UART: [art] SIG.S = E893FF977AFD01E4F695AC2AFBE76D1675880DB67A8C2A9FED6CD44E18481843505DF9043815CC8E617B55486BBD8AC5
32,820,129 UART: Caliptra RT
32,820,851 UART: [state] CFI Enabled
32,939,462 UART: [rt] RT listening for mailbox commands...
32,970,619 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,566 writing to cptra_bootfsm_go
4,120,686 ready_for_fw is high
4,121,169 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,080,231 >>> mbox cmd response: success
18,080,760 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,712,662 UART:
23,713,047 UART: Running Caliptra FMC ...
23,714,191 UART:
23,714,346 UART: [state] CFI Enabled
23,722,478 UART: [fht] FMC Alias Private Key: 7
26,053,361 UART: [art] Extend RT PCRs Done
26,054,585 UART: [art] Lock RT PCRs Done
26,056,621 UART: [art] Populate DV Done
26,062,073 UART: [fht] FMC Alias Private Key: 7
26,063,614 UART: [art] Derive CDI
26,064,385 UART: [art] Store in in slot 0x4
26,107,098 UART: [art] Derive Key Pair
26,108,109 UART: [art] Store priv key in slot 0x5
29,350,588 UART: [art] Derive Key Pair - Done
29,363,929 UART: [art] Signing Cert with AUTHO
29,365,230 UART: RITY.KEYID = 7
31,644,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,220 UART: [art] PUB.X = E8789F640734ED7C107740FDBE61B2CE052243B0FE13C1A51A6ACDFDD0F971E96B677DE5ED3C50C9C07F8F0DF7B62E40
31,653,469 UART: [art] PUB.Y = 5F11151A99FA163329046AA5C96B98C30329D18D5812EDC5D83B4AF12A905478353EFEF8503C520831362751BF45BC61
31,660,702 UART: [art] SIG.R = 749A4C726E7AC606F12125CCCFA97456831D394C7F6E5523E75EC37D1241C5215B3A628AE2D20378C37E90EF92512915
31,668,037 UART: [art] SIG.S = A5BC85A59CE57E20F75D098240FD6B26E5F40B9D6CB9B620F6C74D21A5C861FD4F1E5E04D64B35414682FDF36F695716
32,973,361 UART: Caliptra RT
32,974,080 UART: [state] CFI Enabled
33,092,044 UART: [rt] RT listening for mailbox commands...
33,123,594 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,158 UART:
192,559 UART: Running Caliptra ROM ...
193,772 UART:
193,924 UART: [state] CFI Enabled
263,820 UART: [state] LifecycleState = Unprovisioned
265,667 UART: [state] DebugLocked = No
268,413 UART: [state] WD Timer not started. Device not locked for debugging
271,944 UART: [kat] SHA2-256
451,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,641 UART: [kat] ++
463,178 UART: [kat] sha1
475,198 UART: [kat] SHA2-256
478,203 UART: [kat] SHA2-384
484,116 UART: [kat] SHA2-512-ACC
487,067 UART: [kat] ECC-384
2,947,180 UART: [kat] HMAC-384Kdf
2,972,367 UART: [kat] LMS
3,501,844 UART: [kat] --
3,506,009 UART: [cold-reset] ++
3,507,035 UART: [fht] FHT @ 0x50003400
3,518,950 UART: [idev] ++
3,519,516 UART: [idev] CDI.KEYID = 6
3,520,433 UART: [idev] SUBJECT.KEYID = 7
3,521,610 UART: [idev] UDS.KEYID = 0
3,522,608 ready_for_fw is high
3,522,832 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,869 UART: [idev] Erasing UDS.KEYID = 0
6,024,102 UART: [idev] Sha1 KeyId Algorithm
6,047,067 UART: [idev] --
6,049,751 UART: [ldev] ++
6,050,340 UART: [ldev] CDI.KEYID = 6
6,051,255 UART: [ldev] SUBJECT.KEYID = 5
6,052,416 UART: [ldev] AUTHORITY.KEYID = 7
6,053,726 UART: [ldev] FE.KEYID = 1
6,101,585 UART: [ldev] Erasing FE.KEYID = 1
8,605,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,348 UART: [ldev] --
10,415,613 UART: [fwproc] Wait for Commands...
10,417,601 UART: [fwproc] Recv command 0x46574c44
10,419,666 UART: [fwproc] Recv'd Img size: 115304 bytes
13,841,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,516 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,304,290 >>> mbox cmd response: success
14,304,712 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,308,775 UART: [afmc] ++
14,309,362 UART: [afmc] CDI.KEYID = 6
14,310,250 UART: [afmc] SUBJECT.KEYID = 7
14,311,461 UART: [afmc] AUTHORITY.KEYID = 5
16,854,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,614,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,630,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,646,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,668,797 UART: [afmc] --
18,672,432 UART: [cold-reset] --
18,675,774 UART: [state] Locking Datavault
18,681,060 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,698 UART: [state] Locking ICCM
18,683,915 UART: [exit] Launching FMC @ 0x40000130
18,692,312 UART:
18,692,559 UART: Running Caliptra FMC ...
18,693,663 UART:
18,693,821 UART: [state] CFI Enabled
18,754,319 UART: [fht] FMC Alias Private Key: 7
20,518,627 UART: [art] Extend RT PCRs Done
20,519,851 UART: [art] Lock RT PCRs Done
20,521,658 UART: [art] Populate DV Done
20,527,178 UART: [fht] FMC Alias Private Key: 7
20,528,639 UART: [art] Derive CDI
20,529,376 UART: [art] Store in in slot 0x4
20,588,372 UART: [art] Derive Key Pair
20,589,372 UART: [art] Store priv key in slot 0x5
23,051,847 UART: [art] Derive Key Pair - Done
23,064,859 UART: [art] Signing Cert with AUTHO
23,066,165 UART: RITY.KEYID = 7
24,777,986 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,496 UART: [art] PUB.X = 42EFACDD82210B3647ED673AB63CE08CBDD2C4D8E181F014647BA4E9CE8DBE8B665BF36B8F95F7F3E721124EECBB9914
24,786,779 UART: [art] PUB.Y = 73572D5C3B3100F85E54F0211E477053F481556081B64D027A137742CEF1C190916C717B202D8FB0D13B60CFCA33ADA0
24,794,008 UART: [art] SIG.R = E693D8C3202E982A9FC30867C6C46C0DF447206D22513E41837BB024E1DA011789A5AE8DE337CFECD27A36E227246EF7
24,801,377 UART: [art] SIG.S = 6EE4F3F4ECFDB681B9F265EB96B7E2C4A99AFB45A4DF9FA7838328A54851B3F709622A1458DA85DD93CCFD7D13470CA5
25,780,747 UART: Caliptra RT
25,781,446 UART: [state] CFI Enabled
25,945,360 UART: [rt] RT listening for mailbox commands...
25,976,745 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,362,026 ready_for_fw is high
3,362,524 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,063,053 >>> mbox cmd response: success
14,063,584 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,344,094 UART:
18,344,498 UART: Running Caliptra FMC ...
18,345,663 UART:
18,345,821 UART: [state] CFI Enabled
18,410,806 UART: [fht] FMC Alias Private Key: 7
20,175,422 UART: [art] Extend RT PCRs Done
20,176,648 UART: [art] Lock RT PCRs Done
20,178,468 UART: [art] Populate DV Done
20,183,768 UART: [fht] FMC Alias Private Key: 7
20,185,341 UART: [art] Derive CDI
20,186,075 UART: [art] Store in in slot 0x4
20,243,459 UART: [art] Derive Key Pair
20,244,460 UART: [art] Store priv key in slot 0x5
22,707,048 UART: [art] Derive Key Pair - Done
22,720,010 UART: [art] Signing Cert with AUTHO
22,721,316 UART: RITY.KEYID = 7
24,433,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,805 UART: [art] PUB.X = 43B630F24CC4B0A0447B078D3C8B8525CE88ADA9A178076205DAE8D965C60ECEDED2D52ABA75ACDC971E6345C4C7532B
24,442,052 UART: [art] PUB.Y = D7DD25E80B2CAB054BA4D31FD2F86B6F19825E03126484C8D1393CEDAD4A80591040A937015B50407CF0A8BA2B5553D1
24,449,312 UART: [art] SIG.R = 1CDCDB8D35F0909D02BC732DD578A52F227EDDC4E951BB11689988D91E92863BD12FE592610A5086606CF74A7CC77B8A
24,456,712 UART: [art] SIG.S = 91055769166F7C4DD1B3481835A051FB13E37663F866542FD2DF5CD42375001703E11627BA23063C516E1596C1B70E2E
25,435,656 UART: Caliptra RT
25,436,356 UART: [state] CFI Enabled
25,602,744 UART: [rt] RT listening for mailbox commands...
25,634,367 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,442 UART:
192,807 UART: Running Caliptra ROM ...
193,978 UART:
603,535 UART: [state] CFI Enabled
616,078 UART: [state] LifecycleState = Unprovisioned
617,989 UART: [state] DebugLocked = No
620,659 UART: [state] WD Timer not started. Device not locked for debugging
623,780 UART: [kat] SHA2-256
802,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,464 UART: [kat] ++
815,006 UART: [kat] sha1
826,754 UART: [kat] SHA2-256
829,757 UART: [kat] SHA2-384
836,103 UART: [kat] SHA2-512-ACC
839,040 UART: [kat] ECC-384
3,281,479 UART: [kat] HMAC-384Kdf
3,292,571 UART: [kat] LMS
3,822,026 UART: [kat] --
3,826,046 UART: [cold-reset] ++
3,827,368 UART: [fht] FHT @ 0x50003400
3,839,415 UART: [idev] ++
3,839,990 UART: [idev] CDI.KEYID = 6
3,840,914 UART: [idev] SUBJECT.KEYID = 7
3,842,035 UART: [idev] UDS.KEYID = 0
3,843,030 ready_for_fw is high
3,843,258 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,988,176 UART: [idev] Erasing UDS.KEYID = 0
6,315,548 UART: [idev] Sha1 KeyId Algorithm
6,338,330 UART: [idev] --
6,342,488 UART: [ldev] ++
6,343,059 UART: [ldev] CDI.KEYID = 6
6,343,943 UART: [ldev] SUBJECT.KEYID = 5
6,345,158 UART: [ldev] AUTHORITY.KEYID = 7
6,346,390 UART: [ldev] FE.KEYID = 1
6,356,575 UART: [ldev] Erasing FE.KEYID = 1
8,829,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,946 UART: [ldev] --
10,618,703 UART: [fwproc] Wait for Commands...
10,620,697 UART: [fwproc] Recv command 0x46574c44
10,622,794 UART: [fwproc] Recv'd Img size: 115304 bytes
14,040,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,745 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,501,908 >>> mbox cmd response: success
14,502,327 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,505,411 UART: [afmc] ++
14,505,994 UART: [afmc] CDI.KEYID = 6
14,506,897 UART: [afmc] SUBJECT.KEYID = 7
14,508,103 UART: [afmc] AUTHORITY.KEYID = 5
17,010,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,943 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,980 UART: [afmc] --
18,806,081 UART: [cold-reset] --
18,811,184 UART: [state] Locking Datavault
18,817,523 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,192 UART: [state] Locking ICCM
18,820,653 UART: [exit] Launching FMC @ 0x40000130
18,829,066 UART:
18,829,314 UART: Running Caliptra FMC ...
18,830,357 UART:
18,830,504 UART: [state] CFI Enabled
18,838,702 UART: [fht] FMC Alias Private Key: 7
20,595,646 UART: [art] Extend RT PCRs Done
20,596,854 UART: [art] Lock RT PCRs Done
20,598,362 UART: [art] Populate DV Done
20,603,840 UART: [fht] FMC Alias Private Key: 7
20,605,365 UART: [art] Derive CDI
20,606,123 UART: [art] Store in in slot 0x4
20,648,657 UART: [art] Derive Key Pair
20,649,698 UART: [art] Store priv key in slot 0x5
23,076,644 UART: [art] Derive Key Pair - Done
23,089,908 UART: [art] Signing Cert with AUTHO
23,091,247 UART: RITY.KEYID = 7
24,797,192 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,705 UART: [art] PUB.X = 21CEFBE76C9022184C0F45B5BBAC76555F23CD41FD0382AD1D2B6AE1F735021630F143273225CE9900FCAA32E4185A85
24,805,969 UART: [art] PUB.Y = BAB60D5895AF65FB9F6E7C4884E112D66CD5C1114DEB54C5F4A66D7DECADA9408D2CCF33061C8AB61498A274BBDF72A8
24,813,238 UART: [art] SIG.R = E0707F8E826F61E5FEB08C04654782A534EC00918F11BDFEBD8CFB3D1E74E8A8A2D858F986789341DE7C9880EAFBD0E6
24,820,602 UART: [art] SIG.S = 900B6EED872780452A6C7A69E6088B1A12051CCCE797A3AD3C6CF80E088B4CC7FCA2D31CEB211C4B8B5EF687D3423C53
25,799,251 UART: Caliptra RT
25,799,959 UART: [state] CFI Enabled
25,917,010 UART: [rt] RT listening for mailbox commands...
25,948,384 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
3,696,507 ready_for_fw is high
3,697,205 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,283,122 >>> mbox cmd response: success
14,283,635 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,532,819 UART:
18,533,225 UART: Running Caliptra FMC ...
18,534,394 UART:
18,534,571 UART: [state] CFI Enabled
18,542,416 UART: [fht] FMC Alias Private Key: 7
20,299,490 UART: [art] Extend RT PCRs Done
20,300,713 UART: [art] Lock RT PCRs Done
20,302,599 UART: [art] Populate DV Done
20,307,736 UART: [fht] FMC Alias Private Key: 7
20,309,403 UART: [art] Derive CDI
20,310,220 UART: [art] Store in in slot 0x4
20,352,843 UART: [art] Derive Key Pair
20,353,880 UART: [art] Store priv key in slot 0x5
22,781,242 UART: [art] Derive Key Pair - Done
22,794,212 UART: [art] Signing Cert with AUTHO
22,795,515 UART: RITY.KEYID = 7
24,500,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,366 UART: [art] PUB.X = 74ED4C94AB47B0AEBC6D07D837E173422001377F78F8C3326DE09A7CD8B4F538D7D91D766DD749C9489681B17E287CFC
24,509,614 UART: [art] PUB.Y = A62C7F559D54D339190075CFE7D3B73B2E7E59490834479BB56AA25AD80E610CFD32895ADE9DC2462814860535825F5F
24,516,875 UART: [art] SIG.R = 94A5037BC388496D85679D852D7C48D6A66DD2F16D120DB1D5491C8B65786F8090F775C1970FC3FF89CEA52750F9FE3D
24,524,256 UART: [art] SIG.S = DC3FCFDA235433EBA6787AE65375C0C3211222C868DAD1DA9E316DA447AFF249BAAB7B7A086378971DE32393B38CACFB
25,503,308 UART: Caliptra RT
25,504,010 UART: [state] CFI Enabled
25,621,224 UART: [rt] RT listening for mailbox commands...
25,652,563 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
191,939 UART:
192,301 UART: Running Caliptra ROM ...
193,418 UART:
193,562 UART: [state] CFI Enabled
265,153 UART: [state] LifecycleState = Unprovisioned
267,572 UART: [state] DebugLocked = No
269,524 UART: [state] WD Timer not started. Device not locked for debugging
274,061 UART: [kat] SHA2-256
463,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,725 UART: [kat] ++
475,170 UART: [kat] sha1
486,258 UART: [kat] SHA2-256
489,267 UART: [kat] SHA2-384
495,761 UART: [kat] SHA2-512-ACC
498,517 UART: [kat] ECC-384
2,946,633 UART: [kat] HMAC-384Kdf
2,973,718 UART: [kat] LMS
3,505,451 UART: [kat] --
3,509,111 UART: [cold-reset] ++
3,510,124 UART: [fht] FHT @ 0x50003400
3,522,734 UART: [idev] ++
3,523,379 UART: [idev] CDI.KEYID = 6
3,524,365 UART: [idev] SUBJECT.KEYID = 7
3,525,482 UART: [idev] UDS.KEYID = 0
3,526,472 ready_for_fw is high
3,526,707 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,672,147 UART: [idev] Erasing UDS.KEYID = 0
6,031,093 UART: [idev] Sha1 KeyId Algorithm
6,054,287 UART: [idev] --
6,059,524 UART: [ldev] ++
6,060,208 UART: [ldev] CDI.KEYID = 6
6,061,093 UART: [ldev] SUBJECT.KEYID = 5
6,062,311 UART: [ldev] AUTHORITY.KEYID = 7
6,063,544 UART: [ldev] FE.KEYID = 1
6,101,845 UART: [ldev] Erasing FE.KEYID = 1
8,607,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,749 UART: [ldev] --
10,414,420 UART: [fwproc] Wait for Commands...
10,416,142 UART: [fwproc] Recv command 0x46574c44
10,418,642 UART: [fwproc] Recv'd Img size: 115304 bytes
13,875,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,356 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,619,985 >>> mbox cmd response: success
14,620,379 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,624,856 UART: [afmc] ++
14,625,555 UART: [afmc] CDI.KEYID = 6
14,626,766 UART: [afmc] SUBJECT.KEYID = 7
14,628,225 UART: [afmc] AUTHORITY.KEYID = 5
17,176,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,918,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,973,547 UART: [afmc] --
18,977,756 UART: [cold-reset] --
18,981,490 UART: [state] Locking Datavault
18,989,378 UART: [state] Locking PCR0, PCR1 and PCR31
18,991,522 UART: [state] Locking ICCM
18,993,024 UART: [exit] Launching FMC @ 0x40000130
19,001,700 UART:
19,001,960 UART: Running Caliptra FMC ...
19,003,070 UART:
19,003,234 UART: [state] CFI Enabled
19,057,411 UART: [fht] FMC Alias Private Key: 7
20,822,058 UART: [art] Extend RT PCRs Done
20,823,282 UART: [art] Lock RT PCRs Done
20,824,934 UART: [art] Populate DV Done
20,830,403 UART: [fht] FMC Alias Private Key: 7
20,832,029 UART: [art] Derive CDI
20,832,852 UART: [art] Store in in slot 0x4
20,889,653 UART: [art] Derive Key Pair
20,890,652 UART: [art] Store priv key in slot 0x5
23,354,815 UART: [art] Derive Key Pair - Done
23,367,677 UART: [art] Signing Cert with AUTHO
23,368,979 UART: RITY.KEYID = 7
25,080,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,081,821 UART: [art] PUB.X = 76A23426E541B16EA69C50DA248A2AF06896A27B84D71F3E38AB9F08239368677C177D766A62D7A15C2E05D78AE786F1
25,089,037 UART: [art] PUB.Y = B4D8D8153217EB73D5185830252E6EB6D2C596DCD6E48371B9153D0817868A7D98903676BF1D761FD6DED272DCAEA7D2
25,096,291 UART: [art] SIG.R = 92477BEEA884B1F133D7F25015976EC48291E40C326C9FA5971BE32001949CCE67C211D4F2F54460541EF2DE38E10E95
25,103,654 UART: [art] SIG.S = 8E7A7A66032C813DBD2CC58D98D5948AC807C972444D8A48FBEFBCEFFE7063C2A0F365833BA89FE69C044DB1C5A828AE
26,082,682 UART: Caliptra RT
26,083,381 UART: [state] CFI Enabled
26,248,169 UART: [rt] RT listening for mailbox commands...
26,279,624 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,438,998 ready_for_fw is high
3,439,464 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,768,095 >>> mbox cmd response: success
14,768,804 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,051,362 UART:
19,051,765 UART: Running Caliptra FMC ...
19,052,906 UART:
19,053,062 UART: [state] CFI Enabled
19,122,456 UART: [fht] FMC Alias Private Key: 7
20,886,389 UART: [art] Extend RT PCRs Done
20,887,616 UART: [art] Lock RT PCRs Done
20,888,957 UART: [art] Populate DV Done
20,894,101 UART: [fht] FMC Alias Private Key: 7
20,895,765 UART: [art] Derive CDI
20,896,598 UART: [art] Store in in slot 0x4
20,954,632 UART: [art] Derive Key Pair
20,955,679 UART: [art] Store priv key in slot 0x5
23,418,631 UART: [art] Derive Key Pair - Done
23,431,857 UART: [art] Signing Cert with AUTHO
23,433,165 UART: RITY.KEYID = 7
25,144,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,847 UART: [art] PUB.X = 5DDFBADD5145C79AE28729520C9101F6E4E960F3E5E39E720C003B1AD91F341E4F9E5CF0C3D12B6A2D0338C350D506B1
25,153,093 UART: [art] PUB.Y = 3762CAEEAB4EF637988D77E524082D96EB0AB861D0DB11AFD7D8495F4875933ACE2AA1A77F9A6A1A3261F4EB4D76E810
25,160,382 UART: [art] SIG.R = 6F1B0F1173373CC001C348AD2FD1A8461A735330C27F4459AFEEB1675B4138DF38D50C5ECC7FC2182C057E70346F0574
25,167,781 UART: [art] SIG.S = E15625BEA7885413CEBA631ADBAF7D1F36314A73C57167A821FC8C97CE750C2F26F8CCD84674C56D5947AF6BFBABFD7C
26,146,503 UART: Caliptra RT
26,147,191 UART: [state] CFI Enabled
26,312,408 UART: [rt] RT listening for mailbox commands...
26,343,594 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,449 UART:
192,805 UART: Running Caliptra ROM ...
193,995 UART:
603,801 UART: [state] CFI Enabled
620,254 UART: [state] LifecycleState = Unprovisioned
622,602 UART: [state] DebugLocked = No
624,704 UART: [state] WD Timer not started. Device not locked for debugging
629,951 UART: [kat] SHA2-256
819,830 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,610 UART: [kat] ++
831,211 UART: [kat] sha1
843,227 UART: [kat] SHA2-256
846,301 UART: [kat] SHA2-384
853,433 UART: [kat] SHA2-512-ACC
856,032 UART: [kat] ECC-384
3,295,994 UART: [kat] HMAC-384Kdf
3,309,241 UART: [kat] LMS
3,841,135 UART: [kat] --
3,844,848 UART: [cold-reset] ++
3,847,063 UART: [fht] FHT @ 0x50003400
3,858,117 UART: [idev] ++
3,858,857 UART: [idev] CDI.KEYID = 6
3,859,769 UART: [idev] SUBJECT.KEYID = 7
3,861,020 UART: [idev] UDS.KEYID = 0
3,861,951 ready_for_fw is high
3,862,172 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
4,007,774 UART: [idev] Erasing UDS.KEYID = 0
6,337,049 UART: [idev] Sha1 KeyId Algorithm
6,360,063 UART: [idev] --
6,365,197 UART: [ldev] ++
6,365,878 UART: [ldev] CDI.KEYID = 6
6,366,789 UART: [ldev] SUBJECT.KEYID = 5
6,367,950 UART: [ldev] AUTHORITY.KEYID = 7
6,369,177 UART: [ldev] FE.KEYID = 1
6,379,230 UART: [ldev] Erasing FE.KEYID = 1
8,858,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,546 UART: [ldev] --
10,650,556 UART: [fwproc] Wait for Commands...
10,652,222 UART: [fwproc] Recv command 0x46574c44
10,654,536 UART: [fwproc] Recv'd Img size: 115304 bytes
14,117,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,203,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,319,439 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,866,939 >>> mbox cmd response: success
14,867,326 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,871,868 UART: [afmc] ++
14,872,553 UART: [afmc] CDI.KEYID = 6
14,873,794 UART: [afmc] SUBJECT.KEYID = 7
14,875,243 UART: [afmc] AUTHORITY.KEYID = 5
17,381,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,105,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,106,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,122,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,137,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,152,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,174,526 UART: [afmc] --
19,177,536 UART: [cold-reset] --
19,180,526 UART: [state] Locking Datavault
19,186,344 UART: [state] Locking PCR0, PCR1 and PCR31
19,188,522 UART: [state] Locking ICCM
19,191,452 UART: [exit] Launching FMC @ 0x40000130
19,200,113 UART:
19,200,391 UART: Running Caliptra FMC ...
19,201,511 UART:
19,201,671 UART: [state] CFI Enabled
19,210,225 UART: [fht] FMC Alias Private Key: 7
20,967,490 UART: [art] Extend RT PCRs Done
20,968,709 UART: [art] Lock RT PCRs Done
20,970,641 UART: [art] Populate DV Done
20,975,890 UART: [fht] FMC Alias Private Key: 7
20,977,379 UART: [art] Derive CDI
20,978,109 UART: [art] Store in in slot 0x4
21,020,896 UART: [art] Derive Key Pair
21,021,895 UART: [art] Store priv key in slot 0x5
23,448,451 UART: [art] Derive Key Pair - Done
23,461,643 UART: [art] Signing Cert with AUTHO
23,462,946 UART: RITY.KEYID = 7
25,168,456 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,974 UART: [art] PUB.X = 461205462790CBB0F018329D78D4DA877F61A2B4036E003731D02590F193E777C5923E35040869044A2C6982CD45B59E
25,177,145 UART: [art] PUB.Y = EA0C814DB316A37106B421AC1CBB4C45A1FB09E22FE18943627A35665DBFFB224B9F3EA71272520D73720C81423AD08A
25,184,408 UART: [art] SIG.R = 39378A9288BD87FF3EB95811B6ADD9A6AC4CFDEC2D2A70F68E53F33AEE0B5931D22A86BBDAA5F9386495FE25FCC6D360
25,191,851 UART: [art] SIG.S = E5FFBA469E3BD6045EB6904F5CEF180E079B7A38A2CC04094B72CA19377C85DA1CB3DABBF2E8350997FF83F6B78FC008
26,171,095 UART: Caliptra RT
26,171,805 UART: [state] CFI Enabled
26,289,023 UART: [rt] RT listening for mailbox commands...
26,320,057 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,756,372 ready_for_fw is high
3,756,976 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,986,499 >>> mbox cmd response: success
14,987,449 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,238,069 UART:
19,238,509 UART: Running Caliptra FMC ...
19,239,663 UART:
19,239,826 UART: [state] CFI Enabled
19,247,586 UART: [fht] FMC Alias Private Key: 7
21,004,407 UART: [art] Extend RT PCRs Done
21,005,649 UART: [art] Lock RT PCRs Done
21,007,068 UART: [art] Populate DV Done
21,012,705 UART: [fht] FMC Alias Private Key: 7
21,014,237 UART: [art] Derive CDI
21,015,010 UART: [art] Store in in slot 0x4
21,057,483 UART: [art] Derive Key Pair
21,058,526 UART: [art] Store priv key in slot 0x5
23,485,443 UART: [art] Derive Key Pair - Done
23,498,336 UART: [art] Signing Cert with AUTHO
23,499,639 UART: RITY.KEYID = 7
25,204,955 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,469 UART: [art] PUB.X = 3627DAB8DF88706CA251C5F765522C6661F87576530A5509F4B9A1A197DB7978C1779499FFFD63D3DF6F1A0E85911126
25,213,688 UART: [art] PUB.Y = DC41797C6A4A1F7A54A61914E1C4AE107648DE4E0C2DF8DE9003C9726F04DBDC870B44DF5F697A71BA5C307EC95A0FBB
25,220,960 UART: [art] SIG.R = 386C03E52FB955DD49AFFCD992B6AA8F4C922F57891691452F41DA7CE3501991243A4F0771447D720538229F90612233
25,228,318 UART: [art] SIG.S = 96FC9A7AF7B898A89791CBAEE3A4D40D3941ACB4E39B3ED04CA21F2696D077C572496B376E659ABEDDD7DDE9796494F4
26,206,847 UART: Caliptra RT
26,207,539 UART: [state] CFI Enabled
26,324,942 UART: [rt] RT listening for mailbox commands...
26,356,137 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,213 UART: [kat] SHA2-256
892,151 UART: [kat] SHA2-384
894,706 UART: [kat] SHA2-512-ACC
896,607 UART: [kat] ECC-384
902,332 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,475,883 UART: [cold-reset] ++
1,476,387 UART: [fht] Storing FHT @ 0x50003400
1,479,172 UART: [idev] ++
1,479,340 UART: [idev] CDI.KEYID = 6
1,479,700 UART: [idev] SUBJECT.KEYID = 7
1,480,124 UART: [idev] UDS.KEYID = 0
1,480,469 ready_for_fw is high
1,480,469 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,050 UART: [idev] --
1,515,295 UART: [ldev] ++
1,515,463 UART: [ldev] CDI.KEYID = 6
1,515,826 UART: [ldev] SUBJECT.KEYID = 5
1,516,252 UART: [ldev] AUTHORITY.KEYID = 7
1,516,715 UART: [ldev] FE.KEYID = 1
1,521,901 UART: [ldev] Erasing FE.KEYID = 1
1,546,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,224 UART: [ldev] --
1,586,553 UART: [fwproc] Waiting for Commands...
1,587,320 UART: [fwproc] Received command 0x46574c44
1,588,111 UART: [fwproc] Received Image of size 115304 bytes
2,897,552 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,545 >>> mbox cmd response: success
3,091,545 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,092,613 UART: [afmc] ++
3,092,781 UART: [afmc] CDI.KEYID = 6
3,093,143 UART: [afmc] SUBJECT.KEYID = 7
3,093,568 UART: [afmc] AUTHORITY.KEYID = 5
3,128,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,035 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,428 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,118 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,945 UART: [afmc] --
3,172,033 UART: [cold-reset] --
3,172,851 UART: [state] Locking Datavault
3,173,906 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,510 UART: [state] Locking ICCM
3,174,970 UART: [exit] Launching FMC @ 0x40000130
3,180,299 UART:
3,180,315 UART: Running Caliptra FMC ...
3,180,723 UART:
3,180,777 UART: [state] CFI Enabled
3,191,166 UART: [fht] FMC Alias Private Key: 7
3,299,479 UART: [art] Extend RT PCRs Done
3,299,907 UART: [art] Lock RT PCRs Done
3,301,285 UART: [art] Populate DV Done
3,309,322 UART: [fht] FMC Alias Private Key: 7
3,310,410 UART: [art] Derive CDI
3,310,690 UART: [art] Store in in slot 0x4
3,396,123 UART: [art] Derive Key Pair
3,396,483 UART: [art] Store priv key in slot 0x5
3,410,243 UART: [art] Derive Key Pair - Done
3,424,807 UART: [art] Signing Cert with AUTHO
3,425,287 UART: RITY.KEYID = 7
3,440,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,886 UART: [art] PUB.X = F77B5B86DBE150502F9C5D5464B42DC9C1FD3732365A1B8315C88F2E2D0CADEB8E5D0358F791BD42DDBD29875D20F0D5
3,447,664 UART: [art] PUB.Y = FB8BDFCE9D877F5A15D76410C037243DE91D24FE7B6A46105AC3F074F3A3B7CCB799AECB01EDFF1E4BCFF147873AC533
3,454,635 UART: [art] SIG.R = 7DA3ED9FA8950D4994E732A8B1B73E3D5E276CCD5615E892C433EAD865E32B27A6A292DF0E04A4EAD827DCE8AA5967E7
3,461,412 UART: [art] SIG.S = 5D5199C77667B49D72A06803990184CF3C7897DD10889165664625728CB58AF23FEF83818BCBEF24B2DF7789552392CF
3,484,879 UART: Caliptra RT
3,485,132 UART: [state] CFI Enabled
3,594,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,912 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,055 ready_for_fw is high
1,362,055 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,059 >>> mbox cmd response: success
2,939,059 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,000,457 UART:
3,000,473 UART: Running Caliptra FMC ...
3,000,881 UART:
3,000,935 UART: [state] CFI Enabled
3,011,426 UART: [fht] FMC Alias Private Key: 7
3,119,571 UART: [art] Extend RT PCRs Done
3,119,999 UART: [art] Lock RT PCRs Done
3,121,701 UART: [art] Populate DV Done
3,129,872 UART: [fht] FMC Alias Private Key: 7
3,131,054 UART: [art] Derive CDI
3,131,334 UART: [art] Store in in slot 0x4
3,217,039 UART: [art] Derive Key Pair
3,217,399 UART: [art] Store priv key in slot 0x5
3,231,049 UART: [art] Derive Key Pair - Done
3,245,992 UART: [art] Signing Cert with AUTHO
3,246,472 UART: RITY.KEYID = 7
3,261,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,369 UART: [art] PUB.X = EE9C1B85BCC3C90D85CA674B0B7A922C36A882E014BF586281E9F025AF2DE157D3C6CEB9534E6CC319BE43D03A0DEFAA
3,269,152 UART: [art] PUB.Y = 479BC4915D0F7C27C8D5D633AFEC4F8B46DBE04DF2245A6C1759ECDACBFFF292DD52C9C007A392AEA98D03C1D2BEA0E9
3,276,121 UART: [art] SIG.R = 92D18B7D7238CFF128E1D8BD056EE685F78F2E065D5BFC7294CB24A82F65A720D01F0DC87144E6F927C6430196979AA1
3,282,883 UART: [art] SIG.S = ADF89DBE260A4E64D85885E653BAC2E86D005C3AF481179FC79DCA062B4D549F55D2E97700BF04849859D006066799CC
3,306,439 UART: Caliptra RT
3,306,692 UART: [state] CFI Enabled
3,414,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,980 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,633 UART: [kat] HMAC-384Kdf
907,123 UART: [kat] LMS
1,475,319 UART: [kat] --
1,476,190 UART: [cold-reset] ++
1,476,574 UART: [fht] Storing FHT @ 0x50003400
1,479,323 UART: [idev] ++
1,479,491 UART: [idev] CDI.KEYID = 6
1,479,851 UART: [idev] SUBJECT.KEYID = 7
1,480,275 UART: [idev] UDS.KEYID = 0
1,480,620 ready_for_fw is high
1,480,620 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,515,054 UART: [ldev] ++
1,515,222 UART: [ldev] CDI.KEYID = 6
1,515,585 UART: [ldev] SUBJECT.KEYID = 5
1,516,011 UART: [ldev] AUTHORITY.KEYID = 7
1,516,474 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,679 UART: [ldev] --
1,586,036 UART: [fwproc] Waiting for Commands...
1,586,743 UART: [fwproc] Received command 0x46574c44
1,587,534 UART: [fwproc] Received Image of size 115304 bytes
2,897,639 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,247 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,008 >>> mbox cmd response: success
3,092,008 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,093,084 UART: [afmc] ++
3,093,252 UART: [afmc] CDI.KEYID = 6
3,093,614 UART: [afmc] SUBJECT.KEYID = 7
3,094,039 UART: [afmc] AUTHORITY.KEYID = 5
3,129,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,423 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,113 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,036 UART: [afmc] --
3,173,014 UART: [cold-reset] --
3,174,070 UART: [state] Locking Datavault
3,175,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,773 UART: [state] Locking ICCM
3,176,379 UART: [exit] Launching FMC @ 0x40000130
3,181,708 UART:
3,181,724 UART: Running Caliptra FMC ...
3,182,132 UART:
3,182,275 UART: [state] CFI Enabled
3,193,006 UART: [fht] FMC Alias Private Key: 7
3,301,111 UART: [art] Extend RT PCRs Done
3,301,539 UART: [art] Lock RT PCRs Done
3,303,035 UART: [art] Populate DV Done
3,311,334 UART: [fht] FMC Alias Private Key: 7
3,312,362 UART: [art] Derive CDI
3,312,642 UART: [art] Store in in slot 0x4
3,398,241 UART: [art] Derive Key Pair
3,398,601 UART: [art] Store priv key in slot 0x5
3,412,013 UART: [art] Derive Key Pair - Done
3,426,760 UART: [art] Signing Cert with AUTHO
3,427,240 UART: RITY.KEYID = 7
3,442,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,379 UART: [art] PUB.X = 46B0326BD2CB3E6B9C28465623F29A3065EC1D5543E0E905BF3E63B5903A24E98626ECE202DED6BE2EE0DCBA6FC525A6
3,450,157 UART: [art] PUB.Y = 0148DF04108008A05DE08A06517453895C99055D7F5F3FE7511F824251E44D6D4009B4771CF2E7FB55DC403726AA7DF4
3,457,083 UART: [art] SIG.R = 4BAADFFFAB369180319DFF58AAC701F603CA34EA13DEDE1280FFEF8F5ABA98AE7CC53EBE76CE335D512F721AEAC37017
3,463,879 UART: [art] SIG.S = 495C3113303C8A65057DCC9379E9802465F4A83D6772255116FBDABAE08B8BA4C6661A4CCE2D3561ADB8471A3B63C8AC
3,487,719 UART: Caliptra RT
3,488,064 UART: [state] CFI Enabled
3,596,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,204 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 ready_for_fw is high
1,362,790 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,300 >>> mbox cmd response: success
2,942,300 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,003,618 UART:
3,003,634 UART: Running Caliptra FMC ...
3,004,042 UART:
3,004,185 UART: [state] CFI Enabled
3,015,260 UART: [fht] FMC Alias Private Key: 7
3,123,619 UART: [art] Extend RT PCRs Done
3,124,047 UART: [art] Lock RT PCRs Done
3,125,343 UART: [art] Populate DV Done
3,133,582 UART: [fht] FMC Alias Private Key: 7
3,134,696 UART: [art] Derive CDI
3,134,976 UART: [art] Store in in slot 0x4
3,220,505 UART: [art] Derive Key Pair
3,220,865 UART: [art] Store priv key in slot 0x5
3,234,085 UART: [art] Derive Key Pair - Done
3,248,636 UART: [art] Signing Cert with AUTHO
3,249,116 UART: RITY.KEYID = 7
3,264,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,289 UART: [art] PUB.X = BB4531149D8CA69A28329F8FCE89000288F0FBC8291C5EE815AA51F2930A0818A50FE01BB9AA1B629C7F7A36E56EBE2E
3,272,037 UART: [art] PUB.Y = 091CEF61A65B8593A57DF9947DD98277EBE4B4C6B9BA047810E23C74B32C48E59F12EA78AE611444012B91DA9C879DB9
3,278,984 UART: [art] SIG.R = 6B744594D503CBDA4F55C70F6F06BE3A36D50714B8516130F22823AE593872B31448F23F40A572A1C3FF171B92D4FA6A
3,285,742 UART: [art] SIG.S = D834C4F969DFD5D51D3C5AE9320DF7B842046290FF6B3CB8524B5802A1365841AF2177F0615C1B537AF2E9B92D804EC7
3,309,282 UART: Caliptra RT
3,309,627 UART: [state] CFI Enabled
3,417,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,560 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
893,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,771 UART: [kat] ++
897,923 UART: [kat] sha1
902,125 UART: [kat] SHA2-256
904,065 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,474 UART: [kat] LMS
1,171,802 UART: [kat] --
1,172,515 UART: [cold-reset] ++
1,173,049 UART: [fht] FHT @ 0x50003400
1,175,836 UART: [idev] ++
1,176,004 UART: [idev] CDI.KEYID = 6
1,176,364 UART: [idev] SUBJECT.KEYID = 7
1,176,788 UART: [idev] UDS.KEYID = 0
1,177,133 ready_for_fw is high
1,177,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,828 UART: [idev] Erasing UDS.KEYID = 0
1,201,567 UART: [idev] Sha1 KeyId Algorithm
1,210,067 UART: [idev] --
1,211,037 UART: [ldev] ++
1,211,205 UART: [ldev] CDI.KEYID = 6
1,211,568 UART: [ldev] SUBJECT.KEYID = 5
1,211,994 UART: [ldev] AUTHORITY.KEYID = 7
1,212,457 UART: [ldev] FE.KEYID = 1
1,217,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,253 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,564 >>> mbox cmd response: success
2,788,564 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,789,734 UART: [afmc] ++
2,789,902 UART: [afmc] CDI.KEYID = 6
2,790,264 UART: [afmc] SUBJECT.KEYID = 7
2,790,689 UART: [afmc] AUTHORITY.KEYID = 5
2,826,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,717 UART: [afmc] --
2,869,709 UART: [cold-reset] --
2,870,545 UART: [state] Locking Datavault
2,871,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,374 UART: [state] Locking ICCM
2,872,950 UART: [exit] Launching FMC @ 0x40000130
2,878,279 UART:
2,878,295 UART: Running Caliptra FMC ...
2,878,703 UART:
2,878,757 UART: [state] CFI Enabled
2,889,098 UART: [fht] FMC Alias Private Key: 7
2,997,599 UART: [art] Extend RT PCRs Done
2,998,027 UART: [art] Lock RT PCRs Done
2,999,807 UART: [art] Populate DV Done
3,008,152 UART: [fht] FMC Alias Private Key: 7
3,009,136 UART: [art] Derive CDI
3,009,416 UART: [art] Store in in slot 0x4
3,095,129 UART: [art] Derive Key Pair
3,095,489 UART: [art] Store priv key in slot 0x5
3,108,695 UART: [art] Derive Key Pair - Done
3,123,290 UART: [art] Signing Cert with AUTHO
3,123,770 UART: RITY.KEYID = 7
3,138,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,757 UART: [art] PUB.X = 573E709159C00E861FF3AE1E2D95DD0C6E82BED795A3FD17C9F2A892347CD7848EAFEBC125D31CB5167CC605C8EAE495
3,146,534 UART: [art] PUB.Y = FD67EEBA5095A3A2AC8207585B5D1DB6502205BBCEB9ED4B6264C79AEBA1F4DEA44089ED1C83183EDBA364357E2F191D
3,153,498 UART: [art] SIG.R = 2F1C0C8403FA3E676836355716A595C92C53E4BB6FB37AC1A78EC0B5A7741D6C4CEA9D93B8B78DB49DDBE4796C4C5785
3,160,274 UART: [art] SIG.S = B6952B84743100EFED9CE3345837150169606A00FFC42BCADBEFF76DE5C97AC39A54D166DB981B2BC6A65349B7090378
3,184,484 UART: Caliptra RT
3,184,737 UART: [state] CFI Enabled
3,292,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,890 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,737 ready_for_fw is high
1,060,737 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,899 >>> mbox cmd response: success
2,638,899 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,700,043 UART:
2,700,059 UART: Running Caliptra FMC ...
2,700,467 UART:
2,700,521 UART: [state] CFI Enabled
2,710,740 UART: [fht] FMC Alias Private Key: 7
2,819,077 UART: [art] Extend RT PCRs Done
2,819,505 UART: [art] Lock RT PCRs Done
2,821,129 UART: [art] Populate DV Done
2,829,382 UART: [fht] FMC Alias Private Key: 7
2,830,422 UART: [art] Derive CDI
2,830,702 UART: [art] Store in in slot 0x4
2,916,205 UART: [art] Derive Key Pair
2,916,565 UART: [art] Store priv key in slot 0x5
2,929,069 UART: [art] Derive Key Pair - Done
2,943,847 UART: [art] Signing Cert with AUTHO
2,944,327 UART: RITY.KEYID = 7
2,959,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,236 UART: [art] PUB.X = B1D85F4A9842412F659012F8A6AD6FA98509A77AB478BAD5259E4CA0BF6B9BDDDD28F38D4C4FD5EC518FDD186896F36E
2,967,021 UART: [art] PUB.Y = 26CB99CE0394CED9DBA4A20FE751227ECDEC1B50E9BECCC2F0D3CC1B44D409E4D321C1595BDCA1F6CA9F7DF676BD43A7
2,973,994 UART: [art] SIG.R = 0A826DEE96981EC32B11826CFCF488849244C8788B89A380BC41EED66617359EEDFB3692F0FAB1027CBBDD90050960B5
2,980,758 UART: [art] SIG.S = FDB861E1BD684FF30E91AA35C62DC17905F2D8C8F2CE23A6E700E5FFB5B6CABFE557CF7ACBF9EAA040C731AA8F3CC377
3,005,059 UART: Caliptra RT
3,005,312 UART: [state] CFI Enabled
3,113,343 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,781 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,777 UART: [kat] SHA2-512-ACC
908,678 UART: [kat] ECC-384
918,133 UART: [kat] HMAC-384Kdf
922,813 UART: [kat] LMS
1,171,141 UART: [kat] --
1,172,162 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,197 UART: [idev] ++
1,175,365 UART: [idev] CDI.KEYID = 6
1,175,725 UART: [idev] SUBJECT.KEYID = 7
1,176,149 UART: [idev] UDS.KEYID = 0
1,176,494 ready_for_fw is high
1,176,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,201,212 UART: [idev] Sha1 KeyId Algorithm
1,209,856 UART: [idev] --
1,210,938 UART: [ldev] ++
1,211,106 UART: [ldev] CDI.KEYID = 6
1,211,469 UART: [ldev] SUBJECT.KEYID = 5
1,211,895 UART: [ldev] AUTHORITY.KEYID = 7
1,212,358 UART: [ldev] FE.KEYID = 1
1,217,318 UART: [ldev] Erasing FE.KEYID = 1
1,243,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,900 UART: [ldev] --
1,283,367 UART: [fwproc] Wait for Commands...
1,284,027 UART: [fwproc] Recv command 0x46574c44
1,284,755 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,678 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,841 >>> mbox cmd response: success
2,787,841 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,788,903 UART: [afmc] ++
2,789,071 UART: [afmc] CDI.KEYID = 6
2,789,433 UART: [afmc] SUBJECT.KEYID = 7
2,789,858 UART: [afmc] AUTHORITY.KEYID = 5
2,825,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,243 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,902 UART: [afmc] --
2,868,862 UART: [cold-reset] --
2,869,982 UART: [state] Locking Datavault
2,871,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,825 UART: [state] Locking ICCM
2,872,495 UART: [exit] Launching FMC @ 0x40000130
2,877,824 UART:
2,877,840 UART: Running Caliptra FMC ...
2,878,248 UART:
2,878,391 UART: [state] CFI Enabled
2,889,340 UART: [fht] FMC Alias Private Key: 7
2,997,613 UART: [art] Extend RT PCRs Done
2,998,041 UART: [art] Lock RT PCRs Done
2,999,553 UART: [art] Populate DV Done
3,007,626 UART: [fht] FMC Alias Private Key: 7
3,008,562 UART: [art] Derive CDI
3,008,842 UART: [art] Store in in slot 0x4
3,094,499 UART: [art] Derive Key Pair
3,094,859 UART: [art] Store priv key in slot 0x5
3,107,907 UART: [art] Derive Key Pair - Done
3,122,343 UART: [art] Signing Cert with AUTHO
3,122,823 UART: RITY.KEYID = 7
3,138,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,150 UART: [art] PUB.X = 36674B5C0900D8C646580315CB77B47BE5B5C4C6C29DBC9D454B94D8561F52FFCF646DBDC3E191A93FEF2363FB0C435B
3,145,901 UART: [art] PUB.Y = B622F6621AF674F60BCABFA37050A8D1A6A413D7673FA74DC4D75B6B6CB9DF621EB4E4C0282F66DEAF55DA3AFF7E3239
3,152,870 UART: [art] SIG.R = A15FA6AEC145290A86B808B5A1B489D54924097797EFB2D677B0AB24D8C68015F8440BB527481F5654952046329846AB
3,159,620 UART: [art] SIG.S = 557A8898B1E15DF41CBD666E658E9C2A14CF98CDC1C9ACB2C87BCDD60EF0BF581687AD12DC3FA7B3C79BB093217B5971
3,182,796 UART: Caliptra RT
3,183,141 UART: [state] CFI Enabled
3,291,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,732 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,230 ready_for_fw is high
1,061,230 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,182 >>> mbox cmd response: success
2,641,182 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,703,384 UART:
2,703,400 UART: Running Caliptra FMC ...
2,703,808 UART:
2,703,951 UART: [state] CFI Enabled
2,713,932 UART: [fht] FMC Alias Private Key: 7
2,822,249 UART: [art] Extend RT PCRs Done
2,822,677 UART: [art] Lock RT PCRs Done
2,824,325 UART: [art] Populate DV Done
2,832,666 UART: [fht] FMC Alias Private Key: 7
2,833,652 UART: [art] Derive CDI
2,833,932 UART: [art] Store in in slot 0x4
2,919,735 UART: [art] Derive Key Pair
2,920,095 UART: [art] Store priv key in slot 0x5
2,932,931 UART: [art] Derive Key Pair - Done
2,947,771 UART: [art] Signing Cert with AUTHO
2,948,251 UART: RITY.KEYID = 7
2,963,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,678 UART: [art] PUB.X = 30D7526A860CB361D6F617EAC4F8A19DBA5213B892A7CB6C38C46FB8AC56DEED9035654156778CC919C56B7E76796ABF
2,971,455 UART: [art] PUB.Y = 55C77DB8FF119E63D2D2A6A0506B0C20F63B33A1F900060FA378AC59DF602B721D6FE4FC812C9C8441959F2BCD16681F
2,978,382 UART: [art] SIG.R = C0F6B91A3B8D1136C56EC59B29D764A98E0963A6046E85B55C4A2DB30C0C83B5BF9E389323321706DAE583ED499B76B7
2,985,141 UART: [art] SIG.S = 71434879108C9D82C3FA00A26FE5A28C2E4D8F3A1407B61D328777B8CCAAF2E455A0A81A89F76E296935AB1A2034F312
3,008,929 UART: Caliptra RT
3,009,274 UART: [state] CFI Enabled
3,117,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,853 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 ready_for_fw is high
1,174,223 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,450 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,485 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,794 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,040 >>> mbox cmd response: success
2,784,040 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,785,211 UART: [afmc] ++
2,785,379 UART: [afmc] CDI.KEYID = 6
2,785,742 UART: [afmc] SUBJECT.KEYID = 7
2,786,168 UART: [afmc] AUTHORITY.KEYID = 5
2,821,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,470 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,582 UART: [afmc] --
2,864,498 UART: [cold-reset] --
2,865,484 UART: [state] Locking Datavault
2,866,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,193 UART: [state] Locking ICCM
2,867,851 UART: [exit] Launching FMC @ 0x40000130
2,873,180 UART:
2,873,196 UART: Running Caliptra FMC ...
2,873,604 UART:
2,873,658 UART: [state] CFI Enabled
2,884,053 UART: [fht] FMC Alias Private Key: 7
2,992,472 UART: [art] Extend RT PCRs Done
2,992,900 UART: [art] Lock RT PCRs Done
2,994,614 UART: [art] Populate DV Done
3,002,735 UART: [fht] FMC Alias Private Key: 7
3,003,875 UART: [art] Derive CDI
3,004,155 UART: [art] Store in in slot 0x4
3,089,886 UART: [art] Derive Key Pair
3,090,246 UART: [art] Store priv key in slot 0x5
3,103,778 UART: [art] Derive Key Pair - Done
3,118,429 UART: [art] Signing Cert with AUTHO
3,118,909 UART: RITY.KEYID = 7
3,133,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,690 UART: [art] PUB.X = 6A18C98856623927E4D1C3BEF1751928F1F57A9BA368BD35D469B53782EB68B7A00C0E2EEBD840260941FAEB5339E12C
3,141,455 UART: [art] PUB.Y = 3C03CD304AAF6930F483CAF1F45DA665069D4ADDBDE51F96D80B26549E79BF5ED7FD65DE742E82D58E0ABEB5DE31670F
3,148,412 UART: [art] SIG.R = CBF322FC2397DF784D662DBCF73DEBC4BFB651CA7DCE7F6A36774D50DB393056DC26DA4A415ACE552CEB647DD762C138
3,155,206 UART: [art] SIG.S = 1275C9DAE4406FD5A567FED5AADFF6633D960E2506869B3E09A42B63722A778F3AF2E35CF2A6A465638AFC664C1CA577
3,179,542 UART: Caliptra RT
3,179,795 UART: [state] CFI Enabled
3,287,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,610 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,018 ready_for_fw is high
1,056,018 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,236 >>> mbox cmd response: success
2,635,236 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,697,978 UART:
2,697,994 UART: Running Caliptra FMC ...
2,698,402 UART:
2,698,456 UART: [state] CFI Enabled
2,709,255 UART: [fht] FMC Alias Private Key: 7
2,817,040 UART: [art] Extend RT PCRs Done
2,817,468 UART: [art] Lock RT PCRs Done
2,818,930 UART: [art] Populate DV Done
2,827,225 UART: [fht] FMC Alias Private Key: 7
2,828,205 UART: [art] Derive CDI
2,828,485 UART: [art] Store in in slot 0x4
2,913,848 UART: [art] Derive Key Pair
2,914,208 UART: [art] Store priv key in slot 0x5
2,927,642 UART: [art] Derive Key Pair - Done
2,942,168 UART: [art] Signing Cert with AUTHO
2,942,648 UART: RITY.KEYID = 7
2,958,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,805 UART: [art] PUB.X = BC52C6073A4EAF9B0279F909F1F7ACE1FA5CD016877C668924357C1D055F6FE0AA6EFFCED6E603C357B92FBE3E76DD19
2,965,580 UART: [art] PUB.Y = 3CE2E303775D47F1C40B8CCB17757DF06E135D62C280B130AD6B8653E0CB4611BEDF9A78D1D51EED7CD74BA0D0A0892A
2,972,540 UART: [art] SIG.R = D9158C986B3486DAD60C962647BB926609C097D2F7A54987FA8B0C7485B2C3222E5B2D17E8D2F78E1B88BF6197D69397
2,979,299 UART: [art] SIG.S = F405122EF02B70B9BC94CCBE38804ABB5A8D129CD303B455F4753BE49E19D4C64D5A4554D95EB70BFD2F570A975BB49C
3,003,424 UART: Caliptra RT
3,003,677 UART: [state] CFI Enabled
3,111,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,147 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,174,638 ready_for_fw is high
1,174,638 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,014 UART: [idev] Erasing UDS.KEYID = 0
1,198,662 UART: [idev] Sha1 KeyId Algorithm
1,207,474 UART: [idev] --
1,208,393 UART: [ldev] ++
1,208,561 UART: [ldev] CDI.KEYID = 6
1,208,925 UART: [ldev] SUBJECT.KEYID = 5
1,209,352 UART: [ldev] AUTHORITY.KEYID = 7
1,209,815 UART: [ldev] FE.KEYID = 1
1,215,087 UART: [ldev] Erasing FE.KEYID = 1
1,241,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,081 UART: [ldev] --
1,280,571 UART: [fwproc] Wait for Commands...
1,281,208 UART: [fwproc] Recv command 0x46574c44
1,281,941 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,443 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,777 >>> mbox cmd response: success
2,785,777 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,922 UART: [afmc] ++
2,787,090 UART: [afmc] CDI.KEYID = 6
2,787,453 UART: [afmc] SUBJECT.KEYID = 7
2,787,879 UART: [afmc] AUTHORITY.KEYID = 5
2,823,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,819 UART: [afmc] --
2,866,827 UART: [cold-reset] --
2,867,491 UART: [state] Locking Datavault
2,868,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,122 UART: [state] Locking ICCM
2,869,580 UART: [exit] Launching FMC @ 0x40000130
2,874,909 UART:
2,874,925 UART: Running Caliptra FMC ...
2,875,333 UART:
2,875,476 UART: [state] CFI Enabled
2,886,059 UART: [fht] FMC Alias Private Key: 7
2,994,548 UART: [art] Extend RT PCRs Done
2,994,976 UART: [art] Lock RT PCRs Done
2,996,798 UART: [art] Populate DV Done
3,004,965 UART: [fht] FMC Alias Private Key: 7
3,006,023 UART: [art] Derive CDI
3,006,303 UART: [art] Store in in slot 0x4
3,092,206 UART: [art] Derive Key Pair
3,092,566 UART: [art] Store priv key in slot 0x5
3,105,550 UART: [art] Derive Key Pair - Done
3,120,349 UART: [art] Signing Cert with AUTHO
3,120,829 UART: RITY.KEYID = 7
3,136,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,080 UART: [art] PUB.X = 7ECEDE1E5882FD2C29093E9882D464C231803891CF4B060F9523A93E17A408FCF31E5553BA09EEE874DB5EBD41B07363
3,143,841 UART: [art] PUB.Y = 175676EE8410DBA9CD74816B8F3C8E187D157B629740E2781D8C86A201036C0DADF7D8F64A42957DC9C832AEAB7B978A
3,150,788 UART: [art] SIG.R = 2AD1EB43199D8A5936496EF815D531FB257F2718C8625D264A0560E476D6DF5FC67B4273D4E79C813BF819133F8894E6
3,157,551 UART: [art] SIG.S = 51F50F7E714C2790E97BFAFE1C31EA9FD3AD79863BF62B1B83343C60976A56D18FEA684106C8B71F54CCAED37277A1F2
3,181,428 UART: Caliptra RT
3,181,773 UART: [state] CFI Enabled
3,290,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,704 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,223 ready_for_fw is high
1,056,223 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,147 >>> mbox cmd response: success
2,635,147 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,153 UART:
2,698,169 UART: Running Caliptra FMC ...
2,698,577 UART:
2,698,720 UART: [state] CFI Enabled
2,709,441 UART: [fht] FMC Alias Private Key: 7
2,817,614 UART: [art] Extend RT PCRs Done
2,818,042 UART: [art] Lock RT PCRs Done
2,819,372 UART: [art] Populate DV Done
2,827,627 UART: [fht] FMC Alias Private Key: 7
2,828,727 UART: [art] Derive CDI
2,829,007 UART: [art] Store in in slot 0x4
2,914,770 UART: [art] Derive Key Pair
2,915,130 UART: [art] Store priv key in slot 0x5
2,928,604 UART: [art] Derive Key Pair - Done
2,943,206 UART: [art] Signing Cert with AUTHO
2,943,686 UART: RITY.KEYID = 7
2,959,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,879 UART: [art] PUB.X = 8FD948E057E3A6770ADE5206D1F3D0C7F93EEF80B7371DE7CFC23470271F567BEF0A386B555B75C3BAD5CF7A18ED0784
2,966,651 UART: [art] PUB.Y = 0AE921A8F688A7DF11B1B854EEE4CEC70B70AB5DBB76BDCD6FB87300C94417587380408D2ACBF7918345B91CBCCADC92
2,973,593 UART: [art] SIG.R = E539FA071BF45CEDFD951780E83F037077A1BF03665CA5AEFE7173B7B7EB7E4AEB4CAC3CE33D06408BC9AAE7C03CE779
2,980,375 UART: [art] SIG.S = 7972025A638DC1200A154ABDBC64FFA8E6F2E6B5018600D92CB5D7F810E22AE4437BA7A642AED080E5E1D7A36F9E12B9
3,003,709 UART: Caliptra RT
3,004,054 UART: [state] CFI Enabled
3,111,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,319 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,096 UART:
192,452 UART: Running Caliptra ROM ...
193,632 UART:
193,784 UART: [state] CFI Enabled
267,786 UART: [state] LifecycleState = Unprovisioned
269,777 UART: [state] DebugLocked = No
272,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,722 UART: [kat] SHA2-256
447,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,927 UART: [kat] ++
458,367 UART: [kat] sha1
470,799 UART: [kat] SHA2-256
473,474 UART: [kat] SHA2-384
479,182 UART: [kat] SHA2-512-ACC
481,557 UART: [kat] ECC-384
2,766,901 UART: [kat] HMAC-384Kdf
2,800,971 UART: [kat] LMS
3,991,319 UART: [kat] --
3,994,823 UART: [cold-reset] ++
3,996,353 UART: [fht] Storing FHT @ 0x50003400
4,007,913 UART: [idev] ++
4,008,478 UART: [idev] CDI.KEYID = 6
4,009,359 UART: [idev] SUBJECT.KEYID = 7
4,010,674 UART: [idev] UDS.KEYID = 0
4,011,640 ready_for_fw is high
4,011,832 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,033,561 UART: [idev] Erasing UDS.KEYID = 0
7,345,238 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,099 UART: [idev] --
7,370,661 UART: [ldev] ++
7,371,237 UART: [ldev] CDI.KEYID = 6
7,372,204 UART: [ldev] SUBJECT.KEYID = 5
7,373,416 UART: [ldev] AUTHORITY.KEYID = 7
7,374,643 UART: [ldev] FE.KEYID = 1
7,402,409 UART: [ldev] Erasing FE.KEYID = 1
10,737,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,705 UART: [ldev] --
13,115,869 UART: [fwproc] Waiting for Commands...
13,118,622 UART: [fwproc] Received command 0x46574c44
13,120,815 UART: [fwproc] Received Image of size 7036 bytes
15,868,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,942,127 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,945,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
15,953,629 >>> mbox cmd response: success
15,957,849 UART: [afmc] ++
15,958,423 UART: [afmc] CDI.KEYID = 6
15,959,333 UART: [afmc] SUBJECT.KEYID = 7
15,960,599 UART: [afmc] AUTHORITY.KEYID = 5
19,321,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,620,259 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,622,512 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,637,000 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,651,863 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,666,227 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,687,637 UART: [afmc] --
21,692,211 UART: [cold-reset] --
21,695,817 UART: [state] Locking Datavault
21,702,250 UART: [state] Locking PCR0, PCR1 and PCR31
21,704,000 UART: [state] Locking ICCM
21,706,690 UART: [exit] Launching FMC @ 0x40000000
21,715,078 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,720,347 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,805,679 ready_for_fw is high
3,806,264 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,698,711 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,468 UART:
192,832 UART: Running Caliptra ROM ...
194,018 UART:
603,603 UART: [state] CFI Enabled
621,595 UART: [state] LifecycleState = Unprovisioned
623,469 UART: [state] DebugLocked = No
625,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,228 UART: [kat] SHA2-256
799,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,525 UART: [kat] ++
810,069 UART: [kat] sha1
820,896 UART: [kat] SHA2-256
823,619 UART: [kat] SHA2-384
828,045 UART: [kat] SHA2-512-ACC
830,412 UART: [kat] ECC-384
3,113,738 UART: [kat] HMAC-384Kdf
3,124,564 UART: [kat] LMS
4,314,637 UART: [kat] --
4,318,812 UART: [cold-reset] ++
4,320,352 UART: [fht] Storing FHT @ 0x50003400
4,332,402 UART: [idev] ++
4,332,969 UART: [idev] CDI.KEYID = 6
4,333,880 UART: [idev] SUBJECT.KEYID = 7
4,335,127 UART: [idev] UDS.KEYID = 0
4,336,211 ready_for_fw is high
4,336,436 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,353,523 UART: [idev] Erasing UDS.KEYID = 0
7,623,466 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,415 UART: [idev] --
7,648,670 UART: [ldev] ++
7,649,241 UART: [ldev] CDI.KEYID = 6
7,650,217 UART: [ldev] SUBJECT.KEYID = 5
7,651,425 UART: [ldev] AUTHORITY.KEYID = 7
7,652,652 UART: [ldev] FE.KEYID = 1
7,664,483 UART: [ldev] Erasing FE.KEYID = 1
10,953,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,611 UART: [ldev] --
13,313,498 UART: [fwproc] Waiting for Commands...
13,315,533 UART: [fwproc] Received command 0x46574c44
13,317,782 UART: [fwproc] Received Image of size 7036 bytes
16,064,072 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,136,649 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,139,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
16,146,924 >>> mbox cmd response: success
16,150,789 UART: [afmc] ++
16,151,360 UART: [afmc] CDI.KEYID = 6
16,152,303 UART: [afmc] SUBJECT.KEYID = 7
16,153,513 UART: [afmc] AUTHORITY.KEYID = 5
19,467,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,764,344 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,766,591 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,781,056 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,795,937 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,810,277 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,832,064 UART: [afmc] --
21,836,216 UART: [cold-reset] --
21,839,967 UART: [state] Locking Datavault
21,845,803 UART: [state] Locking PCR0, PCR1 and PCR31
21,847,575 UART: [state] Locking ICCM
21,850,270 UART: [exit] Launching FMC @ 0x40000000
21,858,722 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,864,044 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,125,897 ready_for_fw is high
4,126,363 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,892,489 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,100 UART:
192,445 UART: Running Caliptra ROM ...
193,628 UART:
193,788 UART: [state] CFI Enabled
263,629 UART: [state] LifecycleState = Unprovisioned
265,548 UART: [state] DebugLocked = No
267,365 UART: [state] WD Timer not started. Device not locked for debugging
271,069 UART: [kat] SHA2-256
450,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,784 UART: [kat] ++
462,313 UART: [kat] sha1
472,699 UART: [kat] SHA2-256
475,701 UART: [kat] SHA2-384
481,333 UART: [kat] SHA2-512-ACC
484,274 UART: [kat] ECC-384
2,949,027 UART: [kat] HMAC-384Kdf
2,972,470 UART: [kat] LMS
3,501,928 UART: [kat] --
3,508,163 UART: [cold-reset] ++
3,509,957 UART: [fht] FHT @ 0x50003400
3,521,928 UART: [idev] ++
3,522,500 UART: [idev] CDI.KEYID = 6
3,523,505 UART: [idev] SUBJECT.KEYID = 7
3,524,642 UART: [idev] UDS.KEYID = 0
3,525,567 ready_for_fw is high
3,525,781 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,544,138 UART: [idev] Erasing UDS.KEYID = 0
6,025,191 UART: [idev] Sha1 KeyId Algorithm
6,047,717 UART: [idev] --
6,050,525 UART: [ldev] ++
6,051,099 UART: [ldev] CDI.KEYID = 6
6,052,019 UART: [ldev] SUBJECT.KEYID = 5
6,053,185 UART: [ldev] AUTHORITY.KEYID = 7
6,054,521 UART: [ldev] FE.KEYID = 1
6,099,444 UART: [ldev] Erasing FE.KEYID = 1
8,601,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,076 UART: [ldev] --
10,392,587 UART: [fwproc] Wait for Commands...
10,395,165 UART: [fwproc] Recv command 0x46574c44
10,397,219 UART: [fwproc] Recv'd Img size: 7036 bytes
12,491,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,562,266 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,565,315 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,573,470 >>> mbox cmd response: success
12,576,944 UART: [afmc] ++
12,577,526 UART: [afmc] CDI.KEYID = 6
12,578,437 UART: [afmc] SUBJECT.KEYID = 7
12,579,603 UART: [afmc] AUTHORITY.KEYID = 5
15,119,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,847,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,849,328 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,865,281 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,881,155 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,897,031 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,920,290 UART: [afmc] --
16,923,840 UART: [cold-reset] --
16,926,511 UART: [state] Locking Datavault
16,930,891 UART: [state] Locking PCR0, PCR1 and PCR31
16,932,590 UART: [state] Locking ICCM
16,933,931 UART: [exit] Launching FMC @ 0x40000000
16,942,380 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,947,753 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,383,222 ready_for_fw is high
3,383,639 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,367,882 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,460 UART:
192,802 UART: Running Caliptra ROM ...
193,978 UART:
603,698 UART: [state] CFI Enabled
618,998 UART: [state] LifecycleState = Unprovisioned
620,809 UART: [state] DebugLocked = No
622,269 UART: [state] WD Timer not started. Device not locked for debugging
626,241 UART: [kat] SHA2-256
805,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,950 UART: [kat] ++
817,494 UART: [kat] sha1
828,943 UART: [kat] SHA2-256
831,954 UART: [kat] SHA2-384
838,519 UART: [kat] SHA2-512-ACC
841,458 UART: [kat] ECC-384
3,283,290 UART: [kat] HMAC-384Kdf
3,295,297 UART: [kat] LMS
3,824,755 UART: [kat] --
3,829,052 UART: [cold-reset] ++
3,830,362 UART: [fht] FHT @ 0x50003400
3,840,512 UART: [idev] ++
3,841,114 UART: [idev] CDI.KEYID = 6
3,842,186 UART: [idev] SUBJECT.KEYID = 7
3,843,296 UART: [idev] UDS.KEYID = 0
3,844,224 ready_for_fw is high
3,844,435 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,859,149 UART: [idev] Erasing UDS.KEYID = 0
6,317,300 UART: [idev] Sha1 KeyId Algorithm
6,339,577 UART: [idev] --
6,342,383 UART: [ldev] ++
6,342,955 UART: [ldev] CDI.KEYID = 6
6,343,846 UART: [ldev] SUBJECT.KEYID = 5
6,344,974 UART: [ldev] AUTHORITY.KEYID = 7
6,346,254 UART: [ldev] FE.KEYID = 1
6,359,572 UART: [ldev] Erasing FE.KEYID = 1
8,833,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,836 UART: [ldev] --
10,618,933 UART: [fwproc] Wait for Commands...
10,622,113 UART: [fwproc] Recv command 0x46574c44
10,624,210 UART: [fwproc] Recv'd Img size: 7036 bytes
12,720,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,794,234 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,797,251 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,805,685 >>> mbox cmd response: success
12,810,277 UART: [afmc] ++
12,810,854 UART: [afmc] CDI.KEYID = 6
12,811,739 UART: [afmc] SUBJECT.KEYID = 7
12,812,954 UART: [afmc] AUTHORITY.KEYID = 5
15,312,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,031,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,033,170 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,049,104 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,064,987 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,080,810 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,103,986 UART: [afmc] --
17,108,126 UART: [cold-reset] --
17,111,932 UART: [state] Locking Datavault
17,117,512 UART: [state] Locking PCR0, PCR1 and PCR31
17,119,196 UART: [state] Locking ICCM
17,121,468 UART: [exit] Launching FMC @ 0x40000000
17,129,934 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,135,308 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,692,977 ready_for_fw is high
3,693,438 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,566,617 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,958 UART:
192,335 UART: Running Caliptra ROM ...
193,431 UART:
193,578 UART: [state] CFI Enabled
262,105 UART: [state] LifecycleState = Unprovisioned
264,148 UART: [state] DebugLocked = No
265,608 UART: [state] WD Timer not started. Device not locked for debugging
269,353 UART: [kat] SHA2-256
458,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,789 UART: [kat] ++
470,267 UART: [kat] sha1
482,561 UART: [kat] SHA2-256
485,577 UART: [kat] SHA2-384
492,420 UART: [kat] SHA2-512-ACC
495,001 UART: [kat] ECC-384
2,949,016 UART: [kat] HMAC-384Kdf
2,974,328 UART: [kat] LMS
3,506,070 UART: [kat] --
3,510,921 UART: [cold-reset] ++
3,512,420 UART: [fht] FHT @ 0x50003400
3,523,700 UART: [idev] ++
3,524,414 UART: [idev] CDI.KEYID = 6
3,525,340 UART: [idev] SUBJECT.KEYID = 7
3,526,587 UART: [idev] UDS.KEYID = 0
3,527,669 ready_for_fw is high
3,527,888 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,545,291 UART: [idev] Erasing UDS.KEYID = 0
6,029,284 UART: [idev] Sha1 KeyId Algorithm
6,050,616 UART: [idev] --
6,055,286 UART: [ldev] ++
6,055,978 UART: [ldev] CDI.KEYID = 6
6,056,894 UART: [ldev] SUBJECT.KEYID = 5
6,058,052 UART: [ldev] AUTHORITY.KEYID = 7
6,059,295 UART: [ldev] FE.KEYID = 1
6,101,717 UART: [ldev] Erasing FE.KEYID = 1
8,605,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,633 UART: [ldev] --
10,414,248 UART: [fwproc] Wait for Commands...
10,415,904 UART: [fwproc] Recv command 0x46574c44
10,418,213 UART: [fwproc] Recv'd Img size: 7036 bytes
12,543,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,628,506 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,632,075 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,643,152 >>> mbox cmd response: success
12,647,403 UART: [afmc] ++
12,647,975 UART: [afmc] CDI.KEYID = 6
12,649,208 UART: [afmc] SUBJECT.KEYID = 7
12,650,693 UART: [afmc] AUTHORITY.KEYID = 5
15,187,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,912,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,914,648 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,929,727 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,944,900 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,959,936 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,982,862 UART: [afmc] --
16,986,887 UART: [cold-reset] --
16,991,887 UART: [state] Locking Datavault
16,997,458 UART: [state] Locking PCR0, PCR1 and PCR31
16,999,597 UART: [state] Locking ICCM
17,001,474 UART: [exit] Launching FMC @ 0x40000000
17,010,138 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,016,188 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,439,236 ready_for_fw is high
3,439,623 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,449,740 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,537 UART:
192,907 UART: Running Caliptra ROM ...
194,091 UART:
603,616 UART: [state] CFI Enabled
617,061 UART: [state] LifecycleState = Unprovisioned
619,457 UART: [state] DebugLocked = No
622,059 UART: [state] WD Timer not started. Device not locked for debugging
626,532 UART: [kat] SHA2-256
816,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,233 UART: [kat] ++
827,754 UART: [kat] sha1
839,414 UART: [kat] SHA2-256
842,495 UART: [kat] SHA2-384
849,216 UART: [kat] SHA2-512-ACC
851,836 UART: [kat] ECC-384
3,292,911 UART: [kat] HMAC-384Kdf
3,306,769 UART: [kat] LMS
3,838,546 UART: [kat] --
3,845,516 UART: [cold-reset] ++
3,846,951 UART: [fht] FHT @ 0x50003400
3,858,575 UART: [idev] ++
3,859,282 UART: [idev] CDI.KEYID = 6
3,860,208 UART: [idev] SUBJECT.KEYID = 7
3,861,458 UART: [idev] UDS.KEYID = 0
3,862,383 ready_for_fw is high
3,862,614 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,879,580 UART: [idev] Erasing UDS.KEYID = 0
6,338,849 UART: [idev] Sha1 KeyId Algorithm
6,362,734 UART: [idev] --
6,368,023 UART: [ldev] ++
6,368,844 UART: [ldev] CDI.KEYID = 6
6,369,763 UART: [ldev] SUBJECT.KEYID = 5
6,370,970 UART: [ldev] AUTHORITY.KEYID = 7
6,372,152 UART: [ldev] FE.KEYID = 1
6,383,176 UART: [ldev] Erasing FE.KEYID = 1
8,858,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,787 UART: [ldev] --
10,647,424 UART: [fwproc] Wait for Commands...
10,649,033 UART: [fwproc] Recv command 0x46574c44
10,651,346 UART: [fwproc] Recv'd Img size: 7036 bytes
12,772,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,853,462 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,857,021 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,867,992 >>> mbox cmd response: success
12,871,820 UART: [afmc] ++
12,872,402 UART: [afmc] CDI.KEYID = 6
12,873,647 UART: [afmc] SUBJECT.KEYID = 7
12,875,087 UART: [afmc] AUTHORITY.KEYID = 5
15,384,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,104,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,106,597 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,121,660 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,136,814 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,151,934 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,176,415 UART: [afmc] --
17,179,342 UART: [cold-reset] --
17,183,812 UART: [state] Locking Datavault
17,190,258 UART: [state] Locking PCR0, PCR1 and PCR31
17,192,453 UART: [state] Locking ICCM
17,195,144 UART: [exit] Launching FMC @ 0x40000000
17,203,817 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,209,908 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,756,099 ready_for_fw is high
3,756,767 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,656,074 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,425 UART: [kat] SHA2-256
892,363 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,206 UART: [kat] LMS
1,475,402 UART: [kat] --
1,476,663 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,479,872 UART: [idev] ++
1,480,040 UART: [idev] CDI.KEYID = 6
1,480,400 UART: [idev] SUBJECT.KEYID = 7
1,480,824 UART: [idev] UDS.KEYID = 0
1,481,169 ready_for_fw is high
1,481,169 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,706 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,980 UART: [idev] --
1,514,861 UART: [ldev] ++
1,515,029 UART: [ldev] CDI.KEYID = 6
1,515,392 UART: [ldev] SUBJECT.KEYID = 5
1,515,818 UART: [ldev] AUTHORITY.KEYID = 7
1,516,281 UART: [ldev] FE.KEYID = 1
1,521,701 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,187 UART: [fwproc] Waiting for Commands...
1,586,892 UART: [fwproc] Received command 0x46574c44
1,587,683 UART: [fwproc] Received Image of size 7036 bytes
1,654,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,682,084 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,683,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,686,199 >>> mbox cmd response: success
1,687,377 UART: [afmc] ++
1,687,545 UART: [afmc] CDI.KEYID = 6
1,687,907 UART: [afmc] SUBJECT.KEYID = 7
1,688,332 UART: [afmc] AUTHORITY.KEYID = 5
1,723,444 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,740,282 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,062 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,746,783 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,752,678 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,758,390 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,281 UART: [afmc] --
1,767,275 UART: [cold-reset] --
1,768,221 UART: [state] Locking Datavault
1,769,502 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,106 UART: [state] Locking ICCM
1,770,578 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,775,873 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,777,756 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,707 ready_for_fw is high
1,362,707 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,537,419 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,964 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,175 UART: [idev] ++
1,480,343 UART: [idev] CDI.KEYID = 6
1,480,703 UART: [idev] SUBJECT.KEYID = 7
1,481,127 UART: [idev] UDS.KEYID = 0
1,481,472 ready_for_fw is high
1,481,472 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,375 UART: [idev] Erasing UDS.KEYID = 0
1,505,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,463 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,332 UART: [ldev] Erasing FE.KEYID = 1
1,547,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,195 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,255 UART: [fwproc] Received command 0x46574c44
1,588,046 UART: [fwproc] Received Image of size 7036 bytes
1,655,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,682,953 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,072 >>> mbox cmd response: success
1,688,100 UART: [afmc] ++
1,688,268 UART: [afmc] CDI.KEYID = 6
1,688,630 UART: [afmc] SUBJECT.KEYID = 7
1,689,055 UART: [afmc] AUTHORITY.KEYID = 5
1,723,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,740,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,077 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,746,798 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,752,693 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,758,405 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,154 UART: [afmc] --
1,767,204 UART: [cold-reset] --
1,768,148 UART: [state] Locking Datavault
1,769,147 UART: [state] Locking PCR0, PCR1 and PCR31
1,769,751 UART: [state] Locking ICCM
1,770,227 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,775,522 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,777,405 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,539,408 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,406 UART: [kat] SHA2-512-ACC
908,307 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,741 UART: [cold-reset] ++
1,172,159 UART: [fht] FHT @ 0x50003400
1,174,914 UART: [idev] ++
1,175,082 UART: [idev] CDI.KEYID = 6
1,175,442 UART: [idev] SUBJECT.KEYID = 7
1,175,866 UART: [idev] UDS.KEYID = 0
1,176,211 ready_for_fw is high
1,176,211 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,529 UART: [idev] Sha1 KeyId Algorithm
1,209,137 UART: [idev] --
1,210,143 UART: [ldev] ++
1,210,311 UART: [ldev] CDI.KEYID = 6
1,210,674 UART: [ldev] SUBJECT.KEYID = 5
1,211,100 UART: [ldev] AUTHORITY.KEYID = 7
1,211,563 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,639 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,308 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,689 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,805 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,706 >>> mbox cmd response: success
1,383,906 UART: [afmc] ++
1,384,074 UART: [afmc] CDI.KEYID = 6
1,384,436 UART: [afmc] SUBJECT.KEYID = 7
1,384,861 UART: [afmc] AUTHORITY.KEYID = 5
1,420,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,436,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,740 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,461 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,356 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,048 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,946 UART: [afmc] --
1,464,010 UART: [cold-reset] --
1,465,048 UART: [state] Locking Datavault
1,466,435 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,039 UART: [state] Locking ICCM
1,467,497 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,792 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,675 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 ready_for_fw is high
1,060,505 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,537 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,533 UART: [kat] HMAC-384Kdf
923,297 UART: [kat] LMS
1,171,625 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,667 UART: [idev] ++
1,175,835 UART: [idev] CDI.KEYID = 6
1,176,195 UART: [idev] SUBJECT.KEYID = 7
1,176,619 UART: [idev] UDS.KEYID = 0
1,176,964 ready_for_fw is high
1,176,964 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,535 UART: [idev] Erasing UDS.KEYID = 0
1,201,442 UART: [idev] Sha1 KeyId Algorithm
1,209,894 UART: [idev] --
1,210,862 UART: [ldev] ++
1,211,030 UART: [ldev] CDI.KEYID = 6
1,211,393 UART: [ldev] SUBJECT.KEYID = 5
1,211,819 UART: [ldev] AUTHORITY.KEYID = 7
1,212,282 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,244,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,374 UART: [ldev] --
1,283,639 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 7036 bytes
1,353,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,380,814 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,381,930 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,384,831 >>> mbox cmd response: success
1,385,867 UART: [afmc] ++
1,386,035 UART: [afmc] CDI.KEYID = 6
1,386,397 UART: [afmc] SUBJECT.KEYID = 7
1,386,822 UART: [afmc] AUTHORITY.KEYID = 5
1,422,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,438,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,439,637 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,445,358 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,451,253 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,456,945 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,464,753 UART: [afmc] --
1,465,661 UART: [cold-reset] --
1,466,413 UART: [state] Locking Datavault
1,467,738 UART: [state] Locking PCR0, PCR1 and PCR31
1,468,342 UART: [state] Locking ICCM
1,468,924 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,474,219 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,476,102 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,237,086 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 ready_for_fw is high
1,174,191 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,295 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,278 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 7036 bytes
1,349,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,376,605 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,377,726 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,380,572 >>> mbox cmd response: success
1,381,627 UART: [afmc] ++
1,381,795 UART: [afmc] CDI.KEYID = 6
1,382,158 UART: [afmc] SUBJECT.KEYID = 7
1,382,584 UART: [afmc] AUTHORITY.KEYID = 5
1,417,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,433,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,434,653 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,440,375 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,446,268 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,451,960 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,459,923 UART: [afmc] --
1,461,005 UART: [cold-reset] --
1,461,847 UART: [state] Locking Datavault
1,463,364 UART: [state] Locking PCR0, PCR1 and PCR31
1,463,968 UART: [state] Locking ICCM
1,464,632 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,469,927 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,471,810 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 ready_for_fw is high
1,056,016 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,231,604 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,130 UART: [kat] SHA2-256
902,070 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 ready_for_fw is high
1,174,844 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,568 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,097 UART: [ldev] --
1,282,401 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,774 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,895 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,741 >>> mbox cmd response: success
1,383,918 UART: [afmc] ++
1,384,086 UART: [afmc] CDI.KEYID = 6
1,384,449 UART: [afmc] SUBJECT.KEYID = 7
1,384,875 UART: [afmc] AUTHORITY.KEYID = 5
1,420,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,986 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,708 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,601 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,293 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,244 UART: [afmc] --
1,464,304 UART: [cold-reset] --
1,465,224 UART: [state] Locking Datavault
1,466,495 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,099 UART: [state] Locking ICCM
1,467,707 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,473,002 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,885 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,151 ready_for_fw is high
1,057,151 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,469 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s